jackkuo commited on
Commit
fa1a0c0
·
verified ·
1 Parent(s): da2aaf8

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9FST4oBgHgl3EQfczg_/content/tmp_files/2301.13804v1.pdf.txt +1120 -0
  2. -9FST4oBgHgl3EQfczg_/content/tmp_files/load_file.txt +0 -0
  3. .gitattributes +5 -0
  4. 39FST4oBgHgl3EQfZTjC/content/tmp_files/2301.13791v1.pdf.txt +0 -0
  5. 39FST4oBgHgl3EQfZTjC/content/tmp_files/load_file.txt +0 -0
  6. 49E1T4oBgHgl3EQfmQS7/content/tmp_files/2301.03296v1.pdf.txt +1074 -0
  7. 49E1T4oBgHgl3EQfmQS7/content/tmp_files/load_file.txt +512 -0
  8. 5dE3T4oBgHgl3EQfQgnL/content/tmp_files/2301.04414v1.pdf.txt +2473 -0
  9. 5dE3T4oBgHgl3EQfQgnL/content/tmp_files/load_file.txt +0 -0
  10. 5dE4T4oBgHgl3EQfbwyA/content/tmp_files/2301.05077v1.pdf.txt +2127 -0
  11. 5dE4T4oBgHgl3EQfbwyA/content/tmp_files/load_file.txt +0 -0
  12. 9NFQT4oBgHgl3EQf5jYf/content/tmp_files/2301.13435v1.pdf.txt +2217 -0
  13. 9NFQT4oBgHgl3EQf5jYf/content/tmp_files/load_file.txt +0 -0
  14. AtAyT4oBgHgl3EQf3_qJ/content/tmp_files/2301.00779v1.pdf.txt +1333 -0
  15. AtAyT4oBgHgl3EQf3_qJ/content/tmp_files/load_file.txt +0 -0
  16. CdAyT4oBgHgl3EQf4fpA/content/tmp_files/2301.00786v1.pdf.txt +904 -0
  17. CdAyT4oBgHgl3EQf4fpA/content/tmp_files/load_file.txt +502 -0
  18. D9E2T4oBgHgl3EQf9gn9/content/tmp_files/2301.04230v1.pdf.txt +0 -0
  19. D9E2T4oBgHgl3EQf9gn9/content/tmp_files/load_file.txt +0 -0
  20. DdE1T4oBgHgl3EQfqAWA/content/tmp_files/2301.03338v1.pdf.txt +0 -0
  21. DdE1T4oBgHgl3EQfqAWA/content/tmp_files/load_file.txt +0 -0
  22. HtE3T4oBgHgl3EQfuQsq/content/tmp_files/2301.04682v1.pdf.txt +1280 -0
  23. HtE3T4oBgHgl3EQfuQsq/content/tmp_files/load_file.txt +0 -0
  24. I9FAT4oBgHgl3EQfux7Z/vector_store/index.faiss +3 -0
  25. JNE0T4oBgHgl3EQfSABV/content/tmp_files/2301.02215v1.pdf.txt +2029 -0
  26. JNE0T4oBgHgl3EQfSABV/content/tmp_files/load_file.txt +0 -0
  27. KdAyT4oBgHgl3EQfsflO/content/tmp_files/2301.00577v1.pdf.txt +1610 -0
  28. KdAyT4oBgHgl3EQfsflO/content/tmp_files/load_file.txt +0 -0
  29. KtE1T4oBgHgl3EQfGgOV/content/tmp_files/2301.02915v1.pdf.txt +1056 -0
  30. KtE1T4oBgHgl3EQfGgOV/content/tmp_files/load_file.txt +0 -0
  31. L9FIT4oBgHgl3EQfbiuW/content/tmp_files/2301.11262v1.pdf.txt +0 -0
  32. L9FIT4oBgHgl3EQfbiuW/content/tmp_files/load_file.txt +0 -0
  33. MdFLT4oBgHgl3EQfNC8e/content/tmp_files/2301.12018v1.pdf.txt +1073 -0
  34. MdFLT4oBgHgl3EQfNC8e/content/tmp_files/load_file.txt +0 -0
  35. MtFAT4oBgHgl3EQfxh5M/content/tmp_files/2301.08687v1.pdf.txt +1494 -0
  36. MtFAT4oBgHgl3EQfxh5M/content/tmp_files/load_file.txt +0 -0
  37. N9AzT4oBgHgl3EQfWfwG/content/tmp_files/2301.01300v1.pdf.txt +463 -0
  38. N9AzT4oBgHgl3EQfWfwG/content/tmp_files/load_file.txt +408 -0
  39. T9E1T4oBgHgl3EQfIQOS/content/tmp_files/2301.02937v1.pdf.txt +3270 -0
  40. T9E1T4oBgHgl3EQfIQOS/content/tmp_files/load_file.txt +0 -0
  41. T9E3T4oBgHgl3EQfEQll/content/tmp_files/2301.04294v1.pdf.txt +4073 -0
  42. T9E3T4oBgHgl3EQfEQll/content/tmp_files/load_file.txt +0 -0
  43. TNFAT4oBgHgl3EQf2R4K/content/2301.08713v1.pdf +3 -0
  44. TdE4T4oBgHgl3EQfmQ04/content/tmp_files/2301.05166v1.pdf.txt +0 -0
  45. TdE4T4oBgHgl3EQfmQ04/content/tmp_files/load_file.txt +0 -0
  46. WNAyT4oBgHgl3EQfu_m7/content/2301.00624v1.pdf +3 -0
  47. WtE4T4oBgHgl3EQfNAys/content/tmp_files/2301.04953v1.pdf.txt +1596 -0
  48. WtE4T4oBgHgl3EQfNAys/content/tmp_files/load_file.txt +0 -0
  49. Y9AzT4oBgHgl3EQfKvuz/content/tmp_files/2301.01103v1.pdf.txt +1167 -0
  50. Y9AzT4oBgHgl3EQfKvuz/content/tmp_files/load_file.txt +0 -0
-9FST4oBgHgl3EQfczg_/content/tmp_files/2301.13804v1.pdf.txt ADDED
@@ -0,0 +1,1120 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13804v1 [cs.GT] 31 Jan 2023
2
+ Fairness in the Assignment Problem with Uncertain Priorities∗
3
+ Zeyu Shen†
4
+ Zhiyi Wang∗
5
+ Xingyu Zhu∗
6
+ Brandon Fain∗
7
+ Kamesh Munagala∗
8
+ Abstract
9
+ In the assignment problem, a set of items must be allocated to unit-demand agents who ex-
10
+ press ordinal preferences (rankings) over the items. In the assignment problem with priorities,
11
+ agents with higher priority are entitled to their preferred goods with respect to lower priority
12
+ agents. A priority can be naturally represented as a ranking and an uncertain priority as a
13
+ distribution over rankings. For example, this models the problem of assigning student appli-
14
+ cants to university seats or job applicants to job openings when the admitting body is uncertain
15
+ about the true priority over applicants. This uncertainty can express the possibility of bias in
16
+ the generation of the priority ranking. We believe we are the first to explicitly formulate and
17
+ study the assignment problem with uncertain priorities. We introduce two natural notions of
18
+ fairness in this problem: stochastic envy-freeness (SEF) and likelihood envy-freeness (LEF). We
19
+ show that SEF and LEF are incompatible and that LEF is incompatible with ordinal efficiency.
20
+ We describe two algorithms, Cycle Elimination (CE) and Unit-Time Eating (UTE) that satisfy
21
+ ordinal efficiency (a form of ex-ante Pareto optimality) and SEF; the well known random serial
22
+ dictatorship algorithm satisfies LEF and the weaker efficiency guarantee of ex-post Pareto op-
23
+ timality. We also show that CE satisfies a relaxation of LEF that we term 1-LEF which applies
24
+ only to certain comparisons of priority, while UTE satisfies a version of proportional allocations
25
+ with ranks. We conclude by demonstrating how a mediator can model a problem of school
26
+ admission in the face of bias as an assignment problem with uncertain priority.
27
+ 1
28
+ Introduction
29
+ Consider a motivating example of the assignment problem where a number of university admission
30
+ slots (the items) must be assigned to student applicants (the agents). The university slots could be
31
+ at a single university or several. Applicants might have preferences over different universities, or
32
+ might have preferences over different slots at the same university (for example, some slots might be
33
+ associated with merit-based financial aid, or include admission to particular academic programs).
34
+ Applicants are unit-demand, meaning they only need to be assigned a single slot (and derive no
35
+ benefit from being assigned multiple).
36
+ Most university systems employ some form of priority-based admissions; this can be expressed
37
+ through a ranking over applicants. For example, a priority might rank applicants by standardized
38
+ exam scores, or perhaps by some more complex holistic assessment. Given any deterministic priority
39
+ (a ranking), one might naturally solve the assignment problem using the serial dictatorship rule,
40
+ so that students choose their most preferred remaining university slot one at a time in order of
41
+ ∗This work is supported by NSF grant CCF-2113798.
42
+ †Computer
43
+ Science
44
+ Department,
45
+ Duke
46
+ University,
47
+ Durham,
48
+ NC
49
+ 27708-0129.
50
+ Email:
51
+ {zeyu.shen,zhiyi.wang,xingyu.zhu}@duke.edu, {btfain,kamesh}@cs.duke.edu.
52
+ 1
53
+
54
+ their standardized exam score. Indeed, systems roughly like this are employed in several countries
55
+ around the world such as the Indian Institutes of Technology [13].
56
+ Despite the appeal of such a simple and ostensibly fair system, there is reason to suspect that
57
+ any scoring or ranking system is based on imperfect noisy signals of the true underlying priority
58
+ (whatever that might be). For example, an applicant A scoring 1 point higher on a standardized
59
+ exam or holistic assessment than another applicant B is not, in general, 100% more likely to be a
60
+ better student than B. Even more worryingly, studies show that standardized exam performance is
61
+ closely related to demographic factors such as race and income [8], leading to uncertainty based on
62
+ social bias and inequality in addition to random noise like whether one had a good breakfast the day
63
+ of an exam. More holistic assessments are further vulnerable to the well documented phenomenon
64
+ of implicit bias against historically marginalized groups [5]. Ignoring these uncertainties may result
65
+ in arbitrary decisions (deterministically preferring one applicant over another when the comparison
66
+ is unclear and noisy) and systemic discrimination against historically marginalized groups.
67
+ Previous work has attempted to solve the second problem of bias without explicitly modeling
68
+ an uncertain priority by adapting the so-called “Rooney Rule” [15, 7]. There are variations, but
69
+ roughly speaking these methods reserve a number of “minority” spots and prioritize this many
70
+ “minority” applicants in some serial dictatorship assignment. This approach can lead to fairness
71
+ gerrymandering [14] by which structured subgroups remain disadvantaged. In particular, Rooney
72
+ Rule style approaches are predicated on a single binary distinction of the applicant population into
73
+ “majority” (or privileged) and “minority” (or disadvantaged) applicants. But in reality, applicant
74
+ identity is multidimensional (race, gender, income, disability, first language, etc.) and bias can
75
+ compound along intersections. In fact, it is perfectly plausible that the vast majority of applicants
76
+ are disadvantaged (that is, suffer from bias leading to underestimation of their priority) along
77
+ one or more dimensions of identity, though not all to the same extent.
78
+ In addition to group
79
+ identity, there may sometimes be uncertainties related to the priority of individual applicants,
80
+ unique circumstances that merit accounting.
81
+ For these reasons, we consider the more general problem that takes as input an uncertain
82
+ priority, expressed as a probability distribution over rankings of applicants. The generality of the
83
+ input to our algorithms ensures that a decision maker can fully model the complexity of uncertainty
84
+ and bias inherent in the creation of a priority. This modeling problem is outside the scope of this
85
+ paper, though we do provide an example for our experiments in Section 6. Rather, our emphasis
86
+ is on the question of characterizing fairness and efficiency given a random priority, and providing
87
+ algorithms to compute random assignments that satisfy these desiderata.
88
+ 1.1
89
+ Contributions
90
+ We study an extension of the random assignment problem [6, 18, 2] in which a decision maker must
91
+ allocate a number of items to unit-demand agents in a way that is consistent with an uncertain
92
+ priority represented as a distribution over rankings of the agents. To the best of our knowledge,
93
+ we are the first to characterize this more general problem.
94
+ In general we want to compute a random assignment that is simultaneously efficient with respect
95
+ to agent preferences over the items and fair with respect to the agent priorities. Ordinal efficiency
96
+ (OE) [6] generalizes the concept of Pareto efficiency to the case of a random assignment. Our main
97
+ contribution is to characterize two alternative notions of fairness for the random assignment problem
98
+ with uncertain priorities in Section 3.
99
+ The first notion, which we call stochastic envy-freeness
100
+ (SEF), guarantees that any agent whose priority first-order stochastically dominates another agent’s
101
+ 2
102
+
103
+ priority should prefer their own (random) assignment to that of the other agent. The second notion,
104
+ which we call likelihood envy-freeness (LEF), guarantees that the likelihood (over the random
105
+ assignment) that an agent prefers the assignment of another should be at most the likelihood (over
106
+ the uncertain priority) that the latter agent has higher priority than the former.
107
+ We introduce additional notions that helps more finely distinguish between algorithms that
108
+ satisfy one of the above notions. The first is a relaxation of LEF called 1-LEF that holds only when
109
+ an agent has higher priority than another with probability 1. The next is ranked proportionality
110
+ (PROP), where the allocation of any agent should stochastically dominate the allocation where
111
+ she gets her i-th preferred item with probability pi if she herself is ranked at position i with that
112
+ probability.
113
+ Formal definitions are provided in Section 3. We provide illustrative examples of these concepts
114
+ as well as justification for why multiple definitions of fairness might be appropriate in Section 3.3.
115
+ In Section 4 we show that it is impossible to guarantee OE and LEF simultaneously.
116
+ We
117
+ also show that it is impossible to guarantee SEF and LEF simultaneously. Given this, we focus
118
+ on achieving OE and SEF. In Section 5 we describe two algorithms: Unit-time Eating (UTE) and
119
+ Cycle Elimination (CE). We show that both of these algorithms satisfy OE and SEF. To more finely
120
+ distinguish between these algorithms, we show that CE also satisfies the relaxed 1-LEF property,
121
+ while UTE satisfies PROP. We also show that any algorithm achieving OE cannot achieve PROP
122
+ and 1-LEF simultaneously, so that we cannot achieve a super-set of the properties achieved by
123
+ these algorithms.
124
+ It is straightforward to observe that the well known Random Serial Dictatorship (RSD) that
125
+ samples a priority from Σ and then uses the serial dictatorship satisfies LEF, PROP, and is ex-post
126
+ Pareto efficient, though it does not satisfy OE [6]. We obtain a nearly complete characterization of
127
+ achievable subsets of our efficiency and fairness properties, as shown in Table 1.
128
+ Algorithm
129
+ OE
130
+ SEF
131
+ LEF
132
+ 1-LEF
133
+ PROP
134
+ RSD
135
+
136
+
137
+
138
+ UTE (new)
139
+
140
+
141
+
142
+ CE (new)
143
+
144
+
145
+
146
+ Table 1: Summary of fairness properties achieved.
147
+ In Section 6 we return to a consideration of our motivating application of biased school ad-
148
+ missions. We provide a practical example modeling an uncertain priority in the presence of bias
149
+ and compare our CE and UTE algorithms with previous approaches to address bias using “Rooney
150
+ Rule” style approaches [15, 7].
151
+ 1.2
152
+ Related Work
153
+ Random Assignment.
154
+ There is a large body of work studying the problem of random assign-
155
+ ment with no priority (or, in our framework, when the priority is uniform). The work of [1] proposed
156
+ a random serial dictatorship mechanism, which draws an ordering of agents uniformly at random
157
+ and let them choose items in that order, and showed that this mechanism is ex-post efficient. The
158
+ work of [23] observed that though random serial dictatorship is fair, it is not efficient when the
159
+ agents are endowed with Von Neumann-Morgenstern preferences over lotteries. The work of [6]
160
+ 3
161
+
162
+ introduced a notion of efficiency that is stronger than ex-post efficiency, namely ordinal efficiency,
163
+ and showed that random serial dictatorship is not ordinally efficient. They proposed the probabilis-
164
+ tic serial rule that is ordinally efficient. Moreover, probabilistic serial is (stochastically) envy-free
165
+ while random serial dictatorship is not. The work of [2] studied the relationship between ex-post
166
+ efficiency and ordinal efficiency, showing that a lottery induces an ordinally efficient random as-
167
+ signment if and only if each subset of the full support of the lottery is undominated (in a specific
168
+ sense).
169
+ Subsequent works investigated natural extensions of the canonical setup. The work of [18] con-
170
+ sidered the problem of random assignment in the case where agents can opt out, and characterised
171
+ probabilistic serial by ordinal efficiency, envy-freeness, strategyproofness, and equal treatment of
172
+ equals in this setting. The work of [10] studied the notion of rank efficiency, which maximises the
173
+ number of agents matched to their first choices.
174
+ Fair Ranking.
175
+ The assignment problem with priority is closely related to the subset selection
176
+ problem that has been studied extensively as a problem in fair ranking [15, 16, 19, 7, 9, 17, 12]
177
+ where the goal is to optimize some latent measure of utility for the algorithm designer subject to
178
+ group fairness constraints on the resulting ranking. Recent work considers explicitly modeling the
179
+ uncertainty from bias when estimating a ranking based on observed utilities [22], similar to our
180
+ approach in modeling an uncertain priority. Our work differs from the fair ranking literature in that
181
+ we study a more general assignment problem in which agents may not all have the same preferences
182
+ over items. Of course, one can always translate a given ranking into an assignment by employing
183
+ the serial dictatorship rule, but this need not be ordinally efficient [6]. Instead, we formulate our
184
+ desiderata more explicitly in the wider context of the assignment problem itself.
185
+ Two-sided matching.
186
+ School choice problems are often studied in the context of two-sided
187
+ matching, where applicants have preferences over schools and schools have preferences over ap-
188
+ plicants.
189
+ For example, the deferred acceptance algorithm (and its extensions) calculates stable
190
+ matchings and has been extensively studied and deployed in the real world [11, 20, 21, 4, 3]. Our
191
+ problem is different in two ways. First, the “items” in our problem (eg., school seats) share a single
192
+ common priority over applicants, so the notion of stability simply means no applicant of lower
193
+ priority is assigned an item preferred by an agent of higher priority. However, our setting is more
194
+ complex in the second sense: The shared priority is uncertain, and the assignment will be random,
195
+ requiring an extension of existing fairness properties and algorithms.
196
+ 2
197
+ Preliminaries
198
+ We are given n unit demand agents A = {1, 2, . . . , n} and a set of m items I. We assume without
199
+ loss of generality that m ≥ n (if not, one can create additional “dummy” items that are least
200
+ preferred by all agents). We write a ≻i b to denote that agent i prefers item a to item b. Each
201
+ agent has ordinal preferences represented as a total order over I, that is, for every agent i we have
202
+ a permutation πi : I → {1, . . . , n} such that πi(a) < πi(b) if and only if a ≻i b.1
203
+ 1In general, results extend trivially to the case where agents may have objective indifferences between items,
204
+ meaning that if any agent is indifferent between two items then all agents are indifferent between those items.
205
+ However, our results do not necessarily extend straightforwardly if agents have subjective indifferences, see [6].
206
+ 4
207
+
208
+ A simple priority over agents is a permutation σ : A → {1, . . . , n} where σ(i) < σ(j) means that
209
+ i has higher priority than j. A random priority is a probability distribution over simple priorities
210
+ which we denote as Σ = {(σk, ρk)} where each σk is a simple priority, ρk ≥ 0, and �
211
+ k ρk = 1.
212
+ A simple assignment is a matching f : A → I. A lottery is a probability distribution over simple
213
+ assignments which we denote as L = {(fk, pk)} where each fk is a simple assignment, pk ≥ 0, and
214
+
215
+ k pk = 1.
216
+ Following [6], we call a probability distribution over [m] itself a random allocation to an agent.
217
+ It is important to note that agents have ordinal preferences over deterministic items which only
218
+ induces a partial order over random allocations. That is, given πi, it may be unclear whether i
219
+ would prefer one random allocation to another. We denote by P = {pij} a random assignment,
220
+ the n by m matrix where Pi, the i-th row, is agent i’s random allocation, and where �
221
+ i pij = 1
222
+ for all columns j. In general, a random assignment P can be induced by one or more lotteries, the
223
+ existence of which is guaranteed by the Birkhoff-von Neumann Theorem, but a particular lottery
224
+ induces a unique random assignment P.
225
+ In the assignment problem with uncertain priorities we are given a random priority Σ and agent
226
+ preferences {πi} and we must compute a random assignment.
227
+ 3
228
+ Desiderata
229
+ In this section we introduce the normative properties that an algorithm for the random assignment
230
+ with uncertain priorities problem should satisfy. Broadly speaking, these desiderata require that
231
+ the algorithm be efficient with respect to agent preferences and fair with respect to agent priorities.
232
+ 3.1
233
+ Efficiency
234
+ A simple assignment f is Pareto efficient (or Pareto optimal) if it is not dominated by any other
235
+ simple assignment, which simply means that there is no alternative such that no agent is worse off
236
+ and at least one agent is better off.
237
+ Definition 1 (Pareto Efficiency). A simple assignment f is Pareto efficient if for all simple as-
238
+ signments g one of the following holds: (i) ∃i ∈ A such that f(i) ≻i g(i), or (ii) g(i) ⊁ f(i) for all
239
+ i ∈ [n].
240
+ A lottery L is ex-post Pareto efficient if every simple assignment in the support of L (i.e., every
241
+ simple assignment fk with pk > 0) is Pareto efficient.
242
+ A stronger efficiency property for a random assignment is ordinal efficiency (OE) [6]. To define
243
+ ordinal efficiency we must first define the notion of stochastic dominance.
244
+ Definition 2 (Stochastic Domination). A probability distribution X stochastically dominates an-
245
+ other distribution Y under permutation π (denoted X ≻sd
246
+ π Y ) if for all t ∈ {1, . . . , n} it holds that
247
+ �t
248
+ r=1 Xπ−1(r) ≥ �t
249
+ r=1 Yπ−1(r), where π−1 is the inverse permutation. A random assignment P is
250
+ stochastically dominated by a random assignment Q ̸= P if the random allocation induced by Q
251
+ stochastically dominates the random allocation induced by P under preferences πi for every agent
252
+ i ∈ [n].
253
+ Note that this implies the following: If random assignment Q stochastically dominates random
254
+ assignment P, then every agent prefers Q to P under any Von Neumann-Morgenstern utility func-
255
+ tion consistent with their ordinal preferences. Now we can define ordinal efficiency, following [6].
256
+ 5
257
+
258
+ Definition 3 (Ordinal Efficiency, OE). We say that a random assignment P is ordinally efficient
259
+ if it is not stochastically dominated by any other random assignment.
260
+ At a high level, a random assignment is ordinally efficient if there is no other random assignment
261
+ that is better for all agents and all utility functions consistent with their ordinal preferences. The
262
+ property is not trivial: Some natural algorithms such as random serial dictatorship are Pareto
263
+ efficient but not ordinally efficient.
264
+ 3.2
265
+ Fairness
266
+ We define fairness in terms of envy. We say that one agent envies another if the former prefers
267
+ the item assigned to the latter. Envy of a lower priority agent constitutes a justified complaint
268
+ against an assignment; ideally we would like to compute an envy-free assignment with respect to
269
+ the priority.
270
+ Definition 4 (Envy-Freeness). We say that a simple assignment f is envy-free with respect to a
271
+ simple priority σ if for all i, j ∈ [n], σ(i) < σ(j) =⇒ f(i) ≻i f(j).
272
+ However, it is immediately evident that it is impossible to compute a single simple assignment
273
+ that is envy-free in this sense for every simple priority in the support of a random priority (for
274
+ example, if there are two agents with uncertain priority who both prefer the same item). Instead,
275
+ we need to compute a random assignment so that each agent is fairly treated ex-ante (for example,
276
+ so that each agent has a fair probability of receiving the preferred good).
277
+ There are two natural ways to generalize the concept of envy to a random assignment with a
278
+ random priority. One is to imagine that one agent envies another if the random allocation of the
279
+ latter stochastically dominates that of the former under the former’s ordinal preferences. Envy of
280
+ this type forms a justified complaint if the envying agent also stochastically dominates the envied
281
+ agent in terms of the random priority. More formally,
282
+ Definition 5 (Stochastic Envy-Freeness, SEF). Consider a random assignment P generated under
283
+ a random priority Σ. Let Si be the probability distribution over [n] induced by Σ for agent i, that
284
+ is, for r ∈ [n], Sir = �
285
+ k:σk(i)=r ρk.
286
+ Let σ∗ be the identity permutation, i.e., σ∗(i) = i.
287
+ P is
288
+ stochastically envy-free (SEF) with respect to Σ if for all i, j ∈ [n], Si ≻sd
289
+ σ∗ Sj =⇒ Pi ≻sd
290
+ πi Pj.
291
+ Loosely speaking, the implication of stochastic envy-freeness can be read as “if agent i probably
292
+ has higher priority than j then i should prefer their random allocation to j’s under all utility
293
+ functions consistent with i’s ordinal preferences.”
294
+ A second way to generalize envy is by considering the likelihood of envy (in the simple sense)
295
+ with respect to a lottery inducing a given random assignment. Envy of this type is justified if the
296
+ likelihood of agent i envying another agent j is greater than the likelihood over the random priority
297
+ that i has lower priority than agent j. We call a random assignment likelihood envy-free if there is
298
+ a lottery which induces it and has no envy of this kind.
299
+ Definition 6 (Likelihood Envy-Freeness, LEF). A random assignment P satisfies likelihood envy-
300
+ freeness (LEF) under Σ if P can be induced by a lottery L such that for all i, j ∈ [n], Prσ∼Σ[σ(i) <
301
+ σ(j)] ≤ Prf∼L[f(i) ≻i f(j)].
302
+ In other words, LEF means that an agent i who is ℓ-likely to have higher priority than another
303
+ agent j should be at least ℓ-likely to prefer their assigned item to j’s.
304
+ 6
305
+
306
+ We say an algorithm satisfies OE (resp. SEF, LEF) if it always produces random assignment
307
+ that satisfies OE (resp. SEF, LEF). As we show in Section 4, it is not possible to guarantee SEF
308
+ and LEF simultaneously.
309
+ 3.3
310
+ Relationship between LEF and SEF
311
+ The relationship between SEF and LEF is subtle; neither implies the other and it is not immediately
312
+ evident which is the “better” or more “natural” fairness property. We present two examples to
313
+ illustrate that an assignment satisfying only one of SEF and LEF might still be unfair, so that both
314
+ properties are useful competing notions of fairness, and neither is strictly stronger than the other.
315
+ We first present an example which shows that an assignment that satisfies SEF can be unfair.
316
+ Consider n = 2 agents and m = 2 items which we label a, b for clarity. Both agents prefer a to b,
317
+ and the random priority is simply Σ = {(σ, 1)} with σ(1) < σ(2), i.e. agent 1 has higher priority
318
+ than agent 2 with probability 1. In this setup, allocating 1
319
+ 2 unit of a and b to both agent yields
320
+ an assignment that satisfies SEF. However, this assignment is clearly unfair, because even though
321
+ agent 1 has higher priority than agent 2, they are getting the same assignment. Notice that this
322
+ assignment does not satisfy LEF. In this instance, LEF could be used to characterize how much
323
+ one agent is prioritized over the other.
324
+ The next example shows that an assignment that only satisfies LEF can also be unfair. Consider
325
+ n = 2 agents and m = 100 items which we label i1, . . . , i100 for clarity. The preferences of both
326
+ agents are i1 ≻ · · · ≻ i100. The random priority is given by Σ = {(σ1, 1
327
+ 2), (σ2, 1
328
+ 2)} with σ1(1) < σ1(2)
329
+ and σ2(2) < σ2(1). In other words, both agents have the same priority. In this setup, allocating
330
+ 1
331
+ 2 unit of i1 and 1
332
+ 2 unit of i100 to agent 1 and 1
333
+ 2 unit of i99 and 1
334
+ 2 unit of i100 to agent 2 yields
335
+ an assignment that satisfies LEF. Notice that this assignment can be induced by a lottery L =
336
+ {(f1, 1
337
+ 2), (f2, 1
338
+ 2)} where f1(1) = i1, f1(2) = i100, f2(1) = i100, f2(2) = i99. However, this assignment
339
+ is clearly unfair, because even though the two agents have the same priority, agent 1 gets a strictly
340
+ better assignment than agent 2.
341
+ This shows that LEF alone has limitations as well, and the
342
+ appropriate concept here is SEF.
343
+ The above examples show that SEF and LEF provide reasonable competing notions of fairness.
344
+ When combined with the efficiency notion of OE, we will show in Section 4 that LEF and OE
345
+ are incompatible. If OE is replaced by the weaker notion of Pareto-efficiency, then it is easy to
346
+ check that random serial dictatorship (RSD), which simply samples a priority of agents from the
347
+ distribution and allocates each agent their favorite remaining item in this priority order, satisfies
348
+ LEF2 and pareto efficiency. Thus, in our work, we will focus on the more non-trivial part of finding
349
+ algorithms that satisfy SEF and OE.
350
+ 3.4
351
+ Additional Fairness Criteria
352
+ As we show in Section 5, there can be multiple algorithms that satisfy the same subset of the
353
+ fairness criteria. We therefore consider two additional notions to more finely distinguish between
354
+ them.
355
+ The first criterion is the following relaxation of LEF: If agent i with probability 1 has higher
356
+ priority than another agent j then agent i should certainly (again, with probability 1) not envy j.
357
+ 2To see why RSD satisfies LEF, suppose the random priority is given by Σ = {(σk, ρk)}, then the random
358
+ assignment produced by RSD can be induced by the lottery L = {(fk, ρk)}, where fk is the deterministic assignment
359
+ produced by letting agents successively choose an item based on the order given by σk.
360
+ 7
361
+
362
+ Definition 7 (1-LEF). A random assignment P under random priority Σ satisfies 1-LEF if there
363
+ exists some lottery L which induces P such that for all agents i ̸= j ∈ [n], if Prσ∼Σ[σ(i) < σ(j)] = 1,
364
+ then Prf∼L[f(i) ≻i f(j)] = 1.
365
+ The next criterion is called Ranked Proportionality (PROP), which captures stochastic dom-
366
+ inance over an allocation that matches the probability an agent gets her ith ranked item to the
367
+ probability of she being ranked at position i. Note that if all rankings of agents were equally likely,
368
+ this captures stochastic dominance to an allocation that assigns every item to every agent uniformly
369
+ at random.
370
+ Definition 8 (PROP). Given a random priority Σ = {(σk, ρk)}, we define the baseline allocation
371
+ P i for agent i by P iπ−1
372
+ i
373
+ (r) = Sir = �
374
+ k:σk(i)=r ρk for all r ∈ [n]. In other words, if an agent i ranks
375
+ the r-th in the random priorities with probability p, then we add p fraction of the r-th preferred item
376
+ of agent i to her baseline allocation. For an allocation to satisfy ranked proportionality (PROP),
377
+ it should stochastically dominate this baseline for each agent.
378
+ 4
379
+ Impossibility Results
380
+ In this part, we present several impossibility results. We note that these are existential hardness
381
+ results, not computational. We begin by observing that LEF is incompatible with OE.
382
+ Theorem 1. LEF is incompatible with OE.
383
+ Proof. We present an instance in which no random assignment can satisfy both LEF and OE. There
384
+ are n = 4 agents and m = 4 items which we label a, b, c, d for clarity. Agent preferences are given
385
+ by
386
+ π1, π3 : a ≻ b ≻ c ≻ d,
387
+ π2, π4 : b ≻ a ≻ c ≻ d
388
+ Moreover, we consider the priority Σ = {(σ1, 1
389
+ 2), (σ2, 1
390
+ 2)} where
391
+ σ1(4) < σ1(2) < σ1(3) < σ1(1),
392
+ σ2(3) < σ2(1) < σ2(4) < σ2(2).
393
+ In other words, with probability 1
394
+ 2 under σ1, agent 4 has the highest priority, then agent 2, then
395
+ agent 3, finally agent 1. Similarly for σ2 with probability 1
396
+ 2. Assume for contradiction that there
397
+ exists a random assignment P = [pij], together with a lottery L which induces P, satisfying LEF
398
+ and OE. By definition of LEF, we note that
399
+ Pr
400
+ f∼L[f(3) ≻3 f(1)] ≥ Pr
401
+ σ∼Σ[σ(3) < σ(1)] = 1,
402
+ so it must be that Prf∼L[f(3) ≻3 f(1)] = 1. Thus, we must have p1a = 0, because otherwise there
403
+ would exist a simple assignment in the lottery in which agent 1 is assigned with a and agent 3 is
404
+ assigned with some less preferred item under π3. By the same reasoning, we note that p2b = 0.
405
+ Also by definition of LEF, observe that
406
+ Pr
407
+ f∼L[f(2) ≻2 f(3)] ≥ Pr
408
+ σ∼Σ[σ(2) < σ(3)] = 1
409
+ 2.
410
+ 8
411
+
412
+ This implies p3a < 1, as otherwise we have f(3) = a for all f ∼ L; combined with the fact that
413
+ p2b = 0, we would have f(3) ≻2 f(2) for all f ∼ L, which contradicts Prf∼L[f(2) ≻2 f(3)] ≥ 1
414
+ 2.
415
+ Since p1a = 0, p3a < 1, and �
416
+ i pia = 1, it follows that p2a + p4a > 0. Similarly, we have
417
+ p1b +p3b > 0. Without loss of generality, we assume that p2a > 0 and p1b > 0 (if p4a > 0 or p3b > 0,
418
+ the proof proceeds similarly). Let pmin = min(p2a, p1b); define random assignment Q = [qij] by
419
+ qij =
420
+
421
+
422
+
423
+
424
+
425
+ pij if i /∈ {1, 2} and j /∈ {a, b}
426
+ pij + pmin if (i, j) = (1, a) or (2, b)
427
+ pij − pmin if (i, j) = (1, b) or (2, a)
428
+ We can see that Q stochastically dominates P. In particular, all that is different in Q is that
429
+ agent 1 swaps agent 2 some of agent 2’s allocated probability mass on item a in exchange for an
430
+ equivalent amount of agent 1’s probability mass on item b. Since a ≻1 b and b ≻2 a and nothing else
431
+ changes, agents 1 and 2 prefer Q, and nothing has changed for agents 3 and 4. This contradicts with
432
+ the fact that P satisfies OE. Thus, we can conclude that no random assignment in this instance
433
+ satisfies LEF and OE.
434
+ Theorem 1 can be interpreted as a fundamental tradeoff between efficiency and fairness con-
435
+ ceived as LEF. Next, we show that LEF and SEF are two fundamentally different notions of fairness
436
+ that are incompatible with one another. As we will see later in Section 5, each of LEF and SEF
437
+ independently can be guaranteed. Thus, neither notion of fairness is subsumed by the other.
438
+ Theorem 2. LEF is incompatible with SEF.
439
+ Proof. We present an instance in which no random assignment can satisfy both LEF and SEF.
440
+ There are n = 5 agents and m = 5 items which we label a, b, c, d, e for clarity. Preferences are given
441
+ by
442
+ π1, π3 : a ≻ b ≻ c ≻ d ≻ e,
443
+ π2, π4 : b ≻ a ≻ c ≻ d ≻ e,
444
+ π5 : a ≻ c ≻ b ≻ d ≻ e.
445
+ We consider the priority Σ = {(σ1, 1
446
+ 2), (σ2, 1
447
+ 2)} defined by
448
+ σ1(3) < σ1(5) < σ1(1) < σ1(4) < σ1(2),
449
+ σ2(4) < σ2(5) < σ2(2) < σ2(3) < σ2(1).
450
+ In other words, with probability 1
451
+ 2 under σ1, agent 3 has the highest priority, then agents 5, 1,
452
+ 4, and finally 2. Similarly for σ2.
453
+ Assume for contradiction that there exists a random assignment P = [pij], together with a
454
+ lottery L which induces P, that satisfies LEF and SEF. Since agent 3 always has higher priority
455
+ than agent 1 and agent 3 prefers a over all other items, LEF implies that p1a = 0. Similarly, since
456
+ agent 4 always has higher priority than agent 2 prefers b over all other itmes, LEF implies that
457
+ p2b = 0.
458
+ Recall that Si is the probability density over [n] induced by Σ for agent i and σ∗ is the identity
459
+ permutation. Since S1 ≻sd
460
+ σ∗ S2 by construction and P satisfies (SEF) by assumption, we have
461
+ P1 ≻sd
462
+ π1 P2. Combined with the fact that p1a = 0, we must have p2a = 0. Similarly, p1b = 0.
463
+ 9
464
+
465
+ We next show p1c = p2c = 1
466
+ 2. First, observe that LEF guarantees
467
+ Pr
468
+ f∼L[f(4) ≻4 f(2)] ≥ Pr
469
+ σ∼Σ[σ(4) < σ(2)] = 1,
470
+ Thus, since e is the least preferred item by agent 4, we must have p4e = 0. Also by LEF, we have
471
+ Pr
472
+ f∼L[f(1) ≻1 f(4)] ≥ Pr
473
+ σ∼Σ[σ(1) < σ(4)] = 1
474
+ 2,
475
+ i.e. Prf∼L[f(1) ≻1 f(4)] ≥ 1
476
+ 2. On the other hand, since p4e = 0, the worst item that agent 4 can
477
+ get under π4 is d, so
478
+ Pr
479
+ f∼L[f(1) ≻1 f(4)] ≤ p1a + p1b + p1c = p1c,
480
+ since we earlier found that p1a = p1b = 0.
481
+ Recall Prf∼L[f(1) ≻1 f(4)] ≥
482
+ 1
483
+ 2, we get p1c ≥
484
+ 1
485
+ 2.
486
+ Similarly, we have p2c ≥ 1
487
+ 2. Since �
488
+ i pic = 1, it must be the case that p1c = p2c = 1
489
+ 2. We deduce
490
+ that for any f ∼ L, either f(1) = c or f(2) = c, because on one hand, for any fixed f, we should
491
+ have f(1) ̸= f(2), while on the other hand, p1c + p2c = 1.
492
+ Observe that p5a ≤ 1
493
+ 2. This follows directly from LEF, because
494
+ Pr
495
+ f∼L[f(3) ≻3 f(5)] ≥ Pr
496
+ σ∼Σ[σ(3) < σ(5)] = 1
497
+ 2;
498
+ if p5a > 1
499
+ 2, we would have Prf∼L[f(3) ≻3 f(5)] < 1 − p5a = 1
500
+ 2, leading to contradiction. What’s
501
+ more, we have p5c = 0, since we already have p1c + p2c = 1.
502
+ On one hand, we should have Prf∼L[f(5) ≻5 f(1) and f(5) ≻5 f(2)] = 1, since σi(5) < σi(1) and
503
+ σi(5) < σi(2) for i ∈ {1, 2}; but on the other hand, we have Prf∼L[f(5) ≻5 f(1) and f(5) ≻5 f(2)] ≤
504
+ p5a ≤ 1
505
+ 2, because for any f ∼ L, either f(1) = c or f(2) = c, so f(5) ≻5 f(1) and f(5) ≻5 f(2) if
506
+ and only if f(5) = a. This leads to contradiction. Thus, LEF and SEF are incompatible.
507
+ We finally show that OE, 1-LEF, and PROP are simultaneously incompatible. This will inform
508
+ the design of algorithms in Section 5.
509
+ Lemma 1. There is an instance where no allocation simultaneously satisfies OE, 1-LEF, and
510
+ PROP.
511
+ Proof. We use the instance in the proof of Theorem 1. Since agent 3 is ranked higher than agent
512
+ 1 with probability 1 and since their preferences over items is identical, 1-LEF implies agent 1 is
513
+ allocated item a with probability 0. Now PROP implies agent 1 receives item b with probability at
514
+ least 1/2. By a similar reasoning, agent 2 must get item a with probability at least 1/2. But any
515
+ such allocation cannot be OE, completing the proof.
516
+ 5
517
+ Algorithms
518
+ As we have seen, LEF is a very strong notion of fairness which is incompatible with both OE and
519
+ SEF. In the following, we present two algorithms – cycle elimination (CE) and unit time eating
520
+ (UTE) – that satisfy both OE and SEF. In addition, we show that CE satisfies 1-LEF and UTE
521
+ satisfies PROP. Given Lemma 1, we cannot design an algorithm that achieves OE and both these
522
+ properties.
523
+ 10
524
+
525
+ Therefore, both CE and UTE are reasonable fair allocation algorithms in that they satisfy
526
+ efficiency (OE) and envy-freeness (SEF). The choice of which to implement depends on whether
527
+ we care more about a form of proportionality in the resulting allocation (UTE satisfies PROP) or
528
+ whether we care about additional envy-freeness in a deterministic sense (CE satisfies 1-LEF).
529
+ 5.1
530
+ Cycle Elimination algorithm
531
+ We first introduce a Cycle Elimination algorithm (CE), which works by constructing a directed
532
+ graph based on the random priority, and allocate items based on this graph.
533
+ To begin with, we introduce the Probabilistic Serial rule [6], a continuous algorithm which
534
+ works as follows. Initially, each agent i goes to their favorite item j and starts “eating” it (that is,
535
+ increasing pij) at unit speed. It is possible that several agents eat the same item at the same time.
536
+ Whenever an item is fully eaten, each of the agents eating it goes to their favorite remaining item
537
+ not fully allocated (that is, �
538
+ i pij < 1) and starts eating it in the same way. This process continues
539
+ until all items are consumed, or all the agents are full (that is, �
540
+ j pij = 1). We use PS(A, I) to
541
+ denote the assignment produced by running Probabilistic Serial rule on the set of agents A and
542
+ items I.
543
+ We construct a graph from Σ, which we call a Stochastic-Dominance graph (SD-graph), as
544
+ follows: Start with a graph with n vertices, where the i-th vertex corresponds to the i-th agent.
545
+ For any pair of distinct agents i and j, if Si ≻sd
546
+ σ∗ Sj, then we draw a directed edge from i to j. The
547
+ algorithm is now formally stated in Algorithm 1.
548
+ Algorithm 1: Cycle Elimination, Eliminate(A, I, G)
549
+ Input: Set of agents A, set of items I, SD-graph G;
550
+ Let �G be the condensation3of G;
551
+ Let �
552
+ A be the set of agents that belong to a strongly connected component whose in-degree
553
+ in �G is zero;
554
+ if A = �
555
+ A then
556
+ Output PS(A, I);
557
+ else
558
+ A′ ← A \ �
559
+ A; I′ ← I \ PS( �
560
+ A; I); G′ ← G \ �
561
+ A;
562
+ Output PS( �
563
+ A, I) + Eliminate(A′, I′, G′);
564
+ end
565
+ Analysis.
566
+ Our main result is the following theorem.
567
+ Theorem 3. The Cycle Elimination algorithm satisfies OE, SEF, and 1-LEF. It runs in O(n3 +
568
+ nm + n|Σ|) time.
569
+ Proof. Theorem 1 in [6] states that any simultaneous eating algorithm where each agent always
570
+ eats from her favorite remaining item satisfies OE. Hence, CE satisfies OE.
571
+ 3Condensation of a graph is a directed acyclic graph formed by contracting each strongly connected component
572
+ to a single vertex.
573
+ 11
574
+
575
+ To show SEF, fix two agents i and j, and assume Si ≻sd
576
+ σ∗ Sj. Let P be the random assignment
577
+ produced by CE. We show that Pi ≻sd
578
+ πi Pj. Since Si ≻sd
579
+ σ∗ Sj, there exists an edge from i to j
580
+ in the SD-graph. Thus, i and j either belong to the same strongly connected component, or the
581
+ strongly connected component of i has higher topological order than that of j’s. Either way, we
582
+ have Pi ≻sd
583
+ πi Pj, from which we can conclude that CE satisfies SEF.
584
+ To show 1-LEF, fix two agents i and j, and assume Prσ∼Σ[σ(i) < σ(j)] = 1.
585
+ Let P be
586
+ the random assignment produced by CE. We show that, for any lottery L inducing P, we have
587
+ Prf∼L[f(i) ≻i f(j)] = 1. We use proof by contradiction. Assume that there exists a lottery L0
588
+ which induces P such that Prf∼L0[f(i) ≻i f(j)] < 1. This implies that there exists two items a
589
+ and b such that a ≻i b, pib > 0 and pja > 0. On the other hand, since Prσ∼Σ[σ(i) < σ(j)] = 1,
590
+ so we have Si ≻sd
591
+ σ∗ Sj; thus, the strongly connected component that agent i belongs to must have
592
+ higher topological order than that of j’s. By CE, agent j could start eating only when agent i is
593
+ completely full. Thus, pja > 0 implies that there is still item a remaining when agent i finishes
594
+ eating; this leads to contradiction, because a ≻i b implies that i could eat a instead of b. Therefore,
595
+ we must have Prf∼L[f(i) ≻i f(j)] = 1 for all lotteries L which induces P, from which we can
596
+ conclude that CE satisfies 1-LEF.
597
+ To show the running time, preprocessing Σ in order to compute the stochastic dominance
598
+ relation between agents takes O(n|Σ| + n3) time. Constructing the SD-graph by the stochastic
599
+ dominance relation between agents takes O(n2) time, as there are
600
+ �n
601
+ 2
602
+
603
+ pair of agents. Given the
604
+ SD-graph, running CE takes O(nm) time. This is because we only need to consider at most m
605
+ time points: the time at which each item is eaten up. We divide this process into m time intervals.
606
+ During each time interval, each agent keeps eating the same item, so it simply takes O(n) time to
607
+ keep track of the state of each agent, and the running time over m intervals is O(nm). Hence, the
608
+ total running time is O(n3 + nm + n|Σ|).
609
+ 5.2
610
+ Unit-time Eating Algorithm
611
+ We next introduce the Unit-time Eating Algorithm (UTE). Recall that Σ = {(σk, ρk)}. Essentially,
612
+ the algorithm works by dividing the time into n units, each of duration one; in time unit t, the t-th
613
+ ranked agent in σk eats their favorite item among those left over at rate ρk for all k. The procedure
614
+ is formally stated in Algorithm 2.
615
+ Algorithm 2: Unit-time Eating Algorithm
616
+ for t = 1, . . . , n do
617
+ The t-th ranked agent in each σk eats their favorite item among those left over at rate
618
+ ρk for all (σk, ρk) ∈ Σ;
619
+ end
620
+ Analysis.
621
+ We show the following theorem.
622
+ Theorem 4. The Unit-time Eating Algorithm satisfies OE, SEF, and PROP. Further, it runs in
623
+ O(n2|Σ| + nm) time.
624
+ Proof. By Theorem 1 in [6], we have UTE satisfies OE.
625
+ 12
626
+
627
+ To show SEF, fix two agents i and j; assume that Si ≻sd
628
+ σ∗ Sj. Let P be the random assignment
629
+ produced by UTE, we show that Pi ≻sd
630
+ πi Pj. Let tk be the time when item π−1
631
+ i
632
+ (k) has been eaten
633
+ up. Fix some k ∈ [m]; because Si ≻sd
634
+ σ∗ Sj, we have
635
+ ⌊tk⌋
636
+
637
+ t=1
638
+ Sit ≥
639
+ ⌊tk⌋
640
+
641
+ t=1
642
+ Sjt
643
+ and
644
+ ⌈tk⌉
645
+
646
+ t=1
647
+ Sit ≥
648
+ ⌈tk⌉
649
+
650
+ t=1
651
+ Sjt
652
+ Combining these gives
653
+
654
+ tk − ⌊tk⌋
655
+
656
+ Si⌈tk⌉ +
657
+ ⌊tk⌋
658
+
659
+ t=1
660
+ Sit ≥
661
+
662
+ tk − ⌊tk⌋
663
+
664
+ Sj⌈tk⌉ +
665
+ ⌊tk⌋
666
+
667
+ t=1
668
+ Sjt.
669
+ (1)
670
+ Observe that
671
+ k
672
+
673
+ r=1
674
+ Piπ−1
675
+ i
676
+ (r) =
677
+
678
+ tk − ⌊tk⌋
679
+
680
+ Si⌈tk⌉ +
681
+ ⌊tk⌋
682
+
683
+ t=1
684
+ Sit,
685
+ k
686
+
687
+ r=1
688
+ Pjπ−1
689
+ i
690
+ (r) ≤
691
+
692
+ tk − ⌊tk⌋
693
+
694
+ Sj⌈tk⌉ +
695
+ ⌊tk⌋
696
+
697
+ t=1
698
+ Sjt,
699
+ which gives �k
700
+ r=1 Piπ−1
701
+ i
702
+ (r) ≥ �k
703
+ r=1 Pjπ−1
704
+ i
705
+ (r). Because this holds for all k ∈ [m], we conclude that
706
+ Pi ≻sd
707
+ πi Pj. Hence, UTE satisfies SEF.
708
+ To show PROP, fix some agent i. Suppose the allocation produced by UTE for this agent is Pi,
709
+ and the baseline allocation for this agent is P i. We will show that Pi ≻sd
710
+ πi P i. Let tk be the time
711
+ when item π−1
712
+ i
713
+ (k) has been eaten. Fix some k ∈ [m]. Clearly, we have tk ≥ k, because in order to
714
+ eat up π−1
715
+ i
716
+ (k), we have to eat up π−1(r) for all r < k. We observe that
717
+ k
718
+
719
+ r=1
720
+ Piπ−1
721
+ i
722
+ (r) =
723
+
724
+ tk − ⌊tk⌋
725
+
726
+ Si⌈tk⌉ +
727
+ ⌊tk⌋
728
+
729
+ t=1
730
+ Sit.
731
+ Combined with tk ≥ k, we have
732
+ k
733
+
734
+ r=1
735
+ Piπ−1
736
+ i
737
+ (r) ≥
738
+ k
739
+
740
+ t=1
741
+ Sit =
742
+ k
743
+
744
+ r=1
745
+ P iπ−1
746
+ i
747
+ (r).
748
+ Because this holds for all k ∈ [m], we conclude that that Pi ≻sd
749
+ πi P i, and hence UTE satisfies PROP.
750
+ To show running time, preprocessing Σ to obtain the eating speed of each agent in each unit
751
+ time interval takes O(n2|Σ|) time. Then, running UTE takes O(nm) time, as we similarly only
752
+ need to consider at most m time points and keeping track of the state of each agent in each time
753
+ interval takes O(n) time. Therefore, the total running time is O(n2|Σ| + nm).
754
+ 6
755
+ Generating Random Priorities and Empirical Results
756
+ In this section, we will demonstrate how one could obtain random priorities in practical settings
757
+ using an example of school admission under implicit bias. In several environments based on such
758
+ 13
759
+
760
+ generative model, we will compare our proposed algorithms, namely Cycle Elimination (CE) and
761
+ Unit-time Eating (UTE), with other common bias mitigating allocation algorithms such as “the
762
+ Rooney Rule” [7]. We empirically demonstrate that all existing algorithms induce stochastic envy.
763
+ To show this, using the same notation as in Definition 5, we say a pair of agents i and j form a
764
+ stochastic envy pair if Zi ≻sd
765
+ σ∗ Zj but Pi ⊁sd
766
+ πi Pj, and we will count the number of stochastic envy
767
+ pairs produced by each algorithm.
768
+ 6.1
769
+ Random Priority in School Admission
770
+ Consider a group of N students, including n disadvantaged students with indices {1, . . . , n} and
771
+ N − n advantaged students with indices {n + 1, . . . , N}.
772
+ Suppose that they are competing for
773
+ admission priorities of ℓ schools with capacities c1, . . . , cℓ ∈ N that �ℓ
774
+ i=1 ci = N, in which process
775
+ disadvantaged students are subjected to implicit bias on their capability. We will quantify the effect
776
+ of implicit bias in the experiments. This is equivalent to allocating N items to N agents, where
777
+ items correspond to seats, and the agents’ preferences are their school choices.
778
+ Denote the j-th seat of school i as sij, then the set of seats is S ≜ �ℓ
779
+ i=1{si1, si2, . . . , sici}. For
780
+ any ordinal preference �π : [ℓ] → [ℓ] over the schools, it induces an ordinal preference π : S → [N]
781
+ over the seats such that for any sij ∈ S, π(sij) = j + �
782
+ k:�π(k)<�π(i) ck. In other words, if a student
783
+ prefers school a to school b, then all seats of school a are preferred over the seats of school b. For the
784
+ seats in the same school, smaller indices are preferred. In the following, we describe how random
785
+ priorities over students are generated.
786
+ For each student, we assign a “capability score” xi that is drawn from the same distribution
787
+ D, and students with higher capability score should have higher priority. Moreover, assume every
788
+ student from the disadvantaged group is subjected to a multiplicative implicit bias bi, which is
789
+ independently sampled from some distribution B. A disadvantaged student with capability score
790
+ xi is perceived to have a biased score �xi ≜ bixi. We will also consider additive bias �xi ≜ xi + bi in
791
+ our experiments. The admission committee make decisions based on the perceived scores (which
792
+ are biased for disadvantaged students and equal to the true scores for advantaged students).
793
+ For each experiment, we fix a set of unbiased capability scores {xi}N
794
+ i=1 for the students, where
795
+ xi
796
+ iid
797
+ ∼ D. Then, we take n bias parameters {bi}n
798
+ i=1 independently from B. The perceived scores of
799
+ the students are {�x1, . . . , �xn, xn+1, . . . , xN}, where �xi = bixi. Now imagine we are the admission
800
+ committee. We know B, D, and the perceived scores of the students. The goal is to approximately
801
+ recover the underlying true scores of the students. To do this, we compute a posterior distribution
802
+ for the bias factor of each disadvantaged student given B, the biased score of this student, and
803
+ D. Concretely, the density of the posterior distribution for the bias factor of the ith disadvantaged
804
+ student, which we denote by bi, is fbi(b) =
805
+ fB(b)fD(�xi/b)
806
+ � ∞
807
+ 0
808
+ fB(u)fD(�xi/u)du. Given {bi}n
809
+ i=1, we independently
810
+ draw q sets of bias parameters for disadvantaged students, where we denote the jth set of bias
811
+ parameters as {b(j)
812
+ i }n
813
+ i=1, i.e. b(j)
814
+ i
815
+ iid
816
+ ∼ bi. Let the ordinal relationship induced by {b(j)
817
+ i }n
818
+ i=1 be σ(j).
819
+ We consider the random priority {(σ(j), 1
820
+ q)}q
821
+ j=1. We denote the random priority induced by q sets
822
+ of bias parameters as Σ(q).
823
+ 6.2
824
+ Algorithms for Comparison
825
+ To compare with CE and UTE, we consider four alternative solutions to the allocation problem
826
+ under implicit bias. Fix a set of biased scores {�x1, . . . , �xn, xn+1, . . . , xN}, let �σ denote its induced
827
+ 14
828
+
829
+
830
+ β
831
+ N
832
+ RN
833
+ R
834
+ RR
835
+ CE
836
+ UTE
837
+ 0.2
838
+ 3.4
839
+ 0
840
+ 3.4
841
+ 10
842
+ 0
843
+ 0
844
+ 1
845
+ 0.5
846
+ 1.2
847
+ 0
848
+ 1.2
849
+ 10
850
+ 0
851
+ 0
852
+ 0.8
853
+ 0.6
854
+ 0
855
+ 0.6
856
+ 10
857
+ 0
858
+ 0
859
+ 0.2
860
+ 14.3
861
+ 42.8
862
+ 2.6
863
+ 3.8
864
+ 0
865
+ 0
866
+ 2
867
+ 0.5
868
+ 14.5
869
+ 42.8
870
+ 1.0
871
+ 3.8
872
+ 0
873
+ 0
874
+ 0.8
875
+ 19.7
876
+ 42.8
877
+ 0.6
878
+ 3.8
879
+ 0
880
+ 0
881
+ 0.2
882
+ 88.8
883
+ 175.7
884
+ 1.6
885
+ 2.5
886
+ 0
887
+ 0
888
+ 3
889
+ 0.5
890
+ 98.9
891
+ 175.7
892
+ 0.7
893
+ 2.5
894
+ 0
895
+ 0
896
+ 0.8
897
+ 103.5
898
+ 175.7
899
+ 0.4
900
+ 2.5
901
+ 0
902
+ 0
903
+
904
+ β
905
+ N
906
+ RN
907
+ R
908
+ RR
909
+ CE
910
+ UTE
911
+ 0.2
912
+ 7.0
913
+ 0
914
+ 15.4
915
+ 25.4
916
+ 0
917
+ 0
918
+ 1
919
+ 0.5
920
+ 7.3
921
+ 0
922
+ 6.2
923
+ 36.9
924
+ 0
925
+ 0
926
+ 0.8
927
+ 7.8
928
+ 0
929
+ 2.8
930
+ 42.2
931
+ 0
932
+ 0
933
+ 0.2
934
+ 38.2
935
+ 36.2
936
+ 11.2
937
+ 16.8
938
+ 0
939
+ 0
940
+ 2
941
+ 0.5
942
+ 37.0
943
+ 38.3
944
+ 4.5
945
+ 22.9
946
+ 0
947
+ 0
948
+ 0.8
949
+ 37.4
950
+ 39.6
951
+ 2.2
952
+ 25.6
953
+ 0
954
+ 0
955
+ 0.2
956
+ 156.2
957
+ 183.3
958
+ 7.3
959
+ 9.8
960
+ 0
961
+ 0
962
+ 3
963
+ 0.5
964
+ 141.4
965
+ 200.5
966
+ 3.4
967
+ 12.6
968
+ 0
969
+ 0
970
+ 0.8
971
+ 127.6
972
+ 205.5
973
+ 1.9
974
+ 15.5
975
+ 0
976
+ 0
977
+ Figure 1: Number of stochastic envy pairs under multiplicative bias (left) and additive bias (right).
978
+ ordinal relationship. For a deterministic priority σ over the students and ordinal preferences Π ≜
979
+ {πi}i∈[N] of students over the seats, let GS(σ, Π) denote the deterministic assignment produced by
980
+ the Gale-Shapley algorithm [11] which produces a stable matching between students and seats.
981
+ The algorithms that we compare with are as follows:
982
+ 1. Naive Stable Matching (N) takes deterministic priority �σ and returns the assignment PN(�σ, Π) ≜
983
+ GS(�σ, Π).
984
+ 2. Random Naive Stable Matching (RN) takes the random priority Σ(q) = {(σi, pi)}q
985
+ i=1 and
986
+ outputs a lottery based on (N), namely {(PN(σi, Π), pi)}q
987
+ i=1.
988
+ 3. Rooney Stable Matching (R) takes in the deterministic priority �σ as input. Using the Rooney
989
+ constraint in Theorem 3.3 of [7], it creates a new priority �σR.
990
+ We present this formally
991
+ in Algorithm 3.
992
+ Using �σR, Rooney Stable Matching returns the assignment PR(�σR, Π) ≜
993
+ GS(�σR, Π).
994
+ 4. Random Rooney Stable Matching (RR) takes the random priority Σ(q) = {(σi, pi)}q
995
+ i=1 and
996
+ outputs a lottery based on (R), namely {(PR(σi, Π), pi)}q
997
+ i=1.
998
+ 6.3
999
+ Prevalence of Stochastic Envy
1000
+ We now demonstrate that with random priority induced by the generative model described in
1001
+ Section 6.1, stochastic envy exists for the bias mitigating algorithms N, RN, R, RR.
1002
+ 15
1003
+
1004
+ Algorithm 3: Proportional Rooney-rule-like Constraint [7]
1005
+ Let A, B be the ordered sub-sequences of disadvantaged and advantaged candidates in �σ
1006
+ respectively, i.e. p < q ⇐⇒ �σ(A[p]) < �σ(A[q]);
1007
+ i, j ← 0;
1008
+ while i + j < N do
1009
+ if ⌊
1010
+ i
1011
+ i+j ⌋ < n
1012
+ N or �σ(i) < �σ(n + j) then
1013
+ �σR(A[i]) = i + j and i ← i + 1;
1014
+ else
1015
+ �σR(B[j]) = i + j and j ← j + 1;
1016
+ end
1017
+ end
1018
+ return �σR
1019
+ We consider an admission problem with ℓ schools each with ⌊ N
1020
+ ℓ+1⌋ seats. Every student i ∈ [N]
1021
+ has a uniformly random preference order over the ℓ schools. There is also a ”dummy school” with
1022
+ N − ℓ⌊ N
1023
+ ℓ+1⌋ seats representing no admission. Every student prefers seats in the dummy school the
1024
+ least. For seats in the same school, all students have the same preference order. This represents
1025
+ the situation in which schools may distribute educational resources to students based on their rank
1026
+ when admitted.
1027
+ We take N = 35 and n = 10, and experiment with ℓ = 1, 2, 3. For each choice of k, we experiment
1028
+ with β = 0.2, 0.5, 0.8. For multiplicative bias, we take D = Exponential(1) and B = Exponential(β);
1029
+ for additive bias, we take D = Uniform(0, 2) and B = Uniform(0, β). Figure 1 presents the number
1030
+ of stochastic envy pairs for each algorithm averaged over 100 experiments. For each experiment,
1031
+ the random priority is computed with 1000 sets of bias parameters.
1032
+ Except for RN in the one school setting, stochastic envy exists in all other scenarios for N,
1033
+ RN, R, RR. While empirically Rooney-rule-like constraints do significantly reduce the number of
1034
+ stochastic envy pairs compared to applying no mitigation mechanism at all, we still need CE or
1035
+ UTE to obtain guaranteed SEF.
1036
+ 7
1037
+ Conclusion
1038
+ We conclude with some open questions. First, even though SEF and LEF are incompatible, we
1039
+ do not know whether they can be compatible under certain natural generative assumptions on the
1040
+ random priorities and agent preferences. Second, it is known [6] that OE (and hence CE and UTE)
1041
+ is incompatible with strategyproofness under natural assumptions. However, it is interesting to
1042
+ explore whether SEF alone is also incompatible with strategy-proofness. Finally, can our framework
1043
+ be extended to the scenario where the agent preferences are random as well, i.e. each agent reports
1044
+ a distribution over preferences instead of a deterministic preference?
1045
+ 16
1046
+
1047
+ References
1048
+ [1] Atila Abdulkadiroglu and Tayfun S¨onmez.
1049
+ Random serial dictatorship and the core from
1050
+ random endowments in house allocation problems. Econometrica, 66:689–701, 1998.
1051
+ [2] Atila Abdulkadiroglu and Tayfun S¨onmez. Ordinal efficiency and dominated sets of assign-
1052
+ ments. J. Econ. Theory, 112:157–172, 2003.
1053
+ [3] Atila Abdulkadiro˘glu, Parag A. Pathak, and Alvin E. Roth. The new york city high school
1054
+ match. American Economic Review, 95(2):364–367, May 2005.
1055
+ [4] Atila Abdulkadiro˘glu and Tayfun S¨onmez.
1056
+ School choice: A mechanism design approach.
1057
+ American Economic Review, 93(3):729–747, June 2003.
1058
+ [5] Marianne Bertrand and Sendhil Mullainathan.
1059
+ Are emily and greg more employable than
1060
+ lakisha and jamal? a field experiment on labor market discrimination. American Economic
1061
+ Review, 94(4):991–1013, September 2004.
1062
+ [6] Anna Bogomolnaia and Herv´e Moulin. A new solution to the random assignment problem.
1063
+ Journal of Economic Theory, 100(2):295–328, 2001.
1064
+ [7] L Elisa Celis, Anay Mehrotra, and Nisheeth K Vishnoi.
1065
+ Interventions for ranking in the
1066
+ presence of implicit bias. In Proceedings of the 2020 Conference on Fairness, Accountability,
1067
+ and Transparency, pages 369–380, 2020.
1068
+ [8] Ezekiel Dixon-Roman, Howard Everson, and John Mcardle. Race, poverty and sat scores:
1069
+ Modeling the influences of family income on black and white high school students’ sat perfor-
1070
+ mance. Teachers College Record, 115, 05 2013.
1071
+ [9] Vitalii Emelianov, Nicolas Gast, Krishna P. Gummadi, and Patrick Loiseau. On fair selection
1072
+ in the presence of implicit variance.
1073
+ EC ’20, page 649–675, New York, NY, USA, 2020.
1074
+ Association for Computing Machinery.
1075
+ [10] Clayton R Featherstone. Rank efficiency: Modeling a common policymaker objective. Tech-
1076
+ nical report, The Wharton School, University of Pennsylvania, 2020.
1077
+ [11] David Gale and Lloyd S Shapley.
1078
+ College admissions and the stability of marriage.
1079
+ The
1080
+ American Mathematical Monthly, 69(1):9–15, 1962.
1081
+ [12] David Garc´ıa-Soriano and Francesco Bonchi. Maxmin-fair ranking: Individual fairness under
1082
+ group-fairness constraints. KDD ’21, page 436–446, New York, NY, USA, 2021. Association
1083
+ for Computing Machinery.
1084
+ [13] JEE. Joint entrance examination (2011) report. Technical report, Indian Institutes of Tech-
1085
+ nology, 2011.
1086
+ [14] Michael Kearns, Seth Neel, Aaron Roth, and Zhiwei Steven Wu. Preventing fairness gerry-
1087
+ mandering: Auditing and learning for subgroup fairness. In Jennifer Dy and Andreas Krause,
1088
+ editors, Proceedings of the 35th International Conference on Machine Learning, volume 80 of
1089
+ Proceedings of Machine Learning Research, pages 2564–2572. PMLR, 10–15 Jul 2018.
1090
+ 17
1091
+
1092
+ [15] Jon M. Kleinberg and Manish Raghavan. Selection problems in the presence of implicit bias. In
1093
+ Anna R. Karlin, editor, 9th Innovations in Theoretical Computer Science Conference, ITCS
1094
+ 2018, January 11-14, 2018, Cambridge, MA, USA, volume 94 of LIPIcs, pages 33:1–33:17.
1095
+ Schloss Dagstuhl - Leibniz-Zentrum f¨ur Informatik, 2018.
1096
+ [16] Caitlin Kuhlman, MaryAnn VanValkenburg, and Elke Rundensteiner. Fare: Diagnostics for
1097
+ fair ranking using pairwise error metrics. In The World Wide Web Conference, WWW ’19,
1098
+ page 2936–2942, New York, NY, USA, 2019. Association for Computing Machinery.
1099
+ [17] Anay Mehrotra and L. Elisa Celis. Mitigating bias in set selection with noisy protected at-
1100
+ tributes. In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Trans-
1101
+ parency, FAccT ’21, page 237–248, New York, NY, USA, 2021. Association for Computing
1102
+ Machinery.
1103
+ [18] Herve Moulin and Anna Bogomolnaia. A simple random assignment problem with a unique
1104
+ solution. Economic Theory, 19:623–636, 04 2002.
1105
+ [19] Harikrishna Narasimhan, Andrew Cotter, Maya Gupta, and Serena Wang. Pairwise fairness
1106
+ for ranking and regression.
1107
+ Proceedings of the AAAI Conference on Artificial Intelligence,
1108
+ 34(04):5248–5255, Apr. 2020.
1109
+ [20] Alvin E. Roth. The economics of matching: Stability and incentives. Mathematics of Opera-
1110
+ tions Research, 7(4):617–628, 1982.
1111
+ [21] Alvin E. Roth. The evolution of the labor market for medical interns and residents: A case
1112
+ study in game theory. Journal of Political Economy, 92(6):991–1016, 1984.
1113
+ [22] Ashudeep Singh, David Kempe, and Thorsten Joachims. Fairness in ranking under uncertainty.
1114
+ In M. Ranzato, A. Beygelzimer, Y. Dauphin, P.S. Liang, and J. Wortman Vaughan, editors,
1115
+ Advances in Neural Information Processing Systems, volume 34, pages 11896–11908. Curran
1116
+ Associates, Inc., 2021.
1117
+ [23] Lin Zhou. On a conjecture by gale about one-sided matching problems. Journal of Economic
1118
+ Theory, 52:123–135, 1990.
1119
+ 18
1120
+
-9FST4oBgHgl3EQfczg_/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -196,3 +196,8 @@ SdAyT4oBgHgl3EQfuPmB/content/2301.00609v1.pdf filter=lfs diff=lfs merge=lfs -tex
196
  wdE3T4oBgHgl3EQfOgk_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
197
  YNFQT4oBgHgl3EQfdzaO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
198
  ytE1T4oBgHgl3EQfQwPe/content/2301.03045v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
196
  wdE3T4oBgHgl3EQfOgk_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
197
  YNFQT4oBgHgl3EQfdzaO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
198
  ytE1T4oBgHgl3EQfQwPe/content/2301.03045v1.pdf filter=lfs diff=lfs merge=lfs -text
199
+ TNFAT4oBgHgl3EQf2R4K/content/2301.08713v1.pdf filter=lfs diff=lfs merge=lfs -text
200
+ ptFPT4oBgHgl3EQf7zXe/content/2301.13206v1.pdf filter=lfs diff=lfs merge=lfs -text
201
+ ytE1T4oBgHgl3EQfQwPe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
202
+ WNAyT4oBgHgl3EQfu_m7/content/2301.00624v1.pdf filter=lfs diff=lfs merge=lfs -text
203
+ I9FAT4oBgHgl3EQfux7Z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
39FST4oBgHgl3EQfZTjC/content/tmp_files/2301.13791v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
39FST4oBgHgl3EQfZTjC/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
49E1T4oBgHgl3EQfmQS7/content/tmp_files/2301.03296v1.pdf.txt ADDED
@@ -0,0 +1,1074 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Precise certification of a qubit space
2
+ Tomasz Białecki1, Tomasz Rybotycki2,3, Josep Batle4, Jakub Tworzydło1, and Adam Bednorz1, ∗
3
+ 1Faculty of Physics, University of Warsaw, ul. Pasteura 5, PL02-093 Warsaw, Poland
4
+ 2Systems Research Institute, Polish Academy of Sciences, 6 Newelska Street, PL01-447 Warsaw, Poland
5
+ 3Center for Theoretical Physics, Polish Academy of Sciences,
6
+ Al.
7
+ Lotników 32/46, PL02-668 Warsaw, Poland
8
+ 4CRISP - Centre de Recerca Independent de sa Pobla, 07420 sa Pobla, Balearic Islands, Spain
9
+ We demonstrate an implementation of the precise test of dimension on the qubit, using the
10
+ public IBM quantum computer, using the determinant dimension witness. The accuracy is below
11
+ 10−3 comparing to maximal possible value of the witness in higher dimension. The test involving
12
+ minimal independent sets of preparation and measurement operations (gates) is applied both for
13
+ specific configurations and parametric ones.
14
+ The test is be robust against nonidealities such as
15
+ incoherent leakage and erroneous gate execution. Two of the IBM devices failed the test by more
16
+ than 5 standard deviations, which has no simple explanation.
17
+ I.
18
+ INTRODUCTION
19
+ Physics is an exact science, which is confirmed by pre-
20
+ cise measurements of fundamental constants and estab-
21
+ lishing definition of SI units by precise quantum experi-
22
+ ments [1–6]. Precision is also required from every com-
23
+ puter, also quantum.
24
+ Unfortunately, current quantum
25
+ technologies suffer from inevitable sources of errors, both
26
+ just from mechanical limitations and inseparable physical
27
+ environment. Of course, there are methods to mitigate
28
+ and correct the errors. Such approach relies, however,
29
+ on assumptions about the controllable space of possible
30
+ actions.
31
+ The basic building block of a quantum computer is a
32
+ qubit, a generic two-level system. Since the goal is to
33
+ manipulate accurately many qubits, it is necessary to as-
34
+ certain whether or not the qubit space is reliable, i.e.
35
+ not combined with a larger space. The most promising
36
+ implementations of qubits keep them detuned from en-
37
+ vironment and other states, except for small incoherent
38
+ disturbance.
39
+ On the other hand, the potential contri-
40
+ bution of external states can lead to systematic errors,
41
+ hard to correct. Operations on qubits, gates, realized by
42
+ microwave pulses, suffer from distortions due to nonlin-
43
+ earities of waveform generators [7], so a simple deviation
44
+ of the probability distribution from the theoretical pre-
45
+ diction is not yet a proof of extra space [8]. Therefore,
46
+ to increase the quality of classical and quantum com-
47
+ putation and communication, these systems need precise
48
+ certification, robust against imperfections of physical im-
49
+ plementations.
50
+ The dimension of the quantum space can be checked
51
+ by a dimension witness [9–14]. The construction of the
52
+ witness is based on the two-stage protocol, the initial
53
+ preparation and subsequent final measurement, which are
54
+ chosen from independent sets. The preparation must be
55
+ completed before the start of the measurement. A precise
56
+ ∗Electronic address: Adam.Bednorz@fuw.edu.pl
57
+ witness must be based on equality, i.e. a quantity, which
58
+ is exactly zero up to a certain dimension, and nonzero
59
+ otherwise. Such a good witness test is the linear inde-
60
+ pendence of the specific dichotomic outcome probability
61
+ p(M|N) for the preparation N and measurement M, see
62
+ Fig. 1, tested by a suitable determinant [15–17]. It has
63
+ been been already performed on optical states [18]. It be-
64
+ longs to a family to equality-based tests, like the Sorkin
65
+ equality [19] in the three-slit experiment [20–22] testing
66
+ Born’s rule [23], benchmarking our trust in fundamental
67
+ quantum models and their actual realizations.
68
+ In this paper, we apply the test to several IBM quan-
69
+ tum device. While some results agree with the 2−level
70
+ model, taking a large statistics revealed signature of the
71
+ failure by more than 5 standard deviations. Of course it
72
+ does not immediately mean a larger space but the prob-
73
+ lem needs urgent further investigation to determine the
74
+ cause, which may be also another assumption of the test
75
+ (e.g. lack of independence of the operations).
76
+ II.
77
+ THEORY
78
+ We apply a test of the qubit space d = 2 with the
79
+ witness constructed for p(M|N) = trMN, N = N † ≥ 0,
80
+ trN = 1 and measurement 1 ≥ M = M † ≥ 0. Taking
81
+ 5 preparations Nj, j = 1..5 and 4 measurements Mk,
82
+ k = 1..4.
83
+ Then the determinant W = det p, for the
84
+ 5 × 5 matrix p with entries pkj = p(Mj|Nk) and p5j = 1,
85
+ must be equal to zero if all Nj and Mk are represented
86
+ in the same two-level space. In addition, it remains zero
87
+ also if all preparations and measurements contain some
88
+ constant incoherent leakage term, i.e.
89
+ N ′
90
+ j = Nj + Ne
91
+ and M ′
92
+ k = Mk + Me, with Ne and Me independent of
93
+ j and k and commuting with Nj and Mk. In this way,
94
+ the common leakage to higher states does not affect the
95
+ test [14]. For d = 2 we have W = 0, but d = 3 gives
96
+ maximally 27
97
+
98
+ 2/64 ≃ 0.6 in the real space and ≃ 0.632
99
+ in the complex space [16]. For d = 4 the maximum (real
100
+ and complex) is 212/37 ≃ 1.87. Even higher dimensions
101
+ are saturated by the classical maximum 3.
102
+ arXiv:2301.03296v1 [quant-ph] 9 Jan 2023
103
+
104
+ 2
105
+ The IBM Quantum Experience cloud computing of-
106
+ fers several devices, collections of qubits, which can be
107
+ manipulated by a user-defined set of gates (operations)
108
+ – either single qubit or two-qubit ones, also paramteric.
109
+ One can put barriers (controlling the order of operations)
110
+ or additional resets (nonunitary transition to the ground
111
+ state). The qubits are physical transmons [24], the arti-
112
+ ficial quantum states existing due to interplay of super-
113
+ conductivity (Josephson effect) and capacitance. Due to
114
+ anharmonicity one can limit the working space to two
115
+ states. The decoherence time (mostly environmental) is
116
+ long enough to perform a sequence of quantum opera-
117
+ tions and read out reliable results.
118
+ The ground state |0⟩ can be additionally assured by
119
+ a reset operation.
120
+ Gates are implemented by time-
121
+ scheduled microwave pulses prepared by waveform gen-
122
+ erators and mixers (time 30 − 70ns with sampling at
123
+ 0.222ns), tuned to the drive frequency (energy difference
124
+ between qubit levels) [25] (about 4−5Ghz). The rotation
125
+ Z is not a real pulse, but an realized by an instantaneous
126
+ virtual gate VZ(θ), which adds a rotation between in-
127
+ and out-of-phase components of the next gates [26]. The
128
+ readout is performed another long microwave pulse of
129
+ frequency (different from the drive) to the resonator and
130
+ measuring the populated photons [25, 27].
131
+ In the following, we assume the two-level description
132
+ of the qubits, expecting W = 0 up to statistical er-
133
+ ror.
134
+ Larger deviation would be an evidence that this
135
+ description is inaccurate. The states and operators will
136
+ be can be described either in a two-dimensional Hilbert
137
+ space with basis |0⟩, |1⟩ or in the Bloch sphere with
138
+ V = (v0 + v · σ)/2, with the 3-component Bloch vec-
139
+ tor v and standard Pauli matrices
140
+ σ1 =
141
+
142
+ 0 1
143
+ 1 0
144
+
145
+ , σ2 =
146
+
147
+ 0 −i
148
+ i
149
+ 0
150
+
151
+ , σ3 =
152
+
153
+ 1
154
+ 0
155
+ 0 −1
156
+
157
+ .
158
+ (1)
159
+ Then the initial state |0⟩⟨0| corresponds to the vector
160
+ (0, 0, 1) while n0 = 1 and |n| ≤ 1 and 2 − |m| ≥ m0 ≥
161
+ |m|. A microwave pulse tuned to the interlevel drive fre-
162
+ quency corresponds to parametric gates, π/2 rotations,
163
+ Sγ = Z†
164
+ γSZγ, Zθ =
165
+
166
+ e−iγ/2
167
+ 0
168
+ 0
169
+ eiγ/2
170
+
171
+ ,
172
+ S = RX(π/2) =
173
+
174
+ X =
175
+ 1
176
+
177
+ 2
178
+
179
+ 1
180
+ −i
181
+ −i
182
+ 1
183
+
184
+ ,
185
+ (2)
186
+ in the basis |0⟩, |1⟩ while
187
+ S =
188
+
189
+
190
+ 1 0
191
+ 0
192
+ 0 0 −1
193
+ 0 1
194
+ 0
195
+
196
+ � , Zγ =
197
+
198
+
199
+ cos γ − sin γ 0
200
+ sin γ
201
+ cos γ
202
+ 0
203
+ 0
204
+ 0
205
+ 1
206
+
207
+ � ,
208
+ (3)
209
+ on the Bloch vector, i.e. SγV S†
210
+ γ.
211
+ Physically the experiment is sequence of preparation in
212
+ the state |0⟩, two gates Sα, Sβ for the preparation, two
213
+ gates Sφ, Sθ, and the the readout pulse for the measure-
214
+ ment of the state |0⟩ again, see Fig. 2. There are 5 pairs
215
+ of angles αj, βj to be chosen independently of the 4 pairs
216
+ N
217
+ M
218
+ 1
219
+ 0
220
+ FIG. 1: Preparation and measurement scenario; the state is
221
+ prepared as N and measured by M to give an outcome of
222
+ either 1 or 0.
223
+ |0⟩
224
+
225
+
226
+
227
+
228
+ FIG. 2: The quantum circuit for the dimension test.
229
+ The
230
+ initial state |0⟩ and four gates Sγ, split into preparation and
231
+ measurement stages, are followed by the final dichotomic mea-
232
+ surement
233
+ θk, φk. Then N = SβSα|0⟩⟨0| and M = S†
234
+ φS†
235
+ θ|0⟩⟨0|SθSφ.
236
+ The actual pulse waveform of a sample sequence of gates
237
+ is depicted in Fig. 3.
238
+ III.
239
+ EXPERIMENT
240
+ In a perfect theory, we can predict a probability for
241
+ every choice of α, β, θ, φ. The experimental results can
242
+ differ for a variety of reasons. Firstly, the test is random
243
+ and we have to estimate the error due to finite statistics.
244
+ For T times the experiment is repeated, the variance of
245
+ W can be estimated as
246
+ T⟨W 2⟩ ≃
247
+
248
+ kj
249
+ pkj(1 − pkj)(Adj p)2
250
+ jk,
251
+ (4)
252
+ where Adj is the adjoint matrix (matrix of minors of p,
253
+ with crossed out a given row and column, and then trans-
254
+ 0
255
+ 30
256
+ 60
257
+ 90
258
+ 119
259
+ 149
260
+ Time (ns)
261
+ VZ(2.28)
262
+ VZ(
263
+ 4.37)
264
+ VZ(7.33)
265
+ VZ(
266
+ 1.57)
267
+ D0
268
+ 5.26 GHz
269
+ FIG. 3:
270
+ The actual waveform of the pulse on IBM quan-
271
+ tum computer (nairobi), with four subsequent gates Sγ, with
272
+ γ = α, β, φ, θ, consecutively. The discretization unit time is
273
+ dt = 0.222ns. Driving (level gap) frequency is denoted by D0.
274
+ The light/dark shading corresponds to in-phase/out-of-phase
275
+ amplitude component, respectively. The element VZ(ξ) is a
276
+ zero-duration virtual gate Zξ for subsequent gates SγSδ with
277
+ ξ = γ − δ [26].
278
+
279
+ 3
280
+ posed). Note that the identity p−1 det p = Adjp makes
281
+ no sense here as W = det p = 0 in the limit T → ∞.
282
+ Secondly, the implementation of gates may be not faith-
283
+ ful.
284
+ Our test is capable to take them into account as
285
+ long as the leakage to external states (e.g. |2⟩) is inco-
286
+ herent and does not depend on the parameters α, β, θ, φ.
287
+ Lastly, we have to assume that the pulse does not depend
288
+ on the previous ones. In other words, we can only test
289
+ the combination of assumptions, dimension of the space
290
+ and independence of operations. We have calculated W
291
+ in two ways, (i) determining p for each job and then find-
292
+ ing W (see the values for each job in Fig. 10) and finally
293
+ averaging W, (ii) averaging first p from all jobs and then
294
+ finding W.
295
+ There is no a priori best selection of preparations and
296
+ measurements but they should not lie on a single Bloch
297
+ circle. We decided to make two kinds of tests: (I) two
298
+ special configurations corresponding to either the same
299
+ Bloch vectors for preparation and measurements or max-
300
+ imal ⟨W 2⟩ for a given R; (II) a family of configurations
301
+ with one preparation vector at one of the 5 directions on
302
+ the Bloch circle. In both cases the corresponding Bloch
303
+ vectors are derived explicitly in Appendix A. The sets
304
+ of angles in the case (I) are given in the Table I, and
305
+ the corresponding Bloch vectors are visualized in Fig.
306
+ 4.
307
+ We have run the test on lima and lagos, qubit 0.
308
+ The probability matrix, compared to the ideal expecta-
309
+ tion is depicted in Fig. 5. The deviation from zero and
310
+ the statistical error is given in Fig. 6. The number of
311
+ T = #jobs·#shots·#repetitions. Technically, one sends
312
+ a list of jobs to execute, each job contains up to 300 cir-
313
+ cuits, to be distributed between experiments repeated the
314
+ same number of times. Each circuit is run the number
315
+ of shots. The readout counts for each circuit is the value
316
+ returned after the job execution is accomplished.
317
+ The sets of angles in the case (II) are prepared dif-
318
+ ferently. Four preparations and measurements are fixed
319
+ while the last preparation is parameter-dependent. The
320
+ fixed angles are specified in Table II. The last prepara-
321
+ tion angles are α5 = 2πi/5 = β5 − π/2 for i = 0..4. The
322
+ corresponding Bloch vectors are depicted in Fig. 7. We
323
+ have run the test on nairobi and perth, qubit 0.
324
+ The
325
+ probability matrix, compared to the ideal expectation is
326
+ depicted in Fig. 8. The deviation from zero and the sta-
327
+ tistical error is given in Fig. 9. The deviation from the
328
+ expected 0 is more than 5 standard deviations. The data
329
+ and scripts are available at the public repository [28].
330
+ A.
331
+ Nonidealities
332
+ There are several factors that can affect the correct-
333
+ ness of the experiment. (A) The daily calibration. The
334
+ drive frequency and the gate waveforms are corrected so
335
+ different jobs can rely on different realizations of gates.
336
+ There first order effect of calibrations is cancelled out.
337
+ Nevertheless, we made more detailed estimates on sec-
338
+ ond order effects in Appendix B. Only large, unexpected
339
+ j 1
340
+ 2’
341
+ 3’
342
+ 4’
343
+ 5’
344
+ 2”
345
+ 3”
346
+ 4”
347
+ 5”
348
+ α 0 2π/3 2π/3 4π/3 4π/3
349
+ 0 η − π η + 5π/3 η + π/3
350
+ β 0 π/6 −π/6 π/6 −π/6 π
351
+ 0
352
+ 2π/3
353
+ −2π/3
354
+ k
355
+ 1’
356
+ 2’
357
+ 3’
358
+ 4’
359
+ 1”
360
+ 2”
361
+ 3”
362
+ 4”
363
+ θ 5π/3 5π/3 π/3
364
+ π/3
365
+ π π/2 7π/6 −π/6
366
+ φ 7π/6 5π/6 7π/6 5π/6 0
367
+ π
368
+ 5π/3
369
+ π/3
370
+ TABLE I: The angles for the special two special cases, ’ and
371
+ ”, with η = acos(1/3) and 1=1’=1”.
372
+ FIG. 4: The Bloch vectors for the preparations (red) and
373
+ measurements (blue) corresponding to the angles from Table
374
+ I, top ’ and bottom ”. For the case ’, the four measurement
375
+ direction are identical to four preparations.
376
+ j 1
377
+ 2
378
+ 3
379
+ 4
380
+ α 0 η − π η + 5π/3 η + π/3
381
+ β 0
382
+ 0
383
+ 2π/3
384
+ −2π/3
385
+ k 1
386
+ 2
387
+ 3
388
+ 4
389
+ θ π π/2 7π/6 −π/6
390
+ φ 0
391
+ π
392
+ 5π/3
393
+ π/3
394
+ TABLE II: The angles for the parametric case (II) for prepa-
395
+ rations and measurements 1..4
396
+
397
+ 14
398
+ 1
399
+ 2
400
+ 3
401
+ 4
402
+ ideal k
403
+ 1
404
+ 2
405
+ 3
406
+ 4
407
+ lima k
408
+ 1
409
+ 2
410
+ 3
411
+ 4
412
+ 5
413
+ j′
414
+ 1
415
+ 2
416
+ 3
417
+ 4
418
+ lagos k
419
+ 1
420
+ 2
421
+ 3
422
+ 4
423
+ 5
424
+ j′′
425
+ 0.0
426
+ 0.5
427
+ 1.0
428
+ 0.0
429
+ 0.5
430
+ 1.0
431
+ 0.0
432
+ 0.5
433
+ 1.0
434
+ FIG. 5: Results of the test (I) with probabilities pkj for the an-
435
+ gles from Table I, for lima and lagos, compared to the ideal ex-
436
+ pectation. Lagos: 60 jobs, 32000 shots, 15 repetitions. Lima:
437
+ 521’/194” jobs, 20000 shots, 5 repetitions
438
+ failures could be a problem. (B) Amplitude-dependent
439
+ leakage and distortion of the waveform. The leakage to
440
+ higher states, e.g.
441
+ |2⟩ is small, of the order 10−4 and
442
+ incoherent [8, 14], see details in Appendix C. It is pos-
443
+ sible that distortion of amplitude to the waveform de-
444
+ pends on the rotation angle (phase) but we expect this
445
+ effect to be very small, 10−3, based on the deviations ob-
446
+ served in our previous work, and so the net effect is 10−7.
447
+ (C) Memory of the waveform between successive gates.
448
+ Highly unlikely, a residual voltage amplitude can persist
449
+ up to the next gate. In principle it can be mitigated by
450
+ delay-separated gates if the effect fades out with time.
451
+ (D) Other qubits. They are usually detuned but some
452
+ crosstalk may remain. As in the case of leakage, we ex-
453
+ pect the crosstalk to be incoherent and so irrelevant for
454
+ the witness. As a sanity check we have run simulations,
455
+ using the noise models from nairobi and perth, and no
456
+ significant deviation have been found, see Appendix D.
457
+ lima′
458
+ lima′′
459
+ lagos′
460
+ lagos′′
461
+ 1.5
462
+ 1.0
463
+ 0.5
464
+ 0.0
465
+ 0.5
466
+ 1.0
467
+ 1.5
468
+ 2.0
469
+ ×10
470
+ 4
471
+ FIG. 6: Results of the test (I) the witness W = det p, for the
472
+ angles from Table I, for lima and lagos, with the error given
473
+ by (4). Red – W for p from each job and then averaged, blue
474
+ – p averaged from all jobs to give W.
475
+ FIG. 7: The Bloch vectors for the parametric case (II) with
476
+ fixed preparations (red) and measurements (blue) correspond-
477
+ ing to the angles from Table I, and a parametric preparation
478
+ (green).
479
+ IV.
480
+ DISCUSSION
481
+ A test of linear independence of quantum operations
482
+ reveals subtle deviations, invisible in more crude tests.
483
+ Further tests are necessary to identify the origin of the
484
+ deviations, to exclude e.g. exotic many world/copies the-
485
+ ories [29, 30]. We suggest: (i) an extreme statistics col-
486
+ lected in a relatively short time to avoid corrections due
487
+ to calibrations, (ii) a time separation between gates to ex-
488
+ clude potential overlap of the effects, (iii) a scan through
489
+ a large set of Bloch vectors to maximize the potential
490
+ deviation, (iv) run the test on a single-qubit devices to
491
+ avoid cross-talks. It is also possible to develop more so-
492
+ phisticated tests, with different assumptions, or involv-
493
+ ing different qubits. In any case, a precise diagnostics of
494
+ qubits must become a standard in quantum technologies.
495
+
496
+ 5
497
+ 1
498
+ 2
499
+ 3
500
+ 4
501
+ j
502
+ 1
503
+ 2
504
+ 3
505
+ 4
506
+ k
507
+ theory
508
+ 0
509
+ 1
510
+ 2
511
+ 3
512
+ 4
513
+ i
514
+ j = 5
515
+ 0.0
516
+ 0.5
517
+ 1.0
518
+ 1
519
+ 2
520
+ 3
521
+ 4
522
+ j
523
+ 1
524
+ 2
525
+ 3
526
+ 4
527
+ k
528
+ nairobi
529
+ 0
530
+ 1
531
+ 2
532
+ 3
533
+ 4
534
+ i
535
+ j = 5
536
+ 0.0
537
+ 0.5
538
+ 1.0
539
+ 1
540
+ 2
541
+ 3
542
+ 4
543
+ j
544
+ 1
545
+ 2
546
+ 3
547
+ 4
548
+ k
549
+ perth
550
+ 0
551
+ 1
552
+ 2
553
+ 3
554
+ 4
555
+ i
556
+ j = 5
557
+ 0.0
558
+ 0.5
559
+ 1.0
560
+ FIG. 8: Results of the test (II) with probabilities pkj for the
561
+ angles from Table II, for nairobi and perth, compared to the
562
+ theory expectation. Nairobi/perth: 115/93 jobs, both 100000
563
+ shots and 8 repetitions
564
+ Appendix A: Bloch sphere representations
565
+ Using vectors n to represent the state N = |n⟩⟨n| =
566
+ (ˆ1 + n · σ)/2, we have SαNS†
567
+ α = Nα and S†
568
+ θMSθ = Mθ
569
+ with
570
+ nα =
571
+
572
+
573
+ cos2 α
574
+ − cos α sin α − sin α
575
+ − cos α sin α
576
+ sin2 α
577
+ − cos α
578
+ sin α
579
+ cos α
580
+ 0
581
+
582
+ � n,
583
+ mθ =
584
+
585
+
586
+ cos2 θ
587
+ − cos θ sin θ sin θ
588
+ − cos θ sin θ
589
+ sin2 θ
590
+ cos θ
591
+ − sin θ
592
+ − cos θ
593
+ 0
594
+
595
+ � n,
596
+ (A1)
597
+ For n = m = (0, 0, 1) and m0 = 1, we have Nαβ =
598
+ SβSαNS†
599
+ αS†
600
+ β with
601
+ n′
602
+ αβ = (sin(β − α) cos β, sin(α − β) sin β, − cos(β − α))
603
+ (A2)
604
+ while Mθφ = S†
605
+ φS†
606
+ θMSθSφ wirh
607
+ M θφ = (sin(θ − φ) cos φ, sin(φ − θ) sin φ, − cos(θ − φ)).
608
+ (A3)
609
+ 0
610
+ 1
611
+ 2
612
+ 3
613
+ 4
614
+ −2.5
615
+ −2.0
616
+ −1.5
617
+ −1.0
618
+ −0.5
619
+ 0.0
620
+ nairobi
621
+ ×10−4
622
+ 0
623
+ 1
624
+ 2
625
+ 3
626
+ 4
627
+ 0.0
628
+ 0.5
629
+ 1.0
630
+ 1.5
631
+ 2.0
632
+ 2.5
633
+ 3.0
634
+ 3.5
635
+ perth
636
+ ×10−4
637
+ FIG. 9: Results of the test (II) the witness W = det p, for
638
+ the angles from Table II, for nairobi and perth, with the error
639
+ given by (4). Red – W for p from each job and then averaged,
640
+ blue – p averaged from all jobs to give W.
641
+ 0
642
+ 1
643
+ 2
644
+ 3
645
+ 4
646
+ −1.5
647
+ −1.0
648
+ −0.5
649
+ 0.0
650
+ 0.5
651
+ nairobi
652
+ ×10−4
653
+ 0
654
+ 1
655
+ 2
656
+ 3
657
+ 4
658
+ −0.75
659
+ −0.50
660
+ −0.25
661
+ 0.00
662
+ 0.25
663
+ 0.50
664
+ 0.75
665
+ 1.00
666
+ perth
667
+ ×10−3
668
+ FIG. 10: Results of the test (II) the witness W = det p, for the
669
+ angles from Table II, for nairobi and perth, for individual jobs.
670
+ Two values for nairobi are beyond the picture boundaries,
671
+ (3, 0.0023) and (4, 0.003)
672
+
673
+ 6
674
+ 1
675
+ 2
676
+ 3
677
+ 4
678
+ j
679
+ 1
680
+ 2
681
+ 3
682
+ 4
683
+ k
684
+ nairobi-sim
685
+ 0
686
+ 1
687
+ 2
688
+ 3
689
+ 4
690
+ i
691
+ j = 5
692
+ 0.0
693
+ 0.5
694
+ 1.0
695
+ 1
696
+ 2
697
+ 3
698
+ 4
699
+ j
700
+ 1
701
+ 2
702
+ 3
703
+ 4
704
+ k
705
+ perth-sim
706
+ 0
707
+ 1
708
+ 2
709
+ 3
710
+ 4
711
+ i
712
+ j = 5
713
+ 0.0
714
+ 0.5
715
+ 1.0
716
+ FIG. 11: Results of the simulations of the test (II) with proba-
717
+ bilities pkj for the angles from Table II, for nairobi and perth.
718
+ 0
719
+ 1
720
+ 2
721
+ 3
722
+ 4
723
+ −2
724
+ 0
725
+ 2
726
+ 4
727
+ nairobi-sim
728
+ ×10−5
729
+ 0
730
+ 1
731
+ 2
732
+ 3
733
+ 4
734
+ −8
735
+ −6
736
+ −4
737
+ −2
738
+ 0
739
+ 2
740
+ 4
741
+ 6
742
+ perth-sim
743
+ ×10−5
744
+ FIG. 12: Results of the simulations of the test (II) the witness
745
+ W = det p, for the angles from Table II, for nairobi and perth
746
+ noise models. Note that the two ways of calculation of W
747
+ almost coincide (the blue one covers the red one), which is
748
+ consistent with our explanation of averaged out first order
749
+ difference in Appendix B.
750
+ 0
751
+ 1
752
+ 2
753
+ 3
754
+ 4
755
+ −1.0
756
+ −0.5
757
+ 0.0
758
+ 0.5
759
+ nairobi-sim
760
+ ×10−4
761
+ 0
762
+ 1
763
+ 2
764
+ 3
765
+ 4
766
+ −7.5
767
+ −5.0
768
+ −2.5
769
+ 0.0
770
+ 2.5
771
+ 5.0
772
+ 7.5
773
+ perth-sim
774
+ ×10−4
775
+ FIG. 13: Results of the simulations of the test (II) the witness
776
+ W = det p, for the angles from Table II, for nairobi and perth
777
+ noise models, for individual jobs
778
+ Then the probability matrix elements read
779
+ pkj = TrMkNj = (1 + n · m)/2
780
+ (A4)
781
+ while p5j = 1.
782
+ In this way we can represent the choices used
783
+ in our experiment.
784
+ In the first choice,
785
+ prepara-
786
+ tions n′
787
+ 1 = (0, 0, −1), n′
788
+ 2 = (−
789
+
790
+ 3/2, 1/2, 0), n′
791
+ 3 =
792
+ (−
793
+
794
+ 3/4, −1/4,
795
+
796
+ 3/2), n′
797
+ 4 = (
798
+
799
+ 3/4, −1/4,
800
+
801
+ 3/2), n′
802
+ 5 =
803
+ (
804
+
805
+ 3/2, 1/2, 0) and measurements m′
806
+ k = n′
807
+ k−1. In the sec-
808
+ ond choice, n′′
809
+ 1 = −n′′
810
+ 2 = (0, 0, −1), n′′
811
+ 3 = (2
812
+
813
+ 2, 0, 1/3),
814
+ n′′
815
+ 4,5 = (−
816
+
817
+ 2/3, ∓
818
+
819
+ 2/3, 1/3) and measurements m′′
820
+ 1 =
821
+ (0, 0, 1), m′′
822
+ 2 = (1, 0, 0), m′′
823
+ 3,4 = (−1/2, ∓
824
+
825
+ 3/2, 0).
826
+ For the parametric test we have n1 = (0, 0, 1), n2 =
827
+ (2
828
+
829
+ 2, 0, 1/3), n3,4 = (−
830
+
831
+ 2/3, ∓
832
+
833
+ 2/3, 1/3) while ni
834
+ 5 =
835
+ (− sin(2πi/5), − cos(2πi/5), 0).
836
+ Appendix B: Bounds on daily calibrations
837
+ Suppose that the calibration from job to job can al-
838
+ ter the matrix of probabilities. Assuming that each job
839
+ n = 1..N satisfies W (n) = 0 for probabilities p(n), we
840
+ ask if W for p = �
841
+ n p(n)/N can be nonzero. Suppose
842
+ δp(n) = p(n) − p(0) is small for some reference matrix p(0)
843
+ and |δp(n)
844
+ kj | ≤ ϵ for all kj and some small bound ϵ. Then,
845
+ in the first order of δp we have still W ≃ 0 from expand-
846
+ ing determinant in linear combinations of single columns
847
+
848
+ 7
849
+ p(n) and the rest of columns kept equal p(0). The nonva-
850
+ nishing contribution is of the second order, when replac-
851
+ ing either of two columns by δp(n). Their length is ≤ 2ϵ.
852
+ The last row contains 0 for the replaced columns and 1
853
+ for the rest. Subtracting 1/2 of that row from the other
854
+ rows. The moduli of remaining elements are ≤ 1/2 for
855
+ the length of the remaining 3 columns is ≤
856
+
857
+ 2. From
858
+ Hadamard inequality | det A| ≤ �
859
+ j |Aj| with |Aj being
860
+ the length of the vector (column) Aj of the matrix A,
861
+ we have the upper bound |W| ≤ 80
862
+
863
+ 2ϵ2 as we have 10
864
+ choices of 2 columns out of 5.
865
+ Appendix C: Corrections from higher states
866
+ The generic Hamiltonian, in the basis states |n⟩, n =
867
+ 0, 1, 2, ... (ℏ = 1) reads
868
+ H =
869
+
870
+ n
871
+ ωn|n⟩⟨n| + 2 cos(ωt − θ) ˆV (t)
872
+ (C1)
873
+ with energy ωn eigenstates levels and the external drive
874
+ V at frequency ω and phase shift θ (the second term). In
875
+ principle free parameters ω, θ and ˆV (t) can model a com-
876
+ pletely arbitrary evolution. We can estimate deviations
877
+ by perturbative analysis, setting ω0 = 0, ω1 = ω (reso-
878
+ nance), ω2 = 2ω+ω′ (anharmonicity, i.e. ω′ ≪ ω, in IBM
879
+ about 300Mhz compared to drive frequency ∼ 5GHz).
880
+ The state |2⟩ should give the most significant potential
881
+ contribution. We can incorporate rotation and phase into
882
+ the definition of states, |n⟩ → |n′⟩ = e−in(θ+ωt)|n⟩ so that
883
+ H′ =
884
+
885
+
886
+ 2 cos(ωt − θ)V00
887
+ (1 + e−2i(θ+ωt))V01 (e−i(θ+ωt) + e−3i(θ+ωt))V02
888
+ (1 + e2i(ωt+θ))V10
889
+ 2 cos(ωt + θ)V11
890
+ (1 + e−2i(θ+ωt))V12
891
+ (e−i(θ+ωt) + e3i(ωt+θ))V20
892
+ (1 + e2i(ωt+θ))V21
893
+ 2 cos(ωt + θ)V22 + ω′
894
+
895
+
896
+ (C2)
897
+ Extracting the Rotating Wave Approximation (RWA) part from H′ = HRW A + ∆H,
898
+ HRW A =
899
+
900
+
901
+ 0
902
+ V01
903
+ 0
904
+ V10
905
+ 0
906
+ V12
907
+ 0
908
+ V21
909
+ ω′
910
+
911
+ � ,
912
+ (C3)
913
+ the correction reads
914
+ ∆H =
915
+
916
+
917
+ 2 cos(ωt + θ)V00
918
+ e−2i(θ+ωt)V01
919
+ (e−i(θ+ωt) + e−3i(θ+ωt))V02
920
+ e2i(ωt+θ)V10
921
+ 2 cos(ωt + θ)V11
922
+ e−2i(θ+ωt)V12
923
+ (e−i(θ+ωt) + e3i(ωt+θ))V20
924
+ e2i(ωt+θ)V21
925
+ 2 cos(ωt + θ)V22
926
+
927
+
928
+ (C4)
929
+ Evolution due to RWA has the form
930
+ U(t) = T exp
931
+ � t
932
+ −∞
933
+ HRW A(t′)dt′/i,
934
+ (C5)
935
+ where T means chronological product in Taylor expan-
936
+ sion. Then the 1st order correction to U reads
937
+ ∆U = U(+∞)
938
+
939
+ dtU †(t)∆H(t)U(t)/i
940
+ (C6)
941
+ where the full rotation is U(+∞). All θ-dependent terms
942
+ in ∆H, contain also eiωt, which exponentially damps
943
+ slow-varying expressions. The 2nd order correction reads
944
+ ∆2U = −U(+∞)×
945
+
946
+ dtU †(t)∆H(t)U(t)
947
+ � t
948
+ dt′U †(t′)∆H(t′)U(t′).
949
+ (C7)
950
+ Most of components get damped exponentially, too, ex-
951
+ cept when ∆H(t) contains eikωt and ∆H(t′) contains
952
+ e−ikωt, k = 1, 2, 3, so kθ cancels.
953
+ The nonnegligible
954
+ part of ∆2U is therefore independent of θ giving slowly
955
+ Bloch-Siegert shift [31]. Stroboscopic corrections to RWA
956
+ [32] can be neglected due to a very short sampling time,
957
+ dt = 0.222ns,
958
+ Appendix D: Simulations
959
+ As a cross-check of our test we have run the identical
960
+ programs on IBM simulator of a quantum computer with
961
+ the noise model taken from the real devices perth and
962
+ nairobi. However, in contrast to real devices, the results
963
+ are in agreement with the theory as shown in Figs. 11,
964
+ 12, 13.
965
+ [1] L. Eötvös, D. Pekár, and E. Fekete, Beiträge zum Gesetz
966
+ der Proportionalität von Trägheit and Gravität, Ann.
967
+ Phys. (Berlin) 373, 11, 1922.
968
+
969
+ 8
970
+ [2] T. A. Wagner, S. Schlamminger, J. H. Gundlach, and E.
971
+ G. Adelberger, Torsion-balance tests of the weak equiva-
972
+ lence principle, Class. Quantum Grav., 29:184002, 2012.
973
+ [3] P. Touboul et al., MICROSCOPE Mission: Final Results
974
+ of the Test of the Equivalence Principle, Phys. Rev. Lett.
975
+ 129, 121102 (2022)
976
+ [4] L. Morel, Zh. Yao, P. Clade, S. Guellati-Khelifa, Deter-
977
+ mination of the fine-structure constant with an accuracy
978
+ of 81 parts per trillion, Nature 588, 61 (2020).
979
+ [5] R.L. Workman et al. (Particle Data Group), Review of
980
+ Particle Physics, Prog. Theor. Exp. Phys. 2022, 083C01
981
+ (2022)
982
+ [6] H. Wang, X. Miao, L. Shao, Bounding the photon mass
983
+ with cosmological propagation of fast radio bursts, Phys.
984
+ Lett. B 820, 136596 (2021)
985
+ [7] K. R. Chaves, X. Wu, Y. J. Rosen, J. L. DuBois, Nonlin-
986
+ ear signal distortion corrections through quantum sens-
987
+ ing, Appl. Phys. Lett. 118, 014001 (2021)
988
+ [8] T. Białecki, T. Rybotycki, J. Tworzydło, Born rule as
989
+ a test of the accuracy of a public quantum computer,
990
+ arXiv:2112.07567
991
+ [9] R. Gallego, N. Brunner, C. Hadley, and A. Acin, Device-
992
+ Independent Tests of Classical and Quantum Dimen-
993
+ sions, Phys. Rev. Lett. 105, 230501 (2010)
994
+ [10] M. Hendrych, R. Gallego, M. Micuda, N. Brunner, A.
995
+ Acin, J. P. Torres, Experimental estimation of the di-
996
+ mension of classical and quantum systems, Nat. Phys. 8,
997
+ 588 (2012)
998
+ [11] J. Ahrens, P. Badziag, A. Cabello, and M. Bourennane,
999
+ Experimental Device-independent Tests of Classical and
1000
+ Quantum Dimensionality Nature Phys. 8, 592 (2012).
1001
+ [12] J. Ahrens, P. Badziag, M.Pawlowski, M. Zukowski, M.
1002
+ Bourennane, Experimental Tests of Classical and Quan-
1003
+ tum Dimensions, Phys. Rev. Lett. 112, 140401 (2014)
1004
+ [13] N. Brunner, M. Navascues, and T. Vertesi, Dimension
1005
+ Witnesses and Quantum State Discrimination Phys. Rev.
1006
+ Lett. 110, 150501 (2013)
1007
+ [14] A. Strikis, A. Datta, G. C. Knee, Quantum leakage detec-
1008
+ tion using a model-independent dimension witness, Phys.
1009
+ Rev. A 99, 032328 (2019)
1010
+ [15] J. Bowles, M. T. Quintino, and N. Brunner, Certifying
1011
+ the Dimension of Classical and Quantum Systems in a
1012
+ Prepare-and-Measure Scenario with Independent Devices,
1013
+ Phys. Rev. Lett. 112, 140407 (2014)
1014
+ [16] J. Batle, A. Bednorz, Optimal classical and quantum
1015
+ real and complex dimension witness, Phys. Rev. A 105,
1016
+ 042433 (2022)
1017
+ [17] X. Chen K. Redeker, R. Garthoff, W. Rosenfeld, J.
1018
+ Wrachtrup, and I. Gerhardt, Certified randomness from
1019
+ remote state preparation dimension witness, Phys. Rev.
1020
+ A 103, 042211 (2021)
1021
+ [18] Y.-N. Sun et al., Experimental certification of quan-
1022
+ tum dimensions and irreducible high-dimensional quan-
1023
+ tum systems with independent devices, Optica 7, 1073
1024
+ (2020)
1025
+ [19] R. Sorkin,Quantum mechanics as quantum measure the-
1026
+ ory, Mod. Phys. Lett. A 9, 3119 (1994).
1027
+ [20] U. Sinha, C. Couteau, T. Jennewein, R. Laflamme,and
1028
+ G. Weihs, Ruling out multi-order interference in quantum
1029
+ mechanics, Science 329, 418 (2010);
1030
+ [21] D. K. Park, O. Moussa, and R. Laflamme, Three path
1031
+ interference using nuclear magnetic resonance: A test of
1032
+ the consistency of Born’s rule, New J. Phys. 14, 113025
1033
+ (2012).
1034
+ [22] M.-O. Pleinert, J. von Zanthier, and E. Lutz, Many-
1035
+ particle interference to test Born’s rule, Phys. Rev. Re-
1036
+ search 2, 012051(R) (2020)
1037
+ [23] M. Born, Quantenmechanik der Stossvorgänge, Z. f.
1038
+ Physik 37, 863 (1926)
1039
+ [24] J. Koch, Terri M. Yu, J. Gambetta, A. A. Houck, D.
1040
+ I. Schuster, J. Majer, Alexandre Blais, M. H. Devoret,
1041
+ S. M. Girvin, R. J. Schoelkopf, Charge-insensitive qubit
1042
+ design derived from the Cooper pair box, Phys. Rev. A
1043
+ 76, 042319 (2007)
1044
+ [25] https://qiskit.org/textbook
1045
+ [26] D. C. McKay, C. J. Wood, S. Sheldon, J. M. Chow, J.
1046
+ M. Gambetta, Efficient Z gates for quantum computing
1047
+ Phys. Rev. A 96, 022330 (2017)
1048
+ [27] D. Sank et al., Measurement-Induced State Transitions
1049
+ in a Superconducting Qubit: Beyond the Rotating Wave
1050
+ Approximation, Phys. Rev. Lett. 117, 190503 (2016)
1051
+ [28] European
1052
+ Organization
1053
+ For
1054
+ Nuclear
1055
+ Research
1056
+ and
1057
+ Open
1058
+ AIRE,
1059
+ Zenodo,
1060
+ CERN,
1061
+ 2022,
1062
+ http://doi.org/10.5281/zenodo.7470893
1063
+ [29] R. Plaga, On a possibility to find experimental evidence
1064
+ for the many-worlds interpretation of quantum mechan-
1065
+ ics, Found. Phys. 27, 559 (1997)
1066
+ [30] A. Bednorz, Objective Realism and Joint Measurability in
1067
+ Quantum Many Copies, Ann. Phys. (Berlin), 201800002
1068
+ (2018)
1069
+ [31] F. Bloch and A. Siegert, Magnetic Resonance for Nonro-
1070
+ tating Fields, Phys. Rev. 57, 522 (1940).
1071
+ [32] D. Zeuch, F. Hassler, J. J. Slim, D. P. DiVincenzo, Ex-
1072
+ act rotating wave approximation, Annals of Physics 423,
1073
+ 168327 (2020)
1074
+
49E1T4oBgHgl3EQfmQS7/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,512 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf,len=511
2
+ page_content='Precise certification of a qubit space Tomasz Białecki1, Tomasz Rybotycki2,3, Josep Batle4, Jakub Tworzydło1, and Adam Bednorz1, ∗ 1Faculty of Physics, University of Warsaw, ul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
3
+ page_content=' Pasteura 5, PL02-093 Warsaw, Poland 2Systems Research Institute, Polish Academy of Sciences, 6 Newelska Street, PL01-447 Warsaw, Poland 3Center for Theoretical Physics, Polish Academy of Sciences, Al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
4
+ page_content=' Lotników 32/46, PL02-668 Warsaw, Poland 4CRISP - Centre de Recerca Independent de sa Pobla, 07420 sa Pobla, Balearic Islands, Spain We demonstrate an implementation of the precise test of dimension on the qubit, using the public IBM quantum computer, using the determinant dimension witness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
5
+ page_content=' The accuracy is below 10−3 comparing to maximal possible value of the witness in higher dimension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
6
+ page_content=' The test involving minimal independent sets of preparation and measurement operations (gates) is applied both for specific configurations and parametric ones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
7
+ page_content=' The test is be robust against nonidealities such as incoherent leakage and erroneous gate execution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
8
+ page_content=' Two of the IBM devices failed the test by more than 5 standard deviations, which has no simple explanation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
9
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
10
+ page_content=' INTRODUCTION Physics is an exact science, which is confirmed by pre- cise measurements of fundamental constants and estab- lishing definition of SI units by precise quantum experi- ments [1–6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
11
+ page_content=' Precision is also required from every com- puter, also quantum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
12
+ page_content=' Unfortunately, current quantum technologies suffer from inevitable sources of errors, both just from mechanical limitations and inseparable physical environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
13
+ page_content=' Of course, there are methods to mitigate and correct the errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
14
+ page_content=' Such approach relies, however, on assumptions about the controllable space of possible actions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
15
+ page_content=' The basic building block of a quantum computer is a qubit, a generic two-level system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
16
+ page_content=' Since the goal is to manipulate accurately many qubits, it is necessary to as- certain whether or not the qubit space is reliable, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
17
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
18
+ page_content=' not combined with a larger space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
19
+ page_content=' The most promising implementations of qubits keep them detuned from en- vironment and other states, except for small incoherent disturbance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
20
+ page_content=' On the other hand, the potential contri- bution of external states can lead to systematic errors, hard to correct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
21
+ page_content=' Operations on qubits, gates, realized by microwave pulses, suffer from distortions due to nonlin- earities of waveform generators [7], so a simple deviation of the probability distribution from the theoretical pre- diction is not yet a proof of extra space [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
22
+ page_content=' Therefore, to increase the quality of classical and quantum com- putation and communication, these systems need precise certification, robust against imperfections of physical im- plementations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
23
+ page_content=' The dimension of the quantum space can be checked by a dimension witness [9–14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
24
+ page_content=' The construction of the witness is based on the two-stage protocol, the initial preparation and subsequent final measurement, which are chosen from independent sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
25
+ page_content=' The preparation must be completed before the start of the measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
26
+ page_content=' A precise ∗Electronic address: Adam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
27
+ page_content='Bednorz@fuw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
28
+ page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
29
+ page_content='pl witness must be based on equality, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
30
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
31
+ page_content=' a quantity, which is exactly zero up to a certain dimension, and nonzero otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
32
+ page_content=' Such a good witness test is the linear inde- pendence of the specific dichotomic outcome probability p(M|N) for the preparation N and measurement M, see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
33
+ page_content=' 1, tested by a suitable determinant [15–17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
34
+ page_content=' It has been been already performed on optical states [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
35
+ page_content=' It be- longs to a family to equality-based tests, like the Sorkin equality [19] in the three-slit experiment [20–22] testing Born’s rule [23], benchmarking our trust in fundamental quantum models and their actual realizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
36
+ page_content=' In this paper, we apply the test to several IBM quan- tum device.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
37
+ page_content=' While some results agree with the 2−level model, taking a large statistics revealed signature of the failure by more than 5 standard deviations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
38
+ page_content=' Of course it does not immediately mean a larger space but the prob- lem needs urgent further investigation to determine the cause, which may be also another assumption of the test (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
39
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
40
+ page_content=' lack of independence of the operations).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
41
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
42
+ page_content=' THEORY We apply a test of the qubit space d = 2 with the witness constructed for p(M|N) = trMN, N = N † ≥ 0, trN = 1 and measurement 1 ≥ M = M † ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
43
+ page_content=' Taking 5 preparations Nj, j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
44
+ page_content='.5 and 4 measurements Mk, k = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
45
+ page_content='.4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
46
+ page_content=' Then the determinant W = det p, for the 5 × 5 matrix p with entries pkj = p(Mj|Nk) and p5j = 1, must be equal to zero if all Nj and Mk are represented in the same two-level space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
47
+ page_content=' In addition, it remains zero also if all preparations and measurements contain some constant incoherent leakage term, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
48
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
49
+ page_content=' N ′ j = Nj + Ne and M ′ k = Mk + Me, with Ne and Me independent of j and k and commuting with Nj and Mk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
50
+ page_content=' In this way, the common leakage to higher states does not affect the test [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
51
+ page_content=' For d = 2 we have W = 0, but d = 3 gives maximally 27 √ 2/64 ≃ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
52
+ page_content='6 in the real space and ≃ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
53
+ page_content='632 in the complex space [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
54
+ page_content=' For d = 4 the maximum (real and complex) is 212/37 ≃ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
55
+ page_content='87.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
56
+ page_content=' Even higher dimensions are saturated by the classical maximum 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
57
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
58
+ page_content='03296v1 [quant-ph] 9 Jan 2023 2 The IBM Quantum Experience cloud computing of- fers several devices, collections of qubits, which can be manipulated by a user-defined set of gates (operations) – either single qubit or two-qubit ones, also paramteric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
59
+ page_content=' One can put barriers (controlling the order of operations) or additional resets (nonunitary transition to the ground state).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
60
+ page_content=' The qubits are physical transmons [24], the arti- ficial quantum states existing due to interplay of super- conductivity (Josephson effect) and capacitance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
61
+ page_content=' Due to anharmonicity one can limit the working space to two states.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
62
+ page_content=' The decoherence time (mostly environmental) is long enough to perform a sequence of quantum opera- tions and read out reliable results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
63
+ page_content=' The ground state |0⟩ can be additionally assured by a reset operation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
64
+ page_content=' Gates are implemented by time- scheduled microwave pulses prepared by waveform gen- erators and mixers (time 30 − 70ns with sampling at 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
65
+ page_content='222ns), tuned to the drive frequency (energy difference between qubit levels) [25] (about 4−5Ghz).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
66
+ page_content=' The rotation Z is not a real pulse, but an realized by an instantaneous virtual gate VZ(θ), which adds a rotation between in- and out-of-phase components of the next gates [26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
67
+ page_content=' The readout is performed another long microwave pulse of frequency (different from the drive) to the resonator and measuring the populated photons [25, 27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
68
+ page_content=' In the following, we assume the two-level description of the qubits, expecting W = 0 up to statistical er- ror.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
69
+ page_content=' Larger deviation would be an evidence that this description is inaccurate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
70
+ page_content=' The states and operators will be can be described either in a two-dimensional Hilbert space with basis |0⟩, |1⟩ or in the Bloch sphere with V = (v0 + v · σ)/2, with the 3-component Bloch vec- tor v and standard Pauli matrices σ1 = � 0 1 1 0 � , σ2 = � 0 −i i 0 � , σ3 = � 1 0 0 −1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
71
+ page_content=' (1) Then the initial state |0⟩⟨0| corresponds to the vector (0, 0, 1) while n0 = 1 and |n| ≤ 1 and 2 − |m| ≥ m0 ≥ |m|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
72
+ page_content=' A microwave pulse tuned to the interlevel drive fre- quency corresponds to parametric gates, π/2 rotations, Sγ = Z† γSZγ, Zθ = � e−iγ/2 0 0 eiγ/2 � , S = RX(π/2) = √ X = 1 √ 2 � 1 −i −i 1 � , (2) in the basis |0⟩, |1⟩ while S = � � 1 0 0 0 0 −1 0 1 0 � � , Zγ = � � cos γ − sin γ 0 sin γ cos γ 0 0 0 1 � � , (3) on the Bloch vector, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
73
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
74
+ page_content=' SγV S† γ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
75
+ page_content=' Physically the experiment is sequence of preparation in the state |0⟩, two gates Sα, Sβ for the preparation, two gates Sφ, Sθ, and the the readout pulse for the measure- ment of the state |0⟩ again, see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
76
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
77
+ page_content=' There are 5 pairs of angles αj, βj to be chosen independently of the 4 pairs N M 1 0 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
78
+ page_content=' 1: Preparation and measurement scenario;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
79
+ page_content=' the state is prepared as N and measured by M to give an outcome of either 1 or 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
80
+ page_content=' |0⟩ Sα Sβ Sφ Sθ FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
81
+ page_content=' 2: The quantum circuit for the dimension test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
82
+ page_content=' The initial state |0⟩ and four gates Sγ, split into preparation and measurement stages, are followed by the final dichotomic mea- surement θk, φk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
83
+ page_content=' Then N = SβSα|0⟩⟨0| and M = S† φS† θ|0⟩⟨0|SθSφ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
84
+ page_content=' The actual pulse waveform of a sample sequence of gates is depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
85
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
86
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
87
+ page_content=' EXPERIMENT In a perfect theory, we can predict a probability for every choice of α, β, θ, φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
88
+ page_content=' The experimental results can differ for a variety of reasons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
89
+ page_content=' Firstly, the test is random and we have to estimate the error due to finite statistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
90
+ page_content=' For T times the experiment is repeated, the variance of W can be estimated as T⟨W 2⟩ ≃ � kj pkj(1 − pkj)(Adj p)2 jk, (4) where Adj is the adjoint matrix (matrix of minors of p, with crossed out a given row and column, and then trans- 0 30 60 90 119 149 Time (ns) VZ(2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
91
+ page_content='28) VZ( 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
92
+ page_content='37) VZ(7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
93
+ page_content='33) VZ( 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
94
+ page_content='57) D0 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
95
+ page_content='26 GHz FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
96
+ page_content=' 3: The actual waveform of the pulse on IBM quan- tum computer (nairobi), with four subsequent gates Sγ, with γ = α, β, φ, θ, consecutively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
97
+ page_content=' The discretization unit time is dt = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
98
+ page_content='222ns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
99
+ page_content=' Driving (level gap) frequency is denoted by D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
100
+ page_content=' The light/dark shading corresponds to in-phase/out-of-phase amplitude component, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
101
+ page_content=' The element VZ(ξ) is a zero-duration virtual gate Zξ for subsequent gates SγSδ with ξ = γ − δ [26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
102
+ page_content=' 3 posed).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
103
+ page_content=' Note that the identity p−1 det p = Adjp makes no sense here as W = det p = 0 in the limit T → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
104
+ page_content=' Secondly, the implementation of gates may be not faith- ful.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
105
+ page_content=' Our test is capable to take them into account as long as the leakage to external states (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
106
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
107
+ page_content=' |2⟩) is inco- herent and does not depend on the parameters α, β, θ, φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
108
+ page_content=' Lastly, we have to assume that the pulse does not depend on the previous ones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
109
+ page_content=' In other words, we can only test the combination of assumptions, dimension of the space and independence of operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
110
+ page_content=' We have calculated W in two ways, (i) determining p for each job and then find- ing W (see the values for each job in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
111
+ page_content=' 10) and finally averaging W, (ii) averaging first p from all jobs and then finding W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
112
+ page_content=' There is no a priori best selection of preparations and measurements but they should not lie on a single Bloch circle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
113
+ page_content=' We decided to make two kinds of tests: (I) two special configurations corresponding to either the same Bloch vectors for preparation and measurements or max- imal ⟨W 2⟩ for a given R;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
114
+ page_content=' (II) a family of configurations with one preparation vector at one of the 5 directions on the Bloch circle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
115
+ page_content=' In both cases the corresponding Bloch vectors are derived explicitly in Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
116
+ page_content=' The sets of angles in the case (I) are given in the Table I, and the corresponding Bloch vectors are visualized in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
117
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
118
+ page_content=' We have run the test on lima and lagos, qubit 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
119
+ page_content=' The probability matrix, compared to the ideal expecta- tion is depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
120
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
121
+ page_content=' The deviation from zero and the statistical error is given in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
122
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
123
+ page_content=' The number of T = #jobs·#shots·#repetitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
124
+ page_content=' Technically, one sends a list of jobs to execute, each job contains up to 300 cir- cuits, to be distributed between experiments repeated the same number of times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
125
+ page_content=' Each circuit is run the number of shots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
126
+ page_content=' The readout counts for each circuit is the value returned after the job execution is accomplished.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
127
+ page_content=' The sets of angles in the case (II) are prepared dif- ferently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
128
+ page_content=' Four preparations and measurements are fixed while the last preparation is parameter-dependent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
129
+ page_content=' The fixed angles are specified in Table II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
130
+ page_content=' The last prepara- tion angles are α5 = 2πi/5 = β5 − π/2 for i = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
131
+ page_content='.4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
132
+ page_content=' The corresponding Bloch vectors are depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
133
+ page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
134
+ page_content=' We have run the test on nairobi and perth, qubit 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
135
+ page_content=' The probability matrix, compared to the ideal expectation is depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
136
+ page_content=' 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
137
+ page_content=' The deviation from zero and the sta- tistical error is given in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
138
+ page_content=' 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
139
+ page_content=' The deviation from the expected 0 is more than 5 standard deviations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
140
+ page_content=' The data and scripts are available at the public repository [28].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
141
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
142
+ page_content=' Nonidealities There are several factors that can affect the correct- ness of the experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
143
+ page_content=' (A) The daily calibration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
144
+ page_content=' The drive frequency and the gate waveforms are corrected so different jobs can rely on different realizations of gates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
145
+ page_content=' There first order effect of calibrations is cancelled out.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
146
+ page_content=' Nevertheless, we made more detailed estimates on sec- ond order effects in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
147
+ page_content=' Only large, unexpected j 1 2’ 3’ 4’ 5’ 2” 3” 4” 5” α 0 2π/3 2π/3 4π/3 4π/3 0 η − π η + 5π/3 η + π/3 β 0 π/6 −π/6 π/6 −π/6 π 0 2π/3 −2π/3 k 1’ 2’ 3’ 4’ 1” 2” 3” 4” θ 5π/3 5π/3 π/3 π/3 π π/2 7π/6 −π/6 φ 7π/6 5π/6 7π/6 5π/6 0 π 5π/3 π/3 TABLE I: The angles for the special two special cases, ’ and ”, with η = acos(1/3) and 1=1’=1”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
148
+ page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
149
+ page_content=' 4: The Bloch vectors for the preparations (red) and measurements (blue) corresponding to the angles from Table I, top ’ and bottom ”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
150
+ page_content=' For the case ’, the four measurement direction are identical to four preparations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
151
+ page_content=' j 1 2 3 4 α 0 η − π η + 5π/3 η + π/3 β 0 0 2π/3 −2π/3 k 1 2 3 4 θ π π/2 7π/6 −π/6 φ 0 π 5π/3 π/3 TABLE II: The angles for the parametric case (II) for prepa- rations and measurements 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
152
+ page_content='.4 14 1 2 3 4 ideal k 1 2 3 4 lima k 1 2 3 4 5 j′ 1 2 3 4 lagos k 1 2 3 4 5 j′′ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
153
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
154
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
155
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
156
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
157
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
158
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
159
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
160
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
161
+ page_content='0 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
162
+ page_content=' 5: Results of the test (I) with probabilities pkj for the an- gles from Table I, for lima and lagos, compared to the ideal ex- pectation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
163
+ page_content=' Lagos: 60 jobs, 32000 shots, 15 repetitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
164
+ page_content=' Lima: 521’/194” jobs, 20000 shots, 5 repetitions failures could be a problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
165
+ page_content=' (B) Amplitude-dependent leakage and distortion of the waveform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
166
+ page_content=' The leakage to higher states, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
167
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
168
+ page_content=' |2⟩ is small, of the order 10−4 and incoherent [8, 14], see details in Appendix C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
169
+ page_content=' It is pos- sible that distortion of amplitude to the waveform de- pends on the rotation angle (phase) but we expect this effect to be very small, 10−3, based on the deviations ob- served in our previous work, and so the net effect is 10−7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
170
+ page_content=' (C) Memory of the waveform between successive gates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
171
+ page_content=' Highly unlikely, a residual voltage amplitude can persist up to the next gate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
172
+ page_content=' In principle it can be mitigated by delay-separated gates if the effect fades out with time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
173
+ page_content=' (D) Other qubits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
174
+ page_content=' They are usually detuned but some crosstalk may remain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
175
+ page_content=' As in the case of leakage, we ex- pect the crosstalk to be incoherent and so irrelevant for the witness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
176
+ page_content=' As a sanity check we have run simulations, using the noise models from nairobi and perth, and no significant deviation have been found, see Appendix D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
177
+ page_content=' lima′ lima′′ lagos′ lagos′′ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
178
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
179
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
180
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
181
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
182
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
183
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
184
+ page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
185
+ page_content='0 ×10 4 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
186
+ page_content=' 6: Results of the test (I) the witness W = det p, for the angles from Table I, for lima and lagos, with the error given by (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
187
+ page_content=' Red – W for p from each job and then averaged, blue – p averaged from all jobs to give W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
188
+ page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
189
+ page_content=' 7: The Bloch vectors for the parametric case (II) with fixed preparations (red) and measurements (blue) correspond- ing to the angles from Table I, and a parametric preparation (green).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
190
+ page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
191
+ page_content=' DISCUSSION A test of linear independence of quantum operations reveals subtle deviations, invisible in more crude tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
192
+ page_content=' Further tests are necessary to identify the origin of the deviations, to exclude e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
193
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
194
+ page_content=' exotic many world/copies the- ories [29, 30].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
195
+ page_content=' We suggest: (i) an extreme statistics col- lected in a relatively short time to avoid corrections due to calibrations, (ii) a time separation between gates to ex- clude potential overlap of the effects, (iii) a scan through a large set of Bloch vectors to maximize the potential deviation, (iv) run the test on a single-qubit devices to avoid cross-talks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
196
+ page_content=' It is also possible to develop more so- phisticated tests, with different assumptions, or involv- ing different qubits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
197
+ page_content=' In any case, a precise diagnostics of qubits must become a standard in quantum technologies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
198
+ page_content=' 5 1 2 3 4 j 1 2 3 4 k theory 0 1 2 3 4 i j = 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
199
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
200
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
201
+ page_content='0 1 2 3 4 j 1 2 3 4 k nairobi 0 1 2 3 4 i j = 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
202
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
203
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
204
+ page_content='0 1 2 3 4 j 1 2 3 4 k perth 0 1 2 3 4 i j = 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
205
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
206
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
207
+ page_content='0 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
208
+ page_content=' 8: Results of the test (II) with probabilities pkj for the angles from Table II, for nairobi and perth, compared to the theory expectation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
209
+ page_content=' Nairobi/perth: 115/93 jobs,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
210
+ page_content=' both 100000 shots and 8 repetitions Appendix A: Bloch sphere representations Using vectors n to represent the state N = |n⟩⟨n| = (ˆ1 + n · σ)/2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
211
+ page_content=' we have SαNS† α = Nα and S† θMSθ = Mθ with nα = � � cos2 α − cos α sin α − sin α − cos α sin α sin2 α − cos α sin α cos α 0 � � n,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
212
+ page_content=' mθ = � � cos2 θ − cos θ sin θ sin θ − cos θ sin θ sin2 θ cos θ − sin θ − cos θ 0 � � n,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
213
+ page_content=' (A1) For n = m = (0,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
214
+ page_content=' 0,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
215
+ page_content=' 1) and m0 = 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
216
+ page_content=' we have Nαβ = SβSαNS† αS† β with n′ αβ = (sin(β − α) cos β,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
217
+ page_content=' sin(α − β) sin β,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
218
+ page_content=' − cos(β − α)) (A2) while Mθφ = S† φS† θMSθSφ wirh M θφ = (sin(θ − φ) cos φ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
219
+ page_content=' sin(φ − θ) sin φ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
220
+ page_content=' − cos(θ − φ)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
221
+ page_content=' (A3) 0 1 2 3 4 −2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
222
+ page_content='5 −2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
223
+ page_content='0 −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
224
+ page_content='5 −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
225
+ page_content='0 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
226
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
227
+ page_content='0 nairobi ×10−4 0 1 2 3 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
228
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
229
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
230
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
231
+ page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
232
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
233
+ page_content='5 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
234
+ page_content='0 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
235
+ page_content='5 perth ×10−4 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
236
+ page_content=' 9: Results of the test (II) the witness W = det p, for the angles from Table II, for nairobi and perth, with the error given by (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
237
+ page_content=' Red – W for p from each job and then averaged, blue – p averaged from all jobs to give W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
238
+ page_content=' 0 1 2 3 4 −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
239
+ page_content='5 −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
240
+ page_content='0 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
241
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
242
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
243
+ page_content='5 nairobi ×10−4 0 1 2 3 4 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
244
+ page_content='75 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
245
+ page_content='50 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
246
+ page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
247
+ page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
248
+ page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
249
+ page_content='50 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
250
+ page_content='75 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
251
+ page_content='00 perth ×10−3 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
252
+ page_content=' 10: Results of the test (II) the witness W = det p, for the angles from Table II, for nairobi and perth, for individual jobs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
253
+ page_content=' Two values for nairobi are beyond the picture boundaries, (3, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
254
+ page_content='0023) and (4, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
255
+ page_content='003) 6 1 2 3 4 j 1 2 3 4 k nairobi-sim 0 1 2 3 4 i j = 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
256
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
257
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
258
+ page_content='0 1 2 3 4 j 1 2 3 4 k perth-sim 0 1 2 3 4 i j = 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
259
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
260
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
261
+ page_content='0 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
262
+ page_content=' 11: Results of the simulations of the test (II) with proba- bilities pkj for the angles from Table II, for nairobi and perth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
263
+ page_content=' 0 1 2 3 4 −2 0 2 4 nairobi-sim ×10−5 0 1 2 3 4 −8 −6 −4 −2 0 2 4 6 perth-sim ×10−5 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
264
+ page_content=' 12: Results of the simulations of the test (II) the witness W = det p, for the angles from Table II, for nairobi and perth noise models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
265
+ page_content=' Note that the two ways of calculation of W almost coincide (the blue one covers the red one), which is consistent with our explanation of averaged out first order difference in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
266
+ page_content=' 0 1 2 3 4 −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
267
+ page_content='0 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
268
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
269
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
270
+ page_content='5 nairobi-sim ×10−4 0 1 2 3 4 −7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
271
+ page_content='5 −5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
272
+ page_content='0 −2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
273
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
274
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
275
+ page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
276
+ page_content='0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
277
+ page_content='5 perth-sim ×10−4 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
278
+ page_content=' 13: Results of the simulations of the test (II) the witness W = det p, for the angles from Table II, for nairobi and perth noise models, for individual jobs Then the probability matrix elements read pkj = TrMkNj = (1 + n · m)/2 (A4) while p5j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
279
+ page_content=' In this way we can represent the choices used in our experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
280
+ page_content=' In the first choice, prepara- tions n′ 1 = (0, 0, −1), n′ 2 = (− √ 3/2, 1/2, 0), n′ 3 = (− √ 3/4, −1/4, √ 3/2), n′ 4 = ( √ 3/4, −1/4, √ 3/2), n′ 5 = ( √ 3/2, 1/2, 0) and measurements m′ k = n′ k−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
281
+ page_content=' In the sec- ond choice, n′′ 1 = −n′′ 2 = (0, 0, −1), n′′ 3 = (2 √ 2, 0, 1/3), n′′ 4,5 = (− √ 2/3, ∓ � 2/3, 1/3) and measurements m′′ 1 = (0, 0, 1), m′′ 2 = (1, 0, 0), m′′ 3,4 = (−1/2, ∓ √ 3/2, 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
282
+ page_content=' For the parametric test we have n1 = (0, 0, 1), n2 = (2 √ 2, 0, 1/3), n3,4 = (− √ 2/3, ∓ � 2/3, 1/3) while ni 5 = (− sin(2πi/5), − cos(2πi/5), 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
283
+ page_content=' Appendix B: Bounds on daily calibrations Suppose that the calibration from job to job can al- ter the matrix of probabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
284
+ page_content=' Assuming that each job n = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
285
+ page_content='.N satisfies W (n) = 0 for probabilities p(n), we ask if W for p = � n p(n)/N can be nonzero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
286
+ page_content=' Suppose δp(n) = p(n) − p(0) is small for some reference matrix p(0) and |δp(n) kj | ≤ ϵ for all kj and some small bound ϵ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
287
+ page_content=' Then, in the first order of δp we have still W ≃ 0 from expand- ing determinant in linear combinations of single columns 7 p(n) and the rest of columns kept equal p(0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
288
+ page_content=' The nonva- nishing contribution is of the second order, when replac- ing either of two columns by δp(n).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
289
+ page_content=' Their length is ≤ 2ϵ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
290
+ page_content=' The last row contains 0 for the replaced columns and 1 for the rest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
291
+ page_content=' Subtracting 1/2 of that row from the other rows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
292
+ page_content=' The moduli of remaining elements are ≤ 1/2 for the length of the remaining 3 columns is ≤ √ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
293
+ page_content=' From Hadamard inequality | det A| ≤ � j |Aj| with |Aj being the length of the vector (column) Aj of the matrix A, we have the upper bound |W| ≤ 80 √ 2ϵ2 as we have 10 choices of 2 columns out of 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
294
+ page_content=' Appendix C: Corrections from higher states The generic Hamiltonian, in the basis states |n⟩, n = 0, 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
295
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
296
+ page_content=' (ℏ = 1) reads H = � n ωn|n⟩⟨n| + 2 cos(ωt − θ) ˆV (t) (C1) with energy ωn eigenstates levels and the external drive V at frequency ω and phase shift θ (the second term).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
297
+ page_content=' In principle free parameters ω, θ and ˆV (t) can model a com- pletely arbitrary evolution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
298
+ page_content=' We can estimate deviations by perturbative analysis, setting ω0 = 0, ω1 = ω (reso- nance), ω2 = 2ω+ω′ (anharmonicity, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
299
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
300
+ page_content=' ω′ ≪ ω, in IBM about 300Mhz compared to drive frequency ∼ 5GHz).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
301
+ page_content=' The state |2⟩ should give the most significant potential contribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
302
+ page_content=' We can incorporate rotation and phase into the definition of states,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
303
+ page_content=' |n⟩ → |n′⟩ = e−in(θ+ωt)|n⟩ so that H′ = � � 2 cos(ωt − θ)V00 (1 + e−2i(θ+ωt))V01 (e−i(θ+ωt) + e−3i(θ+ωt))V02 (1 + e2i(ωt+θ))V10 2 cos(ωt + θ)V11 (1 + e−2i(θ+ωt))V12 (e−i(θ+ωt) + e3i(ωt+θ))V20 (1 + e2i(ωt+θ))V21 2 cos(ωt + θ)V22 + ω′ � � (C2) Extracting the Rotating Wave Approximation (RWA) part from H′ = HRW A + ∆H,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
304
+ page_content=' HRW A = � � 0 V01 0 V10 0 V12 0 V21 ω′ � � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
305
+ page_content=' (C3) the correction reads ∆H = � � 2 cos(ωt + θ)V00 e−2i(θ+ωt)V01 (e−i(θ+ωt) + e−3i(θ+ωt))V02 e2i(ωt+θ)V10 2 cos(ωt + θ)V11 e−2i(θ+ωt)V12 (e−i(θ+ωt) + e3i(ωt+θ))V20 e2i(ωt+θ)V21 2 cos(ωt + θ)V22 � � (C4) Evolution due to RWA has the form U(t) = T exp � t −∞ HRW A(t′)dt′/i,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
306
+ page_content=' (C5) where T means chronological product in Taylor expan- sion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
307
+ page_content=' Then the 1st order correction to U reads ∆U = U(+∞) � dtU †(t)∆H(t)U(t)/i (C6) where the full rotation is U(+∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
308
+ page_content=' All θ-dependent terms in ∆H, contain also eiωt, which exponentially damps slow-varying expressions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
309
+ page_content=' The 2nd order correction reads ∆2U = −U(+∞)× � dtU †(t)∆H(t)U(t) � t dt′U †(t′)∆H(t′)U(t′).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
310
+ page_content=' (C7) Most of components get damped exponentially, too, ex- cept when ∆H(t) contains eikωt and ∆H(t′) contains e−ikωt, k = 1, 2, 3, so kθ cancels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
311
+ page_content=' The nonnegligible part of ∆2U is therefore independent of θ giving slowly Bloch-Siegert shift [31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
312
+ page_content=' Stroboscopic corrections to RWA [32] can be neglected due to a very short sampling time, dt = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
313
+ page_content='222ns, Appendix D: Simulations As a cross-check of our test we have run the identical programs on IBM simulator of a quantum computer with the noise model taken from the real devices perth and nairobi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
314
+ page_content=' However, in contrast to real devices, the results are in agreement with the theory as shown in Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
315
+ page_content=' 11, 12, 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
316
+ page_content=' [1] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
317
+ page_content=' Eötvös, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
318
+ page_content=' Pekár, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
319
+ page_content=' Fekete, Beiträge zum Gesetz der Proportionalität von Trägheit and Gravität, Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
320
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
321
+ page_content=' (Berlin) 373, 11, 1922.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
322
+ page_content=' 8 [2] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
323
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
324
+ page_content=' Wagner, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
325
+ page_content=' Schlamminger, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
326
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
327
+ page_content=' Gundlach, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
328
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
329
+ page_content=' Adelberger, Torsion-balance tests of the weak equiva- lence principle, Class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
330
+ page_content=' Quantum Grav.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
331
+ page_content=', 29:184002, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
332
+ page_content=' [3] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
333
+ page_content=' Touboul et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
334
+ page_content=', MICROSCOPE Mission: Final Results of the Test of the Equivalence Principle, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
335
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
336
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
337
+ page_content=' 129, 121102 (2022) [4] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
338
+ page_content=' Morel, Zh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
339
+ page_content=' Yao, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
340
+ page_content=' Clade, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
341
+ page_content=' Guellati-Khelifa, Deter- mination of the fine-structure constant with an accuracy of 81 parts per trillion, Nature 588, 61 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
342
+ page_content=' [5] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
343
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
344
+ page_content=' Workman et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
345
+ page_content=' (Particle Data Group), Review of Particle Physics, Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
346
+ page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
347
+ page_content=' Exp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
348
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
349
+ page_content=' 2022, 083C01 (2022) [6] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
350
+ page_content=' Wang, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
351
+ page_content=' Miao, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
352
+ page_content=' Shao, Bounding the photon mass with cosmological propagation of fast radio bursts, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
353
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
354
+ page_content=' B 820, 136596 (2021) [7] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
355
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
356
+ page_content=' Chaves, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
357
+ page_content=' Wu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
358
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
359
+ page_content=' Rosen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
360
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
361
+ page_content=' DuBois, Nonlin- ear signal distortion corrections through quantum sens- ing, Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
362
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
363
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
364
+ page_content=' 118, 014001 (2021) [8] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
365
+ page_content=' Białecki, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
366
+ page_content=' Rybotycki, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
367
+ page_content=' Tworzydło, Born rule as a test of the accuracy of a public quantum computer, arXiv:2112.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
368
+ page_content='07567 [9] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
369
+ page_content=' Gallego, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
370
+ page_content=' Brunner, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
371
+ page_content=' Hadley, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
372
+ page_content=' Acin, Device- Independent Tests of Classical and Quantum Dimen- sions, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
373
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
374
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
375
+ page_content=' 105, 230501 (2010) [10] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
376
+ page_content=' Hendrych, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
377
+ page_content=' Gallego, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
378
+ page_content=' Micuda, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
379
+ page_content=' Brunner, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
380
+ page_content=' Acin, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
381
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
382
+ page_content=' Torres, Experimental estimation of the di- mension of classical and quantum systems, Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
383
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
384
+ page_content=' 8, 588 (2012) [11] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
385
+ page_content=' Ahrens, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
386
+ page_content=' Badziag, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
387
+ page_content=' Cabello, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
388
+ page_content=' Bourennane, Experimental Device-independent Tests of Classical and Quantum Dimensionality Nature Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
389
+ page_content=' 8, 592 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
390
+ page_content=' [12] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
391
+ page_content=' Ahrens, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
392
+ page_content=' Badziag, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
393
+ page_content='Pawlowski, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
394
+ page_content=' Zukowski, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
395
+ page_content=' Bourennane, Experimental Tests of Classical and Quan- tum Dimensions, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
396
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
397
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
398
+ page_content=' 112, 140401 (2014) [13] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
399
+ page_content=' Brunner, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
400
+ page_content=' Navascues, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
401
+ page_content=' Vertesi, Dimension Witnesses and Quantum State Discrimination Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
402
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
403
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
404
+ page_content=' 110, 150501 (2013) [14] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
405
+ page_content=' Strikis, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
406
+ page_content=' Datta, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
407
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
408
+ page_content=' Knee, Quantum leakage detec- tion using a model-independent dimension witness, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
409
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
410
+ page_content=' A 99, 032328 (2019) [15] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
411
+ page_content=' Bowles, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
412
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
413
+ page_content=' Quintino, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
414
+ page_content=' Brunner, Certifying the Dimension of Classical and Quantum Systems in a Prepare-and-Measure Scenario with Independent Devices, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
415
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
416
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
417
+ page_content=' 112, 140407 (2014) [16] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
418
+ page_content=' Batle, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
419
+ page_content=' Bednorz, Optimal classical and quantum real and complex dimension witness, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
420
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
421
+ page_content=' A 105, 042433 (2022) [17] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
422
+ page_content=' Chen K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
423
+ page_content=' Redeker, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
424
+ page_content=' Garthoff, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
425
+ page_content=' Rosenfeld, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
426
+ page_content=' Wrachtrup, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
427
+ page_content=' Gerhardt, Certified randomness from remote state preparation dimension witness, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
428
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
429
+ page_content=' A 103, 042211 (2021) [18] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
430
+ page_content='-N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
431
+ page_content=' Sun et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
432
+ page_content=', Experimental certification of quan- tum dimensions and irreducible high-dimensional quan- tum systems with independent devices, Optica 7, 1073 (2020) [19] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
433
+ page_content=' Sorkin,Quantum mechanics as quantum measure the- ory, Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
434
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
435
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
436
+ page_content=' A 9, 3119 (1994).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
437
+ page_content=' [20] U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
438
+ page_content=' Sinha, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
439
+ page_content=' Couteau, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
440
+ page_content=' Jennewein, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
441
+ page_content=' Laflamme,and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
442
+ page_content=' Weihs, Ruling out multi-order interference in quantum mechanics, Science 329, 418 (2010);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
443
+ page_content=' [21] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
444
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
445
+ page_content=' Park, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
446
+ page_content=' Moussa, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
447
+ page_content=' Laflamme, Three path interference using nuclear magnetic resonance: A test of the consistency of Born’s rule, New J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
448
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
449
+ page_content=' 14, 113025 (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
450
+ page_content=' [22] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
451
+ page_content='-O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
452
+ page_content=' Pleinert, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
453
+ page_content=' von Zanthier, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
454
+ page_content=' Lutz, Many- particle interference to test Born’s rule, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
455
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
456
+ page_content=' Re- search 2, 012051(R) (2020) [23] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
457
+ page_content=' Born, Quantenmechanik der Stossvorgänge, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
458
+ page_content=' f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
459
+ page_content=' Physik 37, 863 (1926) [24] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
460
+ page_content=' Koch, Terri M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
461
+ page_content=' Yu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
462
+ page_content=' Gambetta, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
463
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
464
+ page_content=' Houck, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
465
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
466
+ page_content=' Schuster, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
467
+ page_content=' Majer, Alexandre Blais, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
468
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
469
+ page_content=' Devoret, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
470
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
471
+ page_content=' Girvin, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
472
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
473
+ page_content=' Schoelkopf, Charge-insensitive qubit design derived from the Cooper pair box, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
474
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
475
+ page_content=' A 76, 042319 (2007) [25] https://qiskit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
476
+ page_content='org/textbook [26] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
477
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
478
+ page_content=' McKay, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
479
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
480
+ page_content=' Wood, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
481
+ page_content=' Sheldon, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
482
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
483
+ page_content=' Chow, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
484
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
485
+ page_content=' Gambetta, Efficient Z gates for quantum computing Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
486
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
487
+ page_content=' A 96, 022330 (2017) [27] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
488
+ page_content=' Sank et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
489
+ page_content=', Measurement-Induced State Transitions in a Superconducting Qubit: Beyond the Rotating Wave Approximation, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
490
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
491
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
492
+ page_content=' 117, 190503 (2016) [28] European Organization For Nuclear Research and Open AIRE, Zenodo, CERN, 2022, http://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
493
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
494
+ page_content='5281/zenodo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
495
+ page_content='7470893 [29] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
496
+ page_content=' Plaga, On a possibility to find experimental evidence for the many-worlds interpretation of quantum mechan- ics, Found.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
497
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
498
+ page_content=' 27, 559 (1997) [30] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
499
+ page_content=' Bednorz, Objective Realism and Joint Measurability in Quantum Many Copies, Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
500
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
501
+ page_content=' (Berlin), 201800002 (2018) [31] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
502
+ page_content=' Bloch and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
503
+ page_content=' Siegert, Magnetic Resonance for Nonro- tating Fields, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
504
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
505
+ page_content=' 57, 522 (1940).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
506
+ page_content=' [32] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
507
+ page_content=' Zeuch, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
508
+ page_content=' Hassler, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
509
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
510
+ page_content=' Slim, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
511
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
512
+ page_content=' DiVincenzo, Ex- act rotating wave approximation, Annals of Physics 423, 168327 (2020)' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/49E1T4oBgHgl3EQfmQS7/content/2301.03296v1.pdf'}
5dE3T4oBgHgl3EQfQgnL/content/tmp_files/2301.04414v1.pdf.txt ADDED
@@ -0,0 +1,2473 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ How Does Traffic Environment Quantitatively Affect
4
+ the Autonomous Driving Prediction?
5
+
6
+ Wenbo Shao, Yanchao Xu, Jun Li, Chen Lv, Senior Member, IEEE, Weida Wang and Hong Wang☒, Senior Member,
7
+ IEEE
8
+ Abstract—An accurate trajectory prediction is crucial for safe
9
+ and efficient autonomous driving in complex traffic environments.
10
+ In recent years, artificial intelligence has shown strong capabilities
11
+ in improving prediction accuracy. However, its characteristics of
12
+ inexplicability and uncertainty make it challenging to determine
13
+ the traffic environmental effect on prediction explicitly, posing
14
+ significant challenges to safety-critical decision-making. To
15
+ address these challenges, this study proposes a trajectory
16
+ prediction framework with the epistemic uncertainty estimation
17
+ ability that outputs high uncertainty when confronting
18
+ unforeseeable or unknown scenarios. The proposed framework is
19
+ used to analyze the environmental effect on the prediction
20
+ algorithm performance. In the analysis, the traffic environment is
21
+ considered in terms of scenario features and shifts, respectively,
22
+ where features are divided into kinematic features of a target
23
+ agent, features of its surrounding traffic participants, and other
24
+ features. In addition, feature correlation and importance analyses
25
+ are performed to study the above features’ influence on the
26
+ prediction error and epistemic uncertainty. Further, a cross-
27
+ dataset case study is conducted using multiple intersection
28
+ datasets to investigate the impact of unavoidable distributional
29
+ shifts in the real world on trajectory prediction. The results
30
+ indicate that the deep ensemble-based method has advantages in
31
+ improving prediction robustness and estimating epistemic
32
+ uncertainty. The consistent conclusions are obtained by the
33
+ feature correlation and importance analyses, including the
34
+ conclusion that kinematic features of the target agent have
35
+ relatively strong effects on the prediction error and epistemic
36
+ uncertainty. Furthermore, the prediction failure caused by
37
+ distributional shifts and the potential of the deep ensemble-based
38
+ method are analyzed.
39
+
40
+ Index Terms—Artificial intelligence, autonomous driving,
41
+ distributional shift, epistemic uncertainty, traffic environment,
42
+ trajectory prediction.
43
+ I. INTRODUCTION
44
+ RAJECTORY prediction is an indispensable part of the
45
+ autonomous driving pipeline [1]. To drive safely and
46
+ efficiently
47
+ in
48
+ complex
49
+ traffic
50
+ environments,
51
+ autonomous vehicles (AVs) are required to have the ability to
52
+ predict the future motion of surrounding traffic participants
53
+
54
+ This work has been submitted to the IEEE for possible publication. Copyri
55
+ ght may be transferred without notice. This work was supported in part by the
56
+ National Science Foundation of China Project: 52072215and U1964203, and t
57
+ he National Key R&D Program of China:2020YFB1600303. (Corresponding
58
+ authors: Hong Wang)
59
+ Wenbo Shao, Jun Li and Hong Wang are with Tsinghua Intelligent Vehicle
60
+ Design and Safety Research Institute, School of Vehicle and Mobility, Tsingh
61
+ ua University, Beijing 100084, China. (e-mail: swb19@mails.tsinghua.edu.cn;
62
+ lijun1958@tsinghua.edu.cn; hong_wang@tsinghua.edu.cn).
63
+ (TPs), such as vehicles and pedestrians, accurately and reliably.
64
+ In recent years, with the accumulation of large-scale driving
65
+ data and rapid development of algorithms, artificial intelligence
66
+ (AI) has been widely applied to autonomous driving trajectory
67
+ prediction [2, 3], and promising results have been achieved.
68
+ However, trajectory prediction has still been challenging,
69
+ particularly in urban driving scenarios, where an agent's
70
+ movement is influenced by a combination of its historical state
71
+ and its complex interactions with the surrounding environment.
72
+ Many recent studies [4-6] have considered multiple factors
73
+ simultaneously to improve trajectory prediction algorithms, but
74
+ there has still been certain performance degradation of a
75
+ prediction model in complex traffic environments.
76
+ With the improvement in prediction accuracy, the
77
+ complexity of AI-based models has also increased gradually.
78
+ Highly elaborated models pose a great challenge to explaining
79
+ the operation and failure mechanisms of prediction algorithms,
80
+ which in turn reduces the credibility of a prediction model. In
81
+ addition, AI has its inherent uncertainty and faces many
82
+ problems, such as insufficient training data, imperfect model
83
+ architecture, and limited training process, which may lead to
84
+ functional insufficiencies of the model under specific
85
+ environmental conditions, potentially causing severe traffic
86
+ accidents [7]. The existing research mainly focuses on
87
+ improving the dataset-level accuracy of prediction algorithms
88
+ [8, 9], and little attention has been paid to the changes in
89
+ prediction
90
+ performance
91
+ under
92
+ different
93
+ environmental
94
+ conditions. However, this is not conducive to addressing the
95
+ practical challenges that a prediction algorithm confronts.
96
+ For a target agent (TA) moving in a specific scenario, a
97
+ trajectory prediction model predicts its future trajectory by
98
+ modeling time series, interaction, and other relationships based
99
+ on its historical state, surrounding TPs' features, and other
100
+ environmental features. Correspondingly, various traffic
101
+ environmental factors may have different effects on trajectory
102
+ prediction, but fewer studies have quantitatively investigated
103
+ these effects. Further, data-driven methods strongly depend on
104
+ Yanchao Xu and Weida Wang is with the School of Mechanical Engineerin
105
+ g, Beijing Institute of Technology, Beijing 100081, China. (e-mail: 31202004
106
+ 10@bit.edu.cn, wangwd0430@163.com)
107
+ Chen Lv is with the School of Mechanical and Aerospace Engineering,
108
+ Nanyang
109
+ Technological
110
+ University,
111
+ Singapore
112
+ 639798
113
+ (e-mail:
114
+ lyuchen@ntu.edu.sg).
115
+ T
116
+
117
+ 1
118
+ Traffic environmental features and distributional shifts
119
+ Trajectory prediction with epistemic uncertainty estimation
120
+ Graph
121
+ Representation
122
+ Deep Ensemble-based prediction method
123
+ Graph
124
+ Convolution
125
+ Model
126
+ RNN-based
127
+ Trajectory
128
+ Prediction
129
+ Model
130
+ Graph Feature
131
+ How dose traffic environment affect the
132
+ autonomous driving prediction?
133
+ Distributional shifts
134
+ Surrounding traffic
135
+ participants
136
+ The target agent
137
+ Different environmental features
138
+ Scenario features analysis & research across intersection datasets
139
+ Prediction error & epistemic
140
+ uncertainty estimation
141
+ quantitative analysis
142
+ Answer
143
+ As independent
144
+ variables
145
+ qualitative analysis
146
+
147
+ Fig. 1. Illustration of the traffic environment effect on the trajectory prediction algorithm performance. The traffic environmental
148
+ data include various TAs’ states, their surrounding TPs’ states, and other contextual information, which may affect the prediction
149
+ differently. In addition, variations in time and place can lead to distributional shifts, which may further degrade the prediction
150
+ performance. This study focuses on extracting these factors and analyzing their influence on prediction performance.
151
+
152
+ training data, and a model trained on one dataset may not
153
+ perform well on other datasets. In real-world applications, the
154
+ operating environment of AVs may change significantly with
155
+ different factors, such as time, geography, country, and weather
156
+ conditions. This may cause certain distributional shifts, posing
157
+ additional challenges to trajectory prediction. Therefore, it is
158
+ increasingly important to study how distributional shifts [10] in
159
+ a real environment affect trajectory prediction. As shown in Fig.
160
+ 1, this work focuses on the effects of both specific scenario
161
+ features and scenario shifts on the prediction algorithm.
162
+ As for the prediction algorithm performance, previous
163
+ studies have generally focused on prediction error. In recent
164
+ years, there has been an increasing interest in extracting the
165
+ uncertainty of AI-based models [11, 12], thus empowering the
166
+ models with a self-awareness ability. Epistemic uncertainty [13]
167
+ is a recurring suggestion that helps to represent the model's
168
+ confidence in its current predictions; namely, these models tend
169
+ to have greater epistemic uncertainty when they encounter
170
+ challenging environments. Therefore, the epistemic uncertainty
171
+ of a prediction model is extracted and considered a type of
172
+ performance metric in this work. As shown in Fig. 1, based on
173
+ both the prediction error and epistemic uncertainty, the effect
174
+ of the traffic environment on the prediction algorithms’
175
+ performances can be analyzed.
176
+ The main contributions of this work can be summarized as
177
+ follows:
178
+
179
+ A trajectory prediction framework that integrates
180
+ epistemic uncertainty estimation is proposed. The
181
+ proposed framework performs the TA’s future state
182
+ prediction and estimates the epistemic uncertainty
183
+ simultaneously;
184
+
185
+ The potential of the proposed deep ensemble-based
186
+ trajectory prediction framework for improving the
187
+ prediction
188
+ algorithm
189
+ robustness
190
+ and
191
+ estimating
192
+ epistemic uncertainty is demonstrated;
193
+
194
+ For the trajectory prediction task, the key features of a
195
+ traffic environment are extracted, and methods for
196
+ feature correlation analysis and feature importance
197
+ analysis are proposed to obtain the relationship between
198
+ the traffic environment and the trajectory prediction
199
+ algorithm performance;
200
+
201
+ The distributional shifts between different intersection
202
+ datasets and the resulting trajectory prediction
203
+ degradation are investigated. The features of multiple
204
+ datasets and their prediction difficulty levels are
205
+ analyzed, and it is demonstrated that the deep ensemble
206
+ is helpful in improving the trajectory prediction
207
+ robustness against cross-dataset evaluation.
208
+ The remainder of this paper is organized as follows. Section
209
+ II presents the existing work related to this paper. Section III
210
+ introduces the proposed method. Section IV describes the
211
+ datasets and evaluation metrics used in this work, as well as
212
+ implementation details. Section V analyzes and discusses the
213
+ experimental results. Section VI concludes the paper.
214
+ II. RELATED WORK
215
+ A. Trajectory Prediction
216
+ There have been numerous studies on improving the
217
+ trajectory prediction algorithms, and according to the modeling
218
+ principles, they can be mainly divided into physics-based
219
+
220
+ 2
221
+ methods, maneuver-based methods, and interaction-aware
222
+ methods [14]. Physics-based methods [15] consider only the
223
+ historical motion state of an object while ignoring the influence
224
+ of surrounding TPs. Therefore, they are mainly suitable for
225
+ short-term trajectory predictions. Maneuver-based methods [16]
226
+ learn prototype trajectories from the observed agent behaviors
227
+ to predict future motion, but they lack consideration of
228
+ interactions between TPs. Interaction-aware methods [17] have
229
+ shown better performance compared to the other two types of
230
+ methods through learning the interaction between a TA and
231
+ surrounding TPs.
232
+ In recent works, many methods have been used to model
233
+ interactions between agents, providing valuable information for
234
+ trajectory prediction improvement [3, 9]. For instance, social
235
+ pooling (S-pooling) [8] pools hidden states of a TA’s neighbors
236
+ within a certain spatial distance to model interactions with the
237
+ surrounding environment. Convolutional social pooling [18]
238
+ combines the convolutional and max-pooling layers to model
239
+ interactions
240
+ between
241
+ agents
242
+ in
243
+ the
244
+ occupancy
245
+ grid.
246
+ Subsequently, the grid representation is further modified to
247
+ consider only eight neighbors that have the most critical impact
248
+ on the TA [19]. In addition, recent research has focused on the
249
+ rasterized representation of scenes; the historical state of a TA
250
+ and scene context were co-encoded in a raster map [20-22], and
251
+ various information was distinguished by different channels
252
+ and colors. In addition, convolutional neural networks (CNNs)
253
+ were used to extract desired features from raster graphs. Graph
254
+ models have attracted great interest recently due to their good
255
+ performance in modeling inter-agent interactions. In graph
256
+ models, a node represents an agent, and an edge represents an
257
+ interaction between two agents. Diehl et al. [23] modeled
258
+ interactions between vehicles as a homogeneous directed graph
259
+ to achieve high computational efficiency and large model
260
+ capacity. They evaluated graph convolutional networks and
261
+ graph attention networks and introduced several adaptations for
262
+ specific scenarios. Mo et al. [2] employed a heterogeneous
263
+ edge-enhanced graph attention network to handle the
264
+ heterogeneity of TAs and TPs. The GRIP [24] represents the
265
+ input as a specific grid and uses an undirected graph to model
266
+ interactions between agents within a certain range, where fixed
267
+ graphs are considered in the graph convolution submodule. The
268
+ GRIP++ [5] improves the above-mentioned method by
269
+ adopting trainable graphs, which overcomes the shortcoming
270
+ that fixed graphs based on manually designed rules cannot
271
+ model interaction properly. In addition to the interaction
272
+ modeling, another important requirement of trajectory
273
+ prediction relates to time series processing. Recently, recurrent
274
+ neural networks (RNNs), including the long short-term memory
275
+ (LSTM) and gated recurrent unit (GRU) models, have been
276
+ widely used in modeling sequential problems, and significant
277
+ results have been achieved. Accordingly, these models have
278
+ been used as sub-modules in many trajectory prediction
279
+ algorithms [5, 6].
280
+ Neural networks have been demonstrated to be highly
281
+ efficient in trajectory prediction for different classes of TPs.
282
+ Research on pedestrian intent modeling and motion prediction
283
+ has been conducted for decades. The Social-LSTM [8] is a
284
+ typical success case in early research in this field, which
285
+ combines S-pooling and LSTM to predict the future trajectory
286
+ of pedestrians in crowded scenes. The Social-GAN [25] uses
287
+ generative
288
+ adversarial
289
+ networks
290
+ (GANs),
291
+ sequence-to-
292
+ sequence models, and pooling mechanisms and employs the
293
+ corresponding generators and recursive discriminators to
294
+ predict pedestrians’ socially feasible future. However, the GAN
295
+ model training is difficult and may not converge and can lead
296
+ to mode collapsing and dropping. Therefore, the Social-Ways
297
+ uses the Info-GAN, which does not apply the mean square error
298
+ loss (L2 loss) to force the generated samples to be close to real
299
+ data but adds another item to consider mutual information, thus
300
+ alleviating the above-mentioned problems. Since vehicles have
301
+ higher running speeds and need to obey more road constraints
302
+ than pedestrians, predicting their future movements is a
303
+ prerequisite for realizing safe and efficient autonomous driving.
304
+ A number of studies have designed specialized networks for
305
+ vehicle trajectory prediction [26]. For instance, vehicle
306
+ trajectory prediction in highway scenarios, which are relatively
307
+ simple and where the motion pattern of a vehicle is relatively
308
+ fixed, has received early attention [18, 24, 27]. With the
309
+ collection of large-scale datasets [28, 29] and the development
310
+ of autonomous driving in urban scenes, much research has been
311
+ focused on motion prediction in complex urban environments
312
+ [4, 30-32]. TrafficPredict [33] adopted a four-dimensional
313
+ graph to model the interaction in the instance and category
314
+ layers, thus realizing the heterogeneous traffic-agent trajectory
315
+ prediction. The GRIP++ achieved joint trajectory prediction of
316
+ all observed objects while considering multiple classes of TPs,
317
+ thus greatly improving real-time prediction performance.
318
+ However, the above work focuses on the improvement in the
319
+ dataset-level accuracy while ignoring the research on the
320
+ sensitivity of the prediction algorithm to environmental factors,
321
+ which is the focus of this work.
322
+ B. Epistemic Uncertainty Estimation
323
+ Due to the rapid development of neural networks and their
324
+ application to trajectory prediction tasks, it has become
325
+ increasingly important to estimate the network confidence in its
326
+ prediction accuracy. However, the original neural network
327
+ cannot provide an estimation of its epistemic uncertainty. To
328
+ address this shortcoming, some studies have considered and
329
+ quantified the epistemic uncertainty of neural networks [11, 34,
330
+ 35], which represents an indicator that can express how
331
+ confident the network is in its current prediction result. The
332
+ main epistemic uncertainty estimation methods include the
333
+ Bayesian neural network (BNN), single-pass uncertainty
334
+ estimation, and ensemble-based methods. The BNN quantifies
335
+ the epistemic uncertainty of a neural network by introducing
336
+ uncertainty into its parameters. The key challenge of these
337
+ methods is to solve the posterior distribution of network
338
+ parameters. In the early research, variational inference (VI) [36],
339
+ which uses a prespecified family of distributions [37, 38], was
340
+ widely adopted as a method with a strong theoretical basis.
341
+ However, with the rapid growth in the neural network structure
342
+ complexity, VI has faced many challenges in terms of solving
343
+ difficulty and computational complexity. To address these
344
+ limitations, the Monte Carlo (MC) dropout [39, 40] was
345
+ proposed to approximate the results obtained by sampling,
346
+ assuming that the network weights conformed to a Bernoulli
347
+ distribution. It has been theoretically demonstrated that the MC
348
+ dropout has the ability to approximate epistemic uncertainty. In
349
+
350
+ 3
351
+ single-pass uncertainty estimation, uncertainty is obtained
352
+ through one forward propagation, which has obvious
353
+ advantages in terms of computational complexity. The deep
354
+ evidence theory is a representative method and has been widely
355
+ used in classification [41] and regression [42] tasks. However,
356
+ these methods require that the original network output has a
357
+ specific form, which limits their scalability. In addition, these
358
+ methods do not consider the uncertainty of network weights. In
359
+ view of that, some studies [43] positioned the uncertainty they
360
+ extracted as distributional uncertainty, different from epistemic
361
+ uncertainty. In deep ensemble-based methods, the training
362
+ process is adjusted to obtain multiple different models, and
363
+ epistemic uncertainty is estimated by synthesizing the
364
+ prediction results of the models. Deep ensemble [44] is a simple
365
+ and scalable uncertainty estimation method, which has attracted
366
+ extensive attention due to its excellent performance in
367
+ estimating epistemic uncertainty [45]. Currently, this method
368
+ has become a mainstream paradigm. Subsequently, to reduce
369
+ the storage and computational costs of the practical application
370
+ of deep ensemble, many improved methods have been proposed
371
+ [46, 47]. For instance, the Batch-Ensemble [46] reduces
372
+ training and testing costs by defining each weight matrix as the
373
+ Hadamard product of the shared weights of all ensemble
374
+ members and the rank-one matrix of each member, but the
375
+ uncertainty estimation performance is slightly decreased.
376
+ However, previous studies on epistemic uncertainty have
377
+ usually involved tasks such as semantic segmentation and
378
+ object detection but have lacked detailed research in the field of
379
+ trajectory prediction. This work proposes a trajectory prediction
380
+ method with epistemic uncertainty estimation, where deep
381
+ ensemble and MC dropout are used separately to estimate
382
+ epistemic uncertainty and compared on the real intersection
383
+ dataset.
384
+ C. Relationship between Prediction Performance and Traffic
385
+ Environment
386
+ Previous studies have mainly focused on enhancing the
387
+ dataset-level accuracy of trajectory prediction. However, the
388
+ actual trajectory prediction performance can be strongly
389
+ dependent on a traffic environment. Therefore, it is of great
390
+ significance to determine the relationship between the
391
+ environment
392
+ and
393
+ prediction
394
+ model
395
+ to
396
+ improve
397
+ the
398
+ interpretability of trajectory prediction algorithms and
399
+ determine their limitations. This is essential for safety-critical
400
+ autonomous driving applications. Several works focused on
401
+ modeling and complexity calculation of a traffic environment
402
+ using different methods, such as five- and six-layer scene
403
+ models [48, 49], where layer elements can have a strong
404
+ correlation with the prediction algorithm. Wang et al. [50]
405
+ proposed a method to quantify scenario complexity in traffic
406
+ but did not explore its relationship with the autonomous driving
407
+ algorithm performance. The Shapley value is a feature
408
+ attribution method that helps to measure the contribution of
409
+ input variables to model performance. Makansi et al. [51]
410
+ proposed a variant of Shapley value and analyzed the problems
411
+ that some of the existing trajectory prediction models consider
412
+ only the past trajectory of a TA and are difficult to reason about
413
+ interactions. In addition, recent studies have gradually paid
414
+ attention to the cross-dataset performance of AI algorithms in
415
+ object detection and prediction applications [52, 53]. Gesnouin
416
+ et al. [54] evaluated the impact of differences in pedestrian
417
+ poses and detection box heights in different datasets on
418
+ pedestrian crossing prediction. Gilles et al. [10] compared the
419
+ accuracy of vehicle trajectory prediction algorithms on several
420
+ datasets containing mixed scenarios. However, there has still
421
+ been a lack of comprehensive analysis of traffic environmental
422
+ factors and their changes and quantitative research on their
423
+ impact on prediction algorithms.
424
+ n this work, the research scenario is the intersection, which
425
+ is a typical and challenging urban scenario. Distributional shifts
426
+ between different intersection datasets and their effect on
427
+ trajectory prediction performance, considering both error and
428
+ epistemic uncertainty, are analyzed.
429
+ III. PROPOSED METHOD
430
+ A.
431
+ Trajectory
432
+ Prediction
433
+ with
434
+ Epistemic
435
+ Uncertainty
436
+ Estimation
437
+ 1) Trajectory Prediction
438
+ Trajectory prediction is a task that estimates a TA’s future
439
+ position based on historical data on its state and context in a
440
+ scenario. Particularly, at time
441
+ 0
442
+ t 
443
+ , the historical input state S
444
+ of a TA (over previous
445
+ time steps) is represented as follows:
446
+
447
+
448
+
449
+
450
+
451
+  
452
+ 1
453
+ 2
454
+ 0
455
+ ,
456
+ ,
457
+ ,
458
+ ,
459
+ h
460
+ h
461
+ t
462
+ t
463
+ s
464
+ s
465
+ s
466
+
467
+
468
+
469
+
470
+
471
+  
472
+
473
+ S
474
+
475
+ (1)
476
+ where
477
+ ( )t
478
+ s
479
+ is the state of a TA at t , and it is defined as
480
+ ( )
481
+ ( )
482
+ ( )
483
+ ,
484
+ t
485
+ t
486
+ t
487
+ s
488
+ x
489
+ y
490
+
491
+
492
+  
493
+  .
494
+ In addition, interactions between a TA and its surrounding
495
+ environment are modeled based on scene context information
496
+ C , which includes information on the states of TPs’ around the
497
+ TA and environmental conditions.
498
+ A trajectory prediction model f is trained on dataset
499
+ .
500
+ Based on the input
501
+
502
+
503
+ X = S,C , the trained prediction model
504
+ outputs an estimate ˆY of the real future trajectory Y of the TA
505
+ as follows:
506
+
507
+  
508
+
509
+
510
+
511
+ ˆ
512
+ ˆ =
513
+ ,
514
+ ,
515
+ ,
516
+ f
517
+ f
518
+ f
519
+
520
+
521
+
522
+ Y
523
+ X
524
+ X
525
+ X
526
+
527
+ (2)
528
+ where
529
+  
530
+  
531
+  
532
+ 1
533
+ 2
534
+ ˆ
535
+ ˆ
536
+ ˆ
537
+ ˆ
538
+ [
539
+ ,
540
+ ,
541
+ ,
542
+ ]
543
+ ft
544
+ s
545
+ s
546
+ s
547
+
548
+ Y
549
+ ,
550
+ ft is the predicted horizon, and ˆ
551
+ represents the trained model parameters.
552
+ In this work, the GRIP++, which is an enhanced graph-based
553
+ interaction-aware trajectory prediction method, is used as a base
554
+ model. It uses both fixed and dynamic graphs to describe the
555
+ relationship between different TPs, considering the effect of
556
+ inter-agent interactions on a TA’s motion. Furthermore, this
557
+ method employs a GRU-based encoder-decoder architecture as
558
+ a sub-module and allows joint trajectory predictions for
559
+ multiple agents, achieving good performances in terms of
560
+ prediction speed and accuracy.
561
+ 2) Epistemic Uncertainty Estimation
562
+ In the previous section, a neural network-based trajectory
563
+ prediction model is presented, but the original GRIP++ can
564
+ output only deterministic prediction results. However, real-
565
+ world traffic scenarios are complex and variable, and it is
566
+ difficult to construct a training set that will effectively cover all
567
+ scenarios. In addition, deep learning-based models are
568
+ inherently uncertain and difficult to interpret, so they may not
569
+ ht
570
+
571
+ 4
572
+ ht
573
+ Graph Convolutional Model
574
+ 64
575
+ ht
576
+ n
577
+ Trajectory Prediction Module
578
+ Predicted Trajectories
579
+ prediction
580
+ error
581
+ Random initialization, random shuffling...
582
+ epistemic
583
+ uncertainty
584
+ ADE
585
+ FDE
586
+ APE
587
+ FPE
588
+
589
+ Fig. 2. The trajectory prediction framework with epistemic
590
+ uncertainty estimation (deep ensemble-based method).
591
+
592
+
593
+ be reliable enough when confronted with unknown scenarios
594
+ (e.g., scenarios unseen during training or scenarios with only
595
+ limited available information). These problems can result in
596
+ unacceptable degradation in autonomous driving performance.
597
+ In this regard, the BNN models and learns the posterior
598
+ distribution of network weights
599
+
600
+
601
+ ˆ
602
+ |
603
+ P
604
+
605
+
606
+ , which can be
607
+ used to estimate the epistemic uncertainty as follows:
608
+
609
+
610
+
611
+
612
+  
613
+
614
+ ˆ
615
+ ,
616
+ |
617
+ ,
618
+ P
619
+ |
620
+ ,
621
+ f
622
+ f
623
+ X 
624
+
625
+
626
+ 
627
+ Y
628
+ X
629
+ Y
630
+
631
+ (3)
632
+ where the main issue is how to learn the posterior distribution
633
+ of parameters effectively.
634
+ The Bayesian approximate inference is a typical solution,
635
+ which learns an approximate distribution  
636
+ q  of 
637
+
638
+ P
639
+ |
640
+
641
+ . The
642
+ MC dropout has been shown to be an effective sample-based
643
+ method for approximate inference, where the network weights
644
+ are assumed to follow the Bernoulli distribution. After adding
645
+ appropriate regularization during training and turning on
646
+ dropout during testing, epistemic uncertainty can be estimated
647
+ by sampling multiple times.
648
+ In recent years, deep ensemble, as a simple, parallelizable,
649
+ and scalable method, has shown excellent uncertainty
650
+ estimation ability. In this work, a deep ensemble-based
651
+ uncertainty estimation framework for the trajectory prediction
652
+ model is proposed. Specifically, random initialization of neural
653
+ network parameters and random shuffling of a dataset are
654
+ performed because they have been proven to have enough good
655
+ performance in practice. After training,
656
+ K models of
657
+ isomorphism and different parameters are obtained. Further, by
658
+ integrating the results of
659
+ models, the final trajectory
660
+ prediction output is obtained by,
661
+
662
+
663
+
664
+ 1
665
+ 1
666
+ ˆ
667
+ ˆ =
668
+ ,
669
+ ,
670
+ K
671
+ k
672
+ k
673
+ K
674
+ f
675
+
676
+
677
+ 
678
+ Y
679
+ Y | X
680
+
681
+ (4)
682
+ where ˆ
683
+ k denotes the post-training parameters of the kth model
684
+ among the ensemble models; similarly, in the MC dropout-
685
+ based method, ˆ
686
+ k indicates the model parameters for the kth
687
+ dropout during testing.
688
+ The predictive entropy is employed to quantify the epistemic
689
+ uncertainty of the proposed prediction model, where entropy
690
+ increases with uncertainty. The proposed model outputs K
691
+ continuous trajectories
692
+
693
+
694
+ (1)
695
+ (2)
696
+ ]
697
+ ˆ
698
+ ˆ
699
+ ˆ
700
+ ˆ
701
+ [
702
+ ,
703
+ ,
704
+ ,
705
+ ft
706
+ k
707
+ k
708
+ k
709
+ k
710
+ s
711
+ s
712
+ s
713
+
714
+ Y
715
+ in a prediction task,
716
+ each of which contains the predicted position at multiple future
717
+ moments. To realize a prediction-task-wise uncertainty
718
+ estimation, the predictive entropy at multiple moments is
719
+ integrated to obtain the average predictive entropy (APE) as
720
+ follows:
721
+
722
+
723
+
724
+
725
+
726
+ ( )
727
+ ( )
728
+ ( )
729
+ 1
730
+ 1
731
+ 1
732
+ 1
733
+ ˆ
734
+ ˆ
735
+ ˆ
736
+ ˆ
737
+ A
738
+ .
739
+ PE
740
+ ln
741
+ d
742
+ f
743
+ f
744
+ t
745
+ t
746
+ t
747
+ t
748
+ t
749
+ t
750
+ i
751
+ i
752
+ f
753
+ f
754
+ s
755
+ p s
756
+ p s
757
+ s
758
+ t
759
+ t
760
+
761
+
762
+
763
+
764
+
765
+
766
+
767
+
768
+
769
+
770
+  
771
+
772
+ (5)
773
+ Assuming that
774
+ ( )
775
+ ( )
776
+ ( )
777
+ ˆ
778
+ ˆ
779
+ ˆ
780
+ ,
781
+ t
782
+ t
783
+ t
784
+ s
785
+ x
786
+ y
787
+
788
+
789
+  
790
+  obeys the two-dimensional
791
+ Gaussian distribution,
792
+ ( )
793
+ ˆ t
794
+ x
795
+ and
796
+ ( )
797
+ ˆ t
798
+ y
799
+ are independent of each
800
+ other, and the APE can be expressed as follows:
801
+
802
+  
803
+
804
+
805
+
806
+
807
+ =1
808
+ 2
809
+ ( )
810
+ 2
811
+ ( )
812
+ 1
813
+ 1
814
+ 1
815
+ ˆ
816
+ APE
817
+ =
818
+ (ln2
819
+ 1)
820
+ ln
821
+ 2
822
+ 1
823
+ 1
824
+ ˆ
825
+ ˆ
826
+ (ln2
827
+ 1)
828
+ ln
829
+ .
830
+ 2
831
+ f
832
+ f
833
+ l
834
+ t
835
+ i
836
+ f
837
+ t
838
+ t
839
+ t
840
+ i
841
+ f
842
+ t
843
+ x
844
+ x
845
+ t
846
+
847
+
848
+
849
+
850
+
851
+
852
+
853
+
854
+
855
+
856
+
857
+
858
+
859
+
860
+ (6)
861
+ Similarly, the final predictive entropy (FPE) is defined as,
862
+
863
+
864
+
865
+
866
+
867
+
868
+
869
+
870
+
871
+
872
+
873
+ (
874
+ )
875
+ (
876
+ )
877
+ (
878
+ )
879
+ 2
880
+ 2
881
+ 1
882
+ ˆ
883
+ ˆ
884
+ FPE
885
+ ln2
886
+ 1
887
+ ln
888
+ 2
889
+ 1
890
+ ˆ
891
+ ˆ
892
+ ln2
893
+ 1
894
+ ln
895
+ .
896
+ 2
897
+ f
898
+ f
899
+ f
900
+ f
901
+ t
902
+ t
903
+ t
904
+ t
905
+ s
906
+ x
907
+ x
908
+
909
+
910
+
911
+
912
+
913
+
914
+
915
+
916
+
917
+
918
+
919
+
920
+
921
+
922
+
923
+
924
+
925
+ (7)
926
+ B. Scenario Features Extraction
927
+ In prediction scenarios, a TA’s motion is related to its
928
+ historical state, interactions with surrounding TPs, and other
929
+ factors. Although the existing prediction algorithms have either
930
+ explicitly or implicitly considered different factors, their
931
+ performances may still be affected by the above-mentioned
932
+ features due to algorithm limitations. Therefore, three types of
933
+ scenario features are considered in this work: 1) dynamic
934
+ features of a TA, which include data on its historical or future
935
+ motion states; 2) features of surrounding TPs, which refer to
936
+ their states and interactions with the TA; 3) other scenario
937
+ features, which include the type, behavior pattern, compliance
938
+ with traffic rules, and current location of the TA.
939
+ 1) Kinematic features of TA
940
+ The historical data on the TA motion state denote an
941
+ important input to a prediction model and have a direct impact
942
+ on the model output. In addition, the future motion state of a
943
+ TA is a key reference for evaluating the model’s prediction
944
+ accuracy. Therefore, in this work, the kinematic features of TA
945
+ are extracted to analyze their impact on the prediction algorithm
946
+ performance.
947
+ Velocity is one of the primary kinematic features, which
948
+ directly reflects the aggressiveness of TA movement. It also
949
+ represents the discrete degree of a continuous trajectory.
950
+ Considering the trajectory prediction model characteristics,
951
+ three velocity sub-features are extracted: 1) average velocity of
952
+ the historical trajectory (AVHT), which indicates the
953
+ aggressiveness of the model's input trajectory; 2) current
954
+ velocity (CV), which directly represents a TA’s current state
955
+ and has a key impact on the trajectory prediction output; 3)
956
+ average velocity of the future trajectory (AVFT), which reflects
957
+ the spatial span of the future trajectory points.
958
+ In addition, the velocity variations indicate trajectory
959
+ stationarity, which may have a significant influence on
960
+ prediction results. For instance, a sudden start of a parked
961
+ vehicle may be difficult for the model to predict timely and
962
+ accurately. Therefore, the acceleration value at each moment is
963
+ calculated to obtain the following sub-features: 1) average
964
+ acceleration of the historical trajectory (AAHT), which
965
+ K
966
+
967
+ 5
968
+ represents the speed mutation degree of the input trajectory; 2)
969
+ average acceleration of the future trajectory (AAFT), which
970
+ reflects the overall situation of a TA's future speed mutation; 3)
971
+ maximum acceleration of the future trajectory (MAFT),
972
+ considering that a sudden speed change at any moment can lead
973
+ to severe deformation of the overall trajectory, it is necessary to
974
+ extract the fastest speed change in the future as a feature for
975
+ analysis.
976
+ Similarly, changes in the TA moving direction denote a
977
+ potentially influential factor of prediction performance. For
978
+ instance, a vehicle going straight may suddenly swerve or make
979
+ a U-turn, thus posing a serious challenge to the prediction
980
+ algorithm. Therefore, the heading change speed (HCS) is
981
+ extracted for analysis. In detail, the absolute value of the change
982
+ speed of the heading angle at each moment is calculated and
983
+ used as a basic feature, and then the analysis of the following
984
+ parameters is performed: 1) average HCS of the historical
985
+ trajectory (AHCSHT); 2) average HCS of the future trajectory
986
+ (AHCSFT), which reflects the overall curvature or volatility of
987
+ the future trajectory; 3) maximum HCS of the future trajectory
988
+ (MHCSFT), which increases when there is a sudden large
989
+ change in direction at any point in the future.
990
+ 2) Features of Surrounding TPs
991
+ Convoluted interactions with other agents increase the
992
+ difficulty in trajectory prediction, and although many of the
993
+ existing prediction methods can explicitly or implicitly model
994
+ interactions, it has not been fully discussed whether the
995
+ performance of these black-box models is sensitive to actual
996
+ interactions. To examine this situation, a set of hierarchical
997
+ prediction scenario complexity metrics is proposed to analyze
998
+ the effect of a TA’s interactions with surrounding agents on the
999
+ prediction algorithm performance.
1000
+ First, with a TA as a center, the prediction scenario
1001
+ complexity has a positive correlation with the number of its
1002
+ surrounding TPs, and a basic feature, the number of TPs within
1003
+ x meters from the TA (NTPx), is defined.
1004
+ In addition, the distance between the TA and its surrounding
1005
+ TPs directly affects the prediction scenario complexity.
1006
+ Assuming that a set of TPs within x meters of a TA i is denoted
1007
+ by
1008
+  
1009
+ x
1010
+ N
1011
+ i
1012
+ , then for any
1013
+  
1014
+ x
1015
+ j
1016
+ N
1017
+ i
1018
+
1019
+ , its distance from i is
1020
+
1021
+
1022
+ ,
1023
+ j
1024
+ j
1025
+ i
1026
+ dist s
1027
+ d
1028
+ s
1029
+
1030
+ . The density of TPs within x meters around TA
1031
+ (DTPx) is given by,
1032
+
1033
+  
1034
+ 1
1035
+ DTPx
1036
+ j
1037
+ x
1038
+ N
1039
+ i
1040
+ d
1041
+ j
1042
+ e
1043
+
1044
+
1045
+
1046
+  
1047
+
1048
+ (8)
1049
+ where  is a scaling factor.
1050
+ Furthermore, the potential conflicts due to the movement of
1051
+ surrounding TPs are analyzed. As shown in Fig. 3, for a TP
1052
+  
1053
+ x
1054
+ j
1055
+ N
1056
+ i
1057
+
1058
+ within x meters around a TA i , its current state is
1059
+ given by
1060
+  
1061
+  
1062
+ 0
1063
+ 0
1064
+ [
1065
+ ,
1066
+ ]
1067
+ j
1068
+ j
1069
+ s
1070
+ v
1071
+ ; then, its position after t seconds is expressed
1072
+ as
1073
+  
1074
+  
1075
+ t
1076
+ t
1077
+ j
1078
+ j
1079
+ s
1080
+ v t
1081
+
1082
+ , and the degree of conflict from TPs within x
1083
+ meters around TA (DCTPx) is defined as follows,
1084
+
1085
+  
1086
+
1087
+  
1088
+ T
1089
+ ( )
1090
+ ( )
1091
+ agg
1092
+ 1
1093
+ DCTPx
1094
+ X
1095
+ t
1096
+ t
1097
+ j
1098
+ N
1099
+ i
1100
+ d
1101
+ j
1102
+ e
1103
+
1104
+
1105
+
1106
+
1107
+  
1108
+
1109
+ (9)
1110
+ where
1111
+
1112
+
1113
+ ( )
1114
+ ( )
1115
+ ( )
1116
+ ,
1117
+ t
1118
+ t
1119
+ t
1120
+ j
1121
+ i
1122
+ j
1123
+ d
1124
+ dist s
1125
+ s
1126
+
1127
+ ; T is the time horizon used for
1128
+ evaluation;
1129
+ ( )t
1130
+
1131
+ is the scaling factor for the distance at time t,
1132
+ and in this study, it is set to grow faster over time to reinforce
1133
+
1134
+
1135
+
1136
+
1137
+ location
1138
+ ,
1139
+ velocity
1140
+ ,
1141
+ j
1142
+ j
1143
+ jx
1144
+ jy
1145
+ x
1146
+ y
1147
+ v
1148
+ v
1149
+ 
1150
+ 
1151
+
1152
+
1153
+
1154
+
1155
+ location
1156
+ ,
1157
+ velocity
1158
+ ,
1159
+ i
1160
+ i
1161
+ ix
1162
+ iy
1163
+ x y
1164
+ v
1165
+ v
1166
+ 
1167
+ 
1168
+
1169
+ Fig. 3. Schematic diagram of the conflict degree calculation
1170
+ from TPs within x meters from a TA.
