jackkuo commited on
Commit
f7af8c7
·
verified ·
1 Parent(s): fafb21b

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +2 -0
  2. 1tE2T4oBgHgl3EQfiwdZ/content/tmp_files/2301.03961v1.pdf.txt +0 -0
  3. 1tE2T4oBgHgl3EQfiwdZ/content/tmp_files/load_file.txt +0 -0
  4. 29E4T4oBgHgl3EQfawyS/content/tmp_files/2301.05067v1.pdf.txt +2106 -0
  5. 29E4T4oBgHgl3EQfawyS/content/tmp_files/load_file.txt +0 -0
  6. 2tFIT4oBgHgl3EQf5CvJ/content/tmp_files/2301.11388v1.pdf.txt +2253 -0
  7. 2tFIT4oBgHgl3EQf5CvJ/content/tmp_files/load_file.txt +0 -0
  8. 4NFIT4oBgHgl3EQf6iua/content/tmp_files/2301.11394v1.pdf.txt +0 -0
  9. 4NFIT4oBgHgl3EQf6iua/content/tmp_files/load_file.txt +0 -0
  10. 4tFAT4oBgHgl3EQfFByL/content/2301.08425v1.pdf +3 -0
  11. 59AyT4oBgHgl3EQf2fl-/content/tmp_files/2301.00752v1.pdf.txt +2274 -0
  12. 59AyT4oBgHgl3EQf2fl-/content/tmp_files/load_file.txt +0 -0
  13. B9E1T4oBgHgl3EQfDwMT/content/tmp_files/2301.02880v1.pdf.txt +1195 -0
  14. B9E1T4oBgHgl3EQfDwMT/content/tmp_files/load_file.txt +0 -0
  15. D9FRT4oBgHgl3EQfAjeU/content/tmp_files/2301.13462v1.pdf.txt +1305 -0
  16. D9FRT4oBgHgl3EQfAjeU/content/tmp_files/load_file.txt +0 -0
  17. EtE1T4oBgHgl3EQfWwQ3/content/tmp_files/2301.03117v1.pdf.txt +2381 -0
  18. EtE1T4oBgHgl3EQfWwQ3/content/tmp_files/load_file.txt +0 -0
  19. FtE5T4oBgHgl3EQfVg81/content/tmp_files/2301.05551v1.pdf.txt +633 -0
  20. FtE5T4oBgHgl3EQfVg81/content/tmp_files/load_file.txt +347 -0
  21. G9AzT4oBgHgl3EQfHfuN/content/tmp_files/2301.01046v1.pdf.txt +1120 -0
  22. G9AzT4oBgHgl3EQfHfuN/content/tmp_files/load_file.txt +0 -0
  23. GNE5T4oBgHgl3EQfVw9O/content/tmp_files/2301.05553v1.pdf.txt +1602 -0
  24. GNE5T4oBgHgl3EQfVw9O/content/tmp_files/load_file.txt +0 -0
  25. I9FAT4oBgHgl3EQfux7Z/vector_store/index.pkl +3 -0
  26. IdE3T4oBgHgl3EQfXAoq/content/tmp_files/2301.04474v1.pdf.txt +1312 -0
  27. IdE3T4oBgHgl3EQfXAoq/content/tmp_files/load_file.txt +0 -0
  28. ItAzT4oBgHgl3EQfx_5k/content/tmp_files/2301.01746v1.pdf.txt +0 -0
  29. ItAzT4oBgHgl3EQfx_5k/content/tmp_files/load_file.txt +0 -0
  30. ItFJT4oBgHgl3EQfFyzw/vector_store/index.pkl +3 -0
  31. ItFLT4oBgHgl3EQfJS9D/content/tmp_files/2301.12003v1.pdf.txt +1343 -0
  32. ItFLT4oBgHgl3EQfJS9D/content/tmp_files/load_file.txt +0 -0
  33. SNE0T4oBgHgl3EQfUgB0/content/tmp_files/2301.02251v1.pdf.txt +1510 -0
  34. SNE0T4oBgHgl3EQfUgB0/content/tmp_files/load_file.txt +0 -0
  35. UdFOT4oBgHgl3EQf5zR2/content/tmp_files/2301.12955v1.pdf.txt +826 -0
  36. UdFOT4oBgHgl3EQf5zR2/content/tmp_files/load_file.txt +0 -0
  37. UtE4T4oBgHgl3EQfnA0d/content/tmp_files/2301.05172v1.pdf.txt +2050 -0
  38. UtE4T4oBgHgl3EQfnA0d/content/tmp_files/load_file.txt +0 -0
  39. V9E2T4oBgHgl3EQfDQar/content/tmp_files/2301.03623v1.pdf.txt +2276 -0
  40. V9E2T4oBgHgl3EQfDQar/content/tmp_files/load_file.txt +0 -0
  41. W9E0T4oBgHgl3EQf3QKM/content/tmp_files/2301.02723v1.pdf.txt +1413 -0
  42. W9E0T4oBgHgl3EQf3QKM/content/tmp_files/load_file.txt +0 -0
  43. WdAyT4oBgHgl3EQfWPcy/content/tmp_files/2301.00158v1.pdf.txt +2340 -0
  44. WdAyT4oBgHgl3EQfWPcy/content/tmp_files/load_file.txt +0 -0
  45. ZNE1T4oBgHgl3EQfcgRM/content/tmp_files/2301.03184v1.pdf.txt +1916 -0
  46. ZNE1T4oBgHgl3EQfcgRM/content/tmp_files/load_file.txt +0 -0
  47. _NFST4oBgHgl3EQfdDhQ/content/tmp_files/2301.13805v1.pdf.txt +1979 -0
  48. _NFST4oBgHgl3EQfdDhQ/content/tmp_files/load_file.txt +0 -0
  49. aNE3T4oBgHgl3EQfdAo0/content/2301.04530v1.pdf +3 -0
  50. aNE3T4oBgHgl3EQfdAo0/vector_store/index.pkl +3 -0
.gitattributes CHANGED
@@ -130,3 +130,5 @@ KdFLT4oBgHgl3EQfLC8K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
130
  _9E1T4oBgHgl3EQfDAK2/content/2301.02872v1.pdf filter=lfs diff=lfs merge=lfs -text
131
  YNFQT4oBgHgl3EQfdzaO/content/2301.13332v1.pdf filter=lfs diff=lfs merge=lfs -text
132
  29E2T4oBgHgl3EQfjQdC/content/2301.03966v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
130
  _9E1T4oBgHgl3EQfDAK2/content/2301.02872v1.pdf filter=lfs diff=lfs merge=lfs -text
131
  YNFQT4oBgHgl3EQfdzaO/content/2301.13332v1.pdf filter=lfs diff=lfs merge=lfs -text
132
  29E2T4oBgHgl3EQfjQdC/content/2301.03966v1.pdf filter=lfs diff=lfs merge=lfs -text
133
+ 4tFAT4oBgHgl3EQfFByL/content/2301.08425v1.pdf filter=lfs diff=lfs merge=lfs -text
134
+ aNE3T4oBgHgl3EQfdAo0/content/2301.04530v1.pdf filter=lfs diff=lfs merge=lfs -text
1tE2T4oBgHgl3EQfiwdZ/content/tmp_files/2301.03961v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
1tE2T4oBgHgl3EQfiwdZ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
29E4T4oBgHgl3EQfawyS/content/tmp_files/2301.05067v1.pdf.txt ADDED
@@ -0,0 +1,2106 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–15 (2022)
2
+ Preprint 13 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ Shear-driven magnetic buoyancy in the solar tachocline: The mean
5
+ electromotive force due to rotation
6
+ Craig. D. Duguid,★ Paul J. Bushby, and Toby S. Wood
7
+ School of Mathematics, Statistics and Physics, Newcastle University, Newcastle Upon Tyne, NE1 7RU, UK
8
+ Accepted XXX. Received YYY; in original form ZZZ
9
+ ABSTRACT
10
+ The leading theoretical paradigm for the Sun’s magnetic cycle is an 𝛼𝜔-dynamo process, in
11
+ which a combination of differential rotation and turbulent, helical flows produces a large-scale
12
+ magnetic field that reverses every 11 years. Most 𝛼𝜔 solar dynamo models rely on differential
13
+ rotation in the solar tachocline to generate a strong toroidal field. The most problematic part of
14
+ such models is then the production of the large-scale poloidal field, via a process known as the
15
+ 𝛼-effect. Whilst this is usually attributed to small-scale convective motions under the influence
16
+ of rotation, the efficiency of this regenerative process has been called into question by some
17
+ numerical simulations. Motivated by likely conditions within the tachocline, the aim of this
18
+ paper is to investigate an alternative mechanism for the poloidal field regeneration, namely the
19
+ magnetic buoyancy instability in a shear-generated, rotating magnetic layer. We use a local,
20
+ fully compressible model in which an imposed vertical shear winds up an initially vertical
21
+ magnetic field. The field ultimately becomes buoyantly unstable, and we measure the resulting
22
+ mean electromotive force (EMF). For sufficiently rapid rotation, we find that a significant
23
+ component of the mean EMF is aligned with the direction of the mean magnetic field, which
24
+ is the characteristic feature of the classical 𝛼𝜔-dynamo model. Our results therefore suggest
25
+ that magnetic buoyancy could contribute directly to the generation of large-scale poloidal field
26
+ in the Sun.
27
+ Key words: MHD – Sun: magnetic fields – dynamo – Sun: rotation – hydrodynamics –
28
+ instabilities
29
+ 1
30
+ INTRODUCTION
31
+ The key properties of the solar magnetic cycle, which waxes and
32
+ wanes with a period of approximately 11 years, are well known.
33
+ However, the nature of the dynamo mechanism that is responsi-
34
+ ble for producing this cyclic behaviour is still not fully understood
35
+ (Charbonneau 2020). One of the most plausible explanations for the
36
+ observed magnetic activity is that of an 𝛼𝜔-dynamo (first proposed
37
+ by Parker 1955b). A key component of this dynamo mechanism is
38
+ differential rotation (the 𝜔-effect), which stretches magnetic field
39
+ lines in the direction of the flow; around the base of the solar convec-
40
+ tion zone, the strong radial shear in the solar tachocline (Thompson
41
+ et al. 2003) would tend to produce a magnetic field with a dominant
42
+ azimuthal (toroidal) component. For a successful dynamo, there
43
+ must also be some mechanism that regenerates the poloidal (radial
44
+ and latitudinal) components of the large-scale magnetic field. In
45
+ Parker’s scenario (Parker 1955b, 1993), the dynamo loop is com-
46
+ pleted by the action of cyclonic convection upon toroidal field lines
47
+ (a process now referred to as the 𝛼-effect). Due to the action of the
48
+ Coriolis force, convective upwellings tend to produce rising, twisted
49
+ ★ E-mail: craig.duguid@newcastle.ac.uk
50
+ magnetic loops. The cumulative effect of many such loops could,
51
+ in principle, regenerate a large-scale poloidal field. Using a model
52
+ in which the 𝛼-effect was implemented via a parametrised source
53
+ term, Parker established that an 𝛼𝜔-dynamo of this type should
54
+ be capable of producing oscillatory magnetic behaviour, similar to
55
+ that seen in the Sun, provided that the 𝛼- and 𝜔-effects are efficient
56
+ enough to overcome ohmic dissipation.
57
+ While there is a strong consensus, driven by the observations,
58
+ that the 𝜔-effect is at work in the solar interior, the 𝛼-effect re-
59
+ mains a controversial area. It is possible to place Parker’s heuristic
60
+ arguments on a firmer mathematical footing using the techniques of
61
+ mean-field electrodynamics (Steenbeck et al. 1966; Moffatt 1978).
62
+ Under this approach, an averaging process is introduced, and the
63
+ equation for the mean magnetic field then contains an additional
64
+ source term (a mean electromotive force, EMF) that arises as a
65
+ result of the correlations between the fluctuating parts of the mag-
66
+ netic field and the flow. For systems that lack reflectional symmetry
67
+ (e.g. rotating systems), Parker’s 𝛼-effect then emerges (under certain
68
+ assumptions) as part of this mean EMF. By making the first-order
69
+ smoothing approximation (see, e.g., Moffatt 1978, for more details),
70
+ it is possible to derive an expression for the 𝛼-effect that is directly
71
+ proportional to the kinetic helicity of the flow. However, the valid-
72
+ © 2022 The Authors
73
+ arXiv:2301.05067v1 [astro-ph.SR] 12 Jan 2023
74
+
75
+ 2
76
+ C. D. Duguid et al.
77
+ ity of this expression is questionable under the highly-conducting,
78
+ turbulent conditions present in the solar interior.
79
+ Even in (non-solar-like) situations where there is no differential
80
+ rotation, mean-field theory suggests that rapidly rotating convection
81
+ should be capable of sustaining a magnetic field with a significant
82
+ large-scale component (i.e. a magnetic field that is structured on
83
+ the scale of the system). There are certainly examples of large-scale
84
+ (𝛼2) dynamos in near-onset, rapidly-rotating convection (e.g. Chil-
85
+ dress & Soward 1972) and in moderately supercritical, rotationally-
86
+ dominated convection (e.g. Masada & Sano 2016; Bushby et al.
87
+ 2018). However, dynamos driven by turbulent rotating convection
88
+ tend to produce disordered, small-scale magnetic fields (e.g. Catta-
89
+ neo & Hughes 2006; Favier & Bushby 2013). These results are often
90
+ interpreted in terms of the 𝛼-effect, and it is certainly possible to
91
+ measure 𝛼 in numerical simulations of convection in a rotating do-
92
+ main (see, e.g. Cattaneo & Hughes 2006; Käpylä et al. 2009; Favier
93
+ & Bushby 2013). However, the outcome of such measurements is
94
+ dependent upon the techniques used, and this remains an area of
95
+ some disagreement in the literature (a full discussion of which lies
96
+ beyond the scope of the present paper). Nonetheless, these studies
97
+ cast doubt on whether cyclonic convection can produce the required
98
+ 𝛼-effect in the turbulent conditions of the solar convection zone.
99
+ Given the above considerations, it is natural to ask whether
100
+ there are any other physical mechanisms that could give rise to
101
+ a similar “rise and twist” effect that Parker originally envisaged
102
+ as being due to cyclonic convection (thus completing the dynamo
103
+ cycle). One candidate for this is magnetic buoyancy. It is well estab-
104
+ lished that isolated magnetic flux tubes tend to be less dense than
105
+ their non-magnetic surroundings, and are therefore buoyant (Parker
106
+ 1955a; Jensen 1955), and this has long been cited as an explanation
107
+ for the emergence of magnetically active regions at the solar surface.
108
+ Whilst it has been shown that instabilities in individual flux tubes
109
+ can (in the presence of rotation) give rise to a mean EMF that is
110
+ analogous to the 𝛼-effect (Ferriz-Mas et al. 1994), it is unlikely that
111
+ the magnetic field distribution in the solar interior takes the form of
112
+ discrete, isolated magnetic flux tubes. It is more plausible that there
113
+ is a continuous layer of predominantly azimuthal magnetic flux that
114
+ is (partly as a consequence of flux pumping, e.g. Tobias et al. 2001)
115
+ largely confined to the sub-adiabatically stratified region just below
116
+ the base of the solar convection zone, where poloidal field can be
117
+ stretched out by the shear in the tachocline.
118
+ The evolution of an imposed magnetic layer under the action
119
+ of magnetic buoyancy has been well studied (e.g. Gilman 1970;
120
+ Cattaneo & Hughes 1988; Matthews et al. 1995b; Wissink et al.
121
+ 2000; Kersalé et al. 2007; Mizerski et al. 2013; Gilman 2018). The
122
+ preferred mode of instability is usually three-dimensional, produc-
123
+ ing undular motions with a long wavelength parallel to the magnetic
124
+ field lines and a short wavelength perpendicular to them. As noted
125
+ by Hughes (2007), for example, a simple comparison of the typi-
126
+ cal growth rate of the instability compared to the rotation period
127
+ of the Sun suggests that rotation should be playing a role in the
128
+ evolution of this instability at the base of the solar convection zone.
129
+ The effects of rotation upon the magnetic buoyancy instability are
130
+ non-trivial (see, e.g. Hughes 2007, for a review). Here we focus
131
+ upon those studies of magnetic buoyancy in the presence of rotation
132
+ that are directly relevant to the solar dynamo problem. Building
133
+ on the analysis of Gilman (1970), Moffatt (1978) considered the
134
+ magnetic buoyancy instability in a unidirectional layer under the
135
+ magnetostrophic approximation; he was able to show that the re-
136
+ sultant instability produces a systematic mean EMF from which it
137
+ is possible to derive an 𝛼-effect. The mean electromotive force due
138
+ to magnetic buoyancy in the presence of rotation (and its possible
139
+ influence on the solar dynamo) has been explored in a number of
140
+ subsequent studies (Schmitt 1984; Brandenburg & Schmitt 1998;
141
+ Thelen 2000b,a; Chatterjee et al. 2011; Davies & Hughes 2011). It
142
+ should be noted that Davies & Hughes (2011) suggest that attention
143
+ should be focused upon the mean EMF in such cases, rather than the
144
+ 𝛼-effect itself, arguing that the decomposition of this quantity into
145
+ standard mean-field coefficients is too simplistic to be meaningful
146
+ in the context of this magnetically-driven instability.
147
+ All of the magnetic buoyancy studies listed above consider the
148
+ evolution of an imposed magnetic layer under the action of this insta-
149
+ bility. Inevitably, the evolution of this layer will depend to some ex-
150
+ tent on the initial magnetic field distribution. In the solar tachocline,
151
+ it is believed that this layer is generated by shearing motions, so it
152
+ is clearly of importance (as a step towards the full dynamo prob-
153
+ lem) to consider the corresponding magnetic buoyancy instability
154
+ in a shear-generated magnetic layer. In a series of papers, Brummell
155
+ et al. (2002a), Cline et al. (2003a) and Cline et al. (2003b) consid-
156
+ ered the evolution of buoyant magnetic structures, generated by an
157
+ idealised shear flow with a strong horizontal (latitudinal) gradient.
158
+ Although the shear flow was not particularly tachocline-like, they
159
+ did manage to generate dynamo action (Cline et al. 2003b), even in
160
+ the absence of rotation, via the combination of magnetic buoyancy
161
+ and Kelvin-Helmholtz instabilities. The more solar-like problem of
162
+ a magnetic layer generated by a vertical shear has also been consid-
163
+ ered (Vasil & Brummell 2008, 2009; Silvers et al. 2009a,b; Barker
164
+ et al. 2012). In their initial study, Vasil & Brummell (2008) found
165
+ that it was only possible to excite a magnetic buoyancy instability in
166
+ this configuration with an unrealistically strong (hydrodynamically
167
+ unstable) shear. A resolution to this problem was later proposed
168
+ by Silvers et al. (2009b), who observed that it was in fact possible
169
+ for such systems to produce magnetic buoyancy instabilities, even
170
+ with a comparatively weak shear, if the ratio of the magnetic to
171
+ thermal diffusivities is sufficiently small. Fortunately, this is exactly
172
+ the expected parameter regime for the solar tachocline.
173
+ In terms of modelling the solar dynamo, the key ingredient
174
+ that is missing from previous studies that have considered magnetic
175
+ buoyancy in a shear-generated layer is rotation. We know from
176
+ the imposed field calculations that magnetic buoyancy instabilities
177
+ can produce a mean EMF that should be conducive to dynamo
178
+ action. What we do not yet know is whether or not a suitable mean
179
+ EMF can be obtained from the shear-generated magnetic buoyancy
180
+ instability. This is the subject of the present paper and this represents
181
+ a crucial step towards building a magnetic buoyancy-driven version
182
+ of Parker’s solar dynamo model.
183
+ The plan for this paper is as follows. In Section 2 we will
184
+ describe the model and governing equations. In Section 3 we will
185
+ report on the results of the hydrodynamic problem on the stability
186
+ of the shear for non-rotating and rotating systems. In section 4 we
187
+ analyse results of simulations with and without rotation for the full
188
+ MHD problem. We will then present the most important results
189
+ of this work in Section 5, namely, the mean EMF driven by this
190
+ magnetic buoyancy instability. We will then discuss the importance
191
+ of our results in Section 6, focusing particularly upon the potential
192
+ for this system to act as a dynamo.
193
+ 2
194
+ MODEL
195
+ 2.1
196
+ Model set-up
197
+ A schematic of the model geometry is shown in Fig. 1. We consider
198
+ a Cartesian domain, of depth 𝑑, with the coordinate system oriented
199
+ MNRAS 000, 1–15 (2022)
200
+
201
+ Shear-driven magnetic buoyancy
202
+ 3
203
+ so that the 𝑧-axis points vertically downwards, parallel to the con-
204
+ stant gravitational acceleration, 𝑔e𝑧. This domain rotates uniformly
205
+ about the 𝑧-axis, with a constant angular velocity, −Ωe𝑧. The do-
206
+ main is filled with a compressible, electrically-conducting fluid, of
207
+ constant thermal conductivity 𝐾, constant magnetic diffusivity 𝜂,
208
+ and constant dynamic viscosity 𝜇. The (constant) magnetic perme-
209
+ ability of this fluid is denoted by 𝜇0. This fluid is assumed to be an
210
+ ideal gas, with constant specific heats 𝑐𝑝 and 𝑐𝑣 (ℜ = 𝑐𝑝 −𝑐𝑣 is the
211
+ gas constant). In its initial state, this fluid is horizontally-uniform,
212
+ with temperature, 𝑇0, and density, 𝜌0, at the upper surface (𝑧 = 0).
213
+ A fixed heat flux is applied through the lower boundary (𝑧 = 𝑑),
214
+ leading to an initial temperature difference across the domain of
215
+ Δ𝑇. The initial state is that of a polytrope, with
216
+ 𝑇(𝑧) = 𝑇0
217
+
218
+ 1 + 𝜃𝑧
219
+ 𝑑
220
+
221
+ ,
222
+ and
223
+ 𝜌(𝑧) = 𝜌0
224
+
225
+ 1 + 𝜃𝑧
226
+ 𝑑
227
+ �𝑚
228
+ ,
229
+ (1)
230
+ where 𝜃 = Δ𝑇/𝑇0 is a measure of the thermal stratification of the
231
+ domain, and 𝑚 = (𝑔𝑑/ℜΔ𝑇) − 1 is the polytropic index.
232
+ Following previous studies (Vasil & Brummell 2008; Silvers
233
+ et al. 2009b), we include an additional forcing term in the momen-
234
+ tum equation. The aim is to mimic the key aspects of the differential
235
+ rotation in a local region of the solar tachocline. Identifying the
236
+ 𝑥-axis of the domain with the local azimuthal (toroidal) direction,
237
+ this shear flow takes the form u = 𝑈0(𝑧)e𝑥, where 𝑈0(𝑧) will be
238
+ specified below. The forcing is chosen so as to balance this flow (in
239
+ the absence of a magnetic field), and this flow is set as an initial
240
+ condition across the polytropic layer.
241
+ Having set up the polytropic state with a shear flow, we then
242
+ introduce a seed magnetic field into the system. This field is initially
243
+ uniform and vertical, taking the form B = 𝐵0e𝑧. This imposed
244
+ field will be continually stretched in the 𝑥-direction by the shear,
245
+ producing a horizontal magnetic layer (the peak strength of which
246
+ initially increases linearly with time). Eventually, the field in this
247
+ layer will be amplified to a level at which it becomes dynamically
248
+ significant, resisting the shearing motions and ultimately driving a
249
+ magnetic buoyancy instability in the system.
250
+ Given the expected geometry of the magnetic layer, we an-
251
+ ticipate that the ensuing magnetic buoyancy instability will have
252
+ a long length-scale in the 𝑥-direction and a short length-scale in
253
+ the 𝑦 direction. Following Silvers et al. (2009b), we choose to re-
254
+ flect the anisotropic nature of the instability in the domain geom-
255
+ etry. Defining the horizontal dimensions to be 0 ⩽ 𝑥 ⩽ 𝐿𝑥𝑑 and
256
+ 0 ⩽ 𝑦 ⩽ 𝐿𝑦𝑑, we set 𝐿𝑥 = 2 and 𝐿𝑦 = 0.5. This narrow domain
257
+ enables us to study the key features of the system without expending
258
+ unnecessary computational effort.
259
+ It is worth emphasising at this stage that it is the inclusion of
260
+ rotation that represents the novel aspect of the present study. To the
261
+ best of our knowledge, this is the first time that the effects of rotation
262
+ have been included in a study of magnetic buoyancy in a shear-
263
+ generated layer. As we shall see later, this raises some interesting
264
+ issues in terms of the shear forcing, and also leads to the excitation
265
+ of mean flows once the magnetic field becomes dynamically sig-
266
+ nificant. Given the additional complexity that this introduces into
267
+ the system, we chose to focus exclusively upon the simplest case
268
+ of a vertical rotation vector in this initial study (which places this
269
+ domain within the polar regions of the solar tachocline). We will
270
+ explore the case of an inclined rotation vector, allowing us to probe
271
+ the latitudinal dependence of the system, in a future paper.
272
+ Figure 1. Schematic of the model domain. The arrows in the 𝑥-direction
273
+ show the shear flow, 𝑈0, whilst the arrows in the 𝑧-direction show the initial
274
+ magnetic field, B0. The shading indicates the initial temperature distribution,
275
+ with red (yellow) shading corresponding to warmer (cooler) fluid.
276
+ 2.2
277
+ Governing equations
278
+ In order to make the governing equations dimensionless, we adopt
279
+ similar scalings to those set out in several previous studies (e.g.
280
+ Matthews et al. 1995a; Favier & Bushby 2013). The characteristic
281
+ length-scale is assumed to be the depth of the layer, 𝑑, whilst the
282
+ density and temperature are scaled in terms of their initial values
283
+ at the upper surface of the domain (𝜌0 and 𝑇0 respectively). Our
284
+ adopted time-scale is the (isothermal) acoustic travel time at the top
285
+ of the domain (𝑧 = 0) defined by 𝑑/
286
+ √︁
287
+ ℜ𝑇0. A natural scaling for
288
+ the velocity of the fluid is then the corresponding isothermal sound
289
+ speed,
290
+ √︁
291
+ ℜ𝑇0, whilst the magnetic field is scaled in terms of 𝐵0.
292
+ In these units, the equations describing the temporal evolution
293
+ of the density 𝜌, temperature 𝑇, velocity u and magnetic field B
294
+ become
295
+ 𝜌 𝜕u
296
+ 𝜕𝑡 + 𝜌(u · ∇)u = −Ta01/2 𝜎𝜅𝜌𝛀 × u − ∇𝑃 + 𝜃(𝑚 + 1)𝜌e𝑧
297
+ + 𝐹(∇ × B) × B + 𝜎𝜅∇ · 𝜏 + F𝑠 ,
298
+ (2a)
299
+ 𝜌 𝜕𝑇
300
+ 𝜕𝑡 + 𝜌(u · ∇)𝑇 = −(𝛾 − 1)𝑃∇ · u + 𝛾𝜅∇2𝑇
301
+ + 𝐹(𝛾 − 1)𝜁0𝜅|∇ × B|2 + (𝛾 − 1)𝜎𝜅
302
+ 2
303
+ 𝜏2 ,
304
+ (2b)
305
+ 𝜕B
306
+ 𝜕𝑡 = ∇ × (u × B − 𝜁0𝜅∇ × B) ,
307
+ (2c)
308
+ 𝜕𝜌
309
+ 𝜕𝑡 = −∇ · (𝜌u) ,
310
+ (2d)
311
+ ∇ · B = 0 .
312
+ (2e)
313
+ We have defined the viscous stress tensor as
314
+ 𝜏𝑖 𝑗 = 𝜕𝑢𝑖
315
+ 𝜕𝑥 𝑗
316
+ + 𝜕𝑢 𝑗
317
+ 𝜕𝑥𝑖
318
+ − 2
319
+ 3𝛿𝑖 𝑗
320
+ 𝜕𝑢𝑘
321
+ 𝜕𝑥𝑘
322
+ (3)
323
+ (where 𝛿𝑖 𝑗 denotes the Kronecker delta), whilst the pressure 𝑃
324
+ satisfies the equation of state for an ideal gas,
325
+ 𝑃 = 𝜌𝑇 .
326
+ (4)
327
+ This system contains a number of non-dimensional parameters,
328
+ which are summarised in Table 1 along with their typical values.
329
+ These are discussed in more detail below.
330
+ In Eq. (2a), the forcing term, F𝑠, is chosen to balance the
331
+ viscous and Coriolis forces associated with the imposed shear flow,
332
+ 𝑈0(𝑧)e𝑥. In the absence of magnetic field or any hydrodynamic
333
+ MNRAS 000, 1–15 (2022)
334
+
335
+ 12
336
+ y
337
+ Bo
338
+
339
+ Uo
340
+ *g
341
+ 三(4
342
+ C. D. Duguid et al.
343
+ instabilities, we would therefore expect the fluid to remain in a
344
+ steady state with u = 𝑈0(𝑧)e𝑥. Following a similar approach to
345
+ Vasil & Brummell (2008) and Silvers et al. (2009b) we choose a
346
+ shear flow of the form
347
+ 𝑈0(𝑧) = 𝐴 tanh[10(𝑧 − 0.5)] ,
348
+ (5)
349
+ where the constant 𝐴 determines the shear amplitude. The form of
350
+ the shear flow is illustrated schematically in Fig. 1. This hyperbolic
351
+ tangent profile localises the shearing region at the mid-plane of the
352
+ domain. We note that, for sufficiently large values of 𝐴, the shear
353
+ flow would be unstable even in the absence of a magnetic field; the
354
+ hydrodynamic stability of this system (and the consequent choice
355
+ of 𝐴) will be discussed in § 3. In order to maintain this shear flow,
356
+ we take
357
+ F𝑠 =
358
+ ������
359
+ −𝜎𝜅𝜕𝑧𝑧𝑈0
360
+ √Ta0 𝜎𝜅𝜌𝑈0
361
+ 0
362
+ ������
363
+ .
364
+ (6)
365
+ In the 𝑥-direction, this forcing balances the viscous term. Note that
366
+ the presence of rotation requires F𝑠 to have a 𝑦 component in order to
367
+ balance the Coriolis contribution from the imposed shear. Once the
368
+ magnetic field is introduced into the fluid, the Lorentz tension in the
369
+ field lines will eventually act to inhibit the shear, and may also drive
370
+ other kinds of mean flow. However, by making the initial magnetic
371
+ field sufficiently weak, it is possible minimise the influence of some
372
+ of these dynamical effects upon the evolution of the system over the
373
+ timescales of interest.
374
+ 2.3
375
+ Boundary and initial conditions
376
+ All variables are assumed to be periodic in both of the horizontal
377
+ directions. The upper and lower bounding surfaces are assumed
378
+ to be stress-free and impermeable. The upper boundary is held at
379
+ fixed temperature, whilst (as already noted) a fixed heat flux is
380
+ imposed through the lower boundary. On both bounding surfaces,
381
+ the horizontal magnetic field is assumed to vanish. Therefore the
382
+ tangential viscous, Reynolds and Maxwell stresses all vanish on the
383
+ upper and lower boundaries. In this dimensionless system, these
384
+ conditions correspond to
385
+ 𝑢𝑧 = 𝜕𝑢𝑥
386
+ 𝜕𝑧 = 𝜕𝑢𝑦
387
+ 𝜕𝑧 = 0
388
+ for
389
+ 𝑧 ∈ {0, 1} ,
390
+ (7a)
391
+ 𝑇(𝑧 = 0) = 1
392
+ and
393
+ 𝜕𝑇
394
+ 𝜕𝑧
395
+ ���𝑧=1 = 𝜃 ,
396
+ (7b)
397
+ 𝐵𝑥 = 𝐵𝑦 = 𝜕𝐵𝑧
398
+ 𝜕𝑧 = 0
399
+ for
400
+ 𝑧 ∈ {0, 1} .
401
+ (7c)
402
+ Note that the shear is sufficiently localised about the mid-plane that
403
+ there is no contradiction here in terms of the stress-free condition on
404
+ the velocity field. It is straightforward to confirm that these bound-
405
+ ary conditions are consistent with the initial polytropic solution,
406
+ which (in the absence of a magnetic field) is then an equilibrium
407
+ solution of the governing equations. This equilibrium is eventually
408
+ perturbed by the magnetic field as it is amplified by the shear. How-
409
+ ever, a further perturbation is needed in order to seed the magnetic
410
+ buoyancy instability. Therefore, a small thermal perturbation is also
411
+ added to the initial state for each simulation. This takes the form of a
412
+ small, pseudo-random perturbation to the temperature distribution
413
+ (additive noise, localised around the mid-plane, of peak amplitude
414
+ 0.05 in dimensionless units).
415
+ Symbol
416
+ Description
417
+ Definition
418
+ Values
419
+ 𝐹
420
+ Magnetic field strength
421
+ 𝐵2
422
+ 0
423
+ ℜ𝑇0𝜌0𝜇0
424
+ Variable
425
+ 𝜎
426
+ Prandtl number
427
+ 𝜇𝑐𝑝
428
+ 𝐾
429
+ 0.00025
430
+ 𝜃
431
+ Temperature gradient
432
+ Δ𝑇
433
+ 𝑇0
434
+ 5
435
+ 𝜅
436
+ Thermal diffusivity
437
+ 𝐾
438
+ 𝑑𝜌0𝑐𝑝
439
+ √︁
440
+ ℜ𝑇0
441
+ 0.01
442
+ 𝜁0
443
+ Inverse Roberts number
444
+ 𝜂𝑐𝑝𝜌0
445
+ 𝐾
446
+ 0.0005
447
+ 𝛾
448
+ Ratio of specific heats
449
+ 𝑐𝑝
450
+ 𝑐𝑣
451
+ 5/3
452
+ 𝑚
453
+ Polytropic index
454
+ 𝑔𝑑
455
+ ℜΔ𝑇 − 1
456
+ 1.6
457
+ Ta0
458
+ Taylor number
459
+ 4𝜌2
460
+ 0Ω2𝑑4
461
+ 𝜇2
462
+ Variable
463
+ Re
464
+ Reynolds number
465
+ 𝑈0𝜌0
466
+ 𝜎𝜅
467
+ 8000
468
+ Rm
469
+ Magnetic Reynolds number
470
+ 𝑈0
471
+ 𝜁0𝜅
472
+ 4000
473
+ 𝜎𝑚
474
+ Magnetic Prandtl number
475
+ 𝜎
476
+ 𝜁0
477
+ 0.5
478
+ 𝜏visc
479
+ Viscous timescale
480
+ 1
481
+ 𝜎𝜅
482
+ 4 × 105
483
+ 𝜏ohmic
484
+ Ohmic timescale
485
+ 1
486
+ 𝜁0𝜅
487
+ 2 × 105
488
+ 𝜏therm
489
+ Thermal timescale
490
+ 1
491
+ 𝜅
492
+ 100
493
+ Table 1. Non-dimensional parameters in the system including a text de-
494
+ scription/name of the quantity, the definition, and the value the parameter
495
+ takes (where applicable). Also reported are the (shear) fluid and magnetic
496
+ Reynolds numbers (assuming a shear amplitude of 𝐴 = 0.02), the magnetic
497
+ Prandtl number, and the diffusive timescales (viscous, Ohmic, and thermal).
498
+ These Reynolds numbers and timescales are defined using the total layer
499
+ depth as the characteristic length-scale (which is approximately one order
500
+ of magnitude larger than the initial width of the shear layer).
501
+ 2.4
502
+ Non-dimensional parameters
503
+ In Table 1 we list the non dimensional parameters with their typical
504
+ values (which largely follows Silvers et al. 2009b). Most of the
505
+ parameters are fixed. In particular, we choose the Prandtl number,
506
+ the thermal diffusivity and the inverse Roberts number so that the
507
+ viscous, Ohmic and thermal diffusion timescales have the correct
508
+ ordering for the tachocline, with the thermal timescale much shorter
509
+ than the other two, and the magnetic Prandtl number less than unity
510
+ (although because of computational limitations these simulations
511
+ are necessarily much more dissipative than the real tachocline).
512
+ The comparatively short thermal diffusion time tends to promote
513
+ magnetic buoyancy in this system (Silvers et al. 2009b). With 𝛾 =
514
+ 5/3, a polytropic index of 𝑚 = 1.6 ensures that the layer is sub-
515
+ adiabatically stratified. With this choice of parameters, our domain
516
+ covers 𝑁𝑝 = (𝑚 + 1) ln(1 + 𝜃) ≈ 4.66 pressure scale heights. In
517
+ terms of the parameters to be varied, the quantity 𝐹 gives the ratio
518
+ of the squared Alfvén speed to the squared (isothermal) sound speed
519
+ at 𝑧 = 0 at the start of the calculation. Note that a multiplicative
520
+ factor of
521
+
522
+ 𝐹 must be included in front of the magnetic field in
523
+ order to make quantitative comparisons between the magnetic field
524
+ strength and the flow. With all other parameters fixed, varying 𝐹
525
+ is equivalent to varying the strength of the initial vertical magnetic
526
+ field. The other parameter to be varied is the Taylor number, Ta0,
527
+ MNRAS 000, 1–15 (2022)
528
+
529
+ Shear-driven magnetic buoyancy
530
+ 5
531
+ which is a dimensionless measure of the rotation rate of the system
532
+ relative to viscous dissipation. Due to the dependence of the Coriolis
533
+ term upon 𝜌, it is arguably the mid-layer value of this ratio that is
534
+ of direct relevance to the shear (and hence the magnetic layer); we
535
+ therefore quote the mid-layer Taylor number in what follows, i.e.
536
+ Ta = Ta0
537
+
538
+ 1 + 𝜃
539
+ 2
540
+ �2𝑚
541
+ =
542
+ 4𝜌2
543
+ 0Ω2𝑑4
544
+ 𝜇2
545
+
546
+ 1 + 𝜃
547
+ 2
548
+ �2𝑚
549
+ .
550
+ (8)
551
+ With this choice of parameters, Ta ≈ 55Ta0.
552
+ 2.5
553
+ Numerical method
554
+ We solve the system of governing equations (Eq. 2) numerically.
555
+ In practice, we use a poloidal-toroidal decomposition for the mag-
556
+ netic field, which ensures that it remains solenoidal at all times.
557
+ Horizontal derivatives are computed in Fourier space, whereas a
558
+ 4th-order finite difference scheme is applied to the vertical deriva-
559
+ tives (in order to improve stability, an upwind scheme is used
560
+ for the advective terms, where appropriate). All variables are de-
561
+ aliased in Fourier space using the standard 2/3 rule. In order to
562
+ time-step the equations, we use an explicit third-order Adams-
563
+ Bashforth scheme with a variable time-step. We use a resolution
564
+ of (𝑁𝑥, 𝑁𝑦, 𝑁𝑧) = (192, 96, 192) in all cases presented here. We
565
+ have also performed a more extensive low resolution parameter sur-
566
+ vey with a resolution of (𝑁𝑥, 𝑁𝑦, 𝑁𝑧) = (128, 64, 128), the results
567
+ of which are not presented in the main body of the paper. How-
568
+ ever, it should be noted that the differences between the lower and
569
+ higher resolutions are not significant. A full list of all simulations
570
+ performed in this work can be found in Appendix A.
571
+ 3
572
+ HYDRODYNAMIC CONSIDERATIONS
573
+ We first consider the stability of the shear flow in the absence of a
574
+ magnetic field. The purpose of this is to ensure that the dynamics
575
+ that we observe in the subsequent magnetic calculations are en-
576
+ tirely driven by magnetic buoyancy, as opposed to an underlying
577
+ hydrodynamic instability.
578
+ Focusing initially upon the hydrodynamic system in the ab-
579
+ sence of rotation, we note that the Richardson number is defined as
580
+ follows:
581
+ Ri =
582
+ 𝑁2
583
+ (d𝑈0/d𝑧)2
584
+ = 𝜃2(𝑚 + 1)
585
+ 100𝐴2
586
+
587
+ 𝑚 − 1
588
+ 𝛾 [𝑚 + 1]
589
+ � cosh4 �
590
+ 10(𝑧 − 0.5)
591
+
592
+ 1 + 𝜃𝑧
593
+ ,
594
+ (9)
595
+ where 𝑁 is the Brunt-Väisälä frequency, which measures the
596
+ strength of stratification, and d𝑈0/d𝑧 is the local shearing rate.
597
+ At fixed 𝜃, 𝑚 and 𝛾, the key point to note is that this quantity is
598
+ inversely proportional to the square of the shear flow amplitude, 𝐴.
599
+ In the absence of diffusion, a necessary condition for stability is
600
+ that Ri > 1/4 is satisfied everywhere in the domain (Miles 1961;
601
+ Howard 1961). This condition was not satisfied in the strong shear
602
+ regime considered by Vasil & Brummell (2008), who found a vig-
603
+ orous hydrodynamic instability in the absence of a magnetic field.
604
+ However, this condition was satisfied in the calculations of Silvers
605
+ et al. (2009b), who quote a value of Ri ≈ 2.96. When diffusive ef-
606
+ fects are included, some care is needed in the limit of rapid thermal
607
+ diffusion, which can have a destabilising influence upon stratified
608
+ Figure 2. Two metrics for the estimated stability of the shear for the shear pa-
609
+ rameters of Silvers et al. (2009b) (𝐴 = 0.05) and the shear considered in this
610
+ work (𝐴 = 0.02), see legend for colours. Left: the normalised (horizontally-
611
+ averaged) vertical shear profile taken at 𝑡 = 500 time units in each case. The
612
+ dotted line represents the normalised target shear profile. Right: the volume
613
+ averaged deviation between the normalised shear flow and the normalised
614
+ target profile.
615
+ shear flows (Zahn 1974; Garaud et al. 2017; Cope 2021). In this
616
+ case, the stability of the system depends not only upon the Richard-
617
+ son number, but also the Prandtl number. Building on the work of
618
+ Zahn (1974), Garaud et al. (2017) find a condition for instability
619
+ that Ri 𝜎 ≲ 0.007. Whilst this threshold is empirically determined,
620
+ probably exhibiting some degree of dependence upon the details of
621
+ the model, it is notable that the system considered by Silvers et al.
622
+ (2009b) yields a value of Ri 𝜎 ≈ 0.00074, which is well below the
623
+ stability threshold suggested by Garaud et al. (2017). In other words,
624
+ their underlying shear is potentially (hydrodynamically) unstable in
625
+ this parameter regime.
626
+ In order to investigate this issue, we consider here two shear
627
+ amplitudes (initially in the absence of rotation). Following Silvers
628
+ et al. (2009b), the stronger shear corresponds to 𝐴 = 0.05. We also
629
+ consider a weaker shear of 𝐴 = 0.02. The choice of 𝐴 = 0.02
630
+ is something of a compromise. Whilst Ri ≈ 18.5 ≫ 1/4 for the
631
+ case of 𝐴 = 0.02, Ri 𝜎 ≈ 0.004, which is still just below the
632
+ empirically-determined stability threshold of Garaud et al. (2017).
633
+ However, the weaker the shear, the longer the time taken for the
634
+ formation of the horizontal magnetic layer (during the early stages
635
+ of evolution, the peak value of 𝐵𝑥 is proportional to 𝐴𝑡), so longer
636
+ (computationally expensive) integrations are needed before the layer
637
+ becomes buoyantly unstable.
638
+ The effects of varying the shear amplitude are illustrated in
639
+ Fig. 2. This figure shows the evolution of the horizontally-averaged
640
+ 𝑥-component of the velocity field,
641
+ ⟨𝑢𝑥⟩(𝑧, 𝑡) =
642
+ 1
643
+ 𝐿𝑥𝐿𝑦
644
+ ∫ 𝐿𝑦
645
+ 0
646
+ ∫ 𝐿𝑦
647
+ 0
648
+ 𝑢𝑥 d𝑥 d𝑦
649
+ (10)
650
+ (angled brackets will be used throughout this paper to denote a
651
+ horizontal average of this form). In particular, this figure shows the
652
+ deviation from the initial shear profile for the two shear amplitudes
653
+ considered, alongside the integrated deviation from the initial pro-
654
+ file. If even a weak instability is present then one would expect the
655
+ shear profile to deviate from the target profile as energy is extracted
656
+ from the shear. After 500 time units (which will be the typical period
657
+ of time over which we evolve the magnetic buoyancy calculations),
658
+ we see that the stronger shear (𝐴 = 0.05) has departed significantly
659
+ from the target shear and the deviations are still increasing with time.
660
+ This suggests that this shear flow is in fact (weakly) unstable. On the
661
+ other hand, the weaker shear profile still shows excellent agreement
662
+ MNRAS 000, 1–15 (2022)
663
+
664
+ 1
665
+ 0.08
666
+ S
667
+ 0.5
668
+ A
669
+ 0
670
+ 0.04
671
+ (m)
672
+ -0.5
673
+ A
674
+ 0
675
+ 0
676
+ 0.5
677
+ 1
678
+ 0
679
+ 500
680
+ A = 0.02 A = 0.05
681
+ t
682
+ 26
683
+ C. D. Duguid et al.
684
+ Figure 3. The evolution of the mean flows (for 𝐴 = 0.02) for three different
685
+ rotation rates, with Ta ∈ {0, 1, 5}(×108) as denoted by the legend. Top
686
+ left: snapshots of the horizontally averaged vertical shear profile normalised
687
+ by the shear amplitude for the three rotation rates taken at 𝑡 = 500. The
688
+ initial shear profile, 𝑈0(𝑧), is overplotted as a dotted line, and is practically
689
+ indistinguishable. Top right: the volume averaged deviation between the nor-
690
+ malised shear flow and the normalised target profile. Bottom left: snapshots
691
+ of the ⟨𝑢𝑦 ⟩ profile for each rotation rate taken at 𝑡 = 500. Bottom right: the
692
+ volume integrated deviation of ⟨𝑢𝑦 ⟩ from zero.
693
+ with the target shear, with an integrated error that appears to be
694
+ reaching a steady state of approximately 1%. Over the timescales of
695
+ interest the shear is essentially unchanged, so we choose 𝐴 = 0.02
696
+ throughout in what follows; this choice should ensure that any de-
697
+ partures from the target shear are definitely magnetically-driven. It
698
+ is worth noting here that the vertical magnetic field we subsequently
699
+ introduce will (at least initially) tend to inhibit any shear-driven in-
700
+ stabilities (e.g. Silvers et al. 2009a), further reducing the possible
701
+ impact of any underlying hydrodynamical instability.
702
+ The discussion of shear stability has so far been in the context
703
+ of non-rotating systems, and we need to confirm that our conclusions
704
+ are unchanged if the system is rotating. It is also important to check
705
+ that our imposed forcing correctly balances the initial shear when
706
+ Coriolis effects are present. Fixing the shear amplitude to 𝐴 = 0.02,
707
+ Fig. 3 shows a comparison between the non-rotating case presented
708
+ above and rotating cases with Ta ∈ {1, 5}(×108). We see that the
709
+ addition of rotation has no significant influence upon the evolution
710
+ of ⟨𝑢𝑥⟩. In fact, we see that rotation tends to reduce the (already
711
+ insignificant) integrated deviation from the target profile; rotation
712
+ therefore seems to have a stabilising influence upon the system. As
713
+ indicated by the lower part of Fig. 3, due to the presence of Coriolis
714
+ effects, we see that weak mean flows emerge in the 𝑦-direction in
715
+ the rotating cases. These could either be a transient response to
716
+ the small-scale thermal perturbations that are added to the initial
717
+ polytrope or the result of a very weak hydrodynamic instability.
718
+ Either way, it should be stressed that these flows are rather low
719
+ amplitude and are unlikely to have any significant impact upon the
720
+ system over the timescales of interest. The inclusion of rotation has
721
+ no significant (adverse) impact on the hydrodynamic stability of the
722
+ system.
723
+ 4
724
+ MAGNETIC BUOYANCY WITH AND WITHOUT
725
+ ROTATION
726
+ Having chosen a shear amplitude of 𝐴 = 0.02, we now impose a
727
+ vertical background magnetic field (as described in § 2). As indi-
728
+ cated in Table 1, where all of the other parameters are specified, we
729
+ still need to choose the values of 𝐹 (which determines the magnetic
730
+ field strength) and the Taylor number (recall that we quote the mid-
731
+ layer value, Ta). The choices for these parameters were guided by
732
+ a preliminary low-resolution parameter survey, the details of which
733
+ can be found in Appendix A.
734
+ As well as using a somewhat weaker shear flow than Silvers
735
+ et al. (2009b), we also impose a weaker initial field, defined by
736
+ 𝐹 = 2.5 × 10−6 (compared to 𝐹 ⩾ 1.25 × 10−5 in Silvers et al.
737
+ 2009b). This might seem to be a somewhat counter-intuitive deci-
738
+ sion, as this will increase the time taken for the formation of the
739
+ horizontal magnetic layer, necessitating longer numerical calcula-
740
+ tions. However, this also delays the point at which the Lorentz force
741
+ feedback starts to perturb the mean flow (the details of which will
742
+ be described below). Across the parameters surveyed, this reduced
743
+ value of 𝐹 has a beneficial impact upon the magnetic buoyancy
744
+ instability, because it allows steeper magnetic field gradients to de-
745
+ velop. In what follows, we will present results for three different
746
+ values of the Taylor number, corresponding to a non-rotating case
747
+ (Ta = 0) and two rotating cases, Ta = 108 and Ta = 5 × 108.
748
+ 4.1
749
+ Non-rotating case
750
+ Before considering the effects of rotation, we first give a detailed
751
+ overview of the evolution in the non-rotating case, the key fea-
752
+ tures of which are illustrated in Fig. 4. In the early stages of the
753
+ simulation, for 𝑡 ≲ 100, the magnetic field is too weak to play a
754
+ significant dynamical role. During this stage there are only small-
755
+ amplitude departures from the forced shear flow, which we attribute
756
+ to acoustic and internal gravity waves that are excited by the initial
757
+ temperature perturbation. These oscillate with periods ≲ 10 (di-
758
+ mensionless units), and dissipate on the thermal diffusion timescale,
759
+ 𝜏therm = 100. At the same time, the imposed vertical magnetic field
760
+ is continually stretched out by the shear flow, forming a magnetic
761
+ layer around the mid-plane whose strength grows linearly in time.
762
+ This stretching process is analogous to the 𝜔-effect at the base of
763
+ the solar convection zone.
764
+ In Fig. 4 we also show the state of the system at 𝑡 = 200. By
765
+ this time, the magnetic pressure from the mean toroidal field, ⟨𝐵𝑥⟩,
766
+ has become strong enough to noticeably change the overall mass
767
+ distribution, moving fluid out of the shear region and into the layers
768
+ above, as evident from the plots of Δ⟨𝜌⟩ = ⟨𝜌⟩ − 𝜌init(𝑧), where
769
+ 𝜌init is the initial density profile. This upward redistribution of mass
770
+ provides the energy source for the magnetic buoyancy instability. At
771
+ the onset of magnetic buoyancy, we see tube-like structures in the
772
+ isovolumes that are aligned with the shear direction, evident in both
773
+ the magnetic field and the flow. We illustrate these in Fig. 4 through
774
+ the vertical flow component and the toroidal field perturbation. It
775
+ is clear that 𝐵′𝑥, which is defined as 𝐵′𝑥 = 𝐵𝑥 − ⟨𝐵𝑥⟩, and 𝑢𝑧 have
776
+ structures that are localised around the upper regions of the induced
777
+ magnetic layer, where the magnetic field gradient is conducive to
778
+ magnetic buoyancy. As expected, we see that the magnetic buoyancy
779
+ instability is characterised by a long length-scale parallel to the
780
+ MNRAS 000, 1–15 (2022)
781
+
782
+ 1
783
+ 2
784
+ d
785
+ S
786
+ 0.008
787
+ 0.5
788
+ A
789
+ 0
790
+ (cm)
791
+ 0.004
792
+ -0.5
793
+ -1
794
+ 0
795
+ I-A
796
+ 0
797
+ 0.5
798
+ 1
799
+ 0
800
+ 500
801
+ t
802
+ 0.05
803
+ 0.007
804
+ V/ <hn)
805
+ 1<rn)I
806
+ 0
807
+ -0.05
808
+ 0
809
+ 0
810
+ 0.5
811
+ 1
812
+ 0
813
+ 500
814
+ t
815
+ Ta = 0
816
+ -Ta = 108Shear-driven magnetic buoyancy
817
+ 7
818
+ Figure 4. The evolution of the magnetic buoyancy instability for the non-rotating case. Top section (a): Vertical profiles of the horizontally averaged density
819
+ perturbation (left), defined as Δ⟨𝜌⟩ = ⟨𝜌⟩ − 𝜌init(𝑧) (where 𝜌init(𝑧) is the initial, dimensionless density distribution of the polytropic layer), and vertical
820
+ profile of the horizontally-averaged toroidal field
821
+
822
+ 𝐹 ⟨𝐵𝑥 ⟩ (right). These are shown for three times in the evolution denoted by the legend. The bottom section
823
+ consists of 3D renderings at three times (see text labels) of pseudocoloured isovolumes (with associated legends to the left). The backdrop for these isovolumes
824
+ shows 2D slices (with associated legend to the top) of the toroidal field 𝐵𝑥 at the associated times. Middle row (b): the vertical component of velocity 𝑢𝑧 with
825
+ isovolumes defined by the regions |𝑢𝑧 | ⩾ 10−4. Bottom row (c): the toroidal field perturbation defined as
826
+
827
+ 𝐹 𝐵′𝑥 =
828
+
829
+ 𝐹 (𝐵𝑥 − ⟨𝐵𝑥 ⟩) in isovolumes defined
830
+ by the regions
831
+
832
+ 𝐹 |𝐵′𝑥 | ⩾ 1.5 × 10−3.
833
+ field and a short length-scale perpendicular to it. In this case, this
834
+ effect is perhaps exaggerated by the presence of the imposed shear,
835
+ which will tend to promote “near-interchange” modes over those
836
+ with a more undular profile (Tobias & Hughes 2004). These non-
837
+ rotating results are qualitatively consistent with those of Silvers et al.
838
+ (2009b), albeit for a slightly different parameter regime.
839
+ As the simulation evolves, the buoyancy-driven motions be-
840
+ come more pronounced and the non-trivial field/flow structures
841
+ migrate towards the upper boundary of the computational domain.
842
+ This is clearly apparent at 𝑡 = 500 in Fig. 4. It is worth noting that
843
+ there is no appreciable arching of the magnetic field structures as
844
+ the instability evolves. Eventually, the upper boundary condition
845
+ starts to play a significant role in the dynamics of the system. As
846
+ we discuss in more detail below, the system also starts to exhibit
847
+ MNRAS 000, 1–15 (2022)
848
+
849
+ ×10-4
850
+ 0.06
851
+ 2
852
+ <d>
853
+ 0.04
854
+ 0.02
855
+ -2
856
+ 0
857
+ 0
858
+ 0.2
859
+ 0.4
860
+ 0.6
861
+ 0.8
862
+ 0.2
863
+ 1
864
+ 0
865
+ 0.4
866
+ 0.6
867
+ 0.8
868
+ a
869
+ 2
870
+ 009~00~001~
871
+ t = 100
872
+ t = 200
873
+ t = 500
874
+ VFBa
875
+ 0.55
876
+ O1X
877
+ 3
878
+ b
879
+ .5 VFB'
880
+ -01 ×
881
+ 9
882
+ y
883
+ 28
884
+ C. D. Duguid et al.
885
+ Figure 5. Magnetic buoyancy and mean magnetic field evolution for Ta = 0, Ta = 108 and Ta = 5 × 108 (top to bottom). Left: volume renderings consisting of
886
+ a pseudocoloured isovolume of
887
+
888
+ 𝐹 𝐵𝑥, defined by the region where |𝐵𝑥 | > 30, where the magnitude is denoted by the colour (see legend). Superimposed on
889
+ this are isosurfaces of the vertical component of velocity 𝑢𝑧 defined at values ±2.5 × 10−4 (dark indicates positive and light indicates negative). Each snapshot
890
+ is taken at 𝑡 ≈ 400 non-dimensional time units. Right: time snapshots of the horizontally averaged vertical profiles of the induced toroidal field
891
+
892
+ 𝐹 𝐵𝑥. Each
893
+ case contains a number of snapshots taken at times denoted by the legend.
894
+ significant (magnetically-driven) deviations away from the initial
895
+ imposed shear flow. Motivated by these considerations, we there-
896
+ fore limit our integration times to 𝑡 ≈ 500 in all simulations. As
897
+ shown in Table 1, the characteristic viscous and Ohmic timescales
898
+ (based on the layer depth) are of the order of 105 time units. Given
899
+ that these timescales are significantly longer than the evolution time
900
+ for these simulations, it is clear that the observed migration of the
901
+ field/flow structures is not a diffusively driven process.
902
+ 4.2
903
+ The effects of rotation
904
+ Having set out the key features of this model in the non-rotating case,
905
+ we now turn our attention to the effects of rotation. Throughout this
906
+ subsection, quantitative comparisons are made between the non-
907
+ rotating case (Ta = 0) and two rotating cases with Ta = 108 and
908
+ Ta = 5 × 108.
909
+ Fig. 5 illustrates some of the effects of rotation upon this sys-
910
+ tem, focusing upon the evolution of the vertical velocity, 𝑢𝑧, and the
911
+ mean toroidal magnetic field, ⟨𝐵𝑥⟩. Regardless of the rotation rate
912
+ of the domain, there are many qualitative similarities between the
913
+ rotating cases and the non-rotating case that is illustrated in Fig. 4.
914
+ In particular the shear is always able to produce a magnetic layer
915
+ that is susceptible to magnetic buoyancy. However, there are some
916
+ significant differences that are attributable to the effects of rotation.
917
+ In particular, as the rotation rate increases, we see that the develop-
918
+ ment of the magnetic buoyancy instability is delayed. The left-hand
919
+ panel of Fig. 5 shows the vertical velocity distribution at 𝑡 ≈ 400
920
+ for the three cases; whilst each exhibits clear indications of mag-
921
+ netic buoyancy, the associated flow structures (at this fixed instant
922
+ MNRAS 000, 1–15 (2022)
923
+
924
+ 0.08
925
+ non-rotating
926
+ 0.053
927
+ 0.06
928
+ 0.052
929
+ 0.04
930
+ B
931
+ 0.02
932
+ 0.050
933
+ 0
934
+ 0.049
935
+ 0
936
+ 0.2
937
+ 0.4
938
+ 0.6
939
+ 0.8
940
+ 1
941
+ 2
942
+ 0.047
943
+ 0.08
944
+ 0.056
945
+ :01
946
+ 0.06
947
+ B
948
+ 0.054
949
+ 0.04
950
+
951
+ B
952
+ 0.02
953
+ 0.052
954
+ a
955
+ 0
956
+ 0.050
957
+ 0
958
+ 0.2
959
+ 0.4
960
+ 0.6
961
+ 0.8
962
+ 1
963
+ 2
964
+ 0.047
965
+ 0.08
966
+ 0.067
967
+ 0.06
968
+ B
969
+ 0.062
970
+ X
971
+ 0.04
972
+ B
973
+ 5
974
+ 0.02
975
+ 0.057
976
+ 11
977
+ 0
978
+ 0.052
979
+ 0
980
+ 0.2
981
+ 0.4
982
+ 0.6
983
+ 0.8
984
+ 1
985
+ a
986
+ 0.047
987
+ y
988
+ t ~ 56
989
+ t ~ 119 t ~ 183 t ~ 246
990
+ t ~ 310 t ~ 373 -
991
+ t ~ 437
992
+ -t ~ 500Shear-driven magnetic buoyancy
993
+ 9
994
+ Figure 6. Vertical profiles of the correlation, Corr𝑥 (𝑧), between 𝑢𝑧 and
995
+ 𝐵𝑥, as defined by Eq. (11) for Ta = 0, Ta = 108 and Ta = 5 × 108 (top
996
+ to bottom), where each plot contains a number of snapshots taken at times
997
+ denoted by the legend.
998
+ in time) become progressively less well-developed as the rotation
999
+ rate increases. One of the other notable features illustrated by this
1000
+ plot is that stronger toroidal fields are generated at the mid-plane
1001
+ in the more rapidly-rotating cases. This is another indication of the
1002
+ delayed onset of the magnetic buoyancy instability, which would
1003
+ otherwise tend to disrupt this layer. In cases where the magnetic
1004
+ buoyancy instability is more vigorous, we see a significant redis-
1005
+ tribution of the mean toroidal field, with a flattening of the peak
1006
+ around the mid-plane.
1007
+ To investigate the rotational-dependence of the onset of the
1008
+ magnetic buoyancy instability in a more quantitative manner, we
1009
+ compute the Pearson correlation between the vertical flows and the
1010
+ induced horizontal magnetic field. Following Silvers et al. (2009b),
1011
+ we define
1012
+ Corr𝑥(𝑧, 𝑡) =
1013
+ ⟨𝑢𝑧𝐵𝑥⟩ − ⟨𝑢𝑧⟩⟨𝐵𝑥⟩
1014
+ max𝑧
1015
+ �√︃
1016
+ ⟨𝑢2𝑧⟩ − ⟨𝑢𝑧⟩2
1017
+ √︃
1018
+ ⟨𝐵2𝑥⟩ − ⟨𝐵𝑥⟩2
1019
+ � ,
1020
+ (11)
1021
+ and then plot this quantity as a function of depth and time in Fig. 6
1022
+ (for the non-rotating and the two rotating cases). We emphasise that
1023
+ this quantity does not have a straightforward physical interpretation
1024
+ (although, as we shall describe later, it is related to one of the terms
1025
+ that generate the 𝑦-component of the mean EMF). Nevertheless,
1026
+ it can be regarded as an indicator of magnetic buoyancy, because
1027
+ Figure 7. Vertical profiles of the horizontally-averaged 𝑢𝑥 component of
1028
+ velocity for Ta = 0, Ta = 108 and Ta = 5 × 108 (top, middle, and bottom
1029
+ respectively), and all other parameters defined in Table 1. Each case has
1030
+ snapshots of the shear profile taken at various times denoted by the legend.
1031
+ The dashed black line highlights the target shear profile.
1032
+ regions of stronger than average horizontal magnetic field are likely
1033
+ to be associated with buoyant upflows. In the presence of magnetic
1034
+ buoyancy, we would therefore expect Corr𝑥 to be negative, and
1035
+ this is borne out by Fig. 6. In all cases shown, after an initial
1036
+ transient phase, we observe significant negative correlations in this
1037
+ quantity above the mid-plane of the domain. The depth at which this
1038
+ correlation is maximal moves towards the surface as 𝑡 increases.
1039
+ However, the rate at which this peak moves is strongly dependent
1040
+ upon the rotation rate. In the non-rotating case, this peak has reached
1041
+ 𝑧 ≈ 0.2 by 𝑡 ≈ 500; at Ta = 5 × 108, this peak is closer to 𝑧 ≈ 0.4
1042
+ at the same time. This is generally consistent with the delayed
1043
+ development of magnetic buoyancy-induced motions in the rotating
1044
+ cases.
1045
+ The effects of rotation are also evident in the evolution of
1046
+ the shear flow. Fig. 7 shows the evolution of ⟨𝑢𝑥⟩ for the three
1047
+ different cases. In all cases, we see a gradual deviation away from
1048
+ the initial shear. This is due to the effects of the Lorentz force
1049
+ associated with the growing mean toroidal magnetic field, which
1050
+ will tend to resist the stretching due to the shear. Initially this Lorentz
1051
+ force feedback simply leads to a weakening and broadening of the
1052
+ shear profile, which is still largely concentrated about the mid-
1053
+ plane. Once magnetic buoyancy develops, the shear profile flattens
1054
+ MNRAS 000, 1–15 (2022)
1055
+
1056
+ 1
1057
+ 0
1058
+ -1
1059
+ 0
1060
+ 0.2
1061
+ 0.4
1062
+ 0.6
1063
+ 0.8
1064
+ 1
1065
+ 2
1066
+ 1
1067
+ 8
1068
+ 0
1069
+ 0
1070
+ 11
1071
+ a
1072
+ -1
1073
+ 0
1074
+ 0.2
1075
+ 0.4
1076
+ 0.6
1077
+ 0.8
1078
+ 1
1079
+ 2
1080
+ 1
1081
+ X
1082
+ 0
1083
+ 5
1084
+ -1
1085
+ 0
1086
+ 0.2
1087
+ 0.4
1088
+ 0.6
1089
+ 0.8
1090
+ 1
1091
+ a
1092
+ 2
1093
+ L
1094
+ t ~ 56
1095
+ t ~ 119 t ~ 183 t ~ 246
1096
+ t. ~ 310
1097
+ +?.373
1098
+ ?.437
1099
+ t ~ 5000.02
1100
+ αm
1101
+ 0
1102
+ -0.02
1103
+ 0
1104
+ 0.2
1105
+ 0.4
1106
+ 0.6
1107
+ 0.8
1108
+ 1
1109
+ 0.02
1110
+ 8
1111
+ 0
1112
+ 2
1113
+ 0
1114
+ a
1115
+ -0.02
1116
+ 0
1117
+ 0.2
1118
+ 0.4
1119
+ 0.6
1120
+ 0.8
1121
+ 1
1122
+ 801
1123
+ 0.02
1124
+ X
1125
+ 0
1126
+ 5
1127
+ -0.02
1128
+ 0
1129
+ 0.2
1130
+ 0.4
1131
+ 0.6
1132
+ 0.8
1133
+ 1
1134
+ a
1135
+ 2
1136
+ t ~ 56
1137
+ t ~ 119
1138
+ t ~ 183
1139
+ -t ~ 246
1140
+ t ~ 437
1141
+ -t ~ 50010
1142
+ C. D. Duguid et al.
1143
+ about the mid-plane and the resultant momentum redistribution
1144
+ leads to a significant perturbation to the flow structure, particularly
1145
+ at the upper boundary (where the density is relatively low). Longer
1146
+ integrations lead to further departures from the initial shear profile.
1147
+ As the rotation rate increases, the deviation of the flow profile away
1148
+ from the initial state becomes more gradual. Indeed, in the most
1149
+ rapidly rotating case the shear flow still remains localised around
1150
+ the mid-plane even at 𝑡 ≈ 500.
1151
+ Another important feature of the rotating cases is the emer-
1152
+ gence of mean flows in the 𝑦-direction (which are not a feature of
1153
+ the non-rotating case). This is illustrated in the left-hand panels of
1154
+ Fig. 8, which plot the time and depth dependence of ⟨𝑢𝑦⟩ for the
1155
+ three cases under consideration. In the rotating cases, such flows
1156
+ arise because the Lorentz force from the growing magnetic field
1157
+ disturbs the balance between the imposed forcing, F𝑠, and the Cori-
1158
+ olis and viscous forces. Because the density is lower in the upper
1159
+ part of the domain, the strongest mean flows in the 𝑦-direction tend
1160
+ to occur in this region, where (towards the end of the calculation)
1161
+ they reach values that are of a similar order of magnitude to the
1162
+ peak mean flow in the 𝑥-direction. We recall that our boundary
1163
+ conditions impose zero tangential stresses on the upper and lower
1164
+ boundaries, and so there is no flux of horizontal momentum through
1165
+ these boundaries. Therefore, the mean flows arise from an internal
1166
+ redistribution of momentum within the domain, and the total mo-
1167
+ mentum is conserved.
1168
+ The right-hand panels of Fig. 8 show the time and depth depen-
1169
+ dence of ⟨𝐵𝑦⟩. As expected, this quantity is practically zero in the
1170
+ non-rotating case. However, both rotating cases show the appear-
1171
+ ance of a systematic ⟨𝐵𝑦⟩, which is an inevitable consequence of
1172
+ the behaviour of ⟨𝑢𝑦⟩ that was discussed in the previous paragraph:
1173
+ the strong gradient in this quantity at the mid-plane stretches the
1174
+ vertical magnetic field into the 𝑦-direction. The peak value of ⟨𝐵𝑦⟩
1175
+ remains less than half of the peak value of ⟨𝐵𝑥⟩, so the mean mag-
1176
+ netic field is still predominantly in the 𝑥-direction. Nonetheless, the
1177
+ rotation of the mean magnetic field away from the 𝑥-axis affects the
1178
+ structure of the magnetic buoyancy instability. This is illustrated by
1179
+ Fig. 9, which shows snapshots of the vertical flow, at the mid-plane
1180
+ of the domain; the tilting of these structures due to the effects of
1181
+ rotation is clearly apparent.
1182
+ 5
1183
+ THE MEAN EMF
1184
+ We now turn our attention to the most important result of this
1185
+ work, which is the analysis of the mean electromotive force (mean
1186
+ EMF) that is produced by the magnetic buoyancy instability in the
1187
+ presence of rotation. According to the ideas originally put forward
1188
+ by Parker (1955b), if the instability can produce a mean EMF with
1189
+ a significant component that is parallel to the mean magnetic field,
1190
+ then this system might be able to drive an 𝛼𝜔-type dynamo. Before
1191
+ discussing the results from these simulations, we first review some
1192
+ of the key theoretical ideas.
1193
+ 5.1
1194
+ Theoretical background
1195
+ Following the standard procedures of mean-field theory, we can de-
1196
+ compose the magnetic field and the velocity field into their mean and
1197
+ fluctuating parts. To be specific, we can write B = ⟨B⟩ + B′, where
1198
+ (as before) ⟨B⟩ corresponds to the horizontally-averaged magnetic
1199
+ field, which is then a function of 𝑧 and 𝑡 only, whilst B′ represents
1200
+ the fluctuating component. By construction, ⟨B′⟩ = 0. Similarly, we
1201
+ can express the velocity field in the form, u = ⟨u⟩ + u′. Applying
1202
+ the averaging operator to the induction equation (Eq. 2c), we see
1203
+ that
1204
+ 𝜕⟨B⟩
1205
+ 𝜕𝑡
1206
+ = ∇ ×
1207
+
1208
+ ⟨u⟩ × ⟨B⟩ + E
1209
+
1210
+ + 𝜁0𝜅 𝜕2
1211
+ 𝜕𝑧2 ⟨B⟩ ,
1212
+ (12)
1213
+ where we have defined the mean EMF
1214
+ E = ⟨u′ × B′⟩ .
1215
+ (13)
1216
+ The ∇ × E term in Eq. (12) is the key ingredient of any mean-field
1217
+ dynamo model; under certain conditions it acts as a source term
1218
+ for the mean magnetic field. Due to the fact that E is a function of
1219
+ 𝑧 and 𝑡 only, it is only the 𝑥 and 𝑦 components of the mean EMF
1220
+ that contribute to the evolution of the mean magnetic field. In what
1221
+ follows, we therefore restrict our analysis to these two components.
1222
+ In order to understand the potential influence of this mean
1223
+ EMF upon the dynamo, it is useful to review some of the key
1224
+ ideas from mean-field dynamo theory (see, e.g., Moffatt 1978, for
1225
+ more details). For the moment, we make the simplifying assumption
1226
+ that there is an imposed (but potentially time-dependent) flow that
1227
+ evolves independently of the magnetic field, in order to consider
1228
+ the induction equation in isolation. It should be stressed that this
1229
+ assumption is not applicable for magnetic buoyancy, with the subse-
1230
+ quent flow inextricably linked to the magnetic field; nevertheless, it
1231
+ is an assumption that allows insights to be gained into the properties
1232
+ of the mean EMF that might be conducive to dynamo action. We
1233
+ shall also assume that the mean quantities vary on a much longer
1234
+ length-scale than the fluctuations.
1235
+ Unless the imposed flow has the ability to generate a small
1236
+ scale dynamo (allowing the fluctuating magnetic field to grow in
1237
+ the absence of a mean field), there should be a linear relationship
1238
+ between the mean EMF and the mean magnetic field (and its deriva-
1239
+ tives). If the underlying flow were to be homogeneous and isotropic,
1240
+ then we could posit an expansion of the form
1241
+ E = 𝛼⟨B⟩ − 𝛽∇ × ⟨B⟩ + . . . ,
1242
+ (14)
1243
+ where 𝛼 and 𝛽 are scalars (under more general conditions these
1244
+ would be tensorial quantities). Under these simplifying assump-
1245
+ tions, the 𝛼⟨B⟩ term corresponds to the 𝛼-effect and is non-zero
1246
+ only if the flow lacks reflectional symmetry (which is typically
1247
+ the case in the presence of rotation). In fact, under the first-order
1248
+ smoothing approximation, it is possible to derive an expression for
1249
+ 𝛼 that is directly proportional to the kinetic helicity of the flow1.
1250
+ We stress again that some of the simplifications made here are not
1251
+ really applicable in the context of magnetic buoyancy, and any in-
1252
+ terpretation of the mean EMF in terms of 𝛼 and 𝛽 should be treated
1253
+ with a degree of caution (Hughes 2018; Davies & Hughes 2011).
1254
+ In the following discussion, we shall therefore focus upon the prop-
1255
+ erties of the mean EMF itself. Nevertheless, these insights from
1256
+ mean-field theory suggest that the component of the mean EMF in
1257
+ the direction of the mean magnetic field has a significant bearing
1258
+ upon the potential for the system to act as a dynamo. Based upon
1259
+ these insights, we would also expect to see a strong dependence of
1260
+ this part of the mean EMF upon the rotation rate.
1261
+ Before moving on to analyse the mean EMF in these simu-
1262
+ lations, it is useful to relate this to previous work. Two studies of
1263
+ particular relevance are those of Davies & Hughes (2011) and Chat-
1264
+ terjee et al. (2011). In their linear analysis, Davies & Hughes (2011)
1265
+ 1 We have not found an obvious relationship between the kinetic helicity
1266
+ of the turbulence and the mean EMF in our simulations and hence have not
1267
+ presented these results for brevity.
1268
+ MNRAS 000, 1–15 (2022)
1269
+
1270
+ Shear-driven magnetic buoyancy
1271
+ 11
1272
+ Figure 8. Time snapshots of the horizontally-averaged vertical profiles of the 𝑢𝑦 component of velocity (left) and the 𝐵𝑦 component of the magnetic field
1273
+ (right) for Ta = 0, Ta = 108 and Ta = 5 × 108 (top to bottom). Each case contains a number of snapshots taken at times denoted by the legend.
1274
+ considered the mean EMF produced by magnetic buoyancy in an
1275
+ imposed, rotating, horizontal magnetic layer. Most of their analysis
1276
+ focused upon the case of an inclined rotation vector, but there are
1277
+ some general conclusions that are applicable to the vertical rotation
1278
+ case that is considered in the present paper. Chatterjee et al. (2011)
1279
+ carried out numerical simulations that are somewhat related to those
1280
+ of the present paper, although they considered the evolution of an
1281
+ imposed magnetic layer rather than a shear-generated one, carrying
1282
+ out an extended analysis of the latitudinal dependence of the system
1283
+ (largely at a fixed rotation rate).
1284
+ Considering a unidirectional horizontal field, aligned with the
1285
+ 𝑥 direction, Davies & Hughes (2011) found that the magnitude of
1286
+ the component of the mean EMF in the direction of the mean field
1287
+ (E𝑥) does indeed increase with increasing rotation rate. Even in the
1288
+ absence of rotation, they also found a substantial component of the
1289
+ EMF in the horizontal direction that is perpendicular to the imposed
1290
+ magnetic field (i.e. E𝑦), the amplitude of which decreased slightly
1291
+ as the rotation rate increased. For the cases considered by Davies
1292
+ & Hughes (2011), they typically found that |E𝑦| ≫ |E𝑥|. Allowing
1293
+ for differences in the coordinate geometry of the two systems, the
1294
+ simulations of Chatterjee et al. (2011) exhibited similar behaviour,
1295
+ with the magnitude of the horizontal component of the mean EMF
1296
+ that is perpendicular to the imposed magnetic field exceeding that of
1297
+ the field-parallel component. In both cases, this result can be traced
1298
+ back to the fact that the instability tends to be characterised by
1299
+ magnetohydrodynamical perturbations with small 𝑦-components.
1300
+ These imposed magnetic field studies provide us with some
1301
+ clear points of comparison, and we might expect to see some similar
1302
+ behaviour (in terms of the properties of the mean EMF) in the shear-
1303
+ generated case. However, given the greater complexity of our model,
1304
+ we should not be surprised if there are also some notable differences.
1305
+ 5.2
1306
+ Numerical results
1307
+ Fig. 10 shows the depth- and time-dependence of the mean EMFs for
1308
+ the three cases considered. We focus initially upon the E𝑥 compo-
1309
+ nent. In the cases with Ta = 0 and Ta = 108, E𝑥 takes both positive
1310
+ and negative values of similar magnitude, with rapid variations in 𝑧
1311
+ and 𝑡, and displays no systematic trend. In the most rapidly-rotating
1312
+ case (Ta = 5 × 108), by contrast, E𝑥 is positive for almost all val-
1313
+ ues of 𝑧 and 𝑡, with an amplitude that grows superlinearly in time.
1314
+ Moreover, the location of the peak value of E𝑥 migrates upward in
1315
+ time, roughly mirroring the migration of the buoyancy instability,
1316
+ as illustrated in Fig. 6. By 𝑡 ≈ 500, the peak value of E𝑥 is an order
1317
+ of magnitude larger than the the peak value of |E𝑥| in either of the
1318
+ other two cases. Whilst this is clearly a more complicated model,
1319
+ this is qualitatively consistent with the results of Davies & Hughes
1320
+ (2011), who (as noted above) also found that this component of the
1321
+ mean EMF tended to increase with increasing rotation rate.
1322
+ MNRAS 000, 1–15 (2022)
1323
+
1324
+ 0.01
1325
+ 0.04
1326
+ X10-6
1327
+ X10-6
1328
+ non-rotatin
1329
+ 10
1330
+ 505
1331
+ B
1332
+ 0
1333
+ 0.02
1334
+ 0
1335
+ -10
1336
+ -20
1337
+ 0
1338
+ 0
1339
+ 0.5
1340
+ 0.5
1341
+ 0
1342
+ -0.01
1343
+ -0.02
1344
+ 0
1345
+ 0.2
1346
+ 0.4
1347
+ 0.6
1348
+ 0.8
1349
+ 1
1350
+ 0.2
1351
+ 0
1352
+ 0.4
1353
+ 0.6
1354
+ 0.8
1355
+ 1
1356
+ 2
1357
+ 0.01
1358
+ 0.04
1359
+ B
1360
+ 0.02
1361
+ 0
1362
+ 0
1363
+ -0.01
1364
+ a
1365
+ -0.02
1366
+ 0
1367
+ 0.2
1368
+ 0.6
1369
+ 0.4
1370
+ 0.8
1371
+ 0.2
1372
+ 0.4
1373
+ 0.6
1374
+ 0.8
1375
+ 0
1376
+ 2
1377
+ 2
1378
+ 801
1379
+ 0.01
1380
+ 0.04
1381
+ 9
1382
+ B
1383
+ 0.02
1384
+ 0
1385
+ X
1386
+ 5
1387
+ 0
1388
+ -0.01
1389
+
1390
+ -0.02
1391
+ 0
1392
+ 0.2
1393
+ 0.4
1394
+ 0.6
1395
+ 0.8
1396
+ 1
1397
+ 0.2
1398
+ 0
1399
+ 0.4
1400
+ 0.6
1401
+ 0.8
1402
+ 1
1403
+ a
1404
+ 2
1405
+ 7
1406
+ t ~ 56
1407
+ t ~ 119
1408
+ t ~ 183
1409
+ t ~ 246
1410
+ t ~ 310
1411
+ t ~ 373
1412
+ t ~ 437
1413
+ t ~ 50012
1414
+ C. D. Duguid et al.
1415
+ Figure 9. Plots of the 𝑢𝑧 component of velocity, with magnitude denoted by
1416
+ the colour bar, for Ta = 0, Ta = 108 and Ta = 5 × 108 (top to bottom). Each
1417
+ plot is taken at the mid-plane, 𝑧 = 0.5, from a snapshot at 𝑡 ≈ 400 where
1418
+ the tilting effects, or lack thereof, of rotation can be most clearly seen.
1419
+ Turning our attention to E𝑦, we find (after an initial transient
1420
+ phase) that in each case there is a significant component of the
1421
+ mean EMF in the negative 𝑦 direction, whose magnitude is roughly
1422
+ an order of magnitude larger than that of E𝑥 (this is qualitatively
1423
+ consistent with the results of Davies & Hughes 2011 and Chatterjee
1424
+ et al. 2011). Interestingly, the Ta = 108 case has slightly smaller
1425
+ values of E𝑦 than the non-rotating case. However, in the more
1426
+ rapidly-rotating case (with Ta = 5×108), E𝑦 is initially smaller, but
1427
+ eventually grows to be significantly larger, roughly in proportion
1428
+ with E𝑥. This non-monotonic dependence of the E𝑦 on Ta probably
1429
+ reflects the fact that the geometry of the mean magnetic field changes
1430
+ with rotation rate. In the rotating cases, the mean magnetic field has
1431
+ significant components in both the 𝑥 and 𝑦 directions, and so the
1432
+ distinction between E𝑥 and E𝑦 (in terms of their orientation with
1433
+ respect to the mean field) also becomes less meaningful.
1434
+ In Fig. 11 we carry out a more detailed analysis of the com-
1435
+ ponents of the mean EMF at 𝑡 ≈ 500, for each of the three cases.
1436
+ To be specific, we have considered separately the contributions of
1437
+ ⟨𝑢′𝑦𝐵′𝑧⟩ and −⟨𝑢′𝑧𝐵′𝑦⟩ to E𝑥 (and have carried out a similar de-
1438
+ composition for E𝑦). In the Ta = 0 case, there is little systematic
1439
+ behaviour evident in these plots; all quantities are of low ampli-
1440
+ tude, leading to a negligible overall E𝑥. For Ta = 108, both ⟨𝑢′𝑦𝐵′𝑧⟩
1441
+ and −⟨𝑢′𝑧𝐵′𝑦⟩ seem to have a well-defined depth dependence, with
1442
+ (approximately) equal and opposite magnitudes, leading to signifi-
1443
+ cant levels of cancellation when these quantities are added together.
1444
+ Whilst there is no significant net E𝑥 in this case, the coherent depth
1445
+ dependence of these quantities does indicate that rotation is already
1446
+ playing an important dynamical role. In the most rapidly rotating
1447
+ case, although the two contributing quantities still have opposite
1448
+ signs, they have very different magnitudes; a stronger contribution
1449
+ from −⟨𝑢′𝑧𝐵′𝑦⟩ leads to a net E𝑥 in this case. Given the nature of the
1450
+ magnetic buoyancy instability, it is perhaps unsurprising that the
1451
+ contribution from 𝑢′𝑧 should be playing a dominant role. Both the
1452
+ Ta = 0 and Ta = 108 cases have a well-defined E𝑦 in which ⟨𝑢′𝑧𝐵′𝑥⟩
1453
+ and −⟨𝑢′𝑥𝐵′𝑧⟩ both play an important role. (This means that the
1454
+ correlation defined in Eq. (11) is generally not a reliable proxy for
1455
+ E𝑦.) In the most rapidly rotating case, the ⟨𝑢′𝑧𝐵′𝑥⟩ term is dominant,
1456
+ leading to an increase in the magnitude of E𝑦.
1457
+ An obvious question to ask at this stage is whether or not
1458
+ these mean EMFs are large enough to have a significant regener-
1459
+ ative effect on the magnetic field. Some insight can be gained by
1460
+ considering the relative magnitude of the mean EMF relative to the
1461
+ mean magnetic field, focusing particularly upon the 𝑥-component
1462
+ of this quantity (for the reasons presented above). However, this
1463
+ process is complicated by the fact that the relevant quantities are
1464
+ all depth-dependent. To produce an indicative value of this nor-
1465
+ malised magnitude, we therefore define 𝑧𝑚(𝑡) to be the value of
1466
+ 𝑧 at which |E𝑥| takes its maximum value at that particular time.
1467
+ We then consider the quantity E𝑥(𝑧𝑚(𝑡), 𝑡)/⟨𝐵𝑥⟩(𝑧𝑚(𝑡), 𝑡). Whilst
1468
+ the definition of this normalised quantity is certainly motivated by
1469
+ the definition of 𝛼 in Eq. (14), we stress again that the validity of
1470
+ this expansion is questionable in this context, which explains why
1471
+ we choose to work with the mean EMF rather than describing this
1472
+ system in terms of 𝛼.
1473
+ In Fig. 12, we plot |E𝑥(𝑧𝑚(𝑡), 𝑡)|/⟨𝐵𝑥⟩(𝑧𝑚(𝑡), 𝑡), as a function
1474
+ of time, for the three cases (Ta = 0, Ta = 108 and Ta = 5 × 108).
1475
+ After initial transients have subsided, this normalised magnitude
1476
+ is comparable for each of the three cases, until the curves start to
1477
+ diverge at 𝑡 ≈ 200. For both Ta = 0 and Ta = 108, there is no
1478
+ significant increase in this quantity after this point. In the more
1479
+ rapidly-rotating case, the normalised magnitude of the mean EMF
1480
+ increases rapidly, reaching a value of approximately 2 × 10−6 at the
1481
+ end of the integration time. In dimensional terms, this normalised
1482
+ magnitude has the units of velocity, so it is natural to compare this
1483
+ quantity with the fluctuating component of the velocity field. As is
1484
+ evident from Fig. 9, this peak value for the normalised mean EMF
1485
+ is approximately one order of magnitude smaller than the typical
1486
+ vertical velocity at the mid-plane of the domain. This is, therefore,
1487
+ still relatively small, but it should be noted that this quantity is still
1488
+ growing at the end of the simulation.
1489
+ In a classical 𝛼𝜔-dynamo model, it is perfectly possible for
1490
+ a dynamo to operate with a weak 𝛼-effect provided that the shear
1491
+ is sufficiently strong. A full dynamo calculation would be needed
1492
+ in order to assess whether or not this EMF (in tandem with the
1493
+ shear) is capable of sustaining a Parker-like dynamo. Moreover,
1494
+ such a calculation would require a much larger domain in the lat-
1495
+ itudinal direction than the model presented here, in order to allow
1496
+ for sufficient separation between the small-scale instability and the
1497
+ large-scale magnetic field.
1498
+ 6
1499
+ DISCUSSION AND CONCLUSIONS
1500
+ Motivated by the original 𝛼𝜔-dynamo model that was first proposed
1501
+ by Parker (1955b), the aim of this paper was to assess whether the
1502
+ interaction between magnetic buoyancy and rotation, in a shear-
1503
+ generated magnetic layer, can produce a regenerative effect for the
1504
+ mean magnetic field analogous to that of a convectively-driven 𝛼-
1505
+ effect. Our numerical model builds on that of Vasil & Brummell
1506
+ MNRAS 000, 1–15 (2022)
1507
+
1508
+ 8.8
1509
+ - 4.4
1510
+ 0
1511
+ 4.4
1512
+ 8.8
1513
+ Wz
1514
+ X 10-5
1515
+ -1.3
1516
+ - 0.6
1517
+ 0.6
1518
+ 1.3
1519
+ 0
1520
+ 8
1521
+ X 10-5
1522
+
1523
+ a
1524
+ -2.2
1525
+ 0
1526
+ 1.1
1527
+ 2.2
1528
+ 1.1
1529
+ X 10-5
1530
+ X
1531
+ 5
1532
+ 9
1533
+ aShear-driven magnetic buoyancy
1534
+ 13
1535
+ Figure 10. Plots of the mean EMF components E𝑥 (left) and E𝑦 (right), as a function of 𝑧, for Ta = 0 (top row), Ta = 108 (middle row) and Ta = 5 × 108
1536
+ (bottom row). The curves shown correspond to the times denoted by the legend. Note that the axis ranges are held fixed as Ta is varied in order to facilitate
1537
+ quantitative comparisons between the three cases. (Insets are provided in two panels to illustrate the details of the low-amplitude variations.)
1538
+ (2008) and Silvers et al. (2009b), who conducted simulations of
1539
+ a fully compressible magnetohydrodynamic fluid under the influ-
1540
+ ence of a tachocline-like vertical shear flow. An imposed vertical
1541
+ magnetic field is stretched by the shear to produce a predominantly
1542
+ horizontal field, which then becomes unstable to magnetic buoy-
1543
+ ancy. The novel aspect of the work presented here is the inclusion
1544
+ of rotation in this system, which breaks the reflection symmetry of
1545
+ the buoyancy-driven flows, potentially enabling this instability to
1546
+ supply the necessary mean electromotive force (EMF) required for
1547
+ a Parker-like dynamo to operate.
1548
+ To assess the influence of rotation, we carried out a detailed
1549
+ quantitative comparison of simulations with different Taylor num-
1550
+ bers. Whilst rapid rotation does delay the development of the mag-
1551
+ netic buoyancy instability, the imposed shear still leads to the forma-
1552
+ tion of a magnetic layer that eventually becomes buoyantly unstable
1553
+ as the simulation progresses. If the rotation rate is high enough, the
1554
+ instability-induced perturbations (to the flow and magnetic fields)
1555
+ give rise to a systematic mean EMF, with a significant component,
1556
+ E𝑥, in the direction of the mean magnetic field (see Fig. 10). In
1557
+ agreement with previous analytical work (e.g. Davies & Hughes
1558
+ 2011) we find that the magnitude of E𝑥 increases with increasing
1559
+ rotation rate. Like previous studies, we also find a significant E𝑦
1560
+ component of the mean EMF in all cases (regardless of the extent
1561
+ to which the layer is rotating).
1562
+ Following the ideas originally set out by Parker (1955b), a
1563
+ systematic E𝑥 (in combination with the imposed velocity shear)
1564
+ is likely to be conducive to dynamo action of 𝛼𝜔-type. However,
1565
+ the efficacy of any possible dynamo process will certainly depend
1566
+ on the magnitude of E𝑥, which would typically be expressed in
1567
+ terms of an 𝛼 coefficient in a standard mean-field dynamo model.
1568
+ As noted above, E𝑥 is certainly small (in a normalised sense) in
1569
+ all of these simulations, although it should be emphasised that it is
1570
+ growing throughout the final stages of the simulation in the most
1571
+ rapidly-rotating case (see Fig. 12). It is therefore plausible that this
1572
+ regenerative term will eventually become large enough to influence
1573
+ significantly the evolution of the mean magnetic field (see Eq. 12).
1574
+ Of course, some caution is needed when extrapolating results from
1575
+ any numerical simulations to conditions in the solar interior. Fur-
1576
+ thermore, full dynamo calculations (without a uniform imposed
1577
+ magnetic field) are needed in order to confirm the viability of this
1578
+ dynamo mechanism. Nevertheless, our initial results support the
1579
+ hypothesis that the magnetic buoyancy in the solar tachocline could
1580
+ be playing a crucial regenerative role in the solar dynamo.
1581
+ An obvious limitation of our current simulations is that the
1582
+ mean flow eventually diverges from the tachocline-like shear pro-
1583
+ MNRAS 000, 1–15 (2022)
1584
+
1585
+ non-rotating
1586
+ ×10-5
1587
+ ×10-5
1588
+ 6
1589
+ X10-6
1590
+ 0
1591
+ 4
1592
+ 2
1593
+ 10
1594
+ 2
1595
+ 0
1596
+ 0.5
1597
+ -20
1598
+ 0
1599
+ 0
1600
+ 0.2
1601
+ 0.4
1602
+ 0.6
1603
+ 0.8
1604
+ 1
1605
+ 0
1606
+ 0.2
1607
+ 0.4
1608
+ 0.6
1609
+ 0.8
1610
+ 1
1611
+ 2
1612
+ 2
1613
+ ×10-5
1614
+ ×10-6
1615
+ 8
1616
+ 2
1617
+ 0
1618
+ 0
1619
+ 4
1620
+ 0
1621
+ 3
1622
+ 10
1623
+
1624
+ 2
1625
+ 2
1626
+ 0
1627
+ 0.5
1628
+ -20
1629
+ a
1630
+ 0
1631
+ 0
1632
+ 0.2
1633
+ 0.4
1634
+ 0.6
1635
+ 0.8
1636
+ 0
1637
+ 0.2
1638
+ 0.4
1639
+ 0.6
1640
+ 0.8
1641
+ 1
1642
+ 1
1643
+ 2
1644
+ ×10-5
1645
+ 6×10-5
1646
+ 0
1647
+ 4
1648
+ X
1649
+ 2
1650
+ 3
1651
+ 5
1652
+ -20
1653
+ 0
1654
+ 0
1655
+ 0.2
1656
+ 0.4
1657
+ 0.6
1658
+ 0.8
1659
+ 1
1660
+ 0
1661
+ 0.2
1662
+ 0.4
1663
+ 0.6
1664
+ 0.8
1665
+ 1
1666
+ a
1667
+ 2
1668
+ ~~.56
1669
+ 110
1670
+ 246
1671
+ 310
1672
+ ~ 50014
1673
+ C. D. Duguid et al.
1674
+ Figure 11. Comparisons between the individual terms, denoted by colour
1675
+ (see legend), that make up the EMF components E𝑥 (left) and E𝑦 (right).
1676
+ The comparisons are made for an individual time snapshot taken at 𝑡 ≈ 500.
1677
+ We make these comparisons for Ta = 0 (top row), Ta = 108 (middle row)
1678
+ and Ta = 5 × 108 (bottom row). For reference we show the total E𝑥 and E𝑦
1679
+ in each case as a dotted line.
1680
+ file that we seek to impose; this is the key determining factor in
1681
+ limiting the run time of these simulations to 𝑡 ≈ 500. While this
1682
+ limited run-time does not detract from the results we have presented,
1683
+ it is worth noting that for a dynamo calculation it would be desirable
1684
+ to run these simulations for a much longer time, ideally a significant
1685
+ fraction of the Ohmic timescale (which for our chosen parameters
1686
+ is 𝜏ohmic ≈ 2 × 105; see Table 1). The deviation from the imposed
1687
+ mean flow is an inevitable consequence of the Lorentz forces that
1688
+ result from the continual stretching of the imposed vertical field.
1689
+ This magnetic feedback perturbs the initial force balance, which
1690
+ smooths and then flattens the initial shear profile. In the rotating
1691
+ cases this also drives mean flows in the 𝑦-direction. Both of these
1692
+ changes to the mean flow are undesirable from the point of view
1693
+ of any dynamo calculation that seeks to mimic conditions in the
1694
+ solar tachocline. One way to resolve this issue would be to employ
1695
+ a shearing box model, in order to remove the back-reaction of the
1696
+ Lorentz force onto the mean flow (e.g. Barker et al. 2012). Alter-
1697
+ natively an adaptive forcing could be incorporated, rather than the
1698
+ fixed forcing F𝑠 used here, although this would inevitably introduce
1699
+ new dynamical effects into an already complex system. In the ab-
1700
+ sence of a complete understanding of the solar differential rotation,
1701
+ Figure 12. Time series of |E𝑥 (𝑧𝑚(𝑡), 𝑡) |/⟨𝐵𝑥 ⟩(𝑧𝑚(𝑡), 𝑡) for the three
1702
+ rotation rates shown in the legend.
1703
+ any model of the tachocline’s shear will necessarily be somewhat
1704
+ artificial. Fortunately, in a full dynamo simulation, without an im-
1705
+ posed vertical field, the winding up of the horizontal field is likely
1706
+ to become a self-limiting process. In that case, it may be possible
1707
+ to maintain a tachocline-like shear flow with the same kind of fixed
1708
+ forcing this is employed here.
1709
+ Another potential issue with our existing model is that the
1710
+ buoyantly rising magnetic field eventually reaches the top of the
1711
+ domain. At this point, the dynamics of the system start to become
1712
+ strongly dependent upon the choice of boundary conditions, which
1713
+ will never accurately replicate the conditions around the base of the
1714
+ solar convection zone (a fact that is true for any local model of the
1715
+ tachocline). A related point to note is that our magnetic boundary
1716
+ conditions allow magnetic fields to escape at the upper boundary,
1717
+ which might limit the efficiency of the dynamo if the field is able to
1718
+ escape faster than it can be regenerated in the tachocline. Whilst we
1719
+ know that magnetic flux can escape from the tachocline, the rate at
1720
+ which this happens in any local model will certainly depend upon
1721
+ the precise boundary conditions adopted. The rise of the horizontal
1722
+ field towards the surface could be countered by magnetic pumping
1723
+ (Moffatt 1978; Moffatt & Dormy 2019), either via a parameterised
1724
+ pumping term in the induction equation (e.g. Barker et al. 2012),
1725
+ or by including a convective layer at the top of the domain (e.g.
1726
+ Tobias et al. 1998, 2001; Brummell et al. 2002b; Silvers et al. 2009a;
1727
+ Weston 2020). We have started to carry out some preliminary studies
1728
+ on the viability of the convective analogue of magnetic pumping on
1729
+ the mean field, following a similar (parameterised) approach to that
1730
+ described by Barker et al. (2012), and plan to report on the results
1731
+ from these simulations in a future paper. If magnetic pumping, or
1732
+ the more technically challenging convective layer, can successfully
1733
+ pin down the toroidal field then it is possible this could increase the
1734
+ efficiency of any dynamo that this system might be able to excite.
1735
+ There are many other possible avenues for future work. All
1736
+ of the discussion in this paper has focused upon the case in which
1737
+ the rotation vector is aligned with gravity, which corresponds to the
1738
+ polar regions of the tachocline. By considering an inclined rotation
1739
+ vector, it is possible to consider the latitudinal dependence of this
1740
+ system. Given that active regions at the solar surface are confined
1741
+ to mid- to low-latitudes, this is a natural next step, not only for the
1742
+ imposed vertical magnetic field calculations that were considered in
1743
+ this paper, but also for the subsequent dynamo calculations. Another
1744
+ possible avenue of research is to explore possible sound-proof ap-
1745
+ proximations to this system. In a parallel study, we are investigating
1746
+ the extent to which various sound-proof approximations adequately
1747
+ describe the linear onset of magnetic buoyancy in an imposed mag-
1748
+ netic layer (Moss et al. 2022). Sound waves do not play a significant
1749
+ MNRAS 000, 1–15 (2022)
1750
+
1751
+ y
1752
+ ×10-6
1753
+ ×10-5
1754
+ 2
1755
+ non-rotatin
1756
+ 5
1757
+ 1
1758
+ -5
1759
+ -2
1760
+ 0
1761
+ 0.5
1762
+ 1
1763
+ 0
1764
+ 0.5
1765
+ 1
1766
+ ×10-6
1767
+ ×10-5
1768
+ C
1769
+ 8
1770
+ 5
1771
+ 0
1772
+ 11
1773
+ a
1774
+ -5
1775
+ T
1776
+ -5
1777
+ 0
1778
+ 0.5
1779
+ 1
1780
+ 0
1781
+ 0.5
1782
+ 1
1783
+ 2
1784
+ 8
1785
+ X10-5
1786
+ ×10-4
1787
+ 0
1788
+ 2
1789
+ 1
1790
+ 5
1791
+ 1
1792
+ X
1793
+ 2
1794
+ 0
1795
+ 5
1796
+ -5
1797
+ -1
1798
+ 11
1799
+ -2
1800
+ a
1801
+ 0
1802
+ 0.5
1803
+ 1
1804
+ 0
1805
+ 0.5
1806
+ 1
1807
+ T
1808
+ 2
1809
+ 2
1810
+ (u,Br)
1811
+ <u,B")
1812
+ (u, B")
1813
+ <uB")X10-6
1814
+ magnitude
1815
+ 1.5
1816
+ normalised
1817
+ 1
1818
+ 0.5
1819
+ 0
1820
+ 0
1821
+ 100
1822
+ 200
1823
+ 300
1824
+ 400
1825
+ 500
1826
+ t
1827
+ Ta = 0
1828
+ Ta = 108
1829
+ Ta = 5 × 108Shear-driven magnetic buoyancy
1830
+ 15
1831
+ role in the dynamics of this system, so sound-proof approximations
1832
+ (which the relax the requirement of having to resolve the acoustic
1833
+ timescale) could allow significantly larger time-steps to be taken,
1834
+ thus increasing the possible simulation time. This could be highly
1835
+ beneficial for any future dynamo simulations.
1836
+ ACKNOWLEDGEMENTS
1837
+ This work was supported by a Research Project Grant from the
1838
+ Leverhulme Trust (RPG-2020-109). This research made use of the
1839
+ Rocket High Performance Computing service at Newcastle Univer-
1840
+ sity.
1841
+ DATA AVAILABILITY
1842
+ The data underlying this article will be shared on reasonable request
1843
+ to the corresponding author.
1844
+ REFERENCES
1845
+ Barker A. J., Silvers L. J., Proctor M. R. E., Weiss N. O., 2012, Monthly
1846
+ Notices of the Royal Astronomical Society, 424, 115
1847
+ Brandenburg A., Schmitt D., 1998, Astronomy and Astrophysics, 338, L55
1848
+ Brummell N., Cline K., Cattaneo F., 2002a, Monthly Notices of the Royal
1849
+ Astronomical Society, 329, L73
1850
+ Brummell N. H., Clune T. L., Toomre J., 2002b, The Astrophysical Journal,
1851
+ 570, 825
1852
+ Bushby P. J., Käpylä P. J., Masada Y., Brandenburg A., Favier B., Guervilly
1853
+ C., Käpylä M. J., 2018, Astronomy & Astrophysics, 612, A97
1854
+ Cattaneo F., Hughes D. W., 1988, Journal of Fluid Mechanics, 196, 323
1855
+ Cattaneo F., Hughes D. W., 2006, Journal of Fluid Mechanics, 553, 401
1856
+ Charbonneau P., 2020, Living Reviews in Solar Physics, 17, 4
1857
+ Chatterjee P., Mitra D., Rheinhardt M., Brandenburg A., 2011, Astronomy
1858
+ & Astrophysics, 534, A46
1859
+ Childress S., Soward A. M., 1972, Physical Review Letters, 29, 837
1860
+ Cline K. S., Brummell N. H., Cattaneo F., 2003a, The Astrophysical Journal,
1861
+ 588, 630
1862
+ Cline K. S., Brummell N. H., Cattaneo F., 2003b, The Astrophysical Journal,
1863
+ 599, 1449
1864
+ Cope L., 2021, PhD thesis, University of Cambridge
1865
+ Davies C. R., Hughes D. W., 2011, The Astrophysical Journal, 727, 112
1866
+ Favier B., Bushby P. J., 2013, Journal of Fluid Mechanics, 723, 529
1867
+ Ferriz-Mas A., Schmitt D., Schuessler M., 1994, Astronomy and Astro-
1868
+ physics, 289, 949
1869
+ Garaud P., Gagnier D., Verhoeven J., 2017, The Astrophysical Journal, 837,
1870
+ 133
1871
+ Gilman P. A., 1970, The Astrophysical Journal, 162, 1019
1872
+ Gilman P. A., 2018, The Astrophysical Journal, 853, 65
1873
+ Howard L. N., 1961, Journal of Fluid Mechanics, 10, 509
1874
+ Hughes D. W., 2007, The solar tachocline. Cambridge University Press
1875
+ Hughes D. W., 2018, Journal of Plasma Physics, 84, 735840407
1876
+ Jensen E., 1955, Annales d’Astrophysique, 18, 127
1877
+ Kersalé E., Hughes D. W., Tobias S. M., 2007, The Astrophysical Journal,
1878
+ 663, L113
1879
+ Käpylä P. J., Korpi M. J., Brandenburg A., 2009, The Astrophysical Journal,
1880
+ 697, 1153
1881
+ Masada Y., Sano T., 2016, The Astrophysical Journal, 822, L22
1882
+ Matthews P. C., Proctor M. R. E., Weiss N. O., 1995a, Journal of Fluid
1883
+ Mechanics, 305, 281
1884
+ Matthews P. C., Hughes D. W., Proctor M. R. E., 1995b, The Astrophysical
1885
+ Journal, 448, 938
1886
+ Miles J. W., 1961, Journal of Fluid Mechanics, 10, 496
1887
+ Mizerski K. A., Davies C. R., Hughes D. W., 2013, The Astrophysical
1888
+ Journal Supplement Series, 205, 16
1889
+ Moffatt H. K., 1978, Magnetic field generation in electrically conducting
1890
+ fluids. Cambridge monographs on mechanics and applied mathematics,
1891
+ Cambridge University Press, Cambridge [Eng.] ; New York
1892
+ Moffatt
1893
+ K.,
1894
+ Dormy
1895
+ E.,
1896
+ 2019,
1897
+ Self-Exciting
1898
+ Fluid
1899
+ Dynamos,
1900
+ 1
1901
+ edn.
1902
+ Cambridge
1903
+ University
1904
+ Press,
1905
+ doi:10.1017/9781107588691,
1906
+ https://www.cambridge.org/core/product/identifier/
1907
+ 9781107588691/type/book
1908
+ Moss J. B., Wood T. S., Bushby P. J., 2022, Physical Review Fluids, 7,
1909
+ 103701
1910
+ Parker E. N., 1955a, The Astrophysical Journal, 121, 491
1911
+ Parker E. N., 1955b, The Astrophysical Journal, 122, 293
1912
+ Parker E. N., 1993, The Astrophysical Journal, 408, 707
1913
+ Schmitt D., 1984, in Guyenne T. D., Hunt J. J., eds, ESA Special Publication
1914
+ Vol. 220, ESA Special Publication. pp 223–224
1915
+ Silvers L. J., Bushby P. J., Proctor M. R. E., 2009a, Monthly Notices of the
1916
+ Royal Astronomical Society, 400, 337
1917
+ Silvers L. J., Vasil G. M., Brummell N. H., Proctor M. R. E., 2009b, The
1918
+ Astrophysical Journal, 702, L14
1919
+ Steenbeck M., Krause F., Rädler K.-H., 1966, Zeitschrift für Naturforschung
1920
+ A, 21, 369
1921
+ Thelen J. C., 2000a, Monthly Notices of the Royal Astronomical Society,
1922
+ 315, 165
1923
+ Thelen J.-C., 2000b, Monthly Notices of the Royal Astronomical Society,
1924
+ 315, 155
1925
+ Thompson M. J., Christensen-Dalsgaard J., Miesch M. S., Toomre J., 2003,
1926
+ Annual Review of Astronomy and Astrophysics, 41, 599
1927
+ Tobias S. M., Hughes D. W., 2004, The Astrophysical Journal, 603, 785
1928
+ Tobias S. M., Brummell N. H., Clune T. L., Toomre J., 1998, The Astro-
1929
+ physical Journal, 502, L177
1930
+ Tobias S. M., Brummell N. H., Clune T. L., Toomre J., 2001, The Astro-
1931
+ physical Journal, 549, 1183
1932
+ Vasil G. M., Brummell N. H., 2008, The Astrophysical Journal, 686, 709
1933
+ Vasil G. M., Brummell N. H., 2009, The Astrophysical Journal, 690, 783
1934
+ Weston D., 2020, PhD thesis, University of Leeds
1935
+ Wissink J. G., Hughes D. W., Matthews P. C., Proctor M. R. E., 2000,
1936
+ Monthly Notices of the Royal Astronomical Society, 318, 501
1937
+ Zahn J.-P., 1974, in Ledoux P., Noels A., Rodgers A. W., eds, , Stellar
1938
+ Instability and Evolution. Springer Netherlands, Dordrecht, pp 185–
1939
+ 195, doi:10.1007/978-94-010-9794-9_34, http://link.springer.
1940
+ com/10.1007/978-94-010-9794-9_34
1941
+ APPENDIX A: FULL LIST OF SIMULATIONS
1942
+ For completeness we show the full list of simulations used in the
1943
+ analysis of this work. Table A1 lists the simulation which were used
1944
+ for the results presented in the main body of the paper, which had
1945
+ resolutions of (𝑁𝑥, 𝑁𝑦, 𝑁𝑧) = (192, 96, 192). These more compu-
1946
+ tationally expensive production runs were guided by an extensive
1947
+ low resolution parameter sweep. In particular, a number of processes
1948
+ change the timescales of the relevant dynamics of the system, such
1949
+ as the reduction of shear amplitude and/or amplitude of 𝐹 acting
1950
+ to slow the rate of toroidal field production and hence increase
1951
+ computational cost. Similarly, it was unclear a priori how rapid the
1952
+ rotation needed to be in order to produce a significant mean EMF in
1953
+ the mean field direction. The full list of low resolution simulations
1954
+ with (𝑁𝑥, 𝑁𝑦, 𝑁𝑧) = (128, 64, 128) can be found in Table A2.
1955
+ This paper has been typeset from a TEX/LATEX file prepared by the author.
1956
+ MNRAS 000, 1–15 (2022)
1957
+
1958
+ 16
1959
+ C. D. Duguid et al.
1960
+ F
1961
+ (×10−6)
1962
+ Taylor
1963
+ (×108)
1964
+ A
1965
+ F
1966
+ (×10−6)
1967
+ Taylor
1968
+ (×108)
1969
+ A
1970
+ 0
1971
+ 1
1972
+ 0.02
1973
+ 2.5
1974
+ 0
1975
+ 0.02
1976
+ 0
1977
+ 5
1978
+ 0.02
1979
+ 2.5
1980
+ 1
1981
+ 0.02
1982
+ 0
1983
+ 0
1984
+ 0.02
1985
+ 2.5
1986
+ 5
1987
+ 0.02
1988
+ 0
1989
+ 0
1990
+ 0.05
1991
+ Table A1. A list of the field strength 𝐹, Taylor number, and shear amplitude
1992
+ 𝐴 for the set of simulations explored in this work. These cases each have
1993
+ numerical resolutions of (𝑁𝑥, 𝑁𝑦, 𝑁𝑧) = (192, 96, 192) and all other
1994
+ parameters are fixed by the values defined in Table 1.
1995
+ F
1996
+ (×10−6)
1997
+ Taylor
1998
+ (×108)
1999
+ A
2000
+ F
2001
+ (×10−6)
2002
+ Taylor
2003
+ (×108)
2004
+ A
2005
+ 0
2006
+ 0
2007
+ 0.02
2008
+ 3.75
2009
+ 0
2010
+ 0.015
2011
+ 0
2012
+ 0
2013
+ 0.015
2014
+ 0.75
2015
+ 0
2016
+ 0.015
2017
+ 0
2018
+ 0
2019
+ 0.05
2020
+ 1.875
2021
+ 0
2022
+ 0.015
2023
+ 0
2024
+ 0
2025
+ 0.01
2026
+ 2.5
2027
+ 0
2028
+ 0.01
2029
+ 0
2030
+ 0.1
2031
+ 0.02
2032
+ 2.5
2033
+ 0.1
2034
+ 0.02
2035
+ 0
2036
+ 0.5
2037
+ 0.02
2038
+ 2.5
2039
+ 0.5
2040
+ 0.02
2041
+ 0
2042
+ 1
2043
+ 0.02
2044
+ 5
2045
+ 1
2046
+ 0.02
2047
+ 0
2048
+ 2
2049
+ 0.02
2050
+ 2.5
2051
+ 1
2052
+ 0.02
2053
+ 0
2054
+ 3
2055
+ 0.02
2056
+ 1
2057
+ 1
2058
+ 0.02
2059
+ 0
2060
+ 4
2061
+ 0.02
2062
+ 2.5
2063
+ 2
2064
+ 0.02
2065
+ 0
2066
+ 5
2067
+ 0.02
2068
+ 2.5
2069
+ 3
2070
+ 0.02
2071
+ 0
2072
+ 10
2073
+ 0.02
2074
+ 2.5
2075
+ 4
2076
+ 0.02
2077
+ 12.5
2078
+ 0
2079
+ 0.05
2080
+ 5
2081
+ 5
2082
+ 0.02
2083
+ 5
2084
+ 0
2085
+ 0.02
2086
+ 2.5
2087
+ 5
2088
+ 0.02
2089
+ 1
2090
+ 0
2091
+ 0.02
2092
+ 1
2093
+ 5
2094
+ 0.02
2095
+ 2.5
2096
+ 0
2097
+ 0.02
2098
+ 2.5
2099
+ 10
2100
+ 0.02
2101
+ Table A2. A list of the field strength 𝐹, Taylor number, and shear am-
2102
+ plitude 𝐴 for the set of low resolution simulations with (𝑁𝑥, 𝑁𝑦, 𝑁𝑧) =
2103
+ (128, 64, 128) that were used as an initial parameter sweep to guide this
2104
+ work. All other parameters are fixed by the values defined in Table 1.
2105
+ MNRAS 000, 1–15 (2022)
2106
+
29E4T4oBgHgl3EQfawyS/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2tFIT4oBgHgl3EQf5CvJ/content/tmp_files/2301.11388v1.pdf.txt ADDED
@@ -0,0 +1,2253 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11388v1 [math-ph] 26 Jan 2023
2
+ PERTURBATION DETERMINANT AND LEVINSON’S FORMULA FOR
3
+ SCHR¨ODINGER OPERATORS WITH GENERALIZED POINT INTERACTION
4
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
5
+ Abstract. We consider the one dimensional Schr¨odinger operator with properly connecting gener-
6
+ alized point interaction at the origin. We derive a trace formula for trace of difference of resolvents
7
+ of perturbed and unperturbed Schr¨odinger operators in terms of a Wronskian which results into
8
+ an explicit expression for perturbation determinant. Using the estimate for large time real argu-
9
+ ment on the trace norm of the resolvent difference of the perturbed and unperturbed Schr¨odinger
10
+ operators we express the spectral shift function in terms of perturbation determinant. Under cer-
11
+ tain integrability condition on the potential function, we calculate low energy asymptotics for the
12
+ perturbation determinant and prove an analog of Levinson’s formula.
13
+ 1. Introduction and main results
14
+ Let HA
15
+ V be the Schr¨odinger operator
16
+ HA
17
+ V = HA
18
+ 0 + V,
19
+ HA
20
+ 0 = − d2
21
+ dx2
22
+ (1.1)
23
+ on the real-line which is realized as a union of two positive semi-axis ej = [0, ∞), j = 1, 2 coupled at
24
+ 0. The potential function V is assumed to be real-valued and satisfies
25
+
26
+ ej
27
+ |Vj(x)|dx < ∞,
28
+ (1.2)
29
+ where, Vj is the restriction of V on ej, j = 1, 2. The operator (1.1) is self-adjoint for all functions
30
+ from the space H2([0, ∞)) ⊕ H2([0, ∞)) satisfying the conditions
31
+ �ψ1(0)
32
+ ψ′
33
+ 1(0)
34
+
35
+ = A
36
+ �ψ2(0)
37
+ ψ′
38
+ 2(0)
39
+
40
+ (1.3)
41
+ where A = eiφ
42
+ �a
43
+ b
44
+ c
45
+ d
46
+
47
+ and ψ = (ψ1, ψ2)T ∈ L2([0, ∞)) ⊕ L2([0, ∞)) and the real parameters
48
+ φ ∈ [−π/2, π/2], a, b, c, d ∈ R satisfying ad − bc = −1.
49
+ The above conditions are commonly known as the generalized point interaction, first introduced
50
+ by ˇSeba [18]. There are several other equivalent formulations for the generalized point interaction,
51
+ see for example [9] and references therein. The free Hamiltonian HA
52
+ 0 with conditions (1.3) describes
53
+ certain second order differential operators with generalized functions in coefficients. The Schr¨odinger
54
+ operator with δ potential of strength α, for instance, corresponds to the unperturbed operator HA
55
+ 0
56
+ with φ = 0, a = 1, b = 0, c = α and d = −1. Similarly, δ′ potential of strength β corresponds to
57
+ φ = 0, a = −1, b = β, c = 0 and d = 1. Differential operators of this kind are closely related to
58
+ exactly solvable models in quantum mechanics, atomic physics, and acoustics [1,7].
59
+ 2010 Mathematics Subject Classification. Primary: 34L25, 34L40; Secondary: 35P25, 81Q10.
60
+ Key words and phrases. Schr¨odinger operators; Generalized point interaction; Trace formula; Perturbation deter-
61
+ minant; Spectral shift function; Levinson’s formula.
62
+ 1
63
+
64
+ 2
65
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
66
+ The present article is devoted to deriving explicit expression for perturbation determinant for
67
+ the pair of operators HA
68
+ V and HA
69
+ 0 and its relationship with spectral shift function and Levinson’s
70
+ theorem. These mathematical objects play an important role in the study of direct and inverse scat-
71
+ tering theory [10–13] as well as in solid state physics in connection with Friedel sum rule and excess
72
+ charge [14]. Kr˘ein [15] (see also [17]) introduced the concept of perturbation determinant and it is
73
+ an important tool in studying trace formulas of higher order. For a detailed study on these topics for
74
+ Schr¨odinger operators on the half-line as well as on the whole real line we refer to the monograph [23]
75
+ (see also reference [6]) and for a quantum star graph we refer to [5]. Our aim in this paper is to
76
+ generalize these results for Schr¨odinger operators on the real-line, which can also be seen as a two
77
+ edge star graph, satisfying the most general properly connecting self-adjoint matching conditions at
78
+ zero.
79
+ Using Kr˘ein’s resolvent formula (see [1] and [8]), we first prove a trace formula that expresses the
80
+ trace of the difference between the perturbed and corresponding unperturbed resolvents in terms of a
81
+ Wronskian. This trace formula allows us to derive an explicit expression for the perturbation deter-
82
+ minant. The perturbation determinant is an interesting object in the spectral theory of Schr¨odinger
83
+ operators, as the zeros of perturbation determinant coincide with the eigenvalues of the Schr¨odinger
84
+ operator and the multiplicity of each eigenvalue is equal to the order of the corresponding zero of
85
+ the perturbation determinant [3]. Estimates on the trace norm of the resolvent difference of the
86
+ operators HA
87
+ V and HA
88
+ 0 obtained in [21] allow one to express the spectral shift function in terms of
89
+ perturbation determinant. For a real argument, perturbation determinant is used to define the phase
90
+ shift function. The so called Levinson’s formula is derived for the Schr¨odinger operator HA
91
+ V in terms
92
+ of its phase shift function. This formula, also called a zero order trace formula gives a relationship
93
+ between the number of negative eigenvalues and the scattering data via phase shift function.
94
+ To state our main results we first consider the half-line Schr¨odinger operators HD
95
+ ej = − d2
96
+ dx2 + Vj,
97
+ j = 1, 2, with Dirichlet boundary condition at 0 and let HD
98
+ V = HD
99
+ e1 ⊕ HD
100
+ e2 denote the decoupled
101
+ Schr¨odinger operator on the whole line. The resolvent (HD
102
+ V − z)−1 is denoted by RD
103
+ V (z). Under the
104
+ condition (1.2) the differential equation
105
+ −u′′
106
+ j + Vju = ζ2u,
107
+ j = 1, 2
108
+ has two particular solutions, namely, the regular solution and the Jost solution. The regular solution
109
+ φj is characterized by the conditions
110
+ φj(0, ζ) = 0,
111
+ φ′
112
+ j(0, ζ) = 1
113
+ and the Jost solution θj by the asymptotics θj(x, ζ) ∼ eiζx, as x → ∞. We denote the resolvent
114
+ (HA
115
+ V −z)−1 of the perturbed operator HA
116
+ V by RA
117
+ V (z) and the resolvent (HA
118
+ 0 −z)−1 of the unperturbed
119
+ operator HA
120
+ 0 by RA
121
+ 0 (z). Moreover, the (modified) perturbation determinant is defined as
122
+ D(z) := det(I +
123
+
124
+ V RA
125
+ 0 (z)
126
+
127
+ |V |),
128
+ z ∈ ρ(HA
129
+ 0 ),
130
+ where,
131
+
132
+ V = sgnV
133
+
134
+ |V |.
135
+ Our first main result is the following trace formula for the difference of two resolvents in terms of
136
+ Jost solutions θj and their derivatives
137
+ Theorem 1.1. If the potential V satisfies (1.2) then the following trace formula holds
138
+ Tr(RA
139
+ V (z) − RA
140
+ 0 (z)) = − 1
141
+
142
+ � d
143
+ dζ ln
144
+
145
+ w1(ζ)w2(ζ)L(ζ)
146
+ (a − d)ζ + (bζ2 + c)i
147
+ ��
148
+ ,
149
+ ζ = z1/2,
150
+ Im ζ > 0
151
+ (1.4)
152
+
153
+ PERTURBATION DETERMINANT— August 24, 2022
154
+ 3
155
+ where
156
+ L(ζ) = aθ′
157
+ 1(0, ζ)
158
+ θ1(0, ζ) − dθ′
159
+ 2(0, ζ)
160
+ θ2(0, ζ) + bθ′
161
+ 1(0, ζ)θ′
162
+ 2(0, ζ)
163
+ θ1(0, ζ)θ2(0, ζ) − c
164
+ and wj(ζ) = θj(0, ζ), j = 1, 2. Moreover, for z ∈ ρ(HV ) and Im z1/2 > 0, the perturbation determi-
165
+ nant D(ζ) of the operator HA
166
+ V with respect to HA
167
+ 0 is given by
168
+ D(z) = L(√z)w1(√z)w2(√z)
169
+ (a − d)√zi − (bz + c).
170
+ (1.5)
171
+ In Section 4 we study the behaviour of D(z) as |z| → 0 and prove the zero order trace formula,
172
+ commonly known as the Levinson’s formula, for the operator HA
173
+ V . We will need the following con-
174
+ stants:
175
+ α1 =
176
+
177
+ b
178
+ �θ′
179
+ 1(0, 0)
180
+ θ2(0, 0) + θ′
181
+ 2(0, 0)
182
+ θ1(0, 0)
183
+
184
+ − aθ2(0, 0)
185
+ θ1(0, 0) + dθ1(0, 0)
186
+ θ2(0, 0)
187
+
188
+ i,
189
+ (1.6)
190
+ α2 = aθ′
191
+ 1(0, 0)θ2(0, 0) + bθ′
192
+ 1(0, 0)θ′
193
+ 2(0, 0),
194
+ α3 = (cθ2(0, 0) + dθ′
195
+ 2(0, 0)) ˙θ1(0, 0),
196
+ α4 = aθ′
197
+ 1(0, 0) ˙θ2(0, 0) − d ˙θ1(0, 0)θ′
198
+ 2(0, 0),
199
+ where dot denotes the derivative with respect to ζ.
200
+ Theorem 1.2. Assume that
201
+
202
+ ej
203
+ (1 + x)|Vj(x)| dx < ∞,
204
+ j = 1, 2
205
+ (1.7)
206
+ and let N be the number of negative eigenvalues of the operator HA
207
+ V . Then, the following formula
208
+ holds
209
+ η(∞) − η(0) =
210
+
211
+
212
+
213
+
214
+
215
+
216
+
217
+
218
+
219
+
220
+
221
+
222
+
223
+
224
+
225
+
226
+
227
+
228
+
229
+
230
+
231
+
232
+
233
+ π
234
+
235
+ N − P − Q
236
+ 2
237
+
238
+ ,
239
+ wj(0) ̸= 0, j = 1, 2,
240
+ π
241
+
242
+ N − P − R
243
+ 2
244
+
245
+ ,
246
+ w1(0) = 0, w2(0) ̸= 0,
247
+ π
248
+
249
+ N − P − S
250
+ 2
251
+
252
+ ,
253
+ w1(0) ̸= 0, w2(0) = 0,
254
+ π
255
+
256
+ N − P − T
257
+ 2
258
+
259
+ ,
260
+ wj(0) = 0, j = 1, 2.
261
+ Here, η is the so-called phase shift function, P, Q, R, S and T are functions which are defined as
262
+ P =
263
+
264
+
265
+
266
+
267
+
268
+
269
+
270
+ 0
271
+ c ̸= 0
272
+ 1
273
+ c = 0, a − d ̸= 0
274
+ 2
275
+ c = 0, a − d = 0, b ̸= 0,
276
+ Q =
277
+
278
+
279
+
280
+
281
+
282
+
283
+
284
+ 0
285
+ L(0) ̸= 0
286
+ 1
287
+ L(0) = 0, α1 ̸= 0
288
+ 2
289
+ L(0) = 0, α1 = 0, b ̸= 0,
290
+ R =
291
+
292
+ 0
293
+ α2 ̸= 0
294
+ 1
295
+ α2 = 0,
296
+ S =
297
+
298
+ 0
299
+ α3 ̸= 0
300
+ 1
301
+ α3 = 0,
302
+ T =
303
+
304
+
305
+
306
+
307
+
308
+
309
+
310
+ 0
311
+ b ̸= 0
312
+ 1
313
+ b = 0, α4 ̸= 0
314
+ 2
315
+ b = 0, α4 = 0, c ̸= 0.
316
+
317
+ 4
318
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
319
+ 2. Perturbation determinant
320
+ Our main purpose in this section is to derive the trace formula (1.4) and the explicit expression
321
+ (1.5) for the perturbation determinant of operator HA
322
+ V with respect to H0 in terms of the Jost
323
+ solutions θj and their derivatives θ′
324
+ j. For this purpose we use Kr˘ein’s resolvent formula which allows
325
+ us to describe the kernel of RA
326
+ V (z) in terms of the kernel of RD
327
+ V (z). More precisely, for Im ζ ≥ 0, the
328
+ Krein’s formula states
329
+ RA
330
+ j,l(x, y; z) := RD
331
+ j,l(x, y; z) + λj,lθj(x, ζ)θl(y, ζ),
332
+ j, l = 1, 2,
333
+ z = ζ2 ∈ ρ(HA
334
+ V ) ∩ ρ(HD
335
+ V ),
336
+ (2.1)
337
+ where RA
338
+ j,l and RD
339
+ j,l denote the kernel of 2 × 2 matrix integral operators RA
340
+ V and RD
341
+ V , respectively.
342
+ The values of the coefficients λj,l are given by the following lemma
343
+ Lemma 2.1. Let ψ(x) :=
344
+ � ∞
345
+ 0
346
+ RA(x, y; z)f(y) dy and f = (f1(x), f2(x))T ∈ L2([0, ∞)) ⊕ L2([0, ∞)).
347
+ If ψ(x) satisfies HA
348
+ V ψ = ζ2ψ + f and conditions (1.3) then λj,l in (2.1) are given by
349
+ �λ1,1
350
+ λ1,2
351
+ λ2,1
352
+ λ2,2
353
+
354
+ =
355
+
356
+ 
357
+
358
+ a + bθ′
359
+ 2(0, ζ)
360
+ θ2(0, ζ)
361
+ L(ζ)θ2
362
+ 1(0, ζ)
363
+ (ad − bc)eiφ
364
+ L(ζ)θ1(0, ζ)θ2(0, ζ)
365
+ e−iφ
366
+ L(ζ)θ1(0, ζ)θ2(0, ζ)
367
+
368
+ bθ′
369
+ 1(0, ζ)
370
+ θ1(0, ζ) − d
371
+ L(ζ)θ2
372
+ 2(0, ζ)
373
+
374
+ 
375
+ where L(ζ) = a θ′
376
+ 1(0,ζ)
377
+ θ1(0,ζ) − d θ′
378
+ 2(0,ζ)
379
+ θ2(0,ζ) + b θ′
380
+ 1(0,ζ)θ′
381
+ 2(0,ζ)
382
+ θ1(0,ζ)θ2(0,ζ) − c.
383
+ Proof. It is a well-known fact (see for example [5]), that the resolvent of the operator HD
384
+ ej is an
385
+ integral operator with symmetric kernel
386
+ RD
387
+ ej(x, y; z) = φj(x, ζ)θj(y, ζ)
388
+ wj(ζ)
389
+ ,
390
+ x ≤ y,
391
+ ζ = √z.
392
+ (2.2)
393
+ Therefore the resolvent RD
394
+ V is a matrix integral operator with kernel
395
+ RD
396
+ j,l(x, y; z) = δj,lRD
397
+ j (x, y; z)
398
+ j, l = 1, 2.
399
+ (2.3)
400
+ For simplicity, we use the following notation
401
+ RA
402
+ j,l(x, y; z) = RA
403
+ j,l,
404
+ φj(x, ζ) = φj(x),
405
+ θj(y, ζ) = θj(y)
406
+ and
407
+ wj(ζ) = wj.
408
+ By substituting (2.2) and (2.3) into (2.1) and expressing it in matrix form we get
409
+ �RA
410
+ 1,1
411
+ RA
412
+ 1,2
413
+ RA
414
+ 2,1
415
+ RA
416
+ 2,2
417
+
418
+ =
419
+ � φ1(x)θ1(y)+w1λ1,1θ1(x)θ1(y)
420
+ w1
421
+ λ1,2θ1(x)θ2(y)
422
+ λ2,1θ2(x)θ1(y)
423
+ φ2(x)θ2(y)+w2λ2,2θ2(x)θ2(y)
424
+ w2
425
+
426
+ .
427
+ Multiplying f from right and using the definition of function ψ the above expression becomes
428
+ �ψ1(x)
429
+ ψ2(x)
430
+
431
+ =
432
+ �� ∞
433
+ 0 { φ1(x)θ1(y)
434
+ w1
435
+ f1(y) + �2
436
+ i=1 λ1,iθ1(x)θi(y)fi(y)}dy
437
+ � ∞
438
+ 0 { φ2(x)θ2(y)
439
+ w2
440
+ f2(y) + �2
441
+ i=1 λ2,iθ2(x)θi(y)fi(y)}dy
442
+
443
+ which is equivalent to the following system of equations
444
+ ψj(x) =
445
+
446
+
447
+ 0
448
+
449
+ φj(x)θj(y)
450
+ wj
451
+ fj(y) +
452
+ n
453
+
454
+ i=1
455
+ λj,iθj(x)θi(y)fi(y)
456
+
457
+ dy,
458
+ j = 1, 2.
459
+ In order to determine λj,l uniquely, we first express conditions (1.3) as a system of two equations and
460
+ first apply the sub-condition
461
+ ψ1(0) = eiφ(aψ2(0) + bψ′
462
+ 2(0))
463
+
464
+ PERTURBATION DETERMINANT— August 24, 2022
465
+ 5
466
+ on ψ and Dirichlet condition on φ. This yields the following expression
467
+
468
+
469
+ 0
470
+ � 2
471
+
472
+ i=1
473
+ λ1,iθ1(0)θi(y)fi(y)
474
+
475
+ dy =
476
+ (2.4)
477
+ eiφ
478
+
479
+ a
480
+
481
+
482
+ 0
483
+ � 2
484
+
485
+ i=1
486
+ λ2,iθ2(0)θi(y)fi(y)
487
+
488
+ dy + b
489
+
490
+
491
+ 0
492
+
493
+ θ2(y)f2(y)
494
+ θ2(0)
495
+ +
496
+ 2
497
+
498
+ i=1
499
+ λ2,iθ′
500
+ 2(0)θi(y)fi(y)
501
+
502
+ dy
503
+
504
+  .
505
+ Applying the second sub-condition
506
+ ψ′
507
+ 1(0) = eiφ(cψ2(0) + dψ′
508
+ 2(0))
509
+ on ψ and Dirichlet condition on φ, we obtain
510
+
511
+
512
+ 0
513
+
514
+ θ1(y)f1(y)
515
+ θ1(0)
516
+ +
517
+ 2
518
+
519
+ i=1
520
+ λ1,iθ′
521
+ 1(0)θi(y)fi(y)
522
+
523
+ dy =
524
+ (2.5)
525
+ eiφ
526
+
527
+ c
528
+
529
+
530
+ 0
531
+ � 2
532
+
533
+ i=1
534
+ λ2,iθ2(0)θi(y)fi(y)
535
+
536
+ dy + d
537
+
538
+
539
+ 0
540
+
541
+ θ2(y)f2(y)
542
+ θ2(0)
543
+ +
544
+ 2
545
+
546
+ i=1
547
+ λ2,iθ′
548
+ 2(0)θi(y)fi(y)
549
+
550
+ dy
551
+
552
+  .
553
+ Comparing the coefficients of fi(y)θi(y) in (2.4) and (2.5), we get the following set of equations
554
+ θ1(0)λ1,2 − eiφ
555
+
556
+ aθ2(0)λ2,2 − b
557
+
558
+ 1
559
+ θ2(0) + θ′
560
+ 2(0)λ2.2
561
+ ��
562
+ = 0
563
+ θ1(0)λ1,1 − eiφ (aθ2(0)λ2,1 + bθ′
564
+ 2(0)λ2,1) = 0
565
+ θ′
566
+ 1(0)λ1,2 − eiφ
567
+
568
+ cθ2(0)λ2,2 − d
569
+
570
+ 1
571
+ θ2(0) + θ′
572
+ 2(0)λ2.2
573
+ ��
574
+ = 0
575
+ 1
576
+ θ1(0) + θ′
577
+ 1(0)λ1,1 − eiφ (cθ2(0)λ2,1 + dθ′
578
+ 2(0)λ2,1) = 0
579
+ We obtain the values of λj,l j, l = 1, 2 by solving the above set of equations.
580
+
581
+ Using (2.3) and Lemma (2.1) we can express the resolvent kernel of HA
582
+ V given by (2.1) as
583
+ �RA
584
+ 1,1
585
+ RA
586
+ 1,2
587
+ RA
588
+ 2,1
589
+ RA
590
+ 2,2
591
+
592
+ =
593
+
594
+ 
595
+ RD
596
+ e1 −
597
+ a + bθ′
598
+ 2(0)
599
+ θ2(0)
600
+ L(ζ)θ2
601
+ 1(0) θ2
602
+ 1(x)
603
+ (ad − bc)eiφ
604
+ L(ζ)θ1(0)θ2(0)θ1(x)θ2(y)
605
+ e−iφ
606
+ L(ζ)θ1(0)θ2(0)θ2(x)θ1(y)
607
+ RD
608
+ e2 −
609
+ bθ′
610
+ 1(0)
611
+ θ1(0) − d
612
+ L(ζ)θ2
613
+ 2(0) θ2
614
+ 2(x)
615
+
616
+ 
617
+ .
618
+ (2.6)
619
+ Here, for simplicity, we used the notation RA
620
+ i,j(x, y; ζ) = RA
621
+ i,j, RD
622
+ ei(x, y; ζ) = RD
623
+ ei and θi(x, ζ) = θi(x).
624
+ For unperturbed operator i.e., when Vj(x) ≡ 0, we may let
625
+ θj(x, ζ) = eixjζ ⇒ L(ζ) = (a − d)iζ −
626
+
627
+ bζ2 + c
628
+
629
+ .
630
+ Hence
631
+
632
+ RA
633
+ 0,(1,1)
634
+ RA
635
+ 0,(1,2)
636
+ RA
637
+ 0,(2,1)
638
+ RA
639
+ 0,(2,2)
640
+
641
+ =
642
+
643
+ RD
644
+ 0,e1 −
645
+ a+iζb
646
+ (a−d)iζ−(bζ2+c)e2iζx
647
+ (ad−bc)
648
+ (a−d)iζ−(bζ2+c)ei(x+y+φ)ζ
649
+ 1
650
+ (a−d)iζ−(bζ2+c)ei(x+y−φ)ζ
651
+ RD
652
+ 0,e2 −
653
+ iζb−d
654
+ (a−d)iζ−(bζ2+c)e2iζx
655
+
656
+ .
657
+ (2.7)
658
+ we now prove Theorem (1.1).
659
+
660
+ 6
661
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
662
+ Proof of Theorem 1.1. The operator difference RD
663
+ V (z)−RD
664
+ 0 (z) is a trace class operator and the second
665
+ term on the right hand side of (2.1) is a finite rank perturbation. Therefore, the difference RA
666
+ V (z)−RA
667
+ 0
668
+ is a trace class operator. The operator HA
669
+ V can be seen as a particular case of a more general matrix
670
+ valued Schr¨odinger operator considered in [21] on the half-line when potential is a diagonal matrix.
671
+ The fact that RA
672
+ V (z) − RA
673
+ 0 is trace class also follows from Lemma 9.1 of [21]. Representation (2.1)
674
+ with values of λj,l given by lemma (2.1) allows us to compute the trace of the resolvent difference of
675
+ operators HA
676
+ V and HA
677
+ 0 .
678
+ Using (2.6) and (2.7) the trace of the difference of RA
679
+ V and RA
680
+ 0 can be written as
681
+ Tr(RA
682
+ V (z) − RA
683
+ 0 (z)) =
684
+ 2
685
+
686
+ j=1
687
+
688
+
689
+ 0
690
+
691
+ RD
692
+ ej(x, x, z) − RD
693
+ 0,ej(x, x, z)
694
+
695
+ dx
696
+
697
+
698
+
699
+ 0
700
+
701
+
702
+
703
+
704
+ a + bθ′
705
+ 2(0)
706
+ θ2(0)
707
+ L(ζ)θ2
708
+ 1(0) θ2
709
+ 1(x) +
710
+ bθ′
711
+ 1(0)
712
+ θ1(0) − d
713
+ L(ζ)θ2
714
+ 2(0) θ2
715
+ 2(x)
716
+
717
+
718
+
719
+  dx
720
+ +
721
+
722
+
723
+ 0
724
+
725
+ (a − d + 2iζb)
726
+ (a − d)iζ − (bζ2 + c)e2ixζ
727
+
728
+ dx.
729
+ (2.8)
730
+ The first term on the right hand side of (2.8) is given by (c.f. Remark 1.2 of [5])
731
+ 2
732
+
733
+ j=1
734
+
735
+
736
+ 0
737
+
738
+ RD
739
+ ej(x, x, z) − RD
740
+ 0,ej(x, x, z)
741
+
742
+ dx = − 1
743
+
744
+ 2
745
+
746
+ j=1
747
+ ˙wj(ζ)
748
+ wj(ζ).
749
+ (2.9)
750
+ To compute the first term in the second integral on the right hand side of (2.8) we use the following
751
+ equation which is true for any arbitrary solutions fj(x, ζ) and gj(x, ζ) of HD
752
+ ejψj = ζ2ψj
753
+ fj(x, ζ)gj(x, ζ) = (f ′
754
+ j(x, ζ)˙gj(x, ζ) − fj(x, ζ)˙g′
755
+ j(x, ζ))′
756
+
757
+ .
758
+ (2.10)
759
+ If we let fj = gj = θj we obtain
760
+
761
+
762
+ 0
763
+ θ2
764
+ j (x, ζ)dx = [θ′
765
+ j(x, ζ) ˙θj(x, ζ) − θj(x, ζ) ˙θ′
766
+ j(x, ζ)]∞
767
+ 0
768
+
769
+ .
770
+ If Vj is compactly supported potential then the Jost solution θj(x, ζ) = eiζx and hence
771
+ θ′
772
+ j(x, ζ) ˙θj(x, ζ) − θj(x, ζ) ˙θ′
773
+ j(x, ζ) = ie2iζx.
774
+ For Im ζ > 0, ie2iζx → 0 as x → ∞. Therefore, we are left with
775
+
776
+
777
+ 0
778
+ θ2
779
+ j(x, ζ)dx = θj(0, ζ) ˙θ′
780
+ j(0, ζ) − θ′
781
+ j(0, ζ) ˙θj(0, ζ)
782
+
783
+ = θ2
784
+ j(0, ζ)
785
+
786
+ d
787
+
788
+ θ′
789
+ j(0, ζ)
790
+ θj(0, ζ).
791
+
792
+ PERTURBATION DETERMINANT— August 24, 2022
793
+ 7
794
+ This implies
795
+
796
+
797
+ 0
798
+
799
+
800
+
801
+
802
+ a + bθ′
803
+ 2(0)
804
+ θ2(0)
805
+ L(ζ)θ2
806
+ 1(0) θ2
807
+ 1(x) +
808
+ bθ′
809
+ 1(0)
810
+ θ1(0) − d
811
+ L(ζ)θ2
812
+ 2(0) θ2
813
+ 2(x)
814
+
815
+
816
+
817
+  dx
818
+ =
819
+ 1
820
+ 2ζL(ζ)
821
+ ��
822
+ a + bθ′
823
+ 2(0)
824
+ θ2(0)
825
+ � d
826
+
827
+ θ′
828
+ 1(0, ζ)
829
+ θ1(0, ζ) +
830
+
831
+ bθ′
832
+ 1(0)
833
+ θ1(0) − d
834
+ � d
835
+
836
+ θ′
837
+ 2(0, ζ)
838
+ θ2(0, ζ)
839
+
840
+ =
841
+ ˙L(ζ)
842
+ 2ζL(ζ).
843
+ (2.11)
844
+ By a density argument the above result can be extended to all potentials satisfying the condition
845
+ � ∞
846
+ 0
847
+ |Vj(x)| < ∞.
848
+ Now it only remains to compute the last integral on the right hand side of (2.8), which is
849
+
850
+
851
+ 0
852
+
853
+ (a − d + 2iζb)
854
+ (a − d)iζ − bζ2 + ce2ixζ
855
+
856
+ dx =
857
+ (a − d + 2iζb)
858
+ 2ζ((a − d)ζ + (bζ2 + c)i).
859
+ (2.12)
860
+ Substituting values from (2.9), (2.11) and (2.12) in (2.8), we get
861
+ Tr(RA
862
+ V (z) − RA
863
+ 0 (z)) = − 1
864
+
865
+
866
+
867
+ 2
868
+
869
+ j=1
870
+ ˙wj(ζ)
871
+ wj(ζ) +
872
+ ˙L(ζ)
873
+ L(ζ) −
874
+ (a − d + 2iζb)
875
+ (a − d)ζ + (bζ2 + c)i
876
+
877
+
878
+ = − 1
879
+
880
+
881
+
882
+ 2
883
+
884
+ j=1
885
+ d
886
+ dζ ln(wj(ζ)) + d
887
+ dζ ln(L(ζ)) − d
888
+ dζ ln((a − d)ζ + (bζ2 + c)i)
889
+
890
+
891
+ = − 1
892
+
893
+
894
+  d
895
+ dζ ln
896
+
897
+
898
+ L(ζ)
899
+ (a − d)ζ + (bζ2 + c)i
900
+ 2
901
+
902
+ j=1
903
+ wj(ζ)
904
+
905
+
906
+
907
+  .
908
+ The second term on the right hand side of (2.1) with values of λj,l given by lemma (2.1) is a finite
909
+ rank operator and if the potential function V satisfy condition (1.2) then the operator
910
+
911
+ |V |(HA
912
+ 0 )−1/2
913
+ is Hilbert-Schmidt and therefore,
914
+
915
+ V RA
916
+ 0
917
+
918
+ |V | is trace class.
919
+ This implies that the perturbation
920
+ determinant D(z) is well defined. The perturbation determinant and trace of the resolvent difference
921
+ RA
922
+ V (z) − RA
923
+ 0 (z) are related by the following expression
924
+ Tr(RA
925
+ V (z) − RA
926
+ 0 (z)) =
927
+ d
928
+ dzD(z)
929
+ D(z) ,
930
+ z ∈ ρ(HA
931
+ V ) ∩ ρ(HA
932
+ 0 ).
933
+ In order to find an explicit expression for the perturbation determinant we choose ζ = √z such
934
+ that Im (z) > 0. It follows from Theorem 1.1 that
935
+ d
936
+ dz (D(z))
937
+ D(z)
938
+ =
939
+ d
940
+ dz
941
+
942
+ L(√z)
943
+ (a − d)√z + (bz + c)i
944
+ 2�
945
+ j=1
946
+ wj(√z)
947
+
948
+ L(√z)
949
+ (a − d)√z + (bz + c)i
950
+ 2�
951
+ j=1
952
+ wj(√z)
953
+ .
954
+ From here we deduce that
955
+ D(z) = A
956
+ L(√z)
957
+ (a − d)√z + (bz + c)i
958
+ 2
959
+
960
+ j=1
961
+ wj(√z),
962
+ A ∈ C.
963
+
964
+ 8
965
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
966
+ To find the value of the complex coefficient A, we use the following asymptotic of perturbation
967
+ determinant
968
+ lim
969
+ |Im(z)|→∞ D(z) = 1.
970
+ This asymptotic holds if
971
+
972
+ |V |RA
973
+ 0 (z)−1 is Hilbert-Schmidt operator (see [23]). For the asymptotic
974
+ behaviour of wj(√z) as |√z| → ∞ , we refer to [6], which provides
975
+ wj(√z) = θj(0, √z) = 1 + O(|√z|−1).
976
+ Further, it is easy to find that
977
+ L(√z) = (a − d)√zi − (bz + c) + O(1),
978
+ |√z| → ∞.
979
+ (2.13)
980
+ This implies, A = 1
981
+ i .
982
+
983
+ 2.1. Spectral shift function. In this section we briefly discuss the relationship between perturba-
984
+ tion determinant D(z) and the spectral shift function ξ(λ; HA
985
+ V , HA
986
+ 0 ). The spectral shift function for
987
+ the pair of operators HA
988
+ V and HA
989
+ 0 can be defined by the trace formula
990
+ Tr(f(HA
991
+ V − HA
992
+ 0 )) :=
993
+ � ∞
994
+ −∞
995
+ ξ(λ; HA
996
+ V , HA
997
+ 0 )f ′(λ) dλ
998
+ (2.14)
999
+ for all f ∈ C∞
1000
+ 0 (R).
1001
+ Theorem 9.2 of [21] explicitly characterize the spectral shift function in the more general case of ma-
1002
+ trix valued Schr¨odinger operators with general self-adjoint conditions at the origin. It was proved that
1003
+ the trace formula (2.14) holds for a bigger class of functions satisfying f ′(λ) = O(λ−1/2−ε), f ′′(λ) =
1004
+ O(λ−1−ε), ε > 0, λ → ∞ and
1005
+ � ∞
1006
+ −∞
1007
+ |ξ(λ; HA
1008
+ V , HA
1009
+ 0 )|(1 + |λ|)−1/2−ε dλ < ∞,
1010
+ ε > 0.
1011
+ One of the main ingredients in the proof of Theorem 9.2 of [21] is the following estimate1 (cf. inequality
1012
+ (9.2) of [21], see also (5.11) of [23] )
1013
+ ||RA
1014
+ V (−t) − RA
1015
+ 0 (−t)||1 ≤ Cεt− 3
1016
+ 2 +ε,
1017
+ ε > 0,
1018
+ t → ∞.
1019
+ (2.15)
1020
+ The above estimate implies
1021
+ � ∞
1022
+ 1
1023
+ t−m||RA
1024
+ V (−t) − RA
1025
+ 0 (−t)||1 < ∞
1026
+ which holds for all m > −1/2. Proposition (3.3) of [5] then implies
1027
+ ξ(λ; HA
1028
+ V , HA
1029
+ 0 ) = π−1 lim
1030
+ ε→0 arg D(λ + iε),
1031
+ where arg D(z) = Im ln D(z) is defined by the condition ln D(z) → 0 as dist{z, σ(HA
1032
+ 0 )} → ∞.
1033
+ Moreover,
1034
+ ln D(z) =
1035
+ � ∞
1036
+ −∞
1037
+ ξ(λ; HA
1038
+ V , HA
1039
+ 0 )(λ − z)−1 dλ,
1040
+ z ∈ ρ(HA
1041
+ 0 ) ∩ ρ(HA
1042
+ V ).
1043
+ 1The interested reader can consult Appendix (A) where explicit derivation of this estimate is provided.
1044
+
1045
+ PERTURBATION DETERMINANT— August 24, 2022
1046
+ 9
1047
+ 3. Levinson’s formula
1048
+ In this section we derive a zero order trace formula, commonly known as Levinson’s formula, which
1049
+ describes the number of negative eigenvalues of an operator in terms of phase shift function which
1050
+ is denoted by η and it is defined, for real k, as η(k) := arg D(k). The Levinson’s formula derived in
1051
+ this section is closely related to the Levinson’s formulas obtained in Theorem 9.3 of [3] and Theorem
1052
+ 9.3 of [21]. Levinson’s formula obtained in [3] relates the number of negative eigenvalues with the
1053
+ determinant of the scattering matrix and certain parameters that depend on the boundary condi-
1054
+ tions. Formula obtained in [21] relates the number of negative eigenvalues with the spectral shift
1055
+ function. The vertex conditions of this paper can be expressed as a particular case of more general
1056
+ conditions considered in references [3] and [21] and therefore the Levinson’s formulas obtained there
1057
+ also hold for the operator HA
1058
+ V . For higher order trace formulas of integer and half-integer order we
1059
+ refer to [19,22,23].
1060
+ We will need the following low-energy asymptotics of the perturbation determinant
1061
+ Lemma 3.1 (Low energy asymptotics). Let the potential V satisfies the condition
1062
+
1063
+ ej
1064
+ (1 + x)|Vj(x)|dx < ∞,
1065
+ 1 ≤ j ≤ n.
1066
+ (3.1)
1067
+ Then as ζ → 0 the perturbation determinant satisfies
1068
+ D(ζ) =
1069
+
1070
+
1071
+
1072
+
1073
+
1074
+
1075
+
1076
+
1077
+
1078
+
1079
+
1080
+ ζ(Q−P )(1 + o(1))
1081
+ wj(0) ̸= 0, j = 1, 2,
1082
+ ζ(R−P )(1 + o(1))
1083
+ w1(0) = 0, w2(0) ̸= 0,
1084
+ ζ(S−P )(1 + o(1))
1085
+ w1(0) ̸= 0, w2(0) = 0,
1086
+ ζ(T −P )(1 + o(1))
1087
+ wj(0) = 0, j = 1, 2.
1088
+ Where the functions P, Q, R, S and T are defined in Theorem (1.2).
1089
+ Proof. Expression for perturbation determinant is
1090
+ D(ζ) =
1091
+ L(ζ)
1092
+ 2�
1093
+ j=1
1094
+ wj(ζ)
1095
+ (a − d)iζ − (bζ2 + c).
1096
+ We consider the following five different cases
1097
+ (1) wj(0) ̸= 0, j = 1, 2 and L(0) ̸= 0.
1098
+ (2) wj(0) ̸= 0, j = 1, 2 and L(0) = 0.
1099
+ (3) w1(0) = 0 and w2(0) ̸= 0.
1100
+ (4) w1(0) ̸= 0 and w2(0) = 0.
1101
+ (5) wj(0) = 0, j = 1, 2.
1102
+
1103
+ 10
1104
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
1105
+ In the first case D(ζ) has no zeros and we can let
1106
+ L(0)
1107
+ 2
1108
+
1109
+ j=1
1110
+ wj(0) = ˜c ̸= 0
1111
+ ⇒ lim
1112
+ ζ→0 D(ζ) = lim
1113
+ ζ→0
1114
+ ˜c
1115
+ (a − d)iζ − (bζ2 + c)
1116
+ ⇒ lim
1117
+ ζ→0 D(ζ)((a − d)iζ − (bζ2 + c)) = ˜c
1118
+ ⇒ lim
1119
+ ζ→0
1120
+ D(ζ)((a − d)iζ − (bζ2 + c)) − ˜c
1121
+ ˜c
1122
+ = 0
1123
+ ⇒ D(ζ) =
1124
+ ˜c
1125
+ (a − d)iζ − (bζ2 + c)(1 + o(1)).
1126
+ In the second case, we make use of the following small energy asymptotics (c.f. Theorem 2.3 (iii)of [2])
1127
+ θ′
1128
+ j(0, ζ)
1129
+ θj(0, ζ) = θ′
1130
+ j(0, 0)
1131
+ θj(0, 0) −
1132
+
1133
+ θ2
1134
+ j(0, 0) + o(ζ)
1135
+ which implies
1136
+ L(ζ) =a
1137
+ �θ′
1138
+ 1(0, 0)
1139
+ θ1(0, 0) −
1140
+
1141
+ θ2
1142
+ 1(0, 0) + o(ζ)
1143
+
1144
+ − d
1145
+ �θ′
1146
+ 2(0, 0)
1147
+ θ2(0, 0) −
1148
+
1149
+ θ2
1150
+ 2(0, 0) + o(ζ)
1151
+
1152
+ + b
1153
+ �θ′
1154
+ 1(0, 0)
1155
+ θ1(0, 0) −
1156
+
1157
+ θ2
1158
+ 1(0, 0) + o(ζ)
1159
+ � �θ′
1160
+ 2(0, 0)
1161
+ θ2(0, 0) −
1162
+
1163
+ θ2
1164
+ 2(0, 0) + o(ζ)
1165
+
1166
+ + c
1167
+ =aθ′
1168
+ 1(0, 0)
1169
+ θ1(0, 0) − dθ′
1170
+ 2(0, 0)
1171
+ θ2(0, 0) + bθ′
1172
+ 1(0, 0)
1173
+ θ1(0, 0)
1174
+ θ′
1175
+ 2(0, 0)
1176
+ θ2(0, 0) − c + a
1177
+
1178
+ −iζ
1179
+ θ2
1180
+ 1(0, 0) + o(ζ)
1181
+
1182
+ − d
1183
+
1184
+ −iζ
1185
+ θ2
1186
+ 2(0, 0) + o(ζ)
1187
+
1188
+ + b
1189
+ ��
1190
+ θ′
1191
+ 1(0, 0)
1192
+ θ1(0, 0)θ2
1193
+ 2(0, 0) +
1194
+ θ′
1195
+ 2(0, 0)
1196
+ θ2
1197
+ 1(0, 0)θ2(0, 0)
1198
+
1199
+
1200
+
1201
+ + b
1202
+
1203
+ o(ζ) + o(ζ2) −
1204
+ ζ2
1205
+ θ1(0, 0)θ2(0, 0)
1206
+
1207
+ This yields
1208
+ L(ζ) =L(0) + a
1209
+
1210
+ −iζ
1211
+ θ2
1212
+ 1(0, 0) + o(ζ)
1213
+
1214
+ − d
1215
+
1216
+ −iζ
1217
+ θ2
1218
+ 2(0, 0) + o(ζ)
1219
+
1220
+ + b
1221
+ ��
1222
+ θ′
1223
+ 1(0, 0)
1224
+ θ1(0, 0)θ2
1225
+ 2(0, 0) +
1226
+ θ′
1227
+ 2(0, 0)
1228
+ θ2
1229
+ 1(0, 0)θ2(0, 0)
1230
+
1231
+ iζ + o(ζ) + o(ζ2) −
1232
+ ζ2
1233
+ θ1(0, 0)θ2(0, 0)
1234
+
1235
+ .
1236
+ Therefore,
1237
+ D(ζ) = α1ζ + o(ζ) + b(ζ2 + (o(ζ2)))
1238
+ (a − d)iζ − (bζ2 + c)
1239
+ ,
1240
+ where, α1 =
1241
+
1242
+ b
1243
+ �θ′
1244
+ 1(0, 0)
1245
+ θ2(0, 0) + θ′
1246
+ 2(0, 0)
1247
+ θ1(0, 0)
1248
+
1249
+ − aθ2(0, 0)
1250
+ θ1(0, 0) + dθ1(0, 0)
1251
+ θ2(0, 0)
1252
+
1253
+ i.
1254
+ The above calculations show that the order of the numerator of D(ζ) depends on the value of the
1255
+ parameter b. If b = 0, then it will be of order ζ otherwise it will be of order ζ2.
1256
+ The study of first two cases can be summarized as follows
1257
+ • If wj(0) ̸= 0, j = 1, 2 and L(0) ̸= 0 then the numerator of D(ζ) is a non zero constant and it
1258
+ will have no zeros.
1259
+ • If wj(0) ̸= 0, j = 1, 2 and L(0) = 0 then the numerator of D(ζ) for small ζ will have one zero
1260
+ in case α1 ̸= 0 and it will have two zeros in case α1 = 0, b ̸= 0.
1261
+ This gives us the following low energy asymptotics in the first two cases
1262
+ D(ζ) = ζ(Q−P )(1 + o(1)),
1263
+
1264
+ PERTURBATION DETERMINANT— August 24, 2022
1265
+ 11
1266
+ where
1267
+ Q = Q(b, α1, L(0)) =
1268
+
1269
+
1270
+
1271
+
1272
+
1273
+
1274
+
1275
+ 0
1276
+ L(0) ̸= 0,
1277
+ 1
1278
+ L(0) = 0, α1 ̸= 0
1279
+ 2
1280
+ L(0) = 0, α1 = 0, b ̸= 0
1281
+ and
1282
+ P = P(a, b, c, d) =
1283
+
1284
+
1285
+
1286
+
1287
+
1288
+
1289
+
1290
+ 0
1291
+ c ̸= 0,
1292
+ 1
1293
+ c = 0, a − d ̸= 0
1294
+ 2
1295
+ c = 0, a − d = 0, b ̸= 0.
1296
+ The function P gives the number of poles of D(ζ) in the given cases.
1297
+ Let us now consider the third case, i.e., when w1(0) = 0 and w2(0) ̸= 0. We rewrite D(ζ) as
1298
+ D(ζ) =
1299
+
1300
+ aθ′
1301
+ 1(0, ζ)
1302
+ θ1(0, ζ) − dθ′
1303
+ 2(0, ζ)
1304
+ θ2(0, ζ) + b
1305
+ 2�
1306
+ k=1
1307
+ θ′
1308
+ k(0, ζ)
1309
+ θk(0, ζ) − c
1310
+
1311
+ 2�
1312
+ j=1
1313
+ θj(0, ζ)
1314
+ (a − d)iζ − (bζ2 + c)
1315
+ =
1316
+
1317
+ aθ′
1318
+ 1(0, ζ)θ2(0, ζ) + bθ′
1319
+ 1(0, ζ)θ′
1320
+ 2(0, ζ) − dθ1(0, ζ)θ′
1321
+ 2(0, ζ) − c
1322
+ 2�
1323
+ j=1
1324
+ θj(0, ζ)
1325
+
1326
+ (a − d)iζ − (bζ2 + c)
1327
+ (3.2)
1328
+ and use the following asymptotic for θ1(x, ζ) (c.f. [4])
1329
+ θ1(0, ζ) = ζ ˙θ1(0, 0) + o(ζ).
1330
+ This implies
1331
+ D(ζ) =
1332
+ (α2 − c3ζ + o(ζ))
1333
+ (a − d)iζ − (bζ2 + c)
1334
+ Where α2 = aθ′
1335
+ 1(0, 0)θ2(0, 0)+bθ′
1336
+ 1(0, 0)θ′
1337
+ 2(0, 0) and c3 = (cθ2(0, 0)+dθ′
1338
+ 2(0, 0)) ˙θ1(0, 0). The numerator
1339
+ of D(ζ) is equal to α2 − c3ζ + o(ζ) as ζ → 0. If α2 ̸= 0 then the numerator of D(ζ) has no zeros for
1340
+ small ζ and if α2 = 0, then the numerator of D(ζ) has one zero for small ζ. Hence,
1341
+ D(ζ) = ζ(R−P )(1 + o(1)),
1342
+ ζ → 0,
1343
+ where,
1344
+ R = R(α2) =
1345
+
1346
+ 0
1347
+ α2 ̸= 0,
1348
+ 1
1349
+ α2 = 0.
1350
+ For the fourth case we substitute
1351
+ θ2(0, ζ) = ζ ˙θ2(0, 0) + o(ζ), ζ → 0
1352
+ into (3.2) and obtain
1353
+ D(ζ) =
1354
+ (α3 + c5ζ + o(ζ))
1355
+ (a − d)iζ − (bζ2 + c).
1356
+ Here, α3 = bθ′
1357
+ 1(0, 0)θ′
1358
+ 2(0, 0) − dθ1(0, 0)θ′
1359
+ 2(0, 0) and c5 = (aθ′
1360
+ 1(0, 0) − cθ1(0, 0)) ˙θ2(0, 0). The numerator
1361
+ of D(ζ) for small ζ has no zeros if α3 ̸= 0 and it has one zero if α3 = 0. Therefore,
1362
+ D(ζ) = ζ(S−P )(1 + o(1)),
1363
+ ζ → 0,
1364
+ where,
1365
+ S = S(α3) =
1366
+
1367
+ 0
1368
+ α3 ̸= 0,
1369
+ 1
1370
+ α3 = 0.
1371
+
1372
+ 12
1373
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
1374
+ Finally, for the fifth case we substitute the asymptotics
1375
+ θ1(0, ζ) = ζ ˙θ1(0, 0) + o(ζ) and θ2(0, ζ) = ζ ˙θ2(0, 0) + o(ζ),
1376
+ ζ → 0
1377
+ into (3.2) and obtain
1378
+ D(ζ) = c
1379
+
1380
+ c6ζ2 + o(ζ2)
1381
+
1382
+ + α4ζ + bc8 + o(ζ)
1383
+ (a − d)iζ − (bζ2 + c)
1384
+ ,
1385
+ ζ → 0.
1386
+ Here, c6 = ˙θ1(0, 0) ˙θ2(0, 0) ̸= 0, c8 = θ′
1387
+ 1(0, 0)θ′
1388
+ 2(0, 0) ̸= 0 (because θ(0, 0) = 0 ⇒ ˙θ(0, 0)θ′(0, 0) = −i,
1389
+ the proof is given in [5, Lemma 4.6.(1)], hence ˙θ(0, 0) ̸= 0 and θ′(0, 0) ̸= 0) α4 = aθ′
1390
+ 1(0, 0) ˙θ2(0, 0) −
1391
+ d ˙θ1(0, 0)θ′
1392
+ 2(0, 0). This implies the numerator of D(ζ) for small ζ has no zeros if b ̸= 0, it has one zero
1393
+ if b = 0, α4 ̸= 0 and it has two zeros if b = 0, α4 = 0, c ̸= 0. This yields
1394
+ D(ζ) = ζ(T −P )(1 + o(1)),
1395
+ ζ → 0,
1396
+ where
1397
+ T = T (b, c, α4) =
1398
+
1399
+
1400
+
1401
+
1402
+
1403
+
1404
+
1405
+ 0
1406
+ b ̸= 0,
1407
+ 1
1408
+ b = 0, α4 ̸= 0
1409
+ 2
1410
+ b = 0, α4 = 0, c ̸= 0.
1411
+
1412
+ Using the low energy asymptotics of D(ζ) we now prove the analogue of Levinson’s formula for
1413
+ the negative eigenvalues of HA
1414
+ V , stated in Theorem (1.2).
1415
+ Proof of Theorem 1.2. The function D(ζ) has a zero in ζ of order r if and only if ζ2 is an eigenvalue
1416
+ of multiplicity r of the operator HA
1417
+ V [3]. As HA
1418
+ V is a self-adjoint operator, so the zeros of D(ζ) lie on
1419
+ the positive imaginary axis and it may have only real eigenvalues.
1420
+ Let ΓR,ε denotes the contour (counterclockwise) consisting of semicircles C+
1421
+ R = {|ζ| = R,
1422
+ Im ζ ≥
1423
+ 0} and C+
1424
+ ε = {|ζ| = ε,
1425
+ Im ζ ≥ 0} and the intervals (ε, R) and (−R, −ε). R and ε are chosen such
1426
+ that all N negative eigenvalues lie inside the contour ΓR,ε.
1427
+ The function wj(ζ) is analytic in the upper halfp-plane, therefore, D(ζ) is analytic inside and on
1428
+ the contour ΓR,ε. Hence,
1429
+
1430
+ ΓR,ε
1431
+ d
1432
+ dζ D(ζ)
1433
+ D(ζ) dζ = 2πiN.
1434
+ (3.3)
1435
+ Note that,
1436
+ lim
1437
+ Im ζ→∞
1438
+ D(ζ) =
1439
+ lim
1440
+ Im ζ→∞
1441
+ L(ζ)
1442
+ 2�
1443
+ j=1
1444
+ wj(ζ)
1445
+ (a − d)iζ − (bζ2 + c) = 1 + O(|ζ|−1).
1446
+ (3.4)
1447
+ The branch of the function ln D(ζ) can be fixed by the condition ln D(ζ) → 0 as |ζ| → ∞. For k ∈ R,
1448
+ we set D(k) = a(k)eiη(k), where a(k) = |D(k)| and η(k) = arg D(k). Now
1449
+ varΓR,ε arg D(ζ) = η(R) − η(ε) + varC+
1450
+ R arg D(ζ) + {η(−ε) − η(−R)} + varC+
1451
+ ε arg D(ζ).
1452
+ It follows from the representation of D(k) that η(−k) = −η(k). Hence,
1453
+ varΓR,ε arg D(ζ) = 2(η(R) − η(ε)) + varC+
1454
+ R arg D(ζ) + varC+
1455
+ ε arg D(ζ)
1456
+
1457
+ PERTURBATION DETERMINANT— August 24, 2022
1458
+ 13
1459
+ Equation (3.3) implies that
1460
+ varΓR,ε arg D(ζ) = 2πN.
1461
+ This implies
1462
+ 2πN = 2(η(R) − η(ε)) + varC+
1463
+ R arg D(ζ) + varC+
1464
+ ε arg D(ζ).
1465
+ Using (3.4), one can see that lim
1466
+ R→∞ varC+
1467
+ R arg D(ζ) = 0. We are left with
1468
+ η(∞) − η(ε) = πN − 1
1469
+ 2varC+
1470
+ ε arg D(ζ).
1471
+ Now letting ε → 0 and using Lemma (3.1), we arrive at
1472
+ lim
1473
+ ε→0 varC+
1474
+ ε arg D(ζ) =
1475
+
1476
+
1477
+
1478
+
1479
+
1480
+
1481
+
1482
+
1483
+
1484
+
1485
+
1486
+ −(Q − P)π
1487
+ wj(0) ̸= 0, j = 1, 2,
1488
+ −(R − P)π
1489
+ w1(0) = 0, w2(0) ̸= 0,
1490
+ −(S − P)π
1491
+ w1(0) ̸= 0, w2(0) = 0,
1492
+ −(T − P)π
1493
+ wj(0) = 0, j = 1, 2.
1494
+ Therefore,
1495
+ η(∞) − η(0) =
1496
+
1497
+
1498
+
1499
+
1500
+
1501
+
1502
+
1503
+
1504
+
1505
+
1506
+
1507
+
1508
+
1509
+
1510
+
1511
+
1512
+
1513
+ π(N + Q − P
1514
+ 2
1515
+ )
1516
+ wj(0) ̸= 0, j = 1, 2,
1517
+ π(N + R − P
1518
+ 2
1519
+ )
1520
+ w1(0) = 0, w2(0) ̸= 0,
1521
+ π(N + S − P
1522
+ 2
1523
+ )
1524
+ w1(0) ̸= 0, w2(0) = 0,
1525
+ π(N + T − P
1526
+ 2
1527
+ )
1528
+ wj(0) = 0, j = 1, 2.
1529
+
1530
+ 4. examples
1531
+ In this section we illustrate the trace formula and perturbation determinant obtained in theorem
1532
+ (1.1) with some examples.
1533
+ Example 4.1. For the δ interaction of strength α ∈ R, we can choose φ = 0, a = 1, b = 0, c = α
1534
+ and d = −1. Then according to theorem (1.1) the trace of the resolvent difference is given by
1535
+ Tr(RA
1536
+ V (ζ) − RA
1537
+ 0 (ζ)) = − 1
1538
+ 2ζ ln
1539
+ �θ′
1540
+ 1(0, ζ)θ2(0, ζ) + θ1(0, ζ)θ′
1541
+ 2(0, ζ) − αθ1(0, ζ)θ2(0, ζ)
1542
+ 2ζ + iα
1543
+
1544
+ and the expression for perturbation determinant is
1545
+ D(ζ) =
1546
+ 1
1547
+ 2iζ − α (θ′
1548
+ 1(0, ζ)θ2(0, ζ) + θ1(0, ζ)θ′
1549
+ 2(0, ζ) − αθ1(0, ζ)θ2(0, ζ)) .
1550
+ For α = 0 the δ conditions are commonly known as Kirchhoff conditions and in this case the above
1551
+ expressions coincide with the results obtained in Theorem (1.1) and Corollary (3.1) of [5] with n = 2
1552
+ (see also [20]).
1553
+ Example 4.2. The δ′ conditions are obtained by choosing φ = 0, a = −1, b = β, c = 0 and d = 1 in
1554
+ (1.3). In this case theorem (1.1) implies
1555
+ Tr(RA
1556
+ V (ζ) − RA
1557
+ 0 (ζ)) = − 1
1558
+ 2ζ ln
1559
+ �θ′
1560
+ 1(0, ζ)θ2(0, ζ) + θ1(0, ζ)θ′
1561
+ 2(0, ζ) − βθ′
1562
+ 1(0, ζ)θ′
1563
+ 2(0, ζ)
1564
+ 2ζ − iβζ2
1565
+
1566
+ and perturbation determinant is given by
1567
+ D(ζ) =
1568
+ 1
1569
+ 2iζ + βζ2 (θ′
1570
+ 1(0, ζ)θ2(0, ζ) + θ1(0, ζ)θ′
1571
+ 2(0, ζ) − βθ′
1572
+ 1(0, ζ)θ′
1573
+ 2(0, ζ)) .
1574
+
1575
+ 14
1576
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
1577
+ In the next two examples we use the notation Dxφ = φ(1) for the generalized derivative in the
1578
+ sense of [16].
1579
+ Example 4.3. The Schr¨odinger operator with the singular density −Dx (1 + σδ) Dx is equivalent
1580
+ to the operator HA
1581
+ V with φ = 0, a = 1, b = −σ ∈ R, c = 0 and d = −1 and the perturbation
1582
+ determinant is given by
1583
+ D(ζ) =
1584
+ 1
1585
+ 2iζ + σζ2 (θ′
1586
+ 1(0, ζ)θ2(0, ζ) + θ1(0, ζ)θ′
1587
+ 2(0, ζ) − σθ′
1588
+ 1(0, ζ)θ′
1589
+ 2(0, ζ)) .
1590
+ Example 4.4. For real σ1 and σ2 the two parameters family of Schr¨odinger operators with singular
1591
+ potential −D2
1592
+ x + σ1δ + σ2δ(1) + V is equivalent to the operator HA
1593
+ V with φ = 0, a = 2+σ2
1594
+ 2−σ2 , b = 0, c =
1595
+ 4σ1
1596
+ 4−σ2
1597
+ 2 , d = −
1598
+
1599
+ 2−σ2
1600
+ 2+σ2
1601
+
1602
+ (c.f. Section 3.2.4 of [16]). Theorem (1.1) implies the following expression for
1603
+ the perturbation determinant
1604
+ D(ζ) =
1605
+ ��
1606
+ 2+σ2
1607
+ 2−σ2
1608
+
1609
+ θ′
1610
+ 1(0, ζ)θ2(0, ζ) +
1611
+
1612
+ 2−σ2
1613
+ 2+σ2
1614
+
1615
+ θ1(0, ζ)θ′
1616
+ 2(0, ζ) −
1617
+
1618
+ 4σ1
1619
+ 4−σ2
1620
+ 2
1621
+
1622
+ θ1(0, ζ)θ2(0, ζ)
1623
+
1624
+ .
1625
+
1626
+ 8+2σ2
1627
+ 2
1628
+ 4−σ2
1629
+ 2
1630
+
1631
+ iζ −
1632
+
1633
+ 4σ1
1634
+ 4−σ2
1635
+ 2
1636
+
1637
+ 5. conclusions
1638
+ The Schr¨odinger operators on the real-line with generalized point interaction at zero can be imag-
1639
+ ined as a 2 × 2 matrix-valued Schr¨odinger operator on semi-axis with general self-adjoint conditions
1640
+ at zero. Scattering theory of matrix-valued Schr¨odinger operators on semi-axis with general self-
1641
+ adjoint conditions at zero has been studied in much detail in the last few years. On the other hand,
1642
+ explicit derivation of perturbation determinants and its connections with spectral shift function and
1643
+ Levinson’s formulas has received relatively less attention. The present article is devoted to explicit
1644
+ derivation of perturbation determinant via trace formula for Schr¨odinger operators and expressing
1645
+ Levinson’s formula and spectral shift function in terms of perturbation determinant. Our results com-
1646
+ plement the previous studies in this regard. We used operator theoretic approach in our derivations
1647
+ similar to Demirel’s work which deals with star graphs with Kirchhoff conditions at the vertex. The
1648
+ expressions for perturbation determinants are further used to derive LevinsonˆA’s formulas connecting
1649
+ the number of negative eigenvalues with phase shift. Phase shift is defined in terms of perturbation
1650
+ determinant. Looking forward, it would be interesting to extend and generalize the results on pertur-
1651
+ bation determinant to matrix-valued Schr¨odinger operators with most general self-adjoint conditions
1652
+ at zero.
1653
+ Appendix A. Estimate on trace norm of resolvent difference
1654
+ Here we’ll provide and explicit derivation of the estimate
1655
+ ||RA
1656
+ V (−t) − RA
1657
+ 0 (−t)||1 ≤ Cεt− 3
1658
+ 2 +ε
1659
+ for all ε > 0 and large t. We will need the following lemma.
1660
+ Lemma A.1 ( [5], Lemma 3.4 ). Let H be a Hilbert space and f, g ∈ H.
1661
+ Assume that R =
1662
+ (·, f)f − (·, g)g is an operator of rank two on H. Then, the trace norm of R is given by
1663
+ ||R||1 =
1664
+
1665
+ (||f||2 + ||g||2)2 − 4|(f, g)|2.
1666
+ (A.1)
1667
+ Moreover, if we let g = f + h then,
1668
+ (||f||2 + ||g||2)2 − 4|(f, g)|2 ≤ 6||h||2||f||2 + 3||h||4.
1669
+ (A.2)
1670
+ Lemma A.2. Assume that the potential V satisfies condition (1.2). Then the resolvents RA
1671
+ V of HA
1672
+ V
1673
+ and RA
1674
+ 0 of HA
1675
+ 0 satisfy, for all ε > 0 and for large t,
1676
+ ||RA
1677
+ V (−t) − RA
1678
+ 0 (−t)||1 ≤ Cεt− 3
1679
+ 2 +ε.
1680
+
1681
+ PERTURBATION DETERMINANT— August 24, 2022
1682
+ 15
1683
+ Proof. Let R1 = RA
1684
+ V (−t) − RD
1685
+ V (−t) + RD
1686
+ 0 (−t) − RA
1687
+ 0 (−t) and R2 = RD
1688
+ V (−t) − RD
1689
+ 0 (−t) then,
1690
+ RA
1691
+ V (−t) − RA
1692
+ 0 (−t) = R1 + R2.
1693
+ Hence
1694
+ ||RA
1695
+ V (−t) − RA
1696
+ 0 (−t)||1 ≤ ||R1||1 + ||R2||1.
1697
+ (A.3)
1698
+ Trace norm on R2 can be estimated as ||R2||1 ≤ ct− 3
1699
+ 2 +ε (c.f. Lemma 4.5.6. [23]). We only need to
1700
+ find estimate on the trace norm of rank two operator R1. By adding and subtracting the quantity
1701
+ θ2
1702
+ j(xj, i
1703
+
1704
+ t)
1705
+ L(i
1706
+
1707
+ t)θ2
1708
+ j (0, i
1709
+
1710
+ t) +
1711
+ e−2xj
1712
+
1713
+ t
1714
+ (d − a)
1715
+
1716
+ t + bt − c
1717
+ j = 1, 2
1718
+ in the diagonal of R1 we can re-write it as
1719
+ R1 = S1 + S2,
1720
+ where
1721
+ S1 =
1722
+
1723
+ 
1724
+ (a−
1725
+
1726
+ tb+1)e−2x1
1727
+ √t
1728
+ (d−a)
1729
+
1730
+ t+bt−c
1731
+
1732
+
1733
+ a+b
1734
+ θ′
1735
+ 2(0,i
1736
+
1737
+ t)
1738
+ θ2(0,i
1739
+
1740
+ t) +1
1741
+
1742
+ θ2
1743
+ 1(x1,i
1744
+
1745
+ t)
1746
+ L(i
1747
+
1748
+ t)θ2
1749
+ 1(0,i
1750
+
1751
+ t)
1752
+ 0
1753
+ 0
1754
+ (1−
1755
+
1756
+ tb−d)e−2x2
1757
+
1758
+ t
1759
+ (d−a)
1760
+
1761
+ t+bt−c
1762
+
1763
+
1764
+ b
1765
+ θ′
1766
+ 1(0,i
1767
+
1768
+ t)
1769
+ θ1(0,i
1770
+
1771
+ t) −d+1
1772
+
1773
+ θ2
1774
+ 2(x2,i
1775
+
1776
+ t)
1777
+ L(i
1778
+
1779
+ t)θ2
1780
+ 2(0,i
1781
+
1782
+ t)
1783
+
1784
+ 
1785
+ and
1786
+ (S2)j,k =
1787
+
1788
+ θj(xj,i
1789
+
1790
+ t)θk(xk,i
1791
+
1792
+ t)
1793
+ L(i
1794
+
1795
+ t)θj(0,i
1796
+
1797
+ t)θk(0,i
1798
+
1799
+ t) −
1800
+ e−(xj +xk)
1801
+
1802
+ t
1803
+ (d−a)
1804
+
1805
+ t+bt−c
1806
+
1807
+ j, k = 1, 2.
1808
+ Now, as S1 is a diagonal matrix and in order to apply definition of trace norm, we can let S1 = IS1I,
1809
+ where I is second order identity matrix. This implies,
1810
+ ||S1||1 = |σ1| + |σ2|
1811
+ where
1812
+ |σ1| =
1813
+ � ∞
1814
+ 0
1815
+ ������
1816
+ (a −
1817
+
1818
+ tb + 1)e−2x1
1819
+
1820
+ t
1821
+ (d − a)
1822
+
1823
+ t + bt − c
1824
+
1825
+
1826
+ a + b θ′
1827
+ 2(0,i
1828
+
1829
+ t)
1830
+ θ2(0,i
1831
+
1832
+ t) + 1
1833
+
1834
+ θ2
1835
+ 1(x1, i
1836
+
1837
+ t)
1838
+ L(i
1839
+
1840
+ t)θ2
1841
+ 1(0, i
1842
+
1843
+ t)
1844
+ ������
1845
+ dx1
1846
+ and
1847
+ |σ2| =
1848
+ � ∞
1849
+ 0
1850
+ ������
1851
+ (1 −
1852
+
1853
+ tb − d)e−2x2
1854
+
1855
+ t
1856
+ (d − a)
1857
+
1858
+ t + bt − c
1859
+
1860
+
1861
+ b θ′
1862
+ 1(0,i
1863
+
1864
+ t)
1865
+ θ1(0,i
1866
+
1867
+ t) − d + 1
1868
+
1869
+ θ2
1870
+ 2(x2, i
1871
+
1872
+ t)
1873
+ L(i
1874
+
1875
+ t)θ2
1876
+ 2(0, i
1877
+
1878
+ t)
1879
+ ������
1880
+ dx2.
1881
+ For t large enough, these expressions can be simplified to
1882
+ |σ1| ≈
1883
+ ����
1884
+ (a −
1885
+
1886
+ tb + 1)
1887
+ (d − a)
1888
+
1889
+ t + bt − c
1890
+ ����
1891
+ � ∞
1892
+ 0
1893
+ ���e−2x1
1894
+
1895
+ t − θ2
1896
+ 1(x1, i
1897
+
1898
+ t)
1899
+ ��� dx1
1900
+ =
1901
+ ����
1902
+ (a −
1903
+
1904
+ tb + 1)
1905
+ (d − a)
1906
+
1907
+ t + bt − c
1908
+ ����
1909
+ � ∞
1910
+ 0
1911
+ ���θ1(x1, i
1912
+
1913
+ t) − e−x1
1914
+
1915
+ t���
1916
+ ���θ1(x1, i
1917
+
1918
+ t) + e−x1
1919
+
1920
+ t��� dx1
1921
+ and
1922
+ |σ2| ≈
1923
+ ����
1924
+ (1 −
1925
+
1926
+ tb − d)
1927
+ (d − a)
1928
+
1929
+ t + bt − c
1930
+ ����
1931
+ � ∞
1932
+ 0
1933
+ ���θ2(x2, i
1934
+
1935
+ t) − e−x2
1936
+
1937
+ t���
1938
+ ���θ2(x2, i
1939
+
1940
+ t) + e−x2
1941
+
1942
+ t��� dx2.
1943
+ To find estimates for |σ1| and |σ2| we use the following estimates for large t
1944
+ ���θk(xk, i
1945
+
1946
+ t) − e−
1947
+
1948
+ txk
1949
+ ��� ≤ m1
1950
+
1951
+ t e−
1952
+
1953
+ txk
1954
+ (A.4)
1955
+ and
1956
+ ���θk(xk, i
1957
+
1958
+ t) + e−
1959
+
1960
+ txk)
1961
+ ��� ≤
1962
+ �m2
1963
+
1964
+ t + 2
1965
+
1966
+ e−
1967
+
1968
+ txk
1969
+ (A.5)
1970
+
1971
+ 16
1972
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
1973
+ This yields the following bounds
1974
+ |σ1| ≤
1975
+ ����
1976
+ (a −
1977
+
1978
+ tb + 1)
1979
+ (d − a)
1980
+
1981
+ t + bt − c
1982
+ ����
1983
+ m1(m2 + 2
1984
+
1985
+ t)
1986
+ 2t3/2
1987
+ = | − m1t−3/2 + O(t−2)|,
1988
+ |σ2| ≤
1989
+ ����
1990
+ (1 −
1991
+
1992
+ tb − d)
1993
+ (d − a)
1994
+
1995
+ t + bt − c
1996
+ ����
1997
+ m1(m2 + 2
1998
+
1999
+ t)
2000
+ 2t3/2
2001
+ = | − m1t−3/2 + O(t−2)|.
2002
+ Therefore
2003
+ |σ1| = |σ2| = O(t−3/2)
2004
+ and hence
2005
+ ||S1||1 = O(t−3/2).
2006
+ To find estimate on norm of S2, we use Lemma (A.1). Clearly, S2 = (·, f)f − (·, g)g is an operator
2007
+ of rank two, where
2008
+ fk(xk) =
2009
+ −e−xk
2010
+
2011
+ t
2012
+
2013
+ (d − a)
2014
+
2015
+ t + bt − c
2016
+ and
2017
+ gk(xk) =
2018
+ −θk(xk, i
2019
+
2020
+ t)
2021
+
2022
+ L(i
2023
+
2024
+ t)θk(0, i
2025
+
2026
+ t)
2027
+ .
2028
+ Let h = g − f, then
2029
+ hk(xk) =
2030
+ e−xk
2031
+
2032
+ t
2033
+
2034
+ (d − a)
2035
+
2036
+ t + bt − c
2037
+
2038
+ θk(xk, i
2039
+
2040
+ t)
2041
+
2042
+ L(i
2043
+
2044
+ t)θk(0, i
2045
+
2046
+ t)
2047
+ = −
2048
+
2049
+ θk(xk,
2050
+
2051
+ ti) − e−
2052
+
2053
+ txk
2054
+
2055
+ L(i
2056
+
2057
+ t)θk(0, i
2058
+
2059
+ t)
2060
+ +
2061
+
2062
+
2063
+ 1
2064
+
2065
+ L(i
2066
+
2067
+ t)θk(0, i
2068
+
2069
+ t)
2070
+
2071
+ 1
2072
+
2073
+ (d − a)
2074
+
2075
+ t + bt − c
2076
+
2077
+  e−
2078
+
2079
+ txk
2080
+
2081
+  .
2082
+ To compute estimate on ||h||2 =
2083
+ 2�
2084
+ k=1
2085
+
2086
+
2087
+ 0
2088
+ |hk(xk)|2 dxk, we use (2.13) and (A.4) and after some simpli-
2089
+ fications we obtain
2090
+ ||h||2 ≤
2091
+ m2
2092
+ 1
2093
+
2094
+ (d − a)
2095
+
2096
+ t + bt − c
2097
+
2098
+ t3/2 .
2099
+ Similarly,
2100
+ ||f||2 =
2101
+ 2
2102
+
2103
+ k=1
2104
+
2105
+
2106
+ 0
2107
+ ������
2108
+ −e−
2109
+
2110
+ txk
2111
+
2112
+ (d − a)
2113
+
2114
+ t + bt − c
2115
+ ������
2116
+ 2
2117
+ dxk =
2118
+ 1
2119
+
2120
+ (d − a)
2121
+
2122
+ t + bt − c
2123
+ � √
2124
+ t.
2125
+ The estimate on the right hand side of inequality (A.2) is now given by
2126
+ 6||h||2||f||2 + 3||h||4 ≤
2127
+ 6m2
2128
+ 1
2129
+
2130
+ (d − a)
2131
+
2132
+ t + bt − c
2133
+ �2 t2 +
2134
+ 3m4
2135
+ 1
2136
+
2137
+ (d − a)
2138
+
2139
+ t + bt − c
2140
+ �2 t3
2141
+ =
2142
+ 3m4
2143
+ 1 + 6m2
2144
+ 1t
2145
+
2146
+ (d − a)
2147
+
2148
+ t + bt − c
2149
+ �2 t3
2150
+ = 6m2
2151
+ 1
2152
+ b2t4 + 12m2
2153
+ 1(a − d)
2154
+ b3t
2155
+ 9
2156
+ 2
2157
+ + O(t−5)
2158
+ = O(t−4).
2159
+ This implies
2160
+ ||S2||1 = O(t−2)
2161
+
2162
+ PERTURBATION DETERMINANT— August 24, 2022
2163
+ 17
2164
+ and hence
2165
+ ||R1||1 = O(t− 3
2166
+ 2 ).
2167
+
2168
+ Declarations
2169
+ Ethics approval and consent to participate. Not applicable.
2170
+ Consent for publication. Not applicable.
2171
+ Availability of data and material. Not applicable
2172
+ Competing interests. The authors declare no competing interests.
2173
+ Funding. The research leading to these results received no funding.
2174
+ Authors’ contributions. M.U. conceptualized the study and drafted the manuscript.
2175
+ MD. Z.
2176
+ carried out the computations. All authors read and approved the final manuscript.
2177
+ References
2178
+ [1]
2179
+ S. Albeverio, F. Gesztesy, R. Høegh-Krohn, and H. Holden. Solvable models in quantum mechanics. AMS
2180
+ Chelsea Publishing, Providence, RI, second edition, 2005. With an appendix by Pavel Exner.
2181
+ [2]
2182
+ T. Aktosun, M. Klaus, R. Weder,
2183
+ Small-energy analysis for the self-adjoint matrix Schr¨odinger operator
2184
+ on the half line, J. Math. Phys., 52(10):102101, 24, (2011).
2185
+ [3]
2186
+ T. Aktosun, R. Weder, High-energy analysis and Levinson’s theorem for the self-adjoint matrix Schr¨odinger
2187
+ operator on the half line, J. Math. Phys. 54, 012108 (2013).
2188
+ [4]
2189
+ P. Deift, E. Trubowitz, Inverse scattering on the line, Comm. Pure Appl. Math., 32(2):121–251, (1979).
2190
+ [5]
2191
+ S. Demirel, The spectral shift function and Levinson’s theorem for quantum star graphs, J. Math. Phys. 53,
2192
+ 082110, (2012).
2193
+ [6]
2194
+ S. Demirel, M. Usman, Trace formulas for Schr¨odinger operators on the half-line, Bull. Math. Sci. 1(2),
2195
+ 397–427 (2011).
2196
+ [7]
2197
+ Yu. N. Demkov, V. N. Ostrovskii, Zero-range potentials and their applications in atomic Physics, Leningrad
2198
+ Univ. Press, Leningrad, (1975) (in Russian) ; Plenum Press, New York/London, (1988) (English translation)
2199
+ [8]
2200
+ P. Exner, Weakly coupled states on branching graphs, Lett. Math. Phys., 38(3):313 320, (1996).
2201
+ [9]
2202
+ P. Exner, H. Grosse, Some properties of the one-dimensional generalized point interactions (a torso),
2203
+ arXiv:math-ph/9910029.
2204
+ [10]
2205
+ N. I. Gerasimenko, The inverse scattering problem on a noncompact graph, Teoret. Mat. Fiz., 75(2):187–200,
2206
+ (1988).
2207
+ [11]
2208
+ M. S. Harmer, Inverse scattering for the matrix Schr¨odinger operator and Schr¨odinger operator on graphs
2209
+ with general self-adjoint boundary conditions, ANZIAM J., 44(1):161–168, (2002).
2210
+ [12]
2211
+ M. S. Harmer,
2212
+ The matrix Schr¨odinger operator and Schr¨odinger operator on graphs, In Ph. D. thesis.
2213
+ University of Auckland, New Zealand, (2004).
2214
+ [13]
2215
+ M.S. Harmer, Inverse scattering on matrices with boundary conditions, J. Phys. A 38, 4875ˆA–4885 (2005).
2216
+ [14]
2217
+ M. Kohmoto, T. Koma and S. Nakamura, The spectral shift function and the Friedel sum rule Ann. H.
2218
+ Poincare. 14, 1413ˆA–1424 (2013).
2219
+ [15]
2220
+ M. G. Krein, On the Trace Formula in Perturbation Theory, Mat. Sb. 33 (75), 597ˆA–626 (1953).
2221
+ [16]
2222
+ P. Kurasov, Distribution theory for discontinuous test functions and differential operators with generalized
2223
+ coefficients, Journal of Mathematical Analysis and Applications, Volume 201, Issue 1, 297-323, (1996).
2224
+ [17]
2225
+ S. T. Kuroda, On a generalization of the Weinstein Aronszajn formula and the infinite determinant, Sci.
2226
+ Papers Coll. Gen. Ed. Univ. Tokyo 11, 1ˆA–12 (1961).
2227
+ [18]
2228
+ P. ˇSeba, The generalized point interaction in one dimension, Czech. J. Phys., B36, 667ˆA–673 (1986).
2229
+ [19]
2230
+ M. Usman, A. A. Zaidi, Trace formulas for Schr¨dinger operators on star graphs with general matching
2231
+ conditions, J. Phys. A: Math. Theor. 51(36), 365301, (2018).
2232
+ [20]
2233
+ M. Usman, M.D. Zia, A trace formula, perturbation determinant and Levinson’s theorem for a class of
2234
+ quantum star graphs, Eur. Phys. J. Plus 137, 654 (2022).
2235
+ [21]
2236
+ R. Weder, Scattering theory for the matrix Schr¨odinger operator on the half line with general boundary
2237
+ conditions, J. Math. Phys. 56(9), 092103, (2015).
2238
+
2239
+ 18
2240
+ MUHAMMAD USMAN AND MUHAMMAD DANISH ZIA
2241
+ [22]
2242
+ R. Weder, Trace formulas for the matrix Schr¨odinger operator on the half-line with general boundary con-
2243
+ ditions, J. Math. Phys. 57(11), 112101, (2016).
2244
+ [23]
2245
+ D. R. Yafaev, Mathematical Scattering Theory, Analytic Theory, Mathematical Surveys and Monographs,
2246
+ vol. 158. American Mathematical Society, Providence (2010).
2247
+ Muhammad Usman, Department of Mathematics, Lahore University of Management Sciences (LUMS),
2248
+ Lahore, Pakistan
2249
+ Email address: usman@lums.edu.pk
2250
+ Muhammad Danish Zia, Department of Basic Sciences, School of Civil Engineering, National University
2251
+ of Sciences and Technology (NUST), Islamabad, Pakistan
2252
+ Email address: dazia@mce.nust.edu.pk
2253
+
2tFIT4oBgHgl3EQf5CvJ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4NFIT4oBgHgl3EQf6iua/content/tmp_files/2301.11394v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
4NFIT4oBgHgl3EQf6iua/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4tFAT4oBgHgl3EQfFByL/content/2301.08425v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:689d2291c07afd0aa59048bfb52cbb47bca3d6936223dab27a4a0ff301fc1a30
3
+ size 302093
59AyT4oBgHgl3EQf2fl-/content/tmp_files/2301.00752v1.pdf.txt ADDED
@@ -0,0 +1,2274 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Date of current version January 1, 2023.
2
+ Point Cloud-based
3
+ Proactive Link Quality Prediction
4
+ for Millimeter-wave Communications
5
+ Shoki Ohta1, Student Member, IEEE, Takayuki Nishio1, Senior Member, IEEE,
6
+ Riichi Kudo2, Member, IEEE, Kahoko Takahashi2, Hisashi Nagata2,
7
+ 1School of Engineering, Tokyo Institute of Technology, Tokyo 152-8550, Japan
8
+ 2NTT Network Innovation Laboratories, NTT Corporation, Yokosuka 239-0847, Japan
9
+ Corresponding author: Takayuki Nishio (email: nishio@ict.e.titech.ac.jp).
10
+ This work was supported in part by JSPS KAKENHI Grant Number JP22H03575.
11
+ This article was presented in part at the 95th IEEE Vehicular Technology Conference (VTC2022-Spring).
12
+ ABSTRACT This study demonstrates the feasibility of point cloud-based proactive link quality prediction
13
+ for millimeter-wave (mmWave) communications. Image-based methods to quantitatively and determinis-
14
+ tically predict future received signal strength using machine learning from time series of depth images
15
+ to mitigate the human body line-of-sight (LOS) path blockage in mmWave communications have been
16
+ proposed. However, image-based methods have been limited in applicable environments because camera
17
+ images may contain private information. Thus, this study demonstrates the feasibility of using point clouds
18
+ obtained from light detection and ranging (LiDAR) for the mmWave link quality prediction. Point clouds
19
+ represent three-dimensional (3D) spaces as a set of points and are sparser and less likely to contain sensitive
20
+ information than camera images. Additionally, point clouds provide 3D position and motion information,
21
+ which is necessary for understanding the radio propagation environment involving pedestrians. This study
22
+ designs the mmWave link quality prediction method and conducts two experimental evaluations using
23
+ different types of point clouds obtained from LiDAR and depth cameras, as well as different numerical
24
+ indicators of link quality, received signal strength and throughput. Based on these experiments, our proposed
25
+ method can predict future large attenuation of mmWave link quality due to LOS blockage by human bodies,
26
+ therefore our point cloud-based method can be an alternative to image-based methods.
27
+ INDEX TERMS LiDAR, link quality prediction, machine learning, millimeter-wave communication, point
28
+ cloud
29
+ I. INTRODUCTION
30
+ W
31
+ ITH the rapid expansion of wireless communica-
32
+ tion applications, the microwave frequency band is
33
+ strained and the utilization of higher frequency bands, such
34
+ as millimeter-wave (mmWave) is underway. mmWave com-
35
+ munication is crucial for extremely high transmission rate
36
+ in the fifth-generation (5G) mobile communication system
37
+ and wireless local area network (WLAN) standard IEEE
38
+ 802.11ad/ay because mmWave communication can provide
39
+ wide bandwidth [1]–[4]. This high transmission rate enables
40
+ applications that require significant amounts of traffic, such
41
+ as virtual and augmented realities (VR/AR), environment
42
+ sensing, and ultra-high-definition (UHD) video streaming.
43
+ Thus, mmWave communications greatly increase the possi-
44
+ bilities of wireless communications and are expected to have
45
+ a variety of applications.
46
+ Despite its wide bandwidth, mmWave communication
47
+ has technical challenges, such as sensitivity to line-of-sight
48
+ (LOS) path blockage, radio directivity, significant path loss,
49
+ and narrow beamwidth, owing to its short wavelengths. The
50
+ link quality significantly deteriorates when the mmWave
51
+ LOS path is blocked by a human body or vehicle [5].
52
+ mmWave communications are expected to be used for indoor
53
+ and dense urban environments, such as VR/AR applications
54
+ in private residences, environment sensing and equipment
55
+ control in factories, and UHD video streaming at event
56
+ venues. Such indoor or dense urban environments are com-
57
+ mon in residential or industrial spaces, and the mmWave
58
+ LOS path blocked by human bodies or robots occurs fre-
59
+ VOLUME ,
60
+ 1
61
+ arXiv:2301.00752v1 [cs.NI] 2 Jan 2023
62
+
63
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
64
+ quently. When mmWave is used under these conditions,
65
+ communication disconnections occur frequently and the
66
+ average throughput significantly decreases compared with
67
+ LOS communication. Therefore, it is effective to predict the
68
+ future wireless communication environment and adaptively
69
+ control communications in order to fully utilize the high
70
+ transmission rate of mmWave communications.
71
+ Computer vision-aided (CV-aided) mmWave communi-
72
+ cations are gaining a lot of attention as a solution to
73
+ the mmWave LOS blockage problem [6]–[8]. CV-aided
74
+ mmWave communications employ camera and CV tech-
75
+ niques, including machine learning (ML), to accurately pre-
76
+ dict mmWave link quality (e.g. received signal strength and
77
+ throughput). Camera images may include the geometry and
78
+ dynamics of the mmWave communication radio propagation
79
+ environment, such as locations and movements of obstacles.
80
+ ML algorithms learn the mapping of camera images and
81
+ link quality. Based on the accurate and deterministic link
82
+ prediction, proactive communication controls such as trans-
83
+ mission power control, base station handover, beamforming,
84
+ frequency switching, and intelligent reflecting surface (IRS)
85
+ control [9] are performed. Above proactive communication
86
+ control can mitigate mmWave LOS blockage effects. Our
87
+ previous work demonstrated that a deep learning-based
88
+ method can predict mmWave received signal strength 500 ms
89
+ ahead from depth camera images [7].
90
+ However, images may contain confidential information,
91
+ particularly in private residences, offices, and factories. This
92
+ property limits the application scenarios of the existing
93
+ CV-aided mmWave communication systems that leverage
94
+ cameras. Therefore, alternative sources of information on the
95
+ mmWave communications environment are required.
