jackkuo commited on
Commit
fc47bad
·
verified ·
1 Parent(s): 7dcba50

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +1 -0
  2. 0tE1T4oBgHgl3EQf4wXL/content/tmp_files/2301.03505v1.pdf.txt +0 -0
  3. 0tE1T4oBgHgl3EQf4wXL/content/tmp_files/load_file.txt +0 -0
  4. 1NE0T4oBgHgl3EQfdgAR/content/tmp_files/2301.02376v1.pdf.txt +1138 -0
  5. 1NE0T4oBgHgl3EQfdgAR/content/tmp_files/load_file.txt +0 -0
  6. 2tAyT4oBgHgl3EQf1vk5/content/tmp_files/2301.00739v1.pdf.txt +351 -0
  7. 2tAyT4oBgHgl3EQf1vk5/content/tmp_files/load_file.txt +248 -0
  8. 6dE0T4oBgHgl3EQfvwHw/content/tmp_files/2301.02624v1.pdf.txt +858 -0
  9. 6dE0T4oBgHgl3EQfvwHw/content/tmp_files/load_file.txt +0 -0
  10. 79AzT4oBgHgl3EQfSPsz/content/tmp_files/2301.01228v1.pdf.txt +365 -0
  11. 79AzT4oBgHgl3EQfSPsz/content/tmp_files/load_file.txt +218 -0
  12. 9dAyT4oBgHgl3EQfdPeW/content/tmp_files/2301.00299v1.pdf.txt +1090 -0
  13. 9dAyT4oBgHgl3EQfdPeW/content/tmp_files/load_file.txt +0 -0
  14. A9AzT4oBgHgl3EQfv_5R/content/tmp_files/2301.01715v1.pdf.txt +808 -0
  15. A9AzT4oBgHgl3EQfv_5R/content/tmp_files/load_file.txt +0 -0
  16. AtE1T4oBgHgl3EQfDQOp/content/tmp_files/2301.02875v1.pdf.txt +1449 -0
  17. AtE1T4oBgHgl3EQfDQOp/content/tmp_files/load_file.txt +0 -0
  18. DdAzT4oBgHgl3EQfif0c/vector_store/index.pkl +3 -0
  19. F9AzT4oBgHgl3EQfi_2P/content/tmp_files/2301.01509v1.pdf.txt +1201 -0
  20. F9AzT4oBgHgl3EQfi_2P/content/tmp_files/load_file.txt +0 -0
  21. GtE1T4oBgHgl3EQf_QYB/content/tmp_files/2301.03577v1.pdf.txt +951 -0
  22. GtE1T4oBgHgl3EQf_QYB/content/tmp_files/load_file.txt +0 -0
  23. HtFIT4oBgHgl3EQfXys9/content/tmp_files/2301.11245v1.pdf.txt +1378 -0
  24. HtFIT4oBgHgl3EQfXys9/content/tmp_files/load_file.txt +0 -0
  25. IdAzT4oBgHgl3EQfU_z6/content/tmp_files/2301.01278v1.pdf.txt +1460 -0
  26. IdAzT4oBgHgl3EQfU_z6/content/tmp_files/load_file.txt +0 -0
  27. JdFAT4oBgHgl3EQfvB7v/content/tmp_files/2301.08674v1.pdf.txt +625 -0
  28. NdFLT4oBgHgl3EQfOC8n/content/tmp_files/2301.12022v1.pdf.txt +1399 -0
  29. NdFLT4oBgHgl3EQfOC8n/content/tmp_files/load_file.txt +0 -0
  30. TNE3T4oBgHgl3EQfzgsS/content/tmp_files/2301.04728v1.pdf.txt +1074 -0
  31. TNE3T4oBgHgl3EQfzgsS/content/tmp_files/load_file.txt +0 -0
  32. VdFJT4oBgHgl3EQfOSwV/content/tmp_files/2301.11481v1.pdf.txt +2665 -0
  33. VdFJT4oBgHgl3EQfOSwV/content/tmp_files/load_file.txt +0 -0
  34. VtE4T4oBgHgl3EQfMgzk/content/tmp_files/2301.04949v1.pdf.txt +3642 -0
  35. VtE4T4oBgHgl3EQfMgzk/content/tmp_files/load_file.txt +0 -0
  36. X9AyT4oBgHgl3EQfWfd0/content/tmp_files/2301.00164v1.pdf.txt +2493 -0
  37. X9AyT4oBgHgl3EQfWfd0/content/tmp_files/load_file.txt +0 -0
  38. X9E4T4oBgHgl3EQfNwwL/content/tmp_files/2301.04958v1.pdf.txt +0 -0
  39. X9E4T4oBgHgl3EQfNwwL/content/tmp_files/load_file.txt +0 -0
  40. YdE2T4oBgHgl3EQfEQZV/content/tmp_files/2301.03633v1.pdf.txt +0 -0
  41. YdE2T4oBgHgl3EQfEQZV/content/tmp_files/load_file.txt +0 -0
  42. Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/2301.11680v1.pdf.txt +1407 -0
  43. Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/load_file.txt +0 -0
  44. _9AyT4oBgHgl3EQfRfam/content/tmp_files/2301.00068v1.pdf.txt +488 -0
  45. _9AyT4oBgHgl3EQfRfam/content/tmp_files/load_file.txt +238 -0
  46. _dA0T4oBgHgl3EQfPf96/content/tmp_files/2301.02176v1.pdf.txt +1309 -0
  47. _dA0T4oBgHgl3EQfPf96/content/tmp_files/load_file.txt +0 -0
  48. _dAyT4oBgHgl3EQfdvdN/content/tmp_files/2301.00307v1.pdf.txt +834 -0
  49. _dAyT4oBgHgl3EQfdvdN/content/tmp_files/load_file.txt +0 -0
  50. atAyT4oBgHgl3EQf9_py/content/tmp_files/2301.00884v1.pdf.txt +889 -0
.gitattributes CHANGED
@@ -250,3 +250,4 @@ QdAzT4oBgHgl3EQfW_xa/content/2301.01310v1.pdf filter=lfs diff=lfs merge=lfs -tex
250
  ptAyT4oBgHgl3EQfl_gG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
251
  6dAyT4oBgHgl3EQfpfjS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
252
  m9AyT4oBgHgl3EQflPjP/content/2301.00450v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
250
  ptAyT4oBgHgl3EQfl_gG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
251
  6dAyT4oBgHgl3EQfpfjS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
252
  m9AyT4oBgHgl3EQflPjP/content/2301.00450v1.pdf filter=lfs diff=lfs merge=lfs -text
253
+ hNE4T4oBgHgl3EQfrQ2w/content/2301.05207v1.pdf filter=lfs diff=lfs merge=lfs -text
0tE1T4oBgHgl3EQf4wXL/content/tmp_files/2301.03505v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
0tE1T4oBgHgl3EQf4wXL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1NE0T4oBgHgl3EQfdgAR/content/tmp_files/2301.02376v1.pdf.txt ADDED
@@ -0,0 +1,1138 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Improved design and experimental
2
+ demonstration of ultrahigh-Q C6-symmetric H1
3
+ hexapole photonic crystal nanocavities
4
+ KENTA TAKATA1,2,4, EIICHI KURAMOCHI1,2, AKIHIKO SHINYA1,2 AND
5
+ MASAYA NOTOMI1,2,3,5
6
+ 1Nanophotonics Center, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, Kanagawa 243-0198, Japan
7
+ 2NTT Basic Research Laboratories, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, Kanagawa
8
+ 243-0198, Japan
9
+ 3Department of Physics, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551,
10
+ Japan
11
+ 4kenta.takata.ke@hco.ntt.co.jp
12
+ 5masaya.notomi.mn@hco.ntt.co.jp
13
+ Abstract:
14
+ An H1 photonic crystal nanocavity is based on a single point defect and has
15
+ eigenmodes with a variety of symmetric features. Thus, it is a promising building block for
16
+ photonic tight-binding lattice systems that can be used in studies on condensed matter, non-
17
+ Hermitian and topological physics. However, improving its radiative quality (𝑄) factor has been
18
+ considered challenging. Here, we report the design of a hexapole mode of an H1 nanocavity with
19
+ a 𝑄 factor exceeding 108. We achieved such extremely high-𝑄 conditions by designing only four
20
+ structural modulation parameters thanks to the C6 symmetry of the mode, despite the need of
21
+ more complicated optimizations for many other nanocavities. The fabricated silicon photonic
22
+ crystal nanocavities exhibited a systematic change in their resonant wavelengths depending on the
23
+ spatial shift of the air holes in units of 1 nm. Out of 26 such samples, we found eight cavities with
24
+ loaded 𝑄 factors over one million (1.2 × 106 maximum). We examined the difference between
25
+ the theoretical and experimental performances by conducting a simulation of systems with input
26
+ and output waveguides and with randomly distributed radii of air holes. Automated optimization
27
+ using the same design parameters further increased the theoretical 𝑄 factor by up to 4.5 × 108,
28
+ which is two orders of magnitude higher than in the previous studies. Our work elevates the
29
+ performance of the H1 nanocavity to the ultrahigh-𝑄 level and paves the way for its large-scale
30
+ arrays with unconventional functionalities.
31
+ © 2023 Optica Publishing Group
32
+ 1.
33
+ Introduction
34
+ Photonic crystal nanocavities (PCNs) in dielectric slabs are a particular series of optical
35
+ resonators that exhibit both strong light confinement and small modal volumes [1–12]. These
36
+ features enable intense light-matter interactions, which make PCNs very useful for extremely
37
+ low-power photonics [13–15], on-chip nonlinear optics [16–18] and quantum optics [19–21].
38
+ Integration of PCNs also opens a route to functional nanophotonic devices, such as slow light
39
+ waveguides [22–24], and all-optical switches [25–27], memories [28–30], and transistors [31],
40
+ which are potential for information processing.
41
+ An H1 PCN comprises a vacancy of a single lattice element [32–35]. Such a point defect
42
+ structure takes over the spatial symmetry of its host system. Thus, the eigenmodes of the
43
+ Maxwell equations for the H1 nanocavity are also those for the symmetry operations in the
44
+ entire point group of the photonic crystal (PhC) [36]. As a result, they are analogous to atomic
45
+ orbitals in terms of their symmetric properties, and hence, coupled H1 PCNs work as good
46
+ photonic emulators of molecules and tight-binding lattices including basis functions [22,37].
47
+ arXiv:2301.02376v1 [physics.optics] 6 Jan 2023
48
+
49
+ Because their evanescent couplings, resonant frequencies and radiation losses can be controlled by
50
+ structural modulation, PCNs can also be combined with unconventional functionalities emerging
51
+ in non-Hermitian and topological physics [38–47]. In particular, arrays of H1 PCNs may pave
52
+ the way for large-scale two-dimensional crystalline systems [48–53]. This potential is in stark
53
+ contrast to most other PCNs based on linear defects, which are less symmetric and thus limited
54
+ in their coupling profiles.
55
+ However, it is generally more difficult for a smaller PCN to have an ultrahigh 𝑄 factor. Narrower
56
+ field distributions in real space result in broader ones in reciprocal space. Parts of such modes
57
+ tend to reside in the light cone (LC) and hence turns into radiation fields, namely losses [3].
58
+ We showed two decades ago that a hexapole mode of the H1 nanocavity in a triangular-lattice
59
+ PhC slab could have a theoretical 𝑄 factor up to 3 × 106, unlike the other eigenmodes [32,33].
60
+ However, this record was not broken even with an algorithmic optimization [54]. Moreover, the
61
+ experimental counterpart was an order of magnitude smaller, namely 3 × 105 [34]. Unfortunately,
62
+ there values compared disadvantageously to those of PCNs with larger defect regions [55–59].
63
+ The lack of tightest light confinement seems to be a significant obstacle to using large-scale H1
64
+ nanocavity arrays, for example, to enhance light-matter interactions with bulky coupled modes,
65
+ and to make robust optical circuits with topological edge states.
66
+ In this article, we design, analyze and experimentally examine the hexapole mode of an H1
67
+ PCN with a theoretical 𝑄 factor (𝑄th) over 108, on the basis of our latest prototype for studying
68
+ non-Hermitian physics [44]. Structural modulation in the design maintains the C6v symmetry of
69
+ the PCN, which the hexapole mode also respects. As a result, we find that we can dramatically
70
+ increase the 𝑄 factor just with four optimization parameters. By elaborating the dependence of
71
+ 𝑄th on major three parameters in a simulation, we clarify that such extremely high-𝑄 conditions
72
+ form a region with some width in the parameter space. Here, we obtained a hexapole mode with
73
+ 𝑄th = 1.4 × 108 and a modal volume (𝑉) of 0.72(𝜆/𝑛)3. We also compare its field profiles with
74
+ those of another H1 PCN based on a previous study in real and reciprocal spaces.
75
+ We experimentally investigated a series of silicon (Si) H1 PCNs with different spatial shifts of
76
+ air holes. These samples exhibited a systematic variation in their resonant wavelengths, indicating
77
+ that undesired variations in the positions of air holes were restricted. We found that eight such
78
+ PCNs out of 26 had loaded 𝑄 factors (𝑄exp), which include the effects of the input and output
79
+ waveguides, of over one million. The best sample had 𝑄exp = 1.2 × 106, and the cavity’s intrinsic
80
+ 𝑄 factor (𝑄i) was estimated to be 𝑄i = 1.5 × 106. We also performed a simulation of the system
81
+ with randomly varying radii of the air holes to close the gap between 𝑄th and 𝑄exp.
82
+ Finally, we performed an automated optimization to further improve 𝑄th. Here, we added the
83
+ hole radius of the background PhC as a parameter and found 𝑄th = 4.5 × 108, which is more
84
+ than a hundred times those in the previous design. Our results show that the highly symmetric
85
+ hexapole mode can achieve both an extremely high 𝑄th and a very small 𝑉 with an inexpensive
86
+ optimization. It enables ultrahigh 𝑄exp (> 106) of H1 PCNs and will open up their various
87
+ applications.
88
+ The remainder of this paper is organized as follows. Section 2 shows the design and modal
89
+ properties of our H1 PCN. Section 3 presents experimental results, and numerically analyzes
90
+ and discusses them. The automated optimization and resultant impact on the hexapole mode
91
+ are summarized in Sec. 4. Section 5 discusses fundamental limitations on the 𝑄 factors of
92
+ nanocavities, including ours. Section 6 concludes this study.
93
+ 2.
94
+ Cavity design
95
+ 2.1.
96
+ Structure and scheme
97
+ Figure 1(a) depicts the design of our PCN. The system is based on a Si slab with a refractive
98
+ index of 𝑛Si = 3.47 and thickness 𝑡. The PhC here is a triangular lattice of circular air holes of
99
+ radius 𝑅0 and lattice constant 𝑎. Triangular-lattice PhC slabs are widely used in experiments
100
+
101
+ (a)
102
+ (b)
103
+ R0
104
+ R0
105
+ R1
106
+ s1
107
+ s2
108
+ x
109
+ y
110
+ z
111
+ Fig. 1. (a) Design of H1 PCN based on structural modulation of the innermost and
112
+ second innermost layers of air holes with reference to the single point defect (colored
113
+ red and orange, respectively). 𝑅0 is the radius of the holes for the background PhC
114
+ and the second layer, and 𝑅1 that for the innermost holes. 𝑠1 is a radial shift of the
115
+ innermost layer directed outward from the lattice points, and 𝑠2 is that for the second
116
+ innermost layer with its regular hexagonal alignment kept. (b) 𝐻𝑧 field distribution of
117
+ hexapole mode.
118
+ because they have large photonic band gaps for TE-like modes. The lack of a single hole acts as a
119
+ point defect and hence forms an H1 nanocavity, which is the simplest structure of PCNs that take
120
+ over the C6v symmetry of the PhC. The six holes closest to the defect, which are colored red in
121
+ the figure, have a smaller radius 𝑅1 than that of the background PhC (𝑅1 < 𝑅0). This innermost
122
+ layer of holes is also shifted radially away from the lattice points by a distance 𝑠1. The second
123
+ innermost hole layer comprises the twelve holes located one layer outward from the innermost
124
+ ones and is drawn in orange. It is also translated in the radial direction so that it keeps the regular
125
+ hexagonal alignment and its half diagonal is increased by a distance 𝑠2. In addition, it’s holes are
126
+ of the same radius 𝑅0 as those of the PhC.
127
+ We computed the complex eigenfrequencies 𝑓 of the hexapole eigenmode for various cases by
128
+ using the finite element method on a commercial solver (COMSOL Multiphysics [60]). With the
129
+ defect center defined as the coordinate origin, the system had 11 and 14 layers of holes in the ±𝑥
130
+ and ±𝑦 directions, respectively. A rectangular air region with a height of 3 µm was placed on
131
+ each side of the slab. A scattering boundary condition for plane waves is applied to every border
132
+ of the computational domain. The 𝑥-𝑦 and 𝑦-𝑧 planes were set as perfect magnetic and electrical
133
+ conductors, respectively, for reducing the computational cost. Any changes to these simulation
134
+ conditions are noted in what follows. The theoretical 𝑄 factor is given by 𝑄th = Re 𝑓 /(2Im 𝑓 ).
135
+ Figure 1(b) shows the 𝑧 component of the magnetic fields (𝐻𝑧) of the hexapole mode along the
136
+ 𝑥-𝑦 plane. This mode is TE-like and thus characterized by 𝐻𝑧. It is also an eigenmode for the C6
137
+ rotation operator with an eigenvalue of −1. Such an odd parity of a symmetric two-dimensional
138
+ multipole contributes to destructive interference in 𝐻𝑧 along the 𝑧 direction corresponding to
139
+ Γ point [5, 61]. This feature suppresses radiation loss based on the transverse electric field
140
+ components (𝐸𝑥, 𝐸𝑦), as they are linked to 𝐻𝑧 through the Maxwell equations. Thus, structural
141
+ modulation maintaining the lattice-matched rotational symmetry is essential to achieving an
142
+ ultrahigh 𝑄 factor of the hexapole mode. The other C6-symmetric eigenmode of this cavity is
143
+ the monopole mode (not shown). It has an eigenvalue of +1 for the C6 operator and a far lower
144
+ 𝑄th < 3000 in our simulations.
145
+ As illustrated in Fig. 1(a), our design uses only four parameters (𝑅0, 𝑅1, 𝑠1, 𝑠2) to improve
146
+
147
+ 85
148
+ 88
149
+ 91
150
+ 94
151
+ 97
152
+ 99
153
+ 101
154
+ 103
155
+ 105
156
+ 107
157
+ R1 (nm)
158
+ s1 (nm)
159
+ 105
160
+ 106
161
+ 107
162
+ 108
163
+ Qth
164
+ 85
165
+ 88
166
+ 91
167
+ 94
168
+ 97
169
+ 99
170
+ 101
171
+ 103
172
+ 105
173
+ 107
174
+ R1 (nm)
175
+ s1 (nm)
176
+ 1.536
177
+ 1.547
178
+ 1.557
179
+ 1.568
180
+ 1.578
181
+ λ (µm)
182
+ 85
183
+ 88
184
+ 91
185
+ 94
186
+ 16
187
+ 19
188
+ 22
189
+ 25
190
+ s2 (nm)
191
+ s1 (nm)
192
+ 105
193
+ 106
194
+ 107
195
+ 108
196
+ Qth
197
+ 85
198
+ 88
199
+ 91
200
+ 94
201
+ 16
202
+ 19
203
+ 22
204
+ 25
205
+ s2 (nm)
206
+ s1 (nm)
207
+ 1.548
208
+ 1.553
209
+ 1.558
210
+ 1.563
211
+ 1.569
212
+ λ (µm)
213
+ (a)
214
+ (b)
215
+ (d)
216
+ (c)
217
+ Wavelength
218
+ Q factor
219
+ Fig. 2. Dependence of (a) resonant wavelength (𝜆) and (b) theoretical 𝑄 factor (𝑄th) of
220
+ the hexapole mode on 𝑠1 and 𝑅1 for 𝑠2 = 20.5 nm. (c) 𝜆 and (d) 𝑄th dependent on 𝑠1
221
+ and 𝑠2 for 𝑅1 = 102 nm. Black dots represent sample points in the simulation. The
222
+ data among the points are linearly interpolated. A band of parameter conditions for
223
+ 𝑄th > 108 appears. 𝑅0 = 131 nm, 𝑎 = 426 nm, and 𝑡 = 250 nm.
224
+ the 𝑄 factor, unlike recent designs based on costly optimizations of many variables [62–65].
225
+ 𝑅0 determines the filling factor of the PhC, which is related to its photonic band gap and thus
226
+ the in-plane modal confinement. 𝑅1, 𝑠1 and 𝑠2 affect the local modal properties. The lattice
227
+ constant 𝑎 can be varied to adjust the resonant wavelengths of the simulated modes to telecom
228
+ ones around 1.55 µm.
229
+ 2.2.
230
+ Resonance properties versus hole shifts
231
+ First, let us study the resonance characteristics of the mode for constant 𝑅0 = 131 nm, 𝑎 = 426 nm,
232
+ and 𝑡 = 250 nm. Figure 2(a) and (b) are two-dimensional color plots of the resonant wavelength
233
+ 𝜆 = 𝑐/Re 𝑓 and 𝑄th for isolated (unloaded) H1 PCNs depending on 𝑠1 and 𝑅1. Here, 𝑐 is the
234
+ speed of light in vacuum and 𝑠2 = 20.5 nm. The plot of 𝜆 indicates that a small 𝑠1 and large 𝑅1
235
+ squeeze the magnetic poles in Fig. 1(b) and thus yield a short 𝜆, whereas a large 𝑠1 and small 𝑅1
236
+ broaden the magnetic poles and thus increase 𝜆. Remarkably, the 𝑄th plot exhibits a sequence of
237
+ optimum points with 𝑄th > 108 forming a linear band. Such a peak distribution indicates that
238
+ there is an optimal polar width for every 𝜆 that suppresses local scattering-induced radiation loss.
239
+ There is a margin of about ±1.5 nm in 𝑅1 and a wider one in 𝑠1 from each optimum point to have
240
+ a 𝑄th > 107. The largest 𝑄 factor here is 𝑄th = 1.43 × 108 for (𝑠1, 𝑅1) = (88.75 nm, 101.75 nm).
241
+ In units of 0.5 nm for the parameters, 𝑄th = 1.41 × 108 for (𝑠1, 𝑅1) = (89.5 nm, 102 nm) was
242
+ obtained.
243
+ Figure 2(c) and (d) depict the dependence of 𝜆 and 𝑄th on 𝑠1 and 𝑠2 for 𝑅1 = 102 nm. There
244
+
245
+ is a notable difference between Fig. 2(a) and (c) in the directions of the iso-wavelength contours.
246
+ This difference is due to negative correlation between the effect of 𝑅1 and that of 𝑠2; a larger 𝑠2
247
+ results in a longer 𝜆 because of the higher effective index of the cavity region. In contrast, Fig.
248
+ 2(b) and (d) appear to have more or less similar properties. As the mode wavelength increases
249
+ with 𝑠1, the optimal 𝑠2 also becomes larger. 𝑠2 can be used to dramatically improve 𝑄th because
250
+ it introduces a gradual variation in the effective potential barrier of the PhC [7,66]. However, the
251
+ trace of the extremely high 𝑄 values in Fig. 2(d) is nearly perpendicular to the contour lines in
252
+ Fig. 2(c), meaning that the conditions for a much improved 𝑄th are limited for each 𝜆. The peak
253
+ value of 𝑄th decreases for large and small 𝑠1 because 𝑅1 is fixed. Overall, a global optimization
254
+ for (𝑅1, 𝑠1, 𝑠2) enables us to find the continuous conditions for 𝑄th > 108 in the parameter space.
255
+ The best 𝑄th here is 1.46 × 108 for (𝑠1, 𝑠2) = (90.25 nm, 20.75 nm).
256
+ 2.3.
257
+ Modal properties
258
+ Next, let us compare the modal shapes in real and reciprocal spaces of the design with
259
+ 𝑄th > 108 and that in the previous study. Figure 3(a) and (b) show the spatial magnetic intensity
260
+ distributions on a common logarithmic scale (log10(|H(r)|2)) along 𝑧 = 0 for hexapole modes
261
+ with 𝑄th = 2.0 × 106 and 1.4 × 108, respectively. The PCN shown in (a) is based on Ref. [33]
262
+ and does not include 𝑠2 in its design with 𝑅0 = 109 nm, 𝑅1 = 100 nm, 𝑠1 = 78 nm, 𝑎 = 435 nm,
263
+ and 𝑡 = 220 nm. The other PCN in (b) corresponds to (𝑠1, 𝑅1) = (89.5 nm, 102 nm) in Fig. 2(a)
264
+ and (b). A sizable portion of (a) has evanescent fields with relative intensities of about 10−4, and
265
+ visible components with intensities over 10−8 reach the boundaries of the entire geometry. In
266
+ comparison, the optimal mode shown in (b) obviously decays faster from the center. This means
267
+ that the current design provides stronger in-plane light confinement.
268
+ Figure 3(c) and (d) depict the Fourier transforms of the 𝑥 component of the electric fields on a
269
+ logarithmic scale (log10(|F (𝐸𝑥(r))|)) along 𝑧 = 0 for the hexapole modes in Fig. 3(a) and (b).
270
+ Transverse electric field components lying within the LC measure the magnitude of radiation loss,
271
+ because they can directly couple with radiative plane waves [3,67]. As shown in Fig. 3(c), the
272
+ previously designed mode has relative Fourier amplitudes of about 10−2.5 distributed in the LC
273
+ defined by the black dashed circle. In stark contrast, the radiative field amplitudes are suppressed
274
+ over the entire LC for the optimized mode shown in Fig. 3(d). Their maximum value is about
275
+ one order of magnitude smaller than that of Fig. 3(c), confirming an improvement in the 𝑄 factor
276
+ due to the reduction of the radiation flux. A similar trend is seen in the case of 𝐸𝑦. These modal
277
+ properties also support the discussion on Fig. 2(b) and (d).
278
+ The standard Purcell mode volume 𝑉 for PCNs is given by [2]
279
+ 𝑉 =
280
+
281
+ 𝜖(r)|E(r)|2𝑑3r
282
+ max{𝜖(r)|E(r)|2} .
283
+ (1)
284
+ This definition is accurate in estimating the Purcell effect for high-𝑄 cavities and has been used
285
+ for comparison purposes in the literature. Interestingly, the effective volume 𝑉opt = 0.72(𝜆/𝑛)3
286
+ for the mode with 𝑄th = 1.4 × 108 is larger by 9% than that of the previously studied one,
287
+ 𝑉p = 0.66(𝜆/𝑛)3. The electric energy densities of hexapole modes tend to concentrate mostly on
288
+ the sides of the innermost air holes. However, the optimized mode distributes more electric energy
289
+ around the point defect than the mode based on Ref. [33] because of the potential modulation by
290
+ 𝑠2. Thus, it has a reduced maximum energy density or denominator in Eq. (1).
291
+ This result shows that we can dramatically improve 𝑄th of the hexapole mode without sacrificing
292
+ its small 𝑉. 𝑉opt here is comparable with those of optimized L3 PCNs without hole radius
293
+ modulation [64,67], while the hexapole mode has a larger 𝑄th. Thus, our H1 PCNs can be expected
294
+ to have 𝑄exp values as high as those ones. In addition, our optimal 𝑄th/𝑉opt = 1.9 × 108(𝑛/𝜆)3 is
295
+ slightly better than another L3 nanocavity with 𝑄th/𝑉 = 1.7 × 108(𝑛/𝜆)3 (𝑄th = 1.9 × 108 and
296
+ 𝑉 = 1.1(𝜆/𝑛)3) designed by the particle-swarm algorithm [65].
297
+
298
+ (a)
299
+ (b)
300
+ (d)
301
+ (c)
302
+ a = 435 nm
303
+ a = 426 nm
304
+ 0
305
+ 0
306
+ 4
307
+ -4
308
+ kx (units of π/a)
309
+ -4
310
+ 4
311
+ 0
312
+ kx (units of π/a)
313
+ 0
314
+ -4
315
+ 4
316
+ 4
317
+ -4
318
+ ky (units of π/a)
319
+ log10(|H|2)
320
+ log10(|(Ex)|)
321
+ Fig. 3. (a) Magnetic field intensity distribution in the logarithmic scale (log10(|H(r)|2))
322
+ for the hexpole nanocavity based on the previous work [33] with 𝑎 = 435 nm and
323
+ 𝑄th = 2.0×106. (b) Same but for the hexpole mode designed in this study with 𝑎 = 435
324
+ nm, 𝑠1 = 89.5 nm, 𝑅1 = 102 nm, and 𝑄th = 1.4 × 108, exhibiting more tightly confined
325
+ in-plane evanescent fields than in (a). (c), (d) Absolute Fourier-space distributions of
326
+ the 𝑥 components of the electric fields on a logarithmic scale (log10(|F (𝐸𝑥(r))|)) for
327
+ the eigenmodes corresponding to (a) and (b), respectively. (d) has significantly reduced
328
+ radiative components inside the light line that is marked by the black dashed curve.
329
+ In summary, we showed designs of H1 PCNs based on a manual or brute-force search for
330
+ extremely high-𝑄 hexapole modes. By focusing on the case for a constant 𝑅0, we found a series
331
+ of conditions for 𝑄th > 108 with just three major optimization parameters (𝑅1, 𝑠1, 𝑠2), thanks to
332
+ the C6 symmetry of the mode. Introduction of an optical potential modulation with 𝑠2 resulted
333
+ in improved light confinement of the optimized mode in both the in-plane and out-of-plane
334
+ directions. This point will be examined quantitatively in Sec. 4.
335
+ 3.
336
+ Experimental result and numerical analysis
337
+ 3.1.
338
+ Sample fabrication and measurement
339
+ We fabricated Si H1 PCNs of our design for an experimental demonstration. The sample
340
+ structures were patterned by electron beam (EB) lithography on a positive EB resist coated
341
+ on a silicon-on-insulator (SOI) wafer. The mask pattern was projected to the Si film with a
342
+
343
+ 0
344
+ -0.5
345
+ -1
346
+ -1.5
347
+ -2
348
+ -2.5
349
+ -3
350
+ -3.5
351
+ -4
352
+ -4.5
353
+ -50
354
+ -1
355
+ -2
356
+ -3
357
+ -4
358
+ -5
359
+ -6
360
+ -7
361
+ -8190.4305
362
+ 190.4315
363
+ 190.4325
364
+ 0.0
365
+ 0.2
366
+ 0.4
367
+ 0.6
368
+ 0.8
369
+ 1.0
370
+ Normalized power
371
+ Frequency (THz)
372
+ (b)
373
+ (c)
374
+ 1 μm
375
+ Qexp = 1.1×106
376
+ (a)
377
+ 2 μm
378
+ Fig. 4. (a) Laser scope image of a sample with 𝑑 = 5
379
+
380
+ 3𝑎. The input and output Si
381
+ waveguides are broadened and extended to both sides of the sample chip and coupled
382
+ with lensed fibers. (b) Close-up SEM image of H1 PCN with 𝑎 = 434 nm. Typical radii
383
+ of the small and large air holes are estimated as 𝑅1,s ≈ 106.8 nm and 𝑅0,s ≈ 133.1
384
+ nm. (c) Transmission spectrum of sample with 𝑎 = 434 nm and 𝑠1 = 99.5 nm. The
385
+ Lorentzian curve colored red matches the experimental data shown as blue points and
386
+ indicates that the cavity has a loaded 𝑄exp of 1.1 × 106.
387
+ nominal thickness of 250 nm by inductively coupled plasma etching. The buried oxide (BOX)
388
+ layer beneath the PhCs was removed by wet etching with buffered hydrogen fluoride to obtain
389
+ air-bridged samples. After the above device processes were completed, the wafer was cleaved so
390
+ that the size of each sample chip was 5 mm × 15 mm.
391
+ Figure 4(a) is a laser scope image of a PCN sample. The H1 cavity was butt-coupled (loaded)
392
+ with two W1 PhC waveguides, each of which had a width of 𝑊0 =
393
+
394
+ 3𝑎 based on the removal
395
+ of a single row of air holes. The spatial interval 𝑑 between the cavity and them varied with the
396
+ samples, and ones with 𝑑 = 5
397
+
398
+ 3𝑎 exhibited ultrahigh-𝑄 resonances. Each W1 waveguide was
399
+ broadened by 100 nm at either end of the PhC by shifting five pairs of air holes on the sides
400
+ outward with a stepwise increment of 20 nm. Consequently, they were efficiently coupled with
401
+ air-suspended wire waveguides with a width of 𝑊0. These optical channels were extended farther
402
+ and connected to 8 µm-wide slab waveguides that were supported by the BOX layer and led to
403
+ the edges of the chip.
404
+ A close-up scanning electron microscope (SEM) image of an H1 nanocavity is shown as
405
+ Fig. 4(b). Typical radii for the innermost and second innermost hole layers of the resist mask
406
+ were estimated as 𝑅1,m ≈ 102.8 nm and 𝑅0,m ≈ 130.4 nm, respectively, which were close to
407
+ the condition for 𝑄th > 108 found in Fig. 2. However, the radii of the fabricated samples
408
+ became somewhat bigger in the etching process: 𝑅1,s ≈ 106.8 nm and 𝑅0,s ≈ 133.1 nm. We
409
+ prepared PCN chips with five distinct lattice constants, 𝑎 = 418, 422, 426, 430, 434 nm. For
410
+ the evaluations, we focused on the one with 𝑎 = 434 nm, because it best compensated for the
411
+ discrepancies in hole radii between the design and fabrication.
412
+ We performed transmission measurements on each sample chip by placing it on a metallic
413
+ stage whose temperature was maintained at 25◦C by a Peltier element and a PID controller.
414
+ Tapered optical fibers were carefully aligned by using three-axis nano-positioners equipped with
415
+ fiber holder stages, so that they were coupled with the slab waveguides at both ends of the chip
416
+ and hence formed a measurement channel. The typical coupling loss per such interface was about
417
+ 10 dB. A coherent transverse electric (TE) polarized light from a tunable laser was injected into
418
+ each sample. The output was detected by a power meter synchronized with the wavelength sweep
419
+ of the laser. The transverse magnetic (TM) field components of the input and output signals were
420
+ filtered out by fiber polarizers. The entire system was based on polarization-maintaining fibers.
421
+ We prepared and measured a pair of H1 nanocavity samples with nominally the same structure
422
+ for each of 𝑠1; namely the shifts of the innermost holes varied from 89.5 to 101.5 nm in units
423
+
424
+ of 1 nm. All these 26 samples had 𝑠2 = 20.5 nm and 𝑑 = 5
425
+
426
+ 3𝑎. A transmission spectrum of
427
+ an H1 nanocavity with 𝑠1 = 99.5 nm is plotted in Fig. 4(c). The experimental data shown as
428
+ blue points match the Lorentzian curve (colored red) obtained by a least squares fitting. The
429
+ peak frequency (wavelength) was 190.4315 THz (1575.370 nm), and the linewidth of the best-fit
430
+ curve was 173.8 MHz. These values give an experimental loaded 𝑄 factor of 𝑄exp = 1.1 × 106.
431
+ Here, we have excluded any arbitrariness in determining 𝑄exp of the measured resonance with
432
+ discrete data points. The input power was attenuated so that thermal linewidth broadening and
433
+ nonlinearity would be avoided. In this case, however, the detection power around resonance tails
434
+ tended to be slightly reduced, as indicated by its visible drop near 190.4319 THz. This is because
435
+ the power meter had a limited dynamic range with a minimum detectable power of -80 dBm.
436
+ We can certainly identify this resonance to be the hexapole mode, because the other cavity
437
+ modes typically have 𝑄th < 20000 in our simulations and their wavelength spacing with respect
438
+ to the ultrahigh-𝑄 peak is 30 nm or larger.
439
+ 3.2.
440
+ Measured wavelengths and quality factors of H1 PCNs
441
+ Figure 5(a) presents the dependence of the measured resonance wavelengths 𝜆 of the hexapole
442
+ modes on 𝑠1. To show the correspondence between the data of 𝜆 and 𝑄exp, we divided the
443
+ samples into two sets according to their positions, so that each sample in set 1 is closer to the
444
+ front edge of the chip than its counterpart in set 2 with the same 𝑠1. It can be clearly seen that
445
+ 𝜆 is positively correlated with ��1, as predicted in Fig. 2(a) and (c). The variation in 𝜆 within
446
+ pairwise samples for each 𝑠1 is so weak that a linear regression of the entire data, shown by the
447
+ red line, reproduces their average trend. The slope of the regression line is 1.55 ± 0.032 nm (𝜆) /
448
+ nm (𝑠1), and its coefficient of determination is 𝑅2 = 0.990.
449
+ Here we define the difference in resonant wavelength between set 1 and 2 as Δ𝜆(𝑠1) =
450
+ 𝜆1(𝑠1) − 𝜆2(𝑠1), where 𝜆1(𝑠1) and 𝜆2(𝑠1) are the wavelengths of the samples with 𝑠1 in set 1
451
+ and 2, respectively. Δ𝜆 for all 𝑠1 in Fig. 5(a) are calculated, and then their standard deviation is
452
+ found to be 𝜎Δ𝜆 = 0.848 nm. Because 𝜆1(𝑠1) and 𝜆2(𝑠1) ideally have the same value and their
453
+ variations should stem from numerous independent and random processes during fabrication,
454
+ we assume that they have no covariance. Thus, we can estimate the deviation in 𝜆 to be
455
+ 𝜎𝜆 = [𝜎2
456
+ Δ𝜆/2]1/2 = 0.600 nm.
457
+ This result implies that our nanocavities have highly accurate hole positions. Although the
458
+ obtained value of 𝜎𝜆 corresponds to a change solely in 𝑠1 of 0.39 nm, in reality, there are other
459
+ major factors that affect 𝜎𝜆, such as the hole radii, local Si slab thicknesses and surface roughness.
460
+ In addition, the positioning accuracy of the electron beam used in patterning the resist mask is as
461
+ small as 0.05 nm. Thus, undesired variations in hole positions, including those in 𝑠1 and 𝑠2, will
462
+ be less significant in the actual samples.
463
+ The measured loaded 𝑄 factors for the two sample sets are plotted in Fig. 5(b) as a function of
464
+ 𝑠1. They exhibit a gentle peak centered around 𝑠1 = 94.5 or 95.5 nm; 𝑄exp for these values of 𝑠1
465
+ is significantly larger than that for 𝑠1 = 89.5 and 101.5 nm. The best sample here belongs to set
466
+ 2 and has 𝑠1 = 96.5 nm and 𝑄exp = 1.2 × 106 with an estimated linewidth of 160.4 MHz. Its
467
+ transmission spectrum is shown in the inset of Fig. 5(b). Although the shape of the resonance is
468
+ slightly asymmetric, it is still fitted by a Lorentzian function.
469
+ Eight samples out of 26 had 𝑄exp > 106. Remarkably, they included ones with 𝑠1 = 90.5 and
470
+ 99.5 nm, namely off from the peak center. This trend implies that the 𝑄 factors for these PCNs
471
+ are much larger in theory but were reduced because of fabrication imperfections. The effect of
472
+ disorder is also reflected in the outlier sample with a low 𝑄exp = 3.0 × 105 and 𝑠1 = 96.5 nm in
473
+ set 1.
474
+
475
+ 89.5
476
+ 91.5
477
+ 93.5
478
+ 95.5
479
+ 97.5
480
+ 99.5 101.5
481
+ 0.0
482
+ 0.2
483
+ 0.4
484
+ 0.6
485
+ 0.8
486
+ 1.0
487
+ 1.2
488
+ Set 1
489
+ Set 2
490
+ Loaded Q factor (×106)
491
+ s1 (nm)
492
+ 89.5
493
+ 91.5
494
+ 93.5
495
+ 95.5
496
+ 97.5
497
+ 99.5 101.5
498
+ 1.558
499
+ 1.562
500
+ 1.566
501
+ 1.570
502
+ 1.574
503
+ 1.578
504
+ 1.582
505
+ Set 1
506
+ Set 2
507
+ Resonant wavelength (µm)
508
+ s1 (nm)
509
+ 89.5
510
+ 91.5
511
+ 93.5
512
+ 95.5
513
+ 97.5
514
+ 99.5 101.5
515
+ 1.558
516
+ 1.562
517
+ 1.566
518
+ 1.570
519
+ 1.574
520
+ 1.578
521
+ 1.582
522
+ Resonant wavelength (µm)
523
+ s1 (nm)
524
+ 89.5
525
+ 91.5
526
+ 93.5
527
+ 95.5
528
+ 97.5
529
+ 99.5 101.5
530
+ 106
531
+ 107
532
+ 108
533
+ Unloaded
534
+ Loaded
535
+ WG coupling
536
+ Q factor
537
+ s1 (nm)
538
+ (a)
539
+ (b)
540
+ (c)
541
+ (d)
542
+ 191.111 191.112 191.113
543
+ 0.0
544
+ 0.5
545
+ 1.0
546
+ Normalized power
547
+ Frequency (THz)
548
+ Qexp = 1.2×106
549
+ Fig. 5. (a) Dependence of measured 𝜆 on 𝑠1 for two nominally duplicate sets of H1 PCN
550
+ samples with 𝑎 = 434 nm, 𝑠2 = 20.5 nm, and 𝑑 = 5
551
+
552
+ 3𝑎. The grouping of the samples
553
+ into sets is based on their positions relative to the front edge of chip (the samples in set
554
+ 1 are closer to the edge). The red line is a linear regression of the experimental data.
555
+ (b) Loaded 𝑄 factor (𝑄exp) as a function of 𝑠1 for the two sample sets. The inset is the
556
+ transmission spectrum for the best sample that had 𝑄exp = 1.2 × 106 and 𝑠1 = 96.5
557
+ nm. (c) Simulated 𝜆(𝑠1) for 𝑎 = 434 nm, 𝑡 = 241 nm, 𝑅1 = 106 nm, 𝑅0 = 134 nm,
558
+ and 𝑠2 = 20.5 nm, which agrees well with the experimental data. (d) Simulated 𝑄
559
+ factors for the same parameters on a semi-logarithmic scale. Squares show results for
560
+ unloaded samples (𝑄th), while dots are for loaded ones (𝑄th,L) including two W1 PhC
561
+ waveguides with 𝑑 = 5
562
+
563
+ 3𝑎 that radiate out the light. Triangles show the 𝑄 factors
564
+ 𝑄WG due to the losses by the waveguides.
565
+ 3.3.
566
+ Simulation of measured samples
567
+ We performed simulations by varying the structural parameters around those estimated from the
568
+ SEM image. Figure 5(c) shows the theoretical 𝜆 as a function of 𝑠1 for 𝑎 = 434 nm, 𝑡 = 241
569
+ nm, 𝑅1 = 106 nm, 𝑅0 = 134 nm, and 𝑠2 = 20.5 nm. The theoretical values agree well with the
570
+ experimental data. Although the simulation result is slightly convex upward, its average slope
571
+ (1.55 nm (𝜆) / nm (𝑠1)) coincides with that of the experimental result. We emphasize that 𝑅1
572
+ and 𝑅0 here are consistent with the measured 𝑅1,s and 𝑅0,s within an error of a few nanometers,
573
+ as expected for the current measurement. The value of 𝑡 is smaller than the nominal thickness
574
+ 250 nm of the Si film, indicating that the PhC slabs were thinned down by the etching processes
575
+ and/or that 𝑛Si in the simulation is slightly smaller than that of the actual material.
576
+ Moreover, as shown in Fig. 5(d), the corresponding theoretical 𝑄 factors follow the trend seen
577
+
578
+ in the experiment. The figure compares 𝑄th for the H1 PCNs with and without two W1 PhC
579
+ waveguides with 𝑑 = 5
580
+
581
+ 3𝑎 extending to the right and left sides of the simulation domain where
582
+ the fields are scattered out. The plots are on a semi-logarithmic scale, with the horizontal axis
583
+ depicting steps of 1 nm. The loaded 𝑄 factors, 𝑄th,L, are the black dots, and the unloaded ones, 𝑄th,
584
+ are the purple squares. Both plots peak at 𝑠1 = 96.5, where 𝑄th,L = 5.9×106 and 𝑄th = 5.9×107.
585
+ The loaded hexapole mode for this condition has a theoretical modal volume of 𝑉 = 0.74(𝜆/𝑛)3.
586
+ Thus, our best experimental sample is expected to have had 𝑄exp/𝑉 = 1.6 × 106(𝑛/𝜆)3.
587
+ The difference between 𝑄th,L and 𝑄th comes from the coupling with the environment via
588
+ the waveguides. The impact of this coupling, 𝑄WG, can be derived from the relation 1/𝑄th,L =
589
+ 1/𝑄th + 1/𝑄WG. The resultant values are plotted as the triangles in Fig. 5(d). They exhibit a
590
+ moderate variation with 𝑠1 probably due to the group velocity dispersion of the waveguides
591
+ and are about 𝑄WG = 6.6 × 106 around the peak of 𝑄th. As a result, the intrinsic (unloaded) 𝑄
592
+ factor of the optimum sample is estimated to be 𝑄i = [1/𝑄exp − 1/𝑄WG]−1 = 1.5 × 106. The
593
+ correspondent 𝑄/𝑉 amounts to 𝑄i/𝑉 = 2.0 × 106(𝑛/𝜆)3, which is comparable with those of
594
+ PCNs without having their surface Si passivated with hydrogen [28,56,57,68].
595
+ 3.4.
596
+ Impact of varying hole radii
597
+ We can see that 𝑄exp is still lower than 𝑄th,L and hence it is expected to be affected by reductive
598
+ factors other than 𝑄WG. A simple but realistic cause of extra loss is radiative scattering induced
599
+ by random variations in the radii and positions of the air holes [55, 69]. The hole radii can
600
+ change on the atomic scale order because of stochastic processes in fabrication, such as in the
601
+ EB exposure, resist development, and dry and wet etching. On the other hand, the EB shots are
602
+ precisely aligned in our lithography process. Thus, the positions of the hole centers are mainly
603
+ affected by the small and probabilistic anisotropy of etching or distortion in the shapes of the
604
+ holes, part of which is also considered to impact the radii.
605
+ Here, we simulated samples with air holes just of varying radii to statistically evaluate the
606
+ effect of fabrication imperfections on the 𝑄 factor. The result estimates a dominant portion of the
607
+ disorder-induced scatting loss denoted as 1/𝑄scat. We used the parameters that reproduce 𝜆 of
608
+ the measured samples and set 𝑠1 = 96.5 nm for 𝑄th = 5.9 × 107 without structural imperfections
609
+ or PhC waveguides. The PEC boundary condition of the 𝑦-𝑧 plane was removed so that the
610
+ simulation explicitly included all the holes. The small and large holes were assumed to have
611
+ random radii sampled from Gaussian distributions with means 𝑅1 and 𝑅0, respectively, and a
612
+ common standard deviation (SD) of 𝜎𝑟. The 𝑄 factor obtained in each run is denoted as 𝑄th,F
613
+ and satisfies 1/𝑄th,F = 1/𝑄th + 1/𝑄scat.
614
+ Figure 6(a) and (b) show 𝜆 and 𝑄th,F for 100 random patterns with 𝜎𝑟 = 1.0 nm. The data
615
+ points of both plots look randomly scattered. The mean and SD of the resonant wavelengths are
616
+ (𝜇𝜆, 𝜎𝜆) = (1.57084 µm, 1.052 nm) and those of the 𝑄 factors are (𝜇𝑄, 𝜎𝑄) = (2.3 × 106, 1.07 ×
617
+ 106). The wavelengths tend to be distributed symmetrically around 𝜇𝜆, while the 𝑄 factors are
618
+ specifically high for some sample points, indicating distinct statistical properties.
619
+ We repeated the random simulations for different 𝜎𝑟. The dependence of (𝜇𝜆, 𝜎𝜆) on 𝜎𝑟 and
620
+ that of (𝜇𝑄, 𝜎𝑄) are plotted in Fig. 6(c) and (d), respectively. The mean wavelength for each
621
+ 𝜎𝑟 is mostly convergent at 𝜆 = 1.5710 µm, which is obtained for the case of no disorder. The
622
+ deviation in 𝜆 grows proportionally with 𝜎𝑟. The variance of the radii 𝜎2
623
+ 𝑟 is directly related to
624
+ that of the effective dielectric constant of the PhC slab via the filling fraction of the air holes.
625
+ Thus, 𝜎𝑟 affects the deviation of the effective index and has an approximately linear dependence
626
+ on 𝜎𝜆. Its slope is estimated as 𝜎𝜆/𝜎𝑟 = 1.11.
627
+ In contrast, both 𝜇𝑄 and 𝜎𝑄 tend to be inversely proportional to 𝜎2
628
+ 𝑟 . As discussed in Ref. [70],
629
+ local variations in the dielectric constant affect the extra scattering rate and hence the loss. By
630
+
631
+ 20
632
+ 40
633
+ 60
634
+ 80
635
+ 100
636
+ 1
637
+ 0
638
+ 2
639
+ 4
640
+ 6
641
+ 8
642
+ 10
643
+ Q factor (×106)
644
+ Fluctuation pattern index
645
+ 20
646
+ 40
647
+ 60
648
+ 80
649
+ 100
650
+ 1
651
+ 1.568
652
+ 1.569
653
+ 1.570
654
+ 1.571
655
+ 1.572
656
+ 1.573
657
+ 1.574
658
+ Wavelength (µm)
659
+ Fluctuation pattern index
660
+ 0.0
661
+ 0.5
662
+ 1.0
663
+ 1.5
664
+ 2.0
665
+ 0
666
+ 2
667
+ 4
668
+ 6
669
+ Mean Q factor µQ (×106)
670
+ Deviation of radii σr (nm)
671
+ 0
672
+ 1
673
+ 2
674
+ 3
675
+ Deviation of Q factor σQ (×106)
676
+ 0.0
677
+ 0.5
678
+ 1.0
679
+ 1.5
680
+ 2.0
681
+ 1.568
682
+ 1.569
683
+ 1.570
684
+ 1.571
685
+ 1.572
686
+ 1.573
687
+ 1.574
688
+ Mean wavelength µλ(µm)
689
+ Deviation of radii σr (nm)
690
+ 0.0
691
+ 0.5
692
+ 1.0
693
+ 1.5
694
+ 2.0
695
+ 2.5
696
+ Deviation of wavelength σλ (nm)
697
+ (a)
698
+ (b)
699
+ (c)
700
+ (d)
701
+ Fig. 6. (a) Simulated resonant wavelengths and (b) unloaded 𝑄 factors of H1 PCNs with
702
+ 100 different random patterns of hole radii for 𝜎𝑟 = 1.0 nm. (c) Mean and standard
703
+ deviation of the resonant wavelength (𝜇𝜆, 𝜎𝜆) and (d) those of the 𝑄 factor (𝜇𝑄, 𝜎𝑄)
704
+ of the random simulation for different 𝜎𝑟. 𝜇𝜆(𝜎𝑟) converges at the result without
705
+ any disorder shown as the black line, while 𝜎𝜆(𝜎𝑟) grows linearly, as indicated by
706
+ the regression line in red. Both 𝜇𝑄 and 𝜎𝑄 are inversely proportional to 𝜎2𝑟 . The
707
+ approximate statistical properties of the scattering loss are given by Eqs. (2) and (3).
708
+ The mean 𝑅0 and 𝑅1 are 134 nm and 106 nm, respectively. The other parameters are
709
+ the same as those used for Fig. 5.
710
+ subtracting 1/𝑄th from 1/𝑄th,F of the data, the approximate mean and SD of 1/𝑄scat are given by
711
+ 𝜇[1/𝑄scat] = 6.3 × 10−7𝜎2
712
+ 𝑟 ,
713
+ (2)
714
+ 𝜎[1/𝑄scat] = 3.3 × 10−7𝜎2
715
+ 𝑟 ,
716
+ (3)
717
+ where 𝜎𝑟 is measured in nanometers.
718
+ Similar properties have been reported in multi-
719
+ heterostructure nanocavities with variations in the positions and radii of the air holes [55,69].
720
+ As mentioned in the discussion of Fig. 5(a), the experimental data suggest 𝜎𝜆 = 0.600 nm.
721
+ This value corresponds to 𝜎𝑟 = 0.54 nm via the proportional relation between 𝜎𝜆 and 𝜎𝑟. By
722
+ substituting the value of 𝜎𝑟 into Eqs. (2) and (3), we obtain 𝜇[1/𝑄scat] = 1.8 × 10−7 and
723
+ 𝜎[1/𝑄scat] = 9.6 × 10−8, as the estimated statistical properties of the scattering loss for the
724
+ measured samples. The resultant mean 𝑄scat is 5.4 × 106. We should emphasize that we did not
725
+ underestimate 𝑄scat by neglecting inaccuracies in the hole positions. The variation in wavelength
726
+ in the experiment is attributed solely to 𝜎𝑟, and its entire impact is hence taken into consideration
727
+ in obtaining 𝑄scat.
728
+ Because the mean 𝑄exp is 𝜇[𝑄exp] ≈ 106 around the optimal condition, this result indicates the
729
+ existence of further loss in the experiment with an average 𝑄 factor of (𝜇[1/𝑄exp] − 𝜇[1/𝑄scat] −
730
+
731
+ 12
732
+ 14
733
+ 16
734
+ 18
735
+ 20
736
+ 22
737
+ 24
738
+ 26
739
+ 28
740
+ 0
741
+ 1
742
+ 2
743
+ 3
744
+ 4
745
+ 5
746
+ Qth (×108)
747
+ s2 (nm)
748
+ 12
749
+ 14
750
+ 16
751
+ 18
752
+ 20
753
+ 22
754
+ 24
755
+ 26
756
+ 28
757
+ 1.50
758
+ 1.52
759
+ 1.54
760
+ 1.56
761
+ 1.58
762
+ 1.60
763
+ 1.62
764
+ Resonant wavelength (µm)
765
+ s2 (nm)
766
+ log10(|(Ex)|)
767
+ 0
768
+ kx (units of π/a)
769
+ 0
770
+ -4
771
+ 4
772
+ 4
773
+ -4
774
+ ky (units of π/a)
775
+ 88
776
+ 90
777
+ 92
778
+ 94
779
+ 96
780
+ 98
781
+ 94.6
782
+ 96.8
783
+ 99.0
784
+ 101.2
785
+ 103.4
786
+ 105.6
787
+ 125.0
788
+ 127.5
789
+ 130.0
790
+ 132.5
791
+ 135.0
792
+ R 1 (nm)
793
+ R0 (nm)
794
+ s1 (nm)
795
+ Start
796
+ Qth = 9.2×10
797
+ 6
798
+ Optimum
799
+ Qth = 3.1×10
800
+ 8
801
+ Qth = 1.3×10
802
+ 8
803
+ Qth = 2.1×10
804
+ 8
805
+ (a)
806
+ (b)
807
+ (c)
808
+ (d)
809
+ Fig. 7. (a) Evolution of (𝑅0, 𝑅1, 𝑠1) in the Nelder-Mead optimization of 𝑄th for
810
+ 𝑠2 = 23 nm. Blue arrows indicate the direction of the parameter variation. (b)
811
+ log10(|F (𝐸𝑥(r))|) for the optimized hexapole mode for 𝑠2 = 23 nm. The radiative
812
+ component lying inside the LC is reduced, compared with Fig. 3. The black dashed
813
+ circle denotes the light line. (c) 𝜆 and (d) 𝑄th of the optimized H1 PCNs for different
814
+ 𝑠2. Both of them tend to be positively correlated with 𝑠2. We obtained 𝑄th = 4.5 × 108
815
+ for the optimized variables (𝑅0, 𝑅1, 𝑠1) ≈ (115.92 nm, 90.258 nm, 85.773 nm) for
816
+ 𝑠2 = 26 nm. Other fixed parameters are 𝑎 = 426 nm and 𝑡 = 250 nm.
817
+ 1/𝑄WG)−1 ≈ 1.5 × 106. We attribute part of this loss to a slight amount of EB resist remaining
818
+ on the sample. Considering that the laser scope comes into focus twice in scanning the surface,
819
+ it is expected to form a very thin layer over the chip. This results in structural asymmetry in
820
+ the out-of-plane direction and hence induces extra radiation loss, as is the case with samples
821
+ fabricated on sacrificial layers. Its unevenness, which can be seen at the top right of Fig. 4(b) for
822
+ example, could also be a source of scattering. We did not try to remove the resist layer from the
823
+ chip, because such a process unavoidably thins down the Si layer and thus alters the dependence
824
+ of the resonance properties on 𝑠1. The sample quality will be improved in future studies.
825
+ 4.
826
+ Automated optimization
827
+ Recent studies have used various automated optimization algorithms to achieve high theoretical
828
+ 𝑄 factors in PCNs [54, 56, 62–65]. We used the built-in optimization module of COMSOL
829
+ Multiphysics and found that the performance of the H1 PCN can further be improved. Here, we
830
+ chose the Nelder-Mead method [71], which prepares a symplex in a parameter space and repeats
831
+
832
+ 0
833
+ -0.5
834
+ -1
835
+ -1.5
836
+ -2
837
+ -2.5
838
+ -3
839
+ -3.5
840
+ -4
841
+ -4.5
842
+ -5its update based on the reflection, expansion, contraction, or shrink process, depending on the
843
+ value of the function 𝐹 to be optimized. This scheme does not use any gradient or assume any
844
+ approximate form of the function. Thus, it is expected to work regardless of the actual landscape
845
+ of 𝐹. We fixed 𝑠2 and obtain a maximal 𝑄th by varying 𝑅0, 𝑅1 and 𝑠1 in each optimization run,
846
+ namely 𝐹 = 𝑄th(𝑅0, 𝑅1, 𝑠1).
847
+ Figure 7(a) shows the evolution of the parameters in the optimization for 𝑠2 = 23 nm, 𝑎 = 426
848
+ nm, and 𝑡 = 250 nm. Here, the initial point was set as (𝑅0, 𝑅1, 𝑠1) = (128.3 nm, 99.5 nm, 89.4 nm)
849
+ with 𝑄th = 9.2 × 106. The variables undergo substantial changes at steps in the early stage
850
+ of the operation. The state passes through a condition for 𝑄th > 108 and is then bound in a
851
+ region of suboptimal points with 𝑄th < 2 × 108. After a while, however, the algorithm finds
852
+ a direction in which 𝑄th is improved beyond 2 × 108. It eventually settles at (𝑅0, 𝑅1, 𝑠1) ≈
853
+ (125.18 nm, 97.421 nm, 89.024 nm) exhibiting the optimum objective, 𝑄th = 3.1 × 108. The
854
+ normalized absolute Fourier amplitudes of 𝐸𝑥 for this optimal mode are depicted on a logarithmic
855
+ scale in Fig. 7(b). Compared with Fig. 3(d), the domain with the relative amplitudes below 10−5
856
+ in the LC is doubly extended in the 𝑘𝑥 direction. This feature confirms that the light confinement
857
+ of this H1 PCN is stronger than that of the manually designed ones shown in Sec. 2.
858
+ We repeated the optimization routine with different values of 𝑠2, which is the additional
859
+ factor not in the former design examined in Fig. 3(a) and (c). To understand quantitatively
860
+ the impact of 𝑠2, we plot the dependences of 𝜆 and 𝑄th of the optimized PCN in Fig. 7(c)
861
+ and (d). The resonant wavelength is monotonically red-shifted as 𝑠2 increases. Accordingly,
862
+ a larger 𝑠2 results in a higher optimal 𝑄 factor. We find that 𝑄th = 4.5 × 108 for 𝑠2 = 26 nm,
863
+ which is more than a hundred-times the values in the previous reports [33, 54]. Remarkably,
864
+ the optimized mode also has a small volume of 𝑉opt = 0.71(𝜆/𝑛)3, and thus its 𝑄/𝑉 is as large
865
+ as 𝑄th/𝑉opt = 6.3 × 108(𝑛/𝜆)3. This result confirms the striking contribution of the gradual
866
+ variation in the optical potential introduced by 𝑠2 to 𝑄th, as mentioned in Sec. 2.
867
+ The optimal structural parameters vary greatly with 𝑠2.
868
+ We obtained (𝑅0, 𝑅1, 𝑠1) ≈
869
+ (144.23 nm, 111.61 nm, 86.020 nm) and (115.92 nm, 90.258 nm, 85.773 nm) for 𝑠2 = 13
870
+ nm and 26 nm, respectively. 𝑅0 and 𝑅1 tend to be negatively correlated with 𝑠2 and 𝜆, while 𝑠1
871
+ oscillates gently between 82 nm and 92 nm with respect to 𝑠2. Optimization with more parameters
872
+ such as (𝑅0, 𝑅1, 𝑠1, 𝑠2, 𝑎) might result in a better 𝑄th. In that case, however, the parameter space
873
+ would become larger and contain more local minima of 𝑄th. Thus, the computation would be
874
+ much harder in terms of both its convergence and the probability of finding a good solution. We
875
+ leave that consideration out of the scope of this study.
876
+ 5.
877
+ Discussion
878
+ Experimental 𝑄 factors of PCNs are generally limited by many kinds of defects. Discussing their
879
+ impact will allow us to predict how high 𝑄exp could be made in a real PCN device.
880
+ A major cause of the reduction of 𝑄 factors is structural imperfections. In our result, the
881
+ variations in 𝜆 and 1/𝑄th,F were attributed to those in the hole radii, and 𝜎𝑟 = 0.54 nm and
882
+ 𝜇[1/𝑄scat] = 1.8 × 10−7 were obtained. A groundbreaking report by Asano et al. on multi-
883
+ heterostructure PCNs [72], including one with 𝑄exp = 1.1 × 107, considered the same deviation
884
+ 𝜎hole in both the positions and radii of the air holes. They estimated 𝜎hole to be 0.25 nm and the
885
+ corresponding 𝜇[1/𝑄scat] to be 4.7 × 10−8 for their PCN samples. A monolayer of Si is about
886
+ 0.135-nm-thick and an air hole has two side walls in the radial direction. Thus, 𝜎hole = 0.25 nm
887
+ seems to indicate that the etching process just leaves the uncertainty at the level where a single
888
+ atomic layer is removed or not at every Si surface, including the resultant hole displacement.
889
+ Both Eq. (2) and the dependence of 𝜇[1/𝑄scat] on 𝜎hole in Ref. [72] are quadratic equations
890
+ and have similar coefficients. Even though 𝜎𝑟 and 𝜎hole of the two PCNs can be reduced to the
891
+ monolayer level (= 0.135 nm), a dimensionless loss of about 𝜇[1/𝑄scat] ≈ 10−8 remains. This
892
+ implies that it is hard to achieve 𝜇[𝑄scat] > 108 for PCNs.
893
+
894
+ Another limiting factor is the formation of surface oxidation layers on Si. Every Si/SiO𝑥
895
+ interface has a few kinds of surface states whose spectral densities of states are within the band
896
+ gap of Si [73]. They exhibit optical absorption at telecommunication wavelengths (≈ 0.8 eV) and
897
+ are known to significantly increase loss in Si photonic devices [74]. This detrimental effect can
898
+ be circumvented by passivating Si surfaces with hydrogen via HF etching [75,76]. However, the
899
+ Si-H termination is not stable and the surfaces hence suffer from natural oxidation in ambient
900
+ conditions. Thus, a combination of this process and subsequent measurement of the samples
901
+ in an inert gas-purged chamber seems to be needed in order to achieve 𝑄exp > 107 [72]. For
902
+ heterostructure PCNs with oxide layers [77], the inverse of the 𝑄 factor based on absorption
903
+ (1/𝑄abs) was estimated to be about 1/(7 × 106) = 1.43 × 10−7, and a large part of it seemed
904
+ to stem from the surface states. Although water molecules that adhere to sample surfaces also
905
+ induce absorption loss, their impact appears to be an order of magnitude smaller. Repeating the
906
+ formation and removal of SiO𝑥 layers can also reduce the surface roughness and hence suppress
907
+ extra scattering loss [78,79]. Performing such a process on the bottom surface of Si may also be
908
+ helpful in removing dopant contamination that could concentrate around the interface between
909
+ the Si and BOX layers [72,80].
910
+ Overall, the 𝑄exp achievable for practical PCNs in air seems to be limited to below 107; with
911
+ the hydrogen passivation 𝑄exp may reach on the order of 107. Because PCNs can have such a
912
+ high 𝑄/𝑉 coefficient, we should mention that they would also be subject to fluctuations in the
913
+ refractive index caused by thermal noise, which induce their linewidth broadening [81]. Although
914
+ PCNs are not so affected by ambient temperature, thermal noise may become a problem when
915
+ they absorb the injected light. Our experiment showed a symptom of the linewidth broadening,
916
+ when the measured transmission power exceeded 1 nW. This feature is attributed to heat, since it
917
+ appears as a precursor of bistable transmission based on thermo-optic nonlinearity. A similar
918
+ result was seen in a previous report [34]. PCNs with larger 𝑄exp than ours might need a smaller
919
+ probe power to avoid it. In that case, a time-resolved ("ring-down") measurement with a pulsed
920
+ excitation might be useful [82].
921
+ 6.
922
+ Conclusion
923
+ The theoretical and experimental 𝑄 factors of our hexapole H1 PCNs were 𝑄th > 108 and
924
+ 𝑄exp > 106. Thanks to the 𝐶6 symmetry of the hexapole mode, our design required optimization
925
+ of only four structural modulation parameters. Bands of valid conditions for 𝑄th ⪆ 108 were
926
+ found in both the (𝑠1, 𝑅1) and (𝑠1, 𝑠2) parameter spaces. The field distributions of such modes
927
+ indicated stronger light confinement in both the in-plane and out-of-plane directions compared
928
+ with the previous design that did not use 𝑠2. In the experimental demonstration, the Si H1 PCN
929
+ samples exhibited a systematic change in their resonant wavelengths when varying the radial shift
930
+ of the innermost holes 𝑠1 in steps of 1 nm. Their maximum loaded 𝑄 factor was 𝑄exp = 1.2 × 106,
931
+ and the corresponding cavity’s intrinsic 𝑄 factor was 𝑄i = 1.5 × 106. Repeating an automated
932
+ optimization with (𝑅0, 𝑅1, 𝑠1) for different values of the radial shift of the second innermost
933
+ holes 𝑠2 resulted in 𝑄th = 4.5 × 108, a more than a hundred-fold improvement compared with
934
+ the previous studies. We also discussed some of the major elements that degrade 𝑄exp in reality
935
+ and estimated the order of practically obtainable 𝑄exp. Our work spotlights the power of modal
936
+ symmetry for improving the performance of nanocavities. It also shows the potential of the H1
937
+ PCN in various applications such as functional photonic devices, quantum information processing,
938
+ and large-scale one- and two-dimensional resonator lattices for studying non-Hermitian and
939
+ topological photonics and other emergent topics.
940
+ Funding.
941
+ JSPS KAKENHI Grant Number JP20H05641.
942
+ Acknowledgements.
943
+ We thank Toshiaki Tamamura, Junichi Asaoka, Osamu Moriwaki, Toshifumi
944
+ Watanabe and Mizuki Ikeya for support with the sample fabrication. We are also grateful to Hideaki
945
+ Taniyama for support with the complemental FDTD simulation and Shota Kita for fruitful discussion.
946
+
947
+ Disclosures.
948
+ The authors declare no conflicts of interest.
949
+ Data availability.
950
+ Data underlying the results presented in this paper are not publicly available at this
951
+ time but may be obtained from the authors upon reasonable request.
952
+ References
953
+ 1.
954
+ J. D. Joannopoulos, S. G. Johnson, J. N. Winn, and R. D. Meade, Photonic Crystals: Molding the Flow of Light
955
+ (Princeton University Press, Princeton, 2008), 2nd ed.
956
+ 2.
957
+ O. Painter, R. K. Lee, A. Scherer, A. Yariv, J. D. O’Brien, P. D. Dapkus, and I. Kim, “Two-dimensional photonic
958
+ band-gap defect mode laser,” Science 284, 1819–1821 (1999).
959
+ 3.
960
+ K. Srinivasan and O. Painter, “Momentum space design of high-Q photonic crystal optical cavities,” Opt. Express 10,
961
+ 670–684 (2002).
962
+ 4.
963
+ Y. Akahane, T. Asano, B.-S. Song, and S. Noda, “High-Q photonic nanocavity in a two-dimensional photonic crystal,”
964
+ Nature 425, 944–947 (2003).
965
+ 5.
966
+ M. Notomi, A. Shinya, S. Mitsugi, E. Kuramochi, and H.-Y. Ryu, “Waveguides, resonators and their coupled elements
967
+ in photonic crystal slabs,” Opt. Express 12, 1551–1561 (2004).
968
+ 6.
969
+ T. Yoshie, A. Scherer, J. Hendrickson, G. Khitrova, H. M. Gibbs, G. Rupper, C. Ell, O. B. Shchekin, and D. G. Deppe,
970
+ “Vacuum Rabi splitting with a single quantum dot in a photonic crystal nanocavity,” Nature 432, 200–203 (2004).
971
+ 7.
972
+ B.-S. Song, S. Noda, T. Asano, and Y. Akahane, “Ultra-high-Q photonic double-heterostructure nanocavity,” Nat.
973
+ Mater. 4, 207–210 (2005).
974
+ 8.
975
+ D. Englund, I. Fushman, and J. Vuckovic, “General recipe for designing photonic crystal cavities,” Opt. Express 13,
976
+ 5961–5975 (2005).
977
+ 9.
978
+ E. Kuramochi, M. Notomi, S. Mitsugi, A. Shinya, T. Tanabe, and T. Watanabe, “Ultrahigh-Q photonic crystal
979
+ nanocavities realized by the local width modulation of a line defect,” Appl. Phys. Lett. 88, 041112 (2006).
980
+ 10. Y. Takahashi, H. Hagino, Y. Tanaka, B.-S. Song, T. Asano, and S. Noda, “High-Q nanocavity with a 2-ns photon
981
+ lifetime,” Opt. Express 15, 17206–17213 (2007).
982
+ 11. E. Kuramochi, H. Taniyama, T. Tanabe, A. Shinya, and M. Notomi, “Ultrahigh-Q two-dimensional photonic crystal
983
+ slab nanocavities in very thin barriers,” Appl. Phys. Lett. 93, 111112 (2008).
984
+ 12. M. Notomi, E. Kuramochi, and H. Taniyama, “Ultrahigh-Q nanocavity with 1D photonic gap,” Opt. Express 16,
985
+ 11095–11102 (2008).
986
+ 13. S. Matsuo, A. Shinya, T. Kakitsuka, K. Nozaki, T. Segawa, T. Sato, Y. Kawaguchi, and M. Notomi, “High-speed
987
+ ultracompact buried heterostructure photonic-crystal laser with 13 fJ of energy consumed per bit transmitted,” Nat.
988
+ Photonics 4, 648–654 (2010).
989
+ 14. K. Takeda, T. Sato, A. Shinya, K. Nozaki, W. Kobayashi, H. Taniyama, M. Notomi, K. Hasebe, T. Kakitsuka,
990
+ and S. Matsuo, “Few-fJ/bit data transmissions using directly modulated lambda-scale embedded active region
991
+ photonic-crystal lasers,” Nat. Photonics 7, 569–575 (2013).
992
+ 15. A. Shakoor, K. Nozaki, E. Kuramochi, K. Nishiguchi, A. Shinya, and M. Notomi, “Compact 1D-silicon photonic
993
+ crystal electro-optic modulator operating with ultra-low switching voltage and energy,” Opt. Express 22, 28623–28634
994
+ (2014).
995
+ 16. M. Notomi, A. Shinya, S. Mitsugi, G. Kira, E. Kuramochi, and T. Tanabe, “Optical bistable switching action of si
996
+ high-Q photonic-crystal nanocavities,” Opt. Express 13, 2678–2687 (2005).
997
+ 17. N. Matsuda, T. Kato, K. ichi Harada, H. Takesue, E. Kuramochi, H. Taniyama, and M. Notomi, “Slow light enhanced
998
+ optical nonlinearity in a silicon photonic crystal coupled-resonator optical waveguide,” Opt. Express 19, 19861–19874
999
+ (2011).
1000
+ 18. Y. Takahashi, Y. Inui, M. Chihara, T. Asano, R. Terawaki, and S. Noda, “A micrometre-scale Raman silicon laser
1001
+ with a microwatt threshold,” Nature 498, 470–474 (2013).
1002
+ 19. D. Englund, D. Fattal, E. Waks, G. Solomon, B. Zhang, T. Nakaoka, Y. Arakawa, Y. Yamamoto, and J. Vučković,
1003
+ “Controlling the spontaneous emission rate of single quantum dots in a two-dimensional photonic crystal,” Phys. Rev.
1004
+ Lett. 95, 013904 (2005).
1005
+ 20. M. Nomura, N. Kumagai, S. Iwamoto, Y. Ota, and Y. Arakawa, “Laser oscillation in a strongly coupled single-
1006
+ quantum-dot–nanocavity system,” Nat. Phys. 6, 279–283 (2010).
1007
+ 21. F. Liu, A. J. Brash, J. O’Hara, L. M. P. P. Martins, C. L. Phillips, R. J. Coles, B. Royall, E. Clarke, C. Bentham,
1008
+ N. Prtljaga, I. E. Itskevich, L. R. Wilson, M. S. Skolnick, and A. M. Fox, “High Purcell factor generation of
1009
+ indistinguishable on-chip single photons,” Nat. Nanotechnol. 13, 835–840 (2018).
1010
+ 22. A. Yariv, Y. Xu, R. K. Lee, and A. Scherer, “Coupled-resonator optical waveguide: a proposal and analysis,” Opt.
1011
+ Lett. 24, 711–713 (1999).
1012
+ 23. M. Notomi, E. Kuramochi, and T. Tanabe, “Large-scale arrays of ultrahigh-Q coupled nanocavities,” Nat. Photonics
1013
+ 2, 741–747 (2008).
1014
+ 24. E. Kuramochi, N. Matsuda, K. Nozaki, A. H. K. Park, H. Takesue, and M. Notomi, “Wideband slow short-pulse
1015
+ propagation in one-thousand slantingly coupled L3 photonic crystal nanocavities,” Opt. Express 26, 9552–9564
1016
+ (2018).
1017
+ 25. T. Tanabe, M. Notomi, S. Mitsugi, A. Shinya, and E. Kuramochi, “All-optical switches on a silicon chip realized
1018
+ using photonic crystal nanocavities,” Appl. Phys. Lett. 87, 151112 (2005).
1019
+
1020
+ 26. K. Nozaki, T. Tanabe, A. Shinya, S. Matsuo, T. Sato, H. Taniyama, and M. Notomi, “Sub-femtojoule all-optical
1021
+ switching using a photonic-crystal nanocavity,” Nat. Photonics 4, 477–483 (2010).
1022
+ 27. K. Nozaki, A. Shinya, S. Matsuo, T. Sato, E. Kuramochi, and M. Notomi, “Ultralow-energy and high-contrast
1023
+ all-optical switch involving Fano resonance based on coupled photonic crystal nanocavities,” Opt. Express 21,
1024
+ 11877–11888 (2013).
1025
+ 28. T. Tanabe, M. Notomi, E. Kuramochi, A. Shinya, and H. Taniyama, “Trapping and delaying photons for one
1026
+ nanosecond in an ultrasmall high-Q photonic-crystal nanocavity,” Nat. Photonics 1, 49–52 (2006).
1027
+ 29. K. Nozaki, A. Shinya, S. Matsuo, Y. Suzaki, T. Segawa, T. Sato, Y. Kawaguchi, R. Takahashi, and M. Notomi,
1028
+ “Ultralow-power all-optical RAM based on nanocavities,” Nat. Photonics 6, 248–252 (2012).
1029
+ 30. E. Kuramochi, K. Nozaki, A. Shinya, K. Takeda, T. Sato, S. Matsuo, H. Taniyama, H. Sumikura, and M. Notomi,
1030
+ “Large-scale integration of wavelength-addressable all-optical memories on a photonic crystal chip,” Nat. Photonics
1031
+ 8, 474–481 (2014).
1032
+ 31. K. Nozaki, S. Matsuo, T. Fujii, K. Takeda, A. Shinya, E. Kuramochi, and M. Notomi, “Femtofarad optoelectronic
1033
+ integration demonstrating energy-saving signal conversion and nonlinear functions,” Nat. Photonics 13, 454–459
1034
+ (2019).
1035
+ 32. H.-Y. Ryu, M. Notomi, and Y.-H. Lee, “High-quality-factor and small-mode-volume hexapole modes in photonic-
1036
+ crystal-slab nanocavities,” Appl. Phys. Lett. 83, 4294–4296 (2003).
1037
+ 33. G.-H. Kim, Y.-H. Lee, A. Shinya, and M. Notomi, “Coupling of small, low-loss hexapole mode with photonic crystal
1038
+ slab waveguide mode,” Opt. Express 12, 6624–6631 (2004).
1039
+ 34. T. Tanabe, A. Shinya, E. Kuramochi, S. Kondo, H. Taniyama, and M. Notomi, “Single point defect photonic crystal
1040
+ nanocavity with ultrahigh quality factor achieved by using hexapole mode,” Appl. Phys. Lett. 91, 021110 (2007).
1041
+ 35. H. Takagi, Y. Ota, N. Kumagai, S. Ishida, S. Iwamoto, and Y. Arakawa, “High-Q H1 photonic crystal nanocavities
1042
+ with efficient vertical emission,” Opt. Express 20, 28292–28300 (2012).
1043
+ 36. K. Sakoda, Optical Properties of Photonic Crystals, Springer Series in Optical Sciences (Springer-Verlag, Berlin,
1044
+ Heidelberg, 2005), 2nd ed.
1045
+ 37. H. Altug and J. Vučković, “Two-dimensional coupled photonic crystal resonator arrays,” Appl. Phys. Lett. 84,
1046
+ 161–163 (2004).
1047
+ 38. K. Takata and M. Notomi, “PT-symmetric coupled-resonator waveguide based on buried heterostructure nanocavities,”
1048
+ Phys. Rev. Appl. 7, 054023 (2017).
1049
+ 39. K. Takata and M. Notomi, “Photonic topological insulating phase induced solely by gain and loss,” Phys. Rev. Lett.
1050
+ 121, 213902 (2018).
1051
+ 40. C. Han, M. Lee, S. Callard, C. Seassal, and H. Jeon, “Lasing at topological edge states in a photonic crystal L3
1052
+ nanocavity dimer array,” Light. Sci. Appl. 8, 40 (2019).
1053
+ 41. R. Duggan, S. A. Mann, and A. Alù, “Nonreciprocal photonic topological order driven by uniform optical pumping,”
1054
+ Phys. Rev. B 102, 100303 (2020).
1055
+ 42. K. Takata, K. Nozaki, E. Kuramochi, S. Matsuo, K. Takeda, T. Fujii, S. Kita, A. Shinya, and M. Notomi, “Observing
1056
+ exceptional point degeneracy of radiation with electrically pumped photonic crystal coupled-nanocavity lasers,”
1057
+ Optica 8, 184–192 (2021).
1058
+ 43. C. F. Fong, Y. Ota, Y. Arakawa, S. Iwamoto, and Y. K. Kato, “Chiral modes near exceptional points in symmetry
1059
+ broken H1 photonic crystal cavities,” Phys. Rev. Res. 3, 043096 (2021).
1060
+ 44. K. Takata, N. Roberts, A. Shinya, and M. Notomi, “Imaginary couplings in non-Hermitian coupled-mode theory:
1061
+ Effects on exceptional points of optical resonators,” Phys. Rev. A 105, 013523 (2022).
1062
+ 45. F. Hentinger, M. Hedir, B. Garbin, M. Marconi, L. Ge, F. Raineri, J. A. Levenson, and A. M. Yacomotti, “Direct
1063
+ observation of zero modes in a non-Hermitian optical nanocavity array,” Photon. Res. 10, 574–586 (2022).
1064
+ 46. Ş. K. Özdemir, S. Rotter, F. Nori, and L. Yang, “Parity–time symmetry and exceptional points in photonics,” Nat.
1065
+ Mater. 18, 783–798 (2019).
1066
+ 47. Y. Ota, K. Takata, T. Ozawa, A. Amo, Z. Jia, B. Kante, M. Notomi, Y. Arakawa, and S. Iwamoto, “Active topological
1067
+ photonics,” Nanophotonics 9, 547–567 (2020).
1068
+ 48. A. Szameit, M. C. Rechtsman, O. Bahat-Treidel, and M. Segev, “PT-symmetry in honeycomb photonic lattices,”
1069
+ Phys. Rev. A 84, 021806 (2011).
1070
+ 49. M. Kremer, T. Biesenthal, L. J. Maczewsky, M. Heinrich, R. Thomale, and A. Szameit, “Demonstration of a
1071
+ two-dimensional PT-symmetric crystal,” Nat. Commun. 10, 435 (2019).
1072
+ 50. L.-H. Wu and X. Hu, “Scheme for achieving a topological photonic crystal by using dielectric material,” Phys. Rev.
1073
+ Lett. 114, 223901 (2015).
1074
+ 51. J. Noh, W. A. Benalcazar, S. Huang, M. J. Collins, K. P. Chen, T. L. Hughes, and M. C. Rechtsman, “Topological
1075
+ protection of photonic mid-gap defect modes,” Nat. Photonics 12, 408–415 (2018).
1076
+ 52. M. Li, D. Zhirihin, M. Gorlach, X. Ni, D. Filonov, A. Slobozhanyuk, A. Alù, and A. B. Khanikaev, “Higher-order
1077
+ topological states in photonic kagome crystals with long-range interactions,” Nat. Photonics 14, 89–94 (2020).
1078
+ 53. A. B. Khanikaev and G. Shvets, “Two-dimensional topological photonics,” Nat. Photonics 11, 763–773 (2017).
1079
+ 54. M. Minkov and V. Savona, “Automated optimization of photonic crystal slab cavities,” Sci. Rep. 4, 5124 (2014).
1080
+ 55. Y. Taguchi, Y. Takahashi, Y. Sato, T. Asano, and S. Noda, “Statistical studies of photonic heterostructure nanocavities
1081
+ with an average Q factor of three million,” Opt. Express 19, 11916–11921 (2011).
1082
+ 56. Y. Lai, S. Pirotta, G. Urbinati, D. Gerace, M. Minkov, V. Savona, A. Badolato, and M. Galli, “Genetically designed
1083
+
1084
+ L3 photonic crystal nanocavities with measured quality factor exceeding one million,” Appl. Phys. Lett. 104, 241101
1085
+ (2014).
1086
+ 57. A. Simbula, M. Schatzl, L. Zagaglia, F. Alpeggiani, L. C. Andreani, F. Schäffler, T. Fromherz, M. Galli, and D. Gerace,
1087
+ “Realization of high-Q/V photonic crystal cavities defined by an effective Aubry-André-Harper bichromatic potential,”
1088
+ APL Photonics 2, 056102 (2017).
1089
+ 58. R. Benevides, F. G. S. Santos, G. O. Luiz, G. S. Wiederhecker, and T. P. M. Alegre, “Ultrahigh-Q optomechanical
1090
+ crystal cavities fabricated in a CMOS foundry,” Sci. Rep. 7, 2491 (2017).
1091
+ 59. K. Ashida, M. Okano, T. Yasuda, M. Ohtsuka, M. Seki, N. Yokoyama, K. Koshino, K. Yamada, and Y. Takahashi,
1092
+ “Photonic crystal nanocavities with an average Q factor of 1.9 million fabricated on a 300-mm-wide SOI wafer using
1093
+ a CMOS-compatible process,” J. Light. Technol. 36, 4774–4782 (2018).
1094
+ 60. “COMSOL Multiphysics®,” https://www.comsol.com/.
1095
+ 61. S. G. Johnson, S. Fan, A. Mekis, and J. D. Joannopoulos, “Multipole-cancellation mechanism for high-Q cavities in
1096
+ the absence of a complete photonic band gap,” Appl. Phys. Lett. 78, 3388–3390 (2001).
1097
+ 62. M. Minkov, V. Savona, and D. Gerace, “Photonic crystal slab cavity simultaneously optimized for ultra-high Q/V and
1098
+ vertical radiation coupling,” Appl. Phys. Lett. 111, 131104 (2017).
1099
+ 63. T. Asano and S. Noda, “Optimization of photonic crystal nanocavities based on deep learning,” Opt. Express 26,
1100
+ 32704–32717 (2018).
1101
+ 64. T. Shibata, T. Asano, and S. Noda, “Fabrication and characterization of an L3 nanocavity designed by an iterative
1102
+ machine-learning method,” APL Photonics 6, 036113 (2021).
1103
+ 65. J. P. Vasco and V. Savona, “Global optimization of an encapsulated Si/SiO2 L3 cavity with a 43 million quality
1104
+ factor,” Sci. Rep. 11, 10121 (2021).
1105
+ 66. Y. Tanaka, T. Asano, and S. Noda, “Design of photonic crystal nanocavity with Q-factor of ∼ 109,” J. Light. Technol.
1106
+ 26, 1532–1539 (2008).
1107
+ 67. T. Nakamura, Y. Takahashi, Y. Tanaka, T. Asano, and S. Noda, “Improvement in the quality factors for photonic
1108
+ crystal nanocavities via visualization of the leaky components,” Opt. Express 24, 9541–9549 (2016).
1109
+ 68. U. P. Dharanipathy, M. Minkov, M. Tonin, V. Savona, and R. Houdré, “High-q silicon photonic crystal cavity for
1110
+ enhanced optical nonlinearities,” Appl. Phys. Lett. 105, 101101 (2014).
1111
+ 69. H. Hagino, Y. Takahashi, Y. Tanaka, T. Asano, and S. Noda, “Effects of fluctuation in air hole radii and positions on
1112
+ optical characteristics in photonic crystal heterostructure nanocavities,” Phys. Rev. B 79, 085112 (2009).
1113
+ 70. S. Hughes, L. Ramunno, J. F. Young, and J. E. Sipe, “Extrinsic optical scattering loss in photonic crystal waveguides:
1114
+ Role of fabrication disorder and photon group velocity,” Phys. Rev. Lett. 94, 033903 (2005).
1115
+ 71. J. A. Nelder and R. Mead, “A Simplex Method for Function Minimization,” The Comput. J. 7, 308–313 (1965).
1116
+ 72. T. Asano, Y. Ochi, Y. Takahashi, K. Kishimoto, and S. Noda, “Photonic crystal nanocavity with a Q factor exceeding
1117
+ eleven million,” Opt. Express 25, 1769–1777 (2017).
1118
+ 73. Y. Yamashita, K. Namba, Y. Nakato, Y. Nishioka, and H. Kobayashi, “Spectroscopic observation of interface states
1119
+ of ultrathin silicon oxide,” J. Appl. Phys. 79, 7051–7057 (1996).
1120
+ 74. M. Borselli, T. J. Johnson, and O. Painter, “Measuring the role of surface chemistry in silicon microphotonics,” Appl.
1121
+ Phys. Lett. 88, 131114 (2006).
1122
+ 75. E. Yablonovitch, D. L. Allara, C. C. Chang, T. Gmitter, and T. B. Bright, “Unusually low surface-recombination
1123
+ velocity on silicon and germanium surfaces,” Phys. Rev. Lett. 57, 249–252 (1986).
1124
+ 76. T. Takahagi, I. Nagai, A. Ishitani, H. Kuroda, and Y. Nagasawa, “The formation of hydrogen passivated silicon
1125
+ single-crystal surfaces using ultraviolet cleaning and HF etching,” J. Appl. Phys. 64, 3516–3521 (1988).
1126
+ 77. H. Sekoguchi, Y. Takahashi, T. Asano, and S. Noda, “Photonic crystal nanocavity with a Q-factor of 9 million,” Opt.
1127
+ Express 22, 916–924 (2014).
1128
+ 78. K. K. Lee, D. R. Lim, L. C. Kimerling, J. Shin, and F. Cerrina, “Fabrication of ultralow-loss Si/SiO2 waveguides by
1129
+ roughness reduction,” Opt. Lett. 26, 1888–1890 (2001).
1130
+ 79. D. K. Sparacin, S. J. Spector, and L. C. Kimerling, “Silicon waveguide sidewall smoothing by wet chemical oxidation,”
1131
+ J. Light. Technol. 23, 2455 (2005).
1132
+ 80. L. Ling, Z. J. Radzimski, T. Abe, and F. Shimura, “The effect of bonded interface on electrical properties of bonded
1133
+ silicon-on-insulator wafers,” J. Appl. Phys. 72, 3610–3616 (1992).
1134
+ 81. C. Panuski, D. Englund, and R. Hamerly, “Fundamental thermal noise limits for optical microcavities,” Phys. Rev. X
1135
+ 10, 041046 (2020).
1136
+ 82. T. Tanabe, M. Notomi, E. Kuramochi, and H. Taniyama, “Large pulse delay and small group velocity achieved using
1137
+ ultrahigh-Q photonic crystal nanocavities,” Opt. Express 15, 7826–7839 (2007).
1138
+
1NE0T4oBgHgl3EQfdgAR/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2tAyT4oBgHgl3EQf1vk5/content/tmp_files/2301.00739v1.pdf.txt ADDED
@@ -0,0 +1,351 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ON THE COMPLEXITY OF SUB-TREE SCHEDULING FOR
2
+ WIRELESS SENSOR NETWORKS WITH PARTIAL COVERAGE
3
+ Michele Barbato∗
4
+ Dipartimento di Informatica
5
+ Universit`a degli Studi di Milano
6
+ via Celoria 18, 20133 Milano
7
+ michele.barbato@unimi.it
8
+ Nicola Bianchessi
9
+ Dipartimento di Informatica
10
+ Universit`a degli Studi di Milano
11
+ via Celoria 18, 20133 Milano
12
+ nicola.bianchessi@unimi.it
13
+ ABSTRACT
14
+ Given an undirected graph G whose edge weights change over s time slots, the sub-tree scheduling
15
+ for wireless sensor networks with partial coverage asks to partition the vertices of G in s non-empty
16
+ trees such that the total weight of the trees is minimized. In this note we show that the problem is NP-
17
+ hard in both the cases where s (i) is part of the input and (ii) is a fixed instance parameter. In both
18
+ our proofs we reduce from the cardinality Steiner tree problem. We additionally give polynomial-
19
+ time algorithms for structured inputs of the problem.
20
+ Keywords Wireless sensor network, Sub-tree scheduling, Partial coverage, Complexity
21
+ 1
22
+ Introduction
23
+ A central problem in the management of wireless sensor networks is to extend the lifetime of wireless sensors through
24
+ operating policies ensuring energy efficiency and/or balancing. Its importance stems from the fact that even a single
25
+ failure of a wireless sensor can in principle compromise the effectiveness of the whole network. From the viewpoint
26
+ of energy balancing, a general approach to minimize energy consumption is to split the set of sensors into several
27
+ non-empty subsets and to subdivide the planning horizon into as many slots, so that the subsets of sensors are operated
28
+ sequentially, one at each time slot.
29
+ The sub-tree scheduling for wireless sensor networks with partial coverage (STSWSN-PC), introduced by Adasme
30
+ (2019), is a particular implementation of such an approach, with the additional requirements that the sensors operated
31
+ simultaneously are mutually connected under a tree topology, and each sensor must be active in a unique time slot.
32
+ Namely, the STSWSN-PC is defined on an undirected graph G = (V, E) representing the network of sensors, a
33
+ number s, 1 ≤ s ≤ |V |, of time slots, and vectors w1, w2, . . . , ws ∈ RE
34
+ + of edge-weights (one for each time slot). The
35
+ aim is to find a set T1, T2, . . . , Ts of non-empty vertex-disjoint trees of G covering V and minimizing �s
36
+ i=1 wi(Ti).
37
+ In the above description, the vertices of G represent the sensors of the network, the edges represent direct links among
38
+ sensors, and the weights represent the time slot-dependent power for transmitting information over the corresponding
39
+ edges.
40
+ The input of the STSWSN-PC is simultaneously defined by the graph G, the number of time slots s, and the values
41
+ of the edge weight vectors. The STSWSN-PC may admit efficient optimization algorithms for structured inputs.
42
+ For example, when the weights are constant throughout the time slots (i.e., wi ≡ wj for all i, j = 1, 2, . . . , s), the
43
+ STSWSN-PC is solvable in polynomial time, e.g., by using Kruskal’s algorithm (Kruskal, 1956) and terminating it at
44
+ the first iteration yielding a spanning forest with s trees; when s = 1, the STSWSN-PC boils down to the minimum
45
+ spanning tree (MST) problem on general graphs and, as such, is solvable in polynomial time; when s = |V |, the
46
+ optimal solution consists of arbitrarily assigning one vertex to each time slot.
47
+ However, unstructured instances of the STSWSN-PC have been tackled in Adasme (2019) and Bianchessi (2022) by
48
+ means of branch-and-bound and branch-and-cut algorithms, respectively. These approaches implicitly suggest that the
49
+ ∗Corresponding author
50
+ arXiv:2301.00739v1 [cs.CC] 2 Jan 2023
51
+
52
+ On the complexity of STSWSN-PC
53
+ 1
54
+ 3
55
+ 6
56
+ 7
57
+ 2
58
+ 4
59
+ 5
60
+ 8
61
+ (a)
62
+ v1
63
+ 1
64
+ v1
65
+ 2
66
+ v1
67
+ 3
68
+ v3
69
+ 1
70
+ v3
71
+ 2
72
+ v3
73
+ 3
74
+ v6
75
+ 1
76
+ v6
77
+ 2
78
+ v6
79
+ 3
80
+ v7
81
+ 1
82
+ v7
83
+ 2
84
+ v7
85
+ 3
86
+ 1
87
+ 3
88
+ 6
89
+ 7
90
+ 2
91
+ 4
92
+ 5
93
+ 8
94
+ (b)
95
+ Figure 1: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding
96
+ STSWSN-PC instance for k = 5 (b), in which fictitious vertices are diamond-shaped.
97
+ problem is theoretically intractable, although its computational complexity is unknown to the best of our knowledge.
98
+ The purpose of this note is to fill in this gap.
99
+ In Sect. 2 we study the complexity of the STSWSN-PC when s is part of the input, that is, s is not fixed in
100
+ {2, 3, . . . , |V | − 1}; in Sect. 3 we study the complexity under the assumption that s is an instance parameter with
101
+ a prescribed value ¯s ≥ 2. Through reductions from the (minimum weight) Steiner tree problem (Garey and Johnson,
102
+ 1990, p. 208), we show that the STSWSN-PC is NP-hard in both cases, thus justifying the usage of implicit enumera-
103
+ tion schemes to solve it. Finally, in Sect. 4 we discuss additional structured inputs, other than those mentioned above,
104
+ for which the STSWSN-PC is solvable in polynomial time.
105
+ 2
106
+ NP-hardness when the number of time slots is not fixed
107
+ Given an undirected connected graph G = (V, E) with |V | = n vertices and a subset R ⊂ V of terminal vertices, a
108
+ Steiner tree is a subtree T of G such that R ⊆ V (T). Given also a weight w(e) ∈ Z+ for each e ∈ E, computing the
109
+ Steiner tree of minimum total edge-weight is in general NP-hard, and the problem remains NP-hard if all weights are
110
+ equal (Garey and Johnson, 1990, p. 209). In particular, given w(e) = 1 for each e ∈ E, the pair (G, R), and k ∈ Z+
111
+ with |R| − 1 ≤ k ≤ n − 2, the cardinality Steiner tree (CST) problem consisting of determining the existence of a
112
+ Steiner tree of G with at most k edges is NP-complete.
113
+ We now show that an oracle solving the STSWSN-PC in polynomial time allows to solve the CST in polynomial time,
114
+ thus obtaining that the STSWSN-PC is NP-hard. We point out the CST with at most three terminals can be solved
115
+ in polynomial time (Arrighi and de Oliveira Oliveira, 2021), therefore we restrict ourselves to CST instances with
116
+ |R| ≥ 4.
117
+ Given k and (G, R) defining a CST instance as above, we construct a new graph ¯G = ( ¯V , ¯E) obtained from G by
118
+ introducing n−k fictitious vertices vr
119
+ 1, vr
120
+ 2, . . . , vr
121
+ n−k for each terminal vertex r ∈ R and defining ¯E = E ∪ER, where
122
+ ER = {(vr
123
+ j, r): j = 1, 2, . . . , n − k, r ∈ R}; that is, each fictitious vertex is connected precisely to the corresponding
124
+ terminal vertex. An example of such a construction is given in Figure 1.
125
+ Next, we define a STSWSN-PC instance I on graph ¯G and s = n−k+1 time slots. Note that, since |R|−1 ≤ k ≤ n−2
126
+ and |R| ≥ 4, then 3 ≤ s ≤ n − 2 < | ¯V |, hence our definition of the number of time slots excludes the polynomially
127
+ solvable cases of the STSWSN-PC.
128
+ The weights of the time slots are defined as follows:
129
+ w1
130
+ e =
131
+ �0
132
+ if e ∈ ER
133
+ 1
134
+ otherwise
135
+ (1)
136
+ wj
137
+ e =
138
+ �n
139
+ if e ∈ ER
140
+ 1
141
+ otherwise
142
+ ∀j = 2, 3, . . . , n − k + 1
143
+ (2)
144
+ Lemma 1. Let T ⋆
145
+ 1 , T ⋆
146
+ 2 , . . . , T ⋆
147
+ n−k+1 be an optimal solution to I. The restriction of T ⋆
148
+ 1 to the vertices in V is a Steiner
149
+ tree of G.
150
+ 2
151
+
152
+ On the complexity of STSWSN-PC
153
+ Proof. Assume that the restriction of T ⋆
154
+ 1 to the vertices of G is not a Steiner tree. Then there is at least a terminal
155
+ vertex r⋆ contained in a tree of a time slot after the first one. Since all trees T ⋆
156
+ 1 , T ⋆
157
+ 2 , . . . , T ⋆
158
+ n−k+1 are connected, at
159
+ least one edge of ER belongs to that time slot. By (2) the optimal solution to I has value at least n. Now we show the
160
+ existence of a solution with better value. Namely, in the first time slot we consider the tree T1 spanning all vertices
161
+ of ¯G except the n − k fictitious vertices linked to r⋆ and we set Tj = {vr⋆
162
+ j−1} for j = 2, 3, . . . , n − k + 1. Then
163
+ T1, T2, . . . , Tn−k+1 is a feasible solution whose value is n − 1 by (1).
164
+ Now we can prove the main result. In the proof, given S ⊆ ¯V , we denote by δ(S) its cut, namely, the set of edges
165
+ having one endpoint in S and the other endpoint outside S.
166
+ Proposition 1. There exists a solution to the CST instance given by k and (G, R) if and only if the optimal solution to
167
+ I has value at most k. Therefore the STSWSN-PC is NP-hard.
168
+ Proof. For the “if” part assume that there exists an optimal solution having value at most k; denoting by T ⋆ the
169
+ restriction of its tree of the first time slot to the vertices in V , the nonnegativity of the weights in (1) yields |T ⋆| ≤ k.
170
+ Then the result follows from Lemma 1.
171
+ Now, let us prove the “only if” part. Assume that there exists a Steiner tree T of G such that |T| ≤ k. We assume,
172
+ without loss of generality, that |T| = k: otherwise we repeatedly update T by adding one edge of G belonging to
173
+ δ(T), until reaching the required cardinality (this is always possible as G is connected and since the update always
174
+ returns a Steiner tree). Then, let ¯v ∈ ¯V \ V be an arbitrary fictitious vertex, define ˆV = ¯V \ {V ∪ {¯v}} as the set of
175
+ remaining fictitious vertices, and let V C = V \ V (T) = {v1, v2, . . . , vn−k−1} be the vertices in the complement of
176
+ T in G (as |T| = k, T comprises k + 1 vertices). We consider the feasible solution for I given by T1 = T ∪ δ( ˆV ),
177
+ T2 = {¯v} and Tj = {vj−2 ∈ V C} for every j = 3, 4, . . . , n − k + 1. By (1)–(2) such a solution has value k. Then the
178
+ optimal solution to I has value at most k.
179
+ In the above construction, ¯G is obtained from G by appending leaves to its terminal vertices. This is a minor modifi-
180
+ cation of the initial graph, hence the STSWSN-PC remains difficult on those classes of graphs which are closed under
181
+ such modification and on which the CST is NP-complete. It is the case of chordal bipartite graphs, that is, bipartite
182
+ graphs whose cycles C of length at least 6 induce a subgraph with at least |C| + 1 edges. More precisely we have:
183
+ Corollary 1. The STSWSN-PC is NP-hard on bipartite chordal graphs.
184
+ Proof. Appending leaves to a subset of vertices of a bipartite chordal graph maintains the chordal bipartiteness. Then
185
+ the result follows from the NP-completeness of the CST on bipartite chordal graphs proved by M¨uller and Brandst¨adt
186
+ (1987).
187
+ 3
188
+ NP-hardness when the number of time slots is fixed
189
+ In this section we consider the complexity of the STSWSN-PC by assuming that we have s = ¯s time slots, with ¯s ≥ 2
190
+ fixed, and we show that the problem remains NP-hard.
191
+ We modify the approach of previous section as follows. Let us consider a graph G = (V, E) with |V | = n vertices
192
+ and a set R ⊂ V , |R| ≥ 4, of terminal vertices defining an instance of the CST problem. We define a graph
193
+ G⋆ = (V ⋆, E⋆) where V ⋆ = V ∪ V R, with V R = {vr
194
+ 1, vr
195
+ 2, . . . , vr
196
+ ¯s−1 : r ∈ R} being a set of fictitious vertices
197
+ associated with those in R, and where E⋆ = E ∪ EC ∪ ER, with EC = {(v, w): v, w ∈ V s.t. (v, w) ̸∈ E} and
198
+ ER = {(r, vr
199
+ j): r ∈ R, j = 1, 2, . . . , ¯s − 1}. That is, G⋆ is obtained by extending G to a complete graph and by
200
+ linking each terminal vertex in G to the corresponding ¯s − 1 fictitious vertices (see Figure 2 for an example).
201
+ For every e ∈ E⋆ we define the following edge weights:
202
+ w1
203
+ e =
204
+
205
+
206
+
207
+ 0
208
+ if e ∈ ER
209
+ 1
210
+ if e ∈ E
211
+ n
212
+ otherwise,
213
+ (3)
214
+ wj
215
+ e =
216
+ �n
217
+ if e ∈ ER
218
+ 0
219
+ otherwise.
220
+ ∀j = 2, 3, . . . , ¯s
221
+ (4)
222
+ Let I⋆ be the resulting STSWSN-PC instance.
223
+ 3
224
+
225
+ On the complexity of STSWSN-PC
226
+ 1
227
+ 3
228
+ 6
229
+ 7
230
+ 2
231
+ 4
232
+ 5
233
+ 8
234
+ (a)
235
+ v1
236
+ 1
237
+ v1
238
+ 2
239
+ v3
240
+ 1
241
+ v3
242
+ 2
243
+ v6
244
+ 1
245
+ v6
246
+ 2
247
+ v7
248
+ 1
249
+ v7
250
+ 2
251
+ 1
252
+ 3
253
+ 6
254
+ 7
255
+ 2
256
+ 4
257
+ 5
258
+ 8
259
+ (b)
260
+ Figure 2: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding
261
+ STSWSN-PC instance for ¯s = 3 (b), in which fictitious vertices are diamond-shaped.
262
+ A Steiner tree T of G with k edges corresponds to a solution T1, T2, . . . , T¯s of I⋆ having value k. We distinguish two
263
+ cases:
264
+ 1. if T is not spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr
265
+ 1, vr
266
+ 2, . . . , vr
267
+ ¯s−2 be ¯s − 2 arbitrary
268
+ fictitious vertices linked to r. One obtains T1 by extending T with all vertices in V R \ {vr
269
+ 1, vr
270
+ 2, . . . , vr
271
+ ¯s−2}
272
+ (whose linking edges in ER have weight 0 in the first time slot, by (3)), by defining T2 as the spanning tree
273
+ of the complete graph G⋆ \ V (T1) involving only edges in E ∪ EC (which have weight 0 in the second time
274
+ slot, by (4)) and by defining Tj = {vr
275
+ j−2} for every j = 3, 4, . . . ¯s;
276
+ 2. if T is spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr
277
+ 1, vr
278
+ 2, . . . , vr
279
+ ¯s−1 be the ¯s − 1 fictitious
280
+ vertices linked to r. One obtains T1 by extending T with all vertices in V R \ {vr
281
+ 1, vr
282
+ 2, . . . , vr
283
+ ¯s−1}, and by
284
+ defining Tj = {vr
285
+ j−1} for every j = 2, 3, . . . , ¯s.
286
+ Note that, since a spanning tree of G is also a Steiner tree, the construction in the above case 2 shows that an optimal
287
+ solution to I⋆ has value at most n − 1. Then, as in Lemma 1 and Prop. 1, it is possible to state that if T ⋆
288
+ 1 , T ⋆
289
+ 2 , . . . , T ⋆
290
+ ¯s
291
+ is an optimal solution to I⋆, the restriction of T ⋆
292
+ 1 to the vertices in V is a Steiner tree of G having the same value.
293
+ Indeed, we first observe that T ⋆
294
+ 1 has its edges in E ∪ ER, as otherwise (3) would imply that the considered solution
295
+ has weight at least n, contradicting its optimality; moreover, if T ⋆
296
+ 1 is not a Steiner tree of G, there should be a vertex
297
+ r ∈ R belonging to T ⋆
298
+ j with 2 ≤ j ≤ ¯s and, since T ⋆
299
+ 1 , T ⋆
300
+ 2 , . . . , T ⋆
301
+ ¯s are connected, we have that at least one edge of
302
+ ER is taken outside the first time slot; then by (4), the considered solution has value at least n, again contradicting its
303
+ optimality.
304
+ The above arguments prove that the considered CST instance admits a solution if and only if the corresponding
305
+ STSWSN-PC instance has value at most k, hence we have:
306
+ Proposition 2. The STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is NP-hard.
307
+ We remark that the transformation from G to G⋆ used in the above reduction does not allow to state a result similar
308
+ to Cor. 1.
309
+ 4
310
+ Structured polynomially-solvable cases
311
+ The results of Prop. 1 and Prop. 2 hold without making any assumption on the structure of the STSWSN-PC instances.
312
+ Here we present two polynomially-solvable cases when the input is structured. The first one generalizes the approach
313
+ described in the Introduction for the case s = |V |.
314
+ Observation 1. When |V | − s is constant the STSWSN-PC is solvable in polynomial time.
315
+ Proof. When s = |V | − 1, a feasible solution contains one edge in a time slot and single vertices in all remaining time
316
+ slots; then an optimal solution can be determined in O(|V ||E|) time by exhaustively listing all values wj
317
+ e for e ∈ E
318
+ and 1 ≤ j ≤ |V | − 1 and considering the minimum one. A similar algorithm (of higher time complexity) can be
319
+ exhibited for any constant value of |V | − s.
320
+ 4
321
+
322
+ On the complexity of STSWSN-PC
323
+ The second polynomially-solvable case relates to the graph topology:
324
+ Observation 2. If G = (V, E) is a tree, the STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is solvable in
325
+ polynomial time.
326
+ Proof. We can list in O(n¯s−1) all subsets of ¯s − 1 edges whose removal decomposes G into a forest with ¯s trees. For
327
+ each such a subset we assign in polynomial time the corresponding trees to the ¯s time slots solving a perfect matching
328
+ on the weighted complete bipartite graph B = (T ; S, W) where each vertex in T represents a tree, each vertex of S
329
+ represents a time slot and edge eτσ ∈ W linking τ ∈ T to σ ∈ S has weight wσ(τ).
330
+ Obs. 2 motivates the following questions that we leave open: (i) When the number of time slots is not fixed, which
331
+ is the complexity of the STSWSN-PC defined on trees? (ii) Are there any other graph families (other than trees) for
332
+ which the STSWSN-PC is solvable in polynomial time, at least when the number of time slots is fixed?
333
+ Acknowledgments
334
+ The authors are grateful to Alberto Ceselli and to Emiliano Lancini for their comments on the manuscript.
335
+ References
336
+ Adasme, P. (2019). Optimal sub-tree scheduling for wireless sensor networks with partial coverage. Computer Stan-
337
+ dards & Interfaces, 61, 20–35.
338
+ Arrighi, E. and de Oliveira Oliveira, M. (2021). Three Is Enough for Steiner Trees. In D. Coudert and E. Natale, ed-
339
+ itors, 19th International Symposium on Experimental Algorithms (SEA 2021), volume 190 of Leibniz International
340
+ Proceedings in Informatics (LIPIcs), pages 5:1–5:15, Dagstuhl, Germany. Schloss Dagstuhl – Leibniz-Zentrum f¨ur
341
+ Informatik.
342
+ Bianchessi, N. (2022). On optimally solving sub-tree scheduling for wireless sensor networks with partial coverage.
343
+ Universit`a degli Studi di Milano, http://hdl.handle.net/2434/934107.
344
+ Garey, M. R. and Johnson, D. S. (1990). Computers and Intractability; A Guide to the Theory of NP-Completeness.
345
+ W. H. Freeman & Co., USA.
346
+ Kruskal, J. B. (1956). On the shortest spanning subtree of a graph and the traveling salesman problem. Proceedings
347
+ of the American Mathematical Society, 7(1), 48–50.
348
+ M¨uller, H. and Brandst¨adt, A. (1987). The NP-completeness of Steiner tree and dominating set for chordal bipartite
349
+ graphs. Theoretical Computer Science, 53(2-3), 257–265.
350
+ 5
351
+
2tAyT4oBgHgl3EQf1vk5/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,248 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf,len=247
2
+ page_content='ON THE COMPLEXITY OF SUB-TREE SCHEDULING FOR WIRELESS SENSOR NETWORKS WITH PARTIAL COVERAGE Michele Barbato∗ Dipartimento di Informatica Universit`a degli Studi di Milano via Celoria 18, 20133 Milano michele.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
3
+ page_content='barbato@unimi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
4
+ page_content='it Nicola Bianchessi Dipartimento di Informatica Universit`a degli Studi di Milano via Celoria 18, 20133 Milano nicola.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
5
+ page_content='bianchessi@unimi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
6
+ page_content='it ABSTRACT Given an undirected graph G whose edge weights change over s time slots, the sub-tree scheduling for wireless sensor networks with partial coverage asks to partition the vertices of G in s non-empty trees such that the total weight of the trees is minimized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
7
+ page_content=' In this note we show that the problem is NP- hard in both the cases where s (i) is part of the input and (ii) is a fixed instance parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
8
+ page_content=' In both our proofs we reduce from the cardinality Steiner tree problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
9
+ page_content=' We additionally give polynomial- time algorithms for structured inputs of the problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
10
+ page_content=' Keywords Wireless sensor network, Sub-tree scheduling, Partial coverage, Complexity 1 Introduction A central problem in the management of wireless sensor networks is to extend the lifetime of wireless sensors through operating policies ensuring energy efficiency and/or balancing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
11
+ page_content=' Its importance stems from the fact that even a single failure of a wireless sensor can in principle compromise the effectiveness of the whole network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
12
+ page_content=' From the viewpoint of energy balancing, a general approach to minimize energy consumption is to split the set of sensors into several non-empty subsets and to subdivide the planning horizon into as many slots, so that the subsets of sensors are operated sequentially, one at each time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
13
+ page_content=' The sub-tree scheduling for wireless sensor networks with partial coverage (STSWSN-PC), introduced by Adasme (2019), is a particular implementation of such an approach, with the additional requirements that the sensors operated simultaneously are mutually connected under a tree topology, and each sensor must be active in a unique time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
14
+ page_content=' Namely, the STSWSN-PC is defined on an undirected graph G = (V, E) representing the network of sensors, a number s, 1 ≤ s ≤ |V |, of time slots, and vectors w1, w2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
15
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
16
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
17
+ page_content=' , ws ∈ RE + of edge-weights (one for each time slot).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
18
+ page_content=' The aim is to find a set T1, T2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
19
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
20
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
21
+ page_content=' , Ts of non-empty vertex-disjoint trees of G covering V and minimizing �s i=1 wi(Ti).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
22
+ page_content=' In the above description, the vertices of G represent the sensors of the network, the edges represent direct links among sensors, and the weights represent the time slot-dependent power for transmitting information over the corresponding edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
23
+ page_content=' The input of the STSWSN-PC is simultaneously defined by the graph G, the number of time slots s, and the values of the edge weight vectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
24
+ page_content=' The STSWSN-PC may admit efficient optimization algorithms for structured inputs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
25
+ page_content=' For example, when the weights are constant throughout the time slots (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
26
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
27
+ page_content=', wi ≡ wj for all i, j = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
28
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
29
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
30
+ page_content=' , s), the STSWSN-PC is solvable in polynomial time, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
31
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
32
+ page_content=', by using Kruskal’s algorithm (Kruskal, 1956) and terminating it at the first iteration yielding a spanning forest with s trees;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
33
+ page_content=' when s = 1, the STSWSN-PC boils down to the minimum spanning tree (MST) problem on general graphs and, as such, is solvable in polynomial time;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
34
+ page_content=' when s = |V |, the optimal solution consists of arbitrarily assigning one vertex to each time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
35
+ page_content=' However, unstructured instances of the STSWSN-PC have been tackled in Adasme (2019) and Bianchessi (2022) by means of branch-and-bound and branch-and-cut algorithms, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
36
+ page_content=' These approaches implicitly suggest that the ∗Corresponding author arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
37
+ page_content='00739v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
38
+ page_content='CC] 2 Jan 2023 On the complexity of STSWSN-PC 1 3 6 7 2 4 5 8 (a) v1 1 v1 2 v1 3 v3 1 v3 2 v3 3 v6 1 v6 2 v6 3 v7 1 v7 2 v7 3 1 3 6 7 2 4 5 8 (b) Figure 1: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding STSWSN-PC instance for k = 5 (b), in which fictitious vertices are diamond-shaped.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
39
+ page_content=' problem is theoretically intractable, although its computational complexity is unknown to the best of our knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
40
+ page_content=' The purpose of this note is to fill in this gap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
41
+ page_content=' In Sect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
42
+ page_content=' 2 we study the complexity of the STSWSN-PC when s is part of the input, that is, s is not fixed in {2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
43
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
44
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
45
+ page_content=' , |V | − 1};' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
46
+ page_content=' in Sect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
47
+ page_content=' 3 we study the complexity under the assumption that s is an instance parameter with a prescribed value ¯s ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
48
+ page_content=' Through reductions from the (minimum weight) Steiner tree problem (Garey and Johnson, 1990, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
49
+ page_content=' 208), we show that the STSWSN-PC is NP-hard in both cases, thus justifying the usage of implicit enumera- tion schemes to solve it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
50
+ page_content=' Finally, in Sect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
51
+ page_content=' 4 we discuss additional structured inputs, other than those mentioned above, for which the STSWSN-PC is solvable in polynomial time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
52
+ page_content=' 2 NP-hardness when the number of time slots is not fixed Given an undirected connected graph G = (V, E) with |V | = n vertices and a subset R ⊂ V of terminal vertices, a Steiner tree is a subtree T of G such that R ⊆ V (T).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
53
+ page_content=' Given also a weight w(e) ∈ Z+ for each e ∈ E, computing the Steiner tree of minimum total edge-weight is in general NP-hard, and the problem remains NP-hard if all weights are equal (Garey and Johnson, 1990, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
54
+ page_content=' 209).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
55
+ page_content=' In particular, given w(e) = 1 for each e ∈ E, the pair (G, R), and k ∈ Z+ with |R| − 1 ≤ k ≤ n − 2, the cardinality Steiner tree (CST) problem consisting of determining the existence of a Steiner tree of G with at most k edges is NP-complete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
56
+ page_content=' We now show that an oracle solving the STSWSN-PC in polynomial time allows to solve the CST in polynomial time, thus obtaining that the STSWSN-PC is NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
57
+ page_content=' We point out the CST with at most three terminals can be solved in polynomial time (Arrighi and de Oliveira Oliveira, 2021), therefore we restrict ourselves to CST instances with |R| ≥ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
58
+ page_content=' Given k and (G, R) defining a CST instance as above, we construct a new graph ¯G = ( ¯V , ¯E) obtained from G by introducing n−k fictitious vertices vr 1, vr 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
59
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
60
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
61
+ page_content=' , vr n−k for each terminal vertex r ∈ R and defining ¯E = E ∪ER, where ER = {(vr j, r): j = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
62
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
63
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
64
+ page_content=' , n − k, r ∈ R};' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
65
+ page_content=' that is, each fictitious vertex is connected precisely to the corresponding terminal vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
66
+ page_content=' An example of such a construction is given in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
67
+ page_content=' Next, we define a STSWSN-PC instance I on graph ¯G and s = n−k+1 time slots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
68
+ page_content=' Note that, since |R|−1 ≤ k ≤ n−2 and |R| ≥ 4, then 3 ≤ s ≤ n − 2 < | ¯V |, hence our definition of the number of time slots excludes the polynomially solvable cases of the STSWSN-PC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
69
+ page_content=' The weights of the time slots are defined as follows: w1 e = �0 if e ∈ ER 1 otherwise (1) wj e = �n if e ∈ ER 1 otherwise ∀j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
70
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
71
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
72
+ page_content=' , n − k + 1 (2) Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
73
+ page_content=' Let T ⋆ 1 , T ⋆ 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
74
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
75
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
76
+ page_content=' , T ⋆ n−k+1 be an optimal solution to I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
77
+ page_content=' The restriction of T ⋆ 1 to the vertices in V is a Steiner tree of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
78
+ page_content=' 2 On the complexity of STSWSN-PC Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
79
+ page_content=' Assume that the restriction of T ⋆ 1 to the vertices of G is not a Steiner tree.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
80
+ page_content=' Then there is at least a terminal vertex r⋆ contained in a tree of a time slot after the first one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
81
+ page_content=' Since all trees T ⋆ 1 , T ⋆ 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
82
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
83
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
84
+ page_content=' , T ⋆ n−k+1 are connected, at least one edge of ER belongs to that time slot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
85
+ page_content=' By (2) the optimal solution to I has value at least n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
86
+ page_content=' Now we show the existence of a solution with better value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
87
+ page_content=' Namely, in the first time slot we consider the tree T1 spanning all vertices of ¯G except the n − k fictitious vertices linked to r⋆ and we set Tj = {vr⋆ j−1} for j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
88
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
89
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
90
+ page_content=' , n − k + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
91
+ page_content=' Then T1, T2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
92
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
93
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
94
+ page_content=' , Tn−k+1 is a feasible solution whose value is n − 1 by (1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
95
+ page_content=' Now we can prove the main result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
96
+ page_content=' In the proof, given S ⊆ ¯V , we denote by δ(S) its cut, namely, the set of edges having one endpoint in S and the other endpoint outside S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
97
+ page_content=' Proposition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
98
+ page_content=' There exists a solution to the CST instance given by k and (G, R) if and only if the optimal solution to I has value at most k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
99
+ page_content=' Therefore the STSWSN-PC is NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
100
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
101
+ page_content=' For the “if” part assume that there exists an optimal solution having value at most k;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
102
+ page_content=' denoting by T ⋆ the restriction of its tree of the first time slot to the vertices in V , the nonnegativity of the weights in (1) yields |T ⋆| ≤ k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
103
+ page_content=' Then the result follows from Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
104
+ page_content=' Now, let us prove the “only if” part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
105
+ page_content=' Assume that there exists a Steiner tree T of G such that |T| ≤ k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
106
+ page_content=' We assume, without loss of generality, that |T| = k: otherwise we repeatedly update T by adding one edge of G belonging to δ(T), until reaching the required cardinality (this is always possible as G is connected and since the update always returns a Steiner tree).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
107
+ page_content=' Then, let ¯v ∈ ¯V \\ V be an arbitrary fictitious vertex, define ˆV = ¯V \\ {V ∪ {¯v}} as the set of remaining fictitious vertices, and let V C = V \\ V (T) = {v1, v2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
108
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
109
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
110
+ page_content=' , vn−k−1} be the vertices in the complement of T in G (as |T| = k, T comprises k + 1 vertices).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
111
+ page_content=' We consider the feasible solution for I given by T1 = T ∪ δ( ˆV ), T2 = {¯v} and Tj = {vj−2 ∈ V C} for every j = 3, 4, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
112
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
113
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
114
+ page_content=' , n − k + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
115
+ page_content=' By (1)–(2) such a solution has value k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
116
+ page_content=' Then the optimal solution to I has value at most k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
117
+ page_content=' In the above construction, ¯G is obtained from G by appending leaves to its terminal vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
118
+ page_content=' This is a minor modifi- cation of the initial graph, hence the STSWSN-PC remains difficult on those classes of graphs which are closed under such modification and on which the CST is NP-complete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
119
+ page_content=' It is the case of chordal bipartite graphs, that is, bipartite graphs whose cycles C of length at least 6 induce a subgraph with at least |C| + 1 edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
120
+ page_content=' More precisely we have: Corollary 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
121
+ page_content=' The STSWSN-PC is NP-hard on bipartite chordal graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
122
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
123
+ page_content=' Appending leaves to a subset of vertices of a bipartite chordal graph maintains the chordal bipartiteness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
124
+ page_content=' Then the result follows from the NP-completeness of the CST on bipartite chordal graphs proved by M¨uller and Brandst¨adt (1987).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
125
+ page_content=' 3 NP-hardness when the number of time slots is fixed In this section we consider the complexity of the STSWSN-PC by assuming that we have s = ¯s time slots, with ¯s ≥ 2 fixed, and we show that the problem remains NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
126
+ page_content=' We modify the approach of previous section as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
127
+ page_content=' Let us consider a graph G = (V, E) with |V | = n vertices and a set R ⊂ V , |R| ≥ 4, of terminal vertices defining an instance of the CST problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
128
+ page_content=' We define a graph G⋆ = (V ⋆, E⋆) where V ⋆ = V ∪ V R, with V R = {vr 1, vr 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
129
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
130
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
131
+ page_content=' , vr ¯s−1 : r ∈ R} being a set of fictitious vertices associated with those in R, and where E⋆ = E ∪ EC ∪ ER, with EC = {(v, w): v, w ∈ V s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
132
+ page_content='t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
133
+ page_content=' (v, w) ̸∈ E} and ER = {(r, vr j): r ∈ R, j = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
134
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
135
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
136
+ page_content=' , ¯s − 1}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
137
+ page_content=' That is, G⋆ is obtained by extending G to a complete graph and by linking each terminal vertex in G to the corresponding ¯s − 1 fictitious vertices (see Figure 2 for an example).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
138
+ page_content=' For every e ∈ E⋆ we define the following edge weights: w1 e = � � � 0 if e ∈ ER 1 if e ∈ E n otherwise, (3) wj e = �n if e ∈ ER 0 otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
139
+ page_content=' ∀j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
140
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
141
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
142
+ page_content=' , ¯s (4) Let I⋆ be the resulting STSWSN-PC instance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
143
+ page_content=' 3 On the complexity of STSWSN-PC 1 3 6 7 2 4 5 8 (a) v1 1 v1 2 v3 1 v3 2 v6 1 v6 2 v7 1 v7 2 1 3 6 7 2 4 5 8 (b) Figure 2: Example of a CST instance (a), in which terminal vertices are squared-shaped, and of the corresponding STSWSN-PC instance for ¯s = 3 (b), in which fictitious vertices are diamond-shaped.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
144
+ page_content=' A Steiner tree T of G with k edges corresponds to a solution T1, T2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
145
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
146
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
147
+ page_content=' , T¯s of I⋆ having value k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
148
+ page_content=' We distinguish two cases: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
149
+ page_content=' if T is not spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr 1, vr 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
150
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
151
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
152
+ page_content=' , vr ¯s−2 be ¯s − 2 arbitrary fictitious vertices linked to r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
153
+ page_content=' One obtains T1 by extending T with all vertices in V R \\ {vr 1, vr 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
154
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
155
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
156
+ page_content=' , vr ¯s−2} (whose linking edges in ER have weight 0 in the first time slot, by (3)), by defining T2 as the spanning tree of the complete graph G⋆ \\ V (T1) involving only edges in E ∪ EC (which have weight 0 in the second time slot, by (4)) and by defining Tj = {vr j−2} for every j = 3, 4, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
157
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
158
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
159
+ page_content=' ¯s;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
160
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
161
+ page_content=' if T is spanning, let r ∈ R be an arbitrary terminal vertex of G and let vr 1, vr 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
162
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
163
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
164
+ page_content=' , vr ¯s−1 be the ¯s − 1 fictitious vertices linked to r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
165
+ page_content=' One obtains T1 by extending T with all vertices in V R \\ {vr 1, vr 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
166
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
167
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
168
+ page_content=' , vr ¯s−1}, and by defining Tj = {vr j−1} for every j = 2, 3, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
169
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
170
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
171
+ page_content=' , ¯s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
172
+ page_content=' Note that, since a spanning tree of G is also a Steiner tree, the construction in the above case 2 shows that an optimal solution to I⋆ has value at most n − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
173
+ page_content=' Then, as in Lemma 1 and Prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
174
+ page_content=' 1, it is possible to state that if T ⋆ 1 , T ⋆ 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
175
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
176
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
177
+ page_content=' , T ⋆ ¯s is an optimal solution to I⋆, the restriction of T ⋆ 1 to the vertices in V is a Steiner tree of G having the same value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
178
+ page_content=' Indeed, we first observe that T ⋆ 1 has its edges in E ∪ ER, as otherwise (3) would imply that the considered solution has weight at least n, contradicting its optimality;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
179
+ page_content=' moreover, if T ⋆ 1 is not a Steiner tree of G, there should be a vertex r ∈ R belonging to T ⋆ j with 2 ≤ j ≤ ¯s and, since T ⋆ 1 , T ⋆ 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
180
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
181
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
182
+ page_content=' , T ⋆ ¯s are connected, we have that at least one edge of ER is taken outside the first time slot;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
183
+ page_content=' then by (4), the considered solution has value at least n, again contradicting its optimality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
184
+ page_content=' The above arguments prove that the considered CST instance admits a solution if and only if the corresponding STSWSN-PC instance has value at most k, hence we have: Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
185
+ page_content=' The STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is NP-hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
186
+ page_content=' We remark that the transformation from G to G⋆ used in the above reduction does not allow to state a result similar to Cor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
187
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
188
+ page_content=' 4 Structured polynomially-solvable cases The results of Prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
189
+ page_content=' 1 and Prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
190
+ page_content=' 2 hold without making any assumption on the structure of the STSWSN-PC instances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
191
+ page_content=' Here we present two polynomially-solvable cases when the input is structured.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
192
+ page_content=' The first one generalizes the approach described in the Introduction for the case s = |V |.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
193
+ page_content=' Observation 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
194
+ page_content=' When |V | − s is constant the STSWSN-PC is solvable in polynomial time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
195
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
196
+ page_content=' When s = |V | − 1, a feasible solution contains one edge in a time slot and single vertices in all remaining time slots;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
197
+ page_content=' then an optimal solution can be determined in O(|V ||E|) time by exhaustively listing all values wj e for e ∈ E and 1 ≤ j ≤ |V | − 1 and considering the minimum one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
198
+ page_content=' A similar algorithm (of higher time complexity) can be exhibited for any constant value of |V | − s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
199
+ page_content=' 4 On the complexity of STSWSN-PC The second polynomially-solvable case relates to the graph topology: Observation 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
200
+ page_content=' If G = (V, E) is a tree, the STSWSN-PC with a fixed number ¯s ≥ 2 of time slots is solvable in polynomial time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
201
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
202
+ page_content=' We can list in O(n¯s−1) all subsets of ¯s − 1 edges whose removal decomposes G into a forest with ¯s trees.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
203
+ page_content=' For each such a subset we assign in polynomial time the corresponding trees to the ¯s time slots solving a perfect matching on the weighted complete bipartite graph B = (T ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
204
+ page_content=' S, W) where each vertex in T represents a tree, each vertex of S represents a time slot and edge eτσ ∈ W linking τ ∈ T to σ ∈ S has weight wσ(τ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
205
+ page_content=' Obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
206
+ page_content=' 2 motivates the following questions that we leave open: (i) When the number of time slots is not fixed, which is the complexity of the STSWSN-PC defined on trees?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
207
+ page_content=' (ii) Are there any other graph families (other than trees) for which the STSWSN-PC is solvable in polynomial time, at least when the number of time slots is fixed?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
208
+ page_content=' Acknowledgments The authors are grateful to Alberto Ceselli and to Emiliano Lancini for their comments on the manuscript.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
209
+ page_content=' References Adasme, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
210
+ page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
211
+ page_content=' Optimal sub-tree scheduling for wireless sensor networks with partial coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
212
+ page_content=' Computer Stan- dards & Interfaces, 61, 20–35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
213
+ page_content=' Arrighi, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
214
+ page_content=' and de Oliveira Oliveira, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
215
+ page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
216
+ page_content=' Three Is Enough for Steiner Trees.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
217
+ page_content=' In D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
218
+ page_content=' Coudert and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
219
+ page_content=' Natale, ed- itors, 19th International Symposium on Experimental Algorithms (SEA 2021), volume 190 of Leibniz International Proceedings in Informatics (LIPIcs), pages 5:1–5:15, Dagstuhl, Germany.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
220
+ page_content=' Schloss Dagstuhl – Leibniz-Zentrum f¨ur Informatik.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
221
+ page_content=' Bianchessi, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
222
+ page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
223
+ page_content=' On optimally solving sub-tree scheduling for wireless sensor networks with partial coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
224
+ page_content=' Universit`a degli Studi di Milano, http://hdl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
225
+ page_content='handle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
226
+ page_content='net/2434/934107.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
227
+ page_content=' Garey, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
228
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
229
+ page_content=' and Johnson, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
230
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
231
+ page_content=' (1990).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
232
+ page_content=' Computers and Intractability;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
233
+ page_content=' A Guide to the Theory of NP-Completeness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
234
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
235
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
236
+ page_content=' Freeman & Co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
237
+ page_content=', USA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
238
+ page_content=' Kruskal, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
239
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
240
+ page_content=' (1956).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
241
+ page_content=' On the shortest spanning subtree of a graph and the traveling salesman problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
242
+ page_content=' Proceedings of the American Mathematical Society, 7(1), 48–50.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
243
+ page_content=' M¨uller, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
244
+ page_content=' and Brandst¨adt, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
245
+ page_content=' (1987).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
246
+ page_content=' The NP-completeness of Steiner tree and dominating set for chordal bipartite graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
247
+ page_content=' Theoretical Computer Science, 53(2-3), 257–265.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
248
+ page_content=' 5' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/2tAyT4oBgHgl3EQf1vk5/content/2301.00739v1.pdf'}
6dE0T4oBgHgl3EQfvwHw/content/tmp_files/2301.02624v1.pdf.txt ADDED
@@ -0,0 +1,858 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02624v1 [math.QA] 6 Jan 2023
2
+ Shapovalov elements of classical and quantum groups
3
+ Andrey Mudrov
4
+ In memorium of Vladimir Lyachovsky
5
+ Moscow Institute of Physics and Technology,
6
+ 9 Institutskiy per., Dolgoprudny, Moscow Region, 141701, Russia,
7
+ University of Leicester,
8
+ University Road, LE1 7RH Leicester, UK,
9
+ e-mail: am405@le.ac.uk
10
+ Abstract
11
+ Shapovalov elements θβ,m of the classical or quantized universal enveloping algebra of a
12
+ simple Lie algebra g are parameterized by a positive root β and a positive integer m. They
13
+ relate the highest vector of a reducible Verma module with highest vectors of its submodules.
14
+ We obtain a factorization of θβ,m to a product of θβ,1 and calculate θβ,1 as a residue of a
15
+ matrix element of the inverse Shapovalov form via a generalized Nigel-Moshinsky algorithm.
16
+ This way we explicitly express θβ,m of a classical simple Lie algebra through the Cartan-Weyl
17
+ basis in g. In the case of quantum groups, we give an analogous formulation through the
18
+ entries of the R-matrix (quantum L-operator) in fundamental representations.
19
+ Key words: Shapovalov elements, Shapovalov form, Verma modules, singular vectors, Hasse diagrams,
20
+ R-matrix
21
+ AMS classification codes: 17B10, 17B37
22
+ 1
23
+
24
+ 1
25
+ Introduction
26
+ Category O introduced in [1] for semi-simple Lie algebras and later defined for many other classes
27
+ of algebras including quantum groups plays a fundamental role in various fields of mathematics and
28
+ mathematical physics. In particular, it accommodates finite-dimensional and numerous important
29
+ infinite dimensional representations like parabolic Verma modules and their generalizations [2].
30
+ There are distinguished objects in O called Verma modules that feature a universality property:
31
+ all simple modules in O are their quotients. The maximal proper submodule in a Verma module
32
+ is generated by extremal vectors [3], which are invariants of the positive triangular subalgebra.
33
+ This makes extremal vectors critically important in representation theory.
34
+ Extremal vectors in a Verma module Vλ are related with the vacuum vector of highest weight
35
+ λ via special elements θβ,m of the (classical or quantum) universal enveloping of the negative Borel
36
+ subalgebra that are called Shapovalov elements [4, 5]. They are parameterized with a positive
37
+ root β and an integer m ∈ N validating a De Concini-Kac-Kazhdan condition on λ.
38
+ In the
39
+ classical version, it is 2(λ + ρ, β) − m(β, β) = 0 with ρ being the half-sum of positive roots. This
40
+ condition guarantees that the Verma module is reducible. In the special case when the root β is
41
+ simple, the element θβ,m is a power f m
42
+ β of the simple root vector fβ of weight β. For non-simple
43
+ β, the Shapovalov elements are complicated polynomials in negative Chevalley generators with
44
+ coefficients in the Cartan subalgebra. It can be viewed as a function θβ,m(λ) of the highest weight
45
+ of a generic Verma module Vλ with values in the subalgebra generated by negative root vectors.
46
+ A description of extremal vectors in Verma modules over classical Kac-Moody algebras was
47
+ obtained in [6] via an interpolation procedure resulting in a calculus of polynomials with complex
48
+ exponents. Another approach based on extremal projectors [7] was employed by Zhelobenko in
49
+ [8]. He obtained θβ,m for simple Lie algebras as a product of m copies of θβ,1 with shifted weights.
50
+ The idea of factorization was also used in a construction of Shapovalov elements for contragredient
51
+ Lie superalgebras in [9].
52
+ Factorization of θβ,m into a product of polynomials of lower degree is a great simplification
53
+ that is convenient for their analysis. For example it is good for the study of the classical limit in
54
+ the case of quantum groups, which is crucial for quantization of conjugacy classes [10].
55
+ With regard to quantum groups, an inductive construction of extremal vectors in Verma mod-
56
+ ules was suggested in [11]. Explicit expressions for Shapovalov elements for the A-type appeared
57
+ in [12] and recently were obtained in [13] by other methods. It is worthy to note that ordered
58
+ PBW-like monomials in θβ,1 deliver an orthogonal basis in generic irreducible Verma modules [12].
59
+ While Zhelobenko’s factorization via extremal projectors simplifies construction of Shapovalov
60
+ 2
61
+
62
+ elements in the case of classical simple Lie algebras, there remains a problem of explicit descrip-
63
+ tion of the factors.
64
+ In this paper, we pursue an alternative approach based on the canonical
65
+ contravariant bilinear form on Verma modules. It gives expressions for all Shapovalov elements in
66
+ a factorized form through root vectors in the classical case and through elements of the R-matrix
67
+ in the adjoint representation in the case of quantum groups.
68
+ Extremal vectors generate the kernel of the canonical contravariant form on Vλ, which is a
69
+ specialization at λ of the ”universal” Shapovalov form on the Borel subalgebra [4] with values in
70
+ the Cartan subalgebra. This contravariant form itself is extremely important and has numerous
71
+ applications, see e.g. [14, 15, 16, 17]. For generic λ, the module Vλ is irreducible and the form
72
+ is non-degenerate. The inverse form gives rise to an element S of extended tensor product of
73
+ positive and negative subalgebras of the (quantized) universal enveloping algebra [18]. Sending
74
+ the positive leg of S to an auxiliary representation yields a matrix with entries in the negative
75
+ subalgebra which we call Shapovalov matrix.
76
+ Its explicit description was obtained in [18] by
77
+ generalization of Nagel-Moshinski formulas for the lowering operators of sl(n) [19]. They can also
78
+ be derived (in the quantum setting) from the ABRR equation [20] on dynamical twist [14].
79
+ Our method relates θβ,m with certain entries of the Shapovalov matrix. This point of view is
80
+ quite natural because the kernel of the contravariant form on Vλ results in poles of S. Our approach
81
+ not only provides a factorization of θβ,m to a product of θβ,1 but also an efficient description of
82
+ θβ,1 in a very elementary way, by a generalized Nagel-Moshinsky rule (3.5) using a technique of
83
+ Hasse diagrams. We do it by evaluating residues of matrix elements of S that go singular at a De
84
+ Concini-Kac-Kazhdan ”hyperplane”.
85
+ Our approach is absolutely parallel for a classical semi-simple Lie algebra g and its quantum
86
+ group Uq(g). The classical case can be processed directly or obtained as the limit case q → 1 of
87
+ the deformation parameter. Let us describe the method in more detail.
88
+ With a module V from the category O and a pair of non-zero vectors vb, va ∈ V we associate
89
+ a Shapovalov matrix element, ⟨vb|va⟩, which belongs to the negative Borel (universal enveloping)
90
+ subalgebra ˆUq(b−) rationally extended over the Cartan subalgebra. Under certain assumptions
91
+ on vb and va, such matrix elements deliver factors in θβ,m. These factors normalize positive root
92
+ vectors of a reductive Lie subalgebra l ⊂ g whose negative counterparts annihilate vb. This way
93
+ they become lowering operators in the Mickelsson algebras of the pair (g, l), [21]. When λ satisfies
94
+ the De Concini-Kac-Kazhdan condition, the factors become θβ,1 shifted by certain weights.
95
+ The vector vb should be highest for the minimal simple Lie subalgebra in g that accommodates
96
+ the root β and and its weight should satisfy the condition (νb, β) = (β,β)
97
+ 2 . For finite dimensional
98
+ V the latter is equivalent to saying that vb generates a 2-dimensional submodule of the sl(2)-
99
+ 3
100
+
101
+ subalgebra generated by the root spaces g±β.
102
+ The vector va determines a homomorphism Vλ2 → V ⊗ Vλ1, where Vλi are irreducible Verma
103
+ modules of highest weights λi and λ2 − λ1 equals the weight of va. Iteration of this construction
104
+ yields a chain of homomorphisms
105
+ Vλm → V ⊗ Vλm−1 → . . . → V ⊗m ⊗ Vλ0,
106
+ where each mapping V ⊗i ⊗ Vλm−i → V ⊗i ⊗ (V ⊗ Vλm−i−1) is identical on the factor V ⊗i. We prove
107
+ factorization of ⟨v⊗m
108
+ b
109
+ |v⊗m
110
+ a
111
+ ⟩ to a product of ⟨vb|va⟩. Then we demonstrate that, under the specified
112
+ conditions, that matrix element is proportional to θβ,m(λ) with λ0 = λ.
113
+ As a result, we obtain θβ,m(λ) as a product �m−1
114
+ i=0 θβ,1(λi). The factors θβ,1 are calculated by
115
+ a general rule (3.5) specialized to the case in Section 5. Viewed as an element of ˆUq(b−), θβ,m
116
+ becomes a product of θβ,1 shifted by the integer multiple weights of vb. This shift can be made
117
+ trivial by a choice of V if β contains a simple root α with multiplicity 1. Then θβ,m becomes the
118
+ m-th power of θβ,1.
119
+ It is worthwhile mentioning that θβ,1 can be obtained via an arbitrary auxiliary module V with
120
+ a pair of vectors (va, vb = eβva). They all coincide up to a scalar factor on the De Concini-Kac-
121
+ Kazhdan ”hyperplane” and generally differ away from it. The problem is to use θβ,1 as a factor
122
+ block for constructing θβ,m of higher m. That is why we choose (V, vb, va) in a special way as
123
+ described above. On the other hand, since the left tensor leg of S is in the positive subalgebra
124
+ Uq(g+) ⊂ Uq(g), it is the structure of Uq(g+)-submodule on V that determines θβ,1. A remarkable
125
+ fact is that the cyclic submodule Uq(g+)va in an admissible V turns out to be isomorphic to a
126
+ subquotient of the Uq(g+)-module corresponding to g/g+ in the classical limit. This means that
127
+ θβ,1 in each case can be calculated via Shapovalov matrix elements from End(g/g+) ⊗ Uq(b−), by
128
+ Theorem 5.3.
129
+ Except for Section 5, we present only the q-version of the theory. The classical case can be
130
+ obtained by sending q to 1. However the final expression for θβ,1 is greatly simplified when q = 1,
131
+ so we give a special consideration to it in the Section 5.
132
+ 2
133
+ Preliminaries
134
+ Let g be a simple complex Lie algebra and h ⊂ g its Cartan subalgebra. Fix a triangular de-
135
+ composition g = g− ⊕ h ⊕ g+ with maximal nilpotent Lie subalgebras g±. Denote by R ⊂ h∗ the
136
+ root system of g, and by R+ the subset of positive roots with basis Π of simple roots. This basis
137
+ generates a root lattice Γ ⊂ h∗ with the positive semigroup Γ+ = Z+Π ⊂ Γ.
138
+ 4
139
+
140
+ For a positive root β ∈ R+ and a simple root α ∈ Π denote by ℓα,β ∈ Z+ the multiplicity with
141
+ which α enters β, that is the α-coefficient in the expansion of β over the basis Π.
142
+ Choose an ad-invariant form ( . , . ) on g, restrict it to h, and transfer to h∗ by duality. For
143
+ every λ ∈ h∗ there is a unique element hλ ∈ h such that µ(hλ) = (µ, λ), for all µ ∈ h∗. For a
144
+ non-isotropic µ ∈ h∗ set µ∨ =
145
+ 2
146
+ (µ,µ)µ and h∨
147
+ µ =
148
+ 2
149
+ (µ,µ)hµ.
150
+ Fundamental weights are denoted by ωα, α ∈ Π.
151
+ They are determined by the system of
152
+ equations (ωα, β∨) = δα,β, for all α, β ∈ Π.
153
+ We assume that q ∈ C is not a root of unity and we understand that when saying ”all q”. By
154
+ almost all q we mean all q excepting maybe a finite set of values distinct from q = 1.
155
+ The standard Drinfeld-Jimbo quantum group Uq(g) is a complex Hopf algebra with the set of
156
+ generators eα, fα, and q±hα labeled by simple roots α and satisfying relations [22, 23]
157
+ qhαeβ = q(α,β)eβqhα,
158
+ [eα, fβ] = δα,β[hα]q,
159
+ qhαfβ = q−(α,β)fβqhα,
160
+ α, β ∈ Π.
161
+ The symbol [z]q, where z ∈ h + C, stands for
162
+ qz−q−z
163
+ q−q−1 .
164
+ The elements qhα are invertible, with
165
+ qhαq−hα = 1, while {eα}α∈Π and {fα}α∈Π also satisfy quantized Serre relations. Their exact form
166
+ is not important for this presentation, see [24] for details.
167
+ A Hopf algebra structure on Uq(g) is introduced by the comultiplication
168
+ ∆(fα) = fα ⊗ 1 + q−hα ⊗ fα,
169
+ ∆(q±hα) = q±hα ⊗ q±hα,
170
+ ∆(eα) = eα ⊗ qhα + 1 ⊗ eα
171
+ set up on the generators and extended as a homomorphism Uq(g) → Uq(g)⊗Uq(g). The antipode is
172
+ an algebra and coalgebra anti-automorphism of Uq(g) that acts on the generators by the assignment
173
+ γ(fα) = −qhαfα,
174
+ γ(q±hα) = q∓hα,
175
+ γ(eα) = −eαq−hα.
176
+ The counit homomorphism ǫ: Uq(g) → C returns
177
+ ǫ(eα) = 0,
178
+ ǫ(fα) = 0,
179
+ ǫ(qhα) = 1.
180
+ We extend the notation fα, eα to all α ∈ R+ meaning the Lusztig root vectors with respect to
181
+ some normal ordering of R+, [24]. They are known to generate a Poincare-Birkhoff-Witt (PBW)
182
+ basis in Uq(g±).
183
+ Denote by Uq(h), Uq(g+), and Uq(g−) subalgebras in Uq(g) generated by {q±hα}α∈Π, {eα}α∈Π,
184
+ and {fα}α∈Π, respectively. The quantum Borel subgroups are defined as Uq(b±) = Uq(g±)Uq(h);
185
+ they are Hopf subalgebras in Uq(g). We will also need their extended version ˆUq(b±) = Uq(g±) ˆUq(h),
186
+ where ˆUq(h) is the ring of fractions of Uq(h) over the multiplicative system generated by [hα − c]q
187
+ with α ∈ Γ+ and c ∈ Q.
188
+ 5
189
+
190
+ Given a Uq(g)-module V , a non-zero vector v is said to be of weight µ if qhαv = q(µ,α)v for all
191
+ α ∈ Π. The linear span of such vectors is denoted by V [µ]. A module V is said to be of highest
192
+ weight λ if it is generated by a weight vector v ∈ V [λ] that is killed by all eα. Such vector v is
193
+ called highest; it is defined up to a non-zero scalar multiplier.
194
+ We define an involutive coalgebra anti-automorphism and algebra automorphism σ of Uq(g)
195
+ setting it on the generators by the assignment
196
+ σ: eα �→ fα,
197
+ σ: fα �→ eα,
198
+ σ: qhα �→ q−hα.
199
+ The involution ω = γ−1 ◦ σ = σ ◦ γ is an algebra anti-automorphism of Uq(g) and preserves the
200
+ comultiplication.
201
+ A symmetric bilinear form (., .) on a g-module V is called contravariant if
202
+
203
+ xv, w
204
+
205
+ =
206
+
207
+ v, ω(x)w
208
+
209
+ for all x ∈ Uq(g), v, w ∈ V . A module of highest weight has a unique C-valued contravariant form
210
+ such that squared norm of the highest vector is 1. We call this form canonical and extend this
211
+ term to a form on tensor products that is the product of canonical forms on tensor factors. Such
212
+ a form is contravariant because ω is a coalgebra map.
213
+ Let us recall the definition of Uq(h)-valued Shapovalov form on the Borel subalgebra Uq(b−)
214
+ that was introduced for U(g) and studied in [4]. Regard Uq(b−) as a free right Uq(h)-module gen-
215
+ erated by Uq(g−). The triangular decomposition Uq(g) = Uq(g−)Uq(h)Uq(g+) facilitates projection
216
+ ℘: Uq(g) → Uq(h) along the sum g−Uq(g) + Uq(g)g+, where g−Uq(g) and Uq(g)g+ are right and
217
+ left ideals generated by positive and negative root vectors, respectively. Set
218
+ (x, y) = ℘
219
+
220
+ ω(x)y
221
+
222
+ ,
223
+ x, y ∈ Uq(g).
224
+ Thus defined the form is Uq(h)-linear and contravariant. It follows that the left ideal Uq(g)g+ is in
225
+ the kernel, so the form descends to a Uq(h)-linear form on the quotient Uq(g)/Uq(g)g+ ≃ Uq(b−).
226
+ A Verma module Vλ = Uq(g) ⊗Uq(b+) Cλ of highest weight λ ∈ h∗ is induced from the 1-
227
+ dimensional Uq(b+)-module Cλ that is trivial on Uq(g+) and returns q(λ,α) on qhα ∈ Uq(h), α ∈ Π.
228
+ Its highest vector is denoted by vλ, which is also called vacuum vector. It freely generates Vλ over
229
+ Uq(g−).
230
+ Specialization of the Shapovalov form at λ ∈ h∗ yields the canonical contravariant C-valued
231
+ form (x, y)λ = λ
232
+
233
+
234
+
235
+ ω(x)y
236
+ ��
237
+ on Vλ, upon a natural Uq(g−)-module isomorphism Uq(g−) ≃ Vλ
238
+ extending the assignment 1 �→ vλ. Conversely, the canonical contravariant form on Vλ regarded as
239
+ a function of λ descends to the Shapovalov form if one views Uq(h) as the algebra of polynomial
240
+ functions on h∗. By an abuse of terminology, we also mean by Shapovalov form the canonical
241
+ contravariant form on Vλ.
242
+ 6
243
+
244
+ It is known from [25] that the contravariant form on Vλ module goes degenerate if and only if
245
+ its highest weight is in the union of
246
+ Hβ,m = {λ ∈ h∗ | q2(λ+ρ,β)−m(β,β) = 1}
247
+ (2.1)
248
+ over β ∈ R+ and m ∈ N, where ρ = 1
249
+ 2
250
+
251
+ α∈R+ α. In the classical case q = 1, Hβ,m becomes a
252
+ Kac-Kazhdan hyperplane of weights satisfying 2(λ + ρ, β) = m(β, β).
253
+ Recall that a vector v ∈ Vλ of weight λ−µ with µ ∈ Γ+, µ ̸= 0, is called extremal if eαv = 0 for
254
+ all α ∈ Π. Extremal vectors are in the kernel of the contravariant form and generate submodules
255
+ of the corresponding highest weights. We will be interested in the special case when µ = mβ with
256
+ β ∈ R+ and m ∈ N. Then the highest weight λ has to be in Hβ,m. The image θβ,m of v under the
257
+ isomorphism Vλ → Uq(g−) is called Shapovalov element of a positive root β and degree m.
258
+ For simple β the element θβ,m is just the m-th power of the root vector, θβ,m = f m
259
+ β . For
260
+ non-simple β, it is a rational trigonometric function Hβ,m → Uq(g−). The goal of this work is to
261
+ find explicit expressions for θβ,m with non-simple β.
262
+ 3
263
+ Shapovalov inverse form and its matrix elements
264
+ Define an opposite Verma Uq(g)-module V ′
265
+ λ of lowest weight −λ as follows. The underlying vector
266
+ space of V ′
267
+ λ is taken to be Vλ, while the representation homomorphism π′
268
+ λ is twisted by σ, that is
269
+ π′
270
+ λ = πλ ◦ σ. The module V ′
271
+ λ is freely generated over Uq(g+) by its lowest vector v′
272
+ λ.
273
+ Let σλ : Vλ → V ′
274
+ λ denote the isomorphism of vector spaces, xvλ �→ σ(x)v′
275
+ λ,
276
+ x ∈ Uq(g−). It
277
+ intertwines the representations homomorphisms π′
278
+ λ◦σ = σλ◦πλ. This map relates the contravariant
279
+ form on Vλ with a Uq(g)-invariant pairing Vλ ⊗ V ′
280
+ λ → Vλ ⊗ Vλ → C.
281
+ Suppose that the module Vλ is irreducible. Then its invariant pairing is non-degenerate (as well
282
+ as the contravariant form on Vλ). The inverse form belongs to a completed tensor product V ′
283
+ λ ˆ⊗Vλ.
284
+ Under the isomorphisms Vλ → Uq(g−), V ′
285
+ λ → Uq(g+), it goes to an element that we denote by
286
+ S ∈ Uq(g+)ˆ⊗Uq(g−) and call universal Shapovalov matrix. Given a Uq(g+)-locally nilpotent Uq(g)-
287
+ module V with representation homomorphism π: Uq(g) → End(V ) the image S = (π ⊗ id)(S)
288
+ is a matrix with entries in Uq(g−). It features a rational trigonometric (rational in the classical
289
+ case) dependance on λ ∈ h∗. We will assume that V is diagonalizable with finite dimensional
290
+ weight spaces. We will also assume that V is endowed with a non-degenerate contravariant form,
291
+ for instance, if V is a tensor power of an irreducible module of highest weight. Using terminology
292
+ adopted in the quantum inverse scattering theory, we call the module V auxiliary.
293
+ 7
294
+
295
+ Varying the highest weight λ we get a rational trigonometric dependance of S. As a function of
296
+ λ, S is regarded as an element of Uq(g+)ˆ⊗ ˆUq(b−), where ˆUq(b−) is viewed as a right ˆUq(h)-module
297
+ freely generated by Uq(g−). This way the weight dependance is accommodated by the right tensor
298
+ leg of S.
299
+ An explicit expression of S in a weight basis {vi}i∈I ⊂ V , vi ∈ V [νi], can be formulated in
300
+ terms of Hasse diagram, H(V ). Such a diagram is associated with any partially ordered sets. In
301
+ our case the partial ordering is induced by the Uq(g+)-action on V . Nodes are elements of the
302
+ basis {vi}i∈I. Arrows are simple root vectors eα connecting the nodes vi
303
+
304
+ ←− vj whose weight
305
+ difference is νi − νj = α. Then a node vi is succeeding a node vj if νi − νj ∈ Γ+\{0}. The matrix
306
+ S is triangular: sii = 1 and sij = 0 if νi ̸≻ νj. The entry sij is a rational trigonometric function
307
+ h∗ → Uq(g−) taking values in the subspace of weight νj − νi ∈ −Γ+. It is also convenient to
308
+ introduce a stronger partial ordering as we will explain below.
309
+ Clearly the matrix S depends only on the Uq(b+)-module structure on V . In order to calculate
310
+ a particular element sij, we can choose a weight basis that extends a basis in the cyclic submodule
311
+ Uq(g+)vj. Then, in particular, sij = 0 if vi ̸∈ Uq(g+)vj.
312
+ We define a Hasse sub-diagram H(vi, vj) ⊂ H(V ) that comprises all possible routes from vj to
313
+ vi. A node vk ∈ H(V ) is in H(vi, vj) if and only if vi ⪰ vk ⪰ vj. The sub-diagram H(vi, vj) is
314
+ associated with a Uq(g+)-module V (vi, vj) that is the quotient of Uq(g+)vj by the sum of cyclic
315
+ submodules Uq(g+)vk ⊂ Uq(g+)vj where vk ̸∈ H(vi, vj). It is the module V (vi, vj) that is needed
316
+ to calculate a matrix element sij.
317
+ We recall a construction of S following [18]. Let {hi}rkg
318
+ i=1 ∈ h be an orthonormal basis. The
319
+ element q
320
+
321
+ i hi⊗hi belongs to a completion of Uq(h)⊗Uq(h) in the ℏ = ln q-adic topology. Choose an
322
+ R-matrix R of Uq(g) such that ˇR = q− �
323
+ i hi⊗hiR ∈ Uq(g+)ˆ⊗Uq(g−) and set C =
324
+ 1
325
+ q−q−1( ˇR − 1 ⊗ 1).
326
+ The key identity on C that facilitates the q-version of the theory is [18]
327
+ [1 ⊗ eα, C] + (eα ⊗ q−hα)C − C(eα ⊗ qhα) = eα ⊗ [hα]q,
328
+ ∀α ∈ Π.
329
+ (3.2)
330
+ In the classical limit, C = �
331
+ α∈R+ eα ⊗ fα becomes the polarized split Casimir of g without its
332
+ Cartan part. One then recovers an identity
333
+ [1 ⊗ eα, C] + [eα ⊗ 1, C] = eα ⊗ hα
334
+ (3.3)
335
+ for each simple root α.
336
+ Let cij ∈ Uq(g−) denote the entries of the matrix (π ⊗ id)(C) ∈ End(V ) ⊗ Uq(g−). We rectify
337
+ the partial ordering and the Hasse diagram H(V ) by removing arrows vi ← vj if cij = 0. This will
338
+ not affect the formula (3.5) for matrix elements of S.
339
+ 8
340
+
341
+ For each weight µ ∈ Γ+ put
342
+ ηµ = hµ + (µ, ρ) − 1
343
+ 2(µ, µ) ∈ h ⊕ C.
344
+ (3.4)
345
+ Regard ηµ as an affine function on h∗ by the assignment ηµ : ζ �→ (µ, ζ + ρ) − 1
346
+ 2(µ, µ), ζ ∈ h∗.
347
+ Observe that ηmβ = m
348
+
349
+ hβ + (β, ρ) − m
350
+ 2 (β, β)
351
+
352
+ . That is, [ηmβ(λ)]q vanishes on Hβ,m (and only on
353
+ Hβ,m in the classical case).
354
+ For a pair of non-zero vectors v, w ∈ V define a matrix element ⟨w|v⟩ = (w, S1v)S2 ∈ ˆUq(b−),
355
+ where S1 ⊗ S2 stands for a Sweedler-like notation for S and the pairing is with respect to a non-
356
+ degenerate contravariant form on V . Its specialization at a weight λ is denoted by ⟨w|v⟩λ, which
357
+ can be determined from the equality ⟨w|v⟩λvλ = ⟨w|v⟩vλ ∈ Vλ. For each w from V , the map
358
+ V → Vλ, v �→ ⟨v|w⟩vλ satisfies: eα⟨v|w⟩vλ = ⟨σ(eα)v|w⟩vλ for all α ∈ Π. This is a consequence of
359
+ Uq(g+)-invariance of the tensor S(1 ⊗ vλ) ∈ Uq(g+)ˆ⊗Vλ.
360
+ The matrix element ⟨vi|vj⟩ equals sij if (vi, vk) = δik for all k ∈ I. It will be always the case in
361
+ what follows.
362
+ Fix a ”start” node va and an ”end” node vb such that vb ≻ va. Then a re-scaled matrix element
363
+ ˇsab = −sba[ηνb−νa]qq−ηνb−νa can be calculated by the formula
364
+ ˇsba = cba +
365
+
366
+ k⩾1
367
+
368
+ vb≻vk≻...≻v1≻va
369
+ cbk . . . c1a
370
+ (−1)kqηµk . . . qηµ1
371
+ [ηµk]q . . . [ηµ1]q
372
+ ∈ ˆUq(b−),
373
+ (3.5)
374
+ where µl = νl − νa ∈ Γ+, l = 1, . . . , k. Here the summation is performed over all possible routes
375
+ (sequences of ordered nodes) from va to vb, see [18] for details.
376
+ It is straightforward that Uq(g+)-invariance of the tensor S(va ⊗ vλ) implies
377
+ eαˇsba(λ)vλ ∝ [ηνb−νa(λ)]q
378
+
379
+ k
380
+ π(eα)bkska(λ)vλ.
381
+ (3.6)
382
+ The matrix entries ska(λ) carry weight −(νb − νa − α). It follows that ˇsba(λ)vλ is an extremal
383
+ vector in Vλ for λ satisfying [ηνb−νa(λ)]q = 0 provided
384
+ 1. ˇsba(λ) ̸= 0,
385
+ 2. λ is a regular point for all ska(λ) and all α.
386
+ We aim to find an appropriate matrix element for θβ,m that satisfies these conditions.
387
+ Let V be a Uq(g)-module with a pair of vectors va, vb ∈ V such that eβva = vb for β ∈ R+. We
388
+ call the triple (V, vb, va) a β-representation.
389
+ Proposition 3.1. Let (V, vb, va) be a β-representation for β ∈ R+. Then for generic λ ∈ Hβ,1 the
390
+ vector ˇsba(λ)vλ ∈ Vλ is extremal.
391
+ 9
392
+
393
+ Proof. The factors
394
+ qηµk
395
+ [ηµk ]q in (3.5) go singular on the union of a finite number of the null-sets
396
+ {λ ∈ h∗ | [ηµk(λ)]q = 0}. None of µk is collinear to β, hence ˇsba(λ) is regular at generic λ ∈ Hβ,1.
397
+ By the same reasoning, all ska(λ) in (3.6) are regular at such λ. Finally, the first term cba (and
398
+ only this one) involves the Lusztig root vector fβ, a generator of a PBW basis in Uq(g−). It is
399
+ therefore independent of the other terms, and ˇsba(λ) ̸= 0.
400
+ Upon identification of ˆUq(b−) with rational Uq(g−)-valued functions on h∗ we conclude that ˇsba
401
+ is a Shapovalov element θβ,1 and denote it by θβ. Uniqueness of extremal vector of given weight
402
+ implies that all matrix elements ˇsba with vb = eβva deliver the same θβ, up to a scalar factor.
403
+ However, they are generally different at λ ̸∈ Hβ,m. When we aim at θβ,m with m > 1, we have to
404
+ choose matrix elements for θβ more carefully in order to use them as building blocks.
405
+ Note that it was relatively easy to secure the above two conditions in the case of m = 1. For
406
+ higher m we will opt a different strategy: we will satisfy the first condition by the very construction
407
+ and bypass a proof of the second with different arguments.
408
+ 4
409
+ Factorization of Shapovalov elements
410
+ For a positive root β ∈ Π denote by Πβ ⊂ Π the set of simple roots entering the expansion of
411
+ β over the basis Π with positive coefficients. A simple Lie subalgebra, g(β) ⊂ g, generated by
412
+ eα, fα with α ∈ Πβ is called support of β. Its universal enveloping algebra is quantized as a Hopf
413
+ subalgebra in Uq(g).
414
+ Definition 4.1. Let β ∈ R+ be a positive root and (V, vb, va) a β-representation such that eαvb = 0
415
+ for all α ∈ Π, and (νb, β∨) = 1. We call such β-representation admissible.
416
+ If a triple is (V, vb, va) is admissible then vb is the highest vector of a Uq(g)-submodule in V .
417
+ For finite dimensional dim V < ∞, vb generates a 2-dimensional submodule of the sl(2)-subalgebra
418
+ generated by fβ, eβ. The vector vb can be included in an orthonormal basis in V , as required.
419
+ Lemma 4.2. Let (V, vb, va) be an admissible β-representation. Set vm
420
+ b = v⊗m
421
+ b
422
+ ∈ V ⊗m for m ∈ N.
423
+ Pick up λ ∈ h∗ such that all Verma modules Vλk with λk = λ + kνa, k = 0, . . . , m − 1, are
424
+ irreducible. Then there is vm
425
+ a ∈ V ⊗m of weight mνa such that
426
+ ⟨vm
427
+ b |vm
428
+ a ⟩λ0 = ⟨vb|va⟩λm−1 . . . ⟨vb|va⟩λ0.
429
+ (4.7)
430
+ Proof. Let λ satisfy the required conditions. There is an equivariant map ϕk : Vλk → V ⊗ Vλk−1
431
+ sending the highest vector vλk to an extremal vector S(va ⊗ vλk−1) ∈ V ⊗ Vλk−1. Here S is the
432
+ 10
433
+
434
+ universal Shapovalov matrix of Vλk−1. Consider a chain of module homomorphisms
435
+ Vλm
436
+ ϕm
437
+ −→ V ⊗ Vλm−1
438
+ id1⊗ϕm−1
439
+ −→
440
+ V ⊗ (V ⊗ Vλm−2) → . . .
441
+ idm−1⊗ϕ1
442
+ −→
443
+ V ⊗(m−1) ⊗ (V ⊗ Vλ0),
444
+ where idk are the identity operators on V ⊗k. The vector vλm eventually goes over to S(˜vm
445
+ a ⊗ vλ0),
446
+ where ˜vm
447
+ a ∈ V ⊗m is of weight mνa. It is related with v⊗m
448
+ a
449
+ by an invertible operator from End(V ⊗m),
450
+ which is m − 1-fold dynamical twist [14].
451
+ Let us calculate ⟨vm
452
+ b |˜vm
453
+ a ⟩λ0 by pairing the tensor leg of S(˜vm
454
+ a ⊗vλ0) with vm
455
+ b = vb ⊗vm−1
456
+ b
457
+ . Using
458
+ equality S(˜vm
459
+ a ⊗ vλ0) = S
460
+
461
+ va ⊗ S(˜vm−1
462
+ a
463
+ ⊗ vλ0)
464
+
465
+ we reduce ⟨vm
466
+ b |˜vm
467
+ a ⟩λ0 to
468
+
469
+ vm−1
470
+ b
471
+ , ⟨vb|va⟩(1)
472
+ λm−1S1˜vm−1
473
+ a
474
+
475
+ ⟨vb|va⟩(2)
476
+ λm−1 S2(λ0) = ⟨vb|va⟩(2)
477
+ λm−1
478
+
479
+ ω
480
+
481
+ ⟨vb|va⟩(1)
482
+ λm−1
483
+
484
+ vm−1
485
+ b
486
+ |˜vm−1
487
+ a
488
+
489
+ λ0,
490
+ where we use the Sweedler notation ∆(x) = x(1) ⊗ x(2) ∈ Uq(b−) ⊗ Uq(g−) for the coproduct of
491
+ x ∈ Uq(g−). Since yqhαvb = ǫ(y)q(α,β)vb for all y ∈ Uq(g+) and α ∈ Γ+, we arrive at
492
+ ⟨vm
493
+ b |˜vm
494
+ a ⟩λ0 = q−(β,νb)⟨vb|va⟩λm−1⟨vm−1
495
+ b
496
+ |˜vm−1
497
+ a
498
+ ⟩λ0.
499
+ Proceeding by induction on m we conclude that ⟨vm
500
+ b |˜vm
501
+ a ⟩λ0 equals the right-hand side of (4.7), up
502
+ to the factor q−m(β,νb). Finally, set vm
503
+ a = qm(β,νb)˜vm
504
+ a . This proves the lemma for generic and hence
505
+ for all λ where the right-hand side of (4.7) makes sense.
506
+ It follows from the above factorization that the least common denominator of the extremal
507
+ vector u = S(vm
508
+ a ⊗ vλ) ∈ V ⊗m ⊗ Vλ contains
509
+ d(λ) = [ηβ(λ + (m − 1)νa)]q = [(λ + ρ, β) − m
510
+ 2 (β, β)]q.
511
+ It comes from the leftmost factor ⟨vb|va⟩λm−1 in the right-hand side of (4.7). Denote by svm
512
+ b ,vm
513
+ a (λ)
514
+ the matrix element ⟨vm
515
+ b |vm
516
+ a ⟩λ. Since d divides [ηmβ]q, the re-scaled matrix element
517
+ ˇsvm
518
+ b ,vm
519
+ a (λ) = c(λ)d(λ)svm
520
+ b ,vm
521
+ a (λ) ∝
522
+ m−1
523
+
524
+ k=0
525
+ θ(λk),
526
+ where c(λ) = −q−ηmβ(λm−1) [ηmβ(λ)]q
527
+ d(λ)
528
+ , is regular and does not vanish at generic λ ∈ Hβ,m because
529
+ d(λ) cancels the pole in ⟨vb|va⟩λm−1. Put ˇu = dk(λ)u, where k ⩾ 1 is the maximal degree of this
530
+ pole in u. It is an extremal vector in V ⊗m ⊗ Vλ that is regular at generic λ ∈ Hβ,m.
531
+ Indeed, let Hµ denote the null set {λ ∈ h∗|[ηµ(λ)]q = 0} for µ ∈ Γ+. Then the Vλ-components
532
+ of ˇu may have poles only at λ ∈ ∪µ<βHµ. But each µ is either not collinear to β or µ = lβ with
533
+ l < m. In both cases the complement to Hβ,m ∩ Hµ is dense in Hβ,m because q is not a root of
534
+ unity.
535
+ 11
536
+
537
+ Proposition 4.3. For generic λ ∈ Hβ,m, θβ,m(λ) ∝ ˇsvm
538
+ b ,vm
539
+ a (λ).
540
+ Proof. The singular vector ˇu is presentable as
541
+ ˇu = vm
542
+ a ⊗ dk(λ)vλ + . . . + vm
543
+ b ⊗ dk−1(λ)c(λ)ˇsvm
544
+ b ,vm
545
+ a (λ)vλ.
546
+ We argue that ˇu = vm
547
+ b ⊗ c(λ)ˇsvm
548
+ b ,vm
549
+ a (λ)vλ for generic λ in Hβ,m, where d(λ) = 0. Indeed, the
550
+ Vλ-components of ˇu span a Uq(g+)-submodule in Vλ. A vector of maximal weight in this span is
551
+ extremal and distinct from vλ. But θβ,m(λ)vλ is the only, up to a factor, extremal vector in Vλ,
552
+ for generic λ. Therefore k = 1 and θβ,m ∝ ˇsvm
553
+ b ,vm
554
+ a .
555
+ An admissible β-representation can be associated with every simple root α ∈ Πβ if one sets V
556
+ to be the irreducible module of highest weight
557
+ (β,β)
558
+ ℓ(α,α)ωα, where ℓ = ℓα,β is the multiplicity of α with
559
+ which it enters β. We denote this module by Vα,β. It is finite dimensional if
560
+ (β,β)
561
+ ℓ(α,α) ∈ N. Otherwise
562
+ it is a parabolic Verma module relative to a Levi subalgebra with the root basis Π\{α}, cf. the
563
+ next section.
564
+ One can pass to the ”universal form” of θβ regarding it as an element of ˆUq(b−). Then
565
+ θβ,m = (τ m−1
566
+ νb
567
+ θβ) . . . (τνbθβ) θβ,
568
+ (4.8)
569
+ where τν is an automorphism of ˆUq(h) generated by the affine shift of h∗ by the weight ν, that is,
570
+ (τνϕ)(µ) = ϕ(µ + ν), ϕ ∈ ˆUq(h), µ ∈ h∗. One may ask when the shift is trivial, τνbθβ = θβ, and
571
+ θβ,m is just the m-th power of θβ.
572
+ Proposition 4.4. Let β be a positive root. Suppose that there is α ∈ Πβ with ℓα,β = 1. Then
573
+ θβ,m = θm
574
+ β ∈ Uq(b−).
575
+ Proof. Let s ⊂ g be a semi-simple subalgebra generated by simple root vectors fµ, eµ with µ ̸= α.
576
+ Take for V the module Vα,β with highest weight φ = (β,β)
577
+ (α,α)ωα. Put vb to be the highest vector and
578
+ va ∝ fβvb.
579
+ Both va and vb can be included in an orthonormal basis because they span their weight sub-
580
+ spaces in V . Therefore ⟨vb|va⟩ = sba can be calculated by formula (3.5). We write it as
581
+ θβ(λ) = cba +
582
+
583
+ vb≻vi≻va
584
+ cbisia(λ).
585
+ The highest vector vb is killed by s−, therefore the Hasse diagram between va and vb is
586
+ vb
587
+
588
+ ←−
589
+ fαvb
590
+ . . .
591
+ va,
592
+ 12
593
+
594
+ where arrows in the suppressed part are simple root vectors from Uq(s+). But then the only copy
595
+ of fα is in cbi while all sia belong to Uq(s−) ˆUq(hs), the extended Borel subalgebra of Uq(s).
596
+ Finally, since Πs is orthogonal to νb, we have (µ, νa) = −(µ, β) for all µ ∈ R+
597
+ s . Therefore
598
+ θβ(λk) = θβ(λ − kβ),
599
+ θβ,m(λ) =
600
+ m−1
601
+
602
+ k=0
603
+ θβ(λ − kβ),
604
+ where the product is taken in the descending order from left to right. This proves the plain power
605
+ factorization because each θβ carries weight −β.
606
+ Conditions of the above proposition are fulfilled for all pairs α, β in the case of sl(n).
607
+ 5
608
+ Shapovalov elements of degree 1
609
+ In this section we describe the factor θβ entering (4.8), for a particular admissible β-representation
610
+ (V, vb, va). We give a complete solution to the problem in the classical case. In the case of q ̸= 1,
611
+ we do it up to calculation of the entries of the matrix C in a simple finite dimensional module ˜g
612
+ that is a q-deformation of the adjoint module g. Its highest weight is the maximal root, ξ ∈ R+.
613
+ To achieve our goals, we need to figure out the Hasse sub-diagram H(vb, va) ⊂ H(V ) that
614
+ comprises all possible routes from va to vb. We argue that H(vb, va) can be extracted from a
615
+ diagram H(b−) which we introduce below, and the underlying Uq(g+)-modules are isomorphic.
616
+ The Uq(g+)-module associated with H(b−) is constructed from ˜g by factoring out the span
617
+ of positive weight spaces. In order to distinguish the case of q ̸= 1 from classical and to avoid
618
+ confusion with root vectors, we will mark the nodes with tilde. Vectors ˜fη of weights −η ∈ −R+
619
+ are defined uniquely up to a sign if we normalize them by ( ˜fη, ˜fη) = 1. We may assume that they
620
+ are deformations of classical root vectors. We take ˜hα = eα ˜fα, α ∈ Π, for basis elements of zero
621
+ weight.
622
+ For example, the diagram H(b−) in the case of g = g2 is
623
+ b−
624
+ eα2
625
+ eα1
626
+ eα2
627
+ eα2
628
+ eα1
629
+ ˜hα2
630
+ ˜fα2
631
+ ˜fα1+α2
632
+ ˜fα1+2α2
633
+ ˜fα1+3α2
634
+ ˜f2α1+3α2
635
+
636
+
637
+
638
+
639
+
640
+
641
+
642
+
643
+
644
+
645
+
646
+
647
+
648
+
649
+
650
+ eα1
651
+ eα2
652
+ ˜hα1
653
+ ˜fα1
654
+
655
+
656
+
657
+
658
+
659
+
660
+
661
+
662
+ From now on we fix V = Vα,β with highest weight φ =
663
+ (β,β)
664
+ ℓα,β(α,α)ωα and highest vector vb. We
665
+ denote by l ⊂ g a reductive Lie subalgebra of maximal rank whose root system is Πl = R\{α}
666
+ and by p = l + g+ its parabolic extension.
667
+ 13
668
+
669
+ In order to construct the start node va ∈ V , we will use the following observation. Recall that
670
+ a singular vector �
671
+ i wi ⊗ vi in a tensor product W ⊗ V of two irreducible modules of highest
672
+ weight defines a Uq(g+)-homomorphism W ∗ → V (and respectively V ∗ → W).