1171
+ (a) Agent type
1172
+ (d) Agent location
1173
+ Stage-1 Stage-2
1174
+ Stage-3
1175
+ Stage-4
1176
+ Stage-5
1177
+ Stage-6
1178
+ gap
1179
+ (c) Compliance with traffic rules
1180
+ Red-light
1181
+ running
1182
+ Yellow-light
1183
+ running
1184
+ Obeying the
1185
+ rules
1186
+ For going straight
1187
+ and turning left
1188
+ vehicles
1189
+ (b) Behavior pattern
1190
+ U-turn
1191
+ Going
1192
+ straight
1193
+ Turning
1194
+ left
1195
+ Turning
1196
+ right
1197
+
1198
+ Fig. 4. Illustration of the other extracted scenario features.
1199
+
1200
+
1201
+ the focus on the short-term risk;
1202
+  
1203
+ T
1204
+ agg
1205
+ represents the
1206
+ aggregation operation, which is used to synthesize the conflicts
1207
+ at T times in the future. The two basic modes used in this study
1208
+ include the mean value (DCTPx_mean) and the maximum
1209
+ value (DCTPx_max).
1210
+ 3) Other Scenario Features
1211
+ In addition to the above two categories of features, the impact
1212
+ of several other representative features on the prediction error
1213
+ and epistemic uncertainty is studied, as shown in Fig. 4.
1214
+ The considered features include:
1215
+  TA type: The GRIP++ can simultaneously predict future
1216
+ trajectories of multiple types of TAs, such as vehicles,
1217
+ pedestrians, and cyclists. Each type of agent has its
1218
+ movement pattern, which may cause different prediction
1219
+ performances. Referring to the research presented in
1220
+ [33], TAs can be divided into four types: small vehicles,
1221
+ vehicles, pedestrians, motorcyclists, and bicyclists;
1222
+  TA behavior pattern: This study mainly focused on three
1223
+ basic behavior patterns of vehicles at intersections:
1224
+ going straight, turning left, and turning right. In addition,
1225
+ this study extracts certain corner cases, such as U-turns.
1226
+ The prediction errors and epistemic uncertainty under
1227
+ different behavioral patterns are compared and analyzed
1228
+ in a unified manner;
1229
+
1230
+ 6
1231
+  TA's compliance with traffic rules: Traffic rules partially
1232
+ constrain the behaviors of participants, but in real-world
1233
+ scenarios, some of TAs may violate the rules, thus
1234
+ affecting the trajectory prediction performance. For
1235
+ instance, in a signalized intersection, the behaviors of
1236
+ TAs can be classified based on their compliance with the
1237
+ traffic signal into obeying the rules, yellow-light running,
1238
+ and red-light running;
1239
+  TA location: The whole process of a vehicle passing
1240
+ through the intersection is divided according to the time
1241
+ sequence into six stages: stage 1: ex-entering an
1242
+ intersection; stage 2: in the gap; stage 3: in the first
1243
+ crosswalk; stage 4: inside an intersection; stage 5: in the
1244
+ last crosswalk; stage 6: exiting an intersection.
1245
+ C. Scenario Features Analysis
1246
+ To analyze the relationship between the above-mentioned
1247
+ features systematically, the qualitative and quantitative analysis
1248
+ methods are adopted. The main methods include feature
1249
+ correlation analysis and feature importance analysis based on
1250
+ random forest regression.
1251
+ 1) Feature Correlation Analysis
1252
+ Correlation analysis is to calculate the degree of correlation
1253
+ between two or more feature variables using correlation
1254
+ coefficients as quantitative indicators. Typical correlation
1255
+ coefficients include the Pearson correlation coefficient and
1256
+ Spearman rank correlation coefficient. The Pearson correlation
1257
+ coefficient requires evaluated variables to conform to the
1258
+ normal distribution, but this is a strong assumption that
1259
+ experimental results can hardly satisfy. In contrast, the
1260
+ Spearman rank correlation coefficient does not have such strict
1261
+ requirements on data as the Pearson correlation. Namely, it
1262
+ requires only that observed values of the two variables are
1263
+ paired rank data or rank data transformed from continuous
1264
+ variable observation data. The Spearman rank coefficient can
1265
+ be mainly used in the monotonic relationship evaluation.
1266
+ Specifically, it is assumed that the original data (
1267
+ ix ,
1268
+ iy ) are
1269
+ arranged in ascending order, and  
1270
+ i
1271
+ R x and  
1272
+ i
1273
+ R y are defined
1274
+ as the ranking of
1275
+ ix and
1276
+ iy in their corresponding data,
1277
+ respectively;
1278
+ ( )
1279
+ R x and
1280
+ ( )
1281
+ R y denote the mean of the ranking of
1282
+ the two groups of data, and n is the number of data pairs. Then,
1283
+ the Spearman rank correlation coefficient
1284
+ can be defined as
1285
+ follows:
1286
+
1287
+  
1288
+
1289
+
1290
+
1291
+
1292
+
1293
+
1294
+  
1295
+
1296
+
1297
+
1298
+
1299
+
1300
+
1301
+  
1302
+
1303
+
1304
+
1305
+
1306
+
1307
+
1308
+ 1
1309
+ 2
1310
+ 2
1311
+ 1
1312
+ 1
1313
+ 2
1314
+ 1
1315
+ 2
1316
+ ( )
1317
+ ( )
1318
+ ( )
1319
+ ( )
1320
+ 6
1321
+ 1
1322
+ .
1323
+ 1
1324
+ n
1325
+ i
1326
+ i
1327
+ i
1328
+ n
1329
+ n
1330
+ i
1331
+ i
1332
+ i
1333
+ i
1334
+ n
1335
+ i
1336
+ i
1337
+ i
1338
+ R x
1339
+ R x
1340
+ R y
1341
+ R y
1342
+ R x
1343
+ R x
1344
+ R y
1345
+ R y
1346
+ R x
1347
+ R y
1348
+ n n
1349
+
1350
+
1351
+
1352
+
1353
+
1354
+
1355
+
1356
+
1357
+
1358
+
1359
+
1360
+
1361
+  
1362
+
1363
+
1364
+
1365
+
1366
+
1367
+
1368
+ (10)
1369
+ 2) Feature Importance Analysis Based on Random Forest
1370
+ Regression
1371
+ Feature correlation analysis can be used to assess linear and
1372
+ ordinal consistent correlations but cannot identify other types
1373
+ of correlations. To address this limitation, this work proposes a
1374
+ feature importance analysis method to evaluate the impacts of
1375
+ different scenario features.
1376
+ The decision tree is a non-parametric supervised learning
1377
+ algorithm that can be used in solving both classification and
1378
+ regression problems. It is a hierarchical tree structure mainly
1379
+ composed of three types of nodes, root, internal, and leaf nodes.
1380
+ Ensemble learning uses multiple models to obtain accurate
1381
+ prediction results, and bootstrapping is one of its typical
1382
+ application techniques that refers to the process of randomly
1383
+ sampling of a sub-dataset through a given number of iterations
1384
+ and variables. Random forest regression combines ensemble
1385
+ learning with the decision tree framework, creating multiple
1386
+ decision trees from data; then, multiple outputs are averaged to
1387
+ obtain the final result, often achieving excellent performance
1388
+ for regression problems.
1389
+ Random forest regression can be used to evaluate feature
1390
+ importance. Particularly, in this study, the extracted scenario
1391
+ features are regarded as independent variables, while the
1392
+ prediction error and epistemic uncertainty of the prediction
1393
+ model under the corresponding conditions are regarded as
1394
+ dependent variables, and a random forest regression model is
1395
+ constructed. Then, the contribution of each feature to the trees
1396
+ in the random forest is analyzed, as well as its importance to the
1397
+ performance of trajectory prediction. The variable importance
1398
+ measure is denoted as VIM, and it is assumed that there are J
1399
+ features and I decision trees. Then, VIM j denotes the average
1400
+ change in node split impurity of the jth feature in all decision
1401
+ trees, and it is calculated by:
1402
+
1403
+  
1404
+  
1405
+ 1
1406
+ '
1407
+ ' 1
1408
+ 1
1409
+ VIM
1410
+ VIM =
1411
+ ,
1412
+ VIM
1413
+ I
1414
+ i
1415
+ j
1416
+ i
1417
+ j
1418
+ J
1419
+ I
1420
+ i
1421
+ j
1422
+ j
1423
+ i
1424
+
1425
+
1426
+
1427
+
1428
+ 
1429
+
1430
+ (11)
1431
+ where
1432
+  
1433
+ VIM
1434
+ i
1435
+ j represents the importance of the jth feature in the
1436
+ ith decision tree, and it can be obtained by calculating the
1437
+ difference of Gini indices of nodes before and after branching.
1438
+ D. Prediction across Different Intersection Datasets
1439
+ The cross-dataset analysis aims to analyze differences in
1440
+ scenarios between multiple datasets and the corresponding
1441
+ prediction algorithm performance disparity. In this study, the
1442
+ scenario type is limited to the intersection, and multiple
1443
+ intersection datasets involving various countries are studied.
1444
+ First, the scenario features are extracted to analyze
1445
+ distributional shifts between different intersection datasets.
1446
+ Next,
1447
+ comprehensive
1448
+ cross-validation
1449
+ experiments
1450
+ are
1451
+ performed to investigate the prediction algorithm performance
1452
+ in terms of distributional shifts fully. Particularly, N
1453
+ intersection datasets are selected, and each of them is divided
1454
+ into training and test subsets. Then, for each of the training
1455
+ subsets, a trajectory prediction model is developed and trained
1456
+ using the training subset first and then evaluated on the
1457
+ corresponding test subset. Finally,
1458
+ 2
1459
+ N sets of results are
1460
+ obtained.
1461
+ During the analysis, the following factors are mainly studied:
1462
+ 1) Trajectory prediction performance degradation due to
1463
+ distributional shifts: Combined with the differences in
1464
+ statistical features between different datasets obtained
1465
+ earlier, we analyze the impact of changes in the traffic
1466
+ environment on the prediction algorithm.
1467
+
1468
+
1469
+ 7
1470
+ 2) Effect of the deep ensemble on prediction robustness
1471
+ across different datasets: The improvement in prediction
1472
+ accuracy and sensitivity of the estimated epistemic
1473
+ uncertainty to distributional shifts are analyzed;
1474
+ 3) Availability and complexity of different intersection
1475
+ datasets for trajectory prediction: By synthesizing
1476
+ multiple groups of results, the model performance is
1477
+ evaluated using different intersection datasets as a
1478
+ training set and the prediction challenge with different
1479
+ intersection datasets as a test set.
1480
+ IV. EXPERIMENTAL SETUP
1481
+ A. Intersection Datasets
1482
+ Focusing on the urban intersection scenario, multiple
1483
+ trajectory datasets were used for evaluation and analysis,
1484
+ involving different periods, weather, countries and regions, and
1485
+ many TP types.
1486
+ 1) SinD [55]: The SinD dataset is a typical drone dataset
1487
+ collected from a signalized intersection in Tianjin, China. These
1488
+ data were recorded from a static bird’s eye view at a sampling
1489
+ frequency of 10 Hz. This dataset contains about 420 minutes of
1490
+ traffic recordings, including over 13,000 TPs with seven types,
1491
+ including cars, trucks, buses, pedestrians, tricycles, bikes, and
1492
+ motorcycles;
1493
+ 2) INTERACTION [29]: The INTERACTION dataset contains
1494
+ 12 subsets covering merging, roundabout, and intersection
1495
+ scenarios, of which five intersection subsets are used in this
1496
+ study: USA_Intersection_EP1 (EP1), USA_Intersection_EP2
1497
+ (EP2), USA_Intersection_MA (MA), USA_Intersection_GL
1498
+ (GL) and TC_Intersection_VA (VA). They contain about 493
1499
+ minutes of recordings in total. The first four relate to
1500
+ unsignalized intersections in the US, mainly involving
1501
+ trajectories of vehicles, pedestrians, and bicycles recorded by
1502
+ drones. The VA denotes a signalized intersection in Bulgaria,
1503
+ which involves trajectories of cars, buses, trucks, motorcycles,
1504
+ and bicycles recorded by traffic cameras.
1505
+ B. Prediction Error Metrics
1506
+ The prediction error is a preferred metric for quantifying the
1507
+ performance of prediction models. Following [2, 8, 25], the
1508
+ proposed model was evaluated using two error metrics:
1509
+ 1) Average Displacement Error (ADE): This is the mean square
1510
+ error of all predicted points of a trajectory compared to the
1511
+ ground truth;
1512
+ 2) Final Displacement Error (FDE): This is the distance
1513
+ between the predicted final destination and the true final
1514
+ destination at
1515
+ .
1516
+ C. Predictive Uncertainty Evaluation
1517
+ As stated previously, the APE and FPE reflect the epistemic
1518
+ uncertainty of a prediction model, which can indicate situations
1519
+ where prediction models are performing poorly. Therefore,
1520
+ referring to [56, 57], this study uses the error-retention curves
1521
+ to evaluate the ability of the extracted epistemic uncertainty to
1522
+ detect prediction errors. The curves depict the error over a
1523
+ dataset as a model’s predictions are replaced by ground-truth
1524
+ labels in order of decreasing uncertainty. The abscissa value of
1525
+ a point represents the proportion of the retained true error (i.e.,
1526
+ retention fraction), while the ordinate value represents the
1527
+ comprehensive error under this proportion. Similarly, the
1528
+ optimal and random curves are obtained by replacing the
1529
+ predictions in order of decreasing error and random order,
1530
+ respectively. The area under the retention curves (AUC) is an
1531
+ evaluation metric of both the robustness of prediction models
1532
+ and the quality of uncertainty estimation, and an efficient
1533
+ uncertainty estimation is considered to achieve a low AUC.
1534
+ D. Implementation Details
1535
+ For achieving fair evaluation and transferability, the datasets
1536
+ were standardized to use up to 3 s of the previous data and 3 s
1537
+ of the future data. The trajectory data were resampled to 2 Hz.
1538
+ The single GRIP++ model in the ensemble models was
1539
+ implemented in PyTorch, and its implementation details,
1540
+ including input preprocessing, graph convolution, and
1541
+ trajectory prediction model, mainly refer to the settings in [5].
1542
+ In the implementation of MC dropout and deep ensemble, the
1543
+ value of k was set to five, which was the result of a trade-off
1544
+ between uncertainty estimation quality and computational cost
1545
+ [45]. In addition, during the training process of the MC dropout-
1546
+ model, a regularization term was added to the loss to improve
1547
+ its ability of uncertainty estimation [39], where the
1548
+ regularization coefficient was set to 0.0001, and the dropout
1549
+ rate was set to 0.5
1550
+ In addition, the original dataset was further processed to
1551
+ obtain the labels for the subsequent analysis. The locations of
1552
+ TAs were classified by combining their raw coordinate data
1553
+ with the map in the Lanelet2 format [58].
1554
+ V. RESULTS AND DISCUSSION
1555
+ A. Evaluation of Trajectory Prediction and Epistemic
1556
+ Uncertainty Estimation
1557
+ The training and test performances of the proposed model
1558
+ obtained by following the train-test process in the same
1559
+ intersection dataset are presented in TABLE I. Although the
1560
+ MC dropout can be used to estimate epistemic uncertainty, it
1561
+ increases the prediction error, which might be due to the
1562
+ modifications in the original loss function. In contrast, the deep
1563
+ ensemble-based
1564
+ method
1565
+ improves
1566
+ trajectory
1567
+ prediction
1568
+ accuracy while estimating epistemic uncertainty. As shown in
1569
+ TABLE I, the error obtained by the deep ensemble-based
1570
+ method was lower than that of the single models. Thus, by
1571
+ integrating the results of multiple models, deep ensemble could
1572
+ effectively avoid the prediction performance degradation
1573
+ caused by the deviation of a single model, which is conducive
1574
+ to improving the prediction algorithm robustness. The
1575
+ evaluation results of the estimated epistemic uncertainty are
1576
+ shown in Fig. 5. Compared with the MC dropout, the deep
1577
+ ensemble had obvious advantages in improving the model
1578
+ prediction accuracy and uncertainty estimation. Therefore, in
1579
+ the subsequent analysis, the epistemic uncertainty estimation
1580
+ framework based on the deep ensemble was adopted.
1581
+ As shown in Fig. 5, both uncertainty quantification metrics
1582
+ (i.e., APE and FPE) could accurately reflect the prediction
1583
+ model error (i.e., ADE or FDE), and they showed a high degree
1584
+ of consistency. By comparing the left and right sides of Fig. 5,
1585
+ it can be concluded that although the prediction error on the test
1586
+ sets was slightly increased compared to that on the training set,
1587
+ there was a small difference in the epistemic uncertainty
1588
+ ft
1589
+
1590
+ 1
1591
+ TABLE I
1592
+ TRAJECTORY PREDICTION ERROR COMPARISON1
1593
+ Dataset
1594
+ ADE1/FDE1
1595
+ ADE1/FDE1
1596
+ ADE1/FDE1
1597
+ ADE1/FDE1
1598
+ ADE1/FDE1
1599
+ ADEdropout/FDEdropout
1600
+ ADE/FDE
1601
+ SinD
1602
+ 0.405/0.865
1603
+ 0.404/0.865
1604
+ 0.402/0.86
1605
+ 0.403/0.861
1606
+ 0.408/0.872
1607
+ 0.477/1.021
1608
+ 0.389/0.832
1609
+ VA
1610
+ 0.652/1.401
1611
+ 0.641/1.378
1612
+ 0.655/1.428
1613
+ 0.657/1.421
1614
+ 0.654/1.402
1615
+ 0.651/1.327
1616
+ 0.615/1.327
1617
+ EP0
1618
+ 0.811/1.822
1619
+ 0.815/1.844
1620
+ 0.803/1.809
1621
+ 0.809/1.814
1622
+ 0.822/1.850
1623
+ 1.036/2.351
1624
+ 0.745/1.678
1625
+ EP1
1626
+ 0.881/1.982
1627
+ 0.842/1.894
1628
+ 0.816/1.826
1629
+ 0.853/1.915
1630
+ 0.857/1.930
1631
+ 1.147/2.590
1632
+ 0.775/1.743
1633
+ MA
1634
+ 0.878/2.026
1635
+ 0.857/1.979
1636
+ 0.866//1.999
1637
+ 0.867/2.000
1638
+ 0.870/2.008
1639
+ 1.083/2.546
1640
+ 0.811//1.879
1641
+ GL
1642
+ 0.619/1.448
1643
+ 0.627/1.464
1644
+ 0.622/1.452
1645
+ 0.625/1.458
1646
+ 0.627/1.466
1647
+ 0.709/1.646
1648
+ 0.591/1.386
1649
+
1650
+ (a) ADE for training set
1651
+ (b) FDE for training set
1652
+ (c) APE for test set
1653
+ (d) FPE for test set
1654
+
1655
+ Fig. 5. The ADE/FDE-retention curves (top) and retention scores curves (bottom) on the training and test sets of the SinD dataset.
1656
+ The optimal curve (solid green line) was obtained by replacing the model's predictions with the ground-truth labels in order of
1657
+ decreasing error. Similarly, the random curve (blue dotted line) was obtained by replacing the model’s predictions with the ground-
1658
+ truth labels in random order. The red and yellow solid lines correspond to the results captured in order of decreasing APE and
1659
+ decreasing FPE, respectively. The retention scores corresponding to each retention fraction can be calculated by: (errorrandom –
1660
+ erroruncertainty)/(errorrandom – erroroptimal).
1661
+
1662
+
1663
+ estimation performance. The results indicate that the deep
1664
+ ensemble-based method had good generalization ability
1665
+ In the second row in Fig. 5, a consistent trend where the
1666
+ retention scores first increase and then decrease with the
1667
+ retention fraction can be observed.
1668
+ B. Scenario Features Analysis Results
1669
+ 1) Feature Correlation Comparison
1670
+ In general, it has been considered that scenario complexity
1671
+ increases with the values of the extracted TA’s kinematic
1672
+ features and the features of the TA’s surrounding TPs.
1673
+ Therefore, the correlation between the model performance and
1674
+ these two types of features was calculated to analyze the
1675
+ influence of scenario complexity on trajectory prediction
1676
+ performance. Based on the model trained on the SinD training
1677
+ set, the feature correlation analysis experiment was performed
1678
+ on the SinD test set, where the prediction performance was
1679
+
1680
+ 1 ADEk/FDEk represents the prediction error of model k among the ensemble models, ADEdropout/FDEdropout is the prediction error of the mc dropout-based
1681
+ method, and ADE/FDE denotes the prediction error of the deep ensemble-based method.
1682
+ represented by prediction error and epistemic uncertainty. For
1683
+ the features of the TA’s surrounding TPs, four groups of
1684
+ distances of x = 10, 20, 30, 50 were studied. The analysis results
1685
+ are presented in Fig. 6, and based on them, the following
1686
+ conclusions can be drawn:
1687
+
1688
+ The distribution trends of environmental feature
1689
+ correlations corresponding to the two types of prediction
1690
+ errors (ADE and FDE) were highly consistent, as well as
1691
+ the
1692
+ distribution
1693
+ trends
1694
+ of
1695
+ environmental
1696
+ feature
1697
+ correlations corresponding to the two types of epistemic
1698
+ uncertainty (APE and FPE) estimates;
1699
+
1700
+ The comparison of a TA’s kinematic features with the
1701
+ features of its surrounding TPs shows that the former had
1702
+ a strong positive correlation with the error and epistemic
1703
+ uncertainty of the prediction model, while the latter had
1704
+ weak correlations with the error and epistemic uncertainty
1705
+ (-0.2 <  < 0.2).
1706
+
1707
+ 1
1708
+
1709
+ Fig. 6. Comparison of the correlation between prediction model performance and scenario features
1710
+
1711
+
1712
+
1713
+ The comparison of the correlation between different
1714
+ kinematic features and the prediction error shows that:
1715
+
1716
+ The sorting order in terms of the correlation was:
1717
+ acceleration-related features > velocity-related
1718
+ features > heading change speed-related features.
1719
+ This order indicates that the mutation of a TA’s
1720
+ speed had a relatively large impact on the prediction
1721
+ error, while the change in the TA’s movement
1722
+ direction had a relatively low impact;
1723
+
1724
+ The sorting order in terms of the correlation was:
1725
+ features related to future trajectories > features
1726
+ related to historical trajectories. This shows that the
1727
+ proposed trajectory prediction model had low
1728
+ adaptability to the speed and position mutations
1729
+ occurring at some certain points in the future.
1730
+
1731
+ The correlation between different kinematic sub-features
1732
+ of a TA and the predictive uncertainty showed that the
1733
+ epistemic uncertainty was highly sensitive to the velocity
1734
+ and acceleration features; namely, when a TA was driving
1735
+ at high speed or had a speed mutation, the model tended
1736
+ to show lower confidence in the predictions.
1737
+ 2) Feature Importance Comparison
1738
+ As mentioned above, the feature correlation analysis only
1739
+ shows whether the relationship between two variables conforms
1740
+ to the order consistency. Therefore, the feature importance
1741
+ analysis experiment was performed based on the random forest
1742
+ regression to explore whether there were other types of
1743
+ correlation between the above scenario features and the
1744
+ prediction model. The datasets and training settings used for the
1745
+ prediction algorithm were the same as in the feature correlation
1746
+ analysis. The grid-based search was employed to obtain optimal
1747
+ random forest regression model, then the feature importance
1748
+ analysis was performed. The results are presented in Fig. 7.
1749
+ As shown in Fig. 7, the distribution trend of feature
1750
+ importance was basically consistent with the feature correlation.
1751
+ For instance, the features obtained from the surrounding TPs
1752
+ had little effect on the error and uncertainty of the prediction
1753
+ model uniformly. In contrast, the kinematic features of a TA
1754
+ had a stronger influence, where velocity- and acceleration-
1755
+ related features had higher importance. In random forest
1756
+ regression for the ADE, the AAFT had the highest importance,
1757
+
1758
+ Fig. 7. Comparison of feature importance based on the random
1759
+ forest regression
1760
+
1761
+ while in the random forest regression for the APE, the CV had
1762
+ the strongest influence.
1763
+ 3) Other Scenario Features Analysis
1764
+ In addition to the above-mentioned features, the impacts of
1765
+ several other environmental features on the prediction
1766
+ algorithm performance were explored, including the type,
1767
+ behavior patterns, compliance with traffic rules, and location of
1768
+ a TA. Without loss of generality, the ADE was adopted as an
1769
+ error metric, and the APE was used for epistemic uncertainty
1770
+ quantification. The prediction model was trained on the SinD
1771
+ training set and analyzed on the SinD test set
1772
+ The results indicated obvious differences in the prediction
1773
+ error distribution between different TAs, as shown in Fig. 8.
1774
+ Although the movement of pedestrians had high degrees of
1775
+ freedom and randomness, their speed and acceleration were
1776
+ generally low, so the corresponding prediction error was small.
1777
+ Meanwhile, the epistemic uncertainty distribution for different
1778
+ types of TAs showed high similarity with that of the prediction
1779
+ error.
1780
+ The results of the trajectory prediction error and epistemic
1781
+ uncertainty of a vehicle under different behavior patterns are
1782
+ presented in Fig. 9, where it can be seen that the trajectory
1783
+ prediction performance tended to exhibit larger errors when the
1784
+ TA was turning left and right compared to the going-straight
1785
+ behavior. The error in the right-turn scenario was relatively
1786
+ (a) ρ for ADE
1787
+ (b) ρ for FDE
1788
+ (a) ρ for APE
1789
+ (b) ρ for FPE
1790
+ (a) feature importance for ADE (b) feature importance for APE
1791
+
1792
+ 2
1793
+
1794
+ Fig. 8. The results of the trajectory prediction error and
1795
+ epistemic uncertainty of different TA types; sv: small vehicle,
1796
+ bv: large vehicle; bi: motorcyclist or bicyclist; pe: pedestrian.
1797
+
1798
+ Fig. 9. The results of the trajectory prediction error and
1799
+ epistemic uncertainty under different behavioral patterns.
1800
+
1801
+
1802
+ Fig. 10. The results of the trajectory prediction error and
1803
+ epistemic uncertainty under different traffic rule compliance.
1804
+
1805
+ Fig. 11. The results of the trajectory prediction error and
1806
+ epistemic uncertainty at different locations; 1: ex-entering the
1807
+ intersection; 2: in the gap; 3: in the first crosswalk; 4: inside the
1808
+ intersection; 5: in the last crosswalk; and 6: exiting the
1809
+ intersection.
1810
+
1811
+ large, and the reasons may be as follows. First, the right-turn
1812
+ trajectory had a large curvature, and second, the vehicle was
1813
+ less affected by traffic lights and other TPs when turning right,
1814
+ compared to turning left and going straight, resulting in a higher
1815
+ driving speed. In addition, although the U-Turn represents a
1816
+ typical corner case, the results showed that the overall error in
1817
+ this pattern was small, which may be related to the generally
1818
+ low speed during the U-turning process. Furthermore, the
1819
+ epistemic uncertainty distributions under different behavioral
1820
+ patterns were relatively consistent with the error.
1821
+ The relationship between the vehicles’ compliance with
1822
+ traffic lights and the trajectory prediction performance is
1823
+ presented in Fig. 10, where it can be seen that the prediction
1824
+ error was larger when the vehicle ran red or yellow light than
1825
+ when there was no violation of traffic lights, and
1826
+ simultaneously the proposed model could output higher
1827
+ epistemic uncertainty.
1828
+ The impact of a TA’s location on the trajectory prediction
1829
+ performance is presented in Fig. 11. When the vehicle was in
1830
+ the gap area or first crosswalk before entering the intersection,
1831
+ there were many possible strategic options, referring to whether
1832
+ to enter the intersection and how to pass through the
1833
+ intersection, which increased the prediction complexity, and
1834
+ further increased the prediction error and epistemic uncertainty.
1835
+ When the vehicle was inside the intersection, the prediction
1836
+ model exhibited considerable error and uncertainty due to a
1837
+ large number of interactions with other TPs and higher freedom
1838
+ of movement. In contrast, the predominant behavior of the
1839
+ vehicles before entering and after exiting the intersection was
1840
+ to follow the lane, so these stages had lower prediction error
1841
+ and uncertainty than the others.
1842
+ C. Prediction evaluation across Different Intersection Datasets
1843
+ Different intersection datasets were collected at different
1844
+ times and locations, and the corresponding environmental
1845
+ conditions might be relatively different, resulting in shifts in
1846
+ data distribution. The distributions of velocity, acceleration,
1847
+ heading, and HCS of objects in six intersection datasets are
1848
+ presented in Fig. 12, where it can be seen that there were
1849
+ obvious differences in the trajectory features between the
1850
+ datasets. For instance, the velocity and acceleration of a portion
1851
+ of trajectories in the SinD dataset were concentrated around
1852
+ zero. One of the main reasons was the stopping of vehicles and
1853
+ pedestrians while waiting for the green light. Furthermore, the
1854
+ velocity in the SinD dataset exhibited a distinct multimodal
1855
+ distribution, which could be related to the multiple movement
1856
+ patterns caused by various TPs in the dataset. In contrast, the
1857
+ velocity and acceleration in the GL, MA, and VA datasets
1858
+ tended to be higher, reflecting more aggressive motions in these
1859
+ datasets. In addition, distributional shifts could also be observed
1860
+ by comparing the distribution of heading and its speed of
1861
+ change in different datasets.
1862
+ The aforementioned differences in data distribution between
1863
+ datasets may bring application challenges of the trajectory
1864
+ prediction algorithms in real-world environments. Therefore,
1865
+ experiments were performed on multiple intersection datasets.
1866
+ Specifically, based on the six intersection datasets mentioned
1867
+ above, a set of deep ensemble-based prediction models were
1868
+ trained on each dataset and evaluated on all six datasets. As
1869
+ shown in Fig. 13, distributional shifts in the real-traffic
1870
+
1871
+ 1
1872
+
1873
+ Fig. 12. Distribution comparison of different intersection datasets.
1874
+ (a) ADE1
1875
+ (b) ADE
1876
+ (c) APE
1877
+
1878
+ Fig. 13. The cross-dataset error and uncertainty matrix: (a) ADE1 is the error obtained by evaluating one of the ensemble models;
1879
+ (b) ADE is the prediction error of the deep ensemble-based model; (c) APE also relates to the deep ensemble-based model. The
1880
+ ith row and jth column of each matrix represent the results obtained by evaluating the model on the test subset at intersection j
1881
+ after training it on the training subset at intersection i.
1882
+
1883
+
1884
+ Fig. 14. Comprehensive performances of the prediction
1885
+ algorithms on different datasets. (a) Comparison of prediction
1886
+ errors of all trained models on different test subsets; (b) results
1887
+ of evaluating models trained on different training subsets on all
1888
+ test subsets.
1889
+
1890
+ environments had a strong impact on trajectory prediction
1891
+ performance. Even for the same type of scenario, for the model
1892
+ trained on one intersection dataset, it was difficult to generalize
1893
+ well to other intersection datasets directly. For instance, on the
1894
+ test subset of the SinD dataset, the model that achieved the best
1895
+ accuracy (ADE1/ADE: 0.405/0.389) was trained on the training
1896
+ subset of the SinD dataset; in contrast, the prediction error
1897
+ (ADE1/ADE) of the model trained on the other intersection
1898
+ training subsets increased by 94.9%/8.61% - 265.0%/221.0%.
1899
+ Comparing the single prediction model error (Fig. 13(a))
1900
+ with the error of the deep ensemble-based model (Fig. 13(b)),
1901
+ it could be concluded that the deep ensemble-based approach
1902
+ performed systematically better than a single model, achieving
1903
+ significant improvements in many cases.
1904
+ As presented in Fig. 13(c), the extracted epistemic
1905
+ uncertainty could indicate distributional shifts between
1906
+ different datasets. Particularly, the proposed model could
1907
+ output higher epistemic uncertainty when the error increased
1908
+ due to changes in the test scenario.
1909
+ In Fig. 14, the comprehensive performances of the trajectory
1910
+ prediction algorithm on specific single training or test set are
1911
+ presented. As shown in Fig. 14(a), the models trained on the
1912
+ training subsets of the SinD and GL datasets had better
1913
+ generalization ability than the other models. This could be
1914
+ because of a larger amount of data and more diverse motion
1915
+ patterns of these two datasets compared to the other datasets.
1916
+ Conversely, the overall error of the model based on the training
1917
+ subset of VA was the highest, and the main reasons were as
1918
+ follows. First, this dataset contained less data than the other
1919
+ datasets. Second, this dataset was constructed by data collected
1920
+ by roadside equipment, which might introduce more noise than
1921
+ drone-based data collection. The comprehensive performances
1922
+ of the prediction models on different intersection test subsets
1923
+ are presented in Fig. 14(b). The GL and MA with higher
1924
+ velocity and acceleration features showed greater prediction
1925
+ difficulty, and the overall trajectory prediction error on the
1926
+ SinD test subset was the smallest among all datasets.
1927
+ D. Qualitative Results
1928
+ The prediction results of the proposed framework in several
1929
+ scenarios on different intersection datasets are presented in Fig.
1930
+ 15, where each row corresponds to one intersection. In Fig. 15,
1931
+
1932
+ isolg
1933
+ 0
1934
+ 2
1935
+ or
1936
+ J2
1937
+ 50
1938
+ 52
1939
+ 00.0
1940
+ 20.0
1941
+ 0'T0
1942
+ 0'T2
1943
+ AM
1944
+ 0'52
1945
+ EbJ
1946
+ Ebo
1947
+ 0E.0
1948
+ AV
1949
+ 2E.0
1950
+ 1 2UD
1951
+ 926b2HC
1952
+ 00.0
1953
+ 0'52
1954
+ 0'20
1955
+ 0'>2
1956
+ J'00
1957
+ J'52
1958
+ J'32
1959
+ 5'00
1960
+ 0
1961
+ AM
1962
+ 3
1963
+ Eb
1964
+ Ebo
1965
+ AV
1966
+ 2!UD
1967
+ J926J6bnoit19l96
1968
+ 0
1969
+ e
1970
+ 8
1971
+ JO
1972
+ 00.0
1973
+ 0'52
1974
+ 0'20
1975
+ AM
1976
+ J'S2
1977
+ EbJ
1978
+ Ebo
1979
+ J'20
1980
+ AV
1981
+ 2IUD
1982
+ J'>2
1983
+ 926b-5
1984
+ 0
1985
+ A
1986
+ 0.0
1987
+ S.0
1988
+ 0'4
1989
+ D6U
1990
+ aer
1991
+ AM
1992
+ EbJ
1993
+ 8.0
1994
+ Ebo
1995
+ AV
1996
+ J'O
1997
+ 2!UD
1998
+ J926J6b1
1999
+ SinD
2000
+ VA
2001
+ EP0
2002
+ EP1
2003
+ MA
2004
+ GL
2005
+
2006
+ Fig. 15. Qualitative results of trajectory prediction and uncertainty estimation on different datasets (corresponding to different
2007
+ rows). The gray thick solid line represents the historical trajectory, and the black thin solid line represents the true future trajectory.
2008
+ Different colors are used to denote predictions for different types of TAs: blue - small vehicle; magenta - large vehicle; yellow –
2009
+ pedestrian; green - motorcycle or cyclist. In addition, the focused object in each subgraph is highlighted in red, and the current
2010
+ prediction error and uncertainty estimation results of the object are presented above the subgraph.
2011
+
2012
+ nipnonipno1..1
2013
+ the first column shows cases where the prediction error was
2014
+ small and epistemic uncertainty was low. These cases generally
2015
+ appeared when the TA exhibited obvious future intentions and
2016
+ moved relatively smoothly. The second and third columns show
2017
+ scenarios with large trajectory prediction errors, which were
2018
+ generally accompanied by higher estimates of epistemic
2019
+ uncertainty. This situation may occur when the TA was about
2020
+ to enter the intersection where it was difficult to determine its
2021
+ future behavior pattern, or its future motion showed a large
2022
+ pattern or speed change compared to the historical trajectory.
2023
+ VI. CONCLUSION
2024
+ In this paper, a trajectory prediction framework that
2025
+ integrates the epistemic uncertainty estimation function is
2026
+ proposed, and the effects of the traffic environment and its
2027
+ changes on the prediction algorithm performance are studied. A
2028
+ few typical scenario features are considered, and their
2029
+ influences on the prediction performance are examined by the
2030
+ feature correlation and importance analyses. Further, the
2031
+ distributional shifts between different intersection datasets and
2032
+ the resulting performance degradation of the prediction model
2033
+ are analyzed. Based on the obtained results, the following
2034
+ conclusions are drawn:
2035
+ (1) The extracted epistemic uncertainty is valuable for
2036
+ representing the model's confidence in its current predictions
2037
+ accurately, which has the potential to be used to identify
2038
+ unknown scenarios where the model may be underpowered.
2039
+ Compared with the MC dropout-based method, the deep
2040
+ ensemble-based method performs significantly better in
2041
+ estimating epistemic uncertainty and improving the trajectory
2042
+ prediction robustness;
2043
+ (2) Regarding the influence of different scenario features on
2044
+ the trajectory prediction performance, the feature correlation
2045
+ and importance analyses show similar results. Namely, there is
2046
+ a positive correlation between the kinematics of a TA and the
2047
+ prediction model performance. Higher velocity, acceleration,
2048
+ and speed of the heading change generally pose a greater
2049
+ challenge to the trajectory prediction process, while a prediction
2050
+ model tends to exhibit higher epistemic uncertainty. However,
2051
+ one interesting finding is that the features of surrounding TPs,
2052
+ which reflect the complexity of interactions in the scenario,
2053
+ show little impact on the proposed prediction model
2054
+ performance. In addition, the error and uncertainty of the
2055
+ prediction model vary with other abstract features, such as TA’s
2056
+ type, behavior pattern, compliance with traffic rules, and
2057
+ location. The conducted analyses are helpful in locating the
2058
+ limitations in the prediction algorithms, thus providing
2059
+ guidance for the improvement of autonomous driving functions;
2060
+ (3) For the intersection scenario, different datasets show
2061
+ distributional shifts due to differences in local driving habits,
2062
+ road structures, and national cultures, thus posing great
2063
+ challenges to the prediction algorithms. Fortunately, the
2064
+ proposed framework based on the deep ensemble is beneficial
2065
+ to improving the trajectory prediction robustness, and the
2066
+ extracted epistemic uncertainty can respond to the reduced
2067
+ confidence of the proposed model in a new environment. This
2068
+ improves the self-awareness ability of autonomous driving.
2069
+ Although the used basic prediction algorithm has strong
2070
+ representativeness, it is still difficult to avoid the specificity of
2071
+ analysis conclusions completely. However, the proposed
2072
+ method is promising to analyze other prediction algorithms,
2073
+ subsequent work could consider combining more types of
2074
+ algorithms for systematic analysis. Moreover, this work focuses
2075
+ on the extraction and analysis of epistemic uncertainty, but the
2076
+ existing works in the field of multimodal trajectory forecasting
2077
+ could be considered in the follow-up research to distinguish the
2078
+ epistemic uncertainty from the aleatoric uncertainty better and
2079
+ explore their practical significance. Furthermore, the role of
2080
+ uncertainty estimation of a trajectory prediction model in an
2081
+ autonomous driving decision-making mechanism needs to be
2082
+ studied further to improve the robustness against the risks of
2083
+ insufficient functions.
2084
+
2085
+ ACKNOWLEDGMENT
2086
+ This work was supported in part by the National Science
2087
+ Foundation of China Project (Grant No. 52072215 and
2088
+ U1964203), and the National Key R&D Program of China
2089
+ under Grant NO. 2020YFB1600303.
2090
+ REFERENCES
2091
+ [1] K. Xu, X. Xiao, J. Miao, and Q. Luo, "Data Driven Prediction Architecture
2092
+ for Autonomous Driving and its Application on Apollo Platform," in 2020
2093
+ IEEE Intelligent Vehicles Symposium (IV), 19 Oct.-13 Nov. 2020 2020, pp.
2094
+ 175-181, doi: 10.1109/IV47402.2020.9304810.
2095
+ [2] X. Mo, Z. Huang, Y. Xing, and C. Lv, "Multi-Agent Trajectory Prediction
2096
+ With Heterogeneous Edge-Enhanced Graph Attention Network," IEEE
2097
+ TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,
2098
+ Article Early Access 2022, doi: 10.1109/TITS.2022.3146300.
2099
+ [3] A. Rudenko, L. Palmieri, M. Herman, K. M. Kitani, D. M. Gavrila, and K.
2100
+ O.
2101
+ Arras,
2102
+ "Human
2103
+ motion
2104
+ trajectory
2105
+ prediction:
2106
+ a
2107
+ survey,"
2108
+ INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH, Article vol.
2109
+ 39, no. 8, pp. 895-935, 2020 JUL 2020, Art no. 0278364920917446, doi:
2110
+ 10.1177/0278364920917446.
2111
+ [4] J. Gu, C. Sun, H. Zhao, and Ieee, "DenseTNT: End-to-end Trajectory
2112
+ Prediction from Dense Goal Sets," presented at the 2021 IEEE/CVF
2113
+ INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV
2114
+ 2021), 2021, 2021, Proceedings Paper.
2115
+ [5] X. Li, X. Ying, and M. C. Chuah, "Grip++: Enhanced graph-based
2116
+ interaction-aware trajectory prediction for autonomous driving," arXiv
2117
+ preprint arXiv:1907.07792, 2019.
2118
+ [6] T. Salzmann, B. Ivanovic, P. Chakravarty, and M. Pavone, Trajectron++:
2119
+ Dynamically-Feasible Trajectory Forecasting with Heterogeneous Data
2120
+ (Computer Vision - ECCV 2020. 16th European Conference. Proceedings.
2121
+ Lecture Notes in Computer Science (LNCS 12363)). 2020, pp. 683-700.
2122
+ [7] L. E. Plaza, "Collision Between Vehicle Controlled by Developmental
2123
+ Automated
2124
+ Driving
2125
+ System
2126
+ and
2127
+ Pedestrian,"
2128
+ PB2019-101402,
2129
+ 2018/03/18/ 2018.
2130
+ [8] A. Alahi, K. Goel, V. Ramanathan, A. Robicquet, L. Fei-Fei, and S.
2131
+ Savarese, "Social LSTM: Human Trajectory Prediction in Crowded
2132
+ Spaces," in 2016 IEEE Conference on Computer Vision and Pattern
2133
+ Recognition (CVPR), 27-30 June 2016 2016, pp. 961-971, doi:
2134
+ 10.1109/CVPR.2016.110.
2135
+ [9] S. Mozaffari, O. Y. Al-Jarrah, M. Dianati, P. Jennings, and A. Mouzakitis,
2136
+ "Deep Learning-Based Vehicle Behavior Prediction for Autonomous
2137
+ Driving Applications: A Review," IEEE TRANSACTIONS ON
2138
+ INTELLIGENT TRANSPORTATION SYSTEMS, Review vol. 23, no. 1, pp.
2139
+ 33-47, 2022 JAN 2022, doi: 10.1109/TITS.2020.3012034.
2140
+ [10] T. Gilles, S. Sabatini, D. Tsishkou, B. Stanciulescu, and F. Moutarde,
2141
+ "Uncertainty estimation for Cross-dataset performance in Trajectory
2142
+ prediction," arXiv preprint arXiv:2205.07310, 2022.
2143
+ [11] J. Gawlikowski et al., "A survey of uncertainty in deep neural networks,"
2144
+ arXiv preprint arXiv:2107.03342, 2021.
2145
+ [12] L. Peng, H. Wang, and J. Li, "Uncertainty Evaluation of Object Detection
2146
+ Algorithms for Autonomous Vehicles," Automotive Innovation, vol. 4, no.
2147
+ 3, pp. 241-252, 2021.
2148
+ [13] A. Kendall and Y. Gal, "What Uncertainties Do We Need in Bayesian
2149
+ Deep Learning for Computer Vision?," 2017. [Online]. Available:
2150
+
2151
+ 2
2152
+ https://proceedings.neurips.cc/paper/2017/file/2650d6089a6d640c5e85b2
2153
+ b88265dc2b-Paper.pdf.
2154
+ [14] S. Lefèvre, D. Vasquez, and C. Laugier, "A survey on motion prediction
2155
+ and risk assessment for intelligent vehicles," ROBOMECH journal, vol. 1,
2156
+ no. 1, pp. 1-14, 2014.
2157
+ [15] S. Ammoun and F. Nashashibi, "Real time trajectory prediction for
2158
+ collision risk estimation between vehicles," presented at the 2009 IEEE
2159
+ 5TH
2160
+ INTERNATIONAL
2161
+ CONFERENCE
2162
+ ON
2163
+ INTELLIGENT
2164
+ COMPUTER
2165
+ COMMUNICATION
2166
+ AND
2167
+ PROCESSING,
2168
+ PROCEEDINGS, 2009, 2009, Proceedings Paper.
2169
+ [16] M. Althoff, O. Stursberg, and M. Buss, "Model-Based Probabilistic
2170
+ Collision Detection in Autonomous Driving," IEEE TRANSACTIONS ON
2171
+ INTELLIGENT TRANSPORTATION SYSTEMS, Article vol. 10, no. 2, pp.
2172
+ 299-310, 2009 JUN 2009, doi: 10.1109/TITS.2009.2018966.
2173
+ [17] J. Li, H. Ma, Z. Zhang, and M. Tomizuka, "Social-wagdat: Interaction-
2174
+ aware trajectory prediction via wasserstein graph double-attention
2175
+ network," arXiv preprint arXiv:2002.06241, 2020.
2176
+ [18] N. Deo and M. M. Trivedi, "Convolutional Social Pooling for Vehicle
2177
+ Trajectory Prediction," in 2018 IEEE/CVF Conference on Computer
2178
+ Vision and Pattern Recognition Workshops (CVPRW), 18-22 June 2018
2179
+ 2018, pp. 1549-15498, doi: 10.1109/CVPRW.2018.00196.
2180
+ [19] X. Mo, Y. Xing, C. Lv, and Ieee, "Interaction-Aware Trajectory Prediction
2181
+ of Connected Vehicles using CNN-LSTM Networks," presented at the
2182
+ IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE
2183
+ INDUSTRIAL ELECTRONICS SOCIETY, 2020, 2020, Proceedings
2184
+ Paper.
2185
+ [20] P.-M. Tung, E. C. Grigore, F. A. Boulton, O. Beijbom, and E. M. Wolff,
2186
+ CoverNet: Multimodal Behavior Prediction Using Trajectory Sets (2020
2187
+ IEEE/CVF Conference on Computer Vision and Pattern Recognition
2188
+ (CVPR). Proceedings). 2020, pp. 14062-71.
2189
+ [21] C. Fang-Chieh et al., Predicting Motion of Vulnerable Road Users using
2190
+ High-Definition Maps and Efficient ConvNets (2020 IEEE Intelligent
2191
+ Vehicles Symposium (IV)). 2020, pp. 1655-62.
2192
+ [22] C. Tang and R. R. Salakhutdinov, "Multiple futures prediction," Advances
2193
+ in Neural Information Processing Systems, vol. 32, 2019.
2194
+ [23] F. Diehl, T. Brunner, M. T. Le, A. Knoll, and Ieee, "Graph Neural
2195
+ Networks for Modelling Traffic Participant Interaction," presented at the
2196
+ 2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19),
2197
+ 2019, 2019, Proceedings Paper.
2198
+ [24] X. Li, X. Ying, M. C. Chuah, and Ieee, "GRIP: Graph-based Interaction-
2199
+ aware Trajectory Prediction," presented at the 2019 IEEE INTELLIGENT
2200
+ TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2019, 2019,
2201
+ Proceedings Paper.
2202
+ [25] A. Gupta, J. Johnson, F.-F. Li, S. Savarese, A. Alahi, and Ieee, "Social
2203
+ GAN: Socially Acceptable Trajectories with Generative Adversarial
2204
+ Networks," presented at the 2018 IEEE/CVF CONFERENCE ON
2205
+ COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018,
2206
+ 2018, Proceedings Paper.
2207
+ [26] J. Liu, X. Mao, Y. Fang, D. Zhu, and M. Q. H. Meng, "A Survey on Deep-
2208
+ Learning Approaches for Vehicle Trajectory Prediction in Autonomous
2209
+ Driving," in 2021 IEEE International Conference on Robotics and
2210
+ Biomimetics (ROBIO), 27-31 Dec. 2021 2021, pp. 978-985, doi:
2211
+ 10.1109/ROBIO54168.2021.9739407.
2212
+ [27] L. Zhang, W. Xiao, Z. Zhang, and D. Meng, "Surrounding Vehicles
2213
+ Motion Prediction for Risk Assessment and Motion Planning of
2214
+ Autonomous Vehicle in Highway Scenarios," IEEE Access, vol. 8, pp.
2215
+ 209356-209376, 2020, doi: 10.1109/ACCESS.2020.3039789.
2216
+ [28] B. Wilson et al., "Argoverse 2: Next Generation Datasets for Self-Driving
2217
+ Perception and Forecasting," in Thirty-fifth Conference on Neural
2218
+ Information Processing Systems Datasets and Benchmarks Track (Round
2219
+ 2), 2021.
2220
+ [29] Z. Wei et al., "INTERACTION dataset: an INTERnational, adversarial
2221
+ and cooperative moTION dataset in interactive driving scenarios with
2222
+ semantic maps [arXiv]," arXiv, Journal Paper pp. 13 pp.-13 pp., 2019 09
2223
+ 30 2019.
2224
+ [30] F. Zheng et al., "Unlimited Neighborhood Interaction for Heterogeneous
2225
+ Trajectory
2226
+ Prediction,"
2227
+ presented
2228
+ at
2229
+ the
2230
+ 2021
2231
+ IEEE/CVF
2232
+ INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV
2233
+ 2021), 2021, 2021, Proceedings Paper.
2234
+ [31] R. Chandra, U. Bhattacharya, A. Bera, D. Manocha, and I. C. Soc,
2235
+ "TraPHic: Trajectory Prediction in Dense and Heterogeneous Traffic
2236
+ Using Weighted Interactions," presented at the 2019 IEEE/CVF
2237
+ CONFERENCE
2238
+ ON
2239
+ COMPUTER
2240
+ VISION
2241
+ AND
2242
+ PATTERN
2243
+ RECOGNITION (CVPR 2019), 2019, 2019, Proceedings Paper.
2244
+ [32] N. Deo, E. Wolff, and O. Beijbom, "Multimodal trajectory prediction
2245
+ conditioned on lane-graph traversals," 2022 2022: PMLR, pp. 203-212.
2246
+ [33] Y. Ma et al., "TrafficPredict: Trajectory Prediction for Heterogeneous
2247
+ Traffic-Agents,"
2248
+ presented
2249
+ at
2250
+ the
2251
+ THIRTY-THIRD
2252
+ AAAI
2253
+ CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST
2254
+ INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE
2255
+ CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL
2256
+ ADVANCES
2257
+ IN
2258
+ ARTIFICIAL
2259
+ INTELLIGENCE,
2260
+ 2019,
2261
+ 2019,
2262
+ Proceedings Paper.
2263
+ [34] D. Ulmer, "A survey on evidential deep learning for single-pass
2264
+ uncertainty estimation," arXiv preprint arXiv:2110.03051, 2021.
2265
+ [35] Z. Nado et al., "Uncertainty Baselines: Benchmarks for uncertainty &
2266
+ robustness in deep learning," arXiv preprint arXiv:2106.04015, 2021.
2267
+ [36] C. Blundell, J. Cornebise, K. Kavukcuoglu, and D. Wierstra, "Weight
2268
+ Uncertainty in Neural Networks," presented at the INTERNATIONAL
2269
+ CONFERENCE ON MACHINE LEARNING, VOL 37, 2015, 2015,
2270
+ Proceedings Paper.
2271
+ [37] G. E. Hinton and D. van Camp, Keeping neural networks simple by
2272
+ minimizing the description length of the weights (Proceeding of the Sixth
2273
+ Annual ACM Conference on Computational Learning Theory). 1993, pp.
2274
+ 5-13.
2275
+ [38] C. Louizos, K. Ullrich, and M. Welling, "Bayesian Compression for Deep
2276
+ Learning," presented at the ADVANCES IN NEURAL INFORMATION
2277
+ PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 2017, Proceedings
2278
+ Paper.
2279
+ [39] Y. Gal and Z. Ghahramani, "Dropout as a Bayesian Approximation:
2280
+ Representing Model Uncertainty in Deep Learning," presented at the
2281
+ INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL
2282
+ 48, 2016, 2016, Proceedings Paper.
2283
+ [40] Y. Gal, J. Hron, and A. Kendall, "Concrete Dropout," presented at the
2284
+ ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS
2285
+ 30 (NIPS 2017), 2017, 2017, Proceedings Paper.
2286
+ [41] M. Sensoy, L. Kaplan, and M. Kandemir, "Evidential Deep Learning to
2287
+ Quantify Classification Uncertainty," presented at the ADVANCES IN
2288
+ NEURAL INFORMATION PROCESSING SYSTEMS 31 (NIPS 2018),
2289
+ 2018, 2018, Proceedings Paper.
2290
+ [42] A. Amini, W. Schwarting, A. Soleimany, and D. Rus, "Deep evidential
2291
+ regression [arXiv]," arXiv, Journal Paper pp. 11 pp.-11 pp., 2019 10 07
2292
+ 2019.
2293
+ [43] A. Malinin and M. Gales, "Predictive Uncertainty Estimation via Prior
2294
+ Networks," presented at the ADVANCES IN NEURAL INFORMATION
2295
+ PROCESSING SYSTEMS 31 (NIPS 2018), 2018, 2018, Proceedings
2296
+ Paper.
2297
+ [44] B. Lakshminarayanan, A. Pritzel, and C. Blundell, "Simple and Scalable
2298
+ Predictive Uncertainty Estimation using Deep Ensembles," presented at
2299
+ the ADVANCES IN NEURAL INFORMATION PROCESSING
2300
+ SYSTEMS 30 (NIPS 2017), 2017, 2017, Proceedings Paper.
2301
+ [45] Y. Ovadia et al., "Can you trust your model's uncertainty? evaluating
2302
+ predictive uncertainty under dataset shift," Advances in neural information
2303
+ processing systems, vol. 32, 2019.
2304
+ [46] Y. Wen, D. Tran, and J. Ba, "Batchensemble: an alternative approach to
2305
+ efficient
2306
+ ensemble
2307
+ and
2308
+ lifelong
2309
+ learning,"
2310
+ arXiv
2311
+ preprint
2312
+ arXiv:2002.06715, 2020.
2313
+ [47] F. Wenzel, J. Snoek, D. Tran, and R. Jenatton, "Hyperparameter ensembles
2314
+ for robustness and uncertainty quantification," Advances in Neural
2315
+ Information Processing Systems, vol. 33, pp. 6514-6527, 2020.
2316
+ [48] C. Neurohr, L. Westhofen, M. Butz, M. H. Bollmann, U. Eberle, and R.
2317
+ Galbas, "Criticality Analysis for the Verification and Validation of
2318
+ Automated Vehicles," IEEE ACCESS, Article vol. 9, pp. 18016-18041,
2319
+ 2021 2021, doi: 10.1109/ACCESS.2021.3053159.
2320
+ [49] G. Bagschik, T. Menzel, M. Maurer, and Ieee, "Ontology based Scene
2321
+ Creation for the Development of Automated Vehicles," presented at the
2322
+ 2018 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2018, 2018,
2323
+ Proceedings Paper.
2324
+ [50] J. Wang, C. Zhang, Y. Liu, Q. Zhang, and Ieee, "Traffic Sensory Data
2325
+ Classification by Quantifying Scenario Complexity," presented at the 2018
2326
+ IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2018, 2018,
2327
+ Proceedings Paper.
2328
+ [51] O. Makansi et al., "You mostly walk alone: Analyzing feature attribution
2329
+ in trajectory prediction," arXiv preprint arXiv:2110.05304, 2021.
2330
+ [52] I. Hasan, S. Liao, J. Li, S. U. Akram, and L. Shao, "Pedestrian Detection:
2331
+ Domain Generalization, CNNs, Transformers and Beyond," arXiv
2332
+ preprint arXiv:2201.03176, 2022.
2333
+ [53] O. Styles, T. Guha, and V. Sanchez, "Multiple Object Forecasting:
2334
+ Predicting Future Object Locations in Diverse Environments," in 2020
2335
+
2336
+ 3
2337
+ IEEE Winter Conference on Applications of Computer Vision (WACV), 1-
2338
+ 5
2339
+ March
2340
+ 2020
2341
+ 2020,
2342
+ pp.
2343
+ 679-688,
2344
+ doi:
2345
+ 10.1109/WACV45572.2020.9093446.
2346
+ [54] J. Gesnouin, S. Pechberti, B. Stanciulescu, and F. Moutarde, "Assessing
2347
+ Cross-dataset Generalization of Pedestrian Crossing Predictors," presented
2348
+ at the 33rd IEEE Intelligent Vehicles Symposium, Aachen, Germany,
2349
+ 2022-06-05,
2350
+ 2022.
2351
+ [Online].
2352
+ Available:
2353
+ https://hal-mines-
2354
+ paristech.archives-ouvertes.fr/hal-03682452.
2355
+ [55] Y. Xu et al., "SIND: A Drone Dataset at Signalized Intersection in China,"
2356
+ arXiv preprint arXiv:2209.02297, 2022.
2357
+ [56] A. Malinin et al., "Shifts: A dataset of real distributional shift across
2358
+ multiple large-scale tasks," arXiv preprint arXiv:2107.07455, 2021.
2359
+ [57] A. Malinin, "Uncertainty estimation in deep learning with application to
2360
+ spoken language assessment," Doctoral thesis, University of Cambridge,
2361
+ 2019.
2362
+ [58] F. Poggenhans et al., "Lanelet2: A high-definition map framework for the
2363
+ future of automated driving," in 2018 21st International Conference on
2364
+ Intelligent Transportation Systems (ITSC), 4-7 Nov. 2018 2018, pp. 1672-
2365
+ 1679, doi: 10.1109/ITSC.2018.8569929.
2366
+
2367
+
2368
+
2369
+ Wenbo Shao received his B.E. degree in
2370
+ vehicle
2371
+ engineering
2372
+ from
2373
+ Tsinghua
2374
+ University, Beijing, China, in 2019. He is
2375
+ currently working toward the Ph.D. degree
2376
+ in Mechanical Engineering at Tsinghua
2377
+ University. He is a member of Tsinghua
2378
+ Intelligent Vehicle Design And Safety
2379
+ Research Institute (IVDAS) and supervised
2380
+ by Professor Jun Li and Associate Research
2381
+ Professor Hong Wang. His research interests include safety of
2382
+ the intended functionality of autonomous driving, trajectory
2383
+ prediction,
2384
+ decision-making,
2385
+ uncertainty
2386
+ theory
2387
+ and
2388
+ applications.
2389
+
2390
+ Yanchao Xu received B.E degree in vehicle
2391
+ engineering from Hainan University in
2392
+ China in 2020. He is currently pursuing the
2393
+ M.S. degree in Mechanical Engineering at
2394
+ Beijing Institute of Technology. He is also
2395
+ one of the visiting students at IVDAS since
2396
+ 2020. His research interest includes
2397
+ prediction, trajectory data mining, scenario
2398
+ parameterization for autonomous driving.
2399
+
2400
+
2401
+ Jun Li received the Ph.D. degree in
2402
+ vehicle engineering from Jilin University,
2403
+ Changchun, Jilin, China, in 1989. He is
2404
+ currently an academician of the Chinese
2405
+ Academy of Engineering, a Professor at
2406
+ school of Vehicle and Mobility with
2407
+ Tsinghua University, president of the
2408
+ Society of Automotive Engineers of China,
2409
+ director of the expert committee of China
2410
+ Industry Innovation Alliance for the Intelligent and Connected
2411
+ Vehicles. His research interests include internal combustion
2412
+ engine, electric drive systems, electric vehicles, intelligent
2413
+ vehicles and connected vehicles.
2414
+
2415
+ Chen Lv (Senior Member, IEEE)
2416
+ received the Ph.D. degree from the
2417
+ Department of Automotive Engineering,
2418
+ Tsinghua University, China, in 2016.
2419
+ From 2014 to 2015, he was a Joint Ph.D.
2420
+ Researcher at the EECS Department,
2421
+ University of California at Berkeley,
2422
+ Berkeley, CA, USA. From 2016 to 2018,
2423
+ he worked as a Research Fellow at the
2424
+ Advanced Vehicle Engineering Center,
2425
+ Cranfield
2426
+ University,
2427
+ U.K.
2428
+ He
2429
+ is
2430
+ currently an Assistant Professor with the School of Mechanical
2431
+ and Aerospace Engineering, and the Cluster Director of future
2432
+ mobility solutions at ERI@N, Nanyang Technological
2433
+ University, Singapore. His research interests include advanced
2434
+ vehicles and human–machine systems, where he has
2435
+ contributed over 100 articles and obtained 12 granted patents.
2436
+
2437
+
2438
+ Weida Wang received the Ph.D. degree
2439
+ from Beihang University, Beijing, China,
2440
+ in 2009. He is currently a Professor with
2441
+ the School of Mechanical Engineering,
2442
+ Beijing Institute of Technology, Beijing.
2443
+ He is also the Director of the Research
2444
+ Institute of Special Vehicle, Beijing
2445
+ Institute of Technology. His current
2446
+ research interests include electric vehicle,
2447
+ automated vehicle motion planning and control, and
2448
+ electromechanical transmission control.
2449
+
2450
+ Hong Wang is Research Associate
2451
+ Professor at Tsinghua University. She
2452
+ received the Ph.D. degree in Beijing
2453
+ Institute of Technology, Beijing, China,
2454
+ in 2015. From the year 2015 to 2019, she
2455
+ was working as a Research Associate of
2456
+ Mechanical
2457
+ and
2458
+ Mechatronics
2459
+ Engineering with the University of
2460
+ Waterloo. Her research focuses on the
2461
+ safety of the on-board AI algorithm, the
2462
+ safe decision-making for intelligent vehicles, and the test and
2463
+ evaluation of SOTIF. She becomes the IEEE member since the
2464
+ year 2017. She has published over 60 papers on top
2465
+ international journals. Her domestic and foreign academic part-
2466
+ time includes the associate editor for IEEE Transactions on
2467
+ Vehicular Technology and Intelligent Vehicles Symposium,
2468
+ Guest Editor of Special Issues on Intelligent Safety of
2469
+ Automotive Innovation, Young Communication Expert of
2470
+ Engineering, lead Guest Editor of Special Issues on Intelligent
2471
+ Safety of IEEE Intelligent Transportation Systems Magazine.
2472
+
2473
+
5dE3T4oBgHgl3EQfQgnL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dE4T4oBgHgl3EQfbwyA/content/tmp_files/2301.05077v1.pdf.txt ADDED
@@ -0,0 +1,2127 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Incorporating time-dependent demand patterns in the
2
+ optimal location of capacitated charging stations
3
+ Carlo Filippi(1)
4
+ Gianfranco Guastaroba(1)
5
+ Lorenzo Peirano(1)
6
+ M. Grazia Speranza(1)
7
+ (1) University of Brescia, Department of Economics and Management, Brescia, Italy
8
+ {carlo.filippi, gianfranco.guastaroba, lorenzo.peirano, grazia.speranza}@unibs.it
9
+ January 13, 2023
10
+ Abstract
11
+ A massive use of electric vehicles is nowadays considered to be a key element of a sustainable
12
+ transportation policy and the availability of charging stations is a crucial issue for their extensive
13
+ use. Charging stations in an urban area have to be deployed in such a way that they can satisfy a
14
+ demand that may dramatically vary in space and time. In this paper we present an optimization
15
+ model for the location of charging stations that takes into account the main specific features
16
+ of the problem, in particular the different charging technologies, and their associated service
17
+ time, and the fact that the demand depends on space and time. To measure the importance
18
+ of incorporating the time dependence in an optimization model, we also present a simpler
19
+ model that extends a classical location model and does not include the temporal dimension. A
20
+ worst-case analysis and extensive computational experiments show that ignoring the temporal
21
+ dimension of the problem may lead to a substantial amount of unsatisfied demand.
22
+ Keywords: Facility location, Charging stations, Electric vehicles, Demand patterns, Time-dependent
23
+ optimization.
24
+ 1
25
+ Introduction
26
+ Sustainable transportation is one of the major challenges that modern countries are facing. Several
27
+ sources indicate that the transportation sector generates the largest share of GreenHouse Gas
28
+ (GHG) emissions. According to the United States Environmental Protection Agency1, in 2020 the
29
+ transportation sector produced 27% of the total GHG emissions in the US, mostly generated from
30
+ burning fossil fuels by cars, trucks, ships, trains, and planes. Domestic statistics issued by the UK
31
+ government2 confirm that the transportation sector generated 27% of the total GHG emission. The
32
+ majority (91%) came from road transport vehicles, where the biggest contributors were cars and
33
+ taxis. Furthermore, data provided by the European Environment Agency3 highlight that in the
34
+ EU more than 22% of the GHG emissions came from the transportation sector.
35
+ 1https://www.epa.gov/ghgemissions/sources-greenhouse-gas-emissions
36
+ 2https://www.gov.uk/government/statistics/transport-and-environment-statistics-autumn-2021/tran
37
+ sport-and-environment-statistics-autumn-2021
38
+ 3https://www.eea.europa.eu/data-and-maps/data/data-viewers/eea-greenhouse-gas-projections-data-
39
+ viewer
40
+ arXiv:2301.05077v1 [math.OC] 12 Jan 2023
41
+
42
+ Despite technical advances have made available a range of options for sustainable mobility, there
43
+ are still important obstacles that must be overcome for their mass adoption. Among such options,
44
+ Electric Vehicles (EVs) are considered one of the major directions to reduce the environmental
45
+ impact of people mobility and make urban areas more sustainable.
46
+ In the 2021 edition of the
47
+ Global EV Outlook 20214, the International Energy Agency pointed out that at the end of 2020
48
+ the global EVs stock hit 10 millions units, with 3 millions newly registered EVs. Europe was the
49
+ fastest growing market, with a sales share equal to 10% and some leading countries, such as Norway,
50
+ which registered a record high sales share of 75%. This trend was accelerated by many countries
51
+ of the European Union through substantial financial incentives. However, the decision of potential
52
+ EV buyers is still strongly affected by two major issues. On one hand, the purchase cost of an EV
53
+ is still higher than that of a traditional internal combustion engine vehicle. On the other hand,
54
+ the limited travel range of an EV and the long charging time are well-known to generate anxiety
55
+ in the potential buyers (e.g., Pevec et al., 2020). In fact, the willingness of drivers to purchase an
56
+ EV strongly depends on the availability of charging stations nearby their points of interests (e.g.,
57
+ home and work). As the number of charging stations is growing, thanks to public and private
58
+ investments, the location problem of such stations has attracted much attention (see Section 2).
59
+ There are a number of factors that make the location of charging stations substantially different
60
+ from other, more classical, location problems, in particular the choice of the charger to install (e.g.,
61
+ slow, quick, fast), and the characteristics of the charging demand.
62
+ The type of charger is a key factor to be taken into account, as it impacts the charging time. As of
63
+ the end of 2021, there exist three main types of charger (see Moloughney, 2021). Level 1 chargers,
64
+ also referred to as slow chargers, use common 120-volt outlets, and can take up to 40 hours to
65
+ raise the level of a standard battery EV (with a 60 kWh sized battery) from 10% to 80% of the
66
+ capacity. These chargers are most suitable for private usage. Level 2 chargers, sometimes called
67
+ quick chargers, can charge up to 10 times faster than a level 1 charger, and are the most commonly
68
+ used types for daily EV charging (see Moloughney, 2021). Given the same battery characteristics
69
+ mentioned above, the charging time is about 4.5 hours. The level 3 or fast chargers can reduce the
70
+ charging time to 40 minutes or even less. For a comprehensive study regarding the state of the art
71
+ on charging stations, the interested reader can refer to Pareek et al. (2020). The type of charger
72
+ demanded by EVs is affected by the urban layout. For example, slow chargers will be demanded
73
+ in residential areas so that EVs can be recharged over the night at low cost (an interesting study
74
+ of the factors influencing the charging demand is provided in Wolbertus et al., 2018).
75
+ In the classical location models a customer is characterized by the distance from any potential
76
+ location and by a single quantity - a measure of the demand.
77
+ The models do not consider a
78
+ temporal dimension of the problem which basically corresponds to assuming that the demand is
79
+ uniformly distributed over the time period of interest of the location decision. On the contrary, the
80
+ charging demand of EVs fluctuates over time, with peaks of demand in periods of time where the
81
+ traffic volume is high. Neglecting the demand dynamics may lead to solutions where the charging
82
+ capacity deployed is not sufficient to satisfy the demand during the peak times.
83
+ In this paper, we study the problem of determining an optimal deployment of charging stations for
84
+ EVs within an urban environment. Different types of chargers have to be located in pre-defined
85
+ potential locations, modeled as nodes of a network. The urban area is partitioned in sections. A
86
+ customer is associated with each section of the urban area. Its demand in a certain time interval
87
+ is the number of EVs in that section that need to be recharged. The customer is located in the
88
+ 4https://www.iea.org/reports/global-ev-outlook-2021
89
+ 2
90
+
91
+ center of gravity of the section and is modeled as a node of the network. The urban area is also
92
+ partitioned in zones (e.g., commercial, industrial, or residential) which have different needs in terms
93
+ of minimum number of each type of charger deployed in the zone.
94
+ We have to determine, for each type of charger and each potential location, the number of chargers
95
+ to be deployed. Two criteria have a key role in this location problem: the cost of installing the
96
+ chargers and the distance the customers have to travel to be recharged.
97
+ We present, over a discretized time horizon, an optimization model that introduces a temporal
98
+ dimension which, to the best of our knowledge, has never been introduced in the literature on
99
+ location problems and captures the dynamics of the charging demand. Assuming that a charger can
100
+ take more than one period to fully recharge an EV, the proposed multi-period formulation includes
101
+ constraints to keep track of the usage of chargers across consecutive time periods and to ensure that
102
+ no other vehicles are assigned to any occupied charger. This novel approach guarantees a correct
103
+ sizing of the solution, in terms of number of stations opened and number of chargers installed, and
104
+ ensures that the demand is completely satisfied in all time periods. In order to assess the value of
105
+ introducing the temporal dimension in the location problem, which makes the optimization model
106
+ more complex, we present a single-period optimization model that captures the same specificities of
107
+ the problem but ignores the temporal aspect. In both models, the objective is the minimization of a
108
+ convex combination of two terms: the total cost of deploying the charging stations and installing the
109
+ chargers, and the average distance traveled by the customers to reach the assigned charging station.
110
+ The two optimization models turn out to be Mixed Integer Linear Programming (MILP) problems.
111
+ We compare the two models through a theoretical and a computational analysis. We show, through
112
+ worst-case analysis, that a solution to the single-period model may fail to satisfy a large portion of
113
+ the charging demand. Extensive computational experiments are run on different classes of randomly
114
+ generated instances. The results confirm the importance of explicitly considering the dependence
115
+ on time of the demand.
116
+ In fact, the single-period model is based on the common assumption
117
+ that the charging demand is uniformly distributed across the planning horizon. In an application
118
+ context such as the one at hand, where the demand fluctuates significantly during the day and
119
+ across different zones of the same urban area, the single-period model produces solutions that are
120
+ not capable of serving a large portion of the charging demand, especially in those time periods
121
+ where the demand is prominently concentrated. The computational experiments also include a
122
+ parametric analysis of the relative weight assigned to the objective function components.
123
+ Structure of the paper.
124
+ The remainder of the paper is organized as follows.
125
+ In Section 2,
126
+ the literature most closely related to our research is reviewed and the contribution of this paper
127
+ is highlighted.
128
+ In Section 3, after the presentation of the single-period extension of a classical
129
+ location model, we provide the multi-period mathematical formulation. In Section 4, we analyze
130
+ the worst-case performance of the single-period model in terms of portion of unsatisfied charging
131
+ demand. Section 5 reports extensive computational experiments conducted on instances gener-
132
+ ated to resemble demand dynamics frequently observed in different zones of a city. Finally, some
133
+ concluding remarks are outlined in Section 6.
134
+ 2
135
+ Literature review
136
+ The problem of determining an optimal location and size of charging stations for EVs has recently
137
+ attracted an increasing academic attention. Recent overviews of the main modeling and algorithmic
138
+ approaches employed in this research area are available in Deb et al. (2018), Zhang et al. (2019), and
139
+ 3
140
+
141
+ Kchaou-Boujelben (2021). For a general introduction on location problems the interested reader
142
+ can refer to Laporte et al. (2019). In the following, we focus on the papers that are most closely
143
+ related to our research, and refer the interested reader to the above-mentioned surveys and the
144
+ references cited therein.
145
+ A first broad classification of the literature is based on the type of network considered (cf. Deb et al.,
146
+ 2018). When only the distribution network is considered, the optimal location of charging stations
147
+ must consider the potential adverse effects on the power grid, as an inappropriate placement of
148
+ charging stations can be a threat to the power system security and reliability. On the other hand,
149
+ when only the transportation network is taken into account, the main issue is to determine an
150
+ optimal location of charging stations over a road network. This paper lies in the latter category.
151
+ Within this category, the related literature can be further classified into two main streams of
152
+ models called flow-based and node-based demand models (e.g., see Kchaou-Boujelben, 2021). In
153
+ the literature, the majority of the research efforts are devoted to the flow-based demand models,
154
+ whereas the number of papers adopting a node-based approach is still relatively limited. To the
155
+ best of our knowledge, Anjos et al. (2020) are the only authors that integrated, within the same
156
+ optimization model, both a node-based and a flow-based approach. The flow-based demand models
157
+ are best suited for modeling long-haul (e.g., inter-urban) journeys where accounting for the limited
158
+ driving range of EVs is important (cf. Anjos et al., 2020). Contributions to this line of research
159
+ can be found, for example, in Kuby and Lim (2005), MirHassani and Ebrazi (2013), Yıldız et al.
160
+ (2016), and Hosseini et al. (2017). The present paper adopts a node-based demand model.
161
+ In the class of node-based demand models, drivers demanding to charge their EVs are associated
162
+ with one/few fixed locations, which represent, for instance, their residence, workplace or specific
163
+ service facilities (such as commercial activities). This approach is best suited for urban settings.
164
+ In fact, in such case EVs do not move much from the location where they need to be charged and
165
+ their limited driving range can be neglected (cf. Anjos et al., 2020). The most common modeling
166
+ approaches applied in the literature are based on the extension of classic discrete location models
167
+ (e.g., location-allocation as in Zhu et al. (2016), set covering as in Huang et al. (2016), and maximum
168
+ coverage problems as in Dong et al. (2019)) to incorporate technical constraints specific to EVs.
169
+ Characteristics of the charging demand (such as the population size, the penetration rate of EVs,
170
+ the type of zone, and the time of the day) are known to have a crucial impact on the optimal
171
+ location of charging stations. To position the present paper within the literature, we classify the
172
+ mathematical formulations into single-period and multi-period. In single-period optimization mod-
173
+ els all the decision variables are time independent. Although the spatial-temporal distribution of
174
+ the charging demands is described by different authors (e.g., see Yi et al., 2020, and the references
175
+ cited therein), only few authors have proposed multi-period optimization models where the alloca-
176
+ tion of the demand to the charging stations is time-dependent. The related stream of literature can
177
+ be classified according to the length of the planning horizon considered. A long planning horizon is
178
+ considered by some authors. The basic rationale of these models is that locating charging stations is
179
+ a long-term strategic decision. As a consequence, during these long periods of time the technology
180
+ available, as well as the charging demand, may change significantly. Along this line of research,
181
+ we mention the paper by Anjos et al. (2020) where it is assumed that the locating decisions taken
182
+ in a period have an impact on the charging demand in the subsequent periods. In fact, potential
183
+ EV buyers are influenced by the availability of charging opportunities. Some papers have proposed
184
+ multi-period optimization models that consider a short horizon, usually a day, divided in time
185
+ periods, usually hours. Our research belongs to this category of papers.
186
+ 4
187
+
188
+ To the best of our knowledge, Cavadas et al. (2015) are the first authors to recognize the importance
189
+ of incorporating into an optimization model the dynamics of the charging demand across the day.
190
+ The aim of the proposed multi-period model is the maximization of the total demand served,
191
+ subject to a constraint on the budget available. The authors consider only one type of charger (i.e.,
192
+ a slow type) and the sizing of the charging stations is not part of the optimization. In the model we
193
+ present in this paper, we address these shortcomings by considering multiple types of chargers and
194
+ optimizing the quantities installed in each opened station. Rajabi-Ghahnavieh and Sadeghi-Barzani
195
+ (2017) estimate the charging demand of EVs in different zones of a city and at different hours. The
196
+ authors consider the deployment of an unlimited number of fast chargers only and propose a non-
197
+ linear optimization model that includes three cost components: the total opening cost, the total
198
+ cost for the drivers to reach the assigned charging stations, and the cost of connecting the charging
199
+ stations to the electric grid substations. The variability of the demand across the day is taken
200
+ into consideration when determining the number of chargers to install. Nevertheless, the variables
201
+ assigning EVs to stations are not time-dependent, and, hence, drivers demanding to charge their
202
+ EVs at different hours are all assigned to the same station. In our paper, we allow the demand
203
+ arising from the same location during the day to be assigned to different stations, depending on
204
+ the evolution of the overall demand and the available cherging resources. Moreover, we consider
205
+ different types of chargers. Both short-term and long-term decisions are considered in Quddus et al.
206
+ (2019). The main long-term decisions are related to the year, the location, and the type of charging
207
+ stations to open. The short-term decisions are mainly related to the amount of power (provided
208
+ by different sources, such as electric grid and renewable sources) to satisfy the hourly charging
209
+ demand at a given location. Compared to our research, the drivers are, indirectly, pre-assigned to
210
+ a charging station and, hence, the assignment is not part of the optimization model. The authors
211
+ cast the problem as a two-stage stochastic programming model. Li and Jenn (2022) present an
212
+ optimization model based on the concept of charging opportunities, which is measured through
213
+ the time an individual stays at a given location within a day. The authors separate the charging
214
+ opportunities into home and non-home (i.e., public) categories, and allow the same individual to
215
+ charge the EV multiple times at different locations. The proposed optimization model determines
216
+ the number of home and non-home chargers to install, as well as the times and locations for each
217
+ individual to charge the EV. The model aims at minimizing the sum of the annual electricity cost
218
+ for charging the EVs and the total cost of locating the home and non-home chargers. The number
219
+ of chargers that can be installed in each location (called region by the authors) is unlimited.
220
+ Finally, we mention the growing body of literature that addresses the problem of determining an
221
+ optimal location of charging stations for EVs in car-sharing systems (e.g., cf. Brandst¨atter et al.,
222
+ 2017, 2020; Bekli et al., 2021). Although such problem has some characteristics in common with
223
+ ours, it includes some operational characteristics that make it considerably different, for example
224
+ the decisions about the number of EVs to acquire, the relocation of the EVs among stations, and
225
+ the assumption that charging occurs only between two consecutive trips.
226
+ Contributions of the paper. The contributions of this paper to the literature can be summarized
227
+ as follows.
228
+ ✓ We present a node-based multi-period optimization model for the location of charging stations
229
+ that captures the dependence on time of the charging demand;
230
+ ✓ the multi-period model takes into account several characteristics of the real problem: multiple
231
+ types of chargers (each with its own charging speed and installation cost), the capacitated
232
+ nature of the charging stations (in terms of maximum number of chargers that can be in-
233
+ 5
234
+
235
+ stalled), a minimum number of chargers to be installed in different zones (e.g., commercial,
236
+ residential, industrial);
237
+ ✓ the multi-period model is compared to a single-period model through a worst-case analysis;
238
+ ✓ extensive computational experiments are presented that show, in particular, the importance
239
+ of incorporating the dependence on time of the charging demand.
240
+ 3
241
+ Problem definition and mathematical formulations
242
+ In this section, we first provide a general description of the location problem along with the notation
243
+ that is common to the two optimization models that will follow. Then, the single-period MILP
244
+ model is presented, together with the notation that is specific for the model, followed by the multi-
245
+ period formulation.
246
+ We consider the problem of determining, in an urban area, an optimal location of charging stations
247
+ for EVs, along with the type and number of chargers to deploy in each station. A maximum number
248
+ of chargers, of each type and in total, can be deployed in each station. The location for any station
249
+ can be selected from a pre-defined set of potential locations. We introduce a complete bipartite
250
+ network G = (I ∪ J , A), where I = {1, 2, . . . , I} is the set of demand nodes and J = {1, 2, . . . , J}
251
+ is the set of potential locations for the stations. Let cij be the travel distance from demand node i
252
+ to station j.
253
+ A fixed opening cost Fj is associated with each station j. The opening cost does not include the
254
+ cost of the chargers. We denote as K = {1, 2, . . . , K} the set of types of chargers considered, and
255
+ as fjk the cost of installing one charger of type k ∈ K in location j ∈ J . Let ujk be the maximum
256
+ number of chargers of type k that can be installed in station j. Similarly, uj denotes the maximum
257
+ number of chargers that can be installed in total in station j. The latter two parameters define,
258
+ implicitly, the maximum charging capacity of station j.
259
+ Each node i is the center of gravity of a section of the urban area where the demand of the section
260
+ is measured as the number of EVs that need to be recharged. We will introduce later, for each of
261
+ the two optimization models, the planning horizon and the notation for the demand of a customer.
262
+ For the sake of brevity, hereafter we refer to each potential location j simply as station j. The
263
+ demand must be entirely satisfied by the chargers that will be deployed.
264
+ To take into account that different parts of the urban area have different needs in terms of type of
265
+ charger desired, the urban area is partitioned in zones (e.g., commercial, residential, industrial). We
266
+ denote by L = {1, 2, . . . , L} the set of zones. We assume that, based on some preliminary analysis,
267
+ in each zone ℓ ∈ L a minimum percentage ρℓk of chargers of type k must be deployed. Each station
268
+ j ∈ J belongs to a zone as well as each customer i ∈ I. Thus, the zones imply a partition of both
269
+ the stations and the demand points. This partition does not restrict the allocation of demand to
270
+ stations, i.e., a demand point located in a zone can be assigned to a station located in a different
271
+ zone.
272
+ Two criteria have a key role in this location problem: the cost of opening the stations and installing
273
+ the chargers and the distance the customers have to travel to be recharged. The objective function
274
+ we consider, to be minimized, is a convex combination of these two criteria. The optimization
275
+ problem is aimed at determining, for each type of charger and each station, the number of chargers
276
+ to be deployed in such a way that the objective function is minimized.
277
+ 6
278
+
279
+ Both MILP models include the following decision variables. Let zj ∈ {0, 1}, with j ∈ J , be a
280
+ binary variable that takes value 1 if station j is opened, and 0 otherwise. Let yjk ∈ Z+, with j ∈ J
281
+ and k ∈ K, be an integer variable that represents the number of chargers of type k installed in
282
+ station j.
283
+ 3.1
284
+ A single-period location model
285
+ This section presents a single-period model for the location of the charging stations. The MILP
286
+ formulation, denoted as SP-CFL, is an extension of a classical CFL model. Hereafter, we introduce
287
+ the notation needed for the formulation, in addition to the one introduced above.
288
+ We consider a single planning period of length H and denote as di the total demand in i ∈ I, that
289
+ is, the total number of EVs demanding to be recharged in i during H. Let pk denote the average
290
+ number of EVs fully recharged by one charger of type k during time period H. For the sake of
291
+ simplicity, we assume that pk does not depend on the type of EV.
292
+ The SP-CFL model also makes use of the following decision variables. Let xijk ∈ [0, 1], with i ∈ I,
293
+ j ∈ J , and k ∈ K, be the fraction of the demand of node i assigned to a charger of type k in station
294
+ j. Then, the SP-CFL model can be stated as the following MILP:
295
+ [SP-CFL]
296
+ min
297
+ λ ·
298
+
299
+
300
+ 1
301
+
302
+ i∈I
303
+ di
304
+
305
+ i∈I
306
+ di
307
+
308
+ j∈J
309
+ cij
310
+
311
+ k∈K
312
+ xijk
313
+
314
+ � + (1 − λ) ·
315
+
316
+ ��
317
+ j∈J
318
+ Fjzj +
319
+
320
+ j∈J
321
+
322
+ k∈K
323
+ fjkyjk
324
+
325
+
326
+ (1)
327
+ s.t.
328
+ yjk ≤ ujkzj
329
+ j ∈ J , k ∈ K
330
+ (2)
331
+
332
+ k∈K
333
+ yjk ≤ ujzj
334
+ j ∈ J
335
+ (3)
336
+
337
+ j∈J
338
+
339
+ k∈K
340
+ xijk = 1
341
+ i ∈ I
342
+ (4)
343
+
344
+ i∈I
345
+ dixijk ≤ pkyjk
346
+ j ∈ J , k ∈ K
347
+ (5)
348
+ xijk ≤ yjk
349
+ i ∈ I, j ∈ J , k ∈ K
350
+ (6)
351
+
352
+ j∈Aℓ
353
+ yjk ≥ ρℓk
354
+
355
+ j∈Aℓ
356
+
357
+ k∈K
358
+ yjk
359
+ k ∈ K, ℓ ∈ L
360
+ (7)
361
+ zj ∈ {0, 1}
362
+ j ∈ J ;
363
+ yjk ∈ Z+
364
+ j ∈ J , k ∈ K;
365
+ xijk ∈ [0, 1]
366
+ i ∈ I, j ∈ J , k ∈ K.
367
+ (8)
368
+ The objective function in (1) comprises two terms. The first one represents the average distance
369
+ traveled by the EVs to reach the assigned station. The second term is the total cost of opening the
370
+ 7
371
+
372
+ stations and installing the chargers. The two terms represent criteria of a substantially different
373
+ nature: the first measures the quality of the service provided by the deployed stations and chargers
374
+ to the drivers, whereas the second the cost of the service. The two criteria are weighted by the
375
+ trade-off parameter λ ∈ [0, 1], which is used to balance their importance.
376
+ Constraints (2) and (3) limit the number of chargers that can be installed in station j. The former
377
+ set bounds the number of chargers of type k to be lower than or equal to ujk, whereas the second
378
+ set of constraints bounds the total number of chargers to be lower than or equal to uj. Both sets of
379
+ constraints (2) and (3) impose that no charger can be installed if station j is not open (i.e., zj = 0).
380
+ Constraints (4) ensure that the demand of each node i ∈ I is entirely satisfied. Constraints (5)
381
+ guarantee that the number of EVs assigned to the chargers of type k deployed in station j is not
382
+ greater than the charging capacity available (i.e., pkyjk). They also impose that no EV can be
383
+ assigned to a type k of chargers in station j if no charger of that type is available (i.e., yjk = 0).
384
+ Inequalities (6), which are redundant in this formulation, are well-known to yield a tighter Linear
385
+ Programming (LP) relaxation than the equivalent formulation without them (e.g., see Filippi et al.,
386
+ 2021). Constraints (7) guarantee that the number of chargers of type k installed in zone ℓ is at least
387
+ equal to the minimum percentage ρℓk. Finally, constraints (8) define the domain of the decision
388
+ variables.
389
+ 3.2
390
+ A multi-period location model
391
+ This section presents the MILP formulation for the multi-period model, henceforth denoted as the
392
+ MP-CFL model, for the problem defined at the beginning of this section.
393
+ The planning period H of the single-period model is here partitioned into a number T of time
394
+ periods. For example, if H is a day, we may partition the day in hours. Let T = {1, 2, . . . , T}
395
+ denote the set of time periods. We denote as Rk the number of consecutive time periods needed to
396
+ completely recharge a car using a charger of type k. Note that, similar to pk for the SP-CFL model,
397
+ Rk does not depend on the type of EV but only on the type of charger. Furthermore, parameters
398
+ pk and Rk are strictly related, as the latter is determined by dividing the length of the time horizon
399
+ by pk, i.e. Rk = T
400
+ pk .
401
+ The demand of each node i ∈ I is no longer identified by a single value (di in the SP-CFL model)
402
+ but by a time-dependent profile. Let dt
403
+ i denote the demand of node i ∈ I at the beginning of time
404
+ period t ∈ T . A more detailed discussion about the demand profiles can be found in Section 5.1.1.
405
+ We assume that the demand of a time period t must be served in that time period, i.e., it cannot
406
+ be postponed to a later time. We say that a node is served by a charger of type k at time t if a
407
+ charger is available at time t to start the charging which will occupy the charger for a total of Rk
408
+ time periods. The capacity installed in each station must be sufficient to serve the charging demand
409
+ assigned to that station in a time period and the demand assigned to the station in a previous time
410
+ period that has not yet completed the charging. Finally, let xt
411
+ ijk ∈ [0, 1], with i ∈ I, j ∈ J , k ∈ K,
412
+ and t ∈ T , be the fraction of the charging demand of node i to be served at time t that is assigned
413
+ to a charger of type k in station j.
414
+ The MP-CFL model is formulated as follows:
415
+ [MP-CFL]
416
+ 8
417
+
418
+ min
419
+ λ ·
420
+
421
+
422
+ 1
423
+
424
+ t∈T
425
+
426
+ i∈I
427
+ dt
428
+ i
429
+
430
+ t∈T
431
+
432
+ i∈I
433
+ dt
434
+ i
435
+
436
+ j∈J
437
+ cij
438
+
439
+ k∈K
440
+ xt
441
+ ijk
442
+
443
+ � + (1 − λ) ·
444
+
445
+ ��
446
+ j∈J
447
+ Fjzj +
448
+
449
+ j∈J
450
+
451
+ k∈K
452
+ fjkyjk
453
+
454
+
455
+ (9)
456
+ s.t. (2), (3), and (7)
457
+
458
+ j∈J
459
+
460
+ k∈K
461
+ xt
462
+ ijk = 1
463
+ i ∈ I, t ∈ T
464
+ (10)
465
+ xt
466
+ ijk ≤ yjk
467
+ i ∈ I, j ∈ J , k ∈ K, t ∈ T
468
+ (11)
469
+
470
+ i∈I
471
+ t−1
472
+
473
+ τ=0
474
+ dt−τ
475
+ i
476
+ xt−τ
477
+ ijk ≤ yjk
478
+ j ∈ J , k ∈ K, t ∈ T : t < Rk
479
+ (12)
480
+
481
+ i∈I
482
+ Rk−1
483
+
484
+ τ=0
485
+ dt−τ
486
+ i
487
+ xt−τ
488
+ ijk ≤ yjk
489
+ j ∈ J , k ∈ K, t ∈ T : t ≥ Rk
490
+ (13)
491
+ zj ∈ {0, 1}
492
+ j ∈ J ;
493
+ yjk ∈ Z+
494
+ j ∈ J , k ∈ K;
495
+ xt
496
+ ijk ∈ [0, 1]
497
+ i ∈ I, j ∈ J , k ∈ K, t ∈ T .
498
+ (14)
499
+ The objective function in (9) is the multi-period extension of function (1). For each node i ∈ I,
500
+ constraints (10) ensure that the charging demand arising in each time period t is fully satisfied.
501
+ Akin to the objective function, also inequalities (11) are the multi-period extension of constraints
502
+ (6).
503
+ Constraints (12) and (13) guarantee that the number of EVs that are charging in time period t at
504
+ a charger of type k in station j is smaller than or equal to the number of available chargers of that
505
+ type (i.e., yjk). Note that the second sum in (12) and (13) is used to keep track of the EVs that
506
+ started to recharge in a previous time period but have not completed the charging in t. Constraints
507
+ (12) are defined for the first time periods in the planning horizon (such that t < Rk), whereas
508
+ (13) are defined for the remaining time periods. Finally, constraints (14) define the domain of the
509
+ decision variables.
510
+ 4
511
+ Worst-case analysis
512
+ In this section, we analyze the worst-case performance of the SP-CFL model in terms of the demand
513
+ that cannot be satisfied if the optimal solution produced is implemented in a context where the
514
+ demand fluctuates over time. In fact, in this case if an optimal solution to the SP-CFL model is
515
+ implemented, there is no guarantee that all the charging demand is satisfied. As the SP-CFL model
516
+ implicitly assumes that the charging demand is uniformly distributed across the planning horizon,
517
+ when the demand fluctuates over time, there may be peak time periods where the chargers installed
518
+ are not sufficient.
519
+ 9
520
+
521
+ Theorem 1 When an optimal solution of the SP-CFL model is implemented, the fraction of the
522
+ demand that does not find an available charger to be served may be up to 1 − 1
523
+ T , where T is the
524
+ number of time periods of the planning horizon. This bound is tight.
525
+ Proof To prove the theorem, we build the following instance.
526
+ Recalling constraint (4) and summing up all constraints (5), the following chain of inequalities
527
+ holds:
528
+
529
+ i∈I
530
+ di
531
+ (4)
532
+ =
533
+
534
+ i∈I
535
+ di
536
+
537
+ j∈J
538
+
539
+ k∈K
540
+ xijk =
541
+
542
+ j∈J
543
+
544
+ k∈K
545
+
546
+ i∈I
547
+ dixijk
548
+ (5)
549
+
550
+
551
+ j∈J
552
+
553
+ k∈K
554
+ pkyjk
555
+ (15)
556
+ for any feasible solution to the SP-CFL model.
557
+ Consider an instance where the travel distances are all negligible compared to the fixed opening and
558
+ installing cost. In this situation, the SP-CFL model would open the minimum number of charging
559
+ stations and install the minimum number of chargers that are strictly necessary to satisfy the total
560
+ demand. As a consequence, the value of the right-hand side of the rightmost inequality in (15)
561
+ would be as small as possible.
562
+ Additionally, suppose there is a single type of charger (i.e., K = 1) and that the total demand
563
+
564
+ i∈I di is a multiple of p1. Recall that the latter parameter represents the number of EVs fully
565
+ recharged by one charger during the planning horizon. Note that it can be determined by dividing
566
+ the number of time periods T by the number of consecutive time periods needed to completely
567
+ recharge an EV (i.e., R1). Hence, at optimality, the inequality in (15) can be reformulated as
568
+ follows:
569
+
570
+ i∈I
571
+ di =
572
+
573
+ j∈J
574
+ p1yj1 = T
575
+ R1
576
+
577
+ j∈J
578
+ yj1.
579
+ (16)
580
+ Thus, the total number of chargers deployed is �
581
+ j∈J yj1 =
582
+ R1
583
+
584
+ i∈I di
585
+ T
586
+ , which, assuming that R1 = 1,
587
+ becomes �
588
+ j∈J yj1 =
589
+
590
+ i∈I di
591
+ T
592
+ .
593
+ Consider an extreme situation where the whole demand �
594
+ i∈I di arises in one time period, say ˆt,
595
+ whereas it is zero in the remaining periods. The demand that can be satisfied in such time period
596
+ is equal to the number of chargers installed (i.e., �
597
+ j∈J yj1). Given the assumptions above, this
598
+ value is also equal to
599
+
600
+ i∈I di
601
+ T
602
+ . Thus, the amount of demand that does not find an available charger
603
+ is equal to:
604
+
605
+ i∈I
606
+ di −
607
+
608
+ i∈I
609
+ di
610
+ T
611
+ .
612
+ The statement follows.
613
+ Figure 1 illustrates the construction for the special case where �
614
+ i∈I di = T, which implies that
615
+
616
+ j∈J yj1 = 1. The whole demand, equal to T, arises in time period ˆt (green bar), whereas it is zero
617
+ in the remaining periods. The SP-CFL model assumes that such demand is uniformly distributed
618
+ across the planning horizon (pink bars), and hence it opens one station equipped with one charger.
619
+ As a consequence, the charging demand that is not satisfied is T − 1 or, in percentage, T−1
620
+ T .
621
+ 10
622
+
623
+ Figure 1: An instance where the demand arises in time period ˆt (green bar). The pink bars show
624
+ a uniform distribution of the demand across the planning horizon, as implicitly assumed by the
625
+ SP-CFL model.
626
+ 5
627
+ Experimental Analysis
628
+ This section is devoted to the presentation and discussion of the computational experiments. They
629
+ were conducted on a Workstation HP Intel(R)-Xeon(R) at 3.5GHz with 64 GB RAM (Win 10 Pro,
630
+ 64 bits). The processor is equipped with 6 physical cores, and all threads were used while solving
631
+ each instance. The MILP models were implemented in Java, compiled within Apache NetBeans
632
+ 12.3, and solved by means of CPLEX 20.1. Each instance was solved with a CPU time limit of
633
+ 3,600 seconds. All other CPLEX parameters were set at their default values.
634
+ The section is organized as follows.
635
+ First, we present the testing environment we used in our
636
+ experiments, then we compare the optimal solutions for two illustrative examples generated ac-
637
+ cording to two different urban structure models, and finally we provide detailed computational
638
+ results comparing the solutions produced by the single-period and the multi-period models.
639
+ 5.1
640
+ Testing environment
641
+ The generation of the charging demand and potential station locations follows the procedure de-
642
+ scribed in Section 5.1.1. All the remaining parameters defining the testing environment are detailed
643
+ in Section 5.1.2.
644
+ 5.1.1
645
+ Spatial and temporal charging demand generation
646
+ As far as the urban structure is concerned, we considered two classic models, the concentric zone
647
+ model and the sector model. The concentric zone model was proposed in 1925 by sociologist Ernest
648
+ Burgess on the base of his human ecology theory, and was initially applied to the city of Chicago (cf.
649
+ Burgess, 2008). It is, perhaps, the first theoretical model used to explain urban social structures.
650
+ The model depicts urban land usage as concentric rings: the business district is located in the
651
+ center, whereas the remainder of the city is expanded in rings, each corresponding to a different
652
+ land usage (such as industrial or residential). The sector model was proposed in 1939 by land
653
+ economist Homer Hoyt (see Hoyt, 1939). It is a modification of the Burgess’ model where the
654
+ city zones devoted to a specific land usage (e.g., business, residential, and productive) develop
655
+ in sectors expanding from the original city center. Though the actual structure of modern cities
656
+ can hardly be captured by models as simple as Burgess’ and Hoyt’s, they are the basis of more
657
+ 11
658
+
659
+ T
660
+ :
661
+ 1
662
+ 0
663
+ t+1
664
+ t-1
665
+ <t
666
+ 1
667
+ 2
668
+ T-1
669
+ T
670
+ ..
671
+ ..(a) COR instance
672
+ (b) SEC instance
673
+ Figure 2: Demand nodes generation for a COR (left) and a SEC (right) instance. Blue points
674
+ are located in the commercial zone, orange points in the residential zone, and gray points in the
675
+ industrial zone.
676
+ complex structures (Hall and Barrett, 2012) and, on the other hand, can simplify the interpretation
677
+ of the results. For these reasons, we considered two classes of instances, each associated with one
678
+ urban model. Hereafter, the two classes are referred to as the concentric ring (COR) instances
679
+ and the sector (SEC) instances. In both cases, we assume the urban structure comprises three
680
+ possible zones: commercial, residential, industrial. With a little abuse of notation, we denote the
681
+ set of zones as L = {C, R, I}, where C, R, and I refer to the commercial, residential, and industrial
682
+ zones, respectively. Each zone is characterized by a different pattern of the charging demand during
683
+ the planning horizon, as it will be detailed later. We consider as planning horizon a day, discretized
684
+ into T = 24 hours (i.e., the time periods).
685
+ In the COR instances, we assume the commercial zone is the central circle with ray 1000, the
686
+ residential zone is a ring in the middle around the commercial zone with outer ray 2000, and the
687
+ industrial zone is a most outer ring around the residential zone with outer ray 3000. In the SEC
688
+ instances, we assume that commercial, residential, and industrial zones correspond to three slices
689
+ of identical size that partition a circle of ray 3000.
690
+ Then, for each zone, we uniformly generate the same number of demand nodes. More exactly, given
691
+ the total number of demand nodes to be generated, such value is divided by three to obtain, after
692
+ an integer rounding whenever necessary, the number of demand nodes to generate in each zone.
693
+ Figure 2 gives an example.
694
+ Both in COR and SEC instances, a given number J of potential stations is uniformly generated
695
+ over the total area (i.e., the circle with ray 3000).
696
+ For each pair of demand node i and potential station j, parameter cij is computed as the Euclidean
697
+ distance between the two nodes.
698
+ Concerning the demand pattern, this is specific for each zone. In the commercial zone we assume
699
+ there is a high density of offices, shops, pubs, restaurants, and hotels. Hence, we expect a high
700
+ 12
701
+
702
+ 3000
703
+ .
704
+ 2000
705
+ .
706
+ 1000
707
+ ..
708
+ .
709
+ .
710
+ -3opo
711
+ -20Do
712
+ 10bo
713
+ 1d00
714
+ 2000
715
+ 3000
716
+ .
717
+ -1000
718
+ :
719
+ .
720
+ -200
721
+ 30003000
722
+ .2000
723
+ *
724
+ .
725
+ .
726
+ .
727
+ -3dpo
728
+ -2000
729
+ -1000
730
+ 2.
731
+ 0
732
+ 1000
733
+ .
734
+ 3000
735
+ to
736
+ .
737
+ .
738
+ .
739
+ .
740
+ 1000
741
+ *
742
+ .
743
+ :
744
+ .
745
+ .
746
+ .
747
+ .
748
+ .
749
+ .
750
+ 2000
751
+ .
752
+ .
753
+ .
754
+ .
755
+ .
756
+ 30000Level
757
+ 0
758
+ 1
759
+ 2
760
+ 3
761
+ Demand
762
+ null
763
+ low
764
+ medium
765
+ high
766
+ Table 1: Standard levels of hourly demand.
767
+ demand with two peaks, the first one at the beginning of the working day and the second one
768
+ in the afternoon, higher than the first peak and slowly decreasing in the evening hours. In the
769
+ industrial zone, we expect a high demand in the morning with one peak around lunch time and an
770
+ almost null demand during the night. Finally, in the residential zone, we assume the presence of a
771
+ high density of private houses, with a comparatively low demand in the morning and a peak in the
772
+ evening and early night hours. These assumptions are consistent with several studies regarding the
773
+ spatial-temporal distribution of the charging demands observed in urban areas (see, e.g., Yi et al.,
774
+ 2020; Straub et al., 2021).
775
+ To generate the charging demand according to these patterns, we proceed as follows. We first
776
+ generate three basic profiles of demand that mimic the patterns described above for the commercial,
777
+ industrial, and residential zones, respectively. Such basic profiles are built according to the four
778
+ standard demand levels shown in Table 1. The resulting basic demand profiles are depicted in
779
+ Figure 3. For each i ∈ I and t = 1, . . . , 24, we randomly generate an initial demand value ˜dt
780
+ i from
781
+ a Poisson distribution with mean (and variance) equal to the standard level assigned to i and t in
782
+ the corresponding basic profile. For example, if i is in the commercial zone and t = 8, then ˜dt
783
+ i is a
784
+ realization of a Poisson with mean 2, cf. Figure 3(a). We then set:
785
+ dt
786
+ i =
787
+
788
+ ˜dt
789
+ i
790
+
791
+ t∈T ˜dt
792
+ i
793
+ · 10
794
+
795
+ ,
796
+ where [·] denotes the nearest integer rounding operator. In this way, we obtain that: (1) the total
797
+ daily demand from each demand node is around 10; (2) the total demand in each zone is consistent
798
+ with the corresponding basic demand profiles shown in Figure 3.
799
+ 5.1.2
800
+ Remaining parameters
801
+ We generated a set of instances by varying the number of demand nodes I, of potential stations J,
802
+ and of the maximum number of chargers to install in each station uj. All the remaining parameters
803
+ take the same value across all instances. The name of each instance is I J uj, where:
804
+ ✓ I: The number of demand nodes ranges according to the following values: I = 50, 100, 150,
805
+ 200, 250, and 500.
806
+ ✓ J: The number of potential stations ranges according to the following values: J = 10, 20, 30,
807
+ 40, and 50.
808
+ ✓ uj = u: The maximum number of chargers to install is equal across all the stations, and
809
+ ranges according to the following values: uj = 10, 20, and 30.
810
+ For example, instance 50 20 30 comprises 50 demand nodes, 20 potential stations, and parameter
811
+ uj is equal to 30. Note that the latter parameter is equal for each potential station j. We made
812
+ 13
813
+
814
+ (a) Commercial
815
+ (b) Residential
816
+ (c) Industrial
817
+ Figure 3: Basic hourly demand profile in each zone.
818
+ 14
819
+
820
+ 3
821
+ 2
822
+ 1
823
+ 0
824
+ 1
825
+ 2
826
+ 3
827
+ 4
828
+ 5
829
+ 6
830
+ 7
831
+ 8
832
+ 6
833
+ 10
834
+ 11
835
+ 12
836
+ 13
837
+ 14
838
+ 15
839
+ 16
840
+ 17
841
+ 18
842
+ 19
843
+ 20
844
+ 21
845
+ 22
846
+ 23
847
+ 243
848
+ 2
849
+ 1
850
+ 0
851
+ 1
852
+ 2
853
+ 3
854
+ 4
855
+ 5
856
+ 6
857
+ 7
858
+ 8
859
+ 9
860
+ 10
861
+ 11
862
+ 12
863
+ 13
864
+ 14
865
+ 15
866
+ 16
867
+ 17
868
+ 18
869
+ 19
870
+ 20
871
+ 21
872
+ 22
873
+ 23
874
+ 243
875
+ 2
876
+ 1
877
+ 0
878
+ 1
879
+ 2
880
+ 3
881
+ 4
882
+ 5
883
+ 6
884
+ 7
885
+ 8
886
+ 9
887
+ 10
888
+ 11
889
+ 12
890
+ 13
891
+ 14
892
+ 15
893
+ 16
894
+ 17
895
+ 18
896
+ 19
897
+ 20
898
+ 21
899
+ 22
900
+ 23
901
+ 24this choice to simplify the interpretation of the results. For the same reason, we decided to set
902
+ ujk = uj = u, for each j ∈ J and k ∈ K.
903
+ Each instance in our testbed has the following common characteristics:
904
+ ✓ The planning horizon considered is 1 day, discretized in time periods of one hour length.
905
+ Consequently, T = {1, 2, . . . , 24}.
906
+ ✓ The cost of opening one charging station is Fj =100,000 ∀j ∈ J.
907
+ ✓ Two types of chargers are considered. Therefore, K = {1, 2}, where 1 denotes quick chargers,
908
+ and 2 stands for fast chargers.
909
+ ✓ The cost of installing each type of chargers is fj1 = 3, 000 and fj2 =25,000 ∀j ∈ J for quick
910
+ and fast chargers, respectively.
911
+ ✓ Quick chargers need R1 = 4 hours to fully recharge an EV, whereas fast chargers require
912
+ R2 = 1 hour. Parameter pk for the SP-CFL model is determined as: pk = 24
913
+ Rk .
914
+ ✓ The minimum percentage of chargers of each type to deploy in each zone is the following:
915
+ – Commercial zone: at least 20% of quick chargers (ρC1 = 0.20), and at least 40% of fast
916
+ chargers (ρC2 = 0.40).
917
+ – Residential zone: at least 50% of quick chargers (ρR1 = 0.50), and at least 20% of fast
918
+ chargers (ρR2 = 0.20).
919
+ – Industrial zone: at least 25% of quick chargers (ρI1 = 0.25), and at least 25% of fast
920
+ chargers (ρI2 = 0.25).
921
+ Note that, in both MILP models, the two components in the respective objective function can take
922
+ very different values, differing even by orders of magnitude. In our experiments we scaled the two
923
+ components to make them comparable in value.
924
+ We initially considered all possible combinations of the values mentioned above for I, J, and
925
+ uj.
926
+ Subsequently, we ruled out each instance that turned out to be infeasible for both MILP
927
+ models.
928
+ This situation happened especially for the largest numbers of the demand nodes, the
929
+ smallest numbers of potential stations, and the smallest values of parameter uj. In such cases, the
930
+ maximum charging capacity, obtained opening all potential stations and deploying uj chargers in
931
+ each station j, turned out not to be sufficient to serve the total charging demand. All together, we
932
+ analyzed 67 instances.
933
+ 5.2
934
+ A comparison between COR and SEC instances
935
+ To illustrate the solutions obtained by the two MILP models on the COR and SEC instances, we
936
+ discuss the results obtained on two small instances. In both instances, the number I of demand
937
+ nodes is equal to 21, equally divided among the three zones. The number J of potential stations is
938
+ 5. We assumed that the planning horizon comprises 8 time periods, and that the demand profile
939
+ in each zone is the one depicted in Figure 4. These profiles are the same for both the COR and
940
+ SEC instance.
941
+ 15
942
+
943
+ (a) Commercial
944
+ (b) Residential
945
+ (c) Industrial
946
+ Figure 4: Illustrative example: Basic hourly demand profile in each zone.
947
+ An optimal solution produced by the MP-CFL model for the COR instance is depicted in Figure 5,
948
+ where demand nodes are colored circles (blue for the commercial zone, orange for the residential
949
+ zone, grey for the industrial zone) and potential locations are black triangles. Moreover, the color
950
+ of the edge connecting a demand node to a black triangle represents the fraction of the charging
951
+ demand assigned to the station thereby opened (black = 100% of the demand, yellow 75%, red
952
+ 66%, blue 50%, green 33% and gray 25%). Note that Figure 5 shows the assignments concerning
953
+ only the significant time periods. In other words, the assignments in time periods 3 and 8 are not
954
+ reported, the former since there is no demand in that time period, the latter because it is identical
955
+ to time period 7. Figure 6 displays an optimal solution to the SP-CFL model for the same instance.
956
+ The optimal solutions found by the two MILP models for the SEC instance are shown in Figures 7
957
+ and 8.
958
+ Comparing the optimal solutions for the COR instance obtained by the MP-CFL and the SP-CFL
959
+ models (see Figures 5 and 6, respectively), one can notice that in the former all the potential
960
+ stations are open and the charging demand is assigned, in the majority of the cases, to the nearest
961
+ station. The solution found by the SP-CFL model opens only three stations. This small example
962
+ highlights the limits of the latter model: it neglects that the charging demand is concentrated in
963
+ few peak time periods, and, consequently, underestimates the charging need in those time periods.
964
+ In fact, most of the demand is assigned to the charging station located in the central position
965
+ (coordinates (0,0)), but the chargers deployed there are not sufficient to serve all the EVs during
966
+ the peak hours. Due to the lower number of stations opened (3 against 5) and the number of
967
+ chargers approximately 40% lower (30 against 52), we observe that 17.04% of customers cannot be
968
+ served by the solution to SP-CFL.
969
+ Similar conclusions can be drawn observing the optimal solutions for the SEC instance produced
970
+ by the MP-CFL and the SP-CFL models (see Figures 7 and 8, respectively). As expected, there is no
971
+ remarkable difference between the computational time on the COR and SEC instances. To keep
972
+ a reasonable length of the paper, we conducted the extensive experiments on the COR instances
973
+ only.
974
+ 16
975
+
976
+ 3
977
+ 2
978
+ 1
979
+ 0
980
+ 1
981
+ 2
982
+ 3
983
+ 4
984
+ 5
985
+ 6
986
+ 7
987
+ 83
988
+ 2
989
+ 1
990
+ 0
991
+ 1
992
+ 2
993
+ 3
994
+ 4
995
+ 5
996
+ 6
997
+ 7
998
+ 83
999
+ 2
1000
+ 1
1001
+ 0
1002
+ 1
1003
+ 2
1004
+ 3
1005
+ 4
1006
+ 5
1007
+ 6
1008
+ 7
1009
+ 8(a) Time Period 1
1010
+ (b) Time Period 2
1011
+ (c) Time Period 4
1012
+ (d) Time Period 5
1013
+ (e) Time Period 6
1014
+ (f) Time Period 7
1015
+ Figure 5: COR instance: An optimal solution to the MP-CFL model.
1016
+ 17
1017
+
1018
+ T1
1019
+ 15
1020
+ 20
1021
+ 10
1022
+ 15T2
1023
+ 15
1024
+ 10
1025
+ 15
1026
+ 20
1027
+ -10T4
1028
+ 10
1029
+ 15
1030
+ 10
1031
+ 20T5
1032
+ 15
1033
+ OT
1034
+ 15
1035
+ 20T6
1036
+ 10
1037
+ 20
1038
+ 10T7
1039
+ 10
1040
+ 20
1041
+ OTFigure 6: COR instance: An optimal solution to the SP-CFL model.
1042
+ 5.3
1043
+ Computational results
1044
+ This section is devoted to the illustration and comment of the computational results. Before entering
1045
+ into the details of the results, we illustrate the solutions produced by the two MILP models for
1046
+ instance 200 30 30 and λ = 0.50. Figure 9 depicts, for each time period, the charging capacity
1047
+ installed and the demand satisfied by an optimal solution to model MP-CFL for instance 200 30 30.
1048
+ For each time period (vertical axis), the tornado diagram shows as bordered bars the number of
1049
+ chargers of each type deployed: the red bordered bars (left) are the fast chargers, whereas the
1050
+ black bordered bars (right) are the quick chargers. The solid bars represent the assignment of the
1051
+ charging demand. For each time period and type of charger, the bar indicates the total number
1052
+ of chargers assigned to EVs. Recall that quick chargers need multiple time periods to fully charge
1053
+ an EV. Hence, an EV assigned to a quick charger will use it for multiple consecutive time periods.
1054
+ From Figure 9, one can notice that the demand assigned to each type of chargers in each time
1055
+ period does not violate the charging capacity deployed. Note also that in several time periods the
1056
+ demand approaches the capacity installed, and these two quantities are sometimes even equal (see
1057
+ the fast chargers in time periods 12 through 16).
1058
+ 18
1059
+
1060
+ 15
1061
+ 10
1062
+ 15
1063
+ -10
1064
+ 5
1065
+ 20
1066
+ 10
1067
+ 15(a) Time Period 1
1068
+ (b) Time Period 2
1069
+ (c) Time Period 4
1070
+ (d) Time Period 5
1071
+ (e) Time Period 6
1072
+ (f) Time Period 7
1073
+ Figure 7: SEC instance: An optimal solution to the MP-CFL model.
1074
+ 19
1075
+
1076
+ T1
1077
+ 15
1078
+ 20T2
1079
+ 15
1080
+ 10
1081
+ 10
1082
+ 20
1083
+ 15T4
1084
+ 15
1085
+ 5
1086
+ 20
1087
+ 10T5T6
1088
+ 15
1089
+ 10
1090
+ 20T7
1091
+ 15
1092
+ OT
1093
+ 15
1094
+ 10Figure 8: SEC instance: An optimal solution to the SP-CFL model.
1095
+ Figure 9: An optimal solution to the MP-CFL model for instance 200 30 30: Charging capacity
1096
+ installed (bordered bars) and demand assigned (solid bars).
1097
+ The limits of the solution produced by the SP-CFL model are evident from Figure 10. The solution
1098
+ found by the SP-CFL model assigns, in several time periods, more EVs than the chargers actually
1099
+ available. For the fast chargers, this happens in time periods 8, 9, and from 12 to 22. On the other
1100
+ hand, for the quick chargers, this occurs in time periods 11 through 15. We observed this outcome
1101
+ for the majority of the instances tested.
1102
+ 20
1103
+
1104
+ 15
1105
+ 10
1106
+ 10
1107
+ 20
1108
+ 10100
1109
+ 50
1110
+ 0
1111
+ 50
1112
+ 100
1113
+ 150
1114
+ 200
1115
+ 250
1116
+ T1
1117
+ T2
1118
+ T3
1119
+ T4
1120
+ T5
1121
+ T6
1122
+ T7
1123
+ T8
1124
+ T9
1125
+ T10
1126
+ T11
1127
+ T12
1128
+ T13
1129
+ T14
1130
+ T15
1131
+ T16
1132
+ T17
1133
+ T18
1134
+ T19
1135
+ T20
1136
+ T21
1137
+ T22
1138
+ T23
1139
+ T24Figure 10: An optimal solution to the SP-CFL model for instance 200 30 30: Charging capacity
1140
+ installed (bordered bars) and demand assigned (solid bars).
1141
+ We now analyze more thoroughly the solutions produced by the two MILP models. To gain some
1142
+ insights about the two components of the objective functions, each instance is solved by each
1143
+ model for several values of the trade-o��� parameter λ. We tested the following values: λ = 0.0001
1144
+ (maximum weight on the minimization of the total opening and installing costs), 0.25, 0.5, 0.75,
1145
+ and 0.9999 (maximum weight on the minimization of the average distance traveled by the EVs).
1146
+ Table 2 provides, in the first three groups of columns, a summary of the charging capacity deployed
1147
+ by the solutions found by the two MILP models. For each group of instances and each model,
1148
+ Table 2 shows the average number of stations open (columns with header “Stations”), as well as
1149
+ the average number of quick and fast chargers installed. For each value of λ, we reported in bold
1150
+ the average value of each of the former statistics for the MP-CFL model, along with the average
1151
+ deviation from the latter value for the SP-CFL model. The last group of three columns provides
1152
+ some statistics about the solution of the SP-CFL model. In fact, the statistics refer to a modified
1153
+ solution obtained as follows. The deployed capacity remains unchanged. However, as the solution
1154
+ assigns the demand to open stations that may be overloaded in some peak periods of time, we
1155
+ modified the assignment of the demand to the stations with the goal of increasing the percentage
1156
+ of demand satisfied by the charging capacity deployed by the solution to the SP-CFL model.
1157
+ The procedure to modify the solution to the SP-CFL model iteratively considers one time period at
1158
+ a time, from 1 to T, and, for a given time period t, examines each demand node i, from 1 to I. The
1159
+ procedure checks whether the demand dt
1160
+ i of node i could be served in time period t according to
1161
+ the assignment indicated by the values of variables xijk. In this context, being served means that
1162
+ there is a number of vacant chargers k in station j greater than or equal to dt
1163
+ i · xijk.
1164
+ If such demand cannot be completely served, the unserved demand is reallocated among the vacant
1165
+ chargers of any type different from k available at the same station j, if any. Then, the procedure
1166
+ attempts to reallocate the remaining unserved demand among the other stations. If there are vacant
1167
+ chargers among multiple stations, priority is given to the one nearest to j. If at the station there
1168
+ 21
1169
+
1170
+ 100
1171
+ 75
1172
+ 50
1173
+ 25
1174
+ 0
1175
+ 25
1176
+ 50
1177
+ 75
1178
+ 100
1179
+ 125
1180
+ 150
1181
+ 175
1182
+ 200
1183
+ T1
1184
+ T2
1185
+ T3
1186
+ T4
1187
+ T5
1188
+ T6
1189
+ T7
1190
+ T8
1191
+ T9
1192
+ T10
1193
+ T11
1194
+ T12
1195
+ T13
1196
+ T14
1197
+ T15
1198
+ T16
1199
+ T17
1200
+ T18
1201
+ T19
1202
+ T20
1203
+ T21
1204
+ T22
1205
+ T23
1206
+ T24Stations
1207
+ Quick
1208
+ Fast
1209
+ SP-CFL
1210
+ λ
1211
+ I
1212
+ MP-CFL
1213
+ SP-CFL
1214
+ MP-CFL
1215
+ SP-CFL
1216
+ MP-CFL
1217
+ SP-CFL
1218
+ Reall%
1219
+ Lost%
1220
+ Max Lost%
1221
+ 0.0001
1222
+ 50
1223
+ 4.33
1224
+ 2.67
1225
+ 53.33
1226
+ 33.00
1227
+ 23.33
1228
+ 15.00
1229
+ 6.37%
1230
+ 21.00%
1231
+ 60.23%
1232
+ 100
1233
+ 8.20
1234
+ 5.00
1235
+ 101.07
1236
+ 60.53
1237
+ 45.87
1238
+ 30.40
1239
+ 9.82%
1240
+ 21.07%
1241
+ 58.33%
1242
+ 150
1243
+ 10.87
1244
+ 7.53
1245
+ 141.40
1246
+ 91.93
1247
+ 60.73
1248
+ 45.93
1249
+ 10.95%
1250
+ 20.88%
1251
+ 58.03%
1252
+ 200
1253
+ 14.64
1254
+ 9.71
1255
+ 186.00
1256
+ 126.50
1257
+ 94.14
1258
+ 61.00
1259
+ 10.41%
1260
+ 21.10%
1261
+ 58.60%
1262
+ 250
1263
+ 17.75
1264
+ 12.00
1265
+ 239.42
1266
+ 153.93
1267
+ 115.08
1268
+ 77.36
1269
+ 11.24%
1270
+ 21.28%
1271
+ 58.19%
1272
+ 500
1273
+ 31.25
1274
+ 21.64
1275
+ 418.56
1276
+ 300.18
1277
+ 198.78
1278
+ 154.82
1279
+ 13.24%
1280
+ 21.82%
1281
+ 55.89%
1282
+ Average
1283
+ 12.90
1284
+ -28.93%
1285
+ 171.01
1286
+ -30.32%
1287
+ 80.46
1288
+ -25.87%
1289
+ 10.19%
1290
+ 21.16%
1291
+ 58.32%
1292
+ 0.25
1293
+ 50
1294
+ 4.80
1295
+ 3.80
1296
+ 55.47
1297
+ 35.60
1298
+ 22.80
1299
+ 14.13
1300
+ 12.23%
1301
+ 21.15%
1302
+ 55.90%
1303
+ 100
1304
+ 8.13
1305
+ 5.33
1306
+ 95.00
1307
+ 61.73
1308
+ 47.07
1309
+ 29.93
1310
+ 12.12%
1311
+ 20.90%
1312
+ 58.43%
1313
+ 150
1314
+ 11.07
1315
+ 7.73
1316
+ 137.00
1317
+ 90.13
1318
+ 68.57
1319
+ 46.07
1320
+ 11.66%
1321
+ 20.98%
1322
+ 57.90%
1323
+ 200
1324
+ 14.14
1325
+ 9.79
1326
+ 170.14
1327
+ 120.64
1328
+ 97.93
1329
+ 62.14
1330
+ 12.17%
1331
+ 21.11%
1332
+ 57.73%
1333
+ 250
1334
+ 17.50
1335
+ 11.79
1336
+ 227.58
1337
+ 143.21
1338
+ 117.75
1339
+ 79.79
1340
+ 12.54%
1341
+ 21.35%
1342
+ 54.93%
1343
+ 500
1344
+ 30.38
1345
+ 21.27
1346
+ 393.44
1347
+ 287.27
1348
+ 229.75
1349
+ 159.00
1350
+ 14.56%
1351
+ 21.79%
1352
+ 54.95%
1353
+ Average
1354
+ 12.82
1355
+ -26.74%
1356
+ 162.39
1357
+ -29.14%
1358
+ 85.00
1359
+ -28.74%
1360
+ 12.46%
1361
+ 21.19%
1362
+ 56.73%
1363
+ 0.50
1364
+ 50
1365
+ 6.93
1366
+ 6.60
1367
+ 62.67
1368
+ 36.60
1369
+ 23.20
1370
+ 14.40
1371
+ 18.38%
1372
+ 19.64%
1373
+ 54.65%
1374
+ 100
1375
+ 8.67
1376
+ 7.60
1377
+ 97.73
1378
+ 73.67
1379
+ 46.20
1380
+ 27.00
1381
+ 14.02%
1382
+ 20.56%
1383
+ 62.05%
1384
+ 150
1385
+ 11.07
1386
+ 8.80
1387
+ 131.86
1388
+ 97.87
1389
+ 69.93
1390
+ 44.53
1391
+ 13.55%
1392
+ 20.58%
1393
+ 59.55%
1394
+ 200
1395
+ 14.21
1396
+ 10.71
1397
+ 166.71
1398
+ 126.29
1399
+ 98.86
1400
+ 60.86
1401
+ 13.93%
1402
+ 20.82%
1403
+ 58.03%
1404
+ 250
1405
+ 17.75
1406
+ 12.50
1407
+ 219.67
1408
+ 150.29
1409
+ 119.58
1410
+ 78.00
1411
+ 14.41%
1412
+ 21.06%
1413
+ 57.80%
1414
+ 500
1415
+ 30.88
1416
+ 21.55
1417
+ 441.50
1418
+ 285.73
1419
+ 230.50
1420
+ 158.82
1421
+ 16.00%
1422
+ 21.69%
1423
+ 54.80%
1424
+ Average
1425
+ 13.44
1426
+ -19.64%
1427
+ 163.51
1428
+ -26.20%
1429
+ 85.68
1430
+ -30.81%
1431
+ 14.86%
1432
+ 20.68%
1433
+ 57.95%
1434
+ 0.75
1435
+ 50
1436
+ 12.13
1437
+ 12.20
1438
+ 78.60
1439
+ 37.47
1440
+ 31.07
1441
+ 15.20
1442
+ 26.82%
1443
+ 17.09%
1444
+ 51.54%
1445
+ 100
1446
+ 12.20
1447
+ 11.40
1448
+ 120.60
1449
+ 70.27
1450
+ 50.20
1451
+ 28.53
1452
+ 19.83%
1453
+ 19.71%
1454
+ 60.30%
1455
+ 150
1456
+ 13.64
1457
+ 12.80
1458
+ 152.93
1459
+ 103.73
1460
+ 73.14
1461
+ 43.00
1462
+ 18.00%
1463
+ 20.06%
1464
+ 60.58%
1465
+ 200
1466
+ 15.21
1467
+ 13.50
1468
+ 173.36
1469
+ 137.07
1470
+ 97.14
1471
+ 58.14
1472
+ 16.34%
1473
+ 20.59%
1474
+ 59.90%
1475
+ 250
1476
+ 18.00
1477
+ 14.79
1478
+ 223.25
1479
+ 156.71
1480
+ 120.58
1481
+ 76.43
1482
+ 16.13%
1483
+ 20.88%
1484
+ 58.69%
1485
+ 500
1486
+ 30.63
1487
+ 21.91
1488
+ 428.25
1489
+ 285.36
1490
+ 233.75
1491
+ 157.91
1492
+ 17.78%
1493
+ 21.66%
1494
+ 54.67%
1495
+ Average
1496
+ 15.77
1497
+ -10.69%
1498
+ 175.14
1499
+ -29.15%
1500
+ 88.72
1501
+ -33.95%
1502
+ 19.02%
1503
+ 19.90%
1504
+ 57.71%
1505
+ 0.9999
1506
+ 50
1507
+ 21.20
1508
+ 21.20
1509
+ 96.87
1510
+ 40.53
1511
+ 41.27
1512
+ 17.00
1513
+ 31.11%
1514
+ 12.33%
1515
+ 47.73%
1516
+ 100
1517
+ 27.20
1518
+ 27.20
1519
+ 160.20
1520
+ 74.67
1521
+ 77.60
1522
+ 31.40
1523
+ 26.57%
1524
+ 16.04%
1525
+ 52.02%
1526
+ 150
1527
+ 29.71
1528
+ 28.40
1529
+ 212.93
1530
+ 104.33
1531
+ 113.86
1532
+ 46.87
1533
+ 24.51%
1534
+ 16.62%
1535
+ 57.10%
1536
+ 200
1537
+ 30.93
1538
+ 30.07
1539
+ 245.50
1540
+ 141.43
1541
+ 146.00
1542
+ 61.86
1543
+ 23.28%
1544
+ 17.41%
1545
+ 57.54%
1546
+ 250
1547
+ 33.58
1548
+ 30.79
1549
+ 276.00
1550
+ 165.29
1551
+ 158.29
1552
+ 79.43
1553
+ 22.05%
1554
+ 17.92%
1555
+ 57.05%
1556
+ 500
1557
+ 38.75
1558
+ 34.55
1559
+ 429.38
1560
+ 285.45
1561
+ 375.25
1562
+ 165.27
1563
+ 19.59%
1564
+ 19.90%
1565
+ 52.74%
1566
+ Average
1567
+ 29.33
1568
+ -3.25%
1569
+ 218.95
1570
+ -41.67%
1571
+ 132.99
1572
+ -53.23%
1573
+ 24.80%
1574
+ 16.53%
1575
+ 54.02%
1576
+ Table 2: MP-CFL vs. SP-CFL models: An analysis of the solutions found.
1577
+ 22
1578
+
1579
+ are vacant chargers of multiple types, priority is given to the type that has the largest number of
1580
+ vacant units. Let 0 ≤ ¯dt
1581
+ i ≤ dt
1582
+ i be the demand arising in node i at time period t that the procedure
1583
+ has reallocated. Eventually, the procedure computes the fraction of the total demand that has been
1584
+ reallocated, in percentage, producing statistic “Reall%”. For each instance, the fraction of the total
1585
+ demand reallocated is computed as 100 ·
1586
+
1587
+ t∈T
1588
+
1589
+ i∈I ¯dt
1590
+ i
1591
+
1592
+ t∈T
1593
+
1594
+ i∈I dt
1595
+ i .
1596
+ If, after the reallocation procedure, a portion of the demand is not served, the fraction of the total
1597
+ demand that remains unserved is computed, in percentage, producing statistic “Lost%”. For each
1598
+ instance, the latter is computed as 100 ·
1599
+
1600
+ t∈T
1601
+
1602
+ i∈I ˇdt
1603
+ i
1604
+
1605
+ t∈T
1606
+
1607
+ i∈I dt
1608
+ i , where 0 ≤ ˇdt
1609
+ i ≤ dt
1610
+ i is the demand arising in
1611
+ node i at time period t that is not served. Finally, the procedure computes statistic “Max Lost%”
1612
+ as the maximum fraction of demand not served across all time periods. The latter is computed for
1613
+ each instance as 100 · max
1614
+ t∈T
1615
+ � �
1616
+ i∈I ˇdt
1617
+ i
1618
+
1619
+ i∈I dt
1620
+ i
1621
+
1622
+ .
1623
+ From Table 2 we can gain the following insights:
1624
+ ✓ the charging capacity deployed in the solutions to the SP-CFL model is significantly smaller
1625
+ than the capacity installed according to the MP-CFL model, both in terms of stations open
1626
+ and chargers installed (see statistics “Stations”, “Quick”, and “Fast”);
1627
+ ✓ reducing the weight of the opening and installing costs (i.e., increasing the value of λ), the
1628
+ average deviation between the solutions to the two models in terms of stations open decreases
1629
+ steadily, from -28.93% for λ = 0.0001 to -3.25% for λ = 0.9999. Nevertheless, the average
1630
+ number of chargers installed (of each type) in the solutions found by the SP-CFL model is
1631
+ always remarkably smaller compared to those produced by the MP-CFL model;
1632
+ ✓ given a value of λ, for both models the greater the number of demand nodes, the greater
1633
+ the number of stations open and chargers installed (see statistics “Stations”, “Quick”, and
1634
+ “Fast”);
1635
+ ✓ the larger the value of λ, the larger the values of “Stations”, “Quick”, and “Fast”. This is an
1636
+ expected outcome, as more importance is given to the average distance term in the objective
1637
+ functions. In other words, the reduction of the average distance traveled can only be achieved
1638
+ by increasing the number of stations opened and chargers deployed;
1639
+ ✓ due to the cheaper installation cost, both models install a larger number of quick compared
1640
+ to fast chargers.
1641
+ Before entering into the details of the statistics computed to measure the limits of the SP-CFL model,
1642
+ it is worth pointing out that in every solution found by the latter model, a part of the demand was
1643
+ reallocated, and a part was lost. The main insights we can gain from the three rightmost columns
1644
+ of Table 2 are the following:
1645
+ ✓ “Reall%” takes, on average, large values. It ranges from 6.37% (see λ = 0.0001 and I = 50)
1646
+ to 31.11% (see λ = 0.9999 and I = 50);
1647
+ ✓ “Lost%” takes, on average, large values as well. It ranges from 12.33% (see λ = 0.9999 and
1648
+ I = 50) to 21.82% (see λ = 0.0001 and I = 500);
1649
+ ✓ “Max Lost%” takes, on average, extremely large values, always larger than 47%.
1650
+ 23
1651
+
1652
+ (a) Demand reallocated (“Reall%”)
1653
+ (b) Unserved demand (“Lost%”)
1654
+ (c) Maximum fraction of unserved demand across all time periods (“Max Lost%”)
1655
+ Figure 11: SP-CFL model: Box-and-wisker plots showing the distribution of the demand reallocated
1656
+ and lost (I = 200).
1657
+ 24
1658
+
1659
+ 0.0001
1660
+ 0.25
1661
+
1662
+ 0.5
1663
+ 0.75
1664
+ 0.9999
1665
+ 10
1666
+ 15
1667
+ 20
1668
+ 25
1669
+ 30
1670
+ %0.0001
1671
+ 0.25
1672
+ Y
1673
+ 0.5
1674
+ 0.75
1675
+ 0.9999
1676
+ 16
1677
+ 17
1678
+ 18
1679
+ 19
1680
+ 20
1681
+ 21
1682
+ 22
1683
+ 23
1684
+ %0.0001
1685
+ 0.25
1686
+
1687
+ 0.5
1688
+ 0.75
1689
+ 0.9999
1690
+ 45
1691
+ 50
1692
+ 55
1693
+ 60
1694
+ 65
1695
+ %The statistics confirm that the SP-CFL model is not capable of capturing the characteristics of the
1696
+ problem and tends to underestimate the charging capacity to deploy.
1697
+ Further insights that can be obtained from Table 2 on the limits of the SP-CFL model are as follows:
1698
+ ✓ for values of λ smaller than or equal to 0.25, the average value of “Reall%” tends to increase
1699
+ with the number of demand nodes;
1700
+ ✓ for values of λ greater than or equal to 0.75, the average value of “Reall%” tends to decrease
1701
+ with the number of demand nodes;
1702
+ ✓ the larger the value of λ, the larger the average value of “Reall%”, and the smaller tends to
1703
+ be the value of “Lost%”. This behavior can be explained by observing that increasing the
1704
+ value of λ, the number of stations opened and chargers installed increases as well, making it
1705
+ easier to find vacant chargers, and thereby reducing the unserved demand. of “Max Lost%”
1706
+ slightly decreases as the value of λ” increases.
1707
+ The box-and-whisker plots depicted in Figure 11 show the distribution of the values of the three
1708
+ statistics computed to determine the reallocated demand, and the unserved demand, for all the
1709
+ instances with I = 200 solved for different values of λ. The box-and-whisker plots confirm the
1710
+ insights previously drawn. When the main term in the objective function of the SP-CFL model is
1711
+ the opening and installing cost - i.e, for small values of λ - the charging capacity installed is small
1712
+ and little can be done to reallocate the unserved demand. As a consequence, large percentages of
1713
+ the charging demand are unserved. By increasing the weight given to the average distance traveled
1714
+ - i.e., for large values of λ - the charging capacity installed increases. Consequently, the percentage
1715
+ of the demand that can be reallocated increases, and, thereby, the percentage of the demand that
1716
+ is unserved becomes smaller. Nevertheless, the latter percentages always remain quite large (the
1717
+ values are always greater than 16%, and often greater than 20%). The performance is even worse
1718
+ if we analyze the distribution of “Max Lost%”. Its average value ranges from approximately 56%
1719
+ to roughly 60% (see the dotted lines inside the boxes). Similar conclusions can be drawn observing
1720
+ the results obtained when solving the instances with a different number of demand nodes. For the
1721
+ sake of readability, such results are not reported here.
1722
+ The results discussed above clearly show that the solutions found by the SP-CFL model, if imple-
1723
+ mented, would lead to a very poor quality of service provided to the EV drivers. Moreover, the
1724
+ results on demand reallocation imply that the objective function of SP-CFL would underestimate
1725
+ the total travel distance covered by the EV drivers to reach a free charging station.
1726
+ The following analysis is focused only on the solutions of the MP-CFL model. Figure 12 illustrates
1727
+ the distributions of the values of the average distance traveled (first term in the objective function)
1728
+ and the opening and installing cost (second term), for all the instances with I = 200 solved for
1729
+ different values of λ.
1730
+ From Figure 12, we can draw the following main insights:
1731
+ ✓ as expected, the larger the value of λ, the smaller the average distance traveled by an EV to
1732
+ reach the assigned charger;
1733
+ ✓ besides its largest value, increasing the value of λ produces only slight increases in the values
1734
+ of the total cost.
1735
+ 25
1736
+
1737
+ (a) Distribution of average distance traveled.
1738
+ (b) Distribution of total opening and installing costs.
1739
+ Figure 12: MP-CFL model: Box-and-wisker plots showing the distribution of the average distance
1740
+ and the cost (I = 200).
1741
+ In fact, we expected a sharper increase of the values of the total cost when less importance is given
1742
+ to the second term of the objective function. On the contrary, and neglecting the extreme case
1743
+ with λ = 0.9999, when the value of λ is increased the solutions obtained by the MP-CFL model
1744
+ significantly improved the average traveling distance, at the cost of only a small deterioration of
1745
+ the total opening and installing cost.
1746
+ We conclude our analysis by considering the computational burden required to solve each MILP
1747
+ model. Recall that each instance is solved with a time limit of 3,600 seconds. Table 3 summarizes
1748
+ the computational performance of the two MILP models. For each value of λ, the instances are
1749
+ clustered in groups according to the number of potential locations J. For each group of instances
1750
+ and each model, Table 3 provides the average CPU time (in seconds) spent to find the optimal (or
1751
+ best) solution (columns with header “CPU Time (secs.)”), the average optimality gap (“Gap%”)
1752
+ and the worst optimality gap (“Max Gap%”).
1753
+ The main insights that we can gain from Table 3 are as follows:
1754
+ ✓ the solution to the MP-CFL model is, in general, more computationally expensive compared
1755
+ to the SP-CFL model (see the average values of “CPU Time (secs.)”, and the average values
1756
+ of “Gap%”);
1757
+ ✓ the optimality gaps, for both models, are on average very small. In the majority of the cases,
1758
+ the solver found an optimal solution, or a solution very close to the optimum;
1759
+ ✓ the worst gaps, for both models, are also very small. In only few instances, statistic “Max
1760
+ Gap%” took a value greater than 1%;
1761
+ ✓ as expected, for a given value of λ, computing times for both models increase with the number
1762
+ of potential locations;
1763
+ 26
1764
+
1765
+ 0.0001
1766
+ 0.25
1767
+
1768
+ 0.5
1769
+ 0.75
1770
+ 0.9999
1771
+ 80
1772
+ 100
1773
+ 120
1774
+ 140
1775
+ 160
1776
+ 180
1777
+ 200
1778
+ 2200.0001
1779
+ 0.25
1780
+
1781
+ 0.5
1782
+ 0.75
1783
+ 6666'0
1784
+ 400
1785
+ 500
1786
+ 600
1787
+ 700
1788
+ 800
1789
+ 900
1790
+ 1000
1791
+ 10kUSDCPU Time (secs.)
1792
+ Gap%
1793
+ Max Gap%
1794
+ λ
1795
+ J
1796
+ MP-CFL
1797
+ SP-CFL
1798
+ MP-CFL
1799
+ SP-CFL
1800
+ MP-CFL
1801
+ SP-CFL
1802
+ 0.0001
1803
+ 10
1804
+ 1,456.48
1805
+ 820.60
1806
+ 0.13%
1807
+ 0.09%
1808
+ 0.45%
1809
+ 0.76%
1810
+ 20
1811
+ 2,775.72
1812
+ 2,404.48
1813
+ 0.61%
1814
+ 0.46%
1815
+ 1.85%
1816
+ 1.87%
1817
+ 30
1818
+ 3,308.19
1819
+ 2,759.82
1820
+ 1.03%
1821
+ 1.08%
1822
+ 2.90%
1823
+ 3.69%
1824
+ 40
1825
+ 3,515.42
1826
+ 3,142.17
1827
+ 0.94%
1828
+ 1.23%
1829
+ 2.90%
1830
+ 3.69%
1831
+ 50
1832
+ 3,513.11
1833
+ 3,330.17
1834
+ 1.08%
1835
+ 1.43%
1836
+ 2.90%
1837
+ 3.69%
1838
+ Average
1839
+ 3,037.11
1840
+ 2,568.85
1841
+ 0.81%
1842
+ 0.90%
1843
+ 0.25
1844
+ 10
1845
+ 660.83
1846
+ 259.72
1847
+ 0.03%
1848
+ 0.01%
1849
+ 0.17%
1850
+ 0.11%
1851
+ 20
1852
+ 2,133.02
1853
+ 922.11
1854
+ 0.12%
1855
+ 0.04%
1856
+ 0.60%
1857
+ 0.37%
1858
+ 30
1859
+ 2,923.03
1860
+ 1,320.37
1861
+ 0.31%
1862
+ 0.13%
1863
+ 0.92%
1864
+ 0.82%
1865
+ 40
1866
+ 3,156.36
1867
+ 1,790.20
1868
+ 0.45%
1869
+ 0.19%
1870
+ 1.19%
1871
+ 1.07%
1872
+ 50
1873
+ 3,406.24
1874
+ 2,120.10
1875
+ 0.55%
1876
+ 0.18%
1877
+ 1.77%
1878
+ 0.84%
1879
+ Average
1880
+ 2,614.44
1881
+ 1,335.04
1882
+ 0.32%
1883
+ 0.11%
1884
+ 0.50
1885
+ 10
1886
+ 263.90
1887
+ 2.43
1888
+ 0.00%
1889
+ 0.00%
1890
+ 0.00%
1891
+ 0.00%
1892
+ 20
1893
+ 1,135.25
1894
+ 338.01
1895
+ 0.01%
1896
+ 0.01%
1897
+ 0.06%
1898
+ 0.17%
1899
+ 30
1900
+ 2,544.90
1901
+ 1,334.12
1902
+ 0.19%
1903
+ 0.07%
1904
+ 0.67%
1905
+ 0.66%
1906
+ 40
1907
+ 2,739.82
1908
+ 2,051.00
1909
+ 0.34%
1910
+ 0.09%
1911
+ 1.06%
1912
+ 0.58%
1913
+ 50
1914
+ 2,978.22
1915
+ 2,145.28
1916
+ 0.97%
1917
+ 0.10%
1918
+ 6.85%
1919
+ 0.49%
1920
+ Average
1921
+ 2,094.62
1922
+ 1,238.01
1923
+ 0.34%
1924
+ 0.06%
1925
+ 0.75
1926
+ 10
1927
+ 6.45
1928
+ 2.51
1929
+ 0.00%
1930
+ 0.00%
1931
+ 0.00%
1932
+ 0.00%
1933
+ 20
1934
+ 376.49
1935
+ 1,183.04
1936
+ 0.00%
1937
+ 0.01%
1938
+ 0.02%
1939
+ 0.13%
1940
+ 30
1941
+ 1,678.43
1942
+ 1,984.19
1943
+ 0.04%
1944
+ 0.05%
1945
+ 0.41%
1946
+ 0.22%
1947
+ 40
1948
+ 2,449.72
1949
+ 2,298.07
1950
+ 0.06%
1951
+ 0.07%
1952
+ 0.37%
1953
+ 0.24%
1954
+ 50
1955
+ 2,926.84
1956
+ 2,312.06
1957
+ 0.40%
1958
+ 0.06%
1959
+ 4.28%
1960
+ 0.22%
1961
+ Average
1962
+ 1,648.46
1963
+ 1,629.29
1964
+ 0.11%
1965
+ 0.04%
1966
+ 0.9999
1967
+ 10
1968
+ 2.80
1969
+ 1.97
1970
+ 0.00%
1971
+ 0.00%
1972
+ 0.00%
1973
+ 0.00%
1974
+ 20
1975
+ 966.18
1976
+ 1,488.73
1977
+ 0.00%
1978
+ 0.00%
1979
+ 0.00%
1980
+ 0.00%
1981
+ 30
1982
+ 1,575.65
1983
+ 2,581.28
1984
+ 0.00%
1985
+ 0.00%
1986
+ 0.00%
1987
+ 0.00%
1988
+ 40
1989
+ 1,864.13
1990
+ 3,243.86
1991
+ 0.00%
1992
+ 0.00%
1993
+ 0.00%
1994
+ 0.00%
1995
+ 50
1996
+ 2,569.15
1997
+ 2,957.01
1998
+ 0.00%
1999
+ 0.00%
2000
+ 0.00%
2001
+ 0.00%
2002
+ Average
2003
+ 1,528.78
2004
+ 2,152.78
2005
+ 0.00%
2006
+ 0.00%
2007
+ Table 3: MP-CFL vs. SP-CFL models: A summary of CPU times and optimality gaps.
2008
+ ✓ the computational burden required to solve each MILP model decreases as the value of λ
2009
+ increases.
2010
+ In summary, while the MP-CFL model requires on average more computational time than the SP-CFL
2011
+ model, the additional time needed by the MP-CFL model is marginally small.
2012
+ 6
2013
+ Conclusions
2014
+ In this paper, we studied the role of temporal and spatial distributions of charging demand in
2015
+ determining an optimal location of charging stations for electrical vehicles in an urban setting.
2016
+ This is an application context where the daily demand is well-known to be very dynamic and
2017
+ concentrated at some peak hours, and where the demand pattern is known to depend also upon
2018
+ the city zone.
2019
+ To highlight the need of considering explicitly the daily demand patterns, we presented a multi-
2020
+ 27
2021
+
2022
+ period optimization model, that captures the variability over time of the demand, and compared it
2023
+ with a single-period optimization model. By means of a worst-case analysis, we theoretically proved
2024
+ that the single-period model may produce solutions where a large portion of the demand cannot
2025
+ be served.
2026
+ Extensive computational experiments confirm the limits of the single-period model.
2027
+ The goal of the optimization models is to balance two objectives: the total cost of deploying the
2028
+ infrastructure and the average distance traveled by the customers to reach a charging station.
2029
+ The limits pointed out for the single-period model go beyond the specific application considered
2030
+ in this paper, and suggest the importance of incorporating time-dependency in location decisions
2031
+ when the demand fluctuations are remarkable during the planning horizon.
2032
+ Future developments of the research may concern the objective function. Since the two objectives
2033
+ considered are not homogeneous, a thorough analysis of the trade-off between infrastructure cost
2034
+ and drivers traveling distance may be of interest to a decision-maker. Moreover, we expect that
2035
+ replacing the average traveling distance with some equity measures may produce solutions that
2036
+ are more satisfactory for the customers, at the cost of a little increase in the infrastructure cost.
2037
+ Finally, to solve larger instances, in particular when an equity measure is considered, a heuristic
2038
+ approach would deserve to be studied.
2039
+ Acknowledgements
2040
+ This study has been made in the framework of the MoSoRe@UniBS (Infrastrutture e servizi per
2041
+ la Mobilit`a Sostenibile e Resiliente) Project 2020-2022 of Lombardy Region, Italy (Call-Hub ID
2042
+ 1180965; bit.ly/2Xh2Nfr, https://ricerca2.unibs.it/?page id=8548).
2043
+ References
2044
+ Anjos, M. F., Gendron, B., and Joyce-Moniz, M. (2020). Increasing electric vehicle adoption through
2045
+ the optimal deployment of fast-charging stations for local and long-distance travel. European
2046
+ Journal of Operational Research, 285(1):263–278.
2047
+ Bekli, S., Boyacı, B., and Zografos, K. G. (2021). Enhancing the performance of one-way electric
2048
+ carsharing systems through the optimum deployment of fast chargers. Transportation Research
2049
+ Part B: Methodological, 152:118–139.
2050
+ Brandst¨atter, G., Kahr, M., and Leitner, M. (2017). Determining optimal locations for charging
2051
+ stations of electric car-sharing systems under stochastic demand. Transportation Research Part
2052
+ B: Methodological, 104:17–35.
2053
+ Brandst¨atter, G., Leitner, M., and Ljubi´c, I. (2020). Location of charging stations in electric car
2054
+ sharing systems. Transportation Science, 54(5):1408–1438.
2055
+ Burgess, E. W. (2008). The growth of the city: An introduction to a research project. In Urban
2056
+ Ecology, pages 71–78. Springer.
2057
+ Cavadas, J., de Almeida Correia, G. H., and Gouveia, J. (2015). A MIP model for locating slow-
2058
+ charging stations for electric vehicles in urban areas accounting for driver tours. Transportation
2059
+ Research Part E: Logistics and Transportation Review, 75:188–201.
2060
+ 28
2061
+
2062
+ Deb, S., Tammi, K., Kalita, K., and Mahanta, P. (2018). Review of recent trends in charging
2063
+ infrastructure planning for electric vehicles. Wiley Interdisciplinary Reviews: Energy and Envi-
2064
+ ronment, 7(6):e306.
2065
+ Dong, G., Ma, J., Wei, R., and Haycox, J. (2019). Electric vehicle charging point placement opti-
2066
+ misation by exploiting spatial statistics and maximal coverage location models. Transportation
2067
+ Research Part D: Transport and Environment, 67:77–88.
2068
+ Filippi, C., Guastaroba, G., and Speranza, M. G. (2021). On single-source capacitated facility
2069
+ location with cost and fairness objectives. European Journal of Operational Research, 289(3):959–
2070
+ 974.
2071
+ Hall, T. and Barrett, H. (2012). Urban Geography. Routledge.
2072
+ Hosseini, M., MirHassani, S. A., and Hooshmand, F. (2017).
2073
+ Deviation-flow refueling location
2074
+ problem with capacitated facilities: Model and algorithm.
2075
+ Transportation Research Part D:
2076
+ Transport and Environment, 54:269–281.
2077
+ Hoyt, H. (1939). The structure and growth of residential neighborhoods in American cities. US
2078
+ Government Printing Office.
2079
+ Huang, K., Kanaroglou, P., and Zhang, X. (2016). The design of electric vehicle charging network.
2080
+ Transportation Research Part D: Transport and Environment, 49:1–17.
2081
+ Kchaou-Boujelben, M. (2021). Charging station location problem: A comprehensive review on mod-
2082
+ els and solution approaches. Transportation Research Part C: Emerging Technologies, 132:103376.
2083
+ Kuby, M. and Lim, S. (2005). The flow-refueling location problem for alternative-fuel vehicles.
2084
+ Socio-Economic Planning Sciences, 39(2):125–145.
2085
+ Laporte, G., Nickel, S., and Saldanha-da Gama, F. (2019). Introduction to location science. In La-
2086
+ porte, G., Nickel, S., and Saldanha-da Gama, F., editors, Location science, pages 1–21. Springer.
2087
+ Li, X. and Jenn, A. (2022). An integrated optimization platform for spatial-temporal modeling of
2088
+ electric vehicle charging infrastructure. Transportation Research Part D: Transport and Envi-
2089
+ ronment, 104:103177.
2090
+ MirHassani, S. and Ebrazi, R. (2013). A flexible reformulation of the refueling station location
2091
+ problem. Transportation Science, 47(4):617–628.
2092
+ Moloughney, T. (2021). What are the different levels of electric vehicle charging? https://www.
2093
+ forbes.com/wheels/advice/ev-charging-levels/ (Last accessed: 15th November 2022).
2094
+ Pareek, S., Sujil, A., Ratra, S., and Kumar, R. (2020). Electric vehicle charging station challenges
2095
+ and opportunities: A future perspective. In 2020 International Conference on Emerging Trends
2096
+ in Communication, Control and Computing (ICONC3), pages 1–6. IEEE.
2097
+ Pevec, D., Babic, J., Carvalho, A., Ghiassi-Farrokhfal, Y., Ketter, W., and Podobnik, V. (2020).
2098
+ A survey-based assessment of how existing and potential electric vehicle owners perceive range
2099
+ anxiety. Journal of Cleaner Production, 276:122779.
2100
+ Quddus, M. A., Kabli, M., and Marufuzzaman, M. (2019). Modeling electric vehicle charging station
2101
+ expansion with an integration of renewable energy and Vehicle-to-Grid sources. Transportation
2102
+ Research Part E: Logistics and Transportation Review, 128:251–279.
2103
+ 29
2104
+
2105
+ Rajabi-Ghahnavieh, A. and Sadeghi-Barzani, P. (2017). Optimal zonal fast-charging station place-
2106
+ ment considering urban traffic circulation. IEEE Transactions on Vehicular Technology, 66(1):45–
2107
+ 56.
2108
+ Straub, F., Streppel, S., and G¨ohlich, D. (2021).
2109
+ Methodology for estimating the spatial and
2110
+ temporal power demand of private electric vehicles for an entire urban region using open data.
2111
+ Energies, 14(8):2081.
2112
+ Wolbertus, R., Kroesen, M., Van Den Hoed, R., and Chorus, C. (2018). Fully charged: An empirical
2113
+ study into the factors that influence connection times at EV-charging stations. Energy Policy,
2114
+ 123:1–7.
2115
+ Yi, T., Zhang, C., Lin, T., and Liu, J. (2020). Research on the spatial-temporal distribution of
2116
+ electric vehicle charging load demand: A case study in China. Journal of Cleaner Production,
2117
+ 242:118457.
2118
+ Yıldız, B., Arslan, O., and Kara¸san, O. E. (2016). A branch and price approach for routing and
2119
+ refueling station location model. European Journal of Operational Research, 248(3):815–826.
2120
+ Zhang, Y., Liu, X., Zhang, T., and Gu, Z. (2019). Review of the electric vehicle charging station
2121
+ location problem. In Wang, G., Bhuiyan, M. Z. A., De Capitani di Vimercati, S., and Ren,
2122
+ Y., editors, Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys
2123
+ 2019, CCIS 1123, pages 435–445, Singapore. Springer Singapore.
2124
+ Zhu, Z.-H., Gao, Z.-Y., Zheng, J.-F., and Du, H.-M. (2016). Charging station location problem of
2125
+ plug-in electric vehicles. Journal of Transport Geography, 52:11–22.
2126
+ 30
2127
+
5dE4T4oBgHgl3EQfbwyA/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9NFQT4oBgHgl3EQf5jYf/content/tmp_files/2301.13435v1.pdf.txt ADDED
@@ -0,0 +1,2217 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ Exciton diffusion in amorphous organic semiconductors:
4
+ reducing simulation overheads with machine learning
5
+
6
+ Chayanit Wechwithayakhlung1,2, Geoffrey R. Weal3,4,2, Yu Kaneko5, Paul A. Hume3,4,
7
+ Justin M. Hodgkiss3,4, Daniel M. Packwood1,2*
8
+
9
+ 1 Institute for Integrated Cell-Material Sciences (iCeMS), Kyoto University, Kyoto, Japan
10
+
11
+ 2 Center for Integrated Data-Material Sciences (iDM), MacDiarmid Institute for Advanced
12
+ Materials and Nanotechnology, Wellington, New Zealand
13
+
14
+ 3 MacDiarmid Institute for Advanced Materials and Nanotechnology, Wellington, New
15
+ Zealand
16
+
17
+ 4 School of Chemical and Physical Sciences, Victoria University of Wellington, Wellington,
18
+ New Zealand
19
+
20
+ 5 Daicel Corporate Research Center, Innovation Park (iPark), Daicel Corporation, Himeiji,
21
+ Japan
22
+
23
+ * Corresponding author. Email: dpackwood@icems.kyoto-u.ac.jp
24
+
25
+ Abstract
26
+
27
+ Simulations of exciton and charge hopping in amorphous organic materials involve
28
+ numerous physical parameters. Each of these parameters must be computed from costly
29
+ ab initio calculations before the simulation can commence, resulting in a significant
30
+ computational overhead for studying exciton diffusion, especially in large and complex
31
+ material datasets. While the idea of using machine learning to quickly predict these
32
+ parameters has been explored previously, typical machine learning models require long
33
+ training times which ultimately contribute to simulation overheads. In this paper, we
34
+ present a new machine learning architecture for building predictive models for
35
+ intermolecular exciton coupling parameters. Our architecture is designed in such a way
36
+ that the total training time is reduced compared to ordinary Gaussian process regression
37
+ or kernel ridge regression models. Based on this architecture, we build a predictive
38
+ model and use it to estimate the coupling parameters which enter into an exciton hopping
39
+ simulation in amorphous pentacene. We show that this hopping simulation is able to
40
+ achieve excellent predictions for exciton diffusion tensor elements and other properties
41
+ as compared to a simulation using coupling parameters computed entirely from density
42
+ functional theory. This result, along with the short training times afforded by our
43
+ architecture, therefore shows how machine learning can be used to reduce the high
44
+ computational overheads associated with exciton and charge diffusion simulations in
45
+ amorphous organic materials.
46
+
47
+
48
+
49
+
50
+
51
+
52
+
53
+
54
+ 2
55
+
56
+ 1. Introduction
57
+
58
+ Efficient methods for simulating charge and energy transport in solid-state organic
59
+ materials will accelerate the development of novel organic electronics and energy
60
+ conversion devices. In organic materials, large reorganization energies tend to localize
61
+ electronic states, resulting in a transport mechanism in which charge or energy carriers
62
+ hop between molecules [1, 2]. Several methods for simulating carrier hopping exist, each
63
+ of which involve physical parameters such as electronic couplings that need to be
64
+ estimated beforehand via computationally intensive ab initio calculations. For the case
65
+ of amorphous organic materials, a considerable number of ab initio calculations are
66
+ typically required, as physical parameters need to be computed for each of the many
67
+ unique intermolecular interactions and local environments which exist in the disordered
68
+ system. This large number of calculations represents a huge computational overhead
69
+ which must be surmounted before charge or energy dynamics can be simulated in an
70
+ amorphous organic materials.
71
+
72
+ Excitons - electron-hole charge pairs that are bound together by Coulombic attraction -
73
+ are important energy carriers in solid-state organic materials [3, 4, 5]. The diffusion of
74
+ excitons between molecules is central to the function of organic semiconductor
75
+ technologies, including photovoltaics (solar cells) [3, 6, 7], light-emitting diodes (LEDs)
76
+ [8, 9, 10], lasers [11, 12], and photocatalysts [13 - 17]. For these technologies, the exciton
77
+ diffusion rate is an important figure-of-merit for assessing candidate materials. Indeed,
78
+ for the case of organic photovoltaics, high exciton diffusion rates are needed to ensure
79
+ that the exciton can reach the heterojunction before the exciton decays via electron-hole
80
+ recombination and other processes [3]. This effect in turn constrains the sizes of the
81
+ donor and acceptor domains. Similarly, hyperfluorescent LEDs rely on efficient exciton
82
+ diffusion in order to selectively funnel excitons to terminal emitter molecules [18, 19].
83
+ While exciton diffusion rates obtained from hopping-type simulations have achieved
84
+ good agreement with spectroscopic measurements [20 - 22], the computational
85
+ overheads of these simulations must be addressed before they can facilitate the large-
86
+ scale screening of materials for technological applications.
87
+
88
+ Over the last several years, machine learning has emerged as a powerful means of
89
+ reducing the demands of simulations in computational materials science [23, 24]. With
90
+ machine learning, one can bypass the resource-intensive parts of a simulation with
91
+ regression models trained on structure-property databases. For the case of exciton
92
+ diffusion in organic materials, one might imagine substituting machine-learned
93
+ regression models for the heavy ab initio calculations used to estimate exciton couplings
94
+ or other physical parameters which enter into a hopping model. These physical
95
+ parameters, which usually would be calculated one-by-one from first-principles, would
96
+ instead be obtained with negligible computational cost by feeding them through a simple
97
+ regression model.
98
+
99
+ Several groups have recently presented regression models for estimating intermolecular
100
+ coupling energies in a variety of organic materials as well as in related biological systems.
101
+ Lederer et al presented a kernel ridge regression (KRR) model trained to predict coupling
102
+ parameters for charge hopping in pentacene, and used the model predictions in a
103
+ subsequent kinetic Monte Carlo charge hopping simulation [25]. Similar works were
104
+ subsequently reported by Wang et al [26], Kramer et al [27], Farahvash et al [28], and
105
+ Gagliardi et al [29], which further demonstrated the ability of KRR-based models (and
106
+
107
+ 3
108
+
109
+ their Bayesian generalizations, Gaussian process regression (GPR) models) for quickly
110
+ predicting coupling energy parameters in pentacene and other simple organic solids. In
111
+ addition to KRR or GPR-based models, neural network models for predicting such
112
+ coupling parameters have been presented by Farahvash et al [28], Wang [30], and Li et
113
+ al [31]. Related works for the case of biological systems have been reported by Maiti and
114
+ co-workers, in which neural network models were trained to predict coupling parameters
115
+ between DNA bases [32, 33], and by Cignoni et al, who presented a KRR model for
116
+ predicting exciton coupling energies between pigment molecules in a protein complex
117
+ [34]. The high prediction accuracies achieved by these models, as well as their
118
+ minuscule prediction times compared to ab initio calculations, point towards an optimistic
119
+ future in which exciton transport simulations could be performed with relatively small
120
+ computational overhead.
121
+
122
+ However, despite the success of the above studies, there is one important contribution
123
+ to the computational overhead of an exciton hopping simulation which has not been
124
+ addressed so far: the large training times required for typical machine learning models.
125
+ Indeed, for models based on GPR or KRR – two of the most popular methods in
126
+ computational materials science – model training times scale as N3, where N is the size
127
+ of the training data set. Most of the studies cited above used enormous amounts of
128
+ training data, ranging from a few thousand to a few hundred thousand instances, which
129
+ necessarily implies enormous training times. Large training times add to the
130
+ computational overhead of subsequent exciton diffusion simulations, reducing the overall
131
+ advantage of using machine-learned models over ab initio calculations.
132
+
133
+ In this paper, we present a new machine-learning architecture for predicting exciton
134
+ coupling parameters in amorphous organic semiconductors. For the training data sizes
135
+ considered here (N ~ 3000), our architecture allows one to build regression models within
136
+ around 25 % of the time required to build a standard GPR model. On the basis of a new
137
+ type of sensitivity analysis, we confirm that our constructed model can be interpreted in
138
+ terms of straightforward and consistent structural information, thereby supporting its
139
+ generality beyond the training data. Moreover, we show that this model is sufficiently
140
+ accurate for use in subsequent exciton diffusion simulations, in spite of the reduced
141
+ training times. We apply our architecture for the case of exciton transport in amorphous
142
+ pentacene, however it is not restricted to this particular material. This architecture can
143
+ also be applied to charge transport in organic materials. This work therefore provides a
144
+ means to reduce the computational overheads associated with hopping simulations of
145
+ exciton and charge dynamics.
146
+
147
+ This paper is organized as follows. In section 2 we describe our methods and our
148
+ machine-learning architecture for building predictive models of intermolecular exciton
149
+ coupling. Section 3 describes our results, including the outcome of our model sensitivity
150
+ analysis and the validation of our predicted coupling parameters in an exciton diffusion
151
+ simulation. Discussion and conclusions are left to section 4.
152
+
153
+ 2. Method
154
+
155
+ 2.1. Generation of amorphous pentacene system
156
+
157
+ We study exciton diffusion in the amorphous pentacene system shown in Figure 1A. The
158
+ amorphous pentacene configuration was generated by consecutive molecular dynamics
159
+
160
+ 4
161
+
162
+ simulations as follows. First, 800 pentacene molecules were placed at random into a 100
163
+ x 100 x 100 Å box using the Packmol package [35]. An amorphous phase was then
164
+ generated in multiple steps. In the first step, a geometry optimization was performed. In
165
+ the second step, velocities were assigned to each atom by sampling from a Boltzmann
166
+ distribution at 600 K, and a sequence of 100 ps-long molecular dynamics simulations
167
+ were performed at 1000 atm and temperatures of 500, 400, 600, 700, 600, 500, 600,
168
+ 600, 250, and 300 K, respectively. Another simulation at 1000 atm and 300 K was then
169
+ performed for 500 ps in order to induce molecule agglomeration. In the third step, a
170
+ sequence of 2 ns-long simulations were performed at 100 atm at temperatures of 300 K,
171
+ 250 K, 300 K, and 200 K in order to relax the molecule geometries and local
172
+ environments around each molecule. In the fourth step, two 2 ns-long simulations were
173
+ performed at 1 atm and temperatures of 200 K and 250 K, respectively, in order to induce
174
+ the formation of amorphous pentacene. In the final step, the velocity vectors for each
175
+ molecule were examined to confirm the absence of high-energy molecules. Each
176
+ molecular dynamics simulation was performed using 2 fs time steps, and the simulation
177
+ box was allowed to relax in each case. Simulations were performed using the GAFF2
178
+ force field [36] and the GROMACS package [37]. Periodic boundary conditions were
179
+ applied throughout the entire procedure. Temperature and pressure regulation were
180
+ applied using the Nose-Hoover thermostat [38, 39] and Berendsen algorithm [40],
181
+ respectively. The amorphous pentacene configuration can be downloaded in CIF format
182
+ in Supporting Information 1.
183
+
184
+ Amorphous pentacene was selected as a model material because it is a representative
185
+ small molecule semiconductor with a flat aromatic structure typical of many high-mobility
186
+ cases. Pentacene also lacks the structural degrees of freedom arising from electronically
187
+ inert side chains, which facilitates the generation of realistic amorphous packing
188
+ structures. However, while our exciton coupling parameters and diffusion simulations
189
+ consider singlet excitons, in real thin films of crystalline pentacene triplet excitons also
190
+ play an important role when singlet excitons undergo singlet fission at particular sites
191
+
192
+ Figure 1. (A) Amorphous pentacene system considered in this study. Grey and white spheres
193
+ correspond to carbon and hydrogen atoms, respectively. The chemical structure of pentacene is shown
194
+ in the insert. (B) Summary of the machine-learning architecture for predicting exciton coupling energies
195
+ for pentacene dimers. SVM indicates the support vector machine component. GPR1 and GPR2 indicate
196
+ the two Gaussian process regression components.
197
+
198
+ B
199
+ Dimer
200
+ Feature Extraction
201
+ SVM
202
+ GPR1
203
+ GPR2
204
+ Prediction
205
+ Prediction5
206
+
207
+ [41]. For the case of amorphous pentacene, singlet exciton fission rates should be
208
+ reduced due to the increased difficulty of reaching the single fission sites compared to
209
+ the crystalline case. Nonetheless, we emphasize that the amorphous pentacene model
210
+ used for these calculations is an ideal model system to test our machine-learning
211
+ architecture, because it embodies a situation in which thousands of electronic
212
+ configurations emerge from amorphous packing of a relatively simple molecular building
213
+ block.
214
+
215
+ 2.2. Dimer extraction and density functional theory calculations
216
+
217
+ Pentacene dimers were extracted from the amorphous pentacene system using an in-
218
+ house dimer extraction code. A pair of molecules was considered a dimer if any two
219
+ carbon atoms in the respective molecules were within 5.0 Å of each other. Dimers
220
+ involving molecules spanning across the cell boundary (due to periodic boundary
221
+ conditions) were included. In total, 4927 pentacene dimers were obtained. Structure files
222
+ for these dimers are provided in Supporting Information 2. Our extraction code was
223
+ written in Python 3 and used the Atomic Simulation Environment, NetworkX, and
224
+ Pymatgen packages [42 - 44].
225
+
226
+ For a dimer composed of pentacene molecules a and b, the exciton coupling value is
227
+ defined as
228
+
229
+ ab
230
+ b
231
+ a
232
+ v
233
+ H
234
+
235
+
236
+
237
+ ,
238
+
239
+
240
+
241
+
242
+
243
+
244
+
245
+
246
+ (1)
247
+
248
+ where a and b denote states in which a singlet excitation is localized on molecules a
249
+ and b, respectively, and H is the Hamiltonian operator for the dimer. For each dimer, the
250
+ exciton coupling energy was calculated using the electronic energy transfer (EET)
251
+ method as implemented in the Gaussian 16 software package [45]. In this method, the
252
+ exciton coupling energy is computed in a perturbative way by contracting the converged
253
+ transition densities of the isolated molecules via the linear response time-dependent
254
+ density functional theory (TDDFT) Hamiltonian of the dimer [46, 47]. Single-point excited
255
+ state energies were calculated using the CAM-B3LYP functional [48], along with the 6-
256
+ 311+G(2d,p) basis set. Integrals were evaluated with an ultrafine integration grid and the
257
+ accuracy of two-electron integrals set to 10-12. Linear response TDDFT calculations for
258
+ the lowest 10 excited states were performed within the Tamm–Dankoff approximation.
259
+
260
+ 2.3. Machine learning architecture
261
+
262
+ A family of models for predicting exciton coupling values for molecular dimers was
263
+ constructed within a common machine learning architecture. This architecture consists
264
+ of the four components shown in Figure 1B, and each model differs in the settings (choice
265
+ of kernel functions, values of numerical parameters, etc.) which specify each component.
266
+ The four components are a feature extraction procedure, a support vector machine
267
+ (SVM), and two Gaussian procession regression estimators (GPR1 and GPR2).
268
+
269
+ In short, this architecture allows for reduced training times as follows. Rather than
270
+ constructing a single GPR component valid for all possible exciton coupling values, this
271
+ architecture uses two GPR components which are respectively trained to make
272
+ predictions in a ‘weak’ and a ‘strong’ coupling regime only. These two GPR components
273
+
274
+ 6
275
+
276
+ can therefore be built using a smaller amount of training data than a single GPR
277
+ component which is valid for all cases. Moreover, because the time cost of building a
278
+ GPR estimator scales cubically (as N3, where N is the size of the training data), training
279
+ two GPR components with a small amount of training data can be less time consuming
280
+ than training a single component with a large amount of data. The SVM component
281
+ needs to be trained in addition to the two GPR components, however this can be
282
+ performed relatively quickly as explained below.
283
+
284
+ In order to select a model for predicting exciton coupling values, a two-stage procedure
285
+ was used. In the first stage, multiple models were built using a small set of training data
286
+ and a simplified training procedure. The results of this stage were then used in the
287
+ second stage, in which a final model was built using a larger amount of training data and
288
+ a rigorous training procedure.
289
+
290
+ In the following we describe the four components in detail.
291
+
292
+ Feature extraction. Feature extraction refers to the generation of a real-valued vector (a
293
+ feature vector) to describe a pentacene dimer. The feature extraction process in our
294
+ architecture involves three steps. Let x denote a pentacene dimer. In the first step, a
295
+ Coulomb matrix M(x) = [Mij(x)]n x n, where n = 72 is the number of atoms in the dimer, is
296
+ generated [49]. For a pair of atoms i and j contained in the same molecule, Mij(x) is set
297
+ to 0. If i and j are contained in different molecules, then Mij(x) is set to 1/Rij, where Rij is
298
+ the distance between i and j. In the second step, a vector W(x) is computed from the
299
+ matrix M(x). W(x) has length n, and is obtained by selecting the largest element of each
300
+ row of M(x) and sorting them in descending order. We write this vector as
301
+
302
+  
303
+  
304
+  
305
+
306
+
307
+ 1
308
+ 2
309
+ ( )
310
+ ,
311
+ ,...,
312
+ n
313
+ x
314
+ W x W
315
+ x
316
+ W
317
+ x
318
+
319
+ W
320
+ .
321
+
322
+
323
+
324
+
325
+
326
+ (2)
327
+
328
+ In the third step, principal component analysis is used to reduce the dimensions of W(x).
329
+ The resulting vector
330
+
331
+  
332
+  
333
+  
334
+  
335
+
336
+
337
+ 1
338
+ 2
339
+ ,
340
+ ,
341
+ ,
342
+ d
343
+ n
344
+ x
345
+ U
346
+ x U
347
+ x
348
+ U
349
+ x
350
+
351
+ U
352
+ ,
353
+
354
+
355
+
356
+
357
+
358
+ (3)
359
+
360
+ where Uk(x) is the kth principal component and nd < n, is the feature vector for dimer x.
361
+
362
+ In order to set the feature extraction component, only the parameter nd needs to be
363
+ specified. The models in this work used either nd = 4, 5, or 6. Larger values of nd are
364
+ unjustified, as the principal component analysis showed that over 99 % of the variation
365
+ in the data was accounted for by the first six principal components.
366
+
367
+ SVM. Support vector machines (SVM) are a type of classifier. In this work, they are used
368
+ to classify dimers as exhibiting either weak or strong exciton coupling values. Using the
369
+ predictions of the SVM, the set of extracted dimers can be divided into two sets exhibiting
370
+ weak and strong coupling, respectively. GPR1 and GPR2 can then be trained using data
371
+ sampled from the weak coupling and strong coupling sets, respectively.
372
+
373
+ Intuitively, a SVM performs classification by transforming the feature vector U(x) into a
374
+ high-dimensional space equipped with a linear hyperplane. This hyperplane is oriented
375
+
376
+ 7
377
+
378
+ in such a way that dimers with weak and strong exciton coupling energies appear on
379
+ respective sides of the plane. Given the hyperplane, the classification for a dimer x can
380
+ be predicted according to the formula
381
+
382
+  
383
+
384
+
385
+
386
+
387
+
388
+
389
+ 1
390
+ sign
391
+ ,
392
+ ,
393
+ N
394
+ i
395
+ k
396
+ k
397
+ k
398
+ k
399
+ i
400
+ k
401
+ h x
402
+ y
403
+ y
404
+ K x
405
+ x
406
+ K x
407
+ x
408
+
409
+
410
+
411
+
412
+
413
+
414
+
415
+
416
+
417
+
418
+
419
+
420
+ ,
421
+
422
+
423
+
424
+ (4)
425
+
426
+ where yi is the classification of the ith dimer in the training data (equal to -1 or +1 for weak
427
+ and strong coupling cases, respectively), k is a coefficient which is set during the
428
+ construction of the hyperplane, and N is the size of the training data [50]. Note that
429
+ equation (4) holds for any choice of i. The function K is the so-called kernel function; in
430
+ essence, the transformation of the feature vectors takes place through K.
431
+
432
+ The SVM component requires specification of four settings. The first is the value of the
433
+ parameter vc, which is the value which defines which exciton couplings are classified as
434
+ weak and which are classified as strong. For a dimer x, the coupling energy vx is defined
435
+ as weak if |vx| < vc and as strong otherwise. For the models used in this work, vc was set
436
+ to 0.005 eV, 0.0075 eV, or 0.0082 eV. The second setting is the choice of kernel function.
437
+ For the models used in this work, linear, radial, third-order polynomial, and sigmoid
438
+ kernel functions were used (see reference [50] for their definitions). The third setting is
439
+ the value of the parameter used in the kernel function. Each of the kernel functions
440
+ involved here used a single parameter. The fourth setting is the value of the penalty
441
+ parameter for training points which locate on the wrong side the hyperplane.
442
+
443
+ Compared to the GPR components discussed next, the SVM component can be trained
444
+ relatively quickly even with a large amount of training data. For a specific choice of
445
+ settings, the time required for building the hyperplane scales as N, the size of the training
446
+ data [51]. In practice, however, the values of kernel parameter and cost parameter often
447
+ need to be optimized in order to obtain a hyperplane with sufficient accuracy.
448
+
449
+ GPR1 and GPR2. GPR1 and GPR2 are regression estimators which are trained to make
450
+ predictions for weak and strong exciton couplings, respectively. GPR1 and GPR2 are
451
+ trained using dimers which have been classified as weak- and strong-coupling cases,
452
+ respectively, by the SVM.
453
+
454
+ GPR1 and GPR2 are both constructed using the Gaussian process regression (GPR)
455
+ method. GPR involves constructing a probability density on the space of candidate
456
+ values for vx, where vx represents the exciton coupling for a dimer x [52]. This probability
457
+ density is given by
458
+
459
+
460
+
461
+
462
+
463
+ 2
464
+ 2
465
+ 2
466
+ 1
467
+ exp
468
+ 2
469
+ 2
470
+ x
471
+ x
472
+ x
473
+ x
474
+ x
475
+ v
476
+ g v
477
+ s
478
+ s
479
+
480
+
481
+
482
+
483
+
484
+
485
+
486
+
487
+
488
+
489
+
490
+
491
+
492
+ ,
493
+
494
+
495
+
496
+
497
+
498
+ (5)
499
+
500
+ where g(vx) can be interpreted as the probability of the exciton coupling is equal to vx
501
+ given the training data. This probability maximizes at x, which can be deduced using a
502
+ so-called Bayesian procedure. Applying this procedure yields (see [53] for proof)
503
+
504
+
505
+ 8
506
+
507
+ 1
508
+ x
509
+ x
510
+
511
+
512
+  Σ Σ V .
513
+
514
+
515
+
516
+
517
+
518
+
519
+
520
+
521
+ (6)
522
+
523
+ In equation (6),  = λIN’ + [σij]N’ x N’ , where λ is a positive parameter, IN’ is an N’ x N’
524
+ identity matrix, N’ is the training data size and
525
+
526
+
527
+
528
+ ,
529
+ ij
530
+ i
531
+ j
532
+ C x x
533
+  
534
+
535
+
536
+
537
+
538
+
539
+
540
+
541
+
542
+
543
+ (7)
544
+
545
+ is the covariance between xi and xj. Intuitively, C(xi, xj) measures the structural similarity
546
+ between training dimers xi and xj. The term λIN’ is included to ensure numerical stability
547
+ when computing the inverse of  and does not have a physical meaning. x is a 1 x N’
548
+ row matrix of covariances between dimer x and the dimers in the training data, i.e., x =
549
+ (C(x,x1), C(x,x1), …, C(x,xN’)). V = (v1, v2, … ,vN’)T is a column matrix of exciton coupling
550
+ values from the training data. x in equation (6) can be interpreted as a weighted sum of
551
+ the coupling values in the training data, where the weights reflect the degree of structural
552
+ similarity between x and the dimers in the training data. The variance sx2 in equation (5)
553
+ is given by
554
+
555
+
556
+
557
+ 2
558
+ 1
559
+ ,
560
+ T
561
+ x
562
+ x
563
+ x
564
+ s
565
+ C x x
566
+
567
+
568
+  Σ Σ Σ .
569
+
570
+
571
+
572
+
573
+
574
+
575
+
576
+ (8)
577
+
578
+ For both GPR1 and GPR2, x is used as the predictor for the exciton coupling vx. For
579
+ both GPR1 and GPR2 in all models, we set C(xi, xj) equal to the squared exponential
580
+ function:
581
+
582
+
583
+
584
+ 2
585
+ 0
586
+ ,
587
+ ij
588
+ d
589
+ i
590
+ j
591
+ C x x
592
+ b e
593
+
594
+
595
+ ,
596
+
597
+
598
+
599
+
600
+
601
+
602
+
603
+
604
+ (9)
605
+
606
+ where
607
+
608
+  
609
+  
610
+
611
+
612
+ 2
613
+ 2
614
+ 1
615
+ d
616
+ n
617
+ ij
618
+ k
619
+ k
620
+ i
621
+ k
622
+ j
623
+ k
624
+ d
625
+ b U
626
+ x
627
+ U
628
+ x
629
+
630
+
631
+
632
+
633
+
634
+
635
+
636
+
637
+
638
+
639
+
640
+ (10)
641
+
642
+ and the constants b0, b1, …, bnd are parameters (known as hyperparameters in this
643
+ context) and nd is the feature dimension specified in the feature extraction component.
644
+
645
+ The GPR components are specified by setting the values of the parameters λ and
646
+ hyperparameters b0, b1, …, and bnd. In order to obtain a GPR component with sufficient
647
+ accuracy, the hyperparameters b0, b1, …, and bnd almost always need to be optimized in
648
+ some way. The time required for a single step of the optimization process scales as N’3,
649
+ where N’ is the size of the training data [54]. This scaling arises from need to invert the
650
+ covariance matrix when computing equation (6). Moreover, this optimization takes place
651
+ in a space of dimension 5 to 7 (one dimension for each of the nd + 1 hyperparameters)
652
+ and can therefore require very many iterations before convergence is reached. In order
653
+ to achieve short training times, it is important that GPR1 and GPR2 are trained using
654
+ small sets of training data.
655
+
656
+ Model selection. The models developed during the first stage of selection were trained
657
+
658
+ 9
659
+
660
+ using a set of 100 pentacene dimers along with their DFT-calculated exciton coupling
661
+ energies. The same training data set was used to train each component. In order to
662
+ reduce training times and therefore compare a larger number of models, the kernel and
663
+ penalty parameters for the SVM component were set to 1/nd and 1, respectively, and
664
+ were not optimized. For training the subsequent GPR1 and GPR2 components, these
665
+ 100 dimers were split into two subsets according to the predictions of the SVM
666
+ component. GPR1 (GPR2) was then built by using 80 % of the weak coupling (strong
667
+ coupling) subset as training data and the remaining 20 % as testing data.
668
+ Hyperparameters were optimized with respect to the mean-square error (MSE) of the
669
+ predictions with respect to the testing data. A full list of models tested during the first
670
+ stage of selection are listed in Supporting Information 3.
671
+
672
+ For the second stage of selection, we trained a single model based on the results
673
+ obtained above. The SVM, GPR1, and GPR2 components were each built using an
674
+ independently selected sample of 1000 dimers. For each component, 800 dimers were
675
+ used for training and 200 used as testing data. SVM kernel and penalty parameters were
676
+ optimized with respect to the SVM classification fail rate compared to a set of test data.
677
+ This optimization was performed using a grid search. The hyperparameters of the GPR
678
+ components were optimized as described above.
679
+
680
+ All calculations related to model selection were performed in the R environment using
681
+ custom code [55]. The e1071 package was used to fit the SVM components [56]. The L-
682
+ BFGS-B gradient optimizer as implemented in R was used to optimize GPR
683
+ hyperparameters [57].
684
+
685
+ 2.4. Kinetic Monte Carlo (kMC)
686
+
687
+ Kinetic Monte Carlo (kMC) is a method for simulating diffusion dynamics. This method
688
+ treats the exciton diffusion process as a random hopping process over a network of
689
+ molecules. In our kMC simulations, each molecule corresponds to one of the pentacene
690
+ molecules from the amorphous pentacene system in Figure 1A. Hopping takes place
691
+ within the dimers extracted above, and for each dimer the hopping rate constant is a pre-
692
+ defined constant. The rate constant for hopping from molecule a to b was defined
693
+ according to Marcus theory [58, 59]:
694
+
695
+
696
+
697
+
698
+
699
+ 2
700
+ 2
701
+ 1 2
702
+ 2
703
+ exp
704
+ 4
705
+ 4
706
+ ab
707
+ ab
708
+ r
709
+ ab
710
+ r
711
+ B
712
+ r
713
+ B
714
+ v
715
+ E
716
+ k
717
+ k T
718
+ k T
719
+
720
+
721
+ 
722
+ 
723
+
724
+
725
+
726
+
727
+
728
+
729
+
730
+
731
+
732
+
733
+
734
+
735
+ ,
736
+
737
+
738
+
739
+
740
+ (11)
741
+
742
+ where vab is the exciton coupling between molecules a and b, ħ is the reduced Planck
743
+ constant, kB is the Boltzmann constant, T is temperature, ΔEab is the energy difference
744
+ between molecule a and molecule b, and λr is the reorganization energy associated with
745
+ excitation energy transfer. In most simulations of exciton diffusion ΔEab is treated as a
746
+ random variable sampled from a Gaussian distribution with mean zero [60]. In this work,
747
+ we set ΔEab to zero and neglect energetic disorder, thereby allowing us to focus on
748
+ comparing simulations using DFT-calculated excitonic couplings with those predicted
749
+ from our model. Likewise, λr was kept constant for all molecules, i.e. the effect of different
750
+ local environments on the reorganization energy is neglected. Note that kab is only non-
751
+ zero for dimers extracted from our dimer extraction code (section 2.2). Dimers not
752
+
753
+ 10
754
+
755
+ extracted from our code were considered far apart such that their coupling was negligible.
756
+
757
+ Our kMC simulations were initialized at time t = 0 by randomly placing the exciton on one
758
+ of the 800 pentacene molecules from the amorphous pentacene system. Denoting this
759
+ molecule as a, a residence time was calculated according to
760
+
761
+ ~
762
+ ln
763
+ a
764
+ ad
765
+ d
766
+ a
767
+ z
768
+ k
769
+
770
+
771
+   
772
+ ,
773
+
774
+
775
+
776
+
777
+
778
+
779
+
780
+
781
+ (12)
782
+
783
+ where z is a random number sampled between 0 and 1 and d ~ a denotes all molecules
784
+ neighboring molecule a. The simulation time was advanced by Δτa and the exciton was
785
+ shifted to a neighboring molecule b with probability
786
+
787
+ ~
788
+ ab
789
+ ab
790
+ ad
791
+ d a
792
+ k
793
+ p
794
+ k
795
+  
796
+ .
797
+
798
+
799
+
800
+
801
+
802
+
803
+
804
+
805
+ (13)
806
+
807
+ The above process was iterated for molecule b, and so on, until the end of the simulation.
808
+
809
+ Periodic boundary conditions were applied so that the amorphous pentacene system
810
+ was repeated indefinitely in all directions. The reorganization energy of a pentacene
811
+ molecule was obtained as [61]
812
+
813
+
814
+  
815
+
816
+ *
817
+ *
818
+ r
819
+ g
820
+ e
821
+ g
822
+ e
823
+ E
824
+ E
825
+ E
826
+ E
827
+  
828
+
829
+
830
+
831
+ ,
832
+
833
+
834
+
835
+
836
+
837
+
838
+ (14)
839
+
840
+ where E* and E denote the energies of the excited state and ground state, respectively,
841
+ and subscripts g and e denote optimized geometries in the ground and existed states,
842
+ respectively. These energies were calculated using the CAM-B3LYP functional and 6-
843
+ 311+G(2d,p) basis set, resulting in a value of λr = 340.6 meV.
844
+
845
+ All simulations were run for a simulation time of 1 ns. kMC simulations were repeated
846
+ 10,000 times independently in order to compute probability distributions and statistics
847
+ related to exciton diffusion.
848
+
849
+ 3. Results
850
+
851
+ 3.1. Comparison of candidate models (selection stage 1)
852
+
853
+ The results of the first stage of our model selection procedure are summarized in Figure
854
+ 2A - E. Each point corresponds to one distinct choice of settings for the Feature
855
+ Extraction, SVM, and initial hyperparameters (before optimization) for the two GPR
856
+ components (a full list of model parameter values is provided in Supporting Information
857
+ 3). Each point is presented as a pair of adjacent squares, where the color of the left-
858
+ (right-) hand square corresponds to the mean-square error (MSE) of the GPR1 (GPR2)
859
+ component when tested against test data. The lower the value of the mean-square error
860
+ (MSE) (i.e., the more blue the point in Figures 2A – E), the more accurately the GPR
861
+ components can predict the value of excitonic coupling. The points are positioned
862
+
863
+ 11
864
+
865
+ t
866
+ Figure 2. (A – E). Results of the first stage of model selection. Each point corresponds to one choice of
867
+ settings for the Feature Extraction, SVM, and the two GPR components. The points are presented as
868
+ adjacent squares, where the left (right)-hand square is colored according to the mean-square error
869
+ (MSE) of GPR1 (GPR2) compared to test data. In each plot, we highlight the effect of certain settings
870
+ by increasing the size of the corresponding points. The models which achieved the lowest MSE for
871
+ GPR1 (GPR2) are indicated by the dotted (solid) circle (F) Performance of a selected model. This model
872
+ used nd = 5, a polynomial kernel for the SVM component, vc = 0.0075 eV, and GPR1 (GPR2) covariance
873
+ hyperparameters initialized at 0.1 (0.01). See text for details.
874
+
875
+ 007
876
+ 2
877
+ t-SNE dimension
878
+ log(MSE)
879
+ Polynomial
880
+ nd = 5
881
+ kernel
882
+ 200
883
+ 100
884
+ 100
885
+ 200
886
+ 300
887
+ 200
888
+ 100
889
+ 100
890
+ 200
891
+ 300
892
+ Initial hyperparameters
893
+ V.=0.0075 eV
894
+ :0.01
895
+ -200
896
+ 100
897
+ 100
898
+ 200
899
+ 006
900
+ 200
901
+ -100
902
+ 100
903
+ 200
904
+ 300
905
+ 0.03
906
+ Model prediction (eV)
907
+ 0
908
+ 0.01
909
+ Initial hyperparameters
910
+ .00
911
+ = 0.1
912
+ 200
913
+ -100
914
+ 100
915
+ 200
916
+ 300
917
+ 0.00
918
+ 0.01
919
+ 0.02
920
+ 0.03
921
+ t-SNE dimension 1
922
+ Testdata(ey)12
923
+
924
+ according to the dissimilarity of the model settings using the t-distributed stochastic
925
+ neighbor embedding (t-SNE) technique [62]. Here, the dissimilarity between models i
926
+ and j is defined as
927
+
928
+ ,
929
+ ,
930
+ ,
931
+ ,
932
+ i
933
+ j
934
+ d
935
+ d
936
+ c
937
+ c
938
+ i
939
+ j
940
+ i
941
+ j
942
+ i
943
+ j
944
+ ij
945
+ K K
946
+ n
947
+ n
948
+ v
949
+ v
950
+ h h
951
+ D
952
+
953
+
954
+
955
+
956
+
957
+
958
+
959
+
960
+ ,
961
+
962
+
963
+
964
+
965
+
966
+
967
+ (15)
968
+
969
+ where δrs is the Kronecker delta, and Ki, ndi, vci, and hi refer to the SVM kernel type,
970
+ feature dimension, coupling strength cut-off (vc), and initial GPR hyperparameter values
971
+ used for the gradient optimizer, respectively, for model i.