96
+ This study proposes a link quality prediction method using
97
+ point clouds as an alternative to images. A point cloud
98
+ represents three-dimensional (3D) space as a set of points
99
+ and can be obtained by light detection and ranging (LiDAR),
100
+ or depth cameras. LiDAR estimates the distance to objects
101
+ by measuring the time difference between the emission of
102
+ light and the arrival of the reflected light [10]. Compared
103
+ with images, point clouds are sparse and less likely to
104
+ contain private information [11], [12]. Owing to privacy
105
+ concerns, LiDAR is increasingly being installed in place of
106
+ cameras for sensing. Point clouds have many applications
107
+ such as robot operations [13], autonomous driving [14],
108
+ [15], and digital twin [16], [17]. Wireless communications
109
+ are expected to increase in value by integrating with these
110
+ fields. Further, point clouds acquired from LiDAR are supe-
111
+ rior to images regarding 3D position accuracy and lighting
112
+ robustness. Cameras may not be able to observe objects
113
+ at distant locations or accurately measure distances. Point
114
+ clouds obtained from LiDAR have more detailed coordinate
115
+ information of 3D space than images because the surface of
116
+ an object can be accurately obtained as 3D information [18].
117
+ Cameras are susceptible to sun glare, such as direct light
118
+ and backlight [19], and using them in the dark is difficult.
119
+ Our LiDAR point cloud-based system can operate the link
120
+ quality prediction system without the influence of sunlight or
121
+ lighting. Therefore, point clouds can be used as an alternative
122
+ feature to images in predicting link quality.
123
+ This study focuses on the feasibility of mmWave link
124
+ quality prediction from point clouds. Previous studies [8],
125
+ [20] showed that the link state, i.e., LOS or non-LOS
126
+ (NLOS), can be predicted from the point cloud. However, the
127
+ quantitative prediction of the future received signal strength
128
+ or throughput (e.g. 500 ms or 1000 ms ahead), which enables
129
+ fine-grade link control but is a more challenging task than
130
+ classifying LOS or NLOS, was out of scope. Furthermore,
131
+ the deep learning algorithms employed in the conventional
132
+ image-based prediction [7] cannot be applied to point cloud-
133
+ based prediction owing to the large data domain gap between
134
+ point clouds and images. Therefore, we construct a prepro-
135
+ cessing method of point clouds suitable for the link quality
136
+ prediction, which transforms point clouds into a different
137
+ representation of 3D space, voxel grids. We then selected
138
+ regression ML algorithms for link quality prediction that can
139
+ be applied to voxel grids.
140
+ This study demonstrates the feasibility of the point cloud-
141
+ based link quality prediction by conducting experiments in
142
+ an environment closer to practical environments compared
143
+ with existing study [7]. In terms of experimental equipment,
144
+ commercially available IEEE 802.11ad-compliant devices
145
+ were used for the access point (AP) and the station (STA). In
146
+ terms of link quality, we used two numerical indicators with
147
+ slightly different characteristics: received signal strength
148
+ and throughput. In terms of point clouds, we used two
149
+ types of point clouds with different properties acquired with
150
+ different devices: LiDAR and depth cameras. In addition
151
+ to regression-based loss function, root-mean-squared error
152
+ (RMSE), the empirical distribution function of absolute
153
+ errors was used to quantitatively evaluate the prediction error.
154
+ The contributions of this study are summarized as follows:
155
+ • We demonstrated the feasibility of proactive mmWave
156
+ link quality prediction using point clouds, which rep-
157
+ resent 3D spaces, are sparse and contain less private
158
+ information than camera images through experiments.
159
+ • We constructed a preprocessing method to extract fea-
160
+ tures of point clouds for link quality prediction. We
161
+ selected regression ML algorithms suitable to quanti-
162
+ tatively and deterministically predict link quality and
163
+ compared these methods.
164
+ • We evaluated our point cloud-based method by con-
165
+ ducting two kinds of experiments in indoor environ-
166
+ ments, each with different point cloud acquisition de-
167
+ vices and link quality indicators. One of the experi-
168
+ ments was conducted in a more practical environment
169
+ than that of the previous study [7].
170
+ This study is an extension in terms of the prediction
171
+ method and evaluation of our previous study [21]. In the
172
+ evaluation using the depth camera point cloud and received
173
+ 2
174
+ VOLUME ,
175
+
176
+ signal strength dataset, link quality at more future time
177
+ steps is predicted and prediction errors were evaluated in
178
+ detail using the distribution of prediction errors. Moreover,
179
+ a new mmWave communication experiment using LiDAR
180
+ point cloud and throughput was conducted to evaluate the
181
+ prediction method. These evaluations under two different
182
+ experimental conditions show that our proposed point cloud-
183
+ based link quality prediction method has high prediction
184
+ accuracy and versatility.
185
+ The remainder of this paper is organized as follows.
186
+ Section II describes related works on mmWave link qual-
187
+ ity prediction and point clouds application for wireless
188
+ communication. Section III describes the system model,
189
+ formulation, preprocessing method, and prediction methods
190
+ of our point cloud-based mmWave link quality prediction.
191
+ In Sections IV and V, our proposed method is evaluated
192
+ through two experiments using depth camera point clouds
193
+ and received signal strength datasets, and LiDAR point
194
+ clouds and throughput datasets, respectively. Section VI
195
+ discusses possible approaches other than our method for
196
+ mmWave link quality prediction. Section VII concludes this
197
+ paper.
198
+ II. RELATED WORKS
199
+ This section summarizes existing research on mmWave link
200
+ quality prediction and applications of point clouds for wire-
201
+ less communication. As mentioned in Section I, the link
202
+ quality prediction task is critical in the proactive control of
203
+ mmWave communications. Therefore, various methods have
204
+ been proposed, including vision features such as cameras,
205
+ radar, and LiDAR, as well as various assumed environ-
206
+ ments such as indoor and outdoor. Related works on the
207
+ application of point clouds for wireless communications are
208
+ listed in Table 1. Our proposed point cloud-based mmWave
209
+ link quality prediction method and evaluation approach are
210
+ orthogonal to these studies and increase the potential for
211
+ mmWave communication.
212
+ Numerous studies on link quality prediction has been con-
213
+ ducted [7], [8], [20], [22]–[27]. First, for related works [7],
214
+ [8], [20], [22]–[24] with numerous similarities to this study,
215
+ we demonstrated a comparison in Table 2 and discussed it
216
+ in detail.
217
+ Our previous study [7] used camera images as the key
218
+ enabler of proactive mmWave link quality prediction. Cam-
219
+ era images capture vision information about the environment
220
+ and thus contain information necessary to predict mmWave
221
+ communication LOS path blockage. The mmWave com-
222
+ munication environment was captured by a depth camera,
223
+ and ML was used to predict future received signal strength
224
+ indicator (RSSI) using time series data of depth images.
225
+ Three ML algorithms were used: two neural networks, in-
226
+ cluding convolution and convolutional long short-term mem-
227
+ ory (ConvLSTM) [30], and random forest [31]. Experiments
228
+ are conducted indoors in a scenario in which a 60 GHz
229
+ band mmWave communication LOS path is blocked by
230
+ pedestrians. Experimental evaluation results show that large
231
+ attenuations of the RSSI 500 ms ahead can be predicted. This
232
+ result suggests that ML models can learn the relationship
233
+ between the movement information of obstacles to the LOS
234
+ path in the time series of camera images and future link
235
+ quality. However, as mentioned in Section I, camera images
236
+ may contain private information, such as human faces, texts
237
+ of documents, or screens of computers. Therefore, the image-
238
+ based RSSI prediction system [7] is difficult to apply in
239
+ places with strict privacy-related constraints. In environments
240
+ such as private homes, company offices, and hospitals, non-
241
+ image-based link quality prediction methods can solve this
242
+ problem. We solved this problem by using point clouds,
243
+ which are sparser than images and can rarely identify per-
244
+ sonal and sensitive information.
245
+ Wu et al. [8] proposed a mmWave blockage prediction
246
+ method using ML that converts point clouds obtained from
247
+ a LiDAR observing a mmWave communication environment
248
+ into a heat map image. Point clouds are converted to
249
+ heatmaps by the distance to the reflection point for each
250
+ horizontal angle and arranging them in the time direction.
251
+ Link quality is predicted as a binary value of LOS or NLOS.
252
+ An experiment was conducted in a scenario in which the
253
+ mmWave communication LOS path is blocked by vehicles
254
+ in an outdoor environment. The neural network (NN) model
255
+ including convolution learns the relationship between the
256
+ heatmap image and the binary label. Based on the eval-
257
+ uation results, the system predicts blockages that occur
258
+ within 100 ms with 95% accuracy and blockages that occur
259
+ within 1000 ms with more than 80% accuracy. However,
260
+ this experiment was conducted in an outdoor environment
261
+ using vehicles, and this study does not focus on clarifying
262
+ the possibility of predicting future blockage in an indoor
263
+ environment where the human body blocks the LOS path of
264
+ mmWave communications. Moreover, this method predicts
265
+ whether the communication LOS path is blocked or not
266
+ because this method uses the binary values of LOS or NLOS
267
+ as the link quality, and predicting the degree of link quality
268
+ degradation is beyond the scope.
269
+ Marasinghe et al. [20] proposed a mmWave communi-
270
+ cation LOS path blockage prediction method by detecting
271
+ human position and motion from point clouds and predicting
272
+ future positions. An NN model, including long short-term
273
+ memory (LSTM) [32] was used to predict the future human
274
+ bounding box, and a ray tracing algorithm was used to
275
+ predict blockage. Link quality was predicted as a binary
276
+ value of LOS or NLOS. This method was evaluated through
277
+ computer simulations in a scenario in which the mmWave
278
+ or terahertz (THz) communication LOS path was blocked by
279
+ humans in an indoor environment. The system could predict
280
+ future blockages with an accuracy of 87% while maintaining
281
+ 78% precision and 79% recall 300 ms ahead. However, this
282
+ experiment was conducted as a computer simulation, and
283
+ this study does not focus on whether link quality values can
284
+ be predicted with equivalent accuracy in a real-world radio
285
+ VOLUME ,
286
+ 3
287
+
288
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
289
+ TABLE 1. Summary of related works on the application of point clouds for wireless communications
290
+ Existing works
291
+ [7]
292
+ [8]
293
+ [20]
294
+ [22]
295
+ [23]
296
+ [24]
297
+ [25]
298
+ [26]
299
+ [27]
300
+ [28]
301
+ [29]
302
+ Ours
303
+ Link quality prediction
304
+
305
+
306
+
307
+
308
+
309
+
310
+
311
+
312
+
313
+
314
+ mmWave
315
+
316
+
317
+
318
+
319
+
320
+
321
+
322
+
323
+
324
+
325
+ Point cloud
326
+
327
+
328
+
329
+
330
+
331
+
332
+
333
+
334
+
335
+ Camera image
336
+
337
+
338
+ Experimental evaluation
339
+
340
+
341
+
342
+
343
+
344
+
345
+
346
+
347
+
348
+ LOS blockage by pedestrians
349
+
350
+
351
+
352
+
353
+
354
+ Look ahead prediction
355
+
356
+
357
+
358
+
359
+ TABLE 2. Comparison of link quality prediction methods for reliable mmWave communications
360
+ Existing works
361
+ [7]
362
+ [8]
363
+ [20]
364
+ [22]
365
+ [23]
366
+ [24]
367
+ Ours
368
+ Vision sensor
369
+ Depth camera
370
+ LiDAR
371
+ LiDAR
372
+ LiDAR
373
+ RGB camera
374
+ mmWave radar
375
+ Depth camera
376
+ & LiDAR
377
+ Raw data
378
+ Depth image
379
+ Point cloud
380
+ Point cloud
381
+ Point cloud
382
+ RGB image
383
+ Point cloud
384
+ Point cloud
385
+ Feature for prediction
386
+ Depth image
387
+ Heatmap image
388
+ Bounding box
389
+ 3D histogram Bounding box Link quality map
390
+ Voxel grid
391
+ Frequency band
392
+ 60 GHz
393
+ 60 GHz
394
+ (mmWave/THz)
395
+ 60 GHz
396
+ 28 GHz
397
+ 60 GHz
398
+ 60 GHz
399
+ Evaluation method
400
+ Simulation &
401
+ Experiment
402
+ Experiment
403
+ Simulation
404
+ Simulation
405
+ Experiment
406
+ Simulation &
407
+ Experiment
408
+ Experiment
409
+ Evaluation environment
410
+ Indoor
411
+ Outdoor
412
+ Indoor
413
+ Outdoor
414
+ Indoor
415
+ Outdoor
416
+ Indoor
417
+ LOS path blocker
418
+ Pedestrian
419
+ Vehicle
420
+ Pedestrian
421
+ Vehicle
422
+ Pedestrian
423
+ Vehicle
424
+ Pedestrian
425
+ Prediction formulation
426
+ Regression
427
+ Classification
428
+ Classification
429
+ Classification
430
+ Classification
431
+ Regression
432
+ Regression
433
+ Link quality indicator
434
+ RSSI
435
+ LOS or
436
+ NLOS
437
+ LOS or
438
+ NLOS
439
+ LOS or
440
+ NLOS
441
+ LOS or
442
+ NLOS
443
+ RSSI
444
+ RSSI &
445
+ Throughput
446
+ How far ahead to predict
447
+ 500 ms
448
+ 1000 ms
449
+ 300 ms
450
+
451
+
452
+
453
+ 1000 ms
454
+ propagation space. In addition, similar to [8], this system
455
+ used binary values of LOS or NLOS as the link quality.
456
+ Therefore, this method concentrates on demonstrating the
457
+ feasibility of predicting whether the communication LOS
458
+ path is blocked, not the actual attenuation value of the link
459
+ quality in the real-world radio propagation space.
460
+ Klautau et al. [22] proposed a point cloud-based LOS
461
+ blockage prediction method for mmWave beam selection.
462
+ In this method, LiDAR point clouds observed in a wire-
463
+ less communication environment were converted into 3D
464
+ histograms, and LOS probability was inferred using a con-
465
+ volutional NN. This method has been evaluated to dis-
466
+ criminate LOS with a 90% accuracy through simulations
467
+ in a vehicle-to-infrastructure (V2I) scenario. However, this
468
+ method predicts binary labels, LOS or NLOS, therefore this
469
+ method does not focus on the quantitative and deterministic
470
+ prediction of future link quality from LiDAR point clouds.
471
+ Zhang et al. [23] demonstrated a platform for beam
472
+ tracking and blockage prediction, using stereo cameras
473
+ and LiDAR for mmWave communications and frequency
474
+ switching from mmWave to sub-6 just before a blockage
475
+ occurs. In particular, objects blocking the mmWave LOS
476
+ path were detected based on RGB images, and the blockage
477
+ was predicted using recurrent neural network (RNN) from
478
+ the time series of bounding boxes. The transmitter (Tx)
479
+ and receiver (Rx) were simultaneously detected from the
480
+ LiDAR point cloud and used for beam tracking. However,
481
+ this method does not use LiDAR point clouds for blockage
482
+ prediction, and the feasibility of link quality prediction from
483
+ point clouds is beyond the scope of the study. Moreover,
484
+ similar to the aforementioned studies, the prediction of the
485
+ degree of attenuation of link quality values quantitatively and
486
+ deterministically was not discussed because this system uses
487
+ binary values, LOS or NLOS, as the link quality.
488
+ Asano et al. [24] proposed an RSSI prediction method
489
+ of mmWave communications in the 60 GHz band to control
490
+ the timing of communications from the viewpoint of power
491
+ efficiency. In particular, a scenario in which a mmWave
492
+ communication path was blocked by a large vehicle in an
493
+ outdoor environment was assumed, and the vehicle path was
494
+ first estimated theoretically. Subsequently, a dynamic link
495
+ quality map was generated based on the static link quality
496
+ map created in advance through simulations, overriding the
497
+ link quality of the blocked area calculated from the pre-
498
+ dicted position of the vehicle obtained from path prediction.
499
+ Communication timing control was performed based on the
500
+ predicted link quality. The average throughput value was 2.2
501
+ times higher than that of the conventional method. However,
502
+ the method does not focus on whether future link quality
503
+ values can be quantitatively predicted for pedestrians in an
504
+ indoor environment because experiments were conducted in
505
+ an outdoor environment.
506
+ Next, we summarize link quality LOS blockage prediction
507
+ methods enumerated in Table 1 but not in Table 2. Yamazaki
508
+ 4
509
+ VOLUME ,
510
+
511
+ et al. [25] proposed the prediction method of the received
512
+ path power for 25 GHz radio waves communication, instead
513
+ of using images or point clouds. The transfer function is
514
+ divided into a narrower bandwidth, and the first path obtained
515
+ from the narrow-band channel is used to infer the received
516
+ path power. Egi et al. [26] proposed an ML-based estimation
517
+ method to estimate the path loss of 1.8 GHz radio waves from
518
+ satellite images and point clouds in outdoor environments
519
+ where static obstacles, such as trees and buildings block
520
+ signals. J¨arvel¨ainen et al. [27] proposed and experimentally
521
+ evaluated a LOS probability prediction method in outdoor
522
+ environments using accurate environmental point clouds.
523
+ In addition to link quality prediction, applications of
524
+ point clouds for mmWave communications have been pro-
525
+ posed [28], [29]. J¨arvel¨ainen et al. [28] proposed a point
526
+ cloud-based ray-tracing simulation method for indoor prop-
527
+ agation of mmWave channels. St´ephan et al. [29] evaluated
528
+ the influence of the complexity of LiDAR-acquired geo-
529
+ graphic data in point clouds format and propagation models
530
+ in 60 GHz mmWave communications on the prediction of
531
+ 60 GHz mesh backhaul links in urban environments. In par-
532
+ ticular, this method was proposed to predict LOS probabili-
533
+ ties for outdoor environments using accurate environmental
534
+ data from point clouds.
535
+ Therefore, many existing studies have indicated the signif-
536
+ icance of point clouds in wireless communications. However,
537
+ these studies do not focus on whether the future link quality
538
+ of mmWave communications, which dynamically changes
539
+ due to human blockage, can be quantitatively and deter-
540
+ ministically predicted from point clouds rather than camera
541
+ images.
542
+ III. POINT CLOUD-BASED LINK QUALITY PREDICTION
543
+ A. SYSTEM MODEL
544
+ The system model of point cloud-based link quality predic-
545
+ tion is shown in Fig. 1. This system consists of APs and
546
+ STAs for mmWave communication, LiDAR or depth camera
547
+ to observe the environment and obtain point clouds, a pre-
548
+ processing unit, a prediction unit, and a network controller.
549
+ On the STA, applications requiring large amounts of data are
550
+ in use, and the AP and STA generate large amounts of traffic
551
+ through mmWave communications. LiDAR acquires and
552
+ transmits point clouds to the preprocessing unit. The Prepro-
553
+ cessing unit reduces data volume and noise of point clouds,
554
+ and converts data format. The details of the preprocessing
555
+ unit are described in Section III-D. The prediction unit infers
556
+ future and current link quality values, such as RSSI or
557
+ throughput, using ML. The details of the prediction unit are
558
+ described in Section III-E. The AP measures and reports the
559
+ link quality value to the network controller. The network
560
+ controller instructs APs to take appropriate communication
561
+ control actions, such as handover, beamforming, frequency
562
+ switching, and IRS control based on the predicted link
563
+ quality and the current link quality before the link quality
564
+ deteriorates significantly due to LOS blockage. Above proac-
565
+ mmWave AP
566
+ LiDAR
567
+ mmWave AP
568
+ Preprocessing Unit
569
+ Prediction Unit
570
+ Communicating
571
+ with STA
572
+ mmWave STA
573
+ Not Communicating
574
+ with STA
575
+ Network Controller
576
+ Measured current
577
+ link quality
578
+ Predicted future
579
+ link quality
580
+ Predicted current
581
+ link quality
582
+ Point cloud
583
+ Time-series voxel grid
584
+ Control instructions
585
+ Control instructions
586
+ Pedestrian
587
+ LOS path
588
+ FIGURE 1. The system model of proactive communication control for
589
+ reliable mmWave communication based on link quality prediction using
590
+ point clouds.
591
+ tive communication control enables reliable mmWave com-
592
+ munications. Note that network controls are not discussed in
593
+ this paper because our focus is demonstrating the feasibility
594
+ of link quality prediction. The system model in this study
595
+ is consistent with the system that replaced the camera with
596
+ LiDAR in our previous study [7].
597
+ We assume an indoor scenario such as residences, offices,
598
+ and public facilities. Pedestrians in the mmWave radio
599
+ propagation space move aperiodically, and the mobility is
600
+ observed as point clouds obtained by LiDAR. In mmWave
601
+ communications, link quality (i.e., RSSI and throughput) is
602
+ significantly degraded when the LOS path is blocked by
603
+ pedestrians. This study assumes a simple case in which the
604
+ AP and STA do not move, and the LOS between the AP and
605
+ STA is within the field of view of the LiDAR. Therefore,
606
+ the point cloud is expected to contain the essential visual
607
+ information of mmWave radio propagation in mmWave
608
+ communications.
609
+ B. FORMULATION OF POINT CLOUD-BASED LINK
610
+ QUALITY PREDICTION
611
+ This study aims to quantitatively and deterministically pre-
612
+ dict future link quality (i.e., RSSI or throughput) from time
613
+ series data of point clouds representing radio propagation
614
+ spaces of mmWave communications. This problem can be
615
+ formulated as a regression that maps from the time series
616
+ data of a point cloud to future link quality values. Let n be
617
+ the number of points and pi = (xi, yi, zi) be the coordinates
618
+ of the i-th point, the point cloud P is as follows:
619
+ P =
620
+ n−1
621
+
622
+ i=0
623
+ {(xi, yi, zi)} .
624
+ (1)
625
+ Note that the points in the point cloud are in no particular
626
+ order. Let Pt be the point cloud at timestep t, the time series
627
+ data Dt,s of the point cloud for the previous s timesteps at
628
+ some timestep t is as follows:
629
+ Dt,s = (Pt−s+1, Pt−s+2, · · · , Pt) .
630
+ (2)
631
+ Let qt ∈ R be the link quality value at a particular timestep t,
632
+ qt+k represents k timesteps ahead link quality value from a
633
+ VOLUME ,
634
+ 5
635
+
636
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
637
+ particular timestep t. The regression task can be formulated
638
+ as determining the following regression mapping f from the
639
+ time series of point clouds Dt,s for k timesteps ahead of the
640
+ link quality,
641
+ qt+k = f(Dt,s).
642
+ (3)
643
+ C. PREDICTION METHOD DESIGN POLICY
644
+ We use a supervised learning framework to solve the afore-
645
+ mentioned regression task. Generally, supervised learning
646
+ requires a large number of labeled datasets to obtain an
647
+ accurate mapping. In the proposed system, labeling can be
648
+ automatic, using the observed link quality, and constructing a
649
+ large labeled dataset is easy, unlike tasks that require manual
650
+ labelings, such as object detection and segmentation.
651
+ The system using the supervised learning framework re-
652
+ quires two phases: training phase and prediction
653
+ phase. In the training phase, the ML model learns
654
+ the correspondence between data and labels using a labeled
655
+ dataset. In the prediction phase, labels are predicted
656
+ from unlabeled data. In the point cloud-based link quality
657
+ prediction task, data and labels are point clouds and link
658
+ quality values, respectively. The method of generating la-
659
+ beled datasets is described in Section III-D.
660
+ Varieties of supervised learning algorithms exist, and we
661
+ selected the appropriate algorithm for link quality predic-
662
+ tion. A simple approach is to apply deep learning models
663
+ specialized in point clouds, such as PointNet [33], [34] and
664
+ VoteNet [35], which can directly input point clouds. These
665
+ point cloud-based models can directly map from point clouds
666
+ to the target values. However, based on our preliminary
667
+ experiments, these models could not predict link quality.
668
+ Therefore, this study adopted a method that is a 3D extension
669
+ of the method used in the previous study [7]. Specifically,
670
+ point clouds are converted into a data format that can be
671
+ handled by a convolutional neural network (CNN).
672
+ The proposed method consists of preprocessing that con-
673
+ verts point clouds to a voxel format and an ML model to
674
+ learn a mapping from the time series voxel grid to the future
675
+ link quality value such as RSSI and throughput. Section III-
676
+ D and Section III-E describe the preprocessing method and
677
+ ML model, respectively.
678
+ D. PREPROCESSING METHODS FOR POINT CLOUDS
679
+ In the preprocessing unit, downsampling and denoising are
680
+ applied to raw point clouds because raw point clouds ob-
681
+ tained by LiDAR or depth cameras tend to be large in size
682
+ and contain noise. In addition, preprocessing unit converts
683
+ the point cloud data into voxel format so that the CNN-
684
+ based algorithm can be applied. Thus, the proposed prepro-
685
+ cessing method consists of the following six phases; cuboid
686
+ cropping, random downsampling, statistical outlier removal,
687
+ voxelization, time series concatenation, and labeling.
688
+ The first three processes are used to reduce the data vol-
689
+ ume and noise. Cropping removes redundant regions of the
690
+ point cloud. Point clouds obtained from LiDAR sometimes
691
+ cause inaccurate point observations due to the effects of
692
+ reflective objects such as windows and mirrors. Limiting
693
+ the region based on prior geographic knowledge can remove
694
+ such obvious noise and points in regions that are irrelevant
695
+ to sensing. We employed the cuboid cropping method to cut
696
+ out a rectangular region from a 3D point cloud. Specifically,
697
+ for each i-th point pi = (xi, yi, zi) in a point cloud, the point
698
+ is removed when the (xi, yi, zi) coordinates are outside the
699
+ rectangle region [xmin, ymin, zmin] × [xmax, ymax, zmax].
700
+ Downsampling reduces the number of points in point
701
+ clouds and the computational complexity of the following
702
+ process. We employed random downsampling, which ran-
703
+ domly removes points and is computationally less expensive.
704
+ Random downsampling reduces the number of points by
705
+ arranging the points in random order and only leaving the
706
+ points corresponding to the indices up to the product of
707
+ the original point cloud points and the reduction rate rd.
708
+ A tradeoff exists; a low reduction rate reduces the number
709
+ of points, thereby reducing the computational complexity of
710
+ the following process, however, suppose too many points are
711
+ removed, spatial features are also removed. The reduction
712
+ rate rd should be determined by considering the number
713
+ of points in the original point cloud because the number
714
+ of points in the raw point cloud depends on measurement
715
+ devices, such as LiDAR and depth cameras. In this study,
716
+ we treated the reduction rate rd as a hyperparameter and
717
+ experimentally determined it in Section IV and Section V.
718
+ Other efficient determination methods of hyperparameters
719
+ are beyond the scope of this study.
720
+ Outlier removal removes noise points resulting from the
721
+ measurements. Outlier removal enables an accurate under-
722
+ standing of the 3D space. Statistical outlier removal is a
723
+ method of removing points that are far from their neighbors
724
+ by comparing the average distance between all points. Sta-
725
+ tistical outlier removal is employed in this method because
726
+ it can remove outliers independent of the scale of the
727
+ region in which points exist. Two hyperparameters exist for
728
+ statistical outlier removal: the number of nearest neighbor
729
+ points no and the standard deviation ratio ro. First, the
730
+ mean µ and standard deviation σ of the distances between
731
+ all points are calculated. Subsequently, for each i-th point
732
+ pi, the average distance di to no-nearest neighbor points is
733
+ calculated. Finally, if µ+roσ < di, the point pi is removed.
734
+ These two hyperparameters no and ro were experimentally
735
+ determined in this study.
736
+ Voxelization divides the space where point clouds exist
737
+ by voxels, which are 3D extensions of pixels, and arranges
738
+ them into a voxel grid, which is the regular grid in 3D
739
+ space. A voxel grid can be represented as a 3D array on
740
+ the computer, and the voxel grid can be input to the ML
741
+ model proposed in Section III-E. The detailed voxelization
742
+ method is described in Appendix A. The shape of the voxel
743
+ grid is calculated using the voxel size sv and observation
744
+ environment. To convert a point cloud into a voxel grid
745
+ while preserving spatial characteristics, the voxel size sv
746
+ 6
747
+ VOLUME ,
748
+
749
+ must be appropriately determined while considering the
750
+ observation space. In this study, the voxel size sv is treated
751
+ as a hyperparameter and is experimentally determined owing
752
+ to the capability of localizing pedestrians in the experimental
753
+ environment. Open3D [36] and Point Cloud Library [37] are
754
+ used for cuboid cropping, random downsampling, statistical
755
+ outlier removal, and voxelization.
756
+ Subsequently, the voxel grids are concatenated in the time
757
+ direction to generate time series data. As formulated in
758
+ Section III-C, the previous s timestep data is concatenated.
759
+ Specifically, a time series data Dt,s is generated by concate-
760
+ nating 3D arrays representing voxel data generated in the
761
+ previous preprocessing steps. After the concatenation, the
762
+ time series data Dt,s becomes a 4-dimensional array with the
763
+ shape of (s, h, w, d). The parameter s represents the number
764
+ of past frames concatenated for the time series input, and h,
765
+ w, and d represent the height, width, and depth of the voxel
766
+ grid, respectively.
767
+ Finally, we describe the generation of labeled datasets
768
+ for the training phase introduced in Section III-C. We
769
+ used temporal difference labeling proposed in [7] for data
770
+ annotation. Specifically, for all timesteps t, we map the voxel
771
+ grid time series data Dt,s to the k timesteps ahead link
772
+ quality value qt+k; thus, a labeled sample is generated as
773
+ pair like (Dt,s, qt+k). The use of labeled datasets enables
774
+ the training of an ML model that predicts k timesteps ahead
775
+ of future link quality value in Section III-E.
776
+ Table 3 shows an example of preprocessing results for
777
+ the actual experimental data. In this paper, two types of
778
+ point clouds are used for the experimental evaluation: depth
779
+ camera point cloud and LiDAR point cloud. Both point
780
+ clouds are observations of two people blocking LOS paths of
781
+ mmWave communication in an indoor environment. Depth
782
+ camera point clouds tend to have a lot of noise in the
783
+ raw data. LiDAR point clouds tend to have noise points
784
+ at locations that are far outliers. These noises disappeared
785
+ by applying cuboid cropping, random downsampling, and
786
+ statistical outlier removal. After voxelization, both point
787
+ clouds were converted into voxel grids while preserving the
788
+ shape of the human bodies.
789
+ E. MACHINE LEARNING METHODS
790
+ The voxel grid generated by preprocessing is used to train a
791
+ model that maps the voxel grid to the link quality values by
792
+ using ML. The voxel grids contain the location of objects,
793
+ and motion information can also be obtained from the time
794
+ series voxel grid. The location and motion information of
795
+ objects is necessary for link quality prediction. Many ML
796
+ models have already been proposed for the computer vision
797
+ task of extracting spatio-temporal features from voxel grids.
798
+ Among them, we used two ML algorithms: neural network
799
+ (NN) and gradient boosting decision tree (GBDT). Although
800
+ ML algorithms that outperform the algorithms used in this
801
+ study may exist, a comprehensive investigation of the ML
802
+ algorithms and hyperparameter tunings is beyond the scope
803
+ TABLE 3. Examples of preprocessed point clouds and their bounding
804
+ boxes
805
+ Point cloud type
806
+ Depth camera point cloud
807
+ LiDAR point cloud
808
+ Raw point cloud
809
+ After
810
+ cuboid cropping,
811
+ random
812
+ downsampling,
813
+ statistical
814
+ outlier removal
815
+ After voxelization
816
+ of this study, because this study aims to design a mechanism
817
+ to predict the mmWave link quality value and to demonstrate
818
+ its feasibility.
819
+ The structure of the NN is shown in Fig. 2. This NN
820
+ model is a 3D extension of the CNN, which is an ML
821
+ model of the image-based RSSI prediction method [7]. We
822
+ designed an NN model layer architecture based on the
823
+ dense voxel-based method proposed in the field of object
824
+ recognition and robot control [38]. The NN consists of
825
+ the following layers: 3D convolution, rectified linear unit
826
+ (ReLU), max pooling, flattening, dropout [39], and fully
827
+ connected layer. First, 3D convolution is applied to the voxel
828
+ grid to extract spatio-temporal features. Specifically, spatio-
829
+ temporal feature extraction is performed simultaneously,
830
+ while reducing computational complexity, by inputting time
831
+ series into the voxel channels. ReLU and max pooling
832
+ are layers used as a set with the convolution layer. After
833
+ three convolution iterations, the four-dimensional tensor is
834
+ flattened to one dimension. After flattening, a dropout layer
835
+ is inserted to prevent overfitting and improve robustness. The
836
+ NN implementation used Keras [40] in TensorFlow [41]. As
837
+ a supplement, an RNN-based model ConvLSTM [30] has
838
+ also been used in the existing work [7], but it is not employed
839
+ in this study due to its large computational cost.
840
+ Next, we describe the GBDT model. GBDT is an ensem-
841
+ ble learning algorithm that has achieved remarkable results
842
+ in various ML tasks [42]. A similar ensemble learning
843
+ algorithm, random forests [31], was employed in the existing
844
+ work [7]. Time series voxel grids are flattened to one-
845
+ dimensional arrays and then input to GBDT because GBDT
846
+ does not support the input of multidimensional tensors.
847
+ VOLUME ,
848
+ 7
849
+
850
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
851
+ 3×3×3 3D Convolution, 64
852
+ ReLU
853
+ 2×2×2 3D Max Pooling
854
+ Flattening
855
+ 50% Dropout
856
+ Fully Connected, 1
857
+ ×3
858
+ Input shape : (𝒉, 𝒘, 𝒅, 𝒔)
859
+ Output : Link quality value
860
+ FIGURE 2. NN structure. Parameters h, w, and d represent the height,
861
+ width, and depth of the voxel grid, respectively, and s represents the
862
+ number of past frames concatenated for the time series input.
863
+ IV. EVALUATION USING DEPTH CAMERA POINT CLOUD
864
+ AND RECEIVED SIGNAL STRENGTH DATASET
865
+ A. DATASETS
866
+ We evaluated our point cloud-based link quality prediction
867
+ method using a depth camera point cloud dataset labeled
868
+ with RSSI values of IEEE 802.11ad mmWave communica-
869
+ tions. The depth camera point cloud dataset was generated
870
+ from the depth image dataset originally created in [7] by
871
+ converting depth images to point clouds using the method
872
+ detailed in Appendix B. Depth camera point clouds represent
873
+ spatial information in a specific direction, similar point
874
+ clouds also can be obtained from solid-state LiDAR [43]. We
875
+ compared the prediction result of our proposed point cloud-
876
+ based method with that of the depth image-based method [7].
877
+ The original dataset (i.e., depth image dataset before
878
+ converting to point cloud) consists of a time series of pairs
879
+ of mmWave RSSI and depth images acquired by a depth
880
+ camera, with the time series measured at 30 frames per sec-
881
+ ond (fps). The experimental environment for obtaining this
882
+ dataset is shown on Fig. 3. The experimental environment
883
+ included an AP, a response STA (R-STA) for communicat-
884
+ ing with the AP, a measurement STA (M-STA) for RSSI
885
+ measurement, and a depth camera at position A or B. The
886
+ AP uses commercially available IEEE 802.11ad-compliant
887
+ products. The M-STA measures the RSSI of IEEE 802.11ad
888
+ frames sent from the AP to the R-STA without being
889
+ affected by the beamforming operation, which varies among
890
+ IEEE 802.11ad products [44]. Details of the experimental
891
+ equipment are summarized in Table 4. The experiment was
892
+ conducted in a room where two pedestrians aperiodically
893
+ blocked the mmWave communication LOS path between the
894
+ R-STA and the M-STA. The pedestrians block the LOS path
895
+ aperiodically and the average interval between blockages per
896
+ person was approximately 6 s. The average LOS blockage
897
+ occurs approximately once every four seconds because two
898
+ people may block the LOS simultaneously. When LOS
899
+ blockage occurs, the RSSI is attenuated by approximately
900
+ 15 dBm, which is on the same level as the average value
901
+ of the IEEE 802.11ad channel model, 13.4 dBm [45]. The
902
+ dataset acquired in the situation where the camera position is
903
+ A or B, respectively, is referred to as dataset A or B, respec-
904
+ tively. Sample depth images of the two viewpoints in this
905
+ dataset are shown on the left side of Fig. 3. Measurements
906
+ ! (m)
907
+ & (m)
908
+ AP
909
+ STA
910
+ MD
911
+ Camera (A)
912
+ Camera (B)
913
+ Pedestrian
914
+ 5.34
915
+ 4.87
916
+ Moving path
917
+ 1.15
918
+ 4.40
919
+ 3.25
920
+ 2.70
921
+ 0.60
922
+ 1.70
923
+ 2.65
924
+ 0.45
925
+ 1.80
926
+ AP
927
+ R-STA
928
+ Camera (A)
929
+ M-STA
930
+ FIGURE 3. Experimental environment for obtaining original dataset (i.e.,
931
+ depth image dataset before converting to point cloud). The AP and the
932
+ response STA (R-STA) communicate using mmWave, and RSSI is
933
+ measured by the measurement STA (M-STA). The two left images are
934
+ samples of depth images acquired by cameras A and B, respectively.
935
+ TABLE 4. Experimental equipment on the depth camera point cloud and
936
+ received signal strength dataset
937
+ mmWave AP
938
+ Dell Wireless Dock D5000
939
+ mmWave R-STA
940
+ Dell Latitude E5540
941
+ Wireless
942
+ M-STA antenna
943
+ Horn antenna, 24 dBi
944
+ WLAN standard
945
+ IEEE 802.11ad
946
+ Channel
947
+ 60.48 GHz
948
+ Bandwidth
949
+ 2.16 GHz
950
+ Sensor
951
+ Depth camera
952
+ Microsoft Kinect Model 1656
953
+ Frame rate
954
+ 30 fps
955
+ were taken for approximately 10 min for camera positions A
956
+ and B, and approximately 18,000 samples were measured.
957
+ Depth camera point clouds were generated by applying the
958
+ process detailed in Appendix B. Specifically, from depth im-
959
+ ages with the shape of (512, 424) where each pixel represents
960
+ depth values from 0 to 255, normalized point clouds existing
961
+ in the region [0, 256)3 were generated. In this paper, depth
962
+ camera point clouds are the aforementioned normalized
963
+ point clouds. Generated depth camera point clouds contain
964
+ information only in a specific direction because the depth
965
+ camera observes a specific direction.
966
+ B. PREPROCESSING AND MACHINE LEARNING SETUPS
967
+ The preprocessing described in Section III-D is applied
968
+ to the depth camera point cloud to generate the dataset
969
+ corresponding to the time series voxel grids and RSSI values.
970
+ We experimentally determined the values of hyperparameters
971
+ for preprocessing; the values are shown in Table 5. In
972
+ particular, cuboid cropping removes the space in the large
973
+ z-coordinate range and paddings the blank space so that the
974
+ space size returns to [0, 256)3 to remove the noise points in
975
+ the foreground. The number of points in the depth camera
976
+ point cloud is fixed at 217,088, and subsequent preprocessing
977
+ would be time-consuming if the number of points is not
978
+ reduced. Even if the link quality could be predicted 1000 ms
979
+ 8
980
+ VOLUME ,
981
+
982
+ TABLE 5.
983
+ Preprocessing hyperparameters for the depth camera point
984
+ cloud and received signal strength dataset
985
+ Preprocessing phase
986
+ Hyperparameter
987
+ Value
988
+ Cuboid cropping
989
+ (xmin, ymin, zmin)
990
+ (0, 0, 0)
991
+ (xmax, ymax, zmax)
992
+ (256, 256, 244)
993
+ Random downsampling
994
+ rd
995
+ 0.0921
996
+ Statistical
997
+ outlier removal
998
+ no
999
+ 20
1000
+ ro
1001
+ 2
1002
+ Voxelization
1003
+ sv
1004
+ 8
1005
+ (i.e., the voxel grid shape is (32, 32, 32))
1006
+ Time series
1007
+ concatenation
1008
+ s
1009
+ 16
1010
+ (i.e., using latest 500 ms time series data)
1011
+ k
1012
+ 0, 15, 30
1013
+ (i.e., predicting 0, 500, 1000 ms ahead)
1014
+ ahead, if the inference results are not available until earlier
1015
+ than 1000 ms, the future prediction will be meaningless.
1016
+ The reduction rate for the random downsampling rd was
1017
+ experimentally determined to be 0.0921, which leaves ap-
1018
+ proximately 20,000 points. The values of no and ro were
1019
+ set to 20 and 2, respectively, with reference to Open3D [36]
1020
+ default values. The value of sv was set to 8 to be close to
1021
+ (40, 40), the input shape for the image-based method [7], to
1022
+ obtain a voxel grid with a shape of (32, 32, 32). Examples
1023
+ of preprocessing of a depth image point cloud are shown on
1024
+ the left column of Table 3.
1025
+ These datasets were acquired at 30 fps, and the model was
1026
+ input with a tensor that concatenated the voxel grids for
1027
+ 16 frames, corresponding to the last 500 ms as well as our
1028
+ previous study [7]. The model predicts current and future
1029
+ values according to the system model shown in Section III-A.
1030
+ ML models predict RSSI 0 ms and 500 ms ahead, as well as
1031
+ our previous study [7]. In addition, ML models also predict
1032
+ 1000 ms ahead. Since delays on the order of 100 ms occur
1033
+ when streaming UHD videos or VR content from a cloud
1034
+ server via the internet, communication control instructions
1035
+ can be given with time to spare by predicting 500 ms or
1036
+ 1000 ms ahead, also taking into account the time of link
1037
+ quality inference and communication control. As described
1038
+ in Section III-D, temporal difference labeling [7] was used
1039
+ to create the time sequential dataset.
1040
+ Two point cloud-based ML models, NN and GBDT as
1041
+ proposed in Section III-E, were used to predict RSSI. The
1042
+ ML hyperparameters are as shown in Table 6. The loss
1043
+ function and objective criterion were both RMSE, which can
1044
+ be used for regression and has been used in our previous
1045
+ study [7]. Default values in Keras [40] and LightGBM [42]
1046
+ were used for the learning rate. In addition to these two point
1047
+ cloud-based models, two non-point cloud-based methods
1048
+ were prepared for comparative evaluation: an RSSI time
1049
+ series-based method and a depth image-based method. The
1050
+ RSSI time series-based method uses only the time series of
1051
+ TABLE 6. Hyperparameters for ML model training
1052
+ ML algorithm
1053
+ Hyperparameter
1054
+ Value
1055
+ NN
1056
+ Loss function
1057
+ RMSE
1058
+ Optimizer
1059
+ Adam [46]
1060
+ Learning rate
1061
+ 0.001
1062
+ Early stopping epochs
1063
+ 5
1064
+ GBDT
1065
+ Objective function
1066
+ RMSE
1067
+ Number of leaves
1068
+ 31
1069
+ Learning rate
1070
+ 0.1
1071
+ Early stopping boosting rounds
1072
+ 20
1073
+ the previous RSSI as features and predicts RSSI values using
1074
+ the GBDT algorithm. The depth image-based method is the
1075
+ same as [7], and depth images before conversion to point
1076
+ clouds are used as the input feature. These two methods are
1077
+ the same as point cloud-based methods in that they use the
1078
+ latest 500 ms data to predict RSSI.
1079
+ We evaluated our method using two datasets, A and B.
1080
+ These two datasets both consist of time series data of approx-
1081
+ imately 10 min. We used the first 60% for training the ML
1082
+ model, the next 20% for validation during model training,
1083
+ and the last 20% for holdout validation used for evaluation.
1084
+ Cross-validation was not used to prevent data leakage of time
1085
+ series data and unbalanced or small training data volume. For
1086
+ NN training, we used ReduceLROnPlateau [40], which is a
1087
+ learning rate scheduler to quarter the learning rate if the loss
1088
+ function value of the validation data did not decrease by two
1089
+ epochs.
1090
+ C. EXPERIMENTAL RESULTS
1091
+ First, we qualitatively evaluated the link quality prediction
1092
+ method from a plot of measured and predicted RSSI values.
1093
+ Plots of the measured and predicted RSSI values are shown
1094
+ in Fig. 4. The RSSI values were predicted from time series
1095
+ voxel grids using NN and GBDT, presented in Section III-
1096
+ E. The left and right columns are the results for datasets
1097
+ A and B, that is, camera positions A and B, respectively.
1098
+ The first row is 0 ms ahead, i.e., the current prediction,
1099
+ while the second and third rows are future predictions
1100
+ 500 ms and 1000 ms ahead, respectively. The measured RSSI
1101
+ values are significantly attenuated when pedestrians block
1102
+ the LOS of mmWave communications. Correspondingly, the
1103
+ predicted RSSI values also attenuate significantly, suggesting
1104
+ that the model can predict blockage. For camera positions
1105
+ A and B, the measured and predicted values appear to
1106
+ match in both cases. Comparing the two models, NN and
1107
+ GBDT, NN provided a better match better, albeit slightly.
1108
+ Based on comparisons of predictions 0, 500, and 1000 ms
1109
+ ahead, the discrepancy between the prediction and the actual
1110
+ measurement is greater when the prediction is further ahead
1111
+ in time. In particular, this tendency can be observed for large
1112
+ attenuations, such as LOS blockage, and may occur owing
1113
+ to the difficulty in predicting the time further ahead.
1114
+ VOLUME ,
1115
+ 9
1116
+
1117
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
1118
+ 10
1119
+ 15
1120
+ 20
1121
+ 25
1122
+ 30
1123
+ −40
1124
+ −35
1125
+ −30
1126
+ −25
1127
+ −20
1128
+ Prediction 0 ms ahead for dataset A
1129
+ Prediction by NN
1130
+ Prediction by GBDT
1131
+ Measured value
1132
+ 10
1133
+ 15
1134
+ 20
1135
+ 25
1136
+ 30
1137
+ −40
1138
+ −35
1139
+ −30
1140
+ −25
1141
+ −20
1142
+ Prediction 0 ms ahead for dataset B
1143
+ Prediction by NN
1144
+ Prediction by GBDT
1145
+ Measured value
1146
+ 10
1147
+ 15
1148
+ 20
1149
+ 25
1150
+ 30
1151
+ −40
1152
+ −35
1153
+ −30
1154
+ −25
1155
+ −20
1156
+ Prediction 500 ms ahead for dataset A
1157
+ Prediction by NN
1158
+ Prediction by GBDT
1159
+ Measured value
1160
+ 10
1161
+ 15
1162
+ 20
1163
+ 25
1164
+ 30
1165
+ −40
1166
+ −35
1167
+ −30
1168
+ −25
1169
+ −20
1170
+ Prediction 500 ms ahead for dataset B
1171
+ Prediction by NN
1172
+ Prediction by GBDT
1173
+ Measured value
1174
+ 10
1175
+ 15
1176
+ 20
1177
+ 25
1178
+ 30
1179
+ −40
1180
+ −35
1181
+ −30
1182
+ −25
1183
+ −20
1184
+ Prediction 1000 ms ahead for dataset A
1185
+ Prediction by NN
1186
+ Prediction by GBDT
1187
+ Measured value
1188
+ 10
1189
+ 15
1190
+ 20
1191
+ 25
1192
+ 30
1193
+ −40
1194
+ −35
1195
+ −30
1196
+ −25
1197
+ −20
1198
+ Prediction 1000 ms ahead for dataset B
1199
+ Prediction by NN
1200
+ Prediction by GBDT
1201
+ Measured value
1202
+ Time (s)
1203
+ RSSI (dBm)
1204
+ FIGURE 4. Predicted and measured RSSI values
1205
+ Next, we quantitatively evaluated link quality prediction
1206
+ errors. The RMSE was used to evaluate the prediction accu-
1207
+ racy, considering the accuracy of the prediction during LOS
1208
+ blockage, because the RMSE reflects the effects of outliers.
1209
+ The RMSE values in RSSI prediction using four methods
1210
+ are listed in Table 7. The top two methods in Table 7 are for
1211
+ comparison with point cloud-based methods as described in
1212
+ Section IV-B. The bottom two methods in Table 7 are our
1213
+ proposed point cloud-based methods proposed in Section III-
1214
+ E. Each model inputs 16 frames, corresponding to the last
1215
+ 500 ms, as input and predicts the link quality values. For
1216
+ methods using NN, the average of four training results is
1217
+ shown in Table 7 to account for initial value dependence,
1218
+ whereas for methods using GBDT, one training result is
1219
+ shown because there is no need to consider randomness.
1220
+ We evaluated the values in the Table 7, in terms of
1221
+ input features and how far ahead to predict. The RSSI time
1222
+ series-based method has large error values compared with
1223
+ other methods and the LOS path blockage is considered
1224
+ unpredictable. This implies that LOS blockage prediction is
1225
+ a challenging task that cannot be accomplished from only
1226
+ previous link quality values. The point cloud-based method
1227
+ could predict 0 ms and 500 ms ahead with approximately
1228
+ 2.3 dB and 3.2 dB, respectively, with almost the same errors,
1229
+ compared with those of existing depth image-based methods.
1230
+ Furthermore, for the prediction of 1000 ms ahead, the NN
1231
+ model of the point cloud-based method had an error of
1232
+ approximately 10% smaller than the depth image-based
1233
+ method and the GBDT model of the point cloud-based
1234
+ TABLE 7. RMSE values of RSSI prediction
1235
+ Ahead
1236
+ Feature
1237
+ Method
1238
+ RMSE (dB)
1239
+ Dataset A
1240
+ Dataset B
1241
+ 0 ms
1242
+ RSSI time series
1243
+ GBDT
1244
+
1245
+
1246
+ Depth image
1247
+ NN
1248
+ 2.319
1249
+ 2.612
1250
+ Point cloud
1251
+ NN
1252
+ 2.338
1253
+ 2.374
1254
+ GBDT
1255
+ 2.338
1256
+ 2.324
1257
+ 500 ms
1258
+ RSSI time series
1259
+ GBDT
1260
+ 5.024
1261
+ 4.973
1262
+ Depth image
1263
+ NN
1264
+ 3.284
1265
+ 3.594
1266
+ Point cloud
1267
+ NN
1268
+ 3.236
1269
+ 3.333
1270
+ GBDT
1271
+ 3.428
1272
+ 3.496
1273
+ 1000 ms
1274
+ RSSI time series
1275
+ GBDT
1276
+ 5.068
1277
+ 5.053
1278
+ Depth image
1279
+ NN
1280
+ 4.363
1281
+ 4.262
1282
+ Point cloud
1283
+ NN
1284
+ 3.992
1285
+ 3.754
1286
+ GBDT
1287
+ 4.311
1288
+ 4.294
1289
+ method. This might be because the convolution layer in the
1290
+ NN of the point cloud-based method enables accurate spatio-
1291
+ temporal understanding. Accordingly, we conclude that the
1292
+ point cloud-based method can predict LOS path blockage as
1293
+ well as or better than the depth image-based method.
1294
+ Finally, we evaluated the characteristics of the RSSI pre-
1295
+ diction error distribution. The empirical distribution function
1296
+ of absolute errors and 80th and 95th percentile absolute error
1297
+ values were used to evaluate the distribution characteristics
1298
+ of the error. The plot of the empirical distribution function
1299
+ 10
1300
+ VOLUME ,
1301
+
1302
+ 0
1303
+ 5
1304
+ 10
1305
+ 15
1306
+ 20
1307
+ 0.0
1308
+ 0.2
1309
+ 0.4
1310
+ 0.6
1311
+ 0.8
1312
+ 1.0 (a) Prediction for dataset A by NN
1313
+ Prediction 0 ms ahead
1314
+ Prediction 500 ms ahead
1315
+ Prediction 1000 ms ahead
1316
+ 0
1317
+ 5
1318
+ 10
1319
+ 15
1320
+ 20
1321
+ 0.0
1322
+ 0.2
1323
+ 0.4
1324
+ 0.6
1325
+ 0.8
1326
+ 1.0(b) Prediction for dataset A by GBDT
1327
+ Prediction 0 ms ahead
1328
+ Prediction 500 ms ahead
1329
+ Prediction 1000 ms ahead
1330
+ 0
1331
+ 5
1332
+ 10
1333
+ 15
1334
+ 20
1335
+ 0.0
1336
+ 0.2
1337
+ 0.4
1338
+ 0.6
1339
+ 0.8
1340
+ 1.0 (c) Prediction for dataset B by NN
1341
+ Prediction 0 ms ahead
1342
+ Prediction 500 ms ahead
1343
+ Prediction 1000 ms ahead
1344
+ 0
1345
+ 5
1346
+ 10
1347
+ 15
1348
+ 20
1349
+ 0.0
1350
+ 0.2
1351
+ 0.4
1352
+ 0.6
1353
+ 0.8
1354
+ 1.0(d) Prediction for dataset B by GBDT
1355
+ Prediction 0 ms ahead
1356
+ Prediction 500 ms ahead
1357
+ Prediction 1000 ms ahead
1358
+ Absolute error (dB)
1359
+ Empirical distribution function
1360
+ FIGURE 5. The empirical distribution function of absolute errors for RSSI
1361
+ prediction. Two horizontal dotted lines represent 0.8 and 0.95.
1362
+ about absolute errors is shown in Fig. 5. From Fig. 5, the
1363
+ 80th percentile absolute error value is less than 5 dB for
1364
+ all the predictions 0, 500, and 1000 ms ahead, therefore the
1365
+ error is concentrated at 5 dB or less. In addition, the 95th
1366
+ percentile absolute error value is less than 12 dB for all
1367
+ predictions 0, 500, and 1000 ms ahead, therefore few errors
1368
+ above 12 dB occurred.
1369
+ We discussed the empirical distribution function of abso-
1370
+ lute errors from the percentage of LOS blockage time in the
1371
+ experiment. In this experiment, as described in Section IV-A,
1372
+ the LOS blockage by humans is on average once in 4 s; in
1373
+ addition, because the attenuation duration time is mostly 1 s,
1374
+ more than half of all timesteps can be considered as LOS
1375
+ communication. The RSSI value during LOS communication
1376
+ can be assumed as the median of all RSSI values in the
1377
+ test set because the RSSI value during LOS communication
1378
+ shows almost no fluctuation. From the RSSI value during
1379
+ LOS communication, the point in which the RSSI value is at-
1380
+ tenuated by more than 8 dBm, which is the 3 dBm attenuation
1381
+ presented in the mmWave channel model [45] plus a margin
1382
+ of 5 dBm, is considered as blockages. Timesteps with RSSI
1383
+ values below -33.05 dBm were assumed to be blockages
1384
+ because the median RSSI value in the test dataset was -
1385
+ 25.05 dBm. In the actual test datasets, the percentages of all
1386
+ timesteps with RSSI values below -33.05 dBm were 13.0%
1387
+ and 11.9% for datasets A and B, respectively. Considering
1388
+ that 95% of the errors are less than 12 dB, and other errors
1389
+ not caused by blockage are also included, most of the
1390
+ blockage could be predicted, and the model is thought to
1391
+ rarely fail to predict complete blockage. This is also because
1392
+ the percentage of errors greater than 15 dB is less than 1%,
1393
+ which is almost non-existent. Therefore, we conclude that
1394
+ our point cloud-based link quality prediction method can
1395
+ predict RSSI attenuation due to LOS blockage.
1396
+ V. EVALUATION USING LIDAR POINT CLOUD AND
1397
+ THROUGHPUT DATASET
1398
+ A. EXPERIMENT FOR OBTAINING DATASET
1399
+ We evaluated our point cloud-based link quality prediction
1400
+ method using a LiDAR point cloud dataset labeled with
1401
+ throughput values of mmWave communication. We used
1402
+ mechanical rotation LiDAR, which scans spatial information
1403
+ in all directions, resulting in 360° point clouds. The transmis-
1404
+ sion control protocol (TCP) throughput of IEEE 802.11ad
1405
+ mmWave communications was used for link quality. TCP
1406
+ throughput values are influenced by many factors, such as
1407
+ beamforming, the transmission rate of the AP, and conges-
1408
+ tion control of the TCP. In this experiment, these controls
1409
+ were often set in motion by LOS blockage, which created
1410
+ more dynamics in the behavior of throughput values. We
1411
+ conducted such a new mmWave communication experiment
1412
+ to obtain the aforementioned dataset consisting of LiDAR
1413
+ point cloud for features and throughput for link quality.
1414
+ The indoor environment in which the experiment was
1415
+ conducted and the equipment and conditions used in the
1416
+ experiment are shown in Fig. 6 and Table 8, respectively.
1417
+ Both AP and STA used commercially available products.
1418
+ Furthermore, a smartphone was used for the STA to make
1419
+ the experimental environment more practical. mmWave com-
1420
+ munications between the AP and STA used 60 GHz IEEE
1421
+ 802.11ad WLAN. We used iperf [47] to generate uplink
1422
+ TCP traffic, i.e., from the STA to the AP. Throughput was
1423
+ calculated using Wireshark [48] as the sum of the length
1424
+ of packets obtained by packet capture by tcpdump [49]
1425
+ in the last 100 ms. Two pedestrians aperiodically blocked
1426
+ the mmWave LOS path between the AP and the STA. As
1427
+ with Section IV-A, the two pedestrians block the LOS ap-
1428
+ proximately once in 4 s. The experimental environment was
1429
+ observed by LiDAR installed in the center of the room and
1430
+ obtained as point clouds in 3D Cartesian coordinates with
1431
+ the origin at the LiDAR installation position. An example
1432
+ of the obtained LiDAR point cloud data is shown in the
1433
+ figure on the right column of Table 3. In addition to LiDAR,
1434
+ the environment is also observed by a camera set up at the
1435
+ edge of the room for comparison with point clouds. The
1436
+ experiment was conducted at 10 fps for 30 min and 18,000
1437
+ samples were measured.
1438
+ B. PREPROCESSING AND MACHINE LEARNING SETUP
1439
+ Our proposed point cloud-based link quality prediction
1440
+ method was evaluated using LiDAR point clouds and
1441
+ throughput values obtained in the aforementioned experi-
1442
+ ment. As with Section IV-B, the preprocessing described
1443
+ in Section III-D was applied to the LiDAR point cloud
1444
+ to generate a voxel grid time series data and throughput
1445
+ corresponding dataset. We determined values of prepro-
1446
+ cessing hyperparameters, shown in Table 9. First, points
1447
+ outside the cuboid region with vertices (-5,-5,-5) and (5,5,5),
1448
+ which are obviously noise points outside the room, were
1449
+ removed because the size of the indoor environment used
1450
+ VOLUME ,
1451
+ 11
1452
+
1453
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
1454
+ 3.5 m
1455
+ 5.8 m
1456
+ 1.5 m
1457
+ 2.9 m
1458
+ 1.75 m
1459
+ Pedestrian
1460
+ Access point
1461
+ Station
1462
+ LiDAR
1463
+ Depth camera
1464
+ mmWave
1465
+ Moving
1466
+ path
1467
+ FIGURE 6. Experimental environment for obtaining LiDAR point cloud and
1468
+ mmWave TCP throughput dataset
1469
+ TABLE 8. Experimental equipment and settings on the LiDAR point cloud
1470
+ and throughput dataset.
1471
+ Wireless
1472
+ mmWave AP
1473
+ NETGEAR Nighthawk X10
1474
+ mmWave STA
1475
+ ASUS ROG Phone
1476
+ WLAN standard
1477
+ IEEE 802.11ad
1478
+ Channel frequency
1479
+ 60.48 GHz
1480
+ Channel bandwidth
1481
+ 2.16 GHz
1482
+ iperf [47]
1483
+ Transport layer protocol
1484
+ TCP
1485
+ Traffic direction
1486
+ Uplink (i.e., from STA to AP)
1487
+ Sensor
1488
+ LiDAR
1489
+ Velodyne VLP-16
1490
+ Depth camera
1491
+ Intel RealSense L515
1492
+ Frame rate
1493
+ 10 fps
1494
+ in this experiment was 5.8 m × 3.5 m. In the experimental
1495
+ environment, the average number of LiDAR point cloud
1496
+ points was 28,826, which allowed subsequent processing to
1497
+ be computed without the influence of far-ahead prediction.
1498
+ Therefore, random downsampling was not performed and rd
1499
+ was set to 1. The values of no and ro were set to 20 and 2,
1500
+ respectively, with reference to Open3D [36] default values.
1501
+ In the voxelization, sv was set to 0.2 m in order to divide as
1502
+ roughly as possible while preserving the human shape. The
1503
+ difference from Section IV-B is that cuboid cropping does
1504
+ not pad the blank space after cropping, but the space itself
1505
+ is narrowed. This is to prevent the large useless calculations
1506
+ of the following process caused by padding the blank space.
1507
+ The dataset consisted of 18,000 samples of 30 min at
1508
+ 10 fps. The first 60% was used to train the ML model, the
1509
+ next 20% was used for validation during model training,
1510
+ and the last 20% was used for holdout validation to evaluate
1511
+ our link quality prediction method. The dataset was obtained
1512
+ at 10 fps, and features were input to the model for the six
1513
+ previous frames, corresponding to the last 500 ms as well as
1514
+ our previous study [7]. As with Section IV-B, ML models
1515
+ predict 0 ms ahead, 500 ms ahead, and 1000 ms ahead. We
1516
+ used temporal difference labeling [7] to create the dataset for
1517
+ training the ML model. In addition, we used the same two
1518
+ TABLE 9.
1519
+ Preprocessing hyperparameters for LiDAR point cloud and
1520
+ throughput dataset
1521
+ Preprocessing phase
1522
+ Hyperparameter
1523
+ Value
1524
+ Cuboid cropping
1525
+ (xmin, ymin, zmin)
1526
+ (-5 m, -5 m, -5 m)
1527
+ (xmax, ymax, zmax)
1528
+ (5 m, 5 m, 5 m)
1529
+ Random downsampling
1530
+ rd
1531
+ 1
1532
+ Statistical
1533
+ outlier removal
1534
+ no
1535
+ 20
1536
+ ro
1537
+ 2
1538
+ Voxelization
1539
+ sv
1540
+ 0.2 m
1541
+ (i.e., the voxel grid shape is (23, 33, 10))
1542
+ Time series
1543
+ concatenation
1544
+ s
1545
+ 6
1546
+ (i.e., using latest 500 ms time series data)
1547
+ k
1548
+ 0, 5, 10
1549
+ (i.e., predicting 0, 500, 1000 ms ahead)
1550
+ non-point cloud-based methods for comparison with point
1551
+ cloud-based methods described in Section IV-B.
1552
+ C. EXPERIMENTAL RESULTS
1553
+ First, we evaluated the plot of predicted and actual through-
1554
+ put values. Fig. 7 shows an example plot of predicted and
1555
+ measured throughput values from two point cloud-based
1556
+ ML models, NN and GBDT, which were introduced in
1557
+ Section III-E. The throughput value of mmWave during
1558
+ LOS communication was approximately 1.6 Gbit/s. When
1559
+ the LOS path was blocked by a pedestrian, the throughput
1560
+ value attenuated to 0 Gbit/s. When the measured values were
1561
+ significantly attenuated, the predicted values were signifi-
1562
+ cantly attenuated equally. Two consecutive throughput values
1563
+ degradations occurred around 108 s were also able to be
1564
+ predicted. Thus, the ML models can predict mmWave LOS
1565
+ blockage by the two pedestrians. However, the recovery of
1566
+ throughput values when the blockage ends is not predicted
1567
+ such as around 102 s. This is because, unlike RSSI, the
1568
+ throughput value is determined by a complex interplay of
1569
+ factors, such as beamforming, the transmission rate of the
1570
+ AP, and congestion control of TCP, and it is challenging to
1571
+ predict when the throughput value fully recovers from the
1572
+ spatial information of point clouds.
1573
+ Comparing the predictions at 0, 500, and 1000 ms ahead,
1574
+ the predicted values do not often deteriorate to 0 Gbit/s in
1575
+ the predictions at more future timesteps ahead. This may
1576
+ result from the difficulty in predicting future blockage, and
1577
+ because the prediction model is uncertain of the occurrence
1578
+ of blockage, thus outputting the expected value of RMSE
1579
+ to be as small as possible in anticipation of the case where
1580
+ blockage does not occur. Predictions using the NN model
1581
+ differ from that of the GBDT model in that the former
1582
+ predicts lower and more accurate values during blockage,
1583
+ whereas the latter often predicts smaller values compared
1584
+ with the actual values during LOS communication. The
1585
+ predictions capture spatial features more accurately owing
1586
+ 12
1587
+ VOLUME ,
1588
+
1589
+ 95
1590
+ 100
1591
+ 105
1592
+ 110
1593
+ 115
1594
+ 120
1595
+ 125
1596
+ 0.0
1597
+ 0.5
1598
+ 1.0
1599
+ 1.5
1600
+ 2.0
1601
+ Throughput (Gbit/s)
1602
+ Prediction 0 ms ahead
1603
+ Prediction by NN
1604
+ Prediction by GBDT
1605
+ Measured values
1606
+ 95
1607
+ 100
1608
+ 105
1609
+ 110
1610
+ 115
1611
+ 120
1612
+ 125
1613
+ 0.0
1614
+ 0.5
1615
+ 1.0
1616
+ 1.5
1617
+ 2.0
1618
+ Throughput (Gbit/s)
1619
+ Prediction 500 ms ahead
1620
+ Prediction by NN
1621
+ Prediction by GBDT
1622
+ Measured values
1623
+ 95
1624
+ 100
1625
+ 105
1626
+ 110
1627
+ 115
1628
+ 120
1629
+ 125
1630
+ 0.0
1631
+ 0.5
1632
+ 1.0
1633
+ 1.5
1634
+ 2.0
1635
+ Throughput (Gbit/s)
1636
+ Prediction 1000 ms ahead
1637
+ Prediction by NN
1638
+ Prediction by GBDT
1639
+ Measured values
1640
+ Time (s)
1641
+ FIGURE 7. Predicted and measured throughput values
1642
+ to using 3D convolution in the NN model. The discrepancy
1643
+ during LOS communication by GBDT is thought to result
1644
+ from the transmission rate control of AP, which is trained
1645
+ to reduce the expected value of the RMSE during LOS
1646
+ communication because transmission rate control sometimes
1647
+ results in 1.4 Gbit/s, such as in the interval between 120 s
1648
+ and 122 s.
1649
+ Next, we evaluated quantitatively from the numerical val-
1650
+ ues of prediction error. The RMSE values of the throughput
1651
+ prediction using four methods are shown in Table 7. As with
1652
+ the RSSI prediction comparison described in Section IV-B,
1653
+ the top two methods in Table 7 are for comparison with point
1654
+ cloud-based methods. Whereas, the bottom two methods in
1655
+ Table 7 are our proposed point cloud-based method proposed
1656
+ in Section III-E.
1657
+ We evaluated the values in the Table 10, in terms of input
1658
+ features and how far ahead to predict. Predictions of the
1659
+ throughput time series-based have larger error values than
1660
+ those of other methods, which may indicate that blockage
1661
+ could not be predicted. Similar to RSSI, predicting through-
1662
+ put values in a dynamically changing mmWave communica-
1663
+ tions environment solely based on previous time series link
1664
+ quality values is challenging. For point cloud-based methods,
1665
+ the LOS blockage prediction is as accurate as or more
1666
+ accurate than the depth image-based method. In particular,
1667
+ the LiDAR point cloud is better at predicting 1000 ms ahead.
1668
+ This might be because LiDAR point clouds have a wider
1669
+ field of view than the depth camera, thus the LiDAR point
1670
+ cloud has more information about the space held by the input
1671
+ features. The rate of increase in RMSE is lower than that of
1672
+ TABLE 10. RMSE values of throughput prediction
1673
+ Ahead
1674
+ Feature
1675
+ Method
1676
+ RMSE (Gbit/s)
1677
+ 0 ms
1678
+ Throughput time series
1679
+ GBDT
1680
+
1681
+ Depth image
1682
+ NN
1683
+ 0.2771
1684
+ Point cloud
1685
+ NN
1686
+ 0.2747
1687
+ GBDT
1688
+ 0.2767
1689
+ 500 ms
1690
+ Throughput time series
1691
+ GBDT
1692
+ 0.4435
1693
+ Depth image
1694
+ NN
1695
+ 0.3178
1696
+ Point cloud
1697
+ NN
1698
+ 0.2909
1699
+ GBDT
1700
+ 0.2924
1701
+ 1000 ms
1702
+ Throughput time series
1703
+ GBDT
1704
+ 0.4497
1705
+ Depth image
1706
+ NN
1707
+ 0.3756
1708
+ Point cloud
1709
+ NN
1710
+ 0.3200
1711
+ GBDT
1712
+ 0.3133
1713
+ the RSSI and depth camera point cloud datasets. This might
1714
+ be because the point cloud acquired from LiDAR can predict
1715
+ based on information from a wider field of view; thus, future
1716
+ conditions can be predicted more accurately. Therefore, the
1717
+ point cloud-based method can predict LOS path blockage
1718
+ similar to or better than the depth image-based method,
1719
+ especially when predicting blockages at a further time in
1720
+ the future.
1721
+ Finally, we evaluated the properties of the distribution
1722
+ of throughput prediction errors. The empirical distribution
1723
+ function of absolute prediction errors is shown in Fig. 8.
1724
+ In the experiments, the throughput value during LOS com-
1725
+ munication was approximately 1.6 Gbit/s, and when LOS
1726
+ blockage occurred, the throughput attenuated to 0 Gbit/s in
1727
+ many cases. Therefore, the attenuation due to blockage is
1728
+ 1.6 Gbit/s. Suppose a blockage was not fully predicted, an
1729
+ absolute error of 1.6 Gbit/s occurred. In addition, an absolute
1730
+ error of approximately 0.3 Gbit/s occurred owing to the fluc-
1731
+ tuation of the transmission rate during LOS communication.
1732
+ From Fig. 8, the 80th and 95th percentile absolute error was
1733
+ less than 0.4 Gbit/s and 0.8 Gbit/s, respectively for all the 0,
1734
+ 500, and 1000 ms ahead predictions.
1735
+ We discussed the empirical distribution function of abso-
1736
+ lute errors from the percentage of the LOS blockage time in
1737
+ the experiment as with Section IV-C. In this experimental
1738
+ environment, the throughput value was 1.6 Gbit/s during
1739
+ LOS communication, which is consistent with the maximum
1740
+ throughput value of 1.64 Gbit/s for all timesteps. Timesteps
1741
+ with a throughput value of 0.64 Gbit/s or less were con-
1742
+ sidered as LOS blockage because blockage causes attenua-
1743
+ tion of 1 Gbit/s or more. The percentages of all timesteps
1744
+ with throughput values below 0.64 Gbit/s was 11.2% in
1745
+ the actual test dataset. Because 95% of the errors are less
1746
+ than 0.8 Gbit/s and other errors not caused by blockage
1747
+ are included, we can assume that most of the blockage
1748
+ can be predicted. This is also because the percentage of
1749
+ errors above 1 Gbit/s is less than 1%, which is almost
1750
+ VOLUME ,
1751
+ 13
1752
+
1753
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
1754
+ 0.0
1755
+ 0.2
1756
+ 0.4
1757
+ 0.6
1758
+ 0.8
1759
+ 1.0
1760
+ 0.0
1761
+ 0.2
1762
+ 0.4
1763
+ 0.6
1764
+ 0.8
1765
+ 1.0
1766
+ (a) Prediction by NN
1767
+ Prediction 0 ms ahead
1768
+ Prediction 500 ms ahead
1769
+ Prediction 1000 ms ahead
1770
+ 0.0
1771
+ 0.2
1772
+ 0.4
1773
+ 0.6
1774
+ 0.8
1775
+ 1.0
1776
+ 0.0
1777
+ 0.2
1778
+ 0.4
1779
+ 0.6
1780
+ 0.8
1781
+ 1.0
1782
+ (b) Prediction by GBDT
1783
+ Prediction 0 ms ahead
1784
+ Prediction 500 ms ahead
1785
+ Prediction 1000 ms ahead
1786
+ Absolute error (Gbit/s)
1787
+ Empirical distribution function
1788
+ FIGURE 8. The empirical distribution function of absolute errors for
1789
+ throughput prediction. Two horizontal dotted lines represent 0.8 and 0.95.
1790
+ negligible. Therefore, we conclude our point cloud-based
1791
+ method can predict throughput values for both blockage
1792
+ and LOS communication because absolute errors are mostly
1793
+ concentrated in the 0.4 Gbit/s or less.
1794
+ VI. DISCUSSION
1795
+ We discuss other approaches for predicting mmWave link
1796
+ quality from point clouds. We employed a simple way where
1797
+ the point cloud is converted to the voxel data and well-
1798
+ established algorithms (i.e., 3D-CNN and GBDT) are applied
1799
+ because this study focuses on demonstrating the feasibility of
1800
+ the mmWave link quality prediction from point clouds. This
1801
+ method is advantageous in that it uses voxels as the data
1802
+ format, which are easy to extend and apply to image-based
1803
+ ML algorithms while retaining the 3D structure. However,
1804
+ other combinations of data formats and ML algorithms exist.
1805
+ We grouped other possible approaches into three categories:
1806
+ point clouds, 3D data representations other than point clouds,
1807
+ and hand-made features.
1808
+ As mentioned in Section III-C, the most straightforward
1809
+ approach is to use NN models designed for the point cloud,
1810
+ such as PointNet [33], [34] and VoteNet [35], which can
1811
+ directly input point clouds and extract features from the
1812
+ points. Our preliminary experiments leveraged the existing
1813
+ models (i.e., PointNet and VoteNet) for learning the direct
1814
+ mapping from point clouds to RSSI. However, they failed
1815
+ to predict the large attenuation of link quality induced by
1816
+ LOS blockage. This is because the models’ target task and
1817
+ required characteristics differ from ours. Generally, these
1818
+ existing models are, used for 3D object detection or segmen-
1819
+ tation, in which the translation invariant convolution in Point-
1820
+ Net properly functions to detect objects regardless of their
1821
+ positions. However, in link quality prediction, the positions
1822
+ of the objects are essential since mmWave communications
1823
+ are significantly affected by the mobility of the obstacles and
1824
+ the positions of reflectors. Thus, designing a NN architecture
1825
+ suitable for the prediction from point cloud to link quality
1826
+ can be a novel challenge in the vision-wireless ML task and
1827
+ has the potential to improve prediction accuracy.
1828
+ In addition to point clouds, 3D spaces can be represented
1829
+ using various data formats, such as meshes, octrees [37],
1830
+ and implicit function representations using NN models [50],
1831
+ [51]. These data formats can be converted from one format
1832
+ to another, although shape information is lost. For example,
1833
+ projecting the point cloud onto a fully 2D image [52], [53],
1834
+ transforming the point cloud into a pseudo-image [54], [55],
1835
+ converting the point cloud into sparse voxels [56] are pos-
1836
+ sible. Most methods that utilize these transformations have
1837
+ been proposed for robot control and autonomous driving,
1838
+ and are identical to the link quality prediction task in terms
1839
+ of recognizing and tracking objects in 3D space. Therefore,
1840
+ higher accuracy may be achieved or predictions can be made
1841
+ with a smaller data volume by taking these data format
1842
+ conversions and using ML methods proposed for each data
1843
+ format to predict link quality.
1844
+ Another approach is to improve the feature engineering
1845
+ method in the preprocessing unit. The previously mentioned
1846
+ new approaches assumed an end-to-end prediction system
1847
+ with trainable parameters, where the input is point clouds
1848
+ and the output is a link quality prediction. Alternatively, we
1849
+ can extract information from the point clouds through rule-
1850
+ based feature engineering and use it to predict link quality.
1851
+ For example, existing studies [8], [20], [23] converted to
1852
+ bounding boxes and heatmaps. The advantage of improving
1853
+ feature engineering is increasing the explainability of the pre-
1854
+ diction and reducing the data volume of features. However,
1855
+ these feature engineering methods are inferior to end-to-end
1856
+ prediction systems, such as the difficulty of inputting data
1857
+ into the prediction model when the number of people in the
1858
+ environment changes. Therefore, the proposition of a method
1859
+ that more effectively balances the trade-offs of mmWave link
1860
+ quality prediction with the objectives of the system can be
1861
+ a novel challenge.
1862
+ VII. CONCLUSION
1863
+ In this paper, we demonstrated that point clouds could
1864
+ be an alternative to camera images in terms of proac-
1865
+ tive link quality prediction for mmWave communications.
1866
+ Specifically, a preprocessing method consisting of cropping,
1867
+ downsampling, outlier removal, voxelization, time series
1868
+ concatenation, and labeling was constructed for the point
1869
+ clouds. Subsequently, we selected two ML methods, 3D-
1870
+ CNN and GBDT, which can extract spatio-temporal fea-
1871
+ tures from time series voxel grid. Our point cloud-based
1872
+ link quality prediction method was experimentally evaluated
1873
+ using two different numerical indicators of link quality,
1874
+ RSSI and throughput, as well as two different point clouds,
1875
+ depth camera point cloud and LiDAR point cloud, in a
1876
+ scenario where the mmWave LOS path was aperiodically
1877
+ blocked by pedestrians. These experimental results revealed
1878
+ that our point cloud-based method could quantitatively and
1879
+ deterministically predict large attenuation of link quality
1880
+ values up to 1000 ms ahead.
1881
+ APPENDIX A. VOXELIZATION ALGORITHM
1882
+ The detail of the voxelization algorithm is shown in Al-
1883
+ gorithm 1. First, the min bounds vector (xmin, ymin, zmin)
1884
+ 14
1885
+ VOLUME ,
1886
+
1887
+ and max bounds vector (xmax, ymax, zmax) of all points in
1888
+ the point cloud are calculated. Second, the voxel grid shape
1889
+ (h, w, d) is calculated and the 3D array V representing the
1890
+ voxel grid is initialized with 0. Finally, for each n-th point
1891
+ pn, the index (ix, iy, iz) of the corresponding voxel in the
1892
+ voxel grid is calculated and the voxel value is updated to 1.
1893
+ Algorithm 1 Voxelization
1894
+ Input: Number of points in point cloud N
1895
+ Input: Point cloud P =
1896
+ N−1
1897
+
1898
+ n=0
1899
+ {pn}
1900
+ Input: Voxel size sv > 0
1901
+ Output: 3D array representing the voxel grid V
1902
+ 1: (x0, y0, z0) ← p0
1903
+ 2: (xmin, ymin, zmin) ← (x0, y0, z0)
1904
+ 3: (xmax, ymax, zmax) ← (x0, y0, z0)
1905
+ 4: for n in 1 to N − 1 do
1906
+ 5:
1907
+ (xn, yn, zn) ← pn
1908
+ 6:
1909
+ xmin ← min(xmin, xn)
1910
+ 7:
1911
+ ymin ← min(ymin, yn)
1912
+ 8:
1913
+ zmin ← min(zmin, zn)
1914
+ 9:
1915
+ xmax ← max(xmax, xn)
1916
+ 10:
1917
+ ymax ← max(ymax, yn)
1918
+ 11:
1919
+ zmax ← max(zmax, zn)
1920
+ 12: end for
1921
+ 13: h ←
1922
+ �xmax − xmin
1923
+ sv
1924
+
1925
+ 14: w ←
1926
+ �ymax − ymin
1927
+ sv
1928
+
1929
+ 15: d ←
1930
+ �zmax − zmin
1931
+ sv
1932
+
1933
+ 16: V ← bool[h][w][d]
1934
+ 17: for ix in 0 to h − 1 do
1935
+ 18:
1936
+ for iy in 0 to w − 1 do
1937
+ 19:
1938
+ for iz in 0 to d − 1 do
1939
+ 20:
1940
+ V [ix][iy][iz] ← 0
1941
+ 21:
1942
+ end for
1943
+ 22:
1944
+ end for
1945
+ 23: end for
1946
+ 24: for n in 0 to N − 1 do
1947
+ 25:
1948
+ (xn, yn, zn) ← pn
1949
+ 26:
1950
+ ix ←
1951
+ �xn − xmin
1952
+ sv
1953
+
1954
+ 27:
1955
+ iy ←
1956
+ �yn − ymin
1957
+ sv
1958
+
1959
+ 28:
1960
+ iz ←
1961
+ �zn − zmin
1962
+ sv
1963
+
1964
+ 29:
1965
+ V [ix][iy][iz] ← 1
1966
+ 30: end for
1967
+ 31: return V
1968
+ ▷ ⌊x⌋ represents the greatest integer less than or equal to x.
1969
+ ▷ ⌈x⌉ represents the least integer greater than or equal to x.
1970
+ APPENDIX B. CONVERSION FROM DEPTH IMAGE TO
1971
+ NORMALIZED POINT CLOUD
1972
+ The conversion procedure from a depth image to a normal-
1973
+ ized point cloud is shown in Algorithm 2. In this paper,
1974
+ this normalized point cloud is also referred to as a depth
1975
+ camera point cloud. Let M be a two-dimensional array
1976
+ representing a depth image. Let U and V be the width and
1977
+ height of the depth image, respectively, and let [0, D) be
1978
+ the range of depth value d. In the depth image used in this
1979
+ study, (U, V, D) = (512, 424, 256). A point p is assigned
1980
+ in the 3D Cartesian coordinate to each pixel in the depth
1981
+ image. This process fits all UV points into the [0, D)3 cubic
1982
+ region. All depth camera point clouds have 217,088 points in
1983
+ this study. The aforementioned method is applied to all the
1984
+ depth images to generate depth camera point clouds. This
1985
+ conversion method was constructed based on Open3D [36]
1986
+ and Pseudo-LiDAR [57].
1987
+ Algorithm 2 Conversion from depth image to normalized
1988
+ point cloud
1989
+ Input: Depth image M
1990
+ Input: Width of the depth image U > 0
1991
+ Input: Height of the depth image V > 0
1992
+ Input: Maximum value of depth D > 0
1993
+ Output: Point cloud P
1994
+ 1: P ← ∅
1995
+ 2: cu ← U − 1
1996
+ 2
1997
+ 3: cv ← V − 1
1998
+ 2
1999
+ 4: for u in 0 to U − 1 do
2000
+ 5:
2001
+ for v in 0 to V − 1 do
2002
+ 6:
2003
+ d ← M[u][v]
2004
+ 7:
2005
+ x ← u − cu
2006
+ U − 1 d + D
2007
+ 2
2008
+ 8:
2009
+ y ← v − cv
2010
+ V − 1 d + D
2011
+ 2
2012
+ 9:
2013
+ z ← d
2014
+ 10:
2015
+ p ← (x, y, z)
2016
+ 11:
2017
+ P ← P ∪ {p}
2018
+ 12:
2019
+ end for
2020
+ 13: end for
2021
+ 14: return P
2022
+ REFERENCES
2023
+ [1] A. N. Uwaechia and N. M. Mahyuddin, “A comprehensive survey
2024
+ on millimeter wave communications for fifth-generation wireless net-
2025
+ works: Feasibility and challenges,” IEEE Access, vol. 8, pp. 62 367–
2026
+ 62 414, 2020.
2027
+ [2] W. Hong, Z. H. Jiang, C. Yu, D. Hou, H. Wang, C. Guo, Y. Hu,
2028
+ L. Kuai, Y. Yu, Z. Jiang, Z. Chen, J. Chen, Z. Yu, J. Zhai, N. Zhang,
2029
+ L. Tian, F. Wu, G. Yang, Z.-C. Hao, and J. Y. Zhou, “The role
2030
+ of millimeter-wave technologies in 5G/6G wireless communications,”
2031
+ IEEE J. Microw., vol. 1, no. 1, pp. 101–122, 2021.
2032
+ VOLUME ,
2033
+ 15
2034
+
2035
+ Ohta et al.: Point Cloud-based Proactive Link Quality Prediction for Millimeter-wave Communications
2036
+ [3] T. Nitsche, C. Cordeiro, A. B. Flores, E. W. Knightly, E. Perahia, and
2037
+ J. C. Widmer, “IEEE 802.11ad: directional 60 GHz communication
2038
+ for multi-gigabit-per-second Wi-Fi,” IEEE Commun. Mag., vol. 52,
2039
+ no. 12, pp. 132–141, 2014.
2040
+ [4] C. J. Hansen, “WiGiG: Multi-gigabit wireless communications in the
2041
+ 60 GHz band,” IEEE Wireless Commun., vol. 18, no. 6, pp. 6–7, 2011.
2042
+ [5] S. Collonge, G. Zaharia, and G. Zein, “Influence of the human activity
2043
+ on wide-band characteristics of the 60 GHz indoor radio channel,”
2044
+ IEEE Trans. Wireless Commun., vol. 3, no. 6, pp. 2396–2406, Nov.
2045
+ 2004.
2046
+ [6] T. Nishio, Y. Koda, J. Park, M. Bennis, and K. Doppler, “When
2047
+ wireless communications meet computer vision in beyond 5G,” IEEE
2048
+ Commun. Stand. Mag., vol. 5, no. 2, pp. 76–83, 2021.
2049
+ [7] T. Nishio, H. Okamoto, K. Nakashima, Y. Koda, K. Yamamoto,
2050
+ M. Morikura, Y. Asai, and R. Miyatake, “Proactive received power
2051
+ prediction using machine learning and depth images for mmWave
2052
+ networks,” IEEE J. Sel. Areas Commun., vol. 37, no. 11, pp. 2413–
2053
+ 2427, Nov. 2019.
2054
+ [8] S. Wu, C. Chakrabarti, and A. Alkhateeb, “LiDAR-aided mobile
2055
+ blockage prediction in real-world millimeter wave systems,” in Proc.
2056
+ IEEE WCNC, Austin, TX, USA, Apr. 2022, pp. 2631–2636.
2057
+ [9] S. Gong, X. Lu, D. T. Hoang, D. Niyato, L. Shu, D. I. Kim, and
2058
+ Y.-C. Liang, “Toward smart wireless communications via intelligent
2059
+ reflecting surfaces: A contemporary survey,” IEEE Commun. Surveys
2060
+ Tuts.”, vol. 22, no. 4, pp. 2283–2314, 2020.
2061
+ [10] A. Yilmaz, O. Javed, and M. Shah, “Object tracking: A survey,” ACM
2062
+ Comput. Surv., vol. 38, no. 4, p. 13–68, Dec. 2006.
2063
+ [11] A. G¨unter, S. B¨oker, M. K¨onig, and M. Hoffmann, “Privacy-preserving
2064
+ people detection enabled by solid state LiDAR,” in Proc. IEEE IE,
2065
+ Madrid, Spain, Jul. 2020, pp. 1–4.
2066
+ [12] B. Rodrigues, L. M¨uller, E. J. Scheid, M. F. Franco, C. Killer, and
2067
+ B. Stiller, “LaFlector: a privacy-preserving LiDAR-based approach for
2068
+ accurate indoor tracking,” in Proc. IEEE LCN, Edmonton, Canada,
2069
+ Oct. 2021, pp. 367–370.
2070
+ [13] Stanford Artificial Intelligence Laboratory et al., “Robotic operating
2071
+ system,” May 2018. [Online]. Available: https://www.ros.org
2072
+ [14] A. Geiger, P. Lenz, and R. Urtasun, “Are we ready for autonomous
2073
+ driving? the KITTI vision benchmark suite,” in Proc. IEEE CVPR,
2074
+ Providence, Rhode Island, USA, Jun. 2012, pp. 3354–3361.
2075
+ [15] H. Caesar, V. Bankiti, A. H. Lang, S. Vora, V. E. Liong, Q. Xu,
2076
+ A. Krishnan, Y. Pan, G. Baldan, and O. Beijbom, “nuScenes: A
2077
+ multimodal dataset for autonomous driving,” in Proc. IEEE/CVF
2078
+ CVPR, Online, Jun. 2020, pp. 11 621–11 631.
2079
+ [16] T. Deng, K. Zhang, and Z.-J. M. Shen, “A systematic review of a
2080
+ digital twin city: A new pattern of urban governance toward smart
2081
+ cities,” J. Manag. Sci. Eng., vol. 6, no. 2, pp. 125–134, 2021.
2082
+ [17] T. Wild, V. Braun, and H. Viswanathan, “Joint design of communica-
2083
+ tion and sensing for beyond 5G and 6G systems,” IEEE Access, vol. 9,
2084
+ pp. 30 845–30 857, 2021.
2085
+ [18] S. Kumar, C. Savur, and F. Sahin, “Survey on human–robot collabora-
2086
+ tion in industrial settings: Safety, intuitive interfaces and applications,”
2087
+ IEEE Trans. Syst., Man, Cybern., Syst., vol. 51, no. 1, pp. 280–297,
2088
+ Dec. 2020.
2089
+ [19] K. Yoneda, N. Ichihara, H. Kawanishi, T. Okuno, L. Cao, and
2090
+ N. Suganuma, “Sun-glare region recognition using visual explanations
2091
+ for traffic light detection,” in Proc. IEEE IV, Nagoya, Japan, Jul. 2021,
2092
+ pp. 1464–1469.
2093
+ [20] D. Marasinghe, N. Rajatheva, and M. Latva-aho, “LiDAR aided human
2094
+ blockage prediction for 6G,” in Proc. IEEE GC Wkshps, Madrid,
2095
+ Spain, Dec. 2021, pp. 1–6.
2096
+ [21] S. Ohta, T. Nishio, R. Kudo, and K. Takahashi, “Millimeter-wave
2097
+ received power prediction using point cloud data and supervised
2098
+ learning,” in Proc. IEEE VTC-Spring, Helsinki, Finland, Jun. 2022,
2099
+ pp. 1–5.
2100
+ [22] A. Klautau, N. Gonz´alez-Prelcic, and R. W. Heath, “LIDAR data
2101
+ for deep learning-based mmWave beam-selection,” IEEE Wireless
2102
+ Commun. Lett., vol. 8, no. 3, pp. 909–912, 2019.
2103
+ [23] T. Zhang, J. Liu, and F. Gao, “Vision aided beam tracking and
2104
+ frequency handoff for mmWave communications,” in Proc. IEEE
2105
+ INFOCOM Wkshps, Online, May 2022, pp. 1–2.
2106
+ [24] H. Asano, H. Noguchi, N. Shimizu, T. Asanuma, M. Yasugi, T. Ueta,
2107
+ K. Ohno, and R. Honda, “High power efficiency millimeter-wave
2108
+ network with communication quality prediction technology,” in Proc.
2109
+ IEEE APWCS, Online, Aug. 2021, pp. 1–5.
2110
+ [25] T. Yamazaki, K. Shimaoka, K. Ohno, U. Johannsen, and S. H.
2111
+ De Groot, “Received path power prediction for millimeter-wave using
2112
+ machine learning,” in Proc. IEEE ICCE, Nha Trang City, Vietnam,
2113
+ Jul. 2022, pp. 1–6.
2114
+ [26] Y. Egi and C. E. Otero, “Machine-learning and 3D point-cloud
2115
+ based signal power path loss model for the deployment of wireless
2116
+ communication systems,” IEEE Access, vol. 7, pp. 42 507–42 517,
2117
+ 2019.
2118
+ [27] J. J¨arvel¨ainen, S. L. H. Nguyen, K. Haneda, R. Naderpour, and U. T.
2119
+ Virk, “Evaluation of millimeter-wave line-of-sight probability with
2120
+ point cloud data,” IEEE Wireless Commun. Lett., vol. 5, no. 3, pp.
2121
+ 228–231, 2016.
2122
+ [28] J. J¨arvel¨ainen, K. Haneda, and A. Karttunen, “Indoor propagation
2123
+ channel simulations at 60 GHz using point cloud data,” IEEE Trans.
2124
+ Antennas Propag., vol. 64, no. 10, pp. 4457–4467, 2016.
2125
+ [29] J. St´ephan, Y. Corre, R. Charbonnier, and Y. Lostalen, “Increased
2126
+ reliability of outdoor millimeter-wave link simulations by leveraging
2127
+ LiDAR point cloud,” in Proc. EuCAP, London, UK, Apr. 2018, pp.
2128
+ 1–5.
2129
+ [30] X. Shi, Z. Chen, H. Wang, D.-Y. Yeung, W.-k. Wong, and W.-c. Woo,
2130
+ “Convolutional LSTM network: A machine learning approach for
2131
+ precipitation nowcasting,” in Proc. NeurIPS, Cambridge, MA, USA,
2132
+ 2015, p. 802–810.
2133
+ [31] L. Breiman, “Random forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32,
2134
+ 2001.
2135
+ [32] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural
2136
+ computation, vol. 9, no. 8, pp. 1735–1780, 1997.
2137
+ [33] R. Q. Charles, H. Su, M. Kaichun, and L. J. Guibas, “PointNet: Deep
2138
+ learning on point sets for 3D classification and segmentation,” in Proc.
2139
+ IEEE/CVF CVPR, Honolulu, HI, USA, Jul. 2017, pp. 77–85.
2140
+ [34] C. R. Qi, L. Yi, H. Su, and L. J. Guibas, “PointNet++: Deep
2141
+ hierarchical feature learning on point sets in a metric space,” in Proc.
2142
+ NeurIPS, Long Beach, CA, USA, Dec. 2017, pp. 1–10.
2143
+ [35] C. R. Qi, O. Litany, K. He, and L. J. Guibas, “Deep hough voting
2144
+ for 3D object detection in point clouds,” in Proc. IEEE/CVF ICCV,
2145
+ Seoul, Korea, Oct. 2019, pp. 9277–9286.
2146
+ [36] Q.-Y. Zhou, J. Park, and V. Koltun, “Open3D: A modern library for
2147
+ 3D data processing,” arXiv:1801.09847, 2018.
2148
+ [37] R. B. Rusu and S. Cousins, “3D is here: Point Cloud Library (PCL),”
2149
+ in Proc. IEEE ICRA, Shanghai, China, May 2011, pp. 1–4.
2150
+ [38] D. Maturana and S. Scherer, “VoxNet: A 3D convolutional neural net-
2151
+ work for real-time object recognition,” in Proc. IEEE IROS, Hamburg,
2152
+ Germany, Sep. 2015, pp. 922–928.
2153
+ [39] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhut-
2154
+ dinov, “Dropout: a simple way to prevent neural networks from
2155
+ overfitting,” J. Mach. Learn. Res., vol. 15, no. 1, pp. 1929–1958, 2014.
2156
+ [40] (Dec. 2022), Keras. [Online]. Available: https://keras.io
2157
+ [41] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin,
2158
+ S. Ghemawat, G. Irving, M. Isard et al., “TensorFlow: a system for
2159
+ large-scale machine learning,” in Proc. OSDI, Savannah, GA, USA,
2160
+ 2016, pp. 265–283.
2161
+ [42] G. Ke, Q. Meng, T. Finley, T. Wang, W. Chen, W. Ma, Q. Ye, and
2162
+ T.-Y. Liu, “LightGBM: A highly efficient gradient boosting decision
2163
+ tree,” in Proc. NeurIPS, vol. 30, Long Beach, CA, USA., 2017, pp.
2164
+ 3146–3154.
2165
+ [43] T. Raj, F. H. Hashim, A. B. Huddin, M. F. Ibrahim, and A. Hussain,
2166
+ “A survey on LiDAR scanning mechanisms,” Electronics, vol. 9, no. 5,
2167
+ p. 741, 2020.
2168
+ [44] Y. Koda, K. Yamamoto, T. Nishio, and M. Morikura, “Time series mea-
2169
+ surement of IEEE 802.11ad signal power involving human blockage
2170
+ with HMM-based state estimation,” in Proc. IEEE VTC-Fall, Toronto,
2171
+ Canada, Sep. 2017, pp. 1–5.
2172
+ [45] M. Alexander et al., “Channel models for 60 GHz WLAN systems,”
2173
+ IEEE Standard 802.11-09/0334r8, Jul. 2009.
2174
+ [46] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimiza-
2175
+ tion,” in Proc. ICLR, San Diego, CA, USA, May 2015, pp. 1–15.
2176
+ [47] A. Tirumala, “Iperf: The TCP/UDP bandwidth measurement tool,”
2177
+ 1999. [Online]. Available: https://iperf.fr
2178
+ [48] (Dec.
2179
+ 2022),
2180
+ The
2181
+ wireshark
2182
+ foundation,
2183
+ Wireshark.
2184
+ [Online].
2185
+ Available: https://www.wireshark.org
2186
+ [49] (Dec. 2022), The tcpdump group, tcpdump. [Online]. Available:
2187
+ https://www.tcpdump.org
2188
+ 16
2189
+ VOLUME ,
2190
+
2191
+ [50] S. A. Eslami, D. Jimenez Rezende, F. Besse, F. Viola, A. S. Morcos,
2192
+ M. Garnelo, A. Ruderman, A. A. Rusu, I. Danihelka, K. Gregor et al.,
2193
+ “Neural scene representation and rendering,” Science, vol. 360, no.
2194
+ 6394, pp. 1204–1210, 2018.
2195
+ [51] B. Mildenhall, P. P. Srinivasan, M. Tancik, J. T. Barron, R. Ramamoor-
2196
+ thi, and R. Ng, ��NeRF: Representing scenes as neural radiance fields
2197
+ for view synthesis,” in Proc. ECCV, Online, Aug. 2020, pp. 405–421.
2198
+ [52] M. Simony, S. Milzy, K. Amendey, and H.-M. Gross, “Complex-
2199
+ YOLO: An euler-region-proposal for real-time 3D object detection on
2200
+ point clouds,” in Proc. ECCV Wkshps, Munich, Germany, Sep. 2018,
2201
+ pp. 1–14.
2202
+ [53] W. Ali, S. Abdelkarim, M. Zidan, M. Zahran, and A. El Sallab,
2203
+ “YOLO3D: End-to-end real-time 3D oriented object bounding box
2204
+ detection from Lidar point cloud,” in Proc. ECCV Wkshps, Munich,
2205
+ Germany, Sep. 2018, pp. 1–12.
2206
+ [54] A. H. Lang, S. Vora, H. Caesar, L. Zhou, J. Yang, and O. Beijbom,
2207
+ “PointPillars: Fast encoders for object detection from point clouds,”
2208
+ in Proc. IEEE/CVF CVPR, Long Beach, CA, USA, Jun. 2019, pp.
2209
+ 12 697–12 705.
2210
+ [55] T. Yin, X. Zhou, and P. Krahenbuhl, “Center-based 3D object detection
2211
+ and tracking,” in Proc. IEEE/CVF CVPR, Online, Jun. 2021, pp.
2212
+ 11 784–11 793.
2213
+ [56] C. Choy, J. Gwak, and S. Savarese, “4D spatio-temporal convnets:
2214
+ Minkowski convolutional neural networks,” in Proc. IEEE/CVF CVPR,
2215
+ Long Beach, CA, USA, Jun. 2019, pp. 3075–3084.
2216
+ [57] Y. Wang, W.-L. Chao, D. Garg, B. Hariharan, M. Campbell, and
2217
+ K. Weinberger, “Pseudo-LiDAR from visual depth estimation: Bridg-
2218
+ ing the gap in 3D object detection for autonomous driving,” in Proc.
2219
+ IEEE/CVF CVPR, Long Beach, CA, USA, Jun. 2019, pp. 8445–8453.
2220
+ Shoki Ohta received the B.E. degree in informa-
2221
+ tion and communications engineering from Tokyo
2222
+ Institute of Technology in 2022. He is currently
2223
+ studying toward the M.E. degree at the School
2224
+ of Engineering, Tokyo Institute of Technology. He
2225
+ received the IEEE Vehicular Technology Society
2226
+ (VTS) Japan Young Researcher’s Encouragement
2227
+ Award in 2022. He is a student member of the
2228
+ IEEE.
2229
+ Takayuki Nishio (S’11-M’14-SM’20) received
2230
+ the B.E. degree in electrical and electronic en-
2231
+ gineering and the master’s and Ph.D. degrees in
2232
+ informatics from Kyoto University in 2010, 2012,
2233
+ and 2013, respectively. He had been an assistant
2234
+ professor in the Graduate School of Informatics,
2235
+ Kyoto University from 2013 to 2020. From 2016
2236
+ to 2017, he was a visiting researcher in Wireless
2237
+ Information Network Laboratory (WINLAB), Rut-
2238
+ gers University, United States. He has been an
2239
+ associate professor in the School of Engineering,
2240
+ Tokyo Institute of Technology, Japan, since 2020. His current research
2241
+ interests include machine learning-based network control, machine learning
2242
+ in wireless networks, and heterogeneous resource management.
2243
+ Riichi Kudo received the B.S. and M.S. degrees
2244
+ in geophysics from Tohoku University, Japan, in
2245
+ 2001 and 2003, respectively. He received the Ph.D.
2246
+ degree in informatics from Kyoto University in
2247
+ 2010. In 2003, he joined NTT Network Innovation
2248
+ Laboratories, Japan. He was a visiting fellow at
2249
+ the Center for Communications Research (CCR),
2250
+ Bristol University, UK, from 2012 to 2013, and
2251
+ worked for NTT DOCOMO from 2015 to 2018.
2252
+ He is now working for NTT Network Innovation
2253
+ Laboratories. He received the Young Engineer
2254
+ Award from IEICE and IEEE AP-S Japan Chapter Young Engineer Award
2255
+ in 2006 and 2010, respectively. He is a member of IEICE and IEEE.
2256
+ Kahoko Takahashi received the B.S. degree in
2257
+ seismology and M.S. degree in Sensory Infor-
2258
+ mation Science from Yokohama City University,
2259
+ Japan, in 2017 and 2019, respectively. In 2019,
2260
+ she joined NTT Network Innovation Laboratories,
2261
+ Yokosuka, Japan. Her current research interests
2262
+ include machine learning. She is a member of
2263
+ IEICE.
2264
+ Hisashi Nagata received the B.S. and M.S. de-
2265
+ grees in physics from Tokyo University of Science,
2266
+ Japan, in 2012 and Osaka University, Japan, in
2267
+ 2014, respectively. In 2014, he joined NTT Net-
2268
+ work Innovation Laboratories, Japan. He worked
2269
+ for NTT WEST from 2017 to 2021. He is now
2270
+ working for NTT Network Innovation Laborato-
2271
+ ries. He is a member of IEICE.
2272
+ VOLUME ,
2273
+ 17
2274
+
59AyT4oBgHgl3EQf2fl-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
B9E1T4oBgHgl3EQfDwMT/content/tmp_files/2301.02880v1.pdf.txt ADDED
@@ -0,0 +1,1195 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A Simulation Study for the Expected
2
+ Performance of Sharjah-Sat-1 payload
3
+ improved X-Ray Detector (iXRD) in the
4
+ Orbital Background Radiation
5
+ Ali M. Altıng¨un1*, Emrah Kalemci1* and Efe ¨Oztaban1
6
+ 1*Faculty of Engineering and Natural Sciences, Sabanciı
7
+ University, Orta Mah. Tuzla, Istanbul, 34956, Turkey.
8
+ *Corresponding author(s). E-mail(s): aaltingun@sabanciuniv.edu;
9
+ ekalemci@sabanciuniv.edu;
10
+ Contributing authors: efeoztaban@sabanciuniv.edu;
11
+ Abstract
12
+ Sharjah-Sat-1 is a 3U cubesat with a CdZnTe based hard X-ray detec-
13
+ tor, called iXRD (improved X-ray Detector) as a scientific payload
14
+ with the primary objective of monitoring bright X-ray sources in the
15
+ galaxy. We investigated the effects of the in-orbit background radia-
16
+ tion on the iXRD based on Geant4 simulations. Several background
17
+ components were included in the simulations such as the cosmic dif-
18
+ fuse gamma-rays, galactic cosmic rays (protons and alpha particles),
19
+ trapped protons and electrons, and albedo radiation arising from the
20
+ upper layer of the atmosphere. The most dominant component is the
21
+ albedo photon radiation which contributes at low and high energies
22
+ alike in the instrument energy range of 20 keV - 200 keV. On the
23
+ other hand, the cosmic diffuse gamma-ray contribution is the strongest
24
+ between 20 keV and 60 keV in which most of the astrophysics source flux
25
+ is expected. The third effective component is the galactic cosmic pro-
26
+ tons. The radiation due to the trapped particles, the albedo neutrons,
27
+ and the cosmic alpha particles are negligible when the polar regions
28
+ and the South Atlantic Anomaly region are excluded in the analysis.
29
+ The total background count rates are ∼0.36 and ∼0.85 counts/s for
30
+ the energy bands of 20 - 60 keV and 20 - 200 keV, respectively. We
31
+ performed charge transportation simulations to determine the spectral
32
+ response of the iXRD and used it in sensitivity calculations as well.
33
+ 1
34
+ arXiv:2301.02880v1 [physics.ins-det] 7 Jan 2023
35
+
36
+ 2
37
+ Expected Performance of iXRD in the Orbital Background Radiation
38
+ The simulation framework was validated with experimental studies. The
39
+ estimated sensitivity of 180 mCrab between the energy band of 20 keV
40
+ - 100 keV indicates that the iXRD could achieve its scientific goals.
41
+ Keywords: iXRD, Geant4 simulations, THEBES, Background radiation in
42
+ space, Sensitivity
43
+ 1 Introduction
44
+ Sharjah-Sat-1 is a 3U cubesat X-ray satellite being developed in collaboration
45
+ with the Sharjah Academy for Astronomy, Space Sciences, and Technology,
46
+ the University of Sharjah, Istanbul Technical University, and Sabanci Univer-
47
+ sity. Its scientific payload, the iXRD (improved X-Ray Detector), is a CdZnTe
48
+ based hard X-ray detector with the main objective of monitoring bright X-ray
49
+ sources [1]. The iXRD is an improved version of XRD (X-Ray Detector) that
50
+ has been employed as a scientific payload for the 2U BeEagleSAT cubesat[2].
51
+ While the XRD served as a demonstrator, the iXRD is a system with point
52
+ source observing capability and better spectral and noise performance thanks
53
+ to the improvements made in the readout electronics and mechanical design
54
+ and the addition of a collimator [3]. The iXRD has 2.54×2.54×0.5 cm3 pixel-
55
+ lated CdZnTe crystal produced by eV Products (Kromek). It consists of 256
56
+ pixels (16 × 16) with 1.6 mm pitch size and a planar cathode. The energy
57
+ range is from 20 keV to 200 keV, limited by the readout electronics. For read-
58
+ out, RENA 3b ASIC (application-specific integrated circuit) with 36 channels
59
+ is used[4]. Therefore, some of the pixels are connected into groups forming sin-
60
+ gle (one pixel), small (6 pixels), medium (8-9 pixels), and large (10-12 pixels)
61
+ channels. There is a square hole Tungsten collimator over the top of the crystal.
62
+ Its structure also encircles the crystal for additional background protection.
63
+ The collimator provides a 4.26◦ field of view (FoV) which enables the iXRD to
64
+ observe point sources and reduces the cosmic X-ray background substantially.
65
+ In addition, an aluminum plate of 0.3 mm is positioned on top of the colli-
66
+ mator as an optical light blocker. Finally, a 2 mm thick tungsten plate (called
67
+ back-shield) is placed under the crystal serving as a passive shielding against
68
+ all radiation, especially the components arising at Earth’s albedo. A simple
69
+ CAD drawing of the iXRD components is illustrated in Fig. 1. The details of
70
+ the design and on-ground performance of the detector are given in [3].
71
+ The cubesat is planned to be launched into a near-polar sun-synchronous
72
+ orbit (SSO) with an altitude of 500 - 600 km. The harsh radiation envi-
73
+ ronment in the low Earth orbit (LEO) has crucial effects on the operation
74
+ of spacecrafts. High-energy particles and photons decrease the observation
75
+ performance. Moreover, the charged particles cause radiation damage to
76
+ the electronic systems and may degrade CdZnTe crystal properties in time.
77
+ Therefore, understanding the in-orbit radiation effects plays an important
78
+ role in the performance of the iXRD. The background radiation consists of
79
+
80
+ Expected Performance of iXRD in the Orbital Background Radiation
81
+ 3
82
+ Fig. 1 A plain CAD drawing of the iXRD system. Daughterboard carries the RENA and
83
+ associated power supplies and motherboard carries the digital control electronics.
84
+ two main components, prompt and delayed radiation. The prompt radiation
85
+ is due to the trapped charged particles by the Earth’s magnetic field, cosmic
86
+ diffuse gamma-rays, galactic cosmic rays, albedo radiation originating from
87
+ the interactions of cosmic particles with the atmosphere. Long-term irradi-
88
+ ation of the cosmic and trapped protons can produce radioactive isotopes
89
+ within the material of the satellites. The emission from the induced isotopes
90
+ is called delayed background radiation. Considering the size of Sharjah-Sat-1
91
+ and the mission lifetime of 1-2 years, background due to the activation has
92
+ not been considered in this work.
93
+ We performed several Monte Carlo simulations to estimate the background
94
+ effects by using GEANT4 software package [5], which allows us to calculate
95
+ energy depositions in the CdZnTe crystal by the incoming radiation. In this
96
+ way, we determined the contributions of each component to the total back-
97
+ ground level. Also, an optimization study for the back-shield design to mitigate
98
+ the effects of the albedo radiation has been carried out. Finally, by using the
99
+ simulated background rates and charge transportation simulation results, we
100
+ calculated the sensitivity of the iXRD.
101
+
102
+ > Optical Light Blocker
103
+ Tungsten
104
+ Collimator
105
+ Daughter Board
106
+ CdZnTe Crystal <
107
+ Tunsgten
108
+ Mother
109
+ Mid-Shield
110
+ Board4
111
+ Expected Performance of iXRD in the Orbital Background Radiation
112
+ 2 Components of the background radiation
113
+ environment in the LEO
114
+ In our work, we considered several background components such as the cos-
115
+ mic diffuse gamma-rays, galactic cosmic rays, trapped particles due to the
116
+ Earth’s magnetic field, and albedo particles and photons originating from the
117
+ interactions of cosmic particles with the atmosphere. In the following sections,
118
+ we describe the spectrum of each component that is used as an input for the
119
+ Geant4 simulations.
120
+ 2.1 Cosmic diffuse gamma-rays
121
+ The first evidence for the cosmic diffuse gamma-rays (CDGR) was reported
122
+ by a rocket-borne large area Geiger counters in 1962[6]. At soft X-ray energies,
123
+ primary contributors are active galactic nuclei (AGNs) [7] and X-ray Binaries
124
+ (XRB) in the distant galaxies [8], while at hard X-ray and gamma-ray energies,
125
+ the contributions are mainly due to the AGNs components, supernovas and
126
+ blazars[9]. The differential flux of the CDGR in the LEO is given by Eq. 1 for
127
+ the energies between 10 keV to 100 MeV[9]. The given flux is in the unit of
128
+ particles/cm2/s/sr/keV.
129
+ f
130
+
131
+ E
132
+
133
+ dE
134
+ =
135
+
136
+
137
+
138
+
139
+
140
+
141
+
142
+
143
+
144
+
145
+
146
+
147
+
148
+
149
+
150
+ 7.877× E−1.29 exp
151
+ � −E
152
+ 41.13
153
+
154
+ for 3 keV ≤ E ≤ 60 keV
155
+ 4.32×10−4 � E
156
+ 60
157
+ �−6.5
158
+ + 8.4×10−3 � E
159
+ 60
160
+ �−2.58
161
+ for E≥ 60 keV
162
+ + 4.8×10−4 � E
163
+ 60
164
+ �−2.05
165
+ (1)
166
+ 2.2 Trapped particles
167
+ Unlike the other terrestrial planets in the Solar System, there is an immense
168
+ magnetic field around the Earth which serves as a strong shield for the charged
169
+ particles originating from the Sun and outer space. The particles streaming
170
+ toward the Earth are trapped by the magnetic field and move along the field
171
+ lines for long periods. Although the first significant studies on the existence
172
+ of the trapped charged particles were carried out towards the end of the 19th
173
+ century, it was first confirmed by the Explorer 1 spacecraft equipped with
174
+ a Geiger Muller tube in 1958 [10]. The trapped charged particle zones are
175
+ called Van Allen radiation belts. The Van Allen belts consist of the inner belt,
176
+ which has a population of MeV protons and tens to hundreds of keV electrons,
177
+ and the outer belt which is mostly dominated by MeV electrons [11]. The
178
+ population of the trapped particles is not stable and varies in the orbit due
179
+ to effects such as solar activity and the local changes in the Earth’s magnetic
180
+ field. The South Atlantic Anomaly (SAA) is the area where the magnetic
181
+
182
+ Expected Performance of iXRD in the Orbital Background Radiation
183
+ 5
184
+ field lines dip down to low altitudes, which is surmised to be caused by the
185
+ complicated motion of the molten metals in the Earth’s outer core and the tilt
186
+ of the Earth’s magnetic field axis with respect to the rotation axis. The trapped
187
+ proton population is quite high inside the SAA region. Rigidity of a charged
188
+ particle is a measure of the particle stiffness against the magnetic field to be
189
+ bent. Particles with the same rigidity, charge, and initial conditions will follow
190
+ the same path under a static magnetic field. For each coordinate on the Earth,
191
+ there is a rigidity value, called geomagnetic cut-off rigidity, that describes the
192
+ access of a charged particle to the Earth. Particles with rigidity less than the
193
+ cut-off rigidity can not penetrate the magnetosphere and are deflected. Due to
194
+ the low cut-off rigidities in the polar regions, the trapped electron fluxes can
195
+ increase substantially at high latitudes. Since regular science observations are
196
+ not possible due to high particle fluxes, the iXRD will be inoperative while
197
+ passing through the SAA and the polar regions.
198
+ 2.2.1 Trapped electrons
199
+ Trapped electron flux averaged over one year mission was obtained from SPEN-
200
+ VIS by using the AE8 MAX model in the energy range of 40 keV to 7 MeV.
201
+ Average trapped electron exposure on the cubesat along the 1-day orbital
202
+ trajectory is shown in Fig. 2. The squares in the figure indicate the orbital
203
+ positions of the cubesat and each position corresponds to approximately 60
204
+ seconds of flight time. The average electron flux is extremely high in the SAA
205
+ region and at high altitudes. The orbit-averaged energy spectra for the trapped
206
+ electrons excluding and including the high count rate areas are given in Fig. 3.
207
+ It can be easily deduced from the spectra that the effect of trapped elec-
208
+ trons is considerably reduced when the regions with high background rates are
209
+ excluded in the planning of observations.
210
+ 2.2.2 Trapped protons
211
+ Average proton flux over one year mission was calculated by using the model
212
+ for the trapped proton population at minimum solar activity, AP8 MIN [12].
213
+ The energy range of the trapped protons is from 100 keV to 400 MeV in the
214
+ LEO. In Fig. 4, average trapped proton exposure on the cubesat along the 1-
215
+ day orbital trajectory is illustrated and one can see that the trapped protons
216
+ are highly populated inside the SAA region. Fig. 5shows the orbit-averaged
217
+ trapped proton flux and the background flux significantly drops when the SAA
218
+ area is excluded.
219
+ 2.3 Galactic cosmic rays
220
+ Galactic cosmic rays (GCRs) originate from the outside of the Solar System.
221
+ GCRs consist of approximately 98% high energetic, completely ionized nuclei
222
+ ranging from hydrogen to uranium and around 2% electrons and positrons.
223
+ The nuclei population consists of ∼87% hydrogen ions (protons), ∼12% helium
224
+ nuclei (alpha particles), and ∼1% of much heavier nuclei [13]. In this work,
225
+
226
+ 6
227
+ Expected Performance of iXRD in the Orbital Background Radiation
228
+ )
229
+ -1
230
+ s
231
+ -2
232
+ AE-8 MAX Integral Flux > 0.04 MeV (cm
233
+ 6
234
+ 10
235
+ 5
236
+ 10
237
+ 4
238
+ 10
239
+ 3
240
+ 10
241
+ 2
242
+ 10
243
+ 1
244
+ 10
245
+ Longitude
246
+ 150
247
+
248
+ 100
249
+
250
+ 50
251
+
252
+ 0
253
+ 50
254
+ 100
255
+ 150
256
+ Latitude
257
+ 80
258
+
259
+ 60
260
+
261
+ 40
262
+
263
+ 20
264
+
265
+ 0
266
+ 20
267
+ 40
268
+ 60
269
+ 80
270
+ Fig. 2 The average trapped electron flux to which Sharjah-Sat-1 is exposed during one-day
271
+ orbital trajectory.
272
+ we only considered the hydrogen ions and helium nuclei. The fluxes for the
273
+ GCRs were retrieved from SPENVIS and the ISO-15390 standard model was
274
+ implemented. The GCRs are considerably affected by solar winds. We used
275
+ the following parameters for the ISO-15390 model: mission epoch for solar
276
+ activity, magnetic shielding on, all directions, stormy magnetosphere, Størmer
277
+ with eccentric dipole method, and magnetic field moment unchanged. Fig. 6
278
+ shows the differential fluxes for cosmic protons and alpha particles averaged
279
+ over the spacecraft orbit obtained by the ISO-15390 model1 for the SSO orbit
280
+ at 550 km altitude.
281
+ 2.4 Albedo Radiation
282
+ The atmosphere of the Earth obstructs energetic particles from the Sun and
283
+ outer space. From the outer layers, some fraction of the incident particles is
284
+ reflected as well as create secondary (albedo) particles contributing to the
285
+ radiation environment in the Earth’s orbits. In this paper, we considered two
286
+ secondary components, albedo photons, and neutrons. The given fluxes are in
287
+ the unit of particles/cm2/s/sr/keV.
288
+ 1https://www.spenvis.oma.be/help/background/gcr/gcr.html#ISO
289
+
290
+ Expected Performance of iXRD in the Orbital Background Radiation
291
+ 7
292
+ Fig. 3 The integral spectra for the orbit-averaged trapped electrons with AE8 MAX model
293
+ including/excluding count rates inside the SAA and polar regions.
294
+ 2.4.1 Albedo photons
295
+ Albedo photons are produced as a result of cosmic ray interactions with the
296
+ Earth’s atmosphere, as well as the reflection of the CDGR from the atmo-
297
+ sphere. The photons with energies above 50 MeV are produced by the decay
298
+ of mesons due to hadronic interactions, while the photons with lower energies
299
+ (< 50 MeV) are the production of bremsstrahlung of cosmic electrons and
300
+ positrons with the atmospheric atoms. The details of the model implemented
301
+ in this work are given in [14]. The energy range for the albedo gamma-rays is
302
+ considered between 10 keV and 100 MeV, as with the CDGR.
303
+ f
304
+
305
+ E
306
+
307
+ dE
308
+ =
309
+
310
+
311
+
312
+
313
+
314
+
315
+
316
+
317
+
318
+
319
+
320
+
321
+
322
+
323
+
324
+
325
+
326
+ 1.87×10−2
327
+
328
+ E
329
+ 33.7
330
+ �−5.0
331
+ +
332
+
333
+ E
334
+ 33.7
335
+ �1.72
336
+ for E ≤ 200 keV
337
+ 1.01×10−4 �
338
+ E
339
+ MeV
340
+ �−1.34
341
+ for 200 keV ≤ E ≤ 20 MeV
342
+ 7.29×10−4 �
343
+ E
344
+ MeV
345
+ �−2.0
346
+ for E ≥ 20 keV
347
+ 2.4.2 Albedo neutrons
348
+ Another component originating from the atmosphere is the albedo neutrons.
349
+ Bombardment of the cosmic rays on the atmospheric nuclei produces neutron
350
+ emission which contributes the background radiation environment in the LEO.
351
+ The energy range for the albedo neutron is 10 keV - 1 GeV in the simulations.
352
+ The spectrum for the albedo neutrons is presented as [14]:
353
+
354
+ Trapped Electron
355
+ Integral Spectra - SPENVIS
356
+ 107
357
+ -Including SAA and Polar Regions
358
+ s-1)
359
+ 106
360
+ Excluding SAA and Polar Regions
361
+ 105
362
+ 104
363
+ 103
364
+ Flux
365
+ 102
366
+ 10
367
+ 1
368
+ 10-1
369
+ 10-2
370
+ 10-3
371
+ 10-1
372
+ 1
373
+ 10
374
+ Energy
375
+ (MeV)8
376
+ Expected Performance of iXRD in the Orbital Background Radiation
377
+ )
378
+ -1
379
+ s
380
+ -2
381
+ AP-8 MAX Integral Flux > 0.10 MeV (cm
382
+ 5
383
+ 10
384
+ 4
385
+ 10
386
+ 3
387
+ 10
388
+ 2
389
+ 10
390
+ 1
391
+ 10
392
+ Longitude
393
+ 150
394
+
395
+ 100
396
+
397
+ 50
398
+
399
+ 0
400
+ 50
401
+ 100
402
+ 150
403
+ Latitude
404
+ 80
405
+
406
+ 60
407
+
408
+ 40
409
+
410
+ 20
411
+
412
+ 0
413
+ 20
414
+ 40
415
+ 60
416
+ 80
417
+ Fig. 4 The averaged trapped proton flux to which Sharjah-Sat-1 is exposed during one-day
418
+ orbital trajectory.
419
+ f
420
+
421
+ E
422
+
423
+ dE
424
+ =
425
+
426
+
427
+
428
+
429
+
430
+
431
+
432
+
433
+
434
+
435
+
436
+
437
+
438
+
439
+
440
+ 9.98×10−8 �
441
+ E
442
+ GeV
443
+ �−0.5
444
+ for 10 keV ≤ E ≤ 1 MeV
445
+ 3.16×10−9 �
446
+ E
447
+ GeV
448
+ �−1.0
449
+ for 1 MeV ≤ E ≤ 100 MeV
450
+ 3.16×10−10 �
451
+ E
452
+ GeV
453
+ �−2.0
454
+ for 100 MeV ≤ E ≤ 100 GeV
455
+ 3 Simulations
456
+ Monte Carlo-based simulation toolkit, Geant4, was employed for the back-
457
+ ground radiation simulations. The Geant4 mass model of Sharjah-Sat-1 used
458
+ in simulations is shown in Fig. 7. For the geometric mass model, all crucial
459
+ components are included, such as the CdZnTe crystal, tungsten collimator
460
+ and tungsten back-shield underneath the crystal, optical light blocker, PCBs,
461
+ aluminum shielding boxes for the electronic components, batteries, and all
462
+ structural supports. Geant4 offers a wide range of physics processes and mod-
463
+ els. Choosing a physics list (physics models for particle interactions with matter
464
+ in Geant4) that is appropriate for the required application is very important.
465
+ In our work, we implemented the Shielding Physics List2 in the simulations.
466
+ 2https://www.slac.stanford.edu/comp/physics/geant4/slac physics lists/shielding/physlistdoc.
467
+ html
468
+
469
+ Expected Performance of iXRD in the Orbital Background Radiation
470
+ 9
471
+ Fig. 5 The integral spectra for the orbit-averaged trapped protons with AP8 MIN model
472
+ including/excluding count rates inside the SAA and polar regions.
473
+ Fig. 6 The differential spectra for the orbit-averaged cosmic hydrogen ions (protons) and
474
+ helium ions (alpha particles) calculated by using ISO-15390 model in SPENVIS. The dis-
475
+ continuities in the spectra could be related with the lag of the flux variations of the GCRs
476
+ relative to the solar activity variations.
477
+ This list consists of all necessary electromagnetic and hadronic physics pro-
478
+ cesses required for the simulations of the background radiation environment
479
+ in outer space. For each background component, position and energy informa-
480
+ tion of the particle interactions in the crystal, named as events, were recorded
481
+ for further analysis.
482
+
483
+ Trapped Proton
484
+ Integral Spectra - SPENVIS
485
+ 105
486
+ Including SAA and Polar Regions
487
+ s-1)
488
+ 104
489
+ Excluding SAA and Polar Regions
490
+ 2
491
+ 103
492
+ (cm
493
+ 102
494
+ Flux
495
+ 10
496
+ Integral
497
+ 1
498
+ 10-1
499
+ 10-2
500
+ 10-3
501
+ 10-1
502
+ 1
503
+ 10
504
+ 102
505
+ 103
506
+ Energy
507
+ (MeV)Differential Spectra of Galactic Cosmic Rays - SPENvIs
508
+ (MeV/n)-1)
509
+ 10-3
510
+ - CR Protons
511
+ 10-4
512
+ - CR Alpha Particles
513
+ 10-5
514
+ s-1
515
+ T-T:
516
+ 10-6
517
+ s
518
+ 10-7
519
+ (cm
520
+ icle
521
+ 10-9
522
+ Part:
523
+ P
524
+ 10-10
525
+ 1
526
+ 10
527
+ 102
528
+ 103
529
+ 104
530
+ 105
531
+ Energy
532
+ (MeV)10
533
+ Expected Performance of iXRD in the Orbital Background Radiation
534
+ Fig. 7 The drawing of Geant4 mass model of Sharjah-Sat-1. The side panel that includes
535
+ an aluminum plate, solar panels, and corresponding PCBs is not shown to reveal inner
536
+ structure.
537
+ 3.1 Primary particle generation
538
+ Together with the mass model and the physics lists, we need to determine
539
+ the spectral energy distributions, positions, directions, and orientations of the
540
+ primary particles in order to perform simulations in Geant4. We used General
541
+ Particle Source (GPS) class3 for the primary particle specifications. For each
542
+ background component, the spectral models described in Section 2 were given
543
+ 3https://geant4-userdoc.web.cern.ch/UsersGuides/ForApplicationDeveloper/html/
544
+ GettingStarted/generalParticleSource.html
545
+
546
+ Expected Performance of iXRD in the Orbital Background Radiation
547
+ 11
548
+ as inputs in Geant4. Since the astrophysics sources can be considered as
549
+ distant point sources, particles emerging from these sources were handled as
550
+ a parallel beam that envelopes the satellite geometry. On the other side, pri-
551
+ mary particles created for the background components were emitted inward
552
+ from a virtual sphere with radius RS with a cosine-law angular distribution.
553
+ The radius of the sphere was set to 90 cm in the simulations in order to
554
+ maintain the cosine distribution of the primary particles. The positions and
555
+ the directions of the primary particles on the sphere were calculated randomly
556
+ by Geant4. The mass model of the cubesat was located at the center of the
557
+ sphere and the top of the collimator was considered to be pointing the zenith.
558
+ The CDGR photons and the GCRs are considered to be coming from outer
559
+ space, so they were radiated from the upper part of the sphere that covers a
560
+ solid angle of 8.64 sr. Regarding the altitude between 500-600 km, approx-
561
+ imately 3.93 sr is occulted by the Earth’s atmosphere. For this reason, the
562
+ albedo particles and photons were emitted from the bottom part of the sphere
563
+ which encases a solid angle of 3.93 sr. In the case of the trapped protons and
564
+ electrons, the particles were radiated the satellite from the solid angle of 4π sr.
565
+ 3.2 Normalization
566
+ In order to calculate the detected count rates, we normalized the simulation
567
+ results as follows [14], [15]. The energy spectrum for each background compo-
568
+ nent was divided into N number of bins equal in logarithmic scale. For each
569
+ energy bin width, Ej ( j is from 1 to N), we created Np primary particles,
570
+ from a surface area of A, over a solid angle Ω subtended by the satellite. For
571
+ each component, Np is considered individually in order to obtain good enough
572
+ statistics. Since the differential particle flux unit is defined as particles per
573
+ cm2 per second per steradian per keV, particle rate (P - particles\s) for each
574
+ energy bin Ei can be calculated by integrating the differential flux as:
575
+ Pj =
576
+
577
+ dA
578
+
579
+ dΩ
580
+ � f
581
+
582
+ E
583
+
584
+ dE dEj
585
+ (particles
586
+ s−1)
587
+ where dA = R2
588
+ S
589
+ � 2π
590
+ 0
591
+
592
+ � θ
593
+ 0 sinθ′dθ′. The angle θ depends on the area of the
594
+ spherical surface that the particles are radiated from. Ω is the solid angle
595
+ of a cone that its apex is the vertex of the incoming particle. dΩ =
596
+ � 2π
597
+ 0 dΦ
598
+ � δ
599
+ 0 cosδ′sinδ′dδ′ and δ angle ranges from 0 to π/2. In order to decrease the
600
+ CPU time and to increase the simulation statistics, one can use a smaller δ
601
+ angle less than π/2.
602
+ As a result, the observation time in second, T, is obtained by dividing the Np
603
+ by the calculated particle rate per energy bin.
604
+ Tj = Np
605
+ Pj
606
+
607
+ 12
608
+ Expected Performance of iXRD in the Orbital Background Radiation
609
+ The total detected count rate, C, is calculated by the summation of the ratio
610
+ of the number of the deposited particles per energy bin, Mj, to the observation
611
+ time Tj.
612
+ C =
613
+ N
614
+
615
+ j=1
616
+ Mi
617
+ Tj
618
+ 3.3 Sensitivity Calculations
619
+ Sensitivity is one of the most important parameters of a detector system
620
+ defined as the limiting intensity of the detector for a weak source observation
621
+ at a particular significance level. It depends on the background radiation and
622
+ detector properties such as its effective area, energy resolution, observation
623
+ time, and dead time. The continuum sensitivity can be estimated with the
624
+ following formula [16].
625
+ Fmin = SNR ·
626
+
627
+ 2.33 · B(E)
628
+ flive · Aeff(E) ·
629
+
630
+ T ·
631
+
632
+ FWHM(E)
633
+ where Fmin is the sensitivity of the iXRD at a given energy E, SNR is
634
+ the signal-to-noise ratio, B is the simulated background radiation counts cm−2
635
+ s−1 keV−1 at a given energy E, flive is the livetime fraction, Aeff
636
+ is the
637
+ effective area of the iXRD at a given energy E, T is the total observing time
638
+ and FWHM is the full width at maximum for the energy resolution of the
639
+ iXRD at a given energy E.
640
+ For a realistic sensitivity estimation, one has to consider the iXRD spectral
641
+ response which depends on the crystal’s internal properties, the transporta-
642
+ tion of the charge carriers created by the source particles, the electric field
643
+ configuration inside the crystal, and the readout electronic noise. For this rea-
644
+ son, we conducted simulations of the charge transportation inside the CdZnTe
645
+ by using a C++ based simulator THEBES (Transporter of Holes and Elec-
646
+ trons By Electric field in Semiconductor Detectors) that was developed by our
647
+ group. The details of the THEBES simulator can be found in [17]. The total
648
+ background spectrum, B(E), used in the sensitivity calculations was obtained
649
+ by employing the Geant4 simulations and the THEBES simulator together.
650
+ 4 Results
651
+ In the following, the optimization study for the back-shield design, the back-
652
+ ground simulation results, count rates for each background component, and
653
+ sensitivity estimation results are presented.
654
+ 4.1 Back-Shield Design
655
+ The Tungsten collimator enclosing the CdZnTe crystal helps to minimize the
656
+ effects of the background particles coming from outer space. In addition to
657
+
658
+ Expected Performance of iXRD in the Orbital Background Radiation
659
+ 13
660
+ that, the simulations indicate that another shield is required, especially to
661
+ reduce the effect of albedo radiation from the atmosphere. As it is illustrated
662
+ in Fig. 1, the readout electronics design comprises two PCBs, the motherboard
663
+ and the daughterboard where the daughterboard carries the noise-sensitive
664
+ analog readout circuitry, and the motherboard carries most of the digital and
665
+ communication circuitry [3]. A metal plate acting as a passive shielding (called
666
+ the back-shield) has been placed between those two PCBs. Due to the prox-
667
+ imity of the PCBs, we were limited to using a back-shield with a maximum
668
+ thickness of 2 mm. To achieve optimal performance, we conducted simulations
669
+ to quantify background rates due to albedo photons by using several materi-
670
+ als (W, Pb, Sn, Cd, Cu). The most promising ones out of many configurations
671
+ are a lead (Pb) shield, a Tungsten (W) shield, and three graded-z shieldings.
672
+ The results are presented in Table 1.
673
+ Making use of the back-shield considerably reduces albedo photon count
674
+ rates. For the low energy range (20 - 60 keV), all material configurations yield
675
+ almost similar count rates. However, the 2 mm thick Tungsten provides the
676
+ lowest counting rate for the total energy range of the iXRD. Tungsten was
677
+ preferred as the back-shield, because it not only shows good background reduc-
678
+ tion performance but also was relatively easy to procure compared with the
679
+ graded-Z configurations.
680
+ Table 1 The fraction of count rates for the albedo γ-rays for different back-shield designs.
681
+ For each shielding design, the fractions are given as the count rates obtained using the
682
+ corresponding shielding divided by the count rates with no shield. The thickness of the
683
+ back-shield is 2 mm. For the graded-Z shielding designs, the thicknesses are 0.5 mm, 1.0
684
+ mm, and 0.5 mm respectively.
685
+ Energy Range
686
+ W
687
+ SnWCd
688
+ Pb
689
+ SnWCu
690
+ PbSnCu
691
+ 20 - 60 keV
692
+ 0.16
693
+ 0.17
694
+ 0.16
695
+ 0.18
696
+ 0.21
697
+ 20 - 200 keV
698
+ 0.14
699
+ 0.16
700
+ 0.16
701
+ 0.17
702
+ 0.19
703
+ 4.2 Total background spectrum and count rates
704
+ In order to obtain the background in orbit, seven background components were
705
+ considered (see Section 2). Fig. 8 shows the simulated background spectra
706
+ obtained using the deposited energies of the background particles in Geant4
707
+ simulations. It is worth noting that the detector’s spectral response is not
708
+ included in the background spectra shown. The Crab spectrum is also shown.
709
+ A power law distribution with parameters Γ = 2.08 and N = 8.97 (photons
710
+ cm−2 s−1 keV−1) was used to model the Crab spectrum with the energy range
711
+ between 10 keV and 1 MeV. [18]. The CDGR, albedo photons, and the CR
712
+ protons are the most dominant components. The main contributor to the total
713
+ background in the energy range of interest (20 - 200 keV) is the albedo photon
714
+ radiation, which corresponds to roughly ∼40% of the total flux. The energy
715
+
716
+ 14
717
+ Expected Performance of iXRD in the Orbital Background Radiation
718
+ Fig. 8 Spectra of the background radiation components obtained with the help of the
719
+ deposited energies of the background particles in the crystal calculated by Geant4 simula-
720
+ tions. The total background is shown and labeled in black color. The crab spectrum is also
721
+ included in the plot and labeled in black. Tungsten is used as the back-shield material in
722
+ the simulations.
723
+ distribution of the albedo photons is almost flat in the respective energy range.
724
+ Also, the CDGR and the GC protons significantly contribute to the total
725
+ background by around ∼30% and ∼25%, respectively. Between ∼20 and ∼60
726
+ keV, for which a larger number of source photons are expected due to typi-
727
+ cal power-law spectra of hard X-ray sources, the contribution of the CDGR
728
+ photons to the total background is the largest. However, beyond ∼70 keV, the
729
+ CDGR becomes less important than the other most dominant components,
730
+ the albedo photons and the CR protons. Finally, one can see that the contri-
731
+ butions of the albedo neutrons, galactic cosmic alpha particles, and trapped
732
+ particles are insignificant. In the case of the trapped protons and electrons, the
733
+ particle fluxes inside the SAA and the geometric polar regions are excluded
734
+ (see Section 2.2). Further, the characteristic X-ray emissions from the tung-
735
+ sten (K-line emissions at 57.9 keV, 59.3 keV, and 67.2 keV) are very significant
736
+ in the background spectra as well. There are also three distinct lines due to
737
+
738
+ Background Radiation
739
+ 10
740
+ CXB
741
+ AlbedoPhotons
742
+ Crab
743
+ AlbedoNeutrons
744
+ Trapped Protons
745
+ Trapped Electrons
746
+ 10-2
747
+ CRProtons
748
+ CRAlphaParticles
749
+ Total Spectrum
750
+ 10
751
+ 10
752
+ 10-
753
+ 30
754
+ 40
755
+ 50
756
+ 60
757
+ 708090100
758
+ 200
759
+ Energy (keV)Expected Performance of iXRD in the Orbital Background Radiation
760
+ 15
761
+ the gamma-ray emissions of the excited tungsten nuclei as a result of inelas-
762
+ tic neutron and proton scattering in the spectrum, between 100 keV and 130
763
+ keV[19], [20], but their contribution is insignificant in the overall spectrum.
764
+ The background rates are given in Table 2 for each component. The total
765
+ count rate (for the particles deposited energies greater than 20 keV) is ∼ 7
766
+ counts/s. For the energy range of the iXRD payload (20 - 200 keV), the count
767
+ rate becomes ∼0.85 counts/s, while the rate for the particles with energies
768
+ between 20 keV and 60 keV is approximately 0.36 counts/s. The count rates
769
+ for the trapped protons and electrons are also calculated (Table 3) for the
770
+ SAA and the polar regions both included and excluded. One can see that
771
+ the particle count rates are extremely large inside those areas for operating
772
+ the iXRD. Excluding the high particle-populated regions reduces the trapped
773
+ particle rates significantly. However, the fact that the iXRD will be turned
774
+ off during the passage through the SAA and the polar regions will result in a
775
+ break in scientific observations. The period for one orbit is around 90 minutes
776
+ (∼15 orbits per day). The time period that the cubesat spends inside the SAA
777
+ and the polar regions varies between 30 and 40 minutes. This provides a time
778
+ frame of approximately one hour for the iXRD to operate per orbit. Since the
779
+ power, telemetry, and control constraints allow around 10-minute operation of
780
+ iXRD in each orbit, this break can be managed.
781
+ 4.3 Sensitivity
782
+ In order to estimate the sensitivity curve, we performed THEBES simulations
783
+ using the Geant4 background simulation outputs as input. The positions and
784
+ the energy deposition of the electron-hole pairs from Geant4 were imported
785
+ into the THEBES simulator to calculate the induced signals per background
786
+ event. To validate the dedicated Geant4 and THEBES simulations, a compar-
787
+ ative study between an experiment and the corresponding simulation set was
788
+ conducted. We carried out a set of experiments with 57Co (122.1 keV, 136.5
789
+ keV) source for on-ground calibration of the energy response of the iXRD.
790
+ The iXRD system was housed in a metal box. The radioactive source was then
791
+ placed on the top of the box, facing the top of the collimator. The details of the
792
+ calibration setup are reported in [3]. More than 5 ×105 events were registered
793
+ in all channels.
794
+ In the meantime, we modeled the experimental setup in Geant4 as well.
795
+ The Shielding Physics List was chosen and approximately 4.5 ×105 events
796
+ were obtained using a 57Co source. The positions and the deposited energies
797
+ of the electron-hole pairs created by the incident particles were registered. The
798
+ induced signals were calculated with the THEBES simulator for four different
799
+ channel groups as a final step. Fig. 9 illustrates an example from the compar-
800
+ ison results for a single channel. The electronic noise level for the single pixel
801
+ was assigned as 4% and for the planar cathode, the noise level was 6%. The
802
+ simulations are in good agreement with the measurements.
803
+ The THEBES simulation parameters that provided the best simulated 57Co
804
+ spectra compared to the measured ones are given in Table 4.
805
+
806
+ 16
807
+ Expected Performance of iXRD in the Orbital Background Radiation
808
+ Table 2 The background count rates for the corresponding background components in the orbit. The count rates are calculated by using the
809
+ deposited energies of the background particles in Geant4 simulations.
810
+ Energy Range
811
+ CDGR
812
+ Albedo γ
813
+ GCRs p+
814
+ GCRs α
815
+ (0.01-100 MeV)
816
+ (0.01-100 MeV)
817
+ (0.001-100 GeV)
818
+ (0.001-100 GeV)
819
+ (cnt/s)
820
+ (cnt/s)
821
+ (cnt/s)
822
+ (cnt/s)
823
+ ≥20 keV
824
+ 0.39
825
+ 1.58
826
+ 2.70
827
+ 0.30
828
+ 20 - 60 keV
829
+ 0.17
830
+ 0.12
831
+ 0.04
832
+ 0.005
833
+ 20 - 200 keV
834
+ 0.27
835
+ 0.37
836
+ 0.13
837
+ 0.01
838
+ Energy Range
839
+ Trapped p+
840
+ Trapped e−
841
+ Albedo n0
842
+ Crab
843
+ (0.1-400 MeV)
844
+ (0.04-7 MeV)
845
+ (10 keV - 1 GeV)
846
+ (10 keV - 1 MeV)
847
+ (cnt/s)
848
+ (cnt/s)
849
+ (cnt/s)
850
+ (cnt/s)
851
+ ≥20 keV
852
+ 2.03
853
+ 0.01
854
+ 0.02
855
+ 1.10
856
+ 20 - 60 keV
857
+ 0.02
858
+ 0.002
859
+ 0.005
860
+ 0.81
861
+ 20 - 200 keV
862
+ 0.05
863
+ 0.005
864
+ 0.01
865
+ 1.08
866
+
867
+ Expected Performance of iXRD in the Orbital Background Radiation
868
+ 17
869
+ Table 3 The background count rates for the
870
+ trapped particles in the orbit inside and
871
+ outside of the SAA and the polar regions. The
872
+ count rates are calculated for the particles
873
+ that deposit energy greater than 20 keV in the
874
+ detector volume.
875
+ Region
876
+ Trapped p+
877
+ Trapped e−
878
+ (0.1-400 MeV)
879
+ (0.04-7 MeV)
880
+ (cnt/s)
881
+ (cnt/s)
882
+ Including
883
+ SAA and Polar Regions
884
+ 9047.7
885
+ 1240.0
886
+ Excluding
887
+ SAA and Polar Regions
888
+ 2.03
889
+ 0.02
890
+ Table 4 The simulation parameters to obtain
891
+ the iXRD background spectrum.
892
+ THEBES Parameters
893
+ Values
894
+ Electron mobility (mm2/V s)
895
+ 1.0 ×105
896
+ Hole mobility (mm2/V s)
897
+ 1.05 ×104
898
+ Electron trapping time (s)
899
+ 3.0 ×10−6
900
+ Hole trapping time (s)
901
+ 1.0 ×10−6
902
+ Electronic noise level for anode channels
903
+ 4-7%
904
+ Electronic noise level for planar cathode
905
+ 6%
906
+ Minimum detectable energy for anodes
907
+ 20 keV
908
+ Minimum detectable energy for cathode
909
+ 40 keV
910
+ In Fig. 10, the calculated sensitivity curve of the iXRD is presented with
911
+ the Crab spectrum. We considered a background simulation of 9000 seconds
912
+ of integration time (indicating one day) due to the 600 seconds operation time
913
+ of the iXRD in each orbit. The induced background radiation signals for all
914
+ channel groups were then calculated in the THEBES simulator. According to
915
+ the experimental data, the noise levels were set to be 4%, 5%, 6%, and 7% for
916
+ the single, small, medium, and large channels, respectively. The effective area
917
+ of the iXRD was simulated using a circular source radiating a mono-energetic
918
+ beam of photons ranging from 10 keV to 300 keV. Finally, a SNR of 3, a
919
+ live-time fraction of 0.9, and simulated energy resolution values for the energy
920
+ range of 20 keV to 240 keV were considered in the sensitivity calculations.
921
+ The simulations showed that the continuum sensitivity of the iXRD is
922
+ about 180 mCrab (∼0.07 photons cm−2 s−1) between 20 to 100 keV energy
923
+ band. This sensitivity is enough to monitor very bright X-ray sources in the
924
+ Galaxy (such as Cyg X-1 and GRS 1915+105).
925
+
926
+ 18
927
+ Expected Performance of iXRD in the Orbital Background Radiation
928
+ Fig. 9 The comparison of the energy spectra for the simulations and experiments for a
929
+ single channel. For comparative purposes, the simulation result is normalized by utilizing
930
+ the 122 keV peak count from the measurements.
931
+ 5 Discussion and Conclusion
932
+ In this paper, we presented a simulation study on the estimation of the effects
933
+ of the background radiation on the performance of the iXRD, a CdZnTe-based
934
+ scientific payload of Sharjah-Sat-1 cubesat. The albedo photon radiation is the
935
+ most dominant and flat in the iXRD energy range, while the CDGR radiation
936
+ contribution is the highest in the energy range of most of the astrophysical
937
+ sources, from ∼20 keV to ∼60 keV. Another dominant component is the galac-
938
+ tic cosmic protons, while the radiation effects of the trapped particles, the
939
+ albedo neutrons, and the cosmic alpha particles are negligible. In addition, we
940
+ did not consider the secondary protons, electrons, and positrons created by the
941
+ interaction of the cosmic rays with the atmosphere since their contributions
942
+ are insignificant.
943
+ The radiation environment in LEO has a dynamical nature and the inten-
944
+ sity of the components can vary considerably. The albedo photon background
945
+ contribution depends on the orientation of the cubesat. For the background
946
+ simulations, the cubesat was oriented to be pointing the zenith, in which the
947
+ albedo radiation would be quite effective. Orienting the cubesat at an angle of
948
+ 45◦ relative to the zenith decreases the total count rate for the iXRD energy
949
+ range because less number of photons are registered due to the tilt of the
950
+ detector plane with respect to the zenith, although the fluorescence emission
951
+ increases due to the exposure of the collimator to more albedo photons from
952
+ the side of the crystal. However, a zenith angle of 45◦ reduces the albedo pho-
953
+ ton count rate by only around 5% in the energy band of 20-200 keV. This
954
+
955
+ 140
956
+ Experiment
957
+ 120
958
+ Simulation
959
+ 100
960
+ Counts
961
+ 80
962
+ 60
963
+ 40
964
+ 20
965
+ 0
966
+ 20
967
+ 40
968
+ 60
969
+ 80
970
+ 100
971
+ 120
972
+ 140
973
+ Energy (keV)Expected Performance of iXRD in the Orbital Background Radiation
974
+ 19
975
+ Fig. 10 Simulated sensitivity curve of iXRD with an observation time of 9000 seconds, a
976
+ live-time fraction of 90% and a SNR of 3.
977
+ shows that albedo photons are the most dominant and almost immutable back-
978
+ ground component. The effect of the cosmic rays depends on the geomagnetic
979
+ cutoff rigidity. Due to the low cutoff rigidities in the high geomagnetic lati-
980
+ tudes, the effect of the charged particles becomes more significant [21]. Since
981
+ the operation of the iXRD will be halted during the passage through regions
982
+ with high latitudes, the cosmic ray count rates will also decrease. Therefore,
983
+ the worst-case scenario is considered for the effects of the background radi-
984
+ ation in this work. Also, the total count rate is around 7 counts/s, which is
985
+ critical to determine the live-time fraction of iXRD[3].
986
+ This study does not consider the delayed background radiation due to the
987
+ activation of radioactive isotopes within the satellite material. However, when
988
+ considering large count rates for the trapped particles (see Table 3) during
989
+ the passages through the SAA and the polar regions for the anticipated orbit
990
+ and high-density materials used in the iXRD system, the spectral performance
991
+ of the iXRD can suffer from the emissions from short-lived induced isotopes
992
+ [22]. The trapped proton simulations indicate proton-induced radioisotopes
993
+ with half-lives in the order of minutes such as 109m,107m,105mAg, 104,111mCd
994
+ formed in the CdZnTe crystal and 176W, 177m,179m,183mTa, 170m,172m,173Lu in
995
+ the collimator and the back-shield. Since in each orbit the operation period
996
+ of the iXRD is expected to be around 10 minutes and the time period that
997
+ the iXRD will be outside of the SAA and the polar regions is approximately
998
+ 1 hour per orbit (see Section 4.2), the effects of the delayed emission can be
999
+ eliminated by activating the iXRD within a reasonable time after leaving those
1000
+ areas. This will be part of the future planning of observations.
1001
+
1002
+ iXRD continuum sensitivity (3-sigma in 9000 sec)
1003
+ iXRD sensitivity
1004
+ 1 Crab
1005
+ 1O
1006
+ Intensity (photon/cm?/s/keV)
1007
+ 180 mCrab
1008
+ 10-4
1009
+ 20
1010
+ 60
1011
+ 100
1012
+ 200
1013
+ Energy(keV)20
1014
+ Expected Performance of iXRD in the Orbital Background Radiation
1015
+ The expected detection sensitivity was obtained with the help of the back-
1016
+ ground simulations and THEBES charge transportation simulations. It is
1017
+ around 180 mCrab between 20-100 keV energy band in one day. The sensitiv-
1018
+ ity result will assist us in creating a strategic plan for observations in order to
1019
+ attain the scientific objectives of the iXRD.
1020
+ Finally, the iXRD was designed and developed from the ground up by our
1021
+ group and the simulation studies have provided us a considerable amount of
1022
+ information about a detector system that can work in the space environment.
1023
+ This great deal of technological know-how will have significant contributions
1024
+ for prospective future projects with extensive science goals.
1025
+ Acknowledgments.
1026
+ The development of iXRD has been supported by the
1027
+ University of Sharjah, Sabancı University and T¨ubitak Project 116F151.
1028
+ Author Contributions.
1029
+ AMA and EK prepared, analyzed, and interpreted
1030
+ simulation and experimental data. E¨O prepared Fig. 11 and interpreted data
1031
+ for sensitivity calculations. The first draft of the manuscript was written by
1032
+ AMA and all authors commented on previous versions of the manuscript. All
1033
+ authors read and approved the final manuscript.
1034
+ Funding.
1035
+ This work is supported by the University of Sharjah, Sabancı
1036
+ University and T¨ubitak Project 116F151.
1037
+ Data Availability.
1038
+ The measured and analyzed data of this work are
1039
+ available from the corresponding author upon reasonable request.
1040
+ Code Availability.
1041
+ The code used for this work is custom-made and
1042
+ available from the corresponding author upon reasonable request.
1043
+ Declarations
1044
+ Conflicts of interest.
1045
+ The authors have no relevant financial or non-
1046
+ financial interests to disclose.
1047
+ References
1048
+ [1] Kalemci, E., Manousakis, A., Fernini, I., Al Naimiy, H., Bozkurt, A.,
1049
+ Aslan, A.R., Altıng¨un, A.M., Veziro˘glu, K., Yal¸cın, R., G¨okalp, K., Diba,
1050
+ M., Ya¸sar, A., ¨Oztaban, E., Karabulut, B., ¨Oztekin, O., Farouk, Y.,
1051
+ Alsabt, I., AlKaabi, T., Shaikh, M.M., Madara, S.R.: Scientific contri-
1052
+ bution of sharjah-sat-1 to x-ray observations. In: IAC 2021 Congress
1053
+ Proceedings, 72nd International Astronautical Congress (IAC), Dubai,
1054
+ United Arab Emirates, p. 63844 (2021). IAF
1055
+ [2] Kalemci, E., ¨Umit, E., Aslan, R.: X-ray detector on 2u cubesat beeagle-
1056
+ sat of qb50. In: 2013 6th International Conference on Recent Advances
1057
+ in Space Technologies (RAST), pp. 899–902 (2013). https://doi.org/10.
1058
+ 1109/RAST.2013.6581341
1059
+
1060
+ Expected Performance of iXRD in the Orbital Background Radiation
1061
+ 21
1062
+ [3] Kalemci, E., Altıng¨un, A.M., Bozkurt, A., Aslan, A.R., Yal¸cın, R., G¨okalp,
1063
+ K., Veziro˘glu, K., Fernini, I., Manousakis, A., Ya¸sar, A., Diba, M., Karab-
1064
+ ulut, B., C¸atal, E., ¨Oztekin, O.: The improved x-ray detector (ixrd) on
1065
+ sharjah-sat-1, design principles, tests and ground calibration. submitted
1066
+ to Experimental Astronomy (2022)
1067
+ [4] Tumer, T.O., Cajipe, V.B., Clajus, M., Hayakawa, S., Volkovskii, A.:
1068
+ Performance of RENA-3 IC with position-sensitive solid-state detectors.
1069
+ In: Hard X-Ray, Gamma-Ray, and Neutron Detector Physics X. ”Proc.
1070
+ SPIE”, vol. 7079, p. 70791 (2008). https://doi.org/10.1117/12.797750
1071
+ [5] Agostinelli, S., Allison, J., Amako, K., Apostolakis, J., Araujo, H., Arce,
1072
+ P., Asai, M., Axen, D., Banerjee, S., Barrand, G., Behner, F., Bellagamba,
1073
+ L., Boudreau, J., Broglia, L., Brunengo, A., Burkhardt, H., Chauvie, S.,
1074
+ Chuma, J., Chytracek, R., Cooperman, G., Cosmo, G., Degtyarenko, P.,
1075
+ Dell’Acqua, A., Depaola, G., Dietrich, D., Enami, R., Feliciello, A., Fer-
1076
+ guson, C., Fesefeldt, H., Folger, G., Foppiano, F., Forti, A., Garelli, S.,
1077
+ Giani, S., Giannitrapani, R., Gibin, D., G´omez Cadenas, J.J., Gonz´alez,
1078
+ I., Gracia Abril, G., Greeniaus, G., Greiner, W., Grichine, V., Grossheim,
1079
+ A., Guatelli, S., Gumplinger, P., Hamatsu, R., Hashimoto, K., Hasui, H.,
1080
+ Heikkinen, A., Howard, A., Ivanchenko, V., Johnson, A., Jones, F.W.,
1081
+ Kallenbach, J., Kanaya, N., Kawabata, M., Kawabata, Y., Kawaguti, M.,
1082
+ Kelner, S., Kent, P., Kimura, A., Kodama, T., Kokoulin, R., Kossov, M.,
1083
+ Kurashige, H., Lamanna, E., Lamp´en, T., Lara, V., Lefebure, V., Lei,
1084
+ F., Liendl, M., Lockman, W., Longo, F., Magni, S., Maire, M., Meder-
1085
+ nach, E., Minamimoto, K., Mora de Freitas, P., Morita, Y., Murakami,
1086
+ K., Nagamatu, M., Nartallo, R., Nieminen, P., Nishimura, T., Ohtsubo,
1087
+ K., Okamura, M., O’Neale, S., Oohata, Y., Paech, K., Perl, J., Pfeiffer,
1088
+ A., Pia, M.G., Ranjard, F., Rybin, A., Sadilov, S., Di Salvo, E., Santin,
1089
+ G., Sasaki, T., Savvas, N., Sawada, Y., Scherer, S., Sei, S., Sirotenko, V.,
1090
+ Smith, D., Starkov, N., Stoecker, H., Sulkimo, J., Takahata, M., Tanaka,
1091
+ S., Tcherniaev, E., Safai Tehrani, E., Tropeano, M., Truscott, P., Uno,
1092
+ H., Urban, L., Urban, P., Verderi, M., Walkden, A., Wander, W., Weber,
1093
+ H., Wellisch, J.P., Wenaus, T., Williams, D.C., Wright, D., Yamada,
1094
+ T., Yoshida, H., Zschiesche, D.: Geant4—a simulation toolkit. Nuclear
1095
+ Instruments and Methods in Physics Research Section A: Accelerators,
1096
+ Spectrometers, Detectors and Associated Equipment 506(3), 250–303
1097
+ (2003). https://doi.org/10.1016/S0168-9002(03)01368-8
1098
+ [6] Giacconi, R., Gursky, H., Paolini, F.R., Rossi, B.B.: Evidence for x rays
1099
+ from sources outside the solar system. Phys. Rev. Lett. 9, 439–443 (1962).
1100
+ https://doi.org/10.1103/PhysRevLett.9.439
1101
+ [7] Luo, B., Brandt, W.N., Xue, Y.Q., Lehmer, B., Alexander, D.M., Bauer,
1102
+ F.E., Vito, F., Yang, G., Basu-Zych, A.R., Comastri, A., Gilli, R., Gu,
1103
+
1104
+ 22
1105
+ Expected Performance of iXRD in the Orbital Background Radiation
1106
+ Q.-S., Hornschemeier, A.E., Koekemoer, A., Liu, T., Mainieri, V., Pao-
1107
+ lillo, M., Ranalli, P., Rosati, P., Schneider, D.P., Shemmer, O., Smail, I.,
1108
+ Sun, M., Tozzi, P., Vignali, C., Wang, J.-X.: THE CHANDRA DEEP
1109
+ FIELD-SOUTH SURVEY: 7 MS SOURCE CATALOGS. The Astrophys-
1110
+ ical Journal Supplement Series 228(1), 2 (2016) https://arxiv.org/abs/
1111
+ 1611.03501. https://doi.org/10.3847/1538-4365/228/1/2
1112
+ [8] Lehmer, B.D., Basu-Zych, A.R., Mineo, S., Brandt, W.N., Eufrasio, R.T.,
1113
+ Fragos, T., Hornschemeier, A.E., Luo, B., Xue, Y.Q., Bauer, F.E., Gil-
1114
+ fanov, M., Ranalli, P., Schneider, D.P., Shemmer, O., Tozzi, P., Trump,
1115
+ J.R., Vignali, C., Wang, J.-X., Yukita, M., Zezas, A.: THE EVOLUTION
1116
+ OF NORMAL GALAXY x-RAY EMISSION THROUGH COSMIC HIS-
1117
+ TORY: CONSTRAINTS FROM THE 6 MSCHANDRADEEP FIELD-
1118
+ SOUTH. The Astrophysical Journal 825(1), 7 (2016). https://doi.org/10.
1119
+ 3847/0004-637x/825/1/7
1120
+ [9] Gruber, D.E., Matteson, J.L., Peterson, L.E., Jung, G.V.: The spectrum
1121
+ of diffuse cosmic hard x-rays measured with heao 1. The Astrophysical
1122
+ Journal 520(1), 124–129 (1999). https://doi.org/10.1086/307450
1123
+ [10] VAN ALLEN, J.A., LUDWIG, G.H., RAY, E.C., McILWAIN, C.E.:
1124
+ Observation of High Intensity Radiation by Satellites 1958 Alpha and
1125
+ Gamma. Journal of Jet Propulsion 28(9), 588–592 (1958). https://doi.
1126
+ org/10.2514/8.7396
1127
+ [11] Li, W., Hudson, M.K.: Earth’s Van Allen Radiation Belts: From Dis-
1128
+ covery to the Van Allen Probes Era. Journal of Geophysical Research:
1129
+ Space Physics 124(11), 8319–8351 (2019). https://doi.org/10.1029/
1130
+ 2018JA025940
1131
+ [12] Sawyer, D.M., Vette, J.I.: Ap-8 trapped proton environment for solar
1132
+ maximum and solar minimum. [ap8max and ap8min]. (1976). https://
1133
+ www.osti.gov/biblio/7094195
1134
+ [13] Simpson, J.A.: Elemental and isotopic composition of the galactic cos-
1135
+ mic rays. Annual Review of Nuclear and Particle Science 33(1), 323–382
1136
+ (1983). https://doi.org/10.1146/annurev.ns.33.120183.001543
1137
+ [14] Sarkar, R., Mandal, S., Debnath, D., Kotoch, T.B., Nandi, A., Rao, A.R.,
1138
+ Chakrabarti, S.K.: Instruments of RT-2 experiment onboard CORONAS-
1139
+ PHOTON and their test and evaluation IV: Background simulations using
1140
+ GEANT-4 toolkit. Experimental Astronomy 29(1), 85–107 (2011). https:
1141
+ //doi.org/10.1007/s10686-010-9208-z
1142
+ [15] Castro, M., Braga, J., Penacchioni, A., D’Amico, F., Sacahui, R.: Back-
1143
+ ground and imaging simulations for the hard X-ray camera of the MIRAX
1144
+ mission. Monthly Notices of the Royal Astronomical Society 459(4),
1145
+
1146
+ Expected Performance of iXRD in the Orbital Background Radiation
1147
+ 23
1148
+ 3917–3928 (2016). https://doi.org/10.1093/mnras/stw743
1149
+ [16] MATTESON, J.: The UCSD/MIT hard X-ray and low energy gamma-
1150
+ ray experiment for HEAO-1 - Design and early results. https://doi.org/
1151
+ 10.2514/6.1978-35. https://arc.aiaa.org/doi/abs/10.2514/6.1978-35
1152
+ [17] Altıng¨un, A.M., Kalemci, E.: Optimization study of the electrode design
1153
+ of a 5 mm thick orthogonal-strip CdZnTe detector system. Nuclear
1154
+ Instruments and Methods in Physics Research, Section A: Accelerators,
1155
+ Spectrometers, Detectors and Associated Equipment 1027(December
1156
+ 2020), 166125 (2022). https://doi.org/10.1016/j.nima.2021.166125
1157
+ [18] Kirsch, M.G., Briel, U.G., Burrows, D., Campana, S., Cusumano, G.,
1158
+ Ebisawa, K., Freyberg, M.J., Guainazzi, M., Haberl, F., Jahoda, K., Kaas-
1159
+ tra, J., Kretschmar, P., Larsson, S., Lubinski, P., Mori, K., Plucinsky,
1160
+ P., Pollock, A.M., Rothschild, R., Sembay, S., Wilms, J., Yamamoto, M.:
1161
+ Crab: the standard x-ray candle with all (modern) x-ray satellites. UV, X-
1162
+ Ray, and Gamma-Ray Space Instrumentation for Astronomy XIV 5898,
1163
+ 589803 (2005). https://doi.org/10.1117/12.616893
1164
+ [19] Lister, D., Smith, A.B., Dunford, C.: Fast-neutron scattering from the
1165
+ 182, 184, and 186 isotopes of tungsten. Phys. Rev. 162, 1077–1087 (1967).
1166
+ https://doi.org/10.1103/PhysRev.162.1077
1167
+ [20] Kruse, T., Makofske, W., Ogata, H., Savin, W., Slagowitz, M., Williams,
1168
+ M., Stoler, P.: Elastic and inelastic proton scattering from heavy collective
1169
+ nuclei. Nuclear Physics A 169(1), 177–186 (1971). https://doi.org/10.
1170
+ 1016/0375-9474(71)90570-7
1171
+ [21] Liao, J.Y., Zhang, S., Chen, Y., Zhang, J., Jin, J., Chang, Z., Chen, Y.P.,
1172
+ Ge, M.Y., Guo, C.C., Li, G., Li, X.B., Lu, F.J., Lu, X.F., Nie, J.Y., Song,
1173
+ L.M., Yang, Y.J., You, Y., Zhao, H.S., Zhang, S.N.: Background model
1174
+ for the Low-Energy Telescope of Insight-HXMT. Journal of High Energy
1175
+ Astrophysics 27, 24–32 (2020). https://doi.org/10.1016/j.jheap.2020.02.
1176
+ 010
1177
+ [22] Odaka, H., Asai, M., Hagino, K., Koi, T., Madejski, G., Mizuno, T.,
1178
+ Ohno, M., Saito, S., Sato, T., Wright, D.H., Enoto, T., Fukazawa, Y.,
1179
+ Hayashi, K., Kataoka, J., Katsuta, J., Kawaharada, M., Kobayashi, S.B.,
1180
+ Kokubun, M., Laurent, P., Lebrun, F., Limousin, O., Maier, D., Mak-
1181
+ ishima, K., Mimura, T., Miyake, K., Mori, K., Murakami, H., Nakamori,
1182
+ T., Nakano, T., Nakazawa, K., Noda, H., Ohta, M., Ozaki, M., Sato, G.,
1183
+ Sato, R., Tajima, H., Takahashi, H., Takahashi, T., Takeda, S., Tanaka,
1184
+ T., Tanaka, Y., Terada, Y., Uchiyama, H., Uchiyama, Y., Watanabe, S.,
1185
+ Yamaoka, K., Yasuda, T., Yatsu, Y., Yuasa, T., Zoglauer, A.: Modeling
1186
+ of proton-induced radioactivation background in hard x-ray telescopes:
1187
+
1188
+ 24
1189
+ Expected Performance of iXRD in the Orbital Background Radiation
1190
+ Geant4-based simulation and its demonstration by hitomi’s measure-
1191
+ ment in a low earth orbit. Nuclear Instruments and Methods in Physics
1192
+ Research Section A: Accelerators, Spectrometers, Detectors and Asso-
1193
+ ciated Equipment 891, 92–105 (2018). https://doi.org/10.1016/j.nima.
1194
+ 2018.02.071
1195
+
B9E1T4oBgHgl3EQfDwMT/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
D9FRT4oBgHgl3EQfAjeU/content/tmp_files/2301.13462v1.pdf.txt ADDED
@@ -0,0 +1,1305 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ PAPER PREPRINT – CURRENTLY UNDER REVIEW
2
+ Towards Learned Emulation of Interannual Water Isotopo-
3
+ logue Variations in General Circulation Models
4
+ Jonathan Wider1,2*
5
+ ,
6
+ Jakob Kruse1,2,
7
+ Nils Weitzel1,3
8
+ ,
9
+ Janica C. Bühler3
10
+ ,
11
+ Ullrich Köthe2
12
+ and Kira Rehfeld1,3,4
13
+ 1Institut für Umweltphysik, Ruprecht-Karls-Universität Heidelberg, Heidelberg, Germany
14
+ 2Interdisziplinäres Zentrum für Wissenschaftliches Rechnen, Ruprecht-Karls-Universität Heidelberg, Heidelberg, Germany
15
+ 3Department of Geosciences, University of Tübingen, Tübingen, Germany
16
+ 4Department of Physics, University of Tübingen, Tübingen, Germany
17
+ *Corresponding author. Email: jonathan.wider@ufz.de
18
+ Keywords: Climate Models; Convolutional Neural Networks; Spherical Networks; Paleoclimate
19
+ Abstract
20
+ Simulating abundances of stable water isotopologues, i.e. molecules differing in their isotopic composition, within
21
+ climate models allows for comparisons with proxy data and, thus, for testing hypotheses about past climate and
22
+ validating climate models under varying climatic conditions. However, many models are run without explicitly
23
+ simulating water isotopologues. We investigate the possibility to replace the explicit physics-based simulation of
24
+ oxygen isotopic composition in precipitation using machine learning methods. These methods estimate isotopic
25
+ composition at each time step for given fields of surface temperature and precipitation amount. We implement
26
+ convolutional neural networks (CNNs) based on the successful UNet architecture and test whether a spherical
27
+ network architecture outperforms the naive approach of treating Earth’s latitude-longitude grid as a flat image.
28
+ Conducting a case study on a last millennium run with the iHadCM3 climate model, we find that roughly 40%
29
+ of the temporal variance in the isotopic composition is explained by the emulations on interannual and monthly
30
+ timescale, with spatially varying emulation quality. A modified version of the standard UNet architecture for flat
31
+ images yields results that are equally good as the predictions by the spherical CNN. We test generalization to
32
+ last millennium runs of other climate models and find that while the tested deep learning methods yield the best
33
+ results on iHadCM3 data, the performance drops when predicting on other models and is comparable to simple
34
+ pixel-wise linear regression. An extended choice of predictor variables and improving the robustness of learned
35
+ climate–oxygen isotope relationships should be explored in future work.
36
+ Impact Statement
37
+ Information on the hydrological cycle is imprinted onto the isotopic composition of precipitation, which sub-
38
+ sequently is oftentimes preserved in natural climate archives like speleothems or ice deposits. Some climate
39
+ models, so-called isotope-enabled general circulation models (iGCMs), simulate isotopes explicitly and, thus,
40
+ allow comparing climate model output under paleoclimate scenarios to samples taken from natural climate
41
+ archives. However, isotopes are not included in most climate simulations due to computational constraints or
42
+ the complexity of their implementation. We test the possibility of using machine learning methods to infer
43
+ the isotopic composition from surface temperature and precipitation amounts, which are standard outputs for
44
+ a wide range of climate models.
45
+ © The Author(s) 2023. Currently under review and subject to potential changes. This is an Open Access article, distributed under the terms
46
+ of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and
47
+ reproduction in any medium, provided the original work is properly cited.
48
+ arXiv:2301.13462v1 [physics.ao-ph] 31 Jan 2023
49
+
50
+ 2
51
+ Wider et al.
52
+ 1. Introduction
53
+ Reliable analysis of current climate change, as well as robust prediction of future Earth system behavior,
54
+ have become a crucial foundation for all endeavors to protect humanity’s prosperity, mitigate ecological
55
+ disasters, or formulate plans for adaptation (Langsdorf et al., 2022). This analysis hinges on an accu-
56
+ rate understanding and modeling of complex mechanisms in the climate system, which in turn relies
57
+ on knowledge of the system’s past behavior. To analyze past climatic conditions outside the compar-
58
+ atively short period of instrumental measurements, we depend on environmental processes recording
59
+ and preserving information on the climate system in natural “climate archives”. One way to recover
60
+ past climate information from such archives is to measure the relative abundance of isotopes, par-
61
+ ticularly of the isotopes of the constituents of water molecules (Mook, 2000). Due to differences in
62
+ mass, molecules with varying isotopic compositions, so-called isotopologues, differ in their behavior
63
+ in chemical reactions and phase transitions. For the special case of water, molecules containing heavy
64
+ 18O atoms, further denoted heavy isotopes, evaporate slower but condensate faster than ones containing
65
+ the lighter 16O. These effects are imprinted on the global hydrological cycle. The resulting patterns of
66
+ the isotopic composition of precipitation depend on many variables such as precipitation amount, tem-
67
+ perature, relative humidity, and the circulation of the atmosphere (Dansgaard, 1964). This makes heavy
68
+ isotopes in water an important tracer of the hydrological cycle and consequently a valuable proxy for
69
+ past climatic changes.
70
+ Isotopic abundances are canonically expressed in the delta notation. For stable oxygen isotopes 18O
71
+ and 16O, this is given by
72
+ 𝛿18O =
73
+ � [18Osample]
74
+ [16Osample]
75
+
76
+ [18Oreference]
77
+ [16Oreference]
78
+
79
+ − 1[�].
80
+ (1)
81
+ Here the ratio of concentrations of the isotopic species in a given sample is compared to a defined
82
+ reference standard. For 𝛿18O of precipitation, this standard is an artificially created sample with an
83
+ isotopic composition that is typical for ocean surface water (Baertschi, 1976).
84
+ One important task in paleoclimatology is to test whether hypotheses about the past climate are
85
+ compatible with proxy data like 𝛿18O measured in natural climate archives (e.g. Bühler et al., 2022).
86
+ To compare simulations of hypothetical climate states to those measurements, a special sub-type of
87
+ climate models, so-called isotope-enabled General Circulation Models (iGCMs), was developed. They
88
+ explicitly simulate isotopic compositions by following the isotopic water species through the hydrolog-
89
+ ical cycle (Brady et al., 2019; Tindall et al., 2009; Yoshimura et al., 2008; Colose et al., 2016; Werner
90
+ et al., 2016). However, many climate models and climate model simulations exist that do not include
91
+ information on water isotopologues. Simulating 𝛿18O is costly because it typically requires duplicat-
92
+ ing large parts of the water cycle for each simulated water species (Tindall et al., 2009). In light of
93
+ recent advances in data science, the question arises whether this isotopic output can instead be emulated
94
+ using machine learning (ML) models that infer the 𝛿18O at each location from other climate variables
95
+ after a model run is finished. We thus call this approach “offline-emulation”. Conducting the emulation
96
+ “offline”, i.e. not coupled to the climate simulation, is possible because isotopes are passive tracers of
97
+ the hydrological cycle that have no feedback onto the climate system.
98
+ Within this study, we narrow the broad task of “offline-emulation” by making a number of choices
99
+ for the learned isotope emulation. The first choice is to only emulate the isotopic composition of pre-
100
+ cipitation. This is the quantity that is also output by iGCMs; it neglects all processes that might disturb
101
+ the signal until it is stored in a climate archive (see e.g. Casado et al., 2018). Because observations of
102
+ isotopes in precipitation are sparse and only exist starting from the 1960s (IAEA/WMO, 2020), we con-
103
+ duct our experiments entirely on simulated data. We limit ourselves to using surface temperature and
104
+ precipitation amount as the two fundamental predictor variables since these variables possess strong
105
+ correlations to 𝛿18O that are well known experimentally (Dansgaard, 1964) and from simulations (see
106
+ Figure 2, C) and are frequently simulated in climate models.
107
+
108
+ 3
109
+ We decide to emulate yearly 𝛿18O data from last millennium (850 CE to 1849 CE) climate simula-
110
+ tions. This is motivated by the combination of the high data availability of simulation runs of sufficient
111
+ length, and the archiving resolution of paleoclimate records during this time period which is typically
112
+ between monthly and sub-decadal. We also contrast the yearly emulation results with experiments using
113
+ monthly resolution.
114
+ As a measure of emulator performance, we will use the 𝑅2 score, which measures the fraction of
115
+ explained temporal variance, as detailed in Section 2.2.5. While we use ML methods that exploit spatial
116
+ correlations in the data by design, we leave explicit incorporation of temporal correlations largely to
117
+ future investigation.
118
+ Working within these constraints, our paper presents the following contributions:
119
+ • We train a deep neural network to estimate stable oxygen isotopes in precipitation (𝛿18O) given
120
+ surface temperature and precipitation and compare to common regression baselines.
121
+ • To respect the underlying geometry of the climate model data, we investigate the performance of
122
+ a spherical network architecture.
123
+ • We present cross-model results, where a regressor trained on simulated data from one climate
124
+ model is used to emulate 𝛿18O in a run from a different model.
125
+ 2. Data and Methodology
126
+ Our approach to emulating 𝛿18O is sketched in Figure 1. For each time step, we start with variables
127
+ that we know are statistically related to 𝛿18O, namely surface temperature and precipitation amount.
128
+ All variables are standardized pixel-wise, i.e. we subtract the mean and divide by the standard devi-
129
+ ation, both computed from the training set. We then estimate the standardized spatial field of 𝛿18O
130
+ from the predictor variables by training a machine learning (ML) regression model. Subsequently, the
131
+ standardization for the inferred 𝛿18O is reversed, resulting in our estimate for the isotopic composition.
132
+ 2.1. Data
133
+ We use data from the isotope-enabled version of the Hadley Center Climate Model version 3 climate
134
+ model (hereafter iHadCM3, Tindall et al., 2009). iHadCM3 is a fully coupled atmosphere-ocean gen-
135
+ eral circulation model (AOGCM). The horizontal resolution of iHadCM3 is 3.75° in the longitudinal
136
+ direction, and 2.5° in the latitudinal direction. We exclude -90° and 90° from the latitudinal values
137
+ because 𝛿18O is not simulated at these latitudes. We focus on the last millennium (850 CE to 1849 CE),
138
+ which is characterized by a stable climate with variability on interannual-to-centennial timescales, but
139
+ no major trends (Jungclaus et al., 2017). Additionally, the last millennium is well documented in cli-
140
+ mate archives and observations (PAGES2k-Consortium, 2019; Konecky et al., 2020; Comas-Bru et al.,
141
+ 2020; Morice et al., 2012).
142
+ Diagnostics of the iHadCM3 data set are visualized in Figure 2. As can be seen from Figure 2 B, the
143
+ standard deviation of the simulated 𝛿18O is large over dry regions like the Sahara desert or the Arabian
144
+ peninsula. This is partly related to the way 𝛿18O is computed in the climate models: in these regions
145
+ the abundances of 18O and 16O are both small because of generally low precipitation amounts, leading
146
+ to numerically unstable ratios and missing values on the monthly time scale. Overall, 0.3% of the 𝛿18O
147
+ values are missing on the monthly timescale, with a strong clustering in the regions with numerical
148
+ instabilities described above (compare Figure A.10). We take this into account by adapting the loss we
149
+ use to train our ML methods to deal with missing values, as described in Section 2.2.3.
150
+ To test the extrapolation and robustness of our emulator, we use last millennium simulations of three
151
+ other climate models: AGCM Scripps Experimental Climate Prediction Center’s Global Spectral Model
152
+ (hereafter isoGSM, Yoshimura et al., 2008), iCESM1 version 1.2 (hereafter iCESM, Brady et al., 2019),
153
+
154
+ 4
155
+ Wider et al.
156
+ Figure 1. Our approach to the emulation of 𝛿18O in precipitation: for each time step, we use surface
157
+ temperature and precipitation amount as predictor variables. Subsequently, the data is standardized
158
+ pixel-wise by subtracting the mean and dividing it by the standard deviation at each pixel (top right).
159
+ Means and standard deviations are based on the training set of the investigated climate model simu-
160
+ lation. We use a machine learning emulation model (ML Regressor) to obtain a standardized estimate
161
+ for 𝛿18O. The emulator output (bottom right) is then de-standardized using the training set mean and
162
+ standard deviation of 𝛿18O at every pixel, to arrive at the final emulation result (bottom left). When
163
+ applying the ML model to data from climate models other than the one that was used for training (e.g.
164
+ in the cross-comparison experiment in Section 3.4) we use the mean and standard deviation from the
165
+ training set of the new model.
166
+ and ECHAM5/MPI-OM (hereafter ECHAM5-wiso, Werner et al., 2016). While iCESM and ECHAM5-
167
+ wiso are fully coupled AOGCMs, isoGSM is an atmospheric GCM forced by sea surface temperatures
168
+ and sea ice distributions of a last millennium run with the CCSM4 climate model (Landrum et al.,
169
+ 2013). We re-grid the other climate model simulations to the iHadCM3 grid using bilinear interpolation
170
+ from the CDO tool set (Schulzweida, 2020).
171
+ All data sets are freely available at https://doi.org/10.5281/zenodo.7516327 and described in detail
172
+ in Bühler et al. (2022).1
173
+ 2.1.1. Pre-processing
174
+ We apply the following pre-processing steps to the climate simulation data:
175
+ • We set valid ranges for all variables, thereby excluding implausibly large or small values, using
176
+ the following choices: surface temperature range: [173, 373] K, 𝛿18O range: [−100, 100]�,
177
+ precipitation amount: [−1, 10000] mm
178
+ month. Wide ranges are chosen because we aim to exclude only
179
+ implausible values that might deteriorate emulator performance without artificially removing
180
+ model deficiencies. Thus, we also keep small negative precipitation values that climate models
181
+ might produce due to numerical inaccuracies in rare occasions.
182
+ • Time steps with missing values in the predictor variables are excluded from the data set. This
183
+ leads to the exclusion of 31 of the 12000 monthly time steps of iHadCM3.
184
+ 1Bühler et al. (2022) also investigate a fifth climate model, GISS ModelE2-R (Colose et al., 2016), which we excluded from
185
+ our study because of physically implausible trends in polar regions in the corresponding model run.
186
+
187
+ 5
188
+ Figure 2. Statistical properties of the iHadCM3 𝛿18O data: (A) mean state of isotopic composition
189
+ (𝛿18O) in the precipitation in precipitation and (B) standard deviation of 𝛿18O on an annual timescale.
190
+ (C) absolute correlations of 𝛿18O with temperature (green) and precipitation amount (brown) on
191
+ interannual timescale; for each grid cell only the stronger of the two is shown.
192
+ • We form yearly averages from monthly data. Missing 𝛿18O data points are omitted in the yearly
193
+ averaging. We argue that this does not impact our results negatively, because the invalid 0.3% of
194
+ 𝛿18O values cluster in regions, where due to numerical instabilities in the “ground truth”
195
+ iHadCM3 simulation, learning a physically consistent emulation would not have been possible
196
+ anyway (compare Figure A.10).
197
+ • We re-grid the yearly data sets to the irregular grid on which the investigated spherical network
198
+ operates (see Section 2.2) using a first-order conservative remapping scheme (Schulzweida,
199
+ 2020).
200
+ • We split the data into test and training sets. We use 850-1750 CE for training and 1751-1849 CE
201
+ for testing. The data are split chronologically instead of randomly to make the test and training
202
+ set as independent as possible, and prevent the network from exploiting auto-correlations from
203
+ previous or subsequent time steps. If a validation set (used for making choices of ML
204
+ hyperparameters) is needed, we split off 10% of the training set randomly unless specified
205
+ otherwise.
206
+ • Before the ML methods are applied, the data are standardized pixel-wise by subtracting the
207
+ training set mean and dividing by the standard deviation of the corresponding climate model, as
208
+ visualized in Figure 1.
209
+ 2.2. Methodology
210
+ To obtain a spatially consistent emulation, and to utilize the fact that the local statistical relations
211
+ between 𝛿18O and the predictor variables are similar in many grid boxes on Earth’s surface, we choose
212
+
213
+ Mean state, 5180 [%o]
214
+ Standard deviation, §18o [%o]
215
+ (A)
216
+ (B)
217
+ -30
218
+ -24
219
+ -18
220
+ -12
221
+ 9-
222
+ 0
223
+ 6
224
+ 0
225
+ 1
226
+ 2
227
+ 3
228
+ 4
229
+ 5
230
+ 6
231
+ 7
232
+ Absolute correlation
233
+ (C)
234
+ 0.00
235
+ 0.25
236
+ 0.50
237
+ 0.75
238
+ 1.00
239
+ Temperature
240
+ 0.00
241
+ 0.25
242
+ 0.50
243
+ 0.75
244
+ 1.00
245
+ Precipitation amount6
246
+ Wider et al.
247
+ two approaches based on Convolutional Neural Networks (CNNs). Both utilize the successful UNet
248
+ architecture (Ronneberger et al., 2015), whose multi-scale analysis can simultaneously capture fine
249
+ structure variations and utilize large-scale contextual information. UNet architectures have been suc-
250
+ cessfully applied in a climate science context before (e.g. Kadow et al., 2020). The first of our two
251
+ approaches treats data on the latitude-longitude grid as a flat image. The second explicitly incorporates
252
+ the spherical geometry of the data.
253
+ 2.2.1. Flat network
254
+ Because our data naturally lie on the surface of a sphere, distortions arise when treating the equally
255
+ spaced longitude-latitude grid as a flat image using e.g. a plate carrée projection (lat/lon projection).
256
+ We test if we can still obtain reasonable results with this naive setup. Furthermore, we try to par-
257
+ tially remedy the effects of the distortions within the “flat” approach, by modifying the standard UNet
258
+ architecture in three ways :
259
+ • We use area-weighted loss functions.
260
+ • We use periodic padding in the longitudinal direction, i.e. we append the rightmost column to the
261
+ very left of the plate carrée map (and vice versa) before computing convolutions. Thereby we
262
+ assure continuity along the 0°-360° coordinate discontinuity.
263
+ • We incorporate CoordConv (Liu et al., 2018), a tweak to convolutional layers that appends the
264
+ coordinates to the features input into each convolution, thus, allowing networks to learn to break
265
+ translational symmetry if necessary.
266
+ 2.2.2. Spherical network
267
+ As a more sophisticated technique, a multitude of approaches to directly incorporate the spherical
268
+ nature of data into a neural network architecture has been proposed (Cohen et al., 2019, 2018; Coors
269
+ et al., 2018; Defferrard et al., 2020; Esteves et al., 2018; Lam et al., 2022). We reproduce the approach
270
+ of Cohen et al. (2019), where the network operates on an icosahedral grid, with grid boxes centered on
271
+ the vertices. Using the icosahedron offers a straightforward way to increase or decrease resolution for a
272
+ UNet-like design, as we can recursively subdivide each of its triangles into four smaller triangles, pro-
273
+ jecting all newly created vertices onto the sphere again. We denote the number of recursive refinements
274
+ of the grid as 𝑟, with 𝑟 = 0 identifying the grid containing only the twelve vertices of the regular icosa-
275
+ hedron. As the refined icosahedral grid is locally very similar to a flat hexagonal grid, we can use an
276
+ appropriately adapted implementation of the usual efficient way to compute convolutions. Additionally,
277
+ the architecture of Cohen et al. (2019) is equivariant to a group of symmetry transformations, meaning
278
+ that if the input to the CNN is transformed by an element of the symmetry group, the output transforms
279
+ accordingly. This fits well with the approximate symmetries present in the Earth system, like symmetry
280
+ to reflections on the equatorial plane or rotations around the polar axis. We validate our implementation
281
+ of the method on a toy problem described by Cohen et al. (2019): the classification of handwritten dig-
282
+ its projected onto a spherical surface. We obtain results that are comparable to those reported by Cohen
283
+ et al. (2019), see Appendix A.1.1 for more details.
284
+ 2.2.3. Loss function
285
+ To train our UNet architectures for isotope emulation, we use a weighted mean squared error loss
286
+ between the standardized 𝛿18O ground truth 𝑌 and the predicted values ˆ𝑌:
287
+ 𝐿(𝑌, ˆ𝑌) = 1
288
+ 𝑏
289
+ 𝑏
290
+ ∑︁
291
+ 𝑖=1
292
+ 1
293
+ |G𝑖|
294
+ |G𝑖 |
295
+ ∑︁
296
+ 𝑗 ∈G𝑖
297
+ 𝑤 𝑗
298
+
299
+ 𝑌𝑖, 𝑗 − ˆ𝑌𝑖, 𝑗
300
+ �2
301
+ ,
302
+ (2)
303
+ where the loss is averaged over a batch of size 𝑏 and the set of valid grid boxes G𝑖 at time step 𝑖. A grid
304
+ box is valid if the simulated ground truth data has no missing value at this time step in this grid box. |G𝑖|
305
+ denotes the cardinality of G𝑖 and 𝑤 𝑗 are weighting coefficients. For the convolutional UNet working on
306
+
307
+ 7
308
+ the plate carrée projection, we choose 𝑤 𝑗 to be proportional to the cosine of the latitude of the center
309
+ of grid cell 𝑗, which is an approximation of the physical size of the grid cell. We rescale the weights,
310
+ such that they sum to the total number of grid boxes. For the icosahedral UNet, all grid boxes are of
311
+ approximately equal size. Therefore, no weighting is applied and 𝑤 𝑗 is a constant independent of 𝑗.
312
+ 2.2.4. Baselines
313
+ In addition to the UNet models, we implement three simple baseline models to assess the relative benefit
314
+ of complex and deep models in our emulation problem. These baselines are:
315
+ • Grid-box-wise linear regression, the simplest conceivable model: regress 𝛿18O on temperature
316
+ and precipitation amount in a separate model for each grid box.
317
+ • Grid-box-wise random forest regression model: in contrast to the linear regression baseline, we
318
+ train a single random forest (Breiman, 2001) to make predictions on all grid boxes. To allow the
319
+ model to learn spatially varying relationships, we include the coordinates as predictor variables.2
320
+ • Grid-to-grid approach (PCA regression): relations between 𝛿18O and other climatic variables
321
+ tend to behave similarly over large areas (see Figure 2 C), justifying a dimension reduction of the
322
+ input and output spaces before applying a multivariate linear regression. This is implemented by
323
+ computing the principal components of the input and output spaces. Schematically, the
324
+ computation goes as follows: 𝑋
325
+ PCA𝑋
326
+ ↦→ 𝐶𝑋
327
+ lin. reg.
328
+ ↦→
329
+ ˆ𝐶𝑌
330
+ PCA−1
331
+ 𝑌
332
+ ↦→
333
+ ˆ𝑌. Approximately optimal numbers of
334
+ principal components are obtained as follows: we iterate over a 50 × 50 logarithmically spaced
335
+ grid of candidate values for the number of input and output principal components. For each
336
+ configuration, the emulation model is trained and its performance is measured on a held-out
337
+ validation set. We then select the combination of numbers of input and output principal
338
+ components which yields the best results on the validation set. As a last step, the selected model
339
+ is retrained, now including the validation set data. Principal component analysis can be
340
+ performed on arbitrary grids, which makes it equally applicable to the projected 2D data and the
341
+ icosahedral representation.
342
+ 2.2.5. Metrics
343
+ The metric we use for evaluating emulation approaches is the 𝑅2 score, also called the “coefficient of
344
+ determination”, which quantifies what fraction of the temporal variance in the test set is explained by
345
+ the ML estimate in each grid box. The 𝑅2 score compares the 𝛿18O ground truth 𝑌𝑗 and an estimate ˆ𝑌𝑗
346
+ in a given grid box 𝑗 as
347
+ 𝑅2(𝑌𝑗, ˆ𝑌𝑗) = 1 − MSE(𝑌𝑗, ˆ𝑌𝑗)
348
+ 𝜎2
349
+ 𝑗
350
+ ,
351
+ (3)
352
+ where MSE(𝑌𝑗, ˆ𝑌𝑗) is the mean squared error and 𝜎2
353
+ 𝑗 the variance of the test set ground truth, both
354
+ taken over the time axis at grid box 𝑗. A value of 𝑅2 = 1 indicates perfect emulation, while a model
355
+ that simply outputs the temporal mean at every time step has 𝑅2 = 0. The score can become arbitrarily
356
+ negative.
357
+ Additionally, we compute the Pearson correlation coefficient between the true and emulated time
358
+ series at some grid boxes. To select time steps in which a method’s performance is particularly strong
359
+ or weak, we calculate the Anomaly Correlation Coefficient (ACC) between emulation and ground truth.
360
+ ACC is defined as the Pearson correlation coefficient between the true and emulated anomaly patterns
361
+ for a given time step. Anomalies are computed with respect to the training set mean.
362
+ If error intervals on performance metrics are given, unless stated otherwise, they are 1𝜎 intervals
363
+ computed over a set of ten runs. Thus, the uncertainties only account for the uncertainty of the stochastic
364
+ aspects of the ML model parameter optimization, discarding any uncertainty that is related to the data.
365
+ 2We encode each longitude 𝜙 as two values sin(𝜙) and cos(𝜙) to avoid the discontinuity at 0°/360°.
366
+
367
+ 8
368
+ Wider et al.
369
+ Implementation details for training and configuration of the ML methods are provided in
370
+ Appendix A.1 and code to reproduce our experiment is freely available at https://github.com/
371
+ jonathanwider/isoEm
372
+ 3. Results
373
+ We structure the Results section as follows. First, we give a detailed spatiotemporal overview to illus-
374
+ trate the characteristics of the ML-based emulation results. To this purpose, we use the best performing
375
+ emulation method as an example. Subsequently, we compare emulation methods amongst each other,
376
+ contrasting deep architectures and baselines as well as “flat” and “spherical” approaches. We follow up
377
+ with a range of sensitivity experiments, and conclude by conducting a cross-model experiment, i.e. we
378
+ train a ML model on data from one climate model and then use the trained model to emulate 𝛿18O in
379
+ other climate model simulations.
380
+ 3.1. Spatiotemporal Overview of Emulation Results
381
+ In Section 3.3, we will discover that the best performing ML emulation method, a deeper version of
382
+ the flat UNet architecture, reaches an average 𝑅2 score of 0.389 ± 0.006 on the plate carrée grid. This
383
+ means that in the global average almost 40% of the temporal variance in the test set is explained by our
384
+ emulation on the interannual timescale. We use this best ML method to introduce spatial and temporal
385
+ characteristics of the emulation.
386
+ The prediction quality varies spatially, as shown in Figure 3A. 𝑅2 scores of 0.6 or larger are reached
387
+ in 18.5% of the grid cells, and 𝑅2 ≤ 0 for only 5.4% of grid cells. The best results are achieved
388
+ over tropical oceans, which are regions with strong correlations of 𝛿18O and precipitation amounts.
389
+ Performance is good over large parts of the Arctic and over western Antarctica as well, which is impor-
390
+ tant because these regions are especially relevant for the comparison with 𝛿18O measurements from
391
+ ice cores. We illustrate the performance in these regions by comparing emulated and ground truth
392
+ time series in the grid boxes closest to two ice core drilling sites in panels B and C of Figure 3: the
393
+ North Greenland Ice Core Project (“NGRIP”, 75.1° N, 42.3° W, Berggren et al., 2009) and the West
394
+ Antarctic Ice Sheet Divide ice core project (“WAIS Divide”, 79.5° S, 112.1° W, Buizert et al., 2015).
395
+ For these drilling sites, the correlation between our emulation and the exact output time series of an
396
+ isotope-enabled climate model exceeds 70%.
397
+ In general, spatial variations in performance follow the correlation structure between 𝛿18O and the
398
+ predictor variables (Figure 2C): in regions with strong absolute correlations between 𝛿18O and surface
399
+ temperature or precipitation amount, the 𝑅2 scores are higher than in regions where none of the predic-
400
+ tor variables is strongly correlated with 𝛿18O. Thus, performance is worse over landmasses, especially
401
+ in the low and mid-latitudes.
402
+ Next, we visualize emulation and climate model output for individual time steps. For a year with typ-
403
+ ical emulator performance3, we plot emulated (panel A) and simulated (panel B) anomalies in Figure 4.
404
+ We can see that the large-scale patterns match well between emulation and simulation: there are strong
405
+ positive anomalies over the Arctic, related to positive temperature anomalies in this time step, and the
406
+ large-scale structure over the Pacific is captured as well. Strong negative anomalies over parts of South
407
+ America and northern India and Pakistan are reproduced. Emulation and ground truth simulation dif-
408
+ fer in their fine-scale structure: the ground truth is generally less smooth than the emulation and seems
409
+ particularly noisy over some dry regions like the Sahara and the Arabic desert. In these regions, there
410
+ is a potential for numerical inaccuracies in the isotopic component of climate models, due to small
411
+ abundances of each isotopic species, and it is hard to untangle which parts of the “noisy” signal have
412
+ a climatic origin and which parts are simulation artifacts. A part of the overall smoother nature of the
413
+ UNet regression results can be attributed to the MSE Loss giving a large (quadratic) penalty for strong
414
+ 3We chose the median in terms of anomaly correlation coefficient (ACC).
415
+
416
+ 9
417
+ Figure 3. Test set emulation performance of the best ML emulation method. The bluer the colors, the
418
+ better the emulation. Blue colors indicate regions in which the performance is better than a trivial
419
+ baseline model that returns the correct test set mean at every time step. This plot displays the average
420
+ of the 𝑅2 scores over ten runs. Additionally, we show the time series of the ML emulation (green, mean
421
+ over ten runs) and the true simulation data (black) for grid boxes next to two ice core drilling sites.
422
+ Panel (B) "NGRIP" (Greenland). Panel (C) "WAIS Divide" (West Antarctica).
423
+ deviations from the true values, thus, priming the network against predicting values in the tails of the
424
+ distribution. Figure A.4 compares emulation and simulation for three additional time steps: time steps
425
+ in which the emulation works particularly well or poorly, and a climatically interesting year: 1816 CE,
426
+ the “year without a summer” (Luterbacher and Pfister, 2015), which is caused by a volcanic eruption
427
+ included in the volcanic forcing of the iHadCM3 simulation. For 1816 CE, we observe that the emu-
428
+ lator reproduces a strong negative 𝛿18O anomaly in regions where 𝛿18O is primarily influenced by
429
+ temperature, namely in the Arctic, Northern North America and Siberia.
430
+ 3.2. Comparing Machine Learning Methods
431
+ The ML emulation models (UNet architectures and simpler baselines) differ in the quality of their
432
+ emulation. In the following, we compare the methods amongst each other. For details on the training
433
+ procedures, network architectures, and method implementations, see Appendix A.1. We also address
434
+ the question of whether using an inherently spherical approach is beneficial over treating the latitude-
435
+ longitude grid as “flat”. However, the comparison is not trivial: the approaches are developed for data
436
+
437
+ iHadCM3, R2score
438
+ (A)
439
+ 0.8
440
+ 0.4
441
+ score
442
+ 0.0
443
+ 2.
444
+ R
445
+ -0.4
446
+ -0.8
447
+ Time series at WAls Divide
448
+ Time series at NGRIP
449
+ (B)
450
+ 28
451
+ 32
452
+ 30
453
+ 34
454
+ [%] Ogt9
455
+ -32
456
+ -36
457
+ -38
458
+ -34
459
+ Corr: 0.79 +/- 0.01
460
+ Corr: 0.70 +/- 0.01
461
+ 0
462
+ 20
463
+ 40
464
+ 60
465
+ 80
466
+ 100
467
+ 0
468
+ 20
469
+ 40
470
+ 60
471
+ 80
472
+ 100
473
+ timestep in test set
474
+ timestep in test set10
475
+ Wider et al.
476
+ Figure 4. Typical emulation results on iHadCM3 data set: We show anomalies as they are output by
477
+ the ML-emulator (“Emulation”) and the “true” result in the simulation data set (“Ground truth”). The
478
+ anomalies are computed with respect to the training set mean. For the selected time step, the anomaly
479
+ correlation coefficient (ACC) reaches its median value.
480
+ Table 1. Globally averaged 𝑅2 scores for the different ML-emulation methods. Results are calculated for
481
+ the icosahedral grid that the method of Cohen et al. (2019) operates on and the plate carrée grid. When a
482
+ method works with data on the other grid, the emulated data is interpolated. "Flat UNet, unmodified" and
483
+ "Flat UNet, modified" refer to the flat network architecture described in Section 2.2.1, either not applying
484
+ or applying the modifications to remedy projection artifacts described in that chapter.
485
+ Emulation Method
486
+ 𝑅2score, plate carrée grid
487
+ 𝑅2score, icosahedral grid
488
+ Flat UNet, unmodified
489
+ 0.352 ± 0.015
490
+ 0.374 ± 0.017
491
+ Flat UNet, modified
492
+ 0.377 ± 0.005
493
+ 0.402 ± 0.006
494
+ Flat random forest baseline
495
+ 0.212
496
+ 0.256
497
+ Flat linear regression baseline
498
+ 0.251
499
+ 0.274
500
+ Flat PCA regression baseline
501
+ 0.303
502
+ 0.332
503
+ Icosahedral UNet
504
+ 0.126 ± 0.011
505
+ 0.396 ± 0.009
506
+ Icosahedral PCA regression baseline
507
+ 0.076
508
+ 0.339
509
+ on different grids (plate carrée and icosahedral) and the necessary interpolations may deteriorate per-
510
+ formance. Thus, we compute performances on both grids, interpolating the predictions from one grid to
511
+ another. Results for the globally averaged 𝑅2 scores are shown in Table 1. The best model in the com-
512
+ parison is the “modified” version of the flat UNet that includes the three modifications (area-weighted
513
+ loss, adapted padding, CoordConv) described in Section 2.2. The effect of the individual modifications
514
+ is detailed in Table A.2 and Figure A.6.