673
+ Here W ∗ is
674
+ an irreducible Uq(g)-module of lowest weight, which is negative the highest weight of W. The
675
+ dual action is defined with the help of antipode γ in the standard way: (xϕ)(w) = ϕ
676
+
677
+ γ(x)w
678
+
679
+ ,
680
+ for x ∈ Uq(g+), w ∈ W, and ϕ ∈ W ∗. The homomorphism W ∗ → V is implemented via the
681
+ assignment ϕ �→ �
682
+ i ϕ(wi)vi. We will apply this construction to W = ˜g.
683
+ Lemma 5.1. There exists a unique, up to a scalar factor, singular vector u ∈ ˜g ⊗ V of weight φ.
684
+ Proof. Let J ⊂ Uq(g−) be the annihilator of the highest vector vb ∈ V . Singular vectors in ˜g ⊗ V
685
+ of weight φ are in bijection with vectors ˜h ∈ ˜g of zero weight killed by the left ideal σ(J) ⊂ Uq(g+).
686
+ Pick up ˜h ̸= 0 orthogonal to all µ ∈ Πl; it is unique up to a scalar factor.
687
+ The ideal J is generated by elements θ ∈ Uq(g+) such that θvb are singular vectors in the
688
+ Verma module Vφ covering V . By construction, ˜u is killed by eα ∈ J with α ∈ Πl. If θvφ ∈ Vφ
689
+ is a singular vector of weight φ − mη with η ∈ R+\R+
690
+ l , then m > 1. Indeed, since φ = lωα with
691
+ positive rational l =
692
+ (β,β)
693
+ ℓα,β(α,α), we have an inequality l(ωα, η∨) + (ρ, η∨) > 1. Then the condition
694
+ (2.1), where λ is replaced with φ and β with η, is fulfilled only if m > 1, since q is not a root of
695
+ unity. Then the element σ(θ) kills ˜h because mη with m > 1 is not a weight of ˜g.
696
+ Remark that V is finite dimensional if
697
+ (β,β)
698
+ ℓα,β(α,α) ∈ Z and a parabolic Verma module otherwise
699
+ because its highest weight is away from De Concini-Kac-Kazhdan hyperplanes Hη,m with η ∈
700
+ R+\R+
701
+ l .
702
+ Now let va ∈ V be the vector of minimal weight in the expansion u = ˜eξ ⊗ va + . . . over the
703
+ chosen basis in ˜g (we have omitted the terms of lower weights in the ˜g-factor). Notice that in
704
+ the classical case the vector fηvb does not vanish if η ∈ R+\R+
705
+ l because (η, φ) > 0. In particular,
706
+ va ∝ fξvb ̸= 0 for the maximal root ξ. For general q, va is killed by the left ideal in Uq(g+)
707
+ annihilating the lowest vector ˜fξ ∈ ˜g ≃ ˜g∗, Such va is unique in V up to a scalar factor, because
708
+ of Lemma 5.1.
709
+ Introduce a partial order on positive roots by writing µ ≺ ν iff fµ ≻ fν in H(b−). This is in
710
+ agreement with the partial order on H(g+) ⊂ H(g), which is exactly the Hasse diagram of the root
711
+ system R+, [26]. Note that α ≺ β for simple α if and only if α ∈ Πβ.
712
+ Proposition 5.2. Let u = ˜eξ ⊗ va + . . . be the singular vector from Lemma 5.1 with va ∈ V of
713
+ minimal weight in the expansion over a weight basis in ˜g. Then the Uq(g+)-module generated by
714
+ va ∈ V is isomorphic to ˜g(˜hα, ˜fξ), for almost all q.
715
+ 14
716
+
717
+ Proof. The Uq(g+)-module homomorphism ˜g → V determined by the assignment ˜fξ �→ va factors
718
+ through the quotient g(˜hα, ˜fξ) because the kernel includes all ˜fη with η ∈ R+
719
+ l , all ˜hη = eµ ˜fη with
720
+ η ∈ Πl, and all negative weight spaces. We are left to prove that it is an isomorphism on g(˜hα, ˜fξ)
721
+ for almost all q. It is sufficient to check that it is injective for q = 1 because V rationally depends
722
+ on q. But then for each positive root η subject to α ⪯ η ⪯ ξ the vector fηvb is in U(g+)fξvb and
723
+ is not zero, because (η, φ) > 0.
724
+ It follows that eβva ̸= 0 because eβ ˜fξ ̸= 0. Therefore (V, vb, va) is an admissible β-representation
725
+ for almost all q.
726
+ Let us consider the classical case in more detail. We choose h∨
727
+ α =
728
+ 2
729
+ (α,α)hα, α ∈ Π, as a basis
730
+ in h ⊂ b−, so that α(h∨
731
+ α) = 2. The root vectors fµ with µ ∈ R+ form a basis in g−. Arrows
732
+ labeled by α ∈ Π are h∨
733
+ α
734
+
735
+ ←− fα and fµ
736
+
737
+ ←− fν if µ = ν − α is a positive root. The U(g+)-module
738
+ underlying H(b−) is g/g+.
739
+ Specialization of the formula (3.5) for θβ requires the knowledge of matrix C = (π ⊗ id)(C) ∈
740
+ End(V ) ⊗ Uq(g−), which is readily available for q = 1. For ν, γ ∈ R+, denote by Cν,γ ∈ C the
741
+ scalars such that [eν, fγ] = Cν,γfγ−ν, if γ − ν ∈ R+, Cγ,γ = (β,β)
742
+ 2
743
+ ℓα,γ
744
+ ℓα,β , and Cν,γ = 0 otherwise. Then
745
+ (π ⊗ id)(C)(fγvb ⊗ 1) = vb ⊗ Cγ,γfγ +
746
+
747
+ ν≺γ
748
+ fγ−νvb ⊗ Cν,γfν,
749
+ for all γ satisfying α ⪯ γ ⪯ β. This equality yields all entries of the matrix C needed. The
750
+ formula (3.5) becomes
751
+ θβ = Cβ,βfβ +
752
+
753
+ k⩾1
754
+
755
+ ν1+...+νk+1=β
756
+ (Cνk+1,γk . . . Cν1,γ0)(fνk+1 . . . fν1)
757
+ (−1)k
758
+ ηµk . . . ηµ1
759
+ .
760
+ (5.9)
761
+ The internal summation is performed over all partitions of β to a sum of νi ∈ R+ such that all
762
+ γi = γi−1 − νi for i = 1, . . . , k with γ0 = β are in R+ and subject to α ⪯ γi. In particular,
763
+ γk = νk+1. The weights µi are defined to be µi = γ0 − γi = ν1 + . . . + νi. Note that in the q ̸= 1
764
+ case the corresponding sum may involve terms with entries of C whose weights are not roots.
765
+ Now we summarise the results of this paper.
766
+ Theorem 5.3. For each α ≺ β, the rescaled matrix element ⟨˜hα| ˜fβ⟩[ηβ]q with ˜hα, ˜fβ ∈ ˜g, is a
767
+ Shapovalov element θβ,1. For general degree m > 1, θβ,m is given by the factorization formula
768
+ (4.8) with θβ = θβ,1 and the shift weight νb =
769
+ (β,β)
770
+ ℓα,β(α,α)ωα.
771
+ Proof. Observe that summation formula (3.5) involves only the structure of Uq(g+)-module deter-
772
+ mined by the initial and final nodes. That is straightforward with regard to the matrix elements
773
+ 15
774
+
775
+ of C and also true for the Cartan factors, which depend only on weight differences (mind that
776
+ weights in a cyclic Uq(g+)-module generated by a weight vector are fixed up to a constant weight
777
+ summand). Furthermore, the nodes of the sub-diagram H(va, vb) can be included in an orthonor-
778
+ mal basis whence sba ∝ ⟨vb|va⟩. Now, for almost all q, the theorem follows from Proposition 5.2
779
+ and Proposition 4.3 with Lemma 4.2. Therefore it is true for all q where the factors (4.8) are
780
+ defined.
781
+ We remark in conclusion that for fixed β ∈ R+ one can pick up α ∈ Πβ delivering the simplest
782
+ Hasse diagram H(˜hα, ˜fβ), e.g. with the smallest fundamental group. Such diagrams can be found
783
+ amongst subdiagrams in fundamental auxiliary modules of minimal dimension. That also applies
784
+ to their associated Uq(g+)-modules. For all non-exceptional types of g, the entries of the matrix C
785
+ participating in the route summation formula are calculated in [27], Proposition 2.2. That is also
786
+ done for g2 in [28]. This makes the above description of Shapovalov elements for such quantum
787
+ groups absolutely explicit. For exceptional g of rank > 2, the problem reduces to calculation of
788
+ relevant entries of C.
789
+ In the context of quantization of semi-simple conjugacy classes [10], it is crucial to make
790
+ sure that θβ,m(λ) tends to f m
791
+ β as q → 1. Factorization (4.8) together with the route summation
792
+ formula for θβ,1 gives important information about possible singularities of θβ,m(λ) and facilitate
793
+ the analysis even without knowing the matrix elements of C.
794
+ Acknowledgement
795
+ This work is partially supported by the Moscow Institute of Physics and Technology under the
796
+ Priority 2030 Strategic Academic Leadership Program and by Russian Science Foundation grant
797
+ 23-21-00282. The author thanks Vadim Ostapenko and Vladimir Stukopin for stimulating discus-
798
+ sions.
799
+ References
800
+ [1] Bernstein, J. H., Gelfand, I. M., Gelfand, S. I.: On some category of g-modules, Funct. Anal.
801
+ Appl. 10 no. 2 (1976), 87–92.
802
+ [2] Humphreys, J. Representations of Semisimple Lie Algebras in the BGG Category O, Graduate
803
+ Studies in Mathematics 94, AMS, 2008.
804
+ 16
805
+
806
+ [3] Bernstein, J. H., Gelfand, I. M., Gelfand, S. I.: Structure of representations generated by
807
+ highest weight vectors, Funct. Anal. Appl. 5 no. 1 (1971), 1–9.
808
+ [4] Shapovalov, N. N.: On a bilinear form on the universal enveloping algebra of a complex
809
+ semisimple Lie algebra, Funkt. Anal. Appl. 6 (1972), 65–70.
810
+ [5] Carlin, K. Local systems of Shapovalov elements, Comm. Alg., 23 no. 8 (1995), 3039–3049.
811
+ [6] Malikov, F., Feigin, B., Fuchs, D.: Singular vectors in Verma modules over Kac–Moody alge-
812
+ bras, Func. An. Appl. 20 No. 2 (1986), 103–113.
813
+ [7] Asherova, R. M., Smirnov, Yu. F., and Tolstoy, V. N.: Projection operators for the simple Lie
814
+ groups, Theor. Math. Phys. 8 (1971), 813–825.
815
+ [8] Zhelobenko, D., P., Representations of reductive Lie algebras, Nauka, Moscow, 1994.
816
+ [9] Musson, I.: Shapovalov elements and the Jantzen sum formula for contragradient Lie super-
817
+ algebras, arXive:1710.10528.
818
+ [10] Mudrov, A.: Vector bundles on quantum conjugacy classes, arXiv:2201.04568.
819
+ [11] Kumar, Sh., Letzter, G.: Shapovalov determinant for restricted and quantized restricted en-
820
+ veloping algebras, Pac.J.Math. 179, No. 1, (1991), 123–161.
821
+ [12] Mudrov, A.: Orthogonal basis for the Shapovalov form on Uq(sl(n + 1)), Rev. Math. Phys,
822
+ 27 (2015), 1550004.
823
+ [13] Catoiu, S., Musson, I.: Shapovalov elements for Uq(sl(N + 1)), arXiv:2208.05831.
824
+ [14] Etingof, P., O. Schiffmann, O.: Lectures on the dynamical Yang-Baxter equation, Quantum
825
+ Groups and Lie Theory, London Math. Soc. Lecture Note Ser., Durham, 1999, vol. 290,
826
+ Cambridge Univ. Press (2001).
827
+ [15] Etingof, P.I., Kirillov, A.A., Jr, Macdonald’s polynomials and representations of quantum
828
+ groups, Math. Res. Let., 1, no.3 (1994) 279–296.
829
+ [16] Felder G., Tarasov V., Varchenko A., Monodromy of solutions of the elliptic quantum
830
+ Knizhnik-Zamolodchikov-Bernard difference equations, Internat. J. Math. 10, no. 8 (1999),
831
+ 943–975.
832
+ 17
833
+
834
+ [17] Alekseev, A. Lachowska, A.: Invariant ∗-product on coadjoint orbits and the Shapovalov
835
+ pairing, Comment. Math. Helv. 80 (2005), 795–810.
836
+ [18] Mudrov, A.: R-matrix and inverse Shapovalov form, J. Math. Phys., 57 (2016), 051706.
837
+ [19] Nagel, J. G., Moshinsky, M.: Operators that lower or raise the irreducible vector spaces of
838
+ Un−1 contained in an irreducible vector space of Un, J. Math. Phys. 6 (1965), 682–694.
839
+ [20] D. Arnaudon, E. Buffenoir, E. Ragoucy, and P. Roche, Universal solutions of quantum dy-
840
+ namical Yang-Baxter equations, Lett. Math. Phys. 44 (1998), no. 3, 201–214.
841
+ [21] Mickelsson, J.: Step algebras of semisimple Lie algebras, Rev. Mod. Phys. 4 (1973), 307–318.
842
+ [22] Drinfeld, V.: Quantum Groups. In Proc. Int. Congress of Mathematicians, Berkeley 1986,
843
+ Gleason, A. V. (eds) pp. 798–820, AMS, Providence (1987).
844
+ [23] Jimbo, M.: A q difference analog of U(g) and the Yang-Baxter equation, Lett. Math. Phys.
845
+ 10 (1985), 63–69.
846
+ [24] Chari, V. and Pressley, A.: A guide to quantum groups, Cambridge University Press, Cam-
847
+ bridge 1994.
848
+ [25] De Concini, C., Kac, V. G.: Representations of quantum groups at roots of 1, Operator
849
+ algebras, unitary representations, enveloping algebras, and invariant theory (Paris, 1989),
850
+ Progr. Math., 92 (1990), 471–506.
851
+ [26] Panyushev, D.: The poset of positive roots and its relatives, J. Alg. Comb., 23 (2006), 79–101.
852
+ [27] Ashton, T., Mudrov, A.: R-matrix and Mickelsson algebras for orthosymplectic quantum
853
+ groups, J. Math. Phys., 56 (2015), 081701.
854
+ [28] Baranov, A., Mudrov, A., and Ostapenko, V.:
855
+ Quantum exceptional group G2 and its
856
+ semisimple conjugacy classes, Alg.& Rep.Theor., 23 (2020) 1827–1848.
857
+ 18
858
+
6dE0T4oBgHgl3EQfvwHw/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
79AzT4oBgHgl3EQfSPsz/content/tmp_files/2301.01228v1.pdf.txt ADDED
@@ -0,0 +1,365 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ DMOps: Data Management Operation and Recipes
2
+ Eujeong Choi1, Chanjun Park 1 †
3
+ 1 Upstage
4
+ {eujeong, chanjun.park}@upstage.ai
5
+ Abstract
6
+ Data-centric AI has shed light on the signif-
7
+ icance of data within the machine learning
8
+ (ML) pipeline. Acknowledging its importance,
9
+ various research and policies are suggested
10
+ by academia, industry, and government depart-
11
+ ments. Although the capability of utilizing ex-
12
+ isting data is essential, the capability to build a
13
+ dataset has become more important than ever.
14
+ In consideration of this trend, we propose a
15
+ "Data Management Operation and Recipes"
16
+ that will guide the industry regardless of the
17
+ task or domain. In other words, this paper
18
+ presents the concept of DMOps derived from
19
+ real-world experience. By offering a baseline
20
+ for building data, we want to help the industry
21
+ streamline its data operation optimally.
22
+ 1
23
+ Introduction
24
+ With the emergence of Data-centric AI (Polyzotis
25
+ and Zaharia, 2021; Mazumder et al., 2022), various
26
+ in-depth research has been introduced in academia
27
+ alongside the wide range of policies from indus-
28
+ try and government departments (Pencheva et al.,
29
+ 2020).
30
+ In the case of academia, there are studies
31
+ boosting model performance through large-scale
32
+ datasets (Liu et al., 2021; Costa-jussà et al., 2022)
33
+ along with the production of benchmark datasets
34
+ for objective performance comparison between
35
+ models (Wang et al., 2018; Ruder, 2021). Further-
36
+ more, there are also benchmark datasets that spe-
37
+ cialize in specific tasks (Rajpurkar et al., 2016; Alt
38
+ et al., 2020). The government contributes to the
39
+ field by implementing public data open policies
40
+ and releasing datasets from the National Statistics
41
+ department (Panagos et al., 2012).
42
+ However, the industry frequently dives into an
43
+ untapped and specialized domain, where there is
44
+ rarely a ready-to-go dataset. Especially for B2B
45
+ companies, there is usually an urgent demand
46
+ †Corresponding author.
47
+ for data that meets the requirements of their cus-
48
+ tomers or their business items (Pustejovsky and
49
+ Stubbs, 2012). Since the open source and bench-
50
+ mark datasets are normally insufficient to meet
51
+ these specific demands, additional data production
52
+ is always a necessary step to specialize in a par-
53
+ ticular task. As a result, the majority of the AI
54
+ businesses started to build their own task-specific
55
+ datasets, alongside the emergence of companies
56
+ that specialize in operating crowd workers to meet
57
+ these demands, and research on efficient data pro-
58
+ duction on human-in-the-loop started to make ap-
59
+ pearance (Doan, 2018; Wu et al., 2022).
60
+ Despite its necessity, there has been a paucity of
61
+ studies in the field of data production. To the best of
62
+ our knowledge, there has not yet been research that
63
+ proposes the entire process starting from analyz-
64
+ ing the business standpoint to data annotation and
65
+ evaluation. Therefore, we propose a "Data Man-
66
+ agement Operation and Recipes" that will assist
67
+ in building a dataset efficiently and economically
68
+ regardless of task and domain. Specially, we pro-
69
+ pose a DMOps that can produce high-quality data
70
+ needed in manufacturing deep learning models.
71
+ 2
72
+ Proposed Data Management Operation
73
+ and Recipes (DMOps)
74
+ Data management operations involve the integra-
75
+ tion of human input and decision-making into a
76
+ data management pipeline or system. This involves
77
+ tasks such as data annotation, data quality assur-
78
+ ance, and other activities that require a human
79
+ touch. One way to implement a data management
80
+ operation is through the use of recipes. Recipes are
81
+ step-by-step instructions for performing a specific
82
+ task or set of tasks, and can be used to guide human
83
+ workers through the data management process.
84
+ Our Data Recipes consists of 12 steps. Through
85
+ these steps, we go over the entire process of data op-
86
+ eration : from establishing the goal of the project to
87
+ delivering the final data to the modeling team. The
88
+ arXiv:2301.01228v1 [cs.DB] 2 Jan 2023
89
+
90
+ name and explanation of each step is as follows.
91
+ 1. Establish the Project Goal: Analyzing the
92
+ purpose and requirements of data production
93
+ is the first step of the recipes. This step re-
94
+ quires collaboration with ML engineer teams
95
+ and business operation teams. Through com-
96
+ munication, we can decide the input and out-
97
+ put format of data that is suitable to the model
98
+ of choice, and also set data milestones that fit
99
+ the timeline of the business operation team.
100
+ 2. Secure Raw Data: Researching and collect-
101
+ ing raw data is the second step of the recipes.
102
+ Three possible cases of collecting raw data are
103
+ 1) the client providing the raw data, 2) using
104
+ open-sourced public data, and 3) purchasing
105
+ the raw data from its source platform. The
106
+ key issue here is the copyright of each data
107
+ source. License information must be checked
108
+ thoroughly, and getting a legal review is rec-
109
+ ommended before its usage.
110
+ 3. Data Pre-processing: The third step is im-
111
+ proving the quality of the raw data through
112
+ pre-processing. Basically the pre-processing
113
+ consists of two main tasks: first, adjusting the
114
+ format of data regarding its requirements, sec-
115
+ ond, filtering non-ethical, privacy invading,
116
+ and noisy data (Wiegand et al., 2018; Park
117
+ et al., 2020). This step is all about practicing
118
+ quality over quantity.
119
+ 4. Design a Data Schema: Fourth step is de-
120
+ signing an annotation system that is efficient
121
+ while containing all the information required.
122
+ We need to come up with a label system that
123
+ can represent human perception by digging
124
+ through the collected data with the aid of ML
125
+ methods such as unsupervised learning. Also,
126
+ figuring out parts that can be somewhat auto-
127
+ mated (pseudo-labeling) and parts that need
128
+ human intervention (annotating) is essential
129
+ in making the process efficient and moreover,
130
+ accurate. With few pilot annotation iterations,
131
+ the data scheme is expected to reach its opti-
132
+ mal design.
133
+ 5. Prepare a Guideline: Fifth step is the doc-
134
+ umentation of the data scheme. Its purpose
135
+ is to deliver the designed labeling system to
136
+ the expected annotators. The difficulty of the
137
+ guideline should be monitored with caution
138
+ since the clarity and detailed explanation may
139
+ be in a trade-off relationship.
140
+ 6. Recruit Annotators: Sixth step is recruiting
141
+ the annotators. The key is to select workers
142
+ that are fit for the task for an efficient and
143
+ accurate outcome. The best case would be se-
144
+ lecting those who scored high on a test similar
145
+ to the actual labeling task.
146
+ 7. Instruct Annotators: Seventh step is instruct-
147
+ ing the annotators with the guideline made
148
+ above. In this stage, two-way communication
149
+ that draws out questions and debates is the key
150
+ whereas one-sided communication is discour-
151
+ aged.
152
+ 8. Data Annotation: This is the step where
153
+ data annotators annotate the actual data. It
154
+ is the process of transferring the linguis-
155
+ tic/cognitive/visual intuition of the construc-
156
+ tor into data. Therefore, the data construction
157
+ manager must devise a way to unify the differ-
158
+ ent intuitions of different builders in a more
159
+ general line. When constructing data, it is also
160
+ key to continuously respond to the QA of data
161
+ builders.
162
+ 9. Data Inspection: This ninth step is inspecting
163
+ the annotated data. During this step, inspec-
164
+ tors must identify commonly occurring human
165
+ errors and sort out the edge cases through
166
+ discussions. Considering the nature of the
167
+ Human-in-the-loop process, this step is essen-
168
+ tial to ensure the fidelity of the dataset.
169
+ 10. Data Verification: The tenth step is verifying
170
+ the data. When inspecting data, it is necessary
171
+ to first determine whether the work has been
172
+ completed by observing the given guideline.
173
+ Also, 1) data sufficiency, 2) data diversity, 3)
174
+ data trustworthiness, 4) data privacy and se-
175
+ curity 5) data ethics suitability should be re-
176
+ viewed (Roh et al., 2019; Koo et al., 2022). Fi-
177
+ nally, data consistency can be identified based
178
+ on the inter-annotator agreement (IAA) score.
179
+ 11. Data Evaluation: Eleventh step is verifying
180
+ the quality of data through actual modeling. In
181
+ order to quantitatively verify whether the data
182
+ is made as planned, various experiments are
183
+ conducted such as checking data efficiency by
184
+ increasing the amount of data or sectioning
185
+
186
+ the data to check the consistency of its qual-
187
+ ity (Moon et al., 2021; Park et al., 2021). It is
188
+ natural to find artifacts within one’s data; after
189
+ identifying the repeated errors, revisiting the
190
+ recipes from step 5 is frequently required to
191
+ enhance the quality of data. If there are parts
192
+ that do not match our purpose while proceed-
193
+ ing the steps, we should return to stage 5 and
194
+ revise the guideline for another iteration.
195
+ 12. Data Deliverables: Final step of the recipes
196
+ is delivering the final data outcome. In other
197
+ words, it is the process of delivering annotated
198
+ data to the modeler or customer. When deliv-
199
+ ering, the versioning must be adapted to the
200
+ protocol, and it is important to reveal the fea-
201
+ tures of the data with its sample. Furthermore,
202
+ after going through the EDA process, it is rec-
203
+ ommended to deliver the data analysis and the
204
+ quality evaluation document together.
205
+ Figure 1: Process of the Data Management Operation
206
+ and Recipes (DMOps)
207
+ Why DMOps?
208
+ Due to the absence of a standard
209
+ data-building process, there are many cases where
210
+ the order of steps is mixed up or cannot be applied
211
+ task-agnostically. The "DMOps" we propose offers
212
+ a fixed process of data production, and at the same
213
+ time can be used universally regardless of the task
214
+ or domain. Therefore, our recipes can serve as a
215
+ baseline for data production.
216
+ Data is built through several stages. However the
217
+ industry does not have a unified standard of the
218
+ order to construct data, so there are many cases
219
+ where the stages are scattered or mixed up. How-
220
+ ever, when the proposed process is applied, it not
221
+ only corrects the scattered order but is also task
222
+ agnostic and can be universally applied to any do-
223
+ main. In other words, our methodology can serve
224
+ as a baseline for data construction.
225
+ 3
226
+ Conclusion and Future Works
227
+ In this paper, we proposed a DMOps that can effi-
228
+ ciently produce high-quality data with human an-
229
+ notation. The methodology is task agnostic which
230
+ allows it to serve as a baseline for any data produc-
231
+ tion. In the future, we plan to increase the reliability
232
+ of the proposed process through quantitative verifi-
233
+ cation at each stage of the process. In addition, we
234
+ intend to conduct a study to verify the difference in
235
+ data quality depending on whether the data recipes
236
+ is applied or not.
237
+ References
238
+ Christoph Alt, Aleksandra Gabryszak, and Leonhard
239
+ Hennig. 2020. Tacred revisited: A thorough evalu-
240
+ ation of the tacred relation extraction task.
241
+ arXiv
242
+ preprint arXiv:2004.14855.
243
+ Marta R Costa-jussà, James Cross, Onur Çelebi, Maha
244
+ Elbayad, Kenneth Heafield, Kevin Heffernan, Elahe
245
+ Kalbassi, Janice Lam, Daniel Licht, Jean Maillard,
246
+ et al. 2022.
247
+ No language left behind: Scaling
248
+ human-centered machine translation. arXiv preprint
249
+ arXiv:2207.04672.
250
+ AnHai Doan. 2018. Human-in-the-loop data analysis:
251
+ a personal perspective. In Proceedings of the work-
252
+ shop on human-in-the-loop data analytics, pages 1–
253
+ 6.
254
+ Seonmin Koo, Chanjun Park, Jaehyung Seo, Seungjun
255
+ Lee, Hyeonseok Moon, Jungseob Lee, and Heuiseok
256
+ Lim. 2022.
257
+ K-nct: Korean neural grammatical er-
258
+ ror correction gold-standard test set using novel
259
+ error type classification criteria.
260
+ IEEE Access,
261
+ 10:118167–118175.
262
+ Jianbang Liu, Yuqi Fang, Delong Zhu, Nachuan Ma,
263
+ Jin Pan, and Max Q-H Meng. 2021. A large-scale
264
+ dataset for benchmarking elevator button segmenta-
265
+ tion and character recognition.
266
+ In 2021 IEEE In-
267
+ ternational Conference on Robotics and Automation
268
+ (ICRA), pages 14018–14024. IEEE.
269
+ Mark Mazumder, Colby Banbury, Xiaozhe Yao, Bo-
270
+ jan Karlaš, William Gaviria Rojas, Sudnya Diamos,
271
+ Greg Diamos, Lynn He, Douwe Kiela, David Jurado,
272
+ et al. 2022. Dataperf: Benchmarks for data-centric
273
+ ai development. arXiv preprint arXiv:2207.10062.
274
+
275
+ Start
276
+
277
+ 1. Establish the
278
+ 2. Secure Raw Data
279
+ 3. Data
280
+ Project Goal
281
+ Pre-processing
282
+ 4. Design a Data
283
+ 5. Prepare a
284
+ Schema
285
+ 6. Recruit Annotators
286
+ Guideline
287
+ 7. Instruct Annotators
288
+ 8. Data Annotation
289
+ 9. Data Inspection
290
+ 10. Data Verification
291
+ 11. Data Evaluation
292
+ Pass-
293
+ 12.Data Deliverables
294
+ Rework
295
+ Task DoneHyeonseok Moon, Chanjun Park, Sugyeong Eo, Jeong-
296
+ Bae Park, and Heuiseok Lim. 2021.
297
+ Filter-mbart
298
+ based neural machine translation using parallel cor-
299
+ pus filtering. Journal of the Korea Convergence So-
300
+ ciety, 12(5):1–7.
301
+ Panos Panagos, Marc Van Liedekerke, Arwyn Jones,
302
+ and Luca Montanarella. 2012.
303
+ European soil
304
+ data centre: Response to european policy support
305
+ and public data requirements.
306
+ Land use policy,
307
+ 29(2):329–338.
308
+ Chanjun Park, Seolhwa Lee, Hyeonseok Moon, Sug-
309
+ yeong Eo, Jaehyung Seo, and Heuiseok Lim. 2021.
310
+ How should human translation coexist with nmt? ef-
311
+ ficient tool for building high quality parallel corpus.
312
+ arXiv preprint arXiv:2111.00191.
313
+ Chanjun
314
+ Park,
315
+ Yeonsu
316
+ Lee,
317
+ Chanhee
318
+ Lee,
319
+ and
320
+ Heuiseok Lim. 2020. Quality, not quantity?: Effect
321
+ of parallel corpus quantity and quality on neural ma-
322
+ chine translation. In Annual Conference on Human
323
+ and Language Technology, pages 363–368. Human
324
+ and Language Technology.
325
+ Irina Pencheva, Marc Esteve, and Slava Jankin
326
+ Mikhaylov. 2020.
327
+ Big data and ai–a transforma-
328
+ tional shift for government: So, what next for re-
329
+ search? Public Policy and Administration, 35(1):24–
330
+ 44.
331
+ Neoklis Polyzotis and Matei Zaharia. 2021. What can
332
+ data-centric ai learn from data and ml engineering?
333
+ arXiv preprint arXiv:2112.06439.
334
+ James Pustejovsky and Amber Stubbs. 2012.
335
+ Nat-
336
+ ural Language Annotation for Machine Learning:
337
+ A guide to corpus-building for applications.
338
+ "
339
+ O’Reilly Media, Inc.".
340
+ Pranav Rajpurkar, Jian Zhang, Konstantin Lopyrev, and
341
+ Percy Liang. 2016. Squad: 100,000+ questions for
342
+ machine comprehension of text.
343
+ arXiv preprint
344
+ arXiv:1606.05250.
345
+ Yuji Roh, Geon Heo, and Steven Euijong Whang.
346
+ 2019.
347
+ A survey on data collection for machine
348
+ learning: a big data-ai integration perspective. IEEE
349
+ Transactions on Knowledge and Data Engineering,
350
+ 33(4):1328–1347.
351
+ Sebastian Ruder. 2021. Challenges and opportunities
352
+ in nlp benchmarking.
353
+ Alex Wang, Amanpreet Singh, Julian Michael, Felix
354
+ Hill, Omer Levy, and Samuel R Bowman. 2018.
355
+ Glue: A multi-task benchmark and analysis platform
356
+ for natural language understanding. arXiv preprint
357
+ arXiv:1804.07461.
358
+ Michael Wiegand, Melanie Siegel, and Josef Ruppen-
359
+ hofer. 2018. Overview of the germeval 2018 shared
360
+ task on the identification of offensive language.
361
+ Xingjiao Wu, Luwei Xiao, Yixuan Sun, Junhang
362
+ Zhang, Tianlong Ma, and Liang He. 2022. A survey
363
+ of human-in-the-loop for machine learning. Future
364
+ Generation Computer Systems.
365
+
79AzT4oBgHgl3EQfSPsz/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,218 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf,len=217
2
+ page_content='DMOps: Data Management Operation and Recipes Eujeong Choi1, Chanjun Park 1 † 1 Upstage {eujeong, chanjun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
3
+ page_content='park}@upstage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
4
+ page_content='ai Abstract Data-centric AI has shed light on the signif- icance of data within the machine learning (ML) pipeline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
5
+ page_content=' Acknowledging its importance, various research and policies are suggested by academia, industry, and government depart- ments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
6
+ page_content=' Although the capability of utilizing ex- isting data is essential, the capability to build a dataset has become more important than ever.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
7
+ page_content=' In consideration of this trend, we propose a "Data Management Operation and Recipes" that will guide the industry regardless of the task or domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
8
+ page_content=' In other words, this paper presents the concept of DMOps derived from real-world experience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
9
+ page_content=' By offering a baseline for building data, we want to help the industry streamline its data operation optimally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
10
+ page_content=' 1 Introduction With the emergence of Data-centric AI (Polyzotis and Zaharia, 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
11
+ page_content=' Mazumder et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
12
+ page_content=', 2022), various in-depth research has been introduced in academia alongside the wide range of policies from indus- try and government departments (Pencheva et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
13
+ page_content=', 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
14
+ page_content=' In the case of academia, there are studies boosting model performance through large-scale datasets (Liu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
15
+ page_content=', 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
16
+ page_content=' Costa-jussà et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
17
+ page_content=', 2022) along with the production of benchmark datasets for objective performance comparison between models (Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
18
+ page_content=', 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
19
+ page_content=' Ruder, 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
20
+ page_content=' Further- more, there are also benchmark datasets that spe- cialize in specific tasks (Rajpurkar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
21
+ page_content=', 2016;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
22
+ page_content=' Alt et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
23
+ page_content=', 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
24
+ page_content=' The government contributes to the field by implementing public data open policies and releasing datasets from the National Statistics department (Panagos et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
25
+ page_content=', 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
26
+ page_content=' However, the industry frequently dives into an untapped and specialized domain, where there is rarely a ready-to-go dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
27
+ page_content=' Especially for B2B companies, there is usually an urgent demand †Corresponding author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
28
+ page_content=' for data that meets the requirements of their cus- tomers or their business items (Pustejovsky and Stubbs, 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
29
+ page_content=' Since the open source and bench- mark datasets are normally insufficient to meet these specific demands, additional data production is always a necessary step to specialize in a par- ticular task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
30
+ page_content=' As a result, the majority of the AI businesses started to build their own task-specific datasets, alongside the emergence of companies that specialize in operating crowd workers to meet these demands, and research on efficient data pro- duction on human-in-the-loop started to make ap- pearance (Doan, 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
31
+ page_content=' Wu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
32
+ page_content=', 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
33
+ page_content=' Despite its necessity, there has been a paucity of studies in the field of data production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
34
+ page_content=' To the best of our knowledge, there has not yet been research that proposes the entire process starting from analyz- ing the business standpoint to data annotation and evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
35
+ page_content=' Therefore, we propose a "Data Man- agement Operation and Recipes" that will assist in building a dataset efficiently and economically regardless of task and domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
36
+ page_content=' Specially, we pro- pose a DMOps that can produce high-quality data needed in manufacturing deep learning models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
37
+ page_content=' 2 Proposed Data Management Operation and Recipes (DMOps) Data management operations involve the integra- tion of human input and decision-making into a data management pipeline or system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
38
+ page_content=' This involves tasks such as data annotation, data quality assur- ance, and other activities that require a human touch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
39
+ page_content=' One way to implement a data management operation is through the use of recipes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
40
+ page_content=' Recipes are step-by-step instructions for performing a specific task or set of tasks, and can be used to guide human workers through the data management process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
41
+ page_content=' Our Data Recipes consists of 12 steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
42
+ page_content=' Through these steps, we go over the entire process of data op- eration : from establishing the goal of the project to delivering the final data to the modeling team.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
43
+ page_content=' The arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
44
+ page_content='01228v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
45
+ page_content='DB] 2 Jan 2023 name and explanation of each step is as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
46
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
47
+ page_content=' Establish the Project Goal: Analyzing the purpose and requirements of data production is the first step of the recipes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
48
+ page_content=' This step re- quires collaboration with ML engineer teams and business operation teams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
49
+ page_content=' Through com- munication, we can decide the input and out- put format of data that is suitable to the model of choice, and also set data milestones that fit the timeline of the business operation team.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
50
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
51
+ page_content=' Secure Raw Data: Researching and collect- ing raw data is the second step of the recipes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
52
+ page_content=' Three possible cases of collecting raw data are 1) the client providing the raw data, 2) using open-sourced public data, and 3) purchasing the raw data from its source platform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
53
+ page_content=' The key issue here is the copyright of each data source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
54
+ page_content=' License information must be checked thoroughly, and getting a legal review is rec- ommended before its usage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
55
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
56
+ page_content=' Data Pre-processing: The third step is im- proving the quality of the raw data through pre-processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
57
+ page_content=' Basically the pre-processing consists of two main tasks: first, adjusting the format of data regarding its requirements, sec- ond, filtering non-ethical, privacy invading, and noisy data (Wiegand et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
58
+ page_content=', 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
59
+ page_content=' Park et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
60
+ page_content=', 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
61
+ page_content=' This step is all about practicing quality over quantity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
62
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
63
+ page_content=' Design a Data Schema: Fourth step is de- signing an annotation system that is efficient while containing all the information required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
64
+ page_content=' We need to come up with a label system that can represent human perception by digging through the collected data with the aid of ML methods such as unsupervised learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
65
+ page_content=' Also, figuring out parts that can be somewhat auto- mated (pseudo-labeling) and parts that need human intervention (annotating) is essential in making the process efficient and moreover, accurate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
66
+ page_content=' With few pilot annotation iterations, the data scheme is expected to reach its opti- mal design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
67
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
68
+ page_content=' Prepare a Guideline: Fifth step is the doc- umentation of the data scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
69
+ page_content=' Its purpose is to deliver the designed labeling system to the expected annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
70
+ page_content=' The difficulty of the guideline should be monitored with caution since the clarity and detailed explanation may be in a trade-off relationship.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
71
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
72
+ page_content=' Recruit Annotators: Sixth step is recruiting the annotators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
73
+ page_content=' The key is to select workers that are fit for the task for an efficient and accurate outcome.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
74
+ page_content=' The best case would be se- lecting those who scored high on a test similar to the actual labeling task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
75
+ page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
76
+ page_content=' Instruct Annotators: Seventh step is instruct- ing the annotators with the guideline made above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
77
+ page_content=' In this stage, two-way communication that draws out questions and debates is the key whereas one-sided communication is discour- aged.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
78
+ page_content=' 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
79
+ page_content=' Data Annotation: This is the step where data annotators annotate the actual data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
80
+ page_content=' It is the process of transferring the linguis- tic/cognitive/visual intuition of the construc- tor into data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
81
+ page_content=' Therefore, the data construction manager must devise a way to unify the differ- ent intuitions of different builders in a more general line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
82
+ page_content=' When constructing data, it is also key to continuously respond to the QA of data builders.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
83
+ page_content=' 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
84
+ page_content=' Data Inspection: This ninth step is inspecting the annotated data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
85
+ page_content=' During this step, inspec- tors must identify commonly occurring human errors and sort out the edge cases through discussions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
86
+ page_content=' Considering the nature of the Human-in-the-loop process, this step is essen- tial to ensure the fidelity of the dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
87
+ page_content=' 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
88
+ page_content=' Data Verification: The tenth step is verifying the data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
89
+ page_content=' When inspecting data, it is necessary to first determine whether the work has been completed by observing the given guideline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
90
+ page_content=' Also, 1) data sufficiency, 2) data diversity, 3) data trustworthiness, 4) data privacy and se- curity 5) data ethics suitability should be re- viewed (Roh et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
91
+ page_content=', 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
92
+ page_content=' Koo et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
93
+ page_content=', 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
94
+ page_content=' Fi- nally, data consistency can be identified based on the inter-annotator agreement (IAA) score.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
95
+ page_content=' 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
96
+ page_content=' Data Evaluation: Eleventh step is verifying the quality of data through actual modeling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
97
+ page_content=' In order to quantitatively verify whether the data is made as planned, various experiments are conducted such as checking data efficiency by increasing the amount of data or sectioning the data to check the consistency of its qual- ity (Moon et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
98
+ page_content=', 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
99
+ page_content=' Park et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
100
+ page_content=', 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
101
+ page_content=' It is natural to find artifacts within one’s data;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
102
+ page_content=' after identifying the repeated errors, revisiting the recipes from step 5 is frequently required to enhance the quality of data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
103
+ page_content=' If there are parts that do not match our purpose while proceed- ing the steps, we should return to stage 5 and revise the guideline for another iteration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
104
+ page_content=' 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
105
+ page_content=' Data Deliverables: Final step of the recipes is delivering the final data outcome.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
106
+ page_content=' In other words, it is the process of delivering annotated data to the modeler or customer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
107
+ page_content=' When deliv- ering, the versioning must be adapted to the protocol, and it is important to reveal the fea- tures of the data with its sample.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
108
+ page_content=' Furthermore, after going through the EDA process, it is rec- ommended to deliver the data analysis and the quality evaluation document together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
109
+ page_content=' Figure 1: Process of the Data Management Operation and Recipes (DMOps) Why DMOps?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
110
+ page_content=' Due to the absence of a standard data-building process, there are many cases where the order of steps is mixed up or cannot be applied task-agnostically.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
111
+ page_content=' The "DMOps" we propose offers a fixed process of data production, and at the same time can be used universally regardless of the task or domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
112
+ page_content=' Therefore, our recipes can serve as a baseline for data production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
113
+ page_content=' Data is built through several stages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
114
+ page_content=' However the industry does not have a unified standard of the order to construct data, so there are many cases where the stages are scattered or mixed up.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
115
+ page_content=' How- ever, when the proposed process is applied, it not only corrects the scattered order but is also task agnostic and can be universally applied to any do- main.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
116
+ page_content=' In other words, our methodology can serve as a baseline for data construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
117
+ page_content=' 3 Conclusion and Future Works In this paper, we proposed a DMOps that can effi- ciently produce high-quality data with human an- notation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
118
+ page_content=' The methodology is task agnostic which allows it to serve as a baseline for any data produc- tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
119
+ page_content=' In the future, we plan to increase the reliability of the proposed process through quantitative verifi- cation at each stage of the process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
120
+ page_content=' In addition, we intend to conduct a study to verify the difference in data quality depending on whether the data recipes is applied or not.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
121
+ page_content=' References Christoph Alt, Aleksandra Gabryszak, and Leonhard Hennig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
122
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
123
+ page_content=' Tacred revisited: A thorough evalu- ation of the tacred relation extraction task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
124
+ page_content=' arXiv preprint arXiv:2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
125
+ page_content='14855.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
126
+ page_content=' Marta R Costa-jussà, James Cross, Onur Çelebi, Maha Elbayad, Kenneth Heafield, Kevin Heffernan, Elahe Kalbassi, Janice Lam, Daniel Licht, Jean Maillard, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
127
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
128
+ page_content=' No language left behind: Scaling human-centered machine translation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
129
+ page_content=' arXiv preprint arXiv:2207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
130
+ page_content='04672.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
131
+ page_content=' AnHai Doan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
132
+ page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
133
+ page_content=' Human-in-the-loop data analysis: a personal perspective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
134
+ page_content=' In Proceedings of the work- shop on human-in-the-loop data analytics, pages 1– 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
135
+ page_content=' Seonmin Koo, Chanjun Park, Jaehyung Seo, Seungjun Lee, Hyeonseok Moon, Jungseob Lee, and Heuiseok Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
136
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
137
+ page_content=' K-nct: Korean neural grammatical er- ror correction gold-standard test set using novel error type classification criteria.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
138
+ page_content=' IEEE Access, 10:118167–118175.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
139
+ page_content=' Jianbang Liu, Yuqi Fang, Delong Zhu, Nachuan Ma, Jin Pan, and Max Q-H Meng.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
140
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
141
+ page_content=' A large-scale dataset for benchmarking elevator button segmenta- tion and character recognition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
142
+ page_content=' In 2021 IEEE In- ternational Conference on Robotics and Automation (ICRA), pages 14018–14024.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
143
+ page_content=' IEEE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
144
+ page_content=' Mark Mazumder, Colby Banbury, Xiaozhe Yao, Bo- jan Karlaš, William Gaviria Rojas, Sudnya Diamos, Greg Diamos, Lynn He, Douwe Kiela, David Jurado, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
145
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
146
+ page_content=' Dataperf: Benchmarks for data-centric ai development.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
147
+ page_content=' arXiv preprint arXiv:2207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
148
+ page_content='10062.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
149
+ page_content=' Start 文 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
150
+ page_content=' Establish the 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
151
+ page_content=' Secure Raw Data 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
152
+ page_content=' Data Project Goal Pre-processing 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
153
+ page_content=' Design a Data 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
154
+ page_content=' Prepare a Schema 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
155
+ page_content=' Recruit Annotators Guideline 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
156
+ page_content=' Instruct Annotators 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
157
+ page_content=' Data Annotation 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
158
+ page_content=' Data Inspection 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
159
+ page_content=' Data Verification 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
160
+ page_content=' Data Evaluation Pass- 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
161
+ page_content='Data Deliverables Rework Task DoneHyeonseok Moon, Chanjun Park, Sugyeong Eo, Jeong- Bae Park, and Heuiseok Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
162
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
163
+ page_content=' Filter-mbart based neural machine translation using parallel cor- pus filtering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
164
+ page_content=' Journal of the Korea Convergence So- ciety, 12(5):1–7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
165
+ page_content=' Panos Panagos, Marc Van Liedekerke, Arwyn Jones, and Luca Montanarella.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
166
+ page_content=' 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
167
+ page_content=' European soil data centre: Response to european policy support and public data requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
168
+ page_content=' Land use policy, 29(2):329–338.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
169
+ page_content=' Chanjun Park, Seolhwa Lee, Hyeonseok Moon, Sug- yeong Eo, Jaehyung Seo, and Heuiseok Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
170
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
171
+ page_content=' How should human translation coexist with nmt?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
172
+ page_content=' ef- ficient tool for building high quality parallel corpus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
173
+ page_content=' arXiv preprint arXiv:2111.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
174
+ page_content='00191.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
175
+ page_content=' Chanjun Park, Yeonsu Lee, Chanhee Lee, and Heuiseok Lim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
176
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
177
+ page_content=' Quality, not quantity?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
178
+ page_content=' : Effect of parallel corpus quantity and quality on neural ma- chine translation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
179
+ page_content=' In Annual Conference on Human and Language Technology, pages 363–368.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
180
+ page_content=' Human and Language Technology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
181
+ page_content=' Irina Pencheva, Marc Esteve, and Slava Jankin Mikhaylov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
182
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
183
+ page_content=' Big data and ai–a transforma- tional shift for government: So, what next for re- search?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
184
+ page_content=' Public Policy and Administration, 35(1):24– 44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
185
+ page_content=' Neoklis Polyzotis and Matei Zaharia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
186
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
187
+ page_content=' What can data-centric ai learn from data and ml engineering?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
188
+ page_content=' arXiv preprint arXiv:2112.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
189
+ page_content='06439.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
190
+ page_content=' James Pustejovsky and Amber Stubbs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
191
+ page_content=' 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
192
+ page_content=' Nat- ural Language Annotation for Machine Learning: A guide to corpus-building for applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
193
+ page_content=' " O’Reilly Media, Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
194
+ page_content='".' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
195
+ page_content=' Pranav Rajpurkar, Jian Zhang, Konstantin Lopyrev, and Percy Liang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
196
+ page_content=' 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
197
+ page_content=' Squad: 100,000+ questions for machine comprehension of text.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
198
+ page_content=' arXiv preprint arXiv:1606.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
199
+ page_content='05250.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
200
+ page_content=' Yuji Roh, Geon Heo, and Steven Euijong Whang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
201
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
202
+ page_content=' A survey on data collection for machine learning: a big data-ai integration perspective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
203
+ page_content=' IEEE Transactions on Knowledge and Data Engineering, 33(4):1328–1347.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
204
+ page_content=' Sebastian Ruder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
205
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
206
+ page_content=' Challenges and opportunities in nlp benchmarking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
207
+ page_content=' Alex Wang, Amanpreet Singh, Julian Michael, Felix Hill, Omer Levy, and Samuel R Bowman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
208
+ page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
209
+ page_content=' Glue: A multi-task benchmark and analysis platform for natural language understanding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
210
+ page_content=' arXiv preprint arXiv:1804.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
211
+ page_content='07461.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
212
+ page_content=' Michael Wiegand, Melanie Siegel, and Josef Ruppen- hofer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
213
+ page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
214
+ page_content=' Overview of the germeval 2018 shared task on the identification of offensive language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
215
+ page_content=' Xingjiao Wu, Luwei Xiao, Yixuan Sun, Junhang Zhang, Tianlong Ma, and Liang He.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
216
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
217
+ page_content=' A survey of human-in-the-loop for machine learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
218
+ page_content=' Future Generation Computer Systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79AzT4oBgHgl3EQfSPsz/content/2301.01228v1.pdf'}
9dAyT4oBgHgl3EQfdPeW/content/tmp_files/2301.00299v1.pdf.txt ADDED
@@ -0,0 +1,1090 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00299v1 [stat.AP] 31 Dec 2022
2
+ Definition and clinical validation of Pain Patient
3
+ States from high-dimensional mobile data:
4
+ application to a chronic pain cohort
5
+ 1st Jenna M. Reinen
6
+ Digital Health
7
+ IBM Research
8
+ Yorktown Heights, NY
9
+ jenna.reinen@ibm.com
10
+ 2nd Carla Agurto
11
+ Digital Health
12
+ IBM Research
13
+ Yorktown Heights, NY
14
+ carla.agurto@ibm.com
15
+ 3rd Guillermo Cecchi
16
+ Digital Health
17
+ IBM Research
18
+ Yorktown Heights, NY
19
+ gcecchi@us.ibm.com
20
+ 4th Jeffrey L. Rogers
21
+ Digital Health
22
+ IBM Research
23
+ Yorktown Heights, NY
24
+ jeffrogers@us.ibm.com
25
+ 5th NAVITAS and ENVISION Studies Physician Author Group
26
+ Clinical Research
27
+ Boston Scientific
28
+ Valencia, CA
29
+ 6th Boston Scientific Research Scientists Consortium
30
+ Data Research and Engineering
31
+ Boston Scientific
32
+ Valencia, CA
33
+ Abstract—The technical capacity to monitor patients with a
34
+ mobile device has drastically expanded, but data produced from
35
+ this approach are often difficult to interpret. We present a
36
+ solution to produce a meaningful representation of patient status
37
+ from large, complex data streams, leveraging both a data-driven
38
+ approach, and use clinical knowledge to validate results. Data
39
+ were collected from a clinical trial enrolling chronic pain patients,
40
+ and included questionnaires, voice recordings, actigraphy, and
41
+ standard health assessments. The data were reduced using a
42
+ clustering analysis. In an initial exploratory analysis with only
43
+ questionnaire data, we found up to 3 stable cluster solutions
44
+ that grouped symptoms on a positive to negative spectrum.
45
+ Objective features (actigraphy, speech) expanded the cluster
46
+ solution granularity. Using a 5 state solution with questionnaire
47
+ and actigraphy data, we found significant correlations between
48
+ cluster properties and assessments of disability and quality-
49
+ of-life. The correlation coefficient values showed an ordinal
50
+ distinction, confirming the cluster ranking on a negative to
51
+ positive spectrum. This suggests we captured novel, distinct Pain
52
+ Patient States with this approach, even when multiple clusters
53
+ were equated on pain magnitude. Relative to using complex time
54
+ courses of many variables, Pain Patient States holds promise as
55
+ an interpretable, useful, and actionable metric for a clinician or
56
+ caregiver to simplify and provide timely delivery of care.
57
+ Index Terms—chronic pain, digital health, clustering, medical
58
+ decision making
59
+ I. INTRODUCTION
60
+ Recent advances in digital medicine have provided the
61
+ opportunity to collect large sets of clinical data to evaluate and
62
+ predict critical medical outcomes. For instance, mobile-based
63
+ applications, accelerometers, and biosensors are now ubiqui-
64
+ tous in phones and watches, enabling one to longitudinally
65
+ track variables like mobility and speech, and facilitate patient
66
+ symptom self-report. Importantly, these features may associate
67
+ with clinical meaning. Large-scale studies have shown that
68
+ data from mobile applications tracking daily activity may
69
+ predict outcomes relevant to health and illness, such as in
70
+ geriatric care and diabetes [1], [2]. Further, language can
71
+ assess affective, psycholinguistic, physiological, and cognitive
72
+ features can predict physiological and pharmacological [3],
73
+ psychiatric [4], and cognitive disease states [5]. These types
74
+ of findings have demonstrated the promise of digital health
75
+ profiles in understanding patient experience and predicting
76
+ important clinical outcomes.
77
+ Despite these advances, the size and complexity of the
78
+ clinical data generated by mobile applications is nontrivial to
79
+ interpret and apply for several reasons. First, digital healthcare
80
+ data can exist in multiple formats, creating the need to fuse
81
+ vast amount of diverse information [6]. Second, there is a
82
+ need for methods that can obtain clear data representations.
83
+ These methods should provide interpretation that are manage-
84
+ able in size, yet can maintain the characteristics of the raw
85
+ information, allowing for patients and healthcare professionals
86
+ to interpret and use the output [7]. Attempts to reduce and
87
+ understand such data in a biological context have commonly
88
+ used data-driven methods, especially those using machine
89
+ learning algorithms. This approach offers the advantage of
90
+ being able to handle large, multidimensional data sets through
91
+ the ability to recognize patterns or joint representations that
92
+ are otherwise difficult to identify using standard statistical
93
+ approaches, providing knowledge discovery about a particular
94
+ Copyright © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
95
+ including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or
96
+ lists, or reuse of any copyrighted component of this work in other works.
97
+
98
+ topic that can span time, location, and scales [8]. In particular,
99
+ clustering analysis offers the ability to collapse across oth-
100
+ erwise incomprehensible multidimensional data and observe
101
+ how features co-occur. In the case of spectrum illnesses that
102
+ incorporate a range and variety of symptoms, decomposition
103
+ can be helpful, with some outputs having an advantage in
104
+ outcomes prediction [9]. But not all results allow for interpre-
105
+ tation, and it is particularly susceptible to problems in small,
106
+ unvalidated datasets which may result in overfitting and thus
107
+ results that are not replicable or generalizable. Further, while
108
+ results from unsupervised approaches may reveal meaningful
109
+ clinical patterns, few methods exist to formally assign labels,
110
+ rank, or identify qualitative aspects from the results of data-
111
+ driven approaches through independent validation.
112
+ A prime illustration of this problem is in chronic pain, a dis-
113
+ ease affecting a substantial percentage of the population [10]
114
+ that significantly impacts general function including employ-
115
+ ment, mental health, and social interaction. This heterogeneous
116
+ condition interacts with well-characterized facets of health,
117
+ including mood, sleep, psychosocial function, medication use,
118
+ and mobility. However, the current practice for most pain
119
+ studies is to evaluate outcomes based on pain magnitude
120
+ alone, which does not consider all of the variance shown to
121
+ predict treatment success, quality-of-life (QoL), or other mea-
122
+ surements of physical, psychological, and social well-being
123
+ [11]. But, using all of these features as outcome variables
124
+ is nontrivial to compute, conceptualize, and interpret. Few
125
+ standard approaches have been developed that incorporate both
126
+ the computational methodology required to complete such
127
+ a task, and the ability to provide a clinically interpretable
128
+ summary of the output. To date, machine learning has been
129
+ used to predict pain outcomes, identify clinical subgroups
130
+ [12], extract knowledge, and detect structure in biological
131
+ and clinical features [13]. In chronic pain, while artificial
132
+ intelligence (AI) has been applied to improve diagnoses, fewer
133
+ studies apply it to the treatment and management of pain
134
+ patients [14], and analyses that use longitudinal data or clinical
135
+ validation are extremely limited.
136
+ Given the quickly expanding capacity of digital health and
137
+ learning algorithms to inform treatment outcomes in complex
138
+ illnesses, there is a benefit to developing an approach to
139
+ validate health states from multidimensional data. While it
140
+ is known that various chronic pain symptoms can co-occur,
141
+ it remains currently unknown whether symptom profiles may
142
+ be successfully organized into distinct health states. Here, we
143
+ propose a method by which we aim to identify clusters from
144
+ high-dimensional, longitudinal data in chronic pain patients,
145
+ and label them as Pain Patient States that may be operational-
146
+ ized for clinical application and decision making [15] [16].
147
+ To this end, we examined data from chronic pain patients in
148
+ three subsets of data: 1) with questionnaires only; 2) with
149
+ questionnaires plus voice data; and 3) with questionnaires
150
+ plus actigraphy data. The dimensionality of each dataset
151
+ was reduced into stable clusters using standard unsupervised
152
+ clustering algorithms. Next, we quantitatively evaluated the
153
+ clusters based on relationships to established health metrics,
154
+ using standard assessments as clinical benchmarks in chronic
155
+ pain to compare the data-driven results. A clear ordinal rank of
156
+ states emerged, allowing us to assign unique qualitative labels
157
+ even in clusters that were nearly identical in pain magnitude,
158
+ so that they may be used as clinically-informed states. This
159
+ system serves as an example of organizing diverse types of
160
+ large datasets and anchoring them to known metrics as to
161
+ evaluate treatment or assess function. Here, these formerly
162
+ convoluted data patterns may now act to contextualize signal,
163
+ rank results, track longitudinal health changes, and monitor
164
+ meaningful medical outcomes.
165
+ II. METHODS
166
+ A. Participants and Data Collection
167
+ Participants were recruited from pain clinics in on-going,
168
+ longitudinal, multi-center, clinical studies (Clinicaltrials.gov
169
+ ID: NCT01719055) aimed to understand chronic lower back
170
+ and leg pain patients who are candidates for spinal cord
171
+ stimulator (SCS) treatment (Boston Scientific, Valencia, CA).
172
+ Participants were recruited and enrolled in the NAVITAS
173
+ and/or ENVISION studies at multiple United States clinical
174
+ sites if they intended to receive or had already received an
175
+ SCS trial or implant, were at least 18 years old, and had
176
+ been diagnosed with intractable chronic neuropathic pain.
177
+ Additionally, subjects may have been previously enrolled in
178
+ the RELIEF study (Clinicaltrials.gov ID: NCT01719055). Data
179
+ were included in this analysis from each study a subject was
180
+ enrolled in. Health-related questionnaires were administered
181
+ via an at-home, custom-designed clinical study version of a
182
+ digital health ecosystem (Boston Scientific, Valencia, CA) for
183
+ up to 36 months. The questions chosen included pain-related
184
+ subjective ratings, symptoms hypothesized to contribute to
185
+ variability in pain ratings, as well as symptoms hypothesized to
186
+ be impacted by pain, specifically pain magnitude, mood, sleep,
187
+ alertness, medication use, and activity. Following enrollment,
188
+ data were collected in separate in-clinic and at-home data
189
+ streams. Mobile data analyzed here included voice recordings,
190
+ as well as daily, self-reported symptom monitoring, with the
191
+ option to respond more frequently if participants wished. In
192
+ addition, subjects were asked to wear a smartwatch to assess
193
+ mobility using accelerometer data (Galaxy Watch S2, Samsung
194
+ USA, Menlo Park, CA with custom watch application, Boston
195
+ Scientific, Valencia, CA). In-clinic assessments were collected
196
+ at the baseline (enrollment) visit, and at 1-month, 3-month,
197
+ 12-month, and optionally 24-month and 36-month visits fol-
198
+ lowing enrollment. In the present analysis, we used in-clinic
199
+ assessments to evaluate QoL [17] and disability measured by
200
+ the Oswestry Disability Index, or ODI [18] questionnaires.
201
+ B. Voice data processing
202
+ Voice recordings were collected from weekly recordings
203
+ based on prompts aimed to understand the participant’s experi-
204
+ ence with pain. Speech features for psycholinguistic, sentiment
205
+ [19], and acoustic characteristics [20], [21] were extracted
206
+ from the audio files using in-house and standard code. Age
207
+
208
+ and sex were regressed from all features. Next, to reduce di-
209
+ mensionality of these features, a principal components analysis
210
+ (PCA) was used (var ≥ 2%) to identify the decomposed
211
+ components. These components were later included in a
212
+ clustering analysis alongside the 6 features derived from the
213
+ questionnaires.
214
+ C. Actigraphy data processing
215
+ Effective mobility was derived from the watch-based actig-
216
+ raphy data. It is a novel metric of physical function and activity
217
+ meant to reflect the duration and type of activity a person
218
+ experiences beyond steps or activities of daily life. Rates of
219
+ activity were calculated into categories for each participant
220
+ throughout the day. These categories ranged from Zone 0
221
+ (e.g., resting, using a mobile device while seated) to Zone
222
+ 4 (e.g., intense or repetitive motion or vigorous exercise) and
223
+ were used along with the questionnaire data in the clustering
224
+ analysis.
225
+ D. Data and Clustering Analysis
226
+ For each participant, all available data was downloaded
227
+ and selected based on days for which all subjective features
228
+ from questionnaires (e.g., overall/leg/back pain, mood, sleep
229
+ hours, sleep quality alertness, medication use for opioid/over-
230
+ the- counter/non-opioid pain medication, activity interference
231
+ due to pain, and activities of daily life), as well as actigraphy
232
+ and voice data (where applicable) were present. Patients were
233
+ included in the analysis regardless of time point in the study
234
+ (e.g., baseline/enrollment, SCS trial period, follow-up), in the
235
+ interest of observing a spectrum of pain-related variability and
236
+ experience. However, the criteria for removing samples from
237
+ the analysis consisted of: 1) any day missing a single data
238
+ point, 2) any individual having fewer than 10 total complete
239
+ data points, and when applicable 3) individuals who wore the
240
+ smartwatch for less than 10 days. All question value responses
241
+ were normalized prior to cluster analysis to equate the different
242
+ subjective feature values across the individual question, and
243
+ data distributions were inspected for abnormalities. Next, each
244
+ question categorized to assess pain, sleep, and medication use
245
+ were averaged to produce single composite scores for each
246
+ modality; for activity, a difference score was taken between
247
+ the two questions, in which we include a penalty that account
248
+ with pain interferes with any overall activity. If any participant
249
+ had answered more than one question on a certain day, the
250
+ average of those responses was used to represent the daily
251
+ value for that category. Participants were assessed for their
252
+ average responses over time in order to determine the extent
253
+ to which some participants responded more frequently than
254
+ others, and the analysis was rerun without outliers to further
255
+ ensure cluster stability.
256
+ Cluster definitions were calculated using a k-means cluster-
257
+ ing algorithm with Euclidean distance exploring up to cluster
258
+ solutions for k = 10. Optimal k was determined using multiple
259
+ methods including sum of squares distances and silhouette
260
+ values, agglomerative analysis, and consensus clustering. To
261
+ ensure clusters were similar across subsamples of participants
262
+ exhibiting variability in number of responses included in the
263
+ analysis, we repeated the analyses in varying samples of
264
+ participants in which highly contributing participants (those
265
+ with higher daily average responses) were excluded. Next, we
266
+ employed an analogous approach to examine cluster solutions
267
+ over the course of time. Generally, we expected the clusters
268
+ to remain similar over time with some slight changes (e.g.,
269
+ higher pain prior to therapy) that would be evident in the
270
+ cluster. With this in mind, cluster solution results were then
271
+ visually inspected in order to ensure similarities in qualitative
272
+ characteristics and are discussed in the results section.
273
+ Fig. 1. Conceptual data and methods overview. (A) Data were collected from
274
+ a multi-center clinical trial recruiting participant with chronic low back and
275
+ leg pain seeking spinal cord stimulator (SCS) treatment. Both in-clinic and at-
276
+ home data collection were used to record 1) questionnaire-based daily reports
277
+ of pain, mood, activity, medication, alertness, sleep; 2) standard assessments
278
+ of QoL (EQ5D) and disability (ODI); 3) voice responses to open-ended
279
+ questions about their pain; and 4) actigraphy from a smartwatch. (B) Data from
280
+ questionnaires, voice, and actigraphy were subjected to a k-means clustering
281
+ analysis and the (C) resulting cluster representation was examined across
282
+ features. To validate these clusters, (D) centroid distance to each cluster was
283
+ compared to the clinical scores for disability and QoL allowing for (E) an
284
+ interpretation and label to be assigned to each cluster.
285
+ III. RESULTS
286
+ A. Sample demographics and data chronology
287
+ In the primary analysis including questionnaires only, 121
288
+ individuals with 11,763 samples of data were used (40.5%
289
+ male, mean age 59.4 years old, 17.6 years since pain onset).
290
+ In the analysis examining the addition of actigraphy data to
291
+ the questionnaire data, 116 individuals with 11,286 samples of
292
+ data were used (39.7% male, mean age 59.3 years old, 17.8
293
+ years since pain onset). For the analysis including voice, 2,080
294
+ samples were included.
295
+ B. Clustering results and characteristics for questionnaire
296
+ data only
297
+ Cluster definition was examined for the questionnaire-only
298
+ data for k = 2 to 10. Sum of squares distances and silhouette
299
+ analyses indicated that a cluster solution of k = 2 or 3 was
300
+ stable. Agglomerative hierarchical clustering was repeated to
301
+ validate k with cross-methodological clustering, which also
302
+ converged on a solution of k = 2 or 3. Given the relative
303
+ stability of smaller cluster solutions, we first examined a
304
+
305
+ (A)
306
+ Clinic Data
307
+ Day 5
308
+ ay 55
309
+ Mobile Data
310
+ Day 1
311
+ Day 60
312
+ (B)
313
+ Decomposed representation
314
+ (C)
315
+ Examine clusters
316
+ (D)
317
+ Compare to clinical scores
318
+ (E) Interpretation
319
+ Mooc
320
+ Disability Score = 27
321
+ Medic
322
+ Disability Score = 11
323
+ Disability Score = 52
324
+ Mobilitysimple and stable solution of k = 2. Feature characteristics
325
+ of the cluster solution for k = 2 were examined by inspecting
326
+ mean values for each feature in each cluster (Figure 2A). Re-
327
+ sults indicated a clear negative-to-positive grouping of health
328
+ features, such that the questionnaire responses of one cluster
329
+ appeared to represent a superior health state represented by
330
+ better mood, sleep, alertness and activity, and lower ratings
331
+ of pain and medication use. The other cluster appeared to
332
+ represent an inferior health state, characterized by higher pain
333
+ and medication use, with lower ratings for alertness, mood,
334
+ sleep, and activity. This analysis was repeated to exclude the
335
+ high-responder group in order to ensure that the clusters were
336
+ not being driven by the high-responders. Results indicated that
337
+ the clusters were very similar both in all participants, and
338
+ without the high-responders. Finally, the cluster solutions were
339
+ re-examined over the course of time, such that the analysis
340
+ was repeated in the baseline period prior to SCS activation,
341
+ during the first 6 months of treatment, and the subsequent 6
342
+ months of treatment. Results indicated that the cluster solution
343
+ was very similar over time, with some indication of higher
344
+ pain prior to treatment. An examination of a 3-cluster solution
345
+ revealed a third, intermediate cluster that represented a health
346
+ state similar to or in between the two states represented in
347
+ the two-cluster solution (Figure 2B). This cluster showed
348
+ relatively high ratings of alertness, mood, and sleep, but with
349
+ intermediate values for pain, activity and medication use.
350
+ A repeated analysis excluding high-responders also showed
351
+ an intermediate cluster, with values for each feature with a
352
+ magnitude between the previous two clusters.
353
+ Fig. 2. Cluster analysis for questionnaire data reveals negative and positive
354
+ symptom groups. (A) A two cluster (k = 2) solution resulting from the k-means
355
+ analysis of the questionnaire data revealed two clusters of symptoms that
356
+ stratified on a negative-to-positive spectrum of pain-related health, in which
357
+ one cluster revealed a better health state of better mood, sleep, more reported
358
+ activity and alertness, less medication usage, and lower pain. Conversely, the
359
+ other cluster depicted a worse health based on the feature means. (B) A
360
+ three cluster (k=3) solution also revealed a spectrum of positive to negative
361
+ symptom groupings, including superior and inferior states similar to k=2, with
362
+ an additional intermediate state showing moderate pain and medication use
363
+ but with high mood, sleep, activity, and alertness scores.
364
+ C. Decomposing and clustering questionnaire and voice data
365
+ Prior to clustering, the results of the principal components
366
+ analysis (PCA) of the voice features were inspected. The
367
+ results showed that 7 components were present, and character-
368
+ ized features such as voiced and unvoiced energy in a speech
369
+ signal, negative sentiment, emotional content, and acoustic
370
+ voice properties (Table 1). We repeated the clustering analysis
371
+ with each of these 7 components included along with the 6
372
+ questionnaire components. With the addition of the 7 compo-
373
+ nents, solutions for k of 2 or 5 were possible. For the k = 2
374
+ solution, results showed that in particular, component 4, which
375
+ was characterized by high loadings of negative sentiment and
376
+ acoustic features associated with emotion, tracked well with
377
+ the inferior health cluster (Figure 3A). Further, while not all
378
+ components showed the same discrimination between states as
379
+ did component 4, there was evidence that the addition of the
380
+ voice data expanded the granularity of the state solutions. This
381
+ was illustrated by the comparison of a cluster solution with
382
+ only questionnaires in which pain was stratified across 3 levels
383
+ in all states (Figure 3B). When the cluster solution included
384
+ both voice and questionnaires, pain across states expanded to
385
+ 5 levels (Figure 3C).
386
+ TABLE I
387
+ DECOMPOSITION OF VOICE FEATURES INTO 7 COMPONENTS
388
+ Fig. 3. Adding voice features to cluster analysis improves pain granularity
389
+ in state solutions. (A) Clustering analysis was run including 6 questionnaire
390
+ components and 7 voice components for a 2-state solution, indicating that
391
+ voice features denoting negative sentiment were associated with the poorer
392
+ health cluster. (B) A 5-state cluster solution without voice features reveals
393
+ three levels of pain magnitude across clusters, while the (C) addition of voice
394
+ to a 5-state cluster solution adds further granularity to pain magnitude across
395
+ clusters.
396
+ D. Clustering results and characteristics for questionnaire
397
+ and actigraphy data
398
+ Actigraphy data downloaded from the watch were parsed
399
+ into mobility Zones 0 - 4 of effective mobility. Inspection of
400
+ results indicated that these zones indeed provided granularity
401
+ that added description beyond number of steps or self-reported
402
+ ADLs (Figure 4). The clustering analysis included the 6
403
+ categories derived from the questionnaires along with the
404
+
405
+ (A)
406
+ (B)
407
+ (C)
408
+ MOOD
409
+ MOOD
410
+ MOOD
411
+ ACOUSTIC 3
412
+ ALERTNESS
413
+ ACOUSTIC 3
414
+ ALERTNESS
415
+ ACOUSTIC 2
416
+ SLEEP
417
+ ACOUSTIC 2
418
+ SLEEP
419
+ ALERTNESS
420
+ 8337S
421
+ VOICE QUAL
422
+ ACTIVITY
423
+ VOIGE QUAL
424
+ - ACTIVITY
425
+ NEGATIVE
426
+ PAIN
427
+ NEGATIVE
428
+ PAIN
429
+ EMOT
430
+ MEDS USE
431
+ ACTIVITY
432
+ EMOT
433
+ ACOUSTIC
434
+ MEDS USE
435
+ ACOUSTIC
436
+ MEDS USE
437
+ ENERGY
438
+ ENERGY
439
+ MFCC
440
+ (ACOUSTIC 1
441
+ PAIN
442
+ MECC
443
+ ACOUSTIC 1PCA
444
+ Largest Loadings
445
+ Smallest/Negative Loadings
446
+ Component Name
447
+ Content: typetoken/speech richness (psycholinguistic), Fisher SWB
448
+ Acoustic 1
449
+ Acoustic shape and characteristics of voice spectrum, RASTA #10
450
+ Acoustic: energy, spectral roll off, voicing probability,
451
+ Formant 1 (bandwidth)
452
+ MFCC
453
+ Acoustic: MFcC #2, voicing probability - may be related to how much
454
+ Acoustic: MFCC #2, RASTA #2, spectral roll off/voicing probability (how
455
+ speech is present (vowel voicing)
456
+ much a person is talking)
457
+ Acoustic: Formants 1 and 2 (modulation/harmonics of voice), energy, and
458
+ Acoustic energy
459
+ Acoustic: energy, spectral flux (voice timbre)
460
+ RASTA #5
461
+ Content: negative sentiment (VADER), negative emotion (LIWC),
462
+ Content: positive sentiment (VADER), positive emotion, tone, reward
463
+ Negative emot
464
+ "feel" words
465
+ (LIWC), compound (positive valence/intensity)
466
+ Acoustic: MFCC #3 (frequency band ~250 Hz)
467
+ Acoustic voice quality/properties: MFCC #2, spectral entropy, HNR.
468
+ Content: tone, compound (positive valence/intensity
469
+ Voice quality
470
+ unvoiced (% voice not in recording)
471
+ Acoustic: jitter features (characteristic of voice time)
472
+ Acoustic: formant 1 (modulation in larynx), unvoiced frames (% voice
473
+ Acoustic 2
474
+ Acoustic: MFCC 12, 13, 14 (higher frequencies)
475
+ not in recording), formant 2 (bandwidth), frequency at max energy
476
+ Acoustic: Formant 2 (indicative of emotional content),
477
+ Content: tone, compound (positive valence/intensity)
478
+ Acoustic 3
479
+ HNR (voice quality)
480
+ Acoustic: MFCC #4, slope of LTAS (avg spectrum)(A)
481
+ (B)
482
+ MOOD
483
+ MOOD
484
+ ALERTNESS
485
+ SLEEP
486
+ ALERTNESS
487
+ SLEEP
488
+ 8 0102 0384 0506 07
489
+ 0 0.11 0.2: 0.3
490
+ 0.6 :0.
491
+ MED.USE
492
+ -ACTIVITY
493
+ MED. USE
494
+ ACTIVITY
495
+ PAIN
496
+ PAINeffective mobility. An analysis for optimal k showed that state
497
+ solutions of up to 5 clusters was possible. These clusters
498
+ appeared to range from a ”best” state that included low pain
499
+ and medication use, and high reports of mood, sleep, alertness,
500
+ and effective mobility, to an inferior state that is associated
501
+ with high levels of pain and medication use, and low reports of
502
+ activity, mood, sleep, alertness, and effective mobility (Figure
503
+ 5).
504
+ Fig. 4. Description of effective mobility zones. Mobility data was parsed into
505
+ zones of “effective mobility” based on rates of activity calculated at regular
506
+ time window intervals throughout the day. When compared to step counts
507
+ and self-reported activities of daily life (ADLs), effective mobility showed
508
+ additional computational granularity of participant mobility.
509
+ Fig. 5.
510
+ Adding mobility features contributes to cluster dimensionality. (A)
511
+ A cluster solution including effective mobility identified 5 stable clusters for
512
+ which the addition of effective mobility may contribute to additional clusters
513
+ relative to the questionnaire-only solutions, still ranging from a negative-to-
514
+ positive spectrum and including a best and a worst state. (B) States from the
515
+ 5-cluster solution show further granularity as it pertains to patient experience
516
+ beyond the 2- and 3-state model.
517
+ E. Cluster validation and state classification
518
+ For the validation analysis, we obtained pairs of metrics
519
+ comprised of 1) distances from the cluster centroids on a given
520
+ day; and 2) responses to standard assessments (disability, or
521
+ ODI, and QoL, or EQ5D measurements focusing on Pain,
522
+ Activities, and VAS Health). These two metrics were collected
523
+ within one week of each other; any pairs with collection dates
524
+ outside of the week window were dropped from analysis. We
525
+ first calculated correlations between centroid distances of each
526
+ cluster in the two-state solution, and found that the correlations
527
+ were statistically significant and consistent in terms of direc-
528
+ tion and magnitude for the two states, indicating a clear best
529
+ and inferior state (in cluster 1 values were: disability/ODI, r =
530
+ 0.42, EQ5D Pain, r = 0.47, EQ5D Activities r = 0.37, EQ5D
531
+ VAS Health r = −0.32; all p-values <0.001, for cluster 2
532
+ values were: disability/ODI, r = −0.41, EQ5D Pain, r = −0.43,
533
+ EQ5D Activities r = −0.38, EQ5D VAS Health r = 0.28; all
534
+ p-values < 0.001). This indicated that larger centroid distances
535
+ were associated with higher values for the outcomes. Critically,
536
+ while most of the validation metric outcomes represented neg-
537
+ ative health values with increasing severity including disability,
538
+ EQ5D-Pain, EQ5D-Activities, etc., the EQ5D measure of VAS
539
+ Health represents health on a positive scale, and as expected
540
+ showed an inverse relationship to the findings above. Given
541
+ that each cluster was associated with consistent directionality
542
+ across all of the standard assessments, we were able to infer
543
+ that each of the clusters represented distinct health states,
544
+ aligned with what we would have expected to find in patients
545
+ across time.
546
+ F. Cluster validation with voice data
547
+ A similar analysis was repeated using the k = 2 cluster solu-
548
+ tion that included voice data. Results indicated that generally
549
+ the directionality of the correlations was consistent relative
550
+ to prior analyses. However, for several validation metrics, the
551
+ magnitude of the r values increased with the addition of voice
552
+ features (for disability/ODI, r = 0.47, EQ5D VAS Health r =
553
+ −0.49). In particular, assessments that may take into account
554
+ negative affect showed an increase in the correlation across
555
+ these metrics. Notably, because voice data is collected less
556
+ frequently, there was a decrease in sample size relative to
557
+ the prior analysis. That said, permutation tests were used to
558
+ compare across the two approaches and to ensure that there
559
+ were no meaningful differences due to sample size. In all
560
+ instances, permutation tests confirmed the significance of prior
561
+ findings at p < 0.05.
562
+ G. Cluster validation with actigraphy data
563
+ Next, we aimed to determine whether correlations between
564
+ centroids from a more highly dimensional state solution com-
565
+ pared to the standard assessments could provide further ordinal
566
+ information about the states. To do this, we ran a similar
567
+ analysis using the 5-state solution that was obtained with the
568
+ cluster solution including effective mobility. Here, we found
569
+ that the correlations across the 5 states also provided evidence
570
+ for a consistent ranking of those states from best to worst
571
+ (Table 2).
572
+ TABLE II
573
+ CLUSTER CHARACTERISTICS INCLUDING EFFECTIVE MOBILITY
574
+
575
+ e D
576
+ State E
577
+ 31**
578
+ r = -0.46**
579
+ 25**
580
+ r = -0.32**
581
+ 24**
582
+ r = -0.35**
583
+ 19**
584
+ r = 0.23**
585
+ .2**
586
+ r = -0.37**Metric
587
+ State A
588
+ State B
589
+ State C
590
+ State
591
+ ODI Total
592
+ r = 0.46**
593
+ r = 0.41**
594
+ r = -0.06*
595
+ r = -0.
596
+ EQ5DActivities
597
+ r = 0.28**
598
+ r = 0.26**
599
+ r = -0.09**
600
+ r = -0.
601
+ EQ5D Pain
602
+ r = 0.42**
603
+ r = 0.41**
604
+ r = -0.09**
605
+ r= -0.
606
+ EQ5D HealthVAS
607
+ r = -0.18**
608
+ r = -0.13**
609
+ r = 0.04 ns
610
+ r= 0.
611
+ EQ5D - Normed Score
612
+ r = 0.4**
613
+ r = 0.32**
614
+ r = -0.12**
615
+ r=-0Mood
616
+ (A)
617
+ (B)
618
+ State A
619
+ StateB State C State D
620
+ StateE
621
+ Average
622
+ Better
623
+ Effective
624
+ State A
625
+ Pain
626
+ mobility.
627
+ Sleep
628
+ State B
629
+ State C
630
+ State D
631
+ Medication
632
+ State E
633
+ Activities of
634
+ daily living
635
+ Mood
636
+ 70) 0.1 0.2 0.3 0. 4 0.5 0.6 0.7
637
+ Alertness
638
+ -Activity.
639
+ Sleep
640
+ Alertness
641
+ Effective
642
+ mobility
643
+ Worse
644
+ Medication
645
+ Average
646
+ PainZone 0
647
+ Resting, using a mobile phone, remote control
648
+ Zone 1
649
+ Dressing, moving around, slowing walking, stretching
650
+ Zone 2
651
+ Walking briskly, light exercise
652
+ Zone 3
653
+ Running, swimming or exercising
654
+ Zone 4
655
+ Intense or repetitive motion or vigorous exercise
656
+ Number of Steps
657
+ Self reported number of ADLs16.0
658
+ 14.3
659
+ 3000
660
+ 13.8
661
+ 13.1
662
+ 14.0
663
+ 12.9
664
+ 2425
665
+ 12.0
666
+ 2500
667
+ 11.4 Worn Hours
668
+ 11.15
669
+ 12.0
670
+ 1925
671
+ 9.3 1787
672
+ 1.2
673
+ 2000
674
+ 10.0
675
+ 8.26
676
+ 7.15 Active Hours
677
+ 7.01
678
+ 7.22
679
+ 8.0
680
+ 6.75
681
+ 4.0
682
+ 6.77
683
+ 1.3
684
+ 1500
685
+ 803
686
+ 1160
687
+ 1.2
688
+ 1.0
689
+ 1117
690
+ 1.3
691
+ 6.0
692
+ 12
693
+ 1.2
694
+ Steps
695
+ 3.3
696
+ 1000
697
+ 2.5
698
+ 2.6
699
+ 4.0
700
+ 3.3
701
+ 574
702
+ 2.6
703
+ 3.0
704
+ 3.3
705
+ 1.3
706
+ 1.4
707
+ 500
708
+ 2.0
709
+ 1.1
710
+ 12
711
+ 3.4
712
+ 1.3
713
+ 1.2
714
+ 1.5
715
+ 2.2
716
+ 2.2
717
+ 1.8
718
+ 1.3
719
+ 1.5
720
+ 0.0
721
+ 0
722
+ Day 1
723
+ Day 2
724
+ Day 3
725
+ Day 4
726
+ Day 5
727
+ Day 6
728
+ Day7H. Comparison of state timecourse to health events
729
+ In an exploratory analysis, we examined the relationship
730
+ between state expression change over time relative to known
731
+ health events. Here (see Figure 6), we first show that states
732
+ represent a more interpretable visualization of health changes
733
+ across time relative to examining the timecourse of all vari-
734
+ ables at once. Second, several exemplar patients show expected
735
+ changes in states before and after implantation of the SCS de-
736
+ vice, a procedure that involves surgery and probable eventual
737
+ pain relief.
738
+ Fig. 6. Examples of patient experiences show that states track with meaningful
739
+ clinical events. Top time course for each patient denotes state assignment,
740
+ whereas lower time course shows changes in multiple variables. Bar graphs
741
+ show the dwell time change before and after a notable event, which here
742
+ involves the implantation of a SCS device hypothesized to bring about eventual
743
+ pain relief and improvement in QoL. (Here, data in the time courses included
744
+ overall, leg, and back pain, sleep hours and quality, number of activities, pain
745
+ interference, medication usage for opioid, over-the-counter, and non-opioid
746
+ pain medications, alertness, mood, and effective mobility. States are ranked
747
+ as A > B > C > D > E, as shown in Table 2.)
748
+ IV. DISCUSSION
749
+ A. High-dimensional health data can be decomposed mean-
750
+ ingfully
751
+ Using a unique set of longitudinal questionnaire, mobility,
752
+ and speech data, we have developed a novel method to decom-
753
+ pose, group, and validate large amounts of chronic pain digital
754
+ health data. This study marks one of the only approaches to
755
+ create clinically usable pain-related categories from complex
756
+ questionnaire, mobility, and speech data across time. This
757
+ approach demonstrates that high dimensional, longitudinal
758
+ health data from chronic pain patients may be decomposed into
759
+ clusters and used to classify patients according to a holistic
760
+ status named Pain Patient States. These states have an ordinal
761
+ ranking based on clinically-validated standard health assess-
762
+ ments. Specifically, we demonstrated that in chronic pain,
763
+ we can take multiple streams of information including sleep
764
+ hours and quality, mood, pain magnitude at multiple sites,
765
+ alertness, multiple types of medication use, ADLs, actigraphy,
766
+ and speech in order to represent 3-5 Pain Patient States over
767
+ the course of time. The stable solutions that emerged from this
768
+ method suggest the discovery of distinct clinical states with
769
+ non-obvious properties that may serve as new knowledge that
770
+ informs biological mechanisms and clinical care. In addition
771
+ to the identification of these Patient Pain States, this improves
772
+ upon prior assessments and clinical trials that only use pain
773
+ magnitude as an outcome evaluation by considering a much
774
+ more comprehensive picture of patient experience in a way
775
+ that is clinically interpretable. This approach leverages both
776
+ data- and clinically-driven analyses by first using powerful
777
+ learning algorithms, and then comparing the output to standard
778
+ clinical metrics. Consequently, we are able to transform what
779
+ was previously multiple, complex time courses for hundreds
780
+ of patients into 3-5 states that are clinically contextualized,
781
+ straightforward, and meaningful.
782
+ B. The decomposition can be externally validated and ranked
783
+ We found that the resulting clusters from our analysis strat-
784
+ ified on a negative-to-positive spectrum of health in chronic
785
+ pain, and that these clusters were reliable across subsets of
786
+ individuals and over time. Importantly, these states provide
787
+ valuable, novel information per se, representing new findings
788
+ that may define patient experience. Nevertheless, because they
789
+ were derived from a purely data-driven analysis, we chose
790
+ to compare cluster characteristics to independent standard as-
791
+ sessments of disability and QoL. We found not only that good
792
+ and bad clusters associate with better and worse disability and
793
+ QoL, but that more granular state solutions had a clear ordinal
794
+ rank which contextualized the data-driven output (Table 2).
795
+ Further, in a 5-state solution (see figure 5A), only 2 levels
796
+ of discriminable pain were present for 4 states. This adds
797
+ clear dimensionality beyond what pain alone may indicate
798
+ about a patient’s well-being. Thus, we were able to assess
799
+ 5 ordinal steps of health based on multidimensional aspects,
800
+ providing evidence that we can offer a more full picture of
801
+ patient experience yet preserve interpretability, making these
802
+ states meaningful and actionable clinical information. This can
803
+ improve precision in outcomes assessments, especially as it
804
+ pertains to pain research and clinical trials.
805
+ C. Objective data adds granularity to state solutions
806
+ In particular, raw objective metrics such as actigraphy
807
+ and speech features are too complex to use without some
808
+ dimension reduction. However, actigraphy and speech offer
809
+ insight into patient experience both because they reflect a novel
810
+ behavioral measure and because they involve limited self-
811
+ assessment, which is known to be susceptible to psychological
812
+ biases. Here we showed that we were able to quantify and se-
813
+ lect features from these objective measures in a preprocessing
814
+ step, and then incorporate them into a clustering analysis. We
815
+ found that one benefit of this approach is that these types of
816
+ features indeed add dimensionality to a state solution, and the
817
+ preprocessing in this case allowed for the derived features to
818
+ add some biological interpretation. Additionally, we identified
819
+ speech features that capture negative sentiment, possibly aug-
820
+ menting the ability for the states to detect disability versus
821
+ wellness as indicated by higher correlation values between
822
+ those states and the independent assessments.
823
+
824
+ dynamic cnanges in states
825
+ State B
826
+ tateD
827
+ following implant moving
828
+ 73.3%
829
+ 0.0%
830
+ between multiple states.
831
+ State C
832
+ State D
833
+ 13.3%
834
+ toteE
835
+ 6.7%
836
+ 6.7%
837
+ to Implant
838
+ Post-Implantt30 Days
839
+ Time (Major Ticks Marked every 14 days)
840
+ PATIENT 3: DE NOVO SCS PA
841
+ A) Longitudinal State Plot for Patient 3
842
+ C) D
843
+ State A
844
+ State B
845
+ State :C
846
+ State D
847
+ State E
848
+ mplar
849
+ B) Health Outcomes Plot for Patient 3
850
+ Normalized Values
851
+ 0.8
852
+ 0.6
853
+ 0.2
854
+ Time (Major Ticks Markedevery 14 days)
855
+ Trial EndTIENT
856
+ ellTimeChange
857
+ Patient 1 achieves the State A
858
+ State A
859
+ with SCS therapy during trial and
860
+ ateC
861
+ 10.0%
862
+ 1.6%
863
+ following implant eventually
864
+ remaining stable in State B.
865
+ StateB
866
+ 86.7%
867
+ A marked reduction of dwell
868
+ ateD
869
+ time in State C and D is
870
+ 3.4%
871
+ State D
872
+ 3.3%
873
+ observed post-implant.
874
+ + Post-implant defined as days 14 to 44 days after implant to
875
+ oImplant
876
+ Post-Implantt
877
+ account for postsurgical healing.
878
+ TIENT
879
+ vellTimeChange
880
+ State C
881
+ Patient 2 achieves cycles
882
+ 10.0%
883
+ State A
884
+ State B
885
+ 13.3%
886
+ between State A and State B
887
+ 36.7%
888
+ tateD
889
+ following ScS therapy.
890
+ 80.0%
891
+ StateC
892
+ 20.0%
893
+ State E
894
+ 10.0%
895
+ StateD
896
+ 30.0%
897
+ Pre-Implant
898
+ Post-Implant+
899
+ TIENT
900
+ well TimeChange
901
+ tateC
902
+ State B
903
+ State A
904
+ Patient 3 has more
905
+ 13.3%
906
+ 10.0%
907
+ 6.7%PATIENT 1: DE NOVO SCS PA
908
+ A) Longitudinal State Plot for Patient 1
909
+ C) Dwe
910
+ State A
911
+ State B
912
+ State C
913
+ State D
914
+ State E
915
+ Trial
916
+ Trial
917
+ 5.
918
+ Start
919
+ Normalized Values
920
+ B) Health Outcomes Plot for Patient 1
921
+ Sta
922
+ 0.2
923
+ Time (Major Ticks Marked every 14 days)
924
+ Trial End to
925
+ PATIENT 2: DE NOVO SCS PA
926
+ Aj Longitudinal State Plot f
927
+ State A.
928
+ C) Dw
929
+ State B
930
+ State C
931
+ State D
932
+ State E
933
+ B) Health Outcomes Plot for Patient 2
934
+ 0.8
935
+ 0.6
936
+ 0.4D. Conclusions
937
+ Ultimately, this analysis combined AI and clinical knowl-
938
+ edge to successfully reduce complex mobile data into useful
939
+ health states that reflect important clinical time points and
940
+ changes in patient experience (Figure 6). While all approaches
941
+ should be tested and verified broadly across additional popu-
942
+ lations and data sets, this approach lays a solid foundation
943
+ by which complex datastreams may be reduced into and
944
+ authenticated as useful wellness information. We were able to
945
+ show that we could successfully use this method in patients
946
+ undergoing treatment for chronic pain, with results yielding
947
+ new, distinct representations of patient experience. These find-
948
+ ings imply it is possible to expand this approach to other
949
+ illnesses associated with heterogeneous sets of symptoms.
950
+ Finally, while we were able to compare our findings to known
951
+ metrics, the health states provide deep insights in and of
952
+ themselves that could aid a clinician in medical decision
953
+ making and patient care. Given the growing use of digital
954
+ health solutions, this approach to define Pain Patient States
955
+ holds great promise in harnessing AI-driven solutions to aid
956
+ in the care of large groups of chronic pain patients.
957
+ ACKNOWLEDGMENT
958
+ The NAVITAS and ENVISION Studies Physician Author
959
+ Group includes Richard Rauck (The Center for Clinical Re-
960
+ search), Eric Loudermilk (PCPMG Clinical Research Unit),
961
+ Julio Paez (South Lake Pain Institute), Louis Bojrab (Forest
962
+ Health Medical Center), John Noles (River Cities Interven-
963
+ tional Pain), Todd Turley (Hope Research Institute), Mohab
964
+ Ibrahim (Banner University Medical Center), Amol Patward-
965
+ han (Banner University Medical Center), James Scowcroft
966
+ (KC Pain Centers), Rene Przkora (University of Florida),
967
+ Nathan Miller (Coastal Pain and Spinal Diagnostics), and
968
+ Gassan Chaiban (Ochsner Clinic Foundation).
969
+ The Boston Scientific Research Scientists Consortium in-
970
+ cludes Dat Huynh (Boston Scientific, Data Research and
971
+ Engineering), Kristen Lechleiter (Clinical Research, Boston
972
+ Scientific), Brad Hershey (Data Research and Engineering,
973
+ Boston Scientific), Rex Woon (Data Research and Engineer-
974
+ ing, Boston Scientific), and Matt McDonald (Boston Scientific,
975
+ Data Research and Engineering).
976
+ We wish to acknowledge work by Erhan Bilal (IBM, Digital
977
+ Health) for his work on consensus clustering.
978
+ REFERENCES
979
+ [1] U. Ekelund, S. Brage, S. J. Griffin, and N. J. Wareham, “Objectively
980
+ measured moderate- and vigorous-intensity physical activity but not
981
+ sedentary time predicts insulin resistance in high-risk individuals,”
982
+ Diabetes Care, vol. 32, no. 6, pp. 1081–1086, 2009.
983
+ [2] E.
984
+ Smirnova,
985
+ A.
986
+ Leroux,
987
+ Q.
988
+ Cao,
989
+ L.
990
+ Tabacu,
991
+ V.
992
+ Zipunnikov,
993
+ C. Crainiceanu, J. K. Urbanek, and A. Newman, “The Predictive
994
+ Performance of Objective Measures of Physical Activity Derived from
995
+ Accelerometry Data for 5-Year All-Cause Mortality in Older Adults: Na-
996
+ tional Health and Nutritional Examination Survey 2003-2006,” Journals
997
+ of Gerontology - Series A Biological Sciences and Medical Sciences,
998
+ vol. 75, no. 9, pp. 1779–1785, 2020.
999
+ [3] C. Agurto, G. A. Cecchi, R. Norel, R. Ostrand, M. Kirkpatrick,
1000
+ M.
1001
+ J.
1002
+ Baggott,
1003
+ M.
1004
+ C.
1005
+ Wardle,
1006
+ H.
1007
+ de
1008
+ Wit,
1009
+ and
1010
+ G.
1011
+ Bedi,
1012
+ “Detection of acute 3,4-methylenedioxymethamphetamine (MDMA)
1013
+ effects across protocols using automated natural language processing,”
1014
+ Neuropsychopharmacology, vol. 45, no. 5, pp. 823–832, apr 2020.
1015
+ [Online]. Available: https://doi.org/10.1038/s41386-020-0620-4
1016
+ [4] C. M. Corcoran, F. Carrillo, D. Fern´andez-Slezak, G. Bedi, C. Klim,
1017
+ D. C. Javitt, C. E. Bearden, and G. A. Cecchi, “Prediction of psychosis
1018
+ across protocols and risk cohorts using automated language analysis,”
1019
+ World Psychiatry, vol. 17, no. 1, pp. 67–75, 2018.
1020
+ [5] E. Eyigoz, S. Mathur, M. Santamaria, G. Cecchi, and M. Naylor,
1021
+ “Linguistic
1022
+ markers
1023
+ predict
1024
+ onset
1025
+ of
1026
+ Alzheimer’s
1027
+ disease,”
1028
+ EClinicalMedicine, vol. 28, p. 100583, nov 2020. [Online]. Available:
1029
+ https://doi.org/10.1016/j.eclinm.2020.100583
1030
+ [6] Y. Yu, M. Li, L. Liu, Y. Li, and J. Wang, “Clinical big data and deep
1031
+ learning: Applications, challenges, and future outlooks,” in Big Data
1032
+ Mining and Analytics, 2019, pp. 288–305.
1033
+ [7] M. Ambigavathi and D. Sridharan, “Big Data Analytics in Healthcare,”
1034
+ in 2018 10th International Conference on Advanced Computing, ICoAC
1035
+ 2018, 2018.
1036
+ [8] I. D. Dinov, “Methodological challenges and analytic opportunities for
1037
+ modeling and interpreting Big Healthcare Data,” GigaScience, vol. 5,
1038
+ no. 1, pp. s13 742–016–0117–6, 2016.
1039
+ [9] J. M. Reinen, O. Y. Chen, R. M. Hutchison, B. T. Yeo, K. M. Anderson,
1040
+ M. R. Sabuncu, D. Ongur, J. L. Roffman, J. W. Smoller, J. T. Baker,
1041
+ and A. J. Holmes, “The human cortex possesses a reconfigurable
1042
+ dynamic network architecture that is disrupted in psychosis,” Nature
1043
+ Communications, vol. 9, no. 1, pp. 1–15, 2018.
1044
+ [10] C. E. Zelaya, J. M. Dahlhamer, J. W. Lucas, and E. M. Connor,
1045
+ “Chronic Pain and High-impact Chronic Pain Among U.S. Adult,”
1046
+ NCHS Data Brief 2020, Tech. Rep., 2019. [Online]. Available:
1047
+ https://www.cdc.gov/nchs/products/index.htm.
1048
+ [11] R. J. Gatchel, Y. B. Peng, M. L. Peters, P. N. Fuchs, and D. C. Turk,
1049
+ “The Biopsychosocial Approach to Chronic Pain: Scientific Advances
1050
+ and Future Directions,” Psychological Bulletin, vol. 133, no. 4, pp. 581–
1051
+ 624, 2007.
1052
+ [12] S. Mullin, J. Zola, R. Lee, J. Hu, B. MacKenzie, A. Brickman, G. Anaya,
1053
+ S. Sinha, A. Li, and P. L. Elkin, “Longitudinal K-means approaches
1054
+ to clustering and analyzing EHR opioid use trajectories for clinical
1055
+ subtypes,” Journal of Biomedical Informatics, vol. 122, p. 103889, 2021.
1056
+ [13] J. L¨otsch and A. Ultsch, “Machine learning in pain research,” Pain, vol.
1057
+ 159, no. 4, pp. 623–630, 2018.
1058
+ [14] M. D. K. Jenssen, P. A. Bakkevoll, P. D. Ngo, A. Budrionis, A. J.
1059
+ Fagerlund, M. Tayefi, J. G. Bellika, and F. Godtliebsen, “Machine
1060
+ learning in chronic pain research: A scoping review,” Applied Sciences
1061
+ (Switzerland), vol. 11, no. 7, p. 3205, 2021.
1062
+ [15] J. Reinen, S. Berger, C. Agurto, R. Ostrand, E. Loudermilk, J. Paez,
1063
+ G. Cecchi, J. Rogers, K. Lechleiter, and R. Rauch, “Defining Multi-
1064
+ Dimensional Dynamic States of Chronic Pain Using a Mobile Clinical
1065
+ Platform,” in World Institute of Pain, 2020.
1066
+ [16] M. Anitescu, A. Antony, R. Rauck, E. Loudermilk, J. Paez, L. Bojrab,
1067
+ J. Noles, T. Turley, M. Ibrahim, A. Patwardhan, J. Scowcroft, R. Przkora,
1068
+ N. Miller, G. Chaiban, D. Huynh, K. Lechleiter, B. Hershey, R. Woon,
1069
+ J. Reinen, C. Agurto, G. Cecchi, J. Rogers, and M. McDonald, “Patient
1070
+ States: Artificial Intelligence-Driven Metric Providing Comprehensive
1071
+ Yet Straightforward Understanding of Chronic Pain Patients.” in North
1072
+ American Neuromodulation Society, 2022.
1073
+ [17] T. E. Group, “EuroQol - a new facility for the measurement of health-
1074
+ related quality of life,” Health policy, vol. 16, no. 3, pp. 199–208, dec
1075
+ 1990.
1076
+ [18] J. C. T. Fairbank and P. B. Pynsent, “The Oswestry Disability Index,”
1077
+ Spine, vol. 25, no. 22, pp. 2940–2953, nov 2000. [Online]. Available:
1078
+ http://journals.lww.com/00007632-200011150-00017
1079
+ [19] J. W. Pennebaker, R. L. Boyd, K. Jordan, and K. Blackburn, “The
1080
+ development and psychometric properties of LIWC2015,” Austin, TX:
1081
+ University of Texas at Austin, 2015.
1082
+ [20] F. Eyben, M. W¨ollmer, and B. Schuller, “OpenSMILE - The Munich
1083
+ versatile and fast open-source audio feature extractor,” in MM’10 -
1084
+ Proceedings of the ACM Multimedia 2010 International Conference.
1085
+ New York, New York, USA: ACM Press, 2010, pp. 1459–1462. [Online].
1086
+ Available: http://dl.acm.org/citation.cfm?doid=1873951.1874246
1087
+ [21] N. H. de Jong and T. Wempe, “Praat script to detect syllable nuclei
1088
+ and measure speech rate automatically,” Behavior Research Methods,
1089
+ vol. 41, no. 2, pp. 385–390, 2009.
1090
+
9dAyT4oBgHgl3EQfdPeW/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
A9AzT4oBgHgl3EQfv_5R/content/tmp_files/2301.01715v1.pdf.txt ADDED
@@ -0,0 +1,808 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A Comparison of Fundamental Methods for Iso-surface
2
+ Extraction
3
+
4
+ JAN PATERA1, VÁCLAV SKALA2
5
+ Department of Computer Science and Engineering
6
+ Faculty of Applied Sciences, University of West Bohemia
7
+ Univerzitní 22, Plzeň
8
+ CZECH REPUBLIC
9
+ hopatera@kiv.zcu.cz, skala@kiv.zcu.cz
10
+ http://herakles.zcu.cz
11
+
12
+ Abstract: In this paper four fundamental methods for an iso-surface extraction are compared,
13
+ based on cell decomposition to tetrahedra. The methods are compared both on mathematically
14
+ generated data sets as well as on real data sets. The comparison using mathematical data is
15
+ made from different points of view such as area approximation, volume approximation. On
16
+ the other hand, the Hausdorff distance and root mean square are used to compare methods on
17
+ real data sets. The presented comparison can be helpful when deciding among tested methods
18
+ which one to choose, as well as when we need to compare a newly developed method with
19
+ other existing approaches.
20
+
21
+ Key-Words: Comparison, Iso-surface extraction, Error, Hausdorff distance, Volume data,
22
+ Computer graphics.
23
+
24
+ 1 Introduction
25
+
26
+ In the recent period of time volume data have started to play a significant role in many
27
+ scientific areas and are spread across many professions. In medical field, various devices,
28
+ such as Computed Tomography (CT) scanners, Magnetic Resonance Imaging (MRI) scanners
29
+ produce volume data. The volume data are also produced as a result of mathematical or
30
+ physical simulations and experiments and researchers need to visualize such data.
31
+
32
+ 1 Supported by the Ministry of Education of Czech Republic; project number MSM
33
+ 235200005 (Information Systems and Technologies)
34
+ 2 Supported by project NoE – 3DTV PLT 511568
35
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
36
+
37
+ There are two main techniques for the volume data visualization. The first approach is
38
+ based on volume rendering (ray-tracing-like methods), the second one on surface rendering
39
+ (iso-surface-extraction-like methods). The volume rendering methods are complex and work
40
+ with the whole volume data. This paper is concentrated on surface rendering methods that
41
+ visualizes surfaces stored in the volume data (so called iso-surfaces). The extracted
42
+ iso-surface is determined by a threshold value. All the points on the iso-surface have their
43
+ value equal to the threshold.
44
+ The field of the iso-surface extraction is quite large. There are many approaches used
45
+ for the iso-surface extraction such as view-dependent techniques, parallel or distributed
46
+ approaches, external memory (or sometimes called I/O) techniques, multiresolution (LOD)
47
+ based extractions and others. In general, we can describe the iso-surface generation and
48
+ visualization process with the following steps:
49
+ 1. Search for all active cells (cells that are intersected by the iso-surface)
50
+ 2. The iso-surface and normal vectors approximation within these cells (e.g. by a triangle
51
+ set)
52
+ 3. Iso-surfaces visualization (visualization of a set of triangles; different iso-surfaces can
53
+ be visualized with different colors depending on a selected threshold value, alpha
54
+ blending, etc.)
55
+ The first phase of the iso-surface extraction can be accelerated using a wide set of speed up
56
+ algorithms [7], [9], [10], [11], [17] or [18]. However, we are interested not that much in speed
57
+ of the extraction process but in properties of the output set of triangles.
58
+ As there are many various methods for the iso-surface generation and each such a
59
+ method generates generally different approximation of a searched iso-surface for a given
60
+ threshold, there is no way how to compare the resulting iso-surfaces to each other unless we
61
+ know how the iso-surface should look like. We try to compare generated iso-surfaces
62
+ produced by different methods.
63
+
64
+ Such a comparison can be made with respect to the volume data. When we generate
65
+ the volume data using some mathematical or physical model, we are able to gain some
66
+ additional information concerning the object that is utilized to make a comparison more
67
+ informative and objective. As additional information, we assume e.g. possibility to compute
68
+ area or volume of such an object. For real data sets, when we do not have any additional
69
+ information concerning the scanned object, we can just use general approaches for
70
+ comparison, such as Hausdorff distance or root mean square (RMS) distance.
71
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
72
+
73
+
74
+ This paper is organized in the following way. At first, compared methods are
75
+ described. Afterwards, we will explain used approaches for the comparison and how the data
76
+ are generated. The last two sections are devoted to the error analysis, methods comparisons
77
+ and conclusion.
78
+
79
+ 2 Method Description
80
+
81
+ 2.1 Marching Cubes
82
+
83
+ There are many kinds of volume data. From simulations, we often get unstructured volume
84
+ data. In the other hand from medical imaging the output data is structured one. We aimed at
85
+ comparison of iso-surface generation methods that are used for structured data, especially for
86
+ regular grids. Compared methods do not differ in the kind of used interpolation but only in the
87
+ way they divide a cell into tetrahedra. The well-known method is Marching Cubes (MC)
88
+ method that was firstly published by Lorensen and Cline [12].
89
+
90
+ The input volume data consist of samples organized into a regular 3D Cartesian grid.
91
+ From such a grid, we can easily obtain a set of cells. The cell has in this case a cube shape and
92
+ consists of eight corresponding samples from two adjacent sample planes. Four samples are
93
+ from the first plane and four samples are from the second plane. MC method processes
94
+ sequentially all the cells that can be found in volume data. The iso-surface, which we are
95
+ looking for, is specified by a threshold value.
96
+
97
+ Each cell is processed separately. Firstly, the cell index is computed. The cell has eight
98
+ vertices, let us name them from A to H, and each vertex has its data value. Depending on a
99
+ selected threshold the vertex is assigned a binary value index = ABCDEFGHB. Each bit of the
100
+ index is 0 when the data value in the corresponding vertex is less than the threshold and 1
101
+ otherwise.
102
+
103
+ Based on the index, we are able to distinguish 256 cases how the iso-surface can
104
+ intersect the cell, because each vertex can be inside or outside of the iso-surface. When the
105
+ index is 0 or 255 the cell is not intersected by the iso-surface, otherwise such a cell is called
106
+ an active cell. The purpose of the index will be described later. For an active cell, normal
107
+ vectors are computed in all its vertices using symmetric or asymmetric difference of data
108
+ samples.
109
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
110
+
111
+
112
+ Each index represents a different case how the iso-surface can intersect the cell. All
113
+ these cases can be tabularized and easily triangulated using linear interpolation. The triangles
114
+ vertices lay on the cell edges. Note, that triangles vertices are interpolated only on the cell
115
+ edges, this will not be true for other methods. Maximum of four triangles per the cell is
116
+ needed to approximate the iso-surface. For each triangle vertex a normal vector is computed
117
+ from normal vectors in the cell vertices, using linear interpolation as well.
118
+
119
+ Each cell face is shared by another cell. Due to such sharing, the iso-surface is
120
+ continuous among adjacent cells. Note that there can be ambiguous faces at which the
121
+ triangulation proposed by [12] will produce holes. There are few approaches how to avoid the
122
+ holes. Ambiguous cases can be detected and a special triangulation can be applied [16]. The
123
+ cells can be divided into tetrahedra and resulting simplices triangulated in a little bit different
124
+ way as we will describe in the next section. Other approaches are out of the scope of this
125
+ paper, see [2], [3], [6], [13], [14], [15].
126
+
127
+ The algorithm complexity of MC method is O(N), where N is the number of all cells.
128
+
129
+ 2.1 Marching Tetrahedra
130
+
131
+ Marching Tetrahedra (MT) method is based on the same principle as MC method. The
132
+ significant difference is that the cube cell is furthermore split into tetrahedra. There are two
133
+ main splitting schemes. The cell is divided into five tetrahedra (MT5) [8], [15] or the cell is
134
+ divided into six tetrahedra (MT6) [15]. There are several ways how the cube cell can be
135
+ divided into five (e.g. Fig. 1) or six tetrahedra (e.g. Fig. 2).
136
+
137
+ For the five tetrahedra scheme, it is necessary to alternate two different splitting
138
+ schemes. Otherwise, the continuity of the extracted iso-surface will not be maintained
139
+ properly.
140
+
141
+ Fig. 1 - MT5 tetrahedra division of the cell
142
+
143
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
144
+
145
+
146
+ Fig. 2 - Three tetrahedra from a half of the cube, the second half is divided in similar way
147
+
148
+ After the cell is split into tetrahedra (four vertices), the index=ABCDB for each tetrahedron is
149
+ computed separately and tetrahedron is processed separately in the similar way as the cube
150
+ cell in the MC method. There are only 16 possibilities how the tetrahedron can be intersected
151
+ with iso-surface. These methods generate at most two triangles per tetrahedron.
152
+
153
+ Five or six tetrahedra decomposition introduces new edges at which the triangles
154
+ vertices are to be interpolated. For five tetrahedra the interpolation will be held on face
155
+ diagonals of the cube cell, for six tetrahedra both face and internal diagonals are used.
156
+
157
+ If we look at five tetrahedra division, there is one tetrahedron with different shape and
158
+ size. For six tetrahedra splitting, all the tetrahedra are the same.
159
+
160
+ 2.3 Centered Cubic Lattice
161
+
162
+ The last method that will be compared is Centered Cubic Lattice (CCL) method, see [5]. This
163
+ method is little bit different, because it splits the cube cell into 24 tetrahedra.
164
+
165
+ The difference is that the resulting tetrahedra are partially shared between adjacent
166
+ cells and a new data value is introduced to the center of gravity of the processed cell, Fig. 3.
167
+ There are several ways how to compute the value of the central sample, e.g. the arithmetic
168
+ mean or weighted mean.
169
+
170
+ Each tetrahedron is then processed separately in the same way as in MT5 or MT6
171
+ methods.
172
+
173
+ As well as in previous methods this kind of splitting introduces new edges at which
174
+ the interpolation will be made. These are edges among adjacent central points.
175
+
176
+ In this division scheme, all the 24 tetrahedra are the same as to the dimensions
177
+ (similarly to MT6 method).
178
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
179
+
180
+
181
+ There are also other possible decompositions of the cube cell, e.g. [19] that
182
+ decomposes parallelepiped cell into two tetrahedra and one octahedron. These techniques
183
+ were not included into our study.
184
+
185
+
186
+ Fig. 3 - Centered Cubic Lattice division for one cell face
187
+
188
+ 3 Comparison Approaches
189
+
190
+ 3.1 Hausdorff Distance
191
+
192
+ As mentioned before, we use Hausdorff distance [20] for comparisons mainly for iso-surfaces
193
+ that are extracted from real data sets. At first, we define a distance between a point p (from
194
+ surface S) and a surface S’ (with points p’) as
195
+ d(p, S’)=min||p-p’||,
196
+ for all p’ from S’. Now we can define Hausdorff distance between two surfaces S and S’ as
197
+ dH(S,S’)=max d(p,S’),
198
+ for all p from S. Note important thing that Hausdorff distance is not symmetrical
199
+ d(S,S’)≠d(S’,S). When we call d(S,S’) a forward and d(S’,S) a backward distance, we can
200
+ define a symmetrical Hausdorff distance [1] as
201
+ dSH(S,S’)=max(d(S,S’), d(S’,S)).
202
+ The symmetrical difference provides better error measurement for two surfaces. We utilized a
203
+ METRO software tool (described in [4]) for accurate computation of Hausdorff distance of
204
+ two discrete surfaces (triangle meshes). The METRO tool was mainly used to compare
205
+ original mesh with its simplified (e.g. decimated) version. We use it for comparison of two
206
+ iso-surfaces, each generated with different method.
207
+
208
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
209
+
210
+ 3.2 Root Mean Square Distance
211
+
212
+ We use also the Root Mean Square (RMS) of computed distances. RMS distance in discrete
213
+ case is defined as [20]
214
+ n
215
+ x
216
+ x
217
+ S
218
+ S
219
+ RMS
220
+ n
221
+ 2
222
+ 2
223
+ 1
224
+ ...
225
+ )'
226
+ ,
227
+ (
228
+ +
229
+ +
230
+ =
231
+ ,
232
+ where n is a number of points of a mesh S’, xi (where i=1.. n) represents the distance of
233
+ corresponding point pi’ from S xi=d(pi’, S). We compare S’ to S.
234
+
235
+ Note that RMS is not symmetrical as well as Hausdorff distance. We do not use
236
+ symmetrical RMS distance in our tests, thus it is not defined here. This measurement is
237
+ computed with METRO tool as well.
238
+
239
+ Both the Hausdorff distance and the RMS distance are calculated according to some
240
+ source mesh using METRO tool. As such a mesh, we use a mesh generated with MC method.
241
+
242
+ 3.3 Mathematical Data
243
+
244
+ At first, we should mention how the testing data are generated from basic mathematical
245
+ objects. For such objects we need to know an equation. Let us consider for example a sphere.
246
+ Each vertex of a regular grid has its coordinates and we have to assign it a value. The vertex
247
+ value is computed as a distance of the grid vertex (known coordinates) from the object surface
248
+ (known equation). The zero threshold then represents the object surface in volume data.
249
+
250
+ As we know the object equation and its dimensions, we are able to compute some
251
+ additional information concerning the object, such as surface area, object volume, triangles
252
+ position difference from the object surface, etc. We believe that these properties are worth to
253
+ compute, because they can help us to differentiate among the quality of methods.
254
+
255
+ Surface area – the iso-surface is generated by an extraction method in a form of a set
256
+ of triangles. We compute the total area as a sum of all triangles area. Than we can compute
257
+ the area of mathematical object and compare it with iso-surface area obtained. For special
258
+ objects such as sphere, we are able to track the error behaviour dependency on the sphere
259
+ radius.
260
+
261
+ Volume enclosed with the iso-surface – for basic objects the volume is computed
262
+ using appropriate formula. The volume enclosed with the iso-surface is computed in the
263
+ following manner (for tetrahedra only). There are three cases for a tetrahedron:
264
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
265
+
266
+ 1. The whole tetrahedron is outside of the iso-surface – does not affect the total volume
267
+ computation.
268
+ 2. The whole tetrahedron is inside – the whole tetrahedron contributes to the total
269
+ volume. The tetrahedron volume is computed easily.
270
+ 3. The tetrahedron is intersected with the iso-surface – we have to compute the part of the
271
+ tetrahedron which is inside of the iso-surface. As there are at most two triangles
272
+ generated per tetrahedron, these triangles form two small tetrahedra with appropriate
273
+ tetrahedron vertex and we are able to compute the volume of the tetrahedron part
274
+ which contributes to the total volume.
275
+ Triangles position difference – we measure the difference between triangle center of gravity
276
+ and object surface. This gives us information about triangles position difference compared to
277
+ the object surface.
278
+
279
+ The three mentioned geometric properties are the main aspects that we used for
280
+ extraction methods output comparison. The obtained results are showed in the next section.
281
+
282
+ 4 Results
283
+
284
+ At first, we should describe the data sets used for our comparisons and give the reasons why
285
+ we chose them. The main part of the used data set is a set of mathematically generated
286
+ objects, Fig. 4. A real data set was used to show how the Hausdorff distance is dependent on
287
+ applied iso-surface extraction method. The brief description of used data sets follows in
288
+ upcoming paragraphs.
289
+
290
+
291
+ Fig. 4 - Objects (csph, torus, sombrero, cube, sphere and noisedsph)
292
+
293
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
294
+
295
+ 4.1 Used Objects
296
+
297
+ Sphere – sphere is an example of an object that we use to follow the error behaviour
298
+ dependency on sphere radius. The sphere equation used for data generation is a modified
299
+ implicit equation
300
+ r
301
+ s
302
+ z
303
+ s
304
+ y
305
+ s
306
+ x
307
+ z
308
+ y
309
+ x
310
+ F
311
+ Z
312
+ Y
313
+ X
314
+
315
+
316
+ +
317
+
318
+ +
319
+
320
+ =
321
+ 2
322
+ 2
323
+ 2
324
+ )
325
+ (
326
+ )
327
+ (
328
+ )
329
+ (
330
+ )
331
+ ,
332
+ ,
333
+ (
334
+
335
+ where x, y and z are samples coordinates, sx, sy and sz are the sphere centre coordinates, r is
336
+ sphere radius and F(x,y,z) is a corresponding sample value. This equation assigns data value
337
+ to all the volume data samples. The sphere is then represented with a zero threshold
338
+ iso-surface. The samples that are inside of the sphere have negative value, on the sphere zero
339
+ value and samples placed out of the sphere have positive value. The sample value represents
340
+ the distance of the sample from the sphere surface. The radius was 25 in our experiments.
341
+
342
+ Cell edge has a length 1 for our purposes. The object dimensions (e.g. radius, edge
343
+ length) are then related to a cell edge length.
344
+
345
+ Noised sphere – (noisedsph) to study the influence of the noise to the shape of the
346
+ output set of triangles we generate a noised sphere. The random noise is introduced (added) to
347
+ all samples of the volume data. The size of the noise is given in percentage from the sphere
348
+ radius size. We used radius 25 and 10% noise.
349
+
350
+ Cube – this kind of an object we use to follow the behaviour and properties of the
351
+ iso-surface on edges. We will show the iso-surface difference mainly visually. Data are
352
+ generated similarly as in the previous case using the distance of sample from the closest face,
353
+ edge or vertex. The inner, on surface and outer samples have the negative, zero and positive
354
+ value respectively. Cube was generated using a=b=c=42.
355
+
356
+ Cube minus sphere – (csph) such an object was constructed to combine both
357
+ properties of the sphere (r=25) and cube (a=b=c=42). The generation of it is a little bit
358
+ complicated. At first, the cube is generated in the volume data. Afterwards, the values of all
359
+ samples that are closer to the sphere than to the cube are modified to the new distance.
360
+
361
+ Torus – is the typical mathematically generated object. Torus is defined with the
362
+ following equation [20]
363
+ a
364
+ z
365
+ y
366
+ x
367
+ c
368
+ z
369
+ y
370
+ x
371
+ F
372
+
373
+ +
374
+ +
375
+
376
+ =
377
+ 2
378
+ 2
379
+ 2
380
+ 2
381
+ )
382
+ (
383
+ )
384
+ ,
385
+ ,
386
+ (
387
+
388
+ where x, y and z are samples coordinates, c is a torus main radius, a is a torus secondary
389
+ radius and F(x,y,z) is a corresponding sample value. The samples value are negative, zero or
390
+ positive as well. Torus dimensions are c=20 and a=42 in our case.
391
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
392
+
393
+
394
+ Sombrero – is the last mathematically generated object we use. It is a surface defined
395
+ with the mathematical equation (taken from Derive mathematical program)
396
+
397
+ 2
398
+ 2
399
+ 2
400
+ 2
401
+ ))
402
+ (
403
+ cos(
404
+ )
405
+ ,
406
+ ,
407
+ (
408
+ z
409
+ x
410
+ c
411
+ z
412
+ x
413
+ b
414
+ a
415
+ y
416
+ z
417
+ y
418
+ x
419
+ F
420
+ +
421
+ +
422
+ +
423
+
424
+
425
+
426
+ =
427
+
428
+ where x, y and z are sample coordinates and F(x,y,z) is a corresponding sample value and a, b
429
+ and c are constants modifying the shape of the function. Sombrero parameters we used are
430
+ a=12, b=0.25 and c=3.
431
+
432
+ Real data sets – Samples of real data set have only positive values that represent a
433
+ density of the space in the sample position (we used engine.vol, ctmayo.vol and hplogo.vol
434
+ sets).
435
+
436
+ 4.2 Tests and Results
437
+
438
+ For all our mathematically generated objects, we are able to compute the triangles position
439
+ difference compared to the mathematical object. Firstly, a triangle center of gravity is
440
+ computed. As we have the routines for point to object distance computation, we can compute
441
+ the distance of the center of gravity of the triangle from the appropriate object. The overall
442
+ position difference PERR is computed as
443
+
444
+ n
445
+ objDist
446
+ P
447
+ n
448
+ i
449
+ ERR
450
+
451
+ =
452
+ =
453
+ 1
454
+ |)
455
+ ,
456
+ (
457
+ |
458
+ iT
459
+ O
460
+
461
+ where Ti (i goes from 1 to n) is the center of gravity of the i-th triangle, n is the number of
462
+ triangles and objDist(O, X) is the distance of point X from an object O surface.
463
+
464
+ Triangles Position Difference
465
+ 0.0
466
+ 0.1
467
+ 0.2
468
+ 0.3
469
+ 0.4
470
+ 0.5
471
+ 0.6
472
+ cube
473
+ csph
474
+ sphere
475
+ torus
476
+ TPD
477
+ MC
478
+ MT5
479
+ MT6
480
+ CCL
481
+
482
+ Fig. 5 - Triangles position difference comparison (edge vs. smooth object)
483
+
484
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
485
+
486
+ The position difference for a sombrero object was slightly smaller and similar to the results
487
+ obtained for a sphere. For a cube the CCL method gives the worst results, see Fig. 5. This is
488
+ probably due to different interpolation of the cube edges (Fig. 6). A csph object has more
489
+ edges than a cube itself. The more tetrahedra we create the worse results we get. Surprisingly
490
+ for a torus the MT6 method gives the greatest position difference. We think this is because of
491
+ the interpolation at a cell interior edge (the longest one).
492
+
493
+
494
+ Fig. 6 - Iso-surface on edges (MT5, MC, MT6, CCL)
495
+
496
+ Note that RMS distance is related to the MC method. For a sphere and a torus the obtained
497
+ results were slightly less than results for a sombrero. Again, when the object has edges the
498
+ CCL method is the worst from the view of RMS distance, see Fig. 7. For noisedsph object the
499
+ CCL method gives the best results. We suppose that the central cell sample value computation
500
+ (using arithmetic mean) filters data a little bit as well.
501
+
502
+ RMS Comparison
503
+ 0.00
504
+ 0.05
505
+ 0.10
506
+ 0.15
507
+ 0.20
508
+ 0.25
509
+ cube
510
+ csph
511
+ noisedsph
512
+ sombrero
513
+ RMS
514
+ MT5
515
+ MT6
516
+ CCL
517
+
518
+ Fig. 7 - RMS distance histogram
519
+
520
+ Again, a sphere and sombrero give approximately similar results compared to torus. From the
521
+ view of Hausdorff distance the MT6 method gives the worst results for all tested objects, see
522
+ Fig. 8. As you can see for noisedsph the CCL method is the best choice. The best choice in
523
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
524
+
525
+ this case is probably MT5 method because it does not generate as much triangles as CCL
526
+ method.
527
+
528
+ Hausdorff Distance Comparison
529
+ 0.0
530
+ 0.2
531
+ 0.4
532
+ 0.6
533
+ 0.8
534
+ 1.0
535
+ 1.2
536
+ 1.4
537
+ cube
538
+ csph
539
+ noisedsph
540
+ torus
541
+ Hausdorff dist.
542
+ MT5
543
+ MT6
544
+ CCL
545
+
546
+ Fig. 8 - Hausdorff distance histogram
547
+
548
+ The more tetrahedra is used the larger area is extracted for all tested objects that have edges,
549
+ see Fig. 9. The results in Fig. 9 and Fig. 10 are relative due to mathematical results. For
550
+ objects like torus (does not have edges) the results were approximately the same as for a
551
+ sphere. We think that for the area approximation purposes the best choice is MC method.
552
+
553
+ Area Comparison
554
+ 0.0
555
+ 0.2
556
+ 0.4
557
+ 0.6
558
+ 0.8
559
+ 1.0
560
+ 1.2
561
+ 1.4
562
+ 1.6
563
+ 1.8
564
+ cube
565
+ csph
566
+ sphere
567
+ Area
568
+ Math
569
+ MC
570
+ MT5
571
+ MT6
572
+ CCL
573
+
574
+ Fig. 9 - Area comparison (relative to mathematical volume)
575
+
576
+ The MT5 method is in most cases slightly better than MT6 method and both methods are
577
+ approaching to the original volume from below, see Fig. 10. The CCL method in the other
578
+ hand is in most cases approaching mathematically computed volume from above. MC method
579
+ is not included because it is hard to compute the volume enclosed with the iso-surface (due to
580
+ 256 cases).
581
+
582
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
583
+
584
+ Volume Comparison
585
+ 0.0
586
+ 0.2
587
+ 0.4
588
+ 0.6
589
+ 0.8
590
+ 1.0
591
+ 1.2
592
+ cube
593
+ csph
594
+ sphere
595
+ torus
596
+ Volume
597
+ Math
598
+ MT5
599
+ MT6
600
+ CCL
601
+
602
+ Fig. 10 - Volume comparison (relative to mathematical volume)
603
+
604
+ 4.3 Sphere Additional Test
605
+
606
+ A relative volume error is defined in a following way
607
+ V
608
+ V
609
+ V
610
+ Error
611
+ TR −
612
+ =
613
+
614
+ where VTR is a volume enclosed with iso-surface triangles, V is mathematically computed
615
+ volume of the sphere.
616
+
617
+ The CCL method is the best choice for the volume approximation, see Fig. 11. We
618
+ assume that it is due to high number of tetrahedra. The CCL method error oscillates about
619
+ zero value. MT5 gives slightly better results than MT6 method. The progress of error is
620
+ similar. Both methods are approaching the zero error from below. Another thing we compare
621
+ is a number of extracted triangles.
622
+
623
+ Error of Volume Approximation (Sphere, r=10 to 100)
624
+ -0.06
625
+ -0.05
626
+ -0.04
627
+ -0.03
628
+ -0.02
629
+ -0.01
630
+ 0.00
631
+ 0.01
632
+ 0.02
633
+ 0.03
634
+ 0
635
+ 20
636
+ 40
637
+ 60
638
+ 80
639
+ 100
640
+ 120
641
+ Radius
642
+ Error[%]
643
+ MT5
644
+ MT6
645
+ CCL
646
+ Fig. 11 - Sphere volume error graph
647
+
648
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
649
+
650
+ It is a known fact that a number of generated triangles is mainly dependent on the type of the
651
+ cell division, see Fig. 12. MC works with a cube cell (at most four triangles per cell) and it
652
+ does not divide it into tetrahedral (at most two triangles per tetrahedron). MT5 divides the
653
+ cube cell into 5 tetrahedra, MT6 into 6 tetrahedra. In fact, CCL divides the cube cell into 24
654
+ tetrahedra, but these tetrahedra also contain parts of adjacent cube cells. When we sum the
655
+ volume of all 24 tetrahedra, we obtain two cube cells volume, so on average 12 tetrahedra per
656
+ cube cell.
657
+
658
+ Number of Extracted Triangles
659
+ 0
660
+ 200000
661
+ 400000
662
+ 600000
663
+ 800000
664
+ 1000000
665
+ 1200000
666
+ 1400000
667
+ 1600000
668
+ 1800000
669
+ 0
670
+ 20
671
+ 40
672
+ 60
673
+ 80
674
+ 100
675
+ Radius
676
+ Triangles
677
+ MC
678
+ MT5
679
+ MT6
680
+ CCL
681
+
682
+ Fig. 12 - Number of extracted triangles
683
+
684
+ 4 Conclusions
685
+
686
+ We compared fundamental methods for the iso-surface extraction evaluating Hausdorff
687
+ distance, RMS distance, triangles position difference and iso-surface area and volume.
688
+
689
+ Hausdorff distance is in fact the biggest distance between two compared surfaces
690
+ (extreme distance). In general, we are more interested in average distance between two
691
+ surfaces (the RMS distance). In this case, the CCL method generally gives worse results
692
+ compared to other methods. If we look at a position difference, the MC method seems to be
693
+ generally the best one. The quality of the extracted set of triangles for noised sphere was in
694
+ general bad. Interesting is that a volume of objects is approximated with the similar difference
695
+ no matter of method used except for csph object.
696
+
697
+ It is important to realize that for real data we do not know the exact area or volume of
698
+ the object. Hence, the speculations such that the Hausdorff distance is bigger or lower are not
699
+ completely correct.
700
+
701
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
702
+
703
+ Acknowledgements
704
+
705
+ We want to thank to Dr. Ivana Kolingerová for her help and support during preparation of this
706
+ paper.
707
+
708
+ References
709
+
710
+ [1]
711
+ Aspert,N., Santa-Cruz,D., Ebrahimi,T.: Mesh Measuring Errors Between Surfaces
712
+ Using The Hausdorff Distance, In Proceedings of the IEEE International Conference in
713
+ Multimedia and Expo (ICME) 2002, Vol. 1, pages 705-708, Lausanne, Switzerland,
714
+ August 26-29, 2002
715
+ [2]
716
+ Bonnel,K.S., Duchaineau,M.A., Schikore,D.R., Hamann,B., Joy,K.I.: Material Interface
717
+ Reconstruction, IEEE Transactions on Visualization and Computer Graphics, Vol. 9,
718
+ No. 4, pages 500-511, 2003
719
+ [3]
720
+ Cignoni,P., Ganovelli,F., Montani,C., Scopigno,R.: Reconstruction of Topologically
721
+ Correct and Adaptive Trilinear Isosurfaces, Computers & Graphics, Vol. 24, No. 3,
722
+ pages 399-418, 2000
723
+ [4]
724
+ Cignoni,P., Rocchini,C., Scopigno,R.: Metro: Measuring Error on Simplified Surfaces,
725
+ Computer Graphics Forum, Blackwell Publishers, Vol. 17, No. 2, pages 167-174, June
726
+ 1998
727
+ [5]
728
+ Chan,S.L., Purisima,E.O.: A New Tetrahedral Scheme for Iso-surface Generation,
729
+ Computers & Graphics, Vol. 22, No. 1, pages 82-90, Elsevier Science Limited, 1998
730
+ [6]
731
+ Chernyaev,E.V.: Marching Cubes 33: Construction of Topologically Correct
732
+ Isosurfaces, Institute for High Energy Physics, Moscow, Russia, Report CN/95-17,
733
+ 1995
734
+ [7]
735
+ Giles,M., Haimes,R.: Advanced Interactive Visualization for CFD, Computing Systems
736
+ in Engineering, Vol. 1, No.1, pages 51-62, 1990
737
+ [8]
738
+ Hall,M. Warren,J.: Adaptive Polygonalization of Implicitly Defined Surfaces, IEEE
739
+ Computer Graphics and Applications, Vol. 10, No. 6, pages 33-42, November 1990
740
+ [9]
741
+ Itoh,T., Yamaguchi,Y., Koyamada,K.: Fast Isosurface Generation Using the Volume
742
+ Thinning Algorithm, IEEE Transactions on Visualization and Computer Graphics, Vol.
743
+ 7, No. 1, pages 32-46, 2001
744
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
745
+
746
+ [10] Van Kreveld,M., van Oostrum,R., Bajaj,C., Pascucci,V., Schikore,D: Contour Trees
747
+ and Small Seed Sets for Iso-surface Traversal, In Proceedings 13th Annual Symposium
748
+ Computational Geometry, pages 212-220, 1997
749
+ [11] Livnat,Y., Parker,S.G., Johnson,C.R.: Fast Iso-surface Extraction Methods for Large
750
+ Imaging Data Sets, Center for Scientific Computing and Imaging, Department of
751
+ Computer Science, University of Utah, Salt Lake City, USA, 1999
752
+ [12] Lorensen,W.E., Cline,H.E.: Marching Cubes: A High Resolution 3D Surface
753
+ Construction Algorithm, Computer Graphics, Vol. 21, No. 4, July 1987
754
+ [13] Lopez,A., Brodlie,K.: Improving the Robustness and Accuracy of the Marching Cubes
755
+ Algorithm for Isosurfacing, IEEE Transactions on Visualization and Computer
756
+ Graphics, Vol. 9, No. 1, January-March 2003
757
+ [14] Natarajan,B.K.: On Generating Topologically Consistent Isosurfaces from Uniform
758
+ Samples, The Visual Computer, Vol. 11, pages 52-62, 1994
759
+ [15] Ning, P. and Bloomenthal, J.: An Evaluation of Implicit Surface Tilers, Computer
760
+ Graphics and Applications 13(6), pages 33-41, November 1993
761
+ [16] Schroeder,W., Martin,K., Lorensen,B.: The Visualization Toolkit, 2nd Edition, Prentice
762
+ Hall PTR, ISBN 0-13-954694-4, 1998
763
+ [17] Shen,H.-W., Hansen,C.D., Livnat,Y., Johnson,C.R: Isosurfacing in Span Space with
764
+ Utmost Efficiency (ISSUE), IEEE Visualization 96, pages 287-294, 1996
765
+ [18] Shen,H., Johnson,C.R.: Sweeping Simplicies: A Fast Iso-surface Extraction Algorithm
766
+ for Unstructured Grids, Proceedings of Visualisation '95, IEEE Computer Society
767
+ Press, Los Alamos, CA, 1995
768
+ [19] Takahashi,T., Yonekura,T.: Isosurface Construction From a Data Set Sampled On a
769
+ Face-Centered-Cubic Lattice, Proceedings of ICCVG 2002, No. 2, pages 754-763,
770
+ September 2002
771
+ [20] Weisstein,E.W.: MathWorld, A Wolfram Web Resource,
772
+
773
+ http://mathworld.wolfram.com
774
+
775
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
776
+
777
+
778
+ Ing. Jan Patera (http://zcu.cz/~hopatera) is a PhD student and a part-time
779
+ tutor at the Department of Computer Sciences at the University of West
780
+ Bohemia in Plzeň in Czech Republic. He graduated in the field of computer
781
+ graphics at the University of West Bohemia in 2002. He is a member of the
782
+ Center of Computer Graphics and Data Visualization (CGDV). His research
783
+ activities concern volume data, iso-surface extraction, algorithms and data
784
+ visualization.
785
+
786
+
787
+ Vaclav Skala is a full professor of Computer Science at the Faculty of
788
+ Applied Sciences at the University of West Bohemia in Plzen, Czech
789
+ Republic. He is responsible for courses on Computer Graphics, Algorithms
790
+ for Computer Graphics, Visualization, Multimedia Systems, Programming
791
+ in Windows, .NET Technologies at the Department of Computer Science.
792
+ He is a member of The Visual Computer and Computers&Graphics
793
+ editorial boards, Eurographics Executive Committee and member of
794
+ program committees of established international conferences. He has been a
795
+ research fellow or lecturing at the Brunel University (London, U.K.),
796
+ Moscow Technical University (Russia), Gavle University (Sweden) and
797
+ others institutions in Europe. He organizes the WSCG International
798
+ Conferences in Central Europe on Computer Graphics, Visualization and
799
+ Computer Vision (http://wscg.zcu.cz) held annually since 1992 and .NET
800
+ Technologies conferences (http://dotnet.zcu.cz). He is interested in
801
+ algorithms, data structures, mathematics, computer graphics, computer
802
+ vision and visualization. He has been responsible for several research
803
+ projects as well. Currently he is a director of the Center of Computer
804
+ Graphics and Visualization (http://herakles.zcu.cz).
805
+
806
+
807
+ Machine Graphics and Vision, Polish Academy of Sciences, Vol.13, No.4., pp.329-344, ISSN 1230-0535, 2004
808
+
A9AzT4oBgHgl3EQfv_5R/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
AtE1T4oBgHgl3EQfDQOp/content/tmp_files/2301.02875v1.pdf.txt ADDED
@@ -0,0 +1,1449 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02875v1 [math.NA] 7 Jan 2023
2
+ SCIENCE CHINA Mathematics
3
+ 1
4
+ XXXX Vol. XX No. XX XX–XX
5
+ www.SciChina.com
6
+ www.springerlink.com
7
+ An iterative two-grid method for strongly non-
8
+ linear elliptic boundary value problems
9
+ Jiajun Zhan1, Lei Yang1, Xiaoqing Xing2,†, Liuqiang Zhong2
10
+ 1 School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science
11
+ and Technology, Macao SAR 999078, China;
12
+ 2 School of Mathematical Sciences, South China Normal University, Guangzhou 510631, China
13
+ Email: 2109853gii30011@student.must.edu.mo, leiyang@must.edu.mo, xingxq@scnu.edu.cn, zhong@scnu.edu.cn
14
+ Abstract
15
+ We design and analyze an iterative two-grid algorithm for the finite element discretizations
16
+ of strongly nonlinear elliptic boundary value problems in this paper. We propose an iterative two-grid
17
+ algorithm, in which a nonlinear problem is first solved on the coarse space, and then a symmetric positive
18
+ definite problem is solved on the fine space. The innovation of this paper lies in the establishment
19
+ of a first convergence analysis, which requires simultaneous estimation of four interconnected error
20
+ estimates.
21
+ We also present some numerical experiments to confirm the efficiency of the proposed
22
+ algorithm.
23
+ Keywords:
24
+ iterative two-grid method, convergence, strongly nonlinear elliptic problems.
25
+ MSC(2020):
26
+ 65N30, 65M12, 35J60
27
+ 1
28
+ Introduction
29
+ The two-grid methods are first proposed for nonselfadjoint problems and indefinite elliptic
30
+ problems [6, 10]. Then, the two-grid methods are extended to solve semiliinear elliptic problems
31
+ [7], quasi-linear and nonlinear elliptic problems [8, 9], respectively. Especially, for nonlinear
32
+ elliptic problems, the basic idea of two-grid methods is to first obtain a rough solution by
33
+ solving the original problem in a “coarse mesh” with mesh size H, and then correct the rough
34
+ solution by solving a symmetric positive definite (SPD) system in a “fine mesh” with mesh size
35
+ h. Noticing the mesh size of “coarse mesh” is much smaller than that of “fine mesh”, it is not
36
+ difficult to solve an original problem in “coarse mesh”. Therefore, two-grid methods reduce
37
+ the computational complexity of solving the original problem to solving a SPD problem and
38
+ dramatically improve the computational speed. Recently, Bi, Wang and Lin [1] presented a
39
+ two-grid algorithm to solve the strongly nonlinear elliptic problems and provided a posteriori
40
+ error estimator for the two-grid methods. It’s noted that the literature mentioned above is all
41
+ about non-iterative two-grid methods.
42
+ As is well-known, the mesh size H of “coarse mesh” and h of “fine mesh” should satisfy a
43
+ certain relationship for the optimal convergence order in non-iterative two-grid methods. The
44
+ iterative two-grid methods have the advantage over the non-iterative two-grid methods in that,
45
+ the distance between the mesh sizes H and h can be enlarged by increasing the iteration counts
46
+ † Corresponding author
47
+
48
+ 2
49
+ Jiajun Zhan & et al.
50
+ with the same accuracy. However, there is only a small amount of literature on iterative two-grid
51
+ methods of conforming finite element discretization for elliptic problems. Xu [9] first proposed
52
+ and analyzed an iterative two-grid method for non-symmetric positive definite elliptic problems.
53
+ Zhang, Fan and Zhong [11] designed some iterative two-grid algorithms for semilinear elliptic
54
+ problems and provided the corresponding convergence analysis. To our knowledge, there is
55
+ not any published literature on the iterative two-grid algorithm of conforming finite element
56
+ discretization for strongly nonlinear elliptic boundary value problems.
57
+ In this paper, an iterative two-grid algorithm for solving strongly nonlinear elliptic problems
58
+ is studied. The discrete system of strongly nonlinear elliptic problems is presented at first. And
59
+ then, an iterative two-grid algorithm is proposed for the discrete system, which is obtained by
60
+ applying a non-iterative two-grid algorithm of [8] in a successive fashion. Finally, a challenging
61
+ convergence analysis of the proposed algorithm is provided. Despite the fact that our algorithm
62
+ is simply obtained by [8], the convergence analysis of the non-iterative two-grid algorithm could
63
+ not be directly applied to the iterative two-grid algorithm. Here we complete this challenging
64
+ convergence analysis by mathematical induction which can also be used in solving semilinear
65
+ elliptic problems by iterative two-grid algorithms in [11]. However, we must emphasize that the
66
+ convergence analysis of our algorithm is significantly different from the one of [11]. Compared
67
+ with the current work [11], our convergence analysis is far more difficult and complex, and
68
+ specific challenges could be reflected in: (1) the higher order derivative component of our model
69
+ problem is still nonlinear; (2) the interconnectedness of the error estimates causes formidable
70
+ obstacle for the convergence analysis (See the proof of Lemma 4.7).
71
+ To avoid the repeated use of generic but unspecified constants, x ≲ y is used to denote x ⩽
72
+ Cy, where C are some positive constants which do not depend on the mesh size. Furthermore
73
+ the constants C may denote different values under different circumstances. For some specific
74
+ constants, we use the constant C with some subscript to denote.
75
+ 2
76
+ Model problems and discrete systems
77
+ In this section, we present the continuous and discrete variational problems of strongly nonlinear
78
+ elliptic problems, and provide the corresponding well-posedness and priori error estimates.
79
+ Given a bounded convex polygonal domain Ω ⊂ R2 with the boundary ∂Ω. We denote
80
+ W m,p(Ω) as the standard Sobolev space with norm ∥ · ∥m,p,Ω and seminorm | · |m,p,Ω, where the
81
+ integers m ⩾ 0 and p ⩾ 1. For convenience, we also denote Hm(Ω) = W m,2(Ω), ∥·∥m = ∥·∥m,2,Ω
82
+ and H1
83
+ 0(Ω) := {u ∈ H1(Ω) : u|∂Ω = 0}.
84
+ We consider the following strongly nonlinear elliptic problems:
85
+
86
+ −∇ · a(x, u, ∇u) + f(x, u, ∇u) = 0, in Ω,
87
+ u = 0, on ∂Ω,
88
+ (2.1)
89
+ where a(x, y, z) : ¯Ω × R × R2 → R2 and f(x, y, z) : ¯Ω × R × R2 → R. When a(x, u, ∇u) and
90
+ f(x, u, ∇u) take different functions, different problems are available, such as mean curvature
91
+ flow, Bratu’s problem and so on(See [3]).
92
+ We assume that a(x, y, z) and f(x, y, z) are second order continuous differentiable functions.
93
+ For simplicity, we denote that ay(w) = Dya(x, w, ∇w), az(w) = Dza(x, w, ∇w), fy(w) =
94
+ Dyf(x, w, ∇w) and fz(w) = Dzf(x, w, ∇w), and similar notations are applied to the second
95
+ order derivatives of a(x, y, z) and f(x, y, z).
96
+
97
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
98
+ 3
99
+ Remark 2.1
100
+ Since a(x, y, z) and f(x, y, z) are second order continuous differentiable func-
101
+ tions, there exists a positive constant ˜C as upper bound with respect to all the first and second
102
+ order derivatives of a(·, ·, ·) and f(·, ·, ·).
103
+ We denote
104
+ A(v, ϕ) = (a(x, v, ∇v), ∇ϕ) + (f(x, v, ∇v), ϕ),
105
+ ∀v, ϕ ∈ H1
106
+ 0(Ω).
107
+ (2.2)
108
+ By Green formula, it’s easy to see that the solution u ∈ H1
109
+ 0(Ω) of (2.1) satisfies
110
+ A(u, v) = 0,
111
+ ∀v ∈ H1
112
+ 0(Ω).
113
+ (2.3)
114
+ The Fr´echet derivative L′ of (2.1) at w is given by
115
+ L′(w)v = −∇ · (ay(w)v + az(w)∇v) + fy(w)v + fz(w)∇v.
116
+ In the following, we gives some of our basic assumptions (Similar assumptions also could be
117
+ found in [9] or [3]). Firstly, the problem (2.3) has a solution u ∈ H1
118
+ 0(Ω)∩Hr+1(Ω)∩W 2,2+ε(Ω)
119
+ (ε > 0 and integer r ⩾ 1). Secondly, for the solution u of (2.3), there exists a positive constant
120
+ α0 such that
121
+ ξT az(u)ξ ⩾ α0|ξ|2,
122
+ ∀ξ ∈ R2, x ∈ ¯Ω.
123
+ (2.4)
124
+ Finally, L′(u) : H1
125
+ 0(Ω) → H−1(Ω) is an isomorphism. These assumptions guarantee that u is
126
+ an isolated solution of (2.3).
127
+ Let Th be a conforming quasi-uniform triangulation on Ω, where the mesh size h denotes
128
+ the maximum of the circumscribed circle diameters of element K ∈ Th. By this, any element
129
+ K ∈ Th is contained in (contains) a circle of radius ˆC1h (respectively, ˆC2h), where the constant
130
+ ˆC1 and ˆC2 do not depend on mesh size h, and there is no hanging node on Th.
131
+ The finite element space Vh on Th is defined as
132
+ Vh = {vh ∈ H1
133
+ 0(Ω) : vh|K ∈ Pr(K), ∀ K ∈ Th},
134
+ where Pr(K) is the set of polynomials of degree at most integer r on K.
135
+ Here is the discrete system of (2.3): Find uh ∈ Vh such that
136
+ A (uh, vh) = 0,
137
+ ∀vh ∈ Vh.
138
+ (2.5)
139
+ The following lemma presents the well-posedness of the variational problem (2.5) and its
140
+ priori error estimates, which can be found in Lemma 3.2 and Theorem 3.4 of [9], respectively.
141
+ Lemma 2.2
142
+ Assume u is the solution of problem (2.3), then when h is small enough, the
143
+ discrete variational problem (2.5) exists a unique solution uh ∈ Vh, and the following priori
144
+ error estimate holds
145
+ ∥u − uh∥1,p ≲ hr,
146
+ if u ∈ W r+1,p(Ω), 2 ⩽ p ⩽ ∞.
147
+ (2.6)
148
+ 3
149
+ Iterative two-grid algorithms
150
+
151
+ 4
152
+ Jiajun Zhan & et al.
153
+ In this section, we present an iterative two-grid algorithm for the variational problems (2.3).
154
+ Let Th and TH be two quasi-uniform, conforming and nested mesh in Ω. Furthermore the
155
+ mesh size h of Th and H of TH satisfy, for some 0 < λ < 1,
156
+ H = O(hλ)
157
+ and
158
+ h < H < 1.
159
+ For present the iterative two-grid algorithm, we introduce the form B(w; v, χ) (induced by
160
+ L′) by , for a fixed w and any v, χ ∈ H1
161
+ 0(Ω),
162
+ B(w; v, χ) = (ay(w)v, ∇χ) + (az(w)∇v, ∇χ) + (fy(w)v, χ) + (fz(w)∇v, χ).
163
+ (3.1)
164
+ Remark 3.1
165
+ The form B(w; ·, ·) is a bilinear form for fixed w.
166
+ To our knowledge, the two-grid algorithms of strongly nonlinear problems are firstly pro-
167
+ posed in [8]. Here one of two-grid algorithms from Algorithm 3.3 of [8] is given.
168
+ Algorithm 3.1
169
+ 1. Find uH ∈ VH, such that
170
+ A(uH, vH) = 0,
171
+ ∀vH ∈ VH.
172
+ 2. Find uh ∈ Vh, such that
173
+ B(uH; uh, vh) = B(uH; uH, vh) − A(uH, vh),
174
+ ∀vh ∈ Vh.
175
+ Remark 3.2
176
+ In the Algorithm 3.1, we first solve a nonlinear problem in a coarse space
177
+ VH. However, because dim(VH) is relatively small, the calculated amount of solving a nonlinear
178
+ problem in VH is not excessive. As for the second step of Algorithm 3.1, noticing that B(uH; ·, ·)
179
+ is a bilinear form with given uH, we simply need to solve a linear problem in Vh, for which there
180
+ are numerous concerning fast algorithms.
181
+ In [8], Xu had showed that the solution uh of Algorithm 3.1 could be a good approximation
182
+ with respect to finite element solution uh at a low cost, namely,
183
+ ∥uh − uh∥1 ≲ H2.
184
+ (3.2)
185
+ Using triangle inequality, (2.6) with r = 1 and (3.2), we obtain the error estimate of Algorithm
186
+ 3.1,
187
+ ∥u − uh∥1 ⩽ ∥u − uh∥1 + ∥uh − uh∥1 ≲ h + H2.
188
+ (3.3)
189
+ Next, putting the Algorithm 3.1 into a successive fashion, we obtain our iterative two-grid
190
+ algorithm.
191
+ Algorithm 3.2
192
+ Let u0
193
+ h = uH be the solution of (2.5) in VH. Assume that uk
194
+ h ∈ Vh has been
195
+ obtained, then uk+1
196
+ h
197
+ ∈ Vh can be obtained by the following two steps.
198
+ Step 1. Find ek
199
+ H ∈ VH such that, for any vH ∈ VH,
200
+ A(uk
201
+ h + ek
202
+ H, vH) = 0.
203
+ (3.4)
204
+ Step 2. Find uk+1
205
+ h
206
+ ∈ Vh such that, for any vh ∈ Vh,
207
+ B(uk
208
+ h + ek
209
+ H; uk+1
210
+ h
211
+ , vh) = B(uk
212
+ h + ek
213
+ H; uk
214
+ h + ek
215
+ H, vh) − A(uk
216
+ h + ek
217
+ H, vh).
218
+ (3.5)
219
+
220
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
221
+ 5
222
+ Remark 3.3
223
+ Noticing the uniqueness of finite element solution (See Lemma 2.2), (2.5),
224
+ u0
225
+ h = uH and (3.4) with k = 0, we can see that e0
226
+ H = 0, which means u0
227
+ h + e0
228
+ H = uH. By
229
+ observing the the Step 2 of Algorithm 3.2 and the second step of Algorithm 3.1, the conclusion
230
+ is that Algorithm 3.2 is same with Algorithm 3.1 when k = 0.
231
+ In comparison to [8], our method is still valid for high order conforming finite elements,
232
+ whereas [8] only considered piecewise linear finite element space. Here gives the error estimate
233
+ of our algorithm (See Theorem 4.9),
234
+ ∥u − uk
235
+ h∥1 ≲ hr + Hr+k.
236
+ (3.6)
237
+ Specially, if we choose finite element space Vh as piecewise linear finite element space, i.e. r = 1,
238
+ the error estimate (3.6) of Algorithm 3.2 could be written as
239
+ ∥u − uk
240
+ h∥1 ≲ h + H1+k.
241
+ To achieve the optimal convergence order, the relationship h = H2 should be satisfied in
242
+ Algorithm 3.1 (See (3.3)). But in Algorithm 3.2, we could expand the distance between the
243
+ mesh size H and h by increasing the iteration counts k.
244
+ 4
245
+ Convergence analysis
246
+ In this section, we provide the corresponding convergence analysis of Algorithm 3.2. To this
247
+ end, we need to introduce some preliminaries based on form B(w; v, χ) at first.
248
+ 4.1
249
+ Some preliminaries based on form B(w; v, χ)
250
+ In this subsection, we present some properties of form B(w; v, χ) and introduce two discrete
251
+ Green function.
252
+ Firstly, with fixed w, by Remark 2.1 and Cauchy-Schwarz inequality, it’s easy to obtain
253
+ that the form B(w; ·, ·) is continuous, i.e.,
254
+ B(w; v, χ) ≲ ∥v∥1∥χ∥1,
255
+ ∀ v, χ ∈ H1
256
+ 0(Ω).
257
+ (4.1)
258
+ Secondly, we present a lemma which provides the Babuˇska-Brezzi(BB) conditions of form
259
+ B(·; ·, ·) in Vh. And this lemma can be proved using similar arguments in Lemma 2.2 of [9].
260
+ Lemma 4.1
261
+ Assume u is the solution of problem (2.3), then when h is small enough, we
262
+ have, for any wh ∈ Vh,
263
+ ∥wh∥1 ≲ sup
264
+ vh∈Vh
265
+ B (u; wh, vh)
266
+ ∥vh∥1
267
+ and
268
+ ∥wh∥1 ≲ sup
269
+ vh∈Vh
270
+ B (u; vh, wh)
271
+ ∥vh∥1
272
+ .
273
+ (4.2)
274
+ Proof.
275
+ For the solution u of (2.3), a projection operator Ph : H1
276
+ 0(Ω) → Vh is defined by
277
+ (az(u)∇Phv, ∇χh) = (az(u)∇v, ∇χh),
278
+ ∀v ∈ H1
279
+ 0(Ω), χh ∈ Vh.
280
+ (4.3)
281
+ By (2.4), we can know that the projection operator Ph is well-defined. Taking v = vh ∈ Vh ⊂
282
+ H1
283
+ 0(Ω) and χh = Phvh − vh, and using (2.4), we could prove that the projection operator Ph
284
+ is identity operator for space Vh. Substituting χh = Phv into (4.3), and using (2.4), Poincar´e
285
+ inequality, Remark 2.1 and Cauchy–Schwarz inequality, it holds that
286
+ ∥Phv∥1 ≲ ∥v∥1,
287
+ ∀v ∈ H1
288
+ 0(Ω).
289
+ (4.4)
290
+
291
+ 6
292
+ Jiajun Zhan & et al.
293
+ By (2.4), duality argument and (4.4), we can obtain (See Theorem 3.2.5 in [2])
294
+ ∥v − Phv∥0 ≲ h∥v∥1,
295
+ ∀v ∈ H1
296
+ 0(Ω).
297
+ (4.5)
298
+ For any wh ∈ Vh, v ∈ H1
299
+ 0(Ω), by (3.1), Green formula, (4.3), Remark 2.1, Cauchy-Schwarz
300
+ inequality and (4.5), we have
301
+ B(u; wh, v − Phv)
302
+ =
303
+ (ay(u)wh, ∇(v − Phv)) + (az(u)∇wh, ∇(v − Phv))
304
+ +(fy(u)wh, v − Phv) + (fz(u)∇wh, v − Phv)
305
+ =
306
+ ((∇ · ay(u))wh, v − Phv) + (ay(u) · ∇wh, v − Phv)
307
+ +(fy(u)wh, v − Phv) + (fz(u)∇wh, v − Phv)
308
+
309
+ ∥wh∥1∥v − Phv∥0
310
+
311
+ h∥wh∥1∥v∥1.
312
+ (4.6)
313
+ Noticing that L′(u) : H1
314
+ 0(Ω) → H−1(Ω) is an isomorphism, using (4.6) and (4.4), we obtain
315
+ that
316
+ ∥wh∥1
317
+
318
+ sup
319
+ v∈H1
320
+ 0 (Ω)
321
+ B(u; wh, v)
322
+ ∥v∥1
323
+
324
+ sup
325
+ v∈H1
326
+ 0 (Ω)
327
+ B(u; wh, v − Phv)
328
+ ∥v∥1
329
+ + sup
330
+ v∈H1
331
+ 0 Ω
332
+ B(u; wh, Phv)
333
+ ∥v∥1
334
+
335
+ h∥wh∥1 +
336
+ sup
337
+ v∈H1
338
+ 0 (Ω)
339
+ B(u; wh, Phv)
340
+ ∥Phv∥1
341
+ .
342
+ Taking h sufficiently small in the above inequality with projection operator Ph being identity
343
+ operator for Vh, we could obtain the first estimate of (4.2). The proof of the second estimate
344
+ of (4.2) is similar.
345
+ Next, we provide another BB condition of the form B(·; ·, ·).
346
+ Lemma 4.2
347
+ Assume u is the solution of (2.3) and Ψ satisfying ∥u − Ψ∥1,∞ ≲ H, then when
348
+ H is small enough, for any wh ∈ Vh, it holds that
349
+ ∥wh∥1 ≲ sup
350
+ vh∈Vh
351
+ B (Ψ; wh, vh)
352
+ ∥vh∥1
353
+ and
354
+ ∥wh∥1 ≲ sup
355
+ vh∈Vh
356
+ B (Ψ; vh, wh)
357
+ ∥vh∥1
358
+ .
359
+ (4.7)
360
+ Proof.
361
+ Using the definition (3.1) of form B, Taylor expansion h(y, z) = h(y0, z0)+∂yh(˜θ1, ˜θ2)(y−
362
+ y0) + ∂zh(˜θ1, ˜θ2)(z − z0), where ˜θ1 is between y and y0 and ˜θ2 is between z and z0, Remark 2.1,
363
+ and H¨older inequality, we obtain
364
+ B(u; wh, vh) − B(Ψ; wh, vh)
365
+ =
366
+ ((ay(u) − ay(Ψ))wh, ∇vh) + ((az(u) − az(Ψ))∇wh, ∇vh)
367
+ +((fy(u) − fy(Ψ))wh, vh) + ((fz(u) − fz(Ψ))∇wh, vh)
368
+ =
369
+ (ayy(θ1)(u − Ψ)wh, ∇vh) + (ayz(θ1)∇(u − Ψ)wh, ∇vh)
370
+ +(azy(θ2)(u − Ψ)∇wh, ∇vh) + (∇(u − Ψ)T azz(θ2)∇wh, ∇vh)
371
+ +(fyy(θ3)(u − Ψ)wh, vh) + (fyz(θ3) · ∇(u − Ψ)wh, vh)
372
+ +(fzy(θ4) · ∇wh(u − Ψ), vh) + (∇(u − Ψ)T fzz(θ4)∇wh, vh)
373
+
374
+ ∥u − Ψ∥1,∞∥wh∥1∥vh∥1,
375
+ (4.8)
376
+
377
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
378
+ 7
379
+ where θi (i = 1, 2, 3, 4) are between u and Ψ.
380
+ By Lemma 4.1, (4.8) and ∥u − Ψ∥1,∞ ≲ H, it is obtained that
381
+ ∥wh∥1
382
+
383
+ sup
384
+ vh∈Vh
385
+ B(u; wh, vh) − B (Ψ; wh, vh)
386
+ ∥vh∥1
387
+ + sup
388
+ vh∈Vh
389
+ B (Ψ; wh, vh)
390
+ ∥vh∥1
391
+
392
+ ∥u − Ψ∥1,∞∥wh∥1 + sup
393
+ vh∈Vh
394
+ B (Ψ; wh, vh)
395
+ ∥vh∥1
396
+
397
+ H∥wh∥1 + sup
398
+ vh∈Vh
399
+ B (Ψ; wh, vh)
400
+ ∥vh∥1
401
+ .
402
+ Taking H sufficiently small into the above inequality, we can derive the first estimate of (4.7).
403
+ The proof of the second estimate of (4.7) is similar.
404
+ Remark 4.3
405
+ According to (2.6), Lemma 4.2 still holds with replacing Ψ by the finite element
406
+ solution uh of (2.5).
407
+ For more concise notations and the subsequent analysis, we denote
408
+ Ek = uh − uk
409
+ h,
410
+ (4.9)
411
+ uk,1
412
+ h
413
+ = uk
414
+ h + ek
415
+ H,
416
+ (4.10)
417
+ where uh is the solution of problem (2.5) and, uk
418
+ h and ek
419
+ H are given by Algorithm 3.2. It’s noted
420
+ that these notation will be used frequently in the rest of this paper.
421
+ Remark 4.4
422
+ For k ⩾ 0, assume that Ek, uk,1
423
+ h
424
+ and ek
425
+ H are given by (4.9), (4.10) and Algorithm
426
+ 3.2, respectively. If both ∥Ek∥1,∞ ≲ H and ∥ek
427
+ H∥1,∞ ≲ H are provided, the Lemma 4.2 still
428
+ holds with replacing Ψ by uk,1
429
+ h . In fact, using (4.10), (4.9), triangle inequality, (2.6) with r ⩾ 1
430
+ and h < H, ∥Ek∥1,∞ ≲ H and ∥ek
431
+ H∥1,∞ ≲ H, we derive that
432
+ ∥u − uk,1
433
+ h ∥1,∞ ⩽ ∥u − uh∥1,∞ + ∥Ek∥1,∞ + ∥ek
434
+ H∥1,∞ ≲ H.
435
+ Therefore, the Lemma 4.2 still holds with Ψ = uk,1
436
+ h .
437
+ And then, for the finite element solution uh of (2.5) and any fixed x ∈ Ω, we introduce the
438
+ Green functions gx
439
+ H ∈ VH, which be defined by
440
+ B(uh; vH, gx
441
+ H) = ∂vH(x),
442
+ ∀vH ∈ VH,
443
+ (4.11)
444
+ where ∂ denotes either
445
+
446
+ ∂x1 or
447
+
448
+ ∂x2 . It’s easy to see that the Green function gx
449
+ H is well-defined
450
+ by Remark 4.3.
451
+ Assume uk,1
452
+ h
453
+ is given by (4.10), similarly, for any fixed x ∈ Ω, we introduce the Green
454
+ functions gk,x
455
+ h
456
+ ∈ Vh by
457
+ B(uk,1
458
+ h ; vh, gk,x
459
+ h
460
+ ) = ∂vh(x),
461
+ ∀vh ∈ Vh.
462
+ (4.12)
463
+ By Remark 4.4, we also can see that Green function gk,x
464
+ h
465
+ is well-defined.
466
+ Here give some estimates of the above two Green functions gx
467
+ H and gk,x
468
+ h
469
+ (See Lemma 3.3 of
470
+ [4], or (2.10) and (2.11) of [9])
471
+ ∥gx
472
+ H∥1,1 ≲ | log H|
473
+ and
474
+ ∥gk,x
475
+ h
476
+ ∥1,1 ≲ | log h|.
477
+ (4.13)
478
+
479
+ 8
480
+ Jiajun Zhan & et al.
481
+ At last, for any v ∈ H1
482
+ 0(Ω) ∩ W 1,∞(Ω), using (3.1.11) of [2], it could be obtained that
483
+ ∥v∥1,∞ ≲ |v|1,∞.
484
+ (4.14)
485
+ 4.2
486
+ Error estimate
487
+ In this subsection, we present the convergence analysis of Algorithm 3.2 by a series of lemmas.
488
+ Lemma 4.5
489
+ Assume uk,1
490
+ h , Ek and ek
491
+ H are given by (4.10), (4.9) and Algorithm 3.2, respec-
492
+ tively, then we have, for any vh ∈ Vh,
493
+ B(uk,1
494
+ h ; Ek+1, vh) ≲ (∥Ek∥1,∞ + ∥ek
495
+ H∥1,∞)(∥Ek∥1 + ∥ek
496
+ H∥1)∥vh∥1,
497
+ (4.15)
498
+ B(uk,1
499
+ h ; Ek+1, vh) ≲ (∥Ek∥2
500
+ 1,∞ + ∥ek
501
+ H∥2
502
+ 1,∞)∥vh∥1,1.
503
+ (4.16)
504
+ Proof.
505
+ Using (4.9), Remark 3.1, (3.5), (2.5) and (2.2), it is obtained that
506
+ B(uk,1
507
+ h ; Ek+1, vh)
508
+ =
509
+ B(uk,1
510
+ h ; uh, vh) − B(uk,1
511
+ h ; uk+1
512
+ h
513
+ , vh)
514
+ =
515
+ B(uk,1
516
+ h ; uh, vh) − B(uk,1
517
+ h ; uk
518
+ h + ek
519
+ H, vh)
520
+ +A(uk,1
521
+ h , vh) − A(uh, vh).
522
+ =
523
+ B(uk,1
524
+ h ; Ek − ek
525
+ H, vh) + (a(uk,1
526
+ h , ∇uk,1
527
+ h ), vh) + (f(uk,1
528
+ h , ∇uk,1
529
+ h ), vh)
530
+ −(a(uh, ∇uh), vh) − (f(uh, ∇uh), vh)
531
+ :=
532
+ A1 − A2 − A3,
533
+ (4.17)
534
+ where
535
+ A1
536
+ =
537
+ B(uk,1
538
+ h ; Ek − ek
539
+ H, vh),
540
+ A2
541
+ =
542
+ (a(uh, ∇uh), vh) − (a(uk,1
543
+ h , ∇uk,1
544
+ h ), vh),
545
+ A3
546
+ =
547
+ (f(uh, ∇uh), vh) − (f(uk,1
548
+ h , ∇uk,1
549
+ h ), vh).
550
+ For A1, using the definition (3.1) of B, we have
551
+ A1
552
+ =
553
+ (ay(uk,1
554
+ h )(Ek − ek
555
+ H), ∇vh) + (az(uk,1
556
+ h )∇(Ek − ek
557
+ H), ∇vh)
558
+ +(fy(uk,1
559
+ h )(Ek − ek
560
+ H), vh) + (fz(uk,1
561
+ h )∇(Ek − ek
562
+ H), vh).
563
+ (4.18)
564
+ For A2, using second order Taylor expansion, (4.10) and (4.9), we obtain
565
+ A2
566
+ =
567
+ (ay(uk,1
568
+ h )(Ek − ek
569
+ H), ∇vh) + (az(uk,1
570
+ h )∇(Ek − ek
571
+ H), ∇vh)
572
+ +(ayy(θ5)(Ek − ek
573
+ H)2, ∇vh) + 2(ayz(θ5)∇(Ek − ek
574
+ H)(Ek − ek
575
+ H), ∇vh)
576
+ +(∇(Ek − ek
577
+ H)T azz(θ5)∇(Ek − ek
578
+ H), ∇vh),
579
+ (4.19)
580
+ where θ5 is between uh and uk,1
581
+ h .
582
+ Similarly for A3, using second order Taylor expansion, (4.10) and (4.9), it is obtained that
583
+ A3
584
+ =
585
+ (fy(uk,1
586
+ h )(Ek − ek
587
+ H), vh) + (fz(uk,1
588
+ h )∇(Ek − ek
589
+ H), vh)
590
+ +(fyy(θ6)(Ek − ek
591
+ H)2, vh) + 2(fyz(θ6) · ∇(Ek − ek
592
+ H)(Ek − ek
593
+ H), vh)
594
+ +(∇(Ek − ek
595
+ H)T fzz(θ6)∇(Ek − ek
596
+ H), vh),
597
+ (4.20)
598
+
599
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
600
+ 9
601
+ where θ6 is between uh and uk,1
602
+ h .
603
+ Noticing the sum of the first order derivative items about a(·, ·, ·) and f(·, ·, ·) in (4.19) and
604
+ (4.20) exactly equal A1. Substituting (4.18), (4.19) and (4.20) into (4.17), it’s obtained that
605
+ B(uk,1
606
+ h ; Ek+1, vh)
607
+ =
608
+ −(ayy(θ5)(Ek − ek
609
+ H)2, ∇vh) − 2(ayz(θ5)∇(Ek − ek
610
+ H)(Ek − ek
611
+ H), ∇vh)
612
+ −(∇(Ek − ek
613
+ H)T azz(θ5)∇(Ek − ek
614
+ H), ∇vh) − (fyy(θ6)(Ek − ek
615
+ H)2, vh)
616
+ −2(fyz(θ6) · ∇(Ek − ek
617
+ H)(Ek − ek
618
+ H), vh)
619
+ −(∇(Ek − ek
620
+ H)T fzz(θ6)∇(Ek − ek
621
+ H), vh).
622
+ (4.21)
623
+ Applying Remark 2.1, H¨older inequality and triangle inequality into (4.21), we could obtain
624
+ B(uk,1
625
+ h ; Ek+1, vh)
626
+
627
+ ∥Ek − ek
628
+ H∥1,∞∥Ek − ek
629
+ H∥1∥vh∥1
630
+
631
+ (∥Ek∥1,∞ + ∥ek
632
+ H∥1,∞)(∥Ek∥1 + ∥ek
633
+ H∥1)∥vh∥1,
634
+ which completes the proof of (4.15). Similarly, we could obtain (4.16) by (4.21).
635
+ Lemma 4.6
636
+ Assume that uk,1
637
+ h , ek
638
+ H and Ek are defined by (4.10), Algorithm 3.2 and (4.9),
639
+ respectively, then we have
640
+ B(uk,1
641
+ h ; ek
642
+ H, vH) ≲ (∥Ek∥1 + ∥Ek+1∥1)∥vH∥1,
643
+ ∀vH ∈ VH.
644
+ (4.22)
645
+ Proof.
646
+ Taking vh = vH into (3.5) and using (3.4), we obtain
647
+ B(uk,1
648
+ h ; uk+1
649
+ h
650
+ , vH) = B(uk,1
651
+ h ; uk
652
+ h + ek
653
+ H, vH).
654
+ Rewriting the the above equation with Remark 3.1, and then using (4.9), (4.1) and triangle
655
+ inequality, we have
656
+ B(uk,1
657
+ h ; ek
658
+ H, vH)
659
+ =
660
+ B(uk,1
661
+ h ; uk+1
662
+ h
663
+ − uk
664
+ h, vH)
665
+ =
666
+ B(uk,1
667
+ h ; uk+1
668
+ h
669
+ − uh + uh − uk
670
+ h, vH)
671
+ =
672
+ B(uk,1
673
+ h ; Ek − Ek+1, vH)
674
+
675
+ ∥Ek − Ek+1∥1∥vH∥1
676
+
677
+ (∥Ek∥1 + ∥Ek+1∥1) ∥vH∥1,
678
+ which completes the proof.
679
+ Lemma 4.7
680
+ Assume that Ek and ek
681
+ H are given by (4.9) and Algorithm 3.2, respectively, and
682
+ r ⩾ 1, when h is small enough, then for any integer k ⩾ 1,
683
+ ∥Ek∥1 ≲ Hr+k,
684
+ ∥Ek∥1,∞ ≲ | log h|H2,
685
+ ∥ek
686
+ H∥1,∞ ≲ H,
687
+ ∥ek
688
+ H∥1 ≲ Hr+k.
689
+ (4.23)
690
+ Proof.
691
+ Here we use mathematical induction to prove that (4.23) is true.
692
+ By (3.4), u0
693
+ h = uH, (2.5) and the uniqueness of finite element solution (See Lemma 2.2), it
694
+ could be seen that e0
695
+ H = 0.
696
+
697
+ 10
698
+ Jiajun Zhan & et al.
699
+ Making use of triangle inequality, (2.6) and h ⩽ H, we have
700
+ ∥E0∥1 ⩽ ∥u − uh∥1 + ∥u − uH∥1 ≲ hr + Hr ⩽ Hr,
701
+ (4.24)
702
+ ∥E0∥1,∞ ⩽ ∥u − uh∥1,∞ + ∥u − uH∥1,∞ ≲ hr + Hr ⩽ Hr.
703
+ (4.25)
704
+ Next, we will prove (4.23) is true when k = 1.
705
+ (i) For ∥E1∥1 ≲ Hr+1.
706
+ Noticing that r ⩾ 1 and e0
707
+ H = 0, and using (4.25), we have
708
+ ∥E0∥1,∞ ≲ H and ∥e0
709
+ H∥1,∞ ≲ H , which could derive the BB condition of form B(u0,1
710
+ h ; ·, ·) (See
711
+ Remark 4.4). Using the BB condition of form B(u0,1
712
+ h ; ·, ·), (4.15), (4.25), ek
713
+ H = 0, (4.24), r ⩾ 1
714
+ and H < 1, it’s obtained that
715
+ ∥E1∥1
716
+
717
+ sup
718
+ vh∈Vh
719
+ B(u0,1
720
+ h ; E1, vh)
721
+ ∥vh∥1
722
+
723
+ (∥E0∥1,∞ + ∥e0
724
+ H∥1,∞)(∥E0∥1 + ∥e0
725
+ H∥1)
726
+
727
+ (Hr + 0)(Hr + 0)
728
+
729
+ Hr+1.
730
+ (4.26)
731
+ (ii) For ∥E1∥1,∞ ≲ | log h|H2. For k = 0 and any fixed x ∈ Ω, taking vh = E1 into (4.12),
732
+ using (4.16), (4.25), e0
733
+ H = 0, (4.13), r ⩾ 1 and H < 1, we obtain
734
+ ∂E1(x)
735
+ =
736
+ B(u0,1
737
+ h ; E1, g0,x
738
+ h )
739
+
740
+ (∥E0∥2
741
+ 1,∞ + ∥e0
742
+ H∥2
743
+ 1,∞)∥g0,x
744
+ h ∥1,1
745
+
746
+ (H2r + 0)| log h|
747
+
748
+ | log h|H2.
749
+ Further using the arbitrariness of x and (4.14), we derive that
750
+ ∥E1∥1,∞ ≲ | log h|H2.
751
+ (iii) For ∥e1
752
+ H∥1,∞ ≲ H. Using ∥E1∥1,∞ ≲ | log h|H2 and Lemma A.1 (The specific content
753
+ of lemma and proof are referred to Appendix), we obtain
754
+ ∥e1
755
+ H∥1,∞ ≲ H.
756
+ (iv) For ∥e1
757
+ H∥1 ≲ Hr+1. Noticing that ∥E1∥1,∞ ≲ | log h|H2 and ∥e1
758
+ H∥1,∞ ≲ H are satisfied,
759
+ therefore the BB condition of form B(u1,1
760
+ h ; ·, ·) holds (See Remark 4.4). Using the BB condition
761
+ of B(u1,1
762
+ h ; ·, ·) and (4.15), it’s obtained that
763
+ ∥E2∥1
764
+
765
+ sup
766
+ vh
767
+ B(u1,1
768
+ h ; E2, vh)
769
+ ∥vh∥1
770
+
771
+ (∥E1∥1,∞ + ∥e1
772
+ H∥1,∞)(∥E1∥1 + ∥e1
773
+ H∥1).