972
+
973
+ In Figures 2A – C, we can identify the common features of the Feature Extraction and
974
+ SVM components of the low MSE models: nd = 5, vc = 0.0075 eV, and third-order
975
+ polynomial kernels for the SVM component. Models using these settings can be
976
+ identified by the enlarged points. For the final model, the Feature Extraction and SVM
977
+ compounds should therefore be built using these settings.
978
+
979
+ For the purpose of building a final model, it is more useful to compare the initial values
980
+ used for hyperparameter optimization rather than the final optimized hyperparameter
981
+ values directly. This is because the hyperparameters will need to be optimized again
982
+ when dealing with a new set of training data. According to Figures 2D – E, the
983
+ hyperparameters for GPR1 and GPR2 should be initialized with different values in order
984
+ to achieve good performance. In particular, the hyperparameters of GPR1 should be
985
+ initialized at 0.1 and those of GPR2 should be initialized at 0.01 in order for the gradient
986
+ optimizer to reach a good set of final values. In Figures 2A – E, two models that initialized
987
+ GPR1 and GPR2 in this way are indicated by the dotted and solid circles. For these two
988
+ models, we also find that λ = 0.0001 and 0.001, respectively. This indicates that the GPR
989
+ components should also be built using different values of λ.
990
+
991
+ The results above therefore suggest that a good model could be built using the following
992
+ settings: nd = 5 for the Feature Extraction component; vc = 0.0075 eV and third-order
993
+ polynomial kernels for the SVM component; λ = 0.0001 and initial hyperparameter values
994
+ of 0.1 for the GPR1 component; and λ = 0.001 and initial hyperparameter values of 0.01
995
+ for the GPR2 component. Figure 4F shows the predictive performance of such a model.
996
+ The agreement between predicted and DFT-calculated exciton couplings is impressive,
997
+ however due to the small size of the training and test sets, such agreement is unlikely to
998
+ hold for all dimers in the amorphous pentacene system.
999
+
1000
+ 3.2. Model interpretation using sensitivity analysis
1001
+
1002
+ We now investigate whether the high-performing model in Figure 2C can be interpreted
1003
+ in a physically meaningful way. To this end we proceed in two steps.
1004
+
1005
+ In the first step, we plot the vectorized Coulomb matrices W(x) (section 2.3 equation (2))
1006
+ for each of the 100 dimers in the training data. This plot is shown in Figure 3A as a 100
1007
+ x 72 matrix. The cell in row i and column r corresponds to Wr(xi), the rth element of the
1008
+ vector for dimer xi. The cell is red if the Coulomb interaction in Vr(xi) is between two H
1009
+ atoms, gray if between an H and a C atom, and blue if between two C atoms. The left
1010
+ and right edges of the matrix in Figure 3A are clearly dominated by interactions involving
1011
+ hydrogen atoms. Indeed, interactions involving carbon atoms do not appear on the left-
1012
+
1013
+ 13
1014
+
1015
+ hand side of the plot at all until column r = 10. For the columns r = 1, 2, and 3, interactions
1016
+ between hydrogen atoms alone are observed for 64 %, 64 %, and 53 % of the dimers,
1017
+ respectively. Similarly, for column r = 72 on the right-hand edge of the plot, 11 % of the
1018
+ interactions are between carbon and hydrogen, and 89 % between pairs of hydrogen
1019
+ atoms.
1020
+
1021
+ In the second step, we determine which Coulomb interactions GPR1 and GPR2 are most
1022
+ sensitive to. To do this, we expand the features Uk(xi) as
1023
+
1024
+  
1025
+  
1026
+ 1
1027
+ n
1028
+ k
1029
+ i
1030
+ kr
1031
+ r
1032
+ i
1033
+ r
1034
+ U
1035
+ x
1036
+ c W
1037
+ x
1038
+
1039
+ 
1040
+ ,
1041
+
1042
+
1043
+
1044
+
1045
+
1046
+
1047
+
1048
+ (16)
1049
+
1050
+ where ckr are expansion coefficients. Equation (16) follows from the definition of principal
1051
+ components. Inserting equation (16) into equation (10) gives
1052
+
1053
+  
1054
+
1055
+
1056
+
1057
+
1058
+ 2
1059
+ 2
1060
+ 1
1061
+ 1
1062
+ 1
1063
+ d
1064
+ n
1065
+ n
1066
+ ij
1067
+ kr
1068
+ r
1069
+ i
1070
+ r
1071
+ j
1072
+ k
1073
+ r
1074
+ k
1075
+ d
1076
+ a
1077
+ W
1078
+ x
1079
+ W
1080
+ x
1081
+ b
1082
+
1083
+
1084
+
1085
+
1086
+
1087
+
1088
+
1089
+
1090
+
1091
+
1092
+
1093
+
1094
+ ,
1095
+
1096
+
1097
+
1098
+
1099
+
1100
+ (17)
1101
+
1102
+ where the constants akr = bkckr are referred to as sensitivities. Large akr means that dij is
1103
+ sensitive to the difference Wr(xi) – Wr(xj). This sensitivity is transmitted to the predicted
1104
+ exciton coupling through the covariances (see equations (6) and (9)). In Figure 3B, we
1105
+
1106
+ Figure 3. Sensitivity analysis of the selected high-performing model. (A) Plot of the sorted vectorized
1107
+ Coulomb matrices for the dimers in the training set. Rows correspond to one of the dimers, and columns
1108
+ correspond to the element of the vectorized Coulomb matrix. Colors correspond to the type of Coulomb
1109
+ interaction. (B) Plot of the sensitivities of each of the model input features. Rows correspond to input
1110
+ features and columns to the element of vectorized Coulomb matrix. The top plot is for the GPR1
1111
+ component and the bottom one for the GPR2 component. Sensitivities are normalized by the maximum
1112
+ and minimum values in each table. See text for details. (C) The five dimers from our training set which
1113
+ exhibit the strongest exciton coupling. The pairs of atoms involved in the largest Coulomb interactions
1114
+ are indicated by the colored circles.
1115
+
1116
+ C-C
1117
+ C-H
1118
+ H-H
1119
+ B
1120
+ GPR1
1121
+ Feature index (k)
1122
+ 2
1123
+ 34
1124
+ Tot
1125
+ Sensitivity
1126
+ Dimer
1127
+ Coulomb interaction index (r)
1128
+ 72
1129
+ GPR2
1130
+ Feature index (k)
1131
+ 2
1132
+ n
1133
+ Tot
1134
+ 100
1135
+ Coulombinteractionindex(r)
1136
+ 72
1137
+ Coulomb interaction index ()
1138
+ 7214
1139
+
1140
+ plot the sensitivities akr as matrices for the components GPR1 (top) and GPR2 (bottom)
1141
+ as obtained from the high-performing model constructed at the end of the previous
1142
+ section. In both plots, the largest sensitivities tend to be found for small and large values
1143
+ of the index r. As shown in the previous paragraph, these values of r are mainly
1144
+ associated with hydrogen atoms.
1145
+
1146
+ The predictions of GPR1 and GPR2 are therefore sensitive to changes in the distances
1147
+ between hydrogen atoms of the two molecules. This shows that the high-performing
1148
+ model makes its predictions on the basis of a low-dimensional structural representation
1149
+ consisting of hydrogen atoms. These hydrogen atoms therefore act as a proxy for
1150
+ describing the alignment of the two pentacene molecules in the dimer. Figure 3C shows
1151
+ the five dimers from our training set that exhibit the strongest exciton coupling. The atoms
1152
+ involved in the three largest Coulomb interactions are indicated. Each of these
1153
+ interactions involves a hydrogen atom, which shows that hydrogen atom positions are
1154
+ important for predicting coupling in the strong-coupling regime.
1155
+
1156
+ The fact that this model has a straightforward physical interpretation suggests that its
1157
+ performance is based on a general structure-property relationship extracted from the
1158
+ training data. In other words, it suggests that the model accuracy is not based on
1159
+ ‘overfitting’ of the hyperparameters to the training data, and that the model can be
1160
+ meaningfully applied to dimers outside of the training data.
1161
+
1162
+ 3.3. Final model training times and performance (selection stage 2)
1163
+
1164
+ Our final model for predicting exciton coupling was built using the settings shown in
1165
+ Supporting Information 3. These settings are identical to those of the high-performing
1166
+ models found from the first stage of selection, however the optimized values of the
1167
+ hyperparameters for GPR1 and GPR2 differ slightly due to the different training set used
1168
+ here. The parameters for the SVM component also differ slightly from the models used
1169
+ in the first stage of selection due to the use of the optimization procedure.
1170
+
1171
+ Training times were evaluated by running our script within the R console in a Kubuntu
1172
+ environment running on an Intel Xeon 3.5 GHz processor. This entire script includes the
1173
+ whole gamut of the calculation, from processing the structure files of the dimers,
1174
+ generating the feature vectors, optimizing the SVM parameters, and optimizing the
1175
+ hyperparameters of GPR1 and GPR2. The script runs these parts sequentially on a
1176
+ single processor. This script required 19.0 hours to complete its run. In fact, this training
1177
+ time could be reduced to around 9.5 hours if the script were parallelized so that GPR1
1178
+ and GPR2 were trained on different processors, as the other parts of the script require
1179
+ negligible time to complete. In order to compare this training time, we considered the
1180
+ case of a single GPR model initialized with the same hyperparameter settings as GPR1
1181
+ and using 2400 dimers for training and 600 for testing. This case therefore compares
1182
+ training times afforded by our machine learning architecture to those of an architecture
1183
+ consisting of a single GPR component, while holding the total amount of training data
1184
+ constant (recall that in the final model, the three components SVM, GPR1, and GPR2
1185
+ were each trained using independently sampled sets of 800 training data points and 200
1186
+ test data points). This script required 76.4 hours to complete its run. The training time of
1187
+ 19 hours for our final mode therefore corresponds to 25 % of the training time for the
1188
+ case of a single GPR model using the same amount of training data (or around 12.4 %
1189
+ if GPR1 and GPR2 were trained in parallel). This reduction can be traced to the fact that
1190
+
1191
+ 15
1192
+
1193
+ GPR training times scale as N3, where N is the size of the training data set.
1194
+
1195
+ When discussing training times, it is important to emphasize that GPR1 and GPR2 were
1196
+ implemented with a more general Gaussian process framework than the GPR models
1197
+ reported in previous papers. As is shown by equation (10), our GPR components contain
1198
+ a different hyperparameter per feature dimension. In contrast, previous works have used
1199
+ the more common GPR implementation in which equation (10) only uses one
1200
+ hyperparameter (that is, b1 = ··· = bd = b) [25 - 29]. While our implementation of GPR is
1201
+ advantageous when trying to model complex functions such as exciton coupling, model
1202
+ training (hyperparameter optimization) necessarily takes places in a higher dimensional
1203
+ space. Our total training times are therefore not directly comparable to the training times
1204
+ of other GPR models reported so far. However, the N3 scaling of the time required per
1205
+ iteration is independent of feature dimension, meaning that our observations of the faster
1206
+ training times afforded by our architecture will hold for other types of GPR
1207
+ implementations as well.
1208
+
1209
+ In Figure 4A, predictions of the final model are compared to the TDDFT-calculated
1210
+ couplings for all extracted pentacene dimers. While not perfect, the correlation between
1211
+ the predictions and DFT-calculation couplings is satisfactory: linear regression on the
1212
+ data in Figure 4A yields the result y = (0.0024  0.0001) + (0.80  0.006)x, where errors
1213
+ refer to one standard error, and R2 = 0.77. In Supporting Information 4 we also report the
1214
+ results of a sensitivity analysis for the final model, which are similar to the ones reported
1215
+ for the model in the previous section. The final model is therefore also physically
1216
+ interpretable, suggesting that its predictions are based on a genuine structure-property
1217
+ relationship extracted from the training data.
1218
+
1219
+ In Supporting Information 5, we compare the predictions of the final model above with
1220
+ those of a single GPR model constructed using 800 dimers for training and 200 for testing.
1221
+ We are therefore comparing the accuracy achieved by our machine learning architecture
1222
+ with that of an architecture consisting of a single GPR component, while holding the total
1223
+ training time roughly constant. While both models achieve similar accuracy in the weak
1224
+ coupling regime, the single GPR model significantly underestimates coupling values in
1225
+ the strong coupling regime. This would be a serious concern if one wished to use such
1226
+ predictions in a subsequent exciton diffusion simulation, as the strongly coupled dimers
1227
+ are expected to have a decisive influence on diffusion dynamics. The inability of the
1228
+ single GPR model to make accurate predictions in the strongly coupled regime is
1229
+ unsurprising, because in a random sample of dimers weak coupling cases will be much
1230
+ more frequent than strong coupling cases, and the former will exert an oversized
1231
+ influence during model training. This problem is avoided by our architecture, which builds
1232
+ two GPR components trained specifically for the respective regimes.
1233
+
1234
+ 3.4. Kinetic Monte Carlo simulation
1235
+
1236
+ The exciton coupling parameters predicted from the final model above were used as
1237
+ inputs in the kinetic Monte Carlo (kMC) simulation. For comparison, a ‘benchmark’
1238
+ simulation using coupling parameters computed entirely from TDDFT was also
1239
+ performed. Figure 4B plots the mean-square displacement (MSD) of the exciton, as
1240
+ computed according to the formula
1241
+
1242
+
1243
+ 16
1244
+
1245
+
1246
+
1247
+ 2
1248
+ 0
1249
+ ( )
1250
+ t
1251
+ MSD t 
1252
+
1253
+ r
1254
+ r
1255
+
1256
+
1257
+
1258
+
1259
+
1260
+
1261
+
1262
+
1263
+ (18)
1264
+
1265
+ where rt denotes the position of the exciton at time t and the angular brackets indicate
1266
+ averaging over the simulation runs. The mean-square displacement for the simulation
1267
+ performed using the predicted exciton couplings compares well to the benchmark
1268
+ simulation in both magnitude and time evolution. The exciton diffusion coefficient, which
1269
+ was computed according to
1270
+
1271
+  
1272
+ 1 lim
1273
+ 6 t
1274
+ MSD t
1275
+ D
1276
+ t
1277
+ 
1278
+
1279
+ ,
1280
+
1281
+
1282
+
1283
+
1284
+
1285
+
1286
+
1287
+ (19)
1288
+
1289
+ was (1.547  0.005) x 10-3 cm2 s-1, which compares well to the value of (1.630  0.02) x
1290
+ 10-3 cm2 s-1 obtained from the benchmark calculation (see Table 1).
1291
+
1292
+ Figure 4C plots the probability distribution of the exciton position at different points in
1293
+ time, as projected onto the xy plane. Good agreement with the benchmark results is
1294
+ obtained: not only does the spread in the probability distributions look comparable, but
1295
+ the shape of the distribution is preserved. In order to compare the probability distributions
1296
+ in a quantitatively rigorous way, we calculate the eigenvalues of the diffusion tensor.
1297
+ These three eigenvalues correspond to the three dominant directions along which the
1298
+ probability distribution spreads, and their magnitudes correspond to the rate of spread in
1299
+ these directions. For the case of the simulations performed using predicted exciton
1300
+ couplings, these eigenvalues were computed to be (1.690  0.020), (1.492  0.007), and
1301
+ (1.460  0.020) x 10-3 cm2 s-1, respectively (see Table 1). These values compare to
1302
+ (1.820  0.02), (1.550  0.02), and (1.530  0.02) x 10-3 cm2 s-1, respectively, as obtained
1303
+ from the benchmark simulation. The eigenvalues for the case of predicted couplings are
1304
+
1305
+ Figure 4. Final model performance and exciton diffusion simulations. (A) Predicted exciton coupling
1306
+ energies of the final model (vML) compared to ab initio calculations (vDFT) for all extracted dimers. (B)
1307
+ Mean-square displacement of an exciton from its initial position as obtained from kinetic Monte Carlo
1308
+ simulations using model-predicted exciton coupling energies (orange lines) and ab initio-calculated
1309
+ couplings (blue lines). (C) Snapshots of the probability distribution of exciton positions at various times
1310
+ for the case of model-predicted and ab initio-predicted exciton couplings. For clarity, the probability
1311
+ distribution is plotted in the xy plane only. The red box indicates the dimensions of the simulation cell.
1312
+
1313
+
1314
+
1315
+ A
1316
+ B
1317
+ 300
1318
+ 90
1319
+ DFT couplings
1320
+ dashed)
1321
+ 120
1322
+ ML couplings
1323
+ (pllos
1324
+ 200
1325
+ 60
1326
+ 4
1327
+ 100
1328
+ A
1329
+ (×103 )
1330
+ 100
1331
+ 30
1332
+ %
1333
+ 80
1334
+ 0
1335
+ 0
1336
+ (meV)
1337
+ 0
1338
+ 200
1339
+ 400
1340
+ 600
1341
+ 800
1342
+ 1000
1343
+ time (ps)
1344
+ 60
1345
+ c
1346
+ DFT couplings
1347
+ 400 A
1348
+ 40-
1349
+ 200 ps
1350
+ 400 ps
1351
+ 600 ps
1352
+ 800 ps
1353
+ 1000 ps
1354
+ 20
1355
+ ML couplings
1356
+ 400A
1357
+ 0
1358
+ 0
1359
+ 20
1360
+ 40
1361
+ 60
1362
+ 80
1363
+ 100
1364
+ 120
1365
+ IvDFTI (meV)
1366
+ 200 ps
1367
+ 400 ps
1368
+ 600 ps
1369
+ 800 ps
1370
+ 1000 ps17
1371
+
1372
+ of a slightly smaller magnitude than those for the benchmark simulation, suggesting that
1373
+ the exciton coupling is underestimated by our model for the most strongly coupled dimers
1374
+ in the system. However, the ratios of the eigenvalues relative to the smallest one were
1375
+ quite similar (1.15:1.02:1.00 for the case of predicted couplings and 1.19:1.02:1.00 for
1376
+ the case of the benchmark), confirming that the simulation using predicted couplings
1377
+ correctly preserved the anisotropic nature of the exciton diffusion. The individual
1378
+ elements of the diffusion tensor are compared in Supporting Information 6, where a
1379
+ similar agreement with the benchmark case is observed: comparable but slightly smaller
1380
+ magnitudes, but very similar relative values as expressed by ratios.
1381
+
1382
+ In Supporting Information 6, we consider the case of a model built using a much larger
1383
+ training set of 2000 dimers for GPR1 and 2200 dimers for GPR2. KMC simulations using
1384
+ the predictions of this model achieved very similar results to the ones obtained from the
1385
+ model above. Interestingly, the magnitudes of the diffusion tensor eigenvalues and
1386
+ elements remain slightly underestimated for this case as well. We will return to this point
1387
+ in the next section. The agreement between the predictions of kMC using this model and
1388
+ the model described above suggests that the latter has converged, in some sense, with
1389
+ respect to training data size. The fact that this convergence can be reached even with
1390
+ small sets of training data may relate to the observations in section 3.2, which suggested
1391
+ that our models have a meaningful physical interpretation hence should generalize well
1392
+ beyond the small training and test data sets.
1393
+
1394
+ 4. Discussion and conclusions
1395
+
1396
+ In order for machine learning to accelerate simulations for organic photovoltaics and
1397
+ other types of materials, it is important that the predictive models for simulation
1398
+ parameters can be built with short training times. Long training times may offset the
1399
+ reductions in computational time achieved through the final machine-learned model. In
1400
+ this paper, we presented a new machine learning architecture for predicting
1401
+ intermolecular exciton coupling values in amorphous organic solids. For the training set
1402
+ sizes used here (around 3000), our architecture allowed for predictive models to be
1403
+ trained within around 25 % of the time required to train a typical Gaussian process
1404
+ regression model (or, equivalently, a typical kernel ridge regression model). Importantly,
1405
+
1406
+ Ab initio
1407
+ couplings
1408
+ Model-predicted
1409
+ couplings
1410
+ Diffusion Coefficient
1411
+ (× 10-3 cm2s-1)
1412
+ 1.630 ± 0.011
1413
+ 1.547 ± 0.005
1414
+
1415
+ Diffusion tensor eigenvalues
1416
+ (× 10-3 cm2s-1)
1417
+
1418
+ Major
1419
+ 1.815 ± 0.014
1420
+ 1.686 ± 0.017
1421
+ Middle
1422
+ 1.551 ± 0.016
1423
+ 1.492 ± 0.007
1424
+ Minor
1425
+ 1.525 ± 0.012
1426
+ 1.462 ± 0.014
1427
+
1428
+
1429
+
1430
+ Major: Middle: Minor
1431
+ 1.19: 1.02: 1.00
1432
+ 1.15: 1.02: 1.00
1433
+
1434
+ Table 1. Exciton diffusion parameters estimated from kinetic Monte Carlo (kMC) simulations using ab
1435
+ initio-calculated and model-predicted exciton coupling energies. Error bounds correspond to one
1436
+ standard deviation.
1437
+
1438
+ 18
1439
+
1440
+ when these predicted coupling energies were used as inputs in a subsequent exciton
1441
+ diffusion simulation, we obtained results which were in excellent agreement with a
1442
+ benchmark simulation, in spite of the reduced training time of the underlying model. Thus,
1443
+ for the purpose of predicting model parameters for subsequent exciton diffusion
1444
+ simulations, highly accurate machine-learned models built with massive sets of training
1445
+ data and long training times are not necessarily required. We partly attribute the accuracy
1446
+ of our model to the results of our sensitivity analysis, which suggest that the model can
1447
+ be interpreted in terms of hydrogen atom positions. This straightforward physical
1448
+ interpretation suggests that the model’s predictions are based on a genuine structure-
1449
+ property relationship acquired from the data, rather than the result of over-training on the
1450
+ small training data set.
1451
+
1452
+ The accuracy of the model in spite of the reduced computational times might also be
1453
+ attributed to the special machine-learning architecture used to generate it. Instead of
1454
+ attempting the difficult task of fitting a single regression model valid for all possible
1455
+ molecule dimers, this architecture separates the possibilities into a ‘weak coupling’ and
1456
+ a ‘strong coupling’ regimes and builds regression estimators for these regimes
1457
+ separately. A similar strategy was used in the context of dimer interaction energies in
1458
+ reference [63]. While this model was built for the special but illustrative case of
1459
+ amorphous pentacene, the underlying machine-learning architecture is not restricted to
1460
+ this case and could be applied to other types of amorphous organic solids, including
1461
+ ones composed of large flexible molecules, or ones involving multiple molecular species.
1462
+
1463
+ While kinetic Monte Carlo (kMC) simulations using model-predicted exciton coupling
1464
+ parameters achieved excellent agreement with a benchmark simulation, the magnitudes
1465
+ of the diffusion tensor elements and eigenvalues were slightly underestimated. This
1466
+ underestimation was observed both for the model described above and for another
1467
+ model built using a much larger set of training data. For practical purposes such as
1468
+ comparing candidate materials for organic photovoltaics, such a shortcoming is not
1469
+ expected to be an issue. However, it suggests that multiple examples of dimers with very
1470
+ high exciton couplings might need to be included in the training data in order to obtain
1471
+ very accurate predictions of the diffusion tensor elements. On the one hand, these high-
1472
+ coupling cases may be more important in determining the magnitude of the diffusion
1473
+ tensor elements than the weak coupling cases. On the other hand, such cases are very
1474
+ rare, and might not have been included with sufficient frequency in the training sets used
1475
+ to build our models. These points should be clarified further in the next stage of this
1476
+ research. Concretely, additional theoretical work should be performed to determine what
1477
+ types of dimers are needed to obtain accurate predictions for the diffusion tensor
1478
+ elements, and novel sampling schemes for generating training sets of dimers developed
1479
+ accordingly. Theoretical work should also be performed to derive uncertainty bounds for
1480
+ diffusion tensor elements and other quantities in terms of training set sizes. The machine
1481
+ learning literature contains numerous uncertainty bounds for various types of regression
1482
+ and classification models [50], however these are expressed in terms of highly general
1483
+ concepts such as hypothesis space complexity and are difficult to apply to the case of
1484
+ exciton diffusion directly.
1485
+
1486
+ For applications in chemistry and physics, it is desirable that machine-learned models
1487
+ can be interpreted in terms of straightforward structural information. Such physical
1488
+ interpretations help clarify the structural motifs the model uses to make its predictions (in
1489
+ this case, relative positions of the hydrogen atoms in the two molecules of the dimer). In
1490
+
1491
+ 19
1492
+
1493
+ this paper, we employed a sensitivity analysis to probe for a physical interpretation of the
1494
+ GPR components in our models. This amounts to performing a post-hoc check on model
1495
+ after it is constructed. An alternative strategy to guarantee model interpretability is to
1496
+ design the regression model by deliberately including some aspects of the excitonic
1497
+ transfer mechanism and dimer atomic structure in the model’s structure. This is difficult
1498
+ to do with the SVM or GPR models used in this paper, as much of the model’s internal
1499
+ structure is hidden from view by the kernel and covariance functions. However, outside
1500
+ of the field of organic semiconductors, several groups have proposed neural network
1501
+ models which incorporate known physical relationships in their architectures (e.g., [64]).
1502
+ Compared to the sensitivity analysis approach, such models have some disadvantages.
1503
+ For example, the decision as to what physics should be incorporated into the model is
1504
+ subjective. Moreover, these models may acquire additional physical information during
1505
+ the training procedure. Ironically, such information could only be identified by performing
1506
+ a sensitivity analysis on the model following training. Finally, these models are more
1507
+ difficult to train due to the presence of additional parameters describing the incorporated
1508
+ physics. Indeed, if one insists that these additional parameters only take values within a
1509
+ physically sensible range, then it may become difficult to minimize model prediction
1510
+ errors sufficiently during training. Until these problems are overcome, post-hoc sensitivity
1511
+ analyses are probably the most practical means to ensuring that a machine-learned
1512
+ model is physically interpretable.
1513
+
1514
+ It is also important to consider the extent to which machine learning can be applied to
1515
+ simulate exciton diffusion in amorphous organic solids. In this work, a machine-learned
1516
+ model was substituted for the resource-heavy time-dependent density functional theory
1517
+ (TDDFT) method for computing exciton coupling parameters. However, these
1518
+ parameters are not the only ones present in a hopping simulation. For the case of the
1519
+ simulations performed here, which used a Marcus-type expression for the hopping rate,
1520
+ an energetic disorder parameter is also present. Moreover, some simulations include the
1521
+ so-called Huang-Rhys factor, which characterizes electron-phonon coupling strengths.
1522
+ Such electron-phonon coupling parameters need to be properly incorporated into
1523
+ simulations which describe exciton and charge dynamics as a function of temperature.
1524
+ Hence, there exists scope to reduce the computational demands of exciton diffusion
1525
+ simulations further by developing predictive models for these parameters on the basis of
1526
+ machine learning as well.
1527
+
1528
+ This work has introduced the strategy of splitting the training data into two groups in
1529
+ order to mitigate the unfavorable N3 scaling of GPR or KRR-based models of exciton
1530
+ coupling. However, these kinds of models are widely used in materials informatics
1531
+ beyond simulations of charge or energy transport. Could this strategy therefore be used
1532
+ for materials discovery purposes, in which machine-learned models need to be fit to
1533
+ massive databases of candidate materials? We will explore this direction in future
1534
+ research.
1535
+
1536
+ Acknowledgements
1537
+
1538
+ This work has been supported by the Kyoto University On-Site Laboratory Initiative, the
1539
+ Institute for Integrated Cell-Material Sciences (iCeMS), the MacDiarmid Institute for
1540
+ Advanced Materials and Nanotechnology, and the Victoria University of Wellington high-
1541
+ performance computing cluster Rāpoi. GRW, PAH, and JMH acknowledge support from
1542
+ the Marsden Fund of New Zealand. DMP acknowledges JSPS Kakenhi Grant 21K05003.
1543
+
1544
+ 20
1545
+
1546
+
1547
+ References
1548
+
1549
+ [1] Coehoorn, R.; Bobbert, P. A. Effects of Gaussian Disorder on Charge-Carrier
1550
+ Transport and Recombination in Organic Semiconductors. In Physics of Organic
1551
+ Semiconductors; Brutting, W.; Adachi, C., Eds.; Wiley-VCH, Weinheim, Germany, 2012;
1552
+ pp 157 – 199.
1553
+
1554
+ [2] Troisi, A. Charge Transport in High Mobility Molecular Semiconductors: Classical
1555
+ Models
1556
+ and
1557
+ New
1558
+ Theories.
1559
+ Chem.
1560
+ Soc.
1561
+ Rev.
1562
+ 2011,
1563
+ 40
1564
+ (5),
1565
+ 2347.
1566
+ https://doi.org/10.1039/c0cs00198h.
1567
+
1568
+ [3] Clarke, T. M.; Durrant, J. R. Charge Photogeneration in Organic Solar Cells. Chem.
1569
+ Rev. 2010, 110 (11), 6736–6767. https://doi.org/10.1021/cr900271s
1570
+
1571
+ [4] Few, S.; Frost, J. M.; Nelson, J. Models of Charge Pair Generation in Organic Solar
1572
+ Cells.
1573
+ Phys.
1574
+ Chem.
1575
+ Chem.
1576
+ Phys.
1577
+ 2015,
1578
+ 17
1579
+ (4),
1580
+ 2311–2325.
1581
+ https://doi.org/10.1039/C4CP03663H
1582
+
1583
+ [5] Price, M. B.; Hume, P. A.; Ilina, A.; Wagner, I.; Tamming, R. R.; Thorn, K. E.; Jiao, W.;
1584
+ Goldingay, A.; Conaghan, P. J.; Lakhwani, G.; Davis, N. J. L. K.; Wang, Y.; Xue, P.; Lu,
1585
+ H.; Chen, K.; Zhan, X.; Hodgkiss, J. M. Free charge photogeneration in a single
1586
+ component high photovoltaic efficiency organic semiconductor. Nat. Commun. 2022, 13,
1587
+ 1–27. https://doi.org/10.1038/s41467-022-30127-8
1588
+
1589
+ [6] Chandrabose, S.; Chen, K.; Barker, A. J.; Sutton, J. J.; Prasad, S. K. K.; Zhu, J.; Zhou,
1590
+ J.; Gordon, K. C.; Xie, Z.; Zhan, X.; Hodgkiss, J. M. High Exciton Diffusion Coefficients
1591
+ in Fused Ring Electron Acceptor Films. J. Am. Chem. Soc. 2019, 141 (17), 6922–6929.
1592
+ https://doi.org/10.1021/jacs.8b12982
1593
+
1594
+ [7] Park, S. Y.; Chandrabose, S.; Price, M. B.; Ryu, H. S.; Lee, T. H.; Shin, Y. S.; Wu, Z.;
1595
+ Lee, W.; Chen, K.; Dai, S.; Zhu, J.; Xue, P.; Zhan, X.; Woo, H. Y.; Kim, J. Y.; Hodgkiss, J.
1596
+ M. Photophysical Pathways in Efficient Bilayer Organic Solar Cells: The Importance of
1597
+ Interlayer
1598
+ Energy
1599
+ Transfer.
1600
+ Nano
1601
+ Energy
1602
+ 2021,
1603
+ 84,
1604
+ 105924.
1605
+ https://doi.org/10.1016/j.nanoen.2021.105924
1606
+
1607
+ [8] Uoyama, H.; Goushi, K.; Shizu, K.; Nomura, H.; Adachi, C. Highly Efficient Organic
1608
+ Light-Emitting Diodes from Delayed Fluorescence. Nature 2012, 492 (7428), 234–238.
1609
+ https://doi.org/10.1038/nature11687
1610
+
1611
+ [9] Goushi, K.; Yoshida, K.; Sato, K.; Adachi, C. Organic Light-Emitting Diodes Employing
1612
+ Efficient Reverse Intersystem Crossing for Triplet-to-Singlet State Conversion. Nat.
1613
+ Photonics 2012, 6 (4), 253–258. https://doi.org/10.1038/nphoton.2012.31
1614
+
1615
+ [10] Adachi, C. Third-Generation Organic Electroluminescence Materials. Jpn. J. Appl.
1616
+ Phys. 2014, 53 (6), 060101. https://doi.org/10.7567/JJAP.53.060101.
1617
+
1618
+ [11] Gärtner, C.; Karnutsch, C.; Lemmer, U.; Pflumm, C. The Influence of Annihilation
1619
+ Processes on the Threshold Current Density of Organic Laser Diodes. J. Appl. Phys.
1620
+ 2007, 101 (2), 023107. https://doi.org/10.1063/1.2425003.
1621
+
1622
+ 21
1623
+
1624
+
1625
+ [12] Mai, V. T. N.; Ahmad, V.; Mamada, M.; Fukunaga, T.; Shukla, A.; Sobus, J.; Krishnan,
1626
+ G.; Moore, E. G.; Andersson, G. G.; Adachi, C.; Namdas, E. B.; Lo, S.-C. Solid
1627
+ Cyclooctatetraene-Based Triplet Quencher Demonstrating Excellent Suppression of
1628
+ Singlet–Triplet Annihilation in Optical and Electrical Excitation. Nat. Commun. 2020, 11
1629
+ (1), 5623. https://doi.org/10.1038/s41467-020-19443-z.
1630
+
1631
+ [13] Banerjee, T.; Podjaski, F.; Kröger, J.; Biswal, B. P.; Lotsch, B. V. Polymer
1632
+ Photocatalysts for Solar-to-Chemical Energy Conversion. Nat. Rev. Mater. 2020, 6 (2),
1633
+ 168–190. https://doi.org/10.1038/s41578-020-00254-z
1634
+
1635
+ [14] Sivula, K. Are Organic Semiconductors Viable for Robust, High-Efficiency Artificial
1636
+ Photosynthesis?
1637
+ ACS
1638
+ Energy
1639
+ Lett.
1640
+ 2020,
1641
+ 5
1642
+ (6),
1643
+ 1970–1973.
1644
+ https://doi.org/10.1021/acsenergylett.0c01084
1645
+
1646
+ [15] Kosco, J.; Bidwell, M.; Cha, H.; Martin, T.; Howells, C. T.; Sachs, M.; Anjum, D. H.;
1647
+ Gonzalez Lopez, S.; Zou, L.; Wadsworth, A.; Zhang, W.; Zhang, L.; Tellam, J.; Sougrat,
1648
+ R.; Laquai, F.; DeLongchamp, D. M.; Durrant, J. R.; McCulloch, I. Enhanced
1649
+ Photocatalytic Hydrogen Evolution from Organic Semiconductor Heterojunction
1650
+ Nanoparticles. Nat. Mater. 2020, 19 (5), 559–565. https://doi.org/10.1038/s41563-019-
1651
+ 0591-1
1652
+
1653
+ [16] Kosco, J.; Gonzalez‐Carrero, S.; Howells, C. T.; Zhang, W.; Moser, M.;
1654
+ Sheelamanthula, R.; Zhao, L.; Willner, B.; Hidalgo, T. C.; Faber, H.; Purushothaman, B.;
1655
+ Sachs, M.; Cha, H.; Sougrat, R.; Anthopoulos, T. D.; Inal, S.; Durrant, J. R.; McCulloch,
1656
+ I. Oligoethylene Glycol Side Chains Increase Charge Generation in Organic
1657
+ Semiconductor Nanoparticles for Enhanced Photocatalytic Hydrogen Evolution. Adv.
1658
+ Mater. 2022, 34 (22), 2105007. https://doi.org/10.1002/adma.202105007
1659
+
1660
+ [17] Kosco, J.; Gonzalez-Carrero, S.; Howells, C. T.; Fei, T.; Dong, Y.; Sougrat, R.;
1661
+ Harrison, G. T.; Firdaus, Y.; Sheelamanthula, R.; Purushothaman, B.; Moruzzi, F.; Xu,
1662
+ W.; Zhao, L.; Basu, A.; De Wolf, S.; Anthopoulos, T. D.; Durrant, J. R.; McCulloch, I.
1663
+ Generation of Long-Lived Charges in Organic Semiconductor Heterojunction
1664
+ Nanoparticles for Efficient Photocatalytic Hydrogen Evolution. Nat. Energy 2022, 7 (4),
1665
+ 340–351. https://doi.org/10.1038/s41560-022-00990-2
1666
+
1667
+ [18] Chan, C.-Y.; Tanaka, M.; Lee, Y.-T.; Wong, Y.-W.; Nakanotani, H.; Hatakeyama, T.;
1668
+ Adachi, C. Stable Pure-Blue Hyperfluorescence Organic Light-Emitting Diodes with
1669
+ High-Efficiency and Narrow Emission. Nat. Photonics 2021, 15 (3), 203–207.
1670
+ https://doi.org/10.1038/s41566-020-00745-z
1671
+
1672
+ [19] Lee, Y.; Chan, C.; Tanaka, M.; Mamada, M.; Balijapalli, U.; Tsuchiya, Y.; Nakanotani,
1673
+ H.; Hatakeyama, T.; Adachi, C. Investigating HOMO Energy Levels of Terminal Emitters
1674
+ for Realizing High‐Brightness and Stable TADF‐Assisted Fluorescence Organic
1675
+ Light‐Emitting
1676
+ Diodes.
1677
+ Adv.
1678
+ Electron.
1679
+ Mater.
1680
+ 2021,
1681
+ 7
1682
+ (4),
1683
+ 2001090.
1684
+ https://doi.org/10.1002/aelm.202001090.
1685
+
1686
+ [20] Stein, A. D.; Peterson, K. A.; Fayer, M. D. Dispersive Excitation Transport at Elevated
1687
+ Temperatures (50–298 K): Experiments and Theory. J. Chem. Phys. 1990, 92 (9), 5622–
1688
+ 5635. https://doi.org/10.1063/1.458494.
1689
+
1690
+ 22
1691
+
1692
+
1693
+ [21] Meskers, S. C. J.; Hübner, J.; Oestreich, M.; Bässler, H. Dispersive Relaxation
1694
+ Dynamics of Photoexcitations in a Polyfluorene Film Involving Energy Transfer:
1695
+ Experiment and Monte Carlo Simulations. J. Phys. Chem. B 2001, 105 (38), 9139–9149.
1696
+ https://doi.org/10.1021/jp0113331.
1697
+
1698
+ [22] Hume, P. A.; Jiao, W.; Hodgkiss, J. M. Long-Range Exciton Diffusion in a Non-
1699
+ Fullerene Acceptor: Approaching the Incoherent Limit. J. Mater. Chem. C. 2021, 9 (4),
1700
+ 1419–1428. https://doi.org/10.1039/D0TC05697A.
1701
+
1702
+ [23] Schleder, G. R.; Padilha, A. C. M.; Acosta, C. M.; Costa, M.; Fazzio, A. From DFT to
1703
+ machine learning: recent approaches to materials science – a review. JPhys mater. 2019,
1704
+ 2, 032001 . https://doi.org/10.1088/2515-7639/ab084b
1705
+
1706
+ [24] Packwood, D. M.; Nguyen, L. T. H.; Cesana, P.; Zhang, G.; Staykov, A.; Fukumoto,
1707
+ Y.; Nguyen, D. H. Machine Learning in Materials Chemistry: An Invitation. Machine
1708
+ Learning with Applications 2022, 8, 100265. https://doi.org/10.1016/j.mlwa.2022.100265
1709
+
1710
+ [25] Lederer, J.; Kaiser, W.; Mattoni, A.; Gagliardi, A. Machine Learning-Based Charge
1711
+ Computation for Pentacene. Adv. Theory Simul. 2019, 2 (#), 1800136 – 1800147.
1712
+ https://doi.org/10.1002/adts.201800136
1713
+
1714
+ [26] Wang, C-I.; Braza, M. K. E.; Claudio, G. C.; Nellas, R. B.; Hsu, C-P. Machine
1715
+ Learning for Predicting Electron Transfer Coupling. J. Phys. Chem. A. 2019, 123, 7792
1716
+ – 7802. https://doi.org/10.1021/acs.jpca.9b04256
1717
+
1718
+ [27] Kramer, M.; Dohmen, P. M.; Xie, W.; Holub, D.; Christensen, A. S.; Elstner, M.
1719
+ Charge and Exciton Transfer Simulations Using Machine-Learned Hamiltonians. J.
1720
+ Chem.
1721
+ Theory
1722
+ Comput.
1723
+ 2020,
1724
+ 16,
1725
+ 4061
1726
+
1727
+ 4070.
1728
+ https://dx.doi.org/10.1021/acs.jctc.0c00246
1729
+
1730
+ [28] Farahvash, A.; Lee, C-K.; Sun, Q; Shi, L.; Willard, A. P. Machine learning Frenkel
1731
+ Hamiltonian parameters to accelerate simulations of exciton dynamics. J. Chem. Phys.
1732
+ 2020, 153, 074111 – 074124. https://doi.org/10.1063/5.0016009
1733
+
1734
+ [29] Rinderle, M.; Kaiser, W.; Mattoni, A.; Gagliardi, A. Machine-Learned Charge Transfer
1735
+ Integrals for Multiscale Simulations in Organic Thin Films. J. Phys. Chem. C. 2020, 124,
1736
+ 17733 – 17743. https://doi.org/10.1021/acs.jpcc.0c04355
1737
+
1738
+ [30] Wang, C-I.; Joanito, I.; Lan, C-F.; Hsu, C-P. Artificial neural networks for predicting
1739
+ charge transfer coupling. J. Chem. Phys. 2020, 153, 214113 – 214128.
1740
+ https://doi.org/10.1063/5.0023697
1741
+
1742
+ [31] Li, C.; Liang, C.; Rouzhahong, Y.; Wang, B.; Li, H. Transferable prediction of
1743
+ intermolecular coupling achieved by hierarchical material representation. Sci. China
1744
+ Mater. 2022, https://doi.org/10.1007/s40843-022-2198-5
1745
+
1746
+ [32] Bag, S.; Aggarwal, A.; Maiti, P. K. Machine Learning Prediction of Electronic
1747
+ Coupling Between the Guanine Bases of DNA. J. Phys. Chem. A. 2020, 124, 7658 –
1748
+ 7664. https://dx.doi.org/10.1021/acs.jpca.0c04368
1749
+
1750
+ 23
1751
+
1752
+
1753
+ [33] Aggarwal, A.; Vinayak, V.; Bag, S.; Bhattacharyya, C.; Waghmare, U. V.; Maiti, P. K.
1754
+ Predicting DNA Conductance Using a Deep Feedforward Neural Network Model. J. Chen.
1755
+ Inf. Model. 2021, 61, 106 – 114. https://dx.doi.org/10.1021/acs.jcim.0c01072
1756
+
1757
+ [34] Cignoni, E.; Cupellini, L.; Mennucci, B. A fast method for electronic couplings in
1758
+ embedded multichromophoric systems. J. Phys.: Condens. Matter. 2022, 34, 304004 –
1759
+ 304015. https://doi.org/10.1088/1361-648X/ac6f3c
1760
+
1761
+ [35] Martinez, L.; Andrade, R.; Birgin, E. G.; Martinez, J. M. Packmol: A package for
1762
+ building initial configurations for molecular dynamics simulations. J. Comp. Chem. 2009,
1763
+ 30, 2157. https://doi.org/10.1002/jcc.21224
1764
+
1765
+ [36] Wang, J.; Wolf, R.; Caldwell, J. W.; Kollman, P. A.; Case, D. A. Development and
1766
+ testing of a general AMBER force field. J. Comput. Chem. 2004, 25, 1157.
1767
+ https://doi.org/10.1002/jcc.20035
1768
+
1769
+ [37] Berendsen, H. J. C.; van der Spoel, D.; van Drunen, R. GROMACS: A massage-
1770
+ passing parallel molecular dynamics implementation. Comput. Phys. Commun. 1995, 91,
1771
+ 43. https://doi.org/10.1016/0010-4655(95)00042-E
1772
+
1773
+ [38] Hoover, W. G. Canonical dynamics: Equilibrium phase-space distributions. Phys. Rev.
1774
+ A. 1985, 31, 1695. https://doi.org/10.1103/PhysRevA.31.1695
1775
+
1776
+ [39] Bussi, G.; Donadio, D.; Parrinello, M. Canonical sampling through velocity rescaling.
1777
+ J. Chem. Phys. 2007, 126, 014101. https://doi.org/10.1063/1.2408420
1778
+
1779
+ [40] Berendsen, H. J. C.; Postma, J. P. M.; DiNola, A.; Haak, J. R. Molecular dynamics
1780
+ with
1781
+ coupling
1782
+ to
1783
+ an
1784
+ external
1785
+ bath.
1786
+ J.
1787
+ Chem.
1788
+ Phys.
1789
+ 1984,
1790
+ 81,
1791
+ 3684.
1792
+ https://doi.org/10.1063/1.448118
1793
+
1794
+ [41] Jundt, C.; Klein, G.; Sipp, B.; Le Moigne, J.; Joucla, M.; Villaeys, A. A. Exciton
1795
+ Dynamics in Pentacene Thin Films Studied by Pump-Probe Spectroscopy. Chem. Phys.
1796
+ Lett. 1995, 241 (1–2), 84–88. https://doi.org/10.1016/0009-2614(95)00603-2.
1797
+
1798
+ [42] Hjorth Larsen, A.; Jørgen Mortensen, J.; Blomqvist, J.; Castelli, I. E.; Christensen,
1799
+ R.; Dułak, M.; Friis, J.; Groves, M. N.; Hammer, B.; Hargus, C.; Hermes, E. D.; Jennings,
1800
+ P. C.; Bjerre Jensen, P.; Kermode, J.; Kitchin, J. R.; Leonhard Kolsbjerg, E.; Kubal, J.;
1801
+ Kaasbjerg, K.; Lysgaard, S.; Bergmann Maronsson, J.; Maxson, T.; Olsen, T.; Pastewka,
1802
+ L.; Peterson, A.; Rostgaard, C.; Schiøtz, J.; Schütt, O.; Strange, M.; Thygesen, K. S.;
1803
+ Vegge, T.; Vilhelmsen, L.; Walter, M.; Zeng, Z.; Jacobsen, K. W. The Atomic Simulation
1804
+ Environment—a Python Library for Working with Atoms. J. Phys. Condens. Matter 2017,
1805
+ 29 (27), 273002. https://doi.org/10.1088/1361-648X/aa680e.
1806
+
1807
+ [43] Hagberg, A. A.; Schult, D. A.; Swart, P. J. Exploring Network Structure, Dynamics,
1808
+ and Function Using NetworkX. In Proceedings of the 7th Python in Science Conference;
1809
+ Varoquaux, G., Vaught, T., Millman, J., Eds.; Pasadena, CA USA, 2008; pp 11–15.
1810
+
1811
+ [44] Ong, S. P.; Richards, W. D.; Jain, A.; Hautier, G.; Kocher, M.; Cholia, S.; Gunter, D.;
1812
+ Chevrier, V. L.; Persson, K. A.; Ceder, G. Python Materials Genomics (Pymatgen): A
1813
+
1814
+ 24
1815
+
1816
+ Robust, Open-Source Python Library for Materials Analysis. Comput. Mater. Sci. 2013,
1817
+ 68, 314–319. https://doi.org/10.1016/j.commatsci.2012.10.028.
1818
+
1819
+ [45] Frisch, M. J.; Trucks, G. W.; Schlegel, H. B.; Scuseria, G. E.; Robb, M. a.;
1820
+ Cheeseman, J. R.; Scalmani, G.; Barone, V.; Petersson, G. a.; Nakatsuji, H.; Li, X.;
1821
+ Caricato, M.; Marenich, a. V.; Bloino, J.; Janesko, B. G.; Gomperts, R.; Mennucci, B.;
1822
+ Hratchian, H. P.; Ortiz, J. V.; Izmaylov, a. F.; Sonnenberg, J. L.; Williams; Ding, F.;
1823
+ Lipparini, F.; Egidi, F.; Goings, J.; Peng, B.; Petrone, A.; Henderson, T.; Ranasinghe, D.;
1824
+ Zakrzewski, V. G.; Gao, J.; Rega, N.; Zheng, G.; Liang, W.; Hada, M.; Ehara, M.; Toyota,
1825
+ K.; Fukuda, R.; Hasegawa, J.; Ishida, M.; Nakajima, T.; Honda, Y.; Kitao, O.; Nakai, H.;
1826
+ Vreven, T.; Throssell, K.; Montgomery Jr., J. a.; Peralta, J. E.; Ogliaro, F.; Bearpark, M.
1827
+ J.; Heyd, J. J.; Brothers, E. N.; Kudin, K. N.; Staroverov, V. N.; Keith, T. a.; Kobayashi,
1828
+ R.; Normand, J.; Raghavachari, K.; Rendell, a. P.; Burant, J. C.; Iyengar, S. S.; Tomasi,
1829
+ J.; Cossi, M.; Millam, J. M.; Klene, M.; Adamo, C.; Cammi, R.; Ochterski, J. W.; Martin,
1830
+ R. L.; Morokuma, K.; Farkas, O.; Foresman, J. B.; Fox, D. J. G16_C01. 2016, p Gaussian
1831
+ 16, Revision C.01, Gaussian, Inc., Wallin.
1832
+
1833
+ [46] You, Z.; Hsu, C. Theory and Calculation for the Electronic Coupling in Excitation
1834
+ Energy
1835
+ Transfer.
1836
+ Int.
1837
+ J.
1838
+ Quantum
1839
+ Chem.
1840
+ 2014,
1841
+ 114
1842
+ (2),
1843
+ 102–115.
1844
+ https://doi.org/10.1002/qua.24528.
1845
+
1846
+ [47] Iozzi, M. F.; Mennucci, B.; Tomasi, J.; Cammi, R. Excitation Energy Transfer (EET)
1847
+ between Molecules in Condensed Matter: A Novel Application of the Polarizable
1848
+ Continuum
1849
+ Model
1850
+ (PCM).
1851
+ J.
1852
+ Chem.
1853
+ Phys.
1854
+ 2004,
1855
+ 120
1856
+ (15),
1857
+ 7029–7040.
1858
+ https://doi.org/10.1063/1.1669389.
1859
+
1860
+ [48] Yanai, T.; Tew, D. P.; Handy, N. C. A New Hybrid Exchange–Correlation Functional
1861
+ Using the Coulomb-Attenuating Method (CAM-B3LYP). Chem. Phys. Lett. 2004, 393 (1–
1862
+ 3), 51–57. https://doi.org/10.1016/j.cplett.2004.06.011.
1863
+
1864
+ [49] Rupp, M.; Tkatchenko, A.; Muller, K-R.; von Lilienfeld, O. A. Fast and Accurate
1865
+ Modeling of Molecular Atomization Energies with Machine Learning. Phys. Rev. Lett.
1866
+ 2012, 108, 058301 – 058306. https://doi.org/10.1103/PhysRevLett.108.058301
1867
+
1868
+ [50] Mohri, M.; Rostamizadeh, A.; Talwalkar, A. Foundations of Machine Learning,
1869
+ Second Edition; Adaptive Computation and Machine Learning series; MIT Press, 2018.
1870
+
1871
+ [51] Chang, C.-C.; Lin, C.-J. LIBSVM. ACM Trans. Intell. Syst. Technol. 2011, 2 (3), 1–
1872
+ 27. https://doi.org/10.1145/1961189.1961199.
1873
+
1874
+ [52] Rasmussen, C. E.; Williams, C. K. I. Gaussian Processes for Machine Learning. MIT
1875
+ Press.
1876
+ Cambridge,
1877
+ MA,
1878
+ USA.
1879
+ 2006.
1880
+ Available
1881
+ online
1882
+ at
1883
+ https://gaussianprocess.org/gpml/
1884
+
1885
+ [53] Frazier, P. I.; Wang, J. Bayesian Optimization for Materials Design. In Information
1886
+ Science for Materials Discovery and Design; Lookman, T.; Alexander, F. J.; Rajan, K.,
1887
+ Eds.; Springer Series in Materials Science 225, Springer, Switzerland, 2016; pp. 70 – 71.
1888
+
1889
+ [54] Chalupka, K.; Williams, C. K. I.; Murray, I. A Framework for Evaluating Approximation
1890
+ Methods for Gaussian Process Regression. J. Mach. Learn. Res. 2013, 14, 333 - 350
1891
+
1892
+ 25
1893
+
1894
+
1895
+ [55] R Core Team. R: A Language and Environment for Statistical Computing. Vienna,
1896
+ Austria 2021.
1897
+
1898
+ [56] Meyer, D.; Dimitriadou, E.; Hornik, K.; Weingessel, A.; Leisch, F. E1071: Misc
1899
+ Functions of the Department of Statistics, Probability Theory Group (Formerly: E1071),
1900
+ TU Wien. 2022.
1901
+
1902
+ [57] Zhu, C.; Byrd, R. H.; Lu, P.; Nocedal, J. Algorithm 778: L-BFGS-B: Fortran
1903
+ Subroutines for Large-Scale Bound-Constrained Optimization. ACM Trans. Math. Softw.
1904
+ 1997, 23 (4), 550–560. https://doi.org/10.1145/279232.279236
1905
+
1906
+ [58] Marcus, R. A. On the Theory of Oxidation‐Reduction Reactions Involving Electron
1907
+ Transfer. I. J. Chem. Phys. 1956, 24 (5), 966–978. https://doi.org/10.1063/1.1742723.
1908
+
1909
+ [59] Marcus, R. A. Chemical and Electrochemical Electron-Transfer Theory. Annu. Rev.
1910
+ Phys.
1911
+ Chem.
1912
+ 1964,
1913
+ 15
1914
+ (1),
1915
+ 155–196.
1916
+ https://doi.org/10.1146/annurev.pc.15.100164.001103.
1917
+
1918
+ [60] Londi, G.; Dilmurat, R.; D’Avino, G.; Lemaur, V.; Olivier, Y.; Beljonne, D. Comprehensive
1919
+ Modelling Study of Singlet Exciton Diffusion in Donor–Acceptor Dyads: When Small Changes
1920
+ in Chemical Structure Matter. Phys. Chem. Chem. Phys. 2019, 21 (45), 25023–25034.
1921
+ https://doi.org/10.1039/C9CP05201A
1922
+
1923
+ [61] Brédas, J.-L.; Beljonne, D.; Coropceanu, V.; Cornil, J. Charge-Transfer and Energy-
1924
+ Transfer Processes in π-Conjugated Oligomers and Polymers: A Molecular Picture.
1925
+ Chem. Rev. 2004, 104 (11), 4971–5004. https://doi.org/10.1021/cr040084k.
1926
+
1927
+ [62] van der Maaten, L.; Hinton, G. Visualizing Data Using T-SNE. J. Mach. Learn. Res.
1928
+ 2008, 9 (86), 2579–2605.
1929
+
1930
+ [63] D. M. Packwood. Bi-Functional On-Surface Molecular Assemblies Predicted From a
1931
+ Multifaceted
1932
+ Computational
1933
+ Approach.
1934
+ Adv.
1935
+ Physics
1936
+ Res.
1937
+ 2022,
1938
+ https://doi.org/10.1002/apxr.202200019
1939
+
1940
+ [64] Tsubaki, M.; Mizoguchi, T. Fast and Accurate Molecular Property Prediction:
1941
+ Learning Atomic Interactions and Potentials with Neural Networks. J. Phys. Chem. Lett.
1942
+ 2018, 9 (19), 5733–5741. https://doi.org/10.1021/acs.jpclett.8b01837.
1943
+
1944
+
1945
+
1946
+
1947
+
1948
+
1949
+
1950
+
1951
+
1952
+
1953
+
1954
+
1955
+
1956
+ 26
1957
+
1958
+ Supporting Information for:
1959
+ Exciton diffusion in amorphous organic semiconductors: reducing
1960
+ simulation overheads with machine learning
1961
+
1962
+ Chayanit Wechwithayakhlung1,2, Geoffrey R. Weal3,4,2, Yu Kaneko5, Paul A. Hume3,4, Justin
1963
+ M. Hodgkiss3,4, Daniel M. Packwood1,2*
1964
+
1965
+ 1 Institute for Integrated Cell-Material Sciences (iCeMS), Kyoto University, Kyoto, Japan
1966
+
1967
+ 2 Center for Integrated Data-Material Sciences (iDM), MacDiarmid Institute for Advanced
1968
+ Materials and Nanotechnology, Wellington, New Zealand
1969
+
1970
+ 3 MacDiarmid Institute for Advanced Materials and Nanotechnology, Wellington, New Zealand
1971
+
1972
+ 4 School of Chemical and Physical Sciences, Victoria University of Wellington, Wellington,
1973
+ New Zealand
1974
+
1975
+ 5 Daicel Corporate Research Center, Innovation Park (iPark), Daicel Corporation, Himeiji,
1976
+ Japan
1977
+
1978
+ * Corresponding author. Email: dpackwood@icems.kyoto-u.ac.jp
1979
+
1980
+
1981
+
1982
+
1983
+
1984
+
1985
+
1986
+
1987
+
1988
+
1989
+
1990
+
1991
+
1992
+
1993
+
1994
+
1995
+
1996
+
1997
+
1998
+
1999
+
2000
+
2001
+
2002
+
2003
+
2004
+
2005
+
2006
+
2007
+
2008
+
2009
+
2010
+
2011
+ 27
2012
+
2013
+ SI 1. Amorphous pentacene system
2014
+
2015
+ CIF file of the amorphous pentacene system (Figure 1A)
2016
+
2017
+
2018
+ SI 2. Pentacene dimers
2019
+
2020
+ Zip file of extracted pentacene dimers in xyz format.
2021
+
2022
+
2023
+ SI 3. Parameters of the tested models and parameters of the final model
2024
+
2025
+ Excel file of model parameters.
2026
+
2027
+
2028
+ SI 4. Sensitivity analysis of final model
2029
+
2030
+
2031
+
2032
+ As for Figure 3B (main text), but with sensitivity analysis performed on the final model.
2033
+
2034
+
2035
+
2036
+
2037
+
2038
+
2039
+
2040
+
2041
+
2042
+
2043
+
2044
+
2045
+
2046
+
2047
+
2048
+
2049
+
2050
+
2051
+
2052
+
2053
+ GPR1
2054
+ Feature index (k)
2055
+ 0
2056
+ Sensitivity
2057
+ Coulomb interaction index (r)
2058
+ 72
2059
+ GPR2
2060
+ Feature index (k)
2061
+ Coulomb interaction index (r)
2062
+ 7228
2063
+
2064
+ SI 5. Predictions of final model compared to a single GPR model
2065
+
2066
+
2067
+ (A) Predicted excitonic coupling energies of the final model compared to ab initio values for
2068
+ all extracted pentacene dimers (identical to Figure 4A). (B) Predicted energies of a model
2069
+ consisting of a single Gaussian process regression component. See section 3.3 for details.
2070
+
2071
+ For clarity, each point is coloured according to the density of data in its vicinity. Concretely,
2072
+ for each point, the number of other points within a 0.01 eV radius were counted. The ‘density’
2073
+ was defined as this number divided by 4927 (the total number of data points).
2074
+
2075
+ Linear regression on the data in Figure A yields the result y = (0.0024  0.0001) + (0.80 
2076
+ 0.06)x, where errors refer to one standard error, and R2 = 0.77. For Figure B, we obtain y =
2077
+ (0.0032  0.0001) + (0.69  0.006)x and R2 = 0.74.
2078
+
2079
+
2080
+
2081
+
2082
+
2083
+
2084
+
2085
+
2086
+
2087
+
2088
+
2089
+
2090
+
2091
+
2092
+
2093
+
2094
+
2095
+
2096
+
2097
+
2098
+
2099
+
2100
+
2101
+
2102
+ A
2103
+ B
2104
+ 2
2105
+ 0.10
2106
+ 0.10
2107
+ coupling (eV)
2108
+ Predicted coupling (ev)
2109
+ 80'0
2110
+ 800
2111
+ 90'0
2112
+ 90°0
2113
+ Predicted
2114
+ oo
2115
+ 0.02
2116
+ 00:0
2117
+ T
2118
+ 00'0
2119
+ 0.02
2120
+ 0.04
2121
+ 0.06
2122
+ 0.08
2123
+ 0.10
2124
+ 0.12
2125
+ 00'0
2126
+ 0.06
2127
+ 80'0
2128
+ 0.10
2129
+ 0.12
2130
+ ab initio coupling (eV)
2131
+ ab initio coupling (eV)29
2132
+
2133
+ SI 6. Predicted diffusion tensor elements
2134
+
2135
+
2136
+ Ab initio-calculated
2137
+ couplings
2138
+ Final model-calculated
2139
+ couplings
2140
+ Large training set-
2141
+ calculated couplings*
2142
+ Diffusion Coefficient
2143
+ (× 10-3 cm2s-1)
2144
+ 1.630 ± 0.011
2145
+ 1.547 ± 0.005
2146
+ 1.544 ± 0.006
2147
+ Eigenvalues of the Diffusion Tensor (× 10-3 cm2s-1)
2148
+ Major
2149
+ 1.815 ± 0.014
2150
+ 1.686 ± 0.017
2151
+ 1.679 ± 0.012
2152
+ Middle
2153
+ 1.551 ± 0.016
2154
+ 1.492 ± 0.007
2155
+ 1.512 ± 0.006
2156
+ Minor
2157
+ 1.525 ± 0.012
2158
+ 1.462 ± 0.014
2159
+ 1.440 ± 0.006
2160
+
2161
+
2162
+
2163
+
2164
+ Ratio (Major: Middle: Minor)
2165
+ 1.19: 1.02: 1.00
2166
+ 1.15: 1.02: 1.00
2167
+ 1.17: 1.05: 1.00
2168
+
2169
+
2170
+ Diffusion Tensor (× 10-3 cm2s-1)
2171
+ xx
2172
+ 1.593 ± 0.020
2173
+ 1.492 ± 0.012
2174
+ 1.500 ± 0.010
2175
+ yy
2176
+ 1.682 ± 0.015
2177
+ 1.612 ± 0.008
2178
+ 1.613 ± 0.012
2179
+ zz
2180
+ 1.616 ± 0.007
2181
+ 1.536 ± 0.010
2182
+ 1.518 ± 0.006
2183
+
2184
+
2185
+
2186
+
2187
+
2188
+ xy
2189
+ -0.092 ± 0.009
2190
+ -0.061 ± 0.012
2191
+ -0.098 ± 0.007
2192
+ yz
2193
+ -0.108 ± 0.011
2194
+ -0.079 ± 0.011
2195
+ -0.039 ± 0.010
2196
+ xz
2197
+ 0.056 ± 0.012
2198
+ 0.033 ± 0.006
2199
+ 0.008 ± 0.003
2200
+
2201
+
2202
+
2203
+
2204
+
2205
+ Ratio
2206
+ (xx: yy: zz: xy: yz: xz)
2207
+ 28.5: 30.1: 28.9:
2208
+ 1.65: 1.93: 1.00
2209
+ 28.5: 30.8: 29.3: 1.16:
2210
+ 1.51: 0.64
2211
+ 28.5: 30.6: 28.8:
2212
+ 1.86: 0.75: 0.15
2213
+
2214
+ * This model used all dimers to train the SVM component, 2000 dimers to train GPR1, and
2215
+ 2200 dimers to train GPR2
2216
+
2217
+
9NFQT4oBgHgl3EQf5jYf/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
AtAyT4oBgHgl3EQf3_qJ/content/tmp_files/2301.00779v1.pdf.txt ADDED
@@ -0,0 +1,1333 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00779v1 [math.AG] 2 Jan 2023
2
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN
3
+ VARIETIES, WITH APPLICATION TO BRILL-NOETHER THEORY
4
+ GIUSEPPE PARESCHI
5
+ Abstract. We introduce a variant of global generation for coherent sheaves on abelian varieties
6
+ which, under certain circumstances, implies ampleness. This extends a criterion of Debarre asserting
7
+ that a continuously globally generated coherent sheaf on an abelian variety is ample. We apply this
8
+ to show the ampleness of certain sheaves, which we call naive Fourier-Mukai-Poincar´e transforms,
9
+ and to study the structure of GV sheaves.
10
+ In turn, one of these applications allows to extend
11
+ the classical existence and connectedness results of Brill-Noether theory to a wider context, e.g.
12
+ singular curves equipped with a suitable morphism to an abelian variety. Another application is
13
+ a general inequality of Brill-Noether type involving the Euler characteristic and the homological
14
+ dimension.
15
+ 1. Introduction
16
+ 1.1. Motivation: continuous global generation, M-regularity, and ampleness. We work
17
+ with projective varieties over an algebraically closed field k. On abelian (or, more generally, irreg-
18
+ ular) varieties, the basic notion of global generation of a coherent sheaf (at a given point) admits
19
+ a variant, introduced by M. Popa and the author, called continuous global generation (CGG for
20
+ short), see [PP1, Definition 2.10]. This is as follows: given a coherent sheaf F on an abelian variety
21
+ A, a closed point x ∈ A, and a Zariski open set U ⊂ Pic0A, one considers the sum of twisted
22
+ evaluation maps
23
+ evU(x) :
24
+
25
+ α∈U
26
+ H0(A, F ⊗ Pα) ⊗ P −1
27
+ α
28
+ → F|x ,
29
+ (1.1)
30
+ where: F|x := F ⊗ k(x) denotes the fiber of F at the point x, and Pα = P|A×{α} denotes the line
31
+ bundle on A parametrized by a point α ∈ Pic0A via the (normalized) Poincar`e line bundle P on
32
+ A × Pic0A.
33
+ The sheaf F is said to be CGG at x if this map is surjective for all (non empty) Zariski open
34
+ subsets of Pic0A. Of course, if this holds for every x ∈ A the sheaf F is said to be CGG.1
35
+ The condition of being CGG neither implies nor is implied by the usual global generaton
36
+ (GG). For example, the line bundle associated to a theta divisor on a p.p.a.v. is CGG but not GG
37
+ and the structure sheaf of an abelian variety is GG but not CGG. However the following three facts
38
+ make the CGG property significant:
39
+ Supported by the MIUR Excellence Department Project awarded to the Department of Mathematics, University
40
+ of Rome Tor Vergata, CUP E83C18000100006”.
41
+ 1There is a more general version of these notions and their consequences holding for sheaves on any variety
42
+ equipped with a morphism to an abelian variety, see Definition 2.1.1. In this paper we mostly consider sheaves on
43
+ abelian varieties
44
+ 1
45
+
46
+ 2
47
+ G.PARESCHI
48
+ (i) Ampleness. Let µN : A → A be the multiplication by N. If F is a CGG coherent sheaf on A
49
+ then there is a N >> 0 such that µ∗
50
+ N(F ⊗ Pα) is GG for all α ∈ Pic0A. Consequently, a CGG
51
+ sheaf on an abelian variety is ample ([D, Proposition 3.1 and Corollary 3.2]).2
52
+ (ii) Criterion for global generation. If F and L are respectively a CGG coherent sheaf on A, and
53
+ a CGG line bundle on a subvariety of A, then F ⊗ L is GG (this follows by considering sections of
54
+ the form sα · t−α with sα ∈ H0(F ⊗ Pα) and t−α ∈ H0(L ⊗ P −1
55
+ α ), [PP1, Proposition 2.12]).
56
+ (iii) Cohomological criterion. There is a natural vanishing condition on the higher cohomology,
57
+ named M-regularity, implying CGG ([PP1]).
58
+ This package has found various applications. To name a few: effective projective normality
59
+ and syzygies of abelian varieties (e.g.
60
+ [PP3],[I]); effective birationality of pluricanonical maps
61
+ of irregular varieties (e.g.
62
+ [PP3], [JLT], [BLNP], [JS], [CCCJ]); positivity of direct images of
63
+ pluricanonical sheaves of varieties mapping to abelian varieties (e.g. [D], [CJ], [LPS], [M1],[M2],
64
+ [MP]); birational geometry and volume of irregular varieties via eventual maps (e.g. [J]).
65
+ The property of being CGG, as well as the M-regularity condition implying it, are quite
66
+ strong and not often verified. In this paper we introduce the following weaker condition with the
67
+ purpose of enlarging the range of applicability of this circle of ideas, especially Debarre’s criterion
68
+ for ampleness mentioned in (i).3
69
+ 1.2. Generation by a set of subvarieties of the dual abelian variety.
70
+ Definition. Given a finite set of irreducible subvarieties of Pic0A, say Z = {Zi} (such that no
71
+ subvariety is contained in another one), a coherent sheaf F on A is said to be generated by Z (at
72
+ a given point x ∈ A) if the map (1.1) is surjective for all open sets U of Pic0A such that U meets
73
+ all subvarieties Zi ∈ Z.
74
+ In this language, to be CGG means to be generated by the trivial set Z = {Pic0A}. On
75
+ the other hand, a GG sheaf is generated by the set formed by the origin alone: Z = {ˆ0} (but the
76
+ converse does not hold in general). We say that a coherent sheaf is generated if it is generated by
77
+ some set of subvarieties (this notion of generation coincides with the notion of algebraic generation
78
+ of [LY, Definition 3.2]).
79
+ There is a natural notion of irredundant generating set (see Remark 2.1.2), and it can be
80
+ shown that, for any finite set of subvarieties Z = {Zi} as above, there are generated sheaves F
81
+ having Z as irredundant generating set (Example 6.2.4 below).
82
+ Next, an irreducible subvariety Z of an abelian variety B is said to span B if
83
+ N
84
+
85
+ ��
86
+
87
+ Z + · · · + Z = B
88
+ for some N. A finite set of irreducible subvarieties Z = {Zi} is said to strongly span B if each
89
+ subvariety Zi spans B.
90
+ Items (i) and (ii) of the previous subsection generalize as follows:
91
+ 2(a) The notion of ampleness have been extended to coherent sheaves by Kubota [K], and many properties holding
92
+ for vector bundles extend to this setting, see [D].
93
+ (b) The quoted result is stated in loc cit over the complex numbers, but the proof works over any algebraically closed
94
+ field
95
+ 3In the same spirit, a related notion, namely weak CGG, was introduced by M. Popa and the author in [PP2,
96
+ Definition 2.1], but the notion given here is better behaved
97
+
98
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
99
+ 3
100
+ Theorem A (Nefness/ampleness). If F is generated then it is nef. If F is generated by a set of
101
+ subvarieties Z strongly spanning Pic0A then F is ample (Theorem 2.2.2).
102
+ Theorem B (Non-generation locus). If F is generated by a set Z = {Zi} and L is a CGG line
103
+ bundle on a subvariety X of A, then the non-generation locus of F ⊗L (namely the locus B(F ⊗L)
104
+ where F ⊗L is not globally generated) is explicitly controlled in function of the base loci of the line
105
+ bundles L ⊗ Pα, with α ∈ Zi (Proposition 2.3.1).
106
+ (As expected, it turns out that the bigger are
107
+ the Zi, the smaller is B(F ⊗ L)).
108
+ 1.3. Relationship with the Fourier-Mukai-Poincar´e transform. We are left with the prob-
109
+ lem of finding criteria or applicable methods for proving that a given coherent sheaf is generated.
110
+ In view of Theorem A, it is especially relevant to understand whether a given sheaf F is generated
111
+ by some set of subvarieties strongly spanning Pic0A. The author hopes that this method will be
112
+ helpful in addressing the ampleness of vector bundles on subvarieties of abelian varieties.
113
+ The next result is a step in this direction. Namely we provide a sufficient condition (close
114
+ to be a characterization) ensuring that a given coherent sheaf F is generated, and we identify
115
+ the irredundant set of subvarieties doing the job. Roughly speaking, this is a subset of the set of
116
+ irreducible components of the supports of the sheaves appearing in the torsion filtration ([HuLe,
117
+ Definition 1.1.4]) of a certain coherent sheaf on Pic0A associated to F, referred to as the naive
118
+ Fourier-Mukai-Poincar´e (FMP) transform of F. However, except for some cases, this is just a first
119
+ step toward the solution of the above problem, since in general the torsion filtration of the naive
120
+ FMP transform of F is not easy to describe.
121
+ Passing to a more detailed description, we will consider the FMP functor in the following
122
+ form. Let P be the normalized Poincar`e line bundle on A × Pic0A. We consider the Fourier-Mukai
123
+ equivalence
124
+ ΦA
125
+ P−1 : D(A) → D(Pic0A),
126
+ ΦA
127
+ P−1( · ) = Rq∗(p∗( · ) ⊗ P−1)
128
+ (1.2)
129
+ where p and q are the projections on A and Pic0A. We will also make use of the dualization functor
130
+ in the following (unshifted) form:
131
+ F∨ := RHom(F, OA).
132
+ (1.3)
133
+ The above mentioned naive FMP transform of a given coherent sheaf F on A is defined as
134
+ follows
135
+ T (F) := RgΦA
136
+ P−1(F∨).
137
+ (1.4)
138
+ where g = dim A. By Serre-Grothedieck duality, Hi(A, F∨ ⊗ P −1
139
+ α ) = 0 for all i > g and for all
140
+ α ∈ Pic0A. Therefore, by base change and duality, we have the canonical isomorphisms
141
+ RgΦA
142
+ P−1(F∨)|α ∼= Hg(A, F∨ ⊗ P −1
143
+ α ) ∼= H0(A, F ⊗ Pα)∨
144
+ for all α ∈ Pic0A (note that the above Hg is usually a hypercohomology group). Hence (up to
145
+ duality) the coherent sheaf T (F) encodes the variation of the k-linear spaces H0(A, F ⊗ Pα) as
146
+ α varies in Pic0A. Therefore it is natural to expect that T (F) must be related somehow to the
147
+ generation of the coherent sheaf F. It turns out that it is the torsion of the sheaf T (F) what really
148
+ matters.
149
+ Of course, in general it is not the case that the naive transform coincides (up to shift) with
150
+ the transform in the derived category, namely that
151
+ ΦA
152
+ P−1(F∨) = RgΦA
153
+ P−1(F∨)[−g].
154
+ (1.5)
155
+ In fact the sheaf F is said to be a GV sheaf (generic vanishing sheaf) precisely when (1.5) holds.
156
+
157
+ 4
158
+ G.PARESCHI
159
+ The precise relation of the FMP transform with the generation problem is stated in Corollaries
160
+ 3.2.1 and 3.2.4. It could be somewhat imprecisely summarized as follows
161
+ Theorem C (Generation of sheaves and the FMP transform). (a) The surjectivity of the map
162
+ (1.1) can be rephrased in terms of a condition involving both the FMP transform ΦA
163
+ P−1(F∨) and
164
+ the naive FMP transform RgΦA
165
+ P−1(F∨);
166
+ (b) if F is generated, then a certain subset of the set of irreducible components of the supports of the
167
+ sheaves appearing in the torsion filtration of the naive FMP transform of F form an (irredundant)
168
+ generating set for F .
169
+ As mentioned above, the problem in applying condition (b) is that at present there is no
170
+ general way of describing, in terms of F, the supports of the sheaves appearing in the torsion
171
+ filtration of the naive FMP transform of F (only for GV sheaves there we have such a description,
172
+ see Remark 3.2.5).
173
+ 1.4. Ampleness of naive FMP transforms (= generalized Picard bundles). The next
174
+ result concerns a lucky class of coherent sheaves which turn out to be generated and ample, even
175
+ when they are not GV sheaves: the naive FMP transforms themselves. More generally, the same
176
+ holds for the naive FMP transforms of coherent sheaves on certain reduced schemes mapping to
177
+ abelian varieties. These are defined similarly, with the difference that the FMP functor is not an
178
+ equivalence anymore (it turns out that, for the specific result described in the present subsection,
179
+ this is unnecessary).
180
+ Specifically, given a equidimensional, reduced, Cohen-Macaulay projective scheme, equipped
181
+ with a morphism to an abelian variety f : X → A, one defines PX = (f × id)∗P and considers the
182
+ functor (not an equivalence anymore)
183
+ ΦX
184
+ P−1
185
+ X : D(X) → D(Pic0A)
186
+ and the (unshifted) dualization functor
187
+ ∆X : D(X) → D(X),
188
+ ∆X(F) = RHom(F, ωX)
189
+ The naive FMP transform of a coherent sheaf F on X is defined as
190
+ T (F) = RdΦX
191
+ P−1
192
+ X (∆X(F)),
193
+ where d = dim X, and has the same meaning as discussed in the previous subsection.
194
+ We will consider coherent sheaves F on a reduced scheme X as above with the property that
195
+ all subsheaves of F have reduced scheme-theoretic support (equivalently, one can consider only the
196
+ subsheaves appearing in the torsion filtration of F). We will adopt the following notation: given
197
+ a sheaf F on X, we denote Z(F) = {Zi} the set of irreducible components of the supports of the
198
+ sheaves on X appearing in the torsion filtration of F, and f(Z(F)) := {f(Zi)}.
199
+ Theorem D (Generation and ampleness of naive FMP transforms). In the above setting, let F be a
200
+ coherent sheaf on a scheme X as above, such that all subsheaves of F have reduced scheme-theoretic
201
+ support (the simplest example are torsion free sheaves on X). Then the naive FMP transform T (F)
202
+ is generated by a subset of the collection f(Z(F)).
203
+ In particular, if each subvariety of the set Z(F) maps, via the morphism f, to a subvariety spanning
204
+ the abelian variety A, then T (F) is an ample sheaf on Pic0A.
205
+
206
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
207
+ 5
208
+ The above theorem is in fact is a generalization of a result of Schnell, who proved that naive
209
+ FM transforms of torsion free sheaves on abelian varieties are CGG ([Sch, Theorem 4.1]).4 The
210
+ argument used in the proof is essentially Schnell’s.
211
+ We remark that, although in a different language, a well known example of Theorem D is
212
+ that of (dual) Picard bundles: here X is a smooth complex projective variety, equipped with its
213
+ Albanese morphism a : X → Alb X, and F = L is a line bundle on X satisfying the following
214
+ vanishing condition on the higher cohomology:
215
+ Hi(X, L ⊗ Pα) = 0
216
+ (1.6)
217
+ for all α ∈ Pic0X and i > 0.5 By base change this ensures that T (L) is a vector bundle on Pic0X.
218
+ Note that in this case the generating collection is given by a single subvariety, namely the Albanese
219
+ image {a(X)}, which automatically spans. By Theorem D, T (L) is ample. The dual of T (L),
220
+ namely R0ΦX
221
+ PX(F), is called the Picard bundle associated to the line bundle L.6 Picard bundles
222
+ were classically known to be be negative for dim X = 1 ([ACGH]). This result was subsequently
223
+ generalized by Lazarsfeld to all smooth projective varieties ([L, §6.3.C]). Thus Theorem D can be
224
+ seen as a vast generalization (with a completely different proof) of that result.
225
+ It is worth to remark that in Theorem D we are not assuming condition (1.6), nor any other
226
+ vanishing conditions. Interestingly, there are many examples of coherent sheaves not verifying (1.6)
227
+ such that nevertheless their naive FMP transform is locally free (see Remark 4.2.2).
228
+ 1.5. Application to Brill-Noether theory of singular curves. One immediate application
229
+ of Theorem D is to Brill-Noether theory of (complex) singular curves (even reducible and with
230
+ non-planar singularities) equipped with a morphism to an abelian variety. In this setting we provide
231
+ analogues of the existence and connectedness theorems for special divisors, Ghione and Segre-
232
+ Nagata theorem. We refer to Subsection 5 for these results.
233
+ 1.6. A general inequality of Brill-Noether type. Another application of Theorem D is a
234
+ general existence result of Brill-Noether type which, although somewhat weak, is optimal, and
235
+ turns out to be useful in some applications. In this subsection we will assume that the ground field
236
+ is C. Given a coherent sheaf F on a complex abelian variety A,7 one defines the cohomological
237
+ support loci
238
+ V i(F) = {α ∈ Pic0A | hi(F ⊗ Pα) > 0}
239
+ (1.7)
240
+ and
241
+ V >0(F) =
242
+
243
+ i>0
244
+ V i(F)
245
+ (1.8)
246
+ Theorem E. Let F be a coherent sheaf on a complex abelian variety A such that all its torsion
247
+ subsheaves (if any) have reduced scheme-theoretic support, and each component of the support spans
248
+ A (simplest example: a torsion free sheaf on A). Assume that condition (1.6) holds, i.e.
249
+ V >0(F) = ∅.
250
+ 4Of course Schnell does not use this terminology. Moreover his result is stated in the language of the symmetric
251
+ Fourier transform, introduced in the same paper.
252
+ 5When dealing with sheaves on abelian varieties this condition is usually referred to as the IT(0) condition (namely
253
+ F satisfied the index theorem with index 0).
254
+ 6It is easily seen that this definition is equivalent to the one of [L, §6.3.C], where the Picard bundle is defined as
255
+ a vector bundle on PicλX, where λ is the algebraic equivalence class of L.
256
+ 7also in this case one could extend the discussion of this topic to varieties equipped of a finite morphism to an
257
+ abelian varieties, but for sake of simplicity we will stick to abelian varieties
258
+
259
+ 6
260
+ G.PARESCHI
261
+ Then
262
+ χ(F) ≥ hd(F) + 1.
263
+ Here hd(F) denotes the homological dimension. Easy examples showing that (at least the
264
+ way it is stated), Theorem E is optimal, are:
265
+ (a) locally free sheaves F on abelian varieties (of arbitrarily high rank) such that V >0(F) = ∅ and
266
+ χ(F) = 1. (It is known that such sheaves are of the form F = ΦP−1(L∨), where L is any ample
267
+ line bundle on A. Then χ(F) = 1 and rk(F) = χ(L).)
268
+ (b) Let i : C → J(C) a Abel-Jacobi embedding of a curve in its Jacobian and let F = i∗L,
269
+ where L is a line bundle on C. In this case V >0(F) = V 1(F), which is non-empty if and only if
270
+ deg(L) ≤ 2g − 2, i.e. χ(F) ≤ g − 1 = hd(F).
271
+ An example of application of Theorem E is as follows. Let J (D) be the multiplier ideal sheaf
272
+ of an effective Q-divisor D on an abelian variety A, and let L be an ample line bundle on A such
273
+ that L − D is nef and big. By Nadel’s vanishing the sheaf J (D) ⊗ L satisfies the assumptions of
274
+ Theorem E. Letting Z the scheme of zeroes of J (D), it follows that
275
+ χ(J (D) ⊗ L) ≥ codim Z
276
+ (1.9)
277
+ (meaning the maximal codimension of a component of Z).
278
+ This is instrumental in the proof of a result of the author on singularities of divisors on
279
+ complex simple abelian varieties ([P2], see also Corollary 5.2.2).
280
+ 1.7. The case of GV sheaves. GV sheaves are those sheaves such that their naive FMP transform
281
+ T (F) coincides, up to shift, with the FMP transform in the derived category (see (1.5)).8 They
282
+ are very special cases of naive FMP transforms since it follows from the inversion formula for the
283
+ FMP equivalence that
284
+ F = T (T (F))
285
+ (1.10)
286
+ (see Proposition 6.2.2). Therefore part (a) of the next result, on the generation and ampleness
287
+ of such sheaves, follows from Theorems C and D. As M regular sheaves form a subclass of GV
288
+ sheaves, this recovers as a particular case the M-regularity criterion (iii) of Subsection 1.2. Item
289
+ (b) is a structure result for such GV sheaves, following from the analysis of the torsion filtration
290
+ of the FMP transform. Loosely speaking, the content is that the building blocks for GV sheaves
291
+ are either CGG (hence ample) sheaves, or sheaves of the form (p∗G) ⊗ Pα, where p : A → B is a
292
+ surjective homomorphism with connected kernel onto a lower dimensional abelian variety and G is
293
+ a CGG (hence ample) sheaf on B.
294
+ Theorem F (see Theorem 6.3.1). Let F be a GV sheaf on a g-dimensional abelian variety A, and
295
+ assume that all subsheaves of the FMP transform T (F) have reduced support. Then:
296
+ (a) F is generated and an irredundant generating set can be explicitly described;
297
+ (b) F has a cofiltration whose kernels have in turn a cofiltration whose kernels are dominated either
298
+ by ample sheaves or by sheaves of the form (p∗G) ⊗ Pα as above.
299
+ Concerning (a), let us recall that not all GV sheaves are generated. This is shown by the well
300
+ known example of non-trivial unipotent vector bundles on abelian varieties (see Example 6.2.3).
301
+ This is caused by the fact that, unless F is trivial, the FMP transform T (F) is a torsion sheaf
302
+ supported at a non-reduced zero-dimensional scheme, set-theoretically supported at the origin of
303
+ 8If this is the case the sheaf T (F) is often denoted �
304
+ F∨ in the literature
305
+
306
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
307
+ 7
308
+ Pic0A. It is worth to recall that a generation criterion for GV sheaves was already given by Popa
309
+ and the author (WIT criterion, [PP2, Theorem 4.1]). Item (a) is a more precise version of that
310
+ result.
311
+ In turn, item (b) can be seen as a weak analog of the Chen-Jiang decomposition ([CJ]),
312
+ a quite useful property satisfied by direct images of pluricanonical sheaves under morphisms to
313
+ abelian varieties (see Subsection 6.3).
314
+ 2. Generated and ample coherent sheaves on abelian varieties
315
+ In this section we provide some generalities on the notion of generation of coherent sheaves
316
+ on abelian varieties introduced in Subsection 1.2, and prove Theorems A and B.
317
+ 2.1. Generalities. To begin with, we remark that, although the focus of this paper is on coherent
318
+ sheaves on abelian varieties, one can extend the definition given in Subsection 1.2 to the following
319
+ setting: let X be a projective variety, equipped with a morphism to an abelian variety
320
+ f : X → A.
321
+ Definition 2.1.1. Let Z = {Zi}i∈I be a finite set of irreducible subvarieties of Pic0A, such that no
322
+ subvariety belonging to Z is contained in another. A coherent sheaf F on X is said to be generated
323
+ by Z at a given point x ∈ X (with respect to te morphism f) if the map
324
+ evU(x) :
325
+
326
+ α∈U
327
+ H0(F ⊗ f ∗Pα) ⊗ f ∗P −1
328
+ α
329
+ → F|x
330
+ is surjective for all open sets U such that U meets Zi for all i. If this happens for all x ∈ X, namely
331
+ the map
332
+ evU :
333
+
334
+ α∈U
335
+ H0(F ⊗ f ∗Pα) ⊗ f ∗P −1
336
+ α
337
+ → F
338
+ is surjective, the sheaf F is said to be generated by the set Z (with respect to the morphism f).
339
+ If Z = {Pic0A} then F is said to be continuously globally generated (CGG). Moreover F is said to
340
+ be generated (with respect to the morphism f) if there is some set of subvarieties Z generating F
341
+ (with respect to the morphism f). This is equivalent to the surjectivity of the map
342
+ evPic0A :
343
+
344
+ α∈Pic0A
345
+ H0(F ⊗ f ∗Pα) ⊗ f ∗P −1
346
+ α
347
+ → F.
348
+ (2.1)
349
+ Remark 2.1.2. A finite set of subvarieties Y = {Yj} as above is said to be covered by another
350
+ Z = {Zi} if for all i there is a j such that Yj is contained in Zi. If a sheaf F is generated by a set
351
+ Z then, trivially, it is generated by any set covered by Z, and, as it will be clear in a moment, it
352
+ turns out that is useful to identify a maximal (with respect to the relation of being covered) set
353
+ doing the job. Such a set of subvariety will be called an irredundant generating set for F.
354
+ Remark 2.1.3. In practice in some arguments it may happen to find generating sets Z = {Zi}
355
+ such that Zj is contained in Zk for some j and k. However this does not cause any problem because,
356
+ if this is the case, to be generated by the set Z is the same thing of being generated by the set
357
+ Z ∖ {Zk}. Hence, by taking the subset of minimal subvarieties belonging to set Z, one can always
358
+ reduce to the assumption of Definition 2.1.1.
359
+
360
+ 8
361
+ G.PARESCHI
362
+ Remark 2.1.4. By noetherianity and quasi-compactness, Definition 4.1 can be equivalently for-
363
+ mulated replacing the map evU of the Definition 2.1.1 with the sum of finite number of evaluation
364
+ maps. The required condition is the existence of positive integer N0 and a collection of positive
365
+ integers {Ni}i∈I such that the sum of twisted evaluation maps
366
+
367
+ i∈I∪{0},1≤j≤Ni
368
+ H0(F ⊗ f ∗Pαi,j) ⊗ f ∗P −1
369
+ αi,j → F
370
+ is surjective for all sufficiently general (α0,1, . . . α0,N) ∈ (Pic0A)N and (αi,1, . . . , αi,Ni) ∈ (Zi)Ni for
371
+ all i ∈ I. Therefore also in the sum (2.1) one can take a finite number of summands. In particular,
372
+ the notion of generated coherent sheaf introduced here coincides with the the notion of algebraically
373
+ generated coherent sheaf introduced in the recent paper [LY, Definition 3.2].
374
+ It follows that a coherent generated (with respect to any morphism) sheaf is nef, as it is the
375
+ quotient of the direct sum of numerically trivial line bundles.
376
+ 2.2. Proof of Theorem A. The main point is in the following easy lemma.
377
+ Lemma 2.2.1. In the setting of Definition 2.1.1, let Z = {Zi}n
378
+ i=1 and Y = {Yj}m
379
+ j=1 be two finite
380
+ sets of subvarieties of Pic0A. Let moreover F and G be coherent sheaves on X respectively generated
381
+ by Z and Y (with respect to the morphism f). Then F ⊗ G is generated by the set of subvarieties
382
+ (see Remark 2.1.3):
383
+ Z + Y := {Zi + Yj}(n,m)
384
+ (i,j)=(1,1).
385
+ Here Zi + Yj denotes, as usual, the image of Zi × Yj via the group law of Pic0A.
386
+ Proof. For open subsets of Pic0A, say U and V , respectively meeting all the Zi’s and all the Yi’s
387
+ we have the surjective map
388
+
389
+ (α,β)∈U×V H0(F ⊗ f ∗Pα) ⊗ H0(G ⊗ f ∗Pβ) ⊗ f ∗P −1
390
+ α
391
+ ⊗ f ∗P −1
392
+ β
393
+
394
+ ��
395
+ α∈U H0(A, F ⊗ f ∗Pα
396
+
397
+ ⊗ f ∗P −1
398
+ α ) ⊗
399
+ ��
400
+ β∈V H0(A, G ⊗ f ∗Pβ) ⊗ f ∗P −1
401
+ β
402
+
403
+ −→
404
+ F ⊗ G
405
+ .
406
+ This map factors through the map
407
+
408
+ γ∈U+V
409
+ H0(F ⊗ G ⊗ f ∗Pγ) ⊗ f ∗P −1
410
+ γ
411
+ → F ⊗ G
412
+ which is, therefore, surjective. Finally, any open subset of Pic0A meeting all the subvarieties Xi+Yj,
413
+ for i = 1, . . . , n and j = 1, . . . , m, contains some open subset of the form U + V , with U and V as
414
+ above.
415
+
416
+ The following result is Theorem A of the Introduction, in a slightly more general form. It is
417
+ an extension of the above quoted result of Debarre asserting that a CGG sheaf with respect to a
418
+ finite onto its image morphism to an abelian variety is ample.
419
+ Theorem 2.2.2. In the setting of Definition 2.1.1 let us assume that the morphism f : X → A is
420
+ finite onto its image. Let F be a coherent sheaf on X such that F is generated by a finite set of
421
+ subvarieties Z = {Zi}i∈I strongly spanning Pic0A (see Subsection 1.2). Then F is ample.
422
+ Proof. To begin with, we note that the fact that the set Z = {Zi}i∈I strongly spans Pic0A implies
423
+ that there is a positive integer M such that Zi1 + · · · + ZiM = Pic0A for all (i1, . . . , iM) ∈ IM. By
424
+
425
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
426
+ 9
427
+ Lemma 2.2.1 we know that the sheaf F⊗M is generated by the set {Zi1 + · · · + ZiM }(i1,...,iM)∈IM .
428
+ Hence F⊗M is CGG and therefore the same holds true for SMF. Therefore, by Debarre’s theorem,
429
+ SMF is ample, hence F is ample.
430
+
431
+ As a particular case, a coherent sheaf on an abelian variety which is generated by a single
432
+ irreducible subvariety Z spanning Pic0A is ample. Obviously this is in general false if F is generated
433
+ by the set of components of a reducible subvariety spanning Pic0A, but some individual component
434
+ do not (e.g. on a product of abelian varieties A = A1 × A2, let F = p∗
435
+ 1F1 ⊕ p∗
436
+ 2F2, with Fi CGG
437
+ (hence ample) sheaves on Ai for i = 1, 2.
438
+ The sheaf F is not ample, but is generated by the
439
+ collection {Pic0A1 × {ˆ0}, {ˆ0} × Pic0A2}.)
440
+ 2.3. Proof of Theorem B. As mentioned in Subsection 1.1 (item (ii)), the CGG condition
441
+ provides a useful criterion for global generation. The natural extension of this is the following9
442
+ Proposition 2.3.1. In the setting of Definition 2.1.1, let F be a coherent sheaf on X, generated
443
+ (with respect to the morphism f) by a set Z = {Zi}. Let Y be a subvariety of X and let L be a
444
+ CGG (with respect to f) line bundle on Y . Then
445
+ B(F ⊗ L) ⊂
446
+
447
+ i
448
+ � �
449
+ α∈Zi
450
+ B(L ⊗ P −1
451
+ α )
452
+
453
+ .
454
+ Proof. Note that for a line bundle L, to be CGG means that the intersection of the base loci
455
+
456
+ α∈V B(L ⊗ Pα) is empty for all (non-empty) open subsets V ⊆ Pic0A. Let y ∈ Y . Since L is
457
+ CGG the subset {α ∈ Pic0A | y ̸∈ B(L ⊗ P −1
458
+ α )} contains an open subset Uy(L) ⊆ Pic0A. Assume
459
+ that y ̸∈ �
460
+ i(�
461
+ α∈Zi B(L ⊗ P −1
462
+ α )). Then the open set Uy(L) meets all irreducible subvarieties Zi.
463
+ Therefore, given another open set U ⊂ Pic0A meeting all irreducible subvarieties Zi, also the open
464
+ subset U ∩ Uy(L) meets all subvarieties Zi. Therefore, in the commutative diagram
465
+
466
+ α∈U∩Uy(L) H0(F ⊗ Pα) ⊗ H0(L ⊗ P −1
467
+ α )
468
+
469
+
470
+ H0(F ⊗ L)
471
+
472
+
473
+ α∈U∩Uy(L) H0(F ⊗ Pα) ⊗ (L ⊗ P −1
474
+ α )|y
475
+ � (F ⊗ L)|y
476
+ both the left arrow and the bottom arrow are surjective. Hence the right arrow is surjective.
477
+
478
+ 3. Relationship with the FMP transform
479
+ 3.1. The basic relation. The relevance of the FMP functor in the study of the generation of
480
+ coherent sheaves on abelian varieties stems from the following relation between the evaluation
481
+ maps of a coherent sheaf on A and of its naive FMP transform on Pic0A. This is known to the
482
+ experts (see Schnell’s paper [Sch], proof of Proposition 4.1). In what follows we will keep the setting
483
+ and notation of the Introduction, Subsection 1.3.
484
+ Given an open subset U of Pic0A, the continuous evaluation map at x ∈ A
485
+ evU(x) :
486
+
487
+ α∈U
488
+ H0(F ⊗ Pα) ⊗ P −1
489
+ α
490
+ → F|x
491
+ (3.1)
492
+ 9also this result is an extension of a result of Popa and the author in the context of the above mentioned notion
493
+ of weak global generation ([PP2, Proposition 2.4(c)])
494
+
495
+ 10
496
+ G.PARESCHI
497
+ factors through the map
498
+
499
+ α∈U
500
+ H0(F ⊗ Pα) ⊗ (P −1
501
+ α )|x → F|x
502
+ (3.2)
503
+ and (3.1) is surjective if and only if (3.2) is.
504
+ Let us consider the individual maps of (3.2), i.e.
505
+ H0(F ⊗ Pα) ⊗ P −1
506
+ α
507
+ ⊗ k(x) → F ⊗ k(x).
508
+ (3.3)
509
+ The next Proposition describes the image of the dual map of (3.3) via the (contravariant) equiva-
510
+ lence
511
+ F : D(A) → D(Pic0A),
512
+ F( · ) = ΦA
513
+ P−1(( · )∨)
514
+ Proposition 3.1.1. The functor F identifies the Serre-Grothendieck dual of the linear map (3.3)
515
+ to the linear map
516
+ Hg(ΦA
517
+ P−1(F∨) ⊗ Px) → (RgΦA
518
+ P−1(F∨) ⊗ Px) ⊗ k(α)
519
+ factoring as follows
520
+ Hg(ΦP−1(F∨) ⊗ Px)
521
+ edx �
522
+ �❯
523
+
524
+
525
+
526
+
527
+
528
+
529
+
530
+
531
+
532
+
533
+
534
+
535
+
536
+
537
+
538
+
539
+ H0(RgΦP−1(F∨) ⊗ Px)
540
+ evx(α)
541
+
542
+ (RgΦP−1(F∨) ⊗ Px)|α
543
+ (3.4)
544
+ where evx(α) is the evaluation at the point α ∈ �A of the coherent sheaf RgΦP−1(F∨) ⊗ Px.
545
+ Proof. The proof is straightforward. We identify the map (3.3) to
546
+ H0(F ⊗ Pα) ⊗ H0(P −1
547
+ α
548
+ ⊗ k(x)) → H0(F ⊗ k(x)).
549
+ (3.5)
550
+ Applying Serre-Grothedieck duality, we write the dual map of (3.5) as
551
+ HomD(A)(k(x), F∨[g]) = Extg(k(x), F∨) → Hom(H0(P −1
552
+ α
553
+ ⊗ k(x)), Hg(F∨ ⊗ P −1
554
+ α )).
555
+ (3.6)
556
+ Applying the functor ΦA
557
+ P−1 to the the source of (3.6), we have the chain of isomorphisms
558
+ HomD(A)(k(x), F∨[g]) ∼= HomD(Pic0A)(P −1
559
+ x , ΦA
560
+ P−1(F∨)[g]) ∼=
561
+ ∼= Extg(P −1
562
+ x , ΦA
563
+ P−1(F∨)) ∼= Hg(ΦA
564
+ P−1(F∨) ⊗ Px).
565
+ (3.7)
566
+ Concerning the target of the map (3.6), there are the canonical identifications
567
+ H0(P −1
568
+ α
569
+ ⊗ k(x)) ∼= R0ΦA
570
+ P−1
571
+
572
+ k(x)
573
+
574
+ ⊗ k(α) = ΦA
575
+ P−1(k(x)) ⊗ k(α) = P −1
576
+ x
577
+ ⊗ k(α)
578
+ and
579
+ Hg(F∨ ⊗ P −1
580
+ α ) ∼=
581
+
582
+ RgΦA
583
+ P−1(F∨)
584
+
585
+ ⊗ k(α).
586
+ We conclude that the map (3.6) is identified, via the functor ΦA
587
+ P−1, to a linear map
588
+ Hg(ΦA
589
+ P−1(F∨) ⊗ Px) →
590
+
591
+ RgΦA
592
+ P−1(F∨) ⊗ Px
593
+
594
+ ⊗ k(α).
595
+ factorizing trough the evaluation map of the sheaf RgΦA
596
+ P−1(F∨) ⊗ Px at the point α, as stated in
597
+ (3.4).
598
+
599
+
600
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
601
+ 11
602
+ Remark 3.1.2. The map
603
+ edx : Hg(ΦA
604
+ P−1(F∨) ⊗ Px) → H0(RgΦA
605
+ P−1(F∨) ⊗ Px).
606
+ (3.8)
607
+ appearing in (3.4) is in fact the edge map in the hypercohomology spectral sequence
608
+ Hp(RqΦA
609
+ P−1(F∨) ⊗ Px) =⇒ Hp+q(ΦA
610
+ P−1(F∨) ⊗ Px).
611
+ 3.2. Consequences. From this point we will adopt the notation of the Introduction (see 1.4),
612
+ namely
613
+ T (F) := RgΦA
614
+ P−1(F∨).
615
+ (3.9)
616
+ This sheaf will be referred to as the naive FMP transform of F. Proposition 3.1.1 allows to express
617
+ the surjectivity of the map evU(x) of (3.1) as follows (this is Theorem C(a) of the Introduction).
618
+ Corollary 3.2.1. Let U be an open subset of Pic0A and let x ∈ A. The map evU(x) of (3.1) is
619
+ surjective if and only if the following two conditions hold:
620
+ (1) the map edx of (3.8) is injective;
621
+ (2) the restriction of the simultaneous evaluation map
622
+ evx(U) : H0(T (F) ⊗ Px) −→
623
+
624
+ α∈U
625
+ (T (F) ⊗ Px)|α
626
+ (3.10)
627
+ to the image of the map edx is injective.
628
+ Remark 3.2.2. Notice that the map edx depends only on x and not on the open subset U ⊂ Pic0A.
629
+ Therefore if F is generated at x, i.e. the map evU(x) (see (3.1)) is surjective for some U, then edx
630
+ is injective.
631
+ Remark 3.2.3. In view of the previous corollary, it is useful to understand the kernel of the
632
+ evaluation maps evx(U) of (3.10) for a non empty open subset U. A non-zero section s ∈ ker evx(U)
633
+ must be a torsion section, i.e. the image of the map s : OPic0A → T (F) ⊗ Px must be a torsion
634
+ sheaf. If the support of such image is reduced then it is the closure of the subset of α ∈ Pic0A
635
+ such that s|α ∈ (T (F) ⊗ Px)|α is non zero. If this is the case then U must be contained in the
636
+ complement of such support. Of course for all x ∈ A the torsion subsheaves of T (F) ⊗ Px coincide,
637
+ after tensorization with P −1
638
+ x , with the torsion subsheaves of T (F), hence they do not depend on
639
+ x ∈ A. Moreover all the irreducible components of supports of torsion subsheaves of T (F) appear
640
+ in the support of sheaves appearing in the torsion filtration of T (F).
641
+ Summarizing, we have the following Corollary, which is Theorem C(b) of the Introduction.
642
+ In the statement we denote
643
+ �V 0(τ) = {x ∈ A | H0(τ ⊗ Px) ∩ Im(edx) ̸= 0}
644
+ Corollary 3.2.4. Let F be a coherent sheaf on an abelian variety A. Assume that:
645
+ (a) the maps edx of (3.8) are injective for all x ∈ A;
646
+ (b) all sheaves τ appearing in the torsion filtration of the naive FMP transform T (F), and such
647
+ that �V 0(τ) is non empty, have reduced scheme-theoretic support.
648
+ Then F is generated by the set of minimal irreducible components of supports of all such sheaves τ.
649
+ Remark 3.2.5. In general, it is not known how to identify in function of F the various sheaves
650
+ τ appearing in the torsion filtration of the naive FMP transform T (F), let alone those such that
651
+ �V0(τ) in non empty. Not surprisingly, in the case of GV sheaves this can be done. Recalling the
652
+
653
+ 12
654
+ G.PARESCHI
655
+ definition and notation for cohomological support loci given in (1.7), it is well known that F is a
656
+ GV sheaf if and only if, for all i ≥ 0
657
+ codimPic0A V i(F) ≥ i
658
+ ([PP6, Corollary 3.10] or [PP5, Theorem 2.3]). If this is the case, the components of supports of
659
+ the torsion sheaves appearing in the torsion filtration of the sheaf T (F) are components W of the
660
+ loci V i(F) of the minimalcodimension, namely codimPic0A W = i (this follows from a result of Popa
661
+ and the author, see [P1, Theorem 1.10]). We refer also to [CLP, §9] where an even more precise
662
+ description of the torsion filtration is given in the case of coherent sheaves admitting a Chen-Jiang
663
+ decomposition, a special class of GV-sheaves which includes direct images of pluricanonical bundles
664
+ with respect to morphism to an abelian variety. See Remark 6.2.5 below for more on these sheaves.
665
+ 4. Generation and ampleness of naive FMP transforms and generalized Picard
666
+ bundles.
667
+ A known class of examples of ample vector bundles on abelian varieties is the one of (dual)
668
+ Picard bundles (see Subsection 1.4 of the Introduction). In the case where X is a smooth curve
669
+ naturally embedded in its Jacobian, it was classically known that the projectivization of the dual
670
+ of the Picard bundle of a line bundle of degree d ≥ 2g − 1 is the d-symmetric product of the
671
+ curve. Based on this observation, it follows that the dual of Picard bundles of curves are ample,
672
+ and, as a consequence, one gets the existence and connectedness theoremsn of Brill-Noether theory
673
+ ([ACGH, Chapter VII]). The ampleness of dual Picard bundles and some of its applications were
674
+ subsequently generalized to all smooth complex projective varieties by Lazarsfeld ([L, §6.3.C and
675
+ 7.2.C]). In this section we show that the FMP methods of the previous section quickly provide
676
+ (with a different argument) a vast generalization of such results.
677
+ 4.1. Naive FMP transforms of sheaves on abelian varieties. In order to give a quick idea
678
+ of the result, we start from a particular case already met in the previous section, namely naive
679
+ FMP transforms of coherent sheaves on abelian varieties. We keep the notation of Subsection 1.4,
680
+ especially on the set of subvarieties Z(F) (irreducible components of supports of coherent sheaves
681
+ appearing in the torsion filtration of F).
682
+ Proposition 4.1.1. Let F be a coherent sheaf on an abelian variety A such that all of its subsheaves
683
+ have reduced scheme-theoretic support. Then the naive FMP transform T (F) = RgΦA
684
+ P−1(F∨) is
685
+ generated by a subset of the set Z(F) (see Theorem D). In particular, T (F) is an ample sheaf on
686
+ Pic0A as soon as all subvarieties appearing in the set Z(F) span A.
687
+ As mentioned in the Introduction, this result, for torsion free coherent sheaves, is already
688
+ present in Schnell’s paper [Sch, Theorem 4.1]. The present argument is borrowed from his.
689
+ Proof. We use the notation on evaluation maps of (3.1) and (3.10). The arguments consists in
690
+ considering diagram (3.4) and let x (rather than α, vary.
691
+ Specifically, the generation of T (F)
692
+ means the surjectivity of the map
693
+ evA(α) :
694
+
695
+ x∈A
696
+ : H0(RgΦA
697
+ P−1(F∨) ⊗ Px) ⊗ (P −1
698
+ x )|α −→ RgΦA
699
+ P−1(F∨)|α
700
+ for all α ∈ Pic0A. By Proposition 3.1.1 (and its proof) the map
701
+ evα(A) : H0(F ⊗ Pα) −→
702
+
703
+ x∈A
704
+ (F ⊗ Pα)|x
705
+
706
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
707
+ 13
708
+ is the dual of a map factorizing trough evA(α). Therefore asserted surjectivity follows from the
709
+ injectivity of the map evα(A), which follows from Corollary 3.2.4 because we are assuming there
710
+ are no subsheaves with non reduced scheme-theoretic support. In fact, also the map
711
+ evα(V ) : H0(F ⊗ Pα) −→
712
+
713
+ x∈V
714
+ (F ⊗ Pα)|x
715
+ is injective, for all open subsets V of A meeting all irreducible components of the support of all
716
+ subsheaves of F. In fact it is enough to consider the subsheaves appearing in the torsion filtration
717
+ of F.
718
+
719
+ 4.2. Generalization to transforms from reduced schemes mapping to abelian varieties.
720
+ In this subsection we prove Theorem D of the Introduction, namely the generalization of Proposition
721
+ 4.1.1 to naive transforms from certain reduced schemes mapping to abelian varieties, rather than
722
+ from abelian varieties. Again, we keep the notation and setting introduced in Subsection 1.4.
723
+ Theorem 4.2.1. Let f : X → A be a reduced Cohen-Macaulay equidimensional (of dimension
724
+ d) projective scheme equipped with a morphism to an abelian variety. Let F be a coherent sheaf
725
+ on X such that all of its subsheaves have reduced scheme theoretic support. Then its naive FMP
726
+ transform T (F) = RdΦX
727
+ P−1
728
+ X (∆X(F)) is generated by a subset of the set f(Z(F)). In particular,
729
+ T (F) is ample sheaf on Pic0A as soon as, for each i, the image f(Zi) of the subvariety Zi ∈ Z(F)
730
+ spans A (e.g. this happens when f(X) spans A and F is a torsion free sheaf on X.)
731
+ Proof. The argument is similar to the one of Proposition 4.1.1 but needs to be adjusted because
732
+ the functor ΦX
733
+ P−1
734
+ X
735
+ is not anymore an equivalence, hence Proposition 3.1.1 does not hold anymore.
736
+ We still consider the linear map
737
+ H0(F ⊗ f ∗Pα) ⊗ H0(f ∗P −1
738
+ α
739
+ ⊗ k(x)) → H0(F ⊗ k(x))
740
+ Dualizing we get
741
+ HomD(X)(k(x), ∆X(F)[d]) = Extd(k(x), ∆X(F)) → Hom(H0(f ∗P −1
742
+ α ⊗k(x)), Hd(∆X(F)⊗f ∗P −1
743
+ α )).
744
+ (4.1)
745
+ We still have that ΦX
746
+ P−1
747
+ X (k(x)) = R0ΦX
748
+ P−1
749
+ X (k(x)) = P −1
750
+ f(x) and
751
+ H0(f ∗P −1
752
+ α
753
+ ⊗ k(x)) ∼= R0ΦP−1
754
+ X (k(x)) ⊗ k(α) = ΦP−1
755
+ X (k(x)) ⊗ k(α) = P −1
756
+ f(x) ⊗ k(α)
757
+ Therefore the target of the map (4.1) is still identified by the functor ΦP−1
758
+ X to the fibre
759
+ (RdΦP−1
760
+ X (∆X(F)) ⊗ f ∗Pf(x))|α
761
+ Even if the analog, in the present setting, of the first map in the chain of isomorphisms (3.7) is
762
+ not an isomorphism anymore, still it follows that the map (4.1) factorizes, via the functor ΦX
763
+ P−1
764
+ X ,
765
+ trough the evaluation map of global sections at the point α ∈ Pic0A of the naive FMP transform,
766
+ twisted by the line bundle Pf(x):
767
+ Extd(k(x), ∆X(F))
768
+
769
+ (4.1)
770
+ �❯
771
+
772
+
773
+
774
+
775
+
776
+
777
+
778
+
779
+
780
+
781
+
782
+
783
+
784
+
785
+
786
+
787
+
788
+
789
+
790
+ H0(RdΦP−1
791
+ X (∆X(F)) ⊗ f ∗Pf(x))
792
+ evx(α)
793
+
794
+ (RdΦP−1
795
+ X (∆X(F)) ⊗ f ∗Pf(x))|α
796
+ (4.2)
797
+ At this point the argument goes exactly as in Proposition 4.1.1.
798
+
799
+
800
+ 14
801
+ G.PARESCHI
802
+ Example 4.2.2. Note that in Theorem 4.2.1 and Proposition 4.1.1 we are not assuming the
803
+ vanishing condition (1.6), namely that Hi(X, F ⊗ f ∗Pα) = 0 for all α ∈ Pic0A and i > 0, which
804
+ implies that the naive FMP transform (or Picard sheaf) T (F) is a locally free sheaf on Pic0A. It
805
+ is worth to note that in fact there are many examples where such condition does not hold but still
806
+ T (F) is locally free. Therefore, even if one is interested only in ample vector bundles the above
807
+ results produce a wider class of examples.
808
+ Let us outline a simple way to produce such sheaves, similar to Raynaud’s construction of
809
+ stable vector bundles ”without theta divisor” on curves ([R]). The simplest example is as follows.
810
+ Let C be a smooth curve embedded in its Jacobian J(C) := A. For odd coprime positive integers
811
+ a, b let Wa,b be the semhomogenous vector bundles on a p.p.a.v., as J(C), considered by Mukai and
812
+ Oprea ([Mu1], Theorem 7.1 and Remark 7.3, [O]). Denoting µb : A → A the multiplication by b,
813
+ and L = OA(Θ), these are vector bundles on A such that
814
+ µ∗
815
+ aWa,b = (Lab)⊕ag.
816
+ (4.3)
817
+ We claim that if a and b are such that a
818
+ b ∈ (0, 1) then hi(F ⊗ Pα) is non-zero and constant for
819
+ α ∈ Pic0A for both for i = 0, 1. This can be shown as follows. By (4.3), we have that
820
+ hi((Wa,b)|C ⊗ Pα) = ag
821
+ a2g hi(a∗
822
+ A(OC ⊗ Pα) ⊗ OA(abΘ)).
823
+ for a general α ∈ Pic0A. This shows that, for i = 0, 1 and α general in Pic0A, by definition, the
824
+ rational number
825
+ 1
826
+ ag hi((Wa,b)|C ⊗Pα) equals the value of the cohomological rank functions hi
827
+ OC(xθ),
828
+ x = b
829
+ a (see [JP]). These functions have been computed in loc cit, p. 837, proof of Theorem 7.5.
830
+ Specifically, in the interval [0, 1], they are
831
+ h0
832
+ OC(xθ) = xg
833
+ and
834
+ h1
835
+ OC(xθ) = xg − g + 1 − xg.
836
+ (4.4)
837
+ If there was a non empty jump locus for the function α �→ hi((Wa,b)|C ⊗ Pα) (α ∈ Pic0A) then as
838
+ it is easy to see, this would cause a critical point of the functions hi
839
+ OC(xθ) (see §5, loc cit) in the
840
+ interval (0, 1) but (4.4) shows that there is none. Therefore the functions α �→ hi((Wa,b)|C ⊗ Pα)
841
+ are constant. It follows, in particular, that T ((Wa,b)|C) is a locally free sheaf on A.
842
+ Similar examples can be obtained starting from any subvariety X of a ppav and any coherent
843
+ sheaf G on X, considering the sheaves F = G ⊗Wa,b for b
844
+ a in a suitable range. Constructions of this
845
+ type can be performed on abelian varieties with arbitrary polarizations (not necessarily principal).
846
+ 5. Applications to Brill-Noether theory
847
+ 5.1. Singular curves equipped with a morphism to an abelian variety. The interest of
848
+ results as Theorem 4.2.1, besides providing examples of ample vector bundles, is in their appli-
849
+ cation to Brill-Noether theory via the nowdays classical results of Kempf, Kleiman-Laksov, and
850
+ Fulton-Lazarsfeld on non-emptyness and connectedness of degeneracy loci [ACGH, Chapter VII],
851
+ [L, §7.2.C]. Such applications mainly concern locally free sheaves on smooth curves. Via Theorem
852
+ D they can be generalized e.g. to the following setting: torsion free sheaves F on singular curves C
853
+ (connected reduced 1-dimensional Cohen-Macaulay projective schemes), equipped with a morphism
854
+ f : C → A to an abelian variety, such that the image of each component of spans the abelian variety
855
+ A.
856
+ In this sort of application we will mainly concerned with Brill-Noether loci
857
+ V 0,r
858
+ f
859
+ (X, F) = {α ∈ Pic0A | h0(X, F ⊗ f ∗Pα) ≥ r + 1}
860
+
861
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
862
+ 15
863
+ According to the previous notation, the locus V 0,0
864
+ f
865
+ (X, F) is simply denoted V 0
866
+ f (X, F). The loci
867
+ V 0,r
868
+ f
869
+ (X, F) can be realized as degeneracy loci of a map of locally free sheaves in the usual way,
870
+ namely considering the exact sequence
871
+ 0 → F → F(D) → F(D)|D → 0
872
+ where D is a Cartier divisor avoiding the singular points of X, such that D is of degree high
873
+ enough on all components of X so that Hi(X, F(D) ⊗ f ∗Pα) = 0 for all α ∈ Pic0A. It turns out
874
+ that ΦX
875
+ PX(F(D)) = R0ΦX
876
+ PX(F(D)) is a locally free sheaf on Pic0A (dual to the naive FMP transform
877
+ T (F)) whose fibre at α is identified to H0(X, F(D) ⊗ f ∗Pα). Therefore the locus V 0,r
878
+ f
879
+ (X, F) is the
880
+ k’th degeneracy locus of the map of vector bundles
881
+ ϕ : ΦX
882
+ P−1
883
+ X (F(D)) → ΦX
884
+ P−1
885
+ X (F(D)|D)
886
+ where k = χ(F(D))−(r+1). The target is a locally free sheaf on Pic0A of rank equal to � νi deg Di,
887
+ where (ν1, .., νh) is the multirank of F (the tuple of the ranks of F at the various components of
888
+ X) and deg Di is the degree of D at the various components of X. The expected dimension of the
889
+ locus V 0,r
890
+ f
891
+ (X, F) is
892
+ (r + 1)(
893
+
894
+ νi deg Di) − (χ(F(D)) − (r + 1))) = (r + 1)(r + 1 − χ(F))
895
+ By Theorem 4.2.1 the source of the map ϕ is negative. On the other hand it is well known that
896
+ the target is a homogeneous vector bundle, namely admitting a filtration whose quotients are line
897
+ bundles parametrized by Pic0(Pic0A)) = A. Therefore, by the Theorem of Fulton-Lazarsfeld, we
898
+ have
899
+ Theorem 5.1.1. In the above setting, the locus V 0,r
900
+ f
901
+ (X, F) is nonempty (resp. connected) as soon
902
+ as
903
+ (r + 1)(r + 1 − χ(F)) ≤ dim A
904
+ (resp. (r + 1)(r + 1 − χ(F)) < dim A).
905
+ In particular V 0
906
+ f (F) is non empty as soon as
907
+ χ(F) ≥ − dim A + 1.
908
+ This statement recovers (for smooth curves embedded in their Jacobians) the classical exis-
909
+ tence and connectedness theorems of Brill-Noether theory, as well as Ghione’s theorem ([L, Example
910
+ 7.2.13]). As a consequence, we have the following version of the theorem of Segre-Nagata. To sim-
911
+ plfy, assume furthermore that, in the setting of Theorem 4.2.1, the torsion free sheaf F has uniform
912
+ rank ν (i.e. ν1 = ... = νh = ν). Let us define
913
+ deg F := χ(F) − ν(1 − pa(X))
914
+ Corollary 5.1.2. The sheaf F has an invertible subsheaf B of degree
915
+ deg B ≥ 1 − pa(X) + deg F + dim A − 1
916
+ ν
917
+ .
918
+ Proof. By the last inequality of Theorem 5.1.1 it follows that the locus V 0
919
+ f (F ⊗ B−1) is non-empty
920
+ as soon as χ(F) − ν deg B ≥ − dim A + 1.
921
+
922
+ Similarly, one can extend to the setting of Theorem 4.2.1 the result of [L, Example 7.2.15].
923
+
924
+ 16
925
+ G.PARESCHI
926
+ 5.2. A Brill-Noether inequality. Let F be a coherent sheaf on an abelian variety A. Recalling
927
+ the notation of (1.7) and (1.8) about the cohomological support loci of F, assume that the loci
928
+ V >0(F) is strictly contained in Pic0A. Then χ(F) ≥ 0 (since it is equal to the generic value of
929
+ h0(F ⊗Pα)). It turns out that this easy inequality can be improved if the cohomological loci V i(F),
930
+ i > 0, are suitably small. For example, the ”Castelnuovo - De Franchis inequality” of Popa and
931
+ the author ([PP4, Theorem 3.3]) states that, if F is a GV sheaf and V >0(F) is non empty, then
932
+ χ(F) ≥ gvα(F) := mini>0codimα{V i(F) − i | i > 0}
933
+ (5.1)
934
+ for all α ∈ Pic0A, where codimαV i(F) denotes the codimension of V i(F) in Pic0A, in the neigh-
935
+ borhood of a given point α ∈ Pic0A.
936
+ The result stated as Theorem E in the Introduction complements the inequality (5.1), dealing
937
+ with the case where the locus V >0(F) is empty. The statement asserts that if this is the case, and
938
+ the coherent sheaf F is torsion free, or, more generally, all of its subsheaves have all reduced support,
939
+ and each irreducible component of the support spans A, then
940
+ χ(F) ≥ hd(F) + 1.
941
+ (5.2)
942
+ Proof. (of Theorem E) By Theorem D the naive FMP transform of F, namely
943
+ T (F) = RgΦA
944
+ P−1(F∨)
945
+ is an ample sheaf on Pic0A. Moreover the hypothesis that V >0(F) = ∅ yields, by base change, that
946
+ T (F) is a locally free sheaf on Pic0A.
947
+ We claim that
948
+ Supp
949
+
950
+ Exti(F, OA)
951
+
952
+ ⊆ V i(T (F))
953
+ (5.3)
954
+ The assertion of Theorem E follows from the claim. Indeed, by Le Potier vanishing, V j(T (F)) = ∅
955
+ as soon as j ≥ rkT (F) = χ(F). Hence (5.3) yields that χ(F) > max {j | Extj(F, OA) ̸= 0}.
956
+ To prove (5.3), note that the hypothesis V >0(F) = ∅ yields trivially that RiΦA
957
+ P−1(F∨) = 0 for
958
+ i ̸= g, and therefore T (F) = ΦA
959
+ P−1(F∨)[g] (in other words F is a GV-sheaf (see (1.5)). Therefore,
960
+ since the inverse of the FMP equivalence ΦA
961
+ P−1 : D(A) → D(Pic0A) is the equivalence ΦPic0A
962
+ P
963
+ [g] :
964
+ D(Pic0A) → D(A), it follows that
965
+ ΦP(T (F)) = F∨ = RHom(F, OA)
966
+ hence
967
+ RiΦP(T (F)) = Exti(F, OA)
968
+ (see also Proposition 6.2.2 below for a related statement). This yields (5.3) since, by base change,
969
+ SuppRiΦP(T (F)) ⊆ V i(T (F)).
970
+
971
+ Remark 5.2.1. Interestingly, the main point of the proof of Theorem E is Le Potier vanishing
972
+ theorem, while the essential ingredient of the proof of inequality (5.1) is the syzygy theorem of
973
+ Evans-Griffith ([EG, Corollary 1.7]), which is in turn quite related to the theorem of Le Potier
974
+ (as shown by Ein, [E]). Therefore it seems possible that the inequalities (5.1) and (5.2) are both
975
+ manifestations of some more general phenomenon.
976
+ Theorem E was already implicitly used by the author (in a special case) in the proof of the
977
+ following result (conjectured in [DH, §6]).
978
+
979
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
980
+ 17
981
+ Corollary 5.2.2 ([P2] Theorem B(1)). Let A be a complex simple abelian variety and D an effective
982
+ Q-divisor on A such that (A, D) is a non klt pair. If L is a line bundle on A such that L − D is
983
+ nef and big then
984
+ χ(L) ≥ dim A + 1.
985
+ Proof. The hypothesis means that J (D), the multiplier ideal sheaf of D, is non trivial. By Nadel’s
986
+ vanishing V >0(J (D) ⊗ L) = ∅. Let Z be the zero-scheme of J(D). By Theorem E, χ(J (D) ⊗
987
+ L) ≥ codim Z, where codim Z (resp. dim Z) denotes the maximal codimension (resp. maximal
988
+ dimension) of a component of Z.
989
+ On the other hand, an inequality of Debarre-Hacon ([DH,
990
+ Lemma 5(e)]) states that, if A is simple, χ(J (D) ⊗ L) ≤ χ(L) − dim Z − 1. Combining the two
991
+ inequalities it follows that
992
+ χ(L) ≥ codim Z + dim Z + 1 ≥ dim A + 1 .
993
+
994
+ 6. GV sheaves
995
+ 6.1. Recap on GV and M-regular sheaves. We recall from (1.5) that a sheaf F on abelian
996
+ variety A is said to be GV if ΦP−1(F∨) is a sheaf in cohomological degree g, so that ΦP−1(F∨)[g]
997
+ coincides with the naive FMP transform T (F) = ΦP−1(F∨)[g]. Therefore for a GV sheaf F the
998
+ naive FMP transform will be simply referred to as the FMP transform of F.10 Moreover a M-regular
999
+ sheaf is a GV sheaf such that T (F) is torsion free.
1000
+ It is also worth to recall that to be GV (resp.
1001
+ M-regular) is equivalent to the follow-
1002
+ ing condition on the cohomological support loci of F (see (1.7)): codimPic0A V i(F) ≥ i (resp.
1003
+ codimPic0A V i(F) > i) for all i > 0 (see e.g. [PP5, Theorem 2.3, Proposition 2.8]).
1004
+ A result of Popa and the author states that a M-regular sheaf is CGG ((iii) of Subsection
1005
+ 1.1). This is a particular case of Corollary 3.2.4. Indeed if F is GV then the source and target of
1006
+ the map edx of (3.8) simply coincide, and the map is the identity. Moreover, if F is, in addition,
1007
+ M-regular, the FMP transform T (F) is torsion free and therefore all maps evx(U) of (3.10) are
1008
+ injective for all (non-empty) open subsets U of Pic0A and for all x ∈ A. It also follows that a
1009
+ M-regular sheaf is ample by the mentioned result of Debarre ((i) of the Introduction).
1010
+ The purpose of this section is to extend this analysis from M-regular to GV sheaves.
1011
+ 6.2. Generation of GV sheaves. The generation of GV sheaves follows in the same way (under
1012
+ the usual reducedness assumption) from Corollary 3.2.4. Therefore we have the following result,
1013
+ partly known by work of Popa and the author in [PP2, Theorem 4.2].
1014
+ Corollary 6.2.1. Let F be a GV sheaf on an abelian variety A. Assume that all subsheaves ap-
1015
+ pearing in the torsion filtration of the FMP transform T (F) have reduced scheme-theoretic support.
1016
+ Then F is generated by the set of minimal irreducible components of the supports of such sheaves.
1017
+ Alternatively, Corollary 6.2.1 follows from Theorem D (or Proposition 4.1.1) combined with
1018
+ the following inversion result
1019
+ 10In the literature of GV sheaves, including papers of the author, this is usually denoted �
1020
+ F∨. In this paper we
1021
+ changed notation because we have been considering also non-GV sheaves, where the naive FMP transform does not
1022
+ coincide with T (F) = ΦP−1(F∨)[g].
1023
+
1024
+ 18
1025
+ G.PARESCHI
1026
+ Proposition 6.2.2. If F is a GV sheaf then also TA(F) is a GV sheaf (on Pic0A) and
1027
+ TPic0A(TA(F)) = F.
1028
+ Note that, in the the statement above, we have denoted TA(F) = RgΦA
1029
+ P−1(F∨) and, for a coherent
1030
+ sheaf G on Pic0A, TPic0A(G) = RgΦPic0A
1031
+ P−1 (G∨). However in the sequel the ambient abelian variety
1032
+ will be omitted from the notation, unless this will be cause of confusion.
1033
+ Proof. By definition a sheaf F is a GV sheaf if TA(F) = ΦA
1034
+ P−1(F∨)[g]. Therefore, since the inverse
1035
+ of the FMP equivalence ΦA
1036
+ P−1 : D(A) → D(Pic0A) is the equivalence ΦPic0A
1037
+ P
1038
+ [g] : D(Pic0A) → D(A),
1039
+ it follows that
1040
+ ΦPic0A
1041
+ P
1042
+ (TA(F)) = F∨ = RHom(F, OA)
1043
+ Therefore, by Grothendieck duality ([Mu2, (3.8)]), ΦPic0A
1044
+ P−1 (TA(F)∨)[g] = F.
1045
+
1046
+ Example 6.2.3 (Unipotent vector bundles). Concerning the assumption of Corollary 6.2.1, its
1047
+ necessity is shown by the well known example of unipotent vector bundles on abelian varieties.
1048
+ These are, by definition, vector bundles F admitting a filtration whose successive quotients are
1049
+ trivial line bundles.
1050
+ Since a trivial bundle on an abelian variety is evidently a GV sheaf, any
1051
+ unipotent bundle is a GV sheaf. For such vector bundles H0(F ⊗ Pα) ̸= 0 if and only if α = ˆ0
1052
+ (the identity point of Pic0A). Therefore the only possible set of subvarieties generating F is {ˆ0},
1053
+ and this happens if and only if F is trivial, because otherwise H0(F) < rk F. In conclusion, any
1054
+ non-trivial unipotent vector bundle is GV but not generated. This is explained by the fact that
1055
+ the FMP transform T (F) is supported at zero, but the scheme theoretic support is non-reduced,
1056
+ unless the sheaf F is trivial ([Mu1, Lemma 4.8]).
1057
+ Other examples obtained from this one are
1058
+ e.g. homogeneous vector bundles (direct sums of unipotent vector bundles twisted by line bundles
1059
+ parametrized by Pic0A), and, on a product of abelian varieties A = B × C, coherent sheaves of the
1060
+ form p∗
1061
+ BG ⊠ p∗
1062
+ CU, where G is GV on B and U is homogeneous on C.
1063
+ Example 6.2.4 (Any subset of subvarieties can be realized as a irredundant generating subset).
1064
+ Corollary 6.2.1, combined with Proposition 6.2.2, can be used to construct examples showing that
1065
+ any subset of subvarieties is the irredundant generating set of some (locally free) sheaf. Indeed let A
1066
+ be an abelian variety and let G be any coherent sheaf on Pic0A, such that all of its subsheaves have
1067
+ reduced scheme-theoretic support. Twisting with a sufficiently high power of an ample line bundle
1068
+ L on Pic0A we have that V >0(G⊗L) = ∅. Therefore, ΦPic0A
1069
+ P−1 ((G⊗L)∨) = RgΦPic0A
1070
+ P−1 ((G⊗L)∨)[−g] =
1071
+ TA(G ⊗ L)[−g]. Let
1072
+ F := TA(G ⊗ L)
1073
+ From Proposition 6.2.2 it follows that F is a (locally free) GV sheaf and TPic0A(F) = G ⊗ L.
1074
+ Therefore the assertion follows from Corollary 6.2.1, because it can be easily shown, with the help
1075
+ of Corollary 3.2.4, that the generating set of minimal irreducible components of support of the
1076
+ sheaves appearing in the torsion filtration of G ⊗ L, i.e. of G, is actually irredundant, and G is
1077
+ arbitrary.
1078
+ For the next example illustrating Corollary 6.2.1, it is useful to recall the compatibility
1079
+ property of the FMP functor with respect to homomorphisms of abelian varieties. Let pB : A → B
1080
+ be a surjective homomorphism and iB := b∗ : Pic0B → Pic0A the dual inclusion. Then
1081
+ ΦA
1082
+ P−1
1083
+ A ◦ p∗
1084
+ B = iB∗ ◦ p∗ΦB
1085
+ P−1
1086
+ B
1087
+ ΦPic0A
1088
+ P−1
1089
+ A
1090
+ ◦ iB∗ = p∗
1091
+ B ◦ p∗ΦPic0B
1092
+ P−1
1093
+ B
1094
+ .
1095
+ (6.1)
1096
+ (This can be deduced e.g. from [Sch, Proposition 1.1]).
1097
+
1098
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
1099
+ 19
1100
+ Example 6.2.5 (Sheaves admitting a Chen-Jiang decomposition). A significant class of GV sheaves
1101
+ where the assumption of Corollary 6.2.1(a) is always verified is given by coherent sheaves having
1102
+ the Chen-Jiang decomposition property ([LPS, §B.3] and references therein). They were already
1103
+ mentioned in Remark 3.2.5. By definition, these sheaves admit a (essentially canonical) decompo-
1104
+ sition
1105
+ F =
1106
+
1107
+ i
1108
+ (p∗
1109
+ BiGi) ⊗ Pαi
1110
+ (6.2)
1111
+ where pBi : A → Bi are surjective homomorphisms, with connected kernel, of abelian varieties, Gi
1112
+ are M-regular sheaves (hence ample) on Bi, and αi ∈ Pic0A are torsion points. It follows that such
1113
+ sheaves are generated and semiample. This class is important because it contains higher direct
1114
+ images of canonical sheaves of smooth complex projective varieties mapping to abelian varieties
1115
+ ([PPS, Theorem A]), as well as direct images of pluricanonical sheaves ([LPS, Theorem C]), and
1116
+ direct images of log-pluricanonical sheaves for klt pairs ([M1, Theorem 1.3]).
1117
+ It follows from (6.1) that each summand in (6.2) is a GV sheaf, and its FMP transform is
1118
+ T ((p∗
1119
+ BiGi) ⊗ Pαi) = t∗
1120
+ −αi(iB∗TB(Gi)).
1121
+ In particular the various FMP transforms of the summands are scheme-theoretically supported
1122
+ on the translated abelian subvarieties Pic0Bi − αi. Therefore such sheaves, as well as F, satisfy
1123
+ the assumption of Corollary 6.2.1. (In fact, in the proof of the above quoted results about direct
1124
+ images of pluricanonical sheaves, this is an essential point, whose proof revolves around the minimal
1125
+ extension property of a positively curves metrics on such direct images, whose existence was shown
1126
+ by Cao-Paun [CP]. See also the survey [HPS] on this matters.)
1127
+ Therefore, as noted in [CLP, §9], the torsion filtration of the FMP transform:
1128
+ T0 ⊂ · · · ⊂ Td ⊂ T (F),
1129
+ where d = dim T (F), is given by
1130
+ Tk =
1131
+
1132
+ dim Bi≤k
1133
+ t∗
1134
+ −αi(iB∗TB(Gi)).
1135
+ (Note that if d = dim A, among the summands of (6.2) there is one with Bi = A, hence Gi is already
1136
+ M-regular in A. Its transform is the torsion free sheaf T (F)/Tg−1.)
1137
+ 6.3. Structure of GV sheaves. In the previous example, applying the inverse FMP transform
1138
+ ΦPic0A
1139
+ P
1140
+ : D(Pic0A) → D(A) to the torsion filtration of T (F) one gets back the cofiltration
1141
+ F = Fd ։ · · · ։ F0 → 0 ,
1142
+ (6.3)
1143
+ where Fk = �
1144
+ dim Bi≤k(p∗
1145
+ BiGi) ⊗ Pαi. (In particular, if d = dim A(= g) the kernel of F ։ Fg−1 is
1146
+ M-regular hence ample.) This is a sort of weak version of the decomposition (6.2)
1147
+ The following results says that, under the reducedness assumption of Corollary 6.2.1, the
1148
+ structure of GV sheaves can be described by a weak analog of (6.3).
1149
+ Theorem 6.3.1. Let F be a GV sheaf on an abelian variety A, satisfying the assumption of
1150
+ Corollary 6.2.1. Then F has a cofiltration
1151
+ F
1152
+ ϕ0
1153
+ ։ F1
1154
+ ϕ1
1155
+ ։ · · ·
1156
+ ϕs−1
1157
+ ։ Fs
1158
+ ϕs
1159
+ → 0
1160
+ such that: (a) The kernel of the surjection ϕ0 : F
1161
+ ϕ0
1162
+ ։ F1 is either zero or ample, the latter case
1163
+ holding if and only if dim T (F) = dim A.
1164
+
1165
+ 20
1166
+ G.PARESCHI
1167
+ (b) For each i ≥ 1, the sheaf ker ϕi has, in turn, a cofiltration
1168
+ ker ϕi
1169
+ ϕ0i
1170
+ ։ F1i
1171
+ ϕ1i
1172
+ ։ · · ·
1173
+ ϕs−1 i
1174
+ ։
1175
+ Fsi i
1176
+ ϕsi i
1177
+ → 0
1178
+ such that for all (j, i), there is a surjection fj i : p∗
1179
+ BiFj i ⊗ Pαj i ։ ker ϕj i, where: pBj i : A → Bj i
1180
+ is a surjective homomorphism of abelian varieties with connected kernel, Fj i is an ample coherent
1181
+ sheaf on Bj i and αj i ∈ Pic0A
1182
+ Proof. We begin with the general, and well known to the experts (see e.g. [Sch, Propositions 1.1,
1183
+ 1.2]),
1184
+ Lemma 6.3.2. Let p : A → B be a surjective homomorphism of abelian varieties, with connected
1185
+ kernel. i : Pic0B ֒→ A the dual inclusion, τ a coherent sheaf on Pic0B and α ∈ Pic0A. Then
1186
+ TPic0A(t∗
1187
+ −αi∗τ) = p∗TPic0B(τ) ⊗ Pα here tα denotes the translation by α on Pic0A).
1188
+ Proof.
1189
+ Recalling that, on an abelian variety C, the functor TC((·)) is defined as Rdim CΦP−1((·)∨)
1190
+ (see (1.3) for the dualizing functor), the assertion of the Lemma follows from: (i) the second identity
1191
+ in (6.1), (ii) the fact that RHomPic0A(i∗τ, OPic0A) = i∗RHomPic0B(τ, OB)[dim A − dim B], and,
1192
+ (iii) the well known identity ΦPic0A
1193
+ P−1 (t∗
1194
+ −α(·)) = ΦPic0A
1195
+ P−1 (·) ⊗ Pα. This proves Lemma 6.3.2.
1196
+ Going back to the Theorem, the initial step of the cofiltration is defined as follows. Let τ be
1197
+ the torsion part of TA(F). We apply the right exact contravariant functor TPic0A(·) to the exact
1198
+ sequence 0 → τ → TA(F) → TA(F)/τ → 0. By Proposition 6.2.2 we get the exact sequence
1199
+ TPic0A(TA(F)/τ) −→ F
1200
+ ϕ0
1201
+ −→ TPic0A(τ) → 0
1202
+ We define F1 := TPic0A(τ).
1203
+ Since the sheaf TA(F)/τ is either zero or torsion free, the sheaf
1204
+ TPic0A(TA(F)/τ) is either zero or ample (Proposition 4.1.1). Therefore the same is true for ker ϕ0.
1205
+ Hence we have accomplished the first step of the cofiltration. Next, let d = dim τ and 0 → τd−1 →
1206
+ τ → τ/τd−1 → 0 the first step of the torsion filtration of τ. Applying the functor TPic0A(·) we get
1207
+ the exact sequence
1208
+ TPic0A(τ/τd−1) → F1
1209
+ ϕ1
1210
+ → F2 := TPic0A(τd−1) → 0
1211
+ We need to prove condition (b) on ker ϕ1. The sheaf σ := τ/τd−1 has pure dimension d. Let us
1212
+ pick an irreducible component V of the support of σ. We apply the functor TPic0A(·) to the exact
1213
+ sequence 0 → K → σ → σ|V → 0. We get
1214
+ TPic0A(σ|V ) → TPic0A(σ) → TPic0A(K) → 0
1215
+ By Proposition 4.1.1 if V spans Pic0A then the sheaf TPic0A(σ|V ) is ample.
1216
+ Otherwise V is a
1217
+ subvariety of a translate of an abelian subvariety C of Pic0A. In this case, by Lemma 6.3.2, the
1218
+ sheaf TPic0A(σ|V ) is of the form p∗TPic0B(G)⊗Pα, where B is the dual of C, and the sheaf TPic0B(G)
1219
+ is ample on B again by Proposition 4.1.1. This settles the first step of the cofiltration on ker ϕ1.
1220
+ Next, the sheaf K is either zero or of pure dimension d. Therefore we can apply the same
1221
+ procedure to the sheaf K, and so on. In this way, after a finite number of steps the cofiltration on
1222
+ ker ϕ1 is settled. We now proceed inductively applying the same procedure to the sheaves τk for
1223
+ k ≤ d − 1.
1224
+
1225
+ References
1226
+ [ACGH] Arbarello, E., Cornalba, M., Griffiths, P.A., Harris, J. Geometry of algebraic curves, vol. I. Grundlehren der
1227
+ Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], vol. 267. Springer, New
1228
+ York (1985)
1229
+
1230
+ GENERATION AND AMPLENESS OF COHERENT SHEAVES ON ABELIAN VARIETIES
1231
+ 21
1232
+ [BLNP] Barja, M.A., Lahoz, M., Naranjo, J.C., Pareschi, G., On the bicanonical map of irregular varieties, J.
1233
+ Algebraic Geom. 21 (2012), 445–471
1234
+ [CP]
1235
+ Cao, J., P˘aun, M.: Kodaira dimension of algebraic fiber spaces over abelian varieties. Invent. Math. 207
1236
+ (2017), 345–387
1237
+ [CLP] Caucci, F., Lombardi, L., Pareschi, G., Derived invariance of the Albanese relative canonical ring, preprint
1238
+ arXiv:2206.10739v3 [math.AG]
1239
+ [CCCJ] Chen, J.-J., Chen, J. A., Chen, M., Jiang, Z., On quint-canonical birationality of irregular threefolds, Proc.
1240
+ Lond. Math. Soc. 122 (2021) 234–258.
1241
+ [CJ]
1242
+ Chen, J. A., Jiang, Z., Positivity in varieties of maximal Albanese dimension, J. Reine Angew. Math. 736
1243
+ (2018), 225-253
1244
+ [D]
1245
+ Debarre, O., On coverings of simple abelian varieties, Bull. Soc. Math. Fr. 134 (2006) 253–260
1246
+ [DH]
1247
+ Debarre, O., Hacon C., Singularities of divisors of low degree on abelian varieties, Manuscripta Math. 122
1248
+ (2007), 217–228
1249
+ [E]
1250
+ Ein, L., An analogue of Max Noether’s theorem, Duke Math. J. 52 (1985), 689–706
1251
+ [EG]
1252
+ Evans, E. G., Griffith P., The syzygy problem, Ann. of Math. 114 (1981), 323–333
1253
+ [HPS] Hacon, Ch., Popa, M., Schnell, Ch.: Algebraic fiber spaces over abelian varieties: around a recent theorem
1254
+ by Cao and P˘aun. In: Local and Global Methods in Algebraic Geometry, Contemp. Math. 712, Amer. Math.
1255
+ Soc., (2018), 143–195
1256
+ [HuLe] Huybrechts D., Lehn, C., The geometry of moduli spaces of sheaves, second edition, Cambridge University
1257
+ Press (2010)
1258
+ [K]
1259
+ Kubota, K., Ample sheaves, J. Fac. Sci. Univ. Tokyo Sect. I A Math. 17 (1970), 421–430
1260
+ [I]
1261
+ Ito, A., M-regularity of Q-twisted sheaves and its application to linear systems on abelian varieties, Trans.
1262
+ Amer. Math. Soc. 375 (2022), 6653–6673
1263
+ [J]
1264
+ Jiang, Z., On Severi type inequalities, Math. Ann. 379 (2021), 133–158
1265
+ [JLT]
1266
+ Jiang, Z., Lahoz, M., Tirabassi, S, On the Iitaka fibration of varieties of maximal Albanese dimension, Int.
1267
+ Math. Res. Not. 13 (2013), 2984–3005
1268
+ [JP]
1269
+ Jiang Z., Pareschi G., Cohomological rank functions on abelian varieties, Annales de L’Ecole Normale Su-
1270
+ perieure 53 (2020), 815 - 846
1271
+ [JS]
1272
+ Jiang, Z., Sun, H., Cohomological support loci of varieties of Albanese fiber dimension one, Trans. Amer.
1273
+ Math. Soc. 367 (2015), 103–119
1274
+ [L]
1275
+ Lazarsfeld, R., Positivity in algebraic geometry. II. Positivity for vector bundles, and multiplier ideals. Ergeb-
1276
+ nisse der Mathematik und ihrer Grenzgebiete. 3. Folge [Results in Mathematics and Related Areas. 3rd Series],
1277
+ 49. Springer-Verlag, Berlin, 2004.
1278
+ [LY]
1279
+ Lin, X., Yu Ch., Indecomposabilty of the bounded derived categories of Brill-Noether varieties, preprint
1280
+ arXiv:2111.10997v1 [math.AG]
1281
+ [LPS]
1282
+ Lombardi L., Popa M., Schnell Ch., Pushforwards of pluricanonical bundles under morphisms to abelian
1283
+ varieties, J. Eur. Math. Soc. 22 (2020), 2511–2532
1284
+ [M1]
1285
+ Meng, F., Pushforwards of klt pairs under morphisms to abelian varieties. Math. Ann. 380 (2021), 1655–1685
1286
+ [M2]
1287
+ Meng, F., Estimates on the Kodaira dimension for fibrations over abelian varieties, preprint, arXiv:2207.08359
1288
+ [arXiv]
1289
+ [MP]
1290
+ Meng, F., Popa, M., Kodaira dimension of fibrations over abelian varieties, arXiv:2111.14165 [arXiv]
1291
+ [Mu1] Mukai, S., Semi-homogeneous vector bundles on abelian varieties J. Math. Kyoto Univ. 18 (1978), 239–272
1292
+ [Mu2] Mukai, S., Duality between D(X) and D( ˆX) with its application to Picard sheaves, Nagoya Math. J. 81 (1981),
1293
+ 153–175.
1294
+ [O]
1295
+ Oprea, D., The Verlinde bundles and the semihomogeneous Wirtinger duality, J. Reine Angew. Math. 654
1296
+ (2011), 181–217
1297
+ [P1]
1298
+ Pareschi, G., Basic results on irregular varieties via Fourier-Mukai methods, in Current Developments in
1299
+ Algebraic Geometry, Math. Sci. Res. Inst. Publ., vol. 59, Cambridge Univ. Press (2012), 379–403
1300
+ [P2]
1301
+ Pareschi, G., Singularities of divisors on simple abelian varieties, IMRN 21 (2021) 16724–16733
1302
+ [PP1]
1303
+ Pareschi, G., Popa, M., Regularity on abelian vareties, I, Journal of the American Mathematical Society 16
1304
+ (2002), 285–302
1305
+ [PP2]
1306
+ Pareschi , G., Popa, M., Regularity on abelian varieties, II: basic results on linear series and defining equations,
1307
+ Journal of Algebraic Geometry 13 (2004) 167–193
1308
+ [PP3]
1309
+ Pareschi G., Popa, M., M-regularity and the Fourier-Mukai transform, Pure and Applied Mathematics Quar-
1310
+ terly (2008), 587–611
1311
+ [PP4]
1312
+ Pareschi, G., Popa, M., Strong generic vanishing and a higher-dimensional Castelnuovo–de Franchis inequality.
1313
+ Duke Math. J. 150 (2009) 269–285
1314
+
1315
+ 22
1316
+ G.PARESCHI
1317
+ [PP5]
1318
+ Pareschi G., Popa M., Regularity on abelian varieties III: relationship with Generic Vanishing and applications,
1319
+ in Grassmannians, moduli spaces and vector bundles, Clay Math. Proc., 14, Amer. Math. Soc., (2011), 141–
1320
+ 167,
1321
+ [PP6]
1322
+ Pareschi G., Popa, M., GV-sheaves, Fourier-Mukai transform, and Generic Vanishing, American Journal of
1323
+ Mathematics, 133 (2011) 235–271
1324
+ [PPS] Pareschi G., Popa M., Schnell, Ch., Hodge modules on complex tori and generic vanishing for compact K¨ahler
1325
+ manifolds, Geom. Topol. 21 (2017), 2419–2460
1326
+ [R]
1327
+ M. Raynaud, Sections des fibr´es vectoriels sur une courbe, Bull. Soc. Math. France 110 (1982), 103–125
1328
+ [Sch]
1329
+ Schnell Ch., The Fourier-Mukai transform made easy, Pure and Applied Mathematics Quarterly Volume 18,
1330
+ Number 4, 1749–1770, 2022
1331
+ Dipartimento di Matematica, Universit`a di Roma Tor Vergata, Italy
1332
+ Email address: pareschi@mat.uniroma2.it
1333
+
AtAyT4oBgHgl3EQf3_qJ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CdAyT4oBgHgl3EQf4fpA/content/tmp_files/2301.00786v1.pdf.txt ADDED
@@ -0,0 +1,904 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ Sparse Array Design for Dual-Function
3
+ Radar-Communications System
4
+ Huiping Huang, Student Member, IEEE, Linlong Wu, Member, IEEE, Bhavani Shankar, Senior Member, IEEE,
5
+ and Abdelhak M. Zoubir, Fellow, IEEE
6
+ Abstract—The problem of sparse array design for dual-
7
+ function radar-communications is investigated. Our goal is to
8
+ design a sparse array which can simultaneously shape desired
9
+ beam responses and serve multiple downlink users with the
10
+ required signal-to-interference-plus-noise ratio levels. Besides, we
11
+ also take into account the limitation of the radiated power by
12
+ each antenna. The problem is formulated as a quadratically
13
+ constrained quadratic program with a joint-sparsity-promoting
14
+ regularization, which is NP-hard. The resulting problem is solved
15
+ by the consensus alternating direction method of multipliers,
16
+ which enjoys parallel implementation. Numerical simulations
17
+ exhibit the effectiveness and superiority of the proposed method
18
+ which leads to a more power-efficient solution.
19
+ Index Terms—Alternating direction method of multipliers,
20
+ dual-funtion radar-communications, sparse array design
21
+ I. INTRODUCTION
22
+ D
23
+ UAL-function radar-communications (DFRC) systems
24
+ have been recently widely investigated [1]–[4]. They find
25
+ applications in a wide range of areas, including vehicular net-
26
+ works, indoor positioning and covert communications [5], [6].
27
+ To achieve accurate sensing and high throughput, the DFRC
28
+ systems probably requires a large number of antennas [7]–
29
+ [10]. In practice, a base station usually equips with less radio-
30
+ frequency (RF) chains than antennas given the hardware cost
31
+ consideration. For such a configuration, it raises a question
32
+ on how to adaptively switch the available RF chains to the
33
+ corresponding subset of antennas [11]–[13], which can be
34
+ interpreted as sparse array design.
35
+ In this work, we consider the sparse array design for the
36
+ DFRC system. Similar problems have been studied in [14]–
37
+ [19]. The authors in [14] derived a Cram´er-Rao bound for the
38
+ cooperative radar-communications system, where they focused
39
+ on target parameter estimation. The work [15] developed an
40
+ antenna selection strategy by using a learning approach. This
41
+ method requires a training process, which might be unavailable
42
+ in some practical applications. The authors in [16] introduced a
43
+ realistic waveform constraint in the DFRC system, in order to
44
+ improve the power efficiency. A surrogate subproblem instead
45
+ of the original problem was solved, which might lead to a
46
+ highly suboptimal solution. In [17] and [18], several types of
47
+ DFRC systems were proposed which implement simultaneous
48
+ beamformers associated with single and different sparse arrays
49
+ with shared aperture. However, these two works consider a
50
+ single-user case, and the corresponding methods cannot be
51
+ The work of H. Huang is supported by the Graduate School CE within the
52
+ Centre for Computational Engineering at Technische Universit¨at Darmstadt.
53
+ H. Huang and A. M. Zoubir are with Technische Universit¨at Darmstadt,
54
+ Darmstadt, Germany (e-mail: {h.huang; zoubir}@spg.tu-darmstadt.de).
55
+ L. Wu and B. Shankar are with University of Luxembourg, Luxembourg
56
+ City, Luxembourg (e-mail: {linlong.wu; Bhavani.Shankar}@uni.lu).
57
+ applicable to the case of multi-users. A weighted ℓ1,q-norm
58
+ optimization based approach was developed in [19]. Note that
59
+ all the problems considered in [17]–[19] are convex and were
60
+ solved by the existing toolbox such as CVX.
61
+ Unlike in previous works, we propose a novel system model
62
+ for DFRC systems, and formulate the corresponding sparse
63
+ array design problem as a quadratically constrained quadratic
64
+ program (QCQP) regularized by a joint-sparsity-promoting
65
+ term. Besides the control on illumination beampattern and
66
+ communication signal-to-interference-plus-noise ratio (SINR),
67
+ we also take into account the limitation of the radiated power
68
+ by each antenna. We propose an algorithm based on the con-
69
+ sensus alternating direction method of multipliers (ADMM)
70
+ to solve the resulting problem. Note that at each ADMM
71
+ iteration, the primary variable has a closed-form solution, and
72
+ the auxiliary variables can be solved efficiently in a parallel
73
+ manner. Simulation results show its superior performance
74
+ compared to other examined methods.
75
+ The remainder of the paper is organized as follows. The
76
+ system model is established in Section II. The proposed
77
+ algorithm is presented in Section III. Simulation results are
78
+ shown in Section IV, while Section V concludes the paper.
79
+ Notations: Throughout this paper, bold-faced lower-case
80
+ (upper-case) letters denote vectors (matrices). Superscripts ·T,
81
+ ·H, ·∗, ·−1 denote transpose, Hermitian transpose, conjugate,
82
+ and inverse, respectively. E{·} denotes the expectation opera-
83
+ tor. | · | and ∠· are the modulus and phase, respectively, both
84
+ in an element-wise manner. C and R are the sets of complex
85
+ and real numbers, respectively, and ȷ = √−1. ∥·∥0, ∥·∥1, and
86
+ ∥·∥2 are ℓ0-quasi-norm, ℓ1-norm, and ℓ2-norm, respectively. ⊗
87
+ denotes the Kronecker product. ⊘ is the element-wise division
88
+ operator. IN and OM×N are the N × N identity matrix and
89
+ M ×N zero matrix, respectively. 1 and 0 are the all-ones and
90
+ all-zeros vector of appropriate size, respectively.
91
+ II. SYSTEM MODEL AND PROBLEM FORMULATION
92
+ We consider a DFRC system, as indicated in Fig. 1. The
93
+ transmitter, consisting of N antennas, emits M signals, each
94
+ to a single user. The weight vector wm ∈ CN is designed to
95
+ transfer the data symbol, sm(t), to user m, ∀m = 1, 2, · · ·, M.
96
+ All the M transmitted signals are also received by a target.
97
+ The total transmitted signal can then be formulated as
98
+ x(t) = [w1, w2, · · ·, wM]
99
+
100
+ ����
101
+ s1(t)
102
+ s2(t)
103
+ ...
104
+ sM(t)
105
+
106
+ ���� ,
107
+ (1)
108
+ arXiv:2301.00786v1 [eess.SY] 2 Jan 2023
109
+
110
+ 2
111
+
112
+ 1
113
+ 2
114
+ N
115
+ User 1
116
+ User M
117
+ Target
118
+ w1s1(t)
119
+ wMsM(t)
120
+
121
+ x(t) =
122
+ M
123
+
124
+ m=1
125
+ wmsm(t)
126
+
127
+ Fig. 1: Illustration of a DFRC system.
128
+ where t is the time index. We assume that the data symbols,
129
+ sm(t) ∀m = 1, 2, · · ·, M, are mutually uncorrelated, and each
130
+ sm(t) is zero-mean, spatially white with unit variance, i.e.,
131
+ E{|sm(t)|2} = 1, ∀m=1, 2, · · ·, M,
132
+ (2a)
133
+ E{|si(t)s∗
134
+ j(t)|} = 0, ∀i, j =1, 2, · · ·, M, and i̸=j.
135
+ (2b)
136
+ For the radar system, we expect that the response within
137
+ some desired angular region, say B, is not less than a preset
138
+ threshold, while the response within ¯B is not higher than a
139
+ small threshold. Mathematically,
140
+ E
141
+
142
+ xH(t)a(θi)aH(θi)x(t)
143
+
144
+ ≥ ϵp, ∀θi ∈ B,
145
+ (3a)
146
+ E
147
+
148
+ xH(t)a(θj)aH(θj)x(t)
149
+
150
+ ≤ ϵs, ∀θj ∈ ¯B,
151
+ (3b)
152
+ where a(θ) denotes the steering vector of θ, ϵp and ϵs are two
153
+ preset thresholds corresponding to the mainlobe and sidelobe,
154
+ respectively. Substituting (1) and (2) into (3), we have
155
+ M
156
+
157
+ m=1
158
+ wH
159
+ ma(θi)aH(θi)wm ≥ ϵp, ∀θi ∈ B,
160
+ (4a)
161
+ M
162
+
163
+ m=1
164
+ wH
165
+ ma(θj)aH(θj)wm ≤ ϵs, ∀θj ∈ ¯B.
166
+ (4b)
167
+ For the downlink communication systems, the received data
168
+ by the m-th user is given as
169
+ ym(t) = hH
170
+ mwmsm(t)
171
+
172
+ ��
173
+
174
+ communication signal
175
+ +
176
+ M
177
+
178
+ j=1,j̸=m
179
+ hH
180
+ mwjsj(t)
181
+
182
+ ��
183
+
184
+ interference signals
185
+ + nm(t)
186
+ � �� �
187
+ noise
188
+ , (5)
189
+ where nm(t) is the additive white Gaussian noise with mean
190
+ zero and known variance σ2
191
+ m, ∀m = 1, 2, · · ·, M. Besides,
192
+ hm ∈ CN denotes the channel state information (CSI) vector,
193
+ which models the propagation loss and phase shift of the
194
+ frequency-flat quasi-static channel from the transmitter to the
195
+ m-th user. The CSI, {hm}m, is assumed to be perfectly
196
+ available at the transmitter. The maximum power radiated by
197
+ each antenna n is given by Pn. Therefore, we have [7]
198
+ M
199
+
200
+ m=1
201
+ wH
202
+ mEnwm ≤ Pn, ∀n = 1, 2, · · ·, N,
203
+ (6)
204
+ where En is the N×N all-zero matrix except the n-th diagonal
205
+ entry being 1. The received SINR of user m is defined below,
206
+ and a certain minimum SINR needs to be guaranteed, i.e.,
207
+ SINRm ≜
208
+ ��hH
209
+ mwm
210
+ ��2
211
+
212
+ j̸=m |hH
213
+ mwj|2+σ2m
214
+ ≥γm, ∀m = 1, · · ·, M, (7)
215
+ where �
216
+ j̸=m is short notation for �M
217
+ j=1,j̸=m.
218
+ Now we consider the scenario where only K ≤ N RF
219
+ chains are available, and thus only K antennas can be simul-
220
+ taneously utilized in the DFRC system. Therefore, wm, ∀m,
221
+ are sparse, and moreover, they share the same sparsity pattern.
222
+ To fulfill this requirement, we need:
223
+ ∥�w∥0 ≤ K,
224
+ (8)
225
+ where �w ≜ [ �w1, �w2, · · ·, �wN]T with its component defined as
226
+ �wn ≜ ∥[w1(n), w2(n), · · ·, wM(n)]∥2 ∀n = 1, 2, · · · , N, and
227
+ wm(n) being the n-th entry of vector wm, ∀m = 1, 2, · · ·, M.
228
+ The quality of service (QoS) problem aims at minimizing
229
+ the total transmit power (TxPower), with several constraints
230
+ described above. To this end, the QoS problem is given as
231
+ min
232
+ {wm} TxPower ≜
233
+ M
234
+
235
+ m=1
236
+ ∥wm∥2
237
+ 2
238
+ (9a)
239
+ s.t.
240
+ (4), (6), (7), and (8).
241
+ (9b)
242
+ By replacing the non-convex ℓ0-quasi-norm in (8) with the ℓ1-
243
+ norm, and incorporating it into Problem (9) as a regularization
244
+ term, we have
245
+ min
246
+ {wm}
247
+ M
248
+
249
+ m=1
250
+ ∥wm∥2
251
+ 2 + η∥�w∥1
252
+ s.t. (4), (6), and (7),
253
+ (10)
254
+ where η is a parameter controlling the sparsity of the solution.
255
+ III. PROPOSED METHOD
256
+ The difficulties of solving Problem (10) are twofold. First,
257
+ the discorporated sparsity has a joint structure among all wm
258
+ [20], which is different from the classical sparsity and con-
259
+ sequently, the existing solutions cannot be directly extended.
260
+ Second, the constraints (4a) and (7) are nonconvex.
261
+ In what follows, we first deal with the joint-sparsity struc-
262
+ ture of the solution by reformulating the problem, and then,
263
+ we develop an algorithm based on the consensus ADMM.
264
+ A. Problem Reformulation
265
+ First of all, we define a long column vector w ∈ CMN
266
+ as w ≜ [wT
267
+ 1 , wT
268
+ 2 , · · · , wT
269
+ M]T and define M matrices Φm ∈
270
+ RN×MN as Φm ≜ [ON×(m−1)N, IN, ON×(M−m)N]. Then,
271
+ Problem (10) can be reformulated as
272
+ min
273
+ w
274
+ ∥w∥2
275
+ 2 + η∥w∥2,1
276
+ (11a)
277
+ s.t. wHAθiw ≥ ϵp, ∀θi ∈ B,
278
+ (11b)
279
+ wHAθjw ≤ ϵs, ∀θj ∈ ¯B,
280
+ (11c)
281
+ wHBnw ≤ Pn, ∀n = 1, 2, · · ·, N,
282
+ (11d)
283
+ wHCmw
284
+ wHC ¯mw + σ2m
285
+ ≥ γm, ∀m = 1, 2, · · ·, M.
286
+ (11e)
287
+ where we have utilized �M
288
+ m=1 ∥wm∥2
289
+ 2 = ∥w∥2
290
+ 2, wm = Φmw,
291
+ and ∥w∥2,1 ≜ �N
292
+ n=1
293
+ ��M
294
+ m=1 |wm(n)|2. Further, since the
295
+ denominators, wHC ¯mw + σ2
296
+ m, are always positive, constraint
297
+ (11e) can be rewritten as
298
+ wHDmw ≥ γmσ2
299
+ m, ∀m = 1, 2, · · ·, M,
300
+ (12)
301
+
302
+ 3
303
+ where Dm ≜ Cm − γmC ¯m, ∀m = 1, 2, · · ·, M. We observe
304
+ that (11b), (11c), (11d), and (12) take the form: wHFw ≤ f.
305
+ Therefore, Problem (11) can be reformulated as
306
+ min
307
+ w
308
+ ∥w∥2
309
+ 2 + η∥w∥2,1
310
+ (13a)
311
+ s.t. wHFlw ≤ fl, ∀l = 1, 2, · · ·, L,
312
+ (13b)
313
+ where the subscript ·l is used to indicate the l-th constraint
314
+ in Problem (11), and L is the total number of constraints.
315
+ It is worth noting that Fl corresponding to −Aθi is neg-
316
+ ative semidefinite, and Fl corresponding to −Dm could be
317
+ indefinite. Therefore, in general, Problem (13) is non-convex
318
+ and thus NP-hard [21]. To solve this problem, we propose an
319
+ algorithm based on the consensus ADMM, which is capable
320
+ of handling all the constraints in parallel.
321
+ B. Proposed Algorithm
322
+ Firstly, we formulate Problem (13) by introducing L auxil-
323
+ iary variables {vl ∈ CMN}L
324
+ l=1, and settle the original variable
325
+ w and the auxiliary variables {vl}l in a separable fashion, as
326
+ min
327
+ w,{vl} ∥w∥2
328
+ 2 + η
329
+ L
330
+ L
331
+
332
+ i=1
333
+ ∥vl∥2,1
334
+ (14a)
335
+ s.t.
336
+ vH
337
+ l Flvl ≤ fl, vl = w, ∀l = 1, 2, · · ·, L.
338
+ (14b)
339
+ Next, we form the scaled-form augmented Lagrangian func-
340
+ tion related to the above problem, as: L(w, {vl}, {ul}) =
341
+ ∥w∥2
342
+ 2 + η
343
+ L
344
+ �L
345
+ l=1∥vl∥2,1 + ρ
346
+ 2
347
+ �L
348
+ l=1
349
+
350
+ ∥vl−w + ul∥2
351
+ 2 − ∥ul∥2
352
+ 2
353
+
354
+ ,
355
+ where ρ > 0 stands for the augmented Lagrangian parameter,
356
+ and ul is the scaled dual variable corresponding to the equality
357
+ constraint vl = w in Problem (14).
358
+ Finally, the consensus ADMM updating equations can be
359
+ written down as
360
+ w ← arg min
361
+ w
362
+ ∥w∥2
363
+ 2 + ρ
364
+ 2
365
+ L
366
+
367
+ l=1
368
+ ∥vl − w + ul∥2
369
+ 2,
370
+ (15a)
371
+ vl ←
372
+
373
+ arg min
374
+ vl
375
+ η
376
+ L∥vl∥2,1 + ρ
377
+ 2∥vl − w + ul∥2
378
+ 2
379
+ s.t.
380
+ vH
381
+ l Flvl ≤ fl,
382
+ (15b)
383
+ ul ← ul + vl − w.
384
+ (15c)
385
+ In what follows, we show how to solve w and vl from (15a)
386
+ and (15b), respectively. We start by solving w from (15a). It
387
+ is straightforward to see that, by calculating the derivative of
388
+ the objective function of (15a) with respect to (w.r.t.) w and
389
+ setting it to 0, we obtain the solution to (15a) as
390
+ �w =
391
+ ρ
392
+ 2 + ρL
393
+ L
394
+
395
+ l=1
396
+ (vl + ul).
397
+ (16)
398
+ On the other hand, to solve vl from (15b), we firstly consider
399
+ the unconstrained minimization problem:
400
+ min
401
+ vl
402
+ f(vl) ≜ η
403
+ L∥vl∥2,1 + ρ
404
+ 2∥vl − w + ul∥2
405
+ 2.
406
+ (17)
407
+ The derivative of f(vl) w.r.t. vl is calculated as
408
+ ∇vlf(vl) =
409
+ � η
410
+ L (IM ⊗ G) + ρIMN
411
+
412
+ vl − ρ(w − ul),
413
+ where G∈RN×N is a diagonal matrix with diagonal being
414
+ 1⊘
415
+
416
+
417
+
418
+
419
+
420
+
421
+ M
422
+
423
+ m=1
424
+ |vl(1+(m−1)N)|2, · · ·,
425
+
426
+
427
+
428
+
429
+ M
430
+
431
+ m=1
432
+ |vl(N +(m−1)N)|2
433
+
434
+
435
+ T
436
+ .
437
+ By setting the derivative to 0, we obtain
438
+ � η
439
+ L (IM ⊗ G) + ρIMN
440
+
441
+ vl = ρ(w − ul).
442
+ (18)
443
+ Since
444
+ � η
445
+ L (IM ⊗G)+ρIMN
446
+
447
+ is real-valued, ∠vl = ∠(w−ul).
448
+ Thus, we only need to calculate the modulus of vl, using
449
+ � η
450
+ L (IM ⊗ G) + ρIMN
451
+
452
+ |vl| = ρ|w − ul|.
453
+ (19)
454
+ By exploring the structure of IM ⊗G, we observe that there
455
+ are N blocks each containing M equal entries. Extracting the
456
+ rows of the equal entries yields
457
+
458
+ η
459
+ L∥vl(n)∥2
460
+ + ρ
461
+
462
+ |vl(n)| = ρ|cl(n)|,
463
+ (20)
464
+ ∀n = 1, 2, · · ·, N, where vl(n) ≜ [vl(n), vl(n+N), · · ·, vl(n+
465
+ (M−1)N)]T ∈ CM, and cl(n) ∈ CM contains the correspond-
466
+ ing entries of (w − ul). From (20), we have
467
+ |vl(n)| =
468
+ ρL∥vl(n)∥2
469
+ η + ρL∥vl(n)∥2
470
+ |cl(n)|.
471
+ (21)
472
+ Performing the element-wise square operation, we have
473
+ |vl(n)|2 =
474
+ ρ2L2∥vl(n)∥2
475
+ 2
476
+ η2 + ρ2L2∥vl(n)∥2
477
+ 2 + 2ηρL∥vl(n)∥2
478
+ |cl(n)|2. (22)
479
+ Hence, we further have
480
+ ∥vl(n)∥2
481
+ 2 =1T|vl(n)|2
482
+ (23a)
483
+ =
484
+ ρ2L2∥vl(n)∥2
485
+ 2
486
+ η2+ρ2L2∥vl(n)∥2
487
+ 2+2ηρL∥vl(n)∥2
488
+ 1T|cl(n)|2. (23b)
489
+ The above equation leads to
490
+ ρ2L2∥vl(n)∥2
491
+ 2+2ηρL∥vl(n)∥2+η2−ρ2L21T|cl(n)|2 = 0, (24)
492
+ the left-hand side of which is a simple quadratic function w.r.t.
493
+ ∥vl(n)∥2, and its unique1 root is given as
494
+ ∥vl(n)∥2 =
495
+ ρL
496
+
497
+ 1T|cl(n)|2 − η
498
+ ρL
499
+ .
500
+ (25)
501
+ Then, by substituting (25) into (21), we obtain
502
+ |vl(n)| =
503
+ ρL
504
+
505
+ 1T|cl(n)|2 − η
506
+ ρL
507
+
508
+ 1T|cl(n)|2
509
+ |cl(n)|.
510
+ (26)
511
+ In (26), we define |vl(n)| = 0 if |cl(n)| = 0. The solution for
512
+ (18), referred to as ¯vl, is finally obtained by combining vl(n)
513
+ (which can be calculated as |vl(n)|eȷ∠vl(n)). Then, the solution
514
+ to (15b), denoted by �vl, is found via the following theorem.
515
+ Theorem. If ρ satisfies ρ
516
+ 2 ≫ η
517
+ L, then �vl can be solved via:
518
+ �vl ← arg min
519
+ vl
520
+ ∥vl − ¯vl∥2
521
+ 2
522
+ s.t. vH
523
+ l Flvl ≤ fl.
524
+ (27)
525
+ Proof. See Appendix A.
526
+ 1Note that the quadratic function in (24) has two roots, one positive and one
527
+ negative. In our case, the negative one is omitted, since its root ∥vl(n)∥2 ≥ 0.
528
+
529
+ 4
530
+ Algorithm 1 Consensus ADMM for solving Problem (13)
531
+ Input: η, ρ, kmax, Fl ∈CMN×MN, fl, ∀l = 1, 2, · · ·, L
532
+ Output: �w ∈ CMN
533
+ Initialize: �v(0)
534
+ l
535
+ ←v(init)
536
+ l
537
+ , �u(0)
538
+ l
539
+ ←u(init)
540
+ l
541
+ , k←0
542
+ 1: while k < kmax do
543
+ 2:
544
+ �w(k+1) ←
545
+ ρ
546
+ 2+ρL
547
+ L
548
+
549
+ l=1
550
+
551
+ �v(k)
552
+ l
553
+ + �u(k)
554
+ l
555
+
556
+ 3:
557
+ for each l = 1, 2, · · ·, L do
558
+ 4:
559
+ cl ← �w(k+1) − �u(k)
560
+ l
561
+ 5:
562
+ ∠¯v(k+1)
563
+ l
564
+ ← ∠cl
565
+ 6:
566
+ for each n = 1, 2, · · ·, N do
567
+ 7:
568
+ |¯v(k+1)
569
+ l(n) | ←
570
+ ρL√
571
+ 1T|cl(n)|2−η
572
+ ρL√
573
+ 1T|cl(n)|2 |cl(n)|
574
+ 8:
575
+ ¯v(k+1)
576
+ l(n)
577
+ ← |¯v(k+1)
578
+ l(n) |eȷ∠¯v(k+1)
579
+ l(n)
580
+ 9:
581
+ end for
582
+ 10:
583
+ Construct ¯v(k+1)
584
+ l
585
+ using ¯v(k+1)
586
+ l(n) , ∀n
587
+ 11:
588
+ if ¯v(k+1)H
589
+ l
590
+ Fl¯v(k+1)
591
+ l
592
+ ≤fl then �v(k+1)
593
+ l
594
+ ←¯v(k+1)
595
+ l
596
+ 12:
597
+ else �v(k+1)
598
+ l
599
+
600
+
601
+ arg min
602
+ vl
603
+ ∥vl − ¯v(k+1)
604
+ l
605
+ ∥2
606
+ 2
607
+ s.t.
608
+ vH
609
+ l Flvl ≤ fl
610
+ 13:
611
+ end if
612
+ 14:
613
+ �u(k+1)
614
+ l
615
+ ← �u(k)
616
+ l
617
+ + �v(k+1)
618
+ l
619
+ − �w(k+1)
620
+ 15:
621
+ end for
622
+ 16:
623
+ k ← k + 1
624
+ 17: end while
625
+ 18: �w ← �w(k)
626
+ Remark 1. Note that η is related to the sparsity of the solution
627
+ of Problem (10), and L is the total number of constraints in
628
+ Problem (13). Both of them are known for a specific problem.
629
+ Hence, it is easy to choose a ρ such that ρ
630
+ 2 ≫ η
631
+ L.
632
+ Remark 2. If ¯vl satisfies the constraint of (27), i.e., ¯vH
633
+ l Fl¯vl ≤
634
+ fl, it is easy to have �vl = ¯vl. Otherwise, notice that Problem
635
+ (27) is a QCQP with one constraint, which can be solved
636
+ optimally despite that Fl may be indefinite [21].
637
+ So far, we have presented how to solve w and vl from (15a)
638
+ and (15b), respectively. Note that {vl}L
639
+ l=1 and {ul}L
640
+ l=1 can be
641
+ calculated in parallel. The complete consensus ADMM for
642
+ solving Problem (13) is summarized in Algorithm 1, in which
643
+ kmax is used to terminate the iteration, and the superscript ·(k)
644
+ denotes the corresponding variable at the k-th iteration.
645
+ In Parallel
646
+ In Parallel
647
+ IV. SIMULATION RESULTS
648
+ In this section, we evaluate the performance of the proposed
649
+ algorithm compared with the feasible point pursuit successive
650
+ convex approximation (FPP-SCA) method [22]. FPP-SCA was
651
+ proposed for general QCQP and it is adapted to our problem.
652
+ Note that unlike our solution, no closed-form solution of FPP-
653
+ SCA is given. The following two metrics are adopted: the Tx-
654
+ Power defined in (9a) and the mainlobe-to-sidelobe response
655
+ ratio (MSRR) defined as MSRR =
656
+
657
+ θi∈B
658
+ �M
659
+ m=1|wH
660
+ ma(θi)|
661
+ 2
662
+
663
+ θj ∈ ¯
664
+ B
665
+ �M
666
+ m=1|wH
667
+ ma(θj)|2 .
668
+ We first consider a transmit system with a uniform linear
669
+ array of N = 10 antennas and K = 8 or 10 RF chains.
670
+ There are M = 2 users. The mainlobe and sidelobe are B =
671
+ [−5◦, 5◦] and ¯B = [−90◦, −20◦]∪[20◦, 90◦], respectively. The
672
+ -90
673
+ -60
674
+ -30
675
+ 0
676
+ 30
677
+ 60
678
+ 90
679
+ Angle (Degree)
680
+ 0
681
+ 2
682
+ 4
683
+ 6
684
+ 8
685
+ 10
686
+ 12
687
+ 14
688
+ Beampattern
689
+ Fig. 2: Beampattern comparison.
690
+ 4
691
+ 6
692
+ 8
693
+ 10
694
+ Number of Selected Sensors
695
+ 2
696
+ 4
697
+ 6
698
+ 8
699
+ 10
700
+ 12
701
+ 14
702
+ TxPower (dB)
703
+ 4
704
+ 6
705
+ 8
706
+ 10
707
+ -5
708
+ 0
709
+ 5
710
+ 10
711
+ MSRR (dB)
712
+ Fig. 3: TxPower (left) and MSRR (right) versus K.
713
+ thresholds for the mainlobe and sidelobe response are ϵp = 10
714
+ and ϵs = 0.1. The maximum power radiated by each antenna
715
+ is Pn = 40 dBm, ∀n, the same as [7]. The noise variance is set
716
+ to σ2
717
+ m = 1, ∀m. The threshold for the received SINR is γm =
718
+ 10 dB, ∀m. The number of constraints in Problem (13) is
719
+ L = 53, the tuning parameter is2 η = 0.1, and the augmented
720
+ Lagrangian parameter is ρ = 50 (ρ/2 ≫ η/L is satisfied). The
721
+ value of v(init)
722
+ l
723
+ is given by any feasible point, while u(init)
724
+ l
725
+ = 0
726
+ and kmax = 100. The beampatterns are drawn in Fig. 2, which
727
+ indicates that the proposed method has nearly perfect response
728
+ controls in both mainlobe and sidelobe while the FPP-SCA has
729
+ lower mainlobe and higher sidelobe correspondingly.
730
+ Next, we examine the TxPower and MSRR versus the
731
+ number of selected sensors, i.e., K. We also consider a strategy
732
+ of randomly selecting K sensors. The parameters are the
733
+ same as those in the last example. 500 Monte-Carlo trials are
734
+ performed. The results are plotted in Fig. 3. It is seen that
735
+ our proposed method has the lowest transmit power and the
736
+ highest MSRR, among all tested methods.
737
+ Finally, we test the TxPower and MSRR versus the number
738
+ of users, i.e., M. The number of selected antennas is fixed as
739
+ 2We do not study the relationship between η and the sparsity of the solution,
740
+ because of the space limitation of the paper. Instead, when we obtain �w, we
741
+ choose K antennas corresponding to the largest (in an ℓ2,1-norm sense) K
742
+ components. We have good results when the tuning parameter is η = 0.1.
743
+
744
+ 5
745
+ 2
746
+ 4
747
+ 6
748
+ Number of Users
749
+ 4
750
+ 6
751
+ 8
752
+ 10
753
+ 12
754
+ 14
755
+ 16
756
+ 18
757
+ TxPower (dB)
758
+ 2
759
+ 4
760
+ 6
761
+ -5
762
+ 0
763
+ 5
764
+ 10
765
+ 15
766
+ MSRR (dB)
767
+ Fig. 4: TxPower (left) and MSRR (right) versus M.
768
+ K = 8, and the other parameters are unchanged as in the last
769
+ example. The results are depicted in Fig. 4, which again show
770
+ that our algorithm leads to a more power-efficient solution.
771
+ V. CONCLUSION
772
+ We studied the problem of sparse array design for dual-
773
+ function radar-communications. Our design aimed at main-
774
+ taining good control in both mainlobe and sidelobe, and also
775
+ to keep the signal-to-interference-plus-noise ratio for the users
776
+ larger than a certain level. In addition, we considered the limi-
777
+ tation of the radiated power by each antenna. The problem was
778
+ formulated as a quadratically constrained quadratic program,
779
+ and solved by consensus alternating direction method of multi-
780
+ pliers. The proposed algorithm was able to be implemented in
781
+ parallel. Simulation results demonstrated better performance
782
+ of the proposed algorithm than the other tested methods.
783
+ APPENDIX A
784
+ PROOF OF THEOREM
785
+ Solving (27) is equal to finding a point in {vl :vH
786
+ l Flvl ≤fl},
787
+ such that it is closest (in an ℓ2-norm sense) to ¯vl. Hence,
788
+ the theorem equivalently states that the solution to Problem
789
+ (15b) is the point closest (in an ℓ2-norm sense) to ¯vl, provided
790
+ that ρ/2 ≫ η/L. To show this, we denote �vl as the point in
791
+ {vl : vH
792
+ l Flvl ≤ fl}, such that
793
+ ∥�vl − ¯vl∥2 ≤ ∥vl − ¯vl∥2
794
+ (28)
795
+ holds for any vl ∈ {vl : vH
796
+ l Flvl ≤ fl}. Our goal is to show
797
+ f(�vl) ≤ f(vl), for any vl ∈ {vl : vH
798
+ l Flvl ≤ fl}.
799
+ The Lagrangian parameter ρ is chosen as ρ = Cη/L, where
800
+ C is a constant. Then, |g(vl) − f(vl)| → 0 as C → ∞ (i.e.,
801
+ ρ/2 ≫ η/L), where g(vl) ≜ ρ
802
+ 2∥vl − w + ul∥2
803
+ 2. Moreover,
804
+ f(vl) = g(vl) = ρ
805
+ 2∥vl − ¯vl∥2
806
+ 2,
807
+ (29)
808
+ as long as C → ∞. Note that, in the second equality above,
809
+ we used the fact that ¯vl = w − ul as C → ∞.
810
+ Suppose that there exists a point ˘vl ∈ {vl : vH
811
+ l Flvl ≤ fl},
812
+ such that f(˘vl) < f(�vl). Thus, by using (29), we obtain that
813
+ ρ
814
+ 2∥˘vl − ¯vl∥2
815
+ 2 <
816
+ ρ
817
+ 2∥�vl − ¯vl∥2
818
+ 2, which contradicts (28). This
819
+ implies that f(�vl) ≤ f(vl) holds for all feasible vl, that is,
820
+ �vl is the solution to Problem (15b). This completes the proof.
821
+ REFERENCES
822
+ [1] K. V. Mishra, B. Shankar, V. Koivunen, B. Ottersten, and S. A. Vorobyov,
823
+ “Toward millimeter-wave joint radar communications: A signal process-
824
+ ing perspective,” IEEE Signal Process. Mag., vol. 36, no. 5, pp. 100–114,
825
+ Sep. 2019.
826
+ [2] F. Liu, C. Masouros, A. P. Petropulu, H. Griffiths, and L. Hanzo, “Joint
827
+ radar and communication design: Applications, state-of-the-art, and the
828
+ road ahead,” IEEE Trans. Commun., vol. 68, no. 6, pp. 3834–3862, Jun.
829
+ 2020.
830
+ [3] S. Shi, Z. Cheng, L. Wu, Z. He, and B. Shankar, “Distributed 5G NR-
831
+ based integrated sensing and communication systems: Frame structure
832
+ and performance analysis,” in Proc. Eur. Signal Process. Conf. (EU-
833
+ SIPCO), Belgrade, Serbia, Aug. 2022, pp. 1062–1066.
834
+ [4] Z. Cheng, L. Wu, B. Wang, B. Shankar, B. Liao, and B. Ottersten,
835
+ “Hybrid beamforming in mmWave dual-function radar-communication
836
+ systems: Models, technologies, and challenges,” Oct. 2022. [Online].
837
+ Available: https://arxiv.org/abs/2209.04656
838
+ [5] C. Yang and H.-R. Shao, “WiFi-based indoor positioning,” IEEE Com-
839
+ mun. Mag., vol. 53, no. 3, pp. 150–157, Mar. 2015.
840
+ [6] H. Wymeersch, G. Seco-Granados, G. Destino, D. Dardari, and
841
+ F. Tufvesson, “5G mmWave positioning for vehicular networks,” IEEE
842
+ Wirel. Commun., vol. 24, no. 6, pp. 80–86, Dec. 2017.
843
+ [7] E. Chen and M. Tao, “ADMM-based fast algorithm for multi-group
844
+ multicast beamforming in large-scale wireless systems,” IEEE Trans.
845
+ Commun., vol. 65, no. 6, pp. 2685–2698, Jun. 2017.
846
+ [8] A. M. Elbir, K. V. Mishra, B. Shankar, and B. Ottersten, “A family
847
+ of deep learning architectures for channel estimation and hybrid beam-
848
+ forming in multi-carrier mm-Wave massive MIMO,” IEEE Trans. Cogn.
849
+ Commun. Netw., vol. 8, no. 2, pp. 642–656, Jun. 2022.
850
+ [9] E. Raei, S. Sedighi, M. Alaee-Kerahroodi, and B. Shankar, “MIMO radar
851
+ transmit beampattern shaping for spectrally dense environments,” IEEE
852
+ Trans. Aerosp. Electron. Syst., pp. 1–13, Aug. 2022.
853
+ [10] A. Kassaw, D. Hailemariam, M. Fauß, and A. M. Zoubir, “Fractional
854
+ programming for energy efficient power control in uplink massive
855
+ MIMO systems,” in Proc. Eur. Signal Process. Conf. (EUSIPCO), A
856
+ Coruna, Spain, Sep. 2019, pp. 1–5.
857
+ [11] S. A. Hamza and M. G. Amin, “Sparse array beamforming design for
858
+ wideband signal models,” IEEE Trans. Aerosp. Electron. Syst., vol. 57,
859
+ no. 2, pp. 1211–1226, Apr. 2021.
860
+ [12] T. Wei, L. Wu, and B. Shankar, “Sparse array beampattern synthesis
861
+ via majorization-based ADMM,” in Proc. IEEE Veh. Technol. Conf.
862
+ (VTC2021-Fall), Norman, USA, Sep. 2021, pp. 1–5.
863
+ [13] H. Huang, H. C. So, and A. M. Zoubir, “Sparse array beamformer
864
+ design via ADMM,” Sep. 2022. [Online]. Available: https://arxiv.org/
865
+ abs/2208.12313
866
+ [14] L. Wang, Q. He, and H. Li, “Transmitter selection and receiver
867
+ placement
868
+ for
869
+ target
870
+ parameter
871
+ estimation
872
+ in
873
+ cooperative
874
+ radar-
875
+ communications system,” IET Signal Process., vol. 16, no. 7, pp. 776–
876
+ 787, Feb. 2022.
877
+ [15] Z. Xu, F. Liu, and A. Petropulu, “Cram´er-Rao bound and antenna
878
+ selection optimization for dual radar-communication design,” in Proc.
879
+ IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), Singapore,
880
+ Singapore, May 2022, pp. 5168–5172.
881
+ [16] X. Zhang, X. Wang, and X. Wang, “Joint antenna selection and
882
+ waveform design for coexistence of MIMO radar and communications,”
883
+ Research Square, Aug. 2022. [Online]. Available: https://doi.org/10.
884
+ 21203/rs.3.rs-1964075/v1
885
+ [17] X. Wang, A. Hassanien, and M. G. Amin, “Sparse transmit array design
886
+ for dual-function radar communications by antenna selection,” Digit.
887
+ Signal Process., vol. 83, pp. 223–234, Dec. 2018.
888
+ [18] X. Wang, A. Hassanien, and M. G. Amin, “Dual-function MIMO radar
889
+ communications system design via sparse array optimization,” IEEE
890
+ Trans. Aerosp. Electron. Syst., vol. 55, no. 3, pp. 1213–1226, Jun. 2019.
891
+ [19] A. Ahmed, S. Zhang, and Y. D. Zhang, “Antenna selection strategy for
892
+ transmit beamforming-based joint radar-communication system,” Digit.
893
+ Signal Process., vol. 105, p. 102768, Oct. 2020.
894
+ [20] H. Huang, H. C. So, and A. M. Zoubir, “Off-grid direction-of-arrival
895
+ estimation using second-order Taylor approximation,” Signal Process.,
896
+ vol. 196, p. 108513, Jul. 2022.
897
+ [21] K. Huang and N. D. Sidiropoulos, “Consensus-ADMM for general
898
+ quadratically constrained quadratic programming,” IEEE Trans. Signal
899
+ Process., vol. 64, no. 20, pp. 5297–5310, Oct. 2016.
900
+ [22] O. Mehanna, K. Huang, B. Gopalakrishnan, A. Konar, and N. D.
901
+ Sidiropoulos, “Feasible point pursuit and successive approximation of
902
+ non-convex QCQPs,” IEEE Signal Process. Lett., vol. 22, no. 7, pp.
903
+ 804–808, Jul. 2015.