515
+ All UNet architectures outperform all baseline architectures that operate on the same grid. The best
516
+ UNet method explains 7% more of the test set variance than the best baseline model, PCA regression.
517
+ The other baseline models perform worse. In particular, it seems that the random forest baseline, which
518
+ regresses on a pixel-to-pixel level is not able to capture the spatially varying relationships between
519
+ 𝛿18O and the predictor variables surface temperature and precipitation amount well enough, even when
520
+ including coordinates as additional inputs. The spatial performance differences between the UNet meth-
521
+ ods and the best baselines are visualized in Figure A.5. The improvements by the UNets are largest over
522
+ oceans.
523
+ On the icosahedral grid, the icosahedral UNet and the modified flat UNet achieve 𝑅2 scores that
524
+ are not significantly different. On the plate carrée grid, however, the results of the icosahedral UNet
525
+ are much worse. This drop can largely be attributed to the interpolation method (see Figure A.7): on
526
+ the plate carrée grid, neither training data nor results of the flat UNet are interpolated, while for the
527
+ icosahedral UNet interpolations are necessary in both cases.
528
+
529
+ Emulation
530
+ Ground truth
531
+ 3
532
+ (A)
533
+ (B)
534
+ 5180 anomaly [%o]
535
+ 2
536
+ 2
537
+ 311
538
+ 3.3. Sensitivity experiments
539
+ We conduct a range of sensitivity experiments, to test a) the influence of each predictor variable on
540
+ the results, b) whether we can further improve the performance of our ML method and c) whether
541
+ emulation quality varies with timescale.
542
+ First, we use the modified flat UNet architecture as employed in Section 3.2 and test, how the results
543
+ differ if we exclude one of the predictor variables. The globally averaged 𝑅2 score on the plate carrée
544
+ grid drops from 0.377 ± 0.005 if both precipitation and temperature are used to 0.327 ± 0.006 when
545
+ using only precipitation and to 0.251 ± 0.004 when only using temperature. The spatial differences in
546
+ emulation quality follow the large-scale behavior of the correlation structure in panel C of Figure 2.
547
+ When precipitation is excluded, the performance decreases most over low latitudes, while the 𝑅2 score
548
+ drops over polar regions without temperature. This is visualized in Figure A.8.
549
+ To potentially improve the emulation results even further, we create variations of the modified flat
550
+ UNet architecture: a “wider” version in which the number of computed features per network layer is
551
+ doubled (𝑅2 = 0.386 ± 0.008, plate carrée grid), and a “deeper” version with six additional network
552
+ layers4, which obtains 𝑅2 = 0.389±0.006 (plate carrée grid), both improving over the default choice by
553
+ roughly 0.01 . Additionally, we test, whether results could be improved by tuning the learning rate of the
554
+ employed optimizer by testing a grid of 20 logarithmically spaced values between 10−4 and 10−1. The
555
+ performance is best for learning rates between 10−3 and 10−2. However, no substantial improvements
556
+ over the default parameter choice were reached in the limited range of tested values.
557
+ The monthly timescale differs from the interannual scale by a pronounced seasonal cycle of 𝛿18O in
558
+ many regions. Thus, even a simple climatology can explain a part of the variability in 𝛿18O. To exclude
559
+ this trivially explainable part from the computation of the 𝑅2 score, we compute the score separately
560
+ for each month. Results are similar to the results on the interannual scale with roughly 40% of variance
561
+ explained. The higher time resolution suggests exploring whether the emulation can profit from taking
562
+ the temporal context into account. We test this by including not only the temperature and precipitation
563
+ of the current time step but also of the previous month as inputs to the emulation of 𝛿18O. Results do not
564
+ improve strongly, however, possibly because the investigated timescale is still larger than the average
565
+ atmospheric moisture residence time (Trenberth, 1998).
566
+ 3.4. Cross-Model Comparison
567
+ For practical applicability, it is essential that an emulator’s performance is robust under varying cli-
568
+ matic conditions and under potential biases of the climate model that produces the training data for the
569
+ emulator. We address these questions by testing how well our emulation generalizes to data generated
570
+ with different climate models (iCESM, ECHAM5-wiso, isoGSM). To do so, we train the best model
571
+ architecture so far, the deeper modified flat UNet, on data from iHadCM3. Subsequently, the trained
572
+ network is used to emulate 𝛿18O for the test sets of the other climate model data sets. Results of the
573
+ emulation are visualized in Figure 5. For all data sets the mean 𝑅2 score is positive, meaning that in the
574
+ global average, the emulation is preferable to predicting the mean state of the corresponding training
575
+ set. The 𝑅2 score is highest for the ECHAM5-wiso simulation and lowest for isoGSM, where 80% less
576
+ variance is explained than on iHadCM3.
577
+ In all three cross-prediction cases, the performance drops strongly in the Pacific Ocean west of South
578
+ America, a region that is important for the El Niño–Southern Oscillation (ENSO). This might hint at
579
+ inter-model differences in the spatial pattern of ENSO variability. For isoGSM, the emulation quality
580
+ over Antarctica is considerably worse than for all other models. The Antarctic in isoGSM is much less
581
+ depleted in 𝛿18O (less negative 𝛿18O) than in the other models while showing similar equator to pole
582
+ temperature gradients (Bühler et al., 2022). This can potentially impact the relationship between the
583
+ temporal variations of temperature and 𝛿18O.
584
+ 4I.e. one additional “depth step” in Figure A.11
585
+
586
+ 12
587
+ Wider et al.
588
+ Figure 5. Results for the cross-prediction task: A UNet is trained on the iHadCM3 training data set. The
589
+ performance is then evaluated on the test set of various climate models, shown 𝑅2 scores are averages
590
+ over ten runs.
591
+ For isoGSM and iCESM, 𝑅2 is negative over large areas of the mid-latitude oceans. As synoptic-
592
+ scale variability of moisture transport pathways might be an important factor for 𝛿18O in the
593
+ mid-latitudes, adding predictor variables that encode information on the atmospheric circulation in the
594
+ respective models could improve the results. The independence of the isoGSM and iCESM runs in these
595
+ regions must be assessed carefully: isoGSM is forced by sea-surface temperatures and sea-ice distri-
596
+ butions of a last millennium run with CCSM4, which is a predecessor model of iCESM. Therefore,
597
+ characteristics of iCESM might also be present in the isoGSM results.
598
+ We also test, how well the baseline ML models generalize when employed to estimate 𝛿18O for other
599
+ climate models. The very simplistic pixel-wise linear regression yields better results than the PCA-
600
+ regression baseline. Figure A.9 shows the cross-model performance of the linear regression baseline.
601
+ While the 𝑅2 score for iHadCM3 itself is significantly smaller than for the UNet model, the loss of
602
+ performance when doing cross-prediction is much smaller, for iCESM the results are even better than
603
+ those obtained with the UNet model. Especially over mid-latitude oceans, the 𝑅2 scores of the linear
604
+ regression are better the ones obtained with the UNet.
605
+ 4. Discussion
606
+ In a first step towards data-driven emulation of water isotopes in precipitation, we show that in a
607
+ simulated data set 40% of the interannual 𝛿18O variance can be explained by ML models. The emula-
608
+ tion quality follows patterns of the correlation between 𝛿18O and the predictor variables precipitation
609
+ amount and surface temperature. This hints at the possibility of further improving the emulation
610
+ by including other variables that are statistically connected to 𝛿18O as predictors. 𝛿18O composition
611
+ depends on atmospheric moisture transport, which in turn, depends on atmospheric circulation. Thus,
612
+ variables encoding information on atmospheric circulation such as sea-level pressure are promising
613
+
614
+ iHadCM3, R2 = 0.386
615
+ ECHAM5-wis0, R2 = 0.267
616
+ (A)
617
+ (B)
618
+ 0.8
619
+ 0.4
620
+ score
621
+ 0.0
622
+ is0GSM. R2 = 0.084
623
+ iCESM, R2 = 0.162
624
+ R
625
+ (C)
626
+ (D)
627
+ -0.4
628
+ -0.813
629
+ candidates which should be explored in future research. This could be particularly relevant in the mid-
630
+ latitudes, where the comparably poor performance of the emulators might be due to synoptic-scale
631
+ moisture transport variability which is not well captured by annual or monthly means of precipitation
632
+ and temperature. In addition, relative humidity seems a promising candidate as it is important for the
633
+ evolution of 𝛿18O during the evaporation process.
634
+ It should be noted that correlation structures between predictor variables and 𝛿18O are likely
635
+ timescale dependent. Our results suggest that temperature, precipitation and atmospheric circulation
636
+ variations due to internal variability in the climate system and short-scale external forcing such as
637
+ volcanic eruptions and solar variability are the most important factors controlling interannual 𝛿18O vari-
638
+ ability. On the other hand, changes in long-term external forcings such as greenhouse gas concentrations
639
+ and Earth’s orbital configuration, and variations in oceanic circulation have been found to explain 𝛿18O
640
+ changes on millennial and orbital (10,000 years and longer) timescales (He et al., 2021). This varying
641
+ importance of factors controlling climate variations can also result in timescale-dependent relationships
642
+ between the predictor variables surface temperature and precipitation amount (Rehfeld and Laepple,
643
+ 2016), which limits the generalization of emulators between timescales. Meanwhile, on timescales
644
+ from hours to weeks, the memory in the atmosphere is higher. Thus, taking into account previous time
645
+ steps and explicitly tracking moisture pathways for example in tropical or extratropical cyclones could
646
+ improve the emulation performance. On these timescales, ML methods to model sequences of data, like
647
+ long short-term memory (LSTM), recurrent neural networks (RNNs), or transformer models could be
648
+ good alternatives.
649
+ A tested spherical CNN architecture shows no clear benefit over a modified version of the stan-
650
+ dard flat UNet for our task of emulating 𝛿18O in precipitation globally. We suppose that this is partly
651
+ due to the strong latitudinal dependence of the statistical relationships between 𝛿18O and the predictor
652
+ variables (as indicated by correlations in Figure 2C). Thus, the strength of the spherical network archi-
653
+ tecture, namely its equivariance to rotations, possibly does not offer a strong benefit. Additionally, the
654
+ interpolation between the plate carrée grid and the icosahedral grid deteriorates the results. This might
655
+ be remedied by “differentiating through” the interpolation or directly learning the interpolation, as is
656
+ done in Lam et al. (2022). Using ML architectures that are equivariant to approximate symmetries in
657
+ the Earth system might still be beneficial in many applications, since adapting the ML approach to sym-
658
+ metries of the problem reduces overfitting and the demands for training data. One might for example
659
+ use Cohen and Welling (2016) as a starting point and test a network that is equivariant under rotations
660
+ around the polar axis and reflections on the equatorial plane.
661
+ The cross-model emulations can be seen as a supplement to test for the generalization to the (unavail-
662
+ able) real-world 𝛿18O data. Assuming that each model possesses deficiencies in its 𝛿18O simulation,
663
+ robustness under varying models would hint at robustness in the generalization to real-world data. Addi-
664
+ tionally, reliable 𝛿18O emulations for climate models that do not possess an implementation of water
665
+ isotopologues would ideally be done with an emulator that does not overfit to a certain climate model it
666
+ was trained on. Two reasons that might make an ML emulator perform poorly under cross-emulations
667
+ are a) weak statistical connections between 𝛿18O and the predictor variables in the training set and
668
+ b) differences in the statistical connections of 𝛿18O and the predictor variables between climate mod-
669
+ els. We investigate whether drops in cross-prediction performance can be attributed to these causes in
670
+ Appendix A.2 and Figure A.3. Indeed, most regions, in which there is a drop in emulation performance,
671
+ coincide with regions of differing correlation structures or weak correlations between 𝛿18O and the pre-
672
+ dictor variables in the iHadCM3 data set (Figure A.3, B4 to D4 and B2 to D2). In regions with weak
673
+ correlations between 𝛿18O and the predictor variables in the iHadCM3 data set such as the Southern
674
+ Hemisphere mid-latitudes, the UNet has to predict 𝛿18O based on spatial similarity structures (tele-
675
+ connections). The poor performance in the Southern Hemisphere mid-latitudes in IsoGSM and iCESM
676
+ suggest that the spatial similarity structures differ between those two GCMs and iHadCM3. Here, pre-
677
+ dictors that encode atmospheric circulation more directly such as sea-level pressure could be beneficial
678
+ in future studies.
679
+
680
+ 14
681
+ Wider et al.
682
+ This interpretation is supported by a much sharper drop in performance of the UNet architectures
683
+ than simple linear regression when methods were trained on the iHadCM3 climate model and then
684
+ used to emulate other climate model data. As a result, the 𝑅2 scores on the other climate models were
685
+ comparable between UNet and linear regression. This suggests that the UNet might overfit to the spatial
686
+ anomaly patterns in iHadCM3 given the limited information provided by the predictor variables. This
687
+ overfitting will partly reproduce deficiencies of the respective data set used for the training of the
688
+ emulator. It was shown previously that the models used in our study differ in their mean climate state.
689
+ For example, iHadCM3 and ECHAM5-wiso show a similar global temperature state but iHadCM3
690
+ 𝛿18O is much more negative in the global mean (Bühler et al., 2022). Similar differences in the spatial
691
+ anomaly patterns between models need to be explored further to understand their contribution to poor
692
+ cross-model emulation performance. To obtain a more robust emulator that is applicable across models,
693
+ one might utilize data from multiple climate models and climate states (e.g. Last Glacial Maximum,
694
+ mid-Holocene, Pliocene) in the training set.
695
+ Spatially, ML estimates are smoother than the true simulated data. The ground truth data show very
696
+ noisy behavior over dry regions, part of which is likely due to numerical instabilities in the computation
697
+ of 𝛿18O for very low precipitation amounts. Missing data points also occur more frequently in these
698
+ regions, thus, potentially biasing the emulator and its measured performance. Because of these incon-
699
+ sistencies in the input data, it might be beneficial to focus on particular regions when developing an
700
+ emulator with the aim of comparing to a certain natural climate archive. Examples are the polar regions
701
+ for comparisons to ice core data or the mid-latitudes for speleothem records. Restricting the spatial
702
+ extent would also alleviate artifacts of the map projection and render spherical approaches unneces-
703
+ sary. Alternatively, one might think about the application of ML to do in-painting of missing values of
704
+ 𝛿18O for the training of emulators, similar to Kadow et al. (2020). In this case, the incomplete 𝛿18O
705
+ would serve as an input to the ML method in addition to precipitation and temperature.
706
+ Training an isotope emulator on real-world data would avoid uncertainties originating from climate
707
+ models and the implementation of isotopes within them. Databases of observed 𝛿18O in precipitation
708
+ (IAEA/WMO, 2020) or 𝛿18O from natural climate archives (Konecky et al., 2020) are publicly avail-
709
+ able. However, challenges arise from the spatial scarcity and unequal distribution of data, and the short
710
+ temporal coverage of observations. Here, using graph networks like the one developed by Defferrard
711
+ et al. (2020) might be an option, and likely strong prior constraints would need to be used to compen-
712
+ sate for small data set sizes. For the future goal of comparing emulations to 𝛿18O measured in natural
713
+ climate archives, archive-specific processes need to be taken into account. This is because 𝛿18O in pre-
714
+ cipitation is not archived directly, but always as the response of a sensor of the archiving medium.
715
+ For example, precipitation 𝛿18O is archived in speleothem records as calcite carbonate in accumulating
716
+ layers that form from cave drip water (Fairchild and Baker, 2012).
717
+ We calculate yearly 𝛿18O as the unweighted average of monthly 𝛿18O. In most natural climate
718
+ archives, yearly 𝛿18O is weighted by precipitation amount. We tested the influence of such a weighting
719
+ and find that it does not impact the emulator performance negatively (not shown). However, climate
720
+ archives can also show seasonal preference in their sensitivity to 𝛿18O (Wackerbarth et al., 2010;
721
+ Fohlmeister et al., 2017; Baker et al., 2019) such that there is likely no optimal way for computing
722
+ yearly values. Including archive-specific processes could either be a second step in a two-step approach,
723
+ where an ML emulator is trained to predict 𝛿18O in precipitation and then a proxy system model (Evans
724
+ et al., 2013) is used to forward-model archive-specific processes. Alternatively, one might include a
725
+ differentiable proxy system model in the ML pipeline. This would make it possible to train the ML
726
+ architecture directly with proxy data instead of 𝛿18O measured in precipitation.
727
+ 5. Conclusion
728
+ In this study, we explored the ability of machine learning methods to emulate oxygen isotopes as sim-
729
+ ulated by isotope-enabled general circulation models (GCMs). Focussing on interannual variability in
730
+
731
+ 15
732
+ a last millennium simulation, we show that UNet neural networks improve the emulation performance
733
+ compared to baseline methods such as pixel-wise linear regression and PCA-regression. Averaged over
734
+ all grid-cells, our best-performing UNet architecture explains ∼40% of the temporal 𝛿18O variance.
735
+ The emulation performs best in polar regions, where 𝛿18O is strongly controlled by surface temper-
736
+ ature variations, and in low latitude ocean areas, where 𝛿18O is highly correlated with precipitation
737
+ amounts. Lowest performances occur in arid regions, partly because of numerical instabilities in the
738
+ simulation of 𝛿18O for very low precipitation amounts. Using a spherical network architecture does not
739
+ improve the results compared to a modified flat architecture which accounts better for Earth’s spheri-
740
+ cal geometry than a default UNet architecture. This might be because our spherical UNet architecture
741
+ is not optimized to capture latitudinal dependences in the relationships between 𝛿18O and the predictor
742
+ variables.
743
+ We tested the generalization of the emulator trained on output from the iHadCM3 GCM to last mil-
744
+ lennium simulations with other GCMs. While the performance is better than predicting the model’s
745
+ climatology for all GCMs, the explained variance is substantially lower than for iHadCM3. Perfor-
746
+ mances are especially poor in regions where the correlation structure between 𝛿18O and the predictor
747
+ variables differs from the correlation structure in iHadCM3 and in regions with low correlations
748
+ between 𝛿18O and the predictor variables in iHadCM3. In the latter case, the UNet architecture learns
749
+ spatial dependence structures to improve the emulation of 𝛿18O. This improves the performance within
750
+ iHadCM3 compared to pixel-wise regression. However, these spatial structures seem to differ too much
751
+ between GCMs to facilitate skillful cross-model emulations, especially in the mid-latitudes where
752
+ encoding synoptic-scale circulation variations could be important to capture 𝛿18O variations.
753
+ To further improve emulation performance, adding more predictor variables could be a promis-
754
+ ing next step. In particular, variables such as sea level pressure, which capture characteristics of
755
+ the atmospheric circulation more directly than surface temperature and precipitation amount, could
756
+ help in regions with currently poor performance. To compare emulated isotopes to 𝛿18O measured in
757
+ natural climate archives such as ice cores and speleothems, a way of incorporating archive-specific
758
+ processes needs be investigated. This could be done by incorporating differentiable proxy system mod-
759
+ els into UNet architectures or by applying proxy system models to the emulator output in a two-step
760
+ approach. For comparison with 𝛿18O measurements in natural climate archives, the timescales of varia-
761
+ tions recorded by the archives are important. While we focused on interannual timescales in this study,
762
+ shorter as well as longer timescales could be explored in future research to understand the importance
763
+ of synoptic-scale processes, local predictor variables and external forcings for 𝛿18O emulation across
764
+ timescales.
765
+ Acknowledgments. We thank Nadine Theisen for help with the implementation and testing of baseline models. We are grateful
766
+ for the contribution and standardization of model data from Jesper Sjolte, Kei Yoshimura, Madhavan Midhun, Martin Werner,
767
+ and Josefine Axelsson.
768
+ Funding Statement. This research was supported by grants from the Deutsche Forschungsgemeinschaft (DFG, German
769
+ Research Foundation) through the STACY (project no. 395588486) and CLIMAIC (project no. 442926051) projects.
770
+ Competing Interests. None.
771
+ Data Availability Statement. The data used in this study can be freely downloaded here: https://doi.org/10.5281/zenodo.
772
+ 7516327. Code to reproduce our experiments is publicly available at https://github.com/jonathanwider/isoEm, it is subject to
773
+ the license statements in the GitHub repository.
774
+ Ethical Standards. The research meets all ethical guidelines, including adherence to the legal requirements of the study country.
775
+ Author Contributions. Conceptualization: UK, KR, JW, NW; Data curation: JB, KR; Formal Analysis: JW; Funding Acquisi-
776
+ tion: KR; Investigation: JW; Methodology: JK, UK, KR, JW, NW; Project administration: UK, KR; Resources: KR; Software:
777
+ JW; Supervision: JB, JK, UK, KR, NW; Validation: JK, JW; Visualization: JW; Writing original draft: JK, JW; Writing – review
778
+ & editing: all authors. All authors approved the final submitted draft.
779
+ Supplementary Material. Supplementary material has only been provided as an Appendix to this document.
780
+
781
+ 16
782
+ Wider et al.
783
+ References
784
+ Baertschi, P. (1976). Absolute18O content of standard mean ocean water. Earth and Planetary Science Letters, 31(3):341–344.
785
+ Baker, A., Hartmann, A., Duan, W., Hankin, S., Comas-Bru, L., Cuthbert, M. O., Treble, P. C., Banner, J., Genty, D., Baldini,
786
+ L. M., Bartolomé, M., Moreno, A., Pérez-Mejías, C., and Werner, M. (2019). Global analysis reveals climatic controls on the
787
+ oxygen isotope composition of cave drip water. Nature Communications, 10(1):2984.
788
+ Berggren, A.-M., Beer, J., Possnert, G., Aldahan, A., Kubik, P., Christl, M., Johnsen, S. J., Abreu, J., and Vinther, B. M. (2009).
789
+ A 600-year annual 10Be record from the NGRIP ice core, Greenland. Geophysical Research Letters, 36(11).
790
+ Brady, E., Stevenson, S., Bailey, D., Liu, Z., Noone, D., Nusbaumer, J., Otto-Bliesner, B. L., Tabor, C., Tomas, R., Wong, T.,
791
+ Zhang, J., and Zhu, J. (2019). The Connected Isotopic Water Cycle in the Community Earth System Model Version 1. Journal
792
+ of Advances in Modeling Earth Systems, 11(8):2547–2566.
793
+ Breiman, L. (2001). Random forests. Machine learning, 45(1):5–32.
794
+ Bühler, J. C., Axelsson, J., Lechleitner, F. A., Fohlmeister, J., LeGrande, A. N., Midhun, M., Sjolte, J., Werner, M., Yoshimura,
795
+ K., and Rehfeld, K. (2022). Investigating stable oxygen and carbon isotopic variability in speleothem records over the last
796
+ millennium using multiple isotope-enabled climate models. Climate of the Past, 18(7):1625–1654.
797
+ Buizert, C., Cuffey, K. M., Severinghaus, J. P., Baggenstos, D., Fudge, T. J., Steig, E. J., Markle, B. R., Winstrup, M., Rhodes,
798
+ R. H., and Brook, E. J. (2015). The WAIS Divide deep ice core WD2014 chronology–Part 1: Methane synchronization (68–31
799
+ ka BP) and the gas age–ice age difference. Climate of the Past, 11(2):153–173.
800
+ Casado, M., Landais, A., Picard, G., Münch, T., Laepple, T., Stenni, B., Dreossi, G., Ekaykin, A., Arnaud, L., Genthon, C.,
801
+ Touzeau, A., Masson-Delmotte, V., and Jouzel, J. (2018).
802
+ Archival processes of the water stable isotope signal in East
803
+ Antarctic ice cores. The Cryosphere, 12(5):1745–1766.
804
+ Cohen, T., Weiler, M., Kicanaoglu, B., and Welling, M. (2019). Gauge equivariant convolutional networks and the icosahedral
805
+ CNN. In International Conference on Machine Learning, pages 1321–1330. PMLR.
806
+ Cohen, T. S., Geiger, M., Koehler, J., and Welling, M. (2018). Spherical CNNs.
807
+ Cohen, T. S. and Welling, M. (2016). Group Equivariant Convolutional Networks.
808
+ Colose, C. M., LeGrande, A. N., and Vuille, M. (2016). The influence of volcanic eruptions on the climate of tropical South
809
+ America during the last millennium in an isotope-enabled general circulation model. Climate of the Past, 12(4):961–979.
810
+ Comas-Bru, L., Rehfeld, K., Roesch, C., Amirnezhad-Mozhdehi, S., Harrison, S. P., Atsawawaranunt, K., Ahmad, S. M., Brahim,
811
+ Y. A., Baker, A., Bosomworth, M., Breitenbach, S. F. M., Burstyn, Y., Columbu, A., Deininger, M., Demény, A., Dixon, B.,
812
+ Fohlmeister, J., Hatvani, I. G., Hu, J., Kaushal, N., Kern, Z., Labuhn, I., Lechleitner, F. A., Lorrey, A., Martrat, B., Novello,
813
+ V. F., Oster, J., Pérez-Mejías, C., Scholz, D., Scroxton, N., Sinha, N., Ward, B. M., Warken, S., Zhang, H., and members, S.
814
+ W. G. (2020). Sisalv2: a comprehensive speleothem isotope database with multiple age–depth models. Earth System Science
815
+ Data, 12(4):2579–2606.
816
+ Coors, B., Condurache, A. P., and Geiger, A. (2018). Spherenet: Learning spherical representations for detection and classification
817
+ in omnidirectional images. In Proceedings of the European Conference on Computer Vision (ECCV), pages 518–533.
818
+ Dansgaard, W. (1964). Stable isotopes in precipitation. Tellus, 16(4):436–468.
819
+ Defferrard, M., Milani, M., Gusset, F., and Perraudin, N. (2020). DeepSphere: A graph-based spherical CNN.
820
+ Esteves, C., Allen-Blanchette, C., Makadia, A., and Daniilidis, K. (2018). Learning so (3) equivariant representations with
821
+ spherical cnns. In Proceedings of the European Conference on Computer Vision (ECCV), pages 52–68.
822
+ Evans, M., Tolwinski-Ward, S., Thompson, D., and Anchukaitis, K. (2013). Applications of proxy system modeling in high
823
+ resolution paleoclimatology. Quaternary Science Reviews, 76:16–28.
824
+ Fairchild, I. J. and Baker, A. (2012). Speleothem science: from process to past environments. John Wiles & Sons.
825
+ Fohlmeister, J., Plessen, B., Dudashvili, A. S., Tjallingii, R., Wolff, C., Gafurov, A., and Cheng, H. (2017). Winter precipitation
826
+ changes during the medieval climate anomaly and the little ice age in arid central asia. Quaternary Science Reviews, 178:24–
827
+ 36.
828
+ He, C., Liu, Z., Otto-Bliesner, B. L., Brady, E., Zhu, C., Tomas, R., Clark, P., Zhu, J., Jahn, A., Gu, S., Zhang, J., Nusbaumer, J.,
829
+ Noone, D., Cheng, H., Wang, Y., Yan, M., and Bao, Y. (2021). Hydroclimate footprint of pan-Asian monsoon water isotope
830
+ during the last deglaciation. Sci. Adv., 7(4):eabe2611.
831
+ IAEA/WMO (2020). Global Network of Isotopes in Precipitation. The GNIP Database. Accessible at: http://www.iaea.org/water.
832
+ Ioffe, S. and Szegedy, C. (2015). Batch normalization: Accelerating deep network training by reducing internal covariate shift.
833
+ In International Conference on Machine Learning, pages 448–456. PMLR.
834
+ Jungclaus, J. H., Bard, E., Baroni, M., Braconnot, P., Cao, J., Chini, L. P., Egorova, T., Evans, M., González-Rouco, J. F., Goosse,
835
+ H., Hurtt, G. C., Joos, F., Kaplan, J. O., Khodri, M., Klein Goldewijk, K., Krivova, N., LeGrande, A. N., Lorenz, S. J.,
836
+ Luterbacher, J., Man, W., Maycock, A. C., Meinshausen, M., Moberg, A., Muscheler, R., Nehrbass-Ahles, C., Otto-Bliesner,
837
+ B. I., Phipps, S. J., Pongratz, J., Rozanov, E., Schmidt, G. A., Schmidt, H., Schmutz, W., Schurer, A., Shapiro, A. I., Sigl, M.,
838
+ Smerdon, J. E., Solanki, S. K., Timmreck, C., Toohey, M., Usoskin, I. G., Wagner, S., Wu, C.-J., Yeo, K. L., Zanchettin, D.,
839
+ Zhang, Q., and Zorita, E. (2017). The PMIP4 contribution to CMIP6 – Part 3: The last millennium, scientific objective, and
840
+ experimental design for the PMIP4 past1000 simulations. Geoscientific Model Development, 10(11):4005–4033.
841
+ Kadow, C., Hall, D. M., and Ulbrich, U. (2020).
842
+ Artificial intelligence reconstructs missing climate information.
843
+ Nature
844
+ Geoscience, 13(6):408–413.
845
+ Kingma, D. P. and Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.
846
+
847
+ 17
848
+ Konecky, B. L., McKay, N. P., Churakova (Sidorova), O. V., Comas-Bru, L., Dassié, E. P., DeLong, K. L., Falster, G. M., Fischer,
849
+ M. J., Jones, M. D., Jonkers, L., Kaufman, D. S., Leduc, G., Managave, S. R., Martrat, B., Opel, T., Orsi, A. J., Partin, J. W.,
850
+ Sayani, H. R., Thomas, E. K., Thompson, D. M., Tyler, J. J., Abram, N. J., Atwood, A. R., Cartapanis, O., Conroy, J. L., Curran,
851
+ M. A., Dee, S. G., Deininger, M., Divine, D. V., Kern, Z., Porter, T. J., Stevenson, S. L., von Gunten, L., and Members, I. P.
852
+ (2020). The iso2k database: a global compilation of paleo-d18o and dh records to aid understanding of common era climate.
853
+ Earth System Science Data, 12(3):2261–2288.
854
+ Lam, R., Sanchez-Gonzalez, A., Willson, M., Wirnsberger, P., Fortunato, M., Pritzel, A., Ravuri, S., Ewalds, T., Alet, F., Eaton-
855
+ Rosen, Z., Hu, W., Merose, A., Hoyer, S., Holland, G., Stott, J., Vinyals, O., Mohamed, S., and Battaglia, P. (2022). GraphCast:
856
+ Learning skillful medium-range global weather forecasting.
857
+ Landrum, L., Otto-Bliesner, B. L., Wahl, E. R., Conley, A., Lawrence, P. J., Rosenbloom, N., and Teng, H. (2013).
858
+ Last
859
+ Millennium Climate and Its Variability in CCSM4. Journal of Climate, 26(4):1085–1111.
860
+ Langsdorf, S., Löschke, S., Möller, V., Okem, A., Officer, S., and Rama, B. (2022). Climate Change 2022 Impacts, Adaptation
861
+ and Vulnerability Working Group II Contribution to the Sixth Assessment Report of the Intergovernmental Panel on Climate
862
+ Change.
863
+ LeCun, Y. and Cortes, C. (2005). The mnist database of handwritten digits.
864
+ Liu, R., Lehman, J., Molino, P., Petroski Such, F., Frank, E., Sergeev, A., and Yosinski, J. (2018). An intriguing failing of
865
+ convolutional neural networks and the coordconv solution. Advances in neural information processing systems, 31.
866
+ Luterbacher, J. and Pfister, C. (2015). The year without a summer. Nature Geoscience, 8(4):246–248.
867
+ Mook, W. (2000). Environmental isotopes in the hydrological cycle - Volume 2. IAEA Publish, 39.
868
+ Morice, C. P., Kennedy, J. J., Rayner, N. A., and Jones, P. D. (2012). Quantifying uncertainties in global and regional temperature
869
+ change using an ensemble of observational estimates: The hadcrut4 data set. Journal of Geophysical Research: Atmospheres,
870
+ 117(D8).
871
+ PAGES2k-Consortium (2019). Consistent multidecadal variability in global temperature reconstructions and simulations over
872
+ the Common Era. Nature Geoscience, 12(8):643–649.
873
+ Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., and Antiga, L. (2019).
874
+ Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32.
875
+ Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., and
876
+ Dubourg, V. (2011). Scikit-learn: Machine learning in Python. the Journal of machine Learning research, 12:2825–2830.
877
+ Rehfeld, K. and Laepple, T. (2016). Warmer and wetter or warmer and dryer? observed versus simulated covariability of holocene
878
+ temperature and rainfall in asia. Earth and Planetary Science Letters, 436:1–9.
879
+ Ronneberger, O., Fischer, P., and Brox, T. (2015). U-Net: Convolutional Networks for Biomedical Image Segmentation. In Navab,
880
+ N., Hornegger, J., Wells, W. M., and Frangi, A. F., editors, Medical Image Computing and Computer-Assisted Intervention –
881
+ MICCAI 2015, volume 9351, pages 234–241. Springer International Publishing, Cham.
882
+ Schulzweida, U. (2020). CDO User Guide.
883
+ Tindall, J. C., Valdes, P. J., and Sime, L. C. (2009). Stable water isotopes in HadCM3: Isotopic signature of El Niño–Southern
884
+ Oscillation and the tropical amount effect. Journal of Geophysical Research, 114(D4):D04111.
885
+ Trenberth, K. E. (1998). Atmospheric moisture residence times and cycling: Implications for rainfall rates and climate change.
886
+ Climatic change, 39(4):667–694.
887
+ Wackerbarth, A., Scholz, D., Fohlmeister, J., and Mangini, A. (2010). Modelling the delta 18 O value of cave drip water and
888
+ speleothem calcite. Earth and Planetary Science Letters, 299(3-4):387–397.
889
+ Wanner, H., Brönnimann, S., Casty, C., Gyalistras, D., Luterbacher, J., Schmutz, C., Stephenson, D. B., and Xoplaki, E. (2001).
890
+ North Atlantic Oscillation–concepts and studies. Surveys in geophysics, 22:321–381.
891
+ Werner, M., Haese, B., Xu, X., Zhang, X., Butzin, M., and Lohmann, G. (2016). Glacial–interglacial changes in H 2 18 O,
892
+ HDO and deuterium excess–results from the fully coupled ECHAM5/MPI-OM Earth system model. Geoscientific Model
893
+ Development, 9(2):647–670.
894
+ Yoshimura, K., Kanamitsu, M., Noone, D., and Oki, T. (2008). Historical isotope simulation using Reanalysis atmospheric data.
895
+ Journal of Geophysical Research, 113(D19):D19108.
896
+
897
+ 18
898
+ Wider et al.
899
+ Figure A.1. Validation task for the icosahedral neural network: shown are randomly selected examples
900
+ of handwritten digits from the MNIST data set, projected onto the icosahedral grid, in this case the
901
+ refinement level of the icosahedral grid 𝑟 equals 4. For the validation tasks, three versions of this data
902
+ set are generated: One where the digits are not rotated ("N"), one in which rotations of the symmetry
903
+ group of the icosahedron are applied ("I") and one in which we apply rotations of the group of rotations
904
+ of the sphere("R").
905
+ A. Supplementary Material
906
+ A.1. Implementation Details
907
+ We use pytorch (Paszke et al., 2019) to implement the CNNs and scikit-learn (Pedregosa et al., 2011)
908
+ for the baseline models. Our code is publically available on GitHub.5
909
+ A.1.1. Validation Experiment
910
+ The validation experiment is a variation of one of the seminal tasks in ML: the classification of the
911
+ MNIST data set of handwritten digits (LeCun and Cortes, 2005). As a toy example, Cohen et al. (2019)
912
+ project the digits onto the southern hemisphere of the icosahedral grid, some examples are visualized
913
+ in Figure A.1. Then, three types of data sets are produced: the digits can either be left as they are
914
+ (“non-rotated”) - or the icosahedral grid can be rotated before the digits are projected onto it, either
915
+ by a symmetry transformation of the icosahedron or by an unconstrained rotation (“fully-rotated”).
916
+ Because the network architecture of Cohen et al. (2019) is equivariant to rotations of the icosahedron,
917
+ the network should be able to classify digits that have been rotated by elements of this symmetry group
918
+ with the same accuracy as non-rotated digits, even if during training it was never shown any rotated
919
+ digits.
920
+ The data set creation process, our network architecture (Figure A.2), and the training procedure
921
+ for this task follow Cohen et al. (2019) as closely as possible. We train for 60 epochs on the non-
922
+ rotated and fully-rotated data sets and for one epoch on the icosahedrally rotated data set, which is
923
+ 60 times larger than the other sets. We use a cross-entropy loss function and the Adam optimizer
924
+ (Kingma and Ba, 2014) with a learning rate of 0.001 and the other parameters at their default values
925
+ 𝛽1,2 = (0.9, 0.999), 𝜖 = 10−8.
926
+ Our results in Table A.1 are comparable or better than those reported in Cohen et al. (2019). Notably,
927
+ they demonstrate the equivariance of our implementation - the classification results for digits rotated by
928
+ an icosahedral symmetry are almost identical to those of non-rotated digits.6 Small differences between
929
+ the results of our implementation and the implementation of Cohen et al. (2019) can partly be attributed
930
+ to the fact that none of our hyperparameters were tuned - and to implementation details not described
931
+ in Cohen et al. (2019), like the batch size or the used optimizer.
932
+ A.1.2. Isotope Emulation Experiment
933
+ UNet Training.
934
+ To optimize the UNet models, we use the Adam optimizer (Kingma and Ba, 2014),
935
+ with lr = 0.001 and the other parameters at their default values: 𝛽1,2 = (0.9, 0.999), 𝜖 = 10−8. We use
936
+ early stopping with a patience of 5, i.e. we abort training if no global minimum of the validation set loss
937
+ 5https://github.com/jonathanwider/isoEm.
938
+ 6We did not fix a random seed, therefore, the results of N/N and N/I are not exactly identical.
939
+
940
+ 19
941
+ Figure A.2. Sketch of the architecture used to validate our implementation of the icosahedral network
942
+ of Cohen et al. (2019). Spatial resolutions (green text) relate to the refinement level of the icosahedral
943
+ grid. The architecture was chosen according to the details given in the supplementary material of
944
+ the original paper. "S2R" and "R2R" are specific types of convolutional layers developed to maintain
945
+ equivariance, and IcoBN is an adapted version of batch normalization. For details, see Cohen et al.
946
+ (2019).
947
+ Table A.1. Classification accuracies (fraction of correctly classified to the total number of tested digits)
948
+ for the icosahedral MNIST validation experiment (Cohen et al., 2019). "N", "I" and "R" indicate data
949
+ sets, where either no rotations, rotations of the symmetry group of the icosahedron, or rotations of the
950
+ symmetry group of the sphere were applied. Shown results are averages over three runs.
951
+ Training set rot. type/Test set rot. type
952
+ N/N
953
+ N/I
954
+ N/R
955
+ I/I
956
+ I/R
957
+ R/R
958
+ Cohen et al.
959
+ 99.43
960
+ 99.43
961
+ 69.99
962
+ 99.38
963
+ 66.26
964
+ 99.31
965
+ Ours
966
+ 99.23
967
+ 99.34
968
+ 68.57
969
+ 99.27
970
+ 69.31
971
+ 99.37
972
+ is reached in 5 consecutive epochs. As a result, the training runs are stopped after roughly 20 epochs.
973
+ We use a batch size of 8. Training a model takes on the order of minutes to tens of minutes for a single
974
+ run on a basic graphics card (NVIDIA GeForce GTX1650).
975
+ For both icosahedral and flat UNets, we use batch normalization (BN, Ioffe and Szegedy, 2015)
976
+ and ReLU-activations after all but the last convolutional layer. We use 2x2 max-pooling to go to
977
+ coarser spatial resolution and nearest neighbor interpolation (plate carrée projection) and a modified
978
+ form of bilinear interpolation (icosahedral grid) to increase resolution. Data from skip connections and
979
+ upsampling are simply concatenated.
980
+ Icosahedral UNet Approach.
981
+ We create the icosahedral data set using an icosahedral grid at refinement
982
+ level 𝑟 = 5, meaning we apply 5 recursive steps in which each of the triangular faces of the icosahedron
983
+ is divided into four smaller triangles, with the grid points subsequently projected back to the spherical
984
+ surface. This results in a grid with 5×22𝑟+1 +2 = 10242 vertices, while the iHadCM3 latitude-longitude
985
+ grid encompasses 6816 grid points. Because the areas covered by the iHadCM3 grid cells vary with
986
+ latitude, the resolution of the icosahedral grid is higher than the resolution of the iHadCM3 grid close
987
+ to the equators, while close to the poles iHadCM3 data is better resolved than the icosahedral grid.
988
+ The architecture used for the icosahedral grid is visualized in Figure A.12. It is inspired by an
989
+ architecture in Cohen et al. (2019). There is an implementation uncertainty remaining that relates to
990
+
991
+ 20
992
+ Wider et al.
993
+ Table A.2. Effect of modifications to flat UNet architecure, globally averaged 𝑅2 scores. Shown are
994
+ standard deviations and mean over ten runs.
995
+ Use CoordConv
996
+ Use area-weighted loss
997
+ Use cylindrical padding
998
+ 𝑅2score
999
+ No
1000
+ No
1001
+ No
1002
+ 0.352 ± 0.015
1003
+ No
1004
+ No
1005
+ Yes
1006
+ 0.357 ± 0.015
1007
+ No
1008
+ Yes
1009
+ No
1010
+ 0.365 ± 0.005
1011
+ Yes
1012
+ No
1013
+ No
1014
+ 0.367 ± 0.010
1015
+ Yes
1016
+ Yes
1017
+ Yes
1018
+ 0.377 ± 0.005
1019
+ the treatment of the vertices of the icosahedron at 𝑟 = 0, i.e. the 12 corners of the unrefined grid. In
1020
+ opposition to all the other pixels in the icosahedral grid, these possess only five neighboring pixels
1021
+ (instead of six), thus introducing irregularities in the convolution patterns. Unable to extract the exact
1022
+ treatment of these corner pixels in Cohen et al. (2019), we made the choice to set these corner pixel
1023
+ values to zero in every layer. This will likely introduce biases at very coarse resolutions (i.e. 𝑟 small).
1024
+ We use the MSE-Loss from Equation (2) without weighting, because all pixels in the icosahedral
1025
+ grid cover an approximately equal area. Padding is done similarly to Cohen et al. (2019) in a way that
1026
+ asserts continuity between the faces of the icosahedral grid.
1027
+ Flat UNet.
1028
+ The default architecture for the flat UNets is visualized in Figure A.11. By default,
1029
+ we use zero padding to keep the resolution before and after convolutions identical, in most experi-
1030
+ ments, however, only the latitudes get zero-padded, while we pad the longitudes cyclically to avoid
1031
+ discontinuities.
1032
+ A.2. Investigating reasons for cross-prediction performance drops
1033
+ We investigate the drops in 𝑅2 score that occur when predicting with a model trained on iHadCM3
1034
+ data on simulation data from other climate models. This experiment and its results were described in
1035
+ Section 3.4. As described in the main text, a possible explanation might be differences in the statistical
1036
+ connections between 𝛿18O and the predictor variables amongst the different climate models. To estimate
1037
+ these differences, we calculate the root of the squared differences in correlation coefficients between
1038
+ each model and iHadCM3 grid-box wise:
1039
+ ��
1040
+ 𝑟Model
1041
+ d18O,prec − 𝑟iHadCM3
1042
+ d18O,prec
1043
+ �2
1044
+ +
1045
+
1046
+ 𝑟Model
1047
+ d18O,tsurf − 𝑟iHadCM3
1048
+ d18O,tsurf
1049
+ �2� 1
1050
+ 2
1051
+ (A.1)
1052
+ Here 𝑟 indicates the (temporal) Pearson correlation coefficients computed for each model and grid box.
1053
+ The results are visualized in panels (B2) to (D2) of Figure A.3.
1054
+ Additionally, the generalization to other models might be impaired in regions where there are weak
1055
+ or no statistical relationships between 𝛿18O and the predictor variables in the iHadCM3 data. This may
1056
+ occur due to iHadCM3 misrepresenting the 𝛿18O relationships in the Earth system - or there might just
1057
+ not be strong connections between 𝛿18O and the predictor variables in these regions. In a simplistic
1058
+ approach, we assess this by plotting regions in which neither the correlation of temperature to 𝛿18O
1059
+ nor the correlation of precipitation amount and 𝛿18O exceeds an absolute value of 0.25 as hatches in
1060
+ Figure A.3 (B4) to (D4).
1061
+ In panels (B4) to (D4), we plot the difference in cross-prediction performance between each model
1062
+ and iHadCM3, whose training set was used to train the emulator. We observe that especially for the
1063
+ ENSO region west of South America and over the North Atlantic Ocean (a region relevant for the
1064
+ North Atlantic Oscillation, see Wanner et al., 2001) a decline in performance coincides with changes
1065
+ in the correlation structure between the models. Over the southern oceans, there are both changes in
1066
+ correlation structure between the models and weak correlations for iHadCM3.
1067
+
1068
+ 21
1069
+ Figure A.3. Investigating reasons for emulation quality decrease in cross-prediction experiments: (A1)
1070
+ to (D1) show the absolute correlations between 𝛿18O and the predictor variables. For each grid cell,
1071
+ only the larger of the two absolute correlation coefficients is shown. (B2) to (D2) show the differences
1072
+ in the correlation structure between the models as computed in Equation (A.1). (A3) to (D3) show
1073
+ the cross-prediction 𝑅2 scores of the best deeper flat UNet model and are identical to the content of
1074
+ Figure 5. (B4) to (D4) show 𝑅2 scores differences between each model and iHadCM3. In hatched
1075
+ regions no correlation coefficient has an absolute value bigger than 0.25 in the iHadCM3 data set.
1076
+
1077
+ iHadCM3, abs. correlations
1078
+ iHadCM3, R2 iHadCM3
1079
+ (A1)
1080
+ (A3)
1081
+ ECHAM5-wiso, abs. correlations
1082
+ ECHAM5-wiso, corr. diff. to iHadCM3
1083
+ ECHAM5-wiso, R2 iHadCM3
1084
+ ECHAM5-wiso, R2 diff. to iHadCM3
1085
+ (B1)
1086
+ (B2)
1087
+ (B3)
1088
+ (B4)
1089
+ isoGSM, abs. correlations
1090
+ isoGSM, corr. diff. to iHadCM3
1091
+ isoGSM, R2 iHadCM3
1092
+ isoGSM, R2 diff. to iHadCM3
1093
+ (C1)
1094
+ (C2)
1095
+ (C3)
1096
+ (C4)
1097
+ iCESM, abs. correlations
1098
+ iCESM, corr. diff. to iHadCM3
1099
+ iCESM, R2 iHadCM3
1100
+ iCESM, R2 diff. to iHadCM3
1101
+ (D1)
1102
+ (D2)
1103
+ (D3)
1104
+ (D4)
1105
+ 0.00
1106
+ 0.25
1107
+ 0.50
1108
+ 0.75
1109
+ 1.00
1110
+ Temperature
1111
+ 0.0
1112
+ 0.2
1113
+ 0.4
1114
+ 0.6
1115
+ 0.8
1116
+ 1.0
1117
+ -0.8-0.4
1118
+ 0.0
1119
+ 0.4
1120
+ 0.8
1121
+ -1.0
1122
+ -0.5
1123
+ 0.0
1124
+ 0.5
1125
+ 1.0
1126
+ R2 score
1127
+ R2 score difference
1128
+ 0.00
1129
+ 0.25
1130
+ 0.50
1131
+ 0.75
1132
+ 1.00
1133
+ Precipitation amount22
1134
+ Wider et al.
1135
+ Figure A.4. Emulation results on iHadCM3 data set: We show anomalies produced by the ML-emulator
1136
+ (“emulation”) and the “true” result in the iHadCM3 data set (“ground truth”). The anomalies are com-
1137
+ puted as the difference to the training set mean. We select time steps in which the emulator performs
1138
+ especially strong (“90th percentile”) and weak (“10th percentile”), as measured by the anomaly cor-
1139
+ relation coefficient (ACC). Additionally, we show the time step, for which the ACC reaches its median
1140
+ value, and a year with a pronounced climatic anomaly: 1816 CE, the “year without a summer”.
1141
+
1142
+ 1oth percentile, emulation
1143
+ Median, emulation
1144
+ (A1)
1145
+ (B1)
1146
+ 3
1147
+ 2
1148
+ 1oth percentile, ground truth
1149
+ Median, ground truth
1150
+ (A2)
1151
+ (B2)
1152
+ 180 anomaly [%o]
1153
+ 0
1154
+ 90th percentile, emulation
1155
+ 1816 CE, emulation
1156
+ (C1
1157
+ (D1)
1158
+ 9oth percentile, ground truth
1159
+ 1816 CE, ground truth
1160
+ (C2)
1161
+ (D2)23
1162
+ Figure A.5. The difference in 𝑅2 score between the UNet model and the PCA-based regression baseline
1163
+ for each grid type,(A): plate carrée grid, (B): icosahedral grid. On the plate carrée grid, we use the
1164
+ “modified” version of the flat UNet, including the modifications remedy distortions due to the spherical
1165
+ nature of the data. Green colors indicate better performance of the UNet compared to the baseline
1166
+ model. Before computing the differences, 𝑅2 scores of ten runs are averaged for each configuration.
1167
+ Figure A.6. Effects of modifications to the “standard” UNet, which treats the longitude-latitude grid
1168
+ as a flat image: In each panel, we show the difference in 𝑅2 score with respect to the unmodified
1169
+ version. We investigate the following modifications: (A) A loss function, in which the contribution of
1170
+ each grid box is weighted by the area it covers on Earth’s surface. (B) CoordConv (Liu et al., 2018), a
1171
+ modification to CNNs, that allows the network to access the coordinates of locations in the image and
1172
+ break translational equivariance. (C) padding the longitudes cyclically instead of using zero padding
1173
+ and (D) the joint effect of the modifications. Shown in each panel are differences between averages over
1174
+ the 𝑅2 scores of ten runs.
1175
+
1176
+ Flat UNet - Flat PCA baseline
1177
+ co UNet - Ico PCA baseline
1178
+ 0.4
1179
+ (A)
1180
+ (B)
1181
+ : difference
1182
+ 0.2
1183
+ 0.0
1184
+ score
1185
+ -0.2
1186
+ R
1187
+ -0.4Area-weighted loss
1188
+ CoordConv
1189
+ (A)
1190
+ (B)
1191
+ 0.10
1192
+ 0.05
1193
+ difference
1194
+ 0.00
1195
+ Cyclically padding longitudes
1196
+ All modifications
1197
+ score
1198
+ (C
1199
+ (D)
1200
+ R
1201
+ -0.05
1202
+ -0.1024
1203
+ Wider et al.
1204
+ Figure A.7. Interpolation between grids degrades results. (A) Performance of the icosahedral UNet
1205
+ architecture, here the results were interpolated to the flat grid. (B) results of the flat UNet architec-
1206
+ ture, after interpolating the predictions to the icosahedral grid and back to the plate carrée grid. The
1207
+ prediction quality is almost indistinguishable from the results of the icosahedral UNet. Additionally,
1208
+ the results are bad in regions, where we expect interpolations to have a negative effect: Over coastal
1209
+ and in the polar regions, where the icosahedral grid cells are larger then the iHadCM3 grid cells
1210
+ and therefore data partly gets “averaged” when interpolating from the finer iHadCM3 grid and to the
1211
+ coarser icosahedral grid and back. Thus, we can attribute a large part of the 𝑅2 score differences to
1212
+ the interpolations between the grids.
1213
+ Figure A.8. Difference in emulation quality (𝑅2 score) between using only one of the predictor vari-
1214
+ ables (surface temperature and precipitation amount) and using both simultaneously. Regions shaded
1215
+ in purple indicate a drop in performance when leaving out the corresponding predictor variable. Before
1216
+ computing the differences, averages over the 𝑅2 scores of ten runs were formed for each configuration..
1217
+
1218
+ Ico UNet, interpolated
1219
+ Flat UNet, interpolated twice
1220
+ (A)
1221
+ (B)
1222
+ 0.8
1223
+ 0.4
1224
+ score
1225
+ 0.0
1226
+ 2.
1227
+ -0.4
1228
+ R
1229
+ -0.8Difference: Excluding precipitation amount
1230
+ Difference: Excluding temperature
1231
+ 0.4
1232
+ (A)
1233
+ (B)
1234
+ difference
1235
+ 0.2
1236
+ 0.0
1237
+ score
1238
+ -0.2
1239
+ R
1240
+ -0.425
1241
+ Figure A.9. Results for the cross-prediction task with a pixel-wise linear regression model. The model
1242
+ was trained on the iHadCM3 data set, where the performance is worse than with the UNet model. For
1243
+ cross-predictions on other data sets, however, the emulation quality of the linear model is comparable
1244
+ to or even better than the performance of the UNet, as can be seen by comparing the globally averaged
1245
+ 𝑅2scores in panels (B) to (D) to the corresponding panels of Figure 5.
1246
+ Figure A.10. Investigating missing 𝛿18O values: Spatial distribution of missing 𝛿18O data for iHadCM3
1247
+ on monthly timescale. While for over 80% of the gridboxes, not a single value is missing, missing values
1248
+ are clustering mainly in hot and dry regions. For the worst grid box, 𝛿18O is missing in 25% of the time
1249
+ steps.
1250
+
1251
+ iHadCM3, R2 = 0.251
1252
+ ECHAM5-wis0, R2 = 0.223
1253
+ (A)
1254
+ (B)
1255
+ 0.8
1256
+ 0.4
1257
+ score
1258
+ 0.0
1259
+ is0GSM. R2 = 0.061
1260
+ iCESM, R2 = 0.249
1261
+ R
1262
+ (C)
1263
+ (D)
1264
+ -0.4
1265
+ -0.8Fraction of missing §i8o values in the iHadCM3 data set
1266
+ 0
1267
+ 1
1268
+ 5
1269
+ 10
1270
+ 15
1271
+ 20
1272
+ 25
1273
+ 30
1274
+ Fraction of missiong 5180 values [%]26
1275
+ Wider et al.
1276
+ Figure A.11. Sketch of our default flat UNet architecture. The parameters were chosen to roughly match
1277
+ in size with the icosahedral UNet architecture. Before the data is input into the network, it is resized
1278
+ in order to assure divisibility during down-and up-scaling, thus the input resolution (green) to the first
1279
+ layer is 72 × 96 instead of 71 × 96 as in the iHadCM3 grid. In the end, the output of the architecture
1280
+ is scaled back to the original grid. The number of computed features per layer is written below the
1281
+ corresponding data blocks (black). The number of input features (𝑛𝑖𝑛) depends on the number of chosen
1282
+ variables (it equals 2 if using both temperature and precipitation amount), and the number of output
1283
+ features 𝑛𝑜𝑢𝑡 equals 1 for all our applications. This graphic doesn’t include the coordinate features that
1284
+ get appended to the data-tensors before each convolution, if CoordConv (Liu et al., 2018) is used. BN is
1285
+ short for batch normalization, and 3x3 conv indicates a convolutional layer with a 3 × 3 convolutional
1286
+ kernel.
1287
+
1288
+ ReLU(BN(3x3 conv))
1289
+ skip-connection
1290
+ > 2x2 max-pool
1291
+ upsampling
1292
+ 1x1 conv27
1293
+ Figure A.12. Sketch of the default icosahedral UNet architecture that takes into account the spher-
1294
+ ical nature of our data. The parameters are chosen similar to details given in the paper of Cohen
1295
+ et al. (2019). The icosahedral refinement level 𝑟 is given in green, the number of features per layer in
1296
+ black below the corresponding blocks. “S2R” (scalar-to-regular) and “R2R” (regular-to-regular) are
1297
+ convolutional layers defined by Cohen et al. (2019) to achieve equivariance to a group of symmetry
1298
+ transformations.
1299
+
1300
+ → ReLU(IcoBN(R2R 3x3 conv))
1301
+ → Skip-connection
1302
+ > 2x2 icosahedral max-pool
1303
+ → Icosahedral upsampling
1304
+ > Max-Pool-orientations(R2R 3x3 conv)
1305
+ > S2R 3x3 conv
D9FRT4oBgHgl3EQfAjeU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
EtE1T4oBgHgl3EQfWwQ3/content/tmp_files/2301.03117v1.pdf.txt ADDED
@@ -0,0 +1,2381 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dihadron production in DIS at small x at next to leading order: transverse photons
2
+ Filip Bergabo1, 2, ∗ and Jamal Jalilian-Marian1, 2, †
3
+ 1Department of Natural Sciences, Baruch College, CUNY,
4
+ 17 Lexington Avenue, New York, NY 10010, USA
5
+ 2City University of New York Graduate Center, 365 Fifth Avenue, New York, NY 10016, USA
6
+ We calculate the next to leading order corrections to dihadron production in Deep Inelastic Scat-
7
+ tering (DIS) at small x using the Color Glass Condensate formalism for the case when the virtual
8
+ photon is transverse polarized. Similar to the case of longitudinal photon exchange all UV and
9
+ soft singularities cancel while the collinear divergences are absorbed into quark and antiquark-
10
+ hadron fragmentation functions. Rapidity divergences lead to JIMWLK evolution of dipoles and
11
+ quadrupoles which describe multiple-scatterings of the quark antiquark dipole on the target pro-
12
+ ton/nucleus and contain all the QCD dynamics of the target leading to a finite final result for the
13
+ dihadron production cross section.
14
+ I.
15
+ INTRODUCTION
16
+ A hadron or nucleus wave function at high energy (equivalently, small x) contains a large number of predominantly
17
+ gluons leading to the phenomenon of gluon saturation [1–5]. Inclusive and diffractive two-particle production and
18
+ angular correlations in high energy hadronic/nuclear collisions is a sensitive probe of gluon saturation in a proton
19
+ or nucleus at small x [6–40]. The disappearance of the away side peak in proton (deuteron)-nucleus collisions in the
20
+ forward rapidity region at RHIC [41, 42] as predicted by gluon saturation models [8] provides the strongest hint for the
21
+ presence of gluon saturation in the wave function of the target nucleus at small x. Nevertheless due to complications
22
+ arising from further interactions and radiation from both initial and final states an unambiguous interpretation of
23
+ the RHIC results remains illusive. DIS offers the cleanest environment in which the dynamics of gluon saturation
24
+ can be investigated theoretically as the virtual photon probing the inner structure of the target does not interact
25
+ strongly. The proposed Electron-Ion Collider (EIC) will allow precision studies of the observables [43, 44] in which
26
+ gluon saturation is expected to play a dominant role and as such establish the presence of saturation and clarify the
27
+ kinematics in which it is the main QCD effect. Due to this fact it is imperative that the existing predictions for
28
+ saturation effects are made more precise by calculating higher orders in αs corrections.
29
+ Next to leading order calculations for many processes using the Color Glass Condensate effective theory of QCD
30
+ at small x have recently become available [45–56]. In a recent paper [52] we calculated the one-loop corrections to
31
+ inclusive dihadron production in DIS at small x for the case when the exchanged virtual photon is longitudinal. In this
32
+ work we extend our studies of this process and calculate dihadron production in DIS with transverse photon echange.
33
+ As the calculational methods are identical to our earlier work we will skip a lot of the details of the calculation and refer
34
+ the reader to [52]. As before there are several divergences that appear at the next to leading order. All divergences
35
+ either cancel or can be absorbed into evolution of physical quantities. Our final results are then completely finite and
36
+ can be used to calculate inclusive dihadron production and angular correlations in DIS at small x.
37
+ In the small x limit of DIS the virtual photon (transverse or longitudinal) splits into a quark antiquark pair (a
38
+ dipole), which then multiply scatters from the target hadron or nucleus. To leading order (LO) accuracy the double
39
+ inclusive production cross section can be written as
40
+ dσγ∗A→q¯qX
41
+ d2p d2q dy1 dy2
42
+ = e2Q2(z1z2)2Nc
43
+ (2π)7
44
+ δ(1 − z1 − z2)
45
+
46
+ d8x [S122′1′ − S12 − S1′2′ + 1]
47
+ eip·(x′
48
+ 1−x1)eiq·(x′
49
+ 2−x2)
50
+
51
+ 4z1z2K0(|x12|Q1)K0(|x1′2′|Q1) +
52
+ (z2
53
+ 1 + z2
54
+ 2) x12 · x1′2′
55
+ |x12||x1′2′| K1(|x12|Q1)K1(|x1′2′|Q1)
56
+
57
+ .
58
+ (1)
59
+ where the first and second terms in the curly bracket above correspond to the contribution of the longitudinal and
60
+ transverse polarizations of the virtual photon.
61
+ The production cross section is a convolution of the probability
62
+ ∗ fbergabo@gradcenter.cuny.edu
63
+ † jamal.jalilian-marian@baruch.cuny.edu
64
+ arXiv:2301.03117v1 [hep-ph] 8 Jan 2023
65
+
66
+ 2
67
+ for a photon to split into a quark at transverse position x1 and an anti-quark at position x2 represented by the
68
+ Bessel functions, with the probability for this quark antiquark pair to scatter from the target encoded in the dipoles
69
+ Sij and quadrupoles Sijkl. The virtual photon has momentum lµ with l2 = −Q2 and we have set the transverse
70
+ momentum of the photon to zero without any loss of generality.
71
+ Furthermore pµ (qµ) is the momentum of the
72
+ outgoing quark (antiquark) and z1 (z2) is its longitudinal momentum fraction relative to the photon. x1 (x2) is the
73
+ transverse coordinate of the quark (antiquark), and primed coordinates are used in the conjugate amplitude. Quark
74
+ and antiquark rapidities y1 and y2 are related to their momentum fractions z1 and z2 via dyi = dzi/zi. For convenience
75
+ we also define and use the following shorthand notations:
76
+ Qi = Q
77
+
78
+ zi(1 − zi),
79
+ xij = xi − xj,
80
+ d8x = d2x1 d2x2 d2x1′ d2x2′.
81
+ (2)
82
+ Dipoles Sij and quadrupoles Sijkl are normalized correlation functions of two and four Wilson lines defined as
83
+ Sij = 1
84
+ Nc
85
+ tr
86
+
87
+ ViV †
88
+ j
89
+
90
+ ,
91
+ Sijkl = 1
92
+ Nc
93
+ tr
94
+
95
+ ViV †
96
+ j VkV †
97
+ l
98
+
99
+ ,
100
+ (3)
101
+ which contain the full dynamics of gluon saturation. Here index i refers to the transverse coordinate xi and we use
102
+ the following notation for Wilson lines
103
+ Vi = ˆP exp
104
+
105
+ ig
106
+
107
+ dx+A−(x+, xi)
108
+
109
+ ,
110
+ (4)
111
+ which resum the multiple scatterings of the quark and antiquark from the target hadron or nucleus.
112
+ S
113
+ II.
114
+ ONE-LOOP CORRECTIONS
115
+ In [47, 48, 51, 52, 55] spinor helicity formalism was used to calculate the contribution of real diagrams to next to
116
+ leading order corrections to the leading order results. The real corrections are shown in Fig. (1) and involve radiation
117
+ of a gluon either by the quark or antiquark before they scatter from the target in which case the gluon also scatters
118
+ from the target [57–59], or after they scatter from the target in which case the radiated gluon does not scatter from
119
+ the target,
120
+ l
121
+ p
122
+ q
123
+ k1
124
+ l − k1
125
+ a
126
+ k
127
+ iAa
128
+ 1
129
+ l
130
+ p
131
+ k
132
+ k1
133
+ l − k1
134
+ q
135
+ a
136
+ iAa
137
+ 2
138
+ l
139
+ p
140
+ q
141
+ k1
142
+ l − k1
143
+ a
144
+ k
145
+ k2
146
+ k1 − k2
147
+ iAa
148
+ 3
149
+ l
150
+ l − k1
151
+ k1
152
+ k2
153
+ k1 − k2
154
+ k
155
+ a
156
+ p
157
+ q
158
+ iAa
159
+ 4
160
+ FIG. 1: The real corrections iAa
161
+ 1, ..., iAa
162
+ 4. The arrows on Fermion lines indicate Fermion number flow, all momenta
163
+ flow to the right. The thick solid line indicates interaction with the target.
164
+
165
+ 3
166
+ The virtual corrections are shown in figure 2 and involve radiation of a gluon by either quark or antiquark which
167
+ is then absorbed by the quark or antiquark line still in the amplitude [52, 55],
168
+ l
169
+ p
170
+ q
171
+ l − k1
172
+ k1
173
+ k2
174
+ k3
175
+ k3 − p
176
+ k2 − k1
177
+ iA5
178
+ l
179
+ p
180
+ l − k1
181
+ iA6
182
+ k1
183
+ k2
184
+ k3
185
+ k3 − q
186
+ k2 − k1
187
+ q
188
+ l
189
+ p
190
+ q
191
+ iA7
192
+ l − k1
193
+ k1
194
+ k3
195
+ k3 − p
196
+ k2
197
+ k2 − k1
198
+ l
199
+ p
200
+ q
201
+ k1
202
+ l − k1
203
+ iA8
204
+ k2
205
+ k3 − q
206
+ k2 − k1
207
+ k3
208
+ l
209
+ p
210
+ q
211
+ l − k1
212
+ k1
213
+ iA9
214
+ k2
215
+ k2 − p
216
+ l
217
+ p
218
+ q
219
+ k2
220
+ k2 − q
221
+ iA10
222
+ k1
223
+ l − k1
224
+ l
225
+ p
226
+ q
227
+ l − k1
228
+ k1
229
+ iA11
230
+ k2
231
+ k2 − k1
232
+ l
233
+ p
234
+ l − k1
235
+ q
236
+ k1
237
+ k2 − k1
238
+ k2
239
+ iA12
240
+ l
241
+ p
242
+ q
243
+ k1
244
+ l − k1
245
+ iA13
246
+ k2 + p
247
+ k2
248
+ q − k2
249
+ l
250
+ p
251
+ q
252
+ k1
253
+ l − k1
254
+ iA14
255
+ k2
256
+ k1 − k2
257
+ l − k2
258
+ FIG. 2: The ten virtual NLO diagrams iA5, ..., iA14. The arrows on fermion lines indicate fermion number flow, all
259
+ momenta flow to the right, except for gluon momenta. The thick solid line indicates interaction with the target.
260
+ We refer the reader to [52] for the explicit expressions for the amplitudes for real and virtual corrections given by
261
+ eqs. (5) and (8 − 14) respectively, and eqs. (6) and (14 − 19) for the Dirac numerators. In this study, we focus on the
262
+ contribution from transversely polarized photons and we compute the numerators using the spinor helicity formalism.
263
+ The needed real numerators are in table I and the virtual numerators are in Eq. 5 - 15.
264
+
265
+ 4
266
+ A.
267
+ Dirac numerators for real diagrams
268
+ Numerator λγ; λq, λg N
269
+ λγ;λq,λg
270
+ i
271
+ N1
272
+ +; +, +
273
+ −(z1)3/2√z2(1 − z2) [(z1k−z3p)·ϵ]
274
+ (z1k−z3p)2 (k1 · ϵ)
275
+ +; +, −
276
+ −√z1z2(1 − z2)2 [(z1k−z3p)·ϵ∗]
277
+ (z1k−z3p)2
278
+ (k1 · ϵ)
279
+ +; −, +
280
+ (z2)3/2√z1(1 − z2) [(z1k−z3p)·ϵ]
281
+ (z1k−z3p)2 (k1 · ϵ)
282
+ +, −, −
283
+ (z1z2)3/2 [(z1k−z3p)·ϵ∗]
284
+ (z1k−z3p)2
285
+ (k1 · ϵ)
286
+ N2
287
+ +; +, +
288
+ −(z1)3/2√z2(1 − z1) [(z2k−z3q)·ϵ]
289
+ (z2k−z3q)2 (k1 · ϵ)
290
+ +; +, −
291
+ −(z1z2)3/2 [(z2k−z3q)·ϵ∗]
292
+ (z2k−z3q)2
293
+ (k1 · ϵ)
294
+ +; −, +
295
+ (z2)3/2√z1(1 − z1) [(z2k−z3q)·ϵ]
296
+ (z2k−z3q)2 (k1 · ϵ)
297
+ +, −, −
298
+ √z1z2(1 − z1)2 [(z2k−z3q)·ϵ∗]
299
+ (z2k−z3q)2
300
+ (k1 · ϵ)
301
+ N3
302
+ +; +, +
303
+ (z1)3/2√z2(1 − z2)
304
+
305
+ k2·ϵ
306
+ z3 − k1·ϵ
307
+ 1−z2
308
+
309
+ k1 · ϵ
310
+ +; +, −
311
+ √z1z2(1 − z2)2 �
312
+ k2·ϵ∗
313
+ z3
314
+ − k1·ϵ∗
315
+ 1−z2
316
+
317
+ k1 · ϵ
318
+ +; −, +
319
+ −(z2)3/2√z1(1 − z2)
320
+
321
+ k2·ϵ
322
+ z3 − k1·ϵ
323
+ 1−z2
324
+
325
+ k1 · ϵ
326
+ +, −, −
327
+ −(z1z2)3/2 ��
328
+ k2·ϵ∗
329
+ z3
330
+
331
+ k1·ϵ∗
332
+ (1−z2)
333
+
334
+ k1 · ϵ +
335
+ k2
336
+ 1+z2(1−z2)Q2
337
+ 2z2(1−z2)
338
+
339
+ N4
340
+ +; +, +
341
+ (z1)3/2√z2(1 − z1)
342
+
343
+ k2·ϵ
344
+ z3 − k1·ϵ
345
+ 1−z1
346
+
347
+ k1 · ϵ
348
+ +; +, −
349
+ (z1z2)3/2 ��
350
+ k2·ϵ∗
351
+ z3
352
+
353
+ k1·ϵ∗
354
+ (1−z1)
355
+
356
+ k1 · ϵ +
357
+ k2
358
+ 1+z1(1−z1)Q2
359
+ 2z1(1−z1)
360
+
361
+ +; −, +
362
+ −(z2)3/2√z1(1 − z1)
363
+
364
+ k2·ϵ
365
+ z3 − k1·ϵ
366
+ 1−z1
367
+
368
+ k1 · ϵ
369
+ +, −, −
370
+ −√z1z2(1 − z1)2 �
371
+ k2·ϵ∗
372
+ z3
373
+ − k1·ϵ∗
374
+ 1−z1
375
+
376
+ k1 · ϵ
377
+ TABLE I: The minimal set of transverse photon numerators N1 to N4 in momentum fraction notation. Complex
378
+ conjugation results in the numerator with all helicities flipped (while leaving longitudinal helicities unchanged), and
379
+ any numerator where λq = λ¯q is zero.
380
+ N +;+
381
+ 5
382
+ =25(l+)2z3/2
383
+ 1
384
+ √z2
385
+ (z1 − z3)2
386
+
387
+ z2
388
+ 1
389
+ ��
390
+ k3 − z3
391
+ z1
392
+ p
393
+
394
+ · ϵ
395
+ � ��
396
+ k2 − z3
397
+ z1
398
+ k1
399
+
400
+ · ϵ∗
401
+
402
+ + z2
403
+ 3
404
+ ��
405
+ k3 − z3
406
+ z1
407
+ p
408
+
409
+ · ϵ���
410
+ � ��
411
+ k2 − z3
412
+ z1
413
+ k1
414
+
415
+ · ϵ
416
+ � �
417
+ k1 · ϵ,
418
+ N +;−
419
+ 5
420
+ =−25(l+)2z3/2
421
+ 2
422
+ √z1
423
+ (z1 − z3)2
424
+
425
+ z2
426
+ 1
427
+ ��
428
+ k3 − z3
429
+ z1
430
+ p
431
+
432
+ · ϵ∗
433
+ � ��
434
+ k2 − z3
435
+ z1
436
+ k1
437
+
438
+ · ϵ
439
+
440
+ + z2
441
+ 3
442
+ ��
443
+ k3 − z3
444
+ z1
445
+ p
446
+
447
+ · ϵ
448
+ � ��
449
+ k2 − z3
450
+ z1
451
+ k1
452
+
453
+ · ϵ∗
454
+ � �
455
+ k1 · ϵ
456
+ + 24(l+)2√z2z2
457
+ 3
458
+ √z1(z1 − z3) [k2
459
+ 1 + z1z2Q2]
460
+
461
+ k3 − z3
462
+ z1
463
+ p
464
+
465
+ · ϵ,
466
+ (5)
467
+ N +;+
468
+ 6
469
+ =25(l+)2z3/2
470
+ 1
471
+ √z2
472
+ (z2 − z3)2
473
+
474
+ z2
475
+ 3
476
+ ��
477
+ k3 − z3
478
+ z2
479
+ q
480
+
481
+ · ϵ
482
+ � ��
483
+ k2 − z3
484
+ z2
485
+ k1
486
+
487
+ · ϵ∗
488
+
489
+ + z2
490
+ 2
491
+ ��
492
+ k3 − z3
493
+ z2
494
+ q
495
+
496
+ · ϵ∗
497
+ � ��
498
+ k2 − z3
499
+ z2
500
+ k1
501
+
502
+ · ϵ
503
+ � �
504
+ k1 · ϵ
505
+ − 24(l+)2√z1z2
506
+ 3
507
+ √z2(z2 − z3) [k2
508
+ 1 + z1z2Q2]
509
+
510
+ k3 − z3
511
+ z2
512
+ q
513
+
514
+ · ϵ,
515
+ N +;−
516
+ 6
517
+ =−25(l+)2z3/2
518
+ 2
519
+ √z1
520
+ (z2 − z3)2
521
+
522
+ z2
523
+ 3
524
+ ��
525
+ k3 − z3
526
+ z2
527
+ q
528
+
529
+ · ϵ∗
530
+ � ��
531
+ k2 − z3
532
+ z2
533
+ k1
534
+
535
+ · ϵ
536
+
537
+ + z2
538
+ 2
539
+ ��
540
+ k3 − z3
541
+ z2
542
+ q
543
+
544
+ · ϵ
545
+ � ��
546
+ k2 − z3
547
+ z2
548
+ k1
549
+
550
+ · ϵ∗
551
+ � �
552
+ k1 · ϵ
553
+ (6)
554
+
555
+ 5
556
+ N +;+
557
+ 7
558
+ = −25(l+)2z3√z1z2
559
+ (1 − z3)(z1 − z3)2
560
+
561
+ z1z2
562
+ ��
563
+ k3 − z3
564
+ z1
565
+ p
566
+
567
+ · ϵ
568
+ � ��
569
+ z2k1 − (1 − z3)k2
570
+
571
+ · ϵ∗�
572
+ + z3(1 − z3)
573
+ ��
574
+ k3 − z3
575
+ z1
576
+ p
577
+
578
+ · ϵ∗
579
+ � ��
580
+ z2k1 − (1 − z3)k2
581
+
582
+ · ϵ
583
+ ��
584
+ k1 · ϵ
585
+ − 24(l+)2(z1z2)3/2
586
+ (z1 − z3)(1 − z3)
587
+
588
+ k2
589
+ 1 + z3(1 − z3)Q2� ��
590
+ k3 − z3
591
+ z1
592
+ p
593
+
594
+ · ϵ
595
+
596
+ ,
597
+ N +;−
598
+ 7
599
+ =25(l+)2√z1z2
600
+ (z1 − z3)2
601
+
602
+ z1z2
603
+ ��
604
+ k3 − z3
605
+ z1
606
+ p
607
+
608
+ · ϵ∗
609
+ � ��
610
+ z2k1 − (1 − z3)k2
611
+
612
+ · ϵ
613
+
614
+ + z3(1 − z3)
615
+ ��
616
+ k3 − z3
617
+ z1
618
+ p
619
+
620
+ · ϵ
621
+ � ��
622
+ z2k1 − (1 − z3)k2
623
+
624
+ · ϵ∗��
625
+ k1 · ϵ,
626
+ (7)
627
+ N +;+
628
+ 8
629
+ =−25(l+)2√z1z2
630
+ (z2 − z3)2
631
+
632
+ z3(1 − z3)
633
+ ��
634
+ k3 − z3
635
+ z2
636
+ q
637
+
638
+ · ϵ
639
+ � ��
640
+ z1k1 − (1 − z3)k2
641
+
642
+ · ϵ∗�
643
+ + z1z2
644
+ ��
645
+ k3 − z3
646
+ z2
647
+ q
648
+
649
+ · ϵ∗
650
+ � ��
651
+ z1k1 − (1 − z3)k2
652
+
653
+ · ϵ
654
+ ��
655
+ k1 · ϵ,
656
+ N +;−
657
+ 8
658
+ = 25(l+)2z3√z1z2
659
+ (1 − z3)(z2 − z3)2
660
+
661
+ z3(1 − z3)
662
+ ��
663
+ k3 − z3
664
+ z2
665
+ q
666
+
667
+ · ϵ∗
668
+ � ��
669
+ z1k1 − (1 − z3)k2
670
+
671
+ · ϵ
672
+
673
+ + z1z2
674
+ ��
675
+ k3 − z3
676
+ z2
677
+ q
678
+
679
+ · ϵ
680
+ � ��
681
+ z1k1 − (1 − z3)k2
682
+
683
+ · ϵ∗��
684
+ k1 · ϵ.
685
+ + 24(l+)2(z1z2)3/2
686
+ (z2 − z3)(1 − z3)
687
+
688
+ k2
689
+ 1 + z3(1 − z3)Q2� ��
690
+ k3 − z3
691
+ z2
692
+ q
693
+
694
+ · ϵ
695
+
696
+ ,
697
+ (8)
698
+ N +;+
699
+ 9
700
+ =24(l+)2z3/2
701
+ 1
702
+ √z2
703
+
704
+ k2
705
+ 2 + (2z1 − z)
706
+ z
707
+ (k2 − p)2 − [z2
708
+ 1 + (z1 − z)2]
709
+ z1z
710
+ p2
711
+
712
+ k1 · ϵ,
713
+ N +;+
714
+ 9
715
+ = − 24(l+)2z3/2
716
+ 2
717
+ √z1
718
+
719
+ k2
720
+ 2 + (2z1 − z)
721
+ z
722
+ (k2 − p)2 − [z2
723
+ 1 + (z1 − z)2]
724
+ z1z
725
+ p2
726
+
727
+ k1 · ϵ,
728
+ (9)
729
+ N +;+
730
+ 10
731
+ = − 24(l+)2z3/2
732
+ 1
733
+ √z2
734
+
735
+ k2
736
+ 2 + (2z2 − z)
737
+ z
738
+ (k2 − q)2 − [z2
739
+ 2 + (z2 − z)2]
740
+ z2z
741
+ q2
742
+
743
+ k1 · ϵ,
744
+ N +;−
745
+ 10
746
+ =24(l+)2z3/2
747
+ 2
748
+ √z1
749
+
750
+ k2
751
+ 2 + (2z2 − z)
752
+ z
753
+ (k2 − q)2 − [z2
754
+ 2 + (z2 − z)2]
755
+ z2z
756
+ q2
757
+
758
+ k1 · ϵ,
759
+ (10)
760
+ N +;+
761
+ 11
762
+ =24(l+)2z3/2
763
+ 1
764
+ √z2
765
+ ��
766
+ (k+
767
+ 2 )2 + (p+)2�
768
+ p+(k+
769
+ 2 − p+) k2
770
+ 1 + (p+ + k+
771
+ 2 )
772
+ (p+ − k+
773
+ 2 )k2
774
+ 2 + (k1 − k2)2
775
+
776
+ k1 · ϵ,
777
+ N +;−
778
+ 11
779
+ = − 24(l+)2z3/2
780
+ 2
781
+ √z1
782
+ ��
783
+ (k+
784
+ 2 )2 + (p+)2�
785
+ p+(k+
786
+ 2 − p+) k2
787
+ 1 + (p+ + k+
788
+ 2 )
789
+ (p+ − k+
790
+ 2 )k2
791
+ 2 + (k1 − k2)2
792
+
793
+ k1 · ϵ
794
+ − 24z3/2
795
+ 2
796
+ z3(l+)2
797
+ √z1(z1 − z3) k2
798
+ 1(z3k1 − z1k2) · ϵ,
799
+ (11)
800
+
801
+ 6
802
+ N +;+
803
+ 12
804
+ =24(l+)2z3/2
805
+ 1
806
+ √z2
807
+ ��
808
+ (k+
809
+ 2 )2 + (q+)2�
810
+ q+(k+
811
+ 2 − q+)
812
+ k2
813
+ 1 + (q+ + k+
814
+ 2 )
815
+ (q+ − k+
816
+ 2 )k2
817
+ 2 + (k1 − k2)2
818
+
819
+ k1 · ϵ
820
+ + 24(l+)2z3/2
821
+ 1
822
+ z3
823
+ √z2(z2 − z3) k2
824
+ 1(z3k1 − z2k2) · ϵ,
825
+ N +;+
826
+ 12
827
+ = − 24(l+)2z3/2
828
+ 2
829
+ √z1
830
+ ��
831
+ (k+
832
+ 2 )2 + (q+)2�
833
+ q+(k+
834
+ 2 − q+)
835
+ k2
836
+ 1 + (q+ + k+
837
+ 2 )
838
+ (q+ − k+
839
+ 2 )k2
840
+ 2 + (k1 − k2)2
841
+
842
+ k1 · ϵ,
843
+ (12)
844
+ N +;+
845
+ 13
846
+ = 25(l+)2(z1 + z)√z1z2
847
+
848
+ z1z
849
+ �p · ϵ
850
+ z1
851
+ − q · ϵ
852
+ z2
853
+ � �p · ϵ∗
854
+ z1
855
+ − k2 · ϵ∗
856
+ z
857
+
858
+ + z2
859
+ �k2 · ϵ
860
+ z
861
+ − q · ϵ
862
+ z2
863
+ � �p · ϵ∗
864
+ z1
865
+ − k2 · ϵ∗
866
+ z
867
+
868
+ − z2z
869
+ �k2 · ϵ
870
+ z
871
+ − q · ϵ
872
+ z2
873
+ � �p · ϵ∗
874
+ z1
875
+ − q · ϵ∗
876
+ z2
877
+
878
+ − p · q − (z1 + z)
879
+ 2z
880
+ (k2 − q)2 + (z2 − z)
881
+ 2z
882
+ (k2 + p)2
883
+
884
+ k1 · ϵ,
885
+ N +;−
886
+ 13
887
+ = −25(l+)2(z2 − z)√z1z2
888
+
889
+ z1z
890
+ �p · ϵ∗
891
+ z1
892
+ − q · ϵ∗
893
+ z2
894
+ � �p · ϵ
895
+ z1
896
+ − k2 · ϵ
897
+ z
898
+
899
+ + z2
900
+ �k2 · ϵ∗
901
+ z
902
+ − q · ϵ∗
903
+ z2
904
+ � �p · ϵ
905
+ z1
906
+ − k2 · ϵ
907
+ z
908
+
909
+ − z2z
910
+ �k2 · ϵ∗
911
+ z
912
+ − q · ϵ∗
913
+ z2
914
+ � �p · ϵ
915
+ z1
916
+ − q · ϵ
917
+ z2
918
+
919
+ − p · q − (z1 + z)
920
+ 2z
921
+ (k2 − q)2 + (z2 − z)
922
+ 2z
923
+ (k2 + p)2
924
+
925
+ k1 · ϵ,
926
+ (13)
927
+ N +;+
928
+ 14(1) = −25(l+)2√z1z2
929
+ (1 − z3)(z1 − z3)
930
+
931
+ z1z2
932
+ 2
933
+
934
+ k2
935
+ 1 + z3(1 − z3)Q2�
936
+ + z3(1 − z3)
937
+ 2
938
+
939
+ k2
940
+ 2 + z1z2Q2�
941
+ + (z1 − z3)
942
+ ��
943
+ z2k1 + z3k2
944
+
945
+ · ϵ
946
+ ���
947
+ z1k1 + (1 − z3)k2
948
+
949
+ · ϵ∗��
950
+ k1 · ϵ
951
+ +
952
+ 24(l+)2(z1z2)3/2
953
+ z3(z1 − z3)(1 − z3)[k2
954
+ 1 + z3(1 − z3)Q2](z1k1 − z3k2) · ϵ,
955
+ N +;−
956
+ 14(1) =25(l+)2√z1z2
957
+ z3(z1 − z3)
958
+
959
+ z1z2
960
+ 2
961
+
962
+ k2
963
+ 1 + z3(1 − z3)Q2�
964
+ + z3(1 − z3)
965
+ 2
966
+
967
+ k2
968
+ 2 + z1z2Q2�
969
+ + (z1 − z3)
970
+ ��
971
+ z2k1 + z3k2
972
+
973
+ · ϵ∗���
974
+ z1k1 + (1 − z3)k2
975
+
976
+ · ϵ
977
+ ��
978
+ k1 · ϵ,
979
+ N +;+
980
+ 14(2) = −25(l+)2√z1z2
981
+ (1 − z3)(z3 − z1)
982
+
983
+ z1z2
984
+ 2
985
+
986
+ k2
987
+ 1 + z3(1 − z3)Q2�
988
+ + z3(1 − z3)
989
+ 2
990
+
991
+ k2
992
+ 2 + z1z2Q2�
993
+ + (z3 − z1)
994
+ ��
995
+ z2k1 + z3k2
996
+
997
+ · ϵ
998
+ ���
999
+ z1k1 + (1 − z3)k2
1000
+
1001
+ · ϵ∗��
1002
+ k1 · ϵ,
1003
+ (14)
1004
+ N +;−
1005
+ 14(2) =25(l+)2√z1z2
1006
+ z3(z3 − z1)
1007
+
1008
+ z1z2
1009
+ 2
1010
+
1011
+ k2
1012
+ 1 + z3(1 − z3)Q2�
1013
+ + z3(1 − z3)
1014
+ 2
1015
+
1016
+ k2
1017
+ 2 + z1z2Q2�
1018
+ + (z3 − z1)
1019
+ ��
1020
+ z2k1 + z3k2
1021
+
1022
+ · ϵ∗���
1023
+ z1k1 + (1 − z3)k2
1024
+
1025
+ · ϵ
1026
+ ��
1027
+ k1 · ϵ
1028
+ +
1029
+ 24(l+)2(z1z2)3/2
1030
+ z3(z1 − z3)(1 − z3)[k2
1031
+ 1 + z3(1 − z3)Q2](z2k1 − (1 − z3)k2) · ϵ.
1032
+ (15)
1033
+ In all these expressions, the momentum fractions z and z3 are all defined in the same was as in [52].
1034
+
1035
+ 7
1036
+ III.
1037
+ RESULTS
1038
+ To calculate the O(αs) corrections to the production cross section we need to multiply the helicity amplitudes with
1039
+ the corresponding conjugate amplitudes. We’ll write the real corrections as σi×j for i, j = 1, ..., 4 and the virtual
1040
+ corrections as σi for i = 5, ..., 14. The details are shown in [52] and here we just show the final results. The T label
1041
+ signifies that we are including contributions only from transversely polarized photons, and imply that we have summed
1042
+ over all outgoing polarizations. Furthermore and for the sake of brevity here we omit a factor of δ(1 − z1 − z2 − z)
1043
+ in the real corrections and δ(1 − z1 − z2) in the virtual corrections and restore them at the end. In many cases, it is
1044
+ easiest to write the results in coordinate space with the radiation kernel ∆(3)
1045
+ ij defined as follows.
1046
+ ∆(3)
1047
+ ij = x3i · x3j
1048
+ x2
1049
+ 3ix2
1050
+ 3j
1051
+ .
1052
+ (16)
1053
+ The next to leading order corrections are then,
1054
+ dσT
1055
+ 1×1
1056
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1057
+ c z2
1058
+ 2(1 − z2)[z2
1059
+ 1z2
1060
+ 2 + (z2
1061
+ 1 + z2
1062
+ 2)(1 − z2)2 + (1 − z2)4]
1063
+ 2(2π)10z1
1064
+ � dz
1065
+ z
1066
+
1067
+ d10x[S122′1′ − S12 − S1′2′ + 1]
1068
+ eip·x1′1eiq·x2′2K1(|x12|Q2)K1(|x1′2′|Q2) x12 · x1′2′
1069
+ |x12||x1′2′|e
1070
+ i z
1071
+ z1 p·x1′1∆(3)
1072
+ 1′1.
1073
+ (17)
1074
+ dσT
1075
+ 2×2
1076
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1077
+ c z2
1078
+ 1(1 − z1)[z2
1079
+ 1z2
1080
+ 2 + (z2
1081
+ 1 + z2
1082
+ 2)(1 − z1)2 + (1 − z1)4]
1083
+ 2(2π)10z2
1084
+ � dz
1085
+ z
1086
+
1087
+ d10x[S122′1′ − S12 − S1′2′ + 1]
1088
+ eip·x1′1eiq·x2′2K1(|x12|Q1)K1(|x1′2′|Q1) x12 · x1′2′
1089
+ |x12||x1′2′|e
1090
+ i z
1091
+ z2 q·x2′1∆(3)
1092
+ 2′2.
1093
+ (18)
1094
+ dσT
1095
+ 1×2
1096
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1097
+ c
1098
+
1099
+ z1z2(1 − z1)(1 − z2)
1100
+ 2(2π)10
1101
+ � dz
1102
+ z
1103
+
1104
+ d10x[S12S1′2′ − S12 − S1′2′ + 1]eip·x1′1eiq·x2′2
1105
+ K1(|x12|Q2)K1(|x1′2′|Q1)4 Re
1106
+
1107
+ (x12 · ϵ)(x1′2′ · ϵ∗)
1108
+ |x12||x1′2′|
1109
+
1110
+ (z2
1111
+ 1 + z2
1112
+ 2)(1 − z1)(1 − z2)(x31 · ϵ)(x2′3 · ϵ∗)
1113
+ x2
1114
+ 31x2
1115
+ 2′3
1116
+ + z1z2((1 − z1)2 + (1 − z2)2)(x31 · ϵ∗)(x2′3 · ϵ)
1117
+ x2
1118
+ 31x2
1119
+ 2′3
1120
+ ��
1121
+ e
1122
+ i z
1123
+ z1 p·x31e
1124
+ i z
1125
+ z2 q·x2′3.
1126
+ (19)
1127
+ dσT
1128
+ 3×3
1129
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1130
+ c z1z3
1131
+ 2
1132
+ 2(2π)10
1133
+ � dz
1134
+ z
1135
+
1136
+ d10x[S11′S22′ − S13S23 − S1′3S2′3 + 1]eip·x1′1eiq·x2′2
1137
+ K1(QX)K1(QX′)
1138
+ XX′
1139
+ 4 Re
1140
+
1141
+ (z2
1142
+ 1 + z2
1143
+ 2)(x31 · ϵ)(x31′ · ϵ∗)
1144
+ x2
1145
+ 31x2
1146
+ 31′
1147
+ [(z1x12 + zx32) · ϵ][(z1x1′2′ + zx32′) · ϵ∗]
1148
+ +
1149
+
1150
+ (1 − z2)2 + (z1z2)2
1151
+ (1 − z2)2
1152
+ � (x31 · ϵ∗)(x31′ · ϵ)
1153
+ x2
1154
+ 31x2
1155
+ 31′
1156
+ [(z1x12 + zx32) · ϵ][(z1x1′2′ + zx32′) · ϵ∗]
1157
+
1158
+ z2
1159
+ 1z2z
1160
+ 2(1 − z2)2
1161
+ �(x31 · ϵ∗)
1162
+ x2
1163
+ 31
1164
+ [(z1x12 + zx32) · ϵ] + (x31′ · ϵ)
1165
+ x2
1166
+ 31′
1167
+ [(z1x1′2′ + zx32′) · ϵ∗]
1168
+
1169
+ +
1170
+ z2
1171
+ 1z2
1172
+ 4(1 − z2)2
1173
+
1174
+ .
1175
+ (20)
1176
+ dσT
1177
+ 4×4
1178
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1179
+ c z2z3
1180
+ 1
1181
+ 2(2π)10
1182
+ � dz
1183
+ z
1184
+
1185
+ d10x[S11′S22′ − S13S23 − S1′3S2′3 + 1]eip·x1′1eiq·x2′2
1186
+ K1(QX)K1(QX′)
1187
+ XX′
1188
+ 4 Re
1189
+
1190
+ (z2
1191
+ 1 + z2
1192
+ 2)(x32 · ϵ)(x32′ · ϵ∗)
1193
+ x2
1194
+ 32x2
1195
+ 32′
1196
+ [(z2x21 + zx31) · ϵ][(z2x2′1′ + zx31′) · ϵ∗]
1197
+ +
1198
+
1199
+ (1 − z1)2 + (z1z2)2
1200
+ (1 − z1)2
1201
+ � (x32 · ϵ∗)(x32′ · ϵ)
1202
+ x2
1203
+ 32x2
1204
+ 32′
1205
+ [(z2x21 + zx31) · ϵ][(z2x2′1′ + zx31′) · ϵ∗]
1206
+
1207
+ z2
1208
+ 2z1z
1209
+ 2(1 − z1)2
1210
+ �(x32 · ϵ∗)
1211
+ x2
1212
+ 32
1213
+ [(z2x21 + zx31) · ϵ] + (x32′ · ϵ)
1214
+ x2
1215
+ 32′
1216
+ [(z2x2′1′ + zx31′) · ϵ∗]
1217
+
1218
+ +
1219
+ z2
1220
+ 2z2
1221
+ 4(1 − z1)2
1222
+
1223
+ .
1224
+ (21)
1225
+ dσT
1226
+ 3×4
1227
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1228
+ c (z1z2)2
1229
+ 2(2π)10
1230
+ � dz
1231
+ z
1232
+
1233
+ d10x[S11′S22′ − S13S23 − S1′3S2′3 + 1]eip·x1′1eiq·x2′2
1234
+ K1(QX)K1(QX′)
1235
+ XX′
1236
+ 4 Re
1237
+
1238
+ (z2
1239
+ 1 + z2
1240
+ 2)(x31 · ϵ)(x32′ · ϵ∗)
1241
+ x2
1242
+ 31x2
1243
+ 32′
1244
+ [(z1x12 + zx32) · ϵ][(z2x2′1′ + zx31′) · ϵ∗]
1245
+ +
1246
+ z1z2
1247
+ (1 − z1)(1 − z2)[(1 − z1)2 + (1 − z2)2](x31 · ϵ∗)(x32′ · ϵ)
1248
+ x2
1249
+ 31x2
1250
+ 32′
1251
+ [(z1x12 + zx32) · ϵ][(z2x2′1′ + zx31′) · ϵ∗]
1252
+
1253
+ 8
1254
+ − z2z(1 − z2)
1255
+ 2(1 − z1)
1256
+ (x31 · ϵ∗)
1257
+ x2
1258
+ 31
1259
+ [(z1x12 + zx32) · ϵ] − z1z(1 − z1)
1260
+ 2(1 − z2)
1261
+ (x32′ · ϵ)
1262
+ x2
1263
+ 32′
1264
+ [(z2x2′1′ + zx31′) · ϵ∗]
1265
+
1266
+ .
1267
+ (22)
1268
+ dσT
1269
+ 1×3
1270
+ d2p d2q dy1 dy2 = −e2g2Q2N 2
1271
+ c z5/2
1272
+ 2
1273
+ √1 − z2
1274
+ 2(2π)10
1275
+ � dz
1276
+ z
1277
+
1278
+ d10x[S122′3S1′3 − S1′3S2′3 − S12 + 1]eip·x1′1eiq·x2′2
1279
+ K1(|x12|Q2)K1(QX′)
1280
+ X′
1281
+ 4 Re
1282
+
1283
+ (1 − z2)(z2
1284
+ 1 + z2
1285
+ 2)(x12 · ϵ)(x31′ · ϵ∗)
1286
+ |x12|x2
1287
+ 31′
1288
+ (x31 · ϵ)[(z1x1′2′ + zx32′) · ϵ∗]
1289
+ x2
1290
+ 31
1291
+ +
1292
+
1293
+ (1 − z2)3 + (z1z2)2
1294
+ 1 − z2
1295
+ � (x12 · ϵ)(x31′ · ϵ)
1296
+ |x12|x2
1297
+ 31′
1298
+ (x31 · ϵ∗)[(z1x1′2′ + zx32′) · ϵ∗]
1299
+ x2
1300
+ 31
1301
+
1302
+ z2
1303
+ 1z2z
1304
+ 2(1 − z2)
1305
+ (x12 · ϵ)
1306
+ |x12|
1307
+ (x31 · ϵ∗)
1308
+ x2
1309
+ 31
1310
+
1311
+ e
1312
+ i z
1313
+ z1 p·x31.
1314
+ (23)
1315
+ dσT
1316
+ 1×4
1317
+ d2p d2q dy1 dy2 = −e2g2Q2N 2
1318
+ c z1z3/2
1319
+ 2
1320
+ √1 − z2
1321
+ 2(2π)10
1322
+ � dz
1323
+ z
1324
+
1325
+ d10x[S122′3S1′3 − S1′3S2′3 − S12 + 1]eip·x1′1eiq·x2′2
1326
+ K1(|x12|Q2)K1(QX′)
1327
+ X′
1328
+ 4 Re
1329
+
1330
+ (1 − z2)(z2
1331
+ 1 + z2
1332
+ 2)(x12 · ϵ)(x32′ · ϵ∗)
1333
+ |x12|x2
1334
+ 32′
1335
+ (x31 · ϵ)[(z2x2′1′ + zx31′) · ϵ∗]
1336
+ x2
1337
+ 31
1338
+ + z1z2
1339
+ 1 − z1
1340
+
1341
+ (1 − z1)2 + (1 − z2)2� (x12 · ϵ)(x32′ · ϵ)
1342
+ |x12|x2
1343
+ 32′
1344
+ (x31 · ϵ∗)[(z2x2′1′ + zx31′) · ϵ∗]
1345
+ x2
1346
+ 31
1347
+ − z2z(1 − z2)2
1348
+ 2(1 − z1)
1349
+ (x12 · ϵ)
1350
+ |x12|
1351
+ (x31 · ϵ∗)
1352
+ x2
1353
+ 31
1354
+
1355
+ e
1356
+ i z
1357
+ z1 p·x31.
1358
+ (24)
1359
+ dσT
1360
+ 2×3
1361
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1362
+ c z2z3/2
1363
+ 1
1364
+ √1 − z1
1365
+ 2(2π)10
1366
+ � dz
1367
+ z
1368
+
1369
+ d10x[S1231′S2′3 − S1′3S2′3 − S12 + 1]eip·x1′1eiq·x2′2
1370
+ K1(|x12|Q1)K1(QX′)
1371
+ X′
1372
+ 4 Re
1373
+
1374
+ (1 − z1)(z2
1375
+ 1 + z2
1376
+ 2)(x12 · ϵ)(x31′ · ϵ∗)
1377
+ |x12|x2
1378
+ 31′
1379
+ (x32 · ϵ)[(z1x1′2′ + zx32′) · ϵ∗]
1380
+ x2
1381
+ 32
1382
+ + z1z2
1383
+ 1 − z2
1384
+
1385
+ (1 − z1)2 + (1 − z2)2� (x12 · ϵ)(x31′ · ϵ)
1386
+ |x12|x2
1387
+ 31′
1388
+ (x32 · ϵ∗)[(z1x1′2′ + zx32′) · ϵ∗]
1389
+ x2
1390
+ 32
1391
+ − z1z(1 − z1)2
1392
+ 2(1 − z2)
1393
+ (x12 · ϵ)
1394
+ |x12|
1395
+ (x32 · ϵ∗)
1396
+ x2
1397
+ 32
1398
+
1399
+ e
1400
+ i z
1401
+ z2 q·x32.
1402
+ (25)
1403
+ dσT
1404
+ 2×4
1405
+ d2p d2q dy1 dy2 = e2g2Q2N 2
1406
+ c z5/2
1407
+ 1
1408
+ √1 − z1
1409
+ 2(2π)10
1410
+ � dz
1411
+ z
1412
+
1413
+ d10x[S1231′S2′3 − S1′3S2′3 − S12 + 1]eip·x1′1eiq·x2′2
1414
+ K1(|x12|Q1)K1(QX′)
1415
+ X′
1416
+ 4 Re
1417
+
1418
+ (1 − z1)(z2
1419
+ 1 + z2
1420
+ 2)(x12 · ϵ)(x32′ · ϵ∗)
1421
+ |x12|x2
1422
+ 32′
1423
+ (x32 · ϵ)[(z2x2′1′ + zx31′) · ϵ∗]
1424
+ x2
1425
+ 32
1426
+ +
1427
+
1428
+ (1 − z1)3 + (z1z2)2
1429
+ 1 − z1
1430
+ � (x12 · ϵ)(x32′ · ϵ)
1431
+ |x12|x2
1432
+ 32′
1433
+ (x32 · ϵ∗)[(z2x2′1′ + zx31′) · ϵ∗]
1434
+ x2
1435
+ 32
1436
+
1437
+ z2
1438
+ 2z1z
1439
+ 2(1 − z1)
1440
+ (x12 · ϵ)
1441
+ |x12|
1442
+ (x32 · ϵ∗)
1443
+ x2
1444
+ 32
1445
+
1446
+ e
1447
+ i z
1448
+ z2 q·x32.
1449
+ (26)
1450
+ dσT
1451
+ 5
1452
+ d2p d2q dy1 dy2
1453
+ = e2g2Q2N 2
1454
+ c z5/2
1455
+ 2
1456
+ √z1
1457
+ 2(2π)10
1458
+ � z1
1459
+ 0
1460
+ dz
1461
+ z d10x [S322′1′S13 − S13S23 − S1′2′ + 1]
1462
+ K1(QX5)K1(|x1′2′|Q1)
1463
+ X5x2
1464
+ 31|x1′2′|
1465
+ eip·(x′
1466
+ 1−x1)eiq·(x′
1467
+ 2−x2)e−i z
1468
+ z1 p·(x3−x1)
1469
+ x1′2′ ·
1470
+
1471
+ (z2
1472
+ 1 + z2
1473
+ 2)(z2
1474
+ 1 + (z1 − z)2)x32 + (z1 − z)
1475
+
1476
+ z1(z2
1477
+ 1 + (z1 − z)2) + z2[z1z2 + (z1 − z)(z2 + z)]
1478
+
1479
+ x13
1480
+
1481
+ .
1482
+ (27)
1483
+ dσT
1484
+ 6
1485
+ d2p d2q dy1 dy2
1486
+ = −e2g2Q2N 2
1487
+ c z5/2
1488
+ 1
1489
+ √z2
1490
+ 2(2π)10
1491
+ � z2
1492
+ 0
1493
+ dz
1494
+ z d10x[S132′1′S23 − S13S23 − S1′2′ + 1]
1495
+ K1(QX6)K1(|x1′2′|)
1496
+ X6|x1′2′|x2
1497
+ 32
1498
+ eip·(x′
1499
+ 1−x1)eiq·(x′
1500
+ 2−x2)e−i z
1501
+ z2 q·(x3−x2)
1502
+ x1′2′ ·
1503
+
1504
+ (z2
1505
+ 1 + z2
1506
+ 2)(z2
1507
+ 2 + (z2 − z)2)x31 + (z2 − z)[z2(z2
1508
+ 2 + (z2 − z)2) + z1(z1z2 + (z2 − z)(z1 + z))]x23
1509
+
1510
+ .
1511
+ (28)
1512
+
1513
+ 9
1514
+ dσT
1515
+ 7
1516
+ d2p d2q dy1 dy2
1517
+ = e2g2Q2N 2
1518
+ c (z1z2)3/2
1519
+ 2(2π)10
1520
+ � z1
1521
+ 0
1522
+ dz (z1 − z)
1523
+ z
1524
+ d10x [S322′1′S13 − S13S23 − S1′2′ + 1]K1(QX5)K1(|x1′2′|Q1)
1525
+ X5x2
1526
+ 31|x1′2′|
1527
+
1528
+ 4 Re
1529
+ x2
1530
+ 32
1531
+
1532
+ (x1′2′ · ϵ∗)
1533
+ ��
1534
+ x31 +
1535
+ z2
1536
+ z2 + z x23
1537
+
1538
+ · ϵ
1539
+ � �
1540
+ z2(z1 − z)
1541
+ z1
1542
+
1543
+ z2
1544
+ 1 + (z2 + z)2�
1545
+ (x31 · ϵ)(x32 · ϵ∗)
1546
+ + (z2 + z)(z2
1547
+ 2 + (z1 − z)2)(x32 · ϵ)(x31 · ϵ∗)
1548
+ ��
1549
+ − z1z2z
1550
+ z2 + z x31 · x1′2′
1551
+
1552
+ eip·(x′
1553
+ 1−x1)eiq·(x′
1554
+ 2−x2)e−i z
1555
+ z1 p·(x3−x1).
1556
+ (29)
1557
+ dσT
1558
+ 8
1559
+ d2p d2q dy1 dy2
1560
+ = −e2g2Q2N 2
1561
+ c (z1z2)3/2
1562
+ 2(2π)10
1563
+ � z2
1564
+ 0
1565
+ dz (z2 − z)
1566
+ z
1567
+ d10x [S132′1′S23 − S13S23 − S1′2′ + 1]K1(QX6)K1(|x1′2′|Q1)
1568
+ X6|x1′2′|x2
1569
+ 32
1570
+
1571
+ 4 Re
1572
+ x2
1573
+ 31
1574
+
1575
+ (x1′2′ · ϵ∗)
1576
+ ��
1577
+ x32 +
1578
+ z1
1579
+ z1 + z x13
1580
+
1581
+ · ϵ
1582
+ � �
1583
+ (z1 + z)(z2
1584
+ 1 + (z2 − z)2)(x31 · ϵ)(x32 · ϵ∗)
1585
+ + z1(z2 − z)
1586
+ z2
1587
+
1588
+ z2
1589
+ 2 + (z1 + z)2�
1590
+ (x32 · ϵ)(x31 · ϵ∗)
1591
+ ��
1592
+ − z1z2z
1593
+ z1 + z x32 · x1′2′
1594
+
1595
+ eip·(x′
1596
+ 1−x1)eiq·(x′
1597
+ 2−x2)e−i z
1598
+ z2 q·(x3−x2).
1599
+ (30)
1600
+ dσT
1601
+ 9
1602
+ d2p d2q dy1 dy2
1603
+ =−e2g2Q2N 2
1604
+ c (z1z2)2(z2
1605
+ 1 + z2
1606
+ 2)
1607
+ 4(2π)8
1608
+
1609
+ d8x
1610
+
1611
+ S122′1′ − S12 − S1′2′ + 1
1612
+ � x12 · x1′2′
1613
+ |x12||x1′2′|K1(|x12|Q1)K1(|x1′2′|Q1)
1614
+ × eip·(x′
1615
+ 1−x1)eiq·(x′
1616
+ 2−x2)
1617
+ � z1
1618
+ 0
1619
+ dz
1620
+ z
1621
+ �z2
1622
+ 1 + (z1 − z)2
1623
+ z2
1624
+ 1
1625
+ � �
1626
+ d2k
1627
+ (2π)2
1628
+ 1
1629
+
1630
+ k − z
1631
+ z1 p
1632
+ �2 .
1633
+ (31)
1634
+ dσT
1635
+ 10
1636
+ d2p d2q dy1 dy2
1637
+ =−e2g2Q2N 2
1638
+ c (z1z2)2(z2
1639
+ 1 + z2
1640
+ 2)
1641
+ 4(2π)8
1642
+
1643
+ d8x
1644
+
1645
+ S122′1′ − S12 − S1′2′ + 1
1646
+ � x12 · x1′2′
1647
+ |x12||x1′2′|K1(|x12|Q1)K1(|x1′2′|Q1)
1648
+ × eip·(x′
1649
+ 1−x1)eiq·(x′
1650
+ 2−x2)
1651
+ � z2
1652
+ 0
1653
+ dz
1654
+ z
1655
+ �z2
1656
+ 2 + (z2 − z)2
1657
+ z2
1658
+ 2
1659
+ � �
1660
+ d2k
1661
+ (2π)2
1662
+ 1
1663
+
1664
+ k − z
1665
+ z2 q
1666
+ �2 .
1667
+ (32)
1668
+ dσT
1669
+ 11
1670
+ d2p d2q dy1 dy2
1671
+ = ie2g2QN 2
1672
+ c z3/2
1673
+ 2
1674
+ √z1(z2
1675
+ 1 + z2
1676
+ 2)
1677
+ 2(2π)7
1678
+
1679
+ d8x
1680
+
1681
+ S122′1′ − S12 − S1′2′ + 1
1682
+ �K1(|x1′2′|Q1)
1683
+ |x1′2′|
1684
+ eip·(x′
1685
+ 1−x1)eiq·(x′
1686
+ 2−x2)
1687
+ � z1
1688
+ 0
1689
+ dz
1690
+ z2
1691
+ [(z1 − z)2 + z2
1692
+ 1]
1693
+ (z1 − z)
1694
+
1695
+ d2k2
1696
+ (2π)2
1697
+
1698
+ d2k1
1699
+ (2π)2
1700
+ k1 · x1′2′ eik1·(x1−x2)
1701
+
1702
+ k2
1703
+ 1 + Q2
1704
+ 1
1705
+ � �
1706
+ Q2 +
1707
+ k2
1708
+ 1
1709
+ z1z2 +
1710
+ z1
1711
+ z(z1−z)k2
1712
+ 2
1713
+
1714
+ (33)
1715
+ dσT
1716
+ 12
1717
+ d2p d2q dy1 dy2
1718
+ = −ie2g2QN 2
1719
+ c z3/2
1720
+ 1
1721
+ √z2(z2
1722
+ 1 + z2
1723
+ 2)
1724
+ 2(2π)7
1725
+
1726
+ d8x
1727
+
1728
+ S122′1′ − S12 − S1′2��� + 1
1729
+ �K1(|x1′2′|Q1)
1730
+ |x1′2′|
1731
+ eip·(x′
1732
+ 1−x1)eiq·(x′
1733
+ 2−x2)
1734
+ � z2
1735
+ 0
1736
+ dz
1737
+ z2
1738
+ [(z2 − z)2 + z2
1739
+ 2]
1740
+ (z2 − z)
1741
+
1742
+ d2k2
1743
+ (2π)2
1744
+
1745
+ d2k1
1746
+ (2π)2
1747
+ k1 · x1′2′ eik1·(x2−x1)
1748
+
1749
+ k2
1750
+ 1 + Q2
1751
+ 1
1752
+ � �
1753
+ Q2 +
1754
+ k2
1755
+ 1
1756
+ z1z2 +
1757
+ z2
1758
+ z(z2−z)k2
1759
+ 2
1760
+
1761
+ (34)
1762
+
1763
+ 10
1764
+ dσT
1765
+ 13(1)
1766
+ d2p d2q dy1 dy2
1767
+ = e2g2Q2N 2
1768
+ c (z1z2)3/2
1769
+ 2(2π)8
1770
+ � z2
1771
+ 0
1772
+ dz
1773
+
1774
+ (z1 + z)(z2 − z)
1775
+
1776
+ d8x [S12S1′2′ − S12 − S1′2′ + 1]eip·x1′1eiq·x2′2
1777
+ K1
1778
+
1779
+ |x12|Q
1780
+
1781
+ (z1 + z)(z2 − z)
1782
+
1783
+ |x12|
1784
+ K1(|x1′2′|Q1)
1785
+ |x1′2′|
1786
+
1787
+ d2k
1788
+ (2π)2 eik·x214 Re
1789
+
1790
+ (x12 · ϵ)(x1′2′ · ϵ∗)
1791
+ � z2(z2−z)[z1(z1+z)+z2(z2−z)]
1792
+ 2z
1793
+ (z2k − zq)2
1794
+ + z1z2z
1795
+
1796
+
1797
+ z1z
1798
+
1799
+ p·ϵ
1800
+ z1 − q·ϵ
1801
+ z2
1802
+ � �
1803
+ p·ϵ∗
1804
+ z1 − k·ϵ∗
1805
+ z
1806
+
1807
+ + z2 �
1808
+ k·ϵ
1809
+ z − q·ϵ
1810
+ z2
1811
+ � �
1812
+ p·ϵ∗
1813
+ z1 − k·ϵ∗
1814
+ z
1815
+
1816
+ − z2z
1817
+
1818
+ k·ϵ
1819
+ z − q·ϵ
1820
+ z2
1821
+ � �
1822
+ p·ϵ∗
1823
+ z1 − q·ϵ∗
1824
+ z2
1825
+
1826
+ − p · q
1827
+ (z2k − zq)2
1828
+
1829
+ (z1k−zp)2
1830
+ z1(z1+z) − (z2k−zq)2
1831
+ z2(z2−z)
1832
+
1833
+
1834
+
1835
+ + z2
1836
+ 2z(z2 − z)
1837
+
1838
+
1839
+ z1z
1840
+
1841
+ p·ϵ∗
1842
+ z1 − q·ϵ∗
1843
+ z2
1844
+ � �
1845
+ p·ϵ
1846
+ z1 − k·ϵ
1847
+ z
1848
+
1849
+ + z2 �
1850
+ k·ϵ∗
1851
+ z
1852
+ − q·ϵ∗
1853
+ z2
1854
+ � �
1855
+ p·ϵ
1856
+ z1 − k·ϵ
1857
+ z
1858
+
1859
+ − z2z
1860
+
1861
+ k·ϵ∗
1862
+ z
1863
+ − q·ϵ∗
1864
+ z2
1865
+ � �
1866
+ p·ϵ
1867
+ z1 − q·ϵ
1868
+ z2
1869
+
1870
+ − p · q
1871
+ (z1 + z)(z2k − zq)2
1872
+
1873
+ (z1k−zp)2
1874
+ z1(z1+z) − (z2k−zq)2
1875
+ z2(z2−z)
1876
+
1877
+
1878
+
1879
+ ��
1880
+ .
1881
+ (35)
1882
+ dσT
1883
+ 13(2)
1884
+ d2p d2q dy1 dy2
1885
+ = e2g2Q2N 2
1886
+ c (z1z2)3/2
1887
+ 2(2π)8
1888
+ � z1
1889
+ 0
1890
+ dz
1891
+
1892
+ (z1 − z)(z2 + z)
1893
+
1894
+ d8x [S12S1′2′ − S12 − S1′2′ + 1]eip·x1′1eiq·x2′2
1895
+ K1
1896
+
1897
+ |x12|Q
1898
+
1899
+ (z1 − z)(z2 + z)
1900
+
1901
+ |x12|
1902
+ K1(|x1′2′|Q1)
1903
+ |x1′2′|
1904
+
1905
+ d2k
1906
+ (2π)2 eik·x124 Re
1907
+
1908
+ (x12 · ϵ)(x1′2′ · ϵ∗)
1909
+ � z1(z1−z)[z1(z1−z)+z2(z2+z)]
1910
+ 2z
1911
+ (z1k − zp)2
1912
+ + z1z2z
1913
+
1914
+
1915
+ z1z
1916
+
1917
+ p·ϵ∗
1918
+ z1 − q·ϵ∗
1919
+ z2
1920
+ � �
1921
+ p·ϵ
1922
+ z1 − k·ϵ
1923
+ z
1924
+
1925
+ − z2 �
1926
+ k·ϵ∗
1927
+ z
1928
+ − q·ϵ∗
1929
+ z2
1930
+ � �
1931
+ p·ϵ
1932
+ z1 − k·ϵ
1933
+ z
1934
+
1935
+ − z2z
1936
+
1937
+ k·ϵ∗
1938
+ z
1939
+ − q·ϵ∗
1940
+ z2
1941
+ � �
1942
+ p·ϵ
1943
+ z1 − q·ϵ
1944
+ z2
1945
+
1946
+ + p · q
1947
+ (z1k − zp)2
1948
+
1949
+ (z1k−zp)2
1950
+ z1(z1−z) − (z2k−zq)2
1951
+ z2(z2+z)
1952
+
1953
+
1954
+
1955
+ + z2
1956
+ 1z(z1 − z)
1957
+
1958
+
1959
+ z1z
1960
+
1961
+ p·ϵ
1962
+ z1 − q·ϵ
1963
+ z2
1964
+ � �
1965
+ p·ϵ∗
1966
+ z1 − k·ϵ∗
1967
+ z
1968
+
1969
+ − z2 �
1970
+ k·ϵ
1971
+ z − q·ϵ
1972
+ z2
1973
+ � �
1974
+ p·ϵ∗
1975
+ z1 − k·ϵ∗
1976
+ z
1977
+
1978
+ − z2z
1979
+
1980
+ k·ϵ
1981
+ z − q·ϵ
1982
+ z2
1983
+ � �
1984
+ p·ϵ∗
1985
+ z1 − q·ϵ∗
1986
+ z2
1987
+
1988
+ + p · q
1989
+ (z2 + z)(z1k − zp)2
1990
+
1991
+ (z1k−zp)2
1992
+ z1(z1−z) − (z2k−zq)2
1993
+ z2(z2+z)
1994
+
1995
+
1996
+
1997
+ ��
1998
+ .
1999
+ (36)
2000
+ dσT
2001
+ 14(1)
2002
+ d2p d2q dy1 dy2
2003
+ = −ie2g2QN 2
2004
+ c (z1z2)3/2
2005
+ 2(2π)7
2006
+ � z1
2007
+ 0
2008
+ dz
2009
+ z d8xK1(|x1′2′|Q1)
2010
+ |x1′2′|
2011
+ [S122′1′ − S1′2′ − S12 + 1]ei(p·x1′1+q·x2′2)
2012
+
2013
+ d2k1
2014
+ (2π)2
2015
+ d2k2
2016
+ (2π)2 eik2·x12
2017
+
2018
+ [z1(z1 − z) + z2(z2 + z) − z(1 − z)] (k2 · x1′2′)
2019
+
2020
+ k2
2021
+ 2 + Q2
2022
+ 1
2023
+ � ��
2024
+ k1 − z1−z
2025
+ z1 k2
2026
+ �2
2027
+ + z(z1−z)
2028
+ z2z2
2029
+ 1
2030
+ k2
2031
+ 2 + z
2032
+ z1 (z1 − z)Q2
2033
+
2034
+ +
2035
+ (z1−z)
2036
+ z1
2037
+ (1 + z2 − 2z2(z1 − z))(k1 · x1′2′)
2038
+
2039
+ k2
2040
+ 1 + (z1 − z)(z2 + z)Q2
2041
+ � ��
2042
+ k1 − z1−z
2043
+ z1 k2
2044
+ �2
2045
+ + z(z1−z)
2046
+ z2z2
2047
+ 1
2048
+ k2
2049
+ 2 + z
2050
+ z1 (z1 − z)Q2
2051
+
2052
+
2053
+ Q2 (z1−z)
2054
+ z1
2055
+
2056
+ 2z1z2z(k1 · x1′2′) + z(z + z2 − z1)2(k2 · x1′2′)
2057
+
2058
+
2059
+ k2
2060
+ 1 + (z1 − z)(z2 + z)Q2
2061
+ ��
2062
+ k2
2063
+ 2 + Q2
2064
+ 1
2065
+ � ��
2066
+ k1 − z1−z
2067
+ z1 k2
2068
+ �2
2069
+ + z(z1−z)
2070
+ z2z2
2071
+ 1
2072
+ k2
2073
+ 2 + z
2074
+ z1 (z1 − z)Q2
2075
+
2076
+
2077
+ (37)
2078
+ dσT
2079
+ 14(2)
2080
+ d2p d2q dy1 dy2
2081
+ = −ie2g2QN 2
2082
+ c (z1z2)3/2
2083
+ 2(2π)7
2084
+ � z2
2085
+ 0
2086
+ dz
2087
+ z d8xK1(|x1′2′|Q1)
2088
+ |x1′2′|
2089
+ [S122′1′ − S1′2′ − S12 + 1]ei(p·x1′1+q·x2′2)
2090
+
2091
+ d2k1
2092
+ (2π)2
2093
+ d2k2
2094
+ (2π)2 eik2·x12
2095
+
2096
+ [z2(z2 − z) + z1(z1 + z) − z(1 − z)] (k2 · x1′2′)
2097
+
2098
+ k2
2099
+ 2 + Q2
2100
+ 1
2101
+ � ��
2102
+ k1 − z2−z
2103
+ z2 k2
2104
+ �2
2105
+ + z(z2−z)
2106
+ z1z2
2107
+ 2
2108
+ k2
2109
+ 2 + z
2110
+ z2 (z2 − z)Q2
2111
+
2112
+ +
2113
+ (z2−z)
2114
+ z2
2115
+ (1 + z2 − 2z1(z2 − z))(k1 · x1′2′)
2116
+
2117
+ k2
2118
+ 1 + (z2 − z)(z1 + z)Q2
2119
+ � ��
2120
+ k1 − z2−z
2121
+ z2 k2
2122
+ �2
2123
+ + z(z2−z)
2124
+ z1z2
2125
+ 2
2126
+ k2
2127
+ 2 + z
2128
+ z2 (z2 − z)Q2
2129
+
2130
+
2131
+ 11
2132
+
2133
+ Q2 (z2−z)
2134
+ z2
2135
+
2136
+ 2z1z2z(k1 · x1′2′) + z(z + z1 − z2)2(k2 · x1′2′)
2137
+
2138
+
2139
+ k2
2140
+ 1 + (z2 − z)(z1 + z)Q2
2141
+ ��
2142
+ k2
2143
+ 2 + Q2
2144
+ 1
2145
+ � ��
2146
+ k1 − z2−z
2147
+ z2 k2
2148
+ �2
2149
+ + z(z2−z)
2150
+ z1z2
2151
+ 2
2152
+ k2
2153
+ 2 + z
2154
+ z2 (z2 − z)Q2
2155
+
2156
+
2157
+ (38)
2158
+ These expressions constitute the full result for the one-loop corrections to inclusive quark anti-quark production cross
2159
+ section with transverse photon exchange. We have written these results all in terms of the dipole and quadrupole
2160
+ functions defined in Eq. (3) in the large Nc limit and ignored all subleading Nc terms.
2161
+ We have also used the following notation for the coordinate dependence of some of the Bessel functions:
2162
+ X =
2163
+
2164
+ z1z2x2
2165
+ 12 + z1zx2
2166
+ 13 + z2zx2
2167
+ 23,
2168
+ X5 =
2169
+
2170
+ z2(z1 − z)x2
2171
+ 12 + z(z1 − z)x2
2172
+ 13 + z2z x2
2173
+ 23,
2174
+ X6 =
2175
+
2176
+ z1(z2 − z)x2
2177
+ 12 + z1z x2
2178
+ 13 + z(z2 − z)x2
2179
+ 23.
2180
+ (39)
2181
+ Note that when z → 0 these all become |x12|√z1z2. The primed version X′ that appears in some real corrections is
2182
+ the same as X above but with x1, x2 → x′
2183
+ 1, x′
2184
+ 2.
2185
+ IV.
2186
+ DIVERGENCES
2187
+ The above expressions are formal in the sense that they contain divergences that render them ill-defined unless
2188
+ regulated. As in the case of longitudinal exchange there are 4 types of divergences:
2189
+ • Ultraviolet (UV) divergences when loop momentum k → ∞ or equivalently in coordinate space, when the transverse
2190
+ coordinate of the radiated gluon approaches the transverse coordinate xi of either quark or antiquark when integrated,
2191
+ i.e. x3 → xi such that |x3−xi| → 0. The UV structure of the production cross section with transverse photon exchange
2192
+ is identical to that of longitudinal photon exchange so that cancellations are identical, i.e.
2193
+ [dσ5 + dσ11]UV = 0,
2194
+ [dσ6 + dσ12]UV = 0,
2195
+
2196
+ dσ9 + dσ10 + dσ14(1) + dσ14(2)
2197
+
2198
+ UV = 0.
2199
+ (40)
2200
+ with the rest of the contributions being UV finite.
2201
+ • Soft divergences when kµ → 0, which in this context corresponds to both transverse momentum in the loop k and
2202
+ the radiated gluon momentum fraction z go to zero simultaneously, k, z → 0. Both the real and virtual corrections
2203
+ contain soft divergences, however all soft divergences cancel between real and virtual corrections as shown below,
2204
+ [dσ1×1 + 2 dσ9]soft = 0,
2205
+ [dσ2×2 + 2 dσ10]soft = 0,
2206
+
2207
+ dσ1×2 + dσ13(1) + dσ13(2)
2208
+
2209
+ soft = 0,
2210
+ [dσ3×3 + dσ4×4 + 2 dσ3×4]soft = 0,
2211
+ [dσ1×3 + dσ1×4]soft = 0,
2212
+ [dσ2×3 + dσ2×4]soft = 0,
2213
+ [dσ5 + dσ7]soft = 0,
2214
+ [dσ6 + dσ8]soft = 0,
2215
+
2216
+ dσ11 + dσ14(1)
2217
+
2218
+ soft = 0,
2219
+
2220
+ dσ12 + dσ14(2)
2221
+
2222
+ soft = 0.
2223
+ (41)
2224
+ • Collinear divergences when the radiated gluon momentum becomes parallel to either quark or anti-quark momentum
2225
+ at finite k and z. They are present in diagrams iA1, iA2 (real corrections) and in iA9, iA10 (virtual corrections). These
2226
+ collinear divergences are absorbed into quark-hadron and antiquark-hadron fragmentation functions which makes the
2227
+ fragmentation functions scale dependent, for example
2228
+ Dh1/q(zh1, µ2) =
2229
+ � 1
2230
+ zh1
2231
+
2232
+ ξ D0
2233
+ h1/q
2234
+ �zh1
2235
+ ξ
2236
+ � �
2237
+ δ(1 − ξ) + αs
2238
+ 2π Pqq(ξ) log
2239
+ � µ2
2240
+ Λ2
2241
+ � �
2242
+ ,
2243
+ (42)
2244
+
2245
+ 12
2246
+ defined using a cutoff scheme or
2247
+ Dh1/q(zh1, µ2) =
2248
+ � 1
2249
+ zh1
2250
+
2251
+ ξ D0
2252
+ h1/q
2253
+ �zh1
2254
+ ξ
2255
+ � �
2256
+ δ(1 − ξ) + αs
2257
+ π Pqq(ξ)
2258
+ �1
2259
+ ϵ − log (πeγEµ|x′
2260
+ 1 − x1|)
2261
+ � �
2262
+ ,
2263
+ (43)
2264
+ when using dimensional regularization scheme. We refer the reader to [52] for full details.
2265
+ • Rapidity divergences when the momentum fraction z of the gluon goes to zero while the transverse momentum k
2266
+ of the gluon remains finite. These are handled by introducing a longitudinal momentum fraction factorization scale
2267
+ zf and dividing the z integration into two regions: z > zf and z < zf,
2268
+ � 1
2269
+ 0
2270
+ dz
2271
+ z f(z) =
2272
+ �� zf
2273
+ 0
2274
+ dz
2275
+ z +
2276
+ � 1
2277
+ zf
2278
+ dz
2279
+ z
2280
+
2281
+ f(z).
2282
+ (44)
2283
+ The rapidity divergences are present only in the first term above and lead to evolution (renormalization) the dipoles
2284
+ and quadrupoles according to the BK and JIMWLK evolution equations [60–68]. The second term contains no rapidity
2285
+ divergences, it is completely finite and is part of the next to leading order corrections.
2286
+ Our final result for the regulated dihadron production cross section can then be symbolically written as sum of
2287
+ several terms (Eq. 45) as shown below
2288
+ dσγ∗A→h1h2X = dσLO ⊗ JIMWLK + dσLO ⊗ Dh1/q(zh1, µ2) ⊗ Dh2/¯q(zh2, µ2) + dσfinite
2289
+ NLO
2290
+ (45)
2291
+ The first term contains the z integration region below zf where the leading order cross section is evolved with the
2292
+ BK/JIMWLK evolution equations. The second term includes the integration region z > zf where the leading order
2293
+ cross section is convoluted with the DGLAP evolved fragmentation functions for both quark and antiquark. Finally
2294
+ the last term constitutes all the remaining contributions to the NLO cross section which is finite. Presence of the bare
2295
+ fragmentation functions in the first and last terms is implied.
2296
+ In summary, we have calculated the one-loop corrections to inclusive quark antiquark production in DIS at small x
2297
+ for transverse photons. We have shown the production cross section factorizes: all divergences that appear at the
2298
+ one-loop level are either canceled or absorbed into JIMWLK evolution of dipoles and quadrupoles, and into DGLAP
2299
+ evolution of parton-hadron fragmentation functions. These results are well suited for further phenomenological studies
2300
+ of angular correlations of the dihadrons produced in DIS at small x [51].
2301
+ a.
2302
+ Acknowledgements:
2303
+ We gratefully acknowledge support from the DOE Office of Nuclear Physics through Grant
2304
+ No. DE-SC0002307 and by PSC-CUNY through grant No. 63158-0051. We would like to thank T. Altinoluk, G. Beuf,
2305
+ R. Boussarie, P. Caucal, L. Dixon, Y. Kovchegov, C. Marquet, Y. Mulian, F. Salazar, M. Tevio, R. Venugopalan, W.
2306
+ Vogelsang and B. Xiao for helpful discussions.
2307
+ [1] E. Iancu and R. Venugopalan, The Color glass condensate and high-energy scattering in QCD (2003), pp. 249–3363,
2308
+ hep-ph/0303204.
2309
+ [2] J. Jalilian-Marian and Y. V. Kovchegov, Prog. Part. Nucl. Phys. 56, 104 (2006), hep-ph/0505052.
2310
+ [3] H. Weigert, Prog. Part. Nucl. Phys. 55, 461 (2005), hep-ph/0501087.
2311
+ [4] F. Gelis, E. Iancu, J. Jalilian-Marian, and R. Venugopalan, Ann. Rev. Nucl. Part. Sci. 60, 463 (2010), 1002.0333.
2312
+ [5] A. Morreale and F. Salazar, Universe 7, 312 (2021), 2108.08254.
2313
+ [6] A. Kovner and U. A. Wiedemann, Phys. Rev. D 64, 114002 (2001), hep-ph/0106240.
2314
+ [7] J. Jalilian-Marian and Y. V. Kovchegov, Phys. Rev. D 70, 114017 (2004), [Erratum: Phys.Rev.D 71, 079901 (2005)],
2315
+ hep-ph/0405266.
2316
+ [8] C. Marquet, Nucl. Phys. A 796, 41 (2007), 0708.0231.
2317
+ [9] J. L. Albacete and C. Marquet, Phys. Rev. Lett. 105, 162301 (2010), 1005.4065.
2318
+ [10] A. Stasto, B.-W. Xiao, and F. Yuan, Phys. Lett. B 716, 430 (2012), 1109.1817.
2319
+ [11] T. Lappi and H. Mantysaari, Nucl. Phys. A 908, 51 (2013), 1209.2853.
2320
+ [12] A. Stasto, S.-Y. Wei, B.-W. Xiao, and F. Yuan, Phys. Lett. B 784, 301 (2018), 1805.05712.
2321
+ [13] J. L. Albacete, G. Giacalone, C. Marquet, and M. Matas, Phys. Rev. D 99, 014002 (2019), 1805.05711.
2322
+ [14] R. Boussarie, H. Mäntysaari, F. Salazar, and B. Schenke (2021), 2106.11301.
2323
+ [15] H. Fujii, C. Marquet, and K. Watanabe, JHEP 12, 181 (2020), 2006.16279.
2324
+
2325
+ 13
2326
+ [16] P. Kotko, K. Kutak, C. Marquet, E. Petreska, S. Sapeta, and A. van Hameren, JHEP 09, 106 (2015), 1503.03421.
2327
+ [17] A. van Hameren, P. Kotko, K. Kutak, C. Marquet, E. Petreska, and S. Sapeta, JHEP 12, 034 (2016), [Erratum: JHEP
2328
+ 02, 158 (2019)], 1607.03121.
2329
+ [18] T. Altinoluk, C. Marquet, and P. Taels, JHEP 06, 085 (2021), 2103.14495.
2330
+ [19] Y. Hatta, B.-W. Xiao, F. Yuan, and J. Zhou, Phys. Rev. Lett. 126, 142001 (2021), 2010.10774.
2331
+ [20] J. Jia, S.-Y. Wei, B.-W. Xiao, and F. Yuan, Phys. Rev. D 101, 094008 (2020), 1910.05290.
2332
+ [21] J. Jalilian-Marian and A. H. Rezaeian, Phys. Rev. D 86, 034016 (2012), 1204.1319.
2333
+ [22] J. Jalilian-Marian and A. H. Rezaeian, Phys. Rev. D 85, 014017 (2012), 1110.2810.
2334
+ [23] J. Jalilian-Marian, Nucl. Phys. A 753, 307 (2005), hep-ph/0501222.
2335
+ [24] J. Jalilian-Marian, Nucl. Phys. A 739, 319 (2004), nucl-th/0402014.
2336
+ [25] A. Dumitru, J. Jalilian-Marian, and E. Petreska, Phys. Rev. D 84, 014018 (2011), 1105.4155.
2337
+ [26] A. Dumitru and J. Jalilian-Marian, Phys. Rev. D 82, 074023 (2010), 1008.0480.
2338
+ [27] Z.-B. Kang, I. Vitev, and H. Xing, Phys. Rev. D 85, 054024 (2012), 1112.6021.
2339
+ [28] I. Kolbé, K. Roy, F. Salazar, B. Schenke, and R. Venugopalan, JHEP 01, 052 (2021), 2008.04372.
2340
+ [29] J. Jalilian-Marian, Nucl. Phys. A 770, 210 (2006), hep-ph/0509338.
2341
+ [30] H. Mäntysaari, N. Mueller, F. Salazar, and B. Schenke, Phys. Rev. Lett. 124, 112301 (2020), 1912.05586.
2342
+ [31] R. Boussarie, H. Mäntysaari, F. Salazar, and B. Schenke, JHEP 09, 178 (2021), 2106.11301.
2343
+ [32] P. Kotko, K. Kutak, S. Sapeta, A. M. Stasto, and M. Strikman, Eur. Phys. J. C 77, 353 (2017), 1702.03063.
2344
+ [33] F. Salazar and B. Schenke, Phys. Rev. D 100, 034007 (2019), 1905.03763.
2345
+ [34] H. Mäntysaari, N. Mueller, and B. Schenke, Phys. Rev. D 99, 074004 (2019), 1902.05087.
2346
+ [35] T. Altinoluk, N. Armesto, G. Beuf, and A. H. Rezaeian, Phys. Lett. B 758, 373 (2016), 1511.07452.
2347
+ [36] A. Dumitru, T. Lappi, and V. Skokov, Phys. Rev. Lett. 115, 252301 (2015), 1508.04438.
2348
+ [37] E. Iancu, A. H. Mueller, and D. N. Triantafyllopoulos, Phys. Rev. Lett. 128, 202001 (2022), 2112.06353.
2349
+ [38] Y. Hatta, B.-W. Xiao, and F. Yuan, Phys. Rev. Lett. 116, 202301 (2016), 1601.01585.
2350
+ [39] R. Boussarie, A. V. Grabovsky, L. Szymanowski, and S. Wallon, JHEP 11, 149 (2016), 1606.00419.
2351
+ [40] R. Boussarie, A. V. Grabovsky, L. Szymanowski, and S. Wallon, JHEP 09, 026 (2014), 1405.7676.
2352
+ [41] E. Braidot (STAR), Nucl. Phys. A 854, 168 (2011), 1008.3989.
2353
+ [42] A. Adare et al. (PHENIX), Phys. Rev. Lett. 107, 172301 (2011), 1105.5112.
2354
+ [43] E.-C. Aschenauer et al. (2016), 1602.03922.
2355
+ [44] A. Accardi et al., Eur. Phys. J. A 52, 268 (2016), 1212.1701.
2356
+ [45] G. A. Chirilli, B.-W. Xiao, and F. Yuan, Phys. Rev. Lett. 108, 122301 (2012), 1112.1061.
2357
+ [46] G. A. Chirilli, B.-W. Xiao, and F. Yuan, Phys. Rev. D 86, 054005 (2012), 1203.6139.
2358
+ [47] A. Ayala, M. Hentschinski, J. Jalilian-Marian, and M. E. Tejeda-Yeomans, Phys. Lett. B 761, 229 (2016), 1604.08526.
2359
+ [48] A. Ayala, M. Hentschinski, J. Jalilian-Marian, and M. E. Tejeda-Yeomans, Nucl. Phys. B 920, 232 (2017), 1701.07143.
2360
+ [49] P. Caucal, F. Salazar, and R. Venugopalan, JHEP 11, 222 (2021), 2108.06347.
2361
+ [50] P. Caucal, F. Salazar, B. Schenke, and R. Venugopalan, JHEP 11, 169 (2022), 2208.13872.
2362
+ [51] F. Bergabo and J. Jalilian-Marian, Nucl. Phys. A 1018, 122358 (2022), 2108.10428.
2363
+ [52] F. Bergabo and J. Jalilian-Marian, Phys. Rev. D 106, 054035 (2022), 2207.03606.
2364
+ [53] P. Taels, T. Altinoluk, G. Beuf, and C. Marquet (2022), 2204.11650.
2365
+ [54] E. Iancu and Y. Mulian, JHEP 03, 005 (2021), 2009.11930.
2366
+ [55] F. Bergabo and J. Jalilian-Marian (2022), 2210.03208.
2367
+ [56] S. Benic, K. Fukushima, O. Garcia-Montero, and R. Venugopalan, JHEP 01, 115 (2017), 1609.09424.
2368
+ [57] A. Dumitru and J. Jalilian-Marian, Phys. Rev. Lett. 89, 022301 (2002), hep-ph/0204028.
2369
+ [58] A. Dumitru and J. Jalilian-Marian, Phys. Lett. B 547, 15 (2002), hep-ph/0111357.
2370
+ [59] A. Ayala, J. Jalilian-Marian, L. D. McLerran, and R. Venugopalan, Phys. Rev. D 53, 458 (1996), hep-ph/9508302.
2371
+ [60] I. Balitsky, Nucl. Phys. B 463, 99 (1996), hep-ph/9509348.
2372
+ [61] Y. V. Kovchegov, Phys. Rev. D 61, 074018 (2000), hep-ph/9905214.
2373
+ [62] J. Jalilian-Marian, A. Kovner, A. Leonidov, and H. Weigert, Nucl. Phys. B 504, 415 (1997), hep-ph/9701284.
2374
+ [63] J. Jalilian-Marian, A. Kovner, A. Leonidov, and H. Weigert, Phys. Rev. D 59, 014014 (1998), hep-ph/9706377.
2375
+ [64] J. Jalilian-Marian, A. Kovner, and H. Weigert, Phys. Rev. D 59, 014015 (1998), hep-ph/9709432.
2376
+ [65] J. Jalilian-Marian, A. Kovner, A. Leonidov, and H. Weigert, Phys. Rev. D 59, 034007 (1999), [Erratum: Phys.Rev.D 59,
2377
+ 099903 (1999)], hep-ph/9807462.
2378
+ [66] A. Kovner, J. G. Milhano, and H. Weigert, Phys. Rev. D 62, 114005 (2000), hep-ph/0004014.
2379
+ [67] E. Iancu, A. Leonidov, and L. D. McLerran, Nucl. Phys. A 692, 583 (2001), hep-ph/0011241.
2380
+ [68] E. Ferreiro, E. Iancu, A. Leonidov, and L. McLerran, Nucl. Phys. A 703, 489 (2002), hep-ph/0109115.
2381
+
EtE1T4oBgHgl3EQfWwQ3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FtE5T4oBgHgl3EQfVg81/content/tmp_files/2301.05551v1.pdf.txt ADDED
@@ -0,0 +1,633 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ DYNAMIC DATA ASSIMILATION OF MPAS-O AND THE GLOBAL
2
+ DRIFTER DATASET
3
+ A PREPRINT
4
+ Derek DeSantis
5
+ CCS-2, W-13
6
+ Los Alamos National Laboratory
7
+ ddesantis@lanl.gov
8
+ Ayan Biswas
9
+ CCS-3
10
+ Los Alamos National Laboratory
11
+ ayan@lanl.gov
12
+ Earl Lawrence
13
+ CCS-6
14
+ Los Alamos National Laboratory
15
+ earl@lanl.gov
16
+ Phillip J. Wolfram
17
+ W-13
18
+ Los Alamos National Laboratory
19
+ pwolfram@lanl.gov
20
+ January 16, 2023
21
+ Keywords Data assimilation ⋅ Dynamic Mode Decomposition ⋅ Ocean Dynamics ⋅ E3SM ⋅ GDP
22
+ Abstract
23
+ In this study, we propose a new method for combining in situ buoy measurements with Earth system models (ESMs) to
24
+ improve the accuracy of temperature predictions in the ocean. The technique utilizes the dynamics and modes identified
25
+ in ESMs to improve the accuracy of buoy measurements while still preserving features such as seasonality. Using this
26
+ technique, errors in localized temperature predictions made by the MPAS-O model can be corrected. We demonstrate
27
+ that our approach improves accuracy compared to other interpolation and data assimilation methods. We apply our
28
+ method to assimilate the Model for Prediction Across Scales Ocean component (MPAS-O) with the Global Drifter
29
+ Program’s in-situ ocean buoy dataset.
30
+ 1
31
+ Introduction
32
+ In the field of Earth System Sciences, it is important to constantly improve the accuracy of measurements and models in
33
+ order to better understand the Earth’s climate. One way to analyze climate is through the use of powerful Earth system
34
+ models (ESMs), such as the DOE’s Energy Exascale Earth System Model (E3SM) [6]. ESMs provide estimates of
35
+ state variables across a large number of grid cells, such as the Model for Prediction Across Scales Ocean component
36
+ (MPAS-O), which is used in the E3SM and provides temperature estimates at different sized ocean cells [6, 9, 11].
37
+ Another method for studying climate is through direct in situ observations, such as those collected by satellites, towers,
38
+ or ocean buoys. These observations are more accurate at specific locations, but are limited in coverage. An example
39
+ of a highly resolved ocean buoy dataset is the Global Drifter dataset program (GDP) overseen by NOAA [5, 4]. In
40
+ many cases, scientists use interpolation techniques to estimate state variables, such as temperature or salinity, between
41
+ observations. Each of these approaches has its own advantages and disadvantages, and integrating both types of data
42
+ can provide the greatest flexibility and predictive power [10].
43
+ arXiv:2301.05551v1 [physics.ao-ph] 11 Jan 2023
44
+
45
+ A PREPRINT - JANUARY 16, 2023
46
+ Basis function models, which use linear combinations of continuous functions to estimate a state, are a flexible and
47
+ computationally efficient method for solving non-stationary systems [2]. In these models, a set of basis functions are
48
+ chosen or discovered, and the associated coefficient weights for an unknown function in the space are learned. In this
49
+ work, we propose a new basis function model for data integration and compare its effectiveness to other data integration
50
+ methods. We will explore three different methods for obtaining basis functions: 1) basis functions fit purely from
51
+ in situ observations, 2) basis functions discovered through ESMs and fit to in situ data, and 3) our newly developed
52
+ dynamic model, which builds on the second approach by weighting the basis functions according to extracted dynamical
53
+ information from the ESM.
54
+ In the following sections, we provide background information and detail the techniques used in this study. In Section
55
+ Three, we present the results of these methods for assimilating GDP data with MPAS-O and show that the dynamic
56
+ method provides the best overall results in terms of mean squared error. We also discuss how the dynamic method is
57
+ able to correct for biases within the MPAS model while simultaneously adjusting for temporal variations, which the
58
+ other basis methods fail to capture.
59
+ 2
60
+ Methods
61
+ 2.1
62
+ Notation, Data set dimensions and variables
63
+ Throughout this study, let M denote the physical domain of interest in the ocean, specifically the Atlantic Ocean
64
+ between latitudes 15○ − 55○ N and longitudes 260○ − 20○ E. The discrete times for buoy and model observations are
65
+ denoted by tj for j = 1,2,...,T, with a time increment of five days between each slice (tj+1 − tj). The number
66
+ of time slices will vary depending on the training problem, but examples we will consider are T=6, 18, and 74,
67
+ corresponding to one month, one season, and one year, respectively. At each time tj, there are Nj buoy measurements,
68
+ and the total number of buoy measurements over the entire time period from t1 to tT is denoted by N = ∑T
69
+ j=1 Nj. We
70
+ use {xi}N
71
+ i=1 ⊂ M and {yi}N
72
+ i=1 ⊂ R to represent the complete set of buoy locations and temperature measurements,
73
+ respectively. For emphasis, the buoy measurements indexed by {(xi,yi)}Nj+1−1
74
+ i=Nj
75
+ correspond to all the data at time tj,
76
+ and we use (xi(tj),yi(tj)) to refer to a single datum at time tj. For a fixed set of sequential temporal observations, we
77
+ let [t1 ∶ tT ] = {t1,t2,...,tT }.
78
+ For the ESM data, there are L fixed grid center locations {wl}L
79
+ l=1 ⊂ M that provide temperature measurements at each
80
+ time t1,...tT . These grid cells cover the entire domain M , and each buoy position {xi}N
81
+ i=1 ⊂ M belongs to one of the
82
+ grid cells from the ESM. We let ˆxi denote the index of the cell that buoy xi belongs to. Similar to the notation used for
83
+ the buoy data, we use {zl(tj)}L
84
+ l=1 to represent the ESM temperature measurements at time tj.
85
+ In this study, we will use the The Model for Prediction Across Scales Ocean component (MPAS-O) as our ESM and the
86
+ Global Drifter Program (GDP) for ocean buoy data. MPAS-O is an ocean model that simulates ocean systems on time
87
+ scales ranging from months to millenia and spatial scales as small as sub 1 kilometer [6]. Specifically, we will be using
88
+ the V1 historical run of MPAS-O [3]. The GDP is a large array of more than 1000 satellite-tracked ocean buoys that
89
+ measure ocean variables such as drift and sea surface temperature, and are commonly used in weather prediction [5, 4].
90
+ These two datasets have different temporal resolutions, so some time averaging within the GDP is required to match the
91
+ MPAS-O. See the appendix for more details.
92
+ 2.2
93
+ Basis Function Interpolation for Data Integration
94
+ Basis function interpolation is a useful method for data integration. In general, interpolation involves finding a function
95
+ F ∶ M → R such that F(xi) ≅ yi for i = 1,...,N, where M is the domain of interest, {xi} are known points in M,
96
+ and {yi} are corresponding values. One approach to constructing F is to represent it as a linear combination of simple
97
+ basis functions φj ∶ M → R, belonging to the same class as F, as follows:
98
+ F(x) =
99
+ M
100
+
101
+ j=1
102
+ ajφj(x).
103
+ This reduces the interpolation problem to a regression problem, where we seek to determine the coefficients {aj} by
104
+ fitting the function F to the data points {(xi,yi)}.
105
+ To perform a basis function interpolation, we first select or discover the basis functions {φj}M
106
+ j=1, and then solve the
107
+ regression problem:
108
+ yi ≅ F(xi) =
109
+ M
110
+
111
+ j=1
112
+ ajφj(xi).
113
+ 2
114
+
115
+ A PREPRINT - JANUARY 16, 2023
116
+ This is a regression problem that can be solved by selecting a set of basis functions {φj}M
117
+ j=1 and finding the coefficients
118
+ {aj} that best fit the data points {(xi,yi)}. This can be written in matrix form as:
119
+ ⃗y ≅ Φ⃗a,
120
+ (1)
121
+ where Φi,j = φj(xi), ⃗y = (y1,...,yN)T , and ⃗a = (a1,...,aM)T . The least-square solution to Equation 1 is obtained
122
+ by taking the Moore-Penrose inverse of Φ on both sides:
123
+ ⃗a ≅ Φ†⃗y.
124
+ The Moore-Penrose inverse can be computed using the singular value decomposition (SVD) of Φ. If the SVD of Φ
125
+ is given by Φ = UΣV T , then the Moore-Penrose inverse is Φ† = V Σ†U T , where Σ† is found by taking the transpose
126
+ and inverting each entry on the diagonal of Σ. In many cases, the matrix Φ may be ill-conditioned, in which case
127
+ regularization is needed. Optimization is performed over a range of regularization parameters to find the best fit on the
128
+ training data. Once the coefficients ⃗a have been obtained, the model can be tested for accuracy on the test data.
129
+ Data integration is achieved through basis function interpolation by selecting basis functions derived from the ESM
130
+ and interpolating them over the buoy observations {(xi,yi)}. In this work, we will consider different types of basis
131
+ functions and different temporal ranges for the interpolation. The basis functions do not need to be orthogonal. In the
132
+ next section, we will describe our choice of models in more detail.
133
+ 2.3
134
+ Radial Basis Functions - Purely Buoy Data Driven
135
+ One approach to deriving F is to use only the observations {(xi,yi)} and ignore the ESM data completely. In this case,
136
+ a natural choice is to use radial basis functions (RBFs) for φj. Specifically, we can define φj(x) = ψ(∣x − µj∣), where
137
+ ψ ∶ M → R is a fixed function (such as a Gaussian) and µj ∈ M are the mean or center points. Often, the RBF chosen
138
+ has a tuning parameter ϵ, such as the standard deviation in a Gaussian. In addition to the RBFs, it is also common to
139
+ include a polynomial term P(x) of degree D to capture mean behavior. Therefore, F ∶ M → R can be expressed as:
140
+ F(x) = P(x) +
141
+ M
142
+
143
+ j=1
144
+ ajφj(x)
145
+ (2)
146
+ In this approach, the user must choose the number of basis functions M, the centers µj, the basis functions φj, and the
147
+ degree of the interpolating polynomial D. A common choice for M and µj is to use the size of the training set N and
148
+ the locations of the training set, and is the practice adopted here. For more information on RBFs, see [1, 12].
149
+ 2.4
150
+ Static ESM Mode Decompositions for Basis
151
+ In this subsection, we describe how to obtain basis functions {φj}j = 1M from the ESM data. We consider two methods
152
+ for extracting spatially coherent functions, or modes of variability, that are faithful to the spatial grid {wl}L
153
+ l=1 provided
154
+ by the ESM. First, we describe how to obtain these modes, and then discuss how to use them to produce basis functions.
155
+ For each time t ∈ [t1 ∶ tT ], the ESM data zl(t)L
156
+ l=1 provides an estimate of the temperature distribution over the spatial
157
+ domain M at time t. This data can be arranged into an L × T matrix Z.
158
+ The Singular Value Decomposition (SVD) can be used to directly obtain modes [7]. Let Z ≅ UΣV T be the rank-M
159
+ SVD of Z. The M left singular vectors in the columns of U = [U1,U2,...,UM] ∈ RL,M form a set of (orthogonal)
160
+ spatial modes for Z.
161
+ Another method for extracting modes and their associated oscillation frequencies is the Dynamic Mode Decomposition
162
+ (DMD) [8, 13]. Unlike SVD, the derived modes are not orthogonal, which allows DMD to capture more physically
163
+ relevant modes within the decomposition (at the potential cost of parsimony). The process of computing DMD modes
164
+ {Uj}M
165
+ j=1 is more involved than SVD and is briefly summarized in the appendix.
166
+ Since each point x ∈ M belongs to one of the grid cells {wl}L
167
+ l=1 of the ESM, any mode decomposition of Z can be
168
+ used for interpolation by evaluation. Specifically, let ˆx denote the cell index l = 1,...,L that the point x belongs to, and
169
+ {Uj}M
170
+ j=1 ⊂ RL be modes of Z. We define the static (SVD or DMD) mode basis as
171
+ φj(x) ∶= Uˆx,j
172
+ for each j = 1,...,M. In other words, the static mode basis is simply the spatial modes obtained through the modal
173
+ decomposition (SVD or DMD).
174
+ 3
175
+
176
+ A PREPRINT - JANUARY 16, 2023
177
+ 2.5
178
+ Dynamic ESM Mode Decompositions for Basis
179
+ Both of the mode-based decompositions discussed in the previous subsection also include additional dynamical
180
+ information that has not been utilized. In this subsection, we present a method for incorporating this information into
181
+ basis function interpolation.
182
+ In SVD, the left singular vectors U = [U1,...,UM] ∈ RL,M represent spatial patterns, while the right singular vectors
183
+ V = [V1,...,VT ] ∈ RT,M represent the intensity of each of the M patterns across the T time slices. Similarly, DMD
184
+ produces its M DMD modes U = [U1,...,UM] ∈ RL,M and their associated dynamics (intensity across time), as
185
+ described in the appendix. For a mode decomposition, let αj(t) describe the dynamics of the DMD mode Uj.
186
+ Each buoy measurement (xi,yi) is taken at a specific time t ∈ [t1 ∶ tT ]. More generally, we can associate each point
187
+ x ∈ M with a time t ∈ [t1 ∶ tT ] at which we want to provide interpolation. We define the dynamic (SVD or DMD)
188
+ mode basis as
189
+ φj(x) ∶= αj(t)Uˆx,j
190
+ for each j = 1,...,M 1. In other words, the dynamic mode basis is obtained from the static mode basis by weighting
191
+ the static mode at an observation by its intensity at the time of the observation.
192
+ 2.6
193
+ MPAS-O - Purely ESM Data Driven
194
+ As a baseline, we will compare the performance of our basis models to the ESM, which provides an approximation of
195
+ the surface temperature over M. Ideally, the ESM would accurately represent the in-situ buoy measurements. To do
196
+ this, we can compute the ESM baseline by finding the ESM cell that each buoy belongs to and comparing the model’s
197
+ output to the buoy measurement:
198
+ z ˆ
199
+ wi(tj) − yi(tj).
200
+ 3
201
+ Results
202
+ Figure 1 displays the test errors for the different models for three different now-cast time lengths T. Each model from
203
+ Section 2 is fit for lengths T = 6,18 or 74 to represent one month, three months, or one year. The model is fit on 80% of
204
+ the data and tested on the remaining 20% to produce an error measurement. A distribution of errors for each model, and
205
+ each time T is created by choosing different starting times t1. A total of 100 start times t1 are chosen uniformly spaced
206
+ one month apart from one another. The left side of Figure 1 displays the box and whisker plot for each of the error
207
+ distributions of each model at each time length T. The right side of Figure 1 displays the top three best performing
208
+ models.
209
+ Figure 1 shows the test errors for the different models for three different now-cast time lengths T. Each model from
210
+ Section 2 is fit for lengths T = 6,18 or 74 to represent one month, three months, or one year. The model is fit on 80% of
211
+ the data and tested on the remaining 20% to produce an error measurement. A distribution of errors for each model and
212
+ each time T is created by choosing different starting times t1. A total of 100 start times t1 are chosen uniformly spaced
213
+ one month apart from one another. The left side of Figure 1 displays the box and whisker plot for each of the error
214
+ distributions of each model at each time length T. The right side of Figure 1 displays the top three best-performing
215
+ models.
216
+ One key takeaway from Figure 1 is that in each scenario, the dynamic basis interpolation using DMD modes outperforms
217
+ MPAS across all time scales. While the RBF model performs better than the fully dynamic DMD model on the short
218
+ timescale of one month, it performs worse on longer timescales. Another important observation is that the SVD methods
219
+ perform better on longer timescales. On the short timescale of one month, both SVD methods have a poor fit, but on the
220
+ one-year fit, the dynamic SVD begins to outperform the RBF model. Given the dominance of the fully dynamic DMD
221
+ model over the other basis models, we will focus on its benefits in future analysis.
222
+ Next, we will perform a deeper analysis of the model performance over a single year. For demonstration purposes, we
223
+ have selected the date range of Jan. 1st, 2008 to Jan 1st, 2009 to display here 2. Figure 2(a) shows how the test error
224
+ 1Note that since the dynamic information αj(t) has already been captured, the added complexity compared to the static method
225
+ is O(1) per observation
226
+ 2While we focus on Jan. 1st, 2008 to Jan 1st, 2009, the results presented here are representative of the general year-long
227
+ phenomenon. The following discussion and analysis can be applied to any time slice, since the fully dynamic models have temporal
228
+ information
229
+ 4
230
+
231
+ A PREPRINT - JANUARY 16, 2023
232
+ is improved by adding the dynamic component to the DMD mode decomposition. The DMD basis decomposition
233
+ has a somewhat bimodal error, indicating that the model has over- or undercompensated for SST in some regions.
234
+ Figure 2(b) illustrates that this is due to seasonality - the basic DMD model has discovered a mean state to represent the
235
+ temperature, missing the extremes of both summer and winter. Weighting the modes by their dynamics removes these
236
+ biases, producing a normally distributed error with a much lower standard deviation. Figure 2(c) shows that MPAS has
237
+ a hot temperature bias, pushing the distribution’s mean into the negatives. This is further seen in Figure 2(d), where
238
+ MPAS appears to have a negative temperature bias across the whole year.
239
+ Finally, we will analyze the spatial distribution of the discovered temperature field to ensure that it adheres to known
240
+ physics. Figure 3(a) shows the average yearly temperature field interpolation provided by the fully dynamic DMD
241
+ model, while figure (b) displays the difference between the fully dynamic DMD and MPAS. Figure 3(c) shows the
242
+ temperature distribution for both the fully dynamic DMD basis model and MPAS. Figure 4(a) plots the location and
243
+ temperature of the test buoys across the year. Figure 4(b) and (c) show the test errors of the fully dynamic DMD and
244
+ MPAS models, respectively. The buoy errors in Figure 4 show that MPAS has a clear latitudinal temperature bias,
245
+ whereas the fully dynamic DMD has relatively uniform errors. Figures 3 and 4 show that the interpolation method
246
+ discovered by the fully dynamic DMD is not dissimilar from the physical model MPAS-O. The primary difference is a
247
+ lower temperature in the fully dynamic DMD model in the higher latitudes (the location where MPAS-O has a large
248
+ temperature bias). This suggests that the dynamic model is learning something that is physically consistent with MPAS,
249
+ while simultaneously improving upon its ground truth accuracy as measured by the GDD.
250
+ 4
251
+ Discussion
252
+ RBF methods can provide an arbitrary, unrealistic goodness of fit by adding more nodes. Since the RBF centers are
253
+ chosen from the buoy locations, this model is less sensitive to time scales. As noted above, on longer time lengths RBF
254
+ begins to perform more poorly compared to other models. This is likely due to the fact that RBF works to find the best
255
+ fits at the time the buoy measurements are made. As a result, if longer timescales are included, the RBF model will fit a
256
+ dataset with nearby buoy measurements with seasonal variability, such as Winter and Summer measurements in close
257
+ proximity. This lack of physical knowledge makes the fit rather unrealistic, as nearby nodes in the model compete for
258
+ what the "real" value should be, resulting in high spatial variability.
259
+ The SVD works to reduce noise, and in noise-dominated cases can be effectively swamped in such a way that it does
260
+ not provide clear basis modes. As discussed in the previous section, the SVD models perform extremely poorly on
261
+ short timescales of one to three months. On such timescales, the high-frequency data can dominate the signal, causing
262
+ poor predictions. This might be due in part to the fact that SVD assumes orthogonal, non-interacting modes, which are
263
+ poor at capturing shorter timescales.
264
+ DMD provides better estimates of spatio-temporal evolution than SVD. This could be due in part to the fact that
265
+ DMD modes have dynamics described by the growth and decay of eigenvalues. As such, the spatial modes are
266
+ unambiguously associated with particular months, seasons, cycles, etc. Consequently, DMD can intrinsically adapt to
267
+ seasonal changes better. While SVD does provide dynamic information, DMD is explicitly built to extract different
268
+ modes of variability. Climate change identification and predictions can be made with DMD, whereas the SVD’s lack of
269
+ flexibility and susceptibility to noise make it less accurate because it is not temporally adaptable. That said, the static
270
+ mode decomposition using DMD modes appears to get worse as you increase the time window. This is due to the fact
271
+ that the weight of the mean state still dominates, as shown in Figure 2 and discussed above.
272
+ The key discovery from the previous section is that adding available dynamics, specifically to the DMD method of
273
+ interpolation, improves predictive skill while correcting for mean biasing (Figure 1). We want to use the dynamic
274
+ models when the time includes seasonal features (longer time scales). This is because the fully dynamic DMD captures
275
+ different time scales and reweights them into the model, whereas other basis models either do an arbitrary fit (RBF) or
276
+ capture means (Figure 2). The fully dynamic DMD method also improves the biases of MPAS as seen by combining
277
+ the buoy and spatial pictures of Figures 3 and 4. As noted above, the fully dynamic DMD model corrects for the
278
+ temperature bias within MPAS-O at higher latitudes. The discovered DMD modes capture the dynamics of MPAS-O,
279
+ while having the flexibility to be reweighted to match the real observational data.
280
+ 5
281
+ Conclusion
282
+ In this paper, we compared various methods for interpolating ocean buoy data. In particular, we are interested in the data
283
+ assimilation of the ESM ocean data MPAS-O with in situ GDP buoy data. Our analysis showed that the performance
284
+ of an interpolation method depends on the time scale being considered. Some methods may be more effective for
285
+ short time scales, while others may perform better on longer time scales. We found that adding dynamic information,
286
+ 5
287
+
288
+ A PREPRINT - JANUARY 16, 2023
289
+ specifically to the DMD method, improves predictive accuracy and corrects for biases on longer time scales with
290
+ seasonal dynamics. The DMD with dynamics was consistently the best performer among all methods, improving the
291
+ ESM MPAS-O. We demonstrated that the DMD with dynamics is not overfitting and is making reasonable spatial
292
+ predictions while also correcting for biases in MPAS. Therefore, we conclude that the DMD with dynamics is the
293
+ superior method among those examined.
294
+ This type of dynamic decomposition for interpolating ocean data that can adapt to both high and low frequency
295
+ information show great potential. The dynamic data assimilation technique discussed here allow for more data-rich
296
+ analysis that could be useful for understanding evolving dynamics. Further applications of these approaches may be
297
+ useful and application to in-situ analysis or data assimilation appear most promising.
298
+ 6
299
+ Acknowledgements
300
+ Research presented in this article was supported by the Laboratory Directed Research and Development program of Los
301
+ Alamos National Laboratory under project number 20200065DR. DD was supported by the DOE Office of Science
302
+ Biological and Environmental Research (BER), as a contribution to the HiLAT-RASM project. MPAS-O V1 were
303
+ obtained from the Energy Exascale Earth System Model project, sponsored by the U.S.Department of Energy, Office of
304
+ Science, Office of Biological and Environmental Research. Satellite-tracked drifting buoy data are available from the
305
+ Global Drifter Program (GDP), with support from their website (ftp://ftp.aoml.noaa.gov/pub/phod/buoydata/).
306
+ 7
307
+ Appendix
308
+ 7.1
309
+ Time Filtering GDD Data to MPAS-O
310
+ The MPAS-O and GDP datasets are on different temporal resolutions (Five day averages versus six hour). We therefore
311
+ coarse-grained the GDP data in time to fit the temporal resolution of MPAS. Given two sequential MPAS-O time
312
+ snapshots t and t + 1, all the GDP buoy data is collected within each of those five days. For each buoy, the average
313
+ spatial location and temperature is then recorded and used as {xi(t)} and {yi(t)}.
314
+ 7.2
315
+ DMD Short Summary
316
+ In the Dynamic Mode Decomposition (DMD), the system is assumed to be evolved in an approximately linear fashion:
317
+ ⃗zt+1 ≅ A⃗zt.
318
+ (3)
319
+ This is effectively the solution of a forward-in-time spatially discrete solver, where A can contain physical operators
320
+ such as advection, diffusion, etc. The value in this form is that growth, decay, and oscillatory behavior is all immediately
321
+ represented, albeit pseudo-linearly from one time step to the next. Given this interpretation, one can think of A as
322
+ effectively a learned, empirical physically-meaningful discretization.
323
+ Let Z1 and Z2 be the matrices given by Z1 = [⃗z1⃗z2 ... ⃗zT −1] and Z2 = [⃗z2⃗z3 ... ⃗zT ]. The goal is to find a good
324
+ approximation ˜A of the matrix A that represents this system. This can be cast as the following matrix problem:
325
+ Z2 ≅ AZ1
326
+ (4)
327
+ The least square solution to Equation 4 is found by taking the Moore-Penrose inverse:
328
+ A ≅ Z2Z†
329
+ 1.
330
+ Since A is a square matrix, one can consider the eigen-decomposition of A:
331
+ AU = UΛ
332
+ (5)
333
+ The eigenvectors and eigenvalues (uj,λj) of the A are the DMD modes and eigenvalues respectively.
334
+ For systems with a large number of data points L, this direct method isn’t tractable since A is a L × L square matrix.
335
+ Therefore different methods are designed to 1) solve Equation 4 while 2) providing a reduced order model at the same
336
+ time. Among the most simple and popular methods for doing this is the SVD-based method:
337
+ 1. Compute the rank M SVD of Z1 = WΣV T .
338
+ 2. Consider ˜A ∶= W T AW. Then ˜A is M × M, and since it is unitarily equivalent to A, has the same eigenvalues
339
+ with eigenvectors ξ of ˜A related to A via Wξ.
340
+ 6
341
+
342
+ A PREPRINT - JANUARY 16, 2023
343
+ 3. Note that since Z2 ≅ AZ1 = AWΣV T , after multiplying by W T and rearranging we have
344
+ ˜A = W T AW = W T Z2V Σ−1.
345
+ In other words, ˜A can be computed directly from the data and SVD of Z1.
346
+ 4. Compute eigenvectors and eigenvalues {˜uj,λj} of the much smaller M × M matrix ˜A.
347
+ 5. The j′th DMD mode is computed as uj ∶= W ˜uj.
348
+ Other methods for approximating the DMD modes based off SVD exist, such as exact DMD. See [13].
349
+ The DMD modes and eigenvalues can be used to derive dynamical information analogous with the right singular vectors
350
+ of SVD. By iteratively applying Equation 3, we find that
351
+ ⃗zt+1 ≅ At⃗z1
352
+ (6)
353
+ Write ⃗z1 in the basis provided by the modes Ψ:
354
+ ⃗z1 = Ψ⃗b.
355
+ (7)
356
+ Then combining Equations 5, 6 and 7 we see that
357
+ ⃗zt+1 ≅ At⃗z1 = AtΨ⃗b = ΨΛt⃗b.
358
+ Hence, we have represented the state of the system in terms of a DMD mode expansion with temporal evolution on the
359
+ DMD eigenvalues. The time series {(λt
360
+ jbj)T
361
+ t=1}M
362
+ j=1 are referred to as the DMD dynamics for the j’th mode ψj.
363
+ References
364
+ [1] Martin D Buhmann. Radial basis functions. Acta numerica, 9:1–38, 2000.
365
+ [2] Noel Cressie, Matthew Sainsbury-Dale, and Andrew Zammit-Mangion. Basis-function models in spatial statistics.
366
+ arXiv preprint arXiv:2202.03660, 2022.
367
+ [3] DOE E3SM Project. Energy exascale earth system model v1.0. [Computer Software] https://doi.org/10.
368
+ 11578/E3SM/dc.20180418.36, apr 2018.
369
+ [4] S Elipot, A Sykulski, R Lumpkin, L Centurioni, and M Pazos. Hourly location, current velocity, and temperature
370
+ collected from global drifter program drifters world-wide. Accession, 248584:v1, 2022.
371
+ [5] Shane Elipot, Adam Sykulski, Rick Lumpkin, Luca Centurioni, and Mayra Pazos. A dataset of hourly sea surface
372
+ temperature from drifting buoys. arXiv preprint arXiv:2201.08289, 2022.
373
+ [6] Jean-Christophe Golaz, Peter M Caldwell, Luke P Van Roekel, Mark R Petersen, Qi Tang, Jonathan D Wolfe,
374
+ Guta Abeshu, Valentine Anantharaj, Xylar S Asay-Davis, David C Bader, et al. The doe e3sm coupled model
375
+ version 1: Overview and evaluation at standard resolution. Journal of Advances in Modeling Earth Systems,
376
+ 11(7):2089–2129, 2019.
377
+ [7] Nicholas J Higham. Accuracy and stability of numerical algorithms. SIAM, 2002.
378
+ [8] J Nathan Kutz, Steven L Brunton, Bingni W Brunton, and Joshua L Proctor. Dynamic mode decomposition:
379
+ data-driven modeling of complex systems. SIAM, 2016.
380
+ [9] Mark R Petersen, Xylar S Asay-Davis, Anne S Berres, Qingshan Chen, Nils Feige, Matthew J Hoffman, Douglas W
381
+ Jacobsen, Philip W Jones, Mathew E Maltrud, Stephen F Price, et al. An evaluation of the ocean and sea ice
382
+ climate of e3sm using mpas and interannual core-ii forcing. Journal of Advances in Modeling Earth Systems,
383
+ 11(5):1438–1458, 2019.
384
+ [10] Rolf H Reichle. Data assimilation methods in the earth sciences. Advances in water resources, 31(11):1411–1418,
385
+ 2008.
386
+ [11] Todd Ringler, Mark Petersen, Robert L Higdon, Doug Jacobsen, Philip W Jones, and Mathew Maltrud. A
387
+ multi-resolution approach to global ocean modeling. Ocean Modelling, 69:211–232, 2013.
388
+ [12] Claude Sammut and Geoffrey I Webb. Encyclopedia of machine learning. Springer Science & Business Media,
389
+ 2011.
390
+ [13] Jonathan H Tu. Dynamic mode decomposition: Theory and applications. PhD thesis, Princeton University, 2013.
391
+ 7
392
+
393
+ A PREPRINT - JANUARY 16, 2023
394
+ (a) Monthly errors - all models
395
+ (b) Monthly errors - top models
396
+ (c) Three month errors - all models
397
+ (d) Three month errors - top models
398
+ (e) Yearly errors - all models
399
+ (f) Yearly errors - top models
400
+ Figure 1: Figures (a), (c), (e) display the distribution of errors for all the models fit over one month, three month, and one year time
401
+ windows. Figures (b), (d), (f) show the top three models from distributions.
402
+ 8
403
+
404
+ 300
405
+ 250 -
406
+ 200-
407
+ Temp.
408
+ 150
409
+ 100 -
410
+ 50 -
411
+ 0
412
+ -
413
+ 8
414
+ MPAS
415
+ DMD_dyn
416
+ DMD
417
+ SVD_dyn
418
+ SVD
419
+ RBF
420
+ Model10
421
+ 8
422
+ 0
423
+ C
424
+ Temp.
425
+ 4
426
+ 2
427
+ MPAS
428
+ DMD_dyn
429
+ RBF
430
+ Model175
431
+ 150
432
+ 125
433
+ 100
434
+ Temp.
435
+ 75
436
+ 50
437
+ 25 -
438
+ 0
439
+ MPAS
440
+ DMD_dyn
441
+ DMD
442
+ SVD_dyn
443
+ SVD
444
+ RBF
445
+ Model8
446
+ 7 -
447
+ 6
448
+ Temp.
449
+ 0
450
+ 4
451
+ m
452
+ 2
453
+ 1
454
+ 0
455
+ MPAS
456
+ DMD_dyn
457
+ RBF
458
+ Model20.0
459
+ 0
460
+ 17.5
461
+ 15.0
462
+ 12.5
463
+ Temp.
464
+ 10.0
465
+ 7.5
466
+ 5.0
467
+ 2.5
468
+ 0.0
469
+ MPAS
470
+ DMD_dyn
471
+ DMD
472
+ SVD_dyn
473
+ SVD
474
+ RBF
475
+ Model5
476
+ 0
477
+ C
478
+ Temp.
479
+ m
480
+ 2
481
+ 1 -
482
+ MPAS
483
+ DMD_dyn
484
+ SVD_dyn
485
+ ModelA PREPRINT - JANUARY 16, 2023
486
+ (a) Errors of DMD basis versus adding dynamics
487
+ (b) Error over time - DMD basis versus adding dynamics
488
+ (c) Error distribution of top models
489
+ (d) Error over time - top models
490
+ Figure 2: Errors of models for time period Jan. 1st 2008-Jan 1st 2009. Plots (a) and (c) display error distributions for different models.
491
+ Plots (b) and (d) compute the average error on each of the five day time slices to explore inability to capture seasonality/baises.
492
+ 9
493
+
494
+ 1.0
495
+ 0.5
496
+ 0.0
497
+ 0.5
498
+ 1.0
499
+ -1.5
500
+ 2.0
501
+ Errors: yi - F(xi)
502
+ MPAS
503
+ 2.5
504
+ DMD dyn
505
+ RBF
506
+ 0
507
+ 10
508
+ 20
509
+ 30
510
+ 40
511
+ 50
512
+ 60
513
+ 70
514
+ Time StepErrors: yi - F(xi)
515
+ 250
516
+ DMD_dyn
517
+ DMD
518
+ 200-
519
+ 100 -
520
+ 50 -
521
+ 0
522
+ 7.5
523
+ 5.0
524
+ 2.5
525
+ 0.0
526
+ 2.5
527
+ 5.0
528
+ 7.5
529
+ 10.0
530
+ 12.5
531
+ Temperature C3
532
+ 0
533
+ Errors: yi - F(xi)
534
+ DMD
535
+ DMD_dyn
536
+ -3
537
+ 0
538
+ 10
539
+ 20
540
+ 30
541
+ 40
542
+ 50
543
+ 60
544
+ 70
545
+ Time Step250
546
+ Errors: yi - F(xi)
547
+ MPAS
548
+ DMD_dyn
549
+ 200-
550
+ RBF
551
+ 150 -
552
+ Count
553
+ 100-
554
+ 50 -
555
+ 0
556
+ 7.5
557
+ 5.0
558
+ 2.5
559
+ 0.0
560
+ 2.5
561
+ 5.0
562
+ 7.5
563
+ 10.0
564
+ Temperature CA PREPRINT - JANUARY 16, 2023
565
+ (a) Fully dynamic DMD basis interpolation
566
+ (b) Difference between fully dynamic DMD basis and MPAS: FMPAS(xi) − FDMD_dyn(xi)
567
+ (c) SST distribution of MPAS versus fully dynamic DMD
568
+ basis
569
+ Figure 3: Average yearly temperature comparison of fully dynamic DMD versus MPAS-O for time period Jan. 1st 2008-Jan 1st
570
+ 2009
571
+ 10
572
+
573
+ 0
574
+ 5
575
+ 10
576
+ 15
577
+ 20
578
+ 25
579
+ 30
580
+ Temperature C"-4
581
+ 0
582
+ 2
583
+ Temperature CSST Distribution: 2008-01-01
584
+ 800-
585
+ MPAS
586
+ DMD_dyn
587
+ 700
588
+ 600
589
+ Count
590
+ 500
591
+ 400
592
+ 300-
593
+ 200-
594
+ 100
595
+ 0
596
+ 5
597
+ 10
598
+ 15
599
+ 20
600
+ 25
601
+ Temperature C*A PREPRINT - JANUARY 16, 2023
602
+ (a) Buoy observations
603
+ (b) Fully dynamic DMD errors on buoys: yi − F(xi)
604
+ (c) MPAS errors on buoys: yi − F(xi)
605
+ Figure 4: (a) Buoy observations, with (b) Fully dynamic DMD errors and (c) MPAS errors on test buoys for year Jan. 1st 2008-Jan
606
+ 1st 2009.
607
+ 11
608
+
609
+ Buoy Test
610
+ 5
611
+ 10
612
+ 15
613
+ 20
614
+ 25
615
+ 30
616
+ Temperature CTest error
617
+ -6
618
+ -4
619
+ 2
620
+ 0
621
+ 2
622
+ 4
623
+ TemperatureCTest error
624
+ -8
625
+ -6
626
+ -4
627
+ -2
628
+ 0
629
+ 2
630
+ 4
631
+ 6
632
+ 8
633
+ TemperatureC
FtE5T4oBgHgl3EQfVg81/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,347 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf,len=346
2
+ page_content='DYNAMIC DATA ASSIMILATION OF MPAS-O AND THE GLOBAL DRIFTER DATASET A PREPRINT Derek DeSantis CCS-2, W-13 Los Alamos National Laboratory ddesantis@lanl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
3
+ page_content='gov Ayan Biswas CCS-3 Los Alamos National Laboratory ayan@lanl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
4
+ page_content='gov Earl Lawrence CCS-6 Los Alamos National Laboratory earl@lanl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
5
+ page_content='gov Phillip J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
6
+ page_content=' Wolfram W-13 Los Alamos National Laboratory pwolfram@lanl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
7
+ page_content='gov January 16, 2023 Keywords Data assimilation ⋅ Dynamic Mode Decomposition ⋅ Ocean Dynamics ⋅ E3SM ⋅ GDP Abstract In this study, we propose a new method for combining in situ buoy measurements with Earth system models (ESMs) to improve the accuracy of temperature predictions in the ocean.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
8
+ page_content=' The technique utilizes the dynamics and modes identified in ESMs to improve the accuracy of buoy measurements while still preserving features such as seasonality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
9
+ page_content=' Using this technique, errors in localized temperature predictions made by the MPAS-O model can be corrected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
10
+ page_content=' We demonstrate that our approach improves accuracy compared to other interpolation and data assimilation methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
11
+ page_content=' We apply our method to assimilate the Model for Prediction Across Scales Ocean component (MPAS-O) with the Global Drifter Program’s in-situ ocean buoy dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
12
+ page_content=' 1 Introduction In the field of Earth System Sciences, it is important to constantly improve the accuracy of measurements and models in order to better understand the Earth’s climate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
13
+ page_content=' One way to analyze climate is through the use of powerful Earth system models (ESMs), such as the DOE’s Energy Exascale Earth System Model (E3SM) [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
14
+ page_content=' ESMs provide estimates of state variables across a large number of grid cells, such as the Model for Prediction Across Scales Ocean component (MPAS-O), which is used in the E3SM and provides temperature estimates at different sized ocean cells [6, 9, 11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
15
+ page_content=' Another method for studying climate is through direct in situ observations, such as those collected by satellites, towers, or ocean buoys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
16
+ page_content=' These observations are more accurate at specific locations, but are limited in coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
17
+ page_content=' An example of a highly resolved ocean buoy dataset is the Global Drifter dataset program (GDP) overseen by NOAA [5, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
18
+ page_content=' In many cases, scientists use interpolation techniques to estimate state variables, such as temperature or salinity, between observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
19
+ page_content=' Each of these approaches has its own advantages and disadvantages, and integrating both types of data can provide the greatest flexibility and predictive power [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
20
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
21
+ page_content='05551v1 [physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
22
+ page_content='ao-ph] 11 Jan 2023 A PREPRINT - JANUARY 16, 2023 Basis function models, which use linear combinations of continuous functions to estimate a state, are a flexible and computationally efficient method for solving non-stationary systems [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
23
+ page_content=' In these models, a set of basis functions are chosen or discovered, and the associated coefficient weights for an unknown function in the space are learned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
24
+ page_content=' In this work, we propose a new basis function model for data integration and compare its effectiveness to other data integration methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
25
+ page_content=' We will explore three different methods for obtaining basis functions: 1) basis functions fit purely from in situ observations, 2) basis functions discovered through ESMs and fit to in situ data, and 3) our newly developed dynamic model, which builds on the second approach by weighting the basis functions according to extracted dynamical information from the ESM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
26
+ page_content=' In the following sections, we provide background information and detail the techniques used in this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
27
+ page_content=' In Section Three, we present the results of these methods for assimilating GDP data with MPAS-O and show that the dynamic method provides the best overall results in terms of mean squared error.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
28
+ page_content=' We also discuss how the dynamic method is able to correct for biases within the MPAS model while simultaneously adjusting for temporal variations, which the other basis methods fail to capture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
29
+ page_content=' 2 Methods 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
30
+ page_content='1 Notation, Data set dimensions and variables Throughout this study, let M denote the physical domain of interest in the ocean, specifically the Atlantic Ocean between latitudes 15○ − 55○ N and longitudes 260○ − 20○ E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
31
+ page_content=' The discrete times for buoy and model observations are denoted by tj for j = 1,2,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
32
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
33
+ page_content=',T, with a time increment of five days between each slice (tj+1 − tj).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
34
+ page_content=' The number of time slices will vary depending on the training problem, but examples we will consider are T=6, 18, and 74, corresponding to one month, one season, and one year, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
35
+ page_content=' At each time tj, there are Nj buoy measurements, and the total number of buoy measurements over the entire time period from t1 to tT is denoted by N = ∑T j=1 Nj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
36
+ page_content=' We use {xi}N i=1 ⊂ M and {yi}N i=1 ⊂ R to represent the complete set of buoy locations and temperature measurements, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
37
+ page_content=' For emphasis, the buoy measurements indexed by {(xi,yi)}Nj+1−1 i=Nj correspond to all the data at time tj, and we use (xi(tj),yi(tj)) to refer to a single datum at time tj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
38
+ page_content=' For a fixed set of sequential temporal observations, we let [t1 ∶ tT ] = {t1,t2,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
39
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
40
+ page_content=',tT }.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
41
+ page_content=' For the ESM data, there are L fixed grid center locations {wl}L l=1 ⊂ M that provide temperature measurements at each time t1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
42
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
43
+ page_content='tT .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
44
+ page_content=' These grid cells cover the entire domain M , and each buoy position {xi}N i=1 ⊂ M belongs to one of the grid cells from the ESM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
45
+ page_content=' We let ˆxi denote the index of the cell that buoy xi belongs to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
46
+ page_content=' Similar to the notation used for the buoy data, we use {zl(tj)}L l=1 to represent the ESM temperature measurements at time tj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
47
+ page_content=' In this study, we will use the The Model for Prediction Across Scales Ocean component (MPAS-O) as our ESM and the Global Drifter Program (GDP) for ocean buoy data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
48
+ page_content=' MPAS-O is an ocean model that simulates ocean systems on time scales ranging from months to millenia and spatial scales as small as sub 1 kilometer [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
49
+ page_content=' Specifically, we will be using the V1 historical run of MPAS-O [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
50
+ page_content=' The GDP is a large array of more than 1000 satellite-tracked ocean buoys that measure ocean variables such as drift and sea surface temperature, and are commonly used in weather prediction [5, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
51
+ page_content=' These two datasets have different temporal resolutions, so some time averaging within the GDP is required to match the MPAS-O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
52
+ page_content=' See the appendix for more details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
53
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
54
+ page_content='2 Basis Function Interpolation for Data Integration Basis function interpolation is a useful method for data integration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
55
+ page_content=' In general, interpolation involves finding a function F ∶ M → R such that F(xi) ≅ yi for i = 1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
56
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
57
+ page_content=',N, where M is the domain of interest, {xi} are known points in M, and {yi} are corresponding values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
58
+ page_content=' One approach to constructing F is to represent it as a linear combination of simple basis functions φj ∶ M → R, belonging to the same class as F, as follows: F(x) = M ∑ j=1 ajφj(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
59
+ page_content=' This reduces the interpolation problem to a regression problem, where we seek to determine the coefficients {aj} by fitting the function F to the data points {(xi,yi)}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
60
+ page_content=' To perform a basis function interpolation, we first select or discover the basis functions {φj}M j=1, and then solve the regression problem: yi ≅ F(xi) = M ∑ j=1 ajφj(xi).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
61
+ page_content=' 2 A PREPRINT - JANUARY 16, 2023 This is a regression problem that can be solved by selecting a set of basis functions {φj}M j=1 and finding the coefficients {aj} that best fit the data points {(xi,yi)}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
62
+ page_content=' This can be written in matrix form as: ⃗y ≅ Φ⃗a, (1) where Φi,j = φj(xi), ⃗y = (y1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
63
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
64
+ page_content=',yN)T , and ⃗a = (a1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
65
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
66
+ page_content=',aM)T .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
67
+ page_content=' The least-square solution to Equation 1 is obtained by taking the Moore-Penrose inverse of Φ on both sides: ⃗a ≅ Φ†⃗y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
68
+ page_content=' The Moore-Penrose inverse can be computed using the singular value decomposition (SVD) of Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
69
+ page_content=' If the SVD of Φ is given by Φ = UΣV T , then the Moore-Penrose inverse is Φ† = V Σ†U T , where Σ† is found by taking the transpose and inverting each entry on the diagonal of Σ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
70
+ page_content=' In many cases, the matrix Φ may be ill-conditioned, in which case regularization is needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
71
+ page_content=' Optimization is performed over a range of regularization parameters to find the best fit on the training data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
72
+ page_content=' Once the coefficients ⃗a have been obtained, the model can be tested for accuracy on the test data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
73
+ page_content=' Data integration is achieved through basis function interpolation by selecting basis functions derived from the ESM and interpolating them over the buoy observations {(xi,yi)}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
74
+ page_content=' In this work, we will consider different types of basis functions and different temporal ranges for the interpolation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
75
+ page_content=' The basis functions do not need to be orthogonal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
76
+ page_content=' In the next section, we will describe our choice of models in more detail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
77
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
78
+ page_content='3 Radial Basis Functions - Purely Buoy Data Driven One approach to deriving F is to use only the observations {(xi,yi)} and ignore the ESM data completely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
79
+ page_content=' In this case, a natural choice is to use radial basis functions (RBFs) for φj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
80
+ page_content=' Specifically, we can define φj(x) = ψ(∣x − µj∣), where ψ ∶ M → R is a fixed function (such as a Gaussian) and µj ∈ M are the mean or center points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
81
+ page_content=' Often, the RBF chosen has a tuning parameter ϵ, such as the standard deviation in a Gaussian.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
82
+ page_content=' In addition to the RBFs, it is also common to include a polynomial term P(x) of degree D to capture mean behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
83
+ page_content=' Therefore, F ∶ M → R can be expressed as: F(x) = P(x) + M ∑ j=1 ajφj(x) (2) In this approach, the user must choose the number of basis functions M, the centers µj, the basis functions φj, and the degree of the interpolating polynomial D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
84
+ page_content=' A common choice for M and µj is to use the size of the training set N and the locations of the training set, and is the practice adopted here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
85
+ page_content=' For more information on RBFs, see [1, 12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
86
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
87
+ page_content='4 Static ESM Mode Decompositions for Basis In this subsection, we describe how to obtain basis functions {φj}j = 1M from the ESM data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
88
+ page_content=' We consider two methods for extracting spatially coherent functions, or modes of variability, that are faithful to the spatial grid {wl}L l=1 provided by the ESM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
89
+ page_content=' First, we describe how to obtain these modes, and then discuss how to use them to produce basis functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
90
+ page_content=' For each time t ∈ [t1 ∶ tT ], the ESM data zl(t)L l=1 provides an estimate of the temperature distribution over the spatial domain M at time t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
91
+ page_content=' This data can be arranged into an L × T matrix Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
92
+ page_content=' The Singular Value Decomposition (SVD) can be used to directly obtain modes [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
93
+ page_content=' Let Z ≅ UΣV T be the rank-M SVD of Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
94
+ page_content=' The M left singular vectors in the columns of U = [U1,U2,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
95
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
96
+ page_content=',UM] ∈ RL,M form a set of (orthogonal) spatial modes for Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
97
+ page_content=' Another method for extracting modes and their associated oscillation frequencies is the Dynamic Mode Decomposition (DMD) [8, 13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
98
+ page_content=' Unlike SVD, the derived modes are not orthogonal, which allows DMD to capture more physically relevant modes within the decomposition (at the potential cost of parsimony).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
99
+ page_content=' The process of computing DMD modes {Uj}M j=1 is more involved than SVD and is briefly summarized in the appendix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
100
+ page_content=' Since each point x ∈ M belongs to one of the grid cells {wl}L l=1 of the ESM, any mode decomposition of Z can be used for interpolation by evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
101
+ page_content=' Specifically, let ˆx denote the cell index l = 1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
102
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
103
+ page_content=',L that the point x belongs to, and {Uj}M j=1 ⊂ RL be modes of Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
104
+ page_content=' We define the static (SVD or DMD) mode basis as φj(x) ∶= Uˆx,j for each j = 1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
105
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
106
+ page_content=',M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
107
+ page_content=' In other words, the static mode basis is simply the spatial modes obtained through the modal decomposition (SVD or DMD).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
108
+ page_content=' 3 A PREPRINT - JANUARY 16, 2023 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
109
+ page_content='5 Dynamic ESM Mode Decompositions for Basis Both of the mode-based decompositions discussed in the previous subsection also include additional dynamical information that has not been utilized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
110
+ page_content=' In this subsection, we present a method for incorporating this information into basis function interpolation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
111
+ page_content=' In SVD, the left singular vectors U = [U1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
112
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
113
+ page_content=',UM] ∈ RL,M represent spatial patterns, while the right singular vectors V = [V1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
114
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
115
+ page_content=',VT ] ∈ RT,M represent the intensity of each of the M patterns across the T time slices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
116
+ page_content=' Similarly, DMD produces its M DMD modes U = [U1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
117
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
118
+ page_content=',UM] ∈ RL,M and their associated dynamics (intensity across time), as described in the appendix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
119
+ page_content=' For a mode decomposition, let αj(t) describe the dynamics of the DMD mode Uj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
120
+ page_content=' Each buoy measurement (xi,yi) is taken at a specific time t ∈ [t1 ∶ tT ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
121
+ page_content=' More generally, we can associate each point x ∈ M with a time t ∈ [t1 ∶ tT ] at which we want to provide interpolation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
122
+ page_content=' We define the dynamic (SVD or DMD) mode basis as φj(x) ∶= αj(t)Uˆx,j for each j = 1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
123
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
124
+ page_content=',M 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
125
+ page_content=' In other words, the dynamic mode basis is obtained from the static mode basis by weighting the static mode at an observation by its intensity at the time of the observation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
126
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
127
+ page_content='6 MPAS-O - Purely ESM Data Driven As a baseline, we will compare the performance of our basis models to the ESM, which provides an approximation of the surface temperature over M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
128
+ page_content=' Ideally, the ESM would accurately represent the in-situ buoy measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
129
+ page_content=' To do this, we can compute the ESM baseline by finding the ESM cell that each buoy belongs to and comparing the model’s output to the buoy measurement: z ˆ wi(tj) − yi(tj).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
130
+ page_content=' 3 Results Figure 1 displays the test errors for the different models for three different now-cast time lengths T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
131
+ page_content=' Each model from Section 2 is fit for lengths T = 6,18 or 74 to represent one month, three months, or one year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
132
+ page_content=' The model is fit on 80% of the data and tested on the remaining 20% to produce an error measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
133
+ page_content=' A distribution of errors for each model, and each time T is created by choosing different starting times t1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
134
+ page_content=' A total of 100 start times t1 are chosen uniformly spaced one month apart from one another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
135
+ page_content=' The left side of Figure 1 displays the box and whisker plot for each of the error distributions of each model at each time length T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
136
+ page_content=' The right side of Figure 1 displays the top three best performing models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
137
+ page_content=' Figure 1 shows the test errors for the different models for three different now-cast time lengths T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
138
+ page_content=' Each model from Section 2 is fit for lengths T = 6,18 or 74 to represent one month, three months, or one year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
139
+ page_content=' The model is fit on 80% of the data and tested on the remaining 20% to produce an error measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
140
+ page_content=' A distribution of errors for each model and each time T is created by choosing different starting times t1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
141
+ page_content=' A total of 100 start times t1 are chosen uniformly spaced one month apart from one another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
142
+ page_content=' The left side of Figure 1 displays the box and whisker plot for each of the error distributions of each model at each time length T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
143
+ page_content=' The right side of Figure 1 displays the top three best-performing models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
144
+ page_content=' One key takeaway from Figure 1 is that in each scenario, the dynamic basis interpolation using DMD modes outperforms MPAS across all time scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
145
+ page_content=' While the RBF model performs better than the fully dynamic DMD model on the short timescale of one month, it performs worse on longer timescales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
146
+ page_content=' Another important observation is that the SVD methods perform better on longer timescales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
147
+ page_content=' On the short timescale of one month, both SVD methods have a poor fit, but on the one-year fit, the dynamic SVD begins to outperform the RBF model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
148
+ page_content=' Given the dominance of the fully dynamic DMD model over the other basis models, we will focus on its benefits in future analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
149
+ page_content=' Next, we will perform a deeper analysis of the model performance over a single year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
150
+ page_content=' For demonstration purposes, we have selected the date range of Jan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
151
+ page_content=' 1st, 2008 to Jan 1st, 2009 to display here 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
152
+ page_content=' Figure 2(a) shows how the test error 1Note that since the dynamic information αj(t) has already been captured, the added complexity compared to the static method is O(1) per observation 2While we focus on Jan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
153
+ page_content=' 1st, 2008 to Jan 1st, 2009, the results presented here are representative of the general year-long phenomenon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
154
+ page_content=' The following discussion and analysis can be applied to any time slice, since the fully dynamic models have temporal information 4 A PREPRINT - JANUARY 16, 2023 is improved by adding the dynamic component to the DMD mode decomposition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
155
+ page_content=' The DMD basis decomposition has a somewhat bimodal error, indicating that the model has over- or undercompensated for SST in some regions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
156
+ page_content=' Figure 2(b) illustrates that this is due to seasonality - the basic DMD model has discovered a mean state to represent the temperature, missing the extremes of both summer and winter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
157
+ page_content=' Weighting the modes by their dynamics removes these biases, producing a normally distributed error with a much lower standard deviation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
158
+ page_content=' Figure 2(c) shows that MPAS has a hot temperature bias, pushing the distribution’s mean into the negatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
159
+ page_content=' This is further seen in Figure 2(d), where MPAS appears to have a negative temperature bias across the whole year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
160
+ page_content=' Finally, we will analyze the spatial distribution of the discovered temperature field to ensure that it adheres to known physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
161
+ page_content=' Figure 3(a) shows the average yearly temperature field interpolation provided by the fully dynamic DMD model, while figure (b) displays the difference between the fully dynamic DMD and MPAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
162
+ page_content=' Figure 3(c) shows the temperature distribution for both the fully dynamic DMD basis model and MPAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
163
+ page_content=' Figure 4(a) plots the location and temperature of the test buoys across the year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
164
+ page_content=' Figure 4(b) and (c) show the test errors of the fully dynamic DMD and MPAS models, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
165
+ page_content=' The buoy errors in Figure 4 show that MPAS has a clear latitudinal temperature bias, whereas the fully dynamic DMD has relatively uniform errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
166
+ page_content=' Figures 3 and 4 show that the interpolation method discovered by the fully dynamic DMD is not dissimilar from the physical model MPAS-O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
167
+ page_content=' The primary difference is a lower temperature in the fully dynamic DMD model in the higher latitudes (the location where MPAS-O has a large temperature bias).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
168
+ page_content=' This suggests that the dynamic model is learning something that is physically consistent with MPAS, while simultaneously improving upon its ground truth accuracy as measured by the GDD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
169
+ page_content=' 4 Discussion RBF methods can provide an arbitrary, unrealistic goodness of fit by adding more nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
170
+ page_content=' Since the RBF centers are chosen from the buoy locations, this model is less sensitive to time scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
171
+ page_content=' As noted above, on longer time lengths RBF begins to perform more poorly compared to other models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
172
+ page_content=' This is likely due to the fact that RBF works to find the best fits at the time the buoy measurements are made.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
173
+ page_content=' As a result, if longer timescales are included, the RBF model will fit a dataset with nearby buoy measurements with seasonal variability, such as Winter and Summer measurements in close proximity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
174
+ page_content=' This lack of physical knowledge makes the fit rather unrealistic, as nearby nodes in the model compete for what the "real" value should be, resulting in high spatial variability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
175
+ page_content=' The SVD works to reduce noise, and in noise-dominated cases can be effectively swamped in such a way that it does not provide clear basis modes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
176
+ page_content=' As discussed in the previous section, the SVD models perform extremely poorly on short timescales of one to three months.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
177
+ page_content=' On such timescales, the high-frequency data can dominate the signal, causing poor predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
178
+ page_content=' This might be due in part to the fact that SVD assumes orthogonal, non-interacting modes, which are poor at capturing shorter timescales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
179
+ page_content=' DMD provides better estimates of spatio-temporal evolution than SVD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
180
+ page_content=' This could be due in part to the fact that DMD modes have dynamics described by the growth and decay of eigenvalues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
181
+ page_content=' As such, the spatial modes are unambiguously associated with particular months, seasons, cycles, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
182
+ page_content=' Consequently, DMD can intrinsically adapt to seasonal changes better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
183
+ page_content=' While SVD does provide dynamic information, DMD is explicitly built to extract different modes of variability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
184
+ page_content=' Climate change identification and predictions can be made with DMD, whereas the SVD’s lack of flexibility and susceptibility to noise make it less accurate because it is not temporally adaptable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
185
+ page_content=' That said, the static mode decomposition using DMD modes appears to get worse as you increase the time window.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
186
+ page_content=' This is due to the fact that the weight of the mean state still dominates, as shown in Figure 2 and discussed above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
187
+ page_content=' The key discovery from the previous section is that adding available dynamics, specifically to the DMD method of interpolation, improves predictive skill while correcting for mean biasing (Figure 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
188
+ page_content=' We want to use the dynamic models when the time includes seasonal features (longer time scales).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
189
+ page_content=' This is because the fully dynamic DMD captures different time scales and reweights them into the model, whereas other basis models either do an arbitrary fit (RBF) or capture means (Figure 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
190
+ page_content=' The fully dynamic DMD method also improves the biases of MPAS as seen by combining the buoy and spatial pictures of Figures 3 and 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
191
+ page_content=' As noted above, the fully dynamic DMD model corrects for the temperature bias within MPAS-O at higher latitudes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
192
+ page_content=' The discovered DMD modes capture the dynamics of MPAS-O, while having the flexibility to be reweighted to match the real observational data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
193
+ page_content=' 5 Conclusion In this paper, we compared various methods for interpolating ocean buoy data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
194
+ page_content=' In particular, we are interested in the data assimilation of the ESM ocean data MPAS-O with in situ GDP buoy data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
195
+ page_content=' Our analysis showed that the performance of an interpolation method depends on the time scale being considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
196
+ page_content=' Some methods may be more effective for short time scales, while others may perform better on longer time scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
197
+ page_content=' We found that adding dynamic information, 5 A PREPRINT - JANUARY 16, 2023 specifically to the DMD method, improves predictive accuracy and corrects for biases on longer time scales with seasonal dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
198
+ page_content=' The DMD with dynamics was consistently the best performer among all methods, improving the ESM MPAS-O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
199
+ page_content=' We demonstrated that the DMD with dynamics is not overfitting and is making reasonable spatial predictions while also correcting for biases in MPAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
200
+ page_content=' Therefore, we conclude that the DMD with dynamics is the superior method among those examined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
201
+ page_content=' This type of dynamic decomposition for interpolating ocean data that can adapt to both high and low frequency information show great potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
202
+ page_content=' The dynamic data assimilation technique discussed here allow for more data-rich analysis that could be useful for understanding evolving dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
203
+ page_content=' Further applications of these approaches may be useful and application to in-situ analysis or data assimilation appear most promising.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
204
+ page_content=' 6 Acknowledgements Research presented in this article was supported by the Laboratory Directed Research and Development program of Los Alamos National Laboratory under project number 20200065DR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
205
+ page_content=' DD was supported by the DOE Office of Science Biological and Environmental Research (BER), as a contribution to the HiLAT-RASM project.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
206
+ page_content=' MPAS-O V1 were obtained from the Energy Exascale Earth System Model project, sponsored by the U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
207
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
208
+ page_content='Department of Energy, Office of Science, Office of Biological and Environmental Research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
209
+ page_content=' Satellite-tracked drifting buoy data are available from the Global Drifter Program (GDP), with support from their website (ftp://ftp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
210
+ page_content='aoml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
211
+ page_content='noaa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
212
+ page_content='gov/pub/phod/buoydata/).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
213
+ page_content=' 7 Appendix 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
214
+ page_content='1 Time Filtering GDD Data to MPAS-O The MPAS-O and GDP datasets are on different temporal resolutions (Five day averages versus six hour).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
215
+ page_content=' We therefore coarse-grained the GDP data in time to fit the temporal resolution of MPAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
216
+ page_content=' Given two sequential MPAS-O time snapshots t and t + 1, all the GDP buoy data is collected within each of those five days.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
217
+ page_content=' For each buoy, the average spatial location and temperature is then recorded and used as {xi(t)} and {yi(t)}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
218
+ page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
219
+ page_content='2 DMD Short Summary In the Dynamic Mode Decomposition (DMD), the system is assumed to be evolved in an approximately linear fashion: ⃗zt+1 ≅ A⃗zt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
220
+ page_content=' (3) This is effectively the solution of a forward-in-time spatially discrete solver, where A can contain physical operators such as advection, diffusion, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
221
+ page_content=' The value in this form is that growth, decay, and oscillatory behavior is all immediately represented, albeit pseudo-linearly from one time step to the next.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
222
+ page_content=' Given this interpretation, one can think of A as effectively a learned, empirical physically-meaningful discretization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
223
+ page_content=' Let Z1 and Z2 be the matrices given by Z1 = [⃗z1⃗z2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
224
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
225
+ page_content=' ⃗zT −1] and Z2 = [⃗z2⃗z3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
226
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
227
+ page_content=' ⃗zT ].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
228
+ page_content=' The goal is to find a good approximation ˜A of the matrix A that represents this system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
229
+ page_content=' This can be cast as the following matrix problem: Z2 ≅ AZ1 (4) The least square solution to Equation 4 is found by taking the Moore-Penrose inverse: A ≅ Z2Z† 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
230
+ page_content=' Since A is a square matrix, one can consider the eigen-decomposition of A: AU = UΛ (5) The eigenvectors and eigenvalues (uj,λj) of the A are the DMD modes and eigenvalues respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
231
+ page_content=' For systems with a large number of data points L, this direct method isn’t tractable since A is a L × L square matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
232
+ page_content=' Therefore different methods are designed to 1) solve Equation 4 while 2) providing a reduced order model at the same time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
233
+ page_content=' Among the most simple and popular methods for doing this is the SVD-based method: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
234
+ page_content=' Compute the rank M SVD of Z1 = WΣV T .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
235
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
236
+ page_content=' Consider ˜A ∶= W T AW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
237
+ page_content=' Then ˜A is M × M, and since it is unitarily equivalent to A, has the same eigenvalues with eigenvectors ξ of ˜A related to A via Wξ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
238
+ page_content=' 6 A PREPRINT - JANUARY 16, 2023 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
239
+ page_content=' Note that since Z2 ≅ AZ1 = AWΣV T , after multiplying by W T and rearranging we have ˜A = W T AW = W T Z2V Σ−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
240
+ page_content=' In other words, ˜A can be computed directly from the data and SVD of Z1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
241
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
242
+ page_content=' Compute eigenvectors and eigenvalues {˜uj,λj} of the much smaller M × M matrix ˜A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
243
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
244
+ page_content=' The j′th DMD mode is computed as uj ∶= W ˜uj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
245
+ page_content=' Other methods for approximating the DMD modes based off SVD exist, such as exact DMD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
246
+ page_content=' See [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
247
+ page_content=' The DMD modes and eigenvalues can be used to derive dynamical information analogous with the right singular vectors of SVD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
248
+ page_content=' By iteratively applying Equation 3, we find that ⃗zt+1 ≅ At⃗z1 (6) Write ⃗z1 in the basis provided by the modes Ψ: ⃗z1 = Ψ⃗b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
249
+ page_content=' (7) Then combining Equations 5, 6 and 7 we see that ⃗zt+1 ≅ At⃗z1 = AtΨ⃗b = ΨΛt⃗b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
250
+ page_content=' Hence, we have represented the state of the system in terms of a DMD mode expansion with temporal evolution on the DMD eigenvalues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
251
+ page_content=' The time series {(λt jbj)T t=1}M j=1 are referred to as the DMD dynamics for the j’th mode ψj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
252
+ page_content=' References [1] Martin D Buhmann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
253
+ page_content=' Radial basis functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
254
+ page_content=' Acta numerica, 9:1–38, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
255
+ page_content=' [2] Noel Cressie, Matthew Sainsbury-Dale, and Andrew Zammit-Mangion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
256
+ page_content=' Basis-function models in spatial statistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
257
+ page_content=' arXiv preprint arXiv:2202.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
258
+ page_content='03660, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
259
+ page_content=' [3] DOE E3SM Project.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
260
+ page_content=' Energy exascale earth system model v1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
261
+ page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
262
+ page_content=' [Computer Software] https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
263
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
264
+ page_content=' 11578/E3SM/dc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
265
+ page_content='20180418.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
266
+ page_content='36, apr 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
267
+ page_content=' [4] S Elipot, A Sykulski, R Lumpkin, L Centurioni, and M Pazos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
268
+ page_content=' Hourly location, current velocity, and temperature collected from global drifter program drifters world-wide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
269
+ page_content=' Accession, 248584:v1, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
270
+ page_content=' [5] Shane Elipot, Adam Sykulski, Rick Lumpkin, Luca Centurioni, and Mayra Pazos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
271
+ page_content=' A dataset of hourly sea surface temperature from drifting buoys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
272
+ page_content=' arXiv preprint arXiv:2201.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
273
+ page_content='08289, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
274
+ page_content=' [6] Jean-Christophe Golaz, Peter M Caldwell, Luke P Van Roekel, Mark R Petersen, Qi Tang, Jonathan D Wolfe, Guta Abeshu, Valentine Anantharaj, Xylar S Asay-Davis, David C Bader, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
275
+ page_content=' The doe e3sm coupled model version 1: Overview and evaluation at standard resolution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
276
+ page_content=' Journal of Advances in Modeling Earth Systems, 11(7):2089–2129, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
277
+ page_content=' [7] Nicholas J Higham.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
278
+ page_content=' Accuracy and stability of numerical algorithms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
279
+ page_content=' SIAM, 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
280
+ page_content=' [8] J Nathan Kutz, Steven L Brunton, Bingni W Brunton, and Joshua L Proctor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
281
+ page_content=' Dynamic mode decomposition: data-driven modeling of complex systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
282
+ page_content=' SIAM, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
283
+ page_content=' [9] Mark R Petersen, Xylar S Asay-Davis, Anne S Berres, Qingshan Chen, Nils Feige, Matthew J Hoffman, Douglas W Jacobsen, Philip W Jones, Mathew E Maltrud, Stephen F Price, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
284
+ page_content=' An evaluation of the ocean and sea ice climate of e3sm using mpas and interannual core-ii forcing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
285
+ page_content=' Journal of Advances in Modeling Earth Systems, 11(5):1438–1458, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
286
+ page_content=' [10] Rolf H Reichle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
287
+ page_content=' Data assimilation methods in the earth sciences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
288
+ page_content=' Advances in water resources, 31(11):1411–1418, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
289
+ page_content=' [11] Todd Ringler, Mark Petersen, Robert L Higdon, Doug Jacobsen, Philip W Jones, and Mathew Maltrud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
290
+ page_content=' A multi-resolution approach to global ocean modeling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
291
+ page_content=' Ocean Modelling, 69:211–232, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
292
+ page_content=' [12] Claude Sammut and Geoffrey I Webb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
293
+ page_content=' Encyclopedia of machine learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
294
+ page_content=' Springer Science & Business Media, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
295
+ page_content=' [13] Jonathan H Tu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
296
+ page_content=' Dynamic mode decomposition: Theory and applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
297
+ page_content=' PhD thesis, Princeton University, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
298
+ page_content=' 7 A PREPRINT - JANUARY 16, 2023 (a) Monthly errors - all models (b) Monthly errors - top models (c) Three month errors - all models (d) Three month errors - top models (e) Yearly errors - all models (f) Yearly errors - top models Figure 1: Figures (a), (c), (e) display the distribution of errors for all the models fit over one month, three month, and one year time windows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
299
+ page_content=' Figures (b), (d), (f) show the top three models from distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
300
+ page_content=' 8 300 250 - 200- Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
301
+ page_content=' 150 100 - 50 - 0 8 MPAS DMD_dyn DMD SVD_dyn SVD RBF Model10 8 0 C Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
302
+ page_content=' 4 2 MPAS DMD_dyn RBF Model175 150 125 100 Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
303
+ page_content=' 75 50 25 - 0 MPAS DMD_dyn DMD SVD_dyn SVD RBF Model8 7 - 6 Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
304
+ page_content=' 0 4 m 2 1 0 MPAS DMD_dyn RBF Model20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
305
+ page_content='0 0 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
306
+ page_content='5 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
307
+ page_content='0 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
308
+ page_content='5 Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
309
+ page_content=' 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
310
+ page_content='0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
311
+ page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
312
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
313
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
314
+ page_content='0 MPAS DMD_dyn DMD SVD_dyn SVD RBF Model5 0 C Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
315
+ page_content=' m 2 1 - MPAS DMD_dyn SVD_dyn ModelA PREPRINT - JANUARY 16, 2023 (a) Errors of DMD basis versus adding dynamics (b) Error over time - DMD basis versus adding dynamics (c) Error distribution of top models (d) Error over time - top models Figure 2: Errors of models for time period Jan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
316
+ page_content=' 1st 2008-Jan 1st 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
317
+ page_content=' Plots (a) and (c) display error distributions for different models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
318
+ page_content=' Plots (b) and (d) compute the average error on each of the five day time slices to explore inability to capture seasonality/baises.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
319
+ page_content=' 9 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
320
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
321
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
322
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
323
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
324
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
325
+ page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
326
+ page_content='0 Errors: yi - F(xi) MPAS 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
327
+ page_content='5 DMD dyn RBF 0 10 20 30 40 50 60 70 Time StepErrors: yi - F(xi) 250 DMD_dyn DMD 200- 100 - 50 - 0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
328
+ page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
329
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
330
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
331
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
332
+ page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
333
+ page_content='0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
334
+ page_content='5 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
335
+ page_content='0 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
336
+ page_content='5 Temperature C3 0 Errors: yi - F(xi) DMD DMD_dyn 3 0 10 20 30 40 50 60 70 Time Step250 Errors: yi - F(xi) MPAS DMD_dyn 200- RBF 150 - Count 100- 50 - 0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
337
+ page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
338
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
339
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
340
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
341
+ page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
342
+ page_content='0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
343
+ page_content='5 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
344
+ page_content='0 Temperature CA PREPRINT - JANUARY 16, 2023 (a) Fully dynamic DMD basis interpolation (b) Difference between fully dynamic DMD basis and MPAS: FMPAS(xi) − FDMD_dyn(xi) (c) SST distribution of MPAS versus fully dynamic DMD basis Figure 3: Average yearly temperature comparison of fully dynamic DMD versus MPAS-O for time period Jan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
345
+ page_content=' 1st 2008-Jan 1st 2009 10 0 5 10 15 20 25 30 Temperature C"-4 0 2 Temperature CSST Distribution: 2008-01-01 800- MPAS DMD_dyn 700 600 Count 500 400 300- 200- 100 0 5 10 15 20 25 Temperature C*A PREPRINT - JANUARY 16, 2023 (a) Buoy observations (b) Fully dynamic DMD errors on buoys: yi − F(xi) (c) MPAS errors on buoys: yi − F(xi) Figure 4: (a) Buoy observations, with (b) Fully dynamic DMD errors and (c) MPAS errors on test buoys for year Jan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
346
+ page_content=' 1st 2008-Jan 1st 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
347
+ page_content=' 11 Buoy Test 5 10 15 20 25 30 Temperature CTest error 6 4 2 0 2 4 TemperatureCTest error 8 6 4 2 0 2 4 6 8 TemperatureC' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FtE5T4oBgHgl3EQfVg81/content/2301.05551v1.pdf'}
G9AzT4oBgHgl3EQfHfuN/content/tmp_files/2301.01046v1.pdf.txt ADDED
@@ -0,0 +1,1120 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Critical scaling law for the deposition efficiency of inertia-driven particle collisions with a cylinder
2
+ in high Reynolds number air flow
3
+ Matthew R. Turner1, ∗ and Richard P. Sear1, †
4
+ 1School of Mathematics and Physics, University of Surrey, Guildford, GU2 7XH, United Kingdom
5
+ (Dated: January 4, 2023)
6
+ The Earth’s atmosphere is an aerosol, it contains suspended particles. When air flows over an obstacle such
7
+ as an aircraft wing or tree branch, these particles may not follow the same paths as the air flowing around the
8
+ obstacle. Instead the particles in the air may deviate from the path of the air and so collide with the surface of
9
+ the obstacle. It is known that particle inertia can drive this deposition, and that there is a critical value of this
10
+ inertia, below which no point particles deposit. Particle inertia is measured by the Stokes number, St. We show
11
+ that near the critical value of the Stokes number, Stc, the amount of deposition has the unusual scaling law of
12
+ exp(-1/(St-Stc)1/2). The scaling is controlled by the stagnation point of the flow. This scaling is determined by
13
+ the time for the particle to reach the surface of the cylinder varying as 1/(St-Stc)1/2, together with the distance
14
+ away from the stagnation point (perpendicular to the flow direction) increasing exponentially with time. The
15
+ scaling law applies to inviscid flow, a model for flow at high Reynolds numbers. The unusual scaling means
16
+ that the amount of particles deposited increases only very slowly above the critical Stokes number. This has
17
+ consequences for applications ranging from rime formation and fog harvesting to pollination.