774
+ (4.27)
775
+ Using the BB condition of form B(u1,1
776
+ h ; ·, ·), (4.22) with k = 1, (4.27), ∥E1∥1,∞ ≲ | log h|H2
777
+ and ∥e1
778
+ H∥1,∞ ≲ H, we have
779
+ ∥e1
780
+ H∥1
781
+
782
+ sup
783
+ vH∈VH
784
+ B(u1,1
785
+ h ; e1
786
+ H, vH)
787
+ ∥vH∥1
788
+
789
+ ∥E1∥1 + ∥E2∥1
790
+
791
+ ∥E1∥1 + (∥E1∥1,∞ + ∥e1
792
+ H∥1,∞)(∥E1∥1 + ∥e1
793
+ H∥1)
794
+
795
+ ∥E1∥1 + (| log h|H2 + H)(∥E1∥1 + ∥e1
796
+ H∥1).
797
+
798
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
799
+ 11
800
+ Taking H be small enough in the above inequality, and using (4.26), it’s obtained that
801
+ ∥e1
802
+ H∥1 ≲ ∥E1∥1 ≲ Hr+1.
803
+ We assume (4.23) is true when k = l, i.e.,
804
+ ∥El∥1 ≲ Hr+l,
805
+ ∥El∥1,∞ ≲ | log h|H2,
806
+ ∥el
807
+ H∥1,∞ ≲ H,
808
+ ∥el
809
+ H∥1 ≲ Hr+l.
810
+ (4.28)
811
+ Next, we will prove (4.23) also holding when k = l + 1.
812
+ (i) For ∥El+1∥1 ≲ Hr+l+1.
813
+ Noticing that ∥El∥1,∞ ≲ | log h|H2 and ∥el
814
+ H∥1,∞ ≲ H are
815
+ satisfied, therefore the BB condition of form B(ul,1
816
+ h ; ·, ·) holds (See Remark 4.4). Using the BB
817
+ condition of form B(ul,1
818
+ h ; ·, ·), (4.15), (4.28) and H < 1, we obtain
819
+ ∥El+1∥1
820
+
821
+ sup
822
+ vh∈Vh
823
+ B(ul,1
824
+ h ; El+1, vh)
825
+ ∥vh∥1
826
+
827
+ (∥El∥1,∞ + ∥el
828
+ H∥1,∞)(∥El∥1 + ∥el
829
+ H∥1)
830
+
831
+ (| log h|H2 + H)(Hr+l + Hr+l)
832
+
833
+ Hr+l+1.
834
+ (4.29)
835
+ (ii) For ∥El+1∥1,∞ ≲ | log h|H2. Taking vh = El+1 into (4.12) with k = l, using (4.16),
836
+ (4.28) and (4.13), we obtain
837
+ ∂El+1(x)
838
+ =
839
+ B(ul,1
840
+ h ; El+1, gl,x
841
+ h )
842
+
843
+ (∥El∥2
844
+ 1,∞ + ∥el
845
+ H∥2
846
+ 1,∞)∥gl,x
847
+ h ∥1,1
848
+
849
+ (| log h|2H4 + H2)| log h|
850
+
851
+ | log h|H2,
852
+ which combining the arbitrariness of x and (4.14), it could be derived that
853
+ ∥El+1∥1,∞ ≲ | log h|H2.
854
+ (iii) For ∥el+1
855
+ H ∥1,∞ ≲ H. Using ∥El+1∥1,∞ ≲ | log h|H2 and Lemma A.1, we obtain
856
+ ∥el+1
857
+ H ∥1,∞ ≲ H.
858
+ (4.30)
859
+ (iv) For ∥el+1
860
+ H ∥1 ≲ Hr+l+1. Noticing that ∥El+1∥1,∞ ≲ | log h|H2 and ∥el+1
861
+ H ∥1,∞ ≲ H are
862
+ satisfied, therefore the BB condition of form B(ul+1,1
863
+ h
864
+ ; ·, ·) holds (See Remark 4.4). Using the
865
+ BB condition of form B(ul+1,1
866
+ h
867
+ ; ·, ·), (4.15), it’s obtained that
868
+ ∥El+2∥1
869
+
870
+ sup
871
+ vh
872
+ B(ul+1,1
873
+ h
874
+ ; El+2, vh)
875
+ ∥vh∥1
876
+
877
+ (∥El+1∥1,∞ + ∥el+1
878
+ H ∥1,∞)(∥El+1∥1 + ∥el+1
879
+ H ∥1).
880
+ (4.31)
881
+ Using the BB condition of form B(ul+1,1
882
+ h
883
+ ; ·, ·), (4.22) with k = l + 1, (4.31), ∥El+1∥1,∞ ≲
884
+ | log h|H2 and ∥el+1
885
+ H ∥1,∞ ≲ H, we have
886
+ ∥el+1
887
+ H ∥1
888
+
889
+ sup
890
+ vH∈VH
891
+ B(ul+1,1
892
+ h
893
+ ; el+1
894
+ H , vH)
895
+ ∥vH∥1
896
+
897
+ ∥El+1∥1 + ∥El+2∥1
898
+
899
+ ∥El+1∥1 + (∥El+1∥1,∞ + ∥el+1
900
+ H ∥1,∞)(∥El+1∥1 + ∥el+1
901
+ H ∥1)
902
+
903
+ ∥El+1∥1 + (| log h|H2 + H)(∥El+1∥1 + ∥el+1
904
+ H ∥1).
905
+
906
+ 12
907
+ Jiajun Zhan & et al.
908
+ Taking H be small enough in the above inequality and using (4.29), it’s obtained that
909
+ ∥el+1
910
+ H ∥1 ≲ ∥El+1∥1 ≲ Hr+l+1.
911
+ By mathematical induction, the conclusion is obtained.
912
+ Remark 4.8
913
+ Although we just use the estimation ∥Ek+1∥1 ≲ Hr+k+1 in our main result
914
+ (See Theorem 4.9), the availability of ∥Ek+1∥1 ≲ Hr+k+1 requires the support of ∥Ek∥1,∞ ≲
915
+ | log h|H2, ∥ek
916
+ H∥1,∞ ≲ H and ∥ek
917
+ H∥1 ≲ Hr+k.
918
+ Here gives the main result of this paper.
919
+ Theorem 4.9
920
+ Assume that u is the solution of (2.3) and uk
921
+ h is given by Algorithm 3.2, then
922
+ we have
923
+ ∥u − uk
924
+ h∥1 ≲ hr + Hr+k.
925
+ (4.32)
926
+ Proof.
927
+ Using triangle inequality, (4.9), (2.6) and Lemma 4.7, we could obtain that
928
+ ∥u − uk
929
+ h∥1 ⩽ ∥u − uh∥1 + ∥Ek∥1 ≲ hr + Hr+k,
930
+ which completes the proof.
931
+ 5
932
+ Numerical experiments
933
+ In this section, we present some numerical experiments to show the efficiency of the pro-
934
+ posed iterative two-grid algorithm. We implemented these experiments by the software package
935
+ FEALPy of programming language Python [5]. Specially in the Step 1 of Algorithm 3.2, we
936
+ solve the nonlinear systems by Newton iteration methods with relative residual 10−8.
937
+ We adopt the following mean curvature flow problem as our model problem:
938
+ −∇ ·
939
+
940
+ ∇u
941
+ (1 + |∇u|2)1/2
942
+
943
+ = g in Ω,
944
+ u = 0 on ∂Ω,
945
+ where the computational domain Ω = (0, 1)× (0, 1), the exact solution u = x(1 − x)2y(1 − y)ex,
946
+ and g is so chosen according to the exact solution.
947
+ Firstly, we choose conforming piecewise linear finite element space as Vh, namely choose
948
+ r = 1. According to Theorem 4.9, we should keep hr = Hr+k hold in order to achieve the
949
+ optimal convergence order. Therefore in Table 1, we present some numerical results in different
950
+ mesh size with h = H2 for k = 1. In this case, our algorithm is same with Algorithm 3.1 (See
951
+ Remark 3.3). Furthermore, we could observe that ∥u−u1
952
+ h∥1 ∗max{H2, h}−1 are stable in Table
953
+ 1, which agrees with (4.32) in Theorem 4.9.
954
+ Table 1: k = 1, r = 1
955
+ H
956
+ h
957
+ ∥u − u1
958
+ h∥1
959
+ ∥u − u1
960
+ h∥1 ∗ max{H2, h}−1
961
+ 1/9
962
+ 1/81
963
+ 2.74E-03
964
+ 0.221953
965
+ 1/10
966
+ 1/100
967
+ 2.22E-03
968
+ 0.221967
969
+ 1/11
970
+ 1/121
971
+ 1.83E-03
972
+ 0.221977
973
+ 1/12
974
+ 1/144
975
+ 1.54E-03
976
+ 0.221983
977
+
978
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
979
+ 13
980
+ And then, we increase the iterative counts k to expand the distance between H and h, which
981
+ is shown in Tables 2 and 3. We also observe that ∥u − u1
982
+ h∥1 ∗ max{H1+k, h}−1 are stable.
983
+ Table 2: k = 2, r = 1
984
+ H
985
+ h
986
+ ∥u − u2
987
+ h∥1
988
+ ∥u − u2
989
+ h∥1 ∗ max{H3, h}−1
990
+ 1/3
991
+ 1/27
992
+ 8.20E-03
993
+ 0.221524
994
+ 1/4
995
+ 1/64
996
+ 3.47E-03
997
+ 0.221784
998
+ 1/5
999
+ 1/125
1000
+ 1.77E-03
1001
+ 0.221826
1002
+ 1/6
1003
+ 1/216
1004
+ 1.03E-03
1005
+ 0.221836
1006
+ Table 3: k = 3, r = 1
1007
+ H
1008
+ h
1009
+ ∥u − u3
1010
+ h∥1
1011
+ ∥u − u3
1012
+ h∥1 ∗ max{H4, h}−1
1013
+ 1/2
1014
+ 1/16
1015
+ 1.38E-02
1016
+ 0.220944
1017
+ 1/3
1018
+ 1/81
1019
+ 2.74E-03
1020
+ 0.221805
1021
+ 1/4
1022
+ 1/256
1023
+ 8.67E-04
1024
+ 0.221837
1025
+ At last, we implement similar numerical experiments for high order finite element space
1026
+ with r = 2 and r = 3 in Tables 4-9. By observation, all these numerical experiments are in
1027
+ support of (4.32) in Theorem 4.9.
1028
+ Table 4: k = 1, r = 2
1029
+ H
1030
+ h
1031
+ ∥u − u1
1032
+ h∥1
1033
+ ∥u − u1
1034
+ h∥1 ∗ max{H3, h2}−1
1035
+ 1/4
1036
+ 1/8
1037
+ 2.57E-03
1038
+ 0.164578
1039
+ 1/9
1040
+ 1/27
1041
+ 2.30E-04
1042
+ 0.167320
1043
+ 1/16
1044
+ 1/64
1045
+ 4.09E-05
1046
+ 0.167553
1047
+ 1/25
1048
+ 1/125
1049
+ 1.07E-05
1050
+ 0.167590
1051
+ 1/36
1052
+ 1/216
1053
+ 3.59E-06
1054
+ 0.167599
1055
+ Acknowledgements
1056
+ The work of the first and second authors were partially funded by the
1057
+ Science and Technology Development Fund, Macau SAR (Nos. 0070/2019/A2, 0031/2022/A1).
1058
+ The third author was supported by the National Natural Science Foundation of China (Grant
1059
+ No.
1060
+ 11901212). The third and fourth authors are also supported by the National Natural
1061
+ Science Foundation of China (Grant No. 12071160).
1062
+ References
1063
+ [1]
1064
+ Bi C J, Wang C, Lin Y P. A posteriori error estimates of two-grid finite element methods for nonlinear
1065
+ elliptic problems. J Sci Comput, 2018, 74: 23–48
1066
+ [2]
1067
+ Ciarlet P G. The Finite Element Method for Elliptic Problems. Classics in Applied Mathematics, No. 40.
1068
+ SIAM, Philadelphia, 2002
1069
+ [3]
1070
+ Gudi T, Nataraj N, Pani A. hp-discontinuous Galerkin methods for strongly nonlinear elliptic boundary
1071
+ value problems. Numer Math, 2008, 109: 233–268
1072
+ [4]
1073
+ Thom´ee V, Xu J C, Zhang N Y. Superconvergence of the gradient in piecewise linear finite-element approx-
1074
+ imation to a parabolic problem. SIAM J Numer Anal, 1989, 26: 553–573
1075
+ [5]
1076
+ Wei H Y, Huang Y Q. Fealpy: Finite element analysis library in python. https://github.com/weihuayi/
1077
+ fealpy, Xiangtan University, 2017-2021
1078
+ [6]
1079
+ Xu J C. Iterative methods by SPD and small subspace solvers for nonsymmetric or indefinite problems. In:
1080
+ Proceedings of the 5th International Symposium on Domain Decomposition Methods for Partial Differential
1081
+
1082
+ 14
1083
+ Jiajun Zhan & et al.
1084
+ Table 5: k = 2, r = 2
1085
+ H
1086
+ h
1087
+ ∥u − u2
1088
+ h∥1
1089
+ ∥u − u2
1090
+ h∥1 ∗ max{H4, h2}−1
1091
+ 1/8
1092
+ 1/64
1093
+ 4.09E-05
1094
+ 0.167552
1095
+ 1/9
1096
+ 1/81
1097
+ 2.55E-05
1098
+ 0.167571
1099
+ 1/10
1100
+ 1/100
1101
+ 1.68E-05
1102
+ 0.167582
1103
+ 1/11
1104
+ 1/121
1105
+ 1.14E-05
1106
+ 0.167589
1107
+ 1/12
1108
+ 1/144
1109
+ 8.08E-06
1110
+ 0.167593
1111
+ Table 6: k = 3, r = 2
1112
+ H
1113
+ h
1114
+ ∥u − u3
1115
+ h∥1
1116
+ ∥u − u3
1117
+ h∥1 ∗ max{H5, h2}−1
1118
+ 1/5
1119
+ 1/55
1120
+ 5.54E-05
1121
+ 0.167534
1122
+ 1/6
1123
+ 1/90
1124
+ 2.07E-05
1125
+ 0.160874
1126
+ 1/7
1127
+ 1/126
1128
+ 1.06E-05
1129
+ 0.167590
1130
+ 1/8
1131
+ 1/184
1132
+ 4.95E-06
1133
+ 0.162211
1134
+ 1/9
1135
+ 1/243
1136
+ 2.84E-06
1137
+ 0.167600
1138
+ Table 7: k = 1, r = 3
1139
+ H
1140
+ h
1141
+ ∥u − u1
1142
+ h∥1
1143
+ ∥u − u1
1144
+ h∥1 ∗ max{H4, h3}−1
1145
+ 1/8
1146
+ 1/16
1147
+ 1.83E-05
1148
+ 0.075054
1149
+ 1/27
1150
+ 1/81
1151
+ 1.40E-07
1152
+ 0.074662
1153
+ 1/64
1154
+ 1/256
1155
+ 4.44E-09
1156
+ 0.074543
1157
+ Table 8: k = 2, r = 3
1158
+ H
1159
+ h
1160
+ ∥u − u2
1161
+ h∥1
1162
+ ∥u − u2
1163
+ h∥1 ∗ max{H5, h3}−1
1164
+ 1/8
1165
+ 1/32
1166
+ 2.28E-06
1167
+ 0.074870
1168
+ 1/9
1169
+ 1/36
1170
+ 1.60E-06
1171
+ 0.074838
1172
+ 1/10
1173
+ 1/40
1174
+ 1.17E-06
1175
+ 0.074810
1176
+ 1/11
1177
+ 1/55
1178
+ 4.49E-07
1179
+ 0.072343
1180
+ 1/12
1181
+ 1/60
1182
+ 3.46E-07
1183
+ 0.074716
1184
+ Table 9: k = 3, r = 3
1185
+ H
1186
+ h
1187
+ ∥u − u3
1188
+ h∥1
1189
+ ∥u − u3
1190
+ h∥1 ∗ max{H6, h3}−1
1191
+ 1/8
1192
+ 1/64
1193
+ 2.85E-07
1194
+ 0.074703
1195
+ 1/9
1196
+ 1/81
1197
+ 1.40E-07
1198
+ 0.074662
1199
+ 1/10
1200
+ 1/100
1201
+ 7.46E-08
1202
+ 0.074630
1203
+ 1/11
1204
+ 1/121
1205
+ 4.21E-08
1206
+ 0.074606
1207
+ 1/12
1208
+ 1/144
1209
+ 2.50E-08
1210
+ 0.074588
1211
+
1212
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
1213
+ 15
1214
+ Equations. Siam, Philadelphia, 1992, 106–118
1215
+ [7]
1216
+ Xu J C. A novel two-grid method for semilinear elliptic equations. SIAM J Sci Comput, 1994, 15: 231–237
1217
+ [8]
1218
+ Xu J C. Some two-grid finite element methods. In: Domain Decomposition Methods in Science and Engi-
1219
+ neering (Quarteroni, Alfio and P´eriaux, Jacques and Kuznetsov, Yuri A and Widlund, Olof B eds). Contemp
1220
+ Math, vol. 157, Amer Math Soc, 1994, 79–87
1221
+ [9]
1222
+ Xu J C. Two-grid discretization techniques for linear and nonlinear PDEs. SIAM J Numer Anal, 1996, 33:
1223
+ 1759–1777
1224
+ [10]
1225
+ Xu J C, Cai X C. A preconditioned GMRES method for nonsymmetric or indefinite problems. Math Comp,
1226
+ 1992, 59: 311–319
1227
+ [11]
1228
+ Zhang W F, Fan R H, Zhong L Q. Iterative two-grid methods for semilinear elliptic equations. Comput
1229
+ Math Appl, 2020, 80: 522–530
1230
+ Appendix A
1231
+ The purpose of this appendix is to provide the proof of Lemma A.1.
1232
+ Lemma A.1
1233
+ Assume ek
1234
+ H is given in (3.4) and ∥Ek∥1,∞ ≲ | log h|H2, when H is small enough, it holds that
1235
+ ∥ek
1236
+ H∥1,∞ ≲ H.
1237
+ (A.1)
1238
+ Before we present the proof of Lemma A.1, we need to introduce some preliminaries and lemmas.
1239
+ For the finite element solution uh of (2.5), we introduce a projection operator ˆPH : H1
1240
+ 0(Ω) → VH, which be
1241
+ defined by,
1242
+ B(uh; ˆPHw, vH) = B(uh; w, vH),
1243
+ ∀w ∈ H1
1244
+ 0(Ω), vH ∈ VH.
1245
+ (A.2)
1246
+ It’s easy to derive that ˆPH is well-defined by the BB-conditions of form B(uh; ·, ·) which could be obtained by
1247
+ Remark 4.3. Furthermore, the projection operator ˆPH satisfies the following estimate
1248
+ ∥ ˆPHw∥1,∞ ≲ | log H|∥w∥1,∞,
1249
+ ∀w ∈ W 1,∞(Ω).
1250
+ (A.3)
1251
+ In fact, taking vH = ˆPHw in (4.11), and using (A.2), (3.1), Remark 2.1, H¨older inequality and (4.13), we obtain
1252
+ ∂ ˆPHw(x)
1253
+ =
1254
+ B(uh; ˆPHw, gx
1255
+ H)
1256
+ =
1257
+ B(uh; w, gx
1258
+ H)
1259
+ =
1260
+ (ay(uh)w, ∇gx
1261
+ H) + (az(uh)∇w, ∇gx
1262
+ H) + (fy(uh)w, gx
1263
+ H) + (fz(uh)∇w, gx
1264
+ H)
1265
+
1266
+ ∥w∥1,∞∥gx
1267
+ H∥1,1
1268
+
1269
+ | log H|∥w∥1,∞.
1270
+ Finally using of the arbitrariness of x and (4.14), we could obtain (A.3).
1271
+ By Taylor expansion, we have (the detailed proof can be found in Lemma 3.1 of [9])
1272
+ A(w, χ) = A(v, χ) + B(v; w − v, χ) + R(η; v, w, χ),
1273
+ ∀w, v, χ ∈ H1
1274
+ 0(Ω),
1275
+ (A.4)
1276
+ where the forms A(·, ·) and B(·; ·, ·) are given by (2.2) and (3.1), respectively, η = v + t(w − v) and
1277
+ R(η; v, w, χ)
1278
+ =
1279
+ � 1
1280
+ 0
1281
+
1282
+ (ayy(η)(v − w)2, ∇χ) + 2(ayz(η)∇(v − w)(v − w), ∇χ)
1283
+ +(∇(v − w)T azz(η)∇(v − w), ∇χ) + (fyy(η)(v − w)2, χ)
1284
+ +2(fyz(η) · ∇(v − w)(v − w), χ) + (∇(v − w)T fzz(η)∇(v − w), χ)
1285
+
1286
+ (1 − t)dt.
1287
+ For the proof of Lemma A.1, we introduce a operator Φ as follow. Assume uh is the solution of (2.5), Ek,
1288
+ R, uk
1289
+ h are given in (4.9), (A.4) and Algorithm 3.2, respectively, we defined operator Φ : VH → VH by, for any
1290
+ wH ∈ VH,
1291
+ B(uh; Φ(wH), vH) = B(uh; Ek, vH) − R(uh + t(wH − Ek); uh, uk
1292
+ h + wH, vH),
1293
+ ∀vH ∈ VH.
1294
+ (A.5)
1295
+ By the BB-conditions of form B(uh; ·, ·) (See Remark 4.3), it’s easy to prove that operator Φ is well-defined.
1296
+ We define a space
1297
+ QH = {vH ∈ VH : ∥vH − ˆPHEk∥1,∞ ⩽ H},
1298
+ (A.6)
1299
+ where ˆPH is a projection operator defined by (A.2). Since QH is a finite dimensional space, it’s easy to see that
1300
+ QH is a non-empty compact convex subset.
1301
+ Next, we will use Brouwer fixed point theorem to prove that (A.5) has a fixed point ¯wH in QH.
1302
+ Lemma A.2
1303
+ Assume ∥Ek∥1,∞ ≲ | log h|H2, then when H is small enough, we have Φ(QH) ⊂ QH.
1304
+
1305
+ 16
1306
+ Jiajun Zhan & et al.
1307
+ Proof.
1308
+ For any wH ∈ QH, vH ∈ VH, rewriting (A.5) with (A.2), we have
1309
+ B(uh; Φ(wH) − ˆPHEk, vH) = −R(uh + t(wH − Ek); uh, uk
1310
+ h + wH, vH).
1311
+ (A.7)
1312
+ Substituting vH = Φ(wH) − ˆPHEk into (4.11) and using (A.7), Remark 2.1, H¨older inequality, (4.9), triangle
1313
+ inequality, (4.13), (A.3), (A.6) and ∥Ek∥1,∞ ≲ | log h|H2, it is obtained that
1314
+ ∂(Φ(wH) − ˆPHEk)(x)
1315
+ =
1316
+ B(uh; Φ(wH) − ˆPHEk, gx
1317
+ H)
1318
+ =
1319
+ −R(uh + t(wH − Ek); uh, uk
1320
+ h + wH, gx
1321
+ H)
1322
+
1323
+ ∥Ek − wH∥2
1324
+ 1,∞∥gx
1325
+ H∥1,1
1326
+
1327
+ (∥Ek − ˆPHEk∥2
1328
+ 1,∞ + ∥ ˆPHEk − wH∥2
1329
+ 1,∞)| log H|
1330
+
1331
+ ((1 + | log H|)2∥Ek∥2
1332
+ 1,∞ + H2)| log H|
1333
+
1334
+ ((1 + | log H|)2| log h|2H4 + H2)| log H|.
1335
+ Further using the arbitrariness of x and (4.14), the proof is finished.
1336
+ Lemma A.3
1337
+ Assume ∥Ek∥1,∞ ≲ | log h|H2, then the operator Φ is continuous in VH.
1338
+ Proof.
1339
+ For any w1, w2 ∈ QH, by (A.5), we have
1340
+ B(uh; Φ(w1) − Φ(w2), vH)
1341
+ =
1342
+ R(uh + t(w2 − Ek); uh, uk
1343
+ h + w2, vH)
1344
+ −R(uh + t(w1 − Ek); uh, uk
1345
+ h + w1, vH).
1346
+ (A.8)
1347
+ Noticing that the definition of R in (A.4), for the terms concerning ayy on the right hand side of (A.8), we can
1348
+ use Remark 2.1 and H¨older inequality to obtain that
1349
+ (ayy(uh + t(w2 − Ek))(Ek − w2)2, ∇vH) − (ayy(uh + t(w1 − Ek))(Ek − w1)2, ∇vH)
1350
+ =
1351
+ (ayy(uh + t(w2 − Ek))(Ek − w2)2, ∇vH)
1352
+ −(ayy(uh + t(w1 − Ek))(Ek − w2)2, ∇vH)
1353
+ +(ayy(uh + t(w1 − Ek))(Ek − w2)2, ∇vH)
1354
+ −(ayy(uh + t(w1 − Ek))(Ek − w1)2, ∇vH)
1355
+ =
1356
+ ([ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))] (Ek − w2)2, ∇vH)
1357
+ +(ayy(uh + t(w1 − Ek))
1358
+
1359
+ −2Ekw2 + w2
1360
+ 2 + 2Ekw1 − w2
1361
+ 1
1362
+
1363
+ , ∇vH)
1364
+ =
1365
+ ([ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))] (Ek − w2)2, ∇vH)
1366
+ +(ayy(uh + t(w1 − Ek)) (2Ek − w1 − w2) (w1 − w2), ∇vH)
1367
+
1368
+ ∥ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))∥0,∞∥(Ek − w2)2∥0∥vH∥1
1369
+ +∥2Ek − w1 − w2∥0∥w1 − w2∥0,∞∥vH∥1.
1370
+ (A.9)
1371
+ For ∥(Ek − w2)2∥0, we use triangle inequality, (A.3), (A.6) and ∥Ek∥1,∞ ≲ | log h|H2, it’s obtained that
1372
+ ∥(Ek − w2)2∥0
1373
+
1374
+ ∥Ek − w2∥2
1375
+ 1,∞
1376
+
1377
+ ∥Ek∥2
1378
+ 1,∞ + ∥ ˆPHEk∥2
1379
+ 1,∞ + ∥ ˆPHEk − w2∥2
1380
+ 1,∞
1381
+
1382
+ ∥Ek∥2
1383
+ 1,∞ + | log H|2∥Ek∥2
1384
+ 1,∞ + H2
1385
+
1386
+ | log h|2H4 + | log H|2| log h|2H4 + H2
1387
+ :=
1388
+ C1(H),
1389
+ (A.10)
1390
+ where C1(H) is a constant depending on H.
1391
+ Similarly, for ∥2Ek − w1 − w2∥0, there also exists a constant C2(H) such that
1392
+ ∥2Ek − w1 − w2∥0 ≲ C2(H).
1393
+ (A.11)
1394
+ Substituting (A.10) and (A.11) into (A.9), it’s could be obtained that
1395
+ (ayy(uh + t(w2 − Ek))(Ek − w2)2, ∇vH) − (ayy(uh + t(w1 − Ek))(Ek − w1)2, ∇vH)
1396
+
1397
+ C(H)
1398
+
1399
+ ∥ayy(uh + t(w2 − Ek)) − ayy(uh + t(w1 − Ek))∥0,∞
1400
+ +∥w1 − w2∥0,∞
1401
+
1402
+ ∥vH∥1,
1403
+ where C(H) = max{C1(H), C2(H)} .
1404
+ The rest of the items on the right hand side of (A.8) have similar
1405
+ results, and here is omitted.
1406
+ The conclusion follows from the above discussion, (A.8), the BB-conditions of
1407
+
1408
+ An iterative two-grid method for strongly nonlinear elliptic boundary value problems
1409
+ 17
1410
+ form B(uh; ·, ·) (See Remark 4.3) and the continuity of second order derivatives of a(·, ·, ·) and f(·, ·, ·) (See the
1411
+ assumptions about a(·, ·, ·) and f(·, ·, ·) in Section 2).
1412
+ At last, we present the proof of Lemma A.1 by Brouwer fixed point theorem.
1413
+ Proof of Lemma A.1.
1414
+ Making use of Lemmas A.2 and A.3 and Brouwer fixed point theorem, we know that
1415
+ (A.5) exists a fixed point ¯wH in QH.
1416
+ Taking w = uk
1417
+ h + ¯wH, v = uh and χ = vH into (A.4), and then using (2.5) with VH ⊂ Vh, Remark 3.1,
1418
+ (4.9), ¯wH = Φ( ¯wH) and (A.5), we obtain that
1419
+ A(uk
1420
+ h + ¯wH, vH)
1421
+ =
1422
+ A(uh, vH) + B(uh; uk
1423
+ h + ¯wH − uh, vH) + R(η; uh, uk
1424
+ h + ¯wH, vH)
1425
+ =
1426
+ B(uh; ¯wH, vH) − B(uh; Ek, vH) + R(η; uh, uk
1427
+ h + ¯wH, vH)
1428
+ =
1429
+ B(uh; Φ( ¯wH), vH) − B(uh; Ek, vH) + R(η; uh, uk
1430
+ h + ¯wH, vH)
1431
+ =
1432
+ 0,
1433
+ (A.12)
1434
+ where η = uh + t( ¯wH − Ek). By the uniqueness of finite element solution (See Lemma 2.2), (3.4) and (A.12),
1435
+ we can see that ¯wH = ek
1436
+ H, which implies ek
1437
+ H ∈ QH.
1438
+ At last, using triangle inequality, (A.6), (A.3) and ∥Ek∥1,∞ ≲ | log h|H2, we obtain
1439
+ ∥ek
1440
+ H∥1,∞
1441
+
1442
+ ∥ek
1443
+ H − ˆPHEk∥1,∞ + ∥ ˆPHEk∥1,∞
1444
+
1445
+ H + | log H|∥Ek∥1,∞
1446
+
1447
+ H + | log H|| log h|H2,
1448
+ which completes the proof.
1449
+
AtE1T4oBgHgl3EQfDQOp/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DdAzT4oBgHgl3EQfif0c/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c11ae16beb401dfd6c2dd54589e229d3e5be68e94f672cfbdb9460089c6eefb2
3
+ size 199820
F9AzT4oBgHgl3EQfi_2P/content/tmp_files/2301.01509v1.pdf.txt ADDED
@@ -0,0 +1,1201 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Magnetization dynamics with time-dependent spin-density functional theory:
2
+ significance of exchange-correlation torques
3
+ Daniel Hill, Justin Shotton, and Carsten A. Ullrich∗
4
+ Department of Physics and Astronomy, University of Missouri, Columbia, Missouri 65211, USA
5
+ (Dated: January 5, 2023)
6
+ In spin-density-functional theory (SDFT) for noncollinear magnetic materials, the Kohn-Sham
7
+ system features exchange-correlation (xc) scalar potentials and magnetic fields. The significance of
8
+ the xc magnetic fields is not very well explored; in particular, they can give rise to local torques
9
+ on the magnetization, which are absent in standard local and semilocal approximations.
10
+ Exact
11
+ benchmark solutions for a five-site extended Hubbard lattice at half filling and in the presence of
12
+ spin-orbit coupling are compared with SDFT results obtained using orbital-dependent exchange-
13
+ only approximations. The magnetization dynamics following short-pulse excitations is found to be
14
+ reasonably well described in the exchange-only approximation for weak to moderate interactions.
15
+ For stronger interactions and near transitions between magnetically ordered and frustrated phases,
16
+ exchange and correlation torques tend to compensate each other and must both be accounted for.
17
+ I.
18
+ INTRODUCTION
19
+ Spin dynamics in magnetic systems is a research area
20
+ of much current activity. Spintronics [1], which is con-
21
+ cerned with the manipulation of electronic spins, spin
22
+ currents, spin textures, and spin excitations, has created
23
+ a wealth of scientific knowledge and many avenues for
24
+ new technologies.
25
+ Prominent examples are spin waves
26
+ for encoding and transmitting information (magnonics)
27
+ [2, 3], skyrmions for magnetic information storage [4–
28
+ 8], and single-spin qubits for quantum computation [9].
29
+ Another related area of much interest is ultrafast demag-
30
+ netization induced by femtosecond laser pulses [10–14].
31
+ Computational approaches to simulate magnetization
32
+ dynamics in a wide variety of systems are typically based
33
+ on the Landau-Lifshitz-Gilbert (LLG) equation of motion
34
+ [15, 16]. The LLG equation provides a classical descrip-
35
+ tion of the time evolution of the magnetization vector
36
+ m(t) in response to a time-dependent perturbation (typ-
37
+ ically, a short pulse or a periodic driving field) or evolving
38
+ from a nonequilibrium initial state.
39
+ Materials proper-
40
+ ties such as anisotropy, deformations, strain, and various
41
+ forms of damping can be built into the LLG approach
42
+ via phenomenological or “second-principles” parameters.
43
+ In this paper, we are less concerned with these spe-
44
+ cific materials properties; instead of LLG we will use a
45
+ fully quantum mechanical description of the electronic
46
+ charge and spin degrees of freedom, and our focus will
47
+ be specifically on the impact of electron-electron interac-
48
+ tions on the magnetization dynamics. To be more clear,
49
+ we consider a system of N interacting electrons under
50
+ the influence of a time-dependent scalar potential V (r, t)
51
+ and a time-dependent magnetic field B(r, t) which cou-
52
+ ples only to the electron spin (and not to orbital motion).
53
+ ∗ ullrichc@missouri.edu
54
+ The associated many-body Hamiltonian is given by
55
+ ˆH =
56
+ N
57
+
58
+ j
59
+
60
+ −∇2
61
+ j
62
+ 2 + V (rj, t) + σj · B(rj, t)
63
+
64
+ + 1
65
+ 2
66
+ N
67
+
68
+ j̸=k
69
+ 1
70
+ |rj − rk| ,
71
+ (1)
72
+ where σj is the vector of Pauli matrices acting on the
73
+ spin of the jth electron, and we define the magnetic field
74
+ strength such that the Bohr magneton, µB = e¯h/2m,
75
+ does not explicitly appear in the Hamiltonian ˆH.
76
+ We
77
+ use atomic units (e = m = ¯h = 4πϵ0 = 1) throughout.
78
+ From the Heisenberg equation of motion for ˆH, Capelle
79
+ et al. showed that the magnetization has the following
80
+ time evolution [17]:
81
+ dm(r, t)
82
+ dt
83
+ + ˆ∇ · J(r, t) = m(r, t) × B(r, t) ,
84
+ (2)
85
+ where J(r, t) is the spin-current tensor. Equation (2) is
86
+ exact but not very helpful in practice since J(r, t) re-
87
+ quires the many-body wave function associated with ˆH.
88
+ A more practical (but still in principle exact) alternative
89
+ is time-dependent spin-density functional theory (TD-
90
+ SDFT). The idea of TD-SDFT is to consider an auxiliary
91
+ system of noninteracting fermions, acted upon by an “ef-
92
+ fective” scalar potential and magnetic field, Veff(r, t) and
93
+ Beff(r, t), such that the same density n(r, t) and magne-
94
+ tization m(r, t) are produced as in the physical system.
95
+ The resulting equation of motion, the TD-SDFT coun-
96
+ terpart to Eq. (2), is [17]
97
+ dm(r, t)
98
+ dt
99
+ + ˆ∇ · JKS(r, t) = m(r, t) × Beff(r, t) .
100
+ (3)
101
+ Here, JKS(r, t) is the Kohn-Sham spin-current tensor,
102
+ which is easily determined from the noninteracting wave
103
+ function, and the effective magnetic field is defined as
104
+ Beff(r, t) = B(r, t) + Bxc(r, t), where the exchange-
105
+ correlation (xc) magnetic field Bxc is a functional of the
106
+ arXiv:2301.01509v1 [cond-mat.str-el] 4 Jan 2023
107
+
108
+ 2
109
+ density and magnetization. Formally, m(r, t) is the same
110
+ in Eqs. (2) and (3), but J and JKS are in general dif-
111
+ ferent (the difference lies in the transverse component).
112
+ Thus, the so-called xc torque,
113
+ τxc(r, t) = m(r, t) × Bxc(r, t) ,
114
+ (4)
115
+ ensures that TD-SDFT produces the correct magnetiza-
116
+ tion dynamics [17].
117
+ While all of this is clear at the formal level, the ex-
118
+ act form of Bxc is unknown and must be approximated
119
+ in practice. This immediately raises several questions:
120
+ which approximations of Bxc are available, and do they
121
+ produce xc torques?
122
+ And, how important are the xc
123
+ torques for the magnetization dynamics?
124
+ A number of approximations for Bxc have been derived
125
+ within ground-state SDFT for noncollinear magnetism
126
+ [18–20]; via the adiabatic approximation, they immedi-
127
+ ately carry over to TD-SDFT. The most widely used ap-
128
+ proach, pioneered by K¨ubler et al. [21, 22] and imple-
129
+ mented in many popular electronic structure codes, is
130
+ to use standard local or semilocal xc functionals such as
131
+ the local spin-density approximation (LSDA) or general-
132
+ ized gradient approximations (GGAs), and assume a lo-
133
+ cal spin quantization axis which is aligned with the local
134
+ magnetization vector m(r, t); this produces a Bxc(r, t)
135
+ that is parallel to m(r, t) everywhere. We see right away
136
+ from Eq. (4) that this class of approximations does not
137
+ produce any xc torques.
138
+ Approximations for Bxc that do include xc torque ef-
139
+ fects can be constructed in several ways.
140
+ Existing lo-
141
+ cal and semilocal functionals (LSDA and GGAs) have
142
+ been modified [23–26] or used in a source-free construc-
143
+ tion [27], and new gradient-corrected functionals were
144
+ constructed based using the spin-spiral state of the elec-
145
+ tron gas as reference system [28–30].
146
+ More consistent
147
+ derivations of xc meta-GGAs, starting from noncollinear
148
+ generalizations of the exchange hole and the two-body
149
+ density matrix, were recently presented [31, 32]. Vari-
150
+ ous orbital-dependent functionals were generalized to the
151
+ case of noncollinear magnetization [33–35].
152
+ Existing applications of ground-state SDFT to non-
153
+ collinear magnetic materials [25, 26, 33] and model sys-
154
+ tems [36] seem to suggest that xc torques are of relatively
155
+ minor importance for magnetic structure and energetics,
156
+ although the torques themselves may not be insignificant
157
+ [32]. On the other hand, there are good reasons to expect
158
+ that xc torques will be more impactful for magnetization
159
+ dynamics: they explicitly appear in the equation of mo-
160
+ tion, Eq. (3), and even if τxc(r, t) is relatively small at
161
+ a given r and t, its effect can accumulate over time. So
162
+ far, however, there has been no systematic attempt to
163
+ assess this hypothesis. We are only aware of one study
164
+ in the literature, where Dewhurst et al. [37] used their
165
+ source-free Bxc functional to simulate laser-induced spin
166
+ dynamics in bulk Co and Ni and Co-Pt and Ni-Pt inter-
167
+ faces. They found that xc torques were significant only
168
+ if they are not overshadowed by magnetic anisotropy ef-
169
+ fects (i.e., in bulk, and not at interfaces), and that they
170
+ FIG. 1.
171
+ Geometry of the 5-site Hubbard cluster used in
172
+ this work. The arrows indicate the ordering of the nearest-
173
+ neighbor sum in Eq. (6), accounting for the directional hop-
174
+ ping due to SOC.
175
+ give rise to rather slow spin rotation compared to other
176
+ forms of spin dynamics, induced optically or via spin-
177
+ orbit coupling (SOC).
178
+ In this paper, our goal is to assess the importance of
179
+ xc torques in frustrated magnetic systems.
180
+ Exchange-
181
+ frustrated solids such as spin glasses and kagome antifer-
182
+ romagnetic lattices are characterized by many competing
183
+ noncollinear spin configurations and quantum spin liquid
184
+ phases [38–40], and may therefore exhibit an enhanced
185
+ sensitivity to subtle xc torque effects. Needless to say, ex-
186
+ tended spin frustrated solids are challenging to describe,
187
+ and exact or quasi-exact benchmark results are hard to
188
+ come by. We will therefore limit ourselves to small model
189
+ systems which capture the spirit of spin frustration and
190
+ yet are computationally manageable.
191
+ Here, we will consider small Hubbard-type model
192
+ systems along similar lines as in our earlier studies
193
+ [35, 36, 41]; by including SOC we can generate intrin-
194
+ sically noncollinear ground states. In particular, we will
195
+ focus on a five-site half-filled Hubbard bowtie as a mini-
196
+ mal model for studying xc torque effects in the presence
197
+ of magnetic frustration. We will generate both exact and
198
+ SDFT phase diagrams of spin configurations for this sys-
199
+ tem and explore the spin dynamics for different config-
200
+ urations in the phase diagram.
201
+ The TD-SDFT treat-
202
+ ment will be based on orbital-dependent exchange-only
203
+ functionals, and we will compare with exact solutions
204
+ of the many-body time-dependent Schr¨odinger equation.
205
+ Focusing on a few representative case studies, we will
206
+ gain insight into the significance of xc torques in differ-
207
+ ent regimes.
208
+ The paper is organized as follows. In Sec. II the ex-
209
+ tended Hubbard model and the SDFT framework are in-
210
+ troduced and the exact and SDFT magnetic phase dia-
211
+ grams are discussed. In Sec. III we describe some techni-
212
+ cal aspects of the TD-SDFT modeling such as the choice
213
+ of initial state.
214
+ In Sec. IV the results of exact diago-
215
+ nalization and SDFT models are compared for the cases
216
+ with moderate to strong correlations and non-local inter-
217
+ actions. Conclusions are given in Sec. V.
218
+
219
+ 2
220
+ 4
221
+ 3
222
+ 53
223
+ II.
224
+ EXACT AND SDFT MAGNETIC
225
+ STRUCTURE OF HUBBARD CLUSTERS
226
+ A.
227
+ Definition of the model
228
+ In this paper we limit ourselves to (TD-)SDFT in the
229
+ exchange-only approximation. As discussed earlier [36],
230
+ the standard Hubbard model with on-site interactions
231
+ does not give rise to any exchange torques. If one wishes
232
+ to study exchange torque effects it is necessary to work
233
+ with an extended Hubbard model instead. We will con-
234
+ sider, in the following, a half-filled 5-site Hubbard cluster
235
+ in a bowtie shape, as shown in Fig. 1. Here, we go be-
236
+ yond Ref. [36] and include SOC through a modification
237
+ of the kinetic-energy operator, where the hopping term
238
+ becomes complex and the hopping acquires a directional-
239
+ ity [42, 43]. Thus, our inhomogeneous extended Hubbard
240
+ model with SOC is described by the Hamiltonian
241
+ ˆHmodel = ˆHT + ˆHU + ˆHext .
242
+ (5)
243
+ The first term is a hopping term with SOC absorbed into
244
+ a spin dependent phase factor,
245
+ ˆHT = −th
246
+
247
+ ⟨j,j′⟩
248
+
249
+ σ
250
+ e−iσθc†
251
+ jσcj′σ + h.c.,
252
+ (6)
253
+ where h.c. stands for Hermitian conjugate. Here, th =
254
+
255
+ T 2 + C2 is the generalized hopping strength parameter
256
+ which depends on nearest neighbor hopping strength T
257
+ and spin orbit coupling C, j is the site index for the
258
+ geometry shown in Fig. 1, cjσ is the annihilation operator
259
+ for an electron of spin σ at site j, the brackets ⟨. . .⟩ denote
260
+ an ordered sum over nearest neighbors with the order
261
+ indicated by the arrows in Fig. 1, and σ = ±1 labels
262
+ spin-up and -down.
263
+ Furthermore, θ is the SOC angle
264
+ which parameterizes the strength of the SOC parameter
265
+ C relative to the conventional hopping term T [44–46].
266
+ The second term in the model Hamiltonian (5) com-
267
+ prises the on-site and nearest-neighbor interaction terms,
268
+ ˆHU = U0
269
+
270
+ j
271
+ nj↑nj↓ + U1
272
+
273
+ ⟨j,j′⟩
274
+
275
+ σ,σ′
276
+ njσnj′σ′ ,
277
+ (7)
278
+ where njσ = c†
279
+ jσcjσ is the spin σ particle number density
280
+ at site j, and U0 and U1 are the on-site and nearest-
281
+ neighbor repulsion strengths, respectively. For the pur-
282
+ poses of this paper, we set U1 =
283
+ 1
284
+ 2U0, a fairly typical
285
+ choice for modeling real materials [47], and we restrict
286
+ the hopping parameter th and on-site interaction param-
287
+ eter U0 to be of similar orders of magnitude. Finite non-
288
+ local interactions are necessary for nontrivial exchange
289
+ torques, but we avoid the much stronger interactions
290
+ regime because the charge degrees of freedom tend to
291
+ freeze out as U0 and U1 become large, resulting in the
292
+ dynamics being dominated by a simpler pure-spin low-
293
+ energy effective model.
294
+ Lastly, ˆHext contains the couplings to the external po-
295
+ tential and external magnetic field,
296
+ ˆHext =
297
+
298
+ j
299
+ (Vjnj + Bj · mj) ,
300
+ (8)
301
+ where Vj is the scalar potential and Bj is the magnetic
302
+ field on site j, the total density is nj = nj↑ + nj↓, and
303
+ the magnetization is given by mj = �
304
+ σ,σ′ c†
305
+ jσ⃗σσσ′cjσ′
306
+ with ⃗σ = (σx, σy, σz) denoting a vector composed of
307
+ the Pauli matrices. We keep the external field param-
308
+ eters each less than the on-site interaction and hopping,
309
+ Vj, |Bj| < U0, th.
310
+ These external field parameters are
311
+ not strictly set to zero because they can be used to break
312
+ degeneracy in order to fix a symmetry breaking state,
313
+ and because, as discussed in Section III, small variation
314
+ of these parameters in the exact model is found to be
315
+ useful in matching the SDFT initial state and the exact
316
+ initial state more accurately.
317
+ B.
318
+ Magnetic phase diagram of the Hubbard bowtie
319
+ We use exact diagonalization of ˆHmodel to construct
320
+ benchmark solutions with which to compare our SDFT
321
+ results. Figure 2a shows the exact phase diagram of the
322
+ half-filled Hubbard bowtie in a plane whose x − y axes
323
+ are defined by C = (th/U0) sin θ and T = (th/U0) cos θ;
324
+ the SOC angle θ is here measured with respect to the
325
+ kinetic energy axis. Similar phase diagrams for the half-
326
+ filled Hubbard trimer were obtained by Tabrizi et al.
327
+ [43]. Within the above specified regime the model has
328
+ a phase transition at θc = nπ/3 for any integer n. For
329
+ the case of zero external fields, the ground state of the
330
+ 5-site model at half filling is degenerate and magnetically
331
+ ordered with a nontrivial noncollinear spin structure (ex-
332
+ cept at isolated points in the phase diagram where the
333
+ spins are ferromagnetically aligned) indicating magnetic
334
+ frustration.
335
+ On the phase boundary, θc, the ground state exhibits
336
+ a symmetry breaking charge density wave (CDW) in the
337
+ form of a spontaneous charge polarization along the x-
338
+ axis of Fig. 1. In Fig. 2a the states shown outside the
339
+ phase diagram image are the states at the critical angles
340
+ θc. A specific choice of charge polarization is depicted
341
+ in order to show the corresponding spin state. The sites
342
+ with no spin indicated do not necessarily have zero mag-
343
+ netic moment, but it tends to be orders of magnitude
344
+ smaller. The states shown inside the shaded segments of
345
+ the phase diagram are those of the midpoint angles be-
346
+ tween the phase boundaries, e.g. θ = 30◦. As θ changes,
347
+ the relative angles of the spins change as well, with the
348
+ fastest changes occurring in the vicinity of the phase tran-
349
+ sitions. Thus, the phase transitions at θc are not discon-
350
+ tinuous, rather they appear to be a zero temperature,
351
+ finite model analog of a second order phase transition,
352
+ although the continuous transition occurs over a rather
353
+ narrow range of θ.
354
+
355
+ 4
356
+ T
357
+ C
358
+ 60∘
359
+ T
360
+ 60∘
361
+ C
362
+ a
363
+ b
364
+ CDW
365
+ CDW
366
+ CDW
367
+ CDW
368
+ CDW
369
+ CDW
370
+ FIG. 2.
371
+ (a) Magnetic phase diagram of the half-filled 5-site Hubbard model, obtained using exact diagonalization.
372
+ The
373
+ red arrows indicate the relative in-plane spin direction of the state depicted (taken at the midpoint angle between the phase
374
+ boundaries). The blue pluses and minuses indicate the direction of electric polarization for the CDW critical angle states
375
+ for the specific spin arrangement shown. (b) Corresponding magnetic phase diagram using exchange-only SDFT, showing the
376
+ broadening of the phase boundary states. The phase diagram has approximately the same states as for the exact diagonalization
377
+ phase diagram, but the critical angles, where a CDW occurs, acquire a width of a few degrees.
378
+ The complete phase diagram of the ground state of
379
+ our 5-site Hubbard bowtie and other finite and extended
380
+ triangular lattice systems is of interest in and by itself,
381
+ especially with respect to their symmetries.
382
+ A more
383
+ complete formal analysis of the phase boundaries and
384
+ other symmetry-related properties will be the subject of
385
+ a forthcoming study.
386
+ C.
387
+ Exchange-only SDFT
388
+ Exact exchange in noncollinear SDFT has been defined
389
+ in Ref. [35]. Starting point is the exchange energy
390
+ Ex = −1
391
+ 2
392
+ � �
393
+ drdr′
394
+ |r − r′|Tr
395
+
396
+ γ(r, r′)γ(r′, r)
397
+
398
+ .
399
+ (9)
400
+ Here, γ denotes the one-particle spin-density matrix, a
401
+ 2 × 2 matrix in spin space whose elements are given
402
+ by γσξ(r, r′) = �N
403
+ j ψjσ(r)ψ∗
404
+ jξ(r′), constructed from two-
405
+ component spinor Kohn-Sham orbitals, where σ =↑, ↓
406
+ and likewise for ξ; Tr is the trace over spin indices. The
407
+ exact noncollinear exchange potential then follows by
408
+ minimizing Ex with respect to the orbitals, under the
409
+ constraint that the orbitals come from a single-particle
410
+ equation with a local potential—this is the so-called op-
411
+ timized effective potential (OEP) approach [48].
412
+ This
413
+ approach is system-independent, i.e., it can be defined in
414
+ real space and for lattice models alike.
415
+ The exact-exchange OEP requires solving an integral
416
+ equation; we use here instead a simplification known as
417
+ the Krieger-Li-Iafrate (KLI) approximation [49].
418
+ The
419
+ construction and numerical solution of the noncollinear
420
+ KLI approximation have been discussed in detail in Refs.
421
+ [32, 35]. KLI directly yields a scalar exchange potential
422
+ and an exchange magnetic field with moderate numeri-
423
+ cal effort and with very little loss of accuracy compared
424
+ to the full OEP. In time-dependent SDFT, the exact-
425
+ exchange OEP formally carries a memory [50]. The time-
426
+ dependent KLI, on the other hand, is an adiabatic ap-
427
+ proximation.
428
+ KLI
429
+ for
430
+ noncollinear
431
+ systems
432
+ produces
433
+ exchange
434
+ torques in extended Hubbard systems [36]. For the pur-
435
+ poses of the present study, we also define a projected KLI
436
+ (KLIp) in which the exchange magnetic field Bx on each
437
+ lattice site is projected along the local magnetization di-
438
+ rection, and which therefore has no exchange torques.
439
+ D.
440
+ SDFT phase diagram
441
+ In the SDFT modeling of the Hamiltonian (5), a simi-
442
+ lar magnetic phase diagram is obtained as the exact one
443
+ shown in Fig. 2a. The main difference is that the phase
444
+
445
+ 5
446
+ boundaries at the critical angles θc are not as sharp as
447
+ in the exact case but quite diffuse, as schematically de-
448
+ picted in Fig. 2b. This is mainly due to the well-known
449
+ tendency of SDFT to prefer symmetry breaking, unless
450
+ highly accurate correlation functionals are used.
451
+ The broadened phase boundary region has a tendency
452
+ to exhibit “charge sloshing” [51] in the Kohn-Sham self-
453
+ consistency iterations. Charge sloshing spoils the con-
454
+ vergence behavior and must be overcome with special
455
+ measures, e.g. charge preconditioning or imaginary time
456
+ propagation [52]. A sufficiently strong external potential
457
+ Vj can also be applied to one side of the model in or-
458
+ der to prevent charge sloshing. A fairly strong external
459
+ potential in the exchange-only SDFT modeling is also
460
+ necessary in the vicinity of θc in order to match to the
461
+ exact initial state because correlation effects tend to be
462
+ stronger close to the phase boundaries (see Sec. III).
463
+ For the simulations of section IV D, where the SDFT
464
+ calculations are not tethered to an exact initial solu-
465
+ tion, charge sloshing can arise in the stronger interaction
466
+ regime, even far from the critical angle θc.
467
+ We found
468
+ that replacing the Kohn-Sham self-consistency loop with
469
+ an imaginary time propagation algorithm [52] for com-
470
+ puting the SDFT ground state was useful in mitigating
471
+ charge sloshing.
472
+ III.
473
+ TIME PROPAGATION AND CHOICE OF
474
+ INITIAL STATE
475
+ In order to compare the dynamics of the exact and
476
+ TD-SDFT solutions, we excite the system with a small,
477
+ localized magnetic field burst along the y direction dur-
478
+ ing a brief number of time steps. To propagate the full
479
+ time-dependent many-body Schr¨odinger equation for our
480
+ Hubbard bowtie we use a standard Crank-Nicolson algo-
481
+ rithm.
482
+ The time-dependent Kohn-Sham equations are
483
+ also propagated using Crank-Nicolson, including a pre-
484
+ dictor-corrector scheme (one corrector step suffices) [53].
485
+ Since our interest is predominantly in the dynamical
486
+ effects comparing KLI and KLIp, we start in both cases
487
+ from the same ground state. This means that the ex-
488
+ change torques must be included in the calculation of
489
+ the KLIp initial state, as this is required in order to
490
+ have KLIp start with the same initial conditions as the
491
+ full KLI simulations; however, these torques are frozen
492
+ in, effectively in the form of an external magnetic field.
493
+ By contrast, in full KLI the exchange torques are time-
494
+ dependent as the system evolves.
495
+ Compared to the differences between exchange-only
496
+ SDFT and exact many-body benchmarks, the differences
497
+ between KLI and KLIp are small and can easily be over-
498
+ shadowed. Since we are here interested in relatively sub-
499
+ tle dynamical exchange torque effects, it is desirable to
500
+ start from a KLI initial state with external scalar poten-
501
+ tial Vj and magnetic field Bj chosen to reproduce the
502
+ exact density and magnetization. With some effort, Vj
503
+ and Bj can be numerically constructed by minimizing
504
+ TABLE I. SOC angle θ and interaction strength U0 for the
505
+ three ground states considered in Sec. IV, the total magnitude
506
+ of the exact xc torque and the exchange-only torque, and the
507
+ correlation and exchange energies.
508
+ θ
509
+ U0
510
+ Σj|τxc|
511
+ Σj|τ KLI
512
+ x
513
+ |
514
+ Ec
515
+ Ex
516
+ 30◦
517
+ 1
518
+ 4.2 × 10−2
519
+ 2.6 × 10−2
520
+ -0.214
521
+ -1.84
522
+ 30◦
523
+ 3
524
+ 4.8 × 10−2
525
+ 1.2 × 10−1
526
+ -0.236
527
+ -5.82
528
+ 60◦
529
+ 1
530
+ 1.3 × 10−4
531
+ 2.0 × 10−3
532
+ -0.448
533
+ -1.92
534
+ the functional
535
+ F(Vj, Bj) =
536
+
537
+ j
538
+
539
+ (nj − n(0)
540
+ j )2 + |mj − m(0)
541
+ j |2�
542
+ ,
543
+ (10)
544
+ where n(0)
545
+ j
546
+ and m(0)
547
+ j
548
+ are the target density and mag-
549
+ netization, respectively.
550
+ For each simulation matched
551
+ to an exact initial state, we minimize F to an accu-
552
+ racy of at least F = 10−25. The minimization is done
553
+ via a conjugate gradient method with randomized resets
554
+ when a local minimum of insufficient accuracy is reached.
555
+ Searching over Vj and Bj of only the SDFT simulations
556
+ to find the minimum of F is extremely computationally
557
+ expensive due to the high dimensionality of the parame-
558
+ ter space. In order to overcome this issue, we switch to
559
+ minimizing F with respect to the external fields of the
560
+ exact solution once F <∼ 10−4. Minimizing with respect
561
+ to exact solution parameters is less computationally ex-
562
+ pensive due to the much smoother response of the exact
563
+ solution to small changes in the external fields.
564
+ IV.
565
+ RESULTS AND DISCUSSION
566
+ The model system shown in Fig. 1 is simple yet ex-
567
+ hibits quite a rich range of structural and dynamical be-
568
+ havior. The parameter space to be explored comprises
569
+ the hopping strength th, the SOC angle θ, and the inter-
570
+ action strength U0 (fixing U1 = U0/2). In the following
571
+ we set th = 1 and limit ourselves to three representative
572
+ choices of (θ, U0) in the magnetic phase diagram. This
573
+ will already be sufficient to gain insight into the signifi-
574
+ cance of the xc torques.
575
+ Table I gives an overview of the three parameter sets,
576
+ the ground-state exchange and correlation energies Ex
577
+ and Ec, and the magnitude of the exact xc torque τxc
578
+ and of the exchange-only torque τx. These will be further
579
+ discussed below.
580
+ A.
581
+ θ = 30◦, U0 = 1
582
+ We first consider the case θ = 30◦, which is in the
583
+ middle of the spin-frustrated region shown in yellow in
584
+ the phase diagrams of Fig. 2, and for weak interaction
585
+ strength U0 = 1. The magnetization dynamics compari-
586
+ son of exact, KLI, and KLIp is shown in Fig. 3a, which
587
+
588
+ 6
589
+ exact
590
+ KLI
591
+ KLIproj
592
+ b
593
+ a
594
+ Frequency
595
+ Y-axis Magentization (x10−5)
596
+ Spectral Amplitude (a.u.)
597
+ FIG. 3.
598
+ Comparison of exact, KLI, and KLIp modeling for
599
+ the case of θ = 30◦ and U0 = 1.
600
+ (a) Dynamics of the y-
601
+ component of the magnetization of a corner site exited by a
602
+ small, short, local burst of magnetic field in the y direction.
603
+ (b) Associated spectral amplitude (in arbitrary units), calcu-
604
+ lated via Fourier transform of the data shown in part (a).
605
+ depicts the magnetization along the y-direction of a cor-
606
+ ner site. By construction (see Sec. III), all three methods
607
+ start from the same initial value.
608
+ KLI and KLIp stay fairly close to one another for
609
+ much of the run time due to the relative smallness of the
610
+ Hubbard interaction, which indicates that the exchange
611
+ torques are not very important in the chosen regime. For
612
+ the first few cycles of the precessional motion triggered by
613
+ the short pulse, exchange-only SDFT is quite close to the
614
+ exact result. In spite of that, both KLI and KLIp start
615
+ to diverge significantly from the exact solution around
616
+ t = 15, which shows that the correlation effects, although
617
+ relatively small, eventually start playing a nonnegligible
618
+ role in the time evolution of the system.
619
+ To gain further insight, we perform a spectral analysis
620
+ of the time-dependent data via Fourier transformation
621
+ of the amplitude of the magnetization oscillations, which
622
+ reveals the spectrum of magnetic excitations. As shown
623
+ in Fig. 3b, KLI and KLIp agree well with the exact spec-
624
+ trum at low frequencies (up to about a frequency ω = 3).
625
+ At higher frequencies, the SDFT spectra differ from the
626
+ b
627
+ a
628
+ Frequency
629
+ Y-axis Magentization (x10−5)
630
+ Spectral Amplitude (a.u.)
631
+ FIG. 4.
632
+ Same as Fig. 3 but for U0 = 3.
633
+ exact spectra, which may be due to the fact that we are
634
+ using here an adiabatic approximation which does not
635
+ produce double or higher excitations [53] and hence does
636
+ not capture all peaks. However, KLI and KLIp remain
637
+ very close to each other throughout, illustrating again
638
+ that exchange torques are insignificant here.
639
+ B.
640
+ θ = 30◦, U0 = 3
641
+ For the second case, we remain at θ = 30◦, away
642
+ from the phase boundaries, but increase the interaction
643
+ strength into the moderately strongly interacting regime,
644
+ at U0 = 3. The real time magnetization dynamics and
645
+ amplitude spectrum are shown in Fig. 4. Clearly, KLI
646
+ and KLIp start to differ from each other almost right
647
+ away, which points to the more important role of the
648
+ exchange torques.
649
+ At first glance, it is surprising to see that the projected
650
+ KLI, which has no torques, agrees better with the exact
651
+ magnetization oscillations, at least for the first few cycles.
652
+ To explain this, it is helpful to consider the magnitudes
653
+ of the initial τxc and τx given in Table I. For U0 = 1, the
654
+ sum of the exchange torques is comparable to the sum of
655
+ the xc torques (within a factor 1.6); at U0 = 3, on the
656
+ other hand, the exchange torques are much larger than
657
+
658
+ my[0]
659
+ 0.12826
660
+ KS
661
+ 0.12828
662
+ KSproj
663
+ 0.12830
664
+ 0.12832
665
+ 0.12834
666
+ SIxe
667
+ 0.12836
668
+ -0.12838
669
+ 0.0
670
+ 2.5
671
+ 5.0
672
+ 7.5
673
+ 10.0
674
+ 12.5
675
+ 15.0
676
+ 17.5
677
+ 20.0
678
+ Timemy[0]
679
+ -0.12826
680
+ exact
681
+ KS
682
+ -0.12828
683
+ KSproj
684
+ -0.12830
685
+ -0.12832
686
+ -0.12834
687
+ -0.12836
688
+ -0.12838
689
+ 0.0
690
+ 2.5
691
+ 5.0
692
+ 7.5
693
+ 10.0
694
+ 12.5
695
+ 15.0
696
+ 17.5
697
+ 20.0
698
+ Timemy[O] FFT
699
+ 10-1
700
+ exact
701
+ KLI
702
+ 10-2
703
+ KLIproj
704
+ FFT amplitude (a.u.)
705
+ 10-4
706
+ 10-5
707
+ 10-6.
708
+ 10-7,
709
+ 0
710
+ 2
711
+ 4
712
+ 5
713
+ 6
714
+ Excitation energy (in units of tg)my[o]
715
+ le-5-1.567e.
716
+ exact
717
+ -5.2
718
+ KLI
719
+ KLIproj
720
+ 5.4
721
+ 5.6
722
+ 5.8
723
+ 6.0
724
+ 6.2
725
+ -6.4
726
+ 0.0
727
+ 2.5
728
+ 5.0
729
+ 7.5
730
+ 10.0
731
+ 12.5
732
+ 15.0
733
+ 17.5
734
+ 20.0
735
+ Timemy[O] FFT
736
+ 10-2
737
+ amplitude (a.u.)
738
+ 10
739
+ -4
740
+ 10-5
741
+ FT
742
+ 10-6
743
+ exact
744
+ KLI
745
+ KLIproj
746
+ 10-7
747
+ 0
748
+ 2
749
+ 3
750
+ 1
751
+ 4
752
+ 5
753
+ 6
754
+ Excitation energy (in units of tg)my[0]
755
+ 1e-5-3.28e-1
756
+ 6.0
757
+ 6
758
+ 6.4
759
+ 6.6
760
+ 6.8
761
+ 7.0
762
+ -7.2
763
+ exact
764
+ -7.4
765
+ KLI
766
+ KLIproj
767
+ -7.6
768
+ 0.0
769
+ 2.5
770
+ 5.0
771
+ 7.5
772
+ 10.0
773
+ 12.5
774
+ 15.0
775
+ 17.5
776
+ 20.0
777
+ Time7
778
+ b
779
+ a
780
+ Frequency
781
+ Y-axis Magentization (x10−5)
782
+ Spectral Amplitude (a.u.)
783
+ FIG. 5.
784
+ Same as Fig. 3 but for θ = 60◦.
785
+ the xc torques, which suggests that the correlation con-
786
+ tribution to the torques becomes relatively much more
787
+ important. In other words, exchange-only overestimates
788
+ the torques, and correlation compensates for it. KLIp
789
+ avoids this overestimation (better no exchange torque at
790
+ all, than too much of it), and brings the dynamics closer
791
+ to the exact case. Notice that this could have not been
792
+ anticipated just from looking at the exchange and cor-
793
+ relation energies Ex and Ec of the initial state, which
794
+ would have suggested that the exchange is dominant.
795
+ The Fourier spectrum in Fig. 4b is less clear: while
796
+ both KLI and KLIp seem to reproduce the rough trends
797
+ of the exact spectrum, it is difficult to say which one of
798
+ them agrees better. Neither of them captures the details
799
+ of the exact spectrum particularly well.
800
+ C.
801
+ θ = 60◦, U0 = 1
802
+ Lastly, we consider the case of θ = 60◦ and U0 = 1, see
803
+ Fig. 5. This state is at a critical angle of the magnetic
804
+ phase diagram where artificial charge density symmetry
805
+ breaking in exchange-only SDFT is prevalent, indicat-
806
+ ing that strong correlations are needed to reproduce the
807
+ exact results. As shown in Table I, Ec is significantly en-
808
+ hanced relative to Ex, compared to the case of θ = 30◦.
809
+ ∑j |τKLI
810
+ x
811
+ |
812
+ 0
813
+ 1
814
+ 2
815
+ 3
816
+ 4
817
+ Fave
818
+ U0
819
+ FIG. 6.
820
+ Red (right axis): Comparison between KLI and
821
+ KLIp solutions as a function of interaction strength for the
822
+ case of θ = 30◦ and U0, quantified by the time-averaged dis-
823
+ tance measure Fave, Eq. (11). Blue (left axis): Σj|τ KLI
824
+ x
825
+ | of
826
+ the Hubbard bowtie ground state versus U0.
827
+ Correspondingly, the exchange torques are lower, due to
828
+ the localization of the magnetization to one side of the
829
+ system. The strong correlation effects at the transition
830
+ angle result in both KLI and KLIp diverging from the
831
+ exact solution fairly quickly. The magnetization oscilla-
832
+ tions calculated with KLI and KLIp match each other
833
+ fairly well, at least for the first few cycles, but then dif-
834
+ ferences start to accumulate.
835
+ The Fourier spectrum, see Fig. 5b, has well defined ex-
836
+ citations, which are fairly well captured by both KLI and
837
+ KLIp, but some inaccuracies are noticeable at both high
838
+ and low frequencies.
839
+ Notably, KLIp performs slightly
840
+ better at estimating the gaps in the spectrum for mid-
841
+ range frequency excitations. The better performance of
842
+ KLIp occurs, similarly to Section IV B, due to the KLI
843
+ exchange-only approximation substantially overestimat-
844
+ ing the xc torques, with no correlation to compensate
845
+ (see Table I).
846
+ D.
847
+ Distance between KLI and KLIp versus U0
848
+ The effect of the exchange torques can be further quan-
849
+ tified by introducing the time-averaged distance measure
850
+ Fave = 1
851
+ t
852
+ � t
853
+ 0
854
+ dt′ �
855
+ j
856
+ � �
857
+ nKLI
858
+ j
859
+ − nKLIp
860
+ j
861
+ �2
862
+ +
863
+ ���mKLI
864
+ j
865
+ − mKLIp
866
+ j
867
+ ���
868
+ 2 �
869
+ ,
870
+ (11)
871
+ where we calculate the time average over a short time
872
+ (t = 2) after initial excitation.
873
+ This provides an esti-
874
+ mate of the degree of divergence between the solutions
875
+ which can be compared with interaction strength and the
876
+ magnitude of ground state KLI exchange torques.
877
+ Figure 6 shows the time-averaged distance measure
878
+ (11) between KLI and KLIp as a function of U0 at
879
+ θ = 30◦, and, for the sake of comparison, the sum of
880
+
881
+ my[O] FFT
882
+ 10-1
883
+ exact
884
+ KLI
885
+ 10-2
886
+ KLIproj
887
+ FFT amplitude (a.u.)
888
+ 10-4
889
+ 10-5
890
+ 10-6.
891
+ 10-7_
892
+ 0
893
+ 2
894
+ 3
895
+ 4
896
+ 5
897
+ 7
898
+ 6
899
+ Excitation energy (in units of tg)my[o]
900
+ 1e-5-2.521e-1
901
+ 3.2
902
+ Y-axis Magnetization Magnitude
903
+ 3.4
904
+ 3.6
905
+ 3.8
906
+ 4.0
907
+ 4.2
908
+ exact
909
+ KLI
910
+ -4.4
911
+ KLIproj
912
+ 0.0
913
+ 2.5
914
+ 5.0
915
+ 7.5
916
+ 10.0
917
+ 12.5
918
+ 15.0
919
+ 17.5
920
+ 20.0
921
+ Time0.25
922
+ 0.12
923
+ 0.10
924
+ 0.20
925
+ 0.08
926
+ 0.15
927
+ 0.06
928
+ 0.10
929
+ 0.04
930
+ 0.05
931
+ 0.02
932
+ 0.00
933
+ 0.00
934
+ 0.0
935
+ 0.5
936
+ 1.0
937
+ 1.5
938
+ 2.08
939
+ the magnitudes of the KLI exchange torques of the corre-
940
+ sponding initial states. Both Fave and Σj|τ KLI
941
+ x
942
+ | start out
943
+ linearly for small interaction strengths U0 and keep in-
944
+ creasing well into the moderate interaction regime, where
945
+ Fave appears to start leveling off around U0 = 2.
946
+ A comparison with exact time-dependent xc torques
947
+ is, unfortunately, not possible; even the construction of
948
+ the exact Σj|τxc| over the whole range of U0 is numeri-
949
+ cally too demanding, except for the three cases in Table
950
+ I. Nevertheless, we can infer from the results presented
951
+ in Fig.
952
+ 6 that both exchange and correlation torques
953
+ must be accounted for even for relatively low interaction
954
+ strengths in order to accurately describe the dynamics.
955
+ V.
956
+ CONCLUSION
957
+ We have performed exact and approximate, exchange-
958
+ only (TD)-SDFT calculations on a half-filled 5-site Hub-
959
+ bard cluster with varying interaction and SOC strengths.
960
+ The purpose of this study was to assess the significance of
961
+ many-body magnetic torques for the description of spin
962
+ dynamics. We considered three scenarios with weak and
963
+ moderate interactions and close to and away from a tran-
964
+ sition between different magnetic phases. While this is
965
+ clearly not an exhaustive exploration of the parameter
966
+ space, the examples studied here are good representa-
967
+ tives and allow us to draw meaningful conclusions.
968
+ We find that exchange torques become increasingly im-
969
+ portant as non-local interactions become stronger, with
970
+ an approximately linear dependence at low interactions
971
+ (see Fig. 6), but the relationship becomes nonlinear for
972
+ more general interaction strengths. Strong correlations in
973
+ the vicinity of phase boundaries reduce the importance of
974
+ exchange torques due to localization. When correlations
975
+ are particularly strong, they appear to counteract the ex-
976
+ change torques, leading to a net reduction of the total xc
977
+ torques. This suggests that when lacking a sufficiently ac-
978
+ curate correlation functional, completely projecting out
979
+ the xc torques may improve the overall accuracy of TD-
980
+ SDFT magnetic dynamics, at least for short times.
981
+ The challenge for future work is clearly to construct
982
+ correlation functionals that produce accurate torques,
983
+ and test these against benchmarks. A good starting point
984
+ will be to do this for similar finite Hubbard models, fol-
985
+ lowed by tests for the magnetization dynamics in real
986
+ magnetic materials in the linear and nonlinear regime.
987
+ ACKNOWLEDGMENTS
988
+ This work was supported by DOE Grant No.
989
+ DE-
990
+ SC0019109. The authors wish to thank Aurora Pribram-
991
+ Jones for helpful discussion.
992
+ [1] I. ˇZuti´c, J. Fabian, and S. Das Sarma, Spintronics: Fun-
993
+ damentals and applications, Rev. Mod. Phys. 76, 323
994
+ (2004).
995
+ [2] S. M. Rezende, Fundamentals of Magnonics, Lecture
996
+ Notes in Physics, Vol. 969 (Springer, Heidelberg, 2020).
997
+ [3] A. Barman, G. Gubbiotti, S. Ladak, A. O. Adey-
998
+ eye, M. Krawczyk, J. Gr¨afe, C. Adelmann, S. Coto-
999
+ fana,
1000
+ A. Naeemi,
1001
+ V. I. Vasyuchka,
1002
+ B. Hillebrands,
1003
+ S. A. Nikitov, H. Yu, D. Grundler, A. V. Sadovnikov,
1004
+ A. A. Grachev, S. E. Sheshukova, J.-Y. Duquesne,
1005
+ M. Marangolo, G. Csaba, W. Porod, V. E. Demidov,
1006
+ S. Urazhdin, S. O. Demokritov, E. Albisetti, D. Petti,
1007
+ R. Bertacco, H. Schultheiss, V. V. Kruglyak, V. D.
1008
+ Poimanov, S. Sahoo, J. Sinha, H. Yang, M. M¨unzenberg,
1009
+ T. Moriyama, S. Mizukami, P. Landeros, R. A. Gallardo,
1010
+ G. Carlotti, J.-V. Kim, R. L. Stamps, R. E. Camley,
1011
+ B. Rana, Y. Otani, W. Yu, T. Yu, G. E. W. Bauer,
1012
+ C. Back, G. S. Uhrig, O. V. Dobrovolskiy, B. Budinska,
1013
+ H. Qin, S. van Dijken, A. V. Chumak, A. Khitun, D. E.
1014
+ Nikonov, I. A. Young, B. W. Zingsem, and M. Winkl-
1015
+ hofer, The 2021 magnonics roadmap, J. Phys.: Condens.
1016
+ Matter 337, 413001 (2021).
1017
+ [4] N. Nagasoa and Y. Tokura, Topological properties and
1018
+ dynamics of magnetic skyrmions, Nature Nanotech. 8,
1019
+ 899 (2013).
1020
+ [5] A. Fert, N. Reyren, and V. Cros, Magnetic skyrmions:
1021
+ advances in physics and potential applications, Nature
1022
+ Reviews Materials 2, 17031 (2017).
1023
+ [6] X. Zhang, J. Xia, Y. Zhou, X. Liu, H. Zhang, and
1024
+ M. Ezawa, Skyrmion dynamics in a frustrated ferromag-
1025
+ netic film and current-induced helicity locking-unlocking
1026
+ transition, Nature Commun. 8, 1717 (2017).
1027
+ [7] B. G¨obel, I. Mertig, and O. A. Tretiakov, Beyond
1028
+ skyrmions: Review and perspectives of alternative mag-
1029
+ netic quasiparticles, Phys. Rep. 895, 1 (2021).
1030
+ [8] Z. Chen, X. Zhang, Y. Zhou, and Q. Shao, Skyrmion dy-
1031
+ namics in the presence of deformation, Phys. Rev. Appl.
1032
+ 17, L011002 (2022).
1033
+ [9] L. Vandersypen and M. Eriksson, Quantum computing
1034
+ with semiconductor spins, Physics Today 72 (8), 38
1035
+ (2017).
1036
+ [10] U. Bovensiepen, Femtomagnetism:
1037
+ Magnetism in step
1038
+ with light, Nature Phys. 5, 461 (2009).
1039
+ [11] K. Krieger, J. K. Dewhurst, P. Elliott, S. Sharma, and
1040
+ E. K. U. Gross, Laser-induced demagnetization at ultra-
1041
+ short time scales: Predictions of TDDFT, J. Chem. The-
1042
+ ory Comput. 11, 4870 (2015).
1043
+ [12] G. P. Zhang, T. Latta, Z. Babyak, Y. H. Bai, and T. F.
1044
+ George, All-optical spin switching: a new frontier in fem-
1045
+ tomagnetism, Mod. Phys. Lett. B 30, 1630005 (2016).
1046
+ [13] G. P. Zhang, Y. H. Bai, and T. F. George, Ultrafast re-
1047
+ duction of exchange splitting in ferromagnetic nickel, J.
1048
+ Phys.: Condens. Matter 28, 236004 (2016).
1049
+ [14] S. R. Acharya, V. Turkowski, G. P. Zhang, and T. S.
1050
+ Rahman, Ultrafast electron correlations and memory ef-
1051
+ fects at work: Femtosecond demagnetization in Ni, Phys.
1052
+ Rev. Lett. 125, 017202 (2020).
1053
+ [15] E. M. Lifshitz and L. P. Pitaevskii, Statistical Physics:
1054
+ Theory of the Condensed State (Pt 2) (Butterworth-
1055
+ Heinemann, Oxford, 1980).
1056
+
1057
+ 9
1058
+ [16] O. Eriksson, A. Bergman, L. Bergqvist, and J. Hellsvik,
1059
+ Atomistic Spin Dynamics: Foundations and Applications
1060
+ (Oxford University Press, Oxford, 2017).
1061
+ [17] K. Capelle, G. Vignale, and B. L. Gy¨orffy, Spin currents
1062
+ and spin dynamics in time-dependent density-functional
1063
+ theory, Phys. Rev. Lett. 87, 206403 (2001).
1064
+ [18] U. von Barth and L. Hedin, A local exchange-correlation
1065
+ potential for the spin polarized case: I, J. Phys. C 5, 1629
1066
+ (1972).
1067
+ [19] O. Gunnarsson and B. I. Lundqvist, Exchange and corre-
1068
+ lation in atoms, molecules, and solids by the spin-density-
1069
+ functional formalism, Phys. Rev. B 13, 4274 (1976).
1070
+ [20] N. I. Gidopoulos, Potential in spin-density-functional
1071
+ theory of noncollinear magnetism determined by the
1072
+ many-electron ground state, Phys. Rev. B 75, 134408
1073
+ (2007).
1074
+ [21] J. K¨ubler, K.-H. H¨ock, J. Sticht, and A. R. Williams,
1075
+ Density functional theory of non-collinear magnetism, J.
1076
+ Phys. F: Met. Phys. 18, 469 (1988).
1077
+ [22] L. M. Sandratskii, Noncollinear magnetism in itinerant-
1078
+ electron systems: theory and applications, Adv. Phys.
1079
+ 47, 91 (1998).
1080
+ [23] M. I. Katsnelson and V. P. Antropov, Spin angular gradi-
1081
+ ent approximation in the density functional theory, Phys.
1082
+ Rev. B 67, 140406(R) (2003).
1083
+ [24] J. E. Peralta, G. E. Scuseria, and M. J. Frisch, Non-
1084
+ collinear magnetism in density functional calculations,
1085
+ Phys. Rev. B 75, 125119 (2007).
1086
+ [25] G. Scalmani and M. J. Frisch, A new approach to non-
1087
+ collinear spin density functional theory beyond the local
1088
+ density approximation, J. Chem. Theor. Comput. 8, 2193
1089
+ (2012).
1090
+ [26] I. W. Bulik, G. Scalmani, M. J. Frisch, and G. E. Scuse-
1091
+ ria, Noncollinear density functional theory having proper
1092
+ invariance and local torque properties, Phys. Rev. B 87,
1093
+ 035117 (2013).
1094
+ [27] S. Sharma, E. K. U. Gross, A. Sanna, and J. K. De-
1095
+ whurst, Source-free exchange-correlation magnetic fields
1096
+ in density functional theory, J. Chem. Theory Comput.
1097
+ 14, 1247 (2018).
1098
+ [28] L. Kleinman, Density functional for noncollinear mag-
1099
+ netic systems, Phys. Rev. B 59, 3314 (1999).
1100
+ [29] F. G. Eich and E. K. U. Gross, Transverse spin-gradient
1101
+ functional for noncollinear spin-density-functional the-
1102
+ ory, Phys. Rev. Lett. 111, 156401 (2013).
1103
+ [30] F. G. Eich, S. Pittalis, and G. Vignale, Transverse
1104
+ and longitudinal gradients of the spin magnetization in
1105
+ spin-density-functional theory, Phys. Rev. B 88, 245102
1106
+ (2013).
1107
+ [31] S. Pittalis, G. Vignale, and F. G. Eich, U(1)×SU(2)
1108
+ gauge invariance made simple for density functional ap-
1109
+ proximations, Phys. Rev. B 96, 035141 (2017).
1110
+ [32] N. Tancogne-Dejean, A. Rubio, and C. A. Ullrich, Con-
1111
+ structing semilocal approximations for noncollinear spin
1112
+ density functional theory featuring exchange-correlation
1113
+ torques, arXiv:2208.07729.
1114
+ [33] S.
1115
+ Sharma,
1116
+ J.
1117
+ K.
1118
+ Dewhurst,
1119
+ C.
1120
+ Ambrosch-Draxl,
1121
+ S. Kurth, N. Helbig, S. Pittalis, S. Shallcross, L. Nord-
1122
+ str¨om, and E. K. U. Gross, First-principles approach to
1123
+ noncollinear magnetism: towards spin dynamics, Phys.
1124
+ Rev. Lett. 98, 196405 (2007).
1125
+ [34] K. Capelle, G. Vignale, and C. A. Ullrich, Spin gaps and
1126
+ spin-flip energies in density-functional theory, Phys. Rev.
1127
+ B 81, 125114 (2010).
1128
+ [35] C. A. Ullrich, Density-functional theory for systems
1129
+ with noncollinear spin:
1130
+ orbital-dependent exchange-
1131
+ correlation functionals and their application to the Hub-
1132
+ bard dimer, Phys. Rev. B 98, 035140 (2018).
1133
+ [36] E. A. Pluhar, III and C. A. Ullrich, Exchange-correlation
1134
+ magnetic fields in spin-density-functional theory, Phys.
1135
+ Rev. B 100, 125135 (2019).
1136
+ [37] J. K. Dewhurst, A. Sanna, and S. Sharma, Effect of
1137
+ exchange-correlation spin-torque on spin dynamics, Eur.
1138
+ Phys. J. B 91, 218 (2018).
1139
+ [38] L. Balents, Spin liquids in frustrated magnets, Nature
1140
+ 464, 199 (2010).
1141
+ [39] Y. Zhou, K. Kanoda, and T.-K. Ng, Quantum spin liquid
1142
+ states, Rev. Mod. Phys. 89, 025003 (2017).
1143
+ [40] C. Broholm, R. J. Cava, S. A. Kivelson, D. G. Nocera,
1144
+ M. R. Norman, and T. Senthil, Quantum spin liquids,
1145
+ Science 367, 263 (2020).
1146
+ [41] C. A. Ullrich, (Spin-)density-functional theory for open-
1147
+ shell systems: exact magnetization density functional for
1148
+ the half-filled Hubbard trimer, Phys. Rev. A 100, 012516
1149
+ (2019).
1150
+ [42] T. A. Kaplan, Single-band Hubbard model with spin-
1151
+ orbit coupling, Z. Phys. B 49, 313 (1983).
1152
+ [43] S. G. Tabrizi, A. V. Arbuznikov, and M. Kaupp, Hubbard
1153
+ trimer with spin-orbit coupling: Hartree-Fock solutions,
1154
+ (non)collinearity, and anisotropic spin Hamiltonian, J.
1155
+ Phys. Chem. A 123, 2361 (2019).
1156
+ [44] J.
1157
+ H.
1158
+ Pixley,
1159
+ S.
1160
+ S.
1161
+ Natu,
1162
+ I.
1163
+ B.
1164
+ Spielman,
1165
+ and
1166
+ S. Das Sarma, Interaction-driven exotic quantum phases
1167
+ in spin-orbit-coupled spin-1 bosons, Phys. Rev. B 93,
1168
+ 081101 (2016).
1169
+ [45] J. Li, N. Dasari, and M. Eckstein, Ultrafast dynamics in
1170
+ relativistic Mott insulators, arXiv:2010.009253.
1171
+ [46] D. Hill, V. Slastikov, and O. Tchernyshyov, Chiral mag-
1172
+ netism: a geometric perspective, SciPost Phys. 10, 078
1173
+ (2021).
1174
+ [47] R. Strack and D. Vollhardt, Hubbard model with nearest-
1175
+ neighbor and bond-charge interaction:
1176
+ exact ground-
1177
+ state solution in a wide range of parameters, Phys. Rev.
1178
+ Lett. 70, 2637 (1993).
1179
+ [48] S. K¨ummel and L. Kronik, Orbital-dependent density
1180
+ functionals: theory and applications, Rev. Mod. Phys.
1181
+ 80, 3 (2008).
1182
+ [49] J. B. Krieger, Y. Li, and G. J. Iafrate, Construction
1183
+ and application of an accurate local spin-polarized Kohn-
1184
+ Sham potential with integer discontinuity:
1185
+ Exchange-
1186
+ only theory, Phys. Rev. A 45, 101 (1992).
1187
+ [50] H. O. Wijewardane and C. A. Ullrich, Real-time electron
1188
+ dynamics with exact-exchange time-dependent density-
1189
+ functional theory, Phys. Rev. Lett. 100, 056404 (2008).
1190
+ [51] Y. Zhou, H. Wang, Y. Liu, X. Gao, and H. Song, Ap-
1191
+ plicability of Kerker preconditioning scheme to the self-
1192
+ consistent density functional theory calculations of inho-
1193
+ mogeneous systems, Phys. Rev. E 97, 033305 (2018).
1194
+ [52] C. Flamant, G. Kolesov, E. Manousakis, and E. Kaxiras,
1195
+ Imaginary-time time-dependent density functional the-
1196
+ ory and its application for robust convergence of elec-
1197
+ tronic states, J. Chem. Theory Comput. 15, 6036 (2019).
1198
+ [53] C. A. Ullrich, Time-dependent density-functional theory:
1199
+ concepts and applications (Oxford University Press, Ox-
1200
+ ford, 2012).
1201
+
F9AzT4oBgHgl3EQfi_2P/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
GtE1T4oBgHgl3EQf_QYB/content/tmp_files/2301.03577v1.pdf.txt ADDED
@@ -0,0 +1,951 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03577v1 [nlin.CD] 9 Jan 2023
2
+ Records and occupation time statistics for area-preserving maps⋆
3
+ Roberto Artuso1,2,∗ Tulio M. de Oliveira3, and Cesar Manchein3†
4
+ 1Dipartimento di Scienza e Alta Tecnologia and Center for Nonlinear
5
+ and Complex Systems, Via Valleggio 11, 22100 Como, Italy;
6
+ 2I.N.F.N, Sezione di Milano, Via Celoria 16, 20133 Milano, Italy; and
7
+ 3Departamento de Física, Universidade do Estado de Santa Catarina, 89219-710 Joinville, SC, Brazil
8
+ ⋆To Giulio Casati, celebrating his birthday and his achievements.
9
+ (Dated: January 10, 2023)
10
+ A relevant problem in dynamics is to characterize how deterministic systems may exhibit fea-
11
+ tures typically associated to stochastic processes. A widely studied example is the study of (normal
12
+ or anomalous) transport properties for deterministic systems on a non-compact phase space. We
13
+ consider here two examples of area-preserving maps: the Chirikov-Taylor standard map and the
14
+ Casati-Prosen triangle map, and we investigate transport properties, records’ statistics and occu-
15
+ pation time statistics. While the standard map, when a chaotic sea is present, always reproduces
16
+ results expected for simple random walks, the triangle map -whose analysis still displays many elu-
17
+ sive points- behaves in a wildly different way, some of the features being compatible with a transient
18
+ (non conservative) nature of the dynamics.
19
+ Keywords: Area-preserving maps, record statistics, infinite ergodicity.
20
+ I.
21
+ INTRODUCTION
22
+ One of the most remarkable advances in modern dy-
23
+ namics lies in the recognition that deterministic sys-
24
+ tems may exhibit statistical properties typical of purely
25
+ stochastic processes: for instance such systems may dis-
26
+ play diffusion properties similar to random walks [1–4].
27
+ Area-preserving maps (see for instance [1]) represent a
28
+ prominent example of Hamiltonian systems where subtle
29
+ features of dynamics, as integrability vs chaotic proper-
30
+ ties, may be studied. In this context one of the most out-
31
+ standing example is represented by the Chirikov-Taylor
32
+ standard map (SM) (see [1, 5] and references therein):
33
+ we also mention the fundamental role of such a map in
34
+ the development of quantum chaos, unveiling features
35
+ like quantum dynamical localization [6]. Though the SM
36
+ has been extensively explored by numerical simulations,
37
+ very few rigorous results have been proven (see, for in-
38
+ stance, the introduction in [7]): however it is generally
39
+ believed that for large nonlinearity parameter this map
40
+ typically exhibits good stochastic properties, and sensi-
41
+ tive dependence upon initial conditions. Here a remark
42
+ is due: such a map can be studied either on a 2-torus
43
+ or on an (unbounded) cylinder: the latter representa-
44
+ tion is naturally adopted when transport properties are
45
+ concerned, and analogies with random walks are taken
46
+ into account [1, 3, 8, 9]. While particular nonlinear pa-
47
+ rameters in the standard map can be tuned to generate
48
+ strong anomalous diffusion [10], here we will only deal
49
+ with the case in which diffusion is normal.
50
+ Our find-
51
+ ings will be confronted with those obtained for another
52
+ area-preserving map, characterized by the lack of expo-
53
+ nential instability: the so called Casati-Prosen Triangle
54
+ ∗ roberto.artuso@uninsubria.it
55
+ † cesar.manchein@udesc.br
56
+ Map (TM) [11], introduced by considering, in an appro-
57
+ priate limit, the Birkhoff dynamics of a triangular bil-
58
+ liard: apart from its intrinsic interest, such a map is an
59
+ ideal benchmark to test whether stochasticity properties,
60
+ exhibited by strongly chaotic systems, are showcased also
61
+ by systems lacking any exponential instability. It also
62
+ turns out that many features about the TM are still de-
63
+ bated, starting from basic properties like ergodicity and
64
+ mixing (see for instance [12, 13]).
65
+ More precisely we will compare different indicators
66
+ for both map on the cylinder: though in principle fur-
67
+ ther complications are added when one considers a non-
68
+ compact phase space [14, 15], this is the appropriate sce-
69
+ nario to discuss transport properties and record statis-
70
+ tics, and to check whether tools from infinite ergodic
71
+ theory may enrich our understanding of such systems.
72
+ Our main findings are that the SM, in its typical
73
+ chaotic regime, displays all stochastic properties of a
74
+ purely stochastic system, while -as expected- results are
75
+ far more complicated for the TM, even if we believe that
76
+ some new insight is provided by our analysis, in partic-
77
+ ular as regards persistence behaviour, occupation time
78
+ statistics and the relationship between transport proper-
79
+ ties and record statistics.
80
+ The paper is organized as follows.
81
+ In Sec. II,
82
+ the Chirikov-Taylor standard map (1) and the triangle
83
+ map (3) -our basic models- are presented and we also
84
+ mention the main properties we analyze. Section III is
85
+ dedicated to discuss transport properties, records’ statis-
86
+ tics and occupation time statistics. We end with a dis-
87
+ cussions in Sec. IV.
88
+
89
+ 2
90
+ II.
91
+ THE BASIC SETTING
92
+ We recall the definition of the SM
93
+ pn+1 = pn + K
94
+ 2π sin (2πxn),
95
+ xn+1 = xn + pn+1
96
+ mod 1;
97
+ (1)
98
+ K being the nonlinear parameter: when K is sufficiently
99
+ big no KAM invariant circles bound the motion and one
100
+ can study moments of the diffusing variable p ∈ R:
101
+ ⟨|pn − p0|q⟩ ∼ nqν(q).
102
+ (2)
103
+ The typical behaviour observed for the second moment in
104
+ simulations is normal diffusion ν(2) = 1/2 [16, 17], while,
105
+ for certain parameter values, the existence of stable run-
106
+ ning orbits (accelerator modes) induces superdiffusion,
107
+ ν(2) > 1/2) [18–20]. We point out that a finer descrip-
108
+ tion of anomalous transport is obtained by considering
109
+ the full spectrum ν(q): if ν(q) = α · q, for some α ̸= 1/2
110
+ one speaks about weak anomalous diffusion whereas the
111
+ case of a nontrivial ν(q) is dubbed strong anomalous dif-
112
+ fusion [10]. As far as the SM is concerned we will consider
113
+ the case where transport in the stochastic sea is normal
114
+ (even if the phase space exhibits a mixture of chaotic and
115
+ elliptic components (see Figure 1).
116
+ Figure 1. Phase-space portrait for the standard map (1) on
117
+ the 2-torus, for K = 2.6. Here 40 uniformly distributed initial
118
+ conditions were used for x, while maintaining p0 = 0 fixed:
119
+ each initial condition is iterated 104 times.
120
+ On the other side the TM is defined (on the cylinder)
121
+ as:
122
+ pn+1 = pn + 2(xn− ⇂ xn ↿ −µ(−1)⇂xn↿),
123
+ xn+1 = xn − 2pn+1
124
+ mod 2,
125
+ (3)
126
+ where ⇂ · · · ↿ denotes the nearest integer. It was intro-
127
+ duced in [11] (see also [21]) as a limit case for the Birkhoff
128
+ map of irrational triangular billiards: systems lacking ex-
129
+ ponential instability, whose ergodic properties are subtly
130
+ related to irrationality properties of the angles [22–25]:
131
+ we remark that polygonal billiards represent both a hard
132
+ mathematical challenge [26–29], and a natural bench-
133
+ mark when trying to assess which microscopic dynam-
134
+ ical features lead to macroscopic transport laws [30–32]
135
+ ( see also [33, 34]): in this respect it is worth mentioning
136
+ that anomalous transport has been associated to scaling
137
+ exponents of the spectral measure [35], and that general-
138
+ ized triangle maps have been investigated recently, both
139
+ as connected to dynamical localization [36], and with
140
+ respect to slow diffusion [37]. A typical phase portrait
141
+ (on the torus) of the TM is shown in Figure 2. Before
142
+ Figure 2. Phase-space dynamics for the triangle map (3), for
143
+ µ =
144
+ 1+
145
+
146
+ 5
147
+ 2
148
+ (golden mean).
149
+ Here 100 randomly distributed
150
+ initial conditions were used for x and p: each initial condition
151
+ is iterated 5×104 times. Notice the typical filament structure
152
+ in the phase space [23, 24].
153
+ mentioning the numerical experiments we performed, a
154
+ crucial observation is in order. When looking at trans-
155
+ port properties (and records statistics), considering maps
156
+ on the cylinder is quite natural, while from the ergodic
157
+ point of view this perspective is somehow delicate, since
158
+ no renormalizable invariant density exists [14, 15], and
159
+ the appropriate setting is infinite ergodic theory. When
160
+ polygonal channels are considered, even establishing re-
161
+ current properties of the dynamics is a demanding task
162
+ [38].
163
+ The first set of properties we investigated is more con-
164
+ ventional, and a few results -as we will mention in the
165
+ next section- have already been considered, especially as
166
+ far as the SM is considered. We will look at transport
167
+ properties, in particular through the first and the sec-
168
+ ond moment of the diffusing variable We will also con-
169
+ sider records’ statistics, which recently has turned very
170
+ popular (see [39, 40] and references therein). Then we
171
+ will study statistical properties like persistence probabil-
172
+ ity and (generalized) arcsine law [41, 42]: while motion
173
+ in the stochastic sea for the SM will exhibit typical prop-
174
+ erties of a simple stochastic process like a random walk,
175
+
176
+ 1.0
177
+ p
178
+ 0.0
179
+ 0.0
180
+ 2.00.5
181
+ p
182
+ -0.5
183
+ 0.03
184
+ our findings are quite different in the case of the TM.
185
+ III.
186
+ RESULTS
187
+ We start by considering properties associated to the
188
+ spreading of trajectories over the phase space, then we
189
+ will consider occupation time statistics.
190
+ A.
191
+ Diffusion
192
+ This is a warm-up exercise, since transport properties
193
+ have been studied both for the SM [1, 16, 17] and for the
194
+ TM [25]. We observe normal transport for the case of
195
+ the SM (see panels (c) and (d) in Figure 3), while for the
196
+ TM are results indicate a superdiffusion, with
197
+ ⟨(pn − p0)2⟩ ∼ n1.83,
198
+ (4)
199
+ in agreement with [25]. We remark that by looking at the
200
+ power-law exponents of the first two moments, we have
201
+ that possibly anomalous diffusion is weak [10], namely if
202
+ we consider the full spectrum of moments’ asymptotics:
203
+ ⟨|pn − p0|q⟩ ∼ nφ(q),
204
+ (5)
205
+ we have a single scaling, in the sense that
206
+ φ(q) = α · q;
207
+ (6)
208
+ where normal diffusion is recovered when α = 1/2. This
209
+ is reasonable since weak anomalous diffusion has been
210
+ observed in polygonal billiards [43].
211
+ B.
212
+ Average number of records
213
+ The statistics of records is very popular in the anal-
214
+ ysis of correlated and uncorrelated stochastic time se-
215
+ quences [39, 40]:
216
+ since this subject has not been ex-
217
+ plores thoroughly in the deterministic setting (with the
218
+ remarkable exception of [44, 45]), we briefly review the
219
+ basic concepts. First of all let us recall the (straightfor-
220
+ ward) definition of a record: given a sequence of real data
221
+ x0, x1, . . . , xk, . . . the element xm is a record if
222
+ xm > xj
223
+ j = 0, 1, . . . m − 1,
224
+ (7)
225
+ (we consider x0 to be the first record).
226
+ To the se-
227
+ quence of data points we associate the binary string
228
+ σ0, σ1, . . . , σk, . . . , where
229
+ σl =
230
+
231
+ 1
232
+ if xl is a record
233
+ 0
234
+ otherwise
235
+ (8)
236
+ The number of records up to time N is then
237
+ MN =
238
+ N
239
+
240
+ j=0
241
+ σj.
242
+ (9)
243
+ 10−1
244
+ 100
245
+ 101
246
+ 102
247
+ 103
248
+ 104
249
+ 105
250
+ 106
251
+ 107
252
+ 108
253
+ 100
254
+ 101
255
+ 102
256
+ 103
257
+ 104
258
+ 105
259
+ 106
260
+ 107
261
+ 108
262
+ (b)
263
+ 10−2
264
+ 10−1
265
+ 100
266
+ 101
267
+ 102
268
+ 103
269
+ 104
270
+ 105
271
+ 100
272
+ 101
273
+ 102
274
+ 103
275
+ 104
276
+ 105
277
+ 106
278
+ (d)
279
+ 10−1
280
+ 100
281
+ 101
282
+ 102
283
+ 103
284
+ 104
285
+ 100
286
+ 101
287
+ 102
288
+ 103
289
+ 104
290
+ 105
291
+ 106
292
+ 107
293
+ 108
294
+ (a)
295
+ 10−2
296
+ 10−1
297
+ 100
298
+ 101
299
+ 102
300
+ 100
301
+ 101
302
+ 102
303
+ 103
304
+ 104
305
+ 105
306
+ 106
307
+ (c)
308
+ σ2(n)
309
+ ⟨(pn − p0)2⟩
310
+ n
311
+ ⟨M(n)⟩
312
+ ⟨pn − p0⟩
313
+ n
314
+ Figure 3.
315
+ (a) Average number of records, (b) variance, (c)
316
+ first, and (b) second moments of variable p for K = 2.6 in the
317
+ standard map (1), as a function of time. These quantities were
318
+ computed for 106 initial conditions for x0, arbitrarily chosen
319
+ in the chaotic sea along the line p0 = 0. Black-continuous
320
+ lines correspond to power-law asymptotics fit F(n) = anγ:
321
+ the fitting parameters are, for (a) a = 0.86(0), γ = 0.50(9), for
322
+ (b) a = 0.50(7), γ = 1.00(3), for (c) a = 0.77(7), γ = 0.50(1)
323
+ and for (d) a = 0.02(1), γ = 0.99(1).
324
+ The properties of the average number of records,
325
+ ⟨MN⟩, and the corresponding variance
326
+ V ar(MN) = ⟨M 2
327
+ N⟩ − ⟨MN⟩2
328
+ (10)
329
+ are important tools to access the nature of the data se-
330
+ quence: as a matter of fact if the different xj are inde-
331
+ pendent, identically distributed random variables, then,
332
+ for large N we have [46, 47]:
333
+ ⟨MN⟩ = ln N + γE + O(N −1),
334
+ (11)
335
+ where γE = 0.5772 . . . is the Euler-Mascheroni constant,
336
+ and
337
+ V ar(MN) = σ2(N) = ln N + γE − π2
338
+ 6 + O(N −1). (12)
339
+ We remark that both quantities are independent of the
340
+ common distribution of the random variables: this uni-
341
+ versality is an important feature of record statistics in
342
+ different contexts.
343
+ Results are quite different for a correlated sequence, as
344
+ when xj denotes the position of a random walker at time
345
+ j:
346
+ xj+1 = xj + ξj+1,
347
+ (13)
348
+ where the jumps are taken from a common distribution
349
+ ℘(ξ). In this case the behaviour is [39, 40]:
350
+ ⟨MN⟩ ≈
351
+ 2
352
+ √π
353
+
354
+ N,
355
+ (14)
356
+
357
+ 4
358
+ 100
359
+ 102
360
+ 104
361
+ 106
362
+ 108
363
+ 1010
364
+ 1012
365
+ 100
366
+ 101
367
+ 102
368
+ 103
369
+ 104
370
+ 105
371
+ 106
372
+ 107
373
+ (b)
374
+ 102
375
+ 104
376
+ 106
377
+ 108
378
+ 1010
379
+ 1012
380
+ 100
381
+ 101
382
+ 102
383
+ 103
384
+ 104
385
+ 105
386
+ 106
387
+ 107
388
+ (d)
389
+ 10−1
390
+ 100
391
+ 101
392
+ 102
393
+ 103
394
+ 104
395
+ 105
396
+ 106
397
+ 100
398
+ 101
399
+ 102
400
+ 103
401
+ 104
402
+ 105
403
+ 106
404
+ 107
405
+ (a)
406
+ 100
407
+ 101
408
+ 102
409
+ 103
410
+ 104
411
+ 105
412
+ 106
413
+ 107
414
+ 100
415
+ 101
416
+ 102
417
+ 103
418
+ 104
419
+ 105
420
+ 106
421
+ 107
422
+ (c)
423
+ σ2(n)
424
+ ⟨(pn − p0)2⟩
425
+ n
426
+ ⟨M(n)⟩
427
+ ⟨pn − p0⟩
428
+ n
429
+ Figure 4. (a) Average number of records, (b) variance, (c)
430
+ first, and (b) second moments of variable p for the golden
431
+ mean µ =
432
+ 1+
433
+
434
+ 5
435
+ 2
436
+ in the triangular map (3) as a function of
437
+ time.
438
+ These quantities were computed for 106 initial con-
439
+ ditions for x0, arbitrarily chosen in phase space along the
440
+ line p0 = 0. Black-continuous lines correspond to power-law
441
+ asymptotics F(n) = anγ: the fitting parameters are, for (a)
442
+ a = 0.13(9), γ = 0.92(4), for (b) a = 0.04(0), γ = 1.84(9),
443
+ for (c) a = 0.65(4), γ = 0.92(4) and for (c) a = 0.67(6),
444
+ γ = 1.86(0) in (d).
445
+ and
446
+ V ar(MN) ≈ 2
447
+
448
+ 1 − 2
449
+ π
450
+
451
+ N,
452
+ (15)
453
+ so that the standard deviation is of the same order of
454
+ magnitude as the average.
455
+ Again this is a universal
456
+ result, independent of the particular jump distribution
457
+ ℘(ξ), as long as the distribution is continuous and sym-
458
+ metric. The crucial ingredient of the proof is that the
459
+ process renews as soon as a new record is achieved and
460
+ the appearance of the new record is related to the survival
461
+ probability for the process, which is universal in view of
462
+ Sparre-Andersen theorem [42, 48, 49] (see also [50]).
463
+ Numerical results on records statistics are reported in
464
+ Figures 3, 4, panels (a) and (b): for the SM our results
465
+ are consistent with early investigations [44, 45], and with
466
+ the asymptotic behaviour of a random walk, while for
467
+ the TM we observe anomalous scaling w.r.t. (14,15): the
468
+ behaviour is related to transport properties, in the sense
469
+ that data are consistent with the growths:
470
+ ⟨MN⟩ ∼ N φ(1),
471
+ V ar(MN) ∼ N φ(2).
472
+ (16)
473
+ A similar behaviour was observed in [44, 45], for the SM
474
+ in the presence of accelerator modes. We remark that,
475
+ though in the following we will fix our attention of a
476
+ particular parameter value for the TM, we checked that
477
+ reported experiments do not depend on the particular
478
+ parameter choice, as exemplified in Figure 5, where the
479
+ growth of the averaged number of records is reported for
480
+ different parameters of the TM.
481
+ While a general, quantitative relationship (if any) be-
482
+ 10−1
483
+ 100
484
+ 101
485
+ 102
486
+ 103
487
+ 104
488
+ 105
489
+ 106
490
+ 100
491
+ 101
492
+ 102
493
+ 103
494
+ 104
495
+ 105
496
+ 106
497
+ 107
498
+ ⟨Mn⟩
499
+ n
500
+
501
+ 7
502
+
503
+ 2/2
504
+ (
505
+
506
+ 5 + e)/12
507
+ Figure 5. (a) Average number of records for three additional
508
+ parameters µ in the TM. Black-continuous line correspond to
509
+ the power-law asymptotic fitting function F(n) = anγ, with
510
+ γ = 0.92(4).
511
+ tween transport exponents and statistical properties of
512
+ records has not been fully developed, to the best of our
513
+ knowledge, it is possible, in some cases, to connect φ(1)
514
+ to the expected maximum of the walk [51, 52], that, for
515
+ random walk with unit jumps, coincides with the num-
516
+ ber of records. On the other side we mention that non-
517
+ homogeneous random walks offer examples where such
518
+ relationship does not hold [53–57].
519
+ C.
520
+ Occupation time statistics
521
+ When we consider the evolution on the cylinder, both
522
+ for the SM and the TM, we are in the presence of in-
523
+ finitely ergodic systems [14, 15], since, while Lebesgue
524
+ measure is preserved, due to area conservation, the (con-
525
+ stant) phase space is unbounded, so the invariant density
526
+ cannot be normalized. This has a series of remarkable
527
+ consequences, which originally have been considered in
528
+ the context of stochastic processes, and then explored in
529
+ the deterministic evolution framework.
530
+ One of the most striking property that has been in-
531
+ vestigated is the generalized arcsine law (see [41] for the
532
+ standard formulation for stochastic processes): we briefly
533
+ recall the main result that lies at the basis of our analysis,
534
+ namely Lamperti’s theorem [58]. The original formula-
535
+ tion involves discrete stochastic processes, for which the
536
+ infinite set of possible states can be separated into two
537
+ sets A and B separated by a single site x0, such that a
538
+
539
+ 5
540
+ transition from one set to the other can only be achieved
541
+ by passing through x0, which can be taken as the start-
542
+ ing site, and is supposed to be recurrent (namely the
543
+ probability of returning to it is 1). For instance we can
544
+ think of one dimensional random walk on an integer lat-
545
+ tice, with x0 = 0 and A (B) consists of strictly positive
546
+ (negative) lattice sites. We are interested in the limit-
547
+ ing distribution of N(n)/n, the fraction of time spent in
548
+ the positive semi-axis up to time n. The theorem states
549
+ that such a distribution exists in the n → ∞ limit, and
550
+ it is characterized by two parameters α and η. η is re-
551
+ lated to symmetry properties of the process, being the
552
+ expectation value of the fraction of time spent in R+:
553
+ η = lim
554
+ n→∞ E
555
+ �N(n)
556
+ n
557
+
558
+ :
559
+ (17)
560
+ for a symmetric process η = 1/2, and from now on we
561
+ will only consider such a case.
562
+ −1.0
563
+ −0.5
564
+ 0.0
565
+ 0.5
566
+ 1.0
567
+ 1.5
568
+ 2.0
569
+ 2.5
570
+ 0.0
571
+ 0.5
572
+ 1.0
573
+ 1.5
574
+ 2.0
575
+ 2.5
576
+ 3.0
577
+ (b)
578
+ −0.4
579
+ −0.2
580
+ 0.0
581
+ 0.2
582
+ 0.4
583
+ 0.6
584
+ 0.8
585
+ 1.0
586
+ 1.2
587
+ 1.4
588
+ 0.0
589
+ 0.5
590
+ 1.0
591
+ 1.5
592
+ 2.0
593
+ 2.5
594
+ 3.0
595
+ (a)
596
+ arccos(2(N(n)/n)−1)
597
+ log10P(N(n)/n))
598
+ arccos(2(N(n)/n)−1)
599
+ Figure 6. Distribution of the fraction of time spent in the positive axis for the momentum p in the standard (1) (a) and triangle
600
+ (3) (b) maps, in semi-logarithmic scale. To enhance readability of the border values, the transformation x → arccos(2x − 1) on
601
+ the horizontal axis. The (light blue) points represent the simulation results, the (red) line the Lamperti distribution (20). Data
602
+ are obtained by computing 106 initial conditions iterated 106 times for the standard map and 106 initial conditions iterated
603
+ 108 times for the triangle map. The fitting parameters are α = 0.49(9) for (a) and α = 0.42(0) for (b). In the case of the TM,
604
+ data suggest a superposition of a (rescaled) Lamperti distribution and two Dirac’s δ centered of x = 0 and x = 1 (see text).
605
+ The other parameter α is instead connected to the be-
606
+ haviour of the generating function of first return prob-
607
+ abilities to the starting site: it can be shown [59] that
608
+ it can be related to the probability Pn of being at the
609
+ starting site after n steps in the following way:
610
+ Pn ∼ H(n)
611
+ n1−α ,
612
+ (18)
613
+ where H(n) is a slowly varying function, namely
614
+ lim
615
+ n→∞
616
+ H(yn)
617
+ n
618
+ = 1.
619
+ (19)
620
+ Under such conditions the density of ϕ = N(n)/n in the
621
+ infinite time limit is given by Lamperti distribution:
622
+ Gα(ϕ) = sin(πα)
623
+ π
624
+ ϕ1−α(1 − ϕ)1−α
625
+ ϕ2α + 2ϕα(1 − ϕ)α cos(πα) + (1 − ϕ)2α ,
626
+ (20)
627
+ that reproduces the usual arcsine law
628
+ P ((Nn/n) ≤ ξ) = 2
629
+ π arcsin
630
+ ��
631
+ ξ
632
+
633
+ (21)
634
+ when α = 1/2, in the universality class of Sparre-
635
+ Andersen theorem. Deviations from standard arcsine law
636
+ have been reported for a number of cases, in the frame-
637
+ work of deterministic dynamics [60–67], mainly in the
638
+ context of intermittent maps. Numerical experiments for
639
+ the SM confirm the validity of the arcsine law, α = 1/2,
640
+ see panel (a) in Figure 6: to our knowledge this is the
641
+ first time such an indicator has been considered in the
642
+ analysis of area preserving maps.
643
+ The results, as expected, are quite different for the TM,
644
+ and they suggest novel features exhibited by this map. In
645
+ particular (see panel (b) in Figure 6) numerical results are
646
+ well fitted by a Lamperti distribution (with α ≈ 0.42),
647
+ thus different from an ordinary random walk), except for
648
+ the endpoints, that present enhanced peaks. Intuitively
649
+
650
+ 6
651
+ such an additional contribution might be due to a frac-
652
+ tion of orbits never returning to the origin: this would
653
+ correspond, in stochastic language, to a transient random
654
+ walk (we recall that, according to Pólya’s theorem [68] a
655
+ simple symmetric random walk is recurrent -so the return
656
+ to the starting site is sure- in one and two dimensions,
657
+ and transient in higher dimensions). Such a possibility is
658
+ indeed not excluded for infinite polygonal channels [38].
659
+ Our last set of simulations concerns the survival proba-
660
+ bility [61]:
661
+ Pcum(n) = prob (pn ≥ 0 . . . p1 ≥ 0|p0 = 0) .
662
+ (22)
663
+ 10−3
664
+ 10−2
665
+ 10−1
666
+ 100
667
+ 100
668
+ 101
669
+ 102
670
+ 103
671
+ 104
672
+ 105
673
+ 106
674
+ (a)
675
+ 10−2
676
+ 10−1
677
+ 100
678
+ 100 101 102 103 104 105 106 107 108 109
679
+ (b)
680
+ Pcum(n)
681
+ n
682
+ n
683
+ Figure 7. Cumulative distribution function for the survival times obtained for the variable p for (a) the standard map (1), and
684
+ (b) the triangle map (3), in logarithmic scale. Data are obtained by simulating 106 and 105 initial conditions, respectively.
685
+ Continuous-black lines correspond to power-law asymptotic functions F(n) = a + bn−α: the fitting parameters are a = 0, b =
686
+ 2.80(0), and α = 0.51(5) in (a) and a = 0.021(0), b = 1.62(6), and α = 0.42(0) in (b).
687
+ When considering recurrent random walks, the asymp-
688
+ totic behaviour of the survival probability is again ruled
689
+ by Lamperti exponent [58, 59] (see also [69]):
690
+ Pcum(n) ∼ n−α.
691
+ (23)
692
+ Once again SM simulations (see panel (a) in Figure 7)
693
+ agree with expected behaviour for simple random walks
694
+ (α = 1/2), while the situation is completely different for
695
+ the TM, where the survival probability seems to tend to
696
+ a finite limit for large n, see panel (b) in Figure 7. This
697
+ is coherent with the transient nature of the TM, which
698
+ we conjectured in the analysis of generalized arcsine law.
699
+ IV.
700
+ DISCUSSION
701
+ We have performed a set of extensive numerical experi-
702
+ ments on two paradigmatic area-preserving maps, the SM
703
+ and the TM, focusing in the case where such maps are
704
+ considered on a cylinder, namely a non compact phase
705
+ space. Firstly we reproduced known results about nor-
706
+ mal diffusion for typical (chaotic) parameters of the SM,
707
+ and superdiffusion for the TM. Then we explored records’
708
+ statistics: numerical simulations again confirm that the
709
+ SM behave like a simple random walk, while anomalous
710
+ growth is exhibited by the TM. The most interesting re-
711
+ sults arise in the analysis of occupation times, like gen-
712
+ eralized arcsine law and survival probability. While once
713
+ again normal stochastic properties are displayed by the
714
+ SM, the TM presents more surprising results, which we
715
+ conjecture are possibly connected to lack of conserva-
716
+ tivity [38] (or transient behaviour, in the language of
717
+ random walks). This feature, which we think is worth
718
+ of further investigations, might suggest new stochastic
719
+ modeling of the TM (see [37]).
720
+ AUTHORS’ CONTRIBUTIONS
721
+ All authors have contributed substantially to the work.
722
+ All authors have read and agreed to the published version
723
+ of the manuscript.
724
+
725
+ 7
726
+ ACKNOWLEDGEMENTS
727
+ R.A. acknowledges partial support from PRIN Re-
728
+ search Project No. 2017S35EHN “Regular and stochastic
729
+ behavior in dynamical systems” of the Italian Ministry of
730
+ Education, University and Research (MIUR). R.A. ac-
731
+ knowledges an association to the GNFM group of IN-
732
+ DAM. R.A thanks Gaia Pozzoli for discussions. C.M. ac-
733
+ knowledges the National Council for Scientific and Tech-
734
+ nological Development - CNPq (Brazilian agency) for
735
+ partial financial support (Grant Number 310228/2020-4).
736
+ T.M.O. acknowledges the Coordenação de Aperfeiçoa-
737
+ mento de Pessoal de Nível Superior - CAPES (Brazilian
738
+ agency ) - Finance Code 001, for partial financial sup-
739
+ port. Additionally, T.M.O. and C.M. also acknowledges
740
+ the Fundação de Amparo à Pesquisa e Inovação do Es-
741
+ tado de Santa Catarina - FAPESC (Brazilian agency) for
742
+ partial financial support.
743
+ [1] Lichtenberg, A.J.; Lieberman, M.A. Regular and chaotic
744
+ dynamics; Springer: Berlin, Germany, 1992.
745
+ [2] Ott, E., Chaos in dynamical systems; CUP: Cambridge,
746
+ U.K. 2002.
747
+ [3] Cvitanović, P.; Artuso, R.; Mainieri, R.; Tanner, G.; Vat-
748
+ tay, G., Chaos: Classical and Quantum, ChaosBook.org
749
+ ; Niels Bohr Institute, Copenhagen 2020.
750
+ [4] Artuso, R.; Burioni, R. Anomalous diffusion: determin-
751
+ istic and stochastic perspectives. In Large deviations in
752
+ physics; Vulpiani A. et al., Eds.; Springer-Verlag: Berlin
753
+ Heidelberg, Germany, 2014; pp. 263–293.
754
+ [5] Chirikov, B.V.; Shepelyansky, D.L. Chirikov standard
755
+ map. Scholarpedia 2008, 3, 3550.
756
+ [6] Casati, G.; Chirikov, B.V., (Eds.) Quantum chaos; OUP:
757
+ Oxford, U.K., 1995.
758
+ [7] Bloor, K.; Luzzatto, S. Some remarks on the geometry of
759
+ the standard map. Int.J.Bifurcat.Chaos 2009, 19, 2213–
760
+ 2232.
761
+ [8] Chirikov, B.V. A universal instability of many dimen-
762
+ sional oscillator systems. Phys.Rep. 1979, 52, 263–379.
763
+ [9] MacKay, R.S.; Meiss,J.D.; Percival, I.C. Stochasticity
764
+ and transport in hamiltonian systems. Phys.Rev.Lett.
765
+ 1984, 52, 697–700.
766
+ [10] Castiglione, P.; Mazzino, A.; Muratore-Ginanneschi, P.;
767
+ Vulpiani, A, On strong anomalous diffusion. Physica D
768
+ 1999, 134, 75–93.
769
+ [11] Casati, G.; Prosen, T.. Triangle map: a model of quan-
770
+ tum chaos. Phys.Rev.Lett. 2000, 85, 4261–4264.
771
+ [12] Horvat, M.; Degli Esposti, M.; Isola, S.; Prosen, T.; Buni-
772
+ movich, L. On ergodic and mixing properties of the tri-
773
+ angle map. Physica D 2009, 238, 395–415.
774
+ [13] Degli Esposti, M.; Galatolo, S. Recurrence near given
775
+ sets and the complexity of the Casati-Prosen map. Chaos,
776
+ Solitons & Fractals 2005, 23, 1275–1284.
777
+ [14] Aaronson, J. An introduction to infinite ergodic theory;
778
+ AMS: Providence, U.S.A. , 1997.
779
+ [15] Zweimüller, R. Surrey notes on infinite ergodic theory.
780
+ Available online
781
+ https://mat.univie.ac.at/%7Ezweimueller/PapersAndPreprints.html
782
+ (accessed on 1 11 2022)
783
+ [16] Rechester, A.B.; White, R.B. Calculation of turbulent
784
+ diffusion for the Chirikov-Taylor model. Phys.Rev.Lett.
785
+ 1980, 44, 1586–1589.
786
+ [17] Dana, I.; Murray, N.W.; Percival, I.C. Resonances and
787
+ diffusion in periodic Hamiltonian maps. Phys.Rev.Lett.
788
+ 1989, 62, 233–236.
789
+ [18] Ishizaki, R.; Horita, T.; Kobayashi, T.; Mori, H. Anoma-
790
+ lous diffusion due to accelerator modes in the standard
791
+ map. Progr.Theor.Phys. 1991, 85, 1013–1022.
792
+ [19] Benkadda, S.; Kassibrakis, S.; White, R.B.; Zaslavsky,
793
+ G.M. Self-similarity and transport in the standard map.
794
+ Phys.Rev. E 1997, 55, 4909–4917.
795
+ [20] Zaslavsky, G.M.;
796
+ Edelman, M.;
797
+ Niyazov, B.A. Self-
798
+ similarity, renormalization, and phase-space nonunifor-
799
+ mity of Hamiltonian chaotic dynamics. Chaos 1997, 7,
800
+ 159–181.
801
+ [21] Kaplan, L.; Heller, E.J. Weak quantum ergodicity. Phys-
802
+ ica D 1998, 121, 1–18.
803
+ [22] Casati, G.; Prosen, T. Mixing properties of triangular
804
+ billiards. Phys.Rev.Lett. 1999, 83, 4728–4732.
805
+ [23] Artuso, R.; Casati, G.; Guarneri, I. Numerical study
806
+ on ergodic properties of triangular billiards. Phys.Rev.
807
+ E 1997, 55, 6384–6390.
808
+ [24] Artuso, R. Correlations and spectra of triangular bil-
809
+ liards. Physica D 1997, 109, 1–10.
810
+ [25] Prosen, T.; ˘Znidariˆc, M. Anomalous diffusion and dy-
811
+ namical localization in polygonal billiards. Phys.Rev.Lett.
812
+ 2001, 87, 114101
813
+ [26] Gutkin, E. Billiards in polygons. Physica D 1986, 19,
814
+ 311–333.
815
+ [27] Gutkin, E. Billiards in polygons: survey of recent results.
816
+ J.Stat.Phys. 1996, 83, 7–26.
817
+ [28] Gutkin, E. Billiard dynamics: a survey with the emphasis
818
+ on open problems. Regular and chaotic dynamics 2003,
819
+ 8, 1–13.
820
+ [29] Gutkin, E. Billiard dynamics: an updated survey with
821
+ the emphasis on open problems. Chaos 2012, 22, 026116.
822
+ [30] Alonso, D.; Ruiz, A.; De Vega, I. Transport in polygonal
823
+ billiards. Physica D 2004, 187, 184–199.
824
+ [31] Jepps, O.G.; Bianca, C.; Rondoni, L. Onset of diffusive
825
+ behavior in confined transport systems. Chaos 2008, 18,
826
+ 013127.
827
+ [32] Sanders,
828
+ D.P.;
829
+ Larralde,
830
+ H. Occurrence of normal
831
+ and anomalous diffusion in polygonal billiard channels.
832
+ Phys.Rev. E 2006, 73, 026205.
833
+ [33] Cecconi,
834
+ F.;
835
+ Del-Castillo-Negrete,
836
+ D.;
837
+ Falcioni,
838
+ M.;
839
+ Vulpiani, A. The origin of diffusion: the case of non-
840
+ chaotic systems. Physica D 2003, 180, 129–139.
841
+ [34] Cecconi, F.; Cencini, M.; Falcioni, M.; Vulpiani, A.
842
+ Brownian motion and diffusion:
843
+ from stochastic pro-
844
+ cesses to chaos and beyond. Chaos 2005, 15, 026102.
845
+ [35] Artuso, R.; Guarneri, I.; Rebuzzini, L. Spectral prop-
846
+ erties and anomalous transport in a polygonal billiard.
847
+ Chaos 2000, 10, 189–194.
848
+ [36] Guarneri, I.; Casati, G.; Karle, V. Classical dynamical
849
+ localization. Phys.Rev.Lett. 2014, 113, 174101
850
+ [37] Yoshida, K.; Casati, G.; Watanabe, S.; Shudo, A. Sublin-
851
+ ear diffusion in the generalized triangle map. Phys.Rev.
852
+
853
+ 8
854
+ E 2022, 106, 014206.
855
+ [38] Conze, J-P.; Gutkin, E. On recurrence and ergodicity for
856
+ geodesic flows on non-compact periodic polygonal sur-
857
+ faces Ergod.Th.& Dynam.Sys 2012, 32, 491–515.
858
+ [39] Majumdar, M.N. Universal first-passage properties of
859
+ discrete-time random walks and Lévy flights on a line:
860
+ statistics of the global maximum and records. Physica A
861
+ 2010, 389, 4299–4316.
862
+ [40] Godrèche, C.; Majumdar, S.N.; Schehr, G. Record statis-
863
+ tics of a strongly correlated time series: random walks
864
+ and Lévy flights. J.Phys. A 2017, 50, 333001.
865
+ [41] Feller, W. An introduction to probability theory and its
866
+ applications. Vol. 1; Wiley: New York, U.S.A., 1968.
867
+ [42] Feller, W. An introduction to probability theory and its
868
+ applications. Vol. 2; Wiley: New York, U.S.A., 1971.
869
+ [43] Rebuzzini, L.; Artuso, R. Higher order statistics in
870
+ the annulus square billiard: transport and polyspectra.
871
+ J.Phys. A 2011, 44, 025101.
872
+ [44] Srivastava,
873
+ S.C.L.;
874
+ Lakshminarayan,
875
+ A.;
876
+ Jain,
877
+ S.R.
878
+ Record statistics in random vectors and quantum chaos.
879
+ Europhys.Lett. 2013, 101, 10003.
880
+ [45] Srivastava, S.C.L.; Lakshminarayan, A. Records in the
881
+ classical and quantum standard map. Chaos, Solitons &
882
+ Fractals 2015, 74, 67–78.
883
+ [46] Wergen, G. Records in stochastic processes: theory and
884
+ applications. J.Phys. A 2013, 46, 223001.
885
+ [47] Nevzorov, V.B. Records:
886
+ mathematical theory; AMS:
887
+ Providence, U.S.A., 2004.
888
+ [48] Sparre Andersen, E. On the fluctuations of sums or ran-
889
+ dom variables I. Math.Scand. 1953, 1, 263–285.
890
+ [49] Sparre Andersen, E. On the fluctuations of sums or ran-
891
+ dom variables II. Math.Scand. 1954, 2, 195–233.
892
+ [50] Artuso, R.; Cristadoro, G.; Degli Esposti, M.; Knight,
893
+ G. Sparre-Andersen theorem with spatiotemporal corre-
894
+ lations. Phys.Rev. E 2014, 89, 052111.
895
+ [51] Comtet, A.; Majumdar, S.N. Precise asymptotics for a
896
+ random walker’s maximum. J.Stat.Mech. 2005, P06013.
897
+ [52] Mounaix, P.; Majumdar, S.N.; Schehr, G. Asymptotics
898
+ for the expected maximum of ramndom walks and Lévy
899
+ flights with a constant drift. J.Stat.Mech. 2018, P083201.
900
+ [53] Gillis, J. Centrally biased discrete random walk. Q.J.
901
+ Math. 1956, 7, 144–152.
902
+ [54] Serva, M. Scaling behavior for random walks with mem-
903
+ ory of the largest distance from the origin. Phys. Rev. E
904
+ 2013, 88, 052141.
905
+ [55] Radice, M.; Onofri, M.; Artuso, R.; Cristadoro, G. Trans-
906
+ port properties and ageing for the averaged Lévy-Lorentz
907
+ gas. J. Phys. A 2020,53, 025701.
908
+ [56] Singh, P. Extreme value statistics and arcsine laws for
909
+ heterogeneous diffusion processes. Phys. Rev. E 2022,
910
+ 105, 024113.
911
+ [57] Artuso, R.; Onofri, M.; Pozzoli, G.; Radice, M. Extreme
912
+ value statistics of positive recurrent centrally biased ran-
913
+ dom walks. J.Stat.Mech. 2022, P103209.
914
+ [58] Lamperti, J. An occupation time theorem for a class
915
+ of stochastic processes. Trans.Amer.Math.Soc 1958, 88,
916
+ 380–387.
917
+ [59] Radice, M.; Onofri, M.; Artuso, R.; Pozzoli, G. Statistics
918
+ of occupation times and connection to local properties of
919
+ nonhomogeneous random walks. Phys.Rev. E 2020, 101,
920
+ 042103.
921
+ [60] Bel, G.; Barkai, E. Weak ergodicity breaking with deter-
922
+ ministic dynamics. Europhys.Lett. 2006, 74, 16–21.
923
+ [61] Bray, A.J.; Majumdar, S.N.; Schehr, G. Persistence
924
+ and first-passage properties in nonequilibrium systems.
925
+ Adv.Phys. 2013, 62, 225–361.
926
+ [62] Thaler, M. The Dynkin-Lamperti arc-sine laws for mea-
927
+ sure preserving transformations. Trans.Amer.Math.Soc
928
+ 1998, 350, 4593–4607.
929
+ [63] Zweimüller, R. Infinite measure preserving transforma-
930
+ tions with compact first regeneration. Jour.Anal.Math.
931
+ 2007, 103, 93–131.
932
+ [64] Huang, J.; Zhao, H. Ultraslow diffusion and weak ergod-
933
+ icity breaking in right triangular billiards. Phys.Rev. E
934
+ 2017, 95, 032209.
935
+ [65] Thaler, M. A limit theorem for sojourns near indifferent
936
+ fixed points of one dimensional maps. Ergod.Theory &
937
+ Dyn.Syst. 2002, 22, 1289–1312.
938
+ [66] Akimoto, T. Generalized arcsine law and stable law in an
939
+ infinite measure dynamical system. J.Stat.Phys. 2008,
940
+ 132, 171–186.
941
+ [67] Singh, P.; Kundu, A. Generalized ‘arcsine’ laws for
942
+ run-and-tumble particle in one dimension. J.Stat.Mech.
943
+ 2019, 083205.
944
+ [68] Hughes, B.D. Random walks and random environments.
945
+ Volume I: Random walks; Clarendon Press:
946
+ Oxford,
947
+ U.K., 1995.
948
+ [69] Barkai, E. Residence time statistics for normal and frac-
949
+ tional diffusion in a force field. J.Stat.Phys. 2006, 123,
950
+ 883–907.
951
+
GtE1T4oBgHgl3EQf_QYB/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
HtFIT4oBgHgl3EQfXys9/content/tmp_files/2301.11245v1.pdf.txt ADDED
@@ -0,0 +1,1378 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11245v1 [math.AP] 26 Jan 2023
2
+ Exponential decay of the solutions to nonlinear Schr¨odinger systems
3
+ Felipe Angeles∗, M´onica Clapp†, and Alberto Salda˜na (�)‡
4
+ Abstract
5
+ We show that the components of finite energy solutions to general nonlinear Schr¨odinger
6
+ systems have exponential decay at infinity.
7
+ Our results apply to positive or sign-changing
8
+ components, and to cooperative, competitive, or mixed-interaction systems. As an application,
9
+ we use the exponential decay to derive an upper bound for the least possible energy of a solution
10
+ with a prescribed number of positive and nonradial sign-changing components.
11
+ Keywords: Exponential decay; Schr¨odinger system; energy bounds; nodal solutions.
12
+ MSC2010: 35B40; 35B45; 35J47; 35B06; 35J10;
13
+ 1
14
+ Introduction
15
+ Consider the nonlinear Schr¨odinger system
16
+
17
+
18
+
19
+
20
+
21
+
22
+
23
+ −∆ui + Vi(x)ui =
24
+
25
+
26
+ j=1
27
+ βij|uj|p|ui|p−2ui,
28
+ ui ∈ H1(RN),
29
+ i = 1, . . . , ℓ,
30
+ (1.1)
31
+ where N ≥ 1, Vi ∈ L∞(RN), βij ∈ R and 1 < p < 2∗
32
+ 2 . Here 2∗ is the usual critical Sobolev
33
+ exponent, namely, 2∗ :=
34
+ 2N
35
+ N−2 if N ≥ 3 and 2∗ := ∞ for N = 1, 2.
36
+ Systems of this type occur as models for various natural phenomena. In physics, for example,
37
+ they describe the behavior of standing waves for a mixture of Bose-Einstein condensates of different
38
+ hyperfine states which overlap in space [13]. The coefficients βij determine the type of interaction
39
+ between the states; if βij > 0, then there is an attractive force between ui and uj, similarly, if
40
+ βij < 0, then the force is repulsive, and if βij = 0, then there is no direct interaction between
41
+ these components. Whenever all the interaction coefficients are positive, we say that the system is
42
+ cooperative. If βii > 0 and βij < 0 for all i ̸= j, then the system is called competitive. And if some
43
+ βij are positive and others are negative for i ̸= j, then we say that the system has mixed couplings.
44
+ All these regimes exhibit very different qualitative behaviors and have been studied extensively in
45
+ recent years, see for instance [5,6,8–12,17,19–24,26] and the references therein.
46
+ ∗Instituto de Matem´aticas, Universidad Nacional Aut´onoma de M´exico, Circuito Exterior, Ciudad Universitaria,
47
+ 04510 Coyoac´an, Ciudad de M´exico, Mexico, felidaujal@im.unam.mx
48
+ †Instituto de Matem´aticas, Universidad Nacional Aut´onoma de M´exico, Campus Juriquilla, Boulevard Juriquilla
49
+ 3001, 76230 Quer´etaro, Qro., Mexico, monica.clapp@im.unam.mx
50
+ ‡(Corresponding author �) Instituto de Matem´aticas, Universidad Nacional Aut´onoma de M´exico, Circuito Ex-
51
+ terior, Ciudad Universitaria, 04510 Coyoac´an, Ciudad de M´exico, Mexico, alberto.saldana@im.unam.mx
52
+ 1
53
+
54
+ System (1.1) has a variational structure, and therefore a natural strategy is to find weak solutions
55
+ by minimizing an associated energy functional on a suitable set, under additional assumptions on
56
+ the matrix (βij) and on the potentials Vi. Using this approach, several kinds of solutions have been
57
+ found in terms of their signs and their symmetries. However, there seems to be no information
58
+ available about the decay of these solutions at infinity. In this paper, we show that finite energy
59
+ solutions must decay exponentially at infinity, and a rate can be found in terms of the potentials
60
+ Vi. Our main result is the following one.
61
+ Theorem 1.1. Assume that, for every i = 1, . . . , ℓ,
62
+ (V1) Vi : RN → R is H¨older continuous and bounded,
63
+ (V2) there exists ρ ≥ 0 such that
64
+ σi :=
65
+ inf
66
+ RN∖Bρ(0) Vi > 0.
67
+ Let (u1, . . . , uℓ) ∈
68
+
69
+ H1(RN)
70
+ �ℓ be a solution of (1.1) and let µi ∈ (0, √σi). Then, there is C > 0
71
+ such that
72
+ |ui(x)| ≤ Ce−µi|x|
73
+ for all x ∈ RN and i = 1, . . . , ℓ.
74
+ (1.2)
75
+ Furthermore, if Vi ≡ 1 for every i = 1, . . . , ℓ, then (1.2) holds true with µi = 1.
76
+ We emphasize that each component may have a different decay depending on each potential Vi.
77
+ The main obstacle to showing (1.2) is to handle the possibly sublinear term |ui|p−2ui for p ∈ (1, 2)
78
+ (which is always the case for N ≥ 4). To explain this point in more detail, assume that (u1, . . . , uℓ)
79
+ is a solution of (1.1) and write the i-th equation of the system as
80
+ −∆ui +
81
+
82
+ ai(x) − ci(x)|ui(x)|p−2�
83
+ ui = 0,
84
+ ai := Vi − βii|ui|2p−2,
85
+ ci :=
86
+
87
+
88
+ j̸=i
89
+ βij|uj|p.
90
+ (1.3)
91
+ Since every uj ∈ H1(RN)∩C0(RN), we know that ai and ci are bounded in RN, but |ui|p−2 → ∞ as
92
+ |x| → ∞ and it is also singular at the nodal set of a sign-changing solution. As a consequence, one
93
+ cannot use directly previously known results about exponential decay for scalar equations, such as
94
+ those in [1, 3, 18]. In fact, one can easily construct a one dimensional solution of a similar scalar
95
+ equation that has a power-type decay. For instance, let w ∈ C2(R) be a positive function such that
96
+ w(x) = |x|−2/3 for |x| > 1 and let
97
+ c(x) := −w′′(x) + w(x)
98
+ w(x)
99
+ 1
100
+ 2
101
+ ,
102
+ x ∈ R.
103
+ Then, w ∈ H1(R) is a solution of −w′′ + w = c w
104
+ 1
105
+ 2 in R, c(x) → 0 as |x| → ∞, and w decays as a
106
+ power at infinity.
107
+ This shows that the proof of the exponential estimate in Theorem 1.1 must rely on a careful
108
+ study of the system structure. In other words, although the sublinear nonlinearity |ui|p−2ui appears
109
+ in (1.1), the system is not sublinear. As a whole, it is always superlinear.
110
+ With this in mind, we adapt some of the arguments in [1,18] preserving at each step the system
111
+ structure of the problem. These arguments rely basically on elliptic regularity and comparison
112
+ principles.
113
+ 2
114
+
115
+ The exponential decay of solutions is a powerful tool in their qualitative study. As an application
116
+ of Theorem 1.1, we derive energy bounds of solutions having prescribed positive and nonradial sign-
117
+ changing components. For this, power type decay would not be enough.
118
+ To be more precise, we consider the autonomous system
119
+
120
+
121
+
122
+
123
+
124
+
125
+
126
+ −∆ui + ui =
127
+
128
+
129
+ j=1
130
+ βij|uj|p|ui|p−2ui,
131
+ ui ∈ H1(RN),
132
+ i = 1, . . . , ℓ.
133
+ (1.4)
134
+ where the βij’s satisfy the following condition:
135
+ (B1) The matrix (βij) is symmetric and admits a block decomposition as follows: For some 1 ≤
136
+ q ≤ ℓ there exist 0 = ℓ0 < ℓ1 < · · · < ℓq−1 < ℓq = ℓ such that, if we set
137
+ Ih := {i ∈ {1, . . . , ℓ} : ℓh−1 < i ≤ ℓh},
138
+ h ∈ {1, . . . , q},
139
+ then βii > 0, βij ≥ 0 if i, j ∈ Ih, and βij < 0 if i ∈ Ih, j ∈ Ik and h ̸= k.
140
+ According to this decomposition, a solution u = (u1, . . . , uℓ) to (1.1) may be written in block-
141
+ form as
142
+ u = (u1, . . . , uq)
143
+ with uh = (uℓh−1+1, . . . , uℓh),
144
+ h = 1, . . . , q.
145
+ We say that u is fully nontrivial if every component ui is different from zero.
146
+ Set Q := {1, . . . , q}. Given a partition Q = Q+ ∪ Q− with Q+ ∩ Q− = ∅ we look for solutions
147
+ such that every component of uh is positive if h ∈ Q+ and every component of uh is nonradial
148
+ and changes sign if h ∈ Q−. To this end, we use variational methods in a space having suitable
149
+ symmetries. As shown in [11, Section 3], to guarantee that the solutions obtained are fully nontrivial
150
+ we need to assume the following two conditions:
151
+ (B2) For each h ∈ Q, the graph whose set of vertices is Ih and whose set of edges is Eh := {{i, j} :
152
+ i, j ∈ Ih, i ̸= j, βij > 0} is connected.
153
+ (B3) If q ≥ 2 then, for every h ∈ {1, . . . , q} such that ℓh − ℓh−1 ≥ 2, the inequality
154
+
155
+ min
156
+ {i,j}∈Eh
157
+ βij
158
+
159
+
160
+ 
161
+ min
162
+ h=1,...,q max
163
+ i∈Ih βii
164
+
165
+ i,j∈Ih
166
+ βij
167
+
168
+ 
169
+ p
170
+ p−1
171
+ > C∗
172
+ q
173
+
174
+ k=1
175
+ k̸=h
176
+
177
+ i∈Ih
178
+ j∈Ik
179
+ |βij|
180
+ holds true, where C∗ = C∗(N, p, q, Q+) > 0 is the explicit constant given in (3.7) below.
181
+ In [11] it is shown that, for any q, the system (1.1) has a fully nontrivial solution satisfying the
182
+ sign requirements described above. Furthermore, an upper bound for its energy is exhibited, but
183
+ only for systems with at most 2 blocks, i.e., for q = 1, 2. Here we use Theorem 1.1 to obtain an
184
+ energy bound for any number of blocks.
185
+ For each h = 1, . . . , q, let RIh := {s = (sℓh−1+1, . . . , sℓh) : si ∈ R for all i ∈ Ih} and define
186
+ µh := inf
187
+ s∈RIh
188
+ s̸=0
189
+
190
+
191
+
192
+
193
+ i∈Ih s2
194
+ i
195
+ � �
196
+ i,j∈Ih βij|si|p|sj|p
197
+ � 2
198
+ 2p
199
+
200
+
201
+
202
+ p
203
+ p−1
204
+ .
205
+ (1.5)
206
+ 3
207
+
208
+ For any ℓ ∈ N, we write ∥u∥ for the usual norm of u = (u1, . . . , uℓ) in (H1(RN))ℓ, i.e.,
209
+ ∥u∥2 :=
210
+
211
+
212
+ i=1
213
+
214
+ RN (|∇ui|2 + |ui|2).
215
+ We prove the following result.
216
+ Theorem 1.2. Let N = 4 or N ≥ 6, and let Q = Q+ ∪ Q− with Q+ ∩ Q− = ∅. Assume (B1),
217
+ (B2), and (B3). Then, there exists a fully nontrivial solution u = (u1, . . . , uq) to the system (1.4)
218
+ with the following properties:
219
+ (a) Every component of uh is positive if h ∈ Q+ and every component of uh is nonradial and
220
+ changes sign if h ∈ Q−.
221
+ (b) If q = 1, then
222
+ ∥u∥2 = µ1∥ω∥2 if Q = Q+
223
+ and
224
+ ∥u∥2 < 10 µ1∥ω∥2 if Q = Q−.
225
+ (c) If q ≥ 2 the following estimate holds true
226
+ ∥u∥2 <
227
+
228
+ min
229
+ k∈Q
230
+
231
+ akµk +
232
+
233
+ h∈Q∖{k}
234
+ bhµh
235
+
236
+
237
+  ∥ω∥2,
238
+ (1.6)
239
+ where ak := 1 if k ∈ Q+, ak := 12 if k ∈ Q−, bh := 6 if h ∈ Q+, bh := 12 if h ∈ Q−, and ω is the
240
+ unique positive radial solution to the equation
241
+ − ∆w + w = |w|2p−2w,
242
+ w ∈ H1(RN).
243
+ (1.7)
244
+ To prove Theorem 1.2, we follow the approach in [11] and impose on the variational setting
245
+ some carefully constructed symmetries which admit finite orbits. This approach immediately gives
246
+ energy estimates but it requires showing a quantitative compactness condition which needs precise
247
+ knowledge about the asymptotic decay of the components of the system. Here is where we use
248
+ Theorem 1.1.
249
+ The paper is organized as follows. Section 2 is devoted to the proof of the exponential decay
250
+ stated in Theorem 1.1. The application of this result to derive energy bounds is contained in Section
251
+ 3, where we also give some concrete examples.
252
+ Acknowledgments
253
+ We thank Nils Ackermann for helpful comments and suggestions.
254
+ F. Angeles and A. Salda˜na
255
+ thank the Instituto de Matem´aticas - Campus Juriquilla for the kind hospitality. F. Angeles is
256
+ supported by CONACYT (Mexico) through a postdoctoral fellowship under grant A1-S-10457. M.
257
+ Clapp is supported by CONACYT (Mexico) through the research grant A1-S-10457. A. Salda˜na
258
+ is supported by UNAM-DGAPA-PAPIIT (Mexico) grant IA100923 and by CONACYT (Mexico)
259
+ grant A1-S-10457.
260
+ 4
261
+
262
+ 2
263
+ Exponential decay
264
+ This section is devoted to the proof of Theorem 1.1. As a first step, we extend the argument
265
+ in [2, Lemma 5.3] to systems. Let Br denote the ball of radius r in RN centered at zero. Let σi
266
+ and βij as in (V2) and (1.1), then we let σ := (σ1, . . . , σℓ) and β := (βij)ℓ
267
+ i,j=1.
268
+ Lemma 2.1. Let Vi ∈ L∞(RN) satisfy (V2) and let u = (u1, . . . , uℓ) be a solution of (1.1). Set
269
+ ξi(r) :=
270
+
271
+ RN∖Br
272
+
273
+ |∇ui|2 + |ui|2�
274
+ and
275
+ ξ(r) := (ξ1(r), . . . , ξℓ(r)).
276
+ Then, there are positive constants C = C(u, σ, β, N, ρ, p) and ϑ = ϑ(σ), with ρ and σi as in (V2),
277
+ such that
278
+ |ξ(r)|1 :=
279
+
280
+
281
+ i=1
282
+ ξi(r) ≤ Ce−ϑr
283
+ for every r ≥ 0.
284
+ Proof. Let χ : RN → R be given by χ(r) := 0 if r ≤ 0, χ(r) := r if r ∈ (0, 1) and χ(r) := 1 if
285
+ r ≥ 1. Let ur
286
+ i (x) := χ(|x| − r)ui(x) for r ≥ 0, x ∈ RN, and i = 1, . . . , ℓ. Then ur
287
+ i ∈ H1(RN) and
288
+ ur
289
+ i (x) = (|x| − r)ui(x),
290
+ ∇ur
291
+ i (x) = (|x| − r)∇ui(x) + x
292
+ |x|ui(x),
293
+ if x ∈ Br+1 ∖ Br.
294
+ Set δ := min{σ1, . . . , σℓ, 1}. Using that |ui x
295
+ |x| · ∇ui| ≤ 1
296
+ 2(|∇ui|2 + |ui|2) we obtain
297
+
298
+ RN
299
+
300
+ ∇ui · ∇ur
301
+ i + Vi uiur
302
+ i
303
+
304
+ ≥ δξi(r + 1) +
305
+
306
+ Br+1∖Br
307
+
308
+ (|x| − r)
309
+
310
+ |∇ui|2 + Vi u2
311
+ i
312
+
313
+ + ui
314
+ x
315
+ |x| · ∇ui
316
+
317
+ ≥ δξi(r + 1) − 1
318
+ 2
319
+
320
+ Br+1∖Br
321
+
322
+ |∇ui|2 + |ui|2�
323
+ ≥ (δ + 1
324
+ 2)ξi(r + 1) − 1
325
+ 2ξi(r)
326
+ if r + 1 ≥ ρ.
327
+ (2.1)
328
+ As u solves (1.1) we have that
329
+ ����
330
+
331
+ RN ∇ui · ∇ur
332
+ i + Vi uiur
333
+ i
334
+ ���� =
335
+ ������
336
+
337
+ RN
338
+
339
+
340
+ j=1
341
+ βij|uj|p|ui|p−2uiur
342
+ i
343
+ ������
344
+
345
+
346
+
347
+ j=1
348
+
349
+ RN\Br
350
+ |βij||uj|p|ui|p−2|ui|2 =
351
+
352
+
353
+ j=1
354
+ |βij|
355
+
356
+ RN∖Br
357
+ |uj|p|ui|p
358
+ and since |um|p ≤
359
+ ��ℓ
360
+ k=1 |uk|2p�1/2
361
+ for every m = 1, . . . , ℓ, we obtain
362
+ ����
363
+
364
+ RN ∇ui · ∇ur
365
+ i + Vi uiur
366
+ i
367
+ ���� ≤
368
+
369
+
370
+
371
+
372
+ j=1
373
+ |βij|
374
+
375
+
376
+
377
+
378
+ k=1
379
+
380
+ RN∖Br
381
+ |uk|2p.
382
+ Given that uk ∈ H1(RN) for all k = 1, . . . , ℓ, Lemma A.1 implies the existence of a constant
383
+ C1 = C1(N, p) > 0 such that
384
+ ����
385
+
386
+ RN ∇ui · ∇ur
387
+ i + Vi uiur
388
+ i
389
+ ���� ≤ C1
390
+
391
+
392
+
393
+
394
+ j=1
395
+ |βij|
396
+
397
+
398
+
399
+
400
+ k=1
401
+ ��
402
+ RN∖Br
403
+
404
+ |∇uk|2 + |uk|2��p
405
+ (2.2)
406
+ 5
407
+
408
+ for every r ≥ 1 and i = 1, . . . , ℓ. Set C2 := C1
409
+ �ℓ
410
+ i,j=1 |βij|. From (2.1) and (2.2), assuming without
411
+ loss of generality that ρ ≥ 2 and adding over i, we get
412
+ 2δ + 1
413
+ 2
414
+ |ξ(r + 1)|1 − 1
415
+ 2|ξ(r)|1 ≤ C2
416
+
417
+
418
+ k=1
419
+ |ξk(r)|p =: C2 |ξ(r)|p
420
+ p
421
+ if r + 1 ≥ ρ.
422
+ Therefore,
423
+ |ξ(r + 1)|1
424
+ |ξ(r)|1
425
+
426
+ 1
427
+ 2δ + 1
428
+
429
+ 1 + 2C2
430
+ |ξ(r)|p
431
+ p
432
+ |ξ(r)|1
433
+
434
+
435
+ 1
436
+ 2δ + 1
437
+
438
+ 1 + 2C2|ξ(r)|p−1
439
+ 1
440
+
441
+ =: γ(r)
442
+ if r + 1 ≥ ρ. (2.3)
443
+ Since |ξ(r)|1 → 0 as r → ∞, there is r0 = r0(u, p, β, ρ) ∈ N such that r0 ≥ ρ and γ(r) ≤ γ−1
444
+ 0
445
+ for all
446
+ r ≥ r0 with γ0 := 2δ+1
447
+ δ+1 > 1. Then, for r > r0 + 1,
448
+ |ξ(r)|1 ≤ |ξ(⌊r⌋)|1 = |ξ(r0)|1
449
+ ⌊r⌋−1
450
+
451
+ k=r0
452
+ |ξ(k + 1)|1
453
+ |ξ(k)|1
454
+ ≤ |ξ(r0)|1γr0−⌊r⌋
455
+ 0
456
+ ≤ ∥u∥2γr0−r+1
457
+ 0
458
+ ,
459
+ where ⌊r⌋ denotes the floor of r. Since |ξ(r)|1 ≤ ∥u∥2 ≤ ∥u∥2γr0−r+1
460
+ 0
461
+ for r ≤ r0 + 1 we have that
462
+ |ξ(r)|1 ≤ ∥u∥2γr0−r+1
463
+ 0
464
+ = ∥u∥2γr0+1
465
+ 0
466
+ e− ln(γ0)r
467
+ for every r ≥ 0,
468
+ as claimed.
469
+ Lemma 2.2. Assume (V1) and let u = (u1, . . . , uℓ) be a solution of (1.1). Then ui ∈ W 2,s(RN) ∩
470
+ C2(RN) for every s ≥ 2 and i = 1, . . . , ℓ.
471
+ Proof. Let N ≥ 3. The argument for N = 1, 2 is similar and easier. For each i = 1, . . . , ℓ set
472
+ fi :=
473
+ l
474
+
475
+ j=1
476
+ βij|uj|p|ui|p−2ui.
477
+ (2.4)
478
+ Since |uk| ≤ |u| :=
479
+
480
+ u2
481
+ 1 + · · · + u2
482
+ ℓ for every k = 1, . . . ℓ, we have that
483
+ |fi| ≤
484
+
485
+
486
+ i,j=1
487
+ |βij||uj|p|ui|p−1 ≤
488
+
489
+
490
+
491
+
492
+ j=1
493
+ |βij|
494
+
495
+  |u|p|u|p−1 ≤
496
+
497
+
498
+
499
+
500
+ i,j=1
501
+ |βij|
502
+
503
+  |u|2p−1.
504
+ (2.5)
505
+ Therefore, fi ∈ Ls1(RN) for s1 :=
506
+ 2∗
507
+ 2p−1 > 1 and, by the standard Lp-elliptic regularity theory,
508
+ ui ∈ W 2,s1(RN) for all i = 1, . . . , ℓ (see, e.g., [14, Chapter 9] or [25, Section 3.2]).
509
+ Using a
510
+ bootstrapping argument, we conclude the existence of s > max{N
511
+ 2 , 2} such that ui ∈ W 2,s(RN) for
512
+ all i = 1, . . . , ℓ and thus, by the Sobolev embedding theorem, ui ∈ C1,α(RN). Since Vi is H¨older
513
+ continuous and bounded, applying the Schauder estimates repeatedly, we deduce that ui is of class
514
+ C2 (see [15, Section 1.3]).
515
+ In the rest of the paper, we write | · |t for the norm in Lt(RN), 1 ≤ t ≤ ∞. If u = (u1, . . . , uℓ) ∈
516
+ [L∞(RN)]ℓ, then |u|∞ := �ℓ
517
+ i=1 supRN |ui|. Moreover, for a proper open subset Ω of RN we denote
518
+ the usual Sobolev norm in H1(Ω) by ∥ · ∥H1(Ω), i.e.,
519
+ ∥u∥2
520
+ H1(Ω) :=
521
+
522
+
523
+ (|∇u|2 + |u|2).
524
+ 6
525
+
526
+ Lemma 2.3. Assume (V1). Let u = (u1, . . . , uℓ) be a solution of (1.1), s > max{2, N
527
+ 2 } and Λ > 0
528
+ be such that |Vi|∞ ≤ Λ for i = 1, . . . , ℓ. Then there is a constant C = C(β, N, p, Λ, s) > 0 such
529
+ that, for any x ∈ RN,
530
+ ∥ui∥W 2,s(B 1
531
+ 2 (x)) ≤ C
532
+
533
+ |ui|
534
+ s−2
535
+ s
536
+ ∞ ∥ui∥
537
+ 2
538
+ s
539
+ H1(B1(x)) + |u|
540
+ 2ps−(s+2)
541
+ s
542
+
543
+
544
+
545
+
546
+ j=1
547
+ ∥uj∥2
548
+ H1(B1(x))
549
+ � p
550
+ s
551
+
552
+  ,
553
+ where |u| :=
554
+
555
+ u2
556
+ 1 + · · · + u2
557
+ ℓ and BR(x) is the ball of radius R centered at x.
558
+ Proof. Since ui ∈ W 2,s(RN) ⊂ L∞(RN), we have that
559
+ |ui|s = |ui|s−2|ui|2 ≤ |ui|s−2
560
+ ∞ |ui|2.
561
+ Set fi as in (2.4). By (2.5), there is a constant C2 = C2(β) such that
562
+ |fi|s ≤ Cs
563
+ 2|u|(p−1)s|u|ps = Cs
564
+ 2|u|(p−1)s+p(s−2)(u2
565
+ 1 + · · · + u2
566
+ ℓ)p
567
+ ≤ Cs
568
+ 2|u|2ps−(s+2)
569
+
570
+ ℓp(u2p
571
+ 1 + · · · + u2p
572
+ ℓ ),
573
+ where (p − 1)s + p(s − 2) > 0. Then, by [14, Theorem 9.11], there is a positive constant C1 =
574
+ C1(s, N, Λ) such that
575
+ ∥ui∥W 2,s(B 1
576
+ 2 (x)) ≤ C1
577
+
578
+ |ui|Ls(B1(x)) + |fi|Ls(B1(x))
579
+
580
+ for any x ∈ RN.
581
+ From the previous inequalities we derive
582
+ ∥ui∥W 2,s(B 1
583
+ 2 (x)) ≤ C1
584
+
585
+ |ui|
586
+ s−2
587
+ s
588
+ ∞ ∥ui∥
589
+ 2
590
+ s
591
+ H1(B1(x))) + C2ℓ
592
+ p
593
+ s C3|u|
594
+ 2ps−(s+2)
595
+ s
596
+
597
+
598
+
599
+
600
+ j=1
601
+ ∥uj∥2
602
+ H1(B1(x))
603
+ � p
604
+ s
605
+
606
+  ,
607
+ where C3 = C3(N, p) is the constant given by the Sobolev embedding H1(B1) ⊂ L2p(B1).
608
+ Lemma 2.4. Assume (V1) − (V2), let u = (u1, . . . , uℓ) be a solution of (1.1) and let fi be as in
609
+ (2.4). Then, there are constants η > 0, C1 > 0, and C2 > 0 such that
610
+ |ui(x)| ≤ C1e−η|x|,
611
+ |fi(x)| ≤ C2e−(2p−1)η|x|,
612
+ for all x ∈ RN and i = 1, . . . , ℓ.
613
+ Proof. For x ∈ RN with |x| ≥ 2, set r := 1
614
+ 2|x|. Then, B1(x) ⊂ RN ∖ Br and, by Lemma 2.1, there
615
+ are positive constants K1 = K1(u, σ, β, N, ρ, p) and ϑ = ϑ(σ), with ρ and σi as in (V2), such that
616
+ ∥uj∥2
617
+ H1(B1(x)) ≤ ∥uj∥2
618
+ H1(RN∖Br) = ξj(r) ≤
619
+
620
+
621
+ i=1
622
+ ξi(r) ≤ K1e−ϑr
623
+ for every j = 1, . . . , ℓ.
624
+ Fix s > max{N
625
+ 2 , 2}. By Lemma 2.3 there are positive constants K2 = K2(u, β, N, p, Λ, s) and
626
+ K3 = K3(u, σ, β, ρ, N, p, s) such that
627
+ ∥ui∥W 2,s(B 1
628
+ 2 (x)) ≤ K2
629
+
630
+ ∥ui∥
631
+ 2
632
+ s
633
+ H1(B1(x))) +
634
+
635
+
636
+
637
+ j=1
638
+ ∥uj∥2
639
+ H1(B1(x))
640
+ � p
641
+ s
642
+
643
+  ≤ K2K3e− ϑ
644
+ s r.
645
+ 7
646
+
647
+ Therefore,
648
+ |ui(x)| ≤ |ui|L∞(B 1
649
+ 2 (x)) ≤ K4∥ui∥W 2,s(B 1
650
+ 2 (x)) ≤ K2K3K4e− ϑ
651
+ 2s|x|
652
+ for every x ∈ RN ∖ B2,
653
+ where K4 is the positive constant given by the embedding W 2,s(B 1
654
+ 2) ⊂ L∞(B 1
655
+ 2).
656
+ Since ui is
657
+ continuous, we may choose C1 ≥ K2K3K4 such that |ui(x)| ≤ C1e− ϑ
658
+ s for every x ∈ B2. So, setting
659
+ η := ϑ
660
+ 2s, we obtain
661
+ |ui(x)| ≤ C1e−η|x|
662
+ for every x ∈ RN.
663
+ The estimate for fi follows immediately from (2.5).
664
+ The following result is a particular case of [18, Theorem 2.1]. We include a simplified proof for
665
+ completeness.
666
+ Lemma 2.5. Assume that V : RN → R satisfies σ := infRN∖Bρ(0) V > 0 for some ρ ≥ 0. Let w be
667
+ a classical solution of −∆w + V w = f in RN such that
668
+ |w(x)| ≤ Ce−η|x|
669
+ and
670
+ |f(x)| ≤ Ce−δ|x|
671
+ for all x ∈ RN
672
+ and for some constants C > 0, η ∈ (0, √σ) and δ ∈ (η, √σ]. Then, for any µ ∈ (η, δ), there is
673
+ M = M(µ, δ, ρ, σ, C) > 0 such that
674
+ |w(x)| ≤ Me−µ|x|
675
+ for all x ∈ RN.
676
+ Proof. Let ρ, σ, η, δ, µ, and C be as in the statement. Set v(x) := e−µ|x| for x ∈ RN. Then,
677
+ ∆v(x) = v(x)h(|x|)
678
+ for x ∈ RN ∖ {0},
679
+ where h(r) := µ2 − (N − 1)µ
680
+ r .
681
+ In particular, V (x) − h(|x|) ≥ σ − µ2 =: ε > 0 for |x| > ρ. Fix t ∈ R satisfying
682
+ t > C
683
+ ε e(µ−δ)ρ
684
+ and
685
+ w(x) < tv(x) for |x| = ρ.
686
+ (2.6)
687
+ We claim that w(x) ≤ tv(x) for all |x| > ρ. Indeed, let z := w − tv and assume, by contradiction,
688
+ that m := sup|x|≥ρ z(x) > 0. Since lim|x|→∞ z(x) = 0, there is R > ρ such that z(x) ≤ m
689
+ 2 for
690
+ |x| ≥ R. Let Ω := {x ∈ RN : ρ < |x| < R and z(x) > 0}. Then z ≤ m
691
+ 2 on ∂Ω and, by (2.6),
692
+ −∆z(x) = −∆w(x) + t∆v(x) = f(x) − V (x)w(x) + tv(x)h(|x|)
693
+ = f(x) − V (x)z(x) + tv(x)(h(|x|) − V (x))
694
+ < Ce−δ|x| − εtv(x) = Ce−δ|x| − εte−µ|x| < 0
695
+ for every x ∈ Ω.
696
+ Then, by the maximum principle, m = maxΩ z = max∂Ω z ≤ m
697
+ 2 . This is a contradiction. Therefore
698
+ m ≤ 0, namely, w(x) ≤ te−µ|x| for all |x| ≥ ρ. Arguing similarly for −w and using that w ∈ L∞(RN)
699
+ we obtain that |w(x)| ≤ Me−µ|x| for all x ∈ RN, as claimed.
700
+ We are ready to prove Theorem 1.1.
701
+ Proof of Theorem 1.1. Iterating Lemmas 2.4 and 2.5, using that 2p − 1 > 1, one shows that, for
702
+ any µi ∈ (0, √σi), there is C > 0 such that |ui(x)| ≤ Ce−µi|x| for all x ∈ RN and for all i = 1, . . . , ℓ.
703
+ Now, assume that Vi ≡ 1 for every i = 1, . . . , ℓ and let µ ∈ (0, 1) be such that (2p − 1)µ > 1.
704
+ By Lemma 2.4, we have that |fi(x)| ≤ C2e−(2p−1)µ|x| for all x ∈ RN.
705
+ The claim now follows
706
+ from [1, Theorem 2.3(c)].
707
+ 8
708
+
709
+ 3
710
+ Energy estimates for seminodal solutions
711
+ In this section we prove Theorem 1.2.
712
+ Consider the autonomous system (1.4) where N ≥ 4,
713
+ 1 < p <
714
+ N
715
+ N−2 and βij satisfy the assumption (B1) stated in the Introduction. According to the
716
+ decomposition given by (B1), a solution u = (u1, . . . , uℓ) to (1.4) may be written in block-form as
717
+ u = (u1, . . . , uq)
718
+ with uh = (uℓh−1+1, . . . , uℓh),
719
+ h = 1, . . . , q.
720
+ u is called fully nontrivial if every component ui is different from zero. We say that u is block-wise
721
+ nontrivial if at least one component in each block uh is nontrivial.
722
+ Following [11], we introduce suitable symmetries to produce a change of sign in some compo-
723
+ nents. Let G be a finite subgroup of the group O(N) of linear isometries of RN and denote by
724
+ Gx := {gx : g ∈ G} the G-orbit of x ∈ RN. Let φ : G → Z2 := {−1, 1} be a homomorphism of
725
+ groups. A function u : RN → R is called G-invariant if it is constant on Gx for every x ∈ RN and
726
+ it is called φ-equivariant if
727
+ u(gx) = φ(g)u(x) for all g ∈ G, x ∈ RN.
728
+ (3.1)
729
+ Note that, if φ ≡ 1 is the trivial homomorphism and u satisfies (3.1), then u is G-invariant. On
730
+ the other hand, if φ is surjective every nontrivial function satisfying (3.1) is nonradial and changes
731
+ sign. Define
732
+ H1(RN)φ := {u ∈ H1(RN) : u is φ-equivariant}.
733
+ For each h = 1, . . . , q, fix a homomorphism φh : G → Z2. Take φi := φh for all i ∈ Ih and set
734
+ φ = (φ1, . . . , φℓ). Denote by
735
+ Hφ := H1(RN)φ1 × · · · × H1(RN)φℓ,
736
+ and let J φ : Hφ → R be the functional given by
737
+ J φ(u) := 1
738
+ 2
739
+
740
+
741
+ i=1
742
+ ∥ui∥2 − 1
743
+ 2p
744
+
745
+
746
+ i,j=1
747
+ βij
748
+
749
+ RN |ui|p|uj|p.
750
+ This functional is of class C1 and its critical points are the solutions to the system (1.4) satisfying
751
+ (3.1). The block-wise nontrivial solutions belong to the Nehari set
752
+ N φ := {u ∈ Hφ : ∥uh∥ ̸= 0 and ∂uhJ φ(u)uh = 0 for every h = 1, . . . , ℓ}.
753
+ Note that
754
+ ∂uhJ φ|K(u)uh = ∥uh∥2 −
755
+
756
+
757
+ k=1
758
+
759
+ (i,j)∈Ih×Ik
760
+ βij
761
+
762
+ RN |ui|p|uj|p,
763
+ and that J φ(u) = p−1
764
+ 2p ∥u∥2 if u ∈ N φ. Let
765
+ cφ :=
766
+ inf
767
+ u∈N φ J φ(u).
768
+ If s = (s1, . . . , sq) ∈ Rq and u = (u1, . . . , uq) ∈ Hφ we write su := (s1u1, . . . , squq). The following
769
+ facts were proved in [8].
770
+ 9
771
+
772
+ Lemma 3.1.
773
+ (i) cφ > 0.
774
+ (ii) If the coordinates of u ∈ Hφ satisfy
775
+ q
776
+
777
+ k=1
778
+
779
+ (i,j)∈Ih×Ik
780
+
781
+ RN βij|ui|p|uj|p > 0
782
+ for every h = 1, . . . , q,
783
+ (3.2)
784
+ then there exists a unique su ∈ (0, ∞)q such that suu ∈ N φ. Furthermore,
785
+ J φ(suu) =
786
+ max
787
+ s∈(0,∞)q J φ(su).
788
+ Proof. See [8, Lemma 2.2] or [11, Lemma 2.2].
789
+ Lemma 3.2. If cφ is attained, then the system (1.4) has a block-wise nontrivial solution u =
790
+ (u1, . . . , uℓ) ∈ Hφ. Furthermore, if ui is nontrivial, then ui is positive if φi ≡ 1 and ui is nonradial
791
+ and changes sign if φi is surjective.
792
+ Proof. It is shown in [8, Lemma 2.4] that any minimizer of J φ on N φ is a block-wise nontrivial
793
+ solution to (1.4). If ui ̸= 0 and φi is surjective, then ui is nonradial and changes sign. If φi ≡ 1 then
794
+ |ui| is G-invariant and replacing ui with |ui| we obtain a solution with the required properties.
795
+ Set Q := {1, . . . , q} and fix a decomposition Q = Q+ ∪ Q− with Q+ ∩ Q− = ∅. From now
796
+ on, we consider the following symmetries. We write RN ≡ C × C × RN−4 and a point in RN as
797
+ (z1, z2, y) ∈ C × C × RN−4.
798
+ Definitions 3.3. Let i denote the imaginary unit. For each m ∈ N, let
799
+ Km := {e2πij/m : j = 0, . . . , m − 1},
800
+ Gm be the group generated by Km ∪{τ}∪O(N −4), acting on each point (z1, z2, y) ∈ C×C×RN−4
801
+ as
802
+ e2πij/m(z1, z2, y) := (e2πij/mz1, e2πij/mz2, y),
803
+ τ(z1, z2, y) := (z2, z1, y),
804
+ α(z1, z2, y) := (z1, z2, αy)
805
+ if α ∈ O(N − 4),
806
+ and θ : Gm → Z2 be the homomorphism satisfying
807
+ θ(e2πij/m) = 1,
808
+ θ(τ) = −1,
809
+ and
810
+ θ(α) = 1
811
+ for every α ∈ O(N − 4).
812
+ Define φh : Gm → Z2 by
813
+ φh :=
814
+
815
+ 1
816
+ if h ∈ Q+,
817
+ θ
818
+ if h ∈ Q−.
819
+ (3.3)
820
+ Due to the lack of compactness, cφ is not always attained; see e.g. [11, Corollary 2.8(i)]. A
821
+ sufficient condition for this to happen is given by the next lemma. We use the following notation.
822
+ If Q′ ⊂ Q := {1, . . . , q} we consider the subsystem of (1.4) obtained by deleting all components of
823
+ uh for every h /∈ Q′, and we denote by J φ
824
+ Q′ and N φ
825
+ Q′ the functional and the Nehari set associated
826
+ to this subsystem. We write
827
+
828
+ Q′ :=
829
+ inf
830
+ u∈N φ
831
+ Q′
832
+ J φ
833
+ Q′(u).
834
+ If Q′ = {h} we omit the curly brackets and write, for instance, cφ
835
+ h or J φ
836
+ h .
837
+ 10
838
+
839
+ Lemma 3.4 (Compactness). Let N ̸= 5, m ≥ 5 and φh : Gm → Z2 be as in (3.3). If, for each
840
+ h ∈ Q := {1, . . . , q}, the strict inequality
841
+ cφ <
842
+
843
+
844
+
845
+
846
+ Q∖{h} + mµh
847
+ p−1
848
+ 2p ∥ω∥2,
849
+ if h ∈ Q+,
850
+
851
+ Q∖{h} + 2mµh
852
+ p−1
853
+ 2p ∥ω∥2,
854
+ if h ∈ Q−,
855
+ (3.4)
856
+ holds true, then cφ is attained, where ω is the positive radial solution to (1.7) and µh is given by
857
+ (1.5).
858
+ Proof. This statement follows by combining [11, Corollary 2.8(ii)] with [11, Equation (5.1)].
859
+ To verify condition (3.4) we introduce a suitable test function. Fix m ≥ 5 and let Km be as in
860
+ Definitions 3.3. If h ∈ Q+, we take ζh := ( 1
861
+
862
+ 2,
863
+ 1
864
+
865
+ 2, 0) and, for each R > 1, we define
866
+ �σhR(x) :=
867
+
868
+ g∈Km
869
+ ω(x − Rgζh),
870
+ x ∈ RN.
871
+ If h ∈ Q− we take ζh := (1, 0, 0) and we define
872
+ �σhR(x) :=
873
+
874
+ g∈G′m
875
+ φh(g) ω(x − Rgζh),
876
+ x ∈ RN,
877
+ where ω is the positive radial solution to (1.7) and G′
878
+ m is the subgroup of Gm generated by Km∪{τ}.
879
+ Note that �σhR(gx) = φh(g)�σhR(x) for every g ∈ Gm, x ∈ RN. Let
880
+ σhR := thR�σhR,
881
+ (3.5)
882
+ where thR > 0 is chosen so that ∥σhR∥2 =
883
+
884
+ RN |σhR|2p.
885
+ Lemma 3.5. If m ≥ 5, then, for each h ∈ {1, . . . , q}, there exist th = (tℓh−1+1, . . . , tℓh) ∈
886
+ (0, ∞)ℓh−ℓh−1 and C0, R0 > 0 such that thσhR := (tℓh−1+1σhR, . . . , tℓhσhR) ∈ N φ
887
+ h and
888
+ J φ
889
+ h (thσhR) ≤ |Gmζh| µh
890
+ p−1
891
+ 2p ∥ω∥2 − C0e−Rdm
892
+ for every R ≥ R0,
893
+ where |Gmζh| is the cardinality of the Gm-orbit of ζh, i.e., |Gmζh| = m if h ∈ Q+ and |Gmζh| = 2m
894
+ if h ∈ Q−, and
895
+ dm := |1 − e2πi/m|.
896
+ (3.6)
897
+ Proof. Take th = (tℓh−1+1, . . . , tℓh) ∈ (0, ∞)ℓh−ℓh−1 such that
898
+
899
+ i∈Ih
900
+ t2
901
+ i =
902
+
903
+ i,j∈Ih
904
+ βijtp
905
+ jtp
906
+ i = µh
907
+ and apply [11, Proposition 4.1(i) and Lemma 4.4].
908
+ 11
909
+
910
+ Proof of Theorem 1.2. Assume (B1) and let φh : Gm → Z2 be given by (3.3). For q = 1 and m ≥ 5
911
+ it is proved in [11, Corollary 4.2 and Proposition 4.5] that cφ is attained at u ∈ N φ satisfying
912
+ ∥u∥2 = µ1∥ω∥2 if Q+ = {1}
913
+ and
914
+ ∥u∥2 < 2m µ1∥ω∥2 if Q− = {1}.
915
+ Taking m = 5 gives statement (b).
916
+ Fix m = 6. We claim that cφ is attained and that the estimate (c) holds true for every q ≥ 2.
917
+ To prove this claim, we proceed by induction. Assume it is true for q − 1 with q ≥ 2.
918
+ We will show that the compactness condition (3.4) holds true. Using a change of coordinates, it
919
+ suffices to argue for h = q. By induction hypothesis there exists w = (w1, . . . , wq−1) ∈ N φ
920
+ Q∖{q} such
921
+ that J φ
922
+ Q∖{q}(w) = cφ
923
+ Q∖{q}. For each R > 1 let σqR be as in (3.5) and take tq ∈ (0, ∞)ℓ−ℓq−1 as in
924
+ Lemma 3.5. Set whR = wh for h = 1, . . . , q−1 and wqR = tqσqR, and define wR = (w1R, . . . , wℓR) :=
925
+ (w1R, . . . , wqR). Then, as w ∈ N φ
926
+ Q∖{q} and the interaction between the components of w and σqR
927
+ tends to 0 as R → ∞, we have that wR satisfies (3.2) for large enough R and, as a consequence,
928
+ there exist R1 > 0 and (s1R, . . . , sqR) ∈ [1/2, 2]q such that (s1Rw1R, . . . , sqRwqR) ∈ N φ if R ≥ R1.