904
+
CdAyT4oBgHgl3EQf4fpA/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,502 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf,len=501
2
+ page_content='1 Sparse Array Design for Dual-Function Radar-Communications System Huiping Huang, Student Member, IEEE, Linlong Wu, Member, IEEE, Bhavani Shankar, Senior Member, IEEE, and Abdelhak M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
3
+ page_content=' Zoubir, Fellow, IEEE Abstract—The problem of sparse array design for dual- function radar-communications is investigated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
4
+ page_content=' Our goal is to design a sparse array which can simultaneously shape desired beam responses and serve multiple downlink users with the required signal-to-interference-plus-noise ratio levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
5
+ page_content=' Besides, we also take into account the limitation of the radiated power by each antenna.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
6
+ page_content=' The problem is formulated as a quadratically constrained quadratic program with a joint-sparsity-promoting regularization, which is NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
7
+ page_content=' The resulting problem is solved by the consensus alternating direction method of multipliers, which enjoys parallel implementation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
8
+ page_content=' Numerical simulations exhibit the effectiveness and superiority of the proposed method which leads to a more power-efficient solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
9
+ page_content=' Index Terms—Alternating direction method of multipliers, dual-funtion radar-communications, sparse array design I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
10
+ page_content=' INTRODUCTION D UAL-function radar-communications (DFRC) systems have been recently widely investigated [1]–[4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
11
+ page_content=' They find applications in a wide range of areas, including vehicular net- works, indoor positioning and covert communications [5], [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
12
+ page_content=' To achieve accurate sensing and high throughput, the DFRC systems probably requires a large number of antennas [7]– [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
13
+ page_content=' In practice, a base station usually equips with less radio- frequency (RF) chains than antennas given the hardware cost consideration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
14
+ page_content=' For such a configuration, it raises a question on how to adaptively switch the available RF chains to the corresponding subset of antennas [11]–[13], which can be interpreted as sparse array design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
15
+ page_content=' In this work, we consider the sparse array design for the DFRC system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
16
+ page_content=' Similar problems have been studied in [14]– [19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
17
+ page_content=' The authors in [14] derived a Cram´er-Rao bound for the cooperative radar-communications system, where they focused on target parameter estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
18
+ page_content=' The work [15] developed an antenna selection strategy by using a learning approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
19
+ page_content=' This method requires a training process, which might be unavailable in some practical applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
20
+ page_content=' The authors in [16] introduced a realistic waveform constraint in the DFRC system, in order to improve the power efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
21
+ page_content=' A surrogate subproblem instead of the original problem was solved, which might lead to a highly suboptimal solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
22
+ page_content=' In [17] and [18], several types of DFRC systems were proposed which implement simultaneous beamformers associated with single and different sparse arrays with shared aperture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
23
+ page_content=' However, these two works consider a single-user case, and the corresponding methods cannot be The work of H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
24
+ page_content=' Huang is supported by the Graduate School CE within the Centre for Computational Engineering at Technische Universit¨at Darmstadt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
25
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
26
+ page_content=' Huang and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
27
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
28
+ page_content=' Zoubir are with Technische Universit¨at Darmstadt, Darmstadt, Germany (e-mail: {h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
29
+ page_content='huang;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
30
+ page_content=' zoubir}@spg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
31
+ page_content='tu-darmstadt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
32
+ page_content='de).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
33
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
34
+ page_content=' Wu and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
35
+ page_content=' Shankar are with University of Luxembourg, Luxembourg City, Luxembourg (e-mail: {linlong.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
36
+ page_content='wu;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
37
+ page_content=' Bhavani.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
38
+ page_content='Shankar}@uni.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
39
+ page_content='lu).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
40
+ page_content=' applicable to the case of multi-users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
41
+ page_content=' A weighted ℓ1,q-norm optimization based approach was developed in [19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
42
+ page_content=' Note that all the problems considered in [17]–[19] are convex and were solved by the existing toolbox such as CVX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
43
+ page_content=' Unlike in previous works, we propose a novel system model for DFRC systems, and formulate the corresponding sparse array design problem as a quadratically constrained quadratic program (QCQP) regularized by a joint-sparsity-promoting term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
44
+ page_content=' Besides the control on illumination beampattern and communication signal-to-interference-plus-noise ratio (SINR), we also take into account the limitation of the radiated power by each antenna.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
45
+ page_content=' We propose an algorithm based on the con- sensus alternating direction method of multipliers (ADMM) to solve the resulting problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
46
+ page_content=' Note that at each ADMM iteration, the primary variable has a closed-form solution, and the auxiliary variables can be solved efficiently in a parallel manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
47
+ page_content=' Simulation results show its superior performance compared to other examined methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
48
+ page_content=' The remainder of the paper is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
49
+ page_content=' The system model is established in Section II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
50
+ page_content=' The proposed algorithm is presented in Section III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
51
+ page_content=' Simulation results are shown in Section IV, while Section V concludes the paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
52
+ page_content=' Notations: Throughout this paper, bold-faced lower-case (upper-case) letters denote vectors (matrices).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
53
+ page_content=' Superscripts ·T, H, ·∗, ·−1 denote transpose, Hermitian transpose, conjugate, and inverse, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
54
+ page_content=' E{·} denotes the expectation opera- tor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
55
+ page_content=' | · | and ∠· are the modulus and phase, respectively, both in an element-wise manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
56
+ page_content=' C and R are the sets of complex and real numbers, respectively, and ȷ = √−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
57
+ page_content=' ∥·∥0, ∥·∥1, and ∥·∥2 are ℓ0-quasi-norm, ℓ1-norm, and ℓ2-norm, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
58
+ page_content=' ⊗ denotes the Kronecker product.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
59
+ page_content=' ⊘ is the element-wise division operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
60
+ page_content=' IN and OM×N are the N × N identity matrix and M ×N zero matrix, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
61
+ page_content=' 1 and 0 are the all-ones and all-zeros vector of appropriate size, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
62
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
63
+ page_content=' SYSTEM MODEL AND PROBLEM FORMULATION We consider a DFRC system, as indicated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
64
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
65
+ page_content=' The transmitter, consisting of N antennas, emits M signals, each to a single user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
66
+ page_content=' The weight vector wm ∈ CN is designed to transfer the data symbol, sm(t), to user m, ∀m = 1, 2, · · ·, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
67
+ page_content=' All the M transmitted signals are also received by a target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
68
+ page_content=' The total transmitted signal can then be formulated as x(t) = [w1, w2, · · ·, wM] � ���� s1(t) s2(t) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
69
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
70
+ page_content=' sM(t) � ���� , (1) arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
71
+ page_content='00786v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
72
+ page_content='SY] 2 Jan 2023 2 … 1 2 N User 1 User M Target w1s1(t) wMsM(t) … x(t) = M ∑ m=1 wmsm(t) … Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
73
+ page_content=' 1: Illustration of a DFRC system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
74
+ page_content=' where t is the time index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
75
+ page_content=' We assume that the data symbols, sm(t) ∀m = 1, 2, · · ·, M, are mutually uncorrelated, and each sm(t) is zero-mean, spatially white with unit variance, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
76
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
77
+ page_content=', E{|sm(t)|2} = 1, ∀m=1, 2, · · ·, M, (2a) E{|si(t)s∗ j(t)|} = 0, ∀i, j =1, 2, · · ·, M, and i̸=j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
78
+ page_content=' (2b) For the radar system, we expect that the response within some desired angular region, say B, is not less than a preset threshold, while the response within ¯B is not higher than a small threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
79
+ page_content=' Mathematically, E � xH(t)a(θi)aH(θi)x(t) � ≥ ϵp, ∀θi ∈ B, (3a) E � xH(t)a(θj)aH(θj)x(t) � ≤ ϵs, ∀θj ∈ ¯B, (3b) where a(θ) denotes the steering vector of θ, ϵp and ϵs are two preset thresholds corresponding to the mainlobe and sidelobe, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
80
+ page_content=' Substituting (1) and (2) into (3), we have M � m=1 wH ma(θi)aH(θi)wm ≥ ϵp, ∀θi ∈ B, (4a) M � m=1 wH ma(θj)aH(θj)wm ≤ ϵs, ∀θj ∈ ¯B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
81
+ page_content=' (4b) For the downlink communication systems, the received data by the m-th user is given as ym(t) = hH mwmsm(t) � �� � communication signal + M � j=1,j̸=m hH mwjsj(t) � �� � interference signals + nm(t) � �� � noise , (5) where nm(t) is the additive white Gaussian noise with mean zero and known variance σ2 m, ∀m = 1, 2, · · ·, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
82
+ page_content=' Besides, hm ∈ CN denotes the channel state information (CSI) vector, which models the propagation loss and phase shift of the frequency-flat quasi-static channel from the transmitter to the m-th user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
83
+ page_content=' The CSI, {hm}m, is assumed to be perfectly available at the transmitter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
84
+ page_content=' The maximum power radiated by each antenna n is given by Pn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
85
+ page_content=' Therefore, we have [7] M � m=1 wH mEnwm ≤ Pn, ∀n = 1, 2, · · ·, N, (6) where En is the N×N all-zero matrix except the n-th diagonal entry being 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
86
+ page_content=' The received SINR of user m is defined below, and a certain minimum SINR needs to be guaranteed, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
87
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
88
+ page_content=', SINRm ≜ ��hH mwm ��2 � j̸=m |hH mwj|2+σ2m ≥γm, ∀m = 1, · · ·, M, (7) where � j̸=m is short notation for �M j=1,j̸=m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
89
+ page_content=' Now we consider the scenario where only K ≤ N RF chains are available, and thus only K antennas can be simul- taneously utilized in the DFRC system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
90
+ page_content=' Therefore, wm, ∀m, are sparse, and moreover, they share the same sparsity pattern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
91
+ page_content=' To fulfill this requirement, we need: ∥�w∥0 ≤ K, (8) where �w ≜ [ �w1, �w2, · · ·, �wN]T with its component defined as �wn ≜ ∥[w1(n), w2(n), · · ·, wM(n)]∥2 ∀n = 1, 2, · · · , N, and wm(n) being the n-th entry of vector wm, ∀m = 1, 2, · · ·, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
92
+ page_content=' The quality of service (QoS) problem aims at minimizing the total transmit power (TxPower), with several constraints described above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
93
+ page_content=' To this end, the QoS problem is given as min {wm} TxPower ≜ M � m=1 ∥wm∥2 2 (9a) s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
94
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
95
+ page_content=' (4), (6), (7), and (8).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
96
+ page_content=' (9b) By replacing the non-convex ℓ0-quasi-norm in (8) with the ℓ1- norm, and incorporating it into Problem (9) as a regularization term, we have min {wm} M � m=1 ∥wm∥2 2 + η∥�w∥1 s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
97
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
98
+ page_content=' (4), (6), and (7), (10) where η is a parameter controlling the sparsity of the solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
99
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
100
+ page_content=' PROPOSED METHOD The difficulties of solving Problem (10) are twofold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
101
+ page_content=' First, the discorporated sparsity has a joint structure among all wm [20], which is different from the classical sparsity and con- sequently, the existing solutions cannot be directly extended.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
102
+ page_content=' Second, the constraints (4a) and (7) are nonconvex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
103
+ page_content=' In what follows, we first deal with the joint-sparsity struc- ture of the solution by reformulating the problem, and then, we develop an algorithm based on the consensus ADMM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
104
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
105
+ page_content=' Problem Reformulation First of all, we define a long column vector w ∈ CMN as w ≜ [wT 1 , wT 2 , · · · , wT M]T and define M matrices Φm ∈ RN×MN as Φm ≜ [ON×(m−1)N, IN, ON×(M−m)N].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
106
+ page_content=' Then, Problem (10) can be reformulated as min w ∥w∥2 2 + η∥w∥2,1 (11a) s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
107
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
108
+ page_content=' wHAθiw ≥ ϵp, ∀θi ∈ B, (11b) wHAθjw ≤ ϵs, ∀θj ∈ ¯B, (11c) wHBnw ≤ Pn, ∀n = 1, 2, · · ·, N, (11d) wHCmw wHC ¯mw + σ2m ≥ γm, ∀m = 1, 2, · · ·, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
109
+ page_content=' (11e) where we have utilized �M m=1 ∥wm∥2 2 = ∥w∥2 2, wm = Φmw, and ∥w∥2,1 ≜ �N n=1 ��M m=1 |wm(n)|2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
110
+ page_content=' Further, since the denominators, wHC ¯mw + σ2 m, are always positive, constraint (11e) can be rewritten as wHDmw ≥ γmσ2 m, ∀m = 1, 2, · · ·, M, (12) 3 where Dm ≜ Cm − γmC ¯m, ∀m = 1, 2, · · ·, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
111
+ page_content=' We observe that (11b), (11c), (11d), and (12) take the form: wHFw ≤ f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
112
+ page_content=' Therefore, Problem (11) can be reformulated as min w ∥w∥2 2 + η∥w∥2,1 (13a) s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
113
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
114
+ page_content=' wHFlw ≤ fl, ∀l = 1, 2, · · ·, L, (13b) where the subscript ·l is used to indicate the l-th constraint in Problem (11), and L is the total number of constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
115
+ page_content=' It is worth noting that Fl corresponding to −Aθi is neg- ative semidefinite, and Fl corresponding to −Dm could be indefinite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
116
+ page_content=' Therefore, in general, Problem (13) is non-convex and thus NP-hard [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
117
+ page_content=' To solve this problem, we propose an algorithm based on the consensus ADMM, which is capable of handling all the constraints in parallel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
118
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
119
+ page_content=' Proposed Algorithm Firstly, we formulate Problem (13) by introducing L auxil- iary variables {vl ∈ CMN}L l=1, and settle the original variable w and the auxiliary variables {vl}l in a separable fashion, as min w,{vl} ∥w∥2 2 + η L L � i=1 ∥vl∥2,1 (14a) s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
120
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
121
+ page_content=' vH l Flvl ≤ fl, vl = w, ∀l = 1, 2, · · ·, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
122
+ page_content=' (14b) Next, we form the scaled-form augmented Lagrangian func- tion related to the above problem, as: L(w, {vl}, {ul}) = ∥w∥2 2 + η L �L l=1∥vl∥2,1 + ρ 2 �L l=1 � ∥vl−w + ul∥2 2 − ∥ul∥2 2 � , where ρ > 0 stands for the augmented Lagrangian parameter, and ul is the scaled dual variable corresponding to the equality constraint vl = w in Problem (14).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
123
+ page_content=' Finally, the consensus ADMM updating equations can be written down as w ← arg min w ∥w∥2 2 + ρ 2 L � l=1 ∥vl − w + ul∥2 2, (15a) vl ← � arg min vl η L∥vl∥2,1 + ρ 2∥vl − w + ul∥2 2 s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
124
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
125
+ page_content=' vH l Flvl ≤ fl, (15b) ul ← ul + vl − w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
126
+ page_content=' (15c) In what follows, we show how to solve w and vl from (15a) and (15b), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
127
+ page_content=' We start by solving w from (15a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
128
+ page_content=' It is straightforward to see that, by calculating the derivative of the objective function of (15a) with respect to (w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
129
+ page_content='r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
130
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
131
+ page_content=') w and setting it to 0, we obtain the solution to (15a) as �w = ρ 2 + ρL L � l=1 (vl + ul).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
132
+ page_content=' (16) On the other hand, to solve vl from (15b), we firstly consider the unconstrained minimization problem: min vl f(vl) ≜ η L∥vl∥2,1 + ρ 2∥vl − w + ul∥2 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
133
+ page_content=' (17) The derivative of f(vl) w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
134
+ page_content='r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
135
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
136
+ page_content=' vl is calculated as ∇vlf(vl) = � η L (IM ⊗ G) + ρIMN � vl − ρ(w − ul), where G∈RN×N is a diagonal matrix with diagonal being 1⊘ � � � � � � M � m=1 |vl(1+(m−1)N)|2, · · ·, � � � � M � m=1 |vl(N +(m−1)N)|2 � � T .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
137
+ page_content=' By setting the derivative to 0, we obtain � η L (IM ⊗ G) + ρIMN � vl = ρ(w − ul).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
138
+ page_content=' (18) Since � η L (IM ⊗G)+ρIMN � is real-valued, ∠vl = ∠(w−ul).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
139
+ page_content=' Thus, we only need to calculate the modulus of vl, using � η L (IM ⊗ G) + ρIMN � |vl| = ρ|w − ul|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
140
+ page_content=' (19) By exploring the structure of IM ⊗G, we observe that there are N blocks each containing M equal entries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
141
+ page_content=' Extracting the rows of the equal entries yields � η L∥vl(n)∥2 + ρ � |vl(n)| = ρ|cl(n)|, (20) ∀n = 1, 2, · · ·, N, where vl(n) ≜ [vl(n), vl(n+N), · · ·, vl(n+ (M−1)N)]T ∈ CM, and cl(n) ∈ CM contains the correspond- ing entries of (w − ul).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
142
+ page_content=' From (20), we have |vl(n)| = ρL∥vl(n)∥2 η + ρL∥vl(n)∥2 |cl(n)|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
143
+ page_content=' (21) Performing the element-wise square operation, we have |vl(n)|2 = ρ2L2∥vl(n)∥2 2 η2 + ρ2L2∥vl(n)∥2 2 + 2ηρL∥vl(n)∥2 |cl(n)|2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
144
+ page_content=' (22) Hence, we further have ∥vl(n)∥2 2 =1T|vl(n)|2 (23a) = ρ2L2∥vl(n)∥2 2 η2+ρ2L2∥vl(n)∥2 2+2ηρL∥vl(n)∥2 1T|cl(n)|2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
145
+ page_content=' (23b) The above equation leads to ρ2L2∥vl(n)∥2 2+2ηρL∥vl(n)∥2+η2−ρ2L21T|cl(n)|2 = 0, (24) the left-hand side of which is a simple quadratic function w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
146
+ page_content='r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
147
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
148
+ page_content=' ∥vl(n)∥2, and its unique1 root is given as ∥vl(n)∥2 = ρL � 1T|cl(n)|2 − η ρL .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
149
+ page_content=' (25) Then, by substituting (25) into (21), we obtain |vl(n)| = ρL � 1T|cl(n)|2 − η ρL � 1T|cl(n)|2 |cl(n)|.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
150
+ page_content=' (26) In (26), we define |vl(n)| = 0 if |cl(n)| = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
151
+ page_content=' The solution for (18), referred to as ¯vl, is finally obtained by combining vl(n) (which can be calculated as |vl(n)|eȷ∠vl(n)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
152
+ page_content=' Then, the solution to (15b), denoted by �vl, is found via the following theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
153
+ page_content=' Theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
154
+ page_content=' If ρ satisfies ρ 2 ≫ η L, then �vl can be solved via: �vl ← arg min vl ∥vl − ¯vl∥2 2 s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
155
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
156
+ page_content=' vH l Flvl ≤ fl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
157
+ page_content=' (27) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
158
+ page_content=' See Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
159
+ page_content=' 1Note that the quadratic function in (24) has two roots, one positive and one negative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
160
+ page_content=' In our case, the negative one is omitted, since its root ∥vl(n)∥2 ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
161
+ page_content=' 4 Algorithm 1 Consensus ADMM for solving Problem (13) Input: η,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
162
+ page_content=' ρ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
163
+ page_content=' kmax,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
164
+ page_content=' Fl ∈CMN×MN,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
165
+ page_content=' fl,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
166
+ page_content=' ∀l = 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
167
+ page_content=' 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
168
+ page_content=' · · ·,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
169
+ page_content=' L Output: �w ∈ CMN Initialize: �v(0) l ←v(init) l ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
170
+ page_content=' �u(0) l ←u(init) l ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
171
+ page_content=' k←0 1: while k < kmax do 2: �w(k+1) ← ρ 2+ρL L � l=1 � �v(k) l + �u(k) l � 3: for each l = 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
172
+ page_content=' 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
173
+ page_content=' · · ·,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
174
+ page_content=' L do 4: cl ← �w(k+1) − �u(k) l 5: ∠¯v(k+1) l ← ∠cl 6: for each n = 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
175
+ page_content=' 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
176
+ page_content=' · · ·,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
177
+ page_content=' N do 7: |¯v(k+1) l(n) | ← ρL√ 1T|cl(n)|2−η ρL√ 1T|cl(n)|2 |cl(n)| 8: ¯v(k+1) l(n) ← |¯v(k+1) l(n) |eȷ∠¯v(k+1) l(n) 9: end for 10: Construct ¯v(k+1) l using ¯v(k+1) l(n) ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
178
+ page_content=' ∀n 11: if ¯v(k+1)H l Fl¯v(k+1) l ≤fl then �v(k+1) l ←¯v(k+1) l 12: else �v(k+1) l ← � arg min vl ∥vl − ¯v(k+1) l ∥2 2 s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
179
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
180
+ page_content=' vH l Flvl ≤ fl 13: end if 14: �u(k+1) l ← �u(k) l + �v(k+1) l − �w(k+1) 15: end for 16: k ← k + 1 17: end while 18: �w ← �w(k) Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
181
+ page_content=' Note that η is related to the sparsity of the solution of Problem (10), and L is the total number of constraints in Problem (13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
182
+ page_content=' Both of them are known for a specific problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
183
+ page_content=' Hence, it is easy to choose a ρ such that ρ 2 ≫ η L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
184
+ page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
185
+ page_content=' If ¯vl satisfies the constraint of (27), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
186
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
187
+ page_content=', ¯vH l Fl¯vl ≤ fl, it is easy to have �vl = ¯vl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
188
+ page_content=' Otherwise, notice that Problem (27) is a QCQP with one constraint, which can be solved optimally despite that Fl may be indefinite [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
189
+ page_content=' So far, we have presented how to solve w and vl from (15a) and (15b), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
190
+ page_content=' Note that {vl}L l=1 and {ul}L l=1 can be calculated in parallel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
191
+ page_content=' The complete consensus ADMM for solving Problem (13) is summarized in Algorithm 1, in which kmax is used to terminate the iteration, and the superscript ·(k) denotes the corresponding variable at the k-th iteration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
192
+ page_content=' In Parallel In Parallel IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
193
+ page_content=' SIMULATION RESULTS In this section, we evaluate the performance of the proposed algorithm compared with the feasible point pursuit successive convex approximation (FPP-SCA) method [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
194
+ page_content=' FPP-SCA was proposed for general QCQP and it is adapted to our problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
195
+ page_content=' Note that unlike our solution, no closed-form solution of FPP- SCA is given.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
196
+ page_content=' The following two metrics are adopted: the Tx- Power defined in (9a) and the mainlobe-to-sidelobe response ratio (MSRR) defined as MSRR = � θi∈B �M m=1|wH ma(θi)| 2 � θj ∈ ¯ B �M m=1|wH ma(θj)|2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
197
+ page_content=' We first consider a transmit system with a uniform linear array of N = 10 antennas and K = 8 or 10 RF chains.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
198
+ page_content=' There are M = 2 users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
199
+ page_content=' The mainlobe and sidelobe are B = [−5◦, 5◦] and ¯B = [−90◦, −20◦]∪[20◦, 90◦], respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
200
+ page_content=' The 90 60 30 0 30 60 90 Angle (Degree) 0 2 4 6 8 10 12 14 Beampattern Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
201
+ page_content=' 2: Beampattern comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
202
+ page_content=' 4 6 8 10 Number of Selected Sensors 2 4 6 8 10 12 14 TxPower (dB) 4 6 8 10 5 0 5 10 MSRR (dB) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
203
+ page_content=' 3: TxPower (left) and MSRR (right) versus K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
204
+ page_content=' thresholds for the mainlobe and sidelobe response are ϵp = 10 and ϵs = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
205
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
206
+ page_content=' The maximum power radiated by each antenna is Pn = 40 dBm, ∀n, the same as [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
207
+ page_content=' The noise variance is set to σ2 m = 1, ∀m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
208
+ page_content=' The threshold for the received SINR is γm = 10 dB, ∀m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
209
+ page_content=' The number of constraints in Problem (13) is L = 53, the tuning parameter is2 η = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
210
+ page_content='1, and the augmented Lagrangian parameter is ρ = 50 (ρ/2 ≫ η/L is satisfied).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
211
+ page_content=' The value of v(init) l is given by any feasible point, while u(init) l = 0 and kmax = 100.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
212
+ page_content=' The beampatterns are drawn in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
213
+ page_content=' 2, which indicates that the proposed method has nearly perfect response controls in both mainlobe and sidelobe while the FPP-SCA has lower mainlobe and higher sidelobe correspondingly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
214
+ page_content=' Next, we examine the TxPower and MSRR versus the number of selected sensors, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
215
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
216
+ page_content=', K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
217
+ page_content=' We also consider a strategy of randomly selecting K sensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
218
+ page_content=' The parameters are the same as those in the last example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
219
+ page_content=' 500 Monte-Carlo trials are performed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
220
+ page_content=' The results are plotted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
221
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
222
+ page_content=' It is seen that our proposed method has the lowest transmit power and the highest MSRR, among all tested methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
223
+ page_content=' Finally, we test the TxPower and MSRR versus the number of users, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
224
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
225
+ page_content=', M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
226
+ page_content=' The number of selected antennas is fixed as 2We do not study the relationship between η and the sparsity of the solution, because of the space limitation of the paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
227
+ page_content=' Instead, when we obtain �w, we choose K antennas corresponding to the largest (in an ℓ2,1-norm sense) K components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
228
+ page_content=' We have good results when the tuning parameter is η = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
229
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
230
+ page_content=' 5 2 4 6 Number of Users 4 6 8 10 12 14 16 18 TxPower (dB) 2 4 6 5 0 5 10 15 MSRR (dB) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
231
+ page_content=' 4: TxPower (left) and MSRR (right) versus M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
232
+ page_content=' K = 8, and the other parameters are unchanged as in the last example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
233
+ page_content=' The results are depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
234
+ page_content=' 4, which again show that our algorithm leads to a more power-efficient solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
235
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
236
+ page_content=' CONCLUSION We studied the problem of sparse array design for dual- function radar-communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
237
+ page_content=' Our design aimed at main- taining good control in both mainlobe and sidelobe, and also to keep the signal-to-interference-plus-noise ratio for the users larger than a certain level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
238
+ page_content=' In addition, we considered the limi- tation of the radiated power by each antenna.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
239
+ page_content=' The problem was formulated as a quadratically constrained quadratic program, and solved by consensus alternating direction method of multi- pliers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
240
+ page_content=' The proposed algorithm was able to be implemented in parallel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
241
+ page_content=' Simulation results demonstrated better performance of the proposed algorithm than the other tested methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
242
+ page_content=' APPENDIX A PROOF OF THEOREM Solving (27) is equal to finding a point in {vl :vH l Flvl ≤fl}, such that it is closest (in an ℓ2-norm sense) to ¯vl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
243
+ page_content=' Hence, the theorem equivalently states that the solution to Problem (15b) is the point closest (in an ℓ2-norm sense) to ¯vl, provided that ρ/2 ≫ η/L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
244
+ page_content=' To show this, we denote �vl as the point in {vl : vH l Flvl ≤ fl}, such that ∥�vl − ¯vl∥2 ≤ ∥vl − ¯vl∥2 (28) holds for any vl ∈ {vl : vH l Flvl ≤ fl}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
245
+ page_content=' Our goal is to show f(�vl) ≤ f(vl), for any vl ∈ {vl : vH l Flvl ≤ fl}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
246
+ page_content=' The Lagrangian parameter ρ is chosen as ρ = Cη/L, where C is a constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
247
+ page_content=' Then, |g(vl) − f(vl)| → 0 as C → ∞ (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
248
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
249
+ page_content=', ρ/2 ≫ η/L), where g(vl) ≜ ρ 2∥vl − w + ul∥2 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
250
+ page_content=' Moreover, f(vl) = g(vl) = ρ 2∥vl − ¯vl∥2 2, (29) as long as C → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
251
+ page_content=' Note that, in the second equality above, we used the fact that ¯vl = w − ul as C → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
252
+ page_content=' Suppose that there exists a point ˘vl ∈ {vl : vH l Flvl ≤ fl}, such that f(˘vl) < f(�vl).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
253
+ page_content=' Thus, by using (29), we obtain that ρ 2∥˘vl − ¯vl∥2 2 < ρ 2∥�vl − ¯vl∥2 2, which contradicts (28).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
254
+ page_content=' This implies that f(�vl) ≤ f(vl) holds for all feasible vl, that is, �vl is the solution to Problem (15b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
255
+ page_content=' This completes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
256
+ page_content=' REFERENCES [1] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
257
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
258
+ page_content=' Mishra, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
259
+ page_content=' Shankar, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
260
+ page_content=' Koivunen, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
261
+ page_content=' Ottersten, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
262
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
263
+ page_content=' Vorobyov, “Toward millimeter-wave joint radar communications: A signal process- ing perspective,” IEEE Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
264
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
265
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
266
+ page_content=' 36, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
267
+ page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
268
+ page_content=' 100–114, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
269
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
270
+ page_content=' [2] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
271
+ page_content=' Liu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
272
+ page_content=' Masouros, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
273
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
274
+ page_content=' Petropulu, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
275
+ page_content=' Griffiths, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
276
+ page_content=' Hanzo, “Joint radar and communication design: Applications, state-of-the-art, and the road ahead,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
277
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
278
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
279
+ page_content=' 68, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
280
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
281
+ page_content=' 3834–3862, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
282
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
283
+ page_content=' [3] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
284
+ page_content=' Shi, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
285
+ page_content=' Cheng, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
286
+ page_content=' Wu, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
287
+ page_content=' He, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
288
+ page_content=' Shankar, “Distributed 5G NR- based integrated sensing and communication systems: Frame structure and performance analysis,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
289
+ page_content=' Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
290
+ page_content=' Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
291
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
292
+ page_content=' (EU- SIPCO), Belgrade, Serbia, Aug.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
293
+ page_content=' 2022, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
294
+ page_content=' 1062–1066.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
295
+ page_content=' [4] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
296
+ page_content=' Cheng, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
297
+ page_content=' Wu, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
298
+ page_content=' Wang, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
299
+ page_content=' Shankar, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
300
+ page_content=' Liao, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
301
+ page_content=' Ottersten, “Hybrid beamforming in mmWave dual-function radar-communication systems: Models, technologies, and challenges,” Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
302
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
303
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
304
+ page_content=' Available: https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
305
+ page_content='org/abs/2209.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
306
+ page_content='04656 [5] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
307
+ page_content=' Yang and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
308
+ page_content='-R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
309
+ page_content=' Shao, “WiFi-based indoor positioning,” IEEE Com- mun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
310
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
311
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
312
+ page_content=' 53, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
313
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
314
+ page_content=' 150–157, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
315
+ page_content=' 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
316
+ page_content=' [6] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
317
+ page_content=' Wymeersch, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
318
+ page_content=' Seco-Granados, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
319
+ page_content=' Destino, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
320
+ page_content=' Dardari, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
321
+ page_content=' Tufvesson, “5G mmWave positioning for vehicular networks,” IEEE Wirel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
322
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
323
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
324
+ page_content=' 24, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
325
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
326
+ page_content=' 80–86, Dec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
327
+ page_content=' 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
328
+ page_content=' [7] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
329
+ page_content=' Chen and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
330
+ page_content=' Tao, “ADMM-based fast algorithm for multi-group multicast beamforming in large-scale wireless systems,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
331
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
332
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
333
+ page_content=' 65, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
334
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
335
+ page_content=' 2685–2698, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
336
+ page_content=' 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
337
+ page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
338
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
339
+ page_content=' Elbir, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
340
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
341
+ page_content=' Mishra, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
342
+ page_content=' Shankar, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
343
+ page_content=' Ottersten, “A family of deep learning architectures for channel estimation and hybrid beam- forming in multi-carrier mm-Wave massive MIMO,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
344
+ page_content=' Cogn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
345
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
346
+ page_content=' Netw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
347
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
348
+ page_content=' 8, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
349
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
350
+ page_content=' 642–656, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
351
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
352
+ page_content=' [9] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
353
+ page_content=' Raei, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
354
+ page_content=' Sedighi, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
355
+ page_content=' Alaee-Kerahroodi, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
356
+ page_content=' Shankar, “MIMO radar transmit beampattern shaping for spectrally dense environments,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
357
+ page_content=' Aerosp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
358
+ page_content=' Electron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
359
+ page_content=' Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
360
+ page_content=', pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
361
+ page_content=' 1–13, Aug.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
362
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
363
+ page_content=' [10] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
364
+ page_content=' Kassaw, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
365
+ page_content=' Hailemariam, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
366
+ page_content=' Fauß, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
367
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
368
+ page_content=' Zoubir, “Fractional programming for energy efficient power control in uplink massive MIMO systems,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
369
+ page_content=' Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
370
+ page_content=' Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
371
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
372
+ page_content=' (EUSIPCO), A Coruna, Spain, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
373
+ page_content=' 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
374
+ page_content=' 1–5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
375
+ page_content=' [11] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
376
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
377
+ page_content=' Hamza and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
378
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
379
+ page_content=' Amin, “Sparse array beamforming design for wideband signal models,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
380
+ page_content=' Aerosp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
381
+ page_content=' Electron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
382
+ page_content=' Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
383
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
384
+ page_content=' 57, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
385
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
386
+ page_content=' 1211–1226, Apr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
387
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
388
+ page_content=' [12] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
389
+ page_content=' Wei, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
390
+ page_content=' Wu, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
391
+ page_content=' Shankar, “Sparse array beampattern synthesis via majorization-based ADMM,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
392
+ page_content=' IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
393
+ page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
394
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
395
+ page_content=' (VTC2021-Fall), Norman, USA, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
396
+ page_content=' 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
397
+ page_content=' 1–5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
398
+ page_content=' [13] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
399
+ page_content=' Huang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
400
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
401
+ page_content=' So, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
402
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
403
+ page_content=' Zoubir, “Sparse array beamformer design via ADMM,” Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
404
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
405
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
406
+ page_content=' Available: https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
407
+ page_content='org/ abs/2208.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
408
+ page_content='12313 [14] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
409
+ page_content=' Wang, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
410
+ page_content=' He, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
411
+ page_content=' Li, “Transmitter selection and receiver placement for target parameter estimation in cooperative radar- communications system,” IET Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
412
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
413
+ page_content=' 16, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
414
+ page_content=' 7, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
415
+ page_content=' 776– 787, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
416
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
417
+ page_content=' [15] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
418
+ page_content=' Xu, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
419
+ page_content=' Liu, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
420
+ page_content=' Petropulu, “Cram´er-Rao bound and antenna selection optimization for dual radar-communication design,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
421
+ page_content=' IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
422
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
423
+ page_content=' Acoust.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
424
+ page_content=' Speech Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
425
+ page_content=' (ICASSP), Singapore, Singapore, May 2022, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
426
+ page_content=' 5168–5172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
427
+ page_content=' [16] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
428
+ page_content=' Zhang, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
429
+ page_content=' Wang, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
430
+ page_content=' Wang, “Joint antenna selection and waveform design for coexistence of MIMO radar and communications,” Research Square, Aug.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
431
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
432
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
433
+ page_content=' Available: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
434
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
435
+ page_content=' 21203/rs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
436
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
437
+ page_content='rs-1964075/v1 [17] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
438
+ page_content=' Wang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
439
+ page_content=' Hassanien, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
440
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
441
+ page_content=' Amin, “Sparse transmit array design for dual-function radar communications by antenna selection,” Digit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
442
+ page_content=' Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
443
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
444
+ page_content=' 83, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
445
+ page_content=' 223–234, Dec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
446
+ page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
447
+ page_content=' [18] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
448
+ page_content=' Wang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
449
+ page_content=' Hassanien, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
450
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
451
+ page_content=' Amin, “Dual-function MIMO radar communications system design via sparse array optimization,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
452
+ page_content=' Aerosp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
453
+ page_content=' Electron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
454
+ page_content=' Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
455
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
456
+ page_content=' 55, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
457
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
458
+ page_content=' 1213–1226, Jun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
459
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
460
+ page_content=' [19] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
461
+ page_content=' Ahmed, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
462
+ page_content=' Zhang, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
463
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
464
+ page_content=' Zhang, “Antenna selection strategy for transmit beamforming-based joint radar-communication system,” Digit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
465
+ page_content=' Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
466
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
467
+ page_content=' 105, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
468
+ page_content=' 102768, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
469
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
470
+ page_content=' [20] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
471
+ page_content=' Huang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
472
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
473
+ page_content=' So, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
474
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
475
+ page_content=' Zoubir, “Off-grid direction-of-arrival estimation using second-order Taylor approximation,” Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
476
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
477
+ page_content=' 196, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
478
+ page_content=' 108513, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
479
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
480
+ page_content=' [21] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
481
+ page_content=' Huang and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
482
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
483
+ page_content=' Sidiropoulos, “Consensus-ADMM for general quadratically constrained quadratic programming,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
484
+ page_content=' Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
485
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
486
+ page_content=' 64, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
487
+ page_content=' 20, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
488
+ page_content=' 5297–5310, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
489
+ page_content=' 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
490
+ page_content=' [22] O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
491
+ page_content=' Mehanna, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
492
+ page_content=' Huang, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
493
+ page_content=' Gopalakrishnan, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
494
+ page_content=' Konar, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
495
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
496
+ page_content=' Sidiropoulos, “Feasible point pursuit and successive approximation of non-convex QCQPs,” IEEE Signal Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
497
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
498
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
499
+ page_content=' 22, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
500
+ page_content=' 7, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
501
+ page_content=' 804–808, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
502
+ page_content=' 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdAyT4oBgHgl3EQf4fpA/content/2301.00786v1.pdf'}
D9E2T4oBgHgl3EQf9gn9/content/tmp_files/2301.04230v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
D9E2T4oBgHgl3EQf9gn9/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DdE1T4oBgHgl3EQfqAWA/content/tmp_files/2301.03338v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
DdE1T4oBgHgl3EQfqAWA/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
HtE3T4oBgHgl3EQfuQsq/content/tmp_files/2301.04682v1.pdf.txt ADDED
@@ -0,0 +1,1280 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ TITLE:
4
+ Joint k-TE Space Image Reconstruction and Data Fitting for T2 Mapping
5
+
6
+ RUNNING TITLE:
7
+ Joint k-TE Reconstructed T2 Mapping
8
+
9
+ AUTHORS:
10
+ Yan Dai B.S. 1, Xun Jia Ph.D.2, Yen-Peng Liao, PhD1, Jiaen Liu, PhD3, Jie Deng Ph.D.1
11
+
12
+ 1 Department of Radiation Oncology, University of Texas Southwestern Medical Centre, TX, USA
13
+ 2 Department of Radiation Oncology and Molecular Radiation Sciences, Johns Hopkins
14
+ University, MD, USA
15
+ 3 Advanced Imaging Research Center, University of Texas Southwestern Medical Centre, TX,
16
+ USA
17
+
18
+ CORRESPONDENCE:
19
+ Jie Deng, Ph.D.
20
+ 214-645-5140
21
+ Department of Radiation Oncology,
22
+ University of Texas Southwestern Medical Centre, 2280 Inwood Rd, Dallas.
23
+ Email: Jie.Deng@UTSouthwestern.edu
24
+
25
+ ACKNOWLEDGEMENT
26
+ This work was supported in part by the Cancer Prevention and Research Institute of Texas
27
+ (grant \#RP200573) and the National Cancer Institute (grant \#R01CA227289).
28
+
29
+
30
+ 2
31
+
32
+ ABSTRACT
33
+ Objectives: To develop a joint k-TE reconstruction algorithm to reconstruct the T2-weighted
34
+ (T2W) images and T2 map simultaneously.
35
+ Materials and Methods: The joint k-TE reconstruction model was formulated as an
36
+ optimization problem subject to a self-consistency condition of the exponential decay relationship
37
+ between the T2W images and T2 map. The objective function included a data fidelity term
38
+ enforcing the agreement between the solution and the measured k-space data, together with a
39
+ spatial regularization term on image properties of the T2W images. The optimization problem was
40
+ solved using Alternating-Direction Method of Multipliers (ADMM). We tested the joint k-TE
41
+ method in phantom data and healthy volunteer scans with fully-sampled and under-sampled k-
42
+ space lines. Image quality of the reconstructed T2W images and T2 map, and the accuracy of T2
43
+ measurements derived by the joint k- TE and the conventional signal fitting method were
44
+ compared.
45
+ Results: The proposed method improved image quality with reduced noise and less artifacts on
46
+ both T2W images and T2 map, and increased measurement consistency in T2 relaxation time
47
+ measurements compared with the conventional method in all data sets.
48
+ Conclusions: The proposed reconstruction method outperformed the conventional magnitude
49
+ image-based signal fitting method in image quality and stability of quantitative T2 measurements.
50
+ Key words: Quantitative MRI, joint reconstruction, under-sampled reconstruction, T2
51
+ relaxation, optimization, denoising
52
+
53
+
54
+
55
+ 3
56
+
57
+ 1. INTRODUCTION
58
+ T2-weighted (T2W) MR images provide an important image contrast mechanism resulting
59
+ from the difference of tissue transverse relaxation time for anatomical delineation, disease
60
+ diagnosis, and tissue characterization1,2. The T2 relaxation time measurement derived from a series
61
+ of T2W images acquired at different echo-times (TEs) based on a mono-exponential signal decay
62
+ model provided a quantitative method for tissue characterization, which has been used for cancer
63
+ diagnosis and treatment response assessment 3-5. Pixel-by-pixel T2 measurements, called T2
64
+ mapping, has been integrated into various clinical MRI protocols such as cardiovascular MRI for
65
+ the diagnosis of myocardial inflammation and edema6-9, and neuroimaging for brain maturation
66
+ evaluation 10-14. The conventional T2 mapping reconstruction method includes a two-step process,
67
+ in which the magnitude T2W image acquired at each TE is reconstructed from its own k-space
68
+ data, e.g., by Fast Fourier Transform (FFT), followed by a pixel-by-pixel fitting of the T2W MR
69
+ signal decay to derive the T2 map. The accuracy of T2 measurement using the conventional 2-step
70
+ method is limited by low signal-to-noise-ratio (SNR), low spatial resolution, motion artifacts, as
71
+ well as image quality degradation5,15,16. Acquiring a full set of T2W image based on spin echo
72
+ (SE) or fast spin echo (FSE) pulse sequences takes a relatively long imaging time, resulting in
73
+ pixel misregistration and thus inaccurate signal fitting. Other types of MRI pulse sequences have
74
+ also been used for T2 mapping such as T2-prepared balanced steady-state free precession (bSSFP),
75
+ and Gradient And Spin Echo (GraSE)17, a hybrid technique that acquires a series of gradient echoes
76
+ and spin echoes from a train of 180 radiofrequency pulses, were used for fast myocardial T2
77
+ mapping. In addition, various types of post-processing algorithms for deriving T2 map based on
78
+ reconstructed magnitude T2W images have been used but with the problems of noisy data fitting
79
+ and reproducibility155.
80
+
81
+ 4
82
+
83
+ Parallel imaging techniques were introduced to accelerate MRI acquisition by estimating
84
+ missing data through coil-based calibration. The generalized auto-calibrating partially parallel
85
+ acquisitions(GRAPPA)18 is one of the parallel imaging methods that uses the linear relationship
86
+ between the acquired k-space lines and adjacent missing lines as a constraint in the block-wise
87
+ calibrations across all coil elements to estimate the missing data. This constraint was further
88
+ developed to calibrate between every single k-space data point and its neighboring data points
89
+ across all coil elements using a matrix called SPiRIT (iterative self-consistent parallel imaging
90
+ reconstruction) operator19. Similarly, spatial sparsity of an MR image was considered as prior
91
+ knowledge in image domain to reconstruct under-sampled data, namely compressed sensing (CS).
92
+ The most common form of CS-based reconstruction is to minimize a loss function consisting of a
93
+ data fidelity term and a specifically designed regularization term that penalizes violations the
94
+ sparsity assumption20-22. Essentially, MRI reconstruction can be generally viewed as an inverse
95
+ problem that aims to restore data from non-ideal measurements. Prior knowledge is useful in data
96
+ correction and constraining solutions as used in the above-mentioned parallel imaging and CS
97
+ techniques. More recently, neural network demonstrated good performance in MR image
98
+ reconstruction23-25. A U-net was proposed to reconstruct under-sampled T2W images given the
99
+ corresponding T1-weighted (T1W) images26. With the flexibility of neural network, the sparsity
100
+ between T2W images at different TEs and that between T2W image and T1W image can be well
101
+ integrated into the reconstruction of T2W images27.
102
+ In this study, we propose a joint k-TE space reconstruction method that exploits structural
103
+ correlations between different T2W images acquired at different TEs and the mono-exponential
104
+ decay relationship between T2W images and the corresponding T2 map as the regularization
105
+ terms28. Furthermore, the joint k-TE reconstruction algorithm can be applied to under-sampled
106
+
107
+ 5
108
+
109
+ T2W images, in which CS was not only used in each T2W image itself but also between different
110
+ T2W images27,29-31. This work aims to reconstruct T2W images and T2 mapping simultaneously
111
+ by solving an optimization problem. The error in an T2W image was iteratively corrected by the
112
+ information obtained from other T2W images at different TEs as well as from the corresponding
113
+ T2 map by enforcing the exponential decay constraint, which in turn also reduced the noise in T2
114
+ map. In addition, an image denoising filter algorithm was applied to T2W images as a prior to
115
+ restore image smoothness via the plug-and-play approach. We tested this joint k-TE reconstruction
116
+ method in both phantom data and healthy volunteer images, and compared the image quality and
117
+ accuracy of T2 measurements with those obtained by the conventional method for fully sampled
118
+ data and CS-based method for under-sampled data.
119
+
120
+ 2. MATERIALS AND METHODS
121
+ 2.A. Model for joint reconstruction and data fitting
122
+ Let us denote the measured k-space data at 𝑇𝐸𝑖 as 𝒈(𝑧, 𝑇𝐸𝑖) and the magnitude image to be
123
+ reconstructed as 𝒇(𝑥, 𝑇𝐸𝑖), with 𝑥 being the spatial coordinate. There exists a Fourier transform
124
+ relationship between them:
125
+ 𝒈(𝑧, 𝑇𝐸𝑖) = 𝑺𝑭𝑨(𝑥, 𝑇𝐸𝑖)𝒇(𝑥, 𝑇𝐸𝑖) + 𝒏
126
+ eq. 1
127
+ where 𝒏 denotes noise signal in data acquisition. 𝑺 is the sampling matrix, 𝑭 is the Fourier
128
+ transform operator. 𝑨(𝑥, 𝑇𝐸𝑖) is the phase image. In this study, we assumed this is known and it
129
+ was estimated from the image obtained by inverse Fourier transform of 𝒈(𝑧, 𝑇𝐸𝑖) by taking its
130
+ phase factors. The T2W MR magnitude images at different TEs are related by the T2 relaxation
131
+ model:
132
+
133
+ 6
134
+
135
+ 𝒇(𝑥, 𝑇𝐸𝑖) = 𝒇(𝑥, 𝑇𝐸0)𝑒
136
+ −𝑇𝐸𝑖−𝑇𝐸0
137
+ 𝑻𝟐(𝑥)
138
+ eq. 2
139
+ where 𝑻𝟐(𝑥) is the T2 map.
140
+ We proposed to solve the following optimization model to jointly estimate the image 𝒇(𝑥, 𝑇𝐸)
141
+ and the T2 map 𝑻𝟐(𝑥):
142
+ {𝒇∗, 𝑻𝟐∗} = argmin
143
+ 𝒇,𝐓𝟐
144
+ ∑|𝑺𝑭𝑨(𝑥, 𝑇𝐸𝑖)𝒇(𝑥, 𝑇𝐸𝑖) − 𝒈(𝑧, 𝑇𝐸𝑖)|2 + 𝑅[𝒇(𝑥, 𝑇𝐸𝑖), 𝜆]
145
+ 𝑖
146
+ ,
147
+ 𝑠. 𝑡.⁡ 𝒇(𝑥, 𝑇𝐸𝑖) = 𝒇(𝑥, 0)𝑒
148
+ −𝑇𝐸𝑖−𝑇𝐸0
149
+ 𝑻𝟐(𝑥) , for 𝑖 > 0
150
+ eq. 3
151
+ There are two terms in the objective function. The first one is a data fidelity term that ensures the
152
+ agreement between the reconstructed magnitude images 𝒇(𝑥, 𝑇𝐸𝑖) and the corresponding
153
+ measurements 𝒈(𝑧, 𝑇𝐸𝑖). The second term is employed to provide regulation on MR image in the
154
+ spatial domain, where 𝜆 is the parameter in the regularization function. In this study, we used the
155
+ Block-matching and 3D filtering (BM3D) method for regularization32, which was employed via
156
+ the plug-and-play (PnP) approach presented in the next subsection. The constraint posts the
157
+ connection among MR images 𝒇(𝑥, 𝑇𝐸𝑖) and the T2 map 𝑻𝟐(𝑥).
158
+ 2.B. Numerical algorithm and implementation
159
+ The Alternating Direction Method of Multipliers was employed to solve this optimization
160
+ problem33. As such, we first considered the optimization problem equivalent to eq. 3 by
161
+ introducing a variable 𝒗:
162
+
163
+ 7
164
+
165
+ {𝒇, 𝑻𝟐, 𝒗} = argmin
166
+ ���,𝑻𝟐,𝒗
167
+ 1
168
+ 2 ∑|𝑺𝑭𝑨(𝑥, 𝑇𝐸𝑖)𝒇(𝑥, 𝑇𝐸𝑖) − 𝒈(𝑧, 𝑇𝐸𝑖)|2 + 𝑅[𝒗(𝑥, 𝑇𝐸𝑖), 𝜆]
169
+ 𝑖
170
+ ,
171
+ 𝑠. 𝑡 . 𝒇(𝑥, 𝑇𝐸𝑖) = 𝒇(𝑥, 𝑇𝐸0)𝑒
172
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
173
+ 𝑻𝟐(𝑥) , for 𝑖 > 0 ; ⁡𝒗(𝑥, 𝑇𝐸𝑖) = ⁡𝒇(𝑥, 𝑇𝐸𝑖).
174
+ eq. 4
175
+ The augmented Lagrangian of this problem is
176
+ 𝐿𝜌 = 1
177
+ 2 ∑|𝑺𝑭𝑨(𝑥, 𝑇𝐸𝑖)𝒇(𝑥, 𝑇𝐸𝑖) − 𝒈(𝑧, 𝑇𝐸𝑖)|2 + 𝑅[𝒗(𝑥, 𝑇𝐸𝑖), 𝜆]
178
+ 𝑖
179
+ + ∑ 𝒚𝑖
180
+ 𝑇 [𝒇(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸0)𝑒
181
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
182
+ 𝑻𝟐(𝑥) ]
183
+ 𝑖>0
184
+ + ∑ 𝜌
185
+ 2 |𝒇(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸0)𝑒
186
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
187
+ 𝑻𝟐(𝑥) |
188
+ 2
189
+ 𝑖>0
190
+ + ∑ 𝑧𝑖
191
+ 𝑇[𝒗(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸𝑖)]
192
+ 𝑖
193
+ + ∑ ⁡𝜌
194
+ 2 |𝒗(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸𝑖)|2
195
+ 𝑖
196
+
197
+ eq. 5
198
+ where 𝒚𝑖, 𝒛𝑖 and 𝜌 are variables introduced in the algorithm. The ADMM solved the optimization
199
+ problem by iteratively performing the following steps with 𝑘 being the index of iteration:
200
+ 𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) = argmin
201
+ 𝒇(𝑥,𝑇𝐸𝑖)
202
+ 1
203
+ 2 |𝑺𝑭𝑨(𝑥, 𝑇𝐸𝑖)𝒇(𝑥, 𝑇𝐸𝑖) − 𝒈(𝑧, 𝑇𝐸𝑖)|2
204
+ + 𝒚𝒊
205
+ 𝑇 [𝒇(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘)(𝑥, 𝑇𝐸0)𝑒
206
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
207
+ 𝑻𝟐(𝑘)(𝑥)]
208
+ + 𝜌
209
+ 2 |𝒇(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘)(𝑥, 𝑇𝐸0)𝑒
210
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
211
+ 𝑻𝟐(𝑘)(𝑥)|
212
+ 2
213
+ + 𝒛𝑖
214
+ 𝑇[𝒗(𝑘)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸𝑖)] + 𝜌
215
+ 2 |𝒗(𝑘)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸𝑖)|
216
+ 2,
217
+ for⁡𝑖 > 0
218
+ eq. 6
219
+
220
+ 8
221
+
222
+
223
+ 𝒇(𝑘+1)(𝑥, 𝑇𝐸0) = argmin
224
+ 𝒇(𝑥,𝑇𝐸0)
225
+ 1
226
+ 2 |𝑺𝑭𝑨(𝑥, 𝑇𝐸0)𝒇(𝑥, 𝑇𝐸0) − 𝒈(𝑧, 𝑇𝐸0)|2
227
+ + ∑ 𝒚𝒊
228
+ 𝑇 [𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸0)𝑒
229
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
230
+ 𝑻𝟐(𝑘)(𝑥)]
231
+ 𝑖>0
232
+ + ∑ 𝜌
233
+ 2 |𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑥, 𝑇𝐸0)𝑒
234
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
235
+ 𝑻𝟐(𝑘)(𝑥)|
236
+ 2
237
+ 𝑖>0
238
+ + 𝒛𝒊
239
+ 𝑇[𝒗(𝑘)(𝑥, 𝑇𝐸0)
240
+ − 𝒇(𝑥, 𝑇𝐸0)] + 𝜌
241
+ 2 |𝒗(𝑘)(𝑥, 𝑇𝐸0) − 𝒇(𝑥, 𝑇𝐸0)|
242
+ 2
243
+ eq. 7
244
+
245
+ 1
246
+ 𝑻𝟐(𝑘+1)(𝑥) = argmin
247
+ 1
248
+ 𝑻𝟐(𝑥)
249
+ ∑ 𝒚𝑖
250
+ 𝑇 [𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘+1)(𝑥, 𝑇𝐸0)𝑒
251
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
252
+ 𝑻𝟐(𝑘)(𝑥)]
253
+ 𝑖>0
254
+ + ∑ 𝜌
255
+ 2 |𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘+1)(𝑥, 𝑇𝐸0)𝑒
256
+ −⁡𝑇𝐸𝑖−𝑇𝐸0
257
+ 𝑻𝟐(𝑘)(𝑥)|
258
+ 2
259
+ 𝑖>0
260
+
261
+ eq. 8
262
+
263
+ 𝒗(𝑘+1)(𝑥, 𝑇𝐸𝑖) = argmin
264
+ 𝒗(x,𝑇𝐸𝑖) ⁡𝑅[𝒗(𝑥, 𝑇𝐸𝑖), 𝜆] + 𝒛𝑖
265
+ 𝑇[𝒗(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖)]
266
+ + 𝜌
267
+ 2 |𝒗(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖)|
268
+ 2
269
+ eq. 9
270
+
271
+ 𝒚𝑖
272
+ (𝑘+1) = 𝒚𝑖
273
+ (𝑘) + 𝜌[𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘+1)(𝑥, 𝑇𝐸0)𝑒
274
+ −⁡ 𝑇𝐸𝑖−𝑇𝐸0
275
+ 𝑻𝟐(𝑘+1)(𝑥)]
276
+ eq. 10
277
+
278
+
279
+ 9
280
+
281
+ 𝒛𝒊
282
+ (𝑘+1) = 𝒛𝒊
283
+ (𝑘) + 𝜌[𝒗(𝑘+1)(𝑥, 𝑇𝐸𝑖) − 𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖)]
284
+ eq. 11
285
+
286
+ The first two subproblems in eq. 6 and eq. 7 with respect to the images 𝒇(𝑥, 𝑇𝐸𝑖), 𝑖 = 0,1, …⁡,
287
+ are quadratic optimization problems, and the solutions are computed by solving the linear equation
288
+ corresponding to the optimality condition.
289
+ The subproblem in eq. 8 with respect to T2 map 𝑻𝟐(𝑥) is essentially data fitting to determine
290
+ the T2 map 𝑻𝟐(𝑥) by fitting data 𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) pixelwise in an exponential decay function form.
291
+ This was achieved by using a weighted least square (WLS) fitting (eq. 13) of a linear function (eq.
292
+ 12), where the weight 𝑤𝑏 for each term should be inversely proportional to the measurement
293
+ uncertainty of
294
+ log
295
+ 𝒇(𝑘+1)(𝑥,𝑇𝐸𝑖)
296
+ 𝒇(𝑘+1)(𝑥,𝑇𝐸0)
297
+ 𝑇𝐸𝑖−⁡𝑇𝐸0
298
+ . Generally, as this is only a subproblem of the iterative process, it is
299
+ not necessary to solve this subproblem accurately at each iteration. Hence, a first order
300
+ approximation of the measurement uncertainty was used as shown in eq. 14, where 𝜎 is the
301
+ variance of noise in the measurement of 𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) and its measurement is described later.
302
+ log[𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖)] = log[𝒇(𝑘+1)(𝑥, 𝑇𝐸0)] − 𝑇𝐸𝑖 − 𝑇𝐸0
303
+ 𝑻𝟐(𝑥)
304
+
305
+ eq. 12
306
+ 1
307
+ 𝑻𝟐(𝑘+1)(𝑥)⁡= argmin
308
+ 1
309
+ 𝑻𝟐(𝑥)
310
+ ∑ 𝑤𝑖 |log 𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖)
311
+ 𝒇(𝑘+1)(𝑥, 𝑇𝐸0) + 𝑇𝐸𝑖 − 𝑇𝐸0
312
+ 𝑻𝟐(𝑥)
313
+ |
314
+ 𝑖
315
+ 2
316
+
317
+ eq. 13
318
+ 𝑤𝑖 ∝ (−
319
+ 1
320
+ 𝑇𝐸𝑖 − 𝑇𝐸0
321
+ log(𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) + 𝜎)
322
+ +
323
+ 1
324
+ 𝑇𝐸𝑖 − 𝑇𝐸0
325
+ log(𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖) − 𝜎))
326
+ −1
327
+
328
+ eq. 14
329
+
330
+ 10
331
+
332
+ As for the subproblem defined in eq. 9, which is a essentially image domain processing
333
+ problem, the PnP approach34 was employed. The PnP method enabled plugging in a powerful
334
+ image denoising algorithm and its validity has been empirically demonstrated in previous studies
335
+ in terms of producing high-quality results in various applications35-37.
336
+ For processing of image 𝒗(𝑥, 𝑇𝐸𝑖), assuming that the noise in k-space is Gaussian, the noise in
337
+ the magnitude MR image will still follow a Gaussian distribution after phase correction, or can be
338
+ approximated as Gaussian distribution when 𝑆𝑁𝑅 > 338. In this study, BM3D method32 was used
339
+ in the PnP framework for Gaussian noise removal, and this step is denoted as:
340
+ 𝒗(𝑘+1)(𝑥, 𝑇𝐸𝑖) = 𝐵𝑀3𝐷[𝒇(𝑘+1)(𝑥, 𝑇𝐸𝑖), 𝜎]
341
+ eq. 15
342
+ where 𝐵𝑀3D(. ) stands for the BM3D denoising operation. It needs to be mentioned that the
343
+ BM3D algorithm requires a hyper-parameter 𝜎 specifying the Gaussian noise standard deviation.
344
+ To estimate the 𝜎 in MR images, which was also used as the measurement uncertainty in weighted
345
+ linear regression for T2 map fitting, we first removed the background with a threshold-based
346
+ segmentation algorithm and then estimated the local noise standard deviation of patches with a
347
+ size of 5 × 5 pixels. The mode value of these local noise variance values was computed as an
348
+ approximation of the noise standard deviation. Then this value was either directly used as
349
+ parameter 𝜎 or multiplied with 0.5 as a conservative estimation to preserve more details in the
350
+ image.
351
+ The iterative process in eq. 6-eq. 11 continued until convergence, when the mean relative
352
+ intensity change of 𝒇(𝑥, 𝑇𝐸𝑖) in two successive iteration steps is less than a threshold 𝜖. Note that
353
+ due to the modifications to the ADMM algorithm and the application of PnP framework,
354
+ theoretical convergence of this iterative process was not guaranteed. 𝜖 was set as 1% in this study.
355
+
356
+ 11
357
+
358
+ The algorithm used to solve the joint reconstruction and data fitting problem is summarized in
359
+ Algorithm 1. Solving the problem in eq. 3. The algorithm was implemented in Python 3.8, and
360
+ computation was performed on a workstation with an Intel(R) Xeon(R) Gold 6230R CPU of
361
+ 2.1GHz frequency. The other adjustable parameter in this algorithm, 𝜌, was quite robust and was
362
+ set as 0.5 for all the applications.
363
+ Algorithm 1. Solving the problem in eq. 3.
364
+ Input:
365
+ K-space data 𝒈(𝑧, 𝑇𝐸𝑖) with at least 3 different 𝑇𝐸⁡values, sampling
366
+ matrix 𝑺 and phase matrix 𝑨
367
+ Parameters:
368
+ 𝜌, 𝜖
369
+ Initialize:
370
+
371
+
372
+ 𝒗(0)(𝑥, 𝑇𝐸𝑖) =⁡𝒇(0)(𝑥, 𝑇𝐸𝑖) =⁡𝑨−1𝑭−1𝑺𝒈(𝑧, 𝑇𝐸𝑖),
373
+
374
+ 1
375
+ 𝑻𝟐(0)(𝑥) = argmin
376
+ 1
377
+ 𝑻𝟐(𝑥)
378
+ ⁡ ∑ 𝑤𝑖 |log 𝒇(0)(𝑥, 𝑇𝐸𝑖)
379
+ 𝒇(0)(𝑥, 𝑇𝐸0) + 𝑇𝐸𝑖 − 𝑇𝐸0
380
+ 𝑻𝟐(𝑥)
381
+ |
382
+ 2
383
+ ,
384
+ 𝑖
385
+
386
+
387
+ 𝒚𝑖
388
+ (0) = 𝒛𝑖
389
+ (0) = 0, and 𝑘⁡ = ⁡0
390
+ While:
391
+
392
+
393
+ mean (
394
+ |𝒇(𝑘+1)(𝑥,𝑇𝐸𝑖)−𝒇(𝑘)(𝑥,𝑇𝐸𝑖)|
395
+ 𝒇(𝑘)(𝑥,𝑇𝐸𝑖)
396
+ )⁡> 𝜖⁡or 𝑘 = 0
397
+ Do:
398
+
399
+
400
+ 𝑘⁡ = ⁡𝑘⁡ + ⁡1
401
+
402
+ Solve problems in eq. 6 and eq. 7 using CGLS algorithm
403
+
404
+ Update 𝑻𝟐 by pixelwise data fitting eq. 13
405
+
406
+ Update 𝒗 using BM3D algorithm in eq. 15
407
+
408
+ Update 𝒚𝑖, 𝒛𝑖 by eq. 10 and eq. 10
409
+ End while
410
+
411
+ Return:
412
+ 𝒇∗ = 𝒇(𝑘+1) and 𝑫∗ = 𝑫(𝑘+1)
413
+
414
+
415
+
416
+ 2.C. Evaluation
417
+
418
+ 12
419
+
420
+ The joint reconstruction algorithm was evaluated in phantom and patient studies. The study
421
+ protocol was approved by our Institutional Review Board and written informed consent was
422
+ waived from each subject. T2W imaging data sets were acquired on a phantom (Essential System
423
+ Phantom for Relaxometry, Model 106, CaliberMRI, Boulder, CO) consisting of 14 vials with
424
+ different concentration of MnCl2 solution providing a T2 range from 8 to 850 𝑚𝑠. measured on
425
+ 1.5T at 20C. MR images were acquired on a 1.5T clinical MRI scanner (Ingenia Ambition X,
426
+ Philips Healthcare, Netherlands) with a 20-channel brain coil. In phantom study, T2W imaging
427
+ was acquired using a multi-echo FSE sequence following the vendor-provided protocol: field-of-
428
+ view (FOV) = ⁡250 × ⁡250⁡𝑚𝑚2, slice thickness/gap = 6/0 mm, matrix size = 256 × ⁡256,
429
+ repetition time (TR) = 5000 ms, eleven TEs from 11 to 176 ms with 11 ms step, bandwidth = 170
430
+ Hz/pixel, number of excitation (NEX) = 1, echo train length = 16, acquisition time = 21 min 25
431
+ 𝑠𝑒𝑐. In subject scan, T2W imaging was acquired using a GraSE sequence with the following
432
+ parameters: field-of-view (FOV) = ⁡256 × ⁡207⁡𝑚𝑚2, slice thickness/gap = 3/9 mm, matrix size
433
+ = 400 × ⁡400, repetition time (TR) = 1892 ms, 32 TEs from 14.4 to 461.6 ms with 14.4 ms step,
434
+ bandwidth = 691 Hz/pixel, number of excitation (NEX) = 2, echo train length = 32, echo planar
435
+ factor = 5, acquisition time =2 min 42 sec.
436
+ For both phantom and subject scans, each T2W image was converted to the corresponding k-
437
+ space data through FFT. Furthermore, we tested the effectiveness of the proposed joint k-TE
438
+ reconstruction method in reconstructing under-sampled k-space data, in which the central 10% k-
439
+ space data was kept while 25% and 33% of the rest 90% k-space data was randomly discarded. A
440
+ CS-based reconstruction algorithm39 was used as the conventional reconstruction method to
441
+ reconstruct the T2W image from the under-sampled data. Each MR image was reconstructed under
442
+ the regularization of 1D Total Variation (TV) as shown in eq.16, where 𝑭𝑝ℎ𝑎𝑠𝑒
443
+ 1𝐷
444
+ , 𝑭𝑓𝑟𝑒𝑞
445
+ 1𝐷 ⁡and⁡𝑇𝑉𝑝ℎ𝑎𝑠𝑒
446
+ 1𝐷
447
+
448
+
449
+ 13
450
+
451
+ denoted 1D Fourier transform applied along phase direction, 1D Fourier transform applied along
452
+ frequency direction, and 1D TV applied along phase encoding direction, respectively.
453
+ 𝒇∗ = argmin
454
+ 𝒇
455
+ ∑ |𝑺𝑭𝑓𝑟𝑒𝑞
456
+ 1𝐷 𝑭𝑝ℎ𝑎𝑠𝑒
457
+ 1𝐷
458
+ 𝑨𝒇(𝑥, 𝑇𝐸𝑖) − 𝒈(𝑧, 𝑇𝐸𝑖)|
459
+ 𝑖
460
+ + 𝑇𝑉𝑝ℎ𝑎𝑠𝑒
461
+ 1𝐷
462
+ [𝑭𝑝ℎ𝑎𝑠𝑒
463
+ 1𝐷
464
+ 𝑨𝒇(𝑥, 𝑇𝐸𝑖)]
465
+ eq. 16
466
+ To numerically evaluate the performance of the proposed joint k- TE reconstruction method on
467
+ both fully sampled and under-sampled phantom data, mean and standard deviation of T2
468
+ measurements were calculated in each vial of the phantom with ground truth T2 values, as well as
469
+ in three regions-of-interests (ROIs) including white matter (WM), gray matter (GM), and ventricle
470
+ on subject images. The joint reconstruction results were compared with those computed using the
471
+ conventional 2-step WLS fitting method on the fully sampled data.
472
+ 3. RESULTS
473
+ In all of the fully sampled and under-sampled datasets of phantom and subject scans, the
474
+ proposed algorithm converged within 10 iterations in fully sampled data, as shown in Figure. 1. It
475
+ took slightly more iterations for the algorithm to converge on the under-sampled data due to the
476
+ ill-defined problem. The mean relative change (MRC) of the image intensity increased at the
477
+ beginning of iterations and we started to check it from the 4th iteration.
478
+
479
+ 14
480
+
481
+ `
482
+
483
+ Figure. 1. The convergence plot of the proposed algorithm, shown as the mean relative change (MRC)
484
+ along with the number of iterations in fully sampled phantom data (A), 25% under-sampled phantom data
485
+ (B), 33% under-sampled phantom data (C), fully sampled patient data (D), 25% under-sampled patient
486
+ data (E), and 33% under-sampled patient data (F). The horizontal dashed red line in each subplot shows
487
+ the stopping criteria in each data set.
488
+
489
+ 3.A. Image Quality Evaluation
490
+ Image quality comparison between fully sampled, under-sampled joint reconstruction methods,
491
+ and full sampled conventional method were shown in Fig. 2 (phantom) and Fig. 3 (subject). The
492
+ joint reconstruction method demonstrated improved image quality with less noise on T2W images
493
+ at low, medium, and high TEs and the corresponding T2 map in both fully sampled and under-
494
+ sampled data sets. The proposed algorithm outperformed the conventional CS method in under-
495
+ sampled image reconstruction by removing the aliasing artifacts more effectively.
496
+
497
+ A
498
+ B
499
+ c
500
+ 109
501
+ MRimage
502
+ MR image
503
+ MR image
504
+ R images(%)
505
+ : of MR images(%)
506
+ of MR images(%)
507
+ 107
508
+ 105
509
+ MRC of MR
510
+ 103
511
+ MRC
512
+ 100
513
+ MRC
514
+ 100
515
+ 101
516
+ 2
517
+ 3
518
+ 4
519
+ 5
520
+ 8
521
+ 6
522
+ 10 11
523
+ Numberofiteration
524
+ Number
525
+ ofiteration
526
+ Number
527
+ ofiteration
528
+ D
529
+ E
530
+ F
531
+ 109
532
+ MRimage
533
+ MR image
534
+ MR image
535
+ MRC of MR images(%)
536
+ MRC of MR images(%)
537
+ MRC of MR images(%)
538
+ 107
539
+ 101
540
+ 101
541
+ 105
542
+ 103
543
+ 101
544
+ 100
545
+ 100
546
+ 2
547
+ 6
548
+ 6
549
+ 10 11
550
+ 91011121314
551
+ 3
552
+ 6
553
+ 111315171921
554
+ Numberofiteration
555
+ Numberofiteration
556
+ Numberofiteration15
557
+
558
+
559
+
560
+
561
+ A
562
+ TE=11.000ms
563
+ TE=88.000ms
564
+ TE=176.000ms
565
+ T2
566
+ Recon
567
+ 2-step
568
+ e
569
+ Recon
570
+ Joint
571
+ B
572
+ a
573
+ Recon
574
+ CS
575
+ e
576
+ Recon
577
+ Joint
578
+ C
579
+ a
580
+ Recon
581
+ e
582
+ Recon
583
+ Joint
584
+ 0
585
+ 500
586
+ 1000
587
+ 1500
588
+ 2000
589
+ 500
590
+ 1000
591
+ 15000
592
+ 400
593
+ 800
594
+ 1200100
595
+ 101
596
+ 102
597
+ 10316
598
+
599
+ Figure 2. The reconstructed phantom images by the conventional 2-step and proposed joint
600
+ reconstruction method in the fully sampled (A), 25% under-sampled (B) and 33% under-sampled (C)
601
+ phantom data set. In all data sets, T2W MR images and the corresponding T2 map reconstructed by the
602
+ k-TE joint reconstruction (Joint Recon) method improved image quality compared with those
603
+ reconstructed by the conventional 2-step (2-step Recon) method for fully sample data and by the
604
+ compressed-sensing (CS Recon) based method for under-sampled data.
605
+
606
+
607
+ 17
608
+
609
+
610
+
611
+
612
+ TE=14.426ms
613
+ TE=100.982ms
614
+ TE=216.390ms
615
+ T2
616
+ a
617
+ b
618
+ 2-step Recon
619
+ e
620
+ g
621
+ h
622
+ Joint Recon
623
+ B
624
+ a
625
+ .
626
+ d
627
+ CS Recon
628
+ e
629
+ 9
630
+ h
631
+ JointRecon
632
+ c
633
+ a
634
+ b
635
+ d
636
+ CS Recon
637
+ 9
638
+ JointRecon
639
+ 500
640
+ 10001500
641
+ 2000
642
+ 2500
643
+ 500
644
+ 1000
645
+ 15000
646
+ 250
647
+ 500
648
+ 750
649
+ 0
650
+ 150
651
+ 300>=35018
652
+
653
+ Figure 3. The reconstructed brain images by the conventional and proposed method in the fully
654
+ sampled (A), 25% under-sampled (B) and 33% under-sampled (C) subject brain data. In all data sets,
655
+ T2W MR images and the corresponding T2 map reconstructed by the k-TE joint reconstruction (Joint
656
+ Recon) method improved image quality compared with those reconstructed by the conventional 2-step (2-
657
+ step Recon) method for fully sampled data and by the compressed-sensing (CS Recon) based method for
658
+ under-sampled data.
659
+
660
+ 3.B. Quantitative T2 Measurement Evaluation
661
+ The accuracy of T2 measurements in the Relaxometry phantom by the conventional and
662
+ proposed algorithms on both fully sampled and under-sampled data was shown in Table. 1. The
663
+ vendor provided T2 values for each vial in the phantom were used as the ground truth. The mean
664
+ and standard deviation of the pixel-wise T2 values were calculated within a ROI manually placed
665
+ in each vial of the phantom, theoretically all pixels within each ROI should have the same T2
666
+ value.
667
+ In the phantom study, the joint reconstruction method applied to both fully sampled and under-
668
+ sampled data provided comparable mean T2 measurements as the conventional method in fully
669
+ sampled dataset, and they were consistent with the gold standard T2 values. In addition, the
670
+ variation in pixel-by-pixel T2 measurements was greatly reduced (i.e., less standard deviations)
671
+ using the joint reconstruction method in the full sample data set comparison. The mean T2 values
672
+ of the under-sampled reconstruction by the proposed algorithm showed minimal differences
673
+ compared with those reconstructed from the fully sampled data, however, the variations in T2
674
+ measurements of under-sampled data were higher than those of fully sampled reconstruction.
675
+
676
+ Table 1. Comparison of mean and standard deviation of T2 values reconstructed by the conventional 2-
677
+ step reconstruction on fully sampled phantom data (Full 2-step Recon) and the proposed joint reconstruction
678
+ method on fully sampled phantom data (Full Joint Recon), 25% under-sampled phantom data (25% Joint
679
+ Recon) and 33% under-sampled phantom data (33% Joint Recon).
680
+
681
+ 19
682
+
683
+ Grou
684
+ nd Truth
685
+ (𝑚𝑠)
686
+
687
+ 8.75
688
+ 12.8
689
+ 17.9
690
+ 26.1
691
+ 34.3
692
+ 53.0
693
+ 82.2
694
+ Full
695
+ 2-step
696
+ Recon
697
+ mean
698
+ 8.44
699
+ 12.4
700
+ 16.1
701
+ 24.0
702
+ 31.7
703
+ 48.6
704
+ 75.7
705
+
706
+ std
707
+ 1.67
708
+ 1.23
709
+ 0.92
710
+ 4
711
+ 1.01
712
+ 0.77
713
+ 5
714
+ 0.91
715
+ 6
716
+ 0.86
717
+ 2
718
+ Full
719
+ Joint
720
+ Recon
721
+ mean
722
+ 8.40
723
+ 12.4
724
+ 16.0
725
+ 23.8
726
+ 31.2
727
+ 47.6
728
+ 73.8
729
+
730
+ std
731
+ 1.20
732
+ 0.91
733
+ 8
734
+ 0.75
735
+ 6
736
+ 0.79
737
+ 8
738
+ 0.57
739
+ 8
740
+ 0.94
741
+ 5
742
+ 0.91
743
+ 1
744
+ 25%
745
+ Joint
746
+ Recon
747
+ mean
748
+ 7.45
749
+ 10.6
750
+ 14.5
751
+ 21.3
752
+ 26.6
753
+ 46.4
754
+ 73.1
755
+
756
+ std
757
+ 2.55
758
+ 3.45
759
+ 2.24
760
+ 1.77
761
+ 4.35
762
+ 3.22
763
+ 1.06
764
+ 33%
765
+ Joint
766
+ Recon
767
+ mean
768
+ 11.7
769
+ 13.5
770
+ 15.5
771
+ 20.4
772
+ 26.3
773
+ 44.5
774
+ 72.8
775
+
776
+ std
777
+ 7.98
778
+ 9.53
779
+ 6.86
780
+ 3.44
781
+ 6.29
782
+ 6.78
783
+ 1.73
784
+ *The unit is 𝑚𝑠 for all mean and std of ROI T2
785
+
786
+ Table 2 continued.
787
+ Ground Truth
788
+ (𝑚𝑠)
789
+
790
+ 116
791
+ 167
792
+ 194
793
+ 323
794
+ 479
795
+ 692
796
+ 853
797
+ Full 2-step
798
+ Recon
799
+ mean
800
+ 109
801
+ 147
802
+ 187
803
+ 278
804
+ 421
805
+ 641
806
+ 954
807
+
808
+ std
809
+ 1.53
810
+ 2.03
811
+ 3.28
812
+ 6.38
813
+ 13.1
814
+ 29.8
815
+ 85.3
816
+ Full Joint
817
+ Recon
818
+ mean
819
+ 105
820
+ 141
821
+ 179
822
+ 263
823
+ 385
824
+ 556
825
+ 797
826
+
827
+ std
828
+ 1.34
829
+ 1.18
830
+ 2.33
831
+ 4.60
832
+ 5.31
833
+ 15.1
834
+ 37.1
835
+ 25% Joint
836
+ Recon
837
+ mean
838
+ 104
839
+ 140
840
+ 179
841
+ 264
842
+ 376
843
+ 539
844
+ 781
845
+
846
+ std
847
+ 1.33
848
+ 2.43
849
+ 4.15
850
+ 8.23
851
+ 11.5
852
+ 28.9
853
+ 69.3
854
+ 33% Joint
855
+ Recon
856
+ mean
857
+ 104
858
+ 139
859
+ 179
860
+ 262
861
+ 376
862
+ 535
863
+ 786
864
+
865
+ std
866
+ 1.46
867
+ 2.54
868
+ 4.57
869
+ 9.37
870
+ 12.3
871
+ 35.7
872
+ 79.7
873
+ *The unit is 𝑚𝑠 for all mean and std of ROI T2
874
+
875
+
876
+ 20
877
+
878
+ In human brain data set, the mean and standard deviation of ADC values were calculated within
879
+ three selected ROIs (white matter, gray matter, and CSF: cerebrospinal fluid) as shown in Table. 2.
880
+ Since the noise distribution in MR images can be approximated as Gaussian distribution, it had little
881
+ impact on the mean ADC value reconstructed by the conventional 2-step algorithm and thus we used
882
+ the conventional reconstructed ADCs as ground truth. In all three ROIs, the joint reconstructed ADC
883
+ values were comparable to the ground truth while showing higher consistency (i.e., less standard
884
+ deviation).
885
+
886
+ Table 2. Comparison of mean and standard deviation of T2 values reconstructed by the conventional 2-
887
+ step reconstruction on fully sampled (Full 2-step Recon) and the proposed joint reconstruction method on
888
+ fully sampled (Full Joint Recon), 25% under-sampled (25% Joint Recon), and 33% under-sampled data
889
+ (33% Joint Recon) of a brain scan.
890
+ *The unit is 𝑚𝑠 for all mean and std of ROI T2
891
+
892
+ 4. DISCUSSION
893
+ In this work, we developed a novel optimization method for joint reconstruction of T2W MR
894
+ images and T2 map by exploiting constraints simultaneously from k-space and TE-space that used
895
+ regularizations in image domain and self-consistency condition of the T2 weighted exponential
896
+
897
+
898
+ CSF
899
+ White Matter
900
+ Gray Matter
901
+ Full 2-step Recon
902
+ mean
903
+ 1716
904
+ 94.96
905
+ 117.7
906
+
907
+ std
908
+ 177.6
909
+ 4.266
910
+ 9.220
911
+ Full Joint Recon
912
+ mean
913
+ 1733
914
+ 104.1
915
+ 124.8
916
+
917
+ std
918
+ 139.5
919
+ 2.305
920
+ 7.974
921
+ 25% Joint Recon
922
+ mean
923
+ 1729
924
+ 102.1
925
+ 124.8
926
+
927
+ std
928
+ 146.4
929
+ 2.156
930
+ 7.156
931
+ 33% Joint Recon
932
+ mean
933
+ 1731
934
+ 101.6
935
+ 128.3
936
+
937
+ std
938
+ 140.4
939
+ 1.550
940
+ 8.367
941
+
942
+ 21
943
+
944
+ signal decay form. This proposed algorithm improved image quality in T2W images and T2 maps,
945
+ and reduced variations in pixel-by-pixel T2 measurements.
946
+ Technical highlights of the proposed algorithm reside in the synergy of k-TE space constraints
947
+ in MR image reconstruction and T2 fitting through multiple iterations. Considering the mono-
948
+ exponential decay relationship between T2W signals and T2 value, we incorporated a constraint
949
+ in TE space to the optimization problem, which enforced the mono-exponential decay calibration
950
+ through MR signals acquired at different TEs with the signal decay coefficient being
951
+ 1
952
+ 𝑇2. This TE-
953
+ space constraint was based on that all k-space data acquired at different TEs rather than single k-
954
+ space data acquired at single TE. The detailed updating formulas through each iteration to
955
+ reconstruct a T2W MR image (𝑖 = 0 and 𝑖 > 0) were shown in Eq. 17 and Eq. 18.
956
+ The numerator contained terms for data fidelity (i.e., k-space constraint), TE-space constraint,
957
+ and the smoothness constraint, aside from the Lagrange multiplier terms about 𝒛 and 𝒚. The
958
+ denominator was the normalization term. The meanings of these equations are interpretable. For
959
+ MR image at 𝑇𝐸0, each MR image with 𝑇𝐸𝑖, 𝑖 > 0 from the last iteration estimated an expected
960
+ MR image at 𝑇𝐸0 based on the exponential decay relationship. Then these expected images were
961
+ averaged together with the image generated based on data fidelity, the image after applying
962
+ smoothing constraints and those from multipliers. Similarly, for updating an MR image at 𝑇𝐸𝑖, 𝑖 >
963
+ 0, the expected MR image given by 𝒇0 was involved. Overall, as the iterations continued, each
964
+ 𝒇0 =
965
+ 𝒈𝑇𝑺𝑭∗𝑨∗ + 𝒈𝐻𝑺𝑭𝑨
966
+ 2
967
+ + ∑
968
+ (𝒚𝑖
969
+ 𝑇𝑒−𝑇𝐸𝑖−𝑇𝐸0
970
+ 𝑻𝟐
971
+ + 𝜌𝒇𝑏
972
+ 𝑇𝑒−𝑇𝐸𝑖−𝑇𝐸0
973
+ 𝑻𝟐
974
+ )
975
+ 𝑖>0
976
+ + 𝒛0
977
+ 𝑇 + 𝜌𝒗0
978
+ 𝑇
979
+ 𝑨𝐻𝑭∗𝑺𝑭𝑨 + 𝑨𝑭𝑺𝑭∗𝑨∗
980
+ 2
981
+ + 𝜌 + 𝜌 ∗ ∑
982
+ 𝑒−2𝑇𝐸𝑖−𝑇𝐸0
983
+ 𝑻𝟐
984
+ 𝐼>0
985
+
986
+ Eq. 17
987
+ 𝒇𝑖,𝑖>0 ⁡=
988
+ 𝒈𝑇𝑺𝑭∗𝑨∗ + 𝒈𝐻𝑺𝑭𝑨
989
+ 2
990
+ ⁡−⁡𝒚𝑖
991
+ 𝑇 + 𝜌𝒇0
992
+ 𝑇𝑒−𝑇𝐸𝑖−𝑇𝐸0
993
+ 𝑻𝟐
994
+ + 𝒛𝑖
995
+ 𝑇 + 𝜌𝒗𝒊
996
+ 𝑇
997
+ 𝑨𝐻𝑭∗𝑺𝑭𝑨 + 𝑨𝑇𝑭𝑺𝑭∗𝑨∗
998
+ 2
999
+ + 𝜌 + 𝜌
1000
+
1001
+ Eq. 18
1002
+
1003
+ 22
1004
+
1005
+ T2W MR image was estimated by calibrating data from all k-space data at different TEs rather
1006
+ than relying on its only k-space data. The iterative process effectively removed noise that was
1007
+ randomly distributed in each MR image, and thus improve the image quality and the accuracy of
1008
+ T2 measurements.
1009
+ In addition to the k-TE space constraints, the smoothness constraint was also considered in MR
1010
+ images. BM3D was incorporated in our algorithm using a PnP method as the smoothness
1011
+ regularization for MR images to remove noise with Gaussian distribution. We also tested Rician-
1012
+ based BM3D method instead assuming the noise in MR images follows Rician distribution but
1013
+ found out both BM3D and Rician-based BM3D gave similar results. This could be because the
1014
+ Rician-distributed noise can be approximated as Gaussian noise in most of our data sets. We also
1015
+ tested apply the BM3D spatial regularizations in T2 map, hoping to further improve the jointly
1016
+ reconstructed image quality. However, this approach tended to over-smooth the reconstructed
1017
+ images, which may be due to the unknown noise distribution in T2 map.
1018
+ It is not able to mention that the joint reconstruction algorithm was more effective in removing
1019
+ the aliasing artifacts on the under-sampled data compared with CS-based algorithm, mainly
1020
+ because of the combined application of TE-space constraints, rather than the application of the
1021
+ denoising tool BM3D, but. To validate the effectiveness of combining both k-space and TE-space
1022
+ constraints in the proposed algorithm, we tested only applying the k-space constraint regularized
1023
+ with BM3D solely to reconstruct the fully sampled and under-sampled phantom data by
1024
+ minimizing eq. 19:
1025
+ {𝒇∗} = argmin
1026
+ 𝒇
1027
+ ∑|𝑺𝑭𝑨(𝑥, 𝑇𝐸𝑖)𝒇(𝑥, 𝑇𝐸𝑖) − 𝒈(𝑧, 𝑇𝐸𝑖)|2 + 𝑅[𝒇(𝑥, 𝑇𝐸𝑖), 𝜆]
1028
+ 𝑖
1029
+
1030
+ eq. 19
1031
+
1032
+ 23
1033
+
1034
+ The optimization process still exploited the ADMM and PnP algorithms, which was similar to that
1035
+ of the proposed joint k-TE reconstruction algorithm. In this test, MRC failed to converge in all
1036
+ phantom data sets and thus the iteration was manually stopped at the 4th iteration. As shown in Fig.
1037
+ 4. the approach cannot remove noise in the fully sampled data set, especially for T2W MR images
1038
+ at high TE. The results became worse in under-sampled data set, where the aliasing patterns with
1039
+ high spatial correlation were more obvious. This test demonstrated the effectiveness and necessity
1040
+ of joint application of the constraints from both k-space and TE-space.
1041
+
1042
+
1043
+ Figure 4. Images reconstruction by only applying BM3D regularized k-space constraint in the fully
1044
+ sampled (a-f), 25% under-sampled (e-f) and 33% under-sampled (i-l) phantom data.
1045
+
1046
+
1047
+ b=11s/mm2
1048
+ b=88s/mm2
1049
+ b=176s/mm2
1050
+ T2
1051
+ a
1052
+ b
1053
+ Under-sampled Fully sampled
1054
+ e
1055
+ 9
1056
+ 25%
1057
+ Under-sampled
1058
+ 33%
1059
+ 0
1060
+ 500
1061
+ 1000
1062
+ 1500
1063
+ 2000
1064
+ 500
1065
+ 1000
1066
+ 1500
1067
+ 250
1068
+ 500
1069
+ 750
1070
+ 1000
1071
+ 12500
1072
+ 250
1073
+ 500
1074
+ 750
1075
+ 1000
1076
+ 125024
1077
+
1078
+ The adjustable parameters in the joint reconstruction method included the model parameter 𝜌
1079
+ in eq. 5 brought by augmented Lagrange method and the threshold 𝜖 for convergence judgement.
1080
+ Among them, the model parameter 𝜌 did not impact the final convergence result but only affected
1081
+ the rate and stability of convergence. It can be set to a larger value when the convergence process
1082
+ was not stable at the expense of having more iterations before reaching convergence. The threshold
1083
+ 𝜖 was used to stop the algorithm at a proper iteration and needed to be fine-tuned based on different
1084
+ data sets. In this study, the threshold 𝜖 was set as 1% for both phantom and subject data sets.
1085
+ There are several limitations in our work. First, the threshold of MRC for stopping the
1086
+ iterations may vary in different data sets. Currently a conservative way to find the best threshold
1087
+ was to first run the algorithm with a small threshold and then select a proper threshold that
1088
+ preserves as much fine structures as possible while having the noise suppressed to overcome the
1089
+ over smoothing issue. Second, the reconstruction time for the proposed algorithm with weighted
1090
+ least square fitting is long (5 mins each iteration for each slice with 400 × 400 pixels and 32 TEs)
1091
+ compared with the conventional FFT method. Over half the time was spent on noise variance
1092
+ estimation, which can be accelerated using high performance GPU computing.
1093
+ Future work will include extending the joint k-TE reconstruction method to more complex
1094
+ models such as 3-parameter T2 model fitting model that takes into account the effect of imaging
1095
+ pluses40. Also, a more robust algorithm will be implemented to estimate the parameter 𝜎 for BM3D
1096
+ in order to avoid fine tuning the threshold 𝜖. Taking one step further, BM3D might not be the
1097
+ optimal choice to be plugged in as the denoising regularization tool, more flexible tools, such as a
1098
+ neural network, can be integrated to achieve better denoising effect and image reconstruction.
1099
+
1100
+ 5. CONCLUSION
1101
+
1102
+ 25
1103
+
1104
+ We developed a novel joint k-TE space optimization algorithm for simultaneous T2W MR
1105
+ image and T2 map reconstruction. In this method, the k-space constraint enforced data fidelity,
1106
+ and TE-space constraint enabled information to be shared among MR images at different TEs and
1107
+ the corresponding T2 map. Our algorithm improved the image quality of T2W MR images and T2
1108
+ maps with better SNR, increased the stability of pixelwise T2 measurements compared with the
1109
+ conventional magnitude image-based 2-step signal fitting method.
1110
+
1111
+
1112
+
1113
+
1114
+ 26
1115
+
1116
+ REFERENCES
1117
+
1118
+ 1.
1119
+ Mitchell DG, Burk Jr D, Vinitski S, Rifkin M. The biophysical basis of tissue contrast in
1120
+ extracranial MR imaging. American Journal of Roentgenology. 1987;149(4):831-837.
1121
+ 2.
1122
+ Liney GP, Turnbull LW, Lowry M, Turnbull LS, Knowles AJ, Horsman A. In vivo
1123
+ quantification of citrate concentration and water T2 relaxation time of the pathologic prostate
1124
+ gland using 1H MRS and MRI. Magn Reson Imaging. 1997;15(10):1177-1186.
1125
+ 3.
1126
+ Giri S, Chung Y-C, Merchant A, et al. T2 quantification for improved detection of
1127
+ myocardial edema. Journal of cardiovascular magnetic resonance. 2009;11(1):1-13.
1128
+ 4.
1129
+ Langer DL, Van der Kwast TH, Evans AJ, Trachtenberg J, Wilson BC, Haider MA.
1130
+ Prostate cancer detection with multi‐parametric MRI: Logistic regression analysis of
1131
+ quantitative T2, diffusion‐weighted imaging, and dynamic contrast‐enhanced MRI. Journal of
1132
+ Magnetic Resonance Imaging: An Official Journal of the International Society for Magnetic
1133
+ Resonance in Medicine. 2009;30(2):327-334.
1134
+ 5.
1135
+ Messroghli DR, Moon JC, Ferreira VM, et al. Clinical recommendations for
1136
+ cardiovascular magnetic resonance mapping of T1, T2, T2* and extracellular volume: a
1137
+ consensus statement by the Society for Cardiovascular Magnetic Resonance (SCMR) endorsed
1138
+ by the European Association for Cardiovascular Imaging (EACVI). Journal of Cardiovascular
1139
+ Magnetic Resonance. 2017;19(1):1-24.
1140
+ 6.
1141
+ Mewton N, Liu CY, Croisille P, Bluemke D, Lima JA. Assessment of myocardial fibrosis
1142
+ with cardiovascular magnetic resonance. Journal of the American College of Cardiology.
1143
+ 2011;57(8):891-903.
1144
+ 7.
1145
+ Abdel-Aty H, Zagrosek A, Schulz-Menger J, et al. Delayed enhancement and T2-
1146
+ weighted cardiovascular magnetic resonance imaging differentiate acute from chronic
1147
+ myocardial infarction. Circulation. 2004;109(20):2411-2416.
1148
+ 8.
1149
+ Cury RC, Shash K, Nagurney JT, et al. Cardiac magnetic resonance with T2-weighted
1150
+ imaging improves detection of patients with acute coronary syndrome in the emergency
1151
+ department. Circulation. 2008;118(8):837-844.
1152
+ 9.
1153
+ Biasiolli L, Lindsay AC, Chai JT, Choudhury RP, Robson MD. In-vivo quantitative T2
1154
+ mapping of carotid arteries in atherosclerotic patients: segmentation and T2 measurement of
1155
+ plaque components. Journal of Cardiovascular Magnetic Resonance. 2013;15(1):1-9.
1156
+ 10.
1157
+ Siemonsen S, Mouridsen K, Holst B, et al. Quantitative T2 values predict time from
1158
+ symptom onset in acute stroke patients. Stroke. 2009;40(5):1612-1616.
1159
+ 11.
1160
+ Lund H, Jønsson A, Andresen J, Rostrup E, Paulson O, Sørensen P. Cognitive deficits in
1161
+ multiple sclerosis: correlations with T2 changes in normal appearing brain tissue. Acta
1162
+ neurologica scandinavica. 2012;125(5):338-344.
1163
+ 12.
1164
+ Vymazal J, Righini A, Brooks RA, et al. T1 and T2 in the brain of healthy subjects,
1165
+ patients with Parkinson disease, and patients with multiple system atrophy: relation to iron
1166
+ content. Radiology. 1999;211(2):489-495.
1167
+ 13.
1168
+ Ding X-Q, Kucinski T, Wittkugel O, et al. Normal brain maturation characterized with
1169
+ age-related T2 relaxation times: an attempt to develop a quantitative imaging measure for
1170
+ clinical use. Investigative radiology. 2004;39(12):740-746.
1171
+ 14.
1172
+ Lescher S, Jurcoane A, Veit A, Bähr O, Deichmann R, Hattingen E. Quantitative T1 and
1173
+ T2 mapping in recurrent glioblastomas under bevacizumab: earlier detection of tumor
1174
+ progression compared to conventional MRI. Neuroradiology. 2015;57(1):11-20.
1175
+
1176
+ 27
1177
+
1178
+ 15.
1179
+ Kalaitzakis GI, Papadaki E, Kavroulakis E, Boursianis T, Marias K, Maris TG.
1180
+ Optimising T2 relaxation measurements on MS patients utilising a multi-component tissue
1181
+ mimicking phantom and different fitting algorithms in T2 calculations. Hellenic Journal οf
1182
+ Radiology. 2019;4(2)
1183
+ 16.
1184
+ Raya JG, Dietrich O, Horng A, Weber J, Reiser MF, Glaser C. T2 measurement in
1185
+ articular cartilage: impact of the fitting method on accuracy and precision at low SNR. Magnetic
1186
+ Resonance in Medicine: An Official Journal of the International Society for Magnetic Resonance
1187
+ in Medicine. 2010;63(1):181-193.
1188
+ 17.
1189
+ Sprinkart AM, Luetkens JA, Träber F, et al. Gradient Spin Echo (GraSE) imaging for fast
1190
+ myocardial T2 mapping. Journal of Cardiovascular Magnetic Resonance. 2015;17(1):12.
1191
+ doi:10.1186/s12968-015-0127-z
1192
+ 18.
1193
+ Griswold MA, Jakob PM, Heidemann RM, et al. Generalized Autocalibrating Partially
1194
+ Parallel Acquisitions (GRAPPA). Magnet Reson Med. Jun 2002;47(6):1202-1210.
1195
+ doi:10.1002/mrm.10171
1196
+ 19.
1197
+ Lustig M, Pauly JM. SPIRiT: Iterative Self-consistent Parallel Imaging Reconstruction
1198
+ From Arbitrary k-Space. Magnet Reson Med. Aug 2010;64(2):457-471. doi:10.1002/mrm.22428
1199
+ 20.
1200
+ Lustig M, Donoho D, Pauly JM. Sparse MRI: The application of compressed sensing for
1201
+ rapid MR imaging. Magnetic Resonance in Medicine: An Official Journal of the International
1202
+ Society for Magnetic Resonance in Medicine. 2007;58(6):1182-1195.
1203
+ 21.
1204
+ Trzasko J, Manduca A. Highly Undersampled Magnetic Resonance Image
1205
+ Reconstruction via Homotopic $\ell_ {0} $-Minimization. IEEE Transactions on Medical
1206
+ imaging. 2008;28(1):106-121.
1207
+ 22.
1208
+ Doneva M, Börnert P, Eggers H, Stehning C, Sénégas J, Mertins A. Compressed sensing
1209
+ reconstruction for magnetic resonance parameter mapping. Magnet Reson Med.
1210
+ 2010;64(4):1114-1120.
1211
+ 23.
1212
+ Ogawa R, Kido T, Nakamura M, et al. Reconstruction of cardiovascular black-blood T2-
1213
+ weighted image by deep learning algorithm: A comparison with intensity filter. Acta Radiologica
1214
+ Open. 2021;10(9):20584601211044779.
1215
+ 24.
1216
+ Park JC, Park KJ, Park MY, Kim Mh, Kim JK. Fast T2‐Weighted Imaging With Deep
1217
+ Learning‐Based Reconstruction: Evaluation of Image Quality and Diagnostic Performance in
1218
+ Patients Undergoing Radical Prostatectomy. Journal of Magnetic Resonance Imaging.
1219
+ 2022;55(6):1735-1744.
1220
+ 25.
1221
+ Kim S-H, Choi YH, Lee JS, et al. Deep learning reconstruction in pediatric brain MRI:
1222
+ comparison of image quality with conventional T2-weighted MRI. Neuroradiology. 2022:1-8.
1223
+ 26.
1224
+ Xiang L, Chen Y, Chang W, et al. Ultra-fast t2-weighted mr reconstruction using
1225
+ complementary t1-weighted information. Springer; 2018:215-223.
1226
+ 27.
1227
+ Meng Z, Guo R, Li Y, et al. Accelerating T2 mapping of the brain by integrating deep
1228
+ learning priors with low‐rank and sparse modeling. Magnet Reson Med. 2021;85(3):1455-1467.
1229
+ 28.
1230
+ Sumpf TJ, Uecker M, Boretius S, Frahm J. Model‐based nonlinear inverse
1231
+ reconstruction for T2 mapping using highly undersampled spin‐echo MRI. Journal of Magnetic
1232
+ Resonance Imaging. 2011;34(2):420-428.
1233
+ 29.
1234
+ Majumdar A, Ward RK. Joint reconstruction of multiecho MR images using correlated
1235
+ sparsity. Magn Reson Imaging. 2011;29(7):899-906.
1236
+ 30.
1237
+ Huang C, Graff CG, Clarkson EW, Bilgin A, Altbach MI. T2 mapping from highly
1238
+ undersampled data by reconstruction of principal component coefficient maps using compressed
1239
+ sensing. Magnet Reson Med. 2012;67(5):1355-1366.
1240
+
1241
+ 28
1242
+
1243
+ 31.
1244
+ Huang C, Bilgin A, Barr T, Altbach MI. T2 relaxometry with indirect echo compensation
1245
+ from highly undersampled data. Magnet Reson Med. 2013;70(4):1026-1037.
1246
+ 32.
1247
+ Dabov K, Foi A, Katkovnik V, Egiazarian K. Image denoising by sparse 3-D transform-
1248
+ domain collaborative filtering. Ieee T Image Process. Aug 2007;16(8):2080-2095.
1249
+ doi:10.1109/Tip.2007.901238
1250
+ 33.
1251
+ Boyd S, Parikh N, Chu E, Peleato B, Eckstein J. Distributed optimization and statistical
1252
+ learning via the alternating direction method of multipliers. Foundations and Trends® in
1253
+ Machine learning. 2011;3(1):1-122.
1254
+ 34.
1255
+ Venkatakrishnan SV, Bouman CA, Wohlberg B. Plug-and-play priors for model based
1256
+ reconstruction. IEEE; 2013:945-948.
1257
+ 35.
1258
+ Sreehari S, Venkatakrishnan SV, Wohlberg B, et al. Plug-and-play priors for bright field
1259
+ electron tomography and sparse interpolation. IEEE Transactions on Computational Imaging.
1260
+ 2016;2(4):408-423.
1261
+ 36.
1262
+ Chan SH, Wang X, Elgendy OA. Plug-and-play ADMM for image restoration: Fixed-
1263
+ point convergence and applications. IEEE Transactions on Computational Imaging.
1264
+ 2016;3(1):84-98.
1265
+ 37.
1266
+ Yazdanpanah AP, Afacan O, Warfield SK. Deep Plug-and-Play Prior for Parallel MRI
1267
+ Reconstruction. Ieee Int Conf Comp V. 2019:3952-3958. doi:10.1109/Iccvw.2019.00489
1268
+ 38.
1269
+ Gudbjartsson H, Patz S. The Rician Distribution of Noisy Mri Data. Magnet Reson Med.
1270
+ Dec 1995;34(6):910-914. doi:DOI 10.1002/mrm.1910340618
1271
+ 39.
1272
+ Yang Y, Liu F, Jin ZY, Crozier S. Aliasing Artefact Suppression in Compressed Sensing
1273
+ MRI for Random Phase-Encode Undersampling. Ieee T Bio-Med Eng. Sep 2015;62(9):2215-
1274
+ 2223. doi:10.1109/Tbme.2015.2419372
1275
+ 40.
1276
+ Akçakaya M, Basha TA, Weingärtner S, Roujol S, Berg S, Nezafat R. Improved
1277
+ quantitative myocardial T2 mapping: Impact of the fitting model. Magnet Reson Med.
1278
+ 2015;74(1):93-105.
1279
+
1280
+
HtE3T4oBgHgl3EQfuQsq/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
I9FAT4oBgHgl3EQfux7Z/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f4abc0f5cb7016bf13f256f6fc5cc72171f8df08817b66e653e05446d92f5555
3
+ size 3276845
JNE0T4oBgHgl3EQfSABV/content/tmp_files/2301.02215v1.pdf.txt ADDED
@@ -0,0 +1,2029 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02215v1 [math.CV] 5 Jan 2023
2
+ ON 1/2 ESTIMATE FOR GLOBAL NEWLANDER-NIRENBERG THEOREM
3
+ ZIMING SHI
4
+ Dedicated to Prof. Xianghong Gong for his 60th Birthday
5
+ Abstract. Given a formally integrable almost complex structure X defined on the closure of a
6
+ bounded domain D ⊂ Cn, and provided that X is sufficiently close to the standard complex struc-
7
+ ture, the global Newlander-Nirenberg problem asks whether there exists a global diffeomorphism
8
+ defined on D that transform X into the standard complex structure, under certain geometric and
9
+ regularity assumptions on D. In this paper we prove a regularity result of this problem. Assuming
10
+ D is a strictly pseudoconvex domain in Cn with C2 boundary, and that the almost structure X is
11
+ of the H¨older-Zygmund class Λr(D) for r > 1, we prove the existence of a global diffeomorphism
12
+ (independent of r) in the class Λr+ 1
13
+ 2 −ε(D), for any ε > 0.
14
+ Contents
15
+ 1.
16
+ Introduction
17
+ 1
18
+ 2.
19
+ Preliminaries
20
+ 3
21
+ 2.1.
22
+ Function space and stability of constant
23
+ 3
24
+ 2.2.
25
+ Smoothing operator on bounded Lipschitz domains
26
+ 7
27
+ 2.3.
28
+ Paraproduct estimate
29
+ 10
30
+ 2.4.
31
+ ∂ equation in H¨older space of negative smooth index
32
+ 12
33
+ 3.
34
+ Norm estimates for the error term
35
+ 14
36
+ 4.
37
+ Iteration Scheme and convergence of maps
38
+ 18
39
+ References
40
+ 22
41
+ 1. Introduction
42
+ The main goal of the paper is the following result:
43
+ Theorem 1.1. Let D be a domain in Cn with C2 boundary that is strictly pseudoconvex with respect
44
+ to the standard complex structure in Cn, for n ≥ 2. Let X be a Λr(D) formally integrable complex
45
+ structure on D, for 1 < r ≤ ∞, and and let Xst be the standard complex structure in Cn. For each
46
+ ε > 0, there is δ = δ(ε) > 0 such that if |X − Xst|D, 3
47
+ 2 +ε < δ(ε), then there exists an embedding
48
+ F of D into Cn such that F transforms X into Xst. Furthermore, F ∈ Λr+ 1
49
+ 2
50
+
51
+ (D) if r < ∞ and
52
+ F ∈ C∞(D) if r = ∞. If bD is C3, the hypothesis can be weakened to |X − Xst|D,1+ε < δ(ε).
53
+ 2020 Mathematics Subject Classification. 32T15, 32Q60, 32Q40.
54
+ 1
55
+
56
+ 2
57
+ An almost complex structure on a real differentiable manifold M is a tensor field J, which is,
58
+ at every point x of M, an endomorphism of the tangent space Tx(M) such that J2 = −I, where I
59
+ denotes the identity transformation of Tx(M). If M is a complex manifold with local holomorphic
60
+ coordinate chart {Uα, zα}α, then one can define J
61
+
62
+
63
+ ∂zk
64
+
65
+ = i
66
+ � ∂
67
+ ∂zk
68
+
69
+ and J
70
+
71
+
72
+ ∂zk
73
+
74
+ = −i
75
+
76
+
77
+ ∂zk
78
+
79
+ , which
80
+ is a globally well-defined almost complex structure on M. Consequently we have the decomposition
81
+ of the complexified tangent bundle into the +i and −i eigenspaces of J: TCM = T +M ⊕ T −M.
82
+ Conversely, one wants to know when an almost complex structure J is induced by some complex
83
+ structure. In other words, the question is whether there exists a diffeomorphism so that in the
84
+ new coordinate the vector fields making up the i-eigenspace of J defines a holomorphic coordinate
85
+ system. In this case we say that X is integrable, and the underlying complex structure is said to
86
+ be compatible with X.
87
+ We call an almost complex structure X formally integrable if T +M is closed under the bracket
88
+ [·, ·]. The classical Newlander-Nirenberg theorem states that an almost complex structure defined in
89
+ a neighborhood of an interior point of M is locally integrable if and only if it is formally integrable.
90
+ For real analytic X, the Newlander-Nirenberg theorem follows easily from the analytic Frobenius
91
+ theorem. However if X is only C∞ or less regular, the proof becomes much more difficult. Here
92
+ we refer to the work of Newlander-Nirenberg [NN57], Nijenhuis-Woolf [NW63], Malgrange [Mal69]
93
+ and Webster [Web89]. We point out that Webster’s proof yields the sharp regularity result in the
94
+ H¨older space Cr, namely, if X ∈ Ck+α in a neighborhood of a point p for k ≥ 1 and α ∈ (0, 1),
95
+ then there exists a local diffeomorphism near p of the class Ck+1+α transforming X to the complex
96
+ structure.
97
+ We now consider the analogous global problem.
98
+ Suppose an almost complex structure X is
99
+ defined on the closure of a subset D in a complex manifold, such that X is a small perturbation of
100
+ the given complex structure as measured by certain norms (e.g. H¨older-Zygmund). The problem
101
+ asks whether there exists a global holomorphic coordinate system on D which is compatible with
102
+ X.
103
+ Under the assumption that both boundary and almost complex structures are C∞, Hamilton
104
+ [Ham77] proved a more general version of Theorem 1.1. More specifically, he showed that global
105
+ Newlander-Nirenberg theorem holds for a domain D which is a relatively compact subset with C∞
106
+ boundary in a complex manifold Y , such that H1(D, T D) = 0, where T stands for the holomorphic
107
+ tangent bundle of D, and the Levi form on bD has either n − 1 positive eigenvalues or 1 negative
108
+ eigenvalue. Catlin [Cat88] proved a local Newlander-Nirenberg theorem with smooth pseudoconvex
109
+ boundary. Most recently, Gan-Gong studied the problem when D is a strictly pseudoconvex domain
110
+ in Cn with C2 boundary. Assuming X ∈ Λr(D), r > 5, they proved the existence of a diffeomor-
111
+ phism in the class Λr−1(D). However for this result they had to assume that |X − Xst|Λr(D) < δ(r)
112
+ for some sufficiently small δ(r).
113
+ We now describe our proof, which is based on the rapid convergence scheme of [Web89] and [GG].
114
+ Given D0 with an initial almost complex structure X0, we look for a succession of diffeomorphisms
115
+ {Fi}∞
116
+ i=1 that maps Di−1 with structure Xi−1 to a new domain Di with structure Xi.
117
+ During
118
+ the iteration, the error |Ai| = |Xi − Xst|C0(Di) converges to 0 while each Di remains strictly
119
+ pseudoconvex.
120
+ In the end we have the convergence of �Fi = Fi ◦ · · · ◦ F1 to a diffeomorphism
121
+ F : D0 → D∞ with F∗X0 = Xst. The map Fi is constructed by using a ∂ homotopy formula
122
+ Ai = ∂PAi + Q∂Ai and setting Fi = I − PAi, where I is the identity map on Di. In Webster’s
123
+ proof for the classical Newlander-Nirenberg theorem, the operator P gains one derivative in the
124
+ interior and there is no loss of derivative at the iteration step. Hence he is able to prove the rapid
125
+ convergence of the error term for all derivatives: |Ai+1|k+α ≤ |Ai|2
126
+ k+α for any positive integer k
127
+ and α ∈ (0, 1). For the global problem this is no longer true since the operator P gains only 1/2
128
+ derivative up to boundary, and there is loss of 1/2 derivative at each step, meaning the iteration
129
+ will break down after finite iteration. To address this issue, Gan-Gong [GG] applied a smoothing
130
+
131
+ 3
132
+ operator at each step. The cost for doing this is that one needs to estimate both the lower and higher
133
+ order derivatives and use the convexity of norms to estimate the intermediate derivatives. In this
134
+ case one still have the rapid convergence of the lower-order norms, but not for higher-order norms.
135
+ In the iteration scheme of Gan-Gong, the higher-order norms blow up like |Ai+1|r ≤ Crt− 1
136
+ 2 |Ai|r,
137
+ r > 5, where t is the parameter in the smoothing operator that tends to 0. In our case, we use a
138
+ different solution operator Fi which allows us to prove the estimate
139
+ (1.1)
140
+ |Ai+1|r ≤ Cr|Ai|r,
141
+ r > 1.
142
+ The key is the construction of smoothing operator on bounded Lipschitz domains. Consequently
143
+ we are able to obtain a gain of 1/2 − ε estimate for any ε > 0. This is the best possible estimate
144
+ using current method, due to the convex interpolation of norms.
145
+ The paper is organized as follows. In Section 2, we recall some basic properties of the H¨older
146
+ Zygmund norm.
147
+ In particular we show it has the Littlewood-Paley characterization using the
148
+ Besov norm Bs
149
+ ∞,∞. In Section 2.2 we construct the important Moser-type smoothing operator on
150
+ bounded Lipschitz domains. We also prove a commutator estimate which is crucial for bounding
151
+ the norms of the error in the iteration. In Section 2.3 we prove a paraproduct estimate. The idea
152
+ is that if both u, v are Λs for s > − 1
153
+ 2, we can define the paraproduct uv in the space Λ− 1
154
+ 2 by using
155
+ the equivalent Littlewood-Paley characterization of Zygmund norm. This result will be used in the
156
+ case of C3 boundary to optimize the assumption on the original almost complex structure. To this
157
+ end, we also need a ∂ homotopy operator which gains 1/2 derivative in negative Zygmund space.
158
+ We prove this result in section 2.4, using the same method we developed in [SY21a] for Sobolev
159
+ space. In section 3 we derive the estimates for the lower and higher order norms of the new error
160
+ term in term of the norms of old error term, for each iteration. In section 4 we set up the induction
161
+ scheme and establish the rapid convergence of the lower order norms and estimate (1.1) for higher
162
+ order norm. Finally we use the convexity of norms to show that the composition of the iterating
163
+ maps converge to the limiting diffeomorphism in the appropriate norm.
164
+ Acknowledgment. The author would like to thank Liding Yao and Xianghong Gong for many helpful
165
+ discussions.
166
+ 2. Preliminaries
167
+ 2.1. Function space and stability of constant. In this section, we recall some basic results for
168
+ the standard H¨older space Cr(D) with norm ∥ · ∥D,r, 0 ≤ r < ∞, and the H¨older-Zygmund space
169
+ Λr with norm | · |D,r, 0 < r < ∞.
170
+ For a bounded Lipschitz domain D, the following H¨older estimates for interpolation, product
171
+ rule and chain rule are well-known.
172
+ ∥u∥D,(1−θ)a+θb ≤ Ca,b∥u∥1−θ
173
+ D,a∥u∥θ
174
+ D,b,
175
+ 0 ≤ θ ≤ 1;
176
+ ∥uv∥D,a ≤ Ca(∥u∥D,a∥v∥D,0 + ∥u∥D,0∥v∥D,a)
177
+ a ≥ 0;
178
+ ∥u ◦ ϕ∥D,a ≤ Ca
179
+
180
+ ∥u∥D′,a∥ϕ∥a
181
+ D,1 + ∥u∥D′,1∥ϕ∥D,a + ∥u∥D′,0
182
+
183
+ ,
184
+ a ≥ 0.
185
+ Here ϕ : D → D′ is a C1 map between two bounded Lipschitz domains D, D′.
186
+ Definition 2.1 (H¨older-Zygmund). Let U ⊆ Rd be an open subset. We define the H¨older-Zygmund
187
+ space Λs(U) for s ∈ R by the following:
188
+ • For 0 < s < 1, Λs(U) consists of all f ∈ C0(U) such that ∥f∥Λs(U) := sup
189
+ U
190
+ |f|+ sup
191
+ x,y∈U
192
+ |f(x)−f(y)|
193
+ |x−y|s
194
+ <
195
+ ∞.
196
+ • Λ1(U) consists of all f ∈ C0(U) such that ∥f∥Λ1(U) := sup
197
+ U
198
+ |f|+
199
+ sup
200
+ x,y∈U; x+y
201
+ 2 ∈U
202
+ |f(x)+f(y)−2f( x+y
203
+ 2 )|
204
+ |x−y|
205
+ <
206
+ ∞.
207
+
208
+ 4
209
+ • For s > 1 recursively, Λs(U) consists of all f ∈ Λs−1(U) such that ∇f ∈ Λs−1(U; CN). We
210
+ define ∥f∥Λs(U) := ∥f∥Λs−1(U) + �N
211
+ j=1 ∥Djf∥Λs−1(U).
212
+ • For s ≤ 0 recursively, Λs(U) consists of all distributions that have the form g0 + �N
213
+ j=1 ∂jgj
214
+ where g0, . . . , gN ∈ Λs+1(U).
215
+ We define ∥f∥Λs(U) := inf{�N
216
+ j=0 ∥gj∥Λs+1(U) : f = g0 +
217
+ �N
218
+ j=1 ∂jgj ∈ D′(U)}.
219
+ • We define C∞(U) := �
220
+ s>0 Λs(U) be the space of bounded smooth functions.
221
+ Like in the case of H¨older norm, we have the following estimates for the H¨older-Zygmund norm:
222
+ Lemma 2.2. [GG, Lemma 3.2] Let D, D′ be connected bounded Lipschitz domains and let ϕ maps
223
+ D into D′. Suppose that ∥ϕ∥D,1 < C. Then we have
224
+ |u|D,(1−θ)a+θb ≤ Ca,b(D)|u|1−θ
225
+ D,a|u|θ
226
+ D,b,
227
+ 0 ≤ θ ≤ 1,
228
+ a, b > 0.
229
+ (2.1)
230
+ |uv|D,a ≤ Ca(|u|D,a∥v∥D,0 + ∥u∥D,0|v|D,a),
231
+ a > 0;
232
+ (2.2)
233
+ |u ◦ ϕ|D,1 ≤ C(D, D′)|u|D′,1(1 + C1/ε∥ϕ∥
234
+ 1
235
+ 1+ε
236
+ D,1+ε);
237
+ |u ◦ ϕ|D,a ≤ C(a, D, D′)(C1/ε|u|D′,a∥ϕ∥
238
+ 1+2ε
239
+ 1+ε
240
+ D,1+ε + ∥u∥D′,1|ϕ|D,a + ∥u∥D′,0),
241
+ a > 1.
242
+ (2.3)
243
+ |u ◦ ϕ|D,a ≤ |u|D′,a∥ϕ∥a
244
+ D,1,
245
+ 0 < a < 1.
246
+ (2.4)
247
+ Here C1/ε is a positive constant depending on ε that tends to ∞ as ε → 0.
248
+ We also need the following more general chain rule estimate. The proof for H¨older norms can be
249
+ found in the appendix of [Gon20] and the estimate for Zygmund norms can be done similarly. We
250
+ leave the details to the reader.
251
+ Lemma 2.3. Let D be a sequence of Lipschitz domains in Rd of which the Lipschitz constants are
252
+ bounded. Let Fi = I + fi map Di into Di+1, with ∥fi∥1 ≤ C0. Then
253
+ ∥u ◦ Fm ◦ · · · ◦ F1∥D0,r ≤ Cm
254
+ r
255
+
256
+ ∥u∥r +
257
+
258
+ i
259
+ ∥u∥1∥fi∥r + ∥u∥r∥fi∥1
260
+
261
+ ,
262
+ r ≥ 0;
263
+ |u ◦ Fm ◦ · · · ◦ F1|D0,r ≤ Cm
264
+ r
265
+
266
+ |u|r +
267
+
268
+ i
269
+ ∥u∥1|fi|r + C1/ε|u|r∥fi∥
270
+ 1
271
+ 1+ε
272
+ 1+ε
273
+
274
+ ,
275
+ r > 1.
276
+ We now recall the definition of Besov space, which includes the H¨older-Zygmund space as a
277
+ special case.
278
+ In what follows we denote by S ′(Rd) the space of tempered distributions, and for an arbitrary
279
+ open subset U ⊂ Rd, we denote by S ′(U) := { �f|U : �f ∈ S ′(Rd)} the space of distributions in U
280
+ which can be extended to tempered distributions in Rd.
281
+ Definition 2.4. A classical Littlewood-Paley family λ is a collection of Schwartz functions λj such
282
+ that the Fourier transform �λj(ξ) =
283
+
284
+ Rd λj(x)e−2πix·ξ satisfies
285
+ • �λ0 ∈ C∞
286
+ c (B2(0)) and �λ0 ≡ 1 in B1(0);
287
+ • �λj(ξ) = �λ0(2−jξ) − �λ0(2−(j−1)ξ) for j ≥ 1 and ξ ∈ Rd.
288
+ We denote by C = C(Rd) the set of all such families λ.
289
+ Definition 2.5. We use S0(Rd) to denote the space of all infinite order moment vanishing Schwartz
290
+ functions, that is, all f ∈ S (Rd) such that
291
+
292
+ Rd xαf(x) dx = 0 for all α ∈ Nd, or equivalently,
293
+ f ∈ S (Rd) such that �f(ξ) = O(|ξ|∞) as ξ → 0.
294
+ Definition 2.6. A generalized Littlewood-Paley family η = (ηj)∞
295
+ j=1 is a collection of Schwartz
296
+ functions depending only on η1, such that
297
+
298
+ 5
299
+ • η1 ∈ S (Rd) and all its moments vanish.
300
+ • ηj = 2(j−1)dη1(2j−1x) for j ≥ 2, x ∈ Rd.
301
+ We denote by G = G(Rd) the set of all such families η.
302
+ Notation 2.7. In Rd, we use the xd-directional cone K := {(x′, xd) : xd > |x′|} and its reflection
303
+ −K := {(x′, xd) : xd < −|x′|}.
304
+ Definition 2.8. A K-Littlewood-Paley pair is a collection of Schwartz functions (φj, ψj)∞
305
+ j=0 such
306
+ that
307
+ • φ = (φj)∞
308
+ j=1 and ψ = (ψj)∞
309
+ j=1 ∈ G.
310
+ • suppφj, supp ψj ⊂ −K ∩ {xd < −2−j} for all j ≥ 0.
311
+ • �∞
312
+ j=0 φj = �∞
313
+ j=0 ψj ∗ φj = δ0 is the Direc delta measure at 0 ∈ Rd.
314
+ Proposition 2.9. Let η0, θ0 ∈ S0(Rd) and define ηj(x) := 2jdη0(2jx) and θj(x) := 2jdθ0(2jx) for
315
+ j ∈ Z+. Then for any M, N ≥ 0, there is C = C(η, θ, M, N) > 0 such that
316
+
317
+ Rd |ηj ∗ θk(x)|(1 + 2max(j,k)|x|)N dx ≤ C2−M|j−k|,
318
+ ∀j, k ∈ N.
319
+ Let s ∈ R and 1 ≤ p, q ≤ ∞. Let λ ∈ C. The nonhomogeneous Besov norm Bs
320
+ p,q(λ) of u ∈ S ′(Rd)
321
+ is defined by
322
+ ∥u∥Bsp,q(λ) =
323
+ ���
324
+
325
+ 2js|λj ∗ u|Lp�
326
+ j∈N
327
+ ���
328
+ ℓq(N) < ∞.
329
+ The norm topology is independent of the choice of λ. In other words, for any λ, λ′ ∈ C, 1 ≤ p, q ≤ ∞
330
+ and s ∈ R, there is a C = Cλ,λ′,p,q,s > 0 such that for every f ∈ S ′(Rd),
331
+ ∥f∥Bp,q(λ) ≤ C∥f∥Bp,q(λ′).
332
+ The reader may refer to [Tri10, Prop.2.3.2] for the proof of this fact.
333
+ For this reason we will
334
+ henceforth drop λ in the definition of the norm and write simply ∥ · ∥Bsp,q.
335
+ Definition 2.10. The nonhomogeneous Besov space Bs
336
+ p,q(Rd) is defined by
337
+ Bs
338
+ p,q(Rd) = {u ∈ S ′(Rd) : ∥u∥Bsp,q < ∞}.
339
+ Let Ω ⊂ Rd be an arbitrary open subset. We define Bs
340
+ p,q(Ω) := { �f|Ω : �f ∈ Bs
341
+ p,q(Rd)}.
342
+ Let Ω ⊂ Rd. We denote by ˚
343
+ Bs
344
+ p,q(Ω) the norm closure of C∞
345
+ c (Ω) in Bs
346
+ p,q(Rd).
347
+ The following result establishes the equivalence between the various spaces:
348
+ Proposition 2.11. Let Cs, Λs and Bs
349
+ ∞,∞ be defined as above and let Ω ⊂ Rd is either a bounded
350
+ Lipschitz domain or the whole space. Then the following statements are true.
351
+ (i) Cs(Ω) = Λs(Ω), for all positive non-integer s.
352
+ (ii) Λs(Ω) = Bs
353
+ ∞,∞(Ω), for s ∈ R.
354
+ (iii) ˚
355
+ Bs
356
+ p,q(Ω) = {f ∈ ˚
357
+ Bs
358
+ p,q(Ω) : f|Ω
359
+ c ≡ 0}.
360
+ (iv) B−s
361
+ p,q(Ω) = [ ˚
362
+ Bs
363
+ p′,q′(Ω)]′, for 1 ≤ p, q ≤ ∞, 1
364
+ p + 1
365
+ p′ = 1, 1
366
+ q + 1
367
+ q′ = 1.
368
+ We shall frequently use the following extension operator due to Rychkov.
369
+ Proposition 2.12. [Ryc99] Let Ω be a bounded Lipschitz domain in Rd.
370
+ Then there exists a
371
+ extension operator EΩ such that
372
+ • EΩ defines a bounded map Bs
373
+ p,q(Ω) → Bs
374
+ p,q(Rd), for any 1 ≤ p, q ≤ ∞ and s ∈ R.
375
+ • EΩf|Ω = f, for f ∈ S ′(Ω).
376
+
377
+ 6
378
+ We refer the reader to [SY21b] for some more detailed properties of the Rychkov extension
379
+ operator. The following anti-derivative operator, which we introduced in [SY21a], is used in the
380
+ construction of our ∂ solution operator.
381
+ Proposition 2.13 (Anti-derivative operator with support condition). Let Ω ⊂ Rd be a bounded
382
+ Lipschitz domain. Then for any positive integer m, there exist linear operators Sm,α
383
+
384
+ : S ′(Rd) →
385
+ S ′(Rd), |α| ≤ m, such that
386
+ (i) Sm,α
387
+
388
+ : Λs(Rd) → Λs+m(Rd), for all s ∈ R.
389
+ (ii) g = �
390
+ |α|≤m ∂α(Sm,α
391
+
392
+ g) for all g ∈ S ′(Rd).
393
+ (iii) If g ∈ S ′(Rd) satisfies g|Ω ≡ 0, then (Sm,α
394
+
395
+ g)|Ω ≡ 0 for all |α| ≤ m.
396
+ Lemma 2.14. Let F = I + f be a C1 map from Br = {x ∈ Rd : ∥x∥ ≤ r} ⊂ Rd into Rd with
397
+ f(0) = 0,
398
+ ∥Df∥Br,0 ≤ θ < 1
399
+ 2
400
+ Let r′ = (1 − θ)r. Then the range of F contains Br′ and there exists a C1 inverse map G = I + g
401
+ which maps Br′ injectively into Br, with
402
+ g(0) = 0,
403
+ ∥Dg∥Br′,0 ≤ 2∥Df∥Br,0.
404
+ Assume further that f ∈ Λa+1(Br). Then g ∈ Λa+1(Br′) and
405
+ ∥Dg∥Br′,a ≤ Ca∥Df∥Br,a,
406
+ a ≥ 0;
407
+ |Dg|Br′,a ≤ Ca|Df|Br,a(1 + C1/ε∥f∥
408
+ 1+2ε
409
+ 1+ε
410
+ 1+ε )
411
+ a > 1.
412
+ In practice our f will have compact support in Br and we can take r = r′.
413
+ Lemma 2.15. Let Xα = ∂α + Aβ
414
+ α∂β be a formally integrable almost complex structure, then
415
+ ∂A = [A, ∂A].
416
+ Proof. Let Xβ = ∂β + Aα
417
+ β∂α, Xγ = ∂γ + Aη
418
+ γ∂η. The integrability condition says that [Xβ, Xγ] ∈
419
+ span Xβ. By an easy computation we obtain
420
+ [Xβ, Xγ] = XβXγ − XγXβ
421
+ =
422
+
423
+ ∂Aα
424
+ γ
425
+ ∂zβ
426
+
427
+ ∂Aα
428
+ β
429
+ ∂zγ
430
+ + Aη
431
+ β
432
+ ∂Aα
433
+ γ
434
+ ∂zη
435
+ − Aη
436
+ γ
437
+ ∂Aα
438
+ β
439
+ ∂zη
440
+
441
+
442
+ ∂zα
443
+ .
444
+ If [Xβ, Xγ] = �
445
+ ν cν
446
+ βγXν, then cν
447
+ βγ = 0 for all ν. Hence for each α, β, γ, we have
448
+ (2.5)
449
+ ∂Aα
450
+ γ
451
+ ∂zβ
452
+
453
+ ∂Aα
454
+ β
455
+ ∂zγ
456
+ = Aη
457
+ γ
458
+ ∂Aα
459
+ β
460
+ ∂zη
461
+ − Aη
462
+ β
463
+ ∂Aα
464
+ γ
465
+ ∂zη
466
+ .
467
+ Now for each α, we can identify Aα as a (0, 1)-form: Aα = �
468
+ β Aα
469
+ βdzβ, then
470
+ ∂Aα =
471
+
472
+ β<γ
473
+ (∂βAα
474
+ γ − ∂γAα
475
+ β)dzβ ∧ dzγ
476
+ ∂Aα =
477
+
478
+ η
479
+ (∂ηAα
480
+ β)dzη ∧ dzβ.
481
+ If we view ∂Aα as a matrix whose (β, γ) -entry is ∂βAα
482
+ γ − ∂γAα
483
+ β, and ∂Aα as a matrix whose
484
+ (β, η)-entry is ∂ηAα
485
+ β, then (2.5) implies that ∂A = (∂A)A − A(∂A)T .
486
+
487
+ The following result shows how an almost complex structure changes under transformation of
488
+ the form F = I + f, where I is the identity map.
489
+
490
+ 7
491
+ Lemma 2.16. Let F = I +f be a C1 map with f(0) = 0 and Df is small. The associated complex
492
+ structure {dF(Xα} has a basis {X′
493
+ α} such that X′
494
+ α + A′β
495
+ α ∂β, where A′ is given by
496
+ A(z) + ∂zf + A(z)∂zf = (I + ∂zf(z) + A(z)∂zf(z))A′ ◦ F(z).
497
+ This is proved in [Web89]. For a more detailed proof the reader may also refer to [GG, Lemma
498
+ 2.1].
499
+ The integrability condition is invariant under diffeomorphism. The proof is almost trivial but
500
+ we include here for completeness.
501
+ Lemma 2.17. Let F be a diffeomorphism defined on a domain D ⊂ Cn, and let {Xα} be a
502
+ formally integrable almost complex structure on D. Then {F∗Xα} defines a formally integrable
503
+ almost complex structure on F(D).
504
+ Proof. This follows from the fact that if [Xα, Xβ] = cγ
505
+ αβXγ, then [F∗(Xα), F∗(Xβ)] = (cγ
506
+ αβ ◦
507
+ F −1)F∗(Xγ).
508
+
509
+ 2.2. Smoothing operator on bounded Lipschitz domains.
510
+ Proposition 2.18. Let Ω be a bounded Lipschitz domain in Rd. Then there exists operator St :
511
+ S ′(Ω) → C∞(Ω) such that
512
+ (i) ∥Stu∥Ω,r ≲ ts−r∥u∥Ω,s,
513
+ s ≤ r.
514
+ (ii) ∥(I − St)u∥Ω,r ≲ ts−r∥u∥Ω,s,
515
+ s ≥ r.
516
+ Proof. First we prove the statements when the domain is a special Lipschitz domain of the form
517
+ ω = {(x′, xd) ∈ Rd : xd > ρ(x′)}. In particular, we have ω + K = ω. We also note that it suffices to
518
+ assume t = 2−N, N ∈ N. Let (φj, ψj)∞
519
+ j=0 be a K dyadic pair. We define the following smoothing
520
+ operator St on S ′(ω):
521
+ (2.6)
522
+ SK
523
+ t u :=
524
+ N
525
+
526
+ k=0
527
+ ψk ∗ φk ∗ u,
528
+ t = 2−N.
529
+ Using the equivalence of the H¨older-Zygmund Λs norm and the Besov Bs
530
+ ∞,∞-norm, it suffices to
531
+ prove that
532
+ sup
533
+ j≥0
534
+ 2jr|λj ∗ (SK
535
+ t u)|L���(Ω) ≲ ts−r sup
536
+ j≥0
537
+ 2js|φj ∗ u|L∞(Ω).
538
+ We have
539
+ sup
540
+ j≥0
541
+ 2jr|λj ∗ (SK
542
+ t u)|L∞(ω) = sup
543
+ j≥0
544
+ 2jr
545
+ �����λj ∗
546
+ N
547
+
548
+ k=0
549
+ ψk ∗ φk ∗ u
550
+ �����
551
+ L∞(ω)
552
+ ≤ sup
553
+ j≥0
554
+ 2jr
555
+ N
556
+
557
+ k=0
558
+ |λj ∗ ψk ∗ φk ∗ u|L∞(ω)
559
+ ≤ sup
560
+ j≥0
561
+ 2j(r−s)2js
562
+ N
563
+
564
+ k=0
565
+ |λj ∗ ψk|L1(Ω)|φk ∗ u|L∞(ω)
566
+ where in the last inequality we used Young’s inequality. By Proposition 2.9, the last expression is
567
+ bounded up to a constant multiple C = C(M) by
568
+ sup
569
+ j≥0
570
+ 2j(r−s)2js
571
+ N
572
+
573
+ k=0
574
+ 2−M|j−k||φk ∗ u|L∞(ω) = 2N(r−s) sup
575
+ j≥0
576
+ 2(j−N)(r−s)2js
577
+ N
578
+
579
+ k=0
580
+ 2−M|j−k||φk ∗ u|L∞(ω).
581
+
582
+ 8
583
+ If j < N, then 2(j−N)(r−s)2− M
584
+ 2 |j−k| < 1. If j ≥ N, then |j − k| = j − k ≥ j − N for k ≤ N,
585
+ so 2− M
586
+ 2 |j−k| ≤ 2− M
587
+ 2 (j−N). It follows that 2(j−N)(r−s)2− M
588
+ 2 |j−k| ≤ 2(j−N)(r−s− M
589
+ 2 ) < 1 if we choose
590
+ M > 2(r − s). In any case, the above estimate leads to
591
+ (2.7)
592
+ sup
593
+ j≥0
594
+ 2jr|λj ∗ (SK
595
+ t u)|L∞(ω) ≤ 2N(r−s) sup
596
+ j≥0
597
+ 2js
598
+ N
599
+
600
+ k=0
601
+ 2− M
602
+ 2 |j−k||φk ∗ u|L∞(ω)
603
+ ≤ 2N(r−s) sup
604
+ j≥0
605
+ N
606
+
607
+ k=0
608
+ 2(s− M
609
+ 2 )|j−k|2ks|φk ∗ u|L∞(ω)
610
+ Here we assume that M > 2s. Let
611
+ u[j] := 2j(s− M
612
+ 2 ),
613
+ v[j] = 2js|φj ∗ f|L∞(ω).
614
+ Then
615
+ sup
616
+ j≥0
617
+ N
618
+
619
+ k=0
620
+ 2(s− M
621
+ 2 )|j−k|2ks|φk ∗ u|L∞(ω) = |u ∗ v|l∞ ≤ |u|l1|v|l∞ ≲ |v|l∞ = sup
622
+ j≥0
623
+ 2js|φj ∗ f|L∞(ω).
624
+ Thus we get from (2.7)
625
+ sup
626
+ j≥0
627
+ 2jr|λj ∗ (SK
628
+ t u)|L∞(ω) ≤ ts−r sup
629
+ j≥0
630
+ 2js|φj ∗ f|L∞(ω).
631
+ In other words, we have shown that |SK
632
+ t u|Λr(ω) ≤ ts−r|u|Λs(ω).
633
+ (ii) Assume now that s ≥ r. From (2.6) we have
634
+ (I − SK
635
+ t )u =
636
+
637
+ k>N
638
+ ψk ∗ φk ∗ u.
639
+ It suffices to show that
640
+ sup
641
+ j≥0
642
+ 2jr|λj ∗ [(I − SK
643
+ t )u]|L∞(ω) ≲ ts−r sup
644
+ j≥0
645
+ 2js|φj ∗ u|L∞(ω).
646
+ We have
647
+ sup
648
+ j≥0
649
+ 2jr|λj ∗ [(I − SK
650
+ t )u]|L∞(ω) = sup
651
+ j≥0
652
+ 2jr
653
+ �����λj ∗
654
+
655
+
656
+ k=N+1
657
+ ψk ∗ φk ∗ u
658
+ �����
659
+ L∞(ω)
660
+ ≤ 2jr sup
661
+ j≥0
662
+
663
+
664
+ k=N+1
665
+ |λj ∗ ψk|L1(ω)|φk ∗ u|L∞(ω)
666
+ By Proposition 2.9, the last expression is bounded up to a constant multiple C = C(M) by
667
+ sup
668
+ j≥0
669
+ 2j(r−s)2js
670
+
671
+
672
+ k≥N+1
673
+ 2−M|j−k||φk ∗ u|L∞(ω) = 2N(r−s) sup
674
+ j≥0
675
+ 2(j−N)(r−s)2js
676
+ N
677
+
678
+ k=0
679
+ 2−M|j−k||φk ∗ u|L∞(ω).
680
+ If j ≥ N, then 2(j−N)(r−s) ≤ 1.
681
+ If j < N, then −(j − N) = |j − N| ≤ |j − k|.
682
+ Hence
683
+ 2(j−N)(r−s)− M
684
+ 2 |j−k| ≤ 2−(j−N)(s−r)− M
685
+ 2 |j−k| ≤ 2|j−k|(s−r− M
686
+ 2 ) < 1, where we choose M > 2(s − r). In
687
+ all cases, we get from the above estimates that
688
+ sup
689
+ j≥0
690
+ 2jr|λj ∗ [(I − SK
691
+ t )u]|L∞(ω) ≲ 2N(r−s) sup
692
+ j≥0
693
+ 2js
694
+
695
+
696
+ k=0
697
+ 2−M|j−k||φk ∗ u|L∞(ω).
698
+ The rest of the estimates follow identically as that in (i), and consequently we prove that |(I −
699
+ SK
700
+ t )u|Λr(ω) ≤ ts−r|u|Λs(ω) for s ≥ r ≥ 0.
701
+
702
+ 9
703
+ Finally we prove both (i) and (ii) for general bounded Lipschitz domains.
704
+ For this we use
705
+ partition of unity. Take an open covering {Uν}M
706
+ ν=0 of Ω such that
707
+ U0 ⊂⊂ Ω,
708
+ bΩ ⊆
709
+ M
710
+
711
+ ν=1
712
+ Uν,
713
+ Uν ∩ Ω = Uν ∩ Φν(ων),
714
+ ν = 1, . . . , M.
715
+ Here each ων is special Lipschitz domain of the form ων = {xN > ρν(x′)}, and Φν, 1 ≤ ν ≤ M are
716
+ invertible affine linear transformations.
717
+ If f has compact support in Ω, we define the smoothing operator S0
718
+ t by
719
+ S0
720
+ t f =
721
+ N
722
+
723
+ k=0
724
+ ηk ∗ θk ∗ f,
725
+ t = 2−N.
726
+ Here we can choose any Littlewood-Paley pair (θj, ηj)∞
727
+ j=0 with no cone support condition. Then
728
+ the same proof as above shows that ∥S0
729
+ t f∥Ω,r ≲ ts−r∥f∥Ω,s for 0 ≤ s ≤ r, and ∥(I − St)f∥Ω,r ≲
730
+ ts−r∥f∥Ω,s for 0 ≤ r ≤ s.
731
+ Let χν be a partition of unity associated with {Uν}, i.e. χν ∈ C∞
732
+ c (Uν) and χ0 + � χ2
733
+ ν = 1. For
734
+ each 1 ≤ ν ≤ M, we have the property ων + K = ων, where K := {x ∈ Rd : xd > |x′|}. Let SK
735
+ t be
736
+ given as above, we define
737
+ (2.8)
738
+ Stu := S0
739
+ t (χ0u) +
740
+ M
741
+
742
+ ν=1
743
+ χνSν
744
+ t (χνu),
745
+ where Sν
746
+ t g := [SK
747
+ t (g ◦ Φν)] ◦ Φ−1
748
+ ν , 1 ≤ ν ≤ M.
749
+ Applying the estimates for S0
750
+ t and SK
751
+ t , we get
752
+ ∥Stu∥Ω,k ≲ ts−r (∥χ0u∥Ω,s + ∥χνu∥Ω,s) ≲ ts−r∥u∥Ω,s,
753
+ 0 < s ≤ r
754
+ On the other hand, since u = χ0u + �M
755
+ ν=1 χ2
756
+ νu we have
757
+ ∥(I − St)u∥Ω,r ≤ ∥(I − S0
758
+ t )(χ0u)∥Ω,r +
759
+ M
760
+
761
+ ν=1
762
+ ∥χν(I − Sν
763
+ t )(χνu)∥Ω,r
764
+ ≲ ts−r (∥χ0u∥Ω,s + ∥χνu∥Ω,j) ≲ ts−r∥u∥Ω,s.
765
+ s ≥ r.
766
+
767
+ Lemma 2.19. Let Ω be a bounded Lipschitz domain and {Sν
768
+ t }M
769
+ ν=1 be the smoothing operator con-
770
+ structed in the proof of Proposition 2.18. Then [D, Sν
771
+ t ](χνf) ≡ 0 for all f ∈ Λr(Ω), r ≥ 1.
772
+ Proof. Recall that Sν
773
+ t g := [�Sν
774
+ t (g ◦ Φν)] ◦ Φ−1
775
+ ν , where �Sν
776
+ t is the smoothing operator defined on ων
777
+ and �Sν
778
+ t (g ◦ Φν) := (g ◦ Φv) ∗ φt. Hence we have
779
+ [D, Sν
780
+ t ](χνf) = D(Sν
781
+ t (χνf)) − Sν
782
+ t (D(χνf))
783
+ = D(�Sν
784
+ t [(χνf) ◦ Φν] ◦ Φ−1
785
+ ν ) − �Sν
786
+ t [D(χvf) ◦ Φν] ◦ Φ−1
787
+ ν
788
+ = (D �Sν
789
+ t [(χνf) ◦ Φν]) ◦ Φ−1
790
+ ν
791
+ · DΦ−1
792
+ ν
793
+ − �Sν
794
+ t [D((χνf) ◦ Φν)] ◦ Φ−1
795
+ ν
796
+ · DΦ−1
797
+ ν
798
+ + �Sν
799
+ t [D((χνf) ◦ Φν)] ◦ Φ−1
800
+ ν
801
+ · DΦ−1
802
+ ν
803
+ − �Sν
804
+ t [D(χνf) ◦ Φν] ◦ Φ−1
805
+ ν
806
+ = [D, �Sν
807
+ t ]((χνf) ◦ Φν) ◦ Φ−1
808
+ ν
809
+ · DΦ−1
810
+ ν .
811
+ where in the last step we used the fact that Φν is a linear transformation so that
812
+ �Sν
813
+ t [D((χνf) ◦ Φν)] ◦ Φ−1
814
+ ν
815
+ · DΦ−1
816
+ ν
817
+ = �Sν
818
+ t [D(χνf) ◦ Φν] ◦ Φ−1
819
+ ν
820
+ · DΦν · DΦ−1
821
+ ν
822
+ = �Sν
823
+ t [D(χνf) ◦ Φν] ◦ Φ−1
824
+ ν .
825
+ Now since �Sν
826
+ t is a convolution operator, we have [D, �Sν
827
+ t ] ≡ 0 on ων. Thus [D, Sν
828
+ t ](χνf) ≡ 0.
829
+
830
+
831
+ 10
832
+ Lemma 2.20. Let Ω be a bounded Lipschitz domain and let St be the smoothing operator constructed
833
+ in the proof of Proposition 2.18. Then for all u ∈ Λs(Ω) with s ≥ 1, the following holds
834
+ (2.9)
835
+ |[D, St]u|r ≲ ts−r∥u∥s,
836
+ 0 < r ≤ s.
837
+ Proof. By the formula for St (2.8), we can write
838
+ [D, St]u = DStu − StDu
839
+ = DS0
840
+ t (χ0u) +
841
+ M
842
+
843
+ ν=1
844
+ D(χνSν
845
+ t (χνu) − S0
846
+ t (χ0(Du)) −
847
+ M
848
+
849
+ ν=1
850
+ χνSν
851
+ t (χν(Du))
852
+ = {DS0
853
+ t (χ0u) − S0
854
+ t D(χ0u)} + S0
855
+ t ((Dχ0)u) +
856
+ M
857
+
858
+ ν=1
859
+ (Dχν)Sν
860
+ t (χνu)
861
+ +
862
+ M
863
+
864
+ ν=1
865
+ χνDSν
866
+ t (χνu) − χνSν
867
+ t D(χνu) +
868
+ M
869
+
870
+ ν=1
871
+ χνSν
872
+ t ((Dχν)u)
873
+ = S0
874
+ t ((Dχ0)u) +
875
+ M
876
+
877
+ ν=1
878
+ (Dχν)Sν
879
+ t (χνu) +
880
+ M
881
+
882
+ ν=1
883
+ χνSν
884
+ t ((Dχν)u).
885
+ Here to get the last line we use [D, S0
886
+ t ](χ0u) ≡ 0 and Lemma 2.19. Since 0 = D(χ0 + �M
887
+ ν=1 χ2
888
+ ν) =
889
+ Dχ0 + 2 �M
890
+ ν=1 χνD(χnu), we can write
891
+ [D, St]u = (S0
892
+ t − I)((Dχ0)u) +
893
+ M
894
+
895
+ ν=1
896
+ (Dχν)(Sν
897
+ t − I)(χνu) +
898
+ M
899
+
900
+ ν=1
901
+ χν(Sν
902
+ t − I)((Dχν)u).
903
+ Applying Proposition 2.18 to the right-hand side above we get (2.9).
904
+
905
+ 2.3. Paraproduct estimate.
906
+ Proposition 2.21. Let A be the annulus {ξ ∈ Rd : 3
907
+ 4 ≤ |ξ| ≤ 8
908
+ 3}. There exist radial functions χ
909
+ and ϕ, valued in the interval [0, 1], belonging respectively to C∞
910
+ c (B(0, 4
911
+ 3) and C∞
912
+ c (A), and such that
913
+ ∀ξ ∈ Rd, χ(ξ) +
914
+
915
+ j≥0
916
+ ϕ(2−jξ) = 1,
917
+ |j − j′| ≥ 2 =⇒ suppϕ(2−j·) ∩ suppϕ(2−j′·) = ∅,
918
+ j ≥ 1 =⇒ supp χ ∩ suppϕ(2−j·) = ∅,
919
+ j ≥ 1.
920
+ Write h = F−1ϕ and �h = F−1χ. The non-homogeneous dyadic blocks ∆j are defined by
921
+ ∆ju = 0,
922
+ if j ≤ −2,
923
+ ∆−1u = χ(D)u =
924
+
925
+ Rd
926
+ �h(y)u(x − y) dy,
927
+ and
928
+ ∆ju = ϕ(2−jD)u = 2jd
929
+
930
+ Rd h(2jy)u(x − y) dy
931
+ if j ≥ 0.
932
+ The nonhomogeneous low frequency cut-off operator Sj is defined by
933
+ Sju =
934
+
935
+ ℓ≤j−1
936
+ ∆ℓu.
937
+ Let u, v ∈ S ′. The nonhomogeneous paraproduct of v by u is defined by
938
+ (2.10)
939
+ Tuv =
940
+
941
+ j
942
+ Sj−1u ∆jv.
943
+
944
+ 11
945
+ The nonhomogeneous remainder of u and v is defined by
946
+ R(u, v) =
947
+
948
+ |i−j|≤1
949
+ ∆iu ∆jv.
950
+ Formally we have the following Bony decomposition:
951
+ uv = Tuv + Tvu + R(u, v).
952
+ Proposition 2.22. [BCD11, Theorem 2.82] For any couple of real numbers (s, t) with t negative
953
+ and any (p, r1, r2) ∈ [1, ∞]3:
954
+ ∥T∥L(L∞×Bsp,r;Bsp,r) ≤ C|s|+1;
955
+ ∥T∥L(Bt∞,r1×Bs∞,r2;Bs+t
956
+ p,r ) ≤ C|s+t|+1
957
+ −t
958
+ ,
959
+ with 1
960
+ r := min
961
+
962
+ 1, 1
963
+ r1
964
+ + 1
965
+ r2
966
+
967
+ .
968
+ In particular, by taking p = r1 = r2 = ∞, we have
969
+ ∥T∥L(Λt×Λs;Λt+s) ≤ C|s+t|+1
970
+ −t
971
+ .
972
+ Proposition 2.23. [BCD11, Theorem 2.85] Let (s1, s2) ∈ R2 and (p1, p2, r1, r2) ∈ [1, ∞]4. Suppose
973
+ that
974
+ 1
975
+ p := 1
976
+ p1
977
+ + 1
978
+ p2
979
+ ≤ 1
980
+ and
981
+ 1
982
+ r := 1
983
+ r1
984
+ + 1
985
+ r2
986
+ ≤ 1.
987
+ If s1 + s2 > 0, then there exists a constant C > 0 such that, for any (u, v) in Bs1
988
+ p1,r1 × Bs1
989
+ p2,r2,
990
+ ∥R(u, v)∥Bs1+s2
991
+ p,r
992
+ ≤ C|s1+s2|+1
993
+ s1 + s2
994
+ ∥u∥Bs1
995
+ p1,r1∥v∥Bs2
996
+ p2,r2.
997
+ In particular, by taking p = p1 = p2 = r1 = r2 = ∞, we have
998
+ ∥R(u, v)∥Λs1+s2 ≤ C|s1+s2|+1
999
+ s1 + s2
1000
+ ∥u∥Λs1∥v∥Λs2.
1001
+ Proposition 2.24. Let ε > 0. Then for any m ∈ (1
1002
+ 2, 1),
1003
+ |[∂A, A]|m−1−ε ≤ Cε,m|A|2
1004
+ m,
1005
+ where Cε,m tends to ∞ as ε → 0 or m → 1.
1006
+ Proof. First we apply Rychkov’s extension operator to A and denote the extended function still by
1007
+ A. Hence we can assume that A ∈ Λm(Rd). By the Bony decomposition, we can write
1008
+ [∂A, A] = T∂AA + TA(∂A) + R(A, ∂A).
1009
+ By Proposition 2.22, we get for t < 0,
1010
+ |T∂AA|D,m−1 ≤ C|s+t|+1
1011
+ −t
1012
+ |∂A|t|A|s,
1013
+ where t + s = m − 1 < 0. Choosing t = m − 1 and s = 0, we get
1014
+ (2.11)
1015
+ |T∂AA|D,m−1 ≤
1016
+ Cm
1017
+ 1 − m|∂A|m−1|A|0 ≤
1018
+ Cm
1019
+ 1 − m|A|2
1020
+ m.
1021
+ By Proposition 2.22 again, we get for t < 0,
1022
+ |TA(∂A)|D,m−1 ≤ C|s+t|+1
1023
+ −t
1024
+ |A|t|∂A|s.
1025
+ Choosing t = −ε and s = m − 1 + ε for ε > 0, we get
1026
+ |TA(∂A)|D,m−1 ≤ Cm
1027
+ ε |A|−ε|∂A|m−1+ε ≤ Cm
1028
+ ε |A|−ε|A|m+ε ≤ Cm
1029
+ ε |A|2
1030
+ m+ε.
1031
+
1032
+ 12
1033
+ Replacing m by m − ε in the above inequality we get
1034
+ (2.12)
1035
+ |TA(∂A)|D,m−1−ε ≤ Cm
1036
+ ε |A|2
1037
+ m.
1038
+ Finally applying Proposition 2.23 we get for any r > 0
1039
+ |R(∂A, A)|−r+2ε ≤ |R(∂A, A)|2ε ≤ |∂A|ε−r|A|ε+r ≤ |A|ε−r+1|A|ε+r
1040
+ If r ≤ 1
1041
+ 2, then ε − r + 1 ≥ ε + r, and the above implies
1042
+ (2.13)
1043
+ |R(∂A, A)|−r+2ε ≤ |A|2
1044
+ −r+ε+1.
1045
+ Set m − 1 = −r + 2ε. Then −r + ε + 1 = m − ε, and (2.13) gives
1046
+ (2.14)
1047
+ |R(∂A, A)|m−1 ≤ |A|2
1048
+ m−ε ≤ |A|2
1049
+ m,
1050
+ where m = −r + 1 + 2ε ≥ 1
1051
+ 2 + 2ε. Putting together estimates (2.11), (2.12) and (2.14) we obtain
1052
+ the desired conclusion.
1053
+
1054
+ 2.4. ∂ equation in H¨older space of negative smooth index.
1055
+ Proposition 2.25. Let Ω be a bounded Lipschitz domain and let δ(x) denote the distance function
1056
+ to the boundary bΩ.
1057
+ Let m ∈ N and r ∈ R be such that r < m.
1058
+ Suppose u ∈ Λm
1059
+ loc(Ω) and
1060
+ |δm−rDmu|L∞(Ω) < ∞, then there exists a constant C = C(Ω, r) such that
1061
+ (2.15)
1062
+ |u|Ω,r ≤ C
1063
+
1064
+ |β|≤m
1065
+ ∥δm−rDβu∥L∞(Ω).
1066
+ Proof. By the property of the H¨older-Zygmund norm (see for example [Ste70, Chapter V] or [SY21b,
1067
+ Theorem 1.1]), we have the following equivalence:
1068
+ (2.16)
1069
+ |u|Ω,r ≈
1070
+
1071
+ |α|≤m
1072
+ |Dαu|Ω,r−m,
1073
+ for every m ∈ N.
1074
+ We now claim that
1075
+ |u|Ω,−s ≤ C∥δsu∥L∞(Ω),
1076
+ s > 0,
1077
+ for all u ∈ L∞
1078
+ loc(Ω). Assume the claim is true. Then by choosing m > r in (2.16) we obtain (2.15).
1079
+ It remains to prove the claim. By Proposition 2.11, we have Λ−s(Ω) = B−s
1080
+ ∞,∞(Ω) = [ ˚
1081
+ Bs
1082
+ 1,1(Ω)]′.
1083
+ Notice that
1084
+ �����sup
1085
+ j∈N
1086
+ 2js|λj ∗ f|
1087
+ �����
1088
+ L1(Ω)
1089
+ ≤ C(Ω)
1090
+ ��2js|λj ∗ f|L1(Ω)
1091
+ ��
1092
+ l1(N) .
1093
+ The left-hand side can be identified as the Tribel-Lizorkin norm ∥ · ∥F s
1094
+ 1,∞(Ω). By [Yao22, Corollary
1095
+ 5.5], we have the following embedding of Banach spaces:
1096
+ ˚
1097
+ F s
1098
+ 1,∞(Ω) ֒→ L1(Ω, δ−s).
1099
+ Hence for every f ∈ L∞(Ω, δs),
1100
+ |f|Ω,−s =
1101
+ sup
1102
+ g∈ ˚
1103
+ B1,1(Ω), ∥g∥Bs
1104
+ 1,1(Ω)≤1
1105
+ ⟨f, g⟩ ≤
1106
+ sup
1107
+ g∈L1(Ω,δ−s dx), ∥δ−sg∥L1(Ω)≤Cs
1108
+
1109
+
1110
+ |fg|
1111
+
1112
+ sup
1113
+ ∥δ−sg∥L1(Ω)≤Cs
1114
+
1115
+
1116
+ |δsf||δ−sg| ≤ Cs∥δsf∥L∞(Ω).
1117
+
1118
+ Theorem 2.26. Let Ω be a strictly pseudoconvex domain with Ck+2 boundary, where k is a non-
1119
+ negative integer. Then there exists a linear operator Hq (depending on k) such that for all r > −k,
1120
+
1121
+ 13
1122
+ (i) Hq : Λr
1123
+ (0,q)(Ω) → Λ
1124
+ r+ 1
1125
+ 2
1126
+ (0,q−1)(Ω);
1127
+ (ii) u = Hqϕ is a solution to the equation ∂u = ϕ for any ϕ ∈ Λr(Ω) which is ∂-closed.
1128
+ Proof. We shall use the homotopy operator Hq constructed in [SY21a], given as follows
1129
+ (2.17)
1130
+ Hqϕ(z) =
1131
+
1132
+ U
1133
+ K0
1134
+ 0,q−1(z, ·) ∧ Eϕ + (−1)|γ| �
1135
+ |γ|≤l
1136
+
1137
+ U\Ω
1138
+ Dγ(K01
1139
+ 0,q−1(z, ·)) ∧ Sl,γ
1140
+ Ω [∂, E]ϕ
1141
+ := H0
1142
+ qϕ(z) + H1
1143
+ qϕ(z).
1144
+ Here E is the extension operator of Rychkov (Proposition 2.12), and S is the anti-derivative oper-
1145
+ ator in Proposition 2.13. We multiply E and Sl,γ
1146
+
1147
+ by suitable cut-off functions so that supp(Eϕ),
1148
+ supp Sl,γ
1149
+ Ω ϕ ⊂⊂ U. The proof of (i) follows straight from Proposition 2.25 and Proposition 2.28
1150
+ below. Using (i) and arguing in the same way as the proof of [SY21a, Corollary 4.3], we can show
1151
+ that the following homotopy formula holds in the sense of distributions:
1152
+ ϕ = ∂Hqϕ + Hq+1∂ϕ.
1153
+ In particular for ϕ in Ω with Λr(Ω) which is ∂-closed, we have ∂Hϕ = ϕ.
1154
+
1155
+ In what follows we recall that the first integral and the second integral in (2.17) are denoted by
1156
+ H0
1157
+ q and H1
1158
+ q, respectively.
1159
+ Proposition 2.27. Let r ∈ R. Suppose ϕ ∈ Λr
1160
+ (0,q)(U). Then H0
1161
+ qϕ ∈ Λr+1
1162
+ (0,q−1)(Cn)
1163
+ Proposition 2.28. Let Ω ⊂ Cn be a bounded strictly pseudoconvex domain with Ck+2 boundary,
1164
+ where k is a non-negative integer. For q ≥ 1, let H1
1165
+ qϕ be given by (2.17), where we choose l to
1166
+ be any positive number greater or equal to k + 1. Let r > −k. Then for any non-negative integer
1167
+ m > r + k + 1
1168
+ 2, there exists a constant C = C(Ω, k, m, r, p) such that for all ϕ ∈ Λr
1169
+ (0,q)(Ω),
1170
+ (2.18)
1171
+ sup
1172
+ z∈Ω
1173
+ δ(z)m−r− 1
1174
+ 2Dm
1175
+ z H1
1176
+ q(z) ≤ C∥ϕ∥Λr(Ω).
1177
+ Proof. We need to estimate
1178
+ (2.19)
1179
+ δ(z)(m−r− 1
1180
+ 2)
1181
+ ������
1182
+
1183
+ |γ|≤l
1184
+
1185
+ U\Ω
1186
+ Dm
1187
+ z Dγ
1188
+ ζ K(z, ·) ∧ Sl,γ([∂, E]ϕ) dV (z)
1189
+ ������
1190
+ .
1191
+ The idea is to choose l large enough so that Sl,γ[∂, E]ϕ lies in some positive index space. Let f
1192
+ be a coefficient function of [∂, E]ϕ so that f ∈ Λr−1(U \ Ω). By Sl,γf we mean each component of
1193
+ Sl,γ([∂, E]ϕ) . In the computation below we shall fix a multi-index γ and write simply Sl for Sl,γ
1194
+ without causing ambiguity. By Proposition 2.13, Slf ∈ Λr+l−1(U \Ω). Since l ≥ k+1, and r > −k,
1195
+ we have l > −r + 1, or r − 1 + l > 0. Since f ≡ 0 in Ω, by Proposition 2.13 (iii) we have Slf ≡ 0
1196
+ in U \ Ω. Denote the above integral by Kf(z). Arguing as in the proof of [SY21a, Proposition 4.9],
1197
+ we can show that
1198
+ (2.20)
1199
+ |Kf(z)| ≲ |K0f(z)| + |K1f(z)|.
1200
+ where
1201
+ K0f(z) :=
1202
+
1203
+ U\Ω
1204
+ Slf(ζ)
1205
+ DζW(z, ζ)
1206
+ Φm+l+1(z, ζ)|ζ − z|2n−3 dV (ζ),
1207
+ K1f(z) :=
1208
+
1209
+ U\Ω
1210
+ Slf(ζ)
1211
+ Dl+1
1212
+ ζ
1213
+ W(z, ζ)
1214
+ Φm+1(z, ζ)|ζ − z|2n−3 dV (ζ).
1215
+
1216
+ 14
1217
+ We shall denote the kernels of K0 and K1 by B0(z, ζ) and B1(z, ζ), respectively. By estimates from
1218
+ the proof of [SY21a, Proposition 4.9], we have
1219
+ |B0(z)| ≲
1220
+ 1
1221
+ |Φ(z, ζ)|m+l+1|ζ − z|2n−3 ,
1222
+ |B1(z)| ≲
1223
+ δ(ζ)k−l
1224
+ |Φ(z, ζ)|m+1|ζ − z|2n−3 .
1225
+ (2.21)
1226
+ For the K0f integral, we have
1227
+ |K0f(z)| =
1228
+ �����
1229
+
1230
+ U\Ω
1231
+ Slf(ζ)B0(z, ζ) dV (ζ)
1232
+ �����
1233
+ =
1234
+
1235
+ U\Ω
1236
+
1237
+ δ(ζ)−(r−1+l)Slf(ζ)
1238
+ � �
1239
+ δ(ζ)r−1+lB0(z, ζ)
1240
+
1241
+ dV (ζ)
1242
+ ≤ ∥δ−(r−1+l)Slf∥L∞(U\Ω)
1243
+
1244
+ U\Ω
1245
+ δ(ζ)r−1+l
1246
+ |Φ(z, ζ)|m+l+1|ζ − z|2n−3 dV (ζ).
1247
+ If r − 1 + l < m + l − 1 − 1
1248
+ 2, or m > r + 1
1249
+ 2, then we can apply [SY21a, Lemma 4.8] to obtain
1250
+ |K0f(z)| ≲ ∥δ−(r−1+l)Slf∥L∞(U\Ω)δ(z)(r−1+l)−(m+l−1)+ 1
1251
+ 2 ≲ ∥f∥Λr−1(U\Ω)δ(z)r−m+ 1
1252
+ 2.
1253
+ For the K1f integral, we have using (2.21)
1254
+ |K1f(z)| =
1255
+ �����
1256
+
1257
+ U\Ω
1258
+ Slf(ζ)B1(z, ζ) dV (ζ)
1259
+ �����
1260
+ =
1261
+
1262
+ U\Ω
1263
+
1264
+ δ(ζ)−(r−1+l)Slf(ζ)
1265
+ � �
1266
+ δ(ζ)r−1+lB1(z, ζ)
1267
+
1268
+ dV (ζ)
1269
+ ≤ ∥δ−(r−1+l)Slf∥L∞(U\Ω)
1270
+
1271
+ U\Ω
1272
+ δ(ζ)r−1+l+k−l
1273
+ |Φ(z, ζ)|m+1|ζ − z|2n−3 dV (ζ).
1274
+ If r − 1 + k > −1 and r − 1 + k < m − 1 − 1
1275
+ 2, then by [SY21a, Lemma 4.8] we get
1276
+ |K1f(z)| ≲ ∥δ−(r−1+l)Slf∥L∞(U\Ω)δ(z)(r−1+k)−(m−1)+ 1
1277
+ 2 ≲ ∥f∥Λr−1(U\Ω)δ(z)r+k−m+ 1
1278
+ 2 .
1279
+ Putting together estimates for K0f and K1f and using (2.20), we get
1280
+ δ(z)m−r− 1
1281
+ 2|Kf(z)| ≲ ∥f∥Λr−1(U\Ω)δ(z)m−r− 1
1282
+ 2
1283
+
1284
+ δ(z)r−m+ 1
1285
+ 2 + δ(z)r+k−m+ 1
1286
+ 2
1287
+
1288
+ ≲ ∥f∥Λr−1(U\Ω).
1289
+ Since ∥f∥Λr−1(U\Ω) ≲ ∥ϕ∥Λr(Ω), we obtain (2.18).
1290
+
1291
+ 3. Norm estimates for the error term
1292
+ Let D0 be a strictly pseudoconvex domain in Cn. Given the initial integrable almost complex
1293
+ structure on D0, we want to find a transformation F defined on D0 to transform the structure to a
1294
+ new structure closer to the standard complex structure while D0 is transformed to a new domain
1295
+ that is still strictly pseudoconvex. We shall assume the following initial condition
1296
+ (3.1)
1297
+ t− 1
1298
+ 2 |A|D0,s ≤ 1
1299
+ C∗s
1300
+ .
1301
+ which will later be verified to hold at each induction step. Here t is the parameter of the smoothing
1302
+ operator which will converge to 0 in the iteration.
1303
+ We take the map in the form F = I + f.
1304
+ Applying the extension operator E to f we can assume that f is defined with compact support on
1305
+ some large ball B0 , where
1306
+ D0 ⊂ U ⊂ B0.
1307
+
1308
+ 15
1309
+ Below we will take f = −StPA, where St is the smoothing operator constructed in Proposition 2.18.
1310
+ By (2.18) (i) and Theorem 2.26, we have the following estimates for f:
1311
+ |f|D0,m = |StPA|D0,m ≤ Cm|PA|D0,m ≤ Cm|A|D0,m− 1
1312
+ 2 ,
1313
+ m > 0.
1314
+ (3.2)
1315
+ In particular we have
1316
+ |f|D0, 3
1317
+ 2 ≤ C2|A|D0,1.
1318
+ In view of (3.2) and the initial condition with C∗
1319
+ s chosen sufficiently large, we have
1320
+ |Df|D0,0 ≤ |f|D0,1 ≤ C|A|D0, 1
1321
+ 2 ≤ 1
1322
+ 2.
1323
+ By Lemma 2.14, there exists an inverse map G = I + g of F, which takes B0 to B0 and satisfies
1324
+ the estimate
1325
+ |Dg|Br,a ≤ Ca|Df|Br,a(1 + |f|
1326
+ 4
1327
+ 3
1328
+ 3
1329
+ 2 ) ≤ Ca|Df|Br,a,
1330
+ a > 0
1331
+ which together with (3.2) implies
1332
+ (3.3)
1333
+ |g|Br,m ≤ Cm|f|m ≤ Cm|A|D0,m− 1
1334
+ 2 ,
1335
+ m > 1.
1336
+ In particular g satisfies
1337
+ (3.4)
1338
+ |g|Br, 3
1339
+ 2 ≤ C|f|Br, 3
1340
+ 2 ≤ C|A|D0,1.
1341
+ By Lemma 2.16, the new structure takes the form
1342
+ A′ ◦ F = (I + ∂f + A∂f)−1(A + ∂f + A∂f).
1343
+ As in the proof of Lemma 2.15, we regard Aα
1344
+ β as the coefficients of the (0, 1) form Aα := Aα
1345
+ βdzβ.
1346
+ We then apply the homotopy formula component-wise to A = (A1, . . . , An) on D0 so that
1347
+ A = ∂PA + Q∂A.
1348
+ Set f = −StPA. Then we have
1349
+ (3.5)
1350
+ A + ∂f + A∂f = A − ∂(StPA) + A∂f
1351
+ = A − St∂PA + [St, ∂]PA + A∂f
1352
+ = A − St(A − Q∂A) + [St, ∂]PA + A∂f
1353
+ = (I − St)A + StQ∂A + [St, ∂]PA + A∂f.
1354
+ We shall use the following notation:
1355
+ K : ∂f + A∂f,
1356
+ I1 = (I − St)A,
1357
+ I2 = StQ∂A,
1358
+ I3 = [St, ∂]PA,
1359
+ I4 = A∂f,
1360
+ and consequently we can rewrite (3.5) as
1361
+ �A = (I + K0)−1(I1 + I2 + I3 + I4),
1362
+ �A = A′ ◦ F.
1363
+ We first estimate the Ij-s. By Proposition 2.18, we get
1364
+ (3.6)
1365
+ |I1|D0,m = |(I − St)A|D0,m ≤ Crtr−m|A|D0,r,
1366
+ 0 ≤ m ≤ r.
1367
+ Substituting s for m in (3.8) we have
1368
+ (3.7)
1369
+ |I1|D0,s ≤ Crtr−s|A|D0,r,
1370
+ 0 ≤ s ≤ r.
1371
+ Substituting m for r in (3.8) we have
1372
+ (3.8)
1373
+ |I1|D0,m ≤ Cm|A|D0,m,
1374
+ m ≥ 0
1375
+
1376
+ 16
1377
+ For I2, we consider two cases.
1378
+ Case 1: m ≥ 1. We apply Proposition 2.18 and use the integrability condition ∂A = [∂A, A] and
1379
+ the estimate for Q to get
1380
+ |I2|D0,m = |StQ∂A|D0,m ≲ t− 1
1381
+ 2 |Q∂A|D0,m− 1
1382
+ 2
1383
+ ≲ Cmt− 1
1384
+ 2|∂A|D0,m−1 = Cmt− 1
1385
+ 2 |[∂A, A]|D0,m−1
1386
+ ≲ Cmt− 1
1387
+ 2 (|A|D0,m−1|∂A|D0,0 + |∂A|D0,m−1|A|D0,0)
1388
+ ≤ Cmt− 1
1389
+ 2|A|D0,s|A|D0,m,
1390
+ m ≥ 1, s ≥ 0.
1391
+ Substituting s for m in the above inequality we get
1392
+ (3.9)
1393
+ |I2|D0,s ≤ Cst− 1
1394
+ 2|A|2
1395
+ D0,s,
1396
+ s ≥ 1.
1397
+ Alternatively, if we use the initial condition (3.1) we get
1398
+ (3.10)
1399
+ |I2|D0,m ≤ Cm|A|D0,m,
1400
+ m ≥ 1.
1401
+ Case 2: 1
1402
+ 2 < m < 1.
1403
+ For every ε > 0, we have
1404
+ |I2|D0,m = |StQ∂A|D0,m ≲m t− 1
1405
+ 2−ε|Q∂A|D0,m− 1
1406
+ 2−ε ≲ t− 1
1407
+ 2−ε|∂A|D0,m−1−ε.
1408
+ Here we assumed bD0 ∈ C3 and therefore Proposition 2.26 applies with r = m − 1 − ε > −1. By
1409
+ the integrability condition ∂A = [∂A, A] and Proposition 2.24, we get
1410
+ (3.11)
1411
+ |I2|D0,m ≲ Cε,mt− 1
1412
+ 2−ε|A|2
1413
+ D0,m,
1414
+ 1
1415
+ 2 < m < 1,
1416
+ where Cε,m → ∞ as ε �� 0 or m → 1.
1417
+ For I3, we apply Lemma 2.20 to get
1418
+ |I3|D0,m = |[St, ∂]PA|D0,m ≲ tr+ 1
1419
+ 2−m|PA|D0,r+ 1
1420
+ 2 ≲ tr+ 1
1421
+ 2 −m|A|D0,r,
1422
+ r ≥ 1
1423
+ 2,
1424
+ r + 1
1425
+ 2 ≥ m.
1426
+ (3.12)
1427
+ Substituting s for m we have
1428
+ (3.13)
1429
+ |I3|D0,s ≤ Crtr+ 1
1430
+ 2−s|A|D0,r,
1431
+ r + 1
1432
+ 2 ≥ s,
1433
+ r ≥ 1
1434
+ 2,
1435
+ s ≥ 0.
1436
+ Substituting m for r in (3.12) we have
1437
+ (3.14)
1438
+ |I3|D0,m ≤ Cm|A|D0,m.
1439
+ To estimate I4, we recall that f = −StPA, so
1440
+ |I4|D0,m = |A∂f|D0,m ≤ Cm (|A|D0,m|∂f|D0,0 + |A|D0,0|∂f|D0,m)
1441
+ ≤ Cm (|A|D0,m|f|D0,1 + |A|D0,0|f|D0,m+1)
1442
+ ≤ Cm
1443
+
1444
+ |A|D0,mt− 1
1445
+ 2 |A|D0,0 + |A|D0,0t− 1
1446
+ 2|A|D0,m
1447
+
1448
+ ≤ Cmt− 1
1449
+ 2 |A|D0,s|A|D0,m,
1450
+ m, s ≥ 0
1451
+ where we used that |f|D0,1 = |StPA|D0,1 ≲ t− 1
1452
+ 2 |PA|D0, 1
1453
+ 2 ≲ t− 1
1454
+ 2|A|D0,0, and similarly |f|D0,m+1 ≲
1455
+ Cmt− 1
1456
+ 2 |A|D0,m for any m ≥ 0. Note that if bΩ is merely C2, then |I4|D0,m ≤ Cmt− 1
1457
+ 2 |A|D0,s|A|D0,m,
1458
+ for m, s > 0. Applying the above estimate with s in place of m we get
1459
+ (3.15)
1460
+ |I4|D0,s ≤ Cst− 1
1461
+ 2|A|2
1462
+ D0,s,
1463
+ s ≥ 0.
1464
+ Alternatively, by using the initial condition (3.1), we have
1465
+ (3.16)
1466
+ |I4|D0,m ≤ Cm|A|D0,m,
1467
+ m ≥ 0
1468
+
1469
+ 17
1470
+ Next, we estimate the low and high-order norms of (I + K)−1, where K := ∂f + A∂f. By using
1471
+ f = −StPA and the initial condition (3.1), we have
1472
+ |K|D0,m ≤ |∂StPA|D0,m + |A∂StPA|D0,m
1473
+ ≤ |StPA|D0,m+1 + |A|D0,m|∂StPA|D0,0 + |A|D0,0|∂StPA|D0,m
1474
+ ≲ Cmt− 1
1475
+ 2 |A|D0,m,
1476
+ m ≥ 0.
1477
+ Applying the above estimate with m = s and using the initial condition (3.1) we get
1478
+ (3.17)
1479
+ |K|D0,s ≤ 1/C∗
1480
+ s ,
1481
+ 0 < s < 1.
1482
+ We now consider (I + K)−1. Using the formula (I + K)−1 = [det(I + K)]−1B, where B is the
1483
+ adjugate matrix of I + K, we see that every entry in (I + K)−1 is a polynomial in [det(I + K)]−1
1484
+ and entries of I5. By using the product estimate (2.2) and (3.17), we get
1485
+ (3.18)
1486
+ |(I + K)−1|D0,m ≤ Cm(1 + |K|D0,m) ≤ Cm(1 + t− 1
1487
+ 2 |A|D0,m),
1488
+ m > 0.
1489
+ In particular by the initial condition (3.1), we have
1490
+ (3.19)
1491
+ |(I + K)−1|D0,s ≤ Cs(1 + |K|D0,s) ≲ Cs,
1492
+ 0 ≤ s ≤ 1.
1493
+ We now estimate the s-norm of �A = (I + K)−1(�4
1494
+ j=1 Ij). Applying the product estimate (2.2) and
1495
+ (3.7), (3.8), (3.18), (3.19), we get
1496
+ (3.20)
1497
+ |(I + K)−1I1|m ≤ |(I + K)−1|m|I1|0 + |(I + K)−1|0|I1|m
1498
+ ≲ Cm(1 + t− 1
1499
+ 2 |A|D0,m)(t
1500
+ 1
1501
+ 2|A|D0, 1
1502
+ 2) + Cm|A|D0,m
1503
+ ≲ Cm|A|D0,m + Cm|A|D0, 1
1504
+ 2 |A|D0,m ≲ Cm|A|D0,m,
1505
+ m ≥ 0,
1506
+ where in the last inequality we used the initial condition (3.1). If 0 ≤ s < 1, we can use estimate
1507
+ (3.7) to get
1508
+ (3.21)
1509
+ |(I + K)−1I1|s ≤ |(I + K)−1|s|I1|0 + |(I + K)−1|0|I1|s
1510
+ ≲ |(I + K)−1|s|I1|s ≤ Crtr−s|A|r,
1511
+ s ≤ r.
1512
+ Using estimates (3.9), (3.10), (3.18) and (3.19) we get
1513
+ (3.22)
1514
+ |(I + K)−1I2|m ≤ |(I + K)−1|m|I2|0 + |(I + K)−1|0|I2|m
1515
+ ≲ Cm(1 + t− 1
1516
+ 2|A|D0,m)(t− 1
1517
+ 2 |A|2
1518
+ D0,s) + Cm|A|D0,m
1519
+ ≲ Cmt−1|A|2
1520
+ D0,s|A|D0,m + Cm|A|D0,m ≲ Cm|A|D0,m,
1521
+ m ≥ 1.
1522
+ If 1
1523
+ 2 < s < 1, we can use estimate (3.11) to get
1524
+ (3.23)
1525
+ |(I + K)−1I2|s ≲ |(I + K)−1|s|I2|s ≤ Cs,εt− 1
1526
+ 2 −ε|A|2
1527
+ s.
1528
+ Here Cs,ε → ∞ as ε → 0 or s → 1.
1529
+ In a similar way, by using estimates (3.13), (3.14), (3.15) and (3.16), we can show that
1530
+ (3.24)
1531
+ |(I + K)−1I3|D0,m, |(I + K)−1I4|D0,m ≲ Cm|A|D0,m,
1532
+ m ≥ 1,
1533
+ and for 1
1534
+ 2 < s < 1,
1535
+ (3.25)
1536
+ |(I + K)−1I3|D0,s ≲ Crtr−s|A|r, s ≤ r,
1537
+ |(I + K)−1I4|D0,s ≲ Cst− 1
1538
+ 2|A|2
1539
+ s.
1540
+ Combining estimates (3.20), (3.22), (3.24), we obtain for �A = (I + K)−1(�4
1541
+ j=1 Ij) the following
1542
+ m-norm estimate:
1543
+ (3.26)
1544
+ | �A|D0,m ≤ Cm|A|D0,m,
1545
+ m ≥ 1.
1546
+
1547
+ 18
1548
+ By using (3.21), (3.23) and (3.25), we obtain the following estimate for the s-norm of �A:
1549
+ | �A|D0,s ≲ Crtr−s|A|D0,r + Cs,εt− 1
1550
+ 2−ε|A|2
1551
+ D0,s,
1552
+ 1
1553
+ 2 < s < 1,
1554
+ s ≤ r.
1555
+ (3.27)
1556
+ Finally, we estimate the norms of A′ = �A ◦ G, where G = I + g = F −1. Using (3.4) and the initial
1557
+ condition, we may assume that |g| 3
1558
+ 2 < 1
1559
+ 2. Let D1 = F(D0). Applying the chain rule estimate (2.3)
1560
+ with ε = 3
1561
+ 2 to A′ on D1 and also (3.3) we obtain
1562
+ |A′|D1,m = | �A ◦ G|D1,m ≤ C(a, D)(| �
1563
+ A|D0,m|G|
1564
+ 4
1565
+ 3
1566
+ D1, 3
1567
+ 2 + ∥ �A∥D0,1|G|D1,m + ∥ �A∥D0,0)
1568
+ ≤ C(m, D)| �A|D0,m, m > 1.
1569
+ If 0 < s < 1, we can apply (2.4) to get
1570
+ |A′|D1,s = | �A ◦ G|D1,s ≤ | �A|D0,s∥G∥α
1571
+ D1,1 ≲ |A|D0,s.
1572
+ Using estimates (3.26) and (3.26) for �A, we obtain
1573
+ |A′|D1,m ≤ C(m, D)|A|D0,m,
1574
+ m > 1
1575
+ (3.28)
1576
+ |A′|D0,s ≲ Crtr−s|A|D0,r + Cs,εt− 1
1577
+ 2−ε|A|2
1578
+ D0,s,
1579
+ 1
1580
+ 2 < s < 1,
1581
+ s ≤ r.
1582
+ (3.29)
1583
+ 4. Iteration Scheme and convergence of maps
1584
+ Proposition 4.1. Let 1
1585
+ 2 < s < 1 and r > 1. Let α, β, d, λ, γ be positive numbers satisfying
1586
+ r − s − λ − γ > αd + β,
1587
+ α(2 − d) > 1
1588
+ 2 + ε + λ,
1589
+ β(d − 1) > λ,
1590
+ 1 < d < 2.
1591
+ Note that the second and fourth conditions imply that α > 1
1592
+ 2. Let D0 be a strictly pseudoconvex
1593
+ domain with a C3 defining function ρ0 on U and X(0) = ∂ + A0∂ ∈ Λr(D0) be a formally integrable
1594
+ almost complex structure. There exists a constant
1595
+ ˆt0 = ˆt0(C∗
1596
+ s , Cr, Cs,ε),
1597
+ ε = ε(r)
1598
+ such that if 0 < t0 ≤ ˆt0 and
1599
+ |A0|D0,s ≤ tα
1600
+ 0 ,
1601
+ |A0|D0,r ≤ t−γ
1602
+ 0 ,
1603
+ then the following statements are true for i = 0, 1, 2, . . .
1604
+ (i) There exists a C∞ diffeomorphism Fi = I + fi from B0 onto itself with F −1
1605
+ i
1606
+ = I + gi such
1607
+ that fi, gi satisfy
1608
+ |gi|B0, ≤
1609
+ (ii) Set ρi+1 = ρi ◦ F −1
1610
+ i
1611
+ . Then Di+1 := Fi(Di) = {z ∈ U : ρi+1 < 0} and
1612
+ ∥ρi+1 − ρ0∥U,2 ≤ ε(D0),
1613
+ (4.1)
1614
+ dist(Di+1, ∂U) ≥ dist(D0, ∂U) − Cε.
1615
+ (4.2)
1616
+ (iii) (Fi|Di)∗(X(i)) is in the span of Xi+1 := ∂ + Ai+1∂ on Di+1.
1617
+ Moreover, ai = |Ai|Di,s,
1618
+ Li = |Ai|Di,r satisfy
1619
+ ai ≤ tα
1620
+ i ,
1621
+ Li ≤ L0t−β
1622
+ i
1623
+ .
1624
+ (iv) Suppose A0 ∈ C∞(D0). There exist some η(d) > 0 independent of m and N = N(m, d) ∈ N
1625
+ such that
1626
+ Mi ≤ MNt−η
1627
+ i
1628
+ ,
1629
+ i > N.
1630
+
1631
+ 19
1632
+ Proof. We do induction on i. First we prove (ii)-(iv) for i = 0. Fix 1
1633
+ 2 < s < 1, r ≥ s, and set
1634
+ ai = |Ai|Di,s, Li = |Ai|Di,r. We choose
1635
+ (4.3)
1636
+ ˆt0 ≤
1637
+ � 1
1638
+ C∗s
1639
+
1640
+ 2
1641
+ 2α−1
1642
+ .
1643
+ Then
1644
+ t
1645
+ − 1
1646
+ 2
1647
+ 0
1648
+ |A0|D0,s ≤ t
1649
+ α− 1
1650
+ 2
1651
+ 0
1652
+ ≤ 1
1653
+ C∗s
1654
+ ,
1655
+ t0 < ˆt0.
1656
+ By (3.28)-(3.29) we have
1657
+ a1 ≤ Crtr−s
1658
+ 0
1659
+ L0 + Cs,εt− 1
1660
+ 2 −εa2
1661
+ 0
1662
+ L1 ≤ CrL0.
1663
+ For some fixed λ > 0, we further choose ˆt0 satisfying
1664
+ (4.4)
1665
+ ˆt0 ≤ min
1666
+ �� 1
1667
+ 2Cr
1668
+ � 1
1669
+ λ
1670
+ ,
1671
+
1672
+ 1
1673
+ 2Cs,ε
1674
+ � 1
1675
+ λ
1676
+
1677
+ .
1678
+ Then for all 0 < t0 < ˆt0, we have Cr, Cs,ε ≤ 1
1679
+ 2t−λ
1680
+ 0 . Hence
1681
+ a1 ≤ 1
1682
+ 2(tr−s
1683
+ 0
1684
+ t−γ−λ
1685
+ 0
1686
+ + t2α
1687
+ 0 t
1688
+ − 1
1689
+ 2 −ε
1690
+ 0
1691
+ t−λ
1692
+ 0 ) ≤ tdα
1693
+ 0
1694
+ = tα
1695
+ 1
1696
+ L1 ≤ t−λ
1697
+ 0 L0 ≤ t−βd
1698
+ 0
1699
+ L0 = t−β
1700
+ 1 L0.
1701
+ where we have assumed the following constraints:
1702
+ (4.5)
1703
+ αd < r − s − γ − λ
1704
+ α(2 − d) > 1
1705
+ 2 + ε + λ
1706
+ βd > λ.
1707
+ Thus we have verified for i = 0 assuming the intersection of the above constraints is nonempty. We
1708
+ will see in the induction step that this is true provided r > s + 1
1709
+ 2.
1710
+ Now assume that the induction hypotheses hold for some i − 1 ∈ N, i ≥ 1. Since ti < t0, by
1711
+ condition (4.3) we have
1712
+ (4.6)
1713
+ t
1714
+ − 1
1715
+ 2
1716
+ i
1717
+ |Ai|Di,s ≤ t
1718
+ α− 1
1719
+ 2
1720
+ i
1721
+ ≤ 1
1722
+ C∗s
1723
+ ,
1724
+ ti < t0 < ˆt0.
1725
+ Therefore estimates (3.28)-(3.29) hold
1726
+ ai+1 ≤ Crtr−s
1727
+ i
1728
+ Li + Cs,εt
1729
+ − 1
1730
+ 2 −ε
1731
+ i
1732
+ a2
1733
+ i ,
1734
+ Li+1 ≤ CrLi.
1735
+ Notice that by the condition (4.4), we still have Cr, Cs,ε ≤
1736
+ 1
1737
+ 2t−λ
1738
+ i
1739
+ since ti < t0.
1740
+ Also we have
1741
+ Li ≤ L0t−β
1742
+ i
1743
+ ≤ t−γ−β
1744
+ i
1745
+ . Hence
1746
+ ai+1 ≤ 1
1747
+ 2(tr−s
1748
+ i
1749
+ t−λ−γ−β
1750
+ i
1751
+ + t−λ
1752
+ i
1753
+ t
1754
+ − 1
1755
+ 2−ε
1756
+ i
1757
+ t2α
1758
+ i ) ≤ tdα
1759
+ i
1760
+ = tα
1761
+ i+1,
1762
+ Li+1 ≤ t−λ
1763
+ i
1764
+ Li ≤ t−λ−β
1765
+ i
1766
+ L0 ≤ t−dβ
1767
+ i
1768
+ L0 = t−β
1769
+ i+1L0.
1770
+
1771
+ 20
1772
+ where we have assumed
1773
+ (4.7)
1774
+ αd + β < r − s − λ − γ,
1775
+ α(2 − d) > 1
1776
+ 2 + ε + λ,
1777
+ β >
1778
+ λ
1779
+ d − 1.
1780
+ Notice that the above constraint is more strict than (4.5). Let ξ := r − s and D(ξ, d, λ, γ, ε) be
1781
+ the set of (α, β) such that (4.7) is satisfied.
1782
+ We now determine the values of ξ, d, λ such that
1783
+ D(ξ, d, λ, γ, ε) is non-empty. Consider the limiting domain for fixed ξ, d and λ, γ, ε = 0:
1784
+ D(ξ, d, 0) =
1785
+
1786
+ (α, β) ∈ (0, ∞)2 : αd + β < ξ,
1787
+ α(2 − d) > 1
1788
+ 2,
1789
+ α > 1
1790
+ 2
1791
+
1792
+ .
1793
+ By the defining inequalities of D(ξ, d, 0), it is non-empty if and only if
1794
+ ξ > p(d),
1795
+ p(d) :=
1796
+ d
1797
+ 2(2 − d).
1798
+ On the interval (1, 2), p is a strictly increasing function with infimum value p(1) = 1
1799
+ 2. This implies
1800
+ that
1801
+ (4.8)
1802
+ r − s > p(1) = 1
1803
+ 2,
1804
+ r > s + 1
1805
+ 2 > 1
1806
+ (since s > 1
1807
+ 2).
1808
+ Notice that under the above condition for r, s, D(ξ, d, λ, γ, ε) is still non-empty for sufficiently small
1809
+ λ, γ, ε. In summary, given r = 1 + δ0 for sufficiently small δ0 > 0, we first choose s > 1
1810
+ 2 + δ0
1811
+ 2 such
1812
+ that (4.8) is satisfied. This is possible by choosing d ∈ (1, 2) sufficiently close to 1. We then choose
1813
+ (α, β) ∈ D(ξ, d, λ, γ, ε) with λ, γ, ε chosen sufficiently small, such that (4.7) holds.
1814
+ (iii) First, notice that since all previous assumptions still hold, we have (i),(ii),(iii). Denote Mi :=
1815
+ |Ai|m.
1816
+ Now, since we have condition (4.6), we get from estimate (3.28) that
1817
+ Mi+1 ≤ CmMi.
1818
+ Fix λ > 0. There exists N = N(m, d) ∈ N such that
1819
+ (4.9)
1820
+ Cm ≤ t−λ
1821
+ i
1822
+ ,
1823
+ for all i ≥ N.
1824
+ We would like to show that there exists η such that for all i ≥ N, the following holds
1825
+ Mi ≤ MNt−η
1826
+ i
1827
+ ,
1828
+ i ≥ N.
1829
+ For i = N, the above inequality is obvious. Assume it holds for some i ≥ N. Then
1830
+ Mi+1 ≤ CmMi ≤ t−λ
1831
+ i
1832
+ t−η
1833
+ i
1834
+ MN ≤ t−dη
1835
+ i
1836
+ MN = t−η
1837
+ i+1,
1838
+ i ≥ N,
1839
+ where we have chosen η > 0 to satisfy
1840
+ η(d − 1) > λ.
1841
+
1842
+ Proposition 4.2. Let r > 1 and 1
1843
+ 2 < s < 1. Let D0 be a C3 strictly pseudoconvex domain in Cn
1844
+ and let Xα = ∂α + Aβ
1845
+ α∂β ∈ Λr(D0), α = 1, . . . , n be a formally integrable almost complex structure
1846
+ on D0. There exist constants α > 1
1847
+ 2, γ ∈ (0, 1) and ˆt0 > 0 such that if
1848
+ |A|D0,s ≤ tα
1849
+ 0 ,
1850
+ |A|D0,r ≤ t−γ
1851
+ 0 .
1852
+ where 0 < t0 ≤ ˆt0, then the following statements are true.
1853
+
1854
+ 21
1855
+ (i) Suppose A ∈ Λl+ε(D0), with l > 1 and ε > 0. Then there exists a sequence of mappings �Fj
1856
+ converging to an embedding F : D0 → Cn in Λl+ 1
1857
+ 2 (D0).
1858
+ (ii) If A ∈ C∞(D0), then F ∈ C∞(D0).
1859
+ (iii) F∗(Xα) are in the span of ∂1, . . . , ∂n and F(D0) is strictly pseudoconvex.
1860
+ Proof. Write l = (1 − θ)s + θm, where s < l < m + ℓ + ε and θ ∈ (0, 1) is to be chosen. By
1861
+ Proposition 4.1, there exist d ∈ (1, 2) and α > 1
1862
+ 2 such that ai := |Ai|Di,s and Mi := |Ai|Di,m satisfy
1863
+ ai ≤ tα
1864
+ i ,
1865
+ Mi ≤ MNt−η
1866
+ i
1867
+ ,
1868
+ ti+1 = td
1869
+ i ,
1870
+ i ≥ N.