18
+ I.
19
+ INTRODUCTION
20
+ The Earth’s atmosphere is an aerosol, in that it contains sus-
21
+ pended particles, with sizes up to tens of micrometres [1]. For
22
+ example, clouds and fogs are aerosols of water droplets sus-
23
+ pended in air. When air flows over an obstacle such as an
24
+ aircraft wing or tree branch, the suspended particles may fol-
25
+ low the air flow around the obstacle, or they may deposit on
26
+ the surface of the obstacle. For particles tens of micrometres
27
+ in diameter, deposition on the surface of the obstacle is largely
28
+ due to the particle’s inertia. While the air flow curves to move
29
+ around the obstacle, the particle’s inertia means the particle
30
+ tends to move in straight lines, and so collides with the obsta-
31
+ cle, see Fig. 1. Here we study these inertia-driven collisions.
32
+ Deposition of particles from flowing air onto obstacles oc-
33
+ curs in many contexts. These include filtration [2–4], harvest-
34
+ ing water from fog [5–7], pollination [8, 9], and rime (ice)
35
+ formation [10–12]. It has been studied for approximately a
36
+ hundred years. A lot of the earliest work considered appli-
37
+ cations where the air was flowing rapidly, at large Reynolds
38
+ numbers, which is relevant to applications such as rime form-
39
+ ing on the leading edges of aircraft wings. The large Reynolds
40
+ number limit is also the limit we consider here. Rime forms
41
+ by water droplets below the freezing temperature (T = 0 ◦C)
42
+ depositing on a surface and then freezing. This can coat a
43
+ wing with ice, risking a crash.
44
+ In 1931 Albrecht [13] found a threshold in the inertia, be-
45
+ low which no (point) particles deposited on the obstacle. A
46
+ minimum amount of inertia is needed before any particles are
47
+ deposited. Then in the 1940s, first G.I. Taylor [14] (also in
48
+ the scientific papers of G.I. Taylor[15]), and then Langmuir
49
+ and Blodgett [16] calculated this critical value of the inertia.
50
+ Here we confirm this result, and build on it. We determine the
51
+ critical scaling of the deposition efficiency, and show how this
52
+ ∗ m.turner@surrey.ac.uk; http://personal.maths.surrey.ac.uk/st/M.Turner/
53
+ † r.sear@surrey.ac.uk; https://richardsear.me/
54
+ relates to the flow field around the obstacle.
55
+ There has been considerable work on this problem since
56
+ the 1940s [17, 18], motivated by its many applications, but
57
+ the critical scaling has not been studied before, for the high
58
+ Reynolds number flow field considered by Taylor [14, 15], and
59
+ by Langmuir and Blodgett [16]. How the threshold varies with
60
+ Reynolds number has been studied by Phillips and Kaye[19],
61
+ and Araújo et al.[20] determined the critical scaling for zero-
62
+ Reynolds-number flow.
63
+ Most of the work has been computational or theoretical, as
64
+ experiments on collisions in high- Reynolds-number flows are
65
+ challenging. However, Wong and coworkers did obtain some
66
+ experimental data on deposition efficiency at Reynolds num-
67
+ bers of hundreds [21]. This was for an aerosol with particles
68
+ with a narrow distribution of sizes. They found no measur-
69
+ able deposition below a threshold near that predicted by Tay-
70
+ lor [14, 15], and by Langmuir and Blodgett [16]. So these
71
+ experiments agree with theoretical predictions (for a simpli-
72
+ fied model) that a threshold exists. Makkonen and coworkers
73
+ [22–24] have measured ice deposition on cylinders. This is for
74
+ the typical case in the environment, where the droplets have
75
+ a broad range of sizes, which complicates comparison with
76
+ theoretical predictions. Here we mostly consider aerosols of
77
+ identical particles but we do look at the affect of a distribution
78
+ of particle sizes, in order to compare with this work.
79
+ A.
80
+ Obstacles in high Reynolds number flow
81
+ The air flow over an aircraft wing is fast, speeds U of order
82
+ 100ms−1 (≃ 360kmh−1). This speed, combined with a wing
83
+ leading edge radius R of order 10cm, means that the Reynolds
84
+ number of the flow over the wing is Re = UR/ν ∼ 106 ≫ 1
85
+ with ν ≃ 10−5ms−2, the kinematic viscosity of air. So, fol-
86
+ lowing Langmuir and Blodgett and many others, we approxi-
87
+ mate the airflow over a wing by inviscid, incompressible flow
88
+ over an infinite cylinder, where we have a simple analytic ex-
89
+ pression for the flow field [25]. This is a simple model of
90
+ arXiv:2301.01046v1 [physics.flu-dyn] 3 Jan 2023
91
+
92
+ 2
93
+ FIG. 1. Plot of the cross-section of the cylinder (yellow), the flow
94
+ field (streamlines in blue), and three trajectories. The green and black
95
+ trajectories collide with the cylinder, while the red trajectory misses.
96
+ Here St = 0.7 and the initial conditions are at Cartesian coordinate
97
+ xC(t = 0) = −10, with initial yC values given in the key. The black
98
+ trajectory is the one that defines the edge of the region where particles
99
+ collide, and so its value of yC = 0.2793 = ηd. N.B. Numerical errors
100
+ mean we cannot determine ηd to four significant figures, so the yC
101
+ value for black curve should not be taken as accurate to four figures.
102
+ high-Reynolds-number flow.
103
+ The cylinder is of radius R, with its axis along the zC-axis,
104
+ directed into the page in Fig. 1. The cylinder is taken to be at
105
+ rest in the frame of reference. Far from the cylinder, flow is in
106
+ the xC direction: Ui. Note that we denote the Cartesian coor-
107
+ dinates as (xC,yC,zC), with corresponding unit vectors i, j, k,
108
+ because below we will use x and y to indicate distances from
109
+ the stagnation point. In cylindrical polar coordinates, the flow
110
+ field u(r) is given by
111
+ u
112
+ U =
113
+
114
+ 1− R2
115
+ r2
116
+
117
+ cos(θ)�r−
118
+
119
+ 1+ R2
120
+ r2
121
+
122
+ sin(θ)�θ,
123
+ (1)
124
+ where (r,θ) are plane polar coordinates in the (xC,yC)-plane.
125
+ Streamlines of the flow field are illustrated in Fig. 1.
126
+ In the remainder of this paper, we will set the radius of the
127
+ cylinder R = 1 and the flow field speed U = 1. So for exam-
128
+ ple, both the Cartesian coordinate xC and the distance along
129
+ the Cartesian coordinate from the stagnation point, x, are in
130
+ units such that the cylinder radius R = 1. This choice also
131
+ means that time is measured in units such that it takes unit
132
+ time to move a distance of the cylinder’s radius, when moving
133
+ at speed U.
134
+ B.
135
+ Particles in air flowing around an obstacle: The effect of
136
+ inertia on deposition
137
+ We approximate the particles by point particles, they are
138
+ about ten thousand times smaller than the wing leading edge.
139
+ Point particles that follow the streamlines of fluid flow per-
140
+ fectly never collide with the obstacle. However, if the parti-
141
+ cles have inertia then when the air flow changes direction to
142
+ flow around the obstacle, the particle’s inertia may cause it to
143
+ go straight on potentially leading it to crash into the obstacle.
144
+ So particle inertia can cause collisions.
145
+ The inertia of a particle is quantified by its Stokes number
146
+ St, defined for a particle of mass mp by
147
+ St = mpUB
148
+
149
+ R
150
+ (2)
151
+ with B the particle mobility and R the lengthscale of the obsta-
152
+ cle. The Stokes expression for the mobility is B = 1/(6πηap)
153
+ with η the dynamic viscosity of air, and ap the radius of the
154
+ particle. The Stokes number is the dimensionless ratio be-
155
+ tween the inertia of a particle – which tends to cause the par-
156
+ ticle to move in straight lines – and the friction between the
157
+ particle and the surrounding air – which tends to make the par-
158
+ ticle follow streamlines. For a wing of width 0.1m, the Stokes
159
+ number is of order one for droplets micrometres in diameter,
160
+ so cloud droplets of size micrometres, and tens of microme-
161
+ tres will deposit on the wing.
162
+ In the St → ∞ limit, particles move in straight lines and so
163
+ in that limit a cylinder of radius R sweeps out a strip of air
164
+ of thickness 2R, collecting all the particles in this strip. This
165
+ allows us to define the deposition or collection efficiency
166
+ ηd =
167
+ maximum displacement from cylinder axis
168
+ perpendicular to the flow direction, for
169
+ which a particle collides with cylinder surface
170
+
171
+ R
172
+ which varies from zero when no particles collide, to one when
173
+ St → ∞. The displacement is taken far upstream of the cylin-
174
+ der. Calculation of ηd is done by starting particle trajectories
175
+ far upstream of the cylinder at varying values of the displace-
176
+ ment yC normal to the flow direction. Then ηd is defined by
177
+ the largest initial displacement along yC, for which the particle
178
+ collides. This is illustrated by the black trajectory in Fig. 1.
179
+ Numerical results for ηd as a function of St, together with
180
+ the fit of Langmuir and Blodgett [16], are shown in Fig. 2.
181
+ Note that at small values of St, the collection efficiency in-
182
+ creases very slowly with increasing inertia. This is what we
183
+ will explain here. It follows directly from the high Reynolds
184
+ number flow field. In the low-Reynolds-number limit, where
185
+ the flow field is very different, ηd increases much more rapidly
186
+ above the critical Stokes number [3, 20, 26]. Langmuir and
187
+ Blodgett’s fit is in Appendix A, and the details of our numeri-
188
+ cal calculations are in Appendix B. See Appendix B 1 for the
189
+ details of the fit in Fig. 2.
190
+
191
+ yc(t = 0) = 0.4
192
+ yc(t = 0) = 0.2793
193
+ Yc(t = 0) = 0.1
194
+ stagnation point3
195
+ FIG. 2. Plot of the deposition or collection efficiency ηd as a function
196
+ of the Stokes number. Shown are numerical results (blue circles), the
197
+ function of Langmuir and Blodgett [16] (green curve) and our fit to
198
+ the region of small δ = St−Stc (dashed red curve).
199
+ II.
200
+ NEWTON’S EQUATION FOR A PARTICLE IN
201
+ FLOWING AIR
202
+ For a particle suspended in flowing air we assume that the
203
+ only force on the particle is the friction with the surrounding
204
+ air, which is taken to be proportional to the difference between
205
+ particle’s velocity v and the local flow velocity u. This force
206
+ is taken to act on the particle’s centre of mass. Then Newton’s
207
+ equation for the particle motion is
208
+ Stdv
209
+ dt = −(v−u).
210
+ (3)
211
+ In cylindrical polar coordinates, this is
212
+ St
213
+
214
+ ¨r −r
215
+ � ˙θ
216
+ �2�
217
+ = −(˙r −ur),
218
+ (4a)
219
+ St
220
+
221
+ ¨θ + 2˙r ˙θ
222
+ r
223
+
224
+ = −
225
+ � ˙θ −uθ
226
+
227
+ ,
228
+ (4b)
229
+ where u = urˆr+uθ ˆθ.
230
+ III.
231
+ THE CYLINDER’S FORWARD STAGNATION POINT
232
+ We are interested in the behaviour near the critical Stokes
233
+ number of Langmuir and Blodgett [16]. Here, particle tra-
234
+ jectories pass close to the stagnation point at the front of the
235
+ cylinder. This stagnation point is at r = 1 and θ = π, see
236
+ Fig. 1. So we will study behaviour near this stagnation point.
237
+ We start by changing variables to the distance to contact with
238
+ the cylinder x = r − 1 ≪ 1, and the angle from the angle of
239
+ the stagnation point y = π −θ ≪ 1. Note that x and y are not
240
+ the conventional Cartesian coordinates, which we denote by
241
+ xC and yC.
242
+ In these new coordinates, Newton’s equations for the parti-
243
+ cle, Eq. (4), become
244
+ ¨x−(1+x)˙y2 = − ˙x−ur
245
+ St
246
+ ,
247
+ (5a)
248
+ ¨y+
249
+ 2
250
+ 1+x ˙x˙y = − ˙y+uθ
251
+ St
252
+ .
253
+ (5b)
254
+ Note that ˙y = − ˙θ and ¨y = − ¨θ etc. Near the stagnation point,
255
+ we can expand the flow field in Eq. (1) as a series in x and y
256
+ u =
257
+
258
+ −2x+3x2 +O(cubic terms)
259
+ � ˆr
260
+ +(−2y+2xy+O(cubic terms)) ˆθ.
261
+ (6)
262
+ It is worth noting that as we do not have stick boundary con-
263
+ ditions here, uθ is not zero at the cylinder surface, except at
264
+ the stagnation point; ur is zero at the surface is because there
265
+ is no flow into the cylinder.
266
+ We substitute the flow field of Eq. (6) into the equation for
267
+ the particle trajectory (Eq. (5)). Then if we keep only linear
268
+ and quadratic terms we obtain
269
+ ¨x− ˙y2 = − 1
270
+ St
271
+
272
+ ˙x+2x−3x2�
273
+ ,
274
+ (7a)
275
+ ¨y+2˙x˙y = − 1
276
+ St (˙y−2y+2xy),
277
+ (7b)
278
+ We now solve these equations to find out which are the trajec-
279
+ tories of particles that collide with the cylinder.
280
+ IV.
281
+ PARTICLE TRAJECTORIES ON AXIS, AND THE
282
+ CRITICAL STOKES NUMBER
283
+ We start by considering particle trajectories precisely on
284
+ axis, where θ = π and y = 0. This will enable us to deter-
285
+ mine the critical value of the Stokes number, below which no
286
+ particles collide with the cylinder. We follow Taylor [14, 15],
287
+ and Langmuir and Blodgett [16] here. On axis the system re-
288
+ duces to a one dimensional problem.
289
+ Near the stagnation point x ≪ 1, and we can approximate
290
+ the flow by keeping only the leading order terms in x. Then
291
+ Eq. (7a) is just
292
+ St¨x = −˙x−2x,
293
+ (8)
294
+ which as both Taylor, and Langmuir and Blodgett realised,
295
+ is just the differential equation for damped simple harmonic
296
+ motion (SHM). It has solutions
297
+ x(t) = A0 exp(λ1t)+B0 exp(λ2t),
298
+ (9)
299
+ λ1,λ2 = −1±√1−8St
300
+ 2St
301
+ ,
302
+ (10)
303
+ where A0 and B0 are fixed by the initial conditions, for exam-
304
+ ple x(t = 0) = x0 and ˙x(t = 0) = u0. See Appendix C.
305
+ For 0 < St < 1/8 both λ are real and negative (overdamped
306
+ SHM solutions), and so the particle approaches the cylinder
307
+ surface at a speed which decays exponentially. There is only
308
+
309
+ 0.10
310
+ L&B
311
+ 0.08
312
+ numerics
313
+ fit
314
+ 0.06
315
+ 0.04
316
+ 0.02
317
+ 0.0Q
318
+ 0.1
319
+ 0.3
320
+ 0.2
321
+ 0.4
322
+ 0.0
323
+ St4
324
+ FIG. 3. Plot of the trajectories in Fig. 1 but in the xy plane. The green
325
+ and black trajectories collide with the cylinder, while the red trajec-
326
+ tory misses. Here St = 0.7 and the initial conditions are at Cartesian
327
+ coordinate xC(t = 0) = −10, with initial yC values given in the key.
328
+ Note that the trajectory which just collides does so tangentially to the
329
+ surface.
330
+ a collision in the t → ∞ limit, i.e., no collision at finite time.
331
+ But if St > 1/8 then we have complex λ (underdamped SHM
332
+ solutions), and the collision will occur in finite time. The crit-
333
+ ical value of the Stokes number is therefore Stc = 1/8. We
334
+ can define the distance from this critical value as
335
+ δ = St−Stc.
336
+ (11)
337
+ Note that there are initial conditions for Eq. (9), for which
338
+ the particle collides in finite time[27]. However, they do not
339
+ appear to be physically relevant, as Ingham et al.[27] discuss.
340
+ A.
341
+ Time to collision, on axis
342
+ The collision occurs when x(tCOLL) = 0 and is set by the
343
+ angular frequency — the imaginary part of Eq. (10) — ω =
344
+ √1−8St/(2St) ≃ 8
345
+
346
+ 2δ 1/2. As expected (see Appendix C
347
+ for details) the time to collide tCOLL is half the period
348
+ tCOLL ≃
349
+ π
350
+ 8
351
+
352
+ 2
353
+ δ −1/2
354
+ δ ≪ 1.
355
+ (12)
356
+ As the critical Stokes number is approached from above, the
357
+ time to reach the cylinder surface and collide diverges as
358
+ 1/δ 1/2. Numerical calculations using the full flow field agree
359
+ with this observation, see Appendix B 1.
360
+ V.
361
+ PARTICLE TRAJECTORIES OFF AXIS, AND THE
362
+ CRITICAL SCALING OF THE DEPOSITION EFFICIENCY
363
+ We now consider the full two-dimensional case, near the
364
+ stagnation point. Off axis we also need an equation for y.
365
+ Retaining only the leading order linear terms in Eq. (7b) for y
366
+ leads to
367
+ St¨y = −˙y+2y,
368
+ (13)
369
+ in which there is no coupling with the x direction. This equa-
370
+ tion is almost the damped SHM equation again, but in SHM
371
+ language, the ‘force’ term has the opposite sign, so it is not a
372
+ restoring force but drives exponential growth of y. The solu-
373
+ tion is
374
+ y(t) = C0 exp(µ1t)+D0 exp(µ2t)
375
+ (14)
376
+ with
377
+ µ1,µ2 = −1±√1+8St
378
+ 2St
379
+ (15)
380
+ Now, µ1 > 0 and µ2 < 0 so at long times the µ1 solution dom-
381
+ inates; it increases exponentially while the other solution de-
382
+ cays to zero. The constants C0 and D0 are related to the initial
383
+ conditions. If y(t = 0) = y0 and ˙y(t = 0) = v0, then
384
+ C0 = v0 − µ2y0
385
+ µ1 − µ2
386
+ and D0 = −v0 − µ1y0
387
+ µ1 − µ2
388
+ .
389
+ (16)
390
+ Having determined the leading order behaviour of y, we
391
+ return to Eq. (7a) for x. The leading order y term in Eq. (7a)
392
+ is the ˙y2 term. Retaining only this term, we have
393
+ ¨x+ ˙x+2x
394
+ St
395
+ = ˙y2.
396
+ (17)
397
+ The new term acts like an effective force that pushes the par-
398
+ ticle away from a collision.
399
+ The general solution to Eq. (17) is given in Eq. (D2) in Ap-
400
+ pendix D. We take this equation, expand for δ ≪ 1, keep only
401
+ leading-order terms, and then set x = 0 at the collision time of
402
+ Eq. (12). This yields
403
+ x(tCOLL) = −A0 exp
404
+
405
+ − π
406
+ 2
407
+
408
+ 2
409
+ δ −1/2
410
+
411
+ +E0 exp
412
+
413
+ (
414
+
415
+ 2−1)π
416
+
417
+ 2
418
+ δ −1/2
419
+
420
+ = 0,
421
+ (18)
422
+ with E0 = C2
423
+ 0(11−6
424
+
425
+ 2)/49. This equation is a function of δ
426
+ and the initial boundary conditions on x and y.
427
+ Equation (18) has two terms. The first term is negative and
428
+ is the same for the on-axis case. It is this term that results
429
+ in a collision after a time ∼ 1/δ 1/2. The second term is new
430
+ for the off-axis case, it increases exponentially with δ −1/2,
431
+ and the prefactor scales with C2
432
+ 0 ∼ (v0 − µ2y0)2, i.e., with the
433
+ initial conditions on y.
434
+ We want to estimate ηd, which is set by the largest dis-
435
+ placement y0 for which the particle collides with the cylinder,
436
+ which is when Eq. (18) is satisfied. Near the critical Stokes
437
+ number y0 will be small, and the exponential variation of the
438
+ terms in Eq. (18) suggests it needs to be exponentially small,
439
+ so we write C0 = ζ exp[α(δ)] where ζ is a constant to leading
440
+ order in δ, and α is a function of δ.
441
+ Then we insert C0 = ζ exp(α) into Eq. (18). For small δ
442
+ solutions are only possible when the exponential exponents
443
+ are equal. Equating the exponents of the two terms gives us
444
+
445
+ π
446
+ 2
447
+
448
+ 2
449
+ δ −1/2 = 2α + (
450
+
451
+ 2−1)π
452
+
453
+ 2
454
+ δ −1/2,
455
+ (19)
456
+
457
+ 0.45
458
+ Yc(t = 0) = 0.4
459
+ 0.40
460
+ Yc(t = 0) = 0.2793
461
+ 0.35
462
+ yc(t = 0) = 0.1
463
+ 0.30
464
+ 0.25
465
+ 0.20
466
+ 0.15
467
+ 0.10
468
+ 0.05
469
+ 0.00
470
+ 0.4
471
+ 0.6
472
+ 0.8
473
+ 0.0
474
+ 0.2
475
+ 1.0
476
+ y=-5
477
+ and
478
+ α = −(4−
479
+
480
+ 2)
481
+ 8
482
+ πδ −1/2 ≃ −1.015δ −1/2.
483
+ (20)
484
+ Collisions only occur at small δ when y0 scales as
485
+ exp(−1.015δ −1/2). This sets the width of the strip of air over
486
+ which particles collide with the cylinder, and so the deposition
487
+ efficiency is
488
+ ηd ∼
489
+
490
+ 0
491
+ δ ≤ 0
492
+ exp
493
+
494
+ − (4−
495
+
496
+ 2)
497
+ 8
498
+ πδ −1/2�
499
+ 0 < δ ≪ 1
500
+ (21)
501
+ Above the critical Stokes number, the collection efficiency
502
+ has the unusual scaling exp(−1/δ 1/2). This means that the
503
+ deposition efficiency increases only slowly above the critical
504
+ Stokes number, see Fig. 2. Numerical calculations with the
505
+ full flow field confirm the result. They are in Appendix B 1.
506
+ Limited experimental data [21] near Stc means that a quanti-
507
+ tative comparison with our scaling result is not possible.
508
+ The scaling is a direct consequence of the form of the flow
509
+ field near the stagnation point, Eq. (6). From the fact that the
510
+ flow field varies linearly with x and y. The flow field leads
511
+ to the time to collision scaling as 1/δ 1/2, and to the y coor-
512
+ dinate increasing exponentially with time, which in turn gives
513
+ us Eq. (21).
514
+ Numerical results for particle trajectories as functions of x
515
+ and y are plotted in Fig. 3. The trajectory that just collides,
516
+ and so defines ηd, is in black. Note the rapidly increasing y
517
+ as the collision is approached, and that the collision occurs
518
+ tangential to the cylinder surface.
519
+ VI.
520
+ COMPARISON WITH PARTICLE DEPOSITION IN
521
+ STOKES FLOW
522
+ Our results are for a flow field that neglects viscosity, in ef-
523
+ fect the infinite-Reynolds-number limit. The opposite limit is
524
+ where inertia is negligible and viscosity dominates. This is the
525
+ zero-Reynolds-number or Stokes-flow limit, and it is relevant
526
+ to the filtration of aerosol particles from air by fibrous filters,
527
+ where the Reynolds number is small [2, 3, 28]. For particles
528
+ in Stokes flow, there is also a critical value of the Stokes num-
529
+ ber, but the scaling of the deposition efficiency is ηd ∼ δ 1/2,
530
+ which is completely different scaling. Langmuir and Blodgett
531
+ suspected that there were critical Stokes numbers for a num-
532
+ ber of different flow fields including spheres in Stokes flow,
533
+ but this scaling was first found for spheres in Stokes flow by
534
+ Araújo et al.[20].
535
+ The particle trajectories are very different for the inviscid
536
+ and Stokes flow fields. For example, with the slip boundary
537
+ conditions in the inviscid limit, the trajectories where the par-
538
+ ticle just collides with the cylinder surface do so tangentially,
539
+ see Fig. 3. This is because the particle’s velocity normal to
540
+ the cylinder surface tends to zero at the collision, while the
541
+ tangential component is non-zero. Particles in Stokes flow do
542
+ not collide tangentially because here the stick boundary con-
543
+ ditions mean that the tangential fluid-flow velocity is zero at
544
+ contact [26].
545
+ FIG. 4. Plot of the mean deposition or collection efficiency, ηd, as
546
+ a function of the median Stokes number. Shown are numerical re-
547
+ sults for monodisperse droplets (blue circles), and for polydisperse
548
+ droplets whose Stokes numbers obey a log-normal distribution with
549
+ width parameter σ = 1/2 (orange curve).
550
+ At intermediate Reynolds numbers, there will be a bound-
551
+ ary layer of thickness ∼ 1/Re1/2. Within this boundary layer
552
+ the flow field is approximately viscous flow, outside it is closer
553
+ to inviscid flow. So as the Reynolds nunber is increased the
554
+ boundary layer thins and the behaviour changes continuously
555
+ from the Stokes to the inviscid limit.
556
+ Work by Robinson
557
+ and coworkers suggests that the deposition behaviour changes
558
+ smoothly between the limits [26].
559
+ VII.
560
+ DEPOSITION FROM AN AEROSOL OF PARTICLES
561
+ WITH A RANGE OF DIAMETERS
562
+ In natural aerosols, the particles are almost never all of the
563
+ same diameter. A broad distribution of particle sizes is typi-
564
+ cal [1, 22, 24]. Within our simplified model, each particle is
565
+ characterised by a single parameter: the Stokes number. A
566
+ distribution of particle sizes results in a distribution of Stokes
567
+ numbers. The Stokes number of a particle is given by Eq. (2).
568
+ When mass mp ∝ a3
569
+ p and the Stokes mobility B ∝ 1/ap, the
570
+ scaling of the Stokes number is St ∝ a2
571
+ p, i.e., the Stokes num-
572
+ ber scales with the square of the particle radius. Thus a distri-
573
+ bution of particle radii gives a distribution of Stokes numbers.
574
+ An aerosol of particles with a range of radii will have particles
575
+ with a distribution of Stokes numbers: p(St).
576
+ We need a model probability distribution function, p. We
577
+ use the standard log-normal distribution
578
+ p(St;StMED,σ) =
579
+ 1
580
+ Stσ(2π)1/2 exp
581
+
582
+ −(lnSt− µ)2
583
+ 2σ2
584
+
585
+ (22)
586
+ Here, the median Stokes number StMED = exp(µ) provides
587
+ a measure of the typical Stokes number. The width of the
588
+ distribution is set by σ: the ratio of the standard deviation to
589
+ the median value is exp(σ2/2)(exp(σ2)−1)1/2.
590
+
591
+ mono.
592
+ g= 1/2
593
+ 0.4
594
+ 0.2
595
+ 0.5
596
+ 1.0
597
+ 1.5
598
+ StMED6
599
+ FIG. 5. A quantity M, which is proportional to the mass deposited,
600
+ plotted as a function of the median Stokes number. Shown are nu-
601
+ merical results for monodisperse droplets (dark blue circles) and for
602
+ polydisperse droplets whose Stokes numbers obey a log-normal dis-
603
+ tribution with width parameter σ = 1/2 (magenta curve).
604
+ Within our model, the particles are independent. So the
605
+ mean deposition efficiency, ηd, for the aerosol is simply
606
+ ηd(StMED,σ) =
607
+
608
+ η(St)p(St;StMED,σ)dSt
609
+ (23)
610
+ In Fig. 4, we compare the mean deposition efficiency as a
611
+ function of median Stokes number, of monodisperse particles,
612
+ and particles with a log-normal distribution with width param-
613
+ eter σ = 1/2. This distribution has a ratio of standard devia-
614
+ tion to the median of 0.60. Near the critical value of the Stokes
615
+ number, the convolution of deposition efficiency with the dis-
616
+ tribution of Stokes numbers of the particles smooths out the
617
+ transition at Stc. For a distribution of particle sizes and hence
618
+ and Stokes numbers, the deposition efficiency is never zero,
619
+ unless all particles have Stokes numbers less than Stc. Thus
620
+ when the median Stokes number is below Stc polydisperse
621
+ aerosols have larger deposition efficiencies than monodisperse
622
+ ones.
623
+ But regardless of polydispersity the deposition effi-
624
+ ciency tends to one at larges values of the median Stokes num-
625
+ ber. So at large median Stokes numbers a broad distribution
626
+ of particle sizes has little effect on the mean deposition effi-
627
+ ciency.
628
+ In experiment, the total mass deposited on an obstacle can
629
+ be measured [22, 24]. As the mass of a particle scales as a3
630
+ p,
631
+ the mass of a particle scales as St3/2. So the three-halves mo-
632
+ ment of the efficiency times the distribution of particle Stokes
633
+ numbers gives us a quantity proportional to the total mass de-
634
+ posited. We call this quantity M:
635
+ M(StMED,σ) =
636
+
637
+ η(St)p(St;StMED,σ)St3/2dSt
638
+ (24)
639
+ We have plotted this deposited mass as a function of median
640
+ Stokes number in Fig. 5. As with the deposition efficiency in
641
+ Fig. 4, when a range of particle sizes are present, the transition
642
+ is smoothed over. Mass is deposited at all values of the median
643
+ Stokes number. This is consistent with the work of Makkonen
644
+ and coworkers [22, 24], who find that some mass is deposited
645
+ under all their experimental conditions. However, the mass
646
+ deposited is always larger than for monodisperse droplets with
647
+ the same median Stokes number. The total mass of aerosol
648
+ particles is larger in the polydisperse case. (at the same me-
649
+ dian Stokes number). In addition, the large Stokes number tail
650
+ of the distribution contributes large amounts to the mass de-
651
+ posited as here the deposition efficiency is high and these large
652
+ particles contribute large amounts to the total mass deposited.
653
+ VIII.
654
+ CONCLUSION
655
+ We have built on Taylor’s [14, 15], and Langmuir and
656
+ Blodgett’s work [16] to quantitatively understand the be-
657
+ haviour of the deposition efficiency ηd near the critical value
658
+ of the Stokes number.
659
+ Just above the critical value, ηd ∼
660
+ exp(−1/δ 1/2). This unusual scaling comes from the fact that
661
+ for an off-axis particle trajectory, the particle’s displacement
662
+ from the cylinder’s axis increases exponentially with time,
663
+ while the time to reach the cylinder scales as 1/δ 1/2. Thus
664
+ unless the initial displacement from the axis is exponentially
665
+ small, the particle misses the cylinder. The scaling follows di-
666
+ rectly from the (inviscid) flow field we used; the behaviour of
667
+ particles in Stokes flow with stick boundary conditions is very
668
+ different [3, 20, 26]. The lesson here is that particle deposi-
669
+ tion from flowing air is very sensitive to details of the flow
670
+ field, especially near the stagnation point. The slow increase
671
+ in deposition efficiency follows from the slip boundary con-
672
+ ditions. Particle deposition has varied applications, from rime
673
+ formation on aircraft wings v to pollination [8, 9]. The care-
674
+ ful analysis of particle trajectories near the forward stagnation
675
+ point will greatly contribute to the understanding of this issue.
676
+ Here, we have studied a cylinder, but Langmuir and Blod-
677
+ gett [16] also found a critical value of the Stokes number
678
+ for spheres in inviscid, axisymmetric flow. This was at the
679
+ slightly lower value of Stc = 1/12. It is straightforward to
680
+ show that the scaling laws found here for a cylinder are the
681
+ same (up to multiplicative constants) for a sphere. The details
682
+ are in Appendix E. Our results for the scaling were obtained
683
+ by expanding around the stagnation point, it is possible that
684
+ they are general to at least most inviscid flows impinging on a
685
+ locally parabolic surface in two or three dimensions.
686
+ IX.
687
+ SUPPLEMENTARY MATERIAL
688
+ The supplementary material is a Python Jupyter notebook
689
+ that performs all numerical calculations, and produces all fig-
690
+ ures in this work.
691
+ ACKNOWLEDGMENTS
692
+ It is a pleasure to thank Josh Robinson and Patrick Warren
693
+ for inspiring and useful discussions. The data that support the
694
+
695
+ mono.
696
+ 1.5
697
+ g= 1/2
698
+ 1.0
699
+ M
700
+ 0.5
701
+ 0.5
702
+ 1.0
703
+ 1.5
704
+ StMED7
705
+ findings of this study are available within the article and in a
706
+ Python Jupyter notebook in supplementary material.
707
+ Appendix A: Langmuir and Blodgett expression for deposition
708
+ efficiency
709
+ The expression used by Langmuir and Blodgett [16] is
710
+ ηd =
711
+
712
+
713
+
714
+ 0
715
+ St ≤ 1/8
716
+ 0.466[log10(8St)]2 1/8 < St < 1.1
717
+ St/(St+π/2)
718
+ 1.1 < St
719
+ (A1)
720
+ Note that the functional form near St = 1/8 is incorrect but
721
+ that it is quite close to numerical calculations. This expres-
722
+ sion, and closely related ones, have been and are used exten-
723
+ sively to model ice accretion on the leading edges of surfaces
724
+ moving through air [7, 10, 17, 18]. Finstad et al.[17, 18] sum-
725
+ marise work up to 1998 on improving the approximation of
726
+ Eq. (A1). None of the improvements has the correct func-
727
+ tional form for small δ = St − 1/8 but it should be said the
728
+ work was focused on producing empirical expressions that are
729
+ accurate over a wide range of values of the Stokes number, not
730
+ on obtaining the correct value near the dynamical transition.
731
+ Appendix B: Details of numerical calculations
732
+ The numerical calculations were done with a Python
733
+ Jupyter notebook available in the supplementary material.
734
+ Particle trajectories were calculated as follows.
735
+ Particles
736
+ were started at Cartesian coordinates upstream of the cylin-
737
+ der (xC0,yC0), i.e., a distance xC0 along the xC-axis (the flow
738
+ direction), and displaced a perpendicular distance yC0 off axis.
739
+ All calculations here are for xC0 = −10; we checked that in-
740
+ creasing the distance upstream further to −20 had very lit-
741
+ tle effect. Trajectories were obtained by integrating Newton’s
742
+ equation of motion ((3)), and checking for collisions, which
743
+ occur whenever r = 1.
744
+ 1.
745
+ Verification of scaling found by analytical mathematics, by
746
+ comparison to numerical calculations
747
+ On axis, our analytical results predict that as the critical
748
+ Stokes number is approached from above, the time to reach
749
+ the surface of the cylinder and collide, scales as 1/δ 1/2. There
750
+ is another contribution, which is the time for the particle to go
751
+ from its initial position upstream to a point where x ≪ 1. That
752
+ contribution is approximately equal to initial displacement/U.
753
+ So, we fit a function of the form A + Bδ −1/2 to numerical
754
+ results for the time to collision. The numerical results and fit
755
+ are shown in Fig. 6. We see excellent agreement.
756
+ We perform the same analysis for the trajectories that define
757
+ ηd, at the edge of the strip of air over which collisions occur.
758
+ The results are in Fig. 6, and again the agreement is excellent.
759
+ FIG. 6. Plot of time to collision, as a function of δ = St − Stc. The
760
+ points are numerical results, and the lines are fits of function A +
761
+ Bδ −1/2. Blue points and cyan line are for on axis collisions, with
762
+ best fit values A = 9.78 and B = 0.309. Orange points and red line
763
+ are for collisions at the edge of the deposition zone, with A = 9.92
764
+ and B = 0.309. Note that both values for B are close to our prediction
765
+ of tCOLL = π/(8
766
+
767
+ 2δ 1/2) = 0.278/δ 1/2.
768
+ FIG. 7. Plot of ln(ηd) as a function of 1/δ 1/2, to show exp(−1/δ 1/2)
769
+ scaling of the deposition efficiency. Points are numerical results, line
770
+ is fit of function A+B(1/δ 1/2) with best fit values A = −0.193 and
771
+ B = −1.118. Note that value for B is close to our prediction of α =
772
+ −1.015/δ 1/2 (Eq. (20)).
773
+ We also predict that the deposition efficiency has the scaling
774
+ form
775
+ lnηd = A+B 1
776
+ δ 1/2
777
+ δ ≪ 1.
778
+ (B1)
779
+ In Fig. 7 we compare the results of numerical calculations
780
+ with a fit of this form. Again the agreement is excellent.
781
+ A final check is on the match between the numerics and
782
+ the analytics; the analytical mathematics relies on an expan-
783
+ sion in x and y and so is only valid near the stagnation point
784
+ where x,y ≪ 1. We are interested in the deposition efficiency
785
+ ηd(δ). The deposition efficiency is set by the trajectory with
786
+ the largest initial Cartesian yC coordinate, call it yC0, at large
787
+ and negative Cartesian xC (far upstream of the cylinder) for
788
+
789
+ 13.0
790
+ on axis
791
+ time to collision
792
+ on axis fit
793
+ 12.5
794
+ off axis
795
+ 12.0
796
+ off axis fit
797
+ 11.5
798
+ 11.0
799
+ 6
800
+ 10
801
+ 8
802
+ 4
803
+ 1/81/2-3
804
+ fit
805
+ -4
806
+ off axis
807
+ -5
808
+ -6
809
+ (pu)ul
810
+ -7
811
+ -8
812
+ -9
813
+ -10
814
+ -11
815
+ 5
816
+ 3
817
+ 4
818
+ 6
819
+ 8
820
+ 9
821
+ 10
822
+ 7
823
+ 1/61/28
824
+ FIG. 8. Plot of y, ˙y and their combination ˙y − µ2y which sets C0,
825
+ as functions of the initial off-axis deviation in Cartesian coordinates.
826
+ All trajectories start at xC = −10, and end at x = 0.1. The Stokes
827
+ number is St = 1/4.
828
+ which a collision occurs. There the particle velocity is taken
829
+ to be that in flow field, which is close to U along the Cartesian
830
+ xC axis.
831
+ What the analytic mathematics uses is the initial boundary
832
+ condition on y, as it appears as C0, which has the scaling
833
+ C0 ∼ v0 − µ2y0 ∼ exp(α)
834
+ (B2)
835
+ and in effect shows that C0 ∼ exp(−1/δ 1/2). Here y0 and v0
836
+ are the initial conditions on y and ˙y, respectively. To complete
837
+ the link between the scaling we obtained for C0 and ηd we
838
+ need to show that C0 varies smoothly with the value of yC0.
839
+ We do this in Fig. 8. There we have plotted y, ˙y and ˙y − µ2y
840
+ at x = 0.1, as functions of yC0. These are all obtained from
841
+ numerical calculations. We see that they all vary smoothly
842
+ with yC0, so the scaling found for C0 will translate ηd. In
843
+ Fig. 8 we selected x = 0.1 as a value less than one but not
844
+ ≪ 1, plots with x = 0.05 and x = 0.2, are similar.
845
+ Appendix C: Solution for on-axis case
846
+ The solution of Eq. (8) is
847
+ x(t) = A0 exp(λ1t)+B0 exp(λ2t)
848
+ (C1)
849
+ λ1,λ2 = −1±√1−8St
850
+ 2St
851
+ ,
852
+ (C2)
853
+ where A0 and B0 are fixed by the initial conditions. With x(t =
854
+ 0) = x0 and ˙x(t = 0) = u0, A0 and B0 are given by
855
+ A0 = λ2x0 −u0
856
+ λ2 −λ1
857
+ and B0 = u0 −λ1x0
858
+ λ2 −λ1
859
+ .
860
+ (C3)
861
+ For St < 1/8 both λ are real (overdamped SHM solutions),
862
+ and so the particle approaches the cylinder surface (x = 0) at
863
+ a speed which decays as exp(−t), and hence there is only a
864
+ collision in the t → ∞ limit, i.e., no collision at finite time. A
865
+ similar phenomena occurs in the St = 1/8 case. But if St >
866
+ 1/8 then we have complex λ (underdamped SHM solution),
867
+ and the collision will occur in finite time. In this case the
868
+ solution can be written as
869
+ x(t) = exp[−t/(2St)]
870
+
871
+ A0 cos
872
+ �√8St−1
873
+ 2St
874
+ t
875
+
876
+ +B0 sin
877
+ �√8St−1
878
+ 2St
879
+ t
880
+ ��
881
+ ,
882
+ (C4)
883
+ or by using trigonometric identities
884
+ x(t) = ψ exp[−t/(2St)]cos
885
+ �√8St−1
886
+ 2St
887
+ t +φ
888
+
889
+ ,
890
+ (C5)
891
+ where ψ is an amplitude and φ is a phase which are related to
892
+ the constants A0 and B0, which are given by
893
+ A0 = x0
894
+ and B0 = 2Stu0 +x0
895
+ √8St−1 .
896
+ (C6)
897
+ Thus
898
+ φ = tan−1
899
+ �2Stu0/x0 +1
900
+ √8St−1
901
+
902
+ .
903
+ (C7)
904
+ And rewriting using δ
905
+ x(t) = ψ exp[−t/(2St)]cos
906
+
907
+ 8
908
+
909
+ 2δ 1/2
910
+ 1+8δ t +φ
911
+
912
+ .
913
+ (C8)
914
+ The collision occurs when x(tCOLL) = 0 and is set by the co-
915
+ sine term, and so by the angular frequency, which scales as
916
+ δ 1/2. In the δ → 0 limit, φ in Eq. (C7) tends to −π/2 (as
917
+ u0 < 0) and the collision time is set by 8
918
+
919
+ 2δ 1/2tCOLL = π,
920
+ which leads to Eq. (12).
921
+ Appendix D: Solution of Eq. (17)
922
+ In order to derive the scaling argument on the coupling term
923
+ in Eq. (17), we consider only the exponentially growing term
924
+ on the RHS from the solution Eq. (14). Hence the differential
925
+ equation becomes
926
+ ¨x+ ˙x+2x
927
+ St
928
+ = C2
929
+ 0µ2
930
+ 1 exp(2µ1t).
931
+ (D1)
932
+ The general solution to this equation consists of a com-
933
+ plementary function which satisfies the homogeneous equa-
934
+ tion Eq. (8) and a particular integral which satisfies the in-
935
+ homogeneous RHS.
936
+ The general solution is then
937
+ x(t) = exp[−t/(2St)]
938
+
939
+ A0 cos
940
+ �√8St−1
941
+ 2St
942
+ t
943
+
944
+ + B0 sin
945
+ �√8St−1
946
+ 2St
947
+ t
948
+ ��
949
+ +E0 exp(2µ1t),
950
+ (D2)
951
+
952
+ 0.20
953
+ y-μ2y
954
+ 0.1
955
+ 0.15
956
+
957
+ X
958
+ when
959
+ 0.10
960
+ 0.05
961
+ 0.00
962
+ 0.01
963
+ 0.00
964
+ 0.02
965
+ when
966
+ yc
967
+ Xc= 109
968
+ where
969
+ E0 =
970
+ µ2
971
+ 1C2
972
+ 0
973
+ 4µ2
974
+ 1 + 2µ1
975
+ St + 2
976
+ St
977
+ ,
978
+ and
979
+ A0 = x0 −E0,
980
+ (D3)
981
+ B0 = 2Stu0 +x0 −E0(1+4Stµ1)
982
+ √8St−1
983
+ .
984
+ (D4)
985
+ Appendix E: Inertia-driven collisions with a sphere
986
+ For a sphere in an inviscid axisymmetric flow, the flow field
987
+ is[25]
988
+ usphere
989
+ U
990
+ =
991
+
992
+ 1− R3
993
+ r3
994
+
995
+ cos(θ)�r−
996
+
997
+ 1+ R3
998
+ 2r3
999
+
1000
+ sin(θ)�θ,
1001
+ (E1)
1002
+ which when expanded about the forward stagnation point with
1003
+ U = R = 1 gives
1004
+ usphere =
1005
+
1006
+ −3x+6x2 +O(cubic terms)
1007
+ � ˆr
1008
+ +
1009
+
1010
+ −3
1011
+ 2y+ 3
1012
+ 2xy+O(cubic terms)
1013
+
1014
+ ˆθ.
1015
+ (E2)
1016
+ As Eq. (E2) is the same as the equivalent for a cylinder,
1017
+ Eq. (6), apart from numerical prefactors, there is also a critical
1018
+ value of the Stokes number for a sphere. The different numer-
1019
+ ical factors shift it to the lower value of Stc = 1/12, which
1020
+ agrees with the result of Langmuir and Blodgett [16]. The
1021
+ change from a −2x term in the flow field for a cylinder to a
1022
+ −3x term for a sphere just shifts the critical value down by a
1023
+ factor of 2/3. The equivalent of Eq. (8) for a sphere just has a
1024
+ −3x term in place of the −2x term. This means that we have
1025
+ the same 1/δ 1/2 scaling of the time to collide.
1026
+ In spherical polar coordinates, the acceleration terms along
1027
+ a constant azimuthal angle trajectory, in Eq. (3) are the same
1028
+ as those for the two-dimensional cylindrical polar coordinates.
1029
+ Hence the left-hand-sides of Eq. (4), and thus of Eq. (7a) and
1030
+ Eq. (7b), are the same as presented here, i.e. the ˙y2 term is the
1031
+ significant term, and the analysis presented for the cylinder
1032
+ can be repeated for the sphere. The result is that the scaling
1033
+ law for the deposition efficiency has the same δ dependence as
1034
+ for the cylinder except with modified multiplicative constants.
1035
+ [1] H. R. Pruppacher, Microphysics of clouds and precipitation (D.
1036
+ Reidel Pub. Co, Dordrecht, Holland, 1978).
1037
+ [2] C.-s. Wang and Y. Otani, Removal of nanoparticles from gas
1038
+ streams by fibrous filters: A review, Industrial & Engineering
1039
+ Chemistry Research 52, 5 (2013).
1040
+ [3] J. F. Robinson, I. Rios de Anda, F. J. Moore, J. P. Reid, R. P.
1041
+ Sear, and C. P. Royall, Efficacy of face coverings in reducing
1042
+ transmission of COVID-19: Calculations based on models of
1043
+ droplet capture, Physics of Fluids 33, 043112 (2021).
1044
+ [4] J. F. Robinson, I. Rios de Anda, F. J. Moore, F. K. A. Gregson,
1045
+ J. P. Reid, L. Husain, R. P. Sear, and C. P. Royall, How effec-
1046
+ tive are face coverings in reducing transmission of COVID-19?,
1047
+ Aerosol Science and Technology 56, 473 (2022).
1048
+ [5] A. R. Parker and C. R. Lawrence, Water capture by a desert
1049
+ beetle, Nature 414, 33 (2001).
1050
+ [6] A. Shahrokhian, J. Feng, and H. King, Surface morphology
1051
+ enhances deposition efficiency in biomimetic, wind-driven fog
1052
+ collection, J. Roy. Soc. Interface 17, 20200038 (2020).
1053
+ [7] M. Azeem, A. Guérin, T. Dumais, L. Caminos, R. E. Goldstein,
1054
+ A. I. Pesci, J. de Dios Rivera, M. J. Torres, J. Wiener, J. L. Cam-
1055
+ pos, and J. Dumais, Optimal design of multilayer fog collectors,
1056
+ ACS App. Mat. Int. 12, 7736 (2020).
1057
+ [8] K. J. Niklas, Wind pollination—a study in controlled chaos:
1058
+ Aerodynamic studies of wind-pollinated plants reveal a high
1059
+ degree of control in the apparently random process of pollen
1060
+ capture, American Scientist 73, 462 (1985).
1061
+ [9] K. T. Paw U and C. Hotton, Optimum pollen and female recep-
1062
+ tor size for anemophily, Am J Botany , 445 (1989).
1063
+ [10] L. Makkonen, Modeling of ice accretion on wires, Journal of
1064
+ Applied Meteorology and Climatology 23, 929 (1984).
1065
+ [11] L. Makkonen, Models for the growth of rime, glaze, icicles and
1066
+ wet snow on structures, Philosophical Transactions: Mathemat-
1067
+ ical, Physical and Engineering Sciences 358, 2913 (2000).
1068
+ [12] L. Gao, T. Tao, Y. Liu, and H. Hu, A field study of ice accre-
1069
+ tion and its effects on the power production of utility-scale wind
1070
+ turbines, Renew. Energ. 167, 917 (2021).
1071
+ [13] F. Albrecht, Theoretische Untersuchungen über die Ablagerung
1072
+ von Staub aus strömender Luftund ihre Anwendung auf die
1073
+ Theorie Staubfilter, Physik. Zeithschift 32, 48 (1931).
1074
+ [14] G. I. Taylor, Notes on possible equipment and technique for
1075
+ experiments on icing on aircraft, Reports and Memoranda of
1076
+ the Aeronautical Research Committee 2024 (1940).
1077
+ [15] G. I. Taylor, The scientific papers of Sir Geoffrey Ingram Taylor.
1078
+ Volume Three. Aerodynamics and Mechanics of Projectiles and
1079
+ Explosions, Vol. 3 (Cambridge University Press, 1963).
1080
+ [16] I. Langmuir and K. B. Blodgett, A Mathematical Investigation
1081
+ of Water Droplet Trajectories, AAF technical report (Army Air
1082
+ Forces Headquarters, Air Technical Service Command, 1946).
1083
+ [17] K. J. Finstad, E. P. Lozowski, and E. M. Gates, A computa-
1084
+ tional investigation of water droplet trajectories, Journal of At-
1085
+ mospheric and Oceanic Technology 5, 160 (1988).
1086
+ [18] K. J. Finstad, E. P. Lozowski, and L. Makkonen, On the median
1087
+ volume diameter approximation for droplet collision efficiency,
1088
+ Journal of Atmospheric Sciences 45, 4008 (1988).
1089
+ [19] C. Phillips and S. Kaye, The influence of the viscous boundary
1090
+ layer on the critical stokes number for particle impaction near a
1091
+ stagnation point, Journal of aerosol science 30, 709 (1999).
1092
+ [20] A. D. Araújo, J. S. Andrade, and H. J. Herrmann, Critical Role
1093
+ of Gravity in Filters, Phys. Rev. Lett. 97, 138001 (2006).
1094
+ [21] J. B. Wong, W. E. Ranz, and H. F. Johnstone, Inertial impaction
1095
+ of aerosol particles on cylinders, Journal of Applied Physics 26,
1096
+ 244 (1955).
1097
+ [22] L. Makkonen and J. Stallabrass, Experiments on the cloud
1098
+ droplet collision efficiency of cylinders, Journal of Applied Me-
1099
+
1100
+ 10
1101
+ teorology and Climatology 26, 1406 (1987).
1102
+ [23] L. Makkonen, Analysis of rotating multicylinder data in mea-
1103
+ suring cloud-droplet size and liquid water content, Journal of
1104
+ Atmospheric and Oceanic Technology 9, 258 (1992).
1105
+ [24] L. Makkonen, J. Zhang, T. Karlsson, and M. Tiihonen, Mod-
1106
+ elling the growth of large rime ice accretions, Cold Regions
1107
+ Science and Technology 151, 133 (2018).
1108
+ [25] D. J. Acheson, Elementary fluid dynamics (Clarendon Press,
1109
+ Oxford, 1990).
1110
+ [26] J. F. Robinson, P. B. Warren, M. R. Turner, and R. P. Sear, pri-
1111
+ vate communication (2022).
1112
+ [27] D. Ingham, L. Hildyard, and M. Hildyard, On the critical
1113
+ stokes’ number for particle transport in potential and viscous
1114
+ flows near bluff bodies, Journal of Aerosol Science 21, 935
1115
+ (1990).
1116
+ [28] I. Rios de Anda, J. W. Wilkins, J. F. Robinson, C. P. Royall, and
1117
+ R. P. Sear, Modeling the filtration efficiency of a woven fabric:
1118
+ The role of multiple lengthscales, Physics of Fluids 34, 033301
1119
+ (2022).
1120
+
G9AzT4oBgHgl3EQfHfuN/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
GNE5T4oBgHgl3EQfVw9O/content/tmp_files/2301.05553v1.pdf.txt ADDED
@@ -0,0 +1,1602 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Discontinuous Jump Behavior of the Energy Conversion in Wind Energy Systems
2
+ Pyei Phyo Lin,1, ∗ Matthias W¨achter,1 M. Reza Rahimi Tabar,2, 1 and Joachim Peinke1
3
+ 1ForWind, Institute of Physics, University of Oldenburg, Oldenburg, Germany
4
+ 2Department of Physics, Sharif University of Technology, Tehran 11155-9161, Iran
5
+ (Dated: January 16, 2023)
6
+ The power conversion process of a wind turbine can be characterized by a stochastic differential
7
+ equation (SDE) of the power output conditioned to certain fixed wind speeds. An analogous ap-
8
+ proach can also be applied to the mechanical loads on a wind turbine, such as generator torque. The
9
+ constructed SDE consists of the deterministic and stochastic terms, the latter corresponding to the
10
+ highly fluctuating behavior of the wind turbine. Here we show how advanced stochastic analysis of
11
+ the noise contribution can be used to show different operating modes of the conversion process of
12
+ a wind turbine. The parameters of the SDE, known as Kramers-Moyal (KM) coefficients, are esti-
13
+ mated directly from the measurement data. Clear evidence is found that both, continuous diffusion
14
+ noise and discontinuous jump noise are present. The difference in the noise contributions indicates
15
+ different operational regions. In particular, we observe that the jump character or discontinuity in
16
+ power production has a significant contribution in the regions where the control system switches
17
+ strategies. We find that there is a high increase in jump amplitude near the transition to the rated
18
+ region, and the switching strategies cannot result in a smooth transition. The proposed analysis
19
+ provides new insights to the control strategies of the wind turbine.
20
+ I.
21
+ INTRODUCTION
22
+ Wind energy is one of the most promising contributions
23
+ to the global energy transition from fossil fuels to clean
24
+ and sustainable energy.
25
+ Europe could install around
26
+ 105 GW of new wind energy capacity in the period of
27
+ 2021–2025 as reported in [1]. However, the complex and
28
+ intermittent nature of wind makes wind energy produc-
29
+ tion difficult to predict, which is important for a stable
30
+ energy supply [2–5].
31
+ Furthermore this nature of wind
32
+ may cause premature mechanical fatigue failure [6, 7].
33
+ It is known that the commonly used industry standard
34
+ by the International Electrotechnical Commission [8] is
35
+ not describing properly the variability of wind and wind
36
+ power [7, 9]. In particular, if one investigates time series
37
+ of the power output of a wind turbine, one can find very
38
+ rapid power fluctuations, which can become larger than
39
+ 50% of the rated power [10]. Such short time power fluc-
40
+ tuations in the range of MW will represent special loads
41
+ for the drive train and also for the power grid, as these
42
+ fluctuations seem to some add up in a wind farm instead
43
+ of being averaged out [9, 10].
44
+ In this contribution, we focus on a statistically ad-
45
+ vanced description of the power fluctuations of a wind
46
+ turbine. In recent years, it has been shown that the power
47
+ conversion process of a wind turbine can be modeled by
48
+ a stochastic Langevin differential equation of the power
49
+ output P conditioned to certain fixed wind speeds u [10–
50
+ 12]. An analogous approach has also been used to model
51
+ the mechanical loads on a wind turbine such as genera-
52
+ tor torque T [13]. The advantage of this approach is that
53
+ the model equations (in form of the Langevin equation)
54
+ can be extracted directly from given data. This model
55
+ ∗ pyei.phyo.lin@uol.de
56
+ can reproduce the stochastic, turbulent and intermittent
57
+ nature of wind power [10].
58
+ In the Langevin modeling
59
+ of conversion dynamics of a wind turbine, the focus was
60
+ up-to now on the deterministic part of the power time se-
61
+ ries, while the question remained open how to correctly
62
+ capture the abrupt large power fluctuations mentioned
63
+ above.
64
+ The Langevin equation describes a diffusion process
65
+ with continuous trajectory. It consists of the determin-
66
+ istic term and the continuous stochastic term which is
67
+ modeled by a Wiener process or a Brownian motion. Its
68
+ two model parameters which are the drift and diffusion
69
+ coefficients can be estimated directly from the measure-
70
+ ment data [14–16]. These parameters are also known as
71
+ Kramers-Moyal (KM) coefficients which are considered
72
+ up to second order in the Langevin equation. For the
73
+ continuous process, the coefficients higher than third or-
74
+ der are negligible.
75
+ Looking at the temporally high-resolved wind power
76
+ data, one can see portions of time series, which look like a
77
+ diffusive process (see Fig. 1 (a), but there are also periods
78
+ where sudden big jumps of the delivered power become
79
+ obvious, see Fig. 1 (b).
80
+ In this contribution, we aim to investigate how far
81
+ these jumps make it necessary to extend the stochastic
82
+ description.
83
+ If the higher order KM coefficients (> 3)
84
+ are not negligible, they would be an indicator of non-
85
+ continuity in the process [16, 17].
86
+ One possibility to
87
+ model this behavior is the extension of the Langevin dif-
88
+ fusion process to a jump-diffusion process. An additional
89
+ discontinuous stochastic term for the jump process is in-
90
+ troduced for which we assume that it can be modeled by
91
+ a Poisson process. In this more general stochastic ap-
92
+ proach two more parameters arise which are the jump
93
+ rate and the jump amplitude. We show how they can be
94
+ estimated from the higher order KM coefficients. This
95
+ analysis aims to give a more realistic stochastic descrip-
96
+ arXiv:2301.05553v1 [eess.SY] 9 Jan 2023
97
+
98
+ 2
99
+ 25.00
100
+ 25.05
101
+ 25.10
102
+ 25.15
103
+ 0.0
104
+ 0.2
105
+ 0.4
106
+ 0.6
107
+ 0.8
108
+ 1.0
109
+ t [h]
110
+ P P max
111
+ 25.00
112
+ 25.05
113
+ 25.10
114
+ 25.15
115
+ −0.15
116
+ −0.05
117
+ 0.05
118
+ 0.15
119
+ t [h]
120
+ ∆P P max
121
+ (a)
122
+ (c)
123
+ 17.15
124
+ 17.20
125
+ 17.25
126
+ 17.30
127
+ 0.0
128
+ 0.2
129
+ 0.4
130
+ 0.6
131
+ 0.8
132
+ 1.0
133
+ t [h]
134
+ P P max
135
+ 17.15
136
+ 17.20
137
+ 17.25
138
+ 17.30
139
+ −0.15
140
+ −0.05
141
+ 0.05
142
+ 0.15
143
+ t [h]
144
+ ∆P P max
145
+ (b)
146
+ (d)
147
+ FIG. 1. Wind power time series, spanning the period of ten minutes. (a) shows the period where the power changes are not
148
+ very large.(b) shows the period where the power changes are very large, up to about 40% of the rated power. Increments
149
+ ∆P := P(t + τ) − P(t) emphasize the fluctuations and are shown for sampling period τ = 1s in (c) and (d).
150
+ tion of the power output of a wind turbine. Relation to
151
+ control strategies, or the use for improved modeling of the
152
+ wind energy resource in a power grid, will be discussed
153
+ in this paper.
154
+ Our aim is to show in detail the procedure to es-
155
+ timate the general stochastic jump-diffusion process
156
+ with Wiener and Poisson noise to achieve an advanced
157
+ stochastic characterization and modelling of the wind
158
+ power conversion dynamics of a wind turbine. Here, we
159
+ analyze the SCADA data from a wind turbine with res-
160
+ olution of 1 Hz. The article is organized as follows. At
161
+ first, we describe the analysed data. Next, the stochastic
162
+ analysis method is summarized, and it is shown how it is
163
+ possible to quantify and separate the contributions of dif-
164
+ fusion and jump fluctuations. Finally, the results of the
165
+ data analysis for power output conditioned to wind speed
166
+ are presented. In addition, we investigate the stochastic
167
+ relation between generator torque and generator rota-
168
+ tional speed.
169
+ II.
170
+ STOCHASTIC DATA ANALYSIS OF WIND
171
+ ENERGY SYSTEM
172
+ A.
173
+ Data description
174
+ The measurement data are extracted from a wind tur-
175
+ bine of a wind farm. The wind farm is installed onshore
176
+ over an area covering roughly 4 km2 and is surrounded by
177
+ flat rural terrain with 12 identical variable-speed, pitch-
178
+ regulated wind turbines. The rated power of each turbine
179
+ is in the order of 2 MW. The values were made anony-
180
+ mous to keep the confidentiality of the data. Thus, all the
181
+ data are normalized with their corresponding maximum
182
+ for our analysis.
183
+ The measured quantities are the net electrical power
184
+ output, P, generated by the wind turbine, the wind
185
+ speed, u, measured on the nacelle by a cup anemome-
186
+ ter and the rotational speed or rpm, Ω, of the generator.
187
+ The torque, T, on the generator is calculated from the
188
+ power and rpm of the generator using the relation
189
+ T = 60 s
190
+
191
+ P
192
+ Ω .
193
+ (1)
194
+ All measurements were performed at a sampling fre-
195
+
196
+ 3
197
+ quency fs = 1 Hz. The measurement campaign was con-
198
+ ducted over a period of eight months, from June 2009
199
+ till February 2010. The same data were used also in the
200
+ study of [18].
201
+ B.
202
+ Power Conversion Process Described by
203
+ Stochastic Dynamics
204
+ Assuming the validity of a diffusive process, the power
205
+ conversion process of a wind turbine can be modelled as
206
+ a stochastic Langevin equation of the power output P
207
+ conditioned to certain fixed wind speed u [10–12],
208
+ dP(t, u) = D(1)(P|u) dt +
209
+
210
+ D(2)(P|u) dWt ,
211
+ (2)
212
+ where Wt is a Wiener process, a scalar Brownian mo-
213
+ tion.
214
+ The general non-linear functions D(1)(P|u) and
215
+ D(2)(P|u) are the drift and the diffusion functions, which
216
+ in case of the Langevin equation (2) are identical to the
217
+ first and second order Kramers-Moyal (KM) coefficients.
218
+ In general, the j-th order KM coefficients, K(j)(P|u), can
219
+ be directly determined from given data P for each wind
220
+ speed u, using their definitions in terms of conditional
221
+ incremental averaging, cf. [14, 16], as
222
+ K(j)(P|u) = lim
223
+ ∆t→0
224
+ 1
225
+ ∆t
226
+
227
+ (P(t + ∆t) − P(t))j|P (t)=P, u(t)=u
228
+
229
+ .
230
+ (3)
231
+ The Langevin equation describes a continuous diffusion
232
+ process where K(j)(P|u) = 0 for j ≥ 3 and D(j)(P|u) =
233
+ K(j)(P|u) for j = 1, 2. Further details on methods of this
234
+ estimation can be found in [14, 15].1 All the higher order
235
+ KM coefficients vanish when the fourth order KM coef-
236
+ ficient K(4)(P|u) is negligible according to the Pawula
237
+ theorem [19].
238
+ When the signal of a stochastic process
239
+ has sharp changes, or discontinuities, at some instants,
240
+ typically higher order Kramers-Moyal coefficients and es-
241
+ pecially K(4)(P|u) are not negligible anymore. In this
242
+ case, an extension of the Langevin-type modeling with
243
+ an additional jump noise is needed, see [16, 17, 20–23].
244
+ Such a jump-diffusion dynamics for a power conversion
245
+ process is given by
246
+ dP(t, u) = D(1)(P|u) dt +
247
+
248
+ D(2)(P|u) dWt + ξ dJt , (4)
249
+ where again Wt is a Wiener process, D(1)(P|u) and
250
+ D(2)(P|u) are the drift and the diffusion functions. In the
251
+ 1 KM
252
+ coefficients
253
+ of
254
+ a
255
+ Langevin
256
+ process
257
+ in
258
+ x(t)
259
+ are
260
+ de-
261
+ fined
262
+ for
263
+ j
264
+ =
265
+ 1, 2
266
+ as
267
+ K(j)(x, t)
268
+ =
269
+ D(j)(x, t)
270
+ =
271
+ 1
272
+ j! lim∆t→0
273
+ 1
274
+ ∆t
275
+
276
+ (x(t + ∆t) − x(t))j |x(t)=x
277
+
278
+ in [14, 15]. In order
279
+ to stay consistent with the jump-diffusion process, our defini-
280
+ tion differs by a factor of
281
+ 1
282
+ j! , and dWt =
283
+ � t+dt
284
+ t
285
+ Γ(τ) · dτ where
286
+ ⟨Γ(t)⟩ = 0 and ⟨Γ(t)Γ(t′)⟩ = δ(t−t′). The corresponding Fokker-
287
+ Planck equation will be
288
+
289
+ ∂t p(x, t) = − ∂
290
+ ∂x
291
+
292
+ D(1)(x, t) p(x, t)
293
+
294
+ +
295
+ 1
296
+ 2
297
+ ∂2
298
+ ∂x2
299
+
300
+ D(2)(x, t) p(x, t)
301
+
302
+ .
303
+ following we assume that ξ dJt is a Poisson jump process.
304
+ The coefficient ξ is the jump size, which is assumed to be
305
+ normally distributed, ξ ∼ N(0, σ2
306
+ ξ), with zero mean and
307
+ variance σ2
308
+ ξ. ξ is also known as jump amplitude. Jt is a
309
+ Poisson jump process which is a zero-one jump process
310
+ with jump rate λ(P|u) [16, 24]. The drift and diffusion
311
+ coefficients and the jump rate are now related to the KM
312
+ coefficients K(j)(P|u) in the following way [17]:
313
+ D(1)
314
+ j
315
+ (P|u) = K(1)(P|u),
316
+ (5)
317
+ D(2)
318
+ j
319
+ (P|u) + λ(P|u)⟨ξ2⟩ = K(2)(P|u),
320
+ (6)
321
+ λ(P|u)⟨ξj⟩ = K(j)(P|u)
322
+ for j > 2.
323
+ (7)
324
+ Since ξ has zero mean, its second order moment is
325
+ ⟨ξ2⟩ = σ2
326
+ ξ. From Eq. (5), it can be seen that the esti-
327
+ mation of the drift coefficient is the same for the diffu-
328
+ sion process, which obeys the Langevin equation, and the
329
+ jump-diffusion process. Here we go into more details of
330
+ the noise part and do not assume anymore a vanishing
331
+ K(4) = 0.
332
+ Jump amplitude σ2
333
+ ξ and jump rate λ can be esti-
334
+ mated by using Eq. (7) with j = 4 and 6 and Wick’s
335
+ theorem [25, 26] for Gaussian random variables, i.e.,
336
+ ⟨ξ2n⟩ = (2n)!
337
+ 2nn! ⟨ξ2⟩n,
338
+ σ2
339
+ ξ(P|u) = K(6)(P|u)
340
+ 5K(4)(P|u),
341
+ (8)
342
+ λ(P|u) = K(4)(P|u)
343
+ 3σ4
344
+ ξ(P|u) .
345
+ (9)
346
+ C.
347
+ Results
348
+ 1.
349
+ Results for Electrical Power Output
350
+ First, we analyze the relation between wind speed and
351
+ power. For chosen fixed wind speed values with bin sizes
352
+ of 0.5 ms−1, the KM coefficients K(j)(P|u) are deter-
353
+ mined with the assumption of stationarity within the
354
+ corresponding wind speed bin.
355
+ Firstly, the drift coef-
356
+ ficients are determined. The zero-crossings of the drift
357
+ coefficient, D(1)(P|u) = 0, correspond to the stable fixed
358
+ points or equilibria of each wind speed bin if the slope
359
+ of D(1) is negative [11, 27].
360
+ Zero-crossings with posi-
361
+ tive slope are unstable fixed points. Alternatively, this
362
+ can be expressed by a drift potential, which is defined
363
+ as Φ = −
364
+
365
+ P D(1)(P|u) dP. The zero-crossings with neg-
366
+ ative slope of the drift correspond correspond to min-
367
+ ima of the drift potential. An example of a drift coeffi-
368
+ cient and corresponding potential for the wind speed of
369
+ u = 0.41 umax is shown in Fig. 2.
370
+ For each wind speed bin, there can be single or mul-
371
+ tiple fixed points.
372
+ With these stable fixed points, we
373
+ can reconstruct the characteristic power curve, which we
374
+
375
+ 4
376
+ G
377
+ G
378
+ G
379
+ G
380
+ GG
381
+ G
382
+ G
383
+ GG
384
+ GGGGGGGGGGGGGGGGGGGGGGGGG
385
+ G
386
+ G
387
+ 0.0
388
+ 0.2
389
+ 0.4
390
+ 0.6
391
+ 0.8
392
+ 1.0
393
+ −0.03
394
+ 0.00
395
+ 0.02
396
+ 0.04
397
+ P P max
398
+ D (1)
399
+ (a)
400
+ G
401
+ G
402
+ G
403
+ G
404
+ G
405
+ G
406
+ G
407
+ G
408
+ GGGGGGGGGGGGGGGGGGGGGGGGGGGG
409
+ G
410
+ 0.0
411
+ 0.2
412
+ 0.4
413
+ 0.6
414
+ 0.8
415
+ 1.0
416
+ −0.30
417
+ −0.20
418
+ −0.10
419
+ 0.00
420
+ P P max
421
+ Φ
422
+ (b)
423
+ FIG. 2. Drift coefficient D1(P|u) (a) and corresponding potential Φ (b) for the wind speed of u = 0.41 umax. Zero-crossings
424
+ of the drift coefficient D1(P|u) = 0 or local minima of drift potential Φ are stable fixed points which describe the equilibrium
425
+ dynamics.
426
+ call Langevin Power Curve (LPC) [28, 29], as shown in
427
+ Fig. 3 (a). These stable fixed points can already be used
428
+ for a definition of different operational states of the wind
429
+ turbine. In our case, we mark three distinct states (P1,
430
+ P2 and P3) which separate the operational regions by
431
+ blue dotted lines. Multiple fixed points are found to be
432
+ at these states. Near operation point P2 in Fig. 3 (a),
433
+ we observe the shifting of fixed points in a discontinuous
434
+ way. Such details cannot be detected by the standard
435
+ averaging procedure of power curve defined by [8].
436
+ The fixed point analysis and characterization of power
437
+ output of a wind turbine by Langevin equation (2) or dif-
438
+ fusion process have been studied by [11, 12, 18]. In their
439
+ works, they extensively focused on the drift coefficient.
440
+ Higher order KM coefficients were not considered. In our
441
+ work here, we focus on the noisy part and evaluate the
442
+ higher order KM coefficients.
443
+ As explained in Sec. II B, first the fourth-order KM co-
444
+ efficient K(4)(P|u) is estimated to see if jump noise mat-
445
+ ters. An example of K(4)(P|u) and the jump amplitude
446
+ σ2
447
+ ξ(P|u) for the wind speed of u = 0.41 umax with their
448
+ medians (solid black lines) is shown in Fig. 7. The fixed
449
+ point for this wind speed bin is located at P = 0.7 Pmax,
450
+ see Fig. 2.
451
+ Statistically, we can obtain more accurate
452
+ results near the fixed point due to the better coverage
453
+ of data, whereas for regions with less data (farther away
454
+ from the fixed point) the results become more noisy and
455
+ outliers are seen. A robust method to estimate is to use
456
+ the medians instead of the means [30]. Some examples
457
+ are shown in Appendix A.
458
+ In the following, we investigate details of the median
459
+ values. Thus, we simplify the process to those with con-
460
+ stant parameters σ2
461
+ ξ and λ for the jump process. The
462
+ P-dependence of these parameters can also be studied,
463
+ which we do not do here to keep the discussion simpler,
464
+ see Fig. 7.
465
+ Fig. 4 (a) shows that there is an increase
466
+ of �
467
+ K(4)(P|u) near the state P3, the transition point to
468
+ the rated power. This behavior of �
469
+ K(4) shows that not
470
+ only diffusive noise is present, thus we proceed to ana-
471
+ lyze also the higher order KM-coefficients from which we
472
+ can determine the jump amplitude �
473
+ σ2
474
+ ξ and jump rate �λ
475
+ for each wind speed as shown in Fig. 5 (a) and (c). The
476
+ jump amplitude σ2
477
+ ξ is highest between the states P2 and
478
+ P3 which is just below the transition to the rated power
479
+ region where the switching of the control strategy play a
480
+ major role. The jump rate �λ is highest in the region of
481
+ rated power.
482
+ In order to quantify the overall jump contribution, we
483
+ determine the product �
484
+ λσ2
485
+ ξ as shown in Fig. 6 (c). Again
486
+ we see that the jump contribution �
487
+ λσ2
488
+ ξ is highest around
489
+ the state P3. Moreover, we also determine the median
490
+ of the diffusion to jump ratio �
491
+ D(2)
492
+ λσ2
493
+ ξ over the power bins
494
+ for each wind speed bin obtained from the resolved D(2)
495
+ λσ2
496
+ ξ
497
+ values as shown in Fig. 6 (e) to find out whether diffusive
498
+ or jump noise is dominating. If the ratio is large, there
499
+ is more diffusive noise and vice versa. The jump noise
500
+ is dominant in the rated power region after the state
501
+
502
+ 5
503
+ 0.0
504
+ 0.2
505
+ 0.4
506
+ 0.6
507
+ 0.8
508
+ 1.0
509
+ 0.0
510
+ 0.2
511
+ 0.4
512
+ 0.6
513
+ 0.8
514
+ 1.0
515
+ u umax
516
+ P P max
517
+ G
518
+ GGGG
519
+ G
520
+ G
521
+ G
522
+ G
523
+ G
524
+ G
525
+ G
526
+ G
527
+ G
528
+ GGG
529
+ G
530
+ G
531
+ G
532
+ G
533
+ G
534
+ G
535
+ G
536
+ G
537
+ G
538
+ GGGGGGGGGGGGGGGGGGG
539
+ P1
540
+ P2
541
+ P3
542
+ G Fixed Points
543
+ (a)
544
+ 0.6
545
+ 0.7
546
+ 0.8
547
+ 0.9
548
+ 1.0
549
+ 0.0
550
+ 0.2
551
+ 0.4
552
+ 0.6
553
+ 0.8
554
+ 1.0
555
+ Ω Ωmax
556
+ T T max
557
+ G
558
+ G GGG
559
+ GG
560
+ G G
561
+ G
562
+ G
563
+ G
564
+ G G G G G G G G G GG G G G
565
+ G
566
+ G
567
+ G
568
+ G
569
+ G
570
+ G G G G
571
+ T1
572
+ T2
573
+ T3
574
+ G Fixed Points
575
+ (b)
576
+ FIG. 3. Characteristic power curve, (a), determined from the zero crossings of the drift coefficients at each wind speed bin and
577
+ characteristic torque curve, (b), at each rotational speed rpm bin, presented in red open circles. They are also called Langevin
578
+ Power Curve (LPC) and Langevin Torque Curve (LTC), respectively. The blue background shows the density scatter plot of
579
+ the measurement data and darker regions indicate more data points are available. The black dots are the outliers of the density
580
+ scatter plot. Three distinct states (P1, P2 and P3) for LPC and (T1, T2 and T3) for LTC which separate the operational
581
+ regions are marked by blue dotted lines.
582
+ P3. The diffusive noise is dominant between the states
583
+ P1 and P2, which also coincides with the lowest jump
584
+ contribution λσ2
585
+ ξ, Fig. 6 (c).
586
+ The analysis in this subsection shows two important
587
+ points. First, a jump process is present and should be
588
+ included in an advanced stochastic description or, respec-
589
+ tively, model. Second, below rated power, first a diffusive
590
+ stochastic behavior is dominating, while jumpy noise be-
591
+ comes important for the considered wind turbine close to
592
+ the transition to rated power.
593
+ 2.
594
+ Results for Generator Torque
595
+ Apart from the dynamical dependence of power on the
596
+ wind speed, another central characteristic of the wind
597
+ turbine is the generator torque T vs. rotational speed or
598
+ rpm Ω [13]. The generator torque was calculated from
599
+ power and rpm data according to Eq. (1), whereas the
600
+ rpm was measured independently. A similar stochastic
601
+ approach like for the power and wind speed is applied to
602
+ the torque and rpm dynamics T(t, Ω), next. Based on the
603
+ drift coefficient, a characteristic curve like the Langevin
604
+ Power Curve is calculated as shown in Fig. 3 (b). We
605
+ refer to it as Langevin Torque Curve (LTC). We again
606
+ mark three distinct states (T1, T2 and T3) with blue
607
+ dotted lines which can be deduced from the fixed point
608
+ analysis.
609
+ Next, we also determine the jump contribution λσ2
610
+ ξ
611
+ and the diffusion to jump ratio D(2)
612
+ λσ2
613
+ ξ for each rpm bin, see
614
+ Fig. 6 (d) and (f). In Fig. 6 (d), we see that the median
615
+ of the jump contribution �
616
+ λσ2
617
+ ξ becomes significant in the
618
+ region between T2 and T3, cf. Fig. 3 (b), at relatively
619
+ high rpm values. Outside this regime, jump noise does
620
+ not dominantly contribute to the dynamics. On the other
621
+ hand, the median of the diffusion to jump ratio �
622
+ D(2)
623
+ λσ2
624
+ ξ takes
625
+ its largest values at low values of rotational speed rpm.
626
+ At the rotational speeds rpm below the state T1, diffusive
627
+ behavior is much more dominant.
628
+ The conclusions from the previous subsection II C 1 ap-
629
+ ply also to the torque analysis in an analogous way. Sim-
630
+ ilar to the power characteristic, a jump process is also
631
+ present for the torque characteristic, which could be ex-
632
+ pected as we compute the torque from power and rota-
633
+ tional speed. Diffusive stochastic behavior is dominating
634
+ for low rpm, but in the region from T1 on (Ω/��max ≳ 0.7)
635
+ diffusive and jumpy behavior seem to be more balanced
636
+ for the torque case.
637
+
638
+ 6
639
+ 0.0
640
+ 0.2
641
+ 0.4
642
+ 0.6
643
+ 0.8
644
+ 1.0
645
+ u umax
646
+ K (4)
647
+ GG
648
+ G
649
+ G
650
+ GGGGGGGGGG
651
+ GG
652
+ G
653
+ G
654
+ GG
655
+ G
656
+ G
657
+ G
658
+ G
659
+ G
660
+ G
661
+ G
662
+ G
663
+ G
664
+ G
665
+ GGGGGGGGGGGGGGG
666
+ 0
667
+ 0.00001
668
+ 0.00002
669
+ GG
670
+ G
671
+ G
672
+ GGGGGGGGGG
673
+ GG
674
+ G
675
+ G
676
+ GG
677
+ G
678
+ G
679
+ G
680
+ G
681
+ G
682
+ G
683
+ G
684
+ G
685
+ G
686
+ G
687
+ GGGGGGGGGGGGGGG
688
+ P1
689
+ P2
690
+ P3
691
+ (a)
692
+ 0.6
693
+ 0.7
694
+ 0.8
695
+ 0.9
696
+ 1.0
697
+ Ω Ωmax
698
+ K (4)
699
+ GGGGGGG
700
+ G
701
+ GGGGGGGGGGGGG
702
+ G
703
+ G
704
+ G
705
+ GGGGGGG
706
+ 0
707
+ 0.0002
708
+ 0.0004
709
+ GGGGGGG
710
+ G
711
+ GGGGGGGGGGGGG
712
+ G
713
+ G
714
+ G
715
+ GGGGGGG
716
+ T1
717
+ T2
718
+ T3 (b)
719
+ FIG. 4. The median of the fourth-order KM coefficient, �
720
+ K(4)(u) over the power bins for each wind speeds bin (a) and over
721
+ the torque bins for each rpm bin (b). There is an increase of �
722
+ K(4)(u) near the transition to the rated region. Statistical
723
+ uncertainties are shown as gray-shaded background. Blue dotted lines are the distinct states observed from the fixed point
724
+ analysis, see Fig. 3.
725
+ III.
726
+ CONCLUSION AND OUTLOOK
727
+ In our work, we investigate the contribution of the
728
+ higher-order KM coefficients to the stochastic conversion
729
+ dynamics of a wind turbine. As described in Sec. II B,
730
+ these higher-order coefficients allow to quantify the con-
731
+ tributions of diffusive behavior and jump noise, and in-
732
+ dicate that discontinuities in the trajectory of the mea-
733
+ surement data are due to the stochastic jump noise. The
734
+ main results are that we can quantify with our proposed
735
+ method how the amplitudes and the ratio of the two noise
736
+ contributions change in different operating ranges of a
737
+ wind turbine. The region below rated power seems to
738
+ provide the highest values of the amplitudes (D(2) and
739
+ σ2
740
+ ξ).
741
+ Sometimes the maximal values are found for the
742
+ transition states defined by the fixed point characteris-
743
+ tics. The ratio between the contributions of the diffusive
744
+ and jumpy noise shows that at low wind speed and low
745
+ power a diffusive noise is dominating whereas for higher
746
+ power more jump noise is present, with some detailed
747
+ differences for power and torque. All this indicates that
748
+ it is the interplay between the stochastic driving wind
749
+ speed and the reacting control system that determines
750
+ the noise contribution. In particular, the jump contri-
751
+ bution is closely linked to the control system as one can
752
+ see, to our interpretation, in the rapid changes of σ2
753
+ ξ in
754
+ Fig. 5 (b). Interestingly, this is more prominent in the
755
+ torque signal than in the power signal. It is well known
756
+ that the control system is not operating directly with the
757
+ wind signal but with toque T and the rotational speed
758
+ Ω.
759
+ Near the states T1, T2 and T3, there are three dis-
760
+ tinct operational rotational speeds Ω which the control
761
+ system prefers to approach. It is a common control strat-
762
+ egy to avoid certain resonance frequencies of the struc-
763
+ ture in order to mitigate excessive loads. We show this
764
+ by evaluating the drift potential Φ(Ω) of the rotational
765
+ speed. The minima of this potential correspond to the
766
+ preferred rotational speeds, see Appendix B. Moreover,
767
+ looking at Fig. 3 (b), between the states T2 and T3, there
768
+ is a steep gradient which enforces a large change in gener-
769
+ ator torque T at only a small regime in rotational speed
770
+ Ω. In this range, we also observe that there is a huge
771
+ increase in both diffusive and jump noise by more than
772
+ two orders of magnitude, see Fig. 6 (b) and (d).
773
+ So far we used the stochastic methods to character-
774
+ ize the dynamics of the wind energy conversion process.
775
+ It goes without saying that the characterization can be
776
+ used to compare quantitatively different turbines.
777
+ Po-
778
+ tential failures in the control system should be detectable
779
+ by comparison of the different stochastic terms. One may
780
+ see how with time some noise contribution changes as the
781
+ system gets old, or one may show how different wind tur-
782
+ bines or different contril strategies perform differently in
783
+ a dynamic sense. Together with detailed knowledge of a
784
+ specific turbine this should also be useful for monitoring,
785
+ e.g., performance or structural health.
786
+ At last we would like to point out that besides this
787
+
788
+ 7
789
+ 0.0
790
+ 0.2
791
+ 0.4
792
+ 0.6
793
+ 0.8
794
+ 1.0
795
+ 0.000
796
+ 0.002
797
+ 0.004
798
+ u umax
799
+ σξ
800
+ 2
801
+ G
802
+ G
803
+ GGG
804
+ G
805
+ G
806
+ G
807
+ GG
808
+ G
809
+ G
810
+ G
811
+ G
812
+ G
813
+ G
814
+ GG
815
+ G
816
+ G
817
+ GG
818
+ GG
819
+ G
820
+ G
821
+ G
822
+ GGG
823
+ GGGGGG
824
+ GG
825
+ G
826
+ G
827
+ G
828
+ G
829
+ GGG
830
+ G
831
+ G
832
+ G
833
+ GG
834
+ G
835
+ G
836
+ G
837
+ G
838
+ G
839
+ G
840
+ GG
841
+ G
842
+ G
843
+ GG
844
+ GG
845
+ G
846
+ G
847
+ G
848
+ GGG
849
+ GGGGGG
850
+ GG
851
+ G
852
+ G
853
+ P1
854
+ P2
855
+ P3
856
+ (a)
857
+ 0.6
858
+ 0.7
859
+ 0.8
860
+ 0.9
861
+ 1.0
862
+ 0.000
863
+ 0.004
864
+ 0.008
865
+ Ω Ωmax
866
+ σξ
867
+ 2
868
+ GGGGGGG
869
+ G
870
+ GGGGGGGGGGGG
871
+ G
872
+ GGG
873
+ G
874
+ GGGGG
875
+ GGGGGGG
876
+ G
877
+ GGGGGGGGGGGG
878
+ G
879
+ GGG
880
+ G
881
+ GGGGG
882
+ T1
883
+ T2
884
+ T3 (b)
885
+ 0.0
886
+ 0.2
887
+ 0.4
888
+ 0.6
889
+ 0.8
890
+ 1.0
891
+ 0.0
892
+ 0.4
893
+ 0.8
894
+ u umax
895
+ λ
896
+ G
897
+ G
898
+ G
899
+ G
900
+ G
901
+ GGGG
902
+ GGGG
903
+ G
904
+ G
905
+ G
906
+ GGGG
907
+ GG
908
+ G
909
+ G
910
+ G
911
+ G
912
+ G
913
+ G
914
+ G
915
+ G
916
+ G
917
+ G
918
+ G
919
+ G
920
+ G
921
+ G
922
+ G
923
+ G
924
+ G
925
+ GGGG
926
+ GGGG
927
+ G
928
+ G
929
+ G
930
+ GGGG
931
+ GG
932
+ G
933
+ G
934
+ G
935
+ G
936
+ G
937
+ G
938
+ G
939
+ G
940
+ G
941
+ G
942
+ G
943
+ G
944
+ P1
945
+ P2
946
+ P3
947
+ (c)
948
+ 0.6
949
+ 0.7
950
+ 0.8
951
+ 0.9
952
+ 1.0
953
+ 0.0
954
+ 0.4
955
+ 0.8
956
+ Ω Ωmax
957
+ λ
958
+ GGG
959
+ G
960
+ GG
961
+ GGG
962
+ GGGGGG
963
+ G
964
+ GG
965
+ G
966
+ G
967
+ G
968
+ G
969
+ G
970
+ G
971
+ G
972
+ G
973
+ GGG
974
+ G
975
+ GG
976
+ GGG
977
+ GGGGGG
978
+ G
979
+ GG
980
+ G
981
+ G
982
+ G
983
+ G
984
+ G
985
+ G
986
+ G
987
+ G
988
+ T1
989
+ T2
990
+ T3 (d)
991
+ FIG. 5. The median of jump amplitude, �
992
+ σ2
993
+ ξ, over the power bins for each wind speed bin (a) and over the torque bins for each
994
+ rpm bin (b). There is a significant increase in jump amplitude near the transition to the rated region. The median of jump
995
+ rate, �λ, over the power bins for each wind speed bin (c) and over the torque bins for each rpm bin (d). There is a significant
996
+ increase in jump rate after the transition to the rated region and a small increase near the cut-in region for power analysis. The
997
+ jump rate for torque analysis is similar in between all three distinct states shown by blue dotted lines as in Fig. 3. Statistical
998
+ uncertainties are shown as gray-shaded background.
999
+ characterization the stochastic methods presented here
1000
+ also deliver the explicit form of the stochastic differential
1001
+ equations.
1002
+ Thus, it is also possible to use our results
1003
+ as very efficient dynamics models for power and torque.
1004
+ Long time simulations can be done easily. Such models
1005
+ are of interest for the simulation of the contribution of
1006
+ wind energy to the power grid and for the simulation of
1007
+ loads.
1008
+ ACKNOWLEDGMENTS
1009
+ The authors would like to thank Vlaho Petrovi´c
1010
+ and Christian Philipp for helpful discussions.
1011
+ We
1012
+ acknowledge financial support by the Federal Ministry
1013
+ for Economic Affairs and Climate Action of Germany in
1014
+ the framework of the projects “WEA-Doktor” (reference
1015
+ 0324263A) and “WiSAbigdata” (reference 03EE3016A).
1016
+ Appendix A: Median as a Robust Estimator
1017
+ Statistically, we can obtain more accurate results near
1018
+ the fixed point due to the better coverage of data,
1019
+ whereas for regions with less data (farther away from
1020
+ the fixed point) the results become more noisy and out-
1021
+ liers are seen. A robust method to estimate the typical
1022
+ value of K(4)(P|u) and σ2
1023
+ ξ(P|u), as examples, is to use
1024
+ the medians �
1025
+ K(4)(u) and �
1026
+ σ2
1027
+ ξ(u) as shown by solid lines in
1028
+ Fig. 7.
1029
+
1030
+ 8
1031
+ 0.0
1032
+ 0.2
1033
+ 0.4
1034
+ 0.6
1035
+ 0.8
1036
+ 1.0
1037
+ u umax
1038
+ D (2)
1039
+ G
1040
+ G
1041
+ GGG
1042
+ GG
1043
+ G
1044
+ GG
1045
+ G
1046
+ G
1047
+ G
1048
+ GG
1049
+ GGGGGGGG
1050
+ G
1051
+ G
1052
+ G
1053
+ G
1054
+ G
1055
+ G
1056
+ GG
1057
+ G
1058
+ G
1059
+ G
1060
+ 0.00001
1061
+ 0.0001
1062
+ 0.001
1063
+ G
1064
+ G
1065
+ GGG
1066
+ GG
1067
+ G
1068
+ GG
1069
+ G
1070
+ G
1071
+ G
1072
+ GG
1073
+ GGGGGGGG
1074
+ G
1075
+ G
1076
+ G
1077
+ G
1078
+ G
1079
+ G
1080
+ GG
1081
+ G
1082
+ G
1083
+ G
1084
+ P1
1085
+ P2
1086
+ P3
1087
+ (a)
1088
+ 0.6
1089
+ 0.7
1090
+ 0.8
1091
+ 0.9
1092
+ 1.0
1093
+ Ω Ωmax
1094
+ D (2)
1095
+ G
1096
+ G
1097
+ GGGGGGG
1098
+ GGGGGGGGGGG
1099
+ G
1100
+ G
1101
+ GG
1102
+ G
1103
+ G
1104
+ 0.000001
1105
+ 0.0001
1106
+ 0.01
1107
+ G
1108
+ G
1109
+ GGGGGGG
1110
+ GGGGGGGGGGG
1111
+ G
1112
+ G
1113
+ GG
1114
+ G
1115
+ G
1116
+ T1
1117
+ T2
1118
+ T3 (b)
1119
+ 0.0
1120
+ 0.2
1121
+ 0.4
1122
+ 0.6
1123
+ 0.8
1124
+ 1.0
1125
+ u umax
1126
+ λ σξ
1127
+ 2
1128
+ G
1129
+ G
1130
+ GGG
1131
+ G
1132
+ GG
1133
+ G
1134
+ G
1135
+ G
1136
+ GG
1137
+ GGG
1138
+ GGGGGGGG
1139
+ G
1140
+ GGG G
1141
+ GG
1142
+ GG
1143
+ G
1144
+ 0.000001
1145
+ 0.0001
1146
+ 0.01
1147
+ G
1148
+ G
1149
+ GGG
1150
+ G
1151
+ GG
1152
+ G
1153
+ G
1154
+ G
1155
+ GG
1156
+ GGG
1157
+ GGGGGGGG
1158
+ G
1159
+ GGG G
1160
+ GG
1161
+ GG
1162
+ G
1163
+ P1
1164
+ P2
1165
+ P3
1166
+ (c)
1167
+ 0.6
1168
+ 0.7
1169
+ 0.8
1170
+ 0.9
1171
+ 1.0
1172
+ Ω Ωmax
1173
+ λ σξ
1174
+ 2
1175
+ G
1176
+ G
1177
+ G
1178
+ G
1179
+ GG
1180
+ GGG
1181
+ GGGGGGGGGGG
1182
+ G
1183
+ G
1184
+ GGG
1185
+ G
1186
+ 0.000001
1187
+ 0.0001
1188
+ 0.01
1189
+ G
1190
+ G
1191
+ G
1192
+ G
1193
+ GG
1194
+ GGG
1195
+ GGGGGGGGGGG
1196
+ G
1197
+ G
1198
+ GGG
1199
+ G
1200
+ T1
1201
+ T2
1202
+ T3 (d)
1203
+ 0.0
1204
+ 0.2
1205
+ 0.4
1206
+ 0.6
1207
+ 0.8
1208
+ 1.0
1209
+ 0
1210
+ 1
1211
+ 2
1212
+ 3
1213
+ 4
1214
+ 5
1215
+ u umax
1216
+ D (2) λ σξ
1217
+ 2
1218
+ G
1219
+ G
1220
+ G
1221
+ GG
1222
+ G
1223
+ G
1224
+ G
1225
+ G
1226
+ G
1227
+ G
1228
+ G
1229
+ GG
1230
+ GGGGGG
1231
+ GGG
1232
+ GG
1233
+ G
1234
+ GG GGGGGG
1235
+ G
1236
+ G
1237
+ G
1238
+ GG
1239
+ G
1240
+ G
1241
+ G
1242
+ G
1243
+ G
1244
+ G
1245
+ G
1246
+ GG
1247
+ GGGGGG
1248
+ GGG
1249
+ GG
1250
+ G
1251
+ GG GGGGGG
1252
+ P1
1253
+ P2
1254
+ P3
1255
+ (e)
1256
+ 0.6
1257
+ 0.7
1258
+ 0.8
1259
+ 0.9
1260
+ 1.0
1261
+ 0.0
1262
+ 1.0
1263
+ 2.0
1264
+ Ω Ωmax
1265
+ D (2) λ σξ
1266
+ 2
1267
+ G
1268
+ G
1269
+ G
1270
+ G
1271
+ G
1272
+ G
1273
+ GG
1274
+ GGGGGGGGGGGG G
1275
+ GGGG
1276
+ G
1277
+ G
1278
+ G
1279
+ G
1280
+ G
1281
+ G
1282
+ G
1283
+ GG
1284
+ GGGGGGGGGGGG G
1285
+ GGGG
1286
+ G
1287
+ T1
1288
+ T2
1289
+ T3 (f)
1290
+ FIG. 6. The median of diffusion coefficient, �
1291
+ D(2), (a), overall jump contribution, �
1292
+ λσ2
1293
+ ξ, (c), and the diffusion to jump ratio, �
1294
+ D(2)
1295
+ λσ2
1296
+ ξ ,
1297
+ (e), over the power bins for each wind speed bin, and respective quantities over the torque bins for each rpm bin in (b), (d),
1298
+ and (f). Sub-figures (a-d) are plotted in semi-logarithmic scale for better visualization. Statistical uncertainties are shown as
1299
+ gray-shaded background. Blue dotted lines are the distinct states observed from fixed point analysis, see Fig. 3.
1300
+
1301
+ 9
1302
+ G
1303
+ G
1304
+ G
1305
+ G
1306
+ G
1307
+ G
1308
+ G
1309
+ G
1310
+ G
1311
+ G
1312
+ GGGGGGGGGGGGGGGGGGGGGGGGGGG
1313
+ 0.0
1314
+ 0.2
1315
+ 0.4
1316
+ 0.6
1317
+ 0.8
1318
+ 1.0
1319
+ P P max
1320
+ K (4)
1321
+ 0
1322
+ 0.0002
1323
+ 0.0005
1324
+ (a)
1325
+ G
1326
+ G
1327
+ G
1328
+ G
1329
+ GGG
1330
+ GG
1331
+ G
1332
+ G
1333
+ G
1334
+ G
1335
+ GGGG
1336
+ GGG
1337
+ GGGGGGGGGGGGGGG
1338
+ GG
1339
+ 0.0
1340
+ 0.2
1341
+ 0.4
1342
+ 0.6
1343
+ 0.8
1344
+ 1.0
1345
+ 0.00
1346
+ 0.02
1347
+ 0.04
1348
+ P P max
1349
+ σξ
1350
+ 2
1351
+ (b)
1352
+ FIG. 7. Fourth-order KM coefficient K(4)(P|u) (a) and the jump amplitude σ2
1353
+ ξ(P|u) (b) for the wind speed of u = 0.41 umax.
1354
+ (For the corresponding drift term see Fig. 2). The solid black lines are their respective medians �
1355
+ K(4)(u) and �
1356
+ σ2
1357
+ ξ(u). The fixed
1358
+ point for this wind speed bin is P = 0.7 Pmax. Statistically, more accurate results can be obtained near the fixed point due to
1359
+ the better coverage of data. By using the median, our results are more robust to outliers far away from the fixed points.
1360
+ Appendix B: Drift Potential of Rotational Speed
1361
+ We analyzed all the data of rotational speed Ω in the
1362
+ range of 0.6 Ωmax and Ωmax without any conditioning
1363
+ or binning on other variables.
1364
+ We evaluated the drift
1365
+ coefficient D(1)(Ω) and then determined the drift poten-
1366
+ tial which is Φ(Ω) = −
1367
+
1368
+ Ω D(1)(Ω) dΩ which is plotted
1369
+ in Fig. 8. Minima of the drift potential corresponds to
1370
+ the stable fixed points or equilibria.
1371
+ Here we can ob-
1372
+ serve three minima around the three states T1, T2 and
1373
+ T3 which the control system prefers to approach. It is a
1374
+ common control strategy to avoid certain resonance fre-
1375
+ quencies of the structure in order to mitigate excessive
1376
+ loads as shown in Fig. 3.
1377
+ In Fig. 8 (b), we can clearly observe a minimum around
1378
+ the state T1. From our results in Fig. 4, 5 and 6, there is
1379
+ also a slight increase in noises around this state. This in-
1380
+ dicates that the control system of the wind turbine starts
1381
+ switching the strategies at this state around T1. As a
1382
+ remark, we calculated the deterministic potential only
1383
+ which reflects the mechanical and control mechanism of
1384
+ the wind turbine.
1385
+ [1] WindEurope,
1386
+ Wind
1387
+ energy
1388
+ in
1389
+ europe:
1390
+ 2020
1391
+ statistics
1392
+ and
1393
+ the
1394
+ outlook
1395
+ for
1396
+ 2021-
1397
+ 2025,
1398
+ https://windeurope.org/intelligence-
1399
+ platform/product/wind-energy-in-europe-2020-
1400
+ statistics-and-the-outlook-for-2021-2025/ (2021).
1401
+ [2] J.-F. m. c. Muzy, R. Ba¨ıle, and P. Poggi, Intermittency of
1402
+ surface-layer wind velocity series in the mesoscale range,
1403
+ Phys. Rev. E 81, 056308 (2010).
1404
+ [3] R. Calif and F. G. Schmitt, Multiscaling and joint mul-
1405
+ tiscaling description of the atmospheric wind speed and
1406
+ the aggregate power output from a wind farm, Nonlinear
1407
+ Processes in Geophysics 21, 379 (2014).
1408
+ [4] M.
1409
+ Anvari,
1410
+ G.
1411
+ Lohmann,
1412
+ M.
1413
+ W¨achter,
1414
+ P.
1415
+ Milan,
1416
+ E. Lorenz, D. Heinemann, M. R. R. Tabar, and J. Peinke,
1417
+ Short term fluctuations of wind and solar power systems,
1418
+ New Journal of Physics 18, 063027 (2016).
1419
+ [5] K. Schmietendorf, J. Peinke, and O. Kamps, The impact
1420
+ of turbulent renewable energy production on power grid
1421
+ stability and quality, The European Physical Journal B
1422
+ 90, 10.1140/epjb/e2017-80352-8 (2017).
1423
+ [6] T.
1424
+ M¨ucke,
1425
+ D.
1426
+ Kleinhans,
1427
+ and
1428
+ J.
1429
+ Peinke,
1430
+ Atmo-
1431
+ spheric turbulence and its influence on the alternating
1432
+ loads on wind turbines, Wind Energy 14, 301 (2011),
1433
+ https://onlinelibrary.wiley.com/doi/pdf/10.1002/we.422.
1434
+ [7] M. W¨achter, H. Heißelmann, M. H¨olling, A. Morales,
1435
+ P. Milan, T. M¨ucke, J. Peinke, N. Reinke, and P. Rinn,
1436
+ The turbulent nature of the atmospheric boundary
1437
+ layer
1438
+ and
1439
+ its
1440
+ impact
1441
+ on
1442
+ the
1443
+ wind
1444
+ energy
1445
+ conver-
1446
+ sion process, Journal of Turbulence 13, N26 (2012),
1447
+ https://doi.org/10.1080/14685248.2012.696118.
1448
+
1449
+ 10
1450
+ 0.6
1451
+ 0.7
1452
+ 0.8
1453
+ 0.9
1454
+ 1.0
1455
+ −0.007
1456
+ −0.004
1457
+ −0.001
1458
+ Ω Ωmax
1459
+ Φ
1460
+ GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
1461
+ G
1462
+ G
1463
+ G
1464
+ GGGGGG
1465
+ G
1466
+ G
1467
+ G
1468
+ G
1469
+ G
1470
+ GG
1471
+ G
1472
+ G
1473
+ T3
1474
+ T2
1475
+ T1
1476
+ (a)
1477
+ 
1478
+ 
1479
+ 0.67
1480
+ 0.69
1481
+ 0.71
1482
+ −0.00140
1483
+ −0.00130
1484
+ Ω Ωmax
1485
+ Φ
1486
+ G
1487
+ G
1488
+ G
1489
+ G
1490
+ G
1491
+ G
1492
+ G
1493
+ G
1494
+ G
1495
+ G
1496
+ G
1497
+ T1
1498
+ (b)
1499
+ FIG. 8. Drift potential Φ(Ω) determined in the range of 0.6 Ωmax and Ωmax, (a). Minima of the drift potential corresponds to
1500
+ the stable fixed points or equilibria. Here we can observe three minima around the three states T1, T2 and T3 as shown in
1501
+ Fig. 3. The minimum around the state T1 which is presented with the red circle is elaborated in (b).
1502
+ [8] IEC, Wind energy generation systems - Part 1: Design
1503
+ requirements.IEC 61400-1:2019 International Standard,
1504
+ 2019., Tech. Rep. (IEC, 2019).
1505
+ [9] H. Haehne, J. Schottler, M. Waechter, J. Peinke, and
1506
+ O. Kamps, The footprint of atmospheric turbulence in
1507
+ power grid frequency measurements, Europhysics Letters
1508
+ 121, 30001 (2018).
1509
+ [10] P. Milan, M. W¨achter, and J. Peinke, Turbulent character
1510
+ of wind energy, Phys. Rev. Lett. 110, 138701 (2013).
1511
+ [11] E. Anahua, S. Barth, and J. Peinke, Markovian power
1512
+ curves for wind turbines, Wind Energy 11, 219 (2008),
1513
+ https://onlinelibrary.wiley.com/doi/pdf/10.1002/we.243.
1514
+ [12] J. Gottschall and J. Peinke, How to improve the estima-
1515
+ tion of power curves for wind turbines, Environmental
1516
+ Research Letters 3, 015005 (2008).
1517
+ [13] P. G. Lind, I. Herr´aez, M. W¨achter, and J. Peinke, Fa-
1518
+ tigue load estimation through a simple stochastic model,
1519
+ Energies 7, 8279 (2014).
1520
+ [14] R. Friedrich, J. Peinke, M. Sahimi, and M. Reza Rahimi
1521
+ Tabar, Approaching complexity by stochastic methods:
1522
+ From biological systems to turbulence, Physics Reports
1523
+ 506, 87 (2011).
1524
+ [15] P. Rinn, P. G. Lind,
1525
+ M. W¨achter, and J. Peinke,
1526
+ The langevin approach:
1527
+ An r package for modeling
1528
+ markov processes, Journal of Open Research Software 4,
1529
+ 10.5334/jors.123 (2016).
1530
+ [16] M. R. R. Tabar, Analysis and Data-Based Reconstruc-
1531
+ tion of Complex Nonlinear Dynamical Systems: Using
1532
+ the Methods of Stochastic Processes (Springer, Cham-
1533
+ Switzerland, 2019).
1534
+ [17] M. Anvari, M. Rahimi Tabar, J. Peinke, and K. Lehnertz,
1535
+ Disentangling the stochastic behaviour of complex time
1536
+ series, Nature Scientific Reports 6, 35435 (2016).
1537
+ [18] P. Milan, M. W¨achter, and J. Peinke, Stochastic model-
1538
+ ing and performance monitoring of wind farm power pro-
1539
+ duction, Journal of Renewable and Sustainable Energy 6,
1540
+ 033119 (2014), https://doi.org/10.1063/1.4880235.
1541
+ [19] H. Risken and T. Frank, The Fokker-Planck Equation:
1542
+ Methods of Solution and Applications, Springer Series in
1543
+ Synergetics (Springer Berlin Heidelberg, 1996).
1544
+ [20] P. Tankov, Financial Modelling with Jump Processes,
1545
+ Chapman and Hall/CRC Financial Mathematics Series
1546
+ (CRC Press, 2003).
1547
+ [21] R. Stanton, A nonparametric model of term structure
1548
+ dynamics and the market price of interest rate risk, The
1549
+ Journal of Finance 52, 1973 (1997).
1550
+ [22] M. Johannes, The statistical and economic role of jumps
1551
+ in continuous-time interest rate models, The Journal of
1552
+ Finance 59, 227 (2004).
1553
+ [23] F. M. Bandi and T. H. Nguyen, On the functional estima-
1554
+ tion of jump-diffusion models, Journal of Econometrics
1555
+ 116, 293 (2003).
1556
+ [24] F. Hanson, Applied Stochastic Processes and Control for
1557
+ Jump Diffusions: Modeling, Analysis, and Computation,
1558
+ Advances in Design and Control (Society for Industrial
1559
+ and Applied Mathematics, 2007).
1560
+ [25] L.
1561
+ Isserlis,
1562
+ On
1563
+ certain
1564
+ probable
1565
+ errors
1566
+ and
1567
+ corre-
1568
+ lation
1569
+ coefficients
1570
+ of
1571
+ multiple
1572
+ frequency
1573
+ distribu-
1574
+ tions
1575
+ with
1576
+ skew
1577
+ regression,
1578
+ Biometrika
1579
+ 11,
1580
+ 185
1581
+ (1916),
1582
+ https://academic.oup.com/biomet/article-
1583
+ pdf/11/3/185/478334/11-3-185.pdf.
1584
+ [26] G. C. Wick, The evaluation of the collision matrix, Phys.
1585
+ Rev. 80, 268 (1950).
1586
+ [27] J. Gottschall and J. Peinke, Stochastic modelling of a
1587
+ wind turbine's power output with special respect to tur-
1588
+ bulent dynamics, Journal of Physics: Conference Series
1589
+
1590
+ 11
1591
+ 75, 012045 (2007).
1592
+ [28] P. Milan, T. M¨ucke, A. Morales, M. W¨achter, and
1593
+ J. Peinke, Applications of the langevin power curve, in
1594
+ Proceedings of EWEC 2010 (Warshaw, 2010).
1595
+ [29] M. W¨achter, P. Milan, T. M¨ucke, and J. Peinke, Power
1596
+ performance of wind energy converters characterized as
1597
+ stochstic process:
1598
+ Applications of the langevin power
1599
+ curve, Wind Energy 14, 711 (2011).
1600
+ [30] P. Huber and E. Ronchetti, Robust Statistics, Wiley Se-
1601
+ ries in Probability and Statistics (Wiley, 2011).
1602
+
GNE5T4oBgHgl3EQfVw9O/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
I9FAT4oBgHgl3EQfux7Z/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8e858169808e8fd225e3ce082aa8db8ec5397db926686af2352f4ca03c281925
3
+ size 127349
IdE3T4oBgHgl3EQfXAoq/content/tmp_files/2301.04474v1.pdf.txt ADDED
@@ -0,0 +1,1312 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Speech Driven Video Editing via an Audio-Conditioned Diffusion Model
2
+ Dan Bigioi
3
+ University of Galway
4
+ d.bigioi1@nuigalway.ie
5
+ Shubhajit Basak
6
+ University of Galway
7
+ s.basak1@nuigalway.ie
8
+ Hugh Jordan
9
+ Trinity College Dublin
10
+ jordanhu@tcd.ie
11
+ Rachel McDonnell
12
+ Trinity College Dublin
13
+ ramcdonn@tcd.ie
14
+ Peter Corcoran
15
+ University of Galway
16
+ peter.corcoran@universityofgalway.ie
17
+ Abstract
18
+ In this paper we propose a method for end-to-end
19
+ speech driven video editing using a denoising diffusion
20
+ model.
21
+ Given a video of a person speaking, we aim to
22
+ re-synchronise the lip and jaw motion of the person in re-
23
+ sponse to a separate auditory speech recording without re-
24
+ lying on intermediate structural representations such as fa-
25
+ cial landmarks or a 3D face model. We show this is pos-
26
+ sible by conditioning a denoising diffusion model with au-
27
+ dio spectral features to generate synchronised facial mo-
28
+ tion. We achieve convincing results on the task of unstruc-
29
+ tured single-speaker video editing, achieving a word error
30
+ rate of 45% using an off the shelf lip reading model. We
31
+ further demonstrate how our approach can be extended to
32
+ the multi-speaker domain. To our knowledge, this is the first
33
+ work to explore the feasibility of applying denoising diffu-
34
+ sion models to the task of audio-driven video editing. 1
35
+ 1. Introduction
36
+ The idea behind audio-driven video editing is to be able
37
+ to re-synchronise the lip and jaw movements of an actor
38
+ in a video, in response to a new speech input signal. This
39
+ new speech signal may come from the original, or different
40
+ speaker in order to fix any mistakes captured in the orig-
41
+ inal recording or dub over the original voice. Regardless
42
+ of the source of the speech, it is imperative that the perfor-
43
+ mance of the actor is never diminished. No matter how the
44
+ lip and jaw movements change in response to the new au-
45
+ dio, the facial expressions, and emotions portrayed by the
46
+ actor should remain as close to the original performance as
47
+ possible.
48
+ Achieving such seamless audio-driven video editing is
49
+ an exciting prospect for the entertainment industry, one with
50
+ 1All code, datasets, and models used as part of this work are made
51
+ publically available here: https://www.github.com/anonymous
52
+ the potential of being applied towards movies, TV shows,
53
+ live streaming, and even home made content uploaded to
54
+ platforms such as YouTube, TikTok, and others. Giving
55
+ video content creators the ability and option to edit their
56
+ work without having to go through time consuming, and
57
+ expensive re-shoots, allows them to work with a greater
58
+ tolerance for error during filming. Additionally, achieving
59
+ true audio-driven video editing will enable its use within
60
+ automatic dubbing pipelines. This will have a huge im-
61
+ pact on the world of cinema and television, allowing for
62
+ the further democratisation of video content, making it sig-
63
+ nificantly easier, and more cost-effective to dub English-
64
+ language movies/TV shows/videos into other languages and
65
+ vice-versa. With the rapid advances in deep learning, and
66
+ talking head generation techniques, this exciting prospect is
67
+ getting closer and closer to reality.
68
+ Generally, speech-driven video generation approaches
69
+ can be grouped into two distinct types: structured, and un-
70
+ structured generation. Structured generation refers to tech-
71
+ niques that use the speech signal to first generate an inter-
72
+ mediate structural representation of the face, before using
73
+ said structure to aid in rendering the photo-realistic frame,
74
+ an approach followed by works such as [8, 31, 69, 88, 91].
75
+ Unstructured generation techniques on the other hand such
76
+ as [20,30,73,90] , utilise image reconstruction techniques to
77
+ generate the photo-realistic frame directly in an end-to-end
78
+ manner.
79
+ Diffusion models [60] are a relatively new class of gener-
80
+ ative model that have been gaining traction in recent months
81
+ due to their strong performance on image synthesis tasks,
82
+ outperforming traditionally state of the art GAN (Genera-
83
+ tive Adversarial Network) [22] based methods in some in-
84
+ stances [17]. The last number of months in fact have seen
85
+ diffusion models being applied to image to image transla-
86
+ tion tasks [53, 57], as well as towards the video generation
87
+ problem [27, 86], audio synthesis [11, 35], and many oth-
88
+ ers [81].
89
+ Utilising conditioning signals such as text and
90
+ 1
91
+ arXiv:2301.04474v1 [cs.CV] 10 Jan 2023
92
+
93
+ even images, diffusion models have shown that they can be
94
+ trained and conditioned towards generating a specific de-
95
+ sired output at inference time with relative ease [53]. They
96
+ also achieve high mode coverage unlike GANs, and main-
97
+ tain high sample quality. This ability makes them an ideal
98
+ candidate for application towards the task of unstructured
99
+ audio-driven video editing, a task that has thus far been
100
+ dominated by GAN-based approaches [9,12,73]. As part of
101
+ this work we make the following contributions to the field:
102
+ • A novel unstructured end-to-end approach for audio-
103
+ driven video editing based on the proposed archi-
104
+ tecture by in Palette [57], a denoising U-Net model
105
+ trained for image to image translation tasks. We in-
106
+ stead condition the network on audio frames and train
107
+ it to inpaint the lower half region of the face such
108
+ that the lip and jaw movements are synchronised to
109
+ the conditioning audio signal. We train on single and
110
+ multi speaker versions of the GRID data set [14]. We
111
+ demonstrate convincing results despite access to lim-
112
+ ited data, and training hardware. All project code, and
113
+ trained single speaker and multi speaker models are
114
+ made available to the public.
115
+ • We introduce a simple conditioning mechanism for the
116
+ task of audio driven video editing with diffusion mod-
117
+ els. We condition the network using mel-spectrogram
118
+ features combined with the previously generated frame
119
+ (to maintain temporal stability) to generate the next
120
+ frame in the sequence. To our knowledge, this is the
121
+ first attempt at using an audio signal to condition a dif-
122
+ fusion model to generate an image (video frames in our
123
+ case).
124
+ 2. Related Works
125
+ 2.1. Audio Driven Video Generation
126
+ “Deep fakes”, as they have commonly been referred to
127
+ in public discourse, are synthetic video or image content of
128
+ a person(s) generated by a deep learning algorithm. Audio-
129
+ driven video editing is a research topic that falls under the
130
+ much broader scope of such “deep fake” research, specif-
131
+ ically under audio-driven deep fakes which are what this
132
+ section will focus most upon. For a broader review of the
133
+ literature surrounding deep fakes and the various techniques
134
+ used to generate them, we recommend [45, 70] for good
135
+ overviews of the field.
136
+ As touched upon a bit earlier, audio-driven deep fakes
137
+ can be categorised by whether they are generated by lever-
138
+ aging an audio driven structural representation of the face,
139
+ or without.
140
+ There have been numerous approaches over
141
+ the years relating to the former, ranging from ones such
142
+ as [2,7,10,16,19,31,39,56,66,68,74,75,79,91] which gen-
143
+ erate a set of 2D facial landmark co-ordinates from audio,
144
+ or [8,15,32,37,52,62,63,69,76,77,83–85,87] which predict
145
+ expression parameters from audio to drive a 3D face model.
146
+ What these approaches all have in common is that they use
147
+ these intermediate structural representations as input to a
148
+ separate neural rendering model which is typically trained
149
+ as an image to image translation task to generate the final
150
+ photo realistic image frame. As of the date of this submis-
151
+ sion, GAN-based [22] approaches such as Pix2Pix [29], Cy-
152
+ cleGAN [93], and other variations have proved immensely
153
+ popular for this task, however it would not be surprising to
154
+ see diffusion models being used for this in the very near fu-
155
+ ture given their success so far on traditional image2image
156
+ tasks [57].
157
+ Non structural / End-to-end methods on the other hand
158
+ utilise latent feature learning and image reconstruction tech-
159
+ niques to generate a photo-realistic video sequence from an
160
+ input speech signal and reference image/video in an end-
161
+ to-end manner. Approaches such as [9, 20, 30, 36, 43, 49,
162
+ 65, 73, 89, 90, 92] have seen much success in recent times.
163
+ Each of these approaches differ from the one used in this pa-
164
+ per as they are all GAN/VAE (variational autencoder) [34]
165
+ based probabilistic methods while ours leverages the power
166
+ of a denoising diffusion model. While current end-to-end
167
+ approaches suffer from low output resolution quality com-
168
+ pared to structural methods, there is a lot of potential for im-
169
+ provement, especially by exploiting diffusion models abil-
170
+ ity to synthesise high quality samples while maintaining
171
+ good mode coverage / diversity.
172
+ 2.2. Diffusion Models
173
+ Denoising diffusion models [60,64] have seen great suc-
174
+ cess on a wide variety of different challenges, ranging from
175
+ image2image translation tasks like inpainting, colorisation,
176
+ image upscaling, uncropping [6, 26, 41, 42, 50, 53, 57, 59],
177
+ audio generation [11, 28, 33, 35, 38, 48, 67, 80], text-based
178
+ image generation [4, 21, 23, 46, 51, 55, 58], video genera-
179
+ tion [24,27,82,86], and many others. For a thorough review
180
+ on diffusion models and all of their recent applications, we
181
+ recommend [81].
182
+ Diffusion models are a class of generative probabilistic
183
+ models that consist of two steps: 1) the forward diffusion
184
+ process that destroys data by steadily adding small amounts
185
+ of random Gaussian noise over a series of time steps until
186
+ it is destroyed. 2) The reverse diffusion process where a
187
+ learning algorithm is trained to restore structure in the data
188
+ by steadily removing noise over a series of time steps. The
189
+ trained model can then sample information from a random
190
+ distribution of Gaussian noise and steadily denoise it over a
191
+ series of time steps to attain the desired output.
192
+ Sohl-Dickstein et al. [60] developed the first diffusion
193
+ model and coined the term. Ho et al. [25] combined de-
194
+ noising score matching with Langevin dynamics [64] and
195
+ diffusion models to synthesise images.
196
+ This ignited a
197
+ 2
198
+
199
+ steady interest in diffusion models, with Nichol et al. [47]
200
+ building upon the work of [25] showing that by making
201
+ small adjustments to the diffusion process, they could sam-
202
+ ple data faster and achieve competitive log-likelihoods to
203
+ GAN-based methods with minimal impact to sample qual-
204
+ ity. They also found that training diffusion models with
205
+ more computational power typically lead to better sample
206
+ quality. Chen et al. [11] and Kong et al. [35] applied dif-
207
+ fusion models to the task of audio synthesis, succeeding in
208
+ generating high quality samples. Dhariwal and Nichol [17]
209
+ demonstrated that diffusion models beat GANs on image
210
+ synthesis, also introducing the concept of “classifier guid-
211
+ ance” for conditional generation.
212
+ As diffusion models are trained under a single loss, and
213
+ do not rely on a discriminator, they are more stable dur-
214
+ ing training and do not suffer from typical issues associated
215
+ with training GANs such as mode collapse, and vanishing
216
+ gradient. They produce high quality output samples, and
217
+ display high mode coverage unlike GANs [78]. Despite
218
+ these advantages, their sampling speed is very slow due to
219
+ the need to run the backwards diffusion process many thou-
220
+ sands of times on the same sample to denoise it completely.
221
+ Xiao et al. [78] and Rombach et al [53] attempted at speed-
222
+ ing up the sampling and training times associated with dif-
223
+ fusion models with the former proposing a method to model
224
+ the denoising distribution using a complex multi modal dis-
225
+ tribution in order to facilitate larger diffusion steps, and the
226
+ latter applying diffusion models in the latent space of a pre-
227
+ trained autoencoder to reduce the complexity. This is an
228
+ ongoing focus of research in the field, and it is a certainty
229
+ that more works tackling the inference/training speed prob-
230
+ lem will emerge.
231
+ The work in this paper builds upon the work presented
232
+ in Palette [57], a denoising diffusion model trained specifi-
233
+ cally for the task of image2image translation, which in turn
234
+ was heavily influenced by the 256x256 class conditional U-
235
+ NET of [17]. We utilise the same overall architecture as
236
+ discussed in Palette with a few variations in the hyperpa-
237
+ rameters. Additionally, we modify the training procedure
238
+ for the task of video editing, and introduce a feature con-
239
+ catenation mechanism for conditioning the network using
240
+ speech mel-spectrogram features, as well as information re-
241
+ lated to the previously generated frame in the sequence so
242
+ that the network can generate temporally coherent frames.
243
+ 3. Methodology
244
+ 3.1. Problem Formulation
245
+ We frame the problem of audio-driven video editing as
246
+ an inpainting task with a few key changes. Traditionally, in-
247
+ painting is an image-to-image translation task where a neu-
248
+ ral network must learn to fill in a masked out region of the
249
+ image with realistic content. For video editing, we must
250
+ Figure 1. Audio Conditioning Feature, Rectangular face mask
251
+ provide the network with additional context, to help guide
252
+ its generation process. As our approach works on a frame-
253
+ by-frame basis, we must show the network the preceding
254
+ frame in addition to the current masked frame. This is to
255
+ ensure that there is temporal stability between consecutive
256
+ frames. Additionally, audio information related to the previ-
257
+ ous, current, and future frame must all be provided as well.
258
+ Future audio frames are included to ensure that lip move-
259
+ ments produced by plosives, sounds created by the letters
260
+ “p, t, k, b, d, g”, are correctly generated. This is because
261
+ the lip movements associated with plosives form before the
262
+ sound is spoken. We concatenate all this information to the
263
+ image channels of the current frame that is being edited,
264
+ and pass this frame through the network. Fig. 2 depicts an
265
+ overview of this process.
266
+ 3.2. Data Processing
267
+ 3.2.1
268
+ Dataset
269
+ We rely on the GRID [14] audio-visual speech data set to
270
+ carry out the work in this paper. This is a multi speaker
271
+ data set consisting of 34 speakers (18 male, 16 female), with
272
+ each speaker uttering 1000 short 6-word sentences. We train
273
+ three models: 1) A single speaker model trained with videos
274
+ from speaker S1. 2) A multi-speaker model trained on 10%
275
+ of the data set, where we keep speakers S1, S33, and S34
276
+ unseen to the network. 3) A fine tuned single speaker model
277
+ trained on top of the base multi speaker model to determine
278
+ whether faster convergence was possible while achieving
279
+ similar results to the base single speaker.
280
+ 3.2.2
281
+ Audio Processing
282
+ The audio from the GRID [14] data set is recorded with
283
+ a sampling rate of 25 KHz. From the audio we compute
284
+ mel-spectrogram features with non overlapping windows of
285
+ length 40ms and 256 mel bands. We choose 256 so that
286
+ when we concatenate the audio features to the image chan-
287
+ nels as depicted in Fig. 2, the dimensions will be the same
288
+ as the target image.
289
+ Alternatively, one could use a lin-
290
+ ear transformation on top of the standard spectrogram of
291
+ 3
292
+
293
+ Single ID
294
+ Multi-ID
295
+ Image Size
296
+ 256x256
297
+ 256x256
298
+ Total Frames
299
+ 73704
300
+ 222000
301
+ Diffusion Steps
302
+ 2000
303
+ 2000
304
+ Noise Schedule
305
+ Linear
306
+ Linear
307
+ Linear Start
308
+ 1e − 06
309
+ 1e − 06
310
+ Linear End
311
+ 0.01
312
+ 0.01
313
+ Input Channels
314
+ 10
315
+ 10
316
+ Inner Channels
317
+ 64
318
+ 64
319
+ Channels Multiple
320
+ 1, 2, 4, 8
321
+ 1, 2, 4, 8
322
+ Res Blocks
323
+ 2
324
+ 2
325
+ Head Channels
326
+ 32
327
+ 32
328
+ Drop Out
329
+ 0.2
330
+ 0.2
331
+ Batch Size
332
+ 10
333
+ 10
334
+ Training Epochs
335
+ 895
336
+ 185
337
+ Learning Rate
338
+ 5e − 05
339
+ 5e − 05
340
+ Table 1. Hyperparameter Set Up
341
+ 80/128 channels to transform it to the desired shape. For
342
+ each video frame, we have a corresponding audio feature
343
+ of shape [1x256]. Since we condition the network using
344
+ 3 audio frames per video frame (the past, present, and fu-
345
+ ture one), we repeat the first two audio frames 85 times
346
+ each, the third 86 times, and concatenate them to end up
347
+ with an image of shape [256x256x1] that we can use to
348
+ condition the network, as illustrate in Fig. 1. We find that
349
+ conditioning with audio via concatenation is a rather sim-
350
+ ple approach that works, however, in future work we plan
351
+ to explore more complex techniques such as feeding audio
352
+ embeddings through various layers of the U-net.
353
+ 3.2.3
354
+ Video Processing
355
+ First, we resize all videos in the data set to be 256 width x
356
+ 256 height from the default 360 x 288. This is done to de-
357
+ crease the training time by decreasing the number of pixels,
358
+ and to ensure that the image can be accepted as input by the
359
+ U-net. For every frame in the videos we must compute the
360
+ region that should be masked out. Using an off the shelf
361
+ facial landmark extractor [40], we compute the facial land-
362
+ mark co-ordinates to determine the position of the jaw. We
363
+ then mask out the bottom portion of the face with these co-
364
+ ordinates just below half of the nose, as depicted by Fig. 1.
365
+ We apply the rectangular face mask to data samples at train
366
+ time, before they are fed into the neural network.
367
+ There is a very important reason for applying such a
368
+ rectangular face mask rather than a mask in the shape of
369
+ a face: to hide the jaw contour. There is a very strong cor-
370
+ relation between lip movement, jaw movement, and overall
371
+ head pose. Should the jaw contour be visible to the net-
372
+ work, the network will learn to predict the lip movements
373
+ from that alone, discarding the audio conditioning signal
374
+ entirely, treating it as noise. This is a real problem when
375
+ doing audio-driven video editing that is yet to be addressed
376
+ in the literature, especially when working on relatively non-
377
+ complex data sets such as GRID [14]. We discovered that
378
+ applying such a rectangular face mask minimises this prob-
379
+ lem significantly, however it still exists. When testing our
380
+ single speaker model using silence as input, the lip move-
381
+ ments are significantly diminished though movements do
382
+ occasionally still occur. This is because for every individual
383
+ speaker, there exists a slight correlation between head pose
384
+ and lip movement that the model learns, especially when
385
+ trained on a single speaker. We suspect that by training on
386
+ a larger single speaker dataset, with more variety in both
387
+ the head pose and background of the speaker, the network
388
+ will accord even more attention to the conditioning speech
389
+ signal in order to drive the mouth movements.
390
+ 3.2.4
391
+ Audio Video Alignment
392
+ Each video frame is aligned with the 40ms of audio preced-
393
+ ing it, and 80ms after it, totalling a 120ms window of au-
394
+ dio information that is used to condition the network when
395
+ generating the lip/jaw movements for each frame.
396
+ Care
397
+ must be taken when choosing the audio window, too large
398
+ and the network won’t use the most meaningful informa-
399
+ tion available to it, too small and there may not be enough
400
+ context for the network to generate more complex lip move-
401
+ ments caused by plosives. We arrived at our 120ms window
402
+ through empirical tests and observations. Note that image
403
+ frame 0 does not have any audio preceding it. Instead of
404
+ discarding it, we use it to commence the generation process,
405
+ acting as an initial “identity” frame. At inference time, each
406
+ generated frame is then re-input into the network serving as
407
+ the “previous frame” to generate the next frame in the se-
408
+ quence, maintaining temporal coherence. At train time, we
409
+ use the previous real frame.
410
+ 3.3. Model Architecture
411
+ We follow the general U-Net [54] architecture described
412
+ by [57], which in turn is based off the model proposed
413
+ by [25] with modifications inspired by the works of [17,59].
414
+ For this work we use a lightweight version of the 256x256
415
+ U-net architecture described by [17], minus the class condi-
416
+ tioning mechanism. Like [57] we also introduce additional
417
+ conditioning of the source image via the concatenation of
418
+ our audio features and the previous frame. Tab. 1 displays
419
+ the hyper-parameters we use to train our diffusion model
420
+ for the task of audio-driven video editing. Notably, we omit
421
+ the use of attention within the up/downsampling layers of
422
+ the U-Net in an effort to speed up training. For all of our
423
+ experiments, we train using a batch size of 10 per GPU on
424
+ 4 32gb V100 GPUs in parallel. For inference, we rely on a
425
+ 4
426
+
427
+ Figure 2. High-Level Overview of Network Architecture including the forward and backward diffusion processes
428
+ single GPU to generate the videos, as we use the previously
429
+ generated frame as input to the network.
430
+ A diffusion model is defined as having two steps, the
431
+ forward diffusion process where the data is gradually de-
432
+ stroyed, and the learned backwards diffusion process which
433
+ reconstructs the data, and is used during training and infer-
434
+ ence.
435
+ 3.3.1
436
+ Forward diffusion process
437
+ As defined by [60], the forward diffusion process is a
438
+ Markov chain that adds small amounts of noise to the data
439
+ y over a predefined number of time steps T, until the data
440
+ is completely destroyed at time step t=T. This state is repre-
441
+ sented as yT with y0 representing the data before any noise
442
+ was added to it. The Markov chain is defined by:
443
+ q (y1:T |y0) :=
444
+ T
445
+
446
+ y=1
447
+ q (yt|yt−1)
448
+ (1)
449
+ where at each step, Gaussian noise is added by:
450
+ q (yt|yt−1) := N (yt; √αtyt−1, (1 − αt)I) ,
451
+ (2)
452
+ with αt := (1 − βt), representing the hyperparameters of
453
+ our fixed noise scheduler. [25] show that it is possible to
454
+ sample yt at any step t in closed form:
455
+ q (yt|y0) := N
456
+
457
+ yt; √ ¯αty0, (1 − ¯αt)I
458
+
459
+ ,
460
+ (3)
461
+ with ¯αt := �t
462
+ s=1 αs. This is an important observation, as
463
+ it significantly speeds up the forward diffusion process, and
464
+ can be used to train the model on the fly with random noise
465
+ levels at each forward step.
466
+ 3.3.2
467
+ Backwards diffusion process
468
+ Given a noisy image ¯y defined as:
469
+ ¯y :=
470
+
471
+ ¯αy0 +
472
+
473
+ 1 − ¯αϵ, ϵ ∼ N(0, I)
474
+ (4)
475
+ the goal of the backwards diffusion process is to learn an
476
+ algorithm that can denoise and restore the noisy image to
477
+ its original image Y0. Following the approach in [57], we
478
+ train a neural network fθ(x, ¯y, ¯α) to predict the noise gen-
479
+ erated at time t, optimising the Lsimple objective proposed
480
+ by [25]:
481
+ Et,y0,ϵ[
482
+ ���fθ(x,
483
+
484
+ ¯αy0 +
485
+
486
+ 1 − ¯αϵ, ¯α) − ϵ
487
+ ���
488
+ 2
489
+ ]
490
+ (5)
491
+ where x represents the conditioning audio and previous
492
+ frame input to our network, ¯y the noisy image, and ¯α the
493
+ noise level. During training, we only calculate the loss for
494
+ the masked region of the face to save on compute, following
495
+ the approach in [57].
496
+ 5
497
+
498
+ Ground Truth Frame
499
+ Previous Frame in
500
+ Current Frame Being
501
+ Past, Present, Future
502
+ Y(0)
503
+ Video
504
+ Denoised Y(T)
505
+ audio frames
506
+ q(ytlyt-1) := N(yti Vatyt-1,(1 - αt)I)
507
+ Conditioning Via
508
+ Concatenation
509
+ Forward Diffusion Process
510
+ Backwards Diffusion Process
511
+ DownSample
512
+ For a given image with noise level at timestep t, the U-
513
+ Block
514
+ Net is trained to predict the noise added at time step t.
515
+ U-Net with
516
+ UpSample Block
517
+ A trained model is then able to start with a completely
518
+ gradient descent
519
+ noisy image, and subsequently denoise it over a series
520
+ Global Attention
521
+ step computed on
522
+ Block
523
+ of timesteps T.
524
+ predicted noise vs
525
+ Skip Connection
526
+ actual noise
527
+ Vefe(c, Vyo + V1-ae,a) -
528
+ Generated Frame
529
+ Denoised image
530
+ Y(0)
531
+ Y(T-1)
532
+ Repeat T
533
+ Times to
534
+ Denoising image
535
+ J1-αtEt
536
+ Fully
537
+ Y(T)
538
+ Denoise
539
+ ImageFollowing [25], to run inference, each step of the back-
540
+ wards diffusion process can then be computed by:
541
+ yt−1 ←
542
+ 1
543
+ √αt
544
+
545
+ yt − 1 − αt
546
+ √1 − ¯αt
547
+ fθ(x, yt, ¯αt)
548
+
549
+ +
550
+
551
+ 1 − αtϵt,
552
+ (6)
553
+ where ϵ ∼ N(0, I). The backwards diffusion step is re-
554
+ peated for as many times necessary to denoise the image
555
+ fully. Please see Fig. 2 for a high level view of our network
556
+ architecture, and to better understand where each equation
557
+ is used. For a more detailed discussion behind these equa-
558
+ tions, and how they are derived, please see [25,60,64].
559
+ 4. Experiments & Results
560
+ We train and evaluate three versions of our video-editing
561
+ diffusion model, a single speaker model, a multi speaker
562
+ model, and a single speaker model we fine-tuned on top of
563
+ the multi speaker one. We evaluate the videos generated by
564
+ our models against the ground truth using a number of ob-
565
+ jective metrics. We compare our results to recent methods
566
+ for audio-driven video generation [13,30,36,65,72]. The re-
567
+ sults we provide for each model are cited directly from their
568
+ own research papers, with each model tested on a subset of
569
+ the GRID [14] data set, unless explicitly stated otherwise.
570
+ 4.1. Evaluation Metrics
571
+ We use a a number of objective metrics to measure the
572
+ quality of our generated videos, allowing us to compare
573
+ them directly to the ground truth, and other state of the art
574
+ audio driven video generation methods from the literature.
575
+ To make a fair comparison we calculate the Image Quality
576
+ metrics(SSIM, PSNR) only on the masked portion of the
577
+ image as shown in Fig. 1.
578
+ SSIM (Structural Similarity Index): This is a perceptual
579
+ metric to quantify the degradation of image quality.
580
+ A
581
+ larger SSIM signifies the better quality of the reconstructed
582
+ image.
583
+ PSNR (Peak Signal to Noise Ratio): We compute the
584
+ peak signal to noise ratio between the ground truth and
585
+ the generated image. The higher the PSNR the better the
586
+ quality of the reconstructed image.
587
+ CPBD (Cumulative Probability Blur Detection) [44]:
588
+ This is a perceptual based no reference objective image
589
+ sharpness metric.
590
+ Similar to [30, 36, 72] we have used
591
+ this metric to compare the CPBD results on the generated
592
+ videos.
593
+ WER (Word Error Rate): It evaluates the performance of
594
+ a pre-trained speech recognition network on a given video.
595
+ Similar to previous works [30,36,72] we use the LipNet [3]
596
+ model which is pre-trained on GRID data set and achieves
597
+ 95.2 percent accuracy.
598
+ Facial Action Unit (AU) [18] Recognition: Following the
599
+ previous works [13, 65] we also evaluate our reconstructed
600
+ images with respect to five facial action units (AU10:
601
+ Upper Lip Raiser, AU14: Dimpler, AU20: Lip Stretcher,
602
+ AU25: Lips Part, AU26: Jaw Drop). We use the Facial
603
+ Behavior Analysis Toolkit [5] to detect the presence of
604
+ these AUs (boolean true on activation) on each generated
605
+ frames and compare them with the ground truth frames.
606
+ Finally we calculate the average F1 score and the average
607
+ accuracy based on the AU recognition.
608
+ ACD (Average Content Distance) [71]: Similar to [72]
609
+ we use Openface Face Recognizer [1] to calculate the
610
+ Cosine(ACD-C) and Euclidean(ACD-E) distance between
611
+ the generated frame and ground truth image. The smaller
612
+ the distance between two images the similar the images.
613
+ 4.2. Single Speaker Model
614
+ We train our single speaker model on identity S1 using
615
+ data from the GRID audio visual corpus [14]. There are
616
+ 1000 videos in total, each of them roughly 3 seconds in
617
+ length totalling about 50 minutes of audio-visual content
618
+ for training. We train our model on 996 videos, withhold-
619
+ ing 4 of them for testing purposes. We call this the “unseen”
620
+ test set. The “seen” test set consists of videos that the model
621
+ has seen during training, but with different speech inputs to
622
+ the originals. Our unseen test set is relatively small with
623
+ respect to the size of our data set as we wanted to give the
624
+ model as much information as possible about the speaker it
625
+ was training on given that there were only about 50 minutes
626
+ worth of audio/visual content available.
627
+ Tab. 2 depicts the results our model scores when tested
628
+ on the unseen data set versus other approaches in the lit-
629
+ erature. While the results we obtain are not state of the
630
+ art, they demonstrate that using a denoising diffusion model
631
+ to do audio-driven video editing, is indeed quite feasible,
632
+ and produces reasonable results. Further time spent train-
633
+ ing the model, and exposure to a larger data set should im-
634
+ prove these scores further. Additionally, using our single
635
+ speaker model, we edit a number of videos by introducing
636
+ new speech inputs instead of the originals, and attach these
637
+ videos to our supplementary materials section, encouraging
638
+ readers to have a look.
639
+ 4.3. Multi-Speaker Training
640
+ We train our multi speaker model on 30 different identi-
641
+ ties using a subset of 100 random videos per speaker from
642
+ the audio visual GRID corpus [14] for 185 epochs. Dur-
643
+ ing training, we withheld identities S1, S33, and S34 en-
644
+ tirely from the training set of the network so that we could
645
+ 6
646
+
647
+ Method
648
+ WER↓
649
+ ACD-C↓
650
+ ACD-E↓
651
+ Avg. F1 AU
652
+ Avg. Acc. AU
653
+ SSIM↑
654
+ PSNR↑
655
+ CPBD
656
+ OneShotA2V [36]
657
+ 27.5
658
+ 0.005
659
+ 0.09
660
+ -
661
+ -
662
+ 0.881
663
+ 28.571
664
+ 0.262
665
+ OneShotA2V(lombard) [36]
666
+ 26.1
667
+ 0.002
668
+ 0.064
669
+ -
670
+ -
671
+ 0.922
672
+ 28.978
673
+ 0.453
674
+ RSDGAN [72]
675
+ 23.1
676
+ -
677
+ 1.47x10−4
678
+ -
679
+ -
680
+ 0.818
681
+ 27.100
682
+ 0.268
683
+ Speech2Vid [30]
684
+ 58.2
685
+ -
686
+ 1.48x10−4
687
+ 0.738
688
+ 78.97
689
+ 0.720
690
+ 22.662
691
+ 0.255
692
+ CRAN [65]
693
+ -
694
+ -
695
+ -
696
+ 0.710
697
+ 78.71
698
+ 0.694
699
+ 28.041
700
+ -
701
+ Chen et al. [13]
702
+ -
703
+ -
704
+ -
705
+ 0.751
706
+ 80.92
707
+ 0.769
708
+ 29.838
709
+ -
710
+ Ours (Single Speaker)
711
+ 45.85
712
+ 0.018
713
+ 0.170
714
+ 0.502
715
+ 93.73
716
+ 0.896
717
+ 32.22
718
+ 0.341
719
+ Ours(MultiSpeaker)
720
+ 76.3
721
+ 0.024
722
+ 0.196
723
+ 0.43
724
+ 88.21
725
+ 0.780
726
+ 32.214
727
+ 0.352
728
+ Ours(Fine-Tuned)
729
+ 55.01
730
+ 0.021
731
+ 0.173
732
+ 0.47
733
+ 92.37
734
+ 0.85
735
+ 32.612
736
+ 0.34
737
+ Table 2. Quantitative comparison with previous works on image quality, lip synchronization and facial feature metrics.
738
+ Figure 3. Multi-speaker failure cases
739
+ use them for additional testing purposes. We use approx-
740
+ imately 10% of the entire data set to train our model for
741
+ two major reasons: 1) To train on the entire data set with
742
+ our current hardware would take approximately 15 hours
743
+ per epoch. We intend to incorporate the findings of [53]
744
+ into our future work to significantly speed up training time.
745
+ 2) We sought to train a “base” model using multiple iden-
746
+ tities but with relatively few samples per speaker, and use
747
+ it to fine tune a single-speaker model with more samples,
748
+ investigating whether the fine-tuned model could be trained
749
+ for less time than the single-speaker model while achieving
750
+ similar performance.
751
+ When testing on identities unseen to the model, it would
752
+ struggle to maintain the identity of the speaker consistent
753
+ throughout the generation process. We speculate that since
754
+ our model relies on the previously generated frame alone to
755
+ generate the next frame in the sequence, over time, infor-
756
+ mation about the original identity is lost, as demonstrate in
757
+ Fig. 3.
758
+ When testing on identities previously seen by the net-
759
+ work during training, we report relatively poor results when
760
+ compared to other methods in the literature as depicted by
761
+ Tab. 2. We speculate this is due to the much reduced data
762
+ set size, and training time accorded to the model. As [25]
763
+ state, diffusion model output quality typically scales up with
764
+ additional training time and data, and we expect this to be
765
+ the case as well here. Despite these issues, the results still
766
+ look very promising Fig. 4, with certain identities perform-
767
+ ing better than others. We encourage readers to view the
768
+ provided multi speaker video samples for a mix of both fail-
769
+ ure cases and successful videos.
770
+ 4.4. Single Speaker Fine Tuned
771
+ We fine tune a single speaker model using identity S1
772
+ on top of the pre-trained multi speaker model discussed
773
+ above. We use the same training hyper-parameters as the
774
+ base single speaker model, however we maintain 20 random
775
+ videos unseen to the network for testing, and train it for only
776
+ 150 epochs instead of 895. We report reasonable results in
777
+ Tab. 2 on the unseen test set . We show that by fine tuning
778
+ on a pre-trained multi speaker model, we achieve slightly
779
+ worse results to the base single speaker model while train-
780
+ ing for significantly less time. It stands to reason that with
781
+ further training, we would see even better results. We pro-
782
+ vide videos demonstrating this models editing capabilities
783
+ in the supplementary materials.
784
+ 5. Limitations & Future Work
785
+ Training & Inference Speed: It is no secret that diffu-
786
+ sion models are slow, both to train, and to sample from.
787
+ Our model is no exception, taking approximately 30 min-
788
+ utes/epoch to train the single speaker model, 90 min-
789
+ utes/epoch for the multi speaker one, and approximately 1
790
+ minute to generate 1 frame with 2000 diffusion steps on
791
+ a single 32gb v100 GPU. We plan on updating our model
792
+ with the approach proposed by [53], to facilitate training in
793
+ the latent space, in addition to methodically shrinking the
794
+ number of parameters our model has to determine the op-
795
+ timum set up. We suspect our current model has too many
796
+ parameters for the task at hand, and intend to reduce it. It
797
+ remains to be seen how image quality will be impacted by
798
+ these changes, however a faster model would allow for more
799
+ in depth tests, and comparisons across a wider range of data
800
+ sets, furthering the field.
801
+ Multi Speaker Model: While we demonstrate that our sin-
802
+ gle speaker models perform reasonably well (still a lot of
803
+ room for improvement!), further work must be done to ac-
804
+ 7
805
+
806
+ Figure 4. Sample frames generated by our base single speaker, fine tuned single speaker, and multi speaker models. Note that the single
807
+ speaker model shows the best lip movement accuracy. Observe how the speakers lips close at the start of the word “blue”, and gradually
808
+ open as the word progresses.
809
+ complish reliable multi-speaker performance. We want to
810
+ train the model longer, and with more data to improve the
811
+ lip synchronization. To facilitate this we need to imple-
812
+ ment the improvements mentioned above. Additionally, we
813
+ noticed that our current multi speaker model struggled to
814
+ keep the identity consistent throughout the generation pro-
815
+ cess. To address this, we propose introducing an additional
816
+ “identity” frame in the conditioning process, that the net-
817
+ work may use as a reference for how the speaker should
818
+ appear.
819
+ Dataset Size: We train our networks on such small subsets
820
+ of the GRID data set due to our limited hardware capacity.
821
+ Despite these limitations however, we achieve convincing
822
+ results, as shown in Tab. 2. We encourage readers with ac-
823
+ cess to more powerful hardware to train on the full length
824
+ data set, as well as other sources such as the Obama White
825
+ House single speaker data set, or the BBC Lip Reading Data
826
+ set [61].
827
+ Talking head generation: The task of audio-driven video
828
+ editing involves modifying a small portion of an already ex-
829
+ isting video in response to a new audio signal. We demon-
830
+ strate that diffusion models can be used successfully to-
831
+ wards this goal. The next step is extending this functionality
832
+ to talking head generation, where the network must learn to
833
+ synthesize full frame videos from a driving audio signal and
834
+ single image. This is a challenging task as the network must
835
+ now also generate natural head movements, eye blinks, and
836
+ facial expressions as well as maintaining accurate lip and
837
+ jaw movements synchronised to the audio. We plan to ex-
838
+ plore this task in our future work, and study various ways
839
+ into conditioning the network to control the facial aspects
840
+ mentioned above.
841
+ 6. Conclusion
842
+ Throughout this work, we demonstrate the feasibility in
843
+ applying denoising diffusion models to the task of end to
844
+ 8
845
+
846
+ end audio-driven video editing. Although the slow sam-
847
+ pling and training speeds associated with diffusion models
848
+ hindered our approach in the multi-speaker domain, we still
849
+ show reasonable results within the single speaker context,
850
+ generating high quality videos. With our work, we take
851
+ a promising first step forward towards achieving accurate
852
+ audio-driven video editing with denoising diffusion models.
853
+ References
854
+ [1] Brandon Amos, Bartosz Ludwiczuk, and Mahadev Satya-
855
+ narayanan. Openface: A general-purpose face recognition
856
+ library with mobile applications. Technical report, CMU-
857
+ CS-16-118, CMU School of Computer Science, 2016. 6
858
+ [2] Deepali Aneja and Wilmot Li. Real-time lip sync for live 2d
859
+ animation. arXiv preprint arXiv:1910.08685, 2019. 2
860
+ [3] Yannis M Assael, Brendan Shillingford, Shimon Whiteson,
861
+ and Nando de Freitas.
862
+ Lipnet: End-to-end sentence-level
863
+ lipreading. GPU Technology Conference, 2017. 6
864
+ [4] Omri Avrahami, Dani Lischinski, and Ohad Fried. Blended
865
+ diffusion for text-driven editing of natural images. In Pro-
866
+ ceedings of the IEEE/CVF Conference on Computer Vision
867
+ and Pattern Recognition, pages 18208–18218, 2022. 2
868
+ [5] Tadas Baltrusaitis, Amir Zadeh, Yao Chong Lim, and Louis-
869
+ Philippe Morency. Openface 2.0: Facial behavior analysis
870
+ toolkit. In 2018 13th IEEE International Conference on Au-
871
+ tomatic Face and Gesture Recognition (FG 2018), pages 59–
872
+ 66, 2018. 6
873
+ [6] Georgios Batzolis, Jan Stanczuk, Carola-Bibiane Sch¨onlieb,
874
+ and
875
+ Christian
876
+ Etmann.
877
+ Conditional
878
+ image
879
+ genera-
880
+ tion with score-based diffusion models.
881
+ arXiv preprint
882
+ arXiv:2111.13606, 2021. 2
883
+ [7] Sandika Biswas, Sanjana Sinha, Dipanjan Das, and Bro-
884
+ jeshwar Bhowmick. Realistic talking face animation with
885
+ speech-induced head motion. In Proceedings of the Twelfth
886
+ Indian Conference on Computer Vision, Graphics and Image
887
+ Processing, pages 1–9, 2021. 2
888
+ [8] Lele Chen, Guofeng Cui, Celong Liu, Zhong Li, Ziyi Kou, Yi
889
+ Xu, and Chenliang Xu. Talking-head generation with rhyth-
890
+ mic head motion. In European Conference on Computer Vi-
891
+ sion, pages 35–51. Springer, 2020. 1, 2
892
+ [9] Lele Chen, Zhiheng Li, Ross K Maddox, Zhiyao Duan, and
893
+ Chenliang Xu. Lip movements generation at a glance. In
894
+ Proceedings of the European Conference on Computer Vi-
895
+ sion (ECCV), pages 520–535, 2018. 2
896
+ [10] Lele Chen, Ross K Maddox, Zhiyao Duan, and Chenliang
897
+ Xu. Hierarchical cross-modal talking face generation with
898
+ dynamic pixel-wise loss. In Proceedings of the IEEE/CVF
899
+ conference on computer vision and pattern recognition,
900
+ pages 7832–7841, 2019. 2
901
+ [11] Nanxin Chen, Yu Zhang, Heiga Zen, Ron J Weiss, Mo-
902
+ hammad Norouzi, and William Chan.
903
+ Wavegrad: Esti-
904
+ mating gradients for waveform generation. arXiv preprint
905
+ arXiv:2009.00713, 2020. 1, 2, 3
906
+ [12] Sen Chen, Zhilei Liu, Jiaxing Liu, and Longbiao Wang. Talk-
907
+ ing head generation driven by speech-related facial action
908
+ units and audio-based on multimodal representation fusion.
909
+ arXiv preprint arXiv:2204.12756, 2022. 2
910
+ [13] Sen Chen, Zhilei Liu, Jiaxing Liu, Zhengxiang Yan, and
911
+ Longbiao Wang.
912
+ Talking head generation with audio
913
+ and speech related facial action units.
914
+ arXiv preprint
915
+ arXiv:2110.09951, 2021. 6, 7
916
+ [14] Martin Cooke, Jon Barker, Stuart Cunningham, and Xu
917
+ Shao. An audio-visual corpus for speech perception and au-
918
+ tomatic speech recognition. The Journal of the Acoustical
919
+ Society of America, 120(5):2421–2424, 2006. 2, 3, 4, 6
920
+ [15] Daniel Cudeiro, Timo Bolkart, Cassidy Laidlaw, Anurag
921
+ Ranjan, and Michael J Black. Capture, learning, and synthe-
922
+ sis of 3d speaking styles. In Proceedings of the IEEE/CVF
923
+ Conference on Computer Vision and Pattern Recognition,
924
+ pages 10101–10111, 2019. 2
925
+ [16] Dipanjan Das, Sandika Biswas, Sanjana Sinha, and Brojesh-
926
+ war Bhowmick. Speech-driven facial animation using cas-
927
+ caded gans for learning of motion and texture. In European
928
+ conference on computer vision, pages 408–424. Springer,
929
+ 2020. 2
930
+ [17] Prafulla Dhariwal and Alexander Nichol. Diffusion models
931
+ beat gans on image synthesis. Advances in Neural Informa-
932
+ tion Processing Systems, 34:8780–8794, 2021. 1, 3, 4
933
+ [18] Paul Ekman and Wallace V. Friesen. Facial action coding
934
+ system: a technique for the measurement of facial move-
935
+ ment. 1978. 6
936
+ [19] Sefik Emre Eskimez, Ross K Maddox, Chenliang Xu, and
937
+ Zhiyao Duan.
938
+ Generating talking face landmarks from
939
+ speech.
940
+ In International Conference on Latent Variable
941
+ Analysis and Signal Separation, pages 372–381. Springer,
942
+ 2018. 2
943
+ [20] Sefik Emre Eskimez, Ross K Maddox, Chenliang Xu, and
944
+ Zhiyao Duan. End-to-end generation of talking faces from
945
+ noisy speech.
946
+ In ICASSP 2020-2020 IEEE International
947
+ Conference on Acoustics, Speech and Signal Processing
948
+ (ICASSP), pages 1948–1952. IEEE, 2020. 1, 2
949
+ [21] Wan-Cyuan Fan, Yen-Chun Chen, DongDong Chen, Yu
950
+ Cheng, Lu Yuan, and Yu-Chiang Frank Wang. Frido: Fea-
951
+ ture pyramid diffusion for complex scene image synthesis.
952
+ arXiv preprint arXiv:2208.13753, 2022. 2
953
+ [22] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing
954
+ Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and
955
+ Yoshua Bengio. Generative adversarial networks. Commu-
956
+ nications of the ACM, 63(11):139–144, 2020. 1, 2
957
+ [23] Shuyang Gu, Dong Chen, Jianmin Bao, Fang Wen, Bo
958
+ Zhang, Dongdong Chen, Lu Yuan, and Baining Guo. Vec-
959
+ tor quantized diffusion model for text-to-image synthesis. In
960
+ Proceedings of the IEEE/CVF Conference on Computer Vi-
961
+ sion and Pattern Recognition, pages 10696–10706, 2022. 2
962
+ [24] William Harvey, Saeid Naderiparizi, Vaden Masrani, Chris-
963
+ tian Weilbach, and Frank Wood. Flexible diffusion modeling
964
+ of long videos. arXiv preprint arXiv:2205.11495, 2022. 2
965
+ [25] Jonathan Ho, Ajay Jain, and Pieter Abbeel. Denoising diffu-
966
+ sion probabilistic models. Advances in Neural Information
967
+ Processing Systems, 33:6840–6851, 2020. 2, 3, 4, 5, 6, 7
968
+ [26] Jonathan Ho, Chitwan Saharia, William Chan, David J Fleet,
969
+ Mohammad Norouzi, and Tim Salimans. Cascaded diffusion
970
+ models for high fidelity image generation. J. Mach. Learn.
971
+ Res., 23:47–1, 2022. 2
972
+ 9
973
+
974
+ [27] Jonathan Ho, Tim Salimans, Alexey Gritsenko, William
975
+ Chan, Mohammad Norouzi, and David J Fleet. Video dif-
976
+ fusion models. arXiv preprint arXiv:2204.03458, 2022. 1,
977
+ 2
978
+ [28] Rongjie Huang, Zhou Zhao, Huadai Liu, Jinglin Liu, Chenye
979
+ Cui, and Yi Ren. Prodiff: Progressive fast diffusion model
980
+ for high-quality text-to-speech. In Proceedings of the 30th
981
+ ACM International Conference on Multimedia, pages 2595–
982
+ 2605, 2022. 2
983
+ [29] Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A
984
+ Efros. Image-to-image translation with conditional adver-
985
+ sarial networks. In Proceedings of the IEEE conference on
986
+ computer vision and pattern recognition, pages 1125–1134,
987
+ 2017. 2
988
+ [30] Amir Jamaludin, Joon Son Chung, and Andrew Zisserman.
989
+ You said that?: Synthesising talking faces from audio. Inter-
990
+ national Journal of Computer Vision, 127(11):1767–1779,
991
+ 2019. 1, 2, 6, 7
992
+ [31] Xinya Ji,
993
+ Hang Zhou,
994
+ Kaisiyuan Wang,
995
+ Wayne Wu,
996
+ Chen Change Loy, Xun Cao, and Feng Xu. Audio-driven
997
+ emotional video portraits. In Proceedings of the IEEE/CVF
998
+ conference on computer vision and pattern recognition,
999
+ pages 14080–14089, 2021. 1, 2
1000
+ [32] Tero Karras, Timo Aila, Samuli Laine, Antti Herva, and
1001
+ Jaakko Lehtinen. Audio-driven facial animation by joint end-
1002
+ to-end learning of pose and emotion. ACM Transactions on
1003
+ Graphics (TOG), 36(4):1–12, 2017. 2
1004
+ [33] Sungwon Kim, Heeseung Kim, and Sungroh Yoon. Guided-
1005
+ tts 2:
1006
+ A diffusion model for high-quality adaptive
1007
+ text-to-speech with untranscribed data.
1008
+ arXiv preprint
1009
+ arXiv:2205.15370, 2022. 2
1010
+ [34] Diederik P Kingma and Max Welling. Auto-encoding varia-
1011
+ tional bayes. arXiv preprint arXiv:1312.6114, 2013. 2
1012
+ [35] Zhifeng Kong, Wei Ping, Jiaji Huang, Kexin Zhao, and
1013
+ Bryan Catanzaro. Diffwave: A versatile diffusion model for
1014
+ audio synthesis. arXiv preprint arXiv:2009.09761, 2020. 1,
1015
+ 2, 3
1016
+ [36] Neeraj Kumar, Srishti Goel, Ankur Narang, and Mujtaba
1017
+ Hasan. Robust one shot audio to video generation. In Pro-
1018
+ ceedings of the IEEE/CVF Conference on Computer Vision
1019
+ and Pattern Recognition Workshops, pages 770–771, 2020.
1020
+ 2, 6, 7
1021
+ [37] Avisek Lahiri, Vivek Kwatra, Christian Frueh, John Lewis,
1022
+ and Chris Bregler. Lipsync3d: Data-efficient learning of per-
1023
+ sonalized 3d talking faces from video using pose and light-
1024
+ ing normalization.
1025
+ In Proceedings of the IEEE/CVF con-
1026
+ ference on computer vision and pattern recognition, pages
1027
+ 2755–2764, 2021. 2
1028
+ [38] Alon Levkovitch, Eliya Nachmani, and Lior Wolf. Zero-shot
1029
+ voice conditioning for denoising diffusion tts models. arXiv
1030
+ preprint arXiv:2206.02246, 2022. 2
1031
+ [39] Yuanxun Lu, Jinxiang Chai, and Xun Cao. Live speech por-
1032
+ traits: real-time photorealistic talking-head animation. ACM
1033
+ Transactions on Graphics (TOG), 40(6):1–17, 2021. 2
1034
+ [40] Camillo Lugaresi, Jiuqiang Tang, Hadon Nash, Chris Mc-
1035
+ Clanahan, Esha Uboweja, Michael Hays, Fan Zhang, Chuo-
1036
+ Ling Chang, Ming Guang Yong, Juhyun Lee, et al. Medi-
1037
+ apipe: A framework for building perception pipelines. arXiv
1038
+ preprint arXiv:1906.08172, 2019. 4
1039
+ [41] Andreas Lugmayr, Martin Danelljan, Andres Romero, Fisher
1040
+ Yu, Radu Timofte, and Luc Van Gool. Repaint: Inpainting
1041
+ using denoising diffusion probabilistic models. In Proceed-
1042
+ ings of the IEEE/CVF Conference on Computer Vision and
1043
+ Pattern Recognition, pages 11461–11471, 2022. 2
1044
+ [42] Chenlin Meng, Yang Song, Jiaming Song, Jiajun Wu, Jun-
1045
+ Yan Zhu, and Stefano Ermon. Sdedit: Image synthesis and
1046
+ editing with stochastic differential equations. arXiv preprint
1047
+ arXiv:2108.01073, 2021. 2
1048
+ [43] Gaurav Mittal and Baoyuan Wang. Animating face using
1049
+ disentangled audio representations.
1050
+ In Proceedings of the
1051
+ IEEE/CVF Winter Conference on Applications of Computer
1052
+ Vision, pages 3290–3298, 2020. 2
1053
+ [44] Niranjan D Narvekar and Lina J Karam. A no-reference im-
1054
+ age blur metric based on the cumulative probability of blur
1055
+ detection (cpbd). IEEE Transactions on Image Processing,
1056
+ 20(9):2678–2683, 2011. 6
1057
+ [45] Thanh Thi Nguyen, Cuong M Nguyen, Dung Tien Nguyen,
1058
+ Duc Thanh Nguyen, and Saeid Nahavandi.
1059
+ Deep learn-
1060
+ ing for deepfakes creation and detection.
1061
+ arXiv preprint
1062
+ arXiv:1909.11573, 1:2, 2019. 2
1063
+ [46] Alex Nichol, Prafulla Dhariwal, Aditya Ramesh, Pranav
1064
+ Shyam, Pamela Mishkin, Bob McGrew, Ilya Sutskever, and
1065
+ Mark Chen. Glide: Towards photorealistic image generation
1066
+ and editing with text-guided diffusion models. arXiv preprint
1067
+ arXiv:2112.10741, 2021. 2
1068
+ [47] Alexander Quinn Nichol and Prafulla Dhariwal. Improved
1069
+ denoising diffusion probabilistic models.
1070
+ In International
1071
+ Conference on Machine Learning, pages 8162–8171. PMLR,
1072
+ 2021. 3
1073
+ [48] Vadim Popov, Ivan Vovk, Vladimir Gogoryan, Tasnima
1074
+ Sadekova, and Mikhail Kudinov. Grad-tts: A diffusion prob-
1075
+ abilistic model for text-to-speech. In International Confer-
1076
+ ence on Machine Learning, pages 8599–8608. PMLR, 2021.
1077
+ 2
1078
+ [49] KR Prajwal, Rudrabha Mukhopadhyay, Vinay P Nambood-
1079
+ iri, and CV Jawahar. A lip sync expert is all you need for
1080
+ speech to lip generation in the wild. In Proceedings of the
1081
+ 28th ACM International Conference on Multimedia, pages
1082
+ 484–492, 2020. 2
1083
+ [50] Konpat Preechakul, Nattanat Chatthee, Suttisak Wizad-
1084
+ wongsa, and Supasorn Suwajanakorn.
1085
+ Diffusion autoen-
1086
+ coders: Toward a meaningful and decodable representation.
1087
+ In Proceedings of the IEEE/CVF Conference on Computer
1088
+ Vision and Pattern Recognition, pages 10619–10629, 2022.
1089
+ 2
1090
+ [51] Aditya Ramesh, Prafulla Dhariwal, Alex Nichol, Casey Chu,
1091
+ and Mark Chen. Hierarchical text-conditional image gen-
1092
+ eration with clip latents. arXiv preprint arXiv:2204.06125,
1093
+ 2022. 2
1094
+ [52] Alexander Richard, Michael Zollh¨ofer, Yandong Wen, Fer-
1095
+ nando De la Torre, and Yaser Sheikh. Meshtalk: 3d face an-
1096
+ imation from speech using cross-modality disentanglement.
1097
+ In Proceedings of the IEEE/CVF International Conference
1098
+ on Computer Vision, pages 1173–1182, 2021. 2
1099
+ 10
1100
+
1101
+ [53] Robin Rombach, Andreas Blattmann, Dominik Lorenz,
1102
+ Patrick Esser, and Bj¨orn Ommer.
1103
+ High-resolution image
1104
+ synthesis with latent diffusion models.
1105
+ In Proceedings of
1106
+ the IEEE/CVF Conference on Computer Vision and Pattern
1107
+ Recognition, pages 10684–10695, 2022. 1, 2, 3, 7
1108
+ [54] Olaf Ronneberger, Philipp Fischer, and Thomas Brox. U-
1109
+ net: Convolutional networks for biomedical image segmen-
1110
+ tation. In International Conference on Medical image com-
1111
+ puting and computer-assisted intervention, pages 234–241.
1112
+ Springer, 2015. 4
1113
+ [55] Nataniel Ruiz, Yuanzhen Li, Varun Jampani, Yael Pritch,
1114
+ Michael Rubinstein, and Kfir Aberman. Dreambooth: Fine
1115
+ tuning text-to-image diffusion models for subject-driven
1116
+ generation. arXiv preprint arXiv:2208.12242, 2022. 2
1117
+ [56] Najmeh Sadoughi and Carlos Busso. Speech-driven expres-
1118
+ sive talking lips with conditional sequential generative adver-
1119
+ sarial networks. IEEE Transactions on Affective Computing,
1120
+ 12(4):1031–1044, 2019. 2
1121
+ [57] Chitwan Saharia, William Chan, Huiwen Chang, Chris Lee,
1122
+ Jonathan Ho, Tim Salimans, David Fleet, and Mohammad
1123
+ Norouzi.
1124
+ Palette: Image-to-image diffusion models.
1125
+ In
1126
+ ACM SIGGRAPH 2022 Conference Proceedings, pages 1–
1127
+ 10, 2022. 1, 2, 3, 4, 5
1128
+ [58] Chitwan Saharia, William Chan, Saurabh Saxena, Lala
1129
+ Li, Jay Whang, Emily Denton, Seyed Kamyar Seyed
1130
+ Ghasemipour,
1131
+ Burcu Karagol Ayan,
1132
+ S Sara Mahdavi,
1133
+ Rapha Gontijo Lopes, et al.
1134
+ Photorealistic text-to-image
1135
+ diffusion models with deep language understanding. arXiv
1136
+ preprint arXiv:2205.11487, 2022. 2
1137
+ [59] Chitwan Saharia, Jonathan Ho, William Chan, Tim Sali-
1138
+ mans, David J Fleet, and Mohammad Norouzi. Image super-
1139
+ resolution via iterative refinement.
1140
+ IEEE Transactions on
1141
+ Pattern Analysis and Machine Intelligence, 2022. 2, 4
1142
+ [60] Jascha Sohl-Dickstein, Eric Weiss, Niru Maheswaranathan,
1143
+ and Surya Ganguli.
1144
+ Deep unsupervised learning using
1145
+ nonequilibrium thermodynamics. In International Confer-
1146
+ ence on Machine Learning, pages 2256–2265. PMLR, 2015.
1147
+ 1, 2, 5, 6
1148
+ [61] Joon Son Chung, Andrew Senior, Oriol Vinyals, and Andrew
1149
+ Zisserman. Lip reading sentences in the wild. In Proceed-
1150
+ ings of the IEEE conference on computer vision and pattern
1151
+ recognition, pages 6447–6456, 2017. 8
1152
+ [62] Luchuan Song, Bin Liu, Guojun Yin, Xiaoyi Dong, Yufei
1153
+ Zhang, and Jia-Xuan Bai. Tacr-net: Editing on deep video
1154
+ and voice portraits. In Proceedings of the 29th ACM Inter-
1155
+ national Conference on Multimedia, pages 478–486, 2021.
1156
+ 2
1157
+ [63] Linsen Song, Wayne Wu, Chen Qian, Ran He, and
1158
+ Chen Change Loy. Everybody’s talkin’: Let me talk as you
1159
+ want. IEEE Transactions on Information Forensics and Se-
1160
+ curity, 17:585–598, 2022. 2
1161
+ [64] Yang Song and Stefano Ermon. Generative modeling by esti-
1162
+ mating gradients of the data distribution. Advances in Neural
1163
+ Information Processing Systems, 32, 2019. 2, 6
1164
+ [65] Yang Song, Jingwen Zhu, Dawei Li, Andy Wang, and
1165
+ Hairong Qi. Talking face generation by conditional recurrent
1166
+ adversarial network. In Proceedings of the 28th International
1167
+ Joint Conference on Artificial Intelligence, pages 919–925,
1168
+ 2019. 2, 6, 7
1169
+ [66] Supasorn
1170
+ Suwajanakorn,
1171
+ Steven
1172
+ M
1173
+ Seitz,
1174
+ and
1175
+ Ira
1176
+ Kemelmacher-Shlizerman.
1177
+ Synthesizing obama:
1178
+ learn-
1179
+ ing lip sync from audio.
1180
+ ACM Transactions on Graphics
1181
+ (ToG), 36(4):1–13, 2017. 2
1182
+ [67] Jaesung Tae, Hyeongju Kim, and Taesu Kim. Editts: Score-
1183
+ based editing for controllable text-to-speech. arXiv preprint
1184
+ arXiv:2110.02584, 2021. 2
1185
+ [68] Sarah Taylor, Taehwan Kim, Yisong Yue, Moshe Mahler,
1186
+ James Krahe, Anastasio Garcia Rodriguez, Jessica Hodgins,
1187
+ and Iain Matthews. A deep learning approach for generalized
1188
+ speech animation. ACM Transactions on Graphics (TOG),
1189
+ 36(4):1–11, 2017. 2
1190
+ [69] Justus Thies, Mohamed Elgharib, Ayush Tewari, Christian
1191
+ Theobalt, and Matthias Nießner.
1192
+ Neural voice puppetry:
1193
+ Audio-driven facial reenactment. In European conference
1194
+ on computer vision, pages 716–731. Springer, 2020. 1, 2
1195
+ [70] Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez,
1196
+ Aythami Morales, and Javier Ortega-Garcia. Deepfakes and
1197
+ beyond: A survey of face manipulation and fake detection.
1198
+ Information Fusion, 64:131–148, 2020. 2
1199
+ [71] Sergey Tulyakov, Ming-Yu Liu, Xiaodong Yang, and Jan
1200
+ Kautz.
1201
+ Mocogan: Decomposing motion and content for
1202
+ video generation. In Proceedings of the IEEE conference on
1203
+ computer vision and pattern recognition, pages 1526–1535,
1204
+ 2018. 6
1205
+ [72] Konstantinos Vougioukas, Stavros Petridis, and Maja Pan-
1206
+ tic. End-to-end speech-driven facial animation with temporal
1207
+ gans. ArXiv, abs/1805.09313, 2018. 6, 7
1208
+ [73] Konstantinos Vougioukas, Stavros Petridis, and Maja Pantic.
1209
+ Realistic speech-driven facial animation with gans. Interna-
1210
+ tional Journal of Computer Vision, 128(5):1398–1413, 2020.
1211
+ 1, 2
1212
+ [74] Suzhen Wang, Lincheng Li, Yu Ding, Changjie Fan, and
1213
+ Xin Yu.
1214
+ Audio2head:
1215
+ Audio-driven one-shot talking-
1216
+ head generation with natural head motion. arXiv preprint
1217
+ arXiv:2107.09293, 2021. 2
1218
+ [75] Wentao Wang, Yan Wang, Jianqing Sun, Qingsong Liu, Jiaen
1219
+ Liang, and Teng Li. Speech driven talking head generation
1220
+ via attentional landmarks based representation. 2020. 2
1221
+ [76] Xin Wen, Miao Wang, Christian Richardt, Ze-Yin Chen,
1222
+ and Shi-Min Hu. Photorealistic audio-driven video portraits.
1223
+ IEEE Transactions on Visualization and Computer Graph-
1224
+ ics, 26(12):3457–3466, 2020. 2
1225
+ [77] Haozhe Wu, Jia Jia, Haoyu Wang, Yishun Dou, Chao Duan,
1226
+ and Qingshan Deng. Imitating arbitrary talking style for re-
1227
+ alistic audio-driven talking face synthesis. In Proceedings
1228
+ of the 29th ACM International Conference on Multimedia,
1229
+ pages 1478–1486, 2021. 2
1230
+ [78] Zhisheng Xiao, Karsten Kreis, and Arash Vahdat.
1231
+ Tack-
1232
+ ling the generative learning trilemma with denoising diffu-
1233
+ sion gans. arXiv preprint arXiv:2112.07804, 2021. 3
1234
+ [79] Tianyi Xie, Liucheng Liao, Cheng Bi, Benlai Tang, Xiang
1235
+ Yin, Jianfei Yang, Mingjie Wang, Jiali Yao, Yang Zhang, and
1236
+ Zejun Ma. Towards realistic visual dubbing with heteroge-
1237
+ neous sources. In Proceedings of the 29th ACM International
1238
+ Conference on Multimedia, pages 1739–1747, 2021. 2
1239
+ 11
1240
+
1241
+ [80] Dongchao Yang, Jianwei Yu, Helin Wang, Wen Wang, Chao
1242
+ Weng, Yuexian Zou, and Dong Yu. Diffsound: Discrete dif-
1243
+ fusion model for text-to-sound generation. arXiv preprint
1244
+ arXiv:2207.09983, 2022. 2
1245
+ [81] Ling Yang, Zhilong Zhang, Yang Song, Shenda Hong, Run-
1246
+ sheng Xu, Yue Zhao, Yingxia Shao, Wentao Zhang, Bin
1247
+ Cui, and Ming-Hsuan Yang. Diffusion models: A compre-
1248
+ hensive survey of methods and applications. arXiv preprint
1249
+ arXiv:2209.00796, 2022. 1, 2
1250
+ [82] Ruihan Yang, Prakhar Srivastava, and Stephan Mandt. Dif-
1251
+ fusion probabilistic modeling for video generation.
1252
+ arXiv
1253
+ preprint arXiv:2203.09481, 2022. 2
1254
+ [83] Ran Yi, Zipeng Ye, Juyong Zhang, Hujun Bao, and Yong-
1255
+ Jin Liu.
1256
+ Audio-driven talking face video generation with
1257
+ learning-based personalized head pose.
1258
+ arXiv preprint
1259
+ arXiv:2002.10137, 2020. 2
1260
+ [84] Chenxu Zhang, Saifeng Ni, Zhipeng Fan, Hongbo Li, Ming
1261
+ Zeng, Madhukar Budagavi, and Xiaohu Guo. 3d talking face
1262
+ with personalized pose dynamics. IEEE Transactions on Vi-
1263
+ sualization and Computer Graphics, 2021. 2
1264
+ [85] Chenxu Zhang, Yifan Zhao, Yifei Huang, Ming Zeng,
1265
+ Saifeng Ni, Madhukar Budagavi, and Xiaohu Guo. Facial:
1266
+ Synthesizing dynamic talking face with implicit attribute
1267
+ learning. In Proceedings of the IEEE/CVF international con-
1268
+ ference on computer vision, pages 3867–3876, 2021. 2
1269
+ [86] Mingyuan Zhang, Zhongang Cai, Liang Pan, Fangzhou
1270
+ Hong, Xinying Guo, Lei Yang, and Ziwei Liu. Motiondif-
1271
+ fuse: Text-driven human motion generation with diffusion
1272
+ model. arXiv preprint arXiv:2208.15001, 2022. 1, 2
1273
+ [87] Zhimeng Zhang, Lincheng Li, Yu Ding, and Changjie
1274
+ Fan.
1275
+ Flow-guided one-shot talking face generation with
1276
+ a high-resolution audio-visual dataset.
1277
+ In Proceedings of
1278
+ the IEEE/CVF Conference on Computer Vision and Pattern
1279
+ Recognition, pages 3661–3670, 2021. 2
1280
+ [88] Ruiqi Zhao, Tianyi Wu, and Guodong Guo. Sparse to dense
1281
+ motion transfer for face image animation. In Proceedings
1282
+ of the IEEE/CVF International Conference on Computer Vi-
1283
+ sion, pages 1991–2000, 2021. 1
1284
+ [89] Hang Zhou, Yu Liu, Ziwei Liu, Ping Luo, and Xiaogang
1285
+ Wang.
1286
+ Talking face generation by adversarially disentan-
1287
+ gled audio-visual representation. In Proceedings of the AAAI
1288
+ conference on artificial intelligence, volume 33, pages 9299–
1289
+ 9306, 2019. 2
1290
+ [90] Hang Zhou, Yasheng Sun, Wayne Wu, Chen Change Loy,
1291
+ Xiaogang Wang, and Ziwei Liu. Pose-controllable talking
1292
+ face generation by implicitly modularized audio-visual rep-
1293
+ resentation. In Proceedings of the IEEE/CVF conference on
1294
+ computer vision and pattern recognition, pages 4176–4186,
1295
+ 2021. 1, 2
1296
+ [91] Yang Zhou, Xintong Han, Eli Shechtman, Jose Echevar-
1297
+ ria, Evangelos Kalogerakis, and Dingzeyu Li. Makelttalk:
1298
+ speaker-aware talking-head animation. ACM Transactions
1299
+ on Graphics (TOG), 39(6):1–15, 2020. 1, 2
1300
+ [92] Hao Zhu, Huaibo Huang, Yi Li, Aihua Zheng, and Ran He.
1301
+ Arbitrary talking face generation via attentional audio-visual
1302
+ coherence learning. In Proceedings of the Twenty-Ninth In-
1303
+ ternational Conference on International Joint Conferences
1304
+ on Artificial Intelligence, pages 2362–2368, 2021. 2
1305
+ [93] Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A
1306
+ Efros.
1307
+ Unpaired image-to-image translation using cycle-
1308
+ consistent adversarial networks. In Proceedings of the IEEE
1309
+ international conference on computer vision, pages 2223–
1310
+ 2232, 2017. 2
1311
+ 12
1312
+
IdE3T4oBgHgl3EQfXAoq/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ItAzT4oBgHgl3EQfx_5k/content/tmp_files/2301.01746v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
ItAzT4oBgHgl3EQfx_5k/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ItFJT4oBgHgl3EQfFyzw/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:596d4e55f9f084dd1d63cfbedafea4985c91e7926e45198aa38304f8c9edd972
3
+ size 197261
ItFLT4oBgHgl3EQfJS9D/content/tmp_files/2301.12003v1.pdf.txt ADDED
@@ -0,0 +1,1343 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Minimizing Trajectory Curvature of ODE-based Generative Models
2
+ Sangyun Lee 1 Beomsu Kim 2 Jong Chul Ye 2
3
+ Abstract
4
+ Recent ODE/SDE-based generative models, such
5
+ as diffusion models and flow matching, define a
6
+ generative process as a time reversal of a fixed for-
7
+ ward process. Even though these models show im-
8
+ pressive performance on large-scale datasets, nu-
9
+ merical simulation requires multiple evaluations
10
+ of a neural network, leading to a slow sampling
11
+ speed. We attribute the reason to the high cur-
12
+ vature of the learned generative trajectories, as
13
+ it is directly related to the truncation error of a
14
+ numerical solver. Based on the relationship be-
15
+ tween the forward process and the curvature, here
16
+ we present an efficient method of training the
17
+ forward process to minimize the curvature of gen-
18
+ erative trajectories without any ODE/SDE simula-
19
+ tion. Experiments show that our method achieves
20
+ a lower curvature than previous models and, there-
21
+ fore, decreased sampling costs while maintaining
22
+ competitive performance. Code is available at
23
+ https://github.com/sangyun884/fast-ode
24
+ 1. Introduction
25
+ Many machine learning problems can be formulated as dis-
26
+ covering the underlying distribution from observations. Ow-
27
+ ing to the development of deep neural networks, deep gen-
28
+ erative models exhibit superb modeling capabilities.
29
+ Classically, variational Autoencoders (VAE) (Kingma
30
+ & Welling, 2013), Generative Adversarial Networks
31
+ (GAN)
32
+ (Goodfellow
33
+ et
34
+ al.,
35
+ 2014),
36
+ and
37
+ invertible
38
+ flows (Rezende & Mohamed, 2015) have been extensively
39
+ studied. However, each model has its drawback. GANs have
40
+ dominated image synthesis for several years (Karras et al.,
41
+ 2019; Brock et al., 2018; Karras et al., 2020b), but carefully
42
+ selected regularization techniques and hyperparameters are
43
+ needed to stabilize training (Miyato et al., 2018; Brock et al.,
44
+ 2018), and their performance often does not transfer well to
45
+ other datasets. Invertible flows enable exact maximum like-
46
+ lihood training, but the invertibility constraint significantly
47
+ 1Soongsil University 2KAIST. Correspondence to: Jong Chul
48
+ Ye <jong.ye@kaist.ac.kr>.
49
+ restricts the architecture choice, which means that they can-
50
+ not benefit from the development of scalable architectures.
51
+ VAEs do not suffer from the invertibility constraint, but their
52
+ sample quality is not as good as other models.
53
+ Apart from the vanilla VAEs, recent studies utilize their hi-
54
+ erarchical extensions (Child, 2020; Vahdat & Kautz, 2020)
55
+ as they offer more expressivity to both inference and gen-
56
+ erative components by assuming nonlinear dependencies
57
+ between latent variables. However, they often have to rely
58
+ on heuristics such as KL-annealing or gradient skipping due
59
+ to training instabilities (Child, 2020; Vahdat & Kautz, 2020).
60
+ Although continuous normalizing flows (Chen et al., 2018)
61
+ do not suffer from the invertibility constraint and can be
62
+ trained on a stationary objective function, training requires
63
+ simulating ODEs, which prevents them from being applied
64
+ to large-scale datasets.
65
+ Recent ODE/SDE-based approaches attempt to settle these
66
+ issues by defining the generative process as a time reversal of
67
+ a fixed forward process. Diffusion models (Song & Ermon,
68
+ 2019; Song et al., 2020; Ho et al., 2020; Sohl-Dickstein
69
+ et al., 2015) define the generative process as a time reversal
70
+ of a forward diffusion process, where data is gradually trans-
71
+ formed into noise. By doing so, they can be trained on a
72
+ stationary loss function (Vincent, 2011) without ODE/SDE
73
+ simulation. Moreover, they are not restricted by the in-
74
+ vertibility constraint and can generate high-fidelity samples
75
+ with great diversity, allowing them to be successfully ap-
76
+ plied to various datasets of unprecedented scales (Saharia
77
+ et al., 2022; Ramesh et al., 2022).
78
+ Flow matching (Liu et al., 2022; Lipman et al., 2022) pro-
79
+ vides a different perspective on this model class. From
80
+ this viewpoint, the training of diffusion models can be seen
81
+ as matching the forward and reverse vector fields. Since
82
+ stochasticity is not a root of the success of these models (Kar-
83
+ ras et al., 2022) and flow matching offers an alternative per-
84
+ spective that is fully explained under the ODE scheme, we
85
+ hereafter refer to these types of models as ODE-based gen-
86
+ erative models. If necessary, a generative ODE can be easily
87
+ converted to an SDE and vice versa (Song et al., 2020).
88
+ However, drawing samples from ODE-based generative
89
+ models requires multiple evaluations of a neural network
90
+ for accurate numerical simulation, leading to slow sampling
91
+ speed. While many studies have attempted to develop fast
92
+ arXiv:2301.12003v1 [cs.LG] 27 Jan 2023
93
+
94
+ Minimizing Trajectory Curvature of ODE-based Generative Models
95
+ Figure 1. Forward and reverse trajectories of denoising diffusion model (Ho et al., 2020), flow matching (Liu et al., 2022), and our method
96
+ on 2D dataset (left). The intersection between forward trajectories makes reverse trajectories collapse toward the average direction,
97
+ resulting in increased curvature and suboptimal sample qualities with a limited number of function evaluations (NFE). In contrast, our
98
+ approach successfully unties the crossover between forward trajectories, leading to low-curvature reverse trajectories. This phenomenon
99
+ also holds true in high-dimensional spaces, as demonstrated by reverse process visualization on MNIST, CIFAR-10, and CelebAHQ (64 ×
100
+ 64) datasets (middle). As a result, our method makes less truncation error when the number of function evaluations (NFE) is small (right).