929
+ Set uR = (u1R, . . . , uℓR) := (s1Rw1R, . . . , sqRwqR). Using that w ∈ N φ
930
+ Q∖{q} and tqσqR ∈ N φ
931
+ q , from
932
+ the last statement in Lemma 3.1(ii) and Lemma 3.5 we derive
933
+ J φ(uR) = 1
934
+ 2
935
+
936
+
937
+ i=1
938
+ ∥uiR∥2 − 1
939
+ 2p
940
+
941
+
942
+ i,j=1
943
+ βij
944
+
945
+ RN |uiR|p|ujR|p
946
+ ≤ J φ
947
+ Q∖{q}(w) + J φ
948
+ q (tqσqR) − 1
949
+ p
950
+ q−1
951
+
952
+ h=1
953
+
954
+ (i,j)∈Ih×Iq
955
+ βij
956
+
957
+ RN |shRwiR|p|sqRwjR|p
958
+ ≤ cφ
959
+ Q∖{q} + |Gmζh| µq
960
+ p−1
961
+ 2p ∥ω∥2 − C0e−Rdm + C1
962
+ q−1
963
+
964
+ h=1
965
+
966
+ i∈Ih
967
+
968
+ RN |wiR|p|σqR|p,
969
+ if R ≥ max{R0, R1}, where C0 and C1 are positive constants and dm is given in (3.6).
970
+ It is well known that |ω(x)| ≤ Ce−|x| and, as w solves a subsystem of (1.4), Theorem 1.1 asserts
971
+ that
972
+ |wiR(x)| ≤ Ce−|x|
973
+ for every i ∈ Ih with h = 1, . . . , q − 1.
974
+ Therefore, for every g ∈ Gm,
975
+
976
+ RN |wiR|p|ω( · − Rgζh)|p ≤ C
977
+
978
+ RN e−p|x| e−p|x−Rgζh| dx ≤ Ce−Rp.
979
+ So, if p > dm, we conclude that
980
+ cφ < cφ
981
+ Q∖{q} + |Gmζh| µq
982
+ p−1
983
+ 2p ∥ω∥2
984
+ and, by Lemmas 3.4 and 3.2, cφ is attained at a block-wise nontrivial solution u of (1.4) such
985
+ that every component of uh is positive if h ∈ Q+ and every component of uh is nonradial and
986
+ changes sign if h ∈ Q−. Furthermore, since we are assuming (B2) and (B3) with C∗ as in (3.7)
987
+ below, [11, Theorem 3.3] asserts that u is fully nontrivial.
988
+ Finally, note that p > 1 = dm because m = 6. As |Gmζh| = 6 if h ∈ Q+ and |Gmζh| = 12 if
989
+ h ∈ Q−, the estimate in statement (c) follows by induction.
990
+ 12
991
+
992
+ Remark 3.6. If m = 5 and p > dm we arrive to a similar conclusion, where, in this case, the
993
+ constant bh in statement (b) is 5 if h ∈ Q+ and it is 10 if h ∈ Q−. Note, however, that numbers p
994
+ satisfying d5 = 2 sin π
995
+ 5 < p <
996
+ N
997
+ N−2 exist only for N ≤ 13.
998
+ Remark 3.7. For φh as in (3.3), the constant C∗ > 0 appearing in (B3) depends on N, p, q, and
999
+ Q+. It is explicitly defined in [11, Equation (3.1)] as
1000
+ C∗ :=
1001
+
1002
+
1003
+ pdφ
1004
+ (p − 1)S
1005
+ p
1006
+ p−1
1007
+ φ
1008
+
1009
+
1010
+ p
1011
+ ,
1012
+ (3.7)
1013
+ where
1014
+ dφ := p − 1
1015
+ 2p
1016
+ inf
1017
+ (v1,...,vq)∈Uφ
1018
+ q
1019
+
1020
+ h=1
1021
+ ∥vh∥2
1022
+ with Uφ := {(v1, . . . , vq) : vh ∈ H1(RN)φh ∖ {0}, ∥vh∥2 = |vh|2p
1023
+ 2p, vhvk = 0 if h ̸= k}, and
1024
+ Sφ :=
1025
+ min
1026
+ h=1,...,q
1027
+ inf
1028
+ v∈H1(RN)φh∖{0}
1029
+ ∥v∥2
1030
+ |v|2
1031
+ 2p
1032
+ .
1033
+ Remark 3.8. In the proof of Theorem 1.2 we use [1, Theorem 2.3], which also characterizes the
1034
+ sharp decay rate for positive components by providing a bound from below. This kind of information
1035
+ can be useful to show uniqueness of positive solutions for some problems, see [4, Section 8.2].
1036
+ To conclude, we discuss some special cases.
1037
+ Examples 3.9. Assume (B1) and let p ∈ (1, 2∗
1038
+ 2 ).
1039
+ (a) If q = 1 the system (1.4) is cooperative and more can be said. Indeed, it is shown in [11,
1040
+ Corollary 4.2 and Proposition 4.5] that, if (B2) is satisfied, then (1.4) has a synchronized
1041
+ solution u = (t1u, . . . , tℓu), where (t1, . . . , tℓ) ∈ (0, ∞)ℓ is a minimizer for (1.5) and u is a
1042
+ nontrivial φ-equivariant least energy solution of the equation
1043
+ −∆u + u = |u|2p−2u,
1044
+ u ∈ H1(RN)φ.
1045
+ (3.8)
1046
+ Here, if Q+ = {1}, then φ ≡ 1 (and therefore u = ω) and ∥u∥2 ≤ µ1∥ω∥2. On the other
1047
+ hand, if Q− = {1}, then φ : Gm → Z2 is the homomorphism θ given in Definitions 3.3 and
1048
+ ∥u∥2 ≤ 10µ1∥ω∥2.
1049
+ (b) If q = ℓ ≥ 2 the system (1.4) is competitive, i.e., βii > 0 and βij < 0 if i ̸= j. Assumptions
1050
+ (B2) and (B3) are automatically satisfied and, as µi = β
1051
+
1052
+ 1
1053
+ p−1
1054
+ ii
1055
+ , the estimate in Theorem 1.2(c)
1056
+ becomes
1057
+ ∥u∥2 <
1058
+
1059
+ min
1060
+ j∈Q
1061
+
1062
+ ajβ
1063
+
1064
+ 1
1065
+ p−1
1066
+ jj
1067
+ +
1068
+
1069
+ i∈Q∖{i}
1070
+ biβ
1071
+
1072
+ 1
1073
+ p−1
1074
+ ii
1075
+
1076
+
1077
+  ∥ω∥2
1078
+
1079
+
1080
+
1081
+
1082
+ (6 |Q+| + 12 |Q−| − 5) β
1083
+
1084
+ 1
1085
+ p−1
1086
+ 0
1087
+ ∥ω∥2
1088
+ if Q+ ̸= ∅,
1089
+ 12 |Q−|β
1090
+
1091
+ 1
1092
+ p−1
1093
+ 0
1094
+ ∥ω∥2
1095
+ if Q+ = ∅,
1096
+ where |Q±| denotes the cardinality of Q± and β0 := min{β11, . . . , βℓℓ}.
1097
+ 13
1098
+
1099
+ (c) Similarly, for any q ≥ 2, the estimate in Theorem 1.2(c) yields
1100
+ ∥u∥2 ≤
1101
+
1102
+ (6 |Q+| + 12 |Q−| − 5) µ∗∥ω∥2
1103
+ if Q+ ̸= ∅,
1104
+ 12 |Q−| µ∗∥ω∥2
1105
+ if Q+ = ∅.
1106
+ where µ∗ = max{µ1, . . . , µq}.
1107
+ Assumptions (B2) and (B3) guarantee that u is fully nontrivial. Note that the left-hand side of
1108
+ the inequality in (B3) depends only on the entries of the submatrices (βij)i,j∈Ih, h = 1, . . . , q,
1109
+ whereas the right-hand side only depends on the other entries. So, if the former are large
1110
+ enough with respect to the absolute values of the latter, (B3) is satisfied. For example, if we
1111
+ take ℓ = 2q and the matrix is
1112
+
1113
+
1114
+
1115
+
1116
+
1117
+
1118
+
1119
+
1120
+
1121
+
1122
+
1123
+ λ
1124
+ λ
1125
+ β13
1126
+ β14
1127
+ β15
1128
+ . . .
1129
+ β1ℓ
1130
+ λ
1131
+ λ
1132
+ β23
1133
+ β24
1134
+ β25
1135
+ . . .
1136
+ β2ℓ
1137
+ β31
1138
+ β32
1139
+ λ
1140
+ λ
1141
+ β35
1142
+ . . .
1143
+ β3ℓ
1144
+ β41
1145
+ β42
1146
+ λ
1147
+ λ
1148
+ β45
1149
+ . . .
1150
+ β4ℓ
1151
+ ...
1152
+ ...
1153
+ ...
1154
+ ...
1155
+ βℓ−1 1
1156
+ . . .
1157
+ βℓ−1 ℓ−2
1158
+ λ
1159
+ λ
1160
+ βℓ1
1161
+ . . .
1162
+ βℓ ℓ−2
1163
+ λ
1164
+ λ
1165
+
1166
+
1167
+
1168
+
1169
+
1170
+
1171
+
1172
+
1173
+
1174
+
1175
+
1176
+ .
1177
+ with λ > 0 and βji = βij < 0, then (B1) and (B2) are satisfied. If, additionally,
1178
+ λ > 4
1179
+ 2p−1
1180
+ p−1 (q − 1)C∗
1181
+ and
1182
+ |βij| ≤ 1,
1183
+ then, for any h = 1, . . . , q,
1184
+
1185
+ min
1186
+ {i,j}∈Eh
1187
+ βij
1188
+
1189
+
1190
+ 
1191
+ min
1192
+ h=1,...,q max
1193
+ i∈Ih
1194
+ βii
1195
+
1196
+ i,j∈Ih
1197
+ βij
1198
+
1199
+ 
1200
+ p
1201
+ p−1
1202
+ = λ
1203
+ � λ
1204
+
1205
+
1206
+ p
1207
+ p−1
1208
+ > C∗4(q − 1) ≥ C∗
1209
+ q
1210
+
1211
+ k=1
1212
+ k̸=h
1213
+
1214
+ i∈Ih
1215
+ j∈Ik
1216
+ |βij|
1217
+ so (B3) is satisfied.
1218
+ A
1219
+ An auxiliary result
1220
+ Lemma A.1. For every r ≥ 1 there is a linear operator Er : H1(RN ∖ Br) → H1(RN) such that,
1221
+ for every u ∈ H1(RN ∖ Br),
1222
+ (i) Eru = u a.e. in RN ∖ Br,
1223
+ (ii) |Eru|2
1224
+ 2 ≤ C1|u|2
1225
+ L2(RN∖Br)
1226
+ (iii) ∥Eru∥2 ≤ C1∥u∥2
1227
+ H1(RN∖Br)
1228
+ for some positive constant C1 depending only on N and not on r. As a consequence, given p ∈ (1, 2∗
1229
+ 2 )
1230
+ there is a positive constant C depending only on N and p such that
1231
+ |u|L2p(RN∖Br) ≤ C∥u∥H1(RN∖Br)
1232
+ for every u ∈ H1(RN ∖ Br) and every r ≥ 1.
1233
+ 14
1234
+
1235
+ Proof. Fix a linear (extension) operator E1 : H1(RN ∖ B1) → H1(RN) and a positive constant C1
1236
+ satisfying (i), (ii) and (iii) for r = 1; see e.g. [16, Theorem 2.3.2]. For r > 1, set �u(x) := u(rx)
1237
+ and, for u ∈ H1(RN ∖ Br), define
1238
+ (Eru)(y) := (E1�u)
1239
+ �y
1240
+ r
1241
+
1242
+ .
1243
+ Then, �
1244
+ Eru = E1�u. Clearly, Er satisfies (i). Note that |�u|2
1245
+ L2(RN ∖B1) = r−N|u|2
1246
+ L2(RN∖Br) and that
1247
+ ∥�u∥2
1248
+ H1(RN∖B1) = r−N
1249
+ ��
1250
+ RN∖Br
1251
+
1252
+ r2|∇u|2 + |u|2��
1253
+ .
1254
+ Similar identities hold true when we replace RN ∖ B1 and RN ∖ Br with RN. Therefore,
1255
+ r−N|Eru|2
1256
+ 2 = |�
1257
+ Eru|2
1258
+ 2 = |E1�u|2
1259
+ 2 ≤ C1∥�u∥2
1260
+ L2(RN∖B1) = r−NC1|u|2
1261
+ L2(RN ∖Br),
1262
+ which yields (ii). Furthermore,
1263
+ r−N
1264
+ ��
1265
+ RN
1266
+
1267
+ r2|∇(Eru)|2 + |Eru|2��
1268
+ = ∥�
1269
+ Eru∥2 = ∥E1�u∥2
1270
+ ≤ C1∥�u∥2
1271
+ H1(RN∖B1) = r−NC1
1272
+ ��
1273
+ RN∖Br
1274
+
1275
+ r2|∇u|2 + |u|2��
1276
+ .
1277
+ This inequality, combined with (ii), yields
1278
+ r2∥Eru∥2 =
1279
+
1280
+ RN
1281
+
1282
+ r2|∇(Eru)|2 + |Eru|2�
1283
+ + (r2 − 1)
1284
+
1285
+ RN |Eru|2
1286
+ ≤ C1
1287
+
1288
+ RN∖Br
1289
+
1290
+ r2|∇u|2 + |u|2�
1291
+ + C1(r2 − 1)
1292
+
1293
+ RN∖Br
1294
+ |u|2 = r2C1∥u∥2
1295
+ H1(RN∖Br),
1296
+ which gives (iii).
1297
+ For p ∈ (1,
1298
+ N
1299
+ N−2) let C2 = C2(N, p) be the constant for the Sobolev embedding H1(RN) ⊂
1300
+ L2p(RN). Then, for any u ∈ H1(RN ∖ Br), using statements (i) and (iii) we obtain
1301
+ |u|2
1302
+ L2p(RN∖Br) ≤ |Eru|2
1303
+ 2p ≤ C2∥Eru∥2 ≤ C2C1∥u∥2
1304
+ H1(RN∖Br),
1305
+ as claimed.
1306
+ References
1307
+ [1] Ackermann, Nils; Dancer, Norman: Precise exponential decay for solutions of semilinear elliptic
1308
+ equations and its effect on the structure of the solution set for a real analytic nonlinearity.
1309
+ Differential Integral Equations 29 (2016), no. 7-8, 757–774.
1310
+ [2] Ackermann, Nils; Weth, Tobias: Multibump solutions of nonlinear periodic Schr¨odinger equa-
1311
+ tions in a degenerate setting. Commun. Contemp. Math. 7 (2005), no. 3, 269–298.
1312
+ [3] Berezin, F. A.; Shubin, M. A.: The Schr¨odinger equation. Mathematics and its Applications
1313
+ (Soviet Series), 66. Kluwer Academic Publishers Group, Dordrecht, 1991.
1314
+ 15
1315
+
1316
+ [4] Bonheure, Denis; F¨oldes, Juraj; Moreira dos Santos, Ederson; Salda˜na, Alberto; Tavares,
1317
+ Hugo: Paths to uniqueness of critical points and applications to partial differential equations.
1318
+ Trans. Amer. Math. Soc. 370 (2018), no. 10, 7081–7127.
1319
+ [5] Byeon, Jaeyoung; Sato, Yohei; Wang, Zhi-Qiang: Pattern formation via mixed attractive and
1320
+ repulsive interactions for nonlinear Schr¨odinger systems. J. Math. Pures Appl. (9) 106 (2016),
1321
+ no. 3, 477–511.
1322
+ [6] Chen, Haixia; Pistoia, Angela; Vaira, Giusi:
1323
+ Segregated solutions for some non-linear
1324
+ Schr¨odinger systems with critical growth. Discrete Contin. Dyn. Syst. 43 (2023), no. 1, 482–506.
1325
+ [7] Cherrier, Pascal; Milani, Albert: Linear and quasi-linear evolution equations in Hilbert spaces.
1326
+ Graduate Studies in Mathematics, 135. American Mathematical Society, Providence, RI, 2012.
1327
+ [8] Clapp, M´onica; Pistoia, Angela: Fully nontrivial solutions to elliptic systems with mixed
1328
+ couplings. Nonlinear Anal. 216 (2022), Paper No. 112694, 19 pp.
1329
+ [9] Clapp, M´onica;
1330
+ Pistoia, Angela:
1331
+ Pinwheel solutions to Schr¨odinger systems. Preprint
1332
+ arXiv:2301.07000.
1333
+ [10] Clapp, M´onica; Soares, Mayra: Coupled and uncoupled sign-changing spikes of singularly
1334
+ perturbed elliptic systems, Commun. Contemp. Math. (2022), Paper No. 2250048, 24 pp.
1335
+ [11] Clapp, M´onica; Soares, Mayra: Energy estimates for seminodal solutions to an elliptic system
1336
+ with mixed couplings. NoDEA Nonlinear Differential Equations Appl. 30 (2023), no. 1, Paper
1337
+ No. 11.
1338
+ [12] Dovetta, Simone; Pistoia, Angela: Solutions to a cubic Schr¨odinger system with mixed attrac-
1339
+ tive and repulsive forces in a critical regime. Math. Eng. 4 (2022), no. 4, Paper No. 027, 21
1340
+ pp.
1341
+ [13] Esry, B. D.; Greene, Chris H.; Burke, Jr., James P.; Bohn, John L: Hartree-Fock theory for
1342
+ double condensates. Phys. Rev. Lett. 78 (1997), 3594-3597.
1343
+ [14] Gilbarg, David; Trudinger, Neil S.: Elliptic partial differential equations of second order.
1344
+ Grundlehren der Mathematischen Wissenschaften, Vol. 224. Springer-Verlag, Berlin-New York,
1345
+ 1977.
1346
+ [15] Han, Qing: Nonlinear elliptic equations of the second order. Graduate Studies in Mathematics,
1347
+ 171. American Mathematical Society, Providence, RI, 2016.
1348
+ [16] Kesavan, S.: Topics in functional analysis and applications. John Wiley & Sons, Inc., New
1349
+ York, 1989.
1350
+ [17] Peng, Shuangjie; Wang, Zhi-Qiang: Segregated and synchronized vector solutions for nonlinear
1351
+ Schr¨odinger systems. Arch. Ration. Mech. Anal. 208 (2013), no. 1, 305–339.
1352
+ [18] Rabier, Patrick J.; Stuart, Charles A.: Exponential decay of the solutions of quasilinear second-
1353
+ order equations and Pohozaev identities. J. Differential Equations 165 (2000), no. 1, 199–234.
1354
+ 16
1355
+
1356
+ [19] Sato, Yohei; Wang, Zhi-Qiang: Least energy solutions for nonlinear Schr¨odinger systems with
1357
+ mixed attractive and repulsive couplings. Adv. Nonlinear Stud. 15 (2015), no. 1, 1–22.
1358
+ [20] Sato, Yohei; Wang, Zhi-Qiang: Multiple positive solutions for Schr¨odinger systems with mixed
1359
+ couplings. Calc. Var. Partial Differential Equations 54 (2015), no. 2, 1373–1392.
1360
+ [21] Soave, Nicola: On existence and phase separation of solitary waves for nonlinear Schr¨odinger
1361
+ systems modelling simultaneous cooperation and competition. Calc. Var. Partial Differential
1362
+ Equations 53 (2015), no. 3-4, 689–718.
1363
+ [22] Soave, Nicola; Tavares, Hugo: New existence and symmetry results for least energy positive
1364
+ solutions of Schr¨odinger systems with mixed competition and cooperation terms. J. Differential
1365
+ Equations 261 (2016), no. 1, 505–537.
1366
+ [23] Tavares, Hugo; You, Song: Existence of least energy positive solutions to Schr¨odinger systems
1367
+ with mixed competition and cooperation terms: the critical case. Calc. Var. Partial Differential
1368
+ Equations 59 (2020), no. 1, Paper No. 26, 35 pp.
1369
+ [24] Tavares, Hugo; You, Song; Zou, Wenming:
1370
+ Least energy positive solutions of critical
1371
+ Schr¨odinger systems with mixed competition and cooperation terms: the higher dimensional
1372
+ case. J. Funct. Anal. 283 (2022), no. 2, Paper No. 109497, 50 pp.
1373
+ [25] Villavert, John: Elementary theory and methods for elliptic partial differential equations.
1374
+ Lecture Notes. University of Texas, 2015.
1375
+ [26] Wei, Juncheng; Wu, Yuanze: Ground states of nonlinear Schr¨odinger systems with mixed
1376
+ couplings. J. Math. Pures Appl. (9) 141 (2020), 50–88.
1377
+ 17
1378
+
HtFIT4oBgHgl3EQfXys9/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
IdAzT4oBgHgl3EQfU_z6/content/tmp_files/2301.01278v1.pdf.txt ADDED
@@ -0,0 +1,1460 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ AE
2
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
3
+ Performance Analysis
4
+
5
+ 496
6
+ Amfiteatru Economic
7
+ STUDENTS’ PERCEPTIONS OF SUSTAINABLE UNIVERSITIES
8
+ IN HUNGARY: AN IMPORTANCE-PERFORMANCE ANALYSIS
9
+
10
+ Szabolcs Nagy1* and Mariann Veresné Somosi2
11
+ 1)2) University of Miskolc, Miskolc, Hungary
12
+
13
+
14
+
15
+ Please cite this article as:
16
+ Nagy, S. and Somosi, M.V., 2020. Students’
17
+ Perceptions of Sustainable Universities in Hungary:
18
+ An Importance-Performance Analysis. Amfiteatru
19
+ Economic, 22(54), pp. 496-515.
20
+
21
+ DOI: 10.24818/EA/2020/54/496
22
+
23
+ Article History
24
+ Received: 29 December 2019
25
+ Revised: 3 February 2020
26
+ Accepted: 30 March 2020
27
+
28
+ Abstract
29
+ In order to succeed, universities are forced to respond to the new challenges in the rapidly
30
+ changing world. The recently emerging fourth-generation universities should meet
31
+ sustainability objectives to better serve their students and their communities. It is essential
32
+ for universities to measure their sustainability performance to capitalise on their core
33
+ strengths and to overcome their weaknesses. In line with the stakeholder theory, the
34
+ objective of this study was to investigate students’ perceptions of university sustainability
35
+ including their expectations about and satisfaction with the efforts that universities make
36
+ towards sustainability. This paper proposes a new approach that combines the sustainable
37
+ university scale, developed by the authors, with the importance-performance analysis to
38
+ identify key areas of university sustainability. To collect data, an online survey was
39
+ conducted in Hungary in 2019. The sustainable university scale was found to be a reliable
40
+ construct to measure different aspects of university sustainability. Results of the
41
+ importance-performance analysis suggest that students consider Hungarian universities
42
+ unsustainable. Research findings indicate that Hungarian universities perform poorly in
43
+ sustainable purchasing and renewable energy use, but their location and their efforts
44
+ towards separate waste collection are their major competitive advantages. The main
45
+ domains of university sustainability were also discussed. This study provides university
46
+ decision-makers and researchers with insightful results supporting the transformation of
47
+ traditional universities into sustainable, fourth-generation higher education institutions.
48
+
49
+ Keywords: sustainable university, students’ perception, importance-performance analysis,
50
+ Hungary, student satisfaction, student expectation
51
+
52
+ JEL Classification: I23, Q56
53
+
54
+
55
+
56
+ * Corresponding author, Szabolcs Nagy – nagy.szabolcs@uni-miskolc.hu
57
+
58
+
59
+ Sustainable University
60
+ AE
61
+
62
+ Vol. 22 • No. 54 • May 2020
63
+ 497
64
+ Introduction
65
+ We live in the age of rapid changes to which higher education institutions should adopt. A
66
+ university that wants to succeed needs to respond to the challenges of the new era. One of
67
+ them is the urgency to meet sustainability objectives (Filho, Manolas and Pace, 2015; Soini,
68
+ et al., 2018; Olalla and Merino, 2019). Universities are undergoing a rapid transformation
69
+ as they are not only traditionally engaged in education but are also playing an increasingly
70
+ important role in the society (Papp-Váry and Lukács, 2019). Nowadays, the emergence of
71
+ the so-called Fourth Generation universities, which actively shape their socio-economic
72
+ environment, can be seen (Pawłowski, 2009; Lukovics and Zuti, 2017).
73
+ The topic of sustainable development is increasingly present among the major concerns of
74
+ the international academic community (Grecu and Ipiña, 2014). Universities must take
75
+ steps to achieve the United Nations Sustainable Development Goals (Paletta, et al., 2019).
76
+ Target 4.7 declares that students have the right to acquire the knowledge and skills needed
77
+ to promote sustainable development (UN, 2019). Globally, the proliferation of the efforts to
78
+ assess universities’ responses to the challenges of sustainability can be seen (Li, Gu and
79
+ Liu, 2018). Adams, Martin, and Boom (2018) draw the attention to the importance of the
80
+ university sustainability culture.
81
+ Adaptation of the stakeholder theory is essential for higher education institutions
82
+ (Mainardes, et al., 2010) as stakeholders can create opportunities for or pose threats to an
83
+ organisation (Chapleo and Sims, 2017). Students as stakeholders have a serious impact on
84
+ the future development of universities (Degtjarjova, Lapina and Freidenfelds, 2018).
85
+ Commitment to sustainability of leaders and important stakeholders play a key role in the
86
+ effectiveness of sustainable development initiatives in higher education institutions
87
+ (Wright, 2010.)
88
+ The position of Hungarian higher education institutes in the world rankings is not very
89
+ favourable. The best Hungarian university can be found around the 500th place in global
90
+ rankings. There are only seven or eight Hungarian institutions that are ranked at all
91
+ (Polónyi and Kozma, 2019). The weak performance of the Hungarian higher education
92
+ institutions in sustainability rankings explains the need for a comprehensive analysis of
93
+ university sustainability in Hungary from the students as stakeholders’ perspective, which
94
+ is one of the main objectives of this study.
95
+ Students as stakeholders form expectations regarding university sustainability not only
96
+ generally, but also very specifically, and how those expectations are met determines the
97
+ level of their satisfaction. This study aims to investigate student expectations about and
98
+ satisfaction with the attributes of the sustainable university by using the sustainable
99
+ university scale (SUS) combined with the importance-performance analysis (IPA). SUS,
100
+ the items of which are the determinants of university sustainability, was developed by the
101
+ authors. IPA has been widely used to examine the relationship between importance,
102
+ performance, and satisfaction in many areas (Yuvinatileng, et al., 2013; Wyród-Wróbel and
103
+ Biesok, 2017, Kim, et al., 2018) However, no previous study has investigated it in the
104
+ context of university sustainability in spite of the fact that universities should use
105
+ managerial tools to develop their sustainability strategy. This study seeks to address this
106
+ research gap.
107
+
108
+
109
+ AE
110
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
111
+ Performance Analysis
112
+
113
+ 498
114
+ Amfiteatru Economic
115
+ 1. Literature review
116
+ 1.1. Perceptions of the sustainable university
117
+ In the UI GreenMetric World University Ranking 2019, which provides information about
118
+ the current conditions and policies related to Green Campus and Sustainability, only seven
119
+ Hungarian universities can be found. The University of Szeged is in the best position,
120
+ ranked first in Hungary, and 74th in the world. It is followed by the University of Pecs,
121
+ ranked 100th globally and the University of Debrecen, in the 202nd position in the world
122
+ ranking. The University of Miskolc, for which the authors work, can be found only in the
123
+ 605th place in this ranking of 780 universities globally (Greenmetric, 2019). Students’
124
+ perceptions of university sustainability were assumed to be in line with this poor ranking
125
+ performance. It is therefore hypothesized that students are not satisfied with the
126
+ sustainability performance of the Hungarian higher education institutions (H1). Mention
127
+ must be made of some of the shortcomings of the GreenMetric Ranking, i.e. non-
128
+ compliance with the Berlin Principles (Ragazzi and Ghidini, 2017), however, it is still one
129
+ of the best tools to quantify university sustainability.
130
+ The perceptions of university students towards factors of a sustainable university was first
131
+ discussed by Nejati and Nejati (2013). The authors developed a reliable scale to assess the
132
+ university practices towards sustainability. They identified four main dimensions of the
133
+ sustainable university scale, which are respectively: 1) community outreach, 2)
134
+ sustainability commitment and monitoring, 3) waste and energy, and 4) land use and
135
+ planning. Their initial scale contained 28 items, which they reduced to a 12-item scale,
136
+ which could be a key instrument for university decision-makers and stakeholders to
137
+ measure the university’s performance regarding the implementation of the transition
138
+ strategy towards sustainability. Their construct measuring sustainability practices of
139
+ universities contains 1) community outreach programs; 2) green community centres; 3)
140
+ partnerships with government, non-governmental organizations, and industry working
141
+ toward sustainability; 4-5) written commitment to sustainability (university and department
142
+ level); 6-7) sustainability audits on the surrounding community and on campus; 8) reuse of
143
+ campus waste; 9) use of renewable and safe energy sources; 10) sustainable support
144
+ services (e.g. recycling bins on campus, efficient public transport throughout the
145
+ university); 11) sustainable campus building planning and 12) sustainable campus land-use.
146
+ Dagiliute, Liobikiene and Minelgaite (2018) were the first to investigate the differences in
147
+ the perceived sustainability performance between the ‘green’ and the ‘non-green’
148
+ universities. They compared the students' attitudes towards sustainability in two Lithuanian
149
+ universities. They did not find any significant differences in sustainability aspects in
150
+ general, however, students of the green university sought more information about
151
+ sustainability and were more often involved in sustainability activities. They also found that
152
+ campus sustainability and environmental information have a significant impact on students’
153
+ sustainable behaviour. In their study, they used a scale to measure perceptions made up of
154
+ 16 items, grouped into four main constructs: 1) ‘campus sustainability’, 2) ‘environmental
155
+ information’, 3) ‘students’ sustainability involvement’, and 4) ‘university's role in
156
+ sustainable development. The item ‘university's self-representation as a green university’
157
+ was also involved in their construct. Their 17-item scale involves 1) environmental student
158
+ organization(s); 2) use of public transport, bikes; 3) possibility to recycle waste at the
159
+ university; 4) use one's own non-disposable cup; 5) availability of strategic documents and
160
+ their implementation reports; 6) sustainability-related information during lectures;
161
+
162
+ Sustainable University
163
+ AE
164
+
165
+ Vol. 22 • No. 54 • May 2020
166
+ 499
167
+ 7) university website on environmental objectives; 8) participation in environmental, social
168
+ activities; 9) involvement in activities at the university; 10) energy and resource saving;
169
+ 11) contribution to social well-being, tolerance; 12) environmental education; 13)
170
+ cooperation with other national and foreign universities and businesses; 14) inclusion of
171
+ sustainability aspects in study programmes; 15) sustainability research; 16) university's
172
+ self-representation as a green university; and 17) declared environmental objectives. They
173
+ found that students considered social aspects, i.e. social well-being, tolerance the most
174
+ important attribute of the sustainable university. However, students considered
175
+ environmental aspects, such as energy saving, environmental education, and actions less
176
+ important.
177
+ Li, Gu and Liu (2018) established a new scoring system for campus sustainability in
178
+ Australia. They suggest that sustainable campus performance indicators should be
179
+ identified from the different perspectives of the economy, environment and society. In
180
+ order to identify and prioritise the key sustainability indicators for university campuses,
181
+ they proposed a new approach combining the qualitative scoring method and an analytical
182
+ hierarchical process. After thorough literature review, they identified 54 indicators and
183
+ quantified the weight coefficients for the criteria, sub-criteria and elements, and proposed a
184
+ model that can be a flexible tool for university decision-makers.
185
+ It is hypothesized that combining the most relevant items of the constructs developed by
186
+ Nejati and Nejati (2013), Dagiliute, Liobikiene and Minelgaite (2018) and Li, Gu and Liu
187
+ (2018), a new, reliable scale to measure perceived university sustainability, i.e. the
188
+ sustainable university scale, can be developed (H2).
189
+ Shuqin, et al. (2019) aimed to assess and compare the sustainability performance of
190
+ different Chinese universities. The authors developed a campus sustainability evaluation
191
+ system that is made up of the five main domains of campus sustainability, which are
192
+ respectively: organization and management, energy and resource saving, friendly
193
+ environment, campus culture, and social outreach. Their evaluation system included 14
194
+ mandatory indicators and 69 optional indicators. They found that the most problematic
195
+ fields are organization management, resource saving and campus culture. For example,
196
+ there are issues with green education, green research and green humanities as they are not
197
+ so developed there. The assessment tool proposed by the authors can be used to guide the
198
+ green campus revolution in China and could be adopted by the rest of the world.
199
+ Wakkee, et al. (2019) demonstrated how (entrepreneurial) universities can drive regional
200
+ sustainable development in developing countries. They found that local campus leadership,
201
+ a holistic teaching and research programme, and student involvement can have significant
202
+ local effects.
203
+ 1.2. Importance-Performance Analysis (IPA)
204
+ The importance-performance analysis (IPA) was developed by Martilla and James (1977).
205
+ The original version of IPA defines consumer satisfaction as the function of two
206
+ components that are respectively: the importance of an attribute of the product/service, and
207
+ the perceived performance of the company on this attribute. The mean of importance and
208
+ performance ratings of each attribute determines its position on the importance-
209
+ performance matrix or grid, which is also often called the Cartesian diagram (Figure no. 1).
210
+ The overall mean of the performance/importance ratings is used as a delimiter of high and
211
+ low performance/importance (Yuvinatileng, Utomo and Latuperissa, 2013).
212
+
213
+ AE
214
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
215
+ Performance Analysis
216
+
217
+ 500
218
+ Amfiteatru Economic
219
+ The 2x2 IPA matrix can be divided into four quadrants. Each quadrant requires a different
220
+ approach and strategy (Wyród-Wróbel and Biesok, 2017):
221
+  Quadrant 1: Keep up the good work. This is the best possible position for an attribute.
222
+ This quadrant contains the competitive advantages and major strengths of a company. The
223
+ organization must defend all of them to succeed. These are high importance/high
224
+ performance items.
225
+
226
+
227
+ Figure no. 1: The modified Importance Performance Matrix
228
+ Source: Kim, Jeon, Cho and Kim, 2018.
229
+
230
+  Quadrant 2: The territory of Possible overkill. Here low importance/high performance
231
+ attributes, i.e. items of overperformance, can be found. Organizations should deploy
232
+ business resources used here somewhere else (e.g. in Quadrant 1) or should increase the
233
+ importance of those attributes that can be found here to turn them into competitive
234
+ advantages.
235
+  Quadrant 3: The area of Low priority. Low importance/low performance attributes can
236
+ be seen here. Those are minor weaknesses that require no additional resources.
237
+ Organizations are suggested to avoid investing in this quadrant.
238
+  Quadrant 4: Concentrate here. High importance/low performance attributes can be
239
+ found here. Those are the major weaknesses of an organization that require immediate
240
+ corrective actions to increase consumer satisfaction and to avoid customer churn.
241
+ 1.3. Stakeholder theory
242
+ The stakeholder theory originates from the 1980s. Freeman (1984) was the first to coin the
243
+ phrase as an opposite to the shareholder theory or Friedman’s doctrine, which suggests that a
244
+ company’s sole responsibility is to make money for its shareholders (Friedman, 1965).
245
+
246
+ High
247
+ Quadrant 2
248
+ Quadrant1
249
+ Possible overkill
250
+ Keep up the good work
251
+ Performance
252
+ Quadrant3
253
+ Quadrant 4
254
+ Low priority
255
+ Concentrate here
256
+ Low
257
+ Low
258
+ Importance
259
+ HighSustainable University
260
+ AE
261
+
262
+ Vol. 22 • No. 54 • May 2020
263
+ 501
264
+ According to the stakeholder theory, shareholders are only one of many stakeholders in a
265
+ company, and an organization’s key to market success is how it satisfies all the stakeholders,
266
+ not only its shareholders (Freeman, 2010). The stakeholder theory says that the stakeholder
267
+ ecosystem is made up of all parties that invested and involved in, or affected by, the company.
268
+ Therefore, companies must pay special attention to their employees, vendors, suppliers,
269
+ owners, community/neighbours, community groups, competitors, governmental bodies,
270
+ oversight organizations and the local ecology (Freeman, 2010).
271
+ The stakeholder theory is intertwined with the domains of ethics and sustainability. Carroll and
272
+ Buchholtz (2014) suggest that successful businesses in society adopt a stakeholder
273
+ management approach. The stakeholder theory is solid ground for corporate social
274
+ responsibility and business ethics inside the company (Kakabadse, Rozules and Davies, 2005).
275
+ The stakeholder ecosystem of a university comprises current, former (alumni) and potential
276
+ students, parents, municipalities, academics, faculties, management (Rector, the Senate,
277
+ Chancellor), administrative staff, governmental organisations, Academy of Sciences,
278
+ research partners and companies. In higher education institutions, students and employees
279
+ are always the major stakeholders in terms of their number. According to the stakeholder
280
+ theory, universities are service providers to students and students are one of the most
281
+ important stakeholders (Degtjarjova, Lapina, and Freidenfelds, 2018). The more satisfied
282
+ students are, the more likely it is that the university could succeed, also in the field of
283
+ sustainability. It is therefore assumed that IPA as a strategic tool should be used to
284
+ maximize student satisfaction with the efforts that universities make towards sustainability.
285
+
286
+ 2. Methodology
287
+ 2.1. Methodology and research questions
288
+ Based on the literature review presented above, and in line with the main objectives of the
289
+ research, this study aims to address the following research questions respectively:
290
+  R1: What are the student expectations about university sustainability in Hungary?
291
+ (student expectations)
292
+  R2: To what extent are students satisfied with the sustainability performance of
293
+ universities? (student satisfaction). H1 refers to this question.
294
+  R3: Is combining sustainable university scale (SUS) with importance-performance
295
+ analysis (IPA) a powerful strategic tool for university decision-makers to identify key areas
296
+ of university sustainability?
297
+  R4: What are the main components of the perceived university sustainability?
298
+  R5: Is sustainable university scale (SUS) a reliable construct to measure students’
299
+ perceptions of university sustainability? H2 refers to this question.
300
+ In line with the research questions, the following hypotheses were developed:
301
+  H1: Students are not satisfied with the sustainability performance of the Hungarian
302
+ higher education institutions.
303
+
304
+ AE
305
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
306
+ Performance Analysis
307
+
308
+ 502
309
+ Amfiteatru Economic
310
+  H2: Combining the most relevant items of the constructs developed by Nejati and
311
+ Nejati (2013), Dagiliute, Liobikiene and Minelgaite (2018) and Li, Gu and Liu (2018), a
312
+ new, reliable scale for measuring perceived university sustainability, i.e. the Sustainable
313
+ University Scale (SUS), can be developed.
314
+ To answer the research questions, and to thoroughly investigate students’ perceptions of the
315
+ sustainable university, a questionnaire made up of 47 questions grouped into three sections
316
+ were designed:
317
+  Section 1: Importance of the sustainable university scale (SUS) items. It contains 21
318
+ statements measured on a five-point importance scale (1. not at all important … 5. very
319
+ important). Respondents were asked to answer the following question: “How important are
320
+ the followings to you regarding a sustainable university?”. SUS items can be seen in Table
321
+ no. 1.
322
+  Section 2: Perceived performance of the sustainable university scale (SUS) items: The
323
+ very same 21 statements as in Section 1, measured on a five-point rating scale (1 – very
324
+ poor ... 5 – excellent), answering the question “How do you rate the sustainability
325
+ performance of your university?”.
326
+  Section 3: Demographic variables. It contains 5 questions including gender, age,
327
+ study level, branch of sciences and the university where they study (Table no. 2).
328
+ The sustainable university scale (SUS), which contains 21 items, is a construct developed
329
+ by the authors. It is based on the domains of university sustainability discussed in the
330
+ literature review. More specifically, in our construct we combined 9 items (item 4, 5, 7, 9,
331
+ 10, 15, 17, 18 and 20) from Dagiliute, Liobikiene and Minelgaite (2018) with 9 items (item
332
+ 1, 3, 6, 7, 8, 11, 13, 14 and 16) used by Nejati and Nejati (2013), with 3 items (item 9, 11
333
+ and 16) from Li, Gu and Liu (2018). It must be noted that four items are overlapping. They
334
+ were found in not only one but two of the three reference studies (item 7, 9, 11 and 16).
335
+ Moreover, we added four new items to SUS (item 2, 12, 19 and 21). The newly added items
336
+ are 1) the awareness of the sustainability strategy of the university; 2) green location; 3) the
337
+ inclusion of sustainability information into normal courses and 4) the integration of
338
+ sustainability research results into the curricula. The sustainable university scale makes it
339
+ possible that university decision-makers could gain deep insight into how students perceive
340
+ their efforts towards sustainability.
341
+ Eight of 21 items were used without any modifications in its original form (referred as
342
+ ‘original’), nine items were modified to be unambiguous (referred to as ‘revised’), and the
343
+ four new items that we added are labelled as ‘New’ (Table no 1.).
344
+ Table no. 1: The items of the sustainable university scale (SUS)
345
+
346
+ Sustainable university scale items
347
+ S*
348
+ Type
349
+ 1
350
+ The university has a sustainability strategy
351
+ 2
352
+ R
353
+ 2
354
+ All the students, researchers, academic and non-academic staff are
355
+ aware of the sustainability strategy of the university
356
+ 4
357
+ N
358
+ 3
359
+ Regular sustainability audits are performed on campus
360
+ 2
361
+ O
362
+ 4
363
+ Sustainability information is readily available on the university's
364
+ website, newsletter, Neptun messages, etc.
365
+ 1
366
+ R
367
+
368
+ Sustainable University
369
+ AE
370
+
371
+ Vol. 22 • No. 54 • May 2020
372
+ 503
373
+
374
+ Sustainable university scale items
375
+ S*
376
+ Type
377
+ 5
378
+ The university distinguishes itself as sustainable/green from other
379
+ higher education institutions.
380
+ 1
381
+ R
382
+ 6
383
+ The university established environmentally and socially responsible
384
+ purchasing practices
385
+ 2
386
+ O
387
+ 7
388
+ Separate waste collection is possible on campus, and the university
389
+ encourages everyone to do so.
390
+ 1, 2
391
+ R
392
+ 8
393
+ The university uses renewable energy sources (e.g. solar panels).
394
+ 2
395
+ O
396
+ 9
397
+ The university saves water and energy (e.g. LED lighting)
398
+ 1, 3
399
+ R
400
+ 10
401
+ The university encourages use of public transport, bikes.
402
+ 1
403
+ O
404
+ 11
405
+ The university buildings are designed / converted in an energy
406
+ efficient and sustainable way (e.g. windows, doors, insulation)
407
+ 2, 3
408
+ R
409
+ 12
410
+ The university buildings are located in a natural setting (quiet,
411
+ green area with many trees where the air quality is excellent)
412
+ 4
413
+ N
414
+ 13
415
+ The university engages in community outreach programs that
416
+ benefit the local environment.
417
+ 2
418
+ O
419
+ 14
420
+ The university has created partnerships with government, non-
421
+ governmental organizations, and industry working toward
422
+ sustainability.
423
+ 2
424
+ O
425
+ 15
426
+ The university has active environmental student organization(s)
427
+ 1
428
+ O
429
+ 16
430
+ There are many green actions, projects running / available at the
431
+ university to support the achievement of sustainability goals
432
+ 2, 3
433
+ R
434
+ 17
435
+ The university offers a lot of study programmes related to
436
+ sustainability.
437
+ 1
438
+ R
439
+ 18
440
+ The university offers a lot of subjects/courses related to
441
+ sustainability.
442
+ 1
443
+ R
444
+ 19
445
+ There is also a lot of information about sustainability in normal
446
+ courses
447
+ 4
448
+ N
449
+ 20
450
+ The university promotes sustainability research
451
+ 1
452
+ O
453
+ 21
454
+ Sustainability research results are integrated into the curricula
455
+ 4
456
+ N
457
+ Notes: S* (Source) = 1: Dagiliute, Liobikiene and Minelgaite (2018); 2: Nejati and Nejati (2013); 3:
458
+ Li, Gu and Liu (2018); 4: New variables added by the authors.
459
+ Type = N: new, O: original, R: revised.
460
+ An online survey, designed in Google Form, was conducted to collect data in October and
461
+ November 2019. Current student status (ongoing studies) was the one and only eligibility
462
+ criterion for students to participate in the study. Convenience sampling method was used.
463
+ Students of nine Hungarian universities located in different regions of Hungary were asked
464
+ to fill in the online questionnaire. The internal messaging systems of the universities were
465
+ used to reach their students. Due to the low response rate, the sample size is 297.
466
+ SPSS 24 was used for data analysis (Babbie, Wagner and Zaino, 2019), and MS Excel for
467
+ data visualisation (Walkenbach, 2016). Means were calculated to quantify the importance
468
+ (R1) and performance (R2) of each item of the sustainable university scale. Importance-
469
+ performance matrix was drawn to illustrate the position of SUS items to answer R3 (Kim et
470
+ al., 2018.). To answer R4, Principle Component Analysis was run to understand patterns in
471
+
472
+ AE
473
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
474
+ Performance Analysis
475
+
476
+ 504
477
+ Amfiteatru Economic
478
+ SUS items (Jolliffe, 2011). The reliability of the sustainable university scale (SUS) was
479
+ measured by Cronbach's alpha to answer R5 (DeVellis, 2017). Frequency tables of
480
+ demographic variables were also calculated (Babbie, Wagner and Zaino, 2019).
481
+ 2.2. The sample
482
+ Of the sample of 297 respondents, 61.3% was female, 38.7% male (Table no. 2). Mostly
483
+ undergraduate students (77.1%) participated in this study, however some graduate students
484
+ (16.8%) and doctoral students (6.1%) contributed to the survey. The majority of the
485
+ respondents (54.2%) fell into the category ‘aged 18-24’. Most of the students in the sample
486
+ study social sciences (51.1%), engineering (23.9%) or humanities (13.87%). A significant
487
+ part of them study in Miskolc (75.4%), the rest (24.6%) in other Hungarian universities.
488
+ Therefore, this convenience sample is not representative, which is a limitation of this study.
489
+ Table no. 2: Distribution of demographic variables (N=297)
490
+ Demographic variables
491
+ Values
492
+ Frequency
493
+ Percent
494
+ Gender
495
+ male
496
+ 115
497
+ 38.7
498
+
499
+ female
500
+ 182
501
+ 61.3
502
+ Study level
503
+ bachelor
504
+ 229
505
+ 77.1
506
+
507
+ master
508
+ 50
509
+ 16.8
510
+
511
+ PhD
512
+ 18
513
+ 6.1
514
+ Age
515
+ 18-24
516
+ 161
517
+ 54.2
518
+
519
+ 25-31
520
+ 60
521
+ 20.2
522
+
523
+ 32-38
524
+ 29
525
+ 9.8
526
+
527
+ 39-45
528
+ 27
529
+ 9.1
530
+
531
+ 46-
532
+ 20
533
+ 6.7
534
+ Branch of science
535
+ agricultural sciences
536
+ 2
537
+ 0.7
538
+
539
+ arts
540
+ 4
541
+ 1.3
542
+
543
+ engineering
544
+ 71
545
+ 23.9
546
+
547
+ humanities
548
+ 41
549
+ 13.8
550
+
551
+ medicine
552
+ 19
553
+ 6.4
554
+
555
+ natural sciences
556
+ 7
557
+ 2.4
558
+
559
+ social sciences
560
+ 153
561
+ 51.5
562
+ University
563
+ Corvinus University
564
+ 2
565
+ 0.7
566
+
567
+ Eszterhazy Uni. Eger
568
+ 14
569
+ 4.7
570
+
571
+ METU Budapest
572
+ 3
573
+ 1.0
574
+
575
+ National Uni. of Public Service
576
+ 2
577
+ 0.7
578
+
579
+ Szechenyi Uni. Gyor
580
+ 7
581
+ 2.4
582
+
583
+ University of Miskolc
584
+ 224
585
+ 75.4
586
+
587
+ University of Pannonia
588
+ 27
589
+ 9.1
590
+
591
+ University of Pecs
592
+ 15
593
+ 5.1
594
+
595
+ University of Szeged
596
+ 3
597
+ 1.0
598
+
599
+
600
+ Sustainable University
601
+ AE
602
+
603
+ Vol. 22 • No. 54 • May 2020
604
+ 505
605
+
606
+ 3. Results and discussion
607
+ This chapter is divided into five main sections, and each of them discusses the results
608
+ related to one of the research questions.
609
+ 3.1. Importance of the sustainable university scale items (student expectations)
610
+ In order to answer the first research question (R1), and to investigate student expectations
611
+ about university sustainability in Hungary, the items of SUS were measured on a five-point
612
+ importance scale. The lowest value (1) means the item is not at all important, whereas the
613
+ highest value (5) indicates the item is very important. The importance of SUS items refers
614
+ to the students’ expectations regarding university sustainability. It expresses their opinion
615
+ on what a university should do in order to be sustainable.
616
+ It was found that the opportunity for separate waste collection on campus and
617
+ encouragement of this activity by the university is the most important attribute of university
618
+ sustainability (4.54), whereas regular sustainability audits performed on campus is the least
619
+ important for university students (3.51). They consider water and energy savings (e.g. the
620
+ use of LEDs) as well as sustainable university buildings that are designed or converted in
621
+ an energy efficient and sustainable way (e.g. windows, doors, insulation) extremely
622
+ important (4.43).
623
+ If a university intends to be more sustainable, it must make efforts to provide the necessary
624
+ infrastructure for sperate waste collection and promote this activity. The sustainable
625
+ university should save water and energy and invest in sustainable, energy efficient
626
+ buildings on campus. These findings are not fully consistent with those of Dagiliute,
627
+ Liobikiene and Minelgaite (2018), who found recycling is less important for students.
628
+ It is also crucial for the students that university buildings must be located in a natural
629
+ setting, e.g. in a quiet, green area with many trees where the air quality is excellent (4.39).
630
+ Students, therefore, expect sustainable universities not only to be green, but to be located in
631
+ a green environment. For the most important stakeholders, it is also essential that the
632
+ sustainable university should use renewable energy sources, e.g. solar panels (4.35), it has a
633
+ sustainability strategy (4.1) and promotes sustainability research (4.07).
634
+ It was also found that students think it important that the sustainable university carries out
635
+ environmentally and socially responsible purchasing practices (4.0) and encourages the use
636
+ of public transport, bikes (4.0). In a sustainable university, it is important that all the
637
+ students, researchers, academic and non-academic staff should be aware of the
638
+ sustainability strategy of the university (3.95) and sustainability information should be
639
+ readily available on the university’s website, newsletters, etc. (3.94), as well as the
640
+ university should create partnerships with government, non-governmental organizations,
641
+ and industry working toward sustainability (3.94). Green actions and projects (3.9) and
642
+ community outreach programs (3.89) were found to be even less important.
643
+ The existence of environmental student organization(s) (3.76), the integration of
644
+ sustainability research results into the curricula (3.72) as well as sustainability-focused
645
+ positioning, when the university distinguishes itself as sustainable/green from other higher
646
+ education institutions (3.71) are even less central for the students. There is only moderate
647
+ demand for subjects/courses about sustainability (3.71) Students do not require that a lot of
648
+
649
+ AE
650
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
651
+ Performance Analysis
652
+
653
+ 506
654
+ Amfiteatru Economic
655
+ information about sustainability should be integrated into normal courses (3.61) or the
656
+ university should offer a lot of study programmes related to sustainability issues (3.6).
657
+ These results match those observed in earlier studies (Dagiliute, Liobikiene and Minelgaite,
658
+ 2018). The overall mean of the importance items is 3.98. (Table no. 3.)
659
+ 3.2. Perceived performance of the sustainable university items (student satisfaction)
660
+ In order to answer the second research question (R2), and to find out to what extent
661
+ students are satisfied with the performance of the Hungarian universities towards
662
+ sustainability, students were asked to rate the performance of the universities on a five-
663
+ point rating scale. The lowest score (1) indicates very poor rating (dissatisfaction), whereas
664
+ the highest score (5) means excellent rating (very high satisfaction). The rating scores of the
665
+ sustainable university scale items refer to how students are satisfied with the sustainability
666
+ performance of the university where they study. It expresses their opinion on how
667
+ sustainable the university is perceived regarding each attribute (item) of the sustainable
668
+ university scale. It allows decision-makers to get more insight into how their efforts
669
+ towards sustainability are seen by their students, their most important stakeholders.
670
+ As far as the perceived sustainability performance of the Hungarian universities is
671
+ concerned, their overall performance rating is only 3.23, which means that that students are
672
+ not satisfied with it and consider Hungarian universities unsustainable (Table no. 3). These
673
+ results provide support for the first hypothesis (H1), therefore it has been accepted.
674
+ Students are most satisfied with the location of the university buildings, the rating of which
675
+ is very good (4.17). It suggests that Hungarian universities have preferred locations that are
676
+ mostly situated in quiet, green areas with many trees where the air quality is excellent. This
677
+ could be a strength they capitalise on. Student are also satisfied with the separate waste
678
+ collection opportunities on campus (3.7), community outreach programs benefiting the
679
+ local environment (3.5) and the promotion of sustainability research (3.47). Students are
680
+ somewhat satisfied with the efforts made towards sustainability strategy (3.35),
681
+ partnerships with government, non-governmental organizations, and industry working
682
+ towards sustainability (3.34), as well as sustainable university buildings (3.33), water and
683
+ energy savings in the university (3.29) and the use of public transport and bikes (3.27).
684
+ However, students are not really satisfied with how much information about sustainability
685
+ is integrated into normal courses (3.14) and the mostly unsustainable purchasing practices
686
+ of universities (3.13). They are not convinced by the green actions/projects (3.12) and the
687
+ integration of sustainability research results into the curricula (3.11).
688
+ Moreover, students think only limited information on sustainability is available for them on
689
+ the website or in the newsletters of the universities (3.08). This is a serious problem as the
690
+ lack of information is usually one of the greatest barriers towards sustainability (Avila et al,
691
+ 2017). Also, students think that they and other important stakeholders (researchers,
692
+ academic and non-academic staff) are not aware of the sustainability strategy of the
693
+ university (3.06), however their participation would be essential in the implementation.
694
+ Students do not think that universities position themselves as sustainable/green (3.03) or
695
+ use solar panels or other renewable energy sources (3.02). They are not content with the
696
+ number of subjects/courses about sustainability (3.0), green/environmental student
697
+ organizations (2.99) and the number of study programmes related to sustainability (2.93).
698
+ Students were found to be the least satisfied with the sustainability audits on campus (2.82).
699
+
700
+ Sustainable University
701
+ AE
702
+
703
+ Vol. 22 • No. 54 • May 2020
704
+ 507
705
+ 3.3. Importance-performance analysis (IPA)
706
+ In this section, in line with research question 3 (R3), it is discussed whether combining the
707
+ sustainable university scale (SUS) with importance-performance analysis (IPA) could be a
708
+ useful strategic tool for university decision-makers to identify key areas of university
709
+ sustainability. In order to determine the position of each item of the sustainable university
710
+ scale in the quadrants of the importance-performance matrix, deviations of the means from
711
+ the overall mean of importance (Δ IMP) and performance (Δ PER) were calculated. Table
712
+ no. 3 shows the results and the position of each item in the quadrants of IPA.
713
+ Seven attributes of the sustainable university scale including location, separate waste
714
+ collection, strategy, energy and water savings, public transport, research and sustainable
715
+ buildings fall into the ‘Keep up the good work” quadrant (Q1), which contains the
716
+ competitive advantages (strengths) of the Hungarian universities with regard to
717
+ sustainability. It is suggested that universities should use all of them in communication
718
+ campaigns targeted at students who are concerned about sustainability.
719
+ Table no. 3: Importance and performance of the sustainable university scale items
720
+
721
+
722
+ IMP
723
+ means
724
+ PER
725
+ means
726
+ Δ IMP
727
+ Δ PER
728
+ Quad-
729
+ rant
730
+ 1
731
+ Sustainability strategy
732
+ 4.10
733
+ 3.35
734
+ 0.12
735
+ 0.12
736
+ Q1
737
+ 2
738
+ Awareness of the sust. strategy
739
+ 3.95
740
+ 3.06
741
+ -0.03
742
+ -0.17
743
+ Q3
744
+ 3
745
+ Sustainability audits
746
+ 3.51
747
+ 2.82
748
+ -0.47
749
+ -0.41
750
+ Q3
751
+ 4
752
+ Sustainability information
753
+ 3.94
754
+ 3.08
755
+ -0.04
756
+ -0.15
757
+ Q3
758
+ 5
759
+ Green positioning
760
+ 3.71
761
+ 3.03
762
+ -0.27
763
+ -0.20
764
+ Q3
765
+ 6
766
+ Green purchasing
767
+ 4.00
768
+ 3.13
769
+ 0.02
770
+ -0.10
771
+ Q4
772
+ 7
773
+ Separate waste collection
774
+ 4.54
775
+ 3.70
776
+ 0.56
777
+ 0.47
778
+ Q1
779
+ 8
780
+ Renewable energy sources
781
+ 4.35
782
+ 3.02
783
+ 0.37
784
+ -0.21
785
+ Q4
786
+ 9
787
+ Water and energy savings
788
+ 4.43
789
+ 3.29
790
+ 0.45
791
+ 0.06
792
+ Q1
793
+ 10
794
+ Public transport, bikes
795
+ 4.00
796
+ 3.27
797
+ 0.02
798
+ 0.04
799
+ Q1
800
+ 11
801
+ Sustainable buildings
802
+ 4.43
803
+ 3.33
804
+ 0.45
805
+ 0.10
806
+ Q1
807
+ 12
808
+ Green location
809
+ 4.39
810
+ 4.17
811
+ 0.41
812
+ 0.94
813
+ Q1
814
+ 13
815
+ Community outreach programs
816
+ 3.89
817
+ 3.50
818
+ -0.09
819
+ 0.27
820
+ Q2
821
+ 14
822
+ Sustainability partnerships
823
+ 3.94
824
+ 3.34
825
+ -0.04
826
+ 0.11
827
+ Q2
828
+ 15
829
+ Green student organization(s)
830
+ 3.76
831
+ 2.99
832
+ -0.22
833
+ -0.24
834
+ Q3
835
+ 16
836
+ Green actions, projects
837
+ 3.90
838
+ 3.12
839
+ -0.08
840
+ -0.11
841
+ Q3
842
+ 17
843
+ Green study programmes
844
+ 3.60
845
+ 2.93
846
+ -0.38
847
+ -0.30
848
+ Q3
849
+ 18
850
+ Green subjects/courses
851
+ 3.71
852
+ 3.00
853
+ -0.27
854
+ -0.23
855
+ Q3
856
+ 19
857
+ Greening normal courses
858
+ 3.61
859
+ 3.14
860
+ -0.37
861
+ -0.09
862
+ Q3
863
+ 20
864
+ Sustainability research
865
+ 4.07
866
+ 3.47
867
+ 0.09
868
+ 0.24
869
+ Q1
870
+ 21
871
+ Sustainability research integration
872
+ 3.72
873
+ 3.11
874
+ -0.26
875
+ -0.12
876
+ Q3
877
+
878
+ Total
879
+ 3.98
880
+ 3.23
881
+
882
+
883
+
884
+ Notes: IMP: importance; PER: performance; Quadrants: (1) Keep up the good work (2) Possible
885
+ overkill (3) Low priority (4) Concentrate here
886
+
887
+
888
+ AE
889
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
890
+ Performance Analysis
891
+
892
+ 508
893
+ Amfiteatru Economic
894
+ Campus location is found to be the biggest strength. The favourable location is very
895
+ important for the students. They require that university buildings should be situated in a
896
+ quiet, green environment, and for most of them, this expectation is fully met. Separate
897
+ waste collection, which is the most important aspect of the sustainable university from the
898
+ students’ perspective, is also a major strength as students are quite satisfied with it.
899
+ Hungarian universities must communicate that they provide the infrastructure for separate
900
+ waste collection and promote this activity.
901
+ Based on our findings, it is advisable for universities to emphasize that their students are
902
+ satisfied with their efforts towards energy and water savings and appreciate their
903
+ endeavours to increase energy efficiency on campus. Also, students are content with how
904
+ sustainable the design of the university buildings is. It can also be suggested that Hungarian
905
+ higher education institutions should communicate that they promote sustainability research,
906
+ encourages the use of public transport, bikes and they have a written sustainability strategy.
907
+ Two items can be found in Q2, which is the possible overkill quadrant. It contains items
908
+ that are not important for the students, however they, the most important stakeholders of the
909
+ universities are satisfied with it (performance ratings are better than the overall average).
910
+ The performance of universities concerning community outreach programs, partnership
911
+ with governmental, non-governmental organizations, and industry is better than required. In
912
+ this case, it is suggested that universities should make a communication campaign to
913
+ increase the importance of their community outreach programs and sustainability
914
+ partnership to turn those activities into competitive advantages.
915
+ Ten items – nearly the half of the sustainable university scale items – can be found in Q3,
916
+ which represents “Low priority” attributes having low importance and low perceived
917
+ performance. The items that fall into this quadrant are respectively: 1) awareness of the
918
+ sustainability strategy; 2) regular sustainability audits; 3) information regarding
919
+ sustainability (website, newsletters, etc.); 4) sustainability-focused positioning of the
920
+ universities; 5) active green student organizations; 6) sustainability-related projects/actions;
921
+ 7) study programs related to sustainability; 8) subjects/courses related to sustainability; 9)
922
+ integration of sustainability into normal/traditional courses; and finally, 10) integration of
923
+ sustainability research results into the curricula. Hungarian universities are strongly advised
924
+ to avoid any investments in those activities.
925
+ Last but not at least, two sustainable university items can be found in Q4. This is the
926
+ “Concentrate here” quadrant representing attributes that universities should immediately
927
+ improve to achieve higher student satisfaction with regard to their attempts to be more
928
+ sustainable. The items listed here have high importance and low perceived performance
929
+ suggesting that students are really dissatisfied with them in spite of the fact that those items
930
+ are really important for them. On the one hand, they do not believe that universities have
931
+ environmentally and socially responsible purchasing practices, on the other hand they are
932
+ disappointed with the use renewable energy sources (e.g. solar panels) on campus. It is
933
+ therefore suggested that universities should concentrate more on green/socially responsible
934
+ procurement and should increase the use of renewable energy sources to make students
935
+ who are concerned about sustainability more satisfied. Universities should consider more
936
+ the sustainability performance of their suppliers. They should be greening their tenders,
937
+ prefer local suppliers, and install more solar panels, etc. (Figure no. 2).
938
+
939
+
940
+ Sustainable University
941
+ AE
942
+
943
+ Vol. 22 • No. 54 • May 2020
944
+ 509
945
+
946
+ Figure no. 2: Importance-performance of the sustainable university scale items
947
+ As no research has been found that surveyed the perceived importance and performance of
948
+ the attributes of university sustainability, it is therefore not possible to compare the results
949
+ discussed here to the findings of previous works. However, this study fills this gap in the
950
+ literature and propose a new methodology to investigate the attributes of university
951
+ sustainability. As an answer to R3, it can be concluded that importance performance
952
+ analysis (IPA) is a strong strategic tool for university decision-makers to identify key areas
953
+ of university sustainability when combined with the sustainable university scale (SUS).
954
+ Using the results of IPA, universities could implement corrective actions to make students
955
+ as stakeholders more satisfied with their efforts to be more sustainable.
956
+ 3.4. Factor analysis of the sustainable university scale items
957
+ In order to investigate patterns in perceived university sustainability, and answer R4, factor
958
+ analysis was used. The dataset of the importance of SUS items were analysed as it refers to
959
+ the students’ expectation. The very high Kaiser-Meyer-Olkin Measure of Sampling
960
+ Adequacy value (KMO=0.938) indicates that a factor analysis is a useful method with our
961
+ data. The Bartlett's Test of Sphericity (Approx. Chi-Square = 4400.484; df = 210; Sig.=
962
+ 0.000) also reconfirms it (Jolliffe, 2011).
963
+ The extraction communalities are acceptable, although the lower values of Green Location
964
+ and Green Positioning show that they don't fit as well as the others. Only three factors in
965
+ the initial solution have eigenvalues greater than 1. Together, they account for almost 65%
966
+ of the variability in the original variables (Table no. 4). This suggests that three latent
967
+ influences are associated with sustainable university perceptions, but there remains room
968
+ for a lot of unexplained variation (Babbie, Wagner and Zaino, 2019). The scree plot also
969
+ confirmed the choice of three components.
970
+ Table no. 4: Total variance explained
971
+
972
+ greenlocation
973
+ 4.1
974
+ separatewaste
975
+ collection
976
+ 3.6
977
+ Performance
978
+ communityoutreach
979
+ programs
980
+ sustainabilityresearch
981
+ sustainabilitypartnerships
982
+ sustainablebuildings
983
+ sustainabilitystrategy
984
+ publictransport,bikes
985
+ water andenergy savings
986
+ greeningnormal courses
987
+ greenactions,projects
988
+ sustainability
989
+ green purchasing
990
+ 3.1
991
+ researchintegration
992
+ sustainabilityinformation
993
+ green subjects/courses
994
+ green positioning
995
+ awarenessofthesust.strategy
996
+ renewableenergysources
997
+ green studentorganization(s)
998
+ greenstudyprogranmimes
999
+ sustainabilityaudits
1000
+ 2.6
1001
+ 3.4
1002
+ 3.6
1003
+ 3.8
1004
+ 4
1005
+ 4.2
1006
+ 4.4
1007
+ 4.6
1008
+ ImportanceAE
1009
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
1010
+ Performance Analysis
1011
+
1012
+ 510
1013
+ Amfiteatru Economic
1014
+ Compo-
1015
+ nent
1016
+ Initial Eigenvalues
1017
+ Extraction Sums of
1018
+ Squared Loadings
1019
+ Rotation Sums of Squared
1020
+ Loadings
1021
+ Total
1022
+ % of
1023
+ Variance
1024
+ Cumulative
1025
+ %
1026
+ Total
1027
+ % of
1028
+ Variance
1029
+ Cumulative
1030
+ %
1031
+ Total % of
1032
+ Variance
1033
+ Cumulative
1034
+ %
1035
+ 1
1036
+ 10.648 50.706
1037
+ 50.706
1038
+ 10.648 50.706
1039
+ 50.706
1040
+ 5.782 27.535
1041
+ 27.535
1042
+ 2
1043
+ 1.650 7.856
1044
+ 58.563
1045
+ 1.650 7.856
1046
+ 58.563
1047
+ 3.937 18.746
1048
+ 46.281
1049
+ 3
1050
+ 1.333 6.346
1051
+ 64.909
1052
+ 1.333 6.346
1053
+ 64.909
1054
+ 3.912 18.628
1055
+ 64.909
1056
+ 4
1057
+ .916 4.360
1058
+ 69.269
1059
+
1060
+
1061
+
1062
+
1063
+
1064
+
1065
+ 21
1066
+ .139 .663
1067
+ 100.000
1068
+
1069
+
1070
+
1071
+
1072
+
1073
+
1074
+ Notes: Extraction Method: Principal Component Analysis.
1075
+ To rotate the factor components, Varimax rotation with Kaiser normalization was used. The
1076
+ first rotated factor component is most highly correlated with community outreach
1077
+ programs, sustainability partnerships, green study programmes, green subjects/courses,
1078
+ greening normal courses, sustainability research and sustainability research integration
1079
+ items (Table no. 5). These variables are not particularly correlated with the other two factor
1080
+ components, and each of them refers to actions towards meeting sustainability objectives,
1081
+ or related to education or research, it is therefore the first component called as Sustainable
1082
+ Actions, Education & Research (SAER).
1083
+ Table no. 5: Rotated component matrix
1084
+ Items
1085
+ 1. Sust. Actions,
1086
+ Education &
1087
+ Research
1088
+ 2. Sust.
1089
+ Operation/
1090
+ Infrastructure
1091
+ 3. Sust.
1092
+ Strategy
1093
+ Type
1094
+ Sustainability strategy
1095
+ 0.20
1096
+ 0.23
1097
+ 0.76
1098
+ ST1
1099
+ Awareness of the sust. strategy
1100
+ 0.24
1101
+ 0.24
1102
+ 0.80
1103
+ ST2
1104
+ Sustainability audits
1105
+ 0.39
1106
+ 0.06
1107
+ 0.73
1108
+ ST3
1109
+ Sustainability information
1110
+ 0.25
1111
+ 0.32
1112
+ 0.74
1113
+ ST4
1114
+ Green positioning
1115
+ 0.31
1116
+ 0.29
1117
+ 0.48
1118
+ ST5
1119
+ Green purchasing
1120
+ 0.51
1121
+ 0.37
1122
+ 0.44
1123
+ PU1
1124
+ Separate waste collection
1125
+ 0.15
1126
+ 0.78
1127
+ 0.24
1128
+ WE1
1129
+ Renewable energy sources
1130
+ 0.26
1131
+ 0.75
1132
+ 0.30
1133
+ WE2
1134
+ Water and energy savings
1135
+ 0.13
1136
+ 0.82
1137
+ 0.31
1138
+ WE3
1139
+ Public transport, bikes
1140
+ 0.50
1141
+ 0.56
1142
+ -0.01
1143
+ WE4
1144
+ Sustainable buildings
1145
+ 0.28
1146
+ 0.73
1147
+ 0.26
1148
+ WE5
1149
+ Green location
1150
+ 0.39
1151
+ 0.49
1152
+ 0.08
1153
+ LO1
1154
+ Community outreach programs
1155
+ 0.60
1156
+ 0.31
1157
+ 0.33
1158
+ SA1
1159
+ Sustainability partnerships
1160
+ 0.68
1161
+ 0.25
1162
+ 0.33
1163
+ SA2
1164
+ Green student organization(s)
1165
+ 0.57
1166
+ 0.33
1167
+ 0.41
1168
+ SA3
1169
+ Green actions, projects
1170
+ 0.63
1171
+ 0.28
1172
+ 0.45
1173
+ SA4
1174
+ Green study programmes
1175
+ 0.83
1176
+ 0.16
1177
+ 0.19
1178
+ SER1
1179
+ Green subjects/courses
1180
+ 0.82
1181
+ 0.17
1182
+ 0.21
1183
+ SER2
1184
+ Greening normal courses
1185
+ 0.71
1186
+ 0.16
1187
+ 0.27
1188
+ SER3
1189
+ Sustainability research
1190
+ 0.71
1191
+ 0.34
1192
+ 0.30
1193
+ SER4
1194
+ Sustainability research
1195
+ 0.78
1196
+ 0.22
1197
+ 0.26
1198
+ SER5
1199
+
1200
+ Sustainable University
1201
+ AE
1202
+
1203
+ Vol. 22 • No. 54 • May 2020
1204
+ 511
1205
+ Items
1206
+ 1. Sust. Actions,
1207
+ Education &
1208
+ Research
1209
+ 2. Sust.
1210
+ Operation/
1211
+ Infrastructure
1212
+ 3. Sust.
1213
+ Strategy
1214
+ Type
1215
+ integration
1216
+ Notes: (1) Extraction Method: Principal Component Analysis. Rotation Method: Varimax with Kaiser
1217
+ Normalization. Rotation converged in 6 iterations. (2) ST: Strategy, commitment & monitoring; PU:
1218
+ Purchasing; WE: Waste & energy; LO: Location; SA: Sustainability actions; SER: Sustainable
1219
+ education & research
1220
+ The second factor component, which is called Sustainable Operation/Infrastructure, are
1221
+ made up of separate waste collection, renewable energy sources, water and energy savings
1222
+ and sustainable buildings. All those items are related to the domain of waste and energy.
1223
+ The third component, Sustainable Strategy, has been named after the items that correlated
1224
+ with it the most. All of them are related to the sustainability strategy including the written
1225
+ sustainability strategy, and its awareness, regular sustainability audits and sustainability
1226
+ information. Because of their moderately large correlations with the first and the third
1227
+ components, green student organizations and green action/projects bridges Sustainable
1228
+ Actions, Education & Research and Sustainable Strategy. Public transport, bikes and green
1229
+ location variables bridge the first and the second components, whereas green positioning
1230
+ and green purchasing are highly correlated with all the three factor components.
1231
+ These results suggest that students form expectations about the three main domains of
1232
+ university sustainability: 1) sustainable strategy, 2) sustainable operations/infrastructure,
1233
+ and 3) sustainable actions/education/research. These are the main topics of the university
1234
+ sustainability in the mind of the most important stakeholder. These findings are not in line
1235
+ with those of previous studies (Nejati and Nejati, 2013; Dagiliute, Liobikiene and
1236
+ Minelgaite, 2018). In both of the earlier studies, the number of factor components was
1237
+ higher, and the structure of the component was different from our results.
1238
+ It is proposed that universities should deal with all the three components separately, and it
1239
+ would be beneficial for them to assign managers in charge to each domain to fully meet
1240
+ student expectations.
1241
+ 3.5. Reliability of the sustainable university scale
1242
+ In order to test H2 and to investigate whether all the 21 items of the sustainable university
1243
+ scale reliably measure the same latent variable, a Cronbach's alpha was run on both SUS
1244
+ importance and SUS performance datasets.
1245
+ In the reliability statistics table of SUS importance, Cronbach's alpha was 0.95, which
1246
+ indicates a very high level of internal consistency for our scale with this specific sample
1247
+ (DeVellis, 2017.). The "Cronbach's Alpha “If Item Deleted" column showed that removal
1248
+ of any item would result in a lower Cronbach's alpha, so no items were removed from the
1249
+ 21 item-scale. In the reliability statistics table of SUS performance dataset, Cronbach's
1250
+ alpha was even higher (0.985), which indicates an even higher level of internal consistency.
1251
+ Here also no items were removed as the “If Item Deleted" column showed that removal of
1252
+ any item would result in a lower Cronbach's alpha.
1253
+ Also, a reliability analysis was run in order to ensure internal consistency of the identified
1254
+ constructs after the principle component analysis. The high Cronbach’s alpha values
1255
+ confirmed the reliability of the constructs (α Sustainable Strategy = 0.850, no. of items = 5;
1256
+
1257
+ AE
1258
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
1259
+ Performance Analysis
1260
+
1261
+ 512
1262
+ Amfiteatru Economic
1263
+ α Sustainable Operation & Infrastructure = 0.861, no. of items = 6; and α Sustainable
1264
+ Actions, Education & Research= 0.938, no. of items =10).
1265
+ All these findings support H2. It is therefore accepted that the sustainable university scale
1266
+ (SUS) is a reliable construct to measure perceived university sustainability.
1267
+
1268
+ Conclusions
1269
+ The stakeholder theory suggests that organizations should fully meet stakeholders’
1270
+ expectations to be successful (Freeman, 2010). Students are one of the biggest and most
1271
+ important stakeholders of universities (Degtjarjova, Lapina and Freidenfelds, 2018), and
1272
+ could have a significant impact on the environment (Emanuel and Adams, 2011).
1273
+ Nowadays, the public demand for more sustainable universities is growing (Md Shahbudin,
1274
+ et al., 2011.). More and more students want to study about sustainability, expect the
1275
+ integration of sustainability research into curricula and prefer universities that make efforts
1276
+ to operate in a more sustainable manner (Dagiliute, Liobikiene and Minelgaite, 2018).
1277
+ University decision-makers (Rector, Chancellor, Deans and the Senate) should consider
1278
+ sustainability issues to a greater extent when developing organizational strategy. This study
1279
+ extends the knowledge of the above decision-makers regarding students’ perception of
1280
+ university sustainability in many aspects.
1281
+ The current study found that separate waste collection on campus is the most important
1282
+ student expectation about sustainability. However, it is not in line with the result of
1283
+ previous studies. Dagiliute, Liobikiene and Minelgaite (2018) found recycling less
1284
+ important for students. Nonetheless, our findings are consistent with those of other studies
1285
+ suggesting that students expect water and energy savings and energy efficient, sustainable
1286
+ university buildings in a sustainable university. Also, it is important for the students that the
1287
+ buildings should be located in a green environment. Universities are therefore advised to
1288
+ promote separate waste collection, save water and energy, and maintain sustainable, energy
1289
+ efficient buildings that are situated in green parks (R1).
1290
+ In the current study, the low value of general satisfaction with the performance of
1291
+ universities towards sustainability (3.23) confirmed H1 and suggests that students are not
1292
+ satisfied with it and consider Hungarian universities rather unsustainable. Students’
1293
+ perceptions of university sustainability are in line with the weak positions of the Hungarian
1294
+ higher education institution in green rankings (Greenmetric, 2019). Our findings show that
1295
+ students are most satisfied with the location of the university buildings, which suggests that
1296
+ Hungarian universities have preferred locations. Also, students are content with the
1297
+ opportunity to collect waste separately on campus, the community outreach programs that
1298
+ universities offer, and the promotion of research on sustainability (R2).
1299
+ The findings of this research confirmed H3. By combining the importance-performance
1300
+ analysis (IPA) with the sustainable university scale (SUS), a simple but powerful strategic
1301
+ managerial tool can be developed. It could be widely used by university decision-makers to
1302
+ investigate the key areas of university sustainability. IPA helps to identify competitive
1303
+ advantages and major weaknesses in the domains of sustainability and make it possible for
1304
+ decision-makers to implement corrective actions to make students as stakeholders more
1305
+ satisfied with the university's efforts to address sustainability. Two major weaknesses were
1306
+ found in our study. Hungarian universities perform poorly in sustainable purchasing and
1307
+
1308
+ Sustainable University
1309
+ AE
1310
+
1311
+ Vol. 22 • No. 54 • May 2020
1312
+ 513
1313
+ use less renewable energy (e.g. solar panels) on campus than it is expected by their
1314
+ students. It is therefore suggested that universities should immediately make both their
1315
+ energy use and purchasing process more sustainable. On the other hand, it was also found
1316
+ that campus location and separate waste collection are the major competitive advantages. It
1317
+ is suggested that the major strengths are used in the marketing campaigns of universities to
1318
+ make their green positioning more effective and to build the sustainable university brand
1319
+ image. Strategy, energy and water savings, public transport, sustainable buildings and
1320
+ research are also strengths of the Hungarian universities that should be communicated (R3).
1321
+ The three main domains of university sustainability were also identified. These are the
1322
+ strategy towards sustainability, actions to promote sustainability including education and
1323
+ research, and the sustainable infrastructure/operations. This is a unique structure and
1324
+ different from those presented in earlier studies (Nejati and Nejati, 2013; Dagiliute,
1325
+ Liobikiene and Minelgaite, 2018), which suggests that Hungarian universities should use a
1326
+ nation-specific approach to university sustainability. Future studies on this topic are
1327
+ therefore recommended to investigate it in different cultural and national contexts (R4).
1328
+ The sustainable university scale (SUS) was found to be a reliable construct to measure
1329
+ perceived university sustainability (H2 accepted). The adaptation of this construct is
1330
+ therefore proposed to both researchers and university decision-makers to investigate how
1331
+ students do perceive the efforts that universities make towards sustainability. Combined
1332
+ with IPA, it could be a powerful benchmarking tool, which is an important practical
1333
+ implication (R5).
1334
+ Further research should be done to compare the perceived university sustainability of green
1335
+ and non-green universities in different cultural settings.
1336
+
1337
+ References
1338
+ Adams, R., Martin, S. and Boom, K., 2018. University culture and sustainability: Designing
1339
+ and implementing an enabling framework. Journal of Cleaner Production, 171, pp.434-
1340
+ 445.
1341
+ Avila, L.V., Filho, W.L., Brandli, L., Macgregor, C.J., Molthan-Hill, P., Özuyar, P.G. and
1342
+ Moreira, R.M., 2017. Barriers to innovation and sustainability at universities around the
1343
+ world. Journal of Cleaner Production, 164, pp.1268-1278.
1344
+ Babbie, E.R., Wagner, W.E. and Zaino, J., 2019. Adventures in social research: data
1345
+ analysis using IBM® SPSS® statistics. Los Angeles, CA: Sage.
1346
+ Carroll, A.B., and Buchholtz, A.K., 2014. Business and society: ethics, sustainability and
1347
+ stakeholder management. Cengage Learning.
1348
+ Chapleo, C. and Sims, C., 2017. Stakeholder analysis in higher education: a case study of
1349
+ the University of Portsmouth. Perspectives: Policy and Practice in Higher Education
1350
+ 14(1), pp. 12-20.
1351
+ Dagiliūtė, R., Liobikienė, G. and Minelgaitė, A., 2018. Sustainability at universities:
1352
+ Students’ perceptions from Green and Non-Green universities. Journal of Cleaner
1353
+ Production, 181, pp.473-482.
1354
+
1355
+ AE
1356
+ Students’ Perceptions of Sustainable Universities in Hungary: An Importance-
1357
+ Performance Analysis
1358
+
1359
+ 514
1360
+ Amfiteatru Economic
1361
+ Degtjarjova, I., Lapina, I., and Freidenfelds, D., 2018. Student as stakeholder: "voice of
1362
+ customer" in higher education quality development. Marketing and Management of
1363
+ Innovations, 2, pp. 388-398.
1364
+ DeVellis, R.F., 2017. Scale Development: theory and applications. Los Angeles: Sage.
1365
+ Emanuel, R. and Adams, J., 2011. College students’ perceptions of campus sustainability.
1366
+ International Journal of Sustainability in Higher Education, 12(1), pp.79-92.
1367
+ Filho, W.L., Manolas, E. and Pace, P., 2015. The future we want. International Journal of
1368
+ Sustainability in Higher Education, 16(1), pp.112-129.
1369
+ Filho, W.L., Shiel, C., Paço, A., Mifsud, M., Ávila, L.V., Brandli, L.L., Molthan-Hill, P.,
1370
+ Pace, P., Azeiteiro, U.M., Vargas, V.R. and Caeiro, S., 2019. Sustainable Development
1371
+ Goals and sustainability teaching at universities: Falling behind or getting ahead of the
1372
+ pack? Journal of Cleaner Production, 232, pp.285-294.
1373
+ Freeman, R.E., 1984. Strategic Management: A Stakeholder Approach. Boston: Pitman.
1374
+ Freeman, R.E., 2010. Strategic Management: A Stakeholder Approach. Cambridge
1375
+ University Press.
1376
+ Friedman, M., 1965. Capitalism and freedom. Chicago: University of Chicago Press.
1377
+ Grecu, V. and Ipiña, N., 2014. The Sustainable University – A Model for the Sustainable
1378
+ Organization. Management of Sustainable Development, 6(2), pp.15-24.
1379
+ Greenmetric, 2019. UI Greenmetric World University Rankings Overall Rankings [online]
1380
+ Available at: <https://greenmetric.ui.ac.id/overall-rankings-2019/> [Accessed 20
1381
+ December 2019].
1382
+ Jolliffe, I.T., 2011. Principal component analysis. New York: Springer.
1383
+ Kakabadse, N. K., Rozules, C. and Davies, L.L., 2005. Corporate social responsibility and
1384
+ stakeholder approach: A conceptual review. International Journal of Business
1385
+ Governance and Ethics, 1(4), pp. 277-302.
1386
+ Kim, J.-R., Jeon, E.-C., Cho, S. and Kim, H., 2018. The Promotion of Environmental
1387
+ Management in the South Korean Health Sector—Case Study. Sustainability, 10(6),
1388
+ p.2081.
1389
+ Li, Y., Gu, Y. and Liu, C., 2018. Prioritising performance indicators for sustainable
1390
+ construction and development of university campuses using an integrated assessment
1391
+ approach. Journal of Cleaner Production, 202, pp.959-968.
1392
+ Lukovics, M. and Zuti, B., 2017. New Functions of Universities in Century XXI Towards
1393
+ “Fourth Generation” Universities. academia.edu 9: Paper ID: 20371078. San
1394
+ Francisco, California.
1395
+ Nejati, M. and Nejati, M., 2013. Assessment of sustainable university factors from the
1396
+ perspective of university students. Journal of Cleaner Production, 48, pp.101-107.
1397
+ Mainardes, E.W., Alves, H. and Raposo, M., 2010. An Exploratory Research on the
1398
+ Stakeholders of a University. Journal of Management and Strategy, 1(1), pp. 76-88.
1399
+ Martilla, J.A. and James, J.C., 1977. Importance-Performance Analysis. Journal of
1400
+ Marketing, 41(1), pp.77-79.
1401
+ Md Shahbudin, A., Nejati, M., Amran, A., 2011. Sustainability-based knowledge management
1402
+ performance evaluation system (SKMPES): linking the higher learning institutes with the
1403
+ bottom billions. African Journal of Business Management, 5(22), pp. 9530-9540.
1404
+
1405
+ Sustainable University
1406
+ AE
1407
+
1408
+ Vol. 22 • No. 54 • May 2020
1409
+ 515
1410
+ Nagy, S., 2018. A környezettudatos cselekvések elemzése. Vezetéstudomány – Budapest
1411
+ Management Review, 49(10-11), pp. 45-55.
1412
+ Nicolescu, O., Pleșoianu, G. and Cîrstea, A.C., 2017. New approaches and tendencies in
1413
+ entrepreneurial management: international conference proceedings. Newcastle upon
1414
+ Tyne, UK: Cambridge Scholars Publishing.
1415
+ Olalla, C.B. and Merino, A., 2019. Competences for sustainability in undergraduate
1416
+ business studies: A content analysis of value-based course syllabi in Spanish
1417
+ universities. The International Journal of Management Education, 17(2), pp.239-253.
1418
+ Paletta, A., Fava, F., Ubertini, F., Bastioli, C., Gregori, G., Camera, F.L. and Douvan, A.R.,
1419
+ 2019. Universities, industries and sustainable development: Outcomes of the 2017 G7
1420
+ Environment Ministerial Meeting. Sustainable Production and Consumption, 19, pp.1-10.
1421
+ Papp-Váry, Á. and Lukács, R. 2019. Is sustainability a value element of higher education?
1422
+ CASE III-1. In: Rekettye, G., Value Creation 4.0. London: Transnational Press, pp. 179-183.
1423
+ Pawłowski, K., 2009. The ‘Fourth Generation University’ as a Creator of the Local and
1424
+ Regional Development. Higher Education in Europe, 34(1), pp.51-64.
1425
+ Polónyi, I. and Kozma, T., 2019. Az egyetemfejlesztés alternatívái. (Alternatives to
1426
+ university development). Magyar Tudomány, 180(9), pp. 1326-1336.
1427
+ Ragazzi, M. and Ghidini, F., 2017. Environmental sustainability of universities: critical
1428
+ analysis of a green ranking. Energy Procedia, 119, pp.111-120.
1429
+ Shuqin, C., Minyan, L., Hongwei, T., Xiaoyu, L. and Jian, G., 2019. Assessing
1430
+ sustainability on Chinese university campuses: Development of a campus sustainability
1431
+ evaluation system and its application with a case study. Journal of Building
1432
+ Engineering, 24, p.100747.
1433
+ Soini, K., Jurgilevich, A., Pietikäinen, J. and Korhonen-Kurki, K., 2018. Universities
1434
+ responding to the call for sustainability: A typology of sustainability centres. Journal of
1435
+ Cleaner Production, 170, pp.1423-1432.
1436
+ Sterling, S., 2014. The sustainable university: challenge and response. The sustainable
1437
+ university: progress and prospects. London: Routledge.
1438
+ United Nations, 2019. Sustainable Development Goals. [online] Available at:
1439
+ <http://un.org/sustainabledevelopment/> [Accessed 28 October 2019].
1440
+ Yuvinatileng, M., Utomo, W.H. and Latuperissa, R., 2013. Analysis of Service Quality
1441
+ using Servqual Method and Importance Performance Analysis (IPA) in Population
1442
+ Department, Tomohon City. International Journal of Computer Applications, 70(19),
1443
+ pp.23-30.
1444
+ Wakkee, I., Sijde, P.V.D., Vaupell, C. and Ghuman, K., 2019. The universities role in
1445
+ sustainable
1446
+ development:
1447
+ Activating
1448
+ entrepreneurial
1449
+ scholars
1450
+ as
1451
+ agents
1452
+ of
1453
+ change. Technological Forecasting and Social Change, 141, pp.195-205.
1454
+ Walkenbach, J., 2016. Microsoft® Excel® 2016 bible. Indianapolis: Wiley.
1455
+ Wright, T., 2010. University presidents’ conceptualizations of sustainability in higher
1456
+ education. International Journal of Sustainability in Higher Education, 11(1), pp.61-73.
1457
+ Wyród-Wróbel, J. and Biesok, G., 2017. Decision making on various approaches to
1458
+ Importance-Performance Analysis (IPA). European Journal of Business Science and
1459
+ Technology, 3(2), pp. 123-131.
1460
+
IdAzT4oBgHgl3EQfU_z6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
JdFAT4oBgHgl3EQfvB7v/content/tmp_files/2301.08674v1.pdf.txt ADDED
@@ -0,0 +1,625 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ Phonon-mediated room-temperature quantum Hall transport in graphene
4
+ Daniel Vaquero1,†, Vito Clericò1,† , Michael Schmitz2,3, Juan Antonio Delgado-Notario1,4, Adrian Martín-Ramos1,
5
+ Juan Salvador-Sánchez1, Claudius S. A. Müller5,6, Km Rubi5,6, Kenji Watanabe7, Takashi Taniguchi8, Bernd
6
+ Beschoten2, Christoph Stampfer2,3, Enrique Diez1, Mikhail I. Katsnelson6, Uli Zeitler5,6, Steffen Wiedmann5,6,
7
+ Sergio Pezzini9,*
8
+ 1Nanotechnology Group, USAL–Nanolab, Universidad de Salamanca, E-37008 Salamanca, Spain.
9
+ 2JARA-FIT and 2nd Institute of Physics, RWTH Aachen University, 52074 Aachen, Germany.
10
+ 3Peter Grünberg Institute (PGI-9), Forschungszentrum Jülich, 52425 Jülich, Germany.
11
+ 4CENTERA Laboratories, Institute of High Pressure Physics, Polish Academy of Sciences, 29/37 Sokołowska Str, Warsaw,
12
+ Poland.
13
+ 5High Field Magnet Laboratory (HFML-EMFL), Radboud University, Toernooiveld 7, 6525 ED Nijmegen, The Netherlands.
14
+ 6Radboud University, Institute for Molecules and Materials, Heyendaalseweg 135, 6525 AJ Nijmegen, The Netherlands.
15
+ 7Research Center for Functional Materials, National Institute for Materials Science, 1-1 Namiki Tsukuba, Ibaraki 305-0044,
16
+ Japan.
17
+ 8International Center for Materials Nanoarchitectonics, National Institute for Materials Science, 1-1 Namiki Tsukuba,
18
+ Ibaraki 305-0044, Japan.
19
+ 9NEST, Istituto Nanoscienze-CNR and Scuola Normale Superiore, Piazza San Silvestro 12, 56127 Pisa, Italy.
20
+
21
+
22
+ †These authors contributed equally to this work
23
+ *email: sergio.pezzini@nano.cnr.it
24
+
25
+ Abstract
26
+ The quantum Hall (QH) effect in two-dimensional electron systems (2DESs) is conventionally observed at liquid-
27
+ helium temperatures, where lattice vibrations are strongly suppressed and bulk carrier scattering is dominated
28
+ by disorder. However, due to large Landau level (LL) separation (~2000 K at B = 30 T), graphene can support the
29
+ QH effect up to room temperature (RT), concomitant with a non-negligible population of acoustic phonons
30
+ with a wave-vector commensurate to the inverse electronic magnetic length. Here, we demonstrate that
31
+ graphene encapsulated in hexagonal boron nitride (hBN) realizes a novel transport regime, where dissipation in
32
+ the QH phase is governed predominantly by electron-phonon scattering. Investigating thermally-activated
33
+ transport at filling factor 2 up to RT in an ensemble of back-gated devices, we show that the high B-field
34
+
35
+ 2
36
+
37
+ behaviour correlates with their zero B-field transport mobility. By this means, we extend the well-accepted
38
+ notion of phonon-limited resistivity in ultra-clean graphene to a hitherto unexplored high-field realm.
39
+
40
+ Introduction
41
+ Van der Waals heterostructures of graphene and hBN have recently granted experimental access to novel
42
+ phenomena in condensed matter [1]. The use of hBN as atomically-flat encapsulating dielectric, in particular,
43
+ permits a drastic reduction of extrinsic disorder in graphene devices [2], leading to the observation of zero-field
44
+ transport regimes dominated by either electron-electron [3], electron-hole [4] or electron-phonon (e-ph)
45
+ interaction [5], which manifest over different carrier density and temperature ranges. Toward RT (T ~ 300 K),
46
+ the scattering of electrons with acoustic phonons was theoretically identified as the main intrinsic contribution
47
+ to the electrical resistivity in graphene [6–8], implying a carrier mobility exceeding 105 cm2V-1s-1 at low carrier
48
+ concentration (n < 1012 cm-2). While such figures could already be inferred from early data on disordered SiO2-
49
+ supported graphene (~104 cm2V-1s-1 mobility) [9, 10], at present, the reach of the zero-field acoustic-phonon-
50
+ limit is firmly established as a generic property of high-quality graphene devices [5], also when encapsulated in
51
+ hBN crystals from different sources [11] or engineered to high doping levels (n > 1013 cm-2) [12]. Notable
52
+ exceptions to the cleanness-implies-high-RT-mobility scenario are suspended graphene samples, where flexural
53
+ phonons dramatically contribute to carrier scattering leading to a T2 behaviour of the resistivity [13], and
54
+ rotationally faulted graphene bilayers close to magic-angle, showing strong phonon-driven T-linear resistivity
55
+ [14]. The difference between freely suspended graphene and graphene encapsulated in hBN is due to the fact
56
+ that in the latter case van der Waals interaction between graphene and substrate makes flexural phonons
57
+ harder, suppressing an intrinsic rippling instability [15].
58
+ In this work, we address the fundamental question whether the e-ph mechanism in clean graphene could also
59
+ govern the electrical transport in the QH regime [16] at temperatures close to RT. In this sense, we note that
60
+
61
+ 3
62
+
63
+ previous literature on the RT-QH effect in graphene [17–20] exclusively includes experiments on SiO2-
64
+ supported devices, precluding such investigation.
65
+
66
+ Results
67
+ The QH effect in 2DESs manifests when the Fermi level (EF) lies on the localised states between two LLs, formed
68
+ in a perpendicular magnetic field and separated by an energy gap ΔLL. The interplay between this energy scale
69
+ and the thermal energy kT governs the basic phenomenology of the electrical transport in the QH regime.
70
+ When 𝑘𝑇 ≪ 𝛥𝐿𝐿, no conduction takes place in the 2D bulk, while 1D chiral edge states carry the electrical
71
+ current ballistically, leading to zero longitudinal resistivity (ρxx) when measured in four-probe configuration
72
+ (Figure 1a, upper panel). As the temperature increases and 𝑘𝑇~𝛥𝐿𝐿, thermal excitation of extended bulk states
73
+ (close to the LLs centre) exponentially restores bulk conduction and carrier scattering (Figure 1a, lower panel),
74
+ resulting in a finite value of the longitudinal resistivity minimum according to 𝜌𝑥𝑥 = 𝜌0 exp (− 𝛥𝐿𝐿 2𝑘𝑇
75
+
76
+ ). This
77
+ relation is vastly employed to estimate the inter-LL separation via T-dependent measurements of the local
78
+ resistivity minimum (under the precaution that the activation energy underestimates ΔLL due to disorder-
79
+ broadening of the LLs [21]). The pre-factor to the exponential term, ρ0, which is often not considered explicitly,
80
+ determines the magnitude of the T-activated resistivity (shaded yellow area Figure 1a, lower) and contains
81
+ information regarding the disorder potential [22, 23]. In perpendicular magnetic fields, e-ph scattering requires
82
+ lattice vibrations with a wave-vector in the order of the inverse of the magnetic length (𝑙𝐵~ 25 nm √𝐵[T]
83
+
84
+ )
85
+ [24], which defines a third energy scale relevant to our problem 𝐸𝑝ℎ = ℏv𝑠 𝑙𝐵
86
+
87
+ (where vs is the sound velocity in
88
+ the material). In conventional 2DESs, the small ΔLL leads to a complete suppression of the QH effect within a
89
+ few K [25], where the Eph-controlled phonon population can be considered negligible. Although the low
90
+ electronic mass in 2DESs such as InSb [26] and HgTe [27–29] enables the observation of the QHE up to liquid-
91
+ nitrogen temperature, this is insufficient to ensure 𝑘𝑇 ≫ 𝐸𝑝ℎ and therefore insufficient to realize a
92
+ predominance of e-ph interaction. This condition, as sketched in Figure 1b, is instead fulfilled by graphene in
93
+
94
+ 4
95
+
96
+ the RT-QH regime (the field dependence of Eph and the corresponding T-dependent excitation probability for
97
+ acoustic phonons in graphene at B = 30 T are shown in SI Figure S1). Under this circumstance, the T-activated
98
+ resistivity (shaded dark cyan area in Figure 1b) should directly relate to e-ph scattering [24].
99
+ Figure 1c shows a representative measurement of the RT-QH effect, acquired at B = 30 T in a
100
+ hBN/graphene/hBN back-gated Hall bar (sample D2). The Hall conductivity (σxy) presents weak slope changes
101
+ around filling factors ν = ±2 (Vg ~ ±20 V), while the shelves-like features at low carrier concentration originate
102
+ from the onset of electron-hole coexistence in the highly-degenerate N = 0 LL [30]. ρxx, in addition to the
103
+ pronounced maximum around the charge neutrality point (CNP), shows two sizable minima (Figure 1c, inset),
104
+ indicative of T-activated QH states. Notably, the overall robustness of the RT-QH signatures dramatically differs
105
+ in high-mobility graphene with respect to SiO2-supported samples [17]; we thoroughly address this striking
106
+ observation in a separate work, where we study the suppression of the σxy plateaus in ultra-high-quality
107
+ devices at temperatures significantly lower than RT. In the following, we will focus on the magnitude of ρxx in
108
+ the RT-QH regime and identify the underlying mechanism employing a collection of dry-assembled hBN/
109
+ graphene/hBN heterostructures.
110
+
111
+ In Figure 2 we present the main transport characteristics of our devices (details on the fabrication are given in
112
+ Methods), measured at zero magnetic field and at elevated temperatures. Figure 2a shows the RT mobility of
113
+ three hBN-encapsulated devices, calculated according to the Drude model ( 𝜇 = 1 (𝑛𝑒𝜌𝑥𝑥)
114
+
115
+ ), as a function of
116
+ the carrier density n. All the mobility curves are well above the typical values for SiO2-supported graphene
117
+ (grey shaded area) over the whole n range. Importantly, sample D3 shows a μ(n) dependence comparable to
118
+ the data of Ref. [5] (dash-dotted line), demonstrating the standard fingerprint of phonon-limited RT mobility in
119
+ zero magnetic field [11, 12] (as confirmed by temperature-dependent resistivity data shown in SI Figure S2).
120
+ We note that, although Wang et al. employed a 15 μm-wide van der Pauw device, e-ph scattering imposes a ~1
121
+ μm upper bound to the electronic mean free path at B = 0 and RT [5]. Therefore, the zero-field e-ph limit can
122
+ also be realized using narrow Hall bars, provided that their channel width exceeds 1 μm (1.5 μm to 2.3 μm in
123
+
124
+ 5
125
+
126
+ our devices). The overall high quality of the samples is also supported by the observation of fractional QH
127
+ states at liquid-helium temperature (see data for sample D2 in SI Figure S3, and Ref. [31] for sample D4,
128
+ fabricated using CVD-grown graphene). In Figure 2b we explore the correlation between the carrier mobility
129
+ (calculated using the field-effect formula [32]) and the charge inhomogeneity in the CNP region, estimated as
130
+ the usual n* parameter [33] (see Figure 2b inset for an example of the extraction). We consider data at T = 220
131
+ K, where clear thermal activation is observed in the RT-QH regime. n* values above the intrinsic CNP thermal
132
+ broadening (~2.6 × 1010 cm-2 at 220 K, beginning of the x-axis in Figure 2b) quantify the residual disorder,
133
+ which, in our devices, remains well below the typical observations for graphene on SiO2 (n* in the few-1011 cm-2
134
+ range). In addition, as for Refs. [33, 34], the linear μ-1(n*) dependence (see shaded area in Figure 2b) indicates
135
+ scattering from long-range potentials, attributed to random strain variations generic to graphene on substrates
136
+ [35]. We can therefore conclude that the devices at disposal (i) span a low-disorder range unexplored in
137
+ previous RT-QH experiments, and (ii) present a well-defined disorder type, with increasing impact along the D4-
138
+ to-D1 sequence.
139
+
140
+ We then employ the sample temperature as an experimental knob to control the excitation of both phonons
141
+ (see SI Figure S1) and bulk-extended electronic states in strong magnetic fields. In Figure 3a we sketch the
142
+ effect of increasing T on the Landau-quantized electrons in graphene at B = 30 T. Toward RT, the broadening of
143
+ the Fermi-Dirac distribution around EF (experimentally set by Vg) ensures excited charge carriers from both the
144
+ N = 0 and N = 1 LLs, across the giant gap ΔLL. Accordingly, the local resistivity minimum at filling factor ν = 2
145
+ leaves zero and displays increasing finite values, as shown in the experimental curves of Figure 3b. In Figure 3c,
146
+ we present a complete picture of the T-dependence of ρxx (ν = 2) for samples D1-4, at selected magnetic fields
147
+ (30 T and 25 T in the main panel and inset, respectively; data at ν = -2 are shown in SI Figure S4). In addition to
148
+ our data, we show reference points from Ref. [20] (black diamonds, ρxx (ν = 2) in graphene on SiO2), and two
149
+ theoretical calculations defining different dissipation limits (continuous lines). In both cases we take an
150
+ activation energy equal to ΔLL/2: this was shown to be accurate for high B-fields in Ref. [20] and should hold
151
+
152
+ 6
153
+
154
+ true for clean graphene with reduced LL broadening. The upper line (yellow) assumes the universal
155
+ conductivity pre-factor due to long-range disorder (2e2/h) [23], multiplied by a factor 4 to take into account the
156
+ LL degeneracy of graphene. The lower line (dark cyan) is based on the work by Alexeev et al. [24], who
157
+ calculated the conductivity mediated by two-phonon scattering for graphene in the RT-QH regime. The
158
+ relevant e-ph process conserves the LL number, but modifies the in-plane electronic momentum. We note that
159
+ this phenomenology is fundamentally different from that of magneto-phonons oscillations, recently discovered
160
+ in extra-wide graphene devices [36], which rely on resonant inter-LL scattering at T < 200 K. Here, two-phonon
161
+ scattering within each LL contributes with a conductivity pre-factor σ0 = σN(T/300 K)(B/10 T)1/2 , which depends
162
+ both on temperature and magnetic field (in contrast to the constant pre-factor commonly assumed in QH
163
+ studies). In the ν = 2 state, the predominant contribution to the σN terms comes from the N = 0 LL (0.65 e2/h,
164
+ one order of magnitude larger with respect to N = 1, 0.06 e2/h) [24]. Strikingly, the resulting activated
165
+ behaviour, not including any free parameter, is well approximated by our devices, while the reference data
166
+ from graphene on SiO2 follow the long-range disorder limit. The qualitative agreement between theoretical
167
+ calculations and experimental data, together with the contrasting behaviour with respect to previous reports
168
+ [20], indicate that graphene/hBN heterostructures support an e-ph-dominated transport in the RT-QH regime.
169
+ Arrhenius-type fits to the conductivity [37], shown in SI Figure S5, confirm the contrasting magnitude of the
170
+ pre-factor for the two generations of graphene devices (as well as the correctness of the assumed gap size).
171
+
172
+ Despite the presence of long-range potentials (Figure 2b), our data clearly indicate that the e-ph pre-factor
173
+ does not simply add up to the standard long-range disorder term. To elucidate this point, we quantitatively
174
+ analyse the deviation from the phonon-mediated limit in the different devices. We proceed by fitting the data
175
+ from samples D1-3 (only two high T curves are acquired for D4 due to experimental limitations) with a
176
+ generalized relation (Figure 4, inset), which adds to the theoretical e-ph dependence from Ref. [24] an
177
+ activation part with a constant pre-factor (ρD). This term is intended to account for the effect of residual
178
+ disorder, and it is the only free parameter in the fits. In Figure 4 we plot the extracted ρD for the three samples
179
+
180
+ 7
181
+
182
+ at different magnetic fields, as a function of the n* parameter (averaged between the electron and hole-side).
183
+ The linear ρD(n*) behaviour observed here (shaded area in Figure 4) indicates that the random strain variations
184
+ inducing the CNP broadening are also responsible for ρxx exceeding the e-ph limit in the RT-QH regime. Notably,
185
+ the only device to display an exact e-ph-type dependence (D3, ρD ~ 0), is also the one to show a Drude mobility
186
+ comparable to the zero-field e-ph limit [5]. Taking into account the sample-dependent correction due to
187
+ residual disorder, in SI (Figure S6) we proceed to a quantitative investigation of the field and temperature
188
+ dependence of the conductivity pre-factor in our samples, revealing the expected B1/2 behaviour of the e-ph
189
+ term. However, we note that the simplified pre-factor proposed in Ref. [24] is the result of several
190
+ approximations and, more importantly, it neglects the effect of disorder. To better understand the interplay
191
+ between the different scattering mechanisms underlying the activated resistivity, in SI (Figures S7 and S8) we
192
+ discuss additional data at lower temperature (down to 50 K) and magnetic field (down to 1 T). We find that ρD
193
+ drastically increases toward low T, with the activated resistivity exceeding the e-ph limit by more than one
194
+ order of magnitude in a clean sample. However, as the temperature and magnetic field are increased, ρD
195
+ progressively drops (i. e., the activated resistivity tends toward the e-ph limit), suggesting a temperature-driven
196
+ crossover between regimes dominated by either disorder or e-ph interaction (the latter being realized only
197
+ close to RT). While it is not surprising that the e-ph limit works as a lower bound to the activated resistivity of
198
+ real samples, the non-universality (i.e., the sample and temperature dependence) of the disorder contribution
199
+ deserves particular attention in future theoretical treatments of the RT-QH in graphene.
200
+
201
+ Discussion
202
+ The physics of graphene is essentially determined by its deviations from flatness (that is, ripples), due to either
203
+ thermal fluctuations associated to flexural phonons for freely suspended samples or to roughness of substrate
204
+ like for graphene on SiO2 [15]. In both cases, ripples induce inhomogeneity of electron density with electron
205
+ and hole puddles in the vicinity of the CNP [38, 39]. In particular, for the case of graphene on SiO2 the
206
+
207
+ 8
208
+
209
+ amplitude of induced inhomogeneity of charge-carrier density is estimated as 3×1011 cm-2 [39], in agreement
210
+ with the above cited experimental values of n*. This makes the system strongly disordered, and any intrinsic
211
+ scattering mechanisms become irrelevant. Oppositely, the hBN substrate is atomically flat [1] and at the same
212
+ time suppresses intrinsic ripples which increases the RT carrier mobility by an order of magnitude and makes
213
+ intrinsic scattering mechanisms dominant [15]. Indeed, experimentally measured n* for our samples is an
214
+ order-of-magnitude smaller than what is supposed to be induced by ripples at RT. This results in an essentially
215
+ different picture of QH physics at high enough temperatures.
216
+
217
+ In conclusion, we showed experimental evidence of predominant e-ph scattering in the QH regime. This is
218
+ realized by uniquely combining strong magnetic fields, high temperatures and hBN-encapsulation of graphene.
219
+ Although the RT-QH in graphene has long been known, we showed that mitigation of disorder via van der
220
+ Waals engineering provides novel insights on the transport mechanisms in this phenomenon.
221
+
222
+
223
+
224
+
225
+
226
+
227
+
228
+
229
+
230
+
231
+
232
+
233
+
234
+
235
+
236
+
237
+ 9
238
+
239
+ Methods
240
+ Graphene-hBN van der Waals assembly and device fabrication
241
+ hBN/graphene/hBN samples D1-3 are assembled using the standard van der Waals dry pick-up [5], starting
242
+ from micromechanically exfoliated graphene flakes previously identified by optical and Raman microscopy.
243
+ Sample D4 is obtained by CVD growth on Cu foil and direct hBN-mediated pick-up after controlled decoupling
244
+ via Cu surface oxidation [31]. All the devices are fabricated making use of electron beam lithography, reactive
245
+ ion etching and e-beam evaporation of Cr/Au 1D edge contacts [5].
246
+ Magnetotransport measurements
247
+ We use standard lock-in acquisition at low frequency (13 Hz), with simultaneous ρxx and ρxy measurements in
248
+ four-probe configuration, either under a constant current excitation (12.5 nA, sample D1-D3) or a constant
249
+ voltage bias (300 µV, sample D4). The devices are mounted in a VTI system with low-pressure 4He serving as
250
+ exchange gas, coupling the samples to a liquid-N2 reservoir. The cryogenic system is accommodated in the
251
+ access bore of a resistive Bitter magnet at HFML-EMFL, with a maximum field of 33 T.
252
+
253
+ Data Availability
254
+ The data presented in this study are available at https://doi.org/10.5281/zenodo.7352031 .
255
+
256
+ References
257
+ [1] Yankowitz, M., Ma, Q., Jarillo-Herrero, P. & LeRoy B. J. van der Waals heterostructures combining graphene
258
+ and hexagonal boron nitride. Nat. Rev. Phys. 1, 112–125 (2019).
259
+ [2] Rhodes, D., Chae, S. H., Ribeiro-Palau, R. & Hone, J. Disorder in van der Waals heterostructures of 2D
260
+ materials. Nat. Mater. 18, 541–549 (2019).
261
+ [3] Bandurin, D. A. et al. Negative local resistance caused by viscous electron backflow in graphene. Science
262
+ 351, 1055-1058 (2016).
263
+
264
+ 10
265
+
266
+ [4] Crossno, J. et al. Observation of the Dirac fluid and the breakdown of the Wiedemann–Franz law in
267
+ graphene. Science 351, 1058–1061 (2016).
268
+ [5] Wang, L. et al. One-Dimensional Electrical Contact to a Two-Dimensional Material. Science 342, 614-617
269
+ (2013).
270
+ [6] Hwang, E. H. & Das Sarma, S. Acoustic phonon scattering limited carrier mobility in two-dimensional
271
+ extrinsic graphene. Phys. Rev. B 77, 115449 (2008).
272
+ [7] Sohier, T. et al. Phonon-limited resistivity of graphene by first-principles calculations: Electron-phonon
273
+ interactions, strain-induced gauge field, and Boltzmann equation. Phys. Rev. B 90, 125414 (2014).
274
+ [8] Park, C.-H. et al. Electron–Phonon Interactions and the Intrinsic Electrical Resistivity of Graphene. Nano Lett.
275
+ 14, 1113–1119 (2014).
276
+ [9] Morozov, S. V. et al. Giant Intrinsic Carrier Mobilities in Graphene and Its Bilayer. Phys. Rev. Lett.
277
+ 100, 016602 (2007).
278
+ [10] Chen, J.-H., Jang, C., Xiao, S., Ishigami, M. & Fuhrer, M. S. Intrinsic and extrinsic performance limits of
279
+ graphene devices on SiO2. Nat. Nanotechnol. 3, 206 (2008).
280
+ [11] Sonntag, J. et al. Excellent electronic transport in heterostructures of graphene and monoisotopic boron-
281
+ nitride grown at atmospheric pressure. 2D Mater. 7, 031009 (2020).
282
+ [12] Shi, W. et al. Reversible writing of high-mobility and high-carrier-density doping patterns in two-
283
+ dimensional van der Waals heterostructures. Nat. Electron. 3, 99–105 (2020).
284
+ [13] Castro, E. V. et al. Limits on Charge Carrier Mobility in Suspended Graphene due to Flexural Phonons. Phys.
285
+ Rev. Lett. 105, 266601 (2010).
286
+ [14] Polshyn, H. et al. Large linear-in-temperature resistivity in twisted bilayer graphene. Nat. Phys. 15, 1011–
287
+ 1016 (2019).
288
+ [15] Katsnelson, M. I. The Physics of Graphene, 2nd ed. (Cambridge University Press, 2020).
289
+ [16] v. Klitzing, K., Dorda, G. & Pepper, M. New Method for High-Accuracy Determination of the Fine-Structure
290
+ Constant Based on Quantized Hall Resistance. Phys. Rev. Lett. 45, 494 (1980).
291
+
292
+ 11
293
+
294
+ [17] Novoselov, K. S. et al. Room-Temperature Quantum Hall Effect in Graphene. Science 315, 1379 (2007).
295
+ [18] Jiang, Z., Zhang, Y., Tan, Y.-W., Stormer, H. L. & Kim, P. Quantum Hall effect in graphene. Solid State
296
+ Commun. 143, 14-19 (2007).
297
+ [19] Jiang, Z., Zhang, Y., Tan, Y.-W., Stormer, H. L. & Kim, P. Quantum Hall States near the Charge-Neutral Dirac
298
+ Point in Graphene. Phys. Rev. Lett. 99, 106802 (2007).
299
+ [20] Giesbers, A. J. M. et al. Quantum-Hall Activation Gaps in Graphene. Phys. Rev. Lett. 99, 206803 (2007).
300
+ [21] Ando, T., Fowler, A. B. & Stern, F. Electronic properties of two-dimensional systems. Rev. Mod. Phys. 54,
301
+ 437 (1982).
302
+ [22] Polyakov, D. G. & Shklovskii, B. I. Activated Conductivity in the Quantum Hall Effect. Phys. Rev. Lett. 73,
303
+ 1150 (1994).
304
+ [23] Polyakov, D. G. & Shklovskii, B. I. Universal Prefactor of Activated Conductivity in the Quantum Hall Effect.
305
+ Phys. Rev. Lett. 74, 150 (1995).
306
+ [24] Alexeev, A. M., Hartmann, R. R. & Portnoi, M. E. Two-phonon scattering in graphene in the quantum Hall
307
+ regime. Phys. Rev. B 92, 195431 (2015).
308
+ [25] Das Sarma, S. & Pinczuk, A. Perspectives in Quantum Hall Effects (Wiley, New York, 1997).
309
+ [26] Murphy, S. Q. et al. Studies of the quantum Hall to quantum Hall insulator transition in InSb-based 2DESs.
310
+ Physica E 6, 293 (2000).
311
+ [27] Landwehr, G. et al. Quantum transport in n-type and p-type modulation-doped mercury telluride quantum
312
+ wells. Physica E 6, 713 (2000).
313
+ [28] Kozlov, D. A. et al. Quantum Hall effect in HgTe quantum wells at nitrogen temperatures. Appl. Phys. Lett.
314
+ 105, 132102 (2014).
315
+ [29] Khouri, T. et al. High-temperature quantum Hall effect in finite gapped HgTe quantum wells. Phys. Rev. B
316
+ 93, 125308 (2016).
317
+ [30] Wiedmann, S. et al. Coexistence of electron and hole transport in graphene. Phys Rev B 84, 115314 (2011).
318
+ [31] Schmitz, M. et al. Fractional quantum Hall effect in CVD-grown graphene. 2D Mater. 7, 041007 (2020).
319
+
320
+ 12
321
+
322
+ [32] Kim, S. et al. Realization of a high mobility dual-gated graphene field-effect transistor with Al2O3 dielectric.
323
+ Appl. Phys. Lett. 94, 062107 (2009).
324
+ [33] Couto, N. J. G. et al. Random Strain Fluctuations as Dominant Disorder Source for High-Quality On-
325
+ Substrate Graphene Devices. Phys. Rev. X 4, 041019 (2014).
326
+ [34] Wang, L. P. et al. Mobility enhancement in graphene by in situ reduction of random strain fluctuations.
327
+ Phys. Rev. Lett. 124, 157701 (2020).
328
+ [35] Neumann, C. et al. Raman spectroscopy as probe of nanometer-scale strain variations in graphene. Nat.
329
+ Commun. 6, 8429 (2015).
330
+ [36] Kumaravadivel, P. et al. Strong magnetophonon oscillations in extra-large graphene. Nat. Commun. 10,
331
+ 3334 (2019).
332
+ [37] Usher, A. et al. Observation of magnetic excitons and spin waves in activation studies of a two-dimensional
333
+ electron gas. Phys Rev B 41, 1129 (1990).
334
+ [38] Gibertini, M., Tomadin, A., Polini, M., Fasolino, A. & Katsnelson, M. I. Electron density distribution and
335
+ screening in rippled graphene sheets. Phys. Rev. B 81, 125437 (2010).
336
+ [39] Gibertini, M., Tomadin, A., Guinea, F., Katsnelson, M. I. & Polini, M. Electron-hole puddles in the absence
337
+ of charge impurities. Phys. Rev. B 85, 201405(R) (2012).
338
+
339
+
340
+ Acknowledgements
341
+ We acknowledge technical support from Y. Lechaux and J. Quereda. This work has been supported by
342
+ Ministerio de Ciencia e Innovación (Grant PID2019-106820RB-C2-2) and Junta de Castilla y León (Grants
343
+ SA256P18 and SA121P20, including EU/FEDER funds). This work was supported by HFML-RU/NWO-I, member
344
+ of the European Magnetic Field Laboratory (EMFL). This work was also supported by CENTERA Laboratories in
345
+ the frame of the International Research Agendas Program for the Foundation for Polish Sciences co-financed by
346
+
347
+ 13
348
+
349
+ the European Union under the European Regional Development Fund (no. MAB/2018/9). D.V. acknowledges
350
+ financial support from the Ministry of Universities (Spain) (Ph.D. contract FPU19/04224). J.A.D-N thanks the
351
+ support from the Universidad de Salamanca for the María Zambrano postdoctoral grant funded by the Next
352
+ Generation EU Funding for the Requalification of the Spanish University System 2021–23, Spanish Ministry of
353
+ Universities. K.W. and T.T. acknowledge support from the Elemental Strategy Initiative conducted by the MEXT,
354
+ Japan (Grant Number JPMXP0112101001) and JSPS KAKENHI (Grant Numbers 19H05790, 20H00354 and
355
+ 21H05233).
356
+
357
+ This version of the article has been accepted for publication, after peer review, but is not the Version of Record
358
+ and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available
359
+ online at: https://doi.org/10.1038/s41467-023-35986-3 .
360
+
361
+ Author Contributions Statement
362
+ U.Z., S.W. and S.P. conceived the experiment and coordinated the collaboration. D.V., V.C. and M.S. fabricated
363
+ the graphene devices and performed the transport measurements. J.A.D.-N., A.M.-R. and J.S.-S. provided
364
+ technical assistance in the cleanroom processing. C.S.A.M. and K.R. provided technical assistance during the
365
+ high-field experiments. K.W. and T.T. provided single crystals of hBN. B.B., C.S. and E.D. supervised the
366
+ experimental work. D.V., V.C., M.S., and S.P. performed the data analysis. M.I.K. provided theoretical input for
367
+ the interpretation of the results. S.P. wrote the manuscript with input from all the co-authors.
368
+
369
+ Competing Interests Statement
370
+ The authors declare no competing interests.
371
+
372
+
373
+
374
+ 14
375
+
376
+ Figures and Captions
377
+
378
+ Figure 1 | Dissipation regimes in the quantum Hall phase: high-quality graphene at RT. a, Schematics of
379
+ temperature-dependent transport in conventional quantum Hall systems, such as 2DESs in semiconductors. At
380
+ low T (relative to the LL separation, upper part), the electrical current is carried by chiral edge states, leading to
381
+ zero longitudinal resistance. At higher T (lower part), thermally-excited bulk states give a finite resistivity due to
382
+ disorder scattering (yellow shading), with negligible contribution from lattice vibrations. b, At RT, graphene
383
+ supports both the QH effect (due to large inter-LL spacing) and predominant e-ph scattering in high-mobility
384
+ samples, enabling the realization of a different transport regime, with phonon-mediated dissipation at high
385
+ magnetic fields (dark cyan shading). c, ρxx (black) and σxy (red) as a function of the back-gate voltage (corrected
386
+ by a 5.2 V offset from the CNP), measured in hBN-encapsulated sample D2 at B = 30 T and T = 295 K. Inset:
387
+ zoom-in of ρxx in the vicinity of filling factor ν = 2 (the dark cyan shading indicates the finite value of the
388
+ resistivity minimum).
389
+
390
+
391
+ a
392
+ kT << △LL
393
+ c
394
+ kT<Eph
395
+ ballistic edge transport
396
+ 0.4
397
+ 25
398
+ conventional quantum
399
+ 2
400
+ Hall systems
401
+ (Uy)
402
+ 0.2
403
+ Pxx
404
+ 20
405
+ Pxx
406
+ kT ~ △LL
407
+ 1
408
+ disorder-mediated
409
+ kT<Eph
410
+ 0.0!
411
+ dissipation
412
+ 2V
413
+ 0xy
414
+ (Uy)
415
+ 15
416
+ 0
417
+ (e2/h)
418
+ Pxx
419
+ 0
420
+ Pxx
421
+ 10
422
+ B = 30 T
423
+ -1
424
+ b
425
+ T= 295 K
426
+ kT~ △LL
427
+ phonon-mediated
428
+ clean graphene
429
+ dissipatior
430
+ 5
431
+ D2
432
+ at RT
433
+ Pxx
434
+ -2
435
+ V
436
+ 0
437
+ Pxx
438
+ -30
439
+ -20
440
+ -10
441
+ 0
442
+ 10
443
+ 20
444
+ 30
445
+ Vg (V)15
446
+
447
+
448
+
449
+ Figure 2 | Phonon-limited transport and residual disorder at zero magnetic field. a, RT carrier mobility
450
+ (calculated according to the Drude model) as a function of the carrier concentration, for three hBN-
451
+ encapsulated devices. The reference dash-dotted line are data from Ref. [5], indicating a carrier mobility
452
+ limited by electron-acoustic phonon scattering. The grey-shaded area shows the typical mobility for SiO2-
453
+ supported graphene devices, 1-2 × 104 cm2V-1s-1. b, Inverse of the high-temperature (220 K) field-effect mobility
454
+ as a function of charge inhomogeneity n*, for hBN/graphene/hBN devices D1-4. The shaded area covers a
455
+ linear fit to the data, as in Ref. [33], ± one standard error on the best-fit intercept and slope. Inset: Log-Log plot
456
+ of the longitudinal conductivity of sample D1 as a function of the carrier density, exemplifying the extraction of
457
+ n* (black arrow).
458
+
459
+ a
460
+ b
461
+ 1.5
462
+ 2.0
463
+ · Ref. [5]
464
+ T = 295 K
465
+ D1
466
+ 100
467
+ Oxx
468
+ D1
469
+ e'
470
+ D2
471
+ (e2/h)
472
+ D3
473
+ 1.5
474
+ (105 cm²V-1s-1)
475
+ 1.0
476
+ : 10
477
+ 1
478
+ 10
479
+ 100
480
+ n (1010 cm2)
481
+ D1
482
+ 1.0
483
+ D2
484
+ ≥0.5
485
+ h+
486
+ D3
487
+ D4
488
+ A
489
+
490
+ D1
491
+ D2
492
+ 0.5
493
+ T = 220 K
494
+ graphene on SiO,/Si
495
+ e'
496
+
497
+ D3
498
+ D4
499
+ 0.0
500
+ 0.0
501
+ 0.5
502
+ 1.0
503
+ 1.5
504
+ 2.0
505
+ 4
506
+ 6
507
+ 8
508
+ n (1012 cm-2)
509
+ n* (1010 cm2)16
510
+
511
+
512
+ Figure 3 | Temperature-activated resistivity and phonon-mediated dissipation in the quantum Hall effect. a,
513
+ Density of states (DOS) of graphene as a function of energy, at B = 30 T (with a realistic value of LL broadening
514
+ of 15 K). On top of the DOS we show the Fermi-Dirac distribution, with EF positioned in the middle of the N = 0
515
+ and N = 1 LL, at two different temperatures, representative of the experimental range considered. b,
516
+ Temperature-activated longitudinal resistivity in the vicinity of ν = 2, measured in sample D1. c, Minimum of ρxx
517
+ at ν = 2 as a function of temperature, for the hBN-encapsulated devices. The reference data (black diamonds)
518
+ are from Ref. [20]. The yellow and dark cyan continuous line are theoretical calculations based on Ref. [23] and
519
+ Ref. [24], respectively (the shading covers resistivity values within the two theoretical calculations). The
520
+ magnetic field is 30 T (25 T) in the main panel (inset).
521
+
522
+
523
+
524
+
525
+ a
526
+ c
527
+ 1.5
528
+ EF
529
+ B= 30 T
530
+ B = 30 T
531
+ B=25 T
532
+ (arb. units)
533
+ Pxx
534
+ DOS
535
+ ALL
536
+ 295K
537
+ 1.0
538
+ disorder-
539
+ 1.0
540
+ ((v= 2) (kΩ)
541
+ mediated
542
+ 125K
543
+ -2
544
+ 0
545
+ 2
546
+ 0.5
547
+ E (103 K)
548
+ () (Z =4) d
549
+ b
550
+ B = 30 T
551
+ 0.0
552
+ 0.6
553
+ 0.5
554
+ 300
555
+ 250
556
+ 200
557
+ 150
558
+ T (K)
559
+ 0.4
560
+ 283 K
561
+ (Uy) d
562
+ Ref. [20]
563
+ 0.2
564
+
565
+ D1
566
+ D2
567
+ 0.0
568
+ phonon-
569
+ 125 K
570
+ D3
571
+ mediated
572
+ D1
573
+ D4
574
+ 0.0
575
+ 18
576
+ 20
577
+ 22
578
+ 24
579
+ 300
580
+ 250
581
+ 200
582
+ 150
583
+ Vg (V)
584
+ T (K)17
585
+
586
+
587
+ Figure 4 | Sample-dependent disorder contribution to the activated resistivity. Correlation between the T-
588
+ independent pre-factor to the activated resistivity and n*(220 K) for devices D1-3. The shaded area is defined
589
+ as in Figure 2b. The error bars correspond to ± one standard error from the fits shown in the inset. Inset: fit to
590
+ the minimum resistivity as a function of temperature (continuous lines), using the generalized formula
591
+ including both e-ph and disorder contributions, at B = 25 T.
592
+
593
+ 0.4
594
+ B = 25 T
595
+ 0.3
596
+ Pxx (v= 2) (k2)
597
+ 0.2
598
+ 0.1
599
+ 0.0
600
+ 300
601
+ 250
602
+ 200
603
+ 150
604
+ Pp (h/e2)
605
+ 0.2
606
+ T (K)
607
+
608
+ D1
609
+ 20 T
610
+ 0
611
+ D2
612
+ D3
613
+ D1
614
+ 25 T
615
+ D2
616
+ D3
617
+ ATAI
618
+ 0.0
619
+ D1
620
+ 30 T
621
+ D2
622
+ 4
623
+ 6
624
+ 8
625
+ n* (1010 cm2)
NdFLT4oBgHgl3EQfOC8n/content/tmp_files/2301.12022v1.pdf.txt ADDED
@@ -0,0 +1,1399 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.12022v1 [cs.AI] 27 Jan 2023
2
+ ǫ-Identifiability of Causal Quantities
3
+ Ang Li , Scott Mueller and Judea Pearl
4
+ Cognitive Systems Laboratory, Department of Computer Science,
5
+ University of California, Los Angeles,
6
+ Los Angeles, California, USA.
7
+ {angli, scott, judea}@cs.ucla.edu
8
+ Abstract
9
+ Identifying the effects of causes and causes of ef-
10
+ fects is vital in virtually every scientific field. Of-
11
+ ten, however, the needed probabilities may not be
12
+ fully identifiable from the data sources available.
13
+ This paper shows how partial identifiability is still
14
+ possible for several probabilities of causation. We
15
+ term this ǫ-identifiability and demonstrate its use-
16
+ fulness in cases where the behavior of certain sub-
17
+ populations can be restricted to within some nar-
18
+ row bounds. In particular, we show how unidentifi-
19
+ able causal effects and counterfactual probabilities
20
+ can be narrowly bounded when such allowances are
21
+ made. Often those allowances are easily measured
22
+ and reasonably assumed. Finally, ǫ-identifiability
23
+ is applied to the unit selection problem.
24
+ 1
25
+ Introduction
26
+ Both Effects of Causes (EoC) and Causes of Effects (CoE)
27
+ play an important role in several fields, such as health
28
+ science, social science, and business.
29
+ For example, the
30
+ causal effects identified by the adjustment [Pearl, 1993]
31
+ formula helps decision-maker avoid randomized controlled
32
+ trial using purely observational data.
33
+ For another exam-
34
+ ple, probabilities of causation have been proven critical in
35
+ personalized decision-making [Mueller and Pearl, 2022]. Be-
36
+ sides, a linear combination of probabilities of causation
37
+ has been used to solve the unit selection problem defined
38
+ by Li and Pearl [Li and Pearl, 2022b; Li and Pearl, 2019;
39
+ Li and Pearl, 2022d]. Causal quantities can also increase the
40
+ accuracy of machine learning models by combining causal
41
+ quantities with the model’s label [Li et al., 2020].
42
+ The causal quantities have been studied for decades.
43
+ Pearl first defined the causal quantities such as causal
44
+ effects [Pearl, 1993], probability of necessity and suffi-
45
+ ciency (PNS), probability of sufficiency (PS), and prob-
46
+ ability of necessity (PN) [Pearl, 1999] and their identi-
47
+ fiability [Pearl, 2009] using the structural causal model
48
+ (SCM) [Galles and Pearl, 1998; Halpern, 2000]. Pearl also
49
+ proposed the identification conditions of the causal ef-
50
+ fects (i.e., back-door and front-door criteria) [Pearl, 1993].
51
+ Pearl, Bareinboim, etc.
52
+ have studied more conditions for
53
+ identifying the causal effects [Bareinboim and Pearl, 2012;
54
+ Shpitser and Pearl, 2009]. If the causal effects are not iden-
55
+ tifiable, the informative bounds are given by Li and Pearl
56
+ using non-linear programming [Li and Pearl, 2022c]. Then,
57
+ Tian and Pearl proposed the identification conditions of
58
+ the binary probabilities of causation (i.e., monotonicity)
59
+ [Tian and Pearl, 2000]. If the probabilities of causation are
60
+ not identifiable, Tian and Pearl [Tian and Pearl, 2000] also
61
+ have informative tight bounds for them using Balke’s Linear
62
+ programming [Balke and Pearl, 1997]. Mueller, Li, and Pearl
63
+ [Mueller et al., 2021], as well as Dawid [Dawid et al., 2017],
64
+ increased those bounds using additional covariate informa-
65
+ tion and the corresponding causal structure. Recently, Li and
66
+ Pearl also proposed the theoretical work for non-binary prob-
67
+ abilities of causation [Li and Pearl, 2022a].
68
+ In real-world applications, decision-makers are more likely
69
+ to have identifiable cases (i.e., the causal quantities have point
70
+ estimations) because the bounds under unidentifiable cases
71
+ may be less informative (e.g., 0.1 ≤ PNS ≤ 0.9). Besides,
72
+ estimating the bounds often requires a combination of exper-
73
+ imental and observational data. So we wonder if something
74
+ is sitting between the identifiable and the bounds. Inspired by
75
+ the idea of the confidence interval, in this paper, we proposed
76
+ the definition of ǫ-identifiability, in which more conditions
77
+ of ǫ-identifiability can be found while the estimations of the
78
+ causal quantities are still near point estimations.
79
+ 2
80
+ Preliminaries
81
+ Here, we review the definition of PNS, PS, and PN de-
82
+ fined by Pearl [Pearl, 1999], as well as the definition of
83
+ identifiable and the conditions for identifying PNS, PS, and
84
+ PN [Tian and Pearl, 2000].
85
+ Besides, we review the tight
86
+ bounds of PNS, PS, and PN when they are unidentifiable
87
+ [Tian and Pearl, 2000]. Readers who are familiar with the
88
+ above knowledge may skip this section.
89
+ Similarly to any works mentioned above,
90
+ we used
91
+ the causal language of the SCM [Galles and Pearl, 1998;
92
+ Halpern, 2000].
93
+ The introductory counterfactual sentence
94
+ “Variable Y would have the value y, had X been x” in this
95
+ language is denoted by Yx = y, and shorted as yx. We have
96
+ two types of data: experimental data, which is in the form
97
+ of causal effects (denoted as P(yx)), and observational data,
98
+ which is in the form of a joint probability function (denoted
99
+ as P(x, y)).
100
+
101
+ First, the definition of identifiable for any causal quantities
102
+ defined using SCM is as follows:
103
+ Definition 1 (Identifiability). Let Q(M) be any computable
104
+ quantity of a class of SCM M that is compatible with graph
105
+ G. We say that Q is identifiable in M if, for any pairs of
106
+ models M1 and M2 from M, Q(M1) = Q(M2) whenever
107
+ PM1(v) = PM2(v), where P(v) is the statistical data over
108
+ the set V of observed variables. If our observations are lim-
109
+ ited and permit only a partial set FM of features (of PM(v))
110
+ to be estimated, we define Q to be identifiable from FM if
111
+ Q(M1) = Q(M2) whenever FM1 = FM2. [Pearl, 2009]
112
+ Second, the definitions of three binary probabilities of cau-
113
+ sation defined using SCM are as follow [Pearl, 1999]:
114
+ Definition 2 (Probability of necessity (PN)). Let X and Y
115
+ be two binary variables in a causal model M, let x and y
116
+ stand for the propositions X = true and Y = true, respec-
117
+ tively, and x′ and y′ for their complements. The probability
118
+ of necessity is defined as the expression
119
+ PN
120
+ =
121
+
122
+ P(Yx′ = false|X = true, Y = true)
123
+ =
124
+
125
+ P(y′
126
+ x′|x, y)
127
+ Definition 3 (Probability of sufficiency (PS)). Let X and Y
128
+ be two binary variables in a causal model M, let x and y
129
+ stand for the propositions X = true and Y = true, respec-
130
+ tively, and x′ and y′ for their complements. The probability
131
+ of sufficiency is defined as the expression
132
+ PS =
133
+ ∆ P(yx|y′, x′)
134
+ Definition 4 (Probability of necessity and sufficiency (PNS)).
135
+ Let X and Y be two binary variables in a causal model M, let
136
+ x and y stand for the propositions X = true and Y = true,
137
+ respectively, and x′ and y′ for their complements. The proba-
138
+ bility of necessity and sufficiency is defined as the expression
139
+ PNS =
140
+ ∆ P(yx, y′
141
+ x′)
142
+ Third, we review the identification conditions for causal
143
+ effects [Pearl, 1993; Pearl, 1995].
144
+ Definition 5 (Back-door criterion). Given an ordered pair of
145
+ variables (X, Y ) in a directed acyclic graph G, a set of vari-
146
+ ables Z satisfies the back-door criterion relative to (X, Y ), if
147
+ no node in Z is a descendant of X, and Z blocks every path
148
+ between X and Y that contains an arrow into X.
149
+ If a set of variables Z satisfies the back-door criterion for
150
+ X and Y , the causal effects of X on Y are identifiable and
151
+ given by the adjustment formula:
152
+ P(yx) =
153
+
154
+ z
155
+ P(y|x, z)P(z).
156
+ (1)
157
+ Definition 6 (Front-door criterion). A set of variables Z is
158
+ said to satisfy the front-door criterion relative to an ordered
159
+ pair of variables (X, Y ) if:
160
+ • Z intercepts all directed paths from X to Y ;
161
+ • there is no back-door path from X to Z; and
162
+ • all back-door paths from Z to Y are blocked by X.
163
+ If a set of variables Z satisfies the front-door criterion for
164
+ X and Y , and P(x, Z) > 0, then the causal effects of X on
165
+ Y are identifiable and given by the adjustment formula:
166
+ P(yx) =
167
+
168
+ z
169
+ P(z|x)
170
+
171
+ x′
172
+ P(y|x′, z)P(x′).
173
+ If causal effects are not identifiable, Tian and Pearl
174
+ [Tian and Pearl, 2000] provided the following bounds for the
175
+ causal effects.
176
+ P(x, y) ≤ P(yx) ≤ 1 − P(x, y′).
177
+ (2)
178
+ Finally, we review the identification conditions for PNS,
179
+ PS, and PN [Tian and Pearl, 2000].
180
+ Definition 7. (Monotonicity) A Variable Y is said to be mono-
181
+ tonic relative to variable X in a causal model M iff
182
+ y′
183
+ x ∧ yx′ = false.
184
+ Theorem 8. If Y is monotonic relative to X, then PNS, PN,
185
+ and PS are all identifiable, and
186
+ PNS = P(yx) − P(yx′),
187
+ PN = P(y) − P(yx′)
188
+ P(x, y)
189
+ ,
190
+ PS = P(yx) − P(y)
191
+ P(x′, y′)
192
+ .
193
+ If PNS, PN, and PS are not identifiable, informative bounds
194
+ are given by Tian and Pearl [Tian and Pearl, 2000].
195
+ max
196
+
197
+
198
+
199
+
200
+
201
+ 0,
202
+ P(yx) − P(yx′),
203
+ P(y) − P(yx′),
204
+ P(yx) − P(y)
205
+
206
+
207
+
208
+
209
+
210
+ ≤ PNS
211
+ (3)
212
+ min
213
+
214
+
215
+
216
+
217
+
218
+
219
+
220
+
221
+
222
+ P(yx),
223
+ P(y′
224
+ x′),
225
+ P(x, y) + P(x′, y′),
226
+ P(yx) − P(yx′)+
227
+ P(x, y′) + P(x′, y)
228
+
229
+
230
+
231
+
232
+
233
+
234
+
235
+
236
+
237
+ ≥ PNS
238
+ (4)
239
+ max
240
+
241
+ 0,
242
+ P (y)−P (yx′)
243
+ P (x,y)
244
+
245
+ ≤ PN
246
+ (5)
247
+ min
248
+
249
+ 1,
250
+ P (y′
251
+ x′)−P (x′,y′)
252
+ P (x,y)
253
+
254
+ ≥ PN
255
+ (6)
256
+ max
257
+
258
+ 0,
259
+ P (y′)−P (y′
260
+ x)
261
+ P (x′,y′)
262
+
263
+ ≤ PS
264
+ (7)
265
+ min
266
+
267
+ 1,
268
+ P (yx)−P (x,y)
269
+ P (x′,y′)
270
+
271
+ ≥ PS
272
+ (8)
273
+ The identification conditions mentioned above (i.e., back-
274
+ door and front-door criteria and monotonicity) are robust.
275
+ However, it may still be hard to achieve in real-world appli-
276
+ cations. In this work, we extend the definition of identifia-
277
+ bility, in which a sufficiently small interval is allowed. By
278
+ the new definition, the estimates of causal quantities are still
279
+ near point estimations, and more conditions for identifiability
280
+ could be discovered. If nothing is specified, the discussion
281
+ in this paper will be restricted to binary treatment and effect
282
+ (i.e., X and Y are binary).
283
+
284
+ 3
285
+ Main Results
286
+ First, we extend the definition of identifiability, which we call
287
+ ǫ-identifiability.
288
+ Definition 9 (ǫ-Identifiability). Let Q(M) be any computable
289
+ quantity of a class of SCM M that is compatible with graph
290
+ G. We say that Q is ǫ-identifiable in M (and ǫ-identified to
291
+ q) if, there exists q s.t. for any model m from M, Q(m) ∈
292
+ [q − ǫ, q + ǫ] with statistical data PM(v), where P(v) is the
293
+ statistical data over the set V of observed variables. If our
294
+ observations are limited and permit only a partial set FM
295
+ of features (of PM(v)) to be estimated, we define Q to be ǫ-
296
+ identifiable from FM if Q(m) ∈ [q − ǫ, q + ǫ] with statistical
297
+ data FM.
298
+ With the above definition, the causal quantity is at a max-
299
+ imum distance of ǫ from its true value. We will use the in-
300
+ fix operator symbol ≈ǫ to represent its left-hand side being
301
+ within ǫ of its right-hand side:
302
+ r ≈ǫ q ⇐⇒ r ∈ [q − ǫ, q + ǫ].
303
+ (9)
304
+ The
305
+ following
306
+ sections
307
+ explicate
308
+ conditions
309
+ for
310
+ ǫ-
311
+ identifiability of causal effects, PNS, PS, and PN.
312
+ 3.1
313
+ ǫ-Identifiability of Causal Effects
314
+ The causal effect P(YX) can be ǫ-identified with information
315
+ about the observational joint distribution P(X, Y ). This can
316
+ be seen by rewriting Equation (2) as:
317
+ P(x, y) ⩽ P(yx) ⩽ P(x, y) + P(x′).
318
+ (10)
319
+ Here, P(yx) is ǫ-identified to P(x, y) + ǫ when P(x′) ⩽ 2ǫ.
320
+ This ǫ-identification indicates a lower bound of P(x, y) and
321
+ an upper bound of P(x, y) + 2ǫ. Since P(x′) ⩽ 2ǫ, these
322
+ bounds are equivalent to (10). Notably, only P(x, y) and an
323
+ upper bound on P(x′) are necessary to ǫ-identify P(yx). This
324
+ is generalized in Theorem 10, without any assumptions of the
325
+ causal structure.
326
+ Theorem 10. The causal effect P(YX) is ǫ-identified as fol-
327
+ lows:
328
+ P(yx) ≈ǫ P(x, y) + ǫ
329
+ if P(x′) ⩽ 2ǫ,
330
+ (11)
331
+ P(y′
332
+ x) ≈ǫ P(x, y′) + ǫ
333
+ if P(x′) ⩽ 2ǫ,
334
+ (12)
335
+ P(yx′) ≈ǫ P(x′, y) + ǫ
336
+ if P(x) ⩽ 2ǫ,
337
+ (13)
338
+ P(y′
339
+ x′) ≈ǫ P(x′, y′) + ǫ
340
+ if P(x) ⩽ 2ǫ.
341
+ (14)
342
+ Proof. See Appendix 8.1.
343
+ When the complete distribution P(X, Y ) is known, The-
344
+ orem 10 provides no extra precision over Equation (10). Its
345
+ power comes from when only part of the distribution is known
346
+ and only an upper bound on P(X) is available or able to be
347
+ assumed.
348
+ Knowledge of a causal structure can aid ǫ-identification. In
349
+ Figure 1, there is a binary confounder U. If the full joint dis-
350
+ tribution P(X, Y, U) was available, the causal effect P(YX)
351
+ could be computed simply through the backdoor adjustment
352
+ formula. In the absence of the full joint distribution, Theo-
353
+ rem 11 allows ǫ-identification of P(yx) with only knowledge
354
+ of P(x) and the conditional probability P(y|x) as well as an
355
+ upper bound on P(u).
356
+ U
357
+ X
358
+ Y
359
+ Figure 1: The causal graph, where X is a binary treatment, Y is a
360
+ binary effect, and U is a binary confounder.
361
+ Theorem 11. Given the causal graph in Figure 1 and
362
+ P(u) ≤ P(x) − c for some constant c, where 0 < c ⩽ P(x),
363
+ P(yx) ≈ǫ P(y|x) +
364
+ P(x) − c
365
+ 2cP(x) + P(x) + c · ǫ
366
+ if P(u) ≤
367
+ 2cP(x)
368
+ 2cP(x) + P(x) + c · ǫ.
369
+ (15)
370
+ Specifically, if P(x) ≥ 0.5, then the causal effect P(yx) is
371
+ ǫ-identified to P(y|x) +
372
+ ǫ
373
+ 13 if P(u) <
374
+ 4
375
+ 13ǫ.
376
+ Proof. See Appendix 8.2.
377
+ Note that x ∈ {x, x′}, y ∈ {y, y′}, and u ∈ {u, u′} in
378
+ Theorem 11. The constant c should be maximized satisfying
379
+ both c ⩽ P(x) − P(u) and the condition in Equation (15) for
380
+ a given ǫ. The larger c is, the closer P(yx) is ǫ-identified to
381
+ P(y|x). This needs to be balanced with minimizing ǫ.
382
+ As an example, if P(x) ≥ 0.5 and P(u) ⩽ 0.1, then the
383
+ causal effect P(yx) is ǫ-identified to P(y|x) +
384
+ ǫ
385
+ 13 if P(u) ⩽
386
+ 4
387
+ 13ǫ.
388
+ Essentially, P(yx) is ǫ-identified to P(y|x) plus some frac-
389
+ tion of ǫ when P(u) is sufficiently small.
390
+ Therefore, the
391
+ causal effect P(yx) is near P(y|x) if P(U) is specific (i.e.,
392
+ P(u) or P(u′) is minimal). In this case, Theorem 11 can be
393
+ advantageous over the backdoor adjustment formula to com-
394
+ pute P(yx), even when data on X, Y , and U are available,
395
+ because P(Y |X, U), required for the adjustment formula, is
396
+ impractical to estimate with P(U) close to 0.
397
+ 3.2
398
+ ǫ-Identifiability of PNS
399
+ Even though Tian and Pearl derived tight bounds on PNS
400
+ [Tian and Pearl, 2000], the PNS can be potentially further
401
+ narrowed when taking into account particular upper bound
402
+ assumptions on causal effects or observational probabilities.
403
+ This can be seen by analyzing the bounds of PNS in Equa-
404
+ tions (3) and (4). Picking any of the arguments to the max
405
+ function of the lower bound and any of the arguments to the
406
+ min function of the upper bound, we can make a condition
407
+ that the range of those two values is less than 2ǫ. For ex-
408
+ ample, let us pick the second argument of the max function,
409
+ P(yx) − P(yx′), and the first argument of the min function,
410
+ P(yx):
411
+ P(yx) − [P(yx) − P(yx′)] ⩽ 2ǫ,
412
+ P(yx′) ⩽ 2ǫ.
413
+ (16)
414
+ Equation (16) is the assumption and the PNS is the
415
+ ǫ-identified to ǫ above the lower bound or ǫ below the upper
416
+ bound:
417
+ PNS ≈ǫ P(yx) − P(yx′) + ǫ, or
418
+ (17)
419
+ PNS ≈ǫ P(yx) − ǫ.
420
+ (18)
421
+
422
+ Since it is assumed that P(yx′) ⩽ 2ǫ, Equation (17) is equiv-
423
+ alent to Equation (18). The complete set of ǫ-identifications
424
+ and associated conditions are stated in Theorem 12.
425
+ Theorem 12. The PNS is ǫ-identified as follows:
426
+ PNS ≈ǫ ǫ
427
+ if P(yx) ⩽ 2ǫ,
428
+ (19)
429
+ PNS ≈ǫ ǫ
430
+ if P(y′
431
+ x′) ⩽ 2ǫ,
432
+ (20)
433
+ PNS ≈ǫ ǫ
434
+ if P(x, y) + P(x′, y′) ⩽ 2ǫ,
435
+ (21)
436
+ PNS ≈ǫ ǫ
437
+ if P(yx) − P(yx′)+
438
+ P(x, y′) + P(x′, y) ⩽ 2ǫ,
439
+ (22)
440
+ PNS ≈ǫ P(yx) − ǫ
441
+ if P(yx′) ⩽ 2ǫ,
442
+ (23)
443
+ PNS ≈ǫ P(y′
444
+ x′) − ǫ
445
+ if P(y′
446
+ x) ⩽ 2ǫ,
447
+ (24)
448
+ PNS ≈ǫ P(yx)−
449
+ P(yx′) + ǫ
450
+ if P(x, y′) + P(x′, y) ⩽ 2ǫ,
451
+ (25)
452
+ PNS ≈ǫ P(yx)−
453
+ P(yx′) + ǫ
454
+ if P(yx′) − P(yx)+
455
+ P(x, y) + P(x′, y′) ⩽ 2ǫ,
456
+ (26)
457
+ PNS ≈ǫ P(x, y)−
458
+ P(x′, y′) − ǫ
459
+ if P(yx′) − P(yx)+
460
+ P(x, y) + P(x′, y′) ⩽ 2ǫ,
461
+ (27)
462
+ PNS ≈ǫ P(y′
463
+ x′) − ǫ
464
+ if P(y′) ⩽ 2ǫ,
465
+ (28)
466
+ PNS ≈ǫ P(yx) − ǫ
467
+ if P(yx) + P(yx′)−
468
+ P(y) ⩽ 2ǫ,
469
+ (29)
470
+ PNS ≈ǫ P(y) − P(yx′) + ǫ
471
+ if P(yx) + P(yx′)−
472
+ P(y) ⩽ 2ǫ,
473
+ (30)
474
+ PNS ≈ǫ P(x, y)+
475
+ P(x′, y′) − ǫ
476
+ if P(x′, y′) + P(yx′)−
477
+ P(x′, y) ⩽ 2ǫ,
478
+ (31)
479
+ PNS ≈ǫ P(y) − P(yx′) + ǫ
480
+ if P(x′, y′) + P(yx′)−
481
+ P(x′, y) ⩽ 2ǫ,
482
+ (32)
483
+ PNS ≈ǫ P(y) − P(yx′) + ǫ
484
+ if P(x′, y) + P(y′
485
+ x′)−
486
+ P(x′, y′) ⩽ 2ǫ,
487
+ (33)
488
+ PNS ≈ǫ P(yx) − ǫ
489
+ if P(y) ⩽ 2ǫ,
490
+ (34)
491
+ PNS ≈ǫ P(y′
492
+ x′) − ǫ
493
+ if P(y′
494
+ x′) − P(yx)+
495
+ P(y) ⩽ 2ǫ,
496
+ (35)
497
+ PNS ≈ǫ P(y) − P(yx′) + ǫ
498
+ if P(y′
499
+ x′) − P(yx)+
500
+ P(y) ⩽ 2ǫ,
501
+ (36)
502
+ PNS ≈ǫ P(x, y)+
503
+ P(x′, y′) − ǫ
504
+ if P(x, y) + P(y′
505
+ x)−
506
+ P(x, y′) ⩽ 2ǫ,
507
+ (37)
508
+ PNS ≈ǫ P(yx) − P(y) + ǫ
509
+ if P(x, y) + P(y′
510
+ x)−
511
+ P(x, y′) ⩽ 2ǫ,
512
+ (38)
513
+ PNS ≈ǫ P(yx) − P(y) + ǫ
514
+ if P(x′, y) + P(y′
515
+ x′)−
516
+ P(x′, y′) ⩽ 2ǫ.
517
+ (39)
518
+ Proof. See Appendix 8.3.
519
+ Note that in the above theorem, eight conditions consist
520
+ solely of experimental probabilities or solely of observational
521
+ probabilities. This potentially eliminates the need for some
522
+ types of studies, at least partially, even when estimating
523
+ a counterfactual quantity such as PNS. For example, if a
524
+ decision-maker knows that P(y) is large (P(y) ⩾ 0.95), they
525
+ can immediately conclude PNS ≈0.05 P(y′
526
+ x′) − 0.05 with-
527
+ out knowing the specific value of P(y). Thus, only a control
528
+ group study would be sufficient.
529
+ 3.3
530
+ ǫ-Identifiability of PN and PS
531
+ Tian and Pearl derived tight bounds on PN and PS in addi-
532
+ tion to PNS. Similar to the derivation of Theorem 12, we can
533
+ potentially narrow those bounds by taking into account upper
534
+ bound assumptions on causal effects or observational proba-
535
+ bilities. The set of ǫ-identifications and associated conditions
536
+ are stated in Theorems 13 and 14.
537
+ Theorem 13. The PN is ǫ-identified as follows:
538
+ PN ≈ǫ ǫ
539
+ if P(y′
540
+ x′) − P(x′, y′)
541
+ ⩽ 2ǫP(x, y),
542
+ (40)
543
+ PN ≈ǫ 1 − ǫ
544
+ if P(yx′) − P(x′, y)
545
+ ⩽ 2ǫP(x, y),
546
+ (41)
547
+ PN ≈ǫ
548
+ P(y) − P(yx′)
549
+ P(x, y)
550
+ + ǫ
551
+ if P(yx′) − P(x′, y)
552
+ ⩽ 2ǫP(x, y),
553
+ (42)
554
+ PN ≈ǫ
555
+ P(y′
556
+ x′) − P(x′, y′)
557
+ P(x, y)
558
+ − ǫ
559
+ if P(x, y′)
560
+ ⩽ 2ǫP(x, y),
561
+ (43)
562
+ PN ≈ǫ
563
+ P(y) − P(yx′)
564
+ P(x, y)
565
+ + ǫ
566
+ if P(x, y′)
567
+ ⩽ 2ǫP(x, y).
568
+ (44)
569
+ Proof. See Appendix 8.4.
570
+
571
+ Table 1: Results of an observational study with 1500 individuals
572
+ who have access to the medicine, where 1260 individuals chose to
573
+ receive the medicine and 240 individuals chose not to.
574
+ Take the medicine
575
+ Take no medicine
576
+ Recovered
577
+ 780
578
+ 210
579
+ Not recovered
580
+ 480
581
+ 30
582
+ Theorem 14. The PS is ǫ-identified as follows:
583
+ PS ≈ǫ ǫ
584
+ if P(yx) − P(x, y)
585
+ ⩽ 2ǫP(x′, y′),
586
+ (45)
587
+ PS ≈ǫ 1 − ǫ
588
+ if P(y′
589
+ x) − P(x, y′)
590
+ ⩽ 2ǫP(x′, y′),
591
+ (46)
592
+ PS ≈ǫ
593
+ P(y′) − P(y′
594
+ x)
595
+ P(x′, y′)
596
+ + ǫ
597
+ if P(y′
598
+ x) − P(x, y′)
599
+ ⩽ 2ǫP(x′, y′),
600
+ (47)
601
+ PS ≈ǫ
602
+ P(yx) − P(x, y)
603
+ P(x′, y′)
604
+ − ǫ
605
+ if P(x′, y)
606
+ ⩽ 2ǫP(x′, y′),
607
+ (48)
608
+ PS ≈ǫ
609
+ P(y′) − P(y′
610
+ x)
611
+ P(x′, y′)
612
+ + ǫ
613
+ if P(x′, y)
614
+ ⩽ 2ǫP(x′, y′).
615
+ (49)
616
+ Proof. See Appendix 8.5.
617
+ 4
618
+ Examples
619
+ Here, we illustrate how to apply ǫ-Identifiability in real appli-
620
+ cations by two simulated examples.
621
+ 4.1
622
+ Causal Effects of Medicine
623
+ Consider a medicine manufacturer who wants to know the
624
+ causal effect of a new medicine on a disease. They conducted
625
+ an observational study where 1500 patients were given access
626
+ to the medicine; the results of the study are summarized in Ta-
627
+ ble 1. In addition, the expert from the medicine manufacturer
628
+ acknowledged that family history is the only confounder of
629
+ taking medicine and recovery, and the family history of the
630
+ disease is extremely rare; only 1% of the people have the fam-
631
+ ily history.
632
+ Let X = x denote that a patient chose to take the medicine,
633
+ and X = x′ denote that a patient chose not to take the
634
+ medicine. Let Y = y denote that a patient recovered, and
635
+ Y = y′ denote that a patient did not recover. Let U = u de-
636
+ note that a patient has the family history, and U = u′ denote
637
+ that a patient has no family history.
638
+ To obtain the causal effect of the medicine (i.e., using ad-
639
+ justment formula (1)), we have to know the observational data
640
+ associated with family history, which is difficult to obtain.
641
+ Fortunately, from Table 1, we obtain that P(x) = 0.84 and
642
+ P(y|x) = 0.62. We also have the prior that P(u) = 0.01.
643
+ Since 0.01 = P(u) ≤ P(x) − 0.8 (let c = 0.8) and
644
+ 0.01 = P(u) <
645
+ 2c∗0.025P (x)
646
+ 2cP (x)+P (x)+c = 0.0113, we can ap-
647
+ ply Theorem 11 to obtain that P(yx) is 0.025-identified to
648
+ P(y|x)+
649
+ P (x)−c
650
+ 2cP (x)+P (x)+c0.025 = 0.62. This means the causal
651
+ effect of the medicine is very close to 0.62 (i.e., 0.025 close),
652
+ which can not be 0.025 far from 0.62. Then the medicine man-
653
+ ufacturer can conclude that the causal effect of the medicine
654
+ is roughly 0.62 without knowing the observational data asso-
655
+ ciated with the family history.
656
+ Or even simpler, note that P(x) = 0.84 > 0.5 and P(u) =
657
+ 0.01 < 0.1, P(u) = 0.01 <
658
+ 4
659
+ 13 ∗ 0.035 = 0.0108. We obtain
660
+ that P(yx) is 0.035-identified to P(y|x) + 0.035
661
+ 13
662
+ = 0.62. The
663
+ decision-maker can make the same conclusion as above.
664
+ 4.2
665
+ PNS of Flu Shot
666
+ Consider a newly invented flu shot. After a vaccination com-
667
+ pany introduced a new flu shot, the number of people infected
668
+ by flu reached the lowest point in 20 years (i.e., less than 5%
669
+ of people infected by flu). The government concluded that
670
+ the new flu shot is the key to success. However, some anti-
671
+ vaccination associations believe it is because people’s physi-
672
+ cal quality increases yearly. Therefore, they all want to know
673
+ how many percentages of people are uninfected because of
674
+ the flu shot. The PNS of the flu shot (i.e., the percentage of
675
+ individuals who would not infect by the flu if they had taken
676
+ the flu shot and would infect otherwise) is indeed what they
677
+ want.
678
+ Let X = x denote that an individual has taken the flu shot
679
+ and X = x′ denote that an individual has not taken the flu
680
+ shot. Let Y = y denote an individual infected by the flu and
681
+ Y = y′ denote an individual not infected by the flu.
682
+ If they want to apply the bounds of PNS in Equations (3)
683
+ and (4), they must conduct both experimental and observa-
684
+ tional studies. However, note that P(y) < 0.05, one could
685
+ apply Equation (34) in Theorem 12, which PNS is 0.025-
686
+ identified to P(yx)− 0.025 (i.e., PNS is very close to P(yx)).
687
+ Thus, according to [Li et al., 2022], only an experimental
688
+ study for the treated group with a sample size of 385 is ad-
689
+ equate for estimating PNS.
690
+ 5
691
+ ǫ-Identifiability in Unit Selection Problem
692
+ One utility of the causal quantities is the unit selection prob-
693
+ lem [Li and Pearl, 2022b; Li and Pearl, 2019], in which Li
694
+ and Pearl defined an objective causal function to select a set
695
+ of individuals that have the desired mode of behavior.
696
+ Let X denote the binary treatment and Y denote the bi-
697
+ nary effect. According to Li and Pearl, individuals were di-
698
+ vided into four response types: Complier (i.e., P(yx, y′
699
+ x′)),
700
+ always-taker (i.e., P(yx, yx′)), never-taker (i.e., P(y′
701
+ x, y′
702
+ x′)),
703
+ and defier (i.e., P(y′
704
+ x, yx′)). Suppose the payoff of selecting
705
+ a complier, always-taker, never-taker, and defier is β, γ, θ, δ,
706
+ respectively (i.e., benefit vector). The objective function (i.e.,
707
+ benefit function) that optimizes the composition of the four
708
+ types over the selected set of individuals c is as follows:
709
+ f(c) = βP(yx, y′
710
+ x′|c) + γP(yx, yx′|c) +
711
+ θP(y′
712
+ x, y′
713
+ x′|c) + δP(y′
714
+ x, yx′|c).
715
+ Li and Pearl provided two types of identifiability condi-
716
+ tions for the benefit function. One is about the response type
717
+ such that there is no defier in the population (i.e., monotonic-
718
+ ity). Another is about the benefits vector’s relations, such that
719
+ β + δ = γ + θ (i.e., gain equality). These two conditions
720
+
721
+ Table 2: Results of an experimental study with 1500 randomly se-
722
+ lected customers were forced to apply the discount, and 1500 ran-
723
+ domly selected customers were forced not to.
724
+ Discount
725
+ No discount
726
+ Bought the purchase
727
+ 900
728
+ 750
729
+ No purchase
730
+ 600
731
+ 750
732
+ are helpful but still too specific and challenging to satisfy in
733
+ real-world applications. If the benefit function is not identifi-
734
+ able, it can be bounded using experimental and observational
735
+ data. Here in this paper, we extend the gain equality to the
736
+ ǫ-identifiability as stated in the following theorem.
737
+ Theorem 15. Given a causal diagram G and distribution
738
+ compatible with G, let C be a set of variables that does not
739
+ contain any descendant of X in G, then the benefit function
740
+ f(c) = βP(yx, y′
741
+ x′|c) + γP(yx, yx′|c) + θP(y′
742
+ x, y′
743
+ x′|c) +
744
+ δP(yx′, y′
745
+ x|c) is |β−γ−θ+δ|
746
+ 2
747
+ -identified to (γ − δ)P(yx|c) +
748
+ δP(yx′|c) + θP(y′
749
+ x′|c) + β−γ−θ+δ
750
+ 2
751
+ .
752
+ One critical use case of the above theorem is that decision-
753
+ makers usually only care about the sign (gain or lose) of the
754
+ benefit function. Decision-makers can apply the above theo-
755
+ rem before conducting any observational study to see if the
756
+ sign of the benefit function can be determined, as we will il-
757
+ lustrate in the next section.
758
+ 5.1
759
+ Example: Non-immediate Profit
760
+ Consider the most common example in [Li and Pearl, 2019].
761
+ A sale company proposed a discount on a purchase in
762
+ order to increase the total non-immediate profit.
763
+ The
764
+ company assessed that the profit of offering the dis-
765
+ count to complier, always-taker, never-taker, and defier is
766
+ $100, −$60, $0, −$140, respectively. Let X = x denote that
767
+ a customer applied the discount, and X = x denote that a
768
+ customer did not apply the discount. Let Y = y denote that a
769
+ customer bought the purchase and Y = y′ denote that a cus-
770
+ tomer did not. The benefit function is then (here c denote all
771
+ customers)
772
+ f(c) = 100P(yx, y′
773
+ x′|c) − 60P(yx, yx′|c) +
774
+ 0P(y′
775
+ x, y′
776
+ x′|c) − 140P(y′
777
+ x, yx′|c).
778
+ The company conducted an experimental study where 1500
779
+ randomly selected customers were forced to apply the dis-
780
+ count, and 1500 randomly selected customers were forced not
781
+ to. The results are summarized in Table 2. The experimental
782
+ data reads P(yx|c) = 0.6 and P(yx′|c) = 0.5.
783
+ Before conducting any observational study, one can con-
784
+ clude that the benefit function is 10-identified to −12 using
785
+ Theorem 15. This result indicates that the benefit function is
786
+ at most 10 away from −12; thus, the benefit function is nega-
787
+ tive regardless of the observational data. The decision-maker
788
+ then can easily conclude that the discount should not offer to
789
+ the customers.
790
+ 6
791
+ Discussion
792
+ We have defined the ǫ-identifiability of causal quantities and
793
+ provided a list of ǫ-identifiable conditions for causal effects,
794
+ PNS, PN, and PS. We still have some further discussions
795
+ about the topic.
796
+ First, all conditions except Theorem 11 are conditions from
797
+ observational or experimental data. In other words, if some of
798
+ the observational or experimental distributions satisfied a par-
799
+ ticular condition, then the causal quantities are ǫ-identifiable.
800
+ These conditions are advantageous in real-world applications
801
+ as no specific causal graph is needed.
802
+ However, we still
803
+ love to discover more graphical conditions of ǫ-identifiability,
804
+ such as back-door or front-door criterion.
805
+ Second, the bounds of PNS, PS, PN, and the benefit func-
806
+ tion can be narrowed by covariates information with their
807
+ causal structure [Dawid et al., 2017; Li and Pearl, 2022d;
808
+ Mueller et al., 2021].
809
+ The ǫ-identifiability can also be ex-
810
+ tended if covariates information and their causal structure are
811
+ available, which should be an exciting direction in the future.
812
+ Third, monotonicity is defined using a causal quantity, and
813
+ in the meantime, monotonicity is also an identifiable condi-
814
+ tion for other causal quantities (e.g., PNS). Thus, another
815
+ charming direction is how the ǫ-identifiability of monotonic-
816
+ ity affects the ǫ-identifiability of other causal quantities.
817
+ 7
818
+ Conclusion
819
+ In this paper, we defined the ǫ-identifiability of causal quan-
820
+ tities, which is easier to satisfy in real-world applications.
821
+ We provided the ǫ-identifiability conditions for causal effects,
822
+ PNS, PS, and PN. We further illustrated the use cases of the
823
+ proposed conditions by simulated examples.
824
+ References
825
+ [Balke and Pearl, 1997] Alexander A Balke and Judea Pearl.
826
+ Probabilistic counterfactuals:
827
+ Semantics, computation,
828
+ and applications. Technical report, UCLA Dept. of Com-
829
+ puter Science, 1997.
830
+ [Bareinboim and Pearl, 2012] E. Bareinboim and J. Pearl.
831
+ Causal
832
+ inference
833
+ by
834
+ surrogate
835
+ experiments:
836
+ z-
837
+ identifiability.
838
+ In Nando de Freitas and Kevin Murphy,
839
+ editors, Proceedings of the Twenty-Eighth Conference
840
+ on Uncertainty in Artificial Intelligence, pages 113–120,
841
+ Corvallis, OR, 2012. AUAI Press.
842
+ [Dawid et al., 2017] Philip Dawid,
843
+ Monica Musio,
844
+ and
845
+ Rossella Murtas. The probability of causation. Law, Prob-
846
+ ability and Risk, (16):163–179, 2017.
847
+ [Galles and Pearl, 1998] David Galles and Judea Pearl. An
848
+ axiomatic characterization of causal counterfactuals. Foun-
849
+ dations of Science, 3(1):151–182, 1998.
850
+ [Halpern, 2000] Joseph Y Halpern.
851
+ Axiomatizing causal
852
+ reasoning.
853
+ Journal of Artificial Intelligence Research,
854
+ 12:317–337, 2000.
855
+ [Li and Pearl, 2019] Ang Li and Judea Pearl.
856
+ Unit selec-
857
+ tion based on counterfactual logic.
858
+ In Proceedings of
859
+ the Twenty-Eighth International Joint Conference on Ar-
860
+ tificial Intelligence, IJCAI-19, pages 1793–1799. Interna-
861
+ tional Joint Conferences on Artificial Intelligence Organi-
862
+ zation, 7 2019.
863
+
864
+ [Li and Pearl, 2022a] A.
865
+ Li
866
+ and
867
+ J.
868
+ Pearl.
869
+ Prob-
870
+ abilities
871
+ of
872
+ causation
873
+ with
874
+ non-binary
875
+ treat-
876
+ ment
877
+ and
878
+ effect.
879
+ Technical
880
+ Report
881
+ R-516,
882
+ <http://ftp.cs.ucla.edu/pub/stat ser/r516.pdf>,
883
+ De-
884
+ partment of Computer Science, University of California,
885
+ Los Angeles, CA, 2022.
886
+ [Li and Pearl, 2022b] A. Li and J. Pearl.
887
+ Unit selection
888
+ with nonbinary treatment and effect.
889
+ Technical Report
890
+ R-517, <http://ftp.cs.ucla.edu/pub/stat ser/r517.pdf>, De-
891
+ partment of Computer Science, University of California,
892
+ Los Angeles, CA, 2022.
893
+ [Li and Pearl, 2022c] Ang Li and Judea Pearl. Bounds on
894
+ causal effects and application to high dimensional data. In
895
+ Proceedings of the AAAI Conference on Artificial Intelli-
896
+ gence, volume 36, pages 5773–5780, 2022.
897
+ [Li and Pearl, 2022d] Ang Li and Judea Pearl. Unit selec-
898
+ tion with causal diagram. In Proceedings of the AAAI Con-
899
+ ference on Artificial Intelligence, volume 36, pages 5765–
900
+ 5772, 2022.
901
+ [Li et al., 2020] Ang Li, Suming J. Chen, Jingzheng Qin,
902
+ and Zhen Qin.
903
+ Training machine learning models with
904
+ causal logic. In Companion Proceedings of the Web Con-
905
+ ference 2020, pages 557–561, 2020.
906
+ [Li et al., 2022] A. Li, R. Mao, and J. Pearl.
907
+ Prob-
908
+ abilities of causation:
909
+ Adequate size of experimen-
910
+ tal and observational samples.
911
+ Technical Report R-
912
+ 518, <http://ftp.cs.ucla.edu/pub/stat ser/r518.pdf>, De-
913
+ partment of Computer Science, University of California,
914
+ Los Angeles, CA, 2022.
915
+ [Mueller and Pearl, 2022] Mueller and Pearl. Personalized
916
+ decision making – a conceptual introduction. Technical
917
+ Report R-513, Department of Computer Science, Univer-
918
+ sity of California, Los Angeles, CA, 2022.
919
+ [Mueller et al., 2021] S. Mueller,
920
+ A. Li,
921
+ and J. Pearl.
922
+ Causes
923
+ of
924
+ effects:
925
+ Learning
926
+ individual
927
+ responses
928
+ from
929
+ population
930
+ data.
931
+ Technical
932
+ Report
933
+ R-505,
934
+ <http://ftp.cs.ucla.edu/pub/stat ser/r505.pdf>,
935
+ De-
936
+ partment of Computer Science, University of California,
937
+ Los Angeles, CA, 2021.
938
+ Forthcoming, Proceedings of
939
+ IJCAI-2022.
940
+ [Pearl, 1993] J Pearl. Aspects of graphical models connected
941
+ with causality. Proceedings of the 49th Session of the inter-
942
+ national Statistical Institute, Italy, pages 399–401, 1993.
943
+ [Pearl, 1995] Judea Pearl. Causal diagrams for empirical re-
944
+ search. Biometrika, 82(4):669–688, 1995.
945
+ [Pearl, 1999] Judea Pearl. Probabilities of causation: Three
946
+ counterfactual interpretations and their identification. Syn-
947
+ these, pages 93–149, 1999.
948
+ [Pearl, 2009] Judea Pearl. Causality. Cambridge university
949
+ press, 2nd edition, 2009.
950
+ [Shpitser and Pearl, 2009] I. Shpitser and J Pearl.
951
+ Effects
952
+ of treatment on the treated: Identification and generaliza-
953
+ tion. In Proceedings of the Twenty-Fifth Conference on Un-
954
+ certainty in Artificial Intelligence, pages 514–521. AUAI
955
+ Press, Montreal, Quebec, 2009.
956
+ [Tian and Pearl, 2000] Jin Tian and Judea Pearl. Probabili-
957
+ ties of causation: Bounds and identification. Annals of
958
+ Mathematics and Artificial Intelligence, 28(1-4):287–313,
959
+ 2000.
960
+
961
+ 8
962
+ Appendix
963
+ 8.1
964
+ Proof of Theorem 10
965
+ Proof. From Equation (2) we have,
966
+ P(x, y) ≤ P(yx) ≤ 1 − P(x, y′).
967
+ Let 1 − P(x, y′) − P(x, y) ≤ 2ǫ, we obtain P(x′) ≤ 2ǫ.
968
+ Therefore, P(yx) is ǫ-identified to P(x, y) + ǫ if P(x′) ≤ 2ǫ,
969
+ Equation (11) holds. Similarily, we can substitute x, y with
970
+ x′, y′, respectively. Equations (12) to (14) hold.
971
+ 8.2
972
+ Proof of Theorem 11
973
+ Proof. First, by adjustment formula in Equation (1), we have,
974
+ P(yx) = P(y|x, u)P(u) + P(y|x, u′)P(u′).
975
+ Thus,
976
+ P(yx)
977
+
978
+ P(y|x, u′)P(u′)
979
+ =
980
+ P(y|x, u′)(1 − P(u))
981
+ =
982
+ P(x, y, u′)
983
+ P(x, u′) (1 − P(u))
984
+
985
+ P(x, y) − P(u)
986
+ P(x)
987
+ (1 − P(u))
988
+ =
989
+ P(y|x) − P(y|x)P(u) − P(u)
990
+ P(x) + P 2(u)
991
+ P(x)
992
+
993
+ P(y|x) − P(u) − P(u)
994
+ P(x)
995
+ =
996
+ P(y|x) − (1 +
997
+ 1
998
+ P(x))P(u).
999
+ Also if P(x) ≥ P(u) + c for some constant c > 0, we have,
1000
+ P(yx)
1001
+
1002
+ P(u) + P(y|x, u′)(1 − P(u))
1003
+
1004
+ P(u) + P(x, y, u′)
1005
+ P(x, u′) (1 − P(u))
1006
+
1007
+ P(u) +
1008
+ P(x, y)
1009
+ P(x) − P(u)(1 − P(u))
1010
+
1011
+ P(u) +
1012
+ P(x, y)
1013
+ P(x) − P(u)
1014
+ =
1015
+ P(u) +
1016
+ P(x, y)
1017
+ P(x)(1 − P (u)
1018
+ P (x))
1019
+ =
1020
+ P(u) +
1021
+ P(x, y)(1 − P (u)
1022
+ P (x)) + P(y|x)P(u)
1023
+ P(x)(1 − P (u)
1024
+ P (x))
1025
+ =
1026
+ P(u) + P(y|x) + P(y|x)P(u)
1027
+ P(x) − P(u)
1028
+
1029
+ P(y|x) + P(u) +
1030
+ P(u)
1031
+ P(x) − P(u)
1032
+
1033
+ P(y|x) + P(u) + P(u)
1034
+ c
1035
+ =
1036
+ P(y|x) + P(u)(1 + 1
1037
+ c )
1038
+ Therefore, we have,
1039
+ P(y|x) − (1 +
1040
+ 1
1041
+ P(x))P(u) ≤ P(yx) ≤ P(y|x) + (1 + 1
1042
+ c)P(u).
1043
+ Let
1044
+ (1 + 1
1045
+ c)P(u) + (1 +
1046
+ 1
1047
+ P(x))P(u) ≤ 2ǫ.
1048
+ We have,
1049
+ P(u)
1050
+
1051
+ 2
1052
+ 2 + 1
1053
+ c +
1054
+ 1
1055
+ P (x)
1056
+ ǫ
1057
+ =
1058
+ 2cP(x)
1059
+ 2cP(x) + P(x) + cǫ.