1871
+ Here η satisfies the condition
1872
+ (4.10)
1873
+ η >
1874
+ λ
1875
+ d − 1.
1876
+ Here λ > 0 is some fixed constant for which
1877
+ (4.11)
1878
+ Cm ≤ t−λ
1879
+ i
1880
+ ,
1881
+ i ≥ N = N(m, d).
1882
+ Using convexity of H¨older-Zygmund norm (2.1), we have for all i ≥ N,
1883
+ |fi|Di,ℓ+ 1
1884
+ 2 ≤ Cm|fi|1−θ
1885
+ Di,s+ 1
1886
+ 2 |fi|θ
1887
+ Di,m+ 1
1888
+ 2 ≲ |Ai|1−θ
1889
+ Di,s|Ai|θ
1890
+ Di,m ≤ MNt(1−θ)α
1891
+ i
1892
+ t−θη
1893
+ i
1894
+ ≤ MNt(1−θ)α−θη
1895
+ i
1896
+ .
1897
+ Consider the composition �Fi+1 = Fi◦Fi−1◦· · ·◦F0, where Fi = I +fi for i ≥ 0. By using Lemma 2.3
1898
+ and above estimate for fi, we obtain for all i ≥ N,
1899
+ (4.12)
1900
+ | �Fi+1 − �Fi|D0,ℓ+ 1
1901
+ 2 = |fi ◦ Fi−1 ◦ · · · F0|D0,ℓ
1902
+ ≤ Cj
1903
+
1904
+
1905
+ |fi|ℓ+ 1
1906
+ 2 +
1907
+
1908
+ i
1909
+ ∥fi∥1|fi|ℓ+ 1
1910
+ 2 + |fi|ℓ+ 1
1911
+ 2∥fi∥1
1912
+
1913
+ ≲ Cj
1914
+ ℓ |fi|ℓ+ 1
1915
+ 2 ≲ Cj
1916
+ ℓ MNt(1−θ)α−θη
1917
+ i
1918
+ Hence �Fi is a Cauchy sequence in Λℓ+ 1
1919
+ 2 (D0), provided that (1 − θ)α − θη > 0, which can be
1920
+ achieved by choosing 0 < θ <
1921
+ α
1922
+ α+η < 1. In view of (4.10), we can choose η to be arbitrarily close
1923
+ to 0 by choosing λ small while fixing d > 1 (Notice that (4.11) then requires N = N(m, d) to be
1924
+ chosen large.) Hence θ can be chosen to be arbitrarily close to 1. In other words, m can be chosen
1925
+ arbitrarily close to l = s+θ(m−s) and ε can be arbitrarily close to 0. This shows that �Fi converges
1926
+ to some limit F ∈ Λℓ+ 1
1927
+ 2 (D0), provided that A0 ∈ Cl+ε(D0) for any ε > 0.
1928
+ (ii) Fix any ℓ > 1 and we have A ∈ Λℓ(D0). We can then choose arbitrarily large m > ℓ and
1929
+ set ℓ = (1 − θ)s + θm. Then the same argument as in (i) shows that �Fi converges to some limit
1930
+ F ∈ Cℓ+ 1
1931
+ 2 (D0). Since ℓ is arbitrary, we have F ∈ C∞(D0).
1932
+ Finally we show that F is a diffeomorphism. By the inverse function theorem, it suffices to check
1933
+ that the Jacobian of F(x) is invertible at every x0 ∈ D. Write DF = I − (DF − I), then DF is
1934
+ invertible with inverse (I − (I − DF))−1 if |DF − I| < 1. Write
1935
+ DF − I = lim
1936
+ j→∞D �Fj+1 = lim
1937
+ j→∞[D �Fj+1 − D �Fj] + [D �Fj − D �Fj−1] + · · · [D �F2 − D �F1].
1938
+ where we set �F1 to be the identity map. Then
1939
+ |DF − I|D0,0 ≤
1940
+
1941
+
1942
+ j=1
1943
+ |D �Fj+1 − D �Fj|D0,0 ≤
1944
+
1945
+
1946
+ j=1
1947
+ | �Fj+1 − �Fj|D0,1.
1948
+
1949
+ 22
1950
+ By the estimates in (4.12), we have for some s ∈ (1
1951
+ 2, 1):
1952
+
1953
+
1954
+ j=1
1955
+ | �Fj+1 − �Fj|D0,1 ≤
1956
+
1957
+
1958
+ j=1
1959
+ Cj|fj|Dj,s+ 1
1960
+ 2 ≤
1961
+
1962
+
1963
+ j=1
1964
+ Cj
1965
+ s|Aj|Dj,s ≤
1966
+
1967
+
1968
+ j=1
1969
+ Cj
1970
+ stα
1971
+ j =
1972
+
1973
+
1974
+ j=1
1975
+ Cj
1976
+ stdjα
1977
+ 0
1978
+ which is less than 1 if we choose t0 < ε0 for some ε0 > 0.
1979
+ (iii) This follows from the fact that |Ai|Di,s ≤ tα
1980
+ i which converges to 0 as i → ∞.
1981
+
1982
+ References
1983
+ [BCD11] Hajer Bahouri, Jean-Yves Chemin, and Rapha¨el Danchin, Fourier analysis and nonlinear partial differen-
1984
+ tial equations, Grundlehren der mathematischen Wissenschaften [Fundamental Principles of Mathematical
1985
+ Sciences], vol. 343, Springer, Heidelberg, 2011. MR 2768550
1986
+ [Cat88]
1987
+ David Catlin, A Newlander-Nirenberg theorem for manifolds with boundary, Michigan Math. J. 35 (1988),
1988
+ no. 2, 233–240. MR 959270
1989
+ [GG]
1990
+ Chun Gan and Xianghong Gong, Global newlander-nirenberg theorem for domains with C2 boundary, to
1991
+ appear in Michigan Math. J.
1992
+ [Gon20]
1993
+ Xianghong Gong, A Frobenius-Nirenberg theorem with parameter, J. Reine Angew. Math. 759 (2020), 101–
1994
+ 159. MR 4058177
1995
+ [Ham77] Richard S. Hamilton, Deformation of complex structures on manifolds with boundary. I. The stable case, J.
1996
+ Differential Geometry 12 (1977), no. 1, 1–45. MR 477158
1997
+ [Mal69]
1998
+ B. Malgrange, Sur l’int´egrabilit´e des structures presque-complexes, Symposia Mathematica, Vol. II (INDAM,
1999
+ Rome, 1968), Academic Press, London, 1969, pp. 289–296. MR 0253383
2000
+ [NN57]
2001
+ A. Newlander and L. Nirenberg, Complex analytic coordinates in almost complex manifolds, Ann. of Math.
2002
+ (2) 65 (1957), 391–404. MR 88770
2003
+ [NW63]
2004
+ Albert Nijenhuis and William B. Woolf, Some integration problems in almost-complex and complex mani-
2005
+ folds, Ann. of Math. (2) 77 (1963), 424–489. MR 149505
2006
+ [Ryc99]
2007
+ Vyacheslav S. Rychkov, On restrictions and extensions of the Besov and Triebel-Lizorkin spaces with respect
2008
+ to Lipschitz domains, J. London Math. Soc. (2) 60 (1999), no. 1, 237–257. MR 1721827
2009
+ [Ste70]
2010
+ Elias M. Stein, Singular integrals and differentiability properties of functions, Princeton Mathematical Series,
2011
+ No. 30, Princeton University Press, Princeton, N.J., 1970. MR 0290095
2012
+ [SY21a]
2013
+ Ziming Shi and Liding Yao, Existence of solutions for ∂-equations in Sobolev spaces of negative index,
2014
+ arXiv:2111.09245, 2021.
2015
+ [SY21b]
2016
+ , New estimates of Rychkov’s universal extension operators for lipschitz domains and some applica-
2017
+ tions, arXiv:2110.14477 (2021).
2018
+ [Tri10]
2019
+ Hans Triebel, Theory of function spaces, Modern Birkh¨auser Classics, Birkh¨auser/Springer Basel AG, Basel,
2020
+ 2010, Reprint of 1983 edition [MR0730762], Also published in 1983 by Birkh¨auser Verlag [MR0781540].
2021
+ MR 3024598
2022
+ [Web89] S. M. Webster, A new proof of the Newlander-Nirenberg theorem, Math. Z. 201 (1989), no. 3, 303–316.
2023
+ MR 999729
2024
+ [Yao22]
2025
+ Liding Yao, Sobolev and h¨older estimates for homotopy operators of ∂-equations on convex domains of finite
2026
+ multitype, arXiv:2210.15830 (2022).
2027
+ Department of Mathematics, Rutgers University - New Brunswick, Piscataway, NJ, 08854
2028
+ Email address: zs327@rutgers.edu
2029
+
JNE0T4oBgHgl3EQfSABV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
KdAyT4oBgHgl3EQfsflO/content/tmp_files/2301.00577v1.pdf.txt ADDED
@@ -0,0 +1,1610 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00577v1 [hep-th] 2 Jan 2023
2
+ January, 2023
3
+ Weyl invariance, non-compact duality and conformal
4
+ higher-derivative sigma models
5
+ Darren T. Grasso, Sergei M. Kuzenko and Joshua R. Pinelli
6
+ Department of Physics M013, The University of Western Australia
7
+ 35 Stirling Highway, Crawley W.A. 6009, Australia
8
+ Email: darren.grasso@uwa.edu.au, sergei.kuzenko@uwa.edu.au,
9
+ joshua.pinelli@research.uwa.edu.au
10
+ Abstract
11
+ We study a system of n Abelian vector fields coupled to 1
12
+ 2n(n + 1) complex
13
+ scalars parametrising the Hermitian symmetric space Sp(2n, R)/U(n). This model
14
+ is Weyl invariant and possesses the maximal non-compact duality group Sp(2n, R).
15
+ Although both symmetries are anomalous in the quantum theory, they should be
16
+ respected by the logarithmic divergent term (the “induced action”) of the effec-
17
+ tive action obtained by integrating out the vector fields. We compute this induced
18
+ action and demonstrate its Weyl and Sp(2n, R) invariance. The resulting confor-
19
+ mal higher-derivative σ-model on Sp(2n, R)/U(n) is generalised to the cases where
20
+ the fields take their values in (i) an arbitrary K¨ahler space; and (ii) an arbitrary
21
+ Riemannian manifold. In both cases, the σ-model Lagrangian generates a Weyl
22
+ anomaly satisfying the Wess-Zumino consistency condition.
23
+
24
+ Contents
25
+ 1
26
+ Introduction
27
+ 1
28
+ 2
29
+ Computing the induced action
30
+ 6
31
+ 2.1
32
+ Quantisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33
+ 6
34
+ 2.2
35
+ Heat kernel calculations
36
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
+ 8
38
+ 2.3
39
+ Geometric expression for the induced action . . . . . . . . . . . . . . . . .
40
+ 10
41
+ 3
42
+ Generalisations and open problems
43
+ 12
44
+ A Hermitian symmetric space Sp(2n, R)/U(n)
45
+ 15
46
+ B Alternative field redefinition
47
+ 19
48
+ C Curved space basis structures
49
+ 20
50
+ 1
51
+ Introduction
52
+ A unique feature of the Weyl multiplet of N = 4 conformal supergravity [1] is the
53
+ presence of a dimensionless complex scalar field φ that parametrises the Hermitian sym-
54
+ metric space SL(2, R)/SO(2).1 The most general family of invariant actions for N = 4
55
+ conformal supergravity was derived only a few years ago by Butter, Ciceri, de Wit and
56
+ Sahoo, [2, 3]. Such an action is uniquely determined by a holomorphic function H(φ)
57
+ which accompanies the terms quadratic in the Weyl tensor in the Lagrangian.
58
+ For the special choice H = const, in which case the N = 4 conformal supergravity
59
+ action proves to be invariant under rigid SL(2, R) transformations, the corresponding
60
+ action was constructed in 2015 by Ciceri and Sahoo [4] to second order in fermions. The
61
+ 1This coset space can equivalently be realised as SU(1, 1)/U(1), since the groups SL(2, R) and SU(1, 1)
62
+ are isomorphic. Refs. [2,3] make use of the latter group.
63
+ 1
64
+
65
+ bosonic sector of the latter action had been computed in 2012 by Buchbinder, Pletnev and
66
+ Tseytlin [5] as an “induced action”, obtained by integrating out an Abelian N = 4 vector
67
+ multiplet coupled to external N = 4 conformal supergravity.2 The purely φ-dependent
68
+ part of the Lagrangian is a higher-derivative σ-model of the form [6]:
69
+ L(φ, ¯φ) =
70
+ 1
71
+ (Im φ)2
72
+
73
+ D2φD2 ¯φ − 2(Rmn − 1
74
+ 3gmnR)∇mφ∇n ¯φ
75
+
76
+ +
77
+ 1
78
+ 12(Im φ)4
79
+
80
+ α∇mφ∇mφ∇n ¯φ∇n ¯φ + β∇mφ∇m ¯φ∇nφ∇n ¯φ
81
+
82
+ ,
83
+ (1.1)
84
+ where
85
+ D2φ := ∇m∇mφ +
86
+ i
87
+ Im φ∇mφ∇mφ ,
88
+ (1.2)
89
+ and α and β are numerical parameters. In the case of N = 4 conformal supergravity,
90
+ these coefficients are [5]: α = 1
91
+ 2β = 1. The Lagrangian (1.1) is invariant under SL(2, R)
92
+ transformations
93
+ φ → φ′ = aφ + b
94
+ cφ + d ,
95
+
96
+  a
97
+ b
98
+ c
99
+ d
100
+
101
+  ∈ SL(2, R)
102
+ (1.3)
103
+ acting on the upper half-plane Im φ > 0 with metric
104
+ ds2 = dφ d¯φ
105
+ (Im φ)2
106
+ =⇒
107
+ Γφ
108
+ φφ =
109
+ i
110
+ Im φ ,
111
+ Γ
112
+ ¯φ
113
+ ¯φ¯φ = −
114
+ i
115
+ Im φ .
116
+ (1.4)
117
+ The functional
118
+
119
+ d4x √−g L proves to be invariant under Weyl transformations
120
+ gmn(x) → e2σ(x)gmn(x) ,
121
+ (1.5)
122
+ since the scalar field φ is inert under such transformations. The higher-derivative σ-model
123
+ (1.1) possesses the N = 1 supersymmetric extension [7] which relates the parameters α
124
+ and β. Both parameters are completely fixed if N = 2 supersymmetry is required [7–9].
125
+ The conformal higher-derivative σ-model (1.1) admits a nontrivial generalisation that
126
+ is obtained by replacing the Hermitian symmetric space SL(2, R)/SO(2) with an arbitrary
127
+ n-dimensional K¨ahler manifold Mn, with n the complex dimension. We assume that Mn
128
+ is parametrised by n local complex coordinates φI and their conjugates ¯φ¯I. Let K(φ, ¯φ)
129
+ 2Some of the relevant terms were missed in [5].
130
+ 2
131
+
132
+ be the corresponding K¨ahler potential such that the K¨ahler metric gI ¯J(φ, ¯φ) is given by
133
+ gI ¯J = ∂I∂ ¯JK. Associated with Mn is a higher-derivative sigma model of the form
134
+ S =
135
+
136
+ d4x √−g
137
+
138
+ gI ¯J(φ, ¯φ)
139
+
140
+ D2φID2 ¯φ
141
+ ¯J − 2
142
+
143
+ Rmn − 1
144
+ 3Rgmn�
145
+ ∇mφI∇n ¯φ
146
+ ¯J�
147
+ + FIJ ¯
148
+ K ¯L(φ, ¯φ)∇mφI∇mφJ∇n ¯φ
149
+ ¯
150
+ K∇n ¯φ
151
+ ¯L
152
+ +
153
+
154
+ GIJ ¯
155
+ K ¯L(φ, ¯φ)∇mφI∇nφJ∇m ¯φ
156
+ ¯
157
+ K∇n ¯φ
158
+ ¯L + c.c.
159
+ ��
160
+ ,
161
+ (1.6)
162
+ where Rmn is the spacetime Ricci tensor,
163
+ D2φI := ∇m∇mφI + ΓI
164
+ JK(φ, ¯φ)∇mφJ∇mφK ,
165
+ (1.7)
166
+ with ΓI
167
+ JK being the Christoffel symbols for the K¨ahler metric gI ¯J. Finally, FIJ ¯
168
+ K ¯L and
169
+ GIJ ¯
170
+ K ¯L are tensor fields on the target space, which are constructed from the K¨ahler metric
171
+ gI ¯J, Riemann tensor RI ¯JK ¯L and, in general, its covariant derivatives. We recall that the
172
+ Christoffel symbols ΓI
173
+ JK and the curvature tensor RI ¯JK ¯L are given by the expressions3
174
+ ΓI
175
+ JK = gI ¯L∂J∂K∂¯LK ,
176
+ RI ¯JK ¯L = ∂I∂K∂ ¯J∂¯LK − gM ¯
177
+ N∂I∂K∂ ¯
178
+ NK∂ ¯J∂¯L∂MK .
179
+ (1.8)
180
+ A typical expression for FIJ ¯
181
+ K ¯L is
182
+ FIJ ¯
183
+ K ¯L = α1R(I ¯
184
+ KJ)¯L + α2g(I ¯
185
+ KgJ)¯L + . . .
186
+ (1.9)
187
+ The possible structure of GIJ ¯
188
+ K ¯L is analogous. It should be pointed out that actions of
189
+ the form (1.6) naturally emerge at the component level in N = 2 superconformal higher-
190
+ derivative σ-models [8] (see also [9]), and in N = 1 ones [7].
191
+ By construction, the action (1.6) is invariant under arbitrary holomorphic isometries
192
+ of Mn.
193
+ A nontrivial observation is that (1.6) is also invariant under arbitrary Weyl
194
+ transformations of spacetime provided the scalars φI are inert under these transformations.
195
+ Choosing Mn = Cn and gI ¯J(φ, ¯φ) = δI ¯J in (1.6) and integrating by parts, one obtains the
196
+ Fradkin-Tseytlin (FT) operator [13]
197
+ ∆0 = (∇m∇m)2 + 2∇m�
198
+ Rmn ∇n − 1
199
+ 3R ∇m
200
+
201
+ ,
202
+ (1.10)
203
+ 3The reader is referred, e.g., to [10–12] for a pedagogical review of K¨ahler geometry in the framework
204
+ of nonlinear sigma models.
205
+ 3
206
+
207
+ which is conformal when acting on dimensionless scalar fields.4 Given a Weyl inert scalar
208
+ field ϕ, the Weyl transformation (1.5) acts on ∆0ϕ as
209
+ ∆0ϕ → ∆0ϕ = e−4σ∆0ϕ .
210
+ (1.11)
211
+ An action of the form
212
+
213
+ d4x √−g L(φ, ¯φ), with L given by (1.1), naturally emerges as
214
+ an induced action in Maxwell’s electrodynamics coupled to a dilaton ϕ and an axion a
215
+ with Lagrangian
216
+ L(F; φ, ¯φ) = −1
217
+ 4e−ϕF mnFmn − 1
218
+ 4a ˜F mnFmn
219
+ = i
220
+ 2φF αβFαβ + c.c. ,
221
+ φ = a + ie−ϕ .
222
+ (1.12)
223
+ Here ˜F mn =
224
+ 1
225
+ 2εmnrsFrs is the Hodge dual of the electromagnetic field strength Fmn =
226
+ 2∇[mAn] = 2∂[mAn], with εmnrs the Levi-Civita tensor. The second form of the Lagrangian
227
+ (1.12) is written using two-component spinor notation, where the field strength Fmn =
228
+ −Fnm is replaced with a symmetric rank-2 spinor Fαβ = Fβα and its conjugate ¯F ˙α ˙β.
229
+ More precisely, if one considers the effective action, Γ[φ, ¯φ], obtained by integrating out
230
+ the quantum gauge field in the model (1.12), then the logarithmically divergent part of
231
+ Γ[φ, ¯φ] is given by
232
+
233
+ d4x √−g L(φ, ¯φ), as demonstrated by Osborn [6].
234
+ An important
235
+ question arises: why is the induced action Weyl and SL(2, R) invariant?
236
+ We recall that the group of electromagnetic duality rotations of free Maxwell’s equa-
237
+ tions is U(1). More than forty years ago, it was shown by Gaillard and Zumino [16, 17]
238
+ that the non-compact group Sp(2n, R) is the maximal duality group of n Abelian vec-
239
+ tor field strengths Fmn = (Fmn,i), with i = 1, . . . , n, in the presence of a collection of
240
+ complex scalars φij = φji parametrising the homogeneous space Sp(2n, R)/U(n), with
241
+ i, j = 1, . . . , n. In the absence of such scalars, the largest duality group proves to be U(n),
242
+ the maximal compact subgroup of Sp(2n, R). These results admit a natural extension to
243
+ the case when the pure vector field part L(F) of the Lagrangian L(F; φ, ¯φ) is a nonlinear
244
+ U(1) duality invariant theory [18–22] (see [23–25] for reviews), for instance Born-Infeld
245
+ theory. However, in the case that L(F) is quadratic, the F-dependent part of L(F; φ, ¯φ)
246
+ is also invariant under the Weyl transformations in curved space. Then, computing the
247
+ 4This operator was re-discovered by Paneitz in 1983 [14] and Riegert in 1984 [15].
248
+ 4
249
+
250
+ path integral over the gauge fields leads to an effective action, Γ[φ, ¯φ], such that its log-
251
+ arithmically divergent part is invariant under Weyl and rigid Sp(2n, R) transformations,
252
+ see, e.g., [26,27] for formal arguments. Both symmetries are anomalous at the quantum
253
+ level, but the logarithmically divergent part of the one-loop effective action is invariant
254
+ under these transformations.
255
+ In this paper we demonstrate that an action of the type (1.6) emerges as an induced
256
+ action in a model for n Abelian gauge fields Am = (Am,i), i = 1, . . . , n, coupled to a
257
+ complex field φ = (φij) and its conjugate ¯φ = (¯φ¯i¯j) parametrising the homogeneous space
258
+ Sp(2n, R)/U(n),
259
+ φ = φT ∈ Mat(n, C) ,
260
+ i(¯φ − φ) > 0 .
261
+ (1.13)
262
+ The corresponding Lagrangian is
263
+ L(n)(F; φ, ¯φ) = −1
264
+ 4
265
+
266
+ (F mn)T ΞFmn + (F mn)T Υ ˜Fmn
267
+
268
+ = i
269
+ 2
270
+
271
+ F αβ�T φFαβ + c.c. ,
272
+ (1.14)
273
+ where we have also introduced the real matrices Ξ and Υ defined by
274
+ φ = Υ + i Ξ ,
275
+ (1.15)
276
+ with Ξ being positive definite.
277
+ The model described by (1.14) has two fundamental
278
+ properties: (i) its duality group is Sp(2n, R) (see, e.g. [23] for the technical details); and
279
+ (ii) it is Weyl invariant. The induced action must respect these properties.
280
+ This paper is organised as follows. In section 2 we compute the logarithmically diver-
281
+ gent part of the effective action obtained by integrating out the vector fields in the model
282
+ (1.14). Generalisations of our analysis and open problems are briefly discussed in section
283
+ 3. The main body of the paper is accompanied by three technical appendices. In appendix
284
+ A we collect necessary facts about the Hermitian symmetric space Sp(2n, R)/U(n). Ap-
285
+ pendix B provides an alternative calculation of the induced action compared with that
286
+ given in subsection 2.2. Appendix C provides a complete list of the structures introduced
287
+ in (2.22).
288
+ 5
289
+
290
+ 2
291
+ Computing the induced action
292
+ In this section we compute the logarithmically divergent part of the effective action,
293
+ Γ[φ, ¯φ], defined by
294
+ eiΓ[φ,¯φ] =
295
+
296
+ [DA] δ
297
+
298
+ η − χ(A)
299
+
300
+ Det (∆gh) eiS[A;φ,¯φ] .
301
+ (2.1)
302
+ Here S[A; φ, ¯φ] is the classical action corresponding to (1.14),
303
+ S[A; φ, ¯φ] =
304
+
305
+ d4x √−g L(n)(F; φ, ¯φ) ,
306
+ (2.2)
307
+ χ(A) denotes a gauge fixing condition, ∆gh the corresponding Faddeev-Popov operator
308
+ [28], and η an arbitrary background field. Since the effective action is independent of η,
309
+ this field can be integrated out with some weight that we choose to be
310
+ exp
311
+
312
+ − i
313
+ 2
314
+
315
+ d4x √−g ηTΞη
316
+
317
+ .
318
+ (2.3)
319
+ In general, the logarithmically divergent part of the effective action has the form
320
+ Γ∞ = − ln Λ
321
+ (4π)2
322
+
323
+ d4x √−g (a2)total ,
324
+ (2.4)
325
+ where (a2)total denotes the appropriate sum of diagonal DeWitt coefficients. We identify
326
+ the induced action with
327
+
328
+ d4x √−g (a2)total, modulo an overall numerical coefficient.
329
+ 2.1
330
+ Quantisation
331
+ We choose the simplest gauge-fixing condition
332
+ χ(A) = ∇mAm ,
333
+ (2.5)
334
+ which leads to the ghost operator
335
+ ∆gh := ✷1 ,
336
+ (2.6)
337
+ with 1 the n × n unit matrix. Integrating the right-hand side of (2.1) with the weight
338
+ functional (2.3) leads to the gauge-fixing term
339
+ SG.F.[A; φ, ¯φ] = −1
340
+ 2
341
+
342
+ d4x √−g (∇mAm)TΞ(∇nAn) .
343
+ (2.7)
344
+ 6
345
+
346
+ As a result, the gauge-fixed action becomes
347
+ Squadratic[A; φ, ¯φ] = 1
348
+ 2
349
+
350
+ d4x √−g A ˆm∆ ˆmˆnAˆn ,
351
+ (2.8)
352
+ where here we have introduced hatted indices corresponding to a pair of spacetime and
353
+ internal indices A ˆm := (Ami), ∆ ˆmˆn := (∆mi,nj). Contractions over hatted indices encode
354
+ summations over both indices, however the position of the hatted indices (up or down)
355
+ indicates only the position of the spacetime indices, internal indices are always understood
356
+ as matrix multiplication. The non-minimal operator ∆ ˆmˆn is defined as:
357
+ ∆mi,nj := Ξijgmn✷ + V mi,p,nj∇p − RmnΞij ,
358
+ ✷ := ∇m∇m ,
359
+ (2.9a)
360
+ V mi,p,nj := (∇pΞij)gmn − (∇nΞij)gmp + (∇mΞij)gpn − (∇qΥij)εmpnq .
361
+ (2.9b)
362
+ From here onward matrix indices will be suppressed, unless there may be ambiguity or
363
+ confusion. The one-loop effective action is specified by
364
+ Γ(1)[φ, ¯φ] = i
365
+ 2Tr ln ∆ − iTr ln ∆gh .
366
+ (2.10)
367
+ Since Ξ is symmetric and positive definite, due to (1.13), its inverse Ξ−1, square root Ξ1/2
368
+ and inverse square root Ξ−1/2 are well-defined. We perform a local field redefinition in
369
+ the path integral:
370
+ Am → Ξ−1/2Am ,
371
+ (2.11)
372
+ so that the operator which appeared in (2.8) becomes5
373
+ ˜∆ ˆmˆn = Ξ−1/2∆mnΞ−1/2 .
374
+ (2.12)
375
+ Inserting the explicit form of ∆ ˆmˆn from (2.9a) and (2.9b), the ˜∆ ˆm
376
+ ˆn operator is now
377
+ minimal:
378
+ ˜∆ ˆm
379
+ ˆn = 1 δm
380
+ n✷ + Q ˆm
381
+ pˆn∇p + T ˆm
382
+ ˆn ,
383
+ (2.13a)
384
+ Q ˆm
385
+ pˆn := −2
386
+
387
+ ∇pΞ1/2�
388
+ Ξ−1/2δm
389
+ n + Ξ−1/2 V m
390
+ pn Ξ−1/2 ,
391
+ (2.13b)
392
+ T ˆm
393
+ ˆn := −
394
+
395
+ ✷Ξ1/2�
396
+ δm
397
+ n + 2
398
+
399
+ ∇pΞ1/2�
400
+ Ξ−1/2 �
401
+ ∇pΞ1/2�
402
+ Ξ−1/2δm
403
+ n
404
+ − Ξ−1/2 V m
405
+ pnΞ−1/2 �
406
+ ∇pΞ1/2�
407
+ Ξ−1/2 − Rm
408
+ n1 .
409
+ (2.13c)
410
+ After our field redefinition the one-loop effective action is given by
411
+ Γ(1)[φ, ¯φ] = i
412
+ 2Tr ln ˜∆ − iTr ln ∆gh .
413
+ (2.14)
414
+ 5In appendix B, we provide the results for an alternative field redefinition which leads to an equivalent
415
+ logarithmic divergence up to total derivative.
416
+ 7
417
+
418
+ 2.2
419
+ Heat kernel calculations
420
+ Since the operator ˜∆ ˆm
421
+ ˆn defined by (2.13a) is minimal, we can proceed with the stan-
422
+ dard heat kernel technique in curved space, by bringing it to the form:
423
+ ˜∆ ˆm
424
+ ˆn =
425
+ � ˆ∇p ˆ∇p
426
+ � ˆm
427
+ ˆn + ˆP ˆm
428
+ ˆn ,
429
+ (2.15a)
430
+ ˆP ˆm
431
+ ˆn := −1
432
+ 2∇pQ ˆm
433
+ pˆn − 1
434
+ 4 Q ˆm
435
+ qˆpQˆpq
436
+ ˆn + T ˆm
437
+ ˆn .
438
+ (2.15b)
439
+ The generalised covariant derivative ˆ∇m introduced above is defined to act on a column
440
+ matrix A ˆm = (Am
441
+ i) as
442
+ � ˆ∇pA
443
+ � ˆm := ∇pA ˆm + 1
444
+ 2 Q ˆm
445
+ pˆnAˆn .
446
+ (2.16)
447
+ The generalised covariant derivatives have no torsion, meaning
448
+ � ˆ∇p, ˆ∇q
449
+
450
+ A ˆm = ˆR ˆm
451
+ ˆnpqAˆn ,
452
+ (2.17)
453
+ with ˆR ˆm
454
+ ˆnpq some generalised curvature anti-symmetric in p, q. Explicitly it has the form
455
+ ˆR ˆm
456
+ ˆnpq = Rm
457
+ npq1 + 1
458
+ 2∇pQ ˆm
459
+ qˆn − 1
460
+ 2∇qQ ˆm
461
+ pˆn + 1
462
+ 4 Q ˆm
463
+ pˆrQˆr
464
+ qˆn − 1
465
+ 4 Q ˆm
466
+ qˆrQˆr
467
+ pˆn .
468
+ (2.18)
469
+ Using the standard Schwinger-DeWitt formalism [29–33] in curved spacetime for an oper-
470
+ ator of the form (2.15a), in the coincidence limit the DeWitt coefficient traced over matrix
471
+ indices, (a2) ˜∆(x, x), is given by
472
+ (a2)
473
+ ˜∆(x, x) =
474
+ � 1
475
+ 45RmnpqRmnpq − 1
476
+ 45RmnRmn + 1
477
+ 18R2 + 2
478
+ 15✷R
479
+
480
+ Tr1
481
+ + 1
482
+ 12
483
+ ˆR ˆmˆnpq ˆRˆn ˆmpq + 1
484
+ 6
485
+ � ˆ∇p ˆ∇p ˆP
486
+ � ˆm
487
+ ˆm + 1
488
+ 2
489
+ � ˆP 2� ˆm
490
+ ˆm + 1
491
+ 6R ˆP ˆm
492
+ ˆm ,
493
+ (2.19)
494
+ where ‘Tr’ denotes the matrix trace. Similarly for the ghost operator (2.6), the corre-
495
+ sponding traced DeWitt coefficient (a2)∆gh(x, x) (noting that the generalised curvature
496
+ vanishes) is
497
+ (a2)∆gh(x, x) =
498
+ � 1
499
+ 180RmnpqRmnpq −
500
+ 1
501
+ 180RmnRmn + 1
502
+ 72R2 + 1
503
+ 30✷R
504
+
505
+ Tr1 ,
506
+ (2.20)
507
+ which contains purely gravitational components. Armed with the set of equations (2.15a
508
+ – 2.18), we expand out (a2) ˜∆(x, x) (2.19) explicitly in terms of Q ˆm
509
+ pˆn (2.13b) and T ˆm
510
+ ˆn
511
+ (2.13c)
512
+ (a2)
513
+ ˜∆(x, x) =
514
+
515
+ − 11
516
+ 180RmnpqRmnpq − 1
517
+ 45RmnRmn + 1
518
+ 18R2 + 2
519
+ 15✷R
520
+
521
+ Tr1
522
+ 8
523
+
524
+ + 1
525
+ 6Rp
526
+ qr
527
+ m
528
+
529
+ ∇qQmi
530
+ r,pi
531
+
532
+ + 1
533
+ 12Rp
534
+ qr
535
+ m Qmi
536
+ qˆsQˆs
537
+ r,pi − 1
538
+ 12R
539
+
540
+ ∇pQ ˆm
541
+ p ˆm
542
+
543
+ − 1
544
+ 24R Q ˆm
545
+ qˆpQˆpq
546
+ ˆm + 1
547
+ 6R T ˆm
548
+ ˆm − 1
549
+ 12✷∇pQ ˆm
550
+ p ˆm − 1
551
+ 12
552
+
553
+ ✷Q ˆm
554
+ qˆp
555
+
556
+ Qˆpq
557
+ ˆm
558
+ − 1
559
+ 24
560
+
561
+ ∇qQ ˆm
562
+ rˆp
563
+ � �
564
+ ∇qQˆpr
565
+ ˆm
566
+
567
+ − 1
568
+ 24
569
+
570
+ ∇qQ ˆm
571
+ rˆp
572
+ � �
573
+ ∇rQˆp
574
+ q ˆm
575
+
576
+ + 1
577
+ 8
578
+
579
+ ∇rQ ˆm
580
+ rˆp
581
+ � �
582
+ ∇sQˆp
583
+ s ˆm
584
+
585
+ + 1
586
+ 24
587
+
588
+ ∇qQ ˆm
589
+ rˆp
590
+
591
+ Qˆp
592
+ qˆsQˆsr
593
+ ˆm − 1
594
+ 24
595
+
596
+ ∇qQ ˆm
597
+ rˆp
598
+
599
+ Qˆpr
600
+ ˆsQˆs
601
+ q ˆm
602
+ + 1
603
+ 8
604
+
605
+ ∇rQ ˆm
606
+ rˆp
607
+
608
+ Qˆp
609
+ tˆsQˆst
610
+ ˆm + 1
611
+ 96 Q ˆm
612
+ qˆsQˆs
613
+ rˆpQˆpq
614
+ ˆtQˆtr
615
+ ˆm + 1
616
+ 48 Q ˆm
617
+ qˆpQˆpq
618
+ ˆrQˆr
619
+ sˆtQˆts
620
+ ˆm
621
+ − 1
622
+ 2
623
+
624
+ ∇pQ ˆm
625
+ pˆq
626
+
627
+ T ˆq
628
+ ˆm − 1
629
+ 4T ˆm
630
+ ˆrQˆr
631
+ pˆqQˆqp
632
+ ˆm + 1
633
+ 6✷T ˆm
634
+ ˆm + 1
635
+ 2(T 2) ˆm
636
+ ˆm .
637
+ (2.21)
638
+ Using the definitions of of Q ˆm
639
+ pˆn (2.13b) and T ˆm
640
+ ˆn (2.13c), we perform the laborious task
641
+ of expanding (a2) ˜∆(x, x) in terms of the matrices Ξ and Υ. It reduces to the following
642
+ form:
643
+ (a2)
644
+ ˜∆(x, x) = Tr
645
+ � 7
646
+ 24T1 + 1
647
+ 48T2 − 5
648
+ 12T3 + 1
649
+ 12T4 + 7
650
+ 12T5 + 5
651
+ 24T6 − 1
652
+ 24T7 + 5
653
+ 24T8 + 7
654
+ 24T9
655
+ + 1
656
+ 48T10 + 1
657
+ 4T11 + 1
658
+ 4T12 − 1
659
+ 2T13 + 1
660
+ 2T14 − 1
661
+ 2T15 − 1
662
+ 2T16 − 1
663
+ 2T17 − 1
664
+ 2T18
665
+ + 1
666
+ 6T19 + 1
667
+ 6T20 + X 1 + ∇mYm + ✷Z
668
+
669
+ ,
670
+ (2.22)
671
+ where the contributions T1, . . . , T20 are listed in appendix C. We have also introduced:
672
+ X := − 11
673
+ 180RmnpqRmnpq + 43
674
+ 90RmnRmn − 1
675
+ 9R2 − 1
676
+ 30✷R ,
677
+ (2.23a)
678
+ Ym := − 1
679
+ 4Ξ−1(∇mΞ)Ξ−1(∇nΞ)Ξ−1(∇nΞ) + 1
680
+ 4Ξ−1(∇mΞ)Ξ−1(∇nΥ)Ξ−1(∇nΥ)
681
+ + 1
682
+ 12Ξ−1(∇nΞ)Ξ−1(∇mΥ)Ξ−1(∇nΥ) + 1
683
+ 12Ξ−1(∇nΞ)Ξ−1(∇nΥ)Ξ−1(∇mΥ)
684
+ + 1
685
+ 6Ξ−1(∇mΞ)Ξ−1(✷Ξ) − 1
686
+ 6Ξ−1(∇mΥ)Ξ−1(✷Υ)
687
+ − 1
688
+ 3
689
+
690
+ Rmn − 1
691
+ 2Rgmn�
692
+ Ξ−1(∇nΞ) ,
693
+ (2.23b)
694
+ Z := − 1
695
+ 6Ξ−1(∇mΥ)Ξ−1(∇mΥ) − 1
696
+ 3Ξ−1(✷Ξ) + 4
697
+ 3Ξ−1/2(✷Ξ1/2)
698
+ + 4
699
+ 3Ξ−1(∇nΞ)Ξ−1/2(∇nΞ1/2) .
700
+ (2.23c)
701
+ The total DeWitt coefficient corresponding to the logarithmic divergence of the effective
702
+ action (2.14) is given by
703
+ (a2)total = (a2)
704
+ ˜∆(x, x) − 2(a2)∆gh(x, x) ,
705
+ (2.24)
706
+ 9
707
+
708
+ where (a2)∆gh(x, x) was given in (2.20). Recalling the expression for Ξ and Υ in terms of
709
+ the original fields φ and its conjugate ¯φ (1.15), and defining
710
+ D2φ := ✷φ + i(∇mφ)Ξ−1(∇mφ) ,
711
+ D2 ¯φ := ✷¯φ − i(∇m ¯φ)Ξ−1(∇m ¯φ) ,
712
+ (2.25)
713
+ the total DeWitt coefficient is given by
714
+ (a2)total = n
715
+ � 1
716
+ 10F − 31
717
+ 180G − 1
718
+ 10✷R
719
+
720
+ + 1
721
+ 4Tr
722
+
723
+ Ξ−1(D2φ)Ξ−1(D2 ¯φ) − 2
724
+
725
+ Rmn − 1
726
+ 3Rgmn�
727
+ Ξ−1(∇mφ)Ξ−1(∇n ¯φ)
728
+
729
+ + 1
730
+ 24Tr
731
+
732
+ Ξ−1(∇mφ)Ξ−1(∇m ¯φ)Ξ−1(∇nφ)Ξ−1(∇n ¯φ)
733
+
734
+ + 1
735
+ 48Tr
736
+
737
+ Ξ−1(∇mφ)Ξ−1(∇n ¯φ)Ξ−1(∇mφ)Ξ−1(∇n ¯φ)
738
+
739
+ ,
740
+ (2.26)
741
+ where F is the square of the Weyl tensor, G is the Euler density,
742
+ F = RmnpqRmnpq − 2RmnRmn + 1
743
+ 3R2 ,
744
+ G = RmnpqRmnpq − 4RmnRmn + R2 , (2.27)
745
+ and we have removed the total derivative pieces Tr
746
+
747
+ ∇mYm�
748
+ and Tr
749
+
750
+ ✷Z
751
+
752
+ since they do
753
+ not contribute to the induced action
754
+
755
+ d4x √−g (a2)total. The ✷R in (2.26) is also a total
756
+ derivative and can be omitted.
757
+ Setting n = 1 in (2.26) yields the expected result derived in [5,6]
758
+ (a2)total = 1
759
+ 10F − 31
760
+ 180G − 1
761
+ 10✷R
762
+ +
763
+ 1
764
+ 4(Imφ)2
765
+
766
+ D2φD2 ¯φ − 2
767
+
768
+ Rmn − 1
769
+ 3Rgmn�
770
+ ∇mφ∇n ¯φ
771
+
772
+ +
773
+ 1
774
+ 48(Imφ)4
775
+
776
+ ∇mφ∇mφ∇n ¯φ∇n ¯φ + 2∇mφ∇m ¯φ∇nφ∇n ¯φ
777
+
778
+ .
779
+ (2.28)
780
+ 2.3
781
+ Geometric expression for the induced action
782
+ To recast (2.26) in terms of geometric objects defined on the Hermitian symmetric
783
+ space Sp(2n, R)/U(n), here we analyse the dependence of (2.26) on the symmetric matrix
784
+ φ = (φij) = (φji) ≡ (φI) and its conjugate ¯φ =
785
+ �¯φ¯i¯j�
786
+ =
787
+ �¯φ ¯j¯i�
788
+ ≡ (¯φ¯I).
789
+ We make the standard choice for K¨ahler potential K(φij, ¯φ¯i¯j) on Sp(2n, R)/U(n)
790
+ K(φ, ¯φ) := −4Tr ln Ξ ,
791
+ (2.29)
792
+ 10
793
+
794
+ which is well defined since Ξ is a positive definite matrix. The group Sp(2n, R) acts on
795
+ Sp(2n, R)/U(n) by fractional linear transformations (A.18). Given such a transformation,
796
+ the K¨ahler potential changes as
797
+ K(φ, ¯φ) → K(φ, ¯φ) + Λ(φ) + ¯Λ(¯φ) ,
798
+ (2.30)
799
+ in accordance with (A.20).
800
+ Therefore, the K¨ahler metric is invariant under arbitrary
801
+ Sp(2n, R) transformations.
802
+ The K¨ahler metric is given by6
803
+ gij,¯k¯l = g(ij),(¯k¯l) =
804
+ ∂2K
805
+ ∂φij∂ ¯φ ¯k¯l = (Ξ−1)i(¯k(Ξ−1)¯l)j ,
806
+ (2.31)
807
+ where (i1 · · · in) denotes symmetrisation in indices i1, . . . , in. Note that pairs of indices
808
+ are symmetrised over due to φ being symmetric (1.13). Here and in what follows, we use
809
+ the notation
810
+ Ki1i2,...,i2p−1i2p,¯i1¯i2,...,¯i2q−1¯i2q =
811
+ ∂p+qK
812
+ ∂φi1i2 · · · ∂φi2p−1i2p∂ ¯φ¯i1¯i2 · · ·∂ ¯φ¯i2q−1¯i2q .
813
+ (2.32)
814
+ In accordance with (1.8), the Christoffel symbols are given by
815
+ Γi1i2
816
+ i3i4,i5i6 = gi1i2,¯i7¯i8Ki3i4,i5i6,¯i7¯i8 ,
817
+ Γ
818
+ ¯i1¯i2
819
+ ¯i3¯i4,¯i5¯i6 = (Γi1i2
820
+ i3i4,i5i6)∗ ,
821
+ (2.33)
822
+ and the Riemann curvature tensor is
823
+ Ri1i2,¯i3¯i4,i5i6,¯i7¯i8 = Ki1i2,i5i6,¯i3¯i4,¯i7¯i8 − gi9i10,¯i11¯i12Ki1i2,i5i6,¯i11¯i12Ki9i10,¯i3¯i4,¯i7¯i8 .
824
+ (2.34)
825
+ Noting that the inverse K¨ahler metric of (2.31) is
826
+ gij,¯k¯l = Ξi(¯k Ξ
827
+ ¯l)j ,
828
+ (2.35)
829
+ one can calculate the Christoffel symbols, Riemann curvature tensor and Ricci tensor for
830
+ the metric considered in (2.31) and we find:
831
+ Γi1i2
832
+ i3i4,i5i6 = iδ(i1
833
+ (i3(Ξ−1)i4)(i5δi2)
834
+ i6) ,
835
+ (2.36a)
836
+ 6The partial derivatives with respect to symmetric matrices φ = (φij) and ¯φ = (¯φ¯i¯j) are defined by
837
+ dK(φ, ¯φ) = dφij ∂K(φ, ¯φ)
838
+ ∂φij
839
+ + d¯φ¯i¯j ∂K(φ, ¯φ)
840
+ ∂φ¯i¯j
841
+ , and therefore ∂φkl
842
+ ∂φij = δk
843
+ (iδl
844
+ j). Symmetrisation of n indices includes
845
+ a 1/n! factor. Vertical bars are notation to exclude indices contained between them from a separate
846
+ symmetrisation, for example, (i1|(i2i3)|i4).
847
+ 11
848
+
849
+ Γ
850
+ ¯i1¯i2
851
+ ¯i3¯i4,¯i5¯i6 = −iδ(¯i1
852
+ (¯i3(Ξ−1)¯i4)(¯i5δ
853
+ ¯i2)
854
+ ¯i6) ,
855
+ (2.36b)
856
+ Ri1i2,¯i3¯i4,i5i6,¯i7¯i8 = 1
857
+ 2(Ξ−1)(¯i8|(i1(Ξ−1)i2)(¯i3(Ξ−1)¯i4)(i5(Ξ−1)i6)|¯i7) ,
858
+ (2.36c)
859
+ Ri1i2,¯i3¯i4 = −n
860
+ 2(Ξ−1)i1(¯i3(Ξ−1)¯i4)i2 = −n
861
+ 2gi1i2,¯i3¯i4 .
862
+ (2.36d)
863
+ The latter relation means that Sp(2n, R)/U(n) is an Einstein space.
864
+ As pointed out at the beginning of this subsection, the complex variables φ and their
865
+ conjugates ¯φ can be viewed either as symmetric matrices φ = (φij) and ¯φ = (¯φ¯i¯j) or as
866
+ vector columns φ = (φI) and ¯φ = (¯φ¯I), with I, ¯I = 1, . . . , 1
867
+ 2n(n + 1). Resorting to the
868
+ latter notation, the geometric structures (2.31) and (2.36a – 2.36c) can be used to recast
869
+ (2.26) in the form:
870
+ (a2)total = n
871
+ � 1
872
+ 10F − 31
873
+ 180G − 1
874
+ 10✷R
875
+
876
+ + 1
877
+ 4gI ¯J(φ, ¯φ)
878
+
879
+ D2φID2 ¯φ
880
+ ¯J − 2
881
+
882
+ Rmn − 1
883
+ 3Rgmn�
884
+ ∇mφI∇n ¯φ
885
+ ¯J�
886
+ (2.37a)
887
+ + 1
888
+ 24RI ¯JK ¯L(φ, ¯φ)
889
+
890
+ 2∇mφI∇m ¯φ
891
+ ¯J∇nφK∇n ¯φ
892
+ ¯L + ∇mφI∇n ¯φ
893
+ ¯J∇mφK∇n ¯φ
894
+ ¯L�
895
+ ,
896
+ where
897
+ D2φI = ✷φI + ΓI
898
+ JK∇mφJ∇mφK ,
899
+ D2 ¯φ
900
+ ¯I = ✷¯φ
901
+ ¯I + Γ
902
+ ¯I
903
+ ¯J ¯
904
+ K∇m ¯φ
905
+ ¯J∇m ¯φ
906
+ ¯
907
+ K .
908
+ (2.37b)
909
+ Every isometry transformation (A.18) acts on ∇φ and D2φ as follows:
910
+ ∇mφ′ =
911
+
912
+ (Cφ + D)−1�T(∇mφ)(Cφ + D)−1 ,
913
+ (2.38a)
914
+ D2φ′ =
915
+
916
+ (Cφ + D)−1�T(D2φ)(Cφ + D)−1 .
917
+ (2.38b)
918
+ It is now seen that the induced action defined by (2.37) is invariant under the isometry
919
+ transformations on Sp(2n, R)/U(n).
920
+ 3
921
+ Generalisations and open problems
922
+ Relation (2.37), which constitutes the induced action, is our main result. The same
923
+ structure also determines the Weyl anomaly of the effective action
924
+ δσΓ ∝
925
+ 1
926
+ (4π)2
927
+
928
+ d4x √−g σ (a2)total .
929
+ (3.1)
930
+ 12
931
+
932
+ It is well known that the purely gravitational part of this variation satisfies the Wess-
933
+ Zumino consistency condition [34]
934
+ [δσ2, δσ1]Γ = 0 ,
935
+ (3.2)
936
+ see, e.g., [35–37] for a review.7 The φ-dependent part of the Weyl anomaly will be dis-
937
+ cussed below.
938
+ As a generalisation of (1.6), we can introduce a conformal higher-derivative σ-model
939
+ associated with a Riemannian manifold (Wd, g) parametrised by local coordinates ϕµ.
940
+ The action is
941
+ S =
942
+
943
+ d4x √−g
944
+
945
+ gµν(ϕ)
946
+
947
+ D2ϕµD2ϕν − 2
948
+
949
+ Rmn − 1
950
+ 3Rgmn�
951
+ ∇mϕµ∇nϕν�
952
+ + Fµνσρ(ϕ)∇mϕµ∇mϕν∇nϕσ∇nϕρ
953
+
954
+ ,
955
+ (3.3a)
956
+ where
957
+ D2ϕµ := ✷ϕµ + Γµ
958
+ νσ∇mϕν∇mϕσ ,
959
+ ✷ = ∇m∇m ,
960
+ (3.3b)
961
+ and Fµνσρ(ϕ) is a tensor field of rank (0, 4) on Wd. The Weyl invariance of the above
962
+ action follows from
963
+ δσ
964
+ �√−g gµν(ϕ)
965
+
966
+ D2ϕµD2ϕν − 2
967
+
968
+ Rmn − 1
969
+ 3Rgmn�
970
+ ∇mϕµ∇nϕν��
971
+ = 4√−g∇m
972
+
973
+ gµν(ϕ)
974
+
975
+ ∇nσ∇mϕµ∇nϕν − 1
976
+ 2∇mσ∇nϕµ∇nϕν��
977
+ .
978
+ (3.4)
979
+ In the case that the target space is K¨ahler, eq. (1.6), the relation (3.4) takes the form
980
+ δσ
981
+ �√−g gI ¯J(φ, ¯φ)
982
+
983
+ D2φID2 ¯φ
984
+ ¯J − 2
985
+
986
+ Rmn − 1
987
+ 3Rgmn�
988
+ ∇mφI∇n ¯φ
989
+ ¯J��
990
+ = 2√−g ∇m
991
+
992
+ gI ¯J(φ, ¯φ)
993
+
994
+ ∇nσ
995
+
996
+ ∇mφI∇n ¯φ
997
+ ¯J + ∇nφI∇m ¯φ
998
+ ¯J�
999
+ − ∇mσ∇nφI∇n ¯φ
1000
+ ¯J��
1001
+ . (3.5)
1002
+ Choosing Wd to be R, specifying gµν(ϕ) and Fµνσρ(ϕ) to be constant, respectively,
1003
+ and restricting the background spacetime to be flat, the action (3.3) turns into
1004
+ S =
1005
+
1006
+ d4x L ,
1007
+ L = (∂2ϕ)2 + f(∂mϕ∂mϕ)2 ,
1008
+ (3.6)
1009
+ 7The ✷R term, which contributes to (a2)total in (3.1), can be removed since it is generated by a local
1010
+ counterterm
1011
+
1012
+ d4x √−g R2.
1013
+ 13
1014
+
1015
+ with f a coupling constant, which is the model studied recently by Tseytlin [38].
1016
+ Assuming the model (3.3) originates from an induced action of some theory, the ϕ-
1017
+ dependent part of the Weyl anomaly should have the form
1018
+ δσΓ ∝
1019
+
1020
+ d4x √−g σ
1021
+
1022
+ gµν(ϕ)
1023
+
1024
+ D2ϕµD2ϕν − 2
1025
+
1026
+ Rmn − 1
1027
+ 3Rgmn�
1028
+ ∇mϕµ∇nϕν�
1029
+ + Fµνσρ(ϕ)∇mϕµ∇mϕν∇nϕσ∇nϕρ
1030
+
1031
+ .
1032
+ (3.7)
1033
+ The anomaly satisfies the Wess-Zumino consistency condition (3.2) as a consequence of
1034
+ the relation (3.4).
1035
+ It would be interesting to study renormalisation properties of a higher-derivative the-
1036
+ ory in Minkowski space with Lagrangian of the form
1037
+ L(F,φ, ¯φ) = L(n)(F; φ, ¯φ) + f1gI ¯J(φ, ¯φ)D2φID2 ¯φ
1038
+ ¯J
1039
+ + RI ¯JK ¯L(φ, ¯φ)
1040
+
1041
+ f2∂mφI∂m ¯φ
1042
+ ¯J∂nφK∂n ¯φ
1043
+ ¯L + f3∂mφI∂n ¯φ
1044
+ ¯J∂mφK∂n ¯φ
1045
+ ¯L�
1046
+ + . . . ,
1047
+ (3.8)
1048
+ where L(n)(F; φ, ¯φ) is given by (1.14), the complex scalar fields φI and their conjugates
1049
+ ¯φ¯I parametrise Sp(2n, R)/U(n), and f1, f2 and f3 are dimensionless coupling constants.
1050
+ All the structures in the F-independent part of (3.8) appear in the induced action (2.37).
1051
+ The ellipsis in (3.8) denotes other Sp(2n, R) terms that are quartic in ∂φ and ∂ ¯φ, such
1052
+ as the K¨ahler metric squared structure in (1.9).
1053
+ Such terms are possible for n > 1.
1054
+ The renormalisation of the most general fourth-order sigma models with dimensionless
1055
+ couplings in four dimensions was studied in [39,40]. All couplings constants in (3.8) are
1056
+ dimensionless, and the freedom to choose them is dictated by Sp(2n, R). This implies
1057
+ that the theory with classical Lagrangian (3.8) is renormalisable at the quantum level.
1058
+ It was discovered two years ago that Maxwell’s theory possesses a one-parameter
1059
+ conformal and U(1) duality invariant deformation [41, 42]; it was called the ModMax
1060
+ theory in [41]. Using the methods developed in [19–21], it can be coupled to the dilaton-
1061
+ axion field (1.12) to result in a conformal and SL(2, R) duality invariant model described
1062
+ by the Lagrangian [43]
1063
+ Lγ(F; φ, ¯φ) = −1
1064
+ 2e−ϕ�
1065
+ ω + ¯ω
1066
+
1067
+ (cosh γ − 1) + e−ϕ√
1068
+ ω¯ω sinh γ + i
1069
+ 2
1070
+
1071
+ φ ω − ¯φ ¯ω
1072
+
1073
+ , (3.9a)
1074
+ where
1075
+ ω = α + iβ = F αβFαβ ,
1076
+ α = 1
1077
+ 4 F abFab ,
1078
+ β = 1
1079
+ 4 F ab ˜Fab ,
1080
+ (3.9b)
1081
+ 14
1082
+
1083
+ and γ is a non-negative coupling constant [41]. For γ = 0 the model (3.9) reduces to
1084
+ (1.12). A challenging problem is to compute an induced action generated by (3.9).
1085
+ Acknowledgements:
1086
+ The work of SK is supported in part by the Australian Research Council, project No.
1087
+ DP200101944. The work of JP is supported by the Australian Government Research
1088
+ Training Program Scholarship.
1089
+ A
1090
+ Hermitian symmetric space Sp(2n, R)/U(n)
1091
+ In this appendix we collect necessary facts about the Hermitian symmetric space
1092
+ Sp(2n, R)/U(n). Here the symplectic group is defined by
1093
+ Sp(2n, R) =
1094
+
1095
+
1096
+ g ∈ GL(2n, R),
1097
+ gTJg = J ,
1098
+ J =
1099
+
1100
+
1101
+ 0
1102
+ 1n
1103
+ −1n
1104
+ 0
1105
+
1106
+
1107
+
1108
+
1109
+  .
1110
+ (A.1)
1111
+ Its maximal compact subgroup, H = Sp(2n, R)∩SO(2n), proves to be isomorphic to U(n).
1112
+ One way to see this is to make use of the isomorphism
1113
+ Sp(2n, R) ∼= Sp(2n, C) ∩ SU(n, n) ≡ G ,
1114
+ (A.2)
1115
+ which is obtained by considering the bijective map
1116
+ ϕ : g → g = A−1gA ,
1117
+ A = 1
1118
+
1119
+ 2
1120
+
1121
+
1122
+ 1n
1123
+ 1n
1124
+ −i
1125
+ 1n
1126
+ i1n
1127
+
1128
+  ,
1129
+ (A.3)
1130
+ for any g ∈ Sp(2n, R). Each complex matrix g = ϕ(g) is characterised by the properties
1131
+ gTJg = J ,
1132
+ g†In,ng = In,n ,
1133
+ In,n =
1134
+
1135
+
1136
+ 1n
1137
+ 0
1138
+ 0
1139
+ −1n
1140
+
1141
+  ,
1142
+ (A.4)
1143
+ and thus g ∈ Sp(2n, C) ∩ SU(n, n).
1144
+ The inverse map ϕ−1 takes every group element
1145
+ g ∈ Sp(2n, C) ∩ SU(n, n) to some g ∈ GL(2n, R). For every element h from the maximal
1146
+ compact subgroup, h ∈ H = Sp(2n, R)∩SO(2n), its image h = ϕ(h) is unitary, h†h =
1147
+ 12n.
1148
+ Simple calculations show that every h ∈ H = Sp(2n, R) ∩ SO(2n) has the form
1149
+ h =
1150
+
1151
+
1152
+ A
1153
+ B
1154
+ −B
1155
+ A
1156
+
1157
+  ,
1158
+ AAT + BBT =
1159
+ 1n ,
1160
+ ABT = BAT ,
1161
+ (A.5)
1162
+ 15
1163
+
1164
+ and for its image h = ϕ(h) we obtain
1165
+ ϕ(h) =
1166
+
1167
+  A − iB
1168
+ 0
1169
+ 0
1170
+ A + iB
1171
+
1172
+  ,
1173
+ (A + iB)(A + iB)† =
1174
+ 1n .
1175
+ (A.6)
1176
+ The group Sp(2n, R) naturally acts on C2n.
1177
+ This action is extended to that on a
1178
+ complex Grassmannian Grm,2n(C), with 0 < m < 2n, the space of m-planes through
1179
+ the origin in C2n. Of special interest is the Grassmannian Grn,2n(C). Given an n-plane
1180
+ P ∈ Grn,2n(C), it can be identified with a 2n × n matrix of rank n
1181
+ P =
1182
+
1183
+  M
1184
+ N
1185
+
1186
+  ,
1187
+ (A.7a)
1188
+ defined modulo equivalence transformations
1189
+
1190
+  M
1191
+ N
1192
+
1193
+  ∼
1194
+
1195
+  MR
1196
+ NR
1197
+
1198
+  ,
1199
+ R ∈ GL(n, C) .
1200
+ (A.7b)
1201
+ We denote by X ⊂ Grn,2n(C) the collection of all n-planes satisfying the two conditions:
1202
+ PTJP = 0 ;
1203
+ (A.8a)
1204
+ P†(iJ)P > 0 .
1205
+ (A.8b)
1206
+ Condition (A.8b) means that the Hermitian matrix P†(iJ)P is positive definite. Condition
1207
+ (A.8a) means that P is a Lagrangian subspace of C2n with respect to the symplectic
1208
+ structure J.
1209
+ By construction, the group Sp(2n, R) naturally acts on X.
1210
+ It turns out that this
1211
+ action is transitive, and X can be identified with Sp(2n, R)/U(n). The simplest way to
1212
+ see this is to make use of the realisation G of Sp(2n, R), eq. (A.2). The picture changing
1213
+ transformation (A.3) is accompanied with
1214
+ P → P = A−1P =
1215
+
1216
+  M
1217
+ N
1218
+
1219
+  .
1220
+ (A.9)
1221
+ For the transformed n-plane P the conditions (A.8) take the form
1222
+ PTJP = 0 ;
1223
+ (A.10a)
1224
+ P†In,nP > 0 .
1225
+ (A.10b)
1226
+ 16
1227
+
1228
+ The latter condition tells us that the matrix M in (A.9) is nonsingular, and therefore
1229
+
1230
+  M
1231
+ N
1232
+
1233
+  ∼
1234
+
1235
+
1236
+ 1n
1237
+ NM −1
1238
+
1239
+  ≡
1240
+
1241
+
1242
+ 1n
1243
+ ψ
1244
+
1245
+  .
1246
+ (A.11)
1247
+ In terms of the n × n matrix ψ, the conditions (A.10) are equivalent to
1248
+ ψT = ψ ,
1249
+ 1n > ψ†ψ .
1250
+ (A.12)
1251
+ The complex n × n matrix ψ constrained by (A.12) and its conjugate ¯ψ provide a global
1252
+ coordinate system for X. Associated with ψ and ¯ψ is the group element
1253
+ S(ψ, ¯ψ) =
1254
+
1255
+  s
1256
+ ¯ψ¯s
1257
+ ψs
1258
+ ¯s
1259
+
1260
+  ∈ Sp(2n, C) ∩ SU(n, n) ,
1261
+ s =
1262
+
1263
+ 1n − ¯ψψ
1264
+ �− 1
1265
+ 2 .
1266
+ (A.13)
1267
+ Its important property is
1268
+ S(ψ, ¯ψ)P0 =
1269
+
1270
+  s
1271
+ ψs
1272
+
1273
+  ∼
1274
+
1275
+
1276
+ 1n
1277
+ ψ
1278
+
1279
+  ,
1280
+ P0 :=
1281
+
1282
+
1283
+ 1n
1284
+ 0
1285
+
1286
+  .
1287
+ (A.14)
1288
+ Thus S(ψ, ¯ψ) maps the “origin” P0 to the point (A.11) of X, and therefore the group
1289
+ Sp(2n, C) ∩ SU(n, n) acts transitively on X. The isotropy subgroup of P0 can be seen to
1290
+ consist of the group elements (A.6), which span U(n). We conclude that
1291
+ X = Sp(2n, C) ∩ SU(n, n)
1292
+ U(n)
1293
+ = Sp(2n, R)
1294
+ U(n)
1295
+ .
1296
+ (A.15)
1297
+ Making use of (A.9) – (A.11), we can reconstruct a generic element of X in the original
1298
+ real realisation (A.1).
1299
+ P = A
1300
+
1301
+
1302
+ 1n
1303
+ ψ
1304
+
1305
+  ∼
1306
+
1307
+
1308
+ 1n + ψ
1309
+ −i(1n − ψ)
1310
+
1311
+  .
1312
+ (A.16)
1313
+ Since the matrices
1314
+ 1n ± ψ are non-singular, P is equivalent to
1315
+ P ∼
1316
+
1317
+  φ
1318
+ 1n
1319
+
1320
+  ,
1321
+ φ = i
1322
+ 1n + ψ
1323
+ 1n − ψ .
1324
+ (A.17a)
1325
+ The properties of φ follow from (A.8):
1326
+ φT = φ ,
1327
+ i
1328
+ �¯φ − φ
1329
+
1330
+ > 0 .
1331
+ (A.17b)
1332
+ 17
1333
+
1334
+ In this paper we make use of the φ-parametrisation (A.17) of the coset space (A.15).
1335
+ The group Sp(2n, R) acts on Sp(2n, R)/U(n) by fractional linear transformations
1336
+ φ → φ′ = (Aφ + B)(Cφ + D)−1 ,
1337
+
1338
+ A
1339
+ B
1340
+ C
1341
+ D
1342
+
1343
+  ∈ Sp(2n, R) ,
1344
+ (A.18)
1345
+ and therefore
1346
+ dφ′ =
1347
+
1348
+ (Cφ + D)−1�Tdφ (Cφ + D)−1 .
1349
+ (A.19)
1350
+ Using the definition of symplectic matrices, eq. (A.1), one can show that the positive-
1351
+ definite matrix Ξ, which is defined by (1.15), transforms as follows:
1352
+ (Ξ′)−1 = (Cφ + D)Ξ−1(C ¯φ + D)T = (C ¯φ + D)Ξ−1(Cφ + D)T .
1353
+ (A.20)
1354
+ Let P1 and P2 be two points in Sp(2n, R)/U(n). We associate with them the following
1355
+ two-point function:
1356
+ s2(P1, P2) = −4Tr
1357
+ ��
1358
+ P†
1359
+ 1J ¯P2
1360
+ ��
1361
+ PT
1362
+ 2 J ¯P2
1363
+ �−1�
1364
+ PT
1365
+ 2 J ¯P1
1366
+ ��
1367
+ P†
1368
+ 1J ¯P1
1369
+ �−1�
1370
+ .
1371
+ (A.21)
1372
+ By construction, it is invariant under arbitrary Sp(2n, R) transformations
1373
+ P1,2 → gP1,2 ,
1374
+ g ∈ Sp(2n, R) .
1375
+ (A.22)
1376
+ It is also invariant under arbitrary equivalence transformations (A.7),
1377
+ P1,2 → P1,2R1,2 ,
1378
+ R1,2 ∈ GL(n, C) .
1379
+ (A.23)
1380
+ Therefore, s2(P1, P2) is a two-point function of Sp(2n, R)/U(n) which is invariant under
1381
+ the isometry group Sp(2n, R). Due to the invariance of s2(P1, P2) under arbitrary right
1382
+ shifts (A.23), both P1 and P2 can be chosen to have the form (A.17). In the case that P1
1383
+ and P2 are infinitesimally separated, s2(P1, P2) becomes
1384
+ ds2 = Tr
1385
+
1386
+ d¯φ Ξ−1dφ Ξ−1�
1387
+ ,
1388
+ (A.24)
1389
+ which is the K¨ahler metric on Sp(2n, R)/U(n), eq. (2.31).
1390
+ 18
1391
+
1392
+ B
1393
+ Alternative field redefinition
1394
+ Here we describe an alternative calculation of Tr ln ∆ compared with that given in
1395
+ section 2.2. Consider a path integral over two vector fields
1396
+ Det ∆−1 = N
1397
+
1398
+ [DB][DA] ei �d4x √−g B ˆ
1399
+ m∆ ˆ
1400
+ mˆnAˆn
1401
+ (B.1)
1402
+ with the operator ∆ ˆmˆn given in (2.9a). We perform an alternative local field definition in
1403
+ the path integral
1404
+ A ˆm → A ˆm,
1405
+ B ˆm → Ξ−1Bm ,
1406
+ (B.2)
1407
+ which was not possible for the original quadratic action (2.8). Now the operator which
1408
+ appeared in (B.1) has the form
1409
+ ˜∆ ˆm
1410
+ ˆn := Ξ−1∆m
1411
+ n ,
1412
+ (B.3)
1413
+ which, once expanded explicitly from (2.9a) and (2.9b), is minimal:
1414
+ ˜∆ ˆm
1415
+ ˆn = 1 δm
1416
+ n✷ + Qm
1417
+ pn∇p + T m
1418
+ n ,
1419
+ (B.4a)
1420
+ Q ˆm
1421
+ pˆn := Ξ−1 (∇pΞ) δm
1422
+ n − Ξ−1 (∇nΞ) δm
1423
+ p + Ξ−1 (∇mΞ) gpn − Ξ−1 (∇qΥ) ǫm
1424
+ pnq ,
1425
+ (B.4b)
1426
+ T ˆm
1427
+ ˆn := −Rm
1428
+ n1 .
1429
+ (B.4c)
1430
+ Although both approaches of obtaining a minimal operator will lead to equivalent log-
1431
+ arithmic divergences up to total derivative, the alternative field definition proves to be
1432
+ much easier to manage computationally, since it solely involves derivatives of Ξ, Ξ−1 and
1433
+ Υ, rather than Ξ1/2 and Ξ−1/2. Following the same procedure as section 2.2, the final
1434
+ result for (a2)total (including total derivative contributions) is
1435
+ (a2)total = n
1436
+ � 1
1437
+ 10F − 31
1438
+ 180G − 1
1439
+ 10✷R
1440
+
1441
+ + 1
1442
+ 4Tr
1443
+
1444
+ Ξ−1(D2φ)Ξ−1(D2 ¯φ) − 2
1445
+
1446
+ Rmn − 1
1447
+ 3Rgmn�
1448
+ Ξ−1(∇mφ)Ξ−1(∇n ¯φ)
1449
+
1450
+ + 1
1451
+ 24Tr
1452
+
1453
+ Ξ−1(∇mφ)Ξ−1(∇m ¯φ)Ξ−1(∇nφ)Ξ−1(∇n ¯φ)
1454
+
1455
+ + 1
1456
+ 48Tr
1457
+
1458
+ Ξ−1(∇mφ)Ξ−1(∇n ¯φ)Ξ−1(∇mφ)Ξ−1(∇n ¯φ)
1459
+
1460
+ + Tr
1461
+
1462
+ ∇mYm�
1463
+ + Tr
1464
+
1465
+ ✷ ˜Z
1466
+
1467
+ .
1468
+ (B.5)
1469
+ 19
1470
+
1471
+ Compared to the original field redefinition, the total derivative contributions are the same
1472
+ for Ym (2.23b) and differ from Z (2.23c)
1473
+ ˜Z := − 1
1474
+ 6Ξ−1(∇mΥ)Ξ−1(∇mΥ) − 1
1475
+ 3Ξ−1(✷Ξ) + 1
1476
+ 3Ξ−1(∇mΞ)Ξ−1(∇mΞ) .
1477
+ (B.6a)
1478
+ Indeed the two results for (a2)total (2.26) and (B.5) differ only by a total derivative, which
1479
+ does not contribute to the induced action
1480
+
1481
+ d4x √−g (a2)total.
1482
+ C
1483
+ Curved space basis structures
1484
+ Included below is a complete list of the basis structures introduced in (2.22). Note that
1485
+ under the trace over matrix indices some of these structures are equivalent to one another
1486
+ (via their transpose), however, since these structures are generated directly during the
1487
+ computation we have left them distinct for ease of computational reproducibility.
1488
+ T1 := Ξ−1(∇mΞ)Ξ−1(∇mΞ)Ξ−1(∇nΞ)Ξ−1(∇nΞ) ,
1489
+ T2 := Ξ−1(∇mΞ)Ξ−1(∇nΞ)Ξ−1(∇mΞ)Ξ−1(∇nΞ) ,
1490
+ T3 := Ξ−1(∇mΞ)Ξ−1(∇mΞ)Ξ−1(∇nΥ)Ξ−1(∇nΥ) ,
1491
+ T4 := Ξ−1(∇mΞ)Ξ−1(∇nΞ)Ξ−1(∇mΥ)Ξ−1(∇nΥ) ,
1492
+ T5 := Ξ−1(∇mΞ)Ξ−1(∇nΞ)Ξ−1(∇nΥ)Ξ−1(∇mΥ) ,
1493
+ T6 := Ξ−1(∇mΞ)Ξ−1(∇mΥ)Ξ−1(∇nΞ)Ξ−1(∇nΥ) ,
1494
+ T7 := Ξ−1(∇mΞ)Ξ−1(∇nΥ)Ξ−1(∇mΞ)Ξ−1(∇nΥ) ,
1495
+ T8 := Ξ−1(∇mΞ)Ξ−1(∇nΥ)Ξ−1(∇nΞ)Ξ−1(∇mΥ) ,
1496
+ T9 := Ξ−1(∇mΥ)Ξ−1(∇mΥ)Ξ−1(∇nΥ)Ξ−1(∇nΥ) ,
1497
+ T10 := Ξ−1(∇mΥ)Ξ−1(∇nΥ)Ξ−1(∇mΥ)Ξ−1(∇nΥ) ,
1498
+ T11 := Ξ−1(✷Ξ)Ξ−1(✷Ξ) ,
1499
+ T12 := Ξ−1(✷Υ)Ξ−1(✷Υ) ,
1500
+ T13 := Ξ−1(✷Ξ)Ξ−1(∇mΞ)Ξ−1(∇mΞ) ,
1501
+ T14 := Ξ−1(✷Ξ)Ξ−1(∇mΥ)Ξ−1(∇mΥ) ,
1502
+ T15 := Ξ−1(✷Υ)Ξ−1(∇mΞ)Ξ−1(∇mΥ) ,
1503
+ T16 := Ξ−1(✷Υ)Ξ−1(∇mΥ)Ξ−1(∇mΞ) ,
1504
+ 20
1505
+
1506
+ T17 := Rmn Ξ−1(∇mΞ)Ξ−1(∇nΞ) ,
1507
+ T18 := Rmn Ξ−1(∇mΥ)Ξ−1(∇nΥ) ,
1508
+ T19 := R Ξ−1(∇mΞ)Ξ−1(∇mΞ) ,
1509
+ T20 := R Ξ−1(∇mΥ)Ξ−1(∇mΥ) .
1510
+ References
1511
+ [1] E. Bergshoeff, M. de Roo and B. de Wit, “Extended conformal supergravity,” Nucl. Phys. B 182,
1512
+ 173 (1981).
1513
+ [2] D. Butter, F. Ciceri, B. de Wit and B. Sahoo, “Construction of all N=4 conformal supergravities,”
1514
+ Phys. Rev. Lett. 118, no.8, 081602 (2017) [arXiv:1609.09083 [hep-th]].
1515
+ [3] D. Butter, F. Ciceri and B. Sahoo, “N = 4 conformal supergravity: the complete actions,” JHEP
1516
+ 01, 029 (2020) [arXiv:1910.11874 [hep-th]].
1517
+ [4] F. Ciceri and B. Sahoo, “Towards the full N = 4 conformal supergravity action,” JHEP 1601, 059
1518
+ (2016) [arXiv:1510.04999 [hep-th]].
1519
+ [5] I. L. Buchbinder, N. G. Pletnev and A. A. Tseytlin, “Induced N=4 conformal supergravity,” Phys.
1520
+ Lett. B 717, 274 (2012) [arXiv:1209.0416 [hep-th]].
1521
+ [6] H. Osborn, “Local couplings and Sl(2,R) invariance for gauge theories at one loop,” Phys. Lett. B.
1522
+ 561, 174 (2003) [arXiv:hep-th/0302119].
1523
+ [7] S. M. Kuzenko, “Non-compact duality, super-Weyl invariance and effective actions,” JHEP 07, 222
1524
+ (2020) [arXiv:2006.00966 [hep-th]].
1525
+ [8] B. de Wit, S. Katmadas and M. van Zalk, “New supersymmetric higher-derivative couplings: Full
1526
+ N=2 superspace does not count!,” JHEP 01, 007 (2011) [arXiv:1010.2150 [hep-th]].
1527
+ [9] J. Gomis, P. Hsin, Z. Komargodski, A. Schwimmer, N. Seiberg and S. Theisen, “Anomalies, confor-
1528
+ mal manifolds, and spheres,” JHEP 03, 022 (2016) [arXiv:1509.08511 [hep-th]].
1529
+ [10] J. Wess and J. Bagger, Supersymmetry and Supergravity, Princeton University Press, 1992.
1530
+ [11] I. L. Buchbinder and S. M. Kuzenko, Ideas and Methods of Supersymmetry and Supergravity, Or a
1531
+ Walk Through Superspace, IOP, Bristol, 1995 (Revised Edition 1998).
1532
+ [12] D. Z. Freedman and A. Van Proeyen, Supergravity, Cambridge University Press, 2012.
1533
+ [13] E. S. Fradkin and A. A. Tseytlin, “Asymptotic freedom in extended conformal supergravities,” Phys.
1534
+ Lett. B 110, 117 (1982); “One-loop beta function in conformal supergravities,” Nucl. Phys. B 203,
1535
+ 157 (1982).
1536
+ 21
1537
+
1538
+ [14] S. M. Paneitz, “A quartic conformally covariant differential operator for arbitrary pseudo-
1539
+ Riemannian manifolds,” MIT preprint, March 1983; published posthumously in: SIGMA 4, 036
1540
+ (2008) [arXiv:0803.4331 [math.DG]].
1541
+ [15] R. J. Riegert, “A non-local action for the trace anomaly,” Phys. Lett. B 134, 56 (1984).
1542
+ [16] M. K. Gaillard and B. Zumino, “Duality rotations for interacting fields,” Nucl. Phys. B193, 221
1543
+ (1981).
1544
+ [17] B. Zumino, “Duality rotations,” in Quantum Structure of Space and Time, M. J. Duff and C. J.
1545
+ Isham (Eds.), Cambridge University Press, 1982 p. 363.
1546
+ [18] G. W. Gibbons and D. A. Rasheed, “Electric-magnetic duality rotations in nonlinear electrodynam-
1547
+ ics,” Nucl. Phys. B454, 185 (1995) [arXiv:hep-th/9506035].
1548
+ [19] G. W. Gibbons and D. A. Rasheed, “SL(2,R) invariance of non-linear electrodynamics coupled to
1549
+ an axion and a dilaton,” Phys. Lett. B365, 46 (1996) [hep-th/9509141].
1550
+ [20] M. K. Gaillard and B. Zumino, “Self-duality in nonlinear electromagnetism,” in Supersymme-
1551
+ try and Quantum Field Theory, J. Wess and V. P. Akulov (Eds.), Springer Verlag, 1998, p. 121
1552
+ [arXiv:hep-th/9705226].
1553
+ [21] M. K. Gaillard and B. Zumino, “Nonlinear electromagnetic self-duality and Legendre transforma-
1554
+ tions,” in Duality and Supersymmetric Theories, D. I. Olive and P. C. West eds., Cambridge Uni-
1555
+ versity Press, 1999, p. 33 [hep-th/9712103].
1556
+ [22] M. Araki and Y. Tanii, “Duality symmetries in non-linear gauge theories,” Int. J. Mod. Phys. A14,
1557
+ 1139 (1999) [hep-th/9808029].
1558
+ [23] S. M. Kuzenko and S. Theisen, “Nonlinear self-duality and supersymmetry,” Fortsch. Phys. 49, 273
1559
+ (2001) [arXiv:hep-th/0007231].
1560
+ [24] P. Aschieri, S. Ferrara and B. Zumino, “Duality rotations in nonlinear electrodynamics and in
1561
+ extended supergravity,” Riv. Nuovo Cim. 31, 625 (2008) [arXiv:0807.4039 [hep-th]].
1562
+ [25] Y. Tanii, Introduction to Supergravity, Springer, 2014.
1563
+ [26] E. Fradkin and A. A. Tseytlin, “Quantum equivalence of dual field theories,” Annals Phys. 162, 31
1564
+ (1985).
1565
+ [27] R. Roiban and A. Tseytlin, “On duality symmetry in perturbative quantum theory,” JHEP 10, 099
1566
+ (2012) [arXiv:1205.0176 [hep-th]].
1567
+ [28] L. D. Faddeev and V. N. Popov, “Feynman diagrams for the Yang-Mills field,” Phys. Lett. B 25, 29
1568
+ (1967).
1569
+ [29] B. S. DeWitt, Dynamical Theory of Groups and Fields, Gordon and Breach, New York, 1965.
1570
+ 22
1571
+
1572
+ [30] A. O. Barvinsky and G. A. Vilkovisky, “The generalized Schwinger-Dewitt technique in gauge the-
1573
+ ories and quantum gravity,” Phys. Rept. 119, 1 (1985).
1574
+ [31] I. G. Avramidi, Heat Kernel and Quantum Gravity, (Lect. Notes Phys. Monogr. 64), Springer, 2000.
1575
+ [32] B. S. DeWitt, The Global Approach to Quantum Field Theory. Vol. 1, 2, (Int. Ser. Monogr. Phys.
1576
+ 114), Oxford University Press, 2003.
1577
+ [33] D. V. Vassilevich, “Heat kernel expansion:
1578
+ User’s manual,” Phys. Rept. 388, 279 (2003)
1579
+ [arXiv:hep-th/0306138 [hep-th]].
1580
+ [34] J. Wess and B. Zumino, “Consequences of anomalous Ward identities,” Phys. Lett. B 37, 95 (1971).
1581
+ [35] E. S. Fradkin and A. A. Tseytlin, “Conformal supergravity,” Phys. Rept. 119, 233 (1985).
1582
+ [36] S. Deser and A. Schwimmer, “Geometric classification of conformal anomalies in arbitrary dimen-
1583
+ sions,” Phys. Lett. B 309, 279 (1993) [arXiv:hep-th/9302047 [hep-th]].
1584
+ [37] M. J. Duff,
1585
+ “Twenty years of the Weyl anomaly,” Class. Quant. Grav. 11, 1387 (1994)
1586
+ [arXiv:hep-th/9308075 [hep-th]].
1587
+ [38] A.
1588
+ A.
1589
+ Tseytlin,
1590
+ “Comments
1591
+ on
1592
+ 4-derivative
1593
+ scalar
1594
+ theory
1595
+ in
1596
+ 4
1597
+ dimensions,”
1598
+ [arXiv:2212.10599 [hep-th]].
1599
+ [39] I. L. Buchbinder and S. V. Ketov, “Single-loop counterterm for four-dimensional sigma model with
1600
+ higher derivatives,” Theor. Math. Phys. 77, 1032 (1988).
1601
+ [40] I. L. Buchbinder and S. V. Ketov, “The fourth-order non-linear sigma models and asymptotic free-
1602
+ dom in four dimensions,” Fortsch. Phys. 39, 1 (1991).
1603
+ [41] I. Bandos, K. Lechner, D. Sorokin and P. K. Townsend, “A non-linear duality-invariant conformal
1604
+ extension of Maxwell’s equations,” Phys. Rev. D 102, 121703 (2020) [arXiv:2007.09092 [hep-th]].
1605
+ [42] B. P. Kosyakov, “Nonlinear electrodynamics with the maximum allowable symmetries,” Phys. Lett.
1606
+ B 810, 135840 (2020) [arXiv:2007.13878 [hep-th]].
1607
+ [43] S. M. Kuzenko, “Superconformal duality-invariant models and N = 4 SYM effective action,” JHEP
1608
+ 09, 180 (2021) [arXiv:2106.07173 [hep-th]].
1609
+ 23
1610
+
KdAyT4oBgHgl3EQfsflO/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
KtE1T4oBgHgl3EQfGgOV/content/tmp_files/2301.02915v1.pdf.txt ADDED
@@ -0,0 +1,1056 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ SFP: Providing System Call Flow Protection against Software
2
+ and Fault Attacks
3
+ Robert Schilling
4
+ robert.schilling@iaik.tugraz.at
5
+ Graz University of Technology
6
+ Graz, Austria
7
+ Pascal Nasahl
8
+ pascal.nasahl@iaik.tugraz.at
9
+ Graz University of Technology
10
+ Graz, Austria
11
+ Martin Unterguggenberger
12
+ martin.unterguggenberger@lamarr.at
13
+ Graz University of Technology
14
+ Lamarr Security Research
15
+ Graz, Austria
16
+ Stefan Mangard
17
+ stefan.mangard@iaik.tugraz.at
18
+ Graz University of Technology
19
+ Lamarr Security Research
20
+ Graz, Austria
21
+ Abstract
22
+ With the improvements in computing technologies, edge devices
23
+ in the Internet-of-Things or the automotive area have become more
24
+ complex. The enabler technology for these complex systems are
25
+ powerful application core processors with operating system sup-
26
+ port, such as Linux, replacing simpler bare-metal systems. While
27
+ the isolation of applications through the operating system increases
28
+ the security, the interface to the kernel poses a new threat. Different
29
+ attack vectors, including fault attacks and memory vulnerabilities,
30
+ exploit the kernel interface to escalate privileges and take over the
31
+ system.
32
+ In this work, we present SFP, a mechanism to protect the exe-
33
+ cution of system calls against software and fault attacks providing
34
+ integrity to user-kernel transitions. SFP provides system call flow
35
+ integrity by a two-step linking approach, which links the system call
36
+ and its origin to the state of control-flow integrity. A second linking
37
+ step within the kernel ensures that the right system call is executed
38
+ in the kernel. Combining both linking steps ensures that only the
39
+ correct system call is executed at the right location in the program
40
+ and cannot be skipped. Furthermore, SFP provides dynamic CFI
41
+ instrumentation and a new CFI checking policy at the edge of the
42
+ kernel to verify the control-flow state of user programs before en-
43
+ tering the kernel. We integrated SFP into FIPAC, a CFI protection
44
+ scheme exploiting ARM pointer authentication. Our prototype is
45
+ based on a custom LLVM-based toolchain with an instrumented
46
+ runtime library combined with a custom Linux kernel to protect sys-
47
+ tem calls. The evaluation of micro- and macrobenchmarks based on
48
+ SPEC 2017 show an average runtime overhead of 1.9 % and 20.6 %,
49
+ which is only an increase of 1.8 % over plain control-flow protec-
50
+ tion. This small impact on the performance shows the efficiency of
51
+ SFP for protecting all system calls and providing integrity for the
52
+ user-kernel transitions.
53
+ Permission to make digital or hard copies of part or all of this work for personal or
54
+ classroom use is granted without fee provided that copies are not made or distributed
55
+ for profit or commercial advantage and that copies bear this notice and the full citation
56
+ on the first page. Copyrights for third-party components of this work must be honored.
57
+ For all other uses, contact the owner/author(s).
58
+ HASP ’22, October 1, 2022, Chicago, IL, USA
59
+ © 2022 Copyright held by the owner/author(s).
60
+ ACM ISBN 978-1-4503-9871-8/22/10.
61
+ https://doi.org/10.1145/3569562.3569565
62
+ CCS Concepts
63
+ • Security and privacy → Tamper-proof and tamper-resistant
64
+ designs; Side-channel analysis and countermeasures.
65
+ Keywords
66
+ System Call Flow Protection, Control-Flow Integrity, Fault Attacks.
67
+ ACM Reference Format:
68
+ Robert Schilling, Pascal Nasahl, Martin Unterguggenberger, and Stefan
69
+ Mangard. 2022. SFP: Providing System Call Flow Protection against Software
70
+ and Fault Attacks. In Hardware and Architectural Support for Security and
71
+ Privacy (HASP ’22), October 1, 2022, Chicago, IL, USA. ACM, New York, NY,
72
+ USA, 8 pages. https://doi.org/10.1145/3569562.3569565
73
+ 1
74
+ Introduction
75
+ Devices in the Internet-of-Things, automotive area, or indus-
76
+ trial computers are getting more complex and powerful. While in
77
+ the past, those systems used deeply embedded processing units
78
+ with bare-metal applications, they now are based on powerful
79
+ application-grade processors with the support for operating sys-
80
+ tems [40]. Off-the-shelf operating systems, e.g., Linux, build the
81
+ foundation for complex software [10]. They isolate different pro-
82
+ grams, manage privileges, or restrict access to particular memory
83
+ regions. User programs can only access kernel features via a small
84
+ but well-defined interface, the system call (syscall) interface. For
85
+ this reason, this interface to the kernel is a prominent target for
86
+ attackers to escalate privileges and gain access to the system [48].
87
+ One way of manipulating the system call interface is control-flow
88
+ hijacking, which can be conducted with different methodologies.
89
+ Classical control-flow attacks performed in software exploit a mem-
90
+ ory vulnerability to modify a code-pointer or return address on the
91
+ stack to redirect the execution of the program. When fault attacks
92
+ are considered in the threat model, the attack surface in the kernel
93
+ interface increases even more. While faults can manipulate the
94
+ control-flow on a much finer granularity, e.g., they can manipulate
95
+ direct branches, they can also manipulate the system call being
96
+ executed. A control flow hijack can skip or change which system
97
+ call gets executed, possibly with a critical security impact. Further-
98
+ more, precise faults can directly manipulate which system call gets
99
+ executed by manipulating the system call register containing the
100
+ system call number.
101
+ One way to counteract control-flow attacks is a generic mecha-
102
+ nism called control-flow integrity (CFI) [1]. CFI exists at different
103
+ arXiv:2301.02915v1 [cs.CR] 7 Jan 2023
104
+
105
+ HASP ’22, October 1, 2022, Chicago, IL, USA
106
+ Schilling et al.
107
+ granularities, depending on which threat model is considered. In a
108
+ classical software setting, only indirect branches are protected since
109
+ those are the only ones an attacker can manipulate. Faults pose
110
+ a more severe threat, thus requiring even more robust protection.
111
+ Fine-grained instrumentation [2, 22, 36] protects the control-flow
112
+ of a program on basic-block or even instruction-level [13, 53]. As a
113
+ result, these countermeasures protect direct or indirect branches
114
+ or even the whole instruction sequence. Instruction-granular pro-
115
+ tection requires intrusive hardware changes to deal with the per-
116
+ formance penalty, which is unsuitable for commodity devices.
117
+ CFI can be enforced in different security domains. While tra-
118
+ ditionally, CFI was only used to protect user-space applications,
119
+ different CFI protection schemes can also protect the kernel [16, 21].
120
+ However, currently, there are no CFI protection schemes available
121
+ providing protection between different security domains, i.e., the
122
+ transitions between the user-space program and the kernel. Thus,
123
+ the large attack surface, the transitions between user programs
124
+ to the kernel remain unprotected. Hence, there is a need for new
125
+ countermeasures that protect the software interface to the kernel
126
+ and provides system call flow integrity for commodity devices.
127
+ Contribution
128
+ In this work, we solve the problem of the unprotected system
129
+ call interface and provide system call flow protection on top of
130
+ CFI, protecting the interface to the kernel against both software
131
+ and fault attacks. SFP cryptographically links the system call itself
132
+ and its origin to a global CFI state that is verified at runtime in the
133
+ operating system. A second-stage linking mechanism within the
134
+ kernel dynamically applies a second link to ensure that the correct
135
+ system call was selected and executed.
136
+ To automatically protect arbitrary programs, we develop an
137
+ LLVM-based toolchain to provide CFI and instrument all system
138
+ calls. We provide an instrumented standard library, where all system
139
+ calls are instrumented with our system call protection. Furthermore,
140
+ we modify the Linux kernel to dynamically verify at runtime that
141
+ the correct system call was executed.
142
+ We implement SFP on top of FIPAC, a software-based CFI scheme
143
+ exploiting ARM pointer authentication. We evaluate the perfor-
144
+ mance of SFP based on a microbenchmark to measure the impact
145
+ of SFP on the system call latency, leading to an overhead of 1.9 %.
146
+ To show the applicability to real-world programs, we perform mac-
147
+ robenchmarks using the SPEC 2017 application benchmark. On
148
+ average, we measure a runtime overhead of 20.6 % for protected
149
+ applications. Summarized, we make the following contributions:
150
+ • We provide system call flow protection by linking the syscall
151
+ and its origin to a global CFI state and verifying it at runtime.
152
+ • We provide a prototype implementation comprising an LLVM-
153
+ based toolchain, an instrumented C-standard library, and a
154
+ modified Linux kernel.
155
+ • We evaluate the performance based on a microbenchmark
156
+ and on the application-grade SPEC 2017 benchmark.
157
+ 2
158
+ Background
159
+ This section provides background to fault attacks, pointer au-
160
+ thentication, and control-flow integrity.
161
+ 2.1
162
+ Fault Attacks
163
+ Injecting faults into a digital circuit is a powerful threat allowing
164
+ adversaries to break the security of a system entirely. The effect of
165
+ an induced fault at the electrical level includes timing violations
166
+ and transient voltage and current changes [42]. Typically, the effect
167
+ of a fault is modeled at the bit-level with transient bit-flips and
168
+ permanent stuck-at effects [52].
169
+ Common fault injection approaches include voltage or clock
170
+ glitching, laser fault injection (LFI), and electromagnetic fault injec-
171
+ tion (EMFI) [54]. While these methodologies require physical access
172
+ to the device, recently, new techniques relaxing this constraint have
173
+ been released [11, 32, 39, 46]. E.g., in Plundervolt [32], the attacker
174
+ utilizes the dynamic voltage scaling interface of the CPU to induce
175
+ faults remotely in software.
176
+ Independently of the injection technique, an attacker can exploit
177
+ the effects of faults in various ways. E.g., fault attacks on encryp-
178
+ tion primitives enable the attacker to leak secret keys [4, 12, 18].
179
+ Despite dedicated attacks on encryption, fault attacks are also ac-
180
+ tively used to bypass security features, such as secure boot, on
181
+ embedded systems [17, 23, 35, 37, 49]. By inducing targeted faults
182
+ into the program counter of a processor, faults enable an adversary
183
+ to arbitrarily hijack the control-flow of a program [34, 47, 48].
184
+ 2.2
185
+ Control-Flow Integrity
186
+ The control-flow of a program can be hijacked using software
187
+ attacks, fault attacks, or combined software-fault attacks. Therefore,
188
+ various countermeasures targeting different attacker models were
189
+ proposed to protect programs from these attack vectors.
190
+ Software CFI Schemes. Software-based control-flow attacks are
191
+ typically performed by exploiting a memory vulnerability. By over-
192
+ writing control-flow-related data, e.g., return addresses or function
193
+ pointers, the adversary can arbitrarily manipulate the execution of
194
+ the program [5, 24, 45]. To mitigate these attacks, software control-
195
+ flow integrity (SCFI) schemes [15, 25, 27, 31] aim to provide pointer
196
+ integrity using different mechanisms. E.g., PARTS [27] uses ARM
197
+ pointer authentication (PA) to cryptographically seal and verify
198
+ security-sensitive pointers to protect them while stored in memory.
199
+ Fault CFI Schemes. Software CFI schemes only protect control-
200
+ flow transfers the adversary can also manipulate in the software
201
+ threat model, i.e., return addresses and function pointers. Faults also
202
+ allow the attacker to tamper with static control-flow data stored in
203
+ the program or even skip instructions. Therefore, fault control-flow
204
+ integrity (FCFI) schemes enforce their protection at a finer granular-
205
+ ity, e.g., at the instruction level [13, 53]. However, as these schemes
206
+ usually require custom hardware changes to avoid tremendous
207
+ runtime overheads, software-based FCFI schemes typically operate
208
+ at the function or basic block level [36, 41]. These schemes track
209
+ the execution of the program using a signature and compare this
210
+ running signature with a precomputed signature during runtime.
211
+ Software Fault CFI Schemes. As most FCFI schemes [36, 41] do
212
+ not consider a software attacker in their threat model, software
213
+ attacks allow the adversary to bypass most FCFI schemes. Here, the
214
+ adversary uses a memory bug to overwrite the state maintained in
215
+ software and arbitrarily hijacks the control-flow. Hence, mitigating
216
+ software, fault, and software-fault combined attacks require even
217
+ stronger countermeasures, i.e., software fault CFI (SFCFI) schemes.
218
+
219
+ SFP: System Call Flow Protection
220
+ HASP ’22, October 1, 2022, Chicago, IL, USA
221
+ 2.3
222
+ FIPAC
223
+ FIPAC [44] is a software fault CFI (SFCFI) scheme mitigating soft-
224
+ ware and fault-based control-flow attacks exploiting ARM pointer
225
+ authentication. Internally, FIPAC maintains a global state through
226
+ the entire program execution. When entering a basic block, i.e., a
227
+ block of consecutive instructions without a control-flow transfer,
228
+ FIPAC cryptographically updates the state. Depending on FIPAC’s
229
+ configured checking policy, the value of the state is compared to the
230
+ expected value determined during the compilation of the program
231
+ at the end of each basic block, function, or program. On control-flow
232
+ merges, i.e., indirect calls, the state is updated using a justification
233
+ signature to ensure that different valid control-flow paths yield an
234
+ identical state. To prevent a software adversary from predicting and
235
+ overwriting the state using a memory bug, a MAC is utilized for
236
+ the state update. Moreover, the state update and check functions
237
+ cryptographically derive and verify the running signature on pro-
238
+ gram execution. FIPAC uses the pointer authentication instructions
239
+ of modern ARMv8.6A architectures for the MAC computation.
240
+ ARM Pointer Authentication. ARM pointer authentication is a
241
+ hardware feature introduced with ARMv8.3A [29] and updated in
242
+ ARMv8.6A [30]. This extension provides new instructions to cryp-
243
+ tographically sign and authenticate data. These instructions derive
244
+ a message authentication code (MAC) using a secret key, a 64-bit
245
+ modifier, and the value of a provided register, e.g., an address stored
246
+ in a pointer. A fraction of this MAC, called the pointer authenti-
247
+ cation code (PAC), is then stored in the upper bits of the provided
248
+ register. By using the authentication instructions, the authenticity
249
+ of the MAC and the data in the register can then be verified.
250
+ 2.4
251
+ Linux and the System Call Interface
252
+ Linux [50] is a monolithic kernel used in billions of devices [51]
253
+ and embedded systems. To retrieve a particular service or get a
254
+ specific resource, e.g., reading and writing a file, or to get dynamic
255
+ memory, the user program needs to request this from the kernel,
256
+ i.e., via a system call. A system call changes the privilege and trans-
257
+ fers the execution from the user-space program to the kernel of
258
+ the operating system, which then grants or denies the requested
259
+ service. A user-space program aiming to execute a certain sys-
260
+ tem call invokes the corresponding system call wrapper routine
261
+ provided by a library. This wrapper then initiates a control-flow
262
+ and privilege transfer into the kernel space by using a dedicated
263
+ instruction, i.e., the svc instruction for AArch64. The system call
264
+ instruction requires the system call number of the requested service
265
+ and additional optional parameters as arguments.
266
+ 3
267
+ Threat Model and Attack Scenario
268
+ Our threat model considers a powerful adversary capable of per-
269
+ forming software attacks, fault attacks, or combined software and
270
+ fault attacks. This attacker can exploit memory vulnerabilities to ar-
271
+ bitrarily read or modify data in memory. However, we assume that
272
+ the code segment of the program cannot be modified by a software
273
+ adversary by, for example, exploiting memory vulnerabilities. Nev-
274
+ ertheless, by inducing faults, the attacker can flip bits in memory,
275
+ the registers, the code segment, or the instruction pipeline of the
276
+ processor. We assume that the control-flow of executed programs
277
+ and the kernel is protected using an SFCFI scheme, such as FIPAC.
278
+ Note that faults on the data, except the syscall register, are out
279
+ of the scope of this work. It requires orthogonal schemes, e.g.,
280
+ User mode
281
+ Application
282
+ ...
283
+ syscall_C()
284
+ ...
285
+ libc syscall wrapper
286
+ syscall_C()
287
+ {
288
+ ...
289
+ syscall args
290
+ syscall numb
291
+ svc
292
+ ...
293
+ }
294
+ Kernel mode
295
+ Syscall handler
296
+ syscall_C service routine
297
+ ...
298
+ syscall_B service routine
299
+ ...
300
+ sys_exit
301
+
302
+ Figure 1: Redirecting a system call using fault attacks.
303
+ 1 basic_block:
304
+ 2
305
+ ...
306
+ 3
307
+ ldr w8, memAddress
308
+ ; load data from memAddress to w8
309
+ 4
310
+ ...
311
+ 5
312
+ mov x0, #...
313
+ ; arguments for C system call
314
+ 6
315
+ mov w8, #syscall_C
316
+ ; system call number for C
317
+ 7
318
+ svc #0
319
+ Listing 1: Invoking system call C on AArch64.
320
+ redundancy encoding schemes for data [6], for their protection. We
321
+ assume ARM PA to be cryptographically secure, and the attacker
322
+ does not have access to the encryption keys. Furthermore, the
323
+ operating system is assumed to be secure, providing isolation of
324
+ the kernel task structure to the user program.
325
+ 3.1
326
+ Attack Scenario
327
+ Within this threat model, the adversary aims to hijack the pro-
328
+ gram’s interface to the Linux kernel. In the example shown in
329
+ Figure 1, the user program invokes the system call C using the
330
+ Linux system call interface. However, by using a fault attack or a
331
+ software-fault combined attack, the adversary can either (i) redirect
332
+ the system call to B or (ii) entirely skip the system call.
333
+ Listing 1 shows the instruction sequence to invoke the system
334
+ call C on AArch64. The system call number is stored in register w8,
335
+ and the system call arguments are stored in the remaining registers.
336
+ By flipping bits in register w8 using faults, the adversary can redirect
337
+ (i) the execution to a different system call.
338
+ Moreover, the syscall gadget in Listing 1 is susceptible to com-
339
+ bined attacks. A software-fault combined attacker utilizes a memory
340
+ vulnerability to overwrite data at address memAddress. Afterward,
341
+ in Line 4, the adversary hijacks the execution of the program by
342
+ flipping bits in the program counter to redirect the control-flow
343
+ to the svc instruction in Line 7, responsible for switching to the
344
+ kernel. This attack enables the adversary to invoke arbitrary system
345
+ calls. In addition to these attacks, a fault attacker can also corrupt
346
+ the svc instruction to skip (ii) the execution of the entire syscall.
347
+ SCFI schemes, such as FIPAC, currently cannot mitigate these
348
+ attacks as these countermeasures do not consider transitions be-
349
+ tween user-space and kernel space in their threat model. While
350
+ they only protect the user-space application, they fail to provide
351
+ protection for the kernel interface, posing a large threat surface
352
+ for critical vulnerabilities. Furthermore, current SCFI protection
353
+ schemes use static control-flow instrumentation, which is the same
354
+ for subsequent calls to the program. As a result, an attacker with
355
+ access to the code segment or to general-purpose registers can learn
356
+ from subsequent program executions. Thus, it would be possible
357
+ for an attacker to attempt multiple control-flow attacks until the
358
+ hijack succeeds.
359
+ 3.2
360
+ FIPAC Intra Basic Block Protection
361
+ The authors of FIPAC describe a mechanism to extend the pro-
362
+ tection guarantees of FIPAC from inter to intra-basic block secu-
363
+ rity [44]. By applying a state update after every instruction within a
364
+
365
+ HASP ’22, October 1, 2022, Chicago, IL, USA
366
+ Schilling et al.
367
+ Check(S, S𝐵)
368
+ ...
369
+ Compute Sig𝐵2
370
+ Patch(S, Sig𝐵2)
371
+ Check(S, S𝐵2)
372
+ Syscall exit
373
+ Check(S, S𝐶)
374
+ ...
375
+ Compute Sig𝐶2
376
+ Patch(S, Sig𝐶2)
377
+ Check(S, S𝐶2)
378
+ Syscall exit
379
+ Update(S, A)
380
+ A
381
+ Patch(S, Sig𝐶1)
382
+ Syscall C
383
+ ...
384
+ Application
385
+ Kernel
386
+ Syscall B
387
+ Syscall C
388
+
389
+
390
+
391
+ Figure 2: System Call protection in SFP. Before a syscall, we
392
+ cryptographically bind the syscall to the CFI state for later
393
+ verification and second-stage linking in the kernel.
394
+ basic block, the subsequently also update the CFI state continuously.
395
+ Although this mechanism can be applied around syscalls, it does
396
+ not add any protection. With a state update before and after the
397
+ system call, an attacker can still fault the syscall number or manip-
398
+ ulate the svc instruction to perform a nop instruction. Although
399
+ this attack manipulates the execution of the system call, FIPAC’s
400
+ extended intra-basic protection does not detect these attacks. Con-
401
+ sequently, it requires a different protection scheme to provide call
402
+ flow protection for system calls.
403
+ 4
404
+ Design of SFP
405
+ In this section, we present SFP, a mechanism that provides sys-
406
+ tem call flow protection by exploiting a stateful CFI protection
407
+ scheme. While SFP is generic and compatible with different CFI
408
+ protection schemes, our design exploits FIPAC as the underlying
409
+ CFI protection scheme. Section 7.3 discusses the compatibility as-
410
+ pects and how SFP can be applied to different CFI schemes.
411
+ 4.1
412
+ Requirements for System Call Protection
413
+ The goal of SFP is to protect the system call interface to the
414
+ kernel against software, fault, and combined attacks. Based on the
415
+ attack scenario from Section 3, the protection of SFP must fulfill
416
+ the following requirements.
417
+ R1 System Call Number. Prevent an attacker from manipulating
418
+ the system call number to a different system call.
419
+ R2 System Call Execution. Ensure that a syscall cannot be skipped.
420
+ R3 System Call Protection. Ensure the system call dispatcher in
421
+ the kernel executes the correct system call function.
422
+ R4 Dynamic CFI Instrumentation. Provide a dynamic CFI in-
423
+ strumentation to ensure protection between consecutive
424
+ program executions.
425
+ 4.2
426
+ System Call Protection
427
+ To fulfill requirements R1 to R3, SFP introduces a two-step ap-
428
+ proach cryptographically linking the syscall to the state of the
429
+ deployed SCFI scheme. First, at the system call caller site, we cryp-
430
+ tographically link the system call origin and which system call we
431
+ want to execute to the cryptographic CFI state. Second, at runtime,
432
+ we perform a second-stage linking operation during the system call
433
+ operation, confirming that the correct syscall gets executed.
434
+ First-Stage System Call Linking. We statically identify at compile-
435
+ time which system call is getting executed for all locations in the
436
+ program. To protect the system call, SFP binds the syscall to the CFI
437
+ state, i.e., to perform a CFI state update with the system call number.
438
+ The system call number is a monotonically increasing number, thus
439
+ not providing a significant Hamming distance between different
440
+ system calls. A single bit-flip on the system call number changes the
441
+ system call to a different one. As a result, the system call number
442
+ cannot safely be used to bind it to the CFI state since faults can
443
+ easily manipulate the system call to a different one.
444
+ To overcome this limitation and perform a safe and secure state
445
+ update, we need to compute a system call-dependent update value
446
+ with a sufficiently large Hamming distance. In SFP, we exploit the
447
+ cryptographic properties of ARM PA for this purpose. We use com-
448
+ putation of a PACIA operation, with the system call and a random
449
+ modifier as input, and compute a cryptographic 15-bit patch value
450
+ for the particular system call. Due to the cryptographic MAC op-
451
+ erations of ARM PA, the patch values for subsequent system call
452
+ numbers have a large Hamming distance and cannot be computed
453
+ without having access to the secret ARM PA key. The computa-
454
+ tion of those patch values occurs at compile-time or load time and
455
+ replaces the empty patch values in the binary.
456
+ Before executing a system call and jumping to the kernel, we
457
+ patch the CFI state with the statically computed system call patch,
458
+ thus performing the first-stage linking. At this point in time, we
459
+ bind the future execution of the particular system call to the CFI
460
+ state ahead of executing it. Performing first-stage linking already
461
+ provides protection for requirements R1 and partly R2.
462
+ Second-Stage System Call Linking. After linking the system call
463
+ to the CFI state in the user-space of the program, the system call
464
+ is executed, and the execution switches into the kernel. Via dis-
465
+ patching code and the selected system call in the general-purpose
466
+ register w8, the kernel selects the correct system call function and
467
+ executes it. At the end of each system call function, we apply a sec-
468
+ ond patch, i.e., the second-stage linking to the CFI state, confirming
469
+ that the previously selected system call was really executed. This
470
+ patch value is computed dynamically during the execution of the
471
+ syscall. The second linking step ensures that both requirements R2
472
+ and R3 are fulfilled.
473
+ In Figure 2, we summarize SFP’s system call protection. A user
474
+ program performs the first-stage linking and patches the CFI state
475
+ with a statically computed syscall patch to link the execution of a
476
+ system call. The execution transitions to the kernel, which executes
477
+ the desired system call function. At the end of the system call, the
478
+ kernel performs the second-stage linking operation, followed by a
479
+ CFI check operation. The later second-stage linking operation only
480
+ succeeds when the correct system call is linked to the CFI state. As a
481
+ result, SFP’s approach translates system call errors, independent of
482
+ how they occur, to CFI state errors, which eventually are detected
483
+ through the checking policy of the selected CFI protection scheme.
484
+ Note, Figure 2 includes CFI checks at the beginning and end of the
485
+ syscall to immediately detect a wrong syscall when entering the
486
+ kernel and after the syscall’s execution.
487
+ 4.3
488
+ Dynamic Instrumentation
489
+ Existing SFCFI protection schemes [13, 33, 44, 53] use a static
490
+ post-processing or encryption phase. A dedicated post-processing
491
+ tool recovers the control-flow, computes the patch and check val-
492
+ ues, and modifies the program. The static approach with a single
493
+
494
+ SFP: System Call Flow Protection
495
+ HASP ’22, October 1, 2022, Chicago, IL, USA
496
+ encryption key leads to the fact that all executions of the same
497
+ program use the same CFI values, e.g., patches, updates, or checks.
498
+ By observing the used CFI-related values, attackers can more easily
499
+ craft valid CFI states to bypass the control-flow protection.
500
+ In SFP, we overcome this limitation by splitting up the toolchain
501
+ and integrating the CFI instrumentation into the kernel. When
502
+ starting a program, the ELF loader of the OS identifies a CFI in-
503
+ strumented program. It generates a random ARM PA encryption
504
+ key and stores it in the process task structure. The ELF loader then
505
+ performs the per-program call unique CFI instrumentation and
506
+ computes the expected CFI state and all patch values needed to
507
+ handle the control-flow. The CFI states are stored along with the
508
+ process task structure within the kernel. With this mechanism, sub-
509
+ sequent calls to the same program create different encryption keys.
510
+ As a result, it guarantees that different CFI values are generated on
511
+ each new program start, i.e., fulfilling requirement R4.
512
+ Kernel Checking Policy. In SFP, we develop a novel CFI checking
513
+ policy at the edge of the operating system. Due to dynamically
514
+ instrumenting the program when starting it, the operating system
515
+ exactly knows the expected CFI state for every location of the
516
+ program. When a user program now enters the kernel, e.g., due to
517
+ a system call instruction, the kernel, which has access to both the
518
+ user program state and the expected CFI states, can verify them. If
519
+ the current CFI state matches the expected state, the system call
520
+ continues. However, if the CFI state deviates from the expected
521
+ state, a CFI error is detected, and the operating system aborts the
522
+ program execution. A CFI check at the end of the syscall confirms
523
+ the execution of the right syscall. Apart from system calls, a user
524
+ program can enter the operating system also via different execution
525
+ paths. We include the same checking policy when a timer interrupt
526
+ is raised, and the kernel is entered.
527
+ 5
528
+ Implementation
529
+ The prototype implementation of SFP consists of two parts. First,
530
+ we develop a toolchain to automatically compile and instrument
531
+ arbitrary C-programs with CFI, including a custom runtime library.
532
+ Second, we modify the kernel of the Linux operating system to
533
+ include the system call verification, the new checking policy, and
534
+ the dynamic instrumentation on the program start.
535
+ 5.1
536
+ Toolchain
537
+ Compiler. We base the toolchain on the modified compiler of
538
+ FIPAC [43], which is based on the LLVM [26] compiler framework.
539
+ We adapt the AArch64 backend of the compiler to instrument the
540
+ control-flow and embed control-flow meta information in a custom
541
+ section of the ELF binary. The compiler inserts the updates for
542
+ every basic block, inserts patches for control-flow merges, and also
543
+ deals with call instructions. Our modified compiler emits a running
544
+ ELF binary but leaves all patch values for control-flow merges and
545
+ system calls to be zero. The necessary post-processing step is shifted
546
+ to the operating system, which computes all patches at the program
547
+ start. Note that the instrumented program does not contain any
548
+ check instructions as they are part of the transition to the operating
549
+ system and are performed in the kernel.
550
+ C Standard Library. System calls are typically invoked via wrap-
551
+ per functions provided by the standard library of the programming
552
+ language. This prototype toolchain uses a CFI-instrumented version
553
+ of the musl [19] C standard library. The standard library provides
554
+ 1 basic_block:
555
+ 2
556
+ ...
557
+ 3
558
+ mov x0, #...
559
+ ; arguments for B system call
560
+ 4
561
+ mov x15, #0
562
+ ; Zero system call patch
563
+ 5
564
+ eor x28, x28, x15
565
+ ; Perform a CFI state update
566
+ 6
567
+ mov w8, #syscall_B
568
+ ; system call number for B
569
+ 7
570
+ svc #0
571
+ ; Jump to kernel
572
+ Listing 2: Patched system call in the musl standard library.
573
+ wrapper functions for all system calls or uses system calls directly
574
+ in different library functions. We identify every system call in the
575
+ musl standard library and insert the necessary patch sequence con-
576
+ taining an immediate load and the xor-based state update ahead
577
+ of executing the system call. Listing 2 summarizes the first-stage
578
+ linking, where the immediate value for the mov instruction is zero.
579
+ When starting the binary, the operating system computes the actual
580
+ patch value for this system call and fills out the correct load value.
581
+ 5.2
582
+ Kernel Support
583
+ SFP requires minor modifications to the operating system. We
584
+ base the prototype of SFP on the Linux kernel in version 5.15.32 [3].
585
+ Dynamic Instrumentation on Program Start. On program start,
586
+ when an instrumented ELF binary is started, SFP performs the per-
587
+ program instrumentation of the program. First, the kernel generates
588
+ a random encryption key used for the PA instrumentation. With the
589
+ help of control-flow metadata, which is stored along with the ELF
590
+ binary in a metadata section, we compute the CFI state throughout
591
+ the program and fill the necessary patch values for justifying sig-
592
+ natures. Furthermore, we compute the syscall- and key-dependent
593
+ patch values that are used to protect the system call interface. For
594
+ every system call in the program, we compute its PAC based on
595
+ the system call number and user-space program unique modifier.
596
+ The resulting PAC value, which is not guessable by the attacker, is
597
+ filling out the immediate patch value before the syscall.
598
+ As discussed, the instrumented program does not contain dedi-
599
+ cated CFI check operations as they are performed when entering the
600
+ kernel. Instead, we store the expected CFI state for each program
601
+ location in the task’s kernel structure. To reduce the storage over-
602
+ head, we use a RangeMap, to only have one entry for a contiguous
603
+ range of states, where it does not change.
604
+ System Call Verification. During the system call, the user program
605
+ updates the CFI state with a statically computed cryptographic
606
+ patch value that depends on the system call number. The verification
607
+ that the correct system call gets executed happens in the kernel.
608
+ After the system call jumps into the kernel, a dispatcher code selects
609
+ the correct system call function to be executed. At the end of every
610
+ system call function in the kernel, we perform the second-stage
611
+ linking. Based on the system call number, we dynamically compute
612
+ a second patch value dependent on the currently executed system
613
+ call. In Listing 3, we summarize this operation sequence, where we
614
+ perform the second-stage linking within the kernel. To retrieve a
615
+ cryptographically secure patch value, we exploit ARM PA’s PACIA
616
+ instruction, which takes the system call and a modifier as input
617
+ operands. Note that the modifier used for the kernel update of the
618
+ CFI state is different from the one used for the first-stage linking
619
+ in the user program. This property is essential to avoid attackers
620
+ being able to skip system calls entirely since patching the CFI state
621
+ twice with the same value would cancel out and has no permanent
622
+
623
+ HASP ’22, October 1, 2022, Chicago, IL, USA
624
+ Schilling et al.
625
+ 1 syscall_A:
626
+ 2
627
+ ...
628
+ 3
629
+ mov x16, #1
630
+ ; Load kernel modifier
631
+ 4
632
+ pacia x8, x16
633
+ ; Compute system call patch
634
+ 5
635
+ eor x28, x28, x15
636
+ ; Perform 2nd stage linking
637
+ 6
638
+ and x28, x28, #0xffffffff00000000 ; Clear syscall
639
+ 7
640
+ ret
641
+ ; number from CFI state
642
+ Listing 3: Dynamically computing the system call patch and
643
+ removing it from the CFI state at the system call end.
644
+ effect on the CFI state. We finally apply the computed patch to the
645
+ CFI state and clear the lower bits from the system call.
646
+ Checking Policy at the Kernel Boundary. Whenever a user pro-
647
+ gram enters the kernel, SFP performs a CFI check to validate if the
648
+ current CFI state still matches the expected state. We perform CFI
649
+ checks on two entering points: During a system call and when a
650
+ timer interrupt is raised. With the help of the CFI states stored in a
651
+ RangeMap within the process structure and the knowledge of the
652
+ program’s current program counter, we look up the expected CFI
653
+ state for the program location. If the current CFI state, stored in the
654
+ register x28 of the user program state, diverges from the expected
655
+ state, a CFI error is raised, and SFP stops the program execution.
656
+ For syscalls, we perform a second CFI check at the end of the syscall
657
+ function in the kernel to ensure the syscall was really executed.
658
+ 6
659
+ Evaluation
660
+ In this section, we first evaluate the security of SFP and show
661
+ how it provides protection and the defined threat model. Second,
662
+ we evaluate the functionality and the performance overhead of the
663
+ prototype implementation.
664
+ 6.1
665
+ Security Evaluation
666
+ We analyze the security guarantees of SFP and show how differ-
667
+ ent attacks within the threat model are mitigated.
668
+ Control-Flow Hijacks in the User-Space or Kernel. SFP provides CFI
669
+ protection for the user-space application based on the selected un-
670
+ derlying CFI protection scheme. The prototype uses FIPAC, a basic-
671
+ block granular CFI scheme, protecting all direct/indirect branches
672
+ as well as direct/indirect calls. The protection domain includes the
673
+ C standard library, which is fully CFI instrumented. Consequently,
674
+ an attacker cannot redirect syscalls in the user-space application
675
+ by redirecting the control-flow to a different wrapper function of
676
+ the standard library. Control-flow attacks in the kernel are detected
677
+ via the kernel internal CFI protection scheme.
678
+ Skipping a System Call. When skipping a system call instruction,
679
+ i.e., the svc instruction, the first-stage linking already occurred. Sub-
680
+ sequently, the skipped system call misses the second-stage linking
681
+ from the kernel, which yields a wrong CFI state, which is detectable
682
+ through the CFI checking policy. However, if the entire system call
683
+ instruction sequence is skipped, i.e., first-stage patching and the
684
+ syscall instruction are omitted, the hijack is still detectable. As both
685
+ patch operations are missing on the CFI state, the state is wrong
686
+ again, and a subsequent CFI check, e.g., when the program gets
687
+ scheduled, detects the invalid state. In both cases, SFP transforms
688
+ the skipped system call into a CFI error, which manifests itself in a
689
+ wrong CFI state, which is detectable.
690
+ Changing a System Call. A fault on the register containing the
691
+ system call number, or a combined attack, in which the attacker
692
+ controls the register used to execute the system call, redirects the
693
+ system call to a different one. SFP protects against both attacks.
694
+ By applying the first-stage linking to the CFI state, the correct
695
+ system call is already bound to its future execution. Manipulating
696
+ the system call register, e.g., due to a fault or software vulnerability,
697
+ leads to applying the wrong system call patch to the CFI state. When
698
+ the system call is executed, the CFI state for that program differs
699
+ from the expected state, and the CFI check in the kernel detects the
700
+ problem and aborts the program.
701
+ To bypass a system call, the attacker only has a single chance
702
+ to change the system call number and manipulate the previous
703
+ system call patch to correct one for this location. However, the
704
+ system call patch is protected via the secret ARM PA key, which
705
+ the attacker cannot access. Guessing the PAC leads to a probability
706
+ of 𝑝 =
707
+ 1
708
+ 215 = 0.0031 % for getting the correct patch value, where
709
+ 15 is the configured PAC size of our prototype implementation.
710
+ Furthermore, due to the dynamic instrumentation on the program
711
+ startup, the system call patches always differ between subsequent
712
+ calls of the same program. As a result, the attacker cannot learn
713
+ new patch information between subsequent program calls.
714
+ 6.2
715
+ Functional Evaluation
716
+ To validate the functional correctness of SFP, we emulate the exe-
717
+ cution on the functional simulator QEMU [38] in version 7.0.0. Since
718
+ this simulator currently only supports ARM PA from ARMv8.3-A,
719
+ we extend it to include ARM PA of ARMv8.6-A to support the CFI
720
+ protection. The functional evaluation runs the modified Linux ker-
721
+ nel from the prototype and can start and execute instrumented
722
+ programs, where all system calls are protected. Within the kernel,
723
+ the functional simulator performs the second-stage linking and a
724
+ CFI check to verify the execution of the correct syscall.
725
+ To verify the functionality of the countermeasure, we emulated
726
+ skipping a system call and modifying the system call number. In
727
+ both cases, SFP detects the attack through the next CFI check since
728
+ the CFI state became invalid and stops the program execution.
729
+ 6.3
730
+ Performance Evaluation
731
+ At the time of evaluation, there is no publicly available system
732
+ supporting ARMv8.6-A needed to run FIPAC. However, to conduct
733
+ the performance evaluation and to measure the performance im-
734
+ pact of SFP, we emulate the runtime overhead of PA instructions.
735
+ Therefore, we base the performance evaluation on a Raspberry Pi
736
+ 4 Model B [20] with 8 GB RAM configured with a fixed CPU fre-
737
+ quency of 1.5 GHz. The Raspberry Pi contains an ARM Cortex-A72
738
+ CPU based on ARMv8-A but without Pointer Authentication. To
739
+ emulate the overhead of PA instructions, we replace them with
740
+ a PA-analogue instruction sequence, i.e., four consecutive XORs.
741
+ Related work [27, 28] evaluated this instruction sequence to mimic
742
+ the timing behavior of a PA instruction.
743
+ Microbenchmark. To evaluate the overhead of SFP executing sys-
744
+ tem calls, we perform a simple microbenchmark. Our benchmark
745
+ measures the syscall latency of the getpid system call, which is
746
+ a side-effect-free syscall and is used in related works to bench-
747
+ mark the syscall execution path [7, 8]. We execute the system call
748
+ 10 million times and measure the system call latency via the pro-
749
+ cessor’s inbuilt cycle counter. Figure 3 summarizes our evaluation
750
+ results, showing the syscall latency in different kernel configura-
751
+ tions. On the plain unmodified Linux kernel, we measure an average
752
+
753
+ SFP: System Call Flow Protection
754
+ HASP ’22, October 1, 2022, Chicago, IL, USA
755
+ Plain
756
+ Syscall Check
757
+ CFI Check
758
+ Syscall + CFI Check
759
+ 2000
760
+ 2050
761
+ 2100
762
+ 2150
763
+ 2200
764
+ Latency [cycles]
765
+ 2131.27
766
+ 2144.28
767
+ 2175.62
768
+ 2185.92
769
+ Syscall Latency for getppid
770
+ Figure 3: The microbenchmark shows the system call la-
771
+ tency of the getpid system call for different kernel config-
772
+ urations. SFP increases the system call latency by 1.9 %.
773
+ lbm
774
+ gcc
775
+ perlbench
776
+ xz
777
+ x264
778
+ mcf
779
+ imagick
780
+ nab
781
+ 0
782
+ 50
783
+ 100
784
+ 150
785
+ Runtime Overhead [%]
786
+ 0.4
787
+ 60.2
788
+ 70.0
789
+ 14.4
790
+ 37.8
791
+ 30.5
792
+ 61.0
793
+ 9.1
794
+ 0.5
795
+ 61.8
796
+ 70.9
797
+ 17.2
798
+ 38.8
799
+ 32.4
800
+ 61.8
801
+ 11.2
802
+ Basic CFI
803
+ SFP
804
+ Figure 4: Macrobenchmark shows the performance impact
805
+ of SFP on the SPEC 2017 benchmark. We evaluate the impact
806
+ of CFI only and SFP, including the system call protection.
807
+ system call latency of 2131 cycles. When integrating the system
808
+ call verification alone, the latency rises to 2144 cycles. Furthermore,
809
+ with the CFI checks alone enabled, the latency increases to 2175 cy-
810
+ cles. When both are active, we measure a system call latency of
811
+ only 2185 cycles, impacting the system call latency by only 1.9 %.
812
+ Macrobenchmark. To demonstrate the applicability of SFP on a
813
+ larger scale, we perform a macrobenchmark on real-world applica-
814
+ tions. We compiled the SPECspeed 2017 [14] benchmark with our
815
+ toolchain, including only C-based programs. In Figure 4, we plot
816
+ the runtime overheads in two different configurations compared to
817
+ the plain uninstrumented code. First, we only include the dynamic
818
+ verification, including the new CFI checking policy, that verifies
819
+ the CFI state of user programs when entering the kernel. Second,
820
+ we include the syscall protection based on the two-stage linking ap-
821
+ proach together with the previously evaluated CFI checking policy.
822
+ During the evaluation, we measure a geometric mean overhead
823
+ of 18.8 % for the new CFI checking policy and 20.6 % with the system
824
+ call protection and CFI checking policy in place. Based on the evalu-
825
+ ation of the SPEC 2017 benchmark, we only measure a difference in
826
+ the overhead of 1.8 % between the pure CFI protection and the full
827
+ system call protection of SFP. This result shows that the dominating
828
+ part of the overhead comes from the CFI instrumentation, not from
829
+ the system call protection. Thus, reducing the overheads of the CFI
830
+ protection directly influences the performance of SFP.
831
+ 7
832
+ Discussion
833
+ This section discusses prototype limitations and shows how SFP
834
+ is compatible with other CFI protection schemes.
835
+ 7.1
836
+ Dynamic System Call Instrumentation
837
+ In our prototype, we manually instrument all syscalls of the C
838
+ standard library with the necessary patch instructions, consisting
839
+ of a load of an immediate patch value followed by applying the
840
+ patch value to the CFI state. The immediate value is zero and is
841
+ set to its concrete value during the dynamic instrumentation of
842
+ the startup phase of the program. In a future version of SFP, we
843
+ could instrument the compiler to detect syscall instructions, i.e., svc,
844
+ and then automatically insert the necessary patch sequence. This
845
+ enhancement would also include cases where syscalls are invoked
846
+ manually without the wrapper functions of the standard library.
847
+ 7.2
848
+ CFI Checking Policy Extension
849
+ SFP currently performs CFI checks when entering the kernel
850
+ through a syscall or a timer interrupt. A future version of this work
851
+ can extend the CFI checking policy to include all interrupts of the
852
+ system. Our microbenchmark shows adding new CFI checks adds
853
+ minimal overhead to the syscall latency. Thus, adding additional
854
+ CFI checks for all interrupt handlers are expected to have minimal
855
+ impact on the system performance.
856
+ 7.3
857
+ Compatibility
858
+ Although SFP uses FIPAC as the underlying CFI protection scheme,
859
+ the design or the protection mechanism of SFP is generic and com-
860
+ patible with different CFI schemes. To apply the protection of SFP to
861
+ a different protection scheme, two things are required. First, the CFI
862
+ protection scheme must be stateful, and there must be a possibility
863
+ to manipulate the state, e.g., via standard or custom instructions,
864
+ to inject the system call patch. Second, it is necessary to be able to
865
+ dynamically compute a second system call patch required for the
866
+ second-stage linking in the kernel. With these requirements, SFP
867
+ is compatible with existing CFI protection schemes such as SCFP,
868
+ SOFIA, or any other state-based CFI protection scheme.
869
+ 8
870
+ Related Work
871
+ SCFP [53] and SOFIA [13] are hardware-assisted control-flow
872
+ integrity schemes on the instruction level. They encrypt the pro-
873
+ gram’s instruction stream at compile-time, and perform a fine-
874
+ granular decryption during runtime to retrieve the correct instruc-
875
+ tion sequence. In order to deal with the performance penalty, both
876
+ protection schemes require intrusive hardware changes. This limits
877
+ their applicability to small custom embedded processing cores but
878
+ does not provide protection on a larger scale.
879
+ FIPAC [44] is a software-based FCFI protection scheme that ex-
880
+ ploits the architectural features of recent ARM processors. This
881
+ protection scheme instruments all basic blocks of a user program
882
+ with a running CFI signature, thus providing control-flow integrity
883
+ at that granularity. They present three checking policies, i.e., where
884
+ to check whether the running CFI signature still matches the ex-
885
+ pected one. However, FIPAC only protects the control-flow of the
886
+ user-space part of the program. Although FIPAC is developed for
887
+ being used with operating systems, they miss the protection of the
888
+ system call interface to the kernel.
889
+ SFIP [9] implements coarse-grained syscall flow protection for
890
+ user-space applications. They statically identify the possible transi-
891
+ tions between different syscalls at compile-time and then enforce
892
+ that at runtime. Since SFIP only considers software attackers in
893
+ their threat model, they fail to protect against fault attacks.
894
+ 9
895
+ Conclusion
896
+ In this work, we presented SFP, a protection mechanism that
897
+ provides system call flow protection on top of ordinary CFI, pro-
898
+ tecting the interface to the kernel against both software and fault
899
+ attacks. We show that an already employed CFI protection scheme
900
+
901
+ HASP ’22, October 1, 2022, Chicago, IL, USA
902
+ Schilling et al.
903
+ can be used as a versatile tool to protect the system call interface
904
+ to the kernel. Furthermore, we present a new CFI checking policy
905
+ at the edge of the kernel to verify the CFI state for all transitions to
906
+ the kernel. Combined with a dynamic CFI instrumentation on pro-
907
+ gram startup, the attacker cannot learn CFI or system call-related
908
+ information from subsequent program executions. We showed a
909
+ prototype implementation comprising an LLVM-based toolchain to
910
+ automatically instrument arbitrary programs and protect all system
911
+ calls. A modified Linux kernel running on a Raspberry Pi evaluation
912
+ setup is used to show the applicability of SFP to real-world pro-
913
+ grams. Our evaluation based on a microbenchmark and on the SPEC
914
+ 2017 application benchmark shows an average runtime overhead
915
+ of 20.6 %, which is only an increase of 1.8 % compared to plain CFI
916
+ protection. This slight increase in the performance impact shows
917
+ the effectiveness of SFP for protecting all system calls of a program.
918
+ Acknowledgments
919
+ This work has been supported by the Austrian Research Promo-
920
+ tion Agency (FFG) under grant number 888087 (SEIZE).
921
+ References
922
+ [1] Abadi et al. 2005. Control-flow integrity. In CCS’05.
923
+ https://doi.org/10.1145/
924
+ 1102120.1102165
925
+ [2] Alkhalifa et al. 1999. Design and Evaluation of System-Level Checks for On-
926
+ Line Control Flow Error Detection. IEEE Trans. Parallel Distributed Syst. (1999).
927
+ https://doi.org/10.1109/71.774911
928
+ [3] Kernel Authors. 2022. Linux Kernel. https://git.kernel.org/pub/scm/linux/kernel/
929
+ git/stable/linux.git/tag/?h=v5.15.32. Accessed 2022-06-11.
930
+ [4] Eli Biham and Adi Shamir. 1997. Differential Fault Analysis of Secret Key Cryp-
931
+ tosystems. In CRYPTO’97. https://doi.org/10.1007/BFb0052259
932
+ [5] Bletsch et al. 2011. Jump-oriented programming: a new class of code-reuse attack.
933
+ In AsiaCCS’11. https://doi.org/10.1145/1966913.1966919
934
+ [6] David T. Brown. 1960. Error Detecting and Correcting Binary Codes for Arith-
935
+ metic Operations. IRE Trans. Electron. Comput. (1960). https://doi.org/10.1109/
936
+ TEC.1960.5219855
937
+ [7] Davidlohr Bueso. 2019. tools/perf-bench: Add basic syscall benchmark. https:
938
+ //lore.kernel.org/patchwork/patch/1048777. Accessed 2022-06-01.
939
+ [8] Canella et al. 2021. Automating Seccomp Filter Generation for Linux Applications.
940
+ In CCSW@CCS ’21: Proceedings of the 2021 on Cloud Computing Security Workshop,
941
+ Virtual Event, Republic of Korea, 15 November 2021.
942
+ https://doi.org/10.1145/
943
+ 3474123.3486762
944
+ [9] Canella et al. 2022. SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in
945
+ Modern Systems. CoRR (2022). https://arxiv.org/abs/2202.13716
946
+ [10] Canonical. 2022. Ubuntu Core - The operating system optimised for IoT and
947
+ Edge. https://ubuntu.com/core. Accessed 2022-06-11.
948
+ [11] Chen et al. 2021. VoltPillager: Hardware-based fault injection attacks against
949
+ Intel SGX Enclaves using the SVID voltage scaling interface. In USENIX’21. https:
950
+ //www.usenix.org/conference/usenixsecurity21/presentation/chen-zitai
951
+ [12] Chien-Ning Chen and Sung-Ming Yen. 2003. Differential Fault Analysis on AES
952
+ Key Schedule and Some Coutnermeasures. In ACISP’03. https://doi.org/10.1007/3-
953
+ 540-45067-X_11
954
+ [13] Clercq et al. 2017. SOFIA: Software and control flow integrity architecture.
955
+ Comput. Secur. (2017). https://doi.org/10.1016/j.cose.2017.03.013
956
+ [14] Standard Performance Evaluation Corporation. 2019. SPEC CPU 2017. https:
957
+ //www.spec.org/cpu2017. [accessed 2022-06-01].
958
+ [15] Cowan et al. 2003. PointGuard™: Protecting Pointers from Buffer Overflow
959
+ Vulnerabilities. In USENIX’03. https://www.usenix.org/conference/12th-usenix-
960
+ security-symposium/pointguard%E2%84%A2-protecting-pointers-buffer-
961
+ overflow
962
+ [16] Criswell et al. 2014. KCoFI: Complete Control-Flow Integrity for Commodity
963
+ Operating System Kernels. In S&P’14. https://doi.org/10.1109/SP.2014.26
964
+ [17] Ang Cui and Rick Housley. 2017. BADFET: Defeating Modern Secure Boot
965
+ Using Second-Order Pulsed Electromagnetic Fault Injection. In WOOT’17. https:
966
+ //www.usenix.org/conference/woot17/workshop-program/presentation/cui
967
+ [18] Dobraunig et al. 2018. SIFA: Exploiting Ineffective Fault Inductions on Symmetric
968
+ Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. (2018). https://doi.
969
+ org/10.13154/tches.v2018.i3.547-572
970
+ [19] Rich Felker. 2022. musl libc. https://musl.libc.org/. Accessed 2022-06-01.
971
+ [20] Raspberry Pi Foundation. 2020. Raspberry Pi 4 Model B. https://www.raspberrypi.
972
+ org/products/raspberry-pi-4-model-b. Accessed 2022-06-01.
973
+ [21] Ge et al. 2016. Fine-Grained Control-Flow Integrity for Kernel Software. In EURO
974
+ S&P’16. https://doi.org/10.1109/EuroSP.2016.24
975
+ [22] Goloubeva et al. 2003. Soft-Error Detection Using Control Flow Assertions. In
976
+ DFT’03. https://doi.org/10.1109/DFTVS.2003.1250158
977
+ [23] Herrewegen et al. 2021. Fill your Boots: Enhanced Embedded Bootloader Exploits
978
+ via Fault Injection and Binary Analysis. IACR Trans. Cryptogr. Hardw. Embed.
979
+ Syst. (2021). https://doi.org/10.46586/tches.v2021.i1.56-81
980
+ [24] Hu et al. 2016. Data-Oriented Programming: On the Expressiveness of Non-
981
+ control Data Attacks. In S&P’16. https://doi.org/10.1109/SP.2016.62
982
+ [25] Kuznetsov et al. 2014. Code-Pointer Integrity. In OSDI’14. https://www.usenix.
983
+ org/conference/osdi14/technical-sessions/presentation/kuznetsov
984
+ [26] Chris Lattner and Vikram S. Adve. 2004. LLVM: A Compilation Framework for
985
+ Lifelong Program Analysis & Transformation. In CGO’04.
986
+ https://doi.org/10.
987
+ 1109/CGO.2004.1281665
988
+ [27] Liljestrand et al. 2019.
989
+ PAC it up: Towards Pointer Integrity using ARM
990
+ Pointer Authentication. In USENIX’19.
991
+ https://www.usenix.org/conference/
992
+ usenixsecurity19/presentation/liljestrand
993
+ [28] Liljestrand et al. 2019. PACStack: an Authenticated Call Stack. CoRR (2019).
994
+ http://arxiv.org/abs/1905.10242
995
+ [29] ARM Limited. 2017. Arm Architecture Reference Manual for A-profile architec-
996
+ ture, v8.3A. https://developer.arm.com/documentation/ddi0487/ca. Accessed
997
+ 2022-06-01.
998
+ [30] ARM Limited. 2020. Arm Architecture Reference Manual for A-profile architec-
999
+ ture, v8.6A. https://developer.arm.com/documentation/ddi0487/fa. Accessed
1000
+ 2022-06-01.
1001
+ [31] Mashtizadeh et al. 2015. CCFI: Cryptographically Enforced Control Flow Integrity.
1002
+ In CCS’15. https://doi.org/10.1145/2810103.2813676
1003
+ [32] Murdock et al. 2020. Plundervolt: Software-based Fault Injection Attacks against
1004
+ Intel SGX. In S&P’20. https://doi.org/10.1109/SP40000.2020.00057
1005
+ [33] Nasahl et al. 2021. Protecting Indirect Branches Against Fault Attacks Using
1006
+ ARM Pointer Authentication. In HOST’21. https://doi.org/10.1109/HOST49136.
1007
+ 2021.9702268
1008
+ [34] Pascal Nasahl and Niek Timmers. 2019. Attacking AUTOSAR using Software
1009
+ and Hardware Attacks. In escar USA.
1010
+ [35] Colin O’Flynn. 2020. BAM BAM!! On Reliability of EMFI for in-situ Automotive
1011
+ ECU Attacks. IACR Cryptol. ePrint Arch. (2020). https://eprint.iacr.org/2020/937
1012
+ [36] Oh et al. 2002. Control-flow checking by software signatures. IEEE Trans. Reliab.
1013
+ (2002). https://doi.org/10.1109/24.994926
1014
+ [37] Ramiro Pareja and Santiago Cordoba. 2018. Fault injection on automotive diag-
1015
+ nostic protocols. escar USA (2018).
1016
+ [38] QEMU. 2020. QEMU the FAST! processor emulator. https://www.qemu.org.
1017
+ [accessed 2022-06-01].
1018
+ [39] Qiu et al. 2019. VoltJockey: Breaching TrustZone by Software-Controlled Voltage
1019
+ Manipulation over Multi-core Frequencies. In CCS’19. https://doi.org/10.1145/
1020
+ 3319535.3354201
1021
+ [40] Qualcomm. 2022. IoT begins with Qualcomm. https://www.qualcomm.com/
1022
+ products/internet-of-things. Accessed 2022-06-11.
1023
+ [41] Reis et al. 2005. SWIFT: Software Implemented Fault Tolerance. In CGO’05.
1024
+ https://doi.org/10.1109/CGO.2005.34
1025
+ [42] Richter-Brockmann et al. 2021. Revisiting Fault Adversary Models - Hardware
1026
+ Faults in Theory and Practice. IACR Cryptol. ePrint Arch. (2021). https://eprint.
1027
+ iacr.org/2021/296
1028
+ [43] Stefan Mangard Robert Schilling, Pascal Nasahl. 2022. FIPAC LLVM Project.
1029
+ https://github.com/Fipac/llvm-project. Accessed 2022-06-11.
1030
+ [44] Schilling et al. 2022. FIPAC: Thwarting Fault- and Software-Induced Control-Flow
1031
+ Attacks with ARM Pointer Authentication. In COSADE’22. https://doi.org/10.
1032
+ 1007/978-3-030-99766-3_5
1033
+ [45] Hovav Shacham. 2007. The geometry of innocent flesh on the bone: return-
1034
+ into-libc without function calls (on the x86). In CCS’07. https://doi.org/10.1145/
1035
+ 1315245.1315313
1036
+ [46] Tang et al. 2017.
1037
+ CLKSCREW: Exposing the Perils of Security-Oblivious
1038
+ Energy Management. In USENIX’17.
1039
+ https://www.usenix.org/conference/
1040
+ usenixsecurity17/technical-sessions/presentation/tang
1041
+ [47] Timmers et al. 2016. Controlling PC on ARM Using Fault Injection. In FDTC’16.
1042
+ https://doi.org/10.1109/FDTC.2016.18
1043
+ [48] Niek Timmers and Cristofaro Mune. 2017. Escalating Privileges in Linux Using
1044
+ Voltage Fault Injection. In FDTC’17. https://doi.org/10.1109/FDTC.2017.16
1045
+ [49] Niek Timmers and Albert Spruyt. 2016. Bypassing secure boot using fault injec-
1046
+ tion. Black Hat Europe (2016).
1047
+ [50] Linus Torvalds. 2022. The Linux Kernel. https://kernel.org/. Accessed 2022-06-11.
1048
+ [51] Raj Vardhman. 2022. How many Linux users are there? https://findly.in/how-
1049
+ many-linux-users-are-there. Accessed 2022-06-11.
1050
+ [52] Verbauwhede et al. 2011. The Fault Attack Jungle - A Classification Model to
1051
+ Guide You. In FDTC’11. https://doi.org/10.1109/FDTC.2011.13
1052
+ [53] Werner et al. 2018. Sponge-Based Control-Flow Protection for IoT Devices. In
1053
+ EURO S&P’18. https://doi.org/10.1109/EuroSP.2018.00023
1054
+ [54] Ziade et al. 2004. A Survey on Fault Injection Techniques. Int. Arab J. Inf. Technol.
1055
+ (2004). http://www.iajit.org/ABSTRACTS-2.htm#04
1056
+
KtE1T4oBgHgl3EQfGgOV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
L9FIT4oBgHgl3EQfbiuW/content/tmp_files/2301.11262v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
L9FIT4oBgHgl3EQfbiuW/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
MdFLT4oBgHgl3EQfNC8e/content/tmp_files/2301.12018v1.pdf.txt ADDED
@@ -0,0 +1,1073 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Stochastic and Mixed Density Functional Theory within the projector augmented
2
+ wave formalism for the simulation of warm dense matter
3
+ Vidushi Sharma,1, 2 Lee A. Collins,1 and Alexander J. White1, ∗
4
+ 1Theoretical Division, Los Alamos National Laboratory, Los Alamos, NM 87545, USA
5
+ 2Center for Nonlinear Studies, Los Alamos National Laboratory, Los Alamos, NM 87545, USA
6
+ (Dated: January 31, 2023)
7
+ Stochastic and mixed stochastic-deterministic density functional theory (DFT) are promising new
8
+ approaches for the calculation of the equation-of-state and transport properties in materials under
9
+ extreme conditions.
10
+ In the intermediate warm dense matter regime, a state between correlated
11
+ condensed matter and kinetic plasma, electrons can range from being highly localized around nuclei
12
+ to delocalized over the whole simulation cell. The plane-wave basis pseudo-potential approach is
13
+ thus the typical tool of choice for modeling such systems at the DFT level.
14
+ Unfortunately, the
15
+ stochastic DFT methods scale as the square of the maximum plane-wave energy in this basis. To
16
+ reduce the effect of this scaling, and improve the overall description of the electrons within the
17
+ pseudo-potential approximation, we present stochastic and mixed DFT developed and implemented
18
+ within the projector augmented wave formalism. We compare results between the different DFT
19
+ approaches for both single-point and molecular dynamics trajectories and present calculations of
20
+ self-diffusion coefficients of solid density carbon from 1 to 50 eV.
21
+ The warm, dense matter (WDM) regime encompasses
22
+ a wide variety of extreme environments and provides an
23
+ excellent testing ground for methods that determine the
24
+ basic properties of matter. These environments include,
25
+ for example, planetary interiors [1–3], stellar systems
26
+ such as brown and white dwarfs [4], and the capsule com-
27
+ pression stage in inertial confinement fusion (ICF) [5–7].
28
+ In the ice giant planets, the interiors may support a supe-
29
+ rionic phase in which hydrogen remains fluid within the
30
+ lattices of the heavier constituents such as oxygen, car-
31
+ bon, nitrogen, and silicon [8–10], which may help explain
32
+ the anomalous planetary magnetic fields of Neptune and
33
+ Uranus. In addition, the difference between an exother-
34
+ mic Neptune and an endothermic Uranus may originate
35
+ in the nucleation of diamonds from hydrocarbon mixtures
36
+ [11, 12]. Finally, properties of various hydrocarbons such
37
+ as equations-of-state and thermal conductivities deter-
38
+ mine the performance of ICF capsules irradiated by laser
39
+ pulses [5], and stopping power characterizes the cooling
40
+ effects of deposition of the capsule material into the hy-
41
+ drogen fuel [13, 14]. The activation of the James Webb
42
+ Space Telescope (JWST) presages an explosion in dis-
43
+ coveries [15] of exoplanets representing a vast range of
44
+ physical conditions, distributions, and dynamics involv-
45
+ ing, to list just a few, surface-atmosphere couplings [16],
46
+ interfaces between solid and liquid components of interi-
47
+ ors [17], and formation pathways [18]. In another area,
48
+ the breakthrough fusion milestone [19] at the National
49
+ Ignition Facility emphasizes the role played in model-
50
+ ing by ever-improved basic physical attributes. Both of
51
+ these developments signal a pressing need for more accu-
52
+ rate static and dynamical microscopic properties over a
53
+ broad range of WDM conditions.
54
+ Many methods exist to determine the basic structure
55
+ and dynamics of WDM; the most accurate arise from
56
+ ∗ alwhite@lanl.gov
57
+ first-principles (FP) techniques such as density functional
58
+ theory (DFT) [20–22] and path integral Monte Carlo
59
+ [23, 24], which supply a consistent set of basic material
60
+ properties as equation-of-state, opacities, mass transport,
61
+ electrical and thermal conduction. Recently, results from
62
+ DFT simulations have provided training information to
63
+ determine model potentials from machine learning tech-
64
+ niques (MLP) [10, 11, 25, 26]. Kohn-Sham (KS) DFT
65
+ combined with the plane-wave pseudo-potential (PWPP)
66
+ method is the theory of choice for studying the electronic
67
+ structure of numerous materials, ranging from solid-state
68
+ condensed matter to hot dense plasmas.
69
+ The success
70
+ of DFT stems from the balance between computational
71
+ complexity and useful accuracy, achieved by replacing
72
+ the quantum-mechanical wavefunction by a much simpler
73
+ quantity: the KS density matrix, typically constructed
74
+ from the KS Hamiltonian eigenstates.
75
+ The cubic scaling of the computational complexity of
76
+ KS-DFT with respect to system size and temperature is
77
+ a major limitation [27]. For WDM systems, orbital-free
78
+ DFT has been a particularly useful alternative, but it is
79
+ based on an approximate treatment of the electron non-
80
+ interacting kinetic energy [28–30]. Linear scaling meth-
81
+ ods, such as stochastic DFT (sDFT) [31], provide a full
82
+ KS accuracy alternative for large or hot systems [32].
83
+ The more general mixed stochastic-deterministic DFT
84
+ (mDFT) shows great promise for providing full KS-DFT
85
+ accuracy for calculations at any temperature [33]. How-
86
+ ever, when combined with PWPP method, sDFT, and
87
+ by extension mDFT, has a quadratic dependence of the
88
+ computational cost on the maximum plane-wave energy
89
+ (Ecut), i.e., on the grid resolutions, compared to stan-
90
+ dard deterministic DFT’s linear dependence. Moreover
91
+ it has only been formulated in combination with norm-
92
+ conserving pseudopotentials, which typically show either
93
+ low accuracy or require higher Ecut. Maintaining high
94
+ accuracy and low Ecut, soft pseudopotentials, requires
95
+ utilization of a non-orthogonal basis, as first developed
96
+ arXiv:2301.12018v1 [physics.comp-ph] 27 Jan 2023
97
+
98
+ 2
99
+ by Vanderbilt [34].
100
+ The projector augmented wave (PAW) approach, first
101
+ introduced by Bl¨ochl [35] and then reformulated by
102
+ Kresse [36], generalizes the soft pseudopotentials to a for-
103
+ mally “all-electron” formalism. The PAW method pro-
104
+ vides a realistic description of core electrons, has a long
105
+ and continued history of development, and yields accu-
106
+ racy comparable to more expensive “all-electron” meth-
107
+ ods [37].
108
+ Moreover, it allows for very low Ecut, suit-
109
+ able for sDFT calculations.
110
+ In this letter, we develop
111
+ mDFT, and sDFT by limitation, within the PAW for-
112
+ malism and present isochoric calculations and analysis
113
+ for warm dense carbon spanning the WDM regime, 1 to
114
+ 50 eV.
115
+ While DFT was initially developed for electrons in
116
+ their ground-state, i.e., zero temperature (T → 0), the
117
+ temperatures in WDM systems are of the order of the
118
+ Fermi energy and thus require the application of a finite-
119
+ temperature formulation of KS-DFT. Mermin’s formula-
120
+ tion of DFT within the grand canonical ensemble is the
121
+ most common approach used in WDM [38]. In this for-
122
+ mulation, the single-particle KS eigenstates are partially
123
+ occupied according to the Fermi-Dirac distribution func-
124
+ tion (here assuming paired spin):
125
+ f(ε) =
126
+ 2
127
+ 1 + e(ε−µ)/kBT ,
128
+ (1)
129
+ where µ is the chemical potential, and kB is the Boltz-
130
+ mann constant. Thus the thermal density matrix, �ρ =
131
+ f( �HKS), is constructed as:
132
+ �ρ =
133
+
134
+ b
135
+ f(εb)|ψb⟩⟨ψb| ,
136
+ (2)
137
+ where ψb is an eigenvector of the KS Hamiltonian, �HKS,
138
+ with eigenenergy εb.
139
+ In finite-temperature metals and
140
+ plasmas (where electrons populate the conduction band)
141
+ the number of states required to resolve all the electrons
142
+ grows as V T 3/2, where V is the system size, leading to
143
+ cubic computational scaling in both size and tempera-
144
+ ture.
145
+ To address this drawback of traditional KS-DFT, Baer
146
+ et al. proposed an alternative algorithmic approach to
147
+ DFT that is stochastic in nature (sDFT) [31, 32, 39–41].
148
+ In contrast to traditional KS-DFT, sDFT scales as V/T
149
+ and the operations on the stochastic vectors are trivial
150
+ to parallelize. sDFT is based on Hutchinson’s stochastic
151
+ trace estimation (STE) [42] and the stochastic projec-
152
+ tion for matrices, i.e., it is the application of STE to the
153
+ Kohn-Sham density matrix. In sDFT, the thermal den-
154
+ sity matrix, �ρ = f( �HKS), is projected onto Nχ stochastic
155
+ vectors (χa):
156
+ �ρ =
157
+
158
+ a∈Nχ
159
+ f
160
+ 1
161
+ 2 ( �HKS)|χa⟩⟨χa|f
162
+ 1
163
+ 2 ( �HKS) ,
164
+ (3)
165
+ rather than on KS eigenstates. A converged calculation,
166
+ with respect to Nχ has the same exact accuracy as that of
167
+ FIG. 1.
168
+ Disordered 64 carbon atoms system at (ρ, T) =
169
+ (3.52 g/cc, 10 eV): Density of states (DOS), and (inset) Occu-
170
+ pied DOS, obtained with Kohn-Sham (KS-DFT), stochastic
171
+ (sDFT), and mixed (mDFT) methods. The chemical poten-
172
+ tial of the system is µ = 7.92 eV. The pink and orange–shaded
173
+ regions in the inset indicate the splitting due to deterministic
174
+ (Nψ) and stochastic (Nχ) treatments in mDFT.
175
+ a traditional KS-DFT calculation based on finding eigen-
176
+ states.
177
+ Recently, White and Collins [33] proposed the mDFT
178
+ approach that generalizes stochastic and deterministic
179
+ KS-DFT approaches and improves the computational
180
+ complexity over a wide range of temperatures. It is based
181
+ on partitioning the full eigenspectrum of �HDFT into low-
182
+ energy and high-energy segments such that the maxi-
183
+ mally occupied low-energy eigenstates (ψ) are explicitly
184
+ resolved while the higher-energy states are spanned by
185
+ random stochastic vectors (χ′). That is:
186
+ |χ′
187
+ a⟩ =
188
+
189
+ �I −
190
+
191
+ b∈Nψ
192
+ |ψb⟩⟨ψb|
193
+
194
+ |χa⟩
195
+ (4)
196
+ where χ = ei2π⃗θ/N and θ ∈ {0, 1} is a set of uncorre-
197
+ lated random numbers for each basis function and N is a
198
+ normalization constant. We define “occupied” stochastic
199
+ vectors, X′ = f
200
+ 1
201
+ 2 ( �HDFT)χ′, to obtain the mixed density
202
+ matrix as,
203
+ �ρ =
204
+
205
+ a∈Nχ
206
+ |X′
207
+ a⟩⟨X′
208
+ a| +
209
+
210
+ b∈Nψ
211
+ |ψb⟩f(εb)⟨ψb| .
212
+ (5)
213
+ All observables can be expressed as traces over appro-
214
+ priate operators with this density matrix. See [33] for a
215
+ detailed description.
216
+ Figure 1 shows the density of states (DOS) and occu-
217
+ pied DOS for a disordered carbon system, obtained with
218
+ KS-DFT (Nψ = 1024), sDFT (Nχ = 256) and mDFT
219
+ (Nψ/Nχ = 128/16) methods. The low-energy determin-
220
+ istic component of mDFT is shown in pink and there is
221
+ an overall good agreement across the three methods. The
222
+ overlap of the components is due to the finite width of
223
+ Gaussian functions used to define the continuous DOS.
224
+
225
+ 100
226
+ KS-DFT
227
+ mDFT(128/16)
228
+ 10
229
+ SDFT
230
+ mDFT (Nμ)
231
+ 80
232
+ mDFT
233
+ mDFT (Nx)
234
+ 5
235
+ DOS (eV-1)
236
+ 60
237
+ 0
238
+ 50
239
+ 40
240
+ 20
241
+ 0
242
+ 0
243
+ 100
244
+ 200
245
+ 300
246
+ 400
247
+ Energy (eV)3
248
+ The state-of-the-art for balancing accuracy, computa-
249
+ tional complexity, and grid resolution/plane-wave count
250
+ is the pseudo-augmented wave (PAW) method. In princi-
251
+ ple, PAW is an all-electron method, assuming a complete
252
+ set of partial waves and projectors. However, only a finite
253
+ set is used in practice. The PAW method is based on a
254
+ linear transformation matrix (�τ) connecting the smooth
255
+ pseudo density matrix (�ρ ) to an all-electron density ma-
256
+ trix (�ρ ),
257
+ �ρ = �τ �ρ �τ †
258
+ (6)
259
+ �τ = �I +
260
+
261
+ i
262
+
263
+ |φi⟩ − |˜φi⟩
264
+
265
+ ⟨pi| ,
266
+ (7)
267
+ with ⟨pi| ˜φj⟩ = δij. Here, |φi⟩ is a ‘true’ all-electron par-
268
+ tial wave and | ˜φi⟩ is a pseudo partial wave dual to the
269
+ projector |pi⟩. This transformation is exact in the limit of
270
+ a complete set of partial waves/projectors. These func-
271
+ tions are defined in an “augmentation sphere” around
272
+ an atom. Expectation values are preserved by defining
273
+ pseudized operators, �O as:
274
+ E[ �O] = Tr[�ρ �O] = Tr[�ρ �O] , with �O = �τ † �O�τ
275
+ (8)
276
+ The
277
+ transformed
278
+ identity
279
+ operator
280
+ gives
281
+ an
282
+ S-
283
+ orthogonality condition for the transformed wavefunc-
284
+ tions:
285
+ �S = �τ †�τ = �I +
286
+
287
+ i,j
288
+ |pi⟩
289
+
290
+ ⟨φi|φj⟩ − ⟨˜φi|˜φj⟩
291
+
292
+ ⟨pj| ,
293
+ (9)
294
+ ⟨ψa|ψb⟩ = ⟨ ˜ψa|�S| ˜ψb⟩ = δab .
295
+ (10)
296
+ Therefore, ˜ψb is a solution to the generalized eigenvalue
297
+ problem, �HKS ˜ψ = ε�S ˜ψ. This S-orthogonality condition
298
+ complicates the generation of transformed stochastic vec-
299
+ tors.
300
+ Our approximate projection via all-electron norm-
301
+ conserving and transformed stochastic vectors is given
302
+ by:
303
+ �I ≈
304
+
305
+ a
306
+ |χa⟩⟨χa| =
307
+
308
+ a
309
+ �τ|˜χa⟩⟨˜χa|�τ † .
310
+ (11)
311
+ From the transformation of the stochastic vectors and
312
+ the identity operator, Eq. (11), and the �S operator, Eq.
313
+ (9), we find that
314
+
315
+ a
316
+ �τ †�τ|˜χa⟩⟨˜χa|�τ †�τ ≈ �S ,
317
+
318
+ a
319
+ |˜χa⟩⟨˜χa| ≈
320
+
321
+ b
322
+ | ˜ψb⟩⟨ ˜ψb| = �S−1 .
323
+ (12)
324
+ We now define a set of stochastic vectors |¯χa⟩ such that
325
+ �I ≈
326
+
327
+ a
328
+ |¯χa⟩⟨¯χa| , i.e. δ(⃗r,⃗r ′) =
329
+
330
+ a
331
+ ei2π(⃗θa(⃗r)−⃗θa(⃗r ′))/N 2 ,
332
+ which has the same form as the all-electron stochas-
333
+ tic vectors, but with ⃗r and ⃗r ′ from the coarser grid
334
+ of the transformed functions [32].
335
+ Using the identity
336
+ �I = �τ �S−1�τ † (see Supplementary Information [43], Eq.
337
+ S8) and Eq. (11), we obtain
338
+ �I ≈
339
+
340
+ a
341
+ �τ �S− 1
342
+ 2 |¯χa⟩⟨¯χa|�S− 1
343
+ 2 �τ † =
344
+
345
+ a
346
+ �τ|˜χa⟩⟨˜χa|�τ † ,
347
+ where
348
+ |˜χa⟩ = �S− 1
349
+ 2 |¯χa⟩ .
350
+ (13)
351
+ An efficient and sufficiently accurate procedure for ap-
352
+ plying �S− 1
353
+ 2 to vectors was formulated recently by Li &
354
+ Neuhauser [44]. Using the same identity, the pseudized
355
+ density matrix can be written as (see Supplementary In-
356
+ formation [43]):
357
+ �ρ = f(�S−1 �HKS)�S−1 =
358
+ (14)
359
+ f
360
+ 1
361
+ 2 (�S−1 �HKS)�S−1f
362
+ 1
363
+ 2 ( �HKS �S−1) .
364
+ The procedure for PAW mDFT is similar to the all-
365
+ electron or norm-conserving case [33] with three modifi-
366
+ cations: (i) the orthogonal stochastic vectors, ¯χ, are gen-
367
+ erated and rotated to the standard PAW frame, ˜χ, (ii)
368
+ the generalized eigenvalue problem is iteratively solved
369
+ to obtain ˜ψ, (iii) the projection of the eigenstates from
370
+ the stochastic vectors is performed via:
371
+ |˜χ′
372
+ a⟩ =
373
+
374
+ �S−1 −
375
+
376
+ b∈Nψ
377
+ |ψb⟩⟨ψb|
378
+
379
+ �S|˜χa⟩, giving
380
+ (15)
381
+ �S−1 ≈
382
+
383
+ a∈Nχ
384
+ |˜χ′
385
+ a⟩⟨˜χ′
386
+ a| +
387
+
388
+ b∈Nψ
389
+ | ˜ψb⟩⟨ ˜ψb| and
390
+ (16)
391
+ �ρ =
392
+
393
+ a∈Nχ
394
+ | ˜X′
395
+ a⟩⟨ ˜X′
396
+ a| +
397
+
398
+ b∈Nψ
399
+ | ˜ψb⟩f(εb)⟨ ˜ψb| , with
400
+ (17)
401
+ | ˜X′
402
+ a⟩ = f
403
+ 1
404
+ 2 (�S−1 �HKS)|˜χ′
405
+ a⟩.
406
+ (18)
407
+ In Eq. (18), the S−1 can be applied via the Woodbury
408
+ formula [45]. From Eq. (17), all observables necessary
409
+ to complete the PAW formalism, e.g., the on-site density
410
+ matrix and the compensation charge density, can be cal-
411
+ culated [46]. The generalization of PAW force and stress
412
+ tensor contributions for mDFT/sDFT are presented in
413
+ Supplementary Information S2 [43].
414
+ To test our method, we first perform single-point
415
+ ground-state energy calculations on a 64-atom disordered
416
+ carbon system at several temperatures and a solid-state
417
+ density of 3.52 g/cc, using the 4e− PAW potential. All
418
+ the computations are using our plane-wave DFT code,
419
+ SHRED (Stochastic and Hybrid Representation Electronic
420
+ Structure by Density Functional Theory) that relies on a
421
+ modified version of a portable PAW library LibPAW [48],
422
+ developed under the ABINIT [49] project, and LibXC [50]
423
+ for the exchange-correlation energy functionals.
424
+ A ki-
425
+ netic energy cutoff Ecut of 426 eV (Ngrid = 483) is used
426
+ for the transformed functions and 758 eV (Ngrid = 643)
427
+ for the densities and the spherical PAW grid around each
428
+ atom.
429
+ Figure 2 shows a comparison of the three DFT algo-
430
+ rithms in terms of computational time per self consistent
431
+
432
+ 4
433
+ FIG. 2. Disordered carbon system comprising 64 atoms at
434
+ ρ = 3.52 g/cc. Comparison of (a) SCF times per cycle, and
435
+ (b) relative pressure with reference to SESAME 7833 (Psesame)
436
+ [47] obtained for deterministic (Kohn-Sham), stochastic, and
437
+ mixed DFT calculations performed using a Cray compilation
438
+ of SHRED on 128 cores.
439
+ field (SCF) cycle on 128 CPUs, and the accuracy and pre-
440
+ cision of pressure (for this single-point calculation) refer-
441
+ enced to SESAME 7833 value [47]. The free energy, pres-
442
+ sure and chemical potential for each temperature, along
443
+ with the combination of orbitals Nψ/Nχ (Nψ) used in
444
+ mDFT are listed in Supplementary Information, Table
445
+ S1 [43]. The combinations range from 136/4 at kBT = 1
446
+ eV to 64/40 at kBT = 50 eV; whereas sDFT times are
447
+ computed with Nχ = 128 orbitals for all temperatures.
448
+ The pressures in sDFT and mDFT, are computed as av-
449
+ erages over 10 independent SCF runs using a different
450
+ set of Nχ stochastic orbitals; with the statistical error
451
+ (the error bars) expressed as the standard deviation of
452
+ the sample. The nonlinear nature of the SCF cycle leads
453
+ to a potential bias in sDFT/mDFT given by the differ-
454
+ ence between the expected value and the KS-DFT result.
455
+ Mixed DFT yields energies to within 0.2% (standard de-
456
+ viation of 0.3%) of the reference KS-DFT values with a
457
+ 42× speedup as compared to KS-DFT at T = 20 eV. Ad-
458
+ ditionally, the chemical potential and pressure are con-
459
+ verged to 0.13 eV (standard deviation of 0.18 eV) and
460
+ 7.27 GPa (standard deviation of 8.29 GPa) relative to
461
+ their respective reference KS-DFT results.
462
+ Local quantities such as the electronic forces on nu-
463
+ clei depend on the electronic density and hence do not
464
+ benefit from the self-averaging effect of stochastic DFT
465
+ [39]. We examine the stochastic and mixed DFT forces
466
+ for several Nψ/Nχ at different temperatures. A compar-
467
+ ison is presented in Fig. 3, where F i,ψχ
468
+ α,n
469
+ indicates mixed
470
+ or stochastic forces and Fi,ψ
471
+ α
472
+ indicates deterministic KS-
473
+ forces, such that i = {x, y, z}, α = 1, . . . , Nat indexes the
474
+ atoms, and n = 1, . . . , 10 indexes the stochastic/mixed
475
+ run. The absence of an i index indicates the magnitude
476
+ of the force, lack of n indicates the value is averaged
477
+ FIG. 3. Comparison of mixed (Fi,ψχ
478
+ α
479
+ ) vs Kohn-Sham (Fi,ψ
480
+ α )
481
+ DFT components of forces on all atoms obtained for vari-
482
+ ous Nψ/Nχ. The agreement between stochastic (0/256) and
483
+ deterministic forces improves at higher temperatures.
484
+ The
485
+ data points shown in magenta represent the chosen Nψ/Nχ
486
+ for mixed DFT calculations at a given temperature (T). At
487
+ higher temperatures, the area of the force plots is zoomed in
488
+ to keep a constant scale. The order of lines at each T matches
489
+ the key.
490
+ over the 10 independent stochastic/mixed runs, and the
491
+ absence of α indicates average over atoms.
492
+ The stan-
493
+ dard deviation over n independent runs, averaged over
494
+ the atoms, is given by:
495
+ σψχ =
496
+ Nat
497
+
498
+ α=1
499
+ N −1
500
+ at
501
+
502
+
503
+
504
+
505
+ 10
506
+
507
+ n=1
508
+ (Fψχ
509
+ α,n − Fψ
510
+ α)2
511
+ 10
512
+ ;
513
+ (19)
514
+ also see Supplementary information, Table S2 [43]. Upon
515
+ comparing the bias in mixed forces (|Fψχ −Fψ|) with the
516
+ statistical error (σψχ), one finds that the largest magni-
517
+ tude of the force bias across temperatures is 1.280 eV/˚A,
518
+ which is smaller than the largest magnitude of the sta-
519
+ tistical error, 10.471 eV/˚A. Recently, a similar trend be-
520
+ tween the errors in stochastic forces was seen for the case
521
+ of an aqueous-solvated peptide system [52].
522
+ Figure 3 shows a comparison of the components of
523
+ mixed and stochastic DFT forces (Fi,ψχ
524
+ α
525
+ ) obtained for
526
+ several Nψ/Nχ with the deterministic Kohn-Sham forces
527
+ (Fi,ψ
528
+ α ). The displacement in the mixed forces about the
529
+ linear curve indicates a statistical error that diminishes
530
+ with an increasing number of stochastic orbitals at higher
531
+ temperatures. At a given temperature, the data points
532
+ shown in magenta indicate the mixed forces for Nψ/Nχ
533
+ employed in other results presented in this work. The
534
+ range of plotted forces is kept constant to compare the
535
+ spread across temperatures. The forces at T = (30, 50)
536
+ eV, are in good agreement between mixed and KS- forces
537
+ with a standard deviation of 8.647 eV/˚A and 10.364
538
+ eV/˚A respectively.
539
+ These can be viewed in conjunc-
540
+ tion with the purely stochastic forces shown in blue. At
541
+ lower temperatures, increasing the number of determin-
542
+ istic KS-orbitals reduces the fluctuations in forces, e.g.,
543
+
544
+ (a)
545
+ SCF time/step (s)
546
+ 10
547
+ KS-DFT
548
+ sesame
549
+ SDFT
550
+ sesame
551
+ mDFT
552
+ 0.0
553
+ P
554
+ P
555
+ -0.2
556
+ 0
557
+ 10
558
+ 20
559
+ 30
560
+ 40
561
+ 50
562
+ Temperature (eV)60
563
+ T=lev
564
+ T= 10 eV
565
+ (eVIA)
566
+ 40
567
+ 20
568
+ Xm
569
+ 0
570
+ 0/256
571
+ 128/16
572
+ 0/256
573
+ α
574
+ 20
575
+ 1024/8
576
+ 128/16
577
+ 256/16
578
+ -40
579
+ 136/4
580
+ 96/24
581
+ 60
582
+ = 30 eV
583
+ T = 50 eV
584
+ (eVIA)
585
+ 40
586
+ %o
587
+ 20
588
+ Xh
589
+ 0
590
+ 0/256
591
+ 0/256
592
+ 96/32
593
+ 64/40
594
+ α
595
+ -20
596
+ 128/16
597
+ 4000/400
598
+ 80/40
599
+ 128/16
600
+ -40
601
+ 64/40
602
+ 16/128
603
+ O
604
+ -40
605
+ -20
606
+ 0
607
+ 20
608
+ 40
609
+ 60
610
+ -40
611
+ -20
612
+ 0
613
+ 20
614
+ 40
615
+ 60
616
+ Fi,
617
+ (eVIA)
618
+ Fi,
619
+ (eVIA)
620
+ α
621
+ a5
622
+ FIG. 4.
623
+ Disordered 64 carbon atoms system at ρ = 3.52
624
+ g/cc: average magnitude of force on atoms ⟨Fα⟩ obtained
625
+ with Kohn-Sham and mixed DFT for a single snapshot. For
626
+ KS-DFT, Nψ ranges from 256 at T = 1 eV to 6400 at T =
627
+ 50 eV. The error bars indicate the statistical error over mixed
628
+ DFT runs, and the shaded region represents a Langevin-type
629
+ friction term at the respective temperature, ⟨Fα⟩ ± 2ς with
630
+ γα = 0.04 fs−1 [51]. A comparison of (b) velocity autocor-
631
+ relation function (VACF) for KS (solid line), mixed (dash-
632
+ dot line) and stochastic (dotted line) DFT methods at T=5
633
+ eV, and (c) VACF/T at different temperatures (T). The self-
634
+ diffusion coefficients (D, integral of VACF) are given in the
635
+ key with units of 10−3 cm2/s.
636
+ at T = 10 eV, increasing Nψ from 128/16 (magenta) to
637
+ 256/16 (yellow) improves the distribution of forces signif-
638
+ icantly. However, at moderate to high temperatures one
639
+ would require a drastically large Nψ to obtain accurate
640
+ forces, see T = 50 eV in Fig. 3. Hence it is advantageous
641
+ to increase Nχ’s and decrease Nψ as the temperature in-
642
+ creases [33], as evidenced from the forces obtained with
643
+ Nψ/Nχ = 128/16 vs. 16/128 at T = 50 eV.
644
+ The magnitude of force averaged over all atoms ⟨Fα⟩ is
645
+ computed with mixed and KS-DFT methods, as shown
646
+ in Fig. 4(a). The error bars denote the standard devia-
647
+ tion in the mixed DFT forces, σψχ, and the blue-shaded
648
+ band indicates a thermal fluctuation region described by
649
+ a Langevin-type fluctuation ς, such that
650
+ mα¨qα = fα − γαpα + ςηα(t)
651
+ (20)
652
+ where ς ≡ √2mαγαkBT, (qα, pα) are the coordinates and
653
+ momenta of the atoms, fα is the force on the atom, γα
654
+ is the damping constant, and ηα(t) is a Gaussian process
655
+ such that ⟨ηα(t)⟩ = 0 and ⟨ηα(t)ηα′(t′)⟩ = δαα′δ(t − t′).
656
+ Langevin molecular dynamics was successfully used in
657
+ previous studies to investigate forces from stochastic
658
+ DFT–based simulations [51, 52]. At a given temperature,
659
+ ⟨Fα⟩±2ς is explicitly computed and then interpolated to
660
+ yield the thermal-fluctuation band in Fig. 4(a). The av-
661
+ eraged mixed DFT forces along with the error bars are
662
+ contained within the thermal band. This serves to show
663
+ that the statistical error as captured quantitatively by
664
+ σψχ, and qualitatively in Fig. 3, can be absorbed by the
665
+ thermal fluctuations in dynamical simulations. While the
666
+ statistical fluctuations are contained within 2ς, the bias
667
+ in the forces lies within 1ς indicating that the accuracy
668
+ converges faster than precision [32].
669
+ In order to investigate the effect of these relatively
670
+ small biases on observable quantities, we apply mDFT
671
+ to compute transport properties via molecular dynamics
672
+ (MD) simulations. We employ an isokinetic [53], rather
673
+ than Langevin, ensemble at each temperature. This is
674
+ the typical ensemble of choice for WDM transport cal-
675
+ culations [29, 30]. The time-dependent free energy and
676
+ total pressure along with their time-averages and stan-
677
+ dard deviations are given in Supplementary Information,
678
+ Table S3, Figs. S5, S6 [43]. We compute the velocity
679
+ autocorrelation function (VACF) and self-diffusion coef-
680
+ ficient (D) [29, 30, 54] of carbon at (ρ, T) = (3.52 g/cc, 5
681
+ eV) with deterministic KS-, mixed and stochastic DFT,
682
+ see Fig.
683
+ 4(b).
684
+ For MD simulations, finite simulation
685
+ time leads to its own statistical error, in addition to the
686
+ statistical error due to stochastic calculations in sDFT
687
+ and mDFT. Estimation of this statistical error depends
688
+ on the approach to VACF averaging.
689
+ We see the av-
690
+ erage mDFT diffusion coefficients falls between 1 and 2
691
+ times the statistical error estimate, which is within the
692
+ range of reasonable estimates, see Supplementary Infor-
693
+ mation for details. The pure sDFT diffusion coefficient
694
+ falls slightly outside this range, but is still within 10% of
695
+ the deterministic case. Figure 4(c) shows a comparison
696
+ of temperature-scaled VACF and D for several T, with
697
+ the Nψ/Nχ for mDFT specified in the key. The relation-
698
+ ship between D and T over a temperature range at any
699
+ given density was previously investigated for high-Z ma-
700
+ terials that exhibit multiple ionization states [55]. It was
701
+ argued that, over a large temperature and density range,
702
+ the mutually compensating effects of increased ionization
703
+ and thermal energy result in a constant coupling parame-
704
+ ter Γ, giving rise to a so-called Γ−plateau which, in turn,
705
+ affects quantities such as self-diffusion and viscosity. We
706
+ see that for 1 to 5 eV the change in temperature dom-
707
+
708
+ (a)
709
+ 64
710
+ KS-DFT
711
+ 80
712
+ 40
713
+ mDFT
714
+ 80
715
+ 32
716
+ 96
717
+ (eV/A)
718
+ 60
719
+ 32
720
+ 96
721
+ 16
722
+ 128
723
+ ^ 40
724
+ 16
725
+ 128
726
+ 128
727
+ 16
728
+ V
729
+ 1368
730
+ 20
731
+ 4
732
+ +0
733
+ 0
734
+ 10
735
+ 20
736
+ 30
737
+ 40
738
+ 50
739
+ Temperature (eV)
740
+ (b)
741
+ 4.0
742
+ Nw= 768, D = (6.16±0.07)
743
+ 3.5
744
+ Nu/Nx=128/8,D=(5.97±0.06)
745
+ (1E-3 A2/fs2)
746
+ 3.0
747
+ Nu/Nx= 0/128,D = (5.59±0.07)
748
+ 2.5
749
+ 2.0
750
+ VACF
751
+ 1.5
752
+ 1.0
753
+ 0.5
754
+ 0.0
755
+ X
756
+ 0
757
+ 20
758
+ 40
759
+ 60
760
+ 80
761
+ Time (fs)
762
+ (c)
763
+ 0.8
764
+ T=1eV,136/4,D/T=(1.04±0.01)
765
+ 2 /eV-fs2)
766
+ 0.7
767
+ T=5eV.128/8.D/T=(1.19±0.01)
768
+ T=10eV.128/64,D/T=(1.00±0.02)
769
+ 0.6
770
+ T=20eV.96/64,D/T=(0.86±0.02)
771
+ A2/
772
+ 0.5
773
+ T=30eV,96/32,D/T= (0.80±0.01)
774
+ (1E-3
775
+ T=40eV,80/32,D/T=(0.76±0.01)
776
+ 0.4
777
+ T=50eV.64/40,D/T=(0.73±0.01)
778
+ VACF/T
779
+ 0.3
780
+ 0.2
781
+ 0.1
782
+ 0.0
783
+ +
784
+ 0
785
+ 10
786
+ 20
787
+ 30
788
+ 40
789
+ 50
790
+ 60
791
+ 70
792
+ 80
793
+ Time (fs)6
794
+ inates correlation, leading to an increase in D/T, while
795
+ for greater than 5 eV the ionization effects become sig-
796
+ nificant leading to a decrease in D/T.
797
+ We have presented the first implementation of the
798
+ mDFT and sDFT methods within the plane-wave PAW
799
+ formalism for DFT. The PAW formalism provides a sig-
800
+ nificant acceleration of stochastic DFT methods due to
801
+ both smaller grids and decreased eigenspectrum range.
802
+ Additionally it opens the door to efficient, all-electron ac-
803
+ curacy, calculations of matter in extreme conditions, as
804
+ is possible in ambient conditions [37]. We have demon-
805
+ strated the efficacy of this approach in the simulation of
806
+ transport properties in isochorically heated warm dense
807
+ carbon up to 50 eV, observing the crossover from kinet-
808
+ ically to Coulomb-dominated correlation effects. Future
809
+ work will include additional transport studies, and ap-
810
+ plication of the PAW method to time-dependent mDFT
811
+ and optical response via the Kubo-Greenwood approach.
812
+ ACKNOWLEDGMENTS
813
+ This work was supported by the U.S. Department of
814
+ Energy through the Los Alamos National Laboratory
815
+ (LANL). Research presented in this article was supported
816
+ by the Laboratory Directed Research and Development
817
+ program of LANL, under project number 20210233ER,
818
+ and Science Campaign 4. We acknowledge the support of
819
+ the Center for Nonlinear Studies (CNLS). This research
820
+ used computing resources provided by the LANL Insti-
821
+ tutional Computing and Advanced Scientific Computing
822
+ programs. Los Alamos National Laboratory is operated
823
+ by Triad National Security, LLC, for the National Nu-
824
+ clear Security Administration of U.S. Department of En-
825
+ ergy (Contract No. 89233218CNA000001).
826
+ [1] National
827
+ Academies
828
+ of
829
+ Sciences,
830
+ Engineering,
831
+ and
832
+ Medicine, Exoplanet Science Strategy
833
+ (The National
834
+ Academies Press, Washington, DC, 2018).
835
+ [2] M. Bethkenhagen, E. R. Meyer, S. Hamel, N. Nettel-
836
+ mann, M. French, L. Scheibe, C. Ticknor, L. A. Collins,
837
+ J. D. Kress, J. J. Fortney, and R. Redmer, Planetary Ices
838
+ and the Linear Mixing Approximation, The Astrophysi-
839
+ cal Journal 848, 67 (2017).
840
+ [3] N. A. Teanby, P. G. J. Irwin, J. I. Moses, and R. Helled,
841
+ Neptune and Uranus: ice or rock giants?, Philosophi-
842
+ cal Transactions of the Royal Society A: Mathematical,
843
+ Physical and Engineering Sciences 378, 20190489 (2020).
844
+ [4] A. Becker, M. Bethkenhagen, C. Kellermann, J. Wicht,
845
+ and R. Redmer, Material Properties for the Interiors of
846
+ Massive Giant Planets and Brown Dwarfs, The Astro-
847
+ nomical Journal 156, 149 (2018).
848
+ [5] S. X. Hu, L. A. Collins, T. R. Boehly, Y. H. Ding, P. B.
849
+ Radha, V. N. Goncharov, V. V. Karasiev, G. W. Collins,
850
+ S. P. Regan, and E. M. Campbell, A review on ab ini-
851
+ tio studies of static, transport, and optical properties of
852
+ polystyrene under extreme conditions for inertial confine-
853
+ ment fusion applications, Physics of Plasmas 25, 056306
854
+ (2018).
855
+ [6] A. Fernandez-Pa˜nella, M. Millot, D. E. Fratanduono,
856
+ M. P. Desjarlais, S. Hamel, M. C. Marshall, D. J. Ersk-
857
+ ine, P. A. Sterne, S. Haan, T. R. Boehly, G. W. Collins,
858
+ J. H. Eggert, and P. M. Celliers, Shock Compression of
859
+ Liquid Deuterium up to 1 TPa, Phys. Rev. Lett. 122,
860
+ 255702 (2019).
861
+ [7] B. Bachmann, S. A. MacLaren, S. Bhandarkar, T. Briggs,
862
+ D. Casey, L. Divol, T. D¨oppner, D. Fittinghoff, M. Free-
863
+ man, S. Haan, G. N. Hall, et al., Measurement of Dark
864
+ Ice-Ablator Mix in Inertial Confinement Fusion, Phys.
865
+ Rev. Lett. 129, 275001 (2022).
866
+ [8] M. Millot, S. Hamel, J. R. Rygg, P. M. Celliers, G. W.
867
+ Collins, F. Coppari, D. E. Fratanduono, R. Jeanloz, D. C.
868
+ Swift, and J. H. Eggert, Experimental evidence for supe-
869
+ rionic water ice using shock compression, Nature Physics
870
+ 14, 297 (2018).
871
+ [9] B. Cheng, M. Bethkenhagen, C. J. Pickard, and S. Hamel,
872
+ Phase behaviours of superionic water at planetary con-
873
+ ditions, Nature Physics 17, 1228 (2021).
874
+ [10] H. Gao, C. Liu, J. Shi, S. Pan, T. Huang, X. Lu, H.-
875
+ T. Wang, D. Xing, and J. Sun, Superionic Silica-Water
876
+ and Silica-Hydrogen Compounds in the Deep Interiors
877
+ of Uranus and Neptune, Phys. Rev. Lett. 128, 035702
878
+ (2022).
879
+ [11] B. Cheng, S. Hamel, and M. Bethkenhagen, Diamond
880
+ formation from hydrocarbon mixtures in planets (2022).
881
+ [12] M. Ross, The ice layer in Uranus and Neptune – dia-
882
+ monds in the sky?, Nature 292, 435 (1981).
883
+ [13] A. J. White, O. Certik, Y. H. Ding, S. X. Hu, and L. A.
884
+ Collins, Time-dependent orbital-free density functional
885
+ theory for electronic stopping power: Comparison to the
886
+ Mermin-Kohn-Sham theory at high temperatures, Phys.
887
+ Rev. B 98, 144302 (2018).
888
+ [14] Y. H. Ding, A. J. White, S. X. Hu, O. Certik, and L. A.
889
+ Collins, Ab Initio Studies on the Stopping Power of Warm
890
+ Dense Matter with Time-Dependent Orbital-Free Den-
891
+ sity Functional Theory, Phys. Rev. Lett. 121, 145001
892
+ (2018).
893
+ [15] E.-M. Ahrer, L. Alderson, N. M. Batalha, N. E. Batalha,
894
+ J. L. Bean, T. G. Beatty, T. J. Bell, B. Benneke, Z. K.
895
+ Berta-Thompson, A. L. Carter, I. J. M. Crossfield, et al.,
896
+ Identification of carbon dioxide in an exoplanet atmo-
897
+ sphere, Nature (2022).
898
+ [16] W. Dietrich, S. Kumar, A. J. Poser, M. French, N. Nettel-
899
+ mann, R. Redmer, and J. Wicht, Magnetic induction pro-
900
+ cesses in hot Jupiters, application to KELT-9b, Monthly
901
+ Notices of the Royal Astronomical Society 517, 3113
902
+ (2022).
903
+ [17] Y. Miyazaki and D. J. Stevenson, A Subsurface Magma
904
+ Ocean on Io: Exploring the Steady State of Partially
905
+ Molten Planetary Bodies, The Planetary Science Journal
906
+ 3, 256 (2022).
907
+ [18] S.-F. Liu, Y. Hori, S. M¨uller, X. Zheng, R. Helled, D. Lin,
908
+ and A. Isella, The formation of Jupiter’s diluted core by
909
+ a giant impact, Nature 572, 355 (2019).
910
+ [19] A. B. Zylstra, O. A. Hurricane, D. A. Callahan, A. L.
911
+ Kritcher, J. E. Ralph, H. F. Robey, J. S. Ross, C. V.
912
+
913
+ 7
914
+ Young, K. L. Baker, D. T. Casey, T. D¨oppner, et al.,
915
+ Burning plasma achieved in inertial fusion, Nature 601,
916
+ 542 (2022).
917
+ [20] W. Kohn and L. J. Sham, Self-Consistent Equations In-
918
+ cluding Exchange and Correlation Effects, Phys. Rev.
919
+ 140, A1133 (1965).
920
+ [21] A. Pribram-Jones, S. Pittalis, E. K. U. Gross, and
921
+ K. Burke, Thermal Density Functional Theory in Con-
922
+ text, in Frontiers and Challenges in Warm Dense Matter,
923
+ edited by F. Graziani, M. P. Desjarlais, R. Redmer, and
924
+ S. B. Trickey (Springer International Publishing, Cham,
925
+ 2014) pp. 25–60.
926
+ [22] M. Bonitz, T. Dornheim, Z. A. Moldabekov, S. Zhang,
927
+ P. Hamann, H. K¨ahlert, A. Filinov, K. Ramakrishna, and
928
+ J. Vorberger, Ab initio simulation of warm dense matter,
929
+ Physics of Plasmas 27, 042710 (2020).
930
+ [23] D. M. Ceperley, Path integrals in the theory of condensed
931
+ helium, Rev. Mod. Phys. 67, 279 (1995).
932
+ [24] K. P. Driver and B. Militzer, All-Electron Path Integral
933
+ Monte Carlo Simulations of Warm Dense Matter: Appli-
934
+ cation to Water and Carbon Plasmas, Phys. Rev. Lett.
935
+ 108, 115502 (2012).
936
+ [25] V. L. Deringer,
937
+ M. A. Caro, and G. Cs´anyi, Ma-
938
+ chine Learning Interatomic Potentials as Emerging Tools
939
+ for Materials Science, Advanced Materials 31, 1902765
940
+ (2019).
941
+ [26] H.-F. Li, A. R. Oganov, H. Cui, X.-F. Zhou, X. Dong, and
942
+ H.-T. Wang, Ultrahigh-Pressure Magnesium Hydrosili-
943
+ cates as Reservoirs of Water in Early Earth, Phys. Rev.
944
+ Lett. 128, 035703 (2022).
945
+ [27] A. Blanchet, M. Torrent, and J. Cl´erouin, Requirements
946
+ for very high temperature Kohn–Sham DFT simulations
947
+ and how to bypass them, Physics of Plasmas 27, 122706
948
+ (2020).
949
+ [28] F. Lambert, J. Cl´erouin, and S. Mazevet, Structural and
950
+ dynamical properties of hot dense matter by a Thomas-
951
+ Fermi-Dirac molecular dynamics, Europhysics Letters
952
+ 75, 681 (2006).
953
+ [29] C. Ticknor, J. D. Kress, L. A. Collins, J. Cl´erouin, P. Ar-
954
+ nault, and A. Decoster, Transport properties of an asym-
955
+ metric mixture in the dense plasma regime, Phys. Rev.
956
+ E 93, 063208 (2016).
957
+ [30] A. J. White, L. A. Collins, J. D. Kress, C. Ticknor,
958
+ J. Cl´erouin, P. Arnault, and N. Desbiens, Correlation
959
+ and transport properties for mixtures at constant pres-
960
+ sure and temperature, Phys. Rev. E 95, 063202 (2017).
961
+ [31] M. D. Fabian, B. Shpiro, E. Rabani, D. Neuhauser, and
962
+ R. Baer, Stochastic density functional theory, WIREs
963
+ Computational Molecular Science 9, e1412 (2019).
964
+ [32] Y. Cytter, E. Rabani, D. Neuhauser, and R. Baer,
965
+ Stochastic density functional theory at finite tempera-
966
+ tures, Phys. Rev. B 97, 115207 (2018).
967
+ [33] A. J. White and L. A. Collins, Fast and Universal Kohn-
968
+ Sham Density Functional Theory Algorithm for Warm
969
+ Dense Matter to Hot Dense Plasma, Phys. Rev. Lett.
970
+ 125, 055002 (2020).
971
+ [34] K. Laasonen, A. Pasquarello, R. Car, C. Lee, and D. Van-
972
+ derbilt, Car-Parrinello molecular dynamics with Vander-
973
+ bilt ultrasoft pseudopotentials, Phys. Rev. B 47, 10142
974
+ (1993).
975
+ [35] P. E. Bl¨ochl, Projector augmented-wave method, Phys.
976
+ Rev. B 50, 17953 (1994).
977
+ [36] G. Kresse and D. Joubert, From ultrasoft pseudopoten-
978
+ tials to the projector augmented-wave method, Phys.
979
+ Rev. B 59, 1758 (1999).
980
+ [37] K. Lejaeghere, G. Bihlmayer, T. Bj¨orkman, P. Blaha,
981
+ S. Bl¨ugel, V. Blum, D. Caliste, I. E. Castelli, S. J. Clark,
982
+ A. D. Corso, S. de Gironcoli, et al., Reproducibility in
983
+ density functional theory calculations of solids, Science
984
+ 351, aad3000 (2016).
985
+ [38] N. D. Mermin, Thermal Properties of the Inhomogeneous
986
+ Electron Gas, Phys. Rev. 137, A1441 (1965).