101
+ samplers for pre-trained models (Lu et al., 2022; Zhang &
102
+ Chen, 2022), there seems to be a limit to lowering the costs.
103
+ We attribute the reason to the high curvature of the learned
104
+ generative trajectories. The curvature is intriguing since it is
105
+ directly related to the truncation error of a numerical solver.
106
+ Intuitively, zero curvature means that generative ODEs can
107
+ be accurately solved with only one function evaluation.
108
+ Since a generative process is a time reversal of the forward
109
+ process, it is evident that its curvature is also somehow de-
110
+ termined by the forward process, but the exact mechanism is
111
+ yet unexplored. We find that the flow matching perspective
112
+ offers an interesting insight into the relationship between the
113
+ forward process and the curvature. Based on our observa-
114
+ tion, we propose an efficient method of training the forward
115
+ process to reduce curvature. Specifically, our contributions
116
+ are as follows:
117
+ • We investigate the relationship between the forward
118
+ process and curvature from a flow matching perspec-
119
+ tive. We find that the degree of intersection between
120
+ forward trajectories is positively related to the curva-
121
+ ture of generative processes.
122
+ • We propose an efficient method of learning the forward
123
+ process to reduce the degree of intersection between
124
+ forward trajectories without any ODE/SDE simulation.
125
+ We show that our method can be seen as a β-VAE (Hig-
126
+ gins et al., 2016) with a time-conditional decoder.
127
+ • Experiments show that our method achieves lower cur-
128
+ vature than previous models and, therefore, demon-
129
+ strates decreased sampling costs while maintaining
130
+ competitive performance.
131
+ 2. Background
132
+ ODE/SDE-based generative models effectively model com-
133
+ plex distributions by repeatedly composing a neural net-
134
+ work, making trade-offs between execution time and sample
135
+ quality. In this paper, we focus on ODE-based generative
136
+ models since they yield the same marginal distribution as
137
+ SDEs while being conceptually simpler and faster to sam-
138
+ ple (Song et al., 2020).
139
+ Different from continuous normalizing flows (CNF) (Chen
140
+ et al., 2018), recent ODE-based models do not require ODE
141
+ simulations during training and therefore are more scal-
142
+ able. At a high level, they define a forward coupling q(x, z)
143
+ between data distribution p(x) and prior distribution p(z)
144
+ and subsequently an interpolation xt(x, z) for t ∈ [0, 1]
145
+ between a pair (x, z) ∼ q(x, z) such that x0(x, z) = x
146
+ and x1(x, z) = z. Training objectives are variants of the
147
+ denoising autoencoder objective
148
+ min
149
+ θ Et∼U(0,1)Ex,z∼q(x,z)[λ(t)||x − xθ(xt(x, z), t)||2
150
+ 2],
151
+ (1)
152
+ where λ(t) is a weighting function. Here, a neural network
153
+ xθ(xt, t) is trained to reconstruct the data x from the cor-
154
+ rupted observation xt. In the following, we briefly review
155
+ two popular instances of such models: the denoising dif-
156
+ fusion model and flow matching. We refer the readers to
157
+ Appendix A for a detailed background.
158
+
159
+ MNIST
160
+ 0.08
161
+ Ours
162
+ Flow matching
163
+ Forwardtrajectory
164
+ 0.06
165
+ 0.04
166
+ 0.02
167
+ (b) MNIST
168
+ 0.00-
169
+ 101
170
+ 102
171
+ CIFAR-10
172
+ 0.12
173
+ Reverse trajectory, NFEs = 20
174
+ Ours
175
+ 0.10
176
+ Flow matching
177
+ 0.08 -
178
+ (c) CIFAR-10
179
+ 0.04
180
+ 0.02
181
+ 0.00 -
182
+ 101
183
+ 102
184
+ Ours
185
+ CelebAHQ 64
186
+ 0.06
187
+ NFEs = 3
188
+ Ours
189
+ — Flow matching
190
+ 0.05
191
+ 0.04
192
+ low matching
193
+ 0.03
194
+ 0.02
195
+ 0.01
196
+ 0.00
197
+ Denoising diffusion
198
+ Flow matching
199
+ 101
200
+ Ours
201
+ 102
202
+ t=1
203
+ (d) CelebAHQ 64
204
+ 0=↑
205
+ NFEs
206
+ (a) 2D Mixture of GaussiansMinimizing Trajectory Curvature of ODE-based Generative Models
207
+ Denoising diffusion models
208
+ Denoising diffusion mod-
209
+ els (Ho et al., 2020) employ the prior p(z) = N(0, I),
210
+ forward coupling q(x, z) = p(x)p(z), and a nonlinear in-
211
+ terpolation
212
+ xt(x, z) = α(t)x +
213
+
214
+ 1 − α(t)2z
215
+ (2)
216
+ with a predefined nonlinear function α(t). λ(t) is often
217
+ adjusted to improve the perceptual quality for image syn-
218
+ thesis (Ho et al., 2020). Sampling can be done by solving
219
+ probability flow ODEs (Song et al., 2020).
220
+ Flow matching
221
+ However, the choice of Eq. (2) seems un-
222
+ natural from a flow matching perspective as it unnecessarily
223
+ increases the curvature of generative trajectories. In flow
224
+ matching (Liu et al., 2022; Lipman et al., 2022), the inter-
225
+ mediate sample xt is rather defined as a linear interpolation
226
+ xt(x, z) = (1 − t)x + tz
227
+ (3)
228
+ since it has a constant velocity across t for given x and z.
229
+ After training, sampling is done by solving the following
230
+ ODE backward:
231
+ dzt = zt − xθ(zt, t)
232
+ t
233
+ dt,
234
+ (4)
235
+ where dt is an infinitesimal timestep, and z1 is sampled
236
+ from p(z). Instead of predicting x, Liu et al. (2022) directly
237
+ learns the velocity zt−xθ(zt,t)
238
+ t
239
+ . The effectiveness of this
240
+ sampler in reducing the sampling costs has been investigated
241
+ in various contexts (Karras et al., 2022; Liu et al., 2022;
242
+ Lipman et al., 2022). We build our method based on flow
243
+ matching, using the linear interpolation and the ODE in
244
+ Eq. (4) for sampling.
245
+ 3. Curvature Minimization
246
+ 3.1. Curvature
247
+ For a generative process Z = {zt(z)} with the initial value
248
+ z1(z) = z , we informally define curvature as the extent to
249
+ which the trajectory deviates from a straight path:
250
+ C(Z) = Et
251
+ ����z1(z) − z0(z) − ∂
252
+ ∂tzt(z)
253
+ ����
254
+ 2
255
+ 2
256
+ (5)
257
+ The average curvature Ez∼p(z)[C(Z)] should be the main
258
+ concern in designing the ODE-based models since it is di-
259
+ rectly related to the truncation error of numerical solvers.
260
+ Zero curvature means the path is completely straight. There-
261
+ fore, a single step of the Euler solver is sufficient to obtain
262
+ an accurate solution.
263
+ Since a generative process is a time reversal of the forward
264
+ process, its curvature is determined by the forward process.
265
+ As an illustrative example, consider a generative ODE that
266
+ is trained on Eq. (1). In the optima, xθ(zt, t) is a minimum
267
+ mean squared error estimator E[x|xt = zt], and the average
268
+ curvature of the generative processes governed by Eq.(4)
269
+ becomes
270
+ Ez,t
271
+ ����z1(z) − z0(z) − 1
272
+ t zt(z) + 1
273
+ t E[x|xt = zt(z)]
274
+ ����
275
+ 2
276
+ 2
277
+ ,
278
+ (6)
279
+ which is a function of the posterior q(x|xt). Since we define
280
+ xt as an interpolation between x and z, the posterior is de-
281
+ termined by the forward coupling q(x, z). In previous work,
282
+ q(x, z) is fixed, and so is the curvature of the generative
283
+ process in optima. In the following, we further examine the
284
+ relationship between forward coupling and curvature and
285
+ show that we can improve the curvature by finding better
286
+ q(x, z).
287
+ 3.2. Curvature and the degree of intersection
288
+ Specifically, we observe that Eq. (6) is related to the degree
289
+ of intersection of the forward trajectories
290
+ I(q) = Et,x,z∼q(x,z)[||z−x−E[z−x|xt(x, z)]||2
291
+ 2], (7)
292
+ which becomes zero when there is no intersection at any
293
+ xt. As shown in Fig. 1, the intersection between forward
294
+ trajectories makes the reverse vector field collapse toward
295
+ the average direction, leading to high curvature. As the
296
+ degree of intersection decreases, the reverse paths are grad-
297
+ ually straightened. When I(q) = 0, the posterior q(x|xt)
298
+ becomes a Dirac delta function, E[x|xt = zt(z)] = z0(z)
299
+ for every t, and Eq. (6) becomes zero, i.e., the paths are com-
300
+ pletely straight. Therefore, it is natural to seek a forward
301
+ coupling q(x, z) that minimizes Eq. (7). We can estimate
302
+ Eq. (7) by minimizing the following upper bound with re-
303
+ spect to θ.
304
+ Proposition 1. Let xt(x, z) be the linear interpolation de-
305
+ fined as Eq. (3). Then, we have
306
+ I(q) ≤ Et,x,z∼q(x,z)
307
+ � 1
308
+ t2 ||x − xθ(xt, t)||2
309
+ 2
310
+
311
+ .
312
+ (8)
313
+ The bound is tight when xθ(xt, t) = E[x|xt].
314
+ Sketch of Proof. Using Eq. (3), we obtain z − x = (xt −
315
+ x)/t. Plugging it into Eq. (7), we have
316
+ I(q) = Et,x,z∼q(x,z)[||1
317
+ t (x − E[x|xt])||2
318
+ 2],
319
+ (9)
320
+ which is bounded by Eq. (8).
321
+ For the independent coupling q(x, z) = p(x)p(z), the up-
322
+ per bound of I(q) coincides with Eq. (1) with λ(t) = 1/t2,
323
+ which is the training loss of Liu et al. (2022). In this sense,
324
+
325
+ Minimizing Trajectory Curvature of ODE-based Generative Models
326
+ Liu et al. (2022) estimates the upper bound of the degree of
327
+ intersection of the independent coupling but does not really
328
+ minimize it. Intuitively, the degree of intersection can be
329
+ measured by the reconstruction error of an optimal decoder
330
+ since the decoding is more difficult when multiple inputs are
331
+ encoded into a single point. See Fig. 2 for an illustration.
332
+ Figure 2. Reconstruction error is (a) high when forward trajectories
333
+ intersect (b) and low when they do not.
334
+ 3.3. Parameterizing q(x, z)
335
+ After estimating I(q) by updating θ, we search for q that
336
+ minimizes I(q). Although there are many ways to solve
337
+ this optimization problem, there are two practical con-
338
+ siderations. First, the optimization needs to be efficient.
339
+ Moreover, q(z|x) should define a smooth map from x to
340
+ z since we have to approximate E[x|xt] using a neural
341
+ network with finite capacity in practice. Therefore, we
342
+ propose to parameterize the coupling as a neural network
343
+ qφ(x, z) = qφ(z|x)p(x), where we define qφ(z|x) as a
344
+ Gaussian distribution. With qφ(z) =
345
+
346
+ qφ(x, z)dx and a
347
+ weight β, we optimize
348
+ min
349
+ φ I(qφ) + βDKL(qφ(z)||p(z)).
350
+ (10)
351
+ The second KL term ensures qφ(x, z) is a valid coupling
352
+ between p(x) and p(z). See Appendix B for more details.
353
+ Joint training
354
+ In practice, we jointly minimize Eqs. (8)
355
+ and (10) with respect to both θ and φ. This leads to our loss
356
+ function
357
+ min
358
+ θ,φ Et,x,z∼qφ(x,z)[ 1
359
+ t2 ||x − xθ(xt(x, z), t)||2
360
+ 2
361
+ +βDKL(qφ(z|x)||p(z))],
362
+ (11)
363
+ which resembles the β-VAE objective (Higgins et al., 2016)
364
+ in that Eq. (11) reduces to the β-VAE loss if we fix t to
365
+ 1. Since the decoder xθ is conditioned on time step, ODE-
366
+ based models can synthesize higher quality samples than
367
+ β-VAEs by iteratively refining the blurry initial predictions.
368
+ From this viewpoint, previous methods (Liu et al., 2022;
369
+ Ho et al., 2020) can be seen as degenerate cases where the
370
+ encoder qφ(z|x) collapses into the prior by setting β → ∞.
371
+ See Fig. 3 for a visual schematic of our method.
372
+ Figure 3. A visual schematic of the proposed method.
373
+ 4. Related Works
374
+ Alternative forward processes
375
+ There have been several
376
+ approaches to finding alternative forward processes for dif-
377
+ fusion models. It has been demonstrated that other types of
378
+ degradation, such as blurring, masking, or pre-trained neural
379
+ encoding, can be used for the forward process (Rissanen
380
+ et al., 2022; Lee et al., 2022; Hoogeboom & Salimans, 2022;
381
+ Daras et al., 2022; Gu et al., 2022; Bansal et al., 2022). How-
382
+ ever, they are either purely heuristic or rely on an inductive
383
+ bias that is not necessarily well-supported by theory.
384
+ Learning forward process
385
+ A few studies attempted to
386
+ learn the forward process. Kingma et al. (2021) proposed
387
+ to learn the signal-to-ratio function of the forward process
388
+ jointly with generative components. However, the inference
389
+ model of Kingma et al. (2021) is linear and thus has lim-
390
+ ited expressivity. Zhang & Chen (2021) proposed nonlinear
391
+ diffusion models, where the drift function of the forward
392
+ SDEs are neural networks. Although they introduce more
393
+ flexibility in inference models, training requires the simu-
394
+ lation of forward/reverse SDEs, which causes a significant
395
+ computational overhead. Our method possesses the advan-
396
+ tages of both methods. Our inference model is expressive
397
+ since we set q(z|x) as a neural network. Since we define
398
+ xt as an interpolation between x and z and qφ(xt|x) as a
399
+ Gaussian distribution, sampling is done with one forward
400
+ pass for an arbitrary t, enabling efficient training as in previ-
401
+ ous methods (Ho et al., 2020; Liu et al., 2022). Moreover,
402
+ even though the nonlinear forward process appeared to im-
403
+ prove the sampling efficiency of diffusion models (Zhang
404
+ & Chen, 2021), the exact mechanism of the improved sam-
405
+ pling speed was vague. In this paper, we convey a clear
406
+ motivation for learning the forward process by revealing the
407
+ relationship between the forward process and the curvature
408
+ of the generative trajectories.
409
+ Fast samplers
410
+ Accelerating the sampling speed of dif-
411
+ fusion models is an active research topic, which is often
412
+
413
+ (a) High reconstruction error
414
+ (b) Low reconstruction error
415
+ Data
416
+ Noise
417
+ Interpolated sample
418
+ → Encoding
419
+ Decoding
420
+ → Reconstruction errorKL loss
421
+ p(z)
422
+ Encoder
423
+ (1 -t) +tz
424
+ Decoder
425
+ Reconstruction lossMinimizing Trajectory Curvature of ODE-based Generative Models
426
+ tackled by developing fast solvers (Lu et al., 2022; Zhang &
427
+ Chen, 2022). Our work is in an orthogonal direction since
428
+ they focus on taming the high curvature ODEs while we
429
+ aim to minimize the curvature itself. We expect the effect of
430
+ these methods to be additive to ours and leave the detailed
431
+ investigation for future work.
432
+ Straightness of Neural ODEs
433
+ The importance of the
434
+ straightness of neural ODEs in reducing the sampling cost
435
+ has been previously discussed. Based on Benamou-Brenier
436
+ formulation of the optimal transport problem (Benamou &
437
+ Brenier, 2000), Finlay et al. (2020) regularized the norm of
438
+ the vector field of the CNFs to encourage the straightness,
439
+ which is later generalized in Kelly et al. (2020) where the
440
+ norm of K-th order derivative is minimized. Since CNFs
441
+ are trained on the maximum likelihood objective, any vec-
442
+ tor field that defines the transport map from p(z) to p(x)
443
+ is optimal, and it is therefore possible to narrow down the
444
+ search space by utilizing the additional constraint without
445
+ drastically compromising the performance. In contrast, re-
446
+ cent ODE-based generative models (Song & Ermon, 2019;
447
+ Ho et al., 2020; Liu et al., 2022; Lipman et al., 2022) train
448
+ the neural ODE to match a pre-defined forward flow using
449
+ Eq. (1). Thus the solution is unique, and any additional
450
+ regularization makes models deviate from optima.
451
+ Figure 4. The relationship between the degree of intersection be-
452
+ tween forward trajectories and curvature of reverse trajectories.
453
+ The first column shows forward and reverse trajectories induced by
454
+ the independent coupling q(x, z) = p(x)p(z). As the degree of
455
+ intersection between forward trajectories is decreased by lowering
456
+ β, reverse paths are gradually straightened.
457
+ 5. Experiment
458
+ 5.1. 2D dataset
459
+ Fig. 4 demonstrates the visual results and the estimated
460
+ upper bounds of the degree of intersection on the 2D toy
461
+ dataset. The leftmost column shows the forward trajectories
462
+ induced by the independent coupling q(x, z) = p(x)p(z)
463
+ used in previous work. Since a data point can be mapped
464
+ to any noise, the forward trajectories largely intersect with
465
+ each other, and as a result, the reverse trajectories collapse
466
+ toward the average direction where the actual density is low,
467
+ and the curvature increases as the reverse trajectories need
468
+ to bend toward the modes. As β decreases, qφ(z|x) tries to
469
+ untie the tangled trajectories, leading to low curvature.
470
+ Figure 5. Effects of β on curvature. The results on MNIST, CIFAR-
471
+ 10, and CelebAHQ (64 × 64) are indicated by red, green, and gray
472
+ colors. Dashed lines indicate the curvatures of the independent
473
+ coupling baselines.
474
+ 5.2. Image generation
475
+ We further conduct an experiment on the image dataset to
476
+ investigate the relationship between I(q) and E[C(Z)] in
477
+ the high-dimensional space. We estimate E[C(Z)] by simu-
478
+ lating 10, 000 generative trajectories using the Euler solver
479
+ with 128 steps and then divide by the number of pixels. As
480
+ shown in Fig. 5, the average curvature is the highest when us-
481
+ ing independent forward coupling q(x, z) = p(x)p(z) and
482
+ lowered as β decreases. Fig. 6 shows that the generative vec-
483
+ tor field induced by independent coupling q(x, z) = p(x, z)
484
+ initially predicts the blurry images and then bends toward
485
+ the mode, resulting in the high curvature. Lower β yields
486
+ more consistent results across the time steps.
487
+ Fig. 7 shows that the model trained with the lower β per-
488
+ forms better with the limited NFEs and asymptotically ap-
489
+ proaches the performance of baseline indicated by a dashed
490
+ line. When β is as low as 1, the generative process is almost
491
+ straight, but the sample quality is degraded because of high
492
+ DKL(qφ(z)||p(z). As shown in Fig. 8, the gap between
493
+ reconstruction FID (rFID) and FID is large when β = 1
494
+ and gradually becomes smaller as β increases. Moreover,
495
+ the distribution of the norm of latent vectors gradually ap-
496
+ proaches p(z) as β increases. From this observation, we can
497
+ see that β is an important hyperparameter that determines
498
+ the trade-off between sample quality and computational
499
+ cost, and there are little advantages of setting β to ∞ as in
500
+ previous work (Liu et al., 2022; Ho et al., 2020) in most
501
+ cases.
502
+
503
+ Forward trajectory
504
+ Reverse trajectory
505
+ independent, I(g) ≤ 32
506
+ β = 100, I(q) ≤ 15.23
507
+ β = 30, I(q) ≤ 5.3
508
+ β = 10, I(g) < 2.190.08
509
+ 0.07
510
+ 0.065
511
+ 0.06
512
+ 0.053
513
+ 0.05
514
+ 0.046
515
+ Curvature
516
+ 0.038
517
+ 0.04
518
+ 0.033
519
+ 0.03
520
+ 0.02
521
+ -0.016
522
+ 0.014
523
+ 0.01
524
+ 0.012
525
+ 0.010
526
+ 0.00
527
+ 1
528
+ 5
529
+ 10
530
+ 15
531
+ 20
532
+ βMinimizing Trajectory Curvature of ODE-based Generative Models
533
+ Figure 6. Visualization of intermediate samples xθ(zt, t) with
534
+ varying β. Lower β allows for sharper initial predictions, as indi-
535
+ cated by red boxes.
536
+ (a) Quantitative results
537
+ (b) Qualitative results
538
+ Figure 7. Trade-off between FID10K and the number of function
539
+ evaluations (NFE) with varying β. The low curvature generative
540
+ process produces more high-quality samples than the baseline with
541
+ limited NFEs.
542
+ 5.3. Distillation
543
+ Even though distillation is an effective way to train the
544
+ one-step student models from the teacher diffusion models,
545
+ (a) FID gap with respect to β
546
+ (b) Distribution of ||z||2
547
+ Figure 8. The gap between reconstruction FID (rFID) and FID
548
+ values (a), and distribution of the norm of z ∼ qφ(z) (b). rFID is
549
+ measured using samples reconstructed from qφ(z).
550
+ the performance of the student model is suboptimal due to
551
+ the distillation error (Liu et al., 2022; Luhman & Luhman,
552
+ 2021; Salimans & Ho, 2022). Given that the teacher tra-
553
+ jectories with higher NFEs are more difficult to distill, our
554
+ low-curvature generative ODEs would make less distillation
555
+ error since they achieve the same level of sample quality
556
+ using relatively lower NFEs. Based on this intuition, we
557
+ investigate the effect of our method on reducing the distil-
558
+ lation error. As shown in Table 1, the teacher ODE with
559
+ β = 10 achieves a similar FID score using half as many
560
+ NFEs compared to the baseline model. This resulted in
561
+ a smaller distillation error and an improved FID score of
562
+ the one-step model while reducing the cost of generating
563
+ paired data by half. Fig. 9 demonstrates that our method
564
+ with β = 10 obtains a superior one-step model than baseline
565
+ with independent coupling in terms of sample fidelity.
566
+ Table 1. Effects of curvature on distillation performance. The re-
567
+ sults of independent coupling and our method with β = 10 are
568
+ reported. Distillation error is measured as a mean-squared error on
569
+ the test set.
570
+ Independent
571
+ β = 10
572
+ FID / Error
573
+ NFEs
574
+ FID / Error
575
+ NFEs
576
+ Teacher
577
+ 3.60 / -
578
+ 20
579
+ 3.52 / -
580
+ 10
581
+ Distilled
582
+ 6.25 / 0.0208
583
+ 1
584
+ 4.41 / 0.0157
585
+ 1
586
+ (a) β = 10
587
+ (b) Independent
588
+ Figure 9. Synthesis results of one-step models.
589
+
590
+ B
591
+ β= 10
592
+ β=
593
+ : 20
594
+ p(z)
595
+ 25
596
+ 26
597
+ 27
598
+ 28
599
+ 29
600
+ 30
601
+ I/z||2SSSSS
602
+ 222
603
+ 38888
604
+ C
605
+ :20
606
+ 88
607
+ 000
608
+ Independent
609
+ Independent20.0
610
+ 20
611
+ 18.8
612
+ independent
613
+ 17.5
614
+ learned
615
+ 15.0
616
+ 15
617
+ 3.0
618
+ 12.5
619
+ FID10K
620
+ 2 :5.
621
+ 10.0
622
+ B
623
+ -10
624
+ 8.5
625
+ 2.0
626
+ 7.5
627
+ 1.5
628
+ 64
629
+ 128
630
+ 5.0
631
+ 5
632
+ 2.5
633
+ 0.0
634
+ 1
635
+ 5
636
+ 10
637
+ 20
638
+ 32
639
+ 64
640
+ 128
641
+ NFEs7
642
+ S
643
+ 6
644
+ 6
645
+
646
+ NFEs=4
647
+ 8
648
+ 7A
649
+ 7
650
+ ?子
651
+ 0.
652
+ 6
653
+ 6
654
+ NFEs=128
655
+ ?子
656
+ 3
657
+ S
658
+ 3
659
+ s
660
+ β= 5
661
+ Independent12 -
662
+ 11.36
663
+ 10:
664
+ 8
665
+ FID
666
+ rFID
667
+ 6
668
+ 4
669
+ 2
670
+ 0.68
671
+ 0.28
672
+ 0.23
673
+ 0
674
+ 1
675
+ 5
676
+ 10
677
+ 20
678
+ βMinimizing Trajectory Curvature of ODE-based Generative Models
679
+ 5.4. Size of encoder
680
+ Since we train qφ(z|x), a natural question is how much
681
+ additional computational cost is needed for training our
682
+ model. We experiment with two settings of the encoder,
683
+ same and small. In same setting, we use the identical
684
+ architecture with a generative component except that the
685
+ number of output channels is twice for predicting a diagonal
686
+ covariance. In small setting, we use roughly 20 times
687
+ smaller architecture for the encoder model. See Appendix C
688
+ for a detailed configuration. As shown in Table 2, a small
689
+ encoder performs just as well or even better than a larger
690
+ encoder, and part of the reason is that we can use a larger
691
+ batch size in the small setting. The additional cost of our
692
+ method is negligible with the use of a lightweight architec-
693
+ ture for qφ(z|x), so we stick to small setting throughout
694
+ our experiments.
695
+ Table 2. Performance comparison of same and small encoder
696
+ settings on CIFAR-10 dataset, measured by FID10K.
697
+ Setting \ NFEs
698
+ 128
699
+ 40
700
+ 20
701
+ 10
702
+ 5
703
+ 4
704
+ Same Encoder
705
+ 5.52
706
+ 6.23
707
+ 7.74
708
+ 11.49
709
+ 22.90
710
+ 30.97
711
+ Small Encoder
712
+ 5.39
713
+ 6.07
714
+ 7.51
715
+ 11.19
716
+ 22.33
717
+ 30.16
718
+ 5.5. Comparison with state-of-the-arts
719
+ Table 3 shows the unconditional synthesis results of our
720
+ approach on the CIFAR-10 dataset. Results of recent meth-
721
+ ods are also provided as a reference. We experiment with
722
+ two configurations, config A and config B, which we detail
723
+ in Appendix C. We try three solvers, Euler solver, Heun’s
724
+ 2nd order method, and the black-box RK45 method from
725
+ Scipy (Virtanen et al., 2020), and find that RK45 works
726
+ well when we are able to fully simulate ODEs while Heun’s
727
+ 2nd order method performs better than other solvers with
728
+ small NFEs. As shown in the table, we can see that the
729
+ performance gap between our method and the baseline is
730
+ huge when the sampling budget is limited. For instance, our
731
+ method with β = 10 achieved an FID score of 18.74, which
732
+ is significantly better than the baseline’s score of 37.19 when
733
+ NFEs is 5. Surprisingly, our method with β = 20 exhibits
734
+ superior sample qualities across all NFEs, even in the case
735
+ of full sampling using the RK45 solver. See Fig. 10 for vi-
736
+ sual comparison. Additional qualitative results are provided
737
+ in Appendix D.
738
+ 6. Discussion and Limitations
739
+ One limitation of our method is that for our encoding dis-
740
+ tribution qφ(z|x), we use a Gaussian distribution for the-
741
+ oretical and practical conveniences: sampling is easily im-
742
+ plemented in a differentiable manner, and KL divergence
743
+ is tractable. However, our simple Gaussian encoder cannot
744
+ eliminate the intersection completely. We believe that it
745
+ would be beneficial to use a more flexible encoding distribu-
746
+ tion, for instance, using the hierarchical latent variable as in
747
+ Child (2020); Vahdat & Kautz (2020).
748
+ Additionally, the trade-off between sample quality and com-
749
+ putational cost is determined by the value of β, which must
750
+ be manually selected by a practitioner. This is problematic
751
+ as one has to train a model from scratch for each value of
752
+ β, which would potentially lead to excessive energy con-
753
+ sumption. However, using a reasonably high value of β
754
+ consistently outperforms the baseline regardless of the sam-
755
+ pling budget, as shown in our experiments. Therefore, one
756
+ could reduce the sampling cost without compromising per-
757
+ formance by conservatively setting β to a high value in most
758
+ cases.
759
+ 7. Conclusion
760
+ In this paper, we mainly discussed the curvature of the
761
+ ODE-based generative models, which is crucial for sam-
762
+ pling efficiency. We revealed the relationship between the
763
+ degree of intersection between forward trajectories and the
764
+ curvature and presented an efficient algorithm to reduce the
765
+ intersection by training a forward coupling. We demon-
766
+ strated that our method successfully reduces the trajectory
767
+ curvature, thereby enabling accurate ODE simulation with
768
+ significantly less sampling budget. Furthermore, we showed
769
+ our method effectively decreases the distillation error, im-
770
+ proving the performance of one-step student models. Our
771
+ approach is unique and complementary to other acceleration
772
+ methods, and we believe it can be used in conjunction with
773
+ other techniques to further decrease the sampling cost of
774
+ ODE-based generative models.
775
+ 8. Societal Impacts and Reproducibility
776
+ We anticipate this work will have positive effects, as it can
777
+ significantly decrease the computational resources required
778
+ during sampling. However, it is important to note that the
779
+ same technology can also be used to create malicious con-
780
+ tent, and thus, proper regulations need to be put in place to
781
+ ensure that this technology is used responsibly and ethically.
782
+ We make the code and model checkpoints for our method
783
+ publicly available at the following GitHub remote reposi-
784
+ tory: https://github.com/sangyun884/fast-ode. Implementa-
785
+ tion details can also be found in Appendix. C.
786
+ References
787
+ Bansal, A., Borgnia, E., Chu, H.-M., Li, J. S., Kazemi, H.,
788
+ Huang, F., Goldblum, M., Geiping, J., and Goldstein,
789
+ T. Cold diffusion: Inverting arbitrary image transforms
790
+ without noise. arXiv preprint arXiv:2208.09392, 2022.
791
+
792
+ Minimizing Trajectory Curvature of ODE-based Generative Models
793
+ Table 3. Comparison with state-of-the-arts on CIFAR-10 dataset. * Our reimplementation.
794
+ Method
795
+ NFEs(↓)
796
+ IS (↑)
797
+ FID (↓)
798
+ Recall (↑)
799
+ GANs
800
+ StyleGAN2 (Karras et al., 2020a)
801
+ 1
802
+ 9.18
803
+ 8.32
804
+ 0.41
805
+ StyleGAN2 + ADA (Karras et al., 2020a)
806
+ 1
807
+ 9.40
808
+ 2.92
809
+ 0.49
810
+ StyleGAN2 + DiffAug (Zhao et al., 2020)
811
+ 1
812
+ 9.40
813
+ 5.79
814
+ 0.42
815
+ ODE/SDE-based models
816
+ Denoising Diffusion GAN (T=1) (Xiao et al., 2021)
817
+ 1
818
+ 8.93
819
+ 14.6
820
+ 0.19
821
+ DDPM (Ho et al., 2020)
822
+ 1000
823
+ 9.46
824
+ 3.21
825
+ 0.57
826
+ NCSN++ (VE SDE) (Song et al., 2020)
827
+ 2000
828
+ 9.83
829
+ 2.38
830
+ 0.59
831
+ LSGM (Vahdat et al., 2021)
832
+ 138
833
+ -
834
+ 2.10
835
+ -
836
+ DFNO (Zheng et al., 2022)
837
+ 1
838
+ -
839
+ 5.92
840
+ -
841
+ Knowledge distillation (Luhman & Luhman, 2021)
842
+ 1
843
+ 8.36
844
+ 9.36
845
+ 0.51
846
+ Progressive distillation (Salimans & Ho, 2022)
847
+ 1
848
+ -
849
+ 9.12
850
+ -
851
+ Rectified Flow (RK45) (Liu et al., 2022)
852
+ 127
853
+ 9.60
854
+ 2.58
855
+ 0.57
856
+ 2-Rectified Flow (RK45)
857
+ 110
858
+ 9.24
859
+ 3.36
860
+ 0.54
861
+ 3-Rectified Flow (RK45)
862
+ 104
863
+ 9.01
864
+ 3.96
865
+ 0.53
866
+ 2-Rectified Flow Distillation
867
+ 1
868
+ 9.01
869
+ 4.85
870
+ 0.50
871
+ Our results
872
+ Rectified Flow* (config A, RK45)
873
+ 134
874
+ 9.18
875
+ 2.87
876
+ -
877
+ Rectified Flow* (config B, RK45)
878
+ 132
879
+ 9.48
880
+ 2.66
881
+ -
882
+ Rectified Flow* (config B, Heun’s 2nd order method)
883
+ 9
884
+ 8.48
885
+ 12.92
886
+ -
887
+ Rectified Flow* (config B, Heun’s 2nd order method)
888
+ 5
889
+ 7.04
890
+ 37.19
891
+ -
892
+ Ours (β = 20, config B, RK45)
893
+ 118
894
+ 9.55
895
+ 2.45
896
+ -
897
+ Ours (β = 20, config B, Heun’s 2nd order method)
898
+ 9
899
+ 8.75
900
+ 9.96
901
+ -
902
+ Ours (β = 20, config B, Heun’s 2nd order method)
903
+ 5
904
+ 7.83
905
+ 24.40
906
+ -
907
+ Ours (β = 10, config A, RK45)
908
+ 110
909
+ 9.32
910
+ 3.37
911
+ -
912
+ Ours (β = 10, config A, Heun’s 2nd order method)
913
+ 9
914
+ 8.67
915
+ 8.66
916
+ -
917
+ Ours (β = 10, config A, Heun’s 2nd order method)
918
+ 5
919
+ 8.09
920
+ 18.74
921
+ -
922
+ Figure 10. Qualitative comparison between our method (β = 10) and baseline.
923
+
924
+ CIFAR-10
925
+ CelebAHQ 64
926
+ Y
927
+ Independent
928
+ NFEs = 5
929
+ Full sampling
930
+ NFEs = 5
931
+ Full samplingMinimizing Trajectory Curvature of ODE-based Generative Models
932
+ Benamou, J.-D. and Brenier, Y. A computational fluid me-
933
+ chanics solution to the monge-kantorovich mass transfer
934
+ problem. Numerische Mathematik, 84(3):375–393, 2000.
935
+ Brock, A., Donahue, J., and Simonyan, K. Large scale gan
936
+ training for high fidelity natural image synthesis. arXiv
937
+ preprint arXiv:1809.11096, 2018.
938
+ Chen, R. T., Rubanova, Y., Bettencourt, J., and Duvenaud,
939
+ D. K. Neural ordinary differential equations. Advances
940
+ in neural information processing systems, 31, 2018.
941
+ Child, R. Very deep vaes generalize autoregressive models
942
+ and can outperform them on images.
943
+ arXiv preprint
944
+ arXiv:2011.10650, 2020.
945
+ Daras, G., Delbracio, M., Talebi, H., Dimakis, A. G., and
946
+ Milanfar, P. Soft diffusion: Score matching for general
947
+ corruptions. arXiv preprint arXiv:2209.05442, 2022.
948
+ Dhariwal, P. and Nichol, A. Diffusion models beat gans
949
+ on image synthesis. Advances in Neural Information
950
+ Processing Systems, 34, 2021.
951
+ Finlay, C., Jacobsen, J.-H., Nurbekyan, L., and Oberman,
952
+ A. How to train your neural ode: the world of jacobian
953
+ and kinetic regularization. In International conference on
954
+ machine learning, pp. 3154–3164. PMLR, 2020.
955
+ Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B.,
956
+ Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y.
957
+ Generative adversarial nets. Advances in neural informa-
958
+ tion processing systems, 27, 2014.
959
+ Gu, J., Zhai, S., Zhang, Y., Bautista, M. A., and Susskind,
960
+ J. f-dm: A multi-stage diffusion model via progressive
961
+ signal transformation. arXiv preprint arXiv:2210.04955,
962
+ 2022.
963
+ Higgins, I., Matthey, L., Pal, A., Burgess, C., Glorot, X.,
964
+ Botvinick, M., Mohamed, S., and Lerchner, A. beta-
965
+ vae: Learning basic visual concepts with a constrained
966
+ variational framework. 2016.
967
+ Ho, J., Jain, A., and Abbeel, P. Denoising diffusion proba-
968
+ bilistic models. Advances in Neural Information Process-
969
+ ing Systems, 33:6840–6851, 2020.
970
+ Hoogeboom, E. and Salimans, T. Blurring diffusion models.
971
+ arXiv preprint arXiv:2209.05557, 2022.
972
+ Karras, T., Laine, S., and Aila, T. A style-based generator
973
+ architecture for generative adversarial networks. In Pro-
974
+ ceedings of the IEEE/CVF conference on computer vision
975
+ and pattern recognition, pp. 4401–4410, 2019.
976
+ Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J.,
977
+ and Aila, T. Training generative adversarial networks
978
+ with limited data. Advances in Neural Information Pro-
979
+ cessing Systems, 33:12104–12114, 2020a.
980
+ Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J.,
981
+ and Aila, T. Analyzing and improving the image quality
982
+ of stylegan. In Proceedings of the IEEE/CVF conference
983
+ on computer vision and pattern recognition, pp. 8110–
984
+ 8119, 2020b.
985
+ Karras, T., Aittala, M., Aila, T., and Laine, S. Elucidating
986
+ the design space of diffusion-based generative models.
987
+ arXiv preprint arXiv:2206.00364, 2022.
988
+ Kelly, J., Bettencourt, J., Johnson, M. J., and Duvenaud,
989
+ D. K. Learning differential equations that are easy to
990
+ solve. Advances in Neural Information Processing Sys-
991
+ tems, 33:4370–4380, 2020.
992
+ Kingma, D. P. and Welling, M. Auto-encoding variational
993
+ bayes. arXiv preprint arXiv:1312.6114, 2013.
994
+ Kingma, D. P., Salimans, T., Poole, B., and Ho, J. Varia-
995
+ tional diffusion models. arXiv preprint arXiv:2107.00630,
996
+ 2021.
997
+ Lee, S., Chung, H., Kim, J., and Ye, J. C. Progressive
998
+ deblurring of diffusion models for coarse-to-fine image
999
+ synthesis. arXiv preprint arXiv:2207.11192, 2022.
1000
+ Lipman, Y., Chen, R. T., Ben-Hamu, H., Nickel, M., and
1001
+ Le, M. Flow matching for generative modeling. arXiv
1002
+ preprint arXiv:2210.02747, 2022.
1003
+ Liu, X., Gong, C., and Liu, Q.
1004
+ Flow straight and fast:
1005
+ Learning to generate and transfer data with rectified flow.
1006
+ arXiv preprint arXiv:2209.03003, 2022.
1007
+ Lu, C., Zhou, Y., Bao, F., Chen, J., Li, C., and Zhu, J.
1008
+ Dpm-solver: A fast ode solver for diffusion probabilis-
1009
+ tic model sampling in around 10 steps. arXiv preprint
1010
+ arXiv:2206.00927, 2022.
1011
+ Luhman, E. and Luhman, T. Knowledge distillation in
1012
+ iterative generative models for improved sampling speed.
1013
+ arXiv preprint arXiv:2101.02388, 2021.
1014
+ Miyato, T., Kataoka, T., Koyama, M., and Yoshida, Y. Spec-
1015
+ tral normalization for generative adversarial networks.
1016
+ arXiv preprint arXiv:1802.05957, 2018.
1017
+ Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., and Chen,
1018
+ M. Hierarchical text-conditional image generation with
1019
+ clip latents. arXiv preprint arXiv:2204.06125, 2022.
1020
+ Rezende, D. and Mohamed, S. Variational inference with
1021
+ normalizing flows. In International conference on ma-
1022
+ chine learning, pp. 1530–1538. PMLR, 2015.
1023
+ Rissanen, S., Heinonen, M., and Solin, A.
1024
+ Generative
1025
+ modelling with inverse heat dissipation. arXiv preprint
1026
+ arXiv:2206.13397, 2022.
1027
+
1028
+ Minimizing Trajectory Curvature of ODE-based Generative Models
1029
+ Saharia, C., Chan, W., Saxena, S., Li, L., Whang, J., Denton,
1030
+ E., Ghasemipour, S. K. S., Ayan, B. K., Mahdavi, S. S.,
1031
+ Lopes, R. G., et al. Photorealistic text-to-image diffusion
1032
+ models with deep language understanding. arXiv preprint
1033
+ arXiv:2205.11487, 2022.
1034
+ Salimans, T. and Ho, J.
1035
+ Progressive distillation for
1036
+ fast sampling of diffusion models.
1037
+ arXiv preprint
1038
+ arXiv:2202.00512, 2022.
1039
+ Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., and
1040
+ Ganguli, S. Deep unsupervised learning using nonequi-
1041
+ librium thermodynamics. In International Conference on
1042
+ Machine Learning, pp. 2256–2265. PMLR, 2015.
1043
+ Song, Y. and Ermon, S. Generative modeling by estimating
1044
+ gradients of the data distribution. Advances in Neural
1045
+ Information Processing Systems, 32, 2019.
1046
+ Song, Y., Sohl-Dickstein, J., Kingma, D. P., Kumar, A., Er-
1047
+ mon, S., and Poole, B. Score-based generative modeling
1048
+ through stochastic differential equations. arXiv preprint
1049
+ arXiv:2011.13456, 2020.
1050
+ Vahdat, A. and Kautz, J. Nvae: A deep hierarchical vari-
1051
+ ational autoencoder. Advances in Neural Information
1052
+ Processing Systems, 33:19667–19679, 2020.
1053
+ Vahdat, A., Kreis, K., and Kautz, J. Score-based generative
1054
+ modeling in latent space. Advances in Neural Information
1055
+ Processing Systems, 34:11287–11302, 2021.
1056
+ Vincent, P. A connection between score matching and de-
1057
+ noising autoencoders. Neural computation, 23(7):1661–
1058
+ 1674, 2011.
1059
+ Virtanen, P., Gommers, R., Oliphant, T. E., Haberland, M.,
1060
+ Reddy, T., Cournapeau, D., Burovski, E., Peterson, P.,
1061
+ Weckesser, W., Bright, J., et al. Scipy 1.0: fundamental
1062
+ algorithms for scientific computing in python. Nature
1063
+ methods, 17(3):261–272, 2020.
1064
+ Xiao, Z., Kreis, K., and Vahdat, A. Tackling the generative
1065
+ learning trilemma with denoising diffusion gans. arXiv
1066
+ preprint arXiv:2112.07804, 2021.
1067
+ Zhang, Q. and Chen, Y. Diffusion normalizing flow. Ad-
1068
+ vances in Neural Information Processing Systems, 34:
1069
+ 16280–16291, 2021.
1070
+ Zhang, Q. and Chen, Y.
1071
+ Fast sampling of diffusion
1072
+ models with exponential integrator.
1073
+ arXiv preprint
1074
+ arXiv:2204.13902, 2022.
1075
+ Zhao, S., Liu, Z., Lin, J., Zhu, J.-Y., and Han, S. Dif-
1076
+ ferentiable augmentation for data-efficient gan training.
1077
+ Advances in Neural Information Processing Systems, 33:
1078
+ 7559–7570, 2020.
1079
+ Zheng, H., Nie, W., Vahdat, A., Azizzadenesheli, K., and
1080
+ Anandkumar, A.
1081
+ Fast sampling of diffusion models
1082
+ via operator learning. arXiv preprint arXiv:2211.13449,
1083
+ 2022.
1084
+
1085
+ Minimizing Trajectory Curvature of ODE-based Generative Models
1086
+ A. Flow Matching
1087
+ Diffusion models have been interpreted as the variational approaches (Sohl-Dickstein et al., 2015; Ho et al., 2020) or
1088
+ score-based models (Song & Ermon, 2019; Song et al., 2020), and their deterministic samplers are derived post hoc.
1089
+ However, stochasticity is not a key factor in the success of these models. The state-of-the-art performance can be achieved
1090
+ without stochasticity (Karras et al., 2022), and the incorporation of stochasticity makes sampling slow and complicates the
1091
+ theoretical understanding. Flow matching (Liu et al., 2022; Lipman et al., 2022) provides a useful viewpoint for explaining
1092
+ the recent iterative methods (Ho et al., 2020; Song & Ermon, 2019) from a pure ODE perspective. For the purpose of brevity,
1093
+ we only consider the variance-preserving diffusion models (Song et al., 2020). Readers are encouraged to refer to Liu et al.
1094
+ (2022) for a more comprehensive explanation.
1095
+ The variance-preserving diffusion models define the following noise distribution
1096
+ q(xt|x) = N(α(t)x, (1 − α(t)2)I),
1097
+ (12)
1098
+ where α(t) is set to exp(− 1
1099
+ 2
1100
+ � t
1101
+ 0(as + b) ds) with a = 19.9 and b = 0.1. Another way to see this is to consider the nonlinear
1102
+ interpolation between x and z sampled independently from q(x, z) = p(x)p(z):
1103
+ xt(x, z) = α(t)x +
1104
+
1105
+ 1 − α(t)2z
1106
+ (13)
1107
+ This forward flow represents the dynamics of particles that move from p(x) to p(z). Note that this cannot be used for
1108
+ generative modeling as it requires x to compute the velocity. To estimate the velocity without having x, a neural network
1109
+ xθ(xt, t) is trained by optimizing
1110
+ min
1111
+ θ Ex,z,t[λ(t)||x − xθ(xt(x, z), t)||2
1112
+ 2].
1113
+ (14)
1114
+ From this viewpoint, the choice of nonlinear interpolation is unnatural since it unnecessarily increases the curvature of both
1115
+ forward and reverse (generative) trajectories. For this reason, Liu et al. (2022) defines the following constant-velocity flow
1116
+ with an initial value x and endpoint z:
1117
+ dxt(x, z) = (z − x)dt
1118
+ (15)
1119
+ x0(x, z) = x
1120
+ (16)
1121
+ Instead of predicting x, they directly train a vector field vθ(xt, t) to match the velocity of forward flow by minimizing the
1122
+ flow matching loss
1123
+ LF M =
1124
+ � 1
1125
+ 0
1126
+ E[||(z − x) − vθ(xt, t)||2
1127
+ 2] dt,
1128
+ (17)
1129
+ where vθ(xt, t) = E[z − x|xt] in the optima. Samples are drawn by solving the following ODE backward:
1130
+ dxt = vθ(xt, t)dt
1131
+ (18)
1132
+ It is shown that Eq. (18) yields the same marginal distribution as the forward flow at every t (see Theorem 3.3 in Liu et al.
1133
+ (2022)).
1134
+ Given xt = (1 − t)x + tz and z − x = (xt − x)/t, we can further find the connection with diffusion models by
1135
+ reparameterizing vθ(xt, t) = (xt − xθ(xt, t))/t and writing Eq. (17) as
1136
+ � 1
1137
+ 0
1138
+ E[||(z − x) − vθ(xt, t)||2
1139
+ 2] dt =
1140
+ � 1
1141
+ 0
1142
+ E[||(xt − x)/t − vθ(xt, t)||2
1143
+ 2] dt
1144
+ (19)
1145
+ =
1146
+ � 1
1147
+ 0
1148
+ E[||(xt − x)/t − (xt − xθ(xt, t))/t||2
1149
+ 2] dt
1150
+ (20)
1151
+ =
1152
+ � 1
1153
+ 0
1154
+ E[ 1
1155
+ t2 ||x − xθ(xt, t))||2
1156
+ 2] dt.
1157
+ (21)
1158
+ This is equivalent to Eq. (1) with λ(t) = 1/t2, and Eq. (18) is equal to Eq. (4). To our knowledge, the effectiveness of
1159
+ Eq. (18) in reducing the truncation error is first examined in Karras et al. (2022) under the variance-exploding scheme and
1160
+ later in Liu et al. (2022) and Lipman et al. (2022) (OT conditional vector fields in their work) concurrently.
1161
+
1162
+ Minimizing Trajectory Curvature of ODE-based Generative Models
1163
+ B. Derivation of Loss Function
1164
+ B.1. Estimating DKL(qφ(z)||p(z))
1165
+ We factorize DKL(qφ(z)||p(z)) via following algebraic manipulation:
1166
+ DKL(qφ(z)||p(z)) = Ep(x)Eqφ(z|x)
1167
+
1168
+ log qφ(z)
1169
+ p(z)
1170
+
1171
+ (22)
1172
+ = Ep(x)Eqφ(z|x)
1173
+
1174
+ log qφ(z)
1175
+ qφ(z|x) + log qφ(z|x)
1176
+ p(z)
1177
+
1178
+ (23)
1179
+ = Ep(x)Eqφ(z|x)
1180
+
1181
+ log qφ(z)p(x)
1182
+ qφ(z|x)p(x)
1183
+
1184
+ + Ep(x)[DKL(qφ(z|x)||p(z))]
1185
+ (24)
1186
+ = −Iqφ(x,z)(x, z) + Ep(x)[DKL(qφ(z|x)||p(z))]
1187
+ (25)
1188
+ We can derive the variational lower bound of the mutual information as
1189
+ Iqφ(x,z)(x, z) = H(x) − H(x|z)
1190
+ (26)
1191
+ = H(x) + Eqφ(x,z)[log qφ(x|z)]
1192
+ (27)
1193
+ = H(x) + Eqφ(x,z)
1194
+
1195
+ log pψ(x|z) + log qφ(x|z)
1196
+ pψ(x|z)
1197
+
1198
+ (28)
1199
+ = H(x) + Eqφ(x,z)[log pψ(x|z)] + Eqφ(z)[DKL(qφ(x|z)||pψ(x|z))]
1200
+ (29)
1201
+ ≥ H(x) + Eqφ(x,z)[log pψ(x|z)],
1202
+ (30)
1203
+ where the bound is tight when the variational distribution pψ(x|z) is equal to qφ(x|z). For that, we need to optimize
1204
+ minψ Eqφ(z)[− log pψ(x|z)], which becomes the reconstruction loss Ep(x)Eqφ(z|x)
1205
+
1206
+ ||xψ(z)−x||2
1207
+ 2
1208
+ 2σ2
1209
+
1210
+ if we set pψ(x|z) =
1211
+ N(x; xψ(z), σ2I). Consequently, we arrive at
1212
+ DKL(qφ(z)||p(z)) ≤ inf
1213
+ ψ Ep(x)Eqφ(z|x)
1214
+ �||xψ(z) − x||2
1215
+ 2
1216
+ 2σ2
1217
+
1218
+ + Ep(x)[DKL(qφ(z|x)||p(z))] + const.
1219
+ (31)
1220
+ B.2. Our loss function
1221
+ We further set xψ(z) = xθ(z, 1) for parameter sharing. Then, our loss function is
1222
+ min
1223
+ θ,φ I(q) + βDKL(qφ(z)||p(z))
1224
+ (32)
1225
+ ≤ Et,x,z∼qφ(x,z)
1226
+ � 1
1227
+ t2 ||x − xθ(xt(x, z), t)||2
1228
+ 2 + β ||xθ(z, 1) − x||2
1229
+ 2
1230
+ 2σ2
1231
+ + βDKL(qφ(z|x)||p(z))
1232
+
1233
+ + const
1234
+ (33)
1235
+ = Et,x,z∼qφ(x,z)
1236
+ �¯λ(t)||x − xθ(xt(x, z), t)||2
1237
+ 2 + βDKL(qφ(z|x)||p(z))
1238
+
1239
+ + const,
1240
+ (34)
1241
+ where ¯λ(t) is 1/t2 if t ̸= 1 and βδ(0) in t = 1 with Dirac delta function δ(·). Empirically, we observe that setting ¯λ(t) to
1242
+ 1/t2 for every t leads to better performance.
1243
+ C. Implementation Details
1244
+ Table. 4 shows the training and architecture configuration we use in our experiments. In our experiment, we directly
1245
+ parameterize the vector field vθ(xt, t) following Liu et al. (2022). For MNIST and CIFAR-10 datasets, we employ DDPM++
1246
+ architecture (Song et al., 2020) in the codebase of Karras et al. (2022)1. For the CelebAHQ dataset, we use the U-Net
1247
+ architecture of (Dhariwal & Nichol, 2021)2. We evaluate FID using the code of (Karras et al., 2022). We fix the random
1248
+ seed to 0 throughout all experiments. We linearly increase the learning rate as in previous studies (Karras et al., 2022; Song
1249
+ 1https://github.com/NVlabs/edm
1250
+ 2https://github.com/openai/guided-diffusion
1251
+
1252
+ Minimizing Trajectory Curvature of ODE-based Generative Models
1253
+ Table 4. Architecture and training configurations. 1We use 200K and 300K iterations for β = 10 and independent coupling, respectively.
1254
+ 2We use 500K and 600K iterations for β = 20 and independent coupling, respectively.
1255
+ CIFAR-10 (A)
1256
+ CIFAR-10 (B)
1257
+ MNIST
1258
+ Iterations
1259
+ varies1
1260
+ varies2
1261
+ 60K
1262
+ Batch size
1263
+ 128
1264
+ 128
1265
+ 256
1266
+ Learning rate
1267
+ 3e − 4
1268
+ 2e − 4
1269
+ 3e − 4
1270
+ LR warm-up steps
1271
+ 78125
1272
+ 5000
1273
+ 8000
1274
+ EMA decay rate
1275
+ 0.9999
1276
+ 0.9999
1277
+ 0.9999
1278
+ EMA start steps
1279
+ 300
1280
+ 1
1281
+ 300
1282
+ Dropout probability
1283
+ 0.13
1284
+ 0.13
1285
+ 0.13
1286
+ Channel multiplier
1287
+ 128
1288
+ 128
1289
+ 32
1290
+ Channels per resolution
1291
+ [2, 2, 2]
1292
+ [2, 2, 2]
1293
+ [2, 2, 2]
1294
+ Xflip augmentation
1295
+ X
1296
+ O
1297
+ X
1298
+ # of params (generator)
1299
+ 55.73M
1300
+ 55.73M
1301
+ 2.15M
1302
+ # of params (encoder)
1303
+ 2.2M
1304
+ 2.2M
1305
+ 2.2M
1306
+ # of ResBlocks
1307
+ 4
1308
+ 4
1309
+ 2
1310
+ t range
1311
+ [0, 1]
1312
+ [1e − 5, 1]
1313
+ [0, 1]
1314
+ et al., 2020). We use Adam optimizer with β1 = 0.9, β2 = 0.999, and eps = 1e − 8 for MNIST and CIFAR-10 datasets.
1315
+ For the CelebAHQ dataset, we use AdamW with β1 = 0.9, β2 = 0.9999, and weight decay = 0.1.
1316
+ In small setting for encoder architecture, we use the MNIST generator architecture in Tab. 4, which is more than 20 times
1317
+ smaller than CIFAR-10 models. For the distillation experiment, we use 500K pairs sampled from teacher ODEs. We find
1318
+ that student models overfit if the number of pairs is less than 500K.
1319
+ For unconditional CIFAR-10 generation, we use two solvers – RK45 and Heun’s 2nd order method. We set both atol and
1320
+ rtol to 1e − 5 for RK45 as in previous work (Song et al., 2020; Liu et al., 2022). We experiment with two configurations,
1321
+ config A and config B, and find that config A converges faster than config B at the expense of performance. Overall, our
1322
+ method converges faster than the independent coupling baseline.
1323
+ D. Additional Results
1324
+ We further provide additional synthesis results of our method in Figs. 11 and 12.
1325
+
1326
+ Minimizing Trajectory Curvature of ODE-based Generative Models
1327
+ β = 10
1328
+ β = 20
1329
+ independent
1330
+ NFEs = 5
1331
+ NFEs = 10
1332
+ NFEs = 128
1333
+ Figure 11. Uncurated MNIST samples.
1334
+
1335
+ Minimizing Trajectory Curvature of ODE-based Generative Models
1336
+ β = 10
1337
+ β = 20
1338
+ independent
1339
+ NFEs = 5
1340
+ NFEs = 9
1341
+ full sampling
1342
+ Figure 12. Uncurated CIFAR-10 samples.
1343
+
ItFLT4oBgHgl3EQfJS9D/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
SNE0T4oBgHgl3EQfUgB0/content/tmp_files/2301.02251v1.pdf.txt ADDED
@@ -0,0 +1,1510 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Astronomy & Astrophysics manuscript no. paper3
2
+ ©ESO 2023
3
+ January 9, 2023
4
+ On the degree of stochastic asymmetry in the tidal tails of star
5
+ clusters
6
+ J. Pflamm-Altenburg1, P. Kroupa1, 2, I. Thies1, Tereza Jerabkova3, Giacomo Beccari3, Timo Prusti4, and Henri M. J.
7
+ Boffin3
8
+ 1 Helmholtz-Institut für Strahlen- und Kernphysik (HISKP), Universität Bonn, Nussallee 14–16, D-53115 Bonn, Germany
9
+ e-mail: jpa@hiskp.uni-bonn.de
10
+ 2 Charles University in Prague, Faculty of Mathematics and Physics, Astronomical Institute, V Holešoviˇckách 2, CZ-180 00 Praha
11
+ 8, Czech Republic
12
+ 3 European Southern Observatory, Karl-Schwarzschild-Strasse 2, D-85748 Garching bei München, Germany
13
+ 4 European Space Research and Technology Centre (ESA ESTEC), Keplerlaan 1, 2201 AZ Nordwijk, Netherlands
14
+ Received . . . ; accepted ...
15
+ ABSTRACT
16
+ Context. Tidal tails of star clusters are commonly understood to be populated symmetrically. Recently, the analysis of Gaia data
17
+ revealed large asymmetries between the leading and trailing tidal tail arms of the four open star clusters Hyades, Praesepe, Coma
18
+ Berenices and NGC 752.
19
+ Aims. As the evaporation of stars from star clusters into the tidal tails is a stochastic process, the degree of stochastic asymmetry is
20
+ quantified in this work.
21
+ Methods. For each star cluster 1000 configurations of test particles are integrated in the combined potential of a Plummer sphere and
22
+ the Galactic tidal field over the life time of the particular star cluster. For each of the four star clusters the distribution function of the
23
+ stochastic asymmetry is determined and compared with the observed asymmetry.
24
+ Results. The probabilities for a stochastic origin of the observed asymmetry of the four star clusters are: Praesepe ≈1.7 σ, Coma
25
+ Berenices ≈2.4 σ, Hyades ≈6.7 σ, NGC 752 ≈1.6 σ.
26
+ Conclusions. In the case of Praesepe, Coma Berenices and NGC 752 the observed asymmetry can be interpreted as a stochastic
27
+ evaporation event. However, for the formation of the asymmetric tidal tails of the Hyades additional dynamical processes beyond a
28
+ pure statistical evaporation effect are required.
29
+ Key words. open clusters and associations: general - open clusters and associations: individual: Hyades, Praesepe, Coma Berenices,
30
+ NGC 752 - stars: kinematics and dynamics
31
+ 1. Introduction
32
+ In general, stars form spatially confined in the densest regions
33
+ of molecular clouds (Lada & Lada 2003; Allen et al. 2007). Af-
34
+ ter their formation different processes lead to the loss of stellar
35
+ members:
36
+ Early gas expulsion: The gas in the central part of the newly
37
+ formed star cluster has not been completely converted into stars.
38
+ Once the most massive stars have ignited the ionising radiation
39
+ heats up the remaining gas leading to its removal from the star
40
+ cluster. The initially virialised mixture of stars and gas turns into
41
+ a dynamically hot and expanding star cluster. After loosing a
42
+ substantial amount of members the remaining star cluster reviri-
43
+ alises now having a larger diameter than at its birth. This process
44
+ only takes a few crossing times which are typically of the order
45
+ of a few Myr for open star clusters (e.g. Baumgardt & Kroupa
46
+ 2007).
47
+ Stellar ejections: In the Galactic field OB-stars are observed
48
+ moving with much higher velocities than the velocity dispersion
49
+ of the young stellar component in the Galactic field. They are
50
+ assumed to be ejected form young star clusters either by the dis-
51
+ integration of massive binaries where one component explodes
52
+ in a supernova (supernova ejection) leaving the second compo-
53
+ nent with its high orbital velocity, or by close dynamical in-
54
+ teractions of multiple stellar systems (e.g. in binary-binary en-
55
+ counters) with energy transfer between the components. By or-
56
+ bital shrinkage of one binary potential energy is transferred to
57
+ the other binary leading to its disintegration and leaving the two
58
+ components with high kinetic energy behind (e.g. Poveda et al.
59
+ 1967; Pflamm-Altenburg & Kroupa 2006; Oh & Kroupa 2016).
60
+ In both cases, the velocity of the star is higher than the escape
61
+ velocity of the star cluster allowing the particular star to escape
62
+ from the star cluster into the Galactic field.
63
+ Stellar evolution: Due to stellar evolution, the total mass of
64
+ the star cluster decreases continuously, reducing the binding en-
65
+ ergy and the tidal radius of the star cluster. The negative binding
66
+ energy of stars which are only slightly bound may turn to a pos-
67
+ itive value.
68
+ Evaporation and tidal loss of stars: Gravitationally bound
69
+ stellar systems embedded in an external gravitational field lose
70
+ members due to the tidal forces. In the frame of a star cluster
71
+ its potential well is lowered by the tidal forces at two opposite
72
+ points known as Lagrange points. The velocities of stars in the
73
+ Maxwell tail of the velocity distribution are sufficiently high to
74
+ escape through these two Lagrange points. Each of both streams
75
+ of escaping stars forms an elongated structure pointing in oppo-
76
+ site directions, these being the tidal tails. If the size of the star
77
+ cluster is small enough compared to the spatial change of the
78
+ Article number, page 1 of 8
79
+ arXiv:2301.02251v1 [astro-ph.GA] 5 Jan 2023
80
+
81
+ A&A proofs: manuscript no. paper3
82
+ external force field then both depressions of the star cluster po-
83
+ tential at the Lagrange points are equal. This is typically the case
84
+ for star clusters in the solar vicinity orbiting around the Galactic
85
+ centre. Thus, both streams of stars through the Lagrange points
86
+ are equal and the tidal pattern is expected to be symmetric with
87
+ respect to the star cluster (e.g. Küpper et al. 2010). Therefore,
88
+ both tidal arms should be equal.
89
+ Recently, the detailed analysis of Gaia data revealed asym-
90
+ metries in the tidal tails of the four open star clusters Hyades
91
+ (Jerabkova et al. 2021), Preasepe, Coma Berenices (Jerabkova
92
+ et al. in prep.) and NGC 752 (Boffin et al. 2022), challenging the
93
+ common assumption of symmetric tidal tails. However, as it can
94
+ not be predicted through which Lagrange point a star will es-
95
+ cape from the star cluster into one of the tidal arms, evaporation
96
+ can be interpreted as a stochastic process. Thus, different num-
97
+ bers of members in both tidal tails of an individual star cluster
98
+ are expected. It is the aim of this work to quantify the degree of
99
+ asymmetry in tidal tails due to the stochastic population of tidal
100
+ tails and to compare with the observations.
101
+ In Sect. 2 we describe how (a)symmetry in tidal tails of star
102
+ clusters is quantified throughout this work. The data of the ob-
103
+ served star clusters and the derived asymmetries are presented in
104
+ Sect. 3. The evaporation process of the numerical Monte Carlo
105
+ model is outlined in Sect. 4 including the determination of statis-
106
+ tical asymmetries due to stochastic evaporation. Section 5 com-
107
+ pares the numerical asymmetries with a theoretical model which
108
+ interprets the evaporation of stars through both Lagrange points
109
+ into the tidal tails as a Bernoulli experiment.
110
+ 2. Measuring the (a)symmetry of tidal tails
111
+ In order to explore the degree of (a)symmetry in the tidal tails
112
+ the distance distribution of tail members is quantified. Küpper
113
+ et al. (2010) performed N-body simulations and calculated the
114
+ stellar number density as a function of the distance to the star
115
+ cluster along the star cluster orbit. In their simulations 21 mod-
116
+ els covering a range of different initial conditions such as the
117
+ galactocentic orbital radius or the inclination of the orbit were
118
+ computed with initially 65536 particles using the Nnody4 code
119
+ (Aarseth 1999, 2003) which performs a full force summation
120
+ over all particles. This high number of particles leads to a smooth
121
+ population of the tidal arms. Thus, only small statistical fluctua-
122
+ tions are expected. In order to explore the statistical fluctuations
123
+ of the member number of tidal tails of open star clusters with
124
+ only a few hundred stars in the tidal tails multiple simulations of
125
+ star clusters resembling the observed ones are required.
126
+ In order to avoid effects by uncertainties of the Galactic tidal
127
+ field, here the actual velocity vector of the star cluster is used as
128
+ the reference (Fig.1) and not the distance to the cluster along the
129
+ orbit of the star cluster. The membership and distance of each
130
+ star is determined as follows: For each star its distance is given
131
+ by its position vector, ri = |ri|, in the star cluster reference frame.
132
+ If its distance is larger than the tidal radius, rt, it is a tidal tail star.
133
+ The orientation angle, ϕi, is the angle enclosed by the position
134
+ vector, ri, of the star and the actual velocity vector of the star
135
+ cluster, vcl. A star is considered to be a member of the leading
136
+ arm if 0 ≤ ϕi ≤ 90◦, and to be a member of the trailing arm if
137
+ ϕi > 90◦. Here, the membership of a star to belong to either the
138
+ leading or the trailing arm is a sharp criterium without any prob-
139
+ ability. For those stars located very close to the border separating
140
+ the leading from the trailing arm the errors of the observed data
141
+ of the positions of the stars are not considered.
142
+ The normalised asymmetry, ϵ, is given by the difference of
143
+ the number of members in the leading tail, nl, and the number
144
+ ϕi
145
+ vcl
146
+ ri
147
+ rt
148
+ Fig. 1. Sketch of the method to quantify the (a)symmetry in tidal tails.
149
+ The angle of the orientation, ϕi, of each star is the angle enclosed by the
150
+ position vector, ri, of the particular star with respect to the centre of the
151
+ star cluster and the actual velocity vector, vcl, of the star cluster.
152
+ of members in the trailing tail, nt, divided by the total number of
153
+ tidal tail stars, n,
154
+ ϵ = nl − nt
155
+ nl + nt
156
+ = nl − nt
157
+ n
158
+ .
159
+ (1)
160
+ 3. Observed open star clusters
161
+ In this section the structure of the tidal tails of the Hyades,
162
+ Praesepe, Coma Berenices and NGC 752 are analysed using the
163
+ method described in Sect. 2. The present-day stellar distributions
164
+ have been obtained by the Jerabkova et al. (2021) compact con-
165
+ vergent point (CCP) method which allows the tidal tails to be
166
+ mapped to their tips.
167
+ Table 1 summarises the observed values of the star clusters
168
+ which are of interest for this work (see Kroupa et al. 2022 for
169
+ details).
170
+ The results of the analysis of the observational data are
171
+ shown in Figs. 2–8. The data for the Hyades are published in
172
+ Jerabkova et al. (2021) and the detailed analysis of its tidal tails
173
+ can be seen in Fig. 2. The upper left panel shows the spatial dis-
174
+ tribution of all stars associated with the Hyades. These are all
175
+ stars, which are identified to be cluster members, that is, have a
176
+ distance to the cluster centre less than the tidal radius (Table 1),
177
+ and those stars, which are identified to be tidal tail members, that
178
+ is, have a distance to the cluster centre larger than the tidal ra-
179
+ dius. Cluster members are marked by black dots, members of the
180
+ leading tidal arm by green dots, members of the trailing tidal arm
181
+ by red dots. The positive x-axis points towards the Galactic cen-
182
+ tre, the positive y-axis towards the Galactic rotation. The black
183
+ arrow indicates the actual direction of motion of the Hyades clus-
184
+ ter with respect to the Galactic rest frame. It can be clearly seen
185
+ that the leading arm is more populated than the trailing arm. Fur-
186
+ thermore, the leading tidal arm has also a higher surface density
187
+ of tidal tail members as can be seen in Fig. 3.
188
+ In the upper right panel of Fig. 2 the orientation angle and
189
+ the distance of all stars are shown using the method described
190
+ in Sect. 2. Stars with an orientation angle smaller than 90◦ be-
191
+ long formally to the leading arm, stars with an angle larger than
192
+ 90◦ to the trailing arm. Within the tidal radius the cluster is well
193
+ represented by a Plummer model (Röser et al. 2011). Thus, in
194
+ Article number, page 2 of 8
195
+
196
+ J. Pflamm-Altenburg et al.: On the degree of stochastic asymmetry in the tidal tails of star clusters
197
+ star cluster
198
+ Hyades
199
+ Coma
200
+ Berenices Praesepe
201
+ NGC 752
202
+ d / pc
203
+ 47.5
204
+ 85.9
205
+ 186.2
206
+ 438.4
207
+ M / M⊙
208
+ 275
209
+ 112
210
+ 311
211
+ 379
212
+ bPl / pc
213
+ 3.1
214
+ 2.7
215
+ 3.7
216
+ 4.1
217
+ rt / pc
218
+ 9.0
219
+ 6.9
220
+ 10.8
221
+ 9.4 (1.2285◦)
222
+ t / Myr
223
+ 680
224
+ 750
225
+ 770
226
+ 1750
227
+ n
228
+ 541
229
+ 640
230
+ 833
231
+ 298
232
+ nl
233
+ 351
234
+ 348
235
+ 384
236
+ 163
237
+ nt
238
+ 190
239
+ 292
240
+ 449
241
+ 135
242
+ ϵ
243
+ 0.298
244
+ 0.088
245
+ -0.078
246
+ 0.094
247
+ nl,50−200
248
+ 162
249
+ 133
250
+ 87
251
+ 56
252
+ nt,50−200
253
+ 64
254
+ 111
255
+ 140
256
+ 43
257
+ x / pc
258
+ -8344.61
259
+ -8305.78
260
+ -8439.78
261
+ -8294.05
262
+ y / pc
263
+ -0.23
264
+ -5.84682
265
+ -69.384
266
+ 275.07
267
+ z / pc
268
+ 10.69
269
+ 112.516
270
+ 128.552
271
+ -158.408
272
+ vx / km s−1
273
+ -32.01
274
+ 8.69065
275
+ -33.3617
276
+ -8.19
277
+ vy / km s−1
278
+ 212.37
279
+ 226.515
280
+ 210.711
281
+ 216.262
282
+ vz / km s−1
283
+ 6.44
284
+ 6.16155
285
+ -1.83814
286
+ -12.81
287
+ Table 1. Data of the star clusters. (upper section:) d: distance Sun–star
288
+ cluster, M: current stellar mass within tidal radius rt, bPl: Plummer pa-
289
+ rameter obtained from the observed half mass radius, rt: observed tidal
290
+ radius, t: average of published ages of the star clusters, n: total number
291
+ of tidal tail members, nl: number of members in the leading tidal tail, nt:
292
+ number of members in the trailing tidal tail, nl,50−200: number of mem-
293
+ bers in the leading tidal tail at a distance of 50–200 pc from the cluster
294
+ centre, nt,50−200: number of members in the trailing tidal tail at a distance
295
+ of 50–200 pc from the cluster centre. (lower section:) current position
296
+ and velocity of the star clusters in the Galactic inertial rest frame used
297
+ for the Monte Carlo simulations for an assumed Solar distance of 8.3
298
+ kpc to the Galactic centre, and 27 pc above the Galactic plane and a
299
+ local rotational velocity of 225 km/s as in Jerabkova et al. (2021). The
300
+ velocity components of the Sun in the Galactic rest frame are 11.1 km/s
301
+ towards to the Galactic centre, 232.24 km/s into the direction of Galactic
302
+ rotation and 7.25 km/s in positive vertical direction. Thus, the peculiar
303
+ velocity of the Sun is [11.1, 7.24, 7.25] km/s. See Kroupa et al. (2022)
304
+ for details.
305
+ the ϕ-r-diagram the region between 0 and 180◦ is fully popu-
306
+ lated. The region with distances between the tidal radius of 9 pc
307
+ and ≈ 50 pc is still uniformly populated but much sparser than
308
+ within the bound cluster. This corresponds to a relatively spher-
309
+ ically shaped region around the Hyades cluster, which is some-
310
+ times called a stellar corona of a star cluster. At distances larger
311
+ than ≈ 50 pc two distinct, sharply confined tidal arms are visible.
312
+ The lower left panel of Fig. 2 shows the cumulative number
313
+ of stars in both tidal arms separately as a function of the dis-
314
+ tance to the cluster centre. Up to ≈20-30 pc both distributions
315
+ are nearly equal. Beyond ≈30 pc the distributions start to deviate
316
+ from each other. Up to ≈100 pc the cumulative distributions in-
317
+ crease nearly constantly. The total number of stars in the leading
318
+ arm increases faster than the number of stars in the trailing arm.
319
+ At ≈100 pc both distributions flatten and have again a constant
320
+ but shallower slope.
321
+ The lower right panel in Fig. 2 shows the cumulative nor-
322
+ malised asymmetry, ϵ(≤ r), calculated by Eq. (1).
323
+ Figure 4 shows the same data analysis for the Praesepe star
324
+ cluster (data are taken from Jerabkova et al. in prep.). It can be
325
+ seen in the lower left panel that the radial cumulative distance
326
+ distribution at small distances to the star cluster centre shows the
327
+ same functional behaviour as in the case of the Hyades. Within
328
+ the tidal radius the cumulative distributions rise rapidly and be-
329
+ come abruptly shallower in slope at the tidal radius. However,
330
+ the cumulative distributions of both arms are identical up to a
331
+ -600
332
+ -400
333
+ -200
334
+ 0
335
+ 200
336
+ 400
337
+ 600
338
+ -600
339
+ -400
340
+ -200
341
+ 0
342
+ 200
343
+ 400
344
+ 600
345
+ xMW [pc]
346
+ yMW [pc]
347
+ 0
348
+ 50
349
+ 100
350
+ 150
351
+ 0
352
+ 100
353
+ 200
354
+ 300
355
+ 400
356
+ 500
357
+ 600
358
+ leading
359
+ trailing
360
+ ϕ [°]
361
+ r [pc]
362
+ 0
363
+ 50
364
+ 100
365
+ 150
366
+ 200
367
+ 250
368
+ 300
369
+ 350
370
+ 400
371
+ 0
372
+ 100
373
+ 200
374
+ 300
375
+ 400
376
+ 500
377
+ 600
378
+ leading
379
+ trailing
380
+ cum. N
381
+ r [pc]
382
+ -0.4
383
+ -0.2
384
+ 0
385
+ 0.2
386
+ 0.4
387
+ 0
388
+ 100
389
+ 200
390
+ 300
391
+ 400
392
+ 500
393
+ 600
394
+ ǫ(≤r)
395
+ r [pc]
396
+ Fig. 2. Hyades: (upper left:) Shown is the spatial distribution of the
397
+ members of the Hyades (black), the leading tidal arm (green) and the
398
+ trailing tidal arm (red) from Jerabkova et al. (2021). The coordinates
399
+ xMW and yMW refer to a non-rotating rest frame of the Milky Way with
400
+ a shifted origin where the position of the Sun lies at (0,0). The positive
401
+ x-axis points towards the Galactic centre, the positive y-axis towards
402
+ Galactic rotation. The arrow indicates the motion of the star cluster
403
+ centre in the Galactic rest frame. (upper right:) Shown are the posi-
404
+ tions of cluster and tidal tidal members in polar coordinates calculated
405
+ as described in Sect. 2. (lower left:) Radial cumulative distribution of
406
+ the number of stars in the leading and trailing tidal arm of the Hyades
407
+ (lower right:) Radial cumulative evolution of the normalised asymme-
408
+ try (Eq. 1) considering tidal tail stars with a distance to the cluster centre
409
+ smaller or equal to r.
410
+ distance of ≈50–70 pc. Beyond the stellar corona the distribu-
411
+ tions diverge continuously from each other, whereas the trailing
412
+ arm contains more members than the leading arm, contrary to
413
+ the Hyades. The surface density can be seen in Fig. 5.
414
+ Figure 6 shows the analysis of the Coma Berenices star clus-
415
+ ter (data are taken from Jerabkova et al. in prep.). The radial
416
+ cumulative distributions have the same qualitative trend as those
417
+ of the Hyades. Within the star cluster and the stellar corona both
418
+ distribution functions are identical. Again, beyond a distance of
419
+ ≈50–70 pc to the cluster centre the distribution diverge continu-
420
+ ously from each other. In this case the leading arm contains more
421
+ members. The surface density can be seen in Fig. 7.
422
+ Figure 8 shows the analysis of the NGC 752 star cluster (data
423
+ are taken from Boffin et al. 2022). Due to the increasing errors
424
+ of the parallaxes with increasing distance of the star cluster the
425
+ analysis of the tidal tails in three dimensions is effected by a dis-
426
+ tortion of the sample in the x-y-plane (Boffin et al. 2022). There-
427
+ fore, the stellar sample is analysed in projection on the sky.
428
+ 4. Monte Carlo simulations
429
+ In order to compare the observed asymmetries of tidal tails with
430
+ the degree of asymmetry due to the stochastic evaporation of
431
+ stars from star clusters embedded in a Galactic tidal field, a large
432
+ number of test particle integrations are performed in the Galactic
433
+ gravitational potential.
434
+ 4.1. Numerical model
435
+ In the simulations a star cluster is set up as a Plummer phase-
436
+ space distribution (Plummer 1911; Aarseth et al. 1974) with ini-
437
+ tial parameters bPl being the Plummer radius and the total mass,
438
+ Article number, page 3 of 8
439
+
440
+ A&A proofs: manuscript no. paper3
441
+ -600
442
+ -400
443
+ -200
444
+ 0
445
+ 200
446
+ 400
447
+ 600
448
+ -600
449
+ -400
450
+ -200
451
+ 0
452
+ 200
453
+ 400
454
+ 600
455
+ xMW [pc]
456
+ yMW [pc]
457
+ -4
458
+ -3
459
+ -2
460
+ -1
461
+ 0
462
+ 1
463
+ 2
464
+ log10(ρ [pc-2] )
465
+ Fig. 3. Surface number density of stars of the Hyades (cluster plus both
466
+ tidal arms). Each dot represents one star. The local number density is
467
+ calculated with the 6th-nearest neighbour method (Casertano & Hut
468
+ 1985) and colour-coded. The black arrow indicates the velocity vec-
469
+ tor of the Hyades star cluster in the Galactic rest frame. The centre of
470
+ the star cluster is located at the intersection of the two thin dashed lines.
471
+ -800
472
+ -600
473
+ -400
474
+ -200
475
+ 0
476
+ 200
477
+ 400
478
+ 600
479
+ 800
480
+ -800-600-400-200 0 200 400 600 800
481
+ xMW [pc]
482
+ yMW [pc]
483
+ 0
484
+ 50
485
+ 100
486
+ 150
487
+ 0 100 200 300 400 500 600 700 800 900
488
+ leading
489
+ trailing
490
+ ϕ [°]
491
+ r [pc]
492
+ 0
493
+ 100
494
+ 200
495
+ 300
496
+ 400
497
+ 500
498
+ 0
499
+ 100
500
+ 200
501
+ 300
502
+ 400
503
+ 500
504
+ 600
505
+ trailing
506
+ leading
507
+ cum. N
508
+ r [pc]
509
+ -0.4
510
+ -0.2
511
+ 0
512
+ 0.2
513
+ 0.4
514
+ 0
515
+ 100
516
+ 200
517
+ 300
518
+ 400
519
+ 500
520
+ 600
521
+ ǫ(≤r)
522
+ r [pc]
523
+ Fig. 4. Praesepe from Jerabkova et al. (in prep.): Similar to Fig. 2.
524
+ MPl. The centre of mass of the model, rPl, moves in a Galactic
525
+ potential as given in Allen & Santillan (1991). The orbit of each
526
+ stellar test particle is integrated in both gravitational fields, the
527
+ Plummer potential as the gravitational proxy of the star cluster
528
+ and the full Galactic gravitational potential. Thus, the equations
529
+ of motion of the star i and of the cluster model are
530
+ ai = −∇ΦPl − ∇ΦMW ,
531
+ (2)
532
+ aPl = −∇ΦMW .
533
+ (3)
534
+ The test particles are distributed in the model cluster potential
535
+ according to the Plummer phase-space distribution function and
536
+ are integrated in time in the static Galactic potential and a static
537
+ Plummer potential, whose origin is integrated as a test particle
538
+ in the Galactic potential. In a self-gravitating system those par-
539
+ ticles evaporate from the cluster which gained sufficient energy
540
+ by energy redistribution between the gravitationally interacting
541
+ particles to exceed the binding energy to the cluster. In the model
542
+ cluster all particles are treated as test particles and are integrated
543
+ -800
544
+ -600
545
+ -400
546
+ -200
547
+ 0
548
+ 200
549
+ 400
550
+ 600
551
+ 800
552
+ -800
553
+ -600
554
+ -400
555
+ -200
556
+ 0
557
+ 200
558
+ 400
559
+ 600
560
+ 800
561
+ xMW [pc]
562
+ yMW [pc]
563
+ -4
564
+ -3
565
+ -2
566
+ -1
567
+ 0
568
+ 1
569
+ 2
570
+ log10(ρ [pc-2] )
571
+ Fig. 5. Praesepe: Similar to Fig. 3.
572
+ -600
573
+ -400
574
+ -200
575
+ 0
576
+ 200
577
+ 400
578
+ 600
579
+ -600
580
+ -400
581
+ -200
582
+ 0
583
+ 200
584
+ 400
585
+ 600
586
+ xMW [pc]
587
+ yMW [pc]
588
+ 0
589
+ 50
590
+ 100
591
+ 150
592
+ 0
593
+ 100
594
+ 200
595
+ 300
596
+ 400
597
+ 500
598
+ 600
599
+ leading
600
+ trailing
601
+ ϕ [°]
602
+ r [pc]
603
+ 0
604
+ 50
605
+ 100
606
+ 150
607
+ 200
608
+ 250
609
+ 300
610
+ 350
611
+ 400
612
+ 0
613
+ 100
614
+ 200
615
+ 300
616
+ 400
617
+ 500
618
+ 600
619
+ leading
620
+ trailing
621
+ cum. N
622
+ r [pc]
623
+ -0.4
624
+ -0.2
625
+ 0
626
+ 0.2
627
+ 0.4
628
+ 0
629
+ 100
630
+ 200
631
+ 300
632
+ 400
633
+ 500
634
+ 600
635
+ ǫ(≤r)
636
+ r [pc]
637
+ Fig. 6. Coma Berenices from Jerabkova et al. (in prep.): Similar to
638
+ Fig. 2.
639
+ -600
640
+ -400
641
+ -200
642
+ 0
643
+ 200
644
+ 400
645
+ 600
646
+ -600
647
+ -400
648
+ -200
649
+ 0
650
+ 200
651
+ 400
652
+ 600
653
+ xMW [pc]
654
+ yMW [pc]
655
+ -4
656
+ -3
657
+ -2
658
+ -1
659
+ 0
660
+ 1
661
+ 2
662
+ log10(ρ [pc-2] )
663
+ Fig. 7. Coma Berenices: Similar to Fig. 3.
664
+ in a static potential without gravitational interaction between the
665
+ particles. As energy redistribution does not occur in this model
666
+ the evaporation process is simulated as follows: If the Plummer
667
+ sphere were set up in isolation all particles had negative energy
668
+ and were bound to the cluster. As the model cluster is positioned
669
+ Article number, page 4 of 8
670
+
671
+ J. Pflamm-Altenburg et al.: On the degree of stochastic asymmetry in the tidal tails of star clusters
672
+ 10
673
+ 15
674
+ 20
675
+ 25
676
+ 30
677
+ 35
678
+ 40
679
+ 45
680
+ 50
681
+ 55
682
+ 0
683
+ 10
684
+ 20
685
+ 30
686
+ 40
687
+ 50
688
+ 60
689
+ DE [°]
690
+ RA [°]
691
+ 0
692
+ 50
693
+ 100
694
+ 150
695
+ 0
696
+ 5
697
+ 10
698
+ 15
699
+ 20
700
+ leading
701
+ trailing
702
+ ϕ [°]
703
+ r [°]
704
+ 0
705
+ 50
706
+ 100
707
+ 150
708
+ 200
709
+ 0
710
+ 5
711
+ 10
712
+ 15
713
+ 20
714
+ leading
715
+ trailing
716
+ cum. N
717
+ r [°]
718
+ -0.4
719
+ -0.2
720
+ 0
721
+ 0.2
722
+ 0.4
723
+ 0
724
+ 5
725
+ 10
726
+ 15
727
+ 20
728
+ ǫ(≤r)
729
+ r [°]
730
+ Fig. 8. NGC 752 from Beccari et al. (2022): Similar to Fig. 2.
731
+ in the Galactic external potential the combined potential is low-
732
+ ered in two opposite points on the intersecting line defined by the
733
+ Galactic origin and the cluster centre, being the Lagrange points.
734
+ As a consequence, a fraction of the initial set of stars have pos-
735
+ itive energy with respect to the Lagrange points and lead to a
736
+ continuous stream of escaping stars across the clusters’s tidal
737
+ threshold (or práh according to Kroupa et al. 2022), with indi-
738
+ vidual escape time scales up to a Hubble time. This method has
739
+ been successfully tested in Fukushige & Heggie (2000).
740
+ The aim in this work is to quantify the expected distribu-
741
+ tion of the asymmetry between both tidal tails for the observed
742
+ total number of tidal tail members due to stochastic evaporation
743
+ through the Lagrange points. As not all test particles escape from
744
+ the star cluster into the tidal arms a few test runs are required to
745
+ calibrate the total number of test particles, such that the number
746
+ of escaped stars is nearly equal to the observed number of tidal
747
+ tail members.
748
+ As the stellar test particles are performing many revolutions
749
+ around the star cluster centre before evaporating into the Galac-
750
+ tic tidal field, the equations of motion are integrated with a time-
751
+ symmetric Hermite method (Kokubo et al. 1998). The expres-
752
+ sions of the accelerations and the corresponding time derivatives
753
+ are listed in App. A for completeness.
754
+ As the total mass of the Plummer model is constant during
755
+ the simulation, models with minimum and maximum star cluster
756
+ mass are calculated in order to enclose the mass loss of real star
757
+ clusters. Röser et al. (2011) estimated an initial stellar mass of
758
+ the Hyades of 1100 M⊙ and determined a current stellar mass
759
+ gravitationally bound within the tidal radius of 275 M⊙. There-
760
+ fore, in the minimum model the mass of the Plummer sphere is
761
+ given by the current stellar mass of the star cluster (Table 1), in
762
+ the maximum model the mass of the Plummer sphere is set to
763
+ four times the current stellar mass. The Plummer parameter, bPl,
764
+ is identical in both models.
765
+ Furthermore, these two models also take into account the
766
+ possible range of tidal radii: a minimum model (current mass)
767
+ with the smallest tidal radius and a maximum model (here 4x
768
+ the current mass) with a plausible maximum tidal radius.
769
+ The orbits of the four star clusters are integrated backwards
770
+ in time over their assumed life time from their current position
771
+ (Table 1) to their location of formation. At this position 1000
772
+ randomly created Plummer models are set up for each maximum
773
+ and minimum cluster. Each configuration is integrated forward
774
+ in time over the assumed age of the respective star cluster. Fi-
775
+ 0
776
+ 2
777
+ 4
778
+ 6
779
+ 8
780
+ 10
781
+ 12
782
+ 14
783
+ 16
784
+ -0.4
785
+ -0.2
786
+ 0
787
+ 0.2
788
+ 0.4
789
+ Hyades
790
+ normalised distribution
791
+ (nl-nt)/(nl+nt)
792
+ 0
793
+ 2
794
+ 4
795
+ 6
796
+ 8
797
+ 10
798
+ 12
799
+ 14
800
+ 16
801
+ -0.4
802
+ -0.2
803
+ 0
804
+ 0.2
805
+ 0.4
806
+ Praesepe
807
+ normalised distribution
808
+ (nl-nt)/(nl+nt)
809
+ 0
810
+ 2
811
+ 4
812
+ 6
813
+ 8
814
+ 10
815
+ 12
816
+ 14
817
+ 16
818
+ -0.4
819
+ -0.2
820
+ 0
821
+ 0.2
822
+ 0.4
823
+ Coma Berenices
824
+ normalised distribution
825
+ (nl-nt)/(nl+nt)
826
+ 0
827
+ 2
828
+ 4
829
+ 6
830
+ 8
831
+ 10
832
+ 12
833
+ 14
834
+ 16
835
+ -0.4
836
+ -0.2
837
+ 0
838
+ 0.2
839
+ 0.4
840
+ NGC 752
841
+ normalised distribution
842
+ (nl-nt)/(nl+nt)
843
+ Fig. 9. Monte Carlo results for the minimum model: Shown is the nor-
844
+ malised distribution of the asymmetry in the Monte Carlo simulations
845
+ for each star cluster model. The solid curve is the best-fitting Gaussian
846
+ distribution function. The vertical solid line marks the observed value.
847
+ nally all particles outside the tidal radius are assigned to their
848
+ corresponding tidal arm using the method described in Sect. 2
849
+ and the normalised asymmetry, ϵ, is calculated.
850
+ 4.2. Statistical asymmetry
851
+ The numerically obtained distribution of the normalised asym-
852
+ metry of all four star clusters is shown by the histograms in Fig. 9
853
+ for the minimum models and in Fig. 10 for the maximum mod-
854
+ els. The solid curves show the best-fitting Gaussian function.
855
+ The vertical line marks the observed asymmetry (Table 1). The
856
+ resulting mean asymmetry, µ, and the dispersion, σ, of the Gaus-
857
+ sian fits are listed in Table 2. In the last column in Table 2 the
858
+ observed asymmetry is tabulated in units of the respective model
859
+ dispersion. For example, in the case of the maximum model the
860
+ observed asymmetry of the Praesepe cluster is a 1.7 σ event.
861
+ Dispersion and mean value of the minimum and maximum
862
+ are in good agreement. It can be concluded that the mass of the
863
+ Plummer model has only a small influence. In the case of the
864
+ Praesepe, the Coma Berenices and the NGC 752 star cluster the
865
+ observed asymmetries have a probability less than 3 σ and can be
866
+ interpreted as pure statistical events. But, if the observed asym-
867
+ metric tidal tails of the Hyades were solely the result of stochas-
868
+ tic evaporation, then the asymmetry would be at least a 6.7 σ
869
+ event.
870
+ 5. Theoretical considerations
871
+ In this section a theoretical stochastic evaporation model is de-
872
+ veloped and compared with the results of the numerical models
873
+ of Sect. 4.
874
+ 5.1. Theoretical distribution function, f(ϵ), of the asymmetry
875
+ The evaporation of a star into one of the tidal tails can be treated
876
+ as a Bernoulli-experiment. Let pl be the probability for a star to
877
+ end up in the leading tail, (1 − pl) the probability to end up in
878
+ the trailing tail. For a total number n of tidal tail members the
879
+ probability that nl stars are located in the leading arm is given by
880
+ Article number, page 5 of 8
881
+
882
+ A&A proofs: manuscript no. paper3
883
+ 0
884
+ 2
885
+ 4
886
+ 6
887
+ 8
888
+ 10
889
+ 12
890
+ 14
891
+ 16
892
+ -0.4
893
+ -0.2
894
+ 0
895
+ 0.2
896
+ 0.4
897
+ Hyades
898
+ normalised distribution
899
+ (nl-nt)/(nl+nt)
900
+ 0
901
+ 2
902
+ 4
903
+ 6
904
+ 8
905
+ 10
906
+ 12
907
+ 14
908
+ 16
909
+ -0.4
910
+ -0.2
911
+ 0
912
+ 0.2
913
+ 0.4
914
+ Praesepe
915
+ normalised distribution
916
+ (nl-nt)/(nl+nt)
917
+ 0
918
+ 2
919
+ 4
920
+ 6
921
+ 8
922
+ 10
923
+ 12
924
+ 14
925
+ 16
926
+ -0.4
927
+ -0.2
928
+ 0
929
+ 0.2
930
+ 0.4
931
+ Coma Berenices
932
+ normalised distribution
933
+ (nl-nt)/(nl+nt)
934
+ 0
935
+ 2
936
+ 4
937
+ 6
938
+ 8
939
+ 10
940
+ 12
941
+ 14
942
+ 16
943
+ -0.4
944
+ -0.2
945
+ 0
946
+ 0.2
947
+ 0.4
948
+ NGC 752
949
+ normalised distribution
950
+ (nl-nt)/(nl+nt)
951
+ Fig. 10. Similar to analysis as in Fig. 9 but for the maximum model.
952
+ Cluster
953
+ µ
954
+ σ
955
+ |xobs − µ|
956
+ Hyades (min)
957
+ -0.0088
958
+ 0.042
959
+ 7.3 σ
960
+ Hyades (max)
961
+ -0.0086
962
+ 0.046
963
+ 6.7 σ
964
+ Hyades (theo.)
965
+ 0
966
+ 0.043
967
+ 6.9 σ
968
+ Praesepe (min)
969
+ -0.0163
970
+ 0.036
971
+ -1.7 σ
972
+ Praesepe (max)
973
+ -0.0142
974
+ 0.037
975
+ -1.7 σ
976
+ Praesepe (theo.)
977
+ 0
978
+ 0.035
979
+ -2.2 σ
980
+ Coma Berenices (min)
981
+ -0.0091
982
+ 0.041
983
+ 2.4 σ
984
+ Coma Berenices (max)
985
+ -0.0092
986
+ 0.040
987
+ 2.4 σ
988
+ Coma Berenices (theo.)
989
+ 0
990
+ 0.040
991
+ 2.2 σ
992
+ NGC 752 (min)
993
+ -0.0052
994
+ 0.055
995
+ 1.6 σ
996
+ NGC 752 (max)
997
+ -0.0046
998
+ 0.056
999
+ 1.6 σ
1000
+ NGC 752 (theo.)
1001
+ 0
1002
+ 0.058
1003
+ 1.6 σ
1004
+ Table 2. Parameter of Gaussian fits of the asymmetry distribution of the
1005
+ different Monte Carlo models.
1006
+ a binomial distribution
1007
+ bn(nl) =
1008
+ �n
1009
+ nl
1010
+
1011
+ pnl
1012
+ l (1 − pl)n−nl ,
1013
+ (4)
1014
+ with an expectation value of E(nl) = npl and a variance Var(nl) =
1015
+ npl(1 − pl).
1016
+ According to the theorem by de Moivre-Laplace, the bino-
1017
+ mial distribution converges against the Gaussian distribution,
1018
+ g(nl) =
1019
+ 1
1020
+
1021
+ 2πσ2
1022
+ l
1023
+ e
1024
+
1025
+ (nl−µl)2
1026
+ 2σ2
1027
+ l
1028
+ ,
1029
+ (5)
1030
+ for increasing nl with an expectation value E(nl) = µl = npl and
1031
+ a variance Var(nl) = σ2
1032
+ l = npl(1 − pl).
1033
+ The normalised asymmetry, ϵ, is related to the number of
1034
+ members of the leading tail, nl, by
1035
+ ϵ = nl − nt
1036
+ n
1037
+ = 2nl
1038
+ n − 1 .
1039
+ (6)
1040
+ The relation between the distribution function of the normalised
1041
+ asymmetry, f(ϵ), and the distribution of the member number of
1042
+ stars in the leading tail, g(nl), is given by
1043
+ f(ϵ) dϵ = g(nl) dnl .
1044
+ (7)
1045
+ The distribution function of the asymmetry can then be calcu-
1046
+ lated by
1047
+ f(ϵ) = g(nl(ϵ))
1048
+ �����
1049
+ dnl
1050
+ dϵ (ϵ)
1051
+ ����� =
1052
+ 1
1053
+
1054
+ 2πσ2ϵ
1055
+ e
1056
+ − (ϵ−µϵ )2
1057
+ 2σ2ϵ
1058
+ ,
1059
+ (8)
1060
+ with dnl/dϵ following from Eq. (6) and
1061
+ σ2
1062
+ ϵ = 4σ2
1063
+ l
1064
+ n2 = 4pl(1 − pl)
1065
+ n
1066
+ ,
1067
+ (9)
1068
+ and
1069
+ µϵ = 2µl
1070
+ n − 1 = 2pl − 1 .
1071
+ (10)
1072
+ 5.2. Symmetric evaporation
1073
+ In the case of a symmetric population of the tidal tails, the evap-
1074
+ oration probabilities into both arms are identical, pl = pt = 1
1075
+ 2.
1076
+ The expectation value and the variance are
1077
+ µϵ = 0
1078
+ ,
1079
+ σϵ =
1080
+ 1√n .
1081
+ (11)
1082
+ For all four clusters the theoretically expected asymmetry due to
1083
+ stochastic evaporation, if the tidal tails are symmetrically popu-
1084
+ lated, is listed in Table 2. It can be seen that in all four cases the
1085
+ theoretical values are close to the numerically obtained ones.
1086
+ 5.3. Asymmetric evaporation
1087
+ Now, consider the case that the evaporation and the distribution
1088
+ processes within the vicinity of the star cluster into the tidal arms
1089
+ were asymmetric. According to Eq. 10 the expectation value of
1090
+ the asymmetry, µϵ, increases, that is, more stars evaporate into
1091
+ the leading arm than into the trailing arm, if the population prob-
1092
+ ability, pl, of the leading arm increases.
1093
+ For a given observed asymmetry, ϵobs, the probability of this
1094
+ event can be calculated as multiples, k, of the dispersion for the
1095
+ assumed evaporation probability pl,
1096
+ k = ϵobs − µϵ(pl)
1097
+ σϵ(pl)
1098
+ =
1099
+ √n(ϵobs − 2pl + 1)
1100
+ 2
1101
+
1102
+ pl(1 − pl)
1103
+ .
1104
+ (12)
1105
+ Fig. 11 shows this function for all four star clusters. The vertical
1106
+ dashed line marks the case of symmetrically populated tidal tails.
1107
+ For example, the Hyades have an observed asymmetry of ϵobs =
1108
+ 0.298 (Table 1). In the case of a symmetric evaporation, pl = 1
1109
+ 2,
1110
+ the theoretical dispersion is σ = 0.043. Thus, the probabillity of
1111
+ this event is 0.298/0.043 = 6.9 σ. This point is marked in Fig. 11
1112
+ by the intersection of the solid line labeled with Hyades and the
1113
+ vertical dashed line.
1114
+ On the other hand, in order to increase the event probability
1115
+ (decreasing k) the probability of evaporation into the leading arm
1116
+ needs to be increased. For given k, Eq. (12) can be solved for the
1117
+ required evaporation probability, pl, into the leading arm. The
1118
+ emerging quadratic equation leads to two solutions of pl,
1119
+ p1,2 = −a
1120
+ 2 ±
1121
+ ��a
1122
+ 2
1123
+ �2
1124
+ − b ,
1125
+ (13)
1126
+ where
1127
+ a = −k2 + n(ϵobs + 1)
1128
+ k2 + n
1129
+ and
1130
+ b = n(ϵobs + 1)2
1131
+ 4k2 + 4n
1132
+ .
1133
+ (14)
1134
+ If the observed asymmetry of the Hyades should be a 3 σ event
1135
+ then an evaporation probability into the leading arm of approxi-
1136
+ mately pl = 0.585 is required.
1137
+ Article number, page 6 of 8
1138
+
1139
+ J. Pflamm-Altenburg et al.: On the degree of stochastic asymmetry in the tidal tails of star clusters
1140
+ -10
1141
+ -5
1142
+ 0
1143
+ 5
1144
+ 10
1145
+ 0.3
1146
+ 0.4
1147
+ 0.5
1148
+ 0.6
1149
+ 0.7
1150
+ 0.8
1151
+ Hyades
1152
+ Coma Berenices
1153
+ Praesepe
1154
+ NGC 752
1155
+ k
1156
+ pl
1157
+ Fig. 11. Shown is the probability of the observed asymmetry of all four
1158
+ star clusters as a multiple of the dispersion in dependence of the as-
1159
+ sumed evaporation probability into the leading arm, pl. See Sect. 5.3
1160
+ for details.
1161
+ 6. Discussion and Conclusions
1162
+ The common assumption that both tidal tails of star clusters,
1163
+ moving on nearly circular obits around the Galactic centre,
1164
+ evolve equally has recently faced a challenge as the analysis of
1165
+ Gaia data reveal asymmetries in the tidal tails of four nearby
1166
+ open star clusters.
1167
+ Because the evaporation of stars can be treated as a stochastic
1168
+ process the normalised difference of the number of member stars
1169
+ of both tails should follow a distribution function. This distribu-
1170
+ tion has been quantified here by use of Monte Carlo simulations
1171
+ of test particle configurations integrated in the full Galactic po-
1172
+ tential and compared with a theoretical approach. It emerges that
1173
+ the theoretical and numerical results agree with each other.
1174
+ Comparing the individual distribution functions of the asym-
1175
+ metry with the observed ones, it can be concluded that the ob-
1176
+ served asymmetry of Praesepe, Coma Berenices and NGC 752
1177
+ might be the result of the stochastic nature of the evaporation
1178
+ of stars through both Lagrange points. On the other hand, the
1179
+ asymmetry of the Hyades is a 6.7 σ event. In order to interpret
1180
+ the asymmetry as a 3 σ event, asymmetric evaporation probabil-
1181
+ ities into the leading arm of 58.5% and into the trailing arm of
1182
+ 41.5% are required.
1183
+ It might be speculated that external effects might lead to an
1184
+ additional broadening of the distribution function of the asym-
1185
+ metry. Assuming a different value for the Galactic rotational ve-
1186
+ locity or a different position of the Sun than used in this work
1187
+ might not lead to a larger scatter as the 50/50% evaporation prob-
1188
+ abilities at both Lagrange points are not expected to vary in an
1189
+ almost flat rotation curve.
1190
+ A stronger effect on the asymmetry of the tidal tails might be
1191
+ due to local deviations from a logarithmic potential (as required
1192
+ in the case of a flat rotation curve). Such local variations can be
1193
+ a result of an interaction with a Galactic bar or spiral arms (cf.
1194
+ Bonaca et al. 2020; Pearson et al. 2017). How strong this effect
1195
+ will be can be hardly estimated and will be explored in further
1196
+ numerical studies. However, the main result here, that the pure
1197
+ evaporation of stars through the Lagrange points is basically a
1198
+ simple Bernoulli process, remains solid.
1199
+ If the asymmetric evaporation probabilities have an internal
1200
+ origin, then larger asymmetries in the star cluster potential and
1201
+ the kinematics of the evaporation process is required than New-
1202
+ tonian dynamics can provide (Kroupa et al. 2022). On the other
1203
+ hand the asymmetry might be due to an external perturbation,
1204
+ for example through the encounter with a molecular cloud (Jer-
1205
+ abkova et al. 2021). However, the detailed analysis of the asym-
1206
+ metry in the tidal tails of the Hyades reveals that the process
1207
+ leading to the asymmetry must affect both arms equally in terms
1208
+ of the qualitative structure. The bending of the radial number dis-
1209
+ tributions occur at the same distance to the star cluster but with
1210
+ different strength (Fig. 2, lower left panel). If an encounter with
1211
+ an external object had occurred on one side of the star cluster
1212
+ then it is expected that more than only the total number of tidal
1213
+ tail members is reduced. Instead, the functional form of the cu-
1214
+ mulative number distribution in both arms would be completely
1215
+ different and rapid changes of the slopes of the cumulative num-
1216
+ ber distribution would not be expected to occur at the same dis-
1217
+ tance from the star cluster centre in both tidal tails on opposite
1218
+ sites of the star cluster as is observed in the tidal tails of the
1219
+ Hyades (Fig. 2, lower left panel).
1220
+ References
1221
+ Aarseth, S. J. 1999, PASP, 111, 1333
1222
+ Aarseth, S. J. 2003, Gravitational N-Body Simulations (Gravitational N-Body
1223
+ Simulations, by Sverre J. Aarseth, pp. 430. ISBN 0521432723. Cambridge,
1224
+ UK: Cambridge University Press, November 2003.)
1225
+ Aarseth, S. J., Henon, M., & Wielen, R. 1974, A&A, 37, 183
1226
+ Allen, C. & Santillan, A. 1991, Revista Mexicana de Astronomia y Astrofisica,
1227
+ 22, 255
1228
+ Allen, L., Megeath, S. T., Gutermuth, R., et al. 2007, Protostars and Planets V,
1229
+ 361
1230
+ Baumgardt, H. & Kroupa, P. 2007, MNRAS, 380, 1589
1231
+ Beccari, G., Jerabkova, T., Boffin, H. M. J., et al. 2022, in preparation
1232
+ Boffin, H. M. J., Jerabkova, T., Beccari, G., & Wang, L. 2022, MNRAS, 514,
1233
+ 3579
1234
+ Bonaca, A., Pearson, S., Price-Whelan, A. M., et al. 2020, ApJ, 889, 70
1235
+ Casertano, S. & Hut, P. 1985, ApJ, 298, 80
1236
+ Fukushige, T. & Heggie, D. C. 2000, MNRAS, 318, 753
1237
+ Jerabkova, T., Boffin, H. M. J., Beccari, G., et al. 2021, A&A, 647, A137
1238
+ Jerabkova, T., Boffin, H. M. J., Beccari, G., et al. in prep., in preparation
1239
+ Kokubo, E., Yoshinaga, K., & Makino, J. 1998, MNRAS, 297, 1067
1240
+ Kroupa, P., Jerabkova, T., Thies, I., et al. 2022, MNRAS, 517, 3613
1241
+ Küpper, A. H. W., Kroupa, P., Baumgardt, H., & Heggie, D. C. 2010, MNRAS,
1242
+ 401, 105
1243
+ Lada, C. J. & Lada, E. A. 2003, ARA&A, 41, 57
1244
+ Oh, S. & Kroupa, P. 2016, A&A, 590, A107
1245
+ Pearson, S., Price-Whelan, A. M., & Johnston, K. V. 2017, Nature Astronomy,
1246
+ 1, 633
1247
+ Pflamm-Altenburg, J. & Kroupa, P. 2006, MNRAS, 373, 295
1248
+ Plummer, H. C. 1911, MNRAS, 71, 460
1249
+ Poveda, A., Ruiz, J., & Allen, C. 1967, Boletin de los Observatorios Tonantzintla
1250
+ y Tacubaya, 4, 86
1251
+ Röser, S., Schilbach, E., Piskunov, A. E., Kharchenko, N. V., & Scholz, R. D.
1252
+ 2011, A&A, 531, A92
1253
+ Article number, page 7 of 8
1254
+
1255
+ A&A proofs: manuscript no. paper3
1256
+ Appendix A: Hermite formulae for the
1257
+ Allen-Santillan potential
1258
+ The total Galactic gravitational field has contributions from
1259
+ three components: Galactic bulge, disk and halo. The rotation-
1260
+ ally symmetric gravitational potentials are taken from Allen &
1261
+ Santillan (1991). The time-symmetric Hermite integrator from
1262
+ Kokubo et al. (1998) requires the accelerations a and their time
1263
+ derivatives j = ˙a and are listed below. The following notations
1264
+ are used: r = (x, y, z), ρ = (x, y, 0), z = (0, 0, z), ˙r = v = (˙x, ˙y, ˙z),
1265
+ ˙ρ = (˙x, ˙y, 0), ˙z = (0, 0, ˙z).
1266
+ Φ(ρ, z) = Φbulge(ρ, z) + Φdisk(ρ, z) + Φhalo(ρ, z)
1267
+ (A.1)
1268
+ a = abulge + adisk + ahalo = −∇Φbulge − ∇Φdisk − ∇Φhalo
1269
+ (A.2)
1270
+ j = jbulge + jdisk + jhalo
1271
+ (A.3)
1272
+ Appendix A.1: bulge
1273
+ Φbulge(ρ, z) = −GM1
1274
+ 1
1275
+
1276
+ ρ2 + z2 + b2
1277
+ 1
1278
+ (A.4)
1279
+ abulge = −GM1
1280
+
1281
+ ρ2 + z2 + b2
1282
+ 1
1283
+ �− 3
1284
+ 2 r
1285
+ (A.5)
1286
+ jbulge = −GM1
1287
+
1288
+ ρ2 + z2 + b2
1289
+ 1
1290
+ �− 3
1291
+ 2
1292
+ ������v − 3
1293
+ ˙r • r
1294
+ ρ2 + z2 + b2
1295
+ 1
1296
+ r
1297
+ ������
1298
+ (A.6)
1299
+ Appendix A.2: disk
1300
+ Φdisk(ρ, z) = −GM2
1301
+ 1
1302
+
1303
+ ρ2 +
1304
+
1305
+ a2 +
1306
+
1307
+ z2 + b2
1308
+ 2
1309
+ �2
1310
+ (A.7)
1311
+ a = −GM2
1312
+
1313
+ ρ2 +
1314
+
1315
+ a2 +
1316
+
1317
+ z2 + b2
1318
+ 2
1319
+ � 1
1320
+ 2 �2�− 3
1321
+ 2
1322
+ (A.8)
1323
+ ������������
1324
+ ρ +
1325
+ ������������
1326
+ 1 +
1327
+ a2
1328
+
1329
+ z2 + b2
1330
+ 2
1331
+ ������������
1332
+ z
1333
+ ������������
1334
+ (A.9)
1335
+ j = 3M2G
1336
+
1337
+ ρ2 +
1338
+
1339
+ a2 +
1340
+
1341
+ z2 + b2
1342
+ 2
1343
+ � 1
1344
+ 2 �2�− 5
1345
+ 2
1346
+ ·
1347
+ (A.10)
1348
+ ������������
1349
+ ρ • ˙ρ +
1350
+ ������������
1351
+ 1 +
1352
+ a2
1353
+
1354
+ z2 + b2
1355
+ 2
1356
+ ������������
1357
+ z • ˙z
1358
+ ������������
1359
+ ������������
1360
+ ρ +
1361
+ ������������
1362
+ 1 +
1363
+ a2
1364
+
1365
+ z2 + b2
1366
+ 2
1367
+ ������������
1368
+ z
1369
+ ������������
1370
+ (A.11)
1371
+ −M2G
1372
+
1373
+ ρ2 +
1374
+
1375
+ a2 +
1376
+
1377
+ z2 + b2
1378
+ 2
1379
+ � 1
1380
+ 2 �2�− 3
1381
+ 2
1382
+ ·
1383
+ (A.12)
1384
+ ������������
1385
+ ˙ρ −
1386
+ a2z • ˙z
1387
+
1388
+ z2 + b2
1389
+ 2
1390
+ � 3
1391
+ 2 z +
1392
+ ������������
1393
+ 1 +
1394
+ a2
1395
+
1396
+ z2 + b2
1397
+ 2
1398
+ ������������
1399
+ ˙z
1400
+ ��������������
1401
+ (A.13)
1402
+ component
1403
+ parameter
1404
+ bulge
1405
+ M1 = 606.0
1406
+ bulge
1407
+ b1 = 0.3873
1408
+ disk
1409
+ M2 = 3690.0
1410
+ disk
1411
+ a2 = 5.3178
1412
+ disk
1413
+ b2 = 0.2500
1414
+ halo
1415
+ M3 = 4615.0
1416
+ halo
1417
+ a3 = 12.0
1418
+ halo
1419
+ γ = 2.02
1420
+ Table A.1. Parameters of the potential used in this work.
1421
+ Appendix A.3: halo
1422
+ Φhalo = −GMhalo(≤ r)
1423
+ r
1424
+
1425
+ GM3
1426
+ (γ − 1)a3
1427
+ ����������−
1428
+ γ − 1
1429
+ 1 +
1430
+ � r
1431
+ a3
1432
+ �γ−1 + ln
1433
+ �������1 +
1434
+ � r
1435
+ a3
1436
+ �γ−1�������
1437
+ ����������
1438
+ 100
1439
+ r
1440
+ ,
1441
+ (A.14)
1442
+ where
1443
+ M(≤ r) =
1444
+ M3
1445
+ � r
1446
+ a3
1447
+ �γ
1448
+ 1 +
1449
+ � r
1450
+ a3
1451
+ �γ−1
1452
+ (A.15)
1453
+ is the total halo mass within the Galactocentric radius r.
1454
+ ahalo = −GM(≤ r)
1455
+ r3
1456
+ r
1457
+ (A.16)
1458
+ jhalo = −GM(r)
1459
+ r3
1460
+ ����������v − r • v
1461
+ r2
1462
+ ����������γ − 3 −
1463
+ (γ − 1)
1464
+ � r
1465
+ a3
1466
+ �γ−1
1467
+ 1 +
1468
+ � r
1469
+ a3
1470
+ �γ−1
1471
+ ���������� r
1472
+ ����������
1473
+ (A.17)
1474
+ Appendix A.4: Units and parameters
1475
+ In Allen & Santillan (1991) the spatial variables of the poten-
1476
+ tial have the unit kpc, the velocity the unit 10 km s−1 and the
1477
+ potential the unit 100 km2 s−2. Thus, the accelerations needs to
1478
+ be multiplied by 0.104572 in order to have the unit pc Myr−2
1479
+ and their time derivatives, j, by 1.06936 × 10−3 to have the unit
1480
+ pc Myr−3. The mass has the unit 2.3262 × 107 M⊙ and is scaled
1481
+ such that the gravitational constant is G = 1. The parameters of
1482
+ the potentials are summarised in Table A.1.
1483
+ Appendix A.5: Hermite formulae for the Plummer sphere
1484
+ ΦPl(r) = −GMPl
1485
+ 1
1486
+
1487
+ r2 + b2
1488
+ Pl
1489
+ (A.18)
1490
+ aPl = −GMPl
1491
+
1492
+ r2 + b2
1493
+ Pl
1494
+ �− 3
1495
+ 2 r
1496
+ (A.19)
1497
+ jPl = −GMPl
1498
+
1499
+ r2 + b2
1500
+ Pl
1501
+ �− 3
1502
+ 2
1503
+ ������v − 3 ˙r • r
1504
+ r2 + b2
1505
+ Pl
1506
+ r
1507
+ ������
1508
+ (A.20)
1509
+ Article number, page 8 of 8
1510
+
SNE0T4oBgHgl3EQfUgB0/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
UdFOT4oBgHgl3EQf5zR2/content/tmp_files/2301.12955v1.pdf.txt ADDED
@@ -0,0 +1,826 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.12955v1 [math.AC] 30 Jan 2023
2
+ Invertible bases and root vectors for analytic
3
+ matrix-valued functions
4
+ Vanni Noferini∗
5
+ Abstract
6
+ We revisit the concept of a minimal basis through the lens of the theory of modules
7
+ over a commutative ring R. We first review the conditions for the existence of a basis
8
+ for submodules of Rn where R is a B´ezout domain. Then, we define the concept of
9
+ invertible basis of a submodule of Rn and, when R is an elementary divisor domain,
10
+ link it to the Main Theorem of [G. D. Forney Jr., SIAM J. Control 13, 493–520, 1975].
11
+ As an application, we let Ω ⊆ C be either a connected compact set or a connected open
12
+ set, and we specialize to R = A(Ω), the ring of functions that are analytic on Ω. We
13
+ show that, for any matrix A(z) ∈ A(Ω)m×n, ker A(z) ∩ A(Ω)n is a free A(Ω)-module
14
+ and admits an invertible basis, or equivalently a basis that is full rank upon evaluation
15
+ at any λ ∈ Ω. Finally, given λ ∈ Ω, we use invertible bases to define and study maximal
16
+ sets of root vectors at λ for A(z). This in particular allows us to define eigenvectors
17
+ also for analytic matrices that do not have full column rank.
18
+ Keywords: Analytic function, eigenvector, free module, minimal basis, invertible basis,
19
+ root vector, maximal set
20
+ 2020 MSC: 15B33, 15A18, 65H17, 15B99
21
+ 1
22
+ Introduction
23
+ In the context of the theory of polynomial matrices [9], the concept of a minimal basis was
24
+ introduced by D. Forney Jr. in [6]. Let F be a field, and denote by F[x] (resp. F(x)) the ring
25
+ of univariate polynomials over F (resp. the field of fractions of F[x]). If V is any subspace of
26
+ F(x)n, it is clear that a polynomial basis for V exists. Forney gave the following definition.
27
+ Definition 1.1 Let B = {b1(x), . . . , bp(x)} be a polynomial basis for V ⊆ F(x)n. Then, the
28
+ quantity Ω = �p
29
+ i=1 deg bi(x) is called the order of B. If B has minimal order among all
30
+ possible polynomial bases of V , it is called a minimal basis of V .
31
+ ∗Department of Mathematics and Systems Analysis, Aalto University, P.O. Box 11100, FI-00076, Aalto,
32
+ Finland (vanni.noferini@aalto.fi.
33
+ Supported by an Academy of Finland grant (Suomen Akatemian
34
+ p¨a¨at¨os 331240).
35
+ 1
36
+
37
+ Then, Forney showed that the degrees of a minimal basis, called the minimal indices of
38
+ V , are uniquely determined by V . Moreover, he gave some equivalent characterization of a
39
+ minimal basis in [6, Main Theorem]. To state it, we must define the high coefficient matrix
40
+ {P} of a polynomial matrix P(x) as the matrix whose columns retain the coefficients of the
41
+ highest order monomials in each column of P(x). For example, over F = Q,
42
+
43
+
44
+
45
+
46
+
47
+ 1
48
+ 2x2
49
+ 0
50
+ x + 1
51
+ −1
52
+ x2 + x + 1
53
+
54
+
55
+
56
+
57
+  =
58
+
59
+
60
+ 1
61
+ 2
62
+ 0
63
+ 0
64
+ −1
65
+ 1
66
+
67
+  .
68
+ Theorem 1.2 (Forney) Let M(x) ∈ F[x]n×p. The following are equivalent:
69
+ 1. The set of the columns of M(x) is a minimal basis for the subspace they span;
70
+ 2. (a) For every prime polynomial p(x) ∈ F[x], M(x) is nonsingular modulo p(x) (b) {M}
71
+ is nonsingular;
72
+ 3. (a) The GCD of all p × p minors of M(x) is 1 (b) The largest degree of all the p × p
73
+ minors of M(x) is the sum of the degrees of the columns of G(x);
74
+ 4. If b(x) = M(x)a(x) is a polynomial vector then (a) a(x) must be polynomial (b) The
75
+ degree of b(x) is the maximum, for all 1 ≤ i ≤ p, of the sum of the degree of the i-th
76
+ column of M(x) and the degree of the i-th coefficient of a(x).
77
+ (For conciseness, we have omitted a fifth equivalent condition from Forney’s original theorem,
78
+ that relates (for all d) the minimal indices of V with the dimension over F of Vd, the vector
79
+ space of all polynomial n-uples in V of degree ≤ d.)
80
+ Two more remarks on minimal bases are in order. First, Forney observed already in
81
+ [6] that property 4(a) in his Main Theorem is equivalent to the fact that the F[x]-module
82
+ M = V ∩F[x]n is free and that a minimal basis is a basis for M. However, Forney mentioned
83
+ this (correct) fact in passing, without explaining it in detail; a more thorough treatement
84
+ can be found in [8, Section 2.4]. Moreover, Forney showed that properties (a) are equivalent
85
+ to each other (and to the fact that a minimal basis of V is a basis of M) and properties (b)
86
+ are equivalent to each other.
87
+ Second, root polynomials and root vectors at λ ∈ C for a (possibly not full column rank)
88
+ polynomial matrix P(x) were defined in [4, 20], extending the original notion for regular
89
+ polynomial matrices [9] by building on the concept of the vector space kerλ P(x); the latter
90
+ was defined as the span of a minimal basis of ker P(x), evaluated at x = λ. A so-called
91
+ maximal set of root polynomials is a useful tool as it provides all the local positive partial
92
+ multiplicities at λ: see [4, 20] as well as [22] for an extension to rational matrices. The idea
93
+ of root vectors has proved useful for theoretical analysis [4, 5, 20, 22] as well as to analyze
94
+ conditioning [17, 21] and to design practical algorithms for singualr eigenvalue problems
95
+ [12, 14]. However, a careful inspections of the arguments in [4, 20, 22] shows that to define
96
+ kerλ P(x) it suffices in fact to start from a, not necessarily minimal, basis satisfying properties
97
+ (a) in Forney’s Main Theorem 1.2. In other words, properties (b) in Theorem 1.2 are not
98
+ 2
99
+
100
+ necessary to correctly define root polynomials at a finite point. In this paper, we propose to
101
+ call a polynomial basis that satifies properties (a) in Forney’s Main Theorem 1.2 invertible,
102
+ since a matrix whose columns are the vectors of such basis is left invertible (over F[x]).
103
+ Equivalent characterizations of left invertibility are that the matrix has trivial Smith form,
104
+ i.e., all the invariant factors are units, or that it is a submatrix of a unimodular matrix; see
105
+ also [1, Theorem 3.3].
106
+ The main goals of this paper are (1) To extend the notion of an invertible basis to certain
107
+ submodules of Rn when R is a B´ezout domain (but not necessarily a principal ideal domain)
108
+ and (2) To use invertible bases to define a maximal set of root vectors for matrices over the
109
+ ring of analytic functions on a connected (open or compact) set. We expect that the resulting
110
+ theory may be useful, for example, for applications to the nonlinear eigenvalue problem [10].
111
+ We will take a module-theoretical approach, but keeping the exposition accessible for an
112
+ audience with expertise in numerical linear algebra. In particular, in Section 2 we explicitly
113
+ recall the algebraic concepts about modules that we will need. In Section 3, we show that
114
+ when R is a B´ezout domain with field of fractions G, then a submodule of Rn is free if
115
+ and only if it is finitely generated (Theorem 3.6), and in particular that for any suspace
116
+ V ⊆ Gn then V ∩ Rn is free and has an invertible basis. This result is certainly not new:
117
+ see for example [7, Theorem 1.13.3]; however, our presentation and in particular the link to
118
+ properties (a) in Theorem 1.2 (see Theorem 3.9) seem to not be well known in the linear
119
+ algebra community. Finally, in Section 4 we specialize to the ring A(Ω) of analytic functions
120
+ over a connected, and either open or compact, set Ω, and we use the existence of invertible
121
+ basis to define and characterize maximal sets of root vectors for matrices over A(Ω). This
122
+ allows us in particular to define eigenvectors even for analytic matrices that do not have full
123
+ column rank: in that case, an eigenvector can be seen as a certain equivalence class.
124
+ 2
125
+ Commutative rings, modules, and free modules
126
+ In this section we refer to some basic algebra material: the notions that we recall, and
127
+ more, can be found for example in [3, 7, 8, 11, 13]. Throughout, we consider a commutative
128
+ ring R with unity, and we assume 1 ̸= 0 so that R is not the trivial ring {0}, because
129
+ it contains at least two distinct elements. A module over the commutative ring R, or R-
130
+ module, is a non-empty set M which is a commutative group with respect to the addition
131
+ + (in particular, there is a zero element 0 ∈ M and every x ∈ M has an inverse −x ∈ M
132
+ such that x + (−x) = 0) and is endowed with a scalar multiplication · : R × M → M that
133
+ satisfies the following axioms: (A1) a · (x + y) = a · x + a · y for all x, y ∈ M, a ∈ R; (A2)
134
+ (a+b)·x = a·x+b·x for all x ∈ M, a, b ∈ R; (A3) (ab)·x = a·(b·x) for all x ∈ M, a, b ∈ R;
135
+ (A4) 1 · x = x for all x ∈ M.
136
+ More informally, axioms (A1)–(A4) say that a module is to a commutative ring what
137
+ a vector space is to a field.
138
+ (In fact, a vector space is an R-module in the case of R
139
+ being a field.) In particular, the concepts of linear independence and of linear span both
140
+ still make sense. Namely, we say that x1, . . . , xn ∈ M are linearly independent if, given
141
+ a1, . . . , an ∈ R, �n
142
+ i=1 ai · xi = 0 ⇒ ai = 0 ∀ i. Moreover, we say that the module M is
143
+ 3
144
+
145
+ (finitely) generated by the elements y1, . . . , ym ∈ M (called generators) if, for every x ∈ M,
146
+ there exist b1, . . . , bm ∈ R such that x = �m
147
+ i=1 bi · yi. Linear independence can be applied
148
+ also to infinite sets of elements of M: in this case, one requires that every possible finite
149
+ subset is linearly independent. Similarly, a module M may also be infinitely generated: in
150
+ this case, it is necessary to have an infinite number of generators but every element of M is
151
+ still required to be an R-linear combination of finitely many generators. If S ⊂ M is a set
152
+ of generators of the R-module M, we write M = spanRS.
153
+ However, when combining these two concepts, a striking difference between modules and
154
+ vectors spaces emerges. Indeed, define a basis of a module as a linearly independent set of
155
+ generators. Every vector space has a basis1 but the same is not true for modules.
156
+ Example 2.1 Take R = Z. Then, it is easy to verify that M = R is a Z-module. Assume
157
+ for a contradiction that it has a basis B and let b0 ∈ B ⊆ R. Suppose that 2 ≤ k ∈ Z, then
158
+ by assumption there exist b1, . . . , bn ∈ B such that, for some z0, z1, . . . , zn ∈ Z,
159
+ b
160
+ k =
161
+ n
162
+
163
+ i=0
164
+ zibi ⇒ b −
165
+ n
166
+
167
+ i=0
168
+ (kzi)bi = 0,
169
+ contradicting the linear independence of the basis. (To deal with the case where z0 ̸= 0, note
170
+ that 1 − kzi ̸= 0 as otherwise |k| = 1, contradicting k ≥ 2.)
171
+ Nevertheless, some modules do have a basis.
172
+ A module that has a basis is called free.
173
+ Moreover, for convenience of exposition, we will conventionally agree that the trivial module
174
+ M = {0} is also free, with its basis being the empty set; this excentricity actually makes
175
+ sense if we formally agree that the sum of an empty set of elements of M yields 0, and in the
176
+ following it will allow us to avoid the clumsy need to repetitively exclude the trivial module
177
+ when making formal statements about free modules.
178
+ Proposition 2.2 Let R be a commutative ring. Rn (the set of all possible n-uples of ele-
179
+ ments of R) is a free R-module.
180
+ Proof. It is clear that the canonical basis {ei}n
181
+ i=1, where (ei)j = 1 if i = j and (ei)j = 0
182
+ if i ̸= j, is a basis of Rn.
183
+ The example of Proposition 2.2 is in fact unique up to isomorphism, in the sense that
184
+ every finitely generated free R-module with a basis of cardinality n is isomorphic to Rn, by
185
+ the first isomorphism theorem.
186
+ We conclude this section by recalling some further nomenclature and basic properties
187
+ [3, 7, 8, 11, 13]. In the special case M ⊆ R, the R-module M is called an ideal. Recall also
188
+ that a commutative ring R is called an integral domain if, for all a, b ∈ R, ab = 0 and b ̸= 0
189
+ imply a = 0. An integral domain is called a principal ideal domain (PID) if every ideal of R
190
+ is principal, i.e., generated by a single element of R; and it is called a B´ezout domain (BD) if
191
+ every finitely generated ideal of R is principal. Obviously, every PID is a BD by definition,
192
+ but the converse is not true. For example, the ring A(C) of entire functions is a BD [7] but
193
+ 1Of course, in the infinite dimensional case, this result is equivalent to the axiom of choice.
194
+ 4
195
+
196
+ not a PID. To see that A(C) is not a PID, consider define J ⊂ A(C) as the set of entire
197
+ functions f(z) that are zero at all but finitely many Gaussian integers: it is easy to verify
198
+ that J is an ideal which is not finitely generated (and in particular not principal). Finally,
199
+ an integral domain R is called an elementary divisor domain (EDD) if the following theorem
200
+ holds.
201
+ Theorem 2.3 (Smith) Let R be an elementary divisor domain and A ∈ Rm×n. Then there
202
+ exist two unimodular (that is, invertible over R) matrices U ∈ Rm×m and V ∈ Rn×n such
203
+ that A = USV where S ∈ Rm×n is diagonal and such that the (i, i) element of S divides the
204
+ (i + 1, i + 1) element of S, for all i < min{m, n}. Such a matrix S is called a Smith form
205
+ of A, and it is uniquely determined by A up to multiplication of each diagonal element by a
206
+ unit of R. The diagonal elements of A are called invariant factors of A, and the product of
207
+ the first k invariant factors is called the kth determinantal divisor of A and it is equal to the
208
+ GCD of all the k × k minors of A. Both invariant factors and determinantal divisors are
209
+ uniquely determined by A up to multiplication by a unit of R.
210
+ It can be proved that every PID is an EDD and that every EDD is a BD [7], while to our
211
+ knowledge it is still an open problem to decide whether there is a BD which is not an EDD
212
+ or the definitions of EDD and BD are equivalent [16].
213
+ 3
214
+ Submodules of Rn when R is a PID, an elementary
215
+ divisor domain, or a B´ezout domain
216
+ In this section, we study submodules of Rn where R is a commutative ring; we will often
217
+ make further assumptions on R such as being a PID, EDD or BD. Most of the results in
218
+ this section can be traced elsewhere, e.g., in [2, 6, 7, 8, 11], although our derivation does
219
+ not strictly follow those sources, and thus the form in which we present some statements, or
220
+ their proofs, may be original.
221
+ Let R be a commutative ring and A ∈ Rm×n. The range, or column space, of A is defined
222
+ as cs(A) := {x ∈ Rm : ∃ y ∈ Rn s.t. x = Ay}. It is a simple exercise to verify that cs(A) ⊆ Rm
223
+ is an R-module. The null space (over R) of A is denoted by null(A) := {y ∈ Rn : Ay = 0};
224
+ when R is an integral domain we notationally distinguish null(A) from ker A, that in this
225
+ paper denotes the null space, or kernel, over G, the field of fractions of R. (For example,
226
+ if R = F[x] is the ring of polyomials then G = F(x) is the field of rational functions.) It is
227
+ clear that, when R is an integral domain, null(A) = ker A ∩ Rn.
228
+ The following result [2, Theorem 5.10] is very general as no assumption on R, beyond
229
+ being a commutative ring, is needed.
230
+ Theorem 3.1 (Brown) Let R be a commutative ring and let M be a finitely generated R-
231
+ module. Suppose that {m1, . . . , mk} ⊆ M is a linearly independent set and {p1, . . . , pn} ⊆ M
232
+ is a set of generators of M. Then k ≤ n. Moreover, if k = n, then M is free and {p1, . . . , pn}
233
+ is a basis of M.
234
+ 5
235
+
236
+ An immediate corollary of Theorem 3.1 is that, if a matrix A ∈ Rn×p over a commutative
237
+ ring has linearly independent (over R) columns, then cs(A) is a free module and the set
238
+ of the columns of A is a basis. (This also follows from the first isomorphism theorem for
239
+ modules since in this case cs(A) ∼= Rp/null(A) = Rp.) Generally, however, neither the range
240
+ nor the null space of a matrix need to be free modules.
241
+ Example 3.2 Let A = 2 ∈ Z4. Clearly, null(A) = {0, 2} is generated by 2 and 2 is the
242
+ unique possible generator.
243
+ However, {2} is not a basis for ker A since it is not a Z4-
244
+ independent set (indeed in Z4 it holds 2 · 2 = 0). Moreover, cs(A) = null(A) is also not
245
+ free.
246
+ Luckily, though, over principal ideal domains the situation is much simpler.
247
+ Theorem 3.3 Let R be a principal ideal domain. Then, every submodule of Rn is free.
248
+ Proof. By Proposition 2.2, Rn is a free R-module. On the other hand, every submodule
249
+ of a free R-module is free if R is a PID [11, Theorem 5.1].
250
+ Corollary 3.4 Let R be a principal ideal domain and G its field of fractions. For every
251
+ subspace V ⊆ Gn, the set M = V ∩ Rn is a free R-module.
252
+ Proof. In view of Theorem 3.3, and since M ⊆ Rn, it is enough to show that M is a
253
+ module. It is clear that M is a group with respect for addition, for x, y ∈ M implies both
254
+ x + y ∈ V and x + y ∈ Rn; and it is also clear that if x ∈ M and p ∈ R then px ∈ Rn and
255
+ px ∈ V . Finally, properties (A1)–(A4) are also immediate because M ⊆ Rn.
256
+ Corollary 3.5 Let R be a principal ideal domain and let S be a subset of Rn. Then, M =
257
+ spanRS is a free R-module.
258
+ Proof. Similarly to Corollary 3.4, it is easy to verify that M is a module. Hence, M is a
259
+ free module by Theorem 3.3.
260
+ Either Corollary 3.4 or Corollary 3.5 (or both) provide, for example, a somewhat more
261
+ natural enviroment for the results related to the filtration approach to minimal bases [18]:
262
+ in that context, one can consider more directly a nested sequence of submodules of F[x]n
263
+ rather than of subspaces of F(x)n.
264
+ We now turn to B´ezout domains, where there are some complications with respect to
265
+ principal ideal domain. Nevertheless, the complications are not too hard to overcome.
266
+ Theorem 3.6 Let R be a B´ezout domain and let M ⊆ Rn be a submodule. Then, M is a
267
+ free R-module if and only if it is finitely generated.
268
+ Proof. We first prove necessity. Suppose that M is free and let B be a basis of M. If
269
+ #B > n, let the columns of A ∈ Rm×n be any finite subset of B of cardinality m > n: then it
270
+ suffices to take any nonzero vector c ∈ null(A) to immediately show that B must be linearly
271
+ dependent. Hence, #B ≤ n, and in particular B is a finite set thus showing that M is finitely
272
+ generated.
273
+ 6
274
+
275
+ For sufficiency, we argue2 by induction on n. For the base case n = 1, note that if M ⊆ R
276
+ is an R-module then M is in particular an ideal. But since M is finitely generated, then
277
+ it is principal: let g be a generator of M = ⟨g⟩, then either {g} is a basis of M (if g ̸= 0)
278
+ or M = {0} is trivial so ∅ is a basis (if g = 0). If n > 1, let M ⊆ Rn be an R-module
279
+ generated by the finite set S = {si}i∈I ⊆ M, where I is a finite set of indces, and define
280
+ J := {r ∈ R : ∃ b ∈ Rn−1 s.t. b ⊕ r ∈ M} and N := {a ∈ Rn−1 : a ⊕ 0 ∈ M}. By the first
281
+ isomorphism theorem applied to the linear map that sends v ∈ M to its bottom component,
282
+ both J and N are R-modules. (Note that both are obviously non-empty as 0 ∈ M.) First
283
+ fix r ∈ J.
284
+ Then there is b ∈ Rn−1 such that b ⊕ r = �
285
+ i∈I cisi for some ci ∈ R.
286
+ But
287
+ this implies r = �
288
+ i∈I ciσi where, for each i, σi is the bottom component of si. Hence, J
289
+ is (finitely) generated by the set of the distinct bottom components of the elements of S.
290
+ Next, fix a ∈ N. Then a ⊕ 0 = �
291
+ i∈I disi, where again di ∈ R. But in turn this implies that
292
+ N is (finitely) generated by the set of the distinct (n − 1)-uples that contain the top n − 1
293
+ components of the elements in S. Hence, using the inductive assumption, both J ⊆ R and
294
+ N ⊆ Rn−1 are free. Let BJ and BN be, respectively, a basis of J and N; in particular since
295
+ J ⊆ R is an ideal we have #BJ ≤ 1 by the first part of the proof. If J = {0}, M = N ⊕ 0
296
+ and hence BN ⊕ 0 is a basis of M. If J ̸= {0}, let {g} be a basis of J and take b0 to be any
297
+ element of Rn−1 such that b0 ⊕ g ∈ M. Manifestly, given v ∈ M, there are a unique c ∈ R
298
+ and a unique w ∈ N such that v = c(b0 ⊕ g) + (w ⊕ 0). It follows that M ∼= N ⊕ J and in
299
+ particular (BN ⊕ 0) ∪ {b0 ⊕ g} is a basis of M.
300
+ We now formalize the definition of an invertible basis anticipated in the introduction.
301
+ Definition 3.7 Let R be a commutative ring and M ⊆ Rn be a free R-module with basis B.
302
+ We say that B is an invertible basis of M if there is a matrix A ∈ Rn×p such that (1) the
303
+ columns of A are the elements of B (2) A is left invertible over R, i.e., there exists L ∈ Rp×n
304
+ such that LA = Ip.
305
+ Proposition 3.8 Let R be an elementary divisor domain and G its field of fractions. For
306
+ every subspace V ⊆ Gn, the set M = V ∩ Rn is a free R-module. Moreover, it admits an
307
+ invertible basis.
308
+ Proof. That M is a module can be easily proved as in Corollary 3.4. Since every EDD
309
+ is a BD, and in view of Theorem 3.6, we must show that M is finitely generated: we will do
310
+ so constructively, and the procedure will yield an invertible basis as a bonus. Let us start
311
+ with a basis (over G) of V with elements in Rn: this can be easily constructed starting by
312
+ any basis and scaling each element by least common denominators3. Let A ∈ Rn×p be the
313
+ matrix whose columns are the elements of such a basis. Then, A = QSZ where Q ∈ Rn×n
314
+ and Z ∈ Rp×p are unimodular while S ∈ Rn×p is a Smith form (see Theorem 2.3). Letting
315
+ 2Our proof for sufficiency follows the lead of [11, Theorem 5.1], which is written for the case of a PID,
316
+ with two modifications: (1) For a BD we must prove “by hand” that the sets N and J, defined in our proof,
317
+ are finitely generated (2) We have rephrased the proof in a language that we hope is more accessible for the
318
+ linear algebra research community.
319
+ 3This is possible because every BD is a GCD domain, and it is known [15, Theorem 2] that in a GCD
320
+ domain every pair of elements have both a GCD and a LCM.
321
+ 7
322
+
323
+ Qp ∈ Rn×p be the matrix containing the leftmost p columns of Q and Sp ∈ Rp×p be the
324
+ matrix containing the top p rows of S, we also have A = QpSpZ. We claim that the set
325
+ of the columns of Qp is an invertible basis of M. Linear independence is clear, as Qp is a
326
+ submatrix of a unimodular matrix. It remains to show that M is generated over R by the
327
+ columns of Qp. To this goal, note that the columns of A span V over G, and hence for all
328
+ v ∈ M ⊆ V there is c ∈ Gp such that v = Ac. Thus, v = Qp(SpZc). But Qp is left invertible
329
+ (over R) by construction, so by letting L ∈ Rp×n be a left inverse it holds SpZc = Lv ∈ Rp:
330
+ and since v is a generic element of M, the columns of Qp are a set of generators of M.
331
+ Invertible bases retain (in a generalized sense) properties (a) in Forney’s Theorem 1.2.
332
+ This in particular includes property 4(a) that, in the case R = F[x], was labelled “polynomial
333
+ linear combination property” in [18]. To state Theorem 3.9, recall that in a commutative
334
+ ring R, given a, b, r ∈ R, we write a ≡ b mod r to mean that r divides a − b, i.e., that there
335
+ is d ∈ R such that a − b = rd. This notation extends elementwise to matrices over R: for
336
+ A, B ∈ Rm×n we write A ≡ B mod r if there exists D ∈ Rm×n such that A − B = rD.
337
+ Theorem 3.9 Let R be an elementary divisor domain and G its field of fractions.
338
+ Let
339
+ V ⊆ Gn be a suspace and suppose that set of the columns of the matrix Q ∈ Rn×p is a basis
340
+ for V . Then the following are equivalent:
341
+ 1. The set of the columns of Q is an invertible basis for the module V ∩ Rn;
342
+ 2. For all non-units r ∈ R and for all Q′ ∈ Rn×p such that Q ≡ Q′ mod r, Q′ has full
343
+ column rank;
344
+ 3. The GCD of all p × p minors in Q is 1;
345
+ 4. If b = Qa ∈ Rn for some a ∈ Gp, then a ∈ Rp;
346
+ 5. Q has trivial Smith form, i.e., a Smith form of Q is S =
347
+
348
+ Ip
349
+ 0
350
+
351
+ .
352
+ Proof.
353
+ 1 ⇒ 2 By assumption there is L ∈ Rp×n such that LQ = Ip. Let r ∈ R and let D, Q′ ∈ Rp×n
354
+ satisfy rD = Q′ − Q, then LQ′ = Ip + rLD ⇒ det(LQ′) ≡ 1 mod r. Therefore, if
355
+ det(LQ′) = 0 then 1 = rd for some d ∈ R implying that r is a unit. Hence, if r is not
356
+ a unit then det(LQ′) ̸= 0 and thus Q′ has full rank.
357
+ 2 ⇒ 3 Write Q = USV with U, V unimdular and S in Smith form. Let g ∈ R be the GCD
358
+ of all p × p minors in Q, and suppose g is not a unit. Then, by Theorem 2.3, the p-th
359
+ invariant factor of Q, or equivalently the (p, p) element of S, cannot be a unit, say,
360
+ Spp = r for some non-unit r ∈ R. If S′ = S − repeT
361
+ p is constructed from S by replacing
362
+ Spp by 0, define Q′ = US′V . Clearly Q′ is rank deficient and Q − Q′ = rUepeT
363
+ p V ≡ 0
364
+ mod r.
365
+ 8
366
+
367
+ 3 ⇒ 5 If the GCD of all p × p minors of Q, that is the p-th determinantal divisor, is 1 then
368
+ by Theorem 2.3 all the invariant factors of Q must be units of R, and hence
369
+
370
+ Ip
371
+ 0
372
+
373
+ is a
374
+ Smith form of Q.
375
+ 5 ⇒ 1 Since STS = Ip and Q = USV for some unimodular U, V , a left inverse L can be
376
+ consctructed as L = V −1STU−1.
377
+ 1 ⇒ 4 Suppose Q is an invertible basis; then, by definition, there exists L ∈ Rp×n such that
378
+ LQ = Ip. Hence, a = Lb ∈ Rp.
379
+ 4 ⇒ 2 Let r ∈ R be a non-unit and suppose that there exists Q′ ∈ Rn×p which is rank
380
+ deficient and satisfies Q′ ≡ Q mod r. Let c ∈ null(Q′) be such that the GCD of the
381
+ elements of c is 1. (It is clear that such c exists, by taking any nonzero element of
382
+ null(Q′) and dividing it by the GCD of its entries.) Let D ∈ Rp×n satisfy rD = Q−Q′,
383
+ then Qc = Q′c + (rD)c = D(rc). Hence, if a = c/r ∈ Gp, we have that a ̸∈ Rp but
384
+ Qa = Dc ∈ Rn.
385
+ Remark 3.10 An important subtlety is that property 2 in Theorem 3.9 is being full rank
386
+ modulo every non-unit, while property 2(a) in Theorem 1.2 is being full rank modulo every
387
+ prime. Since every prime is a non-unit, it is clear that the former implies the latter.
388
+ Over a PID, such as the ring of univariate polynomials over a field, then every element
389
+ of the ring admits a unique (up to permutations and multiplications by units) prime decom-
390
+ position; hence, over a PID the converse implication is also true and the two properties are
391
+ thus equivalent, because every element of a PID is either a unit or divisible by a prime. For
392
+ example, Theorem 3.9 implies that every subspace of Qn has an integer basis that is full rank
393
+ modulo p, for every prime number p.
394
+ In general, however, property 2 in Theorem 3.9 is not equivalent to being full rank modulo
395
+ every prime if R is not a PID. For example let A ⊂ C be the ring of algebraic integers (roots
396
+ of monic polynomials in Z[x]) which is a BD [13, Theorem 102] and an EDD [19, Theorem
397
+ 5] so Theorem 3.9 holds. On the other hand, A has no irreducible elements (and hence no
398
+ prime elements), because the square root of an algebraic integer is an algebraic integer. It
399
+ follows that A contains non-units (say, 2 ∈ A but 1
400
+ 2 ̸∈ A so 2 is not a unit of A) that are not
401
+ divisible by any prime elements. We conclude that, for an EDD that is not a PID, property
402
+ 2 as stated in Theorem 3.9, and hence being an invertible basis, is possibly stronger than (the
403
+ analogue of) property 2(a) as stated in Theorem 1.2; indeed there are EDDs in which being
404
+ full rank modulo every prime is not equivalent to being an invertible basis. For example {2}
405
+ is not an invertible basis of A although 2 is (vacuously) full rank modulo any prime.
406
+ 4
407
+ Invertible bases and root vectors over A(Ω)
408
+ Throughout this section, we fix a connected set Ω ⊆ C, assuming that Ω is either compact
409
+ or open, and we denote by A(Ω) the ring of functions that are analytic on Ω. The spectral
410
+ 9
411
+
412
+ theory of analytic matrices is relevant in the applications, and in particular in the context
413
+ of nonlinear eigenvalue problems or in the context of signal processing: see [10] for a recent
414
+ survey on nonlinear eigenvalue problems or [23] for some applications in signal processing.
415
+ We recall that, under the stated assumptions, A(Ω) is an elementary divisor domain (the
416
+ Smith theorem holds) and hence a BD: see for example [7]. Thus, the analysis of Section 3 is
417
+ relevant. In fact, in the case where Ω is a connected compact set, even more strongly A(Ω)
418
+ is actually a PID and a Euclidean domain [7, Lemma 1.3.7]. We consider A(Ω)m×n, the
419
+ set of m × n matrices over A(Ω). By obvious extension of the properties of scalar analytic
420
+ functions, every element of A(Ω)m×n admits a convergent power series at any point λ ∈ Ω,
421
+ say, A(z) = �∞
422
+ j=0 Aj(z − λ)j, with (Aj)j ⊂ Cm×n. A nonzero analytic matrix A(z) ̸= 0 has
423
+ a root of order k at λ if A0 = · · · = Ak−1 = 0 ̸= Ak; or equivalently if A(z) = (z − λ)kB(z)
424
+ for some B(z) ∈ A(Ω)m×n such that B(λ) ̸= 0.
425
+ Let us now fix a matrix A(z) ∈ A(Ω)m×n.
426
+ The most basic definition is that of an
427
+ eigenvalue and of the multiplicities associated with it.
428
+ Definition 4.1 (Eigenvalues and multiplicities) We say that λ ∈ Ω is an eigenvalue of
429
+ the matrix A(z) ∈ A(Ω)m×n if rankA(λ) < rankA(z). Moreover, the partial multiplicities of
430
+ an eigenvalue of A(z) are the orders of λ as a root of the nonzero invariant factors of A(z).
431
+ The number of the nonzero partial multiplicities of λ is called the geometric multiplicity of
432
+ λ, and the sum of the partial multiplicities is called the algebraic multiciplicity of λ.
433
+ The free module M = null(A(z)) admits an invertible basis by Theorem 3.6. Let us take
434
+ one such basis, arrange its elements as the columns of a matrix and denote the latter by
435
+ Q(z). We first show that the set of the columns of Q(z) is an invertible basis if and only if
436
+ no λ ∈ Ω is an eigenvalue of Q(z).
437
+ Corollary 4.2 The set of the columns of the matrix Q(z) ∈ A(Ω)n×p is an invertible basis
438
+ for the module they span if and only if Q(λ) has full column rank for all λ ∈ Ω.
439
+ Proof. The statement follows from Theorem 3.9, but for completeness let us give an
440
+ argument more specific to A(Ω). Suppose that the set of the columns of Q(z) is an invertible
441
+ basis for the module cs(Q(z)), then there exists L(z) ∈ A(Ω)p×n such that L(z)Q(z) = Ip,
442
+ implying L(λ)Q(λ) = Ip and hence Q(λ) has full column rank. Conversely, if Q(λ) has full
443
+ colum rank for all λ ∈ Ω then, noting that the units of A(Ω) are precisely the analytic
444
+ functions with no zeros in Ω, the Smith form of Q(z) is trivial, and hence Q(z) is left
445
+ invertible.
446
+ For brevity, and coherently with common practice in the literature on minimal bases,
447
+ from now on we may write, e.g., “Q(z) is an invertible basis of the module M” as shorthand
448
+ to mean “the set of the columns of Q(z) is an invertible basis for the module M”.
449
+ Definition 4.3 Let A(z) ∈ A(Ω)m×n and suppose that Q(z) ∈ A(Ω)n×p is an invertible
450
+ basis of null(A(z)). Given λ ∈ Ω, we define kerλ A(z) := span Q(λ) ⊆ Cn.
451
+ 10
452
+
453
+ It is clear that kerλ A(z) is well defined, as if Q(z) and T(z) are two invertible bases
454
+ of null(A(z)) then it is easy to prove that Q(z) = T(z)U(z) for some unimodular U(z) ∈
455
+ A(Ω)p×p. It follows that kerλ A(z) is a subspace of Cn. The next result generalizes [4, Lemma
456
+ 2.9].
457
+ Lemma 4.4 v ∈ kerλ A(z) ⇔ ∃w(z) ∈ A(Ω)n : A(z)w(z) = 0 and w(λ) = v.
458
+ Proof. Let Q(z) be an invertible basis of null(A(z)). Then from the existence of w(z) we
459
+ deduce that w(z) = Q(z)c(z) for some c(z) ∈ Ap, and hence v = Q(λ)c(λ). Conversely, if
460
+ v = Q(λ)c for some constant c ∈ Cp then set w(z) := Q(z)c.
461
+ We are now in the position to extend some relevant definitions from [4, 20] to the case
462
+ of analytic matrices. (See also [22].)
463
+ Definition 4.5 (Root vectors) Given A(z) ∈ A(Ω)m×n and λ ∈ Ω, we say that r(z) ∈
464
+ A(Ω)n is a root vector of order k ≥ 1 at λ for A(z) if r(λ) ̸∈ kerλ A(z) and A(z)r(z) has a
465
+ root of order k at λ, i.e., A(z)r(z) = (z − λ)kv(z) for some v(z) ∈ A(Ω)m, v(λ) ̸= 0.
466
+ Definition 4.6 (λ-independent, complete, and maximal sets of root vectors) Given
467
+ A(z) ∈ A(Ω)m×n and λ ∈ Ω, suppose that Q(z) ∈ A(Ω)n×p is an invertible basis of null(A(z))
468
+ and that {ri(z)}s
469
+ i=1 ⊂ A(Ω)n is a set of root vectors at λ for A(z) having orders {ki}s
470
+ i=1.
471
+ Then:
472
+ • Such a set is λ-independent if
473
+
474
+ Q(λ)
475
+ r1(λ)
476
+ . . . rs(λ)
477
+
478
+ ∈ Cn×(p+s) has full column rank;
479
+ • A λ-independent set is complete if there is no λ-independent set of strictly larger car-
480
+ dinality;
481
+ • Such a complete set is ordered if k1 ≥ · · · ≥ ks > 0;
482
+ • A complete ordered set is maximal if, for all j, there is no root vector v(z) at λ of order
483
+ k > kj such that
484
+
485
+ Q(λ)
486
+ x1(λ)
487
+ . . .
488
+ xj−1(λ)
489
+ v(λ)
490
+
491
+ has full column rank.
492
+ At this point, we are well positioned to generalize from polynomials (or rational functions)
493
+ to analytic functions several useful results found in [4, Sections 3 and 4] and in [5, 22]. We
494
+ state them below as a number of propositions and theorems; in many cases, however, we
495
+ omit the proofs as they are essentially the same as the proofs in [4, 22] for the polynomial
496
+ case. Here, “essentially” points to minor modifications that, once made, allow us to follow
497
+ the same main ideas of the original proofs. Typical examples of these minor modifications
498
+ are: one may need to replace minimal bases with invertible bases, the ring of polynomials
499
+ with the ring A(Ω), the field of rational functions with the field of functions meromorphic on
500
+ Ω, or the expansion of a polynomial round a point to the Taylor series of an analytic function
501
+ about a point in its domain of analyticity, etc. When, instead, a proof must be significantly
502
+ different than its analogue appeared in [4, 5, 22] for polynomial or rational matrices, we have
503
+ included it.
504
+ 11
505
+
506
+ Theorem 4.7 (Generalization of Theorem 3.1 in [4]) Let S(z) ∈ A(Ω)m×n be in Smith
507
+ form, and suppose that the rank of S(x) is r and that the geometric multiplicity of λ as an
508
+ eigenvalue of S(z) is s. Then {er, er−1, . . . , er−s+1}, where ei ∈ Cn is the i-th vector of the
509
+ canonical basis, is a maximal set of root vectors at λ for S(x); moreover, their orders are
510
+ the nonzero partial multiplicities of λ as an eigenvalue of S(x).
511
+ We note that Theorem 4.7 was stated in [4] referring to the local Smith form at λ rather
512
+ than to the global Smith form. The same could be done for analytic matrices, but for the
513
+ sake of conciseness – and since the results that follow can be equivalently deduced from
514
+ either the local or global version of Theorem 4.7 – we have decided here to state a global
515
+ version rather than having to introduce the definition of local Smith form; interested readers
516
+ can find it for instance in [4].
517
+ Lemma 4.8 (Generalization of Lemma 3.3 in [4]) Let P(z), Q(z) ∈ A(Ω)m×n and λ ∈
518
+ Ω. Suppose that Q(z) = A(z)P(z)B(z) for some A(z) ∈ A(Ω)m×m, B(z) ∈ A(Ω)n×n and that
519
+ det A(λ) det B(λ) ̸= 0; moreover, let M(z), N(z) be invertible bases for null(P(z)), null(Q(z))
520
+ respectively. Then kerλ P(z) = span M(λ) = span B(λ)N(λ) and kerλ Q(z) = span N(λ) =
521
+ span adj B(λ)M(λ).
522
+ Theorem 4.9 (Generalization of Theorem 3.4 in [4]) Let P(z), Q(z) ∈ A(Ω)m×n and
523
+ λ ∈ Ω. Suppose that Q(z) = A(z)P(z)B(z) for some A(z) ∈ A(Ω)m×m, B(z) ∈ A(Ω)n×n
524
+ and that det A(λ) det B(λ) ̸= 0. Then:
525
+ • If {vi(z)}s
526
+ i=1 are a maximal (resp. complete, λ-independent) set of root vectors at λ for
527
+ Q(z) with orders ℓ1 ≥ . . . ℓs > 0, then {B(z)ri(z)}s
528
+ i=1 are a maximal (resp. complete,
529
+ λ-independent) set of root vectors at λ for P(z), with the same orders;
530
+ • If {wi(z)}s
531
+ i=1 are a maximal (resp. complete, λ-independent) set of root vectors at λ
532
+ for P(z) with orders ℓ1 ≥ . . . ℓs > 0, then {adj B(z)ri(z)}s
533
+ i=1 are a maximal (resp.
534
+ complete, λ-independent) set of root vectors at λ for Q(z), with the same orders.
535
+ Note that Theorem 4.7 and Theorem 4.9 imply that every analytic matrix A(z) has
536
+ a maximal set of root vectors at λ, whose cardinality is precisely equal to the geometric
537
+ multiplicity of λ as an eigenvalue of A(z). (To make full sense of the latter statement, we
538
+ must formally agree that, if λ is not an eigenvalue, then the empty set is a set, and in fact
539
+ the only possible set, of root vectors at λ for A(z).)
540
+ Theorem 4.10 (Generalization of Theorem 3.10 in [22]) Let A(z) ∈ A(Ω)m×n and
541
+ suppose that Q(z) ∈ A(Ω)n×p is an invertible basis for null(A(z)). Suppose that {vi(z)}s
542
+ i=1
543
+ are root vectors at λ ∈ Ω for A(z). Then, they are a complete set if and only if the set of
544
+ the columns of the matrix
545
+ B :=
546
+ �Q(λ)
547
+ v1(λ)
548
+ . . . vs(λ)�
549
+ is a basis for ker A(λ).
550
+ 12
551
+
552
+ Proof. By definition, A(z)Q(z) = 0 and A(z)vi(z) = (z − λ)kwi(z), implying A(λ)B = 0.
553
+ If {vi(z)}s
554
+ i=1 is complete, then it is in particular λ-independent so B has full column rank.
555
+ If the set of the columns of B is not a a basis for ker A(λ), we can complete it to a basis by
556
+ adding some (constant) vectors {xi}c
557
+ i=1. But then xi are root vectors at λ for A(z), and by
558
+ construction {vi(z)}s
559
+ i=1 ∪ {xi}c
560
+ i=1 are a λ-independent set, contradicting completeness of the
561
+ original set. Conversely, if the set of root vectors is not complete then the set of the columns
562
+ of B cannot be a basis of ker A(λ) for dimensional reasons, as by starting from a complete
563
+ set of root vectors we can construct t > p + s linearly independent vectors in ker A(λ).
564
+ Theorem 4.11 (Generalization of Theorem 4.1 and Theorem 4.2 in [4]) Suppose that
565
+ A(z) ∈ A(Ω)m×n has partial multiplicities m1 ≥ · · · ≥ ms at λ ∈ Ω. Then:
566
+ 1. All complete sets of root vectors of A(z) at λ have the same cardinality, equal to s;
567
+ 2. All maximal sets of root vectors of A(z) at λ have the same ordered list of orders
568
+ m1 ≥ · · · ≥ ms, equal in turn to the partial multiplicities of λ as an eigenvalue of
569
+ A(z);
570
+ 3. If {vi(z)}s
571
+ i=1 is an ordered complete set of root vectors at λ for A(z) having orders
572
+ ℓ1 ≥ · · · ≥ ℓs, then
573
+ 3.1 mi ≥ ℓi for all i = 1, . . . , s;
574
+ 3.2 {vi(z)}s
575
+ i=1 is a maximal set of root vectors at λ for A(z) if and only if ℓi = mi for
576
+ all i = 1, . . . , s;
577
+ 3.3 {vi(z)}s
578
+ i=1 is a maximal set of root vectors at λ for A(z) if and only if �s
579
+ i=1 mi =
580
+ �s
581
+ i=1 ℓi.
582
+ Theorem 4.12 (Generalization of Lemma 5.2 in [5]) Suppose that A(z) ∈ A(Ω)m×n
583
+ has partial multiplicities m1 ≥ · · · ≥ ms at λ ∈ Ω.
584
+ Moreover, let {vi(z)}c
585
+ i=1 be a λ-
586
+ independent set of root vectors at λ for A(z) having orders ℓ1 ≥ · · · ≥ ℓc. Then c ≤ s
587
+ and ℓi ≤ mi for all i = 1, . . . , c.
588
+ The concept of root vectors allows us also to give appropriate definitions of eigenvectors,
589
+ even for rectangular or square but singular analytic matrices. To this goal, we give below
590
+ some relevant definitions that generalize analogous ones given (for polynomial or rational
591
+ matrices) in [4, 22]. Fix an analytic matrix A(z) ∈ A(Ω)m×n and a scalar λ ∈ Ω, and note
592
+ that generally kerλ A(z) ⊆ ker A(λ). However, the inclusion is strict if and only if λ is an
593
+ eigenvalue of A(z) if and only if the cardinality of any maximal set of root vectors at λ for
594
+ A(z) is positive. This motivates the following definition.
595
+ Definition 4.13 An equivalence class [v] ∈ ker A(λ)/ kerλ A(z) is called a right eigenvector
596
+ of A(z) associated with λ if [v] ̸= [0].
597
+ 13
598
+
599
+ Following the same arguments as in [4, 22], we see that Definition 4.13 implies that
600
+ eigenvectors associated with λ exists if and only if λ is an eigenvalue. Theorem 4.10 implies
601
+ moreover that [v] is an eigenvector if and only if
602
+ [0] ̸= [v] ∈ span{[x1(λ)], . . . , [xs(λ)]}
603
+ where {xi(λ)}s
604
+ i=1 is any complete set of root vectors at λ for A(z). Equivalently, [v] is an
605
+ eigenvector if and only if v = �s
606
+ i=1 xi(λ)ci + w for some coefficients ci ∈ C and some vector
607
+ w ∈ kerλ A(z). When λ is a simple eigenvalue, it is possible to make v unique up to a phase,
608
+ by asking that v ∈ kerλ A(z)⊥ and that ∥v∥2 = 1; in the polynomial case, this was useful for
609
+ example in [14, 17] in the context of conditioning analysis and in [12, 14] to devise practical
610
+ algorithms. We expect that similar developments may be possible also in the analytic case.
611
+ We conclude by noting that, if A(z) has full column rank, then kerλ A(z) = {0} and thus we
612
+ recover the familiar definition of an eigenvector being a nonzero vector v such that A(λ)v = 0.
613
+ Remark 4.14 In this paper, we focused on extending the theory of root vectors from polyno-
614
+ mial [4] to analytic matrices, by using invertible bases and the theory of modules. In [22], the
615
+ theory of root vectors was extended from polynomial to rational matrices by using the theory
616
+ of discrete valuations. Adding valuation theory to the tools of this paper makes it similarly
617
+ possible to state a theory of root vectors for meromorphic matrices. We opted to not do it in
618
+ this paper for two reasons: (1) because meromoprhic matrices do not appear to be as central,
619
+ in the current linear algebra literature, as polynomial, analytic or rational matrices (2) for
620
+ simplicity of exposition, i.e., to avoid an excessive density of tools that are possibly not too
621
+ familiar to every matrix theorist or numerical linear algebraist. We thus leave the task to
622
+ future research, but for now we comment for an interested reader that it is not difficult to
623
+ generalize the theory in [22] from rational to meromorphic functions, and then to combine
624
+ it with the theory of this paper, thus producing a theory of root vectors for meromorphic
625
+ functions.
626
+ 4.1
627
+ Example
628
+ In this subsection, we work out an example to illustrate the results of Section 4. Let Ω = C
629
+ so that A(Ω) is the ring of entire functions, and consider the analytic matrix
630
+ A(z) =
631
+
632
+
633
+ 2ze2z
634
+ zez
635
+ z sinh(z)
636
+ e2z(sin(z)2 − 2z)
637
+ ez(sin(z)2 − z)
638
+ ez cos(z) sin(z)2 − z sinh(z)
639
+ ez(2zez − sin(z)2)
640
+ zez − sin(z)2
641
+ cos(z)3 − cos(z) + z sinh(z)
642
+
643
+  .
644
+ We are going to study the spectral properties of A(z) at its eigenvalue λ = 0: in particular
645
+ we will exhibit a maximal set of root vectors, thus obtaining the partial multiplicities of 0 as
646
+ well as corresponding eigenvectors (according to Definition 4.13). As a preliminary step, note
647
+ that a straightforward computation shows that det A(z) = 0, and that the leading principal
648
+ 2 × 2 minor of A(z) is e3zz sin(z)2 ̸= 0. Hence, rank A(z) = 2. It can be readily verified that
649
+ 14
650
+
651
+ an invertible basis of null(A(z)) is
652
+ Q(z) =
653
+
654
+
655
+ ez cos(z) − sinh(z)
656
+ ez(sinh(z) − 2ez cos(z))
657
+ e2z
658
+
659
+  ⇒ ker0 A(z) = span
660
+
661
+
662
+
663
+
664
+ 1
665
+ −2
666
+ 1
667
+
668
+
669
+
670
+  .
671
+ Let now
672
+ v1(z) =
673
+
674
+
675
+ 1
676
+ −ez
677
+ 0
678
+
679
+  ,
680
+ v2(z) =
681
+
682
+
683
+ 1
684
+ −2ez
685
+ 0
686
+
687
+  .
688
+ We claim that {v1(z), v2(z)} is a maximal set of root vectors at 0 for A(z). Note first that
689
+ A(z)v1(z) = ze2z
690
+
691
+
692
+ 1
693
+ −1
694
+ 1
695
+
696
+  ,
697
+ A(z)v2(z) = ez sin(z)2
698
+
699
+
700
+ 0
701
+ −ez
702
+ 1
703
+
704
+  ,
705
+ and that
706
+ v1(0) =
707
+
708
+
709
+ 1
710
+ −1
711
+ 0
712
+
713
+  ̸∈ ker0 A(z),
714
+ v2(0) =
715
+
716
+
717
+ 1
718
+ −2
719
+ 0
720
+
721
+  ̸∈ ker0 A(z),
722
+ and hence v1(z), v2(z) are root vectors at 0 for A(z) of order 1 and 2 respectively: note
723
+ indeed the Taylor expansions zez = z + o(z) and ez sin(z)2 = z2 + o(z). The set {vi(z)}2
724
+ i=1
725
+ is 0-independent because
726
+ rank
727
+
728
+ Q(0)
729
+ v1(0)
730
+ v2(0)
731
+
732
+ = rank
733
+
734
+
735
+ 1
736
+ 1
737
+ 1
738
+ −2
739
+ −1
740
+ −2
741
+ 1
742
+ 0
743
+ 0
744
+
745
+  = 3.
746
+ Moroever, we have A(0) = 0 and hence, by Theorem 4.10, the set {vi(z)}2
747
+ i=1 is complete.
748
+ Finally, one can compute a Smith form of A(z), for example by computing determinantal
749
+ divisors (GCDs of minors of a given size); indeed, recall from the introduction that the
750
+ invariant factors are the ratios of the determinantal divisor. We thus obtain that the invariant
751
+ factors of A(z) are z, sin(z)2, 0. This implies that the partial multiplicities of 0 are 1, 2, and
752
+ by Theorem 4.11 the set {vi(z)}2
753
+ i=1 is therefore maximal.
754
+ Moreover, [v1(0)] and [v2(0)],
755
+ seen as equivalence classes
756
+ mod ker0 A(z), are linearly independent eigenvectors of A(z)
757
+ associated with the eigenvalue 0.
758
+ Acknowledgements
759
+ I thank Froil´an Dopico for reading a preliminary version of this paper and sharing very useful
760
+ remarks.
761
+ 15
762
+
763
+ References
764
+ [1] A. Amparan, S. Marcaida and I. Zaballa, On coprime rational function matrices,
765
+ Linear Algebra Appl. 507, 1–31, 2016.
766
+ [2] W. C. Brown, Matrices over commutative rings, Marcel Dekker, New York, NY (USA),
767
+ 1993.
768
+ [3] P.
769
+ L.
770
+ Clark,
771
+ Commutative
772
+ algebra,
773
+ Lecture
774
+ notes
775
+ available
776
+ at
777
+ http://alpha.math.uga.edu/˜pete/integral.pdf, 2015.
778
+ [4] F. Dopico and V. Noferini, Root polynomials and their role in the theory of matrix
779
+ polynomials, Linear Algebra Appl. 584, 37–78, 2020.
780
+ [5] F. Dopico and V. Noferini, The DL(P) vector space of pencils for singular matrix
781
+ polynomials, Preprint, 2022, https://arxiv.org/pdf/2212.08212.pdf
782
+ [6] G.D. Forney Jr., Minimal bases of rational vector spaces, with applications to multi-
783
+ variable linear systems, SIAM J. Control 13, 493–520, 1975.
784
+ [7] S. Friedland, Matrices: Algebra, Analysis and Applications, World Scientific, 2015.
785
+ [8] P. A. Fuhrmann and U. Helmke, The mathematics of networks of linear systems, ,
786
+ Springer, 2015.
787
+ [9] I. Gohberg, P. Lancaster, and L. Rodman, Matrix Polynomials, SIAM, Philadel-
788
+ phia, PA, USA, 2009, (unabridged republication of book first published by Academic
789
+ Press in 1982).
790
+ [10] S. G¨uttel and F. Tisseur, The nonlinear eigenvalue problem, Acta Numer. 26, 1–94,
791
+ 2017.
792
+ [11] P. J. Hilton and U. Stammbach A course in homological algebra, 2nd ed., Springer,
793
+ New York, NY (USA), 1997.
794
+ [12] M. E. Hochstenbach, C. Mehl and B. Plestenjak, Solving singular gen-
795
+ eralized eigenvalue problems. Part II: Projection and agumentation, Preprint, 2022,
796
+ https://arxiv.org/pdf/2208.01359.pdf.
797
+ [13] I. Kaplansky, Commutative rings, University of Chicage press, Chicago, IL (USA),
798
+ 1974.
799
+ [14] D. Kressner and I. ˇSain Giblic, Singular quadratic eigenvalue problems: Lineariza-
800
+ tion and weak condition numbers, Preprint, 2022, https://arxiv.org/pdf/2204.07424.pdf.
801
+ [15] D. Khurana, On GCD and LCM in domains – A conjecture of Gauss, Reson. 8, 72–79,
802
+ 2003.
803
+ 16
804
+
805
+ [16] D. Lorenzini, Elementary Divisor domains and B´ezout domains, J. Algebra 371, 609–
806
+ 619, 2012.
807
+ [17] M. Lotz and V. Noferini, Wilkinson’s bus: Weak condition numbers, with an ap-
808
+ plication to singular polynomial eigenproblems, Found. Comput. Math. 20, 1439–1473,
809
+ 2020.
810
+ [18] D. S. Mackey, Minimal indices and minimal bases via filtrations, Electron. J. Linear
811
+ Algebra 37, 276–294, 2021.
812
+ [19] M. Newman and R. C. Thompson, Matrices over rings of algebraic integers, Linear
813
+ Algebra Appl. 145, 1–20, 1991.
814
+ [20] V. Noferini, The behaviour of the complete eigenstructure of a polynomial matrix
815
+ under a generic rational transformation, Electron. J. Linear Algebra 23, 607–624, 2012.
816
+ [21] V. Noferini, L. Nyman, J. P´erez and M.C. Quintana, Perturbation theory for
817
+ transfer function matrices, Preprint, 2022, https://arxiv.org/pdf/2207.06791.pdf
818
+ [22] V. Noferini and P. Van Dooren, Root vectors of polynomial and rational matrices:
819
+ theory and computation, Linear Algebra Appl. 656, 510–540, 2023.
820
+ [23] S. Weiss, J. Pestana and I. K. Proudler, On the existence and uniqueness of
821
+ the eigenvalue decomposition of a paraHermitian matrix, IEEE Trans. Signal Process.
822
+ 66(10), 2659–2672, 2018.
823
+ [24] W. A. Wolovich. The determination of state-space representations for linear multi-
824
+ variable systems, Automatica 9, 97–106, 1973.
825
+ 17
826
+
UdFOT4oBgHgl3EQf5zR2/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
UtE4T4oBgHgl3EQfnA0d/content/tmp_files/2301.05172v1.pdf.txt ADDED
@@ -0,0 +1,2050 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Unified simulation methods for quantum acoustic devices
2
+ Hugo Banderier,∗ Maxwell Drimmer,† and Yiwen Chu
3
+ Department of Physics, Eidgen¨ossiche Technische Hochschule Z¨urich, 8093 Z¨urich, Switzerland
4
+ and
5
+ Quantum Center, Eidgen¨ossiche Technische Hochschule Z¨urich, 8093 Z¨urich, Switzerland
6
+ (Dated: January 13, 2023)
7
+ In circuit quantum acoustodynamics (cQAD), superconducting circuits are combined with acous-
8
+ tic resonators to create and control non-classical states of mechanical motion.
9
+ Simulating these
10
+ systems is challenging due to the extreme difference in scale between the microwave and mechanical
11
+ wavelengths. All existing techniques simulate the electromagnetic and mechanical subsystems sep-
12
+ arately. However, this approach may not be adequate for all cQAD devices. Here, we demonstrate
13
+ a single simulation of a superconducting qubit coupled to an acoustic and a microwave resonator
14
+ and introduce two methods for using this simulation to predict the frequencies, coupling rates, and
15
+ energy-participation ratios of the electromechanical modes of the hybrid system. We also discuss
16
+ how these methods can be used to investigate important dissipation channels and quantify the non-
17
+ trivial effects of mode hybridization in our device. Our methodology is flexible and can be extended
18
+ to other acoustic resonators and quantum degrees of freedom, providing a valuable new tool for
19
+ designing hybrid quantum systems.
20
+ I.
21
+ INTRODUCTION
22
+ Circuit quantum acoustodynamics (cQAD) provides
23
+ the opportunity to combine the unique advantages
24
+ of superconducting (SC) circuits and mechanical res-
25
+ onators [1, 2].
26
+ A device that integrates the numerous
27
+ long-lived modes of compact mechanical resonators [3–
28
+ 5] with the strong quantum nonlinearity of SC qubits is
29
+ potentially useful for quantum information processing [6–
30
+ 8] and tests of fundamental physics [9]. SC qubits have
31
+ already been combined with a wide variety of mechani-
32
+ cal elements, including membranes [10, 11], bulk acous-
33
+ tic wave (BAW) resonators [12–14], surface acoustic wave
34
+ resonators [15–17], and phononic crystals [18].
35
+ Finite element (FE) simulations are a crucial de-
36
+ sign tool in both circuit quantum electrodynamics
37
+ (cQED) [19–24] and solid mechanics [25] for predicting
38
+ the behavior of complex solid-state structures.
39
+ Both
40
+ fields have independently developed mature techniques
41
+ which rely on different strategies and software. For exam-
42
+ ple, quantum circuits are modeled using electromagnetic
43
+ simulation software like Ansys HFSS [26], Microwave
44
+ Office [27], or Sonnet [28] while COMSOL Multiphysics
45
+ (COMSOL) [29] is the preferred choice for performing
46
+ FE simulations of acoustic resonators.
47
+ Techniques from cQED and solid mechanics can be
48
+ combined in order to simulate cQAD devices. If an elec-
49
+ tromechanical system can be modeled as a lumped ele-
50
+ ment, it is possible to simulate the electromechanical re-
51
+ sponse in isolation from the Josephson circuit [30, 31].
52
+ This response is represented by an equivalent circuit
53
+ which can be quantized to determine the system’s Hamil-
54
+ tonian [32]. In certain cases, however, isolating an elec-
55
+ ∗ Current affiliation : Oeschger Centre for Climate Change Re-
56
+ search and Institute of Geography, Universit¨at Bern, 3012 Bern,
57
+ Switzerland
58
+ † Corresponding author : max.drimmer@phys.ethz.ch
59
+ trically small subsystem may not be possible meaning
60
+ that the system cannot be described by simple circuit.
61
+ The ℏBAR [33, 34], a cQAD device that features a 3-D
62
+ transmon qubit [35] piezoelectrically coupled to a high-
63
+ overtone BAW resonator (HBAR), falls into this cate-
64
+ gory.
65
+ In this paper, we demonstrate two simulation ap-
66
+ proaches that unify FE techniques from cQED and solid
67
+ mechanics using a single COMSOL model without the
68
+ need for an equivalent circuit.
69
+ In the first approach,
70
+ which we call the “unhybridized eigenmode approach,”
71
+ we solve for the eigenmodes of the electric and displace-
72
+ ment fields separately (i.e.
73
+ without any piezoelectric
74
+ coupling).
75
+ This yields the mode structure of the un-
76
+ hybridized electrical and mechanical subsystems.
77
+ One
78
+ can then evaluate the electromechanical coupling rate
79
+ between an electrical and a mechanical eigenmode us-
80
+ ing an overlap integral inside the piezoelectric material
81
+ (Eq. 5). In the second approach, which we call the “hy-
82
+ bridized eigenmode approach”, we simultaneously solve
83
+ for the coupled electric and displacement fields to find
84
+ the dressed eigenmodes of the entire system. We demon-
85
+ strate this approach by first presenting a Hamiltonian
86
+ formulation that extends the energy-participation ratio
87
+ (EPR) method [23] to mechanical degrees of freedom.
88
+ We then use it to extract important Hamiltonian param-
89
+ eters that arise from electromechanical coupling, such as
90
+ cross-Kerr nonlinearities, anharmonicities, and mechani-
91
+ cal EPRs in the dispersive regime. While simulating the
92
+ coupled fields is more computationally intensive, the re-
93
+ sults reflect that hybridization of the electromagnetic and
94
+ mechanical subsystems affects the frequency and shape
95
+ of the modes, which can in turn impact the predicted
96
+ coupling and loss rates.
97
+ arXiv:2301.05172v1 [quant-ph] 12 Jan 2023
98
+
99
+ 2
100
+ II.
101
+ HYBRID QUANTUM INTERACTIONS
102
+ We consider a general system consisting of a SC cir-
103
+ cuit with J transmons and N − J linear electromagnetic
104
+ modes interacting with a mechanical resonator support-
105
+ ing M modes. Even though the N linear electromagnetic
106
+ modes and M mechanical modes are identically described
107
+ as modes of a bosonic resonator, we use different letters
108
+ to distinguish them for clarity in the rest of this sec-
109
+ tion. Each of the J transmons can be described using a
110
+ Hamiltonian that is a sum of a linear resonator term and
111
+ a nonlinear term [32]. When the interactions are written
112
+ under the rotating wave approximation, the Hamiltonian
113
+ is
114
+ ˆH
115
+ ℏ =
116
+ N
117
+
118
+ n
119
+ ˜ωnˆ˜a†
120
+ nˆ˜an+
121
+ M
122
+
123
+ m
124
+ Ωmˆb†
125
+ mˆbm+
126
+ N,M
127
+
128
+ n,m
129
+ ˜gnm
130
+
131
+ ˆ˜a†
132
+ nˆbm + ˆb†
133
+ mˆ˜aj
134
+
135
+
136
+ N,N
137
+
138
+ n̸=n′
139
+ ςnn′
140
+
141
+ ˆ˜a†
142
+ nˆ˜an′ + ˆ˜a†
143
+ n′ˆ˜an
144
+
145
+
146
+ J
147
+
148
+ j
149
+ Ej
150
+
151
+
152
+ cos ˆθj + 1
153
+ 2
154
+ ˆθ2
155
+ j
156
+
157
+ (1)
158
+ where we have introduced ˜ωn and ˆ˜an (Ωm and ˆbm) as the
159
+ frequencies and bosonic ladder operators of the nth (mth)
160
+ linear electromagnetic (mechanical) resonator mode, the
161
+ Josephson energy of the jth junction Ej and its flux
162
+ ˆθj = θZPF,j
163
+
164
+ ˆ˜aj + ˆ˜a†
165
+ j
166
+
167
+ where θZPF,j are the associated
168
+ zero-point fluctuations (ZPFs), and ςnn′ (˜gnm) are the
169
+ electromagnetic (electromechanical) two-mode coupling
170
+ rates. The detuning between two modes are defined as
171
+ ∆nn′ = ˜ωn′ − ˜ωn and ∆nm = Ωm − ˜ωn.
172
+ The cou-
173
+ pling between two modes are said to be dispersive if
174
+ |∆nn′| ≫ |ςnn′| or |∆nm| ≫ |gnm|.
175
+ Eq. 1 is a nonlinear Hamiltonian that cannot be di-
176
+ rectly modeled using standard FE simulation techniques.
177
+ Instead, we follow Ref. [19] by rewriting the Hamiltonian
178
+ as a sum of linear and nonlinear terms. Then we can
179
+ use FE simulations to find the linear eigenmodes, from
180
+ which we extract the relevant parameters that describe
181
+ the nonlinear terms using the EPR method.
182
+ A.
183
+ Unhybridized eigenmode approach
184
+ If we ignore the coupling between the electromagnetic
185
+ and mechanical degrees of freedom (third term in Eq. 1),
186
+ we can simulate the two subsystems individually. The
187
+ results of electromagnetics-only simulations (i.e. simu-
188
+ lations with solid mechanics and piezoelectricity turned
189
+ off) are dressed eigenstates of the linear electromagnetic
190
+ part of the Hamiltonian (Terms 1 and 4 of Eq. 1). Thus
191
+ the Hamiltonian can be partially diagonalized
192
+ ˆH
193
+ ℏ =
194
+ N
195
+
196
+ n=1
197
+ ωnˆa†
198
+ nˆan+
199
+ M
200
+
201
+ m
202
+ Ωmˆb†
203
+ mˆbm+
204
+ N,M
205
+
206
+ nm
207
+ gnm
208
+
209
+ ˆa†
210
+ nˆbm + ˆb†
211
+ mˆan
212
+
213
+
214
+ J
215
+
216
+ j
217
+ Ej
218
+
219
+
220
+
221
+ p=4
222
+ cp
223
+
224
+
225
+ N
226
+
227
+ n=1
228
+ ϕnjˆan + H.c.
229
+
230
+
231
+ p
232
+ (2)
233
+ In this expression, ˆa are the dressed electromagnetic lad-
234
+ der operators, cp are the cosine expansion coefficients,
235
+ and ϕnj are the ZPFs of the flux in the j-th junction
236
+ when only dressed mode n is excited and Ej are the j-th
237
+ junction’s Josephson energies.
238
+ The solutions of the mechanical simulations are ex-
239
+ actly the modes described Term 2 of Eq. 1. The elec-
240
+ tromechanical interaction is now written in terms of the
241
+ dressed electromagnetic eigenmodes. The exact expres-
242
+ sion of gnm depends on the nature of the interaction.
243
+ Here, we will consider the piezoelectric coupling which
244
+ we describe in detail in Appendix A. From now on we
245
+ will refer to the dressed modes ˆan,ˆbm of this picture as
246
+ “unhybridized” because the next approach will further
247
+ hybridize these.
248
+ B.
249
+ Hybridized eigenmode approach
250
+ As there is no conceptual difference between an elec-
251
+ tromagnetic and a mechanical mode in Eq. 1, we can
252
+ equivalently choose to express the Hamiltonian in terms
253
+ of N + M hybrid electromechanical modes with eigen-
254
+ values ξk, bosonic ladder operators ˆck, and associated
255
+ junction flux ZPFs φkj
256
+ ˆH
257
+ ℏ =
258
+ N+M
259
+
260
+ k=1
261
+ ξkˆc†
262
+ kˆck −
263
+ J
264
+
265
+ j
266
+ Ej
267
+
268
+
269
+
270
+ p=4
271
+ cp
272
+
273
+
274
+ N+M
275
+
276
+ k=1
277
+ φkjˆck + H.c.
278
+
279
+
280
+ p
281
+ (3)
282
+ Under the dispersive and the perturbative assumptions,
283
+ detailed in Appendix B, we can limit the expansion of
284
+ the second term to p = 4 and only keep only excitation
285
+ number-preserving interactions to obtain
286
+ ˆHp=4
287
+
288
+ =
289
+
290
+ k
291
+ −∆kˆc†
292
+ kˆck−1
293
+ 2αkˆc†2
294
+ k ˆc2
295
+ k−
296
+
297
+ l<k
298
+ 1
299
+ 2χklˆc†
300
+ kˆckˆc†
301
+ l ˆcl (4)
302
+ This expression highlights several experimentally rel-
303
+ evant quantities:
304
+ ∆k
305
+ =
306
+ 1
307
+ 2
308
+
309
+ l χkl are the effective
310
+ Lamb shifts, αk are the anharmonicities, and χkl =
311
+ ℏ−1 �
312
+ j Ejφ2
313
+ kjφ2
314
+ lj are the total cross-Kerr shifts induced
315
+ between modes k and l. Under these approximations all
316
+ the parameters depend on the zero-point fluctuations of
317
+ the junctions’ fluxes in each mode, φkj. We note that in
318
+ cQAD, the perturbative assumption is not always valid in
319
+ the dispersive regime. However, as shown in Appendix B,
320
+ the correction to these quantities can still be expressed
321
+ using the same ZPFs.
322
+
323
+ 3
324
+ In the two approaches described above, we have devel-
325
+ oped Hamiltonians with key unknowns that can be ob-
326
+ tained from simulations. In the unhybridized eigenmode
327
+ approach, they are the bare mode frequencies ωn and
328
+ Ωm, the junction flux ZPFs in the bare electromagnetic
329
+ modes ϕnj, as well as the piezoelectric pairwise coupling
330
+ rates gnm.
331
+ In the hybridized eigenmode approach, we
332
+ only need to solve for the hybridized mode frequencies ξk
333
+ and the junction flux ZPFs φkj.
334
+ III.
335
+ SIMULATING HYBRID QUANTUM
336
+ DEVICES
337
+ A.
338
+ Physics interfaces
339
+ We begin each simulation by choosing physics inter-
340
+ faces in COMSOL, each of which defines a vector field
341
+ along with its equations of motion to be solved. We used
342
+ the Electromagnetic Waves, Frequency Domain in-
343
+ terface (emw) in the RF Module for modeling SC circuits
344
+ and microwave cavities and used the Solid Mechanics
345
+ interface (solid) in the Structural Mechanics Module for
346
+ the acoustic resonator.
347
+ The second step is dynamically combining these inter-
348
+ faces together. In general, linking interfaces A and B is
349
+ simply done by calling the field defined in A in a domain
350
+ or boundary condition on B and vice versa.
351
+ In many
352
+ cases, COMSOL has built-in multiphysics interfaces that
353
+ perform this step. However, no such interface exists be-
354
+ tween solid and emw.
355
+ Therefore, the coupling must
356
+ be defined manually. In this work, electromagnetic and
357
+ mechanical objects are coupled by the piezoelectric ef-
358
+ fect [36]. In a piezoelectric medium, the wave equations
359
+ for the electric and displacement fields are modified to
360
+ become Eqs. A23 and A24 as derived in Appendix A.
361
+ These modifications are implemented in our simulation
362
+ using three additional domain conditions, represented as
363
+ nodes of the physics interfaces. Specifically, the effec-
364
+ tive medium and external current density nodes
365
+ are added to the emw interface and an external stress
366
+ node is added to the solid interface. A detailed descrip-
367
+ tion is provided in Appendix C.
368
+ B.
369
+ Model of the device
370
+ We use the method presented in this work to simu-
371
+ late an ℏBAR similar to those used in Refs. [33, 34].
372
+ This device is comprised of two chips: The first has one
373
+ single-junction transmon qubit with one pad extended to
374
+ form an antenna, and the second has a piezoelectric dome
375
+ which transduces the qubit’s electric field into mechan-
376
+ ical modes of the HBAR (Fig. 1a). The two substrates
377
+ are bonded together such that the antenna is aligned un-
378
+ derneath the dome [34]. Then the assembly is situated
379
+ in a 3-D microwave cavity (Fig. 1b).
380
+ cQED elements
381
+ are simulated by applying a perfect electric conductor
382
+ z
383
+ 2 µm
384
+ AlN
385
+ Al
386
+ 40 µm
387
+ a)
388
+ b)
389
+ d)
390
+ x
391
+ y
392
+ 100 μm
393
+ c)
394
+ z
395
+ x
396
+ y
397
+ x
398
+ y
399
+ 5 mm
400
+ 200 μm
401
+ ~1 μm
402
+ FIG. 1. Simulating the ℏBAR. a) A schematic of the ℏBAR
403
+ device. The bottom chip is a 3-D transmon qubit, modified
404
+ with an antenna (the extension at the right), on a dielectric
405
+ substrate. The top chip hosts a HBAR, formed by a piezo-
406
+ electric dome, positioned above the qubit antenna. The pur-
407
+ ple arrows represent the electric field of the qubit-like mode.
408
+ b) Full simulation space defined by half of a rectangular SC
409
+ microwave cavity with with cylindrical ends (lavender vol-
410
+ ume). The simulation is symmetric about the x-z plane clos-
411
+ est to the viewer. The cyan structure in the red rectangle is
412
+ the ℏBAR. c) Displacement field of a simulated fundamental
413
+ HBAR mode in a 2-D slice through the symmetry axis. This
414
+ image is not to scale and is cropped to show the bottom 20%
415
+ of the HBAR so that the curvature of the dome and displace-
416
+ ment profile of the mode are clearly visible. The diameter of
417
+ the HBAR and half wavelength of the acoustic mode are in-
418
+ dicated by scale bars. d) Electric field of the qubit-like mode
419
+ centered in a region around the 3-D transmon.
420
+ boundary condition to the superconductors (the surfaces
421
+ of the microwave cavity and the leads of the qubit) and
422
+ representing the Josephson junction as a lumped element
423
+ inductor [19]. In our simulation, the substrate of both the
424
+ qubit and HBAR chips is c-axis oriented sapphire and the
425
+ piezoelectric dome is made of c-axis oriented aluminum
426
+ nitride (AlN).
427
+ To perform a 3-D full-wave eigenmode simulation of
428
+ such a device, several simplifications have to be made.
429
+ The whole device is symmetric about the x − z plane at
430
+ y = 0, so we can use symmetry boundary conditions to
431
+ reduce the simulation space. We observe that the long-
432
+ lived modes of the HBAR are confined inside a cylindrical
433
+
434
+ 广x4
435
+ volume with a small transverse area in the x − y plane
436
+ (Fig. 1c).
437
+ We therefore only simulate the mechanical
438
+ fields inside a cylindrical volume with the radius of the
439
+ piezoelectric dome. Finally, we simulate an HBAR with
440
+ a substrate thickness of 40 µm, an order of magnitude
441
+ smaller than the 420 µm thick devices in Refs. [33, 34], in
442
+ order to speed up the simulations. A detailed description
443
+ of the device model can be found in Appendix C.
444
+ C.
445
+ Extracting Hamiltonian parameters
446
+ An eigenmode simulation returns a set of field distri-
447
+ butions which are labeled by their eigenfrequencies. In
448
+ the unhybridized approach, these are En and um. We
449
+ use an overlap integral to extract the coupling rates be-
450
+ tween the unhybridized electromagnetic and mechanical
451
+ modes [37]
452
+ gnm = Anm
453
+
454
+ V,piezo
455
+ En · eT : εmdV
456
+ (5)
457
+ where eT is the transpose of the piezoelectric tensor, εm
458
+ is the strain tensor derived from um, and the proportion-
459
+ ality constant Anm comes from normalizing the fields to
460
+ that of a single photon and phonon. We justify this for-
461
+ mula by deriving the piezoelectric Hamiltonian in a mul-
462
+ timode Jaynes-Cummings form in Appendix A, where
463
+ Eq. A17 is the full expression for gnm.
464
+ For the hybridized eigenmode simulations, we obtain
465
+ the electric and displacement fields Ek and uk, respec-
466
+ tively, for each ξk. COMSOL also computes several de-
467
+ rived quantities; in this work, we make use of the elec-
468
+ tric displacement Dk, strain εk, and stress Sk fields, the
469
+ current through the jth junction element Ikj, and the
470
+ time-averaged global electrical and strain energies Eelec,k
471
+ and Estrain,k. In order to use the EPR method, one must
472
+ calculate the energy-participation ratio of the kth mode
473
+ in the energy of jth junction. In Appendix D, we show
474
+ that the EPRs of the hybridized qubit-HBAR modes can
475
+ be written as
476
+ pkj =
477
+ Wkj
478
+ Eelec,k + Estrain,k
479
+ (6)
480
+ where the average inductive energy Wkj
481
+ =
482
+ 1
483
+ 2LjI2
484
+ kj
485
+ and the time-averaged electrical and mechanical energy
486
+ stored in the system for mode k Eelec,k, Estrain,k are de-
487
+ fined by Eqs. D6 and D7 in terms of the fields Ek and
488
+ εk. These quantities are easily obtained from the sim-
489
+ ulation solutions: Lj is the lumped element inductance
490
+ that we define, while Ikj, the electric current through
491
+ the jth lumped element, is calculated from the solution
492
+ as Ikj = 1
493
+ w
494
+
495
+ elem j Jk ·tdS, where w is the junction width,
496
+ Jk is the surface current, and t a unit direction vector.
497
+ In Appendix D, we show that the ZPF of the junction’s
498
+ flux can be written in terms of the extracted EPR
499
+ pkj =
500
+ Ejφ2
501
+ kj
502
+ 1
503
+ 2ℏξk
504
+ ,
505
+ (7)
506
+ which in turn defines the Hamiltonian of Eq. 3.
507
+ Fur-
508
+ thermore, the EPR can be used to calculate various loss
509
+ mechanisms that arise from or are modified by the hy-
510
+ bridization of the modes, as shown in Appendix E.
511
+ D.
512
+ Finite element considerations
513
+ In finite element method (FEM) simulations, space
514
+ is divided into polyhedra whose vertices define a mesh.
515
+ Building this mesh, or “meshing,” is done automatically
516
+ in modern FE software, but some user input is almost
517
+ always needed in the case of more involved geometries.
518
+ Finding a mesh that is coarse enough so that the simula-
519
+ tion runs in a reasonable time but fine enough to capture
520
+ all the important physical phenomena can be challenging.
521
+ A rule of thumb for meshing FE simulations is to use
522
+ at least five meshing elements per wavelength [38]. We
523
+ can immediately see the issue for hybridized eigenmode
524
+ simulations: the software has to simultaneously solve for
525
+ E and u, which have wavelengths that differ by five orders
526
+ of magnitude at the same frequency. In the case of u, for
527
+ which λ ∼ 1 µm in typical GHz frequency cQAD devices,
528
+ a fine mesh can quickly make the simulation intractable
529
+ if defined over a too big volume. However, we show that
530
+ even in the case a HBAR, which has a relatively large
531
+ volume compared to most mechanical resonators used in
532
+ cQAD systems, a meshing procedure can be found to
533
+ keep the simulation at a reasonable size while resolving
534
+ all of the relevant physics.
535
+ The mesh additionally needs to be optimized to re-
536
+ duce the number of so-called spurious modes. These un-
537
+ physical modes are a source of inaccuracy in many FEM
538
+ applications [39–41]. A handmade mesh was created in
539
+ order to minimize the number of elements and spurious
540
+ solutions (the meshing procedure and parameters are re-
541
+ ported in Appendix C). Our simulations were able to
542
+ solve for 150 eigenmodes in under 2 hours on a com-
543
+ puter with 64 GB of memory. Our meshing procedure
544
+ drastically reduced, but could not completely eradicate,
545
+ spurious modes.
546
+ IV.
547
+ RESULTS
548
+ A.
549
+ Unhybridized eigenmode approach
550
+ We choose to solve the unhybridized solid mechanics
551
+ eigenmode simulations near a frequency corresponding
552
+ to λ ≈ 1800 nm in both sapphire and AlN. At this fre-
553
+ quency, the mode has half a wavelength in the piezo-
554
+ electric dome which is expected to maximize the over-
555
+ lap between the acoustic mode’s strain field with the
556
+ piezoelectrically-induced external stress resulting from
557
+ the qubit mode’s electric field. With our geometry, this
558
+ corresponds to modes with a longitudinal mode number
559
+ q = 49.
560
+ A cross-section of such a mode is shown in
561
+ Fig. 1c. Because the resonator is a 3-D object, it supports
562
+
563
+ 5
564
+ many modes with this longitudinal number with differ-
565
+ ent patterns in the transverse plane, as well as different
566
+ polarizations. We observe both Laguerre-Gaussian (LG)
567
+ and Hermite-Gaussian (HG) modes in our results. The
568
+ 2-D profiles of these modes are represented in Fig. 2a.
569
+ Note that we always show the 2-D pro��le correspond-
570
+ ing to uz irrespective of the mode’s polarization, see
571
+ also Appendix C 6. While we are mainly interested in
572
+ longitudinal-like polarized modes (as defined in Eq. C1),
573
+ the anisotropy of the material’s piezoelectric tensor may
574
+ give shear-like polarized modes nontrivial coupling to the
575
+ qubit, making them interesting to study as well. We also
576
+ perform an unhybridized EM simulation to compute the
577
+ coupling rates, as described in the next paragraph. An
578
+ example electric field distribution can be seen in Fig. 1d,
579
+ and an example mechanical displacement field distribu-
580
+ tion can be seen in Fig. 1c in 2-D and Fig. 4b in 3-D.
581
+ 6.440
582
+ 6.442
583
+ 6.444
584
+ 6.446
585
+ 6.448
586
+ 6.450
587
+ f [GHz]
588
+ 104
589
+ 106
590
+ g/2 [Hz]
591
+ b)
592
+ LG(0, 0)L
593
+ LG(0, 1)L
594
+ LG(0, 1)SH
595
+ HG(2, 0)L
596
+ LG(0, 3)L
597
+ HG(3, 0)L
598
+ HG(0, 4)L
599
+ HG(2, 2)L
600
+ 6.446
601
+ 6.448
602
+ 6.450
603
+ 6.452
604
+ 6.454
605
+ 6.456
606
+ f [GHz]
607
+ 104
608
+ 106
609
+ g/2 [Hz]
610
+ c)
611
+ LG(0, 0)L
612
+ LG(0, 1)L
613
+ LG(0, 1)SH
614
+ HG(2, 0)L
615
+ LG(0, 3)L
616
+ HG(3, 0)L
617
+ HG(0, 4)L
618
+ HG(2, 2)L
619
+ 104
620
+ 106
621
+ g/2 [Hz]
622
+ d)
623
+ Unhybridized
624
+ Hybridized
625
+ a)
626
+ LG (0, 0)
627
+ LG (0, 1)
628
+ HG (2, 0)
629
+ LG (0, 3)
630
+ HG (3, 0)
631
+ HG (0, 4)
632
+ HG (2, 2)
633
+ FIG. 2. Acoustic modes and electromechanical coupling rates.
634
+ a) 2-D longitudinal displacement (uz) profiles of acoustic
635
+ modes observed in our simulations.
636
+ b) An acoustic spec-
637
+ trum with electromechanical coupling rates calculated using
638
+ the unhybridized eigenmode approach. c) An electro-acoustic
639
+ spectrum with electromechanical coupling rates calculated us-
640
+ ing the hybridized eigenmode approach. d) A mode-by-mode
641
+ comparison of the electromechanical coupling rates extracted
642
+ from unhybridized (green) and hybridized (red) simulations.