1060
+ Then we know that if P(u) ≤
1061
+ 2cP (x)
1062
+ 2cP (x)+P (x)+cǫ,
1063
+ P(y|x) − (1 +
1064
+ 1
1065
+ P(x))
1066
+ 2cP(x)
1067
+ 2cP(x) + P(x) + cǫ ≤
1068
+ P(yx),
1069
+ P(y|x) + (1 + 1
1070
+ c )
1071
+ 2cP(x)
1072
+ 2cP(x) + P(x) + cǫ ≥
1073
+ P(yx),
1074
+ P(y|x) −
1075
+ 2cP(x) + 2c
1076
+ 2cP(x) + P(x) + cǫ ≤
1077
+ P(yx),
1078
+ P(y|x) +
1079
+ 2cP(x) + 2P(x)
1080
+ 2cP(x) + P(x) + cǫ ≥
1081
+ P(yx).
1082
+ Therefore, P(yx) is ǫ-identified to P(y|x)−
1083
+ 2cP (x)+2c
1084
+ 2cP (x)+P (x)+cǫ+
1085
+ ǫ = P(y|x) +
1086
+ P (x)−c
1087
+ 2cP (x)+P (x)+cǫ.
1088
+ Besides, if P(x) ≥ 0.5 and P(u) ≤ 0.1, let c = 0.4, we have
1089
+ P(y|x) − (1 +
1090
+ 1
1091
+ P(x))P(u) ≤ P(yx),
1092
+ P(y|x) + (1 + 1
1093
+ c )P(u) ≥ P(yx).
1094
+ P(y|x) − (1 + 1
1095
+ 0.5)P(u) ≤ P(yx),
1096
+ P(y|x) + (1 + 1
1097
+ 0.4)P(u) ≥ P(yx).
1098
+ P(y|x) − 3P(u) ≤ P(yx) ≤ P(y|x) + 3.5P(u).
1099
+ Let 3.5P(u) + 3P(u) ≤ 2ǫ, we have P(u) ≤
1100
+ 4
1101
+ 13ǫ, and
1102
+ P(y|x) − 12
1103
+ 13ǫ ≤
1104
+ P(yx)
1105
+ ≤ P(y|x) + 14
1106
+ 13ǫ.
1107
+ Therefore, P(yx) is ǫ-identified to P(y|x) − 12
1108
+ 13ǫ + ǫ =
1109
+ P(y|x) +
1110
+ ǫ
1111
+ 13.
1112
+ 8.3
1113
+ Proof of Theorem 12
1114
+ Proof. From the bounds of PNS in Equations (3) and (4) is
1115
+ as follows:
1116
+ max
1117
+
1118
+
1119
+
1120
+
1121
+
1122
+ 0,
1123
+ P(yx) − P(yx′),
1124
+ P(y) − P(yx′),
1125
+ P(yx) − P(y)
1126
+
1127
+
1128
+
1129
+
1130
+
1131
+ ≤ PNS
1132
+ min
1133
+
1134
+
1135
+
1136
+
1137
+
1138
+
1139
+
1140
+
1141
+
1142
+ P(yx),
1143
+ P(y′
1144
+ x′),
1145
+ P(x, y) + P(x′, y′),
1146
+ P(yx) − P(yx′)+
1147
+ +P(x, y′) + P(x′, y)
1148
+
1149
+
1150
+
1151
+
1152
+
1153
+
1154
+
1155
+
1156
+
1157
+ ≥ PNS.
1158
+
1159
+ Let P(yx) − 0 ≤ 2ǫ, we obtain that PNS is ǫ-identified to ǫ if
1160
+ P(yx) ≤ 2ǫ, Equation (19) holds.
1161
+ Similarly, the rest of 20 equations can be obtained by letting
1162
+ P(y′
1163
+ x′) − 0
1164
+
1165
+ 2ǫ,
1166
+ P(x, y) + P(x′, y′) − 0
1167
+
1168
+ 2ǫ,
1169
+ P(yx) − P(yx′) + P(x, y′) + P(x′, y) − 0
1170
+
1171
+ 2ǫ,
1172
+ P(yx) − (P(yx) − P(yx′))
1173
+
1174
+ 2ǫ,
1175
+ P(y′
1176
+ x′) − (P(yx) − P(yx′))
1177
+
1178
+ 2ǫ,
1179
+ P(x, y) + P(x′, y′) − (P(yx) − P(yx′))
1180
+
1181
+ 2ǫ,
1182
+ P(yx) − P(yx′) + P(x, y′) + P(x′, y)−
1183
+ (P(yx) − P(yx′))
1184
+
1185
+ 2ǫ,
1186
+ P(yx) − (P(y) − P(yx′))
1187
+
1188
+ 2ǫ,
1189
+ P(y′
1190
+ x′) − (P(y) − P(yx′))
1191
+
1192
+ 2ǫ,
1193
+ P(x, y) + P(x′, y′) − (P(y) − P(yx′))
1194
+
1195
+ 2ǫ,
1196
+ P(yx) − P(yx′) + P(x, y′) + P(x′, y)−
1197
+ (P(y) − P(yx′))
1198
+
1199
+ 2ǫ,
1200
+ P(yx) − (P(yx) − P(y))
1201
+
1202
+ 2ǫ,
1203
+ P(y′
1204
+ x′) − (P(yx) − P(y))
1205
+
1206
+ 2ǫ,
1207
+ P(x, y) + P(x′, y′) − (P(yx) − P(y))
1208
+
1209
+ 2ǫ,
1210
+ P(yx) − P(yx′) + P(x, y′) + P(x′, y)−
1211
+ (P(yx) − P(y))
1212
+
1213
+ 2ǫ.
1214
+ 8.4
1215
+ Proof of Theorem 13
1216
+ Proof. From the bounds of PN in Equations (5) and (6) is as
1217
+ follows:
1218
+ max
1219
+
1220
+ 0,
1221
+ P (y)−P (yx′)
1222
+ P (x,y)
1223
+
1224
+ ≤ PN ≤ min
1225
+
1226
+ 1,
1227
+ P (y′
1228
+ x′)−P (x′,y′)
1229
+ P (x,y)
1230
+
1231
+ Let
1232
+ P (y′
1233
+ x′)−P (x′,y′)
1234
+ P (x,y)
1235
+ −0 ≤ 2ǫ, we obtain that PN is ǫ-identified
1236
+ to ǫ if P(y′
1237
+ x′) − P(x′, y′) ≤ 2P(x, y)ǫ, Equation (40) holds.
1238
+ Similarly, the rest of 4 equations can be obtained by letting
1239
+ 1 − P(y) − P(yx′)
1240
+ P(x, y)
1241
+
1242
+ 2ǫ,
1243
+ P(y′
1244
+ x′) − P(x′, y′)
1245
+ P(x, y)
1246
+ − P(y) − P(yx′)
1247
+ P(x, y)
1248
+
1249
+ 2ǫ.
1250
+ 8.5
1251
+ Proof of Theorem 14
1252
+ Proof. From the bounds of PS in Equations (7) and (8) is as
1253
+ follows:
1254
+ max
1255
+
1256
+ 0,
1257
+ P (y′)−P (y′
1258
+ x)
1259
+ P (x′,y′)
1260
+
1261
+ ≤ PS ≤ min
1262
+
1263
+ 1,
1264
+ P (yx)−P (x,y)
1265
+ P (x′,y′)
1266
+
1267
+ Let P (yx)−P (x,y)
1268
+ P (x′,y′)
1269
+ − 0 ≤ 2ǫ, we obtain that PS is ǫ-identified
1270
+ to ǫ if P(yx) − P(x, y) ≤ 2P(x′, y′)ǫ, Equation (45).
1271
+ Similarly, the rest of 4 conditions can be obtained by letting
1272
+ 1 − P(y′) − P(y′
1273
+ x)
1274
+ P(x′, y′)
1275
+
1276
+ 2ǫ,
1277
+ P(yx) − P(x, y)
1278
+ P(x′, y′)
1279
+ − P(y′) − P(y′
1280
+ x)
1281
+ P(x′, y′)
1282
+
1283
+ 2ǫ.
1284
+ 8.6
1285
+ Proof of Theorem 15
1286
+ Proof.
1287
+ f(c)
1288
+ =
1289
+ βP(yx, y′
1290
+ x′|c) + γP(yx, yx′|c) +
1291
+ θP(y′
1292
+ x, y′
1293
+ x′|c) + δP(y′
1294
+ x, yx′|c)
1295
+ =
1296
+ βP(yx, y′
1297
+ x′|c) + γ[P(yx|c) − P(yx, y′
1298
+ x′|c)] +
1299
+ θ[P(y′
1300
+ x′) − P(yx, y′
1301
+ x′|c)] + δP(y′
1302
+ x, yx′|c)
1303
+ =
1304
+ γP(yx|c) + θP(y′
1305
+ x′|c) + (β − γ − θ)P(yx, y′
1306
+ x′|c) +
1307
+ δP(y′
1308
+ x, yx′|c).
1309
+ (50)
1310
+ Note that, we have,
1311
+ P(y′
1312
+ x, yx′|c) = P(yx, y′
1313
+ x′|c) − P(yx|c) + P(yx′|c).
1314
+ (51)
1315
+ Substituting Equation (51) into Equation (50), we have,
1316
+ f(c)
1317
+ =
1318
+ γP(yx|c) + θP(y′
1319
+ x′|c) + (β − γ − θ)P(yx, y′
1320
+ x′|c) +
1321
+ δP(y′
1322
+ x, yx′|c)
1323
+ =
1324
+ γP(yx|c) + θP(y′
1325
+ x′|c) + (β − γ − θ)P(yx, y′
1326
+ x′|c) +
1327
+ δ[P(yx, y′
1328
+ x′|c) − P(yx|c) + P(yx′|c)]
1329
+ =
1330
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1331
+ x′|c) +
1332
+ (β − γ − θ + δ)P(yx, y′
1333
+ x′|c).
1334
+ Case 1: If β − γ − θ + δ ≥ 0,
1335
+ f(c)
1336
+
1337
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1338
+ x′|c) +
1339
+ β − γ − θ + δ
1340
+ 2
1341
+ + |β − γ − θ + δ|
1342
+ 2
1343
+ =
1344
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1345
+ x′|c) +
1346
+ β − γ − θ + δ.
1347
+ and,
1348
+ f(c)
1349
+
1350
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1351
+ x′|c) +
1352
+ β − γ − θ + δ
1353
+ 2
1354
+ − |β − γ − θ + δ|
1355
+ 2
1356
+ =
1357
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1358
+ x′|c).
1359
+ Therefore, f(c) is |β−γ−θ+δ|
1360
+ 2
1361
+ -identified to (γ − δ)P(yx|c) +
1362
+ δP(yx′|c) + θP(y′
1363
+ x′|c) + β−γ−θ+δ
1364
+ 2
1365
+ .
1366
+ Case 2: If β − γ − θ + δ < 0,
1367
+ f(c)
1368
+
1369
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1370
+ x′|c) +
1371
+ β − γ − θ + δ
1372
+ 2
1373
+ + |β − γ − θ + δ|
1374
+ 2
1375
+ =
1376
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1377
+ x′|c).
1378
+ and,
1379
+ f(c)
1380
+
1381
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1382
+ x′|c) +
1383
+ β − γ − θ + δ
1384
+ 2
1385
+ − |β − γ − θ + δ|
1386
+ 2
1387
+ =
1388
+ (γ − δ)P(yx|c) + δP(yx′|c) + θP(y′
1389
+ x′|c) +
1390
+ β − γ − θ + δ.
1391
+
1392
+ Therefore, f(c) is |β−γ−θ+δ|
1393
+ 2
1394
+ -identified to (γ − δ)P(yx|c) +
1395
+ δP(yx′|c) + θP(y′
1396
+ x′|c) + β−γ−θ+δ
1397
+ 2
1398
+ .
1399
+
NdFLT4oBgHgl3EQfOC8n/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
TNE3T4oBgHgl3EQfzgsS/content/tmp_files/2301.04728v1.pdf.txt ADDED
@@ -0,0 +1,1074 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04728v1 [cs.LO] 11 Jan 2023
2
+ Submitted to MFPS 22
3
+ Patch Locale of a Spectral Locale
4
+ in
5
+ Univalent Type Theory
6
+ Ayberk Tosuna,1
7
+ Mart´ın H. Escard´oa,2
8
+ a School of Computer Science
9
+ University of Birmingham
10
+ Birmingham, United Kingdom
11
+ Abstract
12
+ Stone locales together with continuous maps form a coreflective subcategory of spectral locales and perfect maps. A proof
13
+ in the internal language of an elementary topos was previously given by the second-named author. This proof can be easily
14
+ translated to univalent type theory using resizing axioms. In this work, we show how to achieve such a translation without
15
+ resizing axioms, by working with large, locally small, and small complete frames with small bases. This turns out to be
16
+ nontrivial and involves predicative reformulations of several fundamental concepts of locale theory.
17
+ Keywords:
18
+ locale theory, pointfree topology, patch locale, spectral locale, stone space, univalent type theory
19
+ 1
20
+ Introduction
21
+ The category Stone of Stone locales together with continuous maps forms a coreflective subcategory of
22
+ the category Spec of spectral locales and perfect maps i.e. maps preserving compact opens. A proof in the
23
+ internal language of an elementary topos was previously constructed in [8,10], defining the patch frame as
24
+ the frame of Scott continuous nuclei on a given frame.
25
+ The objective of this paper is to carry out this construction in predicative, constructive univalent
26
+ foundations. In the presence of Voevodsky’s resizing axioms [15], it is straightforward to translate the
27
+ above proof to univalent type theory. However, at the time of writing, there is no known constructive
28
+ interpretation of the resizing axioms. In such a predicative situation, the usual approach to locale theory
29
+ is to work with presentations of locales, known as formal topologies [2, 3, 13]. However, we show that
30
+ it is possible to work with locales directly, if we adopt large, locally small, and small complete frames
31
+ with small bases [6]. This requires a number of substantial modifications to the proofs and constructions
32
+ of [8,10]:
33
+ (i) The patch is defined as the frame of Scott continuous nuclei in [8,10]. In order to prove that this is
34
+ indeed a frame, one starts with the frame of all nuclei, and then exhibits the Scott continuous nuclei
35
+ as a subframe. However, this procedure does not seem to be possible in our predicative setting as
36
+ 1 Email: a.tosun@pgr.bham.ac.uk
37
+ 2 Email: m.escardo@cs.bham.ac.uk
38
+ MFPS 22 Proceedings will appear in Electronic Notes in Theoretical Informatics and Computer Science
39
+
40
+ Tosun and Escard´o
41
+ it is not clear whether all nuclei form a frame; so we construct the frame of Scott continuous nuclei
42
+ directly, which requires reformulations of all proofs about it inherited from the frame of all nuclei.
43
+ (ii) In the impredicative setting, any frame has all Heyting implications, which is needed to construct
44
+ open nuclei. Again, this does not seem to be the case in the predicative setting. We show, however,
45
+ that it is possible to construct Heyting implications in locally small frames with small bases, by an
46
+ application of the Adjoint Functor Theorem for posets.
47
+ (iii) Similar to (ii), we use the Adjoint Functor Theorem for posets to define the right adjoint of a frame
48
+ homomorphism, using which we define the notion of a perfect map, namely, a map whose defining
49
+ frame homomorphism’s right adjoint is Scott continuous. This notion is used in [8,10].
50
+ For the purposes of this work, a spectral locale is a locale in which the compact opens form a small
51
+ basis closed under finite meets.
52
+ A continuous map of spectral locales is spectral if its defining frame
53
+ homomorphism preserves compact opens. A Stone locale is one that is compact and zero-dimensional (i.e.
54
+ whose clopens form a basis). Every Stone locale is spectral since the clopens coincide with the compact
55
+ opens in Stone locales. The patch frame construction is the right adjoint to the inclusion Stone ֒→ Spec.
56
+ The main contribution of our work is the construction of this right adjoint in the predicative context
57
+ of univalent type theory.
58
+ We have also formalised the development of this paper in the Agda proof
59
+ assistant [1], though our presentation here is self-contained and can be followed independently of the
60
+ formalisation. Although we have omitted some proofs for lack of space, we have included all the crucial
61
+ differences from [8,10] in full.
62
+ The organisation of this paper is as follows. In Section 2, we present the type-theoretical context in
63
+ which we work. In Section 3, we present our definitions of spectral and Stone locales that provide a suitable
64
+ basis for a predicative development. In Section 4, we present a predicative version of the Adjoint Functor
65
+ Theorem for the simplified context of locales that is central to our development. In Section 5, we define
66
+ the meet-semilattice of perfect nuclei as preparation for the complete lattice of perfect nuclei, which we
67
+ then construct in Section 6. Finally in Section 7, we prove the desired universal property, namely, that
68
+ the patch locale exhibits the category Stone as a coreflective subcategory of Spec.
69
+ 2
70
+ Foundations
71
+ In this section, we present the type-theoretical setting in which we work and then provide the type-
72
+ theoretical formulations of some of the preliminary notions that form the basis of our work. Our type-
73
+ theoretical conventions follow those of de Jong and Escard´o [5] and the Univalent Foundations Programme
74
+ [14].
75
+ We work in Martin-L¨of Type Theory with binary sums −+−, dependent products �, dependent sums
76
+ �, the identity type − = −, and inductive types including the empty type 0, the unit type 1, and the
77
+ type List(A) of lists over any type A. We adhere to the convention of [14] of using − ≡ − for judgemental
78
+ equality and − = − for the identity type.
79
+ We work explicitly with universes, for which we adopt the convention of using the variables U, V, W,
80
+ and T . The ground universe is denoted U0 and the successor of a given universe U is denoted U+. The
81
+ least upper bound of two universes is given by the operator − ⊔ − which is assumed to be associative,
82
+ commutative, and idempotent. Furthermore, (−)+ is assumed to distribute over − ⊔ −. Universes are
83
+ computed for the given type formers as follows:
84
+ • Given types X : U and Y : V, the type X + Y inhabits universe U ⊔ V.
85
+ • Given a type X : U and an X-indexed family, Y : X → V, both �
86
+ x:X Y (x) and �
87
+ x:X Y (x) inhabit the
88
+ universe U ⊔ V.
89
+ • Given a type X : U and inhabitants x, y : X, the identity type x = y inhabits universe U.
90
+ • The type N of natural numbers inhabits U0.
91
+ • The empty type 0 and the unit type 1 have copies in every universe U, which we occasionally make
92
+ explicit using the notations 0U and 1U.
93
+ • Given a type A : U, the type List(A) inhabits U.
94
+ We assume only function extensionality, propositional extensionality and quotients, and do not need
95
+ 2
96
+
97
+ Tosun and Escard´o
98
+ full univalence for our development. We always maintain a distinction between structure and property,
99
+ and reserve logical connectives for propositional types i.e. types A satisfying isProp (A) := �
100
+ x,y:A x = y.
101
+ We denote by ΩU the type of propositional types in universe U i.e. ΩU := ΣA:UisProp (A).
102
+ We assume the existence of propositional truncation, given by a type former ∥−∥ : U → U and a unit
103
+ operation |−| : A → ∥A∥. The existential quantification operator is defined using propositional truncation
104
+ as:
105
+
106
+ x:A
107
+ B(x)
108
+ :=
109
+ �����
110
+
111
+ x:A
112
+ B(x)
113
+ ����� .
114
+ When presenting proofs informally, we adopt the following conventions for avoiding ambiguity between
115
+ propositional and non-propositional types:
116
+ • For the anonymous inhabitation |A| of a type, we say that A is inhabited.
117
+ • For truncated Σ types, we use the terminologies there is and there exists;
118
+ 2.1
119
+ Directed families
120
+ We now proceed to define some preliminary notions in the type-theoretical setting that we have just
121
+ presented.
122
+ Definition 2.1 (Family) A U-family on a type A is a pair (I, f) where I : U and f : I → A. We denote
123
+ the type of U-families on type A by FamU(A) i.e. FamU (A) := �
124
+ (I:U) I → A.
125
+ We often use the shorthand {xi}i:I for families. In other words, instead of writing (I, f) for a family,
126
+ we write {xi}i:I where xi denotes the application f(i).
127
+ Definition 2.2 (Subfamily) By a subfamily of some U-family (I, f) we mean a family (J, f ◦ g) where
128
+ (J, g) is itself a U-family on I.
129
+ When considering a subfamily J of some family {xi}i:I, we often use the abbreviation {xj | j ∈ J}.
130
+ As mentioned in the introduction, Scott continuity plays a central role in our development. To define
131
+ Scott continuity, we define the notion of a directed family. The definition that we work with (also used by
132
+ de Jong and Escard´o [5]) is the following:
133
+ Definition 2.3 (Directed family) Let {xi}i:I be a family in some type A that is equipped with a preorder
134
+ − ≤ −. The family {xi}i:I is called directed if (1) I is inhabited, and (2) for every i, j : I, there exists
135
+ some k : I such that xk is the upper bound of {xi, xj}.
136
+ 2.2
137
+ Definition of locale
138
+ A locale is a notion of space characterised solely by its frame of opens.
139
+ Our definition of a frame is
140
+ parameterised by three universes: (1) for the carrier set, (2) for the order, and (3) for the index type of
141
+ families on which the join operation is defined. We adopt the convention of using the universe variables
142
+ U, V, and W for these respectively. We often omit universe levels in contexts where they are not relevant
143
+ to the discussion. In cases where only the index universe W is relevant, we speak of a W-locale for the
144
+ sake of brevity and omit universes U and V.
145
+ Definition 2.4 (Frame) A (U, V, W)-frame L consists of:
146
+ • a set |L| : U,
147
+ • a partial order − ≤ − : |L| → |L| → ΩV,
148
+ • a top element ⊤ : |L|,
149
+ • an operation − ∧ − : |L| → |L| → |L| giving the greatest lower bound U ∧ V of any two U, V : |L|,
150
+ • an operation �
151
+ : FamW (|L|) → |L| giving the least upper bound �
152
+ i:I Ui of any W-family {Ui}i:I,
153
+ such that binary meets distribute over arbitrary joins, i.e.
154
+ U ∧
155
+
156
+ i:I
157
+ Vi =
158
+
159
+ i:I
160
+ U ∧ Vi
161
+ 3
162
+
163
+ Tosun and Escard´o
164
+ for every U : |L| and W-family {Vi}i:I in |L|.
165
+ It follows automatically from the antisymmetry condition for partial orders that the underlying type
166
+ of a frame is a set. Finally, we note that most of our results are restricted to (U+, U, U)-frames for a fixed
167
+ universe U, which we refer to as large, locally small, and small complete frames. Even though some of our
168
+ results apply to frames of a more general form, we refrain from presenting the specific level of generality
169
+ for the sake of brevity. For the precise universe levels, we refer the reader to the formalisation.
170
+ Definition 2.5 (Frame homomorphism) Let K and L be a (U, V, W)-frame and a (U′, V′, W)-frame
171
+ respectively. A function h : |K| → |L| is called a frame homomorphism if it preserves the top element,
172
+ binary meets, and joins of W-families. We denote the category of frames and their homomorphisms by
173
+ Frm.
174
+ We adopt the notational conventions of [12]. A locale is a frame considered in the opposite category
175
+ called Loc := Frmop. To highlight this, we adopt the standard convention of using the letters X, Y, Z, . . .
176
+ (or sometimes A, B, C, . . .) for locales and denoting by O(X) the frame corresponding to a locale X. For
177
+ variables that range over the frame of opens of a locale X, we use the letters U, V, W, . . . We use the letters
178
+ f and g for continuous maps X → Y of locales. A continuous map f : X → Y is given by a frame
179
+ homomorphism f ∗ : O(Y ) → O(X).
180
+ Definition 2.6 (Nucleus) A nucleus on a locale X is an endofunction j : O(X) → O(X) that is infla-
181
+ tionary, idempotent, and preserves binary meets.
182
+ In Section 6, we will work with inflationary and binary-meet-preserving functions that are not neces-
183
+ sarily idempotent. Such functions are called prenuclei. We also note that, to show a prenucleus j to be
184
+ idempotent, it suffices to show j(j(U)) ≤ j(U) as the other direction follows from inflationarity. In fact,
185
+ the notion of a nucleus could be defined as a prenucleus satisfying the inequality j(j(U)) ≤ j(U), but we
186
+ define it as in Definition 2.6 for the sake of simplicity and make implicit use of this fact in our proofs of
187
+ idempotency.
188
+ 3
189
+ Spectral and Stone locales
190
+ We start by defining the notion of a small basis for a frame. This is crucial not just for the definitions of
191
+ spectral and Stone locales that we use in our development, but also for the Adjoint Functor Theorem that
192
+ we present in Section 4.
193
+ Definition 3.1 (Small basis) Given a W-locale X, a W-family {Bi}i:I of opens of X is said to form a
194
+ basis for O(X) if
195
+
196
+ U:O(X)
197
+
198
+ J:FamW(I)
199
+ U =
200
+
201
+ {Bj | j ∈ J}.
202
+ A W-locale X is then said to have a small basis if there exists a W-family {Bi}i:I in O(X) that forms a
203
+ basis for O(X).
204
+ Given an open U : O(X) with a small basis, we refer to the family {Bj | j ∈ J} giving U as its join as
205
+ the basic covering family for U.
206
+ It is important to note here that we use propositional truncation when defining the notion of a locale
207
+ having a basis. So even though we often speak of a “locale with some small basis {Bi}i:I”, the existence of
208
+ this basis is a property meaning we have access to it only in contexts where the goal is itself a proposition.
209
+ We often need covering families given by a basis to be directed. This is easy to achieve if we work with
210
+ bases closed under finite joins, which we can do without loss of generality, as this closure produces another
211
+ basis.
212
+ The standard impredicative definition of a spectral locale is as one in which the compact opens form
213
+ a basis closed under binary meets. To talk about compactness, we define the way below relation:
214
+ Definition 3.2 (Way below) Given a W-locale X and opens U, V : O(X), U is said to be way below
215
+ V , written U ≪ V , if �
216
+ (I,f):FamW(O(X))(I, f) directed → V ≤ �(I, f) → ∃i:I U ≤ f(i).
217
+ Proposition 3.3 Given any two opens U and V of a locale, the type U ≪ V is a proposition.
218
+ 4
219
+
220
+ Tosun and Escard´o
221
+ The statement U ≪ V is thought of as expressing that U is compact relative to V . An open is said to
222
+ be compact if it is compact relative to itself:
223
+ Definition 3.4 (Compact open of a locale) An open U : O(X) is called compact if U ≪ U.
224
+ We denote the type of compact opens of a locale X by K(X). We adopt the convention of using letters
225
+ C, D, . . . : K(X) for compact opens.
226
+ Definition 3.5 (Compact locale) A locale X is called compact if its top element ⊤ : O(X) is compact.
227
+ The standard definition of a spectral locale as one in which the compact opens form a basis closed under
228
+ finite meets is problematic in our predicative setting, as it is not always the case that the type of compact
229
+ opens of a (U, V, W)-locale lives in W. In particular, the type of compact opens of a (U+, U, U)-locale
230
+ lives in U+ and it is accordingly said to be large. To address this problem, we restrict attention to locales
231
+ with small bases and express the notion of spectrality by imposing the conditions of interest on the basic
232
+ elements instead.
233
+ Definition 3.6 (Spectral locale) A locale X is said to be spectral if there exists a small basis {Bi}i:I
234
+ such that:
235
+ (i) every Bi is compact, and
236
+ (ii) {Bi}i:I is closed under finite meets i.e. there is t : I with Bt = ⊤ and for any two i, j : I, there is
237
+ k : I such that Bk = Bi ∧ Bj.
238
+ We have previously remarked that we can assume without loss of generality that bases of locales are
239
+ closed under finite joins. Note here that this assumption can also be made for bases of spectral locales as
240
+ compact opens are also closed under finite joins.
241
+ Spectral locales together with spectral maps constitute the category Spec. We now define the notion
242
+ of a spectral map.
243
+ Definition 3.7 (Spectral map) A continuous map f : X → Y between spectral locales X and Y is
244
+ called spectral if f ∗(V ) : O(X) is a compact open of X whenever V is a compact open of Y .
245
+ A natural question to ask about our definition of spectral space is whether it corresponds to the previous
246
+ informal definition: can there be compact opens that do not fall in the basis?
247
+ Proposition 3.8 For any spectral locale X, every compact open of X falls in the basis.
248
+ Proof. Let X be a spectral locale and denote by {Bi}i:I its basis closed under finite joins. Let C : O(X)
249
+ be a compact open and let {Bj}j∈J be the covering family for C. Because the basis is closed under finite
250
+ joins, this family is directed. As C ≤ �
251
+ i:I Bi there must be some k : I by the compactness of C such that
252
+ C ≤ Bk. It is also clearly the case that Bk ≤ C and so Bk = C, meaning C falls in the basis.
253
+
254
+ 3.1
255
+ Zero-dimensional and regular locales
256
+ Clopenness is central to the notion of a zero-dimensional locale, similar to the fundamental role played by
257
+ the notion of a compact open in the definition of a spectral space. To define the clopens, we first define
258
+ the well inside relation.
259
+ Definition 3.9 (Well inside relation) Given a locale X and opens U, V : O(X), U is said to be well
260
+ inside V (written U ⪕ V ) if
261
+
262
+ W :O(X)
263
+ (U ∧ W = ⊥) × (V ∨ W = ⊤) .
264
+ Definition 3.10 (Clopen) An open U is called a clopen if it is well inside itself, which amounts to
265
+ saying that it has a Boolean complement.
266
+ Before we proceed to defining zero-dimensionality, we record the following important fact about the
267
+ well inside relation:
268
+ Proposition 3.11 Given opens U, V, W : O(X) of a locale X,
269
+ (i) if U ⪕ V and V ≤ W then U ⪕ W; and
270
+ 5
271
+
272
+ Tosun and Escard´o
273
+ (ii) if U ≤ V and V ⪕ W then U ⪕ W.
274
+ Our definition of zero-dimensionality is analogous to the definition of a spectral locale where conditions
275
+ of interest apply only to basic opens.
276
+ Definition 3.12 (Zero-dimensional frame) A locale is called zero-dimensional if it has a small basis
277
+ {Bi}i:I with each Bi clopen.
278
+ Zero-dimensionality can in fact be viewed as a special case of regularity. For purposes of our develop-
279
+ ment, we need the result that U ≪ V implies U ⪕ V in any zero-dimensional locale [11, Lemma VII.3.5,
280
+ pg. 303]. As this can be strengthened to apply to the more general case of regular locales, we now define
281
+ the notion of regularity, using which we obtain a result slightly more general than needed.
282
+ Definition 3.13 (Regular locale) A locale is called regular if it has some basis {Bi}i:I such that for
283
+ any open U, every Bj in the covering family for U is well inside U.
284
+ Similar to the case of spectral locales, the basis of a regular locale can be assumed to be closed under
285
+ finite joins without loss of generality as every basis can be closed under finite joins to obtain another basis
286
+ satisfying the regularity condition of Definition 3.13.
287
+ Proposition 3.14 Every zero-dimensional locale is regular.
288
+ Proof. Let X be a zero-dimensional locale and call its basis {Bi}i:I. Consider some U : O(X). There
289
+ must be a basic covering U = �
290
+ i∈J Bj such that each Bj is clopen for every j ∈ J. Clearly, Bj ≤ U so we
291
+ have Bj ⪕ Bj ≤ U which implies Bj ⪕ U (by Proposition 3.11.(i)).
292
+
293
+ The following two propositions are needed to prove that compact opens and clopens coincide in Stone
294
+ locales, which we will need later. They are adaptations of standard proofs [11, pg. 303, Lemma VII.3.5]
295
+ into our predicative setting.
296
+ Proposition 3.15 In any regular locale, U ≪ V implies U ⪕ V for any two opens U, V .
297
+ Proof. Let {Bi}i:I be the basis, closed under finite joins, of a regular locale X, let U, V : O(X) such
298
+ that U ≪ V , and let {Bj}j∈J be the basic family covering V . As V ≤ �
299
+ j∈J Bj there must exist some
300
+ k ∈ J such that U ≤ Bk by the fact that U ≪ V . We then have U ≤ Bk ⪕ V which implies U ⪕ V by
301
+ Proposition 3.11.
302
+
303
+ Proposition 3.16 In any compact locale, U ⪕ V implies U ≪ V for any two opens U, V .
304
+ The proof of Proposition 3.16 is omitted as it is exactly the same as in [11, pg. 303].
305
+ Definition 3.17 (Stone locale) A Stone locale is one that is compact and zero-dimensional.
306
+ Proposition 3.18 In any Stone locale, an open is compact iff it is clopen.
307
+ Proof. By propositions 3.15 and 3.16 and the fact that every zero-dimensional locale is regular (Propo-
308
+ sition 3.14).
309
+
310
+ 4
311
+ Adjoint Functor Theorem for frames with small bases
312
+ We start with the definition of the notion of an adjunction in the simplified context of posetal categories.
313
+ Definition 4.1 Let P and Q be two posets. An adjunction between P and Q consists of a pair of monotonic
314
+ maps f : P → Q and g : Q → P satisfying f ⊣ g := �
315
+ x:P
316
+
317
+ y:Q f(x) ≤ y ↔ x ≤ g(y).
318
+ In locale theory, it is standard convention to denote by f∗ : O(X) → O(Y ) the right adjoint of a
319
+ frame homomorphism f ∗ : O(Y ) → O(X) corresponding to a continuous map of locales f : X → Y . The
320
+ right adjoint of a frame homomorphism is defined using the Adjoint Functor Theorem which amounts
321
+ to the definition: f∗ := U �→ �{V : O(Y ) | f ∗(V ) ≤ U}.
322
+ In the predicative setting of type theory
323
+ however, it is not clear how the right adjoint of a frame homomorphism would be defined as the family
324
+ {V : O(Y ) | f ∗(V ) ≤ U} might be too big in general, meaning it is not clear a priori that its join in O(X)
325
+ exists. To resolve this problem, we restrict attention once again to frames with small bases in which we
326
+ circumvent this problem by quantifying over the basic elements.
327
+ 6
328
+
329
+ Tosun and Escard´o
330
+ Theorem 4.2 (AFT) Let X and Y be two large, locally small, and small complete locales and let f ∗ :
331
+ O(Y ) → O(X) be a monotone map. Assume that Y has a small basis {Bi}i:I. The map f ∗ has a right
332
+ adjoint iff f ∗(�
333
+ i Ui) = �
334
+ i f ∗(Ui) for any small family {Ui}i:I in O(Y ).
335
+ Proof. Let f ∗ : O(Y ) → O(X) be a monotone map from frame O(Y ) to frame O(Y ) and assume that Y
336
+ has a small basis {Bi}i:I.
337
+ The forward direction is easy: suppose f ∗ : O(Y ) → O(X) has a right adjoint f∗ : O(X) → O(Y ).
338
+ Let {Ui}i:I be a family in O(Y ). By the uniqueness of joins, it is sufficient to show that f ∗(�
339
+ i Ui) is the
340
+ join of {f ∗(Ui)}i:I. It is clearly an upper bound by the fact that f ∗ is monotone. Given any other upper
341
+ bound V of {f ∗(Ui)}i:I, we have that f ∗(�
342
+ i Ui) ≤ V since f ∗(�
343
+ i Ui) ≤ V ↔ (�
344
+ i Ui) ≤ f∗(V ) meaning it
345
+ is sufficient to show Ui ≤ f∗(V ) for each Ui. Since Ui ≤ f∗(V ) iff f ∗(Ui) ≤ V , we are done as the latter
346
+ can be seen to hold directly from the fact that V is an upper bound of {f ∗(Ui)}i:I.
347
+ For the converse, suppose f ∗(�
348
+ i Ui) = �
349
+ i:I f ∗(Ui) for every family {Ui}i:I. We define the right adjoint
350
+ of f ∗ as:
351
+ f∗(V )
352
+ :=
353
+
354
+ {Bi | i : I, f ∗(Bi) ≤ V } .
355
+ We need to show that f∗ is the right adjoint of f ∗ i.e. that f ∗(U) ≤ V ↔ U ≤ f∗(V ) for any two
356
+ U, V : O(X). For the forward direction, assume f ∗(U) ≤ V . We know that there exists a covering family
357
+ {Bj}j∈J for U with U = �
358
+ j∈J Bj so it suffices to show that Bj ≤ f∗(V ) for every j ∈ J. It remains to
359
+ show that f ∗(Bj) ≤ V . This follows from the fact that f ∗(Bj) ≤ f ∗(�
360
+ j∈J Bj) ≤ f ∗(U) ≤ V . For the
361
+ backward direction, let U ≤ f∗(V ). We have:
362
+ f ∗(U)
363
+
364
+ f ∗(f∗(V ))
365
+
366
+ f ∗ ��
367
+ {Bi | f ∗(Bi) ≤ V }
368
+
369
+
370
+
371
+ {f ∗(Bi) | f ∗(Bi) ≤ V }
372
+ [since f ∗ preserves joins]
373
+
374
+ V.
375
+
376
+ Our primary use case for the Adjoint Functor Theorem is the construction of Heyting implications in
377
+ locally small frames with small bases.
378
+ Definition 4.3 (Heyting implication) Let X be a large, locally small, and small complete locale with a
379
+ small basis and let U : O(X). As the map −∧U : O(X) → O(X) preserves joins by the frame distributivity
380
+ law, it must have a right adjoint h : O(X) → O(X), by Theorem 4.2, that satisfies W ∧U ≤ V ↔ W ≤ h(V )
381
+ for all W, V : O(X). We then define the Heyting implication as: U ⇒ V := h(V ).
382
+ The Adjoint Functor Theorem also allows us to define the notion of a perfect frame homomorphism.
383
+ Definition 4.4 (Perfect frame homomorphism) Let X and Y be two large, locally small, and small
384
+ complete locales and assume that Y has a small basis. A continuous map f : X → Y is said to be perfect
385
+ if the right adjoint f∗ of its defining frame homomorphism f ∗ is Scott continuous.
386
+ Proposition 4.5 Let f : X → Y be a perfect map where Y is a locale with small basis.
387
+ The frame
388
+ homomorphism f ∗ respects the way below relation, that is, U ≪ V implies f ∗(U) ≪ f ∗(V ), for any two
389
+ U, V : O(Y ).
390
+ A proof of Proposition 4.5 can be found in [8]. Our proof is mostly the same, once it is ensured that
391
+ the Heyting implication exists through the small basis assumption. We thus omit the proof.
392
+ Corollary 4.6 Perfect maps are spectral as they preserve compact opens.
393
+ In fact, the converse is also true in the case of spectral locales so Corollary 4.6 can be strengthened to
394
+ an equivalence in this case.
395
+ Proposition 4.7 Let X and Y be two large, locally small, and small complete spectral locales and assume
396
+ that Y has a small basis. A continuous map f : X → Y is perfect iff it is spectral.
397
+ 7
398
+
399
+ Tosun and Escard´o
400
+ Proof. The forward direction is given by Corollary 4.6. For the backward direction, assume f : X →
401
+ Y to be a spectral map.
402
+ We have to show that the right adjoint f∗ : O(X) → O(Y ) of its defining
403
+ frame homomorphism is Scott continuous. Let {Ui}i:I be a directed family in O(X). We have to show
404
+ f∗(�
405
+ i:I Ui) = �
406
+ i:I f∗(Ui). The �
407
+ i:I f∗(Ui) ≤ f∗(�
408
+ i:I Ui) direction is immediate. For the f∗(�
409
+ i:I Ui) ≤
410
+
411
+ i:I f∗(Ui) direction, let C be a compact open such that C ≤ f∗(�
412
+ i:I Ui). By the fact that f ∗ ⊣ f∗, it must
413
+ be the case that f ∗(C) ≤ �
414
+ i:I Ui and since f ∗(C) is compact, by the spectrality assumption of f ∗, there
415
+ must exist some l : I such that f ∗(C) ≤ Ul. Again by adjointness, C ≤ f∗(Ul) so clearly C ≤ �
416
+ i:I f∗(Ui).✷
417
+ 5
418
+ Meet-semilattice of Scott continuous nuclei
419
+ In this section, we take the first step towards constructing the defining frame of the patch locale on a
420
+ spectral locale i.e. the frame of Scott continuous nuclei. We construct the meet-semilattice of all nuclei on
421
+ a frame.
422
+ Proposition 5.1 The type of nuclei on a given frame O(X) forms a meet-semilattice under the pointwise
423
+ order.
424
+ Proof. We need to show that the type O(X) has all finite meets. The top nucleus is defined as − �→ ⊤
425
+ and the meet of two nuclei as j ∧ k := U �→ j(U) ∧ k(U). It is easy to see that j ∧ k is the greatest lower
426
+ bound of j and k so it remains to show that j ∧ k satisfies the nucleus laws.
427
+ The inflation property can be seen to be satisfied from the inflation properties of j and k combined
428
+ with the fact that j(U)∧k(U) is the greatest lower bound of j(U) and k(U). To see that meet preservation
429
+ holds, let U, V : O(X); we have:
430
+ (j ∧ k)(U ∧ V )
431
+
432
+ j(U ∧ V ) ∧ k(U ∧ V )
433
+ =
434
+ j(U) ∧ j(V ) ∧ k(U) ∧ k(V )
435
+ =
436
+ (j(U) ∧ k(U)) ∧ (j(V ) ∧ k(V ))
437
+
438
+ (j ∧ k)(U) ∧ (j ∧ k)(V ).
439
+ For idempotency, let U : O(X). We have:
440
+ (j ∧ k)((j ∧ k)(U))
441
+
442
+ j(j(U) ∧ k(U)) ∧ k(j(U) ∧ k(U))
443
+ =
444
+ j(j(U)) ∧ j(k(U)) ∧ k(j(U)) ∧ k(k(U))
445
+
446
+ j(j(U)) ∧ k(k(U))
447
+ =
448
+ j(U) ∧ k(U)
449
+
450
+ (j ∧ k)(U).
451
+
452
+ We now show that this meet-semilattice can be refined to only those nuclei that are Scott continuous
453
+ (i.e. the perfect nuclei).
454
+ Proposition 5.2 The Scott continuous nuclei on any locale form a meet-semilattice.
455
+ Proof. Let X be a locale. The construction is the same as the one from Proposition 5.1; the top element
456
+ is − �→ ⊤ which is trivially Scott continuous so it remains to show that the meet of two Scott continuous
457
+ nuclei is Scott continuous. Consider two Scott continuous nuclei j and k on O(X) and a directed small
458
+ 8
459
+
460
+ Tosun and Escard´o
461
+ family {Ui}i:I. We then have:
462
+ (j ∧ k)
463
+ ��
464
+ i:I
465
+ Ui
466
+
467
+
468
+ j
469
+ ��
470
+ i:I
471
+ Ui
472
+
473
+ ∧ k
474
+
475
+ �
476
+ j:I
477
+ Uj
478
+
479
+
480
+ =
481
+ ��
482
+ i:I
483
+ j(Ui)
484
+
485
+
486
+
487
+ �
488
+ j:I
489
+ k(Uj)
490
+
491
+
492
+ [Scott continuity of j and k]
493
+ =
494
+
495
+ (i,j):I×I
496
+ j(Ui) ∧ k(Uj)
497
+ [distributivity]
498
+ =
499
+
500
+ i:I
501
+ j(Ui) ∧ k(Ui)
502
+ [†]
503
+
504
+
505
+ i:I
506
+ (j ∧ k)(Ui)
507
+ [meet preservation]
508
+ where, for the † step, we use antisymmetry. The backwards direction is immediate. For the forwards
509
+ direction, we need to show that �
510
+ (i,j):I×I j(Ui) ∧ k(Uj) ≤ �
511
+ i:I j(Ui) ∧ k(Ui), for which it suffices to show
512
+ that �
513
+ i:I j(Ui)∧k(Ui) is an upper bound of {j(Ui)∧k(Uj)}(i,j):I×I. Let m, n : I be two indices. As {Ui}i:I
514
+ is directed, there must exist some o such that Uo is an upper bound of {Um, Un}. Using the monotonicity
515
+ of j and k, we get j(Um) ∧ k(Un) ≤ j(Uo) ∧ k(Uo) ≤ �
516
+ i:I j(Ui) ∧ k(Ui) as desired.
517
+
518
+ 6
519
+ Joins in the frame of Scott continuous nuclei
520
+ The nontrivial component of the patch frame construction is the join of a family {ki}i:I of perfect nuclei, as
521
+ the pointwise join fails to be idempotent in general, and not inflationary when the family in consideration
522
+ is empty.
523
+ A construction of the join, given in [9], is based on the idea that, if we start with a family {ki}i:I of
524
+ nuclei, we can consider the family
525
+ {ki0 ◦ · · · ◦ kin}(i0,··· ,in):List(I) ,
526
+ whose index type is the type of lists of indices in I, that will always be directed. We will use the following
527
+ notation for lists over a type X:
528
+ • ε denotes the empty list,
529
+ • x :: s, with x : X and s : List(X), denotes the list with first element x followed by the elements of s,
530
+ • s t denotes the concatentation of lists s and t.
531
+ To define the join operation, we will use the iterated composition function o that we define as follows:
532
+ Definition 6.1 (Iterated composition of nuclei) Given a small family K := {ki}i:I of nuclei on a
533
+ given locale X, we denote by K∗ the family (List(I), o) where o is defined as follows:
534
+ o(ε)
535
+ :=
536
+ id;
537
+ o(i :: s)
538
+ :=
539
+ o(s) ◦ ki.
540
+ By an easy proof by induction, we have the following.
541
+ Proposition 6.2 For any family K := {ki}i:I of prenuclei on a locale and any s, t : List(I), we have that
542
+ o(s t) = o(s) ◦ o(t).
543
+ Proposition 6.3 Given a family K := {ki}i:I of nuclei on a locale, every α ∈ K∗ is a prenucleus, that
544
+ is, for every s : List(I), the function o(s) is a prenucleus.
545
+ 9
546
+
547
+ Tosun and Escard´o
548
+ Proof. If s = ε, we are done as it is immediate that the identity function id is a prenucleus. If s = i :: s′,
549
+ we need to show that o(s′) ◦ ki is a prenucleus. For meet preservation, let U, V : O(X). We have that:
550
+ (o(s′) ◦ ki)(U ∧ V )
551
+
552
+ o(s′)(ki(U ∧ V ))
553
+ =
554
+ o(s′)(ki(U) ∧ ki(V ))
555
+ [ki is a nucleus]
556
+ =
557
+ o(s′)(ki(U)) ∧ o(s′)(ki(V ))
558
+ [inductive hypothesis]
559
+
560
+ (o(s′) ◦ ki)(U) ∧ (o(s′) ◦ ki)(V ).
561
+ For the inflation property, consider some U : O(X). We have that U ≤ ki(U) ≤ o(s′)(ki(U)), by the
562
+ inflation property of ki and the inductive hypothesis.
563
+
564
+ Proposition 6.4 Given a nucleus j and a family K := {ki}i:I of nuclei on a locale, if j is an upper bound
565
+ of K then it is also an upper bound of K∗.
566
+ Proof. Let j and K := {ki}i:I be, respectively, a nucleus and a family of nuclei on a locale. Let s : List(I).
567
+ We denote by {αs}s:List(S) the family K∗. We proceed by induction on s. If s = ε, we have that id(U) ≡
568
+ U ≤ j(U). If s = i :: s′, we then have:
569
+ αs′(ki(U))
570
+
571
+ αs′(j(U))
572
+ [monotonicity of αs′ (Prop. 6.3 and monotonicity of prenuclei)]
573
+
574
+ j(j(U))
575
+ [inductive hypothesis]
576
+
577
+ j(U)
578
+ [idempotency of j].
579
+
580
+ Proposition 6.5 Given a family {ki}i:I of Scott continuous nuclei on a locale, every prenucleus α ∈ K∗
581
+ is Scott continuous.
582
+ Proof. Any composition of finitely many Scott continuous functions is Scott continuous.
583
+
584
+ Proposition 6.6 Given a family K :≡ {ki}i:I of nuclei on a locale, the family K∗ is directed.
585
+ Proof. K∗ is indeed always inhabited by the identity nucleus. The upper bound of nuclei o(s) and o(t) is
586
+ given by o(s t), which is o(s) ◦o(t) by Proposition 6.2. The fact that this is an upper bound of {o(s), o(t)}
587
+ follows from monotonicity and inflationarity.
588
+
589
+ Proposition 6.7 Let j be a nucleus and K := {ki}i:I a family of nuclei on a locale. Denote by {αs}s:List(I)
590
+ the family K∗ and by {βs}s:List(I) the family {j ∧ k | k ∈ K}∗. We have that βs is a lower bound of {αs, j}
591
+ for every s : List(I).
592
+ We are now ready to construct the join operation in the meet-semilattice of Scott continuous nuclei
593
+ hence defining the patch frame O(Patch(X)) of the frame of a locale X.
594
+ Theorem 6.8 (Join of Scott continuous nuclei) Let K := {ki}i:I be a family of Scott continuous
595
+ nuclei. The join of K can be calculated as �N K := U �→ �
596
+ α∈K∗ α(U).
597
+ Proof. It must be checked that this is (1) indeed the join, (2) is a Scott continuous nucleus i.e. it is
598
+ inflationary, binary-meet-preserving, idempotent, and Scott continuous. The inflation property is direct.
599
+ 10
600
+
601
+ Tosun and Escard´o
602
+ For meet preservation, consider some U, V : O(X). We have:
603
+ � N
604
+
605
+ i:I
606
+ ki
607
+
608
+ (U ∧ V )
609
+
610
+
611
+ α∈K∗
612
+ α(U ∧ V )
613
+ =
614
+
615
+ α∈K∗
616
+ α(U) ∧ α(V )
617
+ [Proposition 6.5]
618
+ =
619
+
620
+ β,γ∈K∗
621
+ β(U) ∧ γ(V )
622
+ [†]
623
+ =
624
+
625
+  �
626
+ β∈K∗
627
+ β(U)
628
+
629
+  ∧
630
+
631
+  �
632
+ γ∈K∗
633
+ γ(V )
634
+
635
+
636
+ [distributivity]
637
+
638
+ � N
639
+
640
+ i:I
641
+ ki
642
+
643
+ (U) ∧
644
+ � N
645
+
646
+ i:I
647
+ ki
648
+
649
+ (V ),
650
+ where the step (†) uses antisymmetry. The �
651
+ α∈K∗ α(U) ∧ α(V ) ≤ �
652
+ β,γ∈K∗ β(U) ∧ γ(V ) direction is direct
653
+ whereas for the �
654
+ β,γ∈K∗ β(U) ∧ γ(V ) ≤ �
655
+ α∈K∗ α(U) ∧ α(V ) direction we show that �
656
+ α∈K∗ α(U) ∧ α(V ) is
657
+ an upper bound of the set {β(U)∧γ(V ) | β, γ ∈ K∗}. Consider arbitrary β, γ ∈ K∗. By the directedness of
658
+ K∗ we know that there exists some δ ∈ K∗ that is an upper bound of {β, γ}. We then have: β(U)∧γ(V ) ≤
659
+ δ(U) ∧ δ(V ) ≤ �
660
+ α∈K∗ α(U) ∧ α(V ). For idempotency, let U : O(X). We have that:
661
+ � N
662
+
663
+ i
664
+ ki
665
+ � �� N
666
+
667
+ i
668
+ ki
669
+
670
+ (U)
671
+
672
+
673
+
674
+ α∈K∗
675
+ α
676
+
677
+  �
678
+ β∈K∗
679
+ β(U)
680
+
681
+
682
+ =
683
+
684
+ α∈K∗
685
+
686
+ β∈K∗
687
+ α(β(U))
688
+ [Proposition 6.5]
689
+
690
+
691
+ α,β∈K∗
692
+ α(β(U))
693
+ [flattening joins]
694
+
695
+
696
+ α∈K∗
697
+ α(U)
698
+ [†]
699
+
700
+ � N
701
+
702
+ i
703
+ ki
704
+
705
+ (U),
706
+ where for the step (†) it suffices to show that �
707
+ α∈K∗ α(U) is an upper bound of the family
708
+ {α(β(U)) | (α, β) ∈ K∗ × K∗}.
709
+ Consider arbitrary α, β ∈ K∗.
710
+ There must be lists s and t of indices
711
+ of K such that α ≡ o(s) and β ≡ o(t). Picking δ := o(s t) then gives a δ ∈ K∗, is then an upper bound
712
+ for o(s) and o(t) (as in Proposition 6.6). By Proposition 6.2, we have that o(s)(o(t)(U)) ≡ o(s t)(U) ≡
713
+ δ(U) ≤ �
714
+ α∈K∗ α(U).
715
+ 11
716
+
717
+ Tosun and Escard´o
718
+ For Scott continuity, let {Uj}j:J be a directed family over O(X). The result then follows as:
719
+ � N
720
+
721
+ K
722
+ � 
723
+ �
724
+ j:J
725
+ Uj
726
+
727
+
728
+
729
+
730
+ α∈K∗
731
+ α
732
+
733
+ �
734
+ j:J
735
+ Uj
736
+
737
+
738
+ =
739
+
740
+ α∈K∗
741
+
742
+ j:J
743
+ α(Uj)
744
+ [Proposition 6.5]
745
+ =
746
+
747
+ j:J
748
+
749
+ α∈K∗
750
+ α(Uj)
751
+ [joins commute]
752
+
753
+
754
+ j:J
755
+ � N
756
+
757
+ K
758
+
759
+ (Uj)
760
+ as required.
761
+ The fact that �N
762
+ i ki is an upper bound of K is easy to verify: given some ki and U : O(X), ki(U) ∈
763
+ {α(U) | α ∈ K∗} since ki ∈ K∗. To see that it is the least upper bound, consider a Scott continuous
764
+ nucleus j that is an upper bound of K. Let U : O(X). We need to show that (�N
765
+ i ki)(U) ≤ j(U). We
766
+ know by Proposition 6.4 that j is an upper bound of K∗, since it is an upper bound of K, which is to
767
+ say K∗
768
+ s(U) ≤ j(U) for every s : List(I) i.e. j(U) is an upper bound of the family {α(U) | α ∈ K∗}. Since
769
+ (�N
770
+ i ki)(U) is the least upper bound of this family by definition, it follows that it is below j(U).
771
+
772
+ We use Proposition 6.7 to prove the following.
773
+ Proposition 6.9 (Distributivity) For any Scott continuous nucleus j and any family {ki}i:I of Scott
774
+ continuous nuclei, we have that
775
+ j ∧
776
+ ��
777
+ i:I
778
+ ki
779
+
780
+ =
781
+
782
+ i:I
783
+ j ∧ ki.
784
+ It follows that the Scott continuous nuclei form a frame.
785
+ Definition 6.10 (Patch locale of a spectral locale) Let X be a large, locally small, and small com-
786
+ plete spectral locale. The patch locale of X, written Patch(X), is given by the frame of Scott continuous
787
+ nuclei on X.
788
+ Note that we do not assume that locale X is spectral in Definition 6.10. This is to highlight the fact
789
+ that the construction of the patch frame does not rely on this assumption in a crucial way. However,
790
+ the reader is reminded that the patch construction is meaningful only on spectral locales, as its universal
791
+ property can be proved only for spectral locales.
792
+ Definition 6.10 gives rise to a problem that we need to address: the patch of a locally small locale does
793
+ not yield a locally small locale. Starting with a (U+, U, U)-locale X, Patch(X) is a (U+, U+, U)-locale since
794
+ the pointwise ordering of nuclei (defined in Proposition 5.1) quantifies over arbitrary opens. In most of
795
+ our development, we have restricted attention to only locally small frames meaning we run into problems
796
+ if Patch(X) is not locally small (e.g. applying the Adjoint Functor Theorem). We circumvent this by using
797
+ the following small version of the same relation:
798
+ Definition 6.11 (Basic nuclei ordering on spectral locales) Let X be a spectral locale and denote
799
+ its basis by {Bi}i:I. Let j, k : O(X) → O(X) be two nuclei. We define the basic nuclei ordering − ≤K −
800
+ as
801
+ j ≤K k
802
+ :=
803
+
804
+ i:I
805
+ j(Bi) ≤ k(Bi).
806
+ Given two nuclei j and k on a (U, V, W)-locale, the relation j ≤K k lives in universe V ∨ W meaning,
807
+ in the case of a (U+, U, U)-locale, it lives in U as desired.
808
+ Proposition 6.12 The basic nuclei ordering defined in Definition 6.11 is logically equivalent to the point-
809
+ wise ordering of nuclei.
810
+ 12
811
+
812
+ Tosun and Escard´o
813
+ Proof. The usual pointwise ordering obviously implies the basic ordering so we address the other direction.
814
+ Let j and k be two Scott continuous nuclei on a spectral locale X and assume that j ≤K k. We need to
815
+ show that j(U) ≤ k(U) for every open U. It must be the case that U = �
816
+ l∈L Bl where {Bl}l∈L is the basic
817
+ covering family of compact opens covering U that is directed. We then have j(�
818
+ l∈L Bl) = �
819
+ l∈L j(Bl) by
820
+ Scott continuity and �
821
+ l∈L j(Bl) ≤ �
822
+ l∈L k(Bl) since j(Bl) ≤ k(Bl) for every l : L.
823
+
824
+ Thanks to Proposition 6.12 our theorems that have the local smallness assumption apply to the patch
825
+ frame as we know that Patch(X) always has an equivalent version that is locally small. We also note that
826
+ we will not be precise in distinguishing between the basic order and the regular order on nuclei and will
827
+ freely switch between the two, making implicit use of Proposition 6.12.
828
+ 7
829
+ The coreflection property of Patch
830
+ We prove in this section that our construction of Patch has the desired universal property: it exhibits
831
+ Stone as a coreflective subcategory of Spec. We also note that when we talk about Stone and spectral
832
+ locales in this section, we implicitly assume them to be large, locally small, and small complete, and refrain
833
+ from explicitly stating this assumption.
834
+ The notions of closed and open nuclei are crucial for proving the universal property. We start with the
835
+ definitions of these. Let U be an open of a locale X;
836
+ (i) The closed nucleus induced by U is the map V �→ U ∨ V ;
837
+ (ii) The open nucleus induced by U is the map V �→ U ⇒ V .
838
+ We denote the closed nucleus by ‘U’ and, because the open nucleus is the Boolean complement of the closed
839
+ nucleus, we denote it by ¬‘U’. This follows the notation of [8,10]. We now prove the Scott continuity of
840
+ these nuclei.
841
+ Lemma 7.1 For any spectral locale X and any monotone map h : O(X) → O(X), if for every U : O(X)
842
+ and compact C : O(X) with C ≤ h(U), there is some compact D ≤ U such that C ≤ h(D), then h is Scott
843
+ continuous
844
+ Lemma 7.2 Let X be a spectral locale. The closed nucleus ‘U’ on X is Scott continuous for any open U,
845
+ whereas the open nucleus is Scott continuous if the open U is compact.
846
+ Proof.
847
+ Closed nucleus. Let U be an open of a locale and let {Vi}i:I be a directed family of opens. We need to
848
+ show that ‘U’(�
849
+ i:I Vi) = �
850
+ i:I ‘U’(Vi). It is clear that U ∨(�
851
+ i:I Vi) is an upper bound of {U ∨Vi}i:I. Let W
852
+ be an arbitrary upper bound of {U ∨ Vi}i:I. It suffices to show that W is an upper bound of {U, (�
853
+ i:I Vi)}.
854
+ For the case of �
855
+ i:I Vi, we have that �
856
+ i:I Vi ≤ �
857
+ i:I U ∨ Vi ≤ W. For the case of U, we use the fact that Vi
858
+ directed. Since Vi is directed it must be inhabited by some Vk. We then have U ≤ U ∨ Vk ≤ W as W is
859
+ an upper bound of {U ∨ Vi}i:I.
860
+ Open nucleus. Let U be a compact open of a locale. By Lemma 7.1, it is sufficient to show that
861
+ for any open V and any compact open C1 with C1 ≤ U ⇒ V , there exists some compact C2 ≤ U such
862
+ that C1 ≤ U ⇒ C2. Let V and C1 be two opens with C1 compact and satisfying C1 ≤ U ⇒ V . Pick
863
+ C2 := U ∧ C1. We know that this is compact by spectrality. It remains to check (1) C2 ≤ V and (2)
864
+ C1 ≤ U ⇒ C2, both of which are direct.
865
+
866
+ In Lemma 7.5, we prove that the map whose inverse image sends an open U to the closed nucleus ‘U’
867
+ is perfect. Before Lemma 7.5, we record two auxiliary lemmas that are needed in the proof.
868
+ Lemma 7.3 Let X be a spectral locale with a small basis. The right adjoint ε∗ : O(Patch(X)) → O(X)
869
+ of ‘−’ is given by the assignment j �→ j(⊥) i.e. ε∗(j) = j(⊥) for every Scott continuous nucleus j on X.
870
+ Lemma 7.4 Given a directed family {ki}i:I of Scott continuous nuclei, their join is computed pointwise,
871
+ that is, (�
872
+ i:I ki) (U) = �
873
+ i:I ki(U).
874
+ Proofs of Lemma 7.3 and Lemma 7.4 can be found in [8]. They are omitted here as they are mostly
875
+ unchanged in our type-theoretical setting.
876
+ 13
877
+
878
+ Tosun and Escard´o
879
+ Lemma 7.5 The function that sends an open U to the closed nucleus ‘U’ is a perfect frame homomorphism
880
+ O(X) → O(Patch(X)).
881
+ Proof. We have to show that the right adjoint ε∗ of ‘−’ is Scott continuous. Let {ki}i:I be a directed family
882
+ of Scott continuous nuclei. By Lemma 7.3, it suffices to show (�
883
+ i:I ki) (⊥) = �
884
+ i:I ε∗(ki). By Lemma 7.4,
885
+ we have that (�
886
+ i:I ki) (⊥) = �
887
+ i:I ki(⊥). The desired result of �
888
+ i:I ki(⊥) = �
889
+ i:I ε∗(ki) is then immediate
890
+ by Lemma 7.3.
891
+
892
+ This function defines a continuous map ε : Patch(X) → X, which we we will show to be the counit of
893
+ the coreflection in consideration.
894
+ 7.1
895
+ Patch is Stone
896
+ Before we proceed to showing that the Patch locale has the desired universal property, we first need to
897
+ show that Patch(X) is Stone (as given in Definition 3.17) for any spectral locale X. We start by addressing
898
+ the question of zero-dimensionality.
899
+ To show that Patch(X) is zero-dimensional, we need to construct a basis consisting of clopens. We will
900
+ use the following fact, which was already mentioned above:
901
+ Proposition 7.6 The open nucleus ¬‘U’ is the Boolean complement of the closed nucleus ‘U’.
902
+ Lemma 7.7 The patch of any spectral locale X with a basis {Bi}i:I of compact opens is zero-dimensional,
903
+ with a basis of clopens of the form �
904
+ (m,n)∈M×N ‘Bm’ ∧ ¬‘Bn’ with M and N finite, which is clearly closed
905
+ under finite joins.
906
+ More precisely, if the given basis of X is the family B : I → O(X), then the constructed basis of Patch(X)
907
+ is the family C : List(I × I) → O(Patch(X)) defined by
908
+ C([(n0, m0), . . . , (nk−1, mk−1)]) :=
909
+
910
+ 0≤i<k
911
+ ‘Bmi’ ∧ ¬‘Bni’.
912
+ That is, the index set of the basis consists of formal expressions for finite joins.
913
+ Proof. We need to show that this (1) consists of clopens, and (2) indeed forms a basis. For (1), ‘B1’∧¬‘B2’
914
+ has complement ¬‘B1’∨‘B2’, by Proposition 7.6, and finite unions of complemented sets are complemented.
915
+ For (2), let j : O(X) → O(X) be a perfect nucleus on O(X). We need to show that there exists a subfamily
916
+ of B that yields j as its join. For this we pick the subfamily Bj := {‘Bm’ ∧ ¬‘Bn’ | m, n : I, Bm ≤ j(Bn)}.
917
+ The fact that j is the least upper bound of Bj follows from Lemma 7.8 and Lemma 7.9:
918
+ j
919
+ =
920
+
921
+ n:I
922
+ ‘j(Bn)’ ∧ ¬‘Bn’
923
+ [Lemma 7.8]
924
+ =
925
+
926
+ {‘Bm’ ∧ ¬‘Bn’ | m, n : I, Bm ≤ j(Bn)}
927
+ [Lemma 7.9]
928
+
929
+ The following is adapted from Johnstone [11, Proposition II.2.7].
930
+ Lemma 7.8 Given any perfect nucleus j : Patch(X), we have that j = � {‘j(Bn)’ ∧ ¬‘Bn’ | n : I}.
931
+ Lemma 7.9 Let X be a spectral locale.
932
+ Given any perfect nucleus j
933
+ : Patch(X), we have that
934
+ � {‘j(Bn)’ ∧ ¬‘Bn’ | n : I} = � {‘Bm’ ∧ ¬‘Bn’ | m, n : I, Bm ≤ j(Bn)}.
935
+ Theorem 7.10 Given any spectral locale X, we have that Patch(X) is a Stone locale.
936
+ Proof. Zero-dimensionality is given by Lemma 7.7 so it only remains to show compactness. Recall that
937
+ the top element ⊤ of Patch(X) is defined as ⊤ := − �→ ⊤X. Because ε is a frame homomorphism, it must
938
+ be the case that ⊤ = ε(⊤X) meaning what we want to show is ε(⊤X) ≪ ε(⊤X). By Proposition 4.5, it
939
+ suffices to show ⊤X ≪ ⊤X which is immediate as spectral locales are compact.
940
+
941
+ 14
942
+
943
+ Tosun and Escard´o
944
+ 7.2
945
+ The universal property of the patch construction
946
+ We now prove the universal property of Patch corresponding to the fact that it is the right adjoint to the
947
+ inclusion Stone ֒→ Spec. For this purpose, we use the following lemma, which is not needed in [8, 10]
948
+ thanks to the existence of the frame of all nuclei in the impredicative setting.
949
+ Lemma 7.11 Let L, L′ be two spectral frames and B a small Boolean algebra embedded in L such that
950
+ (i) L is generated by A, and
951
+ (ii) B contains all compact opens of L.
952
+ Then for any lattice homomorphism h : B → L′, there is a unique frame homomorphism ¯h : L → L′
953
+ satisfying h = ¯h ◦ η, where η : B ֒→ L denotes the embedding of B into L, as illustrated in the following
954
+ diagram:
955
+ B
956
+ L
957
+ L′.
958
+ h
959
+ η
960
+ ¯h
961
+ (†)
962
+ Proof. Define ¯h(x) := � {h(b) | η(b) ≤ x, b : B}. We need to show that (1) ¯h is a frame homomorphism,
963
+ and (2) is the unique map satisfying h = ¯h ◦ η.
964
+ (1) It is clear that ¯h preserves ⊥, ⊤, and joins of directed families. To show that it preserves binary
965
+ joins, we make use of the fact that for any b ≤ x ∨ y with b compact (in any spectral locale), there exist
966
+ compact opens c ≤ x and d ≤ y such that b ≤ c ∨ d. As it preserves both binary joins and directed joins,
967
+ it must preserve arbitrary joins.
968
+ (2) It is easy to see that ¯h satisfies the equation h = ¯h ◦ η. Uniqueness follows from the fact that η is
969
+ injective.
970
+
971
+ We can now present the universal property.
972
+ Theorem 7.12 Given any spectral map f : X → A from a Stone locale into a spectral locale, there exists
973
+ a unique spectral map ¯f : X → Patch(A) satisfying ε ◦ ¯f = f, as illustrated in the following diagram in the
974
+ category of spectral locales:
975
+ X
976
+ A
977
+ Patch(A)
978
+ f
979
+ ¯f
980
+ ε
981
+ Proof. We apply Lemma 7.11 with L := O(Patch(A)), L′ := O(X), B := K(Patch(A)) and h defined by
982
+ h
983
+
984
+
985
+
986
+ (j,k)∈J×K
987
+ ‘Bj’ ∧ ¬‘Bk’
988
+
989
+
990
+ :=
991
+
992
+ (j,k)∈J×K
993
+ f ∗(Bj) ∧ ¬f ∗(Bk).
994
+ It is easy to see that h is well-defined, in the sense that if the same clopen is expressed in two different
995
+ ways as a finite join of binary meets, then h gives the same value for them. It is easy to check that the
996
+ embedding K(Patch(A)) ֒→ O(Patch(A)) satisfies the premise of the lemma. We then take ¯f ∗ to be ¯h as
997
+ constructed in the lemma. We need to show that this satisfies ¯f ∗(‘U’) = f ∗(U) for all U : O(A). It suffices
998
+ to consider the case where U is a compact open C, as the compact opens form a basis. Because C can be
999
+ written as �{‘C’ ∧ ¬‘⊥’}, we have that
1000
+ ¯f ∗(‘C’) = h
1001
+ ��
1002
+ {‘C’ ∧ ¬‘⊥’}
1003
+
1004
+ =
1005
+
1006
+ {f ∗(C) ∧ ¬f ∗(⊥)} =
1007
+
1008
+ {f ∗(C) ∧ ⊤} = f ∗(C),
1009
+ as required.
1010
+
1011
+ 15
1012
+
1013
+ Tosun and Escard´o
1014
+ 8
1015
+ Summary and discussion
1016
+ We have constructed the patch locale of a spectral locale in the predicative and constructive setting of
1017
+ univalent type theory, using only propositional and functional extensionality. Furthermore, we have shown
1018
+ that the patch construction Patch : Spec → Stone is the right adjoint to the inclusion Stone ֒→ Spec
1019
+ which is to say that patch exhibits the category Stone as a coreflective subcategory of Spec.
1020
+ As we have elaborated in Section 3, answering this question in a predicative setting has involved the
1021
+ reformulation of several fundamental concepts of locale theory. In particular, we have reformulated notions
1022
+ of spectrality, zero-dimensionality, and regularity, and have shown that crucial facts about these notions
1023
+ remain valid in the predicative setting.
1024
+ We have also formalised almost all of our development, most importantly Theorem 7.10 and
1025
+ Lemma 7.11. The formalisation has been carried out by the first-named author as part 3 of the second-
1026
+ named author’s TypeTopology library [7]. Almost all of the presented results have already been imple-
1027
+ mented, including:
1028
+ (i) All of Section 3 in the module Locales.CompactRegular;
1029
+ (ii) The Adjoint Functor Theorem and its application to define Heyting implications in frames (Sec-
1030
+ tion 4) in modules Locales.GaloisConnection, Locales.AdjointFunctorTheoremForFrames, and
1031
+ Locales.HeytingImplication;
1032
+ (iii) All of Section 5 and Section 6 in module Locales.PatchLocale; and
1033
+ (iv) The extension lemma (Lemma 7.11) from Section 7.2 in Locales.BooleanAlgebra.
1034
+ The only result that remains to be formalised is the universal property which we have proved using
1035
+ Lemma 7.11. The formalisation of this result is work in progress and is soon to be completed.
1036
+ In previous work [8,10], that forms the basis of the present work, the patch construction was used to
1037
+ (i) exhibit Stone as a coreflective subcategory of Spec, which we have addressed here, and
1038
+ (ii) exhibit the category of compact regular locales and continuous maps as a coreflective subcategory of
1039
+ of stably compact locales and perfect maps, which we leave for future work.
1040
+ Coquand and Zhang [4] tackled (ii) using formal topology. We conjecture that it should be possible to
1041
+ instead use the approach we have presented here, namely, working with locales with small bases and
1042
+ constructing the patch as the frame of Scott continuous nuclei.
1043
+ References
1044
+ [1] Agda development team, The Agda Proof Assistant (version 2.6.2).
1045
+ URL https://agda.readthedocs.io/en/v2.6.2/team.html
1046
+ [2] Coquand, T., G. Sambin, J. Smith and S. Valentini, Inductively generated formal topologies 124, pp. 71–106.
1047
+ [3] Coquand, T. and A. Tosun, Formal Topology and Univalent Foundations, in: Proof and Computation II, WORLD
1048
+ SCIENTIFIC pp. 255–266.
1049
+ [4] Coquand, T. and G.-Q. Zhang, A representation of stably compact spaces, and patch topology 305, pp. 77–84.
1050
+ [5] de Jong, T. and M. H. Escard´o, Domain theory in constructive and predicative univalent foundations, in: C. Baier
1051
+ and J. Goubault-Larrecq, editors, 29th EACSL Annual Conference on Computer Science Logic (CSL 2021), Leibniz
1052
+ International Proceedings in Informatics (LIPIcs) 183, pp. 28:1–28:18.
1053
+ [6] de Jong, T. and M. H. Escard´o, Predicative Aspects of Order Theory in Univalent Foundations, in: N. Kobayashi, editor,
1054
+ 6th International Conference on Formal Structures for Computation and Deduction (FSCD 2021), Leibniz International
1055
+ Proceedings in Informatics (LIPIcs) 195, pp. 8:1–8:18.
1056
+ [7] Escard´o, M., and contributors, TypeTopology, Agda library.
1057
+ URL https://github.com/martinescardo/TypeTopology
1058
+ [8] Escard´o, M. H., On the Compact-regular Coreflection of a Stably Compact Locale 20, pp. 213–228.
1059
+ 3 The HTML rendering of the Agda code can be browsed here https://www.cs.bham.ac.uk/∼mhe/TypeTopology/Locales.index.html
1060
+ 16
1061
+
1062
+ Tosun and Escard´o
1063
+ [9] Escard´o, M. H., Properly injective spaces and function spaces 89, pp. 75–120.
1064
+ [10] Escard´o, M. H., The regular locally compact coreflection of a stably locally compact locale 157, pp. 41–55.
1065
+ [11] Johnstone, P. T., “Stone Spaces,” Cambridge Univ. Press.
1066
+ [12] Mac Lane, S. and I. Moerdijk, “Sheaves in Geometry and Logic: A First Introduction to Topos Theory,” Universitext,
1067
+ Springer-Verlag.
1068
+ [13] Sambin, G., Intuitionistic Formal Spaces — A First Communication, in: D. G. Skordev, editor, Mathematical Logic and
1069
+ Its Applications, Springer US pp. 187–204.
1070
+ [14] UFP, “Homotopy Type Theory: Univalent Foundations of Mathematics,” .
1071
+ URL https://homotopytypetheory.org/book
1072
+ [15] Voevodsky, V., Resizing Rules — their use and semantic justification, invited talk at TYPES 2011, Bergen, Norway.
1073
+ 17
1074
+
TNE3T4oBgHgl3EQfzgsS/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
VdFJT4oBgHgl3EQfOSwV/content/tmp_files/2301.11481v1.pdf.txt ADDED
@@ -0,0 +1,2665 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11481v1 [cs.GT] 27 Jan 2023
2
+ Are Equivariant Equilibrium Approximators Beneficial?
3
+ Zhijian Duan1, Yunxuan Ma1, Xiaotie Deng1,2
4
+ 1Center on Frontiers of Computing Studies, Peking University
5
+ 2Center for Multi-Agent Research, Institute for AI, Peking University
6
+ {zjduan,charmingmyx,xiaotie}@pku.edu.cn
7
+ Abstract
8
+ Recently, remarkable progress has been made by approximating Nash equilibrium (NE), corre-
9
+ lated equilibrium (CE), and coarse correlated equilibrium (CCE) through function approximation
10
+ that trains a neural network to predict equilibria from game representations. Furthermore, equiv-
11
+ ariant architectures are widely adopted in designing such equilibrium approximators in normal-
12
+ form games. In this paper, we theoretically characterize benefits and limitations of equivariant
13
+ equilibrium approximators. For the benefits, we show that they enjoy better generalizability than
14
+ general ones and can achieve better approximations when the payoff distribution is permutation-
15
+ invariant. For the limitations, we discuss their drawbacks in terms of equilibrium selection and
16
+ social welfare. Together, our results help to understand the role of equivariance in equilibrium
17
+ approximators.
18
+ 1
19
+ Introduction
20
+ The equivariant equilibrium property states that, given a Nash Equilibrium (NE) solution of a
21
+ game, the permuted solution is also an NE for the game whose actions of representation are permuted
22
+ in the same way. The same property also holds in correlated equilibrium (CE) and coarse correlated
23
+ equilibrium (CCE), as well as the approximate solutions for all three solution concepts.
24
+ In this paper, we are interested in understanding the equivariant equilibrium property in designing
25
+ neural networks that predict equilibria from game payoffs, following such recent approaches in de-
26
+ signing equivariant equilibrium approximators [Feng et al., 2021, Marris et al., 2022] in normal-form
27
+ games. Informally, such equivariant approximators keep the same permutation of the output strate-
28
+ gies (represented as vectors or tensors) when the input game representations (e.g., the game payoff
29
+ tensors) are permuted 1. While equivariant approximators achieved empirical success, little work has
30
+ theoretically discussed whether they are beneficial.
31
+ We theoretically characterize benefits and limitations of equivariant NE, CE and CCE approx-
32
+ imators. For the benefits, we first show that equivariant approximators enjoy better generalizabil-
33
+ ity, where we evaluate the approximators using the maximum exploitability [Lockhart et al., 2019,
34
+ Goktas and Greenwald, 2022] over all players. To get such a result, we derive the generalization bounds
35
+ and the sample complexities of the NE, CE, and CCE approximators: The generalization bounds offer
36
+ confidence intervals on the expected testing approximations based on the empirical training approxi-
37
+ mations; The sample complexities describe how many training samples the equilibrium approximators
38
+ need to achieve desirable generalizability. The generalization bounds and sample complexities include
39
+ the covering numbers [Shalev-Shwartz and Ben-David, 2014], which measure the representativeness of
40
+ the approximators’ function classes. Afterward, we prove that the equivariant approximators have
41
+ lower covering numbers than the general models, therefore have lower generalization bounds and sam-
42
+ ple complexities. We then show that the equivariant approximators can achieve better approximation
43
+ when the payoff distribution is permutation-invariant.
44
+ As for the limitations, we find the equivariant approximators unable to find all the equilibria of
45
+ some normal-form games. Such a result is caused by the limited representativeness of the equivariant
46
+ approximators’ function class. Besides, we find that the equivariant NE approximator may lose social
47
+ welfare. Specifically, in an example we constructed, while the maximum NE social welfare is large, the
48
+ maximum social welfare of NEs that the equivariant NE approximators could find can be arbitrary
49
+ 1We will provide a formal definition of equivariance equilibrium approximators in Section 3
50
+ 1
51
+
52
+ close to zero. Such a negative result inspires us to balance generalizability and social welfare when we
53
+ design the approximators’ architectures.
54
+ 1.1
55
+ Further Related Work
56
+ Solving (approximate) NE, CE, and CCE for a single game are well studied [Fudenberg et al., 1998,
57
+ Cesa-Bianchi and Lugosi, 2006]. However, many similar games often need to be solved [Harris et al.,
58
+ 2022] , both in practice and in some multi-agent learning algorithms [Marris et al., 2021, Liu et al.,
59
+ 2022]. For instance, in repeated traffic routing games [Sessa et al., 2020], the payoffs of games de-
60
+ pend on the capacity of the underlying network, which can vary with time and weather condi-
61
+ tions.
62
+ In repeated sponsored search auctions, advertisers value different keywords based on the
63
+ current marketing environment [Nekipelov et al., 2015].
64
+ In many multi-agent learning algorithms
65
+ such as Nash Q-learning [Hu and Wellman, 2003], Correlated-Q learning [Greenwald et al., 2003], V-
66
+ learning [Jin et al., 2022] and PSRO [Lanctot et al., 2017], an NE, CE or CCE of a normal-form game
67
+ need to be solved in every update step.
68
+ In these settings, it is preferred to accelerate the speed of game solving by function approximation:
69
+ Marris et al. [2022] introduces a neural equilibrium approximator to approximate CE and CCE for n-
70
+ player normal-form games; Feng et al. [2021] proposes a neural NE approximator in PSRO [Lanctot et al.,
71
+ 2017]; Wu and Lisser [2022] designs a CNN-based NE approximator for zero-sum bimatrix games. Dif-
72
+ ferentiable approximators have also been developed to learn QREs [Ling et al., 2018], NE in chance-
73
+ constrained games [Wu and Lisser, 2023], and opponent’s strategy [Hartford et al., 2016].
74
+ Equivariance is an ideal property of the equilibrium approximator. We will discuss the literates of
75
+ equivariant approximators after formally defining them in Section 3.
76
+ 2
77
+ Preliminary
78
+ In this section, we introduce the preliminary and notations of our paper. We also provide a brief
79
+ introduction to equilibrium approximators.
80
+ 2.1
81
+ Game Theory
82
+ Normal-Form Game
83
+ Let a normal-form game with joint payoff u be Γu = (n, A, u), in which
84
+ • n ∈ N≥2 is the number of players. Each player is represented by the index i ∈ [n].
85
+ • A = ×i∈[n]Ai is the product action space of all players, where Ai = {1, 2, . . ., mi}. For player
86
+ i ∈ [n], let ai ∈ Ai be a specific action of i (An action is also referred to as a pure strategy). A
87
+ joint action a = (a1, a2, . . . , an) ∈ A represents one play of the game in which the player i takes
88
+ action ai. The action space A is a Cartesian product that contains all possible joint actions. We
89
+ have |A| = �
90
+ i∈[n] |Ai| = �
91
+ i∈[n] mi.
92
+ • u = (ui)i∈[n] is the joint payoff or utility of the game. ui is an n-dimensional tensor (or matrix
93
+ if n = 2) describing player i’s payoff on each joint action.
94
+ In our paper, following previous
95
+ literatures [Tsaknakis and Spirakis, 2007, Deligkas et al., 2022], we normalize all the elements of
96
+ payoff into [0, 1].
97
+ A joint (mixed) strategy is a distribution over A. Let σ = ×i∈[n]σi be a product strategy and
98
+ π ∈ ∆A be a joint (possibly correlated) strategy. Denote πi as the marginal strategy of player i in π.
99
+ The expected utility of player i under π is
100
+ ui(π) = Ea∼π[ui(a)] =
101
+
102
+ a∈A
103
+ π(a)ui(a).
104
+ Besides, on behalf of player i, the other players’ joint strategy is denoted as π−i, so as a−i and σ−i.
105
+ 2
106
+
107
+ Nash Equilibrium (NE)
108
+ We say a product strategy σ∗ = (σ∗
109
+ 1, σ∗
110
+ 2, . . . , σ∗
111
+ n) is a NE if each player’s
112
+ strategy is the best response given the strategies of others, i.e.,
113
+ ui(σi, σ∗
114
+ −i) ≤ ui(σ∗
115
+ i , σ∗
116
+ −i), ∀i ∈ [n], σi ∈ ∆Ai.
117
+ (NE)
118
+ Computing NE for even general 2-player or 3-player games is PPAD-hard [Chen et al., 2009, Daskalakis et al.,
119
+ 2009], which leads to research on approximate solutions. For arbitrary ǫ > 0, we say a product strat-
120
+ egy ˆσ is an ǫ-approximate Nash equilibrium (ǫ-NE) if no one can achieve more than ǫ utility gain by
121
+ deviating from her current strategy. Formally,
122
+ ui(σi, ˆσ−i) ≤ ui(ˆσi, ˆσ−i) + ǫ, ∀i ∈ [n], σi ∈ ∆Ai.
123
+ (ǫ-NE)
124
+ The definition of ǫ-NE reflects the idea that players might not be willing to deviate from their strategies
125
+ when the amount of utility they could gain by doing so is tiny (not more than ǫ).
126
+ Coarse Correlated Equilibrium (CCE)
127
+ We say a joint (possibly correlated) strategy π∗ is a CCE
128
+ if no player can receive a higher payoff by acting independently, i.e.,
129
+ ui(σi, π∗
130
+ −i) ≤ ui(π∗), ∀i ∈ [n], σi ∈ ∆Ai,
131
+ (CCE)
132
+ and we say ˆπ is an ǫ-approximate coarse correlated equilibrium (ǫ-CCE) for ǫ > 0 if
133
+ ui(σi, ˆπ−i) ≤ ui(ˆπ) + ǫ, ∀i ∈ [n], σi ∈ ∆Ai,
134
+ (ǫ-CCE)
135
+ The difference between NE and CCE is that in an NE, players execute their strategy individu-
136
+ ally in a decentralized way, while in a CCE, players’ strategies are possibly correlated.
137
+ A stan-
138
+ dard technique to correlate the strategy is sending each player a signal from a centralized controller
139
+ [Shoham and Leyton-Brown, 2008].
140
+ Correlated Equilibrium (CE)
141
+ CE is similar to CCE, except that in a CE, each player can observe
142
+ her recommended action before she acts. Thus, player i deviates her strategy through strategy mod-
143
+ ification φi : Ai → Ai. φi maps actions in Ai to possibly different actions in Ai. Based on strategy
144
+ modification, we say a joint (possibly correlated) strategy π∗ is a CE if
145
+
146
+ a∈A
147
+ π∗(a)ui(φi(ai), a−i) ≤ ui(π∗), ∀i, ∀φi,
148
+ (CE)
149
+ and a joint strategy ˆπ is an ǫ-approximate correlated equilibrium (ǫ-CE) for ǫ > 0 if
150
+
151
+ a∈A
152
+ ˆπ(a)ui(φi(ai), a−i) ≤ ui(ˆπ) + ǫ, ∀i, ∀φi,
153
+ (ǫ-CE)
154
+ Note that for a finite n-player normal-form game, at least one NE, CE, and CCE must exist. This
155
+ is because NE always exists [Nash et al., 1950] and NE ⊆ CE ⊆ CCE.
156
+ Equilibrium Approximation
157
+ To evaluate the quality of a joint strategy to approximate an equilib-
158
+ rium, we define approximation based on exploitability [Lockhart et al., 2019, Goktas and Greenwald,
159
+ 2022].
160
+ Definition 2.1 (Exploitability and Approximation). Given a joint strategy π, the exploitability (or
161
+ regret) Ei(π, u) of player i is the maximum payoff gain of i by deviating from her current strategy, i.e.,
162
+ Ei(π, u) := max
163
+ σ′
164
+ i
165
+ ui(σ′
166
+ i, π−i) − ui(π) = max
167
+ a′
168
+ i
169
+ ui(a′
170
+ i, π−i) − ui(π)
171
+ and the exploitability under strategy modification ECE
172
+ i
173
+ (π, u) of player i is the maximum payoff gain of
174
+ i by deviating through strategy modification, i.e.,
175
+ ECE
176
+ i
177
+ (π, u) := max
178
+ φi
179
+
180
+ a∈A
181
+ π(a)ui(φi(ai), a−i) − ui(π).
182
+ 3
183
+
184
+ Algorithm 1 Example: learning NE/CCE approximator via minibatch SGD
185
+ 1: Input: Training set S
186
+ 2: Parameters: Number of iterations T > 0, batch size B > 0, learning rate η > 0, initial parameters
187
+ w0 ∈ Rd of the approximator model.
188
+ 3: for t = 0 to T do
189
+ 4:
190
+ Receive minibatch St = {u(1), . . . , u(B)} ⊂ S
191
+ 5:
192
+ Compute the empirical average approximation of St:
193
+ 6:
194
+ LSt(f wt) ← 1
195
+ B
196
+ �B
197
+ i=1 E(f wt(u(i)), u(i))
198
+ 7:
199
+ Update model parameters:
200
+ 8:
201
+ wt+1 ← wt − η∇wtLSt(f wt)
202
+ 9: end for
203
+ The equilibrium approximation is defined as the maximum exploitability over all players 2, i.e.,
204
+ E(π, u) :=
205
+
206
+ maxi∈[n] Ei(π, u)
207
+ , for NE and CCE
208
+ maxi∈[n] ECE
209
+ i
210
+ (π, u)
211
+ , for CE
212
+ Based on approximation, we can restate the definition of solution concepts. A product strategy σ
213
+ is an NE of game Γu if E(σ, u) = 0 and is an ǫ-NE if E(σ, u) ≤ ǫ. A joint strategy π is a (C)CE of Γu
214
+ if E(π, u) = 0 and is an ǫ-(C)CE if E(π, u) ≤ ǫ.
215
+ 2.2
216
+ Equilibrium Approximator
217
+ The equilibrium approximators, including NE, CE, and CCE approximators, aim to predict solution
218
+ concepts from game representations. In our paper, we fix the number of players n and action space A.
219
+ We denote by U the set of all the possible game payoffs. The NE approximator f NE : U → ×i∈[n]∆Ai
220
+ maps a game payoff to a product strategy, where f NE(u)i ∈ ∆Ai is player i’s predicted strategy. We
221
+ define FNE as the function class of the NE approximator. Similarly, we define (C)CE approximator
222
+ as f (C)CE : U → ∆A and (C)CE approximator class as F(C)CE.
223
+ An equilibrium approximator can be learned through machine learning paradigms based on empir-
224
+ ical data. For instance, Feng et al. [2021] learn the NE approximator using the game payoffs generated
225
+ in the learning process of PSRO, and optimize the approximator by gradient descent in exploitability.
226
+ Marris et al. [2022] learn the CE and CCE approximators using the games i.i.d. generated from a
227
+ manually designed distribution, and optimize the approximators using maximum welfare minimum
228
+ relative entropy loss. Such a loss balances the equilibrium approximation, the social welfare, and the
229
+ relative entropy of the joint strategy. Additionally, another simple way to learn NE or CCE equilibrium
230
+ approximator is to apply minibatch stochastic gradient descent (SGD) on approximation. Specifically,
231
+ we denote w ∈ Rd as the d-dimensional parameter of the approximator, such as the weights of the
232
+ neural network. We can optimize w by the standard minibatch SGD algorithm on approximation (See
233
+ Algorithm 1).
234
+ 3
235
+ Equivariant Equilibrium Approximator
236
+ In this section, we introduce the equivariance of the equilibrium approximators and the way how
237
+ we apply orbit averaging [Elesedy and Zaidi, 2021] to construct equivariant approximators. Equiv-
238
+ ariant approximator has been developed in many literatures [Hartford et al., 2016, Feng et al., 2021,
239
+ Marris et al., 2022, Wu and Lisser, 2022], which we will discuss latter.
240
+ We first define the permutation of a game. Let ρi : Ai → Ai be a permutation function of player i,
241
+ which is a bijection from Ai to Ai itself. Define Gi ∋ ρi as the class of permutation function for player
242
+ i, which forms an Abelian group.
243
+ Definition 3.1 (Permutation of a game). For a normal-form game Γu = (n, u, A), we define the
244
+ ρi-permutation of payoff tensor u as ρiu = (ρiuj)j∈[n], in which
245
+ (ρiuj)(ai, a−i) = uj(ρ−1
246
+ i
247
+ (ai), a−i), ∀a ∈ A.
248
+ 2A similar metric of equilibrium approximation is called Nikaido-Isoda function [Nikaidˆo and Isoda, 1955] or Nash-
249
+ Conv [Lockhart et al., 2019], which is the sum of exploitability over all players, i.e., �
250
+ i∈[n] Ei(π, u).
251
+ 4
252
+
253
+ We also define the ρi-permutation of joint strategy π as ρiπ, where
254
+ (ρiπ)(ai, a−i) = π(ρ−1
255
+ i
256
+ (ai), a−i), ∀a ∈ A,
257
+ and the ρi-permutation of product strategy σ as ρiσ = (ρiσj)j∈[n], where
258
+ ∀aj ∈ Aj, ρiσj(aj) =
259
+
260
+ σj(aj)
261
+ , if j ̸= i
262
+ σi(ρ−1
263
+ i ai)
264
+ , if j = i
265
+ Equivariant NE Approximator
266
+ Considering the relationship of ρi-permuted game and ρi-permuted
267
+ product strategy, we have the following result for NE:
268
+ Lemma 3.2. In a normal-form game Γu = (n, u, A), for arbitrary player i ∈ [n] and any (ǫ-)NE
269
+ strategy σ = (σi, σ−i), ρiσ = (ρiσi, σ−i) is also an (ǫ-)NE for the ρi-permuted game Γρiu.
270
+ Lemma 3.2 tells the unimportance of action order with respect to NE approximation. Based on it,
271
+ we can summarize two ideal properties for NE approximators, which are defined as follows:
272
+ Definition 3.3 (Player-Permutation-Equivariance, PPE). We say an NE approximator f NE satisfies
273
+ player i permutation-equivariant (i-PE) if for arbitrary permutation function ρi ∈ Gi we have
274
+ f NE(ρiu)i = ρif NE(u)i,
275
+ (i-PE)
276
+ Moreover, we say f NE is player-permutation-equivariant (PPE) if f NE satisfies i-PE for all player
277
+ i ∈ [n].
278
+ Definition 3.4 (Opponent-Permutation-Invariance, OPI). We say an NE approximator f NE is oppo-
279
+ nent i permutation-invariant (i-PI) if for any other player j ∈ [n] − {i} and arbitrary permutation
280
+ function ρi ∈ Gi we have
281
+ f NE(ρiu)j = f NE(u)j, ∀j ̸= i
282
+ (i-PI)
283
+ and we say f NE is opponent-permutation-invariant (OPI) if f NE satisfies i-PI for all player i ∈ [n].
284
+ Equivariant (C)CE approximator
285
+ Considering the relationship of ρi-permuted game and ρi-
286
+ permuted joint strategy, we have a similar result for CE and CCE:
287
+ Lemma 3.5. In a normal-form game Γu = (n, u, A), for an arbitrary player i ∈ [n] and any (ε-)CE
288
+ or (ǫ-)CCE strategy π, ρiπ is also an (ε-)CE or (ǫ-)CCE for the ρi-permuted game Γρiu.
289
+ Inspired by Lemma 3.5, we can also summarize an ideal property for CE and CCE approximators
290
+ defined as follows.
291
+ Definition 3.6 (Permutation-Equivariance,PE). We say an (C)CE approximator f (C)CE is player i
292
+ permutation-equivariant (i-PE) if for permutation function ρi ∈ Gi we have
293
+ f (C)CE(ρiu) = ρif (C)CE(u),
294
+ and we say f (C)CE is permutation-equivariant (PE) if f (C)CE satisfies i-PE for all player i ∈ [n].
295
+ Equivariant Approximators in Literature
296
+ For two-player games, Feng et al. [2021] propose an
297
+ MLP-based NE approximator that satisfies both PPE and OPI for zero-sum games. Additionally, they
298
+ also design a Conv1d-based NE approximator that satisfies PPE only. Hartford et al. [2016] give a PPE
299
+ approximator to predict players’ strategies. The traditional algorithms Tsaknakis and Spirakis [2007]
300
+ and Deligkas et al. [2022], which approximate NE by optimization, are also PPE and OPI to payoff
301
+ and the initial strategies. For n-player general games, Marris et al. [2022] provide a permutation-
302
+ equivariant approximator to approximate CE and CCE. Equivariant architectures are also adopted
303
+ in optimal auction design [Rahme et al., 2021, Duan et al., 2022, Ivanov et al., 2022], and Qin et al.
304
+ [2022] theoretically characterize the benefits of permutation-equivariant in auction mechanisms. We
305
+ follow the rough idea of Qin et al. [2022] when we analyze the benefits of equivariant equilibrium
306
+ approximators.
307
+ 5
308
+
309
+ 3.1
310
+ Orbit Averaging
311
+ Orbit averaging is a well-known method to enforce equivariance or invariance for a function [Schulz-Mirbach,
312
+ 1994]. It averages the inputs of a function over the orbit of a group (e.g., the permutation group in
313
+ our paper).
314
+ Orbit Averaging for NE Approximator
315
+ For an NE approximator f NE and any player i ∈ [n],
316
+ we can construct a i-PI or i-PE NE approximator by averaging with respect to all the permutations
317
+ of player i. Specifically, we construct an i-PI NE approximator by operator Oi with
318
+ (Oif NE)(u)j =
319
+
320
+ f NE(u)i
321
+ , if j = i
322
+ 1
323
+ |Ai|!
324
+
325
+ ρi∈Gi f NE(ρiu)j
326
+ , otherwise
327
+ and we construct an i-PE NE approximator by operator Pi with:
328
+ (Pif NE)(u)j =
329
+
330
+ 1
331
+ |Ai|!
332
+
333
+ ρi∈Gi ρ−1
334
+ i f NE(ρiu)i
335
+ , if j = i
336
+ f NE(u)j
337
+ , otherwise
338
+ Lemma 3.7. Oif NE is i-PI and Pif NE is i-PE. Specially, if f NE is already i-PI or i-PE, then we
339
+ have Oif NE = f NE or Pif NE = f NE, respectively.
340
+ To construct a PPE or OPI NE approximator, we composite the operators with respect to all
341
+ players. Let O = O1 ◦ O2 ◦ · · · ◦ On and P = P1 ◦ P2 ◦ · · · ◦ Pn, we get the following corollary:
342
+ Lemma 3.8. Of NE is OPI and Pf NE is PPE. If f NE is already OPI or PPE, we have Of NE = f NE
343
+ or Pf NE = f NE, respectively.
344
+ Furthermore, we can also compose P ◦O to construct a NE approximator with both PPE and OPI.
345
+ Orbit Averaging for (C)CE Approximator
346
+ For CE or CCE approximator f, we define Qi-
347
+ project for player i ∈ [n] to construct an i-PE approximator, which averages with respect to all the
348
+ permutations of player i.
349
+ (Qif (C)CE)(u) =
350
+ 1
351
+ |Ai|!
352
+
353
+ ρi∈Gi
354
+ ρ−1
355
+ i f (C)CE(ρiu)
356
+ Similarly, we define Q = Q1 ◦ Q2 ◦ · · · ◦ Qn as the composite operator.
357
+ Lemma 3.9. Qif (C)CE is i-PE and Qf (C)CE is PE. Specifically, If f (C)CE is already i-PE or PE,
358
+ then we have Qif (C)CE = f (C)CE or Qf (C)CE = f (C)CE, respectively.
359
+ Combined with Lemma 3.7, Lemma 3.8 and Lemma 3.9, we can have the following corollary directly.
360
+ Corollary 3.10. O2 = O, P2 = P, Q2 = Q.
361
+ The benefit of using orbit averaging is shown in the following lemma:
362
+ Lemma 3.11. Denote X as an idempotent operator, i.e. X 2 = X (e.g. O, P or Q). For function
363
+ class F of NE, CE or CCE approximator, let FX be any subset of F that is closed under X, then XFX
364
+ is the largest subset of FX that is invariant under X.
365
+ According to Lemma 3.8, Lemma 3.9 and Lemma 3.11, OFNE(or PFNE/QF(C)CE) is the largest
366
+ subset of FNE(or FNE/F(C)CE) with the corresponding property (OPI, PPE, or PE) if FNE(or
367
+ FNE/F(C)CE) is closed operator under O(or P/Q). The result tells that the orbit averaging oper-
368
+ ators, while enforcing the operated function to be equivariance or invariance, keep as large capacity
369
+ of the function class as possible. Therefore, we believe that orbit averaging is an ideal approach to
370
+ constructing equivariant or invariant functions.
371
+ 6
372
+
373
+ 4
374
+ Theoretical Analysis of Benefits
375
+ In this section, we theoretically analyze the benefits of equivariant approximators with respect to
376
+ generalizability and approximation.
377
+ 4.1
378
+ Benefits for Generalization
379
+ We first derive the generalization bound and sample complexity for general approximator classes,
380
+ and then we show the benefits of equivariant approximators by applying orbit averaging to the ap-
381
+ proximators.
382
+ The representativeness of an approximator class is measured by the covering numbers [Shalev-Shwartz and Ben-David,
383
+ 2014] under ℓ∞-distance, which are defined as follows:
384
+ Definition 4.1 (ℓ∞-distance). The ℓ∞-distance between two equilibrium approximators f, g is:
385
+ ℓ∞(f, g) = max
386
+ u∈U ∥f(u) − g(u)∥,
387
+ where we define the distance of two product strategies σ and σ′ as
388
+ ∥σ1 − σ2∥ = max
389
+ i∈[n]
390
+
391
+ ai∈Ai
392
+ |σ1
393
+ i (ai) − σ2
394
+ i (ai)|
395
+ and the distance of two joint strategy π and π′ as
396
+ ∥π1 − π2∥ =
397
+
398
+ a∈A
399
+ |π1(a) − π2(a)|
400
+ Definition 4.2 (r-covering number). For r > 0, we say function class Fr r-covers another function
401
+ class F under ℓ∞-distance if for all function f ∈ F, there exists fr ∈ Fr such that ∥f − fr∥∞ ≤ r. The
402
+ r-covering number N∞(F, r) of F is the cardinality of the smallest function class Fr that r-covers F
403
+ under ℓ∞-distance.
404
+ Based on covering numbers, we provide the generalization bounds of NE, CE and CCE approxima-
405
+ tors. The bounds describe the difference between the expected testing approximation and empirical
406
+ training approximation.
407
+ Theorem 4.3 (Generalization bound). For function class F of NE, CE or CCE approximator, with
408
+ probability at least 1 − δ over draw of the training set S (with size m) from payoff distribution D, for
409
+ all approximator f ∈ F we have
410
+ Eu∼D[E(f(u), u)] − 1
411
+ m
412
+
413
+ u∈S
414
+ E(f(u), u) ≤ 2 · inf
415
+ r>0{
416
+
417
+ 2 ln N∞(F, r)
418
+ m
419
+ + Lr} + 4
420
+
421
+ 2 ln(4/δ)
422
+ m
423
+ ,
424
+ where L = 2n for NE approximator, and L = 2 for CE and CCE approximators.
425
+ To get the theorem, we first show that all three equilibrium approximations are Lipschitz continuous
426
+ with respect to strategies. Afterward, we derive the Rademacher complexity [Bartlett and Mendelson,
427
+ 2002] of the expected approximation based on the Lipschitz continuity and covering numbers. See
428
+ Appendix A.6 for the detailed proof.
429
+ We can see from Theorem 4.3 that, with a large enough training set, the generalization gaps of
430
+ equilibrium approximators go to zero if the covering number N∞(F, r) is bounded. As a result, we
431
+ can estimate the expected testing performance through the empirical training performance.
432
+ We can also derive the sample complexities of equilibrium approximators to achieve the desirable
433
+ generalizability.
434
+ Theorem 4.4 (Sample complexity). For ǫ, δ ∈ (0, 1), function class F of NE, CE or CCE approxi-
435
+ mator and distribution D, with probability at least 1 − δ over draw of the training set S with
436
+ m ≥
437
+ 9
438
+ 2ǫ2
439
+
440
+ ln 2
441
+ δ + ln N∞(F, ǫ
442
+ 3L)
443
+
444
+ 7
445
+
446
+ games sampled from D, ∀f ∈ F we have
447
+ Eu∼D[E(f(u), u)] ≤ 1
448
+ m
449
+
450
+ u∈S
451
+ E(f(u), u) + ǫ,
452
+ where L = 2n for NE approximators, and L = 2 for CE and CCE approximators.
453
+ The proof is based on the Lipschitz continuity of approximation, uniform bound, and concentration
454
+ inequality. See Appendix A.7 for details. Theorem 4.4 is also called the uniform convergence of function
455
+ class F, which is a sufficient condition for agnostic PAC learnable [Shalev-Shwartz and Ben-David,
456
+ 2014].
457
+ As for the benefits of equivariant approximators for generalizability, the following result indicates
458
+ that the projected equilibrium approximators have smaller covering numbers.
459
+ Theorem 4.5. The O-projected, P-projected and Q-projected approximator classes have smaller cov-
460
+ ering numbers, i.e., ∀r > 0 we have
461
+ N∞(OFNE, r) ≤ N∞(FNE, r),
462
+ N∞(PFNE, r) ≤ N∞(FNE, r),
463
+ N∞(QF(C)CE, r) ≤ N∞(F(C)CE, r)
464
+ The proof is done by showing all the operators are contraction mappings. See Appendix A.8 for
465
+ details.
466
+ Both the generalization bounds in Theorem 4.3 and the sample complexities in Theorem 4.4 decrease
467
+ with the decrease of covering numbers N∞(F, r). Thus, we can see from Theorem 4.5 that both PPE
468
+ and OPI can improve the generalizability of NE approximators, and PE can improve the generalizability
469
+ of CE and CCE approximators.
470
+ 4.2
471
+ Benefits for Approximation
472
+ We then show the benefits of equivariance for approximation when the payoff distribution is invari-
473
+ ant under permutation. The permutation-invariant distribution holds when the action is anonymous
474
+ or indifferent or when we pre-train the equilibrium approximators using a manually designed distribu-
475
+ tion [Marris et al., 2022].
476
+ (C)CE Approximator
477
+ The following theorem tells the benefit of permutation-equivariance in de-
478
+ creasing the exploitability of (C)CE approximators.
479
+ Theorem 4.6. When the payoff distribution D is invariant under the permutation of payoffs, the
480
+ Q-projected (C)CE approximator has a smaller expected equilibrium approximation. Formally, for all
481
+ f (C)CE ∈ F(C)CE and permutation-invariant distribution D, we have
482
+ Eu∼D[E(Qf (C)CE(u), u)] ≤ Eu∼D[E(f (C)CE(u), u)],
483
+ The proof is done by using the convexity of approximation. See Appendix A.10 for details. We can
484
+ see from Theorem 4.6 that, when payoff distribution is invariant under permutation, it is beneficial to
485
+ use equivariant architecture as the CE or CCE approximators.
486
+ NE Approximator
487
+ As for NE approximator, we have similar results.
488
+ Theorem 4.7. For bimatrix constant-sum games, when the payoff distribution D is invariant under the
489
+ permutation of payoffs, then the X-projected (X ∈ {O, P}) NE approximator has a smaller expected
490
+ exploitability. Formally, for all f NE ∈ FNE and permutation-invariant distribution D for bimatrix
491
+ constant-sum games, we have
492
+ Eu∼D[
493
+
494
+ i
495
+ Ei((Xf NE)(u), u)] ≤ Eu∼D[
496
+
497
+ i
498
+ Ei(f NE(u), u)]
499
+ 8
500
+
501
+ Theorem 4.8. When the payoff distribution D is invariant under the permutation of payoffs, and
502
+ f NE satisfies OPI, then the P-projected NE approximator has a smaller expected NE approximation.
503
+ Formally, for all f NE ∈ FNE that is OPI and permutation-invariant distribution D, we have
504
+ Eu∼D[E((Pf NE)(u), u)] ≤ Eu∼D[E(f NE(u), u)].
505
+ Theorem 4.9. For bimatrix games, when the payoff distribution D is invariant under the permutation
506
+ of payoffs, and f NE satisfies PPE, then the O-projected NE approximator has a smaller expected NE
507
+ approximation. Formally, for all f NE ∈ FNE that is PPE and permutation-invariant distribution D of
508
+ bimatrix games, we have
509
+ Eu∼D[E((Of NE)(u), u)] ≤ Eu∼D[E(f NE(u), u)].
510
+ Theorem 4.8 and Theorem 4.9 tell that PPE and OPI approximators can achieve better approxi-
511
+ mation than ones with only PPE or OPI. Meanwhile, we can see from Theorem 4.7 that for bimatrix
512
+ constant-sum games (such as zero-sum games), it can be preferred to introduce PPE or OPI to the
513
+ architectures.
514
+ 5
515
+ Theoretical Analysis of Limitations
516
+ As we discussed in Section 4, equivariant approximators enjoy better generalizability and better
517
+ approximation sometimes. However, as we will show, they have some limitations regarding equilibrium
518
+ selection and social welfare. Such limitations attribute to the limited representativeness caused by
519
+ equivariance.
520
+ 5.1
521
+ Equilibrium Selection
522
+ We first show that there may be equilibria points that equivariant approximators will never find.
523
+ We illustrate such limitation in permutation-invariant games, which is defined as follows:
524
+ Definition 5.1 (Permutation-ρ-Invariant Game). We say a game Γu is permutation-ρ-invariant, where
525
+ ρ = ◦i∈[n]ρi, if the payoff u is permutation-invariant with respect to ρ. That is, ρu = u.
526
+ Permutation-ρ-invariance indicates that one cannot distinguish joint action a from ρa using only
527
+ the payoff u. We’d like to provide an example to show more insight of permutation-ρ-invariant games:
528
+ Example 5.2. For a 2-player game Γu = (2, u = (u1, u2), A = ([m1], [m2])) , Let ρi = (mi, mi −
529
+ 1, . . . , 1) and ρ = ρ1 ◦ ρ2. If one of the following conditions holds, then u is permutation-ρ-invariant:
530
+ 1. u1 and u2 are symmetric and persymmetric (i.e., symmetric with respect to the northeast-to-
531
+ southwest diagonal) squares.
532
+ 2. Both u1 and u2 are centrosymmetric, i.e., ui(x, y) = ui(m1 +1−x, m2 +1−y) for i ∈ {1, 2}, x ∈
533
+ [m1] and y ∈ [m2].
534
+ For permutation ρ = (◦i∈[n]ρi) and player k ∈ [n], we denote the set of non-fixed actions of player
535
+ k under ρk as
536
+ V (ρk) := {ak|ak ∈ Ak, ρk(ak) ̸= ak}.
537
+ Based on V (ρk), we find some equilibria points of permutation-ρ-invariant games that any equivariant
538
+ approximators will never find.
539
+ Theorem 5.3. For a permutation-ρ-invariant game Γu. if there is a pure NE a∗ = (a∗
540
+ i )i∈[n] and at
541
+ least one player k ∈ [n] such that a∗
542
+ k ∈ V (ρk), then a∗ will never be found by any NE approximator
543
+ with both PPE and OPI. Besides, a∗ (as a pure CE or CCE) will also never be found by any CE or
544
+ CCE approximator with PE.
545
+ We illustrate Theorem 5.3 by the following example:
546
+ 9
547
+
548
+ Example 5.4. Consider a bimatrix game with identity utility
549
+ u =
550
+
551
+ 1, 1
552
+ 0, 0
553
+ 0, 0
554
+ 1, 1
555
+
556
+ There are two pure NE (bolded in the above matrix) and one mixed NE of σ1 = (0.5, 0.5) and σ2 =
557
+ (0.5, 0.5). Let ρi be the unique permute function (except for identity function) of player i ∈ [2], and
558
+ ρ = ρ1 ◦ ρ2. The game is permutation-ρ-invariant.
559
+ Case 1: Let f be a permutation-equivariant CE or CCE approximator, and denote π = f(u). We
560
+ have
561
+ π = f(u)
562
+ (a)
563
+ = f(ρu)
564
+ (b)
565
+ = ρf(u),
566
+ where (a) holds by permutation-ρ-invariance of u, and (b) holds by PE of f. Thus, we have π1,1 =
567
+ π2,2 ∈ [0, 1
568
+ 2] and π1,2 = π2,1 ∈ [0, 1
569
+ 2]. As a result, the two pure (C)CEs cannot be found.
570
+ Case 2: Let f be a NE approximator that holds PPE and OPI. Denote f(u) = (σ1, σ2), where
571
+ σ1 = (p1, 1 − p1) and σ2 = (p2, 1 − p2). By PPE and OPI of f, we have
572
+ f(u)1 = (p1, 1 − p1)
573
+ (a)
574
+ = f(ρ1ρ2u)1
575
+ (b)
576
+ = ρ1f(ρ2u)1
577
+ (c)
578
+ = ρ1f(u)1 = (1 − p1, p1),
579
+ where (a) holds by permutaion-ρ-invariance of u, (b) holds by PPE of f, and (c) holds by OPI of f.
580
+ As a result, the only NE that f could find is the mixed NE.
581
+ As we can see from the example and Theorem 5.3, the equivariance, while introducing inductive bias
582
+ to the approximator architecture, is also a strong constraint. Such a constraint is why the equivariant
583
+ approximators cannot find all the equilibria points.
584
+ 5.2
585
+ Social Welfare
586
+ The social welfare of a joint strategy π is defined as the sum of all players’ utilities, i.e.,
587
+ SW(π, u) =
588
+
589
+ i∈[n]
590
+ ui(π).
591
+ The equilibrium with higher social welfare is usually preferred [Marris et al., 2022].
592
+ To analyze the social welfare of equivariant approximators, we define the worst social welfare ratio
593
+ as follows:
594
+ Definition 5.5. For any N, M ≥ 2 and two NE (or CE/CCE) approximator classes F1, F2 that target
595
+ on games with number of players n ≤ N and |Ai| ≤ M, we define the worst social welfare ratio of F1
596
+ over F2 as:
597
+ SWRN,M(F1, F2) := inf
598
+ D
599
+ maxf1∈F1 Eu∼DSW(f1(u), u)
600
+ maxf2∈F2 Eu∼DSW(f2(u), u)
601
+ SWRN,M(F1, F2) measures the relative representativeness of F1 over F2 in terms of social welfare.
602
+ Based on that, we have the following result for equivariant CE and CCE approximator classes:
603
+ Theorem 5.6. Given N, M ≥ 2, let F(C)CE
604
+ PE
605
+ be the function class (target on games with number of
606
+ players n ≤ N and |Ai| ≤ M) of all the (C)CE approximators with PE. Denote by F(C)CE
607
+ general the function
608
+ class of all the (C)CE approximators. Then we have
609
+ SWRN,M(F(C)CE
610
+ PE
611
+ , F(C)CE
612
+ general) = 1.
613
+ Theorem 5.6 tells that, while the permutation-equivariant (C)CE approximator class may not be
614
+ able to find all the (C)CE in a game, it can keep the social welfare of the output solutions.
615
+ However, when considering equivariant NE approximators, we have the following negative result:
616
+ 10
617
+
618
+ Theorem 5.7. Given N, M ≥ 2, let FNE
619
+ OPI, FNE
620
+ PPE and FNE
621
+ both be the function classes (target on games
622
+ with number of players n ≤ N and |Ai| ≤ M) of all the NE approximators with OPI, PPE and both.
623
+ Denote the function class of all the NE approximators as FNE
624
+ general. Then we have
625
+ SWRN,M(FNE
626
+ OPI, FNE
627
+ general) =
628
+ 1
629
+ M N−1 ,
630
+ (1)
631
+ SWRN,M(FNE
632
+ PPE, FNE
633
+ general) ≤ 1
634
+ M ,
635
+ (2)
636
+ SWRN,M(FNE
637
+ both, FNE
638
+ general) =
639
+ 1
640
+ M N−1 .
641
+ (3)
642
+ Additionally, when M ≥ 3, denote by �FNE
643
+ both the function class of all the NE oracles (functions that
644
+ always output exact NE solutions of the input games) with both PPE and OPI, and by �
645
+ FNE
646
+ general the
647
+ function class of all the NE oracles. Then we have
648
+ SWRN,M( �FNE
649
+ both, �FNE
650
+ general) = 0.
651
+ (4)
652
+ The proof is done by construction (See Appendix A.15 for details). As an illustration of Equa-
653
+ tion (4), consider a bimatrix game with the following payoff:
654
+ u =
655
+
656
+
657
+ 1, 1
658
+ 0, 0
659
+ 0, 1
660
+ 2 + ε
661
+ 0, 0
662
+ 1, 1
663
+ 0, 1
664
+ 2 + ε
665
+ 1
666
+ 2 + ε, 0
667
+ 1
668
+ 2 + ε, 0
669
+ ε, ε
670
+
671
+
672
+ for ǫ ∈ (0, 1
673
+ 2). The maximum NE (the upper-left corner of u) social welfare is 2, which can be found
674
+ by at least one NE oracle in �FNE
675
+ general. However, the only NE (the lower-right corner of u) that the NE
676
+ oracles in �FNE
677
+ both could find only has a social welfare of 2ǫ. As a result,
678
+ SWR2,3( �FNE
679
+ both, �FNE
680
+ general) ≤ 2ǫ
681
+ 2 = ǫ,
682
+ which goes to zero as ǫ → 0. Recall that we always have SWRN,M ≥ 0, thus Equation (4) holds when
683
+ N = 2 and M = 3.
684
+ Theorem 5.7 tells that equivariant NE approximators may lose some social welfare while enjoying
685
+ better generalizability. Such a result inspires us to balance generalizability and social welfare when
686
+ designing the NE approximator architecture.
687
+ 6
688
+ Conclusion and Future Work
689
+ In this paper, we theoretically analyze the benefits and limitations of equivariant equilibrium
690
+ approximators, including player-permutation-equivariant (PPE) and opponent-permutation-invariant
691
+ (OPI) NE approximator, and permutation-equivariant (PE) CE and CCE approximators. For the
692
+ benefits, we first show that these equivariant approximators enjoy better generalizability. To get the
693
+ result, we derive the generalization bounds and sample complexities based on covering numbers, and
694
+ then we prove that the symmetric approximators have lower covering numbers. We then show that
695
+ the equivariant approximators can decrease the exploitability when the payoff distribution is invariant
696
+ under permutation. For the limitations, we find the equivariant approximators may fail to find some
697
+ equilibria points due to their limited representativeness caused by equivariance. Besides, while equiv-
698
+ ariant (C)CE approximators can keep the social welfare, the equivariant NE approximators reach a
699
+ small worst social welfare ratio comparing to the general approximators. Such a result indicates that
700
+ equivariance may reduce social welfare; therefore, we’d better balance the generalizability and social
701
+ welfare when we design the architectures of NE approximators.
702
+ As for future work, since in our paper we assume the training and testing payoff distribution are
703
+ the same, an interesting topic is to study the benefits of equivariant approximators under the payoff
704
+ distribution shift. Moreover, since we consider fixed and discrete action space, another interesting
705
+ future direction is to analyze the benefits of equivariant approximators in varying or continuous action
706
+ space.
707
+ 11
708
+
709
+ References
710
+ Peter L Bartlett and Shahar Mendelson. Rademacher and gaussian complexities: Risk bounds and
711
+ structural results. Journal of Machine Learning Research, 3(Nov):463–482, 2002.
712
+ Nicolo Cesa-Bianchi and G´abor Lugosi. Prediction, learning, and games. Cambridge university press,
713
+ 2006.
714
+ Xi Chen, Xiaotie Deng, and Shang-Hua Teng. Settling the complexity of computing two-player Nash
715
+ equilibria. Journal of the ACM (JACM), 56(3):1–57, 2009.
716
+ Constantinos Daskalakis, Paul W Goldberg, and Christos H Papadimitriou. The complexity of com-
717
+ puting a Nash equilibrium. SIAM Journal on Computing, 39(1):195–259, 2009.
718
+ Argyrios Deligkas, Michail Fasoulakis, and Evangelos Markakis. A polynomial-time algorithm for 1/3-
719
+ approximate Nash equilibria in bimatrix games. In 30th Annual European Symposium on Algorithms,
720
+ ESA, 2022.
721
+ Zhijian Duan, Dinghuai Zhang, Wenhan Huang, Yali Du, Jun Wang, Yaodong Yang, and Xiaotie Deng.
722
+ Towards the PAC learnability of Nash equilibrium. arXiv preprint arXiv:2108.07472, 2021.
723
+ Zhijian Duan, Jingwu Tang, Yutong Yin, Zhe Feng, Xiang Yan, Manzil Zaheer, and Xiaotie Deng. A
724
+ context-integrated transformer-based neural network for auction design. In International Conference
725
+ on Machine Learning, pages 5609–5626. PMLR, 2022.
726
+ Paul D¨utting, Zhe Feng, Harikrishna Narasimhan, David Parkes, and Sai Srivatsa Ravindranath.
727
+ Optimal auctions through deep learning. In International Conference on Machine Learning, pages
728
+ 1706–1715. PMLR, 2019.
729
+ Bryn Elesedy and Sheheryar Zaidi. Provably strict generalisation benefit for equivariant models. In
730
+ International Conference on Machine Learning, pages 2959–2969. PMLR, 2021.
731
+ Xidong Feng, Oliver Slumbers, Ziyu Wan, Bo Liu, Stephen McAleer, Ying Wen, Jun Wang, and
732
+ Yaodong Yang. Neural auto-curricula in two-player zero-sum games. Advances in Neural Information
733
+ Processing Systems, 34:3504–3517, 2021.
734
+ Drew Fudenberg, Fudenberg Drew, David K Levine, and David K Levine. The theory of learning in
735
+ games, volume 2. MIT press, 1998.
736
+ Denizalp Goktas and Amy Greenwald. Exploitability minimization in games and beyond. In Advances
737
+ in Neural Information Processing Systems, 2022.
738
+ Amy Greenwald, Keith Hall, Roberto Serrano, et al. Correlated Q-learning. In ICML, volume 3, pages
739
+ 242–249, 2003.
740
+ Keegan Harris, Ioannis Anagnostides, Gabriele Farina, Mikhail Khodak, Zhiwei Steven Wu, and Tuo-
741
+ mas Sandholm. Meta-learning in games. arXiv preprint arXiv:2209.14110, 2022.
742
+ Jason S Hartford, James R Wright, and Kevin Leyton-Brown. Deep learning for predicting human
743
+ strategic behavior. Advances in neural information processing systems, 29, 2016.
744
+ Junling Hu and Michael P Wellman. Nash Q-learning for general-sum stochastic games. Journal of
745
+ machine learning research, 4(Nov):1039–1069, 2003.
746
+ Dmitry Ivanov, Iskander Safiulin, Igor Filippov, and Ksenia Balabaeva. Optimal-er auctions through
747
+ attention. In Advances in Neural Information Processing Systems, 2022.
748
+ Chi Jin, Qinghua Liu, Yuanhao Wang, and Tiancheng Yu. V-learning – a simple, efficient, decentralized
749
+ algorithm for multiagent RL. In ICLR 2022 Workshop on Gamification and Multiagent Solutions,
750
+ 2022.
751
+ Marc Lanctot, Vinicius Zambaldi, Audrunas Gruslys, Angeliki Lazaridou, Karl Tuyls, Julien P´erolat,
752
+ David Silver, and Thore Graepel. A unified game-theoretic approach to multiagent reinforcement
753
+ learning. Advances in neural information processing systems, 30, 2017.
754
+ 12
755
+
756
+ C. Ling, Fei Fang, and J. Z. Kolter. What game are we playing? End-to-end learning in normal and
757
+ extensive form games. In IJCAI, pages 396–402, 2018.
758
+ Siqi Liu, Marc Lanctot, Luke Marris, and Nicolas Heess. Simplex neural population learning: Any-
759
+ mixture bayes-optimality in symmetric zero-sum games. In International Conference on Machine
760
+ Learning, ICML, 2022.
761
+ Edward Lockhart, Marc Lanctot, Julien P´erolat, Jean-Baptiste Lespiau, Dustin Morrill, Finbarr Tim-
762
+ bers, and Karl Tuyls. Computing approximate equilibria in sequential adversarial games by ex-
763
+ ploitability descent. In Sarit Kraus, editor, IJCAI, pages 464–470. ijcai.org, 2019.
764
+ Luke Marris, Paul Muller, Marc Lanctot, Karl Tuyls, and Thore Graepel. Multi-agent training be-
765
+ yond zero-sum with correlated equilibrium meta-solvers. In International Conference on Machine
766
+ Learning, pages 7480–7491. PMLR, 2021.
767
+ Luke Marris, Ian Gemp, Thomas Anthony, Andrea Tacchetti, Siqi Liu, and Karl Tuyls. Turbocharging
768
+ solution concepts: Solving NEs, CEs and CCEs with neural equilibrium solvers. In Advances in
769
+ Neural Information Processing Systems, 2022.
770
+ John F Nash et al. Equilibrium points in n-person games. Proceedings of the national academy of
771
+ sciences, 36(1):48–49, 1950.
772
+ Denis Nekipelov, Vasilis Syrgkanis, and Eva Tardos. Econometrics for learning agents. In Proceedings
773
+ of the sixteenth acm conference on economics and computation, pages 1–18, 2015.
774
+ Hukukane Nikaidˆo and Kazuo Isoda.
775
+ Note on non-cooperative convex games.
776
+ Pacific Journal of
777
+ Mathematics, 5(S1):807–815, 1955.
778
+ Tian Qin, Fengxiang He, Dingfeng Shi, Wenbing Huang, and Dacheng Tao. Benefits of permutation-
779
+ equivariance in auction mechanisms. In Advances in Neural Information Processing Systems, 2022.
780
+ Jad Rahme, Samy Jelassi, Joan Bruna, and S Matthew Weinberg. A permutation-equivariant neu-
781
+ ral network architecture for auction design. In Proceedings of the AAAI Conference on Artificial
782
+ Intelligence, 2021.
783
+ Hanns Schulz-Mirbach. Constructing invariant features by averaging techniques. In Proceedings of the
784
+ 12th IAPR International Conference on Pattern Recognition, Vol. 3-Conference C: Signal Processing
785
+ (Cat. No. 94CH3440-5), volume 2, pages 387–390. IEEE, 1994.
786
+ Pier Giuseppe Sessa, Ilija Bogunovic, Andreas Krause, and Maryam Kamgarpour. Contextual games:
787
+ Multi-agent learning with side information. Advances in Neural Information Processing Systems,
788
+ 33:21912–21922, 2020.
789
+ Shai Shalev-Shwartz and Shai Ben-David. Understanding machine learning: From theory to algorithms.
790
+ Cambridge university press, 2014.
791
+ Yoav Shoham and Kevin Leyton-Brown. Multiagent systems: Algorithmic, game-theoretic, and logical
792
+ foundations. Cambridge University Press, 2008.
793
+ Haralampos Tsaknakis and Paul G Spirakis. An optimization approach for approximate Nash equilib-
794
+ ria. In International Workshop on Web and Internet Economics, pages 42–56. Springer, 2007.
795
+ Dawen Wu and Abdel Lisser. Using CNN for solving two-player zero-sum games. Expert Systems with
796
+ Applications, page 117545, 2022.
797
+ Dawen Wu and Abdel Lisser. CCGnet: A deep learning approach to predict Nash equilibrium of
798
+ chance-constrained games. Information Sciences, 2023.
799
+ 13
800
+
801
+ A
802
+ Omitted Proof
803
+ A.1
804
+ Useful Lemma
805
+ We first introduce a lemma, which will be frequently used in the following proofs.
806
+ Lemma A.1. ∀i, j ∈ [n], ρi ∈ Gi we have (ρiu)j(σi, σ−i) = uj(ρ−1
807
+ i σi, σ−i) and (ρiu)j(π) = uj(ρ−1
808
+ i π)
809
+ Proof. Define �ai := ρ−1
810
+ i ai. For product strategy σ = (σi)i∈[n],
811
+ (ρiu)j(σi, σ−i) =
812
+
813
+ ai∈Ai
814
+
815
+ a−i∈A−i
816
+ (ρiu)j(ai, a−i) · σi(ai) · σ−i(a−i)
817
+ =
818
+
819
+ ai∈Ai
820
+
821
+ a−i∈A−i
822
+ uj(ρ−1
823
+ i ai, a−i) · σi(ai) · σ−i(a−i)
824
+ =
825
+
826
+ ai∈Ai
827
+
828
+ a−i∈A−i
829
+ uj(ρ−1
830
+ i ai, a−i) · (ρ−1
831
+ i
832
+ σi)(ρ−1
833
+ i ai) · σ−i(a−i)
834
+ =
835
+
836
+ �ai∈Ai
837
+
838
+ a−i∈A−i
839
+ uj(�ai, a−i) · (ρ−1
840
+ i
841
+ σi)(�ai) · σ−i(a−i)
842
+ =uj(ρ−1
843
+ i σi, σ−i)
844
+ For joint strategy π,
845
+ (ρiu)j(π) =
846
+
847
+ ai∈Ai
848
+
849
+ a−i∈A−i
850
+ (ρiuj)(ai, a−i) · π(ai, a−i)
851
+ =
852
+
853
+ ai∈Ai
854
+
855
+ a−i∈A−i
856
+ uj(ρ−1
857
+ i ai, a−i) · π(ai, a−i)
858
+ =
859
+
860
+ ai∈Ai
861
+
862
+ a−i∈A−i
863
+ uj(ρ−1
864
+ i ai, a−i) · (ρ−1
865
+ i
866
+ π)(ρ−1
867
+ i
868
+ ai, a−i)
869
+ =
870
+
871
+ �ai∈Ai
872
+
873
+ a−i∈A−i
874
+ uj(�ai, a−i) · (ρ−1
875
+ i
876
+ π)(�ai, a−i)
877
+ =uj(ρ−1
878
+ i π)
879
+ A.2
880
+ Proof of Lemma 3.2
881
+ Proof. For player i, we have
882
+ Ei(ρiσ, ρiu) = max
883
+ ai∈Ai ρiui(ai, ρiσ−i) − ρiui(ρiσ) = max
884
+ ai∈Ai ρiui(ai, σ−i) − ρiui(ρiσi, σ−i)
885
+ = max
886
+ ai∈Ai ui(ρ−1
887
+ i ai, σ−i) − ui(ρ−1
888
+ i ρiσi, σ−i)
889
+ (a)
890
+ = max
891
+ ai∈Ai ui(ai, σ−i) − ui(σi, σ−i) = Ei(σ, u),
892
+ where (a) holds since ρi is a bijection on Ai. For player j ̸= i, we have
893
+ Ej(ρiσ, ρiu) = max
894
+ aj∈A ρiuj(aj, ρiσ−j) − ρiuj(ρiσ) = max
895
+ aj∈Aj uj(aj, ρ−1
896
+ i ρiσ−j) − uj(ρ−1
897
+ i ρiσ)
898
+ = max
899
+ aj∈Aj uj(aj, σ−j) − uj(σ) = Ej(σ, u)
900
+ From above, we have E(ρiσ, ρiu) = E(σ, u), thus if σ is a ε-NE of Γu, then ρiσ must be a ε-NE of
901
+ Γρiu.
902
+ 14
903
+
904
+ A.3
905
+ Proof of Lemma 3.5
906
+ CCE
907
+ For player i, we have
908
+ Ei(ρiπ, ρiu) = max
909
+ ai∈Ai(ρiui)(ai, (ρiπ)−i) − (ρiui)(ρiπi)
910
+ = max
911
+ ai∈Ai(ρiui)(ai, (ρiπ)−i) − ui(ρ−1
912
+ i ρiπi)
913
+ = max
914
+ ai∈Ai(ρiui)(ai, (ρiπ)−i) − ui(πi)
915
+ = max
916
+ ai∈Ai
917
+
918
+ b∈A
919
+ (ρiui)(ai, b−i) · (ρiπ)(b) − ui(πi)
920
+ = max
921
+ ai∈Ai
922
+
923
+ bi∈Ai,b−i∈A−i
924
+ ui(ρ−1
925
+ i
926
+ ai, b−i) · π(ρ−1
927
+ i
928
+ bi, b−i) − ui(πi)
929
+ = max
930
+ ai∈Ai
931
+
932
+ bi∈Ai,b−i∈A−i
933
+ ui(ai, b−i) · π(bi, b−i) − ui(πi)
934
+ , ρi is a bijection on Ai
935
+ =Ei(π, u)
936
+ For player j ̸= i, we have
937
+ Ej(ρiπ, ρiu) = max
938
+ aj∈Aj(ρiuj)(aj, (ρiπ)−j) − (ρiuj)(ρiπj)
939
+ = max
940
+ aj∈Aj(ρiuj)(aj, (ρiπ)−j) − uj(ρ−1
941
+ i ρiπj)
942
+ = max
943
+ aj∈Aj(ρiuj)(aj, (ρiπ)−j) − uj(πj)
944
+ = max
945
+ aj∈Aj
946
+
947
+ b∈A
948
+ (ρiuj)(aj, b−j) · (ρiπ)(b) − uj(πj)
949
+ = max
950
+ aj∈Aj
951
+
952
+ bi∈Ai,b−i∈A−i
953
+ uj(aj, (b−j)−i, ρ−1
954
+ i bi) · π(ρ−1
955
+ i
956
+ bi, b−i) − uj(πj)
957
+ = max
958
+ aj∈Aj
959
+
960
+ bi∈Ai,b−i∈A−i
961
+ uj(aj, (b−j)−i, bi) · π(bi, b−i) − uj(πj)
962
+ , ρi is a bijection on Ai
963
+ =Ej(π, u)
964
+ Thus, we have E(ρiπ, ρiu) = E(π, u). Thus, if π is a ε-CCE of Γu, then ρiπ must be a ε-CCE of Γρiu.
965
+ CE
966
+ For player j ̸= i, we have
967
+ ECE
968
+ j
969
+ (ρiπ, ρiu) =
970
+ max
971
+ φj:Aj→Aj
972
+
973
+ a∈A
974
+ (ρiπ)(a) · (ρiuj)(φj(aj), a−j) − (ρiuj)(ρiπ)
975
+ =
976
+ max
977
+ φj:Aj→Aj
978
+
979
+ a∈A
980
+ π(ρ−1
981
+ i
982
+ ai, a−i) · uj(φj(aj), a−i,j, ρ−1
983
+ i ai) − uj(π)
984
+ =
985
+ max
986
+ φj:Aj→Aj
987
+
988
+ a∈A
989
+ π(ai, a−i) · uj(φj(aj), a−i,j, ai) − uj(π)
990
+ , ρi is a bijection on Ai
991
+ =ECE
992
+ j
993
+ (π, u)
994
+ For player i, we define operator ¯ρi as (¯ρiφi)(ai) = ρ−1
995
+ i φi(ρiai). We can verify that ¯ρi is a bijection
996
+ on {φi : Ai → Ai}, because ¯· is a homomorphism in the sense that ρ1
997
+ i ◦ ρ2
998
+ i = ρ2
999
+ i ρ1
1000
+ i and ¯· maps the
1001
+ identity mapping of Ai to the identity mapping of {Ai → Ai}. Specifically,
1002
+ ρ1
1003
+ i ◦ ρ2
1004
+ i φi(ai) = (ρ1
1005
+ i )−1(ρ2
1006
+ i φi)(ρ1
1007
+ i ai) = (ρ1
1008
+ i )−1(ρ2
1009
+ i )−1φi(ρ2
1010
+ i ρ1
1011
+ i ai) = ρ2
1012
+ i ρ1
1013
+ i φi(ai),
1014
+ and
1015
+ eiφi(ai) = e−1
1016
+ i φi(eiai) = φi(ai).
1017
+ 15
1018
+
1019
+ Based on ¯ρi, we have
1020
+ ECE
1021
+ i
1022
+ (ρiπ, ρiu)
1023
+ =
1024
+ max
1025
+ φi:Ai→Ai
1026
+
1027
+ a∈A
1028
+ (ρiπ)(a) · (ρiui)(φi(ai), a−i) − ui(π)
1029
+ =
1030
+ max
1031
+ φi:Ai→Ai
1032
+
1033
+ a∈A
1034
+ π(ρ−1
1035
+ i ai, a−i)ui(ρ−1
1036
+ i φi(ai), a−i) − ui(π)
1037
+ =
1038
+ max
1039
+ φi:Ai→Ai
1040
+
1041
+ a∈A
1042
+ π(ρ−1
1043
+ i ai, a−i)ui(ρ−1
1044
+ i φi(ρi(ρ−1
1045
+ i ai)), a−i) − ui(π)
1046
+ =
1047
+ max
1048
+ φi:Ai→Ai
1049
+
1050
+ a∈A
1051
+ π(ai, a−i)ui(ρ−1
1052
+ i φi(ρiai), a−i) − ui(π)
1053
+ , ρi is a bijection on Ai
1054
+ =
1055
+ max
1056
+ φi:Ai→Ai
1057
+
1058
+ a∈A
1059
+ π(ai, a−i)ui((¯ρiφi)(ai), a−i) − ui(π)
1060
+ =
1061
+ max
1062
+ φi:Ai→Ai
1063
+
1064
+ a∈A
1065
+ π(ai, a−i)ui(φi(ai), a−i) − ui(π)
1066
+ , ¯ρi is a bijection on {Ai → Ai}
1067
+ =ECE
1068
+ i
1069
+ (π, u)
1070
+ Thus, we have E(ρiπ, ρiu) = E(π, u), thus if π is a ε-CE of Γu, then ρiπ must be a ε-CE of Γρiu.
1071
+ A.4
1072
+ Proof of Lemma 3.7 to Lemma 3.9
1073
+ Proof of Lemma 3.7. ∀j ̸= i, ρ0 ∈ Gi, for operator Oi we have
1074
+ (Oif NE)(ρ0u)j =
1075
+ 1
1076
+ |Ai|!
1077
+
1078
+ ρi∈Gi
1079
+ f NE(ρiρ0u)j
1080
+ (a)
1081
+ =
1082
+ 1
1083
+ |Ai|!
1084
+
1085
+ �ρi∈Gi
1086
+ f NE(�ρiu)j = (Oif NE)(u)j
1087
+ where in (a) we define �ρi = ρiρ0, and (a) holds since ρ0 is a bijection on Gi. As a result, Oif NE is i-PI.
1088
+ For operator Pi we have
1089
+ (Pif NE)(ρ0u)i =
1090
+ 1
1091
+ |Ai|!
1092
+
1093
+ ρi∈Gi
1094
+ ρ−1
1095
+ i f NE(ρiρ0u)j = ρ0
1096
+ 1
1097
+ |Ai|!
1098
+
1099
+ ρi∈Gi
1100
+ ρ−1
1101
+ 0 ρ−1
1102
+ i f NE(ρiρ0u)j
1103
+ =ρ0
1104
+ 1
1105
+ |Ai|!
1106
+
1107
+ �ρi∈Gi
1108
+ �ρ−1
1109
+ i f NE(�ρiu)j = ρ0(Pif NE)(u)i,
1110
+ therefore Pif NE is i-PE.
1111
+ If f NE is already i-PI, ∀j ̸= i we have
1112
+ Oif NE(u)j =
1113
+ 1
1114
+ |Ai|!
1115
+
1116
+ ρi∈Gi
1117
+ f NE(ρiu)j =
1118
+ 1
1119
+ |Ai|!
1120
+
1121
+ ρi∈Gi
1122
+ f NE(u)j = f NE(u)j,
1123
+ and Oif NE(u)i = f NE(u)i according to definition of Oi. Therefore, Oif NE = f NE for i-PI f NE.
1124
+ If f NE is already i-PE, we have
1125
+ Pif NE(u)i =
1126
+ 1
1127
+ |Ai|!
1128
+
1129
+ ρi∈Gi
1130
+ ρ−1
1131
+ i f NE(ρiu)i =
1132
+ 1
1133
+ |Ai|!
1134
+
1135
+ ρi∈Gi
1136
+ ρ−1
1137
+ i ρif NE(u)i =
1138
+ 1
1139
+ |Ai|!
1140
+
1141
+ ρi∈Gi
1142
+ f NE(u)i = f NE(u)i,
1143
+ and ∀j ̸= i, Pif NE(u)j = f NE(u)j according to definition of Pi. Therefore, Pif NE = f NE for i-PE
1144
+ f NE.
1145
+ Proof of Lemma 3.8. A direct inference from Lemma 3.7
1146
+ Proof of Lemma 3.9. ∀ρ0 ∈ Gi, we have
1147
+ 16
1148
+
1149
+ (Qif (C)CE)(ρ0u) =
1150
+ 1
1151
+ |Ai|!
1152
+
1153
+ ρi∈Gi
1154
+ ρ−1
1155
+ i f (C)CE(ρiρ0u) = ρ0
1156
+ 1
1157
+ |Ai|!
1158
+
1159
+ ρi∈Gi
1160
+ ρ−1
1161
+ 0 ρ−1
1162
+ i
1163
+ f (C)CE(ρiρ0u)
1164
+ =ρ0
1165
+ 1
1166
+ |Ai|!
1167
+
1168
+ �ρi∈Gi
1169
+ �ρ−1
1170
+ i f (C)CE(�ρiu) = ρ0(Qif (C)CE)(u)
1171
+ If f (C)CE is already i-PE, we have
1172
+ Qif (C)CE(u) =
1173
+ 1
1174
+ |Ai|!
1175
+
1176
+ ρi∈Gi
1177
+ ρ−1
1178
+ i f (C)CE(ρiu) =
1179
+ 1
1180
+ |Ai|!
1181
+
1182
+ ρi∈Gi
1183
+ ρ−1
1184
+ i ρif (C)CE(u) =
1185
+ 1
1186
+ |Ai|!
1187
+
1188
+ ρi∈Gi
1189
+ f (C)CE(u) = f (C)CE(u)
1190
+ A.5
1191
+ Proof of Lemma 3.11
1192
+ We prove the three claims below.
1193
+ 1. XFX ⊆ FX .
1194
+ 2. X 2FX = XFX .
1195
+ 3. If XY = Y ⊆ FX , then Y ⊆ XFX
1196
+ The first claim holds because FX is closed under X, and the second claim holds because X is
1197
+ idempotent. For the third claim, from Y ⊆ FX we know XY ⊆ XFX , then Y = XY ⊆ XFX .
1198
+ We immediately know XFX is the largest subset of FX that is invariant under X.
1199
+ A.6
1200
+ Proof of Theorem 4.3
1201
+ Some of the techniques come from D¨utting et al. [2019] and Duan et al. [2021]. We first introduce
1202
+ some useful lemmas. Denote ℓ : F × U → R as the loss function (such as ℓ(f, u) := E(f(u), u)). We
1203
+ measure the capacity of the composite function class ℓ ◦ F using the empirical Rademacher complex-
1204
+ ity [Bartlett and Mendelson, 2002] on the training set S, which is defined as:
1205
+ RS(ℓ ◦ F) := 1
1206
+ mEx∼{+1,−1}m
1207
+
1208
+ sup
1209
+ f∈F
1210
+ m
1211
+
1212
+ i=1
1213
+ xi · ℓ(f, u(i))
1214
+
1215
+ ,
1216
+ where x is distributed i.i.d. according to uniform distribution in {+1, −1}. We have
1217
+ Lemma A.2 (Shalev-Shwartz and Ben-David [2014]). Let S be a training set of size m drawn i.i.d.
1218
+ from distribution D over U. Then with probability at least 1 − δ over draw of S from D, for all f ∈ F,
1219
+ Eu∼D[ℓ(f, u)] − 1
1220
+ m
1221
+
1222
+ u∈S
1223
+ ℓ(l, u) ≤ 2RS(ℓ ◦ F) + 4
1224
+
1225
+ 2 ln(4/δ)
1226
+ m
1227
+ Lemma A.3. If |ℓ(·)| ≤ c for constant c > 0 and ∀f, f ′ ∈ F, |ℓ(f, u) − ℓ(f ′, u)| ≤ L∥f − f ′∥∞, then
1228
+ we have
1229
+ Eu∼D[ℓ(f, u)] − 1
1230
+ m
1231
+
1232
+ u∈S
1233
+ ℓ(l, u) ≤ 2 inf
1234
+ r>0
1235
+
1236
+ c
1237
+
1238
+ 2 ln N∞(F, r)
1239
+ m
1240
+ + Lr
1241
+
1242
+ + 4
1243
+
1244
+ 2 ln(4/δ)
1245
+ m
1246
+ Proof. For function class F, let Fr with |Fr| = N∞(F, r) be the function class that r-covers F for
1247
+ 17
1248
+
1249
+ some r > 0. Similarly, ∀f ∈ F, denote fr ∈ Fr be the function that r-covers f. We have
1250
+ RS(ℓ ◦ F) = 1
1251
+ mEx
1252
+
1253
+ sup
1254
+ f∈F
1255
+ m
1256
+
1257
+ i=1
1258
+ xi · ℓ(f, u(i))
1259
+
1260
+ = 1
1261
+ mEx
1262
+
1263
+ sup
1264
+ f∈F
1265
+ m
1266
+
1267
+ i=1
1268
+ xi ·
1269
+
1270
+ ℓ(fr, u(i)) + ℓ(f, u(i)) − ℓ(fr, u(i))
1271
+ ��
1272
+ ≤ 1
1273
+ mEx
1274
+
1275
+ sup
1276
+ fr∈Fr
1277
+ m
1278
+
1279
+ i=1
1280
+ xi · ℓ(fr, u(i))
1281
+
1282
+ + 1
1283
+ mEx
1284
+
1285
+ sup
1286
+ f∈F
1287
+ m
1288
+
1289
+ i=1
1290
+ |xi · Lr|
1291
+
1292
+ , |ℓ(f, u) − ℓ(fr, u)| ≤ L∥f − fr∥∞ = Lr
1293
+ ≤ sup
1294
+ fr∈Fr
1295
+
1296
+
1297
+
1298
+
1299
+ m
1300
+
1301
+ i=1
1302
+ ℓ2(fr, u(i)) ·
1303
+
1304
+ 2 ln N∞(F, r)
1305
+ m
1306
+ + Lr
1307
+ m Ex∥x∥
1308
+ , the first term holds by Massart’s lemma
1309
+
1310
+
1311
+ c2m ·
1312
+
1313
+ 2 ln N∞(F, r)
1314
+ m
1315
+ + Lr
1316
+ m Ex∥x∥
1317
+ ≤c
1318
+
1319
+ 2 ln N∞(F, r)
1320
+ m
1321
+ + Lr,
1322
+ (5)
1323
+ Combining Lemma A.2 and Equation (5), we get
1324
+ Eu∼D[ℓ(f, u)] − 1
1325
+ m
1326
+
1327
+ u∈S
1328
+ ℓ(l, u) ≤ 2 inf
1329
+ r>0
1330
+
1331
+ c
1332
+
1333
+ 2 ln N∞(F, r)
1334
+ m
1335
+ + Lr
1336
+
1337
+ + 4
1338
+
1339
+ 2 ln(4/δ)
1340
+ m
1341
+ NE Approximator
1342
+ Lemma A.4. For arbitrary product mixed strategy σ and σ′, we have
1343
+ |E(σ, u) − E(σ′, u)| ≤ 2n∥σ − σ′∥,
1344
+ Proof. ∀σ, σ′, we define y−j := (σ1, . . . , σj−1, σ′
1345
+ j+1, . . . , σ′
1346
+ n). Then, ∀i ∈ [n] we have
1347
+ |ui(σ) − ui(σ′)| =|ui(σ1, σ2, . . . , σn) − ui(σ′, σ′
1348
+ 2, . . . , σ′
1349
+ n)|
1350
+ =
1351
+ ���
1352
+ n
1353
+
1354
+ j=1
1355
+
1356
+ ui(σ1, . . . , σj, σ′
1357
+ j+1, . . . , σ′
1358
+ n) − ui(σ1, . . . , σ′
1359
+ j, σ′
1360
+ j+1, . . . , σ′
1361
+ n)
1362
+ ����
1363
+ =
1364
+ ���
1365
+ n
1366
+
1367
+ j=1
1368
+
1369
+ ui(σj, y−j) − ui(σ′
1370
+ j, y−j)
1371
+ ����
1372
+ =
1373
+ ���
1374
+ n
1375
+
1376
+ j=1
1377
+
1378
+ aj
1379
+ (σj(aj) − σ′
1380
+ j(aj))
1381
+
1382
+ a−j
1383
+ ui(aj, a−j)y−j(a−j)
1384
+ ���
1385
+
1386
+ n
1387
+
1388
+ j=1
1389
+
1390
+ aj
1391
+ ���σj(aj) − σ′
1392
+ j(aj)
1393
+ ���
1394
+
1395
+ a−j
1396
+ ui(aj, a−j)y−j(a−j)
1397
+
1398
+ n
1399
+
1400
+ j=1
1401
+
1402
+ aj
1403
+ ���σj(aj) − σ′
1404
+ j(aj)
1405
+ ���
1406
+
1407
+ a−j
1408
+ y−j(a−j)
1409
+ , ui(·) ∈ [0, 1]
1410
+
1411
+ n
1412
+
1413
+ j=1
1414
+
1415
+ aj∈Aj
1416
+ ���σj(aj) − σ′
1417
+ j(aj)
1418
+ ��� ≤ n max
1419
+ j∈[n]
1420
+
1421
+ aj∈Aj
1422
+ ���σj(aj) − σ′
1423
+ j(aj)
1424
+ ���
1425
+ =n∥σ − σ′∥,
1426
+ Therefore, ∀ai ∈ Ai,
1427
+ ui(ai, σ−i) − ui(σ) =ui(ai, σ−i) − ui(ai, σ′
1428
+ −i) + ui(ai, σ′
1429
+ −i) − ui(σ′) + ui(σ′) − ui(σ)
1430
+ ≤n∥σ − σ′∥ + E(σ′, u) + n∥σ − σ′∥
1431
+ =E(σ′, u) + 2n∥σ − σ′∥.
1432
+ 18
1433
+
1434
+ Based on that, we get
1435
+ E(σ, u) =
1436
+ max
1437
+ i∈N,ai∈Ai[ui(ai, σ−i) − ui(σ)] ≤ E(σ′, u) + 2n∥σ − σ′∥
1438
+ Similarly, we also have
1439
+ E(σ′, u) ≤ E(σ, u) + 2n∥σ − σ′∥
1440
+ Based on Lemma A.4, ∀f, f ′ ∈ FNE, we have
1441
+ E(f(u), u) − E(f ′(u), u) ≤ 2∥f(u) − f ′(u)∥ ≤ 2∥f − f ′∥∞
1442
+ Considering that |E(·)| ≤ 1, according to Lemma A.3, we have:
1443
+ Eu∼D[E(f NE(u), u)] − 1
1444
+ m
1445
+
1446
+ u∈S
1447
+ E(f NE(u), u) ≤ 2 · inf
1448
+ r>0
1449
+ ��
1450
+ 2 ln N∞(FNE, r)
1451
+ m
1452
+ + 2nr
1453
+
1454
+ + 4
1455
+
1456
+ 2 ln(4/δ)
1457
+ m
1458
+ CCE Approximator
1459
+ Lemma A.5. For arbitrary joint mixed strategy π and π′, we have
1460
+ |E(π, u) − E(π′, u)| ≤ 2∥π − π′∥,
1461
+ Proof. ∀π, π′, ∀i ∈ [n] we have
1462
+ |ui(π) − ui(π′)| =
1463
+
1464
+ a∈A
1465
+ (π(a) − π′(a))ui(a)
1466
+ (a)
1467
+
1468
+
1469
+ a∈A
1470
+ |π(a) − π′(a)| = ∥π − π′∥
1471
+ (6)
1472
+ where (a) holds since ui(·) ∈ [0, 1]. Therefore, ∀ai ∈ Ai,
1473
+ ui(ai, π−i) − ui(π) =ui(ai, π−i) − ui(ai, π′
1474
+ −i) + ui(ai, π′
1475
+ −i) − ui(π′) + ui(π′) − ui(π)
1476
+ ≤∥π − π′∥ + E(π′, u) + ∥π − π′∥
1477
+ =E(π′, u) + 2∥π − π′∥.
1478
+ Based on that, we get
1479
+ E(π, u) =
1480
+ max
1481
+ i∈N,ai∈Ai[ui(ai, π−i) − ui(π)] ≤ E(π′, u) + 2∥π − π′∥
1482
+ Similarly, we also have
1483
+ E(π′, u) ≤ E(π, u) + 2∥π − π′∥
1484
+ Based on Lemma A.5, ∀f, f ′ ∈ FCCE, we have
1485
+ E(f(u), u) − E(f ′(u), u) ≤ 2∥f(u) − f ′(u)∥ ≤ 2∥f − f ′∥∞
1486
+ Considering that |E(·)| ≤ 1, according to Lemma A.3, we have:
1487
+ Eu∼D[E(f CCE(u), u)] − 1
1488
+ m
1489
+
1490
+ u∈S
1491
+ E(f CCE(u), u) ≤ 2 · inf
1492
+ r>0
1493
+ ��
1494
+ 2 ln N∞(FCCE, r)
1495
+ m
1496
+ + 2r
1497
+
1498
+ + 4
1499
+
1500
+ 2 ln(4/δ)
1501
+ m
1502
+ 19
1503
+
1504
+ CE Approximator
1505
+ Lemma A.6. For arbitrary joint mixed strategy π and π′, we have
1506
+ |ECE(π, u) − ECE(π′, u)| ≤ 2∥π − π′∥,
1507
+ Proof. ∀ai ∈ Ai, ∀φi, we have
1508
+
1509
+ a∈A
1510
+ π(a)ui(φ(ai), a−i) − ui(π) =
1511
+
1512
+ a∈A
1513
+ π(a)ui(φ(ai), a−i) −
1514
+
1515
+ a∈A
1516
+ π′(a)ui(φ(ai), a−i)
1517
+ +
1518
+
1519
+ a∈A
1520
+ π′(a)ui(φ(ai), a−i) − ui(π′) + ui(π′) − ui(π)
1521
+ ≤∥π − π′∥ + ECE(π′, u) + ∥π − π′∥
1522
+ =ECE(π′, u) + 2∥π − π′∥.
1523
+ Based on that, we get
1524
+ ECE(π, u) = max
1525
+ i∈N max
1526
+ φi
1527
+
1528
+ a∈A
1529
+ π(a)ui(φ(ai), a−i) − ui(π) ≤ ECE(π′, u) + 2∥π − π′∥
1530
+ Similarly, we also have
1531
+ ECE(π′, u) ≤ ECE(π, u) + 2∥π − π′∥
1532
+ Based on Lemma A.5, ∀f, f ′ ∈ FCE, we have
1533
+ ECE(f(u), u) − ECE(f ′(u), u) ≤ 2∥f(u) − f ′(u)∥ ≤ 2∥f − f ′∥∞
1534
+ Considering that |E(·)| ≤ 1, according to Lemma A.3, we have:
1535
+ Eu∼D[ECE(f CE(u), u)] − 1
1536
+ m
1537
+
1538
+ u∈S
1539
+ ECE(f CE(u), u) ≤ 2 · inf
1540
+ r>0
1541
+ ��
1542
+ 2 ln N∞(FCE, r)
1543
+ m
1544
+ + 2r
1545
+
1546
+ + 4
1547
+
1548
+ 2 ln(4/δ)
1549
+ m
1550
+ A.7
1551
+ Proof of Theorem 4.4
1552
+ For function class F of NE, CE or CCE approximators, according to Lemma A.4, Lemma A.5 and
1553
+ Lemma A.6, ∀f, g ∈ F we have
1554
+ E(CE)(f(u), u) − E(CE)(g(u), u) ≤ L∥f(u) − g(u)∥ ≤ L∥f − g∥∞,
1555
+ (7)
1556
+ where L = 2n for NE approximators, and L = 2 for CE and CCE approximators.
1557
+ For simplicity, we denote LS(f) =
1558
+ 1
1559
+ m
1560
+
1561
+ u∈S E(CE)(f(u), u) and LD(f) = Eu∼D[E(CE)(f(u), u)]. let
1562
+ Fr with |Fr| = N∞(F, r) be the function class that r-covers F for some r > 0. ∀ǫ ∈ (0, 1), by setting
1563
+ r =
1564
+ ǫ
1565
+ 3L we have
1566
+ PS∼Dm
1567
+
1568
+ ∃f ∈ F,
1569
+ ��LS(f) − LD(f)
1570
+ �� > ǫ
1571
+
1572
+ ≤PS∼Dm
1573
+
1574
+ ∃f ∈ F,
1575
+ ��LS(f) − LS(fr)
1576
+ �� +
1577
+ ��LS(fr) − LD(fr)
1578
+ �� +
1579
+ ��LD(fr) − LD(f)
1580
+ �� > ǫ
1581
+
1582
+ (a)
1583
+ ≤PS∼Dm
1584
+
1585
+ ∃f ∈ F, Lr +
1586
+ ��LS(fr) − LD(fr)
1587
+ �� + Lr > ǫ
1588
+
1589
+ ≤PS∼Dm
1590
+
1591
+ ∃fr ∈ Fr,
1592
+ ��LS(fr) − LD(fr)
1593
+ �� > ǫ − 2Lr
1594
+
1595
+ (b)
1596
+ ≤N∞(F, r)PS∼Dm
1597
+ ���LS(f) − LD(f)
1598
+ �� > ǫ − 2Lr
1599
+
1600
+ (c)
1601
+ ≤2N∞(F, r) exp(−2m(ǫ − 2Lr)2),
1602
+ =2N∞(F, ǫ
1603
+ 3L) exp(−2
1604
+ 9mǫ2)
1605
+ where (a) holds by Equation (7), (b) holds by union bound, and (c) holds by Hoeffding inequality. As
1606
+ a result, when m ≥
1607
+ 9
1608
+ 2ǫ2
1609
+
1610
+ ln 2
1611
+ δ + ln N∞(F,
1612
+ ǫ
1613
+ 3L)
1614
+
1615
+ , we have PS∼Dm
1616
+
1617
+ ∃f ∈ F,
1618
+ ���LS(f) − LD(f)
1619
+ ��� > ǫ
1620
+
1621
+ < δ.
1622
+ 20
1623
+
1624
+ A.8
1625
+ Proof of Theorem 4.5
1626
+ We first provide an auxiliary lemma.
1627
+ Lemma A.7. For function class F and orbit averaging operator X, if ∀f, g ∈ F, ℓ∞(Xf, Xg) ≤
1628
+ ℓ∞(f, g), then N∞(XF, r) ≤ N∞(F, r) for any r > 0.
1629
+ Proof. ∀r > 0, Denote Fr as the smallest r-covering set that covers F with size N∞(F, r). ∀f ∈ F,
1630
+ let fr ∈ Fr be the function that r-covers f. We have ℓ∞(Xfr, Xf) ≤ ℓ∞(fr, f) ≤ r. Therefore, XFr
1631
+ is a r-covering set of XF, and we have N∞(XF, r) ≤ |XFr| ≤ |Fr| = N∞.
1632
+ For player i ∈ [n] and ∀f NE, gNE ∈ FNE, assuming U is closed under any ρi ∈ Gi. For Oi,
1633
+ l∞(Oif NE, OigNE) = max
1634
+ u∈U ∥Oif NE(u) − OigNE(u)∥
1635
+ = max
1636
+ j∈[n] max
1637
+ u∈U ∥(Oif NE)(u)j − (OigNE)(u)j∥
1638
+ = max
1639
+
1640
+ max
1641
+ u∈U ∥f NE(u)i − gNE(u)i∥, max
1642
+ j̸=i max
1643
+ u∈U ∥
1644
+ 1
1645
+ |Ai|!
1646
+
1647
+ ρi∈Gi
1648
+ (f NE(ρiu)j − gNE(ρiu)j)∥
1649
+
1650
+ ≤ max
1651
+
1652
+ max
1653
+ u∈U ∥f NE(u)i − gNE(u)i∥, max
1654
+ j̸=i
1655
+ 1
1656
+ |Ai|!
1657
+
1658
+ ρi∈Gi
1659
+ max
1660
+ u∈U ∥f NE(ρiu)j − gNE(ρiu)j∥
1661
+
1662
+ = max
1663
+
1664
+ max
1665
+ u∈U ∥f NE(u)i − gNE(u)i∥, max
1666
+ j̸=i
1667
+ 1
1668
+ |Ai|!
1669
+
1670
+ ρi∈Gi
1671
+ max
1672
+ u∈U ∥f NE(u)j − gNE(u)j∥
1673
+
1674
+ = max
1675
+
1676
+ max
1677
+ u∈U ∥f NE(u)i − gNE(u)i∥, max
1678
+ j̸=i max
1679
+ u
1680
+ ∥f NE(u)j − gNE(u)j∥
1681
+
1682
+ =l∞(f NE, gNE)
1683
+ Since O = O1 ◦ · · · ◦ On, we have
1684
+ ℓ∞(Of NE, OgNE) ≤ ℓ∞(f NE, gNE).
1685
+ (8)
1686
+ For Pi,
1687
+ l∞(Pif NE, PigNE) = max
1688
+ u∈U max
1689
+ j∈[n] ∥(Pif NE)(u)j − (PigNE)(u)j∥
1690
+ = max
1691
+
1692
+ max
1693
+ j̸=i max
1694
+ u
1695
+ ∥f NE(u)j − gNE(u)j∥, max
1696
+ u
1697
+
1698
+ 1
1699
+ |Ai|!
1700
+
1701
+ ρi∈Gi
1702
+ ρ−1
1703
+ i (f NE(ρiu)i − gNE(ρiu)i)∥
1704
+
1705
+ = max
1706
+
1707
+ max
1708
+ j̸=i max
1709
+ u
1710
+ ∥f NE(u)j − gNE(u)j∥, max
1711
+ u
1712
+
1713
+ 1
1714
+ |Ai|!
1715
+
1716
+ ρi∈Gi
1717
+ (f NE(ρiu)i − gNE(ρiu)i)∥
1718
+
1719
+ ≤ max
1720
+
1721
+ max
1722
+ j̸=i max
1723
+ u
1724
+ ∥f NE(u)j − gNE(u)j∥,
1725
+ 1
1726
+ |Ai|!
1727
+
1728
+ ρi∈Gi
1729
+ max
1730
+ u
1731
+ ∥f NE(ρiu)i − gNE(ρiu)i∥
1732
+
1733
+ = max
1734
+
1735
+ max
1736
+ j̸=i max
1737
+ u
1738
+ ∥f NE(u)j − gNE(u)j∥,
1739
+ 1
1740
+ |Ai|!
1741
+
1742
+ ρi∈Gi
1743
+ max
1744
+ u
1745
+ ∥f NE(u)i − gNE(u)i∥
1746
+
1747
+ = max
1748
+
1749
+ max
1750
+ j̸=i max
1751
+ u
1752
+ ∥f NE(u)j − gNE(u)j∥, max
1753
+ u
1754
+ ∥f NE(u)i − gNE(u)i∥
1755
+
1756
+ =l∞(f NE, gNE)
1757
+ Since P = P1 ◦ · · · ◦ Pn, we have
1758
+ ℓ∞(Pf NE, PgNE) ≤ ℓ∞(f NE, gNE).
1759
+ (9)
1760
+ 21
1761
+
1762
+ For CE or CCE approximator f (C)CE ∈ F(C)CE and Qi, we have
1763
+ l∞(Qif (C)CE, Qig(C)CE) = max
1764
+ u∈U ∥(Qif (C)CE)(u) − (Qig(C)CE)(u)∥
1765
+ = max
1766
+ u
1767
+
1768
+ 1
1769
+ |Ai|!
1770
+
1771
+ ρi∈Gi
1772
+ ρ−1
1773
+ i (f (C)CE(ρiu) − g(C)CE(ρiu))∥
1774
+ ≤ max
1775
+ u
1776
+ 1
1777
+ |Ai|!
1778
+
1779
+ ρi∈Gi
1780
+ ∥ρ−1
1781
+ i (f (C)CE(ρiu) − g(C)CE(ρiu))∥
1782
+
1783
+ 1
1784
+ |Ai|!
1785
+
1786
+ ρi∈Gi
1787
+ max
1788
+ u
1789
+ ∥ρ−1
1790
+ i (f (C)CE(ρiu) − g(C)CE(ρiu))∥
1791
+ =
1792
+ 1
1793
+ |Ai|!
1794
+
1795
+ ρi∈Gi
1796
+ max
1797
+ u
1798
+ ∥f (C)CE(ρiu) − g(C)CE(ρiu)∥
1799
+ =
1800
+ 1
1801
+ |Ai|!
1802
+
1803
+ ρi∈Gi
1804
+ max
1805
+ u
1806
+ ∥f (C)CE(u) − g(C)CE(u)∥
1807
+ =l∞(f (C)CE, g(C)CE)
1808
+ Since Q = Q1 ◦ · · · ◦ Qn, we have
1809
+ ℓ∞(Qf (C)CE, Qg(C)CE) ≤ ℓ∞(f (C)CE, g(C)CE).
1810
+ (10)
1811
+ Combing Lemma A.7, Equation (8), Equation (9) and Equation (10), we finish the proof.
1812
+ A.9
1813
+ Proof of Theorem 4.8
1814
+ We first introduce a useful lemma. It is about the property of Ei(σ, u)
1815
+ Lemma A.8. Ei(σ, u) is
1816
+ 1. Linear on σi, i.e.
1817
+ pEi((σ1
1818
+ i , σ−i), u) + (1 − p)Ei((σ2
1819
+ i , σ−i), u) = Ei((pσ1
1820
+ i + (1 − p)σ2
1821
+ i , σ−i), u), ∀p ∈ [0, 1]
1822
+ 2. Convex on σj, i.e.
1823
+ pEi((σ1
1824
+ j , σ−j), u) + (1 − p)Ei((σ2
1825
+ j , σ−j), u) ≥ Ei((pσ1
1826
+ j + (1 − p)σ2
1827
+ j , σ−j), u), ∀p ∈ [0, 1], j ̸= i
1828
+ Proof. We recall the definition Ei(σ, u) = maxai∈Ai ui(ai, σ−i) − ui(σ). Notice that ui(σ) is linear on
1829
+ σk for all k ∈ [n], thus both ui(ai, σ−i) and ui(σ) are linear on σk for any k ∈ [n]. Moreover, the
1830
+ maximum operator on a set of linear functions will induce a convex function.
1831
+ Proof of Theorem 4.8. We prove the theorem in two steps.
1832
+ Step 1
1833
+ First, we show that
1834
+ Eu∼D[Ei((Pif NE)(u), u)] = Eu∼D[Ei(f NE(u), u)],
1835
+ ∀f NE ∈ FNE
1836
+ 22
1837
+
1838
+ By definition,
1839
+ Eu∼D[Ei(Pif NE(u), u)]
1840
+ =Eu∼D[Ei((
1841
+ 1
1842
+ |Ai|!
1843
+
1844
+ ρi∈Gi
1845
+ ρ−1
1846
+ i f(ρiu)i, f(u)−i), u)]
1847
+ =
1848
+ 1
1849
+ |Ai|!
1850
+
1851
+ ρi∈Gi
1852
+ Eu∼D[Ei((ρ−1
1853
+ i
1854
+ f(ρiu)i, f(u)−i), u)]
1855
+ , by linearity of Ei(σ, u) on σi
1856
+ =
1857
+ 1
1858
+ |Ai|!
1859
+
1860
+ ρi∈Gi
1861
+ Ev∼D[Ei((ρ−1
1862
+ i
1863
+ f(v)i, f(ρ−1
1864
+ i v)−i), ρ−1
1865
+ i v)]
1866
+ , let v = ρiu and use the invariance of D
1867
+ =
1868
+ 1
1869
+ |Ai|!
1870
+
1871
+ ρi∈Gi
1872
+ Ev∼D[Ei((ρ−1
1873
+ i
1874
+ f(v)i, f(v)−i), ρ−1
1875
+ i v)]
1876
+ , OPI of f
1877
+ =
1878
+ 1
1879
+ |Ai|!
1880
+
1881
+ ρi∈Gi
1882
+ Eu∼D[Ei((f(u)i, f(u)−i), u)]
1883
+ , invariance of Ei(σ, u) under ρ−1
1884
+ i
1885
+ ∈ Gi
1886
+ =Eu∼D[Ei(f NE(u), u)]
1887
+ Step 2
1888
+ Then we show that
1889
+ Eu∼D[Ej((Pif NE)(u), u)] ≤ Eu∼D[Ej(f NE(u), u)],
1890
+ ∀f NE ∈ FNE, j ̸= i
1891
+ Eu∼D[Ej((Pif NE)(u), u)]
1892
+ =Eu∼D[Ej((
1893
+ 1
1894
+ |Ai|!
1895
+
1896
+ ρi∈Gi
1897
+ ρ−1
1898
+ i f(ρiu)i, f(u)−i), u)]
1899
+
1900
+ 1
1901
+ |Ai|!
1902
+
1903
+ ρi∈Gi
1904
+ Eu∼D[Ej((ρ−1
1905
+ i
1906
+ f(ρiu)i, f(u)−i), u)]
1907
+ , by convexity of Ej(σ, u) on σi
1908
+ =
1909
+ 1
1910
+ |Ai|!
1911
+
1912
+ ρi∈Gi
1913
+ Ev∼D[Ej((ρ−1
1914
+ i
1915
+ f(v)i, f(ρ−1
1916
+ i v)−i), ρ−1
1917
+ i v)]
1918
+ , let v = ρiu and use the invariance of D
1919
+ =
1920
+ 1
1921
+ |Ai|!
1922
+
1923
+ ρi∈Gi
1924
+ Ev∼D[Ej((ρ−1
1925
+ i
1926
+ f(v)i, f(v)−i), ρ−1
1927
+ i v)]
1928
+ , OPI of f
1929
+ =
1930
+ 1
1931
+ |Ai|!
1932
+
1933
+ ρi∈Gi
1934
+ Eu∼D[Ej((f(u)i, f(u)−i), u)]
1935
+ , invariance of Ej(σ, u) under ρ−1
1936
+ i
1937
+ ∈ Gi
1938
+ =Eu∼D[Ej(f NE(u), u)]
1939
+ Since P = ◦iPi and E = maxi Ei, we have
1940
+ Eu∼D[E((Pf NE)(u), u)] ≤ Eu∼D[E(f NE(u), u)]
1941
+ A.10
1942
+ Proof of Theorem 4.6
1943
+ Similar to the proof of Theorem 4.8, we first prove a lemma about the property of Ei(π, u) and
1944
+ ECE
1945
+ i
1946
+ (π, u).
1947
+ Lemma A.9. Ei(π, u) and ECE
1948
+ i
1949
+ (π, u) are convex on π, i.e.
1950
+ pE(CE)
1951
+ i
1952
+ (π1, u) + (1 − p)E(CE)
1953
+ i
1954
+ (π2, u) ≥ E(CE)
1955
+ i
1956
+ (pπ1 + (1 − p)π2, u),
1957
+ ∀p ∈ [0, 1]
1958
+ 23
1959
+
1960
+ Proof. We recall the definition Ei(π, u) = maxai∈Ai ui(ai, π−i) − ui(π) for CCE approximator and
1961
+ ECE
1962
+ i
1963
+ (π, u) = maxφi∈Ai→Ai
1964
+
1965
+ a π(a)ui(φi(ai), a−i) − ui(π) for CE approximator. ui(ai, π−i) is linear
1966
+ on π.
1967
+ Given φ, �
1968
+ a π(a)ui(φi(ai), a−i) is also linear on π. Moreover, the maximum operator on a set of
1969
+ linear functions will induce a convex function.
1970
+ Proof of Theorem 4.6. For f ∈ F(C)CE and ∀i, j ∈ [n],
1971
+ Eu∼D[E(CE)
1972
+ i
1973
+ (Qjf(u), u)] =Eu∼D[E(CE)
1974
+ i
1975
+ (
1976
+ 1
1977
+ |Aj|!
1978
+
1979
+ ρj∈Gj
1980
+ ρ−1
1981
+ j f(ρju), u)]
1982
+ , by definition
1983
+
1984
+ 1
1985
+ |Aj|!
1986
+
1987
+ ρj∈Gj
1988
+ Eu∼D[E(CE)
1989
+ i
1990
+ (ρ−1
1991
+ j f(ρju), u)]
1992
+ , by convexity
1993
+ =
1994
+ 1
1995
+ |Aj|!
1996
+
1997
+ ρj∈Gj
1998
+ Ev∼D[E(CE)
1999
+ i
2000
+ (ρ−1
2001
+ j f(v), ρ−1
2002
+ j v)]
2003
+ , let v = ρju
2004
+ =
2005
+ 1
2006
+ |Aj|!
2007
+
2008
+ ρj∈Gj
2009
+ Ev∼D[E(CE)
2010
+ i
2011
+ (f(v), v)]
2012
+ , invariance of E(CE)
2013
+ i
2014
+ (π, u) under ρ−1
2015
+ j
2016
+ ∈ Gj
2017
+ =Eu∼D[E(CE)
2018
+ i
2019
+ (f(u), u)]
2020
+ Since Q = ◦iQi and E = maxi Ei, we have
2021
+ Eu∼D[E(Qf(u), u)] ≤ Eu∼D[E(f(u), u)]
2022
+ A.11
2023
+ Proof of Theorem 4.9
2024
+ We prove the theorem in two steps, similar to the proof of Theorem 4.8.
2025
+ Step 1
2026
+ First we show that for player i ∈ {1, 2}, let {j} = {1, 2}\{i},
2027
+ Eu∼D[Ei((Oif NE)(u), u)] ≤ Eu∼D[Ei(f NE(u), u)]
2028
+ This is because
2029
+ Eu∼D[Ei((Oif NE)(u), u)] =Eu∼D[Ei((f NE(u)i,
2030
+ 1
2031
+ |Ai|!
2032
+
2033
+ ρi∈Gi
2034
+ f NE(ρiu)j), u)]
2035
+
2036
+ 1
2037
+ |Ai|!
2038
+
2039
+ ρi∈Gi
2040
+ Eu∼D[Ei((f NE(u)i, f NE(ρiu)j), u)]
2041
+ , by convexity of Ei on σj
2042
+ =
2043
+ 1
2044
+ |Ai|!
2045
+
2046
+ ρi∈Gi
2047
+ Ev∼D[Ei((f NE(ρ−1
2048
+ i v)i, f NE(v)j), ρ−1
2049
+ i
2050
+ v)]
2051
+ , let v = ρiu
2052
+ =
2053
+ 1
2054
+ |Ai|!
2055
+
2056
+ ρi∈Gi
2057
+ Ev∼D[Ei((ρ−1
2058
+ i
2059
+ f NE(v)i, f NE(v)j), ρ−1
2060
+ i
2061
+ v)]
2062
+ , by PPE of f NE
2063
+ =
2064
+ 1
2065
+ |Ai|!
2066
+
2067
+ ρi∈Gi
2068
+ Ev∼D[Ei((f NE(v)i, f NE(v)j), v)]
2069
+ , invariance of Ei(σ, u) under ρ−1
2070
+ i
2071
+ ∈ G
2072
+ =Eu∼D[Ei((f NE)(u), u)]
2073
+ Step 2
2074
+ Then we show that if j ̸= i and {i, j} = {1, 2}
2075
+ Eu∼D[Ej((Oif NE)(u), u)] = Eu∼D[Ej(f NE(u), u)]
2076
+ 24
2077
+
2078
+ This is because
2079
+ Eu∼D[Ej((Oif NE)(u), u)] =Eu∼D[Ej((f NE(u)i,
2080
+ 1
2081
+ |Ai|!
2082
+
2083
+ ρi∈Gi
2084
+ f NE(ρiu)j), u)]
2085
+ =
2086
+ 1
2087
+ |Ai|!
2088
+
2089
+ ρi∈Gi
2090
+ Eu∼D[Ej((f NE(u)i, f NE(ρiu)j), u)]
2091
+ , by linearity of Ej on σj
2092
+ =
2093
+ 1
2094
+ |Ai|!
2095
+
2096
+ ρi∈Gi
2097
+ Ev∼D[Ej((f NE(ρ−1
2098
+ i v)i, f NE(v)j), ρ−1
2099
+ i v)]
2100
+ , let v = ρiu
2101
+ =
2102
+ 1
2103
+ |Ai|!
2104
+
2105
+ ρi∈Gi
2106
+ Ev∼D[Ej((ρ−1
2107
+ i f NE(v)i, f NE(v)j), ρ−1
2108
+ i v)]
2109
+ , by PPE of f NE
2110
+ =
2111
+ 1
2112
+ |Ai|!
2113
+
2114
+ ρi∈Gi
2115
+ Ev∼D[Ej((f NE(v)i, f NE(v)j), v)]
2116
+ , invariance of Ej(σ, u) under ρ−1
2117
+ i
2118
+ ∈ Gi
2119
+ =Eu∼D[Ej(f NE(u), u)]
2120
+ Since O = ◦iOi and E = maxi Ei, we have
2121
+ Eu∼D[E(Of NE(u), u)] ≤ Eu∼D[E(f NE(u), u)]
2122
+ A.12
2123
+ Proof of Theorem 4.7
2124
+ We only prove for the P-projected case; the proof for O-projected case is similar and therefore
2125
+ omitted.
2126
+ Recall
2127
+ Ei(σ, u) = max
2128
+ ai∈Ai ui(ai, σ−i) − ui(σ)
2129
+ Denote u1(σ) + u2(σ) ≡ c, then
2130
+
2131
+ i
2132
+ Ei(σ, u) =
2133
+ max
2134
+ a1∈A1,a2∈A2 u1(a1, σ2) + u2(a2, σ1) − c
2135
+ Then we have
2136
+ Eu∼D[
2137
+
2138
+ i
2139
+ Ei((Pf NE)(u), u)] =Eu∼D[max
2140
+ a1,a2 u1(a1, (Pf NE)(u)2) + u2(a2, (Pf NE)(u)1) − c]
2141
+ =Eu∼D[max
2142
+ a1 u1(a1, (Pf NE)(u)2)] + Eu∼D[max
2143
+ a2 u2(a2, (Pf NE)(u)1)] − c
2144
+ For the first term,
2145
+ Eu∼D[max
2146
+ a1 u1(a1, (Pf NE)(u)2)] =Eu∼D[max
2147
+ a1 u1(a1,
2148
+ 1
2149
+ |A2|!
2150
+
2151
+ ρ2∈G2
2152
+ ρ��1
2153
+ 2 f NE(ρ2u)2)]
2154
+
2155
+ 1
2156
+ |A2|!
2157
+
2158
+ ρ2∈G2
2159
+ Eu∼D[max
2160
+ a1 u1(a1, ρ−1
2161
+ 2 f NE(ρ2u)2)]
2162
+ =
2163
+ 1
2164
+ |A2|!
2165
+
2166
+ ρ2∈G2
2167
+ Ev∼D[max
2168
+ a1 (ρ−1
2169
+ 2 v)1(a1, ρ−1
2170
+ 2 f NE(v)2)]
2171
+ =
2172
+ 1
2173
+ |A2|!
2174
+
2175
+ ρ2∈G2
2176
+ Ev∼D[max
2177
+ a1 v1(a1, f NE(v)2)]
2178
+ =Eu∼D[max
2179
+ a1 u1(a1, f NE(u)2)]
2180
+ Similarly, for the second term,
2181
+ Eu∼D[max
2182
+ a2 u2(a2, (Pf NE)(u)1)] ≤ Eu∼D[max
2183
+ a2 u2(a2, f NE(u)1)]
2184
+ 25
2185
+
2186
+ Above all,
2187
+ Eu∼D[
2188
+
2189
+ i
2190
+ Ei((Pf NE)(u), u)] =Eu∼D[max
2191
+ a1 u1(a1, (Pf NE)(u)2)] + Eu∼D[max
2192
+ a2 u2(a2, (Pf NE)(u)1)] − c
2193
+ ≤Eu∼D[max
2194
+ a1 u1(a1, f NE(u)2)] + Eu∼D[max
2195
+ a2 u2(a2, f NE(u)1)] − c
2196
+ =Eu∼D[
2197
+
2198
+ i
2199
+ Ei(f NE(u), u)]
2200
+ A.13
2201
+ Proof of Theorem 5.3
2202
+ Let f be a PPE and OPI NE approximator. Denote f(u) = (σi)i∈[n]. For player k that a∗
2203
+ k ∈ V (ρk),
2204
+ we get
2205
+ σk = f(u)k
2206
+ (a)
2207
+ = f(ρu)k
2208
+ (b)
2209
+ = f(ρku)k
2210
+ (c)
2211
+ = ρkf(u)k = ρkσk,
2212
+ (11)
2213
+ where (a) holds since u is permutable w.r.t. ρ, (b) holds by OPI of f, and (c) holds by PPE of f.
2214
+ If a∗ can be found by f, we will have 1 = σk(a∗
2215
+ k)
2216
+ (d)
2217
+ = ρkσk(a∗
2218
+ k) = σk(ρ−1
2219
+ k (a∗
2220
+ k)), where (d) holds by
2221
+ Equation (11). However, such result leads to a contradiction, because a∗
2222
+ k ̸= ρ−1
2223
+ k (ak) but σk(a∗
2224
+ k) =
2225
+ σ(ρ−1
2226
+ k (a∗
2227
+ k)) = 1.
2228
+ Let f be a PE (C)CE approximator. Denote f(u) = π, we have
2229
+ π = f(u)
2230
+ (a)
2231
+ = f(ρu)
2232
+ (b)
2233
+ = ρf(u) = ρπ
2234
+ (12)
2235
+ where (a) holds since u is permutable w.r.t. ρ, (b) holds by PE of f. If a∗ can be found by f, we
2236
+ will have 1 = π(a∗)
2237
+ (c)
2238
+ = ρπ(a∗) = π(ρ−1a∗) = π(ρ−1
2239
+ 1 a∗
2240
+ 1, · · · , ρ−1
2241
+ n a∗
2242
+ n), where (c) holds by Equation (12).
2243
+ However, from a∗
2244
+ k ∈ V (ρk) we know ρ−1
2245
+ k (a∗
2246
+ k) ̸= a∗
2247
+ k, then ρ−1a∗ ̸= a∗, but π(a∗) = π(ρ−1a∗) = 1.
2248
+ A.14
2249
+ Proof of Theorem 5.6
2250
+ Proof. Assume f ∈ F(C)CE
2251
+ general is an (C)CE approximator that always finds the strategy that maximizes
2252
+ the social welfare. Afterward, we construct another f0 that satisfies PE and always finds the strategy
2253
+ that maximizes social welfare. f0 is constructed by orbit averaging:
2254
+ f0(u) = Qf(u),
2255
+ thus f0 is PE.
2256
+ Denote D as an arbitrary payoff distribution of u such that D is invariant under permutation and
2257
+ the cardinality of its support is finite. We have
2258
+ Eu∼DSW(Qif(u), u) =Eu∼DSW(
2259
+ 1
2260
+ |Ai|!
2261
+
2262
+ ρi∈Gi
2263
+ ρ−1
2264
+ i
2265
+ f(ρiu), u)
2266
+ =Eu∼D
2267
+ n
2268
+
2269
+ i=1
2270
+ ui(
2271
+ 1
2272
+ |Ai|!
2273
+
2274
+ ρi∈Gi
2275
+ ρ−1
2276
+ i f(ρiu))
2277
+ =
2278
+ 1
2279
+ |Ai|!
2280
+
2281
+ ρi∈Gi
2282
+ Eu∼D
2283
+ n
2284
+
2285
+ i=1
2286
+ ui(ρ−1
2287
+ i
2288
+ f(ρiu))
2289
+ =
2290
+ 1
2291
+ |Ai|!
2292
+
2293
+ ρi∈Gi
2294
+ Ev∼D
2295
+ n
2296
+
2297
+ i=1
2298
+ (ρ−1
2299
+ i
2300
+ v)i(ρ−1
2301
+ i f(v))
2302
+ , let v = ρiu
2303
+ =
2304
+ 1
2305
+ |Ai|!
2306
+
2307
+ ρi∈Gi
2308
+ Ev∼D
2309
+ n
2310
+
2311
+ i=1
2312
+ vi(f(v))
2313
+ =Eu∼D
2314
+ n
2315
+
2316
+ i=1
2317
+ ui(f(u))
2318
+ =Eu∼DSW(f(u), u)
2319
+ 26
2320
+
2321
+ Due to that Q = Q1 ◦ · · · ◦ Qn, we have
2322
+ Eu∼DSW(f0(u), u) = Eu∼DSW(f(u), u)
2323
+ Due to the arbitrariness of D, we know that f0 maximizes the social welfare w.r.t. any u.
2324
+ From above, we immediately know
2325
+ SWRN,M(F(C)CE
2326
+ PE
2327
+ , F(C)CE
2328
+ general) = 1
2329
+ A.15
2330
+ Proof of Theorem 5.7
2331
+ A.15.1
2332
+ Proof of Equation (1) and Equation (3)
2333
+ We first prove the theorem with respect to FNE
2334
+ OPI and FNE
2335
+ both
2336
+ Step 1
2337
+ On the one part, we prove
2338
+ SWRN,M(FNE
2339
+ OPI, FNE
2340
+ general)
2341
+ SWRN,M(FNE
2342
+ both, FNE
2343
+ general)
2344
+
2345
+
2346
+ 1
2347
+ M N−1
2348
+ We prove this by construction.
2349
+ Consider a game with N player and Ai = [M] for i ∈ [N]. ∀a ∈ A, i ∈ [N], define the payoff ¯u as
2350
+ follows:
2351
+ ¯ui(a) =
2352
+
2353
+ 1
2354
+ , if a1 = a2 = · · · = aN
2355
+ 0
2356
+ , otherwise
2357
+ Define U = {u′|u′ = ◦iρi¯u, ρi ∈ Gi} and D as a uniform distribution on U. Easy to certify that D is a
2358
+ permutation-invariant distribution.
2359
+ Let ˜f ∈ ˜FNE
2360
+ general be the NE oracle that ˜f(¯u)i = 1 and for any u′ = ◦iρi¯u ∈ U, ˜f(u′)i = ρi(1).
2361
+ Intuitively, the oracle will choose the action that will provide all players with revenue 1, leading to a
2362
+ social welfare of N. Since each player has got her maximum possible utility, we have
2363
+ max
2364
+ f∈F NE
2365
+ general
2366
+ Eu∼DSW(f(u), u) =
2367
+ max
2368
+ ˜f∈ �
2369
+ F NE
2370
+ general
2371
+ Eu∼DSW( ˜f(u), u) = N.
2372
+ (13)
2373
+ For any j1, j2 ∈ [M] and j1 < j2, let ρ(j1,j2)
2374
+ i
2375
+ = (1, . . . , j2, . . . , j1, . . . , M) for all player i ∈ [N] be
2376
+ the swap permutation that swaps actions j1 and j2 and keeps other actions still. Then ◦i̸=jρ(j1,j2)
2377
+ i
2378
+ ¯u =
2379
+ ρ(j1,j2)
2380
+ j
2381
+ ¯u for player j. For f ∈ FNE
2382
+ OPI, we have f(¯u)j = f(◦i̸=jρ(j1,j2)
2383
+ i
2384
+ ¯u)j = f(ρ(j1,j2)
2385
+ j
2386
+ ¯u)j for arbitrary swap
2387
+ permutation ρ(j1,j2)
2388
+ j
2389
+ . Since any permutation can be achieved by composition of swap permutations,
2390
+ we have ∀ρj ∈ Gj, f(¯u)j = f(ρj ¯u)j.
2391
+ Based on that, and by OPI of f, ∀ρ = ◦i∈[N]ρi we have
2392
+ f(¯u)j = f(ρ¯u)j, i.e. f is a constant function on U. Without loss of generality, we denote f(u) ≡ σ for
2393
+ all u ∈ U. Then
2394
+ Eu∼DSW(f(u), u) =
2395
+ 1
2396
+ |U|
2397
+
2398
+ u′∈U
2399
+ SW(σ, u′) =
2400
+ 1
2401
+ (M!)N−1 SW(σ,
2402
+
2403
+ u′∈U
2404
+ u′).
2405
+ Additionally, we have (�
2406
+ u′∈U u′)(a) = ((M − 1)!)N−1 for any a ∈ A. Based on that, we have
2407
+ max
2408
+ f∈F NE
2409
+ OPI
2410
+ Eu∼DSW(f(u), u) =
2411
+ 1
2412
+ (M!)N−1 · N((M − 1)!)N−1 =
2413
+ N
2414
+ M N−1 .
2415
+ (14)
2416
+ Combining Equation (13) and Equation (14), we have
2417
+ SWRN,M(FNE
2418
+ OPI, FNE
2419
+ general) ≤
2420
+ 1
2421
+ M N−1 .
2422
+ Due to FNE
2423
+ both ⊆ FNE
2424
+ OPI, we immediately know
2425
+ SWRN,M(FNE
2426
+ both, FNE
2427
+ general) ≤
2428
+ 1
2429
+ M N−1
2430
+ 27
2431
+
2432
+ Step 2
2433
+ On the other part, we prove
2434
+ SWRN,M(FNE
2435
+ OPI, FNE
2436
+ general)
2437
+ SWRN,M(FNE
2438
+ both, FNE
2439
+ general)
2440
+
2441
+ ≥ 1/M N−1
2442
+ Define the maximum possible utility (MPU) for player i with respect to utility ui and action ai as
2443
+ MPU(ui, ai) :=
2444
+ max
2445
+ a−i∈A−i ui(ai, a−i)
2446
+ (15)
2447
+ Define the set of maximum possible utility best response for player i w.r.t. ui as
2448
+ Bi(ui) := {ai ∈ Ai : MPU(ui, ai) = max
2449
+ a′
2450
+ i∈Ai MPU(ui, a′
2451
+ i)}
2452
+ We first conduct some simplification to the target.
2453
+ SWRN,M(FNE
2454
+ both, FNE
2455
+ general) = inf
2456
+ D
2457
+ maxf∈F NE
2458
+ both Eu∼DSW(f(u), u)
2459
+ maxf∈F NE
2460
+ general Eu∼DSW(f(u), u) ≥ inf
2461
+ D
2462
+ maxf∈F NE
2463
+ both Eu∼DSW(f(u), u)
2464
+ Eu∼D maxσ SW(σ, u)
2465
+ Then we constrain u to be a cooperation game. For a normal form game Γu, we define ˜u = (˜ui)i∈[n]
2466
+ in which ˜ui = 1
2467
+ n
2468
+ �n
2469
+ i=1 ui. Then we have SW(σ, u) = SW(σ, ˜u), which means that constraining u to be
2470
+ a cooperation game will induce the same social welfare. Then
2471
+ inf
2472
+ D
2473
+ maxf∈F NE
2474
+ both Eu∼DSW(f(u), u)
2475
+ Eu∼D maxσ SW(σ, u)
2476
+ = inf
2477
+ D
2478
+ maxf∈F NE
2479
+ both Eu∼DSW(f(u), ˜u)
2480
+ Eu∼D maxσ SW(σ, ˜u)
2481
+ Denote f0 be the approximator that always outputs uniform strategy on Bi(˜ui) for player i. It’s
2482
+ obvious that f0 is both OPI and PPE because the operations from u to f0(u) are all permutation-
2483
+ equivariant. Then,
2484
+ inf
2485
+ D
2486
+ maxf∈F NE
2487
+ both Eu∼DSW(f(u), ˜u)
2488
+ Eu∼D maxσ SW(σ, ˜u)
2489
+ ≥ inf
2490
+ D
2491
+ Eu∼DSW(f0(u), ˜u)
2492
+ Eu∼D maxσ SW(σ, ˜u)
2493
+ Ignore the infimum and the expectation operator, consider
2494
+ SW(f0(u),˜u)
2495
+ maxσ SW(σ,˜u) for arbitrary ˜u, denote b
2496
+ be the maximum element appeared in ˜u, then the denominator equals Nb. But for the numerator,
2497
+ for player i, no matter what action ai ∈ Bi(˜ui) she chooses, she always has probability at least
2498
+
2499
+ j̸=i
2500
+ 1
2501
+ |Bj| ≥
2502
+ 1
2503
+ MN−1 to achieve revenue b, therefore inducing SW(f0(u), ˜u) ≥
2504
+ Nb
2505
+ MN−1 .
2506
+ Then,
2507
+ SW(f0(u),˜u)
2508
+ maxσ SW(σ,˜u) ≥
2509
+ 1
2510
+ MN−1 , so as infD
2511
+ Eu∼DSW(f0(u),˜u)
2512
+ Eu∼D maxσ SW(σ,˜u), SWRN,M(FNE
2513
+ both) and SWRN,M(FNE
2514
+ OPI).
2515
+ Above all,
2516
+ SWRN,M(FNE
2517
+ OPI, FNE
2518
+ general)
2519
+ SWRN,M(FNE
2520
+ both, FNE
2521
+ general)
2522
+
2523
+ =
2524
+ 1
2525
+ M N−1
2526
+ A.15.2
2527
+ Proof of Equation (2)
2528
+ We next prove the theorem with respect to FNE
2529
+ PPEthat
2530
+ SWRN,M(FNE
2531
+ PPE, FNE
2532
+ general) ≤ 1
2533
+ M
2534
+ Consider a bimatrix game and Ai = [M] for i ∈ [2]. ∀a ∈ A, i ∈ [2], define the payoff ¯u as follows:
2535
+ ¯ui(a) =
2536
+
2537
+ 1
2538
+ , if a1 = a2
2539
+ 0
2540
+ , otherwise
2541
+ Define U := {u′|u′ = ρ1ρ2¯u, ρi ∈ Gi} and D as a uniform distribution on U. Easy to certify that
2542
+ U = {u′|u′ = ρ1¯u, ρ1 ∈ G1} = {u′|u′ = ρ2¯u, ρ2 ∈ G2} and D is a permutation-invariant distribution.
2543
+ 28
2544
+
2545
+ Let ˜f ∈ ˜FNE
2546
+ general be the NE oracle that ˜f(¯u)i = 1 and for any u′ = ◦iρi¯u ∈ U, ˜f(u′)i = ρi(1).
2547
+ Intuitively, the oracle will choose the action that will provide all players with revenue of 1, leading to
2548
+ a social welfare of 2.
2549
+ For a permutation ̺ on [M], let P̺ ∈ {0, 1}M×M be the corresponding permutation matrix. Denote
2550
+ P as the set of all permutation matrice. As a result, ∀u ∈ U, ∀ρ1 ∈ G1, ρ1u = (Pρ1u1, Pρ1u2) =: Pρ1u
2551
+ and ∀ρ2 ∈ G2, ρ2u = (u1P T
2552
+ ρ2, u2P T
2553
+ ρ2) =: uP T
2554
+ ρ2. Specially, we have P̺¯uP T
2555
+ ̺ = ¯u. For f ∈ FNE
2556
+ PPE, Denote
2557
+ f(¯u) = σ = (σ1, σ2). For permutation ̺ in [M] and payoff u′ = P̺¯u = ¯u(P T
2558
+ ̺ )−1, by PPE of f, we have
2559
+ f(u′)1 = f(P̺¯u)1 = P̺σ1 = ̺σ1, and f(u′)2 = f(¯u(P T
2560
+ ̺ )−1)2 = (P̺)−1σ2 = ̺−1σ2. Then we have
2561
+ SW(f(u′), u′) =
2562
+
2563
+ i
2564
+ (P̺¯u)i(̺σ1, ̺−1σ2) =
2565
+
2566
+ i
2567
+ ¯ui(σ1, ̺−1σ2) =
2568
+
2569
+ i
2570
+ (¯uP T
2571
+ ̺ )i(σ1, σ2) = SW(f(¯u), ¯uP T
2572
+ ̺ )
2573
+ Therefore
2574
+ Eu∼DSW(f(u), u) =
2575
+ 1
2576
+ |U|
2577
+
2578
+ u′∈U
2579
+ SW(f(u′), u′)
2580
+ =
2581
+ 1
2582
+ |U|
2583
+
2584
+ P̺∈P
2585
+ SW(f(¯u), ¯uP T
2586
+ ̺ )
2587
+ =
2588
+ 1
2589
+ |U|
2590
+
2591
+ u=¯u(P T
2592
+ ̺ )∈U
2593
+ SW(f(¯u), u)
2594
+ =
2595
+ 1
2596
+ |U|SW(σ,
2597
+
2598
+ u′∈U
2599
+ u′).
2600
+ Since |U| =
2601
+ 1
2602
+ M! and �
2603
+ u′∈U u′ is a tensor with all elements equal to (M −1)!. Thus Eu∼DSW(f(u), u) =
2604
+ 2
2605
+ M and
2606
+ SWRN,M(FNE
2607
+ PPE, FNE
2608
+ general) ≤ 1
2609
+ M
2610
+ A.15.3
2611
+ Proof of Equation (4)
2612
+ Consider a 3 × 3 game as follows, where ǫ ∈ (0, 1
2613
+ 2):
2614
+ u =
2615
+
2616
+
2617
+ 1, 1
2618
+ 0, 0
2619
+ 0, 1
2620
+ 2 + ε
2621
+ 0, 0
2622
+ 1, 1
2623
+ 0, 1
2624
+ 2 + ε
2625
+ 1
2626
+ 2 + ε, 0
2627
+ 1
2628
+ 2 + ε, 0
2629
+ ε, ε
2630
+
2631
+
2632
+ It is obvious that maxσ∗⊆NE(Γu) SW(σ∗, u) = 2, and the corresponding strategy has been bolded.
2633
+ However, for NE oracles with both PPE and OPI, it can only output a unique NE with a pure strategy
2634
+ that induces utility (ε, ε).
2635
+ Let ρ1 = ρ2 = (2, 1, 3), we have ρ1ρ2u = u. From the analysis above we know if f NE ∈ �
2636
+ FNE
2637
+ both and
2638
+ f NE(u) = (σ1, σ2), then σ1(1) = σ1(2), σ2(1) = σ2(2). We integrate the first two actions of player 1
2639
+ and player 2 into a new action that will choose randomly between the first two actions, then we form
2640
+ the utility matrix below:
2641
+ u =
2642
+
2643
+ 1
2644
+ 2, 1
2645
+ 2
2646
+ 0, 1
2647
+ 2 + ε
2648
+ 1
2649
+ 2 + ε, 0
2650
+ ε, ε
2651
+
2652
+ There is a unique NE in this Prisoner’s Dilemma, which has been bolded. The game u is the
2653
+ same with the game u under the assumption that σ1(1) = σ1(2) and σ2(1) = σ2(2) in u.
2654
+ Then
2655
+ maxf∈ �
2656
+ F NE
2657
+ both SW(f(u), u) = 2ε. Since ε can be arbitrarily small, we have SWR2,3( �
2658
+ FNE
2659
+ both, �FNE
2660
+ general) = 0.
2661
+ As a result, we have SWRN,M( �FNE
2662
+ both, �FNE
2663
+ general) = 0 for all N ≥ 2 and M ≥ 3.
2664
+ 29
2665
+
VdFJT4oBgHgl3EQfOSwV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
VtE4T4oBgHgl3EQfMgzk/content/tmp_files/2301.04949v1.pdf.txt ADDED
@@ -0,0 +1,3642 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04949v1 [math.OC] 12 Jan 2023
2
+ A FORMAL POWER SERIES APPROACH TO MULTIPLICATIVE
3
+ DYNAMIC FEEDBACK CONNECTION
4
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
5
+ Abstract. The goal of the paper is multi-fold. The first of which is to derive an explicit
6
+ formula to compute the generating series of a closed-loop system when a plant, given in a
7
+ Chen–Fliess series description is in multiplicative output feedback connection with another
8
+ system given in Chen–Fliess series description. Further, the objective extends in showing
9
+ that the multiplicative dynamic output feedback connection has a natural interpretation as
10
+ a transformation group acting on the plant. A computational framework for computing the
11
+ generating series for multiplicative dynamic output feedback is devised utilizing the dual
12
+ Hopf algebras corresponding to the shuffle group and the multiplicative feedback group.
13
+ Contents
14
+ 1.
15
+ Introduction
16
+ 2
17
+ 2.
18
+ Preliminaries: Formal Power Series
19
+ 2
20
+ 2.1.
21
+ Shuffle Product
22
+ 3
23
+ 3.
24
+ Bialgebra and Hopf algebra: Preliminaries
25
+ 4
26
+ 3.1.
27
+ Algebra
28
+ 4
29
+ 3.2.
30
+ Coalgebra
31
+ 5
32
+ 3.3.
33
+ Bialgebra
34
+ 6
35
+ 3.4.
36
+ Hopf Algebra
37
+ 7
38
+ 4.
39
+ Unshuffle Hopf algebra and its Coaction
40
+ 8
41
+ 4.1.
42
+ Unshuffle Hopf Algebra
43
+ 8
44
+ 4.2.
45
+ Gradation of Bialgebra H
46
+ 10
47
+ 4.3.
48
+ Coaction of H
49
+ 11
50
+ 5.
51
+ Chen–Fliess Series and its Interconnections
52
+ 13
53
+ 5.1.
54
+ Chen–Fliess Series
55
+ 13
56
+ 5.2.
57
+ Interconnections of Chen–Fliess Series: Parallel and Cascade Connections
58
+ 14
59
+ 5.3.
60
+ Cascading of Chen–Fliess with Multiplicative Feedforward of Input
61
+ 15
62
+ 5.4.
63
+ Multiplicative Dynamic Output Feedback Group
64
+ 16
65
+ 6.
66
+ Chen–Fliess Series Under Multiplicative Dynamic Output Feedback
67
+ 18
68
+ 7.
69
+ Invariance of Class and Relative Degree under multiplicative dynamic feedback
70
+ connection
71
+ 20
72
+ 8.
73
+ Computational Framework for Multiplicative Mixed Composition & Dynamic
74
+ Feedback Product
75
+ 24
76
+ 8.1.
77
+ Hopf Algebra Corresponding to the Multiplicative Dynamic Feedback Subgroup 24
78
+ 8.2.
79
+ Coaction of Hopf algebra H on Algebra of Coordinate Map
80
+ 25
81
+ 8.3.
82
+ Coaction of Hopf algbera H on the Hopf algebra H
83
+ 27
84
+ 8.4.
85
+ Coproduct, Antipode Computations and Grading of Hopf algebra H
86
+ 29
87
+ 9.
88
+ Conclusions and Future work
89
+ 35
90
+ References
91
+ 35
92
+
93
+ 2
94
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
95
+ 1. Introduction
96
+ The objective of the document is two fold and works with the Chen–Fliess functional
97
+ series [Fliess(1981)]. There is no need that these input-output systems have a state space
98
+ realization and thus, the results presented here are independent of any state space embed-
99
+ ding when a realization is possible [Fliess(1983)]. Firstly, let Fc and Fd be two nonlinear
100
+ input-output systems represented by Chen–Fliess series. It was shown in [Gray & Li(2005)]
101
+ that the additive feedback interconnection of two such systems result in a Chen–Fliess se-
102
+ ries description for the closed-loop system. The convergence of the closed-loop system was
103
+ characterized in [Thitsa & Gray(2012)]. An efficient computation of the generating series for
104
+ closed-loop system is facilitated through a combinatorial Hopf algebra [Gray, et al.(2014a),
105
+ Foissy(2015), Duffaut Espinosa, et al.(2016)]. The feedback product formula and its com-
106
+ putation were used to solve system inversion problems [Gray, et al.(2014b)] and trajectory
107
+ generation problems [Duffaut Espinosa & Gray(2017)].
108
+ However, when the nature of interconnection becomes multiplicative feedback, the similar
109
+ set of questions persist in general. It is known that, in single-input single-output (SISO)
110
+ setting, the closed-loop system in the affine feedback case (of which multiplicative feedback
111
+ is a special case) has a Chen–Fliess series description and the computation of feedback for-
112
+ mula is facilitated through a combinatorial Hopf algebra [Gray & Ebrahimi-Fard(2017)]. The
113
+ present document, in one part, shows that even in multi-input multi-output (MIMO) setting
114
+ the closed-loop system under multiplicative feedback has a Chen–Fliess series representation
115
+ and provides an explicit expression of the closed-loop generating series which will be called
116
+ as multiplicative dynamic feedback product . Furthermore, it will be shown that this feedback
117
+ product has a natural interpretation as a transformation group acting on the plant. The
118
+ algorithmic framework for the computation of the multiplicative dynamic feedback product
119
+ formula for a general MIMO case is devised using the dual Hopf algebras corresponding to
120
+ the shuffle product and to the multiplicative dynamic output feedback group. The charac-
121
+ terization of convergence of the Chen–Fliess series for the closed-loop system is deferred for
122
+ future work.
123
+ The paper is organized as follows. The next section provides a summary of the concepts
124
+ related to non-commutative formal power series, Hopf algebra, Chen–Fliess series and their
125
+ interconnections. The Section 5.4 builds the pivotal multiplicative dynamic output feedback
126
+ group. The Hopf algebra construction corresponding to the shuffle group is drafted in Sec-
127
+ tion 4. Section 6 is where the multiplicative dynamic feedback connection is analyzed. The
128
+ invariance of relative degree under multiplicative output feedback is asserted in Section 7.
129
+ The framework for computing the feedback product is devised in Section 8 and is demon-
130
+ strated using examples. The conclusions of the paper and directions for future work is given
131
+ in the last section.
132
+ 2. Preliminaries: Formal Power Series
133
+ A finite nonempty set of noncommuting symbols X = {x0, x1, . . . , xm} is called an alphabet.
134
+ Each element of X is called a letter. Any finite sequence, η = xi1 · · · xik, of letters from X
135
+ is called a word over X and its length is |η| = k. The set X∗ of all words includes the
136
+ empty word, denoted ∅ ∈ X∗ and X+ := X∗\∅, and forms a monoid under catenation.
137
+ Any mapping c : X∗ → Rℓ is called a formal power series. The value of c at η ∈ X∗ is
138
+ denoted by (c, η) and called the coefficient of η in c. Normally, c is written as a formal sum
139
+ c = �
140
+ η∈X∗(c, η)η. A series c is proper when the coefficient (c, ∅) = 0 else it is a non-proper
141
+ series. The support of c is the set supp(c) containing all words having nonzero coefficients.
142
+ The order of c, denoted ord(c), is the length of the minimal length word in its support. The
143
+
144
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
145
+ 3
146
+ collection of all formal power series over X is denoted by Rℓ⟨⟨X⟩⟩. The ith component of a
147
+ vector v ∈ Rℓ is denoted by vi and consequently the ith component of a series c ∈ Rℓ⟨⟨X⟩⟩
148
+ is denoted by ci viz. (ci, η) = (c, η)i.
149
+ A series c′ ∈ Rℓ⟨⟨X⟩⟩ is called a subseries of c ∈ Rℓ⟨⟨X⟩⟩ if there exists another series
150
+ c′′ ∈ Rℓ⟨⟨X⟩⟩ such that the intersection supp (c′) ∩ supp (c′′) is empty and the series c can
151
+ be decomposed as c = c′ + c′′.
152
+ Definition 2.1. Let c ∈ Rℓ⟨⟨X⟩⟩, then the natural part of the series c is the subseries
153
+ denoted by cN such that c = cN + cF and supp (cF) ⊆ X∗ \ {xk
154
+ 0 : k ∈ N0}. The subseries cF
155
+ is called as forced part of the series c.
156
+ Definition 2.1 asserts that the forced part cF of a series c should not contain any word
157
+ formed by the letter x0 alone, including the empty word ∅. For the remainder of the docu-
158
+ ment, Rℓ is given the structure of a unital commutative ring under Hadamard or pointwise
159
+ product viz. (xy)i = xiyi with ll = [1 1 · · ·1]t ∈ Rℓ being the multiplicative unit. Formal
160
+ power series Rℓ⟨⟨X⟩⟩ form a Rℓ-module and the submodule of all proper series in Rℓ⟨⟨X⟩⟩
161
+ is denoted by Rℓ
162
+ p ⟨⟨X⟩⟩, while the subset of non-proper series is denoted by Rℓ
163
+ np ⟨⟨X⟩⟩.
164
+ Definition 2.2. A series c ∈ Rℓ⟨⟨X⟩⟩ is called purely improper if ci is non-proper ∀i =
165
+ 1, . . . , ℓ. The subset of all purely improper series in Rℓ⟨⟨X⟩⟩ is denoted by Rℓ
166
+ pi ⟨⟨X⟩⟩.
167
+ Observe that Rℓ
168
+ pi ⟨⟨X⟩⟩ ⊊ Rℓ
169
+ np ⟨⟨X⟩⟩ if ℓ > 1, otherwise Rpi ⟨⟨X⟩⟩ = Rnp ⟨⟨X⟩⟩.
170
+ 2.1. Shuffle Product. The shuffle product α
171
+ β of two words is a bilinear product on the
172
+ linear span of words, which can be uniquely specified iteratively
173
+ (xiη)
174
+ (xjξ) := xi(η
175
+ (xjξ)) + xj((xiη)
176
+ ξ),
177
+ where η, ξ ∈ X∗ and xi, xj ∈ X. See for instance [Fliess(1981)]. The shuffle product of two
178
+ series, (c, d) �→ c
179
+ d is defined as
180
+ (c
181
+ d, η) =
182
+
183
+ ζ,ν∈X∗
184
+ η∈supp(ζ
185
+ ν)
186
+ (c, ζ) (d, ν) .
187
+ We define for any xi, xj ∈ X and any word η ∈ X∗
188
+ x−1
189
+ i (xjη) :=
190
+ �η,
191
+ i = j
192
+ 0,
193
+ else
194
+ The following proposition is vital in understanding the bialgebra and Hopf algebra devised
195
+ in Sections 4.1 and 4.3.
196
+ Proposition 2.1. If c, d ∈ Rℓ⟨⟨X⟩⟩, then ∀xi ∈ X
197
+ x−1
198
+ i
199
+ (c
200
+ d) =
201
+
202
+ x−1
203
+ i
204
+ (c)
205
+ d
206
+
207
+ +
208
+
209
+ c
210
+ x−1
211
+ i
212
+ (d)
213
+
214
+ .
215
+ Note that Rℓ⟨⟨X⟩⟩ forms an associative and commutative Rℓ-algebra under the shuffle
216
+ product. If d ∈ Rℓ
217
+ pi ⟨⟨X⟩⟩, then shuffle inverse of d, denoted by d
218
+ −1 is defined as
219
+ d
220
+ −1
221
+ i
222
+ = (di, ∅)−1
223
+ ��
224
+ k∈N0
225
+ (d′
226
+ i)
227
+ k
228
+
229
+ ,
230
+ where d′
231
+ i = 1 − (di/ (di, ∅)). Hence, Rℓ
232
+ pi ⟨⟨X⟩⟩ forms an Abelian group under the shuffle
233
+ product with ll as the identity element.
234
+
235
+ 4
236
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
237
+ Example 2.1. Let X = {x0, x1} and c ∈ R⟨⟨X⟩⟩ described as c = 1 − x1. Then the shuffle
238
+ inverse is computed as:
239
+ c
240
+ −1 =
241
+
242
+ k∈N0
243
+ (1 − (1 − x1))
244
+ k
245
+ =
246
+
247
+ k∈N0
248
+ x
249
+ k
250
+ 1
251
+ =
252
+
253
+ k∈N0
254
+ k!xk
255
+ 1.
256
+ Therefore, c
257
+ −1 = 1 + x1 + 2x2
258
+ 1 + 6x3
259
+ 1 + · · · + n!xn
260
+ 1 + · · · .
261
+ Observe that (c
262
+ d, ∅) = (c, ∅) (d, ∅). Hence, the set
263
+ M
264
+ = { ll + c : c ∈ Rn
265
+ p ⟨⟨X⟩⟩},
266
+ where c is a proper series in Rn⟨⟨X⟩⟩, forms a subgroup of the shuffle group. The group
267
+ M
268
+ is vital in the design of a computational framework of multiplicative dynamic feedback
269
+ product as explained in Section 8.
270
+ The set Rℓ⟨⟨X⟩⟩ is endowed with ultrametric structure where the metric κ is defined as
271
+ κ(c, d) = σord(c−d),
272
+ for c, d ∈ Rℓ⟨⟨X⟩⟩ and σ ∈]0, 1[. For brevity, κ(c, 0) is written as κ(c), and κ(c, d) = κ(c−d).
273
+ The ultrametric space (Rℓ⟨⟨X⟩⟩, κ) is Cauchy complete [Berstel & Reutenauer(1988)]. The
274
+ following definition of contraction maps between metric spaces will be useful.
275
+ Definition 2.3. Given metric spaces (E, d) and (E′, d′), a map f : E −→ E′ is said to be a
276
+ strong contraction map if ∀s, t ∈ E, it satisfies the condition d′(f(s), f(t)) ≤ αd(s, t) where
277
+ α ∈ [0, 1[. If α = 1, then the map f is said to be a weak contraction map or a non-expansive
278
+ map.
279
+ 3. Bialgebra and Hopf algebra: Preliminaries
280
+ The goal is to provide the definitions of algebraic structures such as algebra, coalgebra,
281
+ bialgebra and Hopf algebra [Abe(2004), Sweedler(1969)]. We let K be a commutative ring
282
+ with identity 1K.
283
+ 3.1. Algebra. The definition of an algebra can be facilitated through the category of mod-
284
+ ules. It allows to define the concept of a coalgebra (the dual notion) with ease.
285
+ Definition 3.1. An algebra over K is a K-module A along with the morphisms of K-
286
+ modules m : A ⊗ A −→ A , called the multiplication or product map, and η : K −→ A ,
287
+ called the unit map, such that the following diagrams are commutative.
288
+ (1)
289
+ A ⊗ A ⊗ A
290
+ m⊗idA
291
+
292
+ idA ⊗m
293
+
294
+ A ⊗ A
295
+ m
296
+
297
+ A ⊗ A
298
+ m
299
+ � A
300
+ K ⊗ A
301
+ η⊗idA
302
+
303
+
304
+ =
305
+ �▲
306
+
307
+
308
+
309
+
310
+
311
+
312
+
313
+
314
+
315
+
316
+
317
+
318
+
319
+
320
+
321
+
322
+
323
+
324
+
325
+ A ⊗ A
326
+ m
327
+
328
+ A
329
+ A ⊗ K
330
+
331
+ =
332
+ �r
333
+ r
334
+ r
335
+ r
336
+ r
337
+ r
338
+ r
339
+ r
340
+ r
341
+ r
342
+ r
343
+ r
344
+ r
345
+ r
346
+ r
347
+ r
348
+ r
349
+ r
350
+ r
351
+ idA ⊗η
352
+ � A ⊗ A
353
+ m
354
+
355
+
356
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
357
+ 5
358
+ The tuple (A , m, η) is called a K-algebra.
359
+ The commutative diagrams (1) mean that a K-algebra A must satisfy the following prop-
360
+ erties:
361
+ (1) The product map m must be associative.
362
+ (2) The scalar multiplication through the η map must have a unit.
363
+ The concept of a K-algebra morphism is defined next.
364
+ Definition 3.2. Let (A , m, η), (A ′, m′, η′) be K-algebras. A map f : A −→ A ′ is called
365
+ a K-algebra morphism provided the following diagrams commute.
366
+ A ⊗ A
367
+ m
368
+
369
+ f⊗f
370
+
371
+ A
372
+ f
373
+
374
+ A ′ ⊗ A ′
375
+ m′
376
+ � A ′
377
+ K
378
+ η
379
+
380
+ η′
381
+ �❋
382
+
383
+
384
+
385
+
386
+
387
+
388
+
389
+
390
+
391
+
392
+
393
+
394
+
395
+
396
+
397
+ A
398
+ f
399
+ �①①①①①①①①①①①①①①①①
400
+ A ′
401
+ Definition 3.3. Let P and Q be modules over K. The twisting morphism τ of K-modules
402
+ is τ : P ⊗ Q −→ Q ⊗ P with
403
+ τ(p ⊗ q) = q ⊗ p
404
+ ∀ q ∈ Q, p ∈ P.
405
+ A K-algebra A is commutative if and only if the following diagram commutes.
406
+ A ⊗ A
407
+ τ
408
+
409
+ m
410
+ �■
411
+
412
+
413
+
414
+
415
+
416
+
417
+
418
+
419
+
420
+
421
+
422
+
423
+
424
+
425
+
426
+
427
+
428
+ A ⊗ A
429
+ m
430
+ � A
431
+ A K-algebra A is a graded algebra if the underlying K-module structure is graded
432
+ viz. A = �
433
+ n∈N0 An, where An is a K-module for all n ∈ N0 such that m (Am ⊗ An) ⊆
434
+ Am+n, for all m, n ∈ N0. The graded K-algebra is connected if η : K −→ A0 is a K-algebra
435
+ isomorphism.
436
+ 3.2. Coalgebra. The notion of a K-coalgebra is a categorical structure dual to that of a
437
+ K-algebra.
438
+ Definition 3.4. A K-coalgebra C is a K-module with the K-module morphisms ∆ : C −→
439
+ C ⊗ C , called the comultiplication or coproduct map, and ǫ : C −→ K, called the counit
440
+ map, such that the following diagrams commute.
441
+ (2)
442
+ C
443
+
444
+
445
+
446
+
447
+ C ⊗ C
448
+ ∆⊗idC
449
+
450
+ C ⊗ C
451
+ idC ⊗∆
452
+ � C ⊗ C ⊗ C
453
+ C ⊗ C
454
+ ǫ⊗idC
455
+ � K ⊗ C
456
+
457
+ =
458
+
459
+ C
460
+
461
+ �❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑
462
+
463
+ �sssssssssssssssssss
464
+ C ⊗ C
465
+ idC ⊗ǫ
466
+ � C ⊗ K
467
+
468
+ =
469
+
470
+
471
+ 6
472
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
473
+ The tuple (C , ∆, ǫ) is called a K-coalgebra.
474
+ The commutative diagrams (2) imply that a K-coalgebra C must satisfy the following
475
+ properties:
476
+ (1) The coproduct map ∆ must be coassociative.
477
+ (2) The counit map ǫ is the categorical dual to the unit map η for a K-algebra.
478
+ The coalgebra C is called cocommutative if the following diagram commutes,
479
+ C
480
+
481
+
482
+
483
+ �❑
484
+
485
+
486
+
487
+
488
+
489
+
490
+
491
+
492
+
493
+
494
+
495
+
496
+
497
+
498
+
499
+
500
+
501
+
502
+ C ⊗ C
503
+ τ
504
+ � C ⊗ C
505
+ where τ is the twisting morphism given in Definition 3.3. Sweedler’s notation is very useful
506
+ in representing the coproduct map and is adopted in Sections 4 and 8.
507
+ Definition 3.5. [Sweedler(1969)]. Given the K-coalgebra tuple (C , ∇, ǫ) and an element
508
+ c ∈ C , then the Sweedler notation for the coproduct
509
+ ∆(c) =
510
+
511
+ (c)
512
+ c(1) ⊗ c(2),
513
+ where c(1), c(2) ∈ C are the components of the tensors resulting from the coproduct of c.
514
+ Next, the definition of a K-coalgebra morphism is given.
515
+ Definition 3.6. Let (C , ∆, ǫ), (C ′, ∆′, ǫ′) be K-coalgebras. A map f : C −→ C ′ is called a
516
+ K-coalgebra morphism provided the following diagrams commute.
517
+ C
518
+
519
+
520
+ f
521
+
522
+ C ⊗ C
523
+ f⊗f
524
+
525
+ C ′
526
+ ∆′
527
+ � C ′ ⊗ C ′
528
+ C
529
+ ǫ
530
+
531
+ f
532
+ �❊
533
+
534
+
535
+
536
+
537
+
538
+
539
+
540
+
541
+
542
+
543
+
544
+
545
+
546
+
547
+
548
+ K
549
+ C ′
550
+ ǫ′
551
+ �②
552
+
553
+
554
+
555
+
556
+
557
+
558
+
559
+
560
+
561
+
562
+
563
+ ��
564
+
565
+
566
+
567
+ 3.3. Bialgebra. The bialgebra structure over a commutative ring is fundamental for defining
568
+ a Hopf algebra. A bialgebra is an amalgamation of the algebra and coalgebra structures such
569
+ that both are compatible with each other.
570
+ Definition 3.7. A bialgebra H over K is a tuple (H, m, η, ∆, ǫ) such that
571
+ (1) H is a K-module.
572
+ (2) (H, m, η) is a K-algebra, where m and η are the product and unit maps, respectively.
573
+ (3) (H, ∆, ǫ) is a K-coalgebra, where ∆ and ǫ are the coproduct and counit maps, respec-
574
+ tively.
575
+ such that the following diagrams commute.
576
+ (3)
577
+ H ⊗ H
578
+ m
579
+
580
+ ∆⊗∆
581
+
582
+ H
583
+
584
+ � H ⊗ H
585
+ H ⊗ H ⊗ H ⊗ H
586
+ idH⊗τ⊗idH
587
+ � H ⊗ H ⊗ H ⊗ H
588
+ m⊗m
589
+
590
+
591
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
592
+ 7
593
+ (4)
594
+ H ⊗ H
595
+ m
596
+
597
+ ǫ⊗ǫ
598
+ �▼
599
+
600
+
601
+
602
+
603
+
604
+
605
+
606
+
607
+
608
+
609
+
610
+
611
+
612
+
613
+
614
+
615
+
616
+
617
+
618
+
619
+ H
620
+ ǫ
621
+
622
+ K ∼= K ⊗ K
623
+ η⊗η
624
+ �qqqqqqqqqqqqqqqqqqqqq
625
+ η
626
+
627
+ H ⊗ H
628
+ H
629
+
630
+
631
+ (5)
632
+ H
633
+ ǫ
634
+ �❊
635
+
636
+
637
+
638
+
639
+
640
+
641
+
642
+
643
+
644
+
645
+
646
+
647
+
648
+
649
+
650
+ K
651
+ η
652
+ �②
653
+
654
+
655
+
656
+
657
+
658
+
659
+
660
+
661
+
662
+
663
+
664
+
665
+
666
+
667
+
668
+ idK
669
+ � K
670
+ The diagrams (3) and (4) state that the product map m and the unit map η are K-
671
+ coalgebra morphisms, while the coproduct map ∆ and the counit map ǫ are K-algebra
672
+ morphisms. Diagram (5) describes that the unit map η is a section of the counit map ǫ in
673
+ the category of K-modules.
674
+ 3.4. Hopf Algebra. Hopf algebras are an important class of bialgebras. A Hopf algebra is
675
+ a bialgebra equipped with a particular K-linear map called antipode.
676
+ Definition 3.8. A Hopf algebra H over K is a tuple (H, m, η, ∆, ǫ, S) such that the following
677
+ conditions are satisfied:
678
+ (1) (H, m, η, ∆, ǫ) is a K-bialgebra.
679
+ (2) S : H −→ H is a K-linear map such that the following diagram commutes.
680
+ (6)
681
+ H ⊗ H
682
+ idH⊗S
683
+ � H ⊗ H
684
+ m
685
+ �❍
686
+
687
+
688
+
689
+
690
+
691
+
692
+
693
+
694
+
695
+
696
+
697
+
698
+
699
+
700
+
701
+
702
+
703
+ H
704
+ ǫ
705
+
706
+
707
+ �✈
708
+
709
+
710
+
711
+
712
+
713
+
714
+
715
+
716
+
717
+
718
+
719
+
720
+
721
+
722
+
723
+
724
+
725
+
726
+ �❍
727
+
728
+
729
+
730
+
731
+
732
+
733
+
734
+
735
+
736
+
737
+
738
+
739
+
740
+
741
+
742
+
743
+
744
+ K
745
+ η
746
+ � H
747
+ H ⊗ H
748
+ S⊗idH
749
+ � H ⊗ H
750
+ m
751
+ �✈
752
+
753
+
754
+
755
+
756
+
757
+
758
+
759
+
760
+
761
+
762
+
763
+
764
+
765
+
766
+
767
+
768
+
769
+ An element a ∈ H is called group-like if ∆(a) = a ⊗ a and thus a̸∈ker(ǫ), where ker(.)
770
+ represents the kernel of a K-module map. A graded Hopf algebra H = �
771
+ n∈N0 Hn is connected
772
+ if and only if H0 ∼= Kη(1K) as K-modules.
773
+ Equivalently, a graded Hopf algebra H is
774
+ connected if and only if H+ := �
775
+ k≥1 Hk is isomorphic to ker(ǫ) as K-modules viz. η◦ǫ = idH0
776
+ and zero otherwise. For simplicity denote m (a, b) := ab, for all a, b, ∈ H. Using Sweedler’s
777
+
778
+ 8
779
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
780
+ notation, diagram (6) implies that for all c ∈ H,
781
+
782
+ (c)
783
+ S
784
+
785
+ c(1)
786
+
787
+ c(2) =
788
+
789
+ (c)
790
+ c(1)S
791
+
792
+ c(2)
793
+
794
+ = ǫ (c) 1H ,
795
+ where 1H is the multiplicative unit of the Hopf algebra H. The computation of the antipode
796
+ of an element c becomes easier when the algebra structure of H is graded and connected.
797
+ Theorem 3.1. If the Hopf algebra H is graded and connected, then the antipode can be
798
+ computed for any a ∈ H+ := �
799
+ k≥1 Hk as
800
+ S(a) = −a −
801
+
802
+ a′
803
+ (1)S(a′
804
+ (2)),
805
+ where the summation is taken over all components of the reduced coproduct ∆′ defined as:
806
+ ∆′ (a) := ∆ (a) − a ⊗ η (1K) − η (1K) ⊗ a.
807
+ 4. Unshuffle Hopf algebra and its Coaction
808
+ The goal of this section is to explain and illustrate the computational framework to
809
+ compute the shuffle product of two series and the shuffle inverse using the coordinate
810
+ maps of the series. The framework is well-developed in the literature [Foissy(2015)] and
811
+ was utilized in study of interconnections of Chen–Fliess series [Venkatesh & Gray(2022),
812
+ Venkatesh & Gray(2021), Venkatesh & Gray (2020), Gray, et al.(2014b), Gray, et al.(2014a)].
813
+ 4.1. Unshuffle Hopf Algebra. We construct a dual Hopf algebra reflecting the group
814
+ structure of M
815
+ as defined in Section 2. The antipode constructed in the Hopf algebra
816
+ provides a framework for computing the shuffle inverse of purely improper series c.
817
+ Let the set Wb ⊂ Rm⟨⟨X⟩⟩∗ (dual module of Rm⟨⟨X⟩⟩) be defined as the collection of
818
+ coordinate maps:
819
+ Wb = {aη : aη(c) = (c, η), η ∈ X∗, c ∈ Rm⟨⟨X⟩⟩}.
820
+ Define W to be the free Rm-module spanned by the set Wb. Let H
821
+ denote the reduced
822
+ symmetric algebra generated by the module W. The Rm-algebra H
823
+ can equivalently be
824
+ seen as the polynomial algebra of coordinate maps (corresponding to non-empty words) of
825
+ Rm⟨⟨X⟩⟩. The unit map ξ : Rm −→ H
826
+ is defined by ξ( ll) = a∅. Observe that a∅ : c �→ ll,
827
+ for all c ∈ M
828
+ . By construction, H
829
+ is an Rm-associative, commutative and unital algebra
830
+ with addition and scalar multiplication defined, respectively, as
831
+ (aη + aζ)(c) = aη(c) + aζ(c)
832
+ (kaη)(c) = k(aη(c)),
833
+ where c ∈ Rm⟨⟨X⟩⟩ and k ∈ Rm, and product
834
+ m(aη, aζ)(c) = aη(c).aζ(c),
835
+ for c ∈ M
836
+ . Then H
837
+ is equipped with a coproduct ˆ∆
838
+ : H
839
+ −→ H
840
+ � H
841
+ such that
842
+ ˆ∆
843
+ aη(c, d) = (c
844
+ d, η), for all c, d ∈ M
845
+ and η ∈ X∗. The counit map ǫ : H
846
+ −→ Rm is
847
+ defined as
848
+ ǫ(h) =
849
+ � ll : h = a∅
850
+ 0 : otherwise.
851
+ Since the shuffle product is associative and commutative, thus dually the coproduct ˆ∆
852
+ is
853
+ coassociative and cocommutative. Therefore, (H
854
+ , m, ξ, ˆ∆
855
+ , ǫ) forms a Rm-bialgebra. The
856
+
857
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
858
+ 9
859
+ following lemma is vital in the framework for computing both shuffle product and dynamic
860
+ feedback group product. Define a collection of linear endomorphisms {θi}m
861
+ i=0 on W
862
+ θi : W −→ W
863
+ aη �−→ axiη,
864
+ for all xi ∈ X, η ∈ X∗. Thus θi (aη) (c) = aη
865
+
866
+ x−1
867
+ i
868
+ (c)
869
+
870
+ .
871
+ The coproduct ˆ∆
872
+ can be recursively constructed as defined in the following proposition.
873
+ Proposition 4.1. [Foissy(2015)] On the module W
874
+ ˆ∆
875
+ ◦ θk = (θk ⊗ id + id ⊗ θk) ◦ ˆ∆
876
+ ,
877
+ for all i = 1, 2, . . . , m and k = 0, 1, . . . , m with base case being ˆ∆
878
+ a∅ = a∅ ⊗ a∅.
879
+ Proposition 4.1 infers that the maps θi, for i = 1, 2, . . . , m, are coderivations on the
880
+ underlying coalgebra of H
881
+ .
882
+ We note that the unshuffle coproduct ˆ∆
883
+ was utilized in the design of an algorithmic
884
+ framework for computation of Wiener-Fliess composition product and subsequently additive
885
+ static feedback product [Venkatesh & Gray(2021), Venkatesh & Gray(2022), Venkatesh(2021)]
886
+ and also in the computation of shuffle-rational series from its representation [Venkatesh & Gray (2020),
887
+ Venkatesh(2021)]. Moreover, the unshuffle coproduct was also crucial in the computational
888
+ framework for the multivariate additive output feedback [Gray, et al.(2014a), Gray, et al.(2014b)]
889
+ and for SISO affine output feedback [Gray & Ebrahimi-Fard(2017)].
890
+ Let {πi}m
891
+ i=1 be the collection of co-ordinate projection maps on the module W defined as
892
+ ai
893
+ η(c) := πi(aη)(c) = (c, η)i = (ci, η),
894
+ for all η ∈ X∗. Thus, define the following notation
895
+ ˆ∆j ai
896
+ η := (πi ⊗ πj) ◦ ˆ∆
897
+ aη.
898
+ Note that the projection maps {πi}m
899
+ i=1 commute with the maps {θj}m
900
+ j=0 viz. θi
901
+
902
+ aj
903
+ η
904
+
905
+ = aj
906
+ xiη.
907
+ The significance of these notations are well-reflected in the computational framework in
908
+ Section 8. The following example is to demonstrate the result of Proposition 4.1 for a few
909
+ words.
910
+ Example 4.1. A few examples of the computation of deshuffle coproduct ˆ∆
911
+ on W (akin
912
+ to Example 4.3) using Proposition 4.1 are given as follows(indices i = 1, 2, . . . , m and k, s =
913
+ 0, 1, . . . , m):
914
+ ˆ∆j ai
915
+ xk = ai
916
+ xk ⊗ aj
917
+ ∅ + ai
918
+ ∅ ⊗ aj
919
+ xk.
920
+ ˆ∆j ai
921
+ xkxk = ai
922
+ xkxk ⊗ aj
923
+ ∅ + 2ai
924
+ xk ⊗ aj
925
+ xk + ai
926
+ ∅ ⊗ aj
927
+ xkxk.
928
+ ˆ∆j ai
929
+ xkxs = ai
930
+ xkxs ⊗ aj
931
+ ∅ + ai
932
+ xk ⊗ aj
933
+ xs + ai
934
+ xs ⊗ aj
935
+ xk + ai
936
+ ∅ ⊗ aj
937
+ xkxs.
938
+ The connected Rm-bialgebra H
939
+ is endowed with an antipode map S
940
+ given as:
941
+ S
942
+ : H
943
+ −→ H
944
+ aη �→ S
945
+
946
+ such that S
947
+ aη (c) = (c
948
+ −1, η), for η ∈ X∗, c ∈ M
949
+ .
950
+
951
+ 10
952
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
953
+ 4.2. Gradation of Bialgebra H
954
+ . The Hopf algebra H
955
+ can be equipped with a grading
956
+ such that it is connected and all its homogeneous components are finite-dimensional.
957
+ Definition 4.1. Given η ∈ X+, define the degree of aη as deg (aη) = |η|.
958
+ (1) Define gradation on the Rm-module W viz.
959
+ W =
960
+
961
+ k≥1
962
+ Wk,
963
+ where Wk is the free Rm-module spanned by the aη of deg (aη) = k.
964
+ (2) The gradation on the module W induces a graded structure on the algebra H
965
+ as
966
+ H
967
+ =
968
+
969
+ n∈N0
970
+ ˆHn,
971
+ with ˆH0 ∼= Rm in the category of Rm-modules.
972
+ The following proposition asserts that the above gradation is connected and all its homo-
973
+ geneous components are finite-dimensional.
974
+ Proposition 4.2. Given the gradation for the Hopf algebra H
975
+ ,
976
+ (1) H
977
+ is a graded and connected Hopf algebra viz.
978
+ ˆ∆
979
+
980
+ ˆHn
981
+
982
+
983
+
984
+ i+j=n
985
+ i,j≥0
986
+ ˆHi ⊗ ˆHj.
987
+ (2) For all k: define wk = dim (Wk) and FW = �
988
+ k≥1 wkZk is the geometric series given
989
+ by
990
+ FW =
991
+ 1
992
+ 1 − mZ ,
993
+ where m = |X| and for all k ≥ 1:
994
+ wk = dim (Wk) = mk.
995
+ (3) Define F ˆ
996
+ H = �
997
+ n≥1 hnZn where hn = dim( ˆHn) then
998
+ F ˆ
999
+ H =
1000
+
1001
+
1002
+ k=1
1003
+ 1
1004
+ (1 − Zk)wk .
1005
+ Proof:
1006
+ (1) The Hopf algebra H
1007
+ follows from the fact that if γ(̸= η, ζ) ∈ supp(η
1008
+ ζ) then
1009
+ deg (γ) = |γ| = |η| + |ζ| = deg (η) + deg (ζ) ,
1010
+ for all η, ζ, γ ∈ X∗.
1011
+ (2) Define the formal power series
1012
+ F(Z0, Z1, . . . , Zm) =
1013
+
1014
+ k≥1
1015
+
1016
+ i0,i1,...,im≥0
1017
+ i0+i1+···+im=k
1018
+ #{η : |η|xj = ij ∀ j = 0, 1, 2, . . . , m}Zi0
1019
+ 0 Zi1
1020
+ 1 · · · Zim
1021
+ m
1022
+ =
1023
+ (Z0 + Z1 + · · · + Zm)
1024
+ 1 − (Z0 + Z1 + · · · + Zm).
1025
+
1026
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
1027
+ 11
1028
+ Since each letter contributes equally to the degree (viz. length), thus
1029
+ FW = F(Z, Z, . . ., Z) =
1030
+ mZ
1031
+ 1 − mZ .
1032
+ (3) The proposition follows from the item 2 as ˆH is the symmetric algebra generated by
1033
+ the Rm-module W.
1034
+ Table 1. Dimensions of the homogeneous components of module W and H
1035
+ (when m = 2)
1036
+ k
1037
+ 0
1038
+ 1
1039
+ 2
1040
+ 3
1041
+ 4
1042
+ 5
1043
+ 6
1044
+ 7
1045
+ 8
1046
+ 9
1047
+ 10
1048
+ dim (Wk)
1049
+ 1
1050
+ 2
1051
+ 4
1052
+ 8
1053
+ 16
1054
+ 32
1055
+ 64
1056
+ 128
1057
+ 256
1058
+ 512
1059
+ 1024
1060
+ dim( ˆHk)
1061
+ 1
1062
+ 2
1063
+ 7
1064
+ 20
1065
+ 59
1066
+ 162
1067
+ 449
1068
+ 1200
1069
+ 3194
1070
+ 8348
1071
+ 21646
1072
+ . . .
1073
+ Example 4.2. The dimensions of the homogeneous components of the graded module W
1074
+ (up to k = 10) and the graded algebra H
1075
+ for m = 2 viz when X = {x0, x1} is tabulated in
1076
+ Table 1.
1077
+ The sequence {dim( ˆHk)}k∈N0 is the sequence A034899 in [OEIS(2022)] which corresponds
1078
+ to the number of multisets of binary words of total length n.
1079
+ 4.3. Coaction of H
1080
+ . The subsection explains the coaction of the Hopf algebra H
1081
+ (4.1)
1082
+ on the algebra of coordinate functions. It is utilized subsequently to develop an algorithm to
1083
+ compute the multiplicative mixed composition product explained in Section 5.2 and dynamic
1084
+ feedback product as defined in Theorem 6.2. Let W to be the Rm-module as described in
1085
+ Section 4.1. Let S+ (W) denote the reduced symmetric algebra generated by the module W.
1086
+ The non-unital Rm-algebra S+(W) are equivalently the polynomials without constant term
1087
+ of coordinate maps of Rm⟨⟨X⟩⟩. By construction S+(W) has a non-unital Rm-associative,
1088
+ commutative algebra structure with addition, scalar multiplication and product defined,
1089
+ respectively, as
1090
+ (aη + aζ)(c) = aη(c) + aζ(c)
1091
+ (kaη)(c) = k(aη(c))
1092
+ where c ∈ Rm⟨⟨X⟩⟩, and
1093
+ m(aη, aζ)(c) = aη(c).aζ(c),
1094
+ where c ∈ M
1095
+ . The Rm-algebra S+(W) is isomorphic to the algebra structure of H
1096
+ with
1097
+ forgetting of the unit map ξ. The right coaction map ρ
1098
+ : S+ (W) −→ S+ (W) ⊗ H
1099
+ is
1100
+ recursively defined on the module V as given by the following proposition.
1101
+ Proposition 4.3. For all i = 0, 1, 2, . . . , m :
1102
+ ρ
1103
+ ◦ θi = (θi ⊗ id + id ⊗ θi) ◦ ρ
1104
+ ,
1105
+ with base case being ρ
1106
+ a∅ = a∅ ⊗ a∅.
1107
+ Proposition 4.3 might appear as repetition of Proposition 4.1. It is vital to note that
1108
+ Proposition 4.1 is for defining the coproduct of Hopf algebra H
1109
+ , where a∅ is the unit
1110
+ element. Observe that,
1111
+ ρ
1112
+ ai
1113
+ η(c, d) = ai
1114
+ η(c
1115
+ d),
1116
+
1117
+ 12
1118
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
1119
+ where c ∈ R⟨⟨X⟩⟩ (not necessarily in M
1120
+ ) and d ∈ M
1121
+ .
1122
+ The coaction ρ
1123
+ thus is a
1124
+ corepresentation of the Hopf algebra H
1125
+ on the algebra S+ (W) or equivalently, ρ
1126
+ makes
1127
+ S+ (W), a H
1128
+ -algebra. Let {πi}m
1129
+ i=1 be the collection of co-ordinate projection maps on the
1130
+ module W defined as
1131
+ ai
1132
+ η(c) := πi(aη)(c) = (c, η)i = (ci, η),
1133
+ for all η ∈ X∗ and thus the following notation is well-defined,
1134
+ ρj ai
1135
+ η := (πi ⊗ πj) ◦ ρ
1136
+ aη.
1137
+ These notations are very much utilized in developing computational framework for the
1138
+ multiplicative mixed composition product as discussed in Section 8.
1139
+ Corollary 4.1. If n ∈ N0, then for all i = 0, 1, 2, . . ., m and j, k = 1, 2, . . . , m (defining
1140
+ x0
1141
+ j := ∅):
1142
+ ρj ak
1143
+ xin =
1144
+ n
1145
+
1146
+ r=0
1147
+ �n
1148
+ r
1149
+
1150
+ ak
1151
+ xir ⊗ aj
1152
+ xin−r .
1153
+ Proof: The statement is proved by induction on n ∈ N0. The base case (n = 0) follows from
1154
+ Proposition 4.3. Assume the statement is true for n = p − 1, then
1155
+ ρj ak
1156
+ xip = ρj ◦ θiak
1157
+ xip−1
1158
+ = (θi ⊗ id + id ⊗ θi) ◦ ∆j ak
1159
+ xip−1.
1160
+ Using the induction hypothesis,
1161
+ ρj ak
1162
+ xip = (θi ⊗ id + id ⊗ θi)
1163
+ �p−1
1164
+
1165
+ r=0
1166
+ �p − 1
1167
+ r
1168
+
1169
+ ak
1170
+ xir ⊗ aj
1171
+ xip−1−r
1172
+
1173
+ =
1174
+ p
1175
+
1176
+ r=1
1177
+ �p − 1
1178
+ r − 1
1179
+
1180
+ ak
1181
+ xir ⊗ aj
1182
+ xip−r +
1183
+ p−1
1184
+
1185
+ r=0
1186
+ �p − 1
1187
+ r
1188
+
1189
+ ak
1190
+ xir ⊗ aj
1191
+ xip−r.
1192
+ =
1193
+ p
1194
+
1195
+ r=0
1196
+ �n
1197
+ r
1198
+
1199
+ ak
1200
+ xir ⊗ aj
1201
+ xip−r.
1202
+ Since the S+ (W) and H
1203
+ are isomorphic as Rm-modules, the following lemma states the
1204
+ coaction of H
1205
+ on S+ (W) and the unshuffle coproduct coincide when the evaluation of
1206
+ coordinate maps are restricted to the group M
1207
+ .
1208
+ Lemma 4.1. Given c, d ∈ M
1209
+ , η ∈ X∗ and i = 1, 2, . . . , m,
1210
+ ˆ∆
1211
+ aη (c, d) = (c
1212
+ d, η) = ρ
1213
+ aη (c, d) ,
1214
+ where c, d ∈ M
1215
+ and ˆ∆i
1216
+ is the coproduct from the bialgebra H
1217
+ constructed in Section 4.3.
1218
+ Example 4.3. A few examples of the computation of the coaction map ρ
1219
+ on W using
1220
+ Proposition 4.3 are given as follows(indices i, j = 1, 2, . . . , m and k, s = 0, 1, . . . , m):
1221
+ ∆j ai
1222
+ ∅ = ai
1223
+ ∅ ⊗ aj
1224
+ ∅.
1225
+ ∆j ai
1226
+ xk = ai
1227
+ xi ⊗ aj
1228
+ ∅ + ai
1229
+ ∅ ⊗ aj
1230
+ xi.
1231
+ ∆j ai
1232
+ xkxk = ai
1233
+ xkxk ⊗ aj
1234
+ ∅ + 2ai
1235
+ xk ⊗ aj
1236
+ xk + ai
1237
+ ∅ ⊗ aj
1238
+ xkxk.
1239
+
1240
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
1241
+ 13
1242
+ ∆j ai
1243
+ xkxs = ai
1244
+ xkxs ⊗ aj
1245
+ ∅ + ai
1246
+ xk ⊗ aj
1247
+ xs + ai
1248
+ xs ⊗ aj
1249
+ xk + ai
1250
+ ∅ ⊗ aj
1251
+ xkxs.
1252
+ The following example illustrates the application of the deshuffle coproduct ∆
1253
+ in the
1254
+ computation of the shuffle product of two series.
1255
+ Example 4.4. Let X = {x0, x1} and c, d ∈ R2⟨⟨X⟩⟩ described as
1256
+ c =
1257
+
1258
+ 1 + x1 + x2
1259
+ 1 + x3
1260
+ 1 + · · ·
1261
+ x0 + x0x1 + x100
1262
+ 1
1263
+
1264
+ &
1265
+ d =
1266
+
1267
+ 1 + x2
1268
+ 0 + exp (x1)
1269
+ 1 + x2
1270
+ 0x1
1271
+
1272
+ ,
1273
+ where exp(.) is the standard exponential function expressed in its Taylor series. Note that
1274
+ c ̸∈ M
1275
+ but d ∈ M
1276
+ . The coefficient of x0x2
1277
+ 1 in series c2
1278
+ d1 can be computed as:
1279
+
1280
+ c2
1281
+ d1, x0x2
1282
+ 1
1283
+
1284
+ = ∆1 a2
1285
+ x0x2
1286
+ 1 (c, d) = (π2 ⊗ π1) ◦ ∆
1287
+ ax0x2
1288
+ 1 (c, d)
1289
+ = ∆1 ◦ θ0ax2
1290
+ 1 (c, d) .
1291
+ Using Proposition 4.3,
1292
+
1293
+ c2
1294
+ d1, x0x2
1295
+ 1
1296
+
1297
+ = (θ0 ⊗ id + id ⊗ θ0) ◦ ∆1 a2
1298
+ x2
1299
+ 1 (c, d) .
1300
+ Using Corollary 4.1,
1301
+
1302
+ c2
1303
+ d1, x0x2
1304
+ 1
1305
+
1306
+ = (θ0 ⊗ id + id ⊗ θ0) ◦
1307
+
1308
+ a2
1309
+ x12 ⊗ a1
1310
+ ∅ + 2a2
1311
+ x1 ⊗ a1
1312
+ x1 + a2
1313
+ ∅ ⊗ a1
1314
+ x12
1315
+
1316
+ (c, d)
1317
+ =
1318
+
1319
+ a2
1320
+ x0x12 ⊗ a1
1321
+ ∅ + 2a2
1322
+ x0x1 ⊗ a1
1323
+ x1 + a2
1324
+ x0 ⊗ a1
1325
+ x12 + a2
1326
+ x12 ⊗ a1
1327
+ x0+
1328
+ 2a2
1329
+ x1 ⊗ a1
1330
+ x0x1 + a2
1331
+ ∅ ⊗ a1
1332
+ x0x12
1333
+
1334
+ (c, d)
1335
+ = (0)(1) + 2(1)(1) + (1)(0.5) + (0)(0) + 2(0)(0) + (0)(0) = 2.5.
1336
+ Therefore (c2
1337
+ d1, x0x2
1338
+ 1) = 2.5.
1339
+ 5. Chen–Fliess Series and its Interconnections
1340
+ The objective of the section is to describe Chen–Fliess series and the necessary non-
1341
+ recursive interconnections of Chen–Fliess series to understand the results about the multi-
1342
+ plicative dynamic feedback product in Section 6.
1343
+ 5.1. Chen–Fliess Series. Let p ≥ 1 and t0 < t1 be given. For a Lebesgue measurable
1344
+ function u : [t0, t1] → Rm, define ∥u∥p = max{∥ui∥p :
1345
+ 1 ≤ i ≤ m}, where ∥ui∥p is the
1346
+ usual Lp-norm for a measurable real-valued function, ui, defined on [t0, t1]. Let Lm
1347
+ p [t0, t1]
1348
+ denote the set of all measurable functions defined on [t0, t1] having a finite ∥ · ∥p norm
1349
+ and Bm
1350
+ p (R)[t0, t1] := {u ∈ Lm
1351
+ p [t0, t1] : ∥u∥p ≤ R}.
1352
+ Given any series c ∈ Rℓ⟨⟨X⟩⟩, the
1353
+ corresponding Chen–Fliess series is
1354
+ (7)
1355
+ Fc[u](t) =
1356
+
1357
+ η∈X∗
1358
+ (c, η) Fη[u](t, t0),
1359
+ where E∅[u] = 1 and
1360
+ Fxi¯η[u](t, t0) =
1361
+ � t
1362
+ t0
1363
+ ui(τ)F¯η[u](τ, t0) dτ
1364
+ with xi ∈ X, ¯η ∈ X∗, and u0 = 1 [Fliess(1981)]. If there exist constants K, M > 0 such that
1365
+ |(ci, η)| ≤ KM|η||η|!, ∀η ∈ X∗, ∀i = 1, . . . , ℓ ,
1366
+ (8)
1367
+
1368
+ 14
1369
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
1370
+ then Fc constitutes a well-defined mapping from Bm
1371
+ p (R)[t0, t0 + T] into Bℓ
1372
+ q(S)[t0, t0 + T]
1373
+ for sufficiently small R, T > 0, where the numbers p, q ∈ [1, ∞] are conjugate exponents,
1374
+ i.e., 1/p + 1/q = 1 [Gray & Wang(2002)].
1375
+ This map is referred to as a Fliess operator.
1376
+ A series c ∈ Rℓ⟨⟨X⟩⟩ obeying the growth condition in (8) is called a locally convergent
1377
+ generating series. The set of all locally convergent generating series is denoted by Rℓ
1378
+ LC⟨⟨X⟩⟩.
1379
+ The supremum of the set of all max{R, T} for which a Fliess operator Fc is a well-defined
1380
+ mapping from Bm
1381
+ p (R)[t0, t0 + T] into Bℓ
1382
+ q(S)[t0, t0 + T] is called the radius of convergence
1383
+ of the Fliess operator Fc and is denoted by ρ (Fc). A Fliess operator Fc is called locally
1384
+ convergent if ρ (Fc) > 0. If there exist constants K, M > 0 and γ ∈ [0, 1[ such that
1385
+ |(ci, η)| ≤ KM|η| (|η|!)γ , ∀η ∈ X∗, ∀i = 1, . . . , ℓ ,
1386
+ (9)
1387
+ then Fc constitutes a well defined mapping from Bm
1388
+ p (R)[t0, t0 + T] into Bℓ
1389
+ q(S)[t0, t0 + T]
1390
+ for all R, T > 0 [Winter-Arboleda(2019), Winter-Arboleda, et al.(2015)]. The infimum of all
1391
+ the γ ∈ [0, 1[ such that (9) is satisfied for a series c ∈ Rℓ⟨⟨X⟩⟩ is called the Gevrey order of
1392
+ the series c.
1393
+ A series c ∈ Rℓ⟨⟨X⟩⟩ obeying the growth condition in (9) is called a globally convergent
1394
+ series. The set of all globally convergent series in Rℓ⟨⟨X⟩⟩ is denoted as Rℓ
1395
+ GC⟨⟨X⟩⟩. A Fliess
1396
+ operator Fc is globally convergent if and only if there exists no real number M > 0 such
1397
+ that ρ (Fc) < M. Observe that a noncommutative polynomial R⟨X⟩ is a globally convergent
1398
+ series with Gevrey degree 0. As described above, a series c ∈ Rℓ
1399
+ GC⟨⟨X⟩⟩ is only a sufficient
1400
+ condition for the corresponding Fliess operator Fc to be globally convergent.
1401
+ Necessary
1402
+ conditions are well-detailed in the literature [Winter-Arboleda(2019), Venkatesh(2021)]. In
1403
+ the absence of any convergence criterion, (7) only defines an operator in a formal sense.
1404
+ 5.2. Interconnections of Chen–Fliess Series: Parallel and Cascade Connections.
1405
+ Given Chen–Fliess series Fc and Fd, where c, d ∈ Rℓ⟨⟨X⟩⟩, the parallel and product connec-
1406
+ tions satisfy Fc + Fd = Fc+d and FcFd = Fc
1407
+ d, respectively [Ree(1958), Fliess(1981)]. The
1408
+ parallel and product connections preserve local convergence and hence the interconnected
1409
+ systems has a Fliess operator representation [Thitsa & Gray(2012), Venkatesh(2021)]. When
1410
+ Chen–Fliess series Fc and Fd with c ∈ Rk⟨⟨X′⟩⟩ and d ∈ Rℓ⟨⟨X⟩⟩ are interconnected in a
1411
+ cascade fashion, where |X′| = ℓ + 1, the composite system Fc ◦ Fd has a Chen–Fliess series
1412
+ representation Fc◦d, where the composition product of c and d is given by
1413
+ (10)
1414
+ c ◦ d =
1415
+
1416
+ η∈X′∗
1417
+ (c, η) ψd(η)(1)
1418
+ [Ferfera(1979), Ferfera(1980)]. Here 1 denotes the monomial 1∅, and ψd is the continuous
1419
+ (in the ultrametric sense) algebra homomorphism from R⟨⟨X′⟩⟩ to the set of vector space
1420
+ endomorphisms on R⟨⟨X⟩⟩, End (R⟨⟨X⟩⟩), uniquely specified by
1421
+ ψd(x′
1422
+ iη) = ψd(x′
1423
+ i) ◦ ψd(η)
1424
+ with ψd(x′
1425
+ i)(e) = x0(di
1426
+ e), i = 0, 1, . . . , m for any e ∈ R⟨⟨X⟩⟩, and where di is the i-th
1427
+ component series of d (d0 := 1). By definition, ψd(∅) is the identity map on R⟨⟨X⟩⟩. The
1428
+ cascade interconnection preserves local convergence and thus the composite has a Fliess
1429
+ operator representation [Thitsa & Gray(2012)]. The linearity of the composition product in
1430
+ the left argument is evident form the definition. However, the following theorem states that
1431
+ the composition product distributes over the shuffle product from the right.
1432
+ Theorem 5.1. [Gray & Li(2005)] Let c, d ∈ Rk⟨⟨X′⟩⟩ and e ∈ Rℓ⟨⟨X⟩⟩, such that |X′| =
1433
+ ℓ + 1, then (c
1434
+ d) ◦ e = (c ◦ e)
1435
+ (d ◦ e).
1436
+
1437
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
1438
+ 15
1439
+ Given a series e ∈ Rℓ⟨⟨X⟩⟩, define a map Υe : Rk⟨⟨X′⟩⟩ −→ Rk⟨⟨X⟩⟩ defined as c �→
1440
+ c ◦ e. Theorem 5.1 infers that Υe is an R-algebra homomorphism from the shuffle algebra of
1441
+ Rk⟨⟨X′⟩⟩ to the shuffle algebra of Rℓ⟨⟨X⟩⟩. The composition product preserves the purely
1442
+ improper property of the left argument which is stated in the following theorem.
1443
+ Theorem 5.2. If c ∈ Rk⟨⟨X′⟩⟩ and d ∈ Rℓ⟨⟨X⟩⟩ such that |X′| = ℓ + 1, then (c ◦ d, ∅) =
1444
+ (c, ∅). Hence, if c ∈ Rk
1445
+ pi ⟨⟨X′⟩⟩ then c ◦ d ∈ Rk
1446
+ pi ⟨⟨X⟩⟩ and vice-versa. Similarly if c is a
1447
+ proper series then c ◦ d is also a proper series and vice-versa.
1448
+ Proof: The proof follows immediately from (10).
1449
+ The composition product is a strong contraction map with respect to its right argument
1450
+ in the ultrametric topology and is stated in the following theorem.
1451
+ Theorem 5.3. [Gray & Li(2005)] Let c ∈ Rk⟨⟨X′⟩⟩ and d, e ∈ Rℓ⟨⟨X⟩⟩, such that |X′| =
1452
+ ℓ + 1, then κ (c ◦ d, c ◦ e) ≤ σκ (d, e) where σ ∈ [0, 1[.
1453
+ 5.3. Cascading of Chen–Fliess with Multiplicative Feedforward of Input. The cas-
1454
+ cade interconnection of a Chen–Fliess series Fc and Fd along with the multiplicative feed-
1455
+ forward of the input, as shown in Figure 1, arises primarily in the analysis of multiplicative
1456
+ feedback interconnection discussed in Section 6. A semblance of such an interconnection
1457
+ has appeared in Definition 3.1 of [Gray & Ebrahimi-Fard(2017)], without being explicit and
1458
+ limited to the SISO case. With respect to Figure 1, the map u �→ y viz. y = Fc[u.Fd[u]] has
1459
+ Chen–Fliess series representation denoted by Fc↶d, where c ↶ d denotes the multiplicative
1460
+ mixed composition product of c ∈ Rp⟨⟨X⟩⟩ and d ∈ Rm⟨⟨X⟩⟩ defined as
1461
+ c ↶ d =
1462
+
1463
+ η∈X∗
1464
+ (c, η) η ↶ d :=
1465
+
1466
+ η∈X∗
1467
+ (c, η) ¯φd (η) (1) .
1468
+ (11)
1469
+ Here, ¯φd : R⟨⟨X⟩⟩ −→ End (R⟨⟨X⟩⟩) is an R-algebra homomorphism such that
1470
+ ¯φd(x0)(e) = x0e
1471
+ and
1472
+ ¯φd(xi)(e) = xi(di
1473
+ e).
1474
+ Recall that R⟨⟨X⟩⟩ is an R-algebra under Cauchy product and End (R⟨⟨X⟩⟩). The multi-
1475
+ plicative mixed composition defined in (11) asserts that, for all η ∈ X∗ and d ∈ Rm⟨⟨X⟩⟩,
1476
+ ∅ ↶ d = ∅
1477
+ x0η ↶ d = x0 (η ↶ d)
1478
+ xiη ↶ d = xi (di
1479
+ (η ↶ d))
1480
+ ∀ i = 1, 2, . . . , m.
1481
+ For later reference, we summarise the properties of (11) in the following
1482
+ Theorem 5.4. The multiplicative mixed composition product (11) is linear in its left argu-
1483
+ ment and (c ↶ d, ∅) = (c, ∅), for all c ∈ Rp⟨⟨X⟩⟩ and d ∈ Rm⟨⟨X⟩⟩.
1484
+ The following results are already known in the single-input single-output (SISO) setting.
1485
+ However, their multi-input multi-output (MIMO) extensions are straightforward and to avoid
1486
+ reiteration of the proofs, only the statements are provided in this document. The foremost
1487
+ of the theorems asserts that the multiplicative mixed composition product distributes over
1488
+ shuffle product from the right.
1489
+ Theorem 5.5. [Gray & Ebrahimi-Fard(2017)] Let c, d ∈ Rp⟨⟨X⟩⟩ and e ∈ Rm⟨⟨X⟩⟩, then
1490
+ (c
1491
+ d) ↶ e = (c ↶ e)
1492
+ (d ↶ e).
1493
+
1494
+ 16
1495
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
1496
+ Fd
1497
+ Fc
1498
+ u
1499
+ y
1500
+ Figure 1. Cascade connection of Chen–Fliess Fd with Fc along with multi-
1501
+ plicative feedforward of input
1502
+ The inference of Theorem 5.5 is that for any e ∈ Rm⟨⟨X⟩⟩, the map Γe : Rp⟨⟨X⟩⟩ −→
1503
+ Rp⟨⟨X⟩⟩ given by d �→ d ↶ e is an R-algebra endomorphism on the shuffle algebra Rp⟨⟨X⟩⟩.
1504
+ The next lemma is essential in proving that multiplicative mixed composition product is a
1505
+ strong contraction map in its right argument in the ultrametric topology.
1506
+ Lemma 5.1. [Gray & Ebrahimi-Fard(2017)] Let η ∈ X∗ and d, e ∈ Rm⟨⟨X⟩⟩, then
1507
+ κ (η ↶ d, η ↶ e) ≤ σ|η|κ (d, e) where σ ∈ [0, 1[.
1508
+ The following theorem states the strong contraction property of the multiplicative mixed
1509
+ composition product which is an essential result in Section 6.
1510
+ Theorem 5.6. [Gray & Ebrahimi-Fard(2017)] Let d, e ∈ Rm⟨⟨X⟩⟩ and c ∈ Rp⟨⟨X⟩⟩, then
1511
+ κ (c ↶ d, c ↶ e) ≤ σord(c′)κ (d, e), where c′ = c − (c, ∅), the proper part of c.
1512
+ Since ord (c′) ≥ 1 and σ ∈]0, 1[, then from Theorem 5.6, the map ¯Γc : e �→ c ↶ e is a strong
1513
+ contraction map in the ultrametric topology. The following lemma is essential in proving
1514
+ the mixed associativity of the composition and multiplicative mixed composition product.
1515
+ The result, along with Theorem 5.7 can be inferred in the SISO setting from Lemma 3.6 in
1516
+ [Gray & Ebrahimi-Fard(2017)], and its extension to the MIMO case is straightforward.
1517
+ Lemma 5.2. [Gray & Ebrahimi-Fard(2017)] Let X′ = {x′
1518
+ 0, . . . , x′
1519
+ p} and η ∈ X′∗. Let d ∈
1520
+ Rp⟨⟨X⟩⟩ and e ∈ Rm⟨⟨X⟩⟩, then η ◦ (d ↶ e) = (η ◦ d) ↶ e.
1521
+ The following theorem states that the composition product and multiplicative mixed com-
1522
+ position product are associative in combination.
1523
+ Theorem 5.7. [Gray & Ebrahimi-Fard(2017)] Let X′ = {x′
1524
+ 0, . . . , x′
1525
+ p} and c ∈ Rq⟨⟨X′⟩⟩. Let
1526
+ d ∈ Rp⟨⟨X⟩⟩ and e ∈ Rm⟨⟨X⟩⟩, then c ◦ (d ↶ e) = (c ◦ d) ↶ e.
1527
+ 5.4. Multiplicative Dynamic Output Feedback Group. The dynamic multiplicative
1528
+ feedback group plays a vital role in computation of the multiplicative dynamic feedback
1529
+ formula, as well as in assessing the feedback as a group action in Section 6. Indeed, consider
1530
+ the cascade interconnection of two Chen–Fliess series Fc and Fd along with their multiplica-
1531
+ tive feedforward of inputs displayed in Figure 2, where c, d ∈ Rm⟨⟨X⟩⟩. The input-output
1532
+ relation of the composite system, u �→ y is u.Fd[u]Fc[u.Fd[u]] and can be represented by
1533
+ Chen–Fliess series as follows. Consider
1534
+ u.Fc⋆d[u] := u.Fd[u]Fc[u.Fd[u]],
1535
+ where the multiplicative composition product of c and d is defined as
1536
+ c ⋆ d = d
1537
+ (c ↶ d) .
1538
+ (12)
1539
+ The following theorems appeared in [Gray & Ebrahimi-Fard(2017)] in the SISO setting.
1540
+ We underline that the latter restriction is not essential, that is, the statements along with
1541
+ the proofs naturally extend to the MIMO setting.
1542
+
1543
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
1544
+ 17
1545
+ Figure 2. Cascade connection of Chen–Fliess Fd with Fc along with multi-
1546
+ plicative feedforward of their inputs.
1547
+ Theorem 5.8. [Gray & Ebrahimi-Fard(2017)] Let c, d, e ∈ Rm⟨⟨X⟩⟩, then, (c ⋆ d) ⋆ e =
1548
+ c ⋆ (d ⋆ e).
1549
+ Observe that (12) and Theorem 5.8 infer that Rm⟨⟨X⟩⟩ forms a non-commutative monoid
1550
+ under multiplicative composition product, with the identity element ll. The following theo-
1551
+ rem states that the multiplicative mixed composition product is a right action on Rq⟨⟨X⟩⟩
1552
+ by the monoid (Rm⟨⟨X⟩⟩, ⋆, ll).
1553
+ Theorem 5.9. [Gray & Ebrahimi-Fard(2017)] Let c ∈ Rq⟨⟨X⟩⟩ and d, e ∈ Rm⟨⟨X⟩⟩, then
1554
+ (c ↶ d) ↶ e = c ↶ (d ⋆ e).
1555
+ The prominent question is to find the invertible elements of the monoid (Rm⟨⟨X⟩⟩, ⋆) and
1556
+ the motivation to find the unit elements of the monoid shall be evident in Section 6. Let
1557
+ d, e ∈ Rm
1558
+ pi ⟨⟨X⟩⟩ and suppose
1559
+ d ⋆ e = ll.
1560
+ Observe that d ∈ Rm
1561
+ pi ⟨⟨X⟩⟩ implies (d ↶ e) ∈ Rm
1562
+ pi ⟨⟨X⟩⟩ and using Theorem 5.5,
1563
+ e = (d ↶ e)
1564
+ −1 = d
1565
+ −1 ↶ e.
1566
+ Hence, for e to be right inverse of d, the purely improper series e has to satisfy the fixed
1567
+ point equation
1568
+ e = d
1569
+ −1 ↶ e
1570
+ (13)
1571
+ Observe from Theorem 5.6 that the map e �→ d
1572
+ −1 ↶ e is a strong contraction in the
1573
+ ultrametric space inferring that (13) has a unique fixed point. Suppose e is the left inverse
1574
+ of d viz. e ⋆ d, then a similar procedure shows that e has to satisfy the equation
1575
+ d = e
1576
+ −1 ↶ d
1577
+ (14)
1578
+ Note that if e is a solution of (13), then e satisfies (14) and also the converse holds true.
1579
+ Hence, e is the unique inverse of d and is given the notation d⋆−1 for d ∈ Rm
1580
+ pi ⟨⟨X⟩⟩. Thus,
1581
+ Rm
1582
+ pi ⟨⟨X⟩⟩ forms a group under multiplicative composition product, ⋆, and is termed as the
1583
+ multiplicative dynamic output feedback group and is formally stated in the following theorem.
1584
+ Theorem 5.10.
1585
+
1586
+ Rm
1587
+ pi ⟨⟨X⟩⟩, ⋆
1588
+
1589
+ forms a group with the identity element ll.
1590
+ It is worth noting that [Gray & Ebrahimi-Fard(2017)] proved Theorem 5.10 for one-
1591
+ dimensional case viz. m = 1. In light of Theorem 5.10, Theorem 5.5 and (12) one obtains
1592
+ the following relations for c ∈ Rm
1593
+ pi ⟨⟨X⟩⟩:
1594
+ c⋆−1 = c
1595
+ −1 ↶ c⋆−1
1596
+ (15)
1597
+
1598
+ c⋆−1�
1599
+ −1 = c ↶ c⋆−1.
1600
+ The following lemma is essential in defining a subgroup of the multiplicative dynamic out-
1601
+ put feedback group upon which the computational framework for the multiplicative feedback
1602
+ products is discussed in Section 8.
1603
+
1604
+ F
1605
+ F
1606
+ n18
1607
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
1608
+ Lemma 5.3. Let c, d ∈ Rm
1609
+ pi ⟨⟨X⟩⟩, then (c ⋆ d, ∅) = (c, ∅) (d, ∅).
1610
+ Proof: Observe from (12) that,
1611
+ (c ⋆ d, ∅) = (d
1612
+ (c ↶ d) , ∅)
1613
+ = (c ↶ d, ∅) (d, ∅)
1614
+ Since (c ↶ d, ∅) = (c, ∅),
1615
+ (c ⋆ d, ∅) = (c, ∅) (d, ∅) .
1616
+ Lemma 5.3 thus proves that the set of all series which are of the form ll + c, where c is
1617
+ a proper series, forms a subgroup of the multiplicative dynamic feedback group, which is
1618
+ stated in the following theorem.
1619
+ Theorem 5.11. Let M = { ll + c : c ∈ Rm
1620
+ p ⟨⟨X⟩⟩}, then (M, ⋆, ll) forms a subgroup of the
1621
+ multiplicative dynamic feedback group.
1622
+ The algorithmic framework for the computation of multiplicative feedback products is
1623
+ fundamentally based on the subgroup M as asserted in Theorem 5.11. The group M is
1624
+ isomorphic to the character group of the Hopf algebra H which is used for computation of
1625
+ feedback and the framework is explained in detail in Section 8.
1626
+ 6. Chen–Fliess Series Under Multiplicative Dynamic Output Feedback
1627
+ Let Fc be a Chen–Fliess series with a generating series c ∈ Rq⟨⟨X⟩⟩. Assume it is intercon-
1628
+ nected with a Chen–Fliess series Fd with a purely improper generating series d ∈ Rm
1629
+ pi ⟨⟨X′⟩⟩,
1630
+ as shown in Figure 3. Note that, |X| = m + 1 and |X′| = q + 1. The primary goal of this
1631
+ section is to show that the closed-loop system has a Chen–Fliess series representation, say
1632
+ y = Fe[v], where e ∈ Rq⟨⟨X⟩⟩. If this is the case, then necessarily
1633
+ y = Fe[v] = Fc[u] = Fc[vFd[y]]
1634
+ = Fc[vFd[Fe[v]]] = Fc[vFd◦e[v]]
1635
+ = Fc↶(d◦e)[v]
1636
+ for any admissible input v. Therefore, the series e has to satisfy the fixed point equation
1637
+ e = c ↶ (d ◦ e) .
1638
+ (16)
1639
+ Observe that, in light of Theorem 5.3 and Theorem 5.6 the map e �→ c ↶ (d ◦ e) is a
1640
+ strong contraction map in the ultrametric space and thus (16) has a unique fixed point. The
1641
+ following thoerem establishes the first main result of this section, which follows immediately.
1642
+ Theorem 6.1. The series c ↶ (d
1643
+ −1 ◦ c)⋆−1 ∈ Rq⟨⟨X⟩⟩ is the unique fixed point of the map
1644
+ e �→ c ↶ (d ◦ e).
1645
+ Proof: If e := c ↶ (d
1646
+ −1 ◦ c)⋆−1, then
1647
+ c ↶ (d ◦ e) = c ↶
1648
+
1649
+ d ◦
1650
+
1651
+ c ↶
1652
+
1653
+ d
1654
+ −1 ◦ c
1655
+ �⋆−1��
1656
+ Using Theorem 5.7 and then Theorem 5.5,
1657
+ c ↶ (d ◦ e) = c ↶
1658
+
1659
+ (d ◦ c) ↶
1660
+
1661
+ d
1662
+ −1 ◦ c
1663
+ �⋆−1�
1664
+
1665
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
1666
+ 19
1667
+ Fc
1668
+ v
1669
+ Fd
1670
+ y
1671
+ u
1672
+ Figure 3. Chen–Fliess series Fc in multiplicative output feedback with Chen-
1673
+ Flies series Fd
1674
+ = c ↶
1675
+
1676
+ (d ◦ c)
1677
+ −1 ↶
1678
+
1679
+ d
1680
+ −1 ◦ c
1681
+ �⋆−1�
1682
+ −1
1683
+ .
1684
+ Using Theorem 5.1,
1685
+ c ↶ (d ◦ e) = c ↶
1686
+ ��
1687
+ d
1688
+ −1 ◦ c
1689
+
1690
+
1691
+
1692
+ d
1693
+ −1 ◦ c
1694
+ �⋆−1�
1695
+ −1
1696
+ .
1697
+ Using the relations (15),
1698
+ c ↶ (d ◦ e) = c ↶
1699
+ ���
1700
+ d
1701
+ −1 ◦ c
1702
+ �⋆−1�
1703
+ −1�
1704
+ −1
1705
+ = c ↶
1706
+
1707
+ d
1708
+ −1 ◦ c
1709
+ �⋆−1 = e.
1710
+ Theorem 6.2. Given a series c ∈ Rq⟨⟨X⟩⟩ and a purely improper series d ∈ Rm
1711
+ pi ⟨⟨X′⟩⟩ (such
1712
+ that |X| = m + 1 and |X′| = q + 1), then the generating series for the closed-loop system in
1713
+ Figure 3 is given by the multiplicative dynamic feedback product cˇ@d := c ↶ (d
1714
+ −1 ◦ c)⋆−1.
1715
+ The notion that feedback can described mathematically as a transformation group acting
1716
+ on the plant is well established in control theory [Brockett(1978)]. The following theorem
1717
+ describes the situation in the present context.
1718
+ Theorem 6.3. The multiplicative dynamic feedback product is a right group action by the
1719
+ multiplicative group
1720
+
1721
+ Rm
1722
+ pi ⟨⟨X′⟩⟩,
1723
+ , ll
1724
+
1725
+ on the set Rq⟨⟨X⟩⟩, where |X| = m + 1 and |X′| =
1726
+ q + 1.
1727
+ Proof: Let c ∈ Rq⟨⟨X⟩⟩. Observe that from Theorem 6.2,
1728
+ cˇ@ ll = c ↶
1729
+
1730
+ ll
1731
+ −1 ◦ c
1732
+ �⋆−1
1733
+ = c ↶ ll = c.
1734
+ Let d1, d2 ∈ Rm
1735
+ pi ⟨⟨X′⟩⟩. It needs to be proven that
1736
+
1737
+ cˇ@d1
1738
+ � ˇ@d2 = cˇ@ (d1
1739
+ d2). From Theo-
1740
+ rem 6.2, observe that
1741
+
1742
+ cˇ@d1
1743
+ � ˇ@d2 =
1744
+
1745
+ cˇ@d1
1746
+
1747
+
1748
+
1749
+ d
1750
+ −1
1751
+ 2
1752
+
1753
+
1754
+ cˇ@d1
1755
+ ��⋆−1
1756
+ =
1757
+
1758
+ c ↶
1759
+
1760
+ d
1761
+ −1
1762
+ 1
1763
+ ◦ c
1764
+ �⋆−1�
1765
+
1766
+
1767
+ d
1768
+ −1
1769
+ 2
1770
+
1771
+
1772
+ c ↶
1773
+
1774
+ d
1775
+ −1
1776
+ 1
1777
+ ◦ c
1778
+ �⋆−1��⋆−1
1779
+ .
1780
+ Applying Theorem 5.7,
1781
+
1782
+ cˇ@d1
1783
+ � ˇ@d2 =
1784
+
1785
+ c ↶
1786
+
1787
+ d
1788
+ −1
1789
+ 1
1790
+ ◦ c
1791
+ �⋆−1�
1792
+
1793
+ ��
1794
+ d
1795
+ −1
1796
+ 2
1797
+ ◦ c
1798
+
1799
+
1800
+
1801
+ d
1802
+ −1
1803
+ 1
1804
+ ◦ c
1805
+ �⋆−1�⋆−1
1806
+ .
1807
+
1808
+ 20
1809
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
1810
+ Applying Theorem 5.9 and fact that the group inverse is anti-homomorphism with respect
1811
+ to the group product,
1812
+
1813
+ cˇ@d1
1814
+ � ˇ@d2 = c ↶
1815
+ � �
1816
+ d
1817
+ −1
1818
+ 1
1819
+ ◦ c
1820
+ �⋆−1 ⋆
1821
+ ��
1822
+ d
1823
+ −1
1824
+ 2
1825
+ ◦ c
1826
+
1827
+
1828
+
1829
+ d
1830
+ −1
1831
+ 1
1832
+ ◦ c
1833
+ �⋆−1�⋆−1 �
1834
+ = c ↶
1835
+ � ��
1836
+ d
1837
+ −1
1838
+ 2
1839
+ ◦ c
1840
+
1841
+
1842
+
1843
+ d
1844
+ −1
1845
+ 1
1846
+ ◦ c
1847
+ �⋆−1�
1848
+
1849
+
1850
+ d
1851
+ −1
1852
+ 1
1853
+ ◦ c
1854
+ � �⋆−1
1855
+ .
1856
+ Applying (12),
1857
+
1858
+ cˇ@d1
1859
+ � ˇ@d2 = c ↶
1860
+
1861
+
1862
+ d
1863
+ −1
1864
+ 1
1865
+ ◦ c
1866
+
1867
+ �� �
1868
+ d
1869
+ −1
1870
+ 2
1871
+ ◦ c
1872
+
1873
+
1874
+
1875
+ d
1876
+ −1
1877
+ 1
1878
+ ◦ c
1879
+ �⋆−1 �
1880
+
1881
+
1882
+ d
1883
+ −1
1884
+ 1
1885
+ ◦ c
1886
+
1887
+ ��⋆−1
1888
+ .
1889
+ Using Theorem 5.9,
1890
+
1891
+ cˇ@d1
1892
+ � ˇ@d2 = c ↶
1893
+
1894
+
1895
+ d
1896
+ −1
1897
+ 1
1898
+ ◦ c
1899
+
1900
+
1901
+
1902
+ d
1903
+ −1
1904
+ 2
1905
+ ◦ c
1906
+
1907
+
1908
+ ��
1909
+ d
1910
+ −1
1911
+ 1
1912
+ ◦ c
1913
+ �⋆−1 ⋆
1914
+
1915
+ d
1916
+ −1
1917
+ 1
1918
+ ◦ c
1919
+ �� ��⋆−1
1920
+ = c ↶
1921
+ ��
1922
+ d
1923
+ −1
1924
+ 1
1925
+ ◦ c
1926
+
1927
+ ��
1928
+ d
1929
+ −1
1930
+ 2
1931
+ ◦ c
1932
+
1933
+ ↶ ll
1934
+ ��⋆−1
1935
+ = c ↶
1936
+ ��
1937
+ d
1938
+ −1
1939
+ 1
1940
+ ◦ c
1941
+
1942
+
1943
+ d
1944
+ −1
1945
+ 2
1946
+ ◦ c
1947
+ ��⋆−1 .
1948
+ In light of Theorem 5.1,
1949
+
1950
+ cˇ@d1
1951
+ � ˇ@d2 = c ↶
1952
+ ��
1953
+ d
1954
+ −1
1955
+ 1
1956
+ d
1957
+ −1
1958
+ 2
1959
+
1960
+ ◦ c
1961
+ �⋆−1
1962
+ = c ↶
1963
+
1964
+ (d1
1965
+ d2)
1966
+ −1 ◦ c
1967
+ �⋆−1 .
1968
+ Therefore,
1969
+
1970
+ cˇ@d1
1971
+ � ˇ@d2 = cˇ@ (d1
1972
+ d2) .
1973
+ It is worth noting that for the additive dynamic feedback product the transformation group
1974
+ is the additive group (Rm⟨⟨X′⟩⟩, +, 0) while here (Rm
1975
+ pi ⟨⟨X′⟩⟩,
1976
+ , ll) plays the role.
1977
+ 7. Invariance of Class and Relative Degree under multiplicative dynamic
1978
+ feedback connection
1979
+ The notion of relative degree of a plant is very essential and prime in the studies of
1980
+ feedback linearization [Isidori(1995)], flatness and system inversion etc. The existence and
1981
+ quantification of relative degree of a interconnection of systems is vital in systems theory.
1982
+ The notion of class and relative degree of a SISO Chen–Fliess series is equivalently char-
1983
+ acterized by the notion of relative degree of its generating series and the definition was
1984
+ furnished in [Gray, et al.(2014b), Gray & Venkatesh(2019)] and the existence and quantifi-
1985
+ cation of relative degree of interconnected system of Chen–Fliess series was described in
1986
+ [Gray & Venkatesh(2019), Venkatesh(2021)]. In addition, this definition of relative degree is
1987
+ consistent with the classical definition whenever y = Fc[u] has an input-affine analytic state
1988
+ space realization [Gray, et al.(2014b), Gray & Ebrahimi-Fard(2017)]. Let X = {x0, x1} and
1989
+ the following definition explains the concept of a class, a weaker notion than the relative
1990
+ degree of a series in R⟨⟨X⟩⟩.
1991
+ Definition 7.1.
1992
+ [Gray & Venkatesh(2019)] A series c ∈ R⟨⟨X⟩⟩ is said to be of r-class,
1993
+ denoted by C (c) = r, if supp(cF) ⊆ xr−1
1994
+ 0
1995
+ X+ and supp(cF) ⊈ xr
1996
+ 0X+.
1997
+ By definition, let
1998
+ C (c) = ∞ if cF = 0.
1999
+ The notion of class is universal and is versed in the following theorem.
2000
+
2001
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
2002
+ 21
2003
+ Lemma 7.1. [Gray & Venkatesh(2019)] Every series c ∈ R⟨⟨X⟩⟩ has a class.
2004
+ Definition 7.1 of class is illustrated in the following example.
2005
+ Example 7.1. Let c = 1 + x0x2
2006
+ 1 + x2
2007
+ 0x1, so that cF = x0x2
2008
+ 1 + x2
2009
+ 0x1. Observe that supp(cF) ⊆
2010
+ x0X+ but supp(cF) ⊈ x2
2011
+ 0X+. Thus, C (c) = 2.
2012
+ The following lemma is essential in the proof of quantification of class for the multiplicative
2013
+ mixed composition product.
2014
+ Lemma 7.2. Let c, c′, d ∈ Rm⟨⟨X⟩⟩ such that supp (c′) ̸⊆ x0X∗. Then the following state-
2015
+ ments are true:
2016
+ (1) xk
2017
+ 0 ↶ d = xk
2018
+ 0 ∀k ∈ N0.
2019
+ (2) cN ↶ d = cN where cN is the natural part of the series c.
2020
+ (3) supp (c′ ↶ d) ̸⊆ x0X∗.
2021
+ Proof:
2022
+ (1) The proof is by induction on k ∈ N0. The base case being k = 0 is true viz ∅ ↶ d = ∅
2023
+ from (11). Assume the proposition is true for k = n − 1, then using (11)
2024
+ xn
2025
+ 0 ↶ d = x0
2026
+
2027
+ xn−1
2028
+ 0
2029
+ ↶ d
2030
+
2031
+ = x0
2032
+
2033
+ xn−1
2034
+ 0
2035
+
2036
+ = xn
2037
+ 0.
2038
+ Hence proved by induction on N0.
2039
+ (2) Observe that from Definition 2.1, supp (cN) ⊆ {xk
2040
+ 0 : k ∈ N0}. Thus, using the previ-
2041
+ ous statement (1) and Theorem 5.4 it follows that cN ↶ d = cN.
2042
+ (3) Since supp (c′) ̸⊆ x0X∗, there exists a word xiη ∈ supp (c′) where xi ̸= x0 and η ∈ X∗.
2043
+ Using (11),
2044
+ xiη ↶ d = xi (di
2045
+ (η ↶ d)) .
2046
+ Thus, supp (xiη ↶ d) ⊆ xiX∗, where xi ̸= x0. Therefore, supp (c′ ↶ d) ̸⊆ x0X∗.
2047
+ The following theorem quantifies that class is invariant under the multiplicative mixed
2048
+ composition product
2049
+ Theorem 7.1. Let c, d ∈ R⟨⟨X⟩⟩, then C (c ↶ d) = C (c).
2050
+ Proof: Suppose the series c ∈ R⟨⟨X⟩⟩ is of r-class, then the series c can be written as:
2051
+ c = cN + xr−1
2052
+ 0
2053
+ c′,
2054
+ where c′ is a proper series such that supp (c′) ̸⊆ x0X∗. Hence by Theorem 5.4,
2055
+ c ↶ d = (cN ↶ d) +
2056
+
2057
+ xr−1
2058
+ 0
2059
+ c′ ↶ d
2060
+
2061
+ .
2062
+ Using (11),
2063
+ c ↶ d = (cN ↶ d) + xr−1
2064
+ 0
2065
+ (c′ ↶ d) .
2066
+ Since supp (c′) ̸⊆ x0X∗, then by applying Lemma 7.2,
2067
+ c ↶ d = cN + xr−1
2068
+ 0
2069
+ (c′ ↶ d) ,
2070
+
2071
+ 22
2072
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
2073
+ with supp (c′ ↶ d) ̸⊆ x0X∗. Given that c′ ∈ Rp ⟨⟨X⟩⟩, whence supp (c ↶ d)F ⊆ xr−1
2074
+ 0
2075
+ X+ and
2076
+ supp (c ↶ d)F ̸⊆ xr
2077
+ 0X+. Therefore, C (c ↶ d) = r = C (c).
2078
+ Example 7.2. Consider the series c in Example 7.1, given by c = 1 + x2
2079
+ 0x1 + x0x2
2080
+ 1 and
2081
+ d = 1 + x1 ∈ R⟨⟨X⟩⟩. Using (11), the multiplicative mixed composition product of c and d
2082
+ is computed as:
2083
+ c ↶ d = 1 + x0x2
2084
+ 1 + 3x0x3
2085
+ 1 + 3x0x4
2086
+ 1 + x2
2087
+ 0x1 + x2
2088
+ 0x2
2089
+ 1.
2090
+ Observe that C (c ↶ d) = 2 = C (c), as in Example 7.1.
2091
+ The following theorem asserts that class of a series is preserved under the multiplicative
2092
+ dynamic feedback product which is one of the prime goal of this subsection.
2093
+ Theorem 7.2. If c ∈ R⟨⟨X⟩⟩ with C (c) = r, and d ∈ Rpi ⟨⟨X⟩⟩, then C
2094
+
2095
+ cˇ@d
2096
+
2097
+ = r = C (c).
2098
+ Proof: From Theorem 6.2,
2099
+ cˇ@d = c ↶
2100
+
2101
+ d
2102
+ −1 ◦ c
2103
+ �⋆−1 .
2104
+ Since C (c) = r, whence applying Theorem 7.1,
2105
+ C
2106
+
2107
+ cˇ@d
2108
+
2109
+ = C
2110
+
2111
+ c ↶
2112
+
2113
+ d
2114
+ −1 ◦ c
2115
+ �⋆−1�
2116
+ = r = C (c) .
2117
+ The preservation of class under the multiplicative dynamic feedback connections as as-
2118
+ serted in Theorem 7.2 is further illustrated in the following example.
2119
+ Example 7.3. Let c, d ∈ R⟨⟨X⟩⟩ c = x1 and d = 1 + �
2120
+ k∈N k!xk
2121
+ 1. Note that the class of
2122
+ series C (c) = 1. Using Theorem 6.2 the multiplicative feedback product is computed as:
2123
+ cˇ@d = x1 + x1x0x1 + 3x1x0x1x0x1 + 4x1x2
2124
+ 0x2
2125
+ 1 + · · · .
2126
+ Infer from Definition 7.1 that C
2127
+
2128
+ cˇ@d
2129
+
2130
+ = C (c) = 1.
2131
+ Finally, the main definition of the section details the concept of relative degree in the
2132
+ context of Chen–Fliess series which is characterized on its generating series.
2133
+ Definition 7.2.
2134
+ [Gray & Venkatesh(2019)] A series c ∈ R⟨⟨X⟩⟩ has relative degree r if
2135
+ C (c) = r and the word xr−1
2136
+ 0
2137
+ x1 ∈ supp(cF). Otherwise, c does not have relative degree.
2138
+ The following theorem asserts the quantification of relative degree under multiplicative
2139
+ mixed composition product.
2140
+ Theorem 7.3. If c ∈ R⟨⟨X⟩⟩ with relative degree rc and d ∈ R⟨⟨X⟩⟩ be non-proper, then
2141
+ c ↶ d has relative degree rc.
2142
+ Proof: From Theorem 7.1, C (c ↶ d) = rc. It remains to prove that xrc−1
2143
+ 0
2144
+ x1 ∈ supp (c ↶ d).
2145
+ Given that c ∈ R⟨⟨X⟩⟩ has relative degree rc, then c can be decomposed as:
2146
+ c = cN + λxrc−1
2147
+ 0
2148
+ x1 + xrc−1
2149
+ 0
2150
+ c′,
2151
+ where λ ̸= 0 and c′ is a proper series such that x1 ̸∈ supp (c′). Then,
2152
+ c ↶ d =
2153
+
2154
+ cN + λxrc−1
2155
+ 0
2156
+ x1 + xrc−1
2157
+ 0
2158
+ c′�
2159
+ ↶ d.
2160
+ Applying Theorem 5.4,
2161
+ c ↶ d = (cN ↶ d) + λ
2162
+
2163
+ xrc−1
2164
+ 0
2165
+ x1 ↶ d
2166
+
2167
+ +
2168
+
2169
+ xrc−1
2170
+ 0
2171
+ c′ ↶ d
2172
+
2173
+ .
2174
+
2175
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
2176
+ 23
2177
+ Using (11) and Lemma 7.2,
2178
+ c ↶ d = cN + λxrc−1
2179
+ 0
2180
+ x1d + xrc−1
2181
+ 0
2182
+ (c′ ↶ d) .
2183
+ Since d ∈ Rpi ⟨⟨X⟩⟩ −→ d = α + d′, where α ̸= 0 and d′ is a proper series. Hence,
2184
+ c ↶ d = cN + λαxrc−1
2185
+ 0
2186
+ x1 + xrc−1
2187
+ 0
2188
+ x1d′ + xrc−1
2189
+ 0
2190
+ (c′ ↶ d) .
2191
+ Observe from (11), x1 ̸∈ supp (c′) =⇒ x1 ̸∈ supp (c′ ↶ d) and also that αλ ̸= 0.
2192
+ Therefore xrc−1
2193
+ 0
2194
+ x1 ∈ supp (c ↶ d), whence the relative degree of c ↶ d is rc, when d is a
2195
+ non-proper series.
2196
+ The following example illustrates the statement from Theorem 7.3.
2197
+ Example 7.4. Let c = 1 + x2
2198
+ 0 + x0x1 + x2
2199
+ 0x1 and d = 1 + x1. Observe that by Definition 7.2,
2200
+ the relative degree of c is rc = 2 and also that d is non-proper. The multiplicative mixed
2201
+ composition product of c and d to computed as:
2202
+ c ↶ d = 1 + x2
2203
+ 0 + x0x1 + x0x2
2204
+ 1 + x2
2205
+ 0x1 + x2
2206
+ 0x2
2207
+ 1.
2208
+ Using Definition 7.2, note that the relative degree of c ↶ d is 2 = rc.
2209
+ The following theorem is the prime objective of this section stating that the relative degree
2210
+ of a series remains invariant under multiplicative dynamic feedback product.
2211
+ Theorem 7.4. If c ∈ R⟨⟨X⟩⟩ with relative degree rc and d ∈ Rpi ⟨⟨X⟩⟩, then the relative
2212
+ degree of
2213
+
2214
+ cˇ@d
2215
+
2216
+ is rc.
2217
+ Proof: Since c ∈ R⟨⟨X⟩⟩ and d ∈ Rpi ⟨⟨X⟩⟩, then by Theorem 6.2,
2218
+ cˇ@d = c ↶
2219
+
2220
+ d
2221
+ −1 ◦ c
2222
+ �⋆−1 .
2223
+ Observe that d ∈ Rpi ⟨⟨X⟩⟩ ⇔ d
2224
+ −1 ∈ Rpi ⟨⟨X⟩⟩.
2225
+ Then by Theorem 5.2 (d
2226
+ −1 ◦ c) ∈
2227
+ Rpi ⟨⟨X⟩⟩. As per Theorem 5.10, the group inverse
2228
+
2229
+ d
2230
+ −1 ◦ c
2231
+ �⋆−1 ∈ Rpi ⟨⟨X⟩⟩.
2232
+ Hence by Theorem 7.3,
2233
+ cˇ@d = c ↶
2234
+
2235
+ d
2236
+ −1 ◦ c
2237
+ �⋆−1 .
2238
+ has relative degree rc.
2239
+ The invariance of the relative degree of a Chen–Fliess series under multiplicative dynamic
2240
+ feedback connections as stated in Theorem 7.4 is illustrated through the following example.
2241
+ Example 7.5. Consider the Example 7.3 again where c = x1 and d = 1 + �
2242
+ k∈N k!xk
2243
+ 1.
2244
+ Observe that by Definition 7.2, the relative degree of c is rc = 1. The multiplicative feedback
2245
+ product is computed as:
2246
+ cˇ@d = x1 + x1x0x1 + 3x1x0x1x0x1 + 4x1x2
2247
+ 0x2
2248
+ 1 + · · ·
2249
+ Infer that the relative degree of cˇ@d = 1 = rc as stated in Theorem 7.4.
2250
+
2251
+ 24
2252
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
2253
+ 8. Computational Framework for Multiplicative Mixed Composition &
2254
+ Dynamic Feedback Product
2255
+ The goal of this section is to describe the computational framework for multiplicative
2256
+ dynamic feedback product as explained in Section 6.
2257
+ The section further illustrates the
2258
+ framework with examples but prior to that it is imperative to understand the dual bialgebra
2259
+ and Hopf algebra constructions corresponding to the multiplicative dynamic output feedback
2260
+ group.
2261
+ 8.1. Hopf Algebra Corresponding to the Multiplicative Dynamic Feedback Sub-
2262
+ group. The goal of the subsection is to construct a dual Hopf algebra reflecting the group
2263
+ structure of the multiplicative dynamic feedback subgroup M as asserted in Theorem 5.11.
2264
+ The group inverse is computed the antipode of the constructed Hopf algebra and thus pro-
2265
+ vides a computational framework to compute the multiplicative dynamic feedback group
2266
+ inverse. As a recall, the group M is defined as
2267
+ M = { ll + d : d ∈ Rm
2268
+ p ⟨⟨X⟩⟩},
2269
+ where ll = [1 · · ·1 1]T ∈ Rm. In light of Theorem 5.11, (M, ⋆) forms a subgroup of the
2270
+ multiplicative dynamic feedback group. The algebra structure is same as the algebra of H
2271
+ in Section 4.1. Let the set Wb ⊂ Rm⟨⟨X⟩⟩∗ (dual module of Rm⟨⟨X⟩⟩) be defined as the
2272
+ collection of coordinate maps defined as:
2273
+ Wb = {aη : aη(c) = (c, η) : η ∈ X∗},
2274
+ where c ∈ Rm⟨⟨X⟩⟩.
2275
+ Define W to be the free Rm-module spanned by the set Wb.
2276
+ Let
2277
+ H denote the reduced symmetric algebra generated by the module W. The unit map ξ :
2278
+ Rm −→ W is defined by ξ( ll) = a∅. Note that a∅ (c) = ll ∀c ∈ M. By construction H is
2279
+ an Rm-associative, commutative and unital algebra with addition, scalar multiplication and
2280
+ product defined, respectively, as
2281
+ (aη + aζ)(c) = aη(c) + aζ(c)
2282
+ (kaη)(c) = k(ai
2283
+ η(c))
2284
+ m(aη, aζ)(c) = aη(c)aζ(c),
2285
+ where c ∈ Rm⟨⟨X⟩⟩. Then H is given a coproduct ∆H : H −→ H � H such that for all
2286
+ c, d ∈ M: ∆Hai
2287
+ η(c, d) = ai
2288
+ η(c ⋆ d) = ((c ⋆ d)i , η) ∀η ∈ X+. The counit map ǫ : H −→ R is
2289
+ defined as
2290
+ ǫ(h) =
2291
+ � ll : h = a∅
2292
+ 0 : otherwise.
2293
+ Since ◦ is associative (from Theorem 5.8), thus by the dual the coproduct ∆H is coasso-
2294
+ ciative. Therefore, (H, m, ξ, ∆H, ǫ) forms a Rm-bialgebra. Owing to the group structure of
2295
+ (M, ◦), the bialgebra H is equipped with antipode S defined as:
2296
+ Saη (c) = aη
2297
+
2298
+ c⋆−1�
2299
+ =
2300
+
2301
+ c⋆−1, η
2302
+
2303
+ ,
2304
+ for all i = 1, 2, . . . , m and η ∈ X+. Hence H is a Rm-Hopf algebra. The computation of
2305
+ coproduct ∆H is well-understood through the right coaction of Hopf algebra H on the Hopf
2306
+ algebra H
2307
+ . Prior to that, it is imperative to understand the right coaction of Hopf algebra
2308
+ H on the non-unital algebra of coordinate functions.
2309
+
2310
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
2311
+ 25
2312
+ 8.2. Coaction of Hopf algebra H on Algebra of Coordinate Map. The subsection
2313
+ explains the coaction of the Hopf algebra H defined in Section 8.1 on the algebra of coordinate
2314
+ functions. The results in this subsection are utilized subsequently to explain the coaction of
2315
+ H on the bialgebra H
2316
+ , particularly in proofs in Section 8.3. The right coaction of the Hopf
2317
+ algebra H is on Rm-algebra of coordinate maps S+ (W) constructed in Section 4.3.
2318
+ The right coaction map ˜∆ : S+ (W) −→ S+ (W) � H is defined such that for all c ∈
2319
+ Rm⟨⟨X⟩⟩, d ∈ M and η ∈ X∗,
2320
+ ˜∆aη (c, d) = (c ↶ d, η) .
2321
+ (17)
2322
+ The map ˜∆ being a right coaction map is a reflection of Theorem 5.9. It remains to
2323
+ show how the coaction map ˜∆ is computed on S+(W), for which it is sufficient to define its
2324
+ computation on the module W. Observe that for all aη ∈ W,
2325
+ ˜∆aη =
2326
+
2327
+ ˜∆ ◦ π1 ˜∆ ◦ π2 · · · ˜∆ ◦ πm�t
2328
+ aη.
2329
+ On the dual side, the above statement infers that for all c ∈ Rm⟨⟨X⟩⟩, d ∈ M and η ∈ X∗,
2330
+ (c ↶ d, η) = [((c ↶ d)1 , η) · · · ((c ↶ d)m , η)]t .
2331
+ Hence, the notation ˜∆ai
2332
+ η := ˜∆ ◦ πiaη for all η ∈ X∗ and i = 1, 2, . . . , m. The following
2333
+ proposition provides a recursive definition to compute ˜∆ on the module V viz to compute
2334
+ the ˜∆
2335
+
2336
+ aj
2337
+ η
2338
+
2339
+ ∀η ∈ X∗ and j = 1, 2, . . . , m.
2340
+ Proposition 8.1. For all i = 1, . . . , m:
2341
+ (1) ˜∆ai
2342
+ ∅ = ai
2343
+ ∅ ⊗ ai
2344
+ ∅.
2345
+ (2) ˜∆ ◦ θ0 = (θ0 ⊗ id) ◦ ˜∆.
2346
+ (3) ˜∆ ◦ θi = (θi ⊗ m) ◦
2347
+
2348
+ ˜∆ ⊗ id
2349
+
2350
+ ◦ ρi ,
2351
+ where ρ
2352
+ is the coaction map of Hopf algebra H
2353
+ on S+ (W) as defined in Section 4.3.
2354
+ Proof: Observe that ∀c ∈ Rm⟨⟨X⟩⟩ and d ∈ M,
2355
+ c = (c, ∅) +
2356
+ m
2357
+
2358
+ j=0
2359
+ xj
2360
+
2361
+ x−1
2362
+ j
2363
+ (c)
2364
+
2365
+ .
2366
+ Hence by Theorem 5.4,
2367
+ c ↶ d = (c, ∅) + x0
2368
+
2369
+ x−1
2370
+ 0 (c) ↶ d
2371
+
2372
+ +
2373
+ m
2374
+
2375
+ j=1
2376
+ xj
2377
+
2378
+ dj
2379
+
2380
+ x−1
2381
+ j
2382
+ (c) ↶ d
2383
+ ��
2384
+ .
2385
+ (18)
2386
+ The proof for each of the statement as follows:
2387
+ (1) Let c, d ∈ Rm⟨⟨X⟩⟩. From (17) and (18),
2388
+ ˜∆ai
2389
+ ∅ (c, d) = ((c ↶ d)i , ∅)
2390
+ = (ci ↶ d, ∅) = (ci, ∅) .1 = ai
2391
+ ∅ ⊗ ai
2392
+ ∅ (c, d) .
2393
+ Therefore, ˜∆ai
2394
+ ∅ = ai
2395
+ ∅ ⊗ ai
2396
+ ∅.
2397
+
2398
+ 26
2399
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
2400
+ (2) Let c, d ∈ Rm⟨⟨X⟩⟩, η ∈ X∗ and ∀ j = 1, 2, . . . , m. Then,
2401
+
2402
+ ˜∆ ◦ θ0
2403
+
2404
+ aj
2405
+ η (c, d) =
2406
+
2407
+ (c ↶ d)j , x0η
2408
+
2409
+ =
2410
+
2411
+ x−1
2412
+ 0 (c ↶ d)j , η
2413
+
2414
+ From (18),
2415
+
2416
+ ˜∆ ◦ θ0
2417
+
2418
+ aj
2419
+ η (c, d) =
2420
+
2421
+ x−1
2422
+ 0 (cj) ↶ d, η
2423
+
2424
+ = ˜∆aj
2425
+ η
2426
+
2427
+ x−1
2428
+ 0 (c) , d
2429
+
2430
+ = (θ0 ⊗ id) ◦ ˜∆aη (c, d) .
2431
+ Therefore, ˜∆ ◦ θ0 = (θ0 ⊗ id) ◦ ˜∆.
2432
+ (3) Let c, d ∈ Rm⟨⟨X⟩⟩ and η ∈ X∗. Then ∀ i, j = 1, 2, . . . , m,
2433
+
2434
+ ˜∆ ◦ θi
2435
+
2436
+ aj
2437
+ η (c, d) =
2438
+
2439
+ (c ↶ d)j , xiη
2440
+
2441
+ =
2442
+
2443
+ x−1
2444
+ i
2445
+ (c ↶ d)j , η
2446
+
2447
+ From (18),
2448
+
2449
+ ˜∆ ◦ θi
2450
+
2451
+ aj
2452
+ η (c, d) =
2453
+
2454
+ di
2455
+ x−1
2456
+ i
2457
+ (cj) ↶ d, η
2458
+
2459
+ = ρi aj
2460
+ η
2461
+
2462
+ x−1
2463
+ i
2464
+ (c) ↶ d, d
2465
+
2466
+ = ρi aj
2467
+ η
2468
+
2469
+ x−1
2470
+ i
2471
+ (c) ↶ d
2472
+
2473
+ = ρi aj
2474
+ η
2475
+
2476
+ x−1
2477
+ i
2478
+ (c) ↶ d, d
2479
+
2480
+ =
2481
+
2482
+ ˜∆ ⊗ id
2483
+
2484
+ ◦ ρi aj
2485
+ η
2486
+
2487
+ x−1
2488
+ i
2489
+ (c) , d, d
2490
+
2491
+ = (θi ⊗ m) ◦
2492
+
2493
+ ˜∆ ⊗ id
2494
+
2495
+ ◦ ρi aj
2496
+ η (c, d) .
2497
+ Therefore, ˜∆ ◦ θi = (θi ⊗ m) ◦
2498
+
2499
+ ˜∆ ⊗ id
2500
+
2501
+ ◦ ρi
2502
+ ∀i = 1, 2, . . . , m.
2503
+ Example 8.1. A few examples of the computation of ˜∆ on V using Proposition 8.1 are
2504
+ given as follows(indices i, j, k = 1, 2, . . . , m.):
2505
+ ˜∆ai
2506
+ ∅ = ai
2507
+ ∅ ⊗ ai
2508
+ ∅.
2509
+ ˜∆ai
2510
+ x0 = ai
2511
+ x0 ⊗ ai
2512
+ ∅.
2513
+ ˜∆aj
2514
+ xi = aj
2515
+ xi ⊗ ai
2516
+ ∅.
2517
+ ˜∆ai
2518
+ x2
2519
+ 0 = ai
2520
+ x2
2521
+ 0 ⊗ ai
2522
+ ∅.
2523
+ ˜∆aj
2524
+ x0xi = aj
2525
+ x0xi ⊗ ai
2526
+ ∅.
2527
+ ˜∆aj
2528
+ xix0 =
2529
+
2530
+ aj
2531
+ xix0 ⊗ ai
2532
+
2533
+
2534
+ +
2535
+
2536
+ aj
2537
+ xi ⊗ ai
2538
+ x0
2539
+
2540
+ .
2541
+
2542
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
2543
+ 27
2544
+ ˜∆ak
2545
+ xixj =
2546
+
2547
+ ak
2548
+ xixj ⊗ aj
2549
+ ∅ai
2550
+
2551
+
2552
+ +
2553
+
2554
+ ak
2555
+ xi ⊗ ai
2556
+ xj
2557
+
2558
+ .
2559
+ The coaction map ˜∆ thus provides a framework to compute the multiplicative mixed com-
2560
+ position product and multiplicative dynamic feedback group product whenever c ∈ Rm⟨⟨X⟩⟩
2561
+ and d ∈ M ⊊ Rm⟨⟨X⟩⟩. For computing the multiplicative mixed composition product for
2562
+ c ∈ Rp⟨⟨X⟩⟩ and d ∈ M ⊊ Rm⟨⟨X⟩⟩ where p = m,
2563
+ (1) If p < m, then define ˇc ∈ Rm⟨⟨X⟩⟩ such that ˇci = ci ∀ i = 1, 2, . . . , p and ˇci = 0 ∀ i =
2564
+ p + 1, p + 2, . . . , m. Then for all η ∈ X∗,
2565
+ ((c ↶ d)i , η) = ˜∆ai
2566
+ η (ˇc, d)
2567
+ ∀i = 1, 2, . . . , p.
2568
+ Note that (ˇc ↶ d)j = 0 ∀j = p + 1, p + 2, . . . , m.
2569
+ (2) If p > m, then this can be reduced to Case 1 by performing computations component
2570
+ wise viz computing ci ↶ d for all i = 1, 2, . . . , p.
2571
+ Thus the computational framework to compute the multiplicative mixed composition prod-
2572
+ uct of c ∈ Rp⟨⟨X⟩⟩ and d ∈ M, denoted by c ↶ d for arbitrary p and m is well-defined via
2573
+ the coaction map ˜∆. The computations of the coproduct ∆H and antipode S (defined in
2574
+ Section 8.1) are well-understood once the right coaction of Hopf algebra H on Hopf algebra
2575
+ H
2576
+ .
2577
+ 8.3. Coaction of Hopf algbera H on the Hopf algebra H
2578
+ . The objective of the
2579
+ subsection is to define the right coaction map of Hopf algebra H on the unshuffle Hopf algebra
2580
+ H
2581
+ defined in Section 4.1. The right coaction is pivotal in computation of the coproduct
2582
+ and antipode of Hopf algebra H which in turn are essential to compute the multiplicative
2583
+ dynamic feedback product.
2584
+ The right coaction map of H on H
2585
+ is defined to be ˜∆H : H
2586
+ −→ H
2587
+ � H such that
2588
+ for all c, d ∈ M (the underlying sets of M and M
2589
+ are identical) and η ∈ X∗,
2590
+ ˜∆Haη (c, d) = (c ↶ d, η) .
2591
+ (19)
2592
+ Observe that the algebra of coordinate functions S+(W) and H
2593
+ are isomorphic as Rm-
2594
+ modules. Thus it is vital to understand the relationship between the operator ˜∆ operating
2595
+ on the module S+(W) and operator ˜∆H operating on H
2596
+ , which is stated in the following
2597
+ lemma.
2598
+ Lemma 8.1. If c, d ∈ M, then for all η ∈ X∗
2599
+ ˜∆Haη (c, d) = ˜∆aη (c, d) .
2600
+ Proof: If c, d ∈ M and η ∈ X+,
2601
+ ˜∆Haη (c, d) = (c ↶ d, η) = ˜∆aη (c, d) .
2602
+ Despite the statement of Lemma 8.1, it is vital to understand the difference between the
2603
+ coaction maps ˜∆ and ˜∆H.
2604
+ The coaction map ˜∆H is compatible with the Hopf algebra
2605
+ structure of H
2606
+ viz.
2607
+ m1,3,24 ◦
2608
+
2609
+ ˜∆H ⊗ ˜∆H
2610
+
2611
+ ◦ ∆
2612
+ = (∆
2613
+ ⊗ id) ◦ ˜∆H,
2614
+ ˜∆H ◦ S = (S
2615
+ ⊗ id) ◦ ˜∆H,
2616
+ where m1,3,24 = (m ⊗ m) ◦ (id ⊗ τ ⊗ id).
2617
+
2618
+ 28
2619
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
2620
+ Thus the coaction map ˜∆H makes H
2621
+ a comodule-Hopf algebra over H. Equivalently,
2622
+ the coaction map ˜∆H is a corepresentation of Hopf algebra H over unshuffle Hopf algebra
2623
+ H
2624
+ . Similar to Section 8.2, for all aη ∈ W,
2625
+ ˜∆Haη =
2626
+
2627
+ ˜∆H ◦ π1 ˜∆H ◦ π2 · · · ˜∆H ◦ πm�
2628
+ aη.
2629
+ The map to compute the ˜∆H
2630
+
2631
+ aj
2632
+ η
2633
+
2634
+ ∀η ∈ X∗ and j = 1, 2, . . . , m is g module W is stated
2635
+ in the following proposition.
2636
+ Proposition 8.2. For all i, j = 1, 2 . . . , m and η ∈ X∗:
2637
+ (1) ˜∆Hai
2638
+ ∅ = ai
2639
+ ∅ ⊗ ai
2640
+ ∅.
2641
+ (2) ˜∆H ◦ θ0aj
2642
+ η = (θ0 ⊗ id) ◦ ˜∆Haj
2643
+ η.
2644
+ (3)
2645
+
2646
+ ˜∆H ◦ θi
2647
+
2648
+ aj
2649
+ η = (θi ⊗ m) ◦
2650
+
2651
+ ˜∆H ⊗ id
2652
+
2653
+ ◦ ∆i aj
2654
+ η,
2655
+ where ∆
2656
+ is the unshuffle coproduct defined in Section 4.1.
2657
+ Proof: Observe that ∀c ∈ M,
2658
+ c = ll +
2659
+ m
2660
+
2661
+ j=0
2662
+ xj
2663
+
2664
+ x−1
2665
+ j
2666
+ (c)
2667
+
2668
+ .
2669
+ Hence by Theorem 5.4,
2670
+ c ↶ d = ll + x0
2671
+
2672
+ x−1
2673
+ 0 (c) ↶ d
2674
+
2675
+ +
2676
+ m
2677
+
2678
+ j=1
2679
+ xj
2680
+
2681
+ dj
2682
+
2683
+ x−1
2684
+ j
2685
+ (c) ↶ d
2686
+ ��
2687
+ .
2688
+ (20)
2689
+ The proof for each of the statement as follows:
2690
+ (1) Let c, d ∈ M. From (19) and (20),
2691
+ ˜∆Hai
2692
+ ∅ (c, d) = ((c ↶ d)i , ∅)
2693
+ = (ci ↶ d, ∅) = 1 = (ci, ∅)(di, ∅)
2694
+ = ai
2695
+ ∅ ⊗ ai
2696
+ ∅(c, d).
2697
+ Therefore, ˜∆Hai
2698
+ ∅ = ai
2699
+ ∅ ⊗ ai
2700
+ ∅.
2701
+ (2) Let c, d ∈ M, η ∈ X∗ and ∀ j = 1, 2, . . . , m. Then,
2702
+
2703
+ ˜∆H ◦ θ0
2704
+
2705
+ aj
2706
+ η (c, d) =
2707
+
2708
+ (c ↶ d)j , x0η
2709
+
2710
+ =
2711
+
2712
+ x−1
2713
+ 0 (c ↶ d)j , η
2714
+
2715
+ Observe that x−1
2716
+ 0 (c) may not belong to M and from (20),
2717
+
2718
+ ˜∆H ◦ θ0
2719
+
2720
+ aj
2721
+ η (c, d) =
2722
+
2723
+ x−1
2724
+ 0 (cj) ↶ d, η
2725
+
2726
+ = ˜∆aj
2727
+ η
2728
+
2729
+ x−1
2730
+ 0 (c) , d
2731
+
2732
+ = (θ0 ⊗ id) ◦ ˜∆aη (c, d) .
2733
+
2734
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
2735
+ 29
2736
+ Since η ∈ X+ and c, d ∈ M, then by Lemma 8.1
2737
+
2738
+ ˜∆H ◦ θ0
2739
+
2740
+ aj
2741
+ η (c, d) = (θ0 ⊗ id) ◦ ˜∆Haη (c, d) .
2742
+ Therefore, ˜∆H ◦ θ0 = (θ0 ⊗ id) ◦ ˜∆H.
2743
+ (3) Let c, d ∈ M and η ∈ X∗. Then ∀ i, j = 1, 2, . . . , m,
2744
+
2745
+ ˜∆H ◦ θi
2746
+
2747
+ aj
2748
+ η (c, d) =
2749
+
2750
+ (c ↶ d)j , xiη
2751
+
2752
+ =
2753
+
2754
+ x−1
2755
+ i
2756
+ (c ↶ d)j , η
2757
+
2758
+ From (20),
2759
+
2760
+ ˜∆H ◦ θi
2761
+
2762
+ aj
2763
+ η (c, d) =
2764
+
2765
+ di
2766
+ x−1
2767
+ i
2768
+ (cj) ↶ d, η
2769
+
2770
+ .
2771
+ Since x−1
2772
+ i
2773
+ (c) may not belong to group M (also M
2774
+ ),
2775
+ = ρi aj
2776
+ η
2777
+
2778
+ x−1
2779
+ i
2780
+ (c) ↶ d, d
2781
+
2782
+ = ρi aj
2783
+ η
2784
+
2785
+ x−1
2786
+ i
2787
+ (c) ↶ d
2788
+
2789
+ = ρi aj
2790
+ η
2791
+
2792
+ x−1
2793
+ i
2794
+ (c) ↶ d, d
2795
+
2796
+ =
2797
+
2798
+ ˜∆ ⊗ id
2799
+
2800
+ ◦ ρi aj
2801
+ η
2802
+
2803
+ x−1
2804
+ i
2805
+ (c) , d, d
2806
+
2807
+ = (θi ⊗ m) ◦
2808
+
2809
+ ˜∆ ⊗ id
2810
+
2811
+ ◦ ρi aj
2812
+ η (c, d) .
2813
+ Since η ∈ X+ and c, d ∈ M, then by Lemma 8.1 and Lemma 4.1,
2814
+
2815
+ ˜∆H ◦ θi
2816
+
2817
+ aj
2818
+ η (c, d) = (θi ⊗ m) ◦
2819
+
2820
+ ˜∆H ⊗ id
2821
+
2822
+ ◦ ∆i aj
2823
+ η.
2824
+ Therefore,
2825
+
2826
+ ˜∆H ◦ θi
2827
+
2828
+ = (θi ⊗ m) ◦
2829
+
2830
+ ˜∆H ⊗ id
2831
+
2832
+ ◦ ∆i
2833
+ for all i = 1, 2, . . . , m.
2834
+ 8.4. Coproduct, Antipode Computations and Grading of Hopf algebra H. The
2835
+ objective of this subsection is to define and illustrate the computation of coproduct ∆H of
2836
+ the bialgebra H. Further, a graded and connected structure is endowed with the bialgebra
2837
+ owing to which the antipode computation is possible owing to Theorem 3.1. The following
2838
+ proposition asserts the essential reason behind the definition of ˜∆H.
2839
+ Proposition 8.3. For all η ∈ X∗ and i = 1, 2, . . . , m,
2840
+ ∆Hai
2841
+ η = (id ⊗ m) ◦
2842
+
2843
+ ˜∆H ⊗ id
2844
+
2845
+ ◦ ˆ∆i ai
2846
+ η.
2847
+ Proof: Proof: Observe that for all c, d ∈ M and η ∈ X∗,
2848
+ ∆ai
2849
+ η (c, d) = ((c ⋆ d)i , η)
2850
+ ∀ i = 1, 2, . . . , m.
2851
+ Using (12),
2852
+ ∆Hai
2853
+ η (c, d) = (di
2854
+ ci ↶ d, η)
2855
+
2856
+ 30
2857
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
2858
+ = ˆ∆i ai
2859
+ η(c ↶ d, d)
2860
+ =
2861
+
2862
+ ˜∆H ⊗ id
2863
+
2864
+ ◦ ˆ∆i ai
2865
+ η (c, d, d)
2866
+ = (id ⊗ m) ◦
2867
+
2868
+ ˜∆H ⊗ id
2869
+
2870
+ ◦ ˆ∆i ai
2871
+ η (c, d) .
2872
+ Proposition 8.3 asserts that the computation of coproduct ∆H on the module W (sub-
2873
+ sequently on the algebra H) can be carried out post the computation of the operator ˜∆H
2874
+ on W. The computation of the coproduct ∆H for the some coordinate maps are given as
2875
+ follows:
2876
+ ∆Hai
2877
+ ∅ = ai
2878
+ ∅ ⊗ ai
2879
+ ∅.
2880
+ ∆Hai
2881
+ x0 =
2882
+
2883
+ ai
2884
+ x0 ⊗ ai
2885
+
2886
+
2887
+ +
2888
+
2889
+ ai
2890
+ ∅ ⊗ ai
2891
+ x0
2892
+
2893
+ .
2894
+ ∆Haj
2895
+ xi =
2896
+
2897
+ aj
2898
+ xi ⊗ ai
2899
+ ∅aj
2900
+
2901
+
2902
+ +
2903
+
2904
+ aj
2905
+ ∅ ⊗ aj
2906
+ xi
2907
+
2908
+ .
2909
+ ∆Hai
2910
+ x2
2911
+ 0 =
2912
+
2913
+ ai
2914
+ x2
2915
+ 0 ⊗ ai
2916
+
2917
+
2918
+ + 2
2919
+
2920
+ ai
2921
+ x0 ⊗ ai
2922
+ x0
2923
+
2924
+ +
2925
+
2926
+ ai
2927
+ ∅ ⊗ ai
2928
+ x2
2929
+ 0
2930
+
2931
+ .
2932
+ ∆Haj
2933
+ x0xi =
2934
+
2935
+ aj
2936
+ x0xi ⊗ aj
2937
+
2938
+
2939
+ +
2940
+
2941
+ aj
2942
+ x0 ⊗ aj
2943
+ xi
2944
+
2945
+ +
2946
+
2947
+ aj
2948
+ xi ⊗ ai
2949
+ ∅aj
2950
+ x0
2951
+
2952
+ +
2953
+
2954
+ aj
2955
+ ∅ ⊗ aj
2956
+ x0xi
2957
+
2958
+ .
2959
+ ∆Haj
2960
+ xix0 =
2961
+
2962
+ aj
2963
+ xix0 ⊗ ai
2964
+ ∅aj
2965
+
2966
+
2967
+ +
2968
+
2969
+ aj
2970
+ xi ⊗ ai
2971
+ x0aj
2972
+
2973
+
2974
+ +
2975
+
2976
+ aj
2977
+ xi ⊗ ai
2978
+ ∅aj
2979
+ x0
2980
+
2981
+ +
2982
+
2983
+ aj
2984
+ x0 ⊗ aj
2985
+ xi
2986
+
2987
+ +
2988
+
2989
+ aj
2990
+ ∅ ⊗ aj
2991
+ xix0
2992
+
2993
+ .
2994
+ ∆Hak
2995
+ xixj =
2996
+
2997
+ ak
2998
+ xixj ⊗ aj
2999
+ ∅ai
3000
+ ∅ak
3001
+
3002
+
3003
+ +
3004
+
3005
+ ak
3006
+ xi ⊗ ai
3007
+ xjak
3008
+
3009
+
3010
+ +
3011
+
3012
+ ak
3013
+ xi ⊗ ai
3014
+ ∅ak
3015
+ xj
3016
+
3017
+ +
3018
+
3019
+ ak
3020
+ xj ⊗ aj
3021
+ ∅ak
3022
+ xi
3023
+
3024
+ +
3025
+
3026
+ ak
3027
+ ∅ ⊗ ak
3028
+ xixj
3029
+
3030
+ .
3031
+ If m = 2 (two input-two output MIMO case) viz. X = {x0, x1, x2}, then from above
3032
+ computations
3033
+ ∆Hax1x2 =
3034
+
3035
+ 
3036
+
3037
+ a1
3038
+ x1x2 ⊗
3039
+
3040
+ a1
3041
+
3042
+ �2 a2
3043
+
3044
+
3045
+ +
3046
+
3047
+ a1
3048
+ x1 ⊗ a1
3049
+ x2a1
3050
+
3051
+
3052
+ +
3053
+
3054
+ a1
3055
+ x1 ⊗ a1
3056
+ ∅a1
3057
+ x2
3058
+
3059
+ +
3060
+
3061
+ a1
3062
+ x2 ⊗ a2
3063
+ ∅a1
3064
+ x1
3065
+
3066
+ +
3067
+
3068
+ a1
3069
+ ∅ ⊗ a1
3070
+ x1x2
3071
+
3072
+
3073
+ a2
3074
+ x1x2 ⊗ a1
3075
+
3076
+
3077
+ a2
3078
+
3079
+ �2�
3080
+ +
3081
+
3082
+ a2
3083
+ x1 ⊗ a1
3084
+ x2a2
3085
+
3086
+
3087
+ +
3088
+
3089
+ a2
3090
+ x1 ⊗ a1
3091
+ ∅a2
3092
+ x2
3093
+
3094
+ +
3095
+
3096
+ a2
3097
+ x2 ⊗ a2
3098
+ ∅a2
3099
+ x1
3100
+
3101
+ +
3102
+
3103
+ a2
3104
+ ∅ ⊗ a2
3105
+ x1x2
3106
+
3107
+
3108
+ 
3109
+ which can be rewritten as
3110
+ ∆Hax1x2 =
3111
+
3112
+ ax1x2 ⊗ (a1
3113
+ ∅a2
3114
+ ∅ ll)a∅
3115
+
3116
+ +
3117
+
3118
+ ax1 ⊗ (a1
3119
+ x2 ll)a∅
3120
+
3121
+ +
3122
+
3123
+ ax1 ⊗ (a1
3124
+ ∅ ll)ax2
3125
+
3126
+ +
3127
+
3128
+ ax2 ⊗ (a2
3129
+ ∅ ll)ax1
3130
+
3131
+ + (a∅ ⊗ ax1x2) ,
3132
+ where ll = [1 1]t. It is vital to observe that the term
3133
+
3134
+ ax1x2 ⊗ (a1
3135
+ ∅a2
3136
+ ∅ ll)a∅
3137
+
3138
+ is a primitive
3139
+ term of the coproduct as a1
3140
+ ∅a2
3141
+ ∅ ll ∼= ll since a∅ is the unit of H.
3142
+ The following corollary is resultant of the Proposition 8.2 to the words of the form xn
3143
+ 0 for
3144
+ all n ≥ 0.
3145
+ Corollary 8.1. If n ∈ N0, then for all i = 1, 2, . . . , m (defining x0
3146
+ 0 := ∅):
3147
+ ˜∆Hai
3148
+ xn
3149
+ 0 = ai
3150
+ xn
3151
+ 0 ⊗ ai
3152
+ ∅.
3153
+ ∆Hai
3154
+ xn
3155
+ 0 =
3156
+ n
3157
+
3158
+ k=0
3159
+ �n
3160
+ k
3161
+
3162
+ ai
3163
+ xk
3164
+ 0 ⊗ ai
3165
+ ∅ai
3166
+ xn−k
3167
+ 0
3168
+ .
3169
+ Proof: The proof is by induction on n ∈ N0. The base case (n = 0) :
3170
+ ˜∆Hai
3171
+ ∅ = ai
3172
+ ∅ ⊗ ai
3173
+ ∅,
3174
+
3175
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
3176
+ 31
3177
+ is proved in Proposition 8.1. Assume the statement is true for n = k, then
3178
+ ˜∆ai
3179
+ xk+1
3180
+ 0
3181
+ =
3182
+
3183
+ ˜∆ ◦ θ0
3184
+
3185
+ ai
3186
+ xk
3187
+ 0.
3188
+ Using Proposition 8.1,
3189
+ ˜∆ai
3190
+ xk+1
3191
+ 0
3192
+ = (θ0 ⊗ id) ◦ ˜∆ai
3193
+ xk
3194
+ 0
3195
+ = (θ0 ⊗ id) {ai
3196
+ xk
3197
+ 0 ⊗ ai
3198
+ ∅}
3199
+ = ai
3200
+ xk+1
3201
+ 0
3202
+ ⊗ ai
3203
+ ∅.
3204
+ Hence proved by induction on n ∈ N0 that: ˜∆ai
3205
+ xn
3206
+ 0 = ai
3207
+ xn
3208
+ 0 ⊗1. Observe that from Proposition ??
3209
+ ∆ai
3210
+ xn
3211
+ 0 = (id ⊗ m) ◦
3212
+
3213
+ ˜∆ ⊗ id
3214
+
3215
+ ◦ ∆i ai
3216
+ xn
3217
+ 0 .
3218
+ Using Corollary 4.1,
3219
+ ∆ai
3220
+ xn
3221
+ 0 = (id ⊗ m) ◦
3222
+
3223
+ ˜∆ ⊗ id
3224
+ � � n
3225
+
3226
+ k=0
3227
+ �n
3228
+ k
3229
+
3230
+ ai
3231
+ xk
3232
+ 0 ⊗ ai
3233
+ xn−k
3234
+ 0
3235
+
3236
+ = (id ⊗ m)
3237
+ � n
3238
+
3239
+ k=0
3240
+ �n
3241
+ k
3242
+
3243
+ ˜∆ai
3244
+ xk
3245
+ 0 ⊗ ai
3246
+ xn−k
3247
+ 0
3248
+
3249
+ = (id ⊗ m)
3250
+ � n
3251
+
3252
+ k=0
3253
+ �n
3254
+ k
3255
+
3256
+ ai
3257
+ xk
3258
+ 0 ⊗ ai
3259
+ ∅ ⊗ ai
3260
+ xn−k
3261
+ 0
3262
+
3263
+ =
3264
+ n
3265
+
3266
+ k=0
3267
+ �n
3268
+ k
3269
+
3270
+ ai
3271
+ xk
3272
+ 0 ⊗ ai
3273
+ ∅ai
3274
+ xn−k
3275
+ 0
3276
+ .
3277
+ Proposition 8.3 asserted that the calculation of coproduct ∆H is carried out post the
3278
+ computation of ˜∆H. However the converse is also true viz. the computation of ˜∆H can be
3279
+ carried out if the evaluation fo the coproduct ∆H is known a priori which is well-asserted in
3280
+ the following proposition.
3281
+ Proposition 8.4. For all η ∈ X+ and for all i = 1, 2, . . . , m,
3282
+ ˜∆Hai
3283
+ η (c, d) = (id ⊗ m) ◦ (∆H ⊗ S
3284
+ ) ◦ ˆ∆i ai
3285
+ η.
3286
+ Proof: Given c, d ∈ M, by Theorem (12)
3287
+ (c ⋆ d) = (d
3288
+ (c ↶ d)) .
3289
+ Observe that d ∈ M implies that d is shuffle invertible. Thus for any η ∈ X+,
3290
+ ((c ↶ d)i , η) =
3291
+
3292
+ d
3293
+ −1
3294
+ i
3295
+ (c ⋆ d)i , η
3296
+
3297
+ ,
3298
+ for all i = 1, 2, . . . , m. Hence,
3299
+ ((c ↶ d)i , η) = ˜∆Hai
3300
+ η (c, d)
3301
+ = ˆ∆i ai
3302
+ η
3303
+
3304
+ c ⋆ d, d
3305
+ −1�
3306
+ .
3307
+ = (∆H ⊗ S
3308
+ ) ◦ ˆ∆i ai
3309
+ η (c, d, d) .
3310
+ = (id ⊗ m) ◦ (∆H ⊗ S
3311
+ ) ◦ ˆ∆i ai
3312
+ η (c, d) .
3313
+
3314
+ 32
3315
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
3316
+ The key point of the Proposition 8.4 is the shuffle-invertibility of a series c ∈ M
3317
+ The goal of this subsection is to provide a graded structure on the R-module W and
3318
+ consequently on the underlying R-module structure of the Hopf algebra H such that H is
3319
+ connected and the homogeneous components of H are finite-dimensional.
3320
+ Definition 8.1. Given a word η ∈ X+, denote the degree of the word as deg (η) and define
3321
+ deg (η) = |η| and for all k ≥ 1:
3322
+ Xk := {aη : deg (η) = k}.
3323
+ (1) Define gradation on the R-module W viz.
3324
+ W =
3325
+
3326
+ k≥1
3327
+ Wk,
3328
+ where Wk is the free R-module spanned by Xk.
3329
+ (2) The gradation on the module W induces a graded structure on the algebra H as
3330
+ H =
3331
+
3332
+ n∈N0
3333
+ Hn,
3334
+ with H0 ∼= R in the category of R-modules.
3335
+ The following lemma aids in proving that the gradation in Definition 8.1 makes the Hopf
3336
+ algebra H is well-defined.
3337
+ Lemma 8.2. If η ∈ X∗ such that deg (η) = n then
3338
+ ˜∆H (aη) ∈
3339
+
3340
+ i+j=n
3341
+ Wi ⊗ Hj,
3342
+ for all k = 1, 2, . . . , m.
3343
+ Proof: The following observations will help in proving the lemma.
3344
+ (1) The map {θi}m
3345
+ i=0 is a homogeneous operator of degree 1 on the module W. If deg (η) =
3346
+ |η| = n for some η ∈ X∗, then |xiη| = n + 1 for all i = 0, 1, . . . , m. Hence,
3347
+ θi : Wn −→ Wn+1
3348
+ for all i = 0, 1, . . . , m and n ≥ 1.
3349
+ (2) Observe that if η, ζ, γ ∈ X∗ such that |γ| = n and γ ∈ supp (η
3350
+ ζ) then |γ| = n =
3351
+ |ζ|+|η|. Thus, the reduced coproduct ˆ∆
3352
+ : W −→ W ⊗W is homogeneous operator
3353
+ of degree 0 viz.
3354
+ ˆ∆
3355
+ : Wn −→ (W ⊗ W)n .
3356
+ Let us prove the statement ot the lemma by induction on degree (equivalently length) n
3357
+ of the word η ∈ X∗. The base case is n = 0 ⇔ η = ∅. From Proposition 8.2,
3358
+ ˜∆Ha∅ = a∅ ⊗ a∅
3359
+ ∈ W0 ⊗ H0,
3360
+ Thus the statement holds true for the base case. Assume that the statement of theorem
3361
+ holds true for all η ∈ X∗ such that deg (η) ≤ k. Let η′ such that deg (η′) = k + 1. Then two
3362
+ cases can occur.
3363
+ (1) Let η′ = x0η where |η| = k. Then
3364
+ ˜∆Haη′ = ˜∆H ◦ θ0aj
3365
+ η.
3366
+
3367
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
3368
+ 33
3369
+ By Proposition 8.2,
3370
+ ˜∆Haη′ = (θ0 ⊗ id) ◦ ˜∆Haη.
3371
+ Since aη ∈ Wk, then by the induction hypothesis ˜∆H (aη) ⊆ �
3372
+ i+j=k Wi ⊗ Hj. Then,
3373
+ (θ0 ⊗ id)
3374
+ � �
3375
+ i+j=k
3376
+ Wi ⊗ Hj
3377
+
3378
+
3379
+
3380
+ i+j=k
3381
+ Wi+1 ⊗ Hj
3382
+
3383
+
3384
+ i+j=k+1
3385
+ Wi ⊗ Hj.
3386
+ Thus, ˜∆Haη′ ∈ �
3387
+ i+j=k+1 Wi ⊗ Hj where |η′| = k + 1.
3388
+ (2) Let η′ = xiη where |η| = k and xi ̸= x0. Then from Proposition 8.2,
3389
+
3390
+ ˜∆H ◦ πj
3391
+
3392
+ aη′ = (θi ⊗ m) ◦
3393
+
3394
+ ˜∆H ⊗ id
3395
+
3396
+ ◦ (πj ⊗ πi) ◦ ˜∆
3397
+ aη.
3398
+ = (θi ⊗ m) ◦
3399
+
3400
+ ( ˜∆H ◦ πj) ⊗ πi
3401
+
3402
+ ◦ ˜∆
3403
+
3404
+ Thus,
3405
+ ˜∆Haη′ = (θi ⊗ m) ◦
3406
+
3407
+ ˜∆H ⊗ ll.πi
3408
+
3409
+ ˜∆
3410
+ aη,
3411
+ where ll.πi = [πi πi · · · πi]t. Since deg(η) = k,
3412
+ ˜∆
3413
+ aη ⊆ (W ⊗ W)k.
3414
+ Note that ll.πi(aη)(c) = [ai
3415
+ η ai
3416
+ η · · · ai
3417
+ η](c) = aη[ci ci · · · ci]. Thus ll.πiaη ∈ W and then
3418
+ applying the induction hypothesis ˜∆HWn ⊆ (W ⊗ H)n for n ≤ k,
3419
+
3420
+ ˜∆H ⊗ ll.πi
3421
+
3422
+ (W ⊗ W)k ⊆ (W ⊗ H ⊗ W)k .
3423
+ Finally,
3424
+ (θi ⊗ m) (W ⊗ H ⊗ W)k ⊆ (W ⊗ H)k+1,
3425
+ as θi is homogeneous operator of degree 1. Thus, ˜∆Haη′ ∈ �
3426
+ i+j=k+1 Wi ⊗ Hj where
3427
+ |η′| = k + 1.
3428
+ Hence proved by induction that for all n ≥ 0: ˜∆H (aη) ∈ �
3429
+ i+j=n Wi ⊗ Hj where |η| = n.
3430
+ The following proposition asserts that the grading on H in Definition 8.1 is compatible
3431
+ with bialgebraic structure of H.
3432
+ Proposition 8.5. With the grading on the Hopf algebra H as in Definition 8.1,
3433
+ ∆H (Hn) ⊆
3434
+
3435
+ i+j=n
3436
+ Hi ⊗ Hj
3437
+ for all n ≥ 0.
3438
+ Proof: Observe that the statement is true for n = 0. Prior to the proving the statement for
3439
+ n ≥ 1, the following statement needs to be proved:
3440
+ ∆H (Wn) ⊆
3441
+
3442
+ i+j=n
3443
+ Wi ⊗ Hj
3444
+ ∀ n ≥ 0.
3445
+
3446
+ 34
3447
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
3448
+ Observe that from Proposition 8.2,
3449
+ ∆H ◦ πi = (id ⊗ m) ◦
3450
+
3451
+ ˜∆H ⊗ id
3452
+
3453
+ ◦ (πi ⊗ πi) ◦ ˜∆
3454
+ .
3455
+ Thus (by grouping them along the coordinate i),
3456
+ ∆H = (id ⊗ m) ◦
3457
+
3458
+ ˜∆ ◦ id
3459
+
3460
+ ◦ ˜∆
3461
+ .
3462
+ Hence,
3463
+ ∆H(Wn) = (id ⊗ m) ◦
3464
+
3465
+ ˜∆ ◦ id
3466
+
3467
+ ◦ ˜∆
3468
+ (Wn)
3469
+ ⊆ (id ⊗ m) ◦
3470
+
3471
+ ˜∆ ◦ id
3472
+
3473
+ (W ⊗ W)n.
3474
+ Using Proposition 8.2,
3475
+ ∆H(Wn) ⊆ (id ⊗ m) (W ⊗ H ⊗ W)n
3476
+ ⊆ (W ⊗ H)n.
3477
+ Therefore, the intermediate statement holds true viz.
3478
+ ∆H (Wn) ⊆
3479
+
3480
+ i+j=n
3481
+ Wi ⊗ Hj
3482
+ ∀ n ≥ 0.
3483
+ The statement of the theorem then holds true as ∆ is an Rn-algebra morphism from H to
3484
+ H ⊗ H.
3485
+ Thus Proposition 8.5 asserts that the grading defined on the Hopf algebra H in Defini-
3486
+ tion 8.1 is well-defined and connected. The homogeneous components are finite-dimensional
3487
+ and dimensions respect the Proposition 4.2 since the bialgebras H and H
3488
+ are isomorphic
3489
+ with respect to the underlying graded algebraic structures.
3490
+ The following example is rework of the Example 4.10 in [Gray & Ebrahimi-Fard(2017)]
3491
+ acting as a check for the computation of feedback group inverse in one-dimensional case.
3492
+ Example 8.2. Let c = 1−x1 ∈ R⟨⟨X⟩⟩. The series c◦−1 = 1+· · ·+· · · . Using the recursive
3493
+ computation formula for antipode as in Theorem 3.1
3494
+ ax1(c◦−1) = Sax1 (c) = −ax1(c) = 1.
3495
+ Observe that
3496
+ ∆′
3497
+ Hax2
3498
+ 1 = 3ax1 ⊗ ax1.
3499
+ Thus,
3500
+ ax2
3501
+ 1
3502
+
3503
+ c◦−1�
3504
+ = Sax2
3505
+ 1 (c)
3506
+ = −ax2
3507
+ 1 − 3ax1.Sax1 = −ax2
3508
+ 1 + 3a2
3509
+ x1.
3510
+ Therefore, ax2
3511
+ 1 (c◦−1) = 0 + 3(1)2 = 3. In similar fashion the reduced coproduct of a3
3512
+ x1 is
3513
+ ∆′
3514
+ Hax3
3515
+ 1 = 4ax1 ⊗ ax2
3516
+ 1 + 6ax2
3517
+ 1 ⊗ ax1 + 3ax1 ⊗ a2
3518
+ x1.
3519
+ Thus,
3520
+ ax3
3521
+ 1
3522
+
3523
+ c◦−1�
3524
+ =
3525
+
3526
+ −ax3
3527
+ 1 − 4ax1.Sax2
3528
+ 1 − 6ax2
3529
+ 1.Sax1 − 3ax1. (Sax1)2�
3530
+ (c)
3531
+ = 0 − 4(−1)(3) − 6(0)(−1) − 3(−1)(1)2 = 15.
3532
+ Therefore c◦−1 = 1 + x1 + 3x2
3533
+ 1 + 15x3
3534
+ 1 + 105x4
3535
+ 1 + · · · .
3536
+ The result matches exactly with that of Example 4.10 in [Gray & Ebrahimi-Fard(2017)].
3537
+
3538
+ FORMAL SERIES APPROACH TO MULTIPLICATIVE DYNAMIC FEEDBACK CONNECTION
3539
+ 35
3540
+ 9. Conclusions and Future work
3541
+ It was shown that the closed-loop system of a plant in Chen–Fliess series description
3542
+ in multiplicative output feedback with another system, given by Chen–Fliess series, has a
3543
+ Chen–Fliess series representation. An explicit expression of the closed-loop generating series
3544
+ was derived and the multiplicative dynamic feedback connection has a natural interpretation
3545
+ as a transformation group acting on the plant. A computational framework has been devised
3546
+ utilizing the dual Hopf algebras corresponding to the shuffle group and multiplicative output
3547
+ dynamic feedback group. Future work will be to address the solemn problem regarding the
3548
+ local convergence of the both multiplicative dynamic and static output feedback connections
3549
+ and to identify both the multiplicative dynamic and static feedback invariants.
3550
+ References
3551
+ [Abe(2004)] Abe, E., Hopf Algebras, Cambridge University Press, Cambridge, UK, 2004.
3552
+ Abramowitz, M. and Stegun, I. A, Handbook of Mathematical Functions with Formulas, Graphs, and
3553
+ Mathematical Tables, Dover Publications, New York, 1970.
3554
+ [Berstel & Reutenauer(1988)] Berstel, J. and Reutenauer, C., Rational Series and Their Languages,
3555
+ Springer-Verlag, Berlin, 1988.
3556
+ [Brockett(1978)] Brockett, R. W., Feedback Invariants for Nonlinear Systems, IFAC Proceedings Volumes,
3557
+ 11 (1978) 1115–1120.
3558
+ [Duffaut Espinosa, et al.(2016)] Duffaut Espinosa, L. A., Ebrahimi-Fard, K. and Gray, W. S., A Combina-
3559
+ torial Hopf Algebra for Nonlinear Output Feedback Control Systems, Journal of Algebra, 453 (2016)
3560
+ 609–643.
3561
+ [Duffaut Espinosa & Gray(2017)] Duffaut Espinosa, L. A. and Gray, W. S., Integration of Output Tracking
3562
+ and Trajectory Generation via Analytic Left Inversion, Proc. 21st Int. Conf. on System Theory, Control
3563
+ and Computing, Sinaia, Romania, 2017, pp. 802–807.
3564
+ [Ferfera(1979)] Ferfera, A., Combinatoire du Mono¨ıde Libre Appliqu´ee `a la Composition et aux Variations de
3565
+ Certaines Fonctionnelles Issues de la Th´eorie des Syst`emes, Ph.D. Dissertation, University of Bordeaux
3566
+ I, 1979.
3567
+ [Ferfera(1980)] Ferfera, A., Combinatoire du Mono¨ıde Libre et Composition de Certains Syst`emes Non
3568
+ Lin´eaires, Ast´erisque, 75-76 (1980) 87–93.
3569
+ [Fliess(1981)] Fliess, M., Fonctionnelles Causales Non Lin´eaires et Ind´etermin´ees Non Commutatives, Bul-
3570
+ letin de la Soci´et´e Math´ematique de France, 109 (1981) 3–40.
3571
+ [Fliess(1983)] Fliess, M., R´ealisation Locale des Syst`emes Non Lin´eaires, Alg`ebres de Lie Filtr´ees Transitives
3572
+ et S´eries G´en´eratrices Non Commutatives, Inventiones Mathematicae, 71 (1983) 521–537.
3573
+ [Foissy(2015)] Foissy, L., The Hopf Algebra of Fliess Operators and Its Dual Pre-Lie Algebra, Communica-
3574
+ tions in Algebra, 43 (2015) 4528–4552.
3575
+ [Gray, et al.(2014a)] Gray, W. S., Duffaut Espinosa, L. A., and Ebrahimi-Fard, K., Fa`a di Bruno Hopf
3576
+ Algebra of the Output Feedback Group for Multivariable Fliess Operators, Systems & Control Letters,
3577
+ 74 (2014) 64–73.
3578
+ [Gray, et al.(2014b)] Gray, W. S., Duffaut Espinosa, L. A., and Thitsa, M., Left Inversion of Analytic Non-
3579
+ linear SISO Systems via Formal Power Series Methods, Automatica, 50 (2014) 2381–2388.
3580
+ [Gray & Ebrahimi-Fard(2017)] Gray, W. S. and Ebrahimi-Fard, K., SISO Output Affine Feedback Trans-
3581
+ formation Group and Its Fa`a di Bruno Hopf Algebra, SIAM Journal on Control and Optimization, 55
3582
+ (2017) 885–912.
3583
+ [Gray & Li(2005)] Gray, W. S. and Li, Y., Generating Series for Interconnected Analytic Nonlinear Systems,
3584
+ SIAM Journal on Control and Optimization, 44 (2005) 646–672.
3585
+ [Gray & Venkatesh(2019)] Gray, W. S. and Venkatesh, G. S., Relative Degree of Interconnected SISO Non-
3586
+ linear Control Systems, Systems & Control Letters, 124 (2019) 99–105.
3587
+ [Gray & Wang(2002)] Gray, W. S. and Wang, Y., Fliess Operators on Lp spaces: Convergence and Conti-
3588
+ nuity, Systems & Control Letters, 46 (2002) 67–74.
3589
+ [Isidori(1995)] Isidori, A., Nonlinear Control Systems, 3rd Ed., Springer-Verlag, London, 1995.
3590
+ [OEIS(2022)] OEIS Foundation Inc., The On-Line Encyclopedia of Integer Sequences, published electroni-
3591
+ cally at http://oeis.org, 2022.
3592
+
3593
+ 36
3594
+ VENKATESH G. S. AND KURUSCH EBRAHIMI-FARD
3595
+ [Ree(1958)] Ree, R., Lie Elements and an Algebra Associated with Shuffles, Annals of Mathematics (2), 68
3596
+ (1958) 210–220.
3597
+ [Sweedler(1969)] Sweedler, M. E., Hopf Algebras, Benjamin Inc., New York, 1969.
3598
+ [Thitsa & Gray(2012)] Thitsa, M. and Gray, W. S., On the Radius of Convergence of Interconnected Analytic
3599
+ Nonlinear Input-Output Systems, SIAM Journal on Control and Optimization, 50 (2012) 2786–2813.
3600
+ [Venkatesh(2021)] Venkatesh, G. S., Wiener-Fliess Composition of Formal Power Series: Additive Static
3601
+ Feedback and Shuffle Rational Series, Ph.D. Dissertation, Old Dominion University, 2021.
3602
+ [Venkatesh & Gray(2022)] Venkatesh
3603
+ G.
3604
+ S.,
3605
+ Gray,
3606
+ W.
3607
+ S.,
3608
+ Formal
3609
+ Power
3610
+ Series
3611
+ Approach
3612
+ to
3613
+ Nonlinear
3614
+ Systems
3615
+ with
3616
+ Additive
3617
+ Static
3618
+ Feedback,
3619
+ International
3620
+ Journal
3621
+ of
3622
+ Control,
3623
+ https://doi.org/10.1080/00207179.2022.2059013 (appeared online).
3624
+ [Venkatesh & Gray(2021)] Venkatesh G. S., Gray, W. S., Formal Power Series Approach to Nonlinear Sys-
3625
+ tems with Static Output Feedback, Proc. 24th Int. Symp. on Mathematical Theory of Networks and
3626
+ Systems, Cambridge, UK, 2021, pp. 192–198.
3627
+ [Venkatesh & Gray (2020)] Venkatesh G. S. and Gray, W. S., Shuffle-Rational Series: Recognizability and
3628
+ Realizations, Proc. 24th Int. Conf. on System Theory, Control and Computing, Sinaia, Romania, 2020,
3629
+ pp. 404–411.
3630
+ [Winter-Arboleda(2019)] Winter-Arboleda, I. M., On Analytic Nonlinear Input-output Systems: Expanded
3631
+ Global Convergence and System Interconnections, Ph.D. Dissertation, Old Dominion University, 2019.
3632
+ [Winter-Arboleda, et al.(2015)] Winter-Arboleda, I. M., Gray, W. S. and Duffaut Espinosa, L. A., Frac-
3633
+ tional Fliess Operators: Two Approaches, Proc. 49th Conference on Information Sciences and Systems,
3634
+ Baltimore, MD, 2015, pp. 1–6
3635
+ Department of Mathematical Sciences, Norwegian University of Science and Technology
3636
+ (NTNU), 7491 Trondheim, Norway
3637
+ Email address: subbarao.v.guggilam@ntnu.no
3638
+ Department of Mathematical Sciences, Norwegian University of Science and Technology
3639
+ (NTNU), 7491 Trondheim, Norway
3640
+ Email address: kurusch.ebrahimi-fard@ntnu.no
3641
+ URL: https://folk.ntnu.no/kurusche/
3642
+
VtE4T4oBgHgl3EQfMgzk/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
X9AyT4oBgHgl3EQfWfd0/content/tmp_files/2301.00164v1.pdf.txt ADDED
@@ -0,0 +1,2493 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00164v1 [eess.SP] 31 Dec 2022
2
+ 1
3
+ Design of a Multi-User Wireless Powered
4
+ Communication System Employing Either
5
+ Active IRS or AF Relay
6
+ Omid Rezaei, Maryam Masjedi, Ali Kanaani, Mohammad Mahdi Naghsh∗,
7
+ Saeed Gazor, and Mohammad Mahdi Nayebi
8
+ Abstract
9
+ In this paper, we optimize a Wireless Powered Communication (WPC) system including multiple
10
+ pair of users, where transmitters employ single-antenna to transmit their information and power to their
11
+ receivers with the help of one multiple-antennas Amplify-and-Forward (AF) relay or an active Intelligent
12
+ Reflecting Surface (IRS). We propose a joint Time Switching (TS) scheme in which transmitters,
13
+ receivers, and the relay/IRS are either in their energy or information transmission/reception modes.
14
+ The transmitted multi-carrier unmodulated and modulated waveforms are used for Energy Harvesting
15
+ (EH) and Information Decoding (ID) modes, respectively. In order to design an optimal fair system, we
16
+ maximize the minimum rate of all pairs for both relay and IRS systems through a unified framework.
17
+ This framework allows us to simultaneously design energy waveforms, find optimal relay/IRS amplifi-
18
+ cation/reflection matrices, allocate powers for information waveforms, and allocate time durations for
19
+ various phases. In addition, we take into account the non-linearity of the EH circuits in our problem. This
20
+ problem turns out to be non-convex. Thus, we propose an iterative algorithm by using the Minorization-
21
+ Maximization (MM) technique, which quickly converges to the optimal solution. Numerical examples
22
+ show that the proposed method improves the performance of the multi-pair WPC relay/IRS system
23
+ under various setups.
24
+ O. Rezaei and M. M. Nayebi are with the Department of Electrical Engineering, Sharif University of Technology, Tehran,
25
+ 11155-4363, Iran. M. Masjedi, A. Kanaani, and M. M. Naghsh are with the Department of Electrical and Computer Engineering,
26
+ Isfahan University of Technology, Isfahan, 84156-83111, Iran. S. Gazor is with the Department of Electrical and Computer
27
+ Engineering, Queen’s University, Kingston, Ontario, K7L 3N6, Canada.
28
+ ∗Please address all the correspondence to M. M. Naghsh, Phone: (+98) 31-33912450; Fax: (+98) 31-33912451; Email:
29
+ mm naghsh@cc.iut.ac.ir
30
+ January 3, 2023
31
+ DRAFT
32
+
33
+ 2
34
+ Index Terms
35
+ Fair Throughput Maximization, Intelligent Reflecting Surface (IRS), Minorization-Maximization
36
+ (MM), Relay Networks, Wireless Powered Communication (WPC).
37
+ I. INTRODUCTION
38
+ Wireless Power Transfer (WPT) technology is introduced to extend the lifetime of devices
39
+ in wireless networks in which the energy is emitted from the dedicated power sources to the
40
+ devices [1]. Interestingly, WPT enables Simultaneous Wireless Information and Power Transfer
41
+ (SWIPT) [2], where devices not only receive and decode information, but also harvest the
42
+ energy from Radio Frequency (RF) signals. The Time Switching (TS) and Power Splitting
43
+ (PS) schemes are two well-known implementing protocols of SWIPT [3]. Recently, SWIPT
44
+ models are designed to employ relays to further enhance the coverage and spectral efficiency
45
+ of wireless networks [4]–[6]. In [4], a Multiple-Input Multiple-Output (MIMO) two-way relay
46
+ system is introduced in which two transceivers exchange their information through a relay. The
47
+ authors in [5] designed the relay and source precoders by minimizing the bit error rate at the
48
+ destination for a full-duplex MIMO relay system and SWIPT-enabled users. A similar system
49
+ with a half-duplex two-way relay is designed in [6] by minimizing the mean square error at the
50
+ destination.