987
+ [39] R. Baer, D. Neuhauser, and E. Rabani, Self-Averaging
988
+ Stochastic Kohn-Sham Density-Functional Theory, Phys.
989
+ Rev. Lett. 111, 106402 (2013).
990
+ [40] D. Neuhauser, R. Baer, and E. Rabani, Communication:
991
+ Embedded fragment stochastic density functional theory,
992
+ The Journal of Chemical Physics 141, 041102 (2014).
993
+ [41] R. Baer, D. Neuhauser, and E. Rabani, Stochastic Vector
994
+ Techniques in Ground-State Electronic Structure, An-
995
+ nual Review of Physical Chemistry 73, 255 (2022).
996
+ [42] M. Hutchinson, A stochastic estimator of the trace of the
997
+ influence matrix for laplacian smoothing splines, Com-
998
+ munications in Statistics - Simulation and Computation
999
+ 19, 433 (1990).
1000
+ [43] Supplementary Information for “Stochastic and Mixed
1001
+ Kohn Sham Density Functional Theory within the pro-
1002
+ jector augmented wave formalism for simulation of warm
1003
+ dense matter.”.
1004
+ [44] W.
1005
+ Li
1006
+ and
1007
+ D.
1008
+ Neuhauser,
1009
+ Real-space
1010
+ orthogonal
1011
+ projector-augmented-wave method, Phys. Rev. B 102,
1012
+ 195118 (2020).
1013
+ [45] A. Levitt and M. Torrent, Parallel eigensolvers in plane-
1014
+ wave Density Functional Theory, Computer Physics
1015
+ Communications 187, 98 (2015).
1016
+ [46] M.
1017
+ Torrent,
1018
+ F.
1019
+ Jollet,
1020
+ F.
1021
+ Bottin,
1022
+ G.
1023
+ Z´erah,
1024
+ and
1025
+ X. Gonze, Implementation of the projector augmented-
1026
+ wave method in the ABINIT code: Application to the
1027
+ study of iron under pressure, Computational Materials
1028
+ Science 42, 337 (2008).
1029
+ [47] B. Bennett, J. Johnson, G. Kerley, and G. Rood, Re-
1030
+ cent Developments in the Sesame Equation-Of-State
1031
+ Library,
1032
+ Los
1033
+ Alamos
1034
+ National
1035
+ Laboratory
1036
+ LA-7130
1037
+ 10.2172/5150206 (1978).
1038
+ [48] T. Rangel, D. Caliste, L. Genovese, and M. Torrent,
1039
+ A wavelet-based Projector Augmented-Wave (PAW)
1040
+ method: Reaching frozen-core all-electron precision with
1041
+ a systematic, adaptive and localized wavelet basis set,
1042
+ Computer Physics Communications 208, 1 (2016).
1043
+ [49] A. H. Romero, D. C. Allan, B. Amadon, G. Anto-
1044
+ nius, T. Applencourt, L. Baguet, J. Bieder, F. Bottin,
1045
+ J. Bouchet, E. Bousquet, F. Bruneval, et al., ABINIT:
1046
+ Overview and focus on selected capabilities, The Journal
1047
+ of Chemical Physics 152, 124102 (2020).
1048
+ [50] S. Lehtola, C. Steigemann, M. J. Oliveira, and M. A.
1049
+ Marques, Recent developments in LIBXC – A compre-
1050
+ hensive library of functionals for density functional the-
1051
+ ory, SoftwareX 7, 1 (2018).
1052
+ [51] E. Arnon, E. Rabani, D. Neuhauser, and R. Baer, Effi-
1053
+ cient Langevin dynamics for “noisy” forces, The Journal
1054
+ of Chemical Physics 152, 161103 (2020).
1055
+ [52] B. Shpiro, M. D. Fabian, E. Rabani, and R. Baer,
1056
+ Forces from Stochastic Density Functional Theory un-
1057
+ der Nonorthogonal Atom-Centered Basis Sets, Journal
1058
+ of Chemical Theory and Computation 18, 1458 (2022).
1059
+ [53] P. Minary, G. J. Martyna, and M. E. Tuckerman, Al-
1060
+ gorithms and novel applications based on the isokinetic
1061
+ ensemble. II. Ab initio molecular dynamics, The Journal
1062
+
1063
+ 8
1064
+ of Chemical Physics 118, 2527 (2003).
1065
+ [54] E. R. Meyer, J. D. Kress, L. A. Collins, and C. Tic-
1066
+ knor, Effect of correlation on viscosity and diffusion
1067
+ in molecular-dynamics simulations, Phys. Rev. E 90,
1068
+ 043101 (2014).
1069
+ [55] J. Cl´erouin, G. Robert, P. Arnault, J. D. Kress, and
1070
+ L. A. Collins, Behavior of the coupling parameter un-
1071
+ der isochoric heating in a high-Z plasma, Phys. Rev. E
1072
+ 87, 061101 (2013).
1073
+
MdFLT4oBgHgl3EQfNC8e/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
MtFAT4oBgHgl3EQfxh5M/content/tmp_files/2301.08687v1.pdf.txt ADDED
@@ -0,0 +1,1494 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Counterexample Guided Abstraction Refinement with Non-Refined Abstractions
2
+ for Multi-Agent Path Finding
3
+ Pavel Surynek
4
+ Faculty of Information Technology, Czech Technical University in Prague
5
+ Th´akurova 9, 160 00 Praha 6, Czechia
6
+ pavel.surynek@fit.cvut.cz
7
+ Abstract
8
+ Counterexample
9
+ guided
10
+ abstraction
11
+ refinement
12
+ (CEGAR) represents a powerful symbolic tech-
13
+ nique for various tasks such as model checking and
14
+ reachability analysis. Recently, CEGAR combined
15
+ with Boolean satisfiability (SAT) has been applied
16
+ for multi-agent path finding (MAPF), a problem
17
+ where the task is to navigate agents from their start
18
+ positions to given individual goal positions so that
19
+ the agents do not collide with each other.
20
+ The recent CEGAR approach used the initial ab-
21
+ straction of the MAPF problem where collisions
22
+ between agents were omitted and were eliminated
23
+ in subsequent abstraction refinements. We propose
24
+ in this work a novel CEGAR-style solver for MAPF
25
+ based on SAT in which some abstractions are de-
26
+ liberately left non-refined. This adds the necessity
27
+ to post-process the answers obtained from the un-
28
+ derlying SAT solver as these answers slightly dif-
29
+ fer from the correct MAPF solutions. Non-refining
30
+ however yields order-of-magnitude smaller SAT
31
+ encodings than those of the previous approach and
32
+ speeds up the overall solving process making the
33
+ SAT-based solver for MAPF competitive again in
34
+ relevant benchmarks.
35
+ Keywords:
36
+ multi-agent pathfinding (MAPF), counterex-
37
+ ample example guided abstraction refinement (CEGAR),
38
+ Boolean satisfiability (SAT)
39
+ 1
40
+ Introduction
41
+ Multi-agent path finding (MAPF) [Silver, 2005; Ryan, 2008;
42
+ Surynek, 2009; Wang and Botea, 2011; Sharon et al., 2013] is
43
+ a task of finding non-conflicting paths for k ∈ N agents A =
44
+ {a1, a2, ..., ak} that move in an undirected graph G = (V, E)
45
+ across its edges such that each agent reaches its goal vertex
46
+ from the given start vertex via its path. Starting configura-
47
+ tion of agents is defined by a simple assignment s : A → V
48
+ and the goal configuration is defined by a simple assignment
49
+ g : A → V . A conflict between agents is usually defined as
50
+ simultaneous occupancy of the same vertex by two or more
51
+ agents or as a traversal of an edge by agents in opposite direc-
52
+ tions. Although MAPF started as purely theoretical studies of
53
+ graph pebbling and puzzle solving [Kornhauser et al., 1984;
54
+ Ratner and Warmuth, 1986; Ratner and Warmuth, 1990], it
55
+ has grown into artificial intelligence mainstream topic with a
56
+ significant impact on many fields including warehouse logis-
57
+ tics [Li et al., 2020b].
58
+ Many problems in robotics [Chud´y et al., 2020; Wen et
59
+ al., 2022; Gharbi et al., 2009], urban traffic optimization
60
+ [Atzmon et al., 2019; Ho et al., 2019], FPGA circuit de-
61
+ sign [Nery et al., 2017], and computer games [Sigurdson et
62
+ al., 2018] can be regarded from the perspective of MAPF
63
+ as listed by various surveys including [Felner et al., 2017;
64
+ Ma et al., 2017].
65
+ Particular aspect that is motivated by practice and makes
66
+ MAPF challenging is the need to find the optimal solutions
67
+ with respect to some cumulative cost [Yu and LaValle, 2013].
68
+ Commonly used cumulative costs in MAPF are makespan
69
+ and sum-of-costs[Stern, 2019]. The makespan corresponds
70
+ to the length of the longest agent’s path. The sum-of-costs
71
+ is the sum of costs of individual paths which corresponds to
72
+ the sum of unit costs of actions, the wait actions including.
73
+ An example of MAPF problem and its sum-of-costs optimal
74
+ solution is shown in Figure 1.
75
+
76
+ path(r1) =
77
+ [v1, v4, v7, v8, v9]
78
+ Cost = 4
79
+
80
+ path(r2) =
81
+ [v3, v6, v5, v4, v7]
82
+ Cost = 4
83
+
84
+ SoC = 8
85
+ s(a1) = v1
86
+ a1
87
+ a2
88
+ v2
89
+ s(a1) = v3
90
+ v4
91
+ v5
92
+ v6
93
+ g(a1) = v7 v8
94
+ g(a1) = v9
95
+ a1
96
+ a2
97
+ v1
98
+ v4
99
+ v7
100
+ v2
101
+ v5
102
+ v8
103
+ v3
104
+ v6
105
+ v9
106
+ Figure 1: Multi-agent path finding (MAPF) with agents a1 and a2.
107
+ We address MAPF from the perspective of compilation
108
+ techniques that represent a major alternative to search-based
109
+ solvers [Silver, 2005; Wagner and Choset, 2011; Sharon et
110
+ al., 2013; Sharon et al., 2015] for MAPF. Compilation-based
111
+ solvers reduce the input MAPF instance to an instance in a
112
+ different well established formalism for which an efficient
113
+ solver exists. Such formalisms are for example constraint
114
+ programming (CSP) [Dechter, 2003; Ryan, 2010], Boolean
115
+ satisfiability (SAT) [Biere et al., 2021; Surynek, 2012], or
116
+ mixed integer linear programming (MILP) [Rader, 2010;
117
+ Lam et al., 2019].
118
+ The basic compilation scheme for sum-of-costs opti-
119
+ arXiv:2301.08687v1 [cs.AI] 20 Jan 2023
120
+
121
+ mal MAPF solving has been introduced by the MDD-SAT
122
+ [Surynek et al., 2016] solver that uses so called complete
123
+ models to compile MAPF instances into SAT (see Figure 2).
124
+ The target Boolean formula of the complete model is sat-
125
+ isfiable if and only if the input MAPF has a solution of a
126
+ specified sum-of-costs. The complete model as introduced in
127
+ MDD-SAT consists of three group of constraints:
128
+ • Agent propagation constraints - these constraints en-
129
+ sure that if an agent appears in vertex v at time step t
130
+ then the agent appears in some neighbor of v (including
131
+ v) at time step t + 1. The side effect of these constraints
132
+ is that the agent never disappears. Cost calculation and
133
+ bounding is done together with agent propagation.
134
+ • Path consistency constraints - these constrains ensure
135
+ that agents move along proper paths, that is, agents do
136
+ not multiply and do not appear spontaneously.
137
+ • Conflict elimination constraints - to ensure that agents
138
+ do not conflict with each other according to the MAPF
139
+ rules (vertex and edge conflict).
140
+
141
+
142
+
143
+ Agent
144
+ Propagation
145
+ Constraints
146
+ Solving
147
+ Answer
148
+ Interpretation
149
+ Solution
150
+ Path
151
+ Consistency
152
+ Constraints
153
+ Conflict
154
+ Elimination
155
+ Constraints
156
+ Complete Model Encoding
157
+ Figure 2: Schematic diagram of the basic MAPF compilation with
158
+ complete model.
159
+ A significant improvement over complete models in prob-
160
+ lem compilation for MAPF is the introduction of laziness via
161
+ incomplete models in the CSP-based LazyCBS [Gange et al.,
162
+ 2019], SAT-based SMT-CBS [Surynek, 2019], and MILP-
163
+ based BCP [Lam et al., 2019]. These solvers use incomplete
164
+ models of MAPF where the conflict elimination constraints
165
+ are omitted for which equivalent solvability no longer holds,
166
+ but only the implication: if the MAPF instance is solvable
167
+ then the instance in the target formalism is solvable too.
168
+ The discrepancy between the original formulation of
169
+ MAPF and its compiled variant in the target formalism is
170
+ eliminated by abstraction refinements similarly as it is done in
171
+ the counterexample guided abstraction refinement (CEGAR)
172
+ [Clarke et al., 2000] approach for model checking (see Fig-
173
+ ure 4). Specifically in MAPF the counterexamples are repre-
174
+ sented by conflicts between agents and their refinements cor-
175
+ respond to elimination of these conflicts.
176
+ 1.1
177
+ Contribution
178
+ We further generalize the CEGAR approach for MAPF by
179
+ further omitting the path consistency constraints. Hence only
180
+ agent propagation constraints remain in the initial abstrac-
181
+ tion. In addition to this, in the abstraction refinement we do
182
+ not try to refine with respect to all the omitted constraints
183
+ (path consistency and conflict elimination). Instead we only
184
+ generate counterexamples for conflicts and refine the conflicts
185
+ while path consistency remains non-refined - the abstraction
186
+ refinement in our case is inherently incomplete. To mitigate
187
+ the impact of non-refined path consistency constraints we add
188
+ a new step in the CEGAR compilation architecture in which
189
+ we post-process the answer from the SAT solver.
190
+ The omitted path consistency constraints lead to finding di-
191
+ rected acyclic sub-graphs (DAGs) that connects agents’ initial
192
+ and goal positions instead of proper paths. The desired path
193
+ for agents need to be extracted from the sub-graphs in the new
194
+ post-processing step.
195
+ Our contribution can be understood in a broader perspec-
196
+ tive as a generalization how problems are compiled.
197
+ In
198
+ the classic approaches such as SATPlan [Kautz and Selman,
199
+ 1992] the problem solution is read from the assignment of
200
+ decision variables directly. In our approach the assignment
201
+ of decision variables does not represent the problem solution
202
+ directly, but the solution needs to be extracted from the as-
203
+ signment by non-trivial process, though this process should
204
+ be fast (polynomial time) to keep the problem compilation
205
+ viable.
206
+ 2
207
+ Background
208
+ One of the first uses of problem compilation can be seen in
209
+ the SATPlan algorithm [Kautz and Selman, 1992; Kautz and
210
+ Selman, 1999] for classical planning [Ghallab et al., 2004].
211
+ A Boolean formula that is satisfiable if and only if a plan
212
+ of specified length exists is constructed and checked for sat-
213
+ isfiability by the SAT solver. To guarantee finding a plan of
214
+ the minimum length, the SATPlan planner iteratively consults
215
+ formulae encoding the existence of a plan of length l0, l0 +1,
216
+ l0 + 2,... where l0 is a lower bound for the plan length, until
217
+ the first satisfiable formula is found.
218
+ Similar approach has been used in SAT-based solvers for
219
+ MAPF such as MDD-SAT [Surynek et al., 2016] where the
220
+ SAT solver is consulted about the existence of a solution
221
+ for the given MAPF instance of specified sum-of-cost SoC.
222
+ To ensure finding sum-of-costs optimal solution for solvable
223
+ MAPF, MDD-SAT checks using the SAT solver existence of
224
+ solutions for SoC 0, SoC 0 + 1, SoC 0 + 2, ... until the first
225
+ positive answer which due to monotonicity of existence of
226
+ solutions w.r.t. bounded sum-of-costs is guaranteed to corre-
227
+ spond to the optimal sum-of-cost.
228
+ 2.1
229
+ The MAPF Encoding as SAT
230
+ The complete model for the sum-of-costs optimal MAPF
231
+ as SAT built-in the MDD-SAT solver uses Boolean deci-
232
+ sion variables inspired by direct encoding [Walsh, 2000]
233
+ and multi-valued decision diagrams [Andersen et al., 2007].
234
+ We briefly summarize the complete model as introduced by
235
+ MDD-SAT.
236
+ The decision variables need to represent all possible paths
237
+ of agents such that their sum-of-costs is at most given value
238
+ SoC > 0. Since it is possible for an agent to visit a single
239
+ vertex multiple times, a so-called time expansion [Surynek,
240
+ 2017] of the underlying graph G is constructed for each agent
241
+ denoted TEGi.
242
+ TEGi is defined for a given maximum length of indi-
243
+ vidual agent’s path T
244
+ ∈ N consisting of T + 1 copies
245
+ of vertices of G called layers indexed by 0, 1, ..., T, where
246
+
247
+ {(v1, t), (v2, t), ..., (vn, t)} are nodes of the t-th layer of
248
+ TEGi.
249
+ The layers correspond to individual time-steps
250
+ and are interconnected by directed edges that model pos-
251
+ sible transitions of agents, that is there is a directed edge
252
+ [(vj, t), (vj′, t + 1)] whenever there is an edge {vj, vj′} ∈ E.
253
+ Directed edges [(vj, t), (vj′, t + 1)] are added to model wait
254
+ actions of agents.
255
+ The following proposition establishes the correspondence
256
+ between the actual paths traveled by agents in G 1 and di-
257
+ rected paths in TEGs.
258
+ Proposition 1. Any path of length at most T of agent ai going
259
+ from s(ai) to g(ai) is represented by a directed path in TEGi
260
+ connecting (s(ai), 0) and (g(ai), T).
261
+ Having the proposition, we can speak about a representa-
262
+ tion of agent’s path (trajectory) in TEG.
263
+ Since not all nodes (vj, t) of TEGi are actually reachable
264
+ considering the maximum agent’s path length T and its start
265
+ s(ai) and goal g(ai) because either vj is farther than t steps
266
+ from s(ai) or farther than T − t steps from g(ai), such nodes
267
+ be can pruned from TEGi without compromising the repre-
268
+ sentation of all relevant paths. TEDi after pruning unreach-
269
+ able nodes is called a multi-valued decision diagram for agent
270
+ ai and is denoted MDDi (nodes and edges of MDDi are de-
271
+ noted MDDi.V and MDDi.E respectively). Example MDD
272
+ is shown in Figure 3. The complete model for MAPF in the
273
+ MDD-SAT solver is derived from MDDs.
274
+ The decision variable denoted X t
275
+ i,vj is introduced for each
276
+ node (vj, t) ∈ MDDi and expresses that agent ai appears in
277
+ vertex vj at time step t 2.
278
+
279
+
280
+
281
+
282
+
283
+
284
+
285
+
286
+
287
+
288
+
289
+
290
+
291
+
292
+ s(a1)=v1
293
+ a1
294
+ v2
295
+ v3
296
+ v4
297
+ v5
298
+ v6
299
+ v7
300
+ v8
301
+ v9=g(a1)
302
+ (v1,0)
303
+ (v2,1)
304
+ (v4,1)
305
+ (v3,2)
306
+ (v5,2)
307
+ (v7,2)
308
+ (v6,3)
309
+ (v8,3)
310
+ (v9,4)
311
+ MDD1 for T=4
312
+ Figure 3: Multi-valued decision diagram for the path length T = 4.
313
+ The three groups of constraints expressed on top of the
314
+ X t
315
+ i,vj variables are as follows:
316
+ Agent Propagation Constraints
317
+ X t
318
+ i,vj →
319
+
320
+ j′ | [(vj,t);(vj′,t+1)]∈MDDi.E
321
+ X t+1
322
+ i,vj′
323
+ (1)
324
+ This constraint is introduced for each ai, vj, and t and
325
+ specifies that agent must proceed to the next level in MDD.
326
+ 1The proper terminology for agents’ paths should be trajectories
327
+ or just sequences of vertices as a vertex can visited multiple times
328
+ by the agent which does not correspond to the standard graph termi-
329
+ nology where a path is a simple sequence of vertices.
330
+ 2Auxiliary variables Et
331
+ i,vj,vj′ to express that agent ai moves
332
+ from vj to vj′ between time-steps t and t + 1 can be used as well,
333
+ but we will base our description only on the X t
334
+ i,vj variables as the
335
+ Et
336
+ i,vj,vj′ variables are direct consequence of of the X t
337
+ i,vj variables:
338
+ Et
339
+ i,vj,vj′ ↔ X t
340
+ i,vj ∧ X t+1
341
+ i,vj′ .
342
+ In addition, to this we account among these constraints also
343
+ calculation and bounding of the cost. For each time-step t in
344
+ MDD an auxiliary variable is introduced which is TRUE if
345
+ and only if the agent performed an action. The cost bound-
346
+ ing over auxiliary variables is carried out through cardinal-
347
+ ity constraints encoded as Boolean circuits into the formula
348
+ [Bailleux and Boufkhad, 2003; Silva and Lynce, 2007].
349
+ X 0
350
+ i,s(ai) ∧
351
+
352
+ j | vj̸=s(ai)
353
+ ¬X 0
354
+ i,vj
355
+ (2)
356
+ X T
357
+ i,g(ai) ∧
358
+
359
+ j | vj̸=g(ai)
360
+ ¬X T
361
+ i,vj
362
+ (3)
363
+ These equations are introduced for each agent ai and en-
364
+ sure that agent ai starts in vertex s(ai) at time-step 0 and
365
+ finished in its goal vertex g(ai) at time-step T.
366
+ Path Consistency Constraints
367
+
368
+ j | (vj,t)∈MDDi.V
369
+ X t
370
+ i,vj = 1
371
+ (4)
372
+ This constraint is introduced for each ai and t and specifies
373
+ that agent can appear in exactly one vertex at a time.
374
+ Conflict Elimination Constraints
375
+
376
+ i | (vj,t)∈MDDi.V
377
+ X t
378
+ i,vj ≤ 1
379
+ (5)
380
+ This constraint is introduced for each vj and t and specifies
381
+ that at most one agent can reside in vertex vj at time t. The
382
+ constraint eliminates vertex conflicts, edge conflicts can be
383
+ eliminated analogously.
384
+ As some of the constraint are defined by pseudo-Boolean
385
+ expression, proper translation to CNF is needed which most
386
+ notably concerns the at-most-one constraints [Chen, 2010;
387
+ Nguyen and Mai, 2015]. The combination of pair-wise en-
388
+ coding and sequential counter are used in the MDD-SAT and
389
+ SMT-CBS solvers.
390
+ The formula collecting the above constraints is being built
391
+ for the specific sum-of-costs SoC and is denoted F(SoC).
392
+ The completeness of the model encoded by F(SoC) can be
393
+ summarized as follows [Surynek et al., 2016]:
394
+ Proposition 2. The input MAPF has a solution of the given
395
+ sum-of-costs SoC ⇔ F(SoC) is satisfiable.
396
+ The core of the proof of the proposition is a correspon-
397
+ dence of satisfying assignments of F(SoC) and directed
398
+ paths in MDDs which in turn due to Proposition 1 estab-
399
+ lishes a correspondence between agents’ paths and satisfying
400
+ assignments of F(SoC).
401
+ 2.2
402
+ CEGAR for MAPF
403
+ The next step in compilation-based MAPF solving is rep-
404
+ resented by the integration of ideas from counterexample
405
+ guided abstraction and refinement (CEGAR) [Clarke et al.,
406
+ 2000; Clarke, 2003]. The two representative solvers SMT-
407
+ CBS [Surynek, 2019] based on SAT and Lazy-CBS [Gange
408
+ et al., 2019] based on CSP resolve conflicts between agents
409
+ as done in the CEGAR approach (though the authors of these
410
+ MAPF solvers do not explicitly mention CEGAR).
411
+
412
+
413
+ Solving
414
+ Answer
415
+ Interpretation
416
+ Abstraction Refinement
417
+ Counterexample
418
+ Generation
419
+ no counterexamples
420
+ (no conflicts)
421
+ counterexamples
422
+ (conflicts) exist
423
+ Solution
424
+ Agent
425
+ Propagation
426
+ Constraints
427
+ Path
428
+ Consistency
429
+ Constraints
430
+ Conflicts
431
+ Elimination
432
+ Constraints
433
+ Initial Abstraction
434
+ Figure 4: Schematic diagram of counterexample guided abstrac-
435
+ tion refinement (CEGAR) for MAPF. Conflicts between agents are
436
+ treated as counterexamples and eliminated in the abstraction refine-
437
+ ment loop.
438
+ The general CEGAR approach for compilation-based
439
+ problem solving starts with a so called initial abstraction of
440
+ the problem instance being solved in some target formalism
441
+ such as SAT [Biere et al., 2021] or CSP [Dechter, 2003]. The
442
+ initial abstraction do not model the input instance in the full
443
+ details. However still the initial abstraction is passed to the
444
+ solver for the target formalism despite the solver is not pro-
445
+ vided all the details needed to solve it. Then the solver will
446
+ come with some answer and since it could not take some de-
447
+ tails into account during the solving phase, the answer must
448
+ be checked, usually against full details of how the problem
449
+ instance is defined. Two cases need to be distinguished at this
450
+ stage. If the provided answer matches the instance definition
451
+ then it is returned and the solving process finishes. Otherwise
452
+ the CEGAR solving process generates counterexample that
453
+ is determined by the mismatch between the provided answer
454
+ and the requirements the expected answer should satisfy. This
455
+ mismatch is usually represented by the violation of some con-
456
+ straints that were not expressed in the abstraction. Then the
457
+ solving process continues with a so called abstraction refine-
458
+ ment in which the abstraction is augmented to eliminate the
459
+ counterexample and the solving process continues with the
460
+ next iteration of (now refined) abstraction solving.
461
+ To keep the problem solving in the CEGAR approach
462
+ sound, the abstractions must fulfill certain basic requirements
463
+ such as if the problem instance is solvable then any of its ab-
464
+ stractions should be solvable as well (the opposite does not
465
+ hold: the solvable abstraction does not necessarily imply that
466
+ the input instance is solvable).
467
+ The CEGAR approach for MAPF as implemented in SMT-
468
+ CBS and Lazy-CBS is illustrated in Figure 4.
469
+ The initial
470
+ abstraction in both algorithms models existence of paths for
471
+ individual agents but omits the requirement to avoid con-
472
+ flicts between agents. The abstraction refinement hence must
473
+ check the answers of the target solver against the definition of
474
+ conflicts in MAPF. If a conflict is found then the abstraction
475
+ is refined so that the conflict is eliminated.
476
+ The abstraction refinement for a conflict, say between
477
+ agents ai and aj in vertex v at time-step t, is done in the
478
+ case of CSP-based Lazy-CBS by adding a fresh finite domain
479
+ variable pv,t ∈ A that indicates what agent occupies vertex
480
+ v at time step t. The need to assign the variable pv,t a single
481
+ value eliminates the conflict.
482
+ The SAT-based SMT-CBS algorithm refines the conflict by
483
+ adding a new constraint over the existing Boolean variables
484
+ that forbids the occupation of vertex v at time-step t by agents
485
+ ai and aj simultaneously: ¬X t
486
+ i,v ∨ ¬X t
487
+ j,v.
488
+ The edge conflicts and potentially different kinds of con-
489
+ flicts in MAPF and its variants [Andreychuk et al., 2019;
490
+ Bonnet et al., 2018] can be treated analogously.
491
+ The abstraction at any point in SMT-CBS and Lazy-CBS
492
+ forms a so called incomplete model for MAPF. Unlike the
493
+ complete model from MDD-SAT, the equivalent-solvability
494
+ of the model in the target formalism and the input MAPF in-
495
+ stance does not hold for the incomplete MAPF model. Let
496
+ us express this property formally for the SAT-based formula-
497
+ tion. Let F′(SoC) be the formula obtained at some stage in
498
+ CEGAR loop of SMT-CBS used for answering the question
499
+ whether there is a solution of the input MAPF instance of
500
+ the given sum-of-costs SoC. Then the following proposition
501
+ holds [Surynek, 2019]:
502
+ Proposition 3. The input MAPF has a solution of the given
503
+ sum-of-costs SoC ⇒ F′(SoC) is satisfiable.
504
+ The incompleteness property also represents the require-
505
+ ment that keeps the CEGAR approach sound for MAPF as it
506
+ says that F′(SoC) is an abstraction for MAPF.
507
+ 3
508
+ Non-Refined Abstractions in MAPF
509
+ We are going further in the CEGAR architecture of the MAPF
510
+ solver. In addition to conflict elimination constrains we also
511
+ omit path consistency constraints in the initial abstraction.
512
+ Moreover we never make any refinement with respect to the
513
+ omitted path consistency constraints - the corresponding ab-
514
+ straction remains non-refined.
515
+ We call the new algorithm based on the non-refined ab-
516
+ stractions Non-Refined SAT or NRF-SAT in short.
517
+ The
518
+ pseudo-code of NRF-SAT is shown as Algorithm 1.
519
+ The high-level function of the algorithm NRF-SAT-
520
+ MAPF() is analogous to SATPlan or MDD-SAT main loop
521
+ where search for the optimal sum-of-costs is done by trying
522
+ to answer questions whether there is a solution of MAPF of
523
+ a specified sum-of-costs SoC (lines 5-6). To answer these
524
+ questions, the algorithm uses low level function NRF-SAT-
525
+ Bounded() that implements the CEGAR architecture with
526
+ non-refined abstractions as shown in Figure 5.
527
+ As the satisfying assignment of formula F′′ representing
528
+ the incomplete model in NRF-SAT does not correspond to
529
+ paths for agents (line 15) further post-processing of the SAT
530
+ solver’s answer is needed (line 16). As we will see later,
531
+ the answer obtained directly from the SAT solver can be in-
532
+ terpreted as special directed acyclic graph (DAG) that con-
533
+ nects agent’s start vertex with its goal vertex. Hence the post-
534
+ processing consists in extraction of proper agent’s path from
535
+ the DAG.
536
+ The rest of the low-level loop (lines 17-22) represents ab-
537
+ straction refinements with respect to conflicts between agents.
538
+ Let us note that conflicts being discovered are collected and
539
+ reused in the next iteration of the high-level loop.
540
+ The NRF-SAT algorithm is sound and optimal, more pre-
541
+ cisely it returns a sum-of-costs optimal solution for a solvable
542
+
543
+
544
+
545
+
546
+
547
+
548
+
549
+
550
+
551
+
552
+
553
+
554
+
555
+
556
+
557
+
558
+ Solving
559
+ Answer
560
+ Interpretation
561
+ Counterexample
562
+ Generation
563
+ Answer
564
+ Post-processing
565
+ Incomplete Abstraction Refinement
566
+ no counterexamples
567
+ (no conflicts)
568
+ counterexamples
569
+ (conflicts) exist
570
+ Solution
571
+ Agent
572
+ Propagation
573
+ Constraints
574
+ Conflict
575
+ Elimination
576
+ Constraints
577
+ Initial Abstraction
578
+ Figure 5: Schematic diagram of CEGAR problem solver for MAPF
579
+ with non-refined abstractions.
580
+ input MAPF instance. The following series of propositions
581
+ shows the claim.
582
+ Definition 1. DAGi is a directed acyclic sub-graph of
583
+ MDDi such that (g(ai), T) ∈ DAGi.V and there exists a
584
+ directed path from any (vj, t) ∈ DAGi.V to (g(ai), T).
585
+ Proposition 4. The interpretation of satisfying assignment
586
+ of F′′(SoC) at any stage of the NRF-SAT algorithm corre-
587
+ sponds to DAGi such that (s(ai), 0) ∈ DAGi.V .
588
+ Proof. Assume that Boolean decision variables of X t
589
+ i,vj are
590
+ set to TRUE to reflect the choice of vertices in MDDi by a
591
+ given DAGi. Then the agent propagation constraints (1) and
592
+ (3) are satisfied since they directly correspond to existence of
593
+ paths towards (g(ai), T) from any node selected by DAGi
594
+ which is satisfied by the definition of DAGi. Conversely,
595
+ any assignment of Boolean decision variables that satisfies
596
+ constraints (1) and (3) corresponds to DAGi since any setting
597
+ of X t
598
+ i,vj to TRUE must be propagated via (1) and (3) towards
599
+ X T
600
+ i,g(ai). In addition to this, the constraint (2) ensures that
601
+ (s(ai), 0) ∈ DAGi.V .
602
+ The immediate corollary of Proposition 4 and the definition
603
+ of DAGi is as follows:
604
+ Corollary 1.
605
+ There exists a directed path connecting
606
+ (s(ai), 0) and (g(ai), T) in DAGi for each agent ai obtained
607
+ from satisfying assignment of F′′(SoC).
608
+ This directed path will be extracted from the SAT solver
609
+ answer during the answer post-processing step as illustrated
610
+ in Figure 6.
611
+ Additional constraints that bound the cost and those that
612
+ eliminate conflicts included during abstraction refinements
613
+ restrict the set of DAGs that can correspond to satisfying as-
614
+ signments of F′′(SoC).
615
+ The important property of DAGi that directly follows from
616
+ its definition is that a path for agent ai of length T going from
617
+ its start vertex s(ai) to its goal g(ai) can be represented as a
618
+ DAGi (we only add time indices to vertices visited by the
619
+ agent along the path to obtain the DAGi). Hence F′′(SoC)
620
+ is an incomplete model (an abstraction) for MAPF:
621
+ Proposition 5. The input MAPF has a solution of the given
622
+ sum-of-costs SoC ⇒ F′′(SoC) is satisfiable.
623
+ The above propositions establish soundness of the NRF-
624
+ SAT algorithm. In other words, if the algorithm terminates
625
+ Algorithm 1: NRF-SAT: MAPF solving via CEGAR
626
+ with non-refined abstractions.
627
+ 1 NRF-SAT-MAPF(M = (G, A, s, g))
628
+ 2
629
+ SoC ← lower-Bound(M)
630
+ 3
631
+ conflicts ← ∅
632
+ 4
633
+ while TRUE do
634
+ 5
635
+ (paths, conflicts) ←
636
+ 6
637
+ NRF-SAT-Bounded(M, SoC,conflicts)
638
+ 7
639
+ if paths ̸= UNSAT then
640
+ 8
641
+ return paths
642
+ 9
643
+ SoC ← SoC + 1
644
+ 10 NRF-SAT-Bounded(M,SoC,conflicts)
645
+ 11
646
+ F ′′ ← build-Initial-Abstraction(M,SoC,conflicts)
647
+ 12
648
+ while TRUE do
649
+ 13
650
+ assignment ← consult-SAT-Solver(F ′′)
651
+ 14
652
+ if assignment ̸= UNSAT then
653
+ 15
654
+ DAGs ← interpret(M,assignment)
655
+ 16
656
+ paths ← extract-Paths(M,DAGs)
657
+ 17
658
+ conflicts′ ← validate(M,paths)
659
+ 18
660
+ if conflicts′ = �� then
661
+ 19
662
+ return (paths, conflicts)
663
+ 20
664
+ for each c ∈ conflicts′ do
665
+ 21
666
+ F ′′ ← F ′′∪ eliminate-Conflict(c)
667
+ 22
668
+ conflicts ← conflicts ∪ conflicts′
669
+ 23
670
+ return (UNSAT,conflicts)
671
+ and returns an answer then it is a valid MAPF solution. How-
672
+ ever the termination needs a separate investigation.
673
+ Proposition 6. The abstraction refinement loop for a speci-
674
+ fied SoC is executed by the NRF-SAT algorithm finitely many
675
+ times.
676
+ Proof. Each iteration of the abstraction refinement loop cor-
677
+ responds to a counterexample, a conflict between a pair of
678
+ agents. This conflict appears between two paths extracted
679
+ from a pair of DAGs say DAGi and DAGj. These two spe-
680
+ cific DAGs cannot be interpreted from the satisfying assign-
681
+ ment of F′′(SoC) again in any of the next iterations of the
682
+ abstraction refinement loop since the conflict elimination con-
683
+ straint forbids them to appear simultaneously, either DAGi or
684
+ DAGj must be different. Since there is finitely many pairs of
685
+ DAGs DAGi and DAGj the algorithm either forbids them all
686
+ during the refinements or terminates earlier.
687
+ We are now ready to state the main theoretical property of
688
+ the NRF-SAT algorithm.
689
+ Theorem 1. The NRF-SAT algorithm returns sum-of-costs
690
+ optimal solution for a solvable input MAPF instance.
691
+ Proof. For a solvable MAPF instance, the NRF-SAT finds
692
+ the first sum-of-costs SoC for which the abstraction refine-
693
+ ment loop finishes with a solution since all previous loops are
694
+ guaranteed to terminate due to Proposition 6. Due to mono-
695
+ tonicity of solvability of bounded MAPF with respect to the
696
+ sum-of-costs, this solution is optimal.
697
+
698
+
699
+
700
+
701
+
702
+
703
+
704
+
705
+
706
+
707
+
708
+
709
+
710
+
711
+
712
+
713
+
714
+
715
+
716
+
717
+
718
+
719
+
720
+
721
+
722
+
723
+
724
+
725
+
726
+
727
+
728
+
729
+
730
+
731
+
732
+
733
+
734
+
735
+
736
+
737
+
738
+
739
+
740
+
741
+
742
+
743
+
744
+
745
+
746
+
747
+ (v2,1)
748
+ (v3,2)
749
+ (v1,0)
750
+ (v6,3)
751
+ (v5,2)
752
+ (v9,4)
753
+ (v4,1)
754
+ (v7,2)
755
+ (v8,3)
756
+ SAT solver answer, DAGi
757
+ (v2,1)
758
+ (v3,2)
759
+ (v1,0)
760
+ (v6,3)
761
+ (v5,2)
762
+ (v9,4)
763
+ (v4,1)
764
+ (v7,2)
765
+ (v8,3)
766
+ after post-processing
767
+ Figure 6: Post-processing step in which path is extracted from DAG
768
+ answered by the SAT solver.
769
+ 4
770
+ Experimental Evaluation
771
+ We performed an experimental evaluation of NRF-SAT on
772
+ a number of MAPF benchmarks from movingai.com
773
+ [Sturtevant, 2012].
774
+ We compared NRF-SAT against SAT-
775
+ based SMT-CBS [Surynek, 2019] and CSP-based LazyCBS
776
+ [Gange et al., 2019] which are the solvers using similar
777
+ compilation-based approach to MAPF.
778
+ 4.1
779
+ Benchmarks and Setup
780
+ We implemented NRF-SAT in C++ via reusing the code of
781
+ the original implementation of SMT-CBS. Both SAT-based
782
+ MAPF solvers are built on top the Glucose 3 SAT solver [Au-
783
+ demard and Simon, 2009; Audemard and Simon, 2018] still
784
+ ranking among top performing SAT solvers according to rel-
785
+ evant competitions [Froleyks et al., 2021]. The extraction of
786
+ agent’s path from DAG is implemented as a simple breadth-
787
+ first search.
788
+ The important feature of the Glucose SAT solver is that it
789
+ provides an interface for adding clauses incrementally that is
790
+ employed during abstraction refinements. After refining the
791
+ formula being answered by the SAT solver with new clauses,
792
+ the solving process does not need to start from scratch. In-
793
+ stead the learned state of the solver is utilized in its run after
794
+ the formula refinement which usually speeds up the process.
795
+ As of LazyCBS, we used its original implementation in
796
+ C++. LazyCBS is built on top of the Geas CSP solver that
797
+ supports lazy clause generation [Stuckey, 2010], a feature
798
+ used by LazyCBS to eliminate MAPF conflicts lazily.
799
+ To obtain instances of various difficulties we varied the
800
+ number of agents from 1 to K, where K is the maximum
801
+ number of agents for which at least one solver is able to
802
+ solve some instance in the given time limit of 300 seconds
803
+ (5 minutes). K varied from approximately 80 agents to 120
804
+ agents depending on the benchmark map. For each number of
805
+ agents, we generated 25 instances according to random sce-
806
+ narios provided on movingai.com (for each benchmark
807
+ map we generated 25 × K instances, i.e. approximately 2500
808
+ MAPF instances per map).
809
+ All experiments were run on a system consisting of Xeon
810
+ 2.8 GHz cores, 32 GB RAM per solver instance, running
811
+ Ubuntu Linux 18 3.
812
+ 4.2
813
+ The Effect of Non-Refining
814
+ We investigated the effect of non-refining w.r.t. the path con-
815
+ sistency constraints in SAT-based solvers. The comparison of
816
+ 3To
817
+ provide
818
+ reproducibility
819
+ of
820
+ presented
821
+ results
822
+ the
823
+ complete
824
+ source
825
+ code
826
+ of
827
+ NRF-SAT
828
+ is
829
+ available
830
+ on
831
+ https://github.com/surynek/boOX.
832
+ the SMT-CBS and NRF-SAT solvers in terms of the number
833
+ of clauses being generated along the entire solving process is
834
+ shown in Figure 8 (this comparison is not relevant for Lazy-
835
+ CBS, hence it is not included in the test).
836
+ The table shows the median number of clauses being gen-
837
+ erated by SMT-CBS for specific map and selected number of
838
+ agents and the number of clauses generated by NRF-SAT for
839
+ the same instance. In this test, small to medium sized maps
840
+ have been used:
841
+ empty-16-16, random-32-32-10,
842
+ and room-64-64-16.
843
+ We can observe that NRF-SAT generates significantly
844
+ fewer clauses than SMT-CBS. This trend is even more pro-
845
+ nounced as the number of agents increases. Order of mag-
846
+ nitude fewer clauses are generated by NRF-SAT for 60 and
847
+ more agents on the presented benchmarks.
848
+ The explanation of this result that path consistency con-
849
+ straints encompass many at-most-one constraints that yields
850
+ many clauses in most of its SAT representations [Nguyen and
851
+ Mai, 2015].
852
+ We also report the total number of abstraction refinements
853
+ for the same set of instances as reported for the number of
854
+ clauses in Figure 8. Surprisingly non-refining often leads to
855
+ a significant reduction of the number of abstraction refine-
856
+ ments. Although this not a rule as sometimes increase in the
857
+ number of abstractions in contrast to SMT-CBS can be ob-
858
+ served in NRF-SAT, the reduction prevails.
859
+ One reason of this difference is that the choice of final
860
+ paths is done by the SAT solver in SMT-CBS while in NRF-
861
+ SAT the final choice is made by the path-processing proce-
862
+ dure that extracts paths from DAGs in a fixed order which
863
+ seems to be more suitable for abstraction refinements.
864
+ In addition to this, we tested the impact of leaving the ab-
865
+ straction non-refined on the overall performance of the SAT-
866
+ based MAPF solver. Runtime results comparing SMT-CBS
867
+ and NRF-SAT on the same set of maps: empty-16-16,
868
+ random-32-32-10, and room-64-64-16 is shown in
869
+ Figure 7.
870
+ The runtime results are presented using cactus plots often
871
+ used to present the results of SAT competitions [Balyo et al.,
872
+ 2017], that is runtimes for all instances are sorted so the x-th
873
+ result along the horizontal axis represents the runtime for the
874
+ x-th fastest solved instance by the given MAPF solver. The
875
+ lower plot for the solver means better performance.
876
+ Instances
877
+ with
878
+ up
879
+ to
880
+ approximately
881
+ 70
882
+ agents
883
+ for
884
+ empty-16-16, 110 agents for random-32-32-10, and
885
+ 60 agents for room-64-64-16 were solved by the solvers
886
+ in the given time limit.
887
+ SMT-CBS solved 1564, 2120,
888
+ and 1152 and NRF-SAT solved 1633, 2266, and 1203
889
+ in total for empty-16-16, random-32-32-10, and
890
+ room-64-64-16 respectively, that is, significantly more
891
+ instances for NRF-SAT. It need to be taken into account that
892
+ the instances that were additionally solved by the NRF-SAT
893
+ solver rank among the difficult ones.
894
+ We can observe in Figure 7 that NRF-SAT dominates in
895
+ harder instances while in easier instances SMT-CBS is some-
896
+ times better (most prominently on empty-16-16).
897
+ The explanation for the better performance of NRF-SAT
898
+ is twofold. First, it generates significantly smaller formulae
899
+ across entire abstraction refinement process hence the pro-
900
+
901
+ 0,01
902
+ 0,1
903
+ 1
904
+ 10
905
+ 100
906
+ 1000
907
+ 0
908
+ 200
909
+ 400
910
+ 600
911
+ 800 1000 1200 1400
912
+ Runtime (seconds)
913
+ Instance
914
+ Runtime | empty-16-16
915
+ NRF-SAT
916
+ SMT-CBS
917
+ 0,01
918
+ 0,1
919
+ 1
920
+ 10
921
+ 100
922
+ 1000
923
+ 0
924
+ 250
925
+ 500
926
+ 750
927
+ 1000 1250 1500 1750 2000
928
+ Runtime (seconds)
929
+ Instance
930
+ Runtime| random-32-32-10
931
+ NRF-SAT
932
+ SMT-CBS
933
+ 0,01
934
+ 0,1
935
+ 1
936
+ 10
937
+ 100
938
+ 1000
939
+ 0
940
+ 200
941
+ 400
942
+ 600
943
+ 800
944
+ 1000
945
+ Runtime (seconds)
946
+ Instance
947
+ Runtime | room-64-64-16
948
+ NRF-SAT
949
+ SMT-CBS
950
+ Figure 7: Runtime comparison of two SAT-based MAPF solvers NRF-SAT and SMT-CBS. Cactus plots of runtimes for the solvers are shown
951
+ (lower plot means better performance).
952
+ Refinements|clauses
953
+ SMT-CBS
954
+ NRF-SAT
955
+ empty-16-16
956
+ random-32-32-10
957
+ room-64-64-16
958
+ Number of agents
959
+ 10
960
+ 2
961
+ 2
962
+ 1.397
963
+ 468
964
+ 1
965
+ 2
966
+ 6.018
967
+ 1.459
968
+ 2
969
+ 2
970
+ 6.380
971
+ 1.905
972
+ 20
973
+ 2
974
+ 2
975
+ 2.571
976
+ 919
977
+ 10
978
+ 6
979
+ 44.690
980
+ 8.560
981
+ 3
982
+ 2
983
+ 14.348
984
+ 4.445
985
+ 30
986
+ 22
987
+ 17
988
+ 46.412
989
+ 8.239
990
+ 18
991
+ 14
992
+ 63.672
993
+ 12.564
994
+ 8
995
+ 7
996
+ 273.997
997
+ 40.489
998
+ 40
999
+ 23
1000
+ 22
1001
+ 271.103
1002
+ 36.146
1003
+ 9
1004
+ 10
1005
+ 81.869
1006
+ 16.327
1007
+ 8
1008
+ 8
1009
+ 349.156
1010
+ 52.137
1011
+ 50
1012
+ 24
1013
+ 22
1014
+ 510.689
1015
+ 65.999
1016
+ 17
1017
+ 15
1018
+ 1.373.944
1019
+ 162.590
1020
+ 14
1021
+ 14
1022
+ 3.644.645
1023
+ 384.442
1024
+ 60
1025
+ 44
1026
+ 32
1027
+ 4.042.490
1028
+ 491.733
1029
+ 42
1030
+ 32
1031
+ 14.094.029
1032
+ 1.498.631
1033
+ 54
1034
+ 45
1035
+ 17.694.257
1036
+ 1.697.465
1037
+
1038
+ Figure 8: The total number of clauses and refinements of SAT-based
1039
+ solvers SMT-CBS and NRF-SAT.
1040
+ cessing time itself is shorter. Second, the resulting formula
1041
+ with omitted path consistency constraints is easier to solve by
1042
+ the SAT solver which coupled with the fact the total number
1043
+ of abstraction refinements tends to be smaller in NRF-SAT
1044
+ leads to overall better performance.
1045
+ 4.3
1046
+ Competitive Comparison
1047
+ The competitive comparison of NRF-SAT and LazyCBS in
1048
+ terms of runtime is shown in Figure 9.
1049
+ This comparison
1050
+ is focused on benchmarks that were identified by previous
1051
+ studies as those where compilation-based MAPF solvers per-
1052
+ form well [Kaduri et al., 2021]. These benchmarks include
1053
+ those on mazes, city maps, and game maps. The representa-
1054
+ tives we selected for presentation are: maze-32-32-4 (a
1055
+ maze map), ost003d (a game map), Berlin 1 256 (a
1056
+ city map). Additional experiments we made on other maps
1057
+ from these categories yield similar results.
1058
+ Again, the runtime results are presented using cactus
1059
+ plots. The summary of the results is that LazyCBS solved
1060
+ 527, 1193, and 1599 while NRF-SAT solved 582, 1335,
1061
+ and 2321 in total for maze-32-32-4, ost003d, and
1062
+ Berlin 1 256 respectively, that is NRF-SAT solver signif-
1063
+ icantly more instances where again these extra instances rank
1064
+ among difficult ones.
1065
+ Close look at the results reveals that the general trend is
1066
+ that LazyCBS has slightly sharper increase in runtimes as in-
1067
+ stances are getting harder. This results in reaching the time-
1068
+ out by LazyCBS sooner while NRF-SAT can still solve the
1069
+ instances within the time limit. The advantage of NRF-SAT
1070
+ tends to be more significant as the size of the map grows
1071
+ which is surprising for the SAT-based MAPF solvers that are
1072
+ notorious to struggle on large maps.
1073
+ The explanation for the better performance of NRF-SAT
1074
+ on the presented benchmarks is that non-refining in the CE-
1075
+ GAR architecture is especially helpful when dealing with
1076
+ large maps where it leads to significantly smaller formulae
1077
+ than in previous SAT-based solvers. Moreover this combined
1078
+ with the rest of the CEGAR architecture leads to a competi-
1079
+ tive solver.
1080
+ There are many other benchmarks where LazyCBS per-
1081
+ forms significantly better than NRF-SAT. Hence we do not
1082
+ claim that NRF-SAT is state-of-the-art solver for MAPF.
1083
+ However, as we report, there are several important domains
1084
+ where NRF-SAT achieves competitive performance which
1085
+ shows the importance of non-refined abstractions. Moreover,
1086
+ it is needed to take into account that NRF-SAT is in fact a
1087
+ vanilla solver for MAPF with no specific MAPF techniques
1088
+ such as symmetry breaking [Li et al., 2020a] or rectangle rea-
1089
+ soning [Li et al., 2019] being used. Hence there is a potential
1090
+ that the SAT-based MAPF solvers can return among top per-
1091
+ forming MAPF solvers at least in certain domains and the
1092
+ CEGAR architecture with non-refined abstractions can con-
1093
+ tribute to this.
1094
+ 5
1095
+ Conclusion
1096
+ We proposed a novel solver called NRF-SAT for MAPF based
1097
+ on the CEGAR architecture and Boolean satisfiability that
1098
+ uses non-refined abstraction during the solving process.
1099
+ Unlike previous uses of CEGAR in MAPF we not only
1100
+ eliminate conflicts between agents via abstraction refine-
1101
+ ments but we also further strengthen the initial abstraction.
1102
+ Particularly our new solver NRF-SAT omits large group of
1103
+ constraints in the initial abstraction and never makes refine-
1104
+ ments with respect to them which as we show can be miti-
1105
+ gated by a fast post-processing step.
1106
+ From a broader perspective, we not only apply the CEGAR
1107
+ architecture with non-refined abstractions for compilation-
1108
+ based MAPF solving but we also generalize the architecture
1109
+ itself. This generalization consists in finding a solution of a
1110
+
1111
+ 0,001
1112
+ 0,01
1113
+ 0,1
1114
+ 1
1115
+ 10
1116
+ 100
1117
+ 1000
1118
+ 0
1119
+ 100
1120
+ 200
1121
+ 300
1122
+ 400
1123
+ Runtime (seconds)
1124
+ Instance
1125
+ Runtime | maze-32-32-4
1126
+ NRF-SAT
1127
+ LazyCBS
1128
+ 0,01
1129
+ 0,1
1130
+ 1
1131
+ 10
1132
+ 100
1133
+ 1000
1134
+ 0
1135
+ 200
1136
+ 400
1137
+ 600
1138
+ 800 1000 1200 1400
1139
+ Runtime (seconds)
1140
+ Instance
1141
+ Runtime | ost003d
1142
+ NRF-SAT
1143
+ LazyCBS
1144
+ 0,01
1145
+ 0,1
1146
+ 1
1147
+ 10
1148
+ 100
1149
+ 1000
1150
+ 0
1151
+ 250
1152
+ 500
1153
+ 750 1000 1250 1500 1750 2000 2250
1154
+ Runtime (seconds)
1155
+ Instance
1156
+ Runtime | Berlin_1_256
1157
+ NRF-SAT
1158
+ LazyCBS
1159
+ Figure 9: Runtime comparison between NRF-SAT and LazyCBS. Cactus plots of runtimes for the solvers are shown (lower plot is better).
1160
+ different, more general task, than is the original one using the
1161
+ target formalism, rather than finding a solution of the original
1162
+ task using the target formalism directly.
1163
+ Acknowledgments
1164
+ This research has been supported by GA ˇCR - the Czech Sci-
1165
+ ence Foundation, grant registration number 22-31346S.
1166
+ References
1167
+ [Andersen et al., 2007] Henrik Reif Andersen, Tarik Hadzic,
1168
+ John N. Hooker, and Peter Tiedemann. A constraint store
1169
+ based on multivalued decision diagrams.
1170
+ In Principles
1171
+ and Practice of Constraint Programming - CP 2007, Pro-
1172
+ ceedings, volume 4741 of LNCS, pages 118–132. Springer,
1173
+ 2007.
1174
+ [Andreychuk et al., 2019] Anton Andreychuk, Konstantin S.
1175
+ Yakovlev, Dor Atzmon, and Roni Stern.
1176
+ Multi-agent
1177
+ pathfinding with continuous time. In Proceedings of the
1178
+ Twenty-Eighth International Joint Conference on Artificial
1179
+ Intelligence, IJCAI 2019, pages 39–45. ijcai.org, 2019.
1180
+ [Atzmon et al., 2019] Dor Atzmon, Amit Diei, and Daniel
1181
+ Rave.
1182
+ Multi-train path finding.
1183
+ In Pavel Surynek and
1184
+ William Yeoh, editors, Proceedings of the Twelfth Interna-
1185
+ tional Symposium on Combinatorial Search, SOCS 2019,
1186
+ Napa, California, 16-17 July 2019, pages 125–129. AAAI
1187
+ Press, 2019.
1188
+ [Audemard and Simon, 2009] Gilles Audemard and Laurent
1189
+ Simon. Predicting learnt clauses quality in modern SAT
1190
+ solvers. In Craig Boutilier, editor, IJCAI 2009, Proceed-
1191
+ ings of the 21st International Joint Conference on Artifi-
1192
+ cial Intelligence, Pasadena, California, USA, July 11-17,
1193
+ 2009, pages 399–404, 2009.
1194
+ [Audemard and Simon, 2018] Gilles Audemard and Laurent
1195
+ Simon. On the glucose SAT solver. Int. J. Artif. Intell.
1196
+ Tools, 27(1):1840001:1–1840001:25, 2018.
1197
+ [Bailleux and Boufkhad, 2003] Olivier Bailleux and Yacine
1198
+ Boufkhad. Efficient CNF encoding of boolean cardinal-
1199
+ ity constraints. In Francesca Rossi, editor, Principles and
1200
+ Practice of Constraint Programming - CP 2003, 9th Inter-
1201
+ national Conference, CP 2003, Kinsale, Ireland, Septem-
1202
+ ber 29 - October 3, 2003, Proceedings, volume 2833
1203
+ of Lecture Notes in Computer Science, pages 108–122.
1204
+ Springer, 2003.
1205
+ [Balyo et al., 2017] Tom´as Balyo, Marijn J. H. Heule, and
1206
+ Matti J¨arvisalo. SAT competition 2016: Recent develop-
1207
+ ments. In Proceedings of the Thirty-First AAAI Conference
1208
+ on Artificial Intelligence, February 4-9, 2017, San Fran-
1209
+ cisco, California, USA, pages 5061–5063. AAAI Press,
1210
+ 2017.
1211
+ [Biere et al., 2021] A. Biere, M. Heule, and H. van Maaren.
1212
+ Handbook of Satisfiability: Second Edition. Frontiers in
1213
+ Artificial Intelligence and Applications. IOS Press, 2021.
1214
+ [Bonnet et al., 2018] ´Edouard Bonnet, Tillmann Miltzow,
1215
+ and Pawel Rzazewski. Complexity of token swapping and
1216
+ its variants. Algorithmica, 80(9):2656–2682, 2018.
1217
+ [Chen, 2010] Jingchao Chen. A new sat encoding of the at-
1218
+ most-one constraint. In Proceedings of the Tenth Interna-
1219
+ tional Workshop of Constraint Modelling and Reformula-
1220
+ tion, 2010.
1221
+ [Chud´y et al., 2020] J´an Chud´y, Nestor Popov, and Pavel
1222
+ Surynek.
1223
+ Deployment of multi-agent pathfinding on a
1224
+ swarm of physical robots centralized control via reflex-
1225
+ based behavior. In Proceedings of the International Con-
1226
+ ference on Robotics, Computer Vision and Intelligent Sys-
1227
+ tems, ROBOVIS 2020, Budapest, Hungary, November 4-6,
1228
+ 2020, pages 28–38. SCITEPRESS, 2020.
1229
+ [Clarke et al., 2000] Edmund
1230
+ M.
1231
+ Clarke,
1232
+ Orna
1233
+ Grum-
1234
+ berg,
1235
+ Somesh
1236
+ Jha,
1237
+ Yuan
1238
+ Lu,
1239
+ and
1240
+ Helmut
1241
+ Veith.
1242
+ Counterexample-guided abstraction refinement. In Com-
1243
+ puter Aided Verification, 12th International Conference,
1244
+ CAV 2000, Proceedings, volume 1855 of LNCS, pages
1245
+ 154–169. Springer, 2000.
1246
+ [Clarke, 2003] Edmund M. Clarke. Sat-based counterexam-
1247
+ ple guided abstraction refinement in model checking. In
1248
+ Automated Deduction - CADE-19, 19th International Con-
1249
+ ference on Automated Deduction, Proceedings, volume
1250
+ 2741 of LNCS, page 1. Springer, 2003.
1251
+ [Dechter, 2003] Rina Dechter. Constraint processing. Else-
1252
+ vier Morgan Kaufmann, 2003.
1253
+ [Felner et al., 2017] Ariel Felner, Roni Stern, Solomon Eyal
1254
+ Shimony, Eli Boyarski, Meir Goldenberg, Guni Sharon,
1255
+
1256
+ 慧1Nathan R. Sturtevant, Glenn Wagner, and Pavel Surynek.
1257
+ Search-based optimal solvers for the multi-agent pathfind-
1258
+ ing problem: Summary and challenges. In Proceedings
1259
+ of the Tenth International Symposium on Combinatorial
1260
+ Search, SOCS 2017, pages 29–37. AAAI Press, 2017.
1261
+ [Froleyks et al., 2021] Nils Froleyks, Marijn Heule, Markus
1262
+ Iser, Matti J¨arvisalo, and Martin Suda. SAT competition
1263
+ 2020. Artif. Intell., 301:103572, 2021.
1264
+ [Gange et al., 2019] Graeme Gange, Daniel Harabor, and
1265
+ Peter J. Stuckey.
1266
+ Lazy CBS: implicit conflict-based
1267
+ search using lazy clause generation.
1268
+ In Proceedings of
1269
+ the Twenty-Ninth International Conference on Automated
1270
+ Planning and Scheduling, ICAPS 2018, pages 155–162.
1271
+ AAAI Press, 2019.
1272
+ [Ghallab et al., 2004] Malik Ghallab, Dana S. Nau, and
1273
+ Paolo Traverso. Automated planning - theory and prac-
1274
+ tice. Elsevier, 2004.
1275
+ [Gharbi et al., 2009] Mokhtar Gharbi,
1276
+ Juan Cort´es,
1277
+ and
1278
+ Thierry Sim´eon. Roadmap composition for multi-arm sys-
1279
+ tems path planning. In 2009 IEEE/RSJ International Con-
1280
+ ference on Intelligent Robots and Systems, October 11-15,
1281
+ 2009, St. Louis, MO, USA, pages 2471–2476. IEEE, 2009.
1282
+ [Ho et al., 2019] Florence Ho, Ana Salta, R´uben Geraldes,
1283
+ Artur Goncalves, Marc Cavazza, and Helmut Prendinger.
1284
+ Multi-agent path finding for UAV traffic management. In
1285
+ Proceedings of the 18th International Conference on Au-
1286
+ tonomous Agents and MultiAgent Systems, AAMAS ’19,
1287
+ Montreal, QC, Canada, May 13-17, 2019, pages 131–
1288
+ 139. International Foundation for Autonomous Agents and
1289
+ Multiagent Systems, 2019.
1290
+ [Kaduri et al., 2021] Omri Kaduri, Eli Boyarski, and Roni
1291
+ Stern.
1292
+ Experimental evaluation of classical multi agent
1293
+ path finding algorithms. In Hang Ma and Ivan Serina, ed-
1294
+ itors, Proceedings of the Fourteenth International Sympo-
1295
+ sium on Combinatorial Search, SOCS 2021, Virtual Con-
1296
+ ference [Jinan, China], July 26-30, 2021, pages 126–130.
1297
+ AAAI Press, 2021.
1298
+ [Kautz and Selman, 1992] Henry A. Kautz and Bart Selman.
1299
+ Planning as satisfiability. In 10th European Conference
1300
+ on Artificial Intelligence, ECAI, 1992. Proceedings, pages
1301
+ 359–363. John Wiley and Sons, 1992.
1302
+ [Kautz and Selman, 1999] Henry A. Kautz and Bart Selman.
1303
+ Unifying sat-based and graph-based planning. In Proceed-
1304
+ ings of the Sixteenth International Joint Conference on
1305
+ Artificial Intelligence, IJCAI 99, pages 318–325. Morgan
1306
+ Kaufmann, 1999.
1307
+ [Kornhauser et al., 1984] Daniel
1308
+ Kornhauser,
1309
+ Gary
1310
+ L.
1311
+ Miller, and Paul G. Spirakis. Coordinating pebble motion
1312
+ on graphs, the diameter of permutation groups, and
1313
+ applications. In 25th Annual Symposium on Foundations
1314
+ of Computer Science, West Palm Beach, Florida, USA,
1315
+ 24-26 October 1984, pages 241–250. IEEE Computer
1316
+ Society, 1984.
1317
+ [Lam et al., 2019] Edward
1318
+ Lam,
1319
+ Pierre
1320
+ Le
1321
+ Bodic,
1322
+ Daniel Damir Harabor, and Peter J. Stuckey. Branch-and-
1323
+ cut-and-price for multi-agent pathfinding. In Proceedings
1324
+ of the Twenty-Eighth International Joint Conference on
1325
+ Artificial Intelligence, IJCAI 2019, pages 1289–1296.
1326
+ ijcai.org, 2019.
1327
+ [Li et al., 2019] Jiaoyang Li, Ariel Felner, Eli Boyarski,
1328
+ Hang Ma, and Sven Koenig. Improved heuristics for multi-
1329
+ agent path finding with conflict-based search. In Proceed-
1330
+ ings of the Twenty-Eighth International Joint Conference
1331
+ on Artificial Intelligence, IJCAI 2019, Macao, China, Au-
1332
+ gust 10-16, 2019, pages 442–449. ijcai.org, 2019.
1333
+ [Li et al., 2020a] Jiaoyang Li, Graeme Gange, Daniel Hara-
1334
+ bor, Peter J. Stuckey, Hang Ma, and Sven Koenig. New
1335
+ techniques for pairwise symmetry breaking in multi-agent
1336
+ path finding.
1337
+ In Proceedings of the Thirtieth Interna-
1338
+ tional Conference on Automated Planning and Schedul-
1339
+ ing, Nancy, France, October 26-30, 2020, pages 193–201.
1340
+ AAAI Press, 2020.
1341
+ [Li et al., 2020b] Jiaoyang Li, Andrew Tinka, Scott Kiesel,
1342
+ Joseph W. Durham, T. K. Satish Kumar, and Sven Koenig.
1343
+ Lifelong multi-agent path finding in large-scale ware-
1344
+ houses. In Proceedings of the 19th International Confer-
1345
+ ence on Autonomous Agents and Multiagent Systems, AA-
1346
+ MAS ’20, pages 1898–1900. International Foundation for
1347
+ Autonomous Agents and Multiagent Systems, 2020.
1348
+ [Ma et al., 2017] Hang Ma, Sven Koenig, Nora Ayanian,
1349
+ Liron Cohen, Wolfgang H¨onig, T. K. Satish Kumar,
1350
+ Tansel Uras, Hong Xu, Craig A. Tovey, and Guni Sharon.
1351
+ Overview: Generalizations of multi-agent path finding to
1352
+ real-world scenarios. CoRR, abs/1702.05515, 2017.
1353
+ [Nery et al., 2017] Alexandre
1354
+ Solon
1355
+ Nery,
1356
+ Alexandre
1357
+ da Costa Sena, and Leandro S. Guedes.
1358
+ Efficient
1359
+ pathfinding co-processors for fpgas. In 2017 International
1360
+ Symposium on Computer Architecture and High Perfor-
1361
+ mance Computing Workshops, SBAC-PAD Workshops,
1362
+ Campinas, Brazil, October 17-20, 2017, pages 97–102.
1363
+ IEEE Computer Society, 2017.
1364
+ [Nguyen and Mai, 2015] Van-Hau Nguyen and Son Thai
1365
+ Mai. A new method to encode the at-most-one constraint
1366
+ into SAT. In Proceedings of the Sixth International Sympo-
1367
+ sium on Information and Communication Technology, Hue
1368
+ City, Vietnam, December 3-4, 2015, pages 46–53. ACM,
1369
+ 2015.
1370
+ [Rader, 2010] D.J. Rader.
1371
+ Deterministic Operations Re-
1372
+ search: Models and Methods in Linear Optimization. Wi-
1373
+ ley, 2010.
1374
+ [Ratner and Warmuth, 1986] Daniel Ratner and Manfred K.
1375
+ Warmuth. Finding a shortest solution for the N x N ex-
1376
+ tension of the 15-puzzle is intractable.
1377
+ In Proceedings
1378
+ of the 5th National Conference on Artificial Intelligence.
1379
+ Philadelphia, PA, USA, August 11-15, 1986. Volume 1:
1380
+ Science, pages 168–172. Morgan Kaufmann, 1986.
1381
+ [Ratner and Warmuth, 1990] Daniel Ratner and Manfred K.
1382
+ Warmuth. Nxn puzzle and related relocation problem. J.
1383
+ Symb. Comput., 10(2):111–138, 1990.
1384
+ [Ryan, 2008] Malcolm Ross Kinsella Ryan. Exploiting sub-
1385
+ graph structure in multi-robot path planning. J. Artif. In-
1386
+ tell. Res., 31:497–542, 2008.
1387
+
1388
+ [Ryan, 2010] Malcolm Ryan. Constraint-based multi-robot
1389
+ path planning.
1390
+ In IEEE International Conference on
1391
+ Robotics and Automation, ICRA 2010, pages 922–928.
1392
+ IEEE, 2010.
1393
+ [Sharon et al., 2013] Guni Sharon, Roni Stern, Meir Golden-
1394
+ berg, and Ariel Felner. The increasing cost tree search for
1395
+ optimal multi-agent pathfinding. Artif. Intell., 195:470–
1396
+ 495, 2013.
1397
+ [Sharon et al., 2015] Guni Sharon, Roni Stern, Ariel Felner,
1398
+ and Nathan R. Sturtevant. Conflict-based search for op-
1399
+ timal multi-agent pathfinding.
1400
+ Artif. Intell., 219:40–66,
1401
+ 2015.
1402
+ [Sigurdson et al., 2018] Devon Sigurdson, Vadim Bulitko,
1403
+ William Yeoh, Carlos Hern´andez, and Sven Koenig.
1404
+ Multi-agent pathfinding with real-time heuristic search. In
1405
+ 2018 IEEE Conference on Computational Intelligence and
1406
+ Games, CIG 2018, Maastricht, The Netherlands, August
1407
+ 14-17, 2018, pages 1–8. IEEE, 2018.
1408
+ [Silva and Lynce, 2007] Jo˜ao P. Marques Silva and Inˆes
1409
+ Lynce.
1410
+ Towards robust CNF encodings of cardinality
1411
+ constraints. In Christian Bessiere, editor, Principles and
1412
+ Practice of Constraint Programming - CP 2007, 13th In-
1413
+ ternational Conference, CP 2007, Providence, RI, USA,
1414
+ September 23-27, 2007, Proceedings, volume 4741 of Lec-
1415
+ ture Notes in Computer Science, pages 483–497. Springer,
1416
+ 2007.
1417
+ [Silver, 2005] David Silver. Cooperative pathfinding. In Pro-
1418
+ ceedings of the First Artificial Intelligence and Interactive
1419
+ Digital Entertainment Conference, pages 117–122. AAAI
1420
+ Press, 2005.
1421
+ [Stern, 2019] Roni Stern.
1422
+ Multi-agent path finding - an
1423
+ overview.
1424
+ In Artificial Intelligence - 5th RAAI Summer
1425
+ School, Russia, 2019, Tutorial Lectures, volume 11866 of
1426
+ LNCS, pages 96–115. Springer, 2019.
1427
+ [Stuckey, 2010] Peter J. Stuckey.
1428
+ Lazy clause generation:
1429
+ Combining the power of SAT and CP (and mip?) solving.
1430
+ In Integration of AI and OR Techniques in Constraint Pro-
1431
+ gramming for Combinatorial Optimization Problems, 7th
1432
+ International Conference, CPAIOR 2010, Bologna, Italy,
1433
+ June 14-18, 2010. Proceedings, volume 6140 of Lecture
1434
+ Notes in Computer Science, pages 5–9. Springer, 2010.
1435
+ [Sturtevant, 2012] Nathan R. Sturtevant.
1436
+ Benchmarks for
1437
+ grid-based pathfinding.
1438
+ IEEE Trans. Comput. Intell. AI
1439
+ Games, 4(2):144–148, 2012.
1440
+ [Surynek et al., 2016] Pavel Surynek, Ariel Felner, Roni
1441
+ Stern, and Eli Boyarski. Efficient SAT approach to multi-
1442
+ agent path finding under the sum of costs objective. In
1443
+ ECAI 2016 - 22nd European Conference on Artificial In-
1444
+ telligence, volume 285 of Frontiers in Artificial Intelli-
1445
+ gence and Applications, pages 810–818. IOS Press, 2016.
1446
+ [Surynek, 2009] Pavel Surynek. A novel approach to path
1447
+ planning for multiple robots in bi-connected graphs. In
1448
+ 2009 IEEE International Conference on Robotics and Au-
1449
+ tomation, ICRA 2009, Kobe, Japan, May 12-17, 2009,
1450
+ pages 3613–3619. IEEE, 2009.
1451
+ [Surynek, 2012] Pavel Surynek. On propositional encodings
1452
+ of cooperative path-finding. In IEEE 24th International
1453
+ Conference on Tools with Artificial Intelligence, ICTAI
1454
+ 2012, pages 524–531. IEEE Computer Society, 2012.
1455
+ [Surynek, 2017] Pavel Surynek.
1456
+ Time-expanded graph-
1457
+ based propositional encodings for makespan-optimal solv-
1458
+ ing of cooperative path finding problems. Ann. Math. Artif.
1459
+ Intell., 81(3-4):329–375, 2017.
1460
+ [Surynek, 2019] Pavel Surynek. Unifying search-based and
1461
+ compilation-based approaches to multi-agent path finding
1462
+ through satisfiability modulo theories. In Sarit Kraus, ed-
1463
+ itor, Proceedings of the Twenty-Eighth International Joint
1464
+ Conference on Artificial Intelligence, IJCAI 2019, pages
1465
+ 1177–1183. ijcai.org, 2019.
1466
+ [Wagner and Choset, 2011] Glenn
1467
+ Wagner
1468
+ and
1469
+ Howie
1470
+ Choset.
1471
+ M*:
1472
+ A complete multirobot path planning
1473
+ algorithm with performance bounds.
1474
+ In Proceedings of
1475
+ (IROS) IEEE/RSJ International Conference on Intelligent
1476
+ Robots and Systems, pages 3260 – 3267, September 2011.
1477
+ [Walsh, 2000] Toby Walsh. SAT v CSP. In Principles and
1478
+ Practice of Constraint Programming - CP 2000, 6th Inter-
1479
+ national Conference, Proceedings, volume 1894 of LNCS,
1480
+ pages 441–456. Springer, 2000.
1481
+ [Wang and Botea, 2011] Ko-Hsin Cindy Wang and Adi
1482
+ Botea. MAPP: a scalable multi-agent path planning al-
1483
+ gorithm with tractability and completeness guarantees. J.
1484
+ Artif. Intell. Res., 42:55–90, 2011.
1485
+ [Wen et al., 2022] Licheng Wen, Yong Liu, and Hongliang
1486
+ Li. CL-MAPF: multi-agent path finding for car-like robots
1487
+ with kinematic and spatiotemporal constraints. Robotics
1488
+ Auton. Syst., 150:103997, 2022.
1489
+ [Yu and LaValle, 2013] Jingjin Yu and Steven M. LaValle.
1490
+ Structure and intractability of optimal multi-robot path
1491
+ planning on graphs. In Proceedings of the Twenty-Seventh
1492
+ AAAI Conference on Artificial Intelligence, July 14-18,
1493
+ 2013, Bellevue, Washington, USA. AAAI Press, 2013.
1494
+
MtFAT4oBgHgl3EQfxh5M/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
N9AzT4oBgHgl3EQfWfwG/content/tmp_files/2301.01300v1.pdf.txt ADDED
@@ -0,0 +1,463 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01300v1 [astro-ph.HE] 3 Jan 2023
2
+ MNRAS 000, 1–4 (2022)
3
+ Preprint 5 January 2023
4
+ Compiled using MNRAS LATEX style file v3.0
5
+ Tidal capture of stars by supermassive black holes: implications for
6
+ periodic nuclear transients and quasi-periodic eruptions
7
+ M. Cufari1★, C. J. Nixon2,3, and Eric R. Coughlin1
8
+ 1 Department of Physics, Syracuse University, Syracuse, NY 13244, USA
9
+ 2 School of Physics and Astronomy, University of Leicester, Leicester LE1 7RH, UK
10
+ 3 School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT, UK
11
+ Accepted XXX. Received YYY; in original form ZZZ
12
+ ABSTRACT
13
+ Stars that plunge into the center of a galaxy are tidally perturbed by a supermassive black hole (SMBH), with closer encounters
14
+ resulting in larger perturbations. Exciting these tides comes at the expense of the star’s orbital energy, which leads to the naive
15
+ conclusion that a smaller pericenter (i.e., a closer encounter between the star and SMBH) always yields a more tightly bound
16
+ star to the SMBH. However, once the pericenter distance is small enough that the star is partially disrupted, morphological
17
+ asymmetries in the mass lost by the star can yield an increase in the orbital energy of the surviving core, resulting in its ejection
18
+ – not capture – by the SMBH. Using smoothed-particle hydrodynamics simulations, we show that the combination of these two
19
+ effects – tidal excitation and asymmetric mass loss – result in a maximum amount of energy lost through tides of ∼ 2.5% of
20
+ the binding energy of the star, which is significantly smaller than the theoretical maximum of the total stellar binding energy.
21
+ This result implies that stars that are repeatedly partially disrupted by SMBHs many (≳ 10) times on short-period orbits (≲ few
22
+ years), as has been invoked to explain the periodic nuclear transient ASASSN-14ko and quasi-periodic eruptions, must be bound
23
+ to the SMBH through a mechanism other than tidal capture, such as a dynamical exchange (i.e., Hills capture).
24
+ Key words: hydrodynamics — black holes — galaxies: nuclei
25
+ 1 INTRODUCTION
26
+ Binary stars may form when two field (i.e., individual) stars pass
27
+ close to one another on nearly parabolic trajectories. As the stars
28
+ pass, tidal oscillatory modes are excited in the stars at the expense
29
+ of the stars’ orbital energy. If the encounter is sufficiently close, the
30
+ tides dissipate enough orbital energy to bind the stars to one another
31
+ (Fabian et al. 1975; Press & Teukolsky 1977).
32
+ A star may also be scattered into the region of parameter space,
33
+ known as the “loss-cone,” that brings the star’s distance of clos-
34
+ est approach very near a supermassive black hole in the nucleus of
35
+ a galaxy (SMBH; Frank & Rees 1976; Lightman & Shapiro 1977;
36
+ Cohn & Kulsrud 1978). Reasoning analogously to the binary for-
37
+ mation scenario, one is tempted to conclude that stellar orbits with
38
+ distances of closest approach nearer the black hole are more strongly
39
+ tidally perturbed by, and thus more tightly bound to, the SMBH.
40
+ However, there is a fundamental upper limit as to how efficient this
41
+ process can be, because tides cannot transfer more energy into oscil-
42
+ lations than the binding energy of the star itself. Additionally, as the
43
+ pericenter distance of the star continues to decrease the perturbative
44
+ tidal limit breaks down, and the star starts to lose a fraction of its outer
45
+ envelope (known as a partial Tidal Disruption Event; TDE). Recent
46
+ simulations have demonstrated that the asymmetric ejection of tidal
47
+ debris in a partial TDE results in the unbinding of the surviving stel-
48
+ lar core from the SMBH (Manukian et al. 2013; Gafton et al. 2015).
49
+ Therefore, the maximum binding energy a star can achieve through
50
+ ★ E-mail:mcufari@syr.edu
51
+ tidal interactions with an SMBH could be substantially smaller than
52
+ the theoretical limit of the star’s own binding energy. This maximum
53
+ binding energy generated through tidal dissipation sets a fundamen-
54
+ tal timescale over which one would expect repeating partial TDEs –
55
+ a star that is bound to a SMBH that is partially destroyed on each
56
+ pericenter passage (e.g., Zalamea et al. 2010; Campana et al. 2015;
57
+ Miniutti et al. 2019; Payne et al. 2021) – to recur if the bound star is
58
+ supplied through tidal dissipation.
59
+ In this paper we present the results of smoothed particle hydrody-
60
+ namics (SPH) simulations of partial TDEs from which we obtain the
61
+ maximum binding energy. In Section 2.1 we describe the setup of the
62
+ simulations, and in Section 2.2 we present the results. In Section 3
63
+ we discuss the implications of our findings in the context of periodic
64
+ nuclear transients (PNTs) and quasi-periodic eruptions (QPEs). We
65
+ summarize and conclude in Section 4.
66
+ 2 SIMULATIONS
67
+ 2.1 Methodology
68
+ We performed simulations of partial TDEs with the SPH code phan-
69
+ tom (Price et al. 2018). The star was modeled as a polytrope with
70
+ a 훾 = 5/3, adiabatic equation of state, with mass 푀★ = 1푀⊙ and
71
+ radius 푅★ = 1푅⊙. In each simulation the star was injected from a
72
+ distance of 12 푟푡, where 푟t = 푅★ (푀•/푀★)1/3, from the SMBH of
73
+ mass 푀• = 106푀⊙ with the center of mass on a parabolic trajectory.
74
+ The impact parameter 훽 ≡ 푟t/푟p, where 푟p is the pericenter distance
75
+ © 2022 The Authors
76
+
77
+ 2
78
+ Cufari, Nixon, & Coughlin
79
+ of the star, was varied between 훽 = 0.4 and 훽 = 0.8 in steps of
80
+ Δ훽 = 0.02. Additional details of the simulation setup can be found in
81
+ Coughlin & Nixon (2015), and the algorithms for, e.g., self-gravity
82
+ can be found in Price et al. (2018).
83
+ We performed simulations with 1.25 × 105, 106 particles and
84
+ 8 × 106 particles, and found very little deviation in the outcome.
85
+ All results presented here are from the 8 × 106 particle runs. For
86
+ the purposes of determining the properties of the surviving star,
87
+ we calculate averages using only those particles that have a density
88
+ greaterthan1%ofthemaximumglobal densitywithin thesimulation,
89
+ 휌max; we define this subset of particles as the core. For example, the
90
+ location of the core is calculated as the the average position of the
91
+ subset of particles that satisfy this criterion, and the distance from the
92
+ SMBH, 푟c, is determined from the Euclidean norm of the position.
93
+ The analogous statement applies to the core velocity and speed, 푣c.
94
+ Over the range of 훽 we simulated this criterion excludes the tidally
95
+ stripped tails, and reducing the fraction to 0.1% does not impact
96
+ the results because the tidal tails have a substantially lower density
97
+ than ∼ 1% of 휌max. Similarly, increasing the fraction to 10% has a
98
+ negligible effect on the results. However, values > 10% can lead to
99
+ significant noise in the results because in this case there are too few
100
+ particles that contribute to the average.
101
+ We run each simulation until the core energy has settled to a
102
+ constant value that we measure for our results. For disruptions with
103
+ 훽 < 0.6, this time is ≲ 1 day after pericenter passage. Simulations
104
+ with 훽 > 0.6 are run up to ∼ 5 days post-pericenter to ensure that the
105
+ energy has converged to a constant value. Running our simulations
106
+ to later times has no affect on our results.
107
+ 2.2 Results
108
+ The left panel of Figure 1 shows the specific orbital energy of the
109
+ core, calculated according to
110
+ 휖c = 1
111
+ 2 푣2
112
+ c − 퐺푀•
113
+ 푟c
114
+ .
115
+ (1)
116
+ For 0.4 ≲ 훽 ≲ 0.62, the orbital energy is negative, implying that the
117
+ surviving core is bound to the SMBH. The global minimum energy
118
+ is ∼ 2 − 3% of the binding energy of the star, i.e.,
119
+ 휖c,min ≃ −0.025퐺푀★
120
+ 푅★
121
+ .
122
+ (2)
123
+ The fact that the star becomes bound to the SMBH following its tidal
124
+ interaction is in agreement with the classical calculations of tidal
125
+ dissipation by Fabian et al. (1975); Press & Teukolsky (1977).
126
+ Conversely, all disruptions with 훽 ≳ 0.62 result in a core with a net
127
+ positive energy following the interaction with the SMBH, indicating
128
+ that the star is on an unbound trajectory. This result agrees with those
129
+ of Manukian et al. (2013); Gafton et al. (2015), who found that the
130
+ “kick” to the star could result in a velocity that is ∼ the escape speed
131
+ of the star for 훽 very close to the value at which complete disruption
132
+ occurs (훽 ≃ 0.9 for a 5/3 polytrope; Guillochon & Ramirez-Ruiz
133
+ 2013; Mainetti et al. 2017). Therefore, if a star reaches a pericenter
134
+ distance with 0.62 ≲ 훽 ≲ 0.9, the star is not tidally captured but is
135
+ instead tidally ejected, never to return to pericenter.
136
+ With the energy-semimajor axis and energy-period relationships
137
+ for a Keplerian orbit, we find that the semimajor axis of the captured
138
+ star (for 훽 ≲ 0.62, i.e., for stars that are not ejected) is
139
+ 푎c = −퐺푀•
140
+ 2휖c
141
+ = 1
142
+ 휂c
143
+ 푅★
144
+ 2
145
+ � 푀•
146
+ 푀★
147
+
148
+ ,
149
+ (3)
150
+ while the orbital period is
151
+ 푇c =
152
+ 2휋퐺푀•
153
+ (−2휖c)3/2 =
154
+ 1
155
+ 휂3/2
156
+ c
157
+ � 푅★
158
+ 2
159
+ �3/2
160
+ 2휋
161
+ √퐺푀★
162
+ � 푀•
163
+ 푀★
164
+
165
+ .
166
+ (4)
167
+ Here we defined the specific orbital energy of the captured star as 휖c =
168
+ −휂c퐺푀★/푅★, where 휂c ≲ 0.025 (from Figure 1). Using 푀•/푀★ =
169
+ 106 in Equation (3), the minimum apocenter distance of the star (with
170
+ 휂c = 0.025) is ∼ 1 pc for 푅★ = 1푅⊙.
171
+ The right panel of Figure 1 shows the orbital period of the captured
172
+ star as a function of 훽 from the simulations and using Equation
173
+ (4). We see that the minimum orbital period of the captured star is
174
+ ∼ 3 × 104 yr. However, because of the strong dependence on 휂c in
175
+ Equation (4), the period can be much larger for only small changes
176
+ in 훽.
177
+ 3 DISCUSSION
178
+ Some current models for PNTs and QPEs suggest that they can be
179
+ produced by stars on bound orbits about SMBHs with periods from
180
+ hours to ∼ 푓 푒푤 years, with the star being partially disrupted and
181
+ feeding an accretion flare every pericenter passage (Miniutti et al.
182
+ 2019; King 2020; Payne et al. 2021; King 2022; Wevers et al. 2022).
183
+ PNTs have been suggested to have system parameters that are com-
184
+ parable to 푀• = 107푀⊙, 푅★ = 1푅⊙, 푀★ = 1푀⊙, which gives, from
185
+ Equation (4) with 휂c = 0.025,
186
+ 푇PNT ≃ 3 × 105 yr,
187
+ (5)
188
+ which is obviously too long to explain the observed periods ≲ 1
189
+ year (Payne et al. 2021; Wevers et al. 2022). Even if one could inject
190
+ the theoretical maximum energy into the star, and thus set 휂c = 1
191
+ in Equation (4), we would obtain 푇PNT ≃ 103 yr. As argued by
192
+ Cufari et al. (2022), even in this overly optimistic scenario, PNTs
193
+ need an additional mechanism to bind the star sufficiently tightly to
194
+ the SMBH to produce their observed periods in situ.
195
+ On the other hand, it is possible that a PNT could initially be
196
+ generated with an orbital period given by Equation (5), but the period
197
+ then decays through gravitational-wave emission (over millions of
198
+ years) to produce a period as short as ∼ 1 year by the time that we
199
+ observe it1. However, a problem with this interpretation is that even
200
+ for the maximum value of 휂c = 0.025, Equation (3) for the semimajor
201
+ axis of the orbit yields an apocenter distance of ∼ 2푎c ∼ 10 pc for
202
+ 푀•/푀★ = 107. Thus, we would expect the star to interact with, and
203
+ be once again perturbed by, the nuclear star cluster, and it seems very
204
+ unlikely that the star will repeatedly return to the same pericenter
205
+ over multiple passages.
206
+ Additionally, while we have assumed that the star is on a parabolic
207
+ orbit, it could have a velocity at infinity that is 푣∞ ≃ 휎, with 휎 the
208
+ galactic velocity dispersion (Miller et al. 2005). From Figure 1, the
209
+ maximum amount of energy able to be dissipated through tides is
210
+ 휖c,max ≃ 0.025퐺푀★
211
+ 푅★
212
+ ≃ 1
213
+ 2
214
+ � 푀★
215
+ 푀⊙
216
+ � � 푅★
217
+ 푅⊙
218
+ �−1 �
219
+ 100 km s−1�2
220
+ .
221
+ (6)
222
+ For a 107푀⊙ SMBH, the velocity dispersion from the 푀 −휎 relation
223
+ is 휎 ∼ 110 km s−1(Marsden et al. 2020). Thus, tides may not actually
224
+ be capable of dissipating the true (positive) energy of the orbit, and
225
+ 1 As pointed out in Payne et al. (2021), the rate of change of the orbital period
226
+ due to gravitational waves is actually too small to explain the observed value
227
+ for ASASSN-14ko, but it should be possible for gravitational waves to shrink
228
+ the orbit in general and for other systems.
229
+ MNRAS 000, 1–4 (2022)
230
+
231
+ On tidal capture for PNTs and QPEs
232
+ 3
233
+ 0.40
234
+ 0.45
235
+ 0.50
236
+ 0.55
237
+ 0.60
238
+ 0.65
239
+ 0.70
240
+ -0.05
241
+ 0.00
242
+ 0.05
243
+ 0.10
244
+ β
245
+ ϵc [GM⊙/R⊙]
246
+ 0.40
247
+ 0.45
248
+ 0.50
249
+ 0.55
250
+ 0.60
251
+ 5×104
252
+ 1×105
253
+ 5×105
254
+ 1×106
255
+ 5×106
256
+ 1×107
257
+ β
258
+ Tc [yrs]
259
+ Figure 1. Left: The energy imparted to the star as a function of the impact parameter 훽. Stars with 휖c < 0 are bound to the black hole. There is a small range of
260
+ 훽 for which mass loss occurs on first pericenter passage (i.e., 훽 > 0.5) and for which 휖c < 0, the necessary condition for a repeating partial disruption to occur.
261
+ Right: the period of the orbit of the star for encounters that yield a captured star as a function of the impact parameter 훽. The minimum period corresponds
262
+ minimum orbital energy (i.e. the maximum binding energy), and for these parameters is > 104 yrs.
263
+ hence binding the star through this mechanism may be impossible in
264
+ the first place.
265
+ QPEs – with periods of the order hours – are typically modeled
266
+ with a ∼ 105푀⊙ SMBH partially disrupting a white dwarf star. For
267
+ such a system, Equation (4) with 푀★ = 0.6푀⊙, 푅★ = 0.011푅⊙
268
+ (Nauenberg 1972), 푀• = 4 × 105푀⊙, and 휂c = 0.025 gives
269
+ 푇QPE ≃ 28 yr,
270
+ (7)
271
+ which shows that it is not possible to bind a star to a SMBH
272
+ through tidal dissipation and immediately reproduce the observed
273
+ orbital periods of QPEs. As for PNTs, it is nonetheless possible that
274
+ gravitational-wave emission shrinks the orbit2 to ∼ hours before we
275
+ detect them. Because the binding energy of a white dwarf is substan-
276
+ tially larger than that of a main sequence star, the minimum apocenter
277
+ distance is correspondingly smaller (from Equation 3), and the max-
278
+ imum imparted energy through tides is substantially larger than the
279
+ energy at infinity. Thus, without further investigation that is outside
280
+ the scope of the present work, we cannot conclusively state whether
281
+ or not an additional mechanism is required for producing the ob-
282
+ served orbital periods in QPEs (under the paradigm that they are
283
+ powered by repeatedly partially disrupted white dwarfs).
284
+ On the other hand, the tidal breakup of a binary star system (i.e.,
285
+ Hills capture; Hills 1975) can bind the star with a substantially shorter
286
+ period (compared to just tidal dissipation) if the binary is sufficiently
287
+ tight. As demonstrated by Cufari et al. (2022), this is a plausible
288
+ explanation for the origin of the ∼ 114 day period of ASASSN-
289
+ 14ko. An additional argument against the gravitational-wave inspiral
290
+ scenario for explaining ASASSN-14ko is that the mass lost by the
291
+ star must be ∼ 1% of the mass of the star to power the emission
292
+ (Cufari et al. 2022), and hence it cannot have survived many (≳ 100
293
+ s) interactions prior to the ∼ 10 that have been observed since the
294
+ initial detection. Similarly, if the white dwarf binary separation is not
295
+ much larger than the radius of the white dwarf itself, then Equation
296
+ (5) from Cufari et al. (2022) with 푎★ = 0.04푅⊙, 푀• = 4 × 105푀⊙,
297
+ and 푀★ = 0.6푀⊙ yields an orbital period of ∼ 8.3 hours for the
298
+ period of the bound star following a Hills-capture event. As also
299
+ suggested in Cufari et al. (2022), it therefore seems plausible that the
300
+ 2 The orbital period may also be reduced through the interaction with a
301
+ pre-existing AGN disc (Syer et al. 1991; Cufari et al. 2022; Lu & Quataert
302
+ 2022).
303
+ periods of QPEs can be generated with a dynamical exchange process
304
+ without the need for additional dissipation through other means.
305
+ 4 SUMMARY AND CONCLUSIONS
306
+ We presented SPH simulations of the interaction between a star and
307
+ an SMBH to determine the maximum degree by which a star can
308
+ be bound to an SMBH through tidal dissipation. Two competing
309
+ mechanisms prevent the star from becoming arbitrarily bound to the
310
+ SMBH. As the distance of closest approach between the star and
311
+ SMBH shrinks, energy from the star’s orbit is expended in exciting
312
+ dynamical tides in the star. However, once the star reaches a dis-
313
+ tance of closest approach comparable to its tidal radius, the star is
314
+ kicked to positive energies as a result of asymmetry in the tidal tails
315
+ that are liberated from the star. The competition between these two
316
+ physical effects results in a minimum possible orbital energy of the
317
+ star following the tidal encounter. For the parameters we simulated
318
+ here, the location of this minimum is at 훽 ∼ 0.55 (pericenter distance
319
+ of 푟t/0.55 with 푟t the usual tidal radius) and the binding energy of
320
+ the orbit is ∼ 2.5% of the star’s binding energy; see Equation (2)
321
+ specifically. This minimum energy is significantly smaller than the
322
+ theoretical maximum, being the entirety of the stellar binding energy.
323
+ In order to produce a repeating partial tidal disruption via a tidal
324
+ dissipation mechanism, the energy kick imparted to the star must be
325
+ negative, otherwise the star will be ejected on a hyperbolic trajec-
326
+ tory. Hence, it would appear that there is a relatively small region of
327
+ parameter space within which the star is only partially destroyed, not
328
+ ejected, and survives for many (≳ 10) pericenter passages, specif-
329
+ ically 0.4 ≲ 훽 ≲ 0.5 for the type of star considered here. Initially
330
+ non-rotating stars in this range of 훽 will be rotating at a nontrivial
331
+ fraction of breakup following the initial interaction, which will move
332
+ the effective tidal radius out (Golightly et al. 2019), but provided that
333
+ the pericenter (effectively unaltered because of the small ratio of the
334
+ maximal angular momentum of the star to the angular momentum of
335
+ the orbit itself) is still within this tidal radius, the star may transfer a
336
+ small amount of mass during each additional pericenter passage. In
337
+ this manner, a star may undergo many cycles of partial disruptions
338
+ before being destroyed or ejected.
339
+ In our simulations we modeled the star as a 5/3 polytrope, which
340
+ is most applicable to low-mass main sequence stars and and low-
341
+ mass white dwarfs. By number, most stars are thought to fall into
342
+ MNRAS 000, 1–4 (2022)
343
+
344
+ 4
345
+ Cufari, Nixon, & Coughlin
346
+ this regime. However, more massive (radiative) stars are consider-
347
+ ably more centrally concentrated than predicted by a 5/3-polytropic
348
+ model. Here we have shown that the minimum energy for the captured
349
+ star – modeled as a 5/3 polytrope – occurs at 훽 ≈ 0.55. This result will
350
+ depend somewhat on the type of star being considered. For example,
351
+ Figure 3 of Manukian et al. (2013) shows that it occurs for 훽 < 1
352
+ when the star is modeled as a 4/3-polytrope and that there is very
353
+ little dependence of the result on the black hole mass. Faber et al.
354
+ (2005) considered the tidal capture of a planet by a star in which the
355
+ mass ratio was 푞 = 0.001, and found a minimum binding energy of
356
+ ∼ 14% of the binding energy of the planet at 훽 = 10/19 ≃ 0.523 (see
357
+ their Table 1). Kremer et al. (2022) also recently considered black
358
+ hole-star systems with mass ratios closer to unity, and found a similar
359
+ effect to the one described here if the mass ratio was 0.02 or 0.05
360
+ if the star was modeled as a 훾 = 5/3 polytrope, but that the star
361
+ was able to go from bound to completely disrupted – without being
362
+ ejected – as the mass ratio increased beyond 0.05 and the star was
363
+ modeled with the Eddington standard model (see their Figure 1). We
364
+ defer an analysis of the minimum orbital energy – and the 훽 at which
365
+ the minimum energy occurs – as a function of the mass ratio and the
366
+ type of star to future work.
367
+ In the context of extreme mass-ratio inspirals, Zalamea et al.
368
+ (2010) demonstrated that a white dwarf (or other compact object)
369
+ completes thousands of large-eccentricity orbits before reaching the
370
+ direct capture radius of the SMBH. However, their model accounts
371
+ only for the orbital decay due to gravitational wave emission and
372
+ omits tidal dissipation and mass loss asymmetry effects. Likewise,
373
+ our simulations omit the effects of orbital decay due to gravitational
374
+ wave emission. The pericenter distance of our simulated disruptions
375
+ is > 50 푟g, so orbital decay due to general relativistic effects (at least
376
+ on the first pericenter passage) is negligible. For more compact stars
377
+ with smaller tidal radii nearer the event horizon, orbital decay due to
378
+ general relativistic effects will be more significant over fewer orbital
379
+ periods (though the change in the pericenter will still be extremely
380
+ small, as all of the dissipation occurs near pericenter for these high-
381
+ eccentricity systems; thus the tidal interaction itself may be relatively
382
+ unaltered, aside from the stronger tidal field of the SMBH due to rel-
383
+ ativistic gravity). Future work on partial TDEs nearer the horizon
384
+ of the SMBH should incorporate the change in orbital energy due
385
+ to tidal interaction and mass loss asymmetry alongside gravitational
386
+ wave emission.
387
+ Finally, here we focused on orbits that produce partial TDEs in
388
+ the traditional sense, i.e., the tidal force is not sufficiently strong
389
+ to destroy the star completely. However, Nixon & Coughlin (2022)
390
+ found that at very high 훽 (in their case 훽 = 16), the compression
391
+ experienced by the star near pericenter could revive self-gravity to
392
+ the point that a core reformed with a binding energy (to the SMBH)
393
+ that was much larger than the value predicted by Equation (2) (though
394
+ we caution that while the mass contained in the core was converged,
395
+ the orbital period – and thus the binding energy – was resolution-
396
+ dependent in their simulations). While encounters with high-훽 are
397
+ rare3, it may be possible for tidal capture in this considerably more
398
+ exotic scenario to produce shorter-period orbits than through the
399
+ traditional means.
400
+ 3 For example, Equation 16 of Coughlin & Nixon (2022) shows that the
401
+ fraction of TDEs with 훽 > 10 for a 106푀⊙ Schwarzschild SMBH – including
402
+ general relativistic effects – is 0.0046; note that this is a factor of ∼ 4 smaller
403
+ than the value derived by ignoring general relativistic effects, given by their
404
+ Equation 17.
405
+ DATA AVAILABILITY STATEMENT
406
+ Code to reproduce the results in this paper is available upon reason-
407
+ able request to the corresponding author.
408
+ ACKNOWLEDGEMENTS
409
+ M.C. acknowledges support from the Syracuse Office of Undergrad-
410
+ uate Research and Creative Engagement (SOURCE). CJN acknowl-
411
+ edges support from the Science and Technology Facilities Coun-
412
+ cil (grant no. ST/W000857/1), and the Leverhulme Trust (grant
413
+ no. RPG-2021-380). E.R.C. acknowledges support from the Na-
414
+ tional Science Foundation through grant no. AST-2006684 and the
415
+ Oakridge Associated Universities through a Ralph E. Powe Junior
416
+ Faculty Enhancement Award. This work was performed using the
417
+ DiRAC Data Intensive service at Leicester, operated by the Uni-
418
+ versity of Leicester IT Services, which forms part of the STFC
419
+ DiRAC HPC Facility (www.dirac.ac.uk). The equipment was funded
420
+ by BEIS capital funding via STFC capital grants ST/K000373/1 and
421
+ ST/R002363/1 and STFC DiRAC Operations grant ST/R001014/1.
422
+ DiRAC is part of the National e-Infrastructure.
423
+ REFERENCES
424
+ Campana S., Mainetti D., Colpi M., Lodato G., D’Avanzo P., Evans P. A.,
425
+ Moretti A., 2015, A&A, 581, A17
426
+ Cohn H., Kulsrud R. M., 1978, ApJ, 226, 1087
427
+ Coughlin E. R., Nixon C., 2015, ApJ, 808, L11
428
+ Coughlin E. R., Nixon C. J., 2022, ApJ, 936, 70
429
+ Cufari M., Coughlin E. R., Nixon C. J., 2022, ApJ, 929, L20
430
+ Faber J. A., Rasio F. A., Willems B., 2005, Icarus, 175, 248
431
+ Fabian A. C., Pringle J. E., Rees M. J., 1975, MNRAS, 172, 15
432
+ Frank J., Rees M. J., 1976, MNRAS, 176, 633
433
+ Gafton E., Tejeda E., Guillochon J., Korobkin O., Rosswog S., 2015, MNRAS,
434
+ 449, 771
435
+ Golightly E. C. A., Coughlin E. R., Nixon C. J., 2019, ApJ, 872, 163
436
+ Guillochon J., Ramirez-Ruiz E., 2013, ApJ, 767, 25
437
+ Hills J. G., 1975, Nature, 254, 295
438
+ King A., 2020, MNRAS, 493, L120
439
+ King A., 2022, MNRAS, 515, 4344
440
+ Kremer K., Lombardi J. C., Lu W., Piro A. L., Rasio F. A., 2022, ApJ,
441
+ 933, 203
442
+ Lightman A. P., Shapiro S. L., 1977, ApJ, 211, 244
443
+ Lu W., Quataert E., 2022, arXiv e-prints, p. arXiv:2210.08023
444
+ Mainetti D., Lupi A., Campana S., Colpi M., Coughlin E. R., Guillochon J.,
445
+ Ramirez-Ruiz E., 2017, A&A, 600, A124
446
+ Manukian H., Guillochon J., Ramirez-Ruiz E., O’Leary R. M., 2013, ApJ,
447
+ 771, L28
448
+ Marsden C., Shankar F., Ginolfi M., Zubovas K., 2020, Frontiers in Physics,
449
+ 8, 61
450
+ Miller M. C., Freitag M., Hamilton D. P., Lauburg V. M., 2005, ApJ,
451
+ 631, L117
452
+ Miniutti G., et al., 2019, Nature, 573, 381
453
+ Nauenberg M., 1972, ApJ, 175, 417
454
+ Nixon C. J., Coughlin E. R., 2022, ApJ, 927, L25
455
+ Payne A. V., et al., 2021, ApJ, 910, 125
456
+ Press W. H., Teukolsky S. A., 1977, ApJ, 213, 183
457
+ Price D. J., et al., 2018, Publ. Astron. Soc. Australia, 35, e031
458
+ Syer D., Clarke C. J., Rees M. J., 1991, MNRAS, 250, 505
459
+ Wevers T., et al., 2022, arXiv e-prints, p. arXiv:2209.07538
460
+ Zalamea I., Menou K., Beloborodov A. M., 2010, MNRAS, 409, L25
461
+ This paper has been typeset from a TEX/LATEX file prepared by the author.
462
+ MNRAS 000, 1–4 (2022)
463
+
N9AzT4oBgHgl3EQfWfwG/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,408 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf,len=407
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
3
+ page_content='01300v1 [astro-ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
4
+ page_content='HE] 3 Jan 2023 MNRAS 000, 1–4 (2022) Preprint 5 January 2023 Compiled using MNRAS LATEX style file v3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
5
+ page_content='0 Tidal capture of stars by supermassive black holes: implications for periodic nuclear transients and quasi-periodic eruptions M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
6
+ page_content=' Cufari1★, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
7
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
8
+ page_content=' Nixon2,3, and Eric R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
9
+ page_content=' Coughlin1 1 Department of Physics, Syracuse University, Syracuse, NY 13244, USA 2 School of Physics and Astronomy, University of Leicester, Leicester LE1 7RH, UK 3 School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT, UK Accepted XXX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
10
+ page_content=' Received YYY;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
11
+ page_content=' in original form ZZZ ABSTRACT Stars that plunge into the center of a galaxy are tidally perturbed by a supermassive black hole (SMBH), with closer encounters resulting in larger perturbations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
12
+ page_content=' Exciting these tides comes at the expense of the star’s orbital energy, which leads to the naive conclusion that a smaller pericenter (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
13
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
14
+ page_content=', a closer encounter between the star and SMBH) always yields a more tightly bound star to the SMBH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
15
+ page_content=' However, once the pericenter distance is small enough that the star is partially disrupted, morphological asymmetries in the mass lost by the star can yield an increase in the orbital energy of the surviving core, resulting in its ejection – not capture – by the SMBH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
16
+ page_content=' Using smoothed-particle hydrodynamics simulations, we show that the combination of these two effects – tidal excitation and asymmetric mass loss – result in a maximum amount of energy lost through tides of ∼ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
17
+ page_content='5% of the binding energy of the star, which is significantly smaller than the theoretical maximum of the total stellar binding energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
18
+ page_content=' This result implies that stars that are repeatedly partially disrupted by SMBHs many (≳ 10) times on short-period orbits (≲ few years), as has been invoked to explain the periodic nuclear transient ASASSN-14ko and quasi-periodic eruptions, must be bound to the SMBH through a mechanism other than tidal capture, such as a dynamical exchange (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
19
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
20
+ page_content=', Hills capture).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
21
+ page_content=' Key words: hydrodynamics — black holes — galaxies: nuclei 1 INTRODUCTION Binary stars may form when two field (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
22
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
23
+ page_content=', individual) stars pass close to one another on nearly parabolic trajectories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
24
+ page_content=' As the stars pass, tidal oscillatory modes are excited in the stars at the expense of the stars’ orbital energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
25
+ page_content=' If the encounter is sufficiently close, the tides dissipate enough orbital energy to bind the stars to one another (Fabian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
26
+ page_content=' 1975;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
27
+ page_content=' Press & Teukolsky 1977).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
28
+ page_content=' A star may also be scattered into the region of parameter space, known as the “loss-cone,” that brings the star’s distance of clos- est approach very near a supermassive black hole in the nucleus of a galaxy (SMBH;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
29
+ page_content=' Frank & Rees 1976;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
30
+ page_content=' Lightman & Shapiro 1977;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
31
+ page_content=' Cohn & Kulsrud 1978).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
32
+ page_content=' Reasoning analogously to the binary for- mation scenario, one is tempted to conclude that stellar orbits with distances of closest approach nearer the black hole are more strongly tidally perturbed by, and thus more tightly bound to, the SMBH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
33
+ page_content=' However, there is a fundamental upper limit as to how efficient this process can be, because tides cannot transfer more energy into oscil- lations than the binding energy of the star itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
34
+ page_content=' Additionally, as the pericenter distance of the star continues to decrease the perturbative tidal limit breaks down, and the star starts to lose a fraction of its outer envelope (known as a partial Tidal Disruption Event;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
35
+ page_content=' TDE).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
36
+ page_content=' Recent simulations have demonstrated that the asymmetric ejection of tidal debris in a partial TDE results in the unbinding of the surviving stel- lar core from the SMBH (Manukian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
37
+ page_content=' 2013;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
38
+ page_content=' Gafton et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
39
+ page_content=' 2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
40
+ page_content=' Therefore, the maximum binding energy a star can achieve through ★ E-mail:mcufari@syr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
41
+ page_content='edu tidal interactions with an SMBH could be substantially smaller than the theoretical limit of the star’s own binding energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
42
+ page_content=' This maximum binding energy generated through tidal dissipation sets a fundamen- tal timescale over which one would expect repeating partial TDEs – a star that is bound to a SMBH that is partially destroyed on each pericenter passage (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
43
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
44
+ page_content=', Zalamea et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
45
+ page_content=' 2010;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
46
+ page_content=' Campana et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
47
+ page_content=' 2015;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
48
+ page_content=' Miniutti et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
49
+ page_content=' 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
50
+ page_content=' Payne et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
51
+ page_content=' 2021) – to recur if the bound star is supplied through tidal dissipation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
52
+ page_content=' In this paper we present the results of smoothed particle hydrody- namics (SPH) simulations of partial TDEs from which we obtain the maximum binding energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
53
+ page_content=' In Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
54
+ page_content='1 we describe the setup of the simulations, and in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
55
+ page_content='2 we present the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
56
+ page_content=' In Section 3 we discuss the implications of our findings in the context of periodic nuclear transients (PNTs) and quasi-periodic eruptions (QPEs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
57
+ page_content=' We summarize and conclude in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
58
+ page_content=' 2 SIMULATIONS 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
59
+ page_content='1 Methodology We performed simulations of partial TDEs with the SPH code phan- tom (Price et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
60
+ page_content=' 2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
61
+ page_content=' The star was modeled as a polytrope with a 훾 = 5/3, adiabatic equation of state, with mass 푀★ = 1푀⊙ and radius 푅★ = 1푅⊙.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
62
+ page_content=' In each simulation the star was injected from a distance of 12 푟푡, where 푟t = 푅★ (푀•/푀★)1/3, from the SMBH of mass 푀• = 106푀⊙ with the center of mass on a parabolic trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
63
+ page_content=' The impact parameter 훽 ≡ 푟t/푟p, where 푟p is the pericenter distance © 2022 The Authors 2 Cufari, Nixon, & Coughlin of the star, was varied between 훽 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
64
+ page_content='4 and 훽 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
65
+ page_content='8 in steps of Δ훽 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
66
+ page_content='02.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
67
+ page_content=' Additional details of the simulation setup can be found in Coughlin & Nixon (2015), and the algorithms for, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
68
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
69
+ page_content=', self-gravity can be found in Price et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
70
+ page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
71
+ page_content=' We performed simulations with 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
72
+ page_content='25 × 105, 106 particles and 8 × 106 particles, and found very little deviation in the outcome.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
73
+ page_content=' All results presented here are from the 8 × 106 particle runs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
74
+ page_content=' For the purposes of determining the properties of the surviving star, we calculate averages using only those particles that have a density greaterthan1%ofthemaximumglobal densitywithin thesimulation, 휌max;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
75
+ page_content=' we define this subset of particles as the core.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
76
+ page_content=' For example, the location of the core is calculated as the the average position of the subset of particles that satisfy this criterion, and the distance from the SMBH, 푟c, is determined from the Euclidean norm of the position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
77
+ page_content=' The analogous statement applies to the core velocity and speed, 푣c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
78
+ page_content=' Over the range of 훽 we simulated this criterion excludes the tidally stripped tails, and reducing the fraction to 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
79
+ page_content='1% does not impact the results because the tidal tails have a substantially lower density than ∼ 1% of 휌max.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
80
+ page_content=' Similarly, increasing the fraction to 10% has a negligible effect on the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
81
+ page_content=' However, values > 10% can lead to significant noise in the results because in this case there are too few particles that contribute to the average.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
82
+ page_content=' We run each simulation until the core energy has settled to a constant value that we measure for our results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
83
+ page_content=' For disruptions with 훽 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
84
+ page_content='6, this time is ≲ 1 day after pericenter passage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
85
+ page_content=' Simulations with 훽 > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
86
+ page_content='6 are run up to ∼ 5 days post-pericenter to ensure that the energy has converged to a constant value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
87
+ page_content=' Running our simulations to later times has no affect on our results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
88
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
89
+ page_content='2 Results The left panel of Figure 1 shows the specific orbital energy of the core, calculated according to 휖c = 1 2 푣2 c − 퐺푀• 푟c .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
90
+ page_content=' (1) For 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
91
+ page_content='4 ≲ 훽 ≲ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
92
+ page_content='62, the orbital energy is negative, implying that the surviving core is bound to the SMBH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
93
+ page_content=' The global minimum energy is ∼ 2 − 3% of the binding energy of the star, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
94
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
95
+ page_content=', 휖c,min ≃ −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
96
+ page_content='025퐺푀★ 푅★ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
97
+ page_content=' (2) The fact that the star becomes bound to the SMBH following its tidal interaction is in agreement with the classical calculations of tidal dissipation by Fabian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
98
+ page_content=' (1975);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
99
+ page_content=' Press & Teukolsky (1977).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
100
+ page_content=' Conversely, all disruptions with 훽 ≳ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
101
+ page_content='62 result in a core with a net positive energy following the interaction with the SMBH, indicating that the star is on an unbound trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
102
+ page_content=' This result agrees with those of Manukian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
103
+ page_content=' (2013);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
104
+ page_content=' Gafton et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
105
+ page_content=' (2015), who found that the “kick” to the star could result in a velocity that is ∼ the escape speed of the star for 훽 very close to the value at which complete disruption occurs (훽 ≃ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
106
+ page_content='9 for a 5/3 polytrope;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
107
+ page_content=' Guillochon & Ramirez-Ruiz 2013;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
108
+ page_content=' Mainetti et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
109
+ page_content=' 2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
110
+ page_content=' Therefore, if a star reaches a pericenter distance with 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
111
+ page_content='62 ≲ 훽 ≲ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
112
+ page_content='9, the star is not tidally captured but is instead tidally ejected, never to return to pericenter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
113
+ page_content=' With the energy-semimajor axis and energy-period relationships for a Keplerian orbit, we find that the semimajor axis of the captured star (for 훽 ≲ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
114
+ page_content='62, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
115
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
116
+ page_content=', for stars that are not ejected) is 푎c = −퐺푀• 2휖c = 1 휂c 푅★ 2 � 푀• 푀★ � , (3) while the orbital period is 푇c = 2휋퐺푀• (−2휖c)3/2 = 1 휂3/2 c � 푅★ 2 �3/2 2휋 √퐺푀★ � 푀• 푀★ � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
117
+ page_content=' (4) Here we defined the specific orbital energy of the captured star as 휖c = −휂c퐺푀★/푅★, where 휂c ≲ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
118
+ page_content='025 (from Figure 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
119
+ page_content=' Using 푀•/푀★ = 106 in Equation (3), the minimum apocenter distance of the star (with 휂c = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
120
+ page_content='025) is ∼ 1 pc for 푅★ = 1푅⊙.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
121
+ page_content=' The right panel of Figure 1 shows the orbital period of the captured star as a function of 훽 from the simulations and using Equation (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
122
+ page_content=' We see that the minimum orbital period of the captured star is ∼ 3 × 104 yr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
123
+ page_content=' However, because of the strong dependence on 휂c in Equation (4), the period can be much larger for only small changes in 훽.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
124
+ page_content=' 3 DISCUSSION Some current models for PNTs and QPEs suggest that they can be produced by stars on bound orbits about SMBHs with periods from hours to ∼ 푓 푒푤 years, with the star being partially disrupted and feeding an accretion flare every pericenter passage (Miniutti et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
125
+ page_content=' 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
126
+ page_content=' King 2020;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
127
+ page_content=' Payne et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
128
+ page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
129
+ page_content=' King 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
130
+ page_content=' Wevers et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
131
+ page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
132
+ page_content=' PNTs have been suggested to have system parameters that are com- parable to 푀• = 107푀⊙, 푅★ = 1푅⊙, 푀★ = 1푀⊙, which gives, from Equation (4) with 휂c = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
133
+ page_content='025, 푇PNT ≃ 3 × 105 yr, (5) which is obviously too long to explain the observed periods ≲ 1 year (Payne et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
134
+ page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
135
+ page_content=' Wevers et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
136
+ page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
137
+ page_content=' Even if one could inject the theoretical maximum energy into the star, and thus set 휂c = 1 in Equation (4), we would obtain 푇PNT ≃ 103 yr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
138
+ page_content=' As argued by Cufari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
139
+ page_content=' (2022), even in this overly optimistic scenario, PNTs need an additional mechanism to bind the star sufficiently tightly to the SMBH to produce their observed periods in situ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
140
+ page_content=' On the other hand, it is possible that a PNT could initially be generated with an orbital period given by Equation (5), but the period then decays through gravitational-wave emission (over millions of years) to produce a period as short as ∼ 1 year by the time that we observe it1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
141
+ page_content=' However, a problem with this interpretation is that even for the maximum value of 휂c = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
142
+ page_content='025, Equation (3) for the semimajor axis of the orbit yields an apocenter distance of ∼ 2푎c ∼ 10 pc for 푀•/푀★ = 107.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
143
+ page_content=' Thus, we would expect the star to interact with, and be once again perturbed by, the nuclear star cluster, and it seems very unlikely that the star will repeatedly return to the same pericenter over multiple passages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
144
+ page_content=' Additionally, while we have assumed that the star is on a parabolic orbit, it could have a velocity at infinity that is 푣∞ ≃ 휎, with 휎 the galactic velocity dispersion (Miller et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
145
+ page_content=' 2005).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
146
+ page_content=' From Figure 1, the maximum amount of energy able to be dissipated through tides is 휖c,max ≃ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
147
+ page_content='025퐺푀★ 푅★ ≃ 1 2 � 푀★ 푀⊙ � � 푅★ 푅⊙ �−1 � 100 km s−1�2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
148
+ page_content=' (6) For a 107푀⊙ SMBH, the velocity dispersion from the 푀 −휎 relation is 휎 ∼ 110 km s−1(Marsden et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
149
+ page_content=' 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
150
+ page_content=' Thus, tides may not actually be capable of dissipating the true (positive) energy of the orbit, and 1 As pointed out in Payne et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
151
+ page_content=' (2021), the rate of change of the orbital period due to gravitational waves is actually too small to explain the observed value for ASASSN-14ko, but it should be possible for gravitational waves to shrink the orbit in general and for other systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
152
+ page_content=' MNRAS 000, 1–4 (2022) On tidal capture for PNTs and QPEs 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
153
+ page_content='40 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
154
+ page_content='45 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
155
+ page_content='50 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
156
+ page_content='55 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
157
+ page_content='60 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
158
+ page_content='65 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
159
+ page_content='70 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
160
+ page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
161
+ page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
162
+ page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
163
+ page_content='10 β ϵc [GM⊙/R⊙] 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
164
+ page_content='40 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
165
+ page_content='45 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
166
+ page_content='50 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
167
+ page_content='55 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
168
+ page_content='60 5×104 1×105 5×105 1×106 5×106 1×107 β Tc [yrs] Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
169
+ page_content=' Left: The energy imparted to the star as a function of the impact parameter 훽.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
170
+ page_content=' Stars with 휖c < 0 are bound to the black hole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
171
+ page_content=' There is a small range of 훽 for which mass loss occurs on first pericenter passage (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
172
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
173
+ page_content=', 훽 > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
174
+ page_content='5) and for which 휖c < 0, the necessary condition for a repeating partial disruption to occur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
175
+ page_content=' Right: the period of the orbit of the star for encounters that yield a captured star as a function of the impact parameter 훽.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
176
+ page_content=' The minimum period corresponds minimum orbital energy (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
177
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
178
+ page_content=' the maximum binding energy), and for these parameters is > 104 yrs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
179
+ page_content=' hence binding the star through this mechanism may be impossible in the first place.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
180
+ page_content=' QPEs – with periods of the order hours – are typically modeled with a ∼ 105푀⊙ SMBH partially disrupting a white dwarf star.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
181
+ page_content=' For such a system, Equation (4) with 푀★ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
182
+ page_content='6푀⊙, 푅★ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
183
+ page_content='011푅⊙ (Nauenberg 1972), 푀• = 4 × 105푀⊙, and 휂c = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
184
+ page_content='025 gives 푇QPE ≃ 28 yr, (7) which shows that it is not possible to bind a star to a SMBH through tidal dissipation and immediately reproduce the observed orbital periods of QPEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
185
+ page_content=' As for PNTs, it is nonetheless possible that gravitational-wave emission shrinks the orbit2 to ∼ hours before we detect them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
186
+ page_content=' Because the binding energy of a white dwarf is substan- tially larger than that of a main sequence star, the minimum apocenter distance is correspondingly smaller (from Equation 3), and the max- imum imparted energy through tides is substantially larger than the energy at infinity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
187
+ page_content=' Thus, without further investigation that is outside the scope of the present work, we cannot conclusively state whether or not an additional mechanism is required for producing the ob- served orbital periods in QPEs (under the paradigm that they are powered by repeatedly partially disrupted white dwarfs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
188
+ page_content=' On the other hand, the tidal breakup of a binary star system (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
189
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
190
+ page_content=', Hills capture;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
191
+ page_content=' Hills 1975) can bind the star with a substantially shorter period (compared to just tidal dissipation) if the binary is sufficiently tight.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
192
+ page_content=' As demonstrated by Cufari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
193
+ page_content=' (2022), this is a plausible explanation for the origin of the ∼ 114 day period of ASASSN- 14ko.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
194
+ page_content=' An additional argument against the gravitational-wave inspiral scenario for explaining ASASSN-14ko is that the mass lost by the star must be ∼ 1% of the mass of the star to power the emission (Cufari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
195
+ page_content=' 2022), and hence it cannot have survived many (≳ 100 s) interactions prior to the ∼ 10 that have been observed since the initial detection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
196
+ page_content=' Similarly, if the white dwarf binary separation is not much larger than the radius of the white dwarf itself, then Equation (5) from Cufari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
197
+ page_content=' (2022) with 푎★ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
198
+ page_content='04푅⊙, 푀• = 4 × 105푀⊙, and 푀★ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
199
+ page_content='6푀⊙ yields an orbital period of ∼ 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
200
+ page_content='3 hours for the period of the bound star following a Hills-capture event.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
201
+ page_content=' As also suggested in Cufari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
202
+ page_content=' (2022), it therefore seems plausible that the 2 The orbital period may also be reduced through the interaction with a pre-existing AGN disc (Syer et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
203
+ page_content=' 1991;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
204
+ page_content=' Cufari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
205
+ page_content=' 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
206
+ page_content=' Lu & Quataert 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
207
+ page_content=' periods of QPEs can be generated with a dynamical exchange process without the need for additional dissipation through other means.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
208
+ page_content=' 4 SUMMARY AND CONCLUSIONS We presented SPH simulations of the interaction between a star and an SMBH to determine the maximum degree by which a star can be bound to an SMBH through tidal dissipation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
209
+ page_content=' Two competing mechanisms prevent the star from becoming arbitrarily bound to the SMBH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
210
+ page_content=' As the distance of closest approach between the star and SMBH shrinks, energy from the star’s orbit is expended in exciting dynamical tides in the star.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
211
+ page_content=' However, once the star reaches a dis- tance of closest approach comparable to its tidal radius, the star is kicked to positive energies as a result of asymmetry in the tidal tails that are liberated from the star.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
212
+ page_content=' The competition between these two physical effects results in a minimum possible orbital energy of the star following the tidal encounter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
213
+ page_content=' For the parameters we simulated here, the location of this minimum is at 훽 ∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
214
+ page_content='55 (pericenter distance of 푟t/0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
215
+ page_content='55 with 푟t the usual tidal radius) and the binding energy of the orbit is ∼ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
216
+ page_content='5% of the star’s binding energy;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
217
+ page_content=' see Equation (2) specifically.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
218
+ page_content=' This minimum energy is significantly smaller than the theoretical maximum, being the entirety of the stellar binding energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
219
+ page_content=' In order to produce a repeating partial tidal disruption via a tidal dissipation mechanism, the energy kick imparted to the star must be negative, otherwise the star will be ejected on a hyperbolic trajec- tory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
220
+ page_content=' Hence, it would appear that there is a relatively small region of parameter space within which the star is only partially destroyed, not ejected, and survives for many (≳ 10) pericenter passages, specif- ically 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
221
+ page_content='4 ≲ 훽 ≲ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
222
+ page_content='5 for the type of star considered here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
223
+ page_content=' Initially non-rotating stars in this range of 훽 will be rotating at a nontrivial fraction of breakup following the initial interaction, which will move the effective tidal radius out (Golightly et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
224
+ page_content=' 2019), but provided that the pericenter (effectively unaltered because of the small ratio of the maximal angular momentum of the star to the angular momentum of the orbit itself) is still within this tidal radius, the star may transfer a small amount of mass during each additional pericenter passage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
225
+ page_content=' In this manner, a star may undergo many cycles of partial disruptions before being destroyed or ejected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
226
+ page_content=' In our simulations we modeled the star as a 5/3 polytrope, which is most applicable to low-mass main sequence stars and and low- mass white dwarfs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
227
+ page_content=' By number, most stars are thought to fall into MNRAS 000, 1–4 (2022) 4 Cufari, Nixon, & Coughlin this regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
228
+ page_content=' However, more massive (radiative) stars are consider- ably more centrally concentrated than predicted by a 5/3-polytropic model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
229
+ page_content=' Here we have shown that the minimum energy for the captured star – modeled as a 5/3 polytrope – occurs at 훽 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
230
+ page_content='55.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
231
+ page_content=' This result will depend somewhat on the type of star being considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
232
+ page_content=' For example, Figure 3 of Manukian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
233
+ page_content=' (2013) shows that it occurs for 훽 < 1 when the star is modeled as a 4/3-polytrope and that there is very little dependence of the result on the black hole mass.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
234
+ page_content=' Faber et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
235
+ page_content=' (2005) considered the tidal capture of a planet by a star in which the mass ratio was 푞 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
236
+ page_content='001, and found a minimum binding energy of ∼ 14% of the binding energy of the planet at 훽 = 10/19 ≃ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
237
+ page_content='523 (see their Table 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
238
+ page_content=' Kremer et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
239
+ page_content=' (2022) also recently considered black hole-star systems with mass ratios closer to unity, and found a similar effect to the one described here if the mass ratio was 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
240
+ page_content='02 or 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
241
+ page_content='05 if the star was modeled as a 훾 = 5/3 polytrope, but that the star was able to go from bound to completely disrupted – without being ejected – as the mass ratio increased beyond 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
242
+ page_content='05 and the star was modeled with the Eddington standard model (see their Figure 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
243
+ page_content=' We defer an analysis of the minimum orbital energy – and the 훽 at which the minimum energy occurs – as a function of the mass ratio and the type of star to future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
244
+ page_content=' In the context of extreme mass-ratio inspirals, Zalamea et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
245
+ page_content=' (2010) demonstrated that a white dwarf (or other compact object) completes thousands of large-eccentricity orbits before reaching the direct capture radius of the SMBH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
246
+ page_content=' However, their model accounts only for the orbital decay due to gravitational wave emission and omits tidal dissipation and mass loss asymmetry effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
247
+ page_content=' Likewise, our simulations omit the effects of orbital decay due to gravitational wave emission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
248
+ page_content=' The pericenter distance of our simulated disruptions is > 50 푟g, so orbital decay due to general relativistic effects (at least on the first pericenter passage) is negligible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
249
+ page_content=' For more compact stars with smaller tidal radii nearer the event horizon, orbital decay due to general relativistic effects will be more significant over fewer orbital periods (though the change in the pericenter will still be extremely small, as all of the dissipation occurs near pericenter for these high- eccentricity systems;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
250
+ page_content=' thus the tidal interaction itself may be relatively unaltered, aside from the stronger tidal field of the SMBH due to rel- ativistic gravity).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
251
+ page_content=' Future work on partial TDEs nearer the horizon of the SMBH should incorporate the change in orbital energy due to tidal interaction and mass loss asymmetry alongside gravitational wave emission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
252
+ page_content=' Finally, here we focused on orbits that produce partial TDEs in the traditional sense, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
253
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
254
+ page_content=', the tidal force is not sufficiently strong to destroy the star completely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
255
+ page_content=' However, Nixon & Coughlin (2022) found that at very high 훽 (in their case 훽 = 16), the compression experienced by the star near pericenter could revive self-gravity to the point that a core reformed with a binding energy (to the SMBH) that was much larger than the value predicted by Equation (2) (though we caution that while the mass contained in the core was converged, the orbital period – and thus the binding energy – was resolution- dependent in their simulations).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
256
+ page_content=' While encounters with high-훽 are rare3, it may be possible for tidal capture in this considerably more exotic scenario to produce shorter-period orbits than through the traditional means.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
257
+ page_content=' 3 For example, Equation 16 of Coughlin & Nixon (2022) shows that the fraction of TDEs with 훽 > 10 for a 106푀⊙ Schwarzschild SMBH – including general relativistic effects – is 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
258
+ page_content='0046;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
259
+ page_content=' note that this is a factor of ∼ 4 smaller than the value derived by ignoring general relativistic effects, given by their Equation 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
260
+ page_content=' DATA AVAILABILITY STATEMENT Code to reproduce the results in this paper is available upon reason- able request to the corresponding author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
261
+ page_content=' ACKNOWLEDGEMENTS M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
262
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
263
+ page_content=' acknowledges support from the Syracuse Office of Undergrad- uate Research and Creative Engagement (SOURCE).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
264
+ page_content=' CJN acknowl- edges support from the Science and Technology Facilities Coun- cil (grant no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
265
+ page_content=' ST/W000857/1), and the Leverhulme Trust (grant no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
266
+ page_content=' RPG-2021-380).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
267
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
268
+ page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
269
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
270
+ page_content=' acknowledges support from the Na- tional Science Foundation through grant no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
271
+ page_content=' AST-2006684 and the Oakridge Associated Universities through a Ralph E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
272
+ page_content=' Powe Junior Faculty Enhancement Award.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
273
+ page_content=' This work was performed using the DiRAC Data Intensive service at Leicester, operated by the Uni- versity of Leicester IT Services, which forms part of the STFC DiRAC HPC Facility (www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
274
+ page_content='dirac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
275
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
276
+ page_content='uk).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
277
+ page_content=' The equipment was funded by BEIS capital funding via STFC capital grants ST/K000373/1 and ST/R002363/1 and STFC DiRAC Operations grant ST/R001014/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
278
+ page_content=' DiRAC is part of the National e-Infrastructure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
279
+ page_content=' REFERENCES Campana S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
280
+ page_content=', Mainetti D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
281
+ page_content=', Colpi M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
282
+ page_content=', Lodato G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
283
+ page_content=', D’Avanzo P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
284
+ page_content=', Evans P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
285
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
286
+ page_content=', Moretti A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
287
+ page_content=', 2015, A&A, 581, A17 Cohn H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
288
+ page_content=', Kulsrud R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
289
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
290
+ page_content=', 1978, ApJ, 226, 1087 Coughlin E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
291
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
292
+ page_content=', Nixon C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
293
+ page_content=', 2015, ApJ, 808, L11 Coughlin E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
294
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
295
+ page_content=', Nixon C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
296
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
297
+ page_content=', 2022, ApJ, 936, 70 Cufari M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
298
+ page_content=', Coughlin E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
299
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
300
+ page_content=', Nixon C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
301
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
302
+ page_content=', 2022, ApJ, 929, L20 Faber J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
303
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
304
+ page_content=', Rasio F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
305
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
306
+ page_content=', Willems B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
307
+ page_content=', 2005, Icarus, 175, 248 Fabian A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
308
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
309
+ page_content=', Pringle J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
310
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
311
+ page_content=', Rees M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
312
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
313
+ page_content=', 1975, MNRAS, 172, 15 Frank J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
314
+ page_content=', Rees M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
315
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
316
+ page_content=', 1976, MNRAS, 176, 633 Gafton E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
317
+ page_content=', Tejeda E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
318
+ page_content=', Guillochon J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
319
+ page_content=', Korobkin O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
320
+ page_content=', Rosswog S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
321
+ page_content=', 2015, MNRAS, 449, 771 Golightly E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
322
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
323
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
324
+ page_content=', Coughlin E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
325
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
326
+ page_content=', Nixon C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
327
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
328
+ page_content=', 2019, ApJ, 872, 163 Guillochon J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
329
+ page_content=', Ramirez-Ruiz E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
330
+ page_content=', 2013, ApJ, 767, 25 Hills J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
331
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
332
+ page_content=', 1975, Nature, 254, 295 King A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
333
+ page_content=', 2020, MNRAS, 493, L120 King A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
334
+ page_content=', 2022, MNRAS, 515, 4344 Kremer K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
335
+ page_content=', Lombardi J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
336
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
337
+ page_content=', Lu W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
338
+ page_content=', Piro A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
339
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
340
+ page_content=', Rasio F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
341
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
342
+ page_content=', 2022, ApJ, 933, 203 Lightman A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
343
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
344
+ page_content=', Shapiro S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
345
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
346
+ page_content=', 1977, ApJ, 211, 244 Lu W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
347
+ page_content=', Quataert E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
348
+ page_content=', 2022, arXiv e-prints, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
349
+ page_content=' arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
350
+ page_content='08023 Mainetti D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
351
+ page_content=', Lupi A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
352
+ page_content=', Campana S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
353
+ page_content=', Colpi M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
354
+ page_content=', Coughlin E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
355
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
356
+ page_content=', Guillochon J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
357
+ page_content=', Ramirez-Ruiz E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
358
+ page_content=', 2017, A&A, 600, A124 Manukian H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
359
+ page_content=', Guillochon J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
360
+ page_content=', Ramirez-Ruiz E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
361
+ page_content=', O’Leary R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
362
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
363
+ page_content=', 2013, ApJ, 771, L28 Marsden C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
364
+ page_content=', Shankar F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
365
+ page_content=', Ginolfi M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
366
+ page_content=', Zubovas K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
367
+ page_content=', 2020, Frontiers in Physics, 8, 61 Miller M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
368
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
369
+ page_content=', Freitag M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
370
+ page_content=', Hamilton D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
371
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
372
+ page_content=', Lauburg V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
373
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
374
+ page_content=', 2005, ApJ, 631, L117 Miniutti G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
375
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
376
+ page_content=', 2019, Nature, 573, 381 Nauenberg M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
377
+ page_content=', 1972, ApJ, 175, 417 Nixon C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
378
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
379
+ page_content=', Coughlin E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
380
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
381
+ page_content=', 2022, ApJ, 927, L25 Payne A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
382
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
383
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
384
+ page_content=', 2021, ApJ, 910, 125 Press W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
385
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
386
+ page_content=', Teukolsky S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
387
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
388
+ page_content=', 1977, ApJ, 213, 183 Price D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
389
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
390
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
391
+ page_content=', 2018, Publ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
392
+ page_content=' Astron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
393
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
394
+ page_content=' Australia, 35, e031 Syer D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
395
+ page_content=', Clarke C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
396
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
397
+ page_content=', Rees M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
398
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
399
+ page_content=', 1991, MNRAS, 250, 505 Wevers T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
400
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
401
+ page_content=', 2022, arXiv e-prints, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
402
+ page_content=' arXiv:2209.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
403
+ page_content='07538 Zalamea I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
404
+ page_content=', Menou K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
405
+ page_content=', Beloborodov A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
406
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
407
+ page_content=', 2010, MNRAS, 409, L25 This paper has been typeset from a TEX/LATEX file prepared by the author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
408
+ page_content=' MNRAS 000, 1–4 (2022)' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/N9AzT4oBgHgl3EQfWfwG/content/2301.01300v1.pdf'}
T9E1T4oBgHgl3EQfIQOS/content/tmp_files/2301.02937v1.pdf.txt ADDED
@@ -0,0 +1,3270 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Quantile Autoregression-Based Non-causality Testing ∗
2
+ Weifeng Jin†
3
+ January 10, 2023
4
+ click here for the latest version
5
+ Abstract
6
+ Non-causal processes have been drawing attention recently in Macroeconomics and
7
+ Finance for their ability to display nonlinear behaviors such as asymmetric dynamics,
8
+ clustering volatility, and local explosiveness. In this paper, we investigate the statis-
9
+ tical properties of empirical conditional quantiles of non-causal processes. Specifically,
10
+ we show that the quantile autoregression (QAR) estimates for non-causal processes do
11
+ not remain constant across different quantiles in contrast to their causal counterparts.
12
+ Furthermore, we demonstrate that non-causal autoregressive processes admit nonlin-
13
+ ear representations for conditional quantiles given past observations. Exploiting these
14
+ properties, we propose three novel testing strategies of non-causality for non-Gaussian
15
+ processes within the QAR framework. The tests are constructed either by verifying the
16
+ constancy of the slope coefficients or by applying a misspecification test of the linear
17
+ QAR model over different quantiles of the process.
18
+ Some numerical experiments are
19
+ included to examine the finite sample performance of the testing strategies, where we
20
+ compare different specification tests for dynamic quantiles with the Kolmogorov-Smirnov
21
+ constancy test. The new methodology is applied to some time series from financial mar-
22
+ kets to investigate the presence of speculative bubbles. The extension of the approach
23
+ based on the specification tests to AR processes driven by innovations with heteroskedas-
24
+ ticity is studied through simulations. The performance of QAR estimates of non-causal
25
+ processes at extreme quantiles is also explored.
26
+ Keywords: non-causality, quantile autoregression, specification test, KS constancy
27
+ test, non-linearity.
28
+ JEL Classification: C01, C12, C22.
29
+ 1
30
+ Introduction
31
+ A stationary autoregressive moving-average (ARMA) process is defined as causal concerning
32
+ the specified innovation sequence if all roots of the autoregressive polynomials are outside
33
+ ∗I would like to express my gratitude to my supervisor, Carlos Velasco, who guided me throughout this
34
+ research project. I also want to thank Juan Carlos Escanciano, Miguel Delgado, Jesus Gonzalo, Juan Jose
35
+ Dolado, Nazarii Salish, and Alain Hecq for their constructive comments, and also seminar and workshop
36
+ participants at Universidad Carlos III de Madrid, Time Series Workshop in Zaragoza and CEBA seminar
37
+ 2022.
38
+ †Weifeng Jin: Universidad Carlos III de Madrid. jweifeng@eco.uc3m.es
39
+ 1
40
+ arXiv:2301.02937v1 [econ.EM] 7 Jan 2023
41
+
42
+ of the unit circle, so it can be represented by an infinite sum of past innovations. However,
43
+ non-causal autoregressive (AR) processes, due to their ability to display various non-linear
44
+ dynamics, have been drawing increasing attention in the econometrics literature during the
45
+ last two decades. The same concept has been fully exploited as a non-minimum phase in
46
+ the stochastic system with applications to natural sciences. Unlike the causal AR process in
47
+ the classical time series context, mixed causal and non-causal AR processes do not impose
48
+ presumptions on the location of the lag polynomial roots except for the exclusion of the unit
49
+ root, which allows these stationary processes to be dependent on past and future innovations
50
+ at the same time. Breidt et al. (2001) showed that non-causal AR processes can capture styl-
51
+ ized facts like clustering volatility in financial data, which usually is associated with GARCH
52
+ models. The same argument is made in the paper by Lanne et al. (2013), where they derived
53
+ a closed-form expression for the correlation of squared values in levels in the ARMA(1, 1)
54
+ case. Fries and Zakoian (2019); Gouri´eroux and Zako¨ıan (2017) and Cavaliere et al. (2020)
55
+ proposed to model speculative bubbles with non-causal AR or mixed causal and non-causal
56
+ AR processes generated by heavy-tailed innovations because they can display local explosive
57
+ behavior. Regarding forecasting, Lanne et al. (2012) and Hecq and Voisin (2021) argued that
58
+ there is an accuracy gain in forecasting performance after introducing non-causality into the
59
+ modeling procedure. Moreover, Lanne and Luoto (2013) pointed out that non-causal AR
60
+ processes can be an alternative to non-invertible processes for forward-looking behavior, see
61
+ Alessi et al. (2011) for a comprehensive survey of empirical applications of non-invertible
62
+ (non-fundamental) processes to Macroeconomics and Finance.
63
+ The emerging applications of non-causal AR processes promote an interest in testing non-
64
+ causality in practice, given that autocorrelation functions fail to discriminate non-causal
65
+ processes from their causal counterparts. Needless to say, the non-causality check can be
66
+ naturally achieved through testing classical linear hypotheses under robust estimation tech-
67
+ niques applicable to possibly non-causal processes. These estimation methods have been
68
+ developed by Breid et al. (1991) and Lii and Rosenblatt (1992, 1996) through non-Gaussian
69
+ maximum likelihood schemes or minimum distance estimation exploiting information con-
70
+ tained in higher order moments/cumulants or characteristic/cumulative distribution func-
71
+ tions of residuals, see Velasco and Lobato (2018), Velasco (2022), and Jin (2021). With this
72
+ approach, the test procedure is confined to the assumptions required for the corresponding
73
+ estimates, which can be somehow stringent. Apart from that, a factorization of the coef-
74
+ ficients is necessary for disentangling the roots, which becomes rather complicated as the
75
+ order of the AR process increases. Therefore, a testing strategy before the estimation, which
76
+ can potentially work as a model selection, needs investigation. Besides, the testing can serve
77
+ as a detection tool for the existence of speculative bubbles in empirical time series for the
78
+ ability of non-causal processes with heavy tails to exhibit local explosive behavior.
79
+ However, except for the robust estimation techniques introduced before, little has been done
80
+ on the theory of testing non-causality in AR processes.
81
+ Nevertheless, all the estimation
82
+ techniques above deliver the same message that additional information beyond second-order
83
+ moments is required to identify non-causality.
84
+ Following this message, we propose some
85
+ testing strategies for the non-causality of time series within the quantile autoregressions
86
+ framework (QAR hereafter) (Koenker and Xiao (2006)), which allows us to make use of the
87
+ 2
88
+
89
+ complete distribution to measure dependence. Similarly, Hecq and Sun (2021) applied QAR
90
+ to the target process and entertained the sum of rescaled absolute residuals as an information
91
+ criterion to select between purely causal and non-causal models. The approach of Hecq and
92
+ Sun (2021) obtains the proposed test statistic by running QAR in direct and reserved time,
93
+ respectively. This approach can bring up ambiguity in the model selection when the complex-
94
+ ity of the causality structure escalates as the order of the AR model increases. Thereby, this
95
+ strategy may yield misleading results when the time series is mixed causal and non-causal.
96
+ In this paper, we propose three testing procedures based on the well-developed inference for
97
+ QAR estimates exploiting the non-linear characteristics of non-causal processes. Recall that
98
+ the coefficients in the conditional quantile regression for the location model1 are quantile-
99
+ invariant except for the intercept. When the process is causal, the independence of current
100
+ innovation with past observations contributes to the invariant property of coefficients in the
101
+ QAR model across different quantiles. However, under non-causality the true conditional
102
+ quantile of a non-Gaussian AR process exhibits non-linearity in the past information. In-
103
+ duced from this, the best linear approximation to the true conditional quantile is expected to
104
+ show varying coefficients across distinct quantiles. Using this feature, we introduce our first
105
+ strategy for the objective of testing non-causality by carrying out the constancy test over
106
+ the entire quantile interval. Its easy-to-implement attribute makes it a perfect candidate for
107
+ a preliminary check of non-causality. The other approach to detect non-causality is achieved
108
+ through a specification test of the linear functional form for the conditional quantile. With
109
+ this specification-based approach, no distributional knowledge of the innovations beforehand
110
+ is required, nor does the correct specification of the conditional quantile need to be spelled
111
+ out.
112
+ The testing strategies introduced in this paper fill a gap in the theory of testing non-causality.
113
+ Apart from that, they share an appealing property of retaining power when the AR process
114
+ is higher-order with a mixture of causal and non-causal representation. Like the significant
115
+ advantage of quantile regression over conditional mean regression, our approach is robust to
116
+ outliers, making it suitable for heavy-tailed processes commonly employed in finance. Our
117
+ specification-based approach can also be tentatively extended to an AR process with condi-
118
+ tional heteroskedasticity. The tests achieve considerable power in relatively small samples.
119
+ In addition, some Monte Carlo simulation results suggest that the estimates in linear quan-
120
+ tile models approach the true parameters for non-causal processes as the quantile estimand
121
+ approaches to either extremum (0 or 1), which can be a potential viewpoint to investigate
122
+ the nonlinear features of non-causal processes in the future research.
123
+ The rest of the paper is organized as follows. The second section introduces mixed causal and
124
+ non-causal Autoregressions and some of their statistical properties. Section 3 investigates
125
+ the non-causality testing within the QAR framework. Section 4 discusses the finite sample
126
+ performance of our proposed testing procedures through Monte Carlo Simulations. Section
127
+ 5 illustrates the tests using financial data with the possible existence of speculative bubbles.
128
+ Section 6 closes the paper with conclusions and some extensions.
129
+ 1The location model is any model of the form Y = µ(X)+σ ·u, where u is independent of X. Throughout
130
+ this paper, we refer to Yt = µ (Yt−1, Yt−2, . . . )+ut, where µ(·) is a linear functional form, and ut is a sequence
131
+ of iid innovations, when it comes to the location model.
132
+ 3
133
+
134
+ 2
135
+ Mixed Causal and Non-causal Autoregressions
136
+ In the context of classical time series analysis, it is customary to restrict attention to the
137
+ causal representation of autoregressive processes while modeling stationary univariate time
138
+ series. The reason is mentioned in Brockwell and Davis (2009). Every non-causal autoregres-
139
+ sive process is a stationary solution to a future-independent autoregressive process with explo-
140
+ sive roots. It provides the same second-order structure as its causal counterpart. However,
141
+ to feature higher-order dynamics, a general framework of autoregressive processes named
142
+ mixed causal and non-causal autoregressions (MAR(r, s) hereafter) is proposed where tem-
143
+ poral dependence in both past and future is introduced in the processes, defined by
144
+ φ(L)ψ(L−1)Yt = ut
145
+ (2.1)
146
+ where φ(L) = 1 − φ1L − φ2L2 − · · · − φrLr and ψ(L−1) = 1 − ψ1L−1 − ψ2L−2 − · · · − ψsL−s
147
+ are polynomials with backward and forward operators, respectively. {ut}t∈Z is a sequence of
148
+ independent identically distributed (iid) innovations with zero mean. p = r + s is the total
149
+ order encompassing both causal and non-causal polynomials. An equivalent expression of
150
+ equation (2.1) in moving average can be given by
151
+ Yt = φ(L)−1ψ(L−1)−1ut =
152
+
153
+
154
+ j=−∞
155
+ ρjut−j,
156
+ (2.2)
157
+ where Yt may depend on both future and past innovations. The stationarity of Yt is assured
158
+ by the absolute summability of ρj, �∞
159
+ j=−∞ |ρj| < ∞ and E |ut|1+δ < ∞ for δ > 0. The former
160
+ condition is guaranteed once the roots of both polynomials φ(z) and ψ(z) are confined to
161
+ locate outside the unit circle.
162
+ When ψ(z) = 1 for all z, the process is reduced to a purely causal process MAR(r, 0)
163
+ like in conventional studies. While if φ(z) = 1 for all z, the process becomes purely non-
164
+ causal. Below, we attach several examples to illustrate the statistical properties of a general
165
+ autoregressive process MAR(r, s).
166
+ Example 2.1 (Second-order Property). Define a purely non-causal MAR(0, 1) sequence
167
+ (1 − ψL−1)Yt = ut starting from an iid sequence of innovations ut of zero-mean and finite
168
+ variance σ2. The autocovariance function of Yt is provided by
169
+ Cov (Yt+h, Yt) = Cov
170
+
171
+
172
+
173
+
174
+ j=0
175
+ ψjut+h+j,
176
+
177
+
178
+ j=0
179
+ ψjut+j
180
+
181
+
182
+ =
183
+
184
+
185
+ j=0
186
+ Cov
187
+
188
+ ψjut+h+j, ψj+hut+h+j
189
+
190
+ =
191
+ ψh
192
+ 1 − ψ2 σ2 for h = 0, 1, 2, . . .
193
+ It is worth noting, after some simple calculation, that {Yt}t∈Z shares the same autocovariance
194
+ function as the MAR(1, 0) sequence { ˜Yt}t∈Z defined by (1 − ψL) ˜Yt = ut, which is its causal
195
+ counterpart. A general conclusion can be drawn for MAR(r, s) through the autocovariance
196
+ 4
197
+
198
+ generating function (ACGF). The ACGF of a stationary autoregression is given by
199
+ G(L) =
200
+ 1
201
+ |φ(L)ψ(L−1)|2 σ2 =
202
+ 1
203
+ φ(L)φ(L−1)ψ(L−1)ψ(L)σ2
204
+ =
205
+ 1
206
+ φ(L)ψ(L)φ(L−1)ψ(L−1)σ2
207
+ =
208
+ 1
209
+ |φ(L)ψ(L)|2 σ2,
210
+ from where it is clear that MAR(r, s) takes the identical form of ACGF with MAR(r′, s′) as
211
+ long as the total order r + s = r′ + s′ is satisfied and the roots to all polynomials match.
212
+ This second-order property explains the failure to distinguish non-causal processes from
213
+ causal processes based on the ACF. Moreover, it implies that non-Gaussianity of innovations
214
+ is required for identifying non-causal processes since second-order properties are sufficient to
215
+ characterize a Gaussian probabilistic structure but not to other distributions.
216
+ Example 2.2 (Local Explosiveness). Define a MAR(1, 1) process by
217
+ (1 − φL)(1 − ψL−1)Yt = ut, where ut ∼ Lognormal(0, 2) − exp(2)
218
+ A MAR(r, s) process with heavy-tailed innovations can generate multiple phases of local
219
+ explosiveness, which can be employed to model speculative bubbles. A detailed investigation
220
+ of probabilistic properties of a MAR process driven by α-stable non-Gaussian innovations
221
+ is provided by Fries and Zakoian (2019), where they show the properties of the marginal
222
+ and conditional distributions of a stable MAR(r, s).
223
+ But in a general situation, there is
224
+ no closed-form solution to either the marginal or the conditional distribution of a non-
225
+ causal AR process. Here we illustrate the potential applications of MAR(r, s) processes in
226
+ modeling speculative bubbles with some simulated trajectories. In this example, we plot
227
+ four distinct scenarios by varying the parameters of both causal and non-causal components
228
+ of the MAR(1, 1) process with log-normal distributed innovations2. Generally, with non-
229
+ causality, the processes can mimic bubbles by repetitive phases of upward trends followed
230
+ by a sharp drop; see the lower panel in Figure 2.1. The upper panel in the same figure
231
+ indicates more complicated dynamics can be generated by incorporating more causal/non-
232
+ causal components in the data-generating process regarding the number and magnitude of
233
+ bubbles.
234
+ Example 2.3 (Conditional heteroskedasticity). Here we exemplify the applicability of MAR(r, s)
235
+ in characterizing clustering volatility as an alternative to ARCH or other stochastic volatility
236
+ models with a simple MAR(1, 1) process. This argument is originally made by Breidt et al.
237
+ (2001) in an empirical application to New Zealand/US exchange rate. Lanne et al. (2013)
238
+ elaborate on it by deriving explicitly the expression of the autocorrelation of Y 2
239
+ t in an all-pass
240
+ 2A log-normal distribution is a heavy-tailed continuous distribution defined on the positive domain, whose
241
+ density function is characterized by the location parameter µ and scale parameter σ. The mean and variance
242
+ are represented by exp(µ + σ2/2) and �
243
+ exp(σ2) − 1�
244
+ exp �
245
+ 2µ + σ2�
246
+ , respectively. In this example, we employ
247
+ centered log-normal distribution to be compatible with our setup of mean zero.
248
+ 5
249
+
250
+ Figure 2.1: Trajectories of MAR(1, 1) processes with different parameters (φ, ψ), T=500: the upper
251
+ panel exhibits two MAR(1, 1) processes with different parameters on the causal/non-causal compo-
252
+ nents; the lower panel exhibits a purely non-causal AR(1) process (left) and a purely causal AR(1)
253
+ process (right) when one of the parameters degenerates to zero.
254
+ model of order 1. However, no formal justification for the higher-order dependence structure
255
+ has been made on general non-causal processes. Nevertheless, we present the following ex-
256
+ ample that a non-causal process can exhibit higher-order dependence.
257
+ Continued with data generating process MAR(1, 1), it can be reexpressed by an AR(2) with
258
+ the
259
+ 1−ψL
260
+ 1−ψL−1 filter on the innovations.
261
+ (1 − φL)(1 − ψL−1)Yt = ut
262
+ ut ∼ IID(0, σ2)
263
+ ⇐⇒(1 − φL)(1 − ψL)Yt = ˜ut
264
+ with ˜ut =
265
+ 1 − ψL
266
+ 1 − ψL−1 ut =
267
+
268
+
269
+ j=−∞
270
+ ρjut+j
271
+ with ρj =
272
+
273
+
274
+
275
+
276
+
277
+
278
+
279
+ 0
280
+ if j < −1
281
+ −ψ
282
+ if j = −1
283
+ ψj − ψj+2
284
+ if j ≥ 0.
285
+ The
286
+ 1−ψL
287
+ 1−ψL−1 filter introduces higher-order dependence to an iid innovation sequence3
288
+ 3Actually, ˜ut is an all-pass time series model, where all roots of the autoregressive polynomial are reciprocals
289
+ of roots in the moving average polynomial and vice versa.
290
+ 6
291
+
292
+ MAR(1,1) with Φ=0.4,=0.8
293
+ MAR(1,1) with @=0.8,b=0.4
294
+ 4000
295
+ 600
296
+ 3500
297
+ 500
298
+ 3000
299
+ 400
300
+ 2500
301
+ 2000
302
+ 300
303
+ 1500
304
+ 200
305
+ 1000
306
+ 100
307
+ 500
308
+ -500
309
+ -100
310
+ 0
311
+ 100
312
+ 200
313
+ 300
314
+ 400
315
+ 500
316
+ 0
317
+ 100
318
+ 200
319
+ 300
320
+ 400
321
+ 500
322
+ MAR(0,1) with Φ=0, =0.8
323
+ MAR(1,0) with Φ=0.8, =0
324
+ 250
325
+ 600
326
+ 500
327
+ 200
328
+ 400
329
+ 150
330
+ 300
331
+ 100
332
+ 200
333
+ 50
334
+ 100
335
+ 50
336
+ -100
337
+ 0
338
+ 100
339
+ 200
340
+ 300
341
+ 400
342
+ 500
343
+ 0
344
+ 100
345
+ 200
346
+ 300
347
+ 400
348
+ 500preserving its uncorrelatedness. By simple algebra, we can obtain the formula of the auto-
349
+ correlation function of ˜u2
350
+ t ,
351
+ Corr
352
+
353
+ ˜u2
354
+ t , ˜u2
355
+ t+h
356
+
357
+ =
358
+ κ4(ut)
359
+ ��∞
360
+ j=−∞ ρ2
361
+ jρ2
362
+ j+h
363
+
364
+ + 2σ4 ��∞
365
+ j=−∞ ρjρj+h
366
+ �2
367
+ κ4(ut)
368
+ ��∞
369
+ j=−∞ ρ4
370
+ j
371
+
372
+ + 2σ4
373
+ ��∞
374
+ j=−∞ ρ2
375
+ j
376
+ �2
377
+ which, in general, does not vanish4. This property demonstrates the capability of non-causal
378
+ processes to exhibit volatility clustering, which is commonly observed in financial data. The
379
+ higher-order dependence analysis of ˜ut is relegated to Appendix 7.1, indicating the possibility
380
+ of accommodating higher-order nonlinear dynamics with a general MAR(r, s) model.
381
+ As shown in the preceding examples, MAR(r, s) models can display various nonlinear char-
382
+ acteristics with a linear process generation scheme. This deviation from ”linearity” can be
383
+ employed as a crucial feature to detect non-causality in the linear time series. A fundamental
384
+ result is formalized by Rosenblatt (2000) on the best one-step predictor in the mean square
385
+ for a general AR process, where he demonstrates that the conditional expectation must be
386
+ nonlinear in the past if there is non-causality involved in the non-Gaussian AR processes
387
+ with finite variance. This statement provides us with the critical theoretical result where our
388
+ tests for non-causality are grounded, which will be elaborated on in the next section. The
389
+ extension to a general VARMA process framework has been developed by Chen et al. (2017)
390
+ and applied to a test for non-invertibility. Afterward, Fries and Zakoian (2019) consider the
391
+ case when the MAR(1, s) process is driven by symmetric α-stable innovations with infinite
392
+ variance. They surprisingly find that the conditional expectation can be explicitly expressed
393
+ by a linear function of the past information, in contrast to a MAR(r, s) model with finite
394
+ variance. However, no study has yet been done on the distributional characterization of a
395
+ MAR(r, s) process due to no closed-form solution. Following a simulation-based approach,
396
+ we perform a preliminary analysis of the conditional density function of a process given the
397
+ past observations, see Appendix 7.1. In short, in the presence of non-causality, the shape
398
+ of the conditional distribution of the process, say f(Yt|Yt−1 = y), is y-dependent. Still, the
399
+ dependence pattern is hard to characterize since it varies across different distributions.
400
+ 3
401
+ QAR-based Non-causality Tests
402
+ 3.1
403
+ Benchmark model: MAR(r, s)
404
+ In this section, we formalize the test procedures for non-causality. The null hypothesis of
405
+ interest is Yt being a causal process, i.e.
406
+ H0 : ψ1 = · · · = ψs = 0 in (2.1)
407
+ (3.1)
408
+ against the alternative hypothesis denoted by HA, which is {Yt} is non-causal,
409
+ HA : ψk ̸= 0 for some k ∈ {1, 2, . . . , s} in (2.1).
410
+ (3.2)
411
+ 4κ4(X) is the fourth cumulant of the random variable X, defined by κ4(X) = E �
412
+ (X − E(X))4�
413
+
414
+ 3 E2 �
415
+ E (X − E(X))2�
416
+ .
417
+ 7
418
+
419
+ A primitive strategy is to take it as a joint significance test for the coefficients of leads
420
+ {Yt+j}j=1,2,...,s.
421
+ This approach would call for the identification of models and robust in-
422
+ ference for the estimates under both hypotheses. In this paper, we propose a test for H0
423
+ employing the linearity property of {Yt} based on the QAR, which is easy to implement
424
+ empirically and does not require consistent estimates for general autoregressive progresses.
425
+ Denoting the information set generated by the observations up to period t by It = σ (Yt, Yt−1, ...)
426
+ and the τ−th quantile of Yt conditional on the past by QYt (τ|It−1), the following result on
427
+ the linearity of {Yt} justifies our approach.
428
+ Assumption 1. Let {ut}t∈Z be a non-Gaussian iid sequence with (k + 1)th order moment
429
+ finite and (k + 1)th cumulant nonzero for some k ≥ 2.
430
+ Theorem 3.1. Under Assumption 1, a stationary MAR(r, s) process {Yt} has a non-degenerated
431
+ non-causal component, i.e., s ̸= 0 if and only if there exists QYt (τ|It−1) nonlinear in
432
+ {Yt−j}j≥1 for at least one τ ∈ (0, 1).
433
+ As discussed in Example 2.1, there is no meaning to discuss non-causality in a Gaussian
434
+ structure as there is always an equivalent causal representation of a Gaussian AR process for
435
+ its non-causal counterpart. The finiteness of the moment condition and nonzero cumulants
436
+ are also required in Rosenblatt (2000). Theorem 3.1 is deduced from the nonlinearity of the
437
+ best predictor of Yt in the mean square criterion for non-causal processes. The nonlinearity
438
+ in the conditional mean implies dependence in the conditional distribution beyond the linear
439
+ correlation. Note that the theorem does not point out the quantile(s) where this nonlinear
440
+ relationship occurs, nor the manners in which this nonlinearity is expressed. Another remark
441
+ is that the information set considered in the theorem can be replaced by σ-field generated
442
+ by Yt−1 up to Yt−p due to the Markovian property of MAR(r, s), which avoids the infinite-
443
+ dimensional issue arising from It−1. The total number of the lags and leads of Yt included
444
+ to explain the conditional quantile of MAR(r, s) processes, p, is determined by the partial
445
+ autocorrelation function (PACF) of Yt.
446
+ This theorem prompts us to adopt QAR as a medium to detect non-causality. QAR is a
447
+ comprehensive analysis tool in the time series context, providing robust statistical analyses
448
+ against outliers in the measurement of the response variable, which has proven to be rather
449
+ prevailing in recent decades. Given a MAR(r, s) process of order p defined by (2.1), if the
450
+ non-causal component degenerates to 1, i.e., s = 0, r = p, the conditional quantile of Yt can
451
+ be expressed by
452
+ QYt (τ | It−1) =Qut (τ) + φ1Yt−1 + φ2Yt−2 + · · · + φpYt−p
453
+ =θ0(τ) + θ1(τ)Yt−1 + θ2(τ)Yt−2 + · · · + θp(τ)Yt−p
454
+ =X′
455
+ tθ(τ)
456
+ ∀τ ∈ (0, 1),
457
+ (3.3)
458
+ where Qut(τ) denotes the τ-quantile of innovations ut, and φj’s are the coefficients of corre-
459
+ sponding Yt−j in the polynomial expansion of (2.1). Therefore, after imposing pure causality,
460
+ the conditional quantile of Yt can be fully characterized by a linear function of past observa-
461
+ tions, X′
462
+ tθ(τ) with Xt = (1, Yt−1, Yt−2, . . . , Yt−p)
463
+ ′ and θ(τ) = (θ0(τ), . . . , θp(τ))
464
+ ′. The QAR
465
+ estimates of coefficients θ(τ) in this linear quantile model can be obtained by minimizing
466
+ 8
467
+
468
+ the following problem,
469
+ ˆθ(τ) = argmin
470
+ θ∈Rp+1
471
+ T
472
+
473
+ t=1
474
+ ρτ(Yt − X′
475
+ tθ),
476
+ (3.4)
477
+ with the check function ρτ(u) = u (τ − I(u < 0)). The asymptotic properties of linear QAR
478
+ estimates were first established by Koenker and Xiao (2006). A brief review of QAR esti-
479
+ mates (3.4) can be found in Appendix 7.2. However, if Yt has a non-degenerated non-causal
480
+ component, the linear dynamic model (3.3) for its conditional quantile is misspecified for at
481
+ least one τ ∈ (0, 1), following Theorem 3.1.
482
+ Within the linear QAR framework, Hecq and Sun (2021) consider a statistic aggregating
483
+ the information of the residuals over quantiles, which they employ as a model selection cri-
484
+ terion between purely causal AR models and purely non-causal AR models.
485
+ Given that
486
+ the calculation of residuals is done either by running QAR with direct or reversed time,
487
+ this methodology may provide misleading conclusions regarding MAR(r, s) in presence of
488
+ causality and non-causality at the same time. By contrast, our approaches address more
489
+ the correctness of the linear specification of the conditional quantile through the QAR. For
490
+ non-causal autoregressive processes, no closed-form of the nonlinear conditional quantile of
491
+ Yt is required. Consequently, our approach is robust to the general MAR(r, s) setting. Before
492
+ we carry out the tests for non-causality, the following assumptions are imposed in the QAR
493
+ framework.
494
+ Assumption 2. The distribution function of innovations ut, F(u) admits a continuous
495
+ density function f(u) away from zero on the domain U = {u : 0 < F(u) < 1}.
496
+ Assumption 3. Denote the family of conditional distribution {P (Yt < y|Xt = x) , y ∈ R, x ∈
497
+ Rr+s} as Fx(y) and its Lebesgue density as fx(y), that is uniformly bounded on the space of
498
+ y × x ⊆ R × Rr+s and uniformly continuous.
499
+ Corollary 3.1.1. Under Assumptions 1-3 and null hypothesis H0, the coefficients except for
500
+ the intercept of the conditional quantile are constant across different quantiles in (0, 1).
501
+ Corollary 3.1.1 is a consequence of the independence between ut and Yt−j for j =
502
+ 1, 2, . . . , p when the MAR(r, s) is purely causal. As shown in the equation (3.3), the slope
503
+ coefficients {θj(τ)}j=1,...,p are constant over τ ∈ (0, 1) and uniquely determined by the ex-
504
+ pansion of autoregressive polynomials of Yt. Instead, the performance of the QAR estimates
505
+ is more complicated in the mixed causal and non-causal autoregressive processes since the
506
+ linear model is under misspecification. Angrist et al. (2006) demonstrated in their paper that
507
+ quantile regression is essentially an approximation to the true conditional quantile function
508
+ in a weighted mean squared criterion, with weights associated with the densities of Yt ranging
509
+ from the linear approximation (3.3) to the true conditional quantile QYt(τ|Yt−1, . . . , Yt−p).
510
+ Their statement presents a rough idea of how well the linear function fits the true conditional
511
+ quantile.
512
+ Constancy Test
513
+ Our first approach for detecting non-causality comes along with the
514
+ constancy test of QAR coefficients over the entire quantile range. As stated in Corollary
515
+ 9
516
+
517
+ 3.1.1, if the process is causal, the constancy should hold for all θj(τ) for all j = 1, 2, ..., p and
518
+ τ ∈ (0, 1). Whereas for a non-causal process, the estimated coefficients of Yt−j in the quantile
519
+ regression may vary across different quantiles much likely for the following intuitions: i) non-
520
+ causal processes display highly nonlinear dynamics, one of which is asymmetric dynamics;
521
+ ii) linear quantile model is misspecified; iii) the conditional distribution of Yt varies both
522
+ in the location and shape at different values of past observations. For instance, Figure 3.1
523
+ depicts the dynamic performance of QAR(1) estimates of the slope parameter across the
524
+ quantiles for a non-Gaussian autoregressive process, including causal and non-causal cases in
525
+ different colors. The QAR(1) estimates in the non-causal processes (solid blue lines) exhibit
526
+ a trendy pattern over the quantile domain. However, since a general solution for the true
527
+ conditional quantile function of Yt is infeasible, we do not attempt to provide a detailed
528
+ characterization of the varying coefficient property in the non-causal situation. The test for
529
+ non-causality based on the constancy test can only be used to check the necessary condition
530
+ of AR processes being causal. Nevertheless, the accessibility and straightforwardness of this
531
+ method make it a touchstone for non-causality testing in practice.
532
+ (a) QAR(1) estimates of the slope of Yt−1
533
+ over (0,1): exponential distribution
534
+ (b) QAR(1) estimates of the slope of Yt−1
535
+ over (0,1): chi-square distribution
536
+ Figure 3.1: QAR(1) estimates of a pair of AR(1) processes: one is causal, and the other is non-
537
+ causal. The left part of the figure is applied to the processes generated by exponential innovations,
538
+ and the right part is to the processes generated by chi-square innovations. The true parameter is
539
+ 0.6(1/0.6) for the causal(non-causal) case.
540
+ To implement the constancy test of coefficients under the QAR framework, we consider the
541
+ approach developed by Koenker and Xiao (2006), where the hypothesis is formulated in the
542
+ manner analog to the classical linear hypothesis:
543
+ H1
544
+ 0 : Rθ(τ) = φ with R =
545
+
546
+ 0p×1
547
+ ... Ip
548
+
549
+ for all τ ∈ (0, 1)
550
+ with the unknown τ-invariant parameter vector φ = (φ1, φ2, . . . , φp)′ which needs to be
551
+ estimated5.
552
+ Naturally, the naive test for this hypothesis is constructed on the quantile
553
+ process
554
+ VT (τ) =
555
+
556
+ T
557
+
558
+ RˆΣ−1
559
+ 1 ˆΣ0 ˆΣ−1
560
+ 1 R′�−1/2 �
561
+ Rˆθ(τ) − ˆφ
562
+
563
+ 5For purely causal processes, the constant vector consists of the parameters in the autoregressive polyno-
564
+ mials, i.e., φ1, φ2, . . . , φp in (3.3)
565
+ 10
566
+
567
+ 5
568
+ causal
569
+ coefficients
570
+ noncausal
571
+ 5
572
+ 0
573
+ 0.0
574
+ 0.0
575
+ 0.2
576
+ 0.4
577
+ 0.6
578
+ 0.8
579
+ 1.05
580
+ coefficients
581
+ causal
582
+ noncausal
583
+ 0.0
584
+ 0.2
585
+ 0.4
586
+ 0.6
587
+ 0.8
588
+ 1.0
589
+ Tand the Kolmogorov-Smirnov (KS) type of test statistic is adopted for the interest of testing
590
+ a compact set of quantiles
591
+ KSVT =
592
+ sup
593
+ τ∈T ⊂(0,1)
594
+ VT (τ) , where T is a compact interval,
595
+ where ˆθ(τ) is the linear QAR estimate, and ˆΣ1, ˆΣ0 are the corresponding estimates of the
596
+ asymptotic variance, see appendix 7.4. ˆφ is a
597
+
598
+ T consistent estimator of φ and a simple
599
+ choice is the QAR estimator ˆθ(τ ∗) at any τ ∗ ∈ T .6 A closed interval [ϵ1, 1 − ϵ2] with trivial
600
+ numbers ϵ1, ϵ2 is proposed for T to avoid missing much information from the entire quantile
601
+ interval (0, 1).
602
+ Under the hypothesis of constancy H1
603
+ 0,
604
+ VT (τ) =⇒ Bp(τ) − f
605
+
606
+ F −1(τ)
607
+ � �
608
+ RΣ−1
609
+ 0 R′�−1/2 Z
610
+ where Bp(τ) is a p-dimensional standard Brownian bridge and Z = plimT→∞
611
+
612
+ T
613
+ �ˆφ − φ
614
+
615
+ is a drift brought up by the estimation of the nuisance parameter φ. To annihilate this
616
+ non-trivial effect, a martingale transformation K was introduced into VT (τ) to retrieve the
617
+ distribution-free merit of the KS test. Denote the derivative of the density function by ˙f
618
+ and define
619
+ g(x) =
620
+
621
+ 1,
622
+ � ˙f
623
+
624
+ F −1(x)
625
+
626
+ /f
627
+
628
+ F −1(x)
629
+ ���′ and
630
+ C(z) =
631
+ � 1
632
+ z
633
+ g(x)g(x)′dx,
634
+ and the martingale transformation on the process VT (τ) is constructed as follows
635
+ ˜VT (τ) =KVT (τ)
636
+ =VT (τ) −
637
+ � τ
638
+ 0
639
+
640
+ g′
641
+ T (x)C−1
642
+ T (x)
643
+ � 1
644
+ x
645
+ g(s)dVT (s)
646
+
647
+ dx,
648
+ where gT (x) and CT (x) are uniformly consistent estimators of g(x) and C(x) in the considered
649
+ domain, respectively. The proposed KS-type norm on the transformed process becomes
650
+ KS ˜VT = sup
651
+ τ∈T
652
+ ��� ˜VT (τ)
653
+ ��� .
654
+ Corollary 3.1.2 (Constancy test for non-causality). Under Assumptions 1-3 and the causal-
655
+ ity hypothesis H0,
656
+ ˜VT (τ) ⇒ W p(τ)
657
+ KS ˜VT ⇒ sup
658
+ τ∈T
659
+ ∥W p(τ)∥ ,
660
+ where W p(τ) represents a p-dimensional standard Brownian motion.
661
+ The related discussion on the estimation of density and score functions is given in Koenker
662
+ 6Another appropriate choice is the estimator from the ordinary least square of φj, j = 1, 2, . . . , p in (2.1).
663
+ 11
664
+
665
+ and Xiao (2002), providing suggestions on the choice of bandwidth in detail. In the command
666
+ KhmaladzeTest implemented in R studio, Hall/Sheather bandwidth (Hall and Sheather
667
+ (1988)) for sparsity estimation is set as default. The critical values are obtained through
668
+ approximating W p(τ) by a Gaussian random walk, and the corresponding values at different
669
+ significance levels can be found in tables in the Appendix of Koenker and Xiao (2002). One
670
+ remark on the quantile interval in the proposition, typically a symmetric interval [ϵ, 1 − ϵ]
671
+ trimmed by a small number ϵ close to 0 is considered for simplicity in practice. Monte Carlo
672
+ experiments have evidenced that an appropriate trimming in the entire quantile interval al-
673
+ leviates the over-rejection of the null hypothesis ascribable to the instability of estimation
674
+ at extremal quantiles without sacrificing the power.
675
+ Specification test-based approach
676
+ Another direction to test non-causality is based on
677
+ Theorem 3.1, where non-causality in the linear processes is translated into the misspecifi-
678
+ cation of conditional quantiles of non/causal processes by linear dynamic quantile models
679
+ (3.3). Equivalently, we aim to test
680
+ E
681
+ �Ψτ
682
+ �Yt − X′
683
+ tθ0
684
+ � |Yt−1, . . . , Yt−p
685
+ � = 0 a.s. for some θ0 ∈ B and ∀τ ∈ Υ ⊂ (0, 1),
686
+ (3.5)
687
+ where Ψτ(·) = I (· ≤ 0)−τ, and B is a family of uniformly bounded functions from Υ ⊂ (0, 1)
688
+ to Θ ⊂ Rp+1.7 Both Υ and Θ are compact sets. Escanciano and Velasco (2010) (hereafter
689
+ EV) characterize this restriction by unconditional moments
690
+ E
691
+ �Ψτ
692
+ �Yt − X′
693
+ tθ0
694
+ � exp
695
+ �ix′Xt
696
+ �� = 0,
697
+ ∀x ∈ Rp+1, for some θ0 ∈ B and ∀τ ∈ Υ ⊂ (0, 1),
698
+ (3.6)
699
+ where i = √−1. Following the strategy of the EV test, we consider the statistic based on
700
+ the residual processes indexed by quantiles τ, θ ∈ B and x ∈ Rp+1
701
+ REV
702
+ T
703
+
704
+ x, τ; ˆθ
705
+
706
+ = T −1/2
707
+ T
708
+
709
+ t=1
710
+ Ψτ
711
+
712
+ Yt − X′
713
+ tˆθ
714
+
715
+ exp
716
+ �ix′Xt
717
+
718
+ (3.7)
719
+ with true parameters θ0 replaced by QAR estimates ˆθ from a given sample
720
+
721
+ Yt, X
722
+
723
+ t
724
+
725
+ t=1,2,...,T .
726
+ Xt is composed by a constant and the lags of Yt up to order p. Theoretically, T −1/2REV
727
+ T
728
+ approaches to zero at a certain rate when T goes to infinity for any x ∈ Rp+1 if X′
729
+ tθ0(τ) is the
730
+ correct specification for QYt(τ|It) and ˆθ(τ) is a
731
+
732
+ T-consistent estimator of θ0(τ) for τ ∈ Υ.
733
+ Thus, the distance between this statistic (3.7) and zero naturally turns into a measure of
734
+ the deviation of X′
735
+ tθ0(τ) from the true QYt(τ|It). The suggested Cram´er-von Mises (CvM)
736
+ norm on (3.7) is defined by
737
+
738
+ τ∈Υ,x∈Rp+1
739
+ ���REV
740
+ T
741
+
742
+ x, τ; ˆθ
743
+ ����
744
+ 2 dΦ(x)dW(τ),
745
+ (3.8)
746
+ 7In our case, actually only θ0(τ) is required to be a uniformly bounded function from Υ ⊂ (0, 1) to Θ ⊂ R,
747
+ and the rest θj(τ) are mapped to a constant for j = 1, 2, . . . , p. ∀τ ∈ (0, 1).
748
+ 12
749
+
750
+ where Φ(x) and W(τ) are weighting functions defined on Rp+1 and Υ, respectively with pos-
751
+ itive derivative in the corresponding domain. This CvM norm permits us to consider infinite
752
+ model specifications for conditional quantiles at all τ’s of interest. Other possible options of
753
+ norms aggregating the information over the quantiles and x, for instance, Kolmogorov-type,
754
+ are also applicable here. The following proposition presents the asymptotic behavior of the
755
+ EV test applied for testing non-causality.
756
+ Corollary 3.1.3 (EV Test for non-causality). Under H0 and Assumptions 1-3, let E (XtX′
757
+ t)
758
+ be nonsingular in a neighborhood of θ(τ) = θ0(τ) for all τ ∈ Υ,
759
+ REV
760
+ T
761
+
762
+ x, τ; ˆθ
763
+
764
+ =⇒ ˜REV
765
+ ∞ (x, τ) ,
766
+ and
767
+
768
+ τ∈Υ,x∈Rp+1
769
+ ���REV
770
+ T
771
+
772
+ x, τ; ˆθ
773
+ ����
774
+ 2 dΦ(x)dW(τ) −→d
775
+
776
+ τ∈Υ,x∈Rp+1
777
+ ��� ˜REV
778
+ ∞ (x, τ)
779
+ ���
780
+ 2 dΦ(x)dW(τ)
781
+ where ˜REV
782
+ ∞ = R∞ − ∆R. R∞ is a Gaussian process with mean zero and covariance function
783
+ defined by
784
+ Cov (x1, x2; τ1, τ2) = (τ1 ∧ τ2 − τ1τ2) E
785
+ �exp
786
+ �i(x1 − x2)′X0
787
+ ��
788
+ and the drift ∆R is introduced due to the asymptotic effect from estimation error of ˆθ,
789
+ ∆R(x, τ) = G′(x, θ0(τ))Q(τ),
790
+ where G(x, θ0(τ)) = E [Xtf (Qut(τ)) exp(ix′Xt)] and Q(·) is Σ−1/2
791
+ 0
792
+ Bp+1/f
793
+ �F −1(·)
794
+ � . Bp+1
795
+ is a (p + 1)-dimensional standard Brownian bridge. f and F are the density and cumulative
796
+ distribution functions of the innovation ut, respectively. Σ0 = E (XtX′
797
+ t).
798
+ The result immediately follows from Escanciano and Velasco (2010), where they develop
799
+ the result for a general class of quantile estimates covering various linear and nonlinear
800
+ models of interest with corresponding assumptions. Those conditions are satisfied under
801
+ Assumptions 1-3 in the context of MAR(r, s) processes under the null hypothesis.
802
+ The
803
+ limiting distribution of the test statistic is no longer distribution-free due to the estimation
804
+ of nuisance parameters. Hence, a subsampling method is proposed to approximate the critical
805
+ value. The operation for calculating the residual process (3.7) and the test statistic (3.8) is
806
+ applied to a given subsample (Yt, . . . , Yt+b) of size b, denoted by REV
807
+ b
808
+ (x, τ; ˆθb,t) and Γ
809
+
810
+ REV
811
+ b,t
812
+
813
+ respectively, and repeated for t = 1, 2, . . . , T − b + 1. The cdf of the limiting distribution of
814
+ the proposed statistic is approximated by the empirical cdf across resamples, i.e.,
815
+ ˆP
816
+
817
+ Γ
818
+
819
+ REV
820
+ b
821
+
822
+ ≤ ω
823
+
824
+ =
825
+ 1
826
+ T − b + 1
827
+ T−b+1
828
+
829
+ t=1
830
+ I
831
+
832
+ Γ
833
+
834
+ REV
835
+ b,t
836
+
837
+ ≤ ω
838
+
839
+ .
840
+ Therefore, the 1 − αth sample quantile, cEV
841
+ T,b (α) defined as
842
+ cEV
843
+ T,b (α) = inf
844
+
845
+ ω : ˆP
846
+
847
+ Γ
848
+
849
+ REV
850
+ b
851
+
852
+ ≤ ω
853
+
854
+ ≥ 1 − α
855
+
856
+ ,
857
+ intuitively serves as the critical value for this test at the α-level of the significance. The
858
+ 13
859
+
860
+ validity of this subsampling approach has been verified by Escanciano and Velasco (2010),
861
+ who suggest an appropriate choice for bandwidth b = ⌊kT 2/5⌋ for the sake of optimal minimax
862
+ accuracy8. Some numerical evidence has demonstrated that a diverse range of values of k,
863
+ like 4, 5, and 6 provide reasonably good performance in finite samples. A centering strategy
864
+ can be adopted for the resampling statistic to achieve better performance power-wise in finite
865
+ samples.
866
+ Alternatively, Escanciano and Goh (2014) (hereafter EG) translate the restriction (3.5) into
867
+ E
868
+ �Ψτ
869
+ �Yt − X′
870
+ tθ0
871
+ � I (Xt ≤ x)
872
+ � = 0
873
+ ∀x ∈ Rp+1, for some θ0 ∈ B and for all τ ∈ Υ ⊂ (0, 1).
874
+ (3.9)
875
+ Naturally, a new test statistic can be constructed on the sample analog of moment conditions
876
+ (3.9) with the replacement of θ0 by their QAR estimates ˆθ,
877
+ T −1/2
878
+ T
879
+
880
+ t=1
881
+ Ψτ
882
+
883
+ Yt − X′
884
+ tˆθ
885
+
886
+ I (Xt ≤ x)
887
+ τ ∈ Υ, x ∈ Rp+1.
888
+ (3.10)
889
+ Unlike the approach in the EV test, where the asymptotic behavior of the test statistic is
890
+ derived by incorporating the non-negligible effect from the estimates of nuisance parameters
891
+ into the final limiting distribution, Escanciano and Goh (2014) introduce a variant of weight-
892
+ ing functions I (Xt ≤ x) satisfying the orthogonality condition for the Taylor expansion of
893
+ the statistic (3.10) around the true parameter θ0. With this consideration, the test statistic
894
+ becomes
895
+ REG
896
+ T
897
+
898
+ x, τ; ˆθ
899
+
900
+ =
901
+
902
+ T
903
+ T
904
+
905
+ t=1
906
+
907
+
908
+ �Ψτ
909
+
910
+ Yt − X′
911
+ tˆθ
912
+
913
+
914
+ �I (Xt ≤ x) − ˆD′
915
+ T
916
+
917
+ x, ˆθ(τ)
918
+ � �
919
+ T −1
920
+ T
921
+
922
+ t=1
923
+ ˆδt,τ ˆδ′
924
+ t,τ
925
+ �−1
926
+ ˆδt,τ
927
+
928
+
929
+
930
+
931
+
932
+ (3.11)
933
+ with ˆDT
934
+
935
+ x, ˆθ(τ)
936
+
937
+ = T −1 �T
938
+ t=1 ˆδt,τI (Xt ≤ x) and
939
+ ˆδt,τ = ˆf
940
+
941
+ X′
942
+ tˆθ(τ) | Xt
943
+
944
+ Xt,
945
+ where ˆf (y | Xt) is a consistent estimator of the conditional density function of Yt given the
946
+ past information, f (y | Xt). One suggested kernel estimator is proposed by Escanciano and
947
+ Goh (2012), defined by
948
+ ˆf
949
+
950
+ X′
951
+ tˆθ(τ) | Xt
952
+
953
+ =
954
+ 1
955
+ MhM
956
+ M
957
+
958
+ j=1
959
+ K
960
+
961
+ X′
962
+ tˆθ(τ) − X′
963
+ tˆθ(τj)
964
+ hM
965
+
966
+ ,
967
+ (3.12)
968
+ where {τj}M
969
+ j=1 is a sequence randomly selected from Υ following the uniform distribution
970
+ with M −→ ∞ as well as T −→ ∞. K(·) is a kernel function, and hM denotes a smoothing
971
+ parameter which may depend on the data and the quantiles considered for the estimation.
972
+ Compared to other density estimator candidates, this estimator is computationally less cum-
973
+ bersome but still preserves the same convergence rate as Rosenblatt estimator when the
974
+ following assumption is imposed for the kernel function and the corresponding smoothing
975
+ 8⌊z⌋ denotes the largest integer that does not exceed z.
976
+ 14
977
+
978
+ parameter.
979
+ Assumption 4.
980
+ 1. For kernel function K(s):
981
+ (a) K(s) is continuously differentiable;
982
+ (b)
983
+ � ∞
984
+ −∞ K(s) = 1;
985
+ (c) K(s) is uniformly bounded;
986
+ (d) K(s) is of second order, i.e.
987
+ � ∞
988
+ −∞ sK(s) = 0,
989
+ � ∞
990
+ −∞ s2K(s)ds ∈ (0, ∞) and
991
+ � ∞
992
+ −∞ K2(s)ds ∈
993
+ (0, ∞).
994
+ 2. The convergence rate of smoothing parameter hM to 0 has to satisfy P (aM ≤ hM ≤ bM) →
995
+ 1, for some deterministic sequences of positive numbers aM and bM such that bM −→ 0
996
+ and ap+2
997
+ M M/logM → ∞ as T → ∞.
998
+ These regularity conditions for kernel functions apply to commonly used options in prac-
999
+ tice, for instance, the Gaussian kernel.
1000
+ Corollary 3.1.4 (EG Test for non-causality). Under H0 and Assumptions 1-4, let the matrix
1001
+ E
1002
+
1003
+ δt,τδ′
1004
+ t,τ
1005
+
1006
+ be nonsingular in a neighborhood of θ(τ) = θ0(τ) for all τ ∈ Υ,
1007
+ REG
1008
+ T
1009
+
1010
+ x, τ; ˆθ
1011
+
1012
+ =⇒ REG
1013
+ ∞ (x, τ) ,
1014
+ and
1015
+
1016
+ τ∈Υ,x∈Rp+1
1017
+ ���REG
1018
+ T
1019
+
1020
+ x, τ; ˆθ
1021
+ ����
1022
+ 2 dΦ(x)dW(τ) −→d
1023
+
1024
+ τ∈Υ,x∈Rp+1
1025
+ ���REG
1026
+ ∞ (x, τ)
1027
+ ���
1028
+ 2 dΦ(x)dW(τ),
1029
+ where REG
1030
+
1031
+ is a Gaussian process with mean zero and covariance function characterized by
1032
+ (τ1 ∧ τ2 − τ1τ2) E {Πτ1I (Xt ≤ x1) Πτ2I (Xt ≤ x2)} ,
1033
+ with the so-called orthogonal projection operator on the weighting function
1034
+ ΠτI (Xt ≤ x) ≡ I (Xt ≤ x) − D′ (x, θ0(τ)) E−1 (δt,τδt,τ) δt,τ.
1035
+ and δt,τ = f (X′
1036
+ tθ0(τ) | Xt) Xt, D (x, θ0(τ)) = E (δt,τI (Xt ≤ x)).
1037
+ As stated before, the main advantage of the EG test is the limiting distribution of the
1038
+ test statistic being invariant to the estimation effect of ˆθ(τ). Therefore, compared to the
1039
+ asymptotic distribution of the EV test, there is no ”drift” term subtracted from a Gaussian
1040
+ process. However, this asymptotic distribution still depends on the data-generating process.
1041
+ Consequently, we cannot tabulate the critical values for the considered statistic. This is
1042
+ coped with the aid of a multiplier bootstrap approach.
1043
+ The approximation based on a
1044
+ transformation on REG
1045
+ T
1046
+
1047
+ x, τ; ˆθ
1048
+
1049
+ is obtained by multiplying by a sequence of iid random
1050
+ 15
1051
+
1052
+ variables {Wt}T
1053
+ t=1 with zero mean and unit variance, independent on Xt,
1054
+ ˜REG
1055
+ T,t
1056
+
1057
+ x, τ; ˆθ
1058
+
1059
+ =
1060
+
1061
+ T
1062
+ T
1063
+
1064
+ t=1
1065
+
1066
+
1067
+ �Ψτ
1068
+
1069
+ Yt − X′
1070
+ tˆθ
1071
+
1072
+
1073
+ �I (Xt ≤ x) − ˆD′
1074
+ T
1075
+
1076
+ x, ˆθ(τ)
1077
+ � �
1078
+ T −1
1079
+ T
1080
+
1081
+ t=1
1082
+ ˆδt,τ ˆδ′
1083
+ t,τ
1084
+ �−1
1085
+ ˆδt,τ
1086
+
1087
+
1088
+
1089
+
1090
+ � Wt.
1091
+ (3.13)
1092
+ One common choice of {Wt}T
1093
+ t=1 is
1094
+
1095
+
1096
+
1097
+ P (W = 1 − ω) = ω/
1098
+
1099
+ 5
1100
+ P (W = ω) = 1 − ω/
1101
+
1102
+ 5, with ω =
1103
+ �√
1104
+ 5 + 1
1105
+
1106
+ /2.
1107
+ (3.14)
1108
+ This transformation has been proven by Escanciano and Goh (2014) to restore the limiting
1109
+ distribution of the original statistic. It allows us to use the empirical distribution of any
1110
+ continuous functional, including CvM form, Γ
1111
+ � ˜REG
1112
+ T,t
1113
+
1114
+ , i.e.,
1115
+ ˆP
1116
+
1117
+ Γ
1118
+ � ˜REG
1119
+ T,t
1120
+
1121
+ ≤ ω | {Wt}T
1122
+ t=1
1123
+
1124
+ = 1
1125
+ T
1126
+ T
1127
+
1128
+ t=1
1129
+ I
1130
+
1131
+ Γ
1132
+ � ˜REG
1133
+ T,t
1134
+
1135
+ ≤ ω
1136
+
1137
+ to consistently estimate the limiting distribution of the original statistic Γ
1138
+
1139
+ REG
1140
+ T
1141
+
1142
+ . Likewise,
1143
+ the (1 − α)-th empirical quantile of the transformed statistic,
1144
+ cEG
1145
+ T
1146
+ (α) = inf
1147
+
1148
+ ω : ˆP
1149
+
1150
+ Γ
1151
+ � ˜REG
1152
+ T
1153
+
1154
+ ≤ ω | {Wt}T
1155
+ t=1
1156
+
1157
+ ≥ 1 − α
1158
+
1159
+ ,
1160
+ will is a consistent estimate of the critical value at α significance level.
1161
+ In the presence of non-causality, ψ(L−1) does not vanish from general MAR(r, s) processes.