643
+ The coupling rates in b), c), and d) refer to a qubit mode at
644
+ ω = 2π × 6.424 GHz.
645
+ Using these results, overlap integrals are performed be-
646
+ tween the EM qubit mode (n = q in Eq. 5) and the me-
647
+ chanical modes in order to compute the two-mode cou-
648
+ pling rates gqm (hereafter referred to as g for simplicity)
649
+ and plot them in Fig. 2b against the mechanical modes’
650
+ frequencies.
651
+ We find that the zeroth transverse order mode of a 40
652
+ µm HBAR has a qubit-phonon coupling rate g ≈ 2π × 1
653
+ MHz. The higher-order transverse modes have lower cou-
654
+ pling rates due to their overlap mismatch with the qubit’s
655
+ electric field profile. We note that an antenna radius of
656
+ r = 20 µm was chosen, but it could be optimized in shape
657
+ to increase the coupling rate to any of the observed acous-
658
+ tic modes.
659
+ B.
660
+ Hybridized eigenmode approach
661
+ Next, we turn on the piezoelectric coupling between
662
+ the solid and emw interfaces. To test our implemen-
663
+ tation and demonstrate the capabilities of this simula-
664
+ tion framework, we perform eigenfrequency simulations
665
+ while sweeping the qubit’s inductance L such that the fre-
666
+ quency of the qubit-like mode (defined as the mode with
667
+ highest EPR) intersects the set of high-overtone HBAR
668
+ modes mentioned in the previous section. Note that the
669
+ acoustic mode frequencies shift up by about 5 MHz com-
670
+ pared to the uncoupled modes because the piezoelectric
671
+ effect increases the stiffness of the AlN material [42].
672
+ The eigenfrequencies found in the simulations are
673
+ shown in Fig. 3a and are plotted against the frequency of
674
+ the unhybridized (UH) qubit mode. We observe avoided
675
+ crossings in good agreement with the values of g com-
676
+ puted in the previous section. This comparison between
677
+ the unhybridized and hybridized approaches provides a
678
+ sanity check for the physics modeling. The EPRs calcu-
679
+ lated from this frequency sweep, shown in Fig. 3b, are
680
+ another way to visualize the hybridization of the qubit
681
+ with the acoustic modes. When the qubit hybridizes with
682
+ a mechanical mode, a significant fraction of the qubit-like
683
+ mode EPR is allocated to the mechanical-like mode.
684
+ One challenge of analyzing these simulations is the
685
+ presence of a significant number of spurious modes in
686
+ the results, which are a source of inaccuracy in the de-
687
+ rived quantities. We find them when looking for GHz-
688
+ frequency eigenmodes of the displacement field in both
689
+ unhybridized and hybridized simulations. These modes
690
+ appear as several point-like defects on mesh edges and
691
+ nodes (see Appendix C 4). We observed that simulations
692
+ with finer transverse meshing tended to have more spu-
693
+ rious modes.
694
+ To address this issue, we identify the so-called ”physi-
695
+ cal modes” in post-processing by finding the modes whose
696
+ displacement fields best match those of the LG and HG
697
+ modes. These, together with the qubit mode, are used
698
+ for further analysis, while the rest are discarded as spu-
699
+ rious modes (see Appendix C). This process is not ideal,
700
+ however, since the physical modes can be hybridized with
701
+ the spurious modes through their coupling to the qubit.
702
+ This causes an issue which we refer to as EPR dilution,
703
+ where part of the physical mode’s EPR is distributed
704
+ to spurious modes with nearby frequencies. The effect of
705
+ EPR dilution is evident for certain bare qubit frequencies
706
+ in Fig. 3b where the EPRs of all the modes sum to less
707
+ than one (eg. around 6.451 GHz). Evidently, however,
708
+ the effect of EPR dilution is on the 20% level.
709
+ We now focus on the case of a large detuning be-
710
+
711
+ 6
712
+ Bare qubit frequency [GHz]
713
+ 6.442
714
+ 6.444
715
+ 6.446
716
+ 6.448
717
+ 6.450
718
+ 6.452
719
+ 6.454
720
+ 6.456
721
+ 6.458
722
+ Mode frequency [GHz]
723
+ a)
724
+ Legend
725
+ qubit
726
+ LG(0, 0)L
727
+ LG(0, 1)L
728
+ LG(0, 1)SH
729
+ HG(0, 2)SH
730
+ HG(2, 0)L
731
+ LG(0, 3)L
732
+ HG(3, 0)L
733
+ HG(0, 4)L
734
+ HG(2, 2)SH
735
+ HG(4, 0)L
736
+ HG(1, 4)SH
737
+ HG(2, 2)L
738
+ HG(0, 2)L
739
+ 6.442
740
+ 6.444
741
+ 6.446
742
+ 6.448
743
+ 6.450
744
+ 6.452
745
+ 6.454
746
+ 6.456
747
+ Bare qubit frequency [GHz]
748
+ 0.0
749
+ 0.2
750
+ 0.4
751
+ 0.6
752
+ 0.8
753
+ 1.0
754
+ Energy participation ratio (p)
755
+ b)
756
+ FIG. 3. Results of hybridized electromechanical simulations.
757
+ a) The mode spectrum near the acoustic fundamental longi-
758
+ tudinal mode at ω = 2π × 6.445 GHz show several avoided
759
+ crossings. The size of each avoided crossing indicates the cou-
760
+ pling between the mechanical mode and the qubit. The leg-
761
+ end above this plot applies to both subfigures. b) Energy-
762
+ participation ratios of each mode shown in Fig. 3a to the
763
+ junction. Both longitudinal-like and shear-like modes are la-
764
+ beled according to their uz profiles. The green line indicates
765
+ the sum of the EPRs of all of the modes in the figure.
766
+ Mode
767
+ Qubit
768
+ LG(0,0)
769
+ HG(2,0)
770
+ f [GHz]
771
+ 6.424
772
+ 6.445
773
+ 6.451
774
+ p
775
+ 0.95
776
+ 1.4 × 10−3 5.4 × 10−5
777
+ χk,l/2π [Hz]
778
+ Qubit
779
+ (0,0)
780
+ (1,0)
781
+ Qubit
782
+ 5.2 × 108
783
+ 4.4 × 104
784
+ 2.3 × 103
785
+ (0,0)
786
+ -
787
+ 1.1 × 103
788
+ 1.7 × 102
789
+ (1,0)
790
+ -
791
+ -
792
+ 1.7 × 100
793
+ TABLE I. Top: Frequencies and EPRs of the qubit-like mode
794
+ and the two most strongly coupled acoustic modes. Bottom:
795
+ Pair-wise (cross-) Kerr couplings χk,l/2π between the modes.
796
+ tween the qubit mode and the same family of LG acous-
797
+ tic modes as in Figs. 2b, 3a and 3b in order to demon-
798
+ strate the extraction of design quantities in the dispersive
799
+ regime. We choose a value for the junction inductance
800
+ such that the unhybridized qubit is ∆UH
801
+ q,(0,0) ≈ 2π × 21
802
+ MHz below the LG(0, 0) mode. We compute the self- and
803
+ cross-Kerr couplings using the EPRs, from which we can
804
+ further compute the mode’s anharmonicity αk = 1
805
+ 2χk,k
806
+ and its Lamb shift ∆k = 1
807
+ 2
808
+
809
+ l χk,l.
810
+ The qubit’s anharmonicity can be compared with its
811
+ capacitive energy EC = e2
812
+ hC , since αq ≈ EC
813
+ 2h [43] for trans-
814
+ mons. We can infer the capacitance C of the qubit from
815
+ the slope of its inverse squared frequency using ω−2
816
+ q
817
+ = LC
818
+ and obtain C = 67 fF, finally giving an expected anhar-
819
+ monicity of EC
820
+ 2h = 288 MHz. This is in reasonably good
821
+ agreement with the EPR result of αq = 261 MHz (see
822
+ Table I), considering that EC
823
+ h
824
+ overestimates αq [44].
825
+ We further verify the results in Table I by using them
826
+ to compute the coupling rate g between the correspond-
827
+ ing unhybridized modes with the approximate relation-
828
+ ship [44]
829
+ g2
830
+ q,l ≈ ∆UH
831
+ q,l χq,l
832
+ ∆UH
833
+ q,l + αq
834
+ 2αq
835
+ (8)
836
+ The mode numbers k, l either refer to unhybridized
837
+ modes (on g and ∆UH) or to their hybridized counter-
838
+ parts (on χ and α). The results are shown in Fig. 2c.
839
+ Figure 2d shows good agreement between the g’s com-
840
+ puted using the two methods we described. The discrep-
841
+ ancies may be in part explained by EPR dilution and the
842
+ approximate nature of Eq. 8.
843
+ V.
844
+ OUTLOOK
845
+ We have demonstrated a technique for the simulation
846
+ of cQAD devices that unifies electromagnetic and me-
847
+ chanical degrees of freedom under the EPR method. Im-
848
+ portantly, we showed that quantum circuits, including
849
+ SC qubits, can be combined with solid mechanics within
850
+ the powerful multiphysics framework of COMSOL. By
851
+ combining the necessary physics interfaces, we can ex-
852
+ tract the hybridized eigenmodes of the entire system.
853
+ We showcased this technique by simulating an ℏBAR,
854
+ and showed that it gives results in good agreement with
855
+ other methods for estimating device parameters in the
856
+ dispersive regime.
857
+ The example shown in this work may be the most com-
858
+ putationally intensive out of the existing cQAD systems
859
+ due to the large size of the acoustic resonator. There-
860
+ fore, applying our methodology to other types of devices
861
+ should prove relatively straightforward. More generally,
862
+ our technique may be extended to other types of hybrid
863
+ quantum systems such as a SC qubit coupled to magnonic
864
+ resonators [2, 45] or devices where acoustic resonators
865
+ interact with other qubits such as color centers [46] or
866
+ quantum dots [47].
867
+ The simulation files used in this paper will be made
868
+ available in the supplementary material.
869
+
870
+ 7
871
+ ACKNOWLEDGEMENTS
872
+ We thank S. Marti, Y. Dahmani, V. Jain, G. Steele,
873
+ J. Franse, N. Egli, R. Benevides, and U. von L¨upke for
874
+ valuable discussions. This project has received funding
875
+ from the European Research Council (ERC) under the
876
+ European Union’s Horizon 2020 research and innovation
877
+ programme (Grant agreement No. 948047)
878
+
879
+ 8
880
+ Appendix A: Piezoelectric Hamiltonian
881
+ In this appendix, we derive the quantum Hamiltonian
882
+ for a piezoelectric solid from first principles.
883
+ 1.
884
+ Field quantization
885
+ We begin by quantizing the electric and displacement
886
+ fields. Following the procedure in [48], we will explicitly
887
+ quantize the displacement field.
888
+ Following Chapters 3
889
+ and 4 of [49], we define the displacement field u(x, t),
890
+ strain tensor ε(x, t) =
891
+ 1
892
+ 2
893
+
894
+ ∇u(x, t) + (∇u)T (x, t)
895
+
896
+ and
897
+ stress tensor S(x, t).
898
+ In an anisotropic linear material
899
+ with stiffness tensor c and density ρ, Newton’s second
900
+ law implies the following wave equation (neglecting body
901
+ forces)
902
+ ∇ · S = ρ∂2u
903
+ ∂t2
904
+ cijlm
905
+ ∂2ul
906
+ ∂xj∂xm
907
+ = ρ∂2ui
908
+ ∂t2
909
+ (A1)
910
+ where step 2 is written in index notation using Einstein’s
911
+ convention, and Hooke’s law is used since we assumed a
912
+ linear elastic material. We split time and space depen-
913
+ dencies of a displacement mode assuming a frequency Ω,
914
+ keeping the convention for naming frequencies from the
915
+ main text (ω for electromagnetics and Ω for solid me-
916
+ chanics)
917
+ u(x, t) = u0e−iΩth(x) + c.c.
918
+ (A2)
919
+ where u0 is a constant and h(x) is a normalized function
920
+ that contains the mode shape and polarization of the
921
+ mode. With u0(t) = u0e−iΩt, we write the Hamiltonian
922
+ of the system
923
+ H = T + V
924
+ =
925
+
926
+ dV 1
927
+ 2ρ∂ui
928
+ ∂t
929
+ ∂u∗
930
+ i
931
+ ∂t +
932
+
933
+ dV 1
934
+ 2cijlm
935
+ ∂ui
936
+ ∂xj
937
+ ∂ul
938
+ ∂xm
939
+ = 1
940
+ 2ρΩ2��iu0(t) − iu∗
941
+ 0(t)
942
+ ��2 �
943
+ dV
944
+ ��h(x)
945
+ ��2
946
+ + 1
947
+ 2
948
+
949
+ dSnjcijlmui
950
+ ∂ul
951
+ ∂xm
952
+ − 1
953
+ 2
954
+
955
+ dV uicijlm
956
+ ∂2ul
957
+ ∂xj∂xm
958
+ = 1
959
+ 2ρΩ2��iu0(t) − iu∗
960
+ 0(t)
961
+ ��2 + 0 − 1
962
+ 2
963
+
964
+ dV uiρ∂2ui
965
+ ∂t2
966
+ = 1
967
+ 2ρΩ2 ���iu0(t) − iu∗
968
+ 0(t)
969
+ ��2 +
970
+ ��u0(t) + u∗
971
+ 0(t)
972
+ ��2�
973
+ = 2ρΩ2��u0(t)
974
+ ��2
975
+ (A3)
976
+ where the fourth step assumes no energy leaves the sys-
977
+ tem’s volume and uses the wave Eq. A1 and the spatial
978
+ normalization of h. nj is the j-th element of a unit nor-
979
+ mal vector to the surface in the second term of step 3.
980
+ We define the following conjugate variables
981
+ p = −iΩρ(u0(t) + c.c)
982
+ q = (u0(t) + c.c)
983
+ (A4)
984
+ which gives the following familiar Hamiltonian
985
+ H = p2
986
+ 2ρ + 1
987
+ 2ρΩ2q2
988
+ (A5)
989
+ that we quantize using mechanical ladder operators
990
+ ˆp = −i
991
+
992
+ ρℏΩ
993
+ 2
994
+
995
+ ˆb − ˆb†�
996
+ ˆq =
997
+
998
+
999
+ 2ρΩ
1000
+
1001
+ ˆb + ˆb†�
1002
+ . (A6)
1003
+ Identifying ˆu0(t) =
1004
+
1005
+
1006
+ 2ρΩˆb lets us express the quantum
1007
+ displacement field as
1008
+ ˆu(x, t) =
1009
+
1010
+
1011
+ 2ρΩh(x)ˆb(t) + H.c.
1012
+ (A7)
1013
+ and the single mode quantum strain tensor as
1014
+ ˆε(x, t) =
1015
+
1016
+
1017
+ 2ρΩ∇h(x)ˆb(t) + H.c.
1018
+ (A8)
1019
+ The multimode extension of this derivation is straight-
1020
+ forward and also follows the recipe from [48]
1021
+ ˆu(x, t) =
1022
+ M
1023
+
1024
+ m=1
1025
+
1026
+
1027
+ 2ρΩm
1028
+ hm(x)ˆbm(t) + H.c.
1029
+ =
1030
+ M
1031
+
1032
+ m=1
1033
+
1034
+ um(x)ˆbm(t) + H.c.
1035
+
1036
+ ˆε(x, t) =
1037
+ M
1038
+
1039
+ m=1
1040
+
1041
+
1042
+ 2ρΩm
1043
+ ∇hm(x)ˆbm(t) + H.c.
1044
+ =
1045
+ M
1046
+
1047
+ m=1
1048
+
1049
+ εmˆbm(t) + H.c.
1050
+
1051
+ where mode m has frequency ωm, normalized shape
1052
+ hm(x) and is created (resp.
1053
+ annihilated) by operator
1054
+ ˆbm(t) (resp. ˆb†
1055
+ m(t)).
1056
+ The same derivation for the electric field gives
1057
+ ˆE(x, t) =
1058
+ N
1059
+
1060
+ n=1
1061
+
1062
+
1063
+
1064
+ ℏωn
1065
+ 2ϵ0
1066
+ f n(x)ˆan(t) + H.c.
1067
+
1068
+ =
1069
+ N
1070
+
1071
+ n=1
1072
+
1073
+ En(x)ˆan(t) + H.c.
1074
+
1075
+ with ϵ0 the vacuum permittivity and normalized shape
1076
+ functions
1077
+
1078
+ V ϵr(x)f ∗
1079
+ n(x)f m(x)dV = δnm where ϵr(x) is
1080
+ the relative permittivity in the medium.
1081
+
1082
+ 9
1083
+ 2.
1084
+ Piezoelectricity
1085
+ Before moving on to the piezoelectric Hamiltonian, we
1086
+ first specify the classical piezoelectric relations we will
1087
+ use.
1088
+ In a piezoelectric medium, we define the perme-
1089
+ ability µ, permittivity at constant strain ϵε, density ρ,
1090
+ stiffness tensor at constant electric field cE, its inverse
1091
+ sE and the strain-charge form piezoelectric coupling ten-
1092
+ sor d = sE : e. We write the piezoelectric constitutive
1093
+ relations in stress-charge from
1094
+
1095
+ S
1096
+ D
1097
+
1098
+ =
1099
+
1100
+
1101
+ cE −eT
1102
+ e
1103
+ ϵε
1104
+
1105
+
1106
+
1107
+ ε
1108
+ E
1109
+
1110
+ (A9)
1111
+ In this equation, the product is either a simple matrix
1112
+ product or a double dot product and the sum is always
1113
+ done on the last index(ices). For example,
1114
+
1115
+ cEε
1116
+
1117
+ ij
1118
+
1119
+
1120
+ cE : ε
1121
+
1122
+ ij
1123
+ =
1124
+
1125
+ k,l
1126
+ cE,ijklεkl
1127
+ (A10)
1128
+
1129
+ ϵεE
1130
+
1131
+ i =
1132
+
1133
+ j
1134
+ ϵε,ijEj
1135
+ (A11)
1136
+ 3.
1137
+ Electromechanical Coupling
1138
+ The stored electric and mechanical energies in a system
1139
+ at any time can simply be written as
1140
+ Eelec(t) = 1
1141
+ 2
1142
+
1143
+ E(x, t) · D∗(x, t)dV
1144
+ (A12)
1145
+ Estrain(t) = 1
1146
+ 2
1147
+
1148
+ S(x, t) : ε∗(x, t)dV
1149
+ (A13)
1150
+ From these and the piezoelectric constitutive relations,
1151
+ we have that the added energy due to piezoelectricity is
1152
+ given by
1153
+ Epiezo(t) = −
1154
+
1155
+ dV E(x, t) · eT : ε(x, t)
1156
+ (A14)
1157
+ which can finally be expanded in terms of the ladder op-
1158
+ erators
1159
+ ˆHpiezo = −ℏ
1160
+
1161
+ nm
1162
+ gnm
1163
+
1164
+ ˆan + ˆa†
1165
+ n
1166
+ � �
1167
+ ˆbm + ˆb†
1168
+ m
1169
+
1170
+ (A15)
1171
+ where we have switched to Schr¨odinger’s picture (ˆa(t) →
1172
+ ˆa, ˆb(t) → ˆb) to remain consistent with the main text and
1173
+ the EPR method, and with
1174
+ gnm = 1
1175
+ 2
1176
+
1177
+ ωn
1178
+ ρϵ0Ωm
1179
+
1180
+ dV
1181
+
1182
+ f i
1183
+ n
1184
+ �∗
1185
+ (x)eijk (∇hm)jk (x)
1186
+ (A16)
1187
+ In terms quantities that can be easily extracted from
1188
+ simulation results, the coupling rate between the n-th
1189
+ electromagnetic and the m-th mechanical mode can be
1190
+ expressed as
1191
+ gnm
1192
+ 2π =
1193
+
1194
+ ωn
1195
+ Ωm
1196
+ 1
1197
+ ρϵ0
1198
+
1199
+ V , piezo E∗
1200
+ n(x) · eT : εm(x)dV
1201
+
1202
+ ��
1203
+ V E∗T
1204
+ n (x)ϵrEn(x)dV
1205
+ ��
1206
+ V , SM u∗m(x) · um(x)dV
1207
+ (A17)
1208
+ We compute Eq. A17 for all solutions of the pure SM
1209
+ simulation using COMSOL’s feature Volume Integra-
1210
+ tion in the piezoelectric medium, calling the E-field from
1211
+ a chosen solution of the pure EM simulation using COM-
1212
+ SOL’s operator withsol.
1213
+ For example, one term con-
1214
+ tributing to the integrand in the numerator of Eq. A17
1215
+ therefore looks like
1216
+ conj(withsol(’sol2’, sext11)) * solid.eXX
1217
+ (A18)
1218
+ where sol2 refers to the solution of the pure EM simu-
1219
+ lation, sext11 is the 11 component of the external stress
1220
+ Sext = −eT · E and solid.eXX is the 11 component of
1221
+ the strain tensor.
1222
+ 4.
1223
+ Electromagnetic-elastomechanical wave equation
1224
+ in a piezoelectric medium
1225
+ We can now derive the full wave equation by using the
1226
+ piezoelectric relations A9 along with Maxwell equations,
1227
+ where J, H and B = µH are the electric current, mag-
1228
+ netic and magnetic flux fields, respectively, and ρe is the
1229
+ electric charge density
1230
+ ∇ × E = −iωB
1231
+ (A19)
1232
+ ∇ × H = J + iωD
1233
+ (A20)
1234
+ ∇ · B = 0
1235
+ (A21)
1236
+ ∇ · D = ρe,
1237
+ (A22)
1238
+ We combine the two first Maxwell equations together
1239
+ with A9 to write a first equation of motion for the electric
1240
+ field
1241
+ ∇ × µ−1∇ × E − ω2ϵεE = ω2e : ε
1242
+ (A23)
1243
+ While combining A1 with A9 gives
1244
+ ∇ ·
1245
+
1246
+ cE : ε
1247
+
1248
+ + ρω2u = ∇ ·
1249
+
1250
+ eT · E
1251
+
1252
+ (A24)
1253
+ Appendix B: cQAD dispersive regime considerations
1254
+ The form of the Hamiltonian in Eq. 4 requires the dis-
1255
+ persive regime assumption for all interacting pairs of two
1256
+ electromagnetic modes (n, n′); |∆nn′| ≫ |ςnn′| and for
1257
+ all pairs of an electromagnetic and a mechanical mode
1258
+ (n, m); |∆nm| ≫ |gnm|. It also requires the perturbative
1259
+ assumption
1260
+ ∆H
1261
+ kl ≫ Ej
1262
+
1263
+
1264
+ ˆφj
1265
+ �p
1266
+ ∀ k, l, j and ∀ p ≥ 4
1267
+
1268
+ 10
1269
+ expressed in the hybridized eigenmode approach (“H”) ,
1270
+ with ∆H
1271
+ kl := ξl − ξk.
1272
+ This condition is usually satisfied in cQED, but not
1273
+ always in cQAD [34, 50, 51]. For example, in the case
1274
+ analyzed in the main text, with a single junction la-
1275
+ beled j = 0, the second assumption is not respected,
1276
+ as ∆H
1277
+ q,(0,0) = 21 MHz < E0
1278
+ ℏ φ4
1279
+ q0 = 310 MHz where q refers
1280
+ to the qubit mode.
1281
+ This intermediate regime requires
1282
+ an additional transformation to go from the fourth order
1283
+ expansion of Eq. 3 to Eq. 4, namely a Schrieffer-Wolff
1284
+ transformation that removes the term proportional to
1285
+
1286
+ l̸=q ˆc†
1287
+ qˆcqˆc†
1288
+ l ˆcq + H.c., which has a time dependence of
1289
+ frequency ∆H
1290
+ ql and therefore cannot be neglected in the
1291
+ rotating wave approximation. Using [43], in the simple
1292
+ case of a single acoustic-like mode l with φl0 ≪ φq0, this
1293
+ changes the expression for the cross-Kerr coupling rates
1294
+ from E0
1295
+ ℏ φ2
1296
+ q0φ2
1297
+ l0 to E0
1298
+ ℏ φ2
1299
+ q0φ2
1300
+ l0
1301
+ 1
1302
+ 1+
1303
+ αq
1304
+ ∆H
1305
+ ql
1306
+ . We can see this correc-
1307
+ tion has a significant effect for large
1308
+ αq
1309
+ ∆H
1310
+ ql ratios, which is
1311
+ the case in our results. In terms of the EPRs, the qubit’s
1312
+ anharmonicity does not change, but the cross-Kerr cou-
1313
+ plings becomes
1314
+ χql = ℏ
1315
+ E0
1316
+ ξqξlpqpl
1317
+ 4
1318
+ 1
1319
+ 1 +
1320
+
1321
+ E0
1322
+ ξ2qp2q
1323
+ 8∆H
1324
+ ql
1325
+ (B1)
1326
+ Appendix C: COMSOL simulation setup
1327
+ In COMSOL, all the information needed for a simu-
1328
+ lation is stored in a single file which, in the software,
1329
+ presents itself as a tree with several levels of nodes. At
1330
+ top level there is the file node, which consists in global
1331
+ definitions, components, studies and results. In a com-
1332
+ ponent node, we can define a model’s geometry, mesh-
1333
+ ing options and most importantly the physics interfaces,
1334
+ defining which fields will be solved in the model along
1335
+ with their equations of motion.
1336
+ Each of these nodes
1337
+ also feature subnodes which give additional details. In
1338
+ physics interfaces, the subnodes can be domain condi-
1339
+ tions, such as the main equation of motion or initial val-
1340
+ ues, or boundary conditions like fixed or free.
1341
+ 1.
1342
+ Geometry in detail
1343
+ The geometry consists of a 5 × 30.5 × 17.8 mm3 3-D
1344
+ microwave cavity with two sapphire substrates: a bottom
1345
+ one (the qubit substrate, 5 × 2.6 × 0.420 mm3) on top of
1346
+ which the transmon and its antenna sit and a top one (the
1347
+ HBAR substrate, 5 × 2.6 × 0.04 mm3) which features the
1348
+ piezoelectric dome, made of AlN, looking down above the
1349
+ antenna. The two substrates are 3.0 µm apart in the z
1350
+ direction and the piezoelectric dome has a 100 µm radius
1351
+ and a 900 nm maximum height.
1352
+ These are typical values for the devices used in [13, 33,
1353
+ 34]. To keep the simulations light, top substrates of only
1354
+ 40 µm are used in the simulations used to produce the re-
1355
+ sults of the main text. This approximation is necessary to
1356
+ make the computations tractable, making some numer-
1357
+ ical results incomparable to actual experiments.
1358
+ They
1359
+ are still useful as proofs of concept and may actually be
1360
+ experimentally relevant in the coming years as one path
1361
+ being explored in the future experiments is the use of
1362
+ thinner HBARs, like the one presented by Bl´esin et. al in
1363
+ a recent proposal for microwave-optical transduction [52].
1364
+ As a further simplification, since the whole geometry
1365
+ is symmetric about the x−z plane at y = 0, the model is
1366
+ cut in half there (axes definitions can be seen in Fig. 1)
1367
+ and symmetry boundary conditions are used.
1368
+ Since we observed that the elastic waves excited in the
1369
+ HBAR by this configuration where well confined to a
1370
+ small region in the x − y plane, we define a cylinder cut
1371
+ of the HBAR substrate of the same radius as the piezo-
1372
+ electric dome. We will only solve for the displacement
1373
+ field inside of this cylinder instead of the whole HBAR
1374
+ substrate to avoid extending the required fine mesh any
1375
+ more than necessary. The boundaries of this cylinder cut
1376
+ are modeled as low reflecting boundaries to avoid any
1377
+ unphysical reflections.
1378
+ 2.
1379
+ Physics modeling
1380
+ A 3-D microwave cavity is simply empty space sur-
1381
+ rounded by a perfect electric conductor (PEC). In most
1382
+ FE software, modeling the PEC is done using a bound-
1383
+ ary condition of the same name, which avoids having to
1384
+ model an actual layer of metal which would need to be
1385
+ meshed and would make the simulation more complex.
1386
+ Losses can be modeled using either scattering boundary
1387
+ conditions or perfectly matched layers (PML) on certain
1388
+ parts of the exterior boundary which correspond to phys-
1389
+ ical objects such as input and output ports.
1390
+ The transmon qubit is drawn as a 2-D object. The
1391
+ superconducting aluminum can simply be modeled as a
1392
+ PEC while the Josephson junction is modeled as a linear
1393
+ inductance using a lumped element boundary condition.
1394
+ This recipe without the lumped element can be used to
1395
+ model coplanar waveguides or 2-D resonators.
1396
+ All the nodes used in the Electromagnetic waves
1397
+ physics interface are detailed here, where an item with
1398
+ a ■ is a domain condition while an item with a □ is a
1399
+ boundary condition:
1400
+ ■ The Wave equation, electric node is applied to
1401
+ all domains. It defines the EOM for the electromag-
1402
+ netic part of the simulation; the Helmholtz equa-
1403
+ tion in the frequency domain. Without any addi-
1404
+ tional node, this equation reads
1405
+ ∇ × µ−1∇ × E − ω2ϵE = 0
1406
+ ■ The effective medium 1 subnode defines a mod-
1407
+ ified relative susceptibility ˜ϵr = ϵr,AlN − e : dT /ϵ0
1408
+ and applies it to the domain corresponding to the
1409
+
1410
+ 11
1411
+ piezoelectric dome. This is the first of three steps
1412
+ for piezoelectric implementation.
1413
+ ■ The External current density node adds a
1414
+ source term of the form −iωJext to the right-hand-
1415
+ side of the Helmholtz equation for the domain cor-
1416
+ responding to the piezoelectric dome.
1417
+ We define
1418
+ Jext = iωe : ε. This is the second step for piezo-
1419
+ electric implementation.
1420
+ □ The Perfect electric conductor 1 & 2 nodes
1421
+ define perfectly reflecting boundaries for the elec-
1422
+ tromagnetic fields. The first node is applied to the
1423
+ exterior boundaries (sides of the cavity) while the
1424
+ second one is applied to the transmon’s geometry
1425
+ parts since it is implemented as a 2-D object. The
1426
+ boundary equation is simply n × E = 0, where n is
1427
+ a normal vector to the boundary element.
1428
+ □ The Lumped element node acts like a linear cir-
1429
+ cuit containing at most a resistor, a capacitor and
1430
+ an inductor.
1431
+ It has to be connected to conduc-
1432
+ tors (perfect electric conductors in our case) on two
1433
+ sides. We use it to act like the linear part of our
1434
+ Josephson junction, so we define it as an inductor.
1435
+ □ The Perfect magnetic conductor node is sim-
1436
+ ply a symmetry boundary condition for the electric
1437
+ field. This allows us to cut the whole system in half
1438
+ along the x − z plane at y = 0 since the system is
1439
+ the same on both sides.
1440
+ And for the Solid Mechanics interface, which is only
1441
+ solved for in the piezoelectric dome and a cylinder cut
1442
+ of the HBAR above it, with the same height as the top
1443
+ substrate and the same radius as the dome:
1444
+ ■ The Linear elastic material node defines the
1445
+ EOM for the solid mechanics part of the simula-
1446
+ tion in all selected domains (piezoelectric dome and
1447
+ HBAR cylinder cut). The equation is the standard
1448
+ elastic wave equation: ∇ · S + ρω2u = 0. Without
1449
+ additional nodes we have S = cE : ε
1450
+ ■ The subnode External Stress adds the following
1451
+ external stress Sext = −eT · E to S in the domain
1452
+ corresponding to the piezoelectric slab. This is the
1453
+ third and final step for piezoelectric implementa-
1454
+ tion.
1455
+ ■ The Prescribed displacement node can be used
1456
+ to simplify the simulation to only include the z
1457
+ component of the displacement field uz, leaving ux
1458
+ and uy at 0 everywhere. This has been shown to
1459
+ be a very good approximation while drastically re-
1460
+ ducing the number of spurious modes in the results
1461
+ of the simulation.
1462
+ □ The Free boundary condition is applied on the
1463
+ sides and bottom of the piezoelectric dome and on
1464
+ top of the HBAR.
1465
+ □ The Low reflecting boundary node is used to
1466
+ avoid reflection on the unphysical boundaries on
1467
+ the side of the HBAR’s cylinder cut.
1468
+ Note that
1469
+ a perfectly matched layer (PML) is usually pre-
1470
+ ferred to this kind of boundary conditions, but un-
1471
+ fortunately in our case it can’t be implemented (see
1472
+ note).
1473
+ □ The Symmetry boundary condition node is
1474
+ used on the the boundaries on the x − z plane at
1475
+ y = 0 to cut the system in half as well.
1476
+ 3.
1477
+ Meshing procedure
1478
+ To properly mesh the HBAR, we need to respect the
1479
+ rule of thumb of 5 elements per wavelength in the longi-
1480
+ tudinal direction while also resolving higher-transverse-
1481
+ order modes since we expect non-negligible coupling to
1482
+ them.
1483
+ In addition to increasing the simulation size, a
1484
+ finer transverse mesh was also observed to increase the
1485
+ number of spurious modes (see next section). Because
1486
+ no simple metric characterizing the spurious modes is di-
1487
+ rectly available in COMSOL’s results, a mesh refinement
1488
+ study could not be used to limit their presence.
1489
+ For our model, a handmade mesh was created for the
1490
+ part of the geometry where solid mechanics are solved
1491
+ using a mapped and a swept node, which allow us to
1492
+ control the number of meshing points in all three cylin-
1493
+ drical directions using distribution subnodes. For all
1494
+ simulations whose results are reported in this work, the
1495
+ cylindrical region is divided into a shell with inner radius
1496
+ 30 µm and a mapped mesh with 10 azimuthal and 6
1497
+ radial elements and center region, which is a free quad
1498
+ surface mesh with maximum element size 5 µm.
1499
+ The
1500
+ rest of the simulation space can then be meshed with au-
1501
+ tomatically generated tetrahedrons, where the only user
1502
+ input are size specifications. We observed that the pa-
1503
+ rameters with the most impact were the maximum el-
1504
+ ement size and z-stretching ratio. A light convergence
1505
+ analysis was performed to ensure the meshing was suf-
1506
+ ficiently dense near the junction where the electric has
1507
+ a strong gradient. Using this meshing procedure, a hy-
1508
+ bridized eigenmode simulation finds 150 modes in 2 hours
1509
+ on a computer with 64 GB of memory.
1510
+ 4.
1511
+ Spurious modes
1512
+ FE eigenmode simulations can converge to modes that
1513
+ are not physical, referred to as spurious modes [39–41].
1514
+ They appear in solid mechanics simulations at GHz fre-
1515
+ quency and with fine mesh features, yielding field dis-
1516
+ tributions made out of point defects that can be seen
1517
+ in Fig. 4. In our situation, these modes can appear in
1518
+ greater numbers than physical modes. They cause several
1519
+ problems. First, if one wants to find a certain number
1520
+ of modes (higher order transverse modes of the HBAR
1521
+
1522
+ 12
1523
+ in our case), one typically has to ask the solver for many
1524
+ more modes than this number. Thus, the presence of spu-
1525
+ rious modes in the results artificially increases the solve
1526
+ time.
1527
+ Another detrimental effect of the spurious modes is
1528
+ “EPR dilution,” where the EPR of a physical mode will
1529
+ be shared among several spurious modes that are nearby
1530
+ in frequency. The coupling of the qubit mode to a spuri-
1531
+ ous mode is typically not higher than 5×103 kHz, but in
1532
+ certain cases the frequency difference between a spurious
1533
+ mode and a physical or qubit mode can be lower, creat-
1534
+ ing a significant hybridization in the hybrid simulations.
1535
+ This reduces the value of the physical or qubit mode’s
1536
+ EPR and the quantities obtained through it, such as the
1537
+ cross-Kerr coupling rate.
1538
+ No method was found to entirely remove spurious
1539
+ modes from the results of solid mechanics eigenmode
1540
+ simulations of an HBAR. We also could not find any
1541
+ one-number metric that distinguishes them from phys-
1542
+ ical modes, and their estimated convergence error (using
1543
+ COMSOL’s error estimates for example) is lower than
1544
+ that of the physical modes, meaning stronger convergence
1545
+ requirements make this issue worse. The only two things
1546
+ one can do to mitigate this problem is optimize the mesh-
1547
+ ing (previous section) and post-process the data.
1548
+ FIG. 4. Illustration of two modes with neighboring frequen-
1549
+ cies in an unhybridized solid mechanics simulation, a) a spu-
1550
+ rious mode and b) a physical LG(1, 1) mode.
1551
+ 5.
1552
+ Solver settings and convergence
1553
+ All simulations used in this work are done using ”eigen-
1554
+ mode” COMSOL studies that uses a direct MUMPS
1555
+ solver, with most settings kept as default. However, in
1556
+ the case of hybridized simulations, one change needs to
1557
+ be done in order for the solver to converge to sensible re-
1558
+ sults [53]. The COMSOL settings ”Scaling” and ”Resid-
1559
+ ual Scaling” should be set to 102 for the electric field ⃗E
1560
+ and to 10−20 for the displacement field ⃗u. This is done
1561
+ in the nodes found under Study ▶ Solver Configura-
1562
+ tions ▶ Solution ▶ Dependant variables.
1563
+ 6.
1564
+ Acoustic Polarization and Post-Processing
1565
+ After the results are computed by COMSOL, we apply
1566
+ a post-processing procedure in order to extract quantities
1567
+ of interest from the simulation. We expect the physical
1568
+ eigenmodes of the HBAR to include Laguerre-Gaussian
1569
+ or Hermite-Gaussian modes with longitudinal (compo-
1570
+ nent 33 of ε) or shear (components 13 or 23) polariza-
1571
+ tion.
1572
+ These modes admit an analytical expression for
1573
+ their longitudinal mode profile (uz at the top surface).
1574
+ By computing the pointwise distance between the mode
1575
+ profiles of each eigenmode in the results and these ana-
1576
+ lytical mode profiles, we can find the best match in the
1577
+ results, and simply assign all results that aren’t good fits
1578
+ for any of the reference modes as spurious modes. Ad-
1579
+ ditionally, the longitudinal or shear nature of a physical
1580
+ eigenmode can be simply extracted using, for example,
1581
+ the weight of a tensor component in the strain energy
1582
+ of the mode. Formally, the polarization is attributed to
1583
+ component c, with c in {11, 12, 13, 21, 22, 23, 31, 32, 33
1584
+ }, if c respects
1585
+ 1
1586
+ 4Re
1587
+
1588
+ V,SM Sc(x) : ε∗
1589
+ c(x)dV.
1590
+ Estrain,k
1591
+ >
1592
+ 1
1593
+ 4Re
1594
+
1595
+ V,SM S˜c(x) : ε∗
1596
+ ˜c(x)dV.
1597
+ Estrain,k
1598
+ (C1)
1599
+ for all other components ˜c. To keep things simple, all
1600
+ physical modes are recognized and labeled according to
1601
+ their uz profiles. For other mechanical resonator geome-
1602
+ tries, physical modes can usually also be visually dis-
1603
+ tinguished from spurious ones, but a similar automated
1604
+ method for distinguishing them from spurious modes may
1605
+ need to be developed.
1606
+ Appendix D: Hybrid EPR method
1607
+ The goal of the EPR method, developed by Minev et.
1608
+ al [23], is to compute the coefficients of the cQED Hamil-
1609
+ tonian from the so-called energy-participation ratios. We
1610
+ will mirror a simplified version of the derivation from this
1611
+ paper but in the case of a hybrid Hamiltonian (Eq. 3).
1612
+ The energy of classical mechanical resonator’s eigen-
1613
+ mode oscillates in time between strain and kinetic energy.
1614
+ Analogously, for a classical electronic circuit, it oscillates
1615
+ between inductive and capacitive energy. In the unhy-
1616
+ bridized eigenmode approach, for each mechanical (elec-
1617
+ tromagnetic) oscillator in the system, the time-averaged
1618
+ strain (linear inductive) energy is equal to the time aver-
1619
+ aged kinetic (capacitive) energy. Equivalently, each form
1620
+ of energy’s time average is equal to half the time-averaged
1621
+
1622
+ b)
1623
+ a)13
1624
+ total linear [54] energy for this mode
1625
+ Elin. ind,n = Eelec,n = 1
1626
+ 2Etotal, EM,n
1627
+ Estrain,m = Ekin,m = 1
1628
+ 2Etotal, mech,m.
1629
+ (D1)
1630
+ Elin. ind,n is the sum of the energy stored in the magnetic
1631
+ field Emag,n as well as the energies of the lumped element
1632
+ inductances �
1633
+ j
1634
+ 1
1635
+ 2LjI2
1636
+ nj. The EPR is then defined as [23]
1637
+ pkj := linear inductive energy in junction j in mode k
1638
+ total linear inductive energy in mode k
1639
+ (D2)
1640
+ In the hybridized eigenmode approach, the definition
1641
+ of the total linear inductive energy in mode k is extended
1642
+ to include the strain energy:
1643
+ Elin. ind,k + Estrain,k = Eelec,k + Estrain,k
1644
+ = 1
1645
+ 2
1646
+
1647
+ ˆHlin
1648
+
1649
+ k = ℏ
1650
+ 2
1651
+ N+M
1652
+
1653
+ l=1
1654
+ ξl
1655
+
1656
+ ˆc†
1657
+ l ˆcl
1658
+
1659
+ k
1660
+ (D3)
1661
+ We have introduced • as the time average and ⟨•⟩k as
1662
+ the expectation value of an operator over a state with
1663
+ excitations in a single mode. The numerator of Eq. D2
1664
+ is unchanged since a junction’s inductive energy does not
1665
+ include any mechanical part. It is defined as the the time-
1666
+ averaged linear inductive excitation energy (as opposed
1667
+ to absolute energy) at junction j when only mode k is
1668
+ excited
1669
+ �1
1670
+ 2Ej ˆφ2
1671
+ j
1672
+
1673
+ k
1674
+
1675
+ �1
1676
+ 2Ej ˆφ2
1677
+ j
1678
+
1679
+ 0
1680
+ (D4)
1681
+ Defining a general Fock state for this system as
1682
+ |µ1, . . . , µN+M⟩
1683
+ we see that writing the EPR in terms of a single-mode
1684
+ Fock state makes it independent of the excitation number
1685
+ and links it to the ZPF of the junction’s flux
1686
+ pkj = ⟨µk| 1
1687
+ 2Ej ˆφ2
1688
+ j |µk⟩ − ⟨0| 1
1689
+ 2Ej ˆφ2
1690
+ j |0⟩
1691
+ 1
1692
+ 2
1693
+ �N+M
1694
+ l
1695
+ ℏξl ⟨µk| ˆc†
1696
+ l ˆcl |µk⟩
1697
+ =
1698
+ Ejφ2
1699
+ kj
1700
+ 1
1701
+ 2ℏξk
1702
+ (D5)
1703
+ In practice, we extract the denominator of Eq. D2 by
1704
+ performing finite-sum integrals over the volumes where
1705
+ the fields E and u are defined
1706
+ Eelec,k = 1
1707
+ 4Re
1708
+
1709
+ V
1710
+ Ek(x) · D∗
1711
+ k(x)dV
1712
+ (D6)
1713
+ Estrain,k = 1
1714
+ 4Re
1715
+
1716
+ V,SM
1717
+ Sk(x) : ε∗
1718
+ k(x)dV
1719
+ (D7)
1720
+ Appendix E: Modeling dissipation
1721
+ Our simulation framework can also be used to study
1722
+ dissipation in cQAD devices. In this Appendix, we in-
1723
+ troduce the basics for this next step in the method. The
1724
+ relevant loss mechanisms in a ℏBAR-like device can be
1725
+ separated into two different categories based on how they
1726
+ can be estimated using simulations.
1727
+ In the first case,
1728
+ which we call semi-analytical loss, a lossy element (sur-
1729
+ face or volume) has an intrinsic quality factor that is
1730
+ taken from the literature. Then, its participation in the
1731
+ overall quality factor is weighted by the element’s energy-
1732
+ participation ratio which is computed from the results of
1733
+ the simulation. These ratios are referred to as “lossy”
1734
+ EPRs to distinguish them from the junction EPRs dis-
1735
+ cussed in the rest of the paper, even though the principle
1736
+ is the same. In this section, we illustrate three examples
1737
+ of such dissipation mechanisms: bulk dielectric and sur-
1738
+ face inductive losses [23, 55, 56] as well as losses due to
1739
+ surface roughness in the acoustic resonator. The second
1740
+ category of losses includes mechanisms that can be fully
1741
+ characterized numerically, so we call it numerical loss.
1742
+ One such mechanism present in our system is so-called
1743
+ phonon diffraction loss, where we consider all phonons
1744
+ leaving the center region of the HBAR as lost and quan-
1745
+ tify this using a numerical flux integration.
1746
+ a.
1747
+ Semi-analytical loss calculations
1748
+ For a given EPR-based loss mechanism L, its overall
1749
+ contribution to a mode’s quality factor is a weighted in-
1750
+ verse sum with contributions from all lossy elements
1751
+ 1
1752
+ QL
1753
+ k
1754
+ =
1755
+
1756
+ l
1757
+ pL
1758
+ kl
1759
+ QL
1760
+ l
1761
+ (E1)
1762
+ Bulk dielectric losses of the electromagnetic field are
1763
+ characterized by the loss tangent δl of a lossy solid l.
1764
+ This loss tangent is the inverse of an intrinsic quality
1765
+ factor Qdiel
1766
+ l
1767
+ , and the contribution to the overall quality
1768
+ factor of a mode from one such solid is weighted by its
1769
+ energy-participation ratio
1770
+ pdiel, bulk
1771
+ kl
1772
+ = 1
1773
+ Ek
1774
+ 1
1775
+ 4Re
1776
+
1777
+ Vl
1778
+ E∗
1779
+ m · ϵEmdV.
1780
+ (E2)
1781
+ We have defined the total energy of mode k as Ek =
1782
+ 2Eelec,k + 2Estrain,k (see Eq. D1).
1783
+ Surface inductive losses are caused by surface currents
1784
+ and result in Ohmic loss. These are characterized by an
1785
+ intrinsic quality factor estimated at unity for metals such
1786
+ as the copper of the microwave cavity, and higher than
1787
+ 105 for SC aluminum [23]. The contribution of a lossy
1788
+ surface l is computed using
1789
+ pind, surf
1790
+ kl
1791
+ = 1
1792
+ Ek
1793
+ λlµl
1794
+ 4 Re
1795
+
1796
+ surfl
1797
+ H∗
1798
+ k,∥ · Hk,∥ds
1799
+ (E3)
1800
+ where λl is the skin depth of the surface’s material and
1801
+ µl its permeability.
1802
+ Acoustic losses due to surface roughness are estimated
1803
+ using a method from Ref. [57]. Surface roughness limits
1804
+
1805
+ 14
1806
+ the quality factor to
1807
+ Qrough
1808
+ k
1809
+ =
1810
+ h2
1811
+ 2nkσ2 ,
1812
+ where nk is the longitudinal mode number, σ2 =
1813
+
1814
+ z2�
1815
+ is
1816
+ the height variance of the surface assuming a Gaussian
1817
+ distributed roughness, and h is the height of the HBAR
1818
+ such that
1819
+ ���qk
1820
+ ���h = nkπ, where qk is the mode’s wave
1821
+ vector. This quality factor only applies to the HBAR, so
1822
+ it has to be weighted by the fraction of energy stored in
1823
+ the mechanics 2Estrain,k
1824
+ Ek
1825
+ .
1826
+ b.
1827
+ Numerical loss calculations
1828
+ The plano-convex shape of the HBAR was chosen to
1829
+ provide both longitudinal and transverse confinement to
1830
+ the acoustic modes. However, to study the effect of im-
1831
+ perfections in this geometry, such as the finite size of the
1832
+ dome, we can use simulations to calculate the acoustic
1833
+ energy leaving the Fabry-P´erot cavity (the region of the
1834
+ sapphire substrate above the piezoelectric dome). This
1835
+ can be treated as loss because, even if the substrate has
1836
+ a finite size and reflecting boundaries, the timescale on
1837
+ which the energy is reflected back into the mode region
1838
+ is much longer than the typical timescale of operations
1839
+ we’re interested in [33, 34]. We compute a quality fac-
1840
+ tor due to diffraction loss using a flux integral of the
1841
+ mechanical Poynting vector P a
1842
+ Qdiff
1843
+ k
1844
+ = ωk
1845
+ Ek
1846
+
1847
+ Sd P a · dσ
1848
+ (E4)
1849
+ .
1850
+ Here Sd is a cylindrical surface defines the bound-
1851
+ ary of the acoustic cavity, and is parametrized by (x0 +
1852
+ R cos θ, R sin θ, z), where x0 = 1 mm is the position of
1853
+ the center of the antenna, R = 90 µm, θ ∈ [−π/2, π/2]
1854
+ and z ∈ [−0.9, 40] µm, which includes the entire height
1855
+ of the substrate.
1856
+ c.
1857
+ Effects of hybridization on losses
1858
+ An interesting new feature that arises from our simula-
1859
+ tion framework is the ability to study mechanical losses in
1860
+ hybrid qubit- or cavity-like modes, and electromagnetic
1861
+ losses in mechanical-like modes. These new effects can
1862
+ only be studied once one has access to the full dynam-
1863
+ ics of the hybridized eigenmodes and are thus a unique
1864
+ feature of the hybridized approach.
1865
+ As an example, we show how the qubit mode, once hy-
1866
+ bridized with the HBAR in the same dispersive regime
1867
+ as in the main text, acquires a new loss channel through
1868
+ phonon diffraction. Fig. 5 shows the LG(0, 0) mode of
1869
+ the unhybridized and hybridized simulations as well as
1870
+ the qubit-like mode in the hybridized simulation. The
1871
+ FIG. 5.
1872
+ Acoustic displacement along a line defined by the
1873
+ interface between the piezoelectric dome and the sapphire and
1874
+ the symmetry axis of the simulation (y = 0).
1875
+ The sharp
1876
+ features on the qubit mode are the result of hybridization
1877
+ with spurious modes.
1878
+ displacement profile of the bare mechanical mode (black)
1879
+ and the hybridized mechanical-like mode (green) are al-
1880
+ most identical. However, we see that for the qubit-like
1881
+ mode (blue), the piezoelectric coupling to the qubit elec-
1882
+ tric field, which is asymmetric due to the thin lead of
1883
+ the antenna, results in an asymmetric displacement field.
1884
+ This asymmetry is not captured in the unhybridized ap-
1885
+ proach. Such a modification of the acoustic mode shape
1886
+ could lead to additional loss through imperfect mode con-
1887
+ finement. Studying these effects using the techniques de-
1888
+ scribed in the previous section will be the subject of fu-
1889
+ ture work.
1890
+
1891
+ 15
1892
+ [1] Y. Chu and S. Gr¨oblacher, Applied Physics Letters 117,
1893
+ 150503 (2020).
1894
+ [2] A. Clerk, K. Lehnert, P. Bertet, J. Petta, and Y. Naka-
1895
+ mura, Nature Physics 16, 257 (2020).
1896
+ [3] G. S. MacCabe, H. Ren, J. Luo, J. D. Cohen, H. Zhou,
1897
+ A. Sipahigil, M. Mirhosseini, and O. Painter, Science
1898
+ 370, 840 (2020).
1899
+ [4] V. Gokhale, B. Downey, D. Katzer, N. Nepal, A. Lang,
1900
+ R. Stroud, and D. Meyer, Nature Communications 11,
1901
+ 2314 (2020).
1902
+ [5] Y. Tsaturyan, A. Barg, E. S. Polzik, and A. Schliesser,
1903
+ Nature Nanotechnology 12, 776 (2017).
1904
+ [6] C. T. Hann, C.-L. Zou, Y. Zhang, Y. Chu, R. J.
1905
+ Schoelkopf, S. M. Girvin, and L. Jiang, Physical Review
1906
+ Letters 123, 250501 (2019).
1907
+ [7] M. Pechal, P. Arrangoiz-Arriola, and A. H. Safavi-Naeini,
1908
+ Quantum Sci. Technol 4, 15006 (2019).
1909
+ [8] C. Chamberland, K. Noh, P. Arrangoiz-Arriola, E. T.
1910
+ Campbell, C. T. Hann, J. Iverson, H. Putterman, T. C.
1911
+ Bohdanowicz, S. T. Flammia, A. Keller, et al., PRX
1912
+ Quantum 3, 010329 (2022).
1913
+ [9] I. Pikovski, M. R. Vanner, M. Aspelmeyer, M. S. Kim,
1914
+ and ˇC. Brukner, Nature Physics 8, 393 (2012).
1915
+ [10] J.-M. Pirkkalainen, S. Cho, J. Li, G. Paraoanu, P. Hako-
1916
+ nen, and M. Sillanp¨a¨a, Nature 494, 211 (2013).
1917
+ [11] J. J. Viennot, X. Ma, and K. W. Lehnert, Physical review
1918
+ letters 121, 183601 (2018).
1919
+ [12] A. D. O’Connell, M. Hofheinz, M. Ansmann, R. C. Bial-
1920
+ czak, M. Lenander, E. Lucero, M. Neeley, D. Sank,
1921
+ H. Wang, M. Weides, J. Wenner, J. M. Martinis, and
1922
+ a. N. Cleland, Nature 464, 697 (2010).
1923
+ [13] Y. Chu, P. Kharel, W. H. Renninger, L. D. Burkhart,
1924
+ L. Frunzio, P. T. Rakich, and R. J. Schoelkopf, Science
1925
+ 358, 199 (2017).
1926
+ [14] M. Kervinen, J. E. Ram´ırez-Mu˜noz, A. V¨alimaa, and
1927
+ M. A. Sillanp¨a¨a, Physical review letters 123, 240401
1928
+ (2019).
1929
+ [15] M. V. Gustafsson, T. Aref, a. F. Kockum, M. K. Ekstrom,
1930
+ G. Johansson, and P. Delsing, Science 346, 207 (2014).
1931
+ [16] B. A. Moores, L. R. Sletten, J. J. Viennot, and K. Lehn-
1932
+ ert, Physical review letters 120, 227701 (2018).
1933
+ [17] K. J. Satzinger, Y. P. Zhong, H.-S. Chang, G. A. Peairs,
1934
+ A. Bienfait, M.-H. Chou, A. Y. Cleland, C. R. Conner,
1935
+ ´E. Dumur, J. Grebel, I. Gutierrez, B. H. November, R. G.
1936
+ Povey, S. J. Whiteley, D. D. Awschalom, D. I. Schuster,
1937
+ and A. N. Cleland, Nature 563, 661 (2018).
1938
+ [18] P. Arrangoiz-Arriola, E. A. Wollack, M. Pechal, J. D.
1939
+ Witmer, J. T. Hill, and A. H. Safavi-Naeini, Physical
1940
+ Review X 8, 031007 (2018).
1941
+ [19] S. E. Nigg,
1942
+ H. Paik,
1943
+ B. Vlastakis,
1944
+ G. Kirchmair,
1945
+ S. Shankar, L. Frunzio, M. H. Devoret, R. J. Schoelkopf,
1946
+ and S. M. Girvin, Physical Review Letters 108, 240502
1947
+ (2012).
1948
+ [20] F. Solgun, D. W. Abraham, and D. P. DiVincenzo, Phys-
1949
+ ical Review B 90, 134504 (2014).
1950
+ [21] F. Solgun, Analysis and synthesis of multi-qubit, multi-
1951
+ mode quantum devices, Ph.D. thesis, RWTH Aachen Uni-
1952
+ versity (2015).
1953
+ [22] F. Solgun and D. P. DiVincenzo, Annals of Physics 361,
1954
+ 605 (2015).
1955
+ [23] Z. K. Minev, Z. Leghtas, S. O. Mundhada, L. Christakis,
1956
+ I. M. Pop, and M. H. Devoret, npj Quantum Information
1957
+ 7, 1 (2021).
1958
+ [24] Z. K. Minev, T. G. McConkey, M. Takita, A. D. Cor-
1959
+ coles, and J. M. Gambetta, arXiv:2103.10344 [cond-mat,
1960
+ physics:quant-ph] (2021).
1961
+ [25] COMSOL AB, Stockholm,
1962
+ Sweden, COMSOL Mul-
1963
+ tiphysics Structural Mechanics Module User’s Guide
1964
+ (2017).
1965
+ [26] Ansys, Inc., Ansys® High Frequency Electromagnetic
1966
+ Simulation Software R2 v. 21.2. (2021).
1967
+ [27] Cadence Design Systems, AWR Microwave Office Soft-
1968
+ ware v. 16 (2022).
1969
+ [28] Sonnet Software, Sonnet Suites® v. 18 (2022).
1970
+ [29] COMSOL
1971
+ AB,
1972
+ Stockholm,
1973
+ Sweden,
1974
+ COMSOL
1975
+ Multiphysics® v. 5.6. (2022).
1976
+ [30] P. Arrangoiz-Arriola and A. H. Safavi-Naeini, Physical
1977
+ Review A 94, 63864 (2016).
1978
+ [31] M. F. Gely and G. A. Steele, New Journal of Physics 22,
1979
+ 013025 (2020).
1980
+ [32] M. H. Devoret, in Fluctuations Quantiques/Quantum
1981
+ Fluctuations, edited by S. Reynaud, E. Giacobino, and
1982
+ J. Zinn-Justin (1997).
1983
+ [33] Y. Chu, P. Kharel, T. Yoon, L. Frunzio, P. T. Rakich,
1984
+ and R. J. Schoelkopf, Nature 563, 666 (2018).
1985
+ [34] U. von L¨upke, Y. Yang, M. Bild, L. Michaud, M. Fadel,
1986
+ and Y. Chu, Nature Physics 18, 794 (2022).
1987
+ [35] H. Paik, D. I. Schuster, L. S. Bishop, G. Kirchmair,
1988
+ G. Catelani, A. P. Sears, B. R. Johnson, M. J. Reagor,
1989
+ L. Frunzio, L. I. Glazman, S. M. Girvin, M. H. Devoret,
1990
+ and R. J. Schoelkopf, Physical Review Letters 107, 1
1991
+ (2011).
1992
+ [36] A piezoelectric multiphysics interface exists, but can only
1993
+ couple solid mechanics to the electrostatics interface,
1994
+ which is not suitable for simulating cQED devices. The
1995
+ electrostatics interface is unable to simulate a microwave
1996
+ cavity as it lacks a feature for phase propagation, and
1997
+ does not have a lumped element boundary condition.
1998
+ [37] J. Yang et al., An introduction to the theory of piezoelec-
1999
+ tricity, Vol. 9 (Springer, 2005).
2000
+ [38] COMSOL AB, Stockholm, Sweden, COMSOL Multi-
2001
+ physics Reference Manual (2020).
2002
+ [39] D. Corr and J. Davies, IEEE Transactions on Microwave
2003
+ Theory and Techniques 20, 669 (1972).
2004
+ [40] B. Rahman and J. Davies, IEEE Transactions on Mi-
2005
+ crowave Theory and Techniques 32, 922 (1984).
2006
+ [41] J. R. Winkler and J. B. Davies, Journal of Computational
2007
+ Physics 56, 1 (1984).
2008
+ [42] C. Chen, Z. Shang, J. Gong, F. Zhang, H. Zhou, B. Tang,
2009
+ Y. Xu, C. Zhang, Y. Yang, and X. Mu, ACS applied
2010
+ materials & interfaces 10, 1819 (2018).
2011
+ [43] A. Blais, A. L. Grimsmo, S. M. Girvin, and A. Wallraff,
2012
+ Rev. Mod. Phys. 93, 025005 (2021).
2013
+ [44] J. Koch, T. M. Yu, J. Gambetta, a. a. Houck, D. I. Schus-
2014
+ ter, J. Majer, A. Blais, M. H. Devoret, S. M. Girvin, and
2015
+ R. J. Schoelkopf, Physical Review A 76, 1 (2007).
2016
+ [45] D. Lachance-Quirion, Y. Tabuchi, A. Gloppe, K. Usami,
2017
+ and Y. Nakamura, Applied Physics Express 12, 070101
2018
+ (2019).
2019
+ [46] H. Chen, N. F. Opondo, B. Jiang, E. R. MacQuarrie,
2020
+ R. S. Daveau, S. A. Bhave, and G. D. Fuchs, Nano letters
2021
+
2022
+ 16
2023
+ 19, 7021 (2019).
2024
+ [47] D. Wigger, K. Gawarecki, and P. Machnikowski, Ad-
2025
+ vanced Quantum Technologies 4, 2000128 (2021).
2026
+ [48] D. Steck, Lecture notes in Quantum and Atom Optics
2027
+ (2007), revision 0.13.14.
2028
+ [49] D. Royer, D. Morgan, and E. Dieulesaint, Elastic Waves
2029
+ in Solids I: Free and Guided Propagation, Advanced
2030
+ Texts in Physics (Springer Berlin Heidelberg, 1999).
2031
+ [50] P. Arrangoiz-Arriola, E. A. Wollack, Z. Wang, M. Pechal,
2032
+ W. Jiang, T. P. McKenna, J. D. Witmer, R. Van Laer,
2033
+ and A. H. Safavi-Naeini, Nature 571, 537 (2019).
2034
+ [51] L. R. Sletten, B. A. Moores, J. J. Viennot, and K. W.
2035
+ Lehnert, Physical Review X 9, 021056 (2019).
2036
+ [52] T. Bl´esin, H. Tian, S. A. Bhave, and T. J. Kippenberg,
2037
+ Physical Review A 104, 052601 (2021).
2038
+ [53] COMSOL AB, Stockholm, Sweden, Manually Setting the
2039
+ Scaling of Variables (2023).
2040
+ [54] The equipartition theorem only applies to quadratic
2041
+ terms of the Hamiltonian.
2042
+ [55] C. Wang, C. Axline, Y. Y. Gao, T. Brecht, Y. Chu,
2043
+ L. Frunzio, M. H. Devoret, and R. J. Schoelkopf, Applied
2044
+ Physics Letters 107, 162601 (2015).
2045
+ [56] K. L. Geerlings, Improving Coherence of Superconduct-
2046
+ ing Qubits and Resonators, Ph.D. thesis, Yale University
2047
+ (2013).
2048
+ [57] S. Galliou, M. Goryachev, R. Bourquin, P. Abb´e, j.-p.
2049
+ Aubry, and M. Tobar, Scientific Reports 3, 2132 (2013).
2050
+
UtE4T4oBgHgl3EQfnA0d/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
V9E2T4oBgHgl3EQfDQar/content/tmp_files/2301.03623v1.pdf.txt ADDED
@@ -0,0 +1,2276 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03623v1 [quant-ph] 9 Jan 2023
2
+ Weyl conjecture and thermal radiation of finite systems
3
+ M. C. Baldiotti,1, ∗ M. A. Jaraba,1, † L. F. Santos,2, ‡ and C. Molina3, §
4
+ 1Departamento de Física, Universidade Estadual de Londrina, CEP 86051-990, Londrina-PR, Brazil.
5
+ 2Instituto de Física, Universidade de São Paulo,
6
+ Caixa Postal 66318, CEP 05315-970, São Paulo-SP, Brazil.
7
+ 3Escola de Artes, Ciências e Humanidades, Universidade de São Paulo,
8
+ Avenida Arlindo Bettio 1000, CEP 03828-000, São Paulo-SP, Brazil.
9
+ In this work, corrections for the Weyl law and Weyl conjecture in d dimensions are obtained and
10
+ effects related to the polarization and area term are analyzed. The derived formalism is applied on
11
+ the quasithermodynamics of the electromagnetic field in a finite d-dimensional box within a semi-
12
+ classical treatment. In this context, corrections to the Stefan-Boltzmann law are obtained. Special
13
+ attention is given to the two-dimensional scenario, since it can be used in the characterization of
14
+ experimental setups. Another application concerns acoustic perturbations in a quasithermodynamic
15
+ generalization of Debye model for a finite solid in d dimensions. Extensions and corrections for
16
+ known results and usual formulas, such as the Debye frequency and Dulong-Petit law, are calculated.
17
+ Keywords:
18
+ Weyl law, Weyl conjecture, quasithermodynamics of the electromagnetic field,
19
+ quasithermodynamics of acoustic perturbations, generalized Debye model
20
+ I.
21
+ INTRODUCTION
22
+ The analysis of thermal radiation is widespread in a large variety of finite-temperature systems. Theoretical research
23
+ includes treatments based on fluid dynamics and/or quantum field theory. Laboratory and observational applications
24
+ involve particle phenomenology in colliders, properties of solids in laboratories, characteristics of the cosmic microwave
25
+ background in dedicated observatories, among many more setups. From lower-dimensional settings to models with
26
+ arbitrary number of dimensions, thermal radiation frequently plays a significant role.
27
+ A common procedure for the investigation of thermal phenomena is based on the definition of a suitable thermody-
28
+ namic limit within a statistical mechanics model. Usually, the transition from statistical mechanics to thermodynamics
29
+ implies that the boundary conditions are neglected. In this way, the dependence of the obtained results with the actual
30
+ volume and shape of the physical system is not considered. Although this approach is useful for many purposes, the
31
+ strict thermodynamic limit disregards many interesting insights about the actual system of interest. One way to mit-
32
+ igate this problem is to define an intermediary regime between the pure statistical-mechanic treatment and the strict
33
+ thermodynamic regime, where the volume of the system is large, but finite. This is the so-called quasithermodynamic
34
+ limit [1].
35
+ On a very general level, the characteristics of thermal radiation in a given setup are directly linked to the asymptotic
36
+ distribution of eigenvalues of a suitable wave equation. One of the first investigators to explore this connection was
37
+ Rayleigh, studying the problem of stationary acoustic waves in a cubic room [2, 3]. Rayleigh’s analysis showed the
38
+ importance of a term proportional to the volume of the room and to the cube of the mode frequency (the V · ν3
39
+ term).
40
+ This result appeared in the (incorrect) description of the thermal radiation with the Rayleigh-Jeans law.
41
+ Eventually Planck improved this purely classical analysis, but even within the quantum description the eigenvalue
42
+ distribution remains unaltered. The same problem, and hence with the same V · ν3 term as the result, emerges in the
43
+ investigation of the vibration modes in a solid, with the so-called Debye model. In this treatment, Debye proposed
44
+ that the asymptotic behavior of the eigenvalues do not depend on the shape of the solid. This proposal was rigorously
45
+ proved by Weyl, and today it is known as the Weyl law. An overview of this development can be seen in [4, 5].
46
+ A central question considering the strict thermodynamic regime is when the approximation of infinite volume
47
+ adequately describes a real physical system. For the treatment of this issue, it is necessary an estimate of the terms
48
+ that are being dropped in the thermodynamic limit. A first step in this direction is given by Weyl conjecture, which
49
+ predicts corrections proportional to the area of the body. This conjecture has been proven in a variety of domains
50
+ and in this process, several methods can be applied. For instance, asymptotically expanding the solutions of the
51
+ Helmholtz equation, using the Neumann-Poincaré construction for the Brownell Green’s function and considering the
52
+ decomposition of the mode density via multiple reflection expansion [6, 7].
53
+ ∗ baldiotti@uel.br
54
+ † jaraba.marcosrod@uel.br
55
+ ‡ luisf@usp.br
56
+ § cmolina@usp.br
57
+
58
+ 2
59
+ For many important problems, involving for example the electromagnetic field, vector solutions and polarization
60
+ effects must be considered. For this purpose, a possible approach is to decompose the vector fields into solutions of
61
+ the suitable scalar wave equation [6, 8–10]. Following this program, many works in the pertinent literature indicate
62
+ that the area term (i.e., the term of Weyl conjecture) does not participate in describing the behavior of the thermal
63
+ electromagnetic radiation.
64
+ Previous comments refer mainly to usual scenarios with three dimensions. But the relevance of the proposed treat-
65
+ ment appears in models with different dimensionalities. For instance, the thermodynamic and quasithermodynamic
66
+ analyses of two-dimensional systems have practical applications in the so-called single-layer materials [11], with high-
67
+ lights to the graphene [12]. As a more theoretical application, we can mention the thermodynamic properties of
68
+ photon spheres [13], thermal radiation of the two-dimensional bosonic and fermionic modes of black holes [14], as
69
+ well the description of thermodynamics properties of BTZ black holes [15]. Considering three-dimensional systems,
70
+ corrections in thermal radiation play an important role in the analysis of the background microwave radiation [16].
71
+ The development is also relevant in the thermodynamic description of the phenomenon of sonoluminescence (hot
72
+ spot theory), in which pulses of light are created by means of the insertion of sound waves into liquids or gases [17].
73
+ Systems with more than three spatial dimensions are also explored. For instance, Hawking emission of a black hole
74
+ is altered in brane-world scenarios [18–20]. Thermal radiation phenomena associated with gravitational emission in
75
+ brane-world models could be significant in the early Universe. Similar effects could be expected in colliders and near
76
+ active astrophysical objects, within models involving extra dimensions (see for example [21] and references therein).
77
+ Proposals linking anti-de Sitter geometries and conformal field theories (AdS/CFT correspondences) offer a great
78
+ variety of applications for d-dimensional thermodynamic results [22–25].
79
+ In the present work, Weyl law and its extensions are explored through an intuitive approach. Quasithermodynamic
80
+ analysis and its description of systems with a finite volume and relevant boundary conditions are a central issue in
81
+ this article. The developed formalism is applied on the quasithermodynamics of the electromagnetic field in a cavity
82
+ and acoustic perturbations in a solid. Generalizations for d-dimensional setups are derived. One of the contributions
83
+ of this work is to incorporate polarization effects directly into the asymptotic expansions of the mode distributions,
84
+ using mixed boundary conditions. We emphasize the role of the area term, showing that, under certain conditions, a
85
+ distinct quasithermodynamic behavior emerges.
86
+ In addition to the correction coming from the eigenvalue distribution, an expected characteristic of the phenomenol-
87
+ ogy of black-body radiation in finite cavities is the existence of a minimum energy.1 For the two-dimensional case,
88
+ this issue was studied in [26]. Generalizing this development for arbitrary dimensions, our treatment allows us to
89
+ compare the effects associated to the minimum energy with those related to corrections of the spectral distribution.
90
+ This work is organized as follows. In section II, the proposed formalism associated to the Weyl law is established.
91
+ In section III, with the techniques introduced, higher-order corrections to the Weyl law are obtained. More complex
92
+ setups are considered in section IV, where mixed boundary conditions and degeneracies are treated. In section V
93
+ we turn to physics applications, linking the results previously obtained with thermodynamics and quasithermody-
94
+ namics. In section VI, the thermodynamic treatment of the electromagnetic field in a finite cavity is conducted.
95
+ The quasithermodynamics of acoustic perturbations is considered in section VII, where Debye model is analyzed and
96
+ extended. In section VIII final comments and future perspectives are presented. Further details on the calculation of
97
+ the hypervolume associated to the axes and counting functions are discussed in appendices A and B.
98
+ II.
99
+ SCALAR FIELD AND WEYL LAW
100
+ Electromagnetic and mechanic perturbations in cavities and solids are the main interest in the present work.
101
+ However, as we will see later on, the thermodynamics of those systems can be described in terms of a simpler scalar
102
+ perturbation. Let us consider a scalar field ψ (x1, . . . , xd) in d dimensions, confined in a cubic cavity of size L, which
103
+ respects the Helmholtz equation,
104
+ ∇2
105
+ dψ (x1, . . . , xd) + k2ψ (x1, . . . , xd) = 0 , xi ∈ Ωd , k ∈ R .
106
+ (1)
107
+ In Eq. (1), ∇2
108
+ d denotes the d-dimensional Laplacian. The hypervolumes of domain Ωd and its boundary ∂Ωd are given
109
+ respectively by
110
+ |Ωd| = Ld , |∂Ωd| = 2dLd−1 .
111
+ (2)
112
+ 1 This lower bound on the energy of the system would be associated to the quantum vacuum, according to [26].
113
+
114
+ 3
115
+ Two different boundary conditions for Eq. (1) will be initially explored, namely the Neumann condition (∂nψ = 0 at
116
+ ∂Ωd) and the Dirichlet condition (ψ = 0 at ∂Ωd).
117
+ Solutions of the d-dimensional Helmholtz equation (1) can be constructed using the one-dimensional version of (1),
118
+ which are
119
+ φ±
120
+ n (x) = e−iπ/4 ± eiπ/4
121
+
122
+ 4L
123
+
124
+ eiknx ± e−iknx�
125
+ , kn = π
126
+ Ln , n =
127
+
128
+ 0, 1, 2, . . .(+)
129
+ 1, 2, 3, . . .(−) .
130
+ (3)
131
+ The label (+) indicates solutions satisfying Neumann conditions, while (−) denotes solutions obeying Dirichlet con-
132
+ ditions. From the one-dimensional solutions, d-dimensional generalizations can be constructed as
133
+ ψ± (x1, . . . , xd) = φ±
134
+ n1(x1)φ±
135
+ n2(x2) · · · φ±
136
+ nd(xd) ,
137
+ (4)
138
+ with
139
+ k2 = π2
140
+ L2 (n2
141
+ 1 + · · · + n2
142
+ d) .
143
+ (5)
144
+ It should be noted that, for the Dirichlet case, the solutions with ni = 0 should be excluded in order to avoid the null
145
+ solution.
146
+ Considering Eq. (5), the set of solutions of the Helmholtz equation (1) can be labeled by points in a discrete lattice.
147
+ Specifically, we consider the d-dimensional Cartesian lattice Ld
148
+ ǫ,
149
+ Ld
150
+ ǫ ≡
151
+
152
+ (ǫ1, ǫ2, . . . , ǫd) ∈ Rd : ǫi = ǫni , ni = 0, 1, 2, . . .
153
+
154
+ ,
155
+ (6)
156
+ where the (real and positive) ǫ is the lattice parameter. We denote the region ˜Ωd ⊂ Rd as one of the 2d sections of
157
+ the d-dimensional sphere of radius k, i.e.,
158
+ ˜Ωd ≡
159
+
160
+ (ǫ1, ǫ2, . . . , ǫd) ∈ Rd : ǫ2
161
+ 1 + ǫ2
162
+ 2 + · · · + ǫ2
163
+ d < k2 , ǫi ⩾ 0
164
+
165
+ .
166
+ (7)
167
+ The main questions addressed in the present work can be formulated as counting problems. In this direction, let
168
+ us define a counting function N (d)(k) as
169
+ N (d) (k) =
170
+
171
+ # (n1, . . . , nd) : π2
172
+ L2
173
+
174
+ n2
175
+ 1 + · · · + n2
176
+ d
177
+
178
+ < k2
179
+
180
+ .
181
+ (8)
182
+ The function N (d)(k) can be expressed as
183
+ N (d)(k) = card
184
+
185
+ Ld
186
+ ǫ ∩ ˜Ωd
187
+
188
+ , ǫ = π
189
+ L ,
190
+ (9)
191
+ where “card” denotes the cardinality of the set [27]. It should be noted that the complete dependence of N (d)(k) on
192
+ k is described by ˜Ωd, since the lattice is (for now) fixed. We are interested in the asymptotic behavior of N (d)(k) as
193
+ k → ∞.
194
+ One method for the analysis is to adopt a “coarse grained” version of the lattice, where the counting of the discrete
195
+ points is substituted by the calculation of volumes. More specifically, the function N (d)(k) is approximated by the
196
+ volume Vd(k) generated by hypercubes of side length ǫ, centered on the points of the lattice belonging to Ld
197
+ ǫ ∩ ˜Ωd(k).
198
+ We illustrate this coarse graining in Figs. 1 and 2 of the next section. The volume of each hypercube is ǫd, and hence
199
+ Vd (k) = ǫdN (d)(k). The total volume Vd (k) tends to infinity as k → ∞, N (d)(k) → ∞ and ǫ is kept fixed.
200
+ Expression (9) and the coarse graining introduced are a well-known algorithm for the counting process, in which
201
+ the lattice is kept fixed. In the present work, we propose an alternative approach. Instead of fixing ǫ (that is, the
202
+ lattice), we fix the volume Vd (k). In other words, we propose to maintain the domain fixed and adjust the lattice.
203
+ This can be accomplished rescaling ǫi,
204
+ ǫi −→ ǫi = k−1ǫi = ǫni , ǫ = π
205
+ kL .
206
+ (10)
207
+ With the rescaling, both the counting function N (d) (k) and the volume Vd become dependent only on the lattice,
208
+ that is,
209
+ Vd (ǫ) = ǫdN (d)(ǫ) .
210
+ (11)
211
+
212
+ 4
213
+ Intuitively, Vd(ǫ) should tend to the volume |˜Ωd| as the lattice becomes more dense (ǫ → 0+), where
214
+ ���˜Ωd
215
+ ��� = 2−dωd , ωd =
216
+ πd/2
217
+ Γ
218
+ � d
219
+ 2 + 1
220
+ � ,
221
+ (12)
222
+ and Γ denotes the usual gamma function. The precise development of this relation will lead to the so-called Weyl
223
+ law, which will be explicitly shown with the approach proposed in this work.
224
+ To clarify the notation, let us denote the counting function for the Neumann case as N (d)
225
+ + , and analogously N (d)
226
+
227
+ for
228
+ the Dirichlet case. We focus on the difference in the counting problem considering the Neumann and Dirichlet setup.
229
+ This difference is a result of the inclusion of the points belonging to the ǫi-axis for the calculation of N (d)
230
+ + , and the
231
+ exclusion for N (d)
232
+ − .
233
+ Let us treat the Neumann boundary condition first, since (as will be shown in later sections) N (d)
234
+
235
+ can be expressed
236
+ in terms of N (d)
237
+ + . The counting function N (d)
238
+ +
239
+ can be written as
240
+ N (d)
241
+ + (ǫ) =
242
+ M(ǫ)
243
+
244
+ n1=0
245
+ · · ·
246
+ M(ǫ)
247
+
248
+ nd−1=0
249
+ 
250
+
251
+ 1 − ǫ2(n2
252
+ 1 + · · · + n2
253
+ d−1)
254
+ ǫ
255
+  , M(ǫ) =
256
+ �1
257
+ ǫ
258
+
259
+ ,
260
+ (13)
261
+ with ⌊x⌋ representing the integer function (or floor function) of x [28]. Using the sawtooth function η(x), η(x) ≡ x−⌊x⌋,
262
+ Eq. (11) is written as
263
+ V +
264
+ d (ǫ) = ǫd−1
265
+ M(ǫ)
266
+
267
+ n1=0
268
+ · · ·
269
+ M(ǫ)
270
+
271
+ nd−1=0
272
+
273
+ 1 − ǫ2(n2
274
+ 1 + · · · + n2
275
+ d−1) − ǫd
276
+ M(ǫ)
277
+
278
+ n1=0
279
+ · · ·
280
+ M(ǫ)
281
+
282
+ nd−1=0
283
+ η
284
+ �1
285
+ ǫ
286
+
287
+ .
288
+ (14)
289
+ Since 0 ≤ η < 1, the second term of Eq. (14) obeys the following property:
290
+ 0 ≤ ǫd
291
+ M(ǫ)
292
+
293
+ n1=0
294
+ · · ·
295
+ M(ǫ)
296
+
297
+ nd−1=0
298
+ η < ǫ [ǫ + ǫM (ǫ)]d−1 ,
299
+ (15)
300
+ implying that
301
+ lim
302
+ ǫ→0+ ǫd
303
+ M(ǫ)
304
+
305
+ n1=0
306
+ · · ·
307
+ M(ǫ)
308
+
309
+ nd−1=0
310
+ η
311
+ �1
312
+ ǫ
313
+
314
+ = 0 .
315
+ (16)
316
+ Previous results lead to the Weyl law, as we will show in the following. Considering the first term in Eq. (14), we
317
+ observe that
318
+ ǫ =
319
+ M −1
320
+ 1 + ηM −1 ⇒ lim
321
+ ǫ→0+ ǫ =
322
+ lim
323
+ M→∞
324
+ M −1
325
+ 1 + ηM −1 =
326
+ lim
327
+ M→∞ M −1 ,
328
+ (17)
329
+ and we can write
330
+ lim
331
+ ǫ→0+ ǫd−1
332
+ M(ǫ)
333
+
334
+ n1=0
335
+ · · ·
336
+ M(ǫ)
337
+
338
+ nd−1=0
339
+
340
+ 1 − ǫ2 �
341
+ n2
342
+ 1 + · · · + n2
343
+ d−1
344
+
345
+ =
346
+ lim
347
+ M→∞
348
+ 1
349
+ M d−1
350
+ M(ǫ)
351
+
352
+ n1=0
353
+ · · ·
354
+ M(ǫ)
355
+
356
+ nd−1=0
357
+
358
+ 1 − n2
359
+ 1 + · · · + n2
360
+ d−1
361
+ M 2
362
+ .
363
+ (18)
364
+ The last terms in Eq. (18) is the Riemann sum which gives the volume of ˜Ωd. Hence, using Eq. (16), we conclude that
365
+ lim
366
+ ǫ→0+ V +
367
+ d (ǫ) = 2−dωd .
368
+ (19)
369
+ Result (19) is the Weyl law for the scalar field in a cubic cavity, with Neumann boundary conditions.
370
+ Although the Weyl law is a well-known result, the procedure adopted here (that is, a coarse graining with a scaling
371
+ which fixes the domain and modifies the lattice) can be employed in the improvement of the result (19). Also, this
372
+ approach will allow us to consider different boundary conditions and polarization effects.
373
+
374
+ 5
375
+ III.
376
+ BEYOND THE WEYL CONJECTURE
377
+ Weyl law can be considered as the zero-order correction of the counting function. The first-order correction was
378
+ conjectured by Weyl and later proven by Ivrii [31]. In our notation, the Weyl conjecture can be written as
379
+ ǫdN (d)
380
+ ± (ǫ) = 2−dωd ± 2−ddωd−1ǫ + O(ǫwd) ,
381
+ (20)
382
+ where wd =
383
+
384
+ d2 − d + 1 + 1/d
385
+
386
+ / (d − 1) [32]. In the “big-O” sense, no higher-order corrections are known2 [31, 32].
387
+ Although for the scalar case the above correction is always the most relevant, as we will see, when considering the
388
+ vector problem this correction may cancels. Therefore, its important to go beyond the first correction. For this goal
389
+ a special type of “averaged corrections” can be considered. It is defined using Gaussian logarithmic averages, or the
390
+ called Brownell’s ˜O formalism [32]. One says that f = ˜O (g) if, for some x0,
391
+ ����
392
+ � ∞
393
+ x0
394
+ e− 1
395
+ 2 ρ2(ln
396
+ y
397
+ x′ )
398
+ 2
399
+ df(x)
400
+ dx
401
+ ����
402
+ x′ dx′
403
+ ���� ≤ δρg (y) ,
404
+ (21)
405
+ for every ρ > 0 and some δρ < ∞. For the case d = 2, 3, it is found that
406
+ ǫ2N (2)
407
+ ± (ǫ) = π
408
+ 4 ± ǫ + ǫ2
409
+ 4 + ˜O(ǫ ˜
410
+ w2) ,
411
+ (22)
412
+ ǫ3N (3)
413
+ ± (ǫ) = π
414
+ 6 ± 3π
415
+ 8 ǫ + 3
416
+ 4ǫ2 ± ǫ3
417
+ 8 + ˜O(ǫ ˜
418
+ w3) ,
419
+ (23)
420
+ where ˜w2 > 2 and ˜w3 > 3 [30, 32]. As will be seen below, the corrections (22)-(23) are given by a polynomial expansion
421
+ whose coefficients are related to the geometric “shape” of the ˜Ωd boundary. Based on this geometric argument, it will
422
+ be seen that we can always decompose ǫdN (d)
423
+ + (ǫ) as the sum of two contributions: one continuous component, that
424
+ we will denote by F(d)(ǫ), and other non-continuous.
425
+ Our goal in this section is to explore the relation between the functional form of F(d)(ǫ) and the corrections derived
426
+ from the Brownell formalism. We will employ a “bottom-up approach”, considering in detail particular values for d,
427
+ and then extrapolating the results for general d.
428
+ The one-dimensional case (d = 1) is trivial, however it is crucial to construct the bottom-up approach. For this
429
+ case, the Brownell corrections coincide with the exact corrections. From Eq. (13), the counting function for Neumann
430
+ boundary condition is given by
431
+ ǫN (1)
432
+ + (ǫ) = 1 − ǫη
433
+
434
+ ǫ−1�
435
+ ∼ 1 ⇒ F(1)(ǫ) = 1 .
436
+ (24)
437
+ For the Dirichlet boundary condition the result is similar:
438
+ ǫN (1)
439
+ − (ǫ) = ǫ[N (1)
440
+ + (ǫ) − 1] = 1 − ǫ[1 + η
441
+
442
+ ǫ−1�
443
+ ] ∼ 1 .
444
+ (25)
445
+ For the two-dimensional Neumann scenario, given the shape of ˜Ω2 boundary, we can decompose ǫ2N (2)
446
+ +
447
+ as
448
+ ǫ2N (2)
449
+ + (ǫ) = π
450
+ 4 + axes-boundary area + area of the boundary curve.
451
+ (26)
452
+ This result is illustrated in Fig. 1. More precisely, the “axes-boundary area” is the excess area localized around the
453
+ axes (which are not included in ˜Ω2). As seen in Fig. 1, this quantity is
454
+ axes-boundary area = ǫ + ǫ2
455
+ 4 .
456
+ (27)
457
+ Notice that we are considering the contribution of each axis in the interval [0, 1], implying that the contribution of
458
+ the central square is ǫ2/4. The contribution of the area of the boundary curve is unknown.3 However we know that it
459
+ 2 One writes f(x) = O(g(x)) if there exists a real δ > 0 and x0 such that |f (x)| ≤ δg (x) for all x > x0. That is, f is smaller than g as
460
+ x → ∞, and the asymptotic behavior of f is bounded by the function g.
461
+ 3 This is related to the famous, and still open, Gauss circle problem [29].
462
+
463
+ 6
464
+ Figure 1. Two-dimensional coarse graining and lattice considered in the counting process. The solid gray region contributes
465
+ with an area equals to π/4 (one fourth of the circle) and each axis contributes with an area equals to ǫ/2.
466
+ is described by a non-continuous function, otherwise N (2)
467
+ + (ǫ) would be a continuous function and we know that this
468
+ is not true. Hence, it follows that F(2)(ǫ) in this case is
469
+ F(2)(ǫ) = π
470
+ 4 + ǫ + ǫ2
471
+ 4 ,
472
+ (28)
473
+ which agrees with the Brownell corrections given in Eq. (22) for the Neumann case.
474
+ For the two-dimensional Dirichlet scenario, note that we can relate N (2)
475
+
476
+ and N (2)
477
+ +
478
+ as
479
+ N (2)
480
+ + (ǫ) =
481
+ N (2)
482
+ − (ǫ)
483
+ � �� �
484
+ points outside the axes
485
+ + 2N (1)
486
+ − (ǫ) + 1
487
+
488
+ ��
489
+
490
+ points at the axes
491
+ .
492
+ (29)
493
+ Isolating N (2)
494
+
495
+ and using results (24) and (28), we obtain the Brownell corrections given in Eq. (22) for Dirichlet.
496
+ The analysis for the three-dimensional case can be conducted in an analogous manner. To illustrate the development,
497
+ let us consider Fig. 2, the generalization of two-dimensional lattice diagram (one eighth of the three-dimensional sphere
498
+ instead of one fourth of the two-dimensional circle).
499
+ With the three-dimensional lattice with Neumann boundary conditions, we get that F(3)(ǫ) for this case is
500
+ F(3)(ǫ) = π
501
+ 6 + 3π
502
+ 8 ǫ + 3
503
+ 4ǫ2 + ǫ3
504
+ 8 .
505
+ (30)
506
+ Again, the Brownell corrections for Neumann given in Eq. (23), are obtained.
507
+ For the three-dimensional case with Dirichlet boundary conditions, the counting function can be decomposed as
508
+ N (3)
509
+ + (ǫ) =
510
+ N (3)
511
+ − (ǫ)
512
+ � �� �
513
+ points outside the axes
514
+ +
515
+ 3N (2)
516
+ − (ǫ)
517
+
518
+ ��
519
+
520
+ points at the faces
521
+ + 3N (1)
522
+ − (ǫ) + 1
523
+
524
+ ��
525
+
526
+ points at the axes
527
+ .
528
+ (31)
529
+ Using previous results, we obtain expression (23).
530
+ After studying the cases d = 2 and d = 3 in detail, we can generalize these results to higher dimensions. Let
531
+ us initially consider the d-dimensional scenario with Neumann boundary conditions. As in Eq. (26), the counting
532
+ function ǫdN (d)
533
+ +
534
+ can be expressed as the sum of three contributions: the term |˜Ωd|, the hypervolume associated to the
535
+ axes and the hypervolume of the boundary hypersurface. In appendix A, we show that the hypervolume associated
536
+ to the axes is given by
537
+ Hypervolume of the axes =
538
+ d
539
+
540
+ n=1
541
+ �d
542
+ n
543
+
544
+ 2−dωd−nǫn ,
545
+ (32)
546
+
547
+ 6916 y16bnuod-29xA
548
+ 4
549
+ H
550
+
551
+ E7
552
+ Figure 2. Three-dimensional coarse graining and axes-boundary area. The dotted dark lines represent the 1/8 of the sphere,
553
+ that contributes with π/6. The solids part of the cubes represents the axes-boundary area. The center cube contributes with
554
+ ǫ3/8. The cubes in each axis contributes with ǫ2/4 . The cubes in the faces represents 3 times 1/4 of the area of the circles,
555
+ i.e., 3π/4 times ǫ. But only half this value, i.e., 3πǫ/8, contributes.
556
+ where
557
+ �d
558
+ n
559
+
560
+ =
561
+ d!
562
+ n! (d − n)! .
563
+ (33)
564
+ Hence,
565
+ F(d) (ǫ) =
566
+ d
567
+
568
+ n=0
569
+ �d
570
+ n
571
+
572
+ 2−dωd−nǫn .
573
+ (34)
574
+ The result obtained above generalizes the corrections (22)-(23) to an arbitrary dimension. By repeating the procedure
575
+ realized in [32] for d = 2, 3, and the using the Theorem (8.17) on this reference, we can find
576
+ ǫdN (d)
577
+ + (ǫ) = F(d) (ǫ) + ˜O(ǫ ˜
578
+ wd) , ˜wd > d .
579
+ (35)
580
+ The Dirichlet case can be obtained using a generalization of expressions (29) and (31).
581
+ This generalization is
582
+ constructed in Appendix B, and the final expression can be condensed into
583
+ ǫdN (d)
584
+ ± (ǫ) =
585
+ d
586
+
587
+ n=0
588
+
589
+ (−1)
590
+ d−n
591
+ 2
592
+ �1∓1 �d
593
+ n
594
+
595
+ 2−dωd−nǫn + ˜O
596
+
597
+ ǫ ˜
598
+ wd�
599
+ .
600
+ (36)
601
+ Expression (36) is the main result of this section. Note that this equation also maintains the “alternating symmetry”
602
+ observed for the cases d = 2, 3, when we go from Neumann to Dirichlet. If the coefficients do not follow this binomial
603
+ pattern, the alternating symmetry in the signs of coefficients is broken.
604
+ Rewriting expression (36) in terms of the variable k, we have the results provided by Brownell’s formalism for higher
605
+ orders,
606
+ N (d)
607
+ ± (k) = 1
608
+ 2d
609
+ d
610
+
611
+ n=0
612
+
613
+ (−1)
614
+ d−n
615
+ 2
616
+ �1∓1 �d
617
+ n
618
+ �π(n−d)/2Ld−n
619
+ Γ
620
+ � d−n
621
+ 2
622
+ + 1
623
+ � kd−n + ˜O
624
+
625
+ kd− ˜wd�
626
+ ,
627
+ (37)
628
+ where ˜wd > d.
629
+
630
+ T
631
+ X
632
+ +
633
+ +
634
+ H
635
+ +
636
+ 18
637
+ IV.
638
+ MIXED BOUNDARY CONDITIONS AND DEGENERACIES
639
+ From the results involving Neumann and Dirichlet cases discussed, it is possible to treat more complex boundary
640
+ conditions, dubbed here as “mixed boundary conditions”. Also, in the present section, we will consider the effects
641
+ of degeneracies in the spectra. Those setups model physical systems described by Helmholtz equation which will be
642
+ considered in this work. Further interesting examples (not directly addressed here) can be found in [33, 34].
643
+ In the present development, mixed boundary conditions are constructed imposing Neumann and Dirichlet conditions
644
+ in different axes. The solutions of Helmholtz equation (1) under these conditions can be written as
645
+ ψM (x1, . . . , xd) = φ± (x1) · · · φ± (xd) .
646
+ (38)
647
+ In d dimensions, the number of possible scenarios with mixed boundary conditions is 2d, including the ones which
648
+ are entirely Dirichlet or Neumann. In any case, the counting function (referred generally as N (d)
649
+ M
650
+ for an arbitrary
651
+ boundary condition) can be decomposed as a linear combination in the form
652
+ N (d)
653
+ M (ǫ) =
654
+ d
655
+
656
+ n=0
657
+ AnN (n)
658
+
659
+ (ǫ) ,
660
+ (39)
661
+ where the coefficients {An} are related to the boundary conditions and possible degeneracies.
662
+ For example, re-
663
+ sult (B1) for the Neumann case without degeneracies is recovered with An =
664
+ �d
665
+ n
666
+
667
+ (see Appendix B for details). This
668
+ expression (B1) can be generalized with the consideration of vector fields associated to the Helmholtz equation. This
669
+ development will be necessary to the treatment of degeneracies. In the vector-field problem, beside the d modes
670
+ {n1, n2, . . . , nd}, there are also d components for the fields, {F i
671
+ n1···nd , i = 1, . . . , d}. However, contrary to the scalar
672
+ field, the internal degrees of freedom of the vector fields must be taken into account. There is, the polarization of the
673
+ vector field is an issue.
674
+ Possible polarizations can be transverse and longitudinal. Indeed, the vector fields can be expressed as
675
+ F i
676
+ n1···nd = F 0i
677
+ χ
678
+
679
+ k=1
680
+ φ+
681
+ nk
682
+ d
683
+
684
+ j=χ+1
685
+ φ−
686
+ nj , i = 1, . . . , d ,
687
+ (40)
688
+ with constants F 0i ∈ C. Following the development which leaded to Eq. (B1), non-trivial solutions can be separated
689
+ into (χ + 1) classes: those in which only one ni is null, those in which two ni are null, and so on, up to those which
690
+ χ of the ni are equal to zero. Let us label these classes as “class zero”, “class one”, and so on, respectively.
691
+ The solutions where χ of the possible nk are null (forming the class χ) have only one non-null component F i
692
+ n1···nd.
693
+ These solutions are polarized in the direction of this component. In the same way, solutions with (χ − 1) of the
694
+ possible ni being null have two non-null components, and consequently two possible polarizations. Hence, the class n
695
+ has a degenerescence equal to
696
+ ξ(d,χ)
697
+ χ−i = i + 1 , i = 0, . . . , χ − 1 , χ ≤ d .
698
+ (41)
699
+ For the class zero, where none of the ni is null, all the components F i
700
+ n1···nd can be non-null and we have d degrees
701
+ of freedom, ξ(d,χ)
702
+ 0
703
+ = d . This counting of the degrees of freedom considers only the effect of the boundary conditions.
704
+ In addition, one can also impose the orthogonality condition, which prevents the longitudinal modes. This condition
705
+ requires that the amplitude vector to be perpendicular to the wave vector,
706
+ d
707
+
708
+ n=1
709
+ knF 0n = 0 ,
710
+ (42)
711
+ which reduces by one the number of degrees of freedom of the zero class configuration. Therefore, we can write
712
+ ξ(d,χ)
713
+ 0
714
+ = ξ(d)
715
+ 0
716
+ = d − ˜ξ ,
717
+ (43)
718
+ where ˜ξ = 1 for systems which admit only transverse perturbations and ˜ξ = 0 for cases where longitudinal perturba-
719
+ tions are considered.
720
+ As commented in Appendix B, each class n of the (χ + 1) vector solutions behaves as the Dirichlet problem in
721
+ (d − n) dimensions. The class with only one of the ni equal to zero (degenerescence equal to ξ(d,χ)
722
+ 1
723
+ ) can be divided
724
+
725
+ 9
726
+ in d sub-classes (d cases where nj = 0). If two of the solutions have nj = 0 (degenerescence ξ(d,χ)
727
+ 2
728
+ ), the subclass can
729
+ then be further separated in
730
+ �d
731
+ 2
732
+
733
+ sets. The process continues, until eventually new sub-classes can not be produced.
734
+ Given the counting process presented, the total number of modes can be expressed as the composition of the classes
735
+ and sub-classes thus constructed,
736
+ N (d)
737
+ χ
738
+ =
739
+ χ
740
+
741
+ n=0
742
+ (#n-class) × (n-degenerescence) × N (d−n)
743
+
744
+ ,
745
+ (44)
746
+ or
747
+ N (d)
748
+ χ
749
+ (ǫ) =
750
+ χ
751
+
752
+ n=0
753
+ �d
754
+ n
755
+
756
+ ξ(d,χ)
757
+ n
758
+ N (d−n)
759
+
760
+ (ǫ) ,
761
+ (45)
762
+ with N (m)
763
+
764
+ given by Eq. (37), ξ(d,χ)
765
+ m
766
+ in Eq. (41) for m > 0 and ξ(d,χ)
767
+ 0
768
+ in Eq. (43). We emphasize that expression (45)
769
+ is one of the main results of the present work. For χ = d and no polarization (ξ(d)
770
+ i
771
+ = 1 , ∀i = 0, . . . , d), Eq. (B1) in
772
+ Appendix B is recovered.
773
+ In the following sections we will apply the formalism developed in concrete scenarios. Namely, we will discuss the
774
+ thermodynamics of the electromagnetic field in a hypercubic cavity and acoustic perturbations in a generalized version
775
+ of Debye model.
776
+ V.
777
+ THERMODYNAMIC AND QUASITHERMODYNAMIC LIMITS
778
+ From the Weyl law and its extensions, we turn to physics applications. The goal of this section is to connect the
779
+ derived expansions for the counting functions with thermodynamic analyses. In this context, corrections of the Weyl
780
+ law will correspond to the transition from the strict thermodynamic limit to the quasithermodynamic approach.
781
+ Let us assume a semi-classical treatment, with the physical system of interest being described by solutions of the
782
+ Helmholtz equation (1). In the treatment, we consider a d-dimensional cubic box with side length L populated by
783
+ a thermal gas. The gas is composed by effective massless particles (actually modes associated to electromagnetic
784
+ or acoustic perturbations) with a well-defined energy and subjected to the Bose-Einstein statistics. The system is
785
+ supposed to be in thermal equilibrium with constant temperature T . The number of modes is not conserved, and
786
+ hence the chemical potential µ is null. Since the temperature and chemical potential are fixed, the grand canonical
787
+ ensemble is assumed.
788
+ A macroscopic treatment is established if a thermodynamic limit can be achieved. Since that we are employing a
789
+ grand canonical ensemble, the strict thermodynamic limit is defined as [35]
790
+ |Ωd| → ∞ with T fixed and µ = 0 ,
791
+ (46)
792
+ where |Ωd| is the hypervolume of the domain Ωd. As seen from Eq. (2), this condition implies that
793
+ LT → ∞ with T ̸= 0 fixed and µ = 0 .
794
+ (47)
795
+ It is also important to consider not only the thermodynamic limit, but also how this limit is approached. Hence,
796
+ we establish the quasithermodynamic limit [1] as
797
+ |Ωd| large but finite, with T fixed and µ = 0 .
798
+ (48)
799
+ The quasithermodynamic is particularly relevant in the present work, where finite cavities or solids are considered.
800
+ Given that the system of interest is compatible with thermodynamic and quasithermodynamic limits, the associated
801
+ partition function can be written as
802
+ ln Z = −
803
+ � ∞
804
+ 0
805
+ D(ω) ln
806
+
807
+ 1 − exp
808
+
809
+ − ℏω
810
+ kBT
811
+ ��
812
+ dω ,
813
+ (49)
814
+ where D(ω) is the spectral density function. Expression (49) can be seen as the Thomas-Fermi approximation for
815
+ the exact grand canonical partition function. From Z, all the associated thermodynamic and quasithermodynamic
816
+ quantities can be readily calculated. For example, the internal energy is given by
817
+ U = kBT 2 ∂
818
+ ∂T (ln Z) .
819
+ (50)
820
+
821
+ 10
822
+ In a practical implementation of the quasithermodynamic limit, combined with the assumption that the temperature
823
+ of the system is fixed, the box length L should be large enough so that [24]
824
+ kB
825
+ ℏc LT ≫ 1 , with LT kept finite.
826
+ (51)
827
+ As reference, kB/(ℏc) ≈ 436.7 K−1 m−1 in SI units. The relation between the spectral density D in the partition
828
+ function (49) and the counting functions studied in the previous sections (collectively denoted by N (d)) is given by
829
+ D(ω) dω = dN (d)(ω)
830
+
831
+ dω .
832
+ (52)
833
+ It follows that the Weyl law (19) is connected with the strict thermodynamic limit (47) when only the term with highest
834
+ power of LT is considered in the asymptotic expansion of the counting function. For the link between extensions of
835
+ Weyl law and the quasithermodynamic limit (51), subdominant corrections on powers of LT are also considered in
836
+ this expansion. It should be noted that, although result (45) for the counting function is valid for any values of L, it
837
+ is only when condition (51) is satisfied that the integral form (49) of the partition function can be employed.
838
+ VI.
839
+ QUASITHERMODYNAMICS OF THE ELECTROMAGNETIC FIELD
840
+ A first application of the developed formalism involves quasithermodynamics of the electromagnetic field in a
841
+ (hyper)cubic cavity. Let us consider a cubical cavity in d dimensions with side length L. Its faces are supposed to
842
+ be perfect conductors, surrounding a vacuum region. The electric field inside the cavity satisfies a wave equation
843
+ characterized by a velocity equals to c. Also, the conductivity of the walls guaranties that the tangential components
844
+ of the electric field at the walls are null.
845
+ The components of the electric field inside the cavity are given by [36]
846
+ Ei
847
+ n1···nd (x1, . . . , xd) = E0i × φ−
848
+ n1 (x1) · · · φ+
849
+ ni (xi) · · · φ−
850
+ nd (xd) ,
851
+ (53)
852
+ where each component satisfies a mixed boundary condition (40) with χ = 1. Furthermore, as only transverse modes
853
+ are present, we have ˜ξ = 1 in Eq. (43). Hence, using result (45), we find that the number of independent modes
854
+ N (d)
855
+ em = N (d)
856
+ 1
857
+ is given by
858
+ N (d)
859
+ em (ω) = 1
860
+ 2d
861
+
862
+ (d − 1)
863
+ cdπd/2
864
+ (ωL)d
865
+ Γ
866
+ � d
867
+ 2 + 1
868
+ � +
869
+ d (3 − d)
870
+ cd−1π(d−1)/2
871
+ (ωL)d−1
872
+ Γ
873
+ � d−1
874
+ 2
875
+ + 1
876
+
877
+
878
+ .
879
+ (54)
880
+ In Eq. (54), it was assumed the vacuum dispersion relation k = ω/c for the electromagnetic field.
881
+ For the three-dimensional case we have the well-known quadratic term cancellation in ω [9, 10]. In this case, we
882
+ consider the next correction term in Eq. (45), furnishing
883
+ N (3)
884
+ em =
885
+ L3
886
+ 3π2c3 ω3 − 3L
887
+ 2πcω .
888
+ (55)
889
+ Result (55) agrees with [9, 10, 30, 37]. However, Eq. (54) shows that this cancellation of the “area” term for the
890
+ electromagnetic field only occurs in the three-dimensional case. This implies a drastic difference in d = 3 scenario
891
+ when comparing with other dimensionalities.
892
+ The spectral density D(d)
893
+ em can be calculated deriving expression (54) with respect to ω,
894
+ D(d)
895
+ em = dN (d)
896
+ em
897
+
898
+ = 1
899
+ 2d
900
+
901
+ d (d − 1) Ldωd−1
902
+ πd/2Γ
903
+ � d
904
+ 2 + 1
905
+
906
+ cd + d (d − 1) (3 − d) Ld−1ωd−2
907
+ π(d−1)/2Γ
908
+ � d−1
909
+ 2
910
+ + 1
911
+
912
+ cd−1
913
+
914
+ .
915
+ (56)
916
+ Hence, the internal energy of the system can be written as
917
+ U (d) =
918
+ � ∞
919
+ 0
920
+ D(d)
921
+ em (ω)
922
+ ℏω
923
+ exp
924
+
925
+ ℏω
926
+ kBT
927
+
928
+ − 1
929
+ dω = kB
930
+
931
+ (d − 1) θdLdT d+1 + (3 − d) d
932
+ 2θd−1Ld−1T d
933
+
934
+ ,
935
+ (57)
936
+ where θm is defined as
937
+ θm ≡ ζ (m + 1) Γ (m + 1) m
938
+ 2mπm/2Γ
939
+ � m
940
+ 2 + 1
941
+
942
+ km
943
+ B
944
+ ℏmcm .
945
+ (58)
946
+
947
+ 11
948
+ The term ζ (z) in Eq. (58) denotes the Riemann zeta function. Expression (57) can be seen as an improved version of
949
+ the Stefan-Boltzmann law for the electromagnetic field in a hypercubic cavity, in a quasithermodynamic treatment.
950
+ In the strict thermodynamic limit, that is, when the correction is not considered, we recover the Stefan-Boltzmann
951
+ law in d dimensions. In the strict thermodynamic regime, the (improved) result (57) can be compared with [38, 39].
952
+ However, in those references the authors impose that ξ(d)
953
+ em = ξ(d)
954
+ 0
955
+ = 2 for the polarization of the d-dimensional electric
956
+ field (as done for the three-dimensional scenario). The observation that ξ(d)
957
+ em = d − 1 is the correct factor was made in
958
+ [40].
959
+ It is important to stress that, while the enforcement that ξ(d)
960
+ em = 2 for any dimension corresponds to a simple factor
961
+ for the main term of several thermodynamic quantities, this choice has a very drastic effect for the correction terms in
962
+ the quasithermodynamic analysis. For instance, when considering the quasithermodynamics, the general enforcement
963
+ of ξ(d)
964
+ em = 2 would imply the cancellation of the first correction for any value of d (not appropriate), and not for d = 3,
965
+ as we have obtained.
966
+ The quasithermodynamic Stefan-Boltzmann law (57) can also be rewritten as
967
+ U (d)
968
+ Ld
969
+ =
970
+ � ∞
971
+ 0
972
+ B(d) (ω, T, L) dω ,
973
+ (59)
974
+ implying that
975
+ B(d) (ω, T, L) =
976
+
977
+ ω
978
+ Γ
979
+ � d
980
+ 2 + 1
981
+ � − c (d − 3) √π
982
+ Γ
983
+ � d−1
984
+ 2
985
+ + 1
986
+ � 1
987
+ L
988
+
989
+ d (d − 1) ℏωd−1
990
+ 2dπd/2cd
991
+
992
+ exp
993
+
994
+ ℏω
995
+ kBT
996
+
997
+ − 1
998
+ � .
999
+ (60)
1000
+ Expression (60) is a quasithermodynamic version of the Planck formula.
1001
+ This result describes the effects of the
1002
+ boundedness of the cavity on the spectral density of the electromagnetic field.
1003
+ For the two-dimensional case, a more detailed discussion is in order. Our results for d = 2 can be compared with
1004
+ the analysis presented in [26]. An interesting remark suggested in [26] is that size effects prevent arbitrarily low
1005
+ frequencies in the system. With this observation, particularized here for a square system of area L2, the authors
1006
+ propose an internal energy U with the form
1007
+ U = 2
1008
+ � ∞
1009
+ ωmin
1010
+ D (ω)
1011
+ ℏω
1012
+ exp
1013
+
1014
+ ℏω
1015
+ kBT
1016
+
1017
+ − 1
1018
+ dω , D (ω) = L2ω
1019
+ 2πc2 , ωmin =
1020
+
1021
+ 2πc
1022
+ L
1023
+ .
1024
+ (61)
1025
+ The integral in Eq. (61) can be solved by making the change x = t + xmin, where
1026
+ x ≡ ℏω
1027
+ kBT , xmin ≡ ℏωmin
1028
+ kBT
1029
+ =
1030
+
1031
+ 2πℏc
1032
+ kBT L .
1033
+ (62)
1034
+ One obtains
1035
+ U (xmin) =
1036
+ k3
1037
+ B
1038
+ πℏ2c2 L2T 3S (xmin) ,
1039
+ (63)
1040
+ S (xmin) = 2Li3
1041
+
1042
+ e−xmin�
1043
+ + 2xminLi2
1044
+
1045
+ e−xmin�
1046
+ + x2
1047
+ minLi1
1048
+
1049
+ e−xmin�
1050
+ ,
1051
+ (64)
1052
+ where the polylogarithm function Lis (z) is defined as
1053
+ Lis+1 (z) =
1054
+ 1
1055
+ Γ (s + 1)
1056
+ � ∞
1057
+ 0
1058
+ ts
1059
+ exp (t) /z − 1 dt .
1060
+ (65)
1061
+ Following the development in [26], the term S (xmin) is expanded around xmin = 0,
1062
+ S(xmin) = 2ζ(3) − x2
1063
+ min
1064
+ 2
1065
+ + x3
1066
+ min
1067
+ 6
1068
+ − x4
1069
+ min
1070
+ 48
1071
+ − x6
1072
+ min
1073
+ 4320 + O
1074
+
1075
+ x7
1076
+ min
1077
+
1078
+ .
1079
+ (66)
1080
+ Observe that the expansion close to xmin = 0 is equivalent to consider [kB/(ℏc)] LT ≫ 1, as one sees from the
1081
+ definition of xmin in Eq. (62). Finally, using the expansion (66), and keeping only the first-order term x2
1082
+ min, the
1083
+ approach from [26] furnishes4
1084
+ U = 2ζ (3)
1085
+ π
1086
+ k3
1087
+ B
1088
+ ℏ2c2 L2T 3 − πkBT .
1089
+ (67)
1090
+ 4 It should be remarked that Eq. (67) is not actually derived in [26].
1091
+
1092
+ 12
1093
+ We note that the first term in Eq. (67) differs from the result (57) presented in this work by a factor of 2. This
1094
+ discrepancy is just a consequence of the authors in [26] using the developments of [38] which, as previously commented,
1095
+ assume that ξ(d)
1096
+ em = 2 for any value of d. However, as a more important remark, it is possible to see from Eq. (61)
1097
+ that, while considering the size effects on the minimum frequency, these effects on the density of the modes D (ω) are
1098
+ not taken into account. In other words, the integrand of U in Eq. (61) is correct only in the thermodynamic limit.
1099
+ We propose an improvement of the results in [26] by considering size effects for both the minimal frequency and
1100
+ the density of the modes. Following the procedure that leads to Eq. (64), but using D(2)
1101
+ em of Eq. (56) instead of D(ω)
1102
+ in the integrand of the internal energy U in expression (61), we get
1103
+ U (2)
1104
+ em = πkBT
1105
+
1106
+ x−2
1107
+ minS (xmin) +
1108
+
1109
+ 2
1110
+ π x−1
1111
+ min ˜S (xmin)
1112
+
1113
+ ,
1114
+ (68)
1115
+ with S(xmin) presented in Eq. (64) and
1116
+ ˜S (xmin) = Li2
1117
+
1118
+ e−xmin�
1119
+ + xminLi1
1120
+
1121
+ e−xmin�
1122
+ .
1123
+ (69)
1124
+ The expansion of ˜S(xmin) around xmin = 0 gives
1125
+ ˜S (xmin) = π2
1126
+ 6 − xmin + x2
1127
+ min
1128
+ 4
1129
+ − x3
1130
+ min
1131
+ 36
1132
+ + x5
1133
+ min
1134
+ 3600 + O
1135
+
1136
+ x6
1137
+ min
1138
+
1139
+ .
1140
+ (70)
1141
+ Substituting the results (66) and (70) in Eq. (68), and keeping only terms of order up to x2
1142
+ min, we obtain
1143
+ U (2)
1144
+ em = ζ (3)
1145
+ π
1146
+ k3
1147
+ B
1148
+ ℏ2c2 L2T 3 + πk2
1149
+ B
1150
+ 6ℏc LT 2 −
1151
+
1152
+ 1
1153
+ 2 +
1154
+
1155
+ 2
1156
+ π
1157
+
1158
+ πkBT .
1159
+ (71)
1160
+ In addition to the already mentioned factor of 2, and a correction of
1161
+
1162
+ 2/π in the last term in Eq. (67), we highlight the
1163
+ appearance of an “area” term proportional to T 2. This new term is the leading correction on the quasithermodynamics
1164
+ limit.
1165
+ It is important to notice that the second term in Eq. (71), that is, the leading correction, is precisely the last term
1166
+ presented in Eq. (57) for d = 2. This is a consequence of the fact that S in Eq. (66) does not have a linear term (i.e.,
1167
+ a term proportional to xmin). The existence of such linear term would change the second term in Eq. (57).
1168
+ The above procedure for the two-dimensional scenario can be generalized to arbitrary dimensions. In this case, to
1169
+ consider a minimal energy implies that
1170
+ U (d)
1171
+ em = d (d − 1) kBT
1172
+ ��
1173
+ x(d)
1174
+ min
1175
+ �−d
1176
+ CdSd
1177
+
1178
+ x(d)
1179
+ min
1180
+
1181
+ +
1182
+
1183
+ x(d)
1184
+ min
1185
+ �−1 ˜Cd ˜S
1186
+
1187
+ x(d)
1188
+ min
1189
+ ��
1190
+ ,
1191
+ (72)
1192
+ where
1193
+ x(d)
1194
+ min =
1195
+ ℏcπ
1196
+ kBLT
1197
+
1198
+ 3d
1199
+ 2 − 1 , Cd =
1200
+ �π
1201
+ 8
1202
+ � d
1203
+ 2 (3d − 2)
1204
+ d
1205
+ 2
1206
+ Γ
1207
+ � d
1208
+ 2 + 1
1209
+ � , ˜Cd = (−1)d
1210
+ 2d−1π C1 ,
1211
+ Sd
1212
+
1213
+ x(d)
1214
+ min
1215
+
1216
+ =
1217
+ d
1218
+
1219
+ k=0
1220
+
1221
+ d
1222
+ k
1223
+
1224
+ Γ (k + 1)
1225
+
1226
+ x(d)
1227
+ min
1228
+ �d−k
1229
+ Lik+1
1230
+
1231
+ e−x(d)
1232
+ min
1233
+
1234
+ ,
1235
+ (73)
1236
+ and ˜S is given by Eq. (69) for any value of d. Similarly to the two-dimensional case, it is straightforward to see that
1237
+ the limit of Sd around x(d)
1238
+ min = 0 does not have a linear term.
1239
+ It should be noticed that the power of x(d)
1240
+ min in the second term in the brackets of Eq. (72) does not depend on
1241
+ dimension and is equal to −1. Thus, the higher contribution of this term is proportional to LT 2, in the same way as in
1242
+ d = 2. Therefore, the leading terms in U (d)
1243
+ em of Eq. (72) are precisely those presented in expression (57). We conclude
1244
+ that, for d ̸= 3, the existence of a minimal frequency would not affect the quasithermodynamics behavior, exactly as
1245
+ in the thermodynamic limit, and the expression (57) is correct even if the minimal frequency is considered.5
1246
+ 5 For the three-dimensional scenario, the absence of the area term could imply higher-order corrections.
1247
+ In this case, the minimum
1248
+ frequency would affect the first correction term, which is proportional to LT 2 .
1249
+
1250
+ 13
1251
+ VII.
1252
+ QUASITHERMODYNAMICS OF ACOUSTIC PERTURBATIONS
1253
+ A.
1254
+ General considerations
1255
+ We turn to the quasithermodynamics of acoustic perturbations, focusing on the d-dimensional version of the Debye
1256
+ model. Let us consider a harmonic solid, there is, an isotropic, elastic and continuous body. The solid is assumed
1257
+ to be a hypercube of dimension d and length size L. In this hypercube, a number of χ opposed faces are free, and
1258
+ hence the oscillations in these directions respect Neumann conditions. The remaining d − χ opposing faces are fixed,
1259
+ respecting Dirichlet conditions. The propagation of vibrations in the solid is associated to acoustic waves.
1260
+ In this setup, the components of the displacement field ui(x) of the particles that form the solid (atoms, ions,
1261
+ molecules, etc.) will be solutions of Helmholtz equation with the form (40). Specifically, ui(x) are given by
1262
+ ui
1263
+ n1···nd (x1, . . . , xd) = u0i × φ+
1264
+ n1 (x1) · · · φ+
1265
+ nχ (xχ)
1266
+
1267
+ ��
1268
+
1269
+ free faces
1270
+ φ−
1271
+ nχ+1 (xχ+1) · · · φ−
1272
+ nd (xd)
1273
+
1274
+ ��
1275
+
1276
+ fixed faces
1277
+ .
1278
+ (74)
1279
+ Contrary to the description of the electromagnetic field in a cavity, acoustic perturbations are free to oscillate in
1280
+ the longitudinal direction. Therefore, a distinct quasithermodynamic behavior, comparing to the thermodynamic of
1281
+ electromagnetic perturbations, should be expected in the present setup. In particular, for d = 3, we should expect an
1282
+ important role of the area term, the first term of quasithermodynamic correction.6
1283
+ Let us apply the results derived in the present work to generalize the well-known expressions in the usual three-
1284
+ dimensional Debye model and investigate the quasithermodynamic regime. From Eq. (45), with ˜ξ = 0 in (43), we
1285
+ obtain
1286
+ N (d)
1287
+ s
1288
+ (ω) =
1289
+ d
1290
+ πd/22d
1291
+
1292
+
1293
+ 1
1294
+ Γ
1295
+ � d
1296
+ 2 + 1
1297
+
1298
+
1299
+ ωL
1300
+ c(d)
1301
+ s0
1302
+ �d
1303
+ + (2χ − d) π1/2
1304
+ Γ
1305
+ � d−1
1306
+ 2
1307
+ + 1
1308
+
1309
+
1310
+ ωL
1311
+ c(d)
1312
+
1313
+ �d−1
1314
+  .
1315
+ (75)
1316
+ The quantities c(d)
1317
+ s0 and c(d)
1318
+ sχ represent an effective bulk sound velocities and will be discussed in the next section.
1319
+ Expression (75) can be interpreted as the number of modes associated to acoustic waves whose frequencies are lower
1320
+ than ω. Unlike the electromagnetic case, in the treatment of Debye model the area term is absent only for d even
1321
+ and when there is a precise balance between Neumann and Dirichlet boundary conditions: half the faces of the solid
1322
+ are free and half are fixed. In particular, for the three-dimensional scenario, there is always the influence of the area
1323
+ term.
1324
+ B.
1325
+ Influence of the area term
1326
+ Let us focus on the effects of the area term, considering the extreme scenarios, where all the walls are free (χ = d),
1327
+ or all the walls are fixed (χ = 0). In these cases,
1328
+ N (d)
1329
+ s± (ω) =
1330
+ 1
1331
+ πd/2
1332
+ d
1333
+ 2d
1334
+
1335
+
1336
+ 1
1337
+ Γ
1338
+ � d
1339
+ 2 + 1
1340
+
1341
+
1342
+ ωL
1343
+ c(d)
1344
+ s0
1345
+ �d
1346
+ ±
1347
+ dπ1/2
1348
+ Γ
1349
+ � d−1
1350
+ 2
1351
+ + 1
1352
+
1353
+
1354
+ ωL
1355
+ c(d)
1356
+
1357
+ �d−1
1358
+  .
1359
+ (76)
1360
+ In Eq. (76), the plus and minus signs are associated to the “all free” and “all fixed” types of solid, respectively. Also, c(d)
1361
+ s0
1362
+ can be interpreted as an effective velocity given by the linear superposition of velocities cl and ct, of the longitudinal
1363
+ mode and of the (d − 1) transverse modes,
1364
+
1365
+ c(d)
1366
+ s0
1367
+ �d
1368
+ = dcd
1369
+ t
1370
+
1371
+ d − 1 + cd
1372
+ t
1373
+ cd
1374
+ l
1375
+ �−1
1376
+ .
1377
+ (77)
1378
+ It is important to notice that this linear superposition can only be applied to the main term [30]. Indeed, the reflection
1379
+ of the modes in the walls of the solid produce a mixture of the modes. Hence, a purely transverse (or longitudinal)
1380
+ perturbation can be reflected as a superposition of transverse and longitudinal waves. The phenomenon generates an
1381
+ effective velocity c(d)
1382
+ s± which is different from c(d)
1383
+ s0 .
1384
+ 6 Effects associated to the area term in a three-dimensional setup with low temperature are considered in [41, 42].
1385
+
1386
+ 14
1387
+ For the three-dimensional case, one approach to study the wave reflection in a specific wall is to consider a slab
1388
+ instead of a cube, and hence to ignore border effects in this wall.
1389
+ That is the approach followed in [41], where
1390
+ appropriate boundary conditions (Neumann or Dirichlet) are imposed on the faces parallel to the plane of the slab
1391
+ (the planes of reflection). However, periodic boundary conditions are enforced on the other faces (i.e., on the slab
1392
+ thickness direction), in an approach which captures border effects.
1393
+ Note that the number of faces with periodic
1394
+ boundary condition is equal to the dimension of the incident plane (two-dimensional in the three-dimensional case).
1395
+ Periodic conditions at the borders are justified if the borders are far enough from the region of interest. Within this
1396
+ simplified model, it was determined in [41] that
1397
+
1398
+ c(3)
1399
+ s+
1400
+ �2
1401
+ = 3
1402
+
1403
+ 2
1404
+
1405
+ c2
1406
+ t
1407
+ �2 − 3c2
1408
+ tc2
1409
+ l + 3
1410
+
1411
+ c2
1412
+ l
1413
+ �2
1414
+ c2
1415
+ tc2
1416
+ l (c2
1417
+ l − c2
1418
+ t)
1419
+ �−1
1420
+ ,
1421
+ (78)
1422
+
1423
+ c(3)
1424
+ s−
1425
+ �2
1426
+ = 3
1427
+
1428
+ 2
1429
+ c2
1430
+ t
1431
+ + 1
1432
+ c2
1433
+ l
1434
+ +
1435
+
1436
+ c2
1437
+ l − c2
1438
+ t
1439
+ �2
1440
+ c2
1441
+ l c2
1442
+ t (c2
1443
+ l + c2
1444
+ t)
1445
+ �−1
1446
+ .
1447
+ (79)
1448
+ Following the development presented in [41], it is observed that the presence of the power 2 in cl,t is a consequence
1449
+ of the number of periodic boundary conditions considered. That, in turn, is a result of the fact that the plates have
1450
+ two dimensions.
1451
+ In d dimensions, we can consider the reflection of the wave by any one of the 2d faces. In this case, a slab is
1452
+ defined as the set of all points lying between two (d − 1)-dimensional hyperplanes7 in Rd. In this way, the system
1453
+ is approximated by two infinite plates. Appropriate boundary conditions (Neumann or Dirichlet) are imposed on
1454
+ these plates, with periodic boundary conditions enforced on the other (d − 1) directions. In this way, considering the
1455
+ relation with the dimensionality of the system and the power series on ct and cl, the proposed generalization of the
1456
+ three-dimensional results in Eqs. (78)-(79) to the more general d-dimensional scenario is
1457
+
1458
+ c(d)
1459
+
1460
+ �d−1
1461
+ = dcd−1
1462
+ t
1463
+
1464
+ d − 1 +
1465
+
1466
+ cd−1
1467
+ l
1468
+ �2 − cd−1
1469
+ l
1470
+ cd−1
1471
+ t
1472
+ + 2
1473
+
1474
+ cd−1
1475
+ t
1476
+ �2
1477
+ cd−1
1478
+ l
1479
+
1480
+ cd−1
1481
+ l
1482
+ ∓ cd−1
1483
+ t
1484
+
1485
+ �−1
1486
+ .
1487
+ (80)
1488
+ C.
1489
+ Debye frequency
1490
+ One important parameter of the Debye model is the so-called Debye frequency. This quantity refers to the cutoff
1491
+ angular frequency of the waves propagating in the solid, resulting from the existence of a minimum distance between
1492
+ the particles that form the solid lattice. From Eq. (76), it is possible to determine the Debye frequency ω(d)
1493
+ D±, analyzing
1494
+ the number of degrees of freedom of the system. That is,
1495
+ nd + n∂l ≈ nd = N (d)
1496
+
1497
+
1498
+ ω(d)
1499
+
1500
+
1501
+ ,
1502
+ (81)
1503
+ where n is the number of particles inside the cavity (bulk) and n∂ is the number of particles in the borders (edge).
1504
+ Considering the edge, the particles have l degrees of freedom. In expression (81), we assumed that n ≫ n∂ since we
1505
+ are performing a macroscopic (quasithermodynamic) treatment, and hence we can consider n as an approximation to
1506
+ the total number of particles of the system. In fact, we are interested in the border effects on the modes propagating
1507
+ on the bulk, not considering the superficial modes (Rayleigh modes). The contribution of the superficial modes can
1508
+ be disregarded in the quasithermodynamic regime.
1509
+ One relevant issue is the influence of the borders in Debye frequency. For the analysis of this point, we rewrite
1510
+ expression (81) in the form
1511
+
1512
+ ω(d)
1513
+
1514
+ �d
1515
+ + Bd±
1516
+
1517
+ ω(d)
1518
+
1519
+ �d−1
1520
+
1521
+
1522
+ ω(d)
1523
+ D0
1524
+ �d
1525
+ = 0 ,
1526
+ (82)
1527
+ 7 See section 3.4 of [43].
1528
+
1529
+ 15
1530
+ with
1531
+ Bd± ≡ ±dπ1/2Γ
1532
+ � d
1533
+ 2 + 1
1534
+
1535
+ Γ
1536
+ � d−1
1537
+ 2
1538
+ + 1
1539
+
1540
+
1541
+ c(d)
1542
+ s0
1543
+ �d
1544
+
1545
+ c(d)
1546
+
1547
+ �d−1
1548
+ L
1549
+ ,
1550
+ (83)
1551
+ ω(d)
1552
+ D0 ≡ 2π1/2c(d)
1553
+ s0
1554
+
1555
+ Γ
1556
+ �d
1557
+ 2 + 1
1558
+
1559
+ ρd
1560
+ � 1
1561
+ d
1562
+ .
1563
+ (84)
1564
+ In Eq. (84), ρd denotes the (hyper)volumetric density of the cube, defined as
1565
+ ρd ≡ n
1566
+ Ld .
1567
+ (85)
1568
+ The most physically relevant scenario is the three-dimensional solid. For d = 3, an exact solution for Eq. (82) can
1569
+ be obtained:
1570
+ ω(3)
1571
+ D± = πc(3)
1572
+ s0
1573
+
1574
+ 
1575
+ 3�
1576
+ f0± +
1577
+ 3�
1578
+ f1± ∓
1579
+ 3
1580
+
1581
+ c(3)
1582
+ s0
1583
+ �2
1584
+ 4
1585
+
1586
+ c(3)
1587
+
1588
+ �2
1589
+ 1
1590
+ L
1591
+
1592
+  ,
1593
+ (86)
1594
+ where
1595
+ fp± ≡ 6ρ3
1596
+ π
1597
+
1598
+ 27
1599
+
1600
+ c(3)
1601
+ s0
1602
+ �6
1603
+ 32
1604
+
1605
+ c(3)
1606
+
1607
+ �6
1608
+ 1
1609
+ L3 + (−1)p
1610
+
1611
+ 9ρ2
1612
+ 3
1613
+ π2 ±
1614
+ 81
1615
+
1616
+ c(3)
1617
+ 0
1618
+ �6
1619
+ 32π2
1620
+
1621
+ c(3)
1622
+
1623
+ �6
1624
+ ρ3
1625
+ L3
1626
+
1627
+ 
1628
+ 1/2
1629
+ .
1630
+ (87)
1631
+ Let us consider other scenarios besides the most usual one. In the two-dimensional case, again an exact expression
1632
+ for the Debye frequency ω(2)
1633
+ D± can be produced,
1634
+ 2ω(2)
1635
+ D± =
1636
+
1637
+ B2
1638
+ 2± +
1639
+
1640
+ 2ω(2)
1641
+ D0
1642
+ �2
1643
+ − B2± .
1644
+ (88)
1645
+ For d > 3, we use the approximation
1646
+
1647
+ ω(d)
1648
+
1649
+ �d
1650
+ + Bd±
1651
+
1652
+ ω(d)
1653
+
1654
+ �d−1
1655
+ =
1656
+
1657
+ ω(d)
1658
+ D± + Bd±
1659
+ d
1660
+ �d
1661
+ + O
1662
+ � 1
1663
+ L2
1664
+
1665
+ ,
1666
+ (89)
1667
+ which is justified since we are considering the quasithermodynamic regime of the theory. Therefore, keeping only
1668
+ terms of order 1/L and employing result (82), we obtain
1669
+ ω(d)
1670
+ D± = ω(d)
1671
+ D0 ∓ π1/2Γ
1672
+ � d
1673
+ 2 + 1
1674
+
1675
+ Γ
1676
+ � d−1
1677
+ 2
1678
+ + 1
1679
+
1680
+
1681
+ c(d)
1682
+ s0
1683
+ �d
1684
+
1685
+ c(d)
1686
+
1687
+ �d−1
1688
+ 1
1689
+ L .
1690
+ (90)
1691
+ It should be remarked that, for the two- and three-dimensional cases, exact expressions (88) and (86) are available.
1692
+ With these results, higher-order contributions in 1/L are considered [when compared to Eq. (90)].
1693
+ In the strict thermodynamic limit (46) we observe that Bd± → 0, and
1694
+ ω(d)
1695
+ D± (L → ∞) = ω(d)
1696
+ D0 .
1697
+ (91)
1698
+ With d = 3, expression (91) reduces to the well-known Debye frequency. Summarizing, we have obtained in Eq. (90)
1699
+ a correction in Debye frequency for a harmonic solid in d dimensions, with free (+) or fixed (−) walls.
1700
+ It is interesting to notice that result (90) could offer a possible experimental test for the developments presented in
1701
+ this work. Indeed, from Eq. (90) we observe that
1702
+ ω(d)
1703
+ D+ ≤ ω(d)
1704
+ D0 ≤ ω(d)
1705
+ D− .
1706
+ (92)
1707
+ That is, a solid with free walls should have lower Debye frequency when compared with the standard result in the
1708
+ strict thermodynamic regime. In a similar way, a solid with fixed walls will have larger Debye frequency. These
1709
+ differences are, in principle, measurable. Given that in an electric conductor material the main contribution for the
1710
+ thermal capacity comes from the electrons that are not strongly bound to the lattice, we expect that the effect (92)
1711
+ will be more relevant in an electric insulator (non-metallic crystal).
1712
+
1713
+ 16
1714
+ D.
1715
+ Heat capacity
1716
+ We now consider the heat capacity of the solid in the quasithermodynamic regime. To evaluate the heat capacity
1717
+ at constant volume C(d)
1718
+ ± , let us examine the internal energy U (d)
1719
+ ±
1720
+ of the system for both boundary conditions studied.
1721
+ Using Eq. (76), we obtain that the density of modes is given by
1722
+ D(d)
1723
+ s± = dN (d)
1724
+
1725
+
1726
+ = κ(d)
1727
+ 0 ωd−1 + κ(d)
1728
+ ± ωd−2 ,
1729
+ (93)
1730
+ where the following quantities are defined:
1731
+ κ(d)
1732
+ 0
1733
+
1734
+ d2
1735
+ 2dπd/2
1736
+ Ld
1737
+ Γ
1738
+ � d
1739
+ 2 + 1
1740
+ � �
1741
+ c(d)
1742
+ s0
1743
+ �d ,
1744
+ (94)
1745
+ κ(d)
1746
+ ± ≡ ±d2 (d − 1)
1747
+ 2dπ
1748
+ d−1
1749
+ 2
1750
+ Ld−1
1751
+ Γ
1752
+ � d−1
1753
+ 2
1754
+ + 1
1755
+
1756
+
1757
+ c(d)
1758
+
1759
+ �1−d
1760
+ .
1761
+ (95)
1762
+ Hence, the internal energy can be written as
1763
+ U (d)
1764
+ ±
1765
+ = k2
1766
+ BT 2
1767
+
1768
+ � θ(d)
1769
+ ± /T
1770
+ 0
1771
+ D(d)
1772
+
1773
+ �kBT
1774
+
1775
+ x
1776
+ � x dx
1777
+ ex − 1 ,
1778
+ (96)
1779
+ with
1780
+ θ(d)
1781
+ ± ≡ ℏ
1782
+ kB
1783
+ ω(d)
1784
+
1785
+ (97)
1786
+ denoting the Debye temperature in d dimensions. In general, the integral in Eq. (96) does not have an analytic
1787
+ solution. Let us investigate the regimes of low temperature (T ≪ θ(d)
1788
+ ± ) and high temperature (T ≫ θ(d)
1789
+ ± ).
1790
+ The low-temperature limit is more commonly treated in the pertinent literature. In three dimensions, this regime
1791
+ is captured by Debye law: the specific heat of a solid at constant volume varies as the cube of the absolute tem-
1792
+ perature T . We aim to improve Debye law in d dimensions considering solids with finite size, and hence adopting a
1793
+ quasithermodynamic description.
1794
+ It should be remarked that the quasithermodynamic limit (51) implies [kB/(ℏc)] LT ≫ 1. Therefore, low values for
1795
+ the temperature T should be compensated by corresponding large values for L. For low enough temperatures, the
1796
+ internal energy of the system can be written as
1797
+ U (d)
1798
+ ±
1799
+
1800
+ T ≪ θ(d)
1801
+ ±
1802
+
1803
+ = d!κ(d)
1804
+ 0
1805
+ ℏd
1806
+ ζ (d + 1) kd+1
1807
+ B
1808
+ T d+1 + (d − 1)!κ(d)
1809
+ ±
1810
+ ℏd−1
1811
+ ζ (d) kd
1812
+ BT d .
1813
+ (98)
1814
+ From expression (98) for U (d)
1815
+ ± , corrections in Debye law can be obtained:
1816
+ C(d)
1817
+ ±
1818
+
1819
+ T ≪ θ(d)
1820
+ ±
1821
+
1822
+ = d! (d + 1) κ(d)
1823
+ 0
1824
+ ℏd
1825
+ ζ (d + 1) kd+1
1826
+ B
1827
+ T d + d (d − 1)!κ(d)
1828
+ ±
1829
+ ℏd−1
1830
+ ζ (d) kd
1831
+ BT d−1 .
1832
+ (99)
1833
+ In the strict thermodynamic limit (46) we recover the Debye law in d dimensions [44]. For the three-dimensional case,
1834
+ expression (99) reduces to the result previously discussed in [41].
1835
+ The high-temperature regime is less explored, and we will consider it in the present work. This scenario is actually
1836
+ more suitable for the quasithermodynamic treatment, because if T is high, solids with low size L can be more
1837
+ accurately analyzed. In three dimensions, assuming the thermodynamic limit, the behavior of the system in this
1838
+ regime is captured by Dulong-Petit law: the heat capacity of a solid with a mol of particles is approximated constant
1839
+ for high enough temperature. Corrections for the Dulong-Petit law in d dimensions considering a finite-size solid will
1840
+ be derived.
1841
+ In the high-temperature regime θ(d)
1842
+ ± /T → 0, and the approximation ex − 1 ≈ x can be employed in Eq. (96). With
1843
+ this approach, the internal energy U (d)
1844
+ ± (T ≫ θ(d)
1845
+ ± ) can be explicitly written and the thermal capacity C(d)
1846
+ ±
1847
+ determined:
1848
+ C(d)
1849
+ ±
1850
+
1851
+ T ≫ θ(d)
1852
+ ±
1853
+
1854
+ =
1855
+ �kB
1856
+
1857
+ �d �
1858
+ κ(d)
1859
+ 0
1860
+ d
1861
+
1862
+ θ(d)
1863
+ ±
1864
+ �d
1865
+ +
1866
+ ℏκ(d)
1867
+ ±
1868
+ kB (d − 1)
1869
+
1870
+ θ(d)
1871
+ ±
1872
+ �d−1
1873
+
1874
+ kB .
1875
+ (100)
1876
+
1877
+ 17
1878
+ In the strict thermodynamic limit (46) we observe that ωD± → ω(d)
1879
+ D0 and hence
1880
+ C(d)
1881
+ ±
1882
+
1883
+ T ≫ θ(d)
1884
+ ± , L → ∞
1885
+
1886
+ = κ(d)
1887
+ 0 ω(d)
1888
+ 0
1889
+ d
1890
+ kB .
1891
+ (101)
1892
+ For the three-dimensional case, result (101) is reduced to the usual Dulong-Petit law. For general values of d, Eq. (100)
1893
+ furnishes the correction of the Dulong-Petit law for a finite solid of arbitrary dimensionality.
1894
+ VIII.
1895
+ FINAL COMMENTS
1896
+ In the present work, we explored Weyl law and its extensions with an intuitive formalism, based on the association
1897
+ between point counting and volumes of sections of the sphere. In several published developments, the counting function
1898
+ depended strongly on the pertinent domain, with the associated lattice kept fixed. In our approach, the domain is
1899
+ kept fixed and the lattice is rescaled. Known results were rederived, showing the robustness of the method. Moreover,
1900
+ new results were obtained, including corrections for the Weyl conjecture in d dimensions, effects of the polarization,
1901
+ and an exploration of the role of the area term in the three-dimensional scenario. Applications of the previous results
1902
+ were investigated, with the quasithermodynamic analyses of the electromagnetic field in a finite cavity and acoustic
1903
+ perturbations in a finite solid.
1904
+ Applying the formalism to the thermodynamics and quasithermodynamics of the electromagnetic perturbations in
1905
+ a finite box within a semi-classical treatment, corrections to the d-dimensional Stefan-Boltzmann law were obtained
1906
+ and polarization and border effects were treated. In particular, we showed that the well-known cancellation of the
1907
+ area term only occurs in three dimensions. This effect turns the thermodynamics of the system distinct for d ̸= 3.
1908
+ The correction due to a minimum energy of the system is treated. In all scenarios except the three-dimensional case,
1909
+ the quasithermodynamic corrections suppress an eventual effect of a minimal energy.
1910
+ Two-dimensional results for the quasithermodynamics of the electromagnetic field can be linked to experimental
1911
+ setups. Indeed, the analysis of thermal radiation in d = 2 has applications in the description of single-layer materials
1912
+ (also known as “2D materials”), which include graphene, single layers of various dichalcogenides and complex oxides
1913
+ [11]. The results presented in [26], describing two-dimensional thermal radiation and improved in the present work,
1914
+ were used in [12] to study the emission spectra of a graphene transistor.
1915
+ Concerning the electromagnetic field in a three-dimensional cavity, there is some discussion in the literature involving
1916
+ the cancellation of area term. We believe this controversy is the result of an inadequate treatment of how polarization
1917
+ affects each term of the expansion (34). For instance, in [1] polarization is assumed to have the same effect on all
1918
+ terms of the expansion (34), and as a result the cancellation of the area term does not occur. Our result in Eq. (45)
1919
+ indicates that this approach is inadequate. Experimentally, the cancellation of the area term in a three-dimensional
1920
+ setup implies in a very small correction [9]. Therefore, other effects (such as scattering and diffraction) can supplant
1921
+ this correction. In fact, while the results in [45] are compatible with the negative value correction presented in Eq. (55),
1922
+ other experiments point to a positive correction term [46].
1923
+ Moreover, we believe that three-dimensional systems are not the most suitable setups for the observation of effects
1924
+ associated to the Weyl conjecture on electromagnetic radiation. Our results suggest that a better approach to this goal
1925
+ is the use of two-dimensional effective systems. Such systems could be constructed using single-layer or nanostructures
1926
+ graphene devices simulating two-dimensional blackbodies [12, 47].
1927
+ Another main application of the developed formalism concerns the thermodynamics of acoustic perturbations. An
1928
+ improved version of Debye model for a finite solid is treated. We reproduce the known results for the three-dimensional
1929
+ case in the limit of low temperatures and extend those results to arbitrary dimensions. New developments in the high-
1930
+ temperature scenario and the influence of the area term are explored. Extensions of the known formulas are obtained
1931
+ for Debye temperature and Dulong-Petit law.
1932
+ The presented development captures some effects associated to internal degrees of freedom, such as spin. Indeed,
1933
+ macroscopic effects associated to spin manifest itself in the polarization of the fields. This is more directly seen when
1934
+ the electromagnetic perturbation is considered. In this case, the two values of the photon spin (or, more precisely,
1935
+ of the photon helicity) can be related to the two polarizations of the classical field. For acoustic perturbations the
1936
+ problem is more subtle [48]. In an ideal isotropic medium, considering modes with long wavelength, it is possible to
1937
+ associate longitudinally polarized modes with spin-0 phonons, and transversely polarized modes with spin-1 phonons.
1938
+ In general, new internal degrees of freedom can be incorporated into the presented approach, as long as they do not
1939
+ modify the eigenvalue problem [i.e., the Helmholtz equation (1)]. This can be done by increasing the multiplicity
1940
+ count of the modes performed in section IV.
1941
+
1942
+ 18
1943
+ The analysis of arbitrary boundary conditions in the extensions of Weyl law, related with all self-adjoint extensions
1944
+ of the d-dimensional Laplacian operator, is a work in progress. In fact, as far as we know, there is no Weyl conjecture
1945
+ for such general scenario. We believe that the approach introduced in the present development, based on a counting
1946
+ function with the rescaling of the lattice, might be an important step in the problem. Further developments of the
1947
+ present work might include the application of the proposed formalism on gravitational systems. Also, a possible
1948
+ exploration of the influence of the area term in the Casimir effect could be conducted, considering three-dimensional
1949
+ systems with finite temperature. Analyses along those lines should appear in forthcoming presentations.
1950
+ Appendix A: Hypervolume associated to the axes
1951
+ The calculation of the hypervolume associated to the axes in the d-dimensional case will be presented. Before the
1952
+ actual calculation, let us fix the notation and definitions that are used in the development.
1953
+ We denote ˜Ωd as one of the 2d partitions of the d-dimensional unit sphere, that is,
1954
+ ˜Ωd ≡
1955
+
1956
+ (ǫ1, ǫ2, . . . , ǫd) ∈ Rd : 0 ⩽ ǫi ⩽ 1 and ǫ2
1957
+ 1 + ǫ2
1958
+ 2 + · · · + ǫ2
1959
+ d ⩽ 1
1960
+
1961
+ .
1962
+ (A1)
1963
+ Also, the hyperplanes Hi are defined as
1964
+ Hi ≡
1965
+
1966
+ (ǫ1, ǫ2, . . . , ǫd) ∈ Rd : ǫi = 0
1967
+
1968
+ , i = 1, 2, . . ., d .
1969
+ (A2)
1970
+ The volume of a given subset S ⊂ Rd is indicated by |S|. For example,
1971
+ ���˜Ωd
1972
+ ��� = 2−dωd .
1973
+ (A3)
1974
+ Using the sets ˜Ωd and Hi defined in Eqs. (A1) and (A2), the subsets {Πi1,...,in} of ˜Ωd are constructed:
1975
+ Πi1,...,in = ˜Ωd ∩ Hi1 ∩ · · · ∩ Hin , 1 ⩽ in ⩽ d , 1 ⩽ n ⩽ d .
1976
+ (A4)
1977
+ The number of subsets {Πi1,...,in} is nd. However, some of this subsets are equal, because: (1) Πi1,...,in is symmetric
1978
+ under the switch of indexes; (2) and the idempotent property Hj ∩ Hi = Hi, for i = j. So, the number of distinct
1979
+ sets is
1980
+ #Πi1,...,in =
1981
+ �d
1982
+ n
1983
+
1984
+ =
1985
+ d!
1986
+ n! (d − n)! .
1987
+ (A5)
1988
+ The subsets {Πi1,...,in}, each one labeled by n indexes, can be interpreted as sections of the sphere in Rd−n, generated
1989
+ by different axes. For example, if d = 3,
1990
+ (n = 1)
1991
+
1992
+
1993
+
1994
+
1995
+
1996
+ Π1 = Ω2 generated by ǫ2 and ǫ3
1997
+ Π2 = Ω2 generated by ǫ1 and ǫ3
1998
+ Π3 = Ω2 generated by ǫ1 and ǫ2
1999
+ , (n = 2)
2000
+
2001
+
2002
+
2003
+
2004
+
2005
+ Π12 = Ω1 generated by ǫ3
2006
+ Π13 = Ω1 generated by ǫ2
2007
+ Π23 = Ω1 generated by ǫ1
2008
+ , (n = 3) {Π123 = (0, 0, 0) .
2009
+ (A6)
2010
+ With the symbology Πi1,...,in, n indicates the number of axes not included in the subset generation.
2011
+ From a given section Πi1,...,in, a cylinder CI can be defined, adding to Πi1,...,in an interval with the form I = [a, b]
2012
+ for each not included axes,
2013
+ CI
2014
+ i1,...,in = Πi1,...,in × I × I × · · · × I
2015
+
2016
+ ��
2017
+
2018
+ n
2019
+ .
2020
+ (A7)
2021
+ It should be observed that, for each value of n, there are
2022
+ �d
2023
+ n
2024
+
2025
+ different cylinders with the same volume V n
2026
+ d , where
2027
+ V n
2028
+ d ≡
2029
+ ��CI
2030
+ i1,...,in
2031
+ �� = |I|n |Πi1,...,in| = |I|n2n−dωd−n .
2032
+ (A8)
2033
+ Using previous results, the contribution of the axes to the total volume can be determined. Considering the volumes
2034
+ of the cylinders CI constructed with the interval I =
2035
+
2036
+ − ǫ
2037
+ 2, 0
2038
+
2039
+ , we obtain
2040
+ Hypervolume of the axes =
2041
+ d
2042
+
2043
+ n=1
2044
+ �d
2045
+ n
2046
+
2047
+ V n
2048
+ d =
2049
+ d
2050
+
2051
+ n=1
2052
+ �d
2053
+ n
2054
+ � � ǫ
2055
+ 2
2056
+ �n
2057
+ 2n−dωd−n =
2058
+ d
2059
+
2060
+ n=1
2061
+ �d
2062
+ n
2063
+
2064
+ 2−dωd−nǫn .
2065
+ (A9)
2066
+
2067
+ 19
2068
+ Appendix B: Counting functions
2069
+ Let us see how Neumann counting function can be constructed from the counting function for Dirichlet case and
2070
+ vice versa. We start by arranging the Neumann modes in d + 1 classes, labeled by j = 0, 1, . . . , d. The first class is
2071
+ composed by modes where all ni are non-null. The second class is composed by modes where only one of the ni is
2072
+ zero. In the third class two of the ni are zero. The process is continued in this fashion, up to d + 1 sets.
2073
+ Given the proposed partition of the Neumann modes, we observe that the class where none of the ni is zero is the
2074
+ solution for the Dirichlet problem in d dimensions, where all modes with ni = 0 must be excluded. The class with only
2075
+ one of the ni is zero can be further divided into d sub-classes where n1 = 0, or n2 = 0, etc. Hence, in each one of these
2076
+ sub-classes, disregarding the null ni, we obtain sub-classes composed by Dirichlet solutions in d − 1 dimensions. The
2077
+ class where two ni are null can be separated into
2078
+ �d
2079
+ 2
2080
+
2081
+ sub-classes composed of modes which satisfy Dirichlet boundary
2082
+ conditions in d − 2 dimensions. Carrying on with this procedure, solutions of the Neumann problem can be written
2083
+ as a combination of the elements in the constructed sub-classes:
2084
+ N (d)
2085
+ + (ǫ) =
2086
+ d
2087
+
2088
+ j=0
2089
+ �d
2090
+ j
2091
+
2092
+ N (d−j)
2093
+
2094
+ (ǫ) .
2095
+ (B1)
2096
+ On the other hand, we know that the solutions for Dirichlet, unlike those for Neumann, exclude the mode ni = 0,
2097
+ and therefore the difference between the number of solutions of both will be given by
2098
+ N (d)
2099
+ + − N (d)
2100
+
2101
+ =
2102
+
2103
+ n
2104
+ (# Dirichlet solutions formed by n different axes) .
2105
+ (B2)
2106
+ Since there are d axes, for each set of n axes there will be a degeneracy of
2107
+ �d
2108
+ n
2109
+
2110
+ in the Dirichlet solutions, and hence
2111
+ N (d)
2112
+ +
2113
+ − N (d)
2114
+
2115
+ =
2116
+ d−1
2117
+
2118
+ n=0
2119
+ �d
2120
+ n
2121
+
2122
+ N (n)
2123
+
2124
+ .
2125
+ (B3)
2126
+ Substituting N (d)
2127
+
2128
+ in the sum (B3), we get the relation (B1).
2129
+ The inverse relation is obtained writing Eq. (B1) as
2130
+ N (i)
2131
+ + =
2132
+ d
2133
+
2134
+ j=0
2135
+ P i
2136
+ jN (j)
2137
+ − , P i
2138
+ j =
2139
+ � �i
2140
+ j
2141
+
2142
+ ,
2143
+ j ≤ i
2144
+ 0
2145
+ j > i
2146
+ , i, j = 0, 1, 2, ..., d .
2147
+ (B4)
2148
+ The triangular matrix P is known as the Pascal’s matrix. It is invertible, since det P = 1, with an inverse given by
2149
+
2150
+ P −1�i
2151
+ j =
2152
+
2153
+ (−1)i−j �i
2154
+ j
2155
+
2156
+ ,
2157
+ j ≤ i
2158
+ 0,
2159
+ j > i
2160
+ .
2161
+ (B5)
2162
+ Therefore we can solve Eq. (B4) for N (d)
2163
+ − , obtaining
2164
+ N (d)
2165
+
2166
+ =
2167
+ d
2168
+
2169
+ n=0
2170
+ (−1)d−n
2171
+ �d
2172
+ n
2173
+
2174
+ N (n)
2175
+ + .
2176
+ (B6)
2177
+ ACKNOWLEDGMENTS
2178
+ L. F. S. acknowledges the support of Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) –
2179
+ Brazil, Finance Code 001; and the Fundação Araucária (Foundation in Support of the Scientific and Technological
2180
+ Development of the State of Paraná, Brazil). M. A. J. thanks Coordenação de Aperfeiçoamento de Pessoal de Nível
2181
+ Superior (CAPES) – Brazil, Finance Code 001, for financial support. This is the version of the article before peer
2182
+ review or editing, as submitted by to Journal of Physics A. IOP Publishing Ltd is not responsible for any errors or
2183
+ omissions in this version of the manuscript or any version derived from it. The Version of Record is available online
2184
+ at https://doi.org/10.1088/1751-8121/acb09b.
2185
+
2186
+ 20
2187
+ [1] V. Maslov, Quasithermodynamic correction to the Stefan-Boltzmann law, Theor. Math. Phys. 154, 175 (2008).
2188
+ arXiv:0801.0037
2189
+ [2] J. W. Strutt, The Theory of Sound (Cambridge University Press, 2011), Vol. 1. DOI:10.1017/CBO9781139058087
2190
+ [3] J. W. Strutt, The Theory of Sound (Cambridge University Press, 2011), Vol. 2. DOI:10.1017/CBO9781139058094
2191
+ [4] W. Arendt, R. Nittka, W. Peter and F. Steiner, Weyl’s law: spectral properties of the Laplacian in mathematics and physics
2192
+ in Mathematical analysis of evolution, information, and complexity (Wiley-VCH; 1st edition, Wheinheim, 2009), pp. 1-71.
2193
+ DOI:10.1002/9783527628025.ch1
2194
+ [5] V. Ivrii, 100 years of Weyl’s law, Bull. Math. Sci. 6, 379 (2016). arXiv:1608.03963
2195
+ [6] R. Balian and B. Duplantier, Electromagnetic waves near perfect conductors. I. Multiple scattering expansions. Distribution
2196
+ of modes. Ann. Phys. 104, 300 (1977). DOI:10.1016/0003-4916(77)90334-7
2197
+ [7] R. Balian and C. Bloch, Distribution of Eigenfrequencies for the Wave Equation in a Finite Domain. I. Three-Dimensional
2198
+ Problem with Smooth Boundary Surface, Ann. Phys. 60, 401 (1970). DOI:10.1016/0003-4916(70)90497-5
2199
+ [8] R. Balian and C. Bloch, Distribution of Eigenfrequencies for the Wave Equation in a Finite Domain. II. Electromagnetic
2200
+ Field. Riemannian Spaces, Ann. Phys. 64, 271 (1971). DOI:10.1016/0003-4916(71)90286-7
2201
+ [9] H. P. Baltes and H. Baltes, Thermal radiation in finite cavities (ETH, Zurich, 1972). DOI:10.3929/ethz-a-000086038
2202
+ [10] B. H. Liu, D. C. Chang, M. T. Ma, Eigenmodes and the Composite Quality Factor of a Reverberating Chamber (National
2203
+ Bureau of Standards, Washington, 1983). DOI:10.6028/NBS.TN.1066
2204
+ [11] K. S. Novoselov, D. Jiang, F. Schedin, and A. K. Geim., Two-dimensional atomic crystals, Proc. Natl. Acad. Sci. U.S.A
2205
+ 102, 10451 (2005). DOI:10.1073/pnas.0502848102
2206
+ [12] M. Engel, M. Steiner, A. Lombardo, A. C. Ferrari, H. V. Löhneysen, P. Avouris and R. Krupke, Light–matter interaction
2207
+ in a microcavity-controlled graphene transistor, Nat. Commun. 3, 906 (2012). DOI:10.1038/ncomms1911
2208
+ [13] M. C. Baldiotti, W. S. Elias, C. Molina, and T. S. Pereira, Thermodynamics of quantum photon spheres, Phys. Rev. D
2209
+ 90, 104025 (2014). arXiv:1410.1894
2210
+ [14] G. Penington, Entanglement wedge reconstruction and the information paradox, J. High Energ. Phys. 2020, 2 (2020).
2211
+ arXiv:1905.08255
2212
+ [15] S. Ali, M. A. Kamran, and M. U. Khan, Entropy variation of rotating BTZ black hole under Hawking radiation. Phys. Scr
2213
+ 97, 045005 (2022). arXiv:2012.08136
2214
+ [16] A. M. García-García, Finite-size corrections to the blackbody radiation laws, Phys. Rev. A 78, 023806 (2008).
2215
+ arXiv:0709.1287
2216
+ [17] Y. R. Young, Sonoluminescence (CRC Press, 2004). ISBN:0849324394
2217
+ [18] V. Cardoso, M. Cavaglià, and L. Gualtieri, Hawking emission of gravitons in higher dimensions: non-rotating black holes,
2218
+ J. High Energy Phys. 2006, 02 (2006). arXiv:hep-th/0512116
2219
+ [19] E. Abdalla, B. Cuadros-Melgar, A. B. Pavan, and C. Molina, Stability and thermodynamics of brane black holes, Nucl.
2220
+ Phys. B 752, 40 (2006). arXiv:gr-qc/0604033
2221
+ [20] R. Jorge, E. S. Oliveira, and J. V. Rocha, Greybody factors for rotating black holes in higher dimensions, Class. Quantum
2222
+ Gravity 32, 065008 (2015). arXiv:1410.4590
2223
+ [21] R. Maartens and K. Koyama, Brane-World Gravity, Living Rev. Relativ. 13, 5 (2010). arXiv:1004.3962
2224
+ [22] M. C. Baldiotti, R. Fresneda, and C. Molina, A Hamiltonian approach to Thermodynamics, Ann. Phys. 373, 245 (2016).
2225
+ arXiv:1604.03117
2226
+ [23] M. C. Baldiotti, R. Fresneda, and C. Molina, A Hamiltonian approach for the Thermodynamics of AdS black holes, Ann.
2227
+ Phys. 382, 22 (2017). arXiv:1701.01119
2228
+ [24] W. S. Elias, C. Molina, and M. C. Baldiotti, Thermodynamics of bosonic systems in anti-de Sitter spacetime, Phys. Rev.
2229
+ D 99, 084028 (2019). arXiv:1803.05921
2230
+ [25] W. B. Fontana, M. C. Baldiotti, R. Fresneda, and C. Molina, Extended quasilocal Thermodynamics of Schwarzchild-anti
2231
+ de Sitter black holes, Ann. Phys. 411, 167954 (2019). arXiv:1806.05699
2232
+ [26] H. Kim, S. C. Lim, and Y. H. Lee, Size effect of two-dimensional thermal radiation, Phys. Lett. A 375, 2661 (2011).
2233
+ DOI:10.1016/j.physleta.2011.05.051
2234
+ [27] P. Suppes, Axiomatic set theory (Dover Publications, New York, 1972). ISBN:0486616304
2235
+ [28] R. L. Graham, D. E. Knuth, and O. Patashnik, Concrete Mathematics: A Foundation for Computer Science (Addison-
2236
+ Wesley, 1994). ISBN:0201558025
2237
+ [29] E. Grosswald, Representations of Integers as Sums of Squares (Springer-Verlag, New York, 1985). DOI:10.1007/978-1-
2238
+ 4613-8566-0
2239
+ [30] H. P. Baltes and E. R. Hilf, Spectra of finite systems (Mannheim: BI-Wissenschaftsverlag, 1976). ISBN:3411014911
2240
+ [31] V. Ivrii, Second term of the spectral asymptotic expansion of the Laplace-Beltrami operator on manifolds with boundary,
2241
+ Funct. Anal. its Appl. 14, 98 (1980). DOI:10.1007/BF01086550
2242
+ [32] F. H. Brownell, Extended asymptotic eigenvalue distributions for bounded domains in n-space, J. Appl. Math. Mech. 6,
2243
+ 119 (1957). https://www.jstor.org/stable/24900616
2244
+ [33] S. Hacyan, R. Jáuregui, and C. Villarreal, Spectrum of quantum electromagnetic fluctuations in rectangular cavities, Phys.
2245
+ Rev. A 47, 4204 (1993). DOI:10.1103/PhysRevA.47.4204
2246
+ [34] A. A. Actor, Confined quantum gases, Phys. Rev. D 50, 6560 (1994). DOI:10.1103/PhysRevD.50.6560
2247
+ [35] A. L. Kuzemsky, Thermodynamic limit in statistical physics. Int. J. Mod. Phys B, 28, 1430004 (2014). arXiv:1402.7172
2248
+
2249
+ 21
2250
+ [36] D. A. Hill, Electromagnetic fields in cavities:
2251
+ deterministic and statistical theories (John Wiley & Sons, 2009).
2252
+ ISBN:0470465905
2253
+ [37] H. Baltes, F. Kneubühl, Surface area dependent corrections in the theory of black body radiation, Opt. Commun. 4, 9
2254
+ (1971). DOI:10.1016/0030-4018(71)90116-7
2255
+ [38] P. Landsberg and A. De Vos, The Stefan-Boltzmann constant in n-dimensional space. J. Phys. A Math. Gen. 22, 1073
2256
+ (1989). DOI:10.1088/0305-4470/22/8/021
2257
+ [39] H. Alnes, F. Ravndal, and I. Wehus, Black-body radiation with extra dimensions, J. Phys. A: Math. Theor. 40, 14309
2258
+ (2007). arXiv:quant-ph/0506131
2259
+ [40] V. Menon and D. Agrawal, Comment on ’The Stefan-Boltzmann constant in n-dimensional space’, J. Phys. A Math. 31,
2260
+ 1109 (1998). DOI:10.1088/0305-4470/31/3/021
2261
+ [41] M. Dupuis, R. Mazo, and L. Onsager, Surface Specific Heat of an Isotropic Solid at Low Temperatures, J. Chem. Phys.
2262
+ 33, 1452 (1960). DOI:10.1063/1.1731426
2263
+ [42] E. W. Montroll, Size effect in low temperature heat capacities, J. Chem. Phys. 18, 183 (1950). DOI:10.1063/1.1747584
2264
+ [43] P. Brass, W. Moser, and J. Pach, Research Problems in Discrete Geometry (Springer Science & Business Media, 2006).
2265
+ ISBN:978-0-387-23815-9
2266
+ [44] A. A. Valladares, The Debye model in n dimensions. Am. J. Phys. 43, 308 (1975). DOI:10.1119/1.9859
2267
+ [45] T. J. Quinn and J. E. Martin, A radiometric determination of the Stefan-Boltzmann constant and thermodynamic tem-
2268
+ peratures between −40 ◦C and +100 ◦C. Phil. Trans. Roy. Soc. Lond. A 316, 85 (1985). DOI:10.1098/rsta.1985.0058
2269
+ [46] R. U. Datla, M. C. Croarkin, and A. C. Parr, Cryogenic blackbody calibrations at the National Institute of Stan-
2270
+ dards Technology Low Background Infrared Calibration Facility. J. Res. Natl. Inst. Stand. Technol. 99, 77 (1994).
2271
+ DOI:10.6028/jres.099.008
2272
+ [47] T. Matsumoto, T. Koizumi, Y. Kawakami, K. Okamoto, and M. Tomita, Perfect blackbody radiation from a graphene
2273
+ nanostructure with application to high-temperature spectral emissivity measurements, Opt. Express 21, 30964 (2013).
2274
+ DOI:10.1364/OE.21.030964
2275
+ [48] A. T. Levine, A note concerning the spin of the phonon, Il Nuovo Cimento 26, 190 (1962). DOI:10.1007/BF02754355
2276
+
V9E2T4oBgHgl3EQfDQar/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
W9E0T4oBgHgl3EQf3QKM/content/tmp_files/2301.02723v1.pdf.txt ADDED
@@ -0,0 +1,1413 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ CFG2VEC: Hierarchical Graph Neural Network for
2
+ Cross-Architectural Software Reverse Engineering
3
+ Shih-Yuan Yu1, Yonatan Gizachew Achamyeleh1, Chonghan Wang1, Anton Kocheturov2, Patrick Eisen2,
4
+ Mohammad Abdullah Al Faruque1
5
+ 1Dept. of Electrical Engineering and Computer Science, University of California, Irvine, CA, USA
6
+ {shihyuay, yachamye, chonghaw, alfaruqu}@uci.edu
7
+ 2Siemens Technology, Princeton, NJ, USA, {anton.kocheturov, patrick.eisen}@siemens.com
8
+ Abstract—Mission-critical embedded software is critical to
9
+ our society’s infrastructure but can be subject to new security
10
+ vulnerabilities as technology advances. When security issues
11
+ arise, Reverse Engineers (REs) use Software Reverse Engineering
12
+ (SRE) tools to analyze vulnerable binaries. However, existing tools
13
+ have limited support, and REs undergo a time-consuming, costly,
14
+ and error-prone process that requires experience and expertise
15
+ to understand the behaviors of software and vulnerabilities. To
16
+ improve these tools, we propose cfg2vec, a Hierarchical Graph
17
+ Neural Network (GNN) based approach. To represent binary, we
18
+ propose a novel Graph-of-Graph (GoG) representation, combining
19
+ the information of control-flow and function-call graphs. Our
20
+ cfg2vec learns how to represent each binary function compiled
21
+ from various CPU architectures, utilizing hierarchical GNN and
22
+ the siamese network-based supervised learning architecture. We
23
+ evaluate cfg2vec’s capability of predicting function names from
24
+ stripped binaries. Our results show that cfg2vec outperforms the
25
+ state-of-the-art by 24.54% in predicting function names and can
26
+ even achieve 51.84% better given more training data. Addition-
27
+ ally, cfg2vec consistently outperforms the state-of-the-art for all
28
+ CPU architectures, while the baseline requires multiple training
29
+ to achieve similar performance. More importantly, our results
30
+ demonstrate that our cfg2vec could tackle binaries built from
31
+ unseen CPU architectures, thus indicating that our approach
32
+ can generalize the learned knowledge. Lastly, we demonstrate its
33
+ practicability by implementing it as a Ghidra plugin used during
34
+ resolving DARPA Assured MicroPatching (AMP) challenges.
35
+ Index Terms—Software Reverse Engineering; Binary Analysis;
36
+ Cross-Architecture; Machine Learning; Graph Neural Network;
37
+ I. INTRODUCTION
38
+ In mission-critical systems, embedded software is vital in
39
+ manipulating physical processes and executing missions that
40
+ could pose risks to human operators. Recently, the Internet of
41
+ Things (IoT) has created a market valued at 19 trillion dollars
42
+ and drastically grown the number of connected devices to
43
+ approximately 35 billion in 2025 [1]–[3]. However, while IoT
44
+ brings technological growth, it unintendedly exposes mission-
45
+ critical systems to novel vulnerabilities [4]–[6]. The reported
46
+ This material is based upon work supported by the Defense Advanced
47
+ Research Projects Agency (DARPA) and Naval Information Warfare Center
48
+ Pacific (NIWC Pacific) under Contract Number N66001-20-C-4024 The
49
+ views, opinions, and/or findings expressed are those of the author(s) and
50
+ should not be interpreted as representing the official views or policies of
51
+ the Department of Defense or the U.S. Government.
52
+ Distribution Statement ”A” (Approved for Public Release, Distribution
53
+ Unlimited).
54
+ number of IoT cyberattacks increased by 300% in 2019 [7],
55
+ while the discovered software vulnerabilities rose from 1.6k to
56
+ 100k [8]. The consequence can be detrimental, as indicated in
57
+ [9], the Heartbleed bug [10] can lead to a leakage of up to 64K
58
+ memory, threatening not only personal but also organizational
59
+ information security. Besides, Shellshock is a bash command-
60
+ line interface shell bug, but it has existed for 30 years and
61
+ remains a threat to enterprises today [11], [12]. For mission-
62
+ critical systems, unexpected disruptions can incur millions of
63
+ dollars even if they only last for a few hours or minutes [13].
64
+ As a result, timely analyzing these impacted software and
65
+ patching vulnerabilities becomes critical.
66
+ Fig. 1. Legacy software life cycle.
67
+ However, mission-critical systems usually use software that
68
+ can last for decades due to the criticality of the missions.
69
+ Over time, these systems become legacy, and the number
70
+ of newly-discovered threats can increase (as illustrated in
71
+ Figure 1). Typically, for legacy software, the original devel-
72
+ opment environment, maintenance support, or source code
73
+ might no longer exist. To address vulnerabilities, vendors offer
74
+ patches in the form of source code changes based on the
75
+ current software version (e.g., ver 0.9). However, the only
76
+ available data in the legacy system is binary based on its
77
+ source code (e.g., ver 0.1). Such a version gap poses challenges
78
+ in applying patches to the legacy binaries, leaving the only
79
+ solution for applying patches to legacy software as direct
80
+ binary analysis. Today, as Figure 2 shows, Reverse Engineers
81
+ (REs) have to leverage Software Reverse Engineering (SRE)
82
+ arXiv:2301.02723v1 [cs.SE] 6 Jan 2023
83
+
84
+
85
+ Deploy
86
+ 日日日
87
+ [
88
+ </>
89
+ Developer
90
+ Source Code
91
+ Binary
92
+ 50 years ago
93
+ MissionCriticalEmbeddedSystems
94
+ Present
95
+ -
96
+ Developing tools missing.
97
+ Extract
98
+ Source code missing
99
+ Developer missing
100
+ Legacy Binary
101
+ MissionCriticalEmbeddedSystemstools such as Ghidra [14], HexRays [15], and radare2 [16]
102
+ to first disassemble and decompile binaries into higher-level
103
+ representations (e.g., C or C++). Typically, these tools take
104
+ the debugging information, strings, and the symbol-table and
105
+ binary to reconstruct function names and variable names,
106
+ allowing REs to rebuild a software’s structure and functionality
107
+ without access to source code [17]. For REs, these symbols
108
+ encode the context of the source code and provide invaluable
109
+ information that could help them to understand the program’s
110
+ logic as they work to patch vulnerable binaries. However, sym-
111
+ bols are often excluded for optimizing the binary’s footprint
112
+ in mission-critical legacy systems where memory is limited.
113
+ Because recovering symbols from stripped binaries is not
114
+ straightforward, most decompilers assign meaningless symbol
115
+ names to coding elements. As for understanding the software
116
+ semantics, REs have to leverage their experience and expertise
117
+ to consume the information and then interpret the semantics
118
+ of each coding element.
119
+ Recent works tackle these challenges with Machine Learn-
120
+ ing (ML), aiming to recover the program’s information from
121
+ raw binaries. For example, [18], and [19] associate code fea-
122
+ tures to function names and model the relationships between
123
+ such code features and the corresponding source-level infor-
124
+ mation (variable names in [19], variable & function names
125
+ in [18]). Meanwhile, [20] and [21] use an encoder-decoder
126
+ network structure to predict function names from stripped
127
+ binary functions based on instruction sequences and control
128
+ flows. However, none of them support cross-architectural
129
+ debug information reconstruction. On the other side, there
130
+ exist works focusing on the cross-platform in their ML mod-
131
+ els [22]–[24]. These works focus on modeling the binary code
132
+ similarity, extracting a real-valued vector from each control-
133
+ flow graph (CFG) with attributed features, and then computing
134
+ the Structural Similarity between the feature vectors of binary
135
+ functions built from different CPU architectures.
136
+ In this paper, as part of a multi-industry-academia joint
137
+ initiative between Siemens, the Johns Hopkins University
138
+ Applied Physics Laboratory (JHU/APL), BAE Systems (BAE),
139
+ and UCI, we propose cfg2vec, which utilizes a hierarchical
140
+ Graph Neural Network (GNN) for reconstructing the name
141
+ of each binary function, aiming to develop the capacity for
142
+ quick patching of legacy binaries in mission-critical systems.
143
+ Our Cfg2vec forms a Graph-of-Graph (GoG) representation,
144
+ combining CFG and FCG to model the relationship between
145
+ binary functions’ representation and their semantic names.
146
+ Besides, cfg2vec can tackle cross-architectural binaries thanks
147
+ to the design of Siamese-based network architecture, as shown
148
+ in Figure 3. One crucial use case of cross-architectural de-
149
+ compilation is patching, where the goal is to identify a known
150
+ vulnerability or a bug and apply a patch. However, there can be
151
+ architecture gaps when software with a bug can be compiled
152
+ into many devices with diverse hardware architectures. For
153
+ example, it is challenging to patch a stripped binary from an
154
+ exotic embedded architecture compiled ten years ago that is
155
+ vulnerable to a known attack such as Heartbleed [10]. While
156
+ the reference patch is available in software, the reference
157
+ architecture may not be readily available or documented, or
158
+ the vendor may no longer exist. Under such circumstances,
159
+ mapping code features across architectures is very helpful.
160
+ It would allow for identifying similarities in code between a
161
+ stripped binary that is vulnerable and its reference patch, even
162
+ if the patch were built for a different type of CPU architecture.
163
+ For cfg2vec, our targeted contributions are as follows:
164
+ • We propose representing binary functions in Graph-of-
165
+ Graph (GoG) and demonstrate its usefulness in recon-
166
+ structing function names from stripped binaries.
167
+ • We propose a novel methodology, cfg2vec that uses a
168
+ hierarchical Graph Neural Network (GNN) to model
169
+ control-flow and function-calling relations in binaries.
170
+ • We propose using cross-architectural loss when training,
171
+ allowing cfg2vec to capture the architecture-agnostic rep-
172
+ resentations of binaries.
173
+ • We release cfg2vec in a GitHub repository: https://github.
174
+ com/AICPS/mindsight cfg2vec.
175
+ • We integrate our cfg2vec into an experimental Ghidra plu-
176
+ gin, assisting the realistic scenarios of patching DARPA
177
+ Assured MicroPatching (AMP) challenge binaries.
178
+ The paper is structured as follows: Section II discusses
179
+ related works and fundamentals to provide a better under-
180
+ standing of the paper. Section III describes cfg2vec, includ-
181
+ ing problem formulation, data preprocessing, and our main
182
+ pipeline introduction. Section IV shows our experimental
183
+ results. Lastly, we conclude the paper in Section V.
184
+ II. RELATED WORK
185
+ This section introduces software reverse engineering back-
186
+ grounds, discusses the related works using machine learning
187
+ to improve reverse engineering, and ultimately covers graph
188
+ learning for binary analysis.
189
+ A. Software Reverse Engineering
190
+ Software Reverse Engineering (SRE) aims at understanding
191
+ the behavior of a program without having access to its source
192
+ code, often being used in many applications such as detecting
193
+ malware [25], [26], discovering vulnerabilities, and patching
194
+ bugs in legacy software [27], [28]. One primary tool that
195
+ Reverse Engineers (REs) use to inspect programs is disassem-
196
+ bler which translates a binary into low-level assembly code.
197
+ Examples of such tools include GNU Binutils’ objdump [29],
198
+ IDA [15], Binary Ninja [30], and Hopper [31]. However, even
199
+ with these tools, reasoning at the assembly level still requires
200
+ considerable cognitive effort from RE experts.
201
+ More recently, REs use decompilers such as Hex-Rays [32],
202
+ or Ghidra [14] to reverse the compiling process by further
203
+ translating the output of disassemblers into the code that
204
+ ensembles high-level programming languages such as C or
205
+ C++ to reduce the burden of understanding assembly code.
206
+ From assembly instructions, these decompilers can use pro-
207
+ gram analysis and heuristics to reconstruct variables, types,
208
+ functions, and control flow structure of a binary. However,
209
+ the decompilation is incomplete even if these decompilers
210
+ generate a higher-level output for better code understanding.
211
+
212
+ Fig. 2. The RE flow to solve security issues.
213
+ The reason is that the compilation process discards the source-
214
+ level information and lowers its abstraction level in exchange
215
+ for a smaller footprint size, faster execution time, or even
216
+ security considerations. The source-level information such as
217
+ comments, variable names, function names, and idiomatic
218
+ structure can be essential for understanding a program but is
219
+ typically unavailable in the output of these decompilers.
220
+ As Figure 2 demonstrated, REs use disassemblers or de-
221
+ compilers to generate high-level source code. Besides, [33]
222
+ indicates REs will take notes and grant a name to those
223
+ critical functions related to the vulnerabilities. This will create
224
+ an annotated source code based on the high-level machine-
225
+ generated source code. While annotating the source code, REs
226
+ also analyze the significant part related to the vulnerability
227
+ and ignore those general instructions or unrelated codes. At
228
+ the same time, understanding the logic flow among functions
229
+ is another major task they must focus on resolving their
230
+ tasks. After classification, annotation, and understanding, REs
231
+ experiment with several viable remedies to find the correct
232
+ patch to fix the vulnerability.
233
+ B. Machine Learning for Reverse Engineering
234
+ Software binary analysis is a straightforward first step to
235
+ enhance security as developers usually deploy software in
236
+ binaries [34]. Usually, experts conduct the patching process
237
+ or vulnerability analysis by understanding the compilation
238
+ source, function signatures, and variable information. How-
239
+ ever, after the compilation, such information is usually stripped
240
+ or confuscated deliberately (e.g., obfuscation). Software binary
241
+ analysis becomes more challenging in this case as developers
242
+ have to recover the source-level information based on their
243
+ experience and expertise. The early recovery work for binaries
244
+ focuses on manual completion but suffers from low efficiency,
245
+ high cost, and the error-prone nature of reverse engineering.
246
+ As Machine Learning (ML) has significantly advanced in its
247
+ reasoning capability, applying ML and reconstructing higher-
248
+ level source code information as an alternative to manual-
249
+ based approaches has attracted considerable research attention.
250
+ For example, [35] was the first approach that used neural
251
+ network-based and graph-based models, predicting the func-
252
+ tion types to assist the reverse engineer in understanding
253
+ the binary. [36] also predicted function names with neural
254
+ networks, aggregating the related features of sections of bi-
255
+ nary vectors. Then, it analyzes the connections between each
256
+ function in the source code (e.g., Java) and their corresponding
257
+ function names for function name prediction. [18], on the other
258
+ hand, did not use a neural network. It combined a decision-
259
+ tree-based classification algorithm and a structured prediction
260
+ with a probabilistic graphical model, then matched the func-
261
+ tion name by analyzing symbol names, types, and locations.
262
+ However, [18] can only predict from a predetermined closed
263
+ set, incapable of generalizing to new names.
264
+ As the languages for naming functions are similar to nat-
265
+ ural language, recent research works start leaning toward the
266
+ use of Natural Language Processing (NLP) [20], [21], [37].
267
+ Precisely, these models predict semantic tokens based on the
268
+ function names in the library, comprising the function name
269
+ during inference. The underlying premise is that each token
270
+ corresponds in some way to the attributes and functionality of
271
+ the function. [20] uses Control-Flow Graph (CFG) to predict
272
+ function names. It combined static analysis with LSTM and
273
+ transformer neural model to realize the name of functions.
274
+ However, the dataset that consisted of unbalanced data and in-
275
+ sufficient features was limited and hindered utter performance.
276
+ [37] was designed to solve the limitation of the dataset. It
277
+ provided UbuntuDataset that contained more than 9 million
278
+ functions in 22K software. [21] demonstrated the framework’s
279
+ effectiveness by building a large dataset. It considers the
280
+ fine-grained sequence and structure information of assembly
281
+ code when modeling and realizing function name prediction.
282
+ Meanwhile, [21] reduced the diversity of data (instructions or
283
+ words) while keeping the basic semantics unchanged, similar
284
+ to word stemming and semantics in NLP. However, these
285
+ works have low precision scores for prediction tasks, exampled
286
+ by [21], only achieving around 41% in correctly predicting
287
+ the function name subtokens. Moreover, the metrics for the
288
+ inference of unknown functions are substantially lower [21],
289
+ making it difficult for REs to find it helpful in practice.
290
+ Although many existing works can reconstruct source-
291
+ level information, none of them supports reconstructing cross-
292
+ platform debug information. Cross-compilation is becoming
293
+ more popular in the development of software. Hardware
294
+ manufacturers, for instance, often reuse the same firmware
295
+ code base across several devices running on various archi-
296
+ tectures [38]. A tool that performs cross-architecture function
297
+ name prediction/matching would be beneficial if we have a
298
+ stripped binary compiled for one architecture and a binary
299
+ of a comparable program compiled for another architecture
300
+ with debug symbols. We may use the binary with the debug
301
+ symbols to predict the names of functions in the stripped
302
+ binary, which significantly aids debugging. A tool that could
303
+ capture the architecture-agnostic characteristics of binaries
304
+
305
+ IDA/GNU
306
+ IDA/GNU
307
+ Dismiss unrelated BBs
308
+ Hypothesis
309
+ disprove
310
+ ASM
311
+ <>
312
+ c
313
+ approved
314
+ Reconstruct code logic
315
+ Reverse
316
+ Verifying
317
+ Engineers
318
+ Vulnerabili
319
+ high-level C
320
+ binary
321
+ annotated C
322
+ patching
323
+ Assembly
324
+ Understand program
325
+ code
326
+ code
327
+ SRE Tools
328
+ Problem Solving from REswould also help in malware detection as the source code of
329
+ malware can be compiled in different architectures [38], [39].
330
+ Comparing two binaries of different architectures becomes
331
+ more complicated because they will have different instruction
332
+ sets, calling conventions, register sets, etc. Furthermore, as-
333
+ sembly instructions from different architectures cannot often
334
+ be compared directly due to the slightly different behavior of
335
+ different architectures [40]. Cross-architecture function name
336
+ prediction will assist in finding a malicious function in a
337
+ program compiled for different architectures by learning its
338
+ features from a binary compiled for just one architecture. The
339
+ tools mentioned above are not architecture-agnostic; thus, we
340
+ cannot utilize them for such applications. To address the flaws
341
+ mentioned above, aid in creating more efficient decompilers,
342
+ and make reverse engineering more accessible, we propose
343
+ cfg2vec. Incorporating the cross-architectural siamese network
344
+ architecture, our cfg2vec can learn to extract robust features
345
+ that encompass platform-independent features, enhancing the
346
+ state-of-the-art by achieving function name reconstruction
347
+ across cross-architectural binaries.
348
+ C. Graph Learning for Binary Analysis
349
+ Graph learning has become a practical approach across
350
+ fields [41]–[44]. Although conventional ML can effectively
351
+ capture the features hidden in Euclidean data, such as images,
352
+ text, or videos, our work focuses more on the application
353
+ where the core data is graph-structured. Graphs can be ir-
354
+ regular, and a graph may contain a variable size of unordered
355
+ nodes; moreover, nodes can have a varying number of neigh-
356
+ boring nodes, making deep learning mathematical operations
357
+ (e.g., 2D Convolution) challenging to apply. The operations in
358
+ conventional ML methods can only be applied by projecting
359
+ non-Euclidean data into low-dimensional embedding space.
360
+ In graph learning, Graph Embeddings (GE) can transform a
361
+ graph into a vector (embedding of a graph) or a set of vectors
362
+ (embedding of nodes or edges) while preserving the relevant
363
+ and structural information about the graph [41]. Graph Neural
364
+ Network (GNN) is a model aiming at addressing graph-related
365
+ tasks in an end-to-end manner, where the main idea is to
366
+ generate a node’s representation by aggregating its representa-
367
+ tion and the representations of its neighbors [42]. GNN stacks
368
+ multiple graph convolution layers, graph pooling layers, and a
369
+ graph readout to generate a low-dimensional graph embedding
370
+ from high-dimensional graph-structured data.
371
+ In software binary analysis, many approaches use Control-
372
+ Flow Graphs (CFGs) as the primary representations. For
373
+ example, Genius forms an Attributed Control-Flow Graph
374
+ (ACFG) representation for each binary function by extracting
375
+ the raw attributes from each Basic Block (BB), a straight-line
376
+ code sequence with no branching in or out except at the entry
377
+ and exit, in an ACFG [22]. Genius measures the similarity
378
+ of a pair of ACFGs through a bipartite graph matching algo-
379
+ rithm, and the ACFGs are then clustered based on similarity.
380
+ Genius leverages a codebook for retrieving the embedding
381
+ of an ACFG based on similarity. Another approach, Gemini,
382
+ proposes a deep neural network-based model along with a
383
+ Siamese architecture for modeling binary similarities with
384
+ greater efficiency and accuracy than other state-of-the-art mod-
385
+ els of the time [23]. Gemini takes in a pair of ACFGs extracted
386
+ from raw binary functions generated from known vulnerability
387
+ in code and then embeds them with a shared Structure2vec
388
+ model in their network architecture. Once embedded, Gemini
389
+ trains its model with a loss function that calculates the cosine
390
+ similarities between two embedded representations. Gemini
391
+ outperforms models like Genius or other approaches such as
392
+ bipartite graph matching. In literature, there exist other works
393
+ that consider the Function Call Graph (FCG) as their primary
394
+ data structures in binary analysis for malware detection [45].
395
+ Our cfg2vec extracts relevant platform-independent features by
396
+ combining the usage of CFG and FCG, resulting in a Graph-
397
+ of-Graph (GoG) representation for cross-architectural high-
398
+ level information reconstruction tasks (e.g., function name).
399
+ III. CFG2VEC ARCHITECTURE
400
+ This section begins with problem formulation. Next, as
401
+ Figure 4 shows, we depict how our cfg2vec extracts the Graph-
402
+ of-Graph (GoG) representation from each software binary.
403
+ Lastly, we describe the network architecture in cfg2vec.
404
+ A. Problem Formulation
405
+ In our work, given a binary code, denoted as p, compiled
406
+ from different CPU architectures, we extract a graph-of-graph
407
+ (GoG) representation, G = (V , A) where V is the set of
408
+ nodes and A is the adjacency matrix (As Figure 3 shows). The
409
+ nodes in V represent functions and the edges in A indicate
410
+ their cross-referencing relationships. That says, each of the
411
+ node fi ∈ V is a CFG, and we denote it as fi = (B, A, φ)
412
+ where the nodes in B represent the basic blocks and the edges
413
+ in A denote their dependency relationships. φ is a mapping
414
+ function that maps each basic block in the assembly form to
415
+ its corresponding extracted attributes φ(vi) = Ck where C is a
416
+ numeric value, and k is the number of attributes for the basic
417
+ block (BB). Whereas the CFG structure is meant to provide
418
+ more information at the lower BB level, the GoG structure
419
+ is intended for recovering information at the overarching
420
+ function level between the CFGs. Figure 3 is an example of
421
+ a partial GoG structure with a closer inspection of one of its
422
+ CFG nodes and another of a single CFG BB node, showing
423
+ the set of features corresponding to that BB node. The goal is
424
+ to design an efficient and effective graph embedding technique
425
+ that can be used for reconstructing the function names for each
426
+ function fi ∈ V .
427
+ B. Ghidra Data ToolKit for Graph Extraction
428
+ To extract the structured representation required for cfg2vec
429
+ we leverage the state-of-the-art decompiler Ghidra [14] and
430
+ the Ghidra Headless Analyzer1. The headless analyzer is a
431
+ command-line version of Ghidra allowing users to perform
432
+ many tasks (such as analyzing a binary file) supported by
433
+ Ghidra via a command-line interface. For extracting GoG
434
+ 1Documentation of Ghidra Headless Analyzer: https://ghidra.re/ghidra
435
+ docs/analyzeHeadlessREADME.html
436
+
437
+ Fig. 3. An example of a Graph-of-Graph (GoG) of a binary compiled from a package Freecell with amd64 CPU architecture.
438
+ from a binary, we developed our Ghidra Data Toolkit (GDT);
439
+ GDT is a set of Java-based metadata extraction scripts used
440
+ for instrumenting Ghidra Headless Analyzer. First, GDT pro-
441
+ grammatically analyzes the given executable file and stores the
442
+ extracted information in the internal Ghidra database. Ghidra
443
+ provides a set of APIs to access the database and retrieve the
444
+ information about the analyzed binary. GDT uses these APIs to
445
+ export information such as Ghirda’s PCode and call graph for
446
+ each function. Specifically, the FunctionManager API allows
447
+ us to manipulate the information of each decompiled function
448
+ in the binary and acquire the cross-calling dependencies be-
449
+ tween functions. For each function, we utilized another Ghidra
450
+ API DecompInterface2 to extract 12 attributes associated with
451
+ each basic block in a function. These attributes precisely corre-
452
+ spond to the total number of instructions, including arithmetic,
453
+ logic, transfer, call, data transfer, SSA, compare, and pointer
454
+ instructions, as well as other instructions not falling within
455
+ those categories and the total number of constants and strings
456
+ within that BB. Lastly, by integrating all of the information, we
457
+ form a GoG representation G for each binary p. We repeat this
458
+ process until all binaries are converted to the GoG structure.
459
+ We feed the resulting GoG representations to our model in
460
+ batches, with the batch size denoted as B.
461
+ C. Hierarchical Graph Neural Network
462
+ Once G is extracted from the GDT, we then feed it to
463
+ our hierarchical network architecture (inspired from [46]) that
464
+ contains both CFG Graph Embedding layer and GoG Graph
465
+ Embedding Layer as Figure 4 shows. For each GoG structure,
466
+ we denote it as G = (V , A) where V is a set of functions
467
+ associated with G and A indicates the calling relationships
468
+ between the functions in V . Each function in V is in the form
469
+ of CFG fi = (B, A, φ) where each node b ∈ B is a BB
470
+ represented in a fixed-length attributed vector b ∈ Rd, and d
471
+ is the dimension that we have mentioned earlier. A encodes
472
+ the pair-wise control-flow dependency relationships between
473
+ these BBs.
474
+ 1) CFG Graph Embedding Layer: Our network architec-
475
+ ture first feeds all functions in a batch of GoGs to the
476
+ CFG Graph Embedding Layer consisting of multiple graph
477
+ 2Documentation of Ghidra API DecompInterface: https://ghidra.re/ghidra
478
+ docs/api/ghidra/app/decompiler/DecompInterface.html
479
+ convolutional layers and a graph readout operations. The input
480
+ to this layer is a function fi = (B, A, φ) and the output is the
481
+ fixed-dimensional vector representing a function. For each BB
482
+ bk we let b0
483
+ k = bk, and we update bt
484
+ k to bt+1
485
+ k
486
+ with the graph
487
+ convolution operation shown as follows:
488
+ bt+1
489
+ k
490
+ = fG(Wbt
491
+ k +
492
+
493
+ bm∈Ak
494
+ Mbt
495
+ m)
496
+ where fG is a non-linear activation function such as ReLU,
497
+ Ak is the list of adjacent BBs for bk, and W ∈ Rd×d and
498
+ M ∈ Rd×d are the weights to be learned during the training.
499
+ We run T iterations of such a convolution, which can be a
500
+ tunable hyperparameter in our model. During the updates, each
501
+ BB gradually aggregates the global information of the control-
502
+ flow dependency relations into its representation, utilizing the
503
+ representation of its neighbor. We obtain the final represen-
504
+ tation for each BB as bT
505
+ k . To acquire the representation for
506
+ the function fi, we apply a graph readout operation such as
507
+ sum-readout, described as follows,
508
+ g(T ) =
509
+
510
+ bk∈B
511
+ bT
512
+ k
513
+ (1)
514
+ We assign the value of g(T ) (a.k.a. CFG embedding) to fi. The
515
+ graph readout operation can be replaced with mean-readout or
516
+ max-readout.
517
+ 2) GoG Graph Embedding Layer: Once all the functions
518
+ have been converted to fixed-length graph embeddings, we
519
+ then feed G to the second layer of cfg2vec, the GoG Embed-
520
+ ding Layer. Here, for each function fi we apply another L
521
+ iterations of graph convolution with F and C. The updates
522
+ can be illustrated as follows,
523
+ f (l+1)
524
+ k
525
+ = fGoG(Uf l
526
+ k +
527
+
528
+ fm∈Ck
529
+ V f (l)
530
+ m )
531
+ (2)
532
+ where fGoG is a non-linear activation function and Ck is the
533
+ list of adjacent functions (calling) for the function fk and U ∈
534
+ Rd×d and V ∈ Rd×d are the weights to be learned during the
535
+ training. Lastly, we take the f (L)
536
+ k
537
+ as the representation that
538
+ considers both CFG and GoG graph structures. We use these
539
+ updated representations to perform cross-architecture function
540
+ similarity learning.
541
+
542
+ 1001011110001
543
+ ALLSAR
544
+ 0101010101011
545
+ GHIDRA
546
+
547
+ 010001010010
548
+ 010101010000
549
+ 0101010101011
550
+ 18Fig. 4. The architecture of cfg2vec with a supervised hierarchical graph neural network approach.
551
+ 3) Siamese-based Cross-Architectural Function Similarity:
552
+ Given a batch of GoGs B = {GoG1, GoG2, ..., GoGB},
553
+ we apply the hierarchical graph neural network to acquire
554
+ the set of updated function embeddings, denoted as BF =
555
+ {f (T )
556
+ 1
557
+ , f (T )
558
+ 2
559
+ , ..., f (T )
560
+ K }. We calculate the function similarity
561
+ for each function pair with cosine similarity, denoted as
562
+ ˆy ∈ [−1, 1]. The loss function J between ˆY and a ground-
563
+ truth label y, which indicates whether a pair of functions have
564
+ the same function or not, is calculated as follows,
565
+ J(ˆy, y) =
566
+
567
+ 1 − y,
568
+ if y=1,
569
+ MAX(0, ˆy − m),
570
+ if y=-1,
571
+ (3)
572
+ the final loss L is then calculated as follows,
573
+ L = H(Y, ˆY ) =
574
+
575
+ i
576
+ (J( ˆyi, yi)),
577
+ (4)
578
+ where Y stands for ground-truth labels (either similarity or
579
+ dissimilarity), and ˆY represents the corresponding predictions.
580
+ More specifically, we denote a pair of functions as simi-
581
+ lar if they are the same but compiled with different CPU
582
+ architectures. The m is a constant to prevent the learned
583
+ embeddings from becoming distorted (by default, 0.5). To
584
+ maintain the balance between positive and negative training
585
+ samples, we developed a custom batching algorithm. The
586
+ function leverages the knowledge gained by adding a binary
587
+ of some package to a given batch to find and add a binary
588
+ for the same package, built for a different architecture, to the
589
+ provided batch as a positive sample. It will also include a
590
+ binary from another package as a negative sample. This will
591
+ give any batch a balanced proportion of positive and negative
592
+ samples. Finally, we use the loss L to update all the associated
593
+ weights in our neural networks with an Adam optimizer. Once
594
+ trained, we then use the model to perform function name
595
+ reconstruction tasks.
596
+ IV. EXPERIMENTAL RESULTS
597
+ In this section, we evaluate cfg2vec’s capability in predicting
598
+ function names. We first describe the dataset preparation and
599
+ the training setup processes. Then, we present the comparison
600
+ of cfg2vec against baseline in predicting function names.
601
+ Although many baseline candidates tackle the same prob-
602
+ lem [18], [20], [21], [37], some require purchasing a paid
603
+ version of IDA Pro to preprocess datasets, and some even do
604
+ not open source their implementations. Therefore, [18] was
605
+ the only feasible choice, as running other models using our
606
+ datasets was almost impossible. Next, we also show the result
607
+ of the ablation study over cfg2vec. Besides, we exhibit that
608
+ our cfg2vec can perform architecture-agnostic prediction better
609
+ than the baseline. Lastly, we illustrate the real-world use case
610
+ where our cfg2vec is integrated as a Ghidra plugin applica-
611
+ tion for assisting in resolving challenging reverse engineering
612
+ tasks. We conducted all experiments on a server equipped with
613
+ Intel Core i7-7820X CPU @3.60GHz with 16GB RAM and
614
+ two NVIDIA GeForce GTX Titan Xp GPUs.
615
+ A. Dataset Preparation
616
+ Our evaluating data source is the ALLSTAR (Assembled
617
+ Labeled Library for Static Analysis Research) dataset, hosted
618
+ by Applied Physics Laboratory (APL) [47]. It has over 30,000
619
+ Debian Jessie packages pre-built from i386, amd64, ARM,
620
+ MIPS, PPC, and s390x CPU architectures for software
621
+ reverse engineering research. The authors used a modified
622
+ Dockcross script in docker to build each package for each
623
+ supported architecture. Then, they saved each resulting ELF
624
+ with its symbols, the corresponding source code, header files,
625
+ intermediate files (.o, .class, .gkd, .gimple), system headers,
626
+ and system libraries altogether.
627
+ To form our datasets, we selected the packages that have
628
+ ELF binaries built for the amd64, armel, i386, and
629
+ mipsel CPU architectures. i386 and amd64 are widely
630
+ used by general computers, especially in the Intel and AMD
631
+ products, respectively. MIPS and ARM are crucial in em-
632
+ bedded systems, smartphones, and other portable electronic
633
+ devices [48]. In practice, we excluded the packages with only
634
+ one CPU architecture in the ALLSTAR dataset. Additionally,
635
+ due to our limited local computing resources, we eliminated
636
+ packages that were too large to handle. We checked each
637
+ selected binary on whether the ground-truth symbol infor-
638
+ mation exists using the Ghidra decompiler and Linux file
639
+ command and removed the ones that do not have them. Lastly,
640
+ we assembled our primary dataset, called the AS-4cpu-30k-bin
641
+ dataset, that consists of 27572 pre-built binaries from 1117
642
+ packages and 4 CPU architectures, as illustrated in Table I.
643
+ Our preliminary experiment revealed that the evaluation
644
+ had a data leakage issue when splitting the dataset randomly.
645
+ Therefore, we performed a non-random variant train-test split
646
+ with a 4-to-1 ratio on the AS-4cpu-30k-bin dataset, selecting
647
+ roughly 80% of the binaries for the training dataset and
648
+ leaving the rest for the testing dataset. We referenced [23]
649
+ for their splitting methods, aiming to ensure that the binaries
650
+
651
+ CFG
652
+ GoG
653
+ Embedding
654
+ Embedding
655
+ 创金
656
+ Layer
657
+ Layerthat belong to the same packages stay in the same set, either
658
+ the training or testing sets. Such a variant splitting method
659
+ allows us to evaluate cfg2vec truly.
660
+ Next, we converted binaries in the AS-4cpu-30k-bin dataset
661
+ into their Graph-of-Graph (GoG) representations leveraging
662
+ the GDT mentioned previously in Section III-B. Notably,
663
+ we processed a batch of binaries related to one package
664
+ at one time as developers might define user functions in
665
+ different modules of the same package while putting prototype
666
+ declarations in that package’s main module. For this case,
667
+ Ghidra indeed recognizes two function instances while one
668
+ only contains the function declaration and another has its
669
+ actual function content. As these two instances correspond
670
+ to the same function name and one contains only dummy
671
+ instructions, they can thus create noise in our datasets, thus
672
+ affecting our model’s learning. To cope with this, our GDT
673
+ also searches from other binaries of the same package for the
674
+ function bodies. If found, our GDT associates that user func-
675
+ tion with the function graph node with the actual content data.