51
+ Another impactful technology that is currently emerging is to use of the Intelligent Reflecting
52
+ Surface (IRS) in wireless communication systems. This promising solution not only is capable
53
+ of improving energy delivery but also can enhance the spectral efficiency of future wireless
54
+ communication networks. [7]. An IRS is an array of large number of Reflecting Elements (REs)
55
+ designed to have controllable electromagnetic properties. Each RE introduces a phase shift on
56
+ the impinging signal, allowing beamforming/manipulation of the reflection waveforms. Precisely,
57
+ the IRS matrix allows controlling the reflected signal (amplify, attenuated, steer in the desired
58
+ direction, and so on) toward optimal desired directions by purposefully designing the phase
59
+ shift matrix. The IRS is exploited recently in SWIPT systems in [8]–[11]. The weighted sum
60
+ harvested power maximization problem was studied in [8] for an IRS-aided SWIPT model in
61
+ which a multiple-antennas access point serves multiple single-antenna users. In [9], the model
62
+ in [8] is extended for a more practical multi-objective optimization problem by taking into
63
+ account the trade-off between sum rate and sum harvested power maximization. In [10], the
64
+ total transmission power is minimized for a Multiple-Input Single-Output (MISO) SWIPT system
65
+ January 3, 2023
66
+ DRAFT
67
+
68
+ 3
69
+ employing multiple IRSs. In [11], the MISO SWIPT in [8]–[10] is extended to the MIMO case,
70
+ and the weighted sum rate is maximized in an IRS-assisted system.
71
+ The design of the energy waveform remarkably affects the performance of WPT-based systems.
72
+ Indeed, an efficient waveform leads to significant improvement in the efficacy of power delivery.
73
+ Experiments reveal that signals with high Peak to Average Power Ratio (PAPR) such as multi-
74
+ sine signals provide more DC power at Energy Harvesting (EH) circuits than constant envelope
75
+ signals with the same average RF power [12]. Based on this interesting observation, a multi-sine
76
+ waveform design for WPT has been examined in several works [13]–[21]. Waveform design
77
+ with a non-linear EH model was considered in [13] and [14] for MISO and Single-Input Single-
78
+ Output (SISO) systems, respectively. The authors of [15] proposed a low-complexity method for
79
+ a waveform design in a SISO WPT system. In [16], the transmit waveform was designed based
80
+ on limited Channel State Information (CSI) feedback WPT system. Then, the authors in [17]
81
+ studied waveform design for an IRS-aided SWIPT MISO system. The aforementioned methods
82
+ for design of single-user systems were extended to the multi-user case in [18]. Also, a waveform
83
+ design was performed in [19] for wireless powered backscatter communication networks, and this
84
+ work was extended to multi-user backscatter systems in [20]. The authors of [21] investigated
85
+ the waveform and transceiver design problem in a MISO SWIPT system and determined the
86
+ multi-sine waveforms for Information Decoding (ID) and EH phases.
87
+ In this paper, we optimize a multi-user wireless powered relay/IRS system using a multi-sine
88
+ waveform with the following main contributions:
89
+ • Relay model: To the best of our knowledge, a multi-sine waveform design for multiple
90
+ user pairs in a wireless powered relay system has not been addressed in the literature. In
91
+ this paper, we consider a multi-carrier Wireless Powered Communication (WPC) system
92
+ for multi-user relay channels. Precisely, in our proposed model, an amplify-and-forward
93
+ (AF) relay provides energy/information transmission from K transmitters to their receivers
94
+ by adopting the TS scheme in all nodes1. Herein, the aim is to design the multi-carrier
95
+ unmodulated energy waveforms and the allocated power for information waveforms at the
96
+ transmitters, the amplification matrices in a relay, and the time durations for the EH and ID
97
+ modes in order to maximize the minimum rate of the user pairs. In addition, we consider
98
+ 1Note that the system in [22], where a TS scheme is only applied for a receiver, is considered as a special case of the proposed
99
+ joint TS scheme.
100
+ January 3, 2023
101
+ DRAFT
102
+
103
+ 4
104
+ the effect of the non-linearity of EH circuits in the design problem.
105
+ • IRS model: In the case of IRS-assisted communication, multi-pair WPC has not been
106
+ considered in the literature, and therefore, herein, we consider this type of IRS-assisted
107
+ systems. Precisely, in this case, an active IRS2 replaced with the AF relay in the proposed
108
+ system model mentioned in the above paragraph. Also, some comparisons are made between
109
+ relay and IRS models in terms of architecture and performance (see Remark 1-2).
110
+ • Unified consideration of relay and IRS: Both proposed AF relay and active IRS-aided
111
+ systems are modeled under a unified formulation, and we handle the resulting optimization
112
+ problems under a unified mathematical umbrella. We show that the problem is non-convex
113
+ and consequently, is hard to solve. To deal with this problem, we devise a method based on
114
+ the Minorization-Maximization (MM) technique. Interestingly, the proposed algorithm can
115
+ deal with relay and IRS systems by switching between Kronecker and Hadamard products
116
+ for parameters used in the algorithm (see Lemma 2).
117
+ • Sub-optimal methods: Some sub-optimal methods with lower signaling overhead and com-
118
+ putational complexity are proposed and then, their performance are compared.
119
+ • Numerical result: Simulation results are reported to illustrate the effectiveness of the pro-
120
+ posed method; particularly, the impact of the relay/IRS matrix and energy waveform design.
121
+ Also, numerical examples show that the minimum rate of users increases linearly/super-
122
+ linearly with the number of antennas/REs in relay/IRS systems.
123
+ The rest of this paper is organized as follows: The signal and system models are explained
124
+ in Section II. In Section III, the minimum rate maximization problem is formulated, and a
125
+ unified optimization framework is proposed for both relay and IRS models. Section IV presents
126
+ numerical examples to illustrate the effectiveness of the proposed method. Finally, conclusions
127
+ are drawn in Section V.
128
+ Notation: Bold lowercase (uppercase) letters are used for vectors (matrices). The notations
129
+ arg(·), E[·], ℜ{·}, ∥·∥2, (·)T, (·)H, (·)∗, tr{·}, λmax(·), vec(·), Diag(·), ∇xf(·) and ∇2
130
+ xf(·) indicate
131
+ the phase of a complex number, statistical expectation, real-part, l2-norm of a vector, transpose,
132
+ Hermitian, complex conjugate, trace of a matrix, the principal eigenvalue of a matrix, stacking
133
+ of the column of a matrix, a diagonal matrix formed by the entries, the gradient of a function
134
+ with respect to (w.r.t.) x and the Hessian of a function w.r.t. x, respectively. The symbols ⊗ and
135
+ 2Note that in an active IRS, REs can amplify the reflected signals using their reflection-type amplifiers [23].
136
+ January 3, 2023
137
+ DRAFT
138
+
139
+ 5
140
+ T1 ...
141
+ τ
142
+ T − τ
143
+ Information
144
+ Transmitter
145
+ Energy
146
+ Transmitter
147
+ Tk ...
148
+ TK
149
+ AF Relay or Active IRS
150
+ R1
151
+ ...
152
+ Rk
153
+ ...
154
+ τ
155
+ T − τ
156
+ Information
157
+ Decoder
158
+ Energy
159
+ Harvester
160
+ RK
161
+ Blockage
162
+ Fig. 1. Multi-user wireless powered relay/IRS system based on TS scheme with blocked direct path.
163
+ ⊙ stand for the Kronecker and Hadamard products of two matrices. We denote CN (ω, Σ) as
164
+ a circularly symmetric complex Gaussian (CSCG) distribution with mean ω and covariance Σ.
165
+ The set R+ represents non-negative real numbers and CN×N and DN×N are the set of N × N
166
+ complex and complex diagonal matrices, respectively. The set of N × N positive (semi-)definite
167
+ and identity matrices are denoted by SN
168
+ ++ ⊂ CN×N (SN
169
+ + ⊂ CN×N) and IN, respectively. The
170
+ notation A ≻ B (A ⪰ B) means that A − B is positive (semi-)definite.
171
+ II. SYSTEM MODEL
172
+ We consider a multi-carrier wireless powered relay/IRS system with K user pairs {(Tk, Rk)}K
173
+ k=1
174
+ as shown in Fig. 1, where the direct links between the transmitters and receivers are likely blocked
175
+ (see [24] and [25], [26] for similar models of multiple user pairs with blocked direct path for
176
+ relay and IRS systems, respectively). The single-antenna transmitter Tk communicates with its
177
+ receiver Rk through either an AF relay with MR antennas or an active IRS with MIRS REs.
178
+ We assume that Rk harvests a part of its required power, whereas Tk and the relay/IRS have
179
+ no energy concern [4], [5]. In each time duration T, the relay/IRS helps Rk not only harvest
180
+ energy from the signal of all {Tk}K
181
+ k=1, but also decode the information from its corresponding
182
+ transmitter Tk by using a joint TS scheme. Precisely, Tk, relay/IRS, and Rk switch simultaneously
183
+ at time t = τ from their energy delivery modes to their communication modes. We assume that all
184
+ nodes are perfectly synchronized as shown in Fig. 2 for this switching [22]. We consider a multi-
185
+ carrier system with a total bandwidth of Bt equally divided into N orthogonal subbands. We
186
+ also model all channels to have a frequency-selective block fading, i.e., the channel coefficients
187
+ January 3, 2023
188
+ DRAFT
189
+
190
+ 6
191
+ Relay:
192
+ IRS:
193
+ {Tk}K
194
+ k=1 → IRS → {Rk}K
195
+ k=1
196
+ {Tk}K
197
+ k=1 → relay relay → {Rk}K
198
+ k=1
199
+ {Tk}K
200
+ k=1 → IRS → {Rk}K
201
+ k=1
202
+ {Tk}K
203
+ k=1 → relay
204
+ relay → {Rk}K
205
+ k=1
206
+ τ
207
+ 2
208
+ τ (energy waveform)
209
+ τ
210
+ 2
211
+ T −τ
212
+ 2
213
+ T − τ (information waveform)
214
+ T −τ
215
+ 2
216
+ Fig. 2. The transmission, amplification/reflection, and reception timeline for the proposed relay/IRS model.
217
+ remain constant for at least T seconds. Let the complex random matrices HR
218
+ n ∈ CMR×K and
219
+ GR
220
+ n ∈ CK×MR denote the channels from transmitters to the relay and the channels from the
221
+ relay to the receivers for nth subband, respectively. The elements of HR
222
+ n and GR
223
+ n are zero mean
224
+ CSCG random variables in the case of Rayleigh fading. Similarly, we denote the channels from
225
+ transmitters to the IRS and the channels from the IRS to the receivers by HIRS
226
+ n
227
+ ∈ CMIRS×K
228
+ and GIRS
229
+ n
230
+ ∈ CK×MIRS, respectively. In the sequel, Hn and Gn refer to either HR
231
+ n and GR
232
+ n or
233
+ HIRS
234
+ n
235
+ and GIRS
236
+ n , depending on the case under discussion. In addition, we assume that we can
237
+ control the relay and IRS by collecting and using the CSI of all links [25]–[27]. For example,
238
+ a relay itself can act as a controller. The CSI may be estimated in various ways, e.g., by using
239
+ orthogonal pilot sequences ( see [28], [29] for more details). The CSI estimation is out of the
240
+ scope of this paper. Also, we propose two low-complexity implementation methods mentioned
241
+ in Remark 3 to reduce the signaling overhead in the controller node.
242
+ Each Tk transmits a multi-sine energy waveform xE,k(t) and a multi-carrier modulated infor-
243
+ mation waveform xI,k(t) to the relay/IRS during the first-hop transmission at the EH and ID
244
+ time slots, respectively, as follows
245
+ xE,k(t) =
246
+ N
247
+
248
+ n=1
249
+ aE,k,ncos(2πfnt + φE,k,n), = ℜ
250
+ � N
251
+
252
+ n=1
253
+ sE,k,nej2πfnt
254
+
255
+ ,
256
+ (1)
257
+ xI,k(t) =
258
+ N
259
+
260
+ n=1
261
+ aI,k,n(τ)cos(2πfnt + φI,k,n) = ℜ
262
+ � N
263
+
264
+ n=1
265
+ sI,k,nej2πfnt
266
+
267
+ ,
268
+ (2)
269
+ where sE,k,n = aE,k,nejφE,k,n and sI,k,n = aI,k,nejφI,k,n are the baseband complex signal represen-
270
+ tations for the energy and information waveforms, respectively. We assume that the baseband
271
+ information signals are i.i.d. CSCG random variable variables, i.e., sI,k,n ∼ CN (0, pI,k,n). The
272
+ transmitted energy by Tk is constrained by
273
+ τ
274
+ 2ρ|sE,k,n|2 + T − τ
275
+
276
+ pI,k,n ≤ Tprf
277
+ k,n, ∀k, n,
278
+ (3)
279
+ January 3, 2023
280
+ DRAFT
281
+
282
+ 7
283
+ where prf
284
+ k,n is the maximum power budget at Tk for the nth subband and ρ addresses both ρR = 2
285
+ for relay and ρIRS = 1 for IRS system according to the proposed timeline in Fig. 2 (see also
286
+ Remark 1). By defining sE,n = [sE,1,n, · · · , sE,K,n]T and sI,n = [sI,1,n, · · · , sI,K,n]T, the received
287
+ signal at the relay/IRS is expressed as
288
+ r(t) =
289
+
290
+
291
+
292
+
293
+
294
+
295
+
296
+ N�
297
+ n=1
298
+ {HnsE,n + zn}, t ∈ TEH, for EH,
299
+ N�
300
+ n=1
301
+ {HnsI,n + zn}, t ∈ TID, for ID,
302
+ (4)
303
+ where
304
+ TEH =
305
+
306
+
307
+
308
+
309
+
310
+ 0 ≤ t ≤ τ
311
+ 2, for relay,
312
+ 0 ≤ t ≤ τ, for IRS,
313
+ TID =
314
+
315
+
316
+
317
+
318
+
319
+ τ ≤ t ≤ τ + T−τ
320
+ 2 , for relay,
321
+ τ ≤ t ≤ T, for IRS,
322
+ (5)
323
+ and r denotes either rR or rIRS. Furthermore, the AWGN zn denotes either zR
324
+ n ∼ CN (0, σ2
325
+ R,nIMR)
326
+ or zIRS
327
+ n
328
+ ∼ CN (0, σ2
329
+ IRS,nIMIRS) for relaying or reflecting modes. In contrast to the passive IRS,
330
+ an active IRS adds non-negligible noise (which is introduced by the active elements [23], [30]);
331
+ however, the added noise of an active IRS has considerably less impact compared to the relay
332
+ noise (which is introduced by RF chains), i.e., σ2
333
+ IRS,n ≤ σ2
334
+ R,n [31].
335
+ In the second-hop transmission, the relay/IRS amplifies the energy and information signals of
336
+ Tk by amplification/reflection matrices and then forwards them to Rk. For AF relay system, the
337
+ amplification matrices is introduced as UR
338
+ E,n and UR
339
+ I,n ∈ CMR×MR, ∀n for energy and information
340
+ phases, respectively. In the case of IRS-aided system, the reflection matrices is defined as UIRS
341
+ E
342
+ =
343
+ Diag(θE) and UIRS
344
+ I
345
+ = Diag(θI) for energy and information time slots, respectively, where θE =
346
+ [ηE,1ejθE,1, ηE,2ejθE,2, · · · , ηE,MIRSejθE,MIRS]T and θI = [ηI,1ejθI,1, ηI,2ejθI,2, · · · , ηI,MIRSejθI,MIRS]T
347
+ with ηE,m, ηI,m ≥ 1 and θE,m, θI,m ∈ [0, 2π] respectively denote the reflection amplitude and
348
+ the phase shift at the mth RE3.
349
+ Remark 1. An active IRS amplifies the signal without any significant delay. However, in an
350
+ AF relay, the signal reception, amplification, and transmission at the RF chain cause a long
351
+ delay. Therefore, in practice, the AF relay requires twice time compared to the active IRS for
352
+ transmission one information symbol [23].
353
+ 3Note that passive and passive lossless IRS require ηE,m, ηI,m ∈ [0, 1] and ηE,m = ηI,m = 1, respectively.
354
+ January 3, 2023
355
+ DRAFT
356
+
357
+ 8
358
+ We define UE,n and UI,n to address both UR
359
+ E,n, UIRS
360
+ E
361
+ and UR
362
+ I,n, UIRS
363
+ I
364
+ , respectively. The
365
+ forwarded signal by the relay/IRS is given by
366
+ �r(t)=
367
+
368
+
369
+
370
+
371
+
372
+ �N
373
+ n=1 UE,n (HnsE,n + zn) , t ∈ �TEH, for EH,
374
+ �N
375
+ n=1 UI,n (HnsI,n + zn) , t ∈ �TID, for ID,
376
+ where
377
+ �TEH =
378
+
379
+
380
+
381
+
382
+
383
+ τ
384
+ 2 ≤ t ≤ τ, for relay,
385
+ 0 ≤ t ≤ τ, for IRS,
386
+ �TID =
387
+
388
+
389
+
390
+
391
+
392
+ τ + T−τ
393
+ 2
394
+ ≤ t ≤ T, for relay,
395
+ τ ≤ t ≤ T, for IRS,
396
+ (6)
397
+ and �r denotes either �rR or �rIRS for relay or IRS system, with a slight abuse of notation.
398
+ Then, the power of �r(t) from the relay/IRS is written as
399
+ E
400
+
401
+ ∥�r(t)∥2
402
+ 2
403
+
404
+ =
405
+
406
+
407
+
408
+
409
+
410
+
411
+
412
+ 1
413
+ 2
414
+ N�
415
+ n=1
416
+
417
+ sH
418
+ E,nVE,nsE,n + σ2
419
+ ntr
420
+
421
+ UE,nUH
422
+ E,n
423
+ ��
424
+ , for EH,
425
+ 1
426
+ 2
427
+ N�
428
+ n=1
429
+
430
+ tr {QI,nVI,n} + σ2
431
+ ntr
432
+
433
+ UI,nUH
434
+ I,n
435
+ ��
436
+ , for ID,
437
+ (7)
438
+ where σ2
439
+ n addresses both σ2
440
+ R,n and σ2
441
+ IRS,n, QI,n = Diag(pI,1,n, pI,2,n, · · · , pI,K,n) and
442
+ VE,n = HH
443
+ n UH
444
+ E,nUE,nHn, ∀n,
445
+ VI,n = HH
446
+ n UH
447
+ I,nUI,nHn, ∀n.
448
+ (8)
449
+ Using (7), the total consumed energy is bounded at the relay/IRS in t ∈ [0, T] as
450
+ τ
451
+
452
+
453
+ sH
454
+ E,nVE,nsE,n + σ2
455
+ ntr{UE,nUH
456
+ E,n}
457
+
458
+ + T − τ
459
+
460
+
461
+ tr{QI,nVI,n} + σ2
462
+ ntr{UI,nUH
463
+ I,n}
464
+
465
+ ≤ Tprf
466
+ n , ∀n, (9)
467
+ where prf
468
+ n denotes either the maximum power budget at the relay prf
469
+ R,n or IRS prf
470
+ IRS. We can write
471
+ received signal at Rk as
472
+ yk(t) =
473
+
474
+
475
+
476
+
477
+
478
+
479
+
480
+ N�
481
+ n=1
482
+
483
+ gT
484
+ k,nUE,n (HnsE,n + zn) + zk,n
485
+
486
+ , t ∈ �TEH, ∀k, for EH,
487
+ N�
488
+ n=1
489
+
490
+ gT
491
+ k,nUI,n (HnsI,n + zn) + zk,n + �zk,n
492
+
493
+ , t ∈ �TID, ∀k, for ID,
494
+ where gk,n is the kth column vector of GT
495
+ n, and zk,n as well as �zk,n are the AWGN from
496
+ the antenna and baseband processing noises at Rk, respectively, with zk,n ∼ CN(0, σ2
497
+ k,n) and
498
+ �zk,n ∼ CN (0, δ2
499
+ k,n). The information signals at Rk corresponding to the nth subband can be
500
+ expanded as
501
+ yk,n(t) =gT
502
+ k,nUI,nhk,nsI,k,n + gT
503
+ k,nUI,n
504
+ K
505
+
506
+ j=1,j̸=k
507
+ hj,nsI,j,n + gT
508
+ k,nUI,nzn + zk,n + �zk,n, ∀k, n,
509
+ (10)
510
+ January 3, 2023
511
+ DRAFT
512
+
513
+ 9
514
+ where hk,n and gk,n are the kth column vector of Hn and GT
515
+ n, respectively. By defining pI,n =
516
+ [pI,1,n, pI,2,n, · · · , pI,K,n]T, the SINR at the ID part for the nth subband is given by
517
+ γk,n(pI,n, UI,n) =
518
+ pI,k,nψk,k,n
519
+ �K
520
+ j=1,j̸=k pI,j,nψk,j,n + σ2n �ψk,n + δ2
521
+ k,n + σ2
522
+ k,n
523
+ , ∀k, n,
524
+ (11)
525
+ where ψk,j,n = gT
526
+ k,nUI,nhj,nhH
527
+ j,nUH
528
+ I,ng∗
529
+ k,n and �ψk,n = gT
530
+ k,nUI,nUH
531
+ I,ng∗
532
+ k,n. From Remark 1, we obtain
533
+ the achievable rate at the kth pair as follows
534
+ Rk
535
+
536
+ {pI,n}N
537
+ n=1, {UI,n}N
538
+ n=1, τ
539
+
540
+ = T − τ
541
+ ρT
542
+ N
543
+
544
+ n=1
545
+ log2
546
+
547
+ 1 + γk,n(pI,n, UI,n)
548
+
549
+ .
550
+ (12)
551
+ For the EH stream, we assume the noise power is negligible compared to the received signal
552
+ power. We take into account the rectifier non-linearity by employing the results from [32] where
553
+ the harvested energy at Rk is approximated by
554
+ Ek
555
+
556
+ {sE,n}N
557
+ n=1, {UE,n}N
558
+ n=1, τ
559
+
560
+ = τ
561
+ ρexp
562
+
563
+ �alog2pE,k
564
+
565
+ p
566
+ �b
567
+ E,kexp�c, ∀k,
568
+ (13)
569
+ where �a, �b, and �c are the curve fitting constants and pE,k is the average input power to Rk’s
570
+ harvester as
571
+ pE,k
572
+
573
+ {sE,n}N
574
+ n=1, {UE,n}N
575
+ n=1
576
+
577
+ = 1
578
+ 2
579
+ N
580
+
581
+ n=1
582
+ sH
583
+ E,nΞk,nsE,n, ∀k,
584
+ (14)
585
+ with
586
+ Ξk,n = HH
587
+ n UH
588
+ E,ng∗
589
+ k,ngT
590
+ k,nUE,nHn, ∀k, n.
591
+ (15)
592
+ Remark 2. Note that the reflection matrix cannot be designed separately for each subband in the
593
+ IRS system, while, thanks to the RF chain circuits in a relay, the amplification matrix design is
594
+ considered for each subband. We note that an active IRS is considerably less expensive than an
595
+ AF relay. This is because an AF relay requires massive integrated circuits (including analog-to-
596
+ digital/digital-to-analog converter, self-interference cancellation circuits, etc). The delay caused
597
+ by RF chain processing of an AF relay contributes to latency, leads to lower transmission time,
598
+ and requires more power for energy and information signals (see (3) and (9)). Therefore, a
599
+ relay-IRS trade-off exists in the system performance (see (12) and (13)).
600
+ Remark 3. An approach with lower implementation complexity is considered in which only one
601
+ amplification/reflection matrix needs to be designed for both energy and information time slots,
602
+ called the t-static approach. Also, one can consider another approach with only one amplification
603
+ matrix design in both time slots and all subbands, referred to as t-f-static in the relay system.
604
+ These design methodologies lead to a lower signaling overhead and system performance.
605
+ January 3, 2023
606
+ DRAFT
607
+
608
+ 10
609
+ III. THE PROPOSED MINIMUM RATE MAXIMIZATION METHOD
610
+ In this section, the aim is to maximize the minimum rate of the multi-user relay/IRS WPC
611
+ system w.r.t. multi-sine energy waveforms sE,n, allocated power pI,n, amplification/reflection
612
+ matrices UE,n, UI,n, and the time allocation parameter τ. The unified minimum rate maximization
613
+ problem for both relay and IRS systems is cast as
614
+ max
615
+ τ,{sE,n,pI,n,UE,n,UI,n}N
616
+ n=1
617
+ min
618
+ 1≤k≤K
619
+ Rk
620
+ (16)
621
+ s.t.
622
+
623
+ τ, {sE,n, pI,n, UE,n, UI,n}N
624
+ n=1
625
+
626
+ ∈ Ω,
627
+ where Ω = Ω0 ∩ Ωind with
628
+ Ω0 =
629
+
630
+ C1 : 0 ≤ τ ≤ T, C2 : (3), pI,k,n ≥ 0, ∀k, n, C3 : (9), C4 : Ek ≥ Emin,k, ∀k
631
+
632
+ ,
633
+ (17)
634
+ Ωind =
635
+
636
+
637
+
638
+
639
+
640
+ CR : UE,n, UI,n ∈ CMR×MR, ∀n, for relay,
641
+ CIRS : UE,n, UI,n ∈ DMIRS×MIRS, ∀n, |θE,m| ≥ 1, |θI,m| ≥ 1, ∀m, for IRS,
642
+ (18)
643
+ and Emin,k in C4 is the minimum required harvested energy for the kth user.
644
+ The problem in (16) is non-convex due to the coupled design variables in the objective function
645
+ and the constraints C2 − C4 and CIRS. To deal with this non-convex problem, we first solve
646
+ the problem w.r.t. {UE,n, UI,n} for fixed {sE,n, pI,n, τ}, then optimize {sE,n, pI,n} for given
647
+ {UE,n, UI,n, τ}, and finally, solve the problem w.r.t. τ via a closed-form solution. The procedure
648
+ is repeated until convergence.
649
+ A. Maximization over {UE,n, UI,n}
650
+ Here, we first consider the relay problem, and then the IRS problem is investigated.
651
+ 1) Relay System: The problem in (16) for fixed {sE,n, pI,n} reduces to the following opti-
652
+ mization
653
+ max
654
+ {UE,UI}N
655
+ n=1
656
+ min
657
+ 1≤k≤K
658
+ N
659
+
660
+ n=1
661
+ log2 (1 + γk,n(UI,n))
662
+ (19)
663
+ s.t.
664
+ C3, C4,
665
+ January 3, 2023
666
+ DRAFT
667
+
668
+ 11
669
+ which is still a non-convex problem. To start solving the problem, first we need to reformulate
670
+ the obtained expressions for the relay power constraint (7), SINR (11), and the input power of
671
+ harvesters (14) from Section II. We can rewrite (7) as (see Appendix A for the derivation)
672
+ E
673
+
674
+ ∥�r(t)∥2
675
+ 2
676
+
677
+ =
678
+
679
+
680
+
681
+
682
+
683
+
684
+
685
+ 1
686
+ 2
687
+ N�
688
+ n=1
689
+ uH
690
+ E,n �AR
691
+ E,nuE,n, 0 ≤ t ≤ τ, for EH,
692
+ 1
693
+ 2
694
+ N�
695
+ n=1
696
+ uH
697
+ I,n �AR
698
+ I,nuI,n, τ ≤ t ≤ T, for ID,
699
+ (20)
700
+ where uE,n = vec(UE,n), uI,n = vec(UI,n), and
701
+ �AR
702
+ E,n =
703
+
704
+ HnsE,nsH
705
+ E,nHH
706
+ n
707
+ �T ⊗ IMR + σ2
708
+ nIM2
709
+ R,
710
+ �AR
711
+ I,n =
712
+
713
+ HnQI,nHH
714
+ n
715
+ �T ⊗ IMR + σ2
716
+ nIM2
717
+ R.
718
+ (21)
719
+ Therefore, we rewrite the relay power constraint in (9) by using (20) as
720
+ τ
721
+ 2ρuH
722
+ E,n �AR
723
+ E,nuE,n + T − τ
724
+
725
+ uH
726
+ I,n �AR
727
+ I,nuI,n ≤ Tprf
728
+ R,n, ∀n.
729
+ (22)
730
+ Next, we rewrite the SINR and the input power at Rk’s harvester in (11) and (14) as
731
+ γk,n(uI,n) =
732
+ uH
733
+ I,nAR
734
+ k,nuI,n
735
+ uH
736
+ I,n �AR
737
+ k,nuI,n + δ2
738
+ k,n + σ2
739
+ k,n
740
+ , ∀k, n,
741
+ (23)
742
+ pE,k
743
+
744
+ {uE,n}N
745
+ n=1
746
+
747
+ = 1
748
+ 2
749
+ N
750
+
751
+ n=1
752
+ uH
753
+ E,n ¯AR
754
+ k,nuE,n, ∀k,
755
+ (24)
756
+ where
757
+ AR
758
+ k,n = pI,k,n
759
+
760
+ hk,nhH
761
+ k,n
762
+ �T ⊗ g∗
763
+ k,ngT
764
+ k,n,
765
+ (25)
766
+ �AR
767
+ k,n=
768
+ K
769
+
770
+ j=1,j̸=k
771
+ pI,j,n
772
+
773
+ hj,nhH
774
+ j,n
775
+ �T ⊗ g∗
776
+ k,ngT
777
+ k,n + σ2
778
+ nIMR ⊗ g∗
779
+ k,ngT
780
+ k,n,
781
+ (26)
782
+ ¯AR
783
+ k,n =
784
+
785
+ HnsE,nsH
786
+ E,nHH
787
+ n
788
+ �T ⊗ g∗
789
+ k,ngT
790
+ k,n.
791
+ (27)
792
+ By using (22), (23), and (24) with an auxiliary variable αa the optimization problem in (19) can
793
+ be equivalently rewritten as
794
+ max
795
+ αa,{uE,uI}N
796
+ n=1
797
+ αa
798
+ (28)
799
+ s.t.
800
+ C3 : (22), C4 : Ek
801
+
802
+ {uE,n}N
803
+ n=1
804
+
805
+ ≥ Emin,k, ∀k,
806
+ C5 :
807
+ N
808
+
809
+ n=1
810
+ log2
811
+
812
+ 1 +
813
+ uH
814
+ I,nAR
815
+ k,nuI,n
816
+ uH
817
+ I,n �AR
818
+ k,nuI,n + ζk,n,a
819
+
820
+ ≥ αa, ∀k,
821
+ where ζk,n,a = σ2
822
+ k,n + δ2
823
+ k,n. The constraint C5 can be equivalently rewritten as
824
+ C5 :
825
+ N
826
+
827
+ n=1
828
+
829
+ log2
830
+
831
+ uH
832
+ I,nBk,nuI,n + ζk,n,a
833
+
834
+ − log2
835
+
836
+ uH
837
+ I,n �AR
838
+ k,nuI,n + ζk,n,a
839
+ � �
840
+ ≥ αa,
841
+ (29)
842
+ January 3, 2023
843
+ DRAFT
844
+
845
+ 12
846
+ where Bk,n = �AR
847
+ k,n + AR
848
+ k,n. It is observed that this constraint is non-convex. Therefore, we
849
+ employ the MM technique to tackle its non-convexity. Precisely, we minorize the denominator
850
+ term − log2
851
+
852
+ uH
853
+ I,n �AR
854
+ k,nuI,n +ζk,n,b
855
+
856
+ by the using the following inequality
857
+ log2(x) ≤ log2(x0) + log2 e
858
+ x0
859
+ (x − x0).
860
+ (30)
861
+ By setting x = uH
862
+ I,n �AR
863
+ k,nuI,n + ζk,n,a and x0 =
864
+
865
+ u0
866
+ I,n
867
+ �H �AR
868
+ k,nu0
869
+ I,n + ζk,n,a in (30) we obtain
870
+ − log2
871
+
872
+ uH
873
+ I,n �AR
874
+ k,nuI,n + ζk,n,a
875
+
876
+ ≥ − log2
877
+ ��
878
+ u0
879
+ I,n
880
+ �H �AR
881
+ k,nu0
882
+ I,n + ζk,n,a
883
+
884
+ (31)
885
+
886
+ log2 e
887
+
888
+ uH
889
+ I,n �AR
890
+ k,nuI,n −
891
+
892
+ u0
893
+ I,n
894
+ �H �AR
895
+ k,nu0
896
+ I,n
897
+
898
+
899
+ u0
900
+ I,n
901
+ �H �AR
902
+ k,nu0
903
+ I,n + ζk,n,a
904
+ .
905
+ Applying the above minorizer, the constraint C5 in (29) is rewritten at the ith iteration of the
906
+ MM technique as
907
+ N
908
+
909
+ n=1
910
+
911
+ log2
912
+
913
+ uH
914
+ I,nBk,nuI,n + ζk,n,a
915
+
916
+ − log2
917
+ ��
918
+ u(i−1)
919
+ I,n
920
+ �H �AR
921
+ k,nu(i−1)
922
+ I,n
923
+ + ζk,n,a
924
+
925
+ (32)
926
+
927
+ log2 e
928
+
929
+ u(i−1)
930
+ I,n
931
+ �H �AR
932
+ k,nu(i−1)
933
+ I,n
934
+ + ζk,n,a
935
+
936
+ uH
937
+ I,n �AR
938
+ k,nuI,n −
939
+
940
+ u(i−1)
941
+ I,n
942
+ �H �AR
943
+ k,nu(i−1)
944
+ I,n
945
+ � �
946
+ ≥ αa.
947
+ The following lemma lays the ground for dealing with the first non-concave logarithmic term
948
+ in (32) in light of the MM technique.
949
+ Lemma 1. Let s(x) = − log2
950
+
951
+ xHTx + ν
952
+
953
+ and xHQx ≤ P for any positive-definite matrices
954
+ T, Q ∈ SN
955
+ ++ and P ∈ R+. Then, s(x) is bounded for all x and x0 as follows
956
+ s(x) ≤ s(x0) + ℜ
957
+
958
+ bH(x − x0)
959
+
960
+ + (x − x0)HD(x − x0),
961
+ where b =
962
+ −2 log2 e
963
+ xH
964
+ 0 Tx0+νTx0, D =
965
+ 4P
966
+ wH
967
+ 1 Qw1IM2
968
+ R, and w1 is the principal eigenvector of T and ǫ > 0.
969
+ Proof. See Appendix B.
970
+ Using Lemma 1 and noting that the term τ
971
+ 2uH
972
+ E,n �AR
973
+ E,nuE,n in (22) is positive, we obtain the
974
+ following minorizer for the term log2(uH
975
+ I,nBk,nuI,n + ζk,n,a) in (32) at any given u0
976
+ I,n
977
+ log2(uH
978
+ I,nBk,nuI,n + ζk,n,a) ≥ log2
979
+ ��
980
+ u0
981
+ I,n
982
+ �H Bk,nu0
983
+ I,n + ζk,n,a
984
+
985
+ − ℜ
986
+
987
+ bH
988
+ k,n(uI,n − u0
989
+ I,n)
990
+
991
+ (33)
992
+
993
+
994
+ uI,n − u0
995
+ I,n
996
+ �H Dk,n(uI,n − u0
997
+ I,n),
998
+ where
999
+ bk,n =
1000
+ −2 log2 e
1001
+
1002
+ u0
1003
+ I,n
1004
+ �H Bk,nu0
1005
+ I,n + ζk,n,a
1006
+ Bk,nu0
1007
+ I,n,
1008
+ Dk,n =
1009
+ 16T
1010
+ T−τ prf
1011
+ R,n
1012
+ �wH
1013
+ k,n �AR
1014
+ I,n �wk,n
1015
+ IM2
1016
+ R,
1017
+ January 3, 2023
1018
+ DRAFT
1019
+
1020
+ 13
1021
+ and �wk,n denotes the principal eigenvector of Bk,n. Applying (33), the constraint in (32) is
1022
+ restated as
1023
+
1024
+ N
1025
+
1026
+ n=1
1027
+
1028
+ log2 e uH
1029
+ I,n �AR
1030
+ k,nuI,n
1031
+
1032
+ u(i−1)
1033
+ I,n
1034
+ �H �AR
1035
+ k,nu(i−1)
1036
+ I,n
1037
+ + ζk,n,a
1038
+ + uH
1039
+ I,nDk,nuI,n + ℜ
1040
+ ��
1041
+ bk,n − 2Dk,nu(i−1)
1042
+ I,n
1043
+ �H
1044
+ uI,n
1045
+
1046
+ + d(i)
1047
+ k,n
1048
+
1049
+ ≥ αa, ∀k,
1050
+ (34)
1051
+ where
1052
+ d(i)
1053
+ k,n = log2
1054
+
1055
+ u(i−1)
1056
+ I,n
1057
+ �H �AR
1058
+ k,nu(i−1)
1059
+ I,n
1060
+ + ζk,n,a
1061
+
1062
+ u(i−1)
1063
+ I,n
1064
+ �H
1065
+ Bk,nu(i−1)
1066
+ I,n
1067
+ + ζk,n,a
1068
+ − ℜ
1069
+
1070
+ bH
1071
+ k,nu(i−1)
1072
+ I,n
1073
+
1074
+ +
1075
+
1076
+ u(i−1)
1077
+ I,n
1078
+ �H
1079
+ Dk,nu(i−1)
1080
+ I,n
1081
+ (35)
1082
+
1083
+ log2 e
1084
+
1085
+ u(i−1)
1086
+ I,n
1087
+ �H �AR
1088
+ k,nu(i−1)
1089
+ I,n
1090
+
1091
+ u(i−1)
1092
+ I,n
1093
+ �H �AR
1094
+ k,nu(i−1)
1095
+ I,n
1096
+ + ζk,n,a
1097
+ .
1098
+ Then, we can simplify constraint in (34) as
1099
+
1100
+ N
1101
+
1102
+ n=1
1103
+
1104
+ uH
1105
+ I,nF(i)
1106
+ k,nuI,n + ℜ
1107
+
1108
+ (f(i)
1109
+ k,n)HuI,n
1110
+
1111
+ + d(i)
1112
+ k,n
1113
+
1114
+ ≥ αa, ∀k,
1115
+ (36)
1116
+ where
1117
+ F(i)
1118
+ k,n =
1119
+ log2 e �AR
1120
+ k,n
1121
+
1122
+ u(i−1)
1123
+ I,n
1124
+ �H �AR
1125
+ k,nu(i−1)
1126
+ I,n
1127
+ + ζk,n,a
1128
+ + Dk,n,
1129
+ f(i)
1130
+ k,n = bk,n − 2Dk,nu(i−1)
1131
+ I,n
1132
+ .
1133
+ (37)
1134
+ Finally, we focus on the constraint C4. From (13) and (24), we see that in the left-hand side
1135
+ (LHS) of C4, Ek is neither convex nor concave w.r.t. uE,n. To apply the MM technique on LHS
1136
+ of C4, we first define a parameter4 βk,n,a such that ∇2
1137
+ uE,nEk
1138
+
1139
+ {uE,n}N
1140
+ n=1
1141
+
1142
+ +βk,n,aIM2
1143
+ R ⪰ 0, ∀k, n,
1144
+ and write Ek as the sum of a convex and a concave function as
1145
+ Ek
1146
+
1147
+ {uE,n}N
1148
+ n=1
1149
+
1150
+ =Ek
1151
+
1152
+ {uE,n}N
1153
+ n=1
1154
+
1155
+ + 1
1156
+ 2
1157
+ N
1158
+
1159
+ n=1
1160
+ βk,n,auH
1161
+ E,nuE,n − 1
1162
+ 2
1163
+ N
1164
+
1165
+ n=1
1166
+ βk,n,auH
1167
+ E,nuE,n, ∀k.
1168
+ (38)
1169
+ We now apply the MM technique to C4 and obtain a convex constraint. To do so, we keep the
1170
+ concave part and minorize the convex part of (38) and rewrite C4 as
1171
+ Ek
1172
+
1173
+ {u(i−1)
1174
+ E,n }N
1175
+ n=1
1176
+
1177
+ + 1
1178
+ 2
1179
+ N
1180
+
1181
+ n=1
1182
+ βk,n,a
1183
+
1184
+ u(i−1)
1185
+ E,n
1186
+ �H
1187
+ u(i−1)
1188
+ E,n
1189
+ +
1190
+ N
1191
+
1192
+ n=1
1193
+
1194
+
1195
+ ϑ(i)
1196
+ k,n,a
1197
+
1198
+ uE,n − u(i−1)
1199
+ E,n
1200
+ ��
1201
+ (39)
1202
+ − 1
1203
+ 2
1204
+ N
1205
+
1206
+ n=1
1207
+ βk,n,auH
1208
+ E,nuE,n ≥ Emin,k, ∀k,
1209
+ 4See Appendix C for a selection of βk,n,a.
1210
+ January 3, 2023
1211
+ DRAFT
1212
+
1213
+ 14
1214
+ where
1215
+ ϑ(i)
1216
+ k,n,a =βk,n,a
1217
+
1218
+ u(i−1)
1219
+ E,n
1220
+ �H
1221
+ + τexp�c
1222
+ 2
1223
+ exp
1224
+
1225
+ �alog2ω(i)
1226
+ k,a
1227
+ � �
1228
+ ω(i)
1229
+ k,a
1230
+ ��b−1 �
1231
+ 2�a log ω(i)
1232
+ k,a + �b
1233
+ � �
1234
+ u(i−1)
1235
+ E,n
1236
+ �H ¯AR
1237
+ k,n,
1238
+ with ω(i)
1239
+ k,a = 1
1240
+ 2
1241
+ �N
1242
+ n=1
1243
+
1244
+ u(i−1)
1245
+ E,n
1246
+ �H ¯AR
1247
+ k,nu(i−1)
1248
+ E,n . Therefore, the ith MM iteration for (19) is the solution
1249
+ of the following convex problem
1250
+ max
1251
+ αa,{uE,n,uI,n}N
1252
+ n=1
1253
+ αa
1254
+ (40)
1255
+ s.t. C3 : (22), C4 : (39), C5 : (36),
1256
+ which can be solved efficiently.
1257
+ 2) IRS System: By considering UE,n = Diag(θE), UI,n = Diag(θI) and adding the constraint
1258
+ CIRS in (18), the optimization problem in (19) is considered in this subsection. Since UE,n and
1259
+ UI,n are diagonal matrices, the expressions in (22)-(24) are modified as
1260
+ τ
1261
+ 2θH
1262
+ E �AIRS
1263
+ E,nθE + T − τ
1264
+ 2
1265
+ θH
1266
+ I �AIRS
1267
+ I,n θI ≤ Tprf
1268
+ IRS, ∀n,
1269
+ (41)
1270
+ γk,n(θI) =
1271
+ θH
1272
+ I AIRS
1273
+ k,n θI
1274
+ θH
1275
+ I �AIRS
1276
+ k,n θI + δ2
1277
+ k,n + σ2
1278
+ k,n
1279
+ , ∀k, n,
1280
+ (42)
1281
+ pE,k (θE) = 1
1282
+ 2
1283
+ N
1284
+
1285
+ n=1
1286
+ θH
1287
+ E ¯AIRS
1288
+ k,n θE, ∀k,
1289
+ (43)
1290
+ where their parameters are defined in Lemma 2 below.
1291
+ Lemma 2. The parameters �AIRS
1292
+ E,n, �AIRS
1293
+ I,n , AIRS
1294
+ k,n , �AIRS
1295
+ k,n , and ¯AIRS
1296
+ k,n are expressed as follows:
1297
+ �AIRS
1298
+ E,n =
1299
+
1300
+ HnsE,nsH
1301
+ E,nHH
1302
+ n
1303
+ �T ⊙ IMIRS + σ2
1304
+ nIMIRS,
1305
+ (44)
1306
+ �AIRS
1307
+ I,n =
1308
+
1309
+ HnQI,nHH
1310
+ n
1311
+ �T ⊙ IMIRS + σ2
1312
+ nIMIRS,
1313
+ (45)
1314
+ AIRS
1315
+ k,n = pI,k,n
1316
+
1317
+ hk,nhH
1318
+ k,n
1319
+ �T ⊙ g∗
1320
+ k,ngT
1321
+ k,n,
1322
+ (46)
1323
+ �AIRS
1324
+ k,n =
1325
+ K
1326
+
1327
+ j=1,j̸=k
1328
+ pI,j,n
1329
+
1330
+ hj,nhH
1331
+ j,n
1332
+ �T⊙ g∗
1333
+ k,ngT
1334
+ k,n+ σ2
1335
+ nIMIRS⊙ g∗
1336
+ k,ngT
1337
+ k,n,
1338
+ (47)
1339
+ ¯AIRS
1340
+ k,n =
1341
+
1342
+ HnsE,nsH
1343
+ E,nHH
1344
+ n
1345
+ �T ⊙ g∗
1346
+ k,ngT
1347
+ k,n.
1348
+ (48)
1349
+ It is worth pointing out that the only difference between the parameters above and their corre-
1350
+ sponding expressions in (21) and (25)-(27), is the symbol of multiplication, i.e., ⊗ and ⊙, in a
1351
+ January 3, 2023
1352
+ DRAFT
1353
+
1354
+ 15
1355
+ proper dimension. The proper dimension consideration means MR → MIRS for all of the above
1356
+ parameters and IM2
1357
+ R → IMIRS for the second terms of �AIRS
1358
+ E,n and �AIRS
1359
+ I,n .
1360
+ Proof. See Appendix D.
1361
+ Next, we focus on constraint CIRS. First, let us introduce the following minorizer [33]
1362
+ |x| ≥ ℜ
1363
+
1364
+ x∗ x0
1365
+ |x0|
1366
+
1367
+ .
1368
+ (49)
1369
+ Then, considering the above minorizer, the constraint CIRS is expressed as the ith iteration of
1370
+ MM as
1371
+
1372
+
1373
+ θ∗
1374
+ E,m
1375
+ θ(i−1)
1376
+ E,m
1377
+ |θ(i−1)
1378
+ E,m |
1379
+
1380
+ ≥ 1, ℜ
1381
+
1382
+ θ∗
1383
+ I,m
1384
+ θ(i−1)
1385
+ I,m
1386
+ |θ(i−1)
1387
+ I,m |
1388
+
1389
+ ≥ 1,
1390
+ ∀m.
1391
+ (50)
1392
+ Therefore, the optimization problem in (28) is modified as
1393
+ max
1394
+ αa,θE,θI
1395
+ αa
1396
+ (51)
1397
+ s.t.
1398
+ C3 : (41), C4 : Ek (θE) ≥ Emin,k, ∀k, CIRS : (50),
1399
+ C5 :
1400
+ N
1401
+
1402
+ n=1
1403
+ log2
1404
+
1405
+ 1 +
1406
+ θH
1407
+ I AIRS
1408
+ k,n θI
1409
+ θH
1410
+ I �AIRS
1411
+ k,n θI + ζk,n,a
1412
+
1413
+ ≥ αa, ∀k,
1414
+ where the steps for constraints C3-C5 in Subsection III-A1 are used exactly here.
1415
+ B. Maximization over {sE,n, pI,n}
1416
+ By introducing an auxiliary variable αb, the relay/IRS problem in (16) for fixed {UE,n, UI,n, τ}
1417
+ boils down to the following optimization:
1418
+ max
1419
+ αb,{sE,n,pI,n}N
1420
+ n=1
1421
+ αb
1422
+ (52)
1423
+ s.t.
1424
+ C2 : (3), pI,k,n ≥ 0, ∀k, n, C3 : (9), C4 : Ek
1425
+
1426
+ {sE}N
1427
+ n=1
1428
+
1429
+ ≥ Emin,k, ∀k,
1430
+ C5 :
1431
+ N
1432
+
1433
+ n=1
1434
+ log2 (1 + γk,n(pI,n)) ≥ αb, ∀k.
1435
+ The constraints C4 and C5 of this sub-problem are non-convex. We first rewrite the SINR
1436
+ associated with the kth pair in (11) as
1437
+ γk,n(pI,n) =
1438
+ aT
1439
+ k,npI,n
1440
+ bT
1441
+ k,npI,n + σ2n �ψk,n + δ2
1442
+ k,n + σ2
1443
+ k,n
1444
+ ,
1445
+ (53)
1446
+ where ak,n = ψk,k,nek, bk,n = [ψk,1,n, ψk,2,n, · · · , ψk,k−1,n, 0 , ψk,k+1,n, · · · , ψk,K,n]T, and ek is
1447
+ the kth unit vector. Therefore, the LHS of C5 in (52) is written as
1448
+ N
1449
+
1450
+ n=1
1451
+
1452
+ log2
1453
+
1454
+ qT
1455
+ k,npI,n + ζk,n,b
1456
+
1457
+ − log2
1458
+
1459
+ bT
1460
+ k,npI,n + ζk,n,b
1461
+ � �
1462
+ ,
1463
+ (54)
1464
+ January 3, 2023
1465
+ DRAFT
1466
+
1467
+ 16
1468
+ where qk,n = ak,n +bk,n and ζk,n,b = σ2
1469
+ n �ψk,n +σ2
1470
+ k,n +δ2
1471
+ k,n. Then, similar to the procedure in Sub-
1472
+ section III-A for C5, we resort to the MM technique. Precisely, considering the inequality in (30),
1473
+ the second term in (54) is minorized by setting x = bT
1474
+ k,npI,n + ζk,n,b and x0 = bT
1475
+ k,np0
1476
+ I,n + ζk,n,b.
1477
+ By substituting the minorizer in (54), the constraint C5 at the ith iteration is obtained as
1478
+ C5 :
1479
+ N
1480
+
1481
+ n=1
1482
+
1483
+ log2
1484
+
1485
+ qT
1486
+ k,npI,n + ζk,n,b
1487
+
1488
+ − log2(bT
1489
+ k,np(i−1)
1490
+ I,n
1491
+ + ζk,n,b)
1492
+ (55)
1493
+
1494
+ log2 e
1495
+ bT
1496
+ k,np(i−1)
1497
+ I,n
1498
+ + ζk,n,b
1499
+ bT
1500
+ k,n
1501
+
1502
+ pI,n − p(i−1)
1503
+ I,n
1504
+ � �
1505
+ ≥ αb.
1506
+ Next, we consider the non-convex constraint C4. It is observed that the term Ek
1507
+
1508
+ {sE,n}N
1509
+ n=1
1510
+
1511
+ in
1512
+ the LHS of the this constraint is neither convex nor concave w.r.t. sE,n. Therefore, similar to
1513
+ the procedure in Subsection III-A, we apply the MM by selecting βk,n,b (see Appendix C) and
1514
+ minorize C4 at the ith iteration by
1515
+ Ek
1516
+ ��
1517
+ s(i−1)
1518
+ E,n
1519
+ �N
1520
+ n=1
1521
+
1522
+ + 1
1523
+ 2
1524
+ N
1525
+
1526
+ n=1
1527
+ βk,n,b
1528
+
1529
+ s(i−1)
1530
+ E,n
1531
+ �H
1532
+ s(i−1)
1533
+ E,n
1534
+ +
1535
+ N
1536
+
1537
+ n=1
1538
+
1539
+
1540
+ ϑ(i)
1541
+ k,n,b
1542
+
1543
+ sE,n − s(i−1)
1544
+ E,n
1545
+ ��
1546
+ (56)
1547
+ − 1
1548
+ 2
1549
+ N
1550
+
1551
+ n=1
1552
+ βk,n,bsH
1553
+ E,nsE,n ≥ Emin,k, ∀k,
1554
+ where we define
1555
+ ϑ(i)
1556
+ k,n,b =βk,n,b
1557
+
1558
+ s(i−1)
1559
+ E,n
1560
+ �H
1561
+ + τ
1562
+ ρexp�cexp
1563
+
1564
+ �alog2ω(i)
1565
+ k,b
1566
+ � �
1567
+ ω(i)
1568
+ k,b
1569
+ ��b−1 �
1570
+ 2�a log ω(i)
1571
+ k,b + �b
1572
+ � �
1573
+ s(i−1)
1574
+ E,n
1575
+ �H
1576
+ Ξk,n,
1577
+ with ω(i)
1578
+ k,b =
1579
+ 1
1580
+ 2
1581
+ �N
1582
+ n=1
1583
+
1584
+ s(i−1)
1585
+ E,n
1586
+ �H
1587
+ Ξk,ns(i−1)
1588
+ E,n . Consequently, the ith iteration of the MM update
1589
+ for (52) is obtained easily as the interior point solution of the following convex problem
1590
+ max
1591
+ αb,{sE,n,pI,n}N
1592
+ n=1
1593
+ αb
1594
+ (57)
1595
+ s.t.
1596
+ C2, C3, C4 : (56), C5 : (55).
1597
+ C. Maximization over τ
1598
+ The optimization problem in (16) w.r.t. τ becomes
1599
+ min
1600
+ τ
1601
+ τ
1602
+ (58)
1603
+ s.t.
1604
+ C1 : 0 ≤ τ ≤ T,
1605
+ C2 : τvk ≤ �vk, ∀k,
1606
+ C3 : τ�v1 ≤ �v2,
1607
+ C4 : τ ≥ ¯vk, ∀k,
1608
+ where
1609
+ vk = 1
1610
+
1611
+ N
1612
+
1613
+ n=1
1614
+
1615
+ |sE,k,n|2 − pI,k,n
1616
+
1617
+ , ∀k,
1618
+ �vk = T
1619
+ N
1620
+
1621
+ n=1
1622
+
1623
+ prf
1624
+ k,n − pI,k,n
1625
+
1626
+
1627
+ , ∀k,
1628
+ (59)
1629
+ January 3, 2023
1630
+ DRAFT
1631
+
1632
+ 17
1633
+ Algorithm 1 The Proposed Method for Minimum Rate Maximization in Relay/IRS Systems
1634
+ 1. Relay: Initialize U(l)
1635
+ E,n, U(l)
1636
+ I,n ∈ CMR×MR, τ (l) ∈ R+, l ← 0.
1637
+ 1. IRS: Initialize θ(l)
1638
+ E , θ(l)
1639
+ I
1640
+ ∈ CMIRS, τ (l) ∈ R+, l ← 0.
1641
+ repeat
1642
+ 2. Relay: Initialize U(i)
1643
+ E,n and U(i)
1644
+ I,n and set i = 0.
1645
+ 2. IRS: Initialize θ(i)
1646
+ E , θ(i)
1647
+ I
1648
+ and set i = 0.
1649
+ repeat
1650
+ 3. Relay: Solve (40) to obtain {UE,n, UI,n, αa}.
1651
+ 3. IRS: Solve (51) to obtain {θE, θI, αa}.
1652
+ 4. Update i ← i + 1.
1653
+ until convergence
1654
+ 5. Relay/IRS: Initialize s(i)
1655
+ E,n, p(i)
1656
+ I,n and set i = 0.
1657
+ repeat
1658
+ 6. Relay/IRS: Solve the convex problem in (57) to obtain {sE,n, pI,n, αb}.
1659
+ 7. Update i ← i + 1.
1660
+ until convergence
1661
+ 8. Relay/IRS: Compute τ (l) via the closed-form solution in (63).
1662
+ 9. Update l ← l + 1.
1663
+ until convergence
1664
+ �v1 = 1
1665
+
1666
+ N
1667
+
1668
+ n=1
1669
+
1670
+ sH
1671
+ E,nVE,nsE,n + σ2
1672
+ ntr
1673
+
1674
+ UE,nUH
1675
+ E,n
1676
+
1677
+ − tr{QI,nVI,n} − σ2
1678
+ ntr{UI,nUH
1679
+ I,n}
1680
+
1681
+ ,
1682
+ (60)
1683
+ �v2 = T
1684
+ N
1685
+
1686
+ n=1
1687
+
1688
+ prf
1689
+ n − 1
1690
+
1691
+
1692
+ tr{QI,nVI,n} + σ2
1693
+ ntr
1694
+
1695
+ UI,nUH
1696
+ I,n
1697
+ ���
1698
+ ,
1699
+ (61)
1700
+ ¯vk =
1701
+ ρEmin,k
1702
+ exp
1703
+
1704
+ �alog2pE,k
1705
+
1706
+ p�b
1707
+ E,kexp (�c)
1708
+ , ∀k.
1709
+ (62)
1710
+ Therefore, a closed-form solution (for a non-empty feasible set5) can be obtained as
1711
+ τopt = max{¯v1, ¯v2, ..., ¯vK}.
1712
+ (63)
1713
+ 5The following conditions lead to a non-empty feasible set for the problem:
1714
+ 1) ¯vk ≤ T, ∀k, 2) �vk ≥ 0, ∀k, 3) �v2 ≥ 0, 4)
1715
+ �vj
1716
+ vj |K
1717
+ j=1 ≥ ¯vk, ∀k (for vj ≥ 0, ∀j), 5) �v2
1718
+ �v1 ≥ ¯vk, ∀k (for v1 ≥ 0).
1719
+ January 3, 2023
1720
+ DRAFT
1721
+
1722
+ 18
1723
+ TABLE I
1724
+ THE COMPUTATIONAL COMPLEXITY ORDER (PER INNER ITERATIONS) FOR STEP 3 OF THE ALGORITHM 1.
1725
+ Relay
1726
+ O
1727
+ ��
1728
+ 2NM 2
1729
+ R(1 + 2N)(1 + K)
1730
+ �3.5�
1731
+ Relay (t-static)
1732
+ O
1733
+ ��
1734
+ NM 2
1735
+ R(1 + N)(1 + 2K)
1736
+ �3.5�
1737
+ Relay (t-f-static)
1738
+ O
1739
+ ��
1740
+ 2M 2
1741
+ R(1 + 2K)
1742
+ �3.5�
1743
+ IRS
1744
+ O
1745
+
1746
+ (6MIRS(N + K + 1))3.5�
1747
+ IRS (t-static)
1748
+ O
1749
+
1750
+ (2MIRS(N + 2K + 1))3.5�
1751
+ Algorithm 1 summarizes the discussions in Section III and represents the steps of the proposed
1752
+ method for maximizing the minimum rate of all user pairs in relay/IRS WPC systems. Note that
1753
+ similar mathematical derivations are used to develop t-f-static algorithm for relay system as well
1754
+ as t-static algorithm for both relay and IRS systems.
1755
+ Remark 4 (convergence). It has been shown that under some mild conditions, the MM technique
1756
+ converges to the stationary points of the problem [34], [35].
1757
+ D. Complexity Analysis
1758
+ The main computational burdens in Algorithm 1 are associated with steps 3, 6, and 8. At
1759
+ each inner iteration in step 3, the convex problems in (40) and (51) are solved via interior
1760
+ point methods for relay and IRS system design, respectively, with a computational complexity
1761
+ of O
1762
+
1763
+ (2NM2
1764
+ R(1 + 2N)(1 + K))3.5�
1765
+ and O
1766
+
1767
+ (6MIRS(N + K + 1))3.5�
1768
+ [36]. Table I compares
1769
+ the computational complexity of step 3 for other versions of relay/IRS models. Similar to step
1770
+ 3, the complexity (per inner iterations) for step 6 which solves (57) (e.g., by using the interior
1771
+ point methods) is O
1772
+
1773
+ (KN(1 + 2N)(5 + 2K))3.5�
1774
+ for all versions of relay/IRS models. In step
1775
+ 8, the closed-form expression in (63) must be calculated leading to the complexity of6 O(N3).
1776
+ IV. NUMERICAL EXAMPLES
1777
+ Here, we evaluate the proposed relay/IRS method in different scenarios. The channels from
1778
+ transmitters to the relay and the channels from the relay to the receivers are modeled as Hn =
1779
+ 0.1
1780
+ � �d1
1781
+ d0
1782
+ � −�γ
1783
+ 2 �Hn and Gn = 0.1
1784
+ � �d2
1785
+ d0
1786
+ � −�γ
1787
+ 2 �Gn, respectively, where d0 = 1 m is a reference distance,
1788
+ �d1 is the distance between Tk and the relay, �d2 is the distance between the relay and Rk, and
1789
+ 6This can be decreased to O(N 2.3) via finding the best order of matrix multiplications (see [37] for details).
1790
+ January 3, 2023
1791
+ DRAFT
1792
+
1793
+ 19
1794
+ T1
1795
+ T2
1796
+ TK
1797
+ Relay or IRS
1798
+ rT
1799
+ d3
1800
+ d1
1801
+ d2
1802
+ rR
1803
+ R1
1804
+ ...
1805
+ ...
1806
+ R2
1807
+ RK
1808
+ Fig. 3. Simulation setup for relay/IRS WPC systems with K user pairs.
1809
+ TABLE II
1810
+ THE BASELINE BENCHMARK METHODS
1811
+ Baseline 1
1812
+ Baseline 2
1813
+ Information Power Allocation
1814
+
1815
+
1816
+ Energy Waveform Design
1817
+
1818
+
1819
+ Time Allocation
1820
+
1821
+
1822
+ Energy/Information Relay Beamforming
1823
+
1824
+
1825
+ �γ = 3 is the path-loss exponent. It is assumed that the elements of �Hn and �Gn are i.i.d. CSCG
1826
+ random variables with zero mean and unit variance. As shown in Fig. 3, the transmitters and
1827
+ receivers are distributed uniformly within a circle with radius rT and rR, respectively. We set
1828
+ the distance parameters as d1 = d2 = d3 = 10 m and rT = rR = 5 m. The maximum power
1829
+ budget for Tk, relay, and IRS are set to prf
1830
+ k,n = prf
1831
+ R,n = 28 dBm, prf
1832
+ IRS = 20 dBm, ∀k, n, and
1833
+ the noise power at the relay, IRS and receivers are supposed to be σ2
1834
+ R,n = σ2
1835
+ k,n = δ2
1836
+ k,n = −80
1837
+ dBm, σ2
1838
+ IRS,n = −100 dBm, ∀k, n. The total bandwidth is fixed to Bt = 1 MHz. We further
1839
+ assume the total operation time T = 1. The curve fitting parameters for non-linear EH circuits
1840
+ are equal to �a = −0.11, �b = −1.17, and �c = −12 [32]. Also, we set K = 5, N = 8, MR = 6,
1841
+ and Emin,k = Emin = 10 µW, ∀k, unless otherwise specified. We solve the convex optimization
1842
+ problems using CVX [38].
1843
+ A. Relay System
1844
+ Here, we compare the results of the proposed algorithms with partially optimized methods
1845
+ (referred to as baseline schemes in the sequel) listed in Table II. For the first baseline method,
1846
+ the energy signals are not optimized, and in the second baseline method, there is no optimization
1847
+ January 3, 2023
1848
+ DRAFT
1849
+
1850
+ 20
1851
+ 1
1852
+ 2
1853
+ 3
1854
+ 4
1855
+ 5
1856
+ 0
1857
+ 1
1858
+ 2
1859
+ 3
1860
+ 4
1861
+ 5
1862
+ 6
1863
+ Minimum Rate (bps/Hz)
1864
+ Number of Outer Iterations
1865
+ 0.2
1866
+ 0.8
1867
+ 5.75
1868
+ 5.8
1869
+ Different Initializations
1870
+ (a)
1871
+ 1
1872
+ 2
1873
+ 3
1874
+ 4
1875
+ 5
1876
+ 6
1877
+ 7
1878
+ 0
1879
+ 1
1880
+ 2
1881
+ 3
1882
+ 4
1883
+ Minimum Rate (bps/Hz)
1884
+ Number of Inner Iterations
1885
+ (b)
1886
+ 1
1887
+ 2
1888
+ 3
1889
+ 4
1890
+ 5
1891
+ 6
1892
+ 7
1893
+ 8
1894
+ 9
1895
+ 10
1896
+ 11
1897
+ 4
1898
+ 4.2
1899
+ 4.4
1900
+ 4.6
1901
+ 4.8
1902
+ 5
1903
+ Number of Inner Iterations
1904
+ Minimum Rate (bps/Hz)
1905
+
1906
+
1907
+ (c)
1908
+ Fig. 4.
1909
+ Convergence behavior of the proposed method in Algorithm 1: (a) outer iterations for three random initial points,
1910
+ (b) inner iterations associated with the sub-problem III-A1 in the first outer iteration, (c) inner iterations associated with the
1911
+ sub-problem III-B in the first outer iteration.
1912
+ for the relay beamformer; more precisely, the relay amplification matrices are assumed to be
1913
+ identity matrices, i.e. UR
1914
+ E,n = �αE,nIMR, ∀n, and UR
1915
+ I,n = �αI,nIMR, ∀n, where the scalar parameters
1916
+ �αE,n and �αI,n are employed to satisfy the feasible set Ω in (16). The convergence of the proposed
1917
+ algorithm for inner and outer iterations (see Algorithm 1) are plotted in Fig. 4. This figure shows
1918
+ that the proposed algorithm converges within a few outer iterations. Also, in this example, the
1919
+ three different initializations lead to almost the same final value.
1920
+ In Fig. 5.a, we illustrate the rate-energy region of the proposed method in comparison with the
1921
+ first baseline method for different number of subbands. We can observe that the minimum rate
1922
+ increases as N grows. The optimal time allocation parameter τopt w.r.t. the EH target is depicted
1923
+ in Fig. 5.b. It is seen that the increased energy threshold Emin leads to a larger τ. As τ increases,
1924
+ the duration of the ID phase decreases. Therefore, as we observe in Fig. 5.a, the minimum rate
1925
+ reduces with increasing Emin. Also, the impact of the energy waveform design is evident in both
1926
+ figures. In Fig. 6.a and Fig. 6.b, we compare the minimum rate of the proposed optimal and sub-
1927
+ optimal approaches with baseline methods. As we can see in Fig. 6.a, increasing the number
1928
+ of pairs results in lower minimum rate for all methods with MR = 9. Furthermore, Fig. 6.b
1929
+ shows that a larger MR increases the minimum rate with an almost linear trend. The importance
1930
+ of the energy waveform and relay beamforming design is observed through both figures. We
1931
+ can see that the method with no relay beamforming has the worst performance compared to
1932
+ other methods since without a relay amplification matrix design, inter-pair interference cannot
1933
+ be managed.
1934
+ January 3, 2023
1935
+ DRAFT
1936
+
1937
+ 21
1938
+ 10 20 30 40 50 60 70 80 90 100110120130
1939
+ 0
1940
+ 1
1941
+ 2
1942
+ 3
1943
+ 4
1944
+ 5
1945
+ 6
1946
+ 7
1947
+ EH Target, Emin (µW )
1948
+ Minimum Rate (bps/Hz)
1949
+
1950
+
1951
+ Proposed - N = 8
1952
+ Baseline 1 - N = 8
1953
+ Proposed - N = 9
1954
+ Baseline 1 - N = 9
1955
+ (a) the rate-energy region
1956
+ 10 20 30 40 50 60 70 80 90 100110120130
1957
+ 0
1958
+ 0.2
1959
+ 0.4
1960
+ 0.6
1961
+ 0.8
1962
+ 1
1963
+ EH Target, Emin (µW )
1964
+ Time Allocation Parameter (s)
1965
+
1966
+
1967
+ Proposed - N = 8
1968
+ Baseline 1 - N = 8
1969
+ Proposed - N = 9
1970
+ Baseline 1 - N = 9
1971
+ (b) the time allocation parameter τopt
1972
+ Fig. 5. Comparison of the proposed and baseline 1 methods for different number of subbands N = 8, 9.
1973
+ 3
1974
+ 4
1975
+ 5
1976
+ 6
1977
+ 7
1978
+ 8
1979
+ 3
1980
+ 4
1981
+ 5
1982
+ 6
1983
+ 7
1984
+ 8
1985
+ 9
1986
+ 10
1987
+ 11
1988
+ 12
1989
+ Number of Pairs, K
1990
+ Minimum Rate (bps/Hz)
1991
+
1992
+
1993
+ Proposed
1994
+ Baseline 1
1995
+ Proposed (t−static)
1996
+ Proposed (t−f−static)
1997
+ Baseline 2
1998
+ (a) minimum rate versus number of pairs K
1999
+ 5
2000
+ 6
2001
+ 7
2002
+ 8
2003
+ 9
2004
+ 10
2005
+ 2
2006
+ 3
2007
+ 4
2008
+ 5
2009
+ 6
2010
+ 7
2011
+ 8
2012
+ 9
2013
+ Number of Antennas, MR
2014
+ Minimum Rate (bps/Hz)
2015
+
2016
+
2017
+ Proposed
2018
+ Baseline 1
2019
+ Proposed (t−static)
2020
+ Proposed (t−f−static)
2021
+ Baseline 2
2022
+ (b) minimum rate versus number of antennas MR
2023
+ Fig. 6. Comparison of the proposed optimal and sub-optimal methods with baseline methods.
2024
+ B. IRS System
2025
+ In this subsection, the performance of the proposed IRS-assisted WPC system is evaluated.
2026
+ Since most of the studied scenarios for relay (i.e., Fig. 4, Fig. 5, and Fig. 6.a) have similar trends
2027
+ for IRS, we only consider the scenario of Fig. 6.b, for the sake of brevity. As we can see from
2028
+ Fig.7, in the case of IRS, the minimum rate has a super-linear ascent property versus increasing
2029
+ MIRS.
2030
+ V. CONCLUSION
2031
+ In this paper, the max-min rate maximization in a multi-carrier relay/IRS WPC system with a
2032
+ joint TS scheme was considered. A unified framework was proposed to maximize the minimum
2033
+ rate of the user pairs in both relay and IRS systems by jointly designing the energy waveforms,
2034
+ January 3, 2023
2035
+ DRAFT
2036
+
2037
+ 22
2038
+ 7
2039
+ 10
2040
+ 13
2041
+ 16
2042
+ 19
2043
+ 22
2044
+ 3
2045
+ 3.5
2046
+ 4
2047
+ 4.5
2048
+ 5
2049
+ 5.5
2050
+ Number of REs, MIRS
2051
+ Minimum Rate (bps/Hz)
2052
+
2053
+
2054
+ Proposed
2055
+ Proposed (t−static)
2056
+ Fig. 7. The effect of the number of REs MIRS for the proposed optimal and sub-optimal IRS methods.
2057
+ power of information waveforms, amplification matrices, and the time allocation parameter.
2058
+ The non-linearity in EH circuits was also considered in the design problem. The non-convex
2059
+ problem was handled via the MM technique. Numerical results demonstrated the effectiveness of
2060
+ the proposed algorithm in terms of the minimum rate. As a extended future work in this area, it
2061
+ might be interesting to develop a distributed algorithm for design of multi-user relay/IRS WPC
2062
+ systems.
2063
+ APPENDIX A
2064
+ THE DERIVATION OF THE EXPRESSIONS IN (21) AND (25)-(27)
2065
+ Using tr
2066
+
2067
+ XHY
2068
+
2069
+ = vec(X)Hvec(Y) and vec(XYZ) = (ZT ⊗ X)vec(Y), the power of the
2070
+ relay signal for ID mode in (7) can be obtained as
2071
+ E
2072
+
2073
+ ∥�r(t)∥2
2074
+ 2
2075
+
2076
+ = 1
2077
+ 2
2078
+ N
2079
+
2080
+ n=1
2081
+
2082
+ uH
2083
+ I,nvec
2084
+
2085
+ UI,nHnQI,nHH
2086
+ n
2087
+
2088
+ + σ2
2089
+ nuH
2090
+ I,nuI,n
2091
+
2092
+ = 1
2093
+ 2
2094
+ N
2095
+
2096
+ n=1
2097
+
2098
+ uH
2099
+ I,n
2100
+ ��
2101
+ HnQI,nHH
2102
+ n
2103
+ �T ⊗ IMR
2104
+
2105
+ uI,n + σ2
2106
+ nuH
2107
+ I,nuI,n
2108
+
2109
+ = 1
2110
+ 2
2111
+ N
2112
+
2113
+ n=1
2114
+ uH
2115
+ I,n �AR
2116
+ I,nuI,n.
2117
+ Similarly, we can derive the power of the relay signal for the EH mode in (20) and the expressions
2118
+ in (25)–(27).
2119
+ January 3, 2023
2120
+ DRAFT
2121
+
2122
+ 23
2123
+ APPENDIX B
2124
+ PROOF OF LEMMA 1
2125
+ By defining a positive semi-definite matrix D such that ∇2
2126
+ xs(x) ⪯ D, we can write the
2127
+ following majorizer for s(x) as [39]
2128
+ s(x) ≤ s(x0) + ℜ
2129
+
2130
+ (∇xs(x))H |x=x0(x − x0)
2131
+
2132
+ + (x − x0)HD(x − x0),
2133
+ (64)
2134
+ where the gradient and Hessian of s(x) are respectively expressed as
2135
+ ∇xs(x) = −2 log2 e
2136
+ xHTx + ν Tx,
2137
+ (65)
2138
+ ∇2
2139
+ xs(x) =
2140
+
2141
+ −2T
2142
+ xHTx + ν +
2143
+ 4TxxHT
2144
+ (xHTx + ν)2
2145
+
2146
+ log2 e.
2147
+ Since T ⪰ 0, the term
2148
+ −2T
2149
+ xHTx+ν is negative semi-definite, and thus we obtain ξ > 0 such that for
2150
+ any ν ⩾ 0
2151
+ 4TxxHT
2152
+ (xHTx + ν)2 log2 e ⩽ 4TxxHT
2153
+ (xHTx)2 ⩽ ξIM2
2154
+ R.
2155
+ Also, as TxxHT is a rank-one matrix, we can choose ξ as ξ ⩾ 4φ, where φ is given as
2156
+ φ = max
2157
+ x
2158
+ xHT2x
2159
+ (xHTx)2.
2160
+ (66)
2161
+ Then by choosing a = VHx, where V is a full-rank matrix such that T = VVH, the following
2162
+ optimization is equivalently obtained from (66) as
2163
+ φ = max
2164
+ a
2165
+ aHVHVa
2166
+ aHa
2167
+ 1
2168
+ aHa.
2169
+ (67)
2170
+ Using xHQx ≤ P and applying a similar procedure in [39, Appendix B], we can write
2171
+ φ ≤
2172
+ Pλmax(T)
2173
+ vH
2174
+ 1 V−1QV−Hv1
2175
+ ,
2176
+ where v1 is the principal eigenvector of VHV. Finally, from (64), (65), and ξ = 4φ, we obtain
2177
+ b = ∇s(x)|x=x0 =
2178
+ −2 log2 e
2179
+ xH
2180
+ 0 Tx0+νTx0 and D =
2181
+ 4P
2182
+ wH
2183
+ 1 Qw1IM2
2184
+ R, where w1 is the principal eigenvector of
2185
+ T.
2186
+ January 3, 2023
2187
+ DRAFT
2188
+
2189
+ 24
2190
+ APPENDIX C
2191
+ A SELECTION OF βk,n,a AND βk,n,b
2192
+ The value of βk,n,b should be selected such that ∇2
2193
+ sE,nEk
2194
+
2195
+ {sE,n}N
2196
+ n=1
2197
+
2198
+ +βk,n,bIK ⪰ 0. The term
2199
+ ∇2
2200
+ sE,nEk
2201
+
2202
+ {sE,n}N
2203
+ n=1
2204
+
2205
+ is straightforwardly calculated as
2206
+ ∇2
2207
+ sE,nEk
2208
+
2209
+ {sE,n}N
2210
+ n=1
2211
+
2212
+ =̺k
2213
+ N
2214
+
2215
+ n=1
2216
+ Ξk,n + ηk
2217
+ N
2218
+
2219
+ n=1
2220
+ N
2221
+
2222
+ n′=1
2223
+ Ξk,nsE,nsH
2224
+ E,n′Ξk,n′,
2225
+ (68)
2226
+ where
2227
+ ̺k = τ
2228
+ ρexp�c exp
2229
+
2230
+ �alog2pE,k
2231
+
2232
+ p
2233
+ �b−1
2234
+ E,k
2235
+
2236
+ 2�a log pE,k + �b
2237
+
2238
+ ,
2239
+ ηk =
2240
+ τexp�c exp
2241
+
2242
+ �alog2pE,k
2243
+
2244
+ p
2245
+ �b−2
2246
+ E,k
2247
+ ρ
2248
+
2249
+ 4�a2log2pE,k +
2250
+
2251
+ 4�a�b − 2�a
2252
+
2253
+ log pE,k + �b2 −�b + 2�a
2254
+
2255
+ .
2256
+ As �a < 0,�b < 0, Ξk,n ⪰ 0, and Ξk,nsE,nsH
2257
+ E,nΞk,n ⪰ 0, it suffices to choose βk,n,b such that
2258
+ βk,n,bIK ⪰ − �̺k
2259
+ N
2260
+
2261
+ n=1
2262
+ Ξk,n − �ηk
2263
+ N
2264
+
2265
+ n=1
2266
+ N
2267
+
2268
+ n′=1
2269
+ Ξk,nsE,nsH
2270
+ E,n′Ξk,n′,
2271
+ (69)
2272
+ where
2273
+ �̺k = τ
2274
+ ρ
2275
+ �b exp�c exp
2276
+
2277
+ �alog2pE,k
2278
+
2279
+ p
2280
+ �b−1
2281
+ E,k ,
2282
+ �ηk =τ
2283
+ ρexp�c exp
2284
+
2285
+ �alog2pE,k
2286
+
2287
+ p
2288
+ �b−2
2289
+ E,k
2290
+
2291
+ log pE,k
2292
+
2293
+ 4�a�b − 2�a
2294
+
2295
+ + 2�a
2296
+
2297
+ .
2298
+ Thus from (3), we can write
2299
+ ∥sE,n∥2
2300
+ 2 ≤ 2ρT
2301
+ τ
2302
+ K
2303
+
2304
+ k=1
2305
+ prf
2306
+ k,n.
2307
+ (70)
2308
+ Finally, using (16), (69), (70) and knowing that sH
2309
+ E,nΞk,nsE,n ≤ ∥sE,n∥2
2310
+ 2λmax (Ξk,n), we can select
2311
+ βk,n,b > βt
2312
+ k,n,b where
2313
+ βt
2314
+ k,n,b = − τ
2315
+ ρexp�c exp
2316
+
2317
+ 2�alog2T
2318
+ N
2319
+
2320
+ n=1
2321
+ λmax (Ξk,n)
2322
+ K
2323
+
2324
+ k=1
2325
+ prf
2326
+ k,n
2327
+
2328
+ �f
2329
+ �b−2
2330
+ k
2331
+ � ��
2332
+ 4�a�b − 2�a
2333
+
2334
+ log �fk + 2�a
2335
+
2336
+ ×
2337
+ N
2338
+
2339
+ n=1
2340
+ N
2341
+
2342
+ n′=1
2343
+ λmax (Ξk,nΞk,n′)
2344
+ K
2345
+
2346
+ k=1
2347
+
2348
+ prf
2349
+ k,nprf
2350
+ k,n′ + �b �fk
2351
+ N
2352
+
2353
+ n=1
2354
+ λmax (Ξk,n)
2355
+
2356
+ ,
2357
+ with �fk = exp
2358
+
2359
+ −�b−
2360
+
2361
+ �b2−4�a log
2362
+ ρEmin,k
2363
+ τexp�c
2364
+ 2�a
2365
+
2366
+ . We can take similar steps for selecting βt
2367
+ k,n,a.
2368
+ January 3, 2023
2369
+ DRAFT
2370
+
2371
+ 25
2372
+ APPENDIX D
2373
+ PROOF OF LEMMA 2
2374
+ The ID part of the relay power constraint in (20) is uH
2375
+ I,n �AR
2376
+ I,nuI,n. Only (iMIRS + i+ 1)th, 0 ≤
2377
+ i ≤ MIRS − 1 entries of uI,n = vec(Diag(θI)) are non-zero for the IRS system. Thus, we can
2378
+ rewrite uH
2379
+ I,n �AR
2380
+ I,nuI,n for IRS system as θH
2381
+ I �AIRS
2382
+ I,n θI, where �AIRS
2383
+ I,n contains only the (kMIRS + k +
2384
+ 1, lMIRS +l+1)th, 0 ≤ k, l ≤ MIRS −1 entries of �AI,n which is the same as �AR
2385
+ I,n with replacing
2386
+ MR by MIRS. Therefore, from (21) and by using some matrix manipulations, we obtain
2387
+ �AIRS
2388
+ I,n =
2389
+
2390
+ HnQI,nHH
2391
+ n
2392
+ �T ⊙ IMIRS + σ2
2393
+ nIMIRS.
2394
+ (71)
2395
+ Other expressions in (44)-(48) are similarly obtained.
2396
+ REFERENCES
2397
+ [1] C. K. Ho and R. Zhang, “Optimal energy allocation for wireless communications with energy harvesting constraints,”
2398
+ IEEE Transactions on Signal Processing, vol. 60, no. 9, pp. 4808–4818, Sept. 2012.
2399
+ [2] T. D. P. Perera, D. N. K. Jayakody, S. K. Sharma, S. Chatzinotas, and J. Li, “Simultaneous wireless information and power
2400
+ transfer (SWIPT): Recent advances and future challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp.
2401
+ 264–302, Firstquarter 2017.
2402
+ [3] L. Liu, R. Zhang, and K.-C. Chua, “Wireless information transfer with opportunistic energy harvesting,” IEEE Transactions
2403
+ on Wireless Communications, vol. 12, no. 1, pp. 288–300, January 2012.
2404
+ [4] J. Rostampoor, S. M. Razavizadeh, and I. Lee, “Energy efficient precoding design for SWIPT in MIMO two-way relay
2405
+ networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 7888–7896, Sept. 2017.
2406
+ [5] C.-T. Lin, R. Y. Chang, and F.-S. Tseng, “Source and relay precoding for full-duplex MIMO relaying with a SWIPT-enabled
2407
+ destination,” IEEE Communications Letters, vol. 22, no. 8, pp. 1700–1703, Aug. 2018.
2408
+ [6] Y. Chen, Z. Wen, S. Wang, J. Sun, and M. Li, “Joint relay beamforming and source receiving in MIMO two-way AF relay
2409
+ network with energy harvesting,” in IEEE Vehicular Technology Conference (VTC Spring), May 2015, pp. 1–5.
2410
+ [7] M. D. Renzo, M. Debbah, D.-T. Phan-Huy, A. Zappone, M.-S. Alouini, C. Yuen, V. Sciancalepore, G. C. Alexandropoulos,
2411
+ J. Hoydis, H. Gacanin et al., “Smart radio environments empowered by reconfigurable AI meta-surfaces: An idea whose
2412
+ time has come,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, pp. 1–20, 2019.
2413
+ [8] Q. Wu and R. Zhang, “Weighted sum power maximization for intelligent reflecting surface aided SWIPT,” IEEE Wireless
2414
+ Communications Letters, vol. 9, no. 5, pp. 586–590, 2019.
2415
+ [9] A. Khalili, S. Zargari, Q. Wu, D. W. K. Ng, and R. Zhang, “Multi-objective resource allocation for IRS-aided SWIPT,”
2416
+ IEEE Wireless Communications Letters, vol. 10, no. 6, pp. 1324–1328, 2021.
2417
+ [10] Q. Wu and R. Zhang, “Joint active and passive beamforming optimization for intelligent reflecting surface assisted SWIPT
2418
+ under QoS constraints,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 8, pp. 1735–1748, 2020.
2419
+ [11] C. Pan, H. Ren, K. Wang, M. Elkashlan, A. Nallanathan, J. Wang, and L. Hanzo, “Intelligent reflecting surface aided
2420
+ MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE Journal on Selected Areas in
2421
+ Communications, vol. 38, no. 8, pp. 1719–1734, 2020.
2422
+ January 3, 2023
2423
+ DRAFT
2424
+
2425
+ 26
2426
+ [12] A. Boaventura, A. Collado, N. B. Carvalho, and A. Georgiadis, “Optimum behavior: Wireless power transmission system
2427
+ design through behavioral models and efficient synthesis techniques,” IEEE Microwave Magazine, vol. 14, no. 2, pp. 26–35,
2428
+ March-April 2013.
2429
+ [13] B. Clerckx, E. Bayguzina, D. Yates, and P. D. Mitcheson, “Waveform optimization for wireless power transfer with
2430
+ nonlinear energy harvester modeling,” in 2015 International Symposium on Wireless Communication Systems (ISWCS),
2431
+ Aug. 2015, pp. 276–280.
2432
+ [14] M. R. V. Moghadam, Y. Zeng, and R. Zhang, “Waveform optimization for radio-frequency wireless power transfer,” in
2433
+ IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), July 2017, pp. 1–6.
2434
+ [15] B. Clerckx and E. Bayguzina, “Low-complexity adaptive multisine waveform design for wireless power transfer,” IEEE
2435
+ Antennas and Wireless Propagation Letters, vol. 16, pp. 2207–2210, May 2017.
2436
+ [16] Y. Huang and B. Clerckx, “Waveform design for wireless power transfer with limited feedback,” IEEE Transactions on
2437
+ Wireless Communications, vol. 17, no. 1, pp. 415–429, Jan. 2017.
2438
+ [17] Y. Zhao, B. Clerckx, and Z. Feng, “IRS-aided SWIPT: Joint waveform, active and passive beamforming design under
2439
+ nonlinear harvester model,” IEEE Transactions on Communications, vol. 70, no. 2, pp. 1345–1359, 2021.
2440
+ [18] Y. Huang and B. Clerckx, “Large-scale multiantenna multisine wireless power transfer,” IEEE Transactions on Signal
2441
+ Processing, vol. 65, no. 21, pp. 5812–5827, Nov. 2017.
2442
+ [19] B. Clerckx, Z. B. Zawawi, and K. Huang, “Wirelessly powered backscatter communications: Waveform design and SNR-
2443
+ energy tradeoff,” IEEE Communications Letters, vol. 21, no. 10, pp. 2234–2237, Oct. 2017.
2444
+ [20] Z. B. Zawawi, Y. Huang, and B. Clerckx, “Multiuser wirelessly powered backscatter communications: Nonlinearity,
2445
+ waveform design, and SINR-energy tradeoff,” IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 241–253,
2446
+ Jan. 2018.
2447
+ [21] B. Clerckx, “Wireless information and power transfer: Nonlinearity, waveform design, and rate-energy tradeoff,” IEEE
2448
+ Transactions on Signal Processing, vol. 66, no. 4, pp. 847–862, Feb. 2017.
2449
+ [22] H. Lee, K. Lee, H. Kim, and I. Lee, “Joint transceiver optimization for MISO SWIPT systems with time switching,” IEEE
2450
+ Transactions on Wireless Communications, vol. 17, no. 5, pp. 3298–3312, May 2018.
2451
+ [23] Z. Zhang, L. Dai, X. Chen, C. Liu, F. Yang, R. Schober, and H. V. Poor, “Active RIS vs. passive RIS: Which will prevail
2452
+ in 6G?” arXiv preprint arXiv:2103.15154, 2021.
2453
+ [24] W. Shin, B. Lee, B. Shim, and J. Lee, “A MIMO relay with delayed feedback can improve DoF in k-user MISO interference
2454
+ channel with no CSIT,” IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 10 188–10 192, 2016.
2455
+ [25] T. Jiang and W. Yu, “Interference nulling using reconfigurable intelligent surface,” IEEE Journal on Selected Areas in
2456
+ Communications, 2022.
2457
+ [26] A. H. A. Bafghi, V. Jamali, M. Nasiri-Kenari, and R. Schober, “Degrees of freedom of the k-user interference channel in
2458
+ the presence of intelligent reflecting surfaces,” arXiv preprint arXiv:2012.13787, 2020.
2459
+ [27] Z. Cheng, N. Devroye, and T. Liu, “The degrees of freedom of full-duplex bidirectional interference networks with and
2460
+ without a MIMO relay,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 2912–2924, 2015.
2461
+ [28] Z. Wang, L. Liu, and S. Cui, “Channel estimation for intelligent reflecting surface assisted multiuser communications:
2462
+ Framework, algorithms, and analysis,” IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6607–6620,
2463
+ 2020.
2464
+ [29] D. Kudathanthirige and G. A. A. Baduge, “Massive MIMO configurations for multi-cell multi-user relay networks,” IEEE
2465
+ Transactions on Wireless Communications, vol. 17, no. 3, pp. 1849–1868, 2017.
2466
+ [30] R. Long, Y.-C. Liang, Y. Pei, and E. G. Larsson, “Active reconfigurable intelligent surface-aided wireless communications,”
2467
+ IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 4962–4975, 2021.
2468
+ January 3, 2023
2469
+ DRAFT
2470
+
2471
+ 27
2472
+ [31] J.-F. Bousquet, S. Magierowski, and G. G. Messier, “A 4-GHz active scatterer in 130-nm CMOS for phase sweep amplify-
2473
+ and-forward,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 59, no. 3, pp. 529–540, 2011.
2474
+ [32] B. Clerckx and J. Kim, “On the beneficial roles of fading and transmit diversity in wireless power transfer with nonlinear
2475
+ energy harvesting,” IEEE Transactions on Wireless Communications, vol. 17, no. 11, pp. 7731–7743, Nov. 2018.
2476
+ [33] J. Song, P. Babu, and D. P. Palomar, “Sequence design to minimize the weighted integrated and peak sidelobe levels,”
2477
+ IEEE Transactions on Signal Processing, vol. 64, no. 8, pp. 2051–2064, 2015.
2478
+ [34] O. Rezaei, M. M. Naghsh, Z. Rezaei, and R. Zhang, “Throughput optimization for wireless powered interference channels,”
2479
+ IEEE Transactions on Wireless Communications, vol. 18, no. 5, pp. 2464–2476, May 2019.
2480
+ [35] M. M. Naghsh, M. Masjedi, A. Adibi, and P. Stoica, “Max–min fairness design for MIMO interference channels: A
2481
+ minorization–maximization approach,” IEEE Transactions on Signal Processing, vol. 67, no. 18, pp. 4707–4719, Sept.
2482
+ 2019.
2483
+ [36] A. Ben-Tal and A. Nemirovski, Lectures on modern convex optimization: analysis, algorithms, and engineering applications.
2484
+ SIAM, 2001.
2485
+ [37] A. Czumaj, “Very fast approximation of the matrix chain product problem,” Journal of Algorithms, vol. 21, no. 1, pp.
2486
+ 71–79, 1996.
2487
+ [38] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.0 beta, sept. 2012,” Available
2488
+ on-line at http://cvxr. com/cvx.
2489
+ [39] M. M. Naghsh, M. Soltanalian, P. Stoica, M. Masjedi, and B. Ottersten, “Efficient sum-rate maximization for medium-scale
2490
+ MIMO AF-relay networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 6400–6411, Sept. 2016.
2491
+ January 3, 2023
2492
+ DRAFT
2493
+
X9AyT4oBgHgl3EQfWfd0/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
X9E4T4oBgHgl3EQfNwwL/content/tmp_files/2301.04958v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
X9E4T4oBgHgl3EQfNwwL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
YdE2T4oBgHgl3EQfEQZV/content/tmp_files/2301.03633v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
YdE2T4oBgHgl3EQfEQZV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/2301.11680v1.pdf.txt ADDED
@@ -0,0 +1,1407 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11680v1 [cs.IT] 27 Jan 2023
2
+ Codes for Correcting Asymmetric Adjacent
3
+ Transpositions and Deletions
4
+ Shuche Wang∗, Van Khu Vu§, and Vincent Y. F. Tan†‡∗
5
+ ∗ Institute of Operations Research and Analytics, National University of Singapore, Singapore
6
+ † Department of Mathematics, National University of Singapore, Singapore
7
+ ‡ Department of Electrical and Computer Engineering, National University of Singapore, Singapore
8
+ § Department of Industrial Systems Engineering and Management, National University of Singapore, Singapore
9
+ Emails: shuche.wang@u.nus.edu, isevvk@nus.edu.sg, vtan@nus.edu.sg
10
+ Abstract
11
+ Owing to the vast applications in DNA-based data storage, Gabrys, Yaakobi, and Milenkovic recently proposed to study codes
12
+ in the Damerau–Levenshtein metric, where both deletion and adjacent transposition errors occur. In particular, they designed a
13
+ code correcting a single deletion and s adjacent transpositions with at most (1 + 2s) log n bits of redundancy. In this work, we
14
+ consider a new setting where both asymmetric adjacent transpositions (also known as right-shifts or left-shifts) and deletions occur.
15
+ We present several constructions of the codes correcting these errors in various cases. In particular, we design a code correcting
16
+ a single deletion, s+ right-shift, and s− left-shift errors with at most (1 + s) log(n + s + 1) + 1 bits of redundancy where
17
+ s = s+ + s−. In addition, we investigate codes correcting t 0-deletions and s adjacent transpositions with both unique decoding
18
+ and list-decoding algorithms. Our main contribution here is a construction of a list-decodable code with list-size O(nmin{s+1,t})
19
+ and has at most (max{t, s + 1}) log n + O(1) bits of redundancy. Finally, we provide both non-systematic and systematic codes
20
+ for correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions.
21
+ I. INTRODUCTION
22
+ The Levenshtein (edit) distance of two different strings is the smallest number of operations (including deletions, insertions,
23
+ and substitutions) required to transform one string into the other. This metric has a long history and has attracted a lot of research
24
+ in computer science in the past as well as recently [2]–[4]. Codes in the Levenshtein metric have been investigated extensively
25
+ recently due to theoretical interests and their numerous applications, including racetrack memory [5]–[7] and DNA-based data
26
+ storage [8]–[10].
27
+ This paper was presented in part at the 2022 IEEE Information Theory Workshop (ITW) [1].
28
+
29
+ 1
30
+ In some channels, such as DNA-based data storage ones, we observe that, besides deletions, insertions, and substitutions,
31
+ there are also adjacent transpositions. Hence, there exists some recent work concerning the Damerau–Levenshtein distance
32
+ which is motivated by applications to DNA-based data storage. The distance is a generalization of the well-known Levenshtein
33
+ distance taking into account adjacent transpositions. More precisely, the Damerau–Levenshtein metric is the smallest number
34
+ of operations (including deletions, insertions, substitutions, and adjacent transpositions) required to transform one string into
35
+ another. We note that it is possible to compute the exact Damerau–Levenshtein distance of two strings in polynomial time [11]
36
+ but it is not known if we can compute the distance in linear time. Recently, Gabrys, Yaaboki, and Milenkovic [12] proposed
37
+ to study codes in the Damerau–Levenshtein distance. They provided several constructions of codes correcting both deletions
38
+ and adjacent transpositions. However, these codes are not optimal in general. For example, to correct a single deletion and
39
+ at most s adjacent transpositions, the authors require (1 + 2s) log n bits of redundancy. Designing an optimal code correcting
40
+ both deletions and multiple adjacent transpositions has turned out to be a formidable challenge for coding theorists in recent
41
+ times.
42
+ The problem of constructing codes for correcting synchronization errors, including deletions and insertions, was first
43
+ investigated by Levenshtein [13] and Ullman [14], [15]. Sticky deletions/insertions and duplication deletions can be considered
44
+ as asymmetric deletions/insertions via the Gray mapping [16]. Owing to various applications, such as in flash memories [17],
45
+ [18], racetrack memories [6], and DNA data storage systems [19], [20], codes for correcting asymmetric deletions/insertions
46
+ have garnered significant attention recently. Tallini et al. [16], [21]–[24] provided a series of theories and code designs for
47
+ correcting these kinds of errors. Especially, Mahdavifar and Vardy [18] provided some efficient encoding/decoding algorithms
48
+ for an optimal code correcting sticky-insertion and thus for an optimal code correcting 0-deletion.
49
+ Codes correcting adjacent transposition errors have been investigated for a long time as codes for shift errors [25]–[27].
50
+ Codes correcting asymmetric shift errors have also been studied recently [28]. In this work, we are interested in codes correcting
51
+ a combination of both asymmetric adjacent transposition errors and deletion errors. We aim to obtain some optimal codes with
52
+ simple efficient encoding/decoding algorithms.
53
+ We note that codes correcting substitutions, deletions, and their combinations have attracted a lot of research recently [29],
54
+ [30]. However, there are only a few code constructions that correct a combination of adjacent transposition and other kinds of
55
+ errors. Klove [31] proposed a class of perfect constant-weight codes capable of correcting a single deletion, a single insertion or
56
+ an adjacent transposition. Gabrys, Yaakobi, and Milenkovic [12] presented several codes correcting a combination of deletions
57
+ and adjacent transpositions. If there is a single adjacent transposition or a single deletion, there exist codes correcting the error
58
+ with at most log n + O(log log n) bits of redundancy [32]. The best-known codes correcting a single deletion and at most s
59
+
60
+ 2
61
+ adjacent transpositions require (1 + 2s) log n bits of redundancy [12]. In this work, we design several new families of codes
62
+ in numerous cases. We provide our main contributions as follows.
63
+ Our first contribution in this work is Construction 1, which presents a construction of an optimal code correcting a single
64
+ adjacent transposition or a single 0-deletion. Analyzing the size of our code, we obtain the following result.
65
+ Theorem 1. There is a code correcting a single 0-deletion or a single adjacent transposition with at most log n + 2 bits of
66
+ redundancy.
67
+ Next, we construct a code correcting t 0-deletions and s adjacent transpositions with at most (t + 2s) log n + o((t +
68
+ 2s) log n) bits of redundancy. The constructed code is the best known that corrects multiple 0-deletions and multiple adjacent
69
+ transpositions. See Theorem 7 for the detail.
70
+ Theorem2. There is a code correcting t 0-deletions and s adjacent transpositions with at most (t+2s) log n+o((t+2s) log n)
71
+ bits of redundancy.
72
+ Further, we construct an optimal code for correcting a single deletion, s+ right-shift and s− left-shift errors. Throughout
73
+ this paper, we denote the adjacent transposition as 01 → 10 or 10 → 01, right-shift of 0 as 01 → 10 and left-shift of 0 as
74
+ 10 → 01. See Construction 2 and Theorem 8 for the detail.
75
+ Theorem 3. There is a code correcting a single deletion, s+ right-shift and s− left-shift errors with at most (1 + s) log(n +
76
+ s + 1) + 1 bits of redundancy where s = s+ + s−.
77
+ Compare the results in [12], where the code for correcting a single deletion and s adjacent transpositions needs at most
78
+ (1 + 2s) log(n + 2s + 1) redundancy. If we know the direction of these s adjacent transpositions containing s+ right-shifts
79
+ of 0 and s− left-shifts of 0, the redundancy of the code can be further reduced to at most (1 + s) log(n + s + 1) + 1 where
80
+ s = s+ + s−.
81
+ We also investigate list-decodable codes of small list-size and construct a list-decodable code for at most t 0-deletions and
82
+ s adjacent transpositions. See the proof of Theorem 9 for the construction. Our results are the first known list-decodable codes
83
+ for the asymmetric Damerau–Levenshtein distance.
84
+ Theorem 4. There is a list-decodable code that can correct t 0-deletions and s adjacent transpositions with list size
85
+ O(nmin(t,s+1)) and has max(t, s + 1) log n + O(1) bits of redundancy.
86
+ Finally, we construct both non-systematic and systematic codes for correcting t blocks of 0-deletions with ℓ-limited-magnitude
87
+ and s adjacent transpositions. See the proof of Theorem 10 for the construction.
88
+
89
+ 3
90
+ Theorem5. There is a code capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions
91
+ with at most ⌈2(t + 2s)(1 − 1/p)⌉ log(n + 1) + O(1) bits of redundancy, where p is the smallest prime larger than tℓ + 2.
92
+ The rest of this paper is organized as follows. Section II provides the notation and preliminaries. Section III presents three
93
+ uniquely-decodable codes for correcting asymmetric deletions and adjacent transpositions. Section IV proposes list-decodable
94
+ codes for correcting asymmetric deletions and adjacent transpositions with low redundancy. In Section V, we construct codes
95
+ both non-systematic and systematic codes are capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s
96
+ adjacent transpositions. Finally, Section VI concludes this paper.
97
+ II. NOTATION AND PRELIMINARIES
98
+ We now describe the notations used throughout this paper. Σq denotes the finite alphabet of size q and Σn
99
+ q represents the set
100
+ of all sequences of length n over Σq. Without loss of generality, we assume Σq = {0, 1, . . ., q − 1}. For two integers i < j,
101
+ let [i, j] denote the set {i, i + 1, i + 2, . . . , j}. The size of a binary code C ⊆ Σn
102
+ 2 is denoted |C| and its redundancy is defined
103
+ as n − log |C|, where all logarithms without a base in this paper are to the base 2.
104
+ We write sequences with bold letters, such as x and their elements with plain letters, e.g., x = x1 · · · xn for x ∈ Σn
105
+ q . The
106
+ length of the sequence x is denoted |x|. The weight wt(x) of a sequence x represents the number of non-zero symbols in it.
107
+ A run is a maximal substring consisting of identical symbols and nr(x) denotes the number of runs of the sequence x. For
108
+ functions, if the output is a sequence, we also write them with bold letters, such as φ(x). The ith position in φ(x) is denoted
109
+ φ(x)i. In addition, for a sequence u ∈ Σn
110
+ q , denote (u mod a) = (u1 mod a, u2 mod a, . . . , un mod a), where a < q.
111
+ For a binary sequence x ∈ Σn
112
+ 2, we can uniquely write it as x = 0u110u210u3 . . . 10uw+1, where w = wt(x).
113
+ Definition 1. Define function φ
114
+ :
115
+ Σn
116
+ 2
117
+
118
+ Σw+1 and φ(x)
119
+ def=
120
+ (u1, u2, u3, . . . , uw+1)
121
+
122
+ Σw+1, where x
123
+ =
124
+ 0u110u210u3 . . . 10uw+1 with w = wt(x).
125
+ Example 1. Suppose x = (0, 1, 1, 1, 0, 1, 0, 1, 0, 0). Then, φ(x) = (1, 0, 0, 1, 1, 2).
126
+ Definition 2. Define function ψ : Σn
127
+ 2 → Σn
128
+ 2 such that ψ(x) = (x1, x1 + x2, . . . , x1 + x2 + · · · + xn).
129
+ Definition 3. The Lee weight of an element xi ∈ Σq is defined by
130
+ wL(xi) =
131
+
132
+
133
+
134
+
135
+
136
+
137
+
138
+
139
+
140
+ xi,
141
+ if 0 ≤ xi ≤ q/2
142
+ q − xi,
143
+ otherwise
144
+ For a sequence x ∈ Σn
145
+ q , the Lee weight of x is
146
+ wL(x) =
147
+ n
148
+
149
+ i=1
150
+ wL(xi).
151
+
152
+ 4
153
+ Define the Lee distance of two sequences x, x′ ∈ Σn
154
+ q as
155
+ dL(x, x′) = wL(x − x′).
156
+ Example 2. Suppose x ∈ Σ7
157
+ 6 = (1, 4, 0, 5, 2, 3, 4). Then, wL(x) = 1 + 2 + 0 + 1 + 2 + 3 + 2 = 11.
158
+ Example 3. Suppose x ∈ Σ7
159
+ 6 = (1, 4, 0, 5, 2, 3, 4) and x′ ∈ Σ7
160
+ 6 = (0, 3, 0, 5, 3, 3, 3). Then, x − x′ = (1, 1, 0, 0, 5, 0, 1) and
161
+ dL(x, x′) = wL(x − x′) = 4.
162
+ For any x ∈ Σn
163
+ 2, denote Bt,s(x) as the error ball of x under t 0-deletions and s adjacent transpositions. The code Ct,s(n) is
164
+ a unique-decodable code for correcting t 0-deletions and s adjacent transpositions, for which holds that Bt,s(c1)∩Bt,s(c2) = ∅
165
+ for all c1, c2 ∈ Ct,s(n). The code CList
166
+ t,s (n) is a list-decodable code for correcting t 0-deletions and s adjacent transpositions
167
+ with list size L such that for any corrupted sequence x′ ∈ Σn−t
168
+ 2
169
+ there exist at most L codewords in CList
170
+ t,s (n) that can be
171
+ obtained by t 0-deletions and s adjacent transpositions.
172
+ Example 4. Suppose x = (0, 1, 1, 1, 0, 1, 0, 1, 0, 0), the first and last 0 bits are deleted and two pairs of ((4th, 5th) and (7th,
173
+ 8th)) adjacent bits are transposed in x = (❆0, 1, 1, 1, 0, 1, 0, 1, 0, ❆0). Then, x′ = (1, 1, 0, 1, 1, 1, 0, 0) ∈ B2,2(x).
174
+ Proposition 1. Once a 0-deletion occurs in x and we receive x′, there is an index i such that φ(x)i − 1 = φ(x′)i.
175
+ Proposition 2. Suppose an adjacent transposition occurs in x at the ith 1, the corresponding changes in φ(x) can be shown
176
+ as follows:
177
+ 1) 10 → 01: (φ(x)′
178
+ i, φ(x)′
179
+ i+1) = (φ(x)i + 1, φ(x)i+1 − 1).
180
+ 2) 01 → 10: (φ(x)′
181
+ i, φ(x)′
182
+ i+1) = (φ(x)i − 1, φ(x)i+1 + 1).
183
+ Example 5. Suppose x = (0, 1, 1, 1, 0, 1, 0, 1, 0, 0), φ(x) = (1, 0, 0, 1, 1, 2) and the adjacent transposition is occurred in
184
+ the 4-th bit 1 and the following bit 0 in x. Then, x′ = (0, 1, 1, 1, 0, 0, 1, 1, 0, 0) and φ(x′) = (1, 0, 0, 2, 0, 2), where
185
+ (φ(x′)4, φ(x′)5) = (φ(x)4 + 1, φ(x)5 − 1).
186
+ The well-known Varshamov–Tenengol’ts (VT) code will be use of in this paper, and we will introduce the following lemma.
187
+ For x ∈ Σn
188
+ 2, we define the syndrome of VT code as VT(x) = �n
189
+ i=1 ixi.
190
+ Lemma 1 (Varshamov-Tenengol’ts (VT) code [33]). For integers n and a ∈ [0, n],
191
+ VTa(n) = {x ∈ Σn
192
+ 2 : VT(x) ≡ a mod (n + 1)}
193
+ is capable of correcting a single deletion.
194
+ Define Mt,s(n) as maximal size of binary codes for correcting t deletions and s adjacent transpositions.
195
+
196
+ 5
197
+ Lemma 2 (cf. Levenstein [2]). For enough large n, Mt,s(n) ≤ (s + t)! 2n
198
+ ns+t .
199
+ Proof. t deletions and s adjacent transpositions in x can be considered as t deletions and s substitutions in ψ(x). An asymptotic
200
+ bound for the size of any codes is capable of correcting up to t deletions, insertions and substitutions have been shown in [2],
201
+ which is (t! · 2n)/nt. Since the function ψ is a one-to-one mapping function, an upper bound of binary codes for correcting t
202
+ deletions and s adjacent transpositions can be derived.
203
+ From Lemma 2, we can obtain a lower bound of the minimal redundancy of the code for correcting t 0-deletions and s
204
+ adjacent transpositions.
205
+ Corollary1. A lower bound of the minimal redundancy of binary codes for correcting t 0-deletions and s adjacent transpositions
206
+ is (t + s) log n − O(1).1
207
+ III. UNIQUELY-DECODABLE CODES FOR ASYMMETRIC DELETIONS AND ADJACENT TRANSPOSITIONS
208
+ In this section, we will present three uniquely-decodable codes for correcting asymmetric deletions and adjacent transposi-
209
+ tions, that is, once there are some errors, we can correct these errors to recover the original codeword uniquely.
210
+ A. Codes for correcting a single 0-deletion or a single adjacent transposition
211
+ In this subsection, we present the first construction of an optimal code correcting a single 0-deletion or a single adjacent
212
+ transposition.
213
+ Construction 1. The code C1(n, a; p) is defined as the set of all x ∈ Σn
214
+ 2 such that the syndrome
215
+ S(x) =
216
+ w+1
217
+
218
+ i=1
219
+ i2φ(x)i ≡ a mod p
220
+ where w = wt(x) and p is a prime such that p > 2n.
221
+ Theorem 6. The code C1(n, a; p) in Construction 1 can correct a single 0-deletion or a single adjacent transposition.
222
+ Proof. Let x = (x1, . . . , xn) ∈ Σn
223
+ 2 be the original vector and x′ be the received vector after a single 0-deletion or a single
224
+ adjacent transposition.
225
+ If x′ ∈ Σn−1
226
+ 2
227
+ , that is the length of x′ is n−1, then there is a single 0 deletion. In this case, we compute the vector φ(x′) and
228
+ a′ < p such that a′ = S(x′) mod p. We note that dL(φ(x), φ(x′)) = 1 and there is an index i such that φ(x)i − 1 = φ(x′)i.
229
+ Hence, S(x) − S(x′) = i2. That is, a − a′ = i2 mod p. Since i2 − j2 ̸= 0 mod p for all i ̸= j, i, j < n < p/2, we can
230
+ determine the unique index i such that a − a′ = i2 mod p. And thus, we locate the error and can correct it.
231
+ 1The difference between the lower bound of the redundancy for correcting general t deletions and t 0-deletions is only O(1). [17]
232
+
233
+ 6
234
+ If x′ ∈ Σn
235
+ 2, that is the length of x′ is n, then there is no 0 deletion and at most a single adjacent transposition. Similar to
236
+ the previous case, we also compute the vector φ(x′) and a′ < p such that a′ = S(x′) mod p. Once an adjacent transposition
237
+ occurs, there are two types of errors: a symbol 0 moves to the left and a symbol 0 moves to the right. If a symbol 0 moves
238
+ to the left, there exists 0 ≤ j ≤ n − 1 such that a − a′ = 2j + 1 mod p. Otherwise, if a symbol 0 moves to the right,
239
+ there is 0 ≤ j ≤ n − 1 such that a − a′ = −2j − 1 mod p. Since p > 2n, for all i, j < n < p/2 and i ̸= j, these four
240
+ values, {2i + 1, −2i − 1, 2j + 1, −2j − 1} are distinct. Hence, we can determine the type of error and the unique j such that
241
+ a − a′ = 2j + 1 mod p or a − a′ = −2j − 1 mod p. And thus, we can correct the error.
242
+ In conclusion, either a 0 deletion occurs or an adjacent transposition occurs, we always can correct the error and recover
243
+ the original vector. The theorem is proven.
244
+ From the well-known Bertrand–Chebyshev theorem, there exists a prime p such that 2n < p < 4n. Hence, by the pigeonhole
245
+ principle, there exists a code C1(n, a; p) of size at least 2n/(4n). That is, it is possible to construct the code C1(n, a; p) at most
246
+ log n + 2 redundancy. Therefore, we can conclude that we can correct a single 0-deletion or a single adjacent transposition
247
+ with at most log n + 2 redundancy.
248
+ B. Codes for correcting t 0-deletions and s adjacent transpositions
249
+ In this subsection, we explore the general case in the asymmetric Damerau–Levenshtein distance scheme. We investigate a
250
+ code correcting at most t 0-deletions and s adjacent transpositions, given constants t and s.
251
+ We observe that the asymmetric Damerau–Levenshtein distance between two vectors x and y is closely related to Lee
252
+ distance between φ(x) and φ(y). Indeed, once an adjacent transposition occurs in x, the Lee weight of x is changed by two
253
+ based on Proposition 2 and once a 0-deletion occurs in x, the Lee weight of x is changed by one. Hence, if there are at most
254
+ s adjacent transpositions and t 0-deletions, the Lee weight of x is changed by at most t + 2s. Now, we present a well-known
255
+ BCH code in the Lee distance.
256
+ Lemma 3. ( [18], [34]) The systematic BCH code CBCH(n, t + 1; p) : x ∈ Σm
257
+ 2 → E(x) ∈ Σn
258
+ p with the lower bound of
259
+ minimum Lee distance
260
+ dL(CBCH(n, t + 1; p)) ≥
261
+
262
+
263
+
264
+
265
+
266
+
267
+
268
+
269
+
270
+ 2(t + 1),
271
+ if t ≤ (p − 3)/2
272
+ p,
273
+ if (p − 1)/2 ≤ t ≤ p
274
+ can correct errors up to t Lee weight with redundancy t log n + o(t log n), where p is a prime.
275
+ Furthermore, Mahdavifar and Vardy [18] used the above code to construct a code C(n, r) of length n correcting r 0
276
+ insertions with at most r log n + o(r log n) bits of redundancy. It is known that for any two words c1, c2 ∈ C(n, r), we
277
+
278
+ 7
279
+ have dL(φ(c1), φ(c2)) ≥ 2(r + 1) by Lemma 3. Hence, we can use the code C(n, r) to correct t 0-deletions and s adjacent
280
+ transpositions.
281
+ Theorem 7. The code C(n, r) can correct at most t 0-deletions and s adjacent transpositions, given t + 2s = r.
282
+ Proof. Let x = (x1, . . . , xn) ∈ Σn
283
+ 2 be the original vector and x′ ∈ Σn−t
284
+ 2
285
+ be the received vector after t 0-deletions and s
286
+ adjacent transpositions. Hence, we obtain the vector y′ = φ(x′). We consider two vectors φ(x) and φ(x′). We observe that
287
+ once an adjacent transposition occurs in x, the Lee weight of x is changed by at most two based on Proposition 2 and once
288
+ a 0-deletion occurs in x, the Lee weight of x is changed by one. Hence, if there are at most s adjacent transpositions and t
289
+ 0-deletions, the Lee weight of x is changed by at most t + 2s. That is, the Lee distance between two vectors φ(x) and φ(x′)
290
+ is dL(φ(x), φ(x′)) ≤ t + 2s. Therefore, we set r = t + 2s and then the code C(n, r) can correct at most t 0-deletions and s
291
+ adjacent transpositions with redundancy (t + 2s) log n + o((t + 2s) log n).
292
+ C. Codes for correcting a single deletion and multiple right-shifts
293
+ In previous two subsections, we focus on the error type of 0-deletions and arbitrary adjacent transposition (both 01 → 10
294
+ and 10 → 01 can occur) in the asymmetric Damerau-Levenshtein distance. In this subsection, we propose an optimal code for
295
+ correcting a single deletion and s right-shifts of 0. We denote the adjacent transposition as 01 → 10 or 10 → 01, right-shift
296
+ of 0 as 01 → 10 and left-shift of 0 as 10 → 01 throughout this subsection.
297
+ Construction 2. The code C(n, a, b) is defined as follows.
298
+ C(n, a, b) = {x ∈ Σn
299
+ 2 : VT(x) ≡ a mod (n + s + 1),
300
+ n
301
+
302
+ i=1
303
+ xi ≡ b mod 2, ψ(x) ∈ CH(n, 2s + 1)},
304
+ where CH(n, 2s + 1) is a linear binary code capable of correcting errors with 2s + 1 distance.
305
+ Proposition 3. (cf. [12]) A single adjacent transposition (01 → 10 or 10 → 01) in x is equivalent to a single substitution in
306
+ ψ(x).
307
+ Proposition 4. Suppose there are s right-shifts of 0 occurs in x, we have VT(x) − VT(x′) = s.
308
+ Proof. Suppose a right-shift of 0 (01 → 10) occurs at the i-th 1 in x. The index of this 1 in x′ will be i − 1. Thus, for
309
+ a single right-shift of 0, the change of the VT syndrome will be 1. If there are s right-shifts of 0 occurs in x, we have
310
+ VT(x) − VT(x′) = s.
311
+ Lemma 4. The following statements are true:
312
+
313
+ 8
314
+ • Suppose a 0 is deleted before p-th 1 in x, and insert a 0 before (p + v)-th 1 to get ˆx. x can be obtained from ˆx by v
315
+ adjacent transpositions.
316
+ • Suppose a 1 is deleted after p-th 0 in x, and insert a 1 after (p − v)-th 0 to get ˆx. x can be obtained from ˆx by v
317
+ adjacent transpositions.
318
+ Proof. Denote the indexes of p-th 1, (p + 1)-th 1, . . . , (p + v − 1)-th 1 in x as ip, ip+1, . . . , ip+v−1. Then, we can see that
319
+ the indexes of these 1s in ˆx should be ip − 1, ip+1 − 1, . . . , ip+v−1 − 1. Since 0 is inserted before (p + v)-th 1, we can swap
320
+ the (ip+v−1 − 1)-th and ip+v−1-th bits and hence ˆx[ip+v−1,ip+v] = x[ip+v−1,ip+v]. Continuing this process, we can see that x
321
+ can be recovered from ˆx by v adjacent transpositions. The case of deleting 1 is the same deleting 0, hence we can have the
322
+ above two statements.
323
+ Theorem 8. For all a ∈ [0, n + s] and b ∈ [0, 1], the code C(n, a, b) can correct a single deletion and s right-shifts of 0 with
324
+ redundancy at most (1 + s) log(n + s + 1) + 1.
325
+ Proof. Denote the retrieved sequence as x′ ∈ Σ2 through a single deletion and at most s right-shifts of 0. We first use the VT
326
+ syndrome to correct the deletion and then apply the CH(n, 2s + 1) on ψ(x) to correct the right-shifts of 0.
327
+ Further, let ∆ = VT(x) − VT(x′), w be the weight of x′ and p be the index of deletion. Then, let L0 be the number of 0s
328
+ on the left of the deleted bits in x′ and R0 on its left. Similarly, denote L1, R1. We have the following cases when recover x
329
+ by x′:
330
+ • If x′ = Σn
331
+ 2, it means no deletion occurs in x and there are at most s right-shifts of 0. Based on Proposition 3, there are
332
+ at most s substitutions in ψ(x). Hence we can recover ψ(x) by ψ(x′) since ψ(x) ∈ CH(n, 2s + 1), and then recover x.
333
+ • If x′ = Σn−1
334
+ 2
335
+ and suppose a 0 is deleted. From Proposition 4, then ∆ = R1 + k, where k is the actual number of
336
+ right-shifts of 0s. We can first recover ˆx by inserting 0 in the rightmost index of (∆ − s) 1s. Since ∆ = R1 + k and we
337
+ insert 0 in the rightmost index of (R1 + k − s) 1s. Based on the Case 1 of Lemma 4, we can have that there are at least
338
+ (s − k) adjacent transpositions between ˆx and x. In addition, there are also k right-shifts of 0s occur in x. Therefore, x
339
+ can be obtained from ˆx by total s adjacent transpositions. Hence, we can recover ψ(x) by ψ(ˆx) and then x.
340
+ • If x′ = Σn−1
341
+ 2
342
+ and suppose a 1 is deleted. From Proposition 4, then ∆ = p + R1 + k = w + L0 + k + 1. We recover ˆx
343
+ by inserting 1 in the leftmost index of (∆ − w − s − 1) 0s. Similar as Case 2, since ∆ = w + L0 + k + 1 and we insert
344
+ 1 in the leftmost index of (L0 + k − s) 0s. Based on the Case 2 of Lemma 4, we can have that there are at least (s − k)
345
+ adjacent transpositions between ˆx and x. Similarly, x can be obtained from ˆx by total s adjacent transpositions. Hence,
346
+ we can recover ψ(x) by ψ(ˆx) and then x.
347
+
348
+ 9
349
+ It is worth noticing that Case 1 and Case 2, 3 can be distinguished by the length of the retrieved sequence x′. Case 2 and
350
+ Case 3 can distinguished based on the constraint of �n
351
+ i=1 xi ≡ b mod 2, from where we can know the deleted bit is 0 or 1.
352
+ There are three constraints on the sequence x ∈ C(n, a, b) including a VT code, a parity check bit and a linear binary
353
+ (n, 2s + 1)-code. It can be easily shown that the redundancy of the code C(n, a, b) is log(n + s + 1) + s log n + 1. Thus, the
354
+ redundancy of the code C(n, a, b) is at most (1 + s) log(n + s + 1) + 1.
355
+ The decoding algorithm of the code C(n, a, b) for correcting a single deletion and s right-shifts of 0 is summarized in
356
+ Algorithm 1.
357
+ Algorithm 1: Decoding procedure of C(n, a, b)
358
+ Input: Corrupted Sequence x′
359
+ Output: Original Sequence x ∈ C(n, a, b)
360
+ ∆ = VT(x) − VT(x′), b = �n
361
+ i=1 xi − �|x′|
362
+ i=1 x′
363
+ i and w = wt(x′).
364
+ if |x′| = n then
365
+ Recover ψ(x) by ψ(x′) and then x.
366
+ else
367
+ if b = 0 then
368
+ Insert a 0 in the rightmost index of (∆ − s) 1s to get ˆx. Recover ψ(x) by ψ(ˆx) and then x.
369
+ else
370
+ Insert a 1 in the leftmost index of (∆ − w − s − 1) 0s to get ˆx. Recover ψ(x) by ψ(ˆx) and then x.
371
+ end
372
+ end
373
+ Further, Construction 2 and Theorem 8 can be naturally extended to construct codes for correcting a single deletion, s+
374
+ right-shifts of 0 and s− left-shifts of 0 with s = s+ + s−.
375
+ Corollary 2. For all a ∈ [0, n + s] and b ∈ [0, 1], the code C2(n, a, b) such that
376
+ C2(n, a, b) = {x ∈ Σn
377
+ 2 : VT(x) ≡ a mod (n + s + 1),
378
+ n
379
+
380
+ i=1
381
+ xi ≡ b mod 2, ψ(x) ∈ CH(n, 2s + 1)}.
382
+ can correct a single deletion, s+ right-shifts of 0 and s− left-shifts of 0 with redundancy at most (1 + s) log(n + s + 1) + 1,
383
+ where s = s+ + s−.
384
+ Proof. Similar as Proposition 4, suppose there are at most s− left-shifts of 0s, the change of VT syndrome is VT(x) −
385
+ VT(x′) = −s−. Suppose a 0 is deleted, and the same as the proof of Theorem 8 with the same notations, we can also have
386
+ ∆ = R1 + k+ − k−, where k+ and k− are actual number of right-shifts and left-shifts of 0 occur. Also, we still insert a 0 in
387
+
388
+ 10
389
+ the index of rightmost of (∆ − s+ + s−) 1s to obtain ˆx. Based on the Case 1 of Lemma 4, we can have that there are at least
390
+ ((s+ − s−) − (k+ − k−)) adjacent transpositions between ˆx and x and there are k+ + k− adjacent transpositions occur in x.
391
+ Therefore, the total number of adjacent transpositions that x can be obtained from ˆx is at most
392
+ (s+ − s−) − (k+ − k−) + (k+ + k−) = s+ − s− + 2k− ≤ s+ + s− = s
393
+ Hence, we can recover ψ(x) by ψ(ˆx) since there are at most s substitutions and then x. Also, the analysis of redundancy is
394
+ the same as the proof of Theorem 8.
395
+ Compare the results in [12], where the code for correcting a single deletion and s adjacent transpositions needs at most
396
+ (1 + 2s) log(n + 2s + 1) redundancy. If we know the direction of these s adjacent transpositions containing s+ right-shifts
397
+ of 0 and s− left-shifts of 0, the redundancy of the code can be further reduced to at most (1 + s) log(n + s + 1) + 1 where
398
+ s = s+ + s−.
399
+ IV. LIST-DECODABLE CODES FOR CORRECTING ASYMMETRIC DELETIONS AND ADJACENT TRANSPOSITIONS
400
+ In this section, we aim to construct List-Decodable codes with low redundancy. For correcting t 0-deletions without s
401
+ adjacent transpositions, Dolecek and Anatharam [17] proposed a well-known construction with optimal redundancy t log n.
402
+ Inspired by this, we have the following construction:
403
+ Construction 3. The construction CList
404
+ t,s (n, K, a; p) is defined as the set of all x ∈ Σn
405
+ 2 such that
406
+ w+1
407
+
408
+ i=1
409
+ imφ(x)i ≡ am mod p, ∀m ∈ {1, . . . , K}.
410
+ where the prime p such that p > 2n and a = (a1, a2, . . . , aK).
411
+ Let x = (x1, . . . , xn) ∈ Σn
412
+ 2 be the original vector and x′ ∈ Σn−t
413
+ 2
414
+ be the received vector after t 0-deletions and s adjacent
415
+ transpositions. Hence, we obtain the vector φ(x′) and the corresponding a′ at the receiver. Let a′
416
+ m = �w+1
417
+ i=1 imφ(x′)i and
418
+ a′′
419
+ m = am − a′
420
+ m, ∀m ∈ {1, . . . , K}.
421
+ Proposition 5. Suppose there is only a single adjacent transposition occurs in x at the position of j-th 1, the change of
422
+ syndrome a′′
423
+ m can be shown as follows:
424
+ 1) 10 → 01:
425
+ a′′
426
+ m = (j + 1)m − jm mod p =
427
+ m−1
428
+
429
+ i=0
430
+ �m
431
+ i
432
+
433
+ ji mod p
434
+ 2) 01 → 10:
435
+ a′′
436
+ m = jm − (j + 1)m mod p = −
437
+ m−1
438
+
439
+ i=0
440
+ �m
441
+ i
442
+
443
+ ji mod p
444
+
445
+ 11
446
+ Then, suppose t 0-deletions occur in the 0-run before the (d1, d2, . . . , dt)-th 1, respectively, where d1 ≤ d2 ≤ · · · ≤ dt.
447
+ Also, ℓ (10 → 01) adjacent transpositions occur in (j1, j2, . . . , jℓ)-th 1 and r (01 → 10) adjacent transpositions occur in
448
+ (k1, k2, . . . , kr)-th 1, respectively.
449
+ Based on Proposition 5, considering all t 0-deletions and s adjacent transpositions and set K = t + s, we have a set of
450
+ equations showing the change of syndromes for all m ∈ {1, . . ., t + s} as follows:
451
+ a′′
452
+ m ≡
453
+ t
454
+
455
+ u=1
456
+ dm
457
+ u +
458
+ m−1
459
+
460
+ i=0
461
+ ��m
462
+ i
463
+ ��
464
+
465
+
466
+ v=1
467
+ ji
468
+ v −
469
+ r
470
+
471
+ w=1
472
+ ki
473
+ w
474
+ ��
475
+ mod p.
476
+ (1)
477
+ If there are only t 0-deletions without s adjacent transpositions, Dolecek and Anantharam [17] showed that the following
478
+ system of equations has the unique solution.
479
+ Lemma 5 (Dolecek and Anatharam [17]). Without s adjacent transpositions, (1) can be rewritten as the following set of
480
+ constraints with t equations such that
481
+
482
+
483
+
484
+
485
+
486
+
487
+
488
+
489
+
490
+
491
+
492
+
493
+
494
+
495
+
496
+
497
+
498
+
499
+
500
+
501
+
502
+
503
+
504
+
505
+
506
+
507
+
508
+
509
+
510
+ a′′
511
+ 1 ≡ d1 + d2 + . . . + dt mod p,
512
+ a′′
513
+ 2 ≡ d2
514
+ 1 + d2
515
+ 2 + . . . + d2
516
+ t mod p,
517
+ ...
518
+ a′′
519
+ t ≡ dt
520
+ 1 + dt
521
+ 2 + . . . + dt
522
+ t mod p.
523
+ (2)
524
+ which can uniquely determine the solution set {d1, d2, . . . , dt}, where p is a prime such that p > 2n and d1 ≤ d2 ≤ · · · ≤ dt.
525
+ Following the technique in [17], if we can determine uniquely the solution set {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr} of (1), we
526
+ also can correct t 0-deletions and s adjacent transpositions with at most (t + s) log n bits of redundancy. However, the result
527
+ is not known to us and is still open for future work.
528
+ In this section, we focus on List-Decodable code CList
529
+ t,s (n, κ, a; p) for correcting t 0-deletions and s adjacent transpositions.
530
+ Set K = κ in Construction 3, where κ = max(t, s + 1) and p is a prime such that p > 2n. For the following system of
531
+ equations, we can determine the solution set uniquely.
532
+ Lemma 6. A set of constraints with s equations such that
533
+
534
+
535
+
536
+
537
+
538
+
539
+
540
+
541
+
542
+
543
+
544
+
545
+
546
+
547
+
548
+
549
+
550
+
551
+
552
+
553
+
554
+
555
+
556
+
557
+
558
+
559
+
560
+
561
+
562
+ b′′
563
+ 1 ≡ �ℓ
564
+ v=1 j1
565
+ v − �r
566
+ w=1 k1
567
+ w mod p,
568
+ b′′
569
+ 2 ≡ �ℓ
570
+ v=1 j2
571
+ v − �r
572
+ w=1 k2
573
+ w mod p,
574
+ ...
575
+ b′′
576
+ s ≡ �ℓ
577
+ v=1 js
578
+ v − �r
579
+ w=1 ks
580
+ w mod p.
581
+ (3)
582
+
583
+ 12
584
+ is capable of uniquely determining the solution set {j1, . . . , jℓ, k1, . . . , kr}, where p is a prime such that p > 2n. Also, ℓ+r ≤ s,
585
+ j1 < j2 < · · · < jℓ, k1 < k2 < · · · < kr and jv ̸= kw, ∀v ∈ {1, . . . , ℓ}, w ∈ {1, . . . , r}.
586
+ We note that Lemma 6 is similar to Lemma 5. The only difference is that the coefficients of all terms in Lemma 5 are
587
+ positive while the coefficients of all terms in Lemma 6 can be either positive or negative. Hence, we can use the same technique
588
+ in Lemma 5 to prove Lemma 6.
589
+ Proof. Define the polynomials
590
+ σ+(x) =
591
+
592
+
593
+ v=1
594
+ (1 − jvx)
595
+ and
596
+ σ−(x) =
597
+ r
598
+
599
+ w=1
600
+ (1 − kwx).
601
+ Let σ(x) = �s
602
+ m=0 σmxm be defined by
603
+ σ(x) = σ+(x)/σ−(x) mod xs
604
+ Then, we define σ∗(x) = σ(x) mod p.
605
+ We also define
606
+ S∗(x) =
607
+
608
+
609
+ m=1
610
+
611
+
612
+
613
+ v=1
614
+ jm
615
+ v −
616
+ r
617
+
618
+ w=1
619
+ km
620
+ w
621
+
622
+ xm.
623
+ and S∗
624
+ m = �ℓ
625
+ v=1 jm
626
+ v − �r
627
+ w=1 km
628
+ w mod p.
629
+ Then, we have Newton’s identities over GF(p) as follows
630
+ σ∗(x)S∗(x) + x(σ∗(x))′ = 0
631
+ u−1
632
+
633
+ m=0
634
+ σ∗
635
+ mS∗
636
+ u−m + uσ∗
637
+ u = 0, u ≥ 1.
638
+ (4)
639
+ where (σ∗(x))′ is derivative of σ∗(x). (see [35, Lemma 10.3] for details)
640
+ Using the similar technique as the proof of Lemma 5, from (4), σ∗
641
+ m can be recursively obtained by {S∗
642
+ 1, . . . , S∗
643
+ m} and
644
+ {σ∗
645
+ 1, . . . , σ∗
646
+ m−1}, where {S∗
647
+ 1, . . . , S∗
648
+ m} = {b′′
649
+ 1, . . . , b′′
650
+ m}, which follows that all the coefficients of the polynomial σ∗(x) =
651
+ �s
652
+ m=0 σ∗
653
+ mxm mod p are known. Further, we know that the polynomial σ∗(x) has at most s solutions by Lagrange Theorem.
654
+ Denote I0 = {j1, . . . , jℓ, k1, . . . , kr} with the value of each element in I0 is less than p and let Im = {j1 + mp, . . . , jℓ +
655
+ mp, k1+mp, . . . , kr+mp} be one of the incongruent solution sets of I0. We can have I0∩Im = ∅ due to p > 2n, which follows
656
+ that all incongruent solutions are distinguishable. Therefore, we can conclude that the solution set {j1, . . . , jℓ, k1, . . . , kr} is
657
+ unique.
658
+ Theorem 9. The list-decodable code CList
659
+ t,s (n, κ, a; p) has redundancy κ log n, where κ = max(t, s + 1) and prime p > 2n. If
660
+ there are at most t 0-deletions and s adjacent transpositions, we can do list-decoding with list size O(nmin(t,s+1)).
661
+
662
+ 13
663
+ Proof. Let x = (x1, . . . , xn) ∈ Σn
664
+ 2 be the original vector and x′ be the received vector after t 0-deletions and s single adjacent
665
+ transpositions. Hence, we can compute φ(x′) and a′ from x′. Also, we can obtain a′′ = a′ − a, where a′′ = {a′′
666
+ 1, . . . , a′′
667
+ κ}.
668
+ Suppose t ≥ s + 1 and expand (1). We have the following set of equations with κ = t:
669
+
670
+
671
+
672
+
673
+
674
+
675
+
676
+
677
+
678
+
679
+
680
+
681
+
682
+
683
+
684
+
685
+
686
+
687
+
688
+
689
+
690
+
691
+
692
+
693
+
694
+
695
+
696
+
697
+
698
+
699
+
700
+
701
+
702
+
703
+
704
+
705
+
706
+
707
+
708
+ a′′
709
+ 1 ≡ �t
710
+ u=1 du + (ℓ − r) mod p,
711
+ a′′
712
+ 2 ≡ �t
713
+ u=1 d2
714
+ u + (ℓ − r) + 2(�ℓ
715
+ v=1 j1
716
+ v − �r
717
+ w=1 k1
718
+ w) mod p,
719
+ ...
720
+ a′′
721
+ t ≡ �t
722
+ u=1 dt
723
+ u + (ℓ − r) + t(�ℓ
724
+ v=1 j1
725
+ v − �r
726
+ w=1 k1
727
+ w)
728
+ + · · · + t(�ℓ
729
+ v=1 jt−1
730
+ v
731
+ − �r
732
+ w=1 kt−1
733
+ w
734
+ ) mod p.
735
+ (5)
736
+ Recall that we can decode uniquely if we can determine the unique solution set of (5). However, the method to solve (5)
737
+ uniquely is not known to us. We know that, given e = {e1, . . . , es+1}, we can solve the following equations uniquely.
738
+
739
+
740
+
741
+
742
+
743
+
744
+
745
+
746
+
747
+
748
+
749
+
750
+
751
+
752
+
753
+
754
+
755
+
756
+
757
+
758
+
759
+
760
+
761
+
762
+
763
+
764
+
765
+
766
+
767
+
768
+
769
+
770
+
771
+
772
+
773
+
774
+
775
+
776
+
777
+ e1 ≡ ℓ − r mod p,
778
+ e2 ≡ (ℓ − r) + 2(�ℓ
779
+ v=1 j1
780
+ v − �r
781
+ w=1 k1
782
+ w) mod p,
783
+ ...
784
+ es+1 ≡ (ℓ − r) + (s + 1)(�ℓ
785
+ v=1 j1
786
+ v − �r
787
+ w=1 k1
788
+ w)
789
+ + · · · + (s + 1)(�ℓ
790
+ v=1 js
791
+ v − �r
792
+ w=1 ks
793
+ w) mod p.
794
+ (6)
795
+ Indeed, denote e′ = {e′
796
+ 1, . . . , e′
797
+ s+1} with me′
798
+ m = em − �m−1
799
+ i=1
800
+ �� m
801
+ i−1
802
+
803
+ e′
804
+ i
805
+
806
+ for all m ∈ {2, . . ., s + 1} and e���
807
+ 1 = e1, we can
808
+ rearrange (6) to be similar to Lemma 6 as follows.
809
+
810
+
811
+
812
+
813
+
814
+
815
+
816
+
817
+
818
+
819
+
820
+
821
+
822
+
823
+
824
+
825
+
826
+
827
+
828
+
829
+
830
+
831
+
832
+
833
+
834
+
835
+
836
+
837
+
838
+ e′
839
+ 1 ≡ ℓ − r mod p,
840
+ e′
841
+ 2 ≡ �ℓ
842
+ v=1 j1
843
+ v − �r
844
+ w=1 k1
845
+ w mod p,
846
+ ...
847
+ e′
848
+ s+1 ≡ �ℓ
849
+ v=1 js
850
+ v − �r
851
+ w=1 ks
852
+ w mod p.
853
+ (7)
854
+ Therefore, based on Lemma 6, we can obtain the unique solution set {j1, . . . , jℓ, k1, . . . , kr} from (7).
855
+ Once the solution set {j1, . . . , jℓ, k1, . . . , kr} is obtained, we can compute the following values {es+2, . . . , et}.
856
+ em =
857
+ m−1
858
+
859
+ i=0
860
+ ��m
861
+ i
862
+ ��
863
+
864
+
865
+ v=1
866
+ ji
867
+ v −
868
+ r
869
+
870
+ w=1
871
+ ki
872
+ w
873
+ ��
874
+ mod p.
875
+ (8)
876
+ where m ∈ {s + 2, . . . , t}.
877
+
878
+ 14
879
+ Denote a∗ = {a∗
880
+ 1, . . . , a∗
881
+ t } with a∗
882
+ m = a′′
883
+ m − em, ∀m ∈ {1, . . ., t}. Substituting (6) and (8) into (5), we obtain the following
884
+ set of equations.
885
+
886
+
887
+
888
+
889
+
890
+
891
+
892
+
893
+
894
+
895
+
896
+
897
+
898
+
899
+
900
+
901
+
902
+
903
+
904
+
905
+
906
+
907
+
908
+
909
+
910
+
911
+
912
+
913
+
914
+ a∗
915
+ 1 ≡ �t
916
+ u=1 du mod p,
917
+ a∗
918
+ 2 ≡ �t
919
+ u=1 d2
920
+ u mod p,
921
+ ...
922
+ a∗
923
+ t ≡ �t
924
+ u=1 dt
925
+ u mod p.
926
+ (9)
927
+ The set of equations (9) provides the unique solution set {d1, . . . , dt} by Lemma 5. Therefore, the unique solution of all
928
+ positions of 0-deletions and adjacent transpositions {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr} can be obtained. So, for each set of
929
+ s+1 values {e1, . . . , es+1}, we can obtain the set {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr}. There are ps+1 sets of these values. One
930
+ of these sets corresponds to the true value of x and gives us the correct vector x. So, we can do list-decoding with the list
931
+ size O(ns+1) since p = O(n). Moreover, the size of the list-decodable code CList
932
+ t,s (n, κ, a; p) with κ = t is at least 2n/(4n)t,
933
+ that is, we need at most κ log n bits of redundancy to construct the code CList
934
+ t,s (n, κ, a; p).
935
+ When t < s + 1, we can do similarly to the case t ≤ s + 1. In this case, we can do list-decoding with the list-size O(nt).
936
+ The size of the code CList
937
+ t,s (n, κ, a; p) is at least 2n/(4n)s+1.
938
+ Then, we can conclude that the list-decodable code CList
939
+ t,s (n, κ, a; p) can correct t 0-deletions and s adjacent transpositions
940
+ with list size at most O(nmin(t,s+1)) and has redundancy κ log n+O(1), where both t, s are constant and κ = max(t, s+1).
941
+ The decoding algorithm of the list-decodable code CList
942
+ t,s (n, κ, a; p) for correcting t 0-deletions and s adjacent transpositions
943
+ is summarized in Algorithm 2, where t > s + 1.
944
+ Algorithm 2: List decoding procedure
945
+ Input: Corrupted Sequence x′ ∈ Σn−t
946
+ 2
947
+ Output: O(ns+1) possible sequences, including the original codeword x ∈ CList
948
+ t,s (n, κ, a; p)
949
+ Compute φ(x′) based on x′ and compute a′′ to obtain (5).
950
+ for e = (e1, . . . , es+1) such that ei ∈ {0, 1, . . ., p − 1}, ∀i ∈ {1, . . . , s + 1} do
951
+ Get the solution set {j1, . . . , jℓ, k1, . . . , kr} by (6) and (7).
952
+ Compute em from the solution set {j1, . . . , jℓ, k1, . . . , kr} using (8) for each s + 2 ≤ m ≤ t. Compute
953
+ a∗
954
+ m = a′′
955
+ m − em. Solve (9) to obtain the unique solution set {d1, . . . , dt}.
956
+ end
957
+ For each fixed e, we can recover φ(x) from φ(x′) by a set of error positions {d1, . . . , dt, j1, . . . , jℓ, k1, . . . , kr} and
958
+ then output x.
959
+
960
+ 15
961
+ Next, we will present the result for a special case t = 1.
962
+ Corollary 3. The list-decodable code CList
963
+ 1,s (n, s + 1, a; p) can correct a single 0-deletion and s adjacent transpositions with
964
+ list size at most 2s and has redundancy (s + 1) log n + O(1).
965
+ Proof. When t = 1, It can be noticed that when the deletion position is determined, means d is known. Since l, r ∈ {1, . . . , s}
966
+ and a′′
967
+ 1 ≡ d + (ℓ − r) mod p, hence there are 2s choice for d, which means that the list size of CList
968
+ 1,s (n, s + 1, a; p) is at most
969
+ 2s.
970
+ The above code CList
971
+ 1,s (n, s + 1, a; p) is capable of correcting a single 0-deletion and s adjacent transpositions with constant
972
+ list size at most 2s and has redundancy (s + 1) log n + O(1). The list size is constant 2s, which is less than the list size O(n)
973
+ when we directly substitute t = 1 to Theorem 9.
974
+ V. CODES FOR CORRECTING LIMITED-MAGNITUDE BLOCKS OF 0-DELETIONS AND ADJACENT TRANSPOSITIONS
975
+ In this section, we focus on studying the error of t blocks of asymmetric deletions with ℓ-limited-magnitude and s adjacent
976
+ transpositions. t blocks of asymmetric deletions with ℓ-limited-magnitude denotes that there are at most t blocks of 0s are
977
+ deleted with the length of each block is at most ℓ. Therefore, at most tℓ 0s are deleted and these t blocks of 0-deletions may
978
+ occur in at most t 0 runs.
979
+ For the sake of convenience in the following paper, we append a bit 1 at the end of x and denote it as x1. Since the sequence
980
+ x1 always ends with 1, x1 can be always written as x1 = 0u110u210u3 . . . 0uw1, where w = wt(x1). In addition, we revisit
981
+ the definition of function φ : Σn
982
+ 2 → Σw and φ(x)
983
+ def= (u1, u2, u3, . . . , uw) �� Σw. Then, combining with Proposition 2, we can
984
+ have that the length of each 0 run increase by at most 1 and decrease by at most tℓ + 1 through t blocks of 0-deletions with
985
+ ℓ-limited-magnitude and s adjacent transpositions. Then, the definition of t blocks of 0-deletions with ℓ-limited-magnitude and
986
+ s adjacent transpositions is provided as follows.
987
+ Definition 4. Define the error ball B(n, t, k+, k−) such that
988
+ B(n, t, k+, k−) = {u ∈ Σn
989
+ q : −k− ≤ ui ≤ k+, wt(u) ≤ t}.
990
+ where at most t entries increase by at most k+ and decrease by at most k− for a sequence with length n.
991
+ Definition 5. t blocks of asymmetric deletions with ℓ-limited-magnitude and s adjacent transpositions denote that given a
992
+ sequence x ∈ Σn
993
+ 2 , the retrieved sequence x′ through this type of error can be written as φ(x′1) = φ(x1) + v, where
994
+ v ∈ B(w, t + 2s, 1, tℓ + 1) and w = wt(x′1) = wt(x1)
995
+
996
+ 16
997
+ Example 6. Suppose we have x = 0100101001 ∈ Σ10
998
+ 2
999
+ with ℓ = 2, t = 3 and s = 1, then φ(x1) = 12120. If the retrieved
1000
+ sequence x′ = 0110110 ∈ Σ6
1001
+ 2 and the corresponding φ(x′1) = 10101, by comparing φ(x1) and φ(x′1), we can see
1002
+ v = (0, −2, 0, −2, 1) ∈ B(5, 5, 1, 7).
1003
+ Denote Φ be the set of mapping Σn
1004
+ 2 by the function φ and Σn
1005
+ 2 is the set containing all binary sequences with length n.
1006
+ Lemma 7. The cardinality of Φ is:
1007
+ |Φ| =
1008
+ n+1
1009
+
1010
+ w=1
1011
+
1012
+ n
1013
+ w − 1
1014
+
1015
+ = 2n.
1016
+ (10)
1017
+ Proof. For a binary sequence x ∈ Σn
1018
+ 2, the corresponding sequence φ(x1) is with length w = w(x1) and wt(φ(x1)) = n+1−w.
1019
+ Also, the cardinality of Φ can be considered the number of ways of arranging n + 1 − w indistinguishable objects in w
1020
+ distinguishable boxes. Thus, we can get the cardinality of Φ as shown in Lemma 7.
1021
+ On the other side, since the mapping function φ is a one-to-one mapping function, the cardinality of Φ should be the same
1022
+ as |Σn
1023
+ 2| = 2n.
1024
+ Proposition 6. (cf. [36]) The code C(n, t, ℓ, s) for correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent
1025
+ transpositions is equivalent to a packing to Σw by the error ball B(w, t+2s, 1, tℓ+1), where w = wt(x) and x ∈ C(n, t, ℓ, s).
1026
+ A. Non-systematic Code Construction
1027
+ In this section, we will provide a non-systematic construction for the code capable of correcting t blocks of 0-deletions with
1028
+ ℓ-limited-magnitude and s adjacent transpositions. Then, we present the decoding algorithm of this code and a lower bound
1029
+ of the code size.
1030
+ Construction 4. The code C(n, t, ℓ, s) is defined as
1031
+ C(n, t, ℓ, s) = {x ∈ Σn
1032
+ 2 : φ(x1) mod p ∈ Cp, wt(φ(x1)) = n + 1 − w},
1033
+ where w = wt(x1) and Cp is a code over Σp with p is the smallest prime larger than tℓ + 2.
1034
+ Lemma 8. C(n, t, ℓ, s) is capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions
1035
+ for x ∈ C(n, t, ℓ, s) if Cp is capable of correcting t + 2s symmetric errors for φ(x1).
1036
+ Lemma 9. ( [37], Theorem 10 ) Let p be a prime such that the distance 2 ≤ d ≤ p⌈m/2⌉−1 and n = pm − 1. Then, there
1037
+ exists a narrow-sense [n, k, d]-BCH code Cp over Σp with
1038
+ n − k = ⌈(d − 1)(1 − 1/p)⌉m.
1039
+
1040
+ 17
1041
+ Theorem 10. Let p be the smallest prime such that p ≥ tℓ + 2, w = pm − 1, w = wt(x1) and Cp is a primitive narrow-sense
1042
+ [w, k, 2(t + 2s) + 1]-BCH code with w − k = ⌈2(t + 2s)(1 − 1/p)⌉m, the code C(n, t, ℓ, s) such that
1043
+ C(n, t, ℓ, s) = {x ∈ Σn
1044
+ 2 : φ(x1) mod p ∈ Cp, wt(φ(x1)) = n + 1 − w}.
1045
+ is capable of correcting t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions.
1046
+ Proof. Let x ∈ C(n, t, ℓ, s) be a codeword, and x′ be the output through the channel that has t blocks of 0-deletions with
1047
+ ℓ-limited-magnitude and s adjacent transpositions. Let z′ = φ(x′1) mod p, where p is the smallest prime larger than tℓ + 2.
1048
+ Run the decoding algorithm of Cp on z′ and output z∗. Thus, z∗ is also a linear code in Cp and it can be shown that
1049
+ z∗ = φ(x1) mod p. Denote ǫ′ = (z′ − z∗) mod p, we can have that
1050
+ (φ(x′1) − φ(x1)) mod p = (z′ − z∗) mod p = ǫ′.
1051
+ (11)
1052
+ and the error vector ǫ satisfies
1053
+ ǫi =
1054
+
1055
+
1056
+
1057
+
1058
+
1059
+
1060
+
1061
+
1062
+
1063
+ ǫ′
1064
+ i,
1065
+ if 0 ≤ ǫ′
1066
+ i ≤ 1
1067
+ ǫ′
1068
+ i − p,
1069
+ otherwise
1070
+ .
1071
+ (12)
1072
+ Hence, the output is φ(x1) = φ(x′1) − ǫ and then recover x from φ(x1).
1073
+ The detailed decoding steps are shown in Algorithm 3.
1074
+ Algorithm 3: Decoding Algorithm of C(n, t, ℓ, s)
1075
+ Input: Retrieved sequence x′
1076
+ Output: Decoded sequence x ∈ C(n, t, ℓ, s).
1077
+ Initialization: Let p be the smallest prime larger than tℓ + 2. Also, append 1 at the end of x′ and get φ(x′1).
1078
+ Step 1: z′ = φ(x′1) mod p. Run the decoding algorithm of Cp on z′ to get the output z∗.
1079
+ Step 2: ǫ′ = (z′ − z∗) mod p and then ǫ. φ(x1) = φ(x′1) − ǫ.
1080
+ Step 3: Output x1 = φ−1(φ(x1)) and then x.
1081
+ Example 7. Suppose x = 0100101001 and x′ = 0110110 ∈ Σ6
1082
+ 2 with ℓ = 2, t = 3 and s = 1. Since the retrieved sequence
1083
+ x′ = 0110110, then φ(x′1) = 10101 and z′ = φ(x′) mod 11 = 10101, where p = 11 is smallest prime such that p ≥ tℓ + 2.
1084
+ Run the decoding algorithm of Cp on z′ ∈ Cp, we have the output sequence z∗ = 12120. Hence ǫ′ = (z − z∗) mod 11 =
1085
+ (0, 9, 0, 9, 1) and ǫ = (0, −2, 0, −2, 1). Thus, the output of the decoding algorithm φ(x1) = φ(x′1) − ǫ = (1, 0, 1, 0, 1) −
1086
+ (0, −2, 0, −2, 1) = (1, 2, 1, 2, 0). Finally, x1 = 01001010011 and x = 0100101001.
1087
+ Next, we will present a lower bound of the size of C(n, t, ℓ, s).
1088
+
1089
+ 18
1090
+ Theorem 11. The size of the code C(n, t, ℓ, s) in Theorem 10 is bounded by
1091
+ |C(n, t, ℓ, s)| ≥
1092
+ 2n
1093
+ p(n + 1)⌈2(t+2s)(1−1/p)⌉ .
1094
+ where p is the smallest prime larger than tℓ + 2.
1095
+ Proof. Denote z = φ(x1) mod p. φ(x1) can be written as φ(x1) → (z, a) such that φ(x1) = z + p · a, where a is a
1096
+ vector with the same length as φ(x1) and z. Further, since z ∈ Cp and Cp is a linear code, the code Cp with length w can be
1097
+ considered as a set which is obtained by Σw
1098
+ p partitioned into pw−k classes.
1099
+ Denote φ(x1)w as the φ(x1) with length w. Thus, for any fixed number of weight w, the cardinality of φ(x1)w such that
1100
+ φ(x1)w mod p ∈ Cp with length w is:
1101
+ |φ(x1)w| =
1102
+
1103
+ n
1104
+ w−1
1105
+
1106
+ pw−k .
1107
+ Then, the size of the code C(n, t, ℓ, s) in Theorem 10 can be shown as:
1108
+ |C(n, t, ℓ, s)| =
1109
+ n+1
1110
+
1111
+ w=1
1112
+ |φ(x1)w| =
1113
+ n+1
1114
+
1115
+ w=1
1116
+ �� n
1117
+ w−1
1118
+
1119
+ pw−k
1120
+
1121
+
1122
+ �n+1
1123
+ w=1
1124
+
1125
+ n
1126
+ w−1
1127
+
1128
+ pn+1−k
1129
+ =
1130
+ 2n
1131
+ pn+1−k .
1132
+ (13)
1133
+ From Lemma 9 and Theorem 10, let d = 2(t + 2s) + 1 and m = logp(n + 1).
1134
+ pn−k+1 = p⌈2(t+2s)(1−1/p)⌉·logp(n+1)+1 = p(n + 1)⌈2(t+2s)(1−1/p)⌉.
1135
+ (14)
1136
+ Therefore, from (13) and (14), the size of the code C(n, t, ℓ, s) in Theorem 10 is bounded by
1137
+ |C(n, t, ℓ, s)| ≥
1138
+ 2n
1139
+ p(n + 1)⌈2(t+2s)(1−1/p)⌉ .
1140
+ where p is the smallest prime larger than tℓ + 2.
1141
+ B. Systematic Code Construction
1142
+ In the previous subsection, we propose a non-systematic code C(n, t, ℓ, s) for correcting t blocks of 0-deletions with ℓ-limited-
1143
+ magnitude and s adjacent transpositions. In this subsection, we will provide the efficient encoding and decoding function based
1144
+ on the code C(n, t, ℓ, s) presented in Theorem 10.
1145
+ 1) Efficient Encoding: Before providing the efficient systematic encoding algorithm, we now introduce a useful lemma
1146
+ proposed in [38] for encoding balanced sequences efficiently. The balanced sequence denotes the binary sequence with an
1147
+ equal number of 0s and 1s, which will be used for distinguishing the boundary of redundancy.
1148
+
1149
+ 19
1150
+ Lemma 10. (cf. [38]) Given the input x ∈ Σk
1151
+ 2, let the function s′ : Σk
1152
+ 2 → Σn
1153
+ 2 such that s′(x) ∈ Σn
1154
+ 2 is a balanced sequence,
1155
+ where n = k + log k.
1156
+ Definition 6. Given the input x ∈ Σk
1157
+ 2, let the function s : Σk
1158
+ 2 → Σn′
1159
+ 2 such that s(x) ∈ Σn′
1160
+ 2 whose first bit is 1 and s(x)[2,n′]
1161
+ is balanced sequence with (n′ − 1)/2 0s and (n′ − 1)/2 1s, where n′ = k + log k + 1.
1162
+ An adjacent transposition can be considered as two substitutions, hence the maximum total number of deletions and
1163
+ substitutions in the t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions is r = tℓ+2s. The following
1164
+ lemma is used for correcting deletions, insertions and substitutions up to r = tℓ + 2s in a binary sequence.
1165
+ Lemma 11. (cf. [39]) Let t, ℓ, s be constants with respect to k. There exist an integer a ≤ 22r log k+o(log k) and a labeling
1166
+ function fr : Σk
1167
+ 2 → Σ2Rr(k), where Rr(k) = O(r4 log k) such that {(x, a, fr(x) mod a) : x ∈ Σk
1168
+ 2} can correct deletions,
1169
+ insertions and substitutions up to r = tℓ + 2s. Let gr(x) = (a, fr(x) mod a) ∈ Σ4r log k+o(log k)
1170
+ 2
1171
+ for given x ∈ Σk
1172
+ 2.
1173
+ Next, we define the mapping function from non-binary to binary.
1174
+ Definition 7. Given the input x ∈ Σk
1175
+ 2, define the function b : Σk
1176
+ p → Σn
1177
+ 2 such that b(u)[i·⌈log p⌉+1,(i+1)·⌈log p⌉] is the binary
1178
+ form of ui, where n = k · ⌈log p⌉.
1179
+ Given the parameters t, ℓ and s, let p be the smallest prime larger than tℓ + 2 and Cp in Lemma 9 be the p-ary primitive
1180
+ narrow-sense [n, k, 2(t + 2s) + 1]-BCH codes.
1181
+ Definition 8. Define the labeling function as g : Σk
1182
+ p → Σn−k
1183
+ p
1184
+ such that (x, g(x)) is a p-ary primitive narrow-sense [n, k, 2(t +
1185
+ 2s) + 1]-BCH codes, where n = k + ⌈2(t + 2s)(1 − 1/p)⌉m and n = pm − 1.
1186
+ Suppose the input sequence is c ∈ Σk
1187
+ 2, and we have φ(c1) with length rc = wt(c1). Then, let c′ = φ(c1) mod p ∈ Σrc
1188
+ p ,
1189
+ where p is the smallest prime larger than tℓ + 2, and append 0k+1−rc at the end of c′. Hence, we denote ¯c ∈ Σk+1
1190
+ p
1191
+ =
1192
+ (c′, 0k+1−rc).
1193
+ Next, encode ¯c via the labeling function g of the p-ary primitive narrow-sense [n, k, 2(t + 2s) + 1]-BCH code and output
1194
+ the redundancy part g(¯c). We map the redundancy part g(¯c) into binary sequence b(g(¯c)) and make b(g(¯c)) to the balanced
1195
+ sequence s(b(g(¯c))). Then, we prepend two 1s as the protecting bits at the beginning of s(b(g(¯c))) and denote h1(¯c) =
1196
+ (1, 1, s(b(g(¯c)))).
1197
+ Further, we need to protect the redundancy part h1(¯c). The idea is to apply the code in Lemma 11 on h1(¯c) since the code
1198
+ in Lemma 11 is capable of correcting at most tℓ + 2s deletions and substitutions. Then, we output gr(h1(¯c)). In addition,
1199
+ make gr(h1(¯c)) to balanced sequence s(gr(h1(¯c))) and repeat its each bit 2tℓ + 3 times. Let h2(¯c) = Rep2tℓ+3s(gr(h1(¯c))),
1200
+
1201
+ 20
1202
+ where Repkx is the k-fold repetition of x.
1203
+ Finally, we have the output Enc(c) = (c, h(c)), where h(c) = (h1(¯c), h2(¯c)). The detailed encoding steps are summarized
1204
+ in the following Algorithm 4.
1205
+ Algorithm 4: Encoding Algorithm
1206
+ Input: c ∈ Σk
1207
+ 2
1208
+ Output: Encoded sequence Enc(c) ∈ ΣN
1209
+ 2
1210
+ Initialization: Let p be the smallest prime larger than tℓ + 2.
1211
+ Step 1: Append 1 at the end of c and get φ(c1) with length rc = wt(c1).
1212
+ Step 2: c′ = φ(c1) mod p ∈ Σrc
1213
+ p . Append 0k+1−rc at the end of c′, then ¯c = (c′, 0k+1−rc).
1214
+ Step 3: Encode ¯c via Cp and output g(¯c). Mapping g(¯c) to balanced binary sequence s(b(g(¯c))) and introduce
1215
+ protecting bits h1(¯c) = (1, 1, s(b(g(¯c)))).
1216
+ Step 4: Protect h1(¯c) via gr and obtain the total redundancy h(c) = (h1(¯c), h2(¯c)).
1217
+ Step 5: Output Enc(c) = (c, h(c)) ∈ ΣN
1218
+ 2 .
1219
+ Lemma 12. Given a sequence c ∈ Σk
1220
+ 2, Algorithm 4 outputs an encoded sequence Enc(c) ∈ ΣN
1221
+ 2 capable of correcting t blocks
1222
+ of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions.
1223
+ Therefore, the redundancy of the code h(c) = (h1(¯c), h2(¯c)) via this encoding process can be shown as follows.
1224
+ Theorem 12. The total redundancy of the code Enc(c) ∈ ΣN
1225
+ 2 by given input c ∈ Σk
1226
+ 2 is
1227
+ N − k = ⌈2(t + 2s)(1 − 1/p)⌉ · ⌈log p⌉
1228
+ log p
1229
+ log(N + 1) + O(log log N).
1230
+ where p is smallest prime such that p ≥ tℓ + 2.
1231
+ Proof. Let m = logp(N + 1), hence N = pm − 1. The lengths of the redundancy parts are as follows:
1232
+ • n′′
1233
+ 1 is the length of g(¯c): n′′
1234
+ 1 = ⌈2(t + 2s)(1 − 1/p)⌉m;
1235
+ • n′
1236
+ 1 is the length of b(g(¯c)): n′
1237
+ 1 = n′′
1238
+ 1 · ⌈log p⌉;
1239
+ • n1 is the length of h1(¯c): n1 = n′
1240
+ 1 + log n′
1241
+ 1 + 3;
1242
+ • n′′
1243
+ 2 is the length of gr(h1(¯c)): n′′
1244
+ 2 = 4(tℓ + 2s) log n1 + log n1;
1245
+ • n′
1246
+ 2 is the length of s(f0(h1(¯c))): n′
1247
+ 2 = n′′
1248
+ 2 + log n′′
1249
+ 2 + 1;
1250
+ • n2 is the length of h2(¯c): n2 = (2tℓ + 3)n′
1251
+ 2;
1252
+
1253
+ 21
1254
+ Based on the above statement, we can see that N − k = n1 + n2, where
1255
+ n′
1256
+ 1 = (⌈2(t + 2s)(1 − 1/p)⌉m) · ⌈log p⌉
1257
+ with m = logp(N + 1). Hence, we have
1258
+ n′
1259
+ 1 = ⌈2(t + 2s)(1 − 1/p)⌉ · ⌈log p⌉
1260
+ log p
1261
+ log(N + 1)
1262
+ Since both t, p and s are constants, then log n′
1263
+ 1 = O(log log N) and n2 = O(log log N). Therefore, the total redundancy of
1264
+ the code Enc(c) ∈ ΣN
1265
+ 2 given the input c ∈ Σk
1266
+ 2 can be shown as the Theorem 12.
1267
+ 2) Decoding Algorithm: Without loss of generality, suppose the encoded sequence Enc(c) ∈ ΣN
1268
+ 2 is transmitted through the
1269
+ t blocks of 0-deletions with ℓ-limited-magnitude and s adjacent transpositions channel, and we have the retrieved sequence
1270
+ d ∈ ΣN−tℓ
1271
+ 2
1272
+ . In this subsection, we will introduce the decoding algorithm for obtaining Dec(d) ∈ Σk
1273
+ 2 by given d ∈ ΣN−tℓ
1274
+ 2
1275
+ .
1276
+ First, we need to distinguish where the redundancy part begins. Since the error type is at most t blocks of 0-deletions with
1277
+ ℓ-limited-magnitude and s adjacent transpositions, the number of 1s in d is the same as that of in Enc(c). Thus, we can
1278
+ count the number of 1s from the end of d to find the beginning of the redundancy since the redundancy part is the balanced
1279
+ sequence.
1280
+ Hence, we find the (n2 + 2tℓ + 3)/2-th 1 and (n1/2 + n2/2 + tℓ + 3)-th 1 from the end of d and denote their entries as
1281
+ ir2 and ir1, respectively. For the subsequence d[ir2,N−tℓ], since there are at most tℓ 0s deletions and s adjacent transpositions
1282
+ occur in Enc(c)[N−n2+1,N], the (2tℓ + 3)-fold repetition code can help recover s(gr(h1(¯c))). Further, we can obtain parity
1283
+ bits gr(h1(¯c)).
1284
+ For the subsequence d[ir1,ir2−1], there are also at most tℓ 0-deletions and 2s substitutions occur in Enc(c)[N−n1−n2+1,N−n2].
1285
+ The recovered parity bits gr(h1(¯c)) can help recover h1(¯c). Further, we remove the two 1 bits at the beginning of h1(¯c) and
1286
+ get the g(¯c) from h1(¯c) = s(b(g(¯c))).
1287
+ Finally, denote z = (φ(d[1,ir1−1], 1), 0k+1−rc) and z′ = z mod p, where rc is the length of φ(d[1,ir1−1], 1) and k =
1288
+ N − n1 − n2. Then, the following decoding steps are the same as Algorithm 3 where z′ is the input of Step 1 of Algorithm 3.
1289
+ The only difference is we need to first remove 0k+1−rc at the end before the last step of φ−1. Therefore, the main steps for
1290
+ decoding d ∈ ΣN−tℓ
1291
+ 2
1292
+ is summerized in Algorithm 5.
1293
+ 3) Time Complexity: For the encoding algorithm, it can be easily shown that the time complexity is dominated by the p-ary
1294
+ narrow-sense BCH code and the code in Lemma 11, which is O(tn log n + (log n)2(tℓ+2s)+1).
1295
+ For the decoding algorithm, the time complexity is also dominated by the decoding of the p-ary narrow-sense BCH code
1296
+ and decoding for the code in Lemma 11. Therefore, the total time complexity of decoding is O(tn + (log n)tℓ+2s+1).
1297
+
1298
+ 22
1299
+ Algorithm 5: Decoding Algorithm
1300
+ Input: d ∈ ΣN−tℓ
1301
+ 2
1302
+ Output: Decoded sequence Dec(d) ∈ Σk
1303
+ 2
1304
+ Initialization: Let p be the smallest prime larger than tℓ + 2.
1305
+ Step 1: Find the (n2 + 2tℓ + 3)/2-th 1 and (n1/2 + n2/2 + tℓ + 3)-th 1 from the end of d and denote their entries as
1306
+ ir2 and ir1, respectively.
1307
+ Step 2: Recover s(gr(h1(¯c))) from d[ir2,N−tℓ] and then get gr(h1(¯c)).
1308
+ Step 3: Recover h1(¯c) via gr(h1(¯c)) and then obtain h1(¯c).
1309
+ Step 4: Denote z′ = (φ(d[1,ir1−1], 1), 0k+1−rc) mod p. Input z′ to Step 1 of Algorithm 3 and run the remaining steps
1310
+ of Algorithm 3.
1311
+ Step 5: Output Dec(d).
1312
+ VI. CONCLUSION
1313
+ In this paper, motivated by the errors in the DNA data storage and flash memories, we presented codes for correcting
1314
+ asymmetric deletions and adjacent transpositions. We first present three uniquely-decodable codes for different types of
1315
+ asymmetric deletions and adjacent transpositions. We then construct a list-decodable code for correcting asymmetric deletions
1316
+ and adjacent transpositions with low redundancy. At last, we present the code for correcting t blocks of 0-deletions with
1317
+ ℓ-limited-magnitude and s adjacent transpositions.
1318
+ However, there still remain some interesting problems.
1319
+ • Construct codes that are capable of correcting symmetric t deletions and s adjacent transpositions with low redundancy.
1320
+ • Construct codes that are capable of correcting t deletions/insertions + k substitutions + s adjacent transpositions.
1321
+ • Construct codes for Damerau-Levenshtein distance for larger number of errors, not only constant t and s.
1322
+ REFERENCES
1323
+ [1] S. Wang, V. K. Vu, and V. Y. Tan, “Codes for the asymmetric Damerau–Levenshtein distance,” in 2022 IEEE Information Theory Workshop (ITW).
1324
+ IEEE, 2022, pp. 558–563.
1325
+ [2] V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions, and reversals,” in Soviet physics doklady, vol. 10, no. 8.
1326
+ Soviet Union,
1327
+ 1966, pp. 707–710.
1328
+ [3] R. A. Wagner and M. J. Fischer, “The string-to-string correction problem,” Journal of the ACM (JACM), vol. 21, no. 1, pp. 168–173, 1974.
1329
+ [4] J. Brakensiek and A. Rubinstein, “Constant-factor approximation of near-linear edit distance in near-linear time,” in Proceedings of the 52nd Annual
1330
+ ACM SIGACT Symposium on Theory of Computing, 2020, pp. 685–698.
1331
+
1332
+ 23
1333
+ [5] Y. M. Chee, H. M. Kiah, A. Vardy, V. K. Vu, and E. Yaakobi, “Codes correcting limited-shift errors in racetrack memories,” in 2018 IEEE International
1334
+ Symposium on Information Theory (ISIT).
1335
+ IEEE, 2018, pp. 96–100.
1336
+ [6] Y. M. Chee, H. M. Kiah, A. Vardy, E. Yaakobi et al., “Coding for racetrack memories,” IEEE Transactions on Information Theory, vol. 64, no. 11, pp.
1337
+ 7094–7112, 2018.
1338
+ [7] S. Archer, G. Mappouras, R. Calderbank, and D. Sorin, “Foosball coding: Correcting shift errors and bit flip errors in 3d racetrack memory,” in 2020
1339
+ 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
1340
+ IEEE, 2020, pp. 331–342.
1341
+ [8] S. Yazdi, R. Gabrys, and O. Milenkovic, “Portable and error-free DNA-based data storage,” Scientific reports, vol. 7, no. 1, pp. 1–6, 2017.
1342
+ [9] S. H. T. Yazdi, H. M. Kiah, E. Garcia-Ruiz, J. Ma, H. Zhao, and O. Milenkovic, “DNA-based storage: Trends and methods,” IEEE Transactions on
1343
+ Molecular, Biological and Multi-Scale Communications, vol. 1, no. 3, pp. 230–248, 2015.
1344
+ [10] K. Cai, Y. M. Chee, R. Gabrys, H. M. Kiah, and T. T. Nguyen, “Correcting a single indel/edit for DNA-based data storage: Linear-time encoders and
1345
+ order-optimality,” IEEE Transactions on Information Theory, vol. 67, no. 6, pp. 3438–3451, 2021.
1346
+ [11] C. Zhao and S. Sahni, “String correction using the Damerau-Levenshtein distance,” BMC bioinformatics, vol. 20, no. 11, pp. 1–28, 2019.
1347
+ [12] R. Gabrys, E. Yaakobi, and O. Milenkovic, “Codes in the Damerau distance for deletion and adjacent transposition correction,” IEEE Transactions on
1348
+ Information Theory, vol. 64, no. 4, pp. 2550–2570, 2017.
1349
+ [13] V. I. Levenshtein, “Binary codes with correction for deletions and insertions of the symbol 1,” Problemy Peredachi Informatsii, vol. 1, no. 1, pp. 12–25,
1350
+ 1965.
1351
+ [14] J. Ullman, “Near-optimal, single-synchronization-error-correcting code,” IEEE Transactions on Information Theory, vol. 12, no. 4, pp. 418–424, 1966.
1352
+ [15] ——, “On the capabilities of codes to correct synchronization errors,” IEEE Transactions on Information Theory, vol. 13, no. 1, pp. 95–105, 1967.
1353
+ [16] L. G. Tallini, N. Elarief, and B. Bose, “On efficient repetition error correcting codes,” in 2010 IEEE International Symposium on Information Theory.
1354
+ IEEE, 2010, pp. 1012–1016.
1355
+ [17] L. Dolecek and V. Anantharam, “Repetition error correcting sets: Explicit constructions and prefixing methods,” SIAM Journal on Discrete Mathematics,
1356
+ vol. 23, no. 4, pp. 2120–2146, 2010.
1357
+ [18] H. Mahdavifar and A. Vardy, “Asymptotically optimal sticky-insertion-correcting codes with efficient encoding and decoding,” in 2017 IEEE International
1358
+ Symposium on Information Theory (ISIT).
1359
+ IEEE, 2017, pp. 2683–2687.
1360
+ [19] S. Jain, F. F. Hassanzadeh, M. Schwartz, and J. Bruck, “Duplication-correcting codes for data storage in the DNA of living organisms,” IEEE Transactions
1361
+ on Information Theory, vol. 63, no. 8, pp. 4996–5010, 2017.
1362
+ [20] M. Kovaˇcevi´c and V. Y. Tan, “Asymptotically optimal codes correcting fixed-length duplication errors in dna storage systems,” IEEE Communications
1363
+ Letters, vol. 22, no. 11, pp. 2194–2197, 2018.
1364
+ [21] L. G. Tallini and B. Bose, “On a new class of error control codes and symmetric functions,” in 2008 IEEE International Symposium on Information
1365
+ Theory.
1366
+ IEEE, 2008, pp. 980–984.
1367
+ [22] ——, “On L1-distance error control codes,” in 2011 IEEE International Symposium on Information Theory Proceedings.
1368
+ IEEE, 2011, pp. 1061–1065.
1369
+ [23] ——, “On L1 metric asymmetric/unidirectional error control codes, constrained weight codes and σ-codes,” in 2013 IEEE International Symposium on
1370
+ Information Theory.
1371
+ IEEE, 2013, pp. 694–698.
1372
+ [24] L. G. Tallini, N. Alqwaifly, and B. Bose, “Deletions and insertions of the symbol “0” and asymmetric/unidirectional error control codes for the L1
1373
+ metric,” IEEE Transactions on Information Theory, vol. 69, no. 1, pp. 86–106, 2022.
1374
+ [25] L. Nunnelley, M. Burleson, L. Williams, and I. Beardsley, “Analysis of asymmetric deterministic bitshift errors in a hard disk file,” IEEE transactions
1375
+ on magnetics, vol. 26, no. 5, pp. 2306–2308, 1990.
1376
+ [26] A. Kuznetsov and A. H. Vinck, “The application of q-ary codes for the correction of single peak-shifts, deletions and insertions of zeros,” in Proceedings.
1377
+ IEEE International Symposium on Information Theory.
1378
+ IEEE, 1993, pp. 128–128.
1379
+
1380
+ 24
1381
+ [27] S. Shamai and G. Kaplan, “Bounds on the cut-off rate of the peak shift magnetic recording channel,” European Transactions on Telecommunications,
1382
+ vol. 4, no. 2, pp. 149–156, 1993.
1383
+ [28] M. Kovaˇcevi´c, “Runlength-limited sequences and shift-correcting codes: Asymptotic analysis,” IEEE Transactions on Information Theory, vol. 65, no. 8,
1384
+ pp. 4804–4814, 2019.
1385
+ [29] I. Smagloy, L. Welter, A. Wachter-Zeh, and E. Yaakobi, “Single-deletion single-substitution correcting codes,” in 2020 IEEE International Symposium
1386
+ on Information Theory (ISIT).
1387
+ IEEE, 2020, pp. 775–780.
1388
+ [30] W. Song, K. Cai, and T. T. Nguyen, “List-decodable codes for single-deletion single-substitution with list-size two,” in 2022 IEEE International Symposium
1389
+ on Information Theory (ISIT).
1390
+ IEEE, 2022, pp. 1004–1009.
1391
+ [31] T. Klove, “Codes correcting a single insertion/deletion of a zero or a single peak-shift,” IEEE transactions on information theory, vol. 41, no. 1, pp.
1392
+ 279–283, 1995.
1393
+ [32] R. Gabrys, V. Guruswami, J. Ribeiro, and K. Wu, “Beyond single-deletion correcting codes: Substitutions and transpositions,” IEEE Transactions on
1394
+ Information Theory, vol. 69, no. 1, pp. 169–186, 2023.
1395
+ [33] N. J. Sloane, “On single-deletion-correcting codes,” Codes and designs, vol. 10, pp. 273–291, 2000.
1396
+ [34] R. M. Roth and P. H. Siegel, “Lee-metric BCH codes and their application to constrained and partial-response channels,” IEEE Transactions on Information
1397
+ Theory, vol. 40, no. 4, pp. 1083–1096, 1994.
1398
+ [35] R. Roth, Introduction to Coding Theory.
1399
+ Cambridge University Press, 2006.
1400
+ [36] H. Wei, X. Wang, and M. Schwartz, “On lattice packings and coverings of asymmetric limited-magnitude balls,” IEEE Transactions on Information
1401
+ Theory, vol. 67, no. 8, pp. 5104–5115, 2021.
1402
+ [37] S. A. Aly, A. Klappenecker, and P. K. Sarvepalli, “On quantum and classical BCH codes,” IEEE Transactions on Information Theory, vol. 53, no. 3,
1403
+ pp. 1183–1188, 2007.
1404
+ [38] D. Knuth, “Efficient balanced codes,” IEEE Transactions on Information Theory, vol. 32, no. 1, pp. 51–53, 1986.
1405
+ [39] J. Sima, R. Gabrys, and J. Bruck, “Optimal systematic t-deletion correcting codes,” in 2020 IEEE International Symposium on Information Theory (ISIT).
1406
+ IEEE, 2020, pp. 769–774.
1407
+
Z9FJT4oBgHgl3EQf7y3s/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
_9AyT4oBgHgl3EQfRfam/content/tmp_files/2301.00068v1.pdf.txt ADDED
@@ -0,0 +1,488 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ On the Inconsistencies of Conditionals Learned by Masked Language
2
+ Models
3
+ Tom Young
4
+ Yang You
5
+ School of Computing,
6
+ National University of Singapore
7
+ tomyoung@nus.edu.sg
8
+ youy@comp.nus.edu.sg
9
+ Abstract
10
+ Learning to predict masked tokens in a se-
11
+ quence has been shown to be a powerful
12
+ pretraining objective for large-scale language
13
+ models. After training, such masked language
14
+ models can provide distributions of tokens con-
15
+ ditioned on bidirectional context.
16
+ In this short draft, we show that such bidirec-
17
+ tional conditionals often demonstrate consider-
18
+ able inconsistencies, i.e., they can not be de-
19
+ rived from a coherent joint distribution when
20
+ considered together. We empirically quantify
21
+ such inconsistencies in the simple scenario of
22
+ bigrams for two common styles of masked lan-
23
+ guage models: T5-style and BERT-style 1. For
24
+ example, we show that T5 models often con-
25
+ fuse its own preference regarding two similar
26
+ bigrams.
27
+ Such inconsistencies may represent a theoreti-
28
+ cal pitfall for the research work on sampling
29
+ sequences based on the bidirectional condi-
30
+ tionals learned by BERT-style MLMs. This
31
+ phenomenon also means that T5-style MLMs
32
+ capable of infilling will generate discrepant
33
+ results depending on how much masking is
34
+ given, which may represent a particular trust
35
+ issue.
36
+ 1
37
+ Introduction
38
+ Pretraining objectives of large language models
39
+ can be roughly divided into two categories. First,
40
+ vanilla next token prediction (Brown et al., 2020)
41
+ aims to learn the distribution of the next token in a
42
+ sequence given the context to the left. Second, the
43
+ masked language modeling (MLM) objective (De-
44
+ vlin et al., 2018; Raffel et al., 2020), which masks
45
+ out a portion of the tokens in a sequence and asks
46
+ the model to predict them, aims to learn the distri-
47
+ bution of one or more tokens given bidirectional
48
+ context.
49
+ 1https://github.com/tomyoung903/MLM_
50
+ inconsistencies
51
+ While the major breakthrough, aka, GPT3
52
+ (Brown et al., 2020) was demonstrated using
53
+ vanilla next token prediction, recent work (Tay
54
+ et al., 2022; Zeng et al., 2022; Bavarian et al., 2022)
55
+ has hinted that incorporating the masked language
56
+ modeling objective may be highly beneficial. In ad-
57
+ dition, (Tay et al., 2022) has demonstrated that such
58
+ bidirectional conditionals provide strong infilling
59
+ capabilities.
60
+ One may notice that, unlike the unidirectional
61
+ conditional distributions that vanilla next token pre-
62
+ diction learns, the bidirectional conditionals that
63
+ MLMs learn are overly abundant in terms of rep-
64
+ resenting a coherent joint distribution. Therefore,
65
+ they are not guaranteed to be self-consistent (see
66
+ Chapter 2).
67
+ A very simple example for such inconsisten-
68
+ cies is shown in Figure 1. In this example, we
69
+ obtain the bidirectional conditional distributions
70
+ that the T5 model learned using two input masked
71
+ sequences. The two similar sequences are designed
72
+ with a small difference, in order to examine if the
73
+ resulting conditionals satisfy a basic law of prob-
74
+ abilities (hold consistency). Results clearly show
75
+ otherwise. We design experiments to quantify such
76
+ inconsistencies in Chapter 3.
77
+ One interesting line of research in the litera-
78
+ ture focused on whether and how the bidirectional
79
+ conditionals that BERT-style MLMs provide can
80
+ be used to construct the joint probability of a se-
81
+ quence in a principled manner (Goyal et al., 2021;
82
+ Ghazvininejad et al., 2019; Wang et al., 2019), just
83
+ like vanilla next token prediction models. But the
84
+ numerous papers on this topic have overlooked
85
+ the concern of inconsistencies. (Yamakoshi et al.,
86
+ 2022) stated that “any deviations (supposedly) tend
87
+ to be negligible with large datasets”. The experi-
88
+ ments shown in Chapter 4 demonstrate that this is
89
+ not the case at all. We thus posit that addressing the
90
+ consistency issue should be treated as the first step
91
+ in modeling the joint distribution with BERT-style
92
+ arXiv:2301.00068v1 [cs.CL] 30 Dec 2022
93
+
94
+ MLMs.
95
+ 2
96
+ Why inconsistencies can occur in
97
+ MLMs
98
+ For a set of conditional distributions to be self-
99
+ consistent, they need to be able to be derived from
100
+ a single coherent joint distribution.
101
+ One essential reason for the inconsistencies to
102
+ occur among the conditionals provided by a trained
103
+ MLM is that the number of conditionals it can
104
+ calculate far exceeds the number of degrees of free-
105
+ dom of a joint distribution.
106
+ Consider a sequence of length L and with vo-
107
+ cabulary V , the joint distribution of the tokens in
108
+ such a sequence is defined by |V |L probabilities
109
+ that sum to 1. Therefore, the number of degrees of
110
+ freedom (D) of such a joint distribution is given
111
+ by:
112
+ Djoint = |V |L − 1,
113
+ (1)
114
+ Vanilla next token prediction models or MLMs
115
+ essentially learn conditionals that predict some
116
+ tokens in the sequence given others. Such con-
117
+ ditional probabilities and probabilities from the
118
+ joint distribution can be linearly derived from each
119
+ other. Therefore, each free conditional that the
120
+ language model is capable of specifying provides
121
+ an additional constraint on the joint distribution.
122
+ One can easily verify that a vanilla next token pre-
123
+ diction based language model provides |V |L − 1
124
+ free conditionals 2 to just exactly determine the
125
+ joint distribution.
126
+ Therefore, a vanilla next to-
127
+ ken prediction model (no matter how it is trained,
128
+ or even untrained) would never suffer from self-
129
+ inconsistencies.
130
+ MLMs, which can provide distributions of
131
+ masked tokens given bidirectional context, could
132
+ specify far more free conditionals.
133
+ Even for the simplest case, where the MLM pre-
134
+ dicts the distribution of only 1 (masked) token
135
+ given L − 1 other (unmasked) tokens in the se-
136
+ quence, the total number of free conditionals (N)
137
+ is
138
+ Nmlm(1) = L × (|V |L − |V |L−1),
139
+ (2)
140
+ Just Nmlm(1) is already far larger than Djoint.
141
+ We leave the discussions for Nmlm(k) for later
142
+ 2A single softmax operation over V essentially gives |V |−
143
+ 1 free conditionals. Here we call conditionals free when they
144
+ can be assigned any values decided by an underlying neural
145
+ network.
146
+ work. This fact sets up room for there to be in-
147
+ consistencies among the conditionals an MLM pro-
148
+ vides.
149
+ We explain our strategies and quantification
150
+ methods for diagnosing T5-style and BERT-style
151
+ MLMs in the next 2 sections.
152
+ 3
153
+ Diagnosing T5-style MLMs
154
+ T5-style MLMs are capable of modeling the dis-
155
+ tribution of segments of variable length in a given
156
+ bidirectional context. Here we use the simple bi-
157
+ gram scenario to expose the inconsistencies that
158
+ exist among such distributions. Consider two bi-
159
+ grams x1x21 and x1x22 that share a same token x1
160
+ in the first position, the conditional distributions
161
+ concerning such two bigrams should satisfy
162
+ p(x21|x1)
163
+ p(x22|x1) = p(x1x21)
164
+ p(x1x22)
165
+ (3)
166
+ The left hand side can be obtained by only mask-
167
+ ing the second token, leaving x1 in the context.
168
+ While the right hand side can be obtained by mask-
169
+ ing the whole bigram. For the example in Figure 1,
170
+ “chicken” corresponds to x1. “Salad” and “breast”
171
+ correspond to x21 and x22.
172
+ We automatically build such a dataset of bigram
173
+ pairs in a given context by running BART (Lewis
174
+ et al., 2019) on a portion of the C4 dataset (Raffel
175
+ et al., 2020) to generate another plausible bigram
176
+ alternative to an existing one. We then use the two
177
+ sequences to test T5’s inconsistencies regarding
178
+ Equation 3 3.
179
+ We can use relative difference (dr) of the left
180
+ and right hand side of Equation 3 to quantify the
181
+ inconsistency.
182
+ dr = |lhs(3) − rhs(3)|
183
+ lhs(3)
184
+ (4)
185
+ dr is expected to be 0 for a self-consistent MLM.
186
+ Table 1 shows that dr is typically very large for
187
+ the T5 family, although scaling up the model has a
188
+ markable effect on reducing it.
189
+ Another way to quantify the inconsistency re-
190
+ garding the two bigrams is to count how often a
191
+ severe case happens where the MLM disagrees
192
+ with itself on which bigram it prefers. I.e., some-
193
+ times lhs(3) > 1 and rhs(3) < 1, or lhs(3) < 1
194
+ 3We focus on plausible bigrams in this draft because they
195
+ are most relevant in practice but Equation 3 should hold for
196
+ all bigrams in all sentences in all corpora in a self-consistent
197
+ MLM.
198
+
199
+ The
200
+ is a common choice of food.
201
+ <mask>
202
+ option
203
+ 𝑝
204
+
205
+
206
+ breast
207
+ 0.030
208
+
209
+
210
+ salad
211
+ 0.024
212
+
213
+
214
+ The
215
+ is a common choice of food.
216
+ <mask>
217
+ option
218
+ 𝑝
219
+
220
+
221
+ chicken salad
222
+ 0.00028
223
+
224
+
225
+ chicken breast
226
+ 0.00017
227
+
228
+
229
+ Basic law of probabilities
230
+ 𝑝 salad chicken)
231
+ 𝑝 breast chicken) = 𝑝(chicken salad)
232
+ 𝑝(chicken breast)
233
+ 𝑝 breast chicken) > 𝑝 salad chicken)
234
+ 𝑝(chicken breast) < 𝑝(chicken salad)
235
+ chicken
236
+ Figure 1: A simple bigram example that exposes the inconsistencies in the T5 model. The conditional probabilities
237
+ that the model learned (quoted from t5-11b fed with the shown masked sequences) contradict each other greatly.
238
+ Not only are the ratios unbalanced, the model confuses its own preference of the two bigrams.
239
+ and rhs(3) > 1.
240
+ Figure 1 shows such a case,
241
+ where t5-11b prefers “chicken salad” over “chicken
242
+ breast” when considering the conditionals provided
243
+ in rhs(3), yet its preference flips when considering
244
+ lhs(3). Table 1 shows that disagreement on com-
245
+ parison happens with considerable frequency, but
246
+ scaling up models helps reduce it.
247
+ 4
248
+ Diagnosing BERT-style MLMs
249
+ Ever since the success of BERT (Devlin et al.,
250
+ 2018), there has been research effort (Goyal et al.,
251
+ 2021; Wang et al., 2019; Yamakoshi et al., 2022)
252
+ on sampling sequences from it by modeling its
253
+ implicitly specified joint distribution one way or
254
+ another. For example, (Goyal et al., 2021) views
255
+ it as an energy-based model defined using the
256
+ bidirectional conditionals of the masked tokens.
257
+ Such research effort is based on the intuition that
258
+ bidirectional conditionals could be more robust
259
+ than auto-regressive (unidirectional) conditionals
260
+ (Goyal, 2021).
261
+ This line of research operates based on the as-
262
+ sumption that the overly abundant bidirectional
263
+ conditionals that the BERT-style MLMs provide
264
+ are self-consistent. (Yamakoshi et al., 2022) based
265
+ on (Heckerman et al., 2000; Neville and Jensen,
266
+ 2007) stated that “any deviations (supposedly) tend
267
+ to be negligible”.
268
+ We demonstrate in this section that this is not
269
+ the case at all. There are considerable inconsis-
270
+ tencies that exist among the bidirectional condi-
271
+ tionals that a trained BERT-style model provides.
272
+ Figure 2 demonstrates such an example. Again
273
+ we use bigrams as the simplest example to expose
274
+ the inconsistencies. Because BERT-style MLMs
275
+ cannot directly model the distribution of multiple
276
+ tokens together (local joint distribution), we con-
277
+ sider 4 bigrams this time: x11x21, x11x22, x12x21
278
+ and x12x22. x11 and x12 are two possible tokens
279
+ that the first position can take. x21 and x22 the sec-
280
+ ond. One can easily verify 4 that the 8 conditional
281
+ distributions concerning such four bigrams should
282
+ theoretically satisfy
283
+ p(x21|x11)
284
+ p(x22|x11) × p(x11|x22)
285
+ p(x12|x22) =
286
+ p(x11|x21)
287
+ p(x12|x21) × p(x21|x12)
288
+ p(x22|x12)
289
+ (5)
290
+ One way to test the inconsistencies among the 8
291
+ conditionals is to try to solve one using the other
292
+ 7 and compare the solved conditional with the
293
+ original (inferred by model) one. We show the
294
+ solved conditionals in the example in Figure 2. It
295
+ clearly demonstrates that the probabilities given by
296
+ 4Clue: converting each term to local joint distributions.
297
+
298
+ I had
299
+ eggs
300
+ <mask>
301
+ I had
302
+ at lunch.
303
+ <mask>
304
+ 𝑝
305
+ Inferred
306
+ Solved
307
+ 𝑝 duck eggs)
308
+ 1.7 × 10−4
309
+ 9.0 × 10−6
310
+ 𝑝 chicken eggs)
311
+ 1.1 × 10−3
312
+ 0.020
313
+ 𝑝 duck soup)
314
+ 3.1 × 10−4
315
+ 5.8 × 10−3
316
+ 𝑝 chicken soup)
317
+ 0.17
318
+ 9.2 × 10−3
319
+ 𝑝 eggs duck)
320
+ 5.7 × 10−3
321
+ 0.11
322
+ 𝑝 soup duck)
323
+ 0.23
324
+ 0.012
325
+ 𝑝 eggs chicken)
326
+ 6.8 × 10−4
327
+ 3.7 × 10−5
328
+ 𝑝 soup chicken)
329
+ 0.13
330
+ 2.31
331
+ 𝑝(eggs|duck)
332
+ 𝑝(soup|duck) ×
333
+ 𝑝(duck|soup)
334
+ 𝑝(chicken|soup) =
335
+ 𝑝(duck|eggs)
336
+ 𝑝(chicken|eggs) × 𝑝(eggs|chicken)
337
+ 𝑝(soup|chicken)
338
+ at lunch.
339
+ I had
340
+ soup
341
+ <mask>
342
+ at lunch.
343
+ duck
344
+ I had
345
+ at lunch.
346
+ <mask>
347
+ chicken
348
+ Figure 2: An example of inconsistencies in the BERT-style MLM. Each “inferred” value refers to the probability
349
+ given by the MLM (RoBERTa-large in this figure). Each “solved” value is obtained by passing the other 7 “inferred”
350
+ values to the equation in the red square. We see that the difference between each inferred and solved value is
351
+ significant. And the solved value may even be larger than 1.
352
+ Metric
353
+ T5-base
354
+ T5-large
355
+ T5-3b
356
+ T5-11b
357
+ Relative difference (dr, median, %)
358
+ 47.5
359
+ 45.8
360
+ 44.7
361
+ 42.0
362
+ Disagreement on comparison (%)
363
+ 9.64
364
+ 8.85
365
+ 7.53
366
+ 6.54
367
+ Table 1: Inconsistencies in the T5 model tested on 19399 pairs of bigrams. We show the median value for relative
368
+ difference as it is resilient to outliers.
369
+ a BERT-style MLM can be in serious inconsisten-
370
+ cies with each other. We build a testing dataset
371
+ with 4 such plausible bigrams for each context and
372
+ quantify consistencies in using difference of log
373
+ probabilities:
374
+ | log psolved − log pinferred|
375
+ (6)
376
+ Table 2 shows the results.
377
+ 5
378
+ Summary
379
+ This draft demonstrates and naively quantifies the
380
+ inconsistencies that exist in large MLMs in the
381
+ simple scenario of bigrams. Such inconsistencies
382
+ originate from the fact that the number of bidirec-
383
+ tional conditionals MLMs can learn far exceeds
384
+ what is needed for constructing the joint distribu-
385
+ tion. Given the recent evidence that MLM-based
386
+ pretraining might be a powerful paradigm, we think
387
+ that resolving the its consistency issue could be a
388
+ necessary step for future work.
389
+ Acknowledgements
390
+ We would like to thank Fuzhao Xue for the useful
391
+ discussions.
392
+ References
393
+ Mohammad Bavarian, Heewoo Jun, Nikolas Tezak,
394
+ John Schulman, Christine McLeavey, Jerry Tworek,
395
+ and Mark Chen. 2022.
396
+ Efficient training of lan-
397
+ guage models to fill in the middle. arXiv preprint
398
+ arXiv:2207.14255.
399
+ Tom B Brown, Benjamin Mann, Nick Ryder, Melanie
400
+ Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind
401
+ Neelakantan, Pranav Shyam, Girish Sastry, Amanda
402
+ Askell, et al. 2020. Language models are few-shot
403
+ learners. arXiv preprint arXiv:2005.14165.
404
+ Jacob Devlin, Ming-Wei Chang, Kenton Lee, and
405
+ Kristina Toutanova. 2018. Bert: Pre-training of deep
406
+ bidirectional transformers for language understand-
407
+ ing. arXiv preprint arXiv:1810.04805.
408
+ Marjan Ghazvininejad, Omer Levy, Yinhan Liu, and
409
+ Luke Zettlemoyer. 2019.
410
+ Mask-predict: Parallel
411
+
412
+ Metric
413
+ Roberta-base
414
+ Roberta-large
415
+ log-probability difference
416
+ 0.836
417
+ 0.792
418
+ Table 2: Difference of log-probabilities between inferred and solved conditionals. The difference would be 0 for
419
+ self-consistent MLMs. Roughly a 0.8 difference means that one is 120% larger than the other.
420
+ decoding of conditional masked language models.
421
+ arXiv preprint arXiv:1904.09324.
422
+ K. Goyal. 2021. Characterizing and overcoming the
423
+ limitations of neural autoregressive models.
424
+ PhD
425
+ thesis.
426
+ Kartik Goyal, Chris Dyer, and Taylor Berg-Kirkpatrick.
427
+ 2021. Exposing the implicit energy networks behind
428
+ masked language models via metropolis–hastings.
429
+ arXiv preprint arXiv:2106.02736.
430
+ David
431
+ Heckerman,
432
+ David
433
+ Maxwell
434
+ Chickering,
435
+ Christopher Meek, Robert Rounthwaite, and Carl
436
+ Kadie. 2000. Dependency networks for inference,
437
+ collaborative filtering, and data visualization. Jour-
438
+ nal of Machine Learning Research, 1(Oct):49–75.
439
+ Mike
440
+ Lewis,
441
+ Yinhan
442
+ Liu,
443
+ Naman
444
+ Goyal,
445
+ Mar-
446
+ jan Ghazvininejad, Abdelrahman Mohamed, Omer
447
+ Levy, Ves Stoyanov, and Luke Zettlemoyer. 2019.
448
+ Bart: Denoising sequence-to-sequence pre-training
449
+ for natural language generation, translation, and
450
+ comprehension. arXiv preprint arXiv:1910.13461.
451
+ Jennifer Neville and David Jensen. 2007. Relational
452
+ dependency networks. Journal of Machine Learning
453
+ Research, 8(3).
454
+ Colin Raffel, Noam Shazeer, Adam Roberts, Katherine
455
+ Lee, Sharan Narang, Michael Matena, Yanqi Zhou,
456
+ Wei Li, Peter J Liu, et al. 2020. Exploring the limits
457
+ of transfer learning with a unified text-to-text trans-
458
+ former. J. Mach. Learn. Res., 21(140):1–67.
459
+ Yi Tay, Jason Wei, Hyung Won Chung, Vinh Q
460
+ Tran, David R So, Siamak Shakeri, Xavier Gar-
461
+ cia, Huaixiu Steven Zheng, Jinfeng Rao, Aakanksha
462
+ Chowdhery, et al. 2022.
463
+ Transcending scaling
464
+ laws with 0.1% extra compute.
465
+ arXiv preprint
466
+ arXiv:2210.11399.
467
+ Alex
468
+ Wang,
469
+ Kyunghyun
470
+ Cho,
471
+ and
472
+ CIFAR
473
+ Azrieli Global Scholar. 2019.
474
+ Bert has a mouth,
475
+ and it must speak: Bert as a markov random field
476
+ language model. NAACL HLT 2019, page 30.
477
+ Takateru Yamakoshi, Thomas L Griffiths, and Robert
478
+ Hawkins. 2022. Probing bert’s priors with serial re-
479
+ production chains. In Findings of the Association
480
+ for Computational Linguistics: ACL 2022, pages
481
+ 3977–3992.
482
+ Aohan Zeng, Xiao Liu, Zhengxiao Du, Zihan Wang,
483
+ Hanyu Lai, Ming Ding, Zhuoyi Yang, Yifan Xu,
484
+ Wendi Zheng, Xiao Xia, et al. 2022.
485
+ Glm-130b:
486
+ An open bilingual pre-trained model. arXiv preprint
487
+ arXiv:2210.02414.
488
+
_9AyT4oBgHgl3EQfRfam/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,238 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf,len=237
2
+ page_content='On the Inconsistencies of Conditionals Learned by Masked Language Models Tom Young Yang You School of Computing, National University of Singapore tomyoung@nus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
3
+ page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
4
+ page_content='sg youy@comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
5
+ page_content='nus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
6
+ page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
7
+ page_content='sg Abstract Learning to predict masked tokens in a se- quence has been shown to be a powerful pretraining objective for large-scale language models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
8
+ page_content=' After training, such masked language models can provide distributions of tokens con- ditioned on bidirectional context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
9
+ page_content=' In this short draft, we show that such bidirec- tional conditionals often demonstrate consider- able inconsistencies, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
10
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
11
+ page_content=', they can not be de- rived from a coherent joint distribution when considered together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
12
+ page_content=' We empirically quantify such inconsistencies in the simple scenario of bigrams for two common styles of masked lan- guage models: T5-style and BERT-style 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
13
+ page_content=' For example, we show that T5 models often con- fuse its own preference regarding two similar bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
14
+ page_content=' Such inconsistencies may represent a theoreti- cal pitfall for the research work on sampling sequences based on the bidirectional condi- tionals learned by BERT-style MLMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
15
+ page_content=' This phenomenon also means that T5-style MLMs capable of infilling will generate discrepant results depending on how much masking is given, which may represent a particular trust issue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
16
+ page_content=' 1 Introduction Pretraining objectives of large language models can be roughly divided into two categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
17
+ page_content=' First, vanilla next token prediction (Brown et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
18
+ page_content=', 2020) aims to learn the distribution of the next token in a sequence given the context to the left.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
19
+ page_content=' Second, the masked language modeling (MLM) objective (De- vlin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
20
+ page_content=', 2018;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
21
+ page_content=' Raffel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
22
+ page_content=', 2020), which masks out a portion of the tokens in a sequence and asks the model to predict them, aims to learn the distri- bution of one or more tokens given bidirectional context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
23
+ page_content=' 1https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
24
+ page_content='com/tomyoung903/MLM_ inconsistencies While the major breakthrough, aka, GPT3 (Brown et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
25
+ page_content=', 2020) was demonstrated using vanilla next token prediction, recent work (Tay et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
26
+ page_content=', 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
27
+ page_content=' Zeng et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
28
+ page_content=', 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
29
+ page_content=' Bavarian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
30
+ page_content=', 2022) has hinted that incorporating the masked language modeling objective may be highly beneficial.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
31
+ page_content=' In ad- dition, (Tay et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
32
+ page_content=', 2022) has demonstrated that such bidirectional conditionals provide strong infilling capabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
33
+ page_content=' One may notice that, unlike the unidirectional conditional distributions that vanilla next token pre- diction learns, the bidirectional conditionals that MLMs learn are overly abundant in terms of rep- resenting a coherent joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
34
+ page_content=' Therefore, they are not guaranteed to be self-consistent (see Chapter 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
35
+ page_content=' A very simple example for such inconsisten- cies is shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
36
+ page_content=' In this example, we obtain the bidirectional conditional distributions that the T5 model learned using two input masked sequences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
37
+ page_content=' The two similar sequences are designed with a small difference, in order to examine if the resulting conditionals satisfy a basic law of prob- abilities (hold consistency).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
38
+ page_content=' Results clearly show otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
39
+ page_content=' We design experiments to quantify such inconsistencies in Chapter 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
40
+ page_content=' One interesting line of research in the litera- ture focused on whether and how the bidirectional conditionals that BERT-style MLMs provide can be used to construct the joint probability of a se- quence in a principled manner (Goyal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
41
+ page_content=', 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
42
+ page_content=' Ghazvininejad et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
43
+ page_content=', 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
44
+ page_content=' Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
45
+ page_content=', 2019), just like vanilla next token prediction models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
46
+ page_content=' But the numerous papers on this topic have overlooked the concern of inconsistencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
47
+ page_content=' (Yamakoshi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
48
+ page_content=', 2022) stated that “any deviations (supposedly) tend to be negligible with large datasets”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
49
+ page_content=' The experi- ments shown in Chapter 4 demonstrate that this is not the case at all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
50
+ page_content=' We thus posit that addressing the consistency issue should be treated as the first step in modeling the joint distribution with BERT-style arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
51
+ page_content='00068v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
52
+ page_content='CL] 30 Dec 2022 MLMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
53
+ page_content=' 2 Why inconsistencies can occur in MLMs For a set of conditional distributions to be self- consistent, they need to be able to be derived from a single coherent joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
54
+ page_content=' One essential reason for the inconsistencies to occur among the conditionals provided by a trained MLM is that the number of conditionals it can calculate far exceeds the number of degrees of free- dom of a joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
55
+ page_content=' Consider a sequence of length L and with vo- cabulary V , the joint distribution of the tokens in such a sequence is defined by |V |L probabilities that sum to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
56
+ page_content=' Therefore, the number of degrees of freedom (D) of such a joint distribution is given by: Djoint = |V |L − 1, (1) Vanilla next token prediction models or MLMs essentially learn conditionals that predict some tokens in the sequence given others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
57
+ page_content=' Such con- ditional probabilities and probabilities from the joint distribution can be linearly derived from each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
58
+ page_content=' Therefore, each free conditional that the language model is capable of specifying provides an additional constraint on the joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
59
+ page_content=' One can easily verify that a vanilla next token pre- diction based language model provides |V |L − 1 free conditionals 2 to just exactly determine the joint distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
60
+ page_content=' Therefore, a vanilla next to- ken prediction model (no matter how it is trained, or even untrained) would never suffer from self- inconsistencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
61
+ page_content=' MLMs, which can provide distributions of masked tokens given bidirectional context, could specify far more free conditionals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
62
+ page_content=' Even for the simplest case, where the MLM pre- dicts the distribution of only 1 (masked) token given L − 1 other (unmasked) tokens in the se- quence, the total number of free conditionals (N) is Nmlm(1) = L × (|V |L − |V |L−1), (2) Just Nmlm(1) is already far larger than Djoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
63
+ page_content=' We leave the discussions for Nmlm(k) for later 2A single softmax operation over V essentially gives |V |− 1 free conditionals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
64
+ page_content=' Here we call conditionals free when they can be assigned any values decided by an underlying neural network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
65
+ page_content=' work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
66
+ page_content=' This fact sets up room for there to be in- consistencies among the conditionals an MLM pro- vides.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
67
+ page_content=' We explain our strategies and quantification methods for diagnosing T5-style and BERT-style MLMs in the next 2 sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
68
+ page_content=' 3 Diagnosing T5-style MLMs T5-style MLMs are capable of modeling the dis- tribution of segments of variable length in a given bidirectional context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
69
+ page_content=' Here we use the simple bi- gram scenario to expose the inconsistencies that exist among such distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
70
+ page_content=' Consider two bi- grams x1x21 and x1x22 that share a same token x1 in the first position, the conditional distributions concerning such two bigrams should satisfy p(x21|x1) p(x22|x1) = p(x1x21) p(x1x22) (3) The left hand side can be obtained by only mask- ing the second token, leaving x1 in the context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
71
+ page_content=' While the right hand side can be obtained by mask- ing the whole bigram.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
72
+ page_content=' For the example in Figure 1, “chicken” corresponds to x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
73
+ page_content=' “Salad” and “breast” correspond to x21 and x22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
74
+ page_content=' We automatically build such a dataset of bigram pairs in a given context by running BART (Lewis et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
75
+ page_content=', 2019) on a portion of the C4 dataset (Raffel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
76
+ page_content=', 2020) to generate another plausible bigram alternative to an existing one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
77
+ page_content=' We then use the two sequences to test T5’s inconsistencies regarding Equation 3 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
78
+ page_content=' We can use relative difference (dr) of the left and right hand side of Equation 3 to quantify the inconsistency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
79
+ page_content=' dr = |lhs(3) − rhs(3)| lhs(3) (4) dr is expected to be 0 for a self-consistent MLM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
80
+ page_content=' Table 1 shows that dr is typically very large for the T5 family, although scaling up the model has a markable effect on reducing it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
81
+ page_content=' Another way to quantify the inconsistency re- garding the two bigrams is to count how often a severe case happens where the MLM disagrees with itself on which bigram it prefers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
82
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
83
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
84
+ page_content=', some- times lhs(3) > 1 and rhs(3) < 1, or lhs(3) < 1 3We focus on plausible bigrams in this draft because they are most relevant in practice but Equation 3 should hold for all bigrams in all sentences in all corpora in a self-consistent MLM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
85
+ page_content=' The is a common choice of food.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
86
+ page_content=' <mask> option 𝑝 … … breast 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
87
+ page_content='030 … … salad 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
88
+ page_content='024 … … The is a common choice of food.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
89
+ page_content=' <mask> option 𝑝 … … chicken salad 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
90
+ page_content='00028 … … chicken breast 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
91
+ page_content='00017 … … Basic law of probabilities 𝑝 salad chicken) 𝑝 breast chicken) = 𝑝(chicken salad) 𝑝(chicken breast) 𝑝 breast chicken) > 𝑝 salad chicken) 𝑝(chicken breast) < 𝑝(chicken salad) chicken Figure 1: A simple bigram example that exposes the inconsistencies in the T5 model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
92
+ page_content=' The conditional probabilities that the model learned (quoted from t5-11b fed with the shown masked sequences) contradict each other greatly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
93
+ page_content=' Not only are the ratios unbalanced, the model confuses its own preference of the two bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
94
+ page_content=' and rhs(3) > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
95
+ page_content=' Figure 1 shows such a case, where t5-11b prefers “chicken salad” over “chicken breast” when considering the conditionals provided in rhs(3), yet its preference flips when considering lhs(3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
96
+ page_content=' Table 1 shows that disagreement on com- parison happens with considerable frequency, but scaling up models helps reduce it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
97
+ page_content=' 4 Diagnosing BERT-style MLMs Ever since the success of BERT (Devlin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
98
+ page_content=', 2018), there has been research effort (Goyal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
99
+ page_content=', 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
100
+ page_content=' Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
101
+ page_content=', 2019;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
102
+ page_content=' Yamakoshi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
103
+ page_content=', 2022) on sampling sequences from it by modeling its implicitly specified joint distribution one way or another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
104
+ page_content=' For example, (Goyal et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
105
+ page_content=', 2021) views it as an energy-based model defined using the bidirectional conditionals of the masked tokens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
106
+ page_content=' Such research effort is based on the intuition that bidirectional conditionals could be more robust than auto-regressive (unidirectional) conditionals (Goyal, 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
107
+ page_content=' This line of research operates based on the as- sumption that the overly abundant bidirectional conditionals that the BERT-style MLMs provide are self-consistent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
108
+ page_content=' (Yamakoshi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
109
+ page_content=', 2022) based on (Heckerman et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
110
+ page_content=', 2000;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
111
+ page_content=' Neville and Jensen, 2007) stated that “any deviations (supposedly) tend to be negligible”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
112
+ page_content=' We demonstrate in this section that this is not the case at all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
113
+ page_content=' There are considerable inconsis- tencies that exist among the bidirectional condi- tionals that a trained BERT-style model provides.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
114
+ page_content=' Figure 2 demonstrates such an example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
115
+ page_content=' Again we use bigrams as the simplest example to expose the inconsistencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
116
+ page_content=' Because BERT-style MLMs cannot directly model the distribution of multiple tokens together (local joint distribution), we con- sider 4 bigrams this time: x11x21, x11x22, x12x21 and x12x22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
117
+ page_content=' x11 and x12 are two possible tokens that the first position can take.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
118
+ page_content=' x21 and x22 the sec- ond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
119
+ page_content=' One can easily verify 4 that the 8 conditional distributions concerning such four bigrams should theoretically satisfy p(x21|x11) p(x22|x11) × p(x11|x22) p(x12|x22) = p(x11|x21) p(x12|x21) × p(x21|x12) p(x22|x12) (5) One way to test the inconsistencies among the 8 conditionals is to try to solve one using the other 7 and compare the solved conditional with the original (inferred by model) one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
120
+ page_content=' We show the solved conditionals in the example in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
121
+ page_content=' It clearly demonstrates that the probabilities given by 4Clue: converting each term to local joint distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
122
+ page_content=' I had eggs <mask> I had at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
123
+ page_content=' <mask> 𝑝 Inferred Solved 𝑝 duck eggs) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
124
+ page_content='7 × 10−4 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
125
+ page_content='0 × 10−6 𝑝 chicken eggs) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
126
+ page_content='1 × 10−3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
127
+ page_content='020 𝑝 duck soup) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
128
+ page_content='1 × 10−4 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
129
+ page_content='8 × 10−3 𝑝 chicken soup) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
130
+ page_content='17 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
131
+ page_content='2 × 10−3 𝑝 eggs duck) 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
132
+ page_content='7 × 10−3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
133
+ page_content='11 𝑝 soup duck) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
134
+ page_content='23 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
135
+ page_content='012 𝑝 eggs chicken) 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
136
+ page_content='8 × 10−4 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
137
+ page_content='7 × 10−5 𝑝 soup chicken) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
138
+ page_content='13 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
139
+ page_content='31 𝑝(eggs|duck) 𝑝(soup|duck) × 𝑝(duck|soup) 𝑝(chicken|soup) = 𝑝(duck|eggs) 𝑝(chicken|eggs) × 𝑝(eggs|chicken) 𝑝(soup|chicken) at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
140
+ page_content=' I had soup <mask> at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
141
+ page_content=' duck I had at lunch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
142
+ page_content=' <mask> chicken Figure 2: An example of inconsistencies in the BERT-style MLM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
143
+ page_content=' Each “inferred” value refers to the probability given by the MLM (RoBERTa-large in this figure).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
144
+ page_content=' Each “solved” value is obtained by passing the other 7 “inferred” values to the equation in the red square.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
145
+ page_content=' We see that the difference between each inferred and solved value is significant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
146
+ page_content=' And the solved value may even be larger than 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
147
+ page_content=' Metric T5-base T5-large T5-3b T5-11b Relative difference (dr, median, %) 47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
148
+ page_content='5 45.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
149
+ page_content='8 44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
150
+ page_content='7 42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
151
+ page_content='0 Disagreement on comparison (%) 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
152
+ page_content='64 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
153
+ page_content='85 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
154
+ page_content='53 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
155
+ page_content='54 Table 1: Inconsistencies in the T5 model tested on 19399 pairs of bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
156
+ page_content=' We show the median value for relative difference as it is resilient to outliers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
157
+ page_content=' a BERT-style MLM can be in serious inconsisten- cies with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
158
+ page_content=' We build a testing dataset with 4 such plausible bigrams for each context and quantify consistencies in using difference of log probabilities: | log psolved − log pinferred| (6) Table 2 shows the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
159
+ page_content=' 5 Summary This draft demonstrates and naively quantifies the inconsistencies that exist in large MLMs in the simple scenario of bigrams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
160
+ page_content=' Such inconsistencies originate from the fact that the number of bidirec- tional conditionals MLMs can learn far exceeds what is needed for constructing the joint distribu- tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
161
+ page_content=' Given the recent evidence that MLM-based pretraining might be a powerful paradigm, we think that resolving the its consistency issue could be a necessary step for future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
162
+ page_content=' Acknowledgements We would like to thank Fuzhao Xue for the useful discussions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
163
+ page_content=' References Mohammad Bavarian, Heewoo Jun, Nikolas Tezak, John Schulman, Christine McLeavey, Jerry Tworek, and Mark Chen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
164
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
165
+ page_content=' Efficient training of lan- guage models to fill in the middle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
166
+ page_content=' arXiv preprint arXiv:2207.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
167
+ page_content='14255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
168
+ page_content=' Tom B Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
169
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
170
+ page_content=' Language models are few-shot learners.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
171
+ page_content=' arXiv preprint arXiv:2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
172
+ page_content='14165.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
173
+ page_content=' Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
174
+ page_content=' 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
175
+ page_content=' Bert: Pre-training of deep bidirectional transformers for language understand- ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
176
+ page_content=' arXiv preprint arXiv:1810.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
177
+ page_content='04805.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
178
+ page_content=' Marjan Ghazvininejad, Omer Levy, Yinhan Liu, and Luke Zettlemoyer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
179
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
180
+ page_content=' Mask-predict: Parallel Metric Roberta-base Roberta-large log-probability difference 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
181
+ page_content='836 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
182
+ page_content='792 Table 2: Difference of log-probabilities between inferred and solved conditionals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
183
+ page_content=' The difference would be 0 for self-consistent MLMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
184
+ page_content=' Roughly a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
185
+ page_content='8 difference means that one is 120% larger than the other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
186
+ page_content=' decoding of conditional masked language models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
187
+ page_content=' arXiv preprint arXiv:1904.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
188
+ page_content='09324.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
189
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
190
+ page_content=' Goyal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
191
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
192
+ page_content=' Characterizing and overcoming the limitations of neural autoregressive models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
193
+ page_content=' PhD thesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
194
+ page_content=' Kartik Goyal, Chris Dyer, and Taylor Berg-Kirkpatrick.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
195
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
196
+ page_content=' Exposing the implicit energy networks behind masked language models via metropolis–hastings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
197
+ page_content=' arXiv preprint arXiv:2106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
198
+ page_content='02736.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
199
+ page_content=' David Heckerman, David Maxwell Chickering, Christopher Meek, Robert Rounthwaite, and Carl Kadie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
200
+ page_content=' 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
201
+ page_content=' Dependency networks for inference, collaborative filtering, and data visualization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
202
+ page_content=' Jour- nal of Machine Learning Research, 1(Oct):49–75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
203
+ page_content=' Mike Lewis, Yinhan Liu, Naman Goyal, Mar- jan Ghazvininejad, Abdelrahman Mohamed, Omer Levy, Ves Stoyanov, and Luke Zettlemoyer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
204
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
205
+ page_content=' Bart: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
206
+ page_content=' arXiv preprint arXiv:1910.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
207
+ page_content='13461.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
208
+ page_content=' Jennifer Neville and David Jensen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
209
+ page_content=' 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
210
+ page_content=' Relational dependency networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
211
+ page_content=' Journal of Machine Learning Research, 8(3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
212
+ page_content=' Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, Peter J Liu, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
213
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
214
+ page_content=' Exploring the limits of transfer learning with a unified text-to-text trans- former.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
215
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
216
+ page_content=' Mach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
217
+ page_content=' Learn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
218
+ page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
219
+ page_content=', 21(140):1–67.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
220
+ page_content=' Yi Tay, Jason Wei, Hyung Won Chung, Vinh Q Tran, David R So, Siamak Shakeri, Xavier Gar- cia, Huaixiu Steven Zheng, Jinfeng Rao, Aakanksha Chowdhery, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
221
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
222
+ page_content=' Transcending scaling laws with 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
223
+ page_content='1% extra compute.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
224
+ page_content=' arXiv preprint arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
225
+ page_content='11399.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
226
+ page_content=' Alex Wang, Kyunghyun Cho, and CIFAR Azrieli Global Scholar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
227
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
228
+ page_content=' Bert has a mouth, and it must speak: Bert as a markov random field language model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
229
+ page_content=' NAACL HLT 2019, page 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
230
+ page_content=' Takateru Yamakoshi, Thomas L Griffiths, and Robert Hawkins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
231
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
232
+ page_content=' Probing bert’s priors with serial re- production chains.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
233
+ page_content=' In Findings of the Association for Computational Linguistics: ACL 2022, pages 3977–3992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
234
+ page_content=' Aohan Zeng, Xiao Liu, Zhengxiao Du, Zihan Wang, Hanyu Lai, Ming Ding, Zhuoyi Yang, Yifan Xu, Wendi Zheng, Xiao Xia, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
235
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
236
+ page_content=' Glm-130b: An open bilingual pre-trained model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
237
+ page_content=' arXiv preprint arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
238
+ page_content='02414.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/_9AyT4oBgHgl3EQfRfam/content/2301.00068v1.pdf'}
_dA0T4oBgHgl3EQfPf96/content/tmp_files/2301.02176v1.pdf.txt ADDED
@@ -0,0 +1,1309 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Draft version January 6, 2023
2
+ Preprint typeset using LATEX style AASTeX6 v. 1.0
3
+ AN EQUATION OF STATE OF CO FOR USE IN PLANETARY MODELING
4
+ M. Podolak
5
+ Dept. of Geosciences, Tel Aviv University, Tel Aviv, 69978 Israel
6
+ A. Levi
7
+ Braude College of Engineering, Karmiel, 2161002 Israel
8
+ A. Vazan
9
+ Astrophysics Research Center (ARCO), Dept. of Natural Sciences, Open University of Israel, Raanana, 43107 Israel
10
+ U. Malamud
11
+ Dept. of Geosciences, Tel Aviv University, Tel Aviv, 69978 Israel
12
+ Department of Physics, Technion – Israel Institute of Technology, Technion City, 3200003 Haifa, Israel
13
+ ABSTRACT
14
+ Although carbon monoxide (CO) is an abundant molecule and may have great importance for planetary interiors,
15
+ measurements of its properties are difficult due to its extreme volatility. We calculate the equation of state for CO over
16
+ a range of temperature and density that is applicable to the conditions in planetary interiors. Previous experimental
17
+ and theoretical studies cover only a limited temperature-density range. Our calculations match these early results
18
+ well, but now cover the full range of relevance. The method of calculation is based on the general-purpose quotidian
19
+ equation of state described by More et al. (1988), which is here used in order to generate a freely downloadable look-up
20
+ table to be used by the community.
21
+ 1. INTRODUCTION
22
+ When modeling planetary interiors, it is necessary to have adequate descriptions for the behavior of the constituent
23
+ materials.
24
+ Thus equation of state (EOS) tables have been produced for the two most abundant elements in the
25
+ universe, hydrogen and helium (see, e.g. Chabrier et al. 2019), as well as other materials expected to be of importance
26
+ for planet models, such as water (see, e.g. Haldemann et al. 2020), various silicates such as dunite (Benz et al. 1989),
27
+ granite (Pierazzo et al. 1997), basalt (Pierazzo et al. 2005), quartz (Melosh 2007) and important metals such as iron
28
+ (e.g. Emsenhuber et al. 2018).
29
+ Since both carbon and oxygen have relatively high cosmic abundances, and since CO is a very stable molecule, CO
30
+ could be an important constituent in planetary interiors (see, e.g. Lisse et al. 2022). Yet this possibility cannot be
31
+ properly addressed because only limited regions of the CO EOS have been studied, and there are no complete equation
32
+ of state tables available in the literature. Empirical measurements of the density of solid (α-cubic, β-hexagonal) and
33
+ liquid CO have been made (Boon et al. 1967; Bierhals 2001), in addition to various other physical properties such as
34
+ viscosity, heat capacity (Rudesko & Schubnikow 1934; Tancredi et al. 1994), and elastic constants (Gammon 1978). All
35
+ of these studies are applicable to extremely low temperature and pressure conditions, and are ill-suited for planetary
36
+ interior applications. The behavior of CO at higher pressures and temperatures has been studied, to a limited extent
37
+ by Nellis et al. (1981) who reported the results of shock experiments.
38
+ More recent work by Zhang et al. (2011)
39
+ gives a more refined hugoniot for CO. In addition, theoretical calculations by Goodwin (1985) have investigated the
40
+ region of pressures below 100 MPa. Individual pressure-temperature-density points have been computed from quantum
41
+ molecular dynamics calculations by Massacrier et al. (2011), Wang & Zhang (2010), and Leonhardi & Militzer (2017).
42
+ However, all of this data is insufficient for planetary modeling, where a much larger range of pressures and temperatures
43
+ are encountered.
44
+ The fact that shock-derived carbon condensates have diameters of the order of a few nanometers (Titov et al. 1989;
45
+ Viecelli et al. 2001; Kr¨uger et al. 2005), and growth timescales of 100’s of picoseconds (Armstrong et al. 2020)) make
46
+ amitlevi.planetphys@gmail.com
47
+ arXiv:2301.02176v1 [astro-ph.EP] 5 Jan 2023
48
+
49
+ 2
50
+ direct DFT based molecular dynamics simulations of this system particularly challenging. Overcoming such immense
51
+ difficulties often requires some synthesis between a DFT based approach and more classical force field models using
52
+ various training models often referred to as machine learning approaches (see, e.g. Lindsey et al. 2020; Singraber et al.
53
+ 2019). These techniques are very demanding computationally. Therefore, our model which is in good agreement with
54
+ experimental data and covers a very wide pressure-temperature domain is of merit.
55
+ To this end we have generated an equation of state table for CO which we describe below.
56
+ Our calculation is
57
+ admittedly more crude, but it should be sufficiently close to reality so as to be useful in establishing model trends such
58
+ as was done in the models of Podolak et al. (2022), for example. This paper is structured as follows: Section 2 gives a
59
+ brief description of the method for computing the quotidian EOS (QEOS). This computation requires the knowledge
60
+ of the density and bulk modulus at low energy. The DFT calculation of these parameters is described in section 3,
61
+ and the results are given in section 4. The resulting EOS table and its comparison to experimental and theoretical
62
+ work described above is given in section 5. It is hoped that this work will encourage more detailed EOS modeling for
63
+ CO in the future.
64
+ 2. QUOTIDIAN EQUATION OF STATE
65
+ More et al. (1988) present a general-purpose method for computing equations of state at high pressure, called the
66
+ Quotidian Equation of State (QEOS). The QEOS is a statistical-mechanics-based method, in which thermodynamic
67
+ quantities are derived from the Helmholtz free energy. The Helmholtz free energy term is composed of three parts: an
68
+ ionic contribution, an electronic contribution, and a bonding correction. The ionic part is calculated by the Cowan
69
+ model, a semi-empirical model which interpolates between known limiting physical cases (ideal gas law, Lindemann
70
+ melting law, Dulong-Petit law, Gr¨uniesen EOS, Debye lattice). The electronic part is calculated using a modified
71
+ Thomas-Fermi (TF) model. The TF model neglects attractive (bonding) forces between neutral atoms and therefore
72
+ overestimates the critical point and the pressure near normal conditions. The bonding correction is used here to correct
73
+ for the electronic part failure by calibration of the EOS with density and bulk modulus at reference conditions of zero
74
+ (low) energy.
75
+ This method has been used to develop EOS tables for Fe, SiO2 and H2O for use in planetary modeling which compare
76
+ well with other EOS tables such as SESAME and ANEOS for these substances (Vazan et al. 2013, 2018, 2022). The
77
+ QEOS input variables are: atomic number, atomic weight, and reference conditions density and bulk modulus. The
78
+ calculated quantities are: pressure, specific internal energy, and specific entropy. The temperature-density range of
79
+ the calculation is 11.6 < T < 1.16 × 106 K, and 2.5 × 10−13 < ρ < 100 g cm−3. The liquid-vapor phase transition is
80
+ determined with regard to the Maxwell construction, based on finding equal Gibbs free energy on the liquid and the
81
+ vapor sides of each isotherm (up to the critical temperature). As a result, there is no coexistence of vapor and liquid
82
+ phases in the resulting smooth QEOS.
83
+ In order to calculate a QEOS for CO, the method requires prior knowledge of the density and bulk modulus of the
84
+ material at very low temperature and pressure. Unfortunately there have been no measurements of these quantities for
85
+ the α-phase of CO. We therefore performed a first-principles calculation for this state using density-functional theory
86
+ (DFT). This calculation described in the next section.
87
+ 3. COMPUTATIONAL METHODS
88
+ Here we study the equation of state of α-CO at 0 K. The structure is taken from Hall & James (1976). We performed
89
+ static total energy relaxations with the CP2K code (K¨uhne et al. 2020). We use the quickstep framework within CP2K
90
+ with the Gaussian and plane waves mixed bases (GPW). We adopt the Gaussian basis sets from VandeVondele et al.
91
+ (2005); VandeVondele & Hutter (2007), in conjunction with the pseudopotentials (GTH-PBE) of Goedecker, Teter,
92
+ and Hutter (Goedecker et al. 1996; Hartwigsen et al. 1998; Krack 2005).
93
+ Our system is converged for a planewave cutoff energy of 600 Ry and a REL CUTOFF of 40 Ry. We use the revised
94
+ PBE exchange functional GGA X PBE R from Zhang & Yang (1998) and a PBE correlation functional, GGA C PBE
95
+ (Perdew et al. 1996, 1997). These are found to be adequate choices when describing an aqueous system in conjunction
96
+ with the non-local van der Waals correlation using the Grimme D3 method (Grimme et al. 2010), achieving convergence
97
+ for R CUTOFF of 14. The calculations were done done on a 2x2x2 supercell consisting of 32 CO molecules. The
98
+ derived data at 0 K is obtained using CELL OPT within CP2K and reported below.
99
+ 4. THE EQUATION OF STATE
100
+ In table 1 and fig. 1 we give the volumes and energies derived for different pressures at 0 K. This data is fitted to a
101
+ third order Birch-Murnaghan equation of state with a bulk modulus B= 6.556 ± 0.074 GPa, a pressure derivative for
102
+
103
+ 3
104
+ Table 1.
105
+ The volume, internal energy,
106
+ and derived enthalpy as a function of pres-
107
+ sure for the α-CO solid. Data is for a cubic
108
+ supercell consisting of 32 CO molecules.
109
+ P
110
+ V
111
+ U
112
+ H
113
+ [bar]
114
+ [˚A3]
115
+ [Ha]
116
+ [Ha]
117
+ 30,000
118
+ 1012.664
119
+ -694.3516
120
+ -693.6548
121
+ 20,000
122
+ 1063.250
123
+ -694.3819
124
+ -693.8941
125
+ 10,000
126
+ 1134.213
127
+ -694.4058
128
+ -694.1456
129
+ 5000
130
+ 1186.408
131
+ -694.4146
132
+ -694.2785
133
+ 1000
134
+ 1243.957
135
+ -694.4184
136
+ -694.3899
137
+ 500
138
+ 1252.903
139
+ -694.4185
140
+ -694.4041
141
+ 250
142
+ 1257.361
143
+ -694.4186
144
+ -694.4114
145
+ 100
146
+ 1260.298
147
+ -694.4186
148
+ -694.4157
149
+ 50
150
+ 1261.144
151
+ -694.4186
152
+ -694.4172
153
+ 25
154
+ 1261.663
155
+ -694.4186
156
+ -694.4179
157
+ 10
158
+ 1261.931
159
+ -694.4186
160
+ -694.4183
161
+ 1
162
+ 1262.103
163
+ -694.4186
164
+ -694.4186
165
+ the bulk modulus of B′ = 6.846 ± 0.120, and a zero pressure volume of V0 = 157.80 ± 0.05 ˚A3. The error bars are at
166
+ the 2σ level. As mentioned above, the QEOS requires a knowledge of ρ and B at reference conditions of zero energy,
167
+ and, based on this calculation, and a fit to the four lowest pressure points we take ρ = 1.179 g cm−3 and B= 2.676 GPa
168
+ as the input parameters. Note that this value of B falls between the best fit value of 6.556 GPa given above and the
169
+ value of 1.3 GPa measured by Gammon (1978) for β-CO.
170
+ 125
171
+ 130
172
+ 135
173
+ 140
174
+ 145
175
+ 150
176
+ 155
177
+ 160
178
+ 0
179
+ 0.5
180
+ 1
181
+ 1.5
182
+ 2
183
+ 2.5
184
+ 3
185
+ 3.5
186
+ P [ GPa ]
187
+ Fitted data to BM3
188
+ Figure 1. Pressure versus unit cell volume for α-CO. The blue circles are unit cell volumes from our optimization data at 0 K, and the
189
+ solid red curve is the fitted third order Birch-Murnaghan equation of state (BM3).
190
+ Using the results of the DFT calculation described above in the quotidian code, we produced an equation of state
191
+
192
+ 4
193
+ table giving the pressure, energy and entropy of CO for a large range of temperatures and densities.
194
+ 5. COMPARISON TO OTHER RESULTS
195
+ 0
196
+ 2
197
+ 4
198
+ 6
199
+ 8
200
+ 10
201
+ 12
202
+ 14
203
+ 16
204
+ 18
205
+ 20
206
+ 1.0E+08
207
+ 1.0E+09
208
+ 1.0E+10
209
+ 1.0E+11
210
+ 1.0E+12
211
+ 1.0E+13
212
+ 1.0E+14
213
+ Density (g/cc)
214
+ Pressure (Pa)
215
+ Figure 2. Density as a function of pressure at zero temperature for the quotidian equation of state (black curve), and for the S-Z equation
216
+ of state (blue curve). The red dots are the results of the DFT calculation.
217
+ Salpeter & Zapolsky (1967) (S-Z) describe a semi-empirical formula for predicting the zero temperature pressure-
218
+ density relation for materials with any average atomic number. In principle, the S-Z EOS is similar to the More et al.
219
+ (1988) approach, since it relies on a Thomas-Fermi-Dirac model of the atom. However it does not include the effect
220
+ of temperature, so it is not always suitable for planet modeling. Fig. 2 shows the comparison between our quotidian
221
+ equation of state (QEOS) at zero temperature, and the S-Z EOS. As can be seen, the agreement is excellent, and
222
+ improves at higher pressures, as expected. The red dots in the figure are the DFT calculations given in table 1 and
223
+ fig. 1. These fall right on the QEOS curve.
224
+ The QEOS can be compared to experimental data at higher temperatures as well.
225
+ Goodwin (1985) gives the
226
+ thermophysical properties of CO up to a pressure of 100 MPa. Fig. 3 shows that data for an isotherm at 1000 K (red
227
+ dots) compared to the QEOS isotherm at that temperature (black curve). The discontinuity in the QEOS is due to
228
+ the fact that the QEOS finds two phases in present in this pressure-temperature range and traverses this region using
229
+ a Maxwell construction. As a result, the computed pressure remains constant over the relevant density range. The
230
+ actual pressure, as shown by the red dots, increases along the extrapolation of the lower part of the curve, as expected.
231
+ The exact position of the phase transition is sensitive to the choice of input parameters (zero energy density and bulk
232
+ modulus), and the actual value may be shifted somewhat.
233
+
234
+ 5
235
+ 1.0E-04
236
+ 1.0E-03
237
+ 1.0E-02
238
+ 1.0E-01
239
+ 1.0E+00
240
+ 1.0E+01
241
+ 1.0E+02
242
+ 1.0E+06
243
+ 1.0E+07
244
+ 1.0E+08
245
+ 1.0E+09
246
+ 1.0E+10
247
+ 1.0E+11
248
+ 1.0E+12
249
+ 1.0E+13
250
+ 1.0E+14
251
+ 1.0E+15
252
+ Density (g/cc)
253
+ Pressure (Pa)
254
+ Figure 3. Density as a function of pressure for an isotherm at T = 1000 K (black curve), compared to the data in Goodwin (1985) (red
255
+ dots). See text for details.
256
+ At still higher pressures and temperatures, there are the shock wave experiments of Nellis et al. (1981). In this case
257
+ the temperatures are only inferred from the Hugoniot relations, and are different for the different pressures. More
258
+ recently, Zhang et al. (2011) have used quantum molecular dynamics calculations to compute points along a hugoniot.
259
+ These are shown (blue dots) together with the hugoniot calculated from our QEOS in Fig. 4. The black dots are the
260
+ experimental points of Nellis et al. (1981). As can be seen, the agreement is quite good and is in the range of these
261
+ works. At the highest temperatures (T ≳ 105 K) dissociation and ionization become important, and these effects are
262
+ not directly included in our calculation. Nonetheless, the energies we compute for CO at T = 5 × 105 K for densities
263
+ of 0.1, 1, 10, and 100 g cm−3 all fall within a factor of 1.5 or less from the values shown in fig. 9 of Massacrier et al.
264
+ (2011).
265
+ The full QEOS is summarized in Fig. 5. A short version for a range of pressures and temperatures that are expected
266
+ to be important for planetary interior modeling given in table 2, while the complete table is available at the following
267
+ site: CO EOS download.
268
+
269
+ 6
270
+ 0
271
+ 0.5
272
+ 1
273
+ 1.5
274
+ 2
275
+ 2.5
276
+ 3
277
+ 3.5
278
+ 4
279
+ 0
280
+ 50
281
+ 100
282
+ 150
283
+ 200
284
+ 250
285
+ 300
286
+ 350
287
+ Density (g/cc)
288
+ Pressure (GPa)
289
+ Figure 4. Density as a function of pressure for a hugoniot (blue curve) corresponding to the conditions of the shock experiments of Nellis
290
+ et al. (1981) (black dots) and the quantum molecular dynamics calculations of Zhang et al. (2011) (blue dots).
291
+
292
+ 7
293
+ Figure 5. Thermodynamic properties of CO as a function of density and temperature as computed from the quotidian equation of state.
294
+ Upper left: total pressure. Upper right: pressure divided by ideal gas pressure. This shows the region where an ideal gas approximation
295
+ may be used. Lower left: specific internal energy. Lower right: specific entropy.
296
+
297
+ co: 1
298
+ CO: log p (Pa)
299
+ 0
300
+ 0
301
+ log p (g/cm3)
302
+ 10
303
+ log p (g/cm3)
304
+ 5
305
+ 5
306
+ 0og p (/pideal
307
+ 5
308
+ 4
309
+ 3
310
+ 2
311
+ 1-10
312
+ -10
313
+ -5
314
+ 2
315
+ 4
316
+ 6
317
+ 2
318
+ logT(K)
319
+ Co: log u (erg/g)
320
+ CO: Io
321
+ 14
322
+ 0
323
+ 0
324
+ 13
325
+ -5
326
+ -5
327
+ 12
328
+ 11
329
+ .10
330
+ -10
331
+ 2
332
+ 4
333
+ 6
334
+ 2
335
+ log T (K)0
336
+ 4
337
+ 6
338
+ log T (K)
339
+ gs(erg/g/K)
340
+ 9
341
+ 8
342
+ 7
343
+ 6
344
+ 5
345
+ 4
346
+ 3
347
+ 4
348
+ 6
349
+ log T (K)8
350
+ h
351
+ Table 2. Equation of state for CO.
352
+ log T
353
+ log ρ
354
+ log P
355
+ log u
356
+ log s
357
+ [K]
358
+ [g/cc]
359
+ [Pa]
360
+ [erg/g]
361
+ [erg/g − K]
362
+ 1.06465
363
+ 0.10
364
+ 8.25060
365
+ 10.33294
366
+ 4.12858
367
+ 1.06465
368
+ 0.20
369
+ 9.33277
370
+ 10.36235
371
+ 3.94748
372
+ 1.06465
373
+ 0.30
374
+ 9.90369
375
+ 10.46041
376
+ 3.83167
377
+ 1.06465
378
+ 0.40
379
+ 10.35107
380
+ 10.63593
381
+ 3.74763
382
+ 1.06465
383
+ 0.50
384
+ 10.73560
385
+ 10.86075
386
+ 3.67754
387
+ 1.06465
388
+ 0.60
389
+ 11.08026
390
+ 11.10070
391
+ 3.61334
392
+ 1.06465
393
+ 0.70
394
+ 11.39668
395
+ 11.33587
396
+ 3.55157
397
+ 1.06465
398
+ 0.80
399
+ 11.69173
400
+ 11.55846
401
+ 3.49070
402
+ 1.06465
403
+ 0.90
404
+ 11.96991
405
+ 11.76663
406
+ 3.43006
407
+ 1.06465
408
+ 1.00
409
+ 12.23437
410
+ 11.96089
411
+ 3.36933
412
+ 1.06465
413
+ 1.10
414
+ 12.48741
415
+ 12.14250
416
+ 3.30834
417
+ 1.06465
418
+ 1.20
419
+ 12.73083
420
+ 12.31285
421
+ 3.24704
422
+ 1.06465
423
+ 1.30
424
+ 12.96602
425
+ 12.47327
426
+ 3.18540
427
+ 1.56465
428
+ 0.10
429
+ 8.25291
430
+ 10.33305
431
+ 5.29718
432
+ 1.56465
433
+ 0.20
434
+ 9.33286
435
+ 10.36239
436
+ 4.92635
437
+ 1.56465
438
+ 0.30
439
+ 9.90370
440
+ 10.46043
441
+ 4.63269
442
+ 1.56465
443
+ 0.40
444
+ 10.35107
445
+ 10.63594
446
+ 4.42170
447
+ 1.56465
448
+ 0.50
449
+ 10.73560
450
+ 10.86075
451
+ 4.27449
452
+ 1.56465
453
+ 0.60
454
+ 11.08026
455
+ 11.10070
456
+ 4.16723
457
+ 1.56465
458
+ 0.70
459
+ 11.39668
460
+ 11.33587
461
+ 4.08205
462
+ 1.56465
463
+ 0.80
464
+ 11.69173
465
+ 11.55846
466
+ 4.00839
467
+ 1.56465
468
+ 0.90
469
+ 11.96991
470
+ 11.76663
471
+ 3.94060
472
+ 1.56465
473
+ 1.00
474
+ 12.23437
475
+ 11.96089
476
+ 3.87576
477
+ 1.56465
478
+ 1.10
479
+ 12.48741
480
+ 12.14250
481
+ 3.81236
482
+ 1.56465
483
+ 1.20
484
+ 12.73083
485
+ 12.31285
486
+ 3.74960
487
+ 1.56465
488
+ 1.30
489
+ 12.96602
490
+ 12.47327
491
+ 3.68706
492
+ 2.06465
493
+ 0.10
494
+ 8.32026
495
+ 10.33617
496
+ 6.33748
497
+ 2.06465
498
+ 0.20
499
+ 9.33736
500
+ 10.36427
501
+ 6.10876
502
+ 2.06465
503
+ 0.30
504
+ 9.90446
505
+ 10.46124
506
+ 5.82885
507
+ 2.06465
508
+ 0.40
509
+ 10.35123
510
+ 10.63621
511
+ 5.53226
512
+ 2.06465
513
+ 0.50
514
+ 10.73564
515
+ 10.86083
516
+ 5.24767
517
+ 2.06465
518
+ 0.60
519
+ 11.08027
520
+ 11.10073
521
+ 5.00266
522
+ 2.06465
523
+ 0.70
524
+ 11.39669
525
+ 11.33588
526
+ 4.80674
527
+ 2.06465
528
+ 0.80
529
+ 11.69174
530
+ 11.55846
531
+ 4.65419
532
+ 2.06465
533
+ 0.90
534
+ 11.96991
535
+ 11.76663
536
+ 4.53392
537
+ 2.06465
538
+ 1.00
539
+ 12.23437
540
+ 11.96089
541
+ 4.43538
542
+ 2.06465
543
+ 1.10
544
+ 12.48741
545
+ 12.14250
546
+ 4.35065
547
+ 2.06465
548
+ 1.20
549
+ 12.73083
550
+ 12.31285
551
+ 4.27440
552
+ 2.06465
553
+ 1.30
554
+ 12.96602
555
+ 12.47327
556
+ 4.20327
557
+ 2.56465
558
+ 0.10
559
+ 8.59818
560
+ 10.35536
561
+ 6.81650
562
+ 2.56465
563
+ 0.20
564
+ 9.37536
565
+ 10.38058
566
+ 6.71214
567
+ 2.56465
568
+ 0.30
569
+ 9.91516
570
+ 10.47251
571
+ 6.59233
572
+ 2.56465
573
+ 0.40
574
+ 10.35484
575
+ 10.64227
576
+ 6.45354
577
+ 2.56465
578
+ 0.50
579
+ 10.73692
580
+ 10.86349
581
+ 6.29013
582
+
583
+ 9
584
+ Table 2. Equation of state for CO continued
585
+ log T
586
+ log ρ
587
+ log P
588
+ log u
589
+ log s
590
+ [K]
591
+ [g/cc]
592
+ [Pa]
593
+ [erg/g]
594
+ [erg/g − K]
595
+ 2.56465
596
+ 0.60
597
+ 11.08076
598
+ 11.10182
599
+ 6.11803
600
+ 2.56465
601
+ 0.70
602
+ 11.39686
603
+ 11.33629
604
+ 5.91384
605
+ 2.56465
606
+ 0.80
607
+ 11.69180
608
+ 11.55861
609
+ 5.70071
610
+ 2.56465
611
+ 0.90
612
+ 11.96994
613
+ 11.76669
614
+ 5.48884
615
+ 2.56465
616
+ 1.00
617
+ 12.23438
618
+ 11.96091
619
+ 5.29094
620
+ 2.56465
621
+ 1.10
622
+ 12.48742
623
+ 12.14251
624
+ 5.11592
625
+ 2.56465
626
+ 1.20
627
+ 12.73083
628
+ 12.31286
629
+ 4.96608
630
+ 2.56465
631
+ 1.30
632
+ 12.96602
633
+ 12.47328
634
+ 4.83886
635
+ 3.06465
636
+ 0.10
637
+ 8.96463
638
+ 10.41261
639
+ 7.05238
640
+ 3.06465
641
+ 0.20
642
+ 9.49348
643
+ 10.43930
644
+ 7.00870
645
+ 3.06465
646
+ 0.30
647
+ 9.95968
648
+ 10.52059
649
+ 6.94781
650
+ 3.06465
651
+ 0.40
652
+ 10.37374
653
+ 10.67408
654
+ 6.87899
655
+ 3.06465
656
+ 0.50
657
+ 10.74579
658
+ 10.88182
659
+ 6.80456
660
+ 3.06465
661
+ 0.60
662
+ 11.08515
663
+ 11.11162
664
+ 6.72332
665
+ 3.06465
666
+ 0.70
667
+ 11.39912
668
+ 11.34141
669
+ 6.63379
670
+ 3.06465
671
+ 0.80
672
+ 11.69298
673
+ 11.56126
674
+ 6.53419
675
+ 3.06465
676
+ 0.90
677
+ 11.97055
678
+ 11.76803
679
+ 6.42218
680
+ 3.06465
681
+ 1.00
682
+ 12.23471
683
+ 11.96163
684
+ 6.31293
685
+ 3.06465
686
+ 1.10
687
+ 12.48758
688
+ 12.14285
689
+ 6.16560
690
+ 3.06465
691
+ 1.20
692
+ 12.73092
693
+ 12.31302
694
+ 6.00969
695
+ 3.06465
696
+ 1.30
697
+ 12.96606
698
+ 12.47335
699
+ 5.84475
700
+ 3.56465
701
+ 0.10
702
+ 9.36962
703
+ 10.57254
704
+ 7.21587
705
+ 3.56465
706
+ 0.20
707
+ 9.69405
708
+ 10.59071
709
+ 7.18659
710
+ 3.56465
711
+ 0.30
712
+ 10.06369
713
+ 10.65281
714
+ 7.15510
715
+ 3.56465
716
+ 0.40
717
+ 10.43076
718
+ 10.77475
719
+ 7.12114
720
+ 3.56465
721
+ 0.50
722
+ 10.77783
723
+ 10.94870
724
+ 7.08214
725
+ 3.56465
726
+ 0.60
727
+ 11.10251
728
+ 11.15104
729
+ 7.03402
730
+ 3.56465
731
+ 0.70
732
+ 11.40902
733
+ 11.36430
734
+ 6.98398
735
+ 3.56465
736
+ 0.80
737
+ 11.69886
738
+ 11.57468
739
+ 6.93149
740
+ 3.56465
741
+ 0.90
742
+ 11.97416
743
+ 11.77606
744
+ 6.87593
745
+ 3.56465
746
+ 1.00
747
+ 12.23696
748
+ 11.96647
749
+ 6.81651
750
+ 3.56465
751
+ 1.10
752
+ 12.48903
753
+ 12.14584
754
+ 6.75230
755
+ 3.56465
756
+ 1.20
757
+ 12.73184
758
+ 12.31488
759
+ 6.68219
760
+ 3.56465
761
+ 1.30
762
+ 12.96665
763
+ 12.47450
764
+ 6.60487
765
+ 4.06465
766
+ -1.00
767
+ 8.72672
768
+ 11.12752
769
+ 7.61469
770
+ 4.06465
771
+ -0.90
772
+ 8.84338
773
+ 11.11787
774
+ 7.60037
775
+ 4.06465
776
+ -0.80
777
+ 8.96101
778
+ 11.10873
779
+ 7.58527
780
+ 4.06465
781
+ -0.70
782
+ 9.07819
783
+ 11.09997
784
+ 7.56926
785
+ 4.06465
786
+ -0.60
787
+ 9.19305
788
+ 11.09161
789
+ 7.55219
790
+ 4.06465
791
+ -0.50
792
+ 9.30353
793
+ 11.08214
794
+ 7.53390
795
+ 4.06465
796
+ -0.40
797
+ 9.40769
798
+ 11.07207
799
+ 7.51424
800
+ 4.06465
801
+ -0.30
802
+ 9.50433
803
+ 11.06010
804
+ 7.49310
805
+ 4.06465
806
+ -0.20
807
+ 9.59411
808
+ 11.04556
809
+ 7.47045
810
+ 4.06465
811
+ -0.10
812
+ 9.68161
813
+ 11.02824
814
+ 7.44633
815
+ 4.06465
816
+ 0.00
817
+ 9.77804
818
+ 11.00927
819
+ 7.42091
820
+ 4.06465
821
+ 0.10
822
+ 9.90243
823
+ 10.99228
824
+ 7.39448
825
+ 4.06465
826
+ 0.20
827
+ 10.07443
828
+ 10.98353
829
+ 7.36684
830
+
831
+ 10
832
+ Table 2. Equation of state for CO continued
833
+ log T
834
+ log ρ
835
+ log P
836
+ log u
837
+ log s
838
+ [K]
839
+ [g/cc]
840
+ [Pa]
841
+ [erg/g]
842
+ [erg/g − K]
843
+ 4.06465
844
+ 0.30
845
+ 10.30242
846
+ 10.99646
847
+ 7.33856
848
+ 4.06465
849
+ 0.40
850
+ 10.57225
851
+ 11.04588
852
+ 7.30967
853
+ 4.06465
854
+ 0.50
855
+ 10.86205
856
+ 11.14146
857
+ 7.28014
858
+ 4.06465
859
+ 0.60
860
+ 11.15517
861
+ 11.27981
862
+ 7.24992
863
+ 4.06465
864
+ 0.70
865
+ 11.44272
866
+ 11.44692
867
+ 7.21887
868
+ 4.06465
869
+ 0.80
870
+ 11.72104
871
+ 11.62736
872
+ 7.18684
873
+ 4.06465
874
+ 0.90
875
+ 11.98825
876
+ 11.80866
877
+ 7.14860
878
+ 4.06465
879
+ 1.00
880
+ 12.24611
881
+ 11.98690
882
+ 7.10900
883
+ 4.06465
884
+ 1.10
885
+ 12.49512
886
+ 12.15893
887
+ 7.06828
888
+ 4.06465
889
+ 1.20
890
+ 12.73600
891
+ 12.32343
892
+ 7.02608
893
+ 4.06465
894
+ 1.30
895
+ 12.96954
896
+ 12.48020
897
+ 6.98198
898
+ 4.56465
899
+ -1.00
900
+ 9.39391
901
+ 11.85300
902
+ 7.82194
903
+ 4.56465
904
+ -0.90
905
+ 9.49858
906
+ 11.83884
907
+ 7.80733
908
+ 4.56465
909
+ -0.80
910
+ 9.60479
911
+ 11.82481
912
+ 7.79226
913
+ 4.56465
914
+ -0.70
915
+ 9.71228
916
+ 11.81091
917
+ 7.77665
918
+ 4.56465
919
+ -0.60
920
+ 9.82054
921
+ 11.79708
922
+ 7.76038
923
+ 4.56465
924
+ -0.50
925
+ 9.92889
926
+ 11.78321
927
+ 7.74336
928
+ 4.56465
929
+ -0.40
930
+ 10.03655
931
+ 11.76908
932
+ 7.72545
933
+ 4.56465
934
+ -0.30
935
+ 10.14277
936
+ 11.75438
937
+ 7.70651
938
+ 4.56465
939
+ -0.20
940
+ 10.24707
941
+ 11.73869
942
+ 7.68639
943
+ 4.56465
944
+ -0.10
945
+ 10.34964
946
+ 11.72211
947
+ 7.66492
948
+ 4.56465
949
+ 0.00
950
+ 10.45180
951
+ 11.70292
952
+ 7.64198
953
+ 4.56465
954
+ 0.10
955
+ 10.55668
956
+ 11.68314
957
+ 7.61745
958
+ 4.56465
959
+ 0.20
960
+ 10.66971
961
+ 11.66302
962
+ 7.59129
963
+ 4.56465
964
+ 0.30
965
+ 10.79841
966
+ 11.64539
967
+ 7.56357
968
+ 4.56465
969
+ 0.40
970
+ 10.95060
971
+ 11.63526
972
+ 7.53444
973
+ 4.56465
974
+ 0.50
975
+ 11.13044
976
+ 11.64026
977
+ 7.50411
978
+ 4.56465
979
+ 0.60
980
+ 11.33652
981
+ 11.66954
982
+ 7.47311
983
+ 4.56465
984
+ 0.70
985
+ 11.56221
986
+ 11.72900
987
+ 7.44136
988
+ 4.56465
989
+ 0.80
990
+ 11.79910
991
+ 11.82012
992
+ 7.40932
993
+ 4.56465
994
+ 0.90
995
+ 12.04056
996
+ 11.93746
997
+ 7.37731
998
+ 4.56465
999
+ 1.00
1000
+ 12.28172
1001
+ 12.07201
1002
+ 7.34534
1003
+ 4.56465
1004
+ 1.10
1005
+ 12.51981
1006
+ 12.21535
1007
+ 7.31336
1008
+ 4.56465
1009
+ 1.20
1010
+ 12.75346
1011
+ 12.36132
1012
+ 7.28123
1013
+ 4.56465
1014
+ 1.30
1015
+ 12.98189
1016
+ 12.50572
1017
+ 7.24694
1018
+ 5.06465
1019
+ -2.20
1020
+ 9.01221
1021
+ 12.79781
1022
+ 8.22267
1023
+ 5.06465
1024
+ -2.10
1025
+ 9.10356
1026
+ 12.78341
1027
+ 8.20949
1028
+ 5.06465
1029
+ -2.00
1030
+ 9.19496
1031
+ 12.76882
1032
+ 8.19617
1033
+ 5.06465
1034
+ -1.90
1035
+ 9.28643
1036
+ 12.75405
1037
+ 8.18271
1038
+ 5.06465
1039
+ -1.80
1040
+ 9.37804
1041
+ 12.73910
1042
+ 8.16910
1043
+ 5.06465
1044
+ -1.70
1045
+ 9.46983
1046
+ 12.72399
1047
+ 8.15535
1048
+ 5.06465
1049
+ -1.60
1050
+ 9.56187
1051
+ 12.70871
1052
+ 8.14144
1053
+ 5.06465
1054
+ -1.50
1055
+ 9.65423
1056
+ 12.69328
1057
+ 8.12737
1058
+ 5.06465
1059
+ -1.40
1060
+ 9.74698
1061
+ 12.67771
1062
+ 8.11312
1063
+ 5.06465
1064
+ -1.30
1065
+ 9.84023
1066
+ 12.66200
1067
+ 8.09870
1068
+ 5.06465
1069
+ -1.20
1070
+ 9.93407
1071
+ 12.64619
1072
+ 8.08407
1073
+ 5.06465
1074
+ -1.10
1075
+ 10.02860
1076
+ 12.63027
1077
+ 8.06923
1078
+
1079
+ 11
1080
+ Table 2. Equation of state for CO continued
1081
+ log T
1082
+ log ρ
1083
+ log P
1084
+ log u
1085
+ log s
1086
+ [K]
1087
+ [g/cc]
1088
+ [Pa]
1089
+ [erg/g]
1090
+ [erg/g − K]
1091
+ 5.06465
1092
+ -1.00
1093
+ 10.12395
1094
+ 12.61427
1095
+ 8.05415
1096
+ 5.06465
1097
+ -0.90
1098
+ 10.22023
1099
+ 12.59820
1100
+ 8.03880
1101
+ 5.06465
1102
+ -0.80
1103
+ 10.31750
1104
+ 12.58210
1105
+ 8.02315
1106
+ 5.06465
1107
+ -0.70
1108
+ 10.41581
1109
+ 12.56597
1110
+ 8.00716
1111
+ 5.06465
1112
+ -0.60
1113
+ 10.51516
1114
+ 12.54983
1115
+ 7.99078
1116
+ 5.06465
1117
+ -0.50
1118
+ 10.61545
1119
+ 12.53369
1120
+ 7.97396
1121
+ 5.06465
1122
+ -0.40
1123
+ 10.71652
1124
+ 12.51752
1125
+ 7.95663
1126
+ 5.06465
1127
+ -0.30
1128
+ 10.81818
1129
+ 12.50129
1130
+ 7.93872
1131
+ 5.06465
1132
+ -0.20
1133
+ 10.92019
1134
+ 12.48494
1135
+ 7.92015
1136
+ 5.06465
1137
+ -0.10
1138
+ 11.02242
1139
+ 12.46839
1140
+ 7.90082
1141
+ 5.06465
1142
+ 0.00
1143
+ 11.12490
1144
+ 12.45155
1145
+ 7.88063
1146
+ 5.06465
1147
+ 0.10
1148
+ 11.22793
1149
+ 12.43435
1150
+ 7.85947
1151
+ 5.06465
1152
+ 0.20
1153
+ 11.33226
1154
+ 12.41683
1155
+ 7.83721
1156
+ 5.06465
1157
+ 0.30
1158
+ 11.43918
1159
+ 12.39913
1160
+ 7.81373
1161
+ 5.06465
1162
+ 0.40
1163
+ 11.55056
1164
+ 12.38222
1165
+ 7.78890
1166
+ 5.06465
1167
+ 0.50
1168
+ 11.66886
1169
+ 12.36618
1170
+ 7.76260
1171
+ 5.06465
1172
+ 0.60
1173
+ 11.79684
1174
+ 12.35360
1175
+ 7.73472
1176
+ 5.06465
1177
+ 0.70
1178
+ 11.93708
1179
+ 12.34707
1180
+ 7.70521
1181
+ 5.06465
1182
+ 0.80
1183
+ 12.09132
1184
+ 12.35034
1185
+ 7.67410
1186
+ 5.06465
1187
+ 0.90
1188
+ 12.26000
1189
+ 12.36788
1190
+ 7.64155
1191
+ 5.06465
1192
+ 1.00
1193
+ 12.44186
1194
+ 12.40353
1195
+ 7.60770
1196
+ 5.06465
1197
+ 1.10
1198
+ 12.63451
1199
+ 12.45973
1200
+ 7.57309
1201
+ 5.06465
1202
+ 1.20
1203
+ 12.83475
1204
+ 12.53549
1205
+ 7.53795
1206
+ 5.06465
1207
+ 1.30
1208
+ 13.03937
1209
+ 12.62723
1210
+ 7.50218
1211
+
1212
+ 12
1213
+ 6. ACKNOWLEDGEMENTS
1214
+ The authors wish to thank Gilles Chabrier and an anonymous referee for many constructive comments. M.P. is
1215
+ supported by a grant from the Pazy Fund of the Israel Atomic Energy Commission. A.L. is supported by a grant from
1216
+ the Simons Foundation (SCOL #290360 to D.S.). The computations for this paper were run on the Odyssey cluster
1217
+ supported by the FAS Division of Science, Research Computing Group at Harvard University. A.L. is grateful to the
1218
+ administrative staff for their technical support. A.V. acknowledges support from ISF grants 770/21 and 773/21.
1219
+ REFERENCES
1220
+ Armstrong, M. R., Lindsey, R. K., Goldman, N., et al. 2020,
1221
+ Nature Communications, 11, 353 1
1222
+ Benz, W., Cameron, A. G. W., & Melosh, H. J. 1989, Icarus, 81,
1223
+ 113, doi: 10.1016/0019-1035(89)90129-2 1
1224
+ Bierhals, J. 2001, in Ullmann’s Encyclopedia of Industrial
1225
+ Chemistry, ed. F. Ullman (John Wiley & Sons, Ltd),
1226
+ doi: https://doi.org/10.1002/14356007.a05_203 1
1227
+ Boon, J. P., Legros, J. C., & Thomaes, G. 1967, Physica, 33, 547,
1228
+ doi: 10.1016/0031-8914(67)90203-0 1
1229
+ Chabrier, G., Mazevet, S., & Soubiran, F. 2019, ApJ, 872, 51,
1230
+ doi: 10.3847/1538-4357/aaf99f 1
1231
+ Emsenhuber, A., Jutzi, M., & Benz, W. 2018, Icarus, 301, 247,
1232
+ doi: 10.1016/j.icarus.2017.09.017 1
1233
+ Gammon, P. H. 1978, Master’s thesis, Memorial University of
1234
+ Newfoundland 1, 4
1235
+ Goedecker, S., Teter, M., & Hutter, J. 1996, Phys. Rev. B, 54,
1236
+ 1703, doi: 10.1103/PhysRevB.54.1703 3
1237
+ Goodwin, R. D. 1985, Journal of Physical and Chemical
1238
+ Reference Data, 14, 849, doi: 10.1063/1.555742 1, 5, 3
1239
+ Grimme, S., Antony, J., Ehrlich, S., & Krieg, H. 2010, The
1240
+ Journal of Chemical Physics, 132, 154104,
1241
+ doi: 10.1063/1.3382344 3
1242
+ Haldemann, J., Alibert, Y., Mordasini, C., & Benz, W. 2020,
1243
+ A&A, 643, A105, doi: 10.1051/0004-6361/202038367 1
1244
+ Hall, B. O., & James, H. M. 1976, Phys. Rev. B, 13, 3590,
1245
+ doi: 10.1103/PhysRevB.13.3590 3
1246
+ Hartwigsen, C., Goedecker, S., & Hutter, J. 1998, Phys. Rev. B,
1247
+ 58, 3641, doi: 10.1103/PhysRevB.58.3641 3
1248
+ K¨uhne, T. D., Iannuzzi, M., Del Ben, M., et al. 2020, The Journal
1249
+ of Chemical Physics, 152, 194103, doi: 10.1063/5.0007045 3
1250
+ Krack, M. 2005, Theoretical Chemistry Accounts, 114, 145,
1251
+ doi: 10.1007/s00214-005-0655-y 3
1252
+ Kr¨uger, A., Kataoka, F., Ozawa, M., et al. 2005, Carbon, 43, 1722
1253
+ 1
1254
+ Leonhardi, T. C., & Militzer, B. 2017, High Energy Density
1255
+ Physics, 22, 41,
1256
+ doi: https://doi.org/10.1016/j.hedp.2017.02.005 1
1257
+ Lindsey, R. K., Goldman, N., Fried, L. E., & Bastea, S. 2020, J.
1258
+ Chem. Phys., 153, 054103 1
1259
+ Lisse, C. M., Gladstone, G. R., Young, L. A., et al. 2022, The
1260
+ Planetary Science Journal, 3, 112, doi: 10.3847/PSJ/ac6097 1
1261
+ Massacrier, G., Potekhin, A., & Chabrier, G. 2011, Phys. Rev. E,
1262
+ 84, doi: 10.1103/PhysRevE.84.056406 1, 5
1263
+ Melosh, H. J. 2007, Meteoritics and Planetary Science, 42, 2079,
1264
+ doi: 10.1111/j.1945-5100.2007.tb01009.x 1
1265
+ More, R. M., Warren, D. A., Young, D. A., & Zimmerman, G. B.
1266
+ 1988, Physics of Fluids, 31, 3059 (document), 2, 5
1267
+ Nellis, W. J., Ree, F. H., van Thiel, M., & Mitchell, A. C. 1981,
1268
+ J. Chem. Phys., 75, 3055, doi: 10.1063/1.442401 1, 5, 4
1269
+ Perdew, J. P., Burke, K., & Ernzerhof, M. 1996, Phys. Rev. Lett.,
1270
+ 77, 3865, doi: 10.1103/PhysRevLett.77.3865 3
1271
+ —. 1997, Phys. Rev. Lett., 78, 1396,
1272
+ doi: 10.1103/PhysRevLett.78.1396 3
1273
+ Pierazzo, E., Artemieva, N., & Ivanov, B. 2005, in Large
1274
+ Meteorite Impacts III (Geological Society of America),
1275
+ doi: 10.1130/0-8137-2384-1.443 1
1276
+ Pierazzo, E., Vickery, A. M., & Melosh, H. J. 1997, Icarus, 127,
1277
+ 408, doi: 10.1006/icar.1997.5713 1
1278
+ Podolak, J., Malamud, U., & Podolak, M. 2022, Icarus, 382,
1279
+ doi: 10.1016/j.icarus.2022.115017 1
1280
+ Rudesko, N. S., & Schubnikow, L. W. 1934, Phys. Z. Sowjet., 6,
1281
+ 470 1
1282
+ Salpeter, E. E., & Zapolsky, H. S. 1967, Phys. Rev., 158, 876,
1283
+ doi: 10.1103/PhysRev.158.876 5
1284
+ Singraber, A., Behler, J., & Dellago, C. 2019, J. Chem. Theory
1285
+ Comput., 15, 1827 1
1286
+ Tancredi, G., Rickman, H., & Greenberg, J. M. 1994, Astronomy
1287
+ and Astrophysics, 286, 659 1
1288
+ Titov, V. M., Anisichkin, V. F., & Mal’kov, I. Y. 1989, Combust.
1289
+ Explos. Shock Waves, 25, 372 1
1290
+ VandeVondele, J., & Hutter, J. 2007, The Journal of Chemical
1291
+ Physics, 127, 114105, doi: 10.1063/1.2770708 3
1292
+ VandeVondele, J., Krack, M., Mohamed, F., et al. 2005,
1293
+ Computer Physics Communications, 167, 103 ,
1294
+ doi: https://doi.org/10.1016/j.cpc.2004.12.014 3
1295
+ Vazan, A., Kovetz, A., Podolak, M., & Helled, R. 2013, MNRAS,
1296
+ 434, 3283, doi: 10.1093/mnras/stt1248 2
1297
+ Vazan, A., Ormel, C. W., Noack, L., & Dominik, C. 2018, ApJ,
1298
+ 869, 163, doi: 10.3847/1538-4357/aaef33 2
1299
+ Vazan, A., Sari, R., & Kessel, R. 2022, ApJ, 926, 150,
1300
+ doi: 10.3847/1538-4357/ac458c 2
1301
+ Viecelli, J. A., Bastea, S., Glosli, J. N., & Ree, F. H. 2001, J.
1302
+ Chem. Phys., 115, 2730 1
1303
+ Wang, C., & Zhang, P. 2010, J. Chem. Phys., 133,
1304
+ doi: 10.1063/1.3491834 1
1305
+ Zhang, Y., Wang, C., Li, D., & Zhang, P. 2011, J. Chem. Phys.,
1306
+ 135, doi: 10.1063/1.3624920 1, 5, 4
1307
+ Zhang, Y., & Yang, W. 1998, Phys. Rev. Lett., 80, 890,
1308
+ doi: 10.1103/PhysRevLett.80.890 3
1309
+
_dA0T4oBgHgl3EQfPf96/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
_dAyT4oBgHgl3EQfdvdN/content/tmp_files/2301.00307v1.pdf.txt ADDED
@@ -0,0 +1,834 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Bending Deformation Driven by Molecular Rotation
2
+ Pedro A. Santos-Florez,1 Shinnosuke Hattori,2 and Qiang Zhu1, ∗
3
+ 1Department of Physics and Astronomy, University of Nevada, Las Vegas, NV 89154, USA
4
+ 2Advanced Research Laboratory, R&D Center, Sony Group Corporation, 4-14-1 Asahi-cho, Atsugi-shi 243-0014, Japan
5
+ (Dated: January 3, 2023)
6
+ Recently, some molecular crystals have been found to be surprisingly flexible by undergoing a large extent
7
+ of elastic or plastic deformation upon various mechanical loads. Despite the increasing experimental reports on
8
+ mechanically flexible crystals, this phenomenon has never been reproduced in numerical simulation and thus
9
+ there is no atomistic mechanism to explain its physical origin. Using three recently reported naphthalene diimide
10
+ derivatives as the examples, we perform the first direct molecular dynamics simulation to model their mechanical
11
+ behaviors from brittle fracture to elastic/plastic deformation upon mechanical bending. Our simulation reveals
12
+ that molecular rotational freedom is the key factor to determine the crystal’s mechanical response. Furthermore,
13
+ we propose the use of rotation-dependent potential energy surface to classify organic materials’ mechanical
14
+ response and screen new mechanically flexible candidates in future.
15
+ While most molecular crystals are known to be brittle, there
16
+ exists a class of compliant organic crystals that can easily bend
17
+ under a large mechanical stress loading1,2. Since early 2000,
18
+ there has been a growing number of experimental identifi-
19
+ cations of mechanically flexible crystals3–9. In general, the
20
+ mechanical response of an organic solid depends on both the
21
+ molecular substance and the corresponding crystal packing.
22
+ A remarkable example is shown in Fig.
23
+ 1, three crystals,
24
+ made of similar molecules from naphthalene diimide deriva-
25
+ tives, were found to exhibit distinct responses from brittle
26
+ fracture to compliant deformation with either reversible (elas-
27
+ tic) or irreversible (plastic) characteristic10. The flexible na-
28
+ ture of such organic materials is vital for a variety of appli-
29
+ cations, e.g., high-performance modular organic solar cells11,
30
+ actuators12, photochemistry13, electronics14, optics15, as well
31
+ as drug tabulation16.
32
+ In the recent years, various computational techniques have
33
+ been introduced to characterize the observed mechanical
34
+ properties on different molecular systems10,17–19.
35
+ They in-
36
+ clude the topological analysis, elastic properties calculation17,
37
+ and the simulation of shear/tensile deformations10,18. These
38
+ techniques are partially successful in identifying the brittle
39
+ materials which usually exhibit a complex three dimensional
40
+ packing. Within such an interlocked environment, molecu-
41
+ lar motions are largely restricted, resulting a brittleness un-
42
+ der bending. On the other hand, the compliant class of ma-
43
+ terials are featured by a strong anisotropy with plausible slip
44
+ planes17,20. Therefore, these materials become compliant over
45
+ a broad range of applied stress along some specific crystallo-
46
+ graphic directions. However, all available techniques fail to
47
+ explain the difference between the elastic and plastic materi-
48
+ als. While there have been plenty of studies on the bending of
49
+ metals21–26, to our knowledge, no attempts have been made to
50
+ directly simulate the bending of organic materials at the atom-
51
+ istic level.
52
+ Among the compliant crystals, ductile materials are often
53
+ favored in engineering applications16. Hence, researchers at-
54
+ tempted to use the well established dislocation theory to ex-
55
+ plain the observed plasticity on organic materials2,3. Simi-
56
+ lar to the plastic deformation in ductile metals, it was found
57
+ that mechanical shearing can also occur via the slippage of
58
+ dislocated molecular layers on the molecular crystals with a
59
+ β
60
+ α
61
+ γ
62
+ α
63
+ β
64
+ γ
65
+ (a)
66
+ (b)
67
+ (c)
68
+ (degree)
69
+ α
70
+ x
71
+ z
72
+ x
73
+ y
74
+ z
75
+ γ
76
+ β
77
+ α
78
+ y
79
+ y
80
+ z
81
+ x
82
+ -30
83
+ 30
84
+ 0
85
+ FIG. 1.
86
+ The simulated bending on three different materials based
87
+ on naphthalene diimide derivatives. (a) brittle Pr (50.3×7.0×6.8
88
+ nm3), (b) elastic Et (50.7×6.4×6.6 nm3) and (c) elastic/plastic Me
89
+ (50.2×6.4×6.9 nm3). These three crystals consist of very similar
90
+ molecules that differ only in the side groups. In the left panel, the
91
+ initial and finally deformed configurations are colored by the molec-
92
+ ular alignment (α) along the x-axis. The corresponding molecules
93
+ and the definition of rotation angles are shown in the right panel.
94
+ layered packing27,28. Using these facile slip planes, a bend-
95
+ ing model was proposed accordingly to explain the underly-
96
+ ing mechanism3. Although the dislocation is not uncommon
97
+ in molecular crystals29,30, there has been no direct experimen-
98
+ tal evidence to support that the dislocation is present in the
99
+ organic crystals under bending. Furthermore, this mechanism
100
+ fails to explain the observed crystals that can also bend elas-
101
+ tically to a large extent. In fact, two crystals as shown in Fig.
102
+ arXiv:2301.00307v1 [cond-mat.mtrl-sci] 31 Dec 2022
103
+
104
+ X
105
+ z7X
106
+ z2
107
+ 1b-c possess very similar crystal packing. Give the apparent
108
+ similarity in both molecular structure and crystal packing, it
109
+ is expected that the elastic crystal (Fig. 1b) should undergo
110
+ similar molecular events like the plastic crystal (Fig. 1c) by
111
+ following the ending mechanism. But the actual deformation
112
+ was observed to be elastic. Clearly, our current understanding
113
+ on the elasticity and plasticity remains limited.
114
+ In this work, we present our efforts in questing the molec-
115
+ ular bending mechanism with the aid of atomistic simula-
116
+ tion.
117
+ To achieve this goal, we start by developing a ro-
118
+ bust simulation protocol that can directly model the bend-
119
+ ing of organic crystals at the atomic level. Specifically, we
120
+ employed a three-point bending model within a partial peri-
121
+ odic boundary condition31. In our calculation, we performed
122
+ non-equilibrium molecular dynamics simulation by applying
123
+ the indentation on the center of molecular slab under finite
124
+ temperature31.
125
+ We also carefully tested the choice of slab
126
+ models and thermal equilibration to ensure the robustness of
127
+ our simulation set up. In order to automate the simulation,
128
+ we developed a computational pipeline to automate the gen-
129
+ eration of molecular force fields from the AmberTools20
130
+ software32. Force field parameters are assigned by the Gen-
131
+ eral Amber Force Field (GAFF) with atomic charges using
132
+ semi-empirical (AM1) with bond charge correction (BCC)33.
133
+ All simulations were performed on the LAMMPS package34 at
134
+ room temperature with the strain rate of 10 m/s.
135
+ In the following, we will focus on three naphthalenete-
136
+ tracarboxylic diimide crystals as discussed in Fig. 1. The
137
+ three molecules share the same backbone while differing only
138
+ in the side chains. The brittle crystal consists of the molecules
139
+ with the propyl group, featured by the orthorhombic space
140
+ group Pbca with one molecule in the asymmetric unit. On the
141
+ other hand, the elastic/plastic crystals have the ethyl/methyl
142
+ groups, both adopting the monoclinic space group P21/c with
143
+ half a molecule in the asymmetric unit. For convenience, we
144
+ follow the previous literature10 to name these systems accord-
145
+ ing to their molecular functional groups (i.e., Pr, Et, Me).
146
+ In all three cases, the weak interaction are formed by alkyl
147
+ groups at the (001) plane. However, the overall molecular
148
+ packing in the brittle-Pr crystal are more complex since there
149
+ exist eight different types of molecular alignments due to the
150
+ mmm symmetry operations. On the contrary, there are two
151
+ types of molecular alignments in the Et/Me crystals, and each
152
+ (001) layer contains only one type of molecular alignment (see
153
+ Fig. S1 and table S1).
154
+ Fig.
155
+ 2 summarized the simulated evolution of average
156
+ molecular potential energy as a function of indentation depth
157
+ for all three materials. For a fair comparison, we set up the
158
+ model size close to ∼ 50.0 × 7.0 × 7.0 nm3. Encouragingly,
159
+ our calculations reproduced the experimentally observed brit-
160
+ tle fracture, elastic deformation and plastic bending, respec-
161
+ tively. First, Pr is clearly brittle as evidenced by the abrupt
162
+ drop of energy in Fig. 2a, which is also consistent to the
163
+ appearance of crack pattern in Fig. 1a when the indentation
164
+ depth reaches 3.5 nm. On the other hand, Et is more com-
165
+ plaint with a maximum indentation of 6.2 nm. Apply further
166
+ loading would lead to the formation of crack as well. If we re-
167
+ lease the indentation before Et reaches 6.2 nm, the simulation
168
+ FIG. 2.
169
+ The evolution of average molecular potential energy as
170
+ a function of indentation depth upon (a) loading and (b) unloading.
171
+ In (b), only two samples (Me-elastic and Me-plastic) are shown for
172
+ clarity.
173
+ will roughly return to the original state. Therefore, the defor-
174
+ mation is elastic. Interestingly, Me can survive under more
175
+ than 10 nm indentation without breaking with two different
176
+ setups. For the slab after a full isobaric-isothermal equilibra-
177
+ tion, it bends elastically, as evidenced by the reversible energy
178
+ versus indentation depth relation (denoted as Me-elastic in
179
+ Fig. 2b). When the slab has a small strain in the initial config-
180
+ uration (see Table S2), the corresponding energy curves upon
181
+ loading and unloading are no longer reversible. Compared to
182
+ the Me-elastic, this sample achieves lower energy stable when
183
+ it approaches the maximum indentation depth upon loading.
184
+ When the indentation is released, it does not return to the orig-
185
+ inal states, but maintains a relatively higher energy. Therefore,
186
+ the whole deformation process is irreversible and plastic. The
187
+ sample will be referred to Me-plastic from now on. It is also
188
+ important to note that the deformation is strongly anisotropic.
189
+ For the same Me sample, the deformations are brittle if the
190
+ indentation is applied on other directions. Such a direction-
191
+ dependence has also been observed in recent experiments16.
192
+ Although several recent computational studies attempted to
193
+ explain the observed mechanical properties, they were lim-
194
+ ited to indirect simulations such as pure tensile and shear
195
+ tests10,17–19. Here, our results provide the first direct evidence
196
+ from atomistic modeling and reproduce the experiment obser-
197
+ vations on their mechanical responses upon the bending de-
198
+ formation. Compared to the simulation results, the elastic and
199
+ plastic samples are found to bend under larger deformations in
200
+ real experiments10. This is because that the material’s length
201
+ on x-axis under the actual bending test can shrink to release
202
+ the tensile stress. However, our simulation model still obeys
203
+ the periodic boundary condition along the x-axis. Hence we
204
+ expect that the degree of bending from our simulation is un-
205
+
206
+ (a) Loading
207
+ Pr: brittle
208
+ 0.4
209
+ Et: elastic
210
+ △E (kJ/mol)
211
+ Me: elastic
212
+ Me: plastic
213
+ 0.2
214
+ 0.0
215
+ 0
216
+ 4
217
+ 6
218
+ 8
219
+ 10
220
+ (b) Unloading
221
+ Me: elastic
222
+ △E (kJ/mol)
223
+ 0.2
224
+ Me: plastic
225
+ 0.0
226
+ 0
227
+ 2
228
+ 4
229
+ 6
230
+ 8
231
+ 10
232
+ Indentation Depth (nm)3
233
+ derestimated as compared to the real situation. We also tried
234
+ to vary the strain rate. According to our attempts, it seems that
235
+ increasing the strain rate by 10 times does not qualitatively
236
+ change the results. However, an ultrafast strain rate (>200
237
+ m/s) is likely to trigger some unrealistic phase transition thus
238
+ changes the nature of deformation significantly. Regardless
239
+ of these restrictions on parameter choices, our simulations are
240
+ robust in capturing the main physics.
241
+ 0.0
242
+ 0.1
243
+ Pr: brittle
244
+ Et: elastic
245
+ Me: plastic
246
+ 0.0
247
+ 0.1
248
+ 40
249
+ 20
250
+ 0
251
+ 20
252
+ 40
253
+ 0.0
254
+ 0.1
255
+ Distribution
256
+ Rotation (degree)
257
+ FIG. 3. The simulated distribution of accumulated rotational angles
258
+ (with respect to the initial configurations) for all materials upon the
259
+ bending loads. For clarity, the Me-elastic data was omitted.
260
+ While analyzing the dynamic trajectories, we observed that
261
+ molecules rotate strongly upon bending. Fig. 1 defines the
262
+ alignments (α, β, γ) for each molecule that can rotate along
263
+ the x, y, z axes in the Cartesian coordinates. Fig. 3 plots
264
+ the distribution of molecular rotations for all three directions.
265
+ Given that indentation direction acts on the z-axis and the
266
+ setup of three bending points aligns along the x-axis, we ex-
267
+ pect that the rotational mode along y axis (β) is the primary
268
+ motion under the loading. Indeed, Fig. 3 reveals that the rota-
269
+ tion in β is more pronounced that other directions for all three
270
+ molecules. According to the computed moments of rotational
271
+ inertia in Table I, the molecules with smaller size are easier to
272
+ rotate more. Therefore, Me has overall more rotational flexi-
273
+ bility than Et and Pr in all directions.
274
+ TABLE I. The computed moments of rotational inertia (Da· ˚A2) for
275
+ each system.
276
+ System
277
+ Number of atoms
278
+ Ixx
279
+ Iyy
280
+ Izz
281
+ Pr
282
+ 44
283
+ 1707.95 4124.74 5606.78
284
+ Et
285
+ 38
286
+ 2332.63 2311.36 3610.28
287
+ Me
288
+ 32
289
+ 1911.78 1710.74 2854.21
290
+ In Figs. S3-S531, we provided the detailed analysis on each
291
+ simulation trajectory. Among them, it is mostly interesting
292
+ to note that there is an obvious asymmetric distribution of β
293
+ for the plastic deformation as shown in Fig. 3. To quest its
294
+ origin, we plot a few representative structures from the cor-
295
+ responding trajectory in Fig. 4. Unlike the elastic deforma-
296
+ 5.0
297
+ 7.5
298
+ 10.0
299
+ Indentation depth (nm)
300
+ (degree)
301
+ β
302
+ -30
303
+ 30
304
+ 0
305
+ -15
306
+ 15
307
+ FIG. 4.
308
+ The list of representative snapshots from the simulation of
309
+ Me-plastic deformation. The molecules are colored by the β angle
310
+ values from red to blue. The domains of the secondary phase are
311
+ highlighted by the red dotted eclipses. The red dotted arrows indicate
312
+ the slip direction. The grey colored shapes represent the contacting
313
+ locations in the three-point bending test.
314
+ tion that all molecules are symmetrically aligned at the cen-
315
+ tered yz plane, we found that the region near the indenter
316
+ tip undergoes a phase transition through molecular rotation.
317
+ This region is also evident from non-zero rotations of α and
318
+ γ as shown in Fig. S5. This new domain, consisting of re-
319
+ aligned molecules (denoted as the red dotted eclipse), can
320
+ easily slip along its interface with the parent domain. Upon
321
+ indentation, the molecules in the secondary domain, located
322
+ on the upper surface of the slab, do not gain enough momen-
323
+ tum to go downward as compared to other molecules due to
324
+ the compressive stress from the bending forces. Therefore,
325
+ the relative slipping direction of the secondary domain is up-
326
+ ward and we observe the appearance of a bump near the in-
327
+ denter tip. As the tip continues to go down, the secondary
328
+ domain keeps climbing up until the bump reaches its maxi-
329
+ mum. Upon further compression, the molecules at the bottom
330
+ region are nearly flattened due to a large tensile stress, thus
331
+ creating much empty space along the z-axis. Thus, the sec-
332
+ ondary domain slips down to push the neighboring molecules
333
+ down to fill the empty space. Clearly, this secondary domain
334
+ serves as a buffer zone to help the system maintain a rela-
335
+ tively low energy state and postpone the formation of crack.
336
+ When the indentation is released, the process is supposed to
337
+ be irreversible at low temperature since triggering the back
338
+ transformation requires some energy barrier. Therefore, it is
339
+ a plastic deformation. However, it is driven by the molecu-
340
+ lar rotation, which is different from the plastic phenomenon
341
+ in the metals that requires the migration of dislocations. Due
342
+ to the phase transition driven by molecule rotation, the do-
343
+ main of new phase may appear near the indenter and coexist
344
+
345
+ 4
346
+ 20
347
+ 10
348
+ 0
349
+ 10
350
+ 20
351
+ 30
352
+ 40
353
+ R1 (degree)
354
+ 20
355
+ 10
356
+ 0
357
+ 10
358
+ 20
359
+ 30
360
+ 40
361
+ R2 (degree)
362
+ GM
363
+ LM
364
+ (a) Brittle
365
+ 20
366
+ 10
367
+ 0
368
+ 10
369
+ 20
370
+ 30
371
+ 40
372
+ R1 (degree)
373
+ 20
374
+ 10
375
+ 0
376
+ 10
377
+ 20
378
+ 30
379
+ 40
380
+ GM
381
+ LM
382
+ (b) Elastic
383
+ 20
384
+ 10
385
+ 0
386
+ 10
387
+ 20
388
+ 30
389
+ 40
390
+ R1 (degree)
391
+ 20
392
+ 10
393
+ 0
394
+ 10
395
+ 20
396
+ 30
397
+ 40
398
+ GM
399
+ LM
400
+ (c) Plastic
401
+ 10
402
+ 1
403
+ 100
404
+ 101
405
+ 102
406
+ 103
407
+ 104
408
+ E (kJ/mol)
409
+ FIG. 5. The potential energy surface as a function of molecular rotation for three crystals with different mechanical response: (a) Pr-brittle,
410
+ (b) Et-elastic, and (c) Me-elastic/plastic deformations. The while region in (a) denotes the rotations leading to energy exceeding 104 kJ/mol.
411
+ with the parent phase via a low-energy interface. The newly
412
+ formed secondary phase can freely slide along the interface
413
+ due to the external stress conditions. In the early stage, the
414
+ upward movement of new phase results in a bump shape near
415
+ the indenter. We note that such a bump has actually been
416
+ found in the bending experiment10, but it was not discussed
417
+ in the literature. Our simulation here suggests that the forma-
418
+ tion of bump is a key characteristic of the plastic deformation
419
+ driven by molecular rotation. If the external temperature is
420
+ sufficiently high to cross the phase transition barrier, the pro-
421
+ cess may become reversible, similar to the previously reported
422
+ superelastic organic crystals4.
423
+ So far, we have established the relation between molecular
424
+ rotation and the observed mechanical responses. Clearly, the
425
+ degree of freedom of molecular rotation is the key factor that
426
+ determines the mechanical flexibility of organic crystals under
427
+ bending. However, we are still unclear why some materials
428
+ are more compliant than others and why we observed two dif-
429
+ ferent deformation behaviors on the Me crystal with slightly
430
+ different initial configurations. To quest their physical origins,
431
+ it is necessary to examine the potential energy surface (PES)
432
+ with respect to the molecular rotations. Therefore, we use the
433
+ relaxed crystal structure as the reference and then systemat-
434
+ ically rotate two groups of symmetrically-related molecules
435
+ (colored in red and blue in Fig. S1) along the y-axis in the
436
+ unit cell. For the Pr-crystal, each group has four molecules
437
+ with the same alignment in β. For both Et and Me crystals,
438
+ each group contains only one molecule. The computed poten-
439
+ tial energy maps as the function of the rotation angles (R1 and
440
+ R2) are summarized in Fig. 5.
441
+ As shown in Fig.
442
+ 5a, Pr has a very stiff global mini-
443
+ mum (GM) at (0, 0). This indicates that even a slight rota-
444
+ tion can lead to a high energy penalty. The energy basin of
445
+ GM is aligned diagonally, suggesting that the low energy rota-
446
+ tion modes are synchronous due to the crystal symmetry con-
447
+ straint. In this energy basin, the total energy of the whole sys-
448
+ tem increase about 500 kJ/mol, when it reaches the (10, 10).
449
+ However, such high energy penalty would eventually lead to
450
+ the generation of crack. In addition, there is a local minimum
451
+ (LM) centered around (20, 20). But this state is nearly impos-
452
+ sible to reach due to a high energy barrier up to 104 kJ/mol.
453
+ Overall, Pr has a rather limited rotational freedom, which is
454
+ consistent with the fact that each molecule in Pr is surrounded
455
+ by multiple types of molecular alignments.
456
+ Compared to Pr, the Et sample (Fig. 5b) has more spreads
457
+ around the GM (0, 0). Therefore, the molecules can rotate
458
+ more under the mechanical load. As shown in Fig. 3, two
459
+ rotational peaks are symmetrically distributed at ±20 degrees
460
+ when the system reaches the elastic limit. According to Fig.
461
+ 5b, the rotation around (20, 20) would lead to a penalty energy
462
+ of 500 kJ/mol. Therefore, the Et molecules can rotate more
463
+ than Pr before the crack event starts. Similarly, Et has another
464
+ LM around (30, 30), but it is unreachable due to a high energy
465
+ barrier.
466
+ On the other hand, the Me has a even flatter energy spread
467
+ around the GM basin (Fig. 3c). Using 500 kJ/mol as the
468
+ threshold, the computed area ratios are roughly 0.14 (Pr), 0.84
469
+ (Et), 1.00 (Me). Hence, the Pr can sustain more elastic de-
470
+ formation than other materials. These values are qualitatively
471
+ consistent with our computed critical indentation depth val-
472
+ ues as shown in Fig. 2, and even fits the experimental values
473
+ better (given that Me is found to be significantly more elastic
474
+ than Pr). In addition, Me is remarkable because there exists
475
+ a low energy pathway that connects its LM at (30, 30). Under
476
+ the mechanical load, there exist two scenarios. One is to con-
477
+ tinue to expand in the GM basin and the system bends elasti-
478
+ cally, as we found in our simulation starting with the perfectly
479
+ equilibrated Me single crystal sample. Alternatively, it is also
480
+ possible to reach the neighboring LM basin. While the latter
481
+ case requires crossing a barrier on its PES map, it may be fa-
482
+ cilitated by the pre-existing structural defects or activated due
483
+ to kinetic reason. Indeed, we observed such a phase transition
484
+ when the initial configuration is strained. And this eventually
485
+ led to a plastic deformation as shown in Fig. 4. Correspond-
486
+ ingly, the existence of molecules at the LM (30, 30) region
487
+ resulted in a stronger peak around 30 degree as compared to
488
+ the peak at -30 degree for the distribution of β in Fig. 3, In
489
+ the real experiment, the latter scenario is more likely to occur
490
+ since the defects are unavoidable. Although the deformation
491
+ process is irreversible at low temperature upon the release of
492
+
493
+ 5
494
+ indentation, it may become reversible at an elevated tempera-
495
+ ture when it is sufficient to cross the barrier between LM and
496
+ GM.
497
+ In summary, we perform the first molecular dynamics sim-
498
+ ulation to directly model the mechanical bending of organic
499
+ crystals. Using three recently reported naphthalene diimide
500
+ derivatives as the examples, our simulation successfully re-
501
+ produced the experimentally observed mechanical behaviors
502
+ from brittle fracture to elastic/plastic deformation upon me-
503
+ chanical bending. By analyzing their atomistic trajectories,
504
+ we found that molecular rotational freedom is the key factor
505
+ to determine whether or not the materials are bendable. This
506
+ phenomenon originates from the subtle interplay between ge-
507
+ ometry packing and intermolecular interaction. Furthermore,
508
+ we found the use of rotation-dependent potential energy sur-
509
+ face map can be used clearly explain the origin of different
510
+ mechanical responses for organic materials. Together with the
511
+ recently proposed crystal packing screening model35, our re-
512
+ sults can be used to guide the search for new mechanically
513
+ flexible candidates with improved functionality for future de-
514
+ vice applications.
515
+ This research is sponsored by the NSF (DMR-2142570)
516
+ and Sony Group Corporation. The computing resources are
517
+ provided by ACCESS (TG-DMR180040).
518
+ REFERENCES
519
+ ∗ qiang.zhu@unlv.edu
520
+ 1 P. Naumov, S. Chizhik, M. K. Panda, N. K. Nath,
521
+ and
522
+ E. Boldyreva, Chem. Rev. 115, 12440 (2015).
523
+ 2 S. Saha, M. K. Mishra, C. M. Reddy, and G. R. Desiraju, Acc.
524
+ Chem. Res. 51, 2957 (2018).
525
+ 3 C. M. Reddy, K. A. Padmanabhan, and G. R. Desiraju, Cryst.
526
+ Growth Des. 6, 2720 (2006).
527
+ 4 S. Takamizawa and Y. Miyamoto, Angew. Chem. Int. Ed. 53, 6970
528
+ (2014).
529
+ 5 M. K. Panda, S. Ghosh, N. Yasuda, T. Moriwaki, G. D. Mukher-
530
+ jee, C. M. Reddy, and P. Naumov, Nat. Chem. 7, 65 (2015).
531
+ 6 G. R. Krishna, R. Devarapalli, G. Lal, and C. M. Reddy, J. Am.
532
+ Chem. Soc. 138, 13561 (2016).
533
+ 7 J. P. Yadav, R. N. Yadav, P. Uniyal, H. Chen, C. Wang, C. C. Sun,
534
+ N. Kumar, A. K. Bansal, and S. Jain, Cryst. Growth Des. 20, 832
535
+ (2019).
536
+ 8 M. K. Mishra and C. C. Sun, Cryst. Growth Des. 20, 4764 (2020).
537
+ 9 K. Zhang, C. C. Sun, Y. Liu, C. Wang, P. Shi, J. Xu, S. Wu, and
538
+ J. Gong, Chem. Mater. 33, 1053 (2021).
539
+ 10 R. Devarapalli, S. B. Kadambi, C.-T. Chen, G. R. Krishna, B. R.
540
+ Kammari, M. J. Buehler, U. Ramamurty, and C. M. Reddy, Chem.
541
+ Mater. 31, 1391 (2019).
542
+ 11 S. E. Root, S. Savagatrup, A. D. Printz, D. Rodriquez, and D. J.
543
+ Lipomi, Chem. Rev. 117, 6467 (2017).
544
+ 12 L. Li, P. Commins, M. B. Al-Handawi, D. P. Karothu, J. M. Ha-
545
+ labi, S. Schramm, J. Weston, R. Rezgui, and P. Naumov, Chem.
546
+ Sci. 10, 7327 (2019).
547
+ 13 T. Mutai, T. Sasaki, and S. Takamizawa, J. Photochem. Photobiol.
548
+ C Photochem. Rev. , 100479 (2021).
549
+ 14 Y. Wang, L. Sun, C. Wang, F. Yang, X. Ren, X. Zhang, H. Dong,
550
+ and W. Hu, Chem. Soc. Rev. 48, 1492 (2019).
551
+ 15 H. Liu, Z. Lu, Z. Zhang, Y. Wang, and H. Zhang, Angew. Chem.
552
+ Int. Ed. 57, 8448 (2018).
553
+ 16 C. C. Sun, Pharm. Res. 34, 918 (2017).
554
+ 17 C. Wang and C. C. Sun, Mol. Pharmaceutics 16, 1732 (2019).
555
+ 18 Y. Ootani and M. Kubo, J. Phys. Chem. C 126, 10554 (2022).
556
+ 19 Y. V. Matveychuk, A. S. Yurchenko, A. E. Masunov, and E. V.
557
+ Bartashevich, Cryst. Growth Des. 22, 6472 (2022).
558
+ 20 M. Bryant, A. Maloney, and R. Sykes, CrystEngComm 20, 2698
559
+ (2018).
560
+ 21 W. Zhu, H. Wang, and W. Yang, Acta Mater. 60, 7112 (2012).
561
+ 22 J. J. Zhang, Y. D. Yan, X. Liu, T. Sun, and Y. C. Liang, J. Phys.
562
+ D: Appl. Phys. 47, 195301 (2014).
563
+ 23 W. G. N¨ohring, J. J. M¨oller, Z. Xie, and E. Bitzek, Extreme Mech.
564
+ Lett. 8, 140 (2016).
565
+ 24 X. Zhuo and H. Beom, Comput. Mater. Sci. 152, 331 (2018).
566
+ 25 K. C. Katakam and N. Yedla, Superlattice. Microst. 146, 106674
567
+ (2020).
568
+ 26 Y. J. HE and B. MA, Trans. Nonferrous Met. Soc. China 32, 3687
569
+ (2022).
570
+ 27 C. M. Reddy, G. R. Krishna, and S. Ghosh, CrystEngComm 12,
571
+ 2296 (2010).
572
+ 28 C. Wang and C. C. Sun, Cryst. Growth Des. 18, 1909 (2018).
573
+ 29 N. Mathew, C. R. Picu, and P. W. Chung, J. Phys. Chem. A 117,
574
+ 5326 (2013).
575
+ 30 I. A. Olson, A. G. Shtukenberg, B. Kahr, and M. D. Ward, Rep.
576
+ Prog. Phys. 81, 096501 (2018).
577
+ 31 See Supplemental Material at http://link.aps.org/**** for a de-
578
+ tailed description of molecular packing, model setup and molec-
579
+ ular dynamics simulation results analysis for three naphthalenete-
580
+ tracarboxylic diimide crystals.
581
+ 32 D. A. Case, K. Belfon, I. Y. Ben-Shalom, S. R. Brozell, D. S.
582
+ Cerutti, T. E. Cheatham, III, V. W. D. Cruzeiro, T. A. Darden,
583
+ R. E. Duke, G. Giambasu, M. K. Gilson, H. Gohlke, A. W.
584
+ Goetz, R. Harris, S. Izadi, S. A. Izmailov, K. Kasavajhala, A. Ko-
585
+ valenko, R. Krasny, T. Kurtzman, T. S. Lee, S. LeGrand, P. Li,
586
+ C. Lin, J. Liu, T. Luchko, R. Luo, V. Man, K. M. Merz, Y. Miao,
587
+ O. Mikhailovskii, G. Monard, H. Nguyen, A. Onufriev, F. Pan,
588
+ S. Pantano, R. Qi, D. R. Roe, A. Roitberg, C. Sagui, S. Schott-
589
+ Verdugo, J. Shen, C. L. Simmerling, N. R. Skrynnikov, J. Smith,
590
+ J. Swails, R. C. Walker, J. Wang, L. Wilson, R. M. Wolf, X. Wu,
591
+ Y. Xiong, Y. Xue, D. M. York, and P. A. Kollman, AMBER 2020
592
+ (2020).
593
+ 33 A. Jakalian, B. L. Bush, D. B. Jack, and C. I. Bayly, J. Comput.
594
+ Chem. 21, 132 (2000).
595
+ 34 S. Plimpton, J. Comput. Phys. 117, 1 (1995).
596
+ 35 Q. Zhu, W. Tang, and S. Hattori, Cryst. Growth Des. 22, 7308
597
+ (2022).
598
+
599
+ 6
600
+ Supplementary Online Materials:
601
+ Bending Deformation Driven by Molecular Rotation
602
+ A. Crystal structures
603
+ In this study, we focused on three systems consisting of naphthalene diimide derivatives as shown in Fig. S1. The three molecules
604
+ share the same backbone while differing only in the side chains. The brittle crystal consists of the molecules with the propyl
605
+ group (Pr), featured by the orthorhombic space group Pbca with one molecule in the asymmetric unit. On the other hand, the
606
+ elastic/plastic crystals have the ethyl/methyl groups, both adopting the monoclinic space group P21/c with half a molecule in
607
+ the asymmetric unit. In all three cases, the weak interaction plane formed by alkyl groups is (001). In Fig. S1, each molecule in
608
+ the unit cell is colored by the alignment along the y-axis. Clearly, the overall molecular packing in the brittle-Pr crystal are more
609
+ complex. Since there exist eight different types of molecular alignments due to the mmm symmetry operations, the Pr crystal
610
+ has molecules aligned in different ways within the same (001) layer. On the contrary, there are only two types of molecular
611
+ alignments in the Et/Me crystals. And the (001) layer in Et/Me crystals has all molecules aligned in the same direction.
612
+ FIG. S1. The crystal structures of (a) Pr, (b) Et (c) Me systems.
613
+ Table S1 summarizes the crystallographic information of three molecular crystals. Among them, Pr denotes the brittle crystal
614
+ with the CSD refcode of DAHLOQ; Et is the elastic crystal with the CSD refcode of BIYRIM01; and Me is the plastic crystal
615
+ with the CSD refcode of DAHMUX. In addition to the experimental cell parameters, the equilibrium cell parameters from our
616
+ Amber force field are also shown in the parentheses for a comparison. The excellent agreement between experiment and theory
617
+ warrants the use of Amber force field in our following simulations.
618
+ TABLE S1. The crystallographic information of three molecular crystals.
619
+ System
620
+ CSD Refcode
621
+ Space Group
622
+ Number of molecules
623
+ a ( ˚A)
624
+ b ( ˚A)
625
+ c ( ˚A)
626
+ β (◦)
627
+ Pr
628
+ DAHLOQ
629
+ Pbca
630
+ 8
631
+ 6.96 (7.30) 17.24 (17.40) 27.58 (27.90) 90.0 (90.0)
632
+ Et
633
+ BIYRIM01
634
+ P21/c
635
+ 2
636
+ 4.84 (5.07)
637
+ 7.74 (7.79)
638
+ 18.32 (19.07) 90.1 (90.3)
639
+ Me
640
+ DAHMUX
641
+ P21/c
642
+ 2
643
+ 4.62 (4.58)
644
+ 8.02 (8.28)
645
+ 17.02 (18.40) 94.0 (93.9)
646
+
647
+ (a)
648
+ (b)
649
+ (c)7
650
+ B. Simulation Setup
651
+ To enable the direct simulation of bending, we created the slab model as shown in Fig. S2. Both x and y-axes are under the
652
+ constraint of periodic boundary conditions, while the c-axis is not periodic. To reproduce the experimental results10, we rotated
653
+ the crystal structures with the matrix of [[0,0,1], [0,-1,0], [1,0,0]], and then built the super cell slab models according to Table
654
+ S2. In each case, we added the vacuum to allow the materials bend sufficiently. The slab correction was applied to remove the
655
+ slab-slab interactions from the periodic images. Due to the non-triclinic box restriction on the computation of slab correction,
656
+ the β angles for the slabs of Et and Me were to be set to 90◦, which are slightly different from the ideal values. However, this
657
+ compromise should not change the results largely.
658
+ For Me, two models were considered, including (i) the supercell after the isobaric-isothermal equilibration; and (ii) the
659
+ supercell with the experimental cell parameters. Although these two initial configurations only differ slightly, it has been found
660
+ they led to different elastic/plastic deformation processes in the subsequent bending simulation.
661
+ FIG. S2. The schematic setup of a bending simulation model.
662
+ TABLE S2. The details of models used in the bending simulation.
663
+ System
664
+ Deformation
665
+ Supercell
666
+ Number of molecules
667
+ a ( ˚A)
668
+ b ( ˚A)
669
+ c ( ˚A)
670
+ Vacuum ( ˚A)
671
+ Pr
672
+ brittle
673
+ 18 × 4 × 5
674
+ 5760
675
+ 503.2
676
+ 69.9
677
+ 70.6
678
+ 120.0
679
+ Et
680
+ elastic
681
+ 27 × 4 × 5
682
+ 6480
683
+ 508.5
684
+ 63.6
685
+ 74.7
686
+ 120.0
687
+ Me
688
+ elastic
689
+ 29 × 8 × 15
690
+ 6960
691
+ 501.6
692
+ 65.2
693
+ 86.5
694
+ 120.0
695
+ Me
696
+ plastic
697
+ 30 × 8 × 15
698
+ 7200
699
+ 510.6
700
+ 64.2
701
+ 85.1
702
+ 120.0
703
+ Along the non-periodic z-axis, a cylinderical indenter with the radius of 30 ˚A is applied on top of the slab center in the unit
704
+ cell. To mimic two other contacting points in the three-points bending simulation, the last one layer of molecules in the bottom
705
+ region were frozen in the entire simulation. In addition, the first columns of molecules on both left and right side of the unit
706
+ cell are defined as the border. The rest atoms not belonging the frozen and border groups are set to the moible group that can
707
+ move freely. To ensure a sufficient heat bath, we first perform Langevin thermostat on both mobile and border groups, followed
708
+ by a second thermal equilibration on only the border atoms. The fully equilibrated sample will be used to perform three-points
709
+ bending simulation with only the border atoms being under the Langevin thermostat to mimic the external temperature reservoir.
710
+ Upon bending, the indenter will be used to push into the simulation slab in a flow with the rate of 10 m/s. When the system
711
+ reaches the maximum indentation depth, the indenter will be kept for 300 ps to allow the system achieves thermal equilibrium.
712
+ Afterwards, the indenter will move upward with the previous rate to mimic the release of indenter process.
713
+
714
+ Z
715
+ Border
716
+ Frozen
717
+ Mobile8
718
+ C1. Deformation Analysis on Pr-Brittle
719
+ To quest the origin of Pr-Brittle, we plot a few representative structures from the corresponding trajectory in Fig. S3. Upon
720
+ deformation, we found that the sample continuously to bend from 0 to 3.0 nm (the first row of Fig. S3) and 4.0 nm (the second
721
+ row of Fig. S3). The molecules barely rotate around the x (α) and z (γ) axis. However, the rotation on y-axis is more pronounced
722
+ and it symmetrically distributed around the central indenter. When the indentation depth exceeds 4.2 nm (the last row of Fig.
723
+ S3), the lower surface cracks due to a large tensile stress.
724
+ 2.5
725
+ 3.5
726
+ 4.5
727
+ Indentation depth (nm)
728
+ (degree)
729
+ α
730
+ -30
731
+ 30
732
+ 0
733
+ -15
734
+ 15
735
+ (degree)
736
+ β
737
+ -30
738
+ 30
739
+ 0
740
+ -15
741
+ 15
742
+ (degree)
743
+ γ
744
+ -30
745
+ 30
746
+ 0
747
+ -15
748
+ 15
749
+ Pr-brittle
750
+ FIG. S3. The list of representative snapshots from the simulation of Pr-Brittle deformation.
751
+
752
+ 9
753
+ C2. Deformation Analysis on Et-Elastic
754
+ To quest the origin of Et-Elastic, we plot a few representative structures from the corresponding trajectory in Fig. S4. At a
755
+ small indentation depth (4.0 nm as shown in the first row of Fig. S4), the molecules barely rotate around the x (α) and z (γ) axis,
756
+ while the rotation on y-axes (β) is more pronounced and it symmetrically distributed around the central indenter. However, it
757
+ is clear that the molecules around the center of y-axis do not rotate. Upon further indentation at 5.0 nm (the second row of Fig.
758
+ S4) and 6.2 nm (the last row of Fig. S4), the molecules at the center of lower surface undergo a large rotation around the x and
759
+ z due to a large compressive stress, but do not rotate around y. This suggests that molecules upon tension prefer a rotation on
760
+ α and γ, rather than the primary rotation mode at β due to the anisotropic behavior of its potential energy landscape. Since the
761
+ rotations are symmetrically distributed around the indenter, it is still an elastic deformation. When the indentation is released,
762
+ the process is supposed to be reversible.
763
+ 4.0
764
+ 5.0
765
+ 6.0
766
+ Indentation depth (nm)
767
+ (degree)
768
+ α
769
+ -30
770
+ 30
771
+ 0
772
+ -15
773
+ 15
774
+ (degree)
775
+ β
776
+ -30
777
+ 30
778
+ 0
779
+ -15
780
+ 15
781
+ (degree)
782
+ γ
783
+ -30
784
+ 30
785
+ 0
786
+ -15
787
+ 15
788
+ Et-elastic
789
+ FIG. S4. The list of representative snapshots from the simulation of Et-Elastic deformation.
790
+
791
+ 10
792
+ C3. Deformation Analysis on Me-Plastic
793
+ To quest the origin of Me-Plastic, we plot a few representative structures from the corresponding trajectory in Fig. S5. At
794
+ the depth of 5.5 nm, we found that the molecules near the indenter tip (in the first row of Fig. S4) have alternative changes of
795
+ α and γ angles, which is similar to that in Fig. S4. However, these molecule has non-zero β angles. Therefore, it is no longer
796
+ symmetric and signals a phase transition trigger by the large compressive stress in the upper surface due to bending. This domain
797
+ of new phases, consisting of realigned molecules (denoted as the red dotted eclipse), can easily slip along its interface with the
798
+ parent domain. Upon indentation, the molecules in the secondary domain do not gain enough momentum to go downward as
799
+ compared to other molecules. Therefore, the relative slipping direction of the secondary domain is upward and we observe the
800
+ appearance of a bump near the indenter tip (in the second row of Fig. S3 at the indentation depth of 6.7 nm). As the tip continues
801
+ to go down, the secondary domain keeps climbing up until the bump reaches its maximum. In the mean time, the the molecules
802
+ at the center bottom region are nearly flattened, which can trigger another phase transition to form a new phase domain. Upon
803
+ further compression, the flattened molecules at the center bottom region create much empty space along the z-axis. Thus, the
804
+ secondary domain slips down to push the neighboring molecules down to fill the empty space (see the third row of Fig. S3 at
805
+ the indentation depth of 9.5 nm). When the indentation is released, the process is supposed to be irreversible at low temperature
806
+ since triggering the back transformation requires some energy barrier. Therefore, it is a plastic deformation.
807
+ 5.0
808
+ 7.5
809
+ 10.0
810
+ Indentation depth (nm)
811
+ (degree)
812
+ α
813
+ -30
814
+ 30
815
+ 0
816
+ -15
817
+ 15
818
+ (degree)
819
+ β
820
+ -30
821
+ 30
822
+ 0
823
+ -15
824
+ 15
825
+ (degree)
826
+ γ
827
+ -30
828
+ 30
829
+ 0
830
+ -15
831
+ 15
832
+ Me-plastic
833
+ FIG. S5. The list of representative snapshots from the simulation of Me-plastic deformation.
834
+
_dAyT4oBgHgl3EQfdvdN/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
atAyT4oBgHgl3EQf9_py/content/tmp_files/2301.00884v1.pdf.txt ADDED
@@ -0,0 +1,889 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Safety Filtering for Reinforcement
2
+ Learning-based Adaptive Cruise Control
3
+ Habtamu Hailemichael ∗ Beshah Ayalew ∗ Lindsey Kerbel ∗
4
+ Andrej Ivanco ∗∗ Keith Loiselle ∗∗
5
+ ∗ Automotive Engineering, Clemson University, Greenville, SC 29607,
6
+ USA (hhailem, beshah, lsutto2)@clemson.edu.
7
+ ∗∗ Allison Transmission Inc., One Allison Way, Indianapolis, IN,
8
+ 46222, USA (andrej.ivanco, keith.loiselle)@allisontransmission.com
9
+ Abstract: Reinforcement learning (RL)-based adaptive cruise control systems (ACC) that
10
+ learn and adapt to road, traffic and vehicle conditions are attractive for enhancing vehicle
11
+ energy efficiency and traffic flow. However, the application of RL in safety critical systems such
12
+ as ACC requires strong safety guarantees which are difficult to achieve with learning agents
13
+ that have a fundamental need to explore. In this paper, we derive control barrier functions as
14
+ safety filters that allow an RL-based ACC controller to explore freely within a collision safe
15
+ set. Specifically, we derive control barrier functions for high relative degree nonlinear systems to
16
+ take into account inertia effects relevant to commercial vehicles. We also outline an algorithm
17
+ for accommodating actuation saturation with these barrier functions. While any RL algorithm
18
+ can be used as the performance ACC controller together with these filters, we implement the
19
+ Maximum A Posteriori Policy Optimization (MPO) algorithm with a hybrid action space that
20
+ learns fuel optimal gear selection and torque control policies. The safety filtering RL approach
21
+ is contrasted with a reward shaping RL approach that only learns to avoid collisions after
22
+ sufficient training. Evaluations on different drive cycles demonstrate significant improvements
23
+ in fuel economy with the proposed approach compared to baseline ACC algorithms.
24
+ Keywords: Adaptive cruise control, Safe reinforcement learning, Safety filtering, Control
25
+ barrier functions
26
+ 1. INTRODUCTION
27
+ Adaptive cruise control (ACC) systems are one of the in-
28
+ creasingly prevalent driver assistance systems for modern
29
+ vehicles. An ACC system uses radar, computer vision, or
30
+ laser to understand the vehicle’s surrounding and make
31
+ control decisions. When another vehicle or object is not in
32
+ the sensing range, ACC compensates for the road grade,
33
+ friction, and aerodynamic resistances to maintain a speed
34
+ set by the driver. When another car or object is in front,
35
+ the ACC makes decisions to prevent collision and follow
36
+ the preceding vehicle as close as possible to avoid cut-ins.
37
+ ACC has been shown to decrease a driver’s workload, and
38
+ make traffic flows efficient and safer (Marsden et al., 2001;
39
+ Lang et al., 2014).
40
+ An effective ACC system should balance the traffic condi-
41
+ tion of the road, the vehicle performance, and the driver’s
42
+ demanded velocity. Currently available PID-based ACC
43
+ systems (Canale and Malan, 2003; Chamraz and Balogh,
44
+ 2018) and proposed MPC-based approaches (Naus et al.,
45
+ 2008; Yang et al., 2021) are often tuned to balance this
46
+ trade-off for various operating environments. Although
47
+ ’adaptive’ or gain-scheduled versions (Radke and Iser-
48
+ mann, 1987) can be sought, the fixed structure of these
49
+ approaches limits full adaptation throughout the lifetime
50
+ of the vehicle. Furthermore, MPC-based ACC also has
51
+ to find a reliable way of predicting the motion of the
52
+ leading vehicle for the future horizon. On the other hand,
53
+ data-driven reinforcement learning (RL) approaches offer
54
+ a mechanism to continuously customize to traffic, road
55
+ and vehicle conditions without a predefined control archi-
56
+ tecture (Li and G¨orges, 2020). In this work, we consider
57
+ applications of RL-based ACC to commercial vehicles. In
58
+ addition, while traditional ACC is primarily about the two
59
+ tasks of speed tracking and maintaining a safe gap, we
60
+ consider RL-based ACC (RL ACC for short) to explicitly
61
+ optimize fuel economy via gear selection and torque control
62
+ policies.
63
+ Despite the potential benefits of adaptability and im-
64
+ proved performance, RL ACC faces critical safety chal-
65
+ lenges. These derive from the needs of RL algorithms to
66
+ explore in order to learn the optimal policies. RL learns
67
+ how good the given state-action pair is after experiencing
68
+ it, but for applications like vehicle control, exploration in
69
+ an unsafe domain is unacceptable even during (on-road)
70
+ training of the RL algorithms. However, thanks to recent
71
+ progress in safe RL, different approaches are suggested
72
+ to encourage or limit the exploration only in the safe
73
+ domain. We briefly mention a few of them. Reward shaping
74
+ approaches put large penalties into the performance objec-
75
+ tive function if constraints are violated. On the other hand,
76
+ constrained Markov decision process (CMDP) approaches
77
+ assign safety constraint costs to each state-action pair and
78
+ limit the total safety constraint cost of a trajectory to
79
+ be lower than a certain threshold (Altman, 1999). The
80
+ arXiv:2301.00884v1 [eess.SY] 2 Jan 2023
81
+
82
+ reward shaping and CMDP approaches are implemented
83
+ on the performance controller itself to encourage respect-
84
+ ing safety constraints but they do not guarantee safety.
85
+ Another set of approaches involve the use of safety filters
86
+ that impose hard constraints. Such approaches separate
87
+ the performance-oriented RL controller, whose only aim is
88
+ to optimize the system’s performance objective function,
89
+ from the safety filters, which project the unsafe actions
90
+ proposed by the performance controller into the safe set.
91
+ The safety filters determine the safety condition of the
92
+ given state-action pair using the dynamical model of the
93
+ system, or they use offline data to learn constraints (Dalal
94
+ et al., 2018) and safety indexes (Thananjeyan et al., 2021;
95
+ Srinivasan et al., 2020). In this paper, we pursue dynamical
96
+ model-based safety guarantees to construct the safe set in
97
+ such a way that gives the RL performance controller the
98
+ freedom to explore within the safe boundaries. As its train-
99
+ ing progresses, the RL performance controller eventually
100
+ learns the safety boundaries and ceases to demand unsafe
101
+ actions (Thananjeyan et al., 2021). Note that even though
102
+ it does not interfere with the inner workings, the safety
103
+ filter affects control performance by dictating where the
104
+ performance controller can operate.
105
+ Of the model-based approaches to designing safety filters,
106
+ control barrier functions (CBFs) offer light computation
107
+ and scalability (Li, 2021). A CBF guarantees safety by
108
+ making the controller work in the invariant safe-set defined
109
+ by a superlevel set of a continuously differentiable function
110
+ h(x) : Rn → R. The actions selected by the performance
111
+ controllers are projected into the safe set in such a manner
112
+ that the proposed actions are modified minimally (Ames
113
+ et al., 2019), and no unsafe actions are passed to the
114
+ controlled system. Different approaches could be pursued
115
+ to specify CBFs with their pros and cons. The intuitive
116
+ one is to come up with a handcrafted CBF considering the
117
+ dynamics of the system and the action bounds associated
118
+ with it (Xu et al., 2018; Ames et al., 2014; Cheng et al.,
119
+ 2019). In collision avoidance problems, for instance, the
120
+ CBF can be derived by considering the maximum decel-
121
+ eration that the system could exert to close a distance
122
+ gap. When possible, it is also desirable to progressively
123
+ widen the safe set to get the maximal safe domain, a task
124
+ currently possible with polynomial plant dynamics and
125
+ polynomial CBFs via sum-of-squares (SOS) programming
126
+ (Chamraz and Balogh, 2018). Another approach that is
127
+ tailored to high relative degree nonlinear dynamical sys-
128
+ tems such as those involving inertia effects is the use of
129
+ exponential CBF (ECBF) (Nguyen and Sreenath, 2016).
130
+ In this work, we derive ECBFs to work as safety filters with
131
+ our RL-ACC controllers, thereby taking explicit consider-
132
+ ations of inertia effects that are important for commercial
133
+ vehicles that experience large changes in loading.
134
+ The main contributions of this paper are then the deriva-
135
+ tion and demonstration of CBF-based safe RL-ACC ap-
136
+ proach for commercial vehicles that optimizes fuel econ-
137
+ omy. While we derive ECBFs for safety certification, we
138
+ note that straight ECBFs (or CBFs in general) assume
139
+ unbounded actions, and in their natural form, they might
140
+ request actions that are not feasible for the vehicle’s pow-
141
+ ertrain to meet. We therefore put forward a method to
142
+ provide a safety guarantee for a given parameters of ECBF
143
+ within the vehicle action limits. Our performance RL-ACC
144
+ coordinates traction torque control and gear decisions
145
+ considering fuel consumption optimization objectives. The
146
+ RL ACC augmented with the safety certificate is trained
147
+ and evaluated on different driving cycles, and the vehicle
148
+ performance is compared with an RL ACC with reward-
149
+ shaping approach to safe RL, as well as with a conventional
150
+ PID-based ACC.
151
+ The rest of the paper is organized as follows. Section
152
+ 2 describes our derivation of the ECBF as safety filters
153
+ for ACC and detail how we address actuation constraints
154
+ within them. Section 3 describes the algorithmic details of
155
+ our performance RL-ACC. Section 4 discusses results and
156
+ discussions, and Section 5 concludes the paper.
157
+ 2. SAFETY FILTER FOR ACC
158
+ We briefly review the definition of CBFs as follows. Details
159
+ are given in Hsu et al. (2015). Consider a nonlinear control
160
+ affine system:
161
+ ˙x = f (x) + g (x) u,.
162
+ (1)
163
+ where f and g are locally Lipschitz, x ∈ Rn is the system
164
+ state, u ∈ Rm is the control inputs. Assume a safe set
165
+ defined by C = {x ∈ Rn|h (x) ≥ 0}, where h : Rn →
166
+ R is a continuously differentiable function. Then h is a
167
+ control barrier function (CBF) if there exists an extended
168
+ class κ∞ function α such that for all x ∈ Int (C) =
169
+ {x ∈ Rn : h (x) > 0} :
170
+ sup
171
+ u∈U
172
+ [Lfh (x) + Lgh (x) u] ≥ −α (h (x)).
173
+ (2)
174
+ For high relative degree nonlinear affine systems, feedback
175
+ linearization could be used to develop exponential CBFs
176
+ (ECBF) as detailed in Nguyen and Sreenath (2016). This
177
+ is accomplished by transforming (input-output linearizing)
178
+ the high relative degree nonlinear systems into a virtual
179
+ linear system with new state variable ηb := [h(x), ˙h(x), · ·
180
+ ·, hr(x)]T , input µ and output h (x):
181
+ ˙ηb = Fηb (x) + Gµ,
182
+ h (x) = Cηb
183
+ (3)
184
+ where F and G are matrices representing an integrator
185
+ chain, and C = [1, 0, · · · , 0]. A state feedback controller
186
+ can be designed for the transformed system as: µ = −Kαηb
187
+ with a suitable gain vector Kα that makes F − GKα
188
+ Hurwitz. For a system with relative degree r, µ is also rth
189
+ derivative of the output h(x), µ = Lr
190
+ fh(x)+Lg�Lr−1
191
+ f
192
+ h(x)u.
193
+ If there exists a state feedback gain Kα that makes µ ≥
194
+ −Kαηb (x) for all states, then one can show that h(x) is
195
+ an exponential control barrier function (see Nguyen and
196
+ Sreenath (2016)).
197
+ The ACC part of the present problem is modelled with the
198
+ state variables of separation distance z, the velocity of the
199
+ host vehicle vh and the velocity of the leading vehicle vl.
200
+ The corresponding state equations are:
201
+ ˙z = vl − vh
202
+ (4a)
203
+ ˙vl = al
204
+ (4b)
205
+ ˙vh =
206
+ Tt
207
+ rwmv
208
+ − Fr (vh, mv, θ)
209
+ mv
210
+ (4c)
211
+ Fr = ρAcdv2
212
+ h
213
+ 2
214
+ + mvgf cos θ + mvg sin θ
215
+ (5)
216
+
217
+ where Fr is the total resistance force including gravita-
218
+ tional, rolling and aerodynamic resistances, and Tt is the
219
+ traction torque at the wheels. The parameters cd, f, θ, mv ,
220
+ ρ, Av, rw, al are aerodynamic coefficient, rolling resistance
221
+ coefficient, road grade, mass of the vehicle, density of
222
+ air, frontal area of the vehicle, radius of the wheels, and
223
+ acceleration of the leading vehicle, respectively.
224
+ We observe that the above model can be readily put in the
225
+ control affine form (1). Given a collision safety objective,
226
+ we seek the separation distance z to always be above a
227
+ specified minimum inter-vehicle distance z0. To this end,
228
+ we define the control barrier function (CBF) as the output
229
+ h (x) = z − z0. Considering that the control actuation is
230
+ the traction torque Tt, we have a control affine system of
231
+ relative degree two. In physical terms, the safety objective
232
+ is on position while traction torque directly manipulates
233
+ acceleration. Inertia effects come into play and must be
234
+ accounted for. The input-output linearization into the
235
+ form (3) then gives:
236
+ ˙h(x) = vl − vh,
237
+ (6)
238
+ µ = ¨h (x) = Fr (vh, mv, θ)
239
+ mv
240
+ + al −
241
+ Tt
242
+ mvrw
243
+ ,
244
+ (7)
245
+ −Kαηb (x) = −kα1 (z − z0) − kα2 (vl−vh)
246
+ (8)
247
+ We now compute some bounds for the given control input
248
+ µ considering actuation limits on the traction torque (Tmin
249
+ and Tmax). For a given acceleration of the preceding
250
+ vehicle (al) and velocity of the host (vh), the feasible
251
+ bounds of µ are given as
252
+ µTmin/max = al + Fr (vh, θ, mv)
253
+ mv
254
+ − Tmin/max
255
+ mvrw
256
+ (9)
257
+ For a given gain vector Kα = [kα1, kα2], ECBF guar-
258
+ antees safety if the proposed state feedback control,
259
+ −kα1 (z − z0) − kα2 (vl − vh), is within the virtual linear
260
+ system action bound [µT max, µT min]. In general appli-
261
+ cation cases, however, this bound may not be respected.
262
+ Nevertheless, if Kα is chosen so that the poles are placed
263
+ sufficiently to the left in s-plane, the above ECBF could
264
+ still bound the safe set. Safety assurance for such pole
265
+ selections could be achieved by investigating the evolution
266
+ of the CBF control term h (x) in worst-case situation where
267
+ the linear virtual model is initialized with extreme possible
268
+ η0,xrm, and then the possible limiting torque actions are
269
+ applied. For a given minimum separation distance target
270
+ and maximum downhill road grade, this is equivalent to
271
+ applying the maximum possible traction torque output
272
+ of the performance RL-ACC agent, with the host vehicle
273
+ model (of largest loading) initialized in with the maximum
274
+ possible velocity while the preceding vehicle is under its
275
+ maximum deceleration. This extreme conditions gives the
276
+ feasible µ bounds as µT min−xrm and µT max−xrm using
277
+ equations (9).
278
+ To capture the evolution of h (x) under these extreme
279
+ conditions, a simulation rollout is discretized into timestep
280
+ ∆t, and the action µ (saturated with µT min−xrm and
281
+ µT max−xrm) held piecewise constant. Algorithm 1 shows
282
+ how this is implemented by integrating the virtual system
283
+ (3). If the h (x) from this simulation is positive at infinity
284
+ (or after some finite time), the selected Kα guarantees
285
+ safety. Otherwise, the Kα needs to be changed until this
286
+ is satisfied.
287
+ Algorithm 1 An algorithm to enforce system bounds on
288
+ a virtual linear system
289
+ η ← η0
290
+ µ ← µ0
291
+ while t ≤ t∞ do
292
+ t ← t + ∆t
293
+ if µ < µT max−xrm then
294
+ µ ← µT max−xrm
295
+ else if µ > µT min−xrm then
296
+ µ ← µT min−xrm
297
+ end if
298
+ h (x(t)) ← C(eF ∆tη0 + eF ∆t � ∆t
299
+ 0
300
+ e−F τGµd(τ))
301
+ µ ← −kα1h (x) − kα2 ˙h (x)
302
+ η0 ←
303
+ �h (x)
304
+ ˙h (x)
305
+
306
+ end while
307
+ Once the suitable gain vector Kα is selected, the ECBF
308
+ safety constraint enforces safety by projecting the action
309
+ proposed by the outputs of the RL controller’s actor
310
+ network Ta (s) (see next section) to the control traction
311
+ torque Tt in a way that introduces minimal changes to it.
312
+ This is done by posing and solving the quadratic program:
313
+ T ∗
314
+ t = arg min
315
+ Tt
316
+ 1
317
+ 2 ∥Tt − Ta(s)∥2
318
+ s.t.
319
+ al + Fr (vh, mv, θ)
320
+ mv
321
+
322
+ Tt
323
+ mvrw
324
+ ≥ −kα1 (z − z0)
325
+ − kα2 (vl − vh)
326
+ (10)
327
+ 3. VEHICLE ENVIRONMENT AND RL ACC
328
+ The powertrain controller is modeled as Markov decision
329
+ process (MDP) consisting of states s, actions a, a reward
330
+ function r (s, a), and discounting factor γ. The probability
331
+ of action choices is policy π(a|s, θ) where θ denotes the
332
+ parameters of the deep neural network used to approxi-
333
+ mate the policy. The host vehicle velocity vl, the relative
334
+ velocity between the preceding and host vehicles vrel,
335
+ the separation distance between the vehicles z, the gear
336
+ ng, the mass of the vehicle mv, the road grade θ, the
337
+ driver demanded velocity vset and a flag to show if the
338
+ vehicle is in ACC sensor range f constitute the states
339
+ of the RL agent, s = {vl, vrel, z, ng,mv, θ, vset, f}. The
340
+ RL performance controller is designed to perform both
341
+ traction torque Ta control and gear change selection ∆ng,
342
+ i.e. a = {Ta, ∆ng}. As shown in Fig.1, the proposed Ta is
343
+ filtered by the ECBF safety layer to safe traction torque
344
+ demand Tt (10). The engine torque and engine speed that
345
+ brings about this wheel traction torque are then calculated
346
+ utilizing transmission ratios of the selected gear and the
347
+ final drive, and the associated fuel rate is read from the
348
+ fuel map. Notice that while the RL controller’s actions are
349
+ Ta and ∆ng, the ECBF safety filter does not use ∆ng in
350
+ the safety constraint. However, taking into account that
351
+ gear selection is crucial for fuel economy and driver ac-
352
+ commodation, it is an integral part of the RL performance
353
+ controller.
354
+ The filtered traction torque Tt and the gear change ∆ng
355
+ actions are implemented in the vehicle environment, and
356
+
357
+ Fig. 1. Training RL agent for ACC
358
+ the suitability of the actions is measured by the reward
359
+ function. The reward is designed to accomplish the in
360
+ range and out of range tasks, and different performance
361
+ objectives within each task are tuned by reward weights
362
+ (w). When there is not a vehicle present in the sensing
363
+ range (z > zsr), as shown in (11), the reward structure
364
+ requires the vehicle to maintain the driver-set velocity and
365
+ concurrently balances the fuel consumption and smooth
366
+ torque change considerations. When there is a vehicle in
367
+ the sensing range, on the other hand, the reward aims to
368
+ maintain a close distance from the preceding vehicle, as
369
+ shown in (12). In such proximity, in addition to smooth
370
+ torque change and fuel consumption considerations, the
371
+ reward ros discourages the host vehicle from overspeeding
372
+ beyond the driver demanded velocity (vset). Gear hunting
373
+ and the associated rough vehicle operation are mitigated
374
+ by including a gear reward term weighted by wg.
375
+ r = wv0.1
376
+ |vh−vset|
377
+ Vrel,max + wf0.1
378
+ ˙
379
+ mf
380
+ mf,max + wT 0.1
381
+ |∆Te|
382
+ Te,max +
383
+ wg0.1
384
+ |∆ng|
385
+ ng,max
386
+ (11)
387
+ r = wz0.1
388
+ Z
389
+ Zsr + wf0.1
390
+ ˙
391
+ mf
392
+ mf,max + wT 0.1
393
+ |∆Te|
394
+ Te,max +
395
+ wg0.1
396
+ |∆ng|
397
+ ng,max + ros
398
+ (12)
399
+ where ros = wos if vh ≤ vset, else : ros = wos0.1
400
+ vh−vset
401
+ vrel,max ,
402
+ ˙mf is the fuel rate and Te is the engine torque.
403
+ To accommodate the continuous traction torque and the
404
+ discrete gear selection, Hybrid Maximum A Posteriori
405
+ Policy Optimization (HMPO) is found to be a good fit
406
+ for the RL training algorithm (Kerbel et al., 2022; Neunert
407
+ et al., 2020; Abdolmaleki et al., 2018). In addition to being
408
+ scalable and robust like state of the art Proximal Policy
409
+ Optimization (PPO) (Schulman et al., 2017) and Trust-
410
+ Region Policy Optimization (TRPO) (Schulman et al.,
411
+ 2015) algorithms, the fact that it is off-policy makes it
412
+ data efficient to apply it to the real world RL ACC
413
+ trainings. The RL agent comprises of an actor (parame-
414
+ terized by θ) and a critic (parameterized by φ) networks,
415
+ in which the former determines the control policy for
416
+ a given state π (s|θ) and the latter evaluates these ac-
417
+ tions by providing the associated action values Q (s, a|φ).
418
+ The actor network outputs the mean and variance of
419
+ a Gaussian distribution, from which traction torque is
420
+ sampled (13). In addition to that, it uses softmax ac-
421
+ tivation at the output layer with three choices for the
422
+ gear change decision, analogous to the available gear
423
+ changes ∆n = {1, 0, −1}(upshift, nochange, downshift).
424
+ Categorical sampling is then used to obtain the gear
425
+ change policy (14). Assuming independence between the
426
+ continuous πT
427
+ θ (Ta|s) and discrete πg
428
+ θ(∆ng|s) policies, the
429
+ total policy could be factorized as (15) for combine action
430
+ a = {Ta, ∆ng}.
431
+ πT
432
+ θ(Ta|s) = N
433
+
434
+ µθ (s) , σ2
435
+ θ (s)
436
+
437
+ (13)
438
+ πg
439
+ θ(∆ng|s) = Cat(αθ(s)), ∀s
440
+ 3
441
+
442
+ k=1
443
+ αk,θ (s) = 1
444
+ (14)
445
+ πθ (a|s) = πT
446
+ θ (Ta|s) πg
447
+ θ(∆ng|s))
448
+ (15)
449
+ In the policy improvement phase, MPO samples from the
450
+ Q-function for different actions and update the actor-
451
+ network parameters to output actions that maximize the
452
+ action values Q(s, a). This is accomplished by optimiz-
453
+ ing the likelihood function of acting optimally using the
454
+ expectation-maximization algorithm ( see Neunert et al.
455
+ (2020); Abdolmaleki et al. (2018)). The policy evaluation
456
+ phase of the training fits the Q-function Qθ (s, a, φ) of
457
+ the critic network, with parameters φ, by minimizing the
458
+ square loss of the current Qθ (s, a, φ) and a target defined
459
+ by retrace sampling Qret
460
+ t
461
+ (Munos et al., 2016).
462
+ min
463
+ φ L (φ) = min
464
+ φ E(s,a)∼R
465
+
466
+ Qθ (s, a|φ) − Qret
467
+ t
468
+ �2
469
+ (16)
470
+ 4. RESULTS AND DISCUSSIONS
471
+ The above RL ACC with the ECBF safety filter is applied
472
+ to a model of medium duty truck in urban and highway
473
+ driving conditions. The actor and critic networks are con-
474
+ structed with three hidden layers, and each layer consists
475
+ of 256 nodes. The simulation uses a 10-speed automated
476
+ manual transmission (AMT) truck that has a 5 to 10
477
+ tons weight range. The preceding vehicle follows Federal
478
+ Test Procedure (FTP-75) drive cycle for the urban driv-
479
+ ing training, while for highway driving, a combination of
480
+ Highway Fuel Economy (HWFET) and ArtMw130 cycles
481
+ are used in succession (Barlow et al., 2009). Once trained,
482
+ we will use different drive cycles for evaluation as will be
483
+ described below.
484
+ In each simulation step, as shown in Fig.1, the actor
485
+ network proposes the torque and the gear actions for a
486
+ given state which will be filtered by the ECBF safety
487
+ layer. The vehicle environment then executes the safe
488
+ actions, and the associated rewards are calculated. To
489
+ accommodate the different objectives of each task, the
490
+ reward is structured with weights of [wv = 0.675, wf =
491
+ 0.175, wT = 0.075, wg = 0.075] for in range, and [wz =
492
+ 0.325, wf = 0.175, wos = 0.35, wT = 0.075, wg = 0.075]
493
+ for out of range conditions. The state, action and rewards
494
+ are stored in the memory buffer, and afterward, batches
495
+ of these data are used to train the networks using the
496
+ HMPO algorithm. In order to prevent RL from learning
497
+ the specific drive cycles, the vehicles are initialized in
498
+ random separation distance along with the addition of
499
+ noise to the velocity profile of the preceding vehicle. The
500
+ weight fluctuations are considered by varying the truck
501
+ weight within and between training episodes.
502
+
503
+ m
504
+ ECBF filter
505
+ Memory buffer
506
+ Ta
507
+ Load actor
508
+ parameters
509
+ RL
510
+ Training
511
+ △ng
512
+ π(s) ={Ta,△ng}
513
+ Load critic
514
+ Q(s,a)
515
+ parameters
516
+ Actor
517
+ network
518
+ π(s)
519
+ Critic
520
+ networkDuring training, because of the careful choice of the gain
521
+ vector Kα = [0.2, 5] as per section 2, the vehicle never
522
+ crashes nor comes within safe distance z0. As the training
523
+ progresses, the RL learns to operate near the driver set
524
+ velocity when it is out of range and follows the preceding
525
+ vehicle more and more closely when it is in range. Even
526
+ though it is not provided with the engine efficiency map,
527
+ as exhibited by the improvement of MPG with training,
528
+ the RL network eventually learns the fuel optimal gear and
529
+ torque actions.
530
+ Table 1. Vehicle environment and RL hyperpa-
531
+ rameter setting
532
+ Vehicle Parameters
533
+ MPO Hyperparameters
534
+ Mass
535
+ 5 - 10 tons
536
+ Actor, critic learning rate
537
+ 10−4, 10−5
538
+ Au
539
+ 7.71m2
540
+ Dual constraint
541
+ 0.1
542
+ Cd
543
+ 0.08
544
+ Retrace steps
545
+ 15
546
+ rw
547
+ 0.498
548
+ KL constraints ϵµ, ϵσ, ϵd
549
+ 0.1, 0.001, 0.1
550
+ f
551
+ 0.015
552
+ αd, αc
553
+ 10
554
+ zsr
555
+ 350
556
+ γ
557
+ 0.99
558
+ Even if it is not practical for safety critical systems, a
559
+ reward shaping approach of safeguarding safety is consid-
560
+ ered to compare against the ECBF-based safety filtering.
561
+ A penalty of rs = −1 is added to the reward function
562
+ when the host approaches closer than the minimum safe
563
+ distance limit z0 and, in the situation of a crash, the
564
+ penalty is enlarged to rc = −10. Due to these safety
565
+ violation penalties, unsafe actions reduce with training,
566
+ and eventually, the agent learns to maximize the reward
567
+ safely. In addition to the reward shaping approach, the
568
+ conventional PID ACC is used as a baseline which, like
569
+ in the case of RL, is designed by dividing the control into
570
+ phases for the in range and out of range conditions (Canale
571
+ and Malan, 2003). The traction torque Tt request is given
572
+ by PID controller and an optimal gear is chosen based on
573
+ the gear with the lowest fuel rate given the desired traction
574
+ torque and vehicle velocity (Yoon et al., 2020; Kerbel et al.,
575
+ 2022).
576
+ After the RL ACC with ECBF is trained, its performance
577
+ is evaluated and compared with PID ACC and RL ACC
578
+ with reward shaping counterparts on a 9-ton truck in
579
+ urban and highway driving conditions. For the urban case,
580
+ the preceding vehicle follows the ArtUrban drive cycle,
581
+ and the driver demanded velocity vset is set to be 15 m/s.
582
+ Similarly, a vset of 25 m/s is used for highway driving, and
583
+ to better capture different velocity profiles in the highway
584
+ situation, the preceding vehicle follows a combination of
585
+ ArtRoad and ARTMw150. The initial separation distance
586
+ between the vehicles is 1500 m in both cases.
587
+ In both driving conditions, the RL ACC successfully
588
+ meets the in range as well as out of range objectives
589
+ and, most importantly, safety constraints are respected.
590
+ Fig.2 shows the RL ACC has a similar velocity profile
591
+ to its PID ACC counterpart for the most part of the
592
+ simulation. However, when it comes to gear selection, the
593
+ RL ACC tends to operate at higher gears. As summarised
594
+ in Table 2, for highway driving, the RL ACC exhibited
595
+ an MPG improvement of 8.3%, whereas, in the case of
596
+ urban driving, it has 7.9% higher MPG than the PID
597
+ ACC baseline. When the preceding vehicle is in range,
598
+ the RL ACC is less susceptible to cut-in as it follows the
599
+ preceding vehicle closer, shown by the lower mean in range
600
+ Fig. 2. Simulation of separation distance, velocity, and gear
601
+ profiles of RL and PID ACC controllers in a highway
602
+ driving.
603
+ separation distance zir. Moreover, it is possible to see that
604
+ the RL ACC with ECBF filter and the RL ACC with
605
+ reward shaping arrangements achieve equivalent levels of
606
+ fuel economy and in range car following performances.
607
+ Table 3 shows the performance comparison with weight
608
+ fluctuation in which the vehicle’s weight ranges from 5 to
609
+ 10-tons. The RL ACC maintains higher MPG than the
610
+ PID ACC throughout the given weight range, and the
611
+ separation distance is not significantly influenced.
612
+ Table 2. Performance comparison between PID
613
+ ACC, RL ACC with ECBF and RL ACC with
614
+ reward shaping
615
+ Highway driving
616
+ Urban driving
617
+ ACC
618
+ PID
619
+ RL
620
+ RL
621
+ PID
622
+ RL
623
+ RL
624
+ Safety
625
+ layer
626
+ -
627
+ ECBF
628
+ Reward
629
+ shaping
630
+ -
631
+ ECBF
632
+ Reward
633
+ shaping
634
+ MPG
635
+ 8.6
636
+ (-)
637
+ 9.3
638
+ (8.31%)
639
+ 9.31
640
+ (8.37%)
641
+ 6.8
642
+ (-)
643
+ 7.35
644
+ (7.9%)
645
+ 7.38
646
+ (8.4%)
647
+ Zir(m)
648
+ 95
649
+ 74
650
+ 73
651
+ 42
652
+ 39
653
+ 38
654
+ 5. CONCLUSION
655
+ In this paper, an exponential control barrier function-
656
+ based safety filter is employed to instill safety into RL
657
+ based ACC system by projecting the learning exploration
658
+ to a safe set. Since practical systems operate with bounded
659
+ actions, we proposed an approach to verify the safety of a
660
+ given ECBF design by forward simulating in consideration
661
+ of worst case scenarios. After being filtered by this ECBF,
662
+ the traction torque and gear change actions proposed by
663
+ the RL-based ACC are implemented on a simulated vehi-
664
+ cle environment and the associated rewards are observed.
665
+ The RL networks are trained using Hybrid Maximum A
666
+ Table 3. Perandomizedof PID ACC and RL
667
+ ACC with vehicle mass fluctuation
668
+ Weight
669
+ (tons)
670
+ 5
671
+ 6
672
+ 7
673
+ 8
674
+ 9
675
+ 10
676
+ RL
677
+ with
678
+ ECBF
679
+ MPG
680
+ 10.58
681
+ (10.9%)
682
+ 10.38
683
+ (11.6%)
684
+ 9.99
685
+ (9.6%)
686
+ 9.61
687
+ (8.3%)
688
+ 9.3
689
+ (8.31%)
690
+ 8.95
691
+ (7.6%)
692
+ Zir(m) 67
693
+ 69
694
+ 73
695
+ 75
696
+ 74
697
+ 77
698
+ PID
699
+ MPG
700
+ 9.54
701
+ 9.3
702
+ 9.11
703
+ 8.87
704
+ 8.6
705
+ 8.32
706
+ Zir(m) 95
707
+ 95
708
+ 94
709
+ 95
710
+ 95
711
+ 96
712
+
713
+ RL with Reward-shaping
714
+ PID
715
+ Sensing range
716
+ RL with CBF
717
+ Distance (m)
718
+ 5000
719
+ 0
720
+ 25
721
+ 0
722
+ 10
723
+ ear
724
+ 5
725
+ G
726
+ 11
727
+ 0
728
+ 250
729
+ 500
730
+ 750
731
+ 1000
732
+ 1250
733
+ 1500
734
+ 1750
735
+ 2000
736
+ Time (s)Posteriori Policy Optimization (HMPO) algorithm that
737
+ accommodates the continuous traction torque and discrete
738
+ gear change actions. Evaluation on a medium-duty truck
739
+ shows that the RL ACC fulfilled the velocity objectives
740
+ and, most importantly, respected the safety constraints.
741
+ Compared to PID ACC, the RL ACC augments MPG by
742
+ 8.3% in highway driving conditions when the preceding
743
+ vehicle follows a combination of ArtRoad and ARTMw150
744
+ drive cycles, and by 7.9% in urban driving conditions when
745
+ the preceding vehicle follows ArtUrban drive cycle. More-
746
+ over, the RL ACC learns to handle weight fluctuations
747
+ and maintains high performance throughout the vehicle’s
748
+ weight range.
749
+ The current algorithm training and evaluations are per-
750
+ formed on standard driving cycles. Future work will focus
751
+ on using randomized traffic data and measurement noise to
752
+ assess the performance and robustness of RL ACC in even
753
+ more realistic driving conditions. In addition, future work
754
+ will also look at less conservative methods of accounting
755
+ for uncertainties (not worst-case) in ECBF design.
756
+ REFERENCES
757
+ Abdolmaleki, A., Springenberg, J.T., Tassa, Y., Munos,
758
+ R., Heess, N., and Riedmiller, M. (2018). Maximum a
759
+ posteriori policy optimisation. 6th International Con-
760
+ ference on Learning Representations.
761
+ Altman, E. (1999).
762
+ Constrained Markov Decision Pro-
763
+ cesses .
764
+ Ames, A.D., Coogan, S., Egerstedt, M., Notomista, G.,
765
+ Sreenath, K., and Tabuada, P. (2019). Control barrier
766
+ functions: Theory and applications. 2019 18th European
767
+ Control Conference, ECC 2019, 3420–3431.
768
+ Ames, A.D., Grizzle, J.W., and Tabuada, P. (2014). Con-
769
+ trol barrier function based quadratic programs with
770
+ application to adaptive cruise control.
771
+ Proceedings of
772
+ the IEEE Conference on Decision and Control, 2015-
773
+ Febru(February), 6271–6278.
774
+ Barlow, T.J., Latham, S., Mccrae, I.S., and Boulter, P.G.
775
+ (2009). A reference book of driving cycles for use in the
776
+ measurement of road vehicle emissions.
777
+ Canale, M. and Malan, S. (2003).
778
+ Robust design of
779
+ PID based ACC S and G systems. IFAC Proceedings
780
+ Volumes, 36(18), 333–338.
781
+ Chamraz, S. and Balogh, R. (2018). Two approaches to
782
+ the adaptive cruise control (ACC) design. Proceedings
783
+ of the 29th International Conference on Cybernetics and
784
+ Informatics, K and I 2018, 2018-Janua(2), 1–6.
785
+ Cheng, R., Orosz, G., Murray, R.M., and Burdick, J.W.
786
+ (2019). End-to-end safe reinforcement learning through
787
+ barrier functions for safety-critical continuous control
788
+ tasks. 33rd AAAI Conference on Artificial Intelligence,
789
+ AAAI 2019, 3387–3395.
790
+ Dalal, G., Dvijotham, K., Vecerik, M., Hester, T., Padu-
791
+ raru, C., and Tassa, Y. (2018).
792
+ Safe Exploration in
793
+ Continuous Action Spaces.
794
+ Hsu, S.C., Xu, X., and Ames, A.D. (2015). Control barrier
795
+ function based quadratic programs with application to
796
+ bipedal robotic walking. Proceedings of the American
797
+ Control Conference, 2015-July, 4542–4548.
798
+ Kerbel, L., Ayalew, B., Ivanco, A., and Loiselle, K. (2022).
799
+ Driver Assistance Eco-driving and Transmission Control
800
+ with Deep Reinforcement Learning.
801
+ Lang, D., Stanger, T., Schmied, R., and del Re, L. (2014).
802
+ Predictive Cooperative Adaptive Cruise Control: Fuel
803
+ Consumption Benefits and Implementability. 163–178.
804
+ Li, G. and G¨orges, D. (2020). Ecological Adaptive Cruise
805
+ Control for Vehicles with Step-Gear Transmission Based
806
+ on Reinforcement Learning.
807
+ IEEE Transactions on
808
+ Intelligent Transportation Systems, 21(11), 4895–4905.
809
+ Li, Z. (2021). Comparison between safety methods control
810
+ barrier function vs. reachability analysis. arXiv preprint
811
+ arXiv:2106.13176.
812
+ Marsden, G., McDonald, M., and Brackstone, M. (2001).
813
+ Towards an understanding of adaptive cruise control.
814
+ Transportation Research Part C: Emerging Technolo-
815
+ gies, 9(1), 33–51.
816
+ Munos,
817
+ R.,
818
+ Stepleton,
819
+ T.,
820
+ Harutyunyan,
821
+ A.,
822
+ and
823
+ Bellemare, M.G. (2016).
824
+ Safe and Efficient Off-
825
+ Policy
826
+ Reinforcement
827
+ Learning.
828
+ Advances
829
+ in
830
+ Neural
831
+ Information
832
+ Processing
833
+ Systems,
834
+ 1054–
835
+ 1062.
836
+ doi:10.48550/arxiv.1606.02647.
837
+ URL
838
+ https://arxiv.org/abs/1606.02647v2.
839
+ Naus, G., Van Den Bleek, R., Ploeg, J., Scheepers, B., Van
840
+ De Molengraft, R., and Steinbuch, M. (2008). Explicit
841
+ MPC design and performance evaluation of an ACC
842
+ stop and go.
843
+ Proceedings of the American Control
844
+ Conference, 224–229.
845
+ Neunert, M., Abdolmaleki, A., Wulfmeier, M., Lampe,
846
+ T., Springenberg, J.T., Hafner, R., Romano, F., Buchli,
847
+ J., Heess, N., and Riedmiller, M. (2020). Continuous-
848
+ Discrete Reinforcement Learning for Hybrid Control in
849
+ Robotics. (CoRL).
850
+ Nguyen, Q. and Sreenath, K. (2016). Exponential Con-
851
+ trol Barrier Functions for enforcing high relative-degree
852
+ safety-critical constraints. Proceedings of the American
853
+ Control Conference, 2016-July(3), 322–328.
854
+ Radke, F. and Isermann, R. (1987). A parameter-adaptive
855
+ PID-controller with stepwise parameter optimization.
856
+ Automatica, 23(4), 449–457.
857
+ Schulman, J., Levine, S., Moritz, P., Jordan, M., and
858
+ Abbeel, P. (2015).
859
+ Trust region policy optimization.
860
+ 32nd International Conference on Machine Learning,
861
+ ICML 2015, 3, 1889–1897.
862
+ Schulman, J., Wolski, F., Dhariwal, P., Radford, A., and
863
+ Klimov, O. (2017). Proximal Policy Optimization Algo-
864
+ rithms. 1–12.
865
+ Srinivasan, K., Eysenbach, B., Ha, S., Tan, J., and Finn,
866
+ C. (2020). Learning to be Safe: Deep RL with a Safety
867
+ Critic. 1–16.
868
+ Thananjeyan, B., Balakrishna, A., Nair, S., Luo, M.,
869
+ Srinivasan, K., Hwang, M., Gonzalez, J.E., Ibarz, J.,
870
+ Finn, C., and Goldberg, K. (2021). Recovery RL: Safe
871
+ Reinforcement Learning with Learned Recovery Zones.
872
+ IEEE Robotics and Automation Letters, 6(3).
873
+ Xu, X., Grizzle, J.W., Tabuada, P., and Ames, A.D.
874
+ (2018).
875
+ Correctness Guarantees for the Composition
876
+ of Lane Keeping and Adaptive Cruise Control. IEEE
877
+ Transactions on Automation Science and Engineering,
878
+ 15(3), 1216–1229.
879
+ Yang, Z., Wang, Z., and Yan, M. (2021). An Optimization
880
+ Design of Adaptive Cruise Control System Based on
881
+ MPC and ADRC. Actuators 2021, Vol. 10, Page 110,
882
+ 10(6), 110.
883
+ Yoon, D.D., Ayalew, B., Ivanco, A., and Loiselle, K.
884
+ (2020).
885
+ Predictive kinetic energy management for an
886
+
887
+ add-on driver assistance eco-driving of heavy vehicles.
888
+ IET Intelligent Transport Systems, 14(13), 1824–1834.
889
+