1162
+ Then, by Corollary 3.1.1,
1163
+ E
1164
+ �Ψτ
1165
+ �Yt − X′
1166
+ tθ1(·)
1167
+ � exp (i · Xt)
1168
+ � ̸= 0
1169
+ and
1170
+ E
1171
+ �Ψτ
1172
+ �Yt − X′
1173
+ tθ1(·)
1174
+ � I (Xt ≤ ·)
1175
+ � ̸= 0
1176
+ in a set with a positive Lebesgue measure on Rp+1×Υ, provided that Φ and W are absolutely
1177
+ continuous on Rp+1 × Υ with respect to the Lebesgue measure. Correspondingly, under the
1178
+ alternative,
1179
+ Γ
1180
+
1181
+ REV
1182
+ T
1183
+
1184
+ =
1185
+
1186
+ τ∈Υ,x∈Rp+1
1187
+ ���REV
1188
+ T
1189
+
1190
+ x, τ; ˆθ
1191
+ ����
1192
+ 2 dΦ(x)dW(τ) →p ∞
1193
+ and
1194
+ Γ
1195
+
1196
+ REG
1197
+ T
1198
+
1199
+ =
1200
+
1201
+ τ∈Υ,x∈Rp+1
1202
+ ���REG
1203
+ T
1204
+
1205
+ x, τ; ˆθ
1206
+ ����
1207
+ 2 dΦ(x)dW(τ) →p ∞,
1208
+ so both specification-based tests are consistent.
1209
+ 16
1210
+
1211
+ 4
1212
+ Monte Carlo Simulations
1213
+ In this section, we study the performance of the three proposed tests in finite samples and
1214
+ compare them with each other in terms of size and power.
1215
+ Constancy Test
1216
+ In the first experiment, we focus on the approach based on the constancy
1217
+ test. In the simulation, we consider a pair of MAR(1, 0) and MAR(0, 1) models
1218
+
1219
+
1220
+
1221
+ (1 − φL) Yt = ut
1222
+ �1 − ψL−1� Y ∗
1223
+ t = ut,
1224
+ (4.1)
1225
+ which are generated from 11 non-Gaussian distributed innovations, which cover a majority
1226
+ of distributions commonly used in the empirics, ranging from symmetric to asymmetric,
1227
+ bounded to unbounded support, with mixed types of tail behavior. The parameters (φ, ψ)
1228
+ with values (0.3, 0.6, 0.9) enable us to investigate the sensitivity of the method responding to
1229
+ data-generating processes with different persistence. The sample sizes are 200 and 500 with
1230
+ 500 replications. ϵ = 0.05 is the default choice for the quantile interval [ϵ, 1 − ϵ] ⊂ (0, 1).
1231
+ The empirical size and power of rejecting the constancy hypothesis to detect non-causality
1232
+ under the QAR framework are summarized in Table 1.
1233
+ Regarding the size, the constancy test has an empirical size close to the nominal level in most
1234
+ cases but suffers from a severe over-rejection for heavy-tailed distributions. This corresponds
1235
+ to the estimation of conditional quantiles of these processes when τ is extremely close to 0
1236
+ or 1, which generally calls for a larger sample size to produce less biased and more stable
1237
+ estimates. The volatility of QAR estimates of extremal quantiles triggers the over-rejection
1238
+ of the constant coefficients under the causality hypothesis. Therefore, as seen in Figures
1239
+ 4.1c and 4.1d, where innovations follow truncated Cauchy distribution9 and log-normal dis-
1240
+ tribution, respectively, the QAR estimates at quantiles close to 0 and 1 turn rather volatile
1241
+ compared to the estimates at other levels in (0, 1). To alleviate this issue, we propose to
1242
+ check different trimming strategies in the quantile interval for the test. There is an obvious
1243
+ trade-off in the selection of truncation of the quantile interval: over-trimmed, the power of
1244
+ the test will decrease due to the loss of valuable information; under-trimmed, the volatile
1245
+ estimate of extremal quantiles is not excluded, so the distortion in size will remain as be-
1246
+ fore. Consequently, we conduct some experiments to analyze the sensitivity of the constancy
1247
+ test in response to truncated intervals; see Table 2. The results suggest a trimmed quantile
1248
+ interval [0.10, 0.90] would be appropriate for the sample size considered because the power
1249
+ remains relatively high while the size is close to the nominal level. Another possible reason
1250
+ highlighted by Koenker and Xiao (2002) is that the default smoothing parameter selection
1251
+ for estimating the density function of innovations, which comprises the test statistic in the
1252
+ KhmaladzeTest command in R studio, produces satisfactory performance for the class of dis-
1253
+ tributions considered there, but is not designed for heavy-tailed distributed innovations. A
1254
+ more adaptive bandwidth choice of density function estimation of heavy-tailed distributions
1255
+ at extreme quantiles needs further investigation.
1256
+ 9Truncated at a sufficiently large value to ensure the existence of variance.
1257
+ 17
1258
+
1259
+ From the perspective of power, the test achieves a significant leap in power as the sample size
1260
+ increases from 200 to 500 in most scenarios. More particularly, the method provides favorable
1261
+ performance in the presence of asymmetry in the distributions of innovations with rejection
1262
+ rates of 40% ∼ 90% in 200-sized samples and 70% ∼ 90% in 500-sized samples, respec-
1263
+ tively. This finding coincides with the idea shared in Velasco and Lobato (2018), where the
1264
+ third-order moments contribute most to the identification of non-causal AR processes. This
1265
+ phenomenon is exceptionally well-illustrated in the first four cases (Exponential, Gamma,
1266
+ Beta, and F distributions) when the distribution of innovations is skewed but has no heavy
1267
+ tails. However, in the cases where innovations do not display skewness or heavy-tailedness,
1268
+ the test can barely distinguish non-causal processes from their causal counterparts, see Fig-
1269
+ ure 4.2. The point of the failure is illustrated in the same figure. The QAR estimates for
1270
+ non-causal AR(1) with symmetric innovations appear to be indistinguishable from the ones
1271
+ for the causal counterparts, even under misspecification.
1272
+ Table 1: Empirical size and power of non-causality test using constancy⋆ test in QAR in various cases
1273
+ Distribution
1274
+ test
1275
+ T=200
1276
+ T=500
1277
+ ut
1278
+ φ(ψ) = 0.3†
1279
+ φ(ψ) = 0.6
1280
+ φ(ψ) = 0.9
1281
+ φ(ψ) = 0.3
1282
+ φ(ψ) = 0.6
1283
+ φ(ψ) = 0.9
1284
+ Exp(1)-1
1285
+ size
1286
+ 4.20%
1287
+ 4.00%
1288
+ 4.80%
1289
+ 6.40 %
1290
+ 6.80%
1291
+ 4.80%
1292
+ power
1293
+ 33.80%
1294
+ 38.80%
1295
+ 40.20%
1296
+ 65.40%
1297
+ 69.60%
1298
+ 72.40%
1299
+ Gamma(1,1)-1
1300
+ size
1301
+ 4.40%
1302
+ 3.00%
1303
+ 3.80%
1304
+ 5.00 %
1305
+ 5.80%
1306
+ 4.40%
1307
+ power
1308
+ 34.40%
1309
+ 37.00%
1310
+ 42.20%
1311
+ 64.40%
1312
+ 68.40%
1313
+ 70.20%
1314
+ Beta(5,1)-5/6
1315
+ size
1316
+ 6.80%
1317
+ 6.60%
1318
+ 5.40%
1319
+ 6.80 %
1320
+ 9.40%
1321
+ 6.40%
1322
+ power
1323
+ 15.40%
1324
+ 27.20%
1325
+ 39.00%
1326
+ 24.80%
1327
+ 65.00%
1328
+ 77.20%
1329
+ F(5,5)-5/3
1330
+ size
1331
+ 5.00%
1332
+ 6.60%
1333
+ 3.40%
1334
+ 8.40 %
1335
+ 6.00%
1336
+ 4.20%
1337
+ power
1338
+ 80.00%
1339
+ 81.80%
1340
+ 70.00%
1341
+ 97.20%
1342
+ 98.20%
1343
+ 96.20%
1344
+ χ2
1345
+ 5 − 5
1346
+ size
1347
+ 5.00%
1348
+ 4.40%
1349
+ 4.00%
1350
+ 4.00 %
1351
+ 4.80%
1352
+ 5.20%
1353
+ power
1354
+ 11.40%
1355
+ 11.40%
1356
+ 8.80%
1357
+ 27.40%
1358
+ 35.60%
1359
+ 17.40%
1360
+ skewed normal
1361
+ size
1362
+ 5.20%
1363
+ 6.60%
1364
+ 7.40%
1365
+ 9.80 %
1366
+ 7.40%
1367
+ 9.60%
1368
+ power
1369
+ 8.00%
1370
+ 7.80%
1371
+ 10.60%
1372
+ 25.40%
1373
+ 20.00%
1374
+ 12.80%
1375
+ truncated Cauchy
1376
+ size
1377
+ 26.60%
1378
+ 34.80%
1379
+ 43.00%
1380
+ 20.80 %
1381
+ 19.20%
1382
+ 33.20%
1383
+ power
1384
+ 70.00%
1385
+ 96.40%
1386
+ 92.40%
1387
+ 80.00%
1388
+ 99.80%
1389
+ 91.80%
1390
+ log normal
1391
+ size
1392
+ 21.20%
1393
+ 19.60%
1394
+ 23.60%
1395
+ 23.20 %
1396
+ 26.40%
1397
+ 26.60%
1398
+ power
1399
+ 98.20%
1400
+ 99.00%
1401
+ 99.60%
1402
+ 100.00%
1403
+ 100.00%
1404
+ 100.00%
1405
+ t3
1406
+ size
1407
+ 5.40%
1408
+ 4.00%
1409
+ 5.00%
1410
+ 4.00 %
1411
+ 6.80%
1412
+ 4.80%
1413
+ power
1414
+ 9.80%
1415
+ 13.00%
1416
+ 15.80%
1417
+ 11.60%
1418
+ 20.00%
1419
+ 25.80%
1420
+ uniform
1421
+ size
1422
+ 6.20%
1423
+ 7.60%
1424
+ 6.00%
1425
+ 6.00 %
1426
+ 6.80%
1427
+ 5.80%
1428
+ power
1429
+ 13.40%
1430
+ 8.00%
1431
+ 13.20%
1432
+ 40.40%
1433
+ 7.80%
1434
+ 48.80%
1435
+ Laplace
1436
+ size
1437
+ 3.40%
1438
+ 4.00%
1439
+ 4.60%
1440
+ 2.60 %
1441
+ 3.80%
1442
+ 4.60%
1443
+ power
1444
+ 8.40%
1445
+ 5.60%
1446
+ 17.00%
1447
+ 10.80%
1448
+ 8.60%
1449
+ 29.00%
1450
+ ⋆: constancy test over the quantile interval [0.05, 0.95].
1451
+ †: φ(ψ) = 0.3 means the coefficient in the lag polynomial of the MAR(1, 0) process (purely causal) is 0.3; the
1452
+ coefficient in the lead polynomial of the MAR(0, 1) process (purely non-causal) is 0.3 as well, for comparison.
1453
+ EV Test
1454
+ With the same setting as the one in the Constancy Test, we take the case with
1455
+ the coefficient φ(ψ) = 0.6 for MAR(1, 0) (MAR(0, 1)) as the representative to examine the
1456
+ performance of EV test in discriminating non-causal processes from their causal alternatives.
1457
+ The sample size varies from 100 to 200 and 500. The number of replications is 500. Regarding
1458
+ the bandwidth for the subsampling scheme to approximate the critical value, we choose
1459
+ b = ⌊4T 2/5⌋.
1460
+ As for the weighting functions involved in the expression (3.8), a uniform
1461
+ 18
1462
+
1463
+ (a) χ2
1464
+ 5 − 5 distribution
1465
+ (b) skewed normal distribution
1466
+ (c) truncated Cauchy distribution
1467
+ (d) log normal distribution
1468
+ Figure 4.1: Four cases of QAR(1) on MAR(1, 0) and MAR(0, 1), T=500, φ(ψ) = 0.6 : asymmetric
1469
+ distributions
1470
+ (a) t3 distribution
1471
+ (b) uniform distribution
1472
+ (c) Laplace distribution
1473
+ Figure 4.2: Three cases of QAR(1) on MAR(1, 0) and MAR(0, 1), T=500, φ(ψ) = 0.6: symmetric
1474
+ distributions
1475
+ 19
1476
+
1477
+ 5
1478
+ coefficients
1479
+ causal
1480
+ noncausal
1481
+ 0.0
1482
+ 0.2
1483
+ 0.4
1484
+ 0.6
1485
+ 0.8
1486
+ 1.0
1487
+ T5
1488
+ causal
1489
+ noncausal
1490
+ coefficients
1491
+ 0
1492
+ 0.0
1493
+ 0.2
1494
+ 0.4
1495
+ 0.6
1496
+ 0.8
1497
+ 1.0
1498
+ T5
1499
+ coefficients
1500
+ 0.5
1501
+ causal
1502
+ noncausal
1503
+ 0.0
1504
+ 0.2
1505
+ 0.4
1506
+ 0.6
1507
+ 0.8
1508
+ 1.0
1509
+ L0
1510
+ 2
1511
+ 5.
1512
+ causal
1513
+ noncausal
1514
+ coefficients
1515
+ 0.5
1516
+ 0.0
1517
+ 0.2
1518
+ 0.4
1519
+ 0.6
1520
+ 0.8
1521
+ 1.0
1522
+ T1.0
1523
+ coefficients
1524
+ 0.5
1525
+ 0'0
1526
+ causal
1527
+ noncausal
1528
+ 0.0
1529
+ 0.2
1530
+ 0.4
1531
+ 0.6
1532
+ 0.8
1533
+ 1.0
1534
+ tcoefficients
1535
+ 0.6
1536
+ causal
1537
+ 0.4
1538
+ noncausal
1539
+ 0.0
1540
+ 0.2
1541
+ 0.4
1542
+ 0.6
1543
+ 0.8
1544
+ 1.0
1545
+ T1.0
1546
+ coefficients
1547
+ 5
1548
+ 0
1549
+ causal
1550
+ noncausa
1551
+ 5
1552
+ 0
1553
+ 0.0
1554
+ 0.2
1555
+ 0.4
1556
+ 0.6
1557
+ 0.8
1558
+ 1.0
1559
+ tTable 2: Empirical size and power of non-causality test using constancy test with different trimmed quantile interval
1560
+ Sample size
1561
+ [0.05, 0.95]
1562
+ φ(ψ) = 0.3
1563
+ φ(ψ) = 0.6
1564
+ φ(ψ) = 0.9
1565
+ φ(ψ) = −0.4
1566
+ φ(ψ) = −0.6
1567
+ φ(ψ) = −0.8
1568
+ T=100
1569
+ size
1570
+ 2.40%
1571
+ 2.20%
1572
+ 2.60%
1573
+ 2.80%
1574
+ 2.00%
1575
+ 2.40%
1576
+ power
1577
+ 22.40%
1578
+ 24.60%
1579
+ 22.00%
1580
+ 4.80%
1581
+ 32.80%
1582
+ 26.60%
1583
+ T=200
1584
+ size
1585
+ 3.60%
1586
+ 3.60%
1587
+ 4.00%
1588
+ 5.00%
1589
+ 2.80%
1590
+ 4.40%
1591
+ power
1592
+ 40.80%
1593
+ 38.60%
1594
+ 41.80%
1595
+ 8.40%
1596
+ 48.00%
1597
+ 44.00%
1598
+ T=500
1599
+ size
1600
+ 3.40%
1601
+ 6.20%
1602
+ 4.80%
1603
+ 6.60 %
1604
+ 4.80%
1605
+ 3.40%
1606
+ power
1607
+ 67.20%
1608
+ 67.00%
1609
+ 72.40%
1610
+ 14.20%
1611
+ 66.00%
1612
+ 72.20%
1613
+ Sample size
1614
+ [0.10, 0.90]
1615
+ φ(ψ) = 0.3
1616
+ φ(ψ) = 0.6
1617
+ φ(ψ) = 0.9
1618
+ φ(ψ) = −0.4
1619
+ φ(ψ) = −0.6
1620
+ φ(ψ) = −0.8
1621
+ T=100
1622
+ size
1623
+ 3.40%
1624
+ 3.20%
1625
+ 3.20%
1626
+ 3.80%
1627
+ 2.40%
1628
+ 3.40%
1629
+ power
1630
+ 28.00%
1631
+ 25.40%
1632
+ 22.80%
1633
+ 6.00%
1634
+ 32.80%
1635
+ 28.20%
1636
+ T=200
1637
+ size
1638
+ 3.20%
1639
+ 2.80%
1640
+ 5.00%
1641
+ 3.00%
1642
+ 4.20%
1643
+ 4.00%
1644
+ power
1645
+ 37.40%
1646
+ 43.40%
1647
+ 43.20%
1648
+ 5.80%
1649
+ 49.40%
1650
+ 48.80%
1651
+ T=500
1652
+ size
1653
+ 4.80%
1654
+ 5.40%
1655
+ 6.00%
1656
+ 4.60 %
1657
+ 3.80%
1658
+ 5.00%
1659
+ power
1660
+ 71.20%
1661
+ 67.80%
1662
+ 69.20%
1663
+ 14.60%
1664
+ 65.40%
1665
+ 72.80%
1666
+ Sample size
1667
+ [0.15, 0.85]
1668
+ φ(ψ) = 0.3
1669
+ φ(ψ) = 0.6
1670
+ φ(ψ) = 0.9
1671
+ φ(ψ) = −0.4
1672
+ φ(ψ) = −0.6
1673
+ φ(ψ) = −0.8
1674
+ T=100
1675
+ size
1676
+ 4.40%
1677
+ 2.60%
1678
+ 3.60%
1679
+ 5.00%
1680
+ 3.00%
1681
+ 3.00%
1682
+ power
1683
+ 27.80%
1684
+ 28.20%
1685
+ 21.80%
1686
+ 8.80%
1687
+ 37.60%
1688
+ 30.20%
1689
+ T=200
1690
+ size
1691
+ 5.60%
1692
+ 3.80%
1693
+ 3.60%
1694
+ 6.60%
1695
+ 3.40%
1696
+ 4.40%
1697
+ power
1698
+ 39.00%
1699
+ 40.00%
1700
+ 42.40%
1701
+ 9.60%
1702
+ 51.60%
1703
+ 46.60%
1704
+ T=500
1705
+ size
1706
+ 5.40%
1707
+ 4.40%
1708
+ 5.00%
1709
+ 4.20 %
1710
+ 4.80%
1711
+ 5.40%
1712
+ power
1713
+ 64.80%
1714
+ 65.80%
1715
+ 69.00%
1716
+ 21.80%
1717
+ 68.00%
1718
+ 71.60%
1719
+ The innovations follow exponential distribution.
1720
+ distribution is applied to W(τ) defined on the evenly discretized quantile interval Υ =
1721
+ [0.01, 0.99] and 2-dimensional standard normal distribution to Ψ(x) for the sake of simplicity
1722
+ in the calculation. The results of the empirical size and power are displayed in Table 3.
1723
+ Concerning size, the results present some fluctuation around the nominal level. The test
1724
+ tends to under-reject the correct null hypothesis in the light-tailed scenarios while over-rejects
1725
+ in the heavy-tailed scenarios. This comes from the subjective choice in the subsampling size,
1726
+ whose performance can be sensitive to the quantile interval included in the test and the data-
1727
+ generating process. Nevertheless, the distortion in size is not so significant, and we believe
1728
+ this can be eased by choosing different subsampling schemes. As for power, the test achieves
1729
+ reasonably good performance generally. From the simulation results, we observe that the
1730
+ power of detecting non-causality is close to 100% in most cases when the sample size is 500,
1731
+ which is as expected. It is worth noting that the convergence rate of power towards 100%
1732
+ varies across different distributions. The numerical evidence indicates that the further the
1733
+ innovations depart from Gaussianity, the faster the convergence rate is. In such log-normal
1734
+ and uniform distributions, a reasonably high power, like 86% or 92%, has been obtained in
1735
+ relatively small samples. While others (chi-square) may need larger samples to reach the
1736
+ same level of power.
1737
+ EG Test
1738
+ The setup of DGP keeps unchanged, like in the EV test. The sample size varies
1739
+ from 50 to 100 and 200.
1740
+ The weighting functions Ψ(x) and W(τ) in the CvM form of
1741
+ REG
1742
+ T
1743
+
1744
+ x, τ; ˆθ
1745
+
1746
+ are chosen to be the empirical distribution of Xt and uniform distribution
1747
+ over the grid of quantiles from Υ = [0.01, 0.99] considered in the estimation. The critical
1748
+ 20
1749
+
1750
+ Table 3: Empirical size and power of non-causality test using EV test
1751
+ in QAR in various cases
1752
+ Distribution
1753
+ parameter:
1754
+ φ(ψ) = 0.6
1755
+ ut
1756
+ T:
1757
+ 100
1758
+ 200
1759
+ 500
1760
+ Gaussian
1761
+ size
1762
+ 2.20%
1763
+ 3.40%
1764
+ 3.40%
1765
+ power
1766
+ 0.40%
1767
+ 0.60%
1768
+ 2.60%
1769
+ exponential
1770
+ size
1771
+ 4.40%
1772
+ 1.80%
1773
+ 2.00%
1774
+ power
1775
+ 29.20%
1776
+ 43.20%
1777
+ 97.20%
1778
+ Gamma
1779
+ size
1780
+ 1.80%
1781
+ 3.00%
1782
+ 2.80%
1783
+ power
1784
+ 10.60%
1785
+ 41.60%
1786
+ 97.60%
1787
+ Beta
1788
+ size
1789
+ 3.20%
1790
+ 3.20%
1791
+ 3.40%
1792
+ power
1793
+ 26.40%
1794
+ 67.80%
1795
+ 99.00%
1796
+ F
1797
+ size
1798
+ 3.60%
1799
+ 5.80%
1800
+ 3.40%
1801
+ power
1802
+ 24.00%
1803
+ 67.60%
1804
+ 99.00%
1805
+ χ2
1806
+ 5 − 5
1807
+ size
1808
+ 4.80%
1809
+ 4.40%
1810
+ 3.60%
1811
+ power
1812
+ 13.40%
1813
+ 22.20%
1814
+ 68.40%
1815
+ log normal
1816
+ size
1817
+ 5.40%
1818
+ 4.60%
1819
+ 6.80%
1820
+ power
1821
+ 54.00%
1822
+ 92.40%
1823
+ 100.00%
1824
+ t3
1825
+ size
1826
+ 6.20%
1827
+ 7.00%
1828
+ 6.40%
1829
+ power
1830
+ 13.80%
1831
+ 42.40%
1832
+ 93.40%
1833
+ Uniform
1834
+ size
1835
+ 5.00%
1836
+ 6.00%
1837
+ 3.40%
1838
+ power
1839
+ 44.00%
1840
+ 86.80%
1841
+ 100.00%
1842
+ Laplace
1843
+ size
1844
+ 4.40%
1845
+ 4.80%
1846
+ 4.40%
1847
+ power
1848
+ 14.00%
1849
+ 47.20%
1850
+ 98.20%
1851
+ EV test: the choice of size for subsampling is ⌊4T 2/5⌋.
1852
+ value is obtained through the multiplier bootstrap introduced in the methodology section.
1853
+ Implementing the multiplier bootstrap avoids computing the estimates for each subsample.
1854
+ The results are summarized in Table 4. Regarding the empirical size performance, this ap-
1855
+ proach delivers stable rejection frequencies under the null hypothesis associated with their
1856
+ nominal level in all cases considered in the simulation exercise. This is anticipated in accor-
1857
+ dance with the argument in the previous section that there is no subjective choice involved
1858
+ in the approximation of the critical value. In terms of power, the EG test has an increasing
1859
+ trend as the sample is enlarged. Similar to the EV test, the EG approach outperforms in the
1860
+ presence of skewness and excess kurtosis (regardless of negative or positive), with a rejection
1861
+ probability over 70% in relatively small samples (200). For the cases where the performance
1862
+ is less satisfactory, such as t3 and Laplace distributions, power still increases when the sample
1863
+ size becomes larger.
1864
+ An overall comparison of the three methods is exhibited in Table 5. Size-wise, the EG test
1865
+ has an appealing attribute of undistorted size in general scenarios compared to the other two
1866
+ approaches. On the contrary, the constancy test suffers from over-rejection in heavy-tailed
1867
+ cases, and the EV test delivers less accuracy than the EG test in some cases. Power-wise,
1868
+ the EG test is the most robust one as it produces relatively good results in all situations but
1869
+ is extraordinarily competent for asymmetric distributions. By contrast, the EV test achieves
1870
+ the highest power among the three in the symmetric cases. In comparison, the constancy
1871
+ test can be a powerful tool in detecting non-causality in processes with heavy tails. However,
1872
+ given that the consistency of the constancy test for non-causality is not guaranteed and the
1873
+ size is distorted, it may give misleading conclusions in empirical analysis. Thus, the con-
1874
+ 21
1875
+
1876
+ Table 4: Empirical size and power of non-causality test using EG test
1877
+ in QAR in various cases
1878
+ Distribution
1879
+ parameter:
1880
+ φ(ψ) = 0.6
1881
+ ut
1882
+ T:
1883
+ 50
1884
+ 100
1885
+ 200
1886
+ Gaussian
1887
+ size
1888
+ 6.00%
1889
+ 5.00%
1890
+ 4.00%
1891
+ power
1892
+ 4.80%
1893
+ 5.60%
1894
+ 5.80%
1895
+ exponential
1896
+ size
1897
+ 5.20%
1898
+ 4.60%
1899
+ 6.00%
1900
+ power
1901
+ 24.80%
1902
+ 49.20%
1903
+ 76.40%
1904
+ Gamma
1905
+ size
1906
+ 5.00%
1907
+ 5.60%
1908
+ 5.00%
1909
+ power
1910
+ 23.80%
1911
+ 45.80%
1912
+ 75.80%
1913
+ Beta
1914
+ size
1915
+ 6.40%
1916
+ 5.80%
1917
+ 6.00%
1918
+ power
1919
+ 24.20%
1920
+ 42.20%
1921
+ 75.80%
1922
+ F
1923
+ size
1924
+ 4.40%
1925
+ 5.00%
1926
+ 5.40%
1927
+ power
1928
+ 22.60%
1929
+ 37.40%
1930
+ 67.00%
1931
+ χ2
1932
+ 5 − 5
1933
+ size
1934
+ 6.60%
1935
+ 5.40%
1936
+ 4.60%
1937
+ power
1938
+ 12.80%
1939
+ 22.60%
1940
+ 41.60%
1941
+ log normal
1942
+ size
1943
+ 5.60%
1944
+ 5.40%
1945
+ 4.00%
1946
+ power
1947
+ 32.00%
1948
+ 60.60%
1949
+ 85.80%
1950
+ t3
1951
+ size
1952
+ 4.40%
1953
+ 6.60%
1954
+ 7.00%
1955
+ power
1956
+ 6.80%
1957
+ 14.80%
1958
+ 36.20%
1959
+ Uniform
1960
+ size
1961
+ 4.80%
1962
+ 6.60%
1963
+ 6.60%
1964
+ power
1965
+ 10.20%
1966
+ 25.40%
1967
+ 64.80%
1968
+ Laplace
1969
+ size
1970
+ 5.60%
1971
+ 5.00%
1972
+ 6.80%
1973
+ power
1974
+ 8.20%
1975
+ 14.40%
1976
+ 41.60%
1977
+ EG test: critical value obtained from multiplier bootstrap.
1978
+ stancy test can only be considered a preliminary test to check whether the process is likely
1979
+ non-causal, followed by the implementation of the EV or EG tests, which serve as the formal
1980
+ tests for non-causality. In practice, a combination of the constancy test and EV (EG) test
1981
+ is suggested.
1982
+ 5
1983
+ Empirical Applications
1984
+ In this section, we apply our non-causality tests to six financial series studied in Fries and
1985
+ Zakoian (2019): cotton price, soybean price, sugar price, coffee price, Hang Seng Index (HSI),
1986
+ and Shiller Price/Earning ratio (Shiller PE), where single or multiple spikes and asymmetric
1987
+ dynamics are exhibited.
1988
+ Fries and Zakoian (2019) found numerical evidence in favor of
1989
+ MAR(r, s) models in fitting time series with local explosiveness phases compared to purely
1990
+ causal AR models. The frequency of data is quarterly for the Shiller PE series and monthly
1991
+ for the rest10. The trajectories of these series are displayed in Figure 5.1.
1992
+ Before proceeding to our testing strategies, we must ensure that the series is stationary. The
1993
+ augmented Dickey-Fuller tests indicate no unit roots in the cotton, soybean, sugar, and coffee
1994
+ price. Neither the evidence of unit root is found in the series of HSI after a linear trend is
1995
+ subtracted. The stationarity of the Shiller PE series is secured after the first difference in the
1996
+ levels. The sample partial autocorrelation function for each series is computed, see Figure
1997
+ 5.2, to determine the order of the lag orders: cotton: 2; soybean: 2; sugar: 4; coffee: 3; HSI:
1998
+ 10The access of the replication data can be found in Fries and Zakoian (2019)
1999
+ 22
2000
+
2001
+ Table 5: Comparison of QAR-based non-causality tests
2002
+ Distribution
2003
+ test type:
2004
+ constancy test
2005
+ EV test
2006
+ EG test
2007
+ ut
2008
+ T:
2009
+ 100
2010
+ 200
2011
+ 100
2012
+ 200
2013
+ 100
2014
+ 200
2015
+ Gaussian
2016
+ size
2017
+ 2.80%
2018
+ 5.40%
2019
+ 2.20%
2020
+ 3.40 %
2021
+ 5.00%
2022
+ 4.00%
2023
+ power
2024
+ 4.20%
2025
+ 3.40%
2026
+ 0.40%
2027
+ 0.60%
2028
+ 5.60%
2029
+ 5.80%
2030
+ exponential
2031
+ size
2032
+ 3.20%
2033
+ 4.00%
2034
+ 4.40%
2035
+ 1.80%
2036
+ 4.60%
2037
+ 6.00%
2038
+ power
2039
+ 25.40%
2040
+ 38.80%
2041
+ 29.20%
2042
+ 43.20%
2043
+ 49.20%
2044
+ 76.40%
2045
+ Gamma
2046
+ size
2047
+ 3.80%
2048
+ 3.00%
2049
+ 1.80%
2050
+ 3.00%
2051
+ 5.60%
2052
+ 5.00%
2053
+ power
2054
+ 26.60%
2055
+ 37.00%
2056
+ 10.60%
2057
+ 41.60%
2058
+ 45.80%
2059
+ 75.80%
2060
+ Beta
2061
+ size
2062
+ 4.20%
2063
+ 6.60%
2064
+ 3.20%
2065
+ 3.20%
2066
+ 5.80%
2067
+ 6.00%
2068
+ power
2069
+ 18.60%
2070
+ 27.20%
2071
+ 26.40%
2072
+ 67.80%
2073
+ 42.20%
2074
+ 75.80%
2075
+ F
2076
+ size
2077
+ 6.80%
2078
+ 6.60%
2079
+ 3.60%
2080
+ 5.80%
2081
+ 5.00%
2082
+ 5.40%
2083
+ power
2084
+ 62.40%
2085
+ 81.80%
2086
+ 24.00%
2087
+ 67.60%
2088
+ 34.70%
2089
+ 67.00%
2090
+ χ2
2091
+ 5
2092
+ size
2093
+ 5.80%
2094
+ 4.40%
2095
+ 4.80%
2096
+ 4.40%
2097
+ 5.40%
2098
+ 4.60%
2099
+ power
2100
+ 9.60%
2101
+ 11.40%
2102
+ 13.40%
2103
+ 22.20%
2104
+ 22.60%
2105
+ 41.60%
2106
+ log normal
2107
+ size
2108
+ 20.20%
2109
+ 19.60%
2110
+ 5.40%
2111
+ 4.60%
2112
+ 5.40%
2113
+ 4.00%
2114
+ power
2115
+ 78.80%
2116
+ 99.60%
2117
+ 54.00%
2118
+ 92.40%
2119
+ 60.60%
2120
+ 85.80%
2121
+ t3
2122
+ size
2123
+ 3.40%
2124
+ 4.00%
2125
+ 6.20%
2126
+ 7.00%
2127
+ 6.60%
2128
+ 7.00%
2129
+ power
2130
+ 10.20%
2131
+ 13.00%
2132
+ 13.80%
2133
+ 42.40%
2134
+ 14.80%
2135
+ 36.20%
2136
+ Uniform
2137
+ size
2138
+ 6.80%
2139
+ 7.60%
2140
+ 5.00%
2141
+ 6.00%
2142
+ 6.60%
2143
+ 6.60%
2144
+ power
2145
+ 7.40%
2146
+ 8.00%
2147
+ 44.00%
2148
+ 86.80%
2149
+ 25.40%
2150
+ 64.80%
2151
+ Laplace
2152
+ size
2153
+ 5.80%
2154
+ 4.00%
2155
+ 4.40%
2156
+ 4.80%
2157
+ 5.00%
2158
+ 6.80%
2159
+ power
2160
+ 5.20%
2161
+ 5.60%
2162
+ 14.00%
2163
+ 47.20%
2164
+ 14.40%
2165
+ 41.60%
2166
+ Constancy test: with trimmed quantile interval [0.05, 0.95]
2167
+ 1; Shiller PE: 7.
2168
+ Three non-causality testing procedures: the constancy test, the EV test, and the EG test,
2169
+ are applied to each series, respectively. The corresponding results are reported in Table 6. For
2170
+ the constancy test, we consider two trimmed quantile intervals: [0.05, 0.95] and [0.10, 0.90]
2171
+ to mitigate the instability effect on the power from the subjective choice in the quantiles.
2172
+ Both in the cases of cotton and sugar series, a significant fluctuation in the coefficients is
2173
+ observed. Yet no strong evidence against linear quantile specification is found based on the
2174
+ EV or EG test. The strong rejection in the constancy test for these series may result from
2175
+ the over-rejection issue in heavy-tailed scenarios, which makes the results from the EV or
2176
+ EG tests more reliable. This does not deviate much from the results obtained by Fries and
2177
+ Zakoian (2019), where they found one non-causal root (0.94) in the cotton series and a root
2178
+ (0.92) in the sugar series. As seen in the numerical experiments, a non-causal AR model with
2179
+ coefficients near the unity makes it harder to distinguish from its causal counterpart, as well
2180
+ as generates less distinct dynamics than its causal counterpart. For three series (soybean,
2181
+ coffee, and Shiller PE), the tests show strong evidence favoring non-causal processes at 5%
2182
+ or even 1% level from all three testing strategies. For HSI, the test shows mild evidence of
2183
+ non-causality at the significance level of 10% based on the EG test. This result is compatible
2184
+ with the conclusion drawn in Fries and Zakoian (2019), where mixed models with nontrivial
2185
+ non-causal components11 are selected.
2186
+ 11The coefficients of the non-causal components in the MAR(r, s) models are not closed to the unity.
2187
+ 23
2188
+
2189
+ Figure 5.1: Financial series trajectories
2190
+ 24
2191
+
2192
+ cottonprice,monthly,08/1972-07/2017
2193
+ soybeanprice,monthly,01/1973-05/2006
2194
+ 2
2195
+ 12
2196
+ 1.5
2197
+ 10
2198
+ 8
2199
+ 0.5
2200
+ 0
2201
+ 4
2202
+ 0
2203
+ 100
2204
+ 200
2205
+ 300
2206
+ 400
2207
+ 500
2208
+ 600
2209
+ 0
2210
+ 100
2211
+ 200
2212
+ 300
2213
+ 400
2214
+ 500
2215
+ sugarprice,monthly,11/1962-08/2018
2216
+ coffee price,monthly,04/1976-05/2018
2217
+ 0.6
2218
+ 3
2219
+ 0.4
2220
+ 0.2
2221
+ 0
2222
+ 0
2223
+ 0
2224
+ 100
2225
+ 200
2226
+ 300
2227
+ 400
2228
+ 500
2229
+ 600
2230
+ 700
2231
+ 0
2232
+ 100
2233
+ 200
2234
+ 300
2235
+ 400
2236
+ 500
2237
+ 600
2238
+ x1HangSengIndex,monthly,11/1986-03/2017
2239
+ Shiller Price/Earning ratio,quarterly,Q1/1881-Q2/2017
2240
+ 50
2241
+ 3
2242
+ 40
2243
+ 2
2244
+ 30
2245
+ 20
2246
+ 10
2247
+ 0
2248
+ 0
2249
+ 100
2250
+ 200
2251
+ 300
2252
+ 400
2253
+ 0
2254
+ 100
2255
+ 200
2256
+ 300
2257
+ 400
2258
+ 500
2259
+ 600Figure 5.2: Sample partial autocorrelation functions of six financial series
2260
+ 25
2261
+
2262
+ Sample PACF of cotton
2263
+ Sample PACF of soybean
2264
+ Sample Partial Autocorrelation
2265
+ Sample Partial Autocorrelation
2266
+ 0.5
2267
+ 0.5
2268
+ 0.5
2269
+ -0.5
2270
+ 0
2271
+ 5
2272
+ 10
2273
+ 15
2274
+ 20
2275
+ 0
2276
+ 5
2277
+ 10
2278
+ 15
2279
+ 20
2280
+ Lag
2281
+ Lag
2282
+ Sample PACF of sugar
2283
+ SamplePACFof coffee
2284
+ Sample Partial Autocorrelation
2285
+ Sample Partial Autocorrelation
2286
+ 0.5
2287
+ 0.5
2288
+ 0
2289
+ -0.5
2290
+ -0.5
2291
+ 0
2292
+ 5
2293
+ 10
2294
+ 15
2295
+ 20
2296
+ 0
2297
+ 5
2298
+ 10
2299
+ 15
2300
+ 20
2301
+ Lag
2302
+ Lag
2303
+ Sample PACF of detrended HSI
2304
+ Sample PACF of first difference of Shiller P/E
2305
+ Autocorrelation
2306
+ Sample Partial Autocorrelation
2307
+ 0.8
2308
+ 0.6
2309
+ 0.5
2310
+ Partial
2311
+ 0.4
2312
+ Sample
2313
+ 0.2
2314
+ 0
2315
+ -0.5
2316
+ 0
2317
+ 5
2318
+ 10
2319
+ 15
2320
+ 20
2321
+ 0
2322
+ 5
2323
+ 10
2324
+ 15
2325
+ 20
2326
+ Lag
2327
+ LagTable 6: Non-causality tests for six financial series in Fries and Zakoian (2019)
2328
+ Financial series
2329
+ test type:
2330
+ constancy test
2331
+ EV test
2332
+ EG test
2333
+ total AR order(r + s)
2334
+ [0.05, 0.95]†
2335
+ [0.10, 0.90]
2336
+ Cotton
2337
+ 2
2338
+ statistic
2339
+ 6.897∗∗
2340
+ 4.738∗∗
2341
+ 0.012
2342
+ 0.025
2343
+ critical value12
2344
+ (3.393)
2345
+ (3.287)
2346
+ (0.046)
2347
+ (0.032)
2348
+ Soybean
2349
+ 2
2350
+ statistic
2351
+ 4.703∗∗
2352
+ 4.445∗∗
2353
+ 0.209∗∗
2354
+ 0.027∗∗
2355
+ critical value
2356
+ (3.393)
2357
+ (3.287)
2358
+ (0.158)
2359
+ (0.021)
2360
+ Sugar
2361
+ 4
2362
+ statistic
2363
+ 306.043∗∗
2364
+ 144.025∗∗
2365
+ 0.009
2366
+ 0.065
2367
+ critical value
2368
+ (5.560)
2369
+ (5.430)
2370
+ (0.102)
2371
+ (0.100)
2372
+ coffee
2373
+ 3
2374
+ statistic
2375
+ 8.457∗∗
2376
+ 6.992∗∗
2377
+ 0.149∗∗
2378
+ 0.044∗∗
2379
+ critical value
2380
+ (4.523)
2381
+ (4.383)
2382
+ (0.089)
2383
+ (0.025)
2384
+ Hang Seng Index
2385
+ 1
2386
+ statistic
2387
+ 0.017
2388
+ 0.012
2389
+ 0.168
2390
+ 0.078∗
2391
+ critical value
2392
+ (2.140)
2393
+ (2.102)
2394
+ (0.176)
2395
+ (0.083)
2396
+ Shiller’s P/E ratio
2397
+ 7
2398
+ statistic
2399
+ 15.105∗∗
2400
+ 9.027∗∗
2401
+ 0.197∗∗
2402
+ 0.135∗∗
2403
+ critical value
2404
+ (8.578)
2405
+ (8.368)
2406
+ (0.189)
2407
+ (0.066)
2408
+ † the trimmed quantile interval considered in the constancy test.
2409
+ ∗∗ stands for significance at level 5% and ∗ stands for significance at 10%.
2410
+ the critical value at 10% significance level for the EG test in the case of Hang Seng Index is 0.061.
2411
+ 6
2412
+ Extensions and conclusion
2413
+ 6.1
2414
+ Some Extensions
2415
+ So far, the preceding discussion has been confined to MAR(r, s) driven by iid innovations.
2416
+ Within this framework, the only possible source of non-linearity in MAR(r, s) is non-causality,
2417
+ which contributes to the consistency of the test in the aforementioned methods. However,
2418
+ stylized nonlinear dynamics like conditional heteroskedasticity or asymmetric dynamics are
2419
+ prevalently observed in the financial and macroeconomic data, which renders it more demand-
2420
+ ing to detect non-causality in a time series process. A more robust methodology applicable
2421
+ to AR models accommodating non-linear features needs investigation. The critical point is
2422
+ how to disentangle non-linearity induced by non-causality from the other alternatives. If
2423
+ these non-linear features can be captured by a parametric model, one plausible solution is to
2424
+ incorporate these non-linear terms into the baseline model (2.1). Below we list some possible
2425
+ extensions where this strategy is employed.
2426
+ Asymmetric Dynamics
2427
+ This can be solved by allowing varying coefficients in the MAR(r, s)
2428
+ model in the spirit of the random coefficient model, defined by
2429
+ ˜φ(L) ˜ψ(L−1)Yt = ut
2430
+ (6.1)
2431
+ where ˜φ(L) = 1 − φ1(Ut)L − · · · − φr(Ut)Lr and ˜ψ = 1 − ψ1(Ut)L−1 − · · · − ψs(Ut)L−s, Ut
2432
+ is an iid sequence of random variables following standard uniform distribution, and ut is an
2433
+ iid innovation sequence satisfying Assumptions 1. Denote
2434
+ Ωc =
2435
+
2436
+ φ1(Ut)
2437
+ . . .
2438
+ φr−1(Ut)
2439
+ φr(Ut)
2440
+ Ir−1
2441
+ 0(r−1)
2442
+
2443
+ and
2444
+ Ωnc =
2445
+
2446
+ ψ1(Ut)
2447
+ . . .
2448
+ ψs−1(Ut)
2449
+ ψs(Ut)
2450
+ Is−1
2451
+ 0(s−1)
2452
+
2453
+ .
2454
+ 26
2455
+
2456
+ Similar to the p-th order autoregressive process, which is designed to accommodate asym-
2457
+ metric dynamics in Koenker and Xiao (2006) for linear QAR model, we need to assume
2458
+ E (Ωc ⊗ Ωc) and E (Ωnc ⊗ Ωnc) have eigenvalues with moduli less than one. This equation
2459
+ (6.1) is able to mimic asymmetric dynamics since φj, ψj’s are functions [0, 1] → R. The
2460
+ definition of non-causality in this context will be adapted to that ˜ψ(L−1) does not decline
2461
+ to constant. In the causal situation, this model (6.1) works like a random coefficient model
2462
+ with lags. The linearity of the conditional mean is restored, and the linear quantile dynamic
2463
+ model with varying coefficients over different quantiles remains the correct specification for
2464
+ conditional quantiles of Yt. On the other hand, when the process is non-causal, it is con-
2465
+ ceivable that linearity will not hold anymore. Therefore, the methodology relying on the
2466
+ specification tests is applicable here.
2467
+ Volatility Clustering
2468
+ Concerning volatility clustering, which is routinely modeled by the
2469
+ quadratic ARCH/GARCH model in squared residuals. Another popular choice is to replace
2470
+ the squared value with the absolute value suggested by Taylor (2008) and make the model a
2471
+ linear ARCH.
2472
+ φ(L)ψ(L−1)Yt = vt
2473
+ where vt = σtut
2474
+ σt = γ0 + γ1|vt−1| + · · · + γq|vt−q|
2475
+ (6.2)
2476
+ where φ(L) and ψ(L−1) are defined following (2.1), and ut is a sequence of iid innovations.
2477
+ The linear ARCH model is able to capture the correlation in the variance and meanwhile
2478
+ preserves a relatively simple linear specification compared to other alternatives like GARCH.
2479
+ Under the H0 where ψ(L−1) degenerates to 1, the linearity of conditional quantile specifica-
2480
+ tion still holds after adding {|vt−j|}q
2481
+ j=1 into the regression equation.
2482
+ QYt (τ|Yt−1, Yt−2, . . . ) = φ1Yt−1 + · · · + φrYt−r + Qut(τ) (γ0 + γ1|vt−1| + · · · + γq|vt−q|)
2483
+ = Qut(τ)γ0
2484
+
2485
+ ��
2486
+
2487
+ ˜γ0(τ)
2488
+ + Qut(τ)γ1
2489
+
2490
+ ��
2491
+
2492
+ ˜γ1(τ)
2493
+ |vt−1| + · · · + Qut(τ)γq
2494
+
2495
+ ��
2496
+
2497
+ ˜γq(τ)
2498
+ |vt−q| + φ1Yt−1 + · · · + φrYt−r
2499
+ = ˜γ0(τ) + ˜γ1(τ)|vt−1| + · · · + ˜γq(τ)|vt−q| + φ1Yt−1 + · · · + φrYt−r,
2500
+ (6.3)
2501
+ where |vt−j| can be recovered by Yt−j − φ1Yt−j−1 − · · · − φrYt−j−r. Under non-causality,
2502
+ the explicit expression of the conditional quantile of Yt remains unclear. Nevertheless, it
2503
+ cannot be characterized by encompassing linear combinations of residuals in the model.
2504
+ Consequently, the linear dynamic quantile model would not be the correct specification
2505
+ conceivably.
2506
+ Overall, these two possible extensions to cases with nonlinear dynamics are tentative since
2507
+ the statistical properties of conditional quantiles of Yt defined by (6.1) and (6.2) require
2508
+ further investigation, which opens a couple of lines for future research. Some simulation
2509
+ trials in Appendix 7.4 have shown the validity of the proposed strategies.
2510
+ 27
2511
+
2512
+ 6.2
2513
+ Perspective from Extreme Quantiles
2514
+ One intriguing observation from the simulation is that QAR estimates at extreme quantiles
2515
+ might be informative for identifying the true models even though linear quantile specification
2516
+ is incorrect for the conditional quantile of non-causal processes. As depicted in Figure 4.1,
2517
+ for MAR(0, 1) processes with coefficient 0.6 driven from asymmetric innovations,
2518
+
2519
+ 1 − 0.6L−1�
2520
+ Yt = ut ⇔ Yt = (0.6)−1Yt−1 − (0.6)−1ut−1.
2521
+ The estimated slope of Yt−1 approaches (0.6)−1 when the quantile gets close to 0 or 1.
2522
+ Somehow it indicates that the linear correlation at extreme quantiles between Yt and Yt−1
2523
+ can help to discriminate causality and non-causality. A similar idea has been adopted for
2524
+ model selection based on the extreme clustering of residuals by Fries and Zakoian (2019), but
2525
+ the method is restricted to α−stable distributions. Rich data is required for further analysis
2526
+ to get a less biased estimator for conditional quantiles close to 0 or 1. This opens a possible
2527
+ avenue for future research in line with identifying causal and non-causal processes using tail
2528
+ information of processes.
2529
+ 6.3
2530
+ Conclusion
2531
+ This paper introduces three novel testing strategies for non-causality in linear time series
2532
+ within the quantile regression framework. The tests exploit the non-linearity of autoregressive
2533
+ processes with non-causality and achieve the objective of detecting non-causality based on the
2534
+ well-developed inference under the QAR framework. The constancy test shares the simplicity
2535
+ of implementation but lacks consistency since the behavior of linear quantile autoregression
2536
+ for non-causal processes is not clear yet.
2537
+ This issue from the constancy test is tackled
2538
+ by testing the specification of linear conditional quantile models to detect non-causality.
2539
+ Specification-based non-causality testing procedures like EV and EG tests yield stable size
2540
+ at a nominal level and fairly satisfactory power. On the one hand, the EV test outperforms
2541
+ the EG test in platykurtic and leptokurtic situations or symmetric distributions. On the
2542
+ other hand, the EG test is less computationally cumbersome and shows better performance
2543
+ when the process is skewed. However, no method is placed in a dominating situation. Thus,
2544
+ a combined testing procedure with the constancy test as a preliminary check complemented
2545
+ with either EV or EG test is suggested for practitioners.
2546
+ Some possible extensions to accommodate different dependence in model innovations, which
2547
+ might bring obstacles in detecting non-causality, are proposed at the end of the paper. Some
2548
+ simulation results in QAR estimate at extreme quantiles indicate the possibility of identifying
2549
+ non-causal processes by employing information from the tails of processes.
2550
+ 28
2551
+
2552
+ References
2553
+ Alessi, L., Barigozzi, M. and Capasso, M. (2011) Non-fundamentalness in structural econo-
2554
+ metric models: A review. International Statistical Review, 79, 16–47.
2555
+ Angrist, J., Chernozhukov, V. and Fern´andez-Val, I. (2006) Quantile regression under mis-
2556
+ specification, with an application to the us wage structure. Econometrica, 74, 539–563.
2557
+ Breid, F. J., Davis, R. A., Lh, K.-S. and Rosenblatt, M. (1991) Maximum likelihood es-
2558
+ timation for noncausal autoregressive processes.
2559
+ Journal of Multivariate Analysis, 36,
2560
+ 175–198.
2561
+ Breidt, F. J., Davis, R. A., Trindade, A. A. et al. (2001) Least absolute deviation estimation
2562
+ for all-pass time series models. The Annals of Statistics, 29, 919–946.
2563
+ Brockwell, P. J. and Davis, R. A. (2009) Time series: theory and methods. Springer Science
2564
+ & Business Media.
2565
+ Cavaliere, G., Nielsen, H. B. and Rahbek, A. (2020) Bootstrapping noncausal autoregressions:
2566
+ with applications to explosive bubble modeling. Journal of Business & Economic Statistics,
2567
+ 38, 55–67.
2568
+ Chen, B., Choi, J. and Escanciano, J. C. (2017) Testing for fundamental vector moving
2569
+ average representations. Quantitative Economics, 8, 149–180.
2570
+ Escanciano, J. C. and Goh, S.-C. (2012) Conditional density estimation in linear quantile
2571
+ regression. (unpublished).
2572
+ — (2014) Specification analysis of linear quantile models. Journal of Econometrics, 178,
2573
+ 495–507.
2574
+ Escanciano, J. C. and Velasco, C. (2010) Specification tests of parametric dynamic condi-
2575
+ tional quantiles. Journal of Econometrics, 159, 209–221.
2576
+ Fries, S. and Zakoian, J.-M. (2019) Mixed causal-noncausal ar processes and the modelling
2577
+ of explosive bubbles. Econometric Theory, 35, 1234–1270.
2578
+ Gouri´eroux, C. and Zako¨ıan, J.-M. (2017) Local explosion modelling by non-causal process.
2579
+ Journal of the Royal Statistical Society: Series B (Statistical Methodology), 79, 737–756.
2580
+ Hall, P. and Sheather, S. J. (1988) On the distribution of a studentized quantile. Journal of
2581
+ the Royal Statistical Society: Series B (Methodological), 50, 381–391.
2582
+ Hecq, A. and Sun, L. (2021) Selecting between causal and noncausal models with quantile
2583
+ autoregressions. Studies in Nonlinear Dynamics & Econometrics, 25, 393–416.
2584
+ Hecq, A. and Voisin, E. (2021) Forecasting bubbles with mixed causal-noncausal autoregres-
2585
+ sive models. Econometrics and Statistics, 20, 29–45.
2586
+ Jin, W. (2021) Estimation of time series models using generalized spectral distribution.
2587
+ Preprint.
2588
+ 29
2589
+
2590
+ Koenker, R. and Xiao, Z. (2002) Inference on the quantile regression process. Econometrica,
2591
+ 70, 1583–1612.
2592
+ — (2006) Quantile autoregression.
2593
+ Journal of the American statistical association, 101,
2594
+ 980–990.
2595
+ Lanne, M. and Luoto, J. (2013) Autoregression-based estimation of the new keynesian phillips
2596
+ curve. Journal of Economic Dynamics and Control, 37, 561–570.
2597
+ Lanne, M., Luoto, J. and Saikkonen, P. (2012) Optimal forecasting of noncausal autoregres-
2598
+ sive time series. International Journal of Forecasting, 28, 623–631.
2599
+ Lanne, M., Meitz, M., Saikkonen, P. et al. (2013) Testing for linear and nonlinear predictabil-
2600
+ ity of stock returns. Journal of Financial Econometrics, 11, 682–705.
2601
+ Lii, K.-S. and Rosenblatt, M. (1992) An approximate maximum likelihood estimation for non-
2602
+ gaussian non-minimum phase moving average processes. Journal of Multivariate Analysis,
2603
+ 43, 272–299.
2604
+ — (1996) Maximum likelihood estimation for nongaussian nonminimum phase arma se-
2605
+ quences. Statistica Sinica, 1–22.
2606
+ Portnoy, S. and Koenker, R. (1989) Adaptive l-estimation for linear models. The Annals of
2607
+ Statistics, 17, 362–381.
2608
+ Rosenblatt, M. (2000) Gaussian and non-Gaussian linear time series and random fields.
2609
+ Springer Science & Business Media.
2610
+ Taylor, S. J. (2008) Modelling financial time series. world scientific.
2611
+ Velasco, C. (2022) Estimation of time series models using residuals dependence measures.
2612
+ The Annals of Statistics, 50, 3039–3063.
2613
+ Velasco, C. and Lobato, I. N. (2018) Frequency domain minimum distance inference for
2614
+ possibly noninvertible and noncausal arma models. The Annals of Statistics, 46, 555–579.
2615
+ 30
2616
+
2617
+ 7
2618
+ Appendices
2619
+ 7.1
2620
+ Some Properties of Non-causal Autoregressive Processes
2621
+ Higher-order Dependence of All-pass Time Series Models
2622
+ Following the same setup
2623
+ in Example 2.3,
2624
+ ˜ut =
2625
+ 1 − ψL
2626
+ 1 − ψL−1 ut =
2627
+
2628
+
2629
+ j=−∞
2630
+ ρjut+j.
2631
+ The skewness of ˜ut is
2632
+ E
2633
+
2634
+ ˜u3
2635
+ t
2636
+
2637
+ =
2638
+
2639
+
2640
+ j=−∞
2641
+ ρ3
2642
+ j E
2643
+
2644
+ u3
2645
+ t
2646
+
2647
+ =
2648
+
2649
+ 1 − 3ψ2(ψ + 1)
2650
+ ψ2 + ψ + 1
2651
+
2652
+ E
2653
+
2654
+ u3
2655
+ t
2656
+
2657
+ , |ψ| < 1,
2658
+ where −1 <
2659
+
2660
+ 1 − 3ψ2(ψ+1)
2661
+ ψ2+ψ+1
2662
+
2663
+ < 1.
2664
+ From the above expression, it is easy to tell that the
2665
+ all-pass filter preserves the symmetry of the innovations if the original ones are not skewed
2666
+ but might alter the direction of skewness if ut is asymmetric by varying values of ψ. Apart
2667
+ from the correlation in the squared value of ˜ut that has been explicitly shown in Example
2668
+ 2.3, here we derive the closed-form solution for the dependence at order 3. It suffices to show
2669
+ Cov
2670
+
2671
+ ˜u3
2672
+ t , ˜u3
2673
+ t+h
2674
+
2675
+ is nonzero for h ̸= 0.
2676
+ E
2677
+
2678
+ ˜u3
2679
+ t ˜u3
2680
+ t+h
2681
+
2682
+ = E
2683
+
2684
+
2685
+
2686
+
2687
+ j=−∞
2688
+
2689
+
2690
+ i=−∞
2691
+
2692
+
2693
+ m=−∞
2694
+
2695
+
2696
+ n=−∞
2697
+
2698
+
2699
+ l=−∞
2700
+
2701
+
2702
+ k=−∞
2703
+ ρjρiρmρnρlρkut+jut+iut+mut+h+nut+h+kut+h+l
2704
+
2705
+
2706
+ =
2707
+
2708
+
2709
+
2710
+
2711
+ j=−∞
2712
+ ρ3
2713
+ jρ3
2714
+ j+h
2715
+
2716
+
2717
+
2718
+ E(u6
2719
+ t ) − 15 E(u4
2720
+ t ) E(u2
2721
+ t ) − 10 E2(u3
2722
+ t ) − 15 E3(u2
2723
+ t )
2724
+
2725
+ + 3
2726
+
2727
+
2728
+
2729
+
2730
+ j=−∞
2731
+
2732
+ ρj+hρ3
2733
+ j + ρ3
2734
+ j+hρj
2735
+
2736
+
2737
+ � E(u4
2738
+ t ) E(u2
2739
+ t )
2740
+ +
2741
+
2742
+
2743
+
2744
+
2745
+
2746
+
2747
+
2748
+ j=−∞
2749
+ ρ3
2750
+ j
2751
+
2752
+
2753
+ 2
2754
+ + 9
2755
+
2756
+
2757
+
2758
+
2759
+ j=−∞
2760
+ ρ2
2761
+ j+hρj
2762
+
2763
+
2764
+
2765
+
2766
+
2767
+
2768
+ j=−∞
2769
+ ρj+hρ2
2770
+ j
2771
+
2772
+
2773
+
2774
+
2775
+ � E2(u3
2776
+ t )
2777
+ after using �∞
2778
+ j=−∞ ρjρj+h = 0 (coincides with no correlation property of all-pass time series
2779
+ process) and �∞
2780
+ j=−∞ ρ2
2781
+ j = 1 (variance preserving property),
2782
+ Cov
2783
+
2784
+ ˜u3
2785
+ t , ˜u3
2786
+ t+h
2787
+
2788
+ = E
2789
+
2790
+ ˜u3
2791
+ t ˜u3
2792
+ t+h
2793
+
2794
+ − E
2795
+
2796
+ ˜u3
2797
+ t
2798
+
2799
+ E
2800
+
2801
+ ˜u3
2802
+ t+h
2803
+
2804
+ generally is not zero. For instance, h = 1, after simplification
2805
+ Cov
2806
+
2807
+ ˜u3
2808
+ t , ˜u3
2809
+ t+1
2810
+
2811
+ = α1 E(u6
2812
+ t ) +
2813
+
2814
+ α2 E(u4
2815
+ t ) + α4 E2(u2
2816
+ t )
2817
+
2818
+ E(u2
2819
+ t ) + α3 E2(u3
2820
+ t )
2821
+ with
2822
+
2823
+
2824
+
2825
+
2826
+
2827
+
2828
+
2829
+
2830
+
2831
+
2832
+
2833
+
2834
+
2835
+
2836
+
2837
+
2838
+
2839
+ α1 = −3ψ5(1−ψ2)3
2840
+ ψ4+ψ2+1
2841
+ α2 = −3ψ3(1 − ψ2)3 + 45ψ5(1−ψ2)3
2842
+ ψ4+ψ2+1
2843
+ α3 = 30ψ5(1−ψ2)3
2844
+ ψ4+ψ2+1
2845
+ − 9(1−ψ2)3(2ψ+1)ψ2
2846
+ (ψ2+ψ+1)2
2847
+ α4 = 45ψ5(1−ψ2)3
2848
+ ψ4+ψ2+1
2849
+ 31
2850
+
2851
+ where zeros are not attained at the same value of ψ ∈ (−1, 1) \ {0}.
2852
+ Conditional Density Function of Non-causal Autoregressions
2853
+ In this section, we
2854
+ try to study the properties of the conditional density function of the response variable in the
2855
+ presence of non-causality in the autoregressive process through simulations. Consider a pair
2856
+ of MAR(1, 0) and MAR(0, 1) processes generated from iid innovations following the same
2857
+ distribution with the density function fu(·),
2858
+
2859
+
2860
+
2861
+ Yt = 0.6Yt−1 + ut
2862
+ ˜Yt = 0.6−1 ˜Yt−1 + ut = 0.6 ˜Yt+1 − 0.6ut+1.
2863
+ (7.1)
2864
+ One is purely causal, and the other is purely non-causal with a coefficient of 0.6. We start
2865
+ by analyzing f (Yt ≤ y|Yt−1 = x) in the causal case.
2866
+ f (Yt = y|Yt−1 = x) = dP (Yt ≤ y|Yt−1 = x)
2867
+ dy
2868
+ = dP (0.6Yt−1 + ut ≤ y|Yt−1 = x)
2869
+ dy
2870
+ = dP (ut ≤ y − 0.6x|Yt−1 = x)
2871
+ dy
2872
+ = fu (y − 0.6x) = fu (y − 0.6Yt−1) ,
2873
+ (7.2)
2874
+ It is not difficult to conclude from equation 7.2 that the conditional density of Yt given Yt−1
2875
+ is shifting horizontally as the value of Yt−1 varies. Despite the change in the location of the
2876
+ density function, the rest remains the same across different values of Yt−1.
2877
+ Similarly, we derive the conditional density function for the non-causal case,
2878
+ f
2879
+ � ˜Yt = y| ˜Yt−1 = x
2880
+
2881
+ =
2882
+ f
2883
+ � ˜Yt−1 = x| ˜Yt = y
2884
+
2885
+ f
2886
+ � ˜Yt = y
2887
+
2888
+ f( ˜Yt−1 = x)
2889
+ by Bayes rule
2890
+ =
2891
+ f
2892
+
2893
+ 0.6 ˜Yt − 0.6ut = x | ˜Yt = y
2894
+
2895
+ f
2896
+ � ˜Yt = y
2897
+
2898
+ f (Yt−1 = x)
2899
+ by definition of ˜Yt−1
2900
+ =
2901
+ fu
2902
+ �y − 0.6−1x
2903
+ � f
2904
+ � ˜Yt = y
2905
+
2906
+ f (Yt−1 = x)
2907
+ by the independence of ut and ˜Yt
2908
+ =
2909
+ fu
2910
+ �y − 0.6−1x
2911
+ � f
2912
+ � ˜Yt = y
2913
+
2914
+ � ∞
2915
+ −∞ f
2916
+ � ˜Yt−1 = x| ˜Yt = s
2917
+
2918
+ f
2919
+ � ˜Yt = s
2920
+
2921
+ ds
2922
+ law of total probability
2923
+ =
2924
+ fu
2925
+ �y − 0.6−1x
2926
+ � f
2927
+ � ˜Yt = y
2928
+
2929
+ � ∞
2930
+ −∞ fu (s − 0.6−1x) f
2931
+ � ˜Yt = s
2932
+
2933
+ ds
2934
+ .
2935
+ (7.3)
2936
+ There is no general closed-form solution to this expression. Note that no x plays a role in
2937
+ f(Yt = y), and the denominator is x−dependent but highly nonlinear due to the integration.
2938
+ 32
2939
+
2940
+ If we assign additive property13 to the marginal distribution of Yt. This nonlinearity can be
2941
+ shown more clearly. Say ut follows an exponential distribution with rate λ, then the equation
2942
+ 7.3 has the explicit form
2943
+ f (Yt = y|Yt−1 = x)
2944
+ =
2945
+ �� ∞
2946
+ −∞ e−isy �∞
2947
+ j=0
2948
+ λ
2949
+ λ−is(0.6)j ds
2950
+
2951
+ λe−(x−0.6y)
2952
+ �� ∞
2953
+ −∞ e−isx �∞
2954
+ j=0
2955
+ λ
2956
+ λ−is(0.6)j ds
2957
+
2958
+ I (x − 0.6y ≥ 0) .
2959
+ This suggests that the shape (functional form) of the density function would differ, corre-
2960
+ sponding to the choice of x. The following simulation experiment demonstrates this argu-
2961
+ ment. In this simulation, we generate two AR(1) processes (7.1) by exponentially distributed
2962
+ (a) conditional density of Yt in the causal
2963
+ case
2964
+ (b) conditional density of ˜Yt in the non-
2965
+ causal case
2966
+ Figure 7.1: conditional density of Yt given different x
2967
+ innovations with rate 1. The sample size is 500. Estimated conditional density functions
2968
+ f (y|Yt−1 = x) are plotted in Figure 7.1, given five choices of x: 10%, 30%, 50%, 70%, and
2969
+ 90% percentiles of Yt−1 sample. The density function is estimated by akj command in R
2970
+ Studio, which is a univariate adaptive kernel estimation used by Portnoy and Koenker (1989).
2971
+ The left panel displays the result for the causal case. As shown in (7.2), density functions
2972
+ in different colors (values of x) share the same shape but the location. Whereas in the right
2973
+ panel, where the estimated density is plotted, five estimated conditional density functions
2974
+ present distinct modes, skewness, and kurtosis.
2975
+ 7.2
2976
+ Asymptotic Properties of QAR Estimates
2977
+ QAR is first proposed by Koenker and Xiao (2006) to study the conditional quantile functions
2978
+ of the following pth-order AR process,
2979
+ Yt = θ0(Ut) + θ1(Ut)Yt−1 + · · · + θp(Ut)Yt−p,
2980
+ (7.4)
2981
+ where Ut is an iid sequence distributed as a standard uniform. This expression can be re-
2982
+ garded as an AR(p) process allowing coefficients of lags to be random but somewhat depen-
2983
+ 13Additive property states the sum of independent variables from the same distribution would follow the
2984
+ distribution from the same family. The common distributions which share this property are α-stable distri-
2985
+ bution, exponential distribution, geometric distribution, etc.
2986
+ 33
2987
+
2988
+ 3
2989
+ 0.10
2990
+ Density
2991
+ 0.30
2992
+ N
2993
+ 0.50
2994
+ 0.70
2995
+ 0.90
2996
+ 0000
2997
+ -2
2998
+ 0
2999
+ 2
3000
+ 4
3001
+ 6
3002
+ present3
3003
+ Density
3004
+ 2
3005
+ 0.10
3006
+ 0.30
3007
+ 0.50
3008
+ 0.70
3009
+ 0.90
3010
+ OD
3011
+ -3
3012
+ -2
3013
+ -1
3014
+ 0
3015
+ presentdent on each other. By the property of monotone transformation, our target, the conditional
3016
+ quantile at each τ ∈ (0, 1), can be written as
3017
+ QYt (τ|Yt−1, . . . , Yt−p) = θ0(τ) + θ1(τ)Yt−1 + · · · + θp(τ)Yt−p,
3018
+ τ ∈ (0, 1).
3019
+ (7.5)
3020
+ The estimates of θ(τ) = (θ0(τ), θ1(τ), . . . , θp(τ))′ are obtained by minimizing the following
3021
+ objective function,
3022
+ ˆθ(τ) = argmin
3023
+ θ∈Rp+1
3024
+ T
3025
+
3026
+ t=1
3027
+ ρτ(Yt − X′
3028
+ tθ),
3029
+ (7.6)
3030
+ where X′
3031
+ t = (1, Yt−1, . . . , Yt−p) and check function ρτ(u) = u (τ − I(u < 0)). A vectorized
3032
+ form of (7.4) is introduced to facilitate the asymptotic analysis of the estimates ˆθ(τ),
3033
+ Y t = AtY t−1 + V t,
3034
+ with
3035
+ At =
3036
+
3037
+ θ1(Ut)
3038
+ θ2(Ut)
3039
+ . . .
3040
+ θp(Ut)
3041
+ Ip−1
3042
+ 0(p−1)×1
3043
+
3044
+ and V t =
3045
+
3046
+ ϵt
3047
+ 0(p−1)×1
3048
+
3049
+ where ϵt = θ0(Ut) − E (θ0(Ut)) and Y t = (Yt, Yt−1, . . . , Yt−p+1)′. The study of asymptotic
3050
+ properties is based on the following conditions
3051
+ 1. {ϵt} are iid innovations with mean 0 and finite variance σ2 < ∞. The distribution
3052
+ function of ϵt, F, admits a continuous density f(ϵ) away from zero on E = {ϵ : 0 <
3053
+ F(ϵ) < 1}.
3054
+ 2. The eigenvalues of E (At ⊗ At) have moduli within unity.
3055
+ 3. The conditional distribution function P(Yt < ·|Yt−1, Yt−2, . . . ) denoted by Ft−1(·) has
3056
+ a density function ft−1(·) uniformly integrable on E.
3057
+ Under these three assumptions,
3058
+ Σ−1/2√
3059
+ T
3060
+ �ˆθ(τ) − θ(τ)
3061
+
3062
+ →d Bp+1(τ)
3063
+ where Bk(τ) is a k-dimensional Brownian bridge. By definition it can be written as N(0, τ(1−
3064
+ τ)Ik) for any given τ. Σ is a matrix characterized by density and distribution function of ϵt.
3065
+ Let Σ0 = E (XtX′
3066
+ t) and Σ1 = E
3067
+
3068
+ ft−1
3069
+
3070
+ F −1
3071
+ t−1(τ)
3072
+
3073
+ XtX′
3074
+ t
3075
+
3076
+ . Then Σ is defined as Σ−1
3077
+ 1 Σ0Σ−1
3078
+ 1 .
3079
+ In the special case where the data generating process is a conventional causal AR model
3080
+ with fixed coefficients, the conditional density would be independent of Xt. We will have
3081
+ Σ1 = f(F −1(τ)) E (XtX′
3082
+ t). Further we can simplify the Σ to f−2(F −1(τ)) E−1 (XtX′
3083
+ t).
3084
+ 7.3
3085
+ Proof to Theorem 3.1
3086
+ Non-causality ⇒ Nonlinear conditional quantile
3087
+ We prove this statement by con-
3088
+ tradiction. Consider a stationary MAR(r, s) with innovations satisfying Assumption 1 and
3089
+ s > 0.
3090
+ Assume all conditional quantiles of Yt are linear in (Yt−1, Yt−2, . . . , Yt−p), where
3091
+ 34
3092
+
3093
+ p = r + s. That is,
3094
+ QYt (τ|Yt−1, Yt−2, . . . , Yt−p) = θ0(τ) + θ1(τ)Yt−1 + · · · + θp(τ)Yt−p for any given τ ∈ (0, 1).
3095
+ By aggregating QYt (τ|Yt−1, Yt−2, . . . , Yt−p) over the entire quantile range, the linearity is
3096
+ maintained for the aggregation. Therefore, we have
3097
+ � 1
3098
+ 0
3099
+ QYt (τ|Yt−1, Yt−2, . . . , Yt−p) dτ =
3100
+ � 1
3101
+ 0
3102
+ θ0(τ)dτ +
3103
+ � 1
3104
+ 0
3105
+ θ1(τ)dτYt−1 + · · · +
3106
+ � 1
3107
+ 0
3108
+ θp(τ)dτYt−p
3109
+ (7.7)
3110
+ Equivalently, we can yield
3111
+ E (Yt|Yt−1, Yt−2, . . . , Yt−p) = θ0 + θ1Yt−1 + · · · + θpYt−p,
3112
+ which contradicts the statement in Corollary 5.2.3 by Rosenblatt (2000) on the nonlinearity
3113
+ of conditional expectation in past information with the presence of non-causality. Thus, the
3114
+ presumed statement is not valid. That is to say, there exists a conditional quantile of Yt
3115
+ which is nonlinear in the past information for at least one τ ∈ (0, 1) if s > 0.
3116
+ Nonlinear conditional quantile ⇒ Non-causality
3117
+ This can be demonstrated equiva-
3118
+ lently by its contrapositive statement: an AR process Yt being causal implies its conditional
3119
+ quantile QYt (τ | It−1) is linear for all τ ∈ (0, 1).
3120
+ If a MAR(r, s) is purely causal, i.e., s=0 and r=p. Then we have
3121
+ Yt = φ1Yt−1 + φ2Yt−2 + · · · + φrYt−r + ut,
3122
+ where ut is independent of past observations.
3123
+ The conditional quantile of the response
3124
+ variable can be directly expressed as a linear combination of {Yt−j}j=1,...,r,
3125
+ QYt (τ|Yt−1, . . . , Yt−r) = Qut (τ|Yt−1, . . . , Yt−r) + φ1Yt−1 + φ2Yt−2 + · · · + φrYt−r for ∀τ ∈ (0, 1)
3126
+ = Qut(τ)
3127
+ � �� �
3128
+ θ0(τ)
3129
+ + φ1
3130
+ ����
3131
+ θ1(τ)
3132
+ Yt−1 + φ2
3133
+ ����
3134
+ θ2(τ)
3135
+ Yt−2 + · · · + φr
3136
+ ����
3137
+ θr(τ)
3138
+ Yt−r.
3139
+ 7.4
3140
+ Simulations of Extensions
3141
+ In this section, we present some simulation results of non-causality testing strategies extended
3142
+ to the autoregressive processes with heteroskedasticity. In this stage, we assume the form of
3143
+ heteroskedasticity is known.
3144
+ Consider a pair of MAR(1, 0)-ARCH(1) and MAR(0, 1)-ARCH(1) processes defined by
3145
+
3146
+
3147
+
3148
+
3149
+
3150
+
3151
+
3152
+
3153
+
3154
+
3155
+
3156
+
3157
+
3158
+
3159
+
3160
+
3161
+
3162
+ Yt = 0.7Yt−1 + vt
3163
+ Y ∗
3164
+ t = 0.7−1Y ∗
3165
+ t−1 + vt = 0.7Y ∗
3166
+ t+1 − 0.7vt+1
3167
+ vt = σtut
3168
+ σt = 0.2 + 0.8 |vt−1| where ut ∼ IID(0, 1).
3169
+ (7.8)
3170
+ 35
3171
+
3172
+ As explained in the extension section, we want to detect non-causality by checking whether
3173
+ the coefficients (except the intercept) in the following linear dynamic quantile model are
3174
+ τ-invariant
3175
+ QYt (τ|Yt−1, vt−1) = θ0(τ) + θ1(τ)Yt−1 + θ2(τ)|vt−1|,
3176
+ τ ∈ Υ ⊂ (0, 1)
3177
+ (7.9)
3178
+ provided that vt−1 is recovered with 100% accuracy.
3179
+ Another approach is to check whether the linear model (7.8) is the correct specification for the
3180
+ conditional quantile of Yt and Y ∗
3181
+ t . The innovation ut varies from exponential to t student and
3182
+ Laplace distributions. The sample size in this trial is 100, 200, 500, and 1000. The trimmed
3183
+ quantile interval for the constancy test is [0.05, 0.95] and Υ = [0.01, 0.99] for the specification-
3184
+ based test (here in this experiment, we only apply the EV test to see its performance). The
3185
+ empirical size and power of non-causality tests for cases with heteroskedasticity are displayed
3186
+ in Table 7. It is clear that both methods have fairly good performance, even in relatively small
3187
+ samples. Regarding the empirical size, both approaches have a slight distortion compared to
3188
+ the nominal level. In the case of the EV test, a different bandwidth can be applied to adjust
3189
+ the empirical size to the expected level. Concerning the empirical power, the specification-
3190
+ based approach dominates the constancy test in most cases. Except in the case of asymmetric
3191
+ distribution, the constancy test outperforms the EV test in small samples ( T=100 and 200
3192
+ ). It is conceivable that when we replace vt by its estimate ˆvt, the asymptotic effect of the
3193
+ estimation needs to be taken into account when we construct test statistics. This is beyond
3194
+ the scope of this paper.
3195
+ Table 7: Empirical size and power of non-causality tests for AR-ARCH models with known heteroskedasticity
3196
+ Distribution
3197
+ test type
3198
+ T=100
3199
+ T=200
3200
+ T=500
3201
+ T=1000
3202
+ ut
3203
+ size
3204
+ power
3205
+ size
3206
+ power
3207
+ size
3208
+ power
3209
+ size
3210
+ power
3211
+ Exponential
3212
+ constancy test
3213
+ 3.60%
3214
+ 39.00%
3215
+ 4.40%
3216
+ 54.60%
3217
+ 6.00%
3218
+ 75.80%
3219
+ 7.00%
3220
+ 90.80%
3221
+ EV test
3222
+ 5.20%
3223
+ 16.80%
3224
+ 4.40%
3225
+ 34.80%
3226
+ 4.60%
3227
+ 82.80%
3228
+ 5.00%
3229
+ 97.80%
3230
+ t student
3231
+ constancy test
3232
+ 5.20%
3233
+ 24.60%
3234
+ 6.60%
3235
+ 39.40%
3236
+ 6.00%
3237
+ 63.60%
3238
+ 7.80%
3239
+ 78.00%
3240
+ EV test
3241
+ 8.20%
3242
+ 51.00%
3243
+ 7.20%
3244
+ 83.20%
3245
+ 8.20%
3246
+ 99.80%
3247
+ 7.20%
3248
+ 100.00%
3249
+ Laplace
3250
+ constancy test
3251
+ 4.40%
3252
+ 14.40%
3253
+ 3.80%
3254
+ 25.00%
3255
+ 7.60%
3256
+ 38.80%
3257
+ 4.40%
3258
+ 55.00%
3259
+ EV test
3260
+ 7.00%
3261
+ 45.40%
3262
+ 6.40%
3263
+ 82.60%
3264
+ 8.60%
3265
+ 99.20%
3266
+ 7.20%
3267
+ 10.00%
3268
+ The bandwidth for approximating the critical value using subsampling for the EV test is 7.
3269
+ 36
3270
+
T9E1T4oBgHgl3EQfIQOS/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
T9E3T4oBgHgl3EQfEQll/content/tmp_files/2301.04294v1.pdf.txt ADDED
@@ -0,0 +1,4073 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Prepared for submission to JHEP
2
+ Thrust distribution in Higgs decays up to the fifth
3
+ logarithmic order
4
+ Wan-Li Ju,a Yongqi Xu,b Li Lin Yang,c Bin Zhoud
5
+ aINFN, Sezione di Milano, Via Celoria 16, 20133 Milano, Italy
6
+ bSchool of Physics and State Key Laboratory of Nuclear Physics and Technology, Peking University,
7
+ Beijing 100871, China
8
+ cZhejiang Institute of Modern Physics, School of Physics, Zhejiang University, Hangzhou 310027,
9
+ China
10
+ dINPAC, Shanghai Key Laboratory for Particle Physics and Cosmology, School of Physics and
11
+ Astronomy, Shanghai Jiao Tong University, Shanghai 200240, China
12
+ E-mail: Wanli.Ju@mi.infi.it, xuyongqi@pku.edu.cn,
13
+ yanglilin@zju.edu.cn, zb0429@sjtu.edu.cn
14
+ Abstract: In this work, we extend the resummation for the thrust distribution in Higgs
15
+ decays up to the fifth logarithmic order. We show that one needs the accurate values of
16
+ the three-loop soft functions for reliable predictions in the back-to-back region. This is
17
+ especially true in the gluon channel, where the soft function exhibits poor perturbative
18
+ convergence.
19
+ arXiv:2301.04294v1 [hep-ph] 11 Jan 2023
20
+
21
+ Contents
22
+ 1
23
+ Introduction
24
+ 2
25
+ 2
26
+ Theoretical framework
27
+ 2
28
+ 3
29
+ Numeric results
30
+ 7
31
+ 3.1
32
+ Choice of parameters and estimation of uncertainties
33
+ 7
34
+ 3.2
35
+ The resummed thrust distributions in the gluon channel
36
+ 7
37
+ 3.3
38
+ The resummed thrust distributions in the quark-antiquark channel
39
+ 10
40
+ 4
41
+ Summary and outlook
42
+ 10
43
+ A Choice of scales in the momentum space
44
+ 11
45
+ B Fixed order ingredients
46
+ 14
47
+ C Anomalous dimensions
48
+ 20
49
+ – 1 –
50
+
51
+ 1
52
+ Introduction
53
+ The hadronic decays of the Higgs boson provide a unique windows to study the Yukawa
54
+ couplings of the lighter quarks such as the charm quark and the strange quark. These
55
+ rare decays might be enhanced by new physics effects beyond the standard model (see,
56
+ e.g., [1, 2]), and can be probed at the Large Hadron Collider (LHC) and the future Higgs
57
+ factories [3–7]. However, the hadronic decays of the Higgs boson can also proceed through
58
+ the H → gg partonic channel. While the gluon channel is also useful, it is desirable to
59
+ distinguish it from the H → q¯q channel to gain maximal information about the Yukawa
60
+ couplings. To this end, it is important to study various differential distributions in these
61
+ two channels.
62
+ A classical differential distribution for hadronic final states is the event shape variable
63
+ “thrust” [8]. It was extensively studied in the process e+e− → hadrons. In the context of
64
+ H → hadrons, the next-to-leading order (NLO) and approximate next-to-next-to-leading
65
+ order (NNLO) predictions were calculated in [9]. These fixed-order results suffer from large
66
+ logarithms in the endpoint region, which need to be resummed to all orders in the strong
67
+ coupling αs. The resummation framework is also well-established for e+e− → hadrons
68
+ [10–18]. The applications to the Higgs case were carried out in [19, 20] at the next-to-
69
+ next-to-leading logarithmic (NNLL and NNLL′) accuracies. In this work, we extend the
70
+ resummation accuracy up to the fifth order, and present the results at N3LL′ and N4LL.
71
+ The paper is organized as follows. In Section 2 we briefly review the factorization for-
72
+ mula for the thrust distribution, and give technical details of the resummation framework.
73
+ In Section 3 we provide numeric results for the resummed thrust distributions, with jet and
74
+ soft scales chosen in the Laplace space. The summary and outlook come in Section 4. The
75
+ alternative results with jet and soft scales chosen in the momentum space are presented in
76
+ Appendix A, and we leave some lengthy expressions to the remaining Appendices.
77
+ 2
78
+ Theoretical framework
79
+ We consider the process H → hadrons induced by the following effective Lagrangian
80
+ Leff = αs(µ)Ct(mt, µ)
81
+ 12πv
82
+ Og +
83
+
84
+ q
85
+ yq(µ)
86
+
87
+ 2 Oq
88
+ ≡ αs(µ)Ct(mt, µ)
89
+ 12πv
90
+ HGµν,aGa
91
+ µν +
92
+
93
+ q
94
+ yq(µ)
95
+
96
+ 2 H ¯ψqψq ,
97
+ (2.1)
98
+ where v is the Higgs vacuum expectation value; H represents the physical Higgs boson
99
+ after electroweak symmetry breaking; Ga
100
+ µν is the field strength tensor of the gluon field;
101
+ ψq represent the light quark fields. We will ignore the masses of the light quarks, but keep
102
+ the Yukawa couplings yq non-vanishing. The strong coupling αs, the Yukawa coupling yq
103
+ and the Wilson coefficient Ct of the effective operator are renormalized in the MS scheme
104
+ at the scale µ.
105
+ The thrust variable T is defined as
106
+ T ≡ max
107
+ ⃗n
108
+
109
+ i |⃗n · ⃗pi|
110
+
111
+ i |⃗pi|
112
+ ,
113
+ (2.2)
114
+ – 2 –
115
+
116
+ where ⃗pi denote the 3-momenta of final state particles. The unit vector ⃗n that maximize the
117
+ above ratio is called the thrust axis. For convenience we introduce the variable τ ≡ 1 − T.
118
+ In this work we are concerned with the limit T → 1 or τ → 0. Physically this corresponds
119
+ to two back-to-back jets in the final state. In this limit the differential decay rate can be
120
+ factorized into the product (convolution) of a hard function, a soft function and two jet
121
+ functions [9–12, 21–24]:
122
+ dΓq
123
+ dτ = Γq
124
+ B(µ) |Cq
125
+ S(mH, µ)|2
126
+
127
+ dp2
128
+ n dp2
129
+ ¯n dk δ
130
+
131
+ τ − p2
132
+ n + p2
133
+ ¯n
134
+ m2
135
+ H
136
+
137
+ k
138
+ mH
139
+
140
+ × Jq
141
+ n(p2
142
+ n, µ) Jq
143
+ ¯n(p2
144
+ ¯n, µ) Sq(k, µ) ,
145
+ dΓg
146
+ dτ = Γg
147
+ B(µ) |Ct(mt, µ)|2 |Cg
148
+ S(mH, µ)|2
149
+
150
+ dp2
151
+ n dp2
152
+ ¯n dk δ
153
+
154
+ τ − p2
155
+ n + p2
156
+ ¯n
157
+ m2
158
+ H
159
+
160
+ k
161
+ mH
162
+
163
+ × Jg
164
+ n(p2
165
+ n, µ) Jg
166
+ ¯n(p2
167
+ ¯n, µ) Sg(k, µ) ,
168
+ (2.3)
169
+ where the superscript q or g labels the partonic subprocesses H → q¯q or H → gg, with
170
+ Γq
171
+ B and Γg
172
+ B being the corresponding total decay rates at the Born level. Their explicit
173
+ expressions are
174
+ Γq
175
+ B = y2
176
+ q(µ) mH CA
177
+ 16π
178
+ ,
179
+ Γg
180
+ B = α2
181
+ s(µ) m3
182
+ H
183
+ 72 π3 v2 .
184
+ (2.4)
185
+ In the factorization formula, Ci
186
+ S (with i = q, g) are hard Wilson coefficients arising when
187
+ matching the full theory of QCD to the soft-collinear effective theory (SCET) [25–30]; Si
188
+ are soft functions defined as the vacuum expectation values of soft Wilson-loop operators;
189
+ Ji
190
+ n and Ji
191
+ ¯n are jet functions along the two light-like directions nµ = (1,⃗n) and ¯nµ = (1, −⃗n),
192
+ where ⃗n is the thrust axis.
193
+ The various ingredients satisfy renormalization group (RG) equations
194
+ d
195
+ d ln µyq(µ) = γy(αs(µ)) yq(µ) ,
196
+ d
197
+ d ln µCt(mt, µ) = γt(αs(µ)) Ct(µ2) ,
198
+ d
199
+ d ln µCi
200
+ S(mH, µ) =
201
+
202
+ Γi
203
+ cusp(αs(µ)) ln −m2
204
+ H − iϵ
205
+ µ2
206
+ + γi
207
+ H(αs(µ))
208
+
209
+ Ci
210
+ S(mH, µ) ,
211
+ d
212
+ d ln µJi(p2, µ) =
213
+
214
+ −2Γi
215
+ cusp(αs(µ)) ln p2
216
+ µ2 − 2γi
217
+ J(αs(µ))
218
+
219
+ Ji(p2, µ)
220
+ + 2Γi
221
+ cusp(αs(µ))
222
+ � p2
223
+ 0
224
+ dq2 Ji(p2, µ) − Ji(q2, µ)
225
+ p2 − q2
226
+ ,
227
+ d
228
+ d ln µSi(k, µ) =
229
+
230
+ 4Γi
231
+ cusp(αs(µ)) ln k
232
+ µ − 2γi
233
+ S(αs(µ))
234
+
235
+ Si(k, µ)
236
+ − 4Γi
237
+ cusp(αs(µ))
238
+ � k
239
+ 0
240
+ dq Si(k, µ) − Si(q, µ)
241
+ k − q
242
+ .
243
+ (2.5)
244
+ Note that the evolution equations for the jet and soft functions involve convolutions. It is
245
+ useful to introduce the Laplace transformed functions
246
+ ˜ji(LJ, µ) =
247
+ � ∞
248
+ 0
249
+ dp2 exp
250
+
251
+ −Np2
252
+ m2
253
+ H
254
+
255
+ Ji(p2, µ) ,
256
+ – 3 –
257
+
258
+ ˜si(LS, µ) =
259
+ � ∞
260
+ 0
261
+ dk exp
262
+
263
+ − Nk
264
+ mH
265
+
266
+ Si(k, µ) ,
267
+ (2.6)
268
+ where
269
+ LJ = ln m2
270
+ H
271
+ µ2 ¯N ,
272
+ LS = ln mH
273
+ µ ¯N ,
274
+ (2.7)
275
+ with ¯N ≡ NeγE and γE being the Euler’s constant. The Laplace-space jet and soft functions
276
+ satisfy local RG equations
277
+ d
278
+ d ln µ
279
+ ˜ji(LJ, µ) =
280
+
281
+ −2Γi
282
+ cusp(αs(µ))LJ − 2γi
283
+ J(αs(µ))
284
+ � ˜ji(LJ, µ) ,
285
+ d
286
+ d ln µ ˜si(LS, µ) =
287
+
288
+ 4Γi
289
+ cusp(αs(µ))LS − 2γi
290
+ S(αs(µ))
291
+
292
+ ˜si(LS, µ) .
293
+ (2.8)
294
+ Under the Laplace transform, the differential decay rates are expressed as
295
+ � ∞
296
+ 0
297
+ dτ e−τN dΓq
298
+ dτ = Γq
299
+ B(µ) |Cq
300
+ S(mH, µ)|2 �˜jq(LJ, µ)
301
+ �2 ˜sq(LS, µ) ,
302
+ � ∞
303
+ 0
304
+ dτ e−τN dΓg
305
+ dτ = Γg
306
+ B(µ) |Ct(mt, µ)|2 |Cg
307
+ S(mH, µ)|2 �˜jg(LJ, µ)
308
+ �2 ˜sg(LS, µ) .
309
+ (2.9)
310
+ For small τ, the dominant contribution arises from the region of large N. In this case the
311
+ large logarithms LJ and LS appear with increasing powers at each order in the perturbative
312
+ expansions of the jet and soft functions. We will resum these logarithms to all orders in
313
+ αs using RG evolution.
314
+ In the RG equations, Γi
315
+ cusp are the cusp anomalous dimensions, which are known up
316
+ to the four-loop accuracy [31–34], and their fifth order contributions were estimated in
317
+ [35]. The beta function governing the running strong coupling is known up to the five-loop
318
+ order in [36–41]. The anomalous dimension γy for the Yukawa coupling is the same as
319
+ that for the quark masses in the MS scheme, and is known up to the fifth order in [42–46].
320
+ The non-cusp anomalous dimension γt governing scale evolution of the Wilson coefficient
321
+ Ct is also known on the fifth level [47–52]. The up-to four-loop results for the remaining
322
+ anomalous dimensions can be found for γi
323
+ H in [53–62], for γi
324
+ S in [63–66], and for γi
325
+ J in
326
+ [66–73]. The Wilson coefficient Ct is known up to the four-loop order [49–51, 74–77] and
327
+ so is the hard sector [55, 57–62, 78] in the factorization of Eq. (2.3). As for the fixed-order
328
+ expansions of the jet functions and the soft functions, the analytic results are known up
329
+ to the three-loop order [11, 12, 67–73, 79, 80], with the exception of the scale-independent
330
+ terms of the three-loop soft function. We collect all these ingredients in the Appendices B
331
+ and C. They allow us to perform the resummation of large logarithms to the N3LL′ order
332
+ and approximately to the N4LL order. For the counting of logarithmic orders, we refer to
333
+ Table 1.
334
+ To resum the large logarithms, we choose appropriate scales for each of the functions
335
+ in the factorization formula, and use the RG equations to evolve them to a common scale.
336
+ The choice of scales can be done either in the Laplace N-space or in the momentum τ-
337
+ space. In the following, we present results with scale choices in the Laplace space, while
338
+ – 4 –
339
+
340
+ Logarithmic accuracy
341
+ Γcusp, β
342
+ γt,y,H,j,s
343
+ Ct, CS, ˜j, ˜s
344
+ NNLL′
345
+ 3-loop
346
+ 2-loop
347
+ 2-loop
348
+ N3LL
349
+ 4-loop
350
+ 3-loop
351
+ 2-loop
352
+ N3LL′
353
+ 4-loop
354
+ 3-loop
355
+ 3-loop
356
+ N4LL
357
+ 5-loop
358
+ 4-loop
359
+ 3-loop
360
+ Table 1. Definitions of the logarithmic orders.
361
+ those in the momentum space will be discussed in Appendix A. We choose the scales for
362
+ the Ct, CS, ˜j and ˜s functions to be
363
+ µt = etmt ,
364
+ µh = ehmH ,
365
+ µj = ej
366
+ mH
367
+ √ ¯N
368
+ ,
369
+ µs = es
370
+ mH
371
+ ¯N ,
372
+ (2.10)
373
+ where by default we take et = eh = ej = es = 1, and we vary them up and down by a factor
374
+ of two to estimate the associated uncertainties. The resummed differential decay rates in
375
+ the Laplace space can be written as
376
+ �Γq(N) = Γq
377
+ B(µh) U q(µh, µj, µs) |Cq
378
+ S(mH, µh)|2 �˜jq(LJ, µj)
379
+ �2 ˜sq(LS, µs)
380
+ � mH
381
+ µs ¯N
382
+ �ηq
383
+ ,
384
+ �Γg(N) = Γg
385
+ B(µh) U g(µt, µh, µj, µs) |Ct(mt, µt)|2 |Cg
386
+ S(mH, µh)|2
387
+ ×
388
+ �˜jg(LJ, µj)
389
+ �2 ˜sg(LS, µs)
390
+ � mH
391
+ µs ¯N
392
+ �ηg
393
+ ,
394
+ (2.11)
395
+ where the evolution functions are given by
396
+ U q(µh, µj, µs) = exp
397
+
398
+ 4Sq(µh, µj) + 4Sq(µs, µj) − 2Aq
399
+ cusp(µh, µj) ln m2
400
+ H
401
+ µ2
402
+ h
403
+ − 2Aq
404
+ S(µh, µs) − 4Aq
405
+ J(µh, µj)
406
+
407
+ ,
408
+ U g(µt, µh, µj, µs) = exp
409
+
410
+ 2At(µh, µt) + 4Sg(µh, µj) + 4Sg(µs, µj) − 2Ag
411
+ cusp(µh, µj) ln m2
412
+ H
413
+ µ2
414
+ h
415
+ − 2Ag
416
+ S(µh, µs) − 4Ag
417
+ J(µh, µj)
418
+
419
+ ,
420
+ (2.12)
421
+ in which the functions Sq,g and Aq,g
422
+ i
423
+ are defined by [81]
424
+ Sq,g(ν, µ) = −
425
+ � αs(µ)
426
+ αs(ν)
427
+ dαs
428
+ Γq,g
429
+ cusp(αs)
430
+ β(αs)
431
+ � αs
432
+ αs(ν)
433
+ d˜αs
434
+ β(˜αs) ,
435
+ Aq,g
436
+ i (ν, µ) = −
437
+ � αs(µ)
438
+ αs(ν)
439
+ dαs
440
+ γq,g
441
+ i
442
+ (αs)
443
+ β(αs) ,
444
+ (2.13)
445
+ for i = cusp, t, S, J, and ηq,g = 4Aq,g
446
+ cusp(µj, µs). The momentum-space differential decay
447
+ rates can then be obtained through an inverse Laplace transform
448
+ dΓq,g
449
+
450
+ =
451
+ 1
452
+ 2πi
453
+ � +i∞
454
+ −i∞
455
+ dN eNτ �Γq,g(N) .
456
+ (2.14)
457
+ – 5 –
458
+
459
+ The integration contour should, in principle, be chosen such that all singularities of the
460
+ integrand are situated to the left side. However, the resummed integrand develops a Landau
461
+ pole at large N due to the scale choices µj ∼ mH/
462
+ √ ¯N and µs ∼ mH/ ¯N, which signals
463
+ the breakdown of perturbation theory in that region. Correspondingly, the inverse Laplace
464
+ transform of the perturbatively resummed integrand suffers from an ambiguity of non-
465
+ perturbative origin. We adopt the so-called Minimal Prescription [82], in which the contour
466
+ lies to the right of all physical singularities but to the left of the Landau pole.
467
+ With the generic framework, we still need to specify a few details in the evaluation of
468
+ the resummed differential decay rates at a given logarithmic accuracy. The strong coupling
469
+ αs at a given scale µ is evaluated according to
470
+ αs(µ) = αs(ν)
471
+ X
472
+
473
+ 1 − αs(ν)
474
+ 4πX
475
+ β1 ln(X)
476
+ β0
477
+ +
478
+ �αs(ν)
479
+ 4πX
480
+ �2 �β2
481
+ 1
482
+ β2
483
+ 0
484
+
485
+ ln2(X) − ln(X) − 1 + X
486
+
487
+ + β2
488
+ β0
489
+ (1 − X)
490
+
491
+ +
492
+ �αs(ν)
493
+ 4πX
494
+ �3 �β3
495
+ 1
496
+ β3
497
+ 0
498
+
499
+ − X2
500
+ 2 + X − ln3(X) + 5 ln2(X)
501
+ 2
502
+ + 2(1 − X) ln(X) − 1
503
+ 2
504
+
505
+ + β3
506
+ 2β0
507
+ (1 − X2) + β1β2
508
+ β2
509
+ 0
510
+
511
+ 2X ln(X) − 3 ln(X)
512
+ − X(1 − X)
513
+ ��
514
+ +
515
+ �αs(ν)
516
+ 4πX
517
+ �4 �
518
+ − β4(X3 − 1)
519
+ 3β0
520
+ + β3β1
521
+ 6β2
522
+ 0
523
+
524
+ (X − 1)(4X2 + X + 1)
525
+ + 6(X2 − 2) ln(X)
526
+
527
+ + β2
528
+ 2(X − 1)2(X + 5)
529
+ 3β2
530
+ 0
531
+ + β2β2
532
+ 1
533
+ β3
534
+ 0
535
+
536
+ − (X + 3)(X − 1)2
537
+ + ln(X)(−2X2 + 5X − 3) − 3(X − 2) ln2(X)
538
+
539
+ + β4
540
+ 1
541
+ 6β4
542
+ 0
543
+
544
+ (X − 1)2(2X + 7)
545
+ + 6 ln4(X) − 26 ln3(X) + 9(2X − 1) ln2(X) + 6(X − 4)(X − 1) ln(X)
546
+ ���
547
+ ,
548
+ (2.15)
549
+ where the initial scale is chosen at the Z boson mass, ν = mZ, and
550
+ X = 1 + αs(ν)
551
+ 2π β0 ln µ
552
+ mZ
553
+ .
554
+ (2.16)
555
+ The coefficients of the beta function are defined through
556
+ dαs
557
+ d ln µ = −2αs
558
+
559
+
560
+ n=0
561
+ �αs
562
+
563
+ �n+1
564
+ βn .
565
+ (2.17)
566
+ The Yukawa coupling yq at a given scale is evaluated with
567
+ yq(µ) = yq(mH) exp
568
+
569
+ Aq
570
+ y(µ, mH)
571
+
572
+ .
573
+ (2.18)
574
+ The evolution factors U q,g and the factors involving ηq,g are expanded on the expo-
575
+ nent up to a given logarithmic accuracy defined in Table 1. The expansion is done by
576
+ counting the large logarithms ln(ν/µ) as O(1/αs). The fixed-order factors (|Cq
577
+ S|2 �˜jq�2 ˜sq
578
+ and |Ct|2|Cg
579
+ S|2 �˜jg�2 ˜sg) are also expanded up to a given loop order. We are now ready
580
+ to perform numeric evaluations of the resummed differential decay rates. The results are
581
+ presented in the next Section.
582
+ – 6 –
583
+
584
+ 3
585
+ Numeric results
586
+ 3.1
587
+ Choice of parameters and estimation of uncertainties
588
+ In this section we are devoted to the numeric results. Throughout this paper, we choose
589
+ αs(mZ) = 0.1181, mH = 125.1 GeV and mt = 172.9 GeV [83]. The scales are chosen as in
590
+ Eq. (2.10). Note that this choice is conventional in the small-τ region considered in this
591
+ work. On the other hand, if one wants to match the resummed distributions to the fixed-
592
+ order ones, it is necessary to deal with the intermediate regime between the resummation
593
+ dominated small-τ region and the fixed-order dominated large-τ region.
594
+ We leave this
595
+ subtlety to future investigations. We estimate the perturbative uncertainties by varying
596
+ each of et, eh, ej and es up and down by a factor of two, while keeping the others at
597
+ their defaults. The resulting variations of the differential decay rates are then added in
598
+ quadrature.
599
+ The scale-independent constant terms of the three-loop soft functions are not known
600
+ yet. The term in the quark channel was extracted in [71] through a numeric fit to the
601
+ fixed-order thrust distribution, which has a large uncertainty. In this work we set
602
+ cS
603
+ 3q = −19988 ± 5000 ,
604
+ (3.1)
605
+ and estimate the corresponding variation of the resummed distribution.
606
+ For the gluon
607
+ channel we apply the Casimir scaling and set
608
+ cS
609
+ 3g = −45433 ± 11250 .
610
+ (3.2)
611
+ The five-loop cusp anomalous dimensions are also unknown, with only a rough estimation
612
+ available [35]. However, we have checked that they only have a rather mild effect on the
613
+ resummed thrust distributions.
614
+ 3.2
615
+ The resummed thrust distributions in the gluon channel
616
+ We now show the resummed thrust distributions in the gluon channel at various logarithmic
617
+ accuracies. The baseline for comparison is the NNLL′ result, that is the state-of-the-art
618
+ accuracy in the literature (see Refs. [19, 20], although they adopted scale choices in the
619
+ momentum space).
620
+ In Fig. 1, we show the comparison between NNLL′ and N3LL, and that between NNLL′
621
+ and N3LL′, for the τ range [0.01, 0.15]. This covers the small-τ and intermediate-τ regions,
622
+ but cuts out the large-τ region where fixed-order matching would be important. One can
623
+ see that the N3LL result has a slightly reduced scale uncertainty compared to the NNLL′
624
+ one. The reduction is most significant in the small-τ region, where resummation effects are
625
+ expected to be important. The N3LL′ result further reduces the scale uncertainty in the
626
+ intermediate τ region, with the three-loop hard, jet and soft functions included. However,
627
+ we observe an unusual increase of scale uncertainty in the small τ region, as is clear from the
628
+ right plot of Fig. 1. It can be seen that the two bands even do not overlap below τ ∼ 0.03.
629
+ This fact can be traced to the unusually large constant term cS
630
+ 3g of the three-loop soft
631
+ – 7 –
632
+
633
+ 0.00
634
+ 0.03
635
+ 0.06
636
+ 0.09
637
+ 0.12
638
+ 0.15
639
+ 0
640
+ 3
641
+ 6
642
+ 9
643
+ 12
644
+ 15
645
+ 1
646
+ B
647
+ d
648
+ d
649
+ H
650
+ gg, Laplace
651
+ NNLL′
652
+ N3LL
653
+ 0.00
654
+ 0.03
655
+ 0.06
656
+ 0.09
657
+ 0.12
658
+ 0.15
659
+ 0
660
+ 3
661
+ 6
662
+ 9
663
+ 12
664
+ 15
665
+ 1
666
+ B
667
+ d
668
+ d
669
+ H
670
+ gg, Laplace
671
+ NNLL′
672
+ N3LL′
673
+ Figure 1. The resummed thrust distributions in the gluon channel. Left: NNLL′ vs. N3LL; Right:
674
+ NNLL′ vs. N3LL′.
675
+ 0.00
676
+ 0.03
677
+ 0.06
678
+ 0.09
679
+ 0.12
680
+ 0.15
681
+ 0
682
+ 3
683
+ 6
684
+ 9
685
+ 12
686
+ 15
687
+ 1
688
+ B
689
+ d
690
+ d
691
+ H
692
+ gg, Laplace
693
+ N3LL′, default
694
+ N3LL′, cS
695
+ 3g
696
+ N3LL′, cS
697
+ 3g
698
+ 0.00
699
+ 0.03
700
+ 0.06
701
+ 0.09
702
+ 0.12
703
+ 0.15
704
+ 0
705
+ 3
706
+ 6
707
+ 9
708
+ 12
709
+ 15
710
+ 1
711
+ B
712
+ d
713
+ d
714
+ H
715
+ gg, Laplace
716
+ NNLL′
717
+ N3LL′, cS
718
+ 3g
719
+ Figure 2. The effects of cS
720
+ 3g on the N3LL′ results in the gluon channel. Left: N3LL′ results with
721
+ 3 values of cS
722
+ 3g; Right: NNLL′ vs. N3LL′ where cS
723
+ 3g is taken to its “upper” value (with a smaller
724
+ absolute value).
725
+ function. It is instructive to show the soft function at its default scale µs = mH/ ¯N, where
726
+ LS = 0, for cS
727
+ 3g = −45433:
728
+ ˜sg(0, µs) = 1 − 2.356 αs(µs) + 1.617 α2
729
+ s(µs) − 22.90 α3
730
+ s(µs) + · · · .
731
+ (3.3)
732
+ For small τ, one expects that the dominant contributions in the Laplace space come from
733
+ the region where τN ∼ 1. This means that, below τ ∼ 0.03, µs is typically only about a
734
+ few GeVs, where αs ∼ 0.2 is not so small. Therefore, the gluon soft function has a rather
735
+ poor perturbative convergence if we take the fitted central value of cS
736
+ 3g. It is highly desired
737
+ to calculate the exact value of cS
738
+ 3g to settle down this issue: either its absolute value is in
739
+ fact smaller, and the N3LL′ result is already sufficient; or it is indeed that large, then one
740
+ needs to have even higher order corrections for reliable predictions. Efforts towards this
741
+ goal are being actively pursued in the literature [84, 85].
742
+ To demonstrate the effects of different values of cS
743
+ 3g, we show in the left plot of Fig. 2
744
+ – 8 –
745
+
746
+ H → gg, N3LL′
747
+ µt
748
+ µh
749
+ µj
750
+ µs
751
+ cS
752
+ 3g
753
+ max
754
+ 12.128
755
+ 12.120
756
+ 12.120
757
+ 13.077
758
+ 12.219
759
+ min
760
+ 12.106
761
+ 11.967
762
+ 12.063
763
+ 12.044
764
+ 12.020
765
+ Table 2. Variations of the N3LL′ differential decay rate at τ = 0.05 induced by changing the scales
766
+ and cS
767
+ 3g. The central value is 12.120.
768
+ 0.00
769
+ 0.03
770
+ 0.06
771
+ 0.09
772
+ 0.12
773
+ 0.15
774
+ 0
775
+ 3
776
+ 6
777
+ 9
778
+ 12
779
+ 15
780
+ 1
781
+ B
782
+ d
783
+ d
784
+ H
785
+ gg, Laplace
786
+ N3LL′
787
+ N4LL
788
+ 0.00
789
+ 0.03
790
+ 0.06
791
+ 0.09
792
+ 0.12
793
+ 0.15
794
+ 0
795
+ 3
796
+ 6
797
+ 9
798
+ 12
799
+ 15
800
+ 1
801
+ B
802
+ d
803
+ d
804
+ H
805
+ gg, Laplace
806
+ N4LL, default
807
+ N4LL, c(3)
808
+ S
809
+ N4LL, c(3)
810
+ S
811
+ Figure 3. The resummed thrust distributions in the gluon channel. Left: N3LL′ vs N4LL; Right:
812
+ N4LL results with 3 values of cS
813
+ 3g.
814
+ H → gg, N4LL
815
+ µt
816
+ µh
817
+ µj
818
+ µs
819
+ cS
820
+ 3g
821
+ Γg(4)
822
+ cusp
823
+ max
824
+ 12.089
825
+ 12.084
826
+ 12.084
827
+ 12.980
828
+ 12.183
829
+ 12.085
830
+ min
831
+ 12.073
832
+ 11.936
833
+ 12.025
834
+ 12.022
835
+ 11.985
836
+ 12.083
837
+ Table 3. Variations of the N4LL differential decay rate at τ = 0.05 induced by changing the scales,
838
+ cS
839
+ 3g and the five-loop cusp anomalous dimension Γg(4)
840
+ cusp. The central value is 12.084.
841
+ the resummed distributions for three values of cS
842
+ 3g: the default value −45433, the “lower”
843
+ value −56683, and the “upper” value −34183. Note that since the fitted value of cS
844
+ 3g is
845
+ negative, the “upper” value has a smaller absolute value, and leads to a better perturbative
846
+ convergence.
847
+ Indeed, as can be seen from the plot, the result with the “upper” value
848
+ exhibits a smaller scale uncertainty, especially in the small-τ region. It is also evident from
849
+ the right plot of Fig. 2, that the N3LL′ band is better overlapped with the NNLL′ one with
850
+ cS
851
+ 3g taking the “upper” value. Finally for reference, we list in Table 2 the variations of the
852
+ N3LL′ differential decay rate at τ = 0.05 induced by changing the values of various scales
853
+ as well as cS
854
+ 3g. It is clear that the main source of the scale uncertainty comes from the soft
855
+ scale, as expected. It can also be seen that varying cS
856
+ 3g has a larger effect than varying
857
+ µt, µh or µj. All these emphasize again that we need a better understanding of the soft
858
+ function at and beyond three loops.
859
+ We now add another layer of resummation on top of N3LL′, and present the results at
860
+ N4LL. The results are shown in Fig. 3, with explicit numbers at τ = 0.05 given in Table 3.
861
+ We find that the additional order of resummation has a mild effect on the distribution,
862
+ – 9 –
863
+
864
+ 0.01
865
+ 0.03
866
+ 0.05
867
+ 0.07
868
+ 0.09
869
+ 0.11
870
+ 0.13
871
+ 0.15
872
+ 0
873
+ 5
874
+ 10
875
+ 15
876
+ 20
877
+ 25
878
+ 30
879
+ 35
880
+ 1
881
+ B
882
+ d
883
+ d
884
+ H
885
+ qq, Laplace
886
+ NNLL′
887
+ N3LL′
888
+ 0.01
889
+ 0.03
890
+ 0.05
891
+ 0.07
892
+ 0.09
893
+ 0.11
894
+ 0.13
895
+ 0.15
896
+ 0
897
+ 5
898
+ 10
899
+ 15
900
+ 20
901
+ 25
902
+ 30
903
+ 35
904
+ 1
905
+ B
906
+ d
907
+ d
908
+ H
909
+ qq, Laplace
910
+ N3LL′, default
911
+ N3LL′, c(3)
912
+ S
913
+ N3LL′, c(3)
914
+ S
915
+ Figure 4. The resummed thrust distributions in the q¯q channel. Left: NNLL′ vs. N3LL′; Right:
916
+ N3LL′ results with 3 values of cS
917
+ 3q.
918
+ that is only clearly visible in the peak region. It is also evident that the five-loop cusp
919
+ anomalous dimension does not have important impacts.
920
+ 3.3
921
+ The resummed thrust distributions in the quark-antiquark channel
922
+ We now briefly discuss the results in the quark-antiquark channel.
923
+ In the left plot of
924
+ Fig. 4, we compare the NNLL′ result against the N3LL′ one, where the three-loop constant
925
+ term cS
926
+ 3q of the soft function is chosen at the default value. We again observe that the
927
+ uncertainty band of N3LL′ is broader than the NNLL′ one, especially at the lower end of
928
+ the distribution. In the right plot of Fig. 4, we show the N3LL′ distributions for 3 values of
929
+ cS
930
+ 3q: the default value −19988, the “upper” value −14988 and the “lower” value −24988. As
931
+ expected, the band becomes narrower for the “upper” value, where the absolute value of cS
932
+ 3q
933
+ is smaller, and the soft function has a perturbative convergence. Overall, the uncertainties
934
+ of the resummed thrust distributions in the q¯q channel are significantly smaller than those
935
+ in the gluon channel. This can be partly explained by the smaller color factor CF compared
936
+ to CA.
937
+ 4
938
+ Summary and outlook
939
+ In this work, we extend the resummation for the thrust distribution in Higgs decays up
940
+ to the fifth logarithmic order. A main conclusion that can be drawn from our results is
941
+ that one needs the accurate values of the three-loop soft functions for reliable predictions
942
+ in the small-τ region. This is especially true in the gluon channel, where the perturbative
943
+ convergence of the soft function seems to be rather bad with a large three-loop constant
944
+ term.
945
+ Once the three-loop soft functions become available, the ingredients collected in this
946
+ work will allow for faithful numeric predictions at the N3LL′ and N4LL accuracies. Depend-
947
+ ing on the size of the three-loop constant, it is possible that one even needs the four-loop
948
+ gluon soft function to reduce the scale uncertainties and obtain reliable predictions in the
949
+ small-τ region.
950
+ – 10 –
951
+
952
+ Acknowledgments
953
+ This work was supported in part by the National Natural Science Foundation of China
954
+ under Grant No. 11975030 and 12147103, and the Fundamental Research Funds for the
955
+ Central Universities.
956
+ A
957
+ Choice of scales in the momentum space
958
+ In the main text, we have chosen the jet and soft scales in the Laplace space, and performed
959
+ the inverse Laplace transform numerically. A different approach is to set the jet and soft
960
+ scales independent of the Laplace variable N. In this case, the inverse Laplace transform
961
+ (2.14) can be carried out analytically [12, 81, 86]. For simplicity we only discuss the gluon
962
+ channel in this Appendix. The result can be written as
963
+ dΓg
964
+ dτ = Γg
965
+ B(µh) U g(µt, µh, µj, µs) |Ct(mt, µt)|2 |Cg
966
+ S(mH, µh)|2
967
+ ×
968
+
969
+ ˜jg
970
+
971
+ ln µsmH
972
+ µ2
973
+ j
974
+ + ∂ηg, µj
975
+ ��2
976
+ ˜sg(∂ηg, µs)
977
+
978
+ 1
979
+ τ Γ(ηg)
980
+ � τmH
981
+ µseγE
982
+ �ηg�
983
+ .
984
+ (A.1)
985
+ The common practice is then to choose µs and µj as a function of τ, such that µj ∼ √τ mH
986
+ and µs ∼ τmH in the small-τ region. In this work we don’t care about matching with the
987
+ fixed-order results in the large-τ region (otherwise one needs to introduce “profile scales”
988
+ as in [19, 20]). Therefore we can adopt the simplest choices
989
+ µt = etmt ,
990
+ µh = ehmH ,
991
+ µj = ej
992
+ √τ mH ,
993
+ µs = esτmH ,
994
+ (A.2)
995
+ where the parameters et, eh, ej and es are set to 1 by default, and are varied up and down
996
+ by a factor of two to estimate the uncertainties. The numeric results with the above scale
997
+ choices are shown in Fig. 5. We observe very large scale uncertainties in the small-τ region,
998
+ much larger than those seen in Fig. 1. As it turns out, these large uncertainties originate
999
+ from the jet and soft scales, i.e., ej and es.
1000
+ The prescription in Eq. (A.2) actually has a subtle problem related exactly to the jet
1001
+ and soft scales. The formula (A.1) is based on the solutions to the RG equations (2.5).
1002
+ Taking the gluon jet function as an example, the RG equation is
1003
+ d
1004
+ d ln µJg(p2, µ) =
1005
+
1006
+ −2Γg
1007
+ cusp(αs(µ)) ln p2
1008
+ µ2 − 2γg
1009
+ J(αs(µ))
1010
+
1011
+ Jg(p2, µ)
1012
+ + 2Γg
1013
+ cusp(αs(µ))
1014
+ � p2
1015
+ 0
1016
+ dq2 Jg(p2, µ) − Jg(q2, µ)
1017
+ p2 − q2
1018
+ .
1019
+ (A.3)
1020
+ And the solution reads [81, 86]
1021
+ Jg(p2, µ) = exp
1022
+
1023
+ −4Sg(µj, µ) + 2Ag
1024
+ J(µj, µ)
1025
+ � ˜jg(∂η, µj)
1026
+
1027
+ 1
1028
+ p2
1029
+
1030
+ p2
1031
+ µ2
1032
+ j
1033
+ �η�
1034
+
1035
+ e−γEη
1036
+ Γ(η) ,
1037
+ (A.4)
1038
+ – 11 –
1039
+
1040
+ 0.01
1041
+ 0.03
1042
+ 0.05
1043
+ 0.07
1044
+ 0.09
1045
+ 0.11
1046
+ 0.13
1047
+ 0.15
1048
+ 0
1049
+ 3
1050
+ 6
1051
+ 9
1052
+ 12
1053
+ 15
1054
+ 1
1055
+ B
1056
+ d
1057
+ d
1058
+ H
1059
+ gg, Momentum, Old
1060
+ NNLL′
1061
+ N3LL′
1062
+ Figure 5. The resummed thrust distributions at NNLL′ and N3LL′ in the gluon channel with the
1063
+ scale choices (A.2) at the level of differential decay rates.
1064
+ where η = 2Ag
1065
+ cusp(µj, µ), and the star-distribution is defined by
1066
+ � Q2
1067
+ 0
1068
+ dp2
1069
+
1070
+ 1
1071
+ p2
1072
+
1073
+ p2
1074
+ µ2
1075
+ j
1076
+ �η�
1077
+
1078
+ f(p2) =
1079
+ � Q2
1080
+ 0
1081
+ dp2 f(p2) − f(0)
1082
+ p2
1083
+
1084
+ p2
1085
+ µ2
1086
+ j
1087
+ �η
1088
+ + f(0)
1089
+ η
1090
+ �Q2
1091
+ µ2
1092
+ �η
1093
+ .
1094
+ (A.5)
1095
+ The solution is of course formally independent of µj. However, at any finite order there is
1096
+ a residue dependence. Assuming that µj is independent of p2, the above solution indeed
1097
+ satisfies the RG equation (A.3), where µj is the same in both Jg(p2, µ) and Jg(q2, µ).
1098
+ However, the scale choice in Eq. (A.2) actually makes µj correlated with p2 ∼ τm2
1099
+ H. That
1100
+ is, µ2
1101
+ j ∼ p2 in Jg(p2, µ), and µ2
1102
+ j ∼ q2 in Jg(q2, µ). This immediately renders the convolution
1103
+ in Eq. (A.3) ill-defined due to the singularity as q2 → 0.
1104
+ One may of course ignore the problem with Eq. (A.3) and insist on using Eq. (A.4)
1105
+ with µj ∼ p2 as the resummed jet function. As long as one does not take p2 → 0 (where
1106
+ non-perturbative physics enters anyway), this does not pose any difficulty at face value.
1107
+ However, let us take a closer look. We set µj = ej
1108
+
1109
+ p2 in Eq. (A.4), and truncate the
1110
+ solution at NLL′ accuracy (that means two-loop Γg
1111
+ cusp, one-loop γg
1112
+ J and one-loop ˜jg). We
1113
+ then expand the resummed jet function in terms of αs(µ). This gives
1114
+ Jg,NLL′ �
1115
+ p2, µ; µj = ej
1116
+
1117
+ p2
1118
+
1119
+ = αs(µ)
1120
+
1121
+ 1
1122
+ p2
1123
+
1124
+ 12 ln p2
1125
+ µ2 − 23
1126
+ 3
1127
+
1128
+ +
1129
+ �αs(µ)
1130
+
1131
+ �2 1
1132
+ p2
1133
+ ×
1134
+
1135
+ 576 ln3(ej) + 736 ln2(ej) +
1136
+ �9364
1137
+ 9
1138
+ − 144π2
1139
+
1140
+ ln(ej) + 72 ln3
1141
+ � p2
1142
+ µ2
1143
+
1144
+ + · · ·
1145
+
1146
+ + O(α3
1147
+ s) ,
1148
+ (A.6)
1149
+ where the ellipsis denotes further ej-independent terms. We can see that the ej-dependence
1150
+ cancels at order α1
1151
+ s, as it should at the NLL′ accuracy. However, there exist rather high
1152
+ powers of ln(ej) at order α2
1153
+ s (and beyond). While ln(ej) is counted as a “small” logarithm,
1154
+ these high powers lead to large uncertainties of the resummed jet function when ej is
1155
+ varied between 1/2 and 2. The resummed soft function Sg(k, µ) with µs = esk exhibits
1156
+ the similar behavior. These explain the large uncertainty bands observed in Fig. 5. In
1157
+ – 12 –
1158
+
1159
+ practice, it is often argued that ej and es are not independent and should be correlated.
1160
+ This can result in partial cancellations between the lnn(ej) and lnn(es) terms, and lead to
1161
+ smaller uncertainty estimations.
1162
+ The above behavior does not occur with the scale choices in Eq. (2.10). We can do the
1163
+ same exercise with µj = ejmH/
1164
+ √ ¯N in the Laplace space. The resummed Laplace-space
1165
+ jet function is given by
1166
+ ˜jg(LJ, µ) = exp
1167
+
1168
+ −4Sg(µj, µ) + 2Ag
1169
+ J(µj, µ)
1170
+
1171
+
1172
+ m2
1173
+ H
1174
+ ¯N µ2
1175
+ j
1176
+ �η
1177
+ ˜jg(LJ, µj) .
1178
+ (A.7)
1179
+ Again truncating at the NLL′ accuracy and expanding in terms of αs(µ), we can perform
1180
+ the inverse Laplace transform analytically to arrive at
1181
+ Jg,NLL′ �
1182
+ p2, µ; µj = ejmH/
1183
+
1184
+ ¯N
1185
+
1186
+ = αs(µ)
1187
+
1188
+ 1
1189
+ p2
1190
+
1191
+ 12 ln p2
1192
+ µ2 − 23
1193
+ 3
1194
+
1195
+ +
1196
+ �αs(µ)
1197
+
1198
+ �2 1
1199
+ p2
1200
+
1201
+ 72 ln3
1202
+ � p2
1203
+ µ2
1204
+
1205
+ + · · ·
1206
+
1207
+ + O(α3
1208
+ s) .
1209
+ (A.8)
1210
+ Evidently, all the lnn(ej) terms drop out at order α2
1211
+ s. This explains the smaller uncertainty
1212
+ bands in Fig. 1 compared to Fig. 5.
1213
+ There is an alternative way of choosing the jet and soft scales in the momentum space
1214
+ [18, 87, 88]. We define the accumulative decay rate as
1215
+ ˆΓg(τ) ≡
1216
+ � τ
1217
+ 0
1218
+ dΓg
1219
+ dτ ′ dτ ′ .
1220
+ (A.9)
1221
+ In the above integrals, µj and µs are set to the same expressions as in Eq. (A.2), where τ
1222
+ is the upper bound of the integration. The jet and soft scales are hence independent of the
1223
+ integration variable τ ′. Before resummation, the factorization formula for the accumulative
1224
+ decay rates can be obtained by integrating Eq. (2.3) over τ. The result reads
1225
+ ˆΓg(τ) = Γg
1226
+ B(µ) |Ct(mt, µ)|2 |Cg
1227
+ S(mH, µ)|2
1228
+
1229
+ dp2
1230
+ n dp2
1231
+ ¯n dk ˆJg
1232
+ n(p2
1233
+ n, µ) ˆJg
1234
+ ¯n(p2
1235
+ ¯n, µ) Sg(k, µ) ,
1236
+ (A.10)
1237
+ where the integration domain is determined by the constraints
1238
+ τ ≥ p2
1239
+ n + p2
1240
+ ¯n
1241
+ m2
1242
+ H
1243
+ +
1244
+ k
1245
+ mH
1246
+ ,
1247
+ p2
1248
+ n, p2
1249
+ ¯n, k ≥ 0 .
1250
+ (A.11)
1251
+ Now, since the jet scale µj is a function of τ and is independent of p2, the problem with
1252
+ the convolution in Eq. (A.3) is absent here.
1253
+ After resummation, the accumulative decay rate is
1254
+ ˆΓg(τ) = Γg
1255
+ B(µh) U g(µt, µh, µj, µs) |Ct(mt, µt)|2 |Cg
1256
+ S(mH, µh)|2
1257
+ ×
1258
+
1259
+ ˜jg
1260
+
1261
+ ln µsmH
1262
+ µ2
1263
+ j
1264
+ + ∂ηg, µj
1265
+ ��2
1266
+ ˜sg(∂ηg, µs)
1267
+
1268
+ 1
1269
+ Γ(1 + ηg)
1270
+ � τmH
1271
+ µseγE
1272
+ �ηg�
1273
+ .
1274
+ (A.12)
1275
+ – 13 –
1276
+
1277
+ 0.01
1278
+ 0.03
1279
+ 0.05
1280
+ 0.07
1281
+ 0.09
1282
+ 0.11
1283
+ 0.13
1284
+ 0.15
1285
+ 0
1286
+ 3
1287
+ 6
1288
+ 9
1289
+ 12
1290
+ 15
1291
+ 1
1292
+ B
1293
+ d
1294
+ d
1295
+ H
1296
+ gg, Momentum, New
1297
+ NNLL′
1298
+ N3LL′
1299
+ Figure 6. The resummed thrust distributions at NNLL′ and N3LL′ in the gluon channel with the
1300
+ scale choices (A.2) at the level of accumulative decay rates.
1301
+ We set the jet and soft scales at the accumulative level following Eq. (A.2), i.e., µj =
1302
+ ej
1303
+ √τmH and µs = esτmH. We then take the derivative with respect to τ to obtain the
1304
+ resummed differential decay rate:
1305
+ dΓg
1306
+ dτ = d
1307
+
1308
+ ˆΓg(τ) .
1309
+ (A.13)
1310
+ The numeric results with this new prescription are plotted in Fig. 6.
1311
+ To compare the “new” way of scale setting at the accumulative level with the “old”
1312
+ way at the differential level, we can study the resummed integrated jet function
1313
+ ˆJg(p2, µ) =
1314
+ � p2
1315
+ 0
1316
+ dq2 Jg(q2, µ)
1317
+ = exp
1318
+
1319
+ −4Sg(µj, µ) + 2Ag
1320
+ J(µj, µ)
1321
+ � ˜jg(∂η, µj)
1322
+
1323
+ p2
1324
+ µ2
1325
+ j
1326
+ �η
1327
+ e−γEη
1328
+ Γ(1 + η) ,
1329
+ (A.14)
1330
+ with µj = ej
1331
+
1332
+ p2. This is part of the resummed accumulative decay rate (A.12). We still
1333
+ truncate at the NLL′ accuracy and expand in terms of αs(µ). We then take the derivative
1334
+ with respect to p2 and arrive at
1335
+
1336
+ ∂p2 ˆJg,NLL′(p2, µ; µj = ej
1337
+
1338
+ p2) = αs(µ)
1339
+
1340
+ 1
1341
+ p2
1342
+
1343
+ 12 ln p2
1344
+ µ2 − 23
1345
+ 3
1346
+
1347
+ +
1348
+ �αs(µ)
1349
+
1350
+ �2 1
1351
+ p2
1352
+
1353
+ 72 ln3
1354
+ � p2
1355
+ µ2
1356
+
1357
+ + · · ·
1358
+
1359
+ + O(α3
1360
+ s) .
1361
+ (A.15)
1362
+ We see that the order α2
1363
+ s term is indeed independent of ej.
1364
+ B
1365
+ Fixed order ingredients
1366
+ In this Appendix we list the fixed-order ingredients appearing in the resummation formula
1367
+ (2.11).
1368
+ – 14 –
1369
+
1370
+ The Wilson coefficient Ct is known up to the four-loop order [47–52]. For our purpose,
1371
+ we need its expression up to three loops, which is given by
1372
+ Ct(mt, µ) = 1 + αs
1373
+ 4π 11 +
1374
+ �αs
1375
+
1376
+ �2 �
1377
+ Lt
1378
+
1379
+ 19 + 16
1380
+ 3 nf
1381
+
1382
+ + 2777
1383
+ 18
1384
+ − 67
1385
+ 6 nf
1386
+
1387
+ +
1388
+ �αs
1389
+
1390
+ �3 �
1391
+ L2
1392
+ t
1393
+
1394
+ 209 + 46nf − 32
1395
+ 9 n2
1396
+ f
1397
+
1398
+ + Lt
1399
+ �4834
1400
+ 9
1401
+ + 2912
1402
+ 27 nf + 77
1403
+ 27n2
1404
+ f
1405
+
1406
+ − 2761331
1407
+ 648
1408
+ + 897943ζ3
1409
+ 144
1410
+ +
1411
+ �58723
1412
+ 324
1413
+ − 110779ζ3
1414
+ 216
1415
+
1416
+ nf − 6865
1417
+ 486 n2
1418
+ f
1419
+
1420
+ , (B.1)
1421
+ where Lt = ln(µ2/m2
1422
+ t ), and we have explicitly set the number of colors Nc = 3 to shorten
1423
+ the expression.
1424
+ The hard Wilson coefficients Cq,g
1425
+ S
1426
+ are expanded as
1427
+ Cq,g
1428
+ S (mH, µ) =
1429
+
1430
+ n=0
1431
+ �αs
1432
+
1433
+ �n
1434
+ Cq,g(n)
1435
+ S
1436
+ ,
1437
+ (B.2)
1438
+ where the gluon channel coefficients up to three-loop order are given by [59]
1439
+ Cg(0)
1440
+ S
1441
+ = 1 ,
1442
+ Cg(1)
1443
+ S
1444
+ =
1445
+ �π2
1446
+ 6 − L2
1447
+
1448
+ CA ,
1449
+ Cg(2)
1450
+ S
1451
+ = nfCA
1452
+
1453
+ −2L3
1454
+ 9
1455
+ + 10L2
1456
+ 9
1457
+ +
1458
+ �52
1459
+ 27 + 2π2
1460
+ 9
1461
+
1462
+ L − 46ζ3
1463
+ 9
1464
+ − 5π2
1465
+ 18 − 916
1466
+ 81
1467
+
1468
+ + C2
1469
+ A
1470
+ �L4
1471
+ 2 + 11L3
1472
+ 9
1473
+ +
1474
+ �π2
1475
+ 6 − 67
1476
+ 9
1477
+
1478
+ L2 + L
1479
+
1480
+ −2ζ3 − 11π2
1481
+ 9
1482
+ + 80
1483
+ 27
1484
+
1485
+ − 143ζ3
1486
+ 9
1487
+ +π4
1488
+ 72 + 67π2
1489
+ 36
1490
+ + 5105
1491
+ 162
1492
+
1493
+ + nfCF
1494
+
1495
+ 2L + 8ζ3 − 67
1496
+ 6
1497
+
1498
+ ,
1499
+ Cg(3)
1500
+ S
1501
+ = nfCACF
1502
+
1503
+ −8L3
1504
+ 3
1505
+ + L2(13 − 16ζ3) + L
1506
+
1507
+ −376ζ3
1508
+ 9
1509
+ + 4π4
1510
+ 45 + π2 + 3833
1511
+ 54
1512
+
1513
+ +32π2ζ3
1514
+ 9
1515
+ + 14564ζ3
1516
+ 81
1517
+ + 608ζ5
1518
+ 9
1519
+ − 34π2
1520
+ 27
1521
+ − 16π4
1522
+ 405 − 341219
1523
+ 972
1524
+
1525
+ + n2
1526
+ fCA
1527
+
1528
+ −2L4
1529
+ 27 + 40L3
1530
+ 81
1531
+ +
1532
+ �116
1533
+ 81 + 4π2
1534
+ 27
1535
+
1536
+ L2 + L
1537
+
1538
+ −128ζ3
1539
+ 27
1540
+ − 40π2
1541
+ 81
1542
+ − 14057
1543
+ 729
1544
+
1545
+ +4576ζ3
1546
+ 243
1547
+ + π4
1548
+ 243 + 2π2
1549
+ 27 + 611401
1550
+ 13122
1551
+
1552
+ + nfC2
1553
+ A
1554
+ �2L5
1555
+ 9
1556
+ − 8L4
1557
+ 27 +
1558
+
1559
+ −734
1560
+ 81 − π2
1561
+ 9
1562
+
1563
+ L3
1564
+ +L2
1565
+ �118ζ3
1566
+ 9
1567
+ + 377
1568
+ 27 − 103π2
1569
+ 54
1570
+
1571
+ + L
1572
+ �28ζ3
1573
+ 9
1574
+ + 1910π2
1575
+ 243
1576
+ − 4π4
1577
+ 15 + 133036
1578
+ 729
1579
+
1580
+ + 428ζ5
1581
+ 9
1582
+ −41π2ζ3
1583
+ 27
1584
+ − 460ζ3
1585
+ 81
1586
+ + 73π4
1587
+ 1620 − 14189π2
1588
+ 4374
1589
+ − 3765007
1590
+ 6561
1591
+
1592
+ + C3
1593
+ A
1594
+
1595
+ −L6
1596
+ 6 − 11L5
1597
+ 9
1598
+ +
1599
+ �281
1600
+ 54 − π2
1601
+ 4
1602
+
1603
+ L4 + L3
1604
+
1605
+ 2ζ3 + 11π2
1606
+ 18
1607
+ + 1540
1608
+ 81
1609
+
1610
+ + L2
1611
+ �143ζ3
1612
+ 9
1613
+ + 685π2
1614
+ 108
1615
+ − 6740
1616
+ 81
1617
+ − 73π4
1618
+ 360
1619
+
1620
+ +L
1621
+ �17π2ζ3
1622
+ 9
1623
+ + 2048ζ3
1624
+ 27
1625
+ + 16ζ5 + 44π4
1626
+ 45
1627
+ − 6710π2
1628
+ 243
1629
+ − 373975
1630
+ 1458
1631
+
1632
+ + 2222ζ5
1633
+ 9
1634
+ – 15 –
1635
+
1636
+ −104ζ2
1637
+ 3
1638
+ 9
1639
+ − 605π2ζ3
1640
+ 54
1641
+ − 152716ζ3
1642
+ 243
1643
+ + 105617π2
1644
+ 4374
1645
+ − 1939π4
1646
+ 9720
1647
+ + 29639273
1648
+ 26244
1649
+ − 24389π6
1650
+ 408240
1651
+
1652
+ + n2
1653
+ fCF
1654
+ �4L2
1655
+ 3
1656
+ + L
1657
+ �32ζ3
1658
+ 3
1659
+ − 52
1660
+ 3
1661
+
1662
+ − 112ζ3
1663
+ 3
1664
+ − 10π2
1665
+ 27
1666
+ + 4481
1667
+ 81
1668
+ − 4π4
1669
+ 405
1670
+
1671
+ + nfC2
1672
+ F
1673
+
1674
+ −2L + 296ζ3
1675
+ 3
1676
+ − 160ζ5 + 304
1677
+ 9
1678
+
1679
+ ,
1680
+ (B.3)
1681
+ and the quark channel coefficients are given by [60]
1682
+ Cq(0)
1683
+ S
1684
+ = 1 ,
1685
+ Cq(1)
1686
+ S
1687
+ = 1
1688
+ 6
1689
+
1690
+ −6L2 + π2 − 12
1691
+
1692
+ CF ,
1693
+ Cq(2)
1694
+ S
1695
+ = C2
1696
+ F
1697
+ �L4
1698
+ 2 +
1699
+
1700
+ 2 − π2
1701
+ 6
1702
+
1703
+ L2 + 6(4L − 5)ζ3 − 2π2L + 7π2
1704
+ 3
1705
+ − 83π4
1706
+ 360 + 6
1707
+
1708
+ + CF
1709
+ �11L3CA
1710
+ 9
1711
+ + 1
1712
+ 3π2L2CA − 67L2CA
1713
+ 9
1714
+ − 26Lζ3CA + 11
1715
+ 9 π2LCA + 242LCA
1716
+ 27
1717
+ +
1718
+ 151ζ3CA
1719
+ 9
1720
+ + 11π4CA
1721
+ 45
1722
+ − 467CA
1723
+ 81
1724
+ − 103π2CA
1725
+ 108
1726
+ − 10L3
1727
+ 9
1728
+ + 50L2
1729
+ 9
1730
+ − 10π2L
1731
+ 9
1732
+ − 280L
1733
+ 27
1734
+ + 10ζ3
1735
+ 9
1736
+ +25π2
1737
+ 54
1738
+ + 1000
1739
+ 81
1740
+
1741
+ ,
1742
+ Cq(3)
1743
+ S
1744
+ = C3
1745
+ F
1746
+
1747
+ −L6
1748
+ 6 + π2L4
1749
+ 12
1750
+ − L4 − 24L3ζ3 + 2π2L3 + 30L2ζ3 + 83π4L2
1751
+ 360
1752
+ − 7π2L2
1753
+ 3
1754
+ − 6L2
1755
+ −240Lζ5 − 4
1756
+ 3π2Lζ3 + 20Lζ3 + 19π4L
1757
+ 15
1758
+ + 7π2L − 50L + 16ζ2
1759
+ 3 + 89π2ζ3
1760
+ 3
1761
+ −654ζ3 + 424ζ5 + 37729π6
1762
+ 136080 + 575
1763
+ 3
1764
+ − 353π2
1765
+ 18
1766
+ − 77π4
1767
+ 36
1768
+
1769
+ + C2
1770
+ F CA
1771
+
1772
+ −11L5
1773
+ 9
1774
+ − π2L4
1775
+ 3
1776
+ +67L4
1777
+ 9
1778
+ + 26L3ζ3 − 308L3
1779
+ 27
1780
+ − 55π2L3
1781
+ 54
1782
+ − 943L2ζ3
1783
+ 9
1784
+ + 689π2L2
1785
+ 108
1786
+ + 1673L2
1787
+ 81
1788
+ − 17π4L2
1789
+ 90
1790
+ −5
1791
+ 3π2Lζ3 + 1660Lζ3
1792
+ 3
1793
+ + 120Lζ5 + π4L
1794
+ 6
1795
+ + 614L
1796
+ 27
1797
+ − 3506π2L
1798
+ 81
1799
+ + 296ζ2
1800
+ 3
1801
+ 3
1802
+ − 1676ζ5
1803
+ 9
1804
+ −4820ζ3
1805
+ 27
1806
+ − 3049π2ζ3
1807
+ 54
1808
+ + 31819π2
1809
+ 486
1810
+ − 9335
1811
+ 81
1812
+ − 893π4
1813
+ 9720 − 3169π6
1814
+ 17010
1815
+
1816
+ + C2
1817
+ F
1818
+ �10L5
1819
+ 9
1820
+ − 50L4
1821
+ 9
1822
+ +25π2L3
1823
+ 27
1824
+ + 250L3
1825
+ 27
1826
+ + 350L2ζ3
1827
+ 9
1828
+ − 335π2L2
1829
+ 54
1830
+ + 3625L2
1831
+ 162
1832
+ − 4160Lζ3
1833
+ 9
1834
+ + 7π4L
1835
+ 9
1836
+ + 2200π2L
1837
+ 81
1838
+ −7075L
1839
+ 54
1840
+ + 59980ζ3
1841
+ 81
1842
+ − 2080ζ5
1843
+ 9
1844
+ − 95π2ζ3
1845
+ 27
1846
+ − 305π4
1847
+ 972
1848
+ − 30655π2
1849
+ 972
1850
+ + 179375
1851
+ 972
1852
+
1853
+ + CF C2
1854
+ A
1855
+
1856
+ −121L4
1857
+ 54
1858
+ − 22π2L3
1859
+ 27
1860
+ + 1780L3
1861
+ 81
1862
+ + 88L2ζ3 + 13π2L2
1863
+ 27
1864
+ − 11π4L2
1865
+ 45
1866
+ − 11939L2
1867
+ 162
1868
+ +44
1869
+ 9 π2Lζ3 + 136Lζ5 − 13900Lζ3
1870
+ 27
1871
+ + 4822π2L
1872
+ 243
1873
+ − 47π4L
1874
+ 54
1875
+ + 10289L
1876
+ 1458
1877
+ + 163π2ζ3
1878
+ 9
1879
+ +107648ζ3
1880
+ 243
1881
+ + 106ζ5
1882
+ 9
1883
+ − 1136ζ2
1884
+ 3
1885
+ 9
1886
+ + 10093π4
1887
+ 4860
1888
+ − 769π6
1889
+ 5103 − 264515π2
1890
+ 8748
1891
+ + 5964431
1892
+ 26244
1893
+
1894
+ + CACF
1895
+ �110L4
1896
+ 27
1897
+ + 20π2L3
1898
+ 27
1899
+ − 2890L3
1900
+ 81
1901
+ − 40L2ζ3 + 40π2L2
1902
+ 9
1903
+ + 8635L2
1904
+ 81
1905
+ + 3620Lζ3
1906
+ 9
1907
+ – 16 –
1908
+
1909
+ +11π4L
1910
+ 27
1911
+ − 8180π2L
1912
+ 243
1913
+ − 37495L
1914
+ 729
1915
+ + 10π2ζ3
1916
+ 9
1917
+ − 20ζ5
1918
+ 3
1919
+ − 14300ζ3
1920
+ 27
1921
+ + 166295π2
1922
+ 4374
1923
+ −119π4
1924
+ 243
1925
+ − 2609875
1926
+ 13122
1927
+
1928
+ + CF
1929
+
1930
+ −50L4
1931
+ 27
1932
+ + 1000L3
1933
+ 81
1934
+ − 100π2L2
1935
+ 27
1936
+ − 2500L2
1937
+ 81
1938
+ + 400Lζ3
1939
+ 27
1940
+ +1000π2L
1941
+ 81
1942
+ + 23200L
1943
+ 729
1944
+ − 5000ζ3
1945
+ 243
1946
+ − 235π4
1947
+ 243
1948
+ − 2650π2
1949
+ 243
1950
+ + 51800
1951
+ 6561
1952
+
1953
+ ,
1954
+ (B.4)
1955
+ where L = ln
1956
+
1957
+ (−m2
1958
+ H − iϵ)/µ2�
1959
+ . Although not used in this paper, the fourth-order coeffi-
1960
+ cients can already be extracted from the form factors calculated in Ref. [61] and Ref. [62].
1961
+ The jet functions are expanded as
1962
+ ˜jq,g(LJ, µ) =
1963
+
1964
+ n=0
1965
+ �αs
1966
+
1967
+ �n ˜jq,g(n)(LJ) .
1968
+ (B.5)
1969
+ The expansion coefficients for the quark jet function are [12, 71]
1970
+ ˜jq(1)(LJ) = CF
1971
+
1972
+ 2L2
1973
+ J − 3LJ − 2π2
1974
+ 3
1975
+ + 7
1976
+
1977
+ ,
1978
+ ˜jq(2)(LJ) = CF nf
1979
+ �4
1980
+ 9L3
1981
+ J − 29
1982
+ 9 L2
1983
+ J +
1984
+ �247
1985
+ 27 − 2π2
1986
+ 9
1987
+
1988
+ LJ + 13π2
1989
+ 18
1990
+ − 4057
1991
+ 324
1992
+
1993
+ + CF CA
1994
+
1995
+ −22
1996
+ 9 L3
1997
+ J +
1998
+ �367
1999
+ 18 − 2π2
2000
+ 3
2001
+
2002
+ L2
2003
+ J +
2004
+
2005
+ 40ζ3 + 11π2
2006
+ 9
2007
+ − 3155
2008
+ 54
2009
+
2010
+ LJ − 18ζ3 − 37π4
2011
+ 180
2012
+ −155π2
2013
+ 36
2014
+ + 53129
2015
+ 648
2016
+
2017
+ + C2
2018
+ F
2019
+
2020
+ 2L4
2021
+ J − 6L3
2022
+ J +
2023
+ �37
2024
+ 2 − 4π2
2025
+ 3
2026
+
2027
+ L2
2028
+ J +
2029
+
2030
+ 4π2 − 24ζ3 − 45
2031
+ 2
2032
+
2033
+ LJ
2034
+ −6ζ3 + 61π4
2035
+ 90
2036
+ − 97π2
2037
+ 12
2038
+ + 205
2039
+ 8
2040
+
2041
+ ,
2042
+ ˜jq(3)(LJ) = CF n2
2043
+ f
2044
+
2045
+ 4
2046
+ 27L4
2047
+ J − 116
2048
+ 81 L3
2049
+ J +
2050
+ �470
2051
+ 81 − 4π2
2052
+ 27
2053
+
2054
+ L2
2055
+ J +
2056
+ �58π2
2057
+ 81
2058
+ − 8714
2059
+ 729 − 64
2060
+ 27ζ3
2061
+
2062
+ LJ
2063
+
2064
+ + CF CAnf
2065
+
2066
+ − 44
2067
+ 27L4
2068
+ J +
2069
+ �1552
2070
+ 81
2071
+ − 8π2
2072
+ 27
2073
+
2074
+ L3
2075
+ J +
2076
+ �28π2
2077
+ 9
2078
+ − 7531
2079
+ 81
2080
+ + 8ζ3
2081
+
2082
+ L2
2083
+ J +
2084
+ �32π4
2085
+ 135
2086
+ − 1976ζ3
2087
+ 27
2088
+ − 2632π2
2089
+ 243
2090
+ + 160906
2091
+ 729
2092
+
2093
+ LJ
2094
+
2095
+ + CF C2
2096
+ A
2097
+
2098
+ 121
2099
+ 27 L4
2100
+ J +
2101
+ �44π2
2102
+ 27
2103
+ − 4649
2104
+ 81
2105
+
2106
+ L3
2107
+ J +
2108
+ �22π4
2109
+ 45
2110
+ − 132ζ3 − 389π2
2111
+ 27
2112
+ + 50689
2113
+ 162
2114
+
2115
+ L2
2116
+ J +
2117
+ �18179π2
2118
+ 486
2119
+ − 53π4
2120
+ 135 − 599375
2121
+ 729
2122
+ − 232ζ5 − 88π2ζ3
2123
+ 9
2124
+ + 6688ζ3
2125
+ 9
2126
+
2127
+ LJ
2128
+
2129
+ + C2
2130
+ F nf
2131
+
2132
+ 8
2133
+ 9L5
2134
+ J − 70
2135
+ 9 L4
2136
+ J +
2137
+ �875
2138
+ 27 − 20π2
2139
+ 27
2140
+
2141
+ L3
2142
+ J +
2143
+ �151π2
2144
+ 27
2145
+ − 15775
2146
+ 162
2147
+
2148
+ L2
2149
+ J
2150
+ +
2151
+ �32ζ3
2152
+ 9
2153
+ + 4π4
2154
+ 27 − 2833π2
2155
+ 162
2156
+ + 7325
2157
+ 36
2158
+
2159
+ LJ
2160
+
2161
+ + C2
2162
+ F CA
2163
+
2164
+ − 44
2165
+ 9 L5
2166
+ J +
2167
+ �433
2168
+ 9
2169
+ − 4π2
2170
+ 3
2171
+
2172
+ L4
2173
+ J
2174
+ +
2175
+ �164π2
2176
+ 27
2177
+ − 10537
2178
+ 54
2179
+ + 80ζ3
2180
+
2181
+ L3
2182
+ J +
2183
+
2184
+ − 68ζ3 + π4
2185
+ 30 − 2045π2
2186
+ 54
2187
+ + 157943
2188
+ 324
2189
+
2190
+ L2
2191
+ J
2192
+ +
2193
+ �290ζ3
2194
+ 3
2195
+ − 120ζ5 − 88π2ζ3
2196
+ 3
2197
+ − 923π4
2198
+ 540
2199
+ + 35075π2
2200
+ 324
2201
+ − 151405
2202
+ 216
2203
+
2204
+ LJ
2205
+
2206
+ + C3
2207
+ F
2208
+
2209
+ 4
2210
+ 3L6
2211
+ J − 6L5
2212
+ J
2213
+ – 17 –
2214
+
2215
+ +
2216
+
2217
+ 23 − 4π2
2218
+ 3
2219
+
2220
+ L4
2221
+ J +
2222
+
2223
+ 8π2 − 99
2224
+ 2 − 48ζ3
2225
+
2226
+ L3
2227
+ J +
2228
+
2229
+ 60ζ3 + 61π4
2230
+ 45
2231
+ − 151π2
2232
+ 6
2233
+ + 349
2234
+ 4
2235
+
2236
+ L2
2237
+ J
2238
+ +
2239
+
2240
+ 240ζ5 + 64π2ζ3
2241
+ 3
2242
+ − 218ζ3 − 149π4
2243
+ 30
2244
+ + 145π2
2245
+ 4
2246
+ − 815
2247
+ 8
2248
+
2249
+ LJ
2250
+
2251
+ + cJ
2252
+ 3q ,
2253
+ (B.6)
2254
+ The scale-independent constant term cJ
2255
+ 3q is given by [71]
2256
+ cJ
2257
+ 3q = 25.06777873C3
2258
+ F + 32.81169125CAC2
2259
+ F − 0.7795843561C2
2260
+ ACF − 31.65196210CACF nfTF
2261
+ − 61.78995095C2
2262
+ F nfTF + 28.49157341CF n2
2263
+ fT 2
2264
+ F .
2265
+ (B.7)
2266
+ The expansion coefficients for the gluon jet function are [70, 72]
2267
+ ˜jg(1)(LJ) = CA
2268
+
2269
+ 2L2
2270
+ J − 11
2271
+ 3 LJ + 67
2272
+ 9 − 2π2
2273
+ 3
2274
+
2275
+ + nf
2276
+ �2
2277
+ 3LJ − 10
2278
+ 9
2279
+
2280
+ ,
2281
+ ˜jg(2)(LJ) = n2
2282
+ f
2283
+ �4
2284
+ 9L2
2285
+ J − 40
2286
+ 27LJ − 2π2
2287
+ 27 + 100
2288
+ 81
2289
+
2290
+ + CF nf
2291
+
2292
+ 2LJ + 8ζ3 − 55
2293
+ 6
2294
+
2295
+ + CAnf
2296
+
2297
+ 16
2298
+ 9 L3
2299
+ J
2300
+ − 28
2301
+ 3 L2
2302
+ J +
2303
+ �224
2304
+ 9
2305
+ − 10π2
2306
+ 9
2307
+
2308
+ LJ − 8ζ3
2309
+ 3 + 67π2
2310
+ 27
2311
+ − 760
2312
+ 27
2313
+
2314
+ + C2
2315
+ A
2316
+
2317
+ 2L4
2318
+ J − 88
2319
+ 9 L3
2320
+ J +
2321
+ �389
2322
+ 9
2323
+ − 2π2
2324
+
2325
+ L2
2326
+ J
2327
+ +
2328
+ �55π2
2329
+ 9
2330
+ + 16ζ3 − 2570
2331
+ 27
2332
+
2333
+ LJ − 88ζ3
2334
+ 3
2335
+ + 17π4
2336
+ 36
2337
+ − 362π2
2338
+ 27
2339
+ + 20215
2340
+ 162
2341
+
2342
+ ,
2343
+ ˜jg(3)(LJ) = n3
2344
+ f
2345
+
2346
+ 8
2347
+ 27L3
2348
+ J − 40
2349
+ 27L2
2350
+ J +
2351
+ �200
2352
+ 81 − 4π2
2353
+ 27
2354
+
2355
+ LJ
2356
+
2357
+ + CF n2
2358
+ f
2359
+
2360
+ 10
2361
+ 3 L2
2362
+ J +
2363
+
2364
+ 16ζ3 − 24
2365
+
2366
+ LJ
2367
+
2368
+ − C2
2369
+ F nfLJ + CAn2
2370
+ f
2371
+
2372
+ 4
2373
+ 3L4
2374
+ J − 292
2375
+ 27 L3
2376
+ J +
2377
+ �3326
2378
+ 81
2379
+ − 4π2
2380
+ 3
2381
+
2382
+ L2
2383
+ J +
2384
+ �508π2
2385
+ 81
2386
+ − 116509
2387
+ 1458
2388
+ − 256ζ3
2389
+ 27
2390
+
2391
+ LJ
2392
+
2393
+ + CACF nf
2394
+
2395
+ 16
2396
+ 3 L3
2397
+ J +
2398
+
2399
+ 32ζ3 − 55
2400
+
2401
+ L2
2402
+ J +
2403
+
2404
+ − 8π4
2405
+ 45 − 10π2
2406
+ 3
2407
+ + 5599
2408
+ 27
2409
+ − 1096ζ3
2410
+ 9
2411
+
2412
+ LJ
2413
+
2414
+ + C2
2415
+ Anf
2416
+
2417
+ 20
2418
+ 9 L5
2419
+ J − 64
2420
+ 3 L4
2421
+ J −
2422
+ �88π2
2423
+ 27
2424
+ − 3106
2425
+ 27
2426
+
2427
+ L3
2428
+ J +
2429
+ �586π2
2430
+ 27
2431
+ − 8ζ3
2432
+ 3 − 10067
2433
+ 27
2434
+
2435
+ L2
2436
+ J
2437
+ +
2438
+ �449π4
2439
+ 270
2440
+ − 16831π2
2441
+ 243
2442
+ + 1052135
2443
+ 1458
2444
+ − 1280ζ3
2445
+ 27
2446
+
2447
+ LJ
2448
+
2449
+ + C3
2450
+ A
2451
+
2452
+ 4
2453
+ 3L6
2454
+ J − 110
2455
+ 9 L5
2456
+ J +
2457
+
2458
+ 85 − 8π2
2459
+ 3
2460
+
2461
+ L4
2462
+ J
2463
+ +
2464
+ �484π2
2465
+ 27
2466
+ − 9623
2467
+ 27
2468
+ + 32ζ3
2469
+
2470
+ L3
2471
+ J +
2472
+ �169π4
2473
+ 90
2474
+ − 484ζ3
2475
+ 3
2476
+ − 2362π2
2477
+ 27
2478
+ + 85924
2479
+ 81
2480
+
2481
+ L2
2482
+ J
2483
+ +
2484
+
2485
+ − 4411π4
2486
+ 540
2487
+ + 52678π2
2488
+ 243
2489
+ − 1448021
2490
+ 729
2491
+ − 112ζ5 − 160π2ζ3
2492
+ 9
2493
+ + 6316ζ3
2494
+ 9
2495
+
2496
+ LJ
2497
+
2498
+ + cJ
2499
+ 3g . (B.8)
2500
+ From Ref. [72], we have cJ
2501
+ 3g = 647.7843434644 for nf = 5.
2502
+ The soft functions are expanded as
2503
+ ˜sq,g(LS, µ) =
2504
+
2505
+ n=0
2506
+ �αs
2507
+
2508
+ �n
2509
+ ˜sq,g(n)(LS) .
2510
+ (B.9)
2511
+ – 18 –
2512
+
2513
+ The expansion coefficients for the quark soft function are [12, 80]
2514
+ ˜sq(1)(LS) = CF
2515
+
2516
+ −8L2
2517
+ S − π2�
2518
+ ,
2519
+ ˜sq(2)(LS) = CF nf
2520
+
2521
+ − 32
2522
+ 9 L3
2523
+ S + 80
2524
+ 9 L2
2525
+ S −
2526
+ �8π2
2527
+ 9
2528
+ + 224
2529
+ 27
2530
+
2531
+ LS − 52ζ3
2532
+ 9
2533
+ + 77π2
2534
+ 27
2535
+ + 40
2536
+ 81
2537
+
2538
+ + CF CA
2539
+
2540
+ 176
2541
+ 9 L3
2542
+ S +
2543
+ �8π2
2544
+ 3
2545
+ − 536
2546
+ 9
2547
+
2548
+ L2
2549
+ S +
2550
+ �44π2
2551
+ 9
2552
+ − 56ζ3 + 1616
2553
+ 27
2554
+
2555
+ LS + 286ζ3
2556
+ 9
2557
+ + 14π4
2558
+ 15
2559
+ − 871π2
2560
+ 54
2561
+ − 2140
2562
+ 81
2563
+
2564
+ + C2
2565
+ F
2566
+
2567
+ 32L4
2568
+ S + 8π2L2
2569
+ S + π4
2570
+ 2
2571
+
2572
+ ,
2573
+ ˜sq(3)(LS) = CF n2
2574
+ f
2575
+
2576
+ − 64
2577
+ 27L4
2578
+ S + 640
2579
+ 81 L3
2580
+ S −
2581
+ �32π2
2582
+ 27
2583
+ + 800
2584
+ 81
2585
+
2586
+ L2
2587
+ S +
2588
+ �64π2
2589
+ 9
2590
+ − 3200
2591
+ 729 − 64ζ3
2592
+ 9
2593
+
2594
+ LS
2595
+
2596
+ + CF CAnf
2597
+
2598
+ 704
2599
+ 27 L4
2600
+ S +
2601
+ �64π2
2602
+ 27
2603
+ − 9248
2604
+ 81
2605
+
2606
+ L3
2607
+ S +
2608
+ �64π2
2609
+ 9
2610
+ + 16408
2611
+ 81
2612
+
2613
+ L2
2614
+ S +
2615
+ �6032ζ3
2616
+ 27
2617
+ + 64π4
2618
+ 45
2619
+ − 19408π2
2620
+ 243
2621
+ − 80324
2622
+ 729
2623
+
2624
+ LS
2625
+
2626
+ + CF C2
2627
+ A
2628
+
2629
+ − 1936
2630
+ 27 L4
2631
+ S −
2632
+ �352π2
2633
+ 27
2634
+ − 28480
2635
+ 81
2636
+
2637
+ L3
2638
+ S +
2639
+ �104π2
2640
+ 27
2641
+ − 88π4
2642
+ 45
2643
+ − 62012
2644
+ 81
2645
+ + 352ζ3
2646
+
2647
+ L2
2648
+ S +
2649
+ �50344π2
2650
+ 243
2651
+ − 88π4
2652
+ 9
2653
+ + 556042
2654
+ 729
2655
+ + 384ζ5 + 176π2ζ3
2656
+ 9
2657
+ − 36272ζ3
2658
+ 27
2659
+
2660
+ LS
2661
+
2662
+ + C2
2663
+ F nf
2664
+
2665
+ 256
2666
+ 9 L5
2667
+ S − 640
2668
+ 9 L4
2669
+ S +
2670
+ �32π2
2671
+ 3
2672
+ + 1504
2673
+ 27
2674
+
2675
+ L3
2676
+ S +
2677
+ �5620
2678
+ 81
2679
+ − 856π2
2680
+ 27
2681
+ − 160ζ3
2682
+ 9
2683
+
2684
+ L2
2685
+ S +
2686
+ �608ζ3
2687
+ 9
2688
+ + 56π4
2689
+ 45
2690
+ + 152π2
2691
+ 27
2692
+ − 3422
2693
+ 27
2694
+
2695
+ LS
2696
+
2697
+ + C2
2698
+ F CA
2699
+
2700
+ − 1408
2701
+ 9
2702
+ L5
2703
+ S
2704
+ +
2705
+
2706
+ 4288
2707
+ 9
2708
+ − 64π2
2709
+ 3
2710
+
2711
+ L4
2712
+ S +
2713
+
2714
+ 448ζ3 − 176π2
2715
+ 3
2716
+ − 12928
2717
+ 27
2718
+
2719
+ L3
2720
+ S +
2721
+ �5092π2
2722
+ 27
2723
+ − 2288ζ3
2724
+ 9
2725
+ − 152π4
2726
+ 15
2727
+ + 17120
2728
+ 81
2729
+
2730
+ L2
2731
+ S +
2732
+
2733
+ 56π2ζ3 − 44π4
2734
+ 9
2735
+ − 1616π2
2736
+ 27
2737
+
2738
+ LS
2739
+
2740
+ + C3
2741
+ F
2742
+
2743
+ − 256
2744
+ 3 L6
2745
+ S − 32π2L4
2746
+ S − 4π4L2
2747
+ S
2748
+
2749
+ + cS
2750
+ 3q .
2751
+ (B.10)
2752
+ The three-loop scale-independent term cS
2753
+ 3q is not precisely known at the moment. Its calcu-
2754
+ lation is under active investigation [84, 89, 90]. In Ref. [71], this term was extracted through
2755
+ a numeric fit to the fixed-order thrust distribution. The value (with large uncertainties)
2756
+ reads
2757
+ cS
2758
+ 3q = −19988 ± 1440(stat.) ± 4000(syst.) .
2759
+ (B.11)
2760
+ The results for the gluon soft function can be obtained from the quark one employing
2761
+ the non-Abelian exponential theorem [91–93]. Up to three loops, they are related by the
2762
+ Casimir scaling
2763
+ ln [˜sg(LS, µ)] = CA
2764
+ CF
2765
+ ln [˜sq(LS, µ)] .
2766
+ (B.12)
2767
+ Hence the expansion coefficients for the gluon soft function are
2768
+ ˜sg(1)(LS) = CA
2769
+
2770
+ −8L2
2771
+ S − π2�
2772
+ ,
2773
+ – 19 –
2774
+
2775
+ ˜sg(2)(LS) = CAnf
2776
+
2777
+ − 32
2778
+ 9 L3
2779
+ S + 80
2780
+ 9 L2
2781
+ S −
2782
+ �8π2
2783
+ 9
2784
+ + 224
2785
+ 27
2786
+
2787
+ LS + 77π2
2788
+ 27
2789
+ + 40
2790
+ 81 − 52ζ3
2791
+ 9
2792
+
2793
+ + C2
2794
+ A
2795
+
2796
+ 32L4
2797
+ S + 176
2798
+ 9 L3
2799
+ S +
2800
+ �32π2
2801
+ 3
2802
+ − 536
2803
+ 9
2804
+
2805
+ L2
2806
+ S +
2807
+ �44π2
2808
+ 9
2809
+ + 1616
2810
+ 27
2811
+ − 56ζ3
2812
+
2813
+ LS + 286ζ3
2814
+ 9
2815
+ + 43π4
2816
+ 30
2817
+ − 871π2
2818
+ 54
2819
+ − 2140
2820
+ 81
2821
+
2822
+ ,
2823
+ ˜sg(3)(LS) = CAn2
2824
+ f
2825
+
2826
+ − 64
2827
+ 27L4
2828
+ S + 640
2829
+ 81 L3
2830
+ S −
2831
+ �32π2
2832
+ 27
2833
+ + 800
2834
+ 81
2835
+
2836
+ L2
2837
+ S +
2838
+ �64π2
2839
+ 9
2840
+ − 3200
2841
+ 729 − 64ζ3
2842
+ 9
2843
+
2844
+ LS
2845
+
2846
+ + CF CAnf
2847
+
2848
+ − 32
2849
+ 3 L3
2850
+ S +
2851
+ �220
2852
+ 3
2853
+ − 64ζ3
2854
+
2855
+ L2
2856
+ S +
2857
+ �608ζ3
2858
+ 9
2859
+ + 16π4
2860
+ 45
2861
+ − 8π2
2862
+ 3
2863
+ − 3422
2864
+ 27
2865
+
2866
+ LS
2867
+
2868
+ + C2
2869
+ Anf
2870
+
2871
+ 256
2872
+ 9 L5
2873
+ S − 1216
2874
+ 27 L4
2875
+ S +
2876
+ �352π2
2877
+ 27
2878
+ − 3872
2879
+ 81
2880
+
2881
+ L3
2882
+ S +
2883
+ �416ζ3
2884
+ 9
2885
+ − 664π2
2886
+ 27
2887
+ + 16088
2888
+ 81
2889
+
2890
+ L2
2891
+ S
2892
+ +
2893
+ �6032ζ3
2894
+ 27
2895
+ + 104π4
2896
+ 45
2897
+ − 17392π2
2898
+ 243
2899
+ − 80324
2900
+ 729
2901
+
2902
+ LS
2903
+
2904
+ + C3
2905
+ A
2906
+
2907
+ − 256
2908
+ 3 L6
2909
+ S − 1408
2910
+ 9
2911
+ L5
2912
+ S
2913
+ +
2914
+ �10928
2915
+ 27
2916
+ − 160π2
2917
+ 3
2918
+
2919
+ L4
2920
+ S +
2921
+
2922
+ 448ζ3 − 1936π2
2923
+ 27
2924
+ − 10304
2925
+ 81
2926
+
2927
+ L3
2928
+ S +
2929
+ �880ζ3
2930
+ 9
2931
+ − 724π4
2932
+ 45
2933
+ + 1732π2
2934
+ 9
2935
+ − 4988
2936
+ 9
2937
+
2938
+ L2
2939
+ S +
2940
+ �680π2ζ3
2941
+ 9
2942
+ − 36272ζ3
2943
+ 27
2944
+ + 384ζ5 − 44π4
2945
+ 3
2946
+ + 35800π2
2947
+ 243
2948
+ + 556042
2949
+ 729
2950
+
2951
+ LS
2952
+
2953
+ + cS
2954
+ 3g ,
2955
+ (B.13)
2956
+ where
2957
+ cS
2958
+ 3g = CACF nf
2959
+
2960
+ −52
2961
+ 9 π2ζ3 + 77π4
2962
+ 27
2963
+ + 40π2
2964
+ 81
2965
+
2966
+ + C2
2967
+ Anf
2968
+ �52π2ζ3
2969
+ 9
2970
+ − 77π4
2971
+ 27
2972
+ − 40π2
2973
+ 81
2974
+
2975
+ + C3
2976
+ A
2977
+
2978
+ −286
2979
+ 9 π2ζ3 − 11π6
2980
+ 10
2981
+ + 871π4
2982
+ 54
2983
+ + 2140π2
2984
+ 81
2985
+
2986
+ + C2
2987
+ ACF
2988
+ �286π2ζ3
2989
+ 9
2990
+ + 14π6
2991
+ 15
2992
+ − 871π4
2993
+ 54
2994
+ − 2140π2
2995
+ 81
2996
+
2997
+ + CAC2
2998
+ F
2999
+ 1
3000
+ 6π6 + CA
3001
+ CF
3002
+ cS
3003
+ 3q .
3004
+ (B.14)
3005
+ C
3006
+ Anomalous dimensions
3007
+ In this Appendix we list the expressions of the various anomalous dimensions appearing in
3008
+ the resummation formula.
3009
+ For the cusp anomalous dimensions, we write
3010
+ Γq
3011
+ cusp(αs) = CF
3012
+
3013
+ γcusp(αs) + δγq
3014
+ cusp(αs)
3015
+
3016
+ ,
3017
+ Γg
3018
+ cusp(αs) = CA
3019
+
3020
+ γcusp(αs) + δγg
3021
+ cusp(αs)
3022
+
3023
+ .
3024
+ (C.1)
3025
+ Up to three loops the cusp anomalous dimensions satisfy Casimir scaling, so that δγq
3026
+ cusp(αs)
3027
+ and δγg
3028
+ cusp(αs) only start at α4
3029
+ s. We define the expansion as
3030
+ γcusp(αs) =
3031
+
3032
+ n=0
3033
+ γ(n)
3034
+ cusp
3035
+ �αs
3036
+
3037
+ �n+1
3038
+ ,
3039
+ δγq,g
3040
+ cusp(αs) =
3041
+
3042
+ n=3
3043
+ δγq,g(n)
3044
+ cusp
3045
+ �αs
3046
+
3047
+ �n+1
3048
+ (C.2)
3049
+ – 20 –
3050
+
3051
+ The expansion coefficients are [31, 33–35]
3052
+ γ(0)
3053
+ cusp = 4 ,
3054
+ γ(1)
3055
+ cusp = −1
3056
+ 34π2CA + 268CA
3057
+ 9
3058
+ − 80nfTF
3059
+ 9
3060
+ ,
3061
+ γ(2)
3062
+ cusp = −
3063
+ 16n2
3064
+ f
3065
+ 27
3066
+ − 208nfζ(3)
3067
+ 3
3068
+ + 80π2nf
3069
+ 9
3070
+ − 1276nf
3071
+ 9
3072
+ + 264ζ3 + 44π4
3073
+ 5
3074
+ − 536π2
3075
+ 3
3076
+ + 1470nf ,
3077
+ γ(3)
3078
+ cusp = n3
3079
+ f
3080
+ �64ζ3
3081
+ 27 − 32
3082
+ 81
3083
+
3084
+ + n2
3085
+ f
3086
+ �4160ζ3
3087
+ 27
3088
+ − 304π2
3089
+ 81
3090
+ − 104π4
3091
+ 135
3092
+ + 17875
3093
+ 243
3094
+
3095
+ + nf
3096
+ �416π2ζ3
3097
+ 3
3098
+ −153920ζ3
3099
+ 27
3100
+ + 19504ζ5
3101
+ 9
3102
+ + 12800π2
3103
+ 27
3104
+ − 616π4
3105
+ 45
3106
+ − 344345
3107
+ 81
3108
+
3109
+ − 432ζ2
3110
+ 3 − 528π2ζ3
3111
+ + 20944ζ3 − 10824ζ5 + 2706π4
3112
+ 5
3113
+ + 84278
3114
+ 3
3115
+ − 44200π2
3116
+ 9
3117
+ − 2504π6
3118
+ 105
3119
+ ,
3120
+ δγq(3)
3121
+ cusp = nf
3122
+
3123
+ −80ζ3
3124
+ 9
3125
+ − 400ζ5
3126
+ 9
3127
+ + 40π2
3128
+ 9
3129
+
3130
+ − 720ζ2
3131
+ 3 + 80ζ3 + 2200ζ5 − 40π2 − 124π6
3132
+ 63
3133
+ ,
3134
+ δγg(3)
3135
+ cusp = nf
3136
+
3137
+ −80ζ3
3138
+ 3
3139
+ − 400ζ5
3140
+ 3
3141
+ + 40π2
3142
+ 3
3143
+
3144
+ − 2160ζ2
3145
+ 3 + 240ζ3 + 6600ζ5 − 120π2 − 124π6
3146
+ 21
3147
+ .
3148
+ (C.3)
3149
+ As far as we know, there is no complete results for the five-loop cusp anomalous dimensions.
3150
+ In this paper, we make use of the approximate results estimated in [35],
3151
+ γ(4)
3152
+ cusp + δγq(4)
3153
+ cusp = 50000 ± 40000 ,
3154
+ γ(4)
3155
+ cusp + δγg(4)
3156
+ cusp = 30000 ± 60000 .
3157
+ (C.4)
3158
+ The anomalous dimension for the quark Yukawa coupling reads
3159
+ γy = −
3160
+
3161
+ n=0
3162
+ �αs
3163
+
3164
+ �n+1
3165
+ γ(n)
3166
+ y
3167
+ ,
3168
+ (C.5)
3169
+ where [44, 45]
3170
+ γ(0)
3171
+ y
3172
+ = 6CF ,
3173
+ γ(1)
3174
+ y
3175
+ = 97CACF
3176
+ 3
3177
+ − 10CF nf
3178
+ 3
3179
+ + 3C2
3180
+ F ,
3181
+ γ(2)
3182
+ y
3183
+ = −48ζ3CACF nf − 556
3184
+ 27 CACF nf − 129
3185
+ 2 CAC2
3186
+ F + 11413
3187
+ 54
3188
+ C2
3189
+ ACF + 48ζ3C2
3190
+ F nf
3191
+ − 46C2
3192
+ F nf − 70
3193
+ 27CF n2
3194
+ f + 129C3
3195
+ F ,
3196
+ γ(3)
3197
+ y
3198
+ = n3
3199
+ f
3200
+ �128ζ3
3201
+ 27
3202
+ − 664
3203
+ 243
3204
+
3205
+ + n2
3206
+ f
3207
+ �1600ζ3
3208
+ 9
3209
+ − 32π4
3210
+ 27
3211
+ + 10484
3212
+ 243
3213
+
3214
+ + nf
3215
+
3216
+ −68384ζ3
3217
+ 9
3218
+ +36800ζ5
3219
+ 9
3220
+ + 176π4
3221
+ 9
3222
+ − 183446
3223
+ 27
3224
+
3225
+ + 271360ζ3
3226
+ 27
3227
+ − 17600ζ5 + 4603055
3228
+ 81
3229
+ .
3230
+ (C.6)
3231
+ The anomalous dimension for the Wilson coefficient Ct is
3232
+ γt(αs) =
3233
+
3234
+ n=0
3235
+ �αs
3236
+
3237
+ �n+1
3238
+ γ(n)
3239
+ t
3240
+ ,
3241
+ (C.7)
3242
+ – 21 –
3243
+
3244
+ where [47–51]
3245
+ γ(0)
3246
+ t
3247
+ = 0 ,
3248
+ γ(1)
3249
+ t
3250
+ = 40
3251
+ 3 CAnfTF − 1
3252
+ 368C2
3253
+ A + 8CF nfTF ,
3254
+ γ(2)
3255
+ t
3256
+ = − 1
3257
+ 27650n2
3258
+ f + 10066nf
3259
+ 9
3260
+ − 5714 ,
3261
+ γ(2)
3262
+ t
3263
+ = −
3264
+ 2186n3
3265
+ f
3266
+ 243
3267
+ + n2
3268
+ f
3269
+
3270
+ −12944ζ3
3271
+ 27
3272
+ − 50065
3273
+ 27
3274
+
3275
+ + nf
3276
+ �13016ζ3
3277
+ 9
3278
+ + 1078361
3279
+ 27
3280
+
3281
+ − 21384ζ3 − 149753 .
3282
+ (C.8)
3283
+ The anomalous dimension for the jet functions are
3284
+ γq,g
3285
+ j (αs) =
3286
+
3287
+ n=0
3288
+ �αs
3289
+
3290
+ �n+1
3291
+ γq,g(n)
3292
+ j
3293
+ ,
3294
+ (C.9)
3295
+ where [66, 81]
3296
+ γq(0)
3297
+ j
3298
+ = −3CF ,
3299
+ γq(1)
3300
+ j
3301
+ = 8π2nf
3302
+ 27
3303
+ + 484nf
3304
+ 81
3305
+ + 352ζ3
3306
+ 3
3307
+ − 4π2
3308
+ 3
3309
+ − 3610
3310
+ 27 ,
3311
+ γq(2)
3312
+ j
3313
+ = −256
3314
+ 81 ζ3n2
3315
+ f − 14272ζ3nf
3316
+ 81
3317
+ − 80
3318
+ 243π2n2
3319
+ f +
3320
+ 13828n2
3321
+ f
3322
+ 2187
3323
+ + 1172π4nf
3324
+ 1215
3325
+ + 1592π2nf
3326
+ 243
3327
+ + 100984nf
3328
+ 729
3329
+ − 25696ζ5
3330
+ 9
3331
+ − 9632π2ζ3
3332
+ 81
3333
+ + 153136ζ(3)
3334
+ 27
3335
+ − 6818π4
3336
+ 405
3337
+ + 7588π2
3338
+ 81
3339
+ − 470183
3340
+ 243
3341
+ ,
3342
+ γq(3)
3343
+ j
3344
+ = 4483.56 ,
3345
+ (C.10)
3346
+ and [66, 70]
3347
+ γg(0)
3348
+ j
3349
+ = −β0 ,
3350
+ γg(1)
3351
+ j
3352
+ = −2
3353
+ 9π2nfCA + 184nfCA
3354
+ 27
3355
+ + 16ζ3C2
3356
+ A + 11
3357
+ 9 π2C2
3358
+ A − 1096C2
3359
+ A
3360
+ 27
3361
+ + 2nfCF ,
3362
+ γg(2)
3363
+ j
3364
+ = −304
3365
+ 9 nfζ3CACF − 8
3366
+ 45π4nfCACF − 2
3367
+ 3π2nfCACF + 4145
3368
+ 54 nfCACF − 112
3369
+ 27 n2
3370
+ fζ3CA
3371
+ +
3372
+ 1811n2
3373
+ fCA
3374
+ 1458
3375
+ + 20
3376
+ 81π2n2
3377
+ fCA − 8
3378
+ 27nfζ3C2
3379
+ A + 77
3380
+ 135π4nfC2
3381
+ A − 1306
3382
+ 243 π2nfC2
3383
+ A
3384
+ + 42557nfC2
3385
+ A
3386
+ 1458
3387
+ − 64
3388
+ 9 π2ζ3C3
3389
+ A + 260ζ3C3
3390
+ A − 112ζ5C3
3391
+ A + 6217
3392
+ 243 π2C3
3393
+ A − 583
3394
+ 270π4C3
3395
+ A
3396
+ − 331153C3
3397
+ A
3398
+ 1458
3399
+
3400
+ 11n2
3401
+ fCF
3402
+ 9
3403
+ − nfC2
3404
+ F ,
3405
+ γg(3)
3406
+ j
3407
+ = 26138.7 .
3408
+ (C.11)
3409
+ The hard anomalous dimensions are
3410
+ γq,g
3411
+ H (αs) =
3412
+
3413
+ n=0
3414
+ �αs
3415
+
3416
+ �n+1
3417
+ γq,g(n)
3418
+ H
3419
+ ,
3420
+ (C.12)
3421
+ – 22 –
3422
+
3423
+ where the coefficients up to three loops can be obtained from Eq. (B.3) and Eq. (B.4). For
3424
+ the gluon case, they read [53–57, 59, 62]
3425
+ γg(0)
3426
+ H
3427
+ = 0 ,
3428
+ γg(1)
3429
+ H
3430
+ = −2π2nf
3431
+ 3
3432
+ − 152nf
3433
+ 9
3434
+ + 36ζ3 + 11π2 − 160
3435
+ 3 ,
3436
+ γg(2)
3437
+ H
3438
+ = −
3439
+ 112n2
3440
+ fζ3
3441
+ 9
3442
+ +
3443
+ 20π2n2
3444
+ f
3445
+ 27
3446
+ +
3447
+ 7714n2
3448
+ f
3449
+ 243
3450
+ + 920nfζ3
3451
+ 9
3452
+ + 214π4nf
3453
+ 45
3454
+ − 1270π2nf
3455
+ 27
3456
+ − 76256nf
3457
+ 81
3458
+ − 120π2ζ3 + 2196ζ3 − 864ζ5 + 6109π2
3459
+ 9
3460
+ − 319π4
3461
+ 5
3462
+ + 37045
3463
+ 27
3464
+ ,
3465
+ γg(3)
3466
+ H
3467
+ = n3
3468
+ f
3469
+ �400ζ3
3470
+ 81
3471
+ + 8π2
3472
+ 81 − 64π4
3473
+ 405 + 38426
3474
+ 2187
3475
+
3476
+ + n2
3477
+ f
3478
+ �368π2ζ3
3479
+ 9
3480
+ − 49342ζ3
3481
+ 81
3482
+ +8000ζ5
3483
+ 9
3484
+ + 19675π2
3485
+ 486
3486
+ − 2474π4
3487
+ 405
3488
+ + 3605645
3489
+ 1944
3490
+
3491
+ + nf
3492
+ �32ζ2
3493
+ 3
3494
+ 3
3495
+ − 504π2ζ3
3496
+ +528362ζ3
3497
+ 27
3498
+ − 90140ζ5
3499
+ 9
3500
+ + 52153π4
3501
+ 135
3502
+ − 262193π2
3503
+ 162
3504
+ − 7927313
3505
+ 216
3506
+ − 54917π6
3507
+ 2835
3508
+
3509
+ + 21384ζ2
3510
+ 3 + 2004π4ζ3
3511
+ 5
3512
+ − 576π2ζ3 + 119536ζ3
3513
+ 3
3514
+ + 1152π2ζ5
3515
+ − 62796ζ5 − 22734ζ7 + 18051π6
3516
+ 70
3517
+ + 1041691π2
3518
+ 54
3519
+ − 123029π4
3520
+ 30
3521
+ + 5481844
3522
+ 81
3523
+ .
3524
+ (C.13)
3525
+ For the quark case, they are given as [53, 60, 61, 94]
3526
+ γq(0)
3527
+ H
3528
+ = 0 ,
3529
+ γq(1)
3530
+ H
3531
+ = 8π2nf
3532
+ 9
3533
+ + 160nf
3534
+ 81
3535
+ + 368ζ3
3536
+ 3
3537
+ − 68π2
3538
+ 9
3539
+ − 352
3540
+ 27 ,
3541
+ γq(2)
3542
+ H
3543
+ = −
3544
+ 64n2
3545
+ fζ3
3546
+ 81
3547
+
3548
+ 80π2n2
3549
+ f
3550
+ 81
3551
+ +
3552
+ 11776n2
3553
+ f
3554
+ 2187
3555
+ − 23584nfζ3
3556
+ 81
3557
+ + 136π4nf
3558
+ 1215
3559
+ + 9128π2nf
3560
+ 243
3561
+ − 47192nf
3562
+ 729
3563
+ + 164144ζ3
3564
+ 27
3565
+ − 30656ζ5
3566
+ 9
3567
+ − 9760π2ζ3
3568
+ 81
3569
+ − 10124π2
3570
+ 81
3571
+ + 213772
3572
+ 243
3573
+ − 4132π4
3574
+ 405
3575
+ ,
3576
+ γq(3)
3577
+ s
3578
+ = n3
3579
+ f
3580
+
3581
+ −2240ζ3
3582
+ 729
3583
+ − 32π2
3584
+ 243 − 128π4
3585
+ 3645 + 95744
3586
+ 19683
3587
+
3588
+ + n2
3589
+ f
3590
+
3591
+ − 1
3592
+ 2432816π2ζ3
3593
+ +18848ζ3
3594
+ 729
3595
+ + 25984ζ5
3596
+ 81
3597
+ + 6856π4
3598
+ 10935 − 130486π2
3599
+ 2187
3600
+ + 126461
3601
+ 4374
3602
+
3603
+ + nf
3604
+
3605
+ −110848ζ2
3606
+ 3
3607
+ 27
3608
+ +115504π2ζ3
3609
+ 243
3610
+ − 3066064ζ3
3611
+ 243
3612
+ + 59488ζ5
3613
+ 9
3614
+ + 29264π4
3615
+ 729
3616
+ + 755786π2
3617
+ 729
3618
+ − 1641457
3619
+ 486
3620
+ −975668π6
3621
+ 229635
3622
+
3623
+ + 175712ζ2
3624
+ 3
3625
+ 9
3626
+ + 992696π4ζ3
3627
+ 3645
3628
+ + 1365152ζ3
3629
+ 9
3630
+ + 243872π2ζ5
3631
+ 81
3632
+ + 2888332ζ7
3633
+ 27
3634
+ − 81584π2ζ3
3635
+ 9
3636
+ − 2158832ζ5
3637
+ 9
3638
+ + 2058794π6
3639
+ 25515
3640
+ − 362842π2
3641
+ 243
3642
+ + 19161124
3643
+ 729
3644
+ − 1095218π4
3645
+ 1215
3646
+ .
3647
+ (C.14)
3648
+ – 23 –
3649
+
3650
+ Due to the RG invariance of physical observables, the soft anomalous dimensions satisfy
3651
+ the consistency relations
3652
+ γq
3653
+ s = γq
3654
+ H + γy − 2γq
3655
+ j ,
3656
+ γg
3657
+ s = γg
3658
+ H + γt + β
3659
+ αs
3660
+ − 2γg
3661
+ j .
3662
+ (C.15)
3663
+ We expand them in αs
3664
+ γq,g
3665
+ s (αs) =
3666
+
3667
+ n=0
3668
+ �αs
3669
+
3670
+ �n+1
3671
+ γq,g(n)
3672
+ s
3673
+ ,
3674
+ (C.16)
3675
+ where
3676
+ γq(0)
3677
+ s
3678
+ = 0 ,
3679
+ γq(1)
3680
+ s
3681
+ = 8π2nf
3682
+ 27
3683
+ − 448nf
3684
+ 81
3685
+ − 112ζ3 − 44π2
3686
+ 9
3687
+ + 3232
3688
+ 27 ,
3689
+ γq(2)
3690
+ s
3691
+ =
3692
+ 448ζ3n2
3693
+ f
3694
+ 81
3695
+ + 13600ζ3nf
3696
+ 81
3697
+ − 80
3698
+ 243π2n2
3699
+ f −
3700
+ 8320n2
3701
+ f
3702
+ 2187
3703
+ − 736π4nf
3704
+ 405
3705
+ + 5944π2nf
3706
+ 243
3707
+ − 129496nf
3708
+ 729
3709
+ + 2304ζ5 + 352π2ζ3
3710
+ 3
3711
+ − 5264ζ3 + 352π4
3712
+ 15
3713
+ − 25300π2
3714
+ 81
3715
+ + 547124
3716
+ 243
3717
+ ,
3718
+ γq(3)
3719
+ s
3720
+ = −5350.4 ,
3721
+ (C.17)
3722
+ and
3723
+ γg(0)
3724
+ s
3725
+ = 0 ,
3726
+ γg(1)
3727
+ s
3728
+ = 2π2nf
3729
+ 3
3730
+ − 112nf
3731
+ 9
3732
+ − 252ζ3 − 11π2 + 808
3733
+ 3 ,
3734
+ γg(2)
3735
+ s
3736
+ =
3737
+ 112n2
3738
+ fζ3
3739
+ 9
3740
+
3741
+ 20π2n2
3742
+ f
3743
+ 27
3744
+
3745
+ 2080n2
3746
+ f
3747
+ 243
3748
+ + 3400nfζ3
3749
+ 9
3750
+ + 1486π2nf
3751
+ 27
3752
+ − 184π4nf
3753
+ 45
3754
+ − 32374nf
3755
+ 81
3756
+ + 264π2ζ3 − 11844ζ3 + 5184ζ5 + 264π4
3757
+ 5
3758
+ − 6325π2
3759
+ 9
3760
+ + 136781
3761
+ 27
3762
+ ,
3763
+ γg(3)
3764
+ s
3765
+ = −14715.4 .
3766
+ (C.18)
3767
+ Up to three loops, the quark and gluon soft anomalous dimensions satisfy the Casimir
3768
+ scaling γg
3769
+ s/CA = γq
3770
+ s/CF . However, starting at four loops, due to the emergence of new
3771
+ Casimir operators, the relation must be generalized as appropriate [66, 95].
3772
+ – 24 –
3773
+
3774
+ Finally, the beta function coefficients are [40, 41]
3775
+ β0 = 11CA
3776
+ 3
3777
+ − 4nfTF
3778
+ 3
3779
+ ,
3780
+ β1 = 34C2
3781
+ A
3782
+ 3
3783
+ − 20CAnfTF
3784
+ 3
3785
+ − 4CF nfTF ,
3786
+ β2 =
3787
+ 325n2
3788
+ f
3789
+ 54
3790
+ − 5033nf
3791
+ 18
3792
+ + 2857
3793
+ 2
3794
+ ,
3795
+ β3 =
3796
+ 1093n3
3797
+ f
3798
+ 729
3799
+ + n2
3800
+ f
3801
+ �6472ζ3
3802
+ 81
3803
+ + 50065
3804
+ 162
3805
+
3806
+ + nf
3807
+
3808
+ −6508ζ3
3809
+ 27
3810
+ − 1078361
3811
+ 162
3812
+
3813
+ + 3564ζ3
3814
+ + 149753
3815
+ 6
3816
+ ,
3817
+ β4 = n4
3818
+ f
3819
+ �1205
3820
+ 2916 − 152ζ3
3821
+ 81
3822
+
3823
+ + n3
3824
+ f
3825
+
3826
+ −48722ζ3
3827
+ 243
3828
+ + 460ζ5
3829
+ 9
3830
+ + 809π4
3831
+ 1215 − 630559
3832
+ 5832
3833
+
3834
+ + n2
3835
+ f
3836
+ �698531ζ3
3837
+ 81
3838
+ − 381760ζ5
3839
+ 81
3840
+ − 5263π4
3841
+ 405
3842
+ + 25960913
3843
+ 1944
3844
+
3845
+ + nf
3846
+
3847
+ −4811164ζ3
3848
+ 81
3849
+ +1358995ζ5
3850
+ 27
3851
+ + 6787π4
3852
+ 108
3853
+ − 336460813
3854
+ 1944
3855
+
3856
+ + 621885ζ3
3857
+ 2
3858
+ − 288090ζ5 + 8157455
3859
+ 16
3860
+ − 9801π4
3861
+ 20
3862
+ .
3863
+ (C.19)
3864
+ – 25 –
3865
+
3866
+ References
3867
+ [1] G.F. Giudice and O. Lebedev, Higgs-dependent Yukawa couplings, Phys. Lett. B 665 (2008)
3868
+ 79 [0804.1753].
3869
+ [2] F. Bishara, J. Brod, P. Uttayarat and J. Zupan, Nonstandard Yukawa Couplings and Higgs
3870
+ Portal Dark Matter, JHEP 01 (2016) 010 [1504.04022].
3871
+ [3] ILC collaboration, H. Baer et al., eds., The International Linear Collider Technical Design
3872
+ Report - Volume 2: Physics, 1306.6352.
3873
+ [4] A. Arbey et al., Physics at the e+ e- Linear Collider, Eur. Phys. J. C 75 (2015) 371
3874
+ [1504.01726].
3875
+ [5] CEPC Study Group collaboration, CEPC Conceptual Design Report: Volume 2 - Physics
3876
+ & Detector, 1811.10545.
3877
+ [6] P. Bambade et al., The International Linear Collider: A Global Project, 1903.01629.
3878
+ [7] FCC collaboration, FCC-ee: The Lepton Collider: Future Circular Collider Conceptual
3879
+ Design Report Volume 2, Eur. Phys. J. ST 228 (2019) 261.