676
+ Besides user functions, library function calls may exist, and
677
+ searching their function bodies in the same package would fail
678
+ for dynamically loaded binaries. Under such circumstances,
679
+ Ghidra would recognize these functions as ThunkFunctions3
680
+ which only contain one dummy instruction. As a workaround,
681
+ we removed these ThunkFunctions from our data as they
682
+ might mislead the model’s learning. Applying this workaround
683
+ indicates that our model works in predicting function names
684
+ for the user and statically linked functions.
685
+ TABLE I
686
+ THE STATISTICS OF DATASETS USED IN OUR EXPERIMENTS.
687
+ Dataset / #
688
+ pkg/bin
689
+ func node/edge1
690
+ bb node/edge2
691
+ AS-4cpu-30k-bin
692
+ 1117/27,572
693
+ 51.17/97.14
694
+ 14.12/19.98
695
+ AS-3cpu-9k-bin
696
+ 633/9,000
697
+ 44.01/79.06
698
+ 12.24/17.07
699
+ AS-i386-3k-bin
700
+ 633/3,000
701
+ 45.31/87.70
702
+ 11.45/15.97
703
+ AS-amd64-3k-bin
704
+ 633/3,000
705
+ 42.28/74.07
706
+ 12.28/17.18
707
+ AS-armel-3k-bin
708
+ 633/3,000
709
+ 44.45/75.41
710
+ 13.00/18.07
711
+ 1 # of average functions and edges in each binary
712
+ 2 # of average bb blocks and edges from each function
713
+ We experimented [18] with our datasets, referencing to
714
+ their implementation4. As [18] used a dataset with 3,000
715
+ binaries for experiments, we followed accordingly, prepar-
716
+ ing datasets with smaller but similar sizes. We achieved
717
+ this by downsampling from our primary AS-4cpu-30k-bin
718
+ dataset, creating the AS-3cpu-9k-bin dataset which has 9,000
719
+ binaries for i386, amd64, and armel CPU architectures.
720
+ Furthermore, as [18] supports only one CPU architecture at
721
+ a time, we then separated the AS-3cpu-9k-bin dataset into
722
+ different CPU architectures, generating three training datasets
723
+ for testing [18]: AS-i386-3k-bin, AS-amd64-3k-bin, and AS-
724
+ armel-3k-bin. For training, we utilized the strip Linux
725
+ command, converting our original data into three: the original
726
+ binaries (debug), stripped binaries with debug information
727
+ 3ThunkFunction Manual: https://ghidra.re/ghidra docs/api/ghidra/program/
728
+ model/listing/ThunkFunction.html
729
+ 4Debin’s [18] repository: https://github.com/eth-sri/debin
730
+ (stripped), and stripped binaries without debug information
731
+ (stripped wo symtab) to follow [18]’s required data format.
732
+ For evaluation, we sampled 100 binaries from our primary
733
+ dataset for each CPU architecture, labeled AS-amd-100-bin,
734
+ AS-i386-100-bin, AS-armel-100-bin, and AS-mipsel-100-bin.
735
+ We also have another evaluation dataset called AS-noMipsel-
736
+ 300-bin, which contains roughly 300 binaries produced for the
737
+ amd64, i386, and armel platforms. Table I summarizes the
738
+ data statistics for all these datasets, including the numbers of
739
+ packages and binaries, the average number of function nodes,
740
+ edges, and BB nodes. The following sections will detail how
741
+ we utilized these datasets during our experiments.
742
+ B. Evaluation: Function Name Prediction
743
+ Table II demonstrates the results of cfg2vec in predicting
744
+ function names. For the baseline, we followed [18]’s best
745
+ setting where the feature dimension of register or stack offset
746
+ are both 100 to train with our prepared datasets. For cfg2vec,
747
+ we used three GCN layers and one GAT convolution layer
748
+ in both graph embedding layers. For evaluation, we calculate
749
+ the p@k (e.g., precision at k) metric, which refers to an
750
+ average hit ratio over the top-k list of predicted function
751
+ names. Specifically, we feed each binary represented in GoG
752
+ into our trained model, converting each function f ∈ F and
753
+ acquiring its function embedding hf. Then, we calculate pair-
754
+ wise cosine similarities between hf and all the other function
755
+ embeddings, forming a top-k list by selecting k names in
756
+ which their embeddings are top-kth similar to hf. If the
757
+ ground-truth function name is among the top-k list of function
758
+ name predictions, we regard that as a hit; otherwise, it is a
759
+ miss. During experiments, we set the top-k value to be 5, so
760
+ our model can recommend the best five possible names for
761
+ each function in a binary.
762
+ As shown in Table II, cfg2vec, trained with the AS-3cpu-9k-
763
+ bin dataset, can achieve a 69.75% prediction accuracy (e.g.,
764
+ p@1) in inferring function names. For [18], we had to train
765
+ their models for each CPU architecture separately as it cannot
766
+ train in a cross-architectural manner. Even so, for amd64
767
+ binaries, [18] only achieves 29.32% precision, while for i386
768
+ and armel, it performs 52.64% and 53.65%, respectively.
769
+ This result indicates that in any case, our cfg2vec outperforms
770
+ [18]. Besides, while [18] only yields one prediction, our
771
+ cfg2vec suggests five choices, making it flexible for our users
772
+ (e.g., REs) to select what they believe best fits the function
773
+ among the best k predicted names. The p@2 to p@5 in Table II
774
+ demonstrate that our cfg2vec can provide enough hints of
775
+ function names for users. For example, p@5 of cfg2vec trained
776
+ with our AS-3cpu-9k-bin dataset can achieve 70.50% precision
777
+ across all the CPU architecture binaries. We also experimented
778
+ our cfg2vec with larger datasets. From Table II, we can observe
779
+ that cfg2vec can have 5.04% performance gain in correctly
780
+ predicting function names (e.g., p@1). Moreover, the gain
781
+ increases to 28% when training cfg2vec with the AS-4cpu-30k-
782
+ bin dataset. We believe training on a larger dataset implies
783
+ training with a more diversified set of binaries. This allows
784
+ our model to acquire more knowledge, thus being capable
785
+
786
+ TABLE II
787
+ THE PERFORMANCE EVALUATION OF cfg2vec FOR FUNCTION NAME PREDICTION AGAINST [18].
788
+ Model
789
+ Training dataset
790
+ Testing dataset
791
+ P@11
792
+ P@21
793
+ P@31
794
+ P@41
795
+ P@51
796
+ cfg2vec
797
+ AS-4cpu-30k-bin
798
+ AS-noMipsel-300-bin
799
+ 97.05%
800
+ 99.47%
801
+ 99.47%
802
+ 99.47%
803
+ 99.47%
804
+ cfg2vec
805
+ AS-4cpu-20k-bin
806
+ AS-noMipsel-300-bin
807
+ 74.22%
808
+ 75.76%
809
+ 75.78%
810
+ 75.78%
811
+ 78.78%
812
+ AS-amd-100-bin
813
+ 69.18%
814
+ 69.98%
815
+ 69.98%
816
+ 69.98%
817
+ 69.98%
818
+ cfg2vec
819
+ AS-3cpu-9k-bin
820
+ AS-i386-100-bin
821
+ 69.41%
822
+ 70.39%
823
+ 70.39%
824
+ 70.39%
825
+ 70.39%
826
+ AS-armel-100-bin
827
+ 70.66%
828
+ 71.04%
829
+ 71.11%
830
+ 71.11%
831
+ 71.11%
832
+ AS-noMipsel-300-bin
833
+ 69.75%
834
+ 70.47%
835
+ 70.50%
836
+ 70.50%
837
+ 70.50%
838
+ [18]-amd642
839
+ AS-amd64-3k-bin
840
+ AS-amd-100-bin
841
+ 29.32%
842
+ -
843
+ -
844
+ -
845
+ -
846
+ [18]-i3862
847
+ AS-i386-3k-bin
848
+ AS-i386-100-bin
849
+ 52.64%
850
+ -
851
+ -
852
+ -
853
+ -
854
+ [18]-armel2
855
+ AS-armel-3k-bin
856
+ AS-armel-100-bin
857
+ 53.65%
858
+ -
859
+ -
860
+ -
861
+ -
862
+ 1 P@k measures if the actual function name is in the top k of the predicted function names.
863
+ 2 These models only provide the top 1 function name prediction; hence they only have P@1 value.
864
+ of extracting more robust features for binary functions. In
865
+ summary, this result indicates that compared to the baseline,
866
+ our model can effectively provide contextually relevant names
867
+ for functions in the decompiled code to our users.
868
+ TABLE III
869
+ THE COMPARISON BETWEEN cfg2vec AND ITS ABLATED VARIATIONS.
870
+ Arch
871
+ [18]
872
+ GCN-GAT
873
+ 2GCN
874
+ 2GCN-GAT
875
+ cfg2vec
876
+ amd64
877
+ 29.32%1
878
+ 61.59%
879
+ 69.49%
880
+ 69.56%
881
+ 70.66%
882
+ armel
883
+ 52.64%2
884
+ 66.40%
885
+ 68.59%
886
+ 68.92%
887
+ 69.19%
888
+ mipsel
889
+ 53.65%3
890
+ 66.47%
891
+ 68.17%
892
+ 68.56%
893
+ 69.41%
894
+ Overall
895
+ 45.20%
896
+ 64.82%
897
+ 68.75%
898
+ 69.01%
899
+ 69.75%
900
+ 1 Evaluation results for [18]-amd64 model.
901
+ 2 Evaluation results for [18]-i386 model.
902
+ 3 Evaluation results for [18]-armel model.
903
+ We also experimented with various ablated network setups
904
+ to study how each component of cfg2vec contributes to per-
905
+ formance. First, we simplified our cfg2vec by stripping one
906
+ GCN layer from the original experimental setup. As shown
907
+ in Table III, we called this setup 2GCN-GAT which slightly
908
+ decreased the performance by 0.75%. Then, from 2GCN-GAT
909
+ setup, we further removed the GAT layer, calling it 2GCN.
910
+ We again observed a marginal performance decrease (<1%).
911
+ Next, we eliminated another GCN layer from 2GCN-GAT,
912
+ constructing the GCN-GAT setup. For GCN-GAT, we saw
913
+ a drastic drop (4.2%) which highlights that the number of
914
+ GCN layers can be an essential factor in the performance.
915
+ Specifically, we found that going from 1 to 2 GCN layers
916
+ improves prediction accuracy by more than 4%. However, we
917
+ do not observe a significant performance gain when increasing
918
+ the number of GCN layers to more than three. Therefore,
919
+ we retained the original cfg2vec model with its three GCN
920
+ layers. All in all, as shown in Table III, all these ablated
921
+ models, still outperform [18], which we attributed to the GoG
922
+ representation we made for each binary in the dataset.
923
+ C. Evaluation: Architectural-agnostic Prediction
924
+ Table IV demonstrates our cfg2vec’s capability in terms
925
+ of cross-architecture support. As [18] supports training one
926
+ CPU architecture at a time, we had to train it multiple times
927
+ during experiments. Specifically, we trained [18] on three
928
+ datasets: AS-amd64-3k-bin, AS-i386-3k-bin, and AS-armel-3k-
929
+ bin, calling resulting trained models, [18]-amd64, [18]-i386,
930
+ and [18]-armel, respectively. For these baseline models, we
931
+ observe that they perform well when tested with the binaries
932
+ built on the same CPU architecture but poorly with the ones
933
+ built on different CPU architectures. For instance, [18]-amd64
934
+ achieves 29.3% accuracy for amd64 binaries, but performs
935
+ worse for i386 and armel binaries (13.8% and 7.1%). Sim-
936
+ ilarly, [18]-i386 achieves 52.6% accuracy for i386 binaries,
937
+ but performs worse for amd64 and armel binaries (6.2%
938
+ and 1.1%). Lastly, [18]-armel achieves 53.6% accuracy for
939
+ armel binaries, but performs worse for amd64 and i386
940
+ binaries (11.8% and 8.9%). We used the top-1 prediction
941
+ generated from cfg2vec (a.k.a., p@1) as the comparing metric
942
+ as [18] produces only one prediction per each function. From
943
+ the results, we observe that cfg2vec outperforms [18] across all
944
+ three tested CPU architectures. The fact that cfg2vec performs
945
+ consistently well across all CPU architectures indicates that
946
+ our cfg2vec supports cross-architecture prediction.
947
+ To evaluate the capability of generalizing the learned knowl-
948
+ edge, we tested all models with the AS-mipsel-100-bin dataset,
949
+ which has binaries built from another famous CPU architec-
950
+ ture, mipsel, that our cfg2vec does not train before. For [18],
951
+ it has lower performance when testing on binaries built from
952
+ the CPU architectures that it did not train before, exampled
953
+ by the highest accuracy of [18] to be 13.84% when trained on
954
+ amd64 binaries and evaluated on i386 binaries. In our work,
955
+ as Table IV shows, our cfg2vec achieves 36.69% accuracy
956
+ when trained with amd64, i386, and armel binaries but
957
+ tested on mipsel binaries. For [18], it does not even support
958
+ analyzing mipsel binaries. In short, these results demonstrate
959
+ that our cfg2vec outperforms our baseline in the function name
960
+ prediction task on cross-architectural binaries and generalizes
961
+ better to the binaries built from unseen CPU architectures. To
962
+ further investigate cfg2vec’s cross-architecture performance,
963
+ we trained it on three datasets, each consisting of binaries
964
+ built for two different architectures. We then gave the resulting
965
+ trained models names that indicated the architectures from
966
+ which the binaries were derived: cfg2vec-armel-i386, cfg2vec-
967
+ amd64-i386, and cfg2vec-armel-amd64. These results show
968
+ that our model performs well in the function name prediction
969
+ job across all of these scenarios, including when tested on
970
+ binaries compiled for unknown CPU architectures.
971
+
972
+ TABLE IV
973
+ THE CROSS-ARCHITECTURAL COMPARISON BETWEEN CFG2VEC AND [18]
974
+ Model
975
+ Testing dataset
976
+ P@1
977
+ AS-amd-100-bin
978
+ 69.18%
979
+ cfg2vec-3-Arch
980
+ AS-i386-100-bin
981
+ 70.66%
982
+ AS-armel-100-bin
983
+ 69.41%
984
+ AS-mipsel-100-bin∗
985
+ 36.69%
986
+ AS-amd-100-bin
987
+ 68.53%
988
+ cfg2vec-amd64-armel
989
+ AS-i386-100-bin∗
990
+ 39.23%
991
+ AS-armel-100-bin
992
+ 69.11%
993
+ AS-mipsel-100-bin∗
994
+ 32.21%
995
+ AS-amd-100-bin
996
+ 68.59%
997
+ cfg2vec-amd64-i386
998
+ AS-i386-100-bin
999
+ 69.09%
1000
+ AS-armel-100-bin∗
1001
+ 34.20%
1002
+ AS-mipsel-100-bin∗
1003
+ 38.26%
1004
+ AS-amd-100-bin∗
1005
+ 42.96%
1006
+ cfg2vec-armel-i386
1007
+ AS-i386-100-bin
1008
+ 67.45%
1009
+ AS-armel-100-bin
1010
+ 63.86%
1011
+ AS-mipsel-100-bin∗
1012
+ 36.61%
1013
+ AS-amd-100-bin
1014
+ 29.32%
1015
+ [18]-amd64
1016
+ AS-i386-100-bin∗
1017
+ 13.84%
1018
+ AS-armel-100-bin∗
1019
+ 7.08%
1020
+ AS-mipsel-100-bin∗
1021
+ -
1022
+ AS-amd-100-bin∗
1023
+ 6.23%
1024
+ [18]-i386
1025
+ AS-i386-100-bin
1026
+ 52.64%
1027
+ AS-armel-100-bin∗
1028
+ 1.05%
1029
+ AS-mipsel-100-bin∗
1030
+ -
1031
+ AS-amd-100-bin∗
1032
+ 11.82%
1033
+ [18]-armel
1034
+ AS-i386-100-bin∗
1035
+ 8.86%
1036
+ AS-armel-100-bin
1037
+ 53.65%
1038
+ AS-mipsel-100-bin∗
1039
+ -
1040
+ ∗ indicates that dataset was not used during the training.
1041
+ D. The Practical Usage of CFG2VEC
1042
+ In this section, we demonstrate how cfg2vec assists REs
1043
+ in dealing with Defense Advanced Research Projects Agency
1044
+ (DARPA) Assured MicroPatching (AMP) challenges binaries.
1045
+ The AMP program aims at enabling fast patching of legacy
1046
+ mission-critical system binaries, enhancing decompilation and
1047
+ guiding it toward a particular goal of a Reverse Engineer (RE)
1048
+ by integrating the existing source code samples, the original
1049
+ build process information, and historical software artifacts.
1050
+ 1) The MINDSIGHT project: our multi-industry-academia
1051
+ initiative between Siemens, JHU/APL, BAE, and UCI jointly
1052
+ developed a project, Making Intelligible Decompiled Source
1053
+ by Imposing Homomorphic Transforms (MINDSIGHT). Our
1054
+ team focused on building an automated toolchain integrated
1055
+ with Ghidra, aiming to enable the decompilation process with
1056
+ (1) a less granular identification of modular units, (2) an
1057
+ accurate reconstruction of symbol names, (3) the lifting of
1058
+ binaries to stylized C code, (4) a principled and scalable
1059
+ approach to reason about code similarity, and (5) the bench-
1060
+ marking of new decompilation techniques using state-of-the-
1061
+ art embedded software binary datasets. To date, our team
1062
+ has developed an open-source tool, CodeCut5, to improve the
1063
+ accuracy and completeness of Ghidra’s module identification,
1064
+ providing an automated script-based decompilation analysis
1065
+ toolchain to ease the RE’s expert interpretation. Besides, we
1066
+ also developed a Homomorphic Transform Language (HTL) to
1067
+ describe transformations on Abstract Syntax Tree (AST) lan-
1068
+ guages and the rules of their composition. Our tool, integrated
1069
+ 5CodeCut’s repository: https://github.com/DARPAMINDSIGHT/CodeCut
1070
+ with ghidra, allows developers to transform the decompiled
1071
+ code syntactically while keeping it semantically equivalent.
1072
+ The key idea is to use this HTL to morph a Ghidra AST
1073
+ into a GCC AST to lift the decompiled binary to a high-level
1074
+ C representation. This process can make it easier for REs to
1075
+ comprehend the binary code. cfg2vec is another tool developed
1076
+ in the MINDSIGHT project, enabling the reconstruction of
1077
+ function names, saving the manual guesswork from REs.
1078
+ Fig. 5. The plugin screenshot integrated into Ghidra.
1079
+ 2) The cfg2vec plugin: In MINDSIGHT project, we incor-
1080
+ porated cfg2vec into Ghidra decompiler as a plugin applica-
1081
+ tion. Our cfg2vec plugin assists REs in comprehending the
1082
+ binaries by providing a list of potential function names for
1083
+ each function without its name. Technically, like all Ghidra
1084
+ plugins, our cfg2vec plugin bases on Java with its core
1085
+ inference modules implemented as a REST API in Python
1086
+ 3.8. Once the metadata of a stripped binary is extracted from
1087
+ Ghidra decompiler, it is then sent to the cfg2vec end-point,
1088
+ which calculates and returns the inferred mappings for all
1089
+ the functions. Figure 5 demonstrates the user interface of
1090
+ our cfg2vec plugin. In this scenario, the user must provide
1091
+ the vulnerable and the reference binary with extra debug
1092
+ information, such as function names. The “Match Functions”
1093
+ button triggers cfg2vec functionality and displays the function
1094
+ mapping results in three tables:
1095
+ • Matched Table: displays the mapping of similar functions.
1096
+ • Mismatched Table: displays the mapping of dissimilar
1097
+ functions and, therefore, candidates for patching.
1098
+ • Orphan Table: displays the mapping of functions with a
1099
+ low confidence score.
1100
+ The groupings reduce REs’ workload. Rather than inspect-
1101
+ ing all functions, they can focus on patching candidate func-
1102
+ tions (mismatched functions) and the orphans. The “Explore
1103
+ Functions” button invokes Ghidra’s function explorer, where
1104
+ the two functions can be compared side-by-side, as shown
1105
+ in Figure 5. This utility allows the user to switch between
1106
+ C and assembly language, thus assisting in confirming or
1107
+ modifying the mappings from the three tables. Regarding
1108
+
1109
+ MINDSIGHT Plugin
1110
+ +
1111
+ x
1112
+ Select Vulnerable Program
1113
+ program_c
1114
+ Match Functions
1115
+ Select Patched Program
1116
+ program_c_patched
1117
+ Matched functions
1118
+ Vulnerable function
1119
+ Patched Function
1120
+ _DT_INIT
1121
+ _DT_INIT
1122
+ cxa_finalize
1123
+ cxa_finalize
1124
+ setsockopt
1125
+ setsockopt
1126
+ printf
1127
+ printf
1128
+ Mismatched functions
1129
+ Orphan functions
1130
+ Explore Functions
1131
+ Rename Function
1132
+ Program Diffcfg2vec’s function prediction, the “Rename Function” button
1133
+ takes the selected row from the tables and imposes the name
1134
+ from the patched binary in the vulnerable binary. When the
1135
+ “Match Functions” button fires, we invoke the FCG and CFG
1136
+ generators for the two programs (vulnerable and patched).
1137
+ 3) The use-case for AMP challenge binaries: DARPA AMP
1138
+ challenges is about REs to patch a vulnerability regarding a
1139
+ weak encryption algorithm where the encryption of commu-
1140
+ nication traffic was accomplished with a deprecated cipher
1141
+ suite, Triple DES or 3DES [49]. For this challenge, REs
1142
+ have to analyze the vulnerable binary, identify functions and
1143
+ instructions to be patched, 3DES cipher suite in this case, and
1144
+ patch 3DES-related function calls and instructions with the
1145
+ ones for AES [50]. All these steps happen at the decompiled
1146
+ binary level, and the vulnerable binaries are optimized by
1147
+ a compiler and stripped of the debugging information and
1148
+ function names. Furthermore, these binaries are sometimes
1149
+ statically linked against libraries such as GNU C Library [51]
1150
+ or OpenSSL, which introduce many extra functions to the
1151
+ binary (some of which will never be called/used). Given these
1152
+ complications, it becomes a non-trivial task for an RE to make
1153
+ sense of all these functions, find the problem, and successfully
1154
+ patch the problem. The direct usage of our cfg2vec plugin was
1155
+ to pick a function of interest with stripped information and see
1156
+ predictions of potential function names or matching functions
1157
+ from the available reference binary to confirm that whether this
1158
+ function is in the critical path during RE’s problem solving.
1159
+ As Figure 5 shows, our plugin allows users to see possible
1160
+ matches between functions from a stripped vulnerable binary
1161
+ and functions from a patched (reference) binary with extra
1162
+ information. REs may then leverage such information and
1163
+ make appropriate notes for that function, allowing them to
1164
+ complete their jobs more efficiently. The main feedback we
1165
+ received from REs who used the tool was that this is the
1166
+ functionality REs would like to have. However, the accuracy
1167
+ and usability of the tool were not high enough to truly utilize
1168
+ the tool’s potential.
1169
+ V. CONCLUSION
1170
+ This paper presents cfg2vec, a Hierarchical Graph Neural
1171
+ Network-based approach for software reverse engineering.
1172
+ Building on top of Ghidra, our cfg2vec plugin can extract
1173
+ a Graph-of-Graph (GoG) representation for binary, combin-
1174
+ ing the information from Control-Flow Graphs (CFG) and
1175
+ Function-Call Graphs (FCG). Cfg2vec utilizes a hierarchical
1176
+ graph embedding framework to learn the representation for
1177
+ each function in binary code compiled into various archi-
1178
+ tectures. Lastly, our cfg2vec utilizes the learned function
1179
+ embeddings for function name prediction, outperforming the
1180
+ state-of-the-art [18] by an average of 24.54% across all tested
1181
+ binaries. By increasing the amount of data, our model achieved
1182
+ 51.84% better. While [18] requires training once for each
1183
+ CPU architecture, our cfg2vec still can outperform consistently
1184
+ across all the architectures, only with one training. Besides,
1185
+ our model generalizes the learning better [18] to the binaries
1186
+ built from untrained CPU architectures. Lastly, we demonstrate
1187
+ that our cfg2vec can assist the real-world REs in resolving
1188
+ Darpa Assured MicroPatching (AMP) challenges.
1189
+ ACKNOWLEDGMENT
1190
+ This material is based upon work supported by the Defense
1191
+ Advanced Research Projects Agency (DARPA) and Naval
1192
+ Information Warfare Center Pacific (NIWC Pacific) under
1193
+ Contract Number N66001-20-C-4024. The views, opinions,
1194
+ and/or findings expressed are those of the author(s) and should
1195
+ not be interpreted as representing the official views or policies
1196
+ of the Department of Defense or the U.S. Government.
1197
+ REFERENCES
1198
+ [1] K. Zhidanov, S. Bezzateev, A. Afanasyeva, M. Sayfullin, S. Vanurin,
1199
+ Y. Bardinova, and A. Ometov, “Blockchain technology for smartphones
1200
+ and constrained iot devices: A future perspective and implementation,”
1201
+ in 2019 IEEE 21st Conference on Business Informatics (CBI), vol. 2.
1202
+ IEEE, 2019, pp. 20–27.
1203
+ [2] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito,
1204
+ “Blockchain and iot integration: A systematic survey,” Sensors, vol. 18,
1205
+ no. 8, p. 2575, 2018.
1206
+ [3] S. Dange and M. Chatterjee, “Iot botnet: the largest threat to the iot
1207
+ network,” in Data Communication and Networks.
1208
+ Springer, 2020, pp.
1209
+ 137–157.
1210
+ [4] S. R. Chhetri, J. Wan, and M. A. Al Faruque, “Cross-domain security
1211
+ of cyber-physical systems,” in 2017 22nd Asia and South Pacific design
1212
+ automation conference (ASP-DAC).
1213
+ IEEE, 2017, pp. 200–205.
1214
+ [5] A. Sargolzaei, A. Abbaspour, M. A. Al Faruque, A. Salah Eddin,
1215
+ and K. Yen, “Security challenges of networked control systems,” in
1216
+ Sustainable interdependent networks.
1217
+ Springer, 2018, pp. 77–95.
1218
+ [6] A. Barua, L. Pan, and M. A. A. Faruque, “Bayesimposter: Bayesian
1219
+ estimation based. bss imposter attack on industrial control systems,” in
1220
+ Annual Computer Security Applications Conference, 2022, pp. 440–454.
1221
+ [7] F-secure,
1222
+ “Attack
1223
+ landscape
1224
+ h1
1225
+ 2019,”
1226
+ 2019.
1227
+ [Online].
1228
+ Available: https://blog-assets.f-secure.com/wp-content/uploads/2019/09/
1229
+ 12093807/2019 attack landscape report.pdf
1230
+ [8] “CVE-2014-0160.” Available from MITRE, CVE-ID CVE-2014-0160.,
1231
+ Dec. 3 2013. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.
1232
+ cgi?name=CVE-2014-0160
1233
+ [9] I. Ghafoor, I. Jattala, S. Durrani, and C. M. Tahir, “Analysis of
1234
+ openssl heartbleed vulnerability for embedded systems,” in 17th IEEE
1235
+ International Multi Topic Conference 2014.
1236
+ IEEE, 2014, pp. 314–319.
1237
+ [10] “The
1238
+ heartbleed
1239
+ vulnerability.”
1240
+ 2014.
1241
+ [Online].
1242
+ Available:
1243
+ http:
1244
+ //heartbleed.com/
1245
+ [11] “Shellshock: All you need to know about the bash bug vulnerability,”
1246
+ 2014. [Online]. Available: https://www.symantec.com/
1247
+ [12] “Shellshock
1248
+ in-depth:
1249
+ Why
1250
+ this
1251
+ old
1252
+ vulnerability
1253
+ won’t
1254
+ go
1255
+ away,”
1256
+ Security
1257
+ Intelligence,
1258
+ 2020.
1259
+ [Online].
1260
+ Available:
1261
+ https:
1262
+ //securityintelligence.com/articles/shellshock-vulnerability-in-depth/
1263
+ [13] S.-H. Kim, M. A. Cohen, S. Netessine, and S. Veeraraghavan, “Contract-
1264
+ ing for infrequent restoration and recovery of mission-critical systems,”
1265
+ Management Science, vol. 56, no. 9, pp. 1551–1567, 2010.
1266
+ [14] N. S. Agency, “Ghidra - software reverse engineering framework.” 2019.
1267
+ [Online]. Available: https://www.nsa.gov/resources/everyone/ghidra/
1268
+ [15] S. Hex-Rays, “Ida disassembler,” 2017.
1269
+ [16] R. Team, Radare2 Book.
1270
+ GitHub, 2017.
1271
+ [17] A. Keliris and M. Maniatakos, “Icsref: A framework for automated re-
1272
+ verse engineering of industrial control systems binaries,” arXiv preprint
1273
+ arXiv:1812.03478, 2018.
1274
+ [18] J. He, P. Ivanov, P. Tsankov, V. Raychev, and M. Vechev, “Debin:
1275
+ Predicting debug information in stripped binaries,” in Proceedings of
1276
+ the 2018 ACM SIGSAC Conference on Computer and Communications
1277
+ Security, 2018, pp. 1667–1680.
1278
+ [19] J. Lacomis, P. Yin, E. Schwartz, M. Allamanis, C. Le Goues, G. Neubig,
1279
+ and B. Vasilescu, “Dire: A neural approach to decompiled identifier nam-
1280
+ ing,” in 2019 34th IEEE/ACM International Conference on Automated
1281
+ Software Engineering (ASE).
1282
+ IEEE, 2019, pp. 628–639.
1283
+ [20] Y. David, U. Alon, and E. Yahav, “Neural reverse engineering of stripped
1284
+ binaries using augmented control flow graphs,” Proceedings of the ACM
1285
+ on Programming Languages, vol. 4, no. OOPSLA, pp. 1–28, 2020.
1286
+
1287
+ [21] H. Gao, S. Cheng, Y. Xue, and W. Zhang, “A lightweight framework
1288
+ for function name reassignment based on large-scale stripped binaries,”
1289
+ in Proceedings of the 30th ACM SIGSOFT International Symposium on
1290
+ Software Testing and Analysis, 2021, pp. 607–619.
1291
+ [22] Q. Feng, R. Zhou, C. Xu, Y. Cheng, B. Testa, and H. Yin, “Scalable
1292
+ graph-based bug search for firmware images,” in Proceedings of the 2016
1293
+ ACM SIGSAC Conference on Computer and Communications Security,
1294
+ 2016, pp. 480–491.
1295
+ [23] X. Xu, C. Liu, Q. Feng, H. Yin, L. Song, and D. Song, “Neural network-
1296
+ based graph embedding for cross-platform binary code similarity detec-
1297
+ tion,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer
1298
+ and Communications Security, 2017, pp. 363–376.
1299
+ [24] I. U. Haq and J. Caballero, “A survey of binary code similarity,” arXiv
1300
+ preprint arXiv:1909.11424, 2019.
1301
+ [25] K. Yakdan, S. Dechand, E. Gerhards-Padilla, and M. Smith, “Helping
1302
+ johnny to analyze malware: A usability-optimized decompiler and
1303
+ malware analysis user study,” in 2016 IEEE Symposium on Security
1304
+ and Privacy (SP).
1305
+ IEEE, 2016, pp. 158–177.
1306
+ [26] L. ˇDurfina, J. Kˇroustek, and P. Zemek, “Psybot malware: A step-by-step
1307
+ decompilation case study,” in 2013 20th Working Conference on Reverse
1308
+ Engineering (WCRE).
1309
+ IEEE, 2013, pp. 449–456.
1310
+ [27] M. J. Van Emmerik, Static single assignment for decompilation.
1311
+ Uni-
1312
+ versity of Queensland, 2007.
1313
+ [28] D. Brumley, J. Lee, E. J. Schwartz, and M. Woo, “Native x86 decompila-
1314
+ tion using semantics-preserving structural analysis and iterative control-
1315
+ flow structuring,” in 22nd {USENIX} Security Symposium ({USENIX}
1316
+ Security 13), 2013, pp. 353–368.
1317
+ [29] “Binutils. (2019) objdump,” 2019. [Online]. Available: https://www.
1318
+ gnu.org/software/binutils/
1319
+ [30] “Binary ninja. (2022) interactive disassembler, decompiler, and binary
1320
+ analysis platform,” 2022. [Online]. Available: https://binary.ninja/
1321
+ [31] “Hopper. (2022) reverse engineering tool that lets you disassemble,
1322
+ decompile and debug your applications,” 2022. [Online]. Available:
1323
+ https://www.hopperapp.com/
1324
+ [32] “Hex-rays. (2019) the hex-rays decompiler.” 2019. [Online]. Available:
1325
+ https://www.hex-rays.com/products/decompiler/
1326
+ [33] M. Nyre-Yu, K. Butler, and C. Bolstad, “A task analysis of static
1327
+ binary reverse engineering for security,” Jan 2022. [Online]. Available:
1328
+ https://scholarspace.manoa.hawaii.edu/handle/10125/79608
1329
+ [34] W. Shao, Q. Yang, X. Guo, and R. Cai, “A survey of available
1330
+ information recovery of binary programs based on machine learning,”
1331
+ in 2022 5th International Conference on Artificial Intelligence and Big
1332
+ Data (ICAIBD).
1333
+ IEEE, 2022, pp. 125–132.
1334
+ [35] Z. L. Chua, S. Shen, P. Saxena, and Z. Liang, “Neural nets can learn
1335
+ function type signatures from binaries,” in Proceedings of the 26th
1336
+ USENIX Conference on Security Symposium, ser. SEC’17.
1337
+ USA:
1338
+ USENIX Association, 2017, p. 99–116.
1339
+ [36] U.
1340
+ Alon,
1341
+ M.
1342
+ Zilberstein,
1343
+ O.
1344
+ Levy,
1345
+ and
1346
+ E.
1347
+ Yahav,
1348
+ “Code2vec:
1349
+ Learning distributed representations of code,” Proc. ACM Program.
1350
+ Lang., vol. 3, no. POPL, jan 2019. [Online]. Available: https:
1351
+ //doi.org/10.1145/3290353
1352
+ [37] F. Artuso, G. A. Di Luna, L. Massarelli, and L. Querzoni, “In nomine
1353
+ function: Naming functions in stripped binaries with neural networks,”
1354
+ arXiv preprint arXiv:1912.07946, 2019.
1355
+ [38] K. Redmond, L. Luo, and Q. Zeng, “A cross-architecture instruction
1356
+ embedding model for natural language processing-inspired binary code
1357
+ analysis,” arXiv preprint arXiv:1812.09652, 2018.
1358
+ [39] D. Vasan, M. Alazab, S. Venkatraman, J. Akram, and Z. Qin, “Mthael:
1359
+ Cross-architecture iot malware detection based on neural network ad-
1360
+ vanced ensemble learning,” IEEE Transactions on Computers, vol. 69,
1361
+ no. 11, pp. 1654–1667, 2020.
1362
+ [40] M. Alhanahnah, Q. Lin, Q. Yan, N. Zhang, and Z. Chen, “Efficient
1363
+ signature generation for classifying cross-architecture iot malware,” in
1364
+ 2018 IEEE conference on communications and network security (CNS).
1365
+ IEEE, 2018, pp. 1–9.
1366
+ [41] P. Goyal and E. Ferrara, “Graph embedding techniques, applications,
1367
+ and performance: A survey,” CoRR, vol. abs/1705.02801, 2017.
1368
+ [Online]. Available: http://arxiv.org/abs/1705.02801
1369
+ [42] Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, and S. Y. Philip, “A
1370
+ comprehensive survey on graph neural networks,” IEEE transactions
1371
+ on neural networks and learning systems, 2020.
1372
+ [43] R. Yasaei, S.-Y. Yu, and M. A. Al Faruque, “Gnn4tj: Graph neural
1373
+ networks for hardware trojan detection at register transfer level,” in 2021
1374
+ Design, Automation & Test in Europe Conference & Exhibition (DATE).
1375
+ IEEE, 2021, pp. 1504–1509.
1376
+ [44] S.-Y. Yu, A. V. Malawade, D. Muthirayan, P. P. Khargonekar, and
1377
+ M. A. Al Faruque, “Scene-graph augmented data-driven risk assessment
1378
+ of autonomous vehicle decisions,” IEEE Transactions on Intelligent
1379
+ Transportation Systems, 2021.
1380
+ [45] M. Hassen and P. K. Chan, “Scalable function call graph-based malware
1381
+ classification,” in Proceedings of the Seventh ACM on Conference on
1382
+ Data and Application Security and Privacy, 2017, pp. 239–248.
1383
+ [46] S. Harada, H. Akita, M. Tsubaki, Y. Baba, I. Takigawa, Y. Yamanishi,
1384
+ and H. Kashima, “Dual graph convolutional neural network for predict-
1385
+ ing chemical networks,” BMC bioinformatics, vol. 21, pp. 1–13, 2020.
1386
+ [47] J. Staff, “Assembled labeled library for static analysis research (allstar)
1387
+ dataset,” Dec 2019. [Online]. Available: https://allstar.jhuapl.edu/
1388
+ [48] “Debian gnu linux installation guide,” 2004. [Online]. Available:
1389
+ https://www.debian.org/releases/bullseye/i386/ch02s01.en.html#idm186
1390
+ [49] J. Callas, “Triple des: How strong is the data encryption standard?” May
1391
+ 2017. [Online]. Available: https://www.techtarget.com/searchsecurity/
1392
+ tip/Expert-advice-Encryption-101-Triple-DES-explained
1393
+ [50] C.
1394
+ Bernstein
1395
+ and
1396
+ M.
1397
+ Cobb,
1398
+ “What
1399
+ is
1400
+ the
1401
+ advanced
1402
+ encryption
1403
+ standard
1404
+ (aes)?
1405
+ definition
1406
+ from
1407
+ searchsecurity,”
1408
+ Sep
1409
+ 2021. [Online]. Available: https://www.techtarget.com/searchsecurity/
1410
+ definition/Advanced-Encryption-Standard
1411
+ [51] T. Rothwell and J. Youngman, “The gnu c reference manual,” Free
1412
+ Software Foundation, Inc, p. 86, 2007.
1413
+
W9E0T4oBgHgl3EQf3QKM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
WdAyT4oBgHgl3EQfWPcy/content/tmp_files/2301.00158v1.pdf.txt ADDED
@@ -0,0 +1,2340 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00158v1 [eess.SY] 31 Dec 2022
2
+ 1
3
+ Robust Synergistic Hybrid Feedback
4
+ (Extended Version)
5
+ Pedro Casau, Ricardo G. Sanfelice, Fellow, IEEE, and Carlos Silvestre Senior Member, IEEE,
6
+ Abstract—Synergistic hybrid feedback refers to a collection
7
+ of feedback laws that allow for global asymptotic stabilization
8
+ of a compact set through the following switching logic: given
9
+ a collection of Lyapunov functions that are indexed by a logic
10
+ variable, whenever the currently selected Lyapunov function
11
+ exceeds the value of another function in the collection by a
12
+ given margin, then a switch to the corresponding feedback law
13
+ is triggered. This kind of feedback has been under development
14
+ over the past decade and it has led to multiple solutions
15
+ for global asymptotic stabilization on compact manifolds. The
16
+ contributions of this paper include a synergistic controller
17
+ design in which the logic variable is not necessarily constant
18
+ between jumps, a synergistic hybrid feedback that is able to
19
+ tackle the presence of parametric uncertainty, backstepping
20
+ of adaptive synergistic hybrid feedbacks, and a demonstration
21
+ of the proposed solutions to the problem of global obstacle
22
+ avoidance.
23
+ Index Terms—Hybrid Systems, Adaptive Control, Robotics,
24
+ Uncertain Systems
25
+ I. INTRODUCTION
26
+ A. Background and Motivation
27
+ In this paper, we consider the problem of globally asymp-
28
+ totically stabilizing continuous-time plants of the form
29
+ ˙xp = Fp(xp, up, θ)
30
+ (1)
31
+ where xp ∈ Xp denotes the state of the plant, up ∈ Up is the
32
+ input, and θ represents the parameters of the plant. To this
33
+ end, we propose the following hybrid controller
34
+ ˙χc ∈ ˆFc(xp, χc, xc, uc)
35
+ ˙xc ∈ Fc(xp, χc, xc)
36
+
37
+ (xp, χc, xc) ∈ C, uc ∈ Uc
38
+ χ+
39
+ c = χc
40
+ x+
41
+ c ∈ Gc(xp, χc, xc)
42
+
43
+ (xp, χc, xc) ∈ D
44
+ (2)
45
+ P. Casau is with the Department of Electrical and Computer Engineering
46
+ at Instituto Superior T´ecnico, Universidade de Lisboa, Lisboa, Portugal.
47
+ E-mail address: pcasau@isr.tecnico.ulisboa.pt. C. Silvestre is
48
+ with the Department of Electrical and Computer Engineering of the Faculty
49
+ of Science and Technology of the University of Macau, Macau, China, and
50
+ with Instituto Superior T´ecnico, Universidade de Lisboa, Lisboa, Portugal.
51
+ E-mail address: csilvestre@um.edu.mo. R. G. Sanfelice is with the
52
+ Department of Computer Engineering, University of California, Santa Cruz,
53
+ CA 95064. Email address: ricardo@ucsc.edu. This work was partially
54
+ supported by the Macao Science and Technology Development Fund under
55
+ Grant FDCT/0146/2019/A3, by the University of Macau, Macao, China,
56
+ under Project MYRG2020-00188-FST, by the Fundac¸˜ao para a Ciˆencia e
57
+ a Tecnologia (FCT) through LARSyS - FCT Project UIDB/50009/2020
58
+ and LAETA - FCT Project UIDB/50022/2020, and by FCT Scientific
59
+ Employment Stimulus grant CEECIND/04652/2017. Research by R. G.
60
+ Sanfelice has been partially supported by the National Science Foundation
61
+ under Grant no. ECS-1710621, Grant no. CNS-1544396, and Grant no. CNS-
62
+ 2039054, by the Army Research Office under Grant no. W911NF-20-1-0253,
63
+ and by the Air Force Office of Scientific Research under Grant no. FA9550-
64
+ 19-1-0053, Grant no. FA9550-19-1-0169, and Grant no. FA9550-20-1-0238.
65
+ where χc ∈ ˆ
66
+ Xc and xc ∈ Xc represent different components
67
+ of the state of the controller, ˆFc and Fc are the flow maps
68
+ associated with χc and xc, respectively, C denotes the flow
69
+ set, Gc defines the update law for jumps of xc and D is the
70
+ jump set. The key differences between χc and xc is the fact
71
+ that χc does not change its value during jumps and also that
72
+ the flows of χc depend on a virtual input variable uc ∈ Uc.
73
+ More precisely, the goal in this paper is to design a controller
74
+ that globally asymptotically stabilizes a compact set A for
75
+ the closed-loop system resulting from the interconnection
76
+ between (1) and (2) both when the parameter θ is known,
77
+ but also when it is only known to belong to a given compact
78
+ set Ω.
79
+ In the presence of topological obstructions, this objective
80
+ is not attainable via continuous feedback and, even though
81
+ it might be attainable through discontinuous feedback, the
82
+ resulting closed-loop system may not be robust to arbitrarily
83
+ small noise (cf. [1] and [2]). To illustrate these limitations
84
+ of continuous/discontinuous feedback, let us consider the
85
+ problem of globally asymptotically stabilizing the point (1, 0)
86
+ for the dynamical system
87
+ ˙x1 = −x2up,
88
+ ˙x2 = x1up,
89
+ where xp := (x1, x2) ∈ X :=S1 := {xp ∈ R2 : |xp| = 1} is
90
+ the state variable and up ∈ R denotes the input. In this direc-
91
+ tion, let h(xp) = (1 − x1)/2 for each xp ∈ S1. The gradient-
92
+ based feedback law is given by up =
93
+ �x2
94
+ −x1
95
+
96
+ ∇h(xp)
97
+ which represents the projection of the gradient of h onto the
98
+ tangent space to S1 at xp. It follows from standard Lyapunov
99
+ stability arguments that (1, 0) is asymptotically stable for
100
+ the closed-loop system, but it is not globally asymptotically
101
+ stable since x = (−1, 0) is also an equilibrium point.
102
+ It can be argued that the discontinuous feedback law
103
+ up = κp(xp) =
104
+
105
+
106
+
107
+
108
+
109
+
110
+
111
+ −1
112
+ if x1 = −1
113
+ 0
114
+ if x1 = 1
115
+ − x2
116
+ |x2|
117
+ otherwise
118
+ (3)
119
+ defined for each xp ∈ S1 globally asymptotically stabilizes
120
+ (1, 0) if one considers Carath´eodory solutions to the discon-
121
+ tinuous closed-loop system because, in this case, (−1, 0) is
122
+ not an equilibrium point. However, due to the discontinuity
123
+ of the feedback law (3), arbitrarily small noise can induce
124
+ chattering which is a property that is ellucidated by consider-
125
+ ing generalized solutions to discontinuous dynamical systems
126
+ such as Krasovskii solutions (cf. [3]). These limitations of
127
+ continuous and discontinuous feedbacks constitute the moti-
128
+ vation for the development of synergistic hybrid feedback.
129
+
130
+ Submitted for publication
131
+ If ˆFc in (2) defining the dynamics of χc is given, then χc
132
+ can become part of the state of (1) and the stated objective
133
+ can be attained through the design of a hybrid controller
134
+ Hc := (C, Fc, D, Gc) with state xc ∈ Xc and dynamics
135
+ ˙xc ∈ Fc(x, xc)
136
+ (x, xc) ∈ C
137
+ x+
138
+ c ∈ Gc(x, xc)
139
+ (x, xc) ∈ D
140
+ assigning u := (up, uc) ∈ U := Up × Uc via a feedback law
141
+ (x, xc) �→ κ(x, xc), where x := (xp, χc) ∈ X := Xp × ˆ
142
+ Xc
143
+ is the state of the system to control with dynamics described
144
+ by the following differential inclusion
145
+ ˙x ∈ Fθ(x, xc, u) := Fp(xp, up, θ) × ˆFc(xp, χc, xc, uc), (5)
146
+ where θ is a constant.
147
+ This formulation enables the controller design for systems
148
+ whose dynamics depend on the controller state. For example,
149
+ given a plant with dynamics ˙xp = fp(xp) + Hp(xp)up +
150
+ Wp(xp)θ where fp, Hp, Wp are functions with the appro-
151
+ priate dimensions, suppose that the reference trajectory to
152
+ be tracked is denoted by xd and that it is generated by the
153
+ system ˙xd = fp(xd) + Hp(xd)ξd for some signal ξd. The
154
+ tracking error x := xp − xd can be taken as the state of
155
+ the system (5), in which case we have that Fθ(x, xc, u) =
156
+ fp(xd+x)−fp(xd)−Hp(xd)ξd+Hp(xd+x)u+Wp(xd+x)θ
157
+ by identifying up with u and by considering (xd, ξd) as
158
+ components of the controller variable xc. More practically, x
159
+ can be considered to be the part of the state of the closed-loop
160
+ system that remains unchanged during jumps.
161
+ In this paper, we present two novel synergistic hybrid
162
+ controllers for global asymptotic stabilization of a compact
163
+ set for a closed-loop system with the plant dynamics in (5).
164
+ The first controller design considers that the parameter θ is
165
+ known, while the second controller design considers that θ
166
+ is unknown but belongs to a known compact set Ω.
167
+ B. Literature Review
168
+ Synergistic hybrid feedback is a hybrid control strategy
169
+ that consists of a collection of potential functions that asymp-
170
+ totically stabilize a given compact set by gradient descent
171
+ feedback. If, for all equilibria that do not lie within the given
172
+ compact set, there exists another function in the collection
173
+ that has a lower value and does not share the same equilibria,
174
+ then it is possible to achieve global asymptotic stabilization
175
+ of the given compact set through hysteretic switching (see,
176
+ e.g., [4]).
177
+ Synergistic hybrid feedback came to prominence with the
178
+ work [3] on quaternion-based feedback for global asymptotic
179
+ stabilization attitude tracking, thereby solving the attitude
180
+ control problem (cf. [5]). The framework of synergistic
181
+ hybrid feedback provides not only a solution to the problem
182
+ of attitude control but, more importantly, it provides a ro-
183
+ bust solution for global asymptotic stabilization on compact
184
+ manifolds. The works [6] and [7] leverage the concepts at
185
+ the root of synergistic hybrid feedback and use them to
186
+ design controllers that are applicable to a broad class of
187
+ systems. However, most of the contributions on this class
188
+ of hybrid controllers are on the control of robotic systems,
189
+ such as pendulum stabilization [8], vector-based rigid body
190
+ stabilization [9], [10], tracking for marine and aerial vehi-
191
+ cle [11], [12], and rigid body tracking through rotation matrix
192
+ feedback [13], [14]. Within the field of robotics, we single out
193
+ the problem of obstacle avoidance, which is also addressed
194
+ in this paper.
195
+ Obstacle avoidance is an important and longstanding prob-
196
+ lem that reflects the need to drive a the state of a system from
197
+ one place to another while avoiding obstacles in its way.
198
+ Several solutions to this problem have been proposed over
199
+ the last few decades as highlighted in [15]. In particular, it is
200
+ possible to find both stochastic [16] as well as deterministic
201
+ approaches [17] to tackle the obstacle avoidance problem.
202
+ However, it was shown in [18] that in a “sphere world,” there
203
+ is at least one saddle equilibrium point for each obstacle
204
+ within the state space, thus precluding global asymptotic
205
+ stabilization of a setpoint by continuous feedback. To address
206
+ this limitation, hybrid control solutions to the problem of
207
+ obstacle avoidance were proposed in [19], [20], [7] and [21].
208
+ Though not directly addressed in this paper, the concepts of
209
+ synergistic hybrid feedback have also been used for observer
210
+ design, optimization and control barrier function design in
211
+ in [22], [23], and [21], respectively.
212
+ C. Contributions
213
+ The contributions in this paper are as follows: 1) We
214
+ develop a dynamic synergistic hybrid feedback controller for
215
+ global asymptotic stabilization of a broad class of dynamical
216
+ systems. In particular, we consider that the distinguishing
217
+ feature of synergistic hybrid feedback is the switching logic,
218
+ thus we depart from earlier works which were limited to
219
+ controller variables that were constant during flows; 2) We
220
+ provide a modification to the dynamic synergistic controller
221
+ that takes into account the presence of parametric uncertainty;
222
+ 3) We demonstrate how the proposed constructions can be
223
+ used to develop an adaptive synergistic controller for the
224
+ stabilization of compact sets for affine control systems under
225
+ matched uncertainties; 4) We show that the proposed adaptive
226
+ controller is amenable to hybrid backstepping; 5) We apply
227
+ the proposed controller designs to the problem of global
228
+ obstacle avoidance in the presence of parametric uncertainty
229
+ and illustrate the behavior of the closed-loop system through
230
+ simulations.
231
+ The paper is organized as follows: in Section III we
232
+ present the main assumptions on the plant dynamics. In
233
+ Section IV-B we provide the conditions under which the
234
+ closed-loop system is well-posed. In Section IV-C we provide
235
+ sufficient conditions for global asymptotic stability of a
236
+ compact set for the closed-loop system. In Section V, we
237
+ develop the concept of robust synergistic hybrid feedback. In
238
+ Section VI, we apply the synergistic approach to the devel-
239
+ opment of an adaptive synergistic controller for stabilization
240
+ of affine control systems subject to matched uncertainties. In
241
+ Section VII, we apply the proposed controller to the problem
242
+ of global obstacle avoidance. In Section VIII, we present
243
+ some concluding remarks.
244
+ 2
245
+
246
+ Submitted for publication
247
+ A preliminary version of this paper was presented at the
248
+ 2019 ACC with a simpler synergistic controller design for
249
+ global asymptotic stabilization of control affine systems and
250
+ without the full proofs (cf. [24]). The original version of this
251
+ paper has been submitted for publication.
252
+ II. NOTATION & PRELIMINARIES
253
+ A. Topology, Metric Spaces, Functions, and Set-Valued Maps
254
+ Given a topological space X, a neighborhood of a set S is
255
+ any open set that contains S. A topological space X is said to
256
+ be Hausdorff if, given any pair of distinct points q1, q2 ∈ X,
257
+ there exist neighborhoods U1 of q1 and U2 of q2 that do not
258
+ intersect. Any metric space is Hausdorff, hence the Euclidean
259
+ spaces are Hausdorff. Lemma 4.29 in [29] points out that
260
+ any closed subspace of an locally compact Hausdorff space
261
+ is itself locally compact Hausdorff. A set is said to be locally
262
+ compact if for each point there is a neighborhood which is
263
+ precompact, i.e., whose closure is a compact set.
264
+ A topology on a set X is a collection T of subsets of X,
265
+ called open sets, satisfying the following properties: X and ∅
266
+ are elements of T ; T is closed under finite intersections; and
267
+ T is closed under arbitrary unions. The subspace topology
268
+ of a subset A of X is the collection of subsets of A that are
269
+ obtained from the intersection of A with an open set of X.
270
+ A subset A of a topological space X that is endowed with
271
+ the subspace topology is said to be a subspace of X.
272
+ A metric space is a set M together with a metric d. A set
273
+ S ⊂ M is open in the metric space sense if for each x ∈ S
274
+ there exists ǫ > 0 such that the set points y ∈ M satisfying
275
+ d(x, y) < ǫ are contained in S. The metric topology on M is
276
+ the collection of all subsets of M that are open in the metric
277
+ space sense (cf. [29, Exercise 2.1]).
278
+ The Cartesian Product Rn = R × . . . R of n copies of the
279
+ real line together with scalar multiplication and component-
280
+ wise addition of vectors is known as n-dimensional Euclidean
281
+ space. The Euclidean metric topology is the one induced by
282
+ the metric x �→ |x| :=
283
+
284
+ x⊤x. The n-dimensional Euclidean
285
+ space has the topology generated by a countable basis of open
286
+ balls of the form c + ǫB := {x ∈ Rn : |x − c| < ǫ}, where
287
+ c ∈ Rn and ǫ > 0. More generally, given a set Ω ⊂ Rn,
288
+ we define Ω + ǫB := �
289
+ c∈Ω c + ǫB. The operators ∂S and S
290
+ denote the boundary and the closure of a set S, respectively.
291
+ Given a function f : Rm → Rn, the preimage of a set
292
+ U ⊂ Rn through f is f −1(U) := {x ∈ Rm : f(x) ∈ U}.
293
+ Similarly, the image of a set W through f is f(W) := {y ∈
294
+ Rn : y = f(x) for some x ∈ W}.
295
+ A set-valued map M from S ⊂ Rm to the power set of
296
+ some Euclidean space Rn is represented by M : S ⇒ Rn.
297
+ The domain of a set-valued map is given by dom M := {x ∈
298
+ Rn : M(x) ̸= ∅}. Given a subset S of Rm, a set-valued map
299
+ M : S ⇒ Rn is said to be outer semicontinuous (osc) relative
300
+ to S if its graph, given by gph M := {(x, y) ∈ S × Rn : y ∈
301
+ M(x)}, is closed relative to S × Rn. The set-valued map M
302
+ is locally bounded at x ∈ Rm if there exists a neighborhood
303
+ Ux of x such that M(Ux) ⊂ Rn is bounded. It is locally
304
+ bounded relative to S if the set-valued mapping from Rm to
305
+ Rn defined by M(x) for x ∈ S and ∅ for x ̸∈ S is locally
306
+ bounded at each x ∈ S. It is convex-valued if M(x) is convex
307
+ for each x ∈ S.
308
+ A set-valued map M : S ⇒ Rn is upper semicontinuous
309
+ (usc) at x if, for each open set V ⊂ Rn that contains M(x),
310
+ there exists a neighborhood U of x such that x′ ∈ U ∩ S
311
+ implies M(x′) ⊂ V . The map M is lower semicontinuous
312
+ (lsc) at x if, for each open set V ⊂ Rn satisfying M(x)∩V ̸=
313
+ ∅, there exists a neighborhood U of x such that x′ ∈ U ∩ S
314
+ implies M(x′) ∩ V ̸= ∅. The map M is continuous at x if it
315
+ is both lsc and usc at x. The map M is usc, lsc, continuous
316
+ on S if it is usc, lsc, continuous, respectively, at each x ∈ S.
317
+ B. Differentiability
318
+ The tangent cone to a set S ⊂ Rn at a point x ∈ Rn,
319
+ denoted by TxS, is the set of all vectors w ∈ Rn for which
320
+ there exists xi ∈ S, τi > 0 with xi → x, τi convergent to 0
321
+ from above, and w = limi→∞
322
+ xi−x
323
+ τi .
324
+ Given a differentiable function F : Rm×n → Rp×q, we
325
+ define DF(X) :=
326
+ ∂ vec(F )
327
+ ∂ vec(X)⊤ (X) for each X ∈ Rm×n, where
328
+ vec(A) := [e⊤
329
+ 1 A⊤ . . . e⊤
330
+ mA⊤]⊤ for each A ∈ Rm×n and
331
+ ei ∈ Rm is a vector of zeros, except for the i-th component,
332
+ which is 1. If F has multiple arguments, say (X, Y ) ∈
333
+ Rm×n × Rk×ℓ, we define DXF(X, Y ) :=
334
+ ∂ vec(F )
335
+ ∂ vec(X)⊤ (X, Y )
336
+ for each (X, Y ) ∈ Rm×n × Rk×ℓ. If F : Rn → R, then
337
+ ∇F(x) := DF(x)⊤ for each x ∈ Rn. If F : Rn ×Rm → R,
338
+ then ∇xF(x, y) := DxF(x, y)⊤ for each (x, y) ∈ Rn × Rm
339
+ and ∇yF(x, y) := DyF(x, y)⊤ for each (x, y) ∈ Rn × Rm.
340
+ Clarke’s generalized directional derivative of a function
341
+ V : Rn → R in the direction v, is defined as follows (c.f. [26,
342
+ Eq. (1)]): V ◦(x; v) := lim supy→x
343
+ λց0
344
+ V(y+λv)−V(y)
345
+ λ
346
+ .
347
+ C. Stability of Hybrid Systems
348
+ A hybrid system H with state space Rn is defined in [27]
349
+ and [28] as
350
+ ˙ξ ∈ F(ξ)
351
+ ξ ∈ C
352
+ ξ+ ∈ G(ξ)
353
+ ξ ∈ D
354
+ (6)
355
+ where ξ ∈ Rn is the state, C ⊂ Rn is the flow set,
356
+ F : Rn ⇒ Rn is the flow map, D ⊂ Rn denotes the
357
+ jump set, and G : Rn ⇒ Rn denotes the jump map. A
358
+ solution ξ to H is parametrized by (t, j), where t denotes
359
+ ordinary time and j denotes the jump time, and its domain
360
+ dom ξ ⊂ R≥0×N is a hybrid time domain: for each (T, J) ∈
361
+ dom ξ, dom ξ ∩ ([0, T ] × {0, 1, . . .J}) can be written in the
362
+ form ∪J−1
363
+ j=0 ([tj, tj+1], j) for some finite sequence of times
364
+ 0 = t0 ≤ t1 ≤ t2 ≤ · · · ≤ tJ, where Ij := [tj, tj+1] and the
365
+ tj’s define the jump times. A solution ξ to a hybrid system
366
+ is said to be maximal if it cannot be extended by flowing nor
367
+ jumping and complete if its domain is unbounded.
368
+ A set S is said to be forward pre-invariant for a hybrid
369
+ system (6) if each maximal solution of (6) starting in S
370
+ remains in S. It is said to be forward invariant if it is forward
371
+ pre-invariant and each maximal solution from S is complete
372
+ (see e.g. [28, Chapters 3 and 7]).
373
+ The hybrid basic conditions provide a set of sufficient
374
+ conditions for well-posedness and they are as follows (cf. [27,
375
+ Assumption 6.5]):
376
+ 3
377
+
378
+ Submitted for publication
379
+ (A1) C and D are closed subsets of Rn;
380
+ (A2) F : Rn ⇒ Rn is osc and locally bounded relative to C,
381
+ C ⊂ dom F, and F(x) is convex for every x ∈ C;
382
+ (A3) G : Rn ⇒ Rn is osc and locally bounded relative to D,
383
+ and D ⊂ dom G.
384
+ Given a function V : Rn → R≥0 that is Lipschitz continu-
385
+ ous on a neighborhood of C in (6) and uc : Rn → R≥0, we
386
+ say that the growth of V along flows of (6) is bounded by uc
387
+ if the following holds:
388
+ V ◦(ξ; f) ≤ uc(ξ)
389
+ ∀ξ ∈ C, ∀f ∈ F(ξ) ∩ TξC.
390
+ (7)
391
+ If, for some function uc : Rn → R≥0,
392
+ V(ξ) − V(ξ) ≤ ud(ξ)
393
+ ∀ξ ∈ D, ∀ξ ∈ G(ξ),
394
+ (8)
395
+ then we say that the growth of V along jumps of (6) is
396
+ bounded by ud. If both (7) and (8) hold, then we say that
397
+ the growth of V along solutions to (6) is bounded by uc, ud.
398
+ A compact set A is said to be stable for (6) if for
399
+ every ǫ > 0 there exists δ > 0 such that every solution
400
+ φ to (6) with |φ(0, 0)|A ≤ δ satisfies |φ(t, j)|A ≤ ǫ for
401
+ all (t, j) ∈ dom φ;
402
+ globally pre-attractive for (6) if every
403
+ solution φ to (6) is bounded and, if it is complete, then
404
+ also limt+j→+∞ |φ(t, j)|A = 0; globally pre-asymptotically
405
+ stable for (6) if it is both stable and globally pre-attractive.
406
+ If every maximal solution to (6) is complete then one may
407
+ drop the prefix “pre.”
408
+ III. PROBLEM SETUP
409
+ Given sets X, Xc, and U, we consider a dynamical system
410
+ with state x ∈ X that is governed by the dynamics (5) where
411
+ xc ∈ Xc is a controller variable, u ∈ U is the input, θ is a
412
+ constant parameter that belongs to a compact set Ω and Fθ
413
+ is a set-valued map with the following properties.
414
+ Assumption 1. Given sets X, Xc, U, and Fθ as in (5) the
415
+ following properties hold:
416
+ (S1) Each set X, Xc and U is a closed nonempty subset of
417
+ some Euclidean space;
418
+ (S2) The set-valued map Fθ is outer semicontinuous, locally
419
+ bounded, and convex-valued.
420
+ Assumption (S1) allows for the use of the analysis tools
421
+ for hybrid dynamical systems that are provided in [27] which
422
+ consider sets as subspaces of Euclidean spaces with the Eu-
423
+ clidean metric topology. Assumptions (VC) and (S2) are used
424
+ to prove that the resulting closed-loop system has nontrivial
425
+ solutions and that it satisfies the hybrid basic conditions,
426
+ respectively.
427
+ Remark 1. Since the sets X, Xc and U are closed relative
428
+ to their Euclidean ambient spaces, then any of their closed
429
+ subsets are also closed in the ambient space and locally
430
+ compact Hausdorff (cf. [29, Lemma 4.29]).
431
+ In Section IV, we develop a dynamic synergistic controller
432
+ with the objective of globally asymptotically stabilizing a
433
+ compact set for the resulting closed-loop system under the
434
+ assumption that θ is known. In Section V, we modify the
435
+ dynamic synergistic controller to allow for θ ∈ Ω to be
436
+ unknown, when Ω is known.
437
+ IV. DYNAMIC SYNERGISTIC HYBRID FEEDBACK
438
+ A. Controller Design
439
+ Dynamic synergistic hybrid feedback (relative to the plant
440
+ in Section III) is a hybrid control strategy that renders a
441
+ compact set A ⊂ X × Xc globally asymptotically stable for
442
+ the closed-loop system. It is comprised of a feedback law
443
+ κ : dom κ → U
444
+ (9)
445
+ and of the hybrid dynamics that are described in the sequel.
446
+ Given a function
447
+ V : dom V → R≥0 ∪ {+∞},
448
+ (10)
449
+ satisfying X×Xc ⊂ dom V with dom V open in the Euclidean
450
+ space containing X × Xc,1 and a set-valued map
451
+ Dc : X × Xc ⇒ Xc
452
+ (11)
453
+ we define
454
+ νV(x, xc) := min{V(x, g) : g ∈ Dc(x, xc)},
455
+ (12a)
456
+ ̺V(x, xc) := arg min{V(x, g) : g ∈ Dc(x, xc)},
457
+ (12b)
458
+ µV(x, xc) := V(x, xc) − νV(x, xc)
459
+ (12c)
460
+ for each (x, xc) ∈ X × Xc, under the following assumption:
461
+ (C1) The optimization problem in (12) is feasible for each
462
+ (x, xc) ∈ X × Xc, i.e., for each (x, xc) ∈ X × Xc, there
463
+ exists g ∈ Dc(x, xc) such that V(x, g) < +∞.
464
+ Given a set-valued map Fc defined on X×Xc that satisfies
465
+ the following assumption:
466
+ (C2) Fc
467
+ is outer semicontinuous, locally bounded, and
468
+ convex-valued.
469
+ we define the hybrid controller dynamics as follows:
470
+ ˙xc ∈ Fc(x, xc)
471
+ (x, xc) ∈ C
472
+ (13a)
473
+ x+
474
+ c ∈ ̺V(x, xc)
475
+ (x, xc) ∈ D
476
+ (13b)
477
+ where
478
+ C := {(x, xc) ∈ X × Xc : µV(x, xc) ≤ δ(x, xc)},
479
+ D := {(x, xc) ∈ X × Xc : µV(x, xc) ≥ δ(x, xc)},
480
+ (14)
481
+ and δ : X × Xc → R is a continuous function. The switching
482
+ logic in (13) implements the following functionality: if the
483
+ solutions to the closed-loop system reach a state (x, xc)
484
+ where µV(x, xc) is greater than or equal to the predefined
485
+ value of δ(x, xc), then the variable xc is reset to some point
486
+ g ∈ ̺V(x, xc) and the feedback law changes its value from
487
+ κ(x, xc) to κ(x, g). Since the hybrid controller (13) is derived
488
+ from κ, V, Dc, and Fc, we represent (13) using the 4-tuple
489
+ (κ, V, Dc, Fc).
490
+ The
491
+ hybrid
492
+ closed-loop
493
+ system
494
+ H
495
+ :=
496
+ (C, Fcl, D, Gcl)
497
+ resulting
498
+ from
499
+ the
500
+ interconnection
501
+ 1The function V maps values in X ×Xc to the one-point compactification
502
+ of R≥0. More generally, given a topological space X that is noncompact
503
+ locally compact Hausdorff space and an object ∞ not in X, the one point
504
+ compactification of X is a topological space X∗ with the topology: T =
505
+ {open subsets of X} ∪ {U ⊂ X∗ : X∗\U is a compact subset of X}.
506
+ 4
507
+
508
+ Submitted for publication
509
+ between
510
+ (5)
511
+ and
512
+ (κ, V, Dc, Fc)
513
+ is
514
+ given
515
+ by
516
+ � ˙x
517
+ ˙xc
518
+
519
+ ∈ Fcl(x, xc) :=
520
+ �Fθ(x, xc, κ(x, xc))
521
+ Fc(x, xc)
522
+
523
+ (x, xc) ∈ C
524
+ (15a)
525
+ �x+
526
+ x+
527
+ c
528
+
529
+ ∈ Gcl(x, xc) :=
530
+
531
+ x
532
+ ̺V(x, xc)
533
+
534
+ (x, xc) ∈ D.
535
+ (15b)
536
+ Remark 2. Notice that if δ(x, xc) ≥ 0 for all (x, xc) ∈
537
+ X × Xc then it follows from the construction of the hybrid
538
+ controller (κ, V, Dc, Fc) that V (x, g)−V (x, xc) ≤ 0 for each
539
+ (x, xc) ∈ D and each g ∈ ̺V(x, xc). In other words, if the
540
+ function δ is nonnegative for all (x, xc) ∈ X × Xc, then the
541
+ function V does not increase during jumps.
542
+ The controller design presented in this section is informed
543
+ by many preceding synergistic hybrid feedback controllers.
544
+ As mentioned in Section I-C, we preserve the switching logic
545
+ of the synergistic controllers in [28, Chapter 7], in the sense
546
+ that controller switching is triggered when the difference
547
+ between the current value of V and its lowest possible value
548
+ exceeds a predefined threshold δ > 0. The main difference
549
+ between the controller design presented in this paper and
550
+ synergistic controllers in the literature is that, here, xc does
551
+ not necessarily belong to a finite set. Instead, the flows of xc
552
+ are described more generally by a differential inclusion and
553
+ we constrain its jumps using a set-valued map Dc.
554
+ In the sequel, we introduce the assumptions on the con-
555
+ troller that allow for the global asymptotic stabilization of a
556
+ compact subset of the state space.
557
+ B. Basic Properties of the Closed-Loop System
558
+ In this section, we provide some conditions on (9), (10)
559
+ and (11) which ensure that the closed-loop system (15)
560
+ satisfies the hybrid basic conditions of [27, Assumption 6.5]
561
+ and that maximal solutions to (15) are complete. To this end,
562
+ we introduce the following definitions.
563
+ Definition 1. Given a compact subset A of X × Xc, κ, V,
564
+ Dc and Fc we say that the hybrid controller (κ, V, Dc, Fc) is
565
+ a synergistic candidate relative to A for (5) if (C1) and (C2)
566
+ hold and:
567
+ (C3) V is continuous, positive definite relative to A,2 and
568
+ V −1([0, c]) is compact for each c ∈ R≥0;
569
+ (C4) The set-valued map Dc is outer semicontinuous, lower
570
+ semicontinuous, and locally bounded;
571
+ (C5) The function κ is continuous and
572
+ {(x, xc) ∈ X × Xc : V(x, xc) < +∞} ⊂ dom κ.
573
+ Given a synergistic candidate relative to A, the prop-
574
+ erty (C3) guarantees that sublevel sets of V are compact
575
+ and the properties (C3) and (C4) guarantee that the synergy
576
+ gap function µV in (12c) is continuous and that ̺V is outer
577
+ semicontinuous, as proved in the next result.
578
+ 2A function V : X × Xc → R≥0 is positive definite relative to A ⊂
579
+ X × Xc if V(x, xc) = 0 ⇐⇒ (x, xc) ∈ A.
580
+ Lemma
581
+ 1. Given a compact subset A
582
+ of X × Xc,
583
+ if (κ, V, Dc, Fc) is a synergistic candidate relative to A
584
+ for (5), then the following hold:
585
+ 1) The function νV in (12a) is continuous;
586
+ 2) The set-valued map ̺V in (12b) is outer semicontinuous
587
+ and ̺V(x, xc) is compact for each (x, xc) ∈ X × Xc;
588
+ 3) The function µV in (12c) is continuous.
589
+ Proof. It follows from (C4) that Dc is outer semicontinuous,
590
+ hence Dc(x, xc) is closed for each (x, xc) ∈ X × Xc. Since
591
+ Dc is also assumed to be locally bounded in (C4), we have
592
+ that Dc(x, xc) is compact for each (x, xc) ∈ X × Xc. In
593
+ addition, the outer semicontinuity and local boundedness
594
+ of Dc imply that Dc is upper semicontinuous (cf. [27,
595
+ Lemma 5.15]). Since Dc is assumed to be lower semicontinu-
596
+ ous in (C4), we have that Dc is continuous. Since V is contin-
597
+ uous by assumption (C3), it follows from [30, Theorem 9.14]
598
+ that νV is continuous and that ̺V is compact-valued and
599
+ upper semicontinuous. Since X is locally compact Hausdorff
600
+ (cf. Remark 1), it follows from [29, Proposition 4.27] that
601
+ each point (x, xc) ∈ X × Xc has a precompact neighborhood
602
+ Ux. Since ̺V is compact-valued and upper semicontinuous, it
603
+ follows from [30, Proposition 9.7] that ̺V(Ux) is compact.
604
+ It follows from the fact that ̺V(Ux) is a subset of a the
605
+ compact set ̺V(Ux) that ̺V is locally bounded. Since ̺V
606
+ is compact-valued it is, in particular, closed-valued, hence
607
+ it follows from [27, Lemma 5.15] that ̺V is outer semi-
608
+ continuous. It follows from (C1) that νV(x, xc) < +∞ for
609
+ each (x, xc) ∈ X × Xc, hence the function µV is continuous
610
+ because it is the composition of continuous functions.
611
+ The hybrid basic conditions in [27, Assumption 6.5] are
612
+ very important to the synthesis of hybrid controllers, because
613
+ they guarantee that the resulting hybrid closed-loop systems
614
+ are endowed with nominal robustness to a wide range of
615
+ perturbations/sensor noise and, in particular, they enable
616
+ the application of invariance principles for hybrid systems
617
+ (cf. [27, Chapter 8]). In the following result, we show that
618
+ these conditions follow directly from the regularity of (12c)
619
+ and (12) that was proved in Lemma 1.
620
+ Corollary 1. Suppose that Assumption 1 holds. Given a
621
+ compact subset A of X×Xc, if (κ, V, Dc, Fc) is a synergistic
622
+ candidate relative to A for (5), then the hybrid closed-loop
623
+ system (15) satisfies (A1), (A2), and (A3).
624
+ Proof. Let h(x, xc)
625
+ :=
626
+ µV(x, xc) − δ(x, xc) for each
627
+ (x, xc) ∈ X × Xc. Since δ is assumed to be continuous and
628
+ µV is continuous under the given assumptions (cf. Lemma 1),
629
+ it follows that h is a continuous function. Continuity of h
630
+ implies that the flow and jump sets are closed, because they
631
+ can be written as the preimage of closed sets through h,
632
+ as follows: C = h−1((−∞, 0]) and D = h−1([0, +∞]),
633
+ respectively (cf. [29, Lemma 2.7]).
634
+ It follows from the construction of the hybrid con-
635
+ troller (κ, V, Dc, Fc) that Fcl(x, xc) is defined for each
636
+ (x, xc) ∈ C. From the continuity of κ in (C5) and the
637
+ assumption that Fθ is outer semicontinuous, locally bounded
638
+ and convex-valued (cf. (S2)), it follows that Fcl in (15)
639
+ 5
640
+
641
+ Submitted for publication
642
+ is outer semicontinuous and locally bounded relative to C
643
+ and Fcl(x, xc) is convex for each (x, xc) ∈ C. The outer
644
+ semicontinuity and local boundedness of Gcl in (15) relative
645
+ to D follows from Lemma 1.
646
+ C. Global Asymptotic Stability of A
647
+ In this section, we present further assumptions on the
648
+ hybrid controller (κ, V, Dc, Fc) that allow for the global
649
+ asymptotic stabilization of a compact set A for (15).
650
+ Definition 2. Given a compact subset A of X × Xc, we say
651
+ that a synergistic candidate relative to A for (5) with data
652
+ (κ, V, Dc, Fc), is synergistic relative to A for (5) if:
653
+ (C6) The function V is Lipschitz continuous on a neighbor-
654
+ hood of C and the growth of V along flows of (15) is
655
+ bounded by uc with
656
+ uc(x, xc) ≤ 0
657
+ ∀(x, xc) ∈ X × Xc;
658
+ (C7) The largest weakly invariant subset of
659
+ ˙x ∈ Fθ(x, xc, κ(x, xc))
660
+ ˙xc ∈ Fc(x, xc)
661
+ (16)
662
+ in u−1
663
+ c (0), denoted by Ψ, is such that
664
+ δ1 := inf{µV(x, xc) : (x, xc) ∈ Ψ\A} > 0.
665
+ (17)
666
+ If one considers V as a Lyapunov function candidate, then
667
+ Assumption (C6) implies that V is nonincreasing along flows
668
+ to the closed-loop system (15), implying that there exists a
669
+ choice of δ which renders A stable for (15).
670
+ Lemma 2. Suppose that Assumption 1 holds. Given a com-
671
+ pact subset A of X×Xc, if (κ, V, Dc, Fc) is a synergistic can-
672
+ didate relative to A for (5) satisfying (C6) and δ(x, xc) ≥ 0
673
+ for each (x, xc) ∈ X × Xc, then each sublevel set of V is
674
+ forward pre-invariant for (15). If, for each (x, xc) ∈ C\D,
675
+ (VC) there exists a neighborhood U of (x, xc) such that
676
+ Fcl(ξ) ∩ TξC ̸= ∅, for every ξ ∈ U ∩ C
677
+ then each maximal solution to (15) is complete and, conse-
678
+ quently, each sublevel set of V is forward invariant.
679
+ Proof. It follows from the discussion in Remark 2 that the
680
+ growth of V along jumps of (15) is bounded by ud with
681
+ ud(x, xc) ≤
682
+
683
+ −δ(x, xc)
684
+ if (x, xc) ∈ D
685
+ −∞
686
+ otherwise
687
+ (18)
688
+ for each (x, xc) ∈ X × Xc. Together with assumption (C6)
689
+ it follows that the growth of V along solutions to (15) is
690
+ bounded by uc, ud satisfying
691
+ uc(x, xc) ≤ 0,
692
+ ud(x, xc) ≤ 0
693
+ (19)
694
+ for each (x, xc) ∈ X × Xc. It follows that each solution φ
695
+ to (15) with initial condition ξ satisfies V(φ(t, j)) ≤ V(ξ) for
696
+ all (t, j) ∈ dom φ, hence each sublevel set of V is forward
697
+ pre-invariant for (15).
698
+ It follows from Corollary 1 that (15) satisfies the hybrid
699
+ basic conditions, hence we can use [27, Proposition 6.10]
700
+ to prove the completeness of each maximal solution to (15).
701
+ Since C ∪ D = X × Xc, then there are no solutions to (15)
702
+ starting outside the union between the jump and flow sets.
703
+ It follows from (VC) that (VC) in [27, Proposition 6.10]
704
+ is satisfied, hence each maximal solution to (15) either
705
+ “blows up,” leaves C ∪ D in finite time or is complete (cf.
706
+ conditions (a),(b) and (c) of [27, Proposition 6.10]). Since
707
+ Gcl(D) ⊂ C ∪ D, no solution can leave C ∪ D after a
708
+ jump (hence, condition (c) in [27, Proposition 6.10] does
709
+ not occur). Since each sublevel set of V is compact and
710
+ forward pre-invariant, then solutions to (15) do not “blow
711
+ up” (condition (b) in [27, Proposition 6.10] does not occur).
712
+ It follows that each maximal solution to (15) is complete.
713
+ Lemma 3. Suppose that Assumption 1 holds. Given a com-
714
+ pact subset A of X × Xc, if (κ, V, Dc, Fc) is a synergistic
715
+ candidate relative to A for (5) that satisfies (C6) and
716
+ δ(x, xc) ≥ 0 for each (x, xc) ∈ X × Xc, then the set A
717
+ is stable for (15).
718
+ Proof. Since X × Xc ⊂ dom V, it follows that µV(x, xc)
719
+ is defined for all (x, xc) ∈ X × Xc; hence, for any given
720
+ continuous function δ : X × Xc → R, at least one of
721
+ the following conditions holds: 1) µV(x, xc) ≥ δ(x, xc);
722
+ 2) µV(x, xc) ≤ δ(x, xc). It follows from (14) that C ∪ D =
723
+ X × Xc ⊂ dom V. Since dom V is also assumed to be open
724
+ in the Euclidean space containing X × Xc, it follows that
725
+ dom V contains a neighborhood of A ∩ (C ∪ D ∪ G(D)).
726
+ Positive definiteness of V with respect to A and continuity
727
+ of V follows from (C3). From assumption (C6) and from (18),
728
+ it follows that V is locally Lipschitz on a neighborhood of
729
+ C and that the bounds [28, Eqs.(3.18), (3.19)] are satisfied.
730
+ Since A is compact and the hybrid basic conditions are
731
+ satisfied (cf. Corollary 1), it follows from [28, Theorem 3.19]
732
+ that A is stable for (5).
733
+ Assumption (C7) guarantees that there exists δ satisfying
734
+ (D1) δ(x, xc) > 0 for each (x, xc) ∈ X × Xc;
735
+ (D2) δ(x, xc) < µV(x, xc) for each (x, xc) ∈ Ψ\A with Ψ
736
+ defined in (C7).
737
+ We say that δ is positive if it satisfies (D1), and that a hybrid
738
+ controller (κ, V, Dc, Fc) is synergistic relative to A for (5)
739
+ with synergy gap exceeding δ if it is synergistic relative to
740
+ A for (5) and satisfies (D2). When both conditions (D1)
741
+ and (D2) are satisfied, all the points in the largest weakly
742
+ invariant subset of (16) in u−1
743
+ c (0) that are not in A lie in
744
+ the jump set of (15), allowing us to prove that A is globally
745
+ asymptotically stable for the closed-loop system (15).
746
+ Theorem 1. Suppose that Assumption 1 holds. Given a
747
+ compact subset A of X × Xc and a positive function
748
+ δ : X × Xc → R, if (κ, V, Dc, Fc) is synergistic relative
749
+ to A for (5) with synergy gap exceeding δ, then the set
750
+ A is globally pre-asymptotically stable for (15). If, for
751
+ each (x, xc) ∈ C\D, (VC) is satisfied, then A is globally
752
+ asymptotically stable for (15).
753
+ Proof. Stability of A is proved in Lemma 3 and complete-
754
+ ness of solutions is demonstrated in Lemma 2. The global
755
+ 6
756
+
757
+ Submitted for publication
758
+ pre-asymptotic stability of A for (15) follows from pre-
759
+ attractivity of A for (15), which is demonstrated next through
760
+ an application of [27, Theorem 8.2].
761
+ It follows from Lemmas 3 and 2 that each maximal solu-
762
+ tion to (15) is precompact and the growth of V along solutions
763
+ to (15) is bounded by uc, ud satisfying (19). Therefore, it
764
+ follows from [27, Theorem 8.2] that every complete solution
765
+ approaches the largest weakly invariant set
766
+ V −1(r) ∩
767
+
768
+ u−1
769
+ c (0) ∪ (u−1
770
+ d (0) ∩ Gcl(u−1
771
+ d (0))
772
+
773
+ (20)
774
+ for some r in the image of V. From (18) and the assump-
775
+ tion (D1), it follows that u−1
776
+ d (0) = ∅, hence (20) can be
777
+ rewritten as
778
+ V −1(r) ∩ u−1
779
+ c (0).
780
+ (21)
781
+ It follows from (C7), (D2) and the definition of D in (13)
782
+ that the largest weakly invariant subset of (15) in (21) does
783
+ not include points that are not in A and, consequently, A
784
+ is globally pre-attractive for (15). Global asymptotic stability
785
+ of A for (15) follows from global pre-asymptotic stability
786
+ if each maximal solution to (15) is complete, which is
787
+ guaranteed by Lemma 2 under assumption (VC).
788
+ Note that, if there exists an accumulation point of Ψ\A
789
+ in A, then δ1 in (17) is equal to 0. Therefore, the topology
790
+ of Ψ and A may preclude global asymptotic stabilization of
791
+ A for (15) since (C7) is not met. Conversely, if one is able
792
+ to show that δ1 > 0, then Ψ\A does not have accumulation
793
+ points in A. With additional conditions on δ, we are able to
794
+ show that there exists a neighborhood of A contained in C.
795
+ Proposition 1. Given a compact subset A of X × Xc, if
796
+ the hybrid controller (κ, V, Dc, Fc) is synergistic relative to
797
+ A and δ := inf{δ(x, xc) : (x, xc) ∈ X × Xc} satisfies
798
+ δ ∈ (0, δ1), where δ1 is given in (C7), then there exists a
799
+ neighborhood of A that is contained in C.
800
+ Proof. Selecting ǫ ∈ (0, δ), we have that µ−1
801
+ V ((−ǫ, ǫ)) is
802
+ open because µV is continuous (cf. Lemma 1), contains A
803
+ because µV(A) = 0 and it is a subset of C because ǫ < δ ≤
804
+ δ(x, xc) for each (x, xc) ∈ X × Xc.
805
+ Remark 3. Note that, if the hybrid controller (κ, V, Dc, Fc)
806
+ is synergistic relative to A for (5), then δ can be chosen as
807
+ a constant ∆ ∈ R as long as ∆ ∈ (0, δ1). In this case, the
808
+ conditions of Proposition 1 hold, thus the fact that δ is state-
809
+ dependent does not constrain the global asymptotic stability
810
+ results and it provides more flexibility to the design of the
811
+ hybrid controller.
812
+ V. ROBUST SYNERGISTIC HYBRID FEEDBACK
813
+ In this section, we propose a new kind of synergistic hybrid
814
+ controller that, unlike the controller of Section IV, is able
815
+ to handle the case where θ is unknown, but belongs to a
816
+ known compact set Ω. In this direction, let A := {Aθ}θ∈Ω
817
+ denote a collection of compact subsets of X × Xc and let
818
+ V := {Vθ}θ∈Ω denote a collection of functions satisfying the
819
+ following assumption:
820
+ (C8) Given a compact set Ω and a collection V := {Vθ}θ∈Ω
821
+ of functions Vθ : dom Vθ → R≥0 ∪ {+∞} satisfying
822
+ X × Xc ⊂ dom Vθ for each θ ∈ Ω, we assume that
823
+ (x, xc, θ) �→ V(x, xc, θ) := Vθ(x, xc)
824
+ (22)
825
+ is continuous.
826
+ Remark 4. Note that Ω might be uncountable, thus the
827
+ collections A := {Aθ}θ∈Ω and V := {Vθ}θ∈Ω are not
828
+ necessarily finite nor countable.
829
+ Using the previous definitions, we propose the following
830
+ hybrid controller:
831
+ ˙xc ∈ Fc(x, xc)
832
+ (x, xc) ∈ CΩ
833
+ (23a)
834
+ x+
835
+ c ∈ Gc(x, xc)
836
+ (x, xc) ∈ DΩ
837
+ (23b)
838
+ where
839
+ CΩ :=
840
+
841
+ (x, xc) ∈ X × Xc : min
842
+ θ∈Ω µVθ(x, xc) ≤ δ(x, xc)
843
+
844
+ DΩ :=
845
+
846
+ (x, xc) ∈ X × Xc : min
847
+ θ∈Ω µVθ(x, xc) ≥ δ(x, xc)
848
+
849
+ (24)
850
+ with δ : X × Xc → R continuous, and
851
+ min
852
+ θ∈Ω µVθ(x, xc) = min
853
+ θ∈Ω {Vθ(x, xc) − νVθ(x, xc)}
854
+ = min
855
+ θ∈Ω
856
+
857
+ V(x, xc, θ) −
858
+ min
859
+ g∈Dc(x,xc) V(x, g, θ)
860
+
861
+ for each (x, xc) ∈ X × Xc, in accordance with the defini-
862
+ tions (12c), (12a) and (22), and Gc : X × Xc ⇒ X satisfies
863
+ the following assumptions:
864
+ (C9) The set-valued map Gc is outer semicontinuous and
865
+ locally bounded;
866
+ (C10) For each θ ∈ Ω, we assume that
867
+ Vθ(x, xc) − Vθ(x, g) ≥ min
868
+ θ∈Ω µVθ(x, xc)
869
+ (25)
870
+ for each (x, xc) ∈ DΩ and each g ∈ Gc(x, xc)
871
+ Remark 5. Under assumption (C10), we guarantee by con-
872
+ struction that
873
+ Vθ(x, xc) − Vθ(x, g) ≥ δ(x, xc)
874
+ for each (x, xc) ∈ DΩ and each g ∈ Gc(x, xc), which
875
+ implies that the function Vθ does not increase during jumps
876
+ if δ(x, xc) ≥ 0 for all (x, xc) ∈ X × Xc (cf. Remark 2).
877
+ Note that the jump map of the hybrid controller (13) is
878
+ constructed from the data V and Dc as shown in (12b). On the
879
+ other hand, the jump map Gc in (23) is left undefined for the
880
+ sake of generality. It is possible to construct Gc in (23) from
881
+ the data V and Dc, but this requires additional assumptions,
882
+ as shown in the following remark. Owing to the fact that (23)
883
+ is derived from κ, V, Dc, Fc, and Gc, we refer to (23) using
884
+ the 5-tuple (κ, V, Dc, Fc, Gc).
885
+ 7
886
+
887
+ Submitted for publication
888
+ Remark 6. Suppose that Ω is compact and convex and that
889
+ Dc in (11) is convex and compact for each (x, xc) ∈ X ×Xc.
890
+ Given V := {Vθ}θ∈Ω, suppose that Gc defined as
891
+ Gc(x, xc) := arg max
892
+ g∈Dc(x,xc)
893
+ min
894
+ θ∈Ω {V(x, xc, θ) − V(x, g, θ)}
895
+ ∀(x, xc) ∈ X × Xc
896
+ (26)
897
+ is outer semicontinuous with V(x, xc, θ) = Vθ(x, xc) for each
898
+ (x, xc, θ) ∈ X × Xc × Ω. Furthermore, suppose that, for
899
+ each (x, xc) ∈ X × Xc, the function h(g, θ) := Vθ(x, xc) −
900
+ Vθ(x, g) is continuous, quasi-concave as a function of g,
901
+ and quasi-convex as a function of θ.3 Then, it follows
902
+ from [31, Theorem 3.4] that the min and max operations
903
+ in maxg∈Dc(x,xc) minθ∈Ω h(g, θ) commute, yielding
904
+ max
905
+ g∈Dc(x,xc) min
906
+ θ∈Ω h(g, θ) = min
907
+ θ∈Ω
908
+ max
909
+ g∈Dc(x,xc) h(g, θ)
910
+ = min
911
+ θ∈Ω
912
+
913
+ Vθ(x, xc) −
914
+ min
915
+ g∈Dc(x,xc) Vθ(x, g)
916
+
917
+ .
918
+ (27)
919
+ It
920
+ follows
921
+ from
922
+ (27)
923
+ and
924
+ (12c)
925
+ that
926
+ maxg∈Dc(x,xc) minθ∈Ω h(g, θ)
927
+ =
928
+ minθ∈Ω µVθ(x, xc).
929
+ We conclude that, for each θ ∈ Ω, the following holds
930
+ Vθ(x, xc) − Vθ(x, g)
931
+
932
+ minθ∈Ω µVθ(x, xc),
933
+ for each
934
+ (x, xc) ∈ X × Xc and each g belonging to (26), hence
935
+ condition (25) is verified.
936
+ The following definition extends the notion of a synergistic
937
+ controller in order to address the case where θ ∈ Ω is not
938
+ known.
939
+ Definition 3. Given a compact set Ω, a continuous func-
940
+ tion δ : X × Xc → R, a collection of compact subsets
941
+ A := {Aθ}θ∈Ω of X × Xc, and a collection of continuous
942
+ functions V
943
+ := {Vθ}θ∈Ω, we say that the hybrid con-
944
+ troller (κ, V, Dc, Fc, Gc) is synergistic relative to A for (5)
945
+ with robustness margin Ω if (C8), (C9), (C10) hold, and
946
+ if, for each θ ∈ Ω, the hybrid controller (κ, Vθ, Dc, Fc) is
947
+ synergistic relative to Aθ for (5).
948
+ The
949
+ assumption
950
+ that
951
+ the
952
+ hybrid
953
+ con-
954
+ troller
955
+ (κ, V, Dc, Fc, Gc)
956
+ is
957
+ synergistic
958
+ relative
959
+ to
960
+ A
961
+ for (5) with robustness margin Ω ensures that the hybrid
962
+ closed-loop system
963
+
964
+ ˙x
965
+ ˙xc
966
+
967
+ ∈ Fcl(x, xc) :=
968
+
969
+ Fθ(x, xc, κ(x, xc))
970
+ Fc(x, xc)
971
+
972
+ (x, xc) ∈ CΩ
973
+ (28a)
974
+ �x+
975
+ x+
976
+ c
977
+
978
+ ∈ GΩ(x, xc) :=
979
+
980
+ x
981
+ Gc(x, xc)
982
+
983
+ (x, xc) ∈ DΩ
984
+ (28b)
985
+ satisfies the hybrid basic conditions as proved next.
986
+ Lemma 4. Suppose that Assumption 1 holds. Given a
987
+ compact set Ω and a collection of compact subsets A :=
988
+ {Aθ}θ∈Ω of X × Xc if (κ, V, Dc, Fc, Gc) is synergistic
989
+ 3A function (x, y) �→ h(x, y) on X × Y is quasi-concave as a function
990
+ of x if the set {x ∈ X : h(x, y) ≥ c} is convex for each y ∈ Y and
991
+ each c ∈ R. The function h is quasi-convex as a function of y if the set
992
+ {y ∈ X : h(x, y) ≤ c} is convex for each x ∈ X and each c ∈ R.
993
+ relative to A for (5) with robustness margin Ω, then the
994
+ hybrid closed-loop system (28) satisfies (A1), (A2), and (A3).
995
+ Proof. The continuity of µVθ (for a fixed θ ∈ Ω) is es-
996
+ tablished in Lemma 1. It follows from the continuity of
997
+ (x, xc, θ) �→ V(x, xc, θ) = Vθ(x, xc) that is assumed in (C8),
998
+ compactness of Ω and from [30, Theorem 9.14] that the
999
+ function
1000
+ (x, xc) �→ min
1001
+ θ∈Ω µVθ(x, xc)
1002
+ (29)
1003
+ is continuous on X×Xc. It follows from the continuity of (29)
1004
+ and of δ that CΩ and DΩ are closed, because they are the
1005
+ preimage of the closed sets (−∞, 0] and [0, +∞], respec-
1006
+ tively. It follows from Assumption 1, (C2), and (C5) that
1007
+ the flow map FΩ is outer semicontinuous, locally bounded
1008
+ and convex-valued. It follows from (C9) that GΩ is outer
1009
+ semicontinuous, and locally bounded relative to DΩ.
1010
+ In the sequel, we demonstrate that, for each θ ∈ Ω,
1011
+ the set Aθ ∈ A is globally asymptotically stable under
1012
+ appropriate assumptions on δ. The next result asserts forward
1013
+ pre-invariance of sublevel sets of Vθ ∈ V for the closed-loop
1014
+ system (28) when δ is a continuous and nonnegative function.
1015
+ Lemma 5. Suppose that Assumption 1 holds. Given a
1016
+ compact set Ω and a collection of compact subsets A :=
1017
+ {Aθ}θ∈Ω of X × Xc, if (κ, V, Dc, Fc, Gc) is synergistic
1018
+ relative to A for (5) with robustness margin Ω and if
1019
+ δ(x, xc) ≥ 0 for each (x, xc) ∈ X×Xc, then, for each θ ∈ Ω,
1020
+ each sublevel set of Vθ is forward pre-invariant for (28). If,
1021
+ for each (x, xc) ∈ CΩ\DΩ,
1022
+ (VC’) there exists a neighborhood U of (x, xc) such that
1023
+ Fcl(ξ) ∩ TξCΩ ̸= ∅, for every ξ ∈ U ∩ CΩ
1024
+ then each maximal solution to (28) is complete and, conse-
1025
+ quently, each sublevel set of Vθ is forward invariant for (28).
1026
+ Proof. As explained in Remark 5, it follows from (C10)
1027
+ and (24) that Vθ(x, xc) − Vθ(x, g) ≥ δ(x, xc) for each
1028
+ g ∈ Gc(x, xc) and each (x, xc) ∈ DΩ. Hence, the growth
1029
+ of Vθ during jumps of (28) is bounded by
1030
+ ud,θ(x, xc) :=
1031
+
1032
+ −δ(x, xc)
1033
+ if (x, xc) ∈ DΩ
1034
+ −∞
1035
+ otherwise
1036
+ (30)
1037
+ for each (x, xc) ∈ X × Xc. Since (κ, V, Dc, Fc, Gc) is
1038
+ synergistic relative to A for (5) with robustness margin
1039
+ Ω, it follows that (κ, Vθ, Dc, Fc) is synergistic relative to
1040
+ Aθ for (5) and, due to this assumption, the remainder of
1041
+ the proof follows closely that of Lemma 2. From Assump-
1042
+ tion (C6) it follows that the growth of Vθ along solutions
1043
+ to (28) is bounded by uc,θ, ud,θ, with uc,θ(x, xc) ≤ 0 and
1044
+ ud,θ(x, xc) ≤ 0 for each (x, xc) ∈ X × Xc. This implies that
1045
+ sublevel sets of Vθ are forward pre-invariant for (28). The
1046
+ completeness of solutions under (VC’) follows closely the
1047
+ proof in Lemma 2, thus it is omitted here.
1048
+ Let Ψθ denote the largest weakly invariant subset of
1049
+ ( ˙x, ˙xc) ∈ Fcl(x, xc)
1050
+ (x, xc) ∈ u−1
1051
+ c,θ(0)
1052
+ 8
1053
+
1054
+ Submitted for publication
1055
+ where uc,θ is the upper bound on the growth of Vθ during
1056
+ flows of (28) as defined in (C6). Given a function δ : X ×
1057
+ Xc → R and a hybrid controller (κ, V, Dc, Fc, Gc) that is
1058
+ synergistic relative to A for (5) with robustness margin Ω,
1059
+ we say that it has synergy gap exceeding δ if, for each θ ∈ Ω
1060
+ and each (x, xc) ∈ Ψθ\Aθ, δ(x, xc) < µVθ(x, xc).
1061
+ Theorem 2. Suppose that Assumption 1 holds. Given a
1062
+ compact set Ω, a positive function δ : X × Xc → R, and
1063
+ a collection of compact subsets A := {Aθ}θ∈Ω of X × Xc,
1064
+ if (κ, V, Dc, Fc, Gc) is synergistic relative to A for (5) with
1065
+ robustness margin Ω and synergy gap exceeding δ, then, for
1066
+ each θ ∈ Ω, the set Aθ is globally pre-asymptotically stable
1067
+ for (28). If, for each (x, xc) ∈ CΩ\DΩ, (VC’) is satisfied,
1068
+ then Aθ is globally asymptotically stable for (28).
1069
+ Proof. For each θ ∈ Ω, it follows from (C3) that each
1070
+ sublevel set of Vθ is compact and, since it is also forward pre-
1071
+ invariant as shown in Lemma 5, we have that each solution
1072
+ to (28) is bounded. In addition, it follows from the proof
1073
+ of Lemma 5 that the growth of Vθ along jumps of (28) is
1074
+ bounded by (30) and, since δ(x, xc) > 0 by assumption, it
1075
+ follows from [27, Theorem 8.2] that each complete solution
1076
+ to (28) approaches the largest weakly invariant subset of
1077
+ V −1
1078
+ θ
1079
+ (r) ∩ u−1
1080
+ c,θ(0) for some r in the image of Vθ, which is to
1081
+ say that each complete solution to (28) approaches Ψθ ∩CΩ.
1082
+ Since each point (x, xc) ∈ Ψθ\Aθ belongs to DΩ\CΩ by
1083
+ Assumption (C7), it follows that each complete solution
1084
+ to (28) converges to Aθ, which concludes the proof of global
1085
+ pre-attractivity of Aθ for (28). The proof of stability of Aθ
1086
+ for (15) follows closely the proof of Lemma 3. We conclude
1087
+ that Aθ is globally pre-asymptotically stable for (28). Global
1088
+ asymptotic stability of Aθ for (28) under assumption (VC’)
1089
+ follows directly from global pre-asymptotic stability and
1090
+ completeness of solutions, as shown in Lemma 5.
1091
+ In the next section, we apply the proposed controller to
1092
+ the design of adaptive synergistic feedback control laws for
1093
+ a class of affine systems with matched uncertainties.
1094
+ VI. ADAPTIVE BACKSTEPPING OF SYNERGISTIC HYBRID
1095
+ FEEDBACK FOR AFFINE CONTROL SYSTEMS
1096
+ A. Nominal Synergistic Hybrid Feedback
1097
+ In this section, we apply the controller design of Section V
1098
+ to the problem of global asymptotic stabilization of a compact
1099
+ set A ⊂ X × Xc for a control affine system subject to
1100
+ parametric uncertainty, where X and Xc denote the spaces
1101
+ of the state and controller variables, respectively. In this
1102
+ direction, let Fθ in (5) be given by
1103
+ Fθ(x, xc, u) := f(x, xc) + H(x, xc)u + W(x, xc)θ
1104
+ (31)
1105
+ for each (x, xc, u) ∈ X × Xc × U, where u denotes an input
1106
+ variable subject to the constraint u ∈ U, and
1107
+ θ ∈ Ω := {θ ∈ Rℓ : |θ| ≤ θ0}
1108
+ (32)
1109
+ represents the parametric uncertainty of the model whose
1110
+ norm is assumed to be bounded by a known parameter
1111
+ θ0 ∈ R≥0. The controller design in this section is applicable
1112
+ under the assumption of matched uncertainties stated next.
1113
+ Assumption 2. There exists a continuously differentiable
1114
+ function �
1115
+ W such that W(x, xc) = H(x, xc)�
1116
+ W(x, xc) for
1117
+ each (x, xc) ∈ X × Xc.
1118
+ In addition, we assume that we are given a synergistic
1119
+ hybrid controller for the nominal (unperturbed) system as
1120
+ defined next.
1121
+ Definition 4. Given a compact set A ⊂ X × Xc and a
1122
+ continuous function δ : X × Xc → R, the hybrid con-
1123
+ troller (κ0, V0, Dc, Fc) is said to be nominally synergistic
1124
+ relative to A for (31) with synergy gap exceeding δ if it
1125
+ is synergistic relative to A for
1126
+ ˙x = F0(x, xc, u) := f(x, xc) + H(x, xc)u
1127
+ (33)
1128
+ with synergy gap exceeding δ, and V0 is continuously differ-
1129
+ entiable on {(x, xc) ∈ X × Xc : V0(x, xc) < +∞.}.
1130
+ The dynamical system (33) is obtained from (31) by
1131
+ considering that there are no perturbations, i.e., θ = 0. It
1132
+ follows from Theorem 1 that A is globally asymptotically
1133
+ stable for the closed-loop system H in (15) resulting from the
1134
+ interconnection of (33) and a nominally synergistic controller
1135
+ relative to A for (31) when θ = 0. In the next section, we
1136
+ present variations of the nominal synergistic controller so as
1137
+ to deal with nonzero disturbances.
1138
+ B. Adaptive Synergistic Hybrid Feedback
1139
+ In this section, we modify the nominal synergistic con-
1140
+ troller given in Section VI-A to globally asymptotically
1141
+ stabilize
1142
+ A1,θ := A × {θ}
1143
+ (34)
1144
+ for the closed-loop system when θ in (31) is nonzero.4 In
1145
+ this direction, let ˆθ ∈ Rℓ denote an estimate of the parameter
1146
+ θ that is generated via
1147
+ ˙ˆθ = Γ1 Proj(W(x, xc)⊤∇xV0(x, xc), ˆθ),
1148
+ (35)
1149
+ where Γ1 ∈ Rℓ×ℓ is a positive definite matrix and Proj :
1150
+ Rℓ × Rℓ → Rℓ is given by
1151
+ Proj(η, ˆθ) :=
1152
+
1153
+ η
1154
+ if p(ˆθ) ≤ 0 or ∇ p(ˆθ)⊤η ≤ 0
1155
+
1156
+ Iℓ − p(ˆθ)∇ p(ˆθ)∇ p(ˆθ)⊤
1157
+ ∇ p(ˆθ)⊤∇ p(ˆθ)
1158
+
1159
+ η
1160
+ otherwise
1161
+ (36)
1162
+ for each (η, ˆθ) ∈ Rℓ × Rℓ,
1163
+ p(ˆθ) :=
1164
+ ˆθ⊤ˆθ − θ2
1165
+ 0
1166
+ ǫ2 + 2ǫθ0
1167
+ (37)
1168
+ for each ˆθ ∈ Rℓ, with ǫ > 0 and θ0 > 0 given in (32), and
1169
+ W as in (31). The function Proj in (36) has the following
1170
+ properties (cf. [33]):
1171
+ (P1) Proj is Lipschitz continuous;
1172
+ 4As the controller design exploits ideas in the literature of adaptive control,
1173
+ we refer the reader to [32] for an overview of adaptive controller design and
1174
+ backstepping under the influence of model uncertainty.
1175
+ 9
1176
+
1177
+ Submitted for publication
1178
+ (P2) Each solution t �→ ˆθ(t) to ˙ˆθ = Γ1 Proj(η(t), ˆθ), from
1179
+ ˆθ ∈ Ω+ǫB with input t �→ η(t) satisfies rge ˆθ ⊂ Ω+ǫB;
1180
+ (P3) Given θ ∈ Ω, (θ − ˆθ)⊤ Proj(η, ˆθ) ≥ (θ − ˆθ)⊤η for each
1181
+ (η, ˆθ) ∈ Rℓ × Rℓ;
1182
+ with
1183
+ ǫ
1184
+ >
1185
+ 0
1186
+ as
1187
+ in
1188
+ (37).
1189
+ Given
1190
+ a
1191
+ hybrid
1192
+ con-
1193
+ troller (κ0, V0, Dc, Fc) that is nominally synergistic relative
1194
+ to A for (31) with synergy gap exceeding δ, and the controller
1195
+ variable xc,1 := (xc, ˆθ) ∈ Xc,1 := Xc × (Ω + ǫB), we define
1196
+ κ1(x, xc,1) := κ0(x, xc) − �
1197
+ W(x, xc)ˆθ
1198
+ (38a)
1199
+ V1,θ(x, xc,1) := V0(x, xc) + 1
1200
+ 2(θ − ˆθ)⊤Γ−1
1201
+ 1 (θ − ˆθ) (38b)
1202
+ Dc,1(x, xc,1) := Dc(x, xc) × (Ω + ǫB)
1203
+ (38c)
1204
+ Fc,1(x, xc,1) =
1205
+
1206
+ Fc(x, xc)
1207
+ Γ1 Proj(W(x, xc)⊤∇xV0(x, xc), ˆθ)
1208
+
1209
+ (38d)
1210
+ for each (x, xc,1) ∈ X × Xc,1, where �
1211
+ W comes from
1212
+ Assumption 2. The hybrid closed-loop system resulting
1213
+ from the interconnection between (31) and the hybrid con-
1214
+ troller (κ1, V1,θ, Dc,1, Fc,1), is given by
1215
+ ( ˙x, ˙xc,1) ∈ Fcl,1(x, xc,1)
1216
+ (x, xc,1) ∈ C1
1217
+ (39a)
1218
+ (x+, x+
1219
+ c,1) ∈ Gcl,1(x, xc,1)
1220
+ (x, xc,1) ∈ D1
1221
+ (39b)
1222
+ where
1223
+ C1 := {(x, xc,1) ∈ X × Xc,1 : µV1,θ(x, xc,1) ≤ δ(x, xc)}
1224
+ D1 := {(x, xc,1) ∈ X × Xc,1 : µV1,θ(x, xc,1) ≥ δ(x, xc)}
1225
+ and
1226
+ Fcl,1(x, xc,1) :=
1227
+ �Fθ(x, xc, κ1(x, xc,1))
1228
+ Fc,1(x, xc,1)
1229
+
1230
+ ∀(x, xc,1) ∈ C1
1231
+ (40a)
1232
+ Gcl,1(x, xc,1) :=
1233
+
1234
+ x
1235
+ ̺V1,θ(x, xc,1)
1236
+
1237
+ ∀(x, xc,1) ∈ D1.
1238
+ (40b)
1239
+ where, for each (x, xc,1) ∈ X × Xc,1,
1240
+ νV1,θ(x, xc,1) = νV0(x, xc)
1241
+ (41a)
1242
+ ̺V1,θ(x, xc,1) = ̺V0(x, xc) × {θ}
1243
+ (41b)
1244
+ µV1,θ(x, xc,1) = µV0(x, xc) + 1
1245
+ 2(θ − ˆθ)⊤Γ−1
1246
+ 1 (θ − ˆθ) (41c)
1247
+ are directly computed from (12a), (12b) and (12c), respec-
1248
+ tively.
1249
+ Remark 7. For the hybrid controller (κ1, V1,θ, Dc,1, Fc,1),
1250
+ the functions (41) are not realizable, because µV1,θ and
1251
+ ̺V1,θ in (41) depend on the unknown constant θ. This
1252
+ dependence will be removed when we show that there
1253
+ exists Gc,1
1254
+ : X × Xc,1
1255
+ ⇒ Xc,1 such that the hybrid
1256
+ controller (κ1, V1, Dc,1, Fc,1, Gc,1) with V := {V1,θ}θ∈Ω
1257
+ is synergistic relative to A1 := {A1,θ}θ∈Ω for (31) with
1258
+ robustness margin Ω.
1259
+ To design (23), we start by showing that the hybrid
1260
+ controller (κ1, V1,θ, Dc,1, Fc,1) is synergistic relative to A1,θ
1261
+ for (31).
1262
+ Proposition 2. Suppose that the sets X, Xc, U, and the set-
1263
+ valued map Fθ in (31) satisfy Assumption 1, and that Assump-
1264
+ tion 2 holds. Given θ ∈ Ω, a compact set A ⊂ X ×Xc, and a
1265
+ hybrid controller (κ0, V0, Dc, Fc) that is nominally synergis-
1266
+ tic relative to A for (31), the controller (κ1, V1,θ, Dc,1, Fc,1)
1267
+ given in (38) is a synergistic candidate relative to A1,θ
1268
+ for (31).
1269
+ Proof. The optimization problems in (12) are feasible for
1270
+ each x ∈ X, because they are feasible for V0, hence (C1) is
1271
+ satisfied.
1272
+ Since V1,θ corresponds to the sum of V0 with (θ −
1273
+ ˆθ)⊤Γ−1
1274
+ 1 (θ − ˆθ)/2 and both terms are continuous, it follows
1275
+ that V1,θ is continuous. Since V0 is positive definite with
1276
+ respect to A and ˆθ �→ (θ− ˆθ)⊤Γ−1
1277
+ 1 (θ− ˆθ) is positive definite
1278
+ relative to θ, it follows that V1,θ is positive definite relative
1279
+ to A1,θ. It follows from the assumption that V −1
1280
+ 0
1281
+ ([0, c])
1282
+ is compact for each c ≥ 0 and radial unboundedness of
1283
+ ˆθ �→ (θ − ˆθ)⊤Γ−1
1284
+ 1 (θ − ˆθ) relative to θ that V −1
1285
+ 1,θ ([0, c]) is
1286
+ compact for each c ≥ 0, thus proving that V1,θ satisfies (C3).
1287
+ From (38c), we have that Dc,1(x, xc,1) is the Cartesian
1288
+ product between Dc(x, xc) and Ω + ǫB for each (x, xc) ∈
1289
+ X × Xc. Since Dc satisfies (C4) by assumption, we have that
1290
+ Dc,1 also satisfies (C4). Since κ0 satisfies (C5), then κ1 also
1291
+ satisfies (C5).
1292
+ Proposition 3. Suppose that the sets X, Xc, U, and the set-
1293
+ valued map Fθ in (31) satisfy Assumption 1, and that Assump-
1294
+ tion 2 holds. Given θ ∈ Ω, a compact set A ⊂ X ×Xc, and a
1295
+ hybrid controller (κ0, V0, Dc, Fc) that is nominally synergis-
1296
+ tic relative to A for (31), the controller (κ1, V1,θ, Dc,1, Fc,1)
1297
+ given in (38) satisfies (C6).
1298
+ Proof. It follows from (38b), (40a) and (P3) that, for each
1299
+ (x, xc,1) ∈ X × Xc,1 and each fcl,1 ∈ Fcl,1(x, xc,1)
1300
+ ∇V1,θ(x, xc,1)⊤fcl,1 ≤∇V0(x, xc)⊤
1301
+ �Fθ(x, xc, κ1(x, xc,1))
1302
+ fc
1303
+
1304
+ − (θ − ˆθ)⊤W(x, xc)⊤∇xV0(x, xc)
1305
+ where fc ∈ Fc(x, xc) is the component of fcl,1 that deter-
1306
+ mines the dynamics of xc, i.e., ˙xc = fc. Replacing (31)
1307
+ and (38a) in (VI-B), we obtain
1308
+ ∇V1,θ(x, xc,1)⊤fcl,1 ≤ ∇V0(x, xc)⊤
1309
+
1310
+ F0(x, xc, κ0(x, xc))
1311
+ fc
1312
+
1313
+ + ∇xV0(x, xc)⊤(−H(x, xc)�
1314
+ W(x, xc)ˆθ + W(x, xc)θ)
1315
+ − (θ − ˆθ)⊤W(x, xc)⊤∇V0(x, xc)
1316
+ (X1)
1317
+ for each (x, xc,1) ∈ X × Xc,1 with F0 given in (33). Hence,
1318
+ it follows from Assumption 2 that
1319
+ ∇V1,θ(x, xc,1)⊤fcl,1 ≤ ∇V0(x, xc)⊤
1320
+ �F0(x, xc, κ0(x, xc))
1321
+ fc
1322
+
1323
+ for each (x, xc,1) ∈ X × Xc,1. From the assumption that the
1324
+ hybrid controller (13) with data (κ0, V0, Dc, Fc) is synergistic
1325
+ relative to A for (33), we have that ∇V1,θ(x, xc,1)⊤fcl,1 ≤ 0
1326
+ for each (x, xc,1) ∈ X × Xc,1 and each fcl,1 ∈ Fcl,1(x, xc,1),
1327
+ which proves (C6).
1328
+ 10
1329
+
1330
+ Submitted for publication
1331
+ Since the hybrid controller (κ1, V1,θ, Dc,1, Fc,1) satis-
1332
+ fies (C6), we have that V1,θ is nonincreasing along solutions
1333
+ to the closed-loop system (39), but satisfying (C7) requires
1334
+ further assumptions on the data, as shown next.
1335
+ Proposition 4. Suppose that the sets X, Xc, U, and the
1336
+ set-valued map Fθ in (31) satisfy Assumption 1, and that
1337
+ Assumption 2 holds. Given θ ∈ Ω, a compact set A ⊂ X×Xc,
1338
+ and a hybrid controller (κ0, V0, Dc, Fc) that is nominally
1339
+ synergistic relative to A for (31) with synergy gap exceeding
1340
+ δ, let Ψ denote the largest weakly invariant subset of
1341
+ ( ˙x, ˙xc) ∈ Fcl,0(x, xc) =
1342
+
1343
+ F0(x, xc, κ0(x, xc))
1344
+ Fc(x, xc)
1345
+
1346
+ on (x, xc) ∈ E := {(x, xc) ∈ X ×Xc : ∇V0(x, xc)⊤fcl,0 = 0
1347
+ for some fcl,0 ∈ Fcl,0(x, xc)} and let Ψ1,θ denote the
1348
+ largest weakly invariant subset of
1349
+ ( ˙x, ˙xc,1) ∈ Fcl,1(x, xc,1)
1350
+ (x, xc,1) ∈ E1
1351
+ with E1 := {(x, xc,1) ∈ X × Xc,1 : ∇V1,θ(x, xc,1)⊤fcl,1 =
1352
+ 0
1353
+ for some fcl,1
1354
+ ∈ Fcl,1(x, xc,1)}. If the projection of
1355
+ Ψ1,θ\A1,θ onto X × Xc is a subset of Ψ\A, i.e., 5
1356
+ πX×Xc(Ψ1,θ\A1,θ) ⊂ Ψ\A,
1357
+ (42)
1358
+ then the hybrid controller (κ1, V1,θ, Dc,1, Fc,1) in (38) is syn-
1359
+ ergistic relative to A1,θ for (31) with synergy gap exceeding
1360
+ δ.
1361
+ Proof. It follows from the definition of µV1,θ in (41c) that
1362
+ µV1,θ(x, xc,1) is the sum of µV0(x, xc) with a quadratic
1363
+ nonnegative term, hence
1364
+ µV1,θ(x, xc,1) ≥ µV0(x, xc)
1365
+ (43)
1366
+ for each (x, xc,1) ∈ Ψ1,θ\A1,θ and, consequently, we have
1367
+ that
1368
+ δ2 := inf{µV1,θ(x, xc, θ) : (x, xc,1) ∈ Ψ1,θ\A1,θ}
1369
+ ≥ inf {µV0(x, xc) : (x, xc,1) ∈ Ψ1,θ\A1,θ} .
1370
+ (44)
1371
+ The
1372
+ fact
1373
+ that
1374
+ (x, xc,1)
1375
+
1376
+ Ψ1,θ\A1,θ
1377
+ implies
1378
+ (x, xc)
1379
+
1380
+ πX×Xc(Ψ1,θ\A1,θ)
1381
+ together
1382
+ with
1383
+ (44)
1384
+ allow
1385
+ us
1386
+ to
1387
+ derive
1388
+ the
1389
+ following
1390
+ inequality:
1391
+ δ2
1392
+
1393
+ inf {µV0(x, xc) : (x, xc) ∈ πX×Xc(Ψ1,θ\A1,θ)} . It follows
1394
+ from (42) that δ2 ≥ inf{µV0(x, xc) : (x, xc) ∈ Ψ\A}
1395
+ which is greater than zero by the assumption that the
1396
+ controller (κ0, V0, Dc, Fc)
1397
+ is
1398
+ synergistic relative to
1399
+ A
1400
+ for (33) with synergy gap exceeding δ. In addition, we
1401
+ have that µV1,θ(x, xc,1)
1402
+
1403
+ µV0(x, xc)
1404
+ >
1405
+ δ(x, xc) for
1406
+ each (x, xc,1) ∈ Ψ1,θ\A1,θ, which proves that the hybrid
1407
+ controller (κ1, V1,θ, Dc,1, Fc,1) in (38) is synergistic relative
1408
+ to A1,θ for (31) with synergy gap exceeding δ.
1409
+ In the next result, we complete the construction of the
1410
+ robust synergistic controller (23) from the data of a nominally
1411
+ 5Given a subset S of X := X1 × X2, the projection of S onto X1
1412
+ is represented by πX1(S) := {x1 ∈ X1 : (x1, x2) ∈ S for some x2 ∈
1413
+ X2}. Similarly, the projection of S onto X2 is denoted by πX2(S) :=
1414
+ {x2 ∈ X2 : (x1, x2) ∈ S for some x1 ∈ X1}.
1415
+ synergistic controller (κ0, V0, Dc, Fc), by designing a set-
1416
+ valued map Gc,1 : X × Xc,1 ⇒ X that is outer semicon-
1417
+ tinuous, locally bounded and satisfies (25).
1418
+ Proposition 5. Suppose that the sets X, Xc, U, and the
1419
+ set-valued map Fθ in (31) satisfy Assumption 1, and that
1420
+ Assumption 2 holds. Given Ω in (32), a compact set A ⊂
1421
+ X × Xc, and a hybrid controller (κ0, V0, Dc, Fc) that is
1422
+ nominally synergistic relative to A for (31) with synergy
1423
+ gap exceeding δ, A1 := {A1,θ}θ∈Ω with A1,θ in (34),
1424
+ V1 := {V1,θ}θ∈Ω with V1,θ in (38b), then the hybrid con-
1425
+ troller (κ1, V1, Dc,1, Fc,1, Gc,1) where
1426
+ Gc,1(x, xc,1) := ̺V0(x, xc) × ˆG(ˆθ)
1427
+ (45)
1428
+ for each (x, xc,1) ∈ X × Xc,1, and
1429
+ ˆG(ˆθ) := arg max
1430
+ g∈Ω+ǫB
1431
+ min
1432
+ θ∈Ω (θ − ˆθ)⊤Γ−1
1433
+ 1 (θ − ˆθ)
1434
+ − (θ − g)⊤Γ−1
1435
+ 1 (θ − g)
1436
+ for each ˆθ ∈ Ω + ǫB, is synergistic relative to A1 for (31)
1437
+ with robustness margin Ω and synergy gap exceeding δ.
1438
+ Proof. In Proposition 4 we demonstrate that the hybrid
1439
+ controller (κ1, V1,θ, Dc,1, Fc,1) is synergistic relative to A1,θ
1440
+ as required by Definition 3. It remains to be shown that
1441
+ the hybrid controller (κ1, V1, Dc,1, Fc,1, Gc,1) satisfies as-
1442
+ sumptions (C8), (C9) and (C10). To prove (C8), one must
1443
+ show that X × Xc,1 ⊂ dom V1,θ. From the definition of
1444
+ V1,θ in (38b), we have that dom V1,θ = dom V0 × (Ω +
1445
+ ǫB). It follows from the assumption that the hybrid con-
1446
+ troller (κ0, V0, Dc, Fc) is nominally synergistic relative to A
1447
+ for (31) that X × Xc ⊂ dom V0, hence X × Xc,1 ⊂ dom V1,θ.
1448
+ The function (x, xc,1, θ) �→ V1(x, xc,1, θ) := V1,θ(x, xc,1)
1449
+ is continuous because it results from the composition of
1450
+ continuous functions, hence (C8) holds.
1451
+ To prove (C9) and (C10), one must show that Gc,1 is outer
1452
+ semicontinuous, locally bounded and that it satisfies (25).
1453
+ Since Gc,1(x, xc,1) is the Cartesian product of ̺V0(x, xc)
1454
+ and ˆG(ˆθ) for each (x, xc,1) ∈ X × Xc,1 and ̺V0 is outer
1455
+ semicontinuous and locally bounded as proved in Lemma 1,
1456
+ to demonstrate that (C9) is satisfied it only remains to be
1457
+ shown that ˆG is outer semicontinuous and locally bounded.
1458
+ Let h(g, θ) := (θ − ˆθ)⊤Γ−1
1459
+ 1 (θ − ˆθ)− (θ − g)⊤Γ−1
1460
+ 1 (θ − g) for
1461
+ each (g, θ) ∈ (Ω+ ǫB)× Ω. Since h results from the compo-
1462
+ sition of continuous functions it is also continuous. It follows
1463
+ from the compactness of Ω and from [30, Theorem 9.14] that
1464
+ h(g) := min{h(g, θ) : θ ∈ Ω}
1465
+ ∀g ∈ Ω + ǫB
1466
+ (46)
1467
+ is continuous. Since Dc,1 is continuous and compact-valued,
1468
+ it follows from the continuity of (46) and [30, Theorem 9.14]
1469
+ that ˆG is compact-valued and upper semicontinuous. The
1470
+ remainder of the proof of outer semicontinuity and local
1471
+ boundedness of ˆG follows closely that of Lemma 1, thus
1472
+ it will be omitted.
1473
+ The fact that Gc,1 satisfies (25) follows from the obser-
1474
+ vations in Remark 6 by noticing that Ω and Ω + ǫB are
1475
+ convex and compact spaces and the function h, which can be
1476
+ 11
1477
+
1478
+ Submitted for publication
1479
+ rewritten as h(g, θ) = 2θ⊤Γ−1
1480
+ 1 (g − ˆθ) − g⊤Γ−1
1481
+ 1 g + ˆθ⊤Γ−1
1482
+ 1 ˆθ
1483
+ for each (g, θ) ∈ (Ω+ǫB)×Ω, is quasi-concave as a function
1484
+ of g and quasi-convex as a function of θ.
1485
+ The hybrid closed-loop system resulting from the intercon-
1486
+ nection between (κ1, V1, Dc,1, Fc,1, Gc,1) and (31) is given
1487
+ by:
1488
+ ( ˙x, ˙xc,1) ∈ Fcl,1(x, xc,1)
1489
+ (x, xc,1) ∈ CΩ,1
1490
+ (47a)
1491
+ (x+, x+
1492
+ c,1) ∈ GΩ,1(x, xc,1)
1493
+ (x, xc,1) ∈ DΩ,1
1494
+ (47b)
1495
+ where
1496
+ CΩ,1 :=
1497
+
1498
+ (x, xc,1) ∈ X × Xc,1 : min
1499
+ θ∈Ω µV1,θ(x, xc,1) ≤ δ(x, xc)
1500
+
1501
+ DΩ,1 :=
1502
+
1503
+ (x, xc,1) ∈ X × Xc,1 : min
1504
+ θ∈Ω µV1,θ(x, xc,1) ≥ δ(x, xc)
1505
+
1506
+ and
1507
+ GΩ,1(x, xc,1) :=
1508
+
1509
+ x
1510
+ Gc,1(x, xc,1)
1511
+
1512
+ ∀(x, xc,1) ∈ DΩ,1.
1513
+ (48)
1514
+ Global asymptotic stability of A1,θ for (47) follows from
1515
+ the application of Theorem 2 and it is summarized in the
1516
+ next corollary.
1517
+ Corollary 2. Suppose that the sets X, Xc, U, and the
1518
+ set-valued map Fθ in (31) satisfy Assumption 1, and that
1519
+ Assumption 2 holds. Given Ω in (32), a positive function
1520
+ δ : X × Xc �→ R, a compact set A ⊂ X × Xc, and a hybrid
1521
+ controller (κ0, V0, Dc, Fc) that is nominally synergistic rel-
1522
+ ative to A for (31) with synergy gap exceeding δ, for each
1523
+ θ ∈ Ω, the set A1,θ is globally asymptotically stable for (47).
1524
+ Proof. It follows from (43) that min{µV1,θ(x, xc,1) : θ ∈
1525
+ Ω} ≥ µV0(x, xc) for each (x, xc,1) ∈ Ψ1,θ\A1,θ. Since
1526
+ µV0(x, xc) > δ(x, xc) for each (x, xc,1) ∈ Ψ1,θ\A1,θ as
1527
+ shown in the proof of Proposition 4, and δ satisfies (D1), the
1528
+ conditions of Theorem 2 apply and we are able to conclude
1529
+ that A1,θ is globally asymptotically stable for (47).
1530
+ C. Backstepping
1531
+ Given a nominally synergistic controller (κ0, V0, Dc, Fc),
1532
+ we extend the dynamics of the controller in Section VI-B to
1533
+ include the input u as a controller state:6
1534
+ ˙xc,2 ∈ Fc,2(x, xc,2)
1535
+ :=
1536
+
1537
+
1538
+
1539
+
1540
+
1541
+ fc
1542
+ Γ1 Proj(υ(x, xc,2), ˆθ)
1543
+ fu(x, xc,2) + Dxc(κ1(x, xc,1))fc
1544
+
1545
+  : fc ∈ Fc(x, xc)
1546
+
1547
+
1548
+
1549
+ (49)
1550
+ with xc,2 := (xc,1, u) ∈ Xc,2 := Xc × (Ω + ǫB) × Rm,
1551
+ Γ2 ∈ Rm×m positive definite, ku > 0,
1552
+ υ(x, xc,2) := W(x, xc)⊤∇xV0(x, xc)
1553
+ − W(x, xc)⊤Dx(κ1(x, xc,1))⊤Γ−1
1554
+ 2 (u − κ1(x, xc,1))
1555
+ (50)
1556
+ 6Alternatively, one may consider u as a plant state rather than a controller
1557
+ state, in which case u would remain constant during jumps. We have
1558
+ included u as a controller variable because it is an approach less often
1559
+ found in the literature.
1560
+ for each (x, xc,2) ∈ X × Xc,2, and
1561
+ fu(x,xc,2) := −�
1562
+ W(x, xc)Γ1 Proj(υ(x, xc,2), ˆθ)
1563
+ − ku(u − κ1(x, xc,1)) − Γ2H(x, xc)⊤∇xV0(x, xc)
1564
+ + Dx(κ1(x, xc,1))F(x, xc, u, ˆθ)
1565
+ (51)
1566
+ which is defined for each (x, xc,2) ∈ X × Xc,2 assuming that
1567
+ κ0 is continuously differentiable and that F(x, xc, u, ˆθ) =
1568
+ Fˆθ(x, xc, u) denotes the dynamics (31) with θ is equal to the
1569
+ estimated value ˆθ.
1570
+ Given the compact set Ω of possible (unknown) values
1571
+ of θ in (32), a compact set A ⊂ X × Xc, and a nominal
1572
+ synergistic controller (κ0, V0, Dc, Fc) relative to A for (31)
1573
+ with synergy gap exceeding δ, the main goal of this section
1574
+ is to design a controller of the form (23) that is synergistic
1575
+ relative to A2 := {A2,θ}θ∈Ω for (31) with robustness margin
1576
+ Ω and synergy gap exceeding δ, where
1577
+ A2,θ := {(x, xc,2) ∈ X × Xc,2 : (x, xc,1) ∈ A1,θ,
1578
+ u = κ1(x, xc,1)}.
1579
+ (52)
1580
+ In this direction, we define the Lyapunov function
1581
+ V2,θ(x, xc,2) := V1,θ(x, xc,1)
1582
+ + 1
1583
+ 2(u − κ1(x, xc,1))⊤Γ−1
1584
+ 2 (u − κ1(x, xc,1))
1585
+ (53)
1586
+ for each (x, xc,2) ∈ X × Xc,2 and the set-valued map
1587
+ Dc,2(x, xc,2) := {(gc,1, gu) ∈ Xc,2 : gc,1 ∈ Dc,1(x, xc,1),
1588
+ gu = κ1(x, gc,1)}
1589
+ (54)
1590
+ for each (x, xc,2) ∈ X × Xc,2. The choice u = κ1(x, gc,1)
1591
+ in (54) may seem peculiar, but it turns out that this value
1592
+ minimizes (53) with respect to u, hence it is suitable for the
1593
+ jump logic.
1594
+ From the interconnection between (31) and the hybrid
1595
+ controller (κ2, V2,θ, Dc,2, Fc,2) with κ2(x, xc,2) = u for each
1596
+ (x, xc,2) ∈ X×Xc,2, we obtain the hybrid closed-loop system
1597
+ ( ˙x, ˙xc,2) ∈ Fcl,2(x, xc,2)
1598
+ (x, xc,2) ∈ C2
1599
+ := {(x, xc,2) ∈ X × Xc,2 : µV2,θ(x, xc,2) ≤ δ(x, xc)}
1600
+ (55a)
1601
+ (x+, x+
1602
+ c,2) ∈ Gcl,2(x, xc,2)
1603
+ (x, xc,2) ∈ D2
1604
+ := {(x, xc,2) ∈ X × Xc,2 : µV2,θ(x, xc,2) ≥ δ(x, xc)}
1605
+ (55b)
1606
+ where
1607
+ Fcl,2(x, xc,2) :=
1608
+ �Fθ(x, xc, u)
1609
+ Fc,2(x, xc,2)
1610
+
1611
+ ∀(x, xc,2) ∈ C2
1612
+ (56a)
1613
+ Gcl,2(x, xc,2) :=
1614
+
1615
+ x
1616
+ ̺V2,θ(x, xc,2)
1617
+
1618
+ ∀(x, xc,2) ∈ D2. (56b)
1619
+ 12
1620
+
1621
+ Submitted for publication
1622
+ Note
1623
+ that,
1624
+ from
1625
+ the
1626
+ definitions
1627
+ (12b)
1628
+ and
1629
+ (12c),
1630
+ we
1631
+ have
1632
+ the
1633
+ following
1634
+ identities
1635
+ for
1636
+ the
1637
+ hybrid
1638
+ controller (κ2, V2,θ, Dc,2, Fc,2):
1639
+ ̺V2,θ(x, xc,2) = {(gc,1, gu) ∈ Xc,2 : gc,1 ∈ ̺V1,θ(x, xc,1),
1640
+ gu = κ1(x, gc,1)},
1641
+ µV2,θ(x, xc,2) = µV1,θ(x, xc,1) + 1
1642
+ 2
1643
+ ���Γ
1644
+ − 1
1645
+ 2
1646
+ 2
1647
+ (u − κ1(x, xc,1))
1648
+ ���
1649
+ 2
1650
+ for each (x, xc,2) ∈ X × Xc,2,7; hence, similarly to (39), the
1651
+ closed-loop system (55) is impossible to implement due to
1652
+ dependence on θ in C2, D2, and Gcl,2, but, similarly to the
1653
+ controller of Section VI-B, this dependence will be removed
1654
+ with the design of a hybrid controller that is synergistic
1655
+ relative to A2 := {A2,θ}θ∈Ω for (31) with robustness margin
1656
+ Ω (cf. Remark 7).
1657
+ We are able to prove the following result using arguments
1658
+ similar to those of Proposition 4.
1659
+ Proposition 6. Suppose that the sets X, Xc, U, and the set-
1660
+ valued map Fθ in (31) satisfy Assumption 1, and that Assump-
1661
+ tion 2 holds. Given θ ∈ Ω, a compact set A ⊂ X ×Xc, and a
1662
+ hybrid controller (κ0, V0, Dc, Fc) that is nominally synergis-
1663
+ tic relative to A for (31) with synergy gap exceeding δ, if (42)
1664
+ is satisfied then the hybrid controller (κ2, V2,θ, Dc,2, Fc,2)
1665
+ is synergistic relative to A2,θ for (31) with synergy gap
1666
+ exceeding δ.
1667
+ Proof. Similarly to the proof of Proposition 4, it is possible
1668
+ to show that properties (C1), (C3) and (C5) follow directly
1669
+ from the fact that A2,θ is compact and from the assumption
1670
+ that (κ0, V0, Dc, Fc) is synergistic relative to A for (33).
1671
+ It follows from the continuity of Dc,1 and κ1 that Dc,2
1672
+ is continuous. That Dc,2 is compact-valued follows from
1673
+ compactness of Dc,1 and continuity of κ1, hence (C4) is
1674
+ satisfied. It remains to be shown that properties (C6) and (C7)
1675
+ also hold. It follows from (53) and (56a) that
1676
+ ∇V2,θ(x, xc,2)⊤fcl,2 = ∇V0(x, xc)⊤
1677
+ �Fθ(x, xc, u)
1678
+ fc
1679
+
1680
+ − (θ − ˆθ)⊤ Proj(υ(x, xc,2), ˆθ)
1681
+ + (u − κ1(x, xc,1))⊤Γ−1
1682
+ 2
1683
+
1684
+ fu(x, xc,2)
1685
+ − D(κ1(x, xc,1))
1686
+
1687
+
1688
+ Fθ(x, xc, u)
1689
+ fc
1690
+ Γ1 Proj(υ(x, xc,2), ˆθ)
1691
+
1692
+
1693
+
1694
+ (X2)
1695
+ for each (x, xc,2) ∈ X×Xc,2 and each fcl,2 ∈ Fcl,2(x, xc,2),
1696
+ where V2,θ is continuously differentiable and fc ∈ Fc(x, xc)
1697
+ is the component of fcl,2 that describes the dynamics of xc.
1698
+ 7Since Γ2 ∈ Rm×m is assumed to be positive definite, Γ
1699
+ − 1
1700
+ 2
1701
+ 2
1702
+ exists and
1703
+ is unique (cf. [34, Section 8.5]).
1704
+ Replacing (51) in (X2), we obtain
1705
+ ∇V2,θ(x, xc,2)⊤fcl,2 = ∇V0(x, xc)⊤
1706
+ �Fθ(x, xc, u)
1707
+ fc
1708
+
1709
+ − (θ − ˆθ)⊤ Proj(υ(x, xc,2), ˆθ)
1710
+ − ku(u − κ1(x, xc,1))⊤Γ−1
1711
+ 2 (u − κ1(x, xc,1))
1712
+ − (u − κ1(x, xc,1))⊤H(x, xc)⊤∇xV0(x, xc)
1713
+ − (u − κ1(x, xc,1))⊤Γ−1
1714
+ 2 Dx(κ1(x, xc,1))W(x, xc)(θ − ˆθ).
1715
+ (X3)
1716
+ It follows from (P3) and (X3) that
1717
+ ∇V2,θ(x, xc,2)⊤fcl,2 ≤ ∇V0(x, xc)⊤
1718
+ �Fθ(x, xc, u)
1719
+ fc
1720
+
1721
+ − (θ − ˆθ)⊤υ(x, xc,2)
1722
+ − ku(u − κ1(x, xc,1))⊤Γ−1
1723
+ 2 (u − κ1(x, xc,1))
1724
+ − (u − κ1(x, xc,1))⊤H(x, xc)⊤∇xV0(x, xc)
1725
+ − (u − κ1(x, xc,1))⊤Γ−1
1726
+ 2 Dx(κ1(x, xc,1))W(x, xc)(θ − ˆθ).
1727
+ (X4)
1728
+ Replacing (50) in (X4), we obtain
1729
+ ∇V2,θ(x, xc,2)⊤fcl,2 ≤ ∇V0(x, xc)⊤
1730
+ �Fθ(x, xc, u)
1731
+ fc
1732
+
1733
+ − (θ − ˆθ)⊤W(x, xc)⊤∇xV0(x, xc)
1734
+ − ku(u − κ1(x, xc,1))⊤Γ−1
1735
+ 2 (u − κ1(x, xc,1))
1736
+ − (u − κ1(x, xc,1))⊤H(x, xc)⊤∇xV0(x, xc).
1737
+ (X5)
1738
+ The control affine structure of (31) allows us to derive the
1739
+ following inequality from (X5):
1740
+ ∇V2,θ(x, xc,2)⊤fcl,2
1741
+ ≤ ∇V0(x, xc)⊤
1742
+ �Fθ(x, xc, κ1(x, xc,1))
1743
+ fc
1744
+
1745
+ − (θ − ˆθ)⊤W(x, xc)⊤∇xV0(x, xc)
1746
+ − ku(u − κ1(x, xc,1))⊤Γ−1
1747
+ 2 (u − κ1(x, xc,1)).
1748
+ (X6)
1749
+ Note that it was proved in Proposition 3 that
1750
+ ∇V0(x, xc)⊤(Fθ(x, xc, κ1(x, xc,1)) − W(x, xc)(θ − ˆθ))
1751
+ ≤ ∇V0(x, xc)⊤F0(x, xc, κ0(x, xc)),
1752
+ (X7)
1753
+ thus, from the assumption that (κ0, V0, Dc, Fc) is synergistic
1754
+ relative to A for (33), we have that
1755
+ ∇V2,θ(x, xc,2)⊤fcl,2 ≤ ∇V0(x, xc)⊤F0(x, xc, κ0(x, xc))
1756
+ − ku(u − κ1(x, xc,1))⊤Γ−1
1757
+ 2 (u − κ1(x, xc,1)) ≤ 0
1758
+ (57)
1759
+ for each (x, xc,2) ∈ X × Xc,2 satisfying V2,θ(x, xc,2) < +∞
1760
+ and each fcl,2 ∈ Fcl,2(x, xc,2), hence property (C6) is
1761
+ satisfied. Let Ψ2,θ denote the largest weakly invariant subset
1762
+ of
1763
+ ( ˙x, ˙xc,2) ∈ Fcl,2(x, xc,2)
1764
+ (x, xc) ∈ E2
1765
+ (58)
1766
+ with E2 := {(x, xc,2) ∈ X × Xc,2 : ∇V2,θ(x, xc,2)⊤fcl,2 = 0
1767
+ for some fcl,2
1768
+
1769
+ Fcl,2(x, xc,2)}.
1770
+ To
1771
+ verify
1772
+ that (κ2, V2,θ, Dc,2, Fc,2) is synergistic relative to A2,θ
1773
+ for (49), we need to check that δ2 := inf{µV2,θ(x, xc,2) :
1774
+ 13
1775
+
1776
+ Submitted for publication
1777
+ (x, xc,2) ∈ Ψ2,θ\A2,θ} > 0. It follows from (57) that Ψ2,θ ⊂
1778
+ {(x, xc,2) ∈ X × Xc,2 : (x, xc,1) ∈ Ψ1,θ, u = κ1(x, xc,1)}
1779
+ where Ψ1,θ is defined in Proposition 4. It follows from (52)
1780
+ that
1781
+ δ2 ≥ inf{µV2,θ(x, xc,2) : (x, xc,1) ∈ Ψ1,θ\A1,θ,
1782
+ u = κ1(x, xc,1)}
1783
+ = inf{µV1,θ(x, xc,1) : (x, xc,1) ∈ Ψ1,θ\A1,θ}
1784
+ (59)
1785
+ which we have shown in Proposition 4 to satisfy δ2 >
1786
+ 0, under assumption (42). In addition, µV2,θ(x, xc,2)
1787
+ =
1788
+ µV1,θ(x, xc,1) ≥ µV0(x, xc) > δ(x, xc) for each (x, xc,2) ∈
1789
+ Ψ2,θ\A2,θ, hence the hybrid controller (κ2, V2,θ, Dc,2, Fc,2)
1790
+ is synergistic relative to A2,θ for (31) with synergy gap
1791
+ exceeding δ.
1792
+ To finalize the design of a robust synergistic controller, we
1793
+ provide the construction of the jump map Gc,2 in the next
1794
+ proposition.
1795
+ Proposition 7. Suppose that the sets X, Xc, U, and the set-
1796
+ valued map Fθ in (31) satisfy Assumption 1, and that Assump-
1797
+ tion 2 holds. Given Ω in (32), a compact set A ⊂ X × Xc,
1798
+ and a hybrid controller (κ0, V0, Dc, Fc) that is nominally
1799
+ synergistic relative to A for (31) with synergy gap exceeding
1800
+ δ, A2 := {A2,θ}θ∈Ω with A2,θ in (52), V2 := {V2,θ}θ∈Ω with
1801
+ V2,θ in (53), the hybrid controller (κ2, V2, Dc,2, Fc,2, Gc,2)
1802
+ where
1803
+ Gc,2(x, xc,2) := {(gc,1, gu) ∈ Dc,2(x, xc,2) :
1804
+ gc,1 ∈ Gc,1(x, xc,1)}
1805
+ (60)
1806
+ for each (x, xc,2) ∈ X × Xc,2 is synergistic relative to A2
1807
+ for (31) with robustness margin Ω and synergy gap exceeding
1808
+ δ.
1809
+ Proof. In Proposition 6 we demonstrate that the hybrid
1810
+ controller (κ2, V2,θ, Dc,2, Fc,2) is synergistic relative to A2,θ
1811
+ with synergy gap exceeding δ as required by Definition 3.
1812
+ The proof that (C8) is satisfied follows closely the proof of
1813
+ Proposition 5, hence it is omitted here. The outer semicon-
1814
+ tinuity and local boundedness of Gc,2 follows from outer
1815
+ semicontinuity and local boundedness of Gc,1 in addition
1816
+ to the continuity of κ1, thus (C9) is verified. For each
1817
+ (x, xc,2) ∈ X × Xc,2 and for each gc,2 ∈ X2, we have that
1818
+ V2,θ(x, xc,2) − V2,θ(x, gc,2)
1819
+ ≥ min
1820
+ θ∈Ω V2,θ(x, xc,2) − V2,θ(x, gc,2).
1821
+ (61)
1822
+ From (60), it follows that gc,2
1823
+ := (gc,1, gu) with gc,1
1824
+ belonging to (45) and gu = κ1(x, gc,1). Replacing (53)
1825
+ in (61) and plugging in the aforementioned values of gc,1
1826
+ and gu, we have that
1827
+ V2,θ(x, xc,2) − V2,θ(x, gc,2)
1828
+
1829
+ max
1830
+ gc,1∈Dc,1(x,xc,1) min
1831
+ θ∈Ω V1,θ(x, xc,1) − V1,θ(x, gc,1)
1832
+ + 1
1833
+ 2(u − κ1(x, xc,1))⊤Γ−1
1834
+ 2 (u − κ1(x, xc,1))
1835
+ =
1836
+ max
1837
+ gc,2∈Dc,2(x,xc,2) min
1838
+ θ∈Ω V2,θ(x, xc,2) − V2,θ(x, gc,2)
1839
+ (62)
1840
+ for each (x, xc,2) ∈ X × Xc,2 and each gc,2 := (gc,1, gu) ∈
1841
+ Gc,2(x, xc,2). Since the max and min operators in (62)
1842
+ commute as shown in the proof of Proposition 5, it follows
1843
+ that
1844
+ V2,θ(x, xc,2) − V2,θ(x, gc,2) ≥ min
1845
+ θ∈Ω µV2,θ(x, xc,2)
1846
+ for each (x, xc,2) ∈ X × Xc,2 and each gc,2 := (gc,1, gu) ∈
1847
+ Gc,2(x, xc,2), thus verifying (C10).
1848
+ The hybrid closed-loop system resulting from the intercon-
1849
+ nection between (κ2, V2, Dc,2, Fc,2, Gc,2) and (31) is given
1850
+ by:
1851
+ ( ˙x, ˙xc,2) ∈ Fcl,2(x, xc,2)
1852
+ (x, xc,2) ∈ CΩ,2
1853
+ (63a)
1854
+ (x+, x+
1855
+ c,2) ∈ GΩ,2(x, xc,2)
1856
+ (x, xc,2) ∈ DΩ,2
1857
+ (63b)
1858
+ where
1859
+ CΩ,2 :=
1860
+
1861
+ (x, xc,2) ∈ X × Xc,2 : min
1862
+ θ∈Ω µV2,θ(x, xc,2) ≤ δ(x, xc)
1863
+
1864
+ DΩ,2 :=
1865
+
1866
+ (x, xc,2) ∈ X × Xc,2 : min
1867
+ θ∈Ω µV2,θ(x, xc,2) ≥ δ(x, xc)
1868
+
1869
+ and
1870
+ GΩ,2(x, xc,2) :=
1871
+
1872
+ x
1873
+ Gc,2(x, xc,2)
1874
+
1875
+ ∀(x, xc,2) ∈ DΩ,2.
1876
+ The global asymptotic stability of A2,θ for (63) follows
1877
+ from Theorem 2 and it is stated in the next corollary for
1878
+ the sake of completeness. The proof is omitted because it is
1879
+ identical to the proof of Corollary 2
1880
+ Corollary 3. Suppose that the sets X, Xc, U, and the
1881
+ set-valued map Fθ in (31) satisfy Assumption 1, and that
1882
+ Assumption 2 holds. Given Ω in (32), a positive function
1883
+ δ : X × Xc �→ R, a compact set A ⊂ X × Xc, and a hybrid
1884
+ controller (κ0, V0, Dc, Fc) that is nominally synergistic rel-
1885
+ ative to A for (31) with synergy gap exceeding δ, for each
1886
+ θ ∈ Ω, the set A2,θ is globally asymptotically stable for (63).
1887
+ In the next section, we apply the controllers proposed in
1888
+ Sections VI-B and VI-C to global asymptotic stabilization of
1889
+ a setpoint for a two-dimensional system in the presence of
1890
+ an obstacle.
1891
+ VII. SYNERGISTIC HYBRID FEEDBACK FOR ROBUST
1892
+ GLOBAL OBSTACLE AVOIDANCE
1893
+ To demonstrate the applicability of the synergistic adaptive
1894
+ controller of Section VI, we consider the problem of globally
1895
+ asymptotically stabilizing the origin for a vehicle moving on
1896
+ a plane with an obstacle N := z0 + rB with z0 ∈ R2 and
1897
+ r > 0 such that the origin is not contained in N. We consider
1898
+ that the evolution in time of the position z ∈ R2\N of the
1899
+ vehicle is described by
1900
+ ˙z = u + θ
1901
+ (64)
1902
+ where u ∈ R2 is the input and θ ∈ R2 is an unknown
1903
+ constant. We have shown in [7, Section IV] that ψ(z) :=
1904
+
1905
+ log(|z − z0| − r)
1906
+ z−z0
1907
+ |z−z0|
1908
+ �⊤
1909
+ is a diffeomorphism between
1910
+ 14
1911
+
1912
+ Submitted for publication
1913
+ R2\N and R × S1, hence global asymptotic stabilization
1914
+ of the origin for (64) is equivalent to the global asymptotic
1915
+ stabilization of ψ(0). for
1916
+ ˙x = Dψ(ψ−1(x))u + Dψ(ψ−1(x))θ.
1917
+ (65)
1918
+ with x ∈ X := R × S1. Before moving to the controller
1919
+ design, we show that Assumption 1 is verified for the
1920
+ particular problem at hand.
1921
+ Proposition 8. The sets X := R × S1, Xc := {−1, 1}, U :=
1922
+ R2 and the set-valued map
1923
+ Fθ(x, xc, u) := Dψ(ψ−1(x))u + Dψ(ψ−1(x))θ
1924
+ (66)
1925
+ defined for each (x, xc, u) ∈ X × Xc × U satisfies Assump-
1926
+ tion 1 and
1927
+ (⋆) The intersection between Fθ(x, xc, u) and the tan-
1928
+ gent space to X at (x, xc, u) is nonempty for each
1929
+ (x, xc, u) ∈ X × Xc × U.
1930
+ Proof. To check that the condition (S1) holds, note that the
1931
+ sets X, Xc and U are closed subsets of R3, R and R2,
1932
+ respectively. It follows from the fact that ψ is a diffeomor-
1933
+ phism between R2\N and R × S1 that Dψ(ψ−1(x)) is an
1934
+ isomorphism between the tangent space to R2\N at ψ−1(x)
1935
+ and the tangent space to R × S1 at x for each x ∈ X
1936
+ (cf. [29, Proposition 3.6]), thus (⋆) is verified. Since ψ is
1937
+ a diffeomorphism it also follows that x �→ Dψ(ψ−1(x))
1938
+ is continuous, thus Fθ is also continuous and single-valued,
1939
+ hence it verifies (S2).
1940
+ Remark 8. The condition (⋆) is pivotal in the verification of
1941
+ the conditions (VC) and (VC’) for this particular example,
1942
+ which, in turn, allows us to check the completeness of max-
1943
+ imal solutions as shown in Theorems 1 and 2, respectively.
1944
+ The controller design of Section VI requires the existence
1945
+ of a hybrid controller of the form (κ0, V0, Dc, Fc) that is
1946
+ nominally synergistic relative to
1947
+ A := {(x, q) ∈ X × Xc : x = ψ(0)}.
1948
+ (67)
1949
+ for (66), thus we start by showing that the controller provided
1950
+ in [7, Section IV] satisfies the requirements (C1)-(C7). In
1951
+ this direction, let the controller variable xc in (31) be a logic
1952
+ variable q which is either 1 or −1 and whose values does
1953
+ not change during flows, i.e., xc = q ∈ Xc := {−1, 1} and
1954
+ ˙q = Fc(x, q) := 0 for all (x, q) ∈ X × Xc which veri-
1955
+ fies (C2). Following the controller design of [7, Section IV],
1956
+ let φq(x) :=
1957
+ �x1
1958
+ x2
1959
+ 1−qx3
1960
+ �⊤ for each x := (x1, x2, x3) ∈
1961
+ Uq := {x ∈ X : qx3 ̸= 1} with q ∈ Xc := {−1, 1}.
1962
+ Furthermore, we define
1963
+ V0(x, q) :=
1964
+
1965
+
1966
+
1967
+ 1
1968
+ 2 |φq(x) − φq(ψ(0))|2
1969
+ if x ∈ Uq
1970
+ +∞
1971
+ otherwise
1972
+ (68)
1973
+ for each (x, q) ∈ X × Xc. Defining Dc(x, q) = Xc for
1974
+ each (x, q) ∈ X × Xc and noting that {(Uq, φq)}q∈Xc covers
1975
+ R × S1 we have that the optimization problem in (12) is
1976
+ feasible, hence assumption (C1) is verified. Since each chart
1977
+ φq : Uq → R2 is a diffeomorphism, φq(x) = φq(ψ(0)) if
1978
+ and only if x = ψ(0), hence V in (68) is positive definite
1979
+ relative to (67). Moreover, V0 is continuous and V −1
1980
+ 0
1981
+ ([0, c])
1982
+ is compact for each c ∈ R≥0, thus (C3) is verified. Since
1983
+ Dc is constant and equal to the finite set Xc for each
1984
+ (x, xc) ∈ X × Xc, we have that Dc is outer semicontinuous,
1985
+ lower semicontinuous and locally bounded, hence (C4) is
1986
+ verified. Condition (C5) is verified for
1987
+ κ0(x, q) = −
1988
+
1989
+ Dψ(ψ−1(x))
1990
+ �⊤ Dφq(x)⊤(φq(x) − φq(ψ(0)))
1991
+ for each (x, q) ∈ dom κ0 = {(x, q) ∈ X ×Xc : x ∈ Uq}. The
1992
+ previous arguments allow us to make the following assertion.
1993
+ Proposition
1994
+ 9.
1995
+ Given
1996
+ A
1997
+ in
1998
+ (67),
1999
+ the
2000
+ hybrid
2001
+ con-
2002
+ troller (κ0, V0, Dc, Fc) is a synergistic candidate relative to
2003
+ A in (67) for (65).
2004
+ Even though (68) is continuous, it is not Lipschitz contin-
2005
+ uous everywhere, hence the proof that (C6) holds might not
2006
+ be immediately obvious. From (12c) and using the fact that
2007
+ Dc(x, q) := Xc := {−1, 1} for each (x, q) ∈ X × Xc, we
2008
+ have that µV0(x, q) = max{0, V0(x, q)−V0(x, −q)} for each
2009
+ (x, q) ∈ X × Xc and, in particular, we have that µV0(x, q) =
2010
+ +∞ for each (x, q) ̸∈ Uq, hence, for any function δ, it
2011
+ follows that each (x, q) ∈ X×Xc satisfying (x, q) ∈ Uq does
2012
+ not belong to C. Since Uq is open relative to X := R × S1
2013
+ for each q ∈ Xc, {(x, q) ∈ X × Xc : x ∈ X\Uq} and C are
2014
+ disjoint closed sets, and there exists a neighborhood of C
2015
+ where V0 is Lipschitz continuous. The generalized derivative
2016
+ of V0 at (x, q) is the direction Fcl,0(x, q) is given by
2017
+ V ◦
2018
+ 0 (x, q; Fcl,0(x, q)) =
2019
+
2020
+ ��Dψ(ψ−1(x))⊤Dφq(x)⊤(φq(x) − φq(ψ(0)))
2021
+ ��2 ,
2022
+ (69)
2023
+ for each (x, q) ∈ C, where Fcl,0 is the flow map for
2024
+ the closed-loop system resulting from the interconnection
2025
+ between (κ0, V0, Dc, Fc) and (65) with θ = 0 (cf. (15)). It
2026
+ follows from (69) that the growth of V0 along the flows of
2027
+ the closed-loop system is upper bounded by 0, hence (C6)
2028
+ is verified. It follows from the fact that ψ and {φq}q∈Xc
2029
+ are diffeomorphisms that Assumption (C7) is satisfied with
2030
+ Ψ = A (cf. [7]), thus the following holds.
2031
+ Proposition 10. Given A in (67) and a continuous function
2032
+ δ : X × Xc → R, the hybrid controller (κ0, V0, Dc, Fc)
2033
+ is nominally synergistic relative to A in (67) for (65) with
2034
+ synergy gap exceeding δ.
2035
+ An additional property of the kind of synergistic feedback
2036
+ presented above is that any function δ satisfies (D2) since
2037
+ Ψ\A = ∅. Therefore, any choice of δ satisfying (D1) yields
2038
+ global asymptotic stability for the hybrid closed-loop system
2039
+ as proved in Theorem 1. Since Assumption 2 is satisfied,
2040
+ we meet all the requirements for the controller design of
2041
+ Section VI, thus it is only a matter of applying the procedures
2042
+ described therein to obtain an adaptive synergistic hybrid
2043
+ feedback controller that is able to deal with parametric
2044
+ uncertainty. In the next section, we present some numerical
2045
+ results that illustrate the behaviour of the closed-loop system.
2046
+ 15
2047
+
2048
+ Submitted for publication
2049
+ PSfrag replacements
2050
+ N
2051
+ z1
2052
+ z2
2053
+ −0.5
2054
+ 0
2055
+ 0.5
2056
+ 1
2057
+ 1.5
2058
+ 2
2059
+ 2.5
2060
+ −1
2061
+ −0.5
2062
+ 0
2063
+ 0.5
2064
+ 1
2065
+ 1.5
2066
+ 2
2067
+ Section VI-B with q(0, 0) = −1
2068
+ Section VI-B with q(0, 0) = 1
2069
+ Section VI-C with q(0, 0) = −1
2070
+ Section VI-C with q(0, 0) = 1
2071
+ Fig. 1.
2072
+ Trajectories t �→ z(t) of (64) for the closed-loop system with
2073
+ parameters given in Section VII-A.
2074
+ A. Simulation Results
2075
+ In this section, we present simulation results of the closed-
2076
+ loop system resulting from the interconnection between (65)
2077
+ and the hybrid controllers that are presented in Section VI
2078
+ considering that there is an obstacle N := z0 + rB with
2079
+ z0 =
2080
+
2081
+ 1
2082
+ 0
2083
+ �⊤ and r = 0.5. Furthermore, we consider that
2084
+ θ =
2085
+ �√
2086
+ 2/2
2087
+
2088
+ 2/2
2089
+ �⊤ and that the controller parameters are
2090
+ ku = 1, Γ1 = Γ2 = I2, ǫ = 1, θ0 = 1, and δ(x, q) = 1 for
2091
+ each (x, q) ∈ X × Xc. For this particular choice of Γ1, we
2092
+ have that
2093
+ ˆG(ˆθ) =
2094
+
2095
+
2096
+
2097
+ ˆθ
2098
+ if
2099
+ ���ˆθ
2100
+ ��� ≤ θ0
2101
+ θ0
2102
+ ˆθ
2103
+ |ˆθ|
2104
+ otherwise
2105
+ for each ˆθ ∈ Ω + ǫB, which is outer semicontinuous and
2106
+ locally bounded.
2107
+ Figure 1 represents the trajectory of the vehicle starting
2108
+ from rest at z(0) =
2109
+ �2
2110
+ 0�⊤ for each of the controllers
2111
+ presented in Section VI. It can be verified both through
2112
+ Figure 1 as well as Figure 2 that the trajectories before and
2113
+ after backstepping are comparable, since the evolution of
2114
+ the distance of the vehicle to the desired setpoint is fairly
2115
+ similar in both cases. The bottom half of Figure 2 depicts
2116
+ the evolution of the estimation error, which has a smaller
2117
+ settling time for the closed-loop system with the controller
2118
+ of Section VI-C than the controller of Section VI-B for this
2119
+ particular simulation. To find out more about the simulation
2120
+ and its implementation, you may explore the source code at
2121
+ https://github.com/pcasau/synergistic.
2122
+ PSfrag replacements
2123
+ t
2124
+ ���ˆθ(t) − θ
2125
+ ���
2126
+ |z(t)|
2127
+ 0
2128
+ 1
2129
+ 2
2130
+ 3
2131
+ 4
2132
+ 5
2133
+ 6
2134
+ 7
2135
+ 8
2136
+ 9
2137
+ 10
2138
+ 0
2139
+ 0.2
2140
+ 0.4
2141
+ 0.6
2142
+ 0.8
2143
+ 1
2144
+ 1.2
2145
+ 0
2146
+ 0.5
2147
+ 1
2148
+ 1.5
2149
+ 2
2150
+ 2.5
2151
+ Section VI-B with q(0, 0) = −1
2152
+ Section VI-B with q(0, 0) = 1
2153
+ Section VI-C with q(0, 0) = −1
2154
+ Section VI-C with q(0, 0) = 1
2155
+ Fig. 2. Evolution in time of the distance to the origin (top) and the parametric
2156
+ estimation error (bottom) for the closed-loop system with parameters given
2157
+ in Section VII-A.
2158
+ VIII. CONCLUSION
2159
+ Synergistic hybrid feedback has taken many forms over
2160
+ the years, depending on the particular dynamical system
2161
+ being studied. The unifying framework for synergistic hybrid
2162
+ feedback that we presented in this paper captures the most
2163
+ salient features of existing synergistic hybrid feedbacks in
2164
+ order to help others distinguish between the particular and the
2165
+ general in different instances of synergistic hybrid feedback
2166
+ across the literature. In addition, we provided a controller
2167
+ design that starts from an existing synergistic controller
2168
+ and modified it in order to yield an adaptive controller
2169
+ that is able to compensate for the presence of bounded
2170
+ matched uncertainties in affine control systems. Furthermore,
2171
+ we demonstrated that the proposed controller is amenable to
2172
+ backstepping and can be applied to the problem of global
2173
+ obstacle avoidance.
2174
+ REFERENCES
2175
+ [1] S. P. Bhat and D. S. Bernstein, “A topological obstruction to con-
2176
+ tinuous global stabilization of rotational motion and the unwinding
2177
+ phenomenon,” Systems and Control Letters, vol. 39, no. 1, pp. 63–70,
2178
+ 2000.
2179
+ [2] C. G. Mayhew and A. Teel, “On the topological structure of attraction
2180
+ basins for differential inclusions,” Systems and Control Letters, vol. 60,
2181
+ no. 12, pp. 1045–1050, 2011.
2182
+ [3] C. Mayhew, R. Sanfelice, and A. Teel, “Quaternion-Based Hybrid
2183
+ Control for Robust Global Attitude Tracking,” IEEE Transactions on
2184
+ Automatic Control, vol. 56, no. 11, pp. 2555–2566, 2011.
2185
+ [4] C. G. Mayhew, R. G. Sanfelice, and A. R. Teel, “Synergistic Lyapunov
2186
+ functions and backstepping hybrid feedbacks,” in Proceedings of the
2187
+ 2011 American Control Conference, pp. 3203–3208, 2011.
2188
+ [5] J.-Y. Wen and K. Kreutz-Delgado, “The attitude control problem,”
2189
+ IEEE Transactions on Automatic Control, vol. 36, no. 10, pp. 1148–
2190
+ 1162, 1991.
2191
+ [6] H. Nakamura and Y. Satoh, “´Etale Synergistic Hybrid Control Design
2192
+ for Asymptotic Stabilization on Manifold via Minimum Projection
2193
+ Method,” in Proceedings of the IEEE Conference on Decision and
2194
+ Control, pp. 2354–2359, IEEE, 2019.
2195
+ [7] P. Casau, R. Cunha, R. G. Sanfelice, and C. Silvestre, “Hybrid
2196
+ Control for Robust and Global Tracking on a Smooth Manifold,” IEEE
2197
+ Transactions on Automatic Control, vol. 65, no. 5, pp. 1870–1875,
2198
+ 2020.
2199
+ 16
2200
+
2201
+ Submitted for publication
2202
+ [8] C. G. Mayhew and A. R. Teel, “Global asymptotic stabilization of
2203
+ the inverted equilibrium manifold of the 3-D pendulum by hybrid
2204
+ feedback,” in Proceedings of the 49th IEEE Conference on Decision
2205
+ and Control, pp. 679–684, IEEE, 2010.
2206
+ [9] S. Berkane and A. Tayebi, “Construction of Synergistic Potential
2207
+ Functions on SO(3) with Application to Velocity-Free Hybrid Attitude
2208
+ Stabilization,” IEEE Transactions on Automatic Control, vol. 62, no. 1,
2209
+ 2017.
2210
+ [10] P. Casau, R. Sanfelice, R. Cunha, and C. Silvestre, “A globally asymp-
2211
+ totically stabilizing trajectory tracking controller for fully actuated rigid
2212
+ bodies using landmark-based information,” International Journal of
2213
+ Robust and Nonlinear Control, vol. 25, no. 18, 2015.
2214
+ [11] P. Casau, R. Sanfelice, R. Cunha, D. Cabecinhas, and C. Silvestre, “Ro-
2215
+ bust global trajectory tracking for a class of underactuated vehicles,”
2216
+ Automatica, vol. 58, pp. 90–98, 2015.
2217
+ [12] E. A. Basso, H. M. Schmidt-Didlaukies, K. Y. Pettersen, and A. J.
2218
+ Sorensen, “Global Asymptotic Tracking for Marine Vehicles using
2219
+ Adaptive Hybrid Feedback,” IEEE Transactions on Automatic Control,
2220
+ 2022.
2221
+ [13] C. G. Mayhew and A. R. Teel, “Synergistic Hybrid Feedback for
2222
+ Global Rigid-Body Attitude Tracking on SO(3),” IEEE Transactions
2223
+ on Automatic Control, vol. 58, no. 11, pp. 2730–2742, 2013.
2224
+ [14] T. Lee, “Global Exponential Attitude Tracking Controls on SO(3),”
2225
+ IEEE Transactions on Automatic Control, vol. 60, no. 10, pp. 2837–
2226
+ 2842, 2015.
2227
+ [15] T. Rybus, “Obstacle avoidance in space robotics: Review of major
2228
+ challenges and proposed solutions,” Progress in Aerospace Sciences,
2229
+ vol. 101, pp. 31–48, 2018.
2230
+ [16] N. Malone, H.-T. Chiang, K. Lesser, M. Oishi, and L. Tapia, “Hybrid
2231
+ Dynamic Moving Obstacle Avoidance Using a Stochastic Reachable
2232
+ Set-Based Potential Field,” IEEE Transactions on Robotics, vol. 33,
2233
+ no. 5, 2017.
2234
+ [17] A. Bloch, M. Camarinha, and L. J. Colombo, “Dynamic interpolation
2235
+ for obstacle avoidance on Riemannian manifolds,” International Jour-
2236
+ nal of Control, vol. 94, no. 3, pp. 588–600, 2021.
2237
+ [18] D. E. Koditschek and E. Rimon, “Robot navigation functions on
2238
+ manifolds with boundary,” Advances in Applied Mathematics, vol. 11,
2239
+ no. 4, pp. 412–442, 1990.
2240
+ [19] R. Sanfelice, M. Messina, S. Emre Tuna, and A. Teel, “Robust hybrid
2241
+ controllers for continuous-time systems with applications to obstacle
2242
+ avoidance and regulation to disconnected set of points,” in Proceedings
2243
+ of the 2006 American Control Conference, pp. 3352–3357, 2006.
2244
+ [20] S. Berkane, A. Bisoffi, and D. V. DImarogonas, “A hybrid con-
2245
+ troller for obstacle avoidance in an n-dimensional euclidean space,” in
2246
+ Proceedings of the18th European Control Conference, pp. 764–769,
2247
+ EUCA, 2019.
2248
+ [21] M. Marley, R. Skjetne, and A. R. Teel, “Synergistic control barrier
2249
+ functions with application to obstacle avoidance for nonholonomic ve-
2250
+ hicles,” in Proceedings of the American Control Conference, pp. 243–
2251
+ 249, American Automatic Control Council, 2021.
2252
+ [22] S. Berkane, A. Abdessameud, and A. Tayebi, “Hybrid Attitude and
2253
+ Gyro-Bias Observer Design on SO(3),” IEEE Transactions on Auto-
2254
+ matic Control, vol. 62, no. 11, pp. 6044–6050, 2017.
2255
+ [23] T. Strizic, J. I. Poveda, and A. Teel, “Hybrid gradient descent for robust
2256
+ global optimization on the circle,” in Proceedings of the 56th Annual
2257
+ Conference on Decision and Control, pp. 2985–2990, 2017.
2258
+ [24] P. Casau, R. Sanfelice, and C. Silvestre, “Adaptive backstepping of
2259
+ synergistic hybrid feedbacks with application to obstacle avoidance,”
2260
+ in Proceedings of the 2019 American Control Conference, 2019.
2261
+ [25] P. Casau, R. Sanfelice, and C. Silvestre, “Robust Synergistic Hybrid
2262
+ Feedback,” ArXiV, 2022.
2263
+ [26] F. H. Clarke, Optimization and Nonsmooth Analysis.
2264
+ Philadelphia:
2265
+ SIAM, 1987.
2266
+ [27] R. Goebel, R. Sanfelice, and A. Teel, Hybrid Dynamical Systems:
2267
+ Modeling, Stability, and Robustness. Princeton University Press, 2012.
2268
+ [28] R. G. Sanfelice, Hybrid Feedback Control. Princeton, NJ: Princeton
2269
+ University Press, 2021.
2270
+ [29] J. M. Lee, Introduction to Topological Manifolds, vol. 202 of Graduate
2271
+ Texts in Mathematics. New York, NY: Springer New York, 2000.
2272
+ [30] R. Sundaram, A First Course in Optimization Theory. New York, USA:
2273
+ Cambridge University Press, 20th ed., 1996.
2274
+ [31] M. Sion, “On General Minimax Theorems,” Pacific Journal of Math-
2275
+ ematics, vol. 8, no. 1, 1958.
2276
+ [32] J. Zhou, C. Wen, and C. Zhang, Adaptive backstepping control of
2277
+ uncertain chaotic systems. Springer, 2008.
2278
+ [33] Z. Cai, M. S. Queiroz, and D. M. Dawson, “A sufficiently smooth
2279
+ projection operator,” IEEE Transactions on Automatic Control, vol. 51,
2280
+ no. 1, pp. 135–139, 2006.
2281
+ [34] D. S. Bernstein, Matrix Mathematics. Princeton, NJ: Princeton Uni-
2282
+ versity Press, 2009.
2283
+ Pedro Casau is a Research Fellow at the Institute
2284
+ for Systems and Robotics, Lisbon, Portugal. He re-
2285
+ ceived the B.Sc. in Aerospace Engineering in 2008
2286
+ from Instituto Superior T´ecnico (IST), Lisbon, Por-
2287
+ tugal. In 2010, he received the M.Sc. in Aerospace
2288
+ Engineering from IST and enrolled in the Elec-
2289
+ trical and Computer Engineering Ph.D. program
2290
+ at the same institution which he completed with
2291
+ distinction and honours in 2016. He participated on
2292
+ several national and international research projects
2293
+ on guidance, navigation and control of unmanned
2294
+ air vehicles (UAVs) and satellites. His current research interests include
2295
+ nonlinear control, hybrid control systems, vision-based control systems,
2296
+ controller design for autonomous air-vehicles.
2297
+ Ricardo G. Sanfelice received the B.S. degree
2298
+ in Electronics Engineering from the Universidad
2299
+ de Mar del Plata, Buenos Aires, Argentina, in
2300
+ 2001, and the M.S. and Ph.D. degrees in Electrical
2301
+ and Computer Engineering from the University
2302
+ of California, Santa Barbara, CA, USA, in 2004
2303
+ and 2007, respectively. In 2007 and 2008, he held
2304
+ postdoctoral positions at the Laboratory for Infor-
2305
+ mation and Decision Systems at the Massachusetts
2306
+ Institute of Technology and at the Centre Automa-
2307
+ tique et Syst`emes at the ´Ecole de Mines de Paris. In
2308
+ 2009, he joined the faculty of the Department of Aerospace and Mechanical
2309
+ Engineering at the University of Arizona, Tucson, AZ, USA, where he
2310
+ was an Assistant Professor. In 2014, he joined the University of California,
2311
+ Santa Cruz, CA, USA, where he is currently Professor in the Department
2312
+ of Electrical and Computer Engineering. Prof. Sanfelice is the recipient of
2313
+ the 2013 SIAM Control and Systems Theory Prize, the National Science
2314
+ Foundation CAREER award, the Air Force Young Investigator Research
2315
+ Award, the 2010 IEEE Control Systems Magazine Outstanding Paper Award,
2316
+ and the 2020 Test-of-Time Award from the Hybrid Systems: Computation
2317
+ and Control Conference. He is Associate Editor for Automatica and a
2318
+ Fellow of the IEEE. His research interests are in modeling, stability, robust
2319
+ control, observer design, and simulation of nonlinear and hybrid systems
2320
+ with applications to power systems, aerospace, and biology.
2321
+ Carlos Silvestre received the Licenciatura degree
2322
+ in Electrical Engineering from the Instituto Supe-
2323
+ rior Tecnico (IST) of Lisbon, Portugal, in 1987 and
2324
+ the M.Sc. degree in Electrical Engineering and the
2325
+ Ph.D. degree in Control Science from the same
2326
+ school in 1991 and 2000, respectively. In 2011 he
2327
+ received the Habilitation in Electrical Engineering
2328
+ and Computers also from IST. Since 2000, he
2329
+ is with the Department of Electrical Engineering
2330
+ of the Instituto Superior Tecnico, where he is
2331
+ currently an Associate Professor of Control and
2332
+ Robotics on leave. Since 2015 he is a Professor of the Department of Electri-
2333
+ cal and Computers Engineering of the Faculty of Science and Technology of
2334
+ the University of Macau. Over the past years, he has conducted research on
2335
+ the subjects of navigation, guidance and control of air and ocean robots. His
2336
+ research interests include linear and nonlinear control theory, hybrid control,
2337
+ sensor based control, coordinated control of multiple vehicles, networked
2338
+ control systems, fault detection and isolation, and fault tolerant control.
2339
+ 17
2340
+
WdAyT4oBgHgl3EQfWPcy/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ZNE1T4oBgHgl3EQfcgRM/content/tmp_files/2301.03184v1.pdf.txt ADDED
@@ -0,0 +1,1916 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03184v1 [math.RT] 9 Jan 2023
2
+ G-SPECTRA OF CYCLIC DEFECT
3
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
4
+ Abstract. Brou´e’s Abelian Defect Conjecture predicts interesting derived
5
+ equivalences between derived categories of modular representations of finite
6
+ groups. We investigate a generalization of Brou´e’s Conjecture to ring spectrum
7
+ coefficients and prove this generalization in the cyclic defect case, following an
8
+ argument of Rouquier.
9
+ Contents
10
+ 1.
11
+ Introduction
12
+ 1
13
+ 2.
14
+ Brou´e’s Conjecture over ring spectra
15
+ 2
16
+ 3.
17
+ Associative algebras, modules, and bimodules in spectra
18
+ 9
19
+ 4.
20
+ Permutation modules and Rouquier’s equivalence over S
21
+ 24
22
+ References
23
+ 33
24
+ 1. Introduction
25
+ Representation theory behaves significantly differently depending on whether the
26
+ ground field has characteristic 0 or characteristic p. Since more general rings, like
27
+ the p-adic integers Zp, in some sense interpolate between characteristics 0 and p,
28
+ the study of representations on modules over such rings plays an important role in
29
+ modular representation theory.
30
+ In this paper, we investigate representations over an even more general class of
31
+ rings that arises in algebraic topology, called ring spectra. Ordinary commutative
32
+ rings are ring spectra, but ring spectra also include differential graded algebras, as
33
+ well as non-algebraic objects such as (to name two of many) the one that repre-
34
+ sents complex K-theory and the one that represents the stable homotopy groups
35
+ of spheres. In a way, enlarging the class of rings makes the “interpolation between
36
+ characteristics 0 and p” more finely resolved. There is a rich theory and we hope
37
+ that the tools and concepts of that theory could be applied to make progress on
38
+ representation-theoretic questions, even on classical problems that have nothing
39
+ to do with algebraic topology. We review some of this theory, and some of its
40
+ precedent applications to other areas, in §2.4.
41
+ Conversely, some of those representation-theoretic questions suggest very natural
42
+ questions in algebraic topology that have seemingly not been considered before. In
43
+ this paper, we attend to one such question, Brou´e’s Abelian Defect Conjecture
44
+ [Bro90]. It predicts that the derived categories of mod p or p-adic representations
45
+ of a finite group G and of a normalizer subgroup NG(D) have direct factors in
46
+ common when D is (1) abelian of p-power order and (2) a defect group of one of
47
+ the mod p blocks of G. We review it in greater detail in §2.1–2.3.
48
+ 1
49
+
50
+ 2
51
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
52
+ For thirty years Brou´e’s Conjecture has been a guiding problem in modular
53
+ representation theory.
54
+ The purpose of this paper is to formulate the analogous
55
+ problem with p-adic rings replaced by p-complete ring spectra: do the categories
56
+ of p-complete G-spectra and of p-complete NG(D)-spectra have direct factors in
57
+ common?
58
+ In §4.6 we show that the original Brou´e conjecture is a consequence of our spec-
59
+ trum version. We hope that the original conjecture could be attacked by apply-
60
+ ing some of the tools and concepts of stable homotopy theory: the Segal Con-
61
+ jecture/Carlsson’s Theorem, Tate fixed points/Frobenius, organizing by chromatic
62
+ level, etc.; we discuss these further in §2.4, §3.10–3.12, §4.4. However, this hope is
63
+ not realized in this paper. Before pursuing it very seriously, it is natural to first
64
+ ask if there is any evidence that the spectrum version is true.
65
+ In §4, we prove our spectrum version when D is cyclic. The result does not
66
+ illuminate the original form of the Brou´e conjecture, which has been known for a
67
+ long time in the cyclic defect case. Different proofs have been given by Rickard
68
+ and by Rouquier. Both arguments end in the construction of “tilting complexes”
69
+ of (G, NG(D))-bimodules that implement the derived equivalence. In general there
70
+ are many obstructions to lifting a tilting complex to a G × NG(D)op-spectrum.
71
+ We deduce the desired equivalence of categories by showing that Rouquier’s tilting
72
+ complex does lift.
73
+ Acknowledgements. The authors would like to thank Robert Burklund and Jay
74
+ Taylor for helpful conversations. The first author was supported by NSF grant DMS
75
+ 1902927. The third author was supported in part by NSF grant DMS-2002029.
76
+ 2. Brou´e’s Conjecture over ring spectra
77
+ 2.1. Review of modular representation theory. This is a paper about finite
78
+ group actions on p-complete spectra, but we will start this extended introduction
79
+ by reviewing an example and some of the theory of finite group actions on p-adic
80
+ abelian groups. Three basic questions in modular representation theory are:
81
+ (1) What are the simple representations over a p-adic field of characteristic 0?
82
+ (2) What are the simple representations over a finite field of characteristic p?
83
+ (3) What are the projective representations in characteristic p, or over a p-adic
84
+ ring of integers?
85
+ The answer to these questions, and some information about blocks, defects, and
86
+ Brauer trees, are given below in the case G = PSL2(F7) and p = 7. We will use
87
+ this example to illustrate some of the concepts of modular representation theory.
88
+ Conventionally, one chooses the coefficient rings and fields to have sufficiently
89
+ many roots of unity. We wish to avoid adding pth roots of unity (or 4th roots when
90
+ p = 2) to our coefficients for algebraic topology reasons we’ll come to later §2.4.
91
+ We describe the representation theory of PSL2(F7) over Z7 and Q7.
92
+ 2.1.1. Irreducible Q7[PSL2(F7)]-modules. Let G = PSL2(F7) be the simple group
93
+ of order 168 and let p = 7. There are 5 irreducible representations of G on Q7-vector
94
+ spaces that we will call
95
+ 1, 7, 8, 6 and 33
96
+ of dimensions 1, 7, 8, 6, and 6 respectively.
97
+
98
+ G-SPECTRA OF CYCLIC DEFECT
99
+ 3
100
+ The trivial representation is 1; the other representations have names coming from
101
+ the theory of SL2: 7 is the Steinberg representation, 8 is in the principal series, the
102
+ two 6-dimensional representations are in the discrete series.
103
+ The representations 1, 7, 8, and 6 are all absolutely irreducible but if we adjoin
104
+ √−7 or
105
+ 7√
106
+ 1 to Q7, the representation 33 splits as a sum of two 3-dimensional
107
+ representations.
108
+ 2.1.2. Simple and indecomposable projective Z7[PSL2(F7)]-modules. The theory of
109
+ projective covers gives a bijection between the simple and the indecomposable pro-
110
+ jective Zp[G]-modules. Over Z7, there are four indecomposable projective PSL2(F7)-
111
+ representations: a lattice in 7, a lattice in 1 ⊕ 6, a lattice in 6 ⊕ 8, and a lattice in
112
+ 8 ⊕ 33.
113
+ The simple quotients of these modules are F7-vector spaces of dimensions 7, 1, 5,
114
+ and 3, respectively; they don’t play a prominent role in this section, and in general
115
+ simple modules don’t play a prominent role in this paper.
116
+ 2.1.3. Blocks. If G is any finite group and p is any prime, then the group algebra
117
+ Zp[G] is a product of associative rings called block algebras:
118
+ (2.1.1)
119
+ Zp[G] = Zp[G]b1 × Zp[G]b2 × · · ·
120
+ The way direct products of rings work, every Zp[G]-module M is canonically a
121
+ direct sum of modules for the block algebras
122
+ M = Mb1 ⊕ Mb2 ⊕ · · ·
123
+ The notation Mbi means M is a module for Zp[G]bi. We say that “M belongs to
124
+ the block bi” if M = Mbi.
125
+ Any indecomposable Zp[G]-module belongs to a single block.
126
+ All the Zp[G]-
127
+ lattices in an irreducible Qp[G]-module belong to the same block. Thus, the blocks
128
+ partition the set of irreducible Qp[G]-modules. One way to name or classify the
129
+ blocks of G is by describing this partition. For example, there are two blocks of
130
+ Z7[PSL2(F7)] and they are labeled by
131
+ (2.1.2)
132
+ {1, 8, 6, 33} and {7}
133
+ In general the block containing the trivial representation is called the principal
134
+ block. When G = PSL2(F7), we can call the other block the Steinberg block, since
135
+ the only finitely generated indecomposable module that belongs to it is a lattice in
136
+ the Steinberg representation 7.
137
+ 2.1.4. Defect groups and a Brauer tree. “Defects” are invariants of blocks.
138
+ A block b has defect zero if there’s only one irreducible Qp[G]-module that be-
139
+ longs to b and every lattice in that irreducible module is projective. For instance,
140
+ the Steinberg block has defect zero. A block of defect zero is categorically and
141
+ homologically boring — its category of modules is the same as the category of
142
+ modules over Zp, or of a division ring over Zp.
143
+ Groups whose p-Sylow is of order p furnish the basic examples of blocks of defect
144
+ one. The principal block of such a group has defect one. For instance the principal
145
+ block of PSL2(F7) (labeled {1, 8, 6, 33} in (2.1.2)) is a block of defect one.
146
+ Brauer observed a “tree” structure in the decomposition matrix of a block of
147
+ defect one.
148
+ The decomposition matrix records how the indecomposable projec-
149
+ tive Zp[G]-modules break up into irreducible Qp[G]-modules. Brauer showed that,
150
+
151
+ 4
152
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
153
+ sticking to modules in a block of defect one, this matrix is the incidence matrix of
154
+ a tree.
155
+ For example, the Brauer tree of the principal block of PSL2(F7) is
156
+ (2.1.3)
157
+ 1
158
+ 6
159
+ 8
160
+ 33
161
+ Its vertices are labeled by the irreducible Q7[PSL2(F7)]-modules in the principal
162
+ block. It is natural to label its edges by the indecomposable projective Z7[PSL2(F7)]-
163
+ modules: if P ⊗ Q7 splits up as M ⊕ N, draw an edge between M and N.
164
+ In general the “defect” of a block is more detailed information than a num-
165
+ ber n; it is a conjugacy class of subgroups of G of order pn.
166
+ A simple way to
167
+ characterize the defect group is as follows: the defect group of b is the smallest
168
+ p-subgroup Q ⊂ G such that every module M belonging to b is a direct summand
169
+ of IndG
170
+ Q(a Zp[Q]-module).
171
+ 2.1.5. Coefficients. In our running example of PSL2(F7), Brou´e’s conjecture (to be
172
+ introduced below) is easy to check over Z7. But in general we will need to consider
173
+ a larger coefficient system.
174
+ Let O be a finite extension of Zp whose fraction field K has characteristic 0
175
+ and whose residue field k has characteristic p. Sometimes modular representation
176
+ theorists call the triple (K, O, k) a “p-modular system.” We will take a triple of
177
+ the following form:
178
+ • k = Fq contains a primitive nth root of unity whenever G has an element
179
+ of order n which is prime to p.
180
+ • O = Zq is the ring of Witt vectors of k. (This is the minimal extension of
181
+ Zp with residue field Fq.)
182
+ • K = Qq is the fraction field of O.
183
+ Remark 2.1.1. The reduction map O[G] → k[G] always induces a bijection on
184
+ blocks. The hypothesis on Fq has the following additional consequence for blocks:
185
+ that the map Fq[G] → k′[G] induces a bijection on blocks for any extension field
186
+ k′/Fq, and the map Zq[G] → O′[G] induces a bijection on blocks for any extension
187
+ O′ of Zq.
188
+ Remark 2.1.2. A standard additional hypothesis on p-modular systems is that
189
+ O and K contain exp(G)th roots of unity, where exp(G) is the exponent of G —
190
+ sometimes (K, O, k) is called a “splitting p-modular system” when this hypothesis
191
+ holds. We warn that (Qq, Zq, Fq) is usually not a splitting p-modular system in
192
+ this sense, for example not if p is odd and divides the order of |G|, or if p = 2 and
193
+ the 2-Sylow subgroup of G is not elementary abelian. Our reasons for avoiding pth
194
+ roots of unity are explained in §2.4.
195
+ Brou´e’s conjecture, introduced below, concerns blocks of O[G] and k[G] where
196
+ (K, O, k) is a “sufficiently large” p-modular system. Usually, “sufficiently large” at
197
+ least implicitly means “splitting” but we will work with (K, O, k) = (Qq, Zq, Fq),
198
+ where Fq obeys the condition above.
199
+ Though not splitting, the conjecture for
200
+ (Qq, Zq, Fq) implies the conjecture for any larger (K, O, k), and conversely Rickard’s
201
+ refined form of the Brou´e conjecture for Fq [Ric96] implies it for Zq [Ric96, §5].
202
+ 2.2. Brou´e’s conjecture. Write Db(Zq[G]b)fg for the bounded derived category
203
+ of finitely generated Zq[G]b-modules. Whenever the defect group D of b is abelian,
204
+
205
+ G-SPECTRA OF CYCLIC DEFECT
206
+ 5
207
+ Brou´e’s conjecture predicts an equivalence of derived categories
208
+ (2.2.1)
209
+ Db(Zq[G]b)fg ∼= Db(Zq[NG(D)]b′)fg
210
+ for some block b′ of the normalizer NG(D) of D. Given b, there is an explicit recipe
211
+ to determine b′, which is called the “Brauer correspondent” of b. In particular, if b
212
+ is the principal block of Zq[G] then b′ is the principal block of Zq[NG(D)].
213
+ The conjecture has been known for a long time for blocks of cyclic defect —
214
+ proved first by Rickard [Ric89] and later by Rouquier [Rou98].
215
+ In case G =
216
+ PSL2(F7), the ring Zq is Z7 itself; the example is pretty typical and Rouquier’s
217
+ equivalence can be described quickly, as follows.
218
+ The normalizer of the defect group of the principal block of G = PSL2(F7) is
219
+ the “Borel” subgroup B ⊂ G, of order 21. The group algebra Z7[B] has only one
220
+ block. This block has defect one and its Brauer tree is
221
+ (2.2.2)
222
+ 1′
223
+ B
224
+ 1B
225
+ 33B
226
+
227
+
228
+
229
+
230
+
231
+
232
+
233
+
234
+
235
+
236
+
237
+
238
+
239
+
240
+
241
+ 1′′
242
+ B
243
+ The central vertex is another module that would split over a field with √−7, deco-
244
+ rated with a subscript B to distinguish it from the irreducible Q7[G]-module with
245
+ the same property and similar name. The other vertices are 1-dimensional mod-
246
+ ules, two of them nontrivial. The Rouquier equivalence sends a G-module M in the
247
+ principal block to the two-term complex
248
+ (2.2.3)
249
+ ResG
250
+ B(M) → Q ⊗ HomG(P, M)
251
+ In the formula (2.2.3), P and Q are indecomposable projectives, which we can
252
+ specify by indicating their corresponding edges in the Brauer trees:
253
+ 1
254
+ 6
255
+ P
256
+ 8
257
+ 33
258
+ 1′
259
+ 1B
260
+ 33B
261
+
262
+
263
+
264
+
265
+
266
+
267
+
268
+
269
+ Q
270
+
271
+
272
+
273
+
274
+
275
+
276
+
277
+
278
+ 1′′
279
+ The differential in (2.2.3) is a natural transformation ResG
280
+ B(−) → Q⊗HomG(P, −).
281
+ A Yoneda/Morita argument identifies the set of such natural transformations with
282
+ a ball in a p-adic vector space, specifically with HomB(ResG
283
+ B P, Q) ∼= Z5
284
+ 7. A little
285
+ care is necessary in choosing the differential in this ball: the corresponding homo-
286
+ morphism ResG
287
+ B P → Q must be surjective. This condition is both closed and open
288
+ in the usual 7-adic metric on Z5
289
+ 7.
290
+
291
+ 6
292
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
293
+ 2.3. Triangulated categories of G-modules. The block decomposition (2.1.1)
294
+ of Zq[G] induces a decomposition of the derived category Db(Zq[G])fg as a direct
295
+ product of triangulated categories
296
+ Db(Zq[G])fg ∼= Db(Zq[G]b1)fg × Db(Zq[G]b2)fg × · · ·
297
+ Each of these categories has a natural dg enrichment. In other words, each of them
298
+ is the homotopy category of a Zq-linear stable ∞-category. Our notation for these
299
+ ∞-categories is not the usual one in representation theory: we write LMod(Zq[G]b)ft
300
+ for the Zq-linear stable ∞-category whose homotopy category is Db(Zq[G]b)fg. Let
301
+ us make some comments about this notation, which is developed in §3.2–3.3.
302
+ • LMod stands for “left module spectra” — LMod(R) is the ∞-category of
303
+ left module spectra over the ring spectrum R.
304
+ Every ring in the usual
305
+ sense — i.e., every “discrete ring” — determines a ring spectrum, namely
306
+ its Eilenberg-MacLane spectrum. In this paper we abuse notation and use
307
+ the same symbol for a discrete ring as for its Eilenberg-MacLane spectrum.
308
+ Thus, LMod(Zq[G]b) is the ∞-category of left module spectra over the
309
+ Eilenberg-MacLane spectrum of Zq[G]b.
310
+ • The homotopy category of LMod(Zq[G]b) is equivalent not to Db(Zq[G]b)fg
311
+ but to D(Zq[G]b), the unbounded derived category of Zq[G]b. Its objects
312
+ are complexes that are not required to be bounded, or to obey any other
313
+ finiteness condition.
314
+ • The superscript in LMod(Zq[G]b)ft stands for “finite type.” The notation
315
+ is based on the following characterization of Db(Zq[G]b)fg as a subcategory
316
+ of D(Zq[G]b): it is the full subcategory spanned by those complexes whose
317
+ underlying complex of Zq-modules is bounded and finitely generated in each
318
+ degree.
319
+ 2.4. Spectra. Extraordinary cohomology theories (cobordism, K-theory, . . . ) are
320
+ represented by spectra. The category of spectra can be be viewed as a homotopy
321
+ theoretic refinement of the derived category of abelian groups. For instance, it
322
+ is triangulated, and the category of abelian groups embeds inside spectra by the
323
+ Eilenberg-MacLane spectrum construction A �→ H∗(−; A). Any spectrum X has
324
+ homotopy groups, which are the graded abelian group
325
+ π∗X = H−∗(pt; X).
326
+ Moreover, the category of spectra has a symmetric monoidal structure, and so one
327
+ can consider ring spectra and commutative ring spectra, analogously to DGA’s and
328
+ CDGA’s in D(Z).
329
+ In this “higher algebra” of ring spectra, the initial ring spectrum is S, the sphere
330
+ spectrum, whose homotopy groups are the stable homotopy groups of spheres. The
331
+ ∞-category of spectra is equivalent LMod(S) — for a commutative ring spectrum
332
+ such as S, we usually drop the L and write Mod(S) := LMod(S). In the body of
333
+ the paper we will assume a greater familiarity with spectra and with ∞-categories;
334
+ here in the introduction we will make some basic comments:
335
+ (1) The map g : S → Z induces an isomorphism in homotopy groups in non-
336
+ positive degrees, and the positive degree homotopy groups of S are the
337
+ well-studied stable homotopy groups of spheres. These groups form a graded
338
+ commutative ring under composition, elements in positive degree are known
339
+ to be torsion [Ser53] and nilpotent [Nis73].
340
+
341
+ G-SPECTRA OF CYCLIC DEFECT
342
+ 7
343
+ (2) For each prime p there is a natural p-completion of S, another commutative
344
+ ring spectrum denoted Sp. Its homotopy groups are the homotopy groups
345
+ of S, tensored with Zp.
346
+ (3) When n is prime to p, there is a natural construction that “adjoins nth
347
+ roots of unity to Sp”, e.g. [Lur18, Ex. 5.2.7]. We will denote the result by
348
+ Sq, where q is the cardinality of the field obtained by adjoining nth roots of
349
+ unity to Fp. Its homotopy groups are the homotopy groups of S, tensored
350
+ with Zp(
351
+ n√
352
+ 1). On the other hand, when p is odd, it is not possible to adjoin
353
+ pth roots of unity to Sp [LN14, §A.6.iii], and for p = 2, it is not possible to
354
+ adjoin 4th roots of unity to S2 [SVW99].
355
+ 2.4.1. Relation to classical algebra. Regarding Z as a ring spectrum, Mod(Z) is a
356
+ stable ∞-category whose homotopy category is D(Z). Algebra over S and over Z
357
+ is related by the unique homotopy class of ring spectrum maps g : S → Z and the
358
+ induced extension and restriction of scalar functors
359
+ g∗ : Mod(S) → Mod(Z)
360
+ g∗ : Mod(Z) → Mod(S)
361
+ The map g : S → Z can be thought of as a nilpotent thickening: it is an isomorphism
362
+ in non-positive degrees, and its kernel on homotopy groups consists of nilpotent
363
+ torsion elements. But these extra elements in S yield some striking consequences:
364
+ (1) Commutative algebras over Sp admit a natural Frobenius [NS18, §IV.1].
365
+ (2) There is a natural chromatic filtration on Sp:
366
+ Sp = lim
367
+ ←−
368
+ n
369
+ LnSp
370
+ which interpolates between mixed characteristic phenomena over Sp and
371
+ characteristic zero phenomena over L0Sp = Qp.
372
+ The above Frobenius
373
+ “moves filtration by one” in an appropriate sense.
374
+ These features have seen recent application in the study of mixed characteristic
375
+ phenomena. For instance, the Frobenius of (1) underlies Bhatt–Morrow–Scholze’s
376
+ work on p-adic Hodge theory [BMS19], and (2) has led to the construction of some
377
+ new quantum groups by Yang–Zhao [YZ21], realizing earlier character formulas of
378
+ Lusztig [Lus89, Lus15]. We hope that studying analogues of Brou´e’s conjecture
379
+ over Sp may shed light on the original form of the conjecture.
380
+ 2.5. G-spectra. Morally, a G-spectrum is a spectrum with an action of the group
381
+ G.
382
+ G-spectra ought to represent G-equivariant cohomology theories.
383
+ Algebraic
384
+ topologists have a few inequivalent ways of modeling them. In this paper we deal
385
+ with “Borel equivariant” G-spectra, which in ∞-categorical language have a simple
386
+ definition: a Borel G-spectrum is a functor to Mod(S) from the classifying space
387
+ BG of G. The ∞-category of Borel G-spectra is Fun(BG, Mod(S)).
388
+ The ∞-category of Borel G-spectra is an ∞-category of module spectra:
389
+ Fun(BG, Mod(S)) ∼= LMod(S[G])
390
+ Here, S[G] is the “group algebra of G over S” whose underlying spectrum is �
391
+ g∈G S.
392
+ We similarly have the variants
393
+ Fun(BG, Mod(Sp)) ∼= LMod(Sp[G])
394
+ (2.5.1)
395
+ Fun(BG, Mod(Sq)) ∼= LMod(Sq[G])
396
+ (2.5.2)
397
+
398
+ 8
399
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
400
+ where we first p-complete and then adjoint appropriate roots. The group algebra
401
+ Sq[G], like Zq[G], splits into block algebras:
402
+ Sq[G] = Sq[G]b1 × Sq[G]b2 × · · ·
403
+ The blocks of Sq[G] naturally correspond to those of Zq[G], since π0(Sq[G]b) ∼=
404
+ Zq[G]b. The category LMod(Sq[G]) — and LMod(Sq[G])ft, see below — splits up
405
+ in the same way:
406
+ (2.5.3)
407
+ LMod(Sq[G])
408
+ ∼= LMod(Sq[G]b1)
409
+ × LMod(Sq[G]b2)
410
+ × · · ·
411
+ LMod(Sq[G])ft ∼= LMod(Sq[G]b1)ft × LMod(Sq[G]b2)ft × · · ·
412
+ Let’s discuss LMod(Sq[G])ft, which we propose as a spectral analog of Db(Zq[G])fg.
413
+ Let Mod(Sq)ω denote the full subcategory of Mod(Sq) spanned by compact objects
414
+ §3.2. Then LMod(Sq[G])ft is the full subcategory of LMod(Sq[G]) spanned by mod-
415
+ ules whose underlying Sq-module is compact. Similar to (2.5.1) we have
416
+ Fun(BG, Mod(Sq)ω) ∼= LMod(Sq[G])ft
417
+ In a way LMod(Sq[G])ft is a difficult category to work with, because it is not
418
+ known whether it has a finite set of generators. (An alternative, LMod(Sq[G])ω,
419
+ is by definition generated by Sq[G]). Nevertheless we are able to prove some cases
420
+ (the cyclic defect case) of the obvious LModft-analog of Brou´e’s conjecture:
421
+ 2.6. Brou´e’s Conjecture for G-spectra. Since Sq[G] and Zq[G] have the same
422
+ blocks, each block of defect D of Sq[G] has a Brauer corresponding block of Sq[NG(D)]:
423
+ if Zq[NG(D)]b′ is the Brauer correspondent of Zq[G]b, then Sq[NG(D)]b′ is the
424
+ Brauer correspondent of Sq[G]b. The natural analog of Brou´e’s conjecture for G-
425
+ spectra would be a positive answer to the following question:
426
+ Question. Suppose b is a block of Sq[G] with abelian defect group D ⊂ G, and
427
+ that b′ is the corresponding block of Sq[NG(D)]. Then there is an equivalence of
428
+ stable ∞-categories
429
+ LMod(Sq[G]b) ∼= LMod(Sq[NG(D)]b′)
430
+ which restricts to an equivalence between the full subcategories LMod(Sq[G]b)ft
431
+ and LMod(Sq[NG(D)]b′)ft. (This last statement about finite type subcategories is
432
+ in fact automatic, by Proposition 4.6.1.)
433
+ We are not quite bold enough to state this as a conjecture, but we prove the
434
+ following as Theorem 4.7.2, answering the Question in the case where the defect
435
+ group is cyclic.
436
+ Theorem. Suppose b is a block of Sq[G] with defect D ⊂ G, and that b′ is the
437
+ corresponding block of Sq[NG(D)]. If D is cyclic, then there is an equivalence of
438
+ stable ∞-categories
439
+ LMod(Sq[G]b) ∼= LMod(Sq[NG(D)]b′)
440
+ which restricts to an equivalence between the full subcategories LMod(Sq[G]b)ft
441
+ and LMod(Sq[NG(D)]b′)ft.
442
+
443
+ G-SPECTRA OF CYCLIC DEFECT
444
+ 9
445
+ 2.7. Rickard vs. Rouquier. There are two old proofs of Brou´e’s conjecture for
446
+ blocks of cyclic defect, one by Rickard [Ric89] and one by Rouquier [Rou98]. Our
447
+ proof is an adaptation of Rouquier’s argument.
448
+ Rickard’s proof. The Brauer tree of a block of cyclic defect has a little bit of
449
+ extra structure: a ribbon structure and a distinguished vertex labeled by an integer
450
+ called its “multiplicity.”
451
+ In the case of PSL2(F7) (2.1.3) or its Borel subgroup
452
+ (2.2.2), the ribbon structure is the embedding in the page, the distinguished vertex
453
+ is 33, and the multiplicity is 2.
454
+ Very few trees come from blocks. But given any tree with these decorations,
455
+ Rickard defined by generators and relations an associative algebra that is Morita
456
+ equivalent to a block when the tree is the Brauer tree of that block. Then, he
457
+ proved that any two of these tree algebras have the same derived category, as long
458
+ as the trees have the same number of edges and the integer called “multiplicity”
459
+ is the same. An elementary argument shows that these numbers match for Brauer
460
+ corresponding blocks of G and NG(D).
461
+ In higher algebra, it takes more work than “generators and relations” to define
462
+ an associative ring spectrum. For this reason we have not generalized Rickard’s
463
+ proof, but it might be possible and interesting to do so.
464
+ Rouquier’s proof. Morita theory tells us that functors between module categories
465
+ can be given by bimodules.
466
+ When D is cyclic, Rouquier found a very explicit
467
+ (G, NG(D))-bimodule that gives Brou´e’s equivalence.
468
+ This bimodule and its inverse bimodule have a simple structure: they are two-
469
+ term complexes of summands of permutation G × NG(D)op-modules (the inverse
470
+ is a two-term complex of summands of permutation NG(D) × Gop-modules), one
471
+ term of which is projective. Because of this simple structure, it is easy to find
472
+ Sp-versions of these bimodules.
473
+ More generally, Brou´e’s conjecture is known for many noncyclic defect groups,
474
+ usually by constructing bimodules. But at present we do not know how to lift these
475
+ known bimodules to Sp; it seems to be a difficult problem.
476
+ 3. Associative algebras, modules, and bimodules in spectra
477
+ In this section, we review some basic Morita theory over the spectrum analog
478
+ of a finite-dimensional algebra.
479
+ The relevant material is developed in detail in
480
+ [Lur16, Ch. 4], which we draw heavily from and we refer the reader to for further
481
+ details. In §3.1, we review some basic notations from the theory of ∞-categories.
482
+ In §3.2–§3.6, we discuss the theory of bimodules and its interactions with two
483
+ finiteness conditions: “compact” modules and “finite type” modules. In §3.7 we
484
+ prove the main theorem of this section, which will be used in §4 to lift certain
485
+ Z-linear equivalences of ∞-categories to S-linear equivalences.
486
+ In §3.10–§3.12, we discuss K(n)-local algebras. When A and B are group algebra
487
+ over a K(n)-local algebra k, the theory of ambidexterity provides a larger class a
488
+ functors LMod(A)ft → LMod(B)ft. This material is not used in our proof of §2.6.
489
+ 3.1. ∞-categorical notation. We write S for the ∞-category of spaces, S for the
490
+ sphere spectrum, and Mod(S) for the ∞-category of spectra. If x and y are objects
491
+ of the ∞-category C, we write Maps(x, y) ∈ S for the space of maps between them,
492
+ and [x, y] for π0Maps(x, y). If C is stable, then we write Maps(x, y) for the cor-
493
+ responding mapping spectrum, whose associated infinite loop space is Maps(x, y).
494
+ We write Σ for the suspension functor in a stable ∞-category.
495
+
496
+ 10
497
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
498
+ We write Fun(C, D) for the ∞-category of functors between ∞-categories C and
499
+ D. The full subcategory spanned by functors that have right adjoints is FunL(C, D).
500
+ If C and D are stable, the full subcategory spanned by functors that preserve finite
501
+ limits and colimits is Funex(C, D).
502
+ We write BG for the classifying space of a finite group G, which we regard as
503
+ equipped with a natural basepoint pt → BG. If G is a finite group and c is an
504
+ object of the ∞-category C, then an action of G on c is by definition a functor
505
+ BG → C whose value at the basepoint is c. We write
506
+ chG := lim
507
+ ←−
508
+ BG
509
+ c
510
+ chG := lim
511
+ −→
512
+ BG
513
+ c
514
+ for the homotopy fixed points and homotopy quotient of a G-object c, when these
515
+ limits and colimits exist in C.
516
+ If C = Mod(S), there is a more sophisticated notion of a G-object in C: the
517
+ notion of a “genuine” G-spectrum. This paper mostly does not touch the genuine
518
+ theory except in §4.4.
519
+ 3.2. Finiteness conditions for modules over a commutative ring spec-
520
+ trum. In this paper, a commutative ring spectrum is an E∞-algebra object in
521
+ Mod(S). Let k be a commutative ring spectrum. Write (Mod(k), ⊗k) for the sym-
522
+ metric monoidal stable ∞-category of k-module spectra. The mapping spectrum
523
+ Maps(M, N) attached to two objects of Mod(k) has a natural k-module structure.
524
+ The following conditions are equivalent in Mod(k) [Lur16, Proposition 7.2.4.4]:
525
+ (1) M is compact, i.e., the functor Maps(M, −) : Mod(k) → S commutes with
526
+ filtered colimits.
527
+ (2) Maps(M, −), regarded either as a functor Mod(k) → Mod(S) or Mod(k) →
528
+ Mod(k), commutes with direct sums. [Lur09, Prop. 15.1]
529
+ (3) M is perfect i.e., it is a summand of an object which carries a finite filtration
530
+ whose subquotients have the form Σnk.
531
+ (4) M is dualizable, i.e., there is a second object M ∗ and a pair of maps k →
532
+ M ∗ ⊗k M and M ⊗k M ∗ → k such that the composite
533
+ M = M ⊗k k → M ⊗k (M ∗ ⊗k M) = (M ⊗k M ∗) ⊗k M → k ⊗k M = M
534
+ is an isomorphism.
535
+ We will write Mod(k)ω ⊂ Mod(k) for the full subcategory spanned by the com-
536
+ pact objects.
537
+ For example, when k = Z, the homotopy category of Mod(Z) is
538
+ the “traditional” unbounded derived category of abelian groups, and the homotopy
539
+ category of Mod(Z)ω is the full subcategory spanned by bounded complexes with
540
+ finitely generated homology groups.
541
+ Let Catex
542
+ ∞ denote the ∞-category of small stable ∞-categories and exact func-
543
+ tors. Then Catex
544
+ ∞ admits a canonical symmetric monoidal structure ⊗, which comes
545
+ equipped with a universal map C × D → C ⊗ D which commutes with finite colimits
546
+ separately in each variable. We also have reason to consider the “large” setting of
547
+ presentable ∞-categories. The ∞-category PrL of presentable ∞-categories also ad-
548
+ mits a symmetric monoidal structure ⊗, which commutes with (arbitrary) colimits
549
+ separately in each variable [Lur16, Corollary 4.8.1.4].
550
+ Example 3.2.1. We have Mod(k)ω ∈ Catex
551
+ ∞ (as well as LMod(A)ω, LMod(A)ft to
552
+ be introduced in the following section) and
553
+ Mod(k) ∼= Ind(Mod(k)ω) ∈ PrL.
554
+
555
+ G-SPECTRA OF CYCLIC DEFECT
556
+ 11
557
+ More generally, the Ind-category construction determines a symmetric monoidal
558
+ functor Ind : Catex
559
+ ∞ → PrL.
560
+ We will call a stable ∞-category C ∈ Catex
561
+ ∞ (resp.
562
+ C ∈ PrL) k-linear when
563
+ it is endowed with an action of the algebra Mod(k)ω ∈ Catex
564
+ ∞ (resp. Mod(k) ∈
565
+ PrL) (cf. [Lur11, Def. 6.2]). We denote the bifunctor Mod(k)ω ⊗ C → C (resp.
566
+ Mod(k) ⊗ C → C) by ⊗k. The mapping spectrum Maps(x, y) between objects of a
567
+ k-linear category has a k-module structure, which is not always perfect but which
568
+ represents the functor
569
+ Maps(− ⊗k x, y) : Mod(k)ω,op → S.
570
+ If C and D are k-linear categories, we write Funex
571
+ k (C, D) for the ∞-category of exact
572
+ functors that preserve this action.
573
+ 3.3. Finiteness conditions on associative algebra spectra and their mod-
574
+ ules. For a commutative ring spectrum k, a k-algebra spectrum will mean an as-
575
+ sociative k-algebra spectrum — that is, an E1-algebra over k. We write LMod(A)
576
+ for the ∞-category of left A-module spectra. It is presentable, stable, and has a
577
+ k-linear structure.
578
+ We write RMod(A) and Bimod(A, B) for the ∞-categories of right A-modules
579
+ and of (A, B)-bimodules respectively. The theory of right modules and bimodules
580
+ is related to the theory of left modules via the natural equivalences RMod(A) ∼=
581
+ LMod(Aop) and Bimod(A, B) ∼= LMod(A ⊗k Bop) [Lur16, Proposition 4.3.2.7,
582
+ Proposition 4.6.3.11].
583
+ For an object M ∈ LMod(A), the following are equivalent [Lur16, Proposition
584
+ 7.2.4.4]:
585
+ (1) Maps(M, −) : LMod(A) → S commutes with filtered colimits.
586
+ (2) Maps(M, −), regarded either as a functor LMod(A) → Mod(k) or LMod(A) →
587
+ Mod(S), commutes with direct sums [Lur09, Prop. 15.1].
588
+ (3) M is a summand of an object that has a finite filtration whose associated
589
+ graded pieces have the form ΣnA.
590
+ A module obeying these conditions is called perfect. We denote the full subcategory
591
+ spanned by perfect left A-modules by LMod(A)ω.
592
+ If A is perfect as a k-module, then it is natural to consider a weaker finiteness
593
+ condition: we say that M ∈ LMod(A) has finite type if its underlying k-module
594
+ belongs to Mod(k)ω. Write LMod(A)ft for the full subcategory spanned by finite
595
+ type A-modules. We have a containment
596
+ LMod(A)ω ⊂ LMod(A)ft if and only if A ∈ Mod(k)ω.
597
+ Remark 3.3.1. If k = Z and A is an associative ring, the homotopy category of
598
+ LMod(A)ω coincides with the category of bounded complexes of projective modules
599
+ and chain homotopy classes of maps between them. For such an A, the condition
600
+ that the underlying additive group of A is finitely generated is equivalent to the
601
+ condition that A ∈ Mod(k)ω, in which case the homotopy category of LMod(A)ft
602
+ is the same as Db(f.g. left A-modules).
603
+ 3.4. Projective A-module spectra. We call an object of LMod(A) a free module
604
+ if it is isomorphic to a direct sum of objects of the form ΣdA. Write Free(A) ⊂
605
+
606
+ 12
607
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
608
+ LMod(A) and Free(A)ω ⊂ LMod(A)ω for the full subcategories spanned by free
609
+ modules.
610
+ We call an object of LMod(A) a projective module if it is a direct summand of
611
+ a free module. Write Proj(A) ⊂ LMod(A) and Proj(A)ω ⊂ LMod(A)ω for the full
612
+ subcategories spanned by projective modules.
613
+ The free modules ΣdA represent the functor πd : hLMod(A) → Ab where the
614
+ domain is homotopy category of LMod(A) and the codomain is the usual 1-category
615
+ of abelian groups. Furthermore, for any M ∈ LMod(A), the graded abelian group
616
+ π∗(M) := �
617
+ i∈Z πi(M) has the structure of a graded π∗(A)-module, and the natural
618
+ map
619
+ (3.4.1)
620
+ [ΣdA, M] → Homπ∗(A)(Σdπ∗(A), π∗(M))
621
+ is an isomorphism. The codomain in (3.4.1) denotes the set of homomorphisms of
622
+ graded abelian groups that are compatible with the grading and the π∗(A)-module
623
+ structure, and Σdπ∗(A) denotes a grading shift. We record two consequences of
624
+ this observation:
625
+ Proposition 3.4.1. Let ¯P be a graded abelian group equipped with a left π∗(A)-
626
+ module structure. If ¯P is projective, then there is an object of Proj(A) such that
627
+ π∗(P) ∼= ¯P as graded π∗(A)-modules.
628
+ Proof. First suppose that ¯P = ¯F is free: ¯F ∼=
629
+
630
+ i∈I Σdiπ∗(A). Then we may take
631
+ P = F = �
632
+ i∈I ΣdiA.
633
+ In general, ¯P is the image of an idempotent endomorphism e : ¯F → ¯F. The
634
+ isomorphism (3.4.1) shows this lifts to an idempotent endomorphism of F, and
635
+ idempotents in LMod(A) split by [Lur16, Lemma 1.2.4.6].
636
+
637
+ Proposition 3.4.2. Let P ∈ Proj(A) and M ∈ LMod(A). Then the map
638
+ (3.4.2)
639
+ [P, M] → Homπ∗(A)(π∗(P), π∗(M))
640
+ is an isomorphism.
641
+ Note one consequence of Proposition 3.4.2 is that the lift in Proposition 3.4.1 of
642
+ ¯P to P is unique up to isomorphism.
643
+ Proof. This is a weaker version of [Lur16, Corollary 7.2.2.19]; it can be proved
644
+ as follows.
645
+ Since P is a summand of a free module F = �
646
+ i ΣdiA, the do-
647
+ main of (3.4.2) is a retract of �
648
+ i[ΣdiA, M] and the codomain is a retract of
649
+
650
+ i Homπ∗(A)(Σdiπ∗(A), π∗(M)).
651
+ The retractions that are induced by an idem-
652
+ potent endomorphism of F commute with the maps (3.4.2) for P and for F. Since
653
+ the retract of an isomorphism is an isomorphism, we are reduced to proving it for
654
+ free modules, and then further reduced to the case P = ΣdA, which is (3.4.1).
655
+
656
+ 3.5. Finiteness conditions for functors. Let A and B be k-algebra spectra.
657
+ Then LMod(A) and LMod(B) are k-linear presentable stable ∞-categories, and we
658
+ can consider k-linear exact functors between them. For such a functor, the following
659
+ are equivalent:
660
+ (1) F : LMod(A) → LMod(B) preserves filtered colimits.
661
+ (2) F : LMod(A) → LMod(B) preserves all colimits.
662
+ (3) F : LMod(A) → LMod(B) preserves (arbitrary) direct sums.
663
+ (4) F has a right adjoint.
664
+
665
+ G-SPECTRA OF CYCLIC DEFECT
666
+ 13
667
+ We write FunL
668
+ k (LMod(A), LMod(B)) ⊂ Funex
669
+ k (LMod(A), LMod(B)) for the full
670
+ subcategory spanned by colimit-preserving functors.
671
+ If F is any such functor, then F(A) supports a (B, A)-bimodule structure, F is
672
+ isomorphic to F(A) ⊗A −, and
673
+ (3.5.1)
674
+ FunL
675
+ k (LMod(A), LMod(B)) ∼= LMod(B ⊗k Aop)
676
+ [Lur16, Proposition 4.8.4.1]. Furthermore, the restriction to LMod(A)ω induces an
677
+ equivalence:
678
+ (3.5.2)
679
+ FunL
680
+ k (LMod(A), LMod(B))
681
+
682
+ −→ Funex
683
+ k (LMod(A)ω, LMod(B)).
684
+ Proposition 3.5.1. Let A and B be k-algebra spectra and let F be a colimit-
685
+ preserving k-linear functor LMod(A) → LMod(B). The following are equivalent:
686
+ (1) F(A) is perfect as a left B-module
687
+ (2) F carries LMod(A)ω into LMod(B)ω
688
+ In other words after (3.5.1) we have
689
+ (3.5.3)
690
+ Funex
691
+ k (LMod(A)ω, LMod(B)ω) ∼=
692
+
693
+
694
+
695
+
696
+ full subcategory of
697
+ Bimod(B, A) spanned
698
+ by bimodules that are
699
+ perfect as left B-modules
700
+
701
+
702
+
703
+
704
+ Proof. Condition (2) implies condition (1) because A is an object of LMod(A)ω. If
705
+ M ∈ LMod(A)ω has a filtration
706
+ 0 → M≤0 → M≤1 → · · · → M≤n = M
707
+ with M≤i/M≤i−1 ∼= ΣdiA, then F(M) has a filtration whose subquotients are iso-
708
+ morphic to ΣdiF(A). If M ′ is a summand of such an M then F(M ′) is a summand
709
+ of F(M). Since F(A) is perfect so is ΣdiF(A), therefore so is F(M), and therefore
710
+ so is F(M ′) — this shows that (1) implies (2).
711
+
712
+ Proposition 3.5.2. Let A and B be k-algebra spectra and let F be a k-linear
713
+ colimit-preserving functor LMod(A) → LMod(B). Suppose that F(A) is perfect as
714
+ a right A-module and as a k-module. Then F carries LMod(A)ft into LMod(B)ft.
715
+ Remark 3.5.3. When we consider LMod(A)ft, it will typically be the case that A
716
+ is perfect as a k-module — in that case, when F(A) is perfect as a right A-module
717
+ it is automatically perfect as a k-module.
718
+ Proof. Since F(A) ⊗A M belongs to LMod(B)ft exactly when the underlying k-
719
+ module belongs to Mod(k)ω, it suffices to show that the bifunctor (−) ⊗A (−) :
720
+ RMod(A) × LMod(A) → Mod(k) carries RMod(A)ω × LMod(A)ft into Mod(k)ω.
721
+ Let N ∈ RMod(A)ω and let M ∈ LMod(A)ft. Fix a filtration
722
+ 0 → N≤0 → · · · → N≤n = N
723
+ such that N≤i/N≤i−1 is a suspension of A (as a right A-module). Since ΣdiA ⊗A
724
+ M = ΣdiM, and M is perfect as a k-module, it follows that N ⊗A M is perfect as
725
+ a k-module. If N ′ is a summand of N then N ′ ⊗A M is a summand of N ⊗A M so
726
+ it is also perfect as a k-module.
727
+
728
+
729
+ 14
730
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
731
+ Remark 3.5.4. It is tempting to guess that there are weaker hypotheses than
732
+ those of Prop. 3.5.2 that would guarantee that F carries LMod(A)ft to LMod(B)ft.
733
+ The following example shows some limitations — at least, that it can fail even
734
+ when F(A) is perfect or finite type as a left B-module. Let A = k[G], B = k, and
735
+ let M = k be the trivial (B, A)-bimodule. Tensoring with M is isomorphic to the
736
+ colimit-preserving functor
737
+ (−)hG : LMod(k[G]) → LMod(k),
738
+ i.e. to homotopy G-coinvariants. The functor carries the trivial module to the k-
739
+ homology of BG, which often does not lie in LMod(k)ω = LMod(k)ft. For example,
740
+ the k-homology of BG is not perfect when G is finite and nontrivial and k = S or
741
+ Z, and if p divides the order of G then it is not perfect when k = Sp, Zp, or Fp.
742
+ Thus, it does not carry LMod(k[G])ft into LMod(k)ft, even though M is perfect
743
+ and finite type as a left B-module. (Meanwhile, note that since M is not perfect
744
+ as a right A-module, it also does not carry LMod(k[G])ω into LMod(k)ω.)
745
+ For some values of k, the Greenlees-Sadofsky “Tate vanishing” or Hopkins-Lurie
746
+ “ambidexterity” can repair this issue in a significant way §3.12.
747
+ 3.6. Finiteness conditions for the right adjoint functor. Let F : LMod(A) →
748
+ LMod(B) be a colimit-preserving k-linear functor, so that it has a k-linear right
749
+ adjoint G. Just as F(M) ∼= F(A) ⊗A M for F(A) endowed with its natural (B, A)-
750
+ bimodule structure (3.5.1), G(M) is given by the formula
751
+ (3.6.1)
752
+ G(M) = MapsLMod(B)(F(A), M)
753
+ The right A-module structure of F(A) induces a left A-module structure on (3.6.1).
754
+ Note in particular that G(B) ∼= MapsLMod(B)(F(A), B).
755
+ Proposition 3.6.1. Let A and B be k-algebra spectra, and let F : LMod(A) →
756
+ LMod(B) be a colimit-preserving k-linear functor. Let G : LMod(B) → LMod(A)
757
+ be its right adjoint. The following are equivalent:
758
+ (1) F(A) is perfect as a left B-module
759
+ (2) F carries LMod(A)ω into LMod(B)ω
760
+ (3) G preserves colimits
761
+ (4) There is a natural isomorphism G(M) ∼= G(B) ⊗B M
762
+ Proof. (1) and (2) are equivalent by Prop. 3.5.1. (1) and (3) are equivalent by
763
+ (3.6.1), the fact that colimits in LMod(B) are computed in Mod(k), and §3.3. (3)
764
+ and (4) are equivalent by §3.5.
765
+
766
+ As a corollary we have the following criterion for a colimit-preserving k-linear
767
+ functor to induce a pair of adjoint functors between LMod(A)ft and LMod(B)ft:
768
+ Proposition 3.6.2. Suppose that A and B are perfect over k, let F : LMod(A) →
769
+ LMod(B) be a colimit-preserving k-linear functor, and let G be its right adjoint.
770
+ Suppose that F(A) is perfect as a left B-module and as a right A-module. Then F
771
+ carries LMod(A)ft into LMod(B)ft and G carries LMod(B)ft into LMod(A)ft.
772
+ Proof. Since F(A) is perfect as a right A-module (and since A is perfect over k), F
773
+ carries LMod(A)ft into LMod(B)ft by Prop. 3.5.2. Since F(A) is perfect as a left
774
+ B-module, the adjoint G is colimit-preserving by Proposition 3.6.1, and we may
775
+ detect whether G carries LMod(B)ft into LMod(A)ft by applying Prop. 3.5.2 to
776
+ G(B) = MapsLMod(B)(F(A), B)
777
+
778
+ G-SPECTRA OF CYCLIC DEFECT
779
+ 15
780
+ But this is F(A)∨, which is perfect as a right B-module by Prop. 3.8.1.
781
+
782
+ Remark 3.6.3. Not every pair of adjoint functors LMod(A)ft ⇆ LMod(B)ft ex-
783
+ tends to a colimit-preserving functor LMod(A) → LMod(B). For example when G
784
+ is a commutative p-group, [Tre15, §3.6] constructs self-equivalences of LMod(KUp[G])ft
785
+ that exchange the trivial module KUp and the free module KUp[G]
786
+ KUp ↔ KUp[G]
787
+ Since the trivial module is not perfect, the equivalence does not preserve the subcat-
788
+ egory LMod(KUp[G])ω and does not extend to a self-equivalence of LMod(KUp[G]).
789
+ Another consequence of Prop. 3.6.1 is that any k-linear functor LMod(A)ω →
790
+ LMod(B)ω extends to a colimit-preserving functor LMod(A) → LMod(B) whose
791
+ right adjoint is also colimit-preserving. We will want a criterion for this right adjoint
792
+ to carry LMod(B)ω back into LMod(A)ω. According to Prop. 3.5.1, a necessary
793
+ and sufficient condition is that
794
+ (3.6.2)
795
+ G(B) = MapsLMod(B)(F(A), B) is perfect as a left A-module
796
+ It is perhaps hard to tell at a glance whether this is the case—for instance to give
797
+ a criterion in terms of the right A-module structure on F(A). We can give a useful
798
+ criterion like that when A and B are both “symmetric”; this will be discussed in
799
+ §3.9.
800
+ 3.7. Change of rings. Let k continue to denote a commutative ring spectrum
801
+ (i.e. what it has been denoting since §3.2). Suppose we have a second commutative
802
+ ring spectrum k′, and a map u : k → k′. Then u induces a symmetric monoidal,
803
+ colimit-preserving functor
804
+ (3.7.1)
805
+ u∗ : Mod(k) → Mod(k′)
806
+ u∗(M) := k′ ⊗k M
807
+ that carries Mod(k)ω into Mod(k′)ω.
808
+ We also denote by u∗ the functor induced by (3.7.1) from algebras in Mod(k) to
809
+ algebras in Mod(k′). If A is a k-algebra spectrum and A′ := u∗(A) is the induced
810
+ k′-algebra spectrum, LMod(A) and LMod(A′) are related via the formula in PrL
811
+ (3.7.2)
812
+ LMod(A′) ∼= Mod(k′) ⊗Mod(k) LMod(A).
813
+ It follows that a k-linear equivalence between LMod(A) and LMod(B) induces
814
+ a k′-linear equivalence between LMod(A′) and LMod(B′), where B is a second
815
+ k-algebra spectrum and B′ := u∗(B).
816
+ Remark 3.7.1. We can also deduce an equivalence LMod(A′)ω ∼= LMod(B′)ω
817
+ whenever LMod(A)ω ∼= LMod(B)ω. But an equivalence LMod(A)ft ∼= LMod(B)ft
818
+ may not induce an equivalence LMod(A′)ft ≇ LMod(B′)ft. The self-equivalences
819
+ in Remark 3.6.3 provide an example with k = KUp and k′ = Qp[β, β−1], and
820
+ the map k → k′ being the Chern character. If G is a commutative p-group then
821
+ LMod(k′[G])ft = LModω(k′[G]) is semisimple and no self-equivalence of it can ex-
822
+ change the trivial representation for the regular representation.
823
+ We would like to study the converse problem: given a k′-linear equivalence
824
+ LMod(A′) ∼= LMod(B′), can we conclude that LMod(A) ∼= LMod(B)?
825
+
826
+ 16
827
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
828
+ Proposition 3.7.2. Let A and B be k-algebras which are perfect over k. Let F(A)
829
+ be a (B, A)-bimodule which is perfect separately as a left B-module and as a right
830
+ A-module. Let u : k → k′ be a commutative k-algebra and put A′ := u∗(A) and
831
+ B′ = u∗(B). If
832
+ (3.7.3)
833
+ u∗ : Mod(k)ω → Mod(k′)ω is conservative
834
+ and the induced functor
835
+ (3.7.4)
836
+ F ′ : LMod(A′) → LMod(B′)
837
+ is an equivalence of k′-linear ∞-categories, then LMod(A) → LMod(B) is an equiv-
838
+ alence of k-linear ∞-categories.
839
+ Remark 3.7.3. The hypothesis (3.7.3) applies when k is a discrete local ring and
840
+ u : k → k′ is the quotient by the maximal ideal. More generally if k and k′ are
841
+ discrete rings, then (3.7.3) holds if and only if the image of Spec (k′) → Spec (k)
842
+ contains all the closed points.
843
+ Hypothesis (3.7.3) also applies to the truncation map S → Z: this is one formu-
844
+ lation of the Whitehead theorem for homology groups.
845
+ Proof. After Prop. 3.6.1 and (3.6.2) the right adjoint functor to F(A) ⊗A − is
846
+ Maps(F(A), B) ⊗B −.
847
+ The counit for the adjunction is induced by a map
848
+ (3.7.5)
849
+ F(A) ⊗A Maps(F(A), B) → B
850
+ of (B, B)-bimodules, and the unit is induced by a map of (A, A)-modules
851
+ (3.7.6)
852
+ A → Maps(F(A), B) ⊗B F(A)
853
+ The induced k′-linear functors between LMod(A′) and LMod(B′) (F ′ (3.7.4) and
854
+ its adjoint G′) are isomorphic to
855
+ u∗F(A) ⊗A′ −
856
+ and
857
+ u∗(Maps(F(A), B)) ⊗B′ −
858
+ By assumption, F ′ is an equivalence. Its inverse equivalence must be G′ and the
859
+ maps
860
+ u∗F(A) ⊗A′ u∗(Maps(F(A), B)) → B′
861
+ A′ → u∗Maps(F(A), B) ⊗B′ u∗F(A)
862
+ are isomorphisms of bimodules, and since u∗ is a symmetric monoidal functor so
863
+ are
864
+ u∗(F(A) ⊗A Maps(F(A), B)) → B′
865
+ A′ → u∗(Maps(F(A), B) ⊗B F(A))
866
+ Then (3.7.5) and (3.7.6) are isomorphisms by (3.7.3).
867
+
868
+ 3.8. Duality. There are two dualities between Bimod(A, B) and Bimod(B, A),
869
+ “left” and “right” [Lur16, §4.6.2, §4.6.4]. In this section we review these concepts in
870
+ the special case B = k (dualities between LMod(A) ∼= Bimod(A, k) and RMod(A) ∼=
871
+ Bimod(k, A)) and make some remarks.
872
+
873
+ G-SPECTRA OF CYCLIC DEFECT
874
+ 17
875
+ 3.8.1. Duality of perfect A-modules. For any k-algebra spectrum A and any left A-
876
+ module M, the (A, A)-bimodule structure on A endows MapsLMod(A)(M, A) with
877
+ the structure of a right A-module.
878
+ We denote it by M ∨; the construction is a
879
+ contravariant functor
880
+ LMod(A)op → RMod(A) : M �→ M ∨
881
+ Proposition 3.8.1. For any k-algebra spectrum A, the functor LMod(A)op →
882
+ RMod(A) : M �→ M ∨ restricts to an equivalence
883
+ (LMod(A)ω)op ∼= RMod(A)ω
884
+ Proof. If M ∈ LMod(A) has a filtration
885
+ 0 → M≤0 → M≤1 → · · · → M≤n = M
886
+ by left A-modules, such that M≤i/M≤i−1 ∼= ΣdiA for each i, then M ∨ has a
887
+ filtration by right A-modules:
888
+ (M/M≤n)∨ → · · · (M/M≤1)∨ → (M/M≤0)∨ → M ∨
889
+ whose graded pieces have the form Σ−diA∨. Since A∨ ∼= A, it follows that M ∨ is
890
+ perfect as a right A-module, and so is any summand of M ∨. Thus (−)∨ carries
891
+ (LMod(A)ω)op into RMod(A)ω. The composite
892
+ RMod(A)ω = LMod(Aop)ω
893
+ (−)∨
894
+ −−−→ (RMod(Aop)ω)op = (LMod(A)ω)op)
895
+ is the inverse functor.
896
+
897
+ 3.8.2. Duality of k-modules. If M ∈ LMod(A)ft, then M ∗ (the monoidal dual of M
898
+ regarded as a k-module, notation as in §3.2) has the structure of a right A-module
899
+ spectrum. If N is a second A-module spectrum of finite type, then [Lur16, Prop.
900
+ 4.6.2.1] the natural map
901
+ (3.8.1)
902
+ MapsLMod(A)(M, N) → MapsRMod(A)(N ∗, M ∗)
903
+ is an equivalence of k-module spectra. In fact we have a commutative square:
904
+ (3.8.2)
905
+ LMod(A)ftop
906
+
907
+ =
908
+
909
+ forget
910
+
911
+ RModft(A)
912
+ forget
913
+
914
+ (Mod(k)ω)op
915
+
916
+ =
917
+ � Mod(k)ω
918
+ where the horizontal maps are given by (−)∗.
919
+ Proposition 3.8.2. Suppose A is perfect over k and that A∗ is perfect as a
920
+ right A-module. Then (3.8.2) is a fully faithful embedding of (LMod(A)ω)op into
921
+ RMod(A)ω. If A∗ is also perfect as a left A-module, then (3.8.2) restricts to an
922
+ equivalence (LMod(A)ω)op ∼= RMod(A)ω.
923
+ Remark 3.8.3. The example in §3.8.3 shows the hypothesis on A∗ cannot be
924
+ removed. The hypothesis is easy to verify for symmetric algebras.
925
+ Proof. If M ∈ LMod(A)ω has a filtration
926
+ 0 → M≤0 → M≤1 → · · · → M≤n = M
927
+
928
+ 18
929
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
930
+ by left A-modules, such that M≤i/M≤i−1 ∼= ΣdiA for each i, then M ∗ has a filtra-
931
+ tion by right A-modules:
932
+ (M/M≤n)∗ → · · · (M/M≤1)∗ → (M/M≤0)∗ → M ∗
933
+ whose graded pieces have the form Σ−diA∗. By assumption, A∗ is perfect as a right
934
+ A-module and therefore M ∗ is as well, and so is any summand of M ∗.
935
+ The functor is fully faithful by (3.8.1). If A∗ is perfect as a left A-module, the
936
+ (Aop)∗ is perfect as a right (Aop)-module and the same argument, together with
937
+ M ∼= (M ∗)∗ when M is a perfect k-module, shows that RModω(A)op → LMod(A)ω
938
+ is the inverse equivalence.
939
+
940
+ 3.8.3. Example. Suppose A ∈ Mod(k)ω, i.e. that LMod(A)ω ⊂ LMod(A)ft. The
941
+ equivalence
942
+ (LMod(A)ft)op ∼= RModft(A)
943
+ does not always carry (LMod(A)ω)op into RMod(A)ω. For instance, consider the
944
+ case where k is a field and A is the four-dimensional algebra with basis e1, e2, f, ǫ,
945
+ where e1 and e2 are orthogonal idempotents and
946
+ e1fe2 = f
947
+ e2ǫe2 = 0
948
+ ǫf = 0
949
+ ǫ2 = 0
950
+ Left modules over this ring are representations of the quiver
951
+
952
+ f
953
+ � •
954
+ ǫ
955
+
956
+ subject to ǫ2 = 0 and ǫf = 0
957
+ while right modules are representation of the quiver
958
+
959
+
960
+ f T
961
+
962
+ ǫT
963
+
964
+ subject to (ǫT )2 = 0 and f T ǫT = 0
965
+ The representation
966
+ k
967
+ =
968
+ � k
969
+ 0
970
+
971
+ is projective but its dual
972
+ k
973
+ k
974
+ =
975
+
976
+ 0
977
+
978
+ is not, nor does it have a finite projective resolution.
979
+ 3.9. Symmetric structures. In the literature on derived equivalences between
980
+ group algebras and their block algebras, the natural “symmetric structures” on
981
+ these algebras is sometimes used, e.g. [Rou01]. The symmetric structure has some
982
+ pleasant consequences for the right adjoint of a functor Db(A) → Db(B) that is
983
+ given by a complex of (B, A)-bimodules. In this section we explain the analog of
984
+ these consequences for algebra spectra.
985
+ Definition 3.9.1. Let B be a k-algebra spectrum that is perfect as a k-module.
986
+ A symmetric structure on B is an isomorphism of (B, B)-bimodules B ∼= B∗.
987
+ Let F : LMod(A) → LMod(B) be a colimit-preserving k-linear functor, i.e.
988
+ F(M) = F(A) ⊗A M.
989
+ We have already seen that F carries LMod(A)ω into
990
+ LMod(B)ω if and only if the (B, A)-bimodule F(A) is perfect as a left B-module.
991
+ When B is perfect over k, we can also conclude that F(A) is perfect over k and
992
+ consider F(A)∗ with its (A, B)-bimodule structure.
993
+
994
+ G-SPECTRA OF CYCLIC DEFECT
995
+ 19
996
+ Proposition 3.9.2. Suppose that B is perfect over k and is endowed with a sym-
997
+ metric structure. Let F : LMod(A) → LMod(B) be a colimit-preserving functor
998
+ that carries LMod(A)ω into LMod(B)ω. Then the right adjoint G : LMod(B) →
999
+ LMod(A) is given by
1000
+ G(M) = F(A)∗ ⊗B M
1001
+ Proof. By Prop. 3.6.1, G is colimit-preserving and is given by the formula G(M) =
1002
+ G(B) ⊗B M, and (3.6.2) gives a formula for G(B):
1003
+ G(B) = MapsLMod(B)(F(A), B)
1004
+ Since both F(A) and B are perfect over k, we furthermore have an isomorphism of
1005
+ left A-modules (3.8.1)
1006
+ (3.9.1)
1007
+ MapsLMod(B)(F(A), B) ∼= MapsRMod(B)(B∗, F(A)∗)
1008
+ where on the domain the left A-module structure is induced by the right A-module
1009
+ structure on F(A), and on the codomain by the left A-module structure on F(A)∗.
1010
+ The composite is
1011
+ G(B) ∼= MapsRMod(B)(B∗, F(A)∗)
1012
+ The bimodule isomorphism B∗ ∼= B is also a right B-module isomorphism and it
1013
+ induces a further isomorphism
1014
+ G(B) ∼= MapsRMod(B)(B, F(A)∗) ∼= F(A)∗
1015
+ where the second isomorphism MapsRMod(B)(B, N) ∼= N holds for any right B-
1016
+ module N.
1017
+
1018
+ When both A and B are perfect over k, and both are endowed with symmetric
1019
+ structures, we can make some further conclusions:
1020
+ Corollary 3.9.3. Suppose that both A and B are perfect over k and can be
1021
+ endowed with symmetric structures. Let F : LMod(A) → LMod(B) be a colimit-
1022
+ preserving functor that carries LMod(A)ω into LMod(B)ω. Then the following are
1023
+ equivalent:
1024
+ (1) F(A) is perfect as a right A-module
1025
+ (2) F(A)∗ is perfect as a left A-module
1026
+ (3) The right adjoint G(M) = F(A)∗ ⊗B M carries LMod(B)ω into LMod(A)ω
1027
+ When these equivalent conditions hold, F carries LMod(A)ft into LMod(B)ft and
1028
+ G carries LMod(B)ft into LMod(A)ft.
1029
+ Proof. (1) and (2) are equivalent by Prop. 3.8.2, and the equivalence of (2) and (3)
1030
+ is immediate from the formula G(M) = F(A)∗ ⊗B M.
1031
+ That F carries LMod(A)ft into LMod(B)ft is immediate from Prop. 3.5.2. That
1032
+ G carries LMod(B)ft into LMod(A)ft follows from the same Proposition applied to
1033
+ G(B).
1034
+
1035
+ 3.10. K(n)-local algebras. While Proposition 3.5.1 is a complete description of
1036
+ functors LMod(A)ω → LMod(B)ω in terms of (B, A)-bimodules, Proposition 3.5.2
1037
+ only gives a sufficient condition for a bimodule to determine a functor LMod(A)ft →
1038
+ LMod(B)ft. In this and the next section, we discuss how we can do better when
1039
+ A and B are group algebras for finite groups and k obeys a technical condition
1040
+
1041
+ 20
1042
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1043
+ (Equation (3.11.1)) related to the theory of K(n)-local spectra; the main result is
1044
+ Corollary 3.12.7. This material is not used in the proof of §2.6.
1045
+ For n ≥ 1 let K(n) = K(n)p be the nth Morava K-theory spectrum at the prime
1046
+ p, with
1047
+ πi(K(n)) =
1048
+
1049
+ Z/p
1050
+ if i ∈ (2pn − 2)Z
1051
+ 0
1052
+ otherwise.
1053
+ An object c of (any) presentable stable ∞-category C is called K(n)-acyclic if
1054
+ K(n)⊗S c = 0, and d ∈ C is called K(n)-local if Maps(c, d) is contractible whenever
1055
+ c is K(n)-acyclic. The full subcategory of K(n)-local objects of C is the essential
1056
+ image of an idempotent functor LK(n) : C → C and is denoted LK(n)C.
1057
+ We have two useful formulas for the limit and for the colimit of a diagram
1058
+ D : I → LK(n)C:
1059
+ lim
1060
+ ←− D = lim
1061
+ ←−(LK(n)C ֒→ C) ◦ D
1062
+ lim
1063
+ −→ D = LK(n) lim
1064
+ −→(LK(n)C ֒→ C) ◦ D
1065
+ In other words, the inclusion of LK(n)C → C preserves limits and the localization
1066
+ functor C → LK(n)C preserves colimits.
1067
+ We are interested in the categories LK(n)LMod(A), where A is an associative
1068
+ k-algebra spectrum and k is a commutative ring spectrum. We will also gener-
1069
+ ally assume k and A are themselves K(n)-local (as otherwise, we get equivalent
1070
+ categories by replacing them with their K(n)-localizations).
1071
+ Proposition 3.10.1. For M ∈ LMod(A), the following are equivalent:
1072
+ (1) M ∈ LK(n)LMod(A)
1073
+ (2) The k-module underlying M is in LK(n)Mod(k).
1074
+ Proof. The actions of K(n)⊗S on LMod(A) and on Mod(k) are intertwined by the
1075
+ forgetful functor, so if N is K(n)-acyclic as an A-module, it is also K(n)-acyclic as
1076
+ a k-module. Similarly A⊗k N, A⊗k A⊗k N,. . . are K(n)-acyclic k-modules if N is.
1077
+ Thus, for all n, Mapsk(A⊗kn ⊗k N, M) = 0 when M is K(n)-local and N is K(n)-
1078
+ acyclic. We conclude that (2) implies (1) from the bar model for MapsA(N, M),
1079
+ i.e.
1080
+ MapsA(N, M)
1081
+ ∼=
1082
+ lim
1083
+ ←−n Mapsk(A⊗n ⊗ N, M)
1084
+ =
1085
+ lim
1086
+ ←−(Mapsk(A ⊗k N, M) ⇒ Mapsk(A ⊗k A ⊗k N, M) · · · )
1087
+ which vanishes as long as all the terms in the limit do, i.e. as long as M is K(n)-local
1088
+ as a k-module.
1089
+ To show that (1) implies (2), use again that A ⊗k N is K(n)-acyclic if N is, and
1090
+ that Mapsk(N, M) ∼= MapsA(A ⊗k N, M).
1091
+
1092
+ 3.11. Finiteness conditions for K(n)-local modules.
1093
+ Remark 3.11.1. There are analogous finiteness conditions to §3.2 in LK(n)Mod(k),
1094
+ but they do not necessarily coincide with the corresponding notions in the larger
1095
+ category Mod(k), and they no longer all agree.
1096
+ (1) The notion of perfect is unchanged (any perfect k-module is automatically
1097
+ K(n)-local).
1098
+ (2) Compact (or perfect) objects in Mod(k) are not in general compact in
1099
+ LK(n)Mod(k); for example k itself is usually not compact in LK(n)Mod(k).
1100
+ This is analogous to the fact that Zp is not compact in p-complete Zp-
1101
+ modules.
1102
+
1103
+ G-SPECTRA OF CYCLIC DEFECT
1104
+ 21
1105
+ (3) The natural tensor product on LK(n)Mod(k) is not (M, N) �→ M ⊗k N but
1106
+ (M, N) �→ LK(n)(M ⊗k N). We will call objects which are dualizable with
1107
+ respect to this tensor structure K(n)-locally dualizable. Perfect modules are
1108
+ always K(n)-locally dualizable, but there are generally more K(n)-locally
1109
+ dualizable objects than this [HS99, §15].
1110
+ While the categories LMod(A)ft are defined in terms of the underlying k-modules
1111
+ being perfect, it turns out that the notion of K(n)-local dualizability has more useful
1112
+ formal properties (cf. also Proposition 3.12.2):
1113
+ Lemma 3.11.2. Let k be a K(n)-local commutative ring spectrum and M ∈
1114
+ LK(n)Mod(k). Then M is K(n)-locally dualizable if and only if the functor
1115
+ LK(n)(− ⊗k M) : LK(n)Mod(k) → LK(n)Mod(k)
1116
+ preserves limits.
1117
+ Proof. The only if direction follows from LK(n)Mod(k) being a closed symmetric
1118
+ monoidal category.
1119
+ For the if direction, note that the adjoint functor theorem
1120
+ [Lur17, Cor. 5.5.2.9] and Proposition 3.12.1 imply that − ⊗k M has a left adjoint
1121
+ given by LK(n)(− ⊗k N), and N is easily seen to be the K(n)-local dual of M.
1122
+
1123
+ In light of Remark 3.11.1(3), we highlight a condition where this distinction
1124
+ disappears:
1125
+ (3.11.1)
1126
+ A K(n)-local commutative ring spectrum k satisfies condition
1127
+ (3.11.1) if every K(n)-locally dualizable k-module M is perfect.
1128
+ Since perfect k-modules are always dualizable, the classes of dualizable and per-
1129
+ fect K(n)-local k-modules coincide when k obeys this condition. Hence, LMod(A)ft
1130
+ coincides with the subcategory of LK(n)LMod(A) whose underlying k-module is
1131
+ K(n)-locally dualizable.
1132
+ Example 3.11.3. Condition (3.11.1) is satisfied when K(n) = K(1) and k = KUp.
1133
+ In fact, for any n, any Lubin-Tate theory (equivalently, Morava E-theory) obeys
1134
+ the condition. To see this, let E be a Lubin-Tate theory, let I = (p, v1, · · · , vn−1) ⊂
1135
+ π0(E) denote a Landweber ideal in π0(E), and let K = E/(p, v1, · · · , vn−1) de-
1136
+ note the corresponding Morava K-theory. If M is a dualizable E-module, then
1137
+ π∗(M/(p, v1, · · · , vn−1)) is a dualizable π∗(K)-module, and therefore it is a finitely
1138
+ generated π∗(K)-module. By the proof of [HS99, Prop. 2.4], this means that π∗(M)
1139
+ is finitely generated over π∗(E), and hence by [HS99, Lem. 8.11] that M is perfect
1140
+ as an E-module.
1141
+ 3.12. Functors and bimodules in LK(n)-local categories.
1142
+ Proposition 3.12.1. Let k be a K(n)-local commutative ring spectrum and let
1143
+ A and B be K(n)-local associative k-algebra spectra. If F is a colimit-preserving
1144
+ k-linear functor
1145
+ F : LK(n)LMod(A) → LK(n)LMod(B),
1146
+ then F is isomorphic to LK(n)(F(A) ⊗A −).
1147
+ Here F(A) gets a (B, A)-bimodule structure as in §3.5. The analog of (3.5.1) is
1148
+ FunL
1149
+ k(LK(n)LMod(A), LK(n)LMod(B)) ∼= LK(n)Bimod(B, A)
1150
+
1151
+ 22
1152
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1153
+ The functor from the right category to the left category sends a K(n)-local bimodule
1154
+ N to the functor LK(n)(N ⊗A −).
1155
+ Proof. Suppose that F is a colimit-preserving k-linear functor LK(n)LMod(A) →
1156
+ LK(n)LMod(B).
1157
+ For M ∈ LK(n)LMod(A) the natural map
1158
+ (3.12.1)
1159
+ F(A) ⊗A M → F(M)
1160
+ factors through a natural map
1161
+ (3.12.2)
1162
+ LK(n)(F(A) ⊗A M) → F(M).
1163
+ Indeed, since F(M) is K(n)-local, (3.12.2) is LK(n) applied to (3.12.1). The map
1164
+ (3.12.2) is an isomorphism when M = A, and since F preserves colimits is therefore
1165
+ an isomorphism for all M ∈ LK(n)LMod(A).
1166
+
1167
+ When A is perfect over k, we have containments
1168
+ LModω(A) ⊂ LMod(A)ft ⊂ LK(n)LMod(A).
1169
+ As in Remark 3.11.1, we warn that neither category agrees with compact objects
1170
+ in LK(n)LMod(A). If A and B are both perfect over k, it is natural to ask for a
1171
+ criterion for LK(n)(F(A) ⊗A −) to carry LMod(A)ft into LMod(B)ft. The criterion
1172
+ of Prop. 3.5.2 still applies, but is strictly stronger than necessary. When A and B
1173
+ are group algebras, a phenomenon called K(n)-local Tate vanishing or ambidexterity
1174
+ gives a less restrictive criterion.
1175
+ The study of these phenomena originates in work of Greenlees–Sadofsky and
1176
+ Hovey–Sadofsky [GS96, HS96].
1177
+ Generalizing their work, Kuhn [Kuh04] showed
1178
+ that the Tate cohomology of finite groups vanishes in the K(n)-local setting1. The
1179
+ n = 0 case of Kuhn’s theorem is the familiar fact that the additive transfer map from
1180
+ orbits to fixed points is an isomorphism when working over Q. These results were
1181
+ further generalized and reinterpreted by the Hopkins–Lurie theory of ambidexterity
1182
+ [HL13], which has been generalized and developed extensively by Carmeli–Schlank–
1183
+ Yanovski and Barthel–Carmeli–Schlank–Yanovski [CSY22], [CSY21a], [CSY21b],
1184
+ [BCSY22]. For the convenience of the reader, the following proposition collects
1185
+ some basic features of the theory.
1186
+ Proposition 3.12.2. Let G be a finite group and let k be a K(n)-local commuta-
1187
+ tive ring spectrum. Then:
1188
+ (1) The functors Fun(BG, LK(n)Mod(k)) → LK(n)Mod(k) given by (−)hG and
1189
+ LK(n)(−)hG are identified.
1190
+ (2) The k-modules kBG and LK(n)k[BG] (which are isomorphic by (1)) are
1191
+ K(n)-locally dualizable over k.
1192
+ If G is a p-group, then we also have
1193
+ (3) There is an equivalence of categories
1194
+ Fun(BG, LK(n)Mod(k)) ∼= LK(n)Mod(kBG)
1195
+ given by M �→ M hG.
1196
+ (4) Under the equivalence in (3), both functors in (1) are identified with re-
1197
+ striction of scalars along k → kBG.
1198
+ 1In fact, he showed this in the (conjecturally) more general setting of T(n)-local homotopy
1199
+ theory.
1200
+
1201
+ G-SPECTRA OF CYCLIC DEFECT
1202
+ 23
1203
+ Proof. Statement (1) is [HS96, Thm 1.1] (or [HL13, Thm. 5.2.1]) and (3) and (4)
1204
+ are [HL13, Thm. 5.4.3]. To see (2), note first that if P ⊂ G is a p-Sylow, then a
1205
+ standard transfer argument shows that LK(n)k[BG] is a summand of LK(n)k[BP]
1206
+ and so it suffices to consider the case when G is a p-group. The transitivity of
1207
+ homotopy orbits then reduces to the case G = Cp, and by base-change, it suffices
1208
+ to consider the case k = LK(n)S.
1209
+ Finally, by [HS99, Thm 8.6], the K(n)-local
1210
+ dualizability of LK(n)S[Cp] amounts to seeing K(n)∗(BCp) is finite, which follows
1211
+ from [RW80].
1212
+
1213
+ Proposition 3.12.3. Let k be a K(n)-local commutative ring spectrum, let A =
1214
+ k[G] be the group algebra (§4.2) of a finite group G, and let F(A) be a right
1215
+ A-module whose underlying k-module is K(n)-locally dualizable. Then the functor
1216
+ F : LK(n)LMod(A) → LK(n)Mod(k)
1217
+ M �→ LK(n)(F(A) ⊗A M)
1218
+ preserves the property of having K(n)-locally dualizable underlying k-module.
1219
+ Proof. In light of Proposition 3.12.2(2-4), this is a consequence of the following
1220
+ lemma 3.12.4 applied to the map k → kBG.
1221
+
1222
+ Lemma 3.12.4. Let f : k → k′ be a map of K(n)-local commutative ring spectra
1223
+ such that k′ is K(n)-locally dualizable as a k-module. Then restriction of scalars
1224
+ along f sends K(n)-locally dualizable k′-modules to K(n)-locally dualizable k-
1225
+ modules.
1226
+ Proof. Let M be a K(n)-locally dualizable k′-module. Then note that the functor2
1227
+ (3.12.3)
1228
+ LK(n)(− ⊗k M) : LK(n)Mod(k) → LK(n)Mod(k)
1229
+ can be written as the composite
1230
+ LK(n)Mod(k)
1231
+ −⊗kk′
1232
+ −−−−→ LK(n)Mod(k′)
1233
+ −⊗k′ M
1234
+ −−−−−→ LK(n)Mod(k′)
1235
+ forget
1236
+ −−−→ LK(n)Mod(k).
1237
+ By the dualizability hypotheses and Lemma 3.11.2, the first two arrows preserve
1238
+ limits, and the third arrow preserves limits as it is a right adjoint. Thus, (3.12.3)
1239
+ preserves limits as well and the claim follows from Lemma 3.11.2.
1240
+
1241
+ Remark 3.12.5. Lemma 3.12.4 is not specific to K(n)-local spectra — the analo-
1242
+ gous statement holds more generally in any presentable symmetric monoidal stable
1243
+ ∞-category.
1244
+ Remark 3.12.6. The conclusion of Proposition 3.12.3 can fail when A is not the
1245
+ group algebra of a finite group. For example, let A = k[S1] be the k-homology
1246
+ spectrum of the circle. Then we have an isomorphism
1247
+ LK(n)(k ⊗A k) ∼= k[BS1],
1248
+ which is not generally K(n)-locally dualizable.
1249
+ When k satisfies the condition (3.11.1), then perfect modules and K(n)-locally
1250
+ dualizable modules coincide, and therefore we immediately deduce the following
1251
+ consequence of Proposition 3.12.3 for finite type modules:
1252
+ 2Here and in the following equation, we need not K(n)-localize the tensor product due to the
1253
+ assumed dualizability.
1254
+
1255
+ 24
1256
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1257
+ Corollary 3.12.7. Let k be a K(n)-local commutative ring spectrum satisfying
1258
+ condition (3.11.1). Let A = k[G] and B = k[H] be the group algebras (§4.2) of
1259
+ finite groups G and H. Let F(A) be a (B, A)-bimodule whose underlying k-module
1260
+ is perfect. Then the functor
1261
+ M �→ LK(n)(F(A) ⊗A M)
1262
+ carries LMod(A)ft to LMod(B)ft.
1263
+ 4. Permutation modules and Rouquier’s equivalence over S
1264
+ We now turn to lifting Rouquier’s equivalence to S. In §4.1, we start by reviewing
1265
+ the form of Rouquier’s original equivalence. Then in §4.2-4.4, we discuss the theory
1266
+ of permutation G-modules over S. In §4.5, we show that summands of permutation
1267
+ modules lift from Zq to Sq. Finally, in §4.7, we put these ingredients together with
1268
+ the results of §3 to prove our main theorem, Theorem 4.7.2.
1269
+ 4.1. Rouquier’s two-term complexes. Let G be a finite group and let D ⊂ G
1270
+ be a cyclic group of p-power order.
1271
+ The left multiplication of G and the right
1272
+ multiplication of NG(D) on G endow Zq[G] with a (G, NG(D))-bimodule structure,
1273
+ whose associated functor
1274
+ LMod(Zq[NG(D)]) → LMod(Zq[G])
1275
+ is equivalent to induction along the inclusion NG(D) ⊂ G. The adjoint is restriction
1276
+ along the same inclusion, represented by Zq[G] regarded as a (NG(D), G)-bimodule.
1277
+ Now let Fq[G]b and Fq[NG(D)]b′ be blocks whose defect group is D and which
1278
+ are Brauer correspondents of each other. Then (abusing notation and writing b
1279
+ and b′ also for the unique lifts of these idempotents to Zq[G] and Zq[NG(D)]) the
1280
+ (Zq[G]b, Zq[NG(D)]b′)-summand of the bimodule Zq[G] is bZq[G]b′, which repre-
1281
+ sents the composite functor
1282
+ (4.1.1)
1283
+ LMod(Zq[NG(D)]b′) → LMod(Zq[NG(D)]) → LMod(Zq[G]) → LMod(Zq[G]b)
1284
+ This functor carries LMod(Zq[NG(D)]b′)ft into LMod(Zq[G]b)ft and LMod(Zq[NG(D)]b′)ω
1285
+ into LMod(Zq[G]b)ω. Its right adjoint is represented by b′Zq[G]b and carries LMod(Zq[G]b)ft
1286
+ into LMod(Zq[NG(D)]b′)ft and LMod(Zq[G]b)ω into LMod(Zq[NG(D)]b′)ω.
1287
+ The composition (4.1.1) is not an equivalence. For many finite groups, it does
1288
+ induce a “stable equivalence” (for instance, for groups whose p-Sylows have trivial
1289
+ intersection [Bro94, §5, 6.4]; in general one has to pass to a summand) — one
1290
+ formulation of this is that it induces an equivalence of quotient categories
1291
+ LMod(Zq[NG(D)]b′)ft
1292
+ LMod(Zq[NG(D)]b′)ω ∼= LMod(Zq[G]b)ft
1293
+ LMod(Zq[G]b)ω
1294
+ In particular the composite of (4.1.1) with its adjoint differs from the identity
1295
+ functor by a bounded complex of projective (Zq[NG(D)]b′, Zq[NG(D)]b′)-bimodules
1296
+ or projective (Zq[G]b, Zq[G]b)-bimodules.
1297
+ Rouquier showed that, when D is cyclic, one can introduce a relatively simple
1298
+ correction to the bimodule representing (4.1.1) to obtain an equivalence predicted
1299
+ by Brou´e’s Conjecture.
1300
+ Theorem 4.1.1 (Rouquier [Rou98]). Let G be a finite group and let D ⊂ G be
1301
+ a cyclic subgroup of p-power order. Let Fq[G]b and Fq[NG(D)]b′ be blocks whose
1302
+
1303
+ G-SPECTRA OF CYCLIC DEFECT
1304
+ 25
1305
+ defect group is D and which are Brauer correspondents of each other. Then there
1306
+ is a two-term complex of (Zq[G]b, Zq[NG(D)]b′)-bimodules
1307
+ M0 = {· · · → 0 → N ′
1308
+ 0 → N0 → 0 → · · · }
1309
+ with the following properties:
1310
+ (1) N0 is a direct summand of Zq[G], with its (Zq[G], Zq[NG(D)])-bimodule
1311
+ structure coming from the left multiplication action of G and the right
1312
+ multiplication action of NG(D).
1313
+ (2) N ′
1314
+ 0 is a projective (Zq[G]b, Zq[NG(D)]b′)-bimodule.
1315
+ (3) The resulting functor
1316
+ M0 ⊗Zq[NG(D)]b′ − : LMod(Zq[NG(D)]b′) → LMod(Zq[G]b)
1317
+ is an equivalence, and restricts to an equivalence on LModft and LModω.
1318
+ 4.2. Group rings and permutation modules. If k is a commutative ring spec-
1319
+ trum, denote by X �→ k[X] ∈ Mod(k) the functor that carries a space to its k-
1320
+ homology spectrum. For example, if k = S, then S[X] is the suspension spectrum
1321
+ of X with a disjoint basepoint and in general k[X] = S[X] ⊗S k. A useful formula
1322
+ is
1323
+ (4.2.1)
1324
+ [k[X], Σik] ∼= Hi(X; k)
1325
+ where the right-hand side denotes the ith (extraordinary) cohomology of X with
1326
+ coefficients in k.
1327
+ If G acts on X, then we may regard k[X] as a G-object in Mod(k) (i.e., as an
1328
+ object of Fun(BG, Mod(k))) by composing
1329
+ BG → S
1330
+ k[−]
1331
+ −−−→ Mod(k).
1332
+ The analog of (4.2.1) is
1333
+ (4.2.2)
1334
+ [k[X], Σik]Fun(BG,Mod(k)) ∼= Hi
1335
+ G(X; k) := Hi(XhG; k)
1336
+ where XhG := lim
1337
+ −→BG X ∼= (X × EG)/G is the Borel construction.
1338
+ If X is a finite G-set, then k[X] = �
1339
+ x∈X k is called a permutation module.
1340
+ The associative k-algebra structure on k[G] induced by the multiplication on G
1341
+ coincides with the endomorphism algebra of k[G/{1}] regarded as a permutation
1342
+ module, which generates Fun(BG, Mod(k)), so that we have
1343
+ Fun(BG, Mod(k)) ∼= LMod(k[G]).
1344
+ The symmetric monoidal structure on Mod(k) induces a symmetric monoidal struc-
1345
+ ture on Fun(BG, Mod(k)), which we denote by ⊗k.
1346
+ The unit of the monoidal
1347
+ structure is the trivial module k.
1348
+ Lemma 4.2.1. The permutation modules k[X] are self-dual with respect to the
1349
+ monoidal structure in Mod(k) and in Fun(BG, Mod(k)).
1350
+ Proof. We produce evaluation and coevaluation maps satisfying the necessary re-
1351
+ lations.
1352
+ The coevaluation map comes from the composition
1353
+ (4.2.3)
1354
+ k → k[X]
1355
+ ∆X
1356
+ −−→ k[X × X] ∼= k[X] ⊗k k[X]
1357
+
1358
+ 26
1359
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1360
+ where the first map is the diagonal k → �
1361
+ x∈X k. The composite
1362
+ [k[X] ⊗ k[X], k]
1363
+ ⊗k[X]
1364
+ −−−−→ [k[X] ⊗ k[X] ⊗ k[X], k[X]]
1365
+ idk[X]⊗(4.2.3)∗
1366
+ −−−−−−−−−−→ [k[X], k[X]]
1367
+ is a bijection. The homotopy class of the evaluation map k[X] ⊗ k[X] → k is the
1368
+ image of idk[X] under the inverse bijection.
1369
+
1370
+ Remark 4.2.2. The k-homology of manifolds furnish a more general class of du-
1371
+ alizable objects of Mod(k), and the k-homology of G-manifolds furnish dualizable
1372
+ objects of Fun(BG, Mod(k)). For a closed n-manifold M, the homology spectrum
1373
+ k[M] is self-dual up to a shift so long as M is k-orientable — indeed one defini-
1374
+ tion of a k-orientation of M is a homotopy class of maps k → Σ−nk[M] with the
1375
+ property that the composite map
1376
+ k → Σ−nk[M] → Σ−nk[M × M] → Σ−nk[M] ⊗k k[M]
1377
+ exhibits Σ−nk[M] as the dual of k[M]. Lemma 4.2.1 is the case n = 0.
1378
+ Under the equivalence
1379
+ Bimod(k[G], k[G]) ∼= LMod(k[G] ⊗ k[G]op) ∼= LMod(k[G × Gop]),
1380
+ the diagonal bimodule k[G] is a permutation G× Gop-module, with G× Gop acting
1381
+ on G by left and right multiplication. It follows from (4.2.3) that each k[G] has a
1382
+ natural symmetric structure in the sense of §3.9. Furthermore any block of k[G] has
1383
+ a symmetric structure: indeed, if A = A1 ×A2 ×· · · , then a symmetric structure on
1384
+ A induces a symmetric structure on each Ai by the composite Ai → A ∼= A∗ → A∗
1385
+ i .
1386
+ The self-duality of permutation modules gives an identification between homo-
1387
+ topy classes of maps k[X] → k[Y ] and equivariant k-cohomology classes in X × Y :
1388
+ [k[X], k[Y ]]k[G] ∼= [k[X] ⊗ k[Y ], k]k[G] ∼= [k[X × Y ], k]k[G] ∼= H0
1389
+ G(X × Y ; k).
1390
+ 4.3. The Burnside ring. For a finite group G and a finite G-set X, let BurnG(X)
1391
+ denote the Grothendieck group of the commutative monoid whose objects are iso-
1392
+ morphism classes of finite G-sets Y equipped with a G-equivariant map to X, and
1393
+ whose addition is given by disjoint union. We will refer to BurnG(X) as the Burn-
1394
+ side ring of virtual finite G-sets over X, as it acquires a commutative multiplication
1395
+ given by fiber product over X.
1396
+ Remark 4.3.1. In general, BurnG(X) = �
1397
+ x∈G\X BurnGx(pt), where the sum is
1398
+ over G-orbit representatives and Gx denotes the stabilizer. In particular, BurnG(G/H)
1399
+ is isomorphic to BurnH(pt) and BurnG(G/{1}) = Z.
1400
+ A map of G-sets X → X′ induces by fiber-product over X′ a ring homomor-
1401
+ phism BurnG(X′) → BurnG(X). In particular the map X → pt gives BurnG(X) a
1402
+ BurnG(pt)-module structure, and the map G → pt induces the augmentation map
1403
+ BurnG(pt) → BurnG(G) = Z, carrying a G-set to the cardinality of its underlying
1404
+ set. Let I ⊂ BurnG(pt) denote the kernel of the augmentation map, called the
1405
+ augmentation ideal.
1406
+ Theorem 4.3.2 (Carlsson [Car84], weak form of Segal’s conjecture). Let G be a
1407
+ finite group, which we regard as acting trivially on S, and let ShG be the homotopy
1408
+ fixed-point spectrum of this action §3.1. Then there is a natural map of rings
1409
+ (4.3.1)
1410
+ BurnG(pt) → π0(ShG)
1411
+ which exhibits the target as the I-adic completion of the source.
1412
+
1413
+ G-SPECTRA OF CYCLIC DEFECT
1414
+ 27
1415
+ Remark 4.3.3. As the G-action on S is trivial, the homotopy fixed points ShG
1416
+ are naturally identified with MapsMod(S)(S[BG], S) and with MapsLMod(S[G])(S, S).
1417
+ (Similarly, ShG is naturally identified with S[BG].)
1418
+ We denote the completion at I of BurnG(pt) by BurnG(pt)∧
1419
+ I . If X is a finite
1420
+ G-set, we also define BurnG(X)∧
1421
+ I using the natural BurnG(pt)-module structure on
1422
+ BurnG(X).
1423
+ Proposition 4.3.4. Let G be a finite group. Then for any two finite G-sets X and
1424
+ Y , we have an identification
1425
+ π0MapsLMod(S[G])(S[X], S[Y ]) ∼= BurnG(X × Y )∧
1426
+ I .
1427
+ In particular, by taking Y = pt, we have
1428
+ (4.3.2)
1429
+ π0MapsLMod(S[G])(S[X], S) ∼= BurnG(X)∧
1430
+ I .
1431
+ Proof. In fact, it suffices to prove the special case (4.3.2) noted in the statement,
1432
+ as S[Y ] is canonically self-dual and therefore
1433
+ MapsG(S[X], S[Y ]) ∼= MapsG(S[X] ⊗ S[Y ], S) ∼= MapsG(S[X × Y ], S).
1434
+ For this, note that both sides of (4.3.2) convert disjoint union into products, so it’s
1435
+ enough to consider the case where X has a single orbit, say X = G/H. Then
1436
+ MapsG(S[G/H], S) ∼= MapsH(S, S),
1437
+ whose π0 is identified by Theorem 4.3.2 with BurnH(pt)∧
1438
+ IH ∼= BurnG(G/H)∧
1439
+ IG.
1440
+
1441
+ If we further complete BurnG(X)∧
1442
+ I at p, or equivalently if we study BurnG(X)∧
1443
+ (I,p)
1444
+ where (I, p) is the kernel of BurnG(X)
1445
+ aug
1446
+ −−→ Z → Z/p, we have the following simple
1447
+ description:
1448
+ Lemma 4.3.5. The Zp-module BurnG(pt)∧
1449
+ (I,p) is free of finite rank, generated by
1450
+ isomorphism classes of G-sets of the form G/P for P ⊂ G a p-group.
1451
+ Because of this and Remark 4.3.1, BurnG(X)∧
1452
+ (I,p) is a free Zp-module generated
1453
+ by the set of isomorphism classes of G-maps G/P → X, where P ⊂ G is a p-group.
1454
+ Proof. Recall Burnside’s marking homomorphism BurnG(pt) → �
1455
+ H Z, also called
1456
+ the “table of marks” [Bur11]. The factors in the direct product are indexed by
1457
+ conjugacy class representatives of subgroups of G, and the projection onto the factor
1458
+ H sends the G-set X to the cardinality of its H-fixed points. If s ∈ BurnG(pt)
1459
+ we will write #sH for the composition of the marking homomorphism with the
1460
+ projection onto the Z factor indexed by H.
1461
+ The marking homomorphism is a ring homomorphism, and it is easy to see that it
1462
+ is injective (a reference is [tD79, Proposition 1.2.2]). Since its domain and codomain
1463
+ are free abelian groups of the same rank, this means it becomes an isomorphism
1464
+ after applying − ⊗ Q or − ⊗ Qp. Write eH ∈ BurnG(pt) ⊗ Q for the virtual G-set
1465
+ with one H-fixed point and no H′-fixed points when H′ is not conjugate to H:
1466
+ #eH
1467
+ H = 1
1468
+ #eH′
1469
+ H = 0 when H′ is not conjugate to H
1470
+ The eH are the primitive idempotents in BurnG(pt) ⊗ Q and in BurnG(pt) ⊗ Qp.
1471
+ We remark that eH only involves G-sets corresponding to subconjugates of H: to
1472
+ see this, consider the variant of the marking homomorphism where on the source,
1473
+ one takes the subring generated by G-sets subconjugate to H, and on the target,
1474
+
1475
+ 28
1476
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1477
+ one considers only factors corresponding to subconjugates of H. This variant is
1478
+ easily seen to be injective again, and is therefore an isomorphism after tensoring
1479
+ with Q.
1480
+ The primitive idempotents in BurnG(pt) ⊗ Zp ∼= BurnG(pt)∧
1481
+ p were identified by
1482
+ Dress [Dre69]. They are in one-to-one correspondence with conjugacy classes of
1483
+ p-perfect subgroups ̟ ⊂ G (a group is called p-perfect when it has no normal
1484
+ subgroups of p-power index). The idempotent corresponding to ̟ is ε̟ = �
1485
+ H eH,
1486
+ where the sum runs through class representatives of subgroups H that contain a
1487
+ conjugate of ̟ as a normal subgroup of p-power index.
1488
+ The trivial subgroup is p-perfect; let us denote its corresponding idempotent by
1489
+ ε := ε1. Thus ε := ε1 = �
1490
+ Q eQ where the sum runs through class representatives
1491
+ of p-subgroups Q ⊂ G. The natural map
1492
+ (4.3.3)
1493
+ BurnG(pt)∧
1494
+ p → BurnG(pt)∧
1495
+ (I,p)
1496
+ kills all the other ε̟ and has target a local ring (the target is the completion
1497
+ of BurnG(pt) at a maximal ideal, namely the kernel of augmentation modulo p).
1498
+ Therefore, (4.3.3) factors through
1499
+ (4.3.4)
1500
+ ε BurnG(pt)∧
1501
+ p → BurnG(pt)∧
1502
+ (I,p)
1503
+ Since the source ring ε BurnG(pt)∧
1504
+ p is local and (by the injectivity of the marking
1505
+ homomorphism) finitely generated and free over Zp, the (I, p)-adic topology on it
1506
+ coincides with the p-adic topology: ε BurnG(pt)∧
1507
+ p /(p) is a finite local ring so the
1508
+ image of the ideal (I, p) is nilpotent. Therefore, ε BurnG(pt)∧
1509
+ p is isomorphic to its
1510
+ own completion with respect to the ideal generated by (I, p), so that (4.3.4) is an
1511
+ isomorphism.
1512
+ Furthermore, note that for any p-subgroup Q ⊂ G, we have εG/Q = G/Q.
1513
+ This can be seen from the fact that they have the same image under the marking
1514
+ homomorphism, as (G/Q)H is nonempty if and only if H is conjugate to a subgroup
1515
+ of Q, and ε is the indicator function on the factors indexed by p-groups H.
1516
+ It therefore suffices to show that the G-sets of the form εG/Q span ε BurnG(pt)∧
1517
+ p .
1518
+ But the G-sets of the form G/H span BurnG(pt) and inside ε BurnG(pt)∧
1519
+ p , we
1520
+ have G/H = εG/H. As ε = �
1521
+ Q eQ only involves G-sets of the form G/Q for
1522
+ p-subgroups Q and G/H × G/Q involves only G-sets with isotropy subconjugate to
1523
+ Q, we conclude.
1524
+
1525
+ 4.4. Digression on the strong Segal conjecture and Tate cohomology. This
1526
+ subsection is not used in the proof of §2.6.
1527
+ Segal formulated (4.3.1) by analogy with Atiyah’s theorem [Ati61], which iden-
1528
+ tifies the complex K-theory KU0(BG) with a completion of the representation ring
1529
+ R(G) of G, i.e. the Grothendieck ring of finite-dimensional representations of C[G]:
1530
+ (4.4.1)
1531
+ R(G) → KU0(BG).
1532
+ There is a more sophisticated version of both Atiyah’s theorem and of the Segal
1533
+ conjecture, which in a way is the start of “genuine” equivariant stable homotopy
1534
+ theory.
1535
+ (1) There is a commutative ring spectrum KUG, the (genuine) G-equivariant
1536
+ K-theory of a point, together with a map
1537
+ KUG → KUhG
1538
+
1539
+ G-SPECTRA OF CYCLIC DEFECT
1540
+ 29
1541
+ which recovers (4.4.1) on π0. It is constructed out of the category of com-
1542
+ plex representations of G in about the same way that KU is constructed
1543
+ out of the category of complex vector spaces. As an object of Mod(S) or
1544
+ Mod(KU), KUG has a simple structure: it is a free KU-module spanned by
1545
+ the irreducible complex representations:
1546
+ KUG ∼=
1547
+
1548
+ Irr(C[G])
1549
+ KU .
1550
+ (2) Let SG denote the group completion K-theory spectrum of the category of
1551
+ finite G-sets, with its symmetric monoidal structure given by disjoint union
1552
+ of G-sets. The Cartesian product of G-sets endows SG with the structure
1553
+ of a commutative ring spectrum. As an object of Mod(S) one has
1554
+ SG ∼=
1555
+
1556
+ H
1557
+ S[B(NG(H)/H)]
1558
+ where the sum ranges over conjugacy class representatives of subgroups
1559
+ H ⊂ G.
1560
+ Carlsson proved more than (4.3.1):
1561
+ Theorem 4.4.1 ([Car84], strong form of Segal’s conjecture). Let G be a finite
1562
+ group. There is a natural map of commutative ring spectra
1563
+ SG → ShG
1564
+ which exhibits π∗(ShG) as the I-adic completion of π∗(SG).
1565
+ This has a surprising consequence: ShG is connective. (To see that it is sur-
1566
+ prising, note that replacing S with the Eilenberg-MacLane spectrum of Z yields
1567
+ an object concentrated in non-positive degrees, as πi(ZhG) is the (−i)th group
1568
+ cohomology of G).
1569
+ A second consequence of the Segal conjecture is that one can compute the Tate
1570
+ cohomology of some finite groups with coefficients in the sphere. For a finite group
1571
+ G and a G-spectrum M, the G-Tate cohomology M tG ∈ Mod(S) of M is defined
1572
+ via a cofiber sequence
1573
+ MhG
1574
+ Nm
1575
+ −−→ M hG → M tG
1576
+ When M is discrete, the map Nm is given on π0 by the formula m �→ �
1577
+ g∈G gm,
1578
+ and the homotopy groups π∗M tG = ˆH−∗(G; M) coincide with the classical Tate
1579
+ cohomology groups of G with coefficients in M.
1580
+ Example 4.4.2. When G = Cp, the cyclic group of order p, the nature of the
1581
+ augmentation ideal is that the strong Segal conjecture identifies ShCp as Sp ⊕
1582
+ S[BCp]. The norm map is the inclusion of the second summand, S[BCp] = ShCp.
1583
+ It follows that StCp ∼= Sp. It is in this form that the Segal conjecture for Cp was
1584
+ originally proved by Lin (p = 2, [Lin80]) and Gunawardena (p odd, [Gun80]).
1585
+ 4.5. p-permutation Sq-modules. We say that a Zq[G]-module M0 lifts to Sq if
1586
+ there exists M ∈ LMod(Sq[G]) such that there is an equivalence
1587
+ M ⊗Sq Zq ∼= M0
1588
+ of Zq[G]-modules. The question of whether a Zq[G]-module lifts to Sq is a close
1589
+ relative of the “equivariant Moore space problem,” and negative examples were first
1590
+ given by Carlsson in the cases G = Cp × Cp [Car81]. In this section we discuss a
1591
+
1592
+ 30
1593
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1594
+ class of modules for which a natural lift to the sphere does exist: for summands of
1595
+ permutation modules, by virtue of the following proposition:
1596
+ Proposition 4.5.1. Let G be a finite group, let X be a finite G-set, and suppose
1597
+ that Zq[X] ∼= M0 ⊕ N0 is a Zq[G]-module splitting. Then, there exists a Sq[G]-
1598
+ module splitting Sq[X] ∼= M ⊕ N which recovers the Zq[G]-module splitting above
1599
+ after applying ⊗SqZq.
1600
+ The map of ring spectra Sq → Zq, given by truncation, induces a map of endo-
1601
+ morphism rings
1602
+ (4.5.1)
1603
+ π0MapsSq[G](Sq[X], Sq[X]) → π0MapsZq[G](Zq[X], Zq[X])
1604
+ and the content of the Proposition is that any primitive idempotent in the target
1605
+ lifts to a primitive idempotent in the source. By §4.3, this map can be identified
1606
+ with the natural map
1607
+ BurnG(X × X)∧
1608
+ (p,I) ⊗Zp Zq → π0MapsZq[G](Zq[X × X], Zq)
1609
+ which sends a G-set over X × X to its rank function. In particular, the source
1610
+ (Lemma 4.3.5) and target are free Zq-modules of finite rank, and the map is a
1611
+ surjection of (not necessarily commutative) Zq-algebras, so this is a consequence of
1612
+ the following purely algebraic fact:
1613
+ Proposition 4.5.2. Let ¯A and ¯B be associative Zq-algebras that are finitely gen-
1614
+ erated as Zq-modules. Let f : ¯A → ¯B be a surjective algebra homomorphism. Then
1615
+ any primitive idempotent of ¯B lifts to a primitive idempotent of ¯A.
1616
+ We put bars over these Zq-algebras to emphasize that they are ordinary abelian
1617
+ groups, not ring spectra. It is likely that this is an old result, but we didn’t find
1618
+ any place that it was stated very plainly, so we supply a proof in the rest of this
1619
+ section.
1620
+ Lemma 4.5.3. Let ¯A and ¯B be finitely generated associative algebras over a field,
1621
+ and let f : ¯A → ¯B be a surjective algebra homomorphism. Then every invertible
1622
+ element of ¯B has an invertible preimage under f.
1623
+ Proof. Let I ⊂ ¯A be the kernel of f, so that f is isomorphic to the quotient map
1624
+ ¯A → ¯A/I. We will show that every invertible element of ¯A/I lifts to an invertible
1625
+ element of ¯A.
1626
+ Let J be the Jacobson radical of ¯A. Let us first prove the Lemma in the case
1627
+ that I ∩ J = 0. If I ∩ J = 0, then the natural map ¯A → ¯A/I × ¯
1628
+ A/I+J ¯A/J is an
1629
+ isomorphism of algebras, thus for every unit u+I ∈ ¯A/I, we seek a unit v+J ∈ ¯A/J
1630
+ such that u + I + J = v + I + J. Such a v + J exists by Wedderburn’s theorem:
1631
+ ¯A/J is semisimple thus a product of a finite set of simple algebras, and the image
1632
+ of I in ¯A/J is a product of a subset of the same simple algebras.
1633
+ In case I ∩J ̸= 0, the above argument shows we can lift units along A/(I ∩J) →
1634
+ A/I. Since ¯A is finite-dimensional over a field, it is an Artinian ring so J (and
1635
+ therefore I ∩ J) is nilpotent [Her94, Theorem 1.3.1]. It follows that units lift along
1636
+ A → A/I ∩ J.
1637
+
1638
+ Lemma 4.5.4. Let ¯A and ¯B be associative Zp-algebras that are finitely generated
1639
+ as Zp-modules. Let f : ¯A ։ ¯B be a surjective algebra homomorphism. Then every
1640
+ invertible element of ¯B has an invertible preimage under f.
1641
+
1642
+ G-SPECTRA OF CYCLIC DEFECT
1643
+ 31
1644
+ Proof. Suppose b ∈ ¯B is invertible. Let us first show there is an a ∈ ¯A such that
1645
+ (1) a + px is invertible for all x ∈ A
1646
+ (2) f(a) = b mod p ¯B
1647
+ Indeed b + p ¯B is invertible in the Fp-algebra ¯B/p ¯B, and by applying the previous
1648
+ Lemma to ¯A/p ¯A → ¯B/p ¯B we conclude there is an a ∈ ¯A such that a + p ¯A is
1649
+ invertible in A/p ¯A and f(a) + p ¯B = b + p ¯B. Since ¯A is finitely generated over
1650
+ Zp, it is p-adically complete and such an a is invertible in ¯A: if aa′ = 1 + pǫ then
1651
+ a′(1 − pǫ + p2ǫ2 − · · · ) is the inverse to a.
1652
+ It remains to find x such that f(a + px) = b. By (2) above, f(a) − b = py for
1653
+ some y ∈ ¯B. Let x be such that f(x) = −y. Then
1654
+ f(a + px) − b = f(a) + pf(x) − b = f(a) − b + pf(x) = py + pf(x) = 0
1655
+
1656
+ Lemma 4.5.5. Let ¯A be a Zp-algebra that is finitely generated as a Zp-module.
1657
+ Let i, j ∈ ¯A be two idempotent elements. Then ¯Ai ∼= ¯Aj as left ¯A-modules if and
1658
+ only if i is conjugate to j.
1659
+ Proof. If i = uju−1, then right multiplication by u induces an isomorphism ¯Ai =
1660
+ ¯Auju−1 ∼
1661
+ → ¯Aj. Let us show the converse. Suppose φ : ¯Ai
1662
+
1663
+ → ¯Aj is an isomorphism
1664
+ of left ¯A-modules. Since φ(ai) = aφ(i), φ is determined by φ(i) ∈ ¯Aj. Furthermore,
1665
+ since i2 = i, φ(i) = φ(i2) = iφ(i), so φ(i) ∈ i ¯Aj. Similarly, φ−1 is determined by
1666
+ φ−1(j) ∈ j ¯Ai. The computations
1667
+ φ−1(j)φ(i) = φ(φ−1(j)i) = φ(φ−1(j)) = j
1668
+ φ(i)φ−1(j) = φ−1(φ(i)j) = φ−1(φ(i)) = i
1669
+ show that φ−1(j)φ(i) = j and φ(i)φ−1(j) = i
1670
+ Recall that Zp-algebras that are finitely generated as Zp-modules are “semiper-
1671
+ fect” in the sense of [Bas60, §2.1]. This means that finitely generated ¯A-modules
1672
+ — such as ¯A itself — have the Krull-Schmidt property, a unique direct sum decom-
1673
+ position into indecomposable summands. Since ¯A = ¯Ai⊕ ¯A(1 − i) = ¯Aj ⊕ ¯A(1 − j),
1674
+ the hypotheses of the Lemma also show that ¯A(1 − i) ∼= ¯A(1 − j), via an iso-
1675
+ morphism ψ. Thus by the same argument as above, ψ(1 − i) ∈ (1 − i)A(1 − j),
1676
+ ψ−1(1 − j) ∈ (1 − j)A(1 − i), and
1677
+ ψ−1(1 − j)ψ(1 − i) = 1 − i
1678
+ ψ(1 − i)ψ−1(1 − j) = 1 − j.
1679
+ Let u = φ(i) + ψ(1 − i) and v = φ−1(j) + ψ−1(1 − j). Then uv = 1 = vu, so
1680
+ v = u−1, and u conjugates j to i:
1681
+ uju−1
1682
+ =
1683
+ (φ(i) + ψ(1 − i))j(φ−1(j) + ψ−1(1 − j))
1684
+ =
1685
+ (φ(i)j + ψ(1 − i)j)(φ−1(j) + ψ−1(1 − j))
1686
+ =
1687
+ (φ(i) + 0)(φ−1(j) + ψ−1(1 − j))
1688
+ =
1689
+ φ(i)φ−1(j) + φ(i)ψ−1(1 − j)
1690
+ =
1691
+ φ(i)φ−1(j) + 0
1692
+ =
1693
+ i
1694
+
1695
+ Proof of Proposition 4.5.1. It suffices to prove Proposition 4.5.2. Choose a decom-
1696
+ position 1 ¯
1697
+ A = � ei, where the ei are orthogonal idempotents. Then 1 ¯
1698
+ B = f(1 ¯
1699
+ A) =
1700
+ � f(ei). The set of nonzero f(ei) is a set of orthogonal idempotents in ¯B that sum
1701
+ to 1.
1702
+
1703
+ 32
1704
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1705
+ Now suppose the ei are all primitive, and let us show that the nonzero f(ei) are
1706
+ also primitive. Each ¯Aei surjects onto ¯Bf(ei); since this is a map of ¯A-modules
1707
+ and ¯Aei is an indecomposable projective ¯A-module, it follows that ¯Bf(ei) is inde-
1708
+ composable as an ¯A-module.
1709
+ Since the action of ¯A factors through the surjection to ¯B, ¯Bf(ei) is also inde-
1710
+ composable as a ¯B-module. Thus each f(ei) is primitive.
1711
+ If e′ is some other primitive idempotent of ¯B, then ¯B ∼= ¯Be′ ⊕ ¯B(1 − e′) ∼=
1712
+ � ¯Bf(e)i, so Be′ ∼= Bf(ei) for some i by the Krull-Schmidt property. By Lemma
1713
+ 4.5.5, there is an invertible u ∈ B such that uf(ei)u−1 = e′, and by Lemma 4.5.4
1714
+ there is a unit u′ ∈ ¯A such that f(u′) = u. Then u′ei(u′)−1 is a primitive idempotent
1715
+ of ¯A that lifts e′.
1716
+
1717
+ 4.6. Blocks of Sq[G]. Let b1, b2, . . . be the block idempotents of Zq[G], so that
1718
+ (4.6.1)
1719
+ Zq[G] = Zq[G]b1 × Zq[G]b2 × · · ·
1720
+ By Proposition 3.4.1, there is a corresponding splitting of Sq[G/{1}] as a left G-
1721
+ module — write Sq[G/{1}]bi for the summand matching Zq[G]bi. Let Sq[G]bi de-
1722
+ note the endomorphism Sq-algebra spectrum of Sq[G/{1}]bi. By Proposition 3.4.2,
1723
+ [Sq[G/{1}]bi, Sq[G/{1}]bj] = 0 when i ̸= j, and therefore there is an isomorphism
1724
+ of Sq-algebra spectra
1725
+ (4.6.2)
1726
+ Sq[G] = Sq[G]b1 × Sq[G]b2 × · · ·
1727
+ that induces (4.6.1) on taking π0 or on applying ⊗SqZq.
1728
+ Proposition 4.6.1. Let G and G′ be finite groups, let b be a block of Zq[G] and let
1729
+ b′ be a block of Zq[G′]. Suppose that there is an equivalence of stable ∞-categories
1730
+ (4.6.3)
1731
+ LMod(Sq[G]b) ∼= LMod(Sq[G′]b′).
1732
+ Then for any Sq-algebra spectrum k, there are equivalences
1733
+ (1) LMod(k[G]b) ∼= LMod(k[G′]b′)
1734
+ (2) LMod(k[G]bi)ft ∼= LMod(k[G′]b′
1735
+ i)ft
1736
+ (3) LMod(k[G]bi)ω ∼= LMod(k[G]bi)ω
1737
+ Proof. That (4.6.3) implies (1) and (3) is a consequence of (3.7.2); that it implies
1738
+ (2) is a consequence of Corollary 3.9.3.
1739
+
1740
+ 4.7. The Rouquier equivalence over Sq.
1741
+ Proposition 4.7.1. Suppose we are in the situation of Theorem 4.1.1, and let
1742
+ M0 denote the complex of bimodules of that Theorem regarded as an object in
1743
+ Bimod(Zq[G]b, Zq[NG(D)]b′). Then there is an M ∈ Bimod(Sq[G]b, Sq[NG(D)]b′)
1744
+ such that M ⊗Sq Zq is isomorphic to M0.
1745
+ Proof. By Proposition 4.5.1, N0 lifts to a (Sq[G]b, Sq[NG(D)]b′)-bimodule N such
1746
+ that N ⊗Sq Zq ∼= N0. Since N ′
1747
+ 0 is projective, it is the image of an idempotent
1748
+ endomorphism of (Zq[G]b ⊗Zq Zq[NG(D)]b′op)⊕n, which §3.4 lifts to an idempo-
1749
+ tent endomorphism of (Sq[G]b ⊗ Sq[NG(D)]b′op)⊕n.
1750
+ This idempotent splits in
1751
+ Bimod(Sq[G]b, Sq[NG(D)]b′), so N ′
1752
+ 0 lifts to a projective bimodule as well.
1753
+ By
1754
+ Proposition 3.4.2 it follows that the map N ′
1755
+ 0 → N0 lifts to a map N ′ → N, and
1756
+ M := Cone(N ′ → N) lifts M0.
1757
+
1758
+
1759
+ G-SPECTRA OF CYCLIC DEFECT
1760
+ 33
1761
+ Theorem 4.7.2. Let b be a block of Sq[G], let D be its defect group, let b′ be the
1762
+ Brauer correspondent block of Sq[NG(D)]. Then there is an equivalence of stable
1763
+ ∞-categories LMod(Sq[G]b) ∼= LMod(Sq[NG(D)]b′) that carries LMod(Sq[G]b)ft
1764
+ onto LMod(Sq[NG(D)]b′)ft and LMod(Sq[G]b)ω onto LMod(Sq[NG(D)]b′)ω.
1765
+ Proof. This is a consequence of Proposition 3.7.2. We apply it in the case where
1766
+ k → k′ is the truncation map Sq → Zq, A = Sq[NG(D)]b′, B = Sq[G]b, and
1767
+ F(A) is the bimodule M of Proposition 4.7.1.
1768
+ By Rouquier’s Theorem 4.1.1,
1769
+ M ⊗Sq Zq induces an equivalence LMod(Zq[NG(D)]b′) ∼= LMod(Zq[G]b) — the
1770
+ hypotheses of Proposition 3.7.2 are satisfied and so the functor M ⊗Sq[NG(D)]b′ −
1771
+ induces an equivalence LMod(Sq[NG(D)]b′) ∼= LMod(Sq[G]b).
1772
+ Like any equiv-
1773
+ alence, it preserves the subcategories of compact objects and so restricts to an
1774
+ equivalence LMod(Sq[NG(D)]b′)ω ∼= LMod(Sq[G]b)ω. Since each term of the com-
1775
+ plex M of Proposition 4.7.1 carries LMod(Sq[NG(D)]b′)ft to LMod(Sq[G]b)ft, the
1776
+ equivalence carries LMod(Sq[NG(D)]b′)ft into LMod(Sq[G]b)ft. Finally, this func-
1777
+ tor LMod(Sq[NG(D)]b′)ft → LMod(Sq[G]b)ft is an equivalence by Proposition 4.6.1.
1778
+
1779
+ References
1780
+ [Ati61]
1781
+ Michael
1782
+ F
1783
+ Atiyah.
1784
+ Characters
1785
+ and
1786
+ cohomology
1787
+ of
1788
+ finite
1789
+ groups.
1790
+ Publications
1791
+ Math´ematiques de l’IH ´ES, 9:23–64, 1961.
1792
+ [Bas60]
1793
+ Hyman Bass. Finitistic dimension and a homological generalization of semi-primary
1794
+ rings. Transactions of the American Mathematical Society, 95(3):466–488, 1960.
1795
+ [BCSY22] Tobias Barthel, Shachar Carmeli, Tomer M Schlank, and Lior Yanovski. The chromatic
1796
+ fourier transform. arXiv preprint arXiv:2210.12822, 2022.
1797
+ [BMS19]
1798
+ Bhargav Bhatt, Matthew Morrow, and Peter Scholze. Topological hochschild homology
1799
+ and integral p p-adic hodge theory. Publications math´ematiques de l’IH ´ES, 129(1):199–
1800
+ 310, 2019.
1801
+ [Bro90]
1802
+ Michel Brou´e. Isom´etries parfaites, types de blocs, cat´egories d´eriv´ees. Ast´erisque, (181-
1803
+ 182):61–92, 1990.
1804
+ [Bro94]
1805
+ Michel Brou´e. Equivalences of blocks of group algebras. In Finite-dimensional algebras
1806
+ and related topics (Ottawa, ON, 1992), volume 424 of NATO Adv. Sci. Inst. Ser. C:
1807
+ Math. Phys. Sci., pages 1–26. Kluwer Acad. Publ., Dordrecht, 1994.
1808
+ [Bur11]
1809
+ William Burnside. Theory of groups of finite order. The University Press, 1911.
1810
+ [Car81]
1811
+ Gunnar Carlsson. A counterexample to a conjecture of Steenrod. Inventiones mathe-
1812
+ maticae, 64(1):171–174, 1981.
1813
+ [Car84]
1814
+ Gunnar Carlsson. Equivariant stable homotopy and Segal’s Burnside ring conjecture.
1815
+ Annals of Mathematics, pages 189–224, 1984.
1816
+ [CSY21a] Shachar Carmeli, Tomer M. Schlank, and Lior Yanovski. Ambidexterity and height.
1817
+ Adv. Math., 385:107763, 90, 2021.
1818
+ [CSY21b] Shachar Carmeli, Tomer M Schlank, and Lior Yanovski. Chromatic cyclotomic exten-
1819
+ sions. arXiv preprint arXiv:2103.02471, 2021.
1820
+ [CSY22]
1821
+ Shachar Carmeli, Tomer M. Schlank, and Lior Yanovski. Ambidexterity in chromatic
1822
+ homotopy theory. Invent. Math., 228(3):1145–1254, 2022.
1823
+ [Dre69]
1824
+ Andreas Dress. A characterisation of solvable groups. Mathematische Zeitschrift,
1825
+ 110(3):213–217, 1969.
1826
+ [GS96]
1827
+ J. P. C. Greenlees and Hal Sadofsky. The Tate spectrum of vn-periodic complex ori-
1828
+ ented theories. Math. Z., 222(3):391–405, 1996.
1829
+ [Gun80]
1830
+ JHC Gunawardena. Segal’s conjecture for cyclic groups of (odd) prime order. JT Knight
1831
+ prize essay, Cambridge, 224, 1980.
1832
+ [Her94]
1833
+ Israel Nathan Herstein. Noncommutative rings, volume 15. American Mathematical
1834
+ Soc., 1994.
1835
+ [HL13]
1836
+ Michael Hopkins and Jacob Lurie. Ambidexterity in K(n)-local stable homotopy theory.
1837
+ preprint, available at https://www.math.ias.edu/ lurie/, 2013.
1838
+
1839
+ 34
1840
+ TONY FENG, DAVID TREUMANN, AND ALLEN YUAN
1841
+ [HS96]
1842
+ Mark Hovey and Hal Sadofsky. Tate cohomology lowers chromatic Bousfield classes.
1843
+ Proc. Amer. Math. Soc., 124(11):3579–3585, 1996.
1844
+ [HS99]
1845
+ Mark Hovey and Neil P. Strickland. Morava K-theories and localisation. Mem. Amer.
1846
+ Math. Soc., 139(666):viii+100, 1999.
1847
+ [Kuh04]
1848
+ Nicholas J. Kuhn. Tate cohomology and periodic localization of polynomial functors.
1849
+ Invent. Math., 157(2):345–370, 2004.
1850
+ [Lin80]
1851
+ Wen-Hsiung Lin. On conjectures of Mahowald, Segal and Sullivan. In Mathematical
1852
+ Proceedings of the Cambridge Philosophical Society, volume 87, pages 449–458. Cam-
1853
+ bridge University Press, 1980.
1854
+ [LN14]
1855
+ Tyler Lawson and Niko Naumann. Strictly commutative realizations of diagrams over
1856
+ the Steenrod algebra and topological modular forms at the prime 2. International
1857
+ Mathematics Research Notices, 2014(10):2773–2813, 2014.
1858
+ [Lur09]
1859
+ Jacob Lurie. Derived Algebraic Geometry I: Stable infinity categories. arXiv preprint
1860
+ arXiv:0608228, 2009.
1861
+ [Lur11]
1862
+ Jacob Lurie. Derived Algebraic Geometry VII: Spectral Schemes.
1863
+ Available at https://www.math.ias.edu/ lurie/, 2011.
1864
+ [Lur16]
1865
+ Jacob Lurie. Higher Algebra.
1866
+ Available at https://www.math.ias.edu/ lurie/, 2016.
1867
+ [Lur17]
1868
+ Jacob Lurie. Higher Topos Theory.
1869
+ Available at https://www.math.ias.edu/ lurie/, 2017.
1870
+ [Lur18]
1871
+ Jacob Lurie. Elliptic Cohomology II: Orientations.
1872
+ Available at https://www.math.ias.edu/ lurie/, 2018.
1873
+ [Lus89]
1874
+ George Lusztig. Modular representations and quantum groups. Contemp. Math,
1875
+ 82(1080):59–78, 1989.
1876
+ [Lus15]
1877
+ George Lusztig. On the character of certain irreducible modular representations. Rep-
1878
+ resentation Theory of the American Mathematical Society, 19(2):3–8, 2015.
1879
+ [Nis73]
1880
+ Goro Nishida. The nilpotency of elements of the stable homotopy groups of spheres. J.
1881
+ Math. Soc. Japan, 25:707–732, 1973.
1882
+ [NS18]
1883
+ Thomas Nikolaus and Peter Scholze. On topological cyclic homology. Acta Math.,
1884
+ 221(2):203–409, 2018.
1885
+ [Ric89]
1886
+ Jeremy Rickard. Derived categories and stable equivalence. Journal of pure and applied
1887
+ Algebra, 61(3):303–317, 1989.
1888
+ [Ric96]
1889
+ Jeremy Rickard. Splendid equivalences: derived categories and permutation modules.
1890
+ Proc. London Math. Soc. (3), 72(2):331–358, 1996.
1891
+ [Rou98]
1892
+ Rapha¨el Rouquier. The derived category of blocks with cyclic defect groups. Derived
1893
+ equivalences for group rings, pages 199–220, 1998.
1894
+ [Rou01]
1895
+ Rapha¨el Rouquier. Block theory via stable and Rickard equivalences. In Modular rep-
1896
+ resentation theory of finite groups (Charlottesville, VA, 1998), pages 101–146. de
1897
+ Gruyter, Berlin, 2001.
1898
+ [RW80]
1899
+ Douglas C. Ravenel and W. Stephen Wilson. The Morava K-theories of Eilenberg-Mac
1900
+ Lane spaces and the Conner-Floyd conjecture. Amer. J. Math., 102(4):691–748, 1980.
1901
+ [Ser53]
1902
+ Jean-Pierre Serre. Groupes d’homotopie et classes de groupes ab´eliens. Ann. of Math.
1903
+ (2), 58:258–294, 1953.
1904
+ [SVW99]
1905
+ Roland Schw¨anzl, Rainer M Vogt, and Friedhelm Waldhausen. Adjoining roots of unity
1906
+ to E∞-ring spectra in good cases–a remark. Contemp. Math, 239:245–249, 1999.
1907
+ [tD79]
1908
+ Tammo tom Dieck. Transformation groups and representation theory, volume 766 of
1909
+ Lecture Notes in Mathematics. Springer, Berlin, 1979.
1910
+ [Tre15]
1911
+ David Treumann. Representations of finite groups on modules over K-theory (with an
1912
+ appendix by Akhil Mathew). arXiv preprint arXiv:1503.02477, 2015.
1913
+ [YZ21]
1914
+ Yaping Yang and Gufang Zhao. Frobenii on Morava E-theoretical quantum groups.
1915
+ arXiv preprint arXiv:2105.14681, 2021.
1916
+
ZNE1T4oBgHgl3EQfcgRM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
_NFST4oBgHgl3EQfdDhQ/content/tmp_files/2301.13805v1.pdf.txt ADDED
@@ -0,0 +1,1979 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13805v1 [math.PR] 31 Jan 2023
2
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS
3
+ MORREY DRIFT
4
+ D. KINZEBULATOV
5
+ Abstract. We prove the unique weak solvability of stochastic differential equations with time-
6
+ inhomogeneous drift in essentially the largest (scaling-invariant) Morrey class, i.e. with integra-
7
+ bility parameter q > 1 close to 1. The constructed weak solutions constitute a Feller evolution
8
+ family.
9
+ The proofs are based on a detailed Sobolev regularity theory of the corresponding
10
+ parabolic equation.
11
+ 1. Introduction
12
+ 1. We consider the problem of weak well-posedness of stochastic differential equation
13
+ Xt = x −
14
+ � t
15
+ 0
16
+ b(r, Xr)dr +
17
+
18
+ 2Bt,
19
+ x ∈ Rd,
20
+ (1)
21
+ where Bt is a Brownian motion in Rd, under minimal assumptions on the time-inhomogeneous
22
+ vector field b : R × Rd → Rd (drift), d ≥ 3.
23
+ This equation or, more generally, stochastic
24
+ equations additionally having variable, possibly discontinuous diffusion coefficients, arise e.g. in
25
+ the problems of stochastic optimization and serve as a basis for many physical models. This
26
+ requires, generally speaking, dealing with irregular, locally unbounded drifts. An illustrative
27
+ example is equation (1) with velocity field b obtained by solving 3D Navier-Stokes equations,
28
+ which models the motion of a small particle in a turbulent flow [26]. One is thus led to the
29
+ problem of establishing weak and strong well-posedness of (1) under minimal assumptions on b.
30
+ The latter can also be stated as the problem of finding the most general integral characteristics
31
+ of b that determine whether (1) is weakly/strongly well-posed.
32
+ Let us give a brief outline of the literature on stochastic differential equations (SDEs) with
33
+ singular drift. We will try to keep the chronological order, but will be somewhat loose with the
34
+ terminology by including in “well-posedness” the uniqueness results of different strength.
35
+ The “sub-critical” Ladyzhenskaya-Prodi-Serrin class
36
+ |b| ∈ Ll(R, Lp(Rd)),
37
+ p ≥ d, l ≥ 2,
38
+ d
39
+ p + 2
40
+ l < 1
41
+ (2)
42
+ was attained by Portenko [28] (weak solutions) and Krylov-Röckner [25] (strong solutions). See
43
+ also Zhang [34, 35, 36]. Between [28] and [25], Bass-Chen [3] proved existence and uniqueness
44
+ 2010 Mathematics Subject Classification. 60H10, 47D07 (primary), 35J75 (secondary).
45
+ Key words and phrases. Stochastic differential equations, weak solutions, singular drifts, Morrey class, Feller
46
+ property.
47
+ The research of the author is supported by the NSERC (grant RGPIN-2017-05567).
48
+ 1
49
+
50
+ 2
51
+ D. KINZEBULATOV
52
+ in law of weak solutions of (1) for b = b(x) in the Kato class of vector fields. The Kato class
53
+ contains {|b| ∈ Lp(Rd), p > d} as well as some vector fields with entries not even in L1+ε
54
+ loc (Rd),
55
+ ε > 0, however, it does not contain {|b| ∈ Ld(Rd)}. Speaking of time-homogeneous drifts, of
56
+ course, the fact that p = d is the optimal exponent on the scale of Lebesgue spaces can be seen
57
+ from rescaling the parabolic equation.
58
+ In [4], Beck-Flandoli-Gubinelli-Maurelli developed an approach to proving strong well-posedness
59
+ of (1) with b in the critical Ladyzhenskaya-Prodi-Serrin class
60
+ |b| ∈ Ll(R, Lp(Rd)),
61
+ p ≥ d, l ≥ 2,
62
+ d
63
+ p + 2
64
+ l ≤ 1.
65
+ (3)
66
+ for a.e. starting point x ∈ Rd via stochastic transport and stochastic continuity equations. They
67
+ also considered the following example. Let
68
+ b(x) =
69
+
70
+ δ d − 2
71
+ 2
72
+ 1|x|<1|x|−2x,
73
+ (4)
74
+ so |b| just misses to be Ld(Rd). If δ > 4(
75
+ d
76
+ d−2)2, i.e. the attraction to the origin by the drift is
77
+ large enough, then SDE (1) with the starting point x = 0 does not have a weak solution. In [15],
78
+ Semënov and the author showed that the Feller generator ∆−b·∇ with “weakly form-bounded”
79
+ b = b(x), see (23) below, determines for every starting point x ∈ Rd a weak solution to (1)
80
+ that is, moreover, unique among weak solutions that can be constructed via approximation. (To
81
+ the best of the author’s knowledge, this was the first result on weak well-posedness of (1) that
82
+ included both |b| ∈ Ld(Rd) and the model vector field (4) with δ small; it also included the
83
+ elliptic Morrey class with q > 1 and the Kato class considered by Bass-Chen.) Returning to
84
+ time-inhomogeneous drifts, we note that almost at the same time Wei-Lv-Wu [32], and later Nam
85
+ [27], obtained results on weak well-posedness of (1) for every x ∈ Rd for time-inhomogeneous
86
+ vector fields b that can be more singular than the ones in (2). Nevertheless, their results excluded
87
+ b = b(x) with |b| ∈ Ld(Rd). In [21], Krylov proved strong well-posedness of (1), for every initial
88
+ point and |b| ∈ Ld(Rd), by developing an approach based on his and Veretennikov’s old criterion
89
+ for a weak solution to be a strong solution [31]. In [33], Xia-Xie-Zhang-Zhao established, among
90
+ other results, weak well-posedness of (1) for every initial point and b ∈ Cb(R, Ld(Rd)). Röckner-
91
+ Zhao [29] furthermore established weak well-posedness of (1), with any x ∈ Rd, for drifts in
92
+ L∞(R, Ld,w(Rd)), plus the drifts in the critical LPS class. Here Ld,w(Rd) denotes the weak Ld
93
+ class that contains vector fields in Ld(Rd), as well as more singular vector fields, such as (4). In
94
+ [30], they obtained strong well-posedness of (1), for any starting point and b in the critical LPS
95
+ class. In [13], the author and Madou established weak well-posedness of (1), for every starting
96
+ point and form-bounded drifts, see example 5) below. This class contains L∞(R, Ld,w(Rd)) as
97
+ well as some drifts that are not even in L∞(R, L2+ε(Rd)) for a given ε > 0. By the way, in [18]
98
+ Semënov, Song and the author showed that the approach of [4] to the strong well-posedness of
99
+ (1) via the stochastic transport/continuity equations also works for form-bounded vector fields
100
+ b = b(x), although, again, one obtains strong well-posedness of (1) only for a.e. starting point.
101
+ In a recent major advancement, Krylov [23] further verified the Veretennikov-Krylov criterion
102
+
103
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
104
+ 3
105
+ for drifts in a large parabolic Morrey class:
106
+ b ∈ Eq,
107
+ q > d
108
+ 2 + 1,
109
+ (5)
110
+ see definition below (ignoring here some differences with [23] in the definition of parabolic Morrey
111
+ class), thus establishing, for every starting point, strong well-posedness of (1) with drift in class
112
+ (5). Class (5) contains L∞(R, Ld,w) as well as some drifts that are not in L∞(R, Lq+ε) for a
113
+ given ε > 0 (see e.g. example in [22, Sect. 2]). Let us note in passing that some steps in his proof,
114
+ such as gradient estimates, are, in fact, carried out for a larger class of form-bounded vector
115
+ fields.
116
+ The above outline does not discuss many interesting results on distribution-valued drifts and
117
+ on the drifts satisfying additional assumptions on their structure, such as div b ≤ 0. We also did
118
+ not discuss results on partial well-posedness of (1) with |b| ∈ Lp(Rd) in the supercritical regime
119
+ d
120
+ 2 < p < d (in the sense of scaling). In this regard, see Zhao [37].
121
+ In the present paper we consider drifts in the Morrey class Eq with integrability parameter
122
+ q > 1 that can be chosen arbitrarily close to 1. Denote
123
+ Cr(t, x) := {(s, y) ∈ Rd+1 | t ≤ s ≤ t + r2, |x − y| ≤ r}
124
+ and, given a vector field b : Rd+1 → Rd with components in Lq
125
+ loc(Rd+1), q ∈ [1, d + 2], set
126
+ ∥b∥E+
127
+ q :=
128
+ sup
129
+ r>0,z∈Rd+1 r
130
+ � 1
131
+ |Cr|
132
+
133
+ Cr(z)
134
+ |b(t, x)|qdtdx
135
+ � 1
136
+ q
137
+ and, reversing the direction of time in b,
138
+ ∥b∥E−
139
+ q :=
140
+ sup
141
+ r>0,z∈Rd+1 r
142
+ � 1
143
+ |Cr|
144
+
145
+ Cr(z)
146
+ |b(−t, x)|qdtdx
147
+ � 1
148
+ q
149
+ .
150
+ Definition. We say that a vector field b belongs to the parabolic Campanato-Morrey (or, for
151
+ brevity, Morrey) class Eq if ∥b∥Eq := ∥b∥E+
152
+ q ∨ ∥b∥E−
153
+ q
154
+ < ∞.
155
+ One has
156
+ ∥b∥Eq ≤ ∥b∥Eq1 if q < q1.
157
+ If above b = b(x), then one obtains the usual elliptic Morrey class Mq, that is, |b| ∈ Lq
158
+ loc(Rd)
159
+ and
160
+ ∥b∥Mq :=
161
+ sup
162
+ r>0,y∈Rd r
163
+ � 1
164
+ |Br|
165
+
166
+ Br(y)
167
+ |b(x)|qdx
168
+ � 1
169
+ q
170
+ < ∞,
171
+ where Br(y) is the closed ball of radius r centered at y.
172
+ Our result, stated briefly, is as follows (see Theorems 1-3 for details). We will be using some
173
+ notations defined in the end of this section.
174
+ Theorem. Let d ≥ 3, let b : Rd+1 → Rd be a vector field in the Morrey class Eq with q > 1 close
175
+ to 1. Let p ∈]1, ∞[. There exists a constant cd,p,q such that if ∥b∥Eq < cd,p,q, then the following
176
+ are true:
177
+
178
+ 4
179
+ D. KINZEBULATOV
180
+ (i) There exists a unique weak solution to
181
+ (λ − ∂t − ∆ + b(t, x) · ∇)u = 0,
182
+ t < r,
183
+ u(r, ·) = g(·) ∈ Lp(Rd) ∩ L2(Rd).
184
+ The difference
185
+ u(t, ·) −
186
+ e−λ(r−t)
187
+ (4π(r − t))
188
+ d
189
+ 2
190
+
191
+ Rd e− |·−y|2
192
+ 4(r−t)g(y)dy
193
+ (t < r),
194
+ extended by 0 to t > r,
195
+ is in the parabolic Bessel potential space W1+ 1
196
+ p ,p(Rd+1).
197
+ (ii) For p > d + 1, operators {P t,r}t<r defined by
198
+ P t,rg := u(t),
199
+ g ∈ C∞(Rd) ∩ L2(Rd)
200
+ are extended to a backward Feller evolution family on C∞(Rd) that determines, for every x ∈ Rd,
201
+ a weak solution to SDE (1) that is, moreover, unique in an appropriate class.
202
+ Here are some examples of vector fields in Eq, q > 1:
203
+ 1) The critical Ladyzhenskaya-Prodi-Serrin class
204
+ |b| ∈ Ll(R, Lp(Rd)),
205
+ p ≥ d, l ≥ 2,
206
+ d
207
+ p + 2
208
+ l ≤ 1.
209
+ To prove the inclusion of this class into Eq it suffices to consider, by an elementary interpolation
210
+ argument, only the cases l = 2, p = ∞ and l = ∞, p = d. In the former case the inclusion is
211
+ trivial, in the latter case the inclusion follows using Hölder’s inequality.
212
+ This example is strengthened in the next two examples.
213
+ 2) The vector fields b with |b| ∈ L2,w(R, L∞(Rd)) are in Eq for 1 < q < 2. Indeed, by a well
214
+ known characterization of weak Lebesgue spaces, we have
215
+ r
216
+ � 1
217
+ |Cr|
218
+
219
+ Cr
220
+ |b|qdz
221
+ � 1
222
+ q
223
+ ≤ Cr
224
+ � 1
225
+ r2
226
+ � t+r2
227
+ t
228
+ |˜b|qds
229
+ � 1
230
+ q
231
+ ˜b(t) := ∥b(t, ·)∥L∞(Rd)
232
+ ≤ C∥˜b∥L2,w(R).
233
+ Hence, for example, a vector field b that satisfies
234
+ ∥b(t, ·)∥L∞(Rd) ≤ C
235
+
236
+ t,
237
+ t > 0
238
+ (and defined to be zero for t ≤ 0) is in Eq with 1 < q < 2.
239
+ 3) Moreover, by the well known inclusion of the weak Lebesgue space Ld,w(Rd) in the elliptic
240
+ Morrey class,
241
+ |b| ∈ L∞(R, Ld,w(Rd))
242
+
243
+ b ∈ Eq with 1 < q ≤ d.
244
+ 4) For every ε > 0, one can find a vector field b ∈ Eq such that |b| is not in Lq+ε
245
+ loc (Rd+1).
246
+ (In particular, selecting q > 1 sufficiently close to 1, we obtain vector fields b satisfying the
247
+ assumptions of the theorem, and that are not in L1+ε
248
+ loc (Rd+1) for a given ε > 0.)
249
+
250
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
251
+ 5
252
+ 5) A vector field b is said to be form-bounded if |b| ∈ L2
253
+ loc(Rd+1) and for a.e. t ∈ R
254
+ ∥b(t, ·)ϕ∥2
255
+ L2(Rd) ≤ δ∥∇ϕ∥2
256
+ L2(Rd) + g(t)∥ϕ∥2
257
+ L2(Rd)
258
+ for all ϕ = ϕ(·) ∈ C∞
259
+ c (Rd), for some constant δ > 0 and a function g ∈ L1
260
+ loc(R) (written as
261
+ b ∈ Fδ). The constant δ is called a form-bound of b.
262
+ This class itself contains 1) and 3). In particular, by Hardy’s inequality, the vector field (4)
263
+ is in Fδ with g = 0 (but not in any Fδ′ with δ′ < δ).
264
+ Note that if a form-bounded vector field b depends only on time, then b ∈ L2
265
+ loc(R). One can
266
+ compare this with example 2).
267
+ 2. Let us say a few more words about the form-bounded vector fields. In the time-homogeneous
268
+ case b = b(x) the form-boundedness of b ensures, by the Lax-Milgram Theorem, that, whenever
269
+ δ < 1, the formal operator ∆ − b · ∇ has a realization as the generator of a quasi-contraction
270
+ semigroup in L2(Rd) which, moreover, is bounded as an operator W 1,2(Rd) → W −1,2(Rd). The
271
+ form-boundedness of b with δ < 1 is essentially the broadest condition on |b| that provides the
272
+ minimal “classical” theory of operator −∆ + b · ∇ in L2.
273
+ By considering dilates and translates of a bump function, one can show that the class of
274
+ form-bounded vector fields Fδ is contained in E2. (Let us note, on the other hand, that the
275
+ time-homogeneous vector fields in Eq, q > 2 are form-bounded [7], see also [6]. This remark
276
+ extends right away e.g. to time-inhomogeneous vector fields b = b(t, ·) having uniformly bounded
277
+ in t elliptic Morrey norm ∥ · ∥Mq, q > 2; they are, obviously, contained in Eq.) Note also that if
278
+ b is form-bounded with g = 0, then ∥b∥E2 = c
279
+
280
+ δ for appropriate constant c = cd.
281
+ The class of form-bounded vector fields is well known in the literature on regularity theory of
282
+ parabolic equations [19] (although, perhaps, less so than the Morrey class). As we mentioned
283
+ earlier, in the context of SDEs, condition b ∈ Fδ with δ < d−2 was used to develop a Sobolev
284
+ regularity theory of the corresponding parabolic equation and construct a Feller evolution family
285
+ [11] that determines, for every x ∈ Rd, a weak solution to (1) which is, moreover, unique in a
286
+ broad class of weak solutions [13].
287
+ 3. In the present paper we deal with time-inhomogeneous vector fields that can be more
288
+ singular than the ones covered by the form-boundedness condition. These new vector fields are
289
+ situated in Eq − Es, 1 < q ≤ 2, s > 2. Let us note that the distinction between Eq, 1 < q < 2
290
+ and smaller class Es, s > 2 is not only quantitative. Namely, consider a vector field b = b(x) in
291
+ Es, s > 2. Since it is form-bounded, the term b · ∇ in the parabolic equation can be handled
292
+ using quadratic inequality:
293
+
294
+ Rd(b · ∇u)udx ≤ γ
295
+
296
+ Rd |b|2u2dx + 1
297
+
298
+
299
+ Rd |∇u|2dx,
300
+ γ > 0,
301
+ (6)
302
+ where one estimates
303
+
304
+ Rd |b|2u2dx from above, using form-boundedness of b, by
305
+
306
+ Rd |∇u|2dx. This
307
+ elementary argument plays a key role e.g. in the proof of gradient estimates in [4, 23, 11], needed
308
+ to prove well-posedness of the corresponding stochastic equations. However, quadratic inequality
309
+ (6) is unavailable under our assumption b ∈ Eq, 1 < q < 2.
310
+
311
+ 6
312
+ D. KINZEBULATOV
313
+ 4. The proofs in [13] use a Feller evolution family constructed in [11] using a parabolic variant
314
+ of the iteration procedure of [19]. In this paper we pursue a simpler operator-theoretic approach,
315
+ replacing the iterations with the Duhamel series (written in “resolvent form”).
316
+ Namely, we
317
+ construct solution to inhomogeneous equation
318
+ (λ + ∂t − ∆ + b(t, x) · ∇)u = f ∈ Lp(Rd+1)
319
+ (which is essential to the rest of the paper) as
320
+ u := (λ + ∂t − ∆)−1f − (λ + ∂t − ∆)− 1
321
+ 2− 1
322
+ 2p Qp(1 + Tp)−1Rp(λ + ∂t − ∆)− 1
323
+ 2p′ f,
324
+ (7)
325
+ where p′ :=
326
+ p
327
+ p−1 and, if b ∈ Eq, q > 1, the operators
328
+ Rp = b
329
+ 1
330
+ p · ∇(λ + ∂t − ∆)− 1
331
+ 2 − 1
332
+ 2p ,
333
+ Qp = (λ + ∂t − ∆)− 1
334
+ 2p′ |b|
335
+ 1
336
+ p′
337
+ are bounded on Lp(Rd+1) and, provided ∥b∥Eq is sufficiently small and λ is large, the operator
338
+ Tp = RpQp has norm ∥Tp∥p→p < 1, so the Duhamel series converges. The regularizing factor
339
+ (λ+∂t−∆)−1/2−1/2p in (7) now yields the sought regularity of solution u provided that p is large
340
+ (> d + 1). A similar argument was used in [12] in the elliptic setting, where an even larger than
341
+ {b = b(x)} ∩ Eq, q > 1 class of time-homogeneous vector fields was treated (see (23) below); the
342
+ weak well-posedness of SDEs with such drifts was addressed in [15]. The proof of the gradient
343
+ estimates in [12], however, depends on the symmetry of the resolvents, and the transition from
344
+ elliptic estimates to the results for the parabolic equations required development of some new
345
+ approaches to constructing semigroups, using old ideas of Hille (pseudoresolvents) and Trotter,
346
+ see also [14]. In the present paper the proofs are much shorter since we work directly with the
347
+ parabolic operator. See also discussion after Theorem 3.
348
+ The necessity of the assumption “∥b∥Eq cannot be too large” follows from the aforementioned
349
+ counterexample to solvability of (1) with drift (4) when x = 0 and δ > 4(
350
+ d
351
+ d−2)2 (note that there
352
+ ∥b∥Eq = c
353
+
354
+ δ). It was recently proved in [17] that, given an arbitrary b ∈ Fδ with δ < 4, SDE
355
+ (1) has a weak solution for every starting point x ∈ Rd, so the above example and this result
356
+ become essentially sharp in high dimensions. (The fact that δ = 4 is critical can be seen from
357
+ multiplying the parabolic equation (11) corresponding to (1) by u|u|p−2, integrating by parts
358
+ and using quadratic inequality and form-boundedness as above.
359
+ The admissible p that give
360
+ e.g. an energy inequality turn out to be p >
361
+ 2
362
+ 2−
363
+
364
+ δ.)
365
+ Notations. Set for 0 < α ≤ 2
366
+ (λ − ∂t − ∆)− α
367
+ 2 h(t, x) :=
368
+ � ∞
369
+ t
370
+
371
+ Rd e−λ(s−t)
372
+ 1
373
+ (4π(s − t))
374
+ d
375
+ 2
376
+ 1
377
+ (s − t)
378
+ 2−α
379
+ 2
380
+ e− |x−y|2
381
+ 4(s−t) h(s, y)dsdy,
382
+ (8)
383
+ (λ + ∂t − ∆)− α
384
+ 2 h(t, x) :=
385
+ � t
386
+ −∞
387
+
388
+ Rd e−λ(t−s)
389
+ 1
390
+ (4π(t − s))
391
+ d
392
+ 2
393
+ 1
394
+ (t − s)
395
+ 2−α
396
+ 2
397
+ e− |x−y|2
398
+ 4(t−s) h(s, y)dsdy,
399
+ (9)
400
+ where λ ≥ 0. By a standard result, if λ > 0, then these operators are bounded on Lp(Rd+1),
401
+ 1 ≤ p ≤ ∞, with operator norm λ− α
402
+ 2 . If λ > 0, then (λ ± ∂t − ∆)−1 is the resolvent of a Markov
403
+ generator on Lp(Rd+1), 1 ≤ p < ∞, which we will denote by λ ± ∂t − ∆, respectively. (The
404
+ abuse of notation resulting from not indicating p should not cause any confusion.) In particular,
405
+
406
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
407
+ 7
408
+ one has well defined fractional powers (λ ± ∂t − ∆)
409
+ α
410
+ 2 . We refer to articles [2, 9], among others,
411
+ regarding the properties of these operators.
412
+ Denote by ⟨ , ⟩ the integration in d + 1 variables, i.e.
413
+ ⟨h⟩ :=
414
+
415
+ Rd+1 hdz,
416
+ ⟨h, g⟩ := ⟨hg⟩
417
+ (all functions considered in this paper are real-valued).
418
+ We denote by B(X, Y ) the space of bounded linear operators between Banach spaces X → Y ,
419
+ endowed with the operator norm ∥ · ∥X→Y . Set B(X) := B(X, X).
420
+ Put
421
+ ∥h∥p := ⟨|h|p⟩
422
+ 1
423
+ p .
424
+ Denote by ∥ · ∥p→q the (Lp(Rd+1), ∥ · ∥p) → (Lq(Rd+1), ∥ · ∥q) operator norm.
425
+ We write T = s-X- limn Tn for T, Tn ∈ B(X) if Tf = limn Tnf in X for every f ∈ X.
426
+ Let λ > 0 be fixed. Set
427
+ Wα,p(Rd+1) := (λ + ∂t − ∆)− α
428
+ 2 Lp(Rd+1)
429
+ endowed with the norm ∥h∥Wα,p := ∥(λ + ∂t − ∆)− α
430
+ 2 h∥p.
431
+ Denote by C∞(Rd) the space of continuous functions on Rd vanishing at infinity, endowed
432
+ with the sup-norm. Define in the same way C∞(Rd+1).
433
+ We fix T > 0 and put
434
+ DT := {(s, t) ∈ R2 | 0 ≤ s ≤ t ≤ T}.
435
+ Recall that a family of positivity preserving L∞ contractions {Ut,s}(s,t)∈DT ⊂ B(C∞(Rd)) is
436
+ called a Feller evolution family (on C∞(Rd)) if Ut,rUr,s = Ut,s for all r ∈ [s, t], Us,s = Id and
437
+ Ur,s = s-C∞(Rd)- lim
438
+ t↓r Ut,s
439
+ for all s ≤ r < T.
440
+ Define the following regularization of b : Rd+1 → Rd, b ∈ Eq, q > 1:
441
+ bn := 1nb,
442
+ where 1n is the indicator of {|b| ≤ n} ⊂ Rd+1.
443
+ (10)
444
+ We can additionally mollify bn to obtain a C∞ smooth approximation of b such that the Morrey
445
+ norm of the approximating vector field does not exceed (1 + ε)∥b∥Eq for any fixed ε > 0, as is
446
+ needed to turn a priori Sobolev regularity estimates for (11) into a posteriori estimates. However,
447
+ a regularization of b given by (10) will suffice (in particular, we will be able to apply Itô’s formula
448
+ to solutions of parabolic equations with drift bn).
449
+ Put b
450
+ 1
451
+ p := b|b|−1+ 1
452
+ p .
453
+ Let E = Ep := ∪ε>0e−ε|b|Lp(Rd+1), a dense subspace of Lp(Rd+1).
454
+ Acknowledgements. The author is grateful to Renming Song for some useful comments.
455
+
456
+ 8
457
+ D. KINZEBULATOV
458
+ 2. Main results
459
+ 1. We first develop a Sobolev regularity theory of the inhomogeneous parabolic equation
460
+ (λ + ∂t − ∆ + b(t, x) · ∇)u = f
461
+ on Rd+1.
462
+ (11)
463
+ The next theorem is essential for the rest of the paper.
464
+ Theorem 1 (Sobolev regularity theory). Let b = bs + bb, where
465
+ |bs| ∈ Eq for some q > 1 close to 1, and |bb| ∈ L∞(Rd+1)
466
+ (12)
467
+ (indices s and b stand for “singular” and “bounded”, respectively).
468
+ The following are true:
469
+ (i) For every p ∈]1, ∞[ there exist constants cd,p,q and λd,p,q such that if
470
+ ∥bs∥Eq < cd,p,q,
471
+ then, for every λ ≥ λd,p,q, solutions un ∈ Lp(Rd+1) to the approximating parabolic equations
472
+ (λ + ∂t − ∆ + bn · ∇)un = f,
473
+ f ∈ Lp(Rd+1)
474
+ converge in W1+ 1
475
+ p ,p(Rd+1) to
476
+ u := (λ + ∂t − ∆)−1f − (λ + ∂t − ∆)− 1
477
+ 2− 1
478
+ 2p Qp(1 + Tp)−1Rp(λ + ∂t − ∆)− 1
479
+ 2p′ f,
480
+ (13)
481
+ where the operators
482
+ Rp = Rp(b) := b
483
+ 1
484
+ p · ∇(λ + ∂t − ∆)− 1
485
+ 2− 1
486
+ 2p ,
487
+ Qp = Qp(b) :=
488
+ �(λ + ∂t − ���)− 1
489
+ 2p′ |b|
490
+ 1
491
+ p′ ↾ E
492
+ �clos
493
+ p→p
494
+ (14)
495
+ are bounded on Lp(Rd+1), and the operator Tp := RpQp has norm
496
+ ∥Tp∥p→p < 1.
497
+ (15)
498
+ (ii) If above p > d+1, then, by (13) and by the parabolic Sobolev embedding, the convergence
499
+ is uniform on Rd+1 and u ∈ C∞(Rd+1).
500
+ Remarks. 1. If b is bounded, then Qp = (λ+∂t −∆)− 1
501
+ 2p′ |b|
502
+ 1
503
+ p′ , and so the RHS of (13) is simply
504
+ the Duhamel series representation for the solution to (11) in Lp(Rd+1) provided by the standard
505
+ theory.
506
+ 2. The constraint ∥bs∥Eq < cd,p,q is needed to ensure that ∥Tp∥p→p < 1, see Proposition 2.
507
+ 3. If e.g. b ∈ C∞(R, Ld(Rd)) or b = b(x) is in Ld(Rd), then one can represent b = bs + bb with
508
+ ∥bs∥Eq arbitrarily small (by defining bb to be a cutoff of b such that the remaining part bs has
509
+ sufficiently small L∞(R, Ld(Rd)) norm).
510
+ Given a general b satisfying (12), it is natural to ask, in what sense u defined by (13) solves
511
+ the parabolic equation (11)? Let us consider the case p = 2 and f ∈ L2(Rd+1).
512
+
513
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
514
+ 9
515
+ Definition. We say that a function u ∈ W
516
+ 3
517
+ 2 ,2 is a weak solution to (11) if the following identity
518
+ is satisfied:
519
+ ⟨(λ + ∂t − ∆)
520
+ 3
521
+ 4u, (λ + ∂t − ∆)
522
+ 3
523
+ 4 η⟩ + ⟨R2(b)(λ + ∂t − ∆)
524
+ 3
525
+ 4u, Q∗
526
+ 2(b)(λ + ∂t − ∆)
527
+ 3
528
+ 4 η⟩
529
+ = ⟨f, (λ − ∂t − ∆)− 1
530
+ 4 (λ + ∂t − ∆)
531
+ 3
532
+ 4 η⟩
533
+ (16)
534
+ for all η ∈ C∞
535
+ c (Rd+1).
536
+ (Identity (16) is obtained by formally multiplying equation (11) by (λ−∂t−∆)− 1
537
+ 4(λ+∂t−∆)
538
+ 3
539
+ 4 η
540
+ and integrating over Rd+1. Note that Q∗
541
+ 2(b) = |b|
542
+ 1
543
+ 2 (λ − ∂t − ∆)− 1
544
+ 4 is in B(L2) by Proposition 1.)
545
+ Then u defined by (13) is the unique in W
546
+ 3
547
+ 2,2 weak solution to (11). See Remark 4 for the
548
+ proof.
549
+ Remark 1. Thus, in order to have weak well-posedness of (11) for drifts satisfying (12) for
550
+ q > 1 we have to shift the standard scale of Hilbert spaces W1,2 ⊂ L2(Rd+1) ⊂ W−1,2 to
551
+ W
552
+ 3
553
+ 2,2 ⊂ W
554
+ 1
555
+ 2 ,2 ⊂ W− 1
556
+ 2,2. If we were to consider instead of (11) a more general equation (λ + ∂t −
557
+ ∇ · a · ∇ + b · ∇)u = f with a uniformly elliptic discontinuous matrix a, then the second order
558
+ term would force us to work in the standard scale, and hence would require more restrictive
559
+ assumptions on b: the form-boundedness, see the beginning of the paper (on the scale of Morrey
560
+ spaces this will be (12) with q > 2).
561
+ An analogous result can be obtained for f ∈ Lp(Rd+1) with (16) modified according to (13).
562
+ 2. Fix T > 0. For given n = 1, 2, . . . and 0 ≤ r < T, let vn ∈ Cb([r, T], C∞(Rd)) denote the
563
+ solution to the Cauchy problem
564
+
565
+
566
+
567
+ (λ + ∂t − ∆ + bn(t, x) · ∇)vn = 0
568
+ (t, x) ∈]r, T] × Rd,
569
+ vn(r, ·) = g(·) ∈ C∞(Rd),
570
+ (17)
571
+ where bn’s are defined by (10). By a standard result, for every n, the operators
572
+ Ut,r
573
+ n g := vn(t),
574
+ 0 ≤ r ≤ t ≤ T
575
+ constitute a Feller evolution family on C∞(Rd).
576
+ Let δs=r denote the delta-function in the time variable s. Put
577
+ (λ + ∂t − ∆)−1δs=rg(t, x) := 1t≥re−λ(t−r)(4π(t − r))− d
578
+ 2
579
+
580
+ Rd e− |x−y|2
581
+ 4(t−r) g(y)dy,
582
+ ∇(λ + ∂t − ∆)− 1
583
+ 2 − 1
584
+ 2p′ δs=rg := 1t≥re−λ(t−r)(t − r)− 1
585
+ 2+ 1
586
+ 2p′ (4π(t − r))− d
587
+ 2
588
+
589
+ Rd ∇xe− |x−y|2
590
+ 4(t−r) g(y)dy.
591
+ Recall DT = {0 ≤ r ≤ t ≤ T}.
592
+ Theorem 2 (C∞ theory). Under the assumptions of Theorem 1, let ∥b∥Eq < cd,p,q for a p > d+1.
593
+ Then the following are true:
594
+ (i) The limit
595
+ Ut,r := s-C∞(Rd)- lim
596
+ n Ut,r
597
+ n
598
+ uniformly in (r, t) ∈ DT
599
+ exists and determines a Feller evolution family on C∞(Rd).
600
+
601
+ 10
602
+ D. KINZEBULATOV
603
+ (ii) For every initial function g ∈ C∞(Rd) ∩ W 1,p(Rd), v(t) := Ut,rg, where (r, t) ∈ DT , has
604
+ representation
605
+ v = (λ + ∂t − ∆)−1δs=rg − (λ + ∂t − ∆)− 1
606
+ 2− 1
607
+ 2p Qp(1 + Tp)−1GpSpg,
608
+ (18)
609
+ where Gp = Gp(b) := b
610
+ 1
611
+ p (λ + ∂t − ∆)− 1
612
+ 2p ∈ B(Lp(Rd+1)) and Spg := ∇(λ + ∂t − ∆)− 1
613
+ 2− 1
614
+ 2p′ δs=rg
615
+ satisfies ∥Spg∥Lp(Rd+1) ≤ Cp,d∥∇g∥Lp(Rd).
616
+ (iii) As a consequence of (18) and the parabolic Sobolev embedding, we obtain
617
+ sup
618
+ (r,t)∈DT ,x∈Rd |v(t, x; r)| ≤ C∥g∥W 1,p(Rd).
619
+ 3. Recall that a probability measure Px, x ∈ Rd on (C([0, T], Rd), Bt = σ(ωr | 0 ≤ r ≤ t)),
620
+ where ωt is the coordinate process, is said to be a martingale solution to SDE
621
+ Xt = x −
622
+ � t
623
+ 0
624
+ b(r, Xr)dr +
625
+
626
+ 2Bt.
627
+ (19)
628
+ if
629
+ 1) Px[ω0 = x] = 1;
630
+ 2) Ex
631
+ � r
632
+ 0 |b(t, ωt)|dt < ∞, 0 < r ≤ T;
633
+ 3) for every f ∈ C2
634
+ c (Rd) the process
635
+ r �→ f(ωr) − f(x) +
636
+ � r
637
+ 0
638
+ (−∆f + b · ∇f)(t, ωt)dt
639
+ is a Br-martingale under Px.
640
+ A martingale solution Px of (19) is said to be a weak solution if, upon completing Bt with
641
+ respect to Px (to, say, ˆBt), there exists a Brownian motion Bt on
642
+ �C([0, T], Rd), ˆBt, Px
643
+ � such that
644
+ ωr = x −
645
+ � r
646
+ 0
647
+ b(t, ωt)dt +
648
+
649
+ 2Br,
650
+ r ≥ 0
651
+ Px-a.s.
652
+ Put
653
+ P t,r(b) := UT−t,T−r(˜b),
654
+ ˜b(t, x) = b(T − t, x)
655
+ where 0 ≤ t ≤ r ≤ T.
656
+ Theorem 3. Under the assumptions of Theorem 2 the following are true:
657
+ (i) The backward Feller evolution family {P t,r}0≤t≤r≤T is conservative, i.e. the density P t,r(x, ·)
658
+ satisfies
659
+ ⟨P t,r(x, ·)⟩ = 1
660
+ for all x ∈ Rd,
661
+ and determines probability measures Px, x ∈ Rd on (C([0, T], Rd), Bt), such that
662
+ Ex[f(ωr)] = P 0,rf(x),
663
+ 0 ≤ r ≤ T,
664
+ f ∈ C∞(Rd).
665
+ (ii) For every x ∈ Rd, the probability measure Px is a weak solution to (19).
666
+
667
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
668
+ 11
669
+ (iii) For every x ∈ Rd and f satisfying (12), given a p > d + 1 as in Theorem 2, there exists
670
+ a constant c such that for all h ∈ Cc(Rd+1)
671
+ Ex
672
+ � T
673
+ 0
674
+ |f(r, ωr)h(r, ωr)|dr ≤ c∥1[0,T]|f|
675
+ 1
676
+ p h∥p.
677
+ (In particular, one can take f = b.)
678
+ (iv) Any martingale solution Qx to (19) that satisfies
679
+ EQx
680
+ � T
681
+ 0
682
+ |b(r, ωr)h(r, ωr)|dr ≤ c∥1[0,T]|b|
683
+ 1
684
+ p h∥p,
685
+ h ∈ Cc(Rd+1),
686
+ for some p > d + 1,
687
+ (20)
688
+ coincides with Px.
689
+ 2.1. Key bounds. Here is the key bound used in the proofs of Theorems 1 and 2.
690
+ Proposition 1. Let |b| ∈ Eq for some q > 1 close to 1. Then for every p ∈]1, ∞[ there exists a
691
+ constant cp,q such that
692
+ ∥|b|
693
+ 1
694
+ p (± ∂t − ∆)− 1
695
+ 2p ∥p→p ≤ cp,q∥b∥
696
+ 1
697
+ p
698
+ Eq
699
+ In the time homogeneous case b = b(x) the estimate on ∥|b|
700
+ 1
701
+ p (λ−∆)− 1
702
+ 2p ∥Lp(Rd)→Lp(Rd) in terms
703
+ of the elliptic Morrey norm of |b| is due to [1, Theorem 7.3]. Similar estimates in the parabolic
704
+ case were obtained in [24, proof of Prop. 4.1]. There the proof is carried out for a different set
705
+ of parameters than the one needed in this paper, so we included the details in Section 4.
706
+ As an immediate consequence of Proposition 1 we obtain the following
707
+ Proposition 2. Let b = bs + bb, satisfy (12). Then, for all λ > 0,
708
+ ∥Rp∥p→p ≤ Cd,p,q∥bs∥
709
+ 1
710
+ p
711
+ Eq + cλ− 1
712
+ 2p ∥bb∥
713
+ 1
714
+ p
715
+ L∞(Rd+1)
716
+ (21)
717
+ ∥Qp∥p→p ≤ C′
718
+ p,q∥bs∥
719
+ 1
720
+ p′
721
+ Eq + c′λ− 1
722
+ 2p′ ∥bb∥
723
+ 1
724
+ p′
725
+ L∞(Rd+1).
726
+ (22)
727
+ The first estimate (21) follows from Proposition 1 using the boundedness of parabolic Riesz
728
+ transforms (see [9]). The second estimate (22) follows from Proposition 1 by duality.
729
+ 2.2. Some remarks.
730
+ Remark 2. Theorems 1, 2 are time inhomogeneous counterparts of the results in [11], Theorem
731
+ 3 is a time inhomogeneous counterpart of the result in [15], where the authors treated vector
732
+ fields b : Rd → Rd that can be more singular than the ones considered in this paper, namely,
733
+ |b| ∈ L1
734
+ loc(Rd) and there exists δ > 0 such that, for some λ > 0,
735
+ ��|b|
736
+ 1
737
+
738
+ ��
739
+ L2(Rd) ≤ δ
740
+ ��(λ − ∆)
741
+ 1
742
+ 4 ϕ
743
+ ��
744
+ L2(Rd),
745
+ ∀ ϕ ∈ C∞
746
+ c (Rd).
747
+ (23)
748
+ These vector fields are called weakly form-bounded. The fact that the time-homogeneous vector
749
+ fields in Eq, 1 < q ≤ 2 are weakly form-bounded follows from [1, Theorem 7.3]. A key difference
750
+ between [11] and the present paper is in the elliptic analogue of estimate (15), i.e.
751
+ ∥ ˜Tp∥Lp(Rd)→Lp(Rd) < 1,
752
+ where ˜Tp := b
753
+ 1
754
+ p · ∇(µ − ∆)−1|b|
755
+ 1
756
+ p′ ,
757
+ (24)
758
+
759
+ 12
760
+ D. KINZEBULATOV
761
+ needed to ensure the convergence of the Neumann series. This estimate is proved in [11] directly,
762
+ without splitting ˜Tp into a product of operators b
763
+ 1
764
+ p ·∇(µ−∆)− 1
765
+ 2+ 1
766
+ 2p and (µ−∆)− 1
767
+ 2p′ |b|
768
+ 1
769
+ p′ as we do
770
+ for Tp in Theorem 1. In fact, the previous two operators are not even bounded on Lp(Rd) under
771
+ the assumption (23); to have the Lp(Rd) boundedness one has to replace the exponents − 1
772
+ 2 + 1
773
+ 2p,
774
+ − 1
775
+ 2p′ by − 1
776
+ 2 + 1
777
+ 2p − ε, − 1
778
+ 2p′ − ε for a ε > 0 (this shows, by the way, that the difference between
779
+ the elliptic Morrey class Mq with q > 1 and the larger class (23) is quite significant). However,
780
+ the proof of (24) in [11] requires inequalities for symmetric Markov generators, not valid for the
781
+ parabolic operator ∂t − ∆ (although, it seems, one can address a parabolic counterpart of (23)
782
+ via an appropriate symmetrization of ∂t − ∆, which we plan to do in a subsequent paper).
783
+ Remark 3. Despite what was said in the introduction, [13, 11] and the present paper are not
784
+ directly comparable. Namely, the results in [13, 11] with b ∈ Fδ can be extended more or less
785
+ directly to the non-divergence form equation
786
+ � − a(t, x) · ∇2 + b(t, x) · ∇
787
+ �u = f,
788
+ u(s, ·) = g(·),
789
+ t > s,
790
+ (25)
791
+ and the corresponding Itô’s SDE having “form-bounded diffusion coefficients”.
792
+ Namely, the
793
+ matrix a is assumed to be bounded, uniformly elliptic and have
794
+ ∇aij ∈ Fδij,
795
+ 1 ≤ i, j ≤ d.
796
+ (26)
797
+ See [16] where this scheme was carried out in the time-homogeneous case b = b(x), a = a(x).
798
+ (Let us note that since ∇aij(x) are form-bounded, they are in the elliptic Morrey class with
799
+ q = 2, see the introduction. Hence by Poincaré’s inequality such aij belong to the VMO class,
800
+ see details in [22, Sect.3].) However, a similar extension of the results of the present paper for
801
+ (1) with b ∈ Eq, 1 < q ≤ 2 requires more regular a, see e.g. Remark 1.
802
+ 3. Some corollaries of Theorem 1 and Theorem 2(ii)
803
+ The following results will be needed in the proof of Theorem 3.
804
+ Corollary 1. Let vector fields b, f satisfy (12). Let bn be given by (10) and let us define fn
805
+ similarly. Then, under the assumptions on ∥bs∥Eq of Theorem 1, for every λ ≥ λd,p,q solutions
806
+ un ∈ Lp(Rd+1) to the approximating parabolic equations
807
+ (λ + ∂t − ∆ + bn · ∇)un = |fn|h,
808
+ h ∈ Cc(Rd+1)
809
+ converge in W1+ 1
810
+ p ,p(Rd+1) to
811
+ u := (λ + ∂t − ∆)−1|f|h − (λ + ∂t − ∆)− 1
812
+ 2− 1
813
+ 2p Qp(b)(1 + Tp(b))−1Rp(b)Qp(f)|f|
814
+ 1
815
+ p h,
816
+ In particular, if p > d + 1, then the convergence is uniform on Rd+1 and
817
+ sup
818
+ Rd+1 |u| ≤ C∥f
819
+ 1
820
+ p h∥p.
821
+
822
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
823
+ 13
824
+ The reason we include h in Corollary 1 is because in general |f| is only in L1
825
+ loc(Rd+1), not in
826
+ L1(Rd+1). In the proof of Theorem 3 we will be applying Corollary 1 and Corollaries 2, 3 below
827
+ to fn equal to either bn or (with some abuse of notation) to bn − bk.
828
+ Corollary 2. Under the assumptions and notation of Corollary 1, if p > d + 1, then, for
829
+ every λ ≥ λd,p,q, solutions vn ∈ Cb([r, T], C∞(Rd)) to the approximating inhomogeneous Cauchy
830
+ problems
831
+ (λ + ∂t − ∆ + bn · ∇)vn = 1[r,T]|fn|h
832
+ on ]r, T] × Rd,
833
+ vn(r, ·) = g(·) ∈ C∞(Rd) ∩ W 1,p(Rd),
834
+ where 0 ≤ r < T, converge uniformly on DT × Rd to
835
+ v := (λ + ∂t − ∆)−1�1|f|h + δs=rg
836
+
837
+ − (λ + ∂t − ∆)− 1
838
+ 2− 1
839
+ 2p Qp(b)(1 + Tp(b))−1�Rp(b)Qp(1f)|1f|
840
+ 1
841
+ p h + Gp(b)Spg
842
+ �,
843
+ 1 := 1[r,T],
844
+ sup
845
+ (r,t)∈DT ,x∈Rd |v(t, x; r)| ≤ C1∥1f
846
+ 1
847
+ p h∥p + C2∥g∥W 1,p(Rd).
848
+ We also have the following weighted variant of Corollary 2, which we will record for bounded
849
+ vector fields bn and fn and λ = 0, as will be needed in the proof of Theorem 3 in Section 8.
850
+ Let q > 1 (close to 1) be from the hypothesis on b in Theorem 1. Set
851
+ ρ(x) := (1 + l|x|2)−ν,
852
+ x ∈ Rd,
853
+ where ν > d
854
+ 2p +
855
+ 1
856
+ pq′ is fixed (so that ρ ∈ Lp(Rd) and (42) below holds) and l > 0 is to be chosen.
857
+ We have
858
+ |∇ρ| ≤ ν
859
+
860
+ lρ =: c1
861
+
862
+ lρ,
863
+ |∆ρ| ≤ 2ν(2ν + d + 2)lρ =: c2lρ.
864
+ (⋆)
865
+ Corollary 3. Under the assumptions of Corollary 1, if p > d + 1, then, provided that the
866
+ constant l in the definition of ρ is chosen sufficiently small, solutions vn ∈ Cb([r, T], C∞(Rd))
867
+ to the approximating inhomogeneous Cauchy problems
868
+ (∂t − ∆ + bn · ∇)vn = ±1[r,T]|fn|
869
+ on [r, T] × Rd,
870
+ vn(r, ·) = g ∈ C∞(Rd) ∩ W 1,p(Rd),
871
+ where 0 ≤ r < T, satisfy, for all t ∈]r, T],
872
+ sup
873
+ [r,t]×Rd |ρvn| ≤ C1∥ρ1[r,t]|fn|
874
+ 1
875
+ p ∥p + C2∥ρg∥W 1,p(Rd)
876
+ (27)
877
+ and, putting ρy(x) := ρ(x − y),
878
+ sup
879
+ [r,t]×Rd |vn| ≤ sup
880
+ y∈Zd(C1∥ρy1[r,t]|fn|
881
+ 1
882
+ p ∥p + C2∥ρyg∥W 1,p(Rd))
883
+ (28)
884
+ ≤ ˜C1(t − r)γ∥f∥
885
+ 1
886
+ p
887
+ Eq + ˜C2∥g∥W 1,p
888
+ (29)
889
+ with constants C1, C2, ˜C1, ˜C2 and γ > 0 independent of n and t.
890
+
891
+ 14
892
+ D. KINZEBULATOV
893
+ We prove Corollary 3 in Section 7.
894
+ 4. Proof of Proposition 1
895
+ It suffices to carry out the proof for bn defined by (10) and then use the Dominated Conver-
896
+ gence Theorem. So, without loss of generality, everywhere below b is bounded. Below we follow
897
+ [24].
898
+ Set
899
+ Mβh(t, x) := sup
900
+ ρ>0
901
+ ρβ 1
902
+ |Cρ|
903
+
904
+ Cρ(t,x)
905
+ |h|dz,
906
+ 0 ≤ β ≤ d − 2,
907
+ and define the maximal function
908
+ Mh(t, x) := sup
909
+ ρ>0
910
+ 1
911
+ |Cρ|
912
+
913
+ Cρ(t,x)
914
+ |h|dz.
915
+ Also, define
916
+ ˆ
917
+ Mh(t, x) :=
918
+ sup
919
+ (t,x)∈C
920
+ 1
921
+ |C|
922
+
923
+ C
924
+ |h|dz,
925
+ where the supremum is taken over all cylinders C = Cρ(z) ∋ (t, x), z ∈ Rd+1, ρ > 0.
926
+ Put Pα := (−∂t − ∆)− α
927
+ 2 . We will need
928
+ Lemma 1 (see [24, Lemma 2.2]). For every β ∈]0, d + 2], 0 < α < β there exists C > 0 such
929
+ that, for all f ≥ 0,
930
+ Pαf ≤ C(Mβf)
931
+ α
932
+ β (Mf)1− α
933
+ β .
934
+ Let us prove the first inequality:
935
+ |⟨|b|(P 1
936
+ p f)p⟩| ≤ cp
937
+ p,q∥b∥Eq∥f∥p
938
+ p,
939
+ f ∈ Lp(Rd+1)
940
+ (30)
941
+ (the proof of the second one is similar). Put u := P 1
942
+ p f. Then we estimate the LHS of (30) as
943
+ |⟨|b|(P 1
944
+ p f)p⟩| = |⟨|b||u|p−1, P 1
945
+ p f⟩|
946
+ ≤ |⟨P ∗
947
+ 1
948
+ p (|b||u|p−1), f⟩| ≤ ∥P ∗
949
+ 1
950
+ p (|b||u|p−1)∥p′∥f∥p.
951
+ (31)
952
+ Here P ∗
953
+ α = (∂t − ∆)− α
954
+ 2 is the adjoint of the operator Pα in L2(Rd+1). To obtain (30), we need
955
+ to bound the coefficient ∥P ∗
956
+ 1
957
+ p (|b|up−1)∥p′. To this end, we estimate pointwise
958
+ P ∗
959
+ 1
960
+ p (|b||u|p−1) = P ∗
961
+ 1
962
+ p (|b|
963
+ 1
964
+ p +γ|b|
965
+ 1
966
+ p′ −γ|u|p−1) ≤ P ∗
967
+ 1
968
+ p (|b|1+γp)
969
+ 1
970
+ p (P ∗
971
+ 1
972
+ p (|b|1−γp′|u|p))
973
+ 1
974
+ p′
975
+ for a small γ > 0 such that 1 + γp < q0 for some fixed q0 < q. Hence
976
+ ∥P ∗
977
+ 1
978
+ p (|b||u|p−1)∥p′
979
+ p′ ≤ ⟨|b|1−γp′|u|p, P 1
980
+ p [P ∗
981
+ 1
982
+ p (|b|1+γp)]
983
+ 1
984
+ p−1⟩.
985
+ (32)
986
+
987
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
988
+ 15
989
+ 1) By Lemma 1 with α = 1
990
+ p, β = 1 + γp (or rather its straightforward variant for P ∗
991
+ α),
992
+ P ∗
993
+ 1
994
+ p (|b|1+γp) ≤ C∥b∥
995
+ 1
996
+ p
997
+ E1+γp( ˆ
998
+ M|b|1+γp)1− 1
999
+ p
1000
+ 1
1001
+ 1+γp
1002
+ ≤ C∥b∥
1003
+ 1
1004
+ p
1005
+ Eq0( ˆ
1006
+ M|b|1+γp)1− 1
1007
+ p
1008
+ 1
1009
+ 1+γp
1010
+ At this point let us assume that
1011
+ ˆ
1012
+ M|b|1+γp ≤ C0|b|1+γp,
1013
+ (33)
1014
+ but will get rid of this assumption later. Then
1015
+ P ∗
1016
+ 1
1017
+ p (|b|1+γp) ≤ C2∥b∥
1018
+ 1
1019
+ p
1020
+ Eq0|b|1+γp− 1
1021
+ p .
1022
+ 2) After applying the last estimate in (32), it remains to estimate P 1
1023
+ p (|b|
1024
+ 1
1025
+ p +γp′). Selecting γ
1026
+ even smaller, if needed, one may assume that 1
1027
+ p + γp′ < q0. By Lemma 1,
1028
+ P 1
1029
+ p (|b|
1030
+ 1
1031
+ p +γp′) ≤ C(M 1
1032
+ p +γp′|b|
1033
+ 1
1034
+ p +γp′)
1035
+ 1
1036
+ p
1037
+ 1
1038
+ 1
1039
+ p +γp′ (M|b|
1040
+ 1
1041
+ p +γp′)
1042
+ 1− 1
1043
+ p
1044
+ 1
1045
+ 1
1046
+ p +γp′
1047
+ ≤ C∥b∥
1048
+ 1
1049
+ p
1050
+ Eq0( ˆ
1051
+ M|b|
1052
+ 1
1053
+ p +γp′)
1054
+ 1− 1
1055
+ p
1056
+ 1
1057
+ 1
1058
+ p +γp′
1059
+ In addition to (33), let us temporarily assume that
1060
+ ˆ
1061
+ M|b|
1062
+ 1
1063
+ p +γp′ ≤ C0|b|
1064
+ 1
1065
+ p +γp′.
1066
+ (34)
1067
+ Then
1068
+ P 1
1069
+ p (|b|
1070
+ 1
1071
+ p +γp′) ≤ C2∥b∥
1072
+ 1
1073
+ p
1074
+ Eq0|b|γp′.
1075
+ 3) Applying the results from 1), 2) in (32), we obtain
1076
+ ∥P ∗
1077
+ 1
1078
+ p (|b||u|p−1)∥p′ ≤ C3∥b∥
1079
+ 1
1080
+ p
1081
+ Eq0⟨|b||u|p⟩
1082
+ 1
1083
+ p′ .
1084
+ Therefore, (31) yields
1085
+ ⟨|b||u|p⟩ ≤ C3∥b∥
1086
+ 1
1087
+ p
1088
+ Eq0⟨|b||u|p⟩
1089
+ 1
1090
+ p′ ∥f∥p
1091
+ so
1092
+ ⟨|b||u|p⟩
1093
+ 1
1094
+ p ≤ C3∥b∥
1095
+ 1
1096
+ p
1097
+ Eq0∥f∥p.
1098
+ (35)
1099
+ 4) Now one gets rid of the assumptions (33) and (34) at expense of replacing ∥b∥Eq0 in (35)
1100
+ by ∥b∥Eq, where, recall, q0 < q. This, in turn, will give (30). Fix q0 < q1 < q and define
1101
+ ˜b := ( ˆ
1102
+ M|b|q1)
1103
+ 1
1104
+ q1 . Then ˜b ≥ |b| and ˜b satisfies
1105
+ ˆ
1106
+ M˜bq0 ≤ C0˜bq0
1107
+ (36)
1108
+ (see [8, p.158]). Since 1+ γp < q0, 1
1109
+ p + γp′ < q0, both inequalities (33) and (34) for ˜b follow from
1110
+ (36), and so we have
1111
+ ⟨|b||u|p⟩
1112
+ 1
1113
+ p ≤ C3∥˜b∥
1114
+ 1
1115
+ p
1116
+ Eq0∥f∥p.
1117
+
1118
+ 16
1119
+ D. KINZEBULATOV
1120
+ It remains to apply inequality ∥˜b∥Eq0 ≤ C∥b∥Eq, which was established in [24, proof of Prop. 4.1].
1121
+
1122
+ 5. Proof of Theorem 1
1123
+ The fact that Qp, Rp are bounded on Lp(Rd+1), and the operator Tp = RpQp has norm
1124
+ ∥Tp∥p→p < 1 provided that ∥bs∥Eq is sufficiently small and λ is sufficiently large, is an immediate
1125
+ consequence of Proposition 2. Thus,
1126
+ Θp(b) := (λ + ∂t − ∆)−1 − (λ + ∂t − ∆)− 1
1127
+ 2− 1
1128
+ 2p Qp(1 + Tp)−1Rp(λ + ∂t − ∆)− 1
1129
+ 2p′
1130
+ is in B(Lp).
1131
+ Recall: bn := 1nb, where 1n is the indicator of {(t, x) ∈ Rd+1 | |b(t, x)| ≤ n}. If un ∈ Lp(Rd+1)
1132
+ denotes the solution to (∂t − ∆ + bn · ∇)un = f, which exists by the classical theory, then
1133
+ un = Θp(bn)f,
1134
+ where Θp(bn)f coincides with the Duhamel series representation for un.
1135
+ Next, let us note that
1136
+ Rp(bn) → Rp(b), Qp(bn) → Qp(b)
1137
+ strongly in Lp(Rd+1)
1138
+ (37)
1139
+ as follows from (21), (22) and the Dominated Convergence Theorem. Hence
1140
+ un := Θp(bn) → u = Θp(b) in W1+ 1
1141
+ p ,p(Rd+1),
1142
+ (38)
1143
+ as needed.
1144
+
1145
+ Remark 4. In the comment after Theorem 1 we promised to prove the existence and uniqueness
1146
+ of weak solution to (11). The argument is standard and goes as follows. In the proof of Theorem
1147
+ 1 above take p = 2, so u ∈ W
1148
+ 3
1149
+ 2 ,2. Multiplying (λ + ∂t − ∆ + bn · ∇)un = f, n = 1, 2, . . . , by
1150
+ ϕ = (λ − ∂t − ∆)− 1
1151
+ 4 (λ + ∂t − ∆)
1152
+ 3
1153
+ 4 η, η ∈ C∞
1154
+ c (Rd+1) and integrating over Rd+1, we have
1155
+ ⟨(λ + ∂t − ∆)
1156
+ 3
1157
+ 4un, (λ + ∂t − ∆)
1158
+ 3
1159
+ 4 η⟩+⟨R2(bn)(λ + ∂t − ∆)
1160
+ 3
1161
+ 4 un, Q∗
1162
+ 2(bn)(λ + ∂t − ∆)
1163
+ 3
1164
+ 4 η⟩
1165
+ = ⟨f, (λ − ∂t − ∆)− 1
1166
+ 4 (λ + ∂t − ∆)
1167
+ 3
1168
+ 4 η⟩,
1169
+ where, recall, Q∗
1170
+ 2(b) = |b|
1171
+ 1
1172
+ 2(λ − ∂t − ∆)− 1
1173
+ 4 ∈ B(L2). In view of (38),
1174
+ ⟨(λ + ∂t − ∆)
1175
+ 3
1176
+ 4un, (λ + ∂t − ∆)
1177
+ 3
1178
+ 4 η⟩ → ⟨(λ + ∂t − ∆)
1179
+ 3
1180
+ 4u, (λ + ∂t − ∆)
1181
+ 3
1182
+ 4 η⟩
1183
+ (n → ∞).
1184
+ Next,
1185
+ ⟨R2(bn)(λ + ∂t − ∆)
1186
+ 3
1187
+ 4 un, Q∗
1188
+ 2(bn)(λ + ∂t − ∆)
1189
+ 3
1190
+ 4 η⟩
1191
+ = ⟨R2(bn)(λ + ∂t − ∆)
1192
+ 3
1193
+ 4 (un − u), Q∗
1194
+ 2(bn)(λ + ∂t − ∆)
1195
+ 3
1196
+ 4η⟩
1197
+ + ⟨R2(bn)(λ + ∂t − ∆)
1198
+ 3
1199
+ 4 u, (Q∗
1200
+ 2(bn) − Q∗
1201
+ 2(b))(λ + ∂t − ∆)
1202
+ 3
1203
+ 4η⟩
1204
+ + ⟨R2(bn)(λ + ∂t − ∆)
1205
+ 3
1206
+ 4 u, Q∗
1207
+ 2(b)(λ + ∂t − ∆)
1208
+ 3
1209
+ 4η⟩.
1210
+
1211
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
1212
+ 17
1213
+ By (38), Q∗
1214
+ 2(bn) → Q∗
1215
+ 2(b) strongly in L2(Rd+1) (by the same argument as in (37)) we get
1216
+ that the first two terms in the RHS tend to 0 as n → ∞. By (37), the last term tends to
1217
+ ⟨R2(b)(λ + ∂t − ∆)
1218
+ 3
1219
+ 4u, Q∗
1220
+ 2(b)(λ + ∂t − ∆)
1221
+ 3
1222
+ 4η⟩. Hence u is a weak solution to (11) in the sense of
1223
+ definition (16).
1224
+ Let v ∈ W
1225
+ 3
1226
+ 2,2 be another weak solution. Put
1227
+ τ[v, η] := ⟨(λ + ∂t − ∆)
1228
+ 3
1229
+ 4 v, (λ + ∂t − ∆)
1230
+ 3
1231
+ 4 η⟩ + ⟨R2(b)(λ + ∂t − ∆)
1232
+ 3
1233
+ 4v, Q∗
1234
+ 2(b)(λ + ∂t − ∆)
1235
+ 3
1236
+ 4η⟩,
1237
+ where η ∈ C∞
1238
+ c (Rd+1). We have
1239
+ |⟨R2(b)(λ + ∂t − ∆)
1240
+ 3
1241
+ 4 v, Q∗
1242
+ 2(b)(λ + ∂t − ∆)
1243
+ 3
1244
+ 4 η⟩| ≤ c∥v∥W
1245
+ 3
1246
+ 2 ,2∥η∥W
1247
+ 3
1248
+ 2 ,2
1249
+ where c < 1 by our assumption on b. We extend τ[v, η] to η ∈ W
1250
+ 3
1251
+ 2,2 by continuity. Now we have
1252
+ τ[v − u, η] = 0, where u is the weak solution constructed above, so it suffices to choose η = v − u
1253
+ to arrive at 0 = τ[v − u, v − u] ≥ (1 − c)∥v∥2
1254
+ W
1255
+ 3
1256
+ 2 ,2, hence v = u.
1257
+ 6. Proof of Theorem 2
1258
+ Let us define Ut,rg := v(t) (t ≥ r), g ∈ C∞(Rd) ∩ W 1,p(Rd) where v(t) is given by (18). Since
1259
+ Ut,r
1260
+ n
1261
+ are L∞ contractions, it suffices to prove (we consider convergence in (r, t) ∈ DT )
1262
+ U = Cb(DT , C∞(Rd))- lim
1263
+ n Ung,
1264
+ (39)
1265
+ and then extend operators Ut,r by continuity to g ∈ C∞(Rd). The reproduction property of Ut,r
1266
+ and the preservation of positivity will follow from the corresponding properties of Ut,r
1267
+ n .
1268
+ Proof of (39). Put vn := Ut,r
1269
+ n g. We have
1270
+ vn = (λ + ∂t − ∆)−1δs=rg − (λ + ∂t − ∆)− 1
1271
+ 2− 1
1272
+ 2p Qp(bn)(1 + Tp(bn))−1Gp(bn)Spg.
1273
+ This is the usual Duhamel series representation for vn. We know from the proof of Theorem 1
1274
+ that operators Qp(bn), Tp(bn), Gp(bn) are bounded on Lp(Rd+1) with operator norms indepen-
1275
+ dent of n. In turn, operator Sp satisfies
1276
+ ∥Spg∥Lp(Rd+1) ≤ Cp,d∥∇g∥Lp(Rd).
1277
+ (Indeed, taking for brevity r = 0, we have by definition
1278
+ Spg(t, x) = 1t≥0e−λtt− 1
1279
+ 2+ 1
1280
+ 2p′ (4πt)− d
1281
+ 2
1282
+
1283
+ Rd ∇xe− |x−y|2
1284
+ 4t
1285
+ g(y)dy.
1286
+ Hence
1287
+ ∥Spg∥p
1288
+ Lp(Rd+1) =
1289
+
1290
+ R
1291
+ 1t≥0∥Sp(t)∥p
1292
+ Lp(Rd)dt ≤
1293
+ � ∞
1294
+ 0
1295
+ e−λptt(− 1
1296
+ 2+ 1
1297
+ 2p′ )pdt∥∇g∥p
1298
+ Lp(Rd),
1299
+ where (− 1
1300
+ 2 +
1301
+ 1
1302
+ 2p′ )p = − 1
1303
+ 2 (> −1 so the integral in time converges).)
1304
+
1305
+ 18
1306
+ D. KINZEBULATOV
1307
+ Clearly, (λ + ∂t − ∆)−1δs=rg ∈ Cb([r, ∞[, C∞(Rd)). Thus, to prove (39), it remains to note
1308
+ that Qp(bn) → Qp(b), Tp(bn) → Tp(b) and Gp(bn) → Gp(b) strongly in Lp(Rd+1) (see proof of
1309
+ Theorem 1), so that by the parabolic Sobolev embedding, since p > d + 1,
1310
+ (λ + ∂t − ∆)− 1
1311
+ 2 − 1
1312
+ 2p Qp(bn)(1 + Tp(bn))−1Gp(bn)Spg
1313
+ → (λ + ∂t − ∆)− 1
1314
+ 2− 1
1315
+ 2p Qp(b)(1 + Tp(b))−1Gp(b)Spg
1316
+ in C∞(Rd+1) as n → ∞.
1317
+ The required convergence (39) follows.
1318
+
1319
+ 7. Proof of Corollary 3 (weighted bounds)
1320
+ It will be convenient to carry out the proof for solutions vn to
1321
+ (λ + ∂t − ∆ + bn · ∇)vn = ±1[r,T]|fn|,
1322
+ on [r, T] × Rd,
1323
+ vn(r, ·) = g ∈ C∞(Rd) ∩ W 1,p(Rd)
1324
+ where λ ≥ λd,p,q > 0. Since we are working on a fixed finite time interval [r, T], this change will
1325
+ amount to multiplying solution vn by a bounded function eλ(t−r) which, clearly, does not affect
1326
+ the sought estimates.
1327
+ Put for brevity v = vn. We will carry out the proof on the maximal interval [r, t], i.e. for
1328
+ t = T. Also, without loss of generality, the RHS of the equation is 1[r,T]|fn| and the initial
1329
+ function g ≥ 0, so v ≥ 0. We have for the weight ρ defined before the corollary,
1330
+ λρv + ∂t(ρv) − ∆(ρv) + bn · ∇(ρv)
1331
+ = ρ(λv + ∂tv − ∆v + bn · ∇v) − 2∇ρ · ∇v + (−∆ρ)v + bnv · ∇ρ
1332
+ (v solves the parabolic equation above)
1333
+ = ρ1[r,T]|fn| + K,
1334
+ K := −2∇ρ · ∇v + (−∆ρ)v + bnv · ∇ρ.
1335
+ Let us rewrite the term K as follows:
1336
+ K = −2
1337
+ �∇ρ
1338
+ ρ · ∇(ρv) − (∇ρ)2
1339
+ ρ
1340
+ v
1341
+
1342
+ + (−∆ρ)v + bnv · ∇ρ.
1343
+ Hence
1344
+ λρv + ∂t(ρv) − ∆(ρv) + ˜bn · ∇(ρv) = ρ1[r,T]|fn| + ˜K,
1345
+ (40)
1346
+ where ˜bn := bn + 2∇ρ
1347
+ ρ and
1348
+ ˜K = 2(∇ρ)2
1349
+ ρ
1350
+ v + (−∆ρ)v + bnv · ∇ρ.
1351
+ Note that by (⋆) the term 2∇ρ
1352
+ ρ
1353
+ in ˜bn is a bounded vector field whose sup norm can be made
1354
+ as small as needed by selecting l in the definition of ρ sufficiently small; we will be selecting l
1355
+ sufficiently small.
1356
+
1357
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
1358
+ 19
1359
+ By (⋆), the first two terms in ˜K are smaller than (c2
1360
+ 1 + c2)lρv, so they can be handled by
1361
+ selecting λ ≥ λd,p,q + (c2
1362
+ 1 + c2)l. Corollary 2 applied to (40) gives us
1363
+ sup
1364
+ [r,T]×Rd |ρv| ≤ C1∥ρ1[r,T]|fn|
1365
+ 1
1366
+ p ∥p + C′
1367
+ 1
1368
+
1369
+ l∥|bn|
1370
+ 1
1371
+ p ρv∥p + C2∥ρg∥W 1,p(Rd),
1372
+ where, when we were treating the last term in ˜K, we used again (⋆). However, now we have
1373
+ to deal with ∥|bn|
1374
+ 1
1375
+ p ρv∥p. So, we will have to use instead a finer consequence of the solution
1376
+ representation of Corollary 2:
1377
+ 1
1378
+ 2
1379
+ sup
1380
+ [r,T]×Rd |ρv| + C0
1381
+ 2 ∥(λ + ∂t − ∆)
1382
+ 1
1383
+ 2p ρv∥p
1384
+ ≤ C1∥ρ1[r,T]|fn|
1385
+ 1
1386
+ p ∥p + C′
1387
+ 1
1388
+
1389
+ l∥|bn|
1390
+ 1
1391
+ p ρv∥p + C2∥ρg∥W 1,p(Rd)
1392
+ (41)
1393
+ for appropriate constant C0 > 0. (Here we only need to justify that (λ + ∂t − ∆)− 1
1394
+ 2 − 1
1395
+ 2p′ δs=rρg is
1396
+ in Lp(Rd+1) and its norm is bounded by ∥ρg∥Lp(Rd). The proof of this fact repeats the argument
1397
+ for operator Sp from the proof of Theorem 2.) We have
1398
+ ∥|bn|
1399
+ 1
1400
+ p ρv∥p ≤ ∥|bn|
1401
+ 1
1402
+ p (λ + ∂t − ∆)− 1
1403
+ 2p ∥p→p∥(λ + ∂t − ∆)
1404
+ 1
1405
+ 2p ρv∥p
1406
+ (we are applying Proposition 2)
1407
+ ≤ Cλ∥(λ + ∂t − ∆)
1408
+ 1
1409
+ 2p ρv∥p.
1410
+ Applying the last bound in (41) with l chosen sufficiently small so that C0
1411
+ 2 − C′
1412
+ 1Cλ
1413
+
1414
+ l > 0, we
1415
+ obtain (27).
1416
+ Assertion (28) follows from (27) using translations.
1417
+ Armed with (28), we now prove (29). We obtain from (⋆) that supy∈Zd ∥ρyg∥W 1,p ≤ c0∥g∥W 1,p
1418
+ for appropriate c0 > 0. It remains to show that if |f| ∈ Eq, q > 1, then
1419
+ sup
1420
+ y∈Zd ∥ρy1[r,T]|f|
1421
+ 1
1422
+ p ∥p ≤ c(T − r)γ∥f∥
1423
+ 1
1424
+ p
1425
+ Eq
1426
+ (42)
1427
+ for constants c = c(d, p, l) and γ = γ(q, p) > 0.
1428
+ (Actually, f in Corollary 3 satisfies (12),
1429
+ i.e. f = f1 + f2 where |f1| ∈ Eq, q > 1 and f2 is bounded on Rd+1. The term f2 is dealt with using
1430
+ the fact that ρ ∈ Lq(Rd+1), so we only need to apply (42) to |f1|.)
1431
+
1432
+ 20
1433
+ D. KINZEBULATOV
1434
+ To prove (42), we estimate
1435
+ ∥ρy1[r,T]|f|
1436
+ 1
1437
+ p ∥p
1438
+ p = ⟨ρp
1439
+ y1[r,T]|f|⟩ ≤
1440
+
1441
+
1442
+ k=0
1443
+ (1 + lk2)−νp⟨1[r,T]|f|1Ck+1(r,y)−Ck(r,y)⟩
1444
+ C0(r, y) := ∅
1445
+
1446
+
1447
+
1448
+ k=1
1449
+ (1 + lk2)−νp��1[r,T]|f|1Ck+1(r,y)⟩
1450
+
1451
+
1452
+
1453
+ k=1
1454
+ (1 + lk2)−νp|Ck+1(r, y) ∩ ([r, T] × Rd)|
1455
+ 1
1456
+ q′ |Ck+1|
1457
+ 1
1458
+ q
1459
+ k + 1 (k + 1)
1460
+
1461
+ 1
1462
+ |Ck+1|⟨|f|q1Ck+1(r,y)⟩
1463
+ � 1
1464
+ q
1465
+ ≤ c0(d)
1466
+
1467
+
1468
+ k=1
1469
+ (1 + lk2)−νp|T − r|
1470
+ 1
1471
+ q′ (k + 1)
1472
+ d
1473
+ q′ |Ck+1|
1474
+ 1
1475
+ q
1476
+ k + 1 ∥f∥Eq
1477
+ ≤ c1(d, l)|T − r|
1478
+ 1
1479
+ q′
1480
+
1481
+
1482
+ k=1
1483
+ k−2νpk
1484
+ d
1485
+ q′ k
1486
+ d+2
1487
+ q −1∥f∥Eq =: cp|T − r|
1488
+ 1
1489
+ q′ ∥f∥Eq,
1490
+ where c = c(d, p, l) < ∞ since, by our choice of ν in (⋆), −2νp + d
1491
+ q′ + d+2
1492
+ q
1493
+ − 1 < −1.
1494
+
1495
+ 8. Proof of Theorem 3
1496
+ Below we follow an argument from [13] but use different embeddings, i.e. the ones established
1497
+ in Corollaries 1-3.
1498
+ The first assertion (i), i.e. for all x ∈ Rd, 0 ≤ t ≤ r ≤ T,
1499
+ ⟨P t,r(x, ·)⟩ = 1,
1500
+ follows from from (27) with f = 0 and Theorem 2(i). Namely, we first show for a fixed x, using
1501
+ weight ρ, that for every ε > 0 there exists R > 0 such that ⟨P t,r
1502
+ m (x, ·)1Rd−B(0,R)(·)⟩ < ε for all
1503
+ m = 1, 2, . . . , and so ⟨P t,r
1504
+ m (x, ·)1B(0,R)(·)⟩ ≥ 1−ε. Passing to the limit in m and then in R → ∞,
1505
+ we obtain ⟨P t,r(x, ·)⟩ ≥ 1 − ε, which yields the required.
1506
+ (ii) For every n = 1, 2, . . . , let Xn
1507
+ t = Xn
1508
+ t,x denote the strong solution to the approximating
1509
+ SDE
1510
+ Xn
1511
+ t = x −
1512
+ � t
1513
+ 0
1514
+ bn(s, Xn
1515
+ s )ds +
1516
+
1517
+ 2Bt,
1518
+ x ∈ Rd,
1519
+ on a complete probability space (Ω, Ft, P), where {bn} are given by (10).
1520
+ Step 1: There exists a constant C > 0 independent of n, k such that
1521
+ sup
1522
+ n
1523
+ sup
1524
+ x∈Rd E
1525
+ � r
1526
+ s
1527
+ |bk(t, Xn
1528
+ t,x)|dt ≤ CF(r − s)
1529
+ (43)
1530
+ for 0 ≤ s ≤ r ≤ T, where
1531
+ F(h) := hγ,
1532
+ constants C and γ > 0 (from Corollary 3) are independent of n and k. Indeed, let v = vn,k be
1533
+ the solution to the terminal-value problem
1534
+ (∂t + ∆ − bn · ∇)v = −|bk|,
1535
+ v(r, ·) = 0,
1536
+ t ≤ r.
1537
+
1538
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
1539
+ 21
1540
+ By Itô’s formula,
1541
+ v(r, Xn
1542
+ r ) = v(s, Xn
1543
+ s ) +
1544
+ � r
1545
+ s
1546
+ (∂tv + ∆v − bn · ∇v)(t, Xn
1547
+ t )dt +
1548
+
1549
+ 2
1550
+ � r
1551
+ s
1552
+ ∇v(t, Xn
1553
+ t )dBt,
1554
+ hence
1555
+ 0 = v(s, Xn
1556
+ s ) −
1557
+ � r
1558
+ s
1559
+ |bk(t, Xn
1560
+ t )|dt +
1561
+
1562
+ 2
1563
+ � r
1564
+ s
1565
+ ∇v(t, Xn
1566
+ t )dBt.
1567
+ Taking expectation, we obtain
1568
+ E
1569
+ � r
1570
+ s
1571
+ |bn(t, Xn
1572
+ t )|dt = Ev(s, Xn
1573
+ s ).
1574
+ Since Ev(s, Xn
1575
+ s ) ≤ ∥v(s, ·)∥L∞(Rd), we obtain from Corollary 3 with fk = bk and initial data
1576
+ g = 0
1577
+ E
1578
+ � r
1579
+ s
1580
+ |bk(t, Xn
1581
+ t )|dt ≤ C(r − s)γ
1582
+ with constants C and γ > 0 independent of k, n ⇒ (43).
1583
+ By a standard result (see e.g. [10, Ch. 2]), given a conservative backward Feller evolution
1584
+ family, there exist probability measures Px (x ∈ Rd) on (D([0, T], Rd), B′
1585
+ t = σ(ωr | 0 ≤ r ≤ t)),
1586
+ where D([0, T], Rd) is the space of right-continuous functions having left limits, and ωt is the
1587
+ coordinate process, such that
1588
+ Ex[f(ωr)] = P 0,rf(x),
1589
+ 0 ≤ r ≤ T.
1590
+ Here and below, Ex := EPx. Also, put {Pn
1591
+ x := (PXn)−1}∞
1592
+ n=1 and set En
1593
+ x := EPnx.
1594
+ Step 2: Ex[
1595
+ � r
1596
+ 0 |b(t, ωt)|dt] < ∞.
1597
+ Indeed, by Step 1, supn supx∈Rd En
1598
+ x
1599
+ � r
1600
+ s |bk(t, ωt)|dt ≤ CF(r − s). Hence by the convergence
1601
+ result in Corollary 2 (with f := 1B(0,k)bk)
1602
+ Ex[
1603
+ � r
1604
+ s
1605
+ |1B(0,k)bk(t, ωt)|dt] ≤ CF(r − s) < ∞.
1606
+ It remains to apply Fatou’s Lemma in k.
1607
+ Step 3: For every f ∈ C2
1608
+ c (Rd), the process
1609
+ Mf
1610
+ r := f(ωr) − f(x) +
1611
+ � r
1612
+ 0
1613
+ (−∆f + b · ∇f)(t, ωt)dt
1614
+ (44)
1615
+ is a B′
1616
+ r-martingale under Px.
1617
+ Indeed, let us note first that
1618
+ Em
1619
+ x [f(ωr)] → Ex[f(ωr)],
1620
+ Em
1621
+ x [
1622
+ � r
1623
+ 0
1624
+ (−∆f)(ωt)dt] → Ex[
1625
+ � r
1626
+ 0
1627
+ (−∆f)(ωt)dt]
1628
+ (m → ∞),
1629
+ (⋆)
1630
+ as follows from the convergence result in Theorem 2(i). Next, we note that
1631
+ Em
1632
+ x
1633
+ � r
1634
+ 0
1635
+ (bm · ∇f)(t, ωt)dt → Ex
1636
+ � r
1637
+ 0
1638
+ (b · ∇f)(t, ωt)dt
1639
+ (m → ∞).
1640
+ (⋆⋆)
1641
+
1642
+ 22
1643
+ D. KINZEBULATOV
1644
+ The latter follows from
1645
+ Em
1646
+ x
1647
+ ����
1648
+ � r
1649
+ 0
1650
+ �(bm − bn) · ∇f
1651
+ �(t, ωt)dt η(ω)
1652
+ ���� ≤ C∥η∥∞∥1[0,r]|bm − bn|
1653
+ 1
1654
+ p |∇f|∥p
1655
+ (a)
1656
+ as m, n → ∞;
1657
+ Em
1658
+ x
1659
+ � � r
1660
+ 0
1661
+ (bn · ∇f)(t, ωt)dt · η(ω)
1662
+
1663
+ → Ex
1664
+ � � r
1665
+ 0
1666
+ (bn · ∇f)(t, ωt)dt · η(ω)
1667
+
1668
+ (b)
1669
+ as m → ∞;
1670
+ Ex
1671
+ ����
1672
+ � r
1673
+ 0
1674
+ �(b − bn) · ∇f
1675
+ �(t, ωt)dt η(ω)
1676
+ ���� ≤ C∥η∥∞∥1[0,r]|b − bn|
1677
+ 1
1678
+ p |∇f|∥p → 0
1679
+ (c)
1680
+ as n → ∞. The proof of the inequality in (a) follows the proof of (43) but uses Corollary 2
1681
+ with f = bn − bm and g = 0. The convergence in (a) follows from the fact that bn − bm → 0 in
1682
+ [L1
1683
+ loc(Rd+1)]d. Assertion (b) follows from Corollary 2. The proof of (c) is similar to the proof of
1684
+ (a) except that we pass to the limit in m and then in k using Fatou’s Lemma.
1685
+ Now, since
1686
+ Mf
1687
+ r,m := f(ωr) − f(x) +
1688
+ � r
1689
+ 0
1690
+ (−∆f + bm · ∇f)(t, ωt)dt
1691
+ is a B′
1692
+ r-martingale under Pm
1693
+ x ,
1694
+ x �→ Em
1695
+ x [f(ωr)] − f(x) + Em
1696
+ x
1697
+ � r
1698
+ 0
1699
+ (−∆f + bm · ∇f)(t, ωt)dt
1700
+ is identically zero on Rd,
1701
+ and so by (⋆), (⋆⋆)
1702
+ x �→ Ex[f(ωr)] − f(x) + Ex
1703
+ � r
1704
+ 0
1705
+ (−∆f + b · ∇f)(t, ωt)dt
1706
+ is identically zero in Rd.
1707
+ Since {Px}x∈Rd are determined by a Feller evolution family, and thus constitute a Markov
1708
+ process, we can conclude (see e.g. the proof of [20, Lemma 2.2]) that Mf
1709
+ r is a B′
1710
+ r-martingale
1711
+ under Px.
1712
+ Step 4: {Px}x∈Rd are concentrated on (C([0, T], Rd), Bt).
1713
+ By Step 3, ωt is a semimartingale under Px, so Itô’s formula yields, for every g ∈ C∞
1714
+ c (Rd),
1715
+ that
1716
+ g(ωt) − g(x) =
1717
+
1718
+ s≤t
1719
+ �g(ωs) − g(ωs−)
1720
+ � + St,
1721
+ (45)
1722
+ where St is defined in terms of some integrals and sums of (∂xig)(ωs−) and (∂xi∂xjg)(ωs−) in s,
1723
+ see [5, Sect. 2] for details. Now, let A, B be arbitrary compact sets in Rd such that dist(A, B) > 0.
1724
+ Fix g ∈ C∞
1725
+ c (Rd) that separates A, B, say, g = 0 on A, g = 1 on B. Set
1726
+ Mg
1727
+ t := g(ωt) − g(x) +
1728
+ � t
1729
+ 0
1730
+ (−∆g + b · ∇g)(ωs)ds,
1731
+ Kg
1732
+ t :=
1733
+ � t
1734
+ 0
1735
+ 1A(ωs−)dMs.
1736
+
1737
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
1738
+ 23
1739
+ In view of (44) and (45), when evaluating Kg
1740
+ t one needs to integrate 1A(ωs−) with respect to
1741
+ St, however, one obtains zero since (∂xig)(ωs−) = (∂xi∂xjg)(ωs−) = 0 if ωs− ∈ A. Thus,
1742
+ Kg
1743
+ t =
1744
+
1745
+ s≤t
1746
+ 1A (ωs−) g(ωs) +
1747
+ � t
1748
+ 0
1749
+ 1A(ωs−)
1750
+ �−∆g + b · ∇g
1751
+ �(ωs)ds
1752
+ =
1753
+
1754
+ s≤t
1755
+ 1A (ωs−) g(ωs).
1756
+ Since Mg
1757
+ t is a martingale, so is Kg
1758
+ t . Thus, Ex
1759
+ ��
1760
+ s≤t 1A(ωs−)g(ωs)
1761
+ � = 0. Using the Dominated
1762
+ Convergence Theorem, we further obtain Ex
1763
+ ��
1764
+ s≤t 1A(ωs−)1B(ωs)
1765
+ � = 0, which yields the re-
1766
+ quired. (By the way, this construction, in a more general form, can be used to control the jumps
1767
+ of stable process perturbed by a drift, see [5].)
1768
+ We denote the restriction of Px from (D([0, T], Rd), B′
1769
+ t) to (C([0, T], Rd), Bt) again by Px, and
1770
+ thus obtain that for every x ∈ Rd and all f ∈ C2
1771
+ c (Rd)
1772
+ Mf
1773
+ r = f(ωr) − f(x) +
1774
+ � r
1775
+ 0
1776
+ (−∆f + b · ∇f)(t, ωt)dt,
1777
+ ω ∈ C([0, T], Rd),
1778
+ is a Br-martingale under Px.
1779
+ Thus, Px is a Br-martingale solution to (19). (Alternatively, we could have used a tightness
1780
+ argument, cf. [13].)
1781
+ To show that Px is a weak solution it suffices to show that Mf
1782
+ r is also a martingale for
1783
+ f(x) = xi and f(x) = xixj, which is done by following closely [15, proof of Lemma 6] and
1784
+ employing weight ρ and (27) in Corollary 3.
1785
+ (iii) This follows from Corollary 2, cf. proof of (ii) above.
1786
+ (iv) Suppose that there exist P1
1787
+ x, P2
1788
+ x, two martingale solutions to (19), that satisfy
1789
+ Ei
1790
+ x
1791
+ � T
1792
+ 0
1793
+ |b(r, ωt)h(t, ωt)|dt ≤ c∥1[0,T]b
1794
+ 1
1795
+ p h∥p,
1796
+ h ∈ Cc(Rd+1)
1797
+ (46)
1798
+ with constant c independent of h (i = 1, 2). Here and below, E1
1799
+ x := EP1x, E2
1800
+ x := EP2x. We will
1801
+ show that for every F ∈ Cc(Rd+1) we have
1802
+ E1
1803
+ x[
1804
+ � T
1805
+ 0
1806
+ F(t, ωt)dt] = E2
1807
+ x[
1808
+ � T
1809
+ 0
1810
+ F(t, ωt)dt],
1811
+ (47)
1812
+ which implies P1
1813
+ x = P2
1814
+ x.
1815
+ Proof of (47). Let un ∈ C([0, T], C∞(Rd)) be the solution to
1816
+ (∂t − ∆ + bn · ∇)un = F,
1817
+ un(T, ·) = 0,
1818
+ (48)
1819
+ where, recall, bn = 1nb, and 1n is the indicator of {|b| ≤ n}. Set τR := inf{t ≥ 0 | |ωt| ≥ R},
1820
+ R > 0. By Itô’s formula
1821
+ Ei
1822
+ xun(T ∧ τR, ωT∧τR) = un(0, x) + Ei
1823
+ x
1824
+ � T∧τR
1825
+ 0
1826
+ F(t, ωt)dt
1827
+ + Ei
1828
+ x
1829
+ � T∧τR
1830
+ 0
1831
+ �(b − bn) · ∇un
1832
+ �(t, ωt)dt
1833
+ (49)
1834
+
1835
+ 24
1836
+ D. KINZEBULATOV
1837
+ (i = 1, 2). We have
1838
+ ����Ei
1839
+ x
1840
+ � T∧τR
1841
+ 0
1842
+ �(b − bn) · ∇un
1843
+ �(t, ωt)dt
1844
+ ���� ≤ Ei
1845
+ x
1846
+ � T∧τR
1847
+ 0
1848
+ �|b|(1 − 1n)|∇un|
1849
+ �(t, ωt)dt
1850
+ (we are applying (46))
1851
+ ≤ c∥1[0,T]×B(0,R)|b|
1852
+ 1
1853
+ p (1 − 1n)|∇un|∥p.
1854
+ At this point we note that ˜un(t) := eλ(T−t)un(t) satisfies
1855
+ (λ + ∂t + ∆ + bn · ∇)un = 1[0,T]eλ(T−t)F.
1856
+ Hence we can apply to |b|
1857
+ 1
1858
+ p |∇un| the solution representation of Corollary 2 (after reversing time
1859
+ and taking there g = 0).
1860
+ Using |b| ≥ |bn|, we then obtain an independent on n Lp(Rd+1)
1861
+ majorant on |b|
1862
+ 1
1863
+ p |∇un|. Therefore, since 1 − 1n → 0 a.e. on Rd+1 as n → ∞, we have
1864
+ Ei
1865
+ x
1866
+ � T∧τR
1867
+ 0
1868
+ �(b − bn) · ∇un
1869
+ �(t, ωt)dt → 0
1870
+ (n → ∞).
1871
+ We are left to note, using again Corollary 2, that solutions un converge to a function u ∈
1872
+ C([0, T], C∞(Rd)). Therefore, we can pass to the limit in (49), first in n and then in R → ∞, to
1873
+ obtain
1874
+ 0 = u(0, x) + Ei
1875
+ x
1876
+ � T
1877
+ 0
1878
+ F(t, ωt)dt
1879
+ i = 1, 2,
1880
+ which gives (47).
1881
+
1882
+ References
1883
+ [1] D. Adams, Weighted nonlinear potential theory, Trans. Amer. Math. Soc. 297 (1986), 73-94.
1884
+ [2] R. J. Bagby, Lebesgue spaces of parabolic potentials, Illinois J. Math. 15 (1971), 610-634.
1885
+ [3] R. Bass and Z.-Q. Chen, Brownian motion with singular drift. Ann. Probab., 31 (2003), 791-817.
1886
+ [4] L. Beck, F. Flandoli, M. Gubinelli and M. Maurelli, Stochastic ODEs and stochastic linear PDEs with
1887
+ critical drift:
1888
+ regularity, duality and uniqueness. Electr. J. Probab., 24 (2019), Paper No. 136, 72 pp
1889
+ (arXiv:1401.1530).
1890
+ [5] Z.-Q. Chen, P. Kim and R. Song, Dirichlet heat kernel estimates for fractional Laplacian with gradient per-
1891
+ turbation, Ann. Prob., 40 (2012), 2483-2538.
1892
+ [6] F. Chiarenza and M. Frasca, A remark on a paper by C. Fefferman, Proc. Amer. Math. Soc., 108 (1990),
1893
+ 407-409.
1894
+ [7] C. Fefferman, The uncertainty principle, Bull. Amer. Math. Soc. 9 (1983), 129-206.
1895
+ [8] J. Garcia-Guevra and J. L. Rubio de Francia, Weighted Norm Inequalities and Related Topics, Elsevier,
1896
+ 1985.
1897
+ [9] V.R. Gopala Rao, A characterization of parabolic function spaces, Amer. J. Math., 99 (1977), 985-993.
1898
+ [10] A. Gulisashvili and J.A. van Casteren, Non-autonomous Kato Classes and Feynman-Kac Propagators, World
1899
+ Scientific, 2006.
1900
+ [11] D. Kinzebulatov, Feller evolution families and parabolic equations with form-bounded vector fields, Osaka
1901
+ J. Math., 54 (2017), 499-516 (arXiv:1407.4861).
1902
+ [12] D. Kinzebulatov, A new approach to the Lp-theory of −∆ + b · ∇, and its applications to Feller processes
1903
+ with general drifts, Ann. Sc. Norm. Sup. Pisa (5), 17 (2017), 685-711 (arXiv:1502.07286).
1904
+
1905
+ PARABOLIC EQUATIONS AND SDES WITH TIME-INHOMOGENEOUS MORREY DRIFT
1906
+ 25
1907
+ [13] D.Kinzebulatov and K.R.Madou, Stochastic equations with time-dependent singular drift, J. Differential
1908
+ Equations, 337 (2022), 255-293 (arXiv:2105.07312).
1909
+ [14] D. Kinzebulatov and Yu. A. Semënov, On the theory of the Kolmogorov operator in the spaces Lp and C∞,
1910
+ Ann. Sc. Norm. Sup. Pisa (5) 21 (2020), 1573-1647 (arXiv:1709.08598).
1911
+ [15] D. Kinzebulatov and Yu.A. Semënov, Brownian motion with general drift, Stoch. Proc. Appl., 130 (2020),
1912
+ 2737-2750 (arXiv:1710.06729).
1913
+ [16] D. Kinzebulatov and Yu. A. Semënov, Feller generators and stochastic differential equations with singular
1914
+ (form-bounded) drift, Osaka J. Math., 58 (2021), 855-883 (arXiv:1904.01268).
1915
+ [17] D. Kinzebulatov and Yu. A. Semënov, Sharp solvability for singular SDEs, Preprint, arXiv:2110.11232 (2021).
1916
+ [18] D. Kinzebulatov,
1917
+ Yu. A. Semënov
1918
+ and
1919
+ R. Song,
1920
+ Stochastic
1921
+ transport
1922
+ equation
1923
+ with
1924
+ singular
1925
+ drift,
1926
+ Ann. Inst. Henri Poincaré (B) Probab. Stat., accepted for publication (arXiv:2102.10610).
1927
+ [19] V. F. Kovalenko and Yu. A. Semënov, C0-semigroups in Lp(Rd) and C∞(Rd) spaces generated by differential
1928
+ expression ∆ + b · ∇. (Russian) Teor. Veroyatnost. i Primenen., 35 (1990), 449-458; translation in Theory
1929
+ Probab. Appl. 35 (1990), 443-453.
1930
+ [20] N. V. Krylov, On diffusion processes with drift in Ld, Probab. Theory Related Fields, 179 (2021), 165-199
1931
+ (arXiv:2001.04950).
1932
+ [21] N. V. Krylov, On strong solutions of Itô’s equations with A ∈ W 1,d, Preprint, arXiv:2007.060401.
1933
+ [22] N.V. Krylov, On strong solutions of Itô’s equations with Dσ and b in Morrey class containing Ld, Preprint,
1934
+ arXiv:2111.13795.
1935
+ [23] N.V. Krylov, On strong solutions of time inhomogeneous Itô’s equations with “supercritical” diffusion and
1936
+ drift. Preprint, arXiv:2207.03626.
1937
+ [24] N.V. Krylov, On parabolic Adams’s, the Chiarenza-Frasca theorems, and some other results related to para-
1938
+ bolic Morrey spaces, Mathematics in Engineering, 5(2) (2022), 1-20 (arXiv:2110.09555).
1939
+ [25] N. V. Krylov and M. Röckner. Strong solutions of stochastic equations with singular time dependent drift.
1940
+ Probab. Theory Related Fields, 131 (2005), 154-196.
1941
+ [26] A. J. Majda and P. R. Kramer, Simplified models for turbulent diffusion: theory, numerical modelling, and
1942
+ physical phenomena, Physics Reports 314 (1999), 237-574.
1943
+ [27] K. Nam, Stochastic differential equations with critical drifts. Stoch. Proc. Appl., 130 (2020), 5366-5393
1944
+ (arXiv:1802.00074).
1945
+ [28] N. I. Portenko, Generalized Diffusion Processes. AMS, 1990.
1946
+ [29] M. Röckner and G. Zhao, SDEs with critical time dependent drifts: weak solutions, Bernoulli, 29 (2023),
1947
+ 757-784 (arXiv:2012.04161).
1948
+ [30] M. Röckner
1949
+ and
1950
+ G. Zhao,
1951
+ SDEs
1952
+ with
1953
+ critical
1954
+ time
1955
+ dependent
1956
+ drifts:
1957
+ strong
1958
+ solutions,
1959
+ Preprint,
1960
+ arXiv:2103.05803.
1961
+ [31] A.Yu. Veretennikov and N.V. Krylov, On explicit formulas for solutions of stochastic equations. Matematich-
1962
+ eski Sbornik, 111 (1980), 434-452 in Russian, English translation in Math. USSR-Sbornik, 39 (1981), 387-403.
1963
+ [32] J. Wei, G. Lv, and J.-L. Wu. On weak solutions of stochastic differential equations with sharp drift coefficients.
1964
+ Preprint arXiv:1711.05058.
1965
+ [33] P. Xia, L. Xie, X. Zhang and G. Zhao, Lq(Lp)-theory of stochastic differential equations, Stoch. Proc. Appl.
1966
+ 130 (2020), 5188-5211 (arXiv:1908.01255).
1967
+ [34] X. Zhang, Stochastic homeomorphism flows of SDEs with singular drifts and Sobolev diffusion coefficients,
1968
+ Electr. J. Prob., 16 (2011), 1096-1116.
1969
+ [35] X. Zhang, Strong solutions of SDEs with singular drift and Sobolev diffusion coefficients, Stoch. Proc. Appl.,
1970
+ 115(11) (2005), 1805-1818.
1971
+ [36] X. Zhang, Stochastic differential equations with Sobolev diffusion and singular drift and applications, Ann.
1972
+ Appl. Probab., 26(5) (2016), 2697-2732.
1973
+ [37] G. Zhao, Stochastic Lagrangian flows for SDEs with rough coefficients, Preprint, arXiv:1911.05562.
1974
+ Email address: damir.kinzebulatov@mat.ulaval.ca
1975
+
1976
+ 26
1977
+ D. KINZEBULATOV
1978
+ Université Laval, Département de mathématiques et de statistique, Québec, QC, Canada
1979
+
_NFST4oBgHgl3EQfdDhQ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
aNE3T4oBgHgl3EQfdAo0/content/2301.04530v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0b3e3deb0f82da9b911906a924b65f9da45568b44d13665c4f2fdd8a8a58ba9f
3
+ size 482160
aNE3T4oBgHgl3EQfdAo0/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9febab169952d582e87f0dbc339e4251aa02197cd41087d5ac24332ef4a3ceaa
3
+ size 287396