3880
+ [8] E. Farhi, A QCD Test for Jets, Phys. Rev. Lett. 39 (1977) 1587.
3881
+ [9] J. Gao, Y. Gong, W.-L. Ju and L.L. Yang, Thrust distribution in Higgs decays at the
3882
+ next-to-leading order and beyond, JHEP 03 (2019) 030 [1901.02253].
3883
+ [10] S. Catani, L. Trentadue, G. Turnock and B.R. Webber, Resummation of large logarithms in
3884
+ e+ e- event shape distributions, Nucl. Phys. B 407 (1993) 3.
3885
+ [11] M.D. Schwartz, Resummation and NLO matching of event shapes with effective field theory,
3886
+ Phys. Rev. D 77 (2008) 014026 [0709.2709].
3887
+ [12] T. Becher and M.D. Schwartz, A precise determination of αs from LEP thrust data using
3888
+ effective field theory, JHEP 07 (2008) 034 [0803.0342].
3889
+ [13] G. Dissertori, A. Gehrmann-De Ridder, T. Gehrmann, E.W.N. Glover, G. Heinrich,
3890
+ G. Luisoni et al., Determination of the strong coupling constant using matched
3891
+ NNLO+NLLA predictions for hadronic event shapes in e+e- annihilations, JHEP 08 (2009)
3892
+ 036 [0906.3436].
3893
+ [14] R. Abbate, M. Fickinger, A.H. Hoang, V. Mateu and I.W. Stewart, Thrust at N 3LL with
3894
+ Power Corrections and a Precision Global Fit for αs(mZ), Phys. Rev. D 83 (2011) 074021
3895
+ [1006.3080].
3896
+ [15] P.F. Monni, T. Gehrmann and G. Luisoni, Two-Loop Soft Corrections and Resummation of
3897
+ the Thrust Distribution in the Dijet Region, JHEP 08 (2011) 010 [1105.4560].
3898
+ [16] A. Banfi, H. McAslan, P.F. Monni and G. Zanderighi, A general method for the resummation
3899
+ of event-shape distributions in e+e− annihilation, JHEP 05 (2015) 102 [1412.2126].
3900
+ [17] A.H. Hoang, D.W. Kolodrubetz, V. Mateu and I.W. Stewart, C-parameter distribution at
3901
+ N3LL’ including power corrections, Phys. Rev. D 91 (2015) 094017 [1411.6633].
3902
+ [18] G. Bell, A. Hornig, C. Lee and J. Talbert, e+e− angularity distributions at NNLL′ accuracy,
3903
+ JHEP 01 (2019) 147 [1808.07867].
3904
+ [19] J. Mo, F.J. Tackmann and W.J. Waalewijn, A case study of quark-gluon discrimination at
3905
+ NNLL’ in comparison to parton showers, Eur. Phys. J. C 77 (2017) 770 [1708.00867].
3906
+ – 26 –
3907
+
3908
+ [20] S. Alioli, A. Broggio, A. Gavardi, S. Kallweit, M.A. Lim, R. Nagar et al., Resummed
3909
+ predictions for hadronic Higgs boson decays, JHEP 04 (2021) 254 [2009.13533].
3910
+ [21] S. Catani, G. Turnock, B.R. Webber and L. Trentadue, Thrust distribution in e+ e-
3911
+ annihilation, Phys. Lett. B 263 (1991) 491.
3912
+ [22] H. Contopanagos, E. Laenen and G.F. Sterman, Sudakov factorization and resummation,
3913
+ Nucl. Phys. B 484 (1997) 303 [hep-ph/9604313].
3914
+ [23] N. Kidonakis, G. Oderda and G.F. Sterman, Threshold resummation for dijet cross-sections,
3915
+ Nucl. Phys. B 525 (1998) 299 [hep-ph/9801268].
3916
+ [24] C.F. Berger, T. Kucs and G.F. Sterman, Event shape / energy flow correlations, Phys. Rev.
3917
+ D 68 (2003) 014012 [hep-ph/0303051].
3918
+ [25] C.W. Bauer, S. Fleming and M.E. Luke, Summing Sudakov logarithms in B → Xsγin
3919
+ effective field theory., Phys. Rev. D 63 (2000) 014006 [hep-ph/0005275].
3920
+ [26] C.W. Bauer, S. Fleming, D. Pirjol and I.W. Stewart, An Effective field theory for collinear
3921
+ and soft gluons: Heavy to light decays, Phys. Rev. D 63 (2001) 114020 [hep-ph/0011336].
3922
+ [27] C.W. Bauer and I.W. Stewart, Invariant operators in collinear effective theory, Phys. Lett. B
3923
+ 516 (2001) 134 [hep-ph/0107001].
3924
+ [28] C.W. Bauer, S. Fleming, D. Pirjol, I.Z. Rothstein and I.W. Stewart, Hard scattering
3925
+ factorization from effective field theory, Phys. Rev. D 66 (2002) 014017 [hep-ph/0202088].
3926
+ [29] C.W. Bauer, D. Pirjol and I.W. Stewart, Soft collinear factorization in effective field theory,
3927
+ Phys. Rev. D 65 (2002) 054022 [hep-ph/0109045].
3928
+ [30] M. Beneke, A.P. Chapovsky, M. Diehl and T. Feldmann, Soft collinear effective theory and
3929
+ heavy to light currents beyond leading power, Nucl. Phys. B 643 (2002) 431
3930
+ [hep-ph/0206152].
3931
+ [31] S. Moch, J.A.M. Vermaseren and A. Vogt, The Three loop splitting functions in QCD: The
3932
+ Nonsinglet case, Nucl. Phys. B 688 (2004) 101 [hep-ph/0403192].
3933
+ [32] A. Vogt, S. Moch and J.A.M. Vermaseren, The Three-loop splitting functions in QCD: The
3934
+ Singlet case, Nucl. Phys. B 691 (2004) 129 [hep-ph/0404111].
3935
+ [33] J.M. Henn, G.P. Korchemsky and B. Mistlberger, The full four-loop cusp anomalous
3936
+ dimension in N = 4 super Yang-Mills and QCD, JHEP 04 (2020) 018 [1911.10174].
3937
+ [34] A. von Manteuffel, E. Panzer and R.M. Schabinger, Cusp and collinear anomalous
3938
+ dimensions in four-loop QCD from form factors, Phys. Rev. Lett. 124 (2020) 162001
3939
+ [2002.04617].
3940
+ [35] F. Herzog, S. Moch, B. Ruijl, T. Ueda, J.A.M. Vermaseren and A. Vogt, Five-loop
3941
+ contributions to low-N non-singlet anomalous dimensions in QCD, Phys. Lett. B 790 (2019)
3942
+ 436 [1812.11818].
3943
+ [36] W.E. Caswell, Asymptotic Behavior of Nonabelian Gauge Theories to Two Loop Order,
3944
+ Phys. Rev. Lett. 33 (1974) 244.
3945
+ [37] D.R.T. Jones, Two Loop Diagrams in Yang-Mills Theory, Nucl. Phys. B 75 (1974) 531.
3946
+ [38] O.V. Tarasov, A.A. Vladimirov and A.Y. Zharkov, The Gell-Mann-Low Function of QCD in
3947
+ the Three Loop Approximation, Phys. Lett. B 93 (1980) 429.
3948
+ – 27 –
3949
+
3950
+ [39] S.A. Larin and J.A.M. Vermaseren, The Three loop QCD Beta function and anomalous
3951
+ dimensions, Phys. Lett. B 303 (1993) 334 [hep-ph/9302208].
3952
+ [40] T. van Ritbergen, J.A.M. Vermaseren and S.A. Larin, The Four loop beta function in
3953
+ quantum chromodynamics, Phys. Lett. B 400 (1997) 379 [hep-ph/9701390].
3954
+ [41] M. Czakon, The Four-loop QCD beta-function and anomalous dimensions, Nucl. Phys. B
3955
+ 710 (2005) 485 [hep-ph/0411261].
3956
+ [42] R. Tarrach, The Pole Mass in Perturbative QCD, Nucl. Phys. B 183 (1981) 384.
3957
+ [43] S.A. Larin, The Renormalization of the axial anomaly in dimensional regularization, Phys.
3958
+ Lett. B 303 (1993) 113 [hep-ph/9302240].
3959
+ [44] J.A.M. Vermaseren, S.A. Larin and T. van Ritbergen, The four loop quark mass anomalous
3960
+ dimension and the invariant quark mass, Phys. Lett. B 405 (1997) 327 [hep-ph/9703284].
3961
+ [45] K.G. Chetyrkin, Quark mass anomalous dimension to O (alpha-s**4), Phys. Lett. B 404
3962
+ (1997) 161 [hep-ph/9703278].
3963
+ [46] P.A. Baikov, K.G. Chetyrkin and J.H. K¨uhn, Quark Mass and Field Anomalous Dimensions
3964
+ to O(α5
3965
+ s), JHEP 10 (2014) 076 [1402.6611].
3966
+ [47] V.P. Spiridonov, Anomalous Dimension of G2
3967
+ µν and β Function, .
3968
+ [48] M. Kramer, E. Laenen and M. Spira, Soft gluon radiation in Higgs boson production at the
3969
+ LHC, Nucl. Phys. B 511 (1998) 523 [hep-ph/9611272].
3970
+ [49] K.G. Chetyrkin, B.A. Kniehl and M. Steinhauser, Decoupling relations to O (alpha-s**3) and
3971
+ their connection to low-energy theorems, Nucl. Phys. B 510 (1998) 61 [hep-ph/9708255].
3972
+ [50] Y. Schroder and M. Steinhauser, Four-loop decoupling relations for the strong coupling,
3973
+ JHEP 01 (2006) 051 [hep-ph/0512058].
3974
+ [51] K.G. Chetyrkin, J.H. Kuhn and C. Sturm, QCD decoupling at four loops, Nucl. Phys. B 744
3975
+ (2006) 121 [hep-ph/0512060].
3976
+ [52] T. Liu and M. Steinhauser, Decoupling of heavy quarks at four loops and effective
3977
+ Higgs-fermion coupling, Phys. Lett. B 746 (2015) 330 [1502.04719].
3978
+ [53] S. Dawson, Radiative corrections to Higgs boson production, Nucl. Phys. B 359 (1991) 283.
3979
+ [54] A. Djouadi, M. Spira and P.M. Zerwas, Production of Higgs bosons in proton colliders: QCD
3980
+ corrections, Phys. Lett. B 264 (1991) 440.
3981
+ [55] R.V. Harlander, Virtual corrections to g g —> H to two loops in the heavy top limit, Phys.
3982
+ Lett. B 492 (2000) 74 [hep-ph/0007289].
3983
+ [56] S. Moch, J.A.M. Vermaseren and A. Vogt, Three-loop results for quark and gluon
3984
+ form-factors, Phys. Lett. B 625 (2005) 245 [hep-ph/0508055].
3985
+ [57] T. Gehrmann, T. Huber and D. Maitre, Two-loop quark and gluon form-factors in
3986
+ dimensional regularisation, Phys. Lett. B 622 (2005) 295 [hep-ph/0507061].
3987
+ [58] P.A. Baikov, K.G. Chetyrkin, A.V. Smirnov, V.A. Smirnov and M. Steinhauser, Quark and
3988
+ gluon form factors to three loops, Phys. Rev. Lett. 102 (2009) 212002 [0902.3519].
3989
+ [59] T. Gehrmann, E.W.N. Glover, T. Huber, N. Ikizlerli and C. Studerus, Calculation of the
3990
+ quark and gluon form factors to three loops in QCD, JHEP 06 (2010) 094 [1004.3653].
3991
+ – 28 –
3992
+
3993
+ [60] T. Gehrmann and D. Kara, The Hb¯b form factor to three loops in QCD, JHEP 09 (2014)
3994
+ 174 [1407.8114].
3995
+ [61] A. Chakraborty, T. Huber, R.N. Lee, A. von Manteuffel, R.M. Schabinger, A.V. Smirnov
3996
+ et al., Hbb vertex at four loops and hard matching coefficients in SCET for various currents,
3997
+ Phys. Rev. D 106 (2022) 074009 [2204.02422].
3998
+ [62] R.N. Lee, A. von Manteuffel, R.M. Schabinger, A.V. Smirnov, V.A. Smirnov and
3999
+ M. Steinhauser, Quark and Gluon Form Factors in Four-Loop QCD, Phys. Rev. Lett. 128
4000
+ (2022) 212002 [2202.04660].
4001
+ [63] G.P. Korchemsky and G. Marchesini, Resummation of large infrared corrections using
4002
+ Wilson loops, Phys. Lett. B 313 (1993) 433.
4003
+ [64] A.V. Belitsky, Two loop renormalization of Wilson loop for Drell-Yan production, Phys. Lett.
4004
+ B 442 (1998) 307 [hep-ph/9808389].
4005
+ [65] Y. Li, A. von Manteuffel, R.M. Schabinger and H.X. Zhu, Soft-virtual corrections to Higgs
4006
+ production at N3LO, Phys. Rev. D 91 (2015) 036008 [1412.2771].
4007
+ [66] C. Duhr, B. Mistlberger and G. Vita, Soft integrals and soft anomalous dimensions at N3LO
4008
+ and beyond, JHEP 09 (2022) 155 [2205.04493].
4009
+ [67] C.W. Bauer and A.V. Manohar, Shape function effects in B —> X(s) gamma and B —>
4010
+ X(u) l anti-nu decays, Phys. Rev. D 70 (2004) 034024 [hep-ph/0312109].
4011
+ [68] S.W. Bosch, B.O. Lange, M. Neubert and G. Paz, Factorization and shape function effects in
4012
+ inclusive B meson decays, Nucl. Phys. B 699 (2004) 335 [hep-ph/0402094].
4013
+ [69] T. Becher and M. Neubert, Toward a NNLO calculation of the anti-B —> X(s) gamma
4014
+ decay rate with a cut on photon energy. II. Two-loop result for the jet function, Phys. Lett. B
4015
+ 637 (2006) 251 [hep-ph/0603140].
4016
+ [70] T. Becher and M.D. Schwartz, Direct photon production with effective field theory, JHEP 02
4017
+ (2010) 040 [0911.0681].
4018
+ [71] R. Br¨user, Z.L. Liu and M. Stahlhofen, Three-Loop Quark Jet Function, Phys. Rev. Lett. 121
4019
+ (2018) 072003 [1804.09722].
4020
+ [72] P. Banerjee, P.K. Dhani and V. Ravindran, Gluon jet function at three loops in QCD, Phys.
4021
+ Rev. D 98 (2018) 094016 [1805.02637].
4022
+ [73] T. Becher and G. Bell, The gluon jet function at two-loop order, Phys. Lett. B 695 (2011)
4023
+ 252 [1008.1936].
4024
+ [74] T. Inami, T. Kubota and Y. Okada, Effective Gauge Theory and the Effect of Heavy Quarks
4025
+ in Higgs Boson Decays, Z. Phys. C 18 (1983) 69.
4026
+ [75] A. Djouadi, J. Kalinowski and P.M. Zerwas, Higgs radiation off top quarks in high-energy e+
4027
+ e- colliders, Z. Phys. C 54 (1992) 255.
4028
+ [76] K.G. Chetyrkin, B.A. Kniehl and M. Steinhauser, Hadronic Higgs decay to order alpha-s**4,
4029
+ Phys. Rev. Lett. 79 (1997) 353 [hep-ph/9705240].
4030
+ [77] P.A. Baikov, K.G. Chetyrkin and J.H. K¨uhn, Five-Loop Running of the QCD coupling
4031
+ constant, Phys. Rev. Lett. 118 (2017) 082002 [1606.08659].
4032
+ [78] T. Ahmed, M. Mahakhud, P. Mathews, N. Rana and V. Ravindran, Two-loop QCD
4033
+ corrections to Higgs → b + b + g amplitude, JHEP 08 (2014) 075 [1405.2324].
4034
+ – 29 –
4035
+
4036
+ [79] S. Fleming, A.H. Hoang, S. Mantry and I.W. Stewart, Top Jets in the Peak Region:
4037
+ Factorization Analysis with NLL Resummation, Phys. Rev. D 77 (2008) 114003 [0711.2079].
4038
+ [80] R. Kelley, M.D. Schwartz, R.M. Schabinger and H.X. Zhu, The two-loop hemisphere soft
4039
+ function, Phys. Rev. D 84 (2011) 045022 [1105.3676].
4040
+ [81] T. Becher, M. Neubert and B.D. Pecjak, Factorization and Momentum-Space Resummation
4041
+ in Deep-Inelastic Scattering, JHEP 01 (2007) 076 [hep-ph/0607228].
4042
+ [82] S. Catani, M.L. Mangano, P. Nason and L. Trentadue, The Resummation of soft gluons in
4043
+ hadronic collisions, Nucl. Phys. B 478 (1996) 273 [hep-ph/9604351].
4044
+ [83] Particle Data Group collaboration, Review of Particle Physics, Phys. Rev. D 98 (2018)
4045
+ 030001.
4046
+ [84] D. Baranowski, M. Delto, K. Melnikov and C.-Y. Wang, Same-hemisphere
4047
+ three-gluon-emission contribution to the zero-jettiness soft function at N3LO QCD, Phys.
4048
+ Rev. D 106 (2022) 014004 [2204.09459].
4049
+ [85] W. Chen, F. Feng, Y. Jia and X. Liu, Double-real-virtual and double-virtual-real corrections
4050
+ to the three-loop thrust soft function, JHEP 22 (2020) 094 [2206.12323].
4051
+ [86] T. Becher and M. Neubert, Threshold resummation in momentum space from effective field
4052
+ theory, Phys. Rev. Lett. 97 (2006) 082001 [hep-ph/0605050].
4053
+ [87] L.G. Almeida, S.D. Ellis, C. Lee, G. Sterman, I. Sung and J.R. Walsh, Comparing and
4054
+ counting logs in direct and effective methods of QCD resummation, JHEP 04 (2014) 174
4055
+ [1401.4460].
4056
+ [88] D. Bertolini, M.P. Solon and J.R. Walsh, Integrated and Differential Accuracy in Resummed
4057
+ Cross Sections, Phys. Rev. D 95 (2017) 054024 [1701.07919].
4058
+ [89] W. Chen, F. Feng, Y. Jia and X. Liu, Double-real-virtual and double-virtual-real corrections
4059
+ to the three-loop thrust soft function, JHEP 22 (2020) 094 [2206.12323].
4060
+ [90] D. Baranowski, M. Delto, K. Melnikov and C.-Y. Wang, On phase-space integrals with
4061
+ Heaviside functions, JHEP 02 (2022) 081 [2111.13594].
4062
+ [91] G.F. Sterman, Infrared divergences in perturbative QCD, AIP Conf. Proc. 74 (1981) 22.
4063
+ [92] J.G.M. Gatheral, Exponentiation of Eikonal Cross-sections in Nonabelian Gauge Theories,
4064
+ Phys. Lett. B 133 (1983) 90.
4065
+ [93] J. Frenkel and J.C. Taylor, NONABELIAN EIKONAL EXPONENTIATION, Nucl. Phys. B
4066
+ 246 (1984) 231.
4067
+ [94] R.V. Harlander and W.B. Kilgore, Higgs boson production in bottom quark fusion at
4068
+ next-to-next-to leading order, Phys. Rev. D 68 (2003) 013001 [hep-ph/0304035].
4069
+ [95] S. Moch, B. Ruijl, T. Ueda, J.A.M. Vermaseren and A. Vogt, On quartic colour factors in
4070
+ splitting functions and the gluon cusp anomalous dimension, Phys. Lett. B 782 (2018) 627
4071
+ [1805.09638].
4072
+ – 30 –
4073
+
T9E3T4oBgHgl3EQfEQll/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
TNFAT4oBgHgl3EQf2R4K/content/2301.08713v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:70a0a147e11b79452d65bf1e63607eb78068c979d632e5c01052727eeba62c13
3
+ size 2148941
TdE4T4oBgHgl3EQfmQ04/content/tmp_files/2301.05166v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
TdE4T4oBgHgl3EQfmQ04/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
WNAyT4oBgHgl3EQfu_m7/content/2301.00624v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a027ba93adfc454db4558dbeb508525b6d0d55ac26d40e9aa6bb7d2f920b0769
3
+ size 2177540
WtE4T4oBgHgl3EQfNAys/content/tmp_files/2301.04953v1.pdf.txt ADDED
@@ -0,0 +1,1596 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
2
+ DMITRY NOVIKOV, BENNY ZACK
3
+ Abstract. We provide sharp cylindrical parametrizations of cylindrical cell de-
4
+ compositions by maps with bounded Cr norm in the
5
+ #o-minimal setting, thus
6
+ generalizing and strengthening the Yomdin-Gromov Algebraic Lemma.
7
+ We introduce forts, geometrical objects encoding the combinatorial structure of
8
+ cylindrical cell decompositions in o-minimal geometry. Cylindical decompositions,
9
+ refinements of such decompositions, and cylindrical parametrizations of such de-
10
+ composition become morphisms in the category of forts. We formulate and prove
11
+ the above results in the language of forts.
12
+ Contents
13
+ 1.
14
+ Introduction
15
+ 2
16
+ 1.1.
17
+ The Yomdin Gromov Algebraic Lemma
18
+ 2
19
+ 1.2.
20
+ Cells and Cylindrical Decompositions
21
+ 4
22
+ 1.3.
23
+ Sharp cylindrical decomposition
24
+ 5
25
+ 1.4.
26
+ Cylindrical Parametrizations and the Main Result
27
+ 6
28
+ 1.5.
29
+ Applications of the Main Result
30
+ 8
31
+ 1.6.
32
+ Structure of this paper
33
+ 9
34
+ 2.
35
+ Preliminary results for Sharp Structures
36
+ 9
37
+ 2.1.
38
+ Definition of sharply o-minimal structures
39
+ 9
40
+ 2.2.
41
+ Sharpness of arithmetic operations
42
+ 10
43
+ 2.3.
44
+ Sharpness of Refinement
45
+ 11
46
+ 2.4.
47
+ Sharpness of Cr locus
48
+ 11
49
+ 2.5.
50
+ Sharp definable choice
51
+ 11
52
+ 3.
53
+ Forts
54
+ 12
55
+ 3.1.
56
+ Forts and Morphisms
57
+ 12
58
+ 3.2.
59
+ Combinatorial Equivalence
60
+ 15
61
+ 3.3.
62
+ Inverse image fort and proof of Proposition 3.18
63
+ 17
64
+ 3.4.
65
+ Pulling back along extensions
66
+ 18
67
+ 3.5.
68
+ The Tower construction
69
+ 18
70
+ 3.6.
71
+ Smoothing
72
+ 19
73
+ Date: January 13, 2023.
74
+ 1
75
+ arXiv:2301.04953v1 [math.LO] 12 Jan 2023
76
+
77
+ 2
78
+ DMITRY NOVIKOV, BENNY ZACK
79
+ 3.7.
80
+ The main result reformulated
81
+ 20
82
+ 3.8.
83
+ Final Remarks
84
+ 21
85
+ 4.
86
+ The step F1,k
87
+ 22
88
+ 5.
89
+ The step Sℓ−1,k + Fℓ−1,k → Sℓ,k
90
+ 25
91
+ 6.
92
+ The step S≤ℓ,k + F≤ℓ−1,k → Fℓ,k
93
+ 26
94
+ 6.1.
95
+ Reduction to the case where fC,j,λ is Cr and fC,j,λ(x1, ·) is an r-function
96
+ for all x1.
97
+ 28
98
+ 6.2.
99
+ Induction on the first unbounded derivative
100
+ 29
101
+ References
102
+ 30
103
+ 1. Introduction
104
+ 1.1. The Yomdin Gromov Algebraic Lemma.
105
+ Denote I = (0, 1). For m ≥ n
106
+ we denote by πm
107
+ n : Im → In the projection on the first n coordinates. Often we will
108
+ omit m from the notation.
109
+ Additionally, the symbol Oa(1) denotes a specific universally fixed function a �→
110
+ Ca where Ca > 0, and the symbol polya(b) denotes a polynomial pa with positive
111
+ coefficients evaluated at b, where a �→ pa is a universally fixed map.
112
+ Definition 1.1. Let U ⊂ Rℓ be a domain. For a Cr function f : U → I, we denote
113
+ ||f|| to be its supremum norm, and define
114
+ ||f||r := max
115
+ |α|≤r
116
+ ||f (α)||
117
+ α!
118
+ .
119
+ For a Cr map f : U → Rm, we define ||f||r := max
120
+ 1≤i≤m||fi||r where fi are the coordinate
121
+ functions of f. If a Cr function (resp. map) satisfies ||f||r ≤ 1 we shall call it an
122
+ r-function (resp. r-map).
123
+ The Yomdin-Gromov algebraic lemma and its generalizations to the o-minimal
124
+ setting have remarkable applications in the fields of dynamics and diophantine ge-
125
+ ometry. We now state the original semialgebraic version. Fix r ∈ N.
126
+ Theorem 1.2 ([8], Section 3.3). Let X ⊂ Iℓ be a µ-dimensional semialgebraic set,
127
+ and let β the sum of the degrees of the equations and the inequalities that define X.
128
+ Then there exists a constant C = C(β, r, ℓ) and r-maps f1, . . . , fC : Iµ → X, such
129
+ that X = ∪ifi(Iµ).
130
+ Remark 1.3. G.Binyamini and D.Novikov [2] prove that C can be bounded from
131
+ above by polyℓ(β) · rµ, and moreover that fi may be taken to be semialgebraic of
132
+ complexity polyℓ(β, r).
133
+
134
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
135
+ 3
136
+ Pila and Wilkie [9] generalized Theorem 1.2 to the o-minimal setting in order
137
+ to prove their celebrated Pila-Wilkie counting theorem about rational points on
138
+ definable sets. We will now state their version. In the general o-minimal setting
139
+ the notion of complexity is not available, and will be replaced by uniformity over
140
+ families. For an introduction on o-minimal sturtures, see [10]. Fix an o-minimal
141
+ structure, and an r ∈ N.
142
+ Theorem 1.4 ([9], Corollary 5.2). Let {Xλ ⊂ Iℓ}λ∈Ik be a family of definable sets
143
+ such that dim Xλ ≤ µ for all λ. Then there exists a constant C = C(X, r) such that
144
+ for each λ there are definable maps f1,λ, . . . , fC,λ : Iµ → Xλ whose images cover Xλ.
145
+ For a more detailed exposition on this lemma, its applications and limitations, see
146
+ [2, 3]. In [3], Binyamini and Novikov strengthen Theorem 1.4 by showing that the
147
+ maps fi,λ can be chosen to be cellular, see Definition 1.7 below.
148
+ Definition 1.5. A basic cell C ⊂ Rℓ of length ℓ is a product of ℓ points {0} and
149
+ intervals I.
150
+ Remark 1.6. While a basic cell C is not generally a domain, we will often implic-
151
+ itly identify it with the basic cell obtained by omitting the {0} factors from C. In
152
+ particular there is a natural meaning for a map f : C → R to be Cr.
153
+ Definition 1.7. Let X, Y ⊂ Rℓ. A map f = (f1, . . . , fℓ) : X → Y is called precel-
154
+ lular if
155
+ (1) It is triangular, that is, the coordinate function fi depends only on x1, . . . , xi
156
+ for every i = 1, . . . , ℓ.
157
+ (2) For every 1 ≤ i ≤ ℓ and every fixed x1, . . . , xi−1, the function fi(x1, . . . , xi−1, ·)
158
+ is a strictly increasing function.
159
+ A cellular map is a continuous precellular map.
160
+ Remark 1.8. If f : X → Y is cellular, then for any 1 ≤ j ≤ ℓ the map f1...i :=
161
+ (f1, . . . , fi) : πi(X) → πi(Y ) is cellular as well.
162
+ Also, for any 1 ≤ i ≤ n, if
163
+ (x1, . . . , xi) ∈ πi(X) the map f(x1, . . . , xi, ·) : π−1
164
+ i (x1, . . . , xi) → π−1
165
+ i (f1...i(x1, . . . , xi))
166
+ is cellular.
167
+ We now state the main result of [3]. The notation Sℓ and Fℓ below come from
168
+ “set” and “function” respectively.
169
+ Theorem 1.9 ([3], Theorem 19). Let ℓ, r ∈ N, then:
170
+ Sℓ: For every definable set X ⊂ Iℓ there exists a finite collection {Cα} of basic cells of
171
+ length ℓ and a collection of cellular r-maps {φα : Cα → X} such that X = ∪αφα(Cα).
172
+ Fℓ: For every pair (X, F) of a definable set X ⊂ Iℓ and a definable map F : X → Iq
173
+ (for any q ∈ N) there exists a finite collection {Cα} of basic cells of length ℓ and a
174
+
175
+ 4
176
+ DMITRY NOVIKOV, BENNY ZACK
177
+ collection of cellular r-maps {φα : Cα → X} such that X = ∪αφα(Cα), and for each
178
+ α the map (φα)∗F is an r-map.
179
+ Remark 1.10. This formulation is automatically uniform over families, due to Re-
180
+ mark 1.8. Also, note that Fℓ follows from Sℓ+1.
181
+ Though the proof of [3, Theorem 19] is less technically involved than previous
182
+ proofs, it does not provide polynomial bounds in q in the semi-algebraic or Pfaffian
183
+ cases. Originally one of the main purposes of this paper was to augment the proof
184
+ of Theorem 1.9 to obtain polynomial bounds in q in these cases. However, due to
185
+ the recent development of sharply o-minimal structures (#o-minimal for short, see
186
+ [6, 4, 5]), it is natural to generalize this proof to work in the setting of #o-minimal
187
+ structures.
188
+ Recall that in #o-minimal structures every definable set is associated with two
189
+ natural numbers, “format” F and “degree” D, generalizing ambient dimension and
190
+ complexity respectively from semialgebraic geometry. For the complete definition,
191
+ see Definition 2.2. For a detailed introduction, see [5].
192
+ Our main result (see Theorems 1.18,1.19 below) in particular implies the following
193
+ version of Theorem 1.9 for #o-minimal structures, with polynomial bounds in q.
194
+ Theorem 1.11. Let Σ = (S, Ω) be a sharply o-minimal structure.
195
+ #Sℓ: Let X ⊂ Iℓ have format F and degree D. Then there exists a collection {Cα}
196
+ of polyF(D) basic cells and cellular r-maps {φα : Cα → X} such that X = ∪αφα(Cα).
197
+ #Fℓ: Let a definable set X ⊂ Iℓ have format F and degree D, and a definable map
198
+ F : X → Iq such that for every j = 1, . . . , q the coordinate functions Fj of F have
199
+ format F and degree D. Then there exists a collection {Cα} of polyF(D, q) basic
200
+ cells of length ℓ and a collection of cellular r-maps {φα : Cα → X} of format OF(1)
201
+ and degree polyF(D) such that X = ∪αφα(Cα), and for each α the map (φα)∗F is
202
+ an r-map.
203
+ The statement #Sℓ in the (restricted) subPfaffian case is due to Binyamini, Jones,
204
+ Schmidt and Thomas [1], and a rewording of their proof works in the general #o-
205
+ minimal case. The statement #Fℓ however is stronger and it does not follow from
206
+ #Sℓ+1. In fact, our main result is notably stronger than Theorem 1.11. We prove
207
+ the existence of a cellular r-parametrization with strict control on the combinatorial
208
+ and geometric structure of the parametrizing maps. See Theorems 1.18,1.19 below.
209
+ We start with reviewing the notion of cylindrical decomposition, and introducing the
210
+ notion of cylindrical parametrization.
211
+ 1.2. Cells and Cylindrical Decompositions.
212
+ Fix an o-minimal expansion of R.
213
+ We review the notions of cells as they are presented in [10].
214
+
215
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
216
+ 5
217
+ Figure 1. An example of a cellular decomposition of I2 which is
218
+ not a cylindrical decomposition, and a cylindrical decomposition of I2
219
+ refining (see Definition 1.17) it.
220
+ Definition 1.12 (Cells). A cell of length 1 is a subset C ⊂ R1 which is either a point
221
+ or an open interval, and its type is defined to be either (0) or (1) respectively.
222
+ Let C ⊂ Rℓ be a cell of length ℓ with type τ ∈ {0, 1}ℓ, and let f, g : C → R>0 be
223
+ continuous definable functions with f < g everywhere. A cell �C of length ℓ + 1 is one
224
+ of the following sets:
225
+ • �C = C ⊙ (f, g) := {(x, y) : x ∈ C, f(x) < y < g(x)}, in which case the type
226
+ of �C is (τ, 1) ∈ {0, 1}ℓ+1.
227
+ • �C = C ⊙ f := {(x, y) :
228
+ x ∈ C ; y = f(x)}, in which case the type of �C is
229
+ (τ, 0) ∈ {0, 1}ℓ+1.
230
+ A cell C is compatible with a set X if either C ⊂ X or C ∩ X = ∅. A collection
231
+ {C1, . . . , Cn} is a cellular decomposition of X if the cells Ci are pairwise disjoint and
232
+ ∪iCi = X.
233
+ We will use the following stronger notion, see Figure 1.
234
+ Definition 1.13 (Cylindrical decompositions). Let X ⊂ I be a definable set. A
235
+ cylindrical decomposition of X is a cellular decomposition of X.
236
+ Let X ⊂ Iℓ be
237
+ definable. A cellular decomposition Φ of X is called a cylindrical decomposition of
238
+ X if the collection πℓ−1(Φ) := {πℓ−1(C)| C ∈ Φ} is a cylindrical decomposition of
239
+ πℓ−1(X).
240
+ 1.3. Sharp cylindrical decomposition.
241
+ Let us recall the definition of sharp
242
+ cellular decomposition from [5].
243
+
244
+ 6
245
+ DMITRY NOVIKOV, BENNY ZACK
246
+ Definition 1.14. Let S be an o-minimal structure and Ω be an FD-filtration on
247
+ S. We say that (S, Ω) has sharp cylindrical decomposition (or
248
+ #CD for short) if
249
+ whenever X1, . . . , Xs ⊂ Iℓ are definable sets of format F and degree D, there exists
250
+ a cylindrical decomposition of Iℓ into polyF(D, s) cells of format OF(1) and degree
251
+ polyF(D) compatible with X1, . . . , Xs.
252
+ It is not generally known if every #o-minimal structure has #CD. However, it was
253
+ shown in [5] that for quantitative applications one can always reduce to the case of a
254
+ #o-minimal structure with #CD, see [5, Remark 1.3, Theorem 1.9] for more details.
255
+ We will therefore assume that our #o-minimal structure has #CD, and this will be
256
+ sufficient for quantitative applications.
257
+ For example, while our main results are not known to be true as stated for general
258
+ #o-minimal structures, they are sufficient to prove a sharp version of the Pila-Wilkie
259
+ counting theorem for every #o-minimal structure, see section 1.5 for more details.
260
+ 1.4. Cylindrical Parametrizations and the Main Result.
261
+ Our goal is to
262
+ strengthen Theorem 1.9 in such a way that the maps φα have additional combinatorial
263
+ properties. More precisely, we prove that they can be chosen to form a Cylindrical
264
+ parametrization, see Definition 1.15 below.
265
+ Definition 1.15. Let Φ = {Cα}α∈A be a cylindrical decomposition of X ⊂ Iℓ. A
266
+ cylindrical parametrization of Φ is a collection of surjective cellular maps {φα : Cα →
267
+ Cα}α∈A, where Cα is a basic cell of the same type as Cα, such that the following holds:
268
+ For any two cells Cα, Cγ, and for every 1 ≤ k ≤ ℓ − 1, if πk(Cα) = πk(Cγ) then
269
+ φα
270
+ k ◦ πk = φγ
271
+ k ◦ πk.
272
+ Example 1.16. A cylindrical parametrization of the cylindrical decomposition from
273
+ Figure 1 can be viewed as a surjective, precellular map φ : F → I2, where F is
274
+ the set in figure 2 below. Notice that F has a natural decomposition into cells that
275
+ are integer translations of basic cells, and φ is continuous when restricted to any
276
+ such cell. The sets F, I2 are examples of forts, and φ is an example of a morphism
277
+ between forts, see Definition 3.9.
278
+ Definition 1.17. Given two cylindrical decompositions Φ = {Cα}α∈A and Φ′ =
279
+ {Cβ}β∈B of a set X, we say that Φ′ is a refinement of Φ if there exists a map s :
280
+ B → A such that Cβ ⊂ Cs(β) for all β ∈ B.
281
+ A cylindrical parametrization will be called an r-parametrization if all its maps
282
+ are r-maps. We now state our main results.
283
+ Theorem 1.18. Fix ℓ, r ∈ N.
284
+ S∗
285
+ ℓ : Let Φ be a cylindrical decomposition of Iℓ. Then there exists a refinement Φ′ of
286
+ Φ that admits a cylindrical r-parametrization.
287
+
288
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
289
+ 7
290
+ Figure 2. The fort (0, 1)×(0, 1) �{1}×(0, 2) �(1, 2)×(0, 3) �{2}×
291
+ (0, 3) �(2, 3) × (0, 4) �{3} × (0, 5) �(3, 4) × (0, 1).
292
+ F ∗
293
+ ℓ : Let Φ = {Cα}α∈A be a cylindrical decomposition of Iℓ, together with a col-
294
+ lection of definable maps {fCα,j : Cα → I}α∈A ,j∈J.Then there exists a refinement
295
+ Φ′ = {C′
296
+ γ}γ∈A′ of Φ that admits a cylindrical r-parametrization {φγ : Cγ → C′
297
+ γ}γ∈A′
298
+ such that if C′
299
+ γ ⊂ Cα, then (φγ)∗fCα,j is an r-function for every j.
300
+ This theorem can be rather easily deduced from Theorem 1.9. However, its sharp
301
+ counterpart is much more meaningful.
302
+ Theorem 1.19. Fix ℓ, r ∈ N.
303
+ S∗
304
+ ℓ : Let Φ be a cylindrical decomposition of Iℓ of size N into cells of format F and
305
+ degree D. Then there exists a refinement Φ′ of Φ of size polyF,r(D, N), such that Φ′
306
+ admits a cylindrical r-parametrization whose maps have format OF,r(1) and degree
307
+ polyF,r(D).
308
+ F ∗
309
+ ℓ : Let Φ = {Cα}α∈A be a cylindrical decomposition of Iℓ of size N into cells
310
+ of format F and degree D, together with a collection of definable maps {fCα,j :
311
+ Cα → I}α∈A, j∈J such that each fCα,j has format F and degree D. Then there ex-
312
+ ists a refinement Φ′ = {C′
313
+ γ}γ∈A′ of Φ of size polyF,r(D, N, |J|), and a cylindrical r-
314
+ parametrization {φγ : Cγ → C′
315
+ γ} of Φ′, such that the maps φγ have format OF,r(1) and
316
+ degree polyF,r(D), where (φγ)∗fCα,j is an r-function for every j whenever C′
317
+ γ ⊂ Cα.
318
+
319
+ 8
320
+ DMITRY NOVIKOV, BENNY ZACK
321
+ Remark 1.20. (On the index set J) A priopri, J may depend on α. However we
322
+ can, and always will, add constant functions to the collections so that the index set
323
+ J can be chosen to be independent of the cells C.
324
+ Our main results generalize Theorem 1.9 (and Theorem 1.11) in the following
325
+ way. Let X1, . . . , Xs ⊂ Iℓ be definable. By o-minimality, there exists a cylindrical
326
+ decomposition Φ compatible with Xi for 1 ≤ i ≤ s. By Theorem 1.18, we may assume
327
+ that Φ admits a cylindrical r-parametrization {φα}α∈I. Fix i, and let {Cβ}β∈J be
328
+ the cells of Φ contained in Xi. Then the collection {φβ}β∈J (which is a cylindrical
329
+ r-parametrization of Xi) satisfies the requirements of Theorem 1.9 for Xi. The proof
330
+ of Theorem 1.11 is analogous. Indeed, if the sets Xi are defined in a sharply o-
331
+ minimal structure with #CD, we obtain sharp cylindrical parametrization using #CD
332
+ and Theorem 1.19 instead of ordinary cylindrical decomposition and Theorem 1.18.
333
+ Remark 1.21. Binyamini and Novikov have shown that in Theorem 1.2, the com-
334
+ plexity of the parametrizing maps can be taken to be polynomial in r. This is essen-
335
+ tially due to the analytic nature of the semialgebraic structure. In the general sharp
336
+ case, we are unable obtain polynomial bounds in r.
337
+ However, in [6], Binyamini,
338
+ Novikov and B.Zack prove an approximation version of the Yomdin-Gromov Lemma
339
+ with polynomial dependence in r under the assumption of sharp derivatives (see [6]
340
+ or section 3 in [5]). While we conjecture that with sharp derivatives the dependence
341
+ on r in Theorems 1.18,1.19 can be taken to by polynomial, we do not see a clear way
342
+ to utilize sharp derivatives in this direction.
343
+ Remark 1.22 (Effectivity). If one begins with an effective #o-minimal structure in
344
+ the sense of [5, Remark 1.24], then all of our results are effective in the same sense.
345
+ 1.5. Applications of the Main Result.
346
+ Binyamini, Jones, Schmidt and Thomas
347
+ [1] prove a sharp version of the Pila-Wilkie counting theorem (see [9]) for the re-
348
+ stricted subPfaffian structure using the results of [7] and a version of #Sℓ from The-
349
+ orem 1.11 for this structure. The same argument will yield a sharp version of the
350
+ Pila-Wilkie counting theorem for any #o-minimal structure with sharp cylindrical
351
+ decomposition, and thus for any
352
+ #o-minimal structure, see Theorem 1.25 below.
353
+ We note that under the assumption of sharp derivatives, a polylog version of the
354
+ Pila-Wilkie Theorem generalizing the Wilkie conjecture, holds, see [6, Definition 8,
355
+ Theorem 1].
356
+ Definition 1.23. Let A ⊂ Rℓ. We denote Aalg to be the union of all connected 1
357
+ dimensional semialgebraic subsets of A, and Atran = A\Aalg.
358
+ Definition 1.24. For a rational number x = p
359
+ q where p, q are coprime integers, we
360
+ denote H(x) := max{|p|, |q|}, H(x) is called the height of x. For a vector x ∈ Qℓ we
361
+ denote H(x) to be the maximum among the height of x′s coordinates.
362
+
363
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
364
+ 9
365
+ Theorem 1.25. Let (S, Ω) be a sharply o-minimal structure.
366
+ Let A ⊂ Rℓ be a
367
+ definable set of format F and degree D. Then for every ϵ > 0 we have
368
+ (1)
369
+ |{x ∈ Atran ∩ Qℓ : H(x) ≤ H}| ≤ polyF,ϵ(D)Hϵ.
370
+ 1.6. Structure of this paper.
371
+ In [3], standard o-minimal technique is used to
372
+ conclude a family version for Fℓ from Fℓ. This technique is not sharp. For example,
373
+ the dimension of the space of all semialgebraic sets with complexity ≤ β is poly-
374
+ nomial in β, and so we cannot “interact” with it in the framework of #o-minimal
375
+ structures. Instead, we prove a family version for every single step, keeping track of
376
+ the formats and degrees of the total spaces involved.
377
+ In section 2, we review sharp versions of some standard o-minimal constructions.
378
+ In section 3, we formally introduce forts and study their elementary properties and
379
+ constructions. We reformulate S∗
380
+ ℓ , F ∗
381
+ ℓ in terms of forts, and denote them by Sℓ,k, Fℓ,k,
382
+ where k is the amount of parameters in the family.
383
+ We prove Sℓ,k, Fℓ,k by induction. We first prove F1,k for every k ∈ Z≥0. We then
384
+ show the steps S≤ℓ,k + F≤ℓ,k → Sℓ+1,k and Sℓ+1,k + F≤ℓ,k+1 → Fℓ+1,k. Sections 4,5,6
385
+ are dedicated to F1,k and the two induction steps respectively.
386
+ Finally, we remark that our proof for Theorem 1.19 works completely verbatim for
387
+ Theorem 1.18, one just needs to ignore the FD-filtration and carry through the same
388
+ constructions. Therefore we will always work with sharply o-minimal structures.
389
+ 2. Preliminary results for Sharp Structures
390
+ 2.1. Definition of sharply o-minimal structures.
391
+ We follow the definition for
392
+ #o-minimal structures as it appears in [5].
393
+ Definition 2.1 (FD-filtrations). Let S be an o-minimal expansion of the real field.
394
+ An FD-filtration on S is a filtration Ω = {ΩF,D}F,D∈N on the collection of definable
395
+ sets by two natural numbers, such that the following holds.
396
+ (1) Every definable set is in ΩF,D for some F, D ∈ N,
397
+ (2) For every F, D ∈ N we have
398
+ (2)
399
+ ΩF,D ⊂ ΩF+1,D ∩ ΩF,D+1.
400
+ We say that a definable set has format F and degree D if X ∈ ΩF,D. We say that a
401
+ definable map has format F and degree D if its graph has format F and degree D.
402
+
403
+ 10
404
+ DMITRY NOVIKOV, BENNY ZACK
405
+ Definition 2.2 (Sharp o-minimality). Let S be an o-minimal expansion of the real
406
+ field, and let Ω be an FD-filtration on S. The pair (S, Σ) is called a sharply o-minimal
407
+ structure (#o-minimal for short) if the following holds.
408
+ (1) For every F ∈ N there exists a polynomial PF of one variable with positive
409
+ coefficients such that if X ⊂ R has format F and degree D then it has at
410
+ most PF(D) components.
411
+ (2) If X ⊂ Rℓ has format F and degree D then the sets R × X, X × R, Rℓ \ X
412
+ and πℓ−1(X) have format F + 1 and degree D. Moreover, F ≥ ℓ neccasarily
413
+ holds.
414
+ (3) If Xi ⊂ Rℓ are definable sets of format Fi and degree Di for i = 1, . . . , k
415
+ then the union ∪Xi has format F and degree D, and the intersection ∩Xi
416
+ has format F + 1 and degree D, where F := max
417
+ i Fi and D := �
418
+ i Di.
419
+ (4) If P ∈ R[x1, . . . , xℓ] has degree d, then the zero set {P = 0} ⊂ Rℓ has format
420
+ ℓ and degree d.
421
+ Fix a sharply o-minimal structure. We will often work with families, so we intro-
422
+ duce the following definition to make notation easier.
423
+ Definition 2.3. Let Fλ = {fλ : X → Y }λ∈Λ be a family of definable maps. We say
424
+ that the family Fλ is an (F, D)-family if the total space FΛ = {(λ, x, y) ∈ Λ×X ×Y :
425
+ y = fλ(x)} has format F and degree D. Similarly, if Xλ is a family of subsets of Rℓ,
426
+ we say it is an (F, D)-family if the total space XΛ = {(λ, x) : λ ∈ Λ, x ∈ Xλ} has
427
+ format F and degree D.
428
+ 2.2. Sharpness of arithmetic operations.
429
+ The following basic lemmas about
430
+ sharpness of arithmetic operations were not strictly treated in [5, 6], even though
431
+ they were used there implicitly. We prove them here, for they serve as an additional
432
+ illustration of the mechanism of the #o-minimal axioms.
433
+ Lemma 2.4. If Xλ ⊂ Ra, Yλ ⊂ Rb are definable (F, D)-families then the fiber
434
+ product Xλ × Yλ is an (OF(1), polyF(D)) family.
435
+ Proof. The non-family version immediately from the axioms and from the equality
436
+ X × Y =
437
+
438
+ X × Rb�
439
+ ∩ (Ra × Y ). Therefore the set
440
+ (3)
441
+ XΛ × YΛ = {(λ, x, µ, y) : λ, µ ∈ Λ, x ∈ Xλ, y ∈ Yµ}
442
+ has format OF(1) and degree polyF(D). It is left to notice that the total space of
443
+ the family Xλ × Yλ is given by a projection of (XΛ × YΛ) ∩ {λ = µ}.
444
+
445
+ Similarly, one can prove the following Lemma.
446
+ Lemma 2.5. Let fλ, gλ : X → Y and hλ : Y → Z be definable (F, D)-families.
447
+ Then the families fλ ± gλ, hλ ◦ fλ are (OF(1), polyF(D))-families. If Y ⊂ R, then so
448
+ is fλgλ, and if in addition gλ ̸= 0, then so is fλ/gλ.
449
+
450
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
451
+ 11
452
+ 2.3. Sharpness of Refinement.
453
+ We will often use the following Lemmas implic-
454
+ itly.
455
+ Lemma 2.6.
456
+ (1) Let Φ be a cylindrical decomposition of Iℓ, whose cells are of format F and
457
+ degree D, and for every cell C ∈ Φ let ΦC be a cylindrical decomposition of
458
+ C whose cells are of format F and degree D. Then there exists a cylindrical
459
+ decomposition Ψ of Iℓ of size polyF(D, �
460
+ C∈Φ |ΦC|) whose cells have format
461
+ OF(1) and degree polyF(D) that refines all the decompositions ΦC.
462
+ More
463
+ precisely, every cell of Ψ is contained in a cell of ΦC for some C ∈ Φ.
464
+ (2) Let Φ1, . . . , Φs be cylindrical decompositions of Iℓ whose cells have format F
465
+ and degree D. Then there exists a cylindrical decomposition Ψ of Iℓ of size
466
+ polyF(D, �s
467
+ i=1 |Φi|) whose cells have format OF(1) and degree polyF(D) that
468
+ refines Φ1, . . . , Φs.
469
+ Proof. For the first item, use #CD on all the collection of all cells in ∪CΦC. For the
470
+ second item, use #CD on the collection of all cells in ∪iΦi.
471
+
472
+ 2.4. Sharpness of Cr locus.
473
+ We need the following slightly stronger formulation
474
+ of [5, Proposition 3.1]. The proof remains the same however.
475
+ Proposition 2.7. Let f1, . . . , fs : Iℓ → I be definable functions of format F and
476
+ degree D. Then f1, . . . , fs are Cr outside a definable set V of codimension ≥ 1 of
477
+ format OF,r(1) and degree polyF,r(D, s).
478
+ Proof. See the proof of [5, Proposition 3.1].
479
+
480
+ Remark 2.8. The same proof shows that if f is Cr, then for any α ∈ Nℓ with |α| ≤ r
481
+ the partial derivative
482
+
483
+ ∂xαf has format OF,|α|(1) and degree polyF,|α|(D). We will use
484
+ this fact without referring to this remark.
485
+ 2.5. Sharp definable choice.
486
+ Proposition 2.9. Let {Xy ⊂ Rℓ}y∈Y be an (F, D)-family of non empty definable
487
+ sets. Then there exists a definable map g : Y → Rℓ of format OF(1) and degree
488
+ polyF(D) such that g(y) ∈ Xy for all y ∈ Y .
489
+ Proof. See [5, Section 4].
490
+
491
+ Remark 2.10. The following is an equivalent formulation: Let f : X → Y be a
492
+ surjective definable function of format F and degree D. Then there exists a definable
493
+ section g : Y → X of f that has format OF(1) and degree polyF(D).
494
+
495
+ 12
496
+ DMITRY NOVIKOV, BENNY ZACK
497
+ 3. Forts
498
+ 3.1. Forts and Morphisms.
499
+ Let qm
500
+ i
501
+ : Im → Im−i be the projection on the last
502
+ m − i coordinates. m will often be omitted.
503
+ For a set X ⊂ Rℓ and x ∈ πi(X) where 1 ≤ i ≤ ℓ, we denote Xx := qi(πi|−1
504
+ X (x)).
505
+ For a point x ∈ Rℓ and an integer 1 ≤ i ≤ ℓ, we denote x1...i := (x1, . . . , xi).
506
+ Definition 3.1. An integer cell of length 1 is either a point {k} or an interval
507
+ (k, k + 1) where k ∈ Z. An integer cell of length ℓ is a product of ℓ integer cells of
508
+ length 1.
509
+ Remark 3.2. From now on the notation C is reserved for integer cells, and not
510
+ general cells as in Definition 1.12.
511
+ There are two useful inductive definitions of forts.
512
+ Definition 3.3 defines forts
513
+ via their structure along the x1 axis, while Definition 3.5 is similar to the inductive
514
+ definition of cells in o-minimal geometry. We prove in Proposition 3.8 below that
515
+ these two definitions are equivalent.
516
+ Definition 3.3. A fort F of length 1 is an interval (0, n) for a positive integer n. It
517
+ is naturally partitioned into integer cells, and we define C(F) to be the set of these
518
+ integer cells. We denote by Forts(1) the set of forts of length 1.
519
+ Let F 1 be a fort of length 1, and let s : C(F 1) → Forts(ℓ − 1) be any function.
520
+ A fort of length ℓ is the set
521
+ (4)
522
+ F 1 ⋉ s :=
523
+
524
+ C∈C(F 1)
525
+ C × s(C).
526
+ The fort F 1 ⋉ s is naturally partitioned into integer cells C × C′ where C ∈ C(F 1)
527
+ and C′ ∈ C(s(C)). We denote by C(F 1 ⋉ s) the set of these cells. Finally, denote by
528
+ Forts(ℓ) the set of forts of length ℓ.
529
+ Remark 3.4. We will often write F with an upper index to indicate its length. i.e.
530
+ if not stated otherwise F ℓ means that F is a fort of length ℓ.
531
+ Definition 3.5. Let F ℓ−1 be a fort, and ϕ : F ℓ−1 → N a function constant on each
532
+ cell C ∈ C(F ℓ−1). Then the set
533
+ (5)
534
+ F ℓ−1 ⊙ ϕ := {(x1, . . . , xℓ) : (x1, . . . , xℓ−1) ∈ F ℓ−1, 0 < xℓ < ϕ(x1, . . . , xℓ−1)}
535
+ is a fort of length ℓ.
536
+ Example 3.6. Let F ℓ be a fort. Then for any 1 ≤ i < ℓ, the set πi(F ℓ) is a fort.
537
+ We will also say that F ℓ extends πi(F ℓ).
538
+
539
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
540
+ 13
541
+ Example 3.7. Let F ℓ be a fort. Then for any 1 ≤ i ≤ ℓ and every (x1, . . . , xi) ∈
542
+ πi(F ℓ), the set F ℓ
543
+ (x1,...,xi) is a fort.
544
+ Proposition 3.8. Definition 3.5 is equivalent to Definition 3.3.
545
+ Proof. First note that it is straightforward to verify Example 3.6 with both defini-
546
+ tions. We argue by induction on ℓ, the cases ℓ = 1, 2 being clear. Let F ℓ be a fort
547
+ in the sense of Definition 3.3, and write F ℓ = F 1 ⋉ s. For every cell C ∈ C(F 1),
548
+ denote by s′(C) := πℓ−2(s(C)). By induction, there exists a function ϕC : s′(C) → N,
549
+ constant on the cells of s′(C), such that s′(C)⊙ϕC = s(C). We extend ϕC to C ×s′(C)
550
+ by making it not depend on x1 ∈ C, and keep the same notation ϕC.
551
+ Next, note that F ℓ−1 := πℓ−1(F ℓ) = F 1 ⋉ s′, so ϕ := �
552
+ C∈C(F 1) ϕC is a function
553
+ F ℓ−1 → N which is constant on the cells of F ℓ−1. It remains to show that F ℓ =
554
+ F ℓ−1 ⊙ ϕ.
555
+ Fix a cell in F ℓ, it is of the form C′ = C × C′′ where C ∈ C(F 1) and C′′ ∈ C(s(C)).
556
+ Since s′(C) ⊙ ϕC = s(C), the value of ϕC on πℓ−2(C′′) is not smaller than sup qℓ−2(C′′).
557
+ By the definition of ϕ, this means that this cell is also a cell of F ℓ−1 ⊙ ϕ. The same
558
+ argument shows that every cell of F ℓ−1 ⊙ ϕ is a cell of F ℓ.
559
+ The proof that Definition 3.5 implies Definition 3.3 is completely analogous.
560
+
561
+ We next equip Forts(ℓ) with morphisms, making it a category.
562
+ Definition 3.9. Let F1, F2 ∈ Forts(ℓ). A definable map φ : F1 → F2 is called a
563
+ morphism if:
564
+ (1) φ is surjective
565
+ (2) φ is precellular.
566
+ (3) For every C1 ∈ C(F1) there exists C2 ∈ C(F2) such that φ(C1) ⊂ φ(C2), and
567
+ moreover the restriction Φ|C1 is continuous.
568
+ Example 3.10. Let F be a fort. Then the set dF = {d · x, x ∈ F} for d ∈ N is
569
+ also a fort, and the map dF → F given by x �→ d−1x is a morphism called linear
570
+ subdivision of order d.
571
+ Example 3.11. Let φ : F ℓ
572
+ 1 → F ℓ
573
+ 2 be a morphism.
574
+ Then for any 1 ≤ i < ℓ,
575
+ φ1...i := (φ1, . . . , φi) is a morphism πi(F ℓ
576
+ 1) → πi(F ℓ
577
+ 2).
578
+ Example 3.12. Let φ : F ℓ → G ℓ be a morphism. Then for any 1 ≤ i ≤ ℓ, and
579
+ every (x1, . . . , xi) ∈ πi(F ℓ), the map φ(x1,...,xi) := φ(x1, . . . , xi, ·, . . . , ·) is a morphism
580
+ F ℓ
581
+ (x1,...,xi) → G ℓ
582
+ φ1...i(x1,...,xi).
583
+ The following is an important example of morphisms. They are constructed using
584
+ the canonical coordinate-wise affine parmaterization of o-minimal cells.
585
+
586
+ 14
587
+ DMITRY NOVIKOV, BENNY ZACK
588
+ Definition 3.13. Let X ⊂ Rm, Y ⊂ Rn be definable sets. A map f : X → Y is
589
+ called affine if f is a restriction of an affine map Rm → Rn, i.e if f = Ax + b for
590
+ A ∈ Mn×m, b ∈ Rn.
591
+ Definition 3.14. Let C be an integer cell of length ℓ. A cellular map φ : C → Rℓ is
592
+ called natural if for every 1 ≤ i ≤ ℓ and every (x1, . . . , xi−1) ∈ πi−1(C), the function
593
+ φi(x1, . . . , xi−1, ·) is affine.
594
+ The following Lemma is straightforward.
595
+ Lemma 3.15. Let C be a cell (not necessarily integer) of length ℓ, and let C be any
596
+ integer cell with the same type as C. Then there exists a unique surjective natural
597
+ cellular map AC,C : C → C. If C is definable in a sharply o-minimal structure and
598
+ has format F and degree D, then AC,C has format OF(1) and degree polyF(D).
599
+ Definition 3.16. A morphism φ : F ℓ
600
+ 1 �� F ℓ
601
+ 2 is called natural if for every C1 ∈
602
+ C(F ℓ
603
+ 1), the restriction φ|C1 is natural.
604
+ Given a cylindrical decomposition Φ of Iℓ, there exists a unique pair (F ℓ, φ) where
605
+ φ : F ℓ → Iℓ is a natural morphism such that for every C ∈ C(F ℓ), the restriction
606
+ φ|C is a homeomorphism between C and a cell of Φ. The fort F ℓ will be called the
607
+ type of Φ. We will now decribe a series of bijections illustrating the equivalence of
608
+ morphisms and cylindrical parametrizations.
609
+ (1) Cylindrical decompositions of Iℓ of type F ℓ are in 1 − 1 correspondence with
610
+ natural morphisms F ℓ → Iℓ.
611
+ (2) Cylindrical parametrizations of cylindrical decompositions of Iℓ of type F ℓ
612
+ are in 1 − 1 correspondence with morphisms F ℓ → Iℓ.
613
+ (3) Given a cylindrical decomposition Φ which corresponds to a natural morphism
614
+ φ : F ℓ → Iℓ, cylindrical parametrizations of refinements Φ′ of Φ of type G ℓ
615
+ are in 1 − 1 correspondence with commutative triangles of morphisms of the
616
+ kind
617
+ F ℓ
618
+ Iℓ
619
+ G ℓ
620
+ φ
621
+ .
622
+ In particular, this means that the ordinary cylindrical decomposition theorem from
623
+ o-minimality can be reformulated in terms of forts and natural morphisms. We will
624
+ use the following somewhat stronger formulation.
625
+ Definition 3.17. Let F be a fort, and let {XC,j}C∈C(F), j∈J be a collection of de-
626
+ finable subsets of F such that XC,j ⊂ C. We say that a morphism φ : �
627
+ F → F is
628
+ compatible with {XC,j}C∈C(F), j∈J if φ( �C) is compatible with every XC,j.
629
+
630
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
631
+ 15
632
+ Proposition 3.18. . Let F be a fort, and let {XC,j}C∈C(F), j∈J be a collection of
633
+ definable subsets of F such that XC,j ⊂ C. Then there exists a natural morphism
634
+ φ : �
635
+ F → F compatible with {XC,j}C∈C(F), j∈J.
636
+ If in addition the structure is #o-minimal, and the sets XC,j have format F and
637
+ degree D, then �
638
+ F can be taken to have size polyF(D, |C(F)|, |J|) and the morphism
639
+ φ can be chosen so that for every C ∈ C(F) the restriction φ|C has format OF(1)
640
+ and degree polyF(D).
641
+ We postpone the proof of Proposition 3.18 until we develop the theory of forts
642
+ further.
643
+ 3.2. Combinatorial Equivalence.
644
+ Here is a general useful lemma about mor-
645
+ phisms.
646
+ Lemma 3.19. Let φ : F ℓ
647
+ 1 → F ℓ
648
+ 2 be a morphism.
649
+ Then φ is one-to-one, and
650
+ moreover for every 1 ≤ i ≤ ℓ and every (x1, . . . , xi−1) ∈ πi−1(F ℓ
651
+ 1) the function
652
+ φi(x1, . . . , xi−1, ·) is continuous.
653
+ Proof. We prove it by induction on ℓ. For ℓ = 1, since φ is a strictly monotone
654
+ increasing bijection between two intervals, it is clearly one-to-one and continuous.
655
+ Suppose the claim is true for ℓ − 1. Fix (x1, . . . , xℓ−1) ∈ πℓ−1(F ℓ
656
+ 1).The function
657
+ φℓ(x1, . . . , xℓ−1, ·) is continuous by Example 3.12 and the ℓ = 1 case. If φ(x) = φ(x′),
658
+ we know that πℓ−1(x) = πℓ−1(x′) by induction, and then x = x′ follows from the fact
659
+ that φℓ(x1, . . . , xℓ−1, ·) is strictly monotone.
660
+
661
+ Suppose one has a definable family {φλ : F → G }λ∈I of morphisms from the fort
662
+ F to the fort G . Then the map I × F → I × G defined by (λ, x) �→ (λ, φλ(x)) is an
663
+ onto precellular map which is not necessarily a morphism. The first obstruction is
664
+ the continuity in λ of the restrictions φλ|C for all cells C ∈ C(F). To formulate the
665
+ second obstruction, we introduce the following definition.
666
+ Definition 3.20. Let φ, ψ : F → G be morphisms. We say that φ, ψ are combina-
667
+ torially equivalent if for every C ∈ C(F), the images φ(C), ψ(C) are contained in the
668
+ same cell of G .
669
+ Example 3.21. Let F ∈ Forts(ℓ), then all morphisms F → Iℓ are combinatorially
670
+ equivalent.
671
+ Example 3.22. Consider the following two natural morphisms φ, ψ : (0, 3) → (0, 2).
672
+ (6)
673
+ φ =
674
+
675
+ x
676
+ 2, x ∈ (0, 2],
677
+ x − 1, x ∈ (2, 3)
678
+ ψ =
679
+
680
+ x, x ∈ (0, 1],
681
+ x+1
682
+ 2 , x ∈ (1, 3)
683
+
684
+ 16
685
+ DMITRY NOVIKOV, BENNY ZACK
686
+ They are not combinatorially equivalent, since φ(1) = 1
687
+ 2 and so φ maps the cell {1}
688
+ into the cell (0, 1), but ψ(1) = 1, and so maps the cell {1} into itself.
689
+ Proposition 3.23. Let {φλ : F → G }λ∈I be a definable family of combinatorially
690
+ equivalent morphisms. Suppose further that for every C ∈ C(F), the map (λ, x) �→
691
+ φλ(x) is continuous on I × C.
692
+ Then the map ψ : I × F → I × G defined by
693
+ (λ, x) → (λ, φλ(x)) is a morphism.
694
+ Proof. Clearly, ψ is onto and precellular. By the second assumpstion, we also know
695
+ that ψ is continuous on the cells of I × F. Now let C ∈ C(I × F) be a cell. Then
696
+ there exists C′ ∈ C(F) such that C = I × C′. Since the φλ are combinatorially
697
+ equivalent, there exists C′′ ∈ C(G ) such that φλ(C′) ⊂ C′′ for all λ. Thus, ψ maps
698
+ I × C′ into I × C′′, as needed.
699
+
700
+ The following is an important structural proposition on forts and morphisms.
701
+ Proposition 3.24. Let φ : F ℓ → G ℓ be a morphism, and let C ∈ C(πi(F ℓ)) for
702
+ some 1 ≤ i ≤ ℓ.
703
+ (1) For every x, x′ ∈ C we have F ℓ
704
+ x = F ℓ
705
+ x′. Thus the notation F ℓ(C) := F ℓ
706
+ x is
707
+ justified.
708
+ (2) The map C(F ℓ(C)) → C(F ℓ) defined by C′ �→ C × C′ is a bijection between
709
+ C(F ℓ(C)) and the cells �C′ of F ℓ satisfying πi(�C′) = C.
710
+ (3) For every x, x′ ∈ C the morphisms φx, φx′ are combinatorially equivalent.
711
+ Proof. We prove the first item by ascending induction on i.
712
+ 1. For i = 1, it is clear from Definition 3.3. Now suppose the claim is true for i − 1.
713
+ Let (xi+1, . . . , xℓ) ∈ F ℓ
714
+ x. Since x1...i−1, x
715
+
716
+ 1...i−1 are in the same cell of πi−1(F ℓ), by
717
+ induction we have F ℓ
718
+ x1...i−1 = F ℓ
719
+ x′
720
+ 1...i−1, thus (xi, xi+1, . . . , xℓ) ∈ F ℓ
721
+ x′
722
+ 1...i−1, or in other
723
+ words (xi+1, . . . , xℓ) ∈
724
+
725
+ F ℓ
726
+ x′
727
+ 1...i−1
728
+
729
+ xi.
730
+ We claim that xi, x′
731
+ i are in the same cell of
732
+ π1
733
+
734
+ F ℓ
735
+ x′
736
+ 1...i−1
737
+
738
+ . Indeed, since x, x′ are in the same cell of πi(F ℓ), we have that xi, x′
739
+ i
740
+ are bounded between the same two consecutive integers, or are both equal to an in-
741
+ teger. This precisely means that they are in the same cell of π1(F ℓ
742
+ x′
743
+ 1...i−1). So, again
744
+ by the induction hypothesis, we have
745
+
746
+ F ℓ
747
+ x′
748
+ 1...i−1
749
+
750
+ xi =
751
+
752
+ F ℓ
753
+ x′
754
+ 1...i−1
755
+
756
+ x′
757
+ i
758
+ . We conclude that
759
+ (xi+1, . . . , xℓ) ∈
760
+
761
+ F ℓ
762
+ x′
763
+ 1...i−1
764
+
765
+ x′
766
+ i
767
+ = F ℓ
768
+ x′
769
+ 1...i. So F ℓ
770
+ x ⊂ F ℓ
771
+ x′, and by symmetry we even have
772
+ equality.
773
+ 2. Since the cells of F ℓ(C) are disjoint, obviously this map is one to one.
774
+ Let
775
+ C′ ∈ C(F ℓ(C)), clearly, C × C′ is not disjoint from F ℓ, and since it is an integer
776
+ cell, it then follows that C × C′ ∈ C(F ℓ), and obviously πi(C × C′) = C. Finally, let
777
+
778
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
779
+ 17
780
+ �C′ ∈ C(F ℓ) such that πi(�C′) = C. Then �C′ = C × C′ for some integer cell C′. Again,
781
+ clearly C′ is not disjoint from F ℓ(C), and thus C′ ∈ C(F ℓ(C)), and so the map is
782
+ surjective.
783
+ 3. Let C′ ∈ C(F ℓ(C)), and let �
784
+ C′′ ∈ C(G ℓ) be the cell that contains φ(C × C′).
785
+ By the second item �
786
+ C′′ corresponds to a cell C′′ ∈ C(G ℓ
787
+ φ1...i(x1...i)). We claim that
788
+ φx(C′), φx′(C′) ⊂ C′′.
789
+ Indeed, let y ∈ C′.
790
+ Then (x, y), (x′, y) ∈ C × C′, and so
791
+ φ(x, y), φ(x′, y) ∈ �
792
+ C′′. Again by the second item, this exactly means that φx(y), φx′(y) ∈
793
+ C′′.
794
+
795
+ 3.3. Inverse image fort and proof of Proposition 3.18.
796
+ Lemma 3.25. Let F, G ∈ Forts(ℓ), and let φ : F → G be a morphism. Let G ′ ⊂ G
797
+ be a fort. Then F ′ := φ−1(G ′) is a fort and φ|F ′ : F ′ → G ′ is a morphism.
798
+ Proof. If F ′ is a fort, then the second part of the lemma is obvious.
799
+ We prove
800
+ that it is a fort by induction on ℓ. The case ℓ = 1 is clear. By the iductive hy-
801
+ pothesis, φ−1
802
+ 1...ℓ−1(πℓ−1(G ′)) is a fort, and since φ is precellular, we have πℓ−1(F ′) =
803
+ φ−1
804
+ 1...ℓ−1(πℓ−1(G ′)). Let C be one of the cells of φ−1
805
+ 1...ℓ−1(πℓ−1(G ′)), and let C′′ be the cell
806
+ of πℓ−1(G ′) that contains φ1...ℓ−1(C). Then G ′(C′′) is naturally a subfort of G (C′′), and
807
+ so by the induction hypothesis for any x ∈ C we have that F ′
808
+ x is a fort. Moreover, ac-
809
+ cording to proposition 3.24, for any x, x′ ∈ C, the morphisms φx, φx′ : F(C) → G (C′′)
810
+ are combinatorially equivalent, which means precisely that F ′
811
+ x = F ′
812
+ x′ for any such
813
+ x, x′. We’ve shown that F ′ is a fort by Definition 3.5.
814
+
815
+ Proof of Proposition 3.18. The fort F is contained in a fort D which is a linear
816
+ subdivision of (0, 1)ℓ of order d ≤ |C(F)|.
817
+ By
818
+ #CD there exists a cylindrical
819
+ decomposition of D compatible with the sets XC,j and the cells P ∈ C(D) into
820
+ polyF(D, |C(D)|, |{XC,j}|) = polyF(D, |C(F)|, |J|) cells of format OF(1) and degree
821
+ polyF(D). Indeed, an integer cell of length ℓ always has format OF(1) and degree
822
+ poly(ℓ) = poly(F) which is within our scale since polyF(D, F) = polyF(D) and
823
+ moreover |C(D)| = polyℓ(|C(F)|).
824
+ In other words, there exists a surjective precellular map φ : F ′ → D, where F ′
825
+ is a fort with |C(F ′)| = polyF(D, |C(F)|, |J|), such that for any C′ ∈ C(F ′), φ|C′
826
+ is continuous and has format OF(1) and degree polyF(D). Moreover, since φ(C′) is
827
+ compatible with the cells of D which are disjoint, it follows that there exists a cell
828
+ of D which contains φ(C′). Thus, φ is morphism. Denote �
829
+ F := φ−1(F). It is now
830
+ easy to see that φ| �
831
+ F : �
832
+ F → F satisfies the requirements of the proposition.
833
+
834
+
835
+ 18
836
+ DMITRY NOVIKOV, BENNY ZACK
837
+ 3.4. Pulling back along extensions.
838
+ The pullback of a fort F ℓ along a morphism
839
+ to the fort πℓ−1(F ℓ) is a useful natural construction.
840
+ Definition 3.26. Let φ : F ℓ−1
841
+ 1
842
+ → F ℓ−1
843
+ 2
844
+ be a morphism, and let F ℓ
845
+ 2 extend F ℓ−1
846
+ 2
847
+ .
848
+ We define the fort φ∗F ℓ. Suppose F ℓ
849
+ 2 = F ℓ−1
850
+ 2
851
+ ⊙ ϕ (as in Definition 3.5), then
852
+ we define φ∗F ℓ
853
+ 2 := F ℓ−1
854
+ 1
855
+ ⊙ (ϕ ◦ φ).
856
+ The morphism φ extends to the morphism
857
+ (φ, Id) : φ∗F ℓ
858
+ 2 → F ℓ
859
+ 2.
860
+ If one has a morphism φ : F k
861
+ 1 → F k
862
+ 2 and for 1 ≤ k < ℓ and a fort F ℓ
863
+ 2 extend-
864
+ ing F k
865
+ 2 , then φ∗F ℓ
866
+ 2 ∈ Forts(ℓ) is defined by induction, and φ will again extend to a
867
+ morphism φ∗F ℓ
868
+ 2 → F ℓ
869
+ 2.
870
+ We will need the following lemma, which we leave as an exercise for the reader.
871
+ Lemma 3.27. Let φ, ψ : F k → G k be combinatorially equivalent, and let G ℓ extend
872
+ G k. Then φ∗G ℓ = ψ∗G ℓ, and moreover the extensions of φ, ψ to φ∗G ℓ are combina-
873
+ torially equivalent.
874
+ 3.5. The Tower construction.
875
+ Given a morphism φ : F → G , it will be more
876
+ convenient to keep track of the formats and degrees of the restrictions of φ to the
877
+ integer cells of F, rather than the format and the degree of φ itself. We therefore
878
+ introduce the following useful slight abuse of notation.
879
+ Definition 3.28. We say that the family {φλ : F → G }λ∈Λ of morphisms is an
880
+ (F, D)-family of morphisms if for every C ∈ C(F) the family {φλ|C}λ∈Λ is an (F, D)-
881
+ family as in Definition 2.3.
882
+ Remark 3.29. Let φ be any morphism, then in particular, the format and degree of
883
+ φ as a morphism are different from its format and degree as a map.
884
+ If C is an integer cell, let b(C) be the basic cell with the same type as C. If m ∈ Z,
885
+ denote tm(x1, . . . , xℓ) := (x1 + m, x2, . . . , xℓ).
886
+ The point of Proposition 3.30 below is, that in order to construct a morphism to a
887
+ fort F 1 ⋉s, it is enough to construct for each C ∈ C(F 1) a morphism to b(C)×s(C).
888
+ Proposition 3.30 (The tower construction). Let F 1 ⋉ s be a fort of length ℓ, and
889
+ let C1, . . . , Cn be the cells of F 1, ordered compatibly with their order in R. Suppose
890
+ that for every 1 ≤ i ≤ n one has a morphism φCi : F ℓ
891
+ Ci → b(Ci) × s(Ci) of format F
892
+ and degree D. Let mi := sup π1(F ℓ
893
+ Ci), and m0 = 0. Then
894
+ (7)
895
+ F ℓ :=
896
+ n−1
897
+
898
+ i=0
899
+ tm0+···+mi(F ℓ
900
+ Ci+1)
901
+ is a fort, and the map φ : F ℓ → F 1 ⋉ s defined by φ|tm0+···+mi(F ℓ
902
+ Ci+1) := φCi ◦
903
+ t−(m0+···+mi) is a morphism of format OF(1) and degree polyF(D).
904
+
905
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
906
+ 19
907
+ The proof is immediate. Note that the derivatives of φ are equal to the derivatives
908
+ of φCi, which will be crucial for constructing morphisms with bounded derivatives.
909
+ 3.6. Smoothing.
910
+ We say that a morphism of forts is a Cr-morphism if its restric-
911
+ tion to every integer cell is Cr. We use Proposition 2.7 in the context of forts in the
912
+ following way.
913
+ Proposition 3.31.
914
+ Smℓ: Let φ : F ℓ → G ℓ be a natural morphism of format F and degree D, and fix
915
+ r ∈ N. Then there exists a fort K ℓ of size polymax{F,r}(D, |C(F|)) and a natural
916
+ Cr-morphism ψ : K ℓ → F ℓ of format OF,r(1) and degree polyF,r(D) such that φ◦ψ
917
+ is a Cr-morphism.
918
+ Fsmℓ: Let F ℓ be a fort and for every cell C ∈ C(F) let FC = {fC,j : C → I}j∈J
919
+ be a collection of definable functions of format F and degree D. Then there ex-
920
+ ists a natural Cr-morphism φ : K ℓ → F ℓ of format OF,r(1) and degree polyF,r(D)
921
+ where |C(K ℓ)| = polymax{F,r}(D, |F|, |J|) such that for every C′ ∈ C(K ℓ) and every
922
+ C ∈ C(F) with φ(C′) ⊂ C, the function φ|∗
923
+ C′fC,j is Cr for every j ∈ J.
924
+ Proof. The proof is by an induction similar in structure to the induction proof of the
925
+ main result. That is, we prove FSm1, FSmℓ−1 → Smℓ, Smℓ → FSmℓ.
926
+ FSm1: By the tower construction we may assume that F 1 = I, and we omit C from
927
+ the notation fC,j. According to Proposition 2.7 each fj is Cr outside polyF,r(D)
928
+ points. Therefore all the fj are Cr outside |J| · polyF,r(D) points. We finish by
929
+ applying Propositon 3.18 to these points, and note that any natural morphism of
930
+ length 1 is automatically Cr.
931
+ FSmℓ−1 → Smℓ: Let C ∈ C(F ℓ) be a cell. Since φ is natural, if type(C) = (. . . , 1)
932
+ then there are fC, gC : πℓ−1(C) → R such that
933
+ (8)
934
+ φ|C(x1, . . . , xℓ) = (1 − xℓ)fC(x1, . . . , xℓ−1) + xℓgC(x1, . . . , xℓ−1).
935
+ If type(C) = (. . . , 0), then φℓ can be identified with a function on C′ = πℓ−1(C). Let
936
+ F ℓ−1 := πℓ−1(F ℓ) and for every C′ ∈ C(F ℓ−1) define
937
+ F 1
938
+ C′ := {fC, gC : C ∈ C(F ℓ), πℓ−1(C) = C′, type(C) = (. . . , 1)},
939
+ F 2
940
+ C′ := {φℓ|C : C ∈ C(F ℓ), πℓ−1(C) = C′, type(C) = (. . . , 0)},
941
+ F 3
942
+ C′ := {φ1|C′, . . . , φℓ−1|C′}.
943
+ (9)
944
+ In other words, F 1
945
+ C′ and F 2
946
+ C′ correspond to the ℓ′th coordinate of φ, while F 3
947
+ C′ cor-
948
+ responds to the first ℓ − 1 coordinates. Now, apply FSmℓ−1 to the fort F ℓ−1 and
949
+ FC′ = F 1
950
+ C′ ∪ F 2
951
+ C′ ∪ F 3
952
+ C′. We obtain a natural Cr-morphism ψ′ : K ℓ−1 → F ℓ−1. Since
953
+
954
+ 20
955
+ DMITRY NOVIKOV, BENNY ZACK
956
+ F 3
957
+ C′ ⊂ FC, the morphism φ1...ℓ−1 ◦ ψ′ : K ℓ−1 → πℓ−1(G ℓ) is a Cr-morphism. Now
958
+ let K ℓ := (ψ′)∗F ℓ, so that ψ′ extends to a natural Cr-morphism ψ : K ℓ → F ℓ.
959
+ Finally, due to F 1
960
+ C′, F 2
961
+ C′ ⊂ FC′, we see that φ ◦ ψ is Cr, as needed. It is easy to track
962
+ the formats and degrees of this construction.
963
+ Smℓ → FSmℓ : Let k be the smallest integer such that there exists a cell C with at
964
+ least k zeros in its type and a j ∈ J such that fC,j is not Cr on C. Due to Proposition
965
+ 2.7, for every C ∈ C(F) there exists a definable set VC ⊂ C of format OF,r(1) and
966
+ degree polymax{F,r}(D, |J|) with dim(C) − dim(VC) ≥ 1 such that outside it, fC,j is
967
+ Cr for every j ∈ J. By Proposition 3.18 there is a natural morphism ψ : G ℓ → F ℓ
968
+ compatible with the collection {VC}C∈C(F ℓ). By Smℓ we may assume that ψ is a
969
+ Cr-morphism. Thus we have increased k by 1, we repeat this procedure until k = ℓ,
970
+ at which point we are done.
971
+
972
+ 3.7. The main result reformulated.
973
+ A morphism is called an r-morphism if all
974
+ its restrictions to integer cells are r-maps. We are now ready to state the family
975
+ version of our main result in terms of forts and morphisms. We first state the case
976
+ without parameters for simplicity. The reader should keep Definition 3.28 in mind.
977
+ Theorem 3.32.
978
+ Sℓ,0: Let φ : F ℓ → G ℓ be a natural morphism of format F and degree D. Then
979
+ there exists a fort K ℓ with |C(K ℓ)| = polyF,r(D, |C(F ℓ)|) and an r-morphism
980
+ ψ : K ℓ → F ℓ of format OF(1) and degree polyF(D, r) such that the composition
981
+ φ ◦ ψ is an r-morphism.
982
+ Fℓ,0: Let F ℓ be a fort and for every C ∈ C(F ℓ) let FC = {fC,j : C → I}j∈J
983
+ be a collection of definable functions such that each fC,j has format F and degree
984
+ D. Then there exists a fort K ℓ with |C(K )| = polymax{F,r}(D, |C(F ℓ)|) and an
985
+ r-morphism φ : K ℓ → F ℓ of format OF,r(1) and degree polyF,r(D), such that for
986
+ every C ∈ C(F ℓ), j ∈ J and every C′ ∈ C(K ) with φ(C′) ⊂ C, the function (φ|C′)∗fC,j
987
+ is an r-function.
988
+ Sℓ,0 implies S∗
989
+ ℓ of Theorem 1.19 in the following way. Let Φ be a cylindrical de-
990
+ composition of Iℓ of size N into cells of format F and degree D. Then Φ corresponds
991
+ to a natural morphism φ : F ℓ → Iℓ such that |C(F ℓ)| = N and the restrictions φ|C
992
+ are of format OF(1) and degree polyF(D) for all C ∈ C(F ℓ). Let ψ : K ℓ → F ℓ
993
+ be the morphism whose existence is guaranteed by Sℓ,0 for φ. Then the composition
994
+ φ ◦ ψ : K ℓ → Iℓ corresponds to cylindrical r-parametrization of a refinment Φ′ of
995
+ Φ that has size |C(K )| = polymax{F,r}(D, |C(F ℓ)|) = polyF,r(D, N). Moreover, for
996
+ every C′ ∈ K , the restriction (φ◦ψ)|C′ is a composition of two maps that have format
997
+ OF(1), and have degrees polyF(D), polyF,r(D). Therefore by Lemma 2.5, (φ ◦ ψ)|C′
998
+
999
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
1000
+ 21
1001
+ has format OF(1) and degree polyF,r(D), as needed. Fℓ,0 implies F ∗
1002
+ ℓ in a similar way.
1003
+ We now state the family version of our main result.
1004
+ Theorem 3.33.
1005
+ Sℓ,k: Let {φλ : F ℓ → G ℓ}λ∈Ik be an (F, D)-family of natural morphisms. Then there
1006
+ exists
1007
+ • A natural morphism ϕ : K k → Ik of format OF,r(1), degree polyF,r(D) where
1008
+ |C(K k)| = polymax{F,r}(D, |C(F ℓ)|),
1009
+ • For every P ∈ C(K ) a fort KP with |C(KP)| = polymax{F,r}(D, |C(F ℓ)|)
1010
+ and an (OF,r(1), polyF,r(D))-family of combinatorially equivalent r-morphisms
1011
+ {ψλ : KP → F ℓ}λ∈ϕ(P),
1012
+ such that for every λ ∈ ϕ(P) the composition φλ ◦ ψλ is an r-morphism.
1013
+ Fℓ,k: Let F ℓ be a fort and for every C ∈ C(F ℓ) let FC,λ = {fC,j,λ : C → I}λ∈Ik,j∈J be a
1014
+ collection of |J| families such that for every fixed j ∈ J the family {fC,j,λ : C → I}λ∈Ik
1015
+ is an (F, D)-family of definable functions. Then there exists
1016
+ • A natural morphism ϕ : K k → Ik of format OF,r(1), degree polyF,r(D) where
1017
+ |C(K k)| = polymax{F,r}(D, |C(F ℓ)|, |J|),
1018
+ • For every P ∈ C(K ) a fort KP with |C(KP)| = polyF(D, |C(F ℓ)|, |J|) and
1019
+ an (OF,r(1), polyF,r(D))-family of combinatorially equivalent r-morphisms
1020
+ {φλ : KP → F ℓ}λ∈ϕ(P),
1021
+ such that for every λ ∈ ϕ(P) and every fC,j,λ ∈ FC,λ where φλ(C′) ⊂ C, the pullback
1022
+
1023
+ φλ|C′�∗ fC,j,λ is an r-function.
1024
+ 3.8. Final Remarks.
1025
+ Remark 3.34. It is easy to notice that composing a morphism φ with linear sub-
1026
+ division of order d decreases the partial derivatives of φ by a factor of at least d−1.
1027
+ Similarly if φ : F → G is a morphism and f is a function on some cell of G , then
1028
+ the d-subdivision of F will also decrease the partial derivatives of φ∗f by a factor of
1029
+ at least d. Linear subdivision of order d increases the size of a fort of length ℓ by a
1030
+ factor of dℓ, and quite often we shall use linear subdivision with d = polyF,r(D) or
1031
+ d = OF,r(1), we shall use this reduction freely. For example, the composition of two
1032
+ r-morphisms is an r-morphism up to linear subdivision of order Oℓ,r(1) = OF,r(1).
1033
+ Remark 3.35. Let F ℓ be a fort and for every C ∈ C(F ℓ) let FC,λ = {fC,j,λ : C →
1034
+ I}{λ∈Ik,j∈J} be a collection of |J| families such that for every fixed j ∈ J the family
1035
+ {fC,j,λ : C → I}λ∈Ik is an (F, D)-family of definable functions. Suppose we wish to
1036
+ find
1037
+
1038
+ 22
1039
+ DMITRY NOVIKOV, BENNY ZACK
1040
+ • A natural morphism ϕ : K k → Ik of format OF,r(1), degree polyF,r(D) where
1041
+ |C(K k)| = polymax{F,r}(D, |C(F ℓ)|, |J|),
1042
+ • For every P ∈ C(K ) a fort KP with |C(KP)| = polyF(D, |C(F ℓ)|, |J|) and
1043
+ an (OF,r(1), polyF,r(D))-family of combinatorially equivalent r-morphisms
1044
+ {φλ : KP → F ℓ}λ∈ϕ(P),
1045
+ such that for every λ ∈ ϕ(P) and every fC,j,λ ∈ FC,λ where φλ(C′) ⊂ C, the pull-
1046
+ back
1047
+
1048
+ φλ|C′�∗ fC,j,λ has a property P. Suppose moreover that this can be done if the
1049
+ functions fC,j,λ have the property Q. Then it is sufficient to find
1050
+ • A natural morphism ϕ′ : K ′k → Ik of format OF,r(1), degree polyF,r(D)
1051
+ where |C(K k)| = polymax{F,r}(D, |C(F ℓ)|, |J|),
1052
+ • For every P ∈ C(K ′k) a fort KP
1053
+ ′ with |C(K ′
1054
+ P)| = polyF(D, |C(F ℓ)|, |J|)
1055
+ and an (OF,r(1), polyF,r(D))-family of combinatorially equivalent r-morphisms
1056
+ {φ′λ : K ′
1057
+ P → F ℓ}λ∈ϕ(P),
1058
+ such that for every λ ∈ ϕ(P) and every fC,j,λ ∈ FC,λ where φλ(C′) ⊂ C, the pullback
1059
+
1060
+ φ′λ|C′�∗ fC,j,λ has the property Q. Indeed, we first decompose Ik into cells P on which
1061
+ the functions fC,j,λ have the property Q, and then we decompose P into cells on which
1062
+ the functions fC,j,λ have the property P. The upper bounds on format and degree and
1063
+ the size of the forts above follow from Lemma 2.6 and linear subdivision.
1064
+ In particular, we will prove Fℓ,k step by step, at each step reducing to the case
1065
+ where the functions fC,j,λ have an additional property.
1066
+ 4. The step F1,k
1067
+ We will need a series of lemmas.
1068
+ Lemma 4.1. Let {f1,λ : I → I}λ∈Ik, . . . , {fs,λ : I → I}λ∈Ik be (F, D)-families, and
1069
+ let r ∈ N. Then there exists
1070
+ • A natural morphism ϕ : K k → Ik of format OF,r(1), degree polyF,r(D, s)
1071
+ where |C(K k)| = polyF,r(D, s),
1072
+ • For every P ∈ C(K k) a fort K 1
1073
+ P with |C(K 1
1074
+ P )| = polyF,r(D, s) and an
1075
+ (OF,r(1), polyF,r(D))-family of combinatorially equivalent natural morphisms
1076
+ {φλ : K 1
1077
+ P → I}λ∈ϕ(P),
1078
+ such that for every λ ∈ ϕ(P) and every C ∈ C(KP) the pullbacks (φλ|C)∗fi,λ are
1079
+ Cr-functions.
1080
+ Proof. By Proposition 3.31 there exists a natural morphism ϕ′ : K k+1 → Ik+1 such
1081
+ that for every P′ ∈ C(K k+1) and every 1 ≤ j ≤ s, the pullbacks (φ′|P′)∗fj,λ(x) are
1082
+ Cr as functions of (λ, x). Denote K k = πk(K k+1), ϕ = ϕ′
1083
+ 1...k and for every cell
1084
+ P ∈ C(K k) define K 1
1085
+ P := K k+1(P). Then for every λ ∈ ϕ(P) the morphism ϕ′
1086
+
1087
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
1088
+ 23
1089
+ induces a morphism φλ := ϕ′
1090
+ λ : K 1
1091
+ P → I, and these morphisms are combinatorially
1092
+ equivalent by Proposition 3.24, this finishes the proof.
1093
+
1094
+ The following lemma is a family version of the original argument by Gromov in
1095
+ [8].
1096
+ Lemma 4.2. Suppose r ≥ 2, and let {f1,λ : I → I}λ∈Ik, . . . , {fs,λ : I → I}λ∈Ik be
1097
+ (F, D)-families of (r − 1)-functions. Then there exists
1098
+ • A natural morphism ϕ : K k → Ik of format OF,r(1),degree polyF,r(D) where
1099
+ |C(K k)| = polymax{F,r}(1)(D, s),
1100
+ • For every P ∈ C(K k) a fort K 1
1101
+ P with |C(K 1
1102
+ P )| = polyF,r(D, s), and an
1103
+ (OF,r(1), polyF,r(D))-family {φλ : KP → I}λ∈ϕ(P) of combinatorially equiva-
1104
+ lent r-morphisms,
1105
+ such that for every C ∈ C(KP) and every λ ∈ ϕ(P) the pullbacks (φλ|C)∗fi,λ are
1106
+ r-functions.
1107
+ Proof. Note that the φλ obtained in Lemma 4.1 are natural, and this means that up
1108
+ to a linear division of order d = Or(1), by Lemma 4.1, the tower construction and
1109
+ Remark 3.35, we can assume that the functions fi,λ are Cr+1-functions.
1110
+ Let the coordinates of Ik+1 be (λ, x) and let ϕ′ : K k+1 → Ik+1 be a natural mor-
1111
+ phism compatible with the sets {f (r+1)
1112
+ j,λ
1113
+ = 0} and {f (r)
1114
+ j,λ = 0} for every 1 ≤ j ≤ s. De-
1115
+ note K k = πk(K k+1), ϕ = ϕ′
1116
+ 1...k and for every P ∈ C(K k) define K 1
1117
+ P := K k+1(P).
1118
+ For every λ ∈ ϕ(P) the morphism ϕ′ induces a morphism φλ := ϕ′
1119
+ λ : K 1
1120
+ P → I, and
1121
+ these morphisms are combinatorially equivalent by Proposition 3.24. Since φλ are
1122
+ natural, up to a linear subdivision of order d = Or(1), the tower construction and
1123
+ Remark 3.35, we have reduced to the case where the family {f (r)
1124
+ j,λ}λ∈Ik is either a
1125
+ family of monotone increasing functions or a family of monotone decreasing func-
1126
+ tions (or a family of constant functions, in which case we are done) of constant sign
1127
+ for every 1 ≤ j ≤ s. Moreover, since an r-parametrization of f is the same as an
1128
+ r-parametrization of −f, we may additionally assume that f (r)
1129
+ i,λ (x) ≥ 0 for all x and
1130
+ all λ.
1131
+ Define φ : I → I by x �→ 3x2 − 2x3. It is an r-morphism up to linear subdivision
1132
+ of order 3. If f (r)
1133
+ i,λ is monotone decreasing, then
1134
+ (10)
1135
+ 2
1136
+ x ≥ f (r−1)
1137
+ i,λ
1138
+ (x) − f (r−1)
1139
+ i,λ
1140
+ (0)
1141
+ x
1142
+ = f (r)
1143
+ i,λ (cx) ≥ f (r)
1144
+ i,λ (x).
1145
+
1146
+ 24
1147
+ DMITRY NOVIKOV, BENNY ZACK
1148
+ If f (r)
1149
+ i,λ is monotone increasing, then
1150
+ (11)
1151
+ 2
1152
+ 1 − x ≥ f (r−1)
1153
+ i,λ
1154
+ (1) − f (r−1)
1155
+ i,λ
1156
+ (x)
1157
+ x
1158
+ = f (r)
1159
+ i,λ (cx) ≥ f (r)
1160
+ i,λ (x).
1161
+ We have
1162
+ (12)
1163
+ (fi,λ(φ(x)))(r) = Or(1) + Or
1164
+
1165
+ (φ′)rf (r)
1166
+ i,λ (φ(x))
1167
+
1168
+ Note that φ′ = 6x(1−x). If f (r)
1169
+ i,λ is monotone decreasing then it is bounded near 1 by
1170
+ equation 10, and so (φ′)rf (r)
1171
+ i,λ (φ(x)) = Or(1) near 1. Near 0 we have (φ′)rf (r)
1172
+ i,λ (φ(x)) =
1173
+ Or(xr−2) by equation 10 and since r ≥ 2 we get overall that (fi,λ(φ(x)))(r) = Or(1).
1174
+ If f (r)
1175
+ i,λ is monotone increasing then it is bounded near 0 by equation 11, and so
1176
+ (φ′)rf (r)
1177
+ i,λ (φ(x)) = Or(1) near 0. Near 1 we have (φ′)rf (r)
1178
+ i,λ (φ(x)) = Or((1 − x)r−2) by
1179
+ equation 11, and again since r ≥ 2 we have (φ′)rf (r)
1180
+ i,λ (φ(x)) = Or(1). Thus we are
1181
+ done by linear subdivision of order Or(1).
1182
+
1183
+ Proof of F1,k. The idea of the proof is as follows. By Lemma 4.2 above, it is suffi-
1184
+ cient to reduce to the case where the functions fj,λ are 1-functions. Suppose we have
1185
+ definable Cr functions f1, . . . , fs : I → I, and suppose that |f ′
1186
+ 1| < · · · < |f ′
1187
+ s|, and
1188
+ that either |f ′
1189
+ s| ≥ 1 or |f ′
1190
+ s| ≤ 1 globally on I. If |f ′
1191
+ s| ≤ 1, we are done. If |f ′
1192
+ s| ≥ 1, we
1193
+ can reparametrize I by f −1
1194
+ s , and then we will be done. We will now reduce to one of
1195
+ these two cases.
1196
+ By the tower construction we may assume that F 1 = I. By Lemma 4.1 we may
1197
+ further assume that the functions fi,λ(x) are in C2. Now define
1198
+ gij(λ, x) := |f ′
1199
+ i,λ(x)| − |f ′
1200
+ j,λ(x)|,
1201
+ hi(λ, x) := |f ′
1202
+ i,λ(x)| − 1.
1203
+ (13)
1204
+ Let the coordinates of Ik+1 be (λ, x) and let ϕ′ : K k+1 → Ik+1 be a natural mor-
1205
+ phism compatible with the sets {gij = 0}, {hi = 0} and {f ′
1206
+ j,λ(x) = 0} for every
1207
+ 1 ≤ i, j ≤ s. Denote ϕ = ϕ′
1208
+ 1...k, and for every P ∈ C(K k) define K 1
1209
+ P := K k+1(P).
1210
+ For every λ ∈ ϕ(P) define Φλ
1211
+ P = {ϕλ(C) : C ∈ C(K 1
1212
+ P )}, a cylindrical decomposition
1213
+ of I of size polyF(D, s).
1214
+ We aim to construct a family of r-morphisms {φλ : K 1
1215
+ P → I}λ∈ϕ(P) which will be
1216
+ a family of cylindrical r-parametrizations of Φλ
1217
+ P, such that for every λ ∈ ϕ(P), every
1218
+ 1 ≤ j ≤ s and every C ∈ C(K 1
1219
+ P ) the pullback (φλ|C)∗fj,λ is an 1-function. To do
1220
+ this, for every interval Lλ ∈ Φλ we define a monotone increasing surjective r-map
1221
+
1222
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
1223
+ 25
1224
+ φLλ : I → Lλ such that for every 1 ≤ j ≤ s the pullback (φLλ)∗fj,λ|Lλ is an 1-function.
1225
+ Fix P ∈ C(K k), a λ ∈ ϕ(P) and an interval Lλ ∈ Φλ
1226
+ P. Since ϕ′ is compatible
1227
+ with f ′
1228
+ j,λ, on Lλ some of the functions fj,λ are constant (and their indices j are con-
1229
+ stant as λ ranges over ϕ(P)) and those that aren’t constant are strictly monotone.
1230
+ Constant functions are automatically r-functions, so we may assume that none of
1231
+ the fj,λ are constant. Since ϕ′ is compatible with gij, we can relabel the indices j
1232
+ so that |f ′
1233
+ 1,λ(x)| < · · · < |f ′
1234
+ s,λ(x)| for every λ ∈ ϕ(P) and every x ∈ Lλ. Since ϕ′ is
1235
+ compatible with hj, we have that either |f ′
1236
+ s,λ(x)| ≤ 1 for all λ ∈ ϕ(P), x ∈ Lλ, or
1237
+ |f ′
1238
+ s,λ(x)| > 1 for all λ ∈ ϕ(P), x ∈ Lλ.
1239
+ If |f ′
1240
+ s,λ(x)| ≤ 1, we simply parametrize the interval Lλ by an affine map φLλ : I →
1241
+ Lλ. Otherwise, suppose without loss of generality that fs,λ is monotone increasing.
1242
+ We parametrize Lλ by the map φLλ = f −1
1243
+ s,λ ◦ Aλ : I → Lλ, where Aλ : I → fs,λ(Lλ)
1244
+ is an affine map. We claim that |φ′
1245
+ Lλ| ≤ 1. Indeed,
1246
+ (14)
1247
+ |φ′
1248
+ Lλ(x)| = length(fs,λ(Lλ))
1249
+ |f ′
1250
+ s,λ(φLλ(x))|
1251
+ ≤ length(I)
1252
+ 1
1253
+ = 1.
1254
+ Finally, we also claim that (φLλ)∗fj,λ is a 1-function for every 1 ≤ j ≤ s. Indeed,
1255
+ (15)
1256
+ |((φLλ)∗fj,λ)′(x)| = length(fs,λ(Lλ)) · |f ′
1257
+ j,λ(φLλ(x))|
1258
+ |f ′
1259
+ s,λ(φLλ(x))| ≤ 1
1260
+ where the last inequality follows as |f ′
1261
+ j,λ| < |f ′
1262
+ s,λ|. Thus we may assume that the
1263
+ functions fj,λ are 1-functions. We are now in position to use Lemma 4.2 r − 1 times,
1264
+ and we are done.
1265
+
1266
+ 5. The step Sℓ−1,k + Fℓ−1,k → Sℓ,k
1267
+ Let {φλ : F ℓ → G ℓ}λ∈Ik be an (F, D)-family of natural morphisms. Fix a cell
1268
+ C ∈ C(πℓ−1(F ℓ)) and a cell C′ ∈ C(F ℓ) with πℓ−1(C′) = C. Since φλ is natural, if
1269
+ type(C′) = (. . . , 1) then there are definable functions fC′,λ, gC′,λ on C such that
1270
+ (16)
1271
+ φλ
1272
+ ℓ |C′ = (1 − xℓ)fC′,λ(x1, . . . , xℓ−1) + xℓgC′,λ(x1, . . . , xℓ−1),
1273
+ and if type(C′) = (. . . , 0) then φλ
1274
+ ℓ can be identified with a function on C, and we
1275
+ maintain the notation φλ
1276
+ ℓ . Define
1277
+ F 1
1278
+ C,λ := {fC′,λ, gC′,λ : C′ ∈ C(F ℓ), πℓ−1(C′) = C, type(C′) = (·, 1)},
1279
+ F 2
1280
+ C,λ := {φλ
1281
+ ℓ |C′ : C′ ∈ C(F ℓ), πℓ−1(C′) = C, type(C′) = (·, 0)},
1282
+ F 3
1283
+ C,λ := {φλ
1284
+ 1|C, . . . , φλ
1285
+ ℓ−1|C},
1286
+ FC,λ := F 1
1287
+ C,λ ∪ F 2
1288
+ C,λ ∪ F 3
1289
+ C,λ.
1290
+ (17)
1291
+
1292
+ 26
1293
+ DMITRY NOVIKOV, BENNY ZACK
1294
+ Lemma 2.5 implies that for every C′ ∈ C(F ℓ) with πℓ−1(C′) = C and type(C′) = (·, 1),
1295
+ the families {fC′,λ}λ∈Ik and {gC′,λ}λ∈Ik are (OF(1), polyF(D))-families.
1296
+ Now use
1297
+ Fℓ−1,k on the fort F ℓ−1 := πℓ−1(F ℓ) and the family of functions FC,λ.
1298
+ We obtain a natural morphism ϕ : K k → Ik, where K k is a fort of size |C(K k)| =
1299
+ polymax{F,r}(D, |C(F ℓ)|), for each cell P ∈ C(K k) a fort K ′
1300
+ P of size polymax{F,r}(D, |C(F ℓ)|)
1301
+ and an (OF,r(1), polyF,r(D))-family of combinatorially equivalent r-morphisms {ψ′λ :
1302
+ K ′
1303
+ P → F ℓ−1}λ∈ϕ(P).
1304
+ Since F 3
1305
+ C,λ ⊂ FC,λ we see that φλ
1306
+ 1...ℓ−1 ◦ ψ′λ is an r-morphism.
1307
+ Define KP :=
1308
+ (ψ′λ)∗F ℓ. Since the ψ′λ are combinatorially equivalent, KP indeed does not depend
1309
+ on λ. ψ′λ extends to an r-morphism ψλ : KP → F ℓ, and since F 1
1310
+ C,λ, F 2
1311
+ C,λ ⊂ FC,λ we
1312
+ see that φλ ◦ ψλ is an r-morphism as needed.
1313
+ 6. The step S≤ℓ,k + F≤ℓ−1,k → Fℓ,k
1314
+ We will need the following lemmas.
1315
+ Lemma 6.1. Let f : Iℓ → I be a definable function of format F and degree D, and
1316
+ suppose that for all x1 ∈ I the function f(x1, ·) is L-Lipshitz. Then outside polyF(D)
1317
+ hyperplanes of the form {x1 = const} the function f is continuous.
1318
+ Proof. Consider the set Var := {x : limy→x|f(y) − f(x)| > 0}.
1319
+ Obviously, f is
1320
+ continuous on the set Iℓ\Var. We claim that for every t ∈ I, the intersection Var ∩
1321
+ {x1 = t} is open in the hyperplane {x1 = t}. Indeed, suppose that for some x ∈
1322
+ {x1 = t}
1323
+ (18)
1324
+ ϵ = limy→x|f(y) − f(x)| > 0.
1325
+ If x′ ∈ {x1 = t} and |x − x′| <
1326
+ ϵ
1327
+ 4L then
1328
+ |f(y) − f(x′)| ≥ |f(y − x′ + x) − f(x)| − |f(x′) − f(x)| − |f(y − x′ + x) − f(y)| ≥
1329
+ ≥ |f(y − x′ + x) − f(x)| − ϵ
1330
+ 2,
1331
+ (19)
1332
+ since y − x′ + x, y also have the same x1 coordinate. Considering the lim of both
1333
+ sides of the above equation as y → x′, we conclude that limy→x′|f(y)−f(x′)| ≥ ϵ
1334
+ 2 > 0.
1335
+ As f is definable, there is a cylindrical decomposition Φ of Iℓ where |Φ| = polyF(D)
1336
+ such that f is continuous on the cells of Φ. Clearly, Var can only intersect the cells
1337
+ of Φ that are of dimension ≤ ℓ − 1. Let X ∈ Φ such that X ∩ Var ̸= ∅. We claim
1338
+ that X necessarily has type (0, . . . ). Indeed, assume that type(X) = (1, . . . ). Then
1339
+
1340
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
1341
+ 27
1342
+ for any t ∈ I the intersection X ∩ {x1 = t} has dimension ≤ ℓ − 2. Let t ∈ π1(X).
1343
+ On the one hand, Var ∩ {x1 = t} has dimension ℓ − 1 by the above. On the other
1344
+ hand, Var ∩ {x1 = t} lies in the finite union of sets Xi ∩ {x1 = t}, where Xi ∈ Φ are
1345
+ the cells intersecting Var of type (1, . . . ) (as projections on x1 of cells of Φ of type
1346
+ (0, . . . ) and cells of Φ of type (1, . . . ) do not intersect). Thus Var ∩ {x1 = t} is of
1347
+ dimension ≤ ℓ − 2, and this is a contradiction.
1348
+ In conclusion, Var can only intersect cells of type (0, . . . ) and is therefore contained
1349
+ in polyF(D) hyperplanes {x1 = const}, as needed.
1350
+
1351
+ The following is a family version of Lemma 6.1.
1352
+ Lemma 6.2. Let {fλ : Iℓ → I}λ∈Ik be an (F, D) family, and suppose that for every
1353
+ x1 ∈ I, λ ∈ Ik the function fλ(x1, ·) is L-Lipshitz.Then there exists:
1354
+ • A natural morphism ϕ : K k → Ik of format OF(1), degree polyF(D) where
1355
+ |C(K k)| = polyF(D),
1356
+ • for every P ∈ C(K k) a fort K 1
1357
+ P of size polyF(D) and an (OF(1), polyF(D))-
1358
+ family {φ′λ : K 1
1359
+ P → I}λ∈ϕ(P) of natural morphisms,
1360
+ such that if φλ is the extension of φ′λ to (φ′λ)∗Iℓ, then for every C ∈ C((φ′λ)∗Iℓ), the
1361
+ pullback (φλ|C)∗fλ is continuous.
1362
+ Proof. Let
1363
+ d(λ, x1, x′
1364
+ 1) := sup
1365
+ y∈Iℓ−1 |f(x1, y) − f(x′
1366
+ 1, y)|,
1367
+ Σλ := {x1 : limx′
1368
+ 1→x1d(λ, x′
1369
+ 1, x1) > 0}.
1370
+ (20)
1371
+ By Lemma 6.1, for each fixed λ ∈ Ik, the function fλ is continuous outside the hy-
1372
+ perplanes {x1 = c} where c ∈ Σλ. We use Proposition 3.18 on the fort Ik+1 (with
1373
+ coordinates (λ, x1)) and the set Σ := {(λ, x1) : x1 ∈ Σλ} to obtain a natural mor-
1374
+ phism ϕ′ : K k+1 → Ik+1 compatible with Σ.
1375
+ Define K k := πk(K k+1), ϕ := ϕ′
1376
+ 1...k, and for every C ∈ C(K k) let K 1
1377
+ P :=
1378
+ K k+1(P), and φ′λ := ϕ′
1379
+ λ. It is easy to see that this construction satisfies the require-
1380
+ ments of the lemma.
1381
+
1382
+ The following is a version of Lemma 12 from [3] for sharp structures, which is a
1383
+ key lemma in this subsection.
1384
+ Lemma 6.3. Let f : Iℓ → I be a definable C1 function of format F and degree D,
1385
+ and suppose that for any 2 ≤ i ≤ ℓ one has | ∂
1386
+ ∂xif| ≤ 1. Then the function
1387
+
1388
+ ∂x1f(x1, ·)
1389
+ is bounded for all but polyF(D) values of x1.
1390
+
1391
+ 28
1392
+ DMITRY NOVIKOV, BENNY ZACK
1393
+ Proof. Consider the set
1394
+ (21)
1395
+ B :=
1396
+
1397
+ x1 : ∀M > 0 ∃(x2, . . . , xℓ) ∈ Iℓ−1
1398
+ ����
1399
+
1400
+ ∂x1
1401
+ f(x1, x2, . . . , xℓ)
1402
+ ���� > M
1403
+
1404
+ By the axioms of #o-minimal structures and Remark 2.8 the set B has format OF(1)
1405
+ and degree polyF(D). By Lemma 12 from [3], the set B is finite. Therefore it consists
1406
+ of polyF(D) points, as needed.
1407
+
1408
+ The following is a family version of Lemma 6.3.
1409
+ Lemma 6.4. Let {fλ : Iℓ}λ∈Ik be an (F, D)-family of definable C1 functions. Sup-
1410
+ pose that for every 2 ≤ i ≤ s, λ ∈ Ik one has | ∂
1411
+ ∂xif| ≤ 1. Then there exists
1412
+ • A natural morphism ϕ : K k → Ik of format OF(1), degree polyF(D) where
1413
+ |C(K k)| = polyF(D),
1414
+ • for every P ∈ C(K k) a fort K 1
1415
+ P of size polyF(D) and an (OF(1), polyF(D))-
1416
+ family {φ′λ : K 1
1417
+ P → I}λ∈ϕ(P) of natural morphisms
1418
+ such that if φλ is the extension of φ′λ to (φ′λ)∗Iℓ, then for every C ∈ C((φ′λ)∗Iℓ) and
1419
+ every fixed x1 ∈ I the derivative
1420
+
1421
+ ∂x1
1422
+
1423
+ (φλ|C)∗fλ(x1, ·)
1424
+
1425
+ is bounded.
1426
+ Proof. This lemma follows from Lemma 6.3 in the same way as Lemma 6.2 follows
1427
+ from Lemma 6.1.
1428
+
1429
+ 6.1. Reduction to the case where fC,j,λ is Cr and fC,j,λ(x1, ·) is an r-function
1430
+ for all x1.
1431
+ Let F ℓ be a fort and for every C ∈ C(F) let FC,λ = {fC,j,λ : C →
1432
+ I}λ∈Ik,j∈J be a collection of |J| families such that for every fixed j ∈ J the family
1433
+ {fC,j,λ : C → I}λ∈Ik is an (F, D)-family of definable functions. By the tower con-
1434
+ struction and the induction hypothesis we may assume that F ℓ = I × F ℓ−1. Let
1435
+ C ∈ C(F ℓ−1) and define FC,(λ,x1) = {fI×C,j,λ(x1, ·) : fI×C,j,λ ∈ FI×C,λ}. That is, we
1436
+ consider each of the target families of functions {fI×C,j,λ} as a family of functions on
1437
+ cells of F ℓ−1 with parameters λ, x1.
1438
+ We use Fℓ−1,k+1 on F ℓ−1 and FC,(λ,x1). We obtain a natural morphism ϕ′ : K k+1 →
1439
+ Ik+1 (where the coordinates of Ik+1 are (λ, x1)) and for each P′ ∈ C(K k+1) a family
1440
+ of combinatorially equivalent r-morphisms φ(λ,x1) : KP′ → F ℓ−1 such that for every
1441
+ (λ, x1) ∈ ϕ′(P′) and every j ∈ J the function (φ(λ,x1)|C′)∗fI×C,j,λ(x1, ·) is an r-function
1442
+ whenever C′ ∈ C(KP′) and φ(λ,x1)(C′) ⊂ C.
1443
+ Define K k := πk(K k+1), and fix a cell P ∈ C(K k). We in particular have a
1444
+ combinatorially equivalent family {ϕλ : K k(P) → I}λ∈ϕ′
1445
+ 1...k(P) given by ϕλ := φ′
1446
+ λ.
1447
+ By Proposition 3.24 we can identify C(K k(P)) with the cells of K k+1 lying above
1448
+
1449
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
1450
+ 29
1451
+ P. Define s : C(K k(P)) → Forts(ℓ − 1) by s(P′) := KP′ and KP := K k(P) ⋉ s.
1452
+ Finally, define φλ : KP → F ℓ by φλ(x1, . . . , xℓ) := (ϕλ(x1), φ(λ,x1)(x2, . . . , xℓ)).
1453
+ We would like to use Proposition 3.23 to assert that the φλ are morphisms, for as
1454
+ x1 ranges over a cell of K k(P), the morphisms φλ(x1, ·) are combinatorially equiva-
1455
+ lent. However, we do not know that φ(λ,x1) are continuous as functions of x1, . . . , xℓ.
1456
+ Still, we do know that for every x1 the morphism φλ(x1, ·) is an r-morphism, and
1457
+ in particular 1-Lipshitz. Therefore, by Lemma 6.2, we may assume that φ(λ,x1) is
1458
+ continuous as a function of x1, . . . , xℓ. And so, by Proposition 3.23 the map φλ is a
1459
+ morphism for every λ ∈ ϕ′
1460
+ 1...k(P) . We have thus reduced to the case where for every
1461
+ λ ∈ Ik, x1 ∈ π1(F ℓ), j ∈ J and C ∈ C(F ℓ) the function fC,j,λ(x1, ·) is an r-function.
1462
+ The last goal of this subsection is to further reduce to the case where the functions
1463
+ fC,j,λ are Cr. Due to Proposition 3.31 we can find a natural morphism ϕ : K k → Ik
1464
+ and for each cell P ∈ C(K k) a family of combinatorially equivalent Cr morphisms
1465
+ {φλ : KP → F ℓ}λ∈ϕ(P) such that (φλ|C′)∗fC,j,λ is Cr for every j ∈ J, λ ∈ ϕ(P) when-
1466
+ ever C′ ∈ C(KP) and φλ(C′) ⊂ C. By Sℓ,k we may assume that φλ are r-morphisms.
1467
+ Note that by the chain rule, since the first coordinate of a cellular map depends only
1468
+ on x1, we see that ||(φλ|C′)∗fC,j,λ(x1, ·)||r = Or,ℓ(1) and so up to a linear subdivision
1469
+ of order d = Oℓ,r(1) the reduction to Cr functions has not spoiled our first reduction
1470
+ to r-morphisms for every x1.
1471
+ 6.2. Induction on the first unbounded derivative.
1472
+ Order the indices α ∈ Nℓ
1473
+ by lexicographic order. Let α be the first index such that |α| ≤ r and such that
1474
+ there exists C ∈ C(F ℓ), j ∈ J and λ ∈ Ik such that ||fC,j,λ||r > 1. By the previous
1475
+ subsection α1 > 0. By Lemma 6.4, the tower construction and the induction hypoth-
1476
+ esis, we may assume that F ℓ = I × F ℓ−1 and for every x1 ∈ I, and every C, j, λ the
1477
+ function f (α)
1478
+ C,j,λ(x1, ·) is bounded.
1479
+ We shall now reparametrize x1. For every C ∈ C(F ℓ) define
1480
+ (22)
1481
+ SC,j,λ := {|f (α)
1482
+ C,j,λ(x1, . . . , xℓ)| ≥ 1
1483
+ 2 · sup
1484
+ x2...ℓ
1485
+ |f (α)
1486
+ C,j,λ(x1, ·)|} ⊂ C
1487
+ By Proposition 2.9 there exists definable families of curves {γC,j,λ : I → SC,j,λ}λ∈Ik
1488
+ such that γC,j,λ
1489
+ 1
1490
+ (x1) = x1. Let
1491
+ F 1
1492
+ λ := {γC,j,λ : C ∈ C(F ℓ), j ∈ J, λ ∈ Ik},
1493
+ F 2
1494
+ λ := {f (α)
1495
+ C,j,λ ◦ γC,j,λ : C ∈ C(F ℓ), j ∈ J, λ ∈ Ik},
1496
+ Fλ := F 1
1497
+ λ ∪ F 2
1498
+ λ.
1499
+ (23)
1500
+
1501
+ 30
1502
+ DMITRY NOVIKOV, BENNY ZACK
1503
+ We apply F1,k to the fort I and the functions in Fλ. We obtain a natural morphism
1504
+ ϕ : K k → Ik and for every P ∈ C(K k) a family of combinatorially equivalent mor-
1505
+ phisms φ′λ : K ′
1506
+ P → I such that for every C′ ∈ C(K ′
1507
+ P) the pullbacks (φ′λ|C′)∗γC,j,λ and
1508
+ (φ′λ|C′)∗(f (α)
1509
+ C,j,λ ◦γC,j,λ) are r-functions. Define KP := (φ′λ)∗F ℓ and let φλ : KP → F ℓ
1510
+ extend φ′λ.
1511
+ Let C′′ ∈ C(KP) such that φλ(C′′) ⊂ C. By the induction on α and the chain
1512
+ rule we have that
1513
+
1514
+ (φλ|C′′)∗fC,j,λ
1515
+ �(β) = Oℓ,r(1) when β < α.
1516
+ When computing
1517
+
1518
+ (φλ|C′′)∗fC,j,λ
1519
+ �(α) by the chain rule, again by the induction on α all the terms except
1520
+ for (φλ|C′′)α1 · (φλ|C′′)∗f (α)
1521
+ C,j,λ are bounded by Oℓ,r(1). Now
1522
+ (φλ|C′′)α1 · (φλ|C′′)∗f (α)
1523
+ C,j,λ ≤
1524
+ �∂φλ|C′′
1525
+ ∂x1
1526
+ �α1
1527
+ · 2(φλ
1528
+ 1|C′′)∗(f (α)
1529
+ C,j,λ ◦ γC,j,λ) ≤
1530
+ ≤ ∂φλ|C′′
1531
+ ∂x1
1532
+ · 2(φλ
1533
+ 1|C′′)∗(f (α)
1534
+ C,j,λ ◦ γC,j,λ).
1535
+ (24)
1536
+ We proceed to bound the right hand side. Consider (φλ
1537
+ 1|C′′)∗(f (α−11)
1538
+ C,j,λ
1539
+ ◦ γC,j,λ)′, which
1540
+ is bounded by Oℓ,r(1) by the induction hypothesis. By the chain rule it is equal to
1541
+ (25)
1542
+ ∂φλ|C′′
1543
+ ∂x1
1544
+ · (φλ
1545
+ 1|C′′)∗
1546
+
1547
+ f (α)
1548
+ C,j,λ ◦ γC,j,λ +
1549
+
1550
+
1551
+ i=2
1552
+ (γC,j,λ
1553
+ j
1554
+ )′ · f
1555
+ (α−11+1j)
1556
+ C,j,λ
1557
+ ◦ γC,j,λ
1558
+
1559
+ .
1560
+ Due to the induction on α and the definition of φλ, all of the terms above except for
1561
+ ∂φλ|C′′
1562
+ ∂x1
1563
+ · (φλ
1564
+ 1|C′′)∗(f (α)
1565
+ C,j,λ ◦ γC,j,λ) are bounded by Oℓ,r(1). Thus, ∂φλ|C′′
1566
+ ∂x1
1567
+ · 2(φλ
1568
+ 1|C′′)∗(f (α)
1569
+ C,j,λ ◦
1570
+ γC,j,λ) is also bounded by Oℓ,r(1), and we are done by linear subdivision of order
1571
+ d = Oℓ,r(1). □
1572
+ References
1573
+ [1] G. Binyamini, G. Jones, H. Schmidt, and M. Thomas. Effective Pila-Wilkie in the restricted
1574
+ sub-Pffafian structure. In preperation, 2023.
1575
+ [2] G. Binyamini and D. Novikov. Complex Cellular Structures. Annals of Mathematics,
1576
+ 190(1):145–248, 2019.
1577
+ [3] G. Binyamini and D. Novikov. The Yomdin-Gromov Algebraic Lemma revisited. Arnold Math
1578
+ J., 7:419–430, 2021.
1579
+ [4] G. Binyamini and D. Novikov. Tameness in geometry and arithmetic: beyond o-minimality.
1580
+ EMS press, 2022.
1581
+ [5] G. Binyamini, D. Novikov, and B. Zak. Sharply o-minimal structures and sharp cellular de-
1582
+ composition. Preprint, 2022.
1583
+ [6] G. Binyamini, D. Novikov, and B. Zak. Wilkie’s conjecture for Pfaffian structures. Preprint,
1584
+ 2022.
1585
+
1586
+ FORTIFYING THE YOMDIN-GROMOV ALGEBRAIC LEMMA
1587
+ 31
1588
+ [7] G. Binyamini and N. Vorobjov. Effective cylindrical cell decompositions for restricted sub-
1589
+ Pfaffian sets. International Mathematics Research Notices, 2020.
1590
+ [8] M. Gromov. Entropy, homology and semialgebraic geometry. S´eminaire Bourbaki, 86(145-
1591
+ 146):225–240, 1987.
1592
+ [9] J. Pila and A.J. Wilkie. The rational points of a definable set. Duke Math. J, 133(3):591–616,
1593
+ 2006.
1594
+ [10] Lou van den Dries. Tame Topology and O-minimal Structures. Cambridge University Press,
1595
+ 1998.
1596
+
WtE4T4oBgHgl3EQfNAys/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
Y9AzT4oBgHgl3EQfKvuz/content/tmp_files/2301.01103v1.pdf.txt ADDED
@@ -0,0 +1,1167 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Conservation Tools: The Next Generation of
2
+ Engineering–Biology Collaborations
3
+ Andrew K. Schulz1,2,+,∗, Cassie Shriver3,+, Suzanne Stathatos4,+,
4
+ Benjamin Seleb3, Emily Weigel3, Young Hui Chang3,
5
+ M. Saad Bhamla5, David Hu1,3, Joseph R. Mendelson III3,6
6
+ Schools of Mechanical Engineering1, Biological Sciences3, and Chemical and Biomolecular Engineering5
7
+ Georgia Institute of Technology, Atlanta, GA 30332, USA
8
+ Max Planck Institute for Intelligent Systems2, Stuttgart, Germany
9
+ School of Computing and Mathematical Sciences4
10
+ California Institute of Technology, Pasadena, CA 91125, USA
11
+ Zoo Atlanta6, Atlanta, GA 30315, USA
12
+ January 4, 2023
13
+ + indicates co-first author
14
+ Corresponding author:
15
+ Andrew Schulz
16
+ Heisenbergstraße 3, Stuttgart, Germany 70569
17
+ (405)780-0542
18
+ andrew.schulz1994@gmail.com
19
+ Keywords:
20
+ Conservation Tech, Human-Centered Design, AI4Good, Tech4Wildlife
21
+ Abstract
22
+ The recent increase in public and academic interest in preserving biodiversity has led to the growth
23
+ of the field of conservation technology. This field involves designing and constructing tools that
24
+ utilize technology to aid in the conservation of wildlife. In this article, we will use case studies
25
+ to demonstrate the importance of designing conservation tools with human-wildlife interaction in
26
+ mind and provide a framework for creating successful tools. These case studies include a range of
27
+ complexities, from simple cat collars to machine learning and game theory methodologies. Our goal
28
+ is to introduce and inform current and future researchers in the field of conservation technology and
29
+ provide references for educating the next generation of conservation technologists. Conservation
30
+ technology not only has the potential to benefit biodiversity but also has broader impacts on fields
31
+ such as sustainability and environmental protection. By using innovative technologies to address
32
+ conservation challenges, we can find more effective and efficient solutions to protect and preserve
33
+ our planet’s resources.
34
+ Background and Motivation
35
+ The term ”conservation technology” was first proposed by Berger-Tal in 20181 to broadly describe
36
+ the use of technology to manage and conserve wildlife. While a commonly referenced example is
37
+ unmanned aerial vehicles (UAVs, also known as drones), there are many other conservation tech-
38
+ nologies, including camera traps, mobile applications, spatial mapping, and environmental DNA.
39
+ Much of the existing technology uses modern hardware and software design processes to improve
40
+ 1
41
+ arXiv:2301.01103v1 [q-bio.QM] 3 Jan 2023
42
+
43
+ upon ongoing conservation efforts and initiate previously under-addressed efforts1. Some of the
44
+ major goals of conservation technology are to iterate more quickly to improve outdated equipment,
45
+ increase accessibility to tools, and use modern technology to address conservation problems in
46
+ entirely new ways. Conservation technology is being developed for animals in both natural envi-
47
+ ronments and captive settings (e.g. foxes in urban settings and elephants in zoos, respectively)2
48
+ and applications for this technology may include conservation challenges and monitoring needs for
49
+ animals, plants, habitats, geological phenomena such as volcanoes, climate, and atmosphere, and
50
+ more.
51
+ Why has there been a revolution in implementing these new and old tools in the conservation
52
+ sector in the last few years? The recent broader recognition of the significant threats to biodiversity
53
+ has driven demand for conservation technology.
54
+ Since 1970, wildlife populations have plunged
55
+ by 69%3.
56
+ With advancing technological revolutions over the past millennium, many scientists,
57
+ engineers, and other conservation stakeholders see conservation tools as valuable methods to address
58
+ serious ongoing conservation challenges.
59
+ Historically, the field of conservation technology has taken an opportunistic approach wherein
60
+ stakeholders invest in developing technology for a specific, non-conservation need that is then
61
+ applied to wildlife management1, a prime example being the development of drones by the military.
62
+ While opportunistic technologies certainly aid in wildlife management efforts, they also tend to be
63
+ expensive, less accessible to the conservation community, and rarely the most idealized solution for
64
+ specific wildlife management issues. Given the alarming rates of biodiversity loss amidst the current
65
+ mass extinction4, there has been an increasing push towards purpose-driven technology designed
66
+ in consultation with members of the conservation community1. Critically, new technology is not
67
+ considered to represent proper conservation technology until its genuine usefulness and success for
68
+ managing and conserving wildlife has been demonstrated.
69
+ Producing purpose-built technology requires a variety of skills that are typically beyond the
70
+ scope of a single person, so establishing successful interdisciplinary collaborations is crucial. To
71
+ properly synthesize these perspectives, conservation technology must establish the necessary bridges
72
+ between the conservation community, technologists, and policymakers1,5. However, these interdis-
73
+ ciplinary collaborations are dependent on effective communication across domains, which can be
74
+ difficult given differences in objectives and goals. While technology development and outcomes are
75
+ often derived from an engineering design mindset, biological conservation is more hypothesis-driven
76
+ and grounded in the scientific method.
77
+ Despite grants, training, and other efforts towards these collaborations, the conservation com-
78
+ munity has encountered many solutions claiming to be universally minded but lacking in necessary
79
+ interdisciplinary knowledge and partners in respective fields. Inadequate communication between
80
+ fields initially led the wildlife community to be distrustful of new technologies because many engi-
81
+ neering solutions were poorly applied to serve the needs of conservationists, especially in natural
82
+ outdoor situations. However, the pressing nature of the sixth mass extinction and climate change
83
+ has made the necessity of interdisciplinary solutions evident and worth pursuing despite communi-
84
+ cation difficulties. And with this expansion of interdisciplinary collaborations comes the realization
85
+ that novel contributions to conservation technology can be designed in a variety of ways.
86
+ The term ”conservation technology” has received much criticism from the conservation com-
87
+ munity for the implication of requiring advanced technologies. This is misleading when plenty of
88
+ modern innovations involve using simple non-hardware/software devices to serve novel conservation
89
+ problems. Conservation technology can be as complex as machine learning used to identify and
90
+ track species or as simple as chili pepper fences used to deter African Elephants from damaging
91
+ farmland6,7. It is for this reason that we will utilize the term conservation tools (CT) instead of
92
+ conservation technology for the remainder of this manuscript. A tool is broadly defined as a device
93
+ 2
94
+
95
+ to carry out a particular function, and we believe using the term ”conservation tools” better encom-
96
+ passes the diversity of the field. Rephrasing also intentionally includes indigenous solutions utilized
97
+ in traditional conservation practices around the globe, which may not be accurately described in
98
+ the scope of conservation technology.
99
+ In this manuscript, we will describe a diverse array of case studies of conservation tools
100
+ that have been implemented globally. We also emphasize how the importance of the project to
101
+ work alongside the communities impacted with the communities as the stakeholder to minimize the
102
+ traditional practices of parachute science while maximizing community partnerships, access, and
103
+ conservation impact. Parachute science, where scientists ”parachute” into places for purposes of
104
+ research or conservation but leave without a trace of co-authorship to community members who
105
+ made the work possible, is an unfortunately common phenomenon8. We describe tools that are
106
+ heavily focused on hardware and heavily focused on software but can still be simple to use, build,
107
+ and adapt to additional conservation needs. This manuscript is meant to be a starting guide to
108
+ introduce the field of creating conservation tools to those without experience. We hope that the
109
+ glossary of terms also allows current practitioners of CT to understand the diversity of this field
110
+ better. This manuscript hopes to allow the reader to understand that biodiversity is essential not
111
+ just in the wild but also in the technologies utilized to help the conservation tools be as effective
112
+ as possible.
113
+ Conservation Tools Vocabulary
114
+ As the conservation technology field has grown, it has adopted many terms from other fields to
115
+ describe conservation tools accurately. Unfortunately, many of these technical terms are domain-
116
+ specific and can alienate stakeholders. We list and define many of the terms commonly used to
117
+ describe conservation tools and provide corresponding publications with more details on these spe-
118
+ cific terms (Table 1). We elaborate on each term in the case studies and introduction. Throughout
119
+ this paper, we present these terms in bold font to indicate where readers can refer to this table for
120
+ additional details.
121
+ Discussion
122
+ We propose to shift the phrase ”conservation technology” to conservation tools because the tradi-
123
+ tional process of creating conservation technology relies on what is known as opportunistic tech-
124
+ nology1. Purpose-built technology is common in the hardware and software industry, considered
125
+ collectively under the term Human-Centered Design (HCD). HCD operates by using a design
126
+ mindset that focuses on the context of the use of the idea. A common example is the difference
127
+ between checkout interfaces in different environments. Purchasing a beverage at a bar versus at
128
+ a supermarket are similar situations, but the context of use for exchanging money for goods is
129
+ completely different. In each scenario, there are a set number of individuals, m, and a set number
130
+ of items each individual has, n. For the bar, there is a very large m with a very small n, but the
131
+ opposite is true of the supermarket. Thus the design of the technology and processes that enable
132
+ the purchasing of goods are in very different contexts of use. We will apply the same logic to
133
+ conservation tools in utilizing a Human–Wildlife-Centered Design (HWCD) approach.
134
+ A HWCD approach for conservation tools requires consideration of not just the human interac-
135
+ tion with the device but also the interaction between humans and wildlife. While ”human-wildlife
136
+ conflict”9 is used to describe interactions in urban, farming, or wild settings that can cause large
137
+ amounts of harm to human interests10, ”Human-Wildlife interaction” is broadly used to describe
138
+ 3
139
+
140
+ both positive and negative interactions. HWCD is not a new concept, as it has been implemented
141
+ for millennia by indigenous peoples that live, interact, and move with the land.
142
+ For designers
143
+ from non-indigenous backgrounds, it is essential to understand that you will never be able to
144
+ achieve true indigenous design unless the primary designers of a technology solution are from the
145
+ native indigenous lands where the solutions will be implemented11. To ignore indigenous or other
146
+ community-derived knowledge is to create a solution with only partial expertise or knowledge of
147
+ the problem; for this reason, we implore readers to understand that the effectiveness of your tool
148
+ relies on the active collaboration of the community, scientists, and engineers. As we go forward
149
+ in this manuscript, it is paramount for authors to understand that the best tools are created by
150
+ indigenous researchers, scientists, and engineers working collaboratively as they are the most knowl-
151
+ edgeable folks in the world about the conservation challenges non-indigenous members outside the
152
+ community have imposed.
153
+ We will now discuss five case studies to introduce the core principles which we highlight in
154
+ Figure 1, which we believe conservation technology solutions should be implemented. The themes
155
+ are listed at the beginning of each section.
156
+ • What – what is its use?
157
+ • How – how is it used?
158
+ • Where – what are the use cases/how it helps
159
+ • Why – future directions/open questions/etc.
160
+ The following case studies cover specific conservation tools that are created, drawing from both
161
+ new and old technologies.
162
+ Each of these solutions utilizes some measure of HWCD., although
163
+ some utilize frugal materials and are simple, while others take advantage of advanced hardware
164
+ and software that have become more accessible in recent years. The themes of these case studies
165
+ relate to what the surveyed community of conservationists believe are the most important tools for
166
+ assisting in advancing conservation from the most recent state of conservation technology report12.
167
+ We proceed with discussing a case study on accessibility in technology.
168
+ Case Study 1: AudioMoth
169
+ Principle: Solutions should be open source, and accessible in cost and function
170
+ Open-source software often describes the ability to access the code and customize and edit the code
171
+ how we see fit. Undergraduate biologists are often taught R, an open-source programming language
172
+ geared toward statistical modeling; comparatively, engineers and computer scientists frequently
173
+ learn Python, an open-source all-purpose programming language. Regardless of the coding language
174
+ used, open-source code can then be appreciated by the collaboration community where the prior
175
+ knowledge only differs by which open-source software is used in their curriculum. Workshops13
176
+ and online forums14 have begun to bridge the gap between the two groups; for example, in the
177
+ CV4Ecology workshop, engineers teach conservation biologists at the graduate level and post-
178
+ doctoral levels specific tools in Python. One example of how open-source software and hardware
179
+ are used for conservation is AudioMoth.
180
+ What is its use? Effective wildlife management decisions require abundant data on the organ-
181
+ isms. Acoustic monitoring has become one of the more ubiquitous methods of recording information
182
+ in field situations where sound is relevant15,16. While early practices required individuals to actively
183
+ note the sounds they heard, passive monitoring devices can be deployed into areas of interest to
184
+ record information for animals located within a certain proximity15–17.
185
+ 4
186
+
187
+ How is it used? The AudioMoth costs ten times less than commercial products, is energy
188
+ efficient, records both human-audible sounds and ultrasonic frequencies, is the size of a credit card,
189
+ and was created by two PhD students with the intention of increasing scientific accessibility(Figure
190
+ 2A)18 .
191
+ Furthermore, this device is open-source, meaning the code and operating features are
192
+ made public for distribution and modifications for individual projects19. Immediately popular, it
193
+ has been used to monitor animal populations20, track migrations21, identify poaching activity19,
194
+ detect sounds underwater22, and even discover new species19.
195
+ What is a use case? The AudioMoth exemplifies how designing technology that is open-source
196
+ and accessible can dramatically increase scientific participation, with substantial implications for
197
+ informing future wildlife management policies and practices. The term open source solution can
198
+ mean several different things when looking at a device such as AudioMoth and we will discuss these
199
+ in a set of categories: open-source hardware, open-source software, and open-source code.
200
+ These devices can substantially increase monitoring coverage both in terms of land area and
201
+ recording time15–17. While the multi-functional device has applications throughout the biological
202
+ world it has seen greater use recently with the release of the United Nations’s sustainable develop-
203
+ ment goals (SDGs), specifically investigating Life below Water (SDG 14) and Life on Land (SDG
204
+ 15). However, initial productions were far too expensive and complex for mass implementation in
205
+ the scientific community until the creation of the AudioMoth.
206
+ A core feature of open-source hardware is that the project can be built of mechanical parts
207
+ that are all easy to acquire. This can mean a variety of things from easy to purchase or easy
208
+ to create using different advanced manufacturing techniques such as 3D printing or laser cutting.
209
+ specifically 3D printing, sometimes referred to as additive manufacturing, allows for specific parts of
210
+ a hardware model to be built at low expense23. Truly open-sourced hardware will not just tell you
211
+ the techniques utilized but will also include the exact parts, files, models, etc. required for this. A
212
+ new journal publication type is leveraging the future of open-source hardware through publications.
213
+ These journals currently include the Journal of Open Hardware, The Journal of Open Engineering,
214
+ and HardwareX. These journals require all submissions to include complete information for all
215
+ hardware and software included in the device24. It should, however, be mentioned that some of
216
+ these publishers, including Elsevier, are for-profit publishers.
217
+ What is the Potential? Open-sourced hardware does not just mean the mechanical devices
218
+ such as nuts and bolts, but also the electrical devices, such as the circuit board and circuitry diagram
219
+ (Figure 2B). By providing these schematics, users can build the entire AudioMoth system using
220
+ the specifications sheets provided in their publication in HardwareX. There can be large gaps in
221
+ the idea of open source between hardware and software. Many devices allow you full access to the
222
+ sourcing and schematics of the hardware but require you to purchase specific software from the
223
+ organization.
224
+ Two of the commonly applied to be used in this context are front-end interface and back-end
225
+ interface. The front-end interface is what the primary user sees on a screen, or the user-interface
226
+ (UI)25 . The back-end interface is internal equipment that is actually doing much of the coding
227
+ work25. Many of the devices will not feature a customizable front end because it will directly reflect
228
+ a customizable back end known as the application programming interface or API. An API is a pri-
229
+ mary way of allowing open-source code not only to be accessed but also updated and the outputs to
230
+ be changed. This is necessary for researchers because acquiring an API lets the researcher customize
231
+ the data collection, for example extracting location information, or measurements of temperature or
232
+ velocity all of which allow the open-source tool to be customizable for both inputs and outputs. The
233
+ manufacturer of AudioMoth, OpenAcoustics (https://www.openacousticdevices.info/audiomoth),
234
+ provides the researcher not only an API but also all of the operational code, in a user manual for
235
+ each device thus permitting customization of any device aspect (Figure 2C-D). Finally, its ease
236
+ 5
237
+
238
+ of use for the end user is a crucial design component. In designing this device the engineering
239
+ developers have a feedback mechanism for those in the field to help continuously improve the use
240
+ of this. The engineers and scientists developed this tool to be used by indigenous researchers and
241
+ people in which they could place these devices wherever they see fit to start receiving data. Those
242
+ that have occupied indigenous lands are the most knowledgeable about where the placement of
243
+ these devices would be most effective.
244
+ In designing a tool with HWCD in mind, it is vital to think of the context of use. The AudioMoth
245
+ is intended to be used by ecologists attempting to get bio-acoustic data from their open-source
246
+ sensor. Biologists differ significantly from computer scientists and engineering researchers; biology
247
+ is a hypothesis-based field, whereas engineering is design based. The AudioMoth is designed by and
248
+ for biologists to be deployed quickly and repaired easily in various applications and environments.
249
+ AudioMoth utilizes advanced technology in both software and hardware while utilizing context-of-
250
+ use to consider how it will be used.
251
+ Case Study 2: Environmental DNA (eDNA)
252
+ Principle: Solutions should take advantage of increasing hardware technologies
253
+ DNA is a well-established scientific tool for an ever-expanding scope of biological studies and
254
+ beyond26. An enormous challenge in the use of DNA for purposes of conservation is that traditional
255
+ methods of DNA collection require biological samples such as urine, hair, skin, or other tissue27.
256
+ Traditional biological methods have historically required the restraint, capture, or rapid collection
257
+ of fresh DNA samples that can be either logistically infeasible or actively at-odds with observing
258
+ organisms in the wild. Focal organisms in many conservation programs often are extremely rare or
259
+ secretive, and it may not be possible or logistically feasible to get samples from them. Thomsen
260
+ and Willerslev (2015) reviewed the use of eDNA as an emerging tool in conservation28. One of
261
+ the primary challenges they highlighted in conservation is the trade-off between the invasiveness of
262
+ studies and data collection. Applications of eDNA are reducing the needs for invasive studies and
263
+ enabling locating and monitoring of creatures too rare or secretive for traditional survey methods.
264
+ What is its use? Environmental DNA allows for the analysis of diets, geographical ranges,
265
+ population sizes, demographics, and genetics, as well as the assessment of the presence/absence
266
+ of species at sites. These can be quantified using environmental samples such as feces left behind
267
+ and analyzed for different genetic information. The field of eDNA benefits the conservation space
268
+ as being a holistically non-invasive method of DNA extraction, making it very repeatable. The
269
+ techniques for the collection of eDNA still require biological sample collection, but the samples can
270
+ be in much lower quantity and make use of vacuums to process the needed concentrations.
271
+ How is it used? This is a previously developed tool, more recently used by wildlife conserva-
272
+ tionists, which allows using DNA samples found in the environment for understanding endangered
273
+ species in their natural environment utilizing only DNA samples. The novelty in this tool is its
274
+ ability to not only detect DNA information about animals, but it is applicable across a variety of
275
+ environments including land, sea, and in polar ice samples28. As a tool, eDNA is useful in a variety
276
+ of conservation and ecological fields, but this solution has had a significant history of colonial-style
277
+ parachute science29. It is important to note that while solutions and technology like this can be
278
+ leveraged, they must be thought of in the HWCD framework. Working with local and indigenous
279
+ communities as eDNA is not the sole solution and additionally on the ground conservation work is
280
+ necessary for the long-term conservation of wildlife30.
281
+ What is a use case?: One of the first documented uses of eDNA was in 1992 when Amos
282
+ utilized shed skin from cetacean mammals species to inform a population analysis31. Although
283
+ not considered as conservation technology at the time, this was one of the first applications of
284
+ 6
285
+
286
+ non-invasive eDNA for biological conservation and population assessment. Now eDNA is utilized
287
+ to monitor not just populations but to catalog local bio-diversity of fishes32, manage reptile popu-
288
+ lations33, and forest conservation34 using the interface between remote sensing and environmental
289
+ DNA.
290
+ What is the potential? This solution appears to be a universal (or cure-all) tool. Universally
291
+ designed solutions typically will only work for specific use cases. The non-universality in eDNA is
292
+ that it leverages the well-established scientific tool of DNA for new and innovative applications for
293
+ purposes of conservation data and management. Despite its broad range of potential applications,
294
+ eDNA nevertheless is not a universal solution for all situations, especially because the methodology
295
+ is complex in terms of sampling and acquisition of data. As in a wet lab technique it is prone
296
+ to the same human errors as other lab based risks including contamination, biased results and
297
+ interpretations, or even as simple as not having adequate reference databases for identifying DNA
298
+ sequences for all regions or applications.
299
+ These pitfalls do not discount eDNA as an example of utilizing new advances in hardware
300
+ and scientific progress to advance conservation practices. Tools such as this continually are being
301
+ improved and innovated. This field is expanding in the past years with increasing establishments
302
+ of DNA Barcodes that permit identification of species using online DNA databases35.
303
+ Case Study 3: Computer Vision
304
+ Principle: Solutions should take advantage of increasing software technologies
305
+ Machine learning is the science and art of developing computer algorithms to learn automatically
306
+ from data and experience36. Computer vision is a sub-field of machine learning, in which com-
307
+ puters and systems are trained to extract meaningful information (aka ”see”) from images, videos,
308
+ and other inputs. Computer vision lets computers understand visual inputs37.
309
+ What is its use? While humans have been “trained” during their lifetime to identify objects,
310
+ understand their depth, and see their interactions, computer models require thousands of images
311
+ to teach machines to “see” new scenarios. Computer vision has expanded in recent years, too,
312
+ from only being able to work on super-computers to now working on edge devices like cell phones
313
+ and laptops in the wild38–40. With hardware advances and algorithms designed for lower-resource
314
+ devices, computer vision has become less expensive and more accessible to many organizations that
315
+ wish to use it. Users of computer vision applications today include, but are not limited to, (1)
316
+ iPhone users to unlock their phones with their face, (2) drivers of self-driving cars, and (3) traffic
317
+ enforcers who use red-light traffic cameras.
318
+ How is it used? Conservationists use camera traps to capture images of wildlife. Computer
319
+ vision techniques are applied to these camera trap images to help scientists detect, track, classify,
320
+ and re-identify (recognize) individual animals, among other things41,42.
321
+ A typical camera trap
322
+ apparatus is shown in Figure 3A. A camera is placed in a region of interest. It passively collects
323
+ information about what goes through that region. Camera traps collect data over a specified period,
324
+ either writing to an external hard drive or pushing data to a cloud-hosted framework. Camera traps
325
+ often include infrared and/or motions sensors that can identify warm-bodied or moving objects.
326
+ When an animal triggers the sensor, the camera records (writes images to memory), as shown
327
+ in Figure 3B. Afterward, the data is fed into a machine learning model to learn and recognize
328
+ patterns in the data, Figure 3C.
329
+ Traditionally, computer vision has used classical supervised machine learning algorithms (al-
330
+ gorithms that need human-labeled data). These algorithms let the model understand identifying
331
+ characteristics of the animals within the regions of interest (for example, color histograms, texture
332
+ differences, locomotor gait, etc. Figure 3C)6. From those characteristics, the model can learn to
333
+ 7
334
+
335
+ detect and classify wildlife species in the images. Two key use cases of this include classifying ani-
336
+ mal species (classification) and recognizing and identifying individual animals (re-identification
337
+ or re-id). In these tasks, extraction of the foreground of the image is an important pre-processing
338
+ step to focus the model on the animal of interest. For example, the first step in classifying urban
339
+ wildlife is often to crop the image to focus on the animal and not to focus on cars, leaves, trees,
340
+ etc .43. The model could then take these cropped images and classify them as different species
341
+ types (i.e. squirrels, dogs, coyotes, etc.). Alternatively,43 could be used to identify which photos
342
+ to ignore. For example, several urban wildlife monitoring projects use it to crop humans out of
343
+ images and ignore empty images.44.
344
+ What is a use case? Recent advances in hardware have allowed computer vision to expand
345
+ to underwater locations. The Caltech Fish Counting task leverages sonar cameras placed in rivers
346
+ to detect, track, and count salmon as they swim upstream45. The setup of these types of cameras
347
+ within rivers is illustrated in Figure 4. They cannot rely on infrared sensors, so they capture
348
+ images continuously across a specified period. Fisheries managers review the videos and manually
349
+ count the number of salmon. Caltech researchers are working on automating this with computer
350
+ vision45.
351
+ What is the potential? Computer vision has led to a set of technologies that can aid wildlife
352
+ conservation across terrestrial, aquatic, and lab environments. Using computer vision as a tool
353
+ can help solve limitations in manual data analysis by saving time and by limiting external bias.
354
+ Processing large amounts of data quickly allows ecologists to then identify ecological patterns,
355
+ trends, etc. in their scientific space and facilitates quicker lead times on field observations. Their
356
+ science, then, informs ecological actions and goals. The integration of computer vision into wildlife
357
+ conservation is dynamically automating animal ecology and conservation research using data-driven
358
+ models.6
359
+ Case Study 4: Game Theory and Optimization
360
+ Principle: Economics and Artificial Intelligence should be leveraged in conservation
361
+ challenges to optimize decision-making
362
+ Artificial intelligence is actively being used to combat wildlife threats. When designing con-
363
+ servation tools, like sensors, one key challenge is where to place them in an animal’s ecosystem to
364
+ collect relevant data. Researchers are looking into ways to leverage artificial intelligence methods
365
+ to optimize conservation/resource planning and policy-making. One such field in computer science
366
+ that differs from computer vision is the use of game theory for more effective data collection. Game
367
+ theory is a collection of analytical tools that can be used to make optimal choices in inter-actional
368
+ and decision-making problems. The use of game theory for conservation has only recently become
369
+ a field of study.
370
+ What is its use?: In non-mathematical terms, optimization is the study of how to make the
371
+ best or most efficient decision given a certain set of constraints. In probability theory and machine
372
+ learning, the multi-armed bandit problem is one type of optimization problem in which a limited
373
+ set of resources must be split among/between competing choices to maximize expected gain. This
374
+ problem is a sub-class of a broader set of problems called stochastic scheduling problems. In these
375
+ problems, each machine provides a reward randomly from a probability distribution that is not
376
+ known a-priori. The user’s objective is to maximize the sum of the rewards. These techniques
377
+ are commonly used for logistics (routing) coordination and financial portfolio design, though they
378
+ have also been adapted to be used for modeling nefarious actors and optimally countering them.
379
+ In wildlife scenarios, biologists often have to use a small number of tools to collect data in a vast
380
+ environment often hundreds of square kilometers. The use of optimization strategies has recently
381
+ 8
382
+
383
+ begun to help ecologists and biologists pinpoint locations to effectively collect data descriptive of a
384
+ large ecological habitat.
385
+ How is it used? Patrol Planning. Wildlife poaching and trading threaten key species across
386
+ ecosystems. Illegal wildlife trade facilitates the introduction of invasive species, land degradation,
387
+ and biodiversity loss46. Historically, park rangers have recorded where poachers have struck. How-
388
+ ever, in most national parks, there is a limited supply of park rangers. They often are limited
389
+ to driving, walking, or biking around the parks. Several parks have repositories of historical data
390
+ detailing poaching locations identified in the past. This data can be used to predict likely poaching
391
+ threats and locations in the future. Work has been done in the game theory and optimization
392
+ space to leverage machine learning (on the historical data) and optimize multi-modal (i.e. driving
393
+ and walking) patrol planning. Ultimately, parks and wildlife conservation organizations want to
394
+ find the optimal answer to the questions, “How should I organize my patrols?” and “How will
395
+ adversaries respond?”47. This optimization technique provides them with a way to answer those
396
+ questions directly.
397
+ Economic Modeling. Additional researchers, including Keskin and Nuwer, are working toward
398
+ understanding the economics behind these wildlife threats. Poaching functions as an additional
399
+ source of income for individuals in rural communities who may rely primarily on tourism for income.
400
+ If these communities cannot rely on tourism, they may focus on wildlife trafficking, as those species
401
+ are prevalent near them48. A review of wildlife tracking49 focusing on operations and supply chain
402
+ management recognized four challenges that limit preventative measures:
403
+ 1. the difficulties of understanding the true scale of illegal wildlife trade (IWT) from available
404
+ data;
405
+ 2. the breadth of the issue - trafficked animals are used for food, status symbols, traditional
406
+ medicine, exotic pets, and more (this requires the policy remedy to be multifaceted), and
407
+ sometimes IWT operates in countries with corrupt governments or limited infrastructures for
408
+ law enforcement and monitoring;
409
+ 3. IWT groups are geared toward undetectable operations, especially from financial institutions;
410
+ 4. IWT is considered less serious than other trafficking, i.e. human, drugs, weapons.
411
+ There are several suggested ways to apply research in supply-chain operations toward combating
412
+ IWT49. These include: bolstering data through satellite data, acoustic monitoring, news scraping,
413
+ and finding online markets; strengthening data detection and prediction through network analysis
414
+ and understanding data bias; modeling the problem as a network interdiction problem to see how
415
+ to disrupt the supply chain network; more effective resource management and reducing corruption.
416
+ By analyzing the complex supply chain and operations behind IWT, Keskin et al. illuminated a
417
+ more clear picture of each location/scenario individually, which allows an informed and targeted
418
+ response to prevent illegal wildlife trafficking50.
419
+ What are some use cases?
420
+ Evidence from parks in Uganda suggests that poachers are
421
+ deterred by ranger patrols, illuminating the increased need for robust, sequential planning47. Com-
422
+ puter science economists have worked on adversarial modeling to demonstrate poachers’ deterrence
423
+ to patrols along with other poacher behavior patterns47. An illustration of poaching patterns with
424
+ increased patrols are shown in Figure 5.
425
+ Researchers working at the Jilin Huangnihe National Nature Reserve in China first used machine
426
+ learning to predict poaching threats and then used an algorithm to optimize a patrol route. When
427
+ rangers were dispatched in December 2019, they successfully found forty-two snares, significantly
428
+ more than they had found in previous months and patrols51. Combining machine learning and
429
+ 9
430
+
431
+ optimization techniques, therefore, has proven to increase the efficiency of patrol planning and can
432
+ be expanded to more conservation management applications as well.
433
+ What is the potential? Applying optimization techniques across conservation-oriented tasks
434
+ will provide insight and better resource usage to historically under-resourced applications and
435
+ programs.
436
+ In addition, these optimization techniques and economically-focused viewpoints can
437
+ prompt organizations and governments to identify and quell issues more efficiently. Programs can
438
+ best utilize the limited resources they have and do so in an efficient data-driven manner. This
439
+ can, in theory, be scaled to any resource-limited situation, too.
440
+ Those with camera traps, for
441
+ example, can study where to best place them to capture the most data-rich images. Those with
442
+ limited AudioMoths, similarly, can study where to place them to ensure optimal and most realistic
443
+ acoustic captures.
444
+ Case Study 5: Cat Collar
445
+ Principle: Solutions can be simple and should not be over-engineered This case study
446
+ serves to provide an example that fails to fit the restrictive title of conservation technology that
447
+ has taken hold and the overly technocentric vision that often results. A significant challenge to be
448
+ considered when designing conservation tools is viability. A device or solution that is functional may
449
+ not be enough. It must also be accessible in terms of parts availability and costs. The intended
450
+ user base of any conservation tool is likely quite small. While the invention of a powerful tool
451
+ may provide substantial functionality and/or opportunity, it is possible that (through traditional
452
+ avenues) consumer demands and means are insufficient to support its development and distribution.
453
+ When a consumer cannot fully utilize or understand a conservation solution, it can fail, such as
454
+ when there is little to no local adoption of the tools developed52. While frugal science is defined as
455
+ reducing the cost of equipment in terms of bio-engineering, its driving principles are uniquely suited
456
+ to conservation developments. Frugal science is subtly different than the Do-It-Yourself (DIY) and
457
+ Free and Open-Source Hardware (FOSH) as it is focused on utilizing the most frugal ingredients to
458
+ build your tool. While not all devices can be designed frugally, many can have dramatically reduced
459
+ costs as much of the conservation space is not purpose-built designs, but instead, like camera traps,
460
+ are designed for hunters but also utilized also by ecologists and conservationists around the world.
461
+ What is its use? The collar is used to help combat nearly 1.3–4.0 billion birds per year killed
462
+ by domestic cats in the US alone53. This makes domestic cats one of the nation’s most significant
463
+ anthropogenic threats to wildlife, yet very little counter-action has been taken. Common fondness
464
+ towards cats makes enforcing restrictions on them difficult and makes enacting equivalent invasive
465
+ species eradication methods extremely unpopular, even for feral cats54.
466
+ Despite how silly the
467
+ Birdsbesafe® collar looks, it has been found that collared cats killed 19 times fewer birds than did
468
+ their uncollared cats55. The collar is far less costly and controversial than alternative measures and
469
+ allows cats to continue prowling freely. While no one would expect it at first glance, this demeaning
470
+ accessory could be the most realistic, effective solution to preventing cat-caused bird extinction.
471
+ How is it used? The Birdsbesafe® collar is a simple woven fabric collar with bright collars
472
+ painted along the fabric. The application of this device is simple as a large percent of the US popu-
473
+ lation has outdoor cats. These collars are around $10 and are made of two-inch wide cotton fabric
474
+ tubes connecting to a quick-release collar. The collars are meant to be worn by both domesticated
475
+ and wild cats as a means to reduce bird deaths. Much like other Felidae, domesticated cats (Felis
476
+ catus) have stealthy prey-stalking behavior. The collar has bright colors that can be seen from
477
+ far away by both birds and small mammals that the cats may prey upon. This solution is simple
478
+ as no technology is required, and the tool is used by hooking onto a collar around the cat’s neck
479
+ so the cat cannot pull them off. Additionally, these collars were designed with cats in mind as it
480
+ 10
481
+
482
+ does not impede on any of the cat’s primary needs, including eating, drinking, sleeping, urinating,
483
+ or defecating. Functionally this tool is a wearable technology that utilizes color to assist in the
484
+ reduction of bird deaths, and it is as simple as hooking it around your pet cat’s collar.
485
+ What is a use case? In contrast to many of the previously discussed case studies, the idea of
486
+ a conservation tool can be as simple as a brightly colored collar. In biomechanics, space footwear
487
+ is designed to reduce the stress on the joints of the foot. This is verified using scientific data and
488
+ techniques, but an essential factor in shoes is not just biomechanical support but how they look on
489
+ your feet. This is the human element of human-centered design and is an important consideration
490
+ when working with domestication species. When working with a domesticated species, like the cat,
491
+ the solution amongst biologists is very simple: do not let your cat outside. However, the human
492
+ element in this solution is that not all folks will follow these recommendations, and therefore other
493
+ techniques need to be used. Less complex tools, like the cat collar, whose simplicity and low cost
494
+ facilitate broader implementation, can make essential steps in conservation. This solution does
495
+ not solve the issue of invasive cats killing birds and other animals but is dramatically reduces the
496
+ impact that cats have on those that purchase these for their cats.
497
+ What is the potential? Financing the development of conservation tools is a significant issue,
498
+ and there may be few solutions that allow financing of crucial pilot tools and prototypes. Support
499
+ from philanthropic organizations or technology organizations working in the technology space, such
500
+ as Google Earth, Bezos Earth Fund, or AI4Good from Microsoft, can allow small startups to fund
501
+ grants for these tool creations. But instead of this support, we encourage the implementation of
502
+ frugal science methodology56.
503
+ Conclusions
504
+ Conservation tools vary but are united in their potential to aid conservation. There
505
+ is no single solution to the many challenges in conservation. Conservation tools are designed to
506
+ be a part of a community’s toolkit to help conserve and protect wildlife, and we discuss the key
507
+ themes that make them successful in Figure 6. As these case studies show, conservation tools
508
+ are not meant to solve all problems, but they can be useful in contexts where previous methods
509
+ are too onerous or costly. Developers of conservation tools must understand that their designs
510
+ need to be user-friendly for conservation practitioners and be viewed as a resource rather than a
511
+ complete solution for addressing biodiversity decline. The most effective solutions are those that are
512
+ realistically implementable and take into consideration the context of human-wildlife interactions
513
+ in the design process. In this paper, we review five case studies of specific conservation tools that
514
+ are advancing wildlife conservation. When examining these tools, it is important to consider the
515
+ context in which they are used and the specific conservation issues they are addressing.
516
+ To develop effective conservation tools, biologists, computer scientists, and engineers must col-
517
+ laborate and apply their expertise. These interdisciplinary teams must also work with community
518
+ members who have a deep understanding of conservation challenges. The wide range of perspectives
519
+ and challenges addressed through these partnerships allow conservation tools to take many forms.
520
+ We highlight five key characteristics of successful conservation tools. Open-source and accessible
521
+ solutions like the AudioMoth offer opportunities for crowd-sourcing and additional improvements,
522
+ as well as the ability to adapt existing frameworks to similar problems. Hardware from other fields
523
+ can be repurposed in innovative ways to benefit conservation, such as using eDNA to reduce the
524
+ invasiveness of data collection techniques. Existing software like computer vision can also be ap-
525
+ plied to the conservation field to streamline and expand data analyses. Successful conservation
526
+ tools are not limited to biology, engineering, and computer science; they can also benefit from
527
+ 11
528
+
529
+ non-traditional fields like math for identifying ideal collection sites. Finally, not all solutions need
530
+ to be high tech to be effective. Simple solutions, like cat collars with bells to protect birds, can
531
+ also be effective conservation tools.
532
+ In this paper, we aim to provide a foundation for future conservation tool creators by reviewing
533
+ case studies of successful tools and highlighting key themes. These case studies demonstrate the
534
+ diverse range of approaches that can be taken in conservation technology, from simple cat collars to
535
+ complex machine learning and game theory methodologies. By drawing on the expertise of inter-
536
+ disciplinary teams that include biologists, computer scientists, engineers, and community members,
537
+ we can develop effective tools that address the unique challenges of each conservation context. As
538
+ we work to conserve and protect wildlife, it is essential to remember that conservation tools are just
539
+ one part of a larger toolkit and should be integrated into traditional and indigenous approaches
540
+ to conservation. Through this review, we hope to inspire the development of innovative solutions
541
+ to address the pressing needs of biodiversity conservation.
542
+ Ultimately, conservation technology
543
+ is essential for addressing the challenges of biodiversity preservation and promoting sustainable
544
+ solutions for human-wildlife interactions.
545
+ Acknowledgements
546
+ Thank you to all of the members of the Georgia Tech Tech4Wildlife Student Organization for their
547
+ support.
548
+ References
549
+ [1] Oded
550
+ Berger-Tal
551
+ and
552
+ Jos´e
553
+ J.
554
+ Lahoz-Monfort.
555
+ Conservation
556
+ technology:
557
+ The
558
+ next
559
+ generation.
560
+ Conservation
561
+ Letters,
562
+ 11(6):e12458,
563
+ 2018.
564
+ eprint:
565
+ https://conbio.onlinelibrary.wiley.com/doi/pdf/10.1111/conl.12458.
566
+ [2] Xareni P. Pacheco. How Technology Can Transform Wildlife Conservation. Green Technologies
567
+ to Improve the Environment on Earth, December 2018.
568
+ [3] World wildlife fund 2022 annual report. https://www.worldwildlife.org/.
569
+ [4] Gerardo Ceballos, Paul R. Ehrlich, Anthony D. Barnosky, Andr´es Garc´ıa, Robert M. Pringle,
570
+ and Todd M. Palmer. Accelerated modern human–induced species losses: Entering the sixth
571
+ mass extinction. Science Advances, 1(5):e1400253.
572
+ [5] Nicole Sintov, Viviane Seyranian, and Arnaud Lyet. Fostering adoption of conservation tech-
573
+ nologies: a case study with wildlife law enforcement rangers. Oryx, 53(3):479–483, July 2019.
574
+ [6] Devis Tuia, Benjamin Kellenberger, Sara Beery, Blair R. Costelloe, Silvia Zuffi, Benjamin
575
+ Risse, Alexander Mathis, Mackenzie W. Mathis, Frank van Langevelde, Tilo Burghardt,
576
+ Roland Kays, Holger Klinck, Martin Wikelski, Iain D. Couzin, Grant van Horn, Margaret C.
577
+ Crofoot, Charles V. Stewart, and Tanya Berger-Wolf. Perspectives in machine learning for
578
+ wildlife conservation. Nature Communications, 13(1):792, February 2022.
579
+ [7] Alex Chang’a, Nick Souza de, John Muya, Julius Keyyu, Angela Mwakatobe, Lucas Malugu,
580
+ Humphrey Peter Ndossi, Jonathan Konuche, Raphael Omondi, Aloyce Mpinge, Nathan Hahn,
581
+ Suzanne Palminteri, and David Olson. Scaling-Up the Use of Chili Fences for Reducing Human-
582
+ Elephant Conflict Across Landscapes in Tanzania. Tropical Conservation Science, 9(2):921–
583
+ 930, June 2016. Publisher: SAGE Publications Inc.
584
+ 12
585
+
586
+ [8] Andrew K Schulz, Cassie Shriver, Catie Aubuchon, Emily G Weigel, Michelle Kolar, Joseph R
587
+ Mendelson, III, and David L Hu. A Guide for Successful Research Collaborations between
588
+ Zoos and Universities. Integrative and Comparative Biology, page icac096, June 2022.
589
+ [9] Carl D. Soulsbury, Piran C. L. White, Carl D. Soulsbury, and Piran C. L. White.
590
+ Hu-
591
+ man–wildlife interactions in urban areas: a review of conflicts, benefits and opportunities.
592
+ Wildlife Research, 42(7):541–553, July 2015. Publisher: CSIRO PUBLISHING.
593
+ [10] Tyler
594
+ D
595
+ Jessen,
596
+ Natalie
597
+ C
598
+ Ban,
599
+ Nicholas
600
+ Claxton,
601
+ and
602
+ Chris
603
+ T
604
+ Darimont.
605
+ Contributions
606
+ of
607
+ Indigenous
608
+ Knowledge
609
+ to
610
+ ecological
611
+ and
612
+ evolutionary
613
+ understand-
614
+ ing.
615
+ Frontiers
616
+ in
617
+ Ecology
618
+ and
619
+ the
620
+ Environment,
621
+ 20(2):93–101,
622
+ 2022.
623
+ eprint:
624
+ https://onlinelibrary.wiley.com/doi/pdf/10.1002/fee.2435.
625
+ [11] The Ecological Society of America. Ecological Resources from Indigenous People.
626
+ [12] Talia Speaker, Stephanie O’Donnell, George Wittemyer, Brett Bruyere, Colby Loucks,
627
+ Anthony
628
+ Dancer,
629
+ Marianne
630
+ Carter,
631
+ Eric
632
+ Fegraus,
633
+ Jonathan
634
+ Palmer,
635
+ Ellie
636
+ War-
637
+ ren,
638
+ and
639
+ Jennifer
640
+ Solomon.
641
+ A
642
+ global
643
+ community-sourced
644
+ assessment
645
+ of
646
+ the
647
+ state
648
+ of
649
+ conservation
650
+ technology.
651
+ Conservation
652
+ Biology,
653
+ 36(3):e13871,
654
+ 2022.
655
+ eprint:
656
+ https://onlinelibrary.wiley.com/doi/pdf/10.1111/cobi.13871.
657
+ [13] Computer vision for ecology summer workshop. https://cv4ecology.caltech.edu/index.
658
+ html.
659
+ [14] Wildlabs conservation tech training and education.
660
+ https://www.wildlabs.net/groups/
661
+ conservation-tech-training-and-education.
662
+ [15] M. K. Obrist and P. Duelli.
663
+ Rapid biodiversity assessment of arthropods for monitoring
664
+ average local species richness and related ecosystem services. Biodiversity and Conservation,
665
+ 19(8):2201–2220, July 2010.
666
+ [16] Daniel T. Blumstein, Daniel J. Mennill, Patrick Clemins, Lewis Girod, Kung Yao, Gail Patri-
667
+ celli, Jill L. Deppe, Alan H. Krakauer, Christopher Clark, Kathryn A. Cortopassi, Sean F.
668
+ Hanser, Brenda McCowan, Andreas M. Ali, and Alexander N. G. Kirschel. Acoustic monitor-
669
+ ing in terrestrial environments using microphone arrays: applications, technological consider-
670
+ ations and prospectus: Acoustic monitoring. Journal of Applied Ecology, 48(3):758–767, June
671
+ 2011.
672
+ [17] Larissa Sayuri Moreira Sugai, Thiago Sanna Freire Silva, Jos´e Wagner Ribeiro, Jr, and
673
+ Diego Llusia. Terrestrial Passive Acoustic Monitoring: Review and Perspectives. BioScience,
674
+ 69(1):15–25, January 2019.
675
+ [18] Andrew P. Hill, Peter Prince, Jake L. Snaddon, C. Patrick Doncaster, and Alex Rogers. Au-
676
+ dioMoth: A low-cost acoustic device for monitoring biodiversity and the environment. Hard-
677
+ wareX, 6:e00073, October 2019.
678
+ [19] Andrew P. Hill, Peter Prince, Evelyn Pi˜na Covarrubias, C. Patrick Doncaster, Jake L. Snaddon,
679
+ and Alex Rogers. AudioMoth: Evaluation of a smart open acoustic device for monitoring
680
+ biodiversity and the environment. Methods in Ecology and Evolution, 9(5):1199–1211, 2018.
681
+ eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/2041-210X.12955.
682
+ 13
683
+
684
+ [20] Natalia Revilla-Mart´ın, Ivana Budinski, Xavier Puig-Montserrat, Carles Flaquer, and Adri`a
685
+ L´opez-Baucells. Monitoring cave-dwelling bats using remote passive acoustic detectors: a new
686
+ approach for cave monitoring. Bioacoustics, 30(5):527–542, September 2021. Publisher: Taylor
687
+ & Francis eprint: https://doi.org/10.1080/09524622.2020.1816492.
688
+ [21] Ellie Roark and Willson Gaul. Monitoring migration timing in remote habitats: assessing
689
+ the value of extended duration audio recording. Avian Conservation and Ecology, 16(1), June
690
+ 2021. Publisher: The Resilience Alliance.
691
+ [22] Timothy A. C. Lamont, Lucille Chapuis, Ben Williams, Sasha Dines, Tess Gridley, Guil-
692
+ herme Frainer, Jack Fearey, Permas B. Maulana, Mochyudho E. Prasetya, Jamaluddin Jompa,
693
+ David J. Smith, and Stephen D. Simpson. HydroMoth: Testing a prototype low-cost acoustic
694
+ recorder for aquatic environments. Remote Sensing in Ecology and Conservation, 8(3):362–378,
695
+ 2022.
696
+ eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/rse2.249.
697
+ [23] Joshua M. Pearce. Building Research Equipment with Free, Open-Source Hardware. Science,
698
+ 337(6100):1303–1304, September 2012. Publisher: American Association for the Advancement
699
+ of Science.
700
+ [24] Joshua M. Pearce. Economic savings for scientific free and open source technology: A review.
701
+ HardwareX, 8:e00139, October 2020.
702
+ [25] Peter G. Smith. Professional Website Performance: Optimizing the Front-End and Back-End.
703
+ John Wiley & Sons, November 2012. Google-Books-ID: MHLJlUfXV4QC.
704
+ [26] Richard J. Fair, Ryan T. Walsh, and Christopher D. Hupp. The expanding reaction toolkit
705
+ for DNA-encoded libraries. Bioorganic & Medicinal Chemistry Letters, 51:128339, November
706
+ 2021.
707
+ [27] Mariyam Dairawan and Preetha J. Shetty. The Evolution of DNA Extraction Methods. Amer-
708
+ ican Journal of Biomedical Science & Research, 8(1):39, March 2020. Publisher: biomedgrid.
709
+ [28] Philip Francis Thomsen and Eske Willerslev.
710
+ Environmental DNA – An emerging tool in
711
+ conservation for monitoring past and present biodiversity. Biological Conservation, 183:4–18,
712
+ March 2015.
713
+ [29] Sophie von der Heyden.
714
+ Environmental DNA surveys of African biodiversity:
715
+ State
716
+ of knowledge, challenges, and opportunities.
717
+ Environmental DNA, n/a(n/a).
718
+ eprint:
719
+ https://onlinelibrary.wiley.com/doi/pdf/10.1002/edn3.363.
720
+ [30] Ana¨ıs
721
+ Lacoursi`ere-Roussel
722
+ and
723
+ Kristy
724
+ Deiner.
725
+ Environmental
726
+ DNA
727
+ is
728
+ not
729
+ the
730
+ tool
731
+ by
732
+ itself.
733
+ Journal
734
+ of
735
+ Fish
736
+ Biology,
737
+ 98(2):383–386,
738
+ 2021.
739
+ eprint:
740
+ https://onlinelibrary.wiley.com/doi/pdf/10.1111/jfb.14177.
741
+ [31] W.
742
+ Amos,
743
+ H.
744
+ Whitehead,
745
+ M.
746
+ J.
747
+ Ferrari,
748
+ D.
749
+ A.
750
+ Glockner-Ferrari,
751
+ R.
752
+ Payne,
753
+ and
754
+ J. Gordon.
755
+ Restrictable Dna from Sloughed Cetacean Skin;
756
+ Its Potential for Use
757
+ in
758
+ Population
759
+ Analysis.
760
+ Marine
761
+ Mammal
762
+ Science,
763
+ 8(3):275–283,
764
+ 1992.
765
+ eprint:
766
+ https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1748-7692.1992.tb00409.x.
767
+ [32] Mei Shen, Nengwen Xiao, Ziyi Zhao, Ningning Guo, Zunlan Luo, Guang Sun, and Junsheng Li.
768
+ eDNA metabarcoding as a promising conservation tool to monitor fish diversity in Beijing water
769
+ systems compared with ground cages. Scientific Reports, 12(1):11113, June 2022. Number: 1
770
+ Publisher: Nature Publishing Group.
771
+ 14
772
+
773
+ [33] Bethany Nordstrom, Nicola Mitchell, Margaret Byrne, and Simon Jarman. A review of applica-
774
+ tions of environmental DNA for reptile conservation and management. Ecology and Evolution,
775
+ 12(6):e8995, 2022.
776
+ eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/ece3.8995.
777
+ [34] Marcelle Lock, Iris van Duren, Andrew K. Skidmore, and Neil Saintilan. Harmonizing Forest
778
+ Conservation Policies with Essential Biodiversity Variables Incorporating Remote Sensing and
779
+ Environmental DNA Technologies. Forests, 13(3):445, March 2022. Number: 3 Publisher:
780
+ Multidisciplinary Digital Publishing Institute.
781
+ [35] Morgan R. Gostel and W. John Kress. The Expanding Role of DNA Barcodes: Indispensable
782
+ Tools for Ecology, Evolution, and Conservation. Diversity, 14(3):213, March 2022. Number:
783
+ 3 Publisher: Multidisciplinary Digital Publishing Institute.
784
+ [36] Yisong Yu. Caltech cs155: Machine learning and data mining lecture 1, 2022.
785
+ [37] Richard Szeliski. Computer Vision: Algorithms and Applications. Springer Cham, 2 edition,
786
+ 2022. https://link.springer.com/book/10.1007/978-3-030-34372-9.
787
+ [38] Daniel Reed, Dennis Gannon, and Jack Dongarra. Reinventing High Performance Computing:
788
+ Challenges and Opportunities, March 2022. arXiv:2203.02544 [cs].
789
+ [39] Seek by inaturalist.
790
+ [40] Merlin bird id.
791
+ [41] Sara Beery, Elijah Cole, and Arvi Gjoka.
792
+ The iwildcam 2020 competition dataset.
793
+ arXiv
794
+ preprint arXiv:2004.10340, 2020.
795
+ [42] Sara Beery, Grant Van Horn, and Pietro Perona. Recognition in terra incognita. In Proceedings
796
+ of the European conference on computer vision (ECCV), pages 456–473, 2018.
797
+ [43] Sara Beery, Dan Morris, and Siyu Yang. Efficient pipeline for camera trap image review. arXiv
798
+ preprint arXiv:1907.06772, 2019.
799
+ [44] Amanda J. Zellmer and Barbara S. Goto. Urban wildlife corridors: Building bridges for wildlife
800
+ and people. Frontiers in Sustainable Cities, 4, 2022.
801
+ [45] Justin Kay, Peter Kulits, Suzanne Stathatos, Siqi Deng, Erik Young, Sara Beery, Grant
802
+ Van Horn, and Pietro Perona. The caltech fish counting dataset: A benchmark for multiple-
803
+ object tracking and counting. In European Conference on Computer Vision (ECCV), 2022.
804
+ [46] Unep. analysis of the environmental impacts of illegal trade in wildlife., 2017.
805
+ https://
806
+ wedocs.unep.org/handle/20.500.11822/17554.
807
+ [47] Lily Xu, Andrew Perrault, Fei Fang, Haipeng Chen, and Milind Tambe. Robust reinforcement
808
+ learning under minimax regret for green security. In Proc. 37th Conference on Uncertainty in
809
+ Artificial Intelligence (UAI-21), 2021.
810
+ [48] Rachel Love Nuwer. Poached: inside the dark world of wildlife trafficking. Hachette UK, 2018.
811
+ [49] Burcu B. Keskin, Emily C. Griffin, Jonathan O. Prell, Bistra Dilkina, Aaron Ferber, John
812
+ MacDonald, Rowan Hilend, Stanley Griffis, and Meredith L. Gore. Quantitative investigation
813
+ of wildlife trafficking supply chains: A review. Omega, page 102780, 2022.
814
+ 15
815
+
816
+ [50] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep
817
+ convolutional neural networks. 25, 2012.
818
+ [51] Zhang W. Liu D. Li W. Shi X. and Fang F. Chen, W. Data-driven multimodal patrol planning
819
+ for anti-poaching. In AAAI Conference on Artificial Intelligence, 2021.
820
+ [52] Tesfaw Melkamu Adugna and Dessie Almaw Cherie. A Review on Success and Failures of Con-
821
+ servation Agriculture Practices in Ethiopia. International Journal of Environmental Chem-
822
+ istry, 5(1):7, May 2021. Number: 1 Publisher: Science Publishing Group.
823
+ [53] Scott R. Loss, Tom Will, and Peter P. Marra. The impact of free-ranging domestic cats on
824
+ wildlife of the United States. Nature Communications, 4(1):1396, January 2013. Number: 1
825
+ Publisher: Nature Publishing Group.
826
+ [54] Kerrie
827
+ Anne
828
+ T.
829
+ Loyd
830
+ and
831
+ Sonia
832
+ M.
833
+ Hernandez.
834
+ Public
835
+ Perceptions
836
+ of
837
+ Domes-
838
+ tic
839
+ Cats
840
+ and
841
+ Preferences
842
+ for
843
+ Feral
844
+ Cat
845
+ Management
846
+ in
847
+ the
848
+ Southeastern
849
+ United
850
+ States.
851
+ Anthrozo¨os,
852
+ 25(3):337–351,
853
+ September 2012.
854
+ Publisher:
855
+ Routledge
856
+ eprint:
857
+ https://doi.org/10.2752/175303712X13403555186299.
858
+ [55] S.K. Willson, I.A. Okunlola, and J.A. Novak. Birds be safe: Can a novel cat collar reduce
859
+ avian mortality by domestic cats (Felis catus)? Global Ecology and Conservation, 3:359–366,
860
+ January 2015.
861
+ [56] Gaurav Byagathvalli, Elio J. Challita, and M. Saad Bhamla.
862
+ Frugal Science Powered by
863
+ Curiosity. Industrial & Engineering Chemistry Research, 60(44):15874–15884, November 2021.
864
+ [57] Botswana Predator Conservation Trust (2022). Panthera pardus csv custom export. https:
865
+ //lila.science/datasets/leopard-id-2022/.
866
+ 16
867
+
868
+ Figure 1: Visual Abstract displaying the Conservation Tool framework discussed in this piece. Silhouettes
869
+ created by Gabriela Palomo-Munoz and Undraw.co.
870
+ 17
871
+
872
+ Affordable
873
+ Accessible
874
+ Simple
875
+ New Hardware
876
+ New Software
877
+ .": Table 1: Terms used by different groups practicing utilizing advanced and new technology to develop con-
878
+ servation tools and references to find more information about each term.
879
+ 18
880
+
881
+ Conservation Technology Terminology
882
+ Term
883
+ Defenition
884
+ Reference
885
+ Conservation Tools
886
+ Devices that are made and developed to be applied to conservation of wildlife
887
+ This Study
888
+ Conservation
889
+ An interdisciplinary field that works to design technology to help prevent the sixth-mass
890
+ Bergertal 2018
891
+ Technology
892
+ extinction
893
+ In-situ conservation
894
+ Conservation of a species at the original place, e.g. in the wild
895
+ Braverman 2014
896
+ Ex-situ conservation
897
+ Conservation of a species in a captive setting, e.g. at a zoo
898
+ Braverman 2014
899
+ Devices that are built for a particular industry, such as camera traps designed for
900
+ Opportunistic
901
+ hunters, but utilized for a different purpose, such as biologits using camera traps for
902
+ Bergertal 2018
903
+ technology
904
+ ecology studies
905
+ Silver-bullet solutions
906
+ A one size fits all solution that can address and solve any issue
907
+ Shaw 2017
908
+ A design thinking that takes the context-of-use of the exact device as the primary
909
+ Human-Centered Design
910
+ Jacobson 2000
911
+ design component
912
+ A design thinking that takes the context-of-use of the exact device as the primary
913
+ Context of Use
914
+ Jacobson 2000
915
+ design component
916
+ A design thinking that is designed by the indigenous populations that are the most
917
+ Indigenous design
918
+ Nawrotski 2010
919
+ familiar with the conservation initiatives
920
+ Colonization of
921
+ The historical implication that is conservation is performed by those that colonized the
922
+ Loss 2011
923
+ conservation
924
+ states where the conservation is performed
925
+ Solutions that are open access and solutions are fully accessible by the public to re-
926
+ open-source solutions
927
+ Lerner 2005
928
+ create, re-design, and re-invent
929
+ Frugal technology
930
+ Technology that is built using frugal science techniques and
931
+ Byagathvalli 2021
932
+ The concept of re-purposing existing materials or products for uses other than that
933
+ Frugal science
934
+ Byagathvalli 2021
935
+ they were originally intended is not new
936
+ Lahoz-Monfort
937
+ Passive solutions
938
+ Technologies for species monitoring and conservation
939
+ 2012
940
+ Technologies that are specifically for active solutions in the conservation tech field that
941
+ This Study
942
+ Active Solutions
943
+ directly interact with the species, such as invasive species eradication
944
+ Supervised Learning
945
+ A machine learning subset of problems where the available data has labeled examples
946
+ Stuart 2010.
947
+ Unsupervised Learning
948
+ A machine learning subset of problems that analyzes and clusters unlabeled data
949
+ Schmarje 2021
950
+ Self-supervised
951
+ A machine learning subset in which a model trains itself to learn part of the input from
952
+ Hendrycks 2019
953
+ Learning
954
+ another part of data, often leveraging the underlying structure of the data
955
+ Object Detection
956
+ Lin 2014
957
+ class or set of classes
958
+ Classification
959
+ The computer vision process of predicting a class of one object to an image
960
+ Krizhevsky 2012
961
+ Object Re- Identification
962
+ Takes object detection one step further by matching a given object in a new
963
+ Stewart 2021
964
+ (ReID)
965
+ environment to the same object in a different environment
966
+ The computer vision task of taking a set of initial object detections, creating a unique
967
+ Tracking
968
+ Yilmaz, 2009
969
+ identifier for each detection, and tracking each object over a series of time
970
+ Fine-Tuning
971
+ The computer vision process of taking a model that has been trained on one task and
972
+ This Study
973
+ tuning it to make it perform a different, similar task
974
+ A machine learning method that uses a pre-trained model as the starting point for a
975
+ Transfer- Learning
976
+ model in a new task (i.e. it has already learned how to "see" one set of things, and will
977
+ Zhuang, 2019
978
+ be trained again to get better focus on another set of things)
979
+ Created with DatawrapperFigure 2: A) Audiomoth, B) Open source printed circuit board that audiomoth includes on website, C)
980
+ Open source code for controlling and interpreting data from the audiomoth via Github, D) Online
981
+ and app-based user-interface for audiomoth users. Images were taken from AudiomMoth website
982
+ with permission.
983
+ 19
984
+
985
+ B
986
+ Power input
987
+ LED signal output
988
+ 3.3V - 6V (IN)
989
+ Green LED (Out)
990
+ Red LED (Out)
991
+ GND
992
+ GPIO
993
+ AL
994
+ Power output
995
+ BV(OUT)
996
+ Manual bootloader
997
+ Switch input
998
+ JSB/OF
999
+ MEMSMic
1000
+ GND
1001
+ DEFAULT
1002
+ CUSTOM (C)
1003
+ USB/OFF (U)
1004
+ DEFAULT (D)
1005
+ Switch
1006
+ on
1007
+ off
1008
+ on
1009
+ Cc-U
1010
+ -D
1011
+ ...
1012
+ AudioMoth Configuration App
1013
+ C
1014
+ OpenAcousticDevices/
1015
+ D
1016
+ 16:54:1903/09/2021UTC
1017
+ Device ID:
1018
+ 24A46B055DD2F953
1019
+ AudioMoth-...
1020
+ Firmware description:
1021
+ AudioMoth-Firmware-Basic
1022
+ 1.6.0
1023
+ Battery:
1024
+ ≤3.6V
1025
+ Schedule
1026
+ Rocording
1027
+ Fitering
1028
+ Advancod
1029
+ AnElectron-basedapplicationcapableof
1030
+ 00.00
1031
+ 06:00
1032
+ 12:00
1033
+ 18:00
1034
+ 24:00
1035
+ Start recording:
1036
+ 06:00
1037
+ configuring thefunctionalityof theAudioMoth
1038
+ End recording:
1039
+ 00:60
1040
+ Add recording period
1041
+ recording deviceand settingthe onboard clock.
1042
+ Remove selected perid
1043
+ Clear all periods.
1044
+ 03/09/2021
1045
+ ☆ 22
1046
+ 83
1047
+ 03
1048
+ 95
1049
+ 03/09/2021
1050
+ Contributors
1051
+ Stars
1052
+ Forks
1053
+ Each day this wll produco 180 fios, ach 5280 kB, totating 950 MB
1054
+ Issues
1055
+ Daily energy consumption will be approximately 38 mAh
1056
+ Configure AudioMothFigure 3: Basic camera trap setup. A) A camouflaged camera trap is often placed on a tree or a pole.
1057
+ B) Camera trap model. It is equipped with a motion-triggering sensor, a digital camera, and a
1058
+ memory card. When an animal passes in the region of interest, the camera captures photos/video
1059
+ at a specified frame rate of the animal. C) The figure was made using a dataset from LilaBC57
1060
+ and images from Flickr.
1061
+ 20
1062
+
1063
+ A
1064
+ B
1065
+ 9000
1066
+ 666
1067
+ DIGITAL CAMERA
1068
+ animal
1069
+ PADLOCK READY
1070
+ approaches
1071
+ Camera Trap
1072
+ WEATHERPROOF CASE
1073
+ forest
1074
+ INFRARED SENSOR
1075
+ Detection Cone
1076
+ CapturedImage Data
1077
+ C
1078
+ Training()
1079
+ Machine Learning Re-ID Method:
1080
+ Ele1()
1081
+ Trained
1082
+ Ele2()
1083
+ Image
1084
+ Ele3()
1085
+ Classifier
1086
+ Model
1087
+ Ele99()
1088
+ Ele
1089
+ Input Data → Feature ID
1090
+ Prediction
1091
+ Trained
1092
+ Image
1093
+ Classifier
1094
+ ModelFigure 4: Sonar camera arrangement: Here are some diagrams of the camera deployment. On the left, you
1095
+ can see the camera shooting out multiple acoustic sonar beams - they are used to pick up fish in
1096
+ high resolution. The closer the fish are to the camera, the higher their resolution is. In the top
1097
+ right, you can see how these sonar cameras are placed to ”see” all areas where the salmon might
1098
+ swim. There are 2 sonar cameras - the one with the red triangle only captures one field of view;
1099
+ the one with the three narrow triangles oscillates between capturing three different stratas (20
1100
+ min at one, 20 min at the second, 20 min at the third). The bottom right image shows what these
1101
+ three strata images look like when combined. The white boxes are the annotated fish swimming
1102
+ through the stream. Images have been provided from the Alaska Department of Fish and Game
1103
+ and Caltech45
1104
+ 21
1105
+
1106
+ Nearshoretransducet
1107
+ River Flow
1108
+ 0.30
1109
+ [w)
1110
+ unde
1111
+ 5
1112
+ 10
1113
+ 15
1114
+ 20
1115
+ 30
1116
+ 35
1117
+ 40
1118
+ 45
1119
+ 50
1120
+ Source: ADFG
1121
+ Stratum 3:
1122
+ 1151x1497px,6FPS,-1.8°
1123
+ Stratum2:784x1922px,9FPS,-0.7°
1124
+ Stratum 1
1125
+ River Flow
1126
+ 288 x624px
1127
+ 9 FPS-3.6°
1128
+ 3m
1129
+ 8m
1130
+ 23m
1131
+ 35mFigure 5: Utilizing game theory and optimization for conservation practices. A) Data mapping of a con-
1132
+ servation issue to determine which states conservation funding is most important. B) Raw map
1133
+ of the United States. C) Overlapped image of the clustering depicted in A with the raw map of
1134
+ the United States. D) Data interpreted map displaying large arrows in the states where the most
1135
+ conservation is needed with smaller arrows (in light green) displaying states where clustering is
1136
+ beginning. Images made using DataWrapper.
1137
+ 22
1138
+
1139
+ B
1140
+ c
1141
+ DFigure 6: Process that goes into designing and utilizing technology to develop new conservation tools.
1142
+ Silhouettes created by Gabriela Palomo-Munoz and Undraw.co.
1143
+ 23
1144
+
1145
+ Accessible
1146
+ Purpose-built hardware taking
1147
+ Human-Wildlife Centered Design
1148
+ into account
1149
+ Advances in Technology
1150
+ 1
1151
+ Do No Harm
1152
+ Hardware Advances allowing
1153
+ Citing & Co-authoring
1154
+ Collaborations
1155
+ represented parties & locations
1156
+ Repeatable
1157
+ Software Advances allowing
1158
+ No silver bullet solutions being
1159
+ more accurate data collection
1160
+ attempted or parachute science
1161
+ Equitable
1162
+ Open-Source
1163
+ 1
1164
+ Solution is fully open-source
1165
+ 1
1166
+ hardware, software, and
1167
+ repairs
Y9AzT4oBgHgl3EQfKvuz/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff