jackkuo commited on
Commit
06e4617
·
verified ·
1 Parent(s): 38f45ba

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -dE4T4oBgHgl3EQf3w3V/content/tmp_files/2301.05309v1.pdf.txt +994 -0
  2. -dE4T4oBgHgl3EQf3w3V/content/tmp_files/load_file.txt +0 -0
  3. -dFJT4oBgHgl3EQfpiwj/content/tmp_files/2301.11600v1.pdf.txt +1821 -0
  4. -dFJT4oBgHgl3EQfpiwj/content/tmp_files/load_file.txt +0 -0
  5. .gitattributes +54 -0
  6. 0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss +3 -0
  7. 0dAzT4oBgHgl3EQftv1g/vector_store/index.pkl +3 -0
  8. 19AyT4oBgHgl3EQfofjr/content/tmp_files/2301.00510v1.pdf.txt +1599 -0
  9. 19AyT4oBgHgl3EQfofjr/content/tmp_files/load_file.txt +0 -0
  10. 19AzT4oBgHgl3EQf8_5O/vector_store/index.faiss +3 -0
  11. 29E4T4oBgHgl3EQf0A2b/vector_store/index.faiss +3 -0
  12. 29FIT4oBgHgl3EQf5SvC/vector_store/index.faiss +3 -0
  13. 2dE1T4oBgHgl3EQfSANm/content/tmp_files/2301.03060v1.pdf.txt +1666 -0
  14. 2dE1T4oBgHgl3EQfSANm/content/tmp_files/load_file.txt +0 -0
  15. 2tE0T4oBgHgl3EQfdwDZ/content/2301.02382v1.pdf +3 -0
  16. 2tE0T4oBgHgl3EQfdwDZ/vector_store/index.faiss +3 -0
  17. 49FAT4oBgHgl3EQfmR1P/content/2301.08622v1.pdf +3 -0
  18. 49FAT4oBgHgl3EQfmR1P/vector_store/index.faiss +3 -0
  19. 49FAT4oBgHgl3EQfmR1P/vector_store/index.pkl +3 -0
  20. 6tFKT4oBgHgl3EQf_i4o/content/2301.11962v1.pdf +3 -0
  21. 6tFKT4oBgHgl3EQf_i4o/vector_store/index.faiss +3 -0
  22. A9E2T4oBgHgl3EQfRQfr/content/2301.03780v1.pdf +3 -0
  23. A9E2T4oBgHgl3EQfRQfr/vector_store/index.faiss +3 -0
  24. A9FRT4oBgHgl3EQfujgS/content/tmp_files/2301.13631v1.pdf.txt +1164 -0
  25. A9FRT4oBgHgl3EQfujgS/content/tmp_files/load_file.txt +0 -0
  26. CNE4T4oBgHgl3EQf5g54/content/2301.05324v1.pdf +3 -0
  27. CNE4T4oBgHgl3EQf5g54/vector_store/index.faiss +3 -0
  28. CNE4T4oBgHgl3EQf5g54/vector_store/index.pkl +3 -0
  29. CtAzT4oBgHgl3EQfiP1R/content/2301.01496v1.pdf +3 -0
  30. CtAzT4oBgHgl3EQfiP1R/vector_store/index.pkl +3 -0
  31. E9FLT4oBgHgl3EQfFi_K/vector_store/index.faiss +3 -0
  32. G9AzT4oBgHgl3EQfxf6F/content/tmp_files/2301.01739v1.pdf.txt +1866 -0
  33. G9AzT4oBgHgl3EQfxf6F/content/tmp_files/load_file.txt +0 -0
  34. GdFIT4oBgHgl3EQfWysJ/content/2301.11240v1.pdf +3 -0
  35. GtFAT4oBgHgl3EQftR52/content/2301.08663v1.pdf +3 -0
  36. GtFAT4oBgHgl3EQftR52/vector_store/index.faiss +3 -0
  37. GtFAT4oBgHgl3EQftR52/vector_store/index.pkl +3 -0
  38. INE1T4oBgHgl3EQfXwS1/content/tmp_files/2301.03131v1.pdf.txt +1508 -0
  39. INE1T4oBgHgl3EQfXwS1/content/tmp_files/load_file.txt +0 -0
  40. INE3T4oBgHgl3EQfugsS/vector_store/index.faiss +3 -0
  41. KtE0T4oBgHgl3EQfzgKz/content/2301.02674v1.pdf +3 -0
  42. KtE0T4oBgHgl3EQfzgKz/vector_store/index.faiss +3 -0
  43. KtFRT4oBgHgl3EQfDzfl/content/tmp_files/2301.13474v1.pdf.txt +603 -0
  44. KtFRT4oBgHgl3EQfDzfl/content/tmp_files/load_file.txt +291 -0
  45. MNE3T4oBgHgl3EQfBAmd/vector_store/index.faiss +3 -0
  46. MNFAT4oBgHgl3EQfxB7a/vector_store/index.pkl +3 -0
  47. NdFPT4oBgHgl3EQflzWN/content/tmp_files/2301.13123v1.pdf.txt +1848 -0
  48. NdFPT4oBgHgl3EQflzWN/content/tmp_files/load_file.txt +0 -0
  49. PtFJT4oBgHgl3EQfJCwC/content/tmp_files/2301.11458v1.pdf.txt +1913 -0
  50. PtFJT4oBgHgl3EQfJCwC/content/tmp_files/load_file.txt +0 -0
-dE4T4oBgHgl3EQf3w3V/content/tmp_files/2301.05309v1.pdf.txt ADDED
@@ -0,0 +1,994 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Planning Visual Inspection Tours for a 3D Dubins Airplane
2
+ Model in an Urban Environment
3
+ Collin Hague ∗, Andrew Willis †, Dipankar Maity ‡, Artur Wolek §
4
+ University of North Carolina at Charlotte, Charlotte, North Carolina, 28223
5
+ This paper investigates the problem of planning a minimum-length tour for a three-
6
+ dimensional Dubins airplane model to visually inspect a series of targets located on the ground
7
+ or exterior surface of objects in an urban environment. Objects are 2.5D extruded polygons
8
+ representing buildings or other structures. A visibility volume defines the set of admissible
9
+ (occlusion-free) viewing locations for each target that satisfy feasible airspace and imaging con-
10
+ straints. The Dubins traveling salesperson problem with neighborhoods (DTSPN) is extended
11
+ to three dimensions with visibility volumes that are approximated by triangular meshes. Four
12
+ sampling algorithms are proposed for sampling vehicle configurations within each visibility
13
+ volume to define vertices of the underlying DTSPN. Additionally, a heuristic approach is pro-
14
+ posed to improve computation time by approximating edge costs of the 3D Dubins airplane
15
+ with a lower bound that is used to solve for a sequence of viewing locations. The viewing
16
+ locations are then assigned pitch and heading angles based on their relative geometry. The
17
+ proposed sampling methods and heuristics are compared through a Monte-Carlo experiment
18
+ that simulates view planning tours over a realistic urban environment.
19
+ I. Introduction
20
+ U
21
+ nmanned aerial vehicles (UAVs) are routinely used in applications such as visual reconnaissance, infrastructure
22
+ inspection, and aerial photography to image a series of points of interest (henceforth referred to as targets). In
23
+ three-dimensional environments (e.g., an urban city, mountainous terrain) the targets must be imaged from particular
24
+ vantage points to avoid occlusions from surrounding objects (e.g., buildings, trees). Additional requirements, such as
25
+ airspace restrictions and image resolution, further constrain the three-dimensional visibility volume from which an image
26
+ of a target may be obtained. This paper investigates the problem of planning a path to image a set of targets by flying
27
+ through their corresponding visibility volumes in minimum time. The UAV is modeled as a Dubins airplane [1, 2] and
28
+ the environment consists of extruded polygonal objects with targets located on the ground or on the surface of objects.
29
+ A. Relation to Prior Work
30
+ The view planning problem considered here is related to the Dubins traveling salesperson problem (DTSP [3]) of
31
+ constructing a minimum-time tour for a constant-speed planar Dubins vehicle model [4] to travel through a series of
32
+ planar points (with arbitrary heading). The set of points to visit can be generalized to arbitrary planar regions (e.g.,
33
+ polygons) to give the DTSP with neighborhoods (DTSPN [5]) wherein the Dubins vehicle must visit at least one point in
34
+ each region/neighborhood. One application of the DTSPN is to plan visual inspection tours for an airplane to visit
35
+ planar polygonal regions at a constant altitude to image ground targets [6]. More recently, the Dubins airplane model
36
+ [1, 2] that includes additional degrees of freedom (altitude and pitch angle) was used to extend the DTSPN to three
37
+ dimensions. Planning three-dimensional Dubins tours have typically assumed that the desired viewing regions have
38
+ relatively simple geometries, such as spheres [7] or cylinders [8]. In contrast, this work admits more complex target
39
+ visibility volumes that are approximated as triangular meshes.
40
+ B. Contributions
41
+ This paper formulates a view planning problem for a 3D Dubins airplane model to observe a set of targets occluded
42
+ by objects in an urban environment. The contributions of the paper are: (1) four sampling algorithms that extend
43
+ ∗Graduate student, Department of Mechanical Engineering and Engineering Science
44
+ †Associate Professor, Department of Electrical and Computer Engineering
45
+ ‡Assistant Professor, Department of Electrical and Computer Engineering
46
+ §Assistant Professor, Department of Mechanical Engineering and Engineering Science, Member AIAA
47
+ 1
48
+ arXiv:2301.05309v1 [eess.SY] 12 Jan 2023
49
+
50
+ two-dimensional Dubins-based view planning to three dimensions with visibility volumes that have an arbitrary geometry
51
+ approximated by a triangular mesh, and (2) a heuristic approach that solves for a tour using a modified Euclidean
52
+ distance TSP (METSP) with edge costs that are lower bounds for the 3D Dubins path length and using the geometry of
53
+ consecutive viewing locations in the METSP tour to assign heading and pitch angles. The relative performance of the
54
+ algorithms are characterized through a Monte-Carlo experiment.
55
+ C. Paper Organization
56
+ The remainder of the paper is organized as follows. Section II describes the airplane motion model, the environment
57
+ model, the target visibility volumes, and states the view planning problem. Section III describes a method for
58
+ approximately computing the target visibility volumes and path planning for constant-altitude 2D tours. Section IV
59
+ introduces 3D path planning algorithms and proposes heuristics to reduce computation time. Section V describes the
60
+ results of a Monte-Carlo experiment that compares the 2D and 3D algorithms. The paper is concluded in Sec. VI.
61
+ II. Problem Formulation
62
+ This section formulates the problem of planning a minimum time path for an unmanned airplane to visually inspect
63
+ a set of targets in the presence of occluding structures. The vehicle motion model, environmental model, and target
64
+ visibility volumes are introduced, and the view planning problem is formally stated.
65
+ A. Airplane Motion Model
66
+ This work considers the three-dimensional Dubins airplane model [9, 10]:
67
+ ������������
68
+ �𝑥
69
+ �𝑦
70
+ �𝑧
71
+ �𝜓
72
+ �𝛾
73
+ ������������
74
+ =
75
+ ������������
76
+ 𝑣 cos 𝜓 cos 𝛾
77
+ 𝑣 sin 𝜓 cos 𝛾
78
+ 𝑣 sin 𝛾
79
+ 𝑢𝜓
80
+ 𝑢𝛾
81
+ ������������
82
+ ,
83
+ (1)
84
+ where (𝑥, 𝑦, 𝑧) ∈ R3 is the inertial position of the airplane expressed in an east-north-up coordinate system, 𝑣 is the
85
+ vehicle’s speed, 𝜓 is the heading angle, and 𝛾 is the pitch angle (see Fig. 1). The control inputs are the turn-rate 𝑢𝜓 and
86
+ the pitch-angle-rate 𝑢𝛾. The Dubins airplane model travels in the direction it is pointed so that the pitch angle 𝛾 is
87
+ Fig. 1
88
+ The model for a Dubins airplane flying at speed 𝑣 where (𝑥, 𝑦, 𝑧) is the inertial position, 𝜓 is the heading
89
+ angle, and 𝛾 is the pitch angle.
90
+ equivalent to the flight path angle and is constrained between a minimum and maximum angle, 𝛾 ∈ [𝛾min, 𝛾max]. The
91
+ controls are constrained such that the path curvature 𝜌min is bounded [11]:
92
+ 𝜌min ≤
93
+ 1
94
+ √︃
95
+ 𝑢2
96
+ 𝜓 cos2 𝛾 + 𝑢2𝛾
97
+ .
98
+ (2)
99
+ 2
100
+
101
+ Let the vehicle’s configuration be denoted 𝒒 = (𝑥, 𝑦, 𝑧, 𝜓, 𝛾) ∈ 𝑄 where 𝑄 = R3 × S2 is the configuration space.
102
+ An example 2D Dubins path (modified with a constant pitch angle to join two altitudes) and a 3D Dubins path that
103
+ join 𝒒𝑖 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗, 𝜓 𝑗, 𝛾 𝑗) and 𝒒 𝑗 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗, 𝜓 𝑗, 𝛾 𝑗) are shown in Fig. 2. The modified 2D Dubins path uses a
104
+ constant pitch angle 𝛾𝑐 that is computed from the change in altitude and planar displacement between the start and end
105
+ configurations. The modified 2D Dubins path does not satisfy the required pitch angle at the start/end configurations and
106
+ may violate pitch angle constraints along the path when the change in altitude is large relative to the planar displacement.
107
+ Instead, a 3D Dubins path can join two configurations while limiting the pitch angle along the path to within the
108
+ allowable bounds. The 3D Dubins paths are generated according to [10] by decomposing the 3D path into two decoupled
109
+ 2D Dubins paths. First, a 2D horizontal Dubins path is constructed in the 𝑥𝑦 plane to join the 2D Dubins configurations
110
+ (𝑥𝑖, 𝑦𝑖, 𝜓𝑖) and (𝑥 𝑗, 𝑦 𝑗, 𝜓 𝑗) using a horizontal turn radius that is twice the minimum turn radius 𝜌h = 2𝜌min. Next, a 2D
111
+ vertical path is constructed, with vertical plane turn radius 𝜌v that is found from [10]
112
+ 𝜌−2
113
+ min = 𝜌−2
114
+ h + 𝜌−2
115
+ v
116
+ ,
117
+ (3)
118
+ to join the 2D Dubins configurations (𝑠𝑖, 𝑧𝑖, 𝛾𝑖) and (𝑠 𝑗, 𝑧 𝑗, 𝛾 𝑗) where 𝑠𝑖 and 𝑠 𝑗 are the initial and final arc-lengths
119
+ along the Dubins path in the 𝑥𝑦 plane (where 𝑠𝑖 = 0). The turn radii, 𝜌h and 𝜌v, are iteratively varied while satisfying
120
+ (3) to meet the acceptable pitch angle constraint while minimizing the path length as described in [10]. The length of a
121
+ 3D Dubins path between two configurations, 𝒒𝑖, 𝒒 𝑗 ∈ 𝑄 is denoted 𝐷(𝒒𝑖, 𝒒 𝑗) : 𝑄2 → R.
122
+ Start
123
+ End
124
+ Modified 2D
125
+ Dubins Path
126
+ 3D Dubins Path
127
+ Fig. 2
128
+ An example 3D Dubins airplane path (green) [10] joining configurations 𝒒1 = (0, 0, 0, 𝜋
129
+ 6 , 0) and 𝒒2 =
130
+ (0, 300 m, 400 m, 0, 0) is compared to a modified 2D Dubins path (red) that join the same pair of locations and
131
+ heading angles. The modified 2D Dubins path is shorter (523 m compared to 1184 m) but violates the pitch angle
132
+ constraint since a large altitude change is required over a relatively short distance. The paths are constructed
133
+ with the parameters: 𝜌min = 40 m, 𝛾min = −𝜋/12, and 𝛾max = 𝜋/9.
134
+ B. Environment
135
+ The airplane operates in an urban environment that consists of a ground plane and a collection of 2.5-dimensional
136
+ objects representing buildings or other structures. Let 𝑂 = {𝑂0, . . . , 𝑂𝑁𝑂−1} be the set of 𝑁𝑂 objects, where 𝑂𝑖 ⊂ R3
137
+ for each 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1}. The 𝑖th object is an extruded polygon 𝑂𝑖 = {(𝑥, 𝑦, 𝑧) ∈ R3 | (𝑥, 𝑦) ∈ 𝐴𝑖 and 𝑧 ∈ [0, ℎ𝑖]}
138
+ where 𝐴𝑖 ⊂ 𝑅2 is the object’s footprint and ℎ𝑖 is the height of the object. The set of points along the boundary of 𝐴𝑖 is a
139
+ simple two-dimensional polygon denoted 𝜕𝐴𝑖 whose shape is defined by an ordered set of points with a positive signed
140
+ area. Points on the interior of 𝐴𝑖 belong to the set denoted int(𝐴𝑖). The polygonal areas of each object do not intersect
141
+ int(𝐴𝑖) ∩ int(𝐴 𝑗) = ∅ for all 𝑖 ≠ 𝑗 with 𝑖, 𝑗 ∈ {0, . . . , 𝑁𝑂 − 1}. The height of the tallest object in 𝑂 is denoted ℎmax,
142
+ and the airplane is constrained to fly in a feasible airspace
143
+ 𝐹 = 𝐷 × [𝑧min, 𝑧max] − 𝑂 ,
144
+ (4)
145
+ where 𝐷 ⊂ R2 is the planar region containing the polygonal objects, i.e., 𝐴𝑖 ⊂ 𝐷 for all 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1}, 𝑧min and
146
+ 𝑧max > 𝑧min are the minimum and maximum operating altitudes of the airplane. The union of all the objects is subtracted
147
+ from the rectangular volume 𝐷 × [𝑧min, 𝑧max] in (4). To ensure that 3D Dubins paths joining two configurations does not
148
+ exceed the feasible airspace or encounter obstacles, the feasible airspace and set of objects can be artificially contracted
149
+ and inflated, respectively. This work assumes that the minimum altitude 𝑧min is constrained to be above the tallest
150
+ 3
151
+
152
+ building, 𝑧min > ℎmax + 2𝜌min, such that the airplane’s feasible airspace is free of objects and there is enough vertical
153
+ space to maneuver without collision.
154
+ C. Target Visibility Volumes
155
+ The airplane is assumed to be equipped with a gimbaled camera and is tasked with inspecting a set of 𝑀 targets
156
+ located at the points 𝑃 = { 𝒑0, . . . , 𝒑𝑀−1}. Each target 𝒑 = (𝑝𝑥, 𝑝𝑦, 𝑝𝑧) ∈ 𝑃 is located in an unobstructed area of the
157
+ ground plane or on the exposed surface of an object. That is, each target has planar location (𝑝𝑥, 𝑝𝑦) ∈ 𝐷 and altitude
158
+ 𝑝𝑧 satisfying the following cases: (i) if (𝑝𝑥, 𝑝𝑦) ∩ 𝐴𝑖 = ∅ for all 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1} then the target is on the ground
159
+ plane with 𝑝𝑧 = 0, (ii) if 𝑝𝑦 ∩ 𝜕𝐴𝑖 ≠ ∅ for some 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1} then the target is located on the vertical wall of the
160
+ 𝑖th object and 𝑝𝑧 ∈ [0, ℎ𝑖], or (iii) if 𝑝𝑦 ∩ int(𝐴𝑖) ≠ ∅ then 𝑝𝑧 = ℎ𝑖 such that the target is on top of the 𝑖th object. For
161
+ each target, a target visibility volume 𝑉𝑖 is defined as the set of points 𝒈 ∈ R3 that have a direct line-of-sight to the target
162
+ (i.e., not obscured by buildings). Let
163
+ 𝐿(𝜏; 𝒈, 𝒑) = ( 𝒑 − 𝒈)𝜏 + 𝒈 for 𝜏 ∈ [0, 1]
164
+ (5)
165
+ denote a line segment that joints two points 𝒈, 𝒑 ∈ R3 where 𝜏 is a normalized arc-length. The visibility volume for a
166
+ target located at 𝒑 = (𝑝𝑥, 𝑝𝑦, 𝑝𝑧) is the subset of the feasible airspace that is within direct line-of-sight to the target,
167
+ within a maximum range 𝑑max relative to the target, and at least a distance ℎview above the target:
168
+ 𝑉( 𝒑; 𝐹, 𝑂, 𝑑max, ℎview) = {𝒈 = (𝑔𝑥, 𝑔𝑦, 𝑔𝑧) ∈ 𝐹 such that || 𝒑 − 𝒈|| ≤ 𝑑max, ℎview + 𝑝𝑧 ≤ 𝑔𝑧 and
169
+ 𝐿(𝜏; 𝒈, 𝒑) ∩ 𝑂 𝑗 = ∅ for all 𝜏 ∈ [0, 1] and 𝑗 ∈ {0, . . . , 𝑁𝑂 − 1}} .
170
+ (6)
171
+ For brevity, visibility volumes (6) are henceforth denoted 𝑉( 𝒑). The maximum range 𝑑max constraint models minimum
172
+ image resolution requirements. The minimum height-above-target ℎview < 𝑑max constraint ensures images are captured
173
+ with sufficient surrounding context (e.g., the point target may actually represent an extended body that should be
174
+ contained in the image) or to reduce gimbal pointing speed and precision requirements. For the problem to be well
175
+ posed, there should always exist at least one valid viewing point above each target. This condition may be satisfied by
176
+ the following parameter constraints:
177
+ 𝑧min ≤ ℎview + ℎmax ≤ 𝑧max ,
178
+ (7)
179
+ 𝑧min ≤ 𝑑max ,
180
+ (8)
181
+ 2𝑑max < || 𝒑𝑖 − 𝒑 𝑗||
182
+ for all 𝒑𝑖, 𝒑𝑖 ∈ 𝑃 with 𝒑𝑖 ≠ 𝒑 𝑗 .
183
+ (9)
184
+ If a target is located on top of the highest object, then constraint (7) ensures that a viewing point exists that is below the
185
+ maximum feasible altitude and above the minimum feasible altitude. For targets that are located on the ground plane,
186
+ constraint (8) ensures that the sensor range is sufficiently large to view the target from the minimum feasible altitude.
187
+ Lastly, constraint (9) is a simplifying assumption that guarantees targets are spaced sufficiently far apart such that their
188
+ visibility volumes do not intersect 𝑉( 𝒑𝑖) ∩ 𝑉( 𝒑 𝑗) = ∅ for all 𝑖, 𝑗 ∈ {0, . . . , 𝑀 − 1} with 𝑖 ≠ 𝑗.
189
+ D. View-planning Problem Statement
190
+ Let 𝐵(𝒒) be a mapping from a configuration 𝒒 = (𝑥, 𝑦, 𝑧, 𝜓, 𝛾) ∈ 𝑄 to an integer in the set {0, . . . , 𝑀 − 1} that
191
+ identifies the visibility volume corresponding to 𝒒, i.e., the integer 𝐵(𝒒) corresponds to the target 𝒑𝐵(𝒒) ∈ 𝑃 for which
192
+ (𝑥, 𝑦, 𝑧) ∈ 𝑉( 𝒑𝐵(𝒒)). If 𝒒 is not contained in any visibility volume then 𝐵(𝒒) = ∅. The optimization problem is to find
193
+ the sequence of vehicle configurations 𝒒0, . . . , 𝒒𝑀−1 that
194
+ minimize
195
+ 𝑀−1
196
+ ∑︁
197
+ 𝑖=0
198
+ 𝐷(𝒒𝑖, 𝒒𝑖+1) + 𝐷(𝒒𝑀−1, 𝒒0) ,
199
+ (10)
200
+ subject to
201
+ 𝐵(𝒒𝑖) ≠ 𝐵(𝒒 𝑗),
202
+ for all 𝑖, 𝑗 ∈ {0, . . . , 𝑀 − 1} with 𝑖 ≠ 𝑗 ,
203
+ (11)
204
+ 𝐵(𝒒0) ∪ · · · ∪ 𝐵(𝒒𝑀−1) = {0, . . . , 𝑀 − 1} ,
205
+ (12)
206
+ where the cost function (10) is the total length of the 3D Dubins paths in the tour, the constraint (11 ensures that each
207
+ vehicle configuration lies within a unique visibility volume and the constraint 12) ensures that all visibility volumes
208
+ are visited. The view planning problem (10)–(12) is a mixed continuous/combinatorial optimization problem with a
209
+ nonlinear cost function and constraints. Since the vehicle travels at a constant speed the minimum-length tour is also the
210
+ minimum-time tour.
211
+ 4
212
+
213
+ III. 2D Algorithms
214
+ In this section, a target visibility volume mesh approximation is described (Sec. III.A) followed by a description of
215
+ two-dimensional algorithms (Sec. III.B and Sec. III.C) that solve the view planning problem (10)–(12). The algorithms
216
+ discussed here include (i) traveling directly over each target (i.e., formulating a Dubins traveling salesperson problem
217
+ (DTSP) [12]), and (ii) the DTSP with neighborhoods (DTSPN) to visit one point in a set of visibility polygons
218
+ corresponding to the targets [6] that is modified to use an optimized altitude for defining the visibility polygons
219
+ A. Target Visibility Volume Approximation
220
+ Volumes in 3D are commonly approximated by a triangular mesh [13]. While many prior works on the DTSP
221
+ have assumed simplified 3D geometries (e.g., spheres, cylinders), we propose to use triangular meshes since they can
222
+ represent arbitrary geometries. The 𝑖th target visibility volume 𝑉𝑖 is approximated with 𝑁𝐹 triangular mesh elements
223
+ resulting in the mesh ˆ𝑉𝑖. Let | ˆ𝑉𝑖| denote the total number of mesh elements. The 𝑗th mesh element in ˆ𝑉𝑖 is defined
224
+ as a set of vectors ˆ𝑉𝑖 𝑗 = {𝒄0
225
+ 𝑖 𝑗, 𝒄1
226
+ 𝑖 𝑗, 𝒄2
227
+ 𝑖 𝑗, 𝒏𝑖 𝑗} where the vectors 𝒄0
228
+ 𝑖 𝑗, 𝒄1
229
+ 𝑖 𝑗, 𝒄2
230
+ 𝑖 𝑗 ∈ R3 are the positions of the vertices of a
231
+ triangular mesh element, and 𝒏𝑖 𝑗 ∈ R3 is an outward pointing normal vector, as illustrated in Fig. 3. The mesh-based
232
+ target visibility volumes ˆ𝑉𝑖 are computed using the painter’s algorithm [14]. A sphere centered on each target is
233
+ decomposed into six mutually perpendicular views, and each view looks out from the target point location with a
234
+ 90-degree field-of-view thereby covering one of the six sides of a cube enclosing the point. OpenGL [15] and a special
235
+ version of the geometric depth map, i.e., inverse depth, is used to capture the depth of scene objects in the direction of
236
+ each view. After calculating the depth values, those that are less than or equal to 𝑑max are tessellated into a preliminary
237
+ 3D visibility volume mesh. This mesh is genus-0 [13], i.e., a deformation of the sphere, and is also a manifold surface
238
+ amenable to constructive solid geometry (CSG) Boolean operations. Next, the mesh is intersected with the feasible
239
+ airspace 𝐹 and the minimum viewing distance constraint ℎmin is imposed using CSG Boolean intersection operations.
240
+ To reduce the number of vertices in the resulting mesh a decimation procedure is applied [13].
241
+ Fig. 3
242
+ Example target visibility region with a mesh element defined by three vertices 𝒄0, 𝒄1, 𝒄2 and outward
243
+ pointing normal vector 𝒏.
244
+ B. Baseline Algorithm: Dubins Traveling Salesperson Problem (DTSP)
245
+ The DTSP is the problem of finding the shortest planar tour that visits all points in a graph once using points that are
246
+ connected with 2D Dubins paths. Since the objects considered here are extruded polygons, there are no features that can
247
+ block viewing targets from above (e.g., bridges or tunnels are not admissible). Consequently, the view planning problem
248
+ (10)–(12) can be solved with the DTSP by flying at a fixed altitude directly over each target. All feasible altitudes (i.e.,
249
+ that are common to all visibility volumes) lead to identical cost tours. To account for the different possible heading
250
+ angles at each overhead location the heading-angle-discretized DTSP is adopted [16]. An example solution is shown in
251
+ Fig. (4a).
252
+ 5
253
+
254
+ C. Optimized Altitude DTSP with Neighborhoods (DTSPN)
255
+ A more sophisticated approach developed by Obermeyer et al. [6] considers the fixed altitude slices of the target
256
+ visibility volumes (i.e., planar visibility polygons). Vehicle configurations in each visibility polygon are sampled and a
257
+ DTSPN [5, 6] is formulated to visit one configuration in each visibility polygon. In [6], two sampling algorithms were
258
+ proposed: entry pose sampling—wherein samples are made along the edge of the polygon with heading angles that are
259
+ tangent or inward pointing (Fig. 4b)—and interior pose sampling—wherein samples are placed uniformly in a grid on
260
+ the interior of the visibility polygons with uniformly sampled heading angles. In [6], entry pose sampling gave lower
261
+ cost solutions than interior pose sampling. Thus, the entry pose sampling method is adopted here. The constraints of
262
+ the view planning problem (7)–(9) allow for visibility volumes to occupy disjoint segments of altitude. That is, there
263
+ may not exist an altitude 𝑧∗ ∈ [𝑧min, 𝑧max] that is common to all visibility volumes. While this does not pose an issue
264
+ for some of the 3D algorithms proposed later, these cases cannot be solved by the 2D (constant-altitude) algorithms
265
+ described here. However, introducing the additional constraint
266
+ ℎmax + ℎview ≤ 𝑑max
267
+ (13)
268
+ ensures that the visibility volumes for a target located on the ground plane and for a target located atop the highest
269
+ object have at least one common altitude at 𝑧∗ = 𝑑max. In general, there is a range of admissible altitudes 𝑧∗ that may
270
+ be chosen. The choice of altitude impacts the 2D DTSPN algorithm since visibility polygons change in shape and
271
+ size as the altitude varies. Intuitively, larger polygons are preferred over smaller ones since this increases the set of
272
+ candidate configurations. This work proposes to identify an optimal working altitude for the 2D algorithm as follows.
273
+ First, 𝑛slice polygons are generated from each visibility volume mesh (i.e., for all targets) using the method described
274
+ in [17]. Let P = polygonFromMesh( ˆ𝑉, 𝑧) denote the polygon that results from slicing mesh ˆ𝑉 at altitude 𝑧 and let
275
+ polygonArea(P) denote the corresponding area. The optimal altitude 𝑧∗ is chosen as the one that maximizes the sum
276
+ of polygonal areas across all visibility polygons:
277
+ 𝑧∗ = argmax
278
+ 𝑧∈𝑍
279
+ 𝑀−1
280
+ ∑︁
281
+ 𝑖=0
282
+ polygonArea(polygonFromMesh( ˆ𝑉𝑖, 𝑧))
283
+ (14)
284
+ where 𝑍 = {𝑧0, . . . , 𝑧𝑛slice−1} is a set of altitudes at which the polygons are computed. Note that all altitudes 𝑧 ∈ 𝑍 are
285
+ constrained such that 𝑧min ≤ 𝑧 ≤ 𝑧max. Also, note that 𝑧0 and 𝑧slice−1 are not 𝑧min and 𝑧max respectively, instead 𝑧0 and
286
+ 𝑧slice−1 are slightly offset into the body to avoid floating point error. The selection of 𝑧∗ is visualized in Fig 5a.
287
+ (a) 2D Dubins traveling salesperson problem (DTSP)
288
+ (b) 2D DTSP with neighborhoods (DTSPN)
289
+ Fig. 4
290
+ Example solutions to the view-planning problem using 2D constant-altitude algorithms. The green
291
+ regions are visibility polygons for a chosen altitude 𝑧∗ while the black arrows represent the heading angle at
292
+ sampling points. The multicolored line is the solution path of the TSPs with increasing path length represented
293
+ by color changes from red to purple. The DTSP (a) is solved with entry pose sampling using eight headings
294
+ samples directly over the targets, while the 2D DTSPN (b) uses eight sample locations around the perimeter of
295
+ the polygon with four heading angles that are tangent or point into the corresponding visibility polygons.
296
+ IV. 3D Algorithms
297
+ Inspection tours that admit three-dimensional maneuvering can potentially lead to path length reductions when
298
+ compared to two-dimensional (constant-altitude) tours. The solution techniques in this work all use a transformation
299
+ 6
300
+
301
+ approach to solve the (2D or 3D) DTSPN according to the following steps: compute the approximation of the
302
+ target visibility volume (Sec. III.A), sample the visibility volumes to create graph vertices corresponding to vehicle
303
+ configurations, calculate edge costs between vertices using the 3D Dubins path planning algorithm, and solve for a
304
+ DTSPN tour. Section IV.A details three algorithms to sample the target visibility volumes: random face sampling, 3D
305
+ edge sampling, and global weighted face. Section IV.B.2 then introduces a heuristic approach that improves the edge
306
+ cost computation time using a modified Euclidean distance edge cost and a geometric approach to assign heading and
307
+ pitch angles at each configuration in the tour.
308
+ (a) Optimized altitude with entry pose sampling
309
+ (b) Random face sampling
310
+ (c) 3D edge sampling
311
+ (d) Global weighted face sampling
312
+ Fig. 5
313
+ Visualizations of the four different sampling algorithms: optimized altitude with entry pose sampling,
314
+ random face sampling, 3D edge sampling, and global weighted face sampling. Two-dimensional representations
315
+ of the visibility volumes are in gray, altitude slices are orange lines, and sampled configurations are blue circular
316
+ markers.
317
+ A. Sampling Strategies
318
+ 1. Random Face Sampling
319
+ The random face sampling algorithm extends the 2D entry pose strategy from [6] to sample 3D vehicle configurations
320
+ across the surface of the target visibility volume with a uniform distribution. The approach is detailed in Algorithm 1
321
+ and visualized in Fig. 5b. The algorithm randomly finds 𝑛pts three-dimensional points on the faces of each triangular
322
+ mesh in the set of triangular meshes ˆ𝑉0:𝑀−1 = { ˆ𝑉1, . . . , ˆ𝑉𝑀−1} and assigns to each point a set of configurations with
323
+ 𝑛𝜓 and 𝑛𝛾 unique heading and pitch angles, respectively. The sampling method returns a total of 𝑛pts𝑛𝜓𝑛𝛾 vehicle
324
+ configurations per visibility volume. First, the set of configurations Q is initialized as an empty set, and the area of
325
+ each face in the mesh is calculated (lines 3-6). The area of each triangular face element, 𝑎𝑖 𝑗, is calculated by the
326
+ elementArea function using
327
+ 𝑎𝑖 𝑗 = elementArea( ˆ𝑉𝑖 𝑗) = 1
328
+ 2 ||(𝒄0
329
+ 𝑖 𝑗 − 𝒄1
330
+ 𝑖 𝑗) × (𝒄0
331
+ 𝑖 𝑗 − 𝒄2
332
+ 𝑖 𝑗)|| ,
333
+ (15)
334
+ where × is the vector cross product and 𝒄0
335
+ 𝑖 𝑗, 𝒄1
336
+ 𝑖 𝑗, and 𝒄2
337
+ 𝑖 𝑗 are the three vertices contained in the triangular face element
338
+ ˆ𝑉𝑖 𝑗. Next, the proportion of each face area to the total surface area of the mesh ˆ𝑉𝑖 is calculated using element-wise
339
+ division (line 7). The randomSetOfIndices function identifies 𝑛pts random faces by sampling faces with probability
340
+ in proportion to the weights 𝒘𝐹 (line 8). The use of the proportional surface area during the random selection process
341
+ gives every point on the surface of the target visibility region an equal chance of being selected. For each selected
342
+ triangular face, a point on the face is randomly selected using a Barycentric coordinate system [18] (lines 10-12). The
343
+ Barycentric coordinate system allows for the mapping of two random numbers 𝑟0 and 𝑟1 sampled uniformly from the
344
+ interval [0, 1] onto a triangle, embedded in R3, with the weighted sum of its vertices [18]. The random numbers 𝑟0 and
345
+ 𝑟1 are first sampled (line 11) and then a position on the chosen triangular face is determined (line 12). For each position,
346
+ 𝑛𝜓 heading angles sampled uniformly between 0 and 2𝜋 as well as 𝑛𝛾 pitch angles between 𝛾min and 𝛾max are sampled
347
+ uniformly then added to the set of vehicle configurations. The runtime of the algorithm is dominated by the nested for
348
+ loops on lines 2 and 4 running 𝑀| ˆ𝑉|max times—where | ˆ𝑉|max = max𝑖∈{0,1,...,𝑀−1}(| ˆ𝑉𝑖|) is the maximum number of
349
+ 7
350
+
351
+ faces in a single mesh—and the collections of nested loops on lines 13-14 which run 𝑀𝑛pts𝑛𝜓𝑛𝛾. When the number of
352
+ mesh faces in a visibility volume is greater than the number of samples collected | ˆ𝑉|max > 𝑛pts𝑛𝜓𝑛𝛾 the runtime is
353
+ 𝑂(𝑀| ˆ𝑉|max).
354
+ Algorithm 1 Random Face Sampling
355
+ function: RandomFaceSampling( ˆ𝑉0:𝑀−1, 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝛾max, 𝛾min)
356
+ input: target visibility volume mesh ˆ𝑉0:𝑀−1, number of points to sample 𝑛pts, number of heading angles 𝑛𝜓, number of
357
+ pitch angles 𝑛𝛾, max pitch angle 𝛾max, min pitch angle 𝛾min
358
+ output: a set of vehicle configurations for each target Q
359
+ 1: Q ← ∅
360
+ 2: for ˆ𝑉𝑖 ∈ ˆ𝑉0:𝑀−1 do
361
+ 3:
362
+ Q𝑖 ← ∅, 𝒂𝑖 ← ∅
363
+ 4:
364
+ for ˆ𝑉𝑖 𝑗 ∈ ˆ𝑉𝑖 do
365
+ 5:
366
+ 𝒂𝑖 ← 𝒂𝑖 ∪ elementArea( ˆ𝑉𝑖 𝑗)
367
+ 6:
368
+ end for
369
+ 7:
370
+ 𝒘𝐹 = 𝒂𝑖/�|𝒂𝑖 |−1
371
+ 𝑗=0
372
+ 𝑎𝑖 𝑗
373
+ 8:
374
+ 𝐼 ← randomSetOfIndices(𝑛pts, 𝒘𝐹)
375
+ 9:
376
+ for 𝑖 ∈ 𝐼 do
377
+ 10:
378
+ 𝒄0
379
+ 𝑖 𝑗, 𝒄1
380
+ 𝑖 𝑗, 𝒄2
381
+ 𝑖 𝑗 ← getVertices( ˆ𝑉𝑖 𝑗)
382
+ 11:
383
+ 𝑟0 ∼ U[0,1], 𝑟1 ∼ U[0,1]
384
+ 12:
385
+ 𝒔 ← 𝒄0
386
+ 𝑖 𝑗 (1 − √𝑟0) + 𝒄1
387
+ 𝑖 𝑗
388
+ √𝑟0(1 − 𝑟1) + 𝒄2
389
+ 𝑖 𝑗
390
+ √𝑟0𝑟1
391
+ 13:
392
+ for 𝑗 ∈ {0, . . . , 𝑛𝜓 − 1} do
393
+ 14:
394
+ for 𝑘 ∈ {0, . . . , 𝑛𝛾 − 1} do
395
+ 15:
396
+ Q𝑖 ← Q𝑖 ∪ �𝒔, 2𝑗𝜋/𝑛𝜓, 𝛾min + 𝑘(𝛾max − 𝛾min)/max(𝑛𝛾 − 1, 1)�
397
+ 16:
398
+ end for
399
+ 17:
400
+ end for
401
+ 18:
402
+ end for
403
+ 19:
404
+ Q ← Q ∪ Q𝑖
405
+ 20: end for
406
+ 2. 3D Edge Sampling
407
+ The second sampling strategy proposed is 3D edge sampling wherein the 2D entry pose strategy from [6] is extended
408
+ to sample 3D vehicle configurations across the lowest feasible altitude. For the visibility volume shapes studied here this
409
+ is also the altitude where the cross-sectional area is largest for each shape. The 3D edge sampling algorithm, detailed
410
+ in Algorithm 2 and visualized in Fig. 5c, finds 𝑛pts three-dimensional points on the polygon created by slicing the
411
+ triangular mesh along the lowest feasible altitude and distributing points uniformly along the perimeters. The algorithm
412
+ then assigns a set of configurations to each point with 𝑛𝜓 and 𝑛𝛾 unique heading and pitch angles, respectively. The
413
+ sampling method returns a total of 𝑛pts𝑛𝜓𝑛𝛾 vehicle configurations per visibility volume. First, the set of configurations
414
+ Q is initialized as an empty set (line 1). Then, for each visibility volume a subset of points contained in that volume
415
+ is initialized (line 3). Next, the 𝑧 minimum altitude for the triangular mesh is found by finding the minimum height
416
+ coordinate in the set of vertices in the mesh ˆ𝑉 𝑧
417
+ 𝑖 (line 4). After, the polygonFromMesh algorithm takes the triangular
418
+ mesh and the 𝑧min altitude and returns a polygonal slice of the mesh (line 5). A set of points, 𝝀 ∈ R2, placed uniformly
419
+ along the edge of the polygon is found using the uniformPerimeterPoints which takes a polygon and the number
420
+ of points desired as arguments (line 6). Note that lines 4–6 can be modified to produce samples at multiple altitude
421
+ slices if desired. Next, the algorithm iterates through each sampled point and assigns heading and pitch angles. To
422
+ ensure inward-pointing heading angles, the direction of the line segment containing the sample point is found using the
423
+ tangentAngle function (line 8). The points in the polygon defined by polygonFromMesh have a positive signed area.
424
+ Thus, the inward-pointing heading angles are the angles from [0, 𝜋] measured counter-clockwise from the tangent angle.
425
+ For each position, 𝑛𝜓 heading angles between 𝜓𝑞 and 𝜓𝑞 + 𝜋 and 𝑛𝛾 pitch angles between 𝛾min and 𝛾max are sampled
426
+ uniformly and returned as part of the vehicle configurations (lines 9-15). To achieve 𝑛 equally spaced angle samples,
427
+ including the minimum and maximum angle, the range is divided into 𝑛 − 1 sub-sections. The max function, on lines 10
428
+ and 12, ensures the range is never divided by zero (the case where 𝑛𝛾 or 𝑛𝜓 is one). The runtime complexity is dominated
429
+ 8
430
+
431
+ by the for loops on lines 2-18 which have a worst-case running time complexity of 𝑂(𝑀𝑘), where 𝑘 = | ˆ𝑉|2
432
+ max + 𝑛pts𝑛𝜓𝑛𝛾.
433
+ | ˆ𝑉|2
434
+ max is the runtime of the polygonFromMesh algorithm while 𝑛pts𝑛𝜓𝑛𝛾 is the runtimes for the nested for loops (lines
435
+ 9-15). For a typical choice of parameters, the number of faces in the target visibility volume mesh squared is greater
436
+ than the total number of configurations returned, | ˆ𝑉|2
437
+ max > 𝑛pts𝑛𝛾𝑛𝜓 and the overall time-complexity is 𝑂(𝑀| ˆ𝑉|2
438
+ max).
439
+ Algorithm 2 3D Edge Sampling
440
+ function: 3DEdgeSampling( ˆ𝑉0:𝑀−1, 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝛾max, 𝛾min)
441
+ input: target visibility volume mesh ˆ𝑉0:𝑀−1, number of points to sample 𝑛pts, number of heading angles 𝑛𝜓, number of
442
+ pitch angles 𝑛𝛾, max pitch angle 𝛾max, min pitch angle 𝛾min
443
+ output: a set of vehicle configurations for each target Q
444
+ 1: Q ← ∅
445
+ 2: for ˆ𝑉𝑖 ∈ ˆ𝑉0:𝑀−1 do
446
+ 3:
447
+ Q𝑖 ← ∅
448
+ 4:
449
+ 𝑧min ← min( ˆ𝑉 𝑧
450
+ 𝑖 )
451
+ 5:
452
+ P ← polygonFromMesh(𝑧min, ˆ𝑉𝑖)
453
+ 6:
454
+ {𝝀0, . . . , 𝝀𝑛pts−1} ← uniformPerimeterPoints(P, 𝑛pts)
455
+ 7:
456
+ for 𝑚 ∈ {0, . . . , 𝑛pts − 1} do
457
+ 8:
458
+ 𝜓𝑞 ← tangentAngle(𝝀𝑚, P)
459
+ 9:
460
+ for 𝑗 ∈ {0, . . . , 𝑛𝜓 − 1} do
461
+ 10:
462
+ 𝜓 ← 𝜓𝑞 + 𝑗𝜋/max(𝑛𝜓 − 1, 1)
463
+ 11:
464
+ for 𝑘 ∈ {0, . . . , 𝑛𝛾 − 1} do
465
+ 12:
466
+ 𝛾 ← 𝛾min + 𝑘(𝛾max − 𝛾min)/max(𝑛𝛾 − 1, 1)
467
+ 13:
468
+ Q𝑖 ← Q𝑖 ∪ (𝝀𝑚, 𝑧min, 𝜓, 𝛾)
469
+ 14:
470
+ end for
471
+ 15:
472
+ end for
473
+ 16:
474
+ end for
475
+ 17:
476
+ Q ← Q𝑖 ∪ Q
477
+ 18: end for
478
+ 3. Global Weighted Face Sampling
479
+ The third proposed sampling strategy is global weighted face sampling. Rather than sampling the visibility volumes
480
+ at the lowest altitude, all target visibility volumes are sampled along a common set of altitude planes and the number of
481
+ samples allocated to each plane is determined by the cross-sectional perimeter distribution of each altitude summed
482
+ across all target visibility volumes. This approach places more samples at altitudes common to all targets that, on
483
+ average, also have large cross-sectional areas. This sampling method is detailed in Algorithm 3 and visualized in Fig. 5d.
484
+ The algorithm takes a set of target visibility meshes ˆ𝑉0:𝑀−1 and returns a set of vehicle configurations Q for each mesh
485
+ given the parameters 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝑛slice, 𝛾max, and 𝛾min where 𝑛slice ≥ 2 is the number of altitude slices to consider. Let
486
+ ˆ𝑉 𝑧
487
+ 0:𝑀−1 denote the set of all 𝑧 heights for every vertex contained across the 𝑀 meshes ˆ𝑉0:𝑀−1. First, the global minimum,
488
+ the global maximum altitude, and the slicing altitude step size are found (lines 1-2). Then a vector 𝝁 is initialized
489
+ with zeros, denoted as 0𝑛slice×1 (line 3), and later stores the total perimeter summed across all visibility polygons at the
490
+ corresponding altitude slice. The target visibility volumes are sliced into polygons with fixed altitude (i.e. parallel to
491
+ the 𝑥𝑦 plane) using the polygonFromMesh function, lines 4-9. The lowest 𝑧 plane is the visibility volumes’ global
492
+ minimum 𝑧 height (𝜁min) and the highest 𝑧 plane is the visibility volumes’ global maximum 𝑧 height (𝜁max), line 1. The
493
+ nominal set of altitude planes is then 𝑍 = {𝑧0, . . . , 𝑧𝑛slice−1} where 𝑧0 = 𝜁min, 𝑧𝑛slice−1 = 𝜁max and 𝑧𝑖+1 − 𝑧𝑖 = 𝐿. At each
494
+ plane 𝑧 ∈ 𝑍, polygons are created from the target visibility volume and the polygons’ perimeters are accumulated, line 7.
495
+ The sample points in each 𝑧 plane are then distributed in proportion to the accumulated perimeters, lines 11-29. The
496
+ function iteratePerimeters takes six arguments: the mesh to iterate across, a perimeter distribution, the minimum
497
+ altitude, the maximum altitude, the step size, and the total number of sample points. It returns a variable number of
498
+ 𝑛𝑧 ≤ 𝑛slice elements where each element is a pair consisting of a 𝑧𝑟 altitude and the number of points to sample at that
499
+ altitude, 𝑛𝑟. An altitude slice 𝑧𝑟 is either an element of 𝑍 and/or an altitude located at the top or bottom of each visibility
500
+ volume. At each altitude 𝑧𝑟 the corresponding value of 𝝁 is determined (or interpolated, in the special case that 𝑧𝑟 ∉ 𝑍)
501
+ and the 𝑛pts are distributed to each 𝑧𝑟 in proportion to the result. In the event that no slices intersect the visibility mesh
502
+ 9
503
+
504
+ then 𝑛𝑧 = 2 and the heights 𝑧𝑟 are returned corresponding to the top and bottom of the target visibility volume. Next,
505
+ samples 𝝀 ∈ {𝝀0, ..., 𝝀𝑛𝑟−1} are placed uniformly around the perimeter of each polygon created by the intersection of
506
+ the 𝑧𝑟 planes and the target visibility volume with the function uniformPerimeterPoints, line 16. The heading and
507
+ pitch angles are sampled in the same way as entry pose sampling [6], pointing tangent or inward with respect to the
508
+ polygon. The angle tangent to each point 𝝀 on the perimeter of the polygon is found with the tangentAngle function.
509
+ The pitch angles are uniformly sampled within the pitch angle constraints. The runtime complexity is dominated by the
510
+ for loops on lines 11-29 which have a worst-case running time complexity of 𝑂(𝑀𝑛slice𝑘), where 𝑘 = | ˆ𝑉|2
511
+ max + 𝑛𝑟𝑛𝛾𝑛𝜓.
512
+ For a typical choice of parameters, the number of faces in the target visibility volume mesh squared is greater than the
513
+ total number of configurations returned, | ˆ𝑉|2
514
+ max > 𝑛𝑟𝑛𝛾𝑛𝜓 and the overall time-complexity is 𝑂(𝑀𝑛slice| ˆ𝑉|2
515
+ max).
516
+ Algorithm 3 Global Weighted Face
517
+ function: GlobalWeightedFace( ˆ𝑉0:𝑀−1, 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝑛slice, 𝛾max, 𝛾min)
518
+ input: set of triangular meshes ˆ𝑉0:𝑀−1, number of points to sample 𝑛pts, number of heading angles 𝑛𝜓, number of pitch
519
+ angles 𝑛𝛾, number of altitude slices 𝑛slice, max pitch angle 𝛾max, min pitch angle 𝛾min
520
+ output: a set of vehicle configurations for each target Q
521
+ 1: 𝜁max ← max( ˆ𝑉 𝑧
522
+ 0:𝑀−1), 𝜁min ← min( ˆ𝑉 𝑧
523
+ 0:𝑀−1)
524
+ 2: 𝐿 ← (𝜁max − 𝜁min)/(𝑛slice − 1)
525
+ 3: 𝝁 ← 0𝑛slice×1
526
+ 4: for 𝑖 ∈ {0, . . . , 𝑛slice − 1} do
527
+ 5:
528
+ for ˆ𝑉𝑖 ∈ ˆ𝑉0:𝑀−1 do
529
+ 6:
530
+ P ← polygonFromMesh(𝜁min + 𝐿𝑖, ˆ𝑉𝑖)
531
+ 7:
532
+ 𝜇𝑖 ← 𝜇𝑖 + perimeter(P)
533
+ 8:
534
+ end for
535
+ 9: end for
536
+ 10: Q ← ∅
537
+ 11: for ˆ𝑉𝑖 ∈ ˆ𝑉1:𝑀 do
538
+ 12:
539
+ (𝑧𝑟, 𝑛𝑟)𝑛𝑧−1
540
+ 𝑟=0
541
+ ← iteratePerimeters( ˆ𝑉𝑖, 𝝁, 𝜁min, 𝜁max, 𝐿, 𝑛pts)
542
+ 13:
543
+ Q𝑖 ← ∅
544
+ 14:
545
+ for 𝑟 ∈ {0, . . . , 𝑛𝑧 − 1} do
546
+ 15:
547
+ P ← polygonFromMesh(𝑧𝑟, ˆ𝑉𝑖)
548
+ 16:
549
+ {𝝀0, . . . , 𝝀𝑛𝑟−1} ← uniformPerimeterPoints(P, 𝑛𝑟)
550
+ 17:
551
+ for 𝑚 ∈ {0, . . . , 𝑛𝑟 − 1} do
552
+ 18:
553
+ 𝜓𝑞 ← tangentAngle(𝝀𝑚, ˆ𝑉𝑖)
554
+ 19:
555
+ for 𝑗 ∈ {0, . . . , 𝑛𝜓 − 1} do
556
+ 20:
557
+ for 𝑘 ∈ {0, . . . , 𝑛𝛾 − 1} do
558
+ 21:
559
+ 𝜓 ← 𝜓𝑞 + 𝑘𝜋/max(𝑛𝜓 − 1, 1)
560
+ 22:
561
+ 𝛾 ← 𝛾min + 𝑘(𝛾max − 𝛾min)/max(𝑛𝛾 − 1, 1)
562
+ 23:
563
+ Q𝑖 ← Q𝑖 ∪ (𝝀𝑚, 𝑧𝑟, 𝜓, 𝛾)
564
+ 24:
565
+ end for
566
+ 25:
567
+ end for
568
+ 26:
569
+ end for
570
+ 27:
571
+ end for
572
+ 28:
573
+ Q ← Q𝑖 ∪ Q
574
+ 29: end for
575
+ B. Proposed Heuristics
576
+ 1. Modified Euclidean Distance Traveling Salesperson Problem with Neighborhoods (METSPN)
577
+ A bottleneck in the 3D DTSPN algorithms is the computation of the edge costs that require solving for a 3D
578
+ Dubins path between two configurations 𝒒𝑖 = (𝑥𝑖, 𝑦𝑖, 𝑧𝑖, 𝜓𝑖, 𝛾𝑖) and 𝒒 𝑗 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗, 𝜓 𝑗, 𝛾 𝑗). Since the Dubins path is
579
+ asymmetric the corresponding edge cost must be computed for each direction. Here, we propose an approximation to
580
+ 10
581
+
582
+ this edge cost
583
+ ˆ𝐷(𝒒𝑖, 𝒒 𝑗) = max
584
+
585
+ |𝛿𝑧|
586
+ sin 𝛾limit
587
+ , ∥𝒔𝑖 − 𝒔 𝑗 ∥2
588
+
589
+ ,
590
+ (16)
591
+ where 𝛿𝑧 = 𝑧 𝑗 − 𝑧𝑖, 𝛾limit = 𝛾max if 𝛿𝑧 > 0 and 𝛾limit = 𝛾min otherwise, 𝒔𝑖 = (𝑥𝑖, 𝑦𝑖, 𝑧𝑖) and 𝒔 𝑗 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗). The
592
+ calculation is visualized in Fig. 6. The distance (16) is a lower bound on the actual 3D Dubins path length, i.e.,
593
+ Fig. 6
594
+ Visualization of the modified Euclidean distance. The Euclidean distance shown in blue with a pitch
595
+ angle 𝛾 > 𝛾limit is modified by extending the distance traveled in the 𝑥𝑦 plane resulting in the red line with pitch
596
+ angle 𝛾limit. ˆ𝐷𝑥𝑦 refers to the length of the Dubins path projected onto the 𝑥𝑦 plane.
597
+ ˆ𝐷(𝒒0, 𝒒1) ≤ ���(𝒒0, 𝒒1), and is significantly faster to compute than solving for the Dubins path. Using this edge cost
598
+ leads to a variant of the DTSPN we refer to as the modified Euclidean distance traveling salesperson problem (METSPN).
599
+ Solving the METSPN gives a tour of 3D locations to visit. Once a tour is found for the METSPN it is converted into a
600
+ feasible sequence of Dubins paths by assigning heading and pitch angles as follows.
601
+ 2. Bisecting Angle Approximation
602
+ To assign heading and pitch angles a heuristic is adopted that extends the mean angle algorithm developed in [19] to
603
+ three dimensions. The approach is summarized in Algorithm 4. The proposed bisecting angle approximation takes
604
+ as parameters: 𝑽 a 𝑀 × 3 matrix corresponding to the sequence of vertices in the METSPN tour and the problem
605
+ parameters: 𝜌min, 𝛾min, and 𝛾max. The algorithm returns a set of vehicle configurations Q at each point in 𝑽 with
606
+ heading and pitch angles defined as the angle bisector of each consecutive triplet of vertices (for points spaced far apart)
607
+ or as a straight segment (for points spaced close together).
608
+ To obtain the angle bisector at each vertex, calculate vectors from the preceding vertex 𝒖 = 𝑽𝑖 − 𝑽𝑖−1 = (𝑢𝑥, 𝑢𝑦, 𝑢𝑧)
609
+ and to the following vertex 𝒘 = 𝑽𝑖+1 − 𝑽𝑖 = (𝑤𝑥, 𝑤𝑦, 𝑤𝑧) (line 3). The vector 𝒃 = 𝒘 + 𝒖 = (𝑏𝑥, 𝑏𝑦, 𝑏𝑧) determines the
610
+ heading angle 𝜓 in the 𝑥𝑦 plane computed with the four-quadrant arctangent function (line 4). A visualization of the
611
+ calculation can be seen in Fig. 7. The circular indexing of 𝑽, a 𝑀 by 3 matrix, allows for the index −1 to refer to the last
612
+ Fig. 7
613
+ The notation used to determine the bisector vector for a triplet of three points: 𝑽𝑖−1, 𝑽𝑖, 𝑽𝑖+1. The
614
+ orientation of the vectors 𝒖 = 𝑽𝑖 − 𝑽𝑖−1 and 𝒘 = 𝑽𝑖+1 − 𝑽𝑖 are summed and normalized resulting in the vector
615
+ 𝒗. The heading angle 𝜓 is the component of 𝒃 in the 𝑥𝑦 plane while the pitch angle 𝛾 is measured from the 𝑥𝑦
616
+ plane.
617
+ column of 𝑽 and the index 𝑛 to refer to the first element of 𝑽. The pitch angle bisector is the angle between the vector 𝒃
618
+ 11
619
+
620
+ and the 𝑥𝑦 plane (line 5). The resulting angle is saturated to be within the pitch angle bounds on line 6. If vertices are
621
+ close together then curve-curve-curve (CCC) Dubins paths may be created. This should be avoided because the cost of
622
+ (CCC) Dubins paths is much greater than the Euclidean distance. The likelihood of CCC paths occurring is reduced by
623
+ setting the heading and pitch in the direction of the line between two vertices. If the distance between two vertices is
624
+ small (less than the long path case in [20]), then heading and pitch angles are aligned with the while loop on lines 10-21.
625
+ To align the headings of two configurations, the vector between the internal coordinates is found. The angle of this
626
+ vector, 𝒘, about the 𝑧 axis is used as the heading angle. Then, the angle between the 𝑥𝑦 plane and the vector 𝒘 is found
627
+ and saturated between 𝛾min and 𝛾max to set the pitch angle. Inside the loop, the index is advanced once but it is also
628
+ advanced a second time if the current vertex and the next vertex are within 4𝜌min units of each other (worst case for
629
+ the long path case [20]). The second index advance is required to pass over the next configuration because it was just
630
+ modified.
631
+ Algorithm 4 Bisect Angle Approximation
632
+ function: BisectAngleApprox(𝑽, 𝜌min, 𝛾min, 𝛾max)
633
+ input: 𝑽 is a 𝑛 by 3 matrix of vertices that solve the METSPN, minimum turn radius 𝜌min, minimum pitch angle 𝛾min,
634
+ maximum pitch angle 𝛾max
635
+ output: set of configurations solving a DTSP Q
636
+ 1: Q ← ∅
637
+ 2: for 𝑖 ∈ {0, 1, 2 . . . 𝑀 − 1} do
638
+ 3:
639
+ 𝒃 ← 𝑽𝑖+1 + 𝑽𝑖−1// indexing into 𝑽 is circular
640
+ 4:
641
+ 𝜓 ← atan2(𝑏𝑥, 𝑏𝑦)
642
+ 5:
643
+ 𝛾 ← atan2(𝑏𝑧,
644
+ √︃
645
+ 𝑏2𝑥 + 𝑏2𝑦)
646
+ 6:
647
+ 𝛾 ← max(min(𝛾, 𝛾max), 𝛾min)
648
+ 7:
649
+ Q ← Q ∪ (𝑽𝑖, 𝜓, 𝛾)
650
+ 8: end for
651
+ 9: 𝑖 ← 0
652
+ 10: while 𝑖 < |𝑽| do
653
+ 11:
654
+ if ||𝑽𝑖 − 𝑽𝑖+1|| < 4𝜌min then
655
+ 12:
656
+ 𝒘 ← 𝑽𝑖+1 − 𝑽𝑖
657
+ 13:
658
+ 𝜓 ← atan2(𝑢𝑥, 𝑢𝑦,)
659
+ 14:
660
+ 𝛾 ← atan2(𝑢𝑧,
661
+ √︃
662
+ 𝑢2𝑥 + 𝑢2𝑦)
663
+ 15:
664
+ 𝛾 ← max(min(𝛾, 𝛾max), 𝛾min)
665
+ 16:
666
+ Q𝑖𝜓 ← 𝜓, Q(𝑖+1) 𝜓 ← 𝜓
667
+ 17:
668
+ Q𝑖𝛾 ← 𝛾, Q(𝑖+1)𝛾 ← 𝛾
669
+ 18:
670
+ 𝑖 ← 𝑖 + 1
671
+ 19:
672
+ end if
673
+ 20:
674
+ 𝑖 ← 𝑖 + 1
675
+ 21: end while
676
+ C. Illustrative Examples
677
+ An example of a view planning solution for five targets scattered around a city model of Charlotte, North Carolina
678
+ is shown in Fig. 8a. The example was constructed assuming a Dubins airplane model having a curvature radius of
679
+ 𝜌min = 40 m and pitch angle constraints 𝛾 ∈ [−𝜋/12, 𝜋/9]. The random-face algorithm was used with 𝑛pts = 8 samples
680
+ per visibility volume, 𝑛𝜓 = 4 heading angles per sample, and 𝑛𝛾 = 1 pitch angle per sample-heading angle pair. The
681
+ visibility volumes for targets that had no occlusions had a common dome shape, whereas targets located closer to objects
682
+ had more arbitrary shapes. Another example Fig. 8b illustrates the solution for five targets in a model of New York City,
683
+ New York. This example compares the three-dimensional random-face algorithm with 𝑛pts = 32, 𝑛𝜓 = 8, and 𝑛𝛾 = 3
684
+ pitch angles, to the two-dimensional optimized altitude entry pose sampling algorithm with 𝑛pts = 32, 𝑛𝜓 = 8. The
685
+ 3D path can change altitude which allowed the algorithm to find a lower cost path of 3920m while the 2D algorithm
686
+ maintained constant altitude and found a path of cost 4285m, a 10.9% reduction in path cost.
687
+ 12
688
+
689
+ (a) 3D DTSP with neighborhoods (DTSPN) in Charlotte,
690
+ North Carolina
691
+ (b) 3D DTSP with neighborhoods (DTSPN) in New York
692
+ City, New York
693
+ Fig. 8
694
+ Solutions to the 3D Dubins traveling salesperson problem with neighborhoods. Panel (a) was computed
695
+ using the random face algorithm in light blue with 8 samples per target visibility volume, four heading angles
696
+ per sample, and one pitch angle per sample-heading angle pair. Panel (b) was computed using the random face
697
+ sampling algorithm in dark blue with 𝑛pts = 32 samples per target visibility volume, 𝑛𝜓 = 8 heading angles per
698
+ sample, and 𝑛𝛾 = 3 pitch angles per sample-heading pair; the two-dimensional entry pose sampling from [6] in
699
+ magenta with 𝑛pts = 32 samples per target visibility volume and 𝑛𝜓 = 4 heading angles per sample. The target
700
+ visibility volume is translucent white with black edges and the targets are red spheres. The green spheres are
701
+ the vehicle configurations for the solution to the DTSPN. The environment shown is a section of New York City,
702
+ New York obtained from the OpenStreetMap database. Building heights are indicated by the varying color
703
+ scale from yellow to purple.
704
+ V. Numerical Performance Study
705
+ The 2D algorithms from Sec. III were compared to the 3D algorithms from Sec. IV through a Monte-Carlo
706
+ experiment that randomized target locations and a number of targets located in an urban environment. This section
707
+ describes the implementation of the algorithms, the design of the Monte-Carlo study, and discusses the results.
708
+ A. Implementation
709
+ The algorithms in this work were written in python 3.9 ∗[21] using a number of packages, including Shapely [22]
710
+ for polygonal operations and NumPy [23] for working with matrices. The GLKH traveling salesperson solver [24] was
711
+ used to solve the generalized traveling salesperson problems that arise from DTSPs. The target visibility volumes were
712
+ created with data from OpenStreetMap [25], inverse depth calculations from the target location using OpenGL [15], and
713
+ Blender [26] was used for intersecting the triangular meshes within the feasible airspace 𝐹 as well as decimating the
714
+ meshes (i.e., reducing the number of triangular faces). This work uses [27] to compute 2D Dubins paths for the 2D
715
+ algorithms. The algorithm simulations were performed on an AMD Threadripper 3990X running Ubuntu 20.04 with
716
+ one thread allocated to the algorithm.
717
+ B. Monte-Carlo Experiment
718
+ A Monte-Carlo experiment was designed using the environments described in Table 1. The environments were
719
+ created by capturing all of the buildings in a rectangular area in New York City with the OpenStreetMap database and
720
+ limiting the building heights to 300 m. Target locations were randomized for each trial and determined by sampling
721
+ the environment and placing targets on the ground, the wall of buildings, or the roofs of buildings according to a
722
+ user-defined distribution. The radius of the target visibility volumes was 300 m with each target being at least 600
723
+ m apart. The proposed sampling methods and heuristics are independent and studied here in different combinations.
724
+ The algorithms parameters were varied as follows: the number of samples per visibility volume was varied between
725
+ 𝑛pts = {2, 4, 8, 16, 32}, the number of heading angles per sample was 𝑛𝜓 = {2, 4, 8}. To reduce the number of trials,
726
+ only one pitch angle (𝑛𝛾 = 1) of 0◦ was used by passing 0◦ for 𝛾min and 𝛾max to the random face sampling (Sec. IV.A.1),
727
+ 3D edge sampling (Sec. IV.A.2), and global weighted face sampling (Sec. IV.A.3) algorithms. The Dubins airplane had
728
+ ∗The implementation of this study can be found at https://github.com/robotics-uncc/VisualTour3DDubins.
729
+ 13
730
+
731
+ Table 1
732
+ Description of environments obtained from an OpenStreetMap database for New York City, USA, and
733
+ used for the Monte-Carlo experiment.
734
+ Number of Targets
735
+ Number of objects
736
+ Width
737
+ Depth
738
+ 5
739
+ 5624
740
+ 1986 m
741
+ 2090 m
742
+ 10
743
+ 9202
744
+ 2809 m
745
+ 2857 m
746
+ 15
747
+ 11584
748
+ 3440 m
749
+ 3621 m
750
+ 20
751
+ 12119
752
+ 3972 m
753
+ 4181 m
754
+ a minimum curvature radius of 𝜌min = 40 m and a pitch angle constrained between -𝜋/12 and 𝜋/9, similar to [10]. A
755
+ total of 80 configurations of targets were generated, divided evenly among groups of 5, 10, 15, and 20 targets. Every
756
+ combination of algorithm parameters was evaluated with the 80 configurations. The normalized tour cost (total length
757
+ of the tour divided by the turn radius) and the computation time were recorded. The algorithms are denoted by acronyms
758
+ wherein the prefix is either 2D-DTSP, 2D-DTSPN, 3D-DTSPN, or 3D-METSPN corresponding to the algorithms of
759
+ Sections III.B, III.C, IV.A, and IV.B.1, respectively. The 2D-DTSP is followed by a dash and an integer representing the
760
+ number of heading angles. The remaining two algorithms are described by a sampling method acronym: entry pose
761
+ sampling (ETRY) from Sec. III.C, random face sampling (RFAC) from Sec. IV.A.1, 3D edge sampling (E3D) from
762
+ Sec. IV.A.2, or global weighted face sampling (GWF) from Sec. IV.A.3 followed by a dash and an integer representing
763
+ the number of heading angles and another dash and an integer representing the number of samples per target visibility
764
+ volume (i.e., 2D-DTSPN-ETRY-4-16 corresponds to a 2D DSTPN using entry pose sampling with 4 heading angles and
765
+ 16 sample points per target visibility region).
766
+ 1. Analysis of Monte-Carlo Study
767
+ In general, two-dimensional methods at a fixed altitude performed better if the targets are all located at similar
768
+ heights; whereas, 3D methods trended towards better tour cost when targets occupy a wide range of altitudes. The
769
+ median path length, normalized by dividing the cost by the minimum curvature radius, of each view-planning tour (i.e.,
770
+ cost) of the Monte-Carlo runs for an increasing number of targets, the number of heading angles is held at 𝑛𝜓 = 8, and
771
+ the number of pitch angles is held at 𝑛𝛾 = 1 is plotted in Fig. 9. The DTSP algorithms that only visit a single point
772
+ (gray) have one location sample per visibility volume but the lines were extended along the abscissa for comparison.
773
+ The DTSP is inefficient in our problem because shorter paths can be obtained between targets by flying through the
774
+ boundary of their corresponding visibility volumes rather than requiring the paths to pass through the visibility volume
775
+ centers. As the number of heading angles increases the mean cost of the solution decreases, as expected. The METSPN
776
+ algorithms have a similar cost to the eight sampled heading angle solutions. Most of the medians for different algorithms
777
+ approach an asymptote, suggesting that they are converging towards a fixed median tour cost (i.e., further increasing
778
+ the number of samples has diminishing returns). For a large number of samples, the proposed random face sampling
779
+ algorithm yields a lower tour cost than the optimized altitude 2D algorithm. However, the median of the 3D edge
780
+ sampling algorithm is less than the optimal altitude 2D algorithm for all numbers of samples greater than 2. This may
781
+ be due to the 3D algorithms spreading their samples across another dimension (altitude). The 3D algorithms that spread
782
+ the samples along the vertical dimension of each visibility volume perform worse than the algorithm that only samples
783
+ one altitude slice. This suggests that distributing the points in the horizontal plane is more important than distributing
784
+ them in the vertical direction for this particular environment and visibility volume. The sensor model creates visibility
785
+ volumes with the most horizontal variation at the bottom of the shape as seen in Fig. 8; therefore, sampling the visibility
786
+ volumes at the bottom is the best way to produce samples with the greatest horizontal variation.
787
+ To isolate the effects of the different sampling methods, the results are examined for the case where the number
788
+ of samples is held at 𝑛pts = 32, the number of heading angles is held at 𝑛𝜓 = 8, and the number of pitch angles is
789
+ 𝑛𝛾 = 1. Box plots of those trials can be seen in Fig. 10. The medians of the 3D methods (black bar in the middle
790
+ of the colored box) are lower than the medians of the 2D methods suggesting that the 3D methods are able to more
791
+ consistently find lower-cost solutions. The difference between medians of 2D and 3D methods grows as the number of
792
+ target visibility volumes increases. The range of solutions for the different methods, denoted by the vertical black bars,
793
+ is large and suggests that the difference between the solutions produced by the 2D and 3D cases is variable and sensitive
794
+ to the environment. The time for each algorithm to execute on a single thread is shown in Fig. 10. It can be seen that
795
+ 14
796
+
797
+ 2 4
798
+ 8
799
+ 16
800
+ 32
801
+ Samples per Target
802
+ 170
803
+ 180
804
+ 190
805
+ 200
806
+ Tour Cost (nondim.)
807
+ 5 Targets
808
+ 2 4
809
+ 8
810
+ 16
811
+ 32
812
+ Samples per Target
813
+ 225
814
+ 250
815
+ 275
816
+ Tour Cost (nondim.)
817
+ 10 Targets
818
+ 2 4
819
+ 8
820
+ 16
821
+ 32
822
+ Samples per Target
823
+ 270
824
+ 300
825
+ 330
826
+ 360
827
+ Tour Cost (nondim.)
828
+ 15 Targets
829
+ 2 4
830
+ 8
831
+ 16
832
+ 32
833
+ Samples per Target
834
+ 325
835
+ 350
836
+ 375
837
+ 400
838
+ 425
839
+ 450
840
+ 475
841
+ Tour Cost (nondim.)
842
+ 20 Targets
843
+ Algorithm
844
+ 2D-DTSP
845
+ 2D-DTSPN-ETRY
846
+ 3D-DTSPN-E3D
847
+ 3D-DTSPN-GWF
848
+ 3D-DTSPN-RFAC
849
+ 3D-METSPN-E3D
850
+ 3D-METSPN-GWF
851
+ 3D-METSPN-RFAC
852
+ Fig. 9
853
+ The line plots show the median non-dimensional tour cost of the different algorithms as the number of
854
+ samples per target visibility volume increases.
855
+ the algorithms that only consider one point per region have lower execution times than the algorithms that consider
856
+ neighborhoods. The 2D ETRY method has a similar execution time to the 3D DTSPN methods. However, the heuristic
857
+ METSPN algorithm has a lower execution time compared to the other 3D methods because the graph that it creates
858
+ is smaller and less computationally expensive. The results suggest that for a large number of samples the METSPN
859
+ algorithm outperforms the 3D DTSPN algorithms since it produces tours of similar cost but with a computation time
860
+ that is approximately two orders of magnitude lower.
861
+ VI. Conclusion
862
+ This paper studied the view planning problem of using a 3D Dubins airplane model to inspect points of interest in
863
+ an urban environment in minimum time. Triangular meshes were used to compute approximate visibility volumes that
864
+ correspond to locations where an unobstructed view of the target can be obtained while satisfying imaging and altitude
865
+ constraints. The mesh-based approach for computing visibility volumes is flexible and can represent more complex
866
+ geometries than have previously been considered. A range-based sensor model was assumed here, however mesh-based
867
+ view planning can potentially support other sensor models, sensing modalities, and encode sensing performance
868
+ 15
869
+
870
+ 100
871
+ 150
872
+ 200
873
+ 250
874
+ Tour Cost (nondim.)
875
+ 5 Targets
876
+ 250
877
+ 300
878
+ 350
879
+ Tour Cost (nondim.)
880
+ 10 Targets
881
+ 200
882
+ 225
883
+ 250
884
+ Tour Cost (nondim.)
885
+ 15 Targets
886
+ 325
887
+ 350
888
+ 375
889
+ 400
890
+ Tour Cost (nondim.)
891
+ 20 Targets
892
+ 5
893
+ 10
894
+ 15
895
+ 20
896
+ Number of Targets
897
+ 100
898
+ 101
899
+ 102
900
+ 103
901
+ 104
902
+ Time (s)
903
+ Algorithm
904
+ 2D-DTSP
905
+ 2D-DTSPN-ETRY
906
+ 3D-DTSPN-E3D
907
+ 3D-DTSPN-GWF
908
+ 3D-DTSPN-RFAC
909
+ 3D-METSPN-E3D
910
+ 3D-METSPN-GWF
911
+ 3D-METSPN-RFAC
912
+ Fig. 10
913
+ The box plots show the range of cost across all sets of target visibility volumes when the number of
914
+ samples per target visibility is held at 𝑛pts = 32, the number of heading angles is held at 𝑛𝜓 = 8 and the number
915
+ of pitch angles is held at 𝑛𝛾 = 1. The vertical black bars show the upper and lower quartiles of the data while
916
+ the colored sections show the middle quartiles. The black bar in the middle of the box plots is the median of
917
+ the data set. The black diamonds are outliers. The line graph shows the increase in computation time as the
918
+ number of target visibility volumes increases on a log10 scale. The shaded region around each line shows the
919
+ range of computation time.
920
+ characteristics. The 3D Dubins airplane model used in this work can, in some circumstances, produce more efficient
921
+ inspection tours by exploiting altitude changes that are otherwise not possible with constant-altitude Dubins path tours.
922
+ In cases where visibility volumes occupy disjoint altitude segments, the 3D algorithms provide a feasible solution where
923
+ the 2D algorithms are not feasible. However, the pitch angle constraints of a Dubins airplane limit the change in altitude
924
+ over a tour. Altitude changes are accompanied by an increase in path length and thus are only efficient when they greatly
925
+ improve access to the visibility volume.
926
+ This work introduced a heuristic that computes edge costs by replacing the 3D Dubins path computation with a
927
+ simpler lower bound and assigning heading and pitch angles based on the geometric relation of successive points in a
928
+ tour. This strategy provides a similar tour cost to other 3D algorithms that use the exact 3D Dubins path planner for
929
+ edge cost computation but with computation time reduced by two orders of magnitude. Future work may consider the
930
+ view planning problem in the presence of obstacles that must be avoided, with target visibility volumes that overlap,
931
+ and/or with uncertain moving targets to be inspected.
932
+ Acknowledgments
933
+ This work was supported by the William States Lee College of Engineering at the University of North Carolina at
934
+ Charlotte through the Multidisciplinary Team Initiation (MTI) Grant.
935
+ 16
936
+
937
+ References
938
+ [1] Chitsaz, H., and LaValle, S. M., “Time-optimal paths for a Dubins airplane,” 46th IEEE Conference on Decision and Control,
939
+ IEEE, 2007, pp. 2379–2384. https://doi.org/10.1109/CDC.2007.4434966.
940
+ [2] Ambrosino, G., Ariola, M., Ciniglio, U., Corraro, F., De Lellis, E., and Pironti, A., “Path generation and tracking in 3-D for UAVs,”
941
+ Transactions on Control Systems Technology, Vol. 17, No. 4, 2009, pp. 980–988. https://doi.org/10.1109/TCST.2009.2014359.
942
+ [3] Ny, J. L., Feron, E., and Frazzoli, E., “On the Dubins traveling salesman problem,” Transactions on Automatic Control, Vol. 57,
943
+ No. 1, 2012, pp. 265–270. https://doi.org/10.1109/TAC.2011.2166311.
944
+ [4] Dubins, L. E., “On curves of minimal length with a constraint on average curvature, and with prescribed initial and terminal
945
+ positions and tangents,” American Journal of Mathematics, Vol. 79, No. 3, 1957, pp. 497–516. https://doi.org/10.2307/2372560.
946
+ [5] Isaacs, J. T., Klein, D. J., and Hespanha, J. P., “Algorithms for the traveling salesman problem with neighborhoods involving a
947
+ Dubins vehicle,” American Control Conference, 2011, pp. 1704–1709. https://doi.org/10.1109/ACC.2011.5991501.
948
+ [6] Obermeyer, K. J., Oberlin, P., and Darbha, S., “Sampling-based path planning for a visual reconnaissance unmanned air vehicle,”
949
+ Journal of Guidance, Control, and Dynamics, Vol. 35, 2012, pp. 619–631. https://doi.org/10.2514/1.48949.
950
+ [7] Faigl, J., and Váňa, P., “Surveillance planning with Bézier curves,” Robotics and Automation Letters, Vol. 3, No. 2, 2018, pp.
951
+ 750–757. https://doi.org/10.1109/LRA.2018.2789844.
952
+ [8] Váňa, P., Sláma, J., and Faigl, J., “The Dubins traveling salesman problem with neighborhoods in the three-dimensional space,”
953
+ International Conference on Robotics and Automation, IEEE, 2018, pp. 374–379. https://doi.org/10.1109/ICRA.2018.8460957.
954
+ [9] Owen, M., Beard, R. W., and McLain, T. W., “Implementing Dubins airplane paths on fixed-wing UAVs,” Handbook of
955
+ Unmanned Aerial Vehicles, 2015, pp. 1677–1701. https://doi.org/10.1007/978-90-481-9707-1_120.
956
+ [10] Vana, P., Neto, A. A., Faigl, J., and Macharet, D. G., “Minimal 3D Dubins path with bounded curvature and pitch angle,”
957
+ IEEE International Conference on Robotics and Automation, 2020, pp. 8497–8503. https://doi.org/10.1109/ICRA40945.2020.
958
+ 9197084.
959
+ [11] Wang, Y., Wang, S., Tan, M., Zhou, C., and Wei, Q., “Real-time dynamic Dubins-helix method for 3-D trajectory smoothing,”
960
+ Transactions on Control Systems Technology, Vol. 23, 2015, pp. 730–736. https://doi.org/10.1109/TCST.2014.2325904.
961
+ [12] Savla, K., Frazzoli, E., and Bullo, F., “Traveling salesperson problems for the Dubins vehicle,” Transactions on Automatic
962
+ Control, Vol. 53, 2008, pp. 1378–1391. https://doi.org/10.1109/TAC.2008.925814.
963
+ [13] Botsch, M., Kobbelt, L., Pauly, M., Alliez, P., and Lévy, B., Polygon Mesh Processing, AK Peters / CRC Press, 2010.
964
+ https://doi.org/10.1201/b10688.
965
+ [14] Berg, M., Cheong, O., Kreveld, M., and Overmars, M., Binary Space Partitions, Springer Berlin Heidelberg, Berlin, Heidelberg,
966
+ 2008, pp. 259–281. https://doi.org/10.1007/978-3-540-77974-2_12.
967
+ [15] Segal, M., and Akeley, K., “The OpenGL graphics system: a specification (version 4.6 (core profile)),” https://www.opengl.org,
968
+ 2019.
969
+ [16] Medeiros, A. C., and Urrutia, S., “Discrete optimization methods to determine trajectories for Dubins’ vehicles,” Electronic
970
+ Notes in Discrete Mathematics, Vol. 36, 2010, pp. 17–24. https://doi.org/10.1016/j.endm.2010.05.003.
971
+ [17] Jiantao, P., Yi, L., Guyu, X., Hongbin, Z., Weibin, L., and Uehara, Y., “3D model retrieval based on 2D slice similarity
972
+ measurements,” 2nd International Symposium on 3D Data Processing, Visualization and Transmission, 2004, pp. 95–101.
973
+ https://doi.org/10.1109/TDPVT.2004.1335181.
974
+ [18] Turk, G., Graphics Gems, Academic Press Professional, Inc., USA, 1990, Chap. Generating Random Points in Triangles, p.
975
+ 24–28.
976
+ [19] Macharet, D. G., Neto, A. A., Neto, V. F. D. C., and Campos, M. F. M., “Data gathering tour optimization for Dubins’ vehicles,”
977
+ IEEE, 2012, pp. 1–8. https://doi.org/10.1109/CEC.2012.6256477.
978
+ [20] Shkel, A. M., and Lumelsky, V., “Classification of the Dubins set,” Robotics and Autonomous Systems, Vol. 34, 2001, pp.
979
+ 179–202. https://doi.org/10.1016/S0921-8890(00)00127-5.
980
+ [21] Python Software Foundation, “Python 3.9,” www.python.org, 2020–.
981
+ 17
982
+
983
+ [22] Gillies, S., et al., “Shapely: manipulation and analysis of geometric objects,” https://github.com/shapely/shapely, 2007–.
984
+ [23] Harris, C. R., Millman, K. J., van der Walt, S. J., and et. al., “Array programming with NumPy,” Nature, Vol. 585, 2020, p.
985
+ 357–362. https://doi.org/10.1038/s41586-020-2649-2.
986
+ [24] Helsguan, K., “Solving the equality generalized traveling salesman problem using the Lin–Kernighan–Helsgaun algorithm,”
987
+ Mathematical Programming Computation, Vol. 7, 2015, pp. 269–287. https://doi.org/10.1007/s12532-015-0080-8.
988
+ [25] OpenStreetMap contributors, “Planet dump retrieved from "https://planet.osm.org",” https://www.openstreetmap.org, 2017.
989
+ [26] Blender Online Community, “Blender - a 3D modelling and rendering package,” http://www.blender.org, 2018.
990
+ [27] Tang, G., Wang, Z., and Williams, A. L., “On the construction of an optimal feedback control law for the shortest
991
+ path problem for the Dubins car-like robot,” 30th Southeastern Symposium on Systems Theory, 1998, pp. 280–284.
992
+ https://doi.org/10.1109/SSST.1998.660075.
993
+ 18
994
+
-dE4T4oBgHgl3EQf3w3V/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-dFJT4oBgHgl3EQfpiwj/content/tmp_files/2301.11600v1.pdf.txt ADDED
@@ -0,0 +1,1821 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Creative beyond TikToks: Investigating Adolescents’ Social
2
+ Privacy Management on TikTok
3
+ Nico Ebert
4
5
+ Zurich University of Applied Sciences,
6
+ School of Management and Law
7
+ Winterthur, Zurich, Switzerland
8
+ Tim Geppert
9
+ Zurich University of Applied Sciences,
10
+ School of Management and Law
11
+ Winterthur, Zurich, Switzerland
12
+ Joanna Strycharz
13
+ University of Amsterdam, Faculty of
14
+ Social and Behavioural Sciences
15
+ Amsterdam, North Holland
16
+ Netherlands
17
+ Melanie Knieps
18
+ University of Zurich, Digital Society
19
+ Initiative
20
+ Zurich, Zurich, Switzerland
21
+ Michael Hönig
22
+ Zurich University of Applied Sciences,
23
+ School of Management and Law
24
+ Winterthur, Zurich, Switzerland
25
+ Elke Brucker-Kley
26
+ Zurich University of Applied Sciences,
27
+ School of Management and Law
28
+ Winterthur, Zurich, Switzerland
29
+ ABSTRACT
30
+ TikTok has been criticized for its low privacy standards, but lit-
31
+ tle is known about how its adolescent users protect their privacy.
32
+ Based on interviews with 54 adolescents in Switzerland, this study
33
+ provides a comprehensive understanding of young TikTok users’
34
+ privacy management practices related to the creation of videos.
35
+ The data were explored using the COM-B model, an established
36
+ behavioral analysis framework adapted for sociotechnical privacy
37
+ research. Our overall findings are in line with previous research
38
+ on other social networks: adolescents are aware of privacy related
39
+ to their online social connections (social privacy) and perform
40
+ conscious privacy management. However, we also identified new
41
+ patterns related to the central role of algorithmic recommenda-
42
+ tions potentially relevant for other social networks. Adolescents
43
+ are aware that TikTok’s special algorithm, combined with the app’s
44
+ high prevalence among their peers, could easily put them in the spot-
45
+ light. Some adolescents also reduce TikTok, which was originally
46
+ conceived as a social network, to its extensive audio-visual capabil-
47
+ ities and share TikToks via more private channels (e.g., Snapchat)
48
+ to manage audiences and avoid identification by peers. Young users
49
+ also find other creative ways to protect their privacy such as identi-
50
+ fying stalkers or maintaining multiple user accounts with different
51
+ privacy settings to establish granular audience management. Based
52
+ on our findings, we propose various concrete measures to develop
53
+ interventions that protect the privacy of adolescents on TikTok.
54
+ KEYWORDS
55
+ TikTok, adolescent, video, privacy management, social privacy,
56
+ COM-B, Behavior Change Wheel
57
+ 1
58
+ INTRODUCTION
59
+ The global popularity and rapid growth of TikTok are accompanied
60
+ by problems that are the subject of public debate. The platform has
61
+ been criticized for several privacy issues such collecting personal
62
+ This work is licensed under the Creative Commons Attribu-
63
+ tion 4.0 International License. To view a copy of this license
64
+ visit https://creativecommons.org/licenses/by/4.0/ or send a
65
+ letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.
66
+ Proceedings on Privacy Enhancing Technologies 2023(2), 1–15
67
+ © 2023 Copyright held by the owner/author(s).
68
+ https://doi.org/XXXXXXX.XXXXXXX
69
+ data from minors under the age of 13 [29, 33] or transferring U.S.
70
+ minor’s data to China [70]. These issues are especially alarming as
71
+ a large number of platform users are underage [74]. As a result, the
72
+ private space of children such as the bedrooms from which they
73
+ create their videos becomes visible to the world [43]. TikTok has
74
+ reacted to public criticism by introducing several features to better
75
+ protect the privacy of adolescents [75].
76
+ Implicit to the current debate is the apparent consensus that
77
+ adolescents lack the awareness or skill set to consider the possible
78
+ privacy implications of their platform use. In fact, however, little
79
+ evidence is publicly available on how TikTok is used by adolescents
80
+ [63] and how they manage their privacy on the platform [40]. As
81
+ short videos are the platform’s key purpose, this immediately raises
82
+ the question of how younger users protect their privacy when they
83
+ create videos. In this paper, we aim to answer the following re-
84
+ search question: "How and why do adolescents manage their privacy
85
+ when creating videos on TikTok?" We build on the COM-B model for
86
+ behavioral analysis, an established conceptual framework for be-
87
+ havior change widely applied in health communication and beyond
88
+ [62]. This model allows us to explore not only privacy behavior, but
89
+ also related users’ motivations, skills and desires. To explore adoles-
90
+ cents’ privacy management in video creation from the perspective
91
+ of their capabilities, motivations, and opportunities, we conducted
92
+ interviews with 54 adolescent TikTok users in Switzerland, where
93
+ TikTok has gained popularity among young people [6].
94
+ This study contributes to the growing body of research that ad-
95
+ dresses how adolescents manage their privacy on social networks.
96
+ This topic, which is often viewed (and judged) through the moral
97
+ lens of adults, is usually met with a sense of alarm. Empirical evi-
98
+ dence that could serve as a better fact base about adolescents’ online
99
+ privacy behavior is largely based on platforms that cater to a more
100
+ general population (e.g., Facebook, Twitter). However, TikTok is
101
+ not only explicitly geared towards a younger audience [47], but also
102
+ strongly encourages the sharing of short personal videos. Although
103
+ adding text is possible on TikTok, it takes a back seat in favor of
104
+ video content. Given the particularly sensitive nature of one’s image
105
+ and its link to an individual’s personal development [28], TikTok
106
+ strikes us as a particularly relevant but under-researched new use
107
+ case with the potential to enrich the ongoing debate about how –
108
+ if at all – teenagers perceive and manage their privacy [40].
109
+ 1
110
+ arXiv:2301.11600v1 [cs.SI] 27 Jan 2023
111
+
112
+ Proceedings on Privacy Enhancing Technologies 2023(2)
113
+ Ebert et al.
114
+ This study is the first to examine how adolescents between the
115
+ ages of 12 and 18 manage their privacy on TikTok when it comes
116
+ to personal videos. Our findings are based on original data from
117
+ personal interviews and offer unique insights into how privacy
118
+ concerns influence young people’s online behavior. The qualitative
119
+ nature of our study helped us to understand the components that
120
+ shape sharing behavior on TikTok. Ultimately, this allowed us to
121
+ make concrete suggestions on how to effectively promote privacy-
122
+ protective behavior among adolescents on TikTok (e.g., specific
123
+ training, improved app features, and policy enforcement).
124
+ 2
125
+ RELATED WORK
126
+ 2.1
127
+ TikTok and Privacy Issues
128
+ As with many social media platforms, TikTok has come under
129
+ scrutiny for its handling of personal data. TikTok is a video-focused
130
+ social network originally started as U.S.-based musical.ly but later
131
+ bought by Beijing ByteDance Technology Ltd. The TikTok app
132
+ (available for Android and iOS) allows users to create short videos
133
+ (which may only be a few seconds long) and live streams [42]. Like
134
+ YouTube, TikTok is a manifestation of user-generated media where
135
+ content is not primarily created by a limited number of producers
136
+ but by a myriad of users [44]. Compared to other social networks
137
+ such as Facebook or Instagram, users on TikTok do not need to
138
+ communicate with each other to find a community. They can simply
139
+ visit the “For You” default page to find like-minded users [16, 42, 43,
140
+ 87]. Via the primary button at the center of the home screen, users
141
+ can easily record and edit short videos, apply various effects and
142
+ sounds, and reuse content produced by other users. Videos can be
143
+ saved as drafts or published immediately to be viewed by different
144
+ audiences (myself, followers, everybody) [56]. As of September
145
+ 2021, 1 billion monthly active users were reported [79], and 740
146
+ million first-time installs were estimated in 2021 [73]. Cloudflare, a
147
+ provider of content delivery networks, ranked TikTok as the most
148
+ popular website of 2021, before Google [68]. TikTok is currently
149
+ also gaining in popularity among users below the official age limit
150
+ of 13 years [19]. In Switzerland, three-quarters of all adolescents
151
+ had a TikTok account in 2020 (behind Instagram and Snapchat with
152
+ both over 90%) [6]. Younger adolescents (12-15 years) were even
153
+ more likely to have a TikTok account than older adolescents (16-19
154
+ years). Slightly more girls (78%) used it than boys (68%). 51% of all
155
+ adolescents stated to use it at least multiple times per week, and 38%
156
+ daily [6]. However, little is known about how young users think
157
+ about the data they share on the platform.
158
+ The app has raised numerous severe security and privacy con-
159
+ cerns (e.g., [5, 23, 24, 46, 84]) and caught the attention of the inter-
160
+ national authorities in the U.S. and EU [29, 69, 70]. For example, an
161
+ analysis of the app revealed extensive aggressive user tracking (e.g.,
162
+ including techniques such as fingerprinting) and data sharing with
163
+ other websites (e.g., sharing searches with Facebook) [24]. The app
164
+ could also potentially collect other personal data from the user’s
165
+ smartphone (e.g., data from the clipboard [23]). Since young people
166
+ have always been an important user group of TikTok, concerns
167
+ have been raised about ByteDance’s handling of their personal
168
+ data. For example, in February 2019 ByteDance was fined USD
169
+ 5.7 million by the U.S. Federal Trade Commission (FTC) because
170
+ musical.ly had collected information from minors under the age
171
+ of 13 in violation of the Children’s Online Privacy Protection Act
172
+ [33]. Due to the death of a 10-year-old TikTok user, the Italian data
173
+ protection authority has banned TikTok from processing the data
174
+ of users whose age could not be determined with full certainty [29].
175
+ Also, the transfer of minors’ data to China after the acquisition
176
+ of U.S.-based musical.ly had caused a serious backlash in the US
177
+ and EU [69, 70]. As recent as June 2022, evidence surfaced that
178
+ ByteDance has repeatedly accessed U.S. user data from China –
179
+ a practice that they had denied three years earlier when similar
180
+ criticism was raised [26].
181
+ TikTok has reacted to public criticism with several privacy-
182
+ related updates to the original app. As part of its settlement with
183
+ the FTC, the platform introduced an age-verification process for
184
+ its users based on self-declaration, meaning users can provide a
185
+ false age [48]. Further changes included extended parental control
186
+ features [41] and privacy settings contingent on the app users’ age
187
+ statement [75]. While children below 13 cannot use the app, ado-
188
+ lescents between the ages of 13 and 15 are automatically switched
189
+ to a “private account” as a default option, limiting those who can
190
+ view their videos to approved followers. When 16- and 17-year-old
191
+ users imitate an existing video in the form of a “duet” (split-screen
192
+ video) or “stitch” (video incorporating a short clip of someone else’s
193
+ content), these are automatically restricted to “friends only”. Only
194
+ users who are 18 and older can buy and send virtual gifts. However,
195
+ it is unclear if and how TikTok’s efforts have affected users’ privacy
196
+ management.
197
+ 2.2
198
+ Adolescents’ Privacy Management on
199
+ Social Media
200
+ From the moment adolescents started to use online social network-
201
+ ing sites, “online privacy” has been a major topic of discussion [31].
202
+ Informational privacy can be defined as “the claim of individuals,
203
+ groups or institutions to determine for themselves when, how, and
204
+ to what extent information about them is communicated to others”
205
+ [81]. Research on online privacy and adolescents can be divided
206
+ into two categories: “institutional privacy” and "social privacy"
207
+ [67]. Institutional privacy refers to the data collection practices by
208
+ organizations (e.g., for commercial purposes) [67, 85]. The focus of
209
+ this paper is social privacy, i.e., issues related to sharing personal
210
+ information with others (e.g., friends and family). According to the
211
+ theory of "networked privacy," individuals do not have complete
212
+ control over the sharing of their personal information within social
213
+ connections (e.g., on social media) because privacy is not managed
214
+ by individuals alone, but by networks of individuals collectively
215
+ [58].
216
+ Young people are often seen as particularly vulnerable social
217
+ media users with limited capacities to protect their privacy [15, 58].
218
+ At the same time, they are also portrayed as individuals who put
219
+ themselves and others at risk with their naive and reckless social
220
+ media behavior [18]. Following this logic, numerous guides for
221
+ parents emphasize the importance of modifying privacy settings
222
+ and monitoring their children’s behavior (e.g., [37]). However, there
223
+ has also been a pushback to this alarmist perspective by scholars
224
+ who suggest that adolescents’ online privacy should be addressed
225
+ based on empirical research rather than paternal instinct [83].
226
+ 2
227
+
228
+ Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
229
+ Proceedings on Privacy Enhancing Technologies 2023(2)
230
+ Empirical evidence from social networks other than TikTok (e.g.,
231
+ Facebook) suggests that adolescents are aware of their social privacy
232
+ and actively manage their privacy on social media. As described
233
+ by boyd [9], adolescents want to avoid surveillance from parents,
234
+ teachers, friends and other meaningful persons in their lives (that
235
+ is what “online privacy” means to them). Adolescents’ social media
236
+ use seems to generally prompt increased disclosure of personal
237
+ information [72]. However, frequent sharing of content does not
238
+ imply that adolescents share indiscriminately, nor that the content
239
+ is intended for a wider audience [58]. Indeed, adolescents are con-
240
+ cerned about their privacy and capable of protecting it [1, 8, 17, 53].
241
+ Contrary to conventional wisdom, young people are, in fact, more
242
+ likely to protect their privacy on social media than older people
243
+ [8]. Madden et. al found several strategies adolescents use on social
244
+ media to manage their identity and protect sensitive information
245
+ [57]. These strategies include deleting friends, faking names, delet-
246
+ ing content, withholding/faking information, and changing privacy
247
+ settings [20, 35, 64]. They also employed different “zones of privacy”
248
+ by using different channels for disclosing personal information to
249
+ maintain intimacy with friends while protecting their privacy from
250
+ their parents and strangers [50]. Privacy management can also
251
+ mean modifying social media content to shield it from audiences
252
+ [57, 64]. This practice is referred to as “social steganography” or en-
253
+ coding a message for a defined audience [58]. Adolescents’ privacy
254
+ management is influenced by various factors such as their social
255
+ environment (e.g., friends, parents), prior (negative) experiences as
256
+ well as the saliency of privacy settings [53, 86].
257
+ Despite the existing evidence on adolescents’ social media use
258
+ on other social networks, researchers argue that existing findings
259
+ might not be directly applicable to TikTok [63]. Compared to other
260
+ networks such as Facebook or Instagram, TikTok mainly thrives
261
+ on content exploration and (re)-creation [87]. The focus is not on
262
+ the interaction between users and their social network but the
263
+ interaction with users’ videos proposed by an algorithm [7]. The
264
+ main feature, the “For You” page, presents an endless stream of
265
+ personalized, publicly available videos. Seeing them will motivate
266
+ users to react and create similar content (e.g., through features such
267
+ as “duet” or “stitch”). TikTok might therefore pose a particular threat
268
+ to adolescents’ privacy because a space previously conceptualized
269
+ as private and safe can easily become a space of public visibility,
270
+ surveillance, and judgment (such as in the case of a teenager being
271
+ seen to perform a dance routine in their bedroom) [43].
272
+ Only a few studies have investigated adolescents’ privacy man-
273
+ agement on TikTok. There is some evidence that privacy manage-
274
+ ment on TikTok is considered as crucial by adolescents [16] and
275
+ becomes more stringent at higher perceived risks [40]. However,
276
+ it is unclear how and why adolescents manage their privacy on
277
+ TikTok.
278
+ 2.3
279
+ COM-B Model
280
+ As we were interested in the components that shape privacy be-
281
+ havior, we chose the COM-B model, which has been used in ex-
282
+ ploratory studies (e.g., [32]) and a series of contexts to change
283
+ behavior (e.g., [3]), as the conceptual framework for our analysis.
284
+ Many behavioral theories have been developed, often with overlap-
285
+ ping but differently named constructs [60] and limited guidance on
286
+ Capability
287
+ Motivation
288
+ Opportunity
289
+ Behavior
290
+ Reflective
291
+ Automatic
292
+ Psychological
293
+ Physical
294
+ Social
295
+ Physical
296
+ Environment
297
+ Individual
298
+ Figure 1: The COM-B model [62]. The three components capa-
299
+ bility (C), opportunity (O) and motivation (M) must be present for a
300
+ behavior (B) to occur. They interact over time and form a dynamic
301
+ system with positive and negative feedback loops [80].
302
+ choosing an appropriate theory for a particular, real-world context
303
+ [62]. As a consequence, theories are often under-used to under-
304
+ stand real-world contexts and to design real-world solutions, which
305
+ makes replication, implementation, evaluation, and improvements
306
+ difficult [25, 62]. Researchers have argued that a comprehensive
307
+ meta-model or “supra-theory” model of behavior – like the COM-B
308
+ model – is needed that is applicable across contexts [25, 62]. As a
309
+ meta-model of behavior, the COM-B model does not come with a
310
+ pre-determined set of context-specific predictions that are common
311
+ for many behavioral theories. COM-B is based on several exist-
312
+ ing social cognition models and has a broader understanding of
313
+ behavior, having "also [...] automatic processing at its heart [like
314
+ emotions and habits], broadening the understanding of behaviour
315
+ beyond the more reflective, systematic cognitive processes that
316
+ have been the focus of much behavioural research [...] (for example,
317
+ social cognition models such as the Theory of Planned Behaviour)"
318
+ [62]. Its comprehensive nature and flexibility made it a good fit
319
+ for the exploratory nature of our study that was not constrained
320
+ by the conceptual boundaries of a single theoretical framework.
321
+ Furthermore, the model comes with hands-on actionable advice on
322
+ appropriate interventions in a given context in form of a holistic
323
+ behavior change framework (“Behavior Change Wheel”) (see [62]).
324
+ As illustrated in Figure 1, the COM-B model is based on three
325
+ components – capability (C), opportunity (O), and motivation (M)
326
+ – that shape a person’s behavior (B) [62]. Firstly, capability is a
327
+ subject’s psychological ability (including necessary comprehension,
328
+ knowledge, and skills) as well as the physical ability (e.g., control
329
+ of the body) to engage in a behavior. Secondly, motivation can
330
+ be defined as the subject’s mental processes that energize and di-
331
+ rect behavior. It includes the reflective motivation that involves
332
+ conscious processes (e.g., goals, plans, and evaluations) as well as
333
+ automatic processes (i.e., habitual, instinctive, drive-related, and
334
+ affective processes). Finally, opportunity is defined as an attribute
335
+ of the environmental system (unlike capability and motivation)
336
+ 3
337
+
338
+ Proceedings on Privacy Enhancing Technologies 2023(2)
339
+ Ebert et al.
340
+ that enables or facilitates a behavior. Opportunities can be physical
341
+ (e.g., technical features of an app, material, financial, and time) and
342
+ social (e.g., norms and culture). In this study, we analyzed the par-
343
+ ticipants’ capabilities, opportunities, and motivation to engage in
344
+ privacy behaviors.
345
+ Firstly, capability is a subject’s psychological ability (including
346
+ necessary comprehension, knowledge, and skills) as well as the
347
+ physical ability (e.g., control of the body) to engage in a behavior.
348
+ Secondly, motivation can be defined as the subject’s mental pro-
349
+ cesses that energize and direct behavior. It includes the reflective
350
+ motivation that involves conscious processes (e.g., goals, plans, and
351
+ evaluations) as well as automatic processes (i.e., habitual, instinctive,
352
+ drive-related, and affective processes). Finally, opportunity is de-
353
+ fined as an attribute of the environmental system (unlike capability
354
+ and motivation) that enables or facilitates a behavior. Opportunities
355
+ can be physical (e.g., technical features of an app, material, financial,
356
+ and time) and social (e.g., norms and culture).
357
+ In our exploratory study, we did not focus on identifying inter-
358
+ actions between COM-B components that explain a specific target
359
+ behavior. Rather, our scope was first to learn about the full range
360
+ of behaviors and explanatory factors associated with adolescents’
361
+ privacy management.
362
+ 3
363
+ METHODOLOGY
364
+ 3.1
365
+ Research Ethics
366
+ This paper is based on semi-structured, one-to-one interviews with
367
+ adolescents in the Canton of Zurich, Switzerland, conducted in
368
+ November 2021. In total, we visited two secondary schools (one
369
+ in the city of Zurich and one in the greater Zurich area) and three
370
+ youth centers (all in the city of Zurich). All interviews were audio-
371
+ recorded and transcribed verbatim. Ethical approval was obtained
372
+ from our university’s institutional review board. Study participants
373
+ provided written informed consent. For subjects below the age
374
+ of 16, additional consent was sought from the parents. The in-
375
+ terviews were voluntary and conducted at the institutions from
376
+ which the subjects had been recruited. Digital, personalized shop-
377
+ ping vouchers with a value of CHF 20 (~USD 19) were offered to
378
+ study participants as compensation. The amount and type of the
379
+ vouchers was determined beforehand together with the adolescents’
380
+ supervisors (i.e., teachers, social workers) in order to not create an
381
+ inappropriate but still sufficient incentive. After the interviews, in
382
+ agreement with the participants, WhatsApp was used to deliver
383
+ the individualized vouchers to the participants and to allow them
384
+ to review their personal interview transcripts.
385
+ Several steps were taken to protect the participants identity with-
386
+ out compromising the transparency of our research process. To
387
+ begin with, all personally identifiable information was removed
388
+ (e.g., references to persons, locations) and participants’ names were
389
+ replaced with pseudonyms. Furthermore, the study data was stored
390
+ in line with our university’s storage policy and only the involved re-
391
+ searchers had access to the files. Finally, the original audio files were
392
+ deleted from all devices half a year after recording together with
393
+ other remaining personal data (e.g., phone numbers, WhatsApp
394
+ chats, digital vouchers).
395
+ 3.2
396
+ Sample and Procedure
397
+ Due to the lack of research on this topic, we chose a highly ex-
398
+ ploratory approach. To identify information-rich cases and make
399
+ optimal use of available resources, we drew a purposive sample
400
+ [27]. We used social media and search engines to find institutions
401
+ in the Canton of Zurich (e.g., secondary schools, youth work, youth
402
+ associations, museums) with contact with adolescents between 12
403
+ and 18 years of age. Afterward, principals of participating insti-
404
+ tutions recruited interested teachers and social workers. They, in
405
+ turn, contacted interested TikTok users in the required age group.
406
+ To extend the participant base, we applied snowballing among the
407
+ interested TikTok users. Based on our primary aim (i.e., to explore
408
+ how adolescent TikTok users manage their privacy), we chose to
409
+ sample based on study participants’ age and gender (equally dis-
410
+ tributed). We decided to ignore other demographic information such
411
+ as ethnic identity. Following a pragmatic definition of theoretical
412
+ saturation [55], no new information emerged after approximately
413
+ 40 interviews, and we ended data collection after the 54th interview.
414
+ We chose to employ semi-structured interviews for our study
415
+ because it encourages two-way communication and provides the
416
+ interviewer with the opportunity to learn the reasons behind an
417
+ answer. Some of the questions were part of the interviewer’s guide
418
+ (see Appendix), others were addressed at the moment. The inter-
419
+ view guide was developed based on a previous study that applied
420
+ the COM-B model in a qualitative setting [14] and adopted to the
421
+ context of the current study. After asking for demographic informa-
422
+ tion, we first explored general TikTok usage and motivation. The
423
+ other questions followed the COM-B structure and were related to
424
+ privacy-related behaviors as well as the explanatory components
425
+ related to the target behavior “video creation”. We finished the
426
+ interviews with questions about commercial privacy aspects (i.e.,
427
+ targeted advertising and user tracking). After the interview pro-
428
+ cess was completed, study participants received a copy of their
429
+ interview transcript via WhatsApp and were invited to add infor-
430
+ mation or make amendments. Minimal revisions were made by one
431
+ participant.
432
+ To analyze the content of the interviews, we used a two-step pro-
433
+ cedure that first divided each statement into one of the four COM-B
434
+ components (behavior, capability, opportunity, motivation) before
435
+ further subdividing them into privacy-specific content. For phase
436
+ one, we used a directed content analysis approach [38] to analyze
437
+ the statements. To counter the subjectivity inherent to qualitative
438
+ data analysis, three researchers read and coded all statements into
439
+ the four COM-B domains (behavior, capability, opportunity, motiva-
440
+ tion). On the grounds of economy in both cost and effort, we decided
441
+ against using "intercoder reliability" (ICR). As full replication of
442
+ results was deemed unnecessary due to the exploratory and quali-
443
+ tative nature of data collection and analysis, we instead followed
444
+ guidelines suggesting the use of "multiple coding" which allows
445
+ independent researchers to cross check their coding strategies and
446
+ interpretation of data [2]. The authors engaged in researcher tri-
447
+ angulation [21] by discussing the emerging codes during the open
448
+ coding process of the first three interviews and developed cod-
449
+ ing guidelines. Disagreements were discussed and resolved. Using
450
+ the MAXQDA 2020 software, all responses were coded consistent
451
+ 4
452
+
453
+ Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
454
+ Proceedings on Privacy Enhancing Technologies 2023(2)
455
+ with six COM-B labels1 (behavior, psychological capability, auto-
456
+ matic/reflective motivation, social/physical opportunity). To ensure
457
+ continued adherence to the agreed coding guidelines, the three
458
+ researchers regularly communicated to ensure coding consistency.
459
+ In phase two, all statements – previously labeled as one of the
460
+ COM-B components – were further analyzed for their privacy-
461
+ specific content. Therefore, an inductive thematic analysis [11]
462
+ to identify themes within similarly coded statements was con-
463
+ ducted (see Appendix for coding scheme). One researcher identified
464
+ themes across identically coded statements and discussed them
465
+ with the other researchers. A theme reflects a collection of similar
466
+ responses from at least two different study participants. For exam-
467
+ ple, responses that were coded under the COM-B label “reflective
468
+ motivation” such as “I would be afraid of stupid remarks.”, “I have
469
+ no desire to be bullied.”, and “I can do without being ridiculed in
470
+ my class’s WhatsApp group.” were allocated to the privacy-specific
471
+ theme “negative reaction avoidance”. This step resulted in a list
472
+ of themes within each of the six COM-B labels. Ultimately, the
473
+ researchers reviewed and discussed the emerging themes, merged
474
+ similar themes, and re-labeled others. By playing the “devil’s ad-
475
+ vocate” – a common way to scrutinize identified themes [2] – we
476
+ sought to exploit the full potential of multiple coding to furnish
477
+ alternative interpretations of our findings. The anonymized, coded
478
+ interview transcripts are publicly available at osf.io/z8d3w.
479
+ 4
480
+ RESULTS
481
+ A total of 54 adolescents aged between 12-18 years (15 ± 1.82 years)
482
+ were interviewed, of which half (27) were female (see Table 1).
483
+ Interviews ranged from 5 to 21 minutes in length, with a mean of
484
+ 12.6 min per interview (SD = 3.91). Most users attended secondary
485
+ school, and 80% had used the app for more than one year. Half
486
+ of the study participants admitted using TikTok between one and
487
+ three hours per day.
488
+ Table 1: Characteristics of one-to-one interview participants
489
+ (n = 54)
490
+ Variables
491
+ % (n)
492
+ Gender (% of females)
493
+ 50% (27)
494
+ Age
495
+ 15 ± 1.82
496
+ Educational level
497
+ Primary level
498
+ 2% (1)
499
+ Lower secondary level
500
+ 54% (29)
501
+ Upper secondary level
502
+ 44% (24)
503
+ User since
504
+ One year or less
505
+ 20% (11)
506
+ Between one and two years
507
+ 33% (18)
508
+ More than two years
509
+ 46% (25)
510
+ Current app usage
511
+ Daily >= 3h
512
+ 17% (9)
513
+ Daily >= 1 and <3h
514
+ 50% (27)
515
+ Daily < 1h
516
+ 28% (15)
517
+ Less than daily
518
+ 6% (3)
519
+ 1We did not need to code “physical capability” as the participants did not have physical
520
+ impairments.
521
+ Building on the conceptional framework of the COM-B model,
522
+ we identified 13 themes from the data analysis that described how
523
+ and why adolescents protect their privacy on TikTok (see Table 2).
524
+ These are described in more detail in the following. No weighting
525
+ was associated with the themes in terms of their overall contribu-
526
+ tion.
527
+ 4.1
528
+ Behavior
529
+ 4.1.1
530
+ Proactive privacy. The participants in our study mentioned
531
+ various ways to control the content of their TikToks2 and their
532
+ audience. Publishing content to audiences was described as reflec-
533
+ tive and non-automatic (as opposed to a habitual, non-reflective
534
+ publication of TikToks). This behavior is also referred to as the “ap-
535
+ proach” privacy strategy [58]. For example, regarding the content,
536
+ study participants described what they consider to be too sensitive
537
+ for publication on TikTok and would not publish (e.g., TikToks that
538
+ reveal too much about them). Lima (F, 14) creates public videos
539
+ and has 50 different accounts. She has clear privacy boundaries
540
+ regarding the video content: “I would not post TikToks where you
541
+ can see a lot of myself. I wouldn’t post videos in which I’m drunk.”.
542
+ Another form of restriction is to define who can see which type of
543
+ content on the platform. This includes TikTok users making drafts
544
+ only visible to themselves or blocking selected users from watching
545
+ videos. Bärbel (F, 13) actively tries to keep her parents from seeing
546
+ her videos: “To prevent my parents from seeing my videos, I can
547
+ simply block them.”.
548
+ We identified two subthemes within the proactive privacy theme:
549
+ private creators (19 persons, 35% of the sample) and public creators
550
+ (11 persons, 20%). Private creators create videos only for themselves
551
+ or close friends but do not publish them for a broad audience. A few
552
+ users described the practice of posting videos that are just visible to
553
+ themselves, only to be able to then repost them on “more private”
554
+ social media such as Snapchat or WhatsApp for a selected group
555
+ of people: “I don’t post my videos. I download them, save them
556
+ under photos, then send them on WhatsApp, for example. I only
557
+ use TikTok for editing.” (Amy, F, 17).
558
+ Public creators regularly create videos for their followers or the
559
+ general public. An extreme case is Joy (F, 13), who has used TikTok
560
+ since she was nine years old (when the app was still musical.ly). She
561
+ maintains 50 thematic user accounts with different age settings and
562
+ distinct followings (e.g., some accounts for gaming-related videos
563
+ and others for YouTube reposts). In addition to managing multiple
564
+ accounts, public creator Lima (F, 14) also uses the live feature. It
565
+ is available to users with at least 1,000 followers and allows them
566
+ to create personal live streams and interact with users in real time.
567
+ Lima had to set her age to 16 years to enable the live feature.
568
+ 4.1.2
569
+ Avoidance. Some study participants reported that they do
570
+ not publish videos on TikTok at all to protect their privacy. In the
571
+ literature, this is referred to as the avoidance privacy strategy [58].
572
+ Peter (M, 14), one of 24 study participants (44%) we classified as a
573
+ pure consumer, stated: “I’ve never created a TikTok. I don’t even
574
+ know how to do it.”. Tim (M, 12) published once but decided to
575
+ only watch TikToks afterward: “To try it out, I uploaded something
576
+ 2The term “TikToks” is used synonymously with videos.
577
+ 5
578
+
579
+ Proceedings on Privacy Enhancing Technologies 2023(2)
580
+ Ebert et al.
581
+ Table 2: Identified themes for adolescents’ video privacy management on TikTok based on the COM-B model. Frequency is
582
+ calculated across 54 interviews.
583
+ Theme
584
+ Description
585
+ Frequency
586
+ Behavior
587
+ Proactive privacy
588
+ Publishing videos with control over the content and the audience
589
+ 30
590
+ Avoidance
591
+ Publishing no videos on the platform
592
+ 24
593
+ Capability (Psychological)
594
+ Past privacy incidents
595
+ Previous negative experiences related to privacy on the platform (e.g., lost
596
+ account, accidental publication)
597
+ 15
598
+ Privacy literacy
599
+ Knowledge and skills related to privacy management in the app (e.g., audience
600
+ understanding and configuration)
601
+ 53
602
+ Opportunity (Social)
603
+ Negative feedback
604
+ Negative behavior of others affects privacy management (e.g., observation of
605
+ cyber-bullying)
606
+ 16
607
+ Linkability experience
608
+ Observing that online personas can be linked to the personal sphere affects
609
+ privacy management (e.g., my teacher is on the platform)
610
+ 39
611
+ Restrictive influence
612
+ Restrictive behavior of others affects privacy management (e.g., restrictive
613
+ parental mediation)
614
+ 34
615
+ Opportunity (Physical)
616
+ Platform features
617
+ Privacy-related features of the platform (e.g., audience settings, sharing via
618
+ other social networks)
619
+ 46
620
+ Device features
621
+ Privacy-related features of the device (e.g., screen time limits, deleting videos
622
+ on the smartphone)
623
+ 17
624
+ Motivation (Automatic)
625
+ Negative emotion avoidance
626
+ Avoidance of negative emotions expected as a result of publication (e.g., shame,
627
+ fear)
628
+ 15
629
+ Motivation (Reflective)
630
+ Negative reaction avoidance
631
+ Goal to avoid expected negative consequences of publication
632
+ 10
633
+ Privacy identity
634
+ Privacy as a general value (e.g., also on other platforms)
635
+ 5
636
+ Publicity avoidance
637
+ Goal to avoid expected publicity of publication
638
+ 29
639
+ once, but nothing from me. I thought that was funny. But I prefer
640
+ to watch videos.”
641
+ 4.2
642
+ Capability (Psychological)
643
+ 4.2.1
644
+ Past privacy incidents. This theme refers to a specific form
645
+ of privacy-related knowledge (cp. [60]) gained after experiencing
646
+ potential or actual privacy incidents. Potential privacy incidents
647
+ are perceived as minor threats but may lead to increased privacy
648
+ awareness. “I posted my very first video by accident. It was only
649
+ seen by three people,” reported Yasmina (F, 15). Lima (F, 14), a public
650
+ creator, remembered: “I was half asleep and accidentally posted a
651
+ TikTok. The next morning, I saw that someone had commented
652
+ on the video. But I thought it was funny and not bad at all.” When
653
+ TikTok updated its app and increased the size of the “publish” button
654
+ to lower the threshold for publication, Lima decided to block app
655
+ updates.
656
+ Users have also realized that some of TikTok’s privacy features
657
+ can be easily bypassed. Their awareness of the platform’s weak-
658
+ nesses has contributed to a greater privacy awareness. An example
659
+ is a feature that allows blocking certain users from viewing videos,
660
+ which can be easily bypassed: “If I block people but they still want
661
+ to see my TikToks, they immediately make an extra fake account
662
+ and continue seeing them.” Roswitha (F, 15). However, she found
663
+ a way to manage her privacy: “Since these users have too few fol-
664
+ lowers, I simply block them again or ignore them depending on the
665
+ video.”.
666
+ A more serious subtheme are actual privacy incidents. Bärbel (F,
667
+ 13) had to realize that she was not anonymizing herself sufficiently:
668
+ “I wore a mask on my face in the video, anonymously, so to speak.
669
+ But the people who deal with me every day recognized me by my
670
+ outfit, my room, and my hairstyle and posted the video in the class
671
+ WhatsApp chat.”. Anna (F, 14) reported losing her account and not
672
+ being able to reclaim it through TikTok’s customer support. At the
673
+ same time, other users were still able to watch her videos: “I made
674
+ videos of myself when I was 9 and then lost the account. Now the
675
+ videos are still public, but I can no longer access them.”.
676
+ 4.2.2
677
+ Privacy literacy. Privacy literacy can be defined as a com-
678
+ bination of factual or declarative (’knowing that’) and procedural
679
+ (’knowing how’) knowledge about online privacy [76]. Concern-
680
+ ing the publication of videos on the platform, adolescents need to
681
+ have the knowledge and skills to assess and manage audiences and
682
+ content as needed.
683
+ Respondents mentioned, for example, that the algorithm might
684
+ present a video on TikTok’s center stage: “It depends on how pop-
685
+ ular a video is and only then does it appear on the For You Page.”
686
+ (Bärbel (F, 13)) or that public videos can also be watched without
687
+ 6
688
+
689
+ Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
690
+ Proceedings on Privacy Enhancing Technologies 2023(2)
691
+ having a TikTok account: “From Google or Safari you can type in
692
+ TikTok and view the videos.” (Aron (M, 13)). They also described
693
+ how to find out which of their peers used TikTok: “When you post
694
+ a video, it spreads immediately and then you know who has TikTok
695
+ and who does not. Because so many people have TikTok now, it has
696
+ become weird for me to post TikToks.” (Elsa (F, 14)). Respondents
697
+ also described their audience and content management skills. The
698
+ private creator Bea (F,14) only publishes for a strictly curated list
699
+ of followers and therefore has established an approval process that
700
+ allows her to maintain the desired level of privacy: “I get to know
701
+ new classmates first and only then give them my TikTok account.
702
+ Afterward, they tell me they sent a request and I accept them as
703
+ followers in the app.” (Bea (F, 14)). Furthermore, the adolescents
704
+ interviewed were also able to assess different levels of sensitivity of
705
+ content in terms of their privacy and select an adequate audience
706
+ accordingly: “My buddy and I made 10 TikToks in which we share
707
+ our weekend activities with people. Some have 60,000 views. But
708
+ we think carefully what to make public.” (Alex (M, 18)).
709
+ The adolescents also talked about various app settings needed to
710
+ manage the audience, such as the activation of the private account
711
+ “Switching to the private account takes only two minutes. This is
712
+ not difficult.” (Alexandra (F, 12)) or knowing the publication status
713
+ of a video: “A draft is rendered greyish and blurry. When published,
714
+ it is bright and jumps right out at you.” (Alexander (M, 15)). Some
715
+ adolescents also perform “digital housekeeping” activities by re-
716
+ moving content related to a specific event or as a habit: “As I became
717
+ older, I started to delete old videos.” (Ariane (F, 15)).
718
+ 4.3
719
+ Opportunity (Social)
720
+ 4.3.1
721
+ Negative feedback. Negative feedback refers to expected or
722
+ observed negative feedback from others (such as harsh comments
723
+ to videos). Study participants reported negative reactions on the
724
+ platform (e.g., from strangers or people from the same school) as
725
+ an explanation for their privacy protection behavior. Alexander (M,
726
+ 15) mentioned a general culture of mutual criticism: “Many of the
727
+ famous TikTokers sometimes make mistakes. Afterwards, everyone
728
+ makes fun of them in videos.”. Other respondents mentioned nega-
729
+ tive reactions from their peers that had influenced their behavior:
730
+ “A friend went viral with a video. Then she got yelled at on the
731
+ street. It would annoy me.” (Katja (F, 17)).
732
+ 4.3.2
733
+ Linkability experience. Similar to the perception of negative
734
+ feedback, the realization of how easily online personas can be linked
735
+ to the personal sphere can also lead to more restrictive publication
736
+ behavior. Study participants perceived the platform as a public space
737
+ shared by acquaintances and strangers. However, by recognizing
738
+ people from their school on their “For You” page, study participants
739
+ realized that they, too, could be easily recognized. As Georg (M,
740
+ 15) put it: “There are maybe ten or twenty people in the school
741
+ building who do [public] TikToks regularly. You suddenly realize: I
742
+ know that guy from TikTok. That’s the reason why I don’t publish.”.
743
+ In addition to peers, respondents also described experiences that
744
+ made them understand that acquainted adults in authority positions
745
+ would be able to see their TikTok as well. Sibylle (F, 15) realized
746
+ this: “My music teacher was on TikTok singing a song.”. Therefore,
747
+ Sibylle also does not publish so as not to be recognized by everyone
748
+ on the platform.
749
+ 4.3.3
750
+ Restrictive influence. Restrictive influence refers to others
751
+ (e.g., close friends or parents) perceived to be restrictive or restrict-
752
+ ing study participants’ video creation behavior. Some interviewees
753
+ reported that their friends did not publish on TikTok, which in part
754
+ motivated why they did not publish, either. In mentioning his peers,
755
+ Felix (M, 12) stated: “Most of the people I know don’t upload any-
756
+ thing of themselves where they show their face.”. Another example
757
+ is restrictive mediation by parents or relatives: “My eight-year-old
758
+ cousin accidentally posted a video with my smartphone. His uncle
759
+ saw it on his For You page, so I deleted it.” (Sibylle (F, 15)).
760
+ 4.4
761
+ Opportunity (Physical)
762
+ 4.4.1
763
+ Platform features. Age verification is a key platform feature
764
+ intended to protect the privacy of young users (not limited to cre-
765
+ ating videos) and the subject of much public discussion. In the
766
+ semi-structured interviews, 29 of the interviewed participants were
767
+ also asked what age they provided. Two-thirds admitted that they
768
+ had given a false age when they registered (indicating, e.g., the age
769
+ of their parents). The main motivation for this behavior was to be
770
+ able to use TikTok in general (for those below the age of 13) or all
771
+ its features. Some study participants, like Martin (M, 14), also had
772
+ misconceptions about possible age restrictions: “Because otherwise,
773
+ TikTok won’t let me watch videos.”.
774
+ However, study participants also described how they used TikTok’s
775
+ features for privacy purposes in general. This includes using a nick-
776
+ name instead of their real name, limiting the use of personal infor-
777
+ mation on their profile page, and not linking their TikTok account
778
+ with other social media accounts (e.g., Instagram). While some in-
779
+ terviewees do not use a name at all: “Why should people know my
780
+ name? I have replaced my name and individual letters with an X.”
781
+ (Ali (M, 12)), others actively involve their parents to make use of
782
+ the in-app parental controls that restrict their app access.
783
+ Study participants also reported using various features related to
784
+ audience configuration, such as creating personal drafts, activating
785
+ a private account, deleting videos, or blocking users. Public creators
786
+ sometimes create multiple “privacy-tailored” user accounts with
787
+ specific follower groups for content of special sensitivity. Where the
788
+ features offered by the platform are perceived as too limited or in-
789
+ effective, the adolescents used creative workarounds not originally
790
+ anticipated by the platform provider. For example, it is not easily
791
+ possible to download and share drafts of videos that are not yet
792
+ published. Amy (F, 17), however, described a popular workaround:
793
+ “I post videos on TikTok, but only for me. Afterward, I’m able to
794
+ download them to share them with my friends on WhatsApp.”
795
+ 4.4.2
796
+ Device features. As part of the greater sociotechnical system,
797
+ some devices (e.g., smartphones) offer features that affect user pri-
798
+ vacy. For example, study participants make use of the “digital well-
799
+ being” functionality of their smartphone to limit their screentime:
800
+ “I used TikTok three hours a day because I didn’t know anything
801
+ better to do with myself. Now I’m trying to get a handle on this
802
+ with a screen time limit.” stated Matthias (M, 17). Sandra (F, 14)
803
+ was one of the study participants who used smartphone features to
804
+ share videos more selectively: "You can take a screenshot of drafts
805
+ with an iPhone and then send them via WhatsApp or Snapchat.".
806
+ As mentioned earlier, Lima (F, 14) noticed that the size of the red
807
+ “publish” button grew with each new app update compared to the
808
+ 7
809
+
810
+ Proceedings on Privacy Enhancing Technologies 2023(2)
811
+ Ebert et al.
812
+ grey “save as draft” button. Fearing accidental publication, she by-
813
+ passed this potentially manipulative design pattern (“dark pattern”)
814
+ by using an old version of the app, which her operating system
815
+ allowed her to do: “Therefore, I have blocked the updates for TikTok
816
+ on my cell phone.”.
817
+ 4.5
818
+ Motivation (Automatic)
819
+ 4.5.1
820
+ Negative emotion avoidance. The interviewees describe vari-
821
+ ous negative emotions if they appeared in a video on TikTok. For
822
+ example, they mentioned feelings of discomfort, shame, awkward-
823
+ ness, and annoyance. Milo (M, 12), who does not publish any videos,
824
+ said: “I would be embarrassed to be seen in a video.” Elsa (F, 14)
825
+ reported that her desire to avoid negative emotions had evolved.
826
+ While she had posted videos on musical.ly, she didn’t publish on
827
+ TikTok anymore: “Posting TikToks has become weird for me.”.
828
+ 4.6
829
+ Motivation (Reflective)
830
+ 4.6.1
831
+ Negative reaction avoidance. Another reason for not pub-
832
+ lishing personal content was negative reactions by others to their
833
+ videos such as being bullied in class (e.g., in the WhatsApp class
834
+ chat). Alexander (M, 15), who does not publish any videos, com-
835
+ mented: “You make a mistake, people from school see it, it gets sent
836
+ on, and you get bullied.”. Avoidance can also relate to the negative
837
+ long-term consequences of sharing personal content. As they get
838
+ older, adolescents who are getting ready to join the job market real-
839
+ ize that their activity on TikTok could harm their career prospects.
840
+ “The Internet never forgets and if I eventually look for an appren-
841
+ ticeship, it may be that my future employer sees that. That’s very
842
+ bad for my reputation.” (Lima (F, 14)).
843
+ 4.6.2
844
+ Privacy identity. With privacy identity, we refer to a coher-
845
+ ent set of privacy-related behaviors and personal qualities of an
846
+ individual in a social setting [60]. Some teenagers consider privacy
847
+ as a value in itself and part of their identity. For example, for Yara
848
+ (F, 14), the publication of videos on TikTok is no different from
849
+ any social network activity: “It’s just not my thing. I don’t post in
850
+ general either, not even on Instagram or anything.”. Lena (F, 17)
851
+ explicitly stated that she considers privacy a significant personal
852
+ value: “Privacy is important to me. I keep everything private that
853
+ can be kept private.”.
854
+ 4.6.3
855
+ Publicity avoidance. Another motivation for restricting the
856
+ publication of personal videos on the platform is closely related to
857
+ the linkability experience theme: the desire to not attract public
858
+ attention. Study participants explained that publishing on TikTok
859
+ means being in the public eye: “It’s a big platform, and I don’t
860
+ want people around me to see that I make videos.” (Anna (F,14)).
861
+ While in musical.ly, the public was described as a community of
862
+ people with similar interests and ages, on TikTok, it is perceived
863
+ as a heterogenous, superficial place with different people of all
864
+ ages (including strangers, peers from the same school, teachers,
865
+ extended family members, and parents). Lina (F, 17) described how
866
+ the change in the audience had an impact on her behavior: “At
867
+ musical.ly, there were also strangers, but more my age. But TikTok
868
+ is now worldwide and there are adults everywhere. I don’t have
869
+ to post anything there.”. Her comment shows that the platform is
870
+ now perceived as completely public, whereas it used to be a more
871
+ private community.
872
+ 5
873
+ DISCUSSION
874
+ Our general observation of adolescents’ on TikTok is in line with
875
+ previous research on other social networks [1, 8, 17, 53]: Contrary
876
+ to public perception which portrays the publication of TikToks
877
+ by young people as automatic and unreflective, the adolescents in
878
+ our sample actively engaged in privacy management. They demon-
879
+ strated a strong awareness of the need to manage their online
880
+ identity and social privacy on the platform. However, the interview
881
+ participants were more concerned with protecting their privacy
882
+ from their immediate social environment than with institutional or
883
+ commercial privacy issues. That is, while they were generally aware
884
+ that TikTok used algorithms to tailor video content to their partic-
885
+ ular online behavior, they were more worried about the tangible
886
+ aspects of the algorithm: that a published video could immediately
887
+ appear on a classmate’s account.
888
+ Next, we will discuss the results in more detail following the
889
+ structure of the COM-B model. While many of our findings are
890
+ consistent with themes found in previous research on other social
891
+ media platforms (e.g., Facebook), a few themes and aspects are
892
+ indeed unique and – best to our knowledge – have not yet been
893
+ studied by researchers on TikTok or other platforms. The qualitative
894
+ nature of our data inform the design of very concrete interventions
895
+ on TikTok (Section 5.7).
896
+ 5.1
897
+ Behavior
898
+ In addition to previous research on other social networks [59],
899
+ we were able to identify two very different types of proactive pri-
900
+ vacy behavior: public and private creation. While public creators
901
+ perform privacy management to share videos directly on TikTok,
902
+ private creators merely use the platform to create and edit videos
903
+ to share them on other social networks that they see more appro-
904
+ priate for such content (e.g., Snapchat, WhatsApp). It indicates that
905
+ adolescents have different "imagined audiences" (mental conceptu-
906
+ alization of the people with whom the user is communicating, [49])
907
+ on each social network and curate who sees what by switching
908
+ between networks. A unique finding of our study is that private
909
+ creators essentially reduce TikTok, which was originally conceived
910
+ as a social network, to its extensive audio-visual capabilities and
911
+ share their personal content where social connections already exist
912
+ and a higher degree of perceived control and intimacy exists (e.g.,
913
+ WhatsApp). It is possible that such a practice might also be found
914
+ elsewhere (e.g., Instagram, YouTube). At a time when adolescents’
915
+ increasingly use multiple social media platforms at once, privacy
916
+ perceptions of and management between different platforms has to
917
+ be addressed more comprehensively. That is, privacy management
918
+ can no longer be seen as a single-platform-phenomenon – an obser-
919
+ vation with important research implications. Rather than focusing
920
+ on isolated social networks with their own privacy standards, re-
921
+ searchers should expand their analysis to include a cross-network
922
+ view of privacy management.
923
+ 8
924
+
925
+ Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
926
+ Proceedings on Privacy Enhancing Technologies 2023(2)
927
+ 5.2
928
+ Psychological Capabilities
929
+ Similar to previous studies on other social media platforms [1, 52,
930
+ 53], we found that adolescents possess knowledge and skills on how
931
+ to manage their privacy on TikTok (see "privacy literacy" theme).
932
+ That is, adolescents were not only able to assess the audience of
933
+ videos but also to actively manage the audience and content of
934
+ their TikToks. As previously noted [58], privacy management can
935
+ be very creative. This finding also holds true for TikTok: some
936
+ of our respondents reported using various accounts for different
937
+ audiences, blocking app updates to avoid receiving less privacy-
938
+ friendly versions of the app, and making an effort to detect fake
939
+ users trying to follow them. An interesting observation that can
940
+ potentially inform other research on social privacy management
941
+ in social networks is that adolescents on TikTok do not only use
942
+ the technical features provided by the social network itself. Instead,
943
+ some are also capable of using physical opportunities provided the
944
+ device (e.g., blocking app updates, screen time management). This
945
+ example illustrates how the existence of these generic physical
946
+ opportunities provided by the operating system can influence the
947
+ privacy management capability of young TikTok users to learn
948
+ about additional ways to protect their privacy.
949
+ In line with previous research we found that negative past expe-
950
+ riences affect future privacy management behaviors [53]. Incidents
951
+ can even serve as a learning opportunity [82]. In our sample, partici-
952
+ pants experienced near or actual privacy incidents (e.g., accidentally
953
+ publishing videos, loss of account with personal videos) that led
954
+ them to adapt their privacy management (e.g., immediately deleting
955
+ accidentally published videos, paying more attention to a publi-
956
+ cation in the future). While our data support the hypothesis that
957
+ incidents serve as learning opportunities, it must be said that cer-
958
+ tain very extreme violations of privacy (e.g., persistent bullying or
959
+ stalking) have not been reported in our study. It is unclear how such
960
+ experiences affect privacy behavior in the long run. Nonetheless,
961
+ our findings inform future research by showing that even minor pri-
962
+ vacy incidents without severe consequences can lead to improved
963
+ capabilities.
964
+ 5.3
965
+ Physical Opportunities
966
+ Adolescents in our sample used various features of TikTok and
967
+ the operating system to manage their privacy (themes platform
968
+ features and device features). At the same time, they were aware
969
+ of TikTok’s privacy management limitations (e.g., the ineffective-
970
+ ness of blocking users). Some of the measures TikTok has taken to
971
+ protect the privacy of younger users in response to public criticism
972
+ may not be very effective. Out of 29 study participants with whom
973
+ we discussed the topic, two-thirds used a false age. Many teenagers
974
+ we interviewed have been publishing on TikTok much before the
975
+ legally allowed age of 13. Regardless of the normative standpoint,
976
+ this calls into question TikTok’s fine-grained, age-based privacy
977
+ features. Despite legislative measures such as the Children’s Online
978
+ Privacy Protection Act of 1998, this problem has been described on
979
+ other social networks in the past [51, 54]. Sometimes also parents
980
+ help their underage children to access social networks [10]. Rea-
981
+ sons for using social networks below the specified minimum age
982
+ are diverse (e.g., wanting to stay in touch with classmates, want-
983
+ ing unrestricted access to TikTok’s features) [10]. Consequently,
984
+ technical measures to protect children such as non-public accounts
985
+ or content restrictions are failing [65]. boyd et. al [10] called for
986
+ abandoning ineffective age-based mechanisms. Instead, she advo-
987
+ cates for an honest discussion about children’s use of social media
988
+ and a rethinking of the industry to better incorporate the needs of
989
+ children and parents when developing apps.
990
+ Another issue on social networking sites is account loss [66].
991
+ This issue was also highlighted by several of our respondents who
992
+ reported that they were unable to reclaim a video they had posted
993
+ after losing an account. As a consequence, they were unable to
994
+ revoke their consent from publishing a childhood experiment that
995
+ would now remain online forever. This is particularly problematic
996
+ against the background of increasingly better algorithms for rec-
997
+ ognizing people in images and videos and the resulting linkability
998
+ risk (e.g., Clearview AI [36]). To exercise the "right to be forgotten"
999
+ as embodied in the EU GDPR, for example, the ability to reclaim
1000
+ accounts and delete old videos is essential. It is unclear whether ac-
1001
+ count loss among adolescents is a broader phenomenon or whether
1002
+ other social networks are affected as well.
1003
+ 5.4
1004
+ Social Opportunities
1005
+ Our findings on TikTok support previous research demonstrating
1006
+ that the social environment of teenagers shapes their privacy be-
1007
+ haviors [53]. Other social network users as well as the parents are
1008
+ major agents of socialization [31]. Social norms, which emerge as
1009
+ a response to observed behavior or expected attitudes of friends
1010
+ and parents, influence children’s intention to share personal infor-
1011
+ mation [77]. If friends and parents disapprove of such behavior,
1012
+ children tend to share less. A recent study on TikTok described, that
1013
+ restrictive mediation by parents can also lead to more restrictive
1014
+ disclosure behavior in children [40].
1015
+ In our study, we identified similar social influences on TikTok.
1016
+ Observing strangers being publicly criticized for videos (theme
1017
+ negative feedback) resulted in restrictive publication behavior by
1018
+ the adolescents we interviewed. In line with previous research [77],
1019
+ the restrictive norms and behavior of relatives, parents, and friends
1020
+ were also found to have the potential to affect behavior on TikTok
1021
+ (e.g., not publishing or blocking parents from videos).
1022
+ What makes TikTok stand out from other social networks, is its
1023
+ specific content algorithm based on a granular observation of user
1024
+ preferences [45]. The results of our study indicate that prevalent
1025
+ TikTok usage among peers in combination with the platform’s spe-
1026
+ cific algorithm that immediately displays the published content to
1027
+ cohorts with similar attributes – i.e., peers – may increase the social
1028
+ influence of others on adolescents’ privacy behavior (“linkability
1029
+ experience”). Unlike posting a video under a nickname on YouTube
1030
+ that may never be discovered by peers, adolescents were aware that
1031
+ posting on TikTok was potentially more privacy-invasive. They
1032
+ recognized that their videos could become visible to their personal
1033
+ environment (e.g., in the schoolyard). This experience led to re-
1034
+ stricted publication behavior.
1035
+ 5.5
1036
+ Automatic and Reflective Motivations
1037
+ Adolescents’ motivations for protecting their privacy on TikTok
1038
+ were based on either wanting to avoid publicity, to avoid nega-
1039
+ tive reactions/emotions, or to actively achieve privacy (themes
1040
+ 9
1041
+
1042
+ Proceedings on Privacy Enhancing Technologies 2023(2)
1043
+ Ebert et al.
1044
+ negative reaction avoidance, publicity avoidance). The adolescents
1045
+ interviewed reported wanting to evade the public eye and feared
1046
+ negative feedback (e.g., public criticism). These are themes previ-
1047
+ ously described on other social networks [53]. To avoid a negative
1048
+ emotional outcome (e.g., shame), they refrain from having a too
1049
+ public profile (theme negative emotion avoidance) (see [13] for a
1050
+ similar finding).
1051
+ For some adolescents, privacy was a personal matter beyond
1052
+ TikTok (theme privacy identity). That is, these teenagers were in-
1053
+ trinsically motivated to keep their information private - a finding
1054
+ that stands in contrast with previous research on other social net-
1055
+ works. Research suggests that, on average, adolescents have fewer
1056
+ privacy concerns than young adults [4, 22]. However, our findings
1057
+ indicate that these concerns can vary greatly across adolescents,
1058
+ and some may place great value on their privacy on social media.
1059
+ Even though the theme was mentioned by only a few participants,
1060
+ it underscores that adolescents are not a homogeneous group when
1061
+ it comes to motives for managing privacy on social media. For some
1062
+ participants’ being private is a personal value and their goal is to
1063
+ achieve a coherent privacy behavior on TikTok and beyond.
1064
+ 5.6
1065
+ Methodological Consideration
1066
+ For our study, the COM-B model helped to holistically understand
1067
+ adolescents’ privacy management on TikTok related to the creation
1068
+ of videos. It has a solid theoretical foundation and – according to its
1069
+ authors – can be applied across various contexts. However, much of
1070
+ the research to date has applied the COM-B model to health-related
1071
+ behaviors such as smoking cessation and lowering cardiovascular
1072
+ disease risk [60]. Our study, which showed that the COM-B model is
1073
+ also a suitable analytical framework for studying privacy behavior,
1074
+ provides yet another use case. By demonstrating its relevance to
1075
+ the privacy management of adolescents, we strengthen the model’s
1076
+ extrinsic validity.
1077
+ 5.7
1078
+ Possible Approaches for Privacy
1079
+ Interventions
1080
+ Several of the themes we identified can be used as starting points
1081
+ for the development of privacy interventions. The COM-B model is
1082
+ part of a theory-driven intervention development framework called
1083
+ behavior change wheel (BCW), a synthesis of behavior change
1084
+ frameworks [62]. In the logic of the BCW, interventions are di-
1085
+ rected at desired “target behaviors” (e.g., enabling privacy settings).
1086
+ Building on the interview findings and our observations, Figure 2
1087
+ shows different parties and ideas for potential target behaviors af-
1088
+ fecting adolescents’ video privacy management. It focuses on which
1089
+ behaviors to address and does not answer the question of how to
1090
+ design interventions that address these behaviors (e.g., adequate
1091
+ behavior change techniques [61]).
1092
+ Any intervention schemes to improve the privacy of adoles-
1093
+ cent TikTok users should focus on the behavior of the adolescents
1094
+ themselves. The interviews provide concrete suggestions for be-
1095
+ haviors that adolescents already report that improve their privacy
1096
+ protection. This includes encouraging young users to remove in-
1097
+ appropriate videos from the platform and the use of alternative
1098
+ social media apps (e.g., WhatsApp) to share content (theme: proac-
1099
+ tive privacy). Some of our participants reported regular checks if a
1100
+ video with the status “published” should be set to private. They also
1101
+ removed their old TikToks from the app and their smartphone. Our
1102
+ private creators did seldom publish on TikTok but used alternative
1103
+ apps such as Snapchat or WhatsApp with a perceived higher level
1104
+ of privacy and the ability to automatically delete shared TikToks
1105
+ after being watched by their friends. Another possible target behav-
1106
+ ior derived from our observations is “backing up user credentials”
1107
+ (theme: privacy literacy). Some adolescents in our sample who had
1108
+ already created accounts in musical.ly could not delete published
1109
+ videos because they had forgotten their credentials, and were not
1110
+ able to prove their identity to the TikTok support to retrieve their
1111
+ account. An intervention could mitigate account loss, especially
1112
+ in cases where children have multiple accounts. Finally, teenagers
1113
+ should be made aware of the privacy settings (e.g., the private ac-
1114
+ count) and the potential risks of not correctly setting these (theme:
1115
+ reflective motivation). For example, in our interviews, participants
1116
+ accidentally published a TikTok upon their first usage of the app
1117
+ because they were not aware others would immediately see it.
1118
+ The platform must also play an important role in safeguarding
1119
+ the privacy of children and adolescents. Improving features directly
1120
+ related to privacy such as improved age verification, more effec-
1121
+ tive blocking of users, and facilitating access to lost user accounts
1122
+ are promising approaches (theme: platform features). As described
1123
+ earlier, many adolescents in our sample did not use their real age
1124
+ due to various reasons. For example, they were often unaware that
1125
+ the private account would have been activated by default if they
1126
+ had provided their real age. As a result of providing false infor-
1127
+ mation, the privacy settings were much more lenient and TikTok
1128
+ videos would not only be published to followers but to everybody.
1129
+ Following boyd et. al’s [10] philosophy, one possibility would be
1130
+ to abandon TikTok’s age-based mechanism and incorporate the
1131
+ needs of children and parents when developing the app. For TikTok,
1132
+ this could mean taking a certain level of responsibility for its con-
1133
+ tent and giving kids and parents ways to control what videos are
1134
+ shown (e.g., via a content configuration or a separate app similar
1135
+ to YouTube Kids). Even if the app adhered to the age-based privacy
1136
+ concept, describing the consequences of providing real age (e.g.,
1137
+ better privacy protection) might encourage some youth to provide
1138
+ their real age. Another approach has been lately launched by the
1139
+ twin app Douyin [30]. Douyin introduced an age verification that
1140
+ is not based on self-declaration only but requires – unlike the in-
1141
+ ternational counterpart TikTok - user authentication and imposes
1142
+ restrictions on the permitted daily use for users under 14.
1143
+ Some participants also criticized that they could not effectively
1144
+ block users who they wanted to prevent from seeing their videos.
1145
+ The problem persists because blocked users can immediately "respawn"
1146
+ under a different username. TikTok could prevent this issue with
1147
+ a feature that block all accounts of the same user (similar to Insta-
1148
+ gram [39]). Some study participants also reported feeling “nudged”
1149
+ by the user interface design towards publishing TikTok video for a
1150
+ broad audience. Others described publishing personal TikToks acci-
1151
+ dentally. While nudging teenagers towards better privacy behavior
1152
+ is also controversial [78], presenting them with simple alternatives
1153
+ (such as publishing a TikTok vs saving a local draft) could provide a
1154
+ welcome middle ground. Furthermore, TikTok might also do more
1155
+ to educate its users on how to protect their privacy. This suggestion
1156
+ 10
1157
+
1158
+ Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
1159
+ Proceedings on Privacy Enhancing Technologies 2023(2)
1160
+ TikTok
1161
+ Users
1162
+ Family &
1163
+ Friends
1164
+ Schools
1165
+ & Youth
1166
+ Work
1167
+ Policy-
1168
+ Makers &
1169
+ Privacy
1170
+ Advocates
1171
+ Other
1172
+ Platform
1173
+ Users
1174
+ OS
1175
+ Vendors &
1176
+ Other Apps
1177
+ ByteDance
1178
+ (TikTok
1179
+ Creator)
1180
+ Enable
1181
+ privacy
1182
+ settings
1183
+ Share/remove
1184
+ personal content
1185
+ consciously
1186
+ Backup
1187
+ account
1188
+ credentials
1189
+ Share TikToks
1190
+ using other apps
1191
+ (e.g., Whatsapp)
1192
+ Inform each other
1193
+ about privacy
1194
+ possiblities
1195
+ Do not nudge
1196
+ users towards
1197
+ publication
1198
+ Educate children about long-
1199
+ term privacy risks
1200
+ Improve privacy
1201
+ features (e.g.,
1202
+ reclaiming ‘lost’
1203
+ accounts, age
1204
+ verification)
1205
+ Use TikTok yourself to
1206
+ understand privacy
1207
+ issues
1208
+ Educate students early
1209
+ about longterm
1210
+ privacy risks
1211
+ Support childrens’
1212
+ privacy efforts
1213
+ Provide privacy
1214
+ tutorials
1215
+ Create & enforce
1216
+ privacy laws
1217
+ (e.g., transparency
1218
+ about PII usage,
1219
+ age verification)
1220
+ Housekeeping
1221
+ functionality for
1222
+ TikTok
1223
+ Enforce app
1224
+ privacy in OS
1225
+ Explain business
1226
+ model of TikTok
1227
+ Use TikTok yourself to
1228
+ understand privacy
1229
+ issues
1230
+ Explain business
1231
+ model of TikTok
1232
+ Respect the privacy
1233
+ of others
1234
+ (e.g., norms)
1235
+ Figure 2: Different parties and their potential target behaviors relevant for adolescents’ video privacy management on TikTok
1236
+ is based on our observation that capabilities varied between adoles-
1237
+ cents and TikTok users had begun to create such privacy tutorials.
1238
+ The latter indicates a demand for more support (e.g., via privacy
1239
+ tutorials provided by TikTok).
1240
+ Family, friends, schools, and youth workers can also positively in-
1241
+ fluence the privacy management of adolescents (social opportunity
1242
+ themes). In addition to supporting adolescents’ privacy efforts, their
1243
+ social network could use TikTok themselves to better understand
1244
+ specific privacy issues. In our sample, an uncle of an eight-year-old
1245
+ boy used TikTok himself and warned him about the possibility on
1246
+ TikTok of publishing a video by accident. The social environment
1247
+ can also advise about long-term privacy risks to the children and
1248
+ adolescents of which they might not yet be aware. Among a group
1249
+ of adolescents of the same class, we repeatedly heard the narrative
1250
+ of a classmate being recognized on TikTok despite her wearing
1251
+ a mask. Due to this “risk narrative” the whole class was aware
1252
+ of the potential risks of insufficient anonymization on TikTok. A
1253
+ collection of such tales could be used by teachers in the classroom
1254
+ to illustrate the privacy risk associated with the platform.
1255
+ As users do not only interact with each other when they share
1256
+ videos but also with the platform and its owner company, teenagers
1257
+ should also be made aware of commercial privacy issues. Our data
1258
+ confirmed that adolescents’ primary privacy focus was indeed so-
1259
+ cial. To this end, adolescents would need to understand TikTok’s
1260
+ business model, which heavily relies on their personal data, and
1261
+ the organization behind TikTok.
1262
+ Policymakers and privacy advocates are also relevant actors. Not
1263
+ only do they seek to create privacy laws to protect users but also to
1264
+ enforce these laws through, for example, insisting on effective age
1265
+ verification (theme: platform features). Ideally, these actions are
1266
+ guided by evidence in collaboration with researchers, adolescent
1267
+ users, and parents. For example, our findings indicate that ado-
1268
+ lescents did not know that TikTok had taken additional measures
1269
+ to protect them in 2021 [75]. While privacy legislation demands
1270
+ transparency for data subjects – especially for children – this ex-
1271
+ ample shows that there is room for improvement in terms of the
1272
+ implementation of laws.
1273
+ It should also be mentioned that other TikTok users can influence
1274
+ an adolescent’s privacy behavior (social opportunity themes). Older
1275
+ and more experienced teenagers may have capabilities (e.g., based
1276
+ on their negative experiences) that can benefit younger and less
1277
+ experienced users. One of our participants reported having learned
1278
+ about privacy settings from a video on TikTok. Indeed, some more
1279
+ experienced users have already begun to acts as mentors. This
1280
+ includes the user @seansvv with 1.1 million followers, who stated
1281
+ in his biography “I Read ToS [Terms of Service] So That You Don’t
1282
+ Have To” and regularly posts TikTok videos related to privacy topics
1283
+ [71].
1284
+ Finally, our interviews showed that OS vendors and the vendors
1285
+ of other apps contribute to teenagers’ privacy on TikTok (theme:
1286
+ device features). OS vendors have implemented more and more
1287
+ privacy control mechanisms for their end-users (e.g., granular rights
1288
+ management, location sharing notifications). These methods all
1289
+ work on low-level personal data (e.g., IP address, location, and
1290
+ email address). However, videos shared by adolescents on TikTok
1291
+ that possibly contain more sensitive personal data with higher risks
1292
+ involved are not yet covered by these mechanisms. At times when a
1293
+ user publishes a video accidentally, the OS could warn them in the
1294
+ same way that they are warned when sharing their location with
1295
+ the app. In our sample, participants reported also manually cleaning
1296
+ 11
1297
+
1298
+ Proceedings on Privacy Enhancing Technologies 2023(2)
1299
+ Ebert et al.
1300
+ up their TikToks in the app and on their phones. OS vendors could
1301
+ provide housekeeping functionalities that would simplify removing
1302
+ personal content across different social networks and on the phone.
1303
+ 5.8
1304
+ Limitations and Future Research
1305
+ As with most qualitative research, our sample is small and was not
1306
+ drawn randomly. Therefore, we cannot claim that the results are
1307
+ representative of all young people in the region under consideration,
1308
+ and certainly not of Switzerland as a whole. Further validation
1309
+ with different samples is needed to strengthen the findings (e.g.,
1310
+ including subjects’ socioeconomic status).
1311
+ Choosing interviews as our data collection methodology was use-
1312
+ ful to learn more about the perspectives of adolescents in Switzer-
1313
+ land. Nevertheless, we are aware of the limitations associated with
1314
+ this method. Primarily, we relied on self-reporting rather than be-
1315
+ havioral observations. Self-reports can be biased due to various
1316
+ influences, such as subjects’ desire to portray themselves in a posi-
1317
+ tive light. Future studies might want to gather data from a wider
1318
+ range of sources, such as direct observations of privacy manage-
1319
+ ment behavior (e.g., through TikTok data donations).
1320
+ Based on our findings, future research could develop and system-
1321
+ atically test privacy interventions based on the BCW methodology.
1322
+ A necessary first step would be to identify appropriate target be-
1323
+ haviors with the greatest potential to improve privacy management
1324
+ among adolescents. Our research could be a starting point for select
1325
+ a “promising” target behavior reported by the adolescents (e.g., ac-
1326
+ tivating the private account) to address in a target population (e.g.,
1327
+ pupils of a local school). To identify a baseline for each of the poten-
1328
+ tial behaviors and to select a target behavior among them, further
1329
+ research would be necessary (e.g., in form of a survey among pupils).
1330
+ Furthermore, additional research is required to select appropriate
1331
+ behavior change techniques (e.g., increasing awareness for privacy
1332
+ settings) and evaluate their effectiveness (e.g., with an experiment).
1333
+ Importantly, such research could also control for factors such as
1334
+ socioeconomic status might also be relevant to explain privacy-
1335
+ related behaviors on TikTok [34]. Given that teenagers may have
1336
+ very heterogeneous privacy management capabilities, motivations,
1337
+ and opportunities, depending on their age and experience regarding
1338
+ the platform, interventions need to be tailored to the specific target
1339
+ group. Large-scale intervention studies using the BCW can help to
1340
+ identify effective and evidence-based policies to improve privacy
1341
+ management among young people on social media platforms like
1342
+ TikTok.
1343
+ Our interviews focused on social aspects of adolescents’ privacy
1344
+ management. That is, our interviewees were more concerned with
1345
+ protecting their privacy from their social environment than from
1346
+ the corporations dealing with their data for commercial purposes;
1347
+ see [53]. Yet, TikTok videos are not only shared with other users
1348
+ but also with ByteDance. Even the users we identified as pure
1349
+ consumers who only view but not create content may have privacy
1350
+ issues. As the video and ad algorithms are known for their high
1351
+ level of customization, they make the platform heavily reliant on
1352
+ personal data including detailed user behavior [45]. Both users’
1353
+ active and passive behavior on the app has consequences: The
1354
+ TikTok pixel allows companies to engage in detailed web tracking
1355
+ of TikTok users on websites (e.g., a user who sees the ad on TikTok
1356
+ might buy the product in the online shop) [12]. Further research
1357
+ could investigate if adolescent users are aware of these commercial
1358
+ privacy aspects and how they manage them.
1359
+ ACKNOWLEDGMENTS
1360
+ The research reported in this article was funded by the Digital
1361
+ Future Fund (DFF), which is part of the Digitalization Initiative of
1362
+ the Zurich Higher Education Institutions (DIZH), Switzerland. We
1363
+ would like to thank all adolescents, teachers, and social workers
1364
+ we contacted in conducting our study. We also thank Frank Wieber,
1365
+ Katja Kurz and Manuel Günther for their helpful comments.
1366
+ REFERENCES
1367
+ [1] Claire Balleys and Sami Coll. 2017. Being Publicly Intimate: Teenagers Managing
1368
+ Online Privacy. Media, Culture & Society 39, 6 (2017), 885–901. https://doi.org/
1369
+ 10.1177/0163443716679033
1370
+ [2] Rosaline S Barbour. 2001. Checklists for Improving Rigour in Qualitative Research:
1371
+ A Case of the Tail Wagging the Dog? BMJ: British Medical Journal 322, 7294
1372
+ (2001), 1115–1117.
1373
+ [3] Fiona Barker, Lou Atkins, and Simon de Lusignan. 2016. Applying the COM-B
1374
+ Behaviour Model and Behaviour Change Wheel to Develop an Intervention to
1375
+ Improve Hearing-Aid Use in Adult Auditory Rehabilitation. International Journal
1376
+ of Audiology 55 (2016), S90–S98. Issue sup3. https://doi.org/10.3109/14992027.
1377
+ 2015.1120894
1378
+ [4] Susan B. Barnes. 2006. A Privacy Paradox: Social Networking in the United States.
1379
+ First Monday 11, 9 (2006). https://doi.org/10.5210/fm.v11i9.1394
1380
+ [5] Ronen Bergman, Sheera Frenkel, and Raymond Zhong. 2020. Major TikTok
1381
+ Security Flaws Found.
1382
+ [6] Jael Bernath, Lilian Suter, Gregor Waller, Céline Külling, Isabel Willemse, and
1383
+ Daniel Süss. 2020.
1384
+ JAMES: Jugend, Aktivitäten, Medien–Erhebung Schweiz.
1385
+ Working Paper. Zurich University of Applied Sciences, Winterthur.
1386
+ https:
1387
+ //doi.org/10.21256/zhaw-21175
1388
+ [7] Aparajita Bhandari and Sara Bimo. 2020. Tiktok and the “Algorithmized Self”: A
1389
+ New Model of Online Interaction. AoIR Selected Papers of Internet Research (2020).
1390
+ Issue 2020. https://doi.org/10.5210/spir.v2020i0.11172
1391
+ [8] Grant Blank, Gillian Bolsover, and Elizabeth Dubois. 2014. A New Privacy
1392
+ Paradox: Young People and Privacy on Social Network Sites. In Prepared for the
1393
+ Annual Meeting of the American Sociological Association, Vol. 17. San Francisco.
1394
+ http://dx.doi.org/10.2139/ssrn.2479938
1395
+ [9] danah boyd. 2014. It’s Complicated: The Social Lives of Networked Teens. Yale
1396
+ University Press, New Haven, Connecticut, U.S.
1397
+ [10] danah boyd, Eszter Hargittai, Jason Schultz, and John Palfrey. 2011. Why Parents
1398
+ Help Their Children Lie to Facebook about Age: Unintended Consequences
1399
+ of the ’Children’s Online Privacy Protection Act’. First Monday 16, 11 (2011).
1400
+ https://doi.org/10.5210/fm.v16i11.3850
1401
+ [11] Virginia Braun and Victoria Clarke. 2006. Using Thematic Analysis in Psychology.
1402
+ Qualitative Research in Psychology 3, 2 (2006), 77–101. https://doi.org/10.1191/
1403
+ 1478088706qp063oa
1404
+ [12] ByteDance Ltd. 2022. Install TikTok Pixel.
1405
+ Retrieved 2022-11-02 from https:
1406
+ //www.tiktokforbusinesseurope.com/resources/installing-pixel-ads-manager
1407
+ [13] Moritz Büchi, Noemi Festic, and Michael Latzer. 2022. The Chilling Effects of
1408
+ Digital Dataveillance: A Theoretical Model and an Empirical Research Agenda.
1409
+ Big Data & Society 9, 1 (2022). https://doi.org/10.1177/20539517211065368
1410
+ [14] Oscar Castro, Ineke Vergeer, Jason Bennie, Jonathan Cagas, and Stuart J. H.
1411
+ Biddle. 2021.
1412
+ Using the Behavior Change Wheel to Understand University
1413
+ Students’ Prolonged Sitting Time and Identify Potential Intervention Strate-
1414
+ gies. International Journal of Behavioral Medicine 28, 3 (2021), 360–371. https:
1415
+ //doi.org/10.1007/s12529-020-09926-0
1416
+ [15] Tom De Leyn, Ralf De Wolf, Mariek Vanden Abeele, and Lieven De Marez.
1417
+ 2019. Reframing Current Debates on Young People’s Online Privacy by Tak-
1418
+ ing into Account the Cultural Construction of Youth. In Proceedings of the
1419
+ 10th International Conference on Social Media and Society (SMSociety ’19). As-
1420
+ sociation for Computing Machinery, New York, NY, USA, 174–183.
1421
+ https:
1422
+ //doi.org/10.1145/3328529.3328558
1423
+ [16] Tom De Leyn, Ralf De Wolf, Mariek Vanden Abeele, and Lieven De Marez. 2021.
1424
+ In-between Child’s Play and Teenage Pop Culture: Tweens, TikTok & Privacy.
1425
+ Journal of Youth Studies 0, 0 (2021), 1–18. https://doi.org/10.1080/13676261.2021.
1426
+ 1939286
1427
+ [17] Ralf De Wolf. 2016. Group Privacy Management Strategies and Challenges
1428
+ in Facebook: A Focus Group Study among Flemish Youth Organizations.
1429
+ Cyberpsychology-Journal of Psychosocial Research on Cyberspace 10, 1 (2016).
1430
+ https://doi.org/10.5817/CP2016-1-5
1431
+ 12
1432
+
1433
+ Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
1434
+ Proceedings on Privacy Enhancing Technologies 2023(2)
1435
+ [18] Ralf De Wolf and Stijn Joye. 2019. Control Responsibility : The Discursive
1436
+ Construction of Privacy, Teens, and Facebook in Flemish Newspapers.
1437
+ IN-
1438
+ TERNATIONAL JOURNAL OF COMMUNICATION 13 (2019), 5505–5524. http:
1439
+ //hdl.handle.net/1854/LU-8631357
1440
+ [19] A Demeulenaere, E Boudry, H Vanwynsberghe, and W De Bonte. 2020. Onder-
1441
+ zoeksrapport: De Digitale Leefwereld van Kinderen. Technical Report. Research
1442
+ report: The digital lifeworld of children. Gent: Mediaraven.
1443
+ [20] Vanessa P. Dennen, Stacey A. Rutledge, Lauren M. Bagdy, Jerrica T. Rowlett,
1444
+ Shannon Burnick, and Sarah Joyce. 2017. Context Collapse and Student Social
1445
+ Media Networks: Where Life and High School Collide. In Proceedings of the 8th
1446
+ International Conference on Social Media & Society (#SMSociety17). Association
1447
+ for Computing Machinery, New York, NY, USA, 1–5. https://doi.org/10.1145/
1448
+ 3097286.3097318
1449
+ [21] Norman K Denzin. 2017. Sociological methods: A sourcebook. Routledge, New
1450
+ York, NY, U.S.
1451
+ [22] Amandeep Dhir, Torbjørn Torsheim, Ståle Pallesen, and Cecilie S. Andreassen.
1452
+ 2017. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents,
1453
+ Young Adults and Adults? Frontiers in Psychology 8 (2017), 815. https://doi.org/
1454
+ 10.3389/fpsyg.2017.00815
1455
+ [23] Io Dodds. 2020. How Popular Apps Can Read Your Phone’s Clipboard without
1456
+ Permission.
1457
+ https://www.telegraph.co.uk/technology/2020/03/30/popular-apps-
1458
+ can-read-phones-clipboard-without-permission/
1459
+ [24] Matthias Eberl. 2019. Privacy Analysis of Tiktok’s App and Website.
1460
+ Re-
1461
+ trieved 2022-11-02 from https://rufposten.de/blog/2019/12/05/privacy-analysis-
1462
+ of-tiktoks-app-and-website/
1463
+ [25] Martin P. Eccles, Jeremy M. Grimshaw, Graeme MacLennan, Debbie Bonetti, Liz
1464
+ Glidewell, Nigel B. Pitts, Nick Steen, Ruth Thomas, Anne Walker, and Marie
1465
+ Johnston. 2012. Explaining Clinical Behaviors Using Multiple Theoretical Models.
1466
+ Implementation Science 7, 1 (2012), 99. https://doi.org/10.1186/1748-5908-7-99
1467
+ [26] Emily Baker-White. 2022. Leaked Audio From 80 Internal TikTok Meetings
1468
+ Shows That US User Data Has Been Repeatedly Accessed From China. Retrieved
1469
+ 2022-11-02 from https://www.buzzfeednews.com/article/emilybakerwhite/tiktok-
1470
+ tapes-us-user-data-china-bytedance-access
1471
+ [27] Ilker Etikan, Sulaiman Abubakar Musa, Rukayya Sunusi Alkassim, et al. 2016.
1472
+ Comparison of Convenience Sampling and Purposive Sampling. American journal
1473
+ of theoretical and applied statistics 5, 1 (2016), 1–4.
1474
+ [28] European Court of Human Rights. 2022. Factsheet – Right to the Protection of
1475
+ One’s Image. Retrieved 2022-11-02 from https://www.echr.coe.int/documents/
1476
+ fs{_}own{_}image{_}eng.pdf
1477
+ [29] European Data Protection Board. 2021.
1478
+ Italian DPA Imposes Limita-
1479
+ tion on Processing on TikTok after the Death of a Girl from Palermo
1480
+ | European Data Protection Board.
1481
+ Retrieved 2022-11-02 from
1482
+ https://edpb.europa.eu/news/national-news/2021/italian-dpa-imposes-
1483
+ limitation-processing-tiktok-after-death-girl-palermo{_}pl
1484
+ [30] Coco Feng. 2021. Chinese Version of TikTok Gets 40-Minute Time Limit for Kids
1485
+ under 14. Retrieved 2022-11-02 from https://www.scmp.com/tech/policy/article/
1486
+ 3149397/chinese-version-tiktok-limits-kids-under-14-40-minutes-day-adding-
1487
+ fight
1488
+ [31] Yang Feng and Wenjing Xie. 2014. Teens’ Concern for Privacy When Using Social
1489
+ Networking Sites: An Analysis of Socialization Agents and Relationships with
1490
+ Privacy-Protecting Behaviors. Computers in Human Behavior 33 (2014), 153–162.
1491
+ https://doi.org/10.1016/j.chb.2014.01.009
1492
+ [32] Caragh Flannery, Sheena McHugh, Ann Ebere Anaba, E Clifford, Mairead
1493
+ O’Riordan, Louise C Kenny, Fionnuala M McAuliffe, Patricia M Kearney, and M
1494
+ Byrne. 2018. Enablers and barriers to physical activity in overweight and obese
1495
+ pregnant women: an analysis informed by the theoretical domains framework
1496
+ and COM-B model. BMC pregnancy and childbirth 18, 1 (2018), 1–13.
1497
+ [33] FTC. 2019. Video Social Networking App Musical.Ly Agrees to Settle FTC
1498
+ Allegations That It Violated Children’s Privacy Law.
1499
+ Retrieved 2022-11-
1500
+ 02 from https://www.ftc.gov/news-events/press-releases/2019/02/video-social-
1501
+ networking-app-musically-agrees-settle-ftc
1502
+ [34] Eszter Hargittai. 2010. Digital Na(t)Ives? Variation in Internet Skills and Uses
1503
+ among Members of the “Net Generation”*. Sociological Inquiry 80, 1 (2010),
1504
+ 92–113. https://doi.org/10.1111/j.1475-682X.2009.00317.x
1505
+ [35] Wannes Heirman, Michel Walrave, Anne Vermeulen, Koen Ponnet, Heidi Van-
1506
+ debosch, Joris Van Ouytsel, and Ellen Van Gool. 2016.
1507
+ An Open Book on
1508
+ Facebook? Examining the Interdependence of Adolescents’ Privacy Regula-
1509
+ tion Strategies.
1510
+ Behaviour & Information Technology 35, 9 (2016), 706–719.
1511
+ https://doi.org/10.1080/0144929X.2016.1181210
1512
+ [36] Kashmir Hill. 2020. The Secretive Company That Might End Privacy as We Know
1513
+ It. https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-
1514
+ recognition.html
1515
+ [37] Lisa Hodge. 2020. Parent’s Guide to TikTok - Everything You Need to Know to
1516
+ Keep Your Child Safe. Retrieved 2022-11-02 from https://www.dailyrecord.co.
1517
+ uk/lifestyle/family-kids/parents-guide-tiktok-everything-you-21632471
1518
+ [38] Hsiu-Fang Hsieh and Sarah E Shannon. 2005. Three Approaches to Qualitative
1519
+ Content Analysis. Qualitative health research 15, 9 (2005), 1277–1288.
1520
+ [39] Instagram. 2022. What Happens When I Block Someone on Instagram? Retrieved
1521
+ 2022-11-02 from https://help.instagram.com/447613741984126?locale=en{_}US&
1522
+ cms{_}id=447613741984126&published{_}only=true
1523
+ [40] Hyunjin Kang, Wonsun Shin, and Junru Huang. 2021. Teens’ Privacy Management
1524
+ on Video-Sharing Social Media: The Roles of Perceived Privacy Risk and Parental
1525
+ Mediation. Internet Research 32, 1 (2021).
1526
+ [41] Jacob
1527
+ Kastrenakes.
1528
+ 2020.
1529
+ TikTok
1530
+ Now
1531
+ Lets
1532
+ Parents
1533
+ Make
1534
+ Their
1535
+ Teens’
1536
+ Accounts
1537
+ More
1538
+ Private.
1539
+ Retrieved
1540
+ 2022-11-02
1541
+ from
1542
+ https://www.theverge.com/2020/11/17/21570244/tiktok-parental-controls-
1543
+ family-pairing-private-accounts-search-limits
1544
+ [42] D. Bondy Valdovinos Kaye, Xu Chen, and Jing Zeng. 2021. The Co-Evolution of
1545
+ Two Chinese Mobile Short Video Apps: Parallel Platformization of Douyin and
1546
+ TikTok. Mobile Media & Communication 9, 2 (2021), 229–253. https://doi.org/10.
1547
+ 1177/2050157920952120
1548
+ [43] Melanie Kennedy. 2020. ‘If the Rise of the TikTok Dance and e-Girl Aesthetic
1549
+ Has Taught Us Anything, It’s That Teenage Girls Rule the Internet Right Now’:
1550
+ TikTok Celebrity, Girls and the Coronavirus Crisis. European Journal of Cultural
1551
+ Studies 23, 6 (2020), 1069–1076. https://doi.org/10.1177/1367549420945341
1552
+ [44] M. Laeeq Khan. 2017. Social Media Engagement: What Motivates User Participa-
1553
+ tion and Consumption on YouTube? Computers in Human Behavior 66 (2017),
1554
+ 236–247. https://doi.org/10.1016/j.chb.2016.09.024
1555
+ [45] Daniel Klug, Yiluo Qin, Morgan Evans, and Geoff Kaufman. 2021. Trick and Please.
1556
+ A Mixed-Method Study On User Assumptions About the TikTok Algorithm. In
1557
+ 13th ACM Web Science Conference 2021 (WebSci ’21). Association for Computing
1558
+ Machinery, New York, NY, USA, 84–92. https://doi.org/10.1145/3447535.3462512
1559
+ [46] Felix Krause. 2022. iOS Privacy: Announcing InAppBrowser.Com - See What
1560
+ JavaScript Commands Get Injected through an in-App Browser.
1561
+ Retrieved
1562
+ 2022-11-02 from https://krausefx.com/blog/announcing-inappbrowsercom-see-
1563
+ what-javascript-commands-get-executed-in-an-in-app-browser
1564
+ [47] Dami Lee. 2018. The Popular Musical.Ly App Has Been Rebranded as TikTok. Re-
1565
+ trieved 2022-11-02 from https://www.theverge.com/2018/8/2/17644260/musically-
1566
+ rebrand-tiktok-bytedance-douyin
1567
+ [48] Dami Lee. 2019. TikTok Stops Young Users from Uploading Videos after FTC
1568
+ Settlement. Retrieved 2022-11-02 from https://www.theverge.com/2019/2/27/
1569
+ 18243510/tiktok-age-young-user-videos-ftc-settlement-13-childrens-privacy-
1570
+ law
1571
+ [49] Eden Litt. 2012. Knock, Knock. Who’s There? The Imagined Audience. Journal
1572
+ of Broadcasting & Electronic Media 56, 3 (2012), 330–345. https://doi.org/10.1080/
1573
+ 08838151.2012.705195
1574
+ [50] Sonia Livingstone. 2008. Taking risky opportunities in youthful content creation:
1575
+ teenagers’ use of social networking sites for intimacy, privacy and self-expression.
1576
+ New media & society 10, 3 (2008), 393–411.
1577
+ [51] Sonia Livingstone, Leslie Haddon, Anke Görzig, and Kjartan Ólafsson. 2011. Risks
1578
+ and Safety on the Internet: The Perspective of European Children. Technical Report.
1579
+ LSE, London.
1580
+ [52] Sonia Livingstone and Ellen Helsper. 2010. Balancing Opportunities and Risks
1581
+ in Teenagers’ Use of the Internet: The Role of Online Skills and Internet Self-
1582
+ Efficacy. New Media & Society 12, 2 (2010), 309–329. https://doi.org/10.1177/
1583
+ 1461444809342697
1584
+ [53] Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2019. Children’s Data
1585
+ and Privacy Online: Growing up in a Digital Age: An Evidence Review. Technical
1586
+ Report. London School of Economics and Political Science, Department of Media
1587
+ and Communications, London, UK. http://www.lse.ac.uk/my-privacy-uk
1588
+ [54] Sonia Livingstone, Kjartan Ólafsson, and Elisabeth Staksrud. 2011. Social Net-
1589
+ working, Age and Privacy. Technical Report. LSE, London.
1590
+ [55] Jacqueline Low. 2019. A Pragmatic Definition of the Concept of Theoretical
1591
+ Saturation. Sociological Focus 52, 2 (2019), 131–139.
1592
+ https://doi.org/10.1080/
1593
+ 00380237.2018.1544514
1594
+ [56] ByteDance Ltd. 2022. Creating Videos | TikTok Help Center. Retrieved 2022-11-02
1595
+ from https://support.tiktok.com/en/using-tiktok/creating-videos
1596
+ [57] Mary Madden, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan,
1597
+ Aaron Smith, and Meredith Beaton. 2013. Teens, Social Media, and Privacy. Pew
1598
+ Research Center 21, 1055 (2013), 2–86.
1599
+ [58] Alice E Marwick and danah boyd. 2014. Networked Privacy: How Teenagers
1600
+ Negotiate Context in Social Media. New Media & Society 16, 7 (2014), 1051–1067.
1601
+ https://doi.org/10.1177/1461444814543995
1602
+ [59] Alice E. Marwick, Diego Murgia-Diaz, and John G. Palfrey. 2010. Youth, Privacy
1603
+ and Reputation (Literature Review). SSRN Scholarly Paper ID 1588163. Social
1604
+ Science Research Network, Rochester, NY. https://papers.ssrn.com/abstract=
1605
+ 1588163
1606
+ [60] Susan Michie, Lou Atkins, and Robert West. 2014-05. The Behaviour Change
1607
+ Wheel: A Guide to Designing Interventions. Silverback Publishing, Sutton, U.K.
1608
+ [61] Susan Michie, Michelle Richardson, Marie Johnston, Charles Abraham, Jill Francis,
1609
+ Wendy Hardeman, Martin P. Eccles, James Cane, and Caroline E. Wood. 2013.
1610
+ The Behavior Change Technique Taxonomy (v1) of 93 Hierarchically Clustered
1611
+ Techniques: Building an International Consensus for the Reporting of Behavior
1612
+ Change Interventions. Annals of Behavioral Medicine 46, 1 (2013), 81–95. https:
1613
+ 13
1614
+
1615
+ Proceedings on Privacy Enhancing Technologies 2023(2)
1616
+ Ebert et al.
1617
+ //doi.org/10.1007/s12160-013-9486-6
1618
+ [62] Susan Michie, Maartje M. van Stralen, and Robert West. 2011. The Behaviour
1619
+ Change Wheel: A New Method for Characterising and Designing Behaviour
1620
+ Change Interventions. Implementation Science 6, 1 (2011), 42. https://doi.org/10.
1621
+ 1186/1748-5908-6-42
1622
+ [63] Christian Montag, Haibo Yang, and Jon D. Elhai. 2021. On the Psychology of
1623
+ TikTok Use: A First Glimpse From Empirical Findings. Frontiers in Public Health
1624
+ 9 (2021).
1625
+ [64] Caron Mullen and Nicola Fox Hamilton. 2016. Adolescents’ Response to Parental
1626
+ Facebook Friend Requests: The Comparative Influence of Privacy Management,
1627
+ Parent-Child Relational Quality, Attitude and Peer Influence. Computers in
1628
+ Human Behavior 60 (2016), 165–172. https://doi.org/10.1016/j.chb.2016.02.026
1629
+ [65] Brian O’Neill. 2013. Who Cares? Practical Ethics and the Problem of Underage
1630
+ Users on Social Networking Sites. Ethics and Information Technology 15, 4 (2013),
1631
+ 253–262. https://doi.org/10.1007/s10676-013-9331-4
1632
+ [66] Shailendra Rathore, Pradip Kumar Sharma, Vincenzo Loia, Young-Sik Jeong, and
1633
+ Jong Hyuk Park. 2017. Social Network Security: Issues, Challenges, Threats, and
1634
+ Solutions. Information Sciences 421 (2017), 43–69. https://doi.org/10.1016/j.ins.
1635
+ 2017.08.063
1636
+ [67] Kate Raynes-Goldie. 2010. Aliases, Creeping, and Wall Cleaning: Understanding
1637
+ Privacy in the Age of Facebook. First Monday 15, 1 (2010). https://doi.org/10.
1638
+ 5210/fm.v15i1.2775
1639
+ [68] Kalhan Rosenblatt. 2022.
1640
+ TikTok Surpasses Google as Most Popu-
1641
+ lar Website of the Year, New Data Suggests.
1642
+ Retrieved 2022-11-
1643
+ 02 from https://www.nbcnews.com/tech/tech-news/tiktok-surpasses-google-
1644
+ popular-website-year-new-data-suggests-rcna9648
1645
+ [69] Greg Roumeliotis, Yingzhi Yang, Echo Wang, and Alexandra Alper. 2019. Ex-
1646
+ clusive: U.S. Opens National Security Investigation into TikTok - Sources.
1647
+ Retrieved 2022-11-02 from https://www.reuters.com/article/us-tiktok-cfius-
1648
+ exclusive-idUSKBN1XB4IL
1649
+ [70] Fergus Ryan, Audrey Fritz, and Daria Impiombato. 2020. TikTok Privacy Concerns
1650
+ and Data Collection. Technical Report. Australian Strategic Policy Institute. 36–42
1651
+ pages. jstor:resrep26120.7
1652
+ [71] SEAN [They/Them] (@seansvv). 2022. TikTok.
1653
+ Retrieved 2022-11-02 from
1654
+ https://www.tiktok.com/@seansvv
1655
+ [72] Wonsun Shin and Hyunjin Kang. 2016. Adolescents’ Privacy Concerns and
1656
+ Information Disclosure Online: The Role of Parents and the Internet. Computers
1657
+ in Human Behavior 54 (2016), 114–123. https://doi.org/10.1016/j.chb.2015.07.062
1658
+ [73] Statista. 2021. TikTok Annual Installs 2021. Retrieved 2022-11-02 from https:
1659
+ //www.statista.com/statistics/1089420/tiktok-annual-first-time-installs/
1660
+ [74] Statista. 2021. U.S. TikTok Users by Age 2021.
1661
+ Retrieved 2022-11-02 from
1662
+ https://www.statista.com/statistics/1095186/tiktok-us-users-age/
1663
+ [75] Terri Peters. 2021. How TikTok’s New Kids’ Privacy Settings Will Change the Way
1664
+ They Use It. Retrieved 2022-11-02 from https://www.today.com/parents/tiktok-
1665
+ changes-privacy-settings-kids-under-18-t205733
1666
+ [76] Sabine Trepte, Doris Teutsch, Philipp K. Masur, Carolin Eicher, Mona Fischer,
1667
+ Alisa Hennhöfer, and Fabienne Lind. 2015. Do People Know About Privacy
1668
+ and Data Protection Strategies? Towards the “Online Privacy Literacy Scale”
1669
+ (OPLIS). In Reforming European Data Protection Law, Serge Gutwirth, Ronald
1670
+ Leenes, and Paul de Hert (Eds.). Springer Netherlands, Dordrecht, 333–365. https:
1671
+ //doi.org/10.1007/978-94-017-9385-8{_}14
1672
+ [77] Ellen Van Gool, Joris Van Ouytsel, Koen Ponnet, and Michel Walrave. 2015. To
1673
+ Share or Not to Share? Adolescents’ Self-Disclosure about Peer Relationships on
1674
+ Facebook: An Application of the Prototype Willingness Model. Computers in
1675
+ Human Behavior 44 (2015), 230–239. https://doi.org/10.1016/j.chb.2014.11.036
1676
+ [78] Mariana Veretilnykova and Leyla Dogruel. 2021. Nudging Children and Adoles-
1677
+ cents toward Online Privacy: An Ethical Perspective. Journal of Media Ethics 36,
1678
+ 3 (2021), 128–140. https://doi.org/10.1080/23736992.2021.1939031
1679
+ [79] Echo Wang. 2021. TikTok Hits 1 Billion Monthly Active Users Globally - Com-
1680
+ pany.
1681
+ https://www.reuters.com/technology/tiktok-hits-1-billion-monthly-
1682
+ active-users-globally-company-2021-09-27/
1683
+ [80] Robert West and Susan Michie. 2020. A Brief Introduction to the COM-B Model
1684
+ of Behaviour and the PRIME Theory of Motivation [V1]. Retrieved 2022-11-02
1685
+ from https://www.qeios.com/read/WW04E6
1686
+ [81] Alan F Westin. 1967. Privacy and Freedom. Vol. 7. Athenum, New York.
1687
+ [82] Pamela Wisniewski. 2018-03. The Privacy Paradox of Adolescent Online Safety:
1688
+ A Matter of Risk Prevention or Risk Resilience? IEEE Security Privacy 16, 2
1689
+ (2018-03), 86–90. https://doi.org/10.1109/MSP.2018.1870874
1690
+ [83] Pamela J. Wisniewski, Jessica Vitak, and Heidi Hartikainen. 2022. Privacy in
1691
+ Adolescence. In Modern Socio-Technical Perspectives on Privacy, Bart P. Knij-
1692
+ nenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas
1693
+ Proferes, and Jennifer Romano (Eds.). Springer International Publishing, Cham,
1694
+ 315–336. https://doi.org/10.1007/978-3-030-82786-1{_}14
1695
+ [84] Queenie Wong. 2019. TikTok Accused of Secretly Gathering User Data and Send-
1696
+ ing It to China. Retrieved 2022-11-02 from https://www.cnet.com/news/privacy/
1697
+ tiktok-accused-of-secretly-gathering-user-data-and-sending-it-to-china/
1698
+ [85] Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy Protection Strategies
1699
+ on Facebook. Information, Communication & Society 16, 4 (2013), 479–500. https:
1700
+ //doi.org/10.1080/1369118X.2013.777757
1701
+ [86] Brahim Zarouali, Karolien Poels, Koen Ponnet, and Michel Walrave. 2018. “Ev-
1702
+ erything under Control?”: Privacy Control Salience Influences Both Critical
1703
+ Processing and Perceived Persuasiveness of Targeted Advertising among Ado-
1704
+ lescents. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 12, 1
1705
+ (2018). https://doi.org/10.5817/CP2018-1-5
1706
+ [87] Diana Zulli and David James Zulli. 2020. Extending the Internet Meme: Concep-
1707
+ tualizing Technological Mimesis and Imitation Publics on the TikTok Platform.
1708
+ New Media & Society 24, 8 (2020). https://doi.org/10.1177/1461444820983603
1709
+ A
1710
+ APPENDIX
1711
+ A.1
1712
+ Interview Guide (translated from German)
1713
+ (1) What’s your first name? How old are you? In what grade
1714
+ are you?
1715
+ (2) How often do you use TikTok? How long have you been
1716
+ using TikTok? When did you start to use TikTok?
1717
+ (3) Do you remember how old you were when you started using
1718
+ the app?
1719
+ (4) How many people do you follow? How many followers do
1720
+ you have?
1721
+ (5) Do you share videos? How many? What types of videos?
1722
+ (Behavior)
1723
+ (a) Why do you/don’t you share videos? (Motivation)
1724
+ (b) If yes: How do you share videos on TikTok? (Psychological
1725
+ capability)
1726
+ (6) Who can see your videos when they are shared? (Psycholog-
1727
+ ical capability)
1728
+ (7) How can you influence who can see your videos? (Psycho-
1729
+ logical capability)
1730
+ (8) Do you restrict who can see your videos? (Behavior)
1731
+ (a) If yes: Why / When do you restrict your videos? (Motiva-
1732
+ tion)
1733
+ (b) If no: Why? Have you ever considered restricting your
1734
+ videos? (Motivation)
1735
+ (9) Do your friends or others restrict their/your videos? (Social
1736
+ Opportunity)
1737
+ (10) Have you ever accidentally posted a video? If yes: What did
1738
+ you do? (Psychological capability)
1739
+ (11) What do you think about TikTok’s features to share/restrict
1740
+ videos? (Physical opportunity)
1741
+ A.2
1742
+ Coding Scheme
1743
+ Table 3 shows the hierarchical coding scheme together with the
1744
+ frequency of each code calculated across the 54 interviews.
1745
+ 14
1746
+
1747
+ Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
1748
+ Proceedings on Privacy Enhancing Technologies 2023(2)
1749
+ Table 3: Coding Scheme (translated from German). Frequency is calculated across 54 interviews.
1750
+ Code
1751
+ Description
1752
+ Frequency
1753
+ Usage_since
1754
+ Start of TikTok usage
1755
+ 54
1756
+ Usage_frequency
1757
+ Frequency of TikTok usage
1758
+ 53
1759
+ App_age
1760
+ Age entered into the app at first use
1761
+ 29
1762
+ Video_Behavior
1763
+ Avoidance
1764
+ I normally do not create/publish TikToks.
1765
+ 24
1766
+ Proactive
1767
+ PersonalCreator
1768
+ I regularly create/publish TikToks for myself and close friends.
1769
+ 19
1770
+ PublicCreator
1771
+ I regularly create/publish TikToks for my followers/the public.
1772
+ 11
1773
+ Video_PsyCapability
1774
+ PastPrivacyIncidents
1775
+ Minor
1776
+ I have perceived a potential/minor privacy incident.
1777
+ 9
1778
+ Severe
1779
+ I have perceived a severe privacy incident.
1780
+ 8
1781
+ PrivacyLiteracy
1782
+ AudienceContentLiteracy
1783
+ I’m aware of different audience/content types and have the ability to manage
1784
+ them.
1785
+ 52
1786
+ TechnicalLiteracy
1787
+ I have the technical knowledge and skills to manage my audience.
1788
+ 50
1789
+ Video_SocOpportunity
1790
+ NegativeFeedback
1791
+ Others show negative reactions to TikToks, that’s why I’m not active.
1792
+ 16
1793
+ LinkabilityExperience
1794
+ Users can be easily recognized in real life.
1795
+ 39
1796
+ RestrictiveInfluence
1797
+ I’m not active because others are also restrictive or enforce my privacy.
1798
+ 34
1799
+ Video_PhyOpportunity
1800
+ PlatformFeatures
1801
+ TikTok helps to ensure my privacy.
1802
+ 46
1803
+ DeviceFeatures
1804
+ The device helps to ensure my privacy.
1805
+ 17
1806
+ Video_AutMotivation
1807
+ NegativeEmotionAvoidance
1808
+ I don’t publish content to avoid negative emotions.
1809
+ 15
1810
+ Video_RefMotivation
1811
+ NegativeReactionAvoidance
1812
+ I don’t publish content to avoid negative reactions.
1813
+ 10
1814
+ PrivacyIdentity
1815
+ I don’t publish content because privacy is important to me.
1816
+ 5
1817
+ PublicityAvoidance
1818
+ I don’t publish content because I don’t want to be in the public eye.
1819
+ 29
1820
+ 15
1821
+
-dFJT4oBgHgl3EQfpiwj/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -8076,3 +8076,57 @@ WtE1T4oBgHgl3EQfJAP_/content/2301.02948v1.pdf filter=lfs diff=lfs merge=lfs -tex
8076
  adE1T4oBgHgl3EQfwwXB/content/2301.03415v1.pdf filter=lfs diff=lfs merge=lfs -text
8077
  qNAyT4oBgHgl3EQfzfnr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8078
  UdE1T4oBgHgl3EQfuwU5/content/2301.03391v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8076
  adE1T4oBgHgl3EQfwwXB/content/2301.03415v1.pdf filter=lfs diff=lfs merge=lfs -text
8077
  qNAyT4oBgHgl3EQfzfnr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8078
  UdE1T4oBgHgl3EQfuwU5/content/2301.03391v1.pdf filter=lfs diff=lfs merge=lfs -text
8079
+ GtFAT4oBgHgl3EQftR52/content/2301.08663v1.pdf filter=lfs diff=lfs merge=lfs -text
8080
+ GdFIT4oBgHgl3EQfWysJ/content/2301.11240v1.pdf filter=lfs diff=lfs merge=lfs -text
8081
+ fdE_T4oBgHgl3EQf2RwE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8082
+ e9E1T4oBgHgl3EQfegRi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8083
+ INE3T4oBgHgl3EQfugsS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8084
+ w9FQT4oBgHgl3EQfwTaN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8085
+ 49FAT4oBgHgl3EQfmR1P/content/2301.08622v1.pdf filter=lfs diff=lfs merge=lfs -text
8086
+ lNFAT4oBgHgl3EQfbh0y/content/2301.08558v1.pdf filter=lfs diff=lfs merge=lfs -text
8087
+ htAyT4oBgHgl3EQfkPhd/content/2301.00429v1.pdf filter=lfs diff=lfs merge=lfs -text
8088
+ qNAyT4oBgHgl3EQfzfnr/content/2301.00704v1.pdf filter=lfs diff=lfs merge=lfs -text
8089
+ _tE2T4oBgHgl3EQfmwdA/content/2301.04001v1.pdf filter=lfs diff=lfs merge=lfs -text
8090
+ VtAzT4oBgHgl3EQfYPxj/content/2301.01331v1.pdf filter=lfs diff=lfs merge=lfs -text
8091
+ 49FAT4oBgHgl3EQfmR1P/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8092
+ yNE0T4oBgHgl3EQftQGw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8093
+ A9E2T4oBgHgl3EQfRQfr/content/2301.03780v1.pdf filter=lfs diff=lfs merge=lfs -text
8094
+ xNAyT4oBgHgl3EQfOvYK/content/2301.00009v1.pdf filter=lfs diff=lfs merge=lfs -text
8095
+ 2tE0T4oBgHgl3EQfdwDZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8096
+ 6tFKT4oBgHgl3EQf_i4o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8097
+ ltFQT4oBgHgl3EQfoDYc/content/2301.13371v1.pdf filter=lfs diff=lfs merge=lfs -text
8098
+ E9FLT4oBgHgl3EQfFi_K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8099
+ VtAzT4oBgHgl3EQfYPxj/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8100
+ 2tE0T4oBgHgl3EQfdwDZ/content/2301.02382v1.pdf filter=lfs diff=lfs merge=lfs -text
8101
+ qNE5T4oBgHgl3EQflA99/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8102
+ UNAyT4oBgHgl3EQf8fqv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8103
+ CtAzT4oBgHgl3EQfiP1R/content/2301.01496v1.pdf filter=lfs diff=lfs merge=lfs -text
8104
+ Q9E4T4oBgHgl3EQfKgxv/content/2301.04930v1.pdf filter=lfs diff=lfs merge=lfs -text
8105
+ zNFJT4oBgHgl3EQfiixS/content/2301.11570v1.pdf filter=lfs diff=lfs merge=lfs -text
8106
+ CNE4T4oBgHgl3EQf5g54/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8107
+ nNE0T4oBgHgl3EQfZQD4/content/2301.02320v1.pdf filter=lfs diff=lfs merge=lfs -text
8108
+ MNE3T4oBgHgl3EQfBAmd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8109
+ stAzT4oBgHgl3EQfBPrw/content/2301.00941v1.pdf filter=lfs diff=lfs merge=lfs -text
8110
+ 19AzT4oBgHgl3EQf8_5O/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8111
+ 6tFKT4oBgHgl3EQf_i4o/content/2301.11962v1.pdf filter=lfs diff=lfs merge=lfs -text
8112
+ A9E2T4oBgHgl3EQfRQfr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8113
+ 29FIT4oBgHgl3EQf5SvC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8114
+ htAyT4oBgHgl3EQfkPhd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8115
+ zNFJT4oBgHgl3EQfiixS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8116
+ ZtA0T4oBgHgl3EQfF_9p/content/2301.02040v1.pdf filter=lfs diff=lfs merge=lfs -text
8117
+ VtE2T4oBgHgl3EQfXwe7/content/2301.03848v1.pdf filter=lfs diff=lfs merge=lfs -text
8118
+ kdAzT4oBgHgl3EQfpv0l/content/2301.01616v1.pdf filter=lfs diff=lfs merge=lfs -text
8119
+ nNE0T4oBgHgl3EQfZQD4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8120
+ KtE0T4oBgHgl3EQfzgKz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8121
+ KtE0T4oBgHgl3EQfzgKz/content/2301.02674v1.pdf filter=lfs diff=lfs merge=lfs -text
8122
+ QtAyT4oBgHgl3EQf7vqM/content/2301.00844v1.pdf filter=lfs diff=lfs merge=lfs -text
8123
+ adE1T4oBgHgl3EQfwwXB/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8124
+ CNE4T4oBgHgl3EQf5g54/content/2301.05324v1.pdf filter=lfs diff=lfs merge=lfs -text
8125
+ 29E4T4oBgHgl3EQf0A2b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8126
+ stAzT4oBgHgl3EQfBPrw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8127
+ GtFAT4oBgHgl3EQftR52/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8128
+ e9AzT4oBgHgl3EQf3v7A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8129
+ jNAzT4oBgHgl3EQf4_5S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8130
+ d9E0T4oBgHgl3EQfoQG6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8131
+ ftFKT4oBgHgl3EQfsy6o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8132
+ 0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d4c5100ec230a938dfaf187e8a88d0f092a5896255cb89576935267cd2519d7c
3
+ size 262189
0dAzT4oBgHgl3EQftv1g/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:34fe2ea1707072e38a9dfa2dbf7422704be0f631f6ab92222b2e7bf811bf1abf
3
+ size 12821
19AyT4oBgHgl3EQfofjr/content/tmp_files/2301.00510v1.pdf.txt ADDED
@@ -0,0 +1,1599 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
2
+ JOHN R. DOYLE AND DAVID KRUMM
3
+ Abstract. Among all the dynamical modular curves associated to quadratic polynomial
4
+ maps, we determine which curves have infinitely many quadratic points.
5
+ This yields a
6
+ classification statement on preperiodic points for quadratic polynomials over quadratic fields,
7
+ extending previous work of Poonen, Faber, and the authors.
8
+ 1. Introduction
9
+ Let K be a field with algebraic closure K, and let f be a rational function in one variable
10
+ over K. Corresponding to f there are a morphism of algebraic varieties P1
11
+ K → P1
12
+ K and a
13
+ map on point sets P1(K) → P1(K), both of which we also denote by f. A point P ∈ P1(K)
14
+ is called periodic for f if there exists a positive integer n such that f n(P) = P, where f n
15
+ denotes the n-fold composition of f with itself; in that case, the smallest such n is called
16
+ the (exact) period of P. More generally, the point P is preperiodic for f if there exists
17
+ m ≥ 0 such that f m(P) is periodic; the smallest such m is then called the preperiod of P,
18
+ and we call the period of f m(P) the eventual period of P. Here, f 0 is interpreted as the
19
+ identity map, so that periodic points are considered preperiodic.
20
+ For any intermediate field K ⊆ L ⊆ K we define a directed graph G(f, L), called the
21
+ preperiodic portrait of f over L, whose vertices are the points P ∈ P1(L) that are
22
+ preperiodic for f, and whose directed edges are the ordered pairs (P, f(P)) for all vertices
23
+ P. In the terminology of graph theory, G(f, L) is a functional graph, i.e., a directed graph in
24
+ which every vertex has out-degree 1. Throughout this paper we will use the term portrait
25
+ instead of functional graph in order to emphasize our dynamical perspective.
26
+ 1.1. Portraits for quadratic maps. Assume henceforth that K is a number field. We will
27
+ primarily, though not exclusively, be interested in the case where K is a quadratic extension
28
+ of Q; we refer to such fields simply as quadratic fields. A type of problem that has received
29
+ much attention in the field of arithmetic dynamics is that of classifying the portraits G(f, K)
30
+ up to graph isomorphism as f is allowed to vary in an infinite family of rational functions.
31
+ An early example of this classification problem is Poonen’s study [43] of the portraits G(f, Q)
32
+ as f varies over the family of all quadratic polynomials with rational coefficients.
33
+ Theorem 1.1 (Poonen [43]). Assume that there is no quadratic polynomial over Q having
34
+ a rational periodic point of period greater than 3.
35
+ Then, for every quadratic polynomial
36
+ f ∈ Q[z], the portrait G(f, Q) is isomorphic to one of the following twelve graphs (using the
37
+ labels from Appendix B):
38
+ ∅, 2(1), 3(1, 1), 3(2), 4(1, 1), 4(2), 5(1, 1)a, 6(1, 1), 6(2), 6(3), 8(2, 1, 1), 8(3).
39
+ Date: January 3, 2023.
40
+ 2020 Mathematics Subject Classification. Primary 37P05, 37P35; Secondary 37P15, 11G30, 14G05.
41
+ Key words and phrases. Arithmetic dynamics, dynatomic curve, preperiodic portrait, uniform bounded-
42
+ ness conjecture.
43
+ 1
44
+ arXiv:2301.00510v1 [math.NT] 2 Jan 2023
45
+
46
+ 2
47
+ JOHN R. DOYLE AND DAVID KRUMM
48
+ Regarding the assumption in Theorem 1.1, it is known that a quadratic polynomial over
49
+ Q cannot have rational periodic points of period 4 (Morton [38]), period 5 (Flynn–Poonen–
50
+ Schaefer [18]), or, assuming that the conclusions of the Birch and Swinnerton-Dyer conjecture
51
+ hold for a certain Jacobian variety, period 6 (Stoll [47]). In addition, a substantial amount
52
+ of empirical evidence supporting the assumption in Poonen’s theorem has been provided by
53
+ Hutz and Ingram [23] and Benedetto et al. [1]. However, it remains an open problem to
54
+ prove that this assumption is valid. Portraits for other families of quadratic maps over Q are
55
+ studied in the articles [3,6,32,33]. The present paper concerns the preperiodic portraits of
56
+ quadratic polynomials defined over quadratic fields, a topic previously explored in [10,12,13].
57
+ 1.2. Analogy with torsion points. A guiding principle that has proved fruitful in arith-
58
+ metic dynamics is to regard the set of preperiodic points of a map as being analogous to
59
+ the set of torsion points on an abelian variety. Thus, for instance, the well-known fact that
60
+ the set of K-rational torsion points on an abelian variety is finite is viewed as analogous to
61
+ a theorem of Northcott [41] stating that, for every rational function f over K of degree at
62
+ least 2, the set of K-rational preperiodic points of f is finite.
63
+ Motivated by this analogy, Morton and Silverman formulated the following dynamical
64
+ analogue of a standard uniform boundedness conjecture for abelian varieties. We state the
65
+ dynamical conjecture only in the case of endomorphisms of the projective line, although a
66
+ similar statement applies to arbitrary projective spaces1.
67
+ Conjecture 1.2 (Morton–Silverman [39]). For a number field K and morphism f : P1
68
+ K → P1
69
+ K
70
+ of degree greater than 1, the number of K-rational preperiodic points of f is bounded above
71
+ by a constant depending only on the degree of f and the absolute degree of K.
72
+ This dynamical uniform boundedness conjecture would imply, in particular, that there are
73
+ only finitely many isomorphism classes of portraits G(f, Q) as f ranges over all quadratic
74
+ polynomials with rational coefficients, since the number of vertices in such a portrait is
75
+ uniformly bounded. Theorem 1.1 can thus be seen as a refinement of the conjecture in this
76
+ case, as it provides a (conditionally) complete list of all possible portraits for the family of
77
+ quadratic polynomial maps. In the analogy with torsion points, Poonen’s list of portraits
78
+ corresponds to the list of abelian groups that can be realized as the torsion subgroup of an
79
+ elliptic curve over Q, the latter list being provided by a well-known theorem of Mazur [34].
80
+ Similarly, the Morton–Silverman conjecture would imply that the portraits G(f, K), where
81
+ K is a quadratic field and f is a quadratic polynomial over K, fall into finitely many iso-
82
+ morphism classes. A conjecturally complete list of classes was first proposed in [13], and is
83
+ included here in Appendix B. The list is comprised of 46 portraits, and can be viewed as anal-
84
+ ogous to the list of 26 abelian groups, known by work of Kamienny [25] and Kenku–Momose
85
+ [26], that can arise as torsion subgroups of elliptic curves over quadratic fields.
86
+ 1.3. Infinitely occurring portraits. Our primary objective in this paper is to determine,
87
+ under a suitable notion of equivalence of maps, which of the 46 graphs in [13] arise as the
88
+ preperiodic portrait of infinitely many inequivalent quadratic polynomials over quadratic
89
+ fields. In the context of elliptic curves, both over Q and over quadratic fields, the correspond-
90
+ ing question is well understood: every abelian group that arises as the torsion subgroup of
91
+ an elliptic curve can be realized as such by infinitely many non-isomorphic curves (see [24]).
92
+ 1Interestingly, work of Fakhruddin [17] shows that the more general Morton–Silverman conjecture in fact
93
+ implies its analogue for abelian varieties. See also [45, §3.3], where Merel’s theorem for elliptic curves is
94
+ shown to follow from Conjecture 1.2
95
+
96
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
97
+ 3
98
+ In order to state our questions more precisely, we begin by defining the appropriate equiv-
99
+ alence relation on maps. Two morphisms f, h : P1
100
+ K → P1
101
+ K are called linearly conjugate
102
+ over K if there exists an automorphism σ ∈ PGL2(K) such that
103
+ h = σ−1 ◦ f ◦ σ.
104
+ (Similarly, one can define linear conjugacy over any extension of K.) In that case, a simple
105
+ argument shows that the portraits G(f, K) and G(h, K) are isomorphic as directed graphs;
106
+ hence, the isomorphism class of G(f, K) is determined by the linear conjugacy class of f.
107
+ In the case of quadratic polynomials, it is well known that every such map f ∈ K[z] is
108
+ linearly conjugate to a unique map of the form
109
+ fc(z) := z2 + c,
110
+ where c ∈ K. Thus, in studying the portraits of quadratic polynomials we may restrict
111
+ attention to the one-parameter family of maps fc.
112
+ Returning to the question of portraits arising infinitely often, the case of quadratic poly-
113
+ nomials over Q was answered by Faber, who showed in addition that Poonen’s list in [43]
114
+ does not omit any such portrait.
115
+ Theorem 1.3 (Faber [16]). For a portrait P, the following are equivalent:
116
+ (i) There exist infinitely many c ∈ Q such that G(fc, Q) ∼= P.
117
+ (ii) P is isomorphic to one of the following graphs (using the labels from Appendix B):
118
+ ∅, 4(1, 1), 4(2), 6(1, 1), 6(2), 6(3), 8(2, 1, 1).
119
+ Motivated by Faber’s theorem, we now state the main questions to be addressed here.
120
+ Question 1.4. Among the 46 known isomorphism classes of portraits arising as G(fc, K),
121
+ with K a quadratic field and c ∈ K, which ones can be realized as such by infinitely many
122
+ algebraic numbers c? In addition, must every infinitely occurring portrait belong to one of
123
+ the 46 known isomorphism classes?
124
+ 1.4. Main results. We define the following sets of portraits using labels as in Appendix B:
125
+ Γ0 := {∅, 4(1, 1), 4(2), 6(1, 1), 6(2), 6(3), 8(2, 1, 1)};
126
+ Γrat := {8(1, 1)a, 8(2)a, 8(4), 10(3, 1, 1), 10(3, 2)};
127
+ Γquad := {8(1, 1)b, 8(2)b, 8(3), 10(2, 1, 1)a/b};
128
+ Γ := Γ0 ∪ Γrat ∪ Γquad.
129
+ We provide two answers to Question 1.4 which differ in their level of specificity. The
130
+ simplest is Theorem 1.5, with Theorems 1.6 and 1.7 providing additional information in
131
+ terms of the above subsets of Γ. For an integer n ≥ 1, we define
132
+ Q(n) := {α ∈ Q : [Q(α) : Q] ≤ n}.
133
+ Theorem 1.5. For a portrait P, the following are equivalent:
134
+ (i) There exist infinitely many c ∈ Q(2) such that G(fc, K) ∼= P for some quadratic field
135
+ K containing c.
136
+ (ii) P ∈ Γ.
137
+
138
+ 4
139
+ JOHN R. DOYLE AND DAVID KRUMM
140
+ Theorem 1.5 can be refined in order to take into account certain subtleties illustrated by
141
+ the following example: We see from Theorem 1.3 that the portrait P = 4(2) is realized as
142
+ G(fc, Q) for infinitely many c ∈ Q. For each such c, the set of preperiodic points for fc is a
143
+ set of bounded height, and therefore fc has only finitely many preperiodic points of algebraic
144
+ degree 2 over Q. Hence, for each of the infinitely many c ∈ Q with G(fc, Q) ∼= P, we must
145
+ also have G(fc, K) ∼= P for all but finitely many quadratic fields K.
146
+ We therefore show that each of the portraits P ∈ Γ is realized infinitely often—even if
147
+ one excludes the infinitely many “trivial” realizations in the sense of the previous paragraph.
148
+ This is done in the next two theorems, which are stated separately in order to distinguish
149
+ between polynomials with rational coefficients and those with quadratic algebraic coefficients.
150
+ Theorem 1.6. For a portrait P, the following are equivalent:
151
+ (i) There exist infinitely many c ∈ Q such that G(fc, Q) ⊊ G(fc, K) ∼= P for some
152
+ quadratic field K.
153
+ (ii) P ∈ Γ ∖ {∅, 6(3)}.
154
+ Theorem 1.7. For a portrait P, the following are equivalent:
155
+ (i) There exist infinitely many c ∈ Q(2) ∖ Q such that G(fc, Q(c)) ∼= P.
156
+ (ii) P ∈ Γ0 ∪ Γquad.
157
+ Note that every portrait in Γ is covered by at least one of Theorems 1.6 and 1.7, since ∅
158
+ and 6(3) are elements of Γ0. In particular, these two theorems together imply Theorem 1.5.
159
+ 1.5. Quadratic points on dynamical modular curves. The proofs of our main results
160
+ rely heavily on the concept of a dynamical modular curve. To each of the 46 portraits from
161
+ [13], and more generally to any portrait that could potentially be realized as the preperi-
162
+ odic portrait of a quadratic polynomial over a number field, we associate an algebraic curve
163
+ parametrizing instances of the portrait as a preperiodic portrait G(fc, K). The curve cor-
164
+ responding to a portrait P will be denoted X1(P) by analogy with the classical modular
165
+ curves X1(N) parametrizing elliptic curves with a torsion point of order N. To avoid confu-
166
+ sion, the latter curve will henceforth be denoted Xell
167
+ 1 (N). The details of the construction as
168
+ well as basic properties of dynamical modular curves are discussed in [11]. A more general
169
+ construction of dynamical moduli spaces appears in [15].
170
+ The core of our analysis in this paper is a study of basic geometric invariants, such as
171
+ genus and gonality, of the curves X1(P). We then turn this geometric data into arithmetic
172
+ data using Faltings’ theorem on rational points on subvarieties of abelian varieties, via the
173
+ following result of Harris and Silverman:
174
+ Theorem 1.8 (Harris–Silverman [21, Cor. 3]). Let X be a smooth, irreducible, projective
175
+ curve of genus g ≥ 2 defined over a number field K. If X is neither hyperelliptic or bielliptic
176
+ over K, then X has only finitely many points that are quadratic over K.
177
+ In addition, we consider arithmetic questions regarding the fields of definition of quadratic
178
+ points on X1(P). In particular, if X1(P) has a point defined over a quadratic number field
179
+ K, what can be said about basic arithmetic invariants of K, such as discriminant and class
180
+ number? For the curves Xell
181
+ 1 (N), arithmetic questions of this kind have been discussed by
182
+ several authors: Momose [35] shows that if K is the field of definition of a quadratic point
183
+ on Xell
184
+ 1 (13), then the prime 2 splits in K, and 3 is unramified in K; Bosman et al. [5] show
185
+ that K must be a real quadratic field, an observation also made in [13]. In the case of the
186
+
187
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
188
+ 5
189
+ modular curves Xell
190
+ 0 (N), Najman and Trbovi´c [40] prove arithmetic results of this type for
191
+ several values of N.
192
+ For the dynamical modular curves X1(P) we prove the following two theorems. Though
193
+ our methods can be applied to several portraits in the set Γ (namely, those for which the
194
+ corresponding modular curve is hyperelliptic), the portraits 8(4) and 10(3,1,1) are highlighted
195
+ here due to their significance in the context of elliptic curves, explained below.
196
+ By a quadratic point on an algebraic curve over a field k, we mean a point whose field
197
+ of definition is a quadratic extension of k.
198
+ Theorem 1.9. Let P denote the portrait 8(4).
199
+ (a) For every prime p and every residue class c ∈ Z/pZ, there exist infinitely many
200
+ squarefree integers d ∈ c such that X1(P) has a quadratic point defined over Q(
201
+
202
+ d).
203
+ (b) There exist infinitely many imaginary quadratic fields K with class number divisible
204
+ by 10 such that X1(P) has a quadratic point defined over K.
205
+ As noted in [13], the above curve X1(P) is isomorphic to Xell
206
+ 1 (16). Thus, Theorem 1.9
207
+ provides new information about the collection of quadratic fields K such that there exists
208
+ an elliptic curve E/K with a K-rational torsion point of order 16.
209
+ Similarly, taking P = 10(3, 1, 1), the curve X1(P) is known to be isomorphic to Xell
210
+ 1 (18).
211
+ The next theorem strengthens earlier results by Kenku–Momose [26] regarding the splitting
212
+ of rational primes in the fields of definition of quadratic points on this curve.
213
+ Theorem 1.10. Let P denote the portrait 10(3, 1, 1) and let K be the field of definition of
214
+ a quadratic point on X1(P).
215
+ (a) The prime 2 splits in K, and 3 is not inert in K.
216
+ (b) There exists an infinite and computable set of primes, denoted π, that is independent
217
+ of K, and such that every prime in π is unramified in K.
218
+ 1.6. Points of higher degree. Though our primary focus here is on quadratic fields, we
219
+ make one observation concerning arbitrary number fields. The next result is a straightforward
220
+ consequence of a theorem of Frey [19] together with the main theorem of [14].
221
+ Theorem 1.11. Fix a positive integer n. For any portrait P, let γ(P) denote the set of
222
+ algebraic numbers c ∈ Q(n) such that P ∼= G(fc, K) for some number field K satisfying
223
+ c ∈ K ⊂ Q(n). There are only finitely many portraits P such that γ(P) is infinite.
224
+ Note that Theorem 1.5 is a more refined version of Theorem 1.11 in the case n = 2.
225
+ 1.7. Outline of the paper. In Section 2 we define the notion of a generic quadratic portrait
226
+ and discuss basic facts concerning dynamical modular curves associated to such portraits,
227
+ followed by general properties of algebraic curves in Section 3.
228
+ In Section 4, we apply geometric arguments to determine all generic quadratic portraits P
229
+ for which the curve X1(P) has infinitely many quadratic points. This proves, in particular,
230
+ the implication (i) ⇒ (ii) in Theorem 1.5; see Theorem 4.1 and the immediately preceding
231
+ discussion.
232
+ Section 5 addresses the issue that K-rational points on X1(P) correspond to instances
233
+ where G(fc, K) simply contains the portrait P; that is, we need not have an isomorphism
234
+ G(fc, K) ∼= P, and in fact, in many cases we do not. The section culminates with the proofs
235
+ of Theorems 1.6 and 1.7 in §5.3.
236
+
237
+ 6
238
+ JOHN R. DOYLE AND DAVID KRUMM
239
+ Finally, Section 6 is devoted to arithmetic questions concerning the fields of definition of
240
+ quadratic points on the curves X1(P), and in particular to proving Theorems 1.9 and 1.10.
241
+ Acknowledgements. We thank Joe Silverman for helpful comments, and especially for a
242
+ suggestion that led to the more refined statements in Theorems 1.6 and 1.7. The first author
243
+ was partially supported by NSF grant DMS-2112697.
244
+ 2. Dynamical modular curves
245
+ 2.1. Dynatomic polynomials. If f is a polynomial with coefficients in a field K and α ∈ K
246
+ is a point of exact period n for f, then α is a root of the polynomial f n(z)−z. However, the
247
+ roots of f n(z) − z may have period strictly dividing n, and indeed there is a factorization
248
+ f n(z) − z =
249
+
250
+ d|n
251
+ Φd,f(z),
252
+ where (generically) the roots of Φd,f have exact period d for f. M¨obius inversion yields
253
+ Φn,f(z) =
254
+
255
+ d|n
256
+ (f d(z) − z)µ(n/d),
257
+ where µ denotes the M¨obius function. We call Φn,f the nth dynatomic polynomial of f.
258
+ More generally, for m, n ≥ 1 we define
259
+ Φm,n,f(z) :=
260
+ Φn,f(f m(z))
261
+ Φn,f(f m−1(z)).
262
+ Then Φm,n,f is a polynomial whose roots are (again, generically) points of preperiod m and
263
+ eventual period n for f. (That Φn,f and Φm,n,f are indeed polynomials is proven in [22,45].)
264
+ Since we are specifically interested in the family fc(z) = z2 + c, we write
265
+ Φn(c, z) := Φn,fc(z)
266
+ and
267
+ Φm,n(c, z) := Φm,n,fc(z).
268
+ Then Φn (resp., Φm,n) is a polynomial in Z[c, z], and the vanishing locus defines an affine
269
+ curve Y1(n) (resp., Y1(m, n)), which we refer to as a dynatomic curve. Thus, for example,
270
+ if α has period n for fc, then (c, α) is a point on the dynatomic curve Y1(n). We denote by
271
+ X1(·) the normalization of the projective closure of the affine curve Y1(·), and we also refer
272
+ to X1(·) as a dynatomic curve.
273
+ 2.2. Dynamical modular curves associated to portraits. The dynamical properties
274
+ of quadratic polynomial maps impose certain restrictions on those portraits that may be
275
+ realized as G(f, K) for some number field K and a quadratic polynomial f ∈ K[z]. First,
276
+ no point may have more than two preimages under f. Also, for each positive n ∈ Z, the nth
277
+ dynatomic polynomial for a quadratic polynomial f has degree
278
+ (2.1)
279
+ D(n) := deg Φn,f(z) =
280
+
281
+ d|n
282
+ µ(n/d)2d.
283
+ Thus, a quadratic polynomial has at most D(n) points of period n, partitioned into at most
284
+ R(n) := D(n)/n cycles of length n. With these restrictions in mind, we make the following
285
+ definition:
286
+
287
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
288
+ 7
289
+
290
+
291
+
292
+
293
+ Figure 1. A generic quadratic portrait
294
+ Definition 2.1. A quadratic portrait is a portrait P satisfying the following properties:
295
+ (a) Every vertex of P has in-degree at most 2.
296
+ (b) For each n ≥ 1, the number of n-cycles in P is at most
297
+ R(n) := 1
298
+ n
299
+
300
+ d|n
301
+ µ(n/d)2d.
302
+ For any number field K and quadratic polynomial f ∈ K[z], the portrait G(f, K) is
303
+ quadratic. However, for most quadratic polynomials (in a sense that can be made precise),
304
+ we can say more about the structure of the set of K-rational preperiodic points. For the
305
+ model fc(z) = z2 + c, if α is a preperiodic point for fc, then −α is also preperiodic, since
306
+ both are preimages of f(α). Thus, a preperiodic point typically has either no K-rational
307
+ preimages or exactly two K-rational preimages. The exception to this rule occurs when
308
+ α = 0 is a preperiodic point, in which case exactly one preperiodic point (namely, c = fc(0))
309
+ has a single K-rational preimage.
310
+ Along the same lines, if a polynomial fc has a K-rational fixed point β, then β is a root of
311
+ the quadratic polynomial fc(z)−z = z2−z+c; thus, unless we have disc(fc(z)−z) = 1−4c = 0
312
+ (i.e., c = 1/4), there is a second fixed point β′, necessarily defined over K.
313
+ With these observations in mind, we make the following definition.
314
+ Definition 2.2. A generic quadratic portrait is a quadratic portrait P with the following
315
+ additional properties:
316
+ (a) The in-degree of any vertex of P is equal to 0 or 2.
317
+ (b) If P has a fixed point, then P has exactly two fixed points.
318
+ Remark 2.3. We will sometimes refer to the results of [11], in which the term “strongly
319
+ admissible” is used instead of “generic quadratic.”
320
+ Given a quadratic portrait P, there is a dynamical modular curve Y1(P), defined over
321
+ Q, whose K-points—for any extension K/Q—correspond to tuples (c, z1, . . . , zn) such that
322
+ z1, . . . , zn are preperiodic points forming a subportrait of G(fc, K) isomorphic to P. If Q
323
+ is the point on Y1(P) corresponding to such a tuple, then the field of definition of Q is
324
+ Q(c, z1, . . . , zn). We denote by X1(P) the smooth projective curve birational to Y1(P).
325
+ A formal treatment of dynamical modular curves appears in [11], where the curves are de-
326
+ fined only for generic quadratic portraits. We lose no generality in making such a restriction:
327
+ Given any quadratic portrait P, there is a unique portrait P′ that is minimal among generic
328
+ quadratic portraits containing P as a subportrait. In the language of [11], P′ is the generic
329
+ quadratic portrait generated by the vertices of P. It follows from the results of [11, §2] that
330
+ X1(P) ∼= X1(P′), so we may as well assume that P is generic quadratic.
331
+ Rather than formally defining X1(P) (we refer the interested reader to [11] or, for a
332
+ different approach in a more general setting, [15]), we give an example.
333
+ Example 2.4. Consider the generic quadratic portrait P appearing in Figure 1. One could
334
+ construct a curve birational to X1(P) simply by giving one equation for each relation coming
335
+
336
+ 8
337
+ JOHN R. DOYLE AND DAVID KRUMM
338
+ from an edge in P: if we label the vertices 1, 2, 3, 4 from left to right, we have
339
+ z2
340
+ 1 + c = z2,
341
+ z2
342
+ 2 + c = z3,
343
+ z2
344
+ 3 + c = z2,
345
+ z2
346
+ 4 + c = z3.
347
+ (2.2)
348
+ Note that we must also impose certain Zariski open conditions of the form zi ̸= zj to remove
349
+ extraneous components; for example, there is a full component of the curve defined by (2.2)
350
+ on which z1, z2, z3, and z4 are all equal. It is this approach that is taken in [15].
351
+ An alternative approach, which is particular to quadratic polynomials, is to note that any
352
+ generic quadratic portrait containing a point of period 2 must necessarily contain P. Thus,
353
+ another (affine) model for X1(P) is the plane curve defined by the vanishing of
354
+ Φ2(c, z) = (z2 + c)2 + c − z
355
+ z2 + c − z
356
+ = z2 + z + c + 1.
357
+ In other words, X1(P) is isomorphic to the dynatomic curve X1(2). This second model has
358
+ the advantage of being defined in a lower-dimensional affine space (A2, rather than A5), and
359
+ it is this second approach which is described in detail in [11].
360
+ We conclude this example by pointing out that X1(P) ∼= X1(2) also has “degenerate”
361
+ points where two or more of the vertices of the portrait P collapse.
362
+ For example, the
363
+ equation Φ2(c, z) = 0 has the solution (c, z) =
364
+
365
+ − 3
366
+ 4, − 1
367
+ 2
368
+
369
+ despite the fact that − 1
370
+ 2 is a fixed
371
+ point for f−3/4. However, for a given portrait P, there are only finitely many such degenerate
372
+ points on X1(P).
373
+ Before summarizing the required properties of dynamical modular curves, we recall the
374
+ following terminology:
375
+ Definition 2.5. Let X be a smooth, irreducible projective curve defined over a field k.
376
+ The k-gonality of X, denoted gonk(X), is the minimal degree of a nonconstant morphism
377
+ X → P1 defined over k.
378
+ Proposition 2.6. Let P be a generic quadratic portrait, and let k be any field of character-
379
+ istic 0.
380
+ (a) The curve X1(P) is irreducible over k.
381
+ (b) If P′ is a generic quadratic portrait properly contained in P, then there is a finite
382
+ morphism πP,P′ : X1(P) → X1(P′) of degree at least 2 defined over k.
383
+ (c) Given any ordering P1, P2, . . . of all generic quadratic portraits, the k-gonalities of
384
+ the curves X1(Pi) tend to ∞.
385
+ Proof. Parts (a) and (b) are proven in [11, Thm. 1.7] and [11, Prop. 3.3], respectively. Note
386
+ that the morphism πP,P′ is obtained simply by forgetting the preperiodic points correspond-
387
+ ing to vertices of P ∖ P′, hence is defined over the base field k.
388
+ Statement (c) is a slight generalization of, but follows directly from, [14, Thm. 1.1(b)],
389
+ which says that as m + n → ∞, the gonalities of the curves X1(m, n) tend to ∞. Given a
390
+ bound B, there are only finitely many quadratic portraits P such that every vertex v of P
391
+ has preperiod m and eventual period n satisfying m + n ≤ B. In other words, if for every
392
+ generic quadratic portrait P we choose a vertex vP with preperiod mP and eventual period
393
+ nP maximizing the sum mP + nP, we must have mP + nP → ∞ as P ranges over all generic
394
+ quadratic portraits in any order. Since there is a nonconstant morphism from X1(P) to
395
+ X1(mP, nP) (e.g., by part (b)), we have gonk(X1(P)) ≥ gonk(X1(mP, nP)), and the latter
396
+ expression tends to ∞.
397
+
398
+
399
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
400
+ 9
401
+ Proof of Theorem 1.11. Fix n ≥ 1 and a portrait P, and suppose there are infinitely many
402
+ c ∈ Q(n) such that G(fc, K) ∼= P for some degree-n number field K containing c. Then the
403
+ dynamical modular curve X1(P) has infinitely many points of degree at most n. It follows
404
+ from [19, Prop. 2] (cf. [8, Thm. 5]) that X1(P) must have gonality at most 2n, hence there
405
+ are only finitely many such portraits P by part (c) of Proposition 2.6.
406
+
407
+ 3. Some useful properties of algebraic curves
408
+ In this section, we collect a few facts about algebraic curves that will be used throughout
409
+ the rest of the paper.
410
+ First, we provide a statement that follows from Hilbert’s irreducibility theorem; see [44,
411
+ §3.4] and [30, §9.2] for details.
412
+ Proposition 3.1. Let K be a number field, let X be a curve defined over K, and let ϕ :
413
+ X → P1 be a dominant morphism of degree d ≥ 2 defined over K. Then the set
414
+ T :=
415
+
416
+ P ∈ P1(K) : [K(Q) : K] < d for some Q ∈ ϕ−1(P)
417
+
418
+ is a thin subset of P1(K).
419
+ Remark 3.2. Thin subsets T ⊂ P1(K) have density 0, in the sense that
420
+ lim
421
+ N→∞
422
+ ���{P ∈ T : h(P) ≤ N}
423
+ ���
424
+ ���{P ∈ P1(K) : h(P) ≤ N}
425
+ ���
426
+ = 0,
427
+ where h is the na¨ıve Weil height on P1(Q). In particular, for any maximal ideal p ∈ Spec OK
428
+ and any mod-p residue class c in P1(K), the set c \ T is infinite.
429
+ Given an elliptic curve E with Weierstrass equation y2 = f(x), where f ∈ K[x] is square-
430
+ free of degree 3, it is easy to construct infinitely many quadratic points on E: For “most”
431
+ x ∈ K, the point (x, y) = (x,
432
+
433
+ f(x)) is quadratic over K. More precisely, since f is not a
434
+ square in K[x], it follows from Hilbert irreducibility that f(x0) is a nonsquare in K for all
435
+ x0 outside a thin subset of K. The following result, proven in [13, Lem. 2.2], gives a useful
436
+ characterization of quadratic points (x, y) with x /∈ Q:
437
+ Lemma 3.3. Let E/K be an elliptic curve defined by an equation of the form
438
+ y2 = ax3 + bx2 + cx + d,
439
+ where a, b, c, d ∈ K and a ̸= 0. Suppose (x, y) ∈ E(K) is a quadratic point with x /∈ K.
440
+ Then there exist (x0, y0) ∈ E(K) and t ∈ k such that y = y0 + t(x − x0) and
441
+ x2 + ax0 − t2 + b
442
+ a
443
+ x + ax2
444
+ 0 + t2x0 + bx0 − 2y0t + c
445
+ a
446
+ = 0.
447
+ By Theorem 1.8, a curve with infinitely many quadratic points must admit a degree-2
448
+ morphism to either P1 or an elliptic curve, hence must have gonality at most 4. Thus, to
449
+ prove that a curve has finitely many quadratic points, it suffices to show that the gonality
450
+ of the curve is greater than 4. The following inequality is a standard tool for finding lower
451
+ bounds for gonalities.
452
+
453
+ 10
454
+ JOHN R. DOYLE AND DAVID KRUMM
455
+ Proposition 3.4 (Castelnuovo–Severi inequality [46, Thm. 3.11.3]). Let Y , Y1, and Y2 be
456
+ curves of genera gY , g1, and g2, respectively. Suppose we have maps ϕ1 : Y → Y1 and
457
+ ϕ2 : Y → Y2 of degrees d1 and d2, and suppose further that there is not an intermediate
458
+ curve Z and a map ψ : Y → Z of degree greater than 2 such that both ϕ1 and ϕ2 factor
459
+ through ψ. Then
460
+ (3.1)
461
+ gY ≤ d1g1 + d2g2 + (d1 − 1)(d2 − 1).
462
+ 4. Dynamical modular curves with infinitely many quadratic points
463
+ The purpose of this section is to prove one direction of Theorem 1.5, namely that if there
464
+ are infinitely many c ∈ Q(2) such that G(fc, K) ∼= P for some quadratic field K containing
465
+ c, then P ∈ Γ. Since any such realization of P as G(fc, K) yields a quadratic point on the
466
+ dynamical modular curve Y1(P), it suffices to prove the following:
467
+ Theorem 4.1. Let P be a generic quadratic portrait.
468
+ Then X1(P) has infinitely many
469
+ quadratic points if and only if P ∈ Γ.
470
+ Remark 4.2. If we just assume that P is a quadratic portrait (i.e., not necessarily generic),
471
+ then X1(P) has infinitely many quadratic points if and only if P is a subportrait of some
472
+ portrait in Γ. This follows from Theorem 4.1 as well as the fact that for any quadratic
473
+ portrait P, if we let P′ be the minimal generic quadratic portrait containing P, then X1(P)
474
+ and X1(P′) are isomorphic over Q. (See the discussion preceding Example 2.4.)
475
+ One direction of Theorem 4.1 is straightforward: For every portrait P ∈ Γ, the curve
476
+ X1(P) is described in at least one of the articles [38,43,48]. All the curves in those articles
477
+ have genus at most 2 and at least one rational point, hence have infinitely many quadratic
478
+ points. Thus, we must show that if P is generic quadratic but not in Γ, then X1(P) has only
479
+ finitely many quadratic points.
480
+ To help organize the arguments in the rest of this section, we introduce some terminology:
481
+ Definition 4.3. The cycle structure of a portrait P is the nonincreasing sequence of cycle
482
+ lengths appearing in P. Note that the empty portrait has cycle structure ( ).
483
+ If K is a quadratic field and c ∈ K, then the cycle structure of G(fc, K) may contain the
484
+ integer 1 at most twice and each of the integers 2, 3, and 4 at most once; for periods 1 and
485
+ 2 this follows from the fact that a quadratic polynomial can have at most two fixed points
486
+ and at most one 2-cycle, and for periods 3 and 4 this comes from [10, Cor. 4.16]. More
487
+ precisely, the results of [10] imply that the “period at most 4” portion of the cycle structure
488
+ of G(fc, K) must be (4,1,1), (4,2), or one of the following:
489
+ (4.1)
490
+ ( ), (1,1), (2), (3), (4), (2,1,1), (3,1,1), (3,2).
491
+ Moreover, it follows from [13, Cor. 3.48] (resp., [10, Thm. 4.21]) that no portrait with
492
+ both a 4-cycle and a 1-cycle (resp., 4-cycle and a 2-cycle) may be realized infinitely often as
493
+ G(fc, K) for K a quadratic field and c ∈ K. For our purposes, therefore, we may exclude
494
+ the cycle structures (4,1,1) and (4,2) from consideration.
495
+ By enumerating generic quadratic portraits with few vertices, one can verify that if P is a
496
+ generic quadratic portrait which is not in Γ, then P has a cycle of length n ≥ 5 or P properly
497
+ contains a portrait in Γ1 or Γ2. We handle these two possibilities separately, showing in each
498
+ case that the dynamical modular curve X1(P) has only finitely many quadratic points.
499
+
500
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
501
+ 11
502
+ 4.1. Points of period n ≥ 5. If P is a generic portrait with a cycle of length n, then there
503
+ is a dominant morphism X1(P) → X1(n) defined over Q. In particular, every quadratic
504
+ point on X1(P) maps to a rational or quadratic point on X1(n), so we need only show that
505
+ if n ≥ 5, then X1(n) has only finitely many points defined over quadratic fields; this is the
506
+ content of Proposition 4.6.
507
+ For n ≥ 1, the cyclic group Cn acts on X1(n) as follows: Given a point (c, z) ∈ X1(n), we
508
+ also have σn(c, z) := (c, fc(z)) ∈ X1(n), so σ defines an order-n automorphism of X1(n). We
509
+ denote by πn : X1(n) → X0(n) the quotient of X1(n) by this cyclic group action. (The curve
510
+ X0(n) parametrizes maps fc together with a marked cycle of length n.) Let c1,n and c0,n
511
+ denote the maps from X1(n) and X0(n), respectively, to the c-line; note that c1,n = c0,n ◦ πn.
512
+ For a curve X, we will denote by gX its genus; for simplicity, for each n ≥ 1 we will write
513
+ g1,n and g0,n for the genera of X1(n) and X0(n), respectively. Finally, recall that we denote
514
+ by D(n) the degree (in z) of the polynomial Φn(c, z); a formula for D(n) is given in (2.1),
515
+ and using that formula one can show that
516
+ (4.2)
517
+ 2n−1 ≤ D(n) ≤ 2n,
518
+ with equality on the right if and only if n = 1 and on the left if and only if n = 2.
519
+ Lemma 4.4. For all n ≥ 5, we have g0,n ≥ 2.
520
+ Proof. In [37, Thm. 13], Morton gives an explicit formula for g0,n as well as the lower bound
521
+ g0,n ≥ 3
522
+ 2 +
523
+ �1
524
+ 4 − 1
525
+ n
526
+
527
+ 2n − (n + 1)2n/2−1.
528
+ Rewriting the right-hand expression and using the assumption that n ≥ 5, we have
529
+ g0,n ≥ 3
530
+ 2 + 2n/2−1
531
+ ��1
532
+ 4 − 1
533
+ 5
534
+
535
+ 2n/2+1 − (n + 1)
536
+
537
+ = 3
538
+ 2 + 2n/2−1
539
+ � 1
540
+ 102n/2 − (n + 1)
541
+
542
+ .
543
+ The expression
544
+ � 1
545
+ 102n/2 − (n + 1)
546
+
547
+ is positive for all n ≥ 15, so for all such n we have
548
+ g0,n > 3/2, hence g0,n ≥ 2. Finally, using the explicit formula for g0,n given by Morton,
549
+ we can exactly compute g0,n for all 1 ≤ n ≤ 14, and we find that g0,n < 2 if and only if
550
+ 1 ≤ n ≤ 4, in which case g0,n = 0.
551
+
552
+ Lemma 4.5. Let n ≥ 6, and let Rn be the ramification divisor of πn. Then deg Rn > 4n.
553
+ Proof. It suffices to replace Rn with R0
554
+ n, the restriction of the ramification divisor to points
555
+ that do not map to ∞ under c1,n. The ramification divisors of the maps c1,n and c0,n are
556
+ explicitly computed by Morton in [37, Thms. 11, 13], from which it follows that
557
+ (4.3)
558
+ deg R0
559
+ n = 1
560
+ 2
561
+
562
+ d|n
563
+ d<n
564
+ D(d)ϕ(n/d)(n − d).
565
+ If n is prime, then
566
+ deg R0
567
+ n = 1
568
+ 2D(1)ϕ(n)(n − 1) = (n − 1)2,
569
+
570
+ 12
571
+ JOHN R. DOYLE AND DAVID KRUMM
572
+ which is greater than 4n when n ≥ 6. If n is composite, then let m be the largest proper
573
+ divisor of n. Since √n ≤ m ≤ n/2, we have
574
+ deg R0
575
+ n ≥ 1
576
+ 2D(m)ϕ(n/m)(n − m)
577
+ > 2m−2ϕ(n/m)n
578
+ 2
579
+ (by (4.2))
580
+ ≥ 2
581
+ √n−3ϕ(n/m)n.
582
+ For all n ≥ 25, we have 2
583
+ √n−3 ≥ 4, thus deg R0
584
+ n > 4n. An explicit computation of deg R0
585
+ n
586
+ for all 6 ≤ n ≤ 25 (using (4.3)) completes the proof.
587
+
588
+ Proposition 4.6. Let n ≥ 5. Then X1(n) has only finitely many quadratic points.
589
+ Remark 4.7. The fact that X1(n) has only finitely many quadratic points for sufficiently
590
+ large n follows from Theorem 1.8, together with [14, Thm.
591
+ 1.1], which states that the
592
+ gonality of X1(n) tends to infinity with n. For our purposes, however, we need the more
593
+ precise statement of Proposition 4.6.
594
+ Proof of Proposition 4.6. By Theorem 1.8, it suffices to show that for n ≥ 5, the curve X1(n)
595
+ does not admit a degree-2 map to a curve of genus at most 1.
596
+ Let ϕ : X1(n) → C be a dominant morphism, where C is a curve of genus gC ≤ 1. We
597
+ claim that d := deg ϕ > 2.
598
+ First, suppose n ≥ 6.
599
+ In order to apply the Castelnuovo–Severi inequality (Proposi-
600
+ tion 3.4), we consider two cases.
601
+ Case 1: Suppose there is a curve Y such that both πn : X1(n) → X0(n) and ϕ : X1(n) →
602
+ C factor through a map ψ : X1(n) → Y of degree at least 2. Since Y covers X0(n), we have
603
+ gY ≥ 2 > gC by Lemma 4.4, hence the map Y → C has degree at least 2. Therefore, d ≥ 4.
604
+ Case 2: Now suppose that there is no such curve Y , so that we can apply the Castelnuovo–
605
+ Severi inequality to the maps ϕ and πn to get
606
+ g1,n ≤ ng0,n + dgC + (n − 1)(d − 1).
607
+ Rewriting this, we have
608
+ g1,n − ng0,n + n − 1 ≤ d(gC + n − 1).
609
+ By the Riemann–Hurwitz formula, the left hand side is equal to half the degree of the
610
+ ramification divisor Rn, so by Lemma 4.5 we have
611
+ d(gC + n − 1) > 2n.
612
+ Since we assumed gC ≤ 1, this implies that d > 2.
613
+ Finally, we consider n = 5. A calculation in Magma [4] shows that the map X1(5) → P1
614
+ given by Φ2(c, z) = z2 + z + c + 1 has degree 7. If ϕ factors through Φ2, then d ≥ 7. If
615
+ not, then ϕ and Φ2 do not simultaneously factor through a nontrivial intermediate map
616
+ X1(5) → Y , since Φ2 has prime degree. By the Castelnuovo–Severi inequality, we have
617
+ g1,5 ≤ dgC + 6(d − 1).
618
+ The curve X1(5) has genus g1,5 = 14, and we assumed gC ≤ 1, so it follows that d > 2.
619
+
620
+
621
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
622
+ 13
623
+
624
+
625
+
626
+
627
+
628
+
629
+
630
+
631
+
632
+
633
+
634
+ Figure 2. The portrait 10(4)
635
+ Remark 4.8. The fact that Φ2 has low degree on X1(5) seems related to the fact that, as
636
+ polynomials in Q[c, z], the dynatomic polynomials Φ2 and Φ5 have no common zeros (c, z).
637
+ In particular, all zeros and poles of Φ2 on X1(5) lie above ∞, which restricts the possible
638
+ number of such points.
639
+ 4.2. Generic quadratic portraits properly containing the portraits in Γ1 and Γ2.
640
+ By enumerating portraits with few vertices, one finds that any generic quadratic portrait P
641
+ that has its cycle structure listed in (4.1), but which is not contained in Γ, must properly
642
+ contain a portrait from Γ1 or Γ2, and moreover, P must have a subportrait isomorphic to
643
+ one of the following portraits:
644
+ (4.4)
645
+ 10(1,1)a/b, 10(2), 10(3)a/b, 10(4), 12(2,1,1)a/b, or Gn for some 1 ≤ n ≤ 10.
646
+ All portraits listed above appear in Appendix B except 10(4), which is the label we give to
647
+ the subportrait of 12(4) shown in Figure 2.
648
+ Proposition 4.9. For each of the portraits P appearing in (4.4), the curve X1(P) has only
649
+ finitely many quadratic points.
650
+ The cases P = 10(1, 1)b and P = 10(2) form the majority of the proof of Proposition 4.9.
651
+ We include only the proof for 10(1, 1)b, as the argument for 10(2) is very similar.
652
+ Lemma 4.10. Let C ⊂ Spec Q[x, z] be the curve of genus 5 defined by the equation
653
+
654
+ z2 − 2(x2 + 1)
655
+ �2 = 2(x2 − 1)2(x3 + x2 − x + 1).
656
+ Let (c, p) ∈ A2(K) be such that p has preperiod 4 and eventual period 1 for fc. Then there
657
+ exists a point (x, z) ∈ C(K) such that c = −2(x2 + 1)/(x2 − 1)2.
658
+ Proof. Let q = fc(p) = p2 + c, so that q has preperiod 3 (and still eventual period 1). A
659
+ calculation in [43, p. 22] shows that there is an element x ∈ K ∖ {±1} such that
660
+ c = −2(x2 + 1)
661
+ (x2 − 1)2
662
+ and q2 = 2(x3 + x2 − x + 1)
663
+ (x2 − 1)2
664
+ .
665
+ Hence we have
666
+ 2(x3 + x2 − x + 1) = q2(x2 − 1)2 = (p2 + c)2(x2 − 1)2 =
667
+ �p2(x2 − 1)2 − 2(x2 + 1)
668
+ x2 − 1
669
+ �2
670
+ .
671
+ Letting z = p(x2 − 1) we obtain
672
+
673
+ z2 − 2(x2 + 1)
674
+ �2 = (x2 − 1)2 · 2(x3 + x2 − x + 1)
675
+ with x, z ∈ K. Thus (x, z) ∈ C(K).
676
+
677
+
678
+ 14
679
+ JOHN R. DOYLE AND DAVID KRUMM
680
+ Proposition 4.11. For the portraits P = 10(1, 1)b and P = 10(2), the set of quadratic
681
+ points on X1(P) is finite.
682
+ Proof. As mentioned above, we only give a proof for P = 10(1, 1)b. By Lemma 4.10, it
683
+ suffices to show that the curve C has only finitely many quadratic points. The latter curve
684
+ admits a dominant map to the elliptic curve with Weierstrass equation w2 = 2(x3+x2−x+1),
685
+ which is the modular curve Xell
686
+ 1 (11). Explicitly, a natural map ϕ : C → Xell
687
+ 1 (11) is given by
688
+ ϕ(x, z) =
689
+
690
+ x, z2 − 2(x2 + 1)
691
+ x2 − 1
692
+
693
+ .
694
+ The curve Xell
695
+ 1 (11) has exactly four affine rational points, namely, (±1, ±2). Suppose
696
+ that (x, z) is a quadratic point on C with field of definition K. Then x /∈ {±1}, so the
697
+ point ϕ(x, z) cannot be a rational point on X1(11). Thus ϕ(x, z) is a quadratic point, and
698
+ K = Q(ϕ(x, z)). Letting
699
+ (4.5)
700
+ w = z2 − 2(x2 + 1)
701
+ x2 − 1
702
+ ,
703
+ we therefore have w2 = 2(x3 + x2 − x + 1) and K = Q(x, w). We now consider two cases.
704
+ Suppose first that x ∈ Q. Then K = Q(w), and by (4.5) we have z2 = 2(x2+1)+(x2−1)w.
705
+ Applying the norm map NK/Q to this equation we obtain
706
+ y2 = 4(x2 + 1)2 − 2(x2 − 1)2(x3 + x2 − x + 1),
707
+ where y = NK/Q(z).
708
+ The above equation defines a hyperelliptic curve of genus 3, and
709
+ therefore has only finitely many rational solutions. We conclude that C has only finitely
710
+ many quadratic points with rational x-coordinate.
711
+ Now suppose that x /∈ Q, so that K = Q(x). By Lemma 3.3 applied to the equation
712
+ w2 = 2(x3 + x2 − x + 1), there is a rational number t and a point (x0, w0) ∈ {(±1, ±2)} such
713
+ that w = w0 + t(x − x0) and
714
+ (4.6)
715
+ x2 + 2x0 − t2 + 2
716
+ 2
717
+ x + 2x2
718
+ 0 + t2x0 + 2x0 − 2w0t − 2
719
+ 2
720
+ = 0.
721
+ For each point (x0, w0) ∈ {(±1, ±2)} we consider the relation
722
+ (4.7)
723
+ z2 = 2(x2 + 1) + (x2 − 1)(w0 + t(x − x0)).
724
+ Using (4.6) we express the right-hand side of (4.7) as a linear combination of 1 and x.
725
+ Applying the norm map NK/Q and letting u = 2 · NK/Q(z), we obtain a relation of the
726
+ form u2 = g(t), where g is a polynomial of degree 7 with integral coefficients and nonzero
727
+ discriminant. Each of the resulting four equations u2 = g(t) defines a hyperelliptic curve of
728
+ genus 3, and therefore has only finitely many rational solutions. Since t has only finitely
729
+ many possible values, (4.6) implies the same for x. Therefore C has finitely quadratic points
730
+ with quadratic x-coordinate.
731
+
732
+ Proof of Proposition 4.9. The proposition has already been proven in [13] and [10] for all of
733
+ the portraits except 10(1, 1)b, 10(2), and 10(3)a/b. Moreover, Proposition 4.11 shows that
734
+ the statement is true for the portraits 10(1,1)b and 10(2), so all that remains is to show that
735
+ X1(P) has only finitely many quadratic points when P = 10(3)a or P = 10(3)b.
736
+ Each of the curves X1(P) with P = 10(3)a/b has genus 9, and each admits a degree-2
737
+ map ϕ to the genus-2 curve X1(P′), where P′ = 8(3). Now suppose we have a degree-d map
738
+ ψ : X1(P) → C, where C is a curve of genus gC ≤ 1. Then, by Proposition 3.4, either ψ
739
+
740
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
741
+ 15
742
+ factors through ϕ, in which case deg ψ > deg ϕ = 2, or the Castelnuovo–Severi inequality
743
+ (3.1) applies to ϕ and ψ, in which case we have
744
+ 4 + dgC + (d − 1) ≥ 9, hence d ≥
745
+ 6
746
+ gC + 1 ≥ 3.
747
+ It follows that X1(P) is not hyperelliptic or bielliptic, hence X1(P) has only finitely many
748
+ quadratic points by Theorem 1.8.
749
+
750
+ 4.3. Proof of Theorem 4.1. We now combine Propositions 4.6 and 4.9 to complete the
751
+ proof of Theorem 4.1, which in turn proves one direction of Theorem 1.5.
752
+ Proof of Theorem 4.1. As mentioned previously, the fact that X1(P) has infinitely many
753
+ quadratic points for each P ∈ Γ follows from the work of Walde–Russo [48] and Poonen
754
+ [43]. Now suppose P is a generic quadratic portrait such that X1(P) has infinitely many
755
+ quadratic points.
756
+ Proposition 4.6 asserts that P cannot have a cycle of length n ≥ 5;
757
+ combining this with the paragraph following Definition 4.3, the cycle structure of P must be
758
+ one of those appearing in (4.1). By simply enumerating all small generic quadratic portraits
759
+ with the allowable cycle structures, one finds that if P is not contained in Γ, then P has
760
+ a subportrait isomorphic to one of the portraits listed in (4.4), hence there is a dominant
761
+ morphism X1(P) → X1(P′) for some P′ in that list. Proposition 4.9 shows that each such
762
+ X1(P′) has only finitely many quadratic points, hence X1(P) does as well.
763
+
764
+ 5. Preperiodic portraits realized infinitely often over quadratic fields
765
+ In this section, we show that if P ∈ Γ, then there are infinitely many c ∈ Q such that
766
+ G(fc, K) ∼= P for some quadratic field K. We also determine for which portraits P the same
767
+ is true for infinitely many c ∈ Q(2) ∖ Q.
768
+ It follows from Theorem 4.1 that Γ is precisely the set of generic quadratic portraits that
769
+ can be realized infinitely often as a subportrait of G(fc, K); the difficulty is in proving that
770
+ we infinitely often have equality. This step requires two main tools: The first is Hilbert
771
+ irreducibility, and the second is a dynamical result giving an upper bound for the lengths of
772
+ periodic cycles of maps over number fields that depends only on the primes of bad reduction
773
+ of those maps; see, for example, [42,45,49].
774
+ Proposition 5.1. Let K be a number field, and let p ∈ Spec OK be a prime ideal of norm q.
775
+ There exists a bound B := B(q) such that if c ∈ K and vp(c) ≥ 0, then fc has no K-rational
776
+ points of period larger than B.
777
+ We will also repeatedly use the observation that given any portrait P and any bound C,
778
+ there are only finitely many generic portraits P′ that are minimal (relative to inclusion)
779
+ among those generic portraits containing P and have no cycles of length larger than C. This
780
+ is more or less due to the fact that there are only finitely many generic quadratic portraits
781
+ with a given number of vertices.
782
+ 5.1. Rational c-values. For any c ∈ Q, there are infinitely many quadratic fields K for
783
+ which G(fc, K) ∼= G(fc, Q).
784
+ This is a consequence of Northcott’s theorem: The set of
785
+ preperiodic points for fc has bounded height, hence there are only finitely many preperiodic
786
+ points which are quadratic over Q, and therefore only finitely many quadratic fields over
787
+ which fc gains new preperiodic points.
788
+
789
+ 16
790
+ JOHN R. DOYLE AND DAVID KRUMM
791
+ Table
792
+ 1. For
793
+ each
794
+ pair
795
+ (P, P′),
796
+ there
797
+ is
798
+ a
799
+ degree-2
800
+ morphism
801
+ X1(P) → X1(P′) defined over Q.
802
+ P
803
+ 4(1,1)
804
+ 4(2)
805
+ 6(1,1)
806
+ 6(2)
807
+ 8(2,1,1)
808
+ P′
809
+
810
+
811
+ 4(1,1)
812
+ 4(2)
813
+ 4(1,1) or 4(2)
814
+ In particular, if a portrait P is realized as G(fc, Q) for infinitely many c ∈ Q, then P must
815
+ also be realized as G(fc, K) for infinitely many c ∈ Q and, for each such c, infinitely many
816
+ quadratic fields K. The portraits realized infinitely often over Q are precisely the portraits
817
+ in Γ0; this is the main result of [16].
818
+ A more interesting problem, then, is to determine the set of portraits P for which there
819
+ are infinitely many c ∈ Q with G(fc, Q) ⊊ P but G(fc, K) ∼= P for some quadratic field K.
820
+ Proposition 5.2. Let P ∈ Γ. Then there exist infinitely many c ∈ Q such that G(fc, K) ∼= P
821
+ for some quadratic field K. Moreover, if P ∈ Γ ∖ {∅, 6(3)}, the infinitely many c ∈ Q may
822
+ be chosen so that
823
+ G(fc, Q) ⊊ G(fc, K) ∼= P.
824
+ Remark 5.3. The portraits ∅ and 6(3) are genuine exceptions to the second statement, as
825
+ asserted in Theorem 1.6 and proven in §5.3.
826
+ Proof of Proposition 5.2. It follows from the discussion preceding the statement of Proposi-
827
+ tion 5.2 that for both P = ∅ and P = 6(3), which are elements of Γ0, there are infinitely
828
+ many c ∈ Q such that G(fc, K) ∼= P for some quadratic field K. We henceforth assume
829
+ P ∈ Γ ∖ {∅, 6(3)} and prove the stronger statement that there are infinitely many c ∈ Q
830
+ such that G(fc, Q) ⊊ G(fc, K) ∼= P for some quadratic field K.
831
+ There is a model for X1(P) of the form y2 = F(x), with F(x) ∈ Q[x] nonconstant and
832
+ squarefree, such that the morphism c : X1(P) → P1 factors through x : X1(P) → P1. If
833
+ X1(P) has genus 0, this is because there is a proper (generic quadratic) subportrait P′ ⊊ P
834
+ for which the natural morphism
835
+ πP,P′ : X1(P) −→ X1(P′)
836
+ described in Proposition 2.6(b) has degree exactly 2; see Table 1 for the list of such pairs
837
+ (P, P′). For the curves of genus 1 or 2, explicit models are given in Appendix A.
838
+ Now fix a portrait P ∈ Γ ∖ {∅, 6(3)}, and let y2 = F(x) be the model for X1(P) described
839
+ in the previous paragraph. Choose any value of x0 ∈ Q, and choose a prime p ∈ Spec Z
840
+ of good reduction for c : X1(P) → P1 such that vp(c(x0)) ≥ 0. Let B = B(p2) be the
841
+ bound from Proposition 5.1, let P1, . . . , Pn be the generic quadratic portraits that properly
842
+ contain P and that have no cycles of length larger than B, and for each i = 1, . . . , n let
843
+ πi := πPi,P : X1(Pi) → X1(P) be the natural projection morphism from Proposition 2.6(b).
844
+ By Hilbert’s Irreducibility Theorem, the sets
845
+ {x ∈ Q :
846
+
847
+ F(x) ∈ Q}
848
+ and, for each i = 1, . . . , n,
849
+
850
+ x ∈ Q :
851
+
852
+ Q
853
+
854
+ π−1
855
+ i
856
+
857
+ x,
858
+
859
+ F(x)
860
+ ��
861
+ : Q
862
+
863
+ ≤ 2
864
+
865
+ ,
866
+ are thin subsets of P1(Q). Since the residue class
867
+ [x0]p := {x ∈ P1(Q) : x ≡ x0 (mod p)}
868
+
869
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
870
+ 17
871
+ is not thin, there are infinitely many x ∈ [x0]p such that K := Q
872
+ ��
873
+ F(x)
874
+
875
+ is a quadratic
876
+ field and
877
+
878
+ x,
879
+
880
+ F(x)
881
+
882
+ ∈ X1(P)(K) does not lift to a K-rational point on X1(Pi) for any
883
+ i = 1, . . . , n.
884
+ Now let c = c(x) for any of the infinitely many x from the previous paragraph. Excluding
885
+ at most finitely many x ∈ [x0]p, we may assume that G(fc, K) is a generic quadratic portrait.
886
+ Since c lifts to a quadratic point Q on X1(P), we have
887
+ G(fc, Q) ⊊ P ⊆ G(fc, K).
888
+ On the other hand, since c does not lift to a quadratic point on X1(Pi) for any i = 1, . . . , n,
889
+ the portrait G(fc, K) is either isomorphic to P or contains a cycle of length greater than B.
890
+ Finally, since vp(c) ≥ 0, G(fc, K) has no cycles of length greater than B, and thus we have
891
+ G(fc, Q) ⊊ G(fc, K) ∼= P.
892
+
893
+ 5.2. Quadratic c-values. The purpose of this section is to determine which portraits P
894
+ may be realized infinitely often as G(fc, Q(c)) for some quadratic algebraic number c. We
895
+ begin with the simplest case, namely, where X1(P) has genus 0.
896
+ Proposition 5.4. Suppose P ∈ Γ0, and let K/Q be a quadratic field.
897
+ Then there are
898
+ infinitely many c ∈ K ∖ Q such that G(fc, K) ∼= P.
899
+ Proof. Let X := X1(P) ∼=Q P1. Choose an inert prime p ∈ Spec Z such that c : X → P1
900
+ has good reduction at p and such that p > D := deg(c : X → P1). Let p ∈ Spec OK be the
901
+ unique prime lying above p. The good reduction condition implies that the mod-p reduction
902
+ �c of the map c : X → P1 has degree D, and the condition that D < p implies that �c cannot
903
+ map all of P1(Fp2) to P1(Fp). In other words, we may choose a point P0 ∈ X(K) such that
904
+
905
+ c(P0) = �c(�
906
+ P0) ∈ P1(Fp2) ∖ P1(Fp). Note that since ∞ ∈ P1(Fp) and �
907
+ c(P0) /∈ P1(Fp), we must
908
+ have vp(c(P0)) ≥ 0. Then, for any P in the residue class [P0]p, c(P) must be in K ∖ Q,
909
+ and vp(c(P)) ≥ 0. In particular, for all P ∈ [P0]p, fc(P) has no K-rational points of period
910
+ greater than B = B(p2), the bound from Proposition 5.1.
911
+ Let P1, . . . , Pn be the complete list of generic quadratic portraits that minimally contain
912
+ P and which have no cycles of length larger than B, and for each i = 1, . . . , n let
913
+ πi := πPi,P : X1(Pi) −→ P1
914
+ be the morphism from Proposition 2.6(b). If P ∈ [P0]P and G(fc(P), K) properly contains
915
+ P, then G(fc(P), K) must contain one of the portraits Pi. By Hilbert irreducibility, the set
916
+ [P0]p ∖
917
+ n�
918
+ i=1
919
+ πi
920
+
921
+ X1(Pi)(K)
922
+
923
+ is infinite. Thus, there are infinitely many c ∈ K ∖ Q such that G(fc, K) ∼= P.
924
+
925
+ We now consider the portraits P ∈ Γ ∖ Γ0; that is, the portraits for which X1(P) has
926
+ genus 1 or 2. We begin with a useful consequence of Theorem 4.1.
927
+ Corollary 5.5. Let P be a generic quadratic portrait such that X1(P) has positive genus.
928
+ If P′ is any generic quadratic portrait properly containing P, then X1(P′) has finitely many
929
+ quadratic points.
930
+
931
+ 18
932
+ JOHN R. DOYLE AND DAVID KRUMM
933
+ Proof. If X1(P′) has infinitely many quadratic points, then so does X1(P), and therefore
934
+ both P and P′ are elements of Γ. By simply inspecting the portraits in Γ, the only way we
935
+ can have P, P′ ∈ Γ and P ⊊ P′ is if P ∈ Γ0; that is, if X1(P) has genus 0.
936
+
937
+ Combining Corollary 5.5 and Proposition 5.1 gives us the following sufficient condition for
938
+ P to be realized infinitely often as G(fc, K) over quadratic fields K. For an algebraic curve
939
+ X defined over a field k, we denote by X(k, 2) the set of all points on X of degree at most
940
+ 2 over k. For a prime p ∈ Spec Z and an element α ∈ Q, the phrase “vp(α) ≥ 0” should be
941
+ read to mean “there exists some extension p ∈ Spec OQ(α) of p such that vp(α) ≥ 0.”
942
+ Lemma 5.6. Let P be a generic quadratic portrait such that X1(P) has genus 1 or 2. Fix
943
+ a prime p ∈ Spec Z, and consider the set
944
+ Sp,P := {β ∈ X1(P)(Q, 2) : vp(c(β)) ≥ 0}.
945
+ For all but finitely many β ∈ Sp,P, we have G(fc(β), Q(β)) ∼= P.
946
+ Proof. Suppose β ∈ Sp,P, set c := c(β), and let K := Q(β). Removing at most finitely many
947
+ points β ∈ Sp,P, we may assume that G(fc, K) is generic quadratic. Since β ∈ X1(P)(K)
948
+ and G(fc, K) is generic quadratic, G(fc, K) has a subportrait isomorphic to P.
949
+ Let p ∈ Spec OK be a prime lying above p. Since p has norm at most p2, the map fc
950
+ has no K-rational points of period larger than B := B(p2). Thus, as explained following
951
+ Proposition 5.1, if G(fc, K) ̸∼= P, then G(fc, K) must contain one of finitely many portraits
952
+ P1, . . . , Pn properly containing P. But each of the curves X1(Pi) has only finitely many
953
+ quadratic points by Corollary 5.5; this completes the proof.
954
+
955
+ Proposition 5.7. Let P ∈ Γrat. If K is a quadratic field and c ∈ K satisfies G(fc, K) ∼= P,
956
+ then c ∈ Q.
957
+ Proof. For P ∈ {8(4), 10(3, 1, 1), 10(3, 2)}, this follows immediately from Theorems 3.16,
958
+ 3.25, and 3.28 of [13]. For the remaining portraits P—namely, 8(1,1)a and 8(2)a—the proofs
959
+ are similar, so we only provide the details for 8(1,1)a.
960
+ Let P = 8(1, 1)a. As shown in Appendix A, X1(P) is isomorphic to the elliptic curve E
961
+ with affine model y2 = x3 − x2 + x, which is the curve labeled 24A4 in [9] and 24.a5 in [31].
962
+ We claim that if P = (x, y) is a quadratic point on E, then c(P) = − (x2+1)2
963
+ 4x(x−1)2 ∈ Q. This is
964
+ certainly the case if x ∈ Q, so assume that x is quadratic.
965
+ By Lemma 3.3, there exist P0 = (x0, y0) ∈ E(Q) ∖ ∞ and t ∈ Q such that
966
+ (5.1)
967
+ x2 + (x0 − t2 − 1)x + (x2
968
+ 0 + t2x0 − x0 − 2y0t + 1) = 0.
969
+ The only affine rational points (x0, y0) on E are (0, 0) and (1, ±1), and for each of these
970
+ points we can use (5.1) to rewrite c(P) as a function of t and x which has degree at most 1
971
+ in x. For the points (0, 0), (1, 1), and (1, −1), respectively, we get
972
+ c = −
973
+ (t2 + 1)2
974
+ 4(t − 1)(t + 1),
975
+ c = −t2 (t2 − 2t + 2)
976
+ 4(t − 1)2
977
+ , and
978
+ c = −t2 (t2 + 2t + 2)
979
+ 4(t + 1)2
980
+ .
981
+ In any case, since t ∈ Q, we must also have c ∈ Q.
982
+
983
+
984
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
985
+ 19
986
+ Proposition 5.8. For all P ∈ Γ0 ∪ Γquad there exist infinitely many c ∈ Q(2) such that
987
+ G(fc, Q(c)) ∼= P.
988
+ Proof. For the portraits in Γ0, this follows from Proposition 5.4. The proofs for 8(1,1)b and
989
+ 8(2)b (resp., 10(2,1,1)a and 10(2,1,1)b) are very similar, so we only provide the details for
990
+ 8(1,1)b, 10(2,1,1)a, and 8(3).
991
+ First, let P be the portrait 8(1,1)b. Appendix A shows that X1(P) is isomorphic to the
992
+ curve X with affine model y2 = 2(x3 + x2 − x + 1), with c : X → P1 given by
993
+ c = −
994
+ 2(x2 + 1)
995
+ (x + 1)2(x − 1)2.
996
+ Set P0 = (x0, y0) := (1, 2) ∈ X(Q). For t ∈ Q, the line y − 2 = t(x − 1) intersects the curve
997
+ X at P0 and two additional points Pt and P t. Since t and P0 are rational, either Pt and P t
998
+ are rational as well, or Pt and P t are quadratic conjugates. Since X(Q) is finite, we may,
999
+ at the expense of excluding finitely many t, assume that Pt and P t are quadratic Galois
1000
+ conjugates. Let K := Q(Pt), and let τ be the nontrivial element of Gal(K/Q). With this
1001
+ setup, we have Pt + P t = −P0 ̸= O, so y(Pt) ̸= −y(P t) = −y(Pt)τ, and therefore x(Pt) /∈ Q.
1002
+ By calculating the intersection of y − 2 = t(x − 1) with the affine curve X, we find that the
1003
+ minimal polynomial of x(Pt) must be
1004
+ x2 − t2 − 4
1005
+ 2
1006
+ x + t2 − 4t + 2
1007
+ 2
1008
+ .
1009
+ Thus, we may rewrite c(Pt) as
1010
+ c(Pt) =
1011
+ t + 2
1012
+ 8(t − 2)x(Pt) − t5 − 10t3 + 8t2 + 8t + 32
1013
+ 16(t − 2)2t
1014
+ .
1015
+ Finally, for any t ∈ Q with t ≡ 1 (mod 3), we see that x(Pt) and c(Pt) are integral at p = 3,
1016
+ so Pt ∈ S3,P. By Lemma 5.6, we conclude that there are infinitely many quadratic c with
1017
+ G(fc, Q(c)) ∼= P.
1018
+ Next, we let P be the portrait 10(2,1,1)a, and we take X to be the curve defined by
1019
+ y2 + xy + y = x3 − x2 − x with map c : X → P1 given by
1020
+ c =
1021
+ x − 2
1022
+ 4x(x − 1)y − x4 − x3 + 3x − 1
1023
+ 4x2(x − 1)
1024
+ .
1025
+ By Hilbert irreducibility, there are infinitely many points on X with x ∈ Q, x ≡ 2 (mod 3),
1026
+ and y /∈ Q. For all such points P = (x, y), c(P) must be quadratic, and we have P ∈ S3,P.
1027
+ The desired conclusion again follows from Lemma 5.6.
1028
+ Finally, we let P be the portrait 8(3). Let X be the curve y2 = x6−2x4+2x3+5x2+2x+1
1029
+ with c : X → P1 given by
1030
+ c = −x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
1031
+ 4x2(x + 1)2
1032
+ .
1033
+ The curve X has two rational points at infinity; we denote these by ∞+ and ∞−. These two
1034
+ points are transposed by the hyperelliptic involution ι : X → X given by ι(x, y) = (x, −y).
1035
+ Let J be the Jacobian of the genus-2 curve X. For a thorough treatment of the arithmetic
1036
+ of genus-2 curves, we recommend [7]; here, we just summarize the necessary properties.
1037
+
1038
+ 20
1039
+ JOHN R. DOYLE AND DAVID KRUMM
1040
+ Points on J correspond to degree-0 divisor classes on X. Moreover, by the Riemann–Roch
1041
+ theorem, every nontrivial divisor class can be written uniquely as
1042
+ {P, Q} := [P + Q − ∞+ − ∞−]
1043
+ with P, Q ∈ X and Q ̸= ι(P), up to swapping P and Q. (The trivial class O is equal to
1044
+ {P, ι(P)} for all P ∈ X.) A point {P, Q} ̸= O is rational if and only if either P and Q are
1045
+ both rational themselves, or P and Q are Galois-conjugate quadratic points.
1046
+ Fix the point
1047
+ P0 :=
1048
+
1049
+ −1
1050
+ 4
1051
+
1052
+ 1 +
1053
+
1054
+ −15
1055
+
1056
+ , − 1
1057
+ 16
1058
+
1059
+ 17 + 9
1060
+
1061
+ −15
1062
+ ��
1063
+ ∈ X(Q, 2),
1064
+ for which we have c(P0) =
1065
+ 1
1066
+ 48
1067
+
1068
+ 7 + 8√−15
1069
+
1070
+ /∈ Q. If we let
1071
+ P 0 :=
1072
+
1073
+ −1
1074
+ 4
1075
+
1076
+ 1 −
1077
+
1078
+ −15
1079
+
1080
+ , − 1
1081
+ 16
1082
+
1083
+ 17 − 9
1084
+
1085
+ −15
1086
+ ��
1087
+ be the Galois conjugate of P0, then D0 := {P0, P 0} ∈ J(Q). Note that P 0 ̸= ι(P0), so
1088
+ D0 ̸= O. Poonen showed in [43, Prop. 1] that J(Q) ∼= Z, so D0 has infinite order.
1089
+ The curve X (hence also its Jacobian J) has good reduction at the prime p = 7. A straight-
1090
+ forward computation (e.g., in Magma) shows that the reduction �D0 ∈ J(F7) has order 21,
1091
+ so Dn := (1 + 21n)D0 ≡ D0 (mod 7) for all n ∈ Z. For each n we write Dn = {Pn, P n}
1092
+ with Pn ≡ P0 (mod 7) and P n ≡ P 0 (mod 7). We claim that Pn ∈ S7,P for all n ∈ Z, from
1093
+ which the result follows by Lemma 5.6.
1094
+ Since −15 ≡ −1 (mod 7) is not a square in F7, �
1095
+ P0 is quadratic over F7, thus the same is
1096
+ true for �
1097
+ Pn for all n ∈ Z. This implies that Pn is quadratic over Q for all n.
1098
+ The map c : X → P1 has good reduction at p = 7, so Pn ≡ P0 (mod 7) implies that
1099
+ c(Pn) ≡ c(P0) (mod 7). Arguing as in the previous paragraph, we conclude that c(Pn)
1100
+ is quadratic over Q. Finally, we note that since c(Pn) ≡ c(P0) ̸≡ ∞ (mod 7), we have
1101
+ v7(c(Pn)) ≥ 0, so Pn ∈ S7,P.
1102
+
1103
+ 5.3. Proofs of Theorems 1.6 and 1.7.
1104
+ Proof of Theorem 1.6. That (ii) implies (i) is precisely the second statement in Proposi-
1105
+ tion 5.2, so it remains only to show that (i) implies (ii).
1106
+ Assume there are infinitely many c ∈ Q such that G(fc, Q) ⊊ G(fc, K) ∼= P for some
1107
+ quadratic field K.
1108
+ Every such occurrence of P as G(fc, K) yields a quadratic point on
1109
+ Y1(P), so there are infinitely many quadratic points on X1(P). Thus P ∈ Γ by Theorem 4.1.
1110
+ All that remains for us to show is that P cannot be isomorphic to ∅ or 6(3). Certainly
1111
+ one cannot have G(fc, Q) ⊊ G(fc, K) ∼= ∅, so we need only show that if c ∈ Q and K is a
1112
+ quadratic field with G(fc, K) ∼= 6(3), then in fact G(fc, Q) ∼= 6(3).
1113
+ Supposing that G(fc, K) ∼= 6(3), the map fc then has a period-3 point α ∈ K, and the six
1114
+ K-rational preperiodic points prescribed by the portrait 6(3) are ±α, ±fc(α), and ±f 2
1115
+ c (α).
1116
+ It therefore suffices to show that α ∈ Q.
1117
+ Let τ be the nontrivial element of the Galois group Gal(K/Q). Since fc is defined over Q,
1118
+ ατ is also a K-rational point of period 3, hence lies in the cycle {α, fc(α), f 2
1119
+ c (α)} (because
1120
+
1121
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
1122
+ 21
1123
+ the portrait 6(3) has only one 3-cycle2). Write ατ = f k
1124
+ c (α) for some k ∈ {0, 1, 2}. Then
1125
+ α = (ατ)τ = f k
1126
+ c (ατ) = f 2k
1127
+ c (α).
1128
+ Since α has exact period 3, this implies that k = 0; that is, ατ = α. Thus α ∈ Q, and
1129
+ therefore G(fc, Q) ∼= 6(3).
1130
+
1131
+ Proof of Theorem 1.7. First suppose that (i) holds; i.e., there are infinitely many c ∈ Q(2) ∖ Q
1132
+ such that G(fc, Q(c)) ∼= P. The curve X1(P) then has infinitely many quadratic points, and
1133
+ therefore P ∈ Γ by Theorem 4.1. By Proposition 5.7, we must have
1134
+ P ∈ Γ ∖ Γrat = Γ0 ∪ Γquad.
1135
+ Thus, (i) implies (ii). The converse is precisely Proposition 5.8.
1136
+
1137
+ 6. Fields of definition of quadratic points
1138
+ In this section we address the question of whether the existence of a given preperiodic
1139
+ portrait over a given quadratic field has implications regarding standard arithmetic invariants
1140
+ of that field. In particular, we focus on the portraits that occur infinitely often over quadratic
1141
+ fields, namely those in the set Γ.
1142
+ To be precise, we are interested in arithmetic invariants of the fields of definition of qua-
1143
+ dratic points on dynamical modular curves X1(P). To partially justify the transition from
1144
+ realizations of portraits to simply points on dynamical modular curves, we begin by proving
1145
+ the following result:
1146
+ Proposition 6.1. For a number field K and a generic quadratic portrait P, the following
1147
+ are equivalent:
1148
+ (i) There exist infinitely many c ∈ K such that G(fc, K) ∼= P.
1149
+ (ii) The curve X1(P) has infinitely many K-rational points.
1150
+ Proof. That (i) implies (ii) is immediate from the definition of X1(P), so suppose that
1151
+ X1(P)(K) is infinite. Since X1(P) is irreducible (see Proposition 2.6(a)), this implies that
1152
+ X1(P) is isomorphic over K either to P1 or to an elliptic curve.
1153
+ In the former case, the result follows from essentially the same proof as for Proposition 5.4.
1154
+ In fact, the appropriate modification of that proof shows that there are infinitely many c ∈ K
1155
+ such that Q(c) = K and such that G(fc, K) ∼= P.
1156
+ In the latter case, choose a non-torsion point Q0 ∈ X1(P)(K), and choose a prime p ∈
1157
+ Spec OK of good reduction for the morphism c : X1(P) → P1 such that vp(Q0) ≥ 0. Since Q0
1158
+ is non-torsion, there are infinitely many points Q ∈ X1(P)(K) such that Q ≡ Q0 (mod p),
1159
+ and since the morphism c has good reduction at p, we have c(Q) ≡ c(Q0) (mod p) for every
1160
+ such Q. In particular, we have infinitely many Q ∈ X1(P)(K) such that vp(c(Q)) ≥ 0, so
1161
+ the desired result follows from Lemma 5.6.
1162
+
1163
+ We now move on to a result concerning the splitting of rational primes in the quadratic
1164
+ fields over which the portrait 10(3, 1, 1) is realized as a preperiodic portrait. This example
1165
+ is included in order to illustrate our methods, but similar reasoning can be applied to any
1166
+ portrait in Γ for which the corresponding modular curve is hyperelliptic.
1167
+ 2In fact, if K is any quadratic field and c ∈ K, then fc has at most one 3-cycle defined pointwise over K.
1168
+ This follows from [36, Thm. 3] when c ∈ Q and [10, Thm. 4.5] in general.
1169
+
1170
+ 22
1171
+ JOHN R. DOYLE AND DAVID KRUMM
1172
+ As noted in [43], the dynamical modular curve corresponding to the portrait 10(3, 1, 1)
1173
+ is isomorphic to Xell
1174
+ 1 (18). If K is the field of definition of a quadratic point on this curve,
1175
+ Kenku and Momose [26, Prop. 2.4] show that
1176
+ • either 2 splits or 3 does not split in K;
1177
+ • 3 is not inert in K; and
1178
+ • 5 and 7 are unramified in K.
1179
+ In what follows, for every polynomial f ∈ Z[x], we denote by πf the set of all integer primes
1180
+ p such that f does not have a root modulo p. Extending the results of Kenku and Momose,
1181
+ we prove the following. (Note that this proves Theorem 1.10.)
1182
+ Theorem 6.2. Let K be a quadratic field such that G(fc, K) ∼= 10(3, 1, 1) for some c ∈ K.
1183
+ Then the prime 2 splits in K, 3 is not inert in K, and letting
1184
+ f(x) = x6 + 2x5 + 5x4 + 10x3 + 10x2 + 4x + 1,
1185
+ every prime in the set πf (which includes 5 and 7) is unramified in K. Moreover, πf has
1186
+ Dirichlet density 13/18.
1187
+ For every nonzero rational number r, we let sqf(r) denote the squarefree part of r, i.e.,
1188
+ the unique squarefree integer d such that r/d is the square of a rational number.
1189
+ Lemma 6.3. Let f ∈ Z[x] be a monic polynomial of even degree, and let p be an odd prime.
1190
+ If p ∈ πf, then p is unramified in every quadratic field of the form Q(
1191
+
1192
+ f(r)) with r ∈ Q.
1193
+ Proof. Given a quadratic field K = Q(
1194
+
1195
+ f(r)), we must show that p does not divide the
1196
+ discriminant of K. Let D = sqf(f(r)), so that K = Q(
1197
+
1198
+ D). Since p is odd, it suffices to
1199
+ show that p does not divide D. Set g(x, y) = y2kf(x/y) ∈ Z[x, y], where deg(f) = 2k, and
1200
+ write r = n/d with gcd(n, d) = 1. Then D = sqf(g(n, d)), so that
1201
+ g(n, d) = Ds2,
1202
+ s ∈ Z.
1203
+ We now consider two cases. If d ≡ 0 mod p, then the above equation can be reduced
1204
+ modulo p to obtain n2k ≡ Ds2 mod p. Since p cannot divide n (given that n and d are
1205
+ coprime), we conclude that p does not divide D, as required.
1206
+ Suppose now that d ̸≡ 0 mod p. We can then consider the equation d2kf(n/d) = Ds2 as
1207
+ taking place in the ring Zp. If p | D, then reducing modulo p we obtain f(n/d) ≡ 0 mod p,
1208
+ contradicting the hypothesis that f has no root modulo p. Therefore p cannot divide D.
1209
+
1210
+ Proof of Theorem 6.2. By [13, Thm. 3.25], we have K = Q(
1211
+
1212
+ f(r)) for some r ∈ Q∖{0, −1}.
1213
+ Writing r = n/d in lowest terms, it follows that K = Q(
1214
+
1215
+ g(n, d)), where
1216
+ g(n, d) := d6f(n/d) = n6 + 2n5d + 5n4d2 + 10n3d3 + 10n2d4 + 4nd5 + d6.
1217
+ We claim that g(n, d) ≡ 1 mod 8. If n, d are both odd, then
1218
+ g(n, d) ≡ 1 + 2nd + 5 + 10nd + 10 + 4nd + 1 = 17 + 16nd ≡ 1 mod 8.
1219
+ If n is even and d is odd, then g(n, d) ≡ d6 ≡ 1 mod 8. If n is odd and d is even, then
1220
+ g(n, d) ≡ 1 + 2nd + 5d2 mod 8. Writing n = 2k + 1 for some integer k we see that
1221
+ g(n, d) ≡ 5d2 + 2d + 1 ≡ (d + 1)2 ≡ 1 mod 8,
1222
+ which proves the claim. Letting D = sqf(g(n, d)), the fact that g(n, d) ≡ 1 (mod 8) implies
1223
+ that D ≡ 1 mod 8 and therefore 2 splits in Q(
1224
+
1225
+ D) = K.
1226
+
1227
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
1228
+ 23
1229
+ Similar reasoning shows that g(n, d) is congruent to either 0 or 1 modulo 3. Considering
1230
+ all possible values of n and d modulo 9, we find that if g(n, d) is divisible by 9, then n and
1231
+ d are both divisible by 3, which is a contradiction; hence 9 ∤ g(n, d). Writing g(n, d) = Ds2
1232
+ for some integer s, this implies that s is not divisible by 3, and therefore g(n, d) ≡ D mod 3.
1233
+ Hence, D is congruent to 0 or 1 modulo 3, and therefore 3 is not inert in K.
1234
+ A computation in Magma based on [27, Thm. 2.1] shows that πf has Dirichlet density
1235
+ 13/18. Finally, Lemma 6.3 implies that every odd prime in πf is unramified in K, and we
1236
+ have already shown that 2 is unramified in K.
1237
+
1238
+ An argument very similar to the proof of Theorem 6.2 yields the following result, in which
1239
+ the relevant dynamical modular curve is known to be isomorphic to Xell
1240
+ 1 (13).
1241
+ Theorem 6.4. Let K be a quadratic field such that G(fc, K) ∼= 10(3, 2) for some c ∈ K.
1242
+ Then the prime 2 splits in K, and every prime in πf is unramified in K, where
1243
+ f(x) = x6 + 2x5 + x4 + 2x3 + 6x2 + 4x + 1.
1244
+ Moreover, the set πf has Dirichlet density 13/18.
1245
+ Our next result concerns the curve Xell
1246
+ 1 (16), which is isomorphic to the modular curve for
1247
+ the portrait 8(4); see Section 3.7 of [13]. In contrast to Theorems 6.2 and 6.4, we show that
1248
+ the discriminants of quadratic fields defined by points on Xell
1249
+ 1 (16) are not restricted to any
1250
+ residue class. (Note that this proves Theorem 1.9(a).)
1251
+ Theorem 6.5. Let P denote the portrait 8(4). For every prime integer p and every residue
1252
+ class c ∈ Z/pZ, there exist infinitely many squarefree integers d ∈ c such that the curve
1253
+ X1(P) has a quadratic point defined over the field Q(
1254
+
1255
+ d).
1256
+ For the proof of the theorem we use the methods of [28] and [29]; the following lemma,
1257
+ which follows from Proposition 14 in [29], collects the main tools to be used.
1258
+ Lemma 6.6. Let f ∈ Z[x] be a squarefree polynomial of degree at least 3, and such that
1259
+ every irreducible factor of f has degree at most 6. Let
1260
+ S(f) = {sqf(f(x)) : x ∈ Q and f(x) ̸= 0}.
1261
+ Let D be the largest integer dividing all integer values of f. Fix a prime p such that f has
1262
+ an irreducible factor whose discriminant is not divisible by p, and let ε = εp ∈ {0, 1} be
1263
+ the parity of ordp(D). Finally, for c ∈ Z/pZ and v ∈ Z, let σ(p, c, v) denote the following
1264
+ statement.
1265
+ (6.1)
1266
+ σ(p, c, v) :
1267
+
1268
+
1269
+
1270
+
1271
+
1272
+ There exist h ∈ c and x0, y0 ∈ Z satisfying
1273
+ • hy2
1274
+ 0 ≡ f(x0) (mod p2(v+ε)+1) and
1275
+ • ordp(y0) = v + ε.
1276
+ Suppose c is nonzero and σ(p, c, v) holds for some v ≥ 0. Then the set S(f) ∩ c is infinite.
1277
+ Proof of Theorem 6.5. By [38, p. 93], the curve X1(P) is hyperelliptic and has an affine
1278
+ model given by y2 = f(x), where f(x) = −x(x2 + 1)(x2 − 2x − 1).
1279
+ In order to prove the theorem it suffices to show that, for every prime p and residue class
1280
+ c ∈ Z/pZ, the set S(f)∩c is infinite. Indeed, if d belongs to this set, we may write dy2
1281
+ 0 = f(x0)
1282
+ for some rational numbers x0, y0 with y0 ̸= 0. The pair (x0, y0
1283
+
1284
+ d) then represents a quadratic
1285
+ point on X1(P) whose field of definition is Q(
1286
+
1287
+ d). Hence, the theorem follows.
1288
+
1289
+ 24
1290
+ JOHN R. DOYLE AND DAVID KRUMM
1291
+ In the notation of Lemma 6.6, for the above polynomial f(x) we have D = 2; moreover,
1292
+ the irreducible factor x of f(x) has discriminant 1, which is coprime to every prime p. It
1293
+ follows in particular that
1294
+ εp =
1295
+
1296
+ 0
1297
+ if p is odd,
1298
+ 1
1299
+ if p = 2.
1300
+ Fix a prime p. For the class c = 0 ∈ Z/pZ, Theorem 2.1 in [28] implies that the set
1301
+ S(f) ∩ c is infinite, as desired. (When p = 2, the hypotheses of the cited theorem are not all
1302
+ satisfied, but the proof still applies.) Next, we claim that
1303
+ for every nonzero c ∈ Z/pZ, either σ(p, c, 0) or σ(p, c, 1) must hold.
1304
+ Assuming this claim for the moment, Lemma 6.6 implies that the set S(f) ∩ c is infinite,
1305
+ completing the proof of the theorem.
1306
+ To prove the claim we consider first the case p = 2: taking c = 1, the statement σ(p, c, 1)
1307
+ can be shown to hold by setting (h, x0, y0) = (1, 16, 4) in (6.1). The remainder of the proof
1308
+ is divided into three cases.
1309
+ Case p ≤ 5: Taking p = 3, we check that σ(p, c, 1) holds for c = 1, 2 by using the tuples
1310
+ (h, x0, y0) = (1, 9, 3)
1311
+ and
1312
+ (h, x0, y0) = (2, 18, 3).
1313
+ Similarly, taking p = 5, we check that σ(p, c, 1) holds for c = 1, 2, 3, 4, respectively, by using
1314
+ the following tuples (h, x0, y0):
1315
+ (1, 25, 5), (2, 18, 5), (3, 75, 5), (4, 7, 5).
1316
+ In the remaining two cases we show that σ(p, c, 0) holds. For r ∈ c, let Xr be the hy-
1317
+ perelliptic curve over Fp defined by the equation ry2 = f(x). Since εp = 0, the statement
1318
+ σ(p, c, 0) is equivalent to the requirement that Xr have an affine point (x0, y0) ∈ Xr(Fp) with
1319
+ y0 ̸= 0; we refer to such points as nontrivial points on Xr. Thus, it remains to show that Xr
1320
+ has at least one nontrivial point.
1321
+ Case 7 ≤ p ≤ 23: A straightforward search for points verifies that #Xr(Fp) ≥ 7 for every
1322
+ nonzero r ∈ Fp. (Note that it suffices to check this for just two values of r, one in each
1323
+ square class modulo p.) The number of affine points (x0, y0) ∈ Xr(Fp) having y0 = 0 is at
1324
+ most 5, so there must exist at least one nontrivial point in Xr(Fp), as required.
1325
+ Case p ≥ 29: For r ∈ Fp ∖ 0, the curve Xr has genus 2, so the Hasse–Weil bound yields
1326
+ #Xr(Fp) ≥ ⌊p + 1 − 4√p⌋ ≥ 7.
1327
+ The same reasoning as in the previous case implies that Xr has a nontrivial Fp-point.
1328
+
1329
+ We end the paper by proving Theorem 1.9(b).
1330
+ Proposition 6.7. Let P = 8(4). There exist infinitely many imaginary quadratic fields K
1331
+ with class number divisible by 10, such that X1(P) has a quadratic point defined over K.
1332
+ Proof. As noted earlier, the curve X1(P) is isomorphic to Xell
1333
+ 1 (16). The result follows from
1334
+ [20, Cor. 3.2], since the Jacobian J1(16) has a rational torsion point of order 10.
1335
+
1336
+ Remark 6.8. Experimental evidence supports a statement stronger than Proposition 6.7:
1337
+ for every imaginary quadratic field K ̸= Q(√−15) that is the field of definition of a point on
1338
+ X1(P), the class number of K is divisible by 10. One approach to proving this is suggested
1339
+ by the methods of [2, 20]; however, the required computational tools (in particular, for
1340
+ computing quotients of abelian varieties) do not seem to be presently available.
1341
+
1342
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
1343
+ 25
1344
+ Appendix A. Dynamical modular curves of genera 1 and 2
1345
+ We provide here models for all dynamical modular curves X1(P) of genus 1 or 2, together
1346
+ with an explicit description of the morphism c : X1(P) → P1. Each of these models appears
1347
+ in [43]. Note that in some cases we provide two models—one of the form y2 = F(x), and
1348
+ another that turns out to be more useful for certain aspects of our proofs.
1349
+ Portrait P
1350
+ Model(s) for X1(P)
1351
+ Morphism c : X1(P) → P1
1352
+ 8(1,1)a
1353
+ y2 = x3 − x2 + x
1354
+ − (x2 + 1)2
1355
+ 4x(x − 1)2
1356
+ 8(1,1)b
1357
+ y2 = 2(x3 + x2 − x + 1)
1358
+
1359
+ 2(x2 + 1)
1360
+ (x + 1)2(x − 1)2
1361
+ 8(2)a
1362
+ y2 = x3 − 2x + 1
1363
+ −(x2 − 2x + 2)(x2 + 2x − 2)
1364
+ 4x2(x − 1)
1365
+ 8(2)b
1366
+ y2 = 2(x3 + x2 − x + 1)
1367
+ −x4 + 2x3 + 2x2 − 2x + 1
1368
+ (x + 1)2(x − 1)2
1369
+ 10(2,1,1)a
1370
+ y2 = 5x4 − 8x3 + 6x2 + 8x + 5
1371
+ −(3x2 + 1)(x2 + 3)
1372
+ 4(x + 1)2(x − 1)2
1373
+ y2 + xy + y = x3 − x2 − x
1374
+ x − 2
1375
+ 4x(x − 1)y − x4 − x3 + 3x − 1
1376
+ 4x2(x − 1)
1377
+ 10(2,1,1)b
1378
+ y2 = (5x2 − 1)(x2 + 3)
1379
+ −(3x2 + 1)(x2 + 3)
1380
+ 4(x + 1)2(x − 1)2
1381
+ y2 + xy + y = x3 + x2
1382
+
1383
+ x + 2
1384
+ 4x(x + 1)y − x4 + 4x3 + 6x2 + 3x + 1
1385
+ 4x2(x + 1)
1386
+ 8(3)
1387
+ y2 = x6 − 2x4 + 2x3 + 5x2 + 2x + 1
1388
+ −x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
1389
+ 4x2(x + 1)2
1390
+ 8(4)
1391
+ y2 = −x(x2 + 1)(x2 − 2x − 1)
1392
+ (x2 − 4x − 1)(x4 + x3 + 2x2 − x + 1)
1393
+ 4x(x + 1)2(x − 1)2
1394
+ 10(3,1,1)
1395
+ y2 = x6 + 2x5 + 5x4 + 10x3 + 10x2 + 4x + 1
1396
+ −x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
1397
+ 4x2(x + 1)2
1398
+ 10(3,2)
1399
+ y2 = x6 + 2x5 + x4 + 2x3 + 6x2 + 4x + 1
1400
+ −x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
1401
+ 4x2(x + 1)2
1402
+
1403
+ 26
1404
+ JOHN R. DOYLE AND DAVID KRUMM
1405
+ Appendix B. Tables of preperiodic portraits
1406
+ B.1. Preperiodic portraits realized over quadratic fields. We list here the 46 portraits
1407
+ known to be realized as G(fc, K) for some quadratic field K and c ∈ K. These were found in
1408
+ the search described in [13]. The label of each portrait is in the form N(ℓ1, ℓ2, . . .), where N
1409
+ is the number of vertices in the portrait and ℓ1, ℓ2, . . . are the lengths of the directed cycles
1410
+ in the portrait in nonincreasing order. If more than one isomorphism class with this data
1411
+ was observed, we add a lowercase Roman letter to distinguish them. For example, the labels
1412
+ 5(1,1)a and 5(1,1)b correspond to the two isomorphism classes of portraits observed that
1413
+ have five vertices and two fixed points. In all figures, we omit the vertex corresponding to
1414
+ the fixed point at infinity.
1415
+ 0
1416
+ 2(1)
1417
+ 3(1,1)
1418
+ 3(2)
1419
+ 4(1)
1420
+ 4(1,1)
1421
+ 4(2)
1422
+ 5(1,1)a
1423
+ 5(1,1)b
1424
+ 5(2)a
1425
+ 5(2)b
1426
+ 6(1,1)
1427
+ 6(2)
1428
+ 6(2,1)
1429
+ 6(3)
1430
+ 7(1,1)a
1431
+ 7(1,1)b
1432
+ 7(2,1,1)a
1433
+
1434
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
1435
+ 27
1436
+ 7(2,1,1)b
1437
+ 8(1,1)a
1438
+ 8(1,1)b
1439
+ 8(2)a
1440
+ 8(2)b
1441
+ 8(2,1,1)
1442
+ 8(3)
1443
+ 8(4)
1444
+ 9(2,1,1)
1445
+ 10(1,1)a
1446
+ 10(1,1)b
1447
+ 10(2)
1448
+ 10(2,1,1)a
1449
+ 10(2,1,1)b
1450
+ 10(3)a
1451
+ 10(3)b
1452
+ 10(3,1,1)
1453
+
1454
+ 28
1455
+ JOHN R. DOYLE AND DAVID KRUMM
1456
+ 10(3,2)
1457
+ 12(2)
1458
+ 12(2,1,1)a
1459
+ 12(2,1,1)b
1460
+ 12(3)
1461
+ 12(4)
1462
+ 12(4,2)
1463
+ 12(6)
1464
+ 14(2,1,1)
1465
+ 14(3,1,1)
1466
+ 14(3,2)
1467
+
1468
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
1469
+ 29
1470
+ B.2. Additional portraits. The following portraits are not known to be realized over qua-
1471
+ dratic fields (and, in some cases, have been shown not to be); however, they make an
1472
+ appearance in the discussion in Section 4.2, so we include them here. The labels G1, . . . , G10
1473
+ are taken from [10].
1474
+ G1
1475
+ G2
1476
+ G3
1477
+ G4
1478
+ G5
1479
+ G6
1480
+ G7
1481
+ G8
1482
+ G9
1483
+ G10
1484
+
1485
+ 30
1486
+ JOHN R. DOYLE AND DAVID KRUMM
1487
+ References
1488
+ [1] Robert L. Benedetto, Ruqian Chen, Trevor Hyde, Yordanka Kovacheva, and Colin White, Small dy-
1489
+ namical heights for quadratic polynomials and rational functions, Exp. Math. 23 (2014), no. 4, 433–447.
1490
+ MR 3277939
1491
+ [2] Yuri Bilu and Jean Gillibert, Chevalley-Weil theorem and subgroups of class groups, Israel J. Math. 226
1492
+ (2018), no. 2, 927–956. MR 3819714
1493
+ [3] J´er´emy Blanc, Jung Kyu Canci, and Noam D. Elkies, Moduli spaces of quadratic rational maps with
1494
+ a marked periodic point of small order, Int. Math. Res. Not. IMRN (2015), no. 23, 12459–12489.
1495
+ MR 3431627
1496
+ [4] Wieb Bosma, John Cannon, and Catherine Playoust, The Magma algebra system. I. The user language,
1497
+ J. Symbolic Comput. 24 (1997), no. 3-4, 235–265, Computational algebra and number theory (London,
1498
+ 1993). MR 1484478
1499
+ [5] Johan Bosman, Peter Bruin, Andrej Dujella, and Filip Najman, Ranks of elliptic curves with prescribed
1500
+ torsion over number fields, Int. Math. Res. Not. IMRN (2014), no. 11, 2885–2923. MR 3214308
1501
+ [6] Jung Kyu Canci and Solomon Vishkautsan, Quadratic maps with a periodic critical point of period 2,
1502
+ Int. J. Number Theory 13 (2017), no. 6, 1393–1417. MR 3656200
1503
+ [7] J. W. S. Cassels and E. V. Flynn, Prolegomena to a middlebrow arithmetic of curves of genus 2,
1504
+ London Mathematical Society Lecture Note Series, vol. 230, Cambridge University Press, Cambridge,
1505
+ 1996. MR 1406090 (97i:11071)
1506
+ [8] Pete L. Clark, On the Hasse principle for Shimura curves, Israel J. Math. 171 (2009), 349–365.
1507
+ MR 2520114
1508
+ [9] J. E. Cremona, Algorithms for modular elliptic curves, second ed., Cambridge University Press, Cam-
1509
+ bridge, 1997. MR 1628193 (99e:11068)
1510
+ [10] John R. Doyle, Preperiodic points for quadratic polynomials with small cycles over quadratic fields,
1511
+ Math. Z. 289 (2018), no. 1-2, 729–786. MR 3803810
1512
+ [11]
1513
+ , Dynamical modular curves for quadratic polynomial maps, Trans. Amer. Math. Soc. 371 (2019),
1514
+ no. 8, 5655–5685. MR 3937306
1515
+ [12]
1516
+ , Preperiodic points for quadratic polynomials over cyclotomic quadratic fields, Acta Arith. 196
1517
+ (2020), no. 3, 219–268. MR 4161298
1518
+ [13] John R. Doyle, Xander Faber, and David Krumm, Preperiodic points for quadratic polynomials over
1519
+ quadratic fields, New York J. Math. 20 (2014), 507–605. MR 3218788
1520
+ [14] John R. Doyle and Bjorn Poonen, Gonality of dynatomic curves and strong uniform boundedness of
1521
+ preperiodic points, Compos. Math. 156 (2020), no. 4, 733–743. MR 4065068
1522
+ [15] John R. Doyle and Joseph H. Silverman, Moduli spaces for dynamical systems with portraits, Illinois J.
1523
+ Math. 64 (2020), no. 3, 375–465. MR 4132597
1524
+ [16] Xander Faber, Benedetto’s trick and existence of rational preperiodic structures for quadratic polynomi-
1525
+ als, Proc. Amer. Math. Soc. 143 (2015), no. 2, 685–694. MR 3283655
1526
+ [17] Najmuddin Fakhruddin, Questions on self maps of algebraic varieties, J. Ramanujan Math. Soc. 18
1527
+ (2003), no. 2, 109–122. MR 1995861 (2004f:14038)
1528
+ [18] E. V. Flynn, Bjorn Poonen, and Edward F. Schaefer, Cycles of quadratic polynomials and rational points
1529
+ on a genus-2 curve, Duke Math. J. 90 (1997), no. 3, 435–463. MR 1480542 (98j:11048)
1530
+ [19] Gerhard Frey, Curves with infinitely many points of fixed degree, Israel J. Math. 85 (1994), no. 1-3,
1531
+ 79–83. MR 1264340
1532
+ [20] Jean Gillibert and Aaron Levin, Pulling back torsion line bundles to ideal classes, Math. Res. Lett. 19
1533
+ (2012), no. 6, 1171–1184. MR 3091601
1534
+ [21] Joe Harris and Joe Silverman, Bielliptic curves and symmetric products, Proc. Amer. Math. Soc. 112
1535
+ (1991), no. 2, 347–356. MR 1055774
1536
+ [22] Benjamin Hutz, Determination of all rational preperiodic points for morphisms of PN, Math. Comp. 84
1537
+ (2015), no. 291, 289–308. MR 3266961
1538
+ [23] Benjamin Hutz and Patrick Ingram, On Poonen’s conjecture concerning rational preperiodic points of
1539
+ quadratic maps, Rocky Mountain J. Math. 43 (2013), no. 1, 193–204. MR 3065461
1540
+ [24] Daeyeol Jeon, Chang Heon Kim, and Andreas Schweizer, On the torsion of elliptic curves over cubic
1541
+ number fields, Acta Arith. 113 (2004), no. 3, 291–301. MR 2069117
1542
+
1543
+ QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
1544
+ 31
1545
+ [25] S. Kamienny, Torsion points on elliptic curves and q-coefficients of modular forms, Invent. Math. 109
1546
+ (1992), no. 2, 221–229. MR 1172689
1547
+ [26] M. A. Kenku and F. Momose, Torsion points on elliptic curves defined over quadratic fields, Nagoya
1548
+ Math. J. 109 (1988), 125–149. MR 931956
1549
+ [27] David Krumm, A local-global principle in the dynamics of quadratic polynomials, Int. J. Number Theory
1550
+ 12 (2016), no. 8, 2265–2297. MR 3562026
1551
+ [28]
1552
+ , Squarefree parts of polynomial values, J. Th´eor. Nombres Bordeaux 28 (2016), no. 3, 699–724.
1553
+ MR 3610693
1554
+ [29] David Krumm and Paul Pollack, Twists of hyperelliptic curves by integers in progressions modulo p,
1555
+ Acta Arith. 192 (2020), no. 1, 63–71. MR 4039488
1556
+ [30] Serge Lang, Fundamentals of Diophantine geometry, Springer-Verlag, New York, 1983. MR 715605
1557
+ [31] The LMFDB Collaboration, The L-functions and modular forms database, http://www.lmfdb.org,
1558
+ 2022, [Online; accessed 12 Dec 2022].
1559
+ [32] David Lukas, Michelle Manes, and Diane Yap, A census of quadratic post-critically finite rational func-
1560
+ tions defined over Q, LMS J. Comput. Math. 17 (2014), no. suppl. A, 314–329. MR 3240812
1561
+ [33] Michelle Manes, Q-rational cycles for degree-2 rational maps having an automorphism, Proc. Lond.
1562
+ Math. Soc. (3) 96 (2008), no. 3, 669–696. MR 2407816
1563
+ [34] B. Mazur, Modular curves and the Eisenstein ideal, Inst. Hautes ´Etudes Sci. Publ. Math. (1977), no. 47,
1564
+ 33–186 (1978). MR 488287 (80c:14015)
1565
+ [35] Fumiyuki Momose, p-torsion points on elliptic curves defined over quadratic fields, Nagoya Math. J. 96
1566
+ (1984), 139–165. MR 771075
1567
+ [36] Patrick Morton, Arithmetic properties of periodic points of quadratic maps, Acta Arith. 62 (1992), no. 4,
1568
+ 343–372. MR 1199627 (93k:12004)
1569
+ [37]
1570
+ , On certain algebraic curves related to polynomial maps, Compositio Math. 103 (1996), no. 3,
1571
+ 319–350. MR 1414593 (97m:14030)
1572
+ [38]
1573
+ , Arithmetic properties of periodic points of quadratic maps. II, Acta Arith. 87 (1998), no. 2,
1574
+ 89–102. MR 1665198 (2000c:11103)
1575
+ [39] Patrick Morton and Joseph H. Silverman, Rational periodic points of rational functions, Internat. Math.
1576
+ Res. Notices (1994), no. 2, 97–110. MR 1264933 (95b:11066)
1577
+ [40] Filip Najman and Antonela Trbovi´c, Splitting of primes in number fields generated by points on some
1578
+ modular curves, Res. Number Theory 8 (2022), no. 2, Paper No. 28. MR 4412569
1579
+ [41] D. G. Northcott, Periodic points on an algebraic variety, Ann. of Math. (2) 51 (1950), 167–177.
1580
+ MR 0034607 (11,615c)
1581
+ [42] T. Pezda, Polynomial cycles in certain local domains, Acta Arith. 66 (1994), no. 1, 11–22. MR 1262650
1582
+ [43] Bjorn Poonen, The classification of rational preperiodic points of quadratic polynomials over Q: a refined
1583
+ conjecture, Math. Z. 228 (1998), no. 1, 11–29. MR 1617987 (99j:11076)
1584
+ [44] Jean-Pierre Serre, Topics in Galois theory, second ed., Research Notes in Mathematics, vol. 1, A K
1585
+ Peters, Ltd., Wellesley, MA, 2008, With notes by Henri Darmon. MR 2363329
1586
+ [45] Joseph H. Silverman, The arithmetic of dynamical systems, Graduate Texts in Mathematics, vol. 241,
1587
+ Springer, New York, 2007. MR 2316407 (2008c:11002)
1588
+ [46] Henning Stichtenoth, Algebraic function fields and codes, second ed., Graduate Texts in Mathematics,
1589
+ vol. 254, Springer-Verlag, Berlin, 2009. MR 2464941 (2010d:14034)
1590
+ [47] Michael Stoll, Rational 6-cycles under iteration of quadratic polynomials, LMS J. Comput. Math. 11
1591
+ (2008), 367–380. MR 2465796 (2010b:11067)
1592
+ [48] Ralph Walde and Paula Russo, Rational periodic points of the quadratic function Qc(x) = x2 +c, Amer.
1593
+ Math. Monthly 101 (1994), no. 4, 318–331. MR 1270956 (95a:11025)
1594
+ [49] Michael Zieve, Cycles of polynomial mappings, Ph.D. thesis, University of California, Berkeley, 1996.
1595
+ Department of Mathematics, Oklahoma State University, Stillwater, OK 74078
1596
+ Email address: [email protected]
1597
+ URL: http://maths.dk
1598
+ Email address: [email protected]
1599
+
19AyT4oBgHgl3EQfofjr/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
19AzT4oBgHgl3EQf8_5O/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:997eab069e25e75af6c80e5900dfb01449ec871ff54a9bd069fa754db58da611
3
+ size 5832749
29E4T4oBgHgl3EQf0A2b/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:40daa96fd47e5a1a9c41ca19392dc65dca723329b2e1bbae46d94cbf76a2b884
3
+ size 2818093
29FIT4oBgHgl3EQf5SvC/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c31e30024c12ad47670b803556aa969e5b0a51a9e31d0e8a01c43a24967141e1
3
+ size 4128813
2dE1T4oBgHgl3EQfSANm/content/tmp_files/2301.03060v1.pdf.txt ADDED
@@ -0,0 +1,1666 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Thermodynamic Correlation Inequality
2
+ Yoshihiko Hasegawa∗
3
+ Department of Information and Communication Engineering,
4
+ Graduate School of Information Science and Technology,
5
+ The University of Tokyo, Tokyo 113-8656, Japan
6
+ (Dated: January 10, 2023)
7
+ Uncertainty relations place fundamental limits on the operations that physical systems can per-
8
+ form. In this Letter, we obtain uncertainty relations that give bounds for the correlation function,
9
+ which measures the relationship between a system’s current state and its future state, in both
10
+ classical and quantum Markov processes. The obtained bounds, referred to as thermodynamic cor-
11
+ relation inequality, state that the change in the correlation function has an upper bound comprising
12
+ the dynamical activity, a measure of the activity of a Markov process. Moreover, applying the ob-
13
+ tained relation to the linear response function, we show that the effect of perturbation has a bound
14
+ comprising the dynamical activity.
15
+ Introduction.—Uncertainty relations imply that there
16
+ are ultimate impossibilities in the physical world that
17
+ cannot be overcome by any technological advances. The
18
+ most well-known example is the Heisenberg uncertainty
19
+ relation [1, 2], which establishes a limit on the precision of
20
+ position-momentum measurement. The quantum speed
21
+ limit is interpreted as the energy-time uncertainty rela-
22
+ tion and places a limit on the speed at which the quan-
23
+ tum state can be changed [3–10] (see [11] for a review).
24
+ It has many applications in quantum computation [12],
25
+ quantum communication [13, 14], and quantum thermo-
26
+ dynamics [5]. Recently, the concept of speed limit has
27
+ also been considered in classical systems [15–17]. In par-
28
+ ticular, the Wasserstein distance can be used to obtain
29
+ the minimum entropy production required for a stochas-
30
+ tic process to transform one probability distribution into
31
+ another [18–22]. Moreover, the speed limit has been gen-
32
+ eralized to the time evolution of the observables [23–27],
33
+ where the speed of the observables is the quantity of in-
34
+ terest. A closely related principle was recently found in
35
+ stochastic thermodynamics, which is known as the ther-
36
+ modynamic uncertainty relation [28–50] (see [51] for a re-
37
+ view), stating that, for thermodynamic systems, higher
38
+ accuracy can be achieved at the expense of larger ther-
39
+ modynamic cost. Nowadays, the thermodynamic uncer-
40
+ tainty relations become a central topic in nonequilibrium
41
+ thermodynamics, and their importance is also recognized
42
+ from a practical standpoint because thermodynamic un-
43
+ certainty relations can be used to infer entropy produc-
44
+ tion without detailed knowledge on the system [52–55].
45
+ In the present Letter, we obtain uncertainty relations
46
+ that confer bounds for the correlation function in classical
47
+ and quantum Markov processes. The correlation function
48
+ is a statistical measure that quantifies the correlation be-
49
+ tween the current state of a system and its future or past
50
+ states. In a Markov process, the correlation function can
51
+ be used to analyze the dependence of the current state on
52
+ past states, and to identify any patterns in the system’s
53
54
+ behavior over time. We derive the thermodynamic corre-
55
+ lation inequality stating that the amount of the correla-
56
+ tion change has an upper bound that comprises the dy-
57
+ namical activity, which quantifies the activity of a system
58
+ of interest. Our derivation is based on the continuous ma-
59
+ trix product state representation [56, 57], which is a real-
60
+ ization of the bulk/boundary correspondence in Markov
61
+ processes. It allows us to represent a classical or quan-
62
+ tum Markov process by the corresponding quantum field
63
+ state, where jump events in the Markov process are rep-
64
+ resented by particle creations in the field state. Since the
65
+ dynamics of the continuous matrix product state is as-
66
+ sumed to obey that of quantum mechanics, we can apply
67
+ the techniques developed in quantum information [58].
68
+ The obtained bound exhibits unexpected generality; it
69
+ holds for classical as well as quantum Markov processes.
70
+ Moreover, it can be generalized to multi-point correlation
71
+ functions and multivariate Markov processes. The cor-
72
+ relation function gives the spectral information via the
73
+ Wiener-Khinchin theorem and plays a fundamental role
74
+ in the linear response theory [59]. The linear response
75
+ function can be represented by a time derivative of the
76
+ corresponding correlation function, which is the state-
77
+ ment of the fluctuation-dissipation theorem.
78
+ Applying
79
+ the obtained correlation bound to the linear response
80
+ function, we derive an upper bound to the perturbation.
81
+ Results.—We derive the thermodynamic correlation in-
82
+ equality for a classical Markov process. A quantum gen-
83
+ eralization will be discussed later. Consider a classical
84
+ Markov process with N states B ≡ {B1, B2, · · · , BN}.
85
+ Let {X(t)|t ≥ 0} be a collection of discrete random vari-
86
+ ables that take values in B (that is X(t) ∈ B). Let P(ν; t)
87
+ be the probability that X(t) is Bν at time t and Wνµ be
88
+ the transition rate of X(t) from Bµ to Bν. The time evo-
89
+ lution of P(t) ≡ [P(1; t), . . . , P(N; t)]⊤ is governed by
90
+ the following master equation:
91
+ dP(t)
92
+ dt
93
+ = WP(t),
94
+ (1)
95
+ where W ≡ {Wνµ}. Next, we define the scoring function
96
+ S(·) that takes a state Bi (i ∈ {1, 2, . . . , N}) and returns
97
+ a real value of (−∞, ∞). When it is clear from the con-
98
+ arXiv:2301.03060v1 [quant-ph] 8 Jan 2023
99
+
100
+ 2
101
+ State
102
+ Time
103
+ State
104
+ Time
105
+ +1
106
+ -1
107
+ +1
108
+ -1
109
+ (a)
110
+ (b)
111
+ FIG. 1.
112
+ Illustration of Markov processes.
113
+ (a) Classical
114
+ Markov process (dichotomous process) two states {B1, B2}.
115
+ The score function is specified by S(B1) = −1 and S(B2) = 1.
116
+ (b) Quantum Markov process (two level atom driven by a
117
+ classical laser field).
118
+ The time evolution of the quantum
119
+ Markov process consists of continuous evolution induced by
120
+ the effective Hamiltonian Heff and discontinous evolution due
121
+ to the jump operator L.
122
+ The score function is given by
123
+ S(ρ) = 2Tr[ρ |e⟩ ⟨e|] − 1, in which the ground and excited
124
+ states give S(|g⟩ ⟨g|) = −1 and S(|e⟩ ⟨e|) = 1.
125
+ text, we use the notation S(t) ≡ S(X(t)) for simplicity.
126
+ Moreover, we define
127
+ Smax ≡ max
128
+ Bi∈B |S(Bi)|,
129
+ (2)
130
+ which is the maximum absolute value of the score func-
131
+ tion within B. We are interested in the correlation func-
132
+ tion C(t) ≡ ⟨S(0)S(t)⟩, where
133
+ ⟨S(0)S(t)⟩ =
134
+
135
+ µ,ν
136
+ S(Bν)S(Bµ)P(µ; 0)P(ν; t|µ; 0)
137
+ = 1SeWtSP(0).
138
+ (3)
139
+ Here, P(ν; t|µ; 0) is the conditional probability that
140
+ X(t) = Bν given X(0) = Bµ, 1 ≡ [1, 1, . . . , 1] is the
141
+ trace state, and S ≡ diag[S(B1), . . . , S(BN)]. The cor-
142
+ relation function C(t) is widely explored in the field of
143
+ stochastic process [60, 61]. Recently, the correlation func-
144
+ tion is considered in the context of quantum speed limit
145
+ [26, 62], which is obtained as particular cases of speed
146
+ limit on observables.
147
+ As an example of the classical
148
+ system, Fig. 1(a) shows the dichotomous process, which
149
+ comprises two states {B1, B2}. X(t) in this process ex-
150
+ hibits random switching between B1 and B2. For the di-
151
+ chotomous process, the score function is typically given
152
+ by S(B1) = −1 and S(B2) = 1. To quantify the Markov
153
+ process, we define the dynamical activity A(t) as follows
154
+ [63]:
155
+ A(t) ≡
156
+ � t
157
+ 0
158
+ dt′
159
+
160
+ ν,µ,ν̸=µ
161
+ P(µ; t′)Wνµ.
162
+ (4)
163
+ A(t) represents the average number of jumps during the
164
+ interval [0, t] and it quantifies the activity of the stochas-
165
+ tic process. The dynamical activity plays a fundamental
166
+ role in classical speed limits [15] and thermodynamic un-
167
+ certainty relations [30, 32].
168
+ In the classical Markov process, we obtain an upper
169
+ bound on the correlation function C(t). For 0 ≤ t1 < t2,
170
+ we obtain the following bound:
171
+ |C(t1) − C(t2)| ≤ 2S2
172
+ max sin
173
+
174
+ 1
175
+ 2
176
+ � t2
177
+ t1
178
+
179
+ A(t)
180
+ t
181
+ dt
182
+
183
+ ,
184
+ (5)
185
+ which holds for 0 ≤ 1
186
+ 2
187
+ � t2
188
+ t1
189
+
190
+ A(t)
191
+ t
192
+ dt ≤ π
193
+ 2 . For t1 and t2
194
+ outside this range, the upper bound is |C(t1) − C(t2)| ≤
195
+ 2S2
196
+ max, which holds trivially. Equation (5) is the main
197
+ result of this Letter. It should be emphasized that all
198
+ the quantities appeared in Eq. (5) are physically inter-
199
+ pretable. The proof of Eq. (5) is based on the continuous
200
+ matrix product state and inequalities in quantum infor-
201
+ mation, which is shown in Appendix D. Equation (5)
202
+ holds for an arbitrary time-independent Markov process
203
+ starting from an arbitrary initial probability distribution
204
+ with an arbitrary score function S(Bi).
205
+ Equation (5)
206
+ states that higher dynamical activity allows the system
207
+ to forget its current state more quickly, which agrees with
208
+ our intuition. For a simple consistency check, consider
209
+ the null dynamics (i.e., Wνµ = 0 for all ν and µ), in
210
+ which there is no jump at all. In this case, the dynamical
211
+ activity becomes A(t) = 0 and thus the right-hand side
212
+ of Eq. (5) vanishes to yield ⟨S(0)S(t)⟩ = ⟨S(0)2⟩, which
213
+ is trivially true. For the steady state case, C(t2) − C(t1)
214
+ for t1 < t2 is negative, and hence it seems that we do not
215
+ have to consider absolute operation in Eq. (5). However,
216
+ when the system is not in steady state, this is not the
217
+ case. Note that a weaker bound can be obtained via a
218
+ thermodynamic uncertainty relation derived in Ref. [64].
219
+ Let us consider particular cases of Eq. (5). Simply taking
220
+ t1 = 0 and t2 = t with t > 0, Eq. (5) provides an upper
221
+ bound for |C(0) − C(t)|:
222
+ |C(0) − C(t)| ≤ 2S2
223
+ max sin
224
+
225
+ 1
226
+ 2
227
+ � t
228
+ 0
229
+
230
+ A(t′)
231
+ t′
232
+ dt′
233
+
234
+ ,
235
+ (6)
236
+ where 0 ≤
237
+ 1
238
+ 2
239
+ � t
240
+ 0
241
+
242
+ A(t′)
243
+ t′
244
+ dt′ ≤
245
+ π
246
+ 2 . Moreover, let ϵ be an
247
+ infinitesimally small positive value. Substituting t1 = t−
248
+ ϵ and t2 = t into Eq. (5) and using the Taylor expansion
249
+ to the sinusoidal function, we obtain
250
+ ����
251
+ dC(t)
252
+ dt
253
+ ���� ≤ S2
254
+ max
255
+
256
+ A(t)
257
+ t
258
+ .
259
+ (7)
260
+ Equation (7) states that the absolute change of the corre-
261
+ lation function is determined by the dynamical activity.
262
+ Equation (6) holds for 0 ≤
263
+ 1
264
+ 2
265
+ � t
266
+ 0
267
+
268
+ A(t′)
269
+ t′
270
+ dt′ ≤
271
+ π
272
+ 2 and
273
+ thus the predictive power of the bound is lost at a finite
274
+ time. An alternative bound to Eq. (5) is given by
275
+ |C(0) − C(t)| ≤ 2S2
276
+ max
277
+
278
+ 1 − η(t),
279
+ (8)
280
+ where η(t) is the Loschmidt echo [65] between time
281
+ evolved state and the initial state in the continuous
282
+
283
+ 3
284
+ (a)
285
+ (b)
286
+ FIG. 2.
287
+ Results of numerical simulations.
288
+ (a) The ratio
289
+ |∂tC(t)|/(S2
290
+ max
291
+
292
+ A(t)/t) for the dichotomous process.
293
+ The
294
+ result obtained with W12 = 1, W22 = −1, P(0) = [0, 1] is plot-
295
+ ted by the dashed line. The results obtained by random pa-
296
+ rameters are plotted by the solid lines. The parameter ranges
297
+ for the random realizations are W12 ∈ [0, 1], W21 ∈ [0, 1],
298
+ S(B1) ∈ [−1, 0], and S(B2) ∈ [0, 1].
299
+ The initial distribu-
300
+ tion is first sampled from P1(0) ∈ [0, 1] and P2(0) ∈ [0, 1]
301
+ and then normalize the sampled distribution.
302
+ (b) The ra-
303
+ tio |∂tC(t)|/(S2
304
+ max
305
+
306
+ B(t)/t) for the driven two level atom
307
+ model. The results obtained by random parameters are plot-
308
+ ted by the solid lines. The parameter ranges are Ω ∈ [0.1, 1],
309
+ ∆ ∈ [0.1, 1], and κ ∈ [0.1, 1]. The initial density is sampled
310
+ from ⟨g|ρ(0)|g⟩ ∈ [0, 1] and ⟨e|ρ(0)|e⟩ ∈ [1, 2] and normalized
311
+ the sampled density (non-diagonal elements are zero).
312
+ matrix product state representation (see Appendix C).
313
+ Equation (8) is the second result of this paper, whose
314
+ proof is provided in Appendix E. Following Ref. [66], we
315
+ can compute η(t) for the classical Markov process as fol-
316
+ lows:
317
+ η(t) ≡
318
+ ��
319
+ µ
320
+ P(µ; 0)
321
+
322
+ e−t �
323
+ ν(̸=µ) Wνµ
324
+ �2
325
+ ,
326
+ (9)
327
+ which can be represented by quantities of the Markov
328
+ process. Note that the Loschmidt echo η(t) constitutes a
329
+ lower bound in a quantum and classical thermodynamic
330
+ uncertainty relation [66].
331
+ The term within the square
332
+ root in η(t) represents the survival probability that there
333
+ is no jump starting from the state Bµ. Therefore, when
334
+ the activity of dynamics is lower, the survival probabil-
335
+ ity becomes higher and in turn η(t) yields a higher value.
336
+ Although the Loschmidt echo η(t) has fewer physical in-
337
+ terpretations than dynamical activity, it has the advan-
338
+ tage over Eq. (5) that the bound of Eq. (8) holds for any
339
+ value of t.
340
+ We can extend Eq. (5) to a quantum Markov pro-
341
+ cess.
342
+ Let ρ(t) be a density operator of a quantum
343
+ Markov process at time t. We assume that the dynamics
344
+ of ρ(t) is governed by the following Lindblad equation
345
+ ˙ρ(t) = L(ρ(t)), where L is the Lindblad superoperator
346
+ [67, 68]:
347
+ L(ρ(t)) ≡ −i [H, ρ(t)] +
348
+
349
+ m
350
+ D (ρ(t), Lm) .
351
+ (10)
352
+ Here H is a Hamiltonian, D(ρ, L) ≡ LρL† − {L†L, ρ}/2
353
+ is the dissipator, Lm is the mth jump operator.
354
+ We
355
+ can unravel Eq. (10) to obtain a quantum trajectory,
356
+ which is a measurement record when observing the en-
357
+ vironment. The dynamics of the quantum trajectory is
358
+ represented by a stochastic Schr¨odinger equation. Simi-
359
+ lar to the classical case, we assign the score function to
360
+ the quantum state ρ(t) via S(ρ(t)) = Tr[ρ(t)O], where
361
+ O is an Hermitian operator.
362
+ Figure 1(b) illustrates
363
+ an example of a quantum trajectory, which consists of
364
+ continuous state change by the effective Hamiltonian
365
+ Heff ≡ H − (i/2) �
366
+ m L†
367
+ mLm and discontinuous jumps
368
+ by Lm. Let ρ(0) be the initial density operator. Then
369
+ the correlation function C(t) is calculated by
370
+ C(t) = S(ρ(0))S(ρ(t)).
371
+ (11)
372
+ For 0 ≤ t1 < t2, the following relation holds:
373
+ |C(t1) − C(t2)| ≤ 2S2
374
+ max sin
375
+
376
+ 1
377
+ 2
378
+ � t2
379
+ t1
380
+
381
+ B(t)
382
+ t
383
+ dt
384
+
385
+ ,
386
+ (12)
387
+ which holds for 0 ≤ 1
388
+ 2
389
+ � t2
390
+ t1
391
+
392
+ B(t)
393
+ t
394
+ dt ≤ π
395
+ 2 . Here B(t) is the
396
+ quantum dynamical activity defined in Ref. [64], which
397
+ is the quantum generalization of Eq. (4) (see Eq. (F2) in
398
+ Appendix F). B(t) is defined through the quantum Fisher
399
+ information. The quantum dynamical activity plays an
400
+ important role in a speed limit and a thermodynamic
401
+ uncertainty relation [64]. The proof of Eq. (12) is shown
402
+ in Appendix E. Equation (12) is the same as Eq. (5)
403
+ except that A(t) in Eq. (5) is replaced by its quantum
404
+ counter part B(t). Following the same procedure as in
405
+ Eq. (7), we obtain
406
+ ����
407
+ dC(t)
408
+ dt
409
+ ���� ≤ S2
410
+ max
411
+
412
+ B(t)
413
+ t
414
+ .
415
+ (13)
416
+ Moreover, the bound of Eq. (8) also holds for the quan-
417
+ tum Markov process, where the Loschmidt echo for the
418
+ quantum case becomes [66] (Appendix C):
419
+ η(t) =
420
+ ��Tr
421
+
422
+ e−iHefftρ(0)
423
+ ���2 .
424
+ (14)
425
+ The Loschmidt echo shown in Eq. (14) also constitutes
426
+ the lower bound in a quantum thermodynamic uncer-
427
+ tainty relation [66].
428
+ Numerical simulations.—We perform numerical sim-
429
+ ulations to verify the correlation bounds [Eqs. (7) and
430
+ (13)].
431
+ We first demonstrate Eq. (7) with the classical
432
+ dichotomous process [69], which takes only two states
433
+ B = {B1, B2}. The dichotomous process has a number of
434
+ applications in communication engineering and physics.
435
+ We are interested in the ratio between the left and right
436
+ hand sides of Eq. (7), i.e., |∂tC(t)|/(S2
437
+ max
438
+
439
+ A(t)/t) which
440
+ must be no larger than 1 according to Eq. (7). We set the
441
+ score function to S(B1) = −1 and S(B2) = 1, in which
442
+ Smax = 1. The transition rate is set to W12 = 1 and
443
+ W22 = −1, where the other elements are set to 0. The
444
+
445
+ 4
446
+ initial distribution is P(0) = [0, 1].
447
+ We plot the ratio
448
+ as a function of t in Fig. 2(a) with the dashed line. We
449
+ also randomly determine the score function S(Bi), the
450
+ transition rate Wnm, and the initial distribution P(0)
451
+ and calculate the ratio. The ratio as a function of t for
452
+ the random realizations is plotted by the solid line in
453
+ Fig. 2(a) (the parameter ranges are shown in the cap-
454
+ tion of Fig. 2(a)). We see that all the results are below
455
+ 1 (the dotted line), which numerically verifies the bound
456
+ of Eq. (7).
457
+ Next, we consider a simple two-level atom driven by
458
+ a classical laser field to check the correlation bound of
459
+ Eq. (13), whose dynamics is represented by a Lindblad
460
+ equation: H = ∆ |e⟩ ⟨e| + Ω
461
+ 2 (|e⟩ ⟨g| + |g⟩ ⟨e|) and L =
462
+ √κ |g⟩ ⟨e|, where ∆, Ω, and κ are model parameters, and
463
+ |e⟩ and |g⟩ are the excited and ground states, respectively.
464
+ For the score function, we choose S(ρ) = 2Tr[ρ |e⟩ ⟨e|]−1,
465
+ which ranges within [−1, 1] and thus Smax = 1. We calcu-
466
+ late |∂tC(t)|/(S2
467
+ max
468
+
469
+ B(t)/t), which is the ratio between
470
+ the left and right-hand side of Eq. (13). We randomly de-
471
+ termine the model parameters and the initial state (the
472
+ parameter ranges are shown in the caption of Fig. 2(b)).
473
+ The random realizations are shown by the solid lines in
474
+ Fig. 2(b).
475
+ Different from the classical case, the corre-
476
+ lation oscillates due to the contribution of the effective
477
+ Hamiltonian Heff. Since all the random realizations are
478
+ below 1 (the dotted line), we numerically verify Eq. (13).
479
+ Linear response.—The correlation function C(t) is
480
+ closely related to the linear response theory [59]. Here,
481
+ we apply the correlation bound of Eqs. (5) and (7) to
482
+ the linear response theory (see Appendix G for details).
483
+ Suppose that the Markov process is in the steady state
484
+ Pst = [Pst(1), . . . , Pst(N)], that satisfies WPst = 0. We
485
+ apply a weak perturbation χFf(t) to the master equa-
486
+ tion of Eq. (1), that is W → W + χFf(t) in Eq. (1),
487
+ where 0 < χ ≪ 1 and F is an N × N matrix, and f(t) is
488
+ arbitrary real function of time t. We expand the proba-
489
+ bility distribution as P(t) = Pst +χP1(t), where P1(t) is
490
+ the first-order correction to the probability distribution.
491
+ Collecting the first-order contribution O(χ) in Eq. (1),
492
+ P1(t) is given by
493
+ P1(t) =
494
+ � t
495
+ −∞
496
+ eW(t−t′)FPstf(t′)dt′.
497
+ (15)
498
+ Let us consider a scoring function G(Bn), which may
499
+ be different from S(Bn) at the moment, and define the
500
+ expectation of G(Bn) by
501
+ ⟨G⟩ =
502
+
503
+ n
504
+ G(Bn)Pst(n) = 1GPst,
505
+ (16)
506
+ where G ≡ diag[G(B1), . . . , G(BN)]. The change in ⟨G⟩
507
+ due to the perturbation, represented by ∆G ≡ 1GP(t)−
508
+ 1GPst, is
509
+ ∆G(t) = χ
510
+ � ∞
511
+ −∞
512
+ RG(t − t′)f(t′)dt′,
513
+ (17)
514
+ where RG(t) is the linear response function:
515
+ RG(t) =
516
+
517
+ 1GeWtFPst
518
+ t ≥ 0
519
+ 0
520
+ t < 0 .
521
+ (18)
522
+ In the linear response regime, any input-output relation
523
+ can be expressed through RG(t). From Eq. (3), the time
524
+ derivative of C(t) reads ∂tC(t) = 1SeWtWSPst. Com-
525
+ paring Eq (18) and ∂tC(t), when G = S and F = WS,
526
+ ∂tC(t) gives the linear response function of Eq. (18),
527
+ which is the statement of the fluctuation-dissipation the-
528
+ orem.
529
+ As a particular case, let us consider the pulse pertur-
530
+ bation, f(t) = δ(t), where δ(t) is the Dirac delta func-
531
+ tion. This perturbation corresponds to the application of
532
+ a sharp pulsatile perturbation at t = 0. Then the change
533
+ of the expectation of S(Bn) under the perturbation F =
534
+ WS, represented by ∆S(p), is ∆S(p)(t) = χ∂tC(t) (the
535
+ superscript (p) represents that it is the pulse response).
536
+ The correlation bound of Eq. (7) gives
537
+ ���∆S(p)(t)
538
+ ��� ≤ χS2
539
+ max
540
+
541
+ a
542
+ t ,
543
+ (19)
544
+ where
545
+ a
546
+ is
547
+ the
548
+ rate
549
+ of
550
+ dynamical
551
+ activity
552
+ a
553
+
554
+
555
+ ν,µ,ν̸=µ Pst(µ)Wνµ (note that A(t) = at for a steady
556
+ state). Equation (19) relates the dynamical activity with
557
+ the effect of the pulse perturbation on the Markov pro-
558
+ cess. A step response can be calculated in a similar way.
559
+ We apply a constant perturbation switched on at t = 0,
560
+ which can be modeled by f(t) = Θ(t) with Θ(t) being
561
+ the Heaviside step function. From Eq. (17), we obtain
562
+ ∆S(s)(t) = χ
563
+ � t
564
+ 0
565
+ RS(t′)dt′.
566
+ (20)
567
+ Equation (20) leads to the following bound:
568
+ |∆S(s)(t)| ≤ 2χS2
569
+ max sin
570
+ �√
571
+ at
572
+
573
+ ,
574
+ (21)
575
+ which holds for 0 ≤
576
+
577
+ at ≤ π/2. For t outside this range,
578
+ the trivial inequality |∆S(s)(t)| ≤ 2χS2
579
+ max holds.
580
+ Generalizations.—So far we have been concerned with
581
+ the two-point correlation function. It is straightforward
582
+ to extend the bounds to the multi-point correlation func-
583
+ tions. Let us consider a J-point correlation function:
584
+ ⟨S(t1)S(t2) · · · S(tJ)⟩
585
+
586
+
587
+ S(Bn1)S(Bn2) · · · S(BnJ)P(n1; t1)
588
+ × P(n2; t2|n1; t1) · · · P(nJ; tJ|nJ−1; tJ−1),
589
+ (22)
590
+ where 0 ≤ t1 < t2 < · · · < tJ. We can obtain analogous
591
+ relations of Eqs. (6) and (8) for Eq. (22).
592
+ Markov processes are often represented by multiple
593
+ variables.
594
+ For example, in stochastic thermodynam-
595
+ ics, a multipartite process can reveal the relation be-
596
+ tween dissipated heat and information flow [70, 71]. For
597
+
598
+ 5
599
+ simplicity, here we consider a bivariate Markov pro-
600
+ cess defined in (X(t), Y (t)), {(X(t), Y (t))|t ≥ 0} that
601
+ satisfies in X(t) ∈ BX and Y (t) ∈ BY .
602
+ Moreover,
603
+ we define different score functions for X(t) and Y (t),
604
+ which are expressed by SX(·) and SY (·), respectively,
605
+ and define SX,max ≡ maxB∈BX SX(B) and SY,max ≡
606
+ maxB∈BY SY (B). We are often interested in the correla-
607
+ tion CXY (t) ≡ ⟨SX(t)SY (0)⟩. Then, |CXY (0) − CXY (t)|
608
+ obeys the same upper bounds of Eqs. (5) and (8) except
609
+ that S2
610
+ max is replaced by SX,maxSY,max, which gives a
611
+ bound that is tighter than or equal to Eqs. (5) and (8).
612
+ Conclusion.—In this Letter, we present a relation be-
613
+ tween the correlation function and dynamical activity in
614
+ classical and quantum Markov processes. The obtained
615
+ bounds hold for arbitrary time-independent transition
616
+ rate starting from an arbitrary initial distribution. By
617
+ applying the obtained bounds to the linear response the-
618
+ ory, we demonstrate that the effect of perturbations on
619
+ a steady state system is bounded by the dynamical ac-
620
+ tivity. We expect that our findings have the potential to
621
+ enhance our understanding of nonequilibrium dynamics,
622
+ as the correlation function plays a fundamental role in
623
+ thermodynamics.
624
+ Appendix A: Continuous matrix product state
625
+ The derivation of the correlation bounds employ the
626
+ continuous matrix product state [56, 57], which bridges
627
+ the quantum field and the stochastic process. The con-
628
+ tinuous matrix product state is a type of tensor net-
629
+ work representation that is used to describe many-body
630
+ quantum systems. In one direction, quantum field states
631
+ are analyzed via the corresponding continuous measure-
632
+ ment problem. In the opposite direction, the continuous
633
+ matrix product state can map a classical or quantum
634
+ Markov process into a quantum field so that we can an-
635
+ alyze trajectory information from the view point of the
636
+ quantum field.
637
+ We consider a Lindblad equation [Eq. (10)]. The clas-
638
+ sical Markov process given by Eq. (1) can be covered by
639
+ the Lindblad equation by setting H = 0 and the jump
640
+ operator to be of the form Lm = Lνµ =
641
+
642
+ Wνµ |Bν⟩ ⟨Bµ|,
643
+ where {|Bν⟩}ν constitutes the orthonormal basis, corre-
644
+ sponding to the classical states B = {Bν}ν, and Wνµ is
645
+ the transition rate from |Bµ⟩ to |Bµ⟩.
646
+ Applying the continuous measurement on the Lindblad
647
+ equation [Eq. (10)], we obtain a trajectory Γ, which is a
648
+ record of the measurement, as follows:
649
+ Γ ≡ [(t1, m1), (t2, m2), . . . , (tK, mK)],
650
+ (A1)
651
+ where K is the number of total jumps, tk and mk are
652
+ time and type of the kth jump event, respectively. The
653
+ evolution of ρ(t) in a given trajectory Γ is governed
654
+ by a stochastic Schr¨odinger equation.
655
+ By taking the
656
+ average of all possible measurements in the stochastic
657
+ Schr¨odinger equation, we can recover the original Lind-
658
+ blad equation of Eq. (10).
659
+ Applying continuous measurement, we obtain a par-
660
+ ticular trajectory Γ. In the continuous matrix product
661
+ state, such a trajectory is recorded in the following state:
662
+ |Γ⟩ ≡ φ†
663
+ mK(tK) · · · φ†
664
+ m2(t2)φ†
665
+ m1(t1) |vac⟩ ,
666
+ (A2)
667
+ where φ(t) is the field operator that satisfies the commu-
668
+ tation relation [φm(t), φ†
669
+ m′(t′)] = δmm′δ(t − t′), and |vac⟩
670
+ is the vacuum state of φm(t), where φ†
671
+ m(t) creates a mth
672
+ particle at t. The time evolution of the system and field
673
+ state |Γ⟩ is given by
674
+ |Φ(t)⟩ = U(t; H, {Lm}) |Φ(0)⟩ ,
675
+ (A3)
676
+ where U(t; H, {Lm}) is given by
677
+ U(t; H, {Lm}) ≡ T exp
678
+
679
+ −i
680
+ � t
681
+ 0
682
+ ds (Heff ⊗ IF
683
+ +
684
+
685
+ m
686
+ iLm ⊗ φ†
687
+ m(s))
688
+
689
+ ,
690
+ (A4)
691
+ In Eq. (A4), the initial state is represented by |Φ(0)⟩ =
692
+ |ψ(0)⟩ ⊗ |vac⟩, with |ψ(0)⟩ being the initial state of the
693
+ system; T is the time ordering operator, and IF is the
694
+ identity operator in the field. |Φ(t)⟩ records the jump
695
+ events occurring within the interval [0, t]. The continuous
696
+ matrix product state |Φ(t)⟩ comprises the system, which
697
+ corresponds to the state of the Markov process, and the
698
+ field, which records jump events. The time of the original
699
+ Lindblad equation is expressed by t while that of the
700
+ continuous matrix product state is by t. All information
701
+ about measurement is recorded by creating particles in
702
+ the quantum field through the application of an operator
703
+ φ†
704
+ m(t) to the vacuum state |vac⟩.
705
+ For a small time increment ∆t, considering the time
706
+ evolution Eq. (A3) and tracing over the field, the time
707
+ evolution of the system is given by the Kraus represen-
708
+ tation:
709
+ ρ(t + ∆t) =
710
+
711
+ m
712
+ Vmρ(t)V †
713
+ m,
714
+ (A5)
715
+ where Vm are Kraus operators:
716
+ V0 ≡ I − i∆tH,
717
+ (A6)
718
+ Vm ≡
719
+
720
+ ∆tLm
721
+ (1 ≤ m).
722
+ (A7)
723
+ Dividing the interval [0, t] into Z ≫ 1 equipartitioned
724
+ intervals, the time evolution from t = 0 to t can be rep-
725
+ resented by successive applications of Eq. (A5):
726
+ ρ(t) =
727
+
728
+ mZ
729
+ · · ·
730
+
731
+ m1
732
+ VmZ · · · Vm1 |ψ(0)⟩ ⟨ψ(0)| V †
733
+ m1 · · · V †
734
+ mZ.
735
+ (A8)
736
+ Using the continuous matrix product state, we can obtain
737
+ all the information about the Markov processes. Given
738
+ the initial state |ψ(0)⟩, the trajectory probability within
739
+ [0, t] can be obtained via
740
+ P(Γ, t) = ⟨Φ(t)|IS ⊗ |Γ⟩ ⟨Γ| |Φ(t)⟩ .
741
+ (A9)
742
+
743
+ 6
744
+ The system state ρ(t) can be computed as follows:
745
+ ρ(t) = TrF [|Φ(t)⟩ ⟨Φ(t)|] ,
746
+ (A10)
747
+ where TrF denotes the trace operation with respect to
748
+ the field state.
749
+ Next, we explain a scaled continuous matrix product
750
+ state, which was recently introduced in Ref. [64].
751
+ We
752
+ want to study the time evolution of the continuous ma-
753
+ trix product state.
754
+ Initially, we might consider using
755
+ the unitary operator defined in Eq. (A4) as the time-
756
+ evolution operator. However, this approach has a prob-
757
+ lem when we try to calculate the fidelity between two
758
+ continuous matrix product states at different times, be-
759
+ cause the integration ranges for |Φ(t1)⟩ and |Φ(t2)⟩ are
760
+ different. Therefore, we instead use the scaled represen-
761
+ tation. Let us define τ > 0, which is the final time of
762
+ the evolution. For 0 ≤ t ≤ τ, the scaled matrix product
763
+ state representation is given by
764
+ |Ψ(t)⟩ = U
765
+
766
+ τ; t
767
+ τ H,
768
+ ��
769
+ t
770
+ τ Lm
771
+ ��
772
+ |Ψ(0)⟩ ,
773
+ (A11)
774
+ where |Ψ(0)⟩ = |ψ(0)⟩ ⊗ |vac⟩. Here, |Φ(t)⟩ and |Ψ(t)⟩
775
+ represent the states of the genuine and scaled continuous
776
+ matrix product states, respectively. In the scaled con-
777
+ tinuous matrix product state [Eq. (A11)], H and Lm are
778
+ scaled as (t/τ)H and
779
+
780
+ t/τLm, respectively, which corre-
781
+ sponds to the Lindblad equation that generates dynamics
782
+ that are t/τ times as fast as that of the original dynam-
783
+ ics. The scaling allows us to have the same integration
784
+ range for all values of t, making it possible to evaluate
785
+ the fidelity at different times, that is ⟨Ψ(t2)|Ψ(t1)⟩. As
786
+ mentioned above, since the scaled matrix product state
787
+ is the same as the original one except for their time scale,
788
+ both states provide us with the same information except
789
+ for the time scale. At the final time τ, both the origi-
790
+ nal and the scaled representations give the same state,
791
+ |Φ(τ)⟩ = |Φ(τ)⟩.
792
+ Moreover, |Ψ(0)⟩ corresponds to the
793
+ null dynamics, that is, the dynamics without any state
794
+ change. For instance, the system state can be obtained
795
+ by
796
+ ρ(t) = TrF [|Ψ(t)⟩ ⟨Ψ(t)|] = TrF [|Φ(t)⟩ ⟨Φ(t)|] .
797
+ (A12)
798
+ When deriving the correlation bounds, we employ the
799
+ scaled representation.
800
+ Appendix B: Initially mixed state case
801
+ The continuous matrix product state given by Eq. (A3)
802
+ only considers initially pure state |ψ(0)⟩. Let us consider
803
+ the initially mixed state case. Let ρ(0) be the initial den-
804
+ sity operator, which is mixed in general. Let us consider
805
+ the ancilla A that purifies ρ(0), that is
806
+ ρ(0) = TrA[| ˜ψ(0)⟩ ⟨ ˜ψ(0)|],
807
+ (B1)
808
+ where TrA is the trace operation with respect to the an-
809
+ cilla A. Let us introduce the continuous matrix product
810
+ state operator corresponding to Eq. (A4), that is applied
811
+ to the purified state:
812
+ ˜U(t; H, {Lm}) ≡T exp
813
+
814
+ −i
815
+ � t
816
+ 0
817
+ ds(Heff ⊗ IA ⊗ IF
818
+ +
819
+
820
+ m
821
+ iLm ⊗ IA ⊗ φ†
822
+ m(s))
823
+
824
+ ,
825
+ (B2)
826
+ The Kraus operators corresponding to Eq. (B2) is given
827
+ by
828
+ ˜Vm = Vm ⊗ IA,
829
+ (B3)
830
+ where IA is the identity operation in the ancilla and Vm
831
+ are defined in Eqs. (A6) and (A7). Using Eq. (B3), it
832
+ can be confirmed that the one-step evolution yields
833
+ TrA
834
+ ��
835
+ m
836
+ ˜Vm |˜Ψ(0)⟩ ⟨˜Ψ(0)| ˜V †
837
+ m
838
+
839
+ =
840
+
841
+ m
842
+ VmTrA
843
+
844
+ |˜Ψ(0)⟩ ⟨˜Ψ(0)|
845
+
846
+ V †
847
+ m
848
+ =
849
+
850
+ m
851
+ Vmρ(0)V †
852
+ m,
853
+ (B4)
854
+ which actually yields the consistent time evolution.
855
+ Appendix C: Fidelity calculation of continuous
856
+ matrix product states
857
+ The bounds considered in this Letter relate to the cal-
858
+ culation of the quantum Fisher information. Specifically,
859
+ we need to calculate the following fidelity:
860
+ ⟨Ψ(t2)|Ψ(t1)⟩ = TrSF [|Ψ(t1)⟩ ⟨Ψ(t2)|]
861
+ = TrS [ζ(τ; t1, t2)] ,
862
+ (C1)
863
+ where ζ(τ; t1, t2) ≡ TrF [|Ψ(t1)⟩ ⟨Ψ(t2)|]. ζ(τ; t1, t2) sat-
864
+ isfies the two-sided Lindblad equation [72, 73]:
865
+ d
866
+ dtζ(t; t1, t2) = −iH1ζ + iζH2 +
867
+
868
+ m
869
+ L1,mζL†
870
+ 2,m
871
+ − 1
872
+ 2
873
+
874
+ m
875
+
876
+ L†
877
+ 1,mL1,mζ + ζL†
878
+ 2,mL2,m
879
+
880
+ ,
881
+ (C2)
882
+ where H1 ≡ (t1/τ)H and L1,m ≡
883
+
884
+ t1/τLm (H2 and
885
+ L2,m are defined in a similar manner).
886
+ Note that
887
+ ζ(τ; t1, t2) is not a density operator, since its trace is not
888
+ necessarily equal to unity. To calculate the fidelity using
889
+ Eq. (C2), we solve Eq. (C2) from t = 0 to t = τ with the
890
+ initial value ζ(0; t1, t2) = ρ(0).
891
+ Using Eq. (C2), we can compute the fidelity between
892
+ two scaled continuous matrix product states:
893
+ η(τ) ≡ |⟨Ψ(τ)|Ψ(0)⟩|2
894
+ (C3)
895
+
896
+ 7
897
+ From Eq. (C2), |ζ(t; τ, 0)|2 = η(τ) obeys the following
898
+ equation [66]:
899
+ ˙ζ = −iHeffζ = −iHζ − 1
900
+ 2
901
+
902
+ m
903
+ L†
904
+ mLmζ.
905
+ (C4)
906
+ Then the fidelity is obtained as follows:
907
+ η(τ) =
908
+ ��TrS
909
+
910
+ e−iHeffτρ(0)
911
+ ���2 .
912
+ (C5)
913
+ The classical case can be calculated by setting H = 0
914
+ [66].
915
+ Appendix D: Derivation of Eq. (5)
916
+ Here we provide the derivation of Eq. (5).
917
+ Using
918
+ the scaled continuous matrix product state, a classical
919
+ Markov process can be analyzed via quantum mechan-
920
+ ics, and thus we can take advantage of inequalities in
921
+ quantum information. Let O be an arbitrary Hermitian
922
+ operator, and ⟨O⟩t ≡ Tr[ρ(t)O].
923
+ In the field of quan-
924
+ tum speed limit, the following relation was recently used
925
+ [25, 26]:
926
+ ��⟨O⟩t2 − ⟨O⟩t1
927
+ �� = Tr [O(ρ(t2) − ρ(t1))]
928
+ ≤ ∥O∥op ∥ρ(t2) − ρ(t1)∥tr
929
+ = 2 ∥O∥op TD (ρ(t2), ρ(t1)) .
930
+ (D1)
931
+ The second line of Eq. (D1) is due to the H¨older inequal-
932
+ ity (see Eq. (H6)). We will use Eq. (D1) for the deriva-
933
+ tion. The sketch of the proof for Eq. (5) is as follows:
934
+ • Consider the scaled continuous matrix product
935
+ state for ρ(t)
936
+ • Assign the Hermitian operator that calculates the
937
+ correlation function for O
938
+ • Obtain an upper bound for the trace distance
939
+ TD (ρ(t2), ρ(t1)) using the dynamical activity
940
+ When considering classical probability and quantum
941
+ spaces in Eq. (D1), Eq. (D1) leads to the classical and
942
+ quantum bounds, respectively.
943
+ We consider Eq. (D1) for the classical probability
944
+ space. Let us assume that two density operators ρ and σ
945
+ only have diagonal elements:
946
+ ρ =
947
+
948
+ x
949
+ p(x) |x⟩ ⟨x| ,
950
+ (D2)
951
+ σ =
952
+
953
+ x
954
+ q(x) |x⟩ ⟨x| ,
955
+ (D3)
956
+ where p(x) and q(x) are arbitrary probability distribu-
957
+ tions and {|x⟩}x constitutes the orthonormal basis. By
958
+ calculating the trace distance [Eq. (H7)] for Eqs. (D2)
959
+ and (D3), TD(ρ, σ) reduces to the total variation dis-
960
+ tance [Eq. (H12)]:
961
+ TD(ρ, σ) = TVD(p, q).
962
+ (D4)
963
+ Now we consider a particular probability distribution.
964
+ The probability of measuring a trajectory Γ and Bν at
965
+ the end time is
966
+ P(Γ, ν, t) ≡ ⟨Ψ(t)|(|Bν⟩ ⟨Bν| ⊗ |Γ⟩ ⟨Γ|)|Ψ(t)⟩ ,
967
+ (D5)
968
+ where |Ψ(t)⟩ is the scaled continuous matrix product
969
+ state. When considering initially mixed state, we may
970
+ use |˜Ψ(t)⟩.
971
+ Because arccos Bhat(·, ·) constitutes the
972
+ geodesic distance under the Fisher information metric
973
+ [74], the following relation holds [64]:
974
+ 1
975
+ 2
976
+ � t2
977
+ t1
978
+
979
+ A(t)
980
+ t
981
+ dt ≥ arccos [Bhat (P(Γ, ν, t1), P(Γ, ν, t2))] ,
982
+ (D6)
983
+ which yields
984
+ cos
985
+
986
+ 1
987
+ 2
988
+ � t2
989
+ t1
990
+
991
+ A(t)
992
+ t
993
+ dt
994
+
995
+ ≤ Bhat (P(Γ, ν, t1), P(Γ, ν, t2)) ,
996
+ (D7)
997
+ for 0 ≤ 1
998
+ 2
999
+ � t2
1000
+ t1
1001
+
1002
+ A(t)
1003
+ t
1004
+ dt ≤ π
1005
+ 2 . Substituting Eq. (D7) into
1006
+ Eq. (H17) to obtain
1007
+ TVD(P(Γ, ν, t1), P(Γ, ν, t2))
1008
+
1009
+
1010
+ 1 − Bhat (P(Γ, ν, t1), P(Γ, ν, t2))2
1011
+
1012
+
1013
+
1014
+
1015
+ �1 − cos
1016
+
1017
+ 1
1018
+ 2
1019
+ � t2
1020
+ t1
1021
+
1022
+ A(t)
1023
+ t
1024
+ dt
1025
+ �2
1026
+ = sin
1027
+
1028
+ 1
1029
+ 2
1030
+ � t2
1031
+ t1
1032
+
1033
+ A(t)
1034
+ t
1035
+ dt
1036
+
1037
+ .
1038
+ (D8)
1039
+ From Eqs. (D1), (D4), and (D8), we obtain
1040
+ ��⟨O⟩t2 − ⟨O⟩t1
1041
+ ��
1042
+ ≤ 2 ∥O∥op sin
1043
+
1044
+ 1
1045
+ 2
1046
+ � t2
1047
+ t1
1048
+
1049
+ A(t)
1050
+ t
1051
+ dt
1052
+
1053
+ ,
1054
+ (D9)
1055
+ which holds for 0 ≤ 1
1056
+ 2
1057
+ � t2
1058
+ t1
1059
+
1060
+ A(t)
1061
+ t
1062
+ dt ≤ π
1063
+ 2 . Equation (D9)
1064
+ is the central inequality for deriving the thermodynamic
1065
+ correlation inequality.
1066
+ We now implement the correlation calculation C(τ) =
1067
+ ⟨S(0)S(τ)⟩ with an Hermitian operator acting on the
1068
+ scaled continuous matrix product state. Given a trajec-
1069
+ tory Γ and the final state Bν, we can calculate the cor-
1070
+ relation S(0)S(τ) using |Ψ(τ)⟩. We assume that a real
1071
+ function M(Γ, ν) calculates the correlation given such in-
1072
+ formation:
1073
+ M(Γ, ν) ≡ S(X(0))S(X(τ)) = S(0)S(τ).
1074
+ (D10)
1075
+ Now we introduce an Hermitian operator M, whose
1076
+ eigendecomposition reads
1077
+ M =
1078
+
1079
+ Γ,ν
1080
+ M(Γ, ν) |Γ, ν⟩ ⟨Γ, ν| .
1081
+ (D11)
1082
+
1083
+ 8
1084
+ Since Eq. (D11) is the eigendecomposition of M, from
1085
+ Eq. (H2), the operator norm of M is
1086
+ ∥M∥op = max
1087
+ Γ,ν M(Γ, ν)
1088
+ =
1089
+ max
1090
+ Bi,Bj∈B [S(X(0) = Bi)S(X(τ) = Bj)]
1091
+ = S2
1092
+ max,
1093
+ (D12)
1094
+ where Smax is the maximum absolute value of S(Bi) for
1095
+ Bi ∈ B defined in Eq. (2).
1096
+ When we evaluate M in
1097
+ |Ψ(τ)⟩, it gives
1098
+ ⟨Ψ(τ)|M|Ψ(τ)⟩ = ⟨Ψ(τ)|
1099
+
1100
+ Γ,ν
1101
+ M(Γ, ν) |Γ, ν⟩ ⟨Γ, ν| |Ψ(τ)⟩
1102
+ =
1103
+
1104
+ Γ,ν
1105
+ M(Γ, ν)P(Γ, ν, τ)
1106
+ = ⟨S(0)S(τ)⟩ .
1107
+ (D13)
1108
+ Because |Ψ(0)⟩ corresponds to the null dynamics (the
1109
+ state does not evolve at all), ⟨Ψ(0)|M|Ψ(0)⟩ = ⟨S(0)2⟩.
1110
+ In a similar way, when we consider |Ψ(t)⟩ for 0 < t <
1111
+ τ, we have ⟨Ψ(t)|M|Ψ(t)⟩ = ⟨S(0)S(t)⟩.
1112
+ Substituting
1113
+ Eqs. (D12) and (D13) into Eq. (D9), we finally obtain
1114
+ Eq. (5) in the main text.
1115
+ Appendix E: Derivation of Eqs. (8) and (12)
1116
+ In this section, we derive Eqs. (8) and (12). We evalu-
1117
+ ate TD(ρ(τ), ρ(0)) in Eq. (D1). Since continuous matrix
1118
+ product states are pure, we have [Eq. (H10)]
1119
+ TD(|Ψ(t1)⟩ , |Ψ(t2)⟩) =
1120
+
1121
+ 1 − | ⟨Ψ(t2)|Ψ(t1)⟩ |2.
1122
+ (E1)
1123
+ As explained in Appendix C, the fidelity can be com-
1124
+ puted, which leads to Eq. (8) in the main text.
1125
+ The quantum case can be derived in a similar manner.
1126
+ As explained in Eqs. (D10) and (D11), the correlation
1127
+ function can be computed given a trajectory Γ for the
1128
+ quantum case as well.
1129
+ Then, the quantum version of
1130
+ Eq. (8) is obtained in the same way as the classical bound.
1131
+ We next derive Eq. (12). Since the Bures angle con-
1132
+ stitutes the geodesic length under the quantum Fisher
1133
+ information metric [6, 75], similar to Eq. (D6), the fol-
1134
+ lowing inequality holds [64]:
1135
+ arccos |⟨Ψ(t2)|Ψ(t1)⟩| ≤ 1
1136
+ 2
1137
+ � t2
1138
+ t1
1139
+
1140
+ B(t)
1141
+ t
1142
+ dt,
1143
+ (E2)
1144
+ where B(t) is the quantum dynamical activity [64] (Ap-
1145
+ pendix F). For 0 ≤ 1
1146
+ 2
1147
+ � t2
1148
+ t1
1149
+
1150
+ B(t)
1151
+ t
1152
+ dt ≤ π
1153
+ 2 , we have
1154
+ cos
1155
+
1156
+ 1
1157
+ 2
1158
+ � t2
1159
+ t1
1160
+
1161
+ B(t)
1162
+ t
1163
+ dt
1164
+
1165
+ ≤ |⟨Ψ(t2)|Ψ(t1)⟩| .
1166
+ (E3)
1167
+ Substituting Eq. (E3) into Eq. (E1), we obtain
1168
+ TD (|Ψ(t1)⟩ , |Ψ(t2)⟩) ≤ sin
1169
+
1170
+ 1
1171
+ 2
1172
+ � t2
1173
+ t1
1174
+
1175
+ B(t)
1176
+ t
1177
+ dt
1178
+
1179
+ .
1180
+ (E4)
1181
+ From Eqs. (D1) and (E4), we obtain Eq. (12) in the main
1182
+ text.
1183
+ Appendix F: Quantum dynamical activity
1184
+ The quantum dynamical activity B(t) is defined
1185
+ through the quantum Fisher information [64]. The quan-
1186
+ tum Fisher information for the scaled continuous matrix
1187
+ product state is calculated as follows:
1188
+ J (t) =
1189
+ 8
1190
+ ∆t2 [1 − | ⟨Ψ(t) | Ψ(t + ∆t)⟩ |],
1191
+ (F1)
1192
+ where ∆t is a sufficiently small increment. The fidelity
1193
+ | ⟨Ψ(t) | Ψ(t + ∆t)⟩ | can be computed by the two-sided
1194
+ Lindblad equation [Eq. (C2)]. The quantum dynamical
1195
+ activity is defined by [64]
1196
+ B(t) ≡ J (t)
1197
+ t2 .
1198
+ (F2)
1199
+ Appendix G: Linear response
1200
+ Here, we show detailed calculations of the linear re-
1201
+ sponse theory. Let us consider applying a weak pertur-
1202
+ bation χFf(t) to the master equation (1). Considering
1203
+ the perturbation expansion with respect to χ, upto the
1204
+ first order, the probability distribution is expanded as
1205
+ P(t) = Pst + χP1(t),
1206
+ (G1)
1207
+ where P1(t) is the first-order term. Substituting Eq. (G1)
1208
+ into Eq. (1), we have
1209
+ d
1210
+ dt (Pst + χP1(t)) = (W + χFf(t)) (Pst + χP1(t)) ,
1211
+ (G2)
1212
+ in which collecting the terms with respect to the order of
1213
+ χ yields
1214
+ O(χ0)
1215
+ d
1216
+ dtPst = WPst,
1217
+ (G3)
1218
+ O(χ1)
1219
+ d
1220
+ dtP1(t) = WP1(t) + FPstf(t).
1221
+ (G4)
1222
+ The zeroth order equation vanishes in definition since Pst
1223
+ is assumed to be the stationary solution of Eq. (1). P1(t)
1224
+ is given by Eq. (15) in the main text. In the main text,
1225
+ we consider a scoring function G(Bn) and its expecta-
1226
+ tion given by Eq. (16). The change of ⟨G⟩ due to the
1227
+ perturbation can be represented by
1228
+ ∆G(t) ≡ χ1GP1(t)
1229
+ = χ
1230
+ � t
1231
+ −∞
1232
+ 1GeW(t−t′)FPstf(t′)dt′
1233
+ = χ
1234
+ � ∞
1235
+ −∞
1236
+ RG(t − t′)f(t′)dt′,
1237
+ (G5)
1238
+
1239
+ 9
1240
+ where RG(t) is the linear response function [Eq. (18)].
1241
+ From Eq. (3), the time derivative of C(t) reads
1242
+ d
1243
+ dtC(t) = 1SeWtWSPst.
1244
+ (G6)
1245
+ In the main text, we consider the case G = S and
1246
+ F = WS, which will be assumed in the following. The
1247
+ perturbation WS can be expressed by
1248
+ WS =
1249
+
1250
+ ����
1251
+ S11W11
1252
+ S22W12
1253
+ · · ·
1254
+ SNNW1N
1255
+ S11W21
1256
+ S22W22
1257
+ SNNW2N
1258
+ ...
1259
+ ...
1260
+ ...
1261
+ S11WN1 S22WN2 · · · SNNWNN
1262
+
1263
+ ���� .
1264
+ (G7)
1265
+ We immediately obtain
1266
+ RS(t) = d
1267
+ dtC(t).
1268
+ (G8)
1269
+ For the pulse perturbation, f(t) = δ(t), where δ(t) is
1270
+ the Dirac delta function, we obtain
1271
+ ∆S(p)(t) = χ
1272
+ � ∞
1273
+ −∞
1274
+ RS(t − t′)δ(t′)dt′
1275
+ = χRS(t)
1276
+ = χ d
1277
+ dtC(t).
1278
+ (G9)
1279
+ Using Eq. (7), we obtain Eq. (19).
1280
+ Next, we consider the step perturbation, i.e., f(t) =
1281
+ Θ(t), where Θ(t) is the Heaviside step function:
1282
+ Θ(t) =
1283
+
1284
+ 0
1285
+ (t < 0)
1286
+ 1
1287
+ (t ≥ 0) .
1288
+ (G10)
1289
+ Then we have
1290
+ ∆S(p)(t) = χ
1291
+ � ∞
1292
+ −∞
1293
+ RS(t − t′)Θ(t′)dt′
1294
+ = χ
1295
+ � t
1296
+ 0
1297
+ RS(t − t′)dt′
1298
+ = χ
1299
+ � t
1300
+ 0
1301
+ RS(t′)dt′
1302
+ = χ
1303
+ � t
1304
+ 0
1305
+ dC(t′)
1306
+ dt′
1307
+ dt′
1308
+ = χ (C(t) − C(0)) ,
1309
+ (G11)
1310
+ which yields Eq. (21) in the main text.
1311
+ Appendix H: Norm and distance measures
1312
+ For readers’ convenience, we here review the norm and
1313
+ distance measures for quantum and classical systems. Let
1314
+ A and B be arbitrary Hermitian operators. The Shattan
1315
+ p-norm is defined by
1316
+ ∥A∥p ≡
1317
+
1318
+ Tr
1319
+ ��√
1320
+ A2
1321
+ �p�� 1
1322
+ p =
1323
+
1324
+
1325
+
1326
+ λ∈evals(A)
1327
+ |λ|p
1328
+
1329
+
1330
+ 1
1331
+ p
1332
+ .
1333
+ (H1)
1334
+ For particular p, we have
1335
+ ∥A∥op = ∥A∥∞ =
1336
+ max
1337
+ λ∈evals(A) |λ|,
1338
+ (H2)
1339
+ ∥A∥tr = ∥A∥1 = Tr
1340
+ �√
1341
+ A2
1342
+
1343
+ ,
1344
+ (H3)
1345
+ ∥A∥hs = ∥A∥2 =
1346
+
1347
+ Tr [A2],
1348
+ (H4)
1349
+ where evals(A) gives a set of eigenvalues of A.
1350
+ Equa-
1351
+ tions (H2), (H3), and (H4) are referred to as the opera-
1352
+ tor norm, the trace norm, and the Hilbert-Schmidt norm,
1353
+ respectively. The H¨older inequality states
1354
+ |Tr [AB]| ≤ ∥A∥p ∥B∥q .
1355
+ (H5)
1356
+ where p and q should satisfy 1/p+1/q = 1. When p = q =
1357
+ 2, Eq. (H5) reduces to the Cauchy-Schwarz inequality. In
1358
+ particular, we use p = ∞ and q = 1 case:
1359
+ |Tr [AB]| ≤ ∥A∥op ∥B∥tr .
1360
+ (H6)
1361
+ Let us define the trace distance and quantum fidelity:
1362
+ TD(ρ, σ) ≡ 1
1363
+ 2 ∥ρ − σ∥1 ,
1364
+ (H7)
1365
+ Fid(ρ, σ) ≡
1366
+
1367
+ Tr
1368
+ �√ρσ√ρ
1369
+ �2
1370
+ .
1371
+ (H8)
1372
+ When considering pure states |ψ⟩ and |φ⟩, the fidelity
1373
+ reduces to the inner product:
1374
+ Fid (|ψ⟩ , |φ⟩) = |⟨ψ|φ⟩|2 ,
1375
+ (H9)
1376
+ TD(|ψ⟩ , |φ⟩) =
1377
+
1378
+ 1 − | ⟨ψ|φ⟩ |2
1379
+ (H10)
1380
+ These two distances are related via
1381
+ TD(ρ, σ) ≤
1382
+
1383
+ 1 − Fid(ρ, σ).
1384
+ (H11)
1385
+ The equality of Eq. (H11) holds when both ρ and σ are
1386
+ pure [58].
1387
+ Let us introduce related classical probability distance
1388
+ measures. Let p(x) and q(x) be probability distributions.
1389
+ The total variation distance and the Hellinger distance
1390
+ are given, respectively, by
1391
+ TVD(p, q) ≡ 1
1392
+ 2
1393
+
1394
+ x
1395
+ |p(x) − q(x)|,
1396
+ (H12)
1397
+ Hel2(p, q) ≡ 1
1398
+ 2
1399
+
1400
+ x
1401
+ ��
1402
+ p(x) −
1403
+
1404
+ q(x)
1405
+ �2
1406
+ (H13)
1407
+ = 1 − Bhat(p, q)
1408
+ (H14)
1409
+
1410
+ 10
1411
+ where Bhat(p, q) is the Bhattacharyya coefficient:
1412
+ Bhat (p, q) ≡
1413
+
1414
+ x
1415
+
1416
+ p(x)q(x).
1417
+ (H15)
1418
+ Between the total variantion and the Hellinger distances,
1419
+ the following relations are known to hold [76]:
1420
+ Hel2(p, q) ≤ TVD(p, q)
1421
+ (H16)
1422
+
1423
+
1424
+ Hel2(p, q)(2 − Hel2(p, q))
1425
+ (H17)
1426
+
1427
+
1428
+ 2Hel2(p, q).
1429
+ (H18)
1430
+ ACKNOWLEDGMENTS
1431
+ This work was supported by JSPS KAKENHI Grant
1432
+ Number JP22H03659.
1433
+ [1] W. Heisenberg, ¨Uber den anschaulichen inhalt der quan-
1434
+ tentheoretischen kinematik und mechanik, Z. Phys. 43,
1435
+ 172 (1927).
1436
+ [2] H. P. Robertson, The uncertainty principle, Phys. Rev.
1437
+ 34, 163 (1929).
1438
+ [3] L. Mandelstam and I. Tamm, The uncertainty relation
1439
+ between energy and time in non-relativistic quantum me-
1440
+ chanics, J. Phys. USSR 9, 249 (1945).
1441
+ [4] N. Margolus and L. B. Levitin, The maximum speed of
1442
+ dynamical evolution, Physica D: Nonlinear Phenomena
1443
+ 120, 188 (1998).
1444
+ [5] S. Deffner and E. Lutz, Generalized Clausius inequality
1445
+ for nonequilibrium quantum processes, Phys. Rev. Lett.
1446
+ 105, 170402 (2010).
1447
+ [6] M. M. Taddei, B. M. Escher, L. Davidovich, and R. L.
1448
+ de Matos Filho, Quantum speed limit for physical pro-
1449
+ cesses, Phys. Rev. Lett. 110, 050402 (2013).
1450
+ [7] A. del Campo, I. L. Egusquiza, M. B. Plenio, and S. F.
1451
+ Huelga, Quantum speed limits in open system dynamics,
1452
+ Phys. Rev. Lett. 110, 050403 (2013).
1453
+ [8] S. Deffner and E. Lutz, Energy-time uncertainty relation
1454
+ for driven quantum systems, J. Phys. A: Math. Theor.
1455
+ 46, 335302 (2013).
1456
+ [9] D. P. Pires, M. Cianciaruso, L. C. C´eleri, G. Adesso,
1457
+ and D. O. Soares-Pinto, Generalized geometric quantum
1458
+ speed limits, Phys. Rev. X 6, 021031 (2016).
1459
+ [10] E. O’Connor, G. Guarnieri, and S. Campbell, Action
1460
+ quantum speed limits, Phys. Rev. A 103, 022210 (2021).
1461
+ [11] S. Deffner and S. Campbell, Quantum speed limits: from
1462
+ Heisenberg’s uncertainty principle to optimal quantum
1463
+ control, J. Phys. A: Math. Theor. 50, 453001 (2017).
1464
+ [12] S. Lloyd, Ultimate physical limits to computation, Na-
1465
+ ture 406, 1047 (2000).
1466
+ [13] J. D. Bekenstein, Energy cost of information transfer,
1467
+ Phys. Rev. Lett. 46, 623 (1981).
1468
+ [14] M.
1469
+ Murphy,
1470
+ S.
1471
+ Montangero,
1472
+ V.
1473
+ Giovannetti,
1474
+ and
1475
+ T. Calarco, Communication at the quantum speed limit
1476
+ along a spin chain, Phys. Rev. A 82, 022318 (2010).
1477
+ [15] N. Shiraishi, K. Funo, and K. Saito, Speed limit for clas-
1478
+ sical stochastic processes, Phys. Rev. Lett. 121, 070601
1479
+ (2018).
1480
+ [16] S. Ito, Stochastic thermodynamic interpretation of infor-
1481
+ mation geometry, Phys. Rev. Lett. 121, 030605 (2018).
1482
+ [17] S. Ito and A. Dechant, Stochastic time evolution, in-
1483
+ formation geometry, and the Cram´er-Rao bound, Phys.
1484
+ Rev. X 10, 021056 (2020).
1485
+ [18] A. Dechant and Y. Sakurai, Thermodynamic interpreta-
1486
+ tion of Wasserstein distance, arXiv:1912.08405 (2019).
1487
+ [19] T. Van Vu and Y. Hasegawa, Geometrical bounds of the
1488
+ irreversibility in Markovian systems, Phys. Rev. Lett.
1489
+ 126, 010601 (2021).
1490
+ [20] M. Nakazato and S. Ito, Geometrical aspects of en-
1491
+ tropy production in stochastic thermodynamics based on
1492
+ Wasserstein distance, Phys. Rev. Res. 3, 043093 (2021).
1493
+ [21] A. Dechant, Minimum entropy production,
1494
+ detailed
1495
+ balance and Wasserstein distance for continuous-time
1496
+ Markov processes, J. Phys. A: Math. Theor. 55, 094001
1497
+ (2022).
1498
+ [22] T. Van Vu and K. Saito, Thermodynamic unification of
1499
+ optimal transport: Thermodynamic uncertainty relation,
1500
+ minimum dissipation, and thermodynamic speed limits,
1501
+ arXiv:2206.02684 (2022).
1502
+ [23] S. B. Nicholson, L. P. Garcia-Pintos, A. del Campo, and
1503
+ J. R. Green, Time-information uncertainty relations in
1504
+ thermodynamics, Nat. Phys. 16, 1211 (2020).
1505
+ [24] L. P. Garc´ıa-Pintos, S. B. Nicholson, J. R. Green, A. del
1506
+ Campo, and A. V. Gorshkov, Unifying quantum and clas-
1507
+ sical speed limits on observables, Phys. Rev. X 12, 011038
1508
+ (2022).
1509
+ [25] R. Hamazaki, Speed limits for macroscopic transitions,
1510
+ PRX Quantum 3, 020319 (2022).
1511
+ [26] B. Mohan and A. K. Pati, Quantum speed limits for ob-
1512
+ servables, Phys. Rev. A 106, 042436 (2022).
1513
+ [27] N. H¨ornedal, N. Carabba, A. S. Matsoukas-Roubeas, and
1514
+ A. del Campo, Ultimate speed limits to the growth of
1515
+ operator complexity, Commun. Phys. 5, 207 (2022).
1516
+ [28] A. C. Barato and U. Seifert, Thermodynamic uncertainty
1517
+ relation for biomolecular processes, Phys. Rev. Lett. 114,
1518
+ 158101 (2015).
1519
+ [29] T. R. Gingrich, J. M. Horowitz, N. Perunov, and J. L.
1520
+ England, Dissipation bounds all steady-state current
1521
+ fluctuations, Phys. Rev. Lett. 116, 120601 (2016).
1522
+ [30] J. P. Garrahan, Simple bounds on fluctuations and un-
1523
+ certainty relations for first-passage times of counting ob-
1524
+ servables, Phys. Rev. E 95, 032134 (2017).
1525
+ [31] A. Dechant and S.-i. Sasa, Current fluctuations and
1526
+ transport efficiency for general Langevin systems, J. Stat.
1527
+ Mech: Theory Exp. 2018, 063209 (2018).
1528
+ [32] I. Di Terlizzi and M. Baiesi, Kinetic uncertainty relation,
1529
+ J. Phys. A: Math. Theor. 52, 02LT03 (2019).
1530
+
1531
+ 11
1532
+ [33] Y. Hasegawa and T. Van Vu, Uncertainty relations
1533
+ in stochastic processes: An information inequality ap-
1534
+ proach, Phys. Rev. E 99, 062126 (2019).
1535
+ [34] Y. Hasegawa and T. Van Vu, Fluctuation theorem un-
1536
+ certainty relation, Phys. Rev. Lett. 123, 110602 (2019).
1537
+ [35] T. Van Vu and Y. Hasegawa, Uncertainty relations for
1538
+ underdamped Langevin dynamics, Phys. Rev. E 100,
1539
+ 032130 (2019).
1540
+ [36] A. Dechant and S.-i. Sasa, Fluctuation–response inequal-
1541
+ ity out of equilibrium, Proc. Natl. Acad. Sci. U.S.A. 117,
1542
+ 6430 (2020).
1543
+ [37] V. T. Vo, T. Van Vu, and Y. Hasegawa, Unified approach
1544
+ to classical speed limit and thermodynamic uncertainty
1545
+ relation, Phys. Rev. E 102, 062132 (2020).
1546
+ [38] T. Koyuk and U. Seifert, Thermodynamic uncertainty re-
1547
+ lation for time-dependent driving, Phys. Rev. Lett. 125,
1548
+ 260604 (2020).
1549
+ [39] P. Pietzonka, Classical pendulum clocks break the ther-
1550
+ modynamic uncertainty relation, Phys. Rev. Lett. 128,
1551
+ 130606 (2022).
1552
+ [40] P. Erker, M. T. Mitchison, R. Silva, M. P. Woods,
1553
+ N. Brunner, and M. Huber, Autonomous quantum clocks:
1554
+ Does thermodynamics limit our ability to measure time?,
1555
+ Phys. Rev. X 7, 031022 (2017).
1556
+ [41] K. Brandner, T. Hanazato, and K. Saito, Thermody-
1557
+ namic bounds on precision in ballistic multiterminal
1558
+ transport, Phys. Rev. Lett. 120, 090601 (2018).
1559
+ [42] F. Carollo, R. L. Jack, and J. P. Garrahan, Unraveling
1560
+ the large deviation statistics of Markovian open quantum
1561
+ systems, Phys. Rev. Lett. 122, 130605 (2019).
1562
+ [43] J. Liu and D. Segal, Thermodynamic uncertainty relation
1563
+ in quantum thermoelectric junctions, Phys. Rev. E 99,
1564
+ 062141 (2019).
1565
+ [44] G. Guarnieri, G. T. Landi, S. R. Clark, and J. Goold,
1566
+ Thermodynamics of precision in quantum nonequilib-
1567
+ rium steady states, Phys. Rev. Research 1, 033021
1568
+ (2019).
1569
+ [45] S. Saryal, H. M. Friedman, D. Segal, and B. K. Agar-
1570
+ walla, Thermodynamic uncertainty relation in thermal
1571
+ transport, Phys. Rev. E 100, 042101 (2019).
1572
+ [46] Y. Hasegawa, Quantum thermodynamic uncertainty re-
1573
+ lation for continuous measurement, Phys. Rev. Lett. 125,
1574
+ 050601 (2020).
1575
+ [47] Y. Hasegawa, Thermodynamic uncertainty relation for
1576
+ general open quantum systems, Phys. Rev. Lett. 126,
1577
+ 010602 (2021).
1578
+ [48] M. F. Sacchi, Thermodynamic uncertainty relations for
1579
+ bosonic Otto engines, Phys. Rev. E 103, 012111 (2021).
1580
+ [49] A. A. S. Kalaee, A. Wacker, and P. P. Potts, Violating
1581
+ the thermodynamic uncertainty relation in the three-level
1582
+ maser, Phys. Rev. E 104, L012103 (2021).
1583
+ [50] T. Monnai, Thermodynamic uncertainty relation for
1584
+ quantum work distribution: Exact case study for a per-
1585
+ turbed oscillator, Phys. Rev. E 105, 034115 (2022).
1586
+ [51] J. M. Horowitz and T. R. Gingrich, Thermodynamic
1587
+ uncertainty relations constrain non-equilibrium fluctua-
1588
+ tions, Nat. Phys. (2019).
1589
+ [52] J. Li, J. M. Horowitz, T. R. Gingrich, and N. Fakhri,
1590
+ Quantifying dissipation using fluctuating currents, Nat.
1591
+ Commun. 10, 1666 (2019).
1592
+ [53] S. K. Manikandan, D. Gupta, and S. Krishnamurthy, In-
1593
+ ferring entropy production from short experiments, Phys.
1594
+ Rev. Lett. 124, 120603 (2020).
1595
+ [54] T. Van Vu, V. T. Vo, and Y. Hasegawa, Entropy produc-
1596
+ tion estimation with optimal current, Phys. Rev. E 101,
1597
+ 042138 (2020).
1598
+ [55] S. Otsubo, S. Ito, A. Dechant, and T. Sagawa, Estimat-
1599
+ ing entropy production by machine learning of short-time
1600
+ fluctuating currents, Phys. Rev. E 101, 062106 (2020).
1601
+ [56] F. Verstraete and J. I. Cirac, Continuous matrix product
1602
+ states for quantum fields, Phys. Rev. Lett. 104, 190405
1603
+ (2010).
1604
+ [57] T. J. Osborne, J. Eisert, and F. Verstraete, Holographic
1605
+ quantum states, Phys. Rev. Lett. 105, 260401 (2010).
1606
+ [58] M. A. Nielsen and I. L. Chuang, Quantum Computation
1607
+ and Quantum Information (Cambridge University Press,
1608
+ New York, NY, USA, 2011).
1609
+ [59] H. Risken, The Fokker–Planck Equation: Methods of So-
1610
+ lution and Applications, 2nd ed. (Springer, 1989).
1611
+ [60] E. Masry, On covariance functions of unit processes,
1612
+ SIAM J. Appl. Math. 23, 28 (1972).
1613
+ [61] W. Whitt, The efficiency of one long run versus indepen-
1614
+ dent replications in steady-state simulation, Manage. Sci.
1615
+ 37, 645 (1991).
1616
+ [62] N. Carabba, N. H¨ornedal, and A. del Campo, Quantum
1617
+ speed limits on operator flows and correlation functions,
1618
+ arXiv:2207.05769 .
1619
+ [63] C. Maes, Frenesy: Time-symmetric dynamical activity in
1620
+ nonequilibria, Phys. Rep. 850, 1 (2020).
1621
+ [64] Y.
1622
+ Hasegawa,
1623
+ Thermodynamic
1624
+ bounds
1625
+ via
1626
+ bulk-
1627
+ boundary
1628
+ correspondence:
1629
+ Speed
1630
+ limit,
1631
+ thermody-
1632
+ namic uncertainty relation, and Heisenberg principle,
1633
+ arXiv:2203.12421 (2022).
1634
+ [65] A. Goussev, R. A. Jalabert, H. M. Pastawski, and
1635
+ D. Wisniacki, Loschmidt echo, arXiv:1206.6348 (2012).
1636
+ [66] Y. Hasegawa, Irreversibility, Loschmidt echo, and ther-
1637
+ modynamic uncertainty relation, Phys. Rev. Lett. 127,
1638
+ 240602 (2021).
1639
+ [67] G. Lindblad, On the generators of quantum dynamical
1640
+ semigroups, Commun. Math. Phys. 48, 119 (1976).
1641
+ [68] H.-P. Breuer and F. Petruccione, The theory of open
1642
+ quantum systems (Oxford university press, 2002).
1643
+ [69] I. Bena, Dichotomous markov noise: Exact results for
1644
+ out-of-equilibrium systems, Int. J. Mod. Phys. B 20, 2825
1645
+ (2006).
1646
+ [70] J. M. Horowitz and M. Esposito, Thermodynamics with
1647
+ continuous information flow, Phys. Rev. X 4, 031015
1648
+ (2014).
1649
+ [71] J. M. Horowitz, Multipartite information flow for multi-
1650
+ ple Maxwell demons, J. Stat. Mech. 2015, P03006 (2015).
1651
+ [72] S. Gammelmark and K. Mølmer, Fisher information and
1652
+ the quantum Cram´er-Rao sensitivity limit of continuous
1653
+ measurements, Phys. Rev. Lett. 112, 170401 (2014).
1654
+ [73] K. Mølmer, Hypothesis testing with open quantum sys-
1655
+ tems, Phys. Rev. Lett. 114, 040401 (2015).
1656
+ [74] W. K. Wootters, Statistical distance and Hilbert space,
1657
+ Phys. Rev. D 23, 357 (1981).
1658
+ [75] A. Uhlmann, The metric of Bures and the geometric
1659
+ phase, in Groups and Related Topics:
1660
+ Proceedings of
1661
+ the First Max Born Symposium, edited by R. Gielerak,
1662
+ J. Lukierski, and Z. Popowicz (Springer Netherlands,
1663
+ Dordrecht, 1992) pp. 267–274.
1664
+ [76] I. Sason and S. Verd´u, f-divergence inequalities, IEEE
1665
+ Trans. Inf. Theory 62, 5973 (2016).
1666
+
2dE1T4oBgHgl3EQfSANm/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2tE0T4oBgHgl3EQfdwDZ/content/2301.02382v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:57f0ee1888905f961cedf414b19770dee3e0130d68f60214151b264adadc5631
3
+ size 4160524
2tE0T4oBgHgl3EQfdwDZ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bcb3611ce9cd8d075e478bf9fdc5e4b74ab9b34be030d8de5c8db61907120b99
3
+ size 2687021
49FAT4oBgHgl3EQfmR1P/content/2301.08622v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dc1abbadcd522cdab63914f0f917f72dc696e8b4996285351f4832a71c6342c3
3
+ size 521403
49FAT4oBgHgl3EQfmR1P/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:de90772324933965c8cd4bbc700a07fb52697aa2da5833dd0c8185d2e0cf8f95
3
+ size 1114157
49FAT4oBgHgl3EQfmR1P/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:90995b7c53d2cf24e4b27292da5fec250701f5b53450e786e1c63bc4e4a85430
3
+ size 45308
6tFKT4oBgHgl3EQf_i4o/content/2301.11962v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:04462476520e0afafc6102078be0de100019894fc4169a4050f2144846598775
3
+ size 6030957
6tFKT4oBgHgl3EQf_i4o/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7d6be31e3c42e2948f204d9d0ae90309700c4ce413f8e1a4161988f6551fd4bb
3
+ size 4915245
A9E2T4oBgHgl3EQfRQfr/content/2301.03780v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7f5ab15eebbde0e94c393728a19ea6be0d5a1c3b10c1ba1727b2de3aa188225c
3
+ size 759983
A9E2T4oBgHgl3EQfRQfr/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:aa76a4aa96629e935fba40b8f22458ad842c40165160bbb6a8f641d3539b6ab8
3
+ size 4259885
A9FRT4oBgHgl3EQfujgS/content/tmp_files/2301.13631v1.pdf.txt ADDED
@@ -0,0 +1,1164 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+
3
+ TopoBERT: Plug and Play Toponym Recognition Module
4
+ Harnessing Fine-tuned BERT∗
5
+ Bing Zhou
6
+ Department of Geography
7
+ Texas A&M University
8
+ College Station, Texas, US
9
10
+ Yingjie Hu
11
+ Department of Geography
12
+ University at Buffalo
13
+ Buffalo, New York, US
14
15
+ Lei Zou
16
+ Department of Geography
17
+ Texas A&M University
18
+ College Station, Texas, US
19
20
+ Yi Qiang
21
+ School of Geoscience
22
+ University of South Florida
23
+ Tampa, Florida, US
24
25
+ ABSTRACT
26
+ Extracting precise geographical information from textual contents
27
+ is crucial in a plethora of applications. For example, during
28
+ hazardous events, a robust and unbiased toponym extraction
29
+ framework can provide an avenue to tie the location concerned to
30
+ the topic discussed by news media posts and pinpoint humanitarian
31
+ help requests or damage reports from social media. Early studies
32
+ have leveraged rule-based, gazetteer-based, deep learning, and
33
+ hybrid approaches to address this problem. However, the
34
+ performance of existing tools is deficient in supporting operations
35
+ like emergency rescue, which relies on fine-grained, accurate
36
+ geographic information. The emerging pretrained language models
37
+ can better capture the underlying characteristics of text information,
38
+ including place names, offering a promising pathway to optimize
39
+ toponym recognition to underpin practical applications. In this
40
+ paper, TopoBERT, a toponym recognition module based on a one-
41
+ dimensional Convolutional Neural Network (CNN1D) and
42
+ Bidirectional Encoder Representation from Transformers (BERT),
43
+ is proposed and fine-tuned. Three datasets (CoNLL2003-Train,
44
+ Wikipedia3000, WNUT2017) are leveraged to tune the
45
+ hyperparameters, discover the best training strategy, and train the
46
+ model. Another two datasets (CoNLL2003-Test and Harvey2017)
47
+ are used to evaluate the performance. Three distinguished
48
+ classifiers, linear, multi-layer perceptron, and CNN1D, are
49
+ benchmarked to determine the optimal model architecture.
50
+ TopoBERT achieves state-of-the-art performance (f1-score=0.865)
51
+ compared to the other five baseline models and can be applied to
52
+ diverse toponym recognition tasks without additional training.
53
+ KEYWORDS
54
+ Natural Language Processing; Geoparser; Convolutional Neural
55
+ Network; Toponym Recognition; BERT
56
+
57
+ 1 Introduction
58
+ Since the emergence of social sensing, scholars have been
59
+ endeavoring to sense the pulse of society with the help of satellite
60
+ images, sensor networks from IoT and various forms of textual
61
+ information from the Internet. Extra attention has been paid to
62
+ mining knowledge from social media because people nowadays are
63
+ consciously or unconsciously sharing their views towards ongoing
64
+ events online, which propels social media to become one of the few
65
+ agents that reflects the real-time societal awareness, reactions and
66
+ impacts of particular events. This trait is a rare feature seldom
67
+ shared by other forms of data sources.
68
+ In the light of this feature, Avvenuti et al. presented an early
69
+ earthquake detecting and warning system using Twitter data, which
70
+ offers prompt detection of events [1]. Several case studies
71
+ processed social media data with geocoding and sentiment analysis
72
+ tools to analyze the spatial patterns of changing public awareness
73
+ and emotions toward hurricanes in different phases of the disaster
74
+ management cycle [2,3]. Huang et al. scrutinized the human
75
+ mobility patterns during the COVID-19 pandemic at multiple
76
+ scales based on geotagged Twitter data [4]. Zhou et al. proposed
77
+ VictimFinder which is capable of harvesting social media help
78
+ requests during hurricanes [5].
79
+ Let alone the fact that geographical information being one of the
80
+ key elements of knowledge generation, the aforementioned studies
81
+ and other similar spatial analysis and modeling are highly
82
+ dependent on the location information of the social media data.
83
+ However, social media users start to pay more attention to user
84
+ privacy, which results in a significant drop of the number of
85
+ geotagged tweets. Simultaneously, Twitter published policies
86
+ forbidding users to attach precise longitudes and latitudes to tweets.
87
+ Moreover, the geographical information bound up with the social
88
+ media posts might not necessarily be equivalent to the place names
89
+ described in the textual content of the post. Thus, extracting
90
+ location information from the textual content of social media data
91
+ has inevitably become an issue that needs to be addressed. This
92
+ breeds the process of geoparsing, a two-step approach which
93
+ includes toponym recognition (identifying place names from texts)
94
+ and toponym resolution (transforming location names to
95
+ geographical coordinates). This paper focuses on the first
96
+ component of geoparsing.
97
+
98
+
99
+
100
+
101
+
102
+ Existing studies on toponym recognition can be categorized into
103
+ four parties based on the character of the solutions, namely rule-
104
+ based, gazetteer-based, statistical learning-based, and hybrid
105
+ approaches. In general, statistical learning and hybrid methods that
106
+ incorporate deep learning techniques render better performance
107
+ than methods that solely rely on rules or gazetteers [6,7,8,9]. Based
108
+ on Bidirectional Long Short-Term Memory (BiLSTM), Wang et al.
109
+ introduced NeuroTPR to extract place names [6]. Qi et al. extended
110
+ CoreNLP and brought about an open-sourced named entity
111
+ recognition python toolkit called Stanza, which is able to detect
112
+ place names and support multiple languages [7]. SAVITR is a
113
+ system that combines both NLP techniques and gazetteers for real-
114
+ time location extraction [8]. Hu et al. addressed the incompleteness
115
+ of gazetteers and fused gazetteers, rules, and deep learning to
116
+ render a reliable place name extractor, GazPNE [9].
117
+ However, those studies suffer from several limitations. First, some
118
+ models do not focus only on place names, so their prediction of
119
+ location name extraction might be disturbed. Second, recurrent
120
+ neural network based deep learning models might suffer from
121
+ information vanishing problems when the input sequence gets
122
+ larger and network deeper. Third, complicated deep neural
123
+ networks frequently require large, annotated datasets and are time-
124
+ consuming to train to achieve promising results.
125
+ To address the aforementioned latent flaws, this paper proposes
126
+ TopoBERT, a toponym recognition module based on a one-
127
+ dimensional
128
+ Convolutional
129
+ Neural
130
+ Network
131
+ (CNN)
132
+ and
133
+ Bidirectional Encoder Representation from Transformers (BERT).
134
+ It contributes in the following directions. First, several classifiers
135
+ were tested and one feasible model and classifier combination
136
+ based on the evaluation result of a standard dataset is determined.
137
+ Second, TopoBERT was tested by an unseen dataset together with
138
+ some other existing tools to verify its generalizability. Third, the
139
+ tool is ready-to-use and the dataset we generated in this study can
140
+ be used by other scholars to train, test, and compare different
141
+ toponym recognition models and tools.
142
+ The remainder of this paper is structured as follows. The datasets
143
+ involved in fine-tuning and testing the framework, a concise
144
+ introduction of the holistic design of the framework, the
145
+ implementation of the framework, and the parameters used in fine-
146
+ tuning the framework are detailed in section 2. The results of the
147
+ experiments conducted are documented in section 3. Section 4
148
+ illustrates the potential limitations of this work and lists several
149
+ future research directions. Section 5 epitomizes the findings of this
150
+ paper and presents the implications of this study.
151
+ 2 Methodology
152
+ 2.1 Datasets
153
+ Totally four different datasets were utilized to train the module and
154
+ evaluate the performance. CoNLL2003 is a shared task that
155
+ concerns named entity recognition, which has been widely applied
156
+ to training deep learning models [10]. The data contains entities of
157
+ five types: persons (PER), organizations (ORG), locations (LOC)
158
+ and miscellaneous names (MISC) and other words that are
159
+ irrelevant to named entities of the aforementioned four groups (O).
160
+ The prefix “B-” and “I-” are used to tag the beginning of a named
161
+ entity and words that fall inside a named entity [10]. The dataset is
162
+ originally divided into training, validation, and test data which are
163
+ noted
164
+ as
165
+ CoNLL2003-Train,
166
+ CoNLL2003-Validation
167
+ and
168
+ CoNLL2003-Test. Training data is used to train a deep learning
169
+ model, validation data is used to tune the hyperparameters of the
170
+ model, and the test data is used to evaluate the performance of the
171
+ trained model. The data distribution of each label type in the three
172
+ datasets is depicted in Figures 1(a), 1(b), and 1(c), respectively. The
173
+ dataset is later modified to suit the purpose of this study by labeling
174
+ all the named entities as “O” except for the location entities.
175
+ Around 4.1% of the tags are location entities in these datasets.
176
+
177
+
178
+
179
+ (a) (b) (c)
180
+ Figure 1: Data Distribution of CoNLL2003 Dataset
181
+ WNUT2017 is a relatively smaller dataset collected from Twitter
182
+ and manually annotated, the objective of which is to tackle the
183
+ issues caused by novel, emerging, singleton named entities in noisy
184
+ text [11]. It aims to offer support to sustainable named entity
185
+ recognition systems. This dataset contains seven different groups:
186
+ person, location, corporation, product, creative work, group and
187
+ none of the above. Considering the main focus of this paper and
188
+ different tags used to label the dataset, this dataset is preprocessed
189
+ to retain only the location entities tag and to unify the tag symbols
190
+ used based on CoNLL2003 (location entities are tagged with “B-
191
+ LOC” or “I-LOC” while the rest are tagged with “O”). The
192
+ distribution of data under each label type in the modified dataset is
193
+ shown in Figure 2(a). The total number of location names in this
194
+ dataset is 1140.
195
+
196
+
197
+
198
+
199
+ (a)
200
+ (b) (c)
201
+ Figure 2: Data Distribution of WNUT2017, Wiki300 and
202
+ Harvey2017 Dataset
203
+ Wiki3000 is an automatically generated dataset from Wikipedia
204
+ articles by a data producing workflow proposed by Wang et al. [6].
205
+ The proposed auto-annotation approach utilizes the first paragraph
206
+ of Wikipedia articles which usually encompass various entities
207
+ presented with hyperlinks. These hyperlinks are later checked if
208
+ they are associated with a geographical location. If so, the
209
+
210
+ CoNLL2003-TrainDataset
211
+ 200000
212
+ 169578
213
+ 150000
214
+ Count
215
+ 100000
216
+ 50000
217
+ 82971002511128
218
+ 4593
219
+ 0
220
+ LOCORGPER
221
+ RMISO
222
+ ClassNamesCoNLL2003-ValidationDataset
223
+ 50000
224
+ 42759
225
+ 40000
226
+ Count
227
+ 30000
228
+ 20000
229
+ 10000
230
+ 3149
231
+ 20942092
232
+ 1268
233
+ 0
234
+ LOCORG
235
+ PER
236
+ MISC
237
+ ClassNamesCoNLL2003-TestDataset
238
+ 4000038323
239
+ 30000
240
+ Count
241
+ 20000
242
+ 10000
243
+ 192524962773
244
+ 918
245
+ 0
246
+ LOCORG
247
+ PER
248
+ MISC
249
+ ClassNamesWNUT2017Dataset
250
+ 10673
251
+ 10000
252
+ Count
253
+ 5000
254
+ 1140
255
+ 0
256
+ 0
257
+ LOC
258
+ ClassNamesWiki3000Dataset
259
+ 40466
260
+ 40000
261
+ 30000
262
+ Count
263
+ 20000
264
+ 16000
265
+ 10000
266
+ 0
267
+ 0
268
+ LOC
269
+ ClassNamesHarvey2017Dataset
270
+ 15295
271
+ 15000
272
+ Count
273
+ 10000
274
+ 5000
275
+ 3973
276
+ 0
277
+ 0
278
+ LOC
279
+ ClassNames
280
+
281
+
282
+ hyperlinked word will be labeled as a toponym. Then the Wikipedia
283
+ article is divided into multiple short sentences within 280
284
+ characters with additional strategies such as random flipping to
285
+ mimic the general patterns of Twitter posts [6]. The distribution of
286
+ data under each label type is shown in Figure 2(b).
287
+ Harvey2017 is a dataset originally collected from the North Texas
288
+ University repository (https://digital.library.unt.edu/ark:/67531
289
+ /metadc993940/), which contains 7,041,866 tweets collected based
290
+ on hashtag query. It was pruned, randomly subsampled and
291
+ manually annotated by Wang et al. to form a new dataset with 1000
292
+ tweets aiming to evaluate NeuroTPR [6]. This dataset is adopted by
293
+ this paper to test the performance of TopoBERT. The distribution
294
+ of data under each label type is shown in Figure 2(c).
295
+ 2.2 Framework Design and Implementation
296
+ As mentioned in section 1, there is an acute conflict between robust
297
+ spatial analysis on social media or news media and the diminishing
298
+ availability of geolocated textual context. Additionally, the location
299
+ mentioned in the textual content of the tweets might differ from the
300
+ geotags attached. A reliable and ready-to-use geoparser can be the
301
+ mediator of such conflicts. Therefore, we present a general location
302
+ extractor that can be used upon social media and news media. The
303
+ workflow is shown in Figure 3.
304
+ The existing geotags of the data will be retained, and the textual
305
+ contents will go through a rule-based data preprocessing module
306
+ before they are fed to a zip code extractor and place name extractor.
307
+ Once the place names are pulled out, a geocoding service will be
308
+ applied to transform the place names into precise coordinates. The
309
+ place name extractor is marked with an orange dashed rectangle in
310
+ Figure 3 and serves as the crucial backbone of the entire workflow.
311
+
312
+
313
+ Figure 3: Holistic Design of Location Extraction Framework
314
+ for Textual Contents
315
+
316
+ Figure 4: Demonstration of token classification workflow.
317
+ Identifying location names from input sentences is a token
318
+ classification task (Figure 4), which contains two parts. A language
319
+ model and a classifier. It behaves similar to how human beings
320
+ analyze whether the given words are place names or not. First the
321
+ language model attempts to understand the language by
322
+ transforming the tokenized input data into higher dimensional
323
+ space which captures the meaning of words in a given sentence,
324
+ then the classifier makes predictions based on the transformed
325
+ vectors and determines whether the input word belongs to location
326
+ entity.
327
+ The heart of the proposed toponym recognition module,
328
+ TopoBERT, is the Bidirectional Encoder Representation from
329
+ Transformers (BERT). It is structured by stacking the encoder
330
+ components of the Transformer architecture and is designed to be
331
+ pretrained in an unsupervised manner. BERT takes advantage of
332
+ the Attention [25] mechanism, which resolves the information
333
+ vanishing issue that often upsets recurrent neural networks such as
334
+ Long Short-Term Memory [26] and Gated Recurrent Neural
335
+ Network [27] when the input sequence gets longer. Moreover,
336
+ distinguished from many other bidirectional language models, such
337
+ as ELMo designed by Peters et al. [28], in which the contextual
338
+ representation of every word is the concatenation or summation of
339
+ the forward and backward representations, BERT reads the entire
340
+ sequence of words at once and is trained using a Masked Language
341
+ Model (MLM) approach and a Next Sentence Prediction (NSP)
342
+ approach which genuinely implemented the bidirectional concept
343
+ or unidirectional concept. These two features combined facilitate
344
+ better language understanding and bring the trophy to BERT
345
+
346
+ Geotag
347
+ Geotagged
348
+ Coordinates
349
+ Bounding
350
+ Box
351
+ Center of Bounding
352
+ Box
353
+ Place
354
+ Social Media
355
+ Coordinatesfrom
356
+ Name
357
+ Data
358
+ PlaceName
359
+ No
360
+ 4
361
+ ZipCode
362
+ Rule-based
363
+ Extractor
364
+ Data
365
+ Google
366
+ ZipCodes
367
+ NewsMedia
368
+ Geocoding
369
+ Preprocess
370
+ Data
371
+ Toponym
372
+ IdentifiedLocation
373
+ Recognition
374
+ Names
375
+ Coordinatesfrom
376
+ GeocodingTokenClassification
377
+ B-LOC
378
+ I-LOC
379
+ Outputpredictionforeach
380
+ token
381
+ Classifier
382
+ Language Model
383
+ [101,1030,17870,...102,...
384
+ 0,
385
+ 0,
386
+ 0]
387
+ Tokenizer
388
+ #HarveyRescueHoustonTX77074waitingforwater
389
+ rescueintheattic.Pleasehelp!"
390
+
391
+
392
+
393
+ throughout a number of NLP tasks under the General Language
394
+ Understanding Evaluation (GLUE) benchmark [12].
395
+ Off-the-shelf pretrained BERT model weights can be separated into
396
+ several categories based on the size of the model, whether upper
397
+ and lower cases are taken into consideration, the targeted language,
398
+ and
399
+ unique
400
+ training
401
+ strategies
402
+ (https://huggingface.co/transformers/v3.3.1/pretrained_models.ht
403
+ ml). Since place names are highly case sensitive and only the
404
+ English language is involved in this study, ‘bert-base-cased’ and
405
+ ‘bert-large-cased’ are selected as the candidate pretrained models
406
+ to be evaluated. The ‘bert-base-cased’ model comprises 12 layers,
407
+ and each hidden layer has 768 nodes, with 12 self-attention heads
408
+ and a total number of 110 million parameters. The ‘bert-large-cased’
409
+ model consists of 24 layers, and each hidden layer has 1024 nodes,
410
+ with 16 self-attention heads and 340 million parameters. The
411
+ parameters are pretrained with English text from BooksCorpus
412
+ (800 million words) and English Wikipedia (2,500 million words).
413
+ By stacking a classifier on top of BERT, the combo can be fine-
414
+ tuned to accomplish this downstream. Recent study showed that
415
+ model performance can be enhanced by applying classifiers more
416
+ complex than simple linear classifier or Conditional Random Field
417
+ (Zhou et al. 2022). Therefore, three classifiers were examined in
418
+ this study, namely linear classifier, multi-layer perceptron (MLP,
419
+ Figure 5) and one-dimensional CNN (CNN1D, Figure 6). The
420
+ simple linear classifier connects the output of the language model
421
+ to the final prediction results with the softmax activation function.
422
+ MLP applied in this study contains three fully connected layers and
423
+ links the language model output with a layer with the input size
424
+ equivalent to the output vector size. The number of hidden layer
425
+ nodes is 256 and the output layer size equals the number of distinct
426
+ labels from the training dataset. The CNN models are competent in
427
+ detecting underlying features [29] and one-dimensional CNN has
428
+ been successfully applied to process natural language [30, 31].
429
+ Realizing
430
+ location
431
+ names
432
+ might
433
+ share
434
+ some
435
+ common
436
+ characteristics, the idea of CNN1D is adopted. The vector output of
437
+ the language model can be considered as a one-dimensional signal
438
+ and a CNN1D with kernel size 3 is applied. The output channel of
439
+ the convolution is 16. Followed by a max pooling layer of size 2,
440
+ which further generalizes the features and reduces model
441
+ complexity. All channels of the max pooling layer output are
442
+ concatenated into a single vector and is fed to a fully connected
443
+ MLP with hidden layer size equals to 128.
444
+ All model combinations were implemented using Python language
445
+ and pertinent packages. The dataset splitting took advantage of the
446
+ ScikitLearn library and the BERT models were implemented based
447
+ on
448
+ the
449
+ huggingface
450
+ Transformer
451
+ library
452
+ (https://huggingface.co/transformers/). The model finetuning
453
+ pipeline was built using PyTorch functions.
454
+
455
+
456
+
457
+
458
+ Figure
459
+ 5:
460
+ TopoBERT
461
+ Architecture
462
+ with
463
+ Multi-layer
464
+ Perceptron as Classifier
465
+
466
+ Figure 6: TopoBERT Architecture with One-Dimensional
467
+ Convolutional Neural Network as Classifier
468
+ 2.3 Training and Evaluation
469
+ TopoBERT is envisioned to be a ready-to-use module that renders
470
+ optimal performance in toponym recognition. Models with
471
+ different architectures were trained and evaluated with six datasets
472
+ specified in Section 2.1 to determine the best model architecture
473
+ and training strategy. The training process utilized CoNLL2003-
474
+ Train as the training dataset by default and compared to another
475
+ larger dataset fusing CoNLL2003, Wiki3000, and WNUT2017.
476
+ The original dataset is labelled at word-level which cannot be input
477
+ to BERT directly due to BERT’s word-piece encoding, otherwise
478
+ it will lead to large numbers of out of vocabulary words. To tackle
479
+
480
+ BERT
481
+ E(cLs
482
+ En
483
+ ESEP
484
+ StackedTransformerEncoders
485
+
486
+
487
+ EICLS)
488
+ E
489
+ Em
490
+ ER
491
+ EISER
492
+ [CLS]
493
+ TOKEN 1
494
+ TOKEN.m
495
+ TOKENn
496
+ [SEP]
497
+ Word
498
+ Embeddings
499
+ Multi-layer
500
+ Perceptron
501
+ "TheEuropeanComissionsaidonTuesday...tohumanbeings."Max
502
+ Pooling
503
+ Word
504
+ Embeddings
505
+ Multi-layer
506
+ Convolutional
507
+ Concatenated
508
+ Perceptron
509
+ Layers
510
+ Layers
511
+ BERT
512
+ ECLs
513
+ Ei
514
+ En
515
+ ESEP)]
516
+ StackedTransformerEncoders
517
+
518
+ E(cLs)
519
+ E
520
+ E
521
+ En
522
+ E(SEP)
523
+ [CLS]
524
+ TOKEN1
525
+ TOKEN
526
+ TOKENT
527
+ [SEP]
528
+ "The European Comission saidon Tuesday...tohuman beings."
529
+
530
+
531
+ with this issue, we first split the input data at word-level, and
532
+ applied BERT word-piece tokenizer to each word. The same label
533
+ was assigned to each word-piece of a single word. The labeled
534
+ word-pieces are then merged to form the new input data which
535
+ could be processed by BERT. This experiment aimed at measuring
536
+ the performance fluctuations caused by training data size and
537
+ heterogeneity. CoNLL2003-Validation was used during the
538
+ training process to tune several fundamental hyperparameters such
539
+ as training epochs and learning rate. CoNLL2003-Test and
540
+ Harvey2017 datasets were used to evaluate the model performance.
541
+ The Harvey2017 dataset was also used to benchmark TopoBERT
542
+ with five prevailing toponym recognition models, namely Stanford
543
+ NLP [32], spaCy (https://spacy.io/), Bidirectional LSTM-CRF [33],
544
+ DM_NLP [34], and NeuroTPR [6].
545
+ The parameters of the classifier component of the module were
546
+ initialized with random non-zero numbers and the BERT
547
+ component was initialized with pre-trained parameters. The entire
548
+ module was trained with the fine-tuning approach [12], and the
549
+ parameters were updated using a mini-batch gradient descent
550
+ approach with early stopping. The maximum length of the input
551
+ sequence was limited to 128 in this paper. The maximum number
552
+ of training epochs was set to 50. As recommended by the original
553
+ BERT paper, the initial learning rate and the training batch size
554
+ were set to 2e-5 and 32 respectively [12]. Most commonly used loss
555
+ function for multi-class classification task, the cross-entropy loss
556
+ was employed. AdamW was selected as the optimizer during
557
+ training which adjusts the learning rate dynamically to accelerate
558
+ parameter convergence and implements weight decay to lower the
559
+ chance of overfitting. Warm up steps, which is using a very low
560
+ learning rate for the first several weight updating iterations, were
561
+ also introduced during training to reduce the impact of deviating
562
+ the model drastically from sudden exposure to unseen datasets.
563
+ Three commonly used evaluation metrics, precision, recall, and F1-
564
+ score (Equation 1-3), were applied to gauge the performance and
565
+ bias of the models. Precision calculates the percentage of correctly
566
+ identified location names (noted as True Positives, TP) among all
567
+ the location names predicted by the model, which combines both
568
+ TP and False Positives (FP). Recall measures the percentage of
569
+ correctly identified ones amongst all ground truth, which is the
570
+ combination of TP and False Negatives (FN). F1-score is the
571
+ harmonic mean of precision and recall, providing a comprehensive
572
+ metric to evaluate model performance.
573
+ 𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 =
574
+ ��
575
+ ����� (Equation 1)
576
+ 𝑅𝑒𝑐𝑎𝑙𝑙 =
577
+ ��
578
+ �����
579
+ (Equation 2)
580
+ 𝐹1–𝑠𝑐𝑜𝑟𝑒 = 2 ∗
581
+ ���������∗ ������
582
+ ���������� ������
583
+ (Equation 3)
584
+
585
+ The outputs of BERT models are at word-piece level and they are
586
+ concatenated using the special prefix ‘##’ and the word-level labels
587
+ are assigned base on the starting word-piece of the word. The
588
+ evaluation metrics are based on ‘per-token’ scores. Additionally,
589
+ location name entity consists of two types of labels (B-LOC and I-
590
+ LOC). In order to gauge the comprehensive performance of the
591
+ model on toponym recognition, the evaluation metrics were
592
+ calculated using a micro average approach, which computes a
593
+ global average of precision, recall, and F1-score. It calculates the
594
+ TP, FP and FN by counting the total number of TP, FP and FN
595
+ under each class, namely, “B-LOC” and “I-LOC”.
596
+
597
+ 3 Results and Analysis
598
+ The first step of the experiment targeted at determining the optimal
599
+ pretrained parameters for BERT model. We hypothesize that larger
600
+ models outperform smaller models. To verify this hypothesis, the
601
+ performance of the models initialized with ‘bert-base-cased’ and
602
+ ‘bert-large-cased’ with a linear classifier stacked on top were tested.
603
+ The results are displayed in Table 1.
604
+ Table 1: Evaluation results for testing on different pretrained
605
+ parameters.
606
+ BERT Model
607
+ Classifie
608
+ r
609
+ Precisio
610
+ n
611
+ Recal
612
+ l
613
+ F1-
614
+ score
615
+ bert-base-cased
616
+ Linear
617
+ 0.900
618
+ 0.904
619
+ 0.902
620
+ bert-large-
621
+ cased
622
+ Linear
623
+ 0.934
624
+ 0.901
625
+ 0.917
626
+
627
+ These two models were trained with CoNLL2003-Train and
628
+ evaluated with CoNLL2003-Test. Compared to ‘bert-base-cased’,
629
+ the precision of the prediction increased from 0.900 to 0.934 by
630
+ using ‘bert-large-cased’ while the recall almost remained static.
631
+ The F1-scores showed that ‘bert-large-cased’ rendered better
632
+ results which is in conformity with the original BERT paper [12]
633
+ and validated our initial hypothesis. Therefore, ‘bert-large-cased’
634
+ was harnessed in all the follow-up experiments.
635
+ The second step of the experiments aimed to measure the influence
636
+ of the training data and determine the optimal classifier. The model
637
+ performances were evaluated using two different datasets,
638
+ CoNLL2003-Test and Harvey2017. We hypothesize that (a) the
639
+ model with CNN1D classifier yield better results and (b) models
640
+ trained with larger datasets perform better in placename recognition.
641
+ Table 2 and Table 3 list the evaluation metrics of all the tests.
642
+ Table 2: Evaluation results with CoNLL2003-Test dataset for
643
+ testing on training data variation and classifier types.
644
+ Training Data
645
+ Classifier
646
+ Precision
647
+ Recall
648
+ F1-score
649
+ CoNLL2003
650
+ Linear
651
+ 0.934
652
+ 0.901
653
+ 0.917
654
+ CoNLL2003
655
+ MLP
656
+ 0.904
657
+ 0.910
658
+ 0.907
659
+ CoNLL2003
660
+ CNN1D
661
+ 0.923
662
+ 0.920
663
+ 0.921
664
+ Combined
665
+ Linear
666
+ 0.889
667
+ 0.844
668
+ 0.866
669
+ Combined
670
+ MLP
671
+ 0.941
672
+ 0.884
673
+ 0.912
674
+ Combined
675
+ CNN1D
676
+ 0.942
677
+ 0.916
678
+ 0.929
679
+ Table 3: Evaluation results with Harvey2017 dataset for
680
+ testing on training data variation and classifier types.
681
+
682
+
683
+
684
+
685
+
686
+ Training Data
687
+ Classifier
688
+ Precision
689
+ Recall
690
+ F1-score
691
+ CoNLL2003
692
+ Linear
693
+ 0.895
694
+ 0.804
695
+ 0.847
696
+ CoNLL2003
697
+ MLP
698
+ 0.885
699
+ 0.811
700
+ 0.846
701
+ CoNLL2003
702
+ CNN1D
703
+ 0.898
704
+ 0.835
705
+ 0.865
706
+ Combined
707
+ Linear
708
+ 0.872
709
+ 0.589
710
+ 0.703
711
+ Combined
712
+ MLP
713
+ 0.932
714
+ 0.541
715
+ 0.685
716
+ Combined
717
+ CNN1D
718
+ 0.941
719
+ 0.668
720
+ 0.781
721
+ The “CoNLL2003” under the Training Data column means
722
+ CoNLL2003-Train dataset and the “Combined” represents the
723
+ dataset merging CoNLL2003-Test, Wiki3000 and WNUT2017.
724
+ In Table 2, when models were trained with CoNLL2003-Train, the
725
+ one with a simple linear classifier produced the best precision
726
+ (0.934), and the one with CNN1D produced the best recall (0.920)
727
+ and F1-score (0.921). MLP performed the worst among the three
728
+ classifiers. When models were trained with a combined dataset, the
729
+ model with CNN1D outperformed the rest in all three metrics with
730
+ precision equal to 0.942, recall of 0.916, and F1-score of 0.929. The
731
+ one with a linear classifier produced the worst results with an F1-
732
+ score of 0.866. In Table 3, when models were trained with
733
+ CoNLL2003-Train, the one with the CNN1D classifier
734
+ outperformed the rest with precision equal to 0.898, recall of 0.835,
735
+ and F1-score of 0.865. When models were trained with a combined
736
+ dataset, the model with CNN1D successfully defended its trophy
737
+ by rendering precision of 0.941, recall of 0.668, and F1-score of
738
+ 0.781. The models with MLP worked slightly worse than the ones
739
+ with linear classifiers.
740
+ The above elucidation certifies the hypothesis that models with
741
+ CNN1D generate the optimal performance. It also shows that more
742
+ complicated classifiers like multi-layer perceptron do not
743
+ necessarily render better results.
744
+ However, when viewing Tables 2 and 3 contemporaneously, the
745
+ results from training with different datasets, the metrics indicated
746
+ that the model trained with the combined dataset generally
747
+ performed worse than the ones trained with merely CoNLL2003-
748
+ Train. This phenomenon contradicts the hypothesis that models
749
+ trained with larger datasets perform better. After scrutinizing the
750
+ dataset used for training, we noticed some inconsistencies in the
751
+ labeling criteria of the datasets. Some examples are listed in Table
752
+ 4 and the unexpected phenomenon can be interpreted by the
753
+ heterogeneity of the datasets.
754
+ Table 4: Examples of different labels across the datasets used
755
+ for training the model.
756
+ Example Entity
757
+ Dataset
758
+ CoNLL200
759
+ 3
760
+ Wiki300
761
+ 0
762
+ WNUT201
763
+ 7
764
+ "Canadian"
765
+ B-MISC
766
+ O
767
+ B-LOC
768
+ "Planet"
769
+ O
770
+ O
771
+ B-LOC
772
+ "east"
773
+ O
774
+ O
775
+ B-LOC
776
+ "orchard"
777
+ "academy"
778
+ B-ORG/
779
+ I-ORG
780
+ O
781
+ B-LOC/
782
+ I-LOC
783
+ "earth"
784
+ O
785
+ N/A
786
+ B-LOC
787
+ It can be seen from Table 4 that the word “Canadian,” which is
788
+ labeled as “B-MISC” (beginning of a miscellaneous name), is
789
+ identified as “B-LOC” (beginning of a location) in the WNUT2017
790
+ dataset. The words “Planet”, “east,” and “earth” are misclassified
791
+ as locations in the WNUT2017 dataset. The phrase “orchard
792
+ academy,” regarded as an organization under the CoNLL2003
793
+ criteria, is also labeled as a location entity. In this case, combining
794
+ several heterogeneous datasets can be considered adding some
795
+ helpful unseen samples to the original training data while
796
+ introducing a substantial amount of noise.
797
+ Rolnick et al. [13] experimented on several deep learning models
798
+ when trained with noisy data and claimed that the CNN model is
799
+ more resilient to noise than MLP and linear models. The trend of
800
+ performance change shown in Tables 2 and 3 when trained with
801
+ different datasets is in accordance with this statement. It is
802
+ noticeable that the models experience an increase in precision and
803
+ a drastic decrease in recall when trained with a combined dataset.
804
+ This incident can as well be triggered by noisy data. Since deep
805
+ learning models attempt to learn the underlying patterns of the
806
+ training data, the existing noise will confuse the model, resulting in
807
+ a fewer number of positive predictions. This might result in an
808
+ increase in precision and a decrease in recall.
809
+ Based on the observation and interpretation above, the BERT
810
+ model initialized with ‘bert-large-cased’, stacked with a CNN1D
811
+ classifier and fine-tuned with CoNLL2003-Train was selected as
812
+ the finalized TopoBERT module. Table 5 shows a comparison
813
+ between TopoBERT and five other models and tools based on the
814
+ Harvey2017 dataset.
815
+ Table 5: Evaluation results with Harvey2017 dataset for
816
+ comparing TopoBERT with other existing models.
817
+ Model
818
+ Precisio
819
+ n
820
+ Recal
821
+ l
822
+ F1-
823
+ score
824
+ Stanford NER (broad
825
+ location)
826
+ 0.729
827
+ 0.440
828
+ 0.548
829
+ SpaCy NER (broad location)
830
+ 0.461
831
+ 0.304
832
+ 0.366
833
+ BiLSTM-CRF
834
+ 0.703
835
+ 0.600
836
+ 0.649
837
+ DM_NLP
838
+ 0.729
839
+ 0.680
840
+ 0.703
841
+ NeuroTPR
842
+ 0.787
843
+ 0.678
844
+ 0.728
845
+ TopoBERT
846
+ 0.898
847
+ 0.835
848
+ 0.865
849
+ The SpaCy version v3.0 is used with model “en_core_web_sm”
850
+ loaded. Broad location indicates that we include entities in both
851
+ LOCATION and ORGANIZATION for Stanford NER, and we
852
+ include entities in the types of LOC, ORG, FACILITY, and GPE
853
+ for spaCy NER. Evaluation results show that TopoBERT prevailed
854
+ in the competition with precision equals to 0.898, recall 0.835 and
855
+ F1-score 0.865. This result outperformed other baseline models by
856
+ at least 18%.
857
+ TopoBERT has been developed as a ready-to-use module. The
858
+ output data of TopoBERT includes word labels and confidence of
859
+ the prediction. It complies with JSON file format for ease of use.
860
+
861
+
862
+
863
+
864
+ The source code has been uploaded to GitHub and can be accessed
865
+ with the link: https://github.com/SPGBarrett/gearlab_topobert.
866
+
867
+ 4 Discussion
868
+ This paper presents a geoparsing framework and breeds a plug and
869
+ play toponym recognition module which can facilitate spatial
870
+ analysis based on social media or news media data. Figure 7 shows
871
+ a practical application of this framework in locating Twitter posts
872
+ under fine-grained topics during hazardous events. The study area
873
+ is the State of Florida, and the dots in multiple colors displayed on
874
+ the map are tweets posted during Hurricane Irma harvested by
875
+ Twitter developer API. The locations of those tweets without
876
+ geotags are retrieved by running TopoBERT and google geocoding
877
+ service. The module also enjoys the potential of being used for
878
+ location name detection for news media to pinpoint the discussed
879
+ topics [14,15] and help to identify fake news [16].
880
+
881
+
882
+ Figure 7: Toponym recognition applied to locate Twitter posts
883
+ during disasters.
884
+ This paper concentrates mainly on designing a novel architecture
885
+ of a reliable and versatile module for toponym recognition.
886
+ However, the performance enhancement can continue by
887
+ addressing the following issues.
888
+ First, the models are trained and evaluated based on well prepared
889
+ datasets. This can be regarded as a best-case scenario compared to
890
+ real life situations. Place name usage can be highly ambiguous and
891
+ random, especially within social media platforms. Typos are
892
+ extremely common which might cause out-of-vocabulary words in
893
+ language models. Place name abbreviations such as “Boulevard”
894
+ and “blvd”, “Drive” and “Dr.”, “Street” and “St.” and so forth are
895
+ frequently utilized interchangeably. People might unconsciously
896
+ ignore the correct upper-case and lower-case usage, such as
897
+ “college station” and “College Station”, “mexico” and “MEXICO”.
898
+ Meticulous data preprocessing methods can be incorporated to
899
+ tackle this problem in order to achieve better overall performance.
900
+ Second, several rule-base approaches can be leveraged to further
901
+ boost the performance. Enlightened by the success of hybrid
902
+ models [9], sets of grammar rules based on the composition of
903
+ nouns, determiners, adjectives, conjunctions, numbers and
904
+ possessive ending can be designed [17]. Additionally, commonly
905
+ used gazetteers such as OpenStreetMap and GeoNames can be used
906
+ as extra named entity matching criteria which will enhance the True
907
+ Positives of the model. Regional criteria can be appended to the
908
+ model while identifying place names by making country name,
909
+ state names, county names, or bounding boxes as input variables of
910
+ the model. This will allow the model to add constraints during
911
+ processing. The top-N words from word embedding models [9,35],
912
+ which are not place names, can be applied to filter words during
913
+ data preprocessing. This will to some extent eliminate the False
914
+ Positives of the prediction.
915
+ Third, due to the data-hungry nature of deep learning, data
916
+ availability and quality are topics being inevitably discussed when
917
+ large complicated deep learning models are involved. It is common
918
+ knowledge in the deep learning world that larger datasets lead to
919
+ better generalizability and performance. However, this statement
920
+ fails to hold true in this paper due to the fact that the larger datasets
921
+ are derived from several distinguished smaller datasets labeled
922
+ under their own unique regime. Therefore, there is an urgent need
923
+ to define criteria and build unified datasets for toponym recognition
924
+ model training, evaluating and benchmarking. The dataset can be
925
+ manually modified based on existing datasets and augmented using
926
+ rule-based methods, gazetteers or Generative Adversarial Network
927
+ [18,19,20].
928
+ Fourth, fine-tuned language models can be few-shot or zero-shot
929
+ learners, which means that the models can be applied directly to
930
+ certain downstream tasks with very little or even no further training
931
+ [21,22,23]. This is because advanced language models can better
932
+ capture the meaning of the text. This claim is also underpinned by
933
+ the result of this paper which leverages BERT to boost the module
934
+ capability. Therefore, incorporating gigantic models such as GPT-
935
+ 3 [24] might lead to another round of performance enhancement.
936
+ 5 Conclusion
937
+ To further enhance the performance of toponym recognition by
938
+ better understanding natural language, TopoBERT, which
939
+ incorporate pretrained language model, BERT, is introduced.
940
+ Experiments on the pretrained parameters, training dataset
941
+ combinations, and model architecture reveal the following findings.
942
+ First, the toponym recognition model performance is sensitive to
943
+ the architecture of pre-trained language models and classifiers. The
944
+ models initialized with a larger-structured BERT model (“bert-
945
+ large-cased”) show an advantage over the models initialized with a
946
+ basic BERT model (“bert-base-cased”). More complicated
947
+ classifiers like MLP do not necessarily win over simple linear
948
+ classifiers. Second, increasing training data size produces worse
949
+ results, especially for the recall, due to data heterogeneity. The
950
+ model trained with single dataset, CoNLL2003-Train, and stacked
951
+ on top with a CNN1D classifier renders the optimum results both
952
+ on CoNLL2003-Test and Harvey2017 datasets. Finally, the
953
+ developed TopoBERT module outperforms existing models in
954
+
955
+ Hurricane Category
956
+ IrmaRouteLine
957
+ Florida_Census_ Tract_2019
958
+ 0
959
+ Human_Help_Florida
960
+ Animal HelpFlorida
961
+ 3
962
+ Infrastructure Florida
963
+ ShelterFlorida
964
+
965
+
966
+
967
+ recognizing place names in texts. The clinched TopoBERT with the
968
+ optimal model architecture and training strategy produces reliable
969
+ toponym prediction and achieves F1-score of 0.865 on Harvey2017
970
+ dataset, which surpasses other prevailing models or tools by at least
971
+ 18%.
972
+ In nutshell, the discoveries of this paper contribute in determining
973
+ the optimal model structure on toponym recognition tasks and
974
+ urges a large standardized dataset labeled with unified regime to
975
+ support model training and benchmarking. A plug and play module
976
+ is implemented and open sourced to support pertinent applications
977
+ and similar research.
978
+ ACKNOWLEDGMENTS
979
+ The research is supported by a project funded by the U.S. National
980
+ Science Foundation: Reducing the Human Impacts of Flash Floods
981
+ - Development of Microdata and Causal Model to Inform
982
+ Mitigation and Preparedness (Award No. 1931301).
983
+ REFERENCES
984
+ [1] Marco Avvenuti, Stefano Cresci, Mariantonietta La N. Polla, Andrea Marchetti,
985
+ and Maurizio Tesconi. 2014. Earthquake emergency management by Social
986
+ Sensing. 24 - 28 March 2014, Budapest, Hungary. IEEE, Piscataway, NJ.
987
+ [2] Lei Zou, Nina S. N. Lam, Shayan Shams, Heng Cai, Michelle A. Meyer, Seungwon
988
+ Yang, Kisung Lee, Seung-Jong Park, and Margaret A. Reams. 2019. Social and
989
+ geographical disparities in Twitter use during
990
+ [3] Lei Zou, Nina S. N. Lam, Heng Cai, and Yi Qiang. 2018. Mining Twitter Data
991
+ for Improved Understanding of Disaster Resilience. Annals of the American
992
+ Association
993
+ of
994
+ Geographers
995
+ 108,
996
+ 5,
997
+ 1422–1441.
998
+ DOI:
999
+ https://doi.org/10.1080/24694452.2017.1421897.
1000
+ [4] Xiao Huang, Zhenlong Li, Yuqin Jiang, Xiaoming Li, and Dwayne Porter. 2020.
1001
+ Twitter reveals human mobility dynamics during the COVID-19 pandemic. PLoS
1002
+ ONE 15, 11, e0241957. DOI: https://doi.org/10.1371/journal.pone.0241957.
1003
+ [5] Bing Zhou, Lei Zou, Ali Mostafavi, Binbin Lin, Mingzheng Yang, Nasir
1004
+ Gharaibeh, Heng Cai, Joynal Abedin, and Debayan Mandal. 2022. VictimFinder:
1005
+ Harvesting rescue requests in disaster response from social media with BERT.
1006
+ Computers,
1007
+ Environment
1008
+ and
1009
+ Urban
1010
+ Systems
1011
+ 95,
1012
+ 101824.
1013
+ DOI:
1014
+ https://doi.org/10.1016/j.compenvurbsys.2022.101824.
1015
+ [6] Jimin Wang, Yingjie Hu, and Kenneth Joseph. 2020. NeuroTPR: A neuro‐net
1016
+ toponym recognition model for extracting locations from social media messages.
1017
+ Transactions in GIS 24, 3, 719–735. DOI: https://doi.org/10.1111/tgis.12627.
1018
+ [7] Peng Qi, Yuhao Zhang, Yuhui Zhang, Jason Bolton, and Christopher D. Manning.
1019
+ 2020. Stanza: A Python Natural Language Processing Toolkit for Many Human
1020
+ Languages.
1021
+ [8] Ritam Dutt, Kaustubh Hiware, Avijit Ghosh, and Rameshwar Bhaskaran. 2018.
1022
+ SAVITR. In Companion Proceedings of the The Web Conference 2018.
1023
+ International World Wide Web Conferences Steering Committee, [Place of
1024
+ publication
1025
+ not
1026
+ identified],
1027
+ 1643–1649.
1028
+ DOI:
1029
+ https://doi.org/10.1145/3184558.3191623.
1030
+ [9] Xuke Hu, Hussein S. Al-Olimat, Jens Kersten, Matti Wiegmann, Friederike Klan,
1031
+ Yeran Sun, and Hongchao Fan. 2022. GazPNE: annotation-free deep learning for
1032
+ place name extraction from microblogs leveraging gazetteer and synthetic data
1033
+ by rules. International Journal of Geographical Information Science 36, 2, 310–
1034
+ 337. DOI: https://doi.org/10.1080/13658816.2021.1947507.
1035
+ [10] Sang, Erik F. Tjong Kim and Fien de Meulder. 2003. Introduction to the CoNLL-
1036
+ 2003 Shared Task: Language-Independent Named Entity Recognition.
1037
+ [11] Leon Derczynski, Eric Nichols, Marieke van Erp, and Nut Limsopatham. Results
1038
+ of the WNUT2017 Shared Task on Novel and Emerging Entity Recognition. In
1039
+ Proceedings of the 3rd Workshop on Noisy User-generated Text. Association for
1040
+ Computational
1041
+ Linguistics,
1042
+ Stroudsburg,
1043
+ PA,
1044
+ USA,
1045
+ 140–147.
1046
+ DOI:
1047
+ https://doi.org/10.18653/v1/W17-4418.
1048
+ [12] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018.
1049
+ BERT Pre-training of Deep Bidirectional Transformers for Language
1050
+ Understanding.
1051
+ [13] David Rolnick, Andreas Veit, Serge Belongie, and Nir Shavit. 2017. Deep
1052
+ Learning
1053
+ is
1054
+ Robust
1055
+ to
1056
+ Massive
1057
+ Label
1058
+ Noise.
1059
+ DOI:
1060
+ https://doi.org/10.48550/arXiv.1705.10694.
1061
+ [14] Youjie Zhou and Jiebo Luo. 2012. Geo-location inference on news articles via
1062
+ multimodal pLSA. In MM'12. The proceedings of the 20th ACM international
1063
+ conference on multimedia, co-located with ACM multimedia 2012, October 29-
1064
+ November 2, 2012, Nara, Japan. Association for Computer Machinery, New
1065
+ York, 741. DOI: https://doi.org/10.1145/2393347.2396301.
1066
+ [15] Mauricio Quezada, Vanessa Peña-Araya, and Barbara Poblete. 2015. Location-
1067
+ Aware Model for News Events in Social Media. In SIGIR 2015. Proceedings of
1068
+ the 38th International ACM SIGIR Conference on Research and Development in
1069
+ Information Retrieval : August 9-13, 2015, Santiago, Chile. ACM, New York,
1070
+ 935–938. DOI: https://doi.org/10.1145/2766462.2767815.
1071
+ [16] Kai Shu, Xinyi Zhou, Suhang Wang, Reza Zafarani, and Huan Liu. 2019. The
1072
+ role of user profiles for fake news detection. In ASONAM 2019. Proceedings of
1073
+ the 2019 IEEE/ACM International Conference on Advances in Social Networks
1074
+ Analysis and Mining : FAB 2019, FOSINT-SI 2019, HI-BI-BI 2019 : Vancouver,
1075
+ Canada, 27-30 August, 2019 : workshops held in conjunction with ASONAM
1076
+ 2019: the 10th International Workshop on Mining and Analyzing Social
1077
+ Networks for Decision Support (MSNDS 2019), the 9th International Workshop
1078
+ on Social Network Analysis in Applications (SNAA 2019), Workshop on Social
1079
+ Influence (5th edition) (SI 2019), the 4th International Workshop on Social
1080
+ Network Analysis Surveillance Technologies (SNAST 2019), Recommendation
1081
+ and Advertising in Online Social Networks (READNet 2019). IEEE,
1082
+ [Piscataway, NJ], 436–439. DOI: https://doi.org/10.1145/3341161.3342927.
1083
+ [17] Prasanna Giridhar, Tarek Abdelzaher, Jemin George, and Lance Kaplan. 2015 -
1084
+ 2015. On quality of event localization from social network feeds. In 2015 IEEE
1085
+ International Conference on Pervasive Computing and Communication
1086
+ Workshops
1087
+ (PerCom
1088
+ Workshops).
1089
+ IEEE,
1090
+ 75–80.
1091
+ DOI:
1092
+ https://doi.org/10.1109/PERCOMW.2015.7133997.
1093
+ [18] Connor Shorten, Taghi M. Khoshgoftaar, and Borko Furht. 2021. Text Data
1094
+ Augmentation for Deep Learning. Journal of big data 8, 1, 101. DOI:
1095
+ https://doi.org/10.1186/s40537-021-00492-0.
1096
+ [19] Rui Cao and Roy K.-W. Lee. HateGAN: Adversarial Generative-Based Data
1097
+ Augmentation for Hate Speech Detection. In Proceedings of the 28th
1098
+ International Conference on Computational Linguistics. International Committee
1099
+ on Computational Linguistics, Stroudsburg, PA, USA, 6327–6338. DOI:
1100
+ https://doi.org/10.18653/v1/2020.coling-main.557.
1101
+ [20] Steven Y. Feng, Varun Gangal, Jason Wei, Sarath Chandar, Soroush Vosoughi,
1102
+ Teruko Mitamura, and Eduard Hovy. 2021. A Survey of Data Augmentation
1103
+ Approaches for NLP.
1104
+ [21] Jason Wei, Maarten Bosma, Vincent Y. Zhao, Kelvin Guu, Adams W. Yu, Brian
1105
+ Lester, Nan Du, Andrew M. Dai, and Quoc V. Le. 2021. Finetuned Language
1106
+ Models Are Zero-Shot Learners.
1107
+ [22] Mitchell Wortsman, Gabriel Ilharco, Jong W. Kim, Mike Li, Simon Kornblith,
1108
+ Rebecca Roelofs, Raphael G. Lopes, Hannaneh Hajishirzi, Ali Farhadi,
1109
+ Hongseok Namkoong, and Ludwig Schmidt. 2021. Robust fine-tuning of zero-
1110
+ shot models.
1111
+ [23] Pushpankar K. Pushp and Muktabh M. Srivastava. 2017. Train Once, Test
1112
+ Anywhere: Zero-Shot Learning for Text Classification.
1113
+ [24] Tom B. Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan,
1114
+ Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda
1115
+ Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom
1116
+ Henighan, Rewon Child, Aditya Ramesh, Daniel M. Ziegler, Jeffrey Wu,
1117
+ Clemens Winter, Christopher Hesse, Mark Chen, Eric Sigler, Mateusz Litwin,
1118
+ Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish,
1119
+ Alec Radford, Ilya Sutskever, and Dario Amodei. 2020. Language Models are
1120
+ Few-Shot Learners.
1121
+ [25] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones,
1122
+ Aidan N.Gomez, and Lukasz Kaiser. Attention Is All You Need. 31st Conference
1123
+ on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA.
1124
+ [26] S. Hochreiter and J. Schmidhuber. 1997. Long short-term memory. Neural
1125
+ computation 9, 8, 1735–1780. DOI: https://doi.org/10.1162/neco.1997.9.8.1735.
1126
+ [27] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural Machine
1127
+ Translation by Jointly Learning to Align and Translate.
1128
+ [28] Matthew E.Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher
1129
+ Clark, Kenton Lee, and Luke Zettlemoyer. Deep contextualized word
1130
+ representations.
1131
+ [29] Lee, J. Y., & Dernoncourt, F. (2016). Sequential Short-Text Classification with
1132
+ Recurrent and Convolutional Neural Networks. https://arxiv.org/pdf/1603.03827
1133
+ [30] Jianfeng Zhao, Xia Mao, and Lijiang Chen. 2019. Speech emotion recognition
1134
+ using deep 1D & 2D CNN LSTM networks. Biomedical Signal Processing and
1135
+ Control 47, 312–323. DOI: https://doi.org/10.1016/j.bspc.2018.08.035.
1136
+ [31] Serkan Kiranyaz, Onur Avci, Osama Abdeljaber, Turker Ince, Moncef Gabbouj,
1137
+ and Daniel J. Inman. 2021. 1D convolutional neural networks and applications:
1138
+ A survey. Mechanical Systems and Signal Processing 151, 107398. DOI:
1139
+ https://doi.org/10.1016/j.ymssp.2020.107398.
1140
+ [32] Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005.
1141
+ Incorporating Non-local Information into Information Extraction Systems by
1142
+ Gibbs Sampling. Proceedings of the 43nd Annual Meeting of the Association for
1143
+ Computational
1144
+ Linguistics
1145
+ (ACL
1146
+ 2005), pp.
1147
+ 363-
1148
+ 370. http://nlp.stanford.edu/~manning/papers/gibbscrf3.pdf
1149
+ [33] Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF Models
1150
+ for Sequence Tagging.
1151
+
1152
+
1153
+
1154
+
1155
+ [34] Chunping Ma, Huafei Zheng, Pengjun Xie, Chen Li, Linlin Li, and Luo Si.
1156
+ DM_NLP at SemEval-2018 Task 8: neural sequence labeling with linguistic
1157
+ features. In Proceedings of The 12th International Workshop on Semantic
1158
+ Evaluation. Association for Computational Linguistics, Stroudsburg, PA, USA,
1159
+ 707–711. DOI: https://doi.org/10.18653/v1/S18-1114.
1160
+ [35] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean.
1161
+ Distributed Representations of Words and Phrases and their Compositionality.
1162
+
1163
+
1164
+
A9FRT4oBgHgl3EQfujgS/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CNE4T4oBgHgl3EQf5g54/content/2301.05324v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1198a89231dcad72df7a47ab1004cfefdbad2af4b6055b9ea303b4aeedf4c2f0
3
+ size 1474690
CNE4T4oBgHgl3EQf5g54/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:04683ed10d02803c29ddbc4293f033e2e43c4a6bfe9eeace01572c97851b62d8
3
+ size 3014701
CNE4T4oBgHgl3EQf5g54/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:56f7c552f6c02dd17bfdc25d78d718f80528d2b04bc2870c67431b90bafb539d
3
+ size 100039
CtAzT4oBgHgl3EQfiP1R/content/2301.01496v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:51882d897b431f99668cbbe76d2b2158b398a7facb5abc0fab113bc222b82a59
3
+ size 219358
CtAzT4oBgHgl3EQfiP1R/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:817171b1533148bb90dce75517b67249e1b993a968c6538760a091d636b3890b
3
+ size 99426
E9FLT4oBgHgl3EQfFi_K/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:79da0fbd86fe66aae8de6590f3e661f1fc74d4fc5e2fb5ab7d78e65244330e37
3
+ size 2818093
G9AzT4oBgHgl3EQfxf6F/content/tmp_files/2301.01739v1.pdf.txt ADDED
@@ -0,0 +1,1866 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MITP/21-047
2
+ Refactorisation in subleading ¯B → Xsγ
3
+ Tobias Hurtha and Robert Szafron,b
4
+ aPRISMA+ Cluster of Excellence and Institute of Physics (THEP),
5
+ Johannes Gutenberg University, D-55099 Mainz, Germany
6
+ bDepartment of Physics, Brookhaven National Laboratory, Upton, N.Y., 11973, U.S.A.
7
+ Abstract
8
+ We establish refactorisation conditions between the subleading O8-O8 contributions to
9
+ the inclusive ¯B → Xsγ decay suffering from endpoint divergences and prove a factorisa-
10
+ tion theorem for these contributions to all orders in the strong coupling constant.
11
+ This
12
+ allows for higher-order calculations of the resolved contributions and consistent summation
13
+ of large logarithms, consequently reducing the recently found large-scale dependence in these
14
+ contributions. We implement the concept of refactorisation in a heavy flavour application
15
+ of SCET, which includes nonperturbative functions as additional subtlety not present in
16
+ collider applications.
17
+ 1
18
+ arXiv:2301.01739v1 [hep-ph] 4 Jan 2023
19
+
20
+ Contents
21
+ 1
22
+ Introduction
23
+ 3
24
+ 2
25
+ General setup
26
+ 4
27
+ 2.1
28
+ Hard matching
29
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30
+ 5
31
+ 3
32
+ Bare factorisation theorem
33
+ 7
34
+ 3.1
35
+ B-type current (direct) contribution . . . . . . . . . . . . . . . . . . . . . . . . . .
36
+ 7
37
+ 3.2
38
+ A-type (resolved) contribution
39
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
+ 10
41
+ 4
42
+ Refactorisation of the endpoint contribution
43
+ 12
44
+ 4.1
45
+ Refactorisation at leading order . . . . . . . . . . . . . . . . . . . . . . . . . . . .
46
+ 15
47
+ 4.2
48
+ Bare refactorised factorisation theorem . . . . . . . . . . . . . . . . . . . . . . . .
49
+ 17
50
+ 4.3
51
+ Refactorised factorisation theorem after renormalisation . . . . . . . . . . . . . . .
52
+ 17
53
+ 5
54
+ Summary and Outlook
55
+ 20
56
+ 2
57
+
58
+ 1
59
+ Introduction
60
+ There has been a general belief that soft-collinear factorisation at subleading power in ΛQCD/mb
61
+ expansion is well established for inclusive B−decay modes such as ¯B → Xsγ, ¯B → Xsℓℓ, or
62
+ ¯B → Xuℓ¯ν [1] – in contrast to exclusive B decays where factorisation theorems do not exist at
63
+ the subleading power in general. There are two types of subleading contributions to the inclusive
64
+ ¯B → Xsγ decay, direct and resolved ones. In the latter, the photon does not directly couple to an
65
+ effective electroweak vertex, but they contain subprocesses in which the photons couple to light
66
+ partons instead. These subleading corrections are nonlocal in the endpoint region, and they stay
67
+ nonlocal even in the region where the local heavy mass expansion is applicable. In this sense,
68
+ they represent an irreducible uncertainty of this decay mode. Analogous subleading contributions
69
+ exist in the inclusive ¯B → Xsℓℓ decay but not in the inclusive ¯B → Xuℓ¯ν decay because, in this
70
+ case, the leptons can couple to light partons via the W vector boson only.
71
+ The first systematic analysis of resolved contributions to the inclusive ¯B → Xsγ decay [2,3] was
72
+ worked out in Refs. [4,5], the corresponding 1/mb contributions to the inclusive ¯B → Xsℓℓ decay
73
+ were discussed in Refs. [6,7], using soft collinear effective theory (SCET). Recently, the uncertainty
74
+ due to the resolved contribution was reduced with the help of a new hadronic input [8, 9]. But
75
+ these resolved contributions still represent the largest uncertainty in the inclusive ¯B → Xsγ decay.
76
+ Moreover, a large scale dependence and also a large charm mass dependence were identified in
77
+ the lowest order result of the resolved contribution, which calls for a systematic calculation of αs
78
+ corrections and renormalisation group (RG) summation [9]. A mandatory prerequisite for this
79
+ task is an all-order in the strong coupling constant αs factorisation formula for the subleading
80
+ power corrections.
81
+ The factorisation of resolved contributions introduces a new ingredient, namely an anti-
82
+ hardcollinear jet function [4], typically referred to as a radiative or amplitude-level jet function
83
+ in collider and flavour applications [10–18]. They are not represented by cut propagators as the
84
+ usual jet functions but as full propagator functions (both dressed by Wilson lines). But as al-
85
+ ready noticed in Ref. [4], the specific resolved O8 − O8 contribution does not factorise because
86
+ the convolution integral is UV divergent. The authors of Ref. [4] emphasised that there is an
87
+ essential difference between divergent convolution integrals in power-suppressed contributions of
88
+ exclusive B decays and the divergent convolution integrals in the present case, while the former
89
+ were of IR origin, the latter divergence of UV nature. However, a solution at the lowest order
90
+ was established by considering the sum of direct and resolved O8 − O8 contributions, which was
91
+ shown to be scale and scheme dependent by using a hard cut-off in the resolved contribution. But
92
+ the failure of factorisation does not allow for a consistent resummation of large logarithms.
93
+ In this paper, we identify the divergences in the resolved and in the direct contributions
94
+ as endpoint divergences by showing that also the divergence in the direct contribution can be
95
+ traced back to a divergent convolution integral.
96
+ Recently, new techniques were presented in
97
+ specific collider applications of SCET [19–27]. The so-called refactorisation conditions or endpoint
98
+ factorisation [22,23,25–27] allow for an operator-level reshuffling of terms within the factorisation
99
+ formula so that all endpoint divergences cancel out. In this work, we now implement this idea
100
+ in a flavour application of SCETI, which includes nonperturbative soft functions not present in
101
+ collider applications – often referred to as subleading shape functions [28,29].
102
+ As a first step, we derive the matching of the hard function for the two operators involved
103
+ in the O8 − O8 subleading contributions. In the second step, we establish the bare factorisation
104
+ theorem for the direct and the resolved contribution at an operational level. Then we derive
105
+ 3
106
+
107
+ the refactorisation conditions to all orders, leading us finally to the renormalised factorisation
108
+ theorem. We present all steps for the inclusive ¯B → Xsγ, but all the details can also be taken
109
+ over for the corresponding ¯B → Xsℓℓ case.
110
+ 2
111
+ General setup
112
+ The starting point for all calculations concerning the ¯B → Xsγ decay is the weak effective
113
+ Lagrangian defined at a scale µb parametrically equal to the b-quark mass µb ∼ mb. The weak
114
+ effective Lagrangian is obtained from the SM Lagrangian after integrating out the heavy particles
115
+ like the heavy gauge bosons and the top quark. We use the convention of Ref. [30]. Assuming
116
+ Standard Model CKM unitarity, with λq = VqbV ∗
117
+ qs and λu + λc + λt = 0, the effective Hamiltonian
118
+ may be written as
119
+ Heff = GF
120
+
121
+ 2
122
+
123
+ q=u,c
124
+ λq
125
+
126
+ C1 Oq
127
+ 1 + C2 Oq
128
+ 2 + C7γ O7γ + C8g O8g +
129
+
130
+ i=3,...,6
131
+ Ci Oi
132
+
133
+ .
134
+ (1)
135
+ Here we concentrate on the O8 operator:
136
+ O8g = − gs
137
+ 8π2 mb ¯sσµν(1 + γ5)Gµνb .
138
+ (2)
139
+ Our sign convention is that iDµ = i∂µ+gs taAa
140
+ µ+e qfAµ, where ta are the SU(3) colour generators,
141
+ and Qf is the electric charge of the fermion in units of e. We consider the CP-averaged ¯B → Xsγ
142
+ photon energy spectrum in the endpoint region where Mb − 2Eγ = O(ΛQCD). Soft-collinear-
143
+ effective theory (SCET) offers the appropriate framework for this multi-scale problem.
144
+ The
145
+ kinematics of the decay is given as follows: the initial meson carries momentum pB, and it decays
146
+ into a photon with momentum q and a jet whose total momentum is PX. From pB − q = PX in
147
+ the B meson rest frame, we have 2MBEγ = M 2
148
+ B − M 2
149
+ X. Thus, the jet invariant mass MX is much
150
+ smaller than the photon energy Eγ and jet energy EX. We set PX⊥ = 0 and choose reference
151
+ vectors n2 = n2 = 0, v2 = 1, such that n + ¯n = 2v and nn = 2. Choosing
152
+ qµ = Eγ¯nµ
153
+ and
154
+
155
+ B = MBvµ ,
156
+ (3)
157
+ we find MB = ¯nPX and MB = nPX + 2Eγ or equivalently
158
+ P µ
159
+ X = (MB − 2Eγ)nµ + MB¯nµ .
160
+ (4)
161
+ Thus, there is only one independent kinematical variable in the ¯B → Xsγ decay. One may choose
162
+ the photon energy Eγ or nPX = MB − 2Eγ.
163
+ Three dynamical scales describe the endpoint region, a hard scale of O(MB), an intermedi-
164
+ ate (anti-)hardcollinear scale of O(
165
+
166
+ MBΛQCD), and a soft scale of O(ΛQCD). The expansion
167
+ parameter in our present analysis is defined as λ2 = ΛQCD/MB1. The photon can be treated as
168
+ anti-hardcollinear. The hadronic final state factorises into a hardcollinear jet and soft wide-angle
169
+ radiation. Since the soft modes have parametrically smaller virtuality than the hardcollinear
170
+ 1Alternative convention often used in the literature is to define λ = ΛQCD/MB.
171
+ 4
172
+
173
+ modes, the problem at hand is described by the SCETI setup [31–34]. Using a shorthand nota-
174
+ tion a ∼ (na, ¯na, a⊥) to indicate the scaling of the momentum components in powers of λ, we
175
+ have: hard momentum scales like phard ∼ (1, 1, 1)mb, a hardcollinear one phc ∼ (λ2, 1, λ)mb, an
176
+ anti-hardcollinear region phc ∼ (1, λ2, λ)mb and a soft momentum psoft ∼ (λ2, λ2, λ2)mb.
177
+ The first step in the derivation of a factorisation theorem is hard matching. We have to match
178
+ the electroweak operator onto SCET. We will see that the direct contribution is represented by a
179
+ next-to-leading power (NLP) B-type current in SCET, i.e. power-suppressed current composed of
180
+ two collinear building blocks. The resolved contribution is represented by a time-ordered product
181
+ of a leading-power (LP) A-type current with a subleading L(1)
182
+ ξq Lagrangian (see Ref. [19, 35–37]
183
+ for a precise definition of the different types of currents).
184
+ In the second step, we integrate out the hardcollinear fields, which lead to the appearance of
185
+ jet functions. The latter are, technically speaking, matching coefficients of SCET on the pure
186
+ soft effective field theory. Kinematics forbids the emission of anti-hardcollinear partons. Thus
187
+ anti-hardcollinear fields have to be integrated out at the amplitude level. The physics in the
188
+ anti-hardcollinear direction is similar to the threshold Drell-Yan expansion, where kinematical
189
+ constraints forbid hardcollinear emissions into the final state. For more details on SCET NLP
190
+ factorisation and resummation in the threshold Drell-Yan, see Refs. [13,14,20,38]. In the hard-
191
+ collinear sector, the formalism resembles, for example, the thrust factorisation, where NLP jet
192
+ functions are defined at the cross-section level [15,39–42].
193
+ 2.1
194
+ Hard matching
195
+ The electroweak operator O8 matches onto two possible SCET operators. First, we consider the
196
+ A-type current, which enters the resolved contribution. Within the present section, the SCET
197
+ operators are always given before the soft decoupling transformation [32] is performed.
198
+ The
199
+ A-type SCET operator is given by
200
+ OA0
201
+ 8g (0) = χhc (0) /n
202
+ 2γµ⊥Aµ
203
+ hc⊥ (0) (1 + γ5) h (0) ,
204
+ (5)
205
+ where h is the heavy quark field, and the SCET building blocks are hardcollinear gauge-invariant
206
+ due to the introduction of hardcollinear Wilson lines W. The fermionic building block is χhc =
207
+ W †
208
+ hcξ and gluon field is
209
+
210
+ hc⊥ = W †
211
+ hc [Dµ
212
+ hc⊥Whc] = Aaµ
213
+ hc⊥ta.
214
+ (6)
215
+ Note that the colour and Dirac structure for the A-type operator is uniquely fixed.
216
+ For the
217
+ matching, we can use the partonic QCD amplitude b (pb) → s (ps) g (r), where the momenta pb is
218
+ hard, ps anti-hardcollinear and r hardcollinear. The matching condition is given by
219
+ GF
220
+
221
+ 2λt C8g ⟨Q8g⟩ = CA0 (mb)
222
+
223
+ OA0
224
+ 8g
225
+
226
+ .
227
+ (7)
228
+ The brackets ⟨ ⟩ indicate that the matrix element of the operators is considered. At leading order
229
+ in αs we find
230
+ CA0
231
+ LO (mb) = m2
232
+ b
233
+ 4π2
234
+ GF
235
+
236
+ 2λqC8g .
237
+ 5
238
+
239
+ The B-type current which enters the direct contribution is the following SCET operator:2
240
+ OB1
241
+ 8g (u) =
242
+
243
+ dt
244
+ 2πe−iumbtχhc (t¯n) γν⊥ Qs Bν
245
+ hc⊥ (0) γµ⊥ Aµ
246
+ hc⊥ (0) (1 + γ5) h (0) ,
247
+ (8)
248
+ with Qs as the electric charge of the strange quark in units of e and the electromagnetic gauge-
249
+ invariant transverse photon field
250
+
251
+ hc⊥ = e
252
+
253
+
254
+ ⊥ − ∂ν
255
+
256
+ n∂ nA
257
+
258
+ .
259
+ (9)
260
+ We note that beyond the LO, a second operator with an alternative Dirac structure γµγν appears.
261
+ These operators do not mix under renormalisation [43]. We checked by explicit computation at
262
+ the one-loop order that the matching coefficient for the operator with γµγν structure does not
263
+ develop any endpoint divergence.
264
+ We use the partonic QCD amplitude b (pb) → g (r) s (ps) γ (q) to fix the matching coefficient.
265
+ Here the momenta are pb hard, r and ps hardcollinear and q anti-hardcollinear. On the QCD
266
+ side, a time-ordered product of the operator O8 and of the QED current,
267
+ LQED,q (x) = eq Aµ (x) q (x) γµq (x) ,
268
+ (10)
269
+ is needed. The matching condition at the leading order in QED is given by
270
+ GF
271
+
272
+ 2λtC8g i
273
+
274
+ d4x ⟨T [O8g (0) , LQED,b (x) + LQED,s (x)] ⟩ =
275
+ � 1
276
+ 0
277
+ duCB1 (mb, u)
278
+
279
+ OB1
280
+ 8g (u)
281
+
282
+ .
283
+ (11)
284
+ We do not consider QED corrections. At leading order in αs, we find that only the QED current
285
+ with an s quark contributes, and we arrive at
286
+ CB1
287
+ LO (mb, u) = (−1)u
288
+ u
289
+ m2
290
+ b
291
+ 4π2
292
+ GF
293
+
294
+ 2λt C8g = (−1)u
295
+ uCA0
296
+ LO (mb) ,
297
+ (12)
298
+ where we use hardcollinear momentum conservation ¯ns + ¯nr = mb and introduce hardcollinear
299
+ momentum fraction u = ¯nps
300
+ mb and u = 1 − u.
301
+ Finally, we compare the different kinematics of the A- and B-type currents in Figure 1. The
302
+ external s-quark carries hardcollinear momentum. Therefore the intermediate propagator is hard.
303
+ This situation is represented in SCET by the B-type current. When the momentum of the external
304
+ s-quark tends to zero, the propagator becomes anti-hardcollinear and cannot be integrated out –
305
+ it must be reproduced by a dynamical field in the low energy EFT. This situation is represented
306
+ in SCET by the time-order product of subleading Lagrangian and the A-type current.
307
+ The
308
+ degeneracy in the EFT description is the reason why the SCET develops divergencies in the
309
+ convolution integrals.
310
+ 2Note that this operator is equal to J2 (τ) in Ref. [43] (eq. 16), with J2 (τ) = 2mbOB1
311
+ 8g (τ).
312
+ 6
313
+
314
+ <latexit sha1_base64="Hx/r8
315
+ GtOrCEGLJO0ZHaQF1Z9vU=">AOBHicrVdbc9tEFHZLgGItPDIi
316
+ 4YkQ0u3RpLtOHnwTJu205bJNGlLmzJR8KzktaXJ6pLVyq3Z2Vce+S
317
+ W8AY/0iT/Bv+GsLra8crnMoLGd1Tnf+c5lzx4pbkKDlJvmn5cuv7Px
318
+ 7nvX/mg/eFHmx9/cvXapy/SOGMe7FNGYvXZwSGkTkOQ84JS8TR
319
+ nDoUnLint9V+pMZYWkQR9/yeULOQjyNgkngYQ6i0bWNLx2XTINITM
320
+ LJKBEigmZR1OGE1+2DWOpzEVfyevWwEQD8wboQAtySiZcBYKuiw
321
+ 5ULM40RwC/Eu4iDdWaCxS6jYdjw/GN3dlmDYVF6MUtDwbqGpKYTjY
322
+ WrckSPhJIQlhicBF1vSaOeomRgTL2ad1McJGXoB8yhBhQgyo2Q8hNB
323
+ LSPADGXa5H3jnUswghn9JQMKEz+scezkHygMcbh+N9rYR7YyHJrCq
324
+ +AtW0Dgh5j5ELw7l9+K6dUPl8DowLmSJR/Zs2V4dv/4Cj8P5x0l1
325
+ vLgqnPoe4o7qJYOb/IMDs38C3oRtqu7ZdbrASCZ/g2RxEqlWHFq
326
+ dvtKhRZWg7VgImqUjouZ8L089DQYk2HudWmvtg3lqSd+zOocFKsF
327
+ ygbfNhoVoZQ9d4UhyG+sdwLtSxUW5UJ6n23ZnSrCQr4dNRHkbeaI
328
+ WTHLKayQwqoTo5YXGCp5jHrL2SVAXu7Fb5+V+v+N/OVSkRQRGYte
329
+ DSBdB2HI9s50XJK56oapE5c17Sx3NjmogVGyvQ6Jx7ai3q/t8Loyub
330
+ pkdM7+M5sIqF1ut8joeXbvyhzOvSwkEfcoTtNTy0z4mcCMB9B5QJ
331
+ +lJMHeOZ6SU1hGOCTpmchHmjR2QDI2JjGDb8SNXFq3EDhM03noAlJ1
332
+ fKrlHCd7jTjk70zEURJBjXwCkeTjBo8NtR8NMYBIx6nc1hgjwUQq
333
+ +H5mGPwxRd8ZJCUj4ZyzZcTkReTH0FVTMwTSV6jfx8SiVmu7tKpI
334
+ oHfwGNI40XczGUhTz70iulE6EGeUBi19JLQrA3gG+ah7ckbKhf1zT
335
+ P16jP6rpldtVwFECIT3RzY6SR5qVrq7rv2mw3j+JYhauBAZn9R6hH
336
+ BsHxtCwGhZhdv9E4bPRidQ1bqFwdRtMn719i+j9hc7h5DUXJNTOIQ
337
+ n7JO792SxGldAJVp1ZTjx4al1JmrjZgtSUE3jMkE7vPWFmMYoVNG
338
+ SCQFm0LUcLKQCeMC/som0qUZPKmfPjiQwuoi9bH6GgzI5guHiq/Un
339
+ Pr3QO2Bzk0Z9u3UP7RyLwaxO71kd3rIru7p6MOlmGZEBJ8m0yHav7
340
+ UgLbVA6oBsvu2Dn0Kh6tMch8qgSxTr0XBtsTZfSCzbUW4JgNV3Cq43
341
+ V20t56tDvwbviOGo+kiCdtCgx7q9dYyrkL7UD5LfRvujzOW0Aq30
342
+ XdPrJsfV8LyhWo3bMgQnNdCb8jlMJoqFzbakdQ0/OjZ8+eapsHsEj
343
+ HYWrtYK1O4BK7gNSd3z8sIKYUL0B6tr6CXQpzC+pjkZ+dAqzQpifk
344
+ FV03s0auOjwJjY/HA1ilVwTGxdbo6FL6Ro8vD3D4wzrBpV4jYU3x5
345
+ EOz2XrsyQNcDkVmujlyNAsarNkvdW6Ci3HStOGwQHT4EpUIFehsPEa
346
+ UrXCukKmaMsVeXvNBQhMlQkSjm1JW96G6v7W4n7lCzHT2KFSP0
347
+ vIBLSIJeA2QaICbymHtqar+CwoTEMJ7j6W/5TQXL+yOtdvpPult3T4
348
+ o34CutD5vfdG63rJag9bt1sPWcet5y9v4aePXjd83mz+uPnz5i+b
349
+ vxXQy5dKm89aK9fm78ADbYEJA=</latexit>
350
+ h/hc
351
+ b
352
+ �hc
353
+ O8
354
+ ghc
355
+ shc
356
+ Figure 1: The full theory LO diagram which induces an endpoint divergence in SCET, see text.
357
+ 3
358
+ Bare factorisation theorem
359
+ The derivation of the factorisation theorem follows the standard approach. [44, 45].
360
+ We first
361
+ perform the soft decoupling transformation [32], but we do not use a new notation for the hard-
362
+ collinear fields after decoupling.
363
+ The decay rate is obtained from the imaginary part of the
364
+ current-current correlator. The states factorise and thus allow taking matrix elements separately
365
+ in hardcollinear, anti-hardcollinear and soft sectors.
366
+ The common to both A- and B-type contributions is the anticollinear matrix element of the
367
+ photon. It is given by a discontinuity of the photon propagator
368
+ −gµν
369
+ ⊥ e2 Jγ
370
+
371
+ q2�
372
+ =
373
+ 1
374
+ 2πi Disc[ i
375
+
376
+ d4xeiqx ⟨0| T [Bµ
377
+ hc⊥ (x) , Bν
378
+ hc⊥ (0)] |0⟩ ]
379
+ (13)
380
+ = −gµν
381
+ ⊥ e2 δ
382
+
383
+ q2�
384
+ θ
385
+
386
+ q0�
387
+ = −gµν
388
+ ⊥ e2 δ+ �
389
+ p2�
390
+ (14)
391
+ Since we are only interested in the photon-final state, the above expression is exact to all orders
392
+ in perturbation theory.
393
+ 3.1
394
+ B-type current (direct) contribution
395
+ There are several functions entering the factorisation formula of the direct contribution with the
396
+ B-type current. The soft function – the leading power shape function – is defined as
397
+ S (ω) =
398
+ 1
399
+ 2mB
400
+
401
+ dt
402
+ 2πe−iωt ⟨B| h (tn) Sn (tn) S†
403
+ n (0) h (0) |B⟩ ,
404
+ (15)
405
+ or with open indices [46,47]3
406
+ 1
407
+ 2mB
408
+
409
+ dt
410
+ 2πe−iωt ⟨B| [hα (tn) Sn (tn)]i
411
+
412
+ S†
413
+ n (0) hβ (0)
414
+
415
+ j |B⟩ = δij
416
+ 2 Nc
417
+ �1 + /v
418
+ 2
419
+
420
+ βα
421
+ S (ω) .
422
+ (16)
423
+ 3We use Greek for spinor indices and Latin for colour indices.
424
+ 7
425
+
426
+ The hardcollinear jet function is a genuine NLP object. In analogy to the LP jet function, we
427
+ define it as a vacuum matrix element of a product of hardcollinear fields
428
+ J
429
+
430
+ p2, u, u′�
431
+ = (−1)
432
+ 2Nc
433
+ 1
434
+
435
+
436
+ dtdt′
437
+ (2π)2 d4x e−imb(ut−u′t′)+ipx
438
+ (17)
439
+ Disc
440
+
441
+ ⟨0| tr
442
+ �1 + /v
443
+ 2
444
+ (1 − γ5) /Ahc⊥ (x) γν
445
+ ⊥χhc (t′¯n + x) χhc (t¯n) γν⊥ /Ahc⊥ (0) (1 + γ5)
446
+
447
+ |0]⟩
448
+
449
+ .
450
+ The field operators are time- or anti-time-ordered according to the Keldysh formalism.4
451
+ The
452
+ trace is taken both with respect to colour and spinor spaces. Using projection properties of the
453
+ hardcollinear fields and 2/v = /n+ + /n− the Dirac algebra in eq.(17) can be simplified to
454
+ J
455
+
456
+ p2, u, u′�
457
+ = (−1)
458
+ 2Nc
459
+ 1
460
+
461
+
462
+ dtdt′
463
+ (2π)2 d4x e−imb(ut−u′t′)+ipx (d − 2)2
464
+ (18)
465
+ Disc
466
+
467
+ ⟨0| tr
468
+ �/¯n
469
+ 4(1 − γ5)Aµ
470
+ hc⊥ (x) χhc (t′¯n + x) χhc (t¯n) Ahc⊥
471
+ µ
472
+ (0) (1 + γ5)
473
+
474
+ |0⟩
475
+
476
+ where, as mentioned before, the trace is also applied in the colour space.
477
+ With these definitions, we find the bare factorisation theorem for the direct contribution
478
+
479
+ dEγ
480
+ = NB
481
+ � 1
482
+ 0
483
+ duCB1 (mb, u)
484
+ � 1
485
+ 0
486
+ du′CB1∗ (mb, u′)
487
+ � Λ
488
+ −p+
489
+ dωJ (MB (p+ + ω) , u, u′) S (ω)
490
+ (19)
491
+ with the prefactor
492
+ NB = [(2π)] [e2Q2
493
+ s] [
494
+ 1
495
+ (2π)3 2 Eγ
496
+ E2
497
+ γ 4π] = e2Q2
498
+ s
499
+
500
+
501
+ (20)
502
+ The three pieces of the prefactor correspond to the phase space factors of the photon, to its
503
+ charges and to the redefinition of the jet function with a 2π factor.
504
+ Finally, we prove to all orders in αs that the jet-function is symmetric in u and u′ up to
505
+ complex conjugation:
506
+ J(p2, u, u′) = J∗(p2, u′, u).
507
+ (21)
508
+ This can be read off from the factorisation theorem of the direct contribution. The photon energy
509
+ spectrum is real. The leading power shape function is also real to all orders. This can be shown
510
+ by complex conjugation of Eq.(15) and by using translation invariance [4]. Then the jet function
511
+ inherits the symmetry property given in Eq.(21), from the product of the Wilson coefficients,
512
+ CB1 (mb, u) CB1∗ (mb, u′), in the convolution integral. An anti-symmetric part of the jet function
513
+ would cancel out in the convolution integral. We emphasise that this property is also valid when
514
+ the other B-type operator with the reversed Dirac structure is present. In particular, the sum of
515
+ the two mixed terms has this property. In the latter terms, the reduction of the Dirac structure
516
+ leads to (4 − d) (d − 2), and hence these terms vanish for d = 4.
517
+ The symmetry property is crucial for the refactorisation because it implies that no double
518
+ subtraction regarding the variables u and u′ is needed in the B-type (direct) current contribution.
519
+ This can be seen in the following way. We showed above that the integrand of the convolution
520
+ integral of the Wilson coefficients and the jet function in the two variables u and ¯u is real, so the
521
+ 4For a brief summary, see appendix of Ref. [48].
522
+ 8
523
+
524
+ complete integrand is symmetric in u and u′. Then the subsequent rearrangement is possible (we
525
+ here only write the convolution variables u and u′):
526
+ � 1
527
+ 0
528
+ duCB1 (u)
529
+ � 1
530
+ 0
531
+ du′CB1∗ (u′) J (u, u′) = 2
532
+ � 1
533
+ 0
534
+ duCB1 (u)
535
+ � 1
536
+ u
537
+ du′CB1∗ (u′) J (u, u′) .
538
+ (22)
539
+ As the endpoint divergence manifests for small u and u′, we need to ensure that only the last
540
+ integral over u is rendered finite by an appropriate subtraction.
541
+ At the leading order, the jet function is real, and we find that the jet function is symmetric
542
+ in u and u′. Explicitly, we find using the dimensional MS regulator (µ2ϵ → µ2ϵ exp(γEϵ)/(4π)ϵ):
543
+ J
544
+
545
+ p2, u, u′�
546
+ = CF
547
+ αs
548
+ 4π mb
549
+ θ(p2) A(ϵ) δ(u − u′)u1−ϵ(1 − u)−ϵ
550
+ �p2
551
+ µ2
552
+ �−ϵ
553
+ ,
554
+ (23)
555
+ with
556
+ A(ϵ) = (2 − 2ϵ)2 (1 − 1/2 ϵ) Γ(1 − ϵ)−1 exp(γEϵ) = 4 − 10ϵ + O(ϵ2) .
557
+ (24)
558
+ We compute the convolution integrals explicitly5 using this leading order result for the jet
559
+ function and also the hard function at leading order, Eq.(12),
560
+
561
+ dEγ
562
+ |B = 2NB
563
+ ��CA0
564
+ LO (mb)
565
+ ��2 � 1
566
+ 0
567
+ du ¯u
568
+ u
569
+ � 1
570
+ u
571
+ du′ ¯u′
572
+ u′
573
+ (25)
574
+ CFA(ϵ)
575
+ αs
576
+ (4π) mb
577
+ � Λ
578
+ −p+
579
+ dω S (ω)
580
+ �mb(p+ + ω)
581
+ µ2
582
+ �−ϵ
583
+ u1−ϵ(1 − u)−ϵδ(u − u′)
584
+ = NB
585
+ ��CA0
586
+ LO (mb)
587
+ ��2 CF
588
+ αs
589
+ (4π) mb
590
+ � Λ
591
+ −p+
592
+ dω S(ω) A(ϵ)B(3 − ϵ, −ϵ)
593
+ �mb(ω + p+)
594
+ µ2
595
+ �−ϵ
596
+ ,
597
+ where B(x, y) denotes the Beta function. We see that the divergence in the direct contribution
598
+ is now identified as an endpoint point divergence in the convolution integral of the hard and the
599
+ jet function in the u integration for u ≪ 1.
600
+ We emphasise that this endpoint divergence can be regularised within the dimensional regu-
601
+ larisation scheme6. This leads to additional poles after performing the convolution. Consequently,
602
+ due to endpoint divergences, the bare factorisation formula is already invalid for the d → 4 limit
603
+ at the leading order.
604
+ 5Symmetry of the original integral implies that
605
+ � 1
606
+ u du′δ(u − u′) = θ(0) with θ(0) = 1/2, for u ∈ [0, 1].
607
+ 6We note that we do not confirm the leading order result of the direct contribution of Ref. [4] in the dimensional
608
+ regularisation scheme. In the notation of Ref. [4] we get
609
+ F (a)
610
+ 88 (Eγ, µ) = CF αs(µ)
611
+
612
+ � mb
613
+ 2Eγ
614
+ �2 � ¯Λ
615
+ −p+
616
+
617
+ �2
618
+ 9 ln mb(ω + p+)
619
+ µ2
620
+ + 2
621
+ 9
622
+
623
+ S(ω, µ) .
624
+ 9
625
+
626
+ 3.2
627
+ A-type (resolved) contribution
628
+ For the resolved contribution with the A-type current, we start with the time-ordered product
629
+ OTξq = i
630
+
631
+ ddxT
632
+
633
+ Lξq (x) , OA0
634
+ 8g (0)
635
+
636
+ = i
637
+
638
+ ddxT
639
+
640
+ qs (x+) Sn(x+)
641
+
642
+ Qs /Bhc⊥ + /Ahc⊥
643
+
644
+ (x) χhc (x) ,
645
+ χhc (0) S†
646
+ n(0)Sn(0)/n
647
+ 2 /Ahc⊥(0) (1 + γ5) S†
648
+ n(0)h (0)
649
+
650
+ .
651
+ (26)
652
+ The operator in the hardcollinear sector contains only gluon fields. Hence the standard leading
653
+ power gluon jet function appears
654
+ −g2
655
+ sδabgµν
656
+ ⊥ Jg
657
+
658
+ p2�
659
+ =
660
+ 1
661
+ 2πi Disc
662
+
663
+ i
664
+
665
+ d4xeipx ⟨0| T
666
+
667
+ Aaµ
668
+ hc⊥ (x) , Abν
669
+ hc⊥ (0)
670
+
671
+ |0⟩
672
+
673
+ .
674
+ (27)
675
+ At leading order we find the standard result Jg (p2) = δ+ (p2).
676
+ Besides photons, there are no energetic particles emitted in the anti-hardcollinear directions.
677
+ Thus, the anti-hardcollinear jet function is defined at the amplitude level:
678
+ OTξq =
679
+
680
+
681
+
682
+ dt
683
+ 2πe−itω [qs]α (tn)
684
+
685
+ J (ω)
686
+ �a νµ
687
+ αβ
688
+ Qs Bν
689
+ hc⊥ (0) Aµ
690
+ hc⊥ (0) [h (0)]β .
691
+ (28)
692
+ The anti-hardcollinear jet function can be decomposed as
693
+
694
+ J (ω)
695
+ �a νµ
696
+ αβ = J (ω) ta
697
+
698
+ γν
699
+ ⊥γµ
700
+
701
+ /¯n/n
702
+ 4
703
+
704
+ αβ
705
+ ,
706
+ (29)
707
+ to all orders. The other structure γµ
708
+ ⊥γν
709
+ ⊥ does not appear as one can read off from the structure of
710
+ the T product in eq. (26) and the fact that the gluon and heavy quark fields are only spectators.
711
+ The Dirac structure can then be simplified at the level of the cross-section with the help of the
712
+ following relation:
713
+
714
+ γν
715
+ ⊥γµ
716
+
717
+ /¯n/n
718
+ 4
719
+
720
+ αβ
721
+
722
+ γµ
723
+ ⊥γν
724
+
725
+ /n/¯n
726
+ 4
727
+
728
+ α′β′
729
+ = (d − 2)2
730
+ �/¯n/n
731
+ 4
732
+
733
+ αβ
734
+ �/n/¯n
735
+ 4
736
+
737
+ α′β′
738
+ .
739
+ (30)
740
+ At leading order, the anti-hardcollinear jet function is given by
741
+
742
+ J (ω)
743
+ �a νµ
744
+ αβ =
745
+ ta
746
+ (ω + i ϵ)
747
+
748
+ γν
749
+ ⊥γµ
750
+
751
+ /¯n/n
752
+ 4
753
+
754
+ αβ
755
+ .
756
+ (31)
757
+ Having defined hardcollinear and anti-hardcollinear functions, we now focus on the soft sector.
758
+ The operatorial definition of the soft function in position space with open Dirac indices is
759
+ Sαβ,α′β′ (u, t, t′) =
760
+ = g2
761
+ s ⟨B|
762
+
763
+ h (un) (1 − γ5)
764
+
765
+ α′
766
+
767
+ Sn (un) taS†
768
+ n (un)
769
+
770
+ S¯n (un)
771
+
772
+ S†
773
+ ¯n (t′¯n + un) qs (t′¯n + un)
774
+
775
+ β′
776
+ × [qs (t¯n) S¯n (t¯n)]α S†
777
+ ¯n (0)
778
+
779
+ Sn (0) taS†
780
+ n (0)
781
+
782
+ [(1 + γ5)h (0)]�� |B⟩ / (2mB) .
783
+ (32)
784
+ 10
785
+
786
+ We can now plug in all the objects into the matrix element squared, and we find the resolved
787
+ contribution
788
+
789
+ dEγ
790
+ = NA
791
+ ��CA0 (mb)
792
+ ��2 � Λ
793
+ −p+
794
+ dωJg (mb (p+ + ω))
795
+
796
+ dω1
797
+
798
+ dω2J (ω1) J
799
+ ∗ (ω2) S (ω, ω1, ω2) ,
800
+ (33)
801
+ with the prefactor
802
+ NA = NB ≡ N ,
803
+ (34)
804
+ and the scalar soft function obtained after contracting spinor indices according to
805
+ S (u, t, t′) = (d − 2)2g2
806
+ s ⟨B| h (un) (1 − γ5)
807
+
808
+ Sn (un) taS†
809
+ n (un)
810
+
811
+ S¯n (un) S†
812
+ ¯n (t′¯n + un)
813
+ (35)
814
+ /n/¯n
815
+ 4 qs (t′¯n + un) qs (t¯n) /¯n/n
816
+ 4 S¯n (t¯n) S†
817
+ ¯n (0)
818
+
819
+ Sn (0) taS†
820
+ n (0)
821
+
822
+ (1 + γ5) h (0) |B⟩ / (2mB) .
823
+ The soft function in momentum space, which appears in eq. (33), is obtained through the Fourier
824
+ transform of the position space expression according to
825
+ S (ω, ω1, ω2) =
826
+ � du
827
+ 2πe−iuω
828
+
829
+ dt
830
+ 2πe−itω1
831
+ � dt′
832
+ 2πeit′ω2S (u, t, t′) .
833
+ (36)
834
+ As the NLP jet function in u and u′ variables, the soft function S (ω, ω1, ω2) is symmetric in
835
+ ω1 and ω2 up to complex conjugation:
836
+ S (ω, ω1, ω2) = S∗ (ω, ω2, ω2) .
837
+ (37)
838
+ This property stems from the fact that the gluon jet function is real to all orders. Thus, the
839
+ soft function inherits the symmetry property from the product of the anti-hardcollinear jet func-
840
+ tions, J (ω1) J
841
+ ∗ (ω2) in the factorisation formula of the resolved contribution. Any anti-symmetric
842
+ part would cancel in the convolution integral. This symmetry property implies that within the
843
+ refactorisation, a double-subtraction regarding the variables ω1 and ω2 in the A-type current
844
+ contribution is not needed either. The symmetry implies that the integrand in the convolution
845
+ integral between anti-hardcollinear jet functions and soft function in the two variables ω1 and ω2
846
+ is real and symmetric and allows for the following rearrangement of the convolution integral
847
+ � ∞
848
+ −∞
849
+ dω1
850
+ � ∞
851
+ −∞
852
+ dω2J (ω1) J
853
+ ∗ (ω2) S (ω1, ω2) = 2
854
+ � ∞
855
+ −∞
856
+ dω1
857
+ � ω1
858
+ −∞
859
+ dω2J (ω1) J
860
+ ∗ (ω2) S (ω1, ω2) ,
861
+ (38)
862
+ which is motivated by the fact in the resolved contribution. As we will see explicitly in section 4.1,
863
+ the convolution integral of the jet and shape function is logarithmically divergent for ω1,2 → ∞.
864
+ At leading order, we find the factorisation formula in case of the A-type current (resolved)
865
+ contribution:7
866
+
867
+ dEγ
868
+ = 2N
869
+ ��CA0
870
+ LO (mb)
871
+ ��2 � Λ
872
+ −p+
873
+ dωδ (mb (p+ + ω))
874
+ � ∞
875
+ −∞
876
+ dω1
877
+ � ω1
878
+ −∞
879
+ dω2
880
+ 1
881
+ (ω1 − iϵ)
882
+ 1
883
+ (ω2 + iϵ) S (ω, ω1, ω2) .
884
+ (39)
885
+ We keep the soft function unevaluated at this point since this is a nonperturbative object. For
886
+ ω1,2 ≫ ω, the soft function can be shown to be asymptotically constant, which leads to endpoint
887
+ divergence in the convolution integrals for large ω1,2 (see section 4.1).
888
+ 7This confirms the leading order result of the resolved contribution of Ref. [4] when the asymptotic limit of the
889
+ soft function is not yet considered.
890
+ 11
891
+
892
+ Figure 2: Scales relevant to refactorisation of the endpoint divergent contribution. The left part of
893
+ the diagram represents the standard hierarchy of three scales for SCETI. Near the endpoint, when
894
+ the momentum fraction u is no longer u ∼ O(1), i.e. u ≪ 1, we introduce additional, unphysical
895
+ scales which make it possible to factorise further objects appearing in the bare factorisation
896
+ theorem.
897
+ 4
898
+ Refactorisation of the endpoint contribution
899
+ We here state the three refactorisation relations, which are based on the fact that in the limits
900
+ u ∼ u′ ≪ 1 and ω1 ∼ ω2 ≫ ω the two terms of the subleading O8−O8 contribution have the same
901
+ structure. The refactorisation relations are operatorial relations that guarantee the cancellation
902
+ of endpoint divergences between the two terms to all orders in αs.
903
+ The refactorisation conditions result from the overlap between soft and hardcollinear modes.
904
+ The hierarchy of scales near the endpoint is shown in Fig. 2.
905
+ We will refer to these overlap
906
+ modes as softcollinear modes.
907
+ They play a similar role as the z-SCET modes introduced in
908
+ Ref. [24] to prove the refactorisation of the B1-type matching coefficients.
909
+ The parameter z
910
+ corresponds to the momentum fraction u in the present analysis. On the one hand, we can think
911
+ of the softcollinear mode as a limit of hardcollinear mode when the large momentum fraction
912
+ tends to zero8.
913
+ On the other hand, the softcollinear modes can be understood as a limit of
914
+ the soft modes when the n+k momentum component becomes much larger than the remaining
915
+ components, mb ≫ n+k ≫ λ2mb. We want to emphasise that softcollinear and u-hardcollinear
916
+ modes are not physical but help introduce refactorisation. The softcollinear fields obey the same
917
+ projection properties and have the same transformation properties regarding gauge invariance as
918
+ their hardcollinear counterparts.
919
+ • Following Refs. [22–24], we find that in the limit u → 0, the matching coefficient can be
920
+ 8Thus, they do not appear in the leading power problems, where only operators with a single hardcollinear
921
+ field in each direction occur.
922
+ 12
923
+
924
+ 2
925
+ hard
926
+ B1
927
+ CAO 7
928
+ umb
929
+ u-hardcollinear
930
+ hardcollinear
931
+ J&S→J,3
932
+ softcollinear
933
+ S↑
934
+ softfurther factorised
935
+
936
+ CB1 (mb, u)
937
+
938
+ = (−1)CA0 (mb) mbJ (umb) ,
939
+ (40)
940
+ where �g(u)� only denotes the leading term of a function g(u) in the limit u → 0 and
941
+ without any higher power corrections in u ≪ 1. The function J (umb), which appears here,
942
+ is exactly the same radiative jet function (29) we introduced before in the context of A-type
943
+ contribution.
944
+ This refactorisation condition stems from the fact that in the limit u → 0, the amplitude
945
+ used in the matching of the B-type current can be represented by a time-ordered product
946
+ [24],
947
+ CB1 (mb, u)
948
+
949
+ OB1
950
+ 8g (u)
951
+ � ���
952
+ u→0 = CA0 (mb) i
953
+
954
+ ddxe−i (nx/2) umb
955
+
956
+ T
957
+
958
+ L(1)
959
+ ξqsc (x) , OA0−u
960
+ 8g
961
+ (0)
962
+ ��
963
+ ,
964
+ (41)
965
+ of the leading power current OA0−u
966
+ 8g
967
+ (0) = χu−hc(0) S†
968
+ n(0) Sn(0) /n
969
+ 2 /Au−hc⊥(0) (1 + γ5) S†
970
+ n(0) h(0) ,
971
+ equal to (5) up to a replacement of the hardcollinear fields by the u-hardcollinear fields, and
972
+ subleading Lagrangian
973
+ L(1)
974
+ ξqsc (x) = qsc(x+)S†
975
+ n(0) Sn(0)
976
+
977
+ Qs /Bu−hc⊥ + /Au−hc⊥
978
+
979
+ χu−hc(x) + h.c.
980
+ (42)
981
+ The jet-function J (umb) appears after integrating out the u-anti-hardcollinear quark fields.
982
+ We note a close resemblance to the structure of the resolved contribution, where a similar
983
+ time-ordered product appears (see Eq. (26)).
984
+ • We find the new soft function �S (ω, ω1, ω2) which corresponds to the function S (ω, ω1, ω2) in
985
+ the limit ω1 ∼ ω2 ≫ ω. In this limit, we can consider the light soft quarks to be softcollinear
986
+ qs → qsc. In this function �S (ω, ω1, ω2) higher power corrections in ω/ω1,2 are neglected.
987
+ • In the limit, where the momentum fractions u → 0 and u′ → 0, the jet function
988
+ J (mb (p+ + ω) , u, u′) fulfills the following relation
989
+ � Λ
990
+ −p+
991
+ dω �J (mb (p+ + ω) , u, u′) S(ω)� =
992
+ � Λ
993
+ −p+
994
+ dωJg(mb(p+ + ω)) �S(ω, mbu, mbu′) ,
995
+ (43)
996
+ where the brackets indicate that the u → 0 and u′ → 0 limits have to be taken and that the
997
+ hardcollinear quark fields in J are regarded as softcollinear fields, χhc → qsc in accordance
998
+ with (41).
999
+ It is crucial that the soft function �S (ω, ω1, ω2) appears both in the A-type contribution in
1000
+ the limit ω1 ∼ ω2 ≫ ω and in the B-current term if one expands for small u and u′.
1001
+ Before we proceed, let us comment on the structure of �S. In the asymptotic regime, where
1002
+ ω1,2 ≫ ω, we can match the �S on the leading power shape function
1003
+ �S (ω, ω1, ω2) =
1004
+
1005
+ dω′K(ω, ω′, ω1, ω2)S(ω′) .
1006
+ (44)
1007
+ 13
1008
+
1009
+ <latexit sha1_base64=
1010
+ "8NS72uabtAGARICdIYfKMVjgCLQ=">AONHicrV
1011
+ fNbtGEFZSt03Vuk3aYy9EbQNJsxFISrLsg4DYSZC
1012
+ kMGInaeIUlisqZVIePnj5UqJutjX6rGnvkSB3toe
1013
+ m2foLH8kcsm0KBDCFJYz38w3Mzs7pJ2Y+gk3zd+uX
1014
+ P1g48OPr72SfvTzY/+L6jS9fJtGcueSFG9GIvX
1015
+ JwQqgfkhfc5S8ihnBgUPJqXNxT+lPF4QlfhR+z5c
1016
+ xOQ/wLPSnvos5iMY3Nk5HDpn5oZgG06lPiRTsgxn
1017
+ DMebBvGWpmKvpU3rYGJBuYt0IEW5JRMufAt5HeRb
1018
+ 8uVmEex4BbiXcRBurNCY4dQsT1yPX98b1uCYV15OU
1019
+ 5Aw7uZpqQIxdT40COxSgmLDZcCbjIkY7RS3EhLgR
1020
+ 6yQejsnQ9ZlLCcpEkBklkyEJYr7MRYn/ExlaNvd89
1021
+ wKlBMPtUYC5BxziSHG8Y1L+aO4ad2S24h2JkNTig
1022
+ XE+57IDsy1V5Vr5rUaRcZexJLj0f9ntlJmIL/gyh
1023
+ 4HyTdRswf+Zx2CMUdVGkyC/nmF0Y+A50Lm2X9tbJ
1024
+ m0GJhEfwYok4CVXbDq1OX+nQqkrQoiwAzWrbHMyE5
1025
+ 6ahJ/6EDFPWtb3aNpSmHnsRj8KMJFuvUDZw2GiRh1
1026
+ D06QwHAYb6R3CG1BFTNKrVKvzOg8d5bDZ+M0jLQ
1027
+ pM5IUs1kAZVQXR+zKMYzCPWriRVgDu9VX5l9u3U
1028
+ g4oz4zdiuxCAsGywEiKU8DsWzdzstSlT0Q1GNn
1029
+ NFz31FLs6OaCGVbPCLhpDQa2sVzOkfG17fMjpleRn
1030
+ 1h5YutVn6djG9c+3U0idx5QELuUpwkZ5YZ83OBGfe
1031
+ h+8D9PCExdi/wjJzBMsQBSc5FOgKlsQOSiTGNGNwh
1032
+ N1Jp2ULgIEmWgQNI1fWJrlPCJt3ZnE/3zoUfxnOog
1033
+ ZsRTefU4JGh5qkx8RlxOV3CArvMh1gN18Muxymbo
1034
+ UlgaQ8MpFtuEYhe1G0FtQsRGmiVS/sYfHidR071a
1035
+ RWOng16dRqOkiNpEim5fHslI6Ecwp91n0WmpRAPYA
1036
+ /BUz4UDKmv5JSf+kQX9c0ivaKuA4hpCe6mbH8WPNS
1037
+ leX9d/VvD4DSMWVAKDI3CfUI6NQ2NoWDWLYP7gVO
1038
+ Hn41Opa5xM4eg2mD5/9xbRByvdiJM3XJBAT+MI3sh
1039
+ P792X2WpSAJWoSmWMoqMz61yURs4WpKCaZjQhU3hOW
1040
+ 1tMYIzOGCGhFGwGUcPJQmZnF25T1pEOncOb/dnDQy
1041
+ msLlJ/Vl+DgbPlylcP5bfUaN374O1hCk297Vso/dO
1042
+ cuSWI3esju9dFdndPRx2uwzIhJLjrno7U/CkBbasH
1043
+ rgbI7ts69BkcrjzJfagEsky9Fpm3Nc7ugzPbVg4bM
1044
+ lDFLYLb3UV7zd7KwH/xd8xwOFslYVto0EO9XqPHKr
1045
+ QP5bPUXaM/mbOYFrj9Lur2kWXr+5q5rEDtngURmk0
1046
+ l/IFQCqOhoLbVjqA68+Pnz59pmwewQS0dhSu1grU7
1047
+ gEruA1InPnlUQEyo3gB1bf0EOhTml1RHIz06mVkmT
1048
+ E9IFZ12swbOryOTQ9HzbFKro6Nsq3R0Lm0AQ9f2/
1049
+ A6w7pBIW6wcJc41OGprDlLUgPnU6GOXo8MzaI0S5q
1050
+ tmiq0Hit1GwYHTIMrUYasQmHjNaRqhaZCJkmtLEVX
1051
+ 536hoYxRGAsRjm9LWTwH6vnO6nhCLHQvYeBepXmL
1052
+ 2gRSsBrgFgD3FaEpbeq+q8piEI3z2W/pVTX7y0O9
1053
+ Zup/u0t3X3MP8Cutb6uvVN62bLag1ad1uPWietFy1
1054
+ 345eNPzf+3ni7+fPm75t/bP6VQa9eyW2+alWuzbf/
1055
+ AOWNFyQ=</latexit>
1056
+ hc
1057
+ b
1058
+ �hc
1059
+ L(1)
1060
+ ⇠q
1061
+ A0
1062
+ ghc
1063
+ ssoft
1064
+ <latexit sha1_base64="ke1ahY2petCU6YEqZ2lA2p1ZoA=">AOBnicrVdbc9tEFHZLgBINPDIi
1065
+ 4akMy3dGl3suHnwTJu205bJNGlLmzJR8KzktaXJ6tLVyq3Z2Xce+SW8AY/0gT/Bv+GsLra8coHOoLGd1Tnf+c5lzx4pXkrDjJvmXxcuvrfx/gcfXvpo8+NPtj797PL258+zJGc+eYnNGEvPJwRGsbkGQ85JS9SR
1066
+ nDkUXLind9R+pMZYVmYxN/xeUrOIjyNw0noYw6i0fbGNdcj0zAWk2gyCSmRYkLm8ZThNJCbhrFUFqKv5VrYKBeQ10oAU5JRMuQguFDgptuRDzJBXcQtxBHKRXFmjsESp2XT8IR3d2JRi2lS9HGWi4U2oaCuH6m
1067
+ Bq35Ui4KWGp4UvAJZY0AKhgMzEmfsK6WYBTMvRD5lOCShGkRsl4CLFXkPBHMnR4EPrnUswgiP9IQKUz5scl2QoCLE4e6BtYtodzw0gVUlULKCwo0wDyB8cSh/EFetayqJ16HxUlZ49O6erTp8+18cRf+HE2e5ty
1068
+ ycBhwKjxIHJcr5yxyzcwPfgHakm40N86odViIREDybI05i1YtDq9tXOrSoEvQdi0BTV9L1MBOBX4SehWMyLwu7dW2oSL1NEh4EpdOyvUCZYMPu/DRbL4pjiIM9U/gYKhzo9yoVlL9e2VK84qsgk9HRhFp5VOCs
1069
+ hqJjOohGrlCUpnmKeMC2rGt3dqxMvlkJYLcgUa1YhmCkdjOKbBGFXUWhM9tlFHUz1KWovflvKaTZVR2Eyv1STxuHPbN+r6YDKPLO2bXLC6jvbCqxU6nuo5H25f+dMeJn0ck5j7FWXZqmSk/E5jxEFoP6POMpN
1070
+ g/x1NyCsYRyQ7E8VQk8YVkIyNScLgG3OjkDYtBI6ybB5gFQtn+k6JVynO835OaZCOM0hxr4paNJTg2eGpCGuOQEZ/TOSywz0KI1fADzLDPY6ueMkgqYCM5SZcbkxe+Qk0FlTMxTST6jcN8CiTmu7tKpIqHfy
1071
+ GNIk1XcLGUpQT8EiulE5EOeUhS15JLQrA3ga+eiDclrKlf9TQP1qjP2roldtVwFEKIT3WzY7Sh5qVrm7qv2x3juJExatBAaH9S6hHBsHxtCwWhZRfu9E4fPRidQ1XqnwdBtMn759i+i9hc7l5DUXJNLTOIRn7OM
1072
+ 7d2W5GtdAJVp1ZbjJ4al1JhrzZgdSUE3jskE7ovWFmOYoVNGSCwFm0LUcLKQCeMC/so20qM5PKuf3D+QwnKQ+lh9DQZk8wVXD1Vfqbn17wLb/QJasO1bqPhoZH4DYvf6yO45yHZu6qiDZVgmhATfNtOhmj8NoG3
1073
+ 1gGqA7L6tQ5/A4aqS3IdKIMvUa1GyLXF2H8hsWxGuyUAVtw5ubw/dXM/WBP4D3xHD8XSRhG2hQ/1emsZV6F9KJ+lvi3xzlLaY3bd5DTR5at72tJuQK1exZEaK4r4feEUhgNtWtb7Qhqe3749OkTbfMANmilo3CN
1074
+ VrD2BlDJfUDqjo8f1BATqjdAjq2fQI/C/JLqaBRHpzQrhcUJWUX3ayByw5vY4vD0SJWybWxSbk1GrqSrsHD+zM8zrBuUIvXWPhzHOvwQrY+S9ICV1OhjV6ODM2iMUvW62r0HKstG0YHDANrkQlchUKG68hVSus
1075
+ K2SWtcpSd3XFCw1luHEqRDy6LmV9H6n7G4v7mSfETGePI/UorR7QIpaA1wCpBriuHDaequr/oCgFIbz3WPpbTnvx3O5ae13ncW/n1kH1BnSp82Xnq87VjtUZdG51HnSO86/sbPG79t/LHxZunrV+2ft36vYRe
1076
+ vFDZfNFZube/A3n4wQ+</latexit>
1077
+ b
1078
+ �hc
1079
+ B1
1080
+ ghc
1081
+ shc
1082
+ Figure 3:
1083
+ The SCET representations of the full theory diagram in Fig.1, see text.
1084
+ The matching kernel K(ω, ω′, ω1, ω2) introduced in (44) can be computed perturbatively, i.e. to
1085
+ extract K, we can replace B-meson state by a b-quark in the definition of the soft function and
1086
+ calculate both sides of the equation on the partonic level. The LP soft function here appears
1087
+ since the limit ω1,2 → ∞ is equivalent to the treatment of t and t′ as infinitesimal variables in
1088
+ (32) and, consequently, the soft Wilson lines obtained from decoupling in the anti-hardcollinear
1089
+ direction Sn cancel. At the same time, the softcollinear quark field produces an additional soft
1090
+ Wilson line associated with the hardcollinear direction Sn because we require the softcollinear
1091
+ quark to have the same gauge transformation as a hardcollinear field. Finally, the structure of
1092
+ the soft function corresponds to LP shape function S(ω). Consistency of the second and third
1093
+ refactorisation conditions, which approach the softcollinear limit from two different directions as
1094
+ shown in Figure 2, leads to
1095
+ � Λ
1096
+ −p+
1097
+ dω �J (mb (p+ + ω) , u, u′) S(ω)� =
1098
+ � Λ
1099
+ −p+
1100
+ dωJg(mb(p+ + ω))
1101
+
1102
+ dω′K(ω, ω′, ω1, ω2)S(ω′).
1103
+ (45)
1104
+ This relation implies that the kernel K can be obtained from the quark-gluon jet function in the
1105
+ limit when momentum fraction of the quark tends to zero. Furthermore, it confirms that the
1106
+ kernel K is a perturbative object and that the softcollinear scale can be treated perturbatively.
1107
+ Finally, we note that softcollinear quarks must appear on both sides of the cut. Fermion num-
1108
+ ber conservation implies that only in this case we get a non-vanishing decay rate. Consequently,
1109
+ the endpoint divergences only appear in the limit when both u and u′ are small or when ω1 and
1110
+ ω2 are large.
1111
+ Figure 3 shows that the A- and B-type current have the same structure in the refactorisation
1112
+ limit. On the left, the s-quark is soft and emitted through the insertion of the subleading power
1113
+ Lagrangian. On the right, the s-quark is hardcollinear and emitted directly from the hard B-type
1114
+ vertex. When the fraction of the hardcollinear momentum of the s-quark tends to zero, the B-type
1115
+ current refactorises into the time-ordered product represented on the left, and both diagrams rep-
1116
+ resent the same full theory configuration. This duality in the description leads to the appearance
1117
+ of the endpoint divergences. A similar problem has already been identified in Refs. [49,50], in the
1118
+ context of QED corrections in Bs → µ+µ− due to O7 operator at the amplitude level.
1119
+ 14
1120
+
1121
+ 4.1
1122
+ Refactorisation at leading order
1123
+ Based on the refactorisation conditions, we first discuss the procedure of refactorisation at the
1124
+ leading order. We explicitly verify the conditions using the leading order results. Starting with the
1125
+ last refactorisation condition, we consider the factorisation theorem of the A-type contribution
1126
+ when the soft function is considered in the limit ω1 ∼ ω2 ≫ ω. This asymptotic limit of the
1127
+ soft function can be analysed by means of semi-perturbative methods [51], where the energetic
1128
+ softcollinear quarks are treated perturbatively, while ordinary soft modes are assumed to be
1129
+ nonperturbative. In the leading order, this corresponds to the replacement of the softcollinear
1130
+ quarks by a cut propagator. We anticipate the endpoint divergence in the convolution of the
1131
+ soft and the anti-hardcollinear jet functions and use dimensional MS regularisation within the
1132
+ calculation. We find the following expression of the asymptotic soft function at leading order [51],:
1133
+ �S (ω, ω1, ω2) = CFA(ϵ) αs
1134
+ (4π) ω1−ϵ
1135
+ 1
1136
+ δ(ω1 − ω2)
1137
+ � Λ
1138
+ ω
1139
+ dω′ S(ω′)
1140
+ �(ω′ − ω)
1141
+ µ2
1142
+ �−ϵ
1143
+ ,
1144
+ (46)
1145
+ which includes the leading power shape function S(ω). Note that this expression, in principle,
1146
+ receives corrections of higher order in αs and ΛQCD/ω1,2, which we do not take into account in
1147
+ the leading order analysis within this section. A(ϵ) was defined in eq. (24) 9
1148
+ We convolute the asymptotic soft function with the anti-hardcollinear jet functions for large
1149
+ ω1 and ω2 only by restricting the limits of the ω1 integral to mb and +∞. These integration
1150
+ limits will become clear once we consider the B-type current contribution. Starting with the
1151
+ factorisation formula of the A type current given in eq. (39), the asymptotic contribution of the
1152
+ A type current reads at leading order:
1153
+
1154
+ dEγ
1155
+ |asy
1156
+ A
1157
+ = 2N |CA0
1158
+ LO(mb)|2
1159
+ � Λ
1160
+ −p+
1161
+ dωJLO
1162
+ g
1163
+ (mb(p+ + ω))
1164
+ � ∞
1165
+ mb
1166
+ dω1JLO(ω1)
1167
+ � ω1
1168
+ 0
1169
+ dω2J
1170
+
1171
+ LO(ω2) �S(ω, ω1, ω2)
1172
+ = N|CA0
1173
+ LO (mb) |2 αsCF
1174
+ (4π) mb
1175
+ 1
1176
+ ϵA(ϵ)
1177
+ � Λ
1178
+ −p+
1179
+ dω SLO(ω′)
1180
+ �mb(ω + p+)
1181
+ µ2
1182
+ �−ϵ
1183
+ .
1184
+ (47)
1185
+ The 1
1186
+ ϵ pole is the manifestation of the endpoint divergence in the resolved contribution in the
1187
+ limit ω1 ∼ ω2 ≫ ω. In the next step, we will see that the specific choice mb as a lower limit of
1188
+ the ω1 integration is induced by the refactorisation conditions. The lower limit in the ω2 integral
1189
+ can be chosen to be non-negative due to the delta function δ(ω1 − ω2).
1190
+ Now we take the limit u → 0 in the factorisation theorem of the B-type current at leading
1191
+ order, which we derived in eq. (25) before performing the integrals over u and u′. This leads to
1192
+
1193
+ dEγ
1194
+ |u,u′→0
1195
+ B
1196
+ = −N
1197
+ ��CA0
1198
+ LO (mb)
1199
+ ��2
1200
+ αsCF
1201
+ (4π) mb
1202
+ 1
1203
+ ϵ A(ϵ)
1204
+ � Λ
1205
+ −p+
1206
+ dω SLO(ω)
1207
+ �mb(ω + p+)
1208
+ µ2
1209
+ �−ϵ
1210
+ .
1211
+ (48)
1212
+ This result differs from eq. (47) only by an overall sign. The sum of these two terms is finite and
1213
+ equal to zero. This leading-order result is a special case of the all-order relation, which follows
1214
+ from refactorisation conditions. In the ω1 ∼ ω2 ≫ ω (asymptotic) limit of the A-type current
1215
+ (with integration limits over ω1 from mb to +∞), we exactly single out the same term as in the
1216
+ 9We note that we do not confirm the leading order result of the asymptotic soft function of Ref. [4] in the
1217
+ dimensional regularisation scheme.
1218
+ 15
1219
+
1220
+ u → 0 of the B-type current up to a minus sign. This reflects the fact that in the limits u → 0
1221
+ and ω1 ∼ ω2 ≫ ω the two terms of the subleading O8 − O8 contribution have the same structure.
1222
+ Moreover, we see that with the relations mbu = ω1 and mbu′ = ω2, the u, u′ → 1 limit corresponds
1223
+ to the limit ω1, ω2 → mb, which fixes the integration limit in the subtraction term of the A-type
1224
+ current.
1225
+ We can summarise the relation we just verified at LO as
1226
+
1227
+ dEγ
1228
+ |asy
1229
+ A
1230
+ = (−1) dΓ
1231
+ dEγ
1232
+ |u,u′→0
1233
+ B
1234
+ .
1235
+ (49)
1236
+ The refactorisation conditions guarantee that the eq. (49) holds to all orders in perturbation
1237
+ theory. To make this relation useful for the reshuffling of the factorisation theorem, let us consider
1238
+ an integral of �S(ω1, ω2, ω)J(ω1)J
1239
+ ∗(ω2) over the ω1,2 ∈ [0, ∞]. Since �S(ω1, ω2, ω) is expanded for
1240
+ ω1,2 ≫ ω, this integral is scaleless and equal to zero in dimensional regularisation. We then
1241
+ perform the following manipulations of the integration limits
1242
+ 0 =
1243
+ � ∞
1244
+ 0
1245
+ dω1
1246
+ � ∞
1247
+ 0
1248
+ dω2 = 2
1249
+ � ∞
1250
+ 0
1251
+ dω1
1252
+ � ω1
1253
+ 0
1254
+ dω2 = 2
1255
+ �� mb
1256
+ 0
1257
+ dω1 +
1258
+ � ∞
1259
+ mb
1260
+ dω1
1261
+ � � ω1
1262
+ 0
1263
+ dω2.
1264
+ (50)
1265
+ In the second step, we made use of the fact that the integrand is symmetric in ω1 and ω2 as we
1266
+ derived to all orders in eq. (38). Finally, we split the integration region into two parts suitable
1267
+ for the subtraction.
1268
+ The term integrated over ω1 from mb to ∞ is already in the form suitable for the subtraction
1269
+ of the A-type term and equal to (47). To bring the second term into the form of eq. (48), we
1270
+ perform substitutions ω1 = mb u and ω2 = mb u′, use (40) to replace J(ω1) by the singular part
1271
+ of the CB1 matching coefficient and then use the second refactorisation condition to derive
1272
+ 2N
1273
+ ��CA0
1274
+ LO(mb)
1275
+ ��2 � mb
1276
+ 0
1277
+ dω1JLO(ω1)
1278
+ � ω1
1279
+ 0
1280
+ dω2J
1281
+
1282
+ LO(ω2)
1283
+ � Λ
1284
+ −p+
1285
+ dωJLO
1286
+ g
1287
+ (mb(p+ + ω)) �S(ω, ω1, ω2)
1288
+ = 2N
1289
+ � 1
1290
+ 0
1291
+ du
1292
+
1293
+ CB1
1294
+ LO (mb, u)
1295
+ � � 1
1296
+ u
1297
+ du′ �
1298
+ CB1
1299
+ LO (mb, u′)
1300
+ � � Λ
1301
+ −p+
1302
+ dω �JLO (mb (p+ + ω) , u, u′) SLO(ω)� (51)
1303
+ We rewrite Eq. (49) using the functions which enter the factorisation theorem:
1304
+ 2N
1305
+ ��CA0
1306
+ LO(mb)
1307
+ ��2 � ∞
1308
+ mb
1309
+ dω1JLO(ω1)
1310
+ � ω1
1311
+ 0
1312
+ dω2J
1313
+
1314
+ LO(ω2)
1315
+ � Λ
1316
+ −p+
1317
+ dωJLO
1318
+ g
1319
+ (mb(p+ + ω)) �S(ω, ω1, ω2)
1320
+ = − 2N
1321
+ � 1
1322
+ 0
1323
+ du
1324
+
1325
+ CB1
1326
+ LO (mb, u)
1327
+ � � 1
1328
+ u
1329
+ du′ �
1330
+ CB1
1331
+ LO (mb, u′)
1332
+ � � Λ
1333
+ −p+
1334
+ dω �JLO (mb (p+ + ω) , u, u′) SLO(ω)� .
1335
+ (52)
1336
+ We see with the help of (51) that the fact that the sum of asymptotic contributions is equal to
1337
+ zero is a consequence of our refactorisation conditions. It is now clear that these two subtraction
1338
+ terms, which add up to zero, make it possible to reshuffle the factorisation theorem and cancel
1339
+ the endpoint divergences at the leading order.
1340
+ 16
1341
+
1342
+ 4.2
1343
+ Bare refactorised factorisation theorem
1344
+ The generalisation of the LO order result to all orders is straightforward.
1345
+ Since we are still
1346
+ working in d-dimensons with bare objects, we can insert a scaleless expression into the factorisation
1347
+ theorem using the integral manipulations we performed at LO, see eq. (50)
1348
+ Using the all-orders refactorisation conditions discussed at the beginning of this section, we
1349
+ then can cast the subtraction term into the following form with the help of the same manipulations
1350
+ as in the LO case and generalise eq. (52) to all orders:
1351
+ 0 = 2N
1352
+ ��CA0 (mb)
1353
+ ��2 � Λ
1354
+ −p+
1355
+ dωJg (mb (p+ + ω))
1356
+ � ∞
1357
+ mb
1358
+ dω1J (ω1)
1359
+ � ω1
1360
+ 0
1361
+ dω2J
1362
+ ∗ (ω2) �S (ω, ω1, ω2)
1363
+ + 2N
1364
+ � 1
1365
+ 0
1366
+ du
1367
+
1368
+ CB1 (mb, u′)
1369
+ � � 1
1370
+ u
1371
+ du′ �
1372
+ CB1∗ (mb, u′)
1373
+ � � Λ
1374
+ −p+
1375
+ dω �J (mb (p+ + ω) , u, u′) S(ω)� . (53)
1376
+ Starting from the all-order bare factorisation theorem
1377
+
1378
+ dEγ
1379
+ = 2N
1380
+ ��CA0 (mb)
1381
+ ��2 � ∞
1382
+ −∞
1383
+ dω1J (ω1)
1384
+ � ω1
1385
+ −∞
1386
+ dω2J
1387
+ ∗ (ω2)
1388
+ � Λ
1389
+ −p+
1390
+ dωJg (mb (p+ + ω)) S (ω, ω1, ω2)
1391
+ + 2N
1392
+ � 1
1393
+ 0
1394
+ duCB1 (mb, u)
1395
+ � 1
1396
+ u
1397
+ du′CB1∗ (mb, u′)
1398
+ � Λ
1399
+ −p+
1400
+ dωJ (mb (p+ + ω) , u, u′) S(ω)
1401
+ (54)
1402
+ and subtracting eq. (53) we arrive at
1403
+
1404
+ dEγ
1405
+ |A+B = 2N
1406
+ � Λ
1407
+ −p+
1408
+
1409
+
1410
+ Jg(mb(p+ + ω))
1411
+ ��CA0 (mb)
1412
+ ��2
1413
+ (55)
1414
+ ×
1415
+ � ∞
1416
+ −∞
1417
+ dω1
1418
+ � ω1
1419
+ −∞
1420
+ dω2J(ω1) J
1421
+ ∗(ω2)
1422
+
1423
+ S (ω, ω1, ω2) − θ(ω1 − mb)θ(ω2) �S(ω, ω1, ω2)
1424
+
1425
+ +
1426
+ � 1
1427
+ 0
1428
+ du
1429
+ � 1
1430
+ u
1431
+ du′ �
1432
+ CB1
1433
+ LO (mb, u) CB1∗ (mb, u′) J (mb (p+ + ω) , u, u′) S (ω)
1434
+
1435
+
1436
+ CB1 (mb, u)
1437
+ � �
1438
+ CB1∗ (mb, u′)
1439
+
1440
+ �J (mb (p+ + ω) , u, u′) S(ω)�
1441
+ ��
1442
+ ,
1443
+ where �J (mb (p+ + ω) , u, u′) S(ω)� = Jg(mb(p+ + ω)) �S(ω, mbu, mbu′) and
1444
+
1445
+ CB1 (mb, u′)
1446
+
1447
+ = (−1)CA0 (mb) mbJ (umb). We note here that the second term effectively restricts the integration
1448
+ range over ω1 to a finite range in the first line and consequently removes endpoint divergence.
1449
+ Thus these terms need to be added together before the ω1 integral is performed. Similarly, the
1450
+ last term removes the endpoint divergence of the third term, and therefore u integration has to be
1451
+ performed after these two terms are added up. In addition, we note that the integrals in the first
1452
+ term are finite for large negative values of ω1 and ω2 due to nonperturbative dynamics [4]. At this
1453
+ point, the convolutions integrals in the A- and B-type contributions are no longer divergent, and
1454
+ we can renormalise the functions entering the factorisation theorem and take the limit d → 4.
1455
+ 4.3
1456
+ Refactorised factorisation theorem after renormalisation
1457
+ We achieved refactorisation at the level of the bare factorisation theorem. It has been pointed
1458
+ out that refactorisation and renormalisation do not commute in general [23, 52]. Therefore, for
1459
+ 17
1460
+
1461
+ the result to be helpful for the resummation of the large logarithms, we must prove that we
1462
+ can express the factorisation theorem in terms of renormalised objects. To this end, we have to
1463
+ replace bare quantities with renormalised ones. The renormalisation of hard matching coefficients
1464
+ is well-established
1465
+ CA0
1466
+ bare(mb) = ZA0(µ) CA0
1467
+ ren(µ, mb) ,
1468
+ (56)
1469
+ CB1
1470
+ bare(u) =
1471
+ � 1
1472
+ 0
1473
+ du′ ZB1(µ, u, u′) CB1
1474
+ ren(µ.u′) ,
1475
+ (57)
1476
+ where the one-loop renormalisation factors can be found in Ref. [43]. The LP jet function is
1477
+ renormalised according to
1478
+ Jbare
1479
+ g
1480
+ (p2) =
1481
+ � p2
1482
+ o
1483
+ dp′2 ZJg(µ, p2 − p′2) Jren
1484
+ g (µ, p′2) ,
1485
+ (58)
1486
+ with the ZJg factor given in Refs. [53, 54] up to the three-loop order. Similarly, the LP shape
1487
+ function
1488
+ Sbare(ω) =
1489
+
1490
+ dω′ ZS(µ, ω − ω′) Sren(µ, ω′)
1491
+ (59)
1492
+ is well-known [55]
1493
+ Much less is known about NLP objects. The radiative jet function is a notable example which
1494
+ appeared before in the context of B → γℓν [12]. It has recently been computed at the two-loop
1495
+ order in Ref. [17]. The most important detail is that the time-like (ω > 0) and space-like (ω < 0)
1496
+ radiative jet functions do not mix under renormalisation
1497
+ J
1498
+ +
1499
+ bare/ren(ω) = θ(ω)Jbare/ren(ω) ,
1500
+ (60)
1501
+ J
1502
+
1503
+ bare/ren(ω) = θ(−ω)Jbare/ren(ω) ,
1504
+ (61)
1505
+ and
1506
+ J
1507
+ +
1508
+ bare(ω) =
1509
+ � ∞
1510
+ 0
1511
+ dω′ Z+
1512
+ J (µ, ω, ω′) , J
1513
+ +
1514
+ ren(µ, ω′) ,
1515
+ (62)
1516
+ J
1517
+
1518
+ bare(ω) =
1519
+ � 0
1520
+ −∞
1521
+ dω′ Z−
1522
+ J (µ, ω, ω′) J
1523
+
1524
+ ren(µ, ω′) .
1525
+ (63)
1526
+ This separation into time-like and spec-like jet functions is necessary since we choose to integrate
1527
+ the subtraction term only over non-negative values of ω1,2. Finally, we define the renormalisation
1528
+ of the NLP soft and jet functions
1529
+ Sbare(ω, ω1, ω2) =
1530
+
1531
+ dω′dω′
1532
+ 1dω′
1533
+ 2 ZS(µ, ω, ω′, ω1, ω′
1534
+ 1, ω2, ω′
1535
+ 2) Sren(µ, ω′, ω′
1536
+ 1, ω′
1537
+ 2) ,
1538
+ (64)
1539
+ Jbare(p2, u1, u2) =
1540
+
1541
+ dp′2
1542
+ � 1
1543
+ 0
1544
+ du′
1545
+ 1
1546
+ � 1
1547
+ 0
1548
+ du′
1549
+ 2 ZJ(µ, p2 − p′2, u1, u′
1550
+ 1, u2, u′
1551
+ 2) Jren(p′2, u′
1552
+ 1, u′
1553
+ 2) .
1554
+ (65)
1555
+ These renormalisation kernels are currently unknown.
1556
+ 18
1557
+
1558
+ We require that A- and B-type contributions are separately RG invariant (see Ref. [56] for
1559
+ analogous treatment). This leads to the following conditions on the renormalisation kernels
1560
+ |ZA0|2
1561
+
1562
+
1563
+
1564
+ dω1
1565
+
1566
+ dω2 ZJg(ω − ω′)ZJ(ω1, ω′
1567
+ 1) Z†
1568
+ J(ω2, ω′
1569
+ 2) ZS(ω, ω′′, ω1, ω′′
1570
+ 1, ω2, ω′′
1571
+ 2)
1572
+ =δ(ω′ − ω′′) δ(ω′
1573
+ 1 − ω′′
1574
+ 1) δ(ω′
1575
+ 2 − ω′′
1576
+ 2) ,
1577
+ (66)
1578
+ and
1579
+ � 1
1580
+ 0
1581
+ du1
1582
+ � 1
1583
+ 0
1584
+ du2
1585
+
1586
+ dω ZB1(u1, u′
1587
+ 1) ZB1†(u2, u′
1588
+ 2) ZJ(ω − ω′, u1, u′
1589
+ 1, u2, u′
1590
+ 2) ZS(ω − ω′′)
1591
+ = δ(ω′ − ω′′) δ(u′
1592
+ 1 − u′′
1593
+ 1) δ(u′
1594
+ 2 − u′′
1595
+ 2) ;
1596
+ (67)
1597
+ and further, RG invariance of the subtraction term leads to
1598
+ |ZA0|2
1599
+ � ∞
1600
+ 0
1601
+ dω1
1602
+ � ∞
1603
+ 0
1604
+ dω2
1605
+
1606
+ dω Z+
1607
+ J (ω1, ω′
1608
+ 1) Z+†
1609
+ J (ω2, ω′
1610
+ 2) ZJg(ω − ω′) Z�S(ω − ω′′, ω1, ω′′
1611
+ 1, ω2, ω′′
1612
+ 2)
1613
+ = δ(ω′ − ω′′) δ(ω′
1614
+ 1 − ω′′
1615
+ 1) δ(ω′
1616
+ 2 − ω′′
1617
+ 2) .
1618
+ (68)
1619
+ These conditions are sufficient to prove that renormalisation and refactorisation commute and
1620
+ there is no leftover term.
1621
+ We can now insert the above definitions into eq. (55),
1622
+
1623
+ dEγ
1624
+ |A+B = 2N
1625
+ � Λ
1626
+ −p+
1627
+
1628
+
1629
+ Jren
1630
+ g (mb(p+ + ω))
1631
+ ��CA0
1632
+ ren (mb)
1633
+ ��2
1634
+ (69)
1635
+ ×
1636
+ � ∞
1637
+ −∞
1638
+ dω1
1639
+ � ω1
1640
+ −∞
1641
+ dω2J
1642
+ +
1643
+ ren(ω1) J
1644
+ +∗
1645
+ ren(ω2)
1646
+
1647
+ Sren (ω, ω1, ω2) − θ(ω1 − mb)θ(ω2) �Sren(ω, ω1, ω2)
1648
+
1649
+ +
1650
+ � 1
1651
+ 0
1652
+ du
1653
+ � 1
1654
+ u
1655
+ du′ �
1656
+ CB1
1657
+ ren (mb, u) CB1∗
1658
+ ren (mb, u′) Jren (mb (p+ + ω) , u, u′) Sren (ω)
1659
+
1660
+
1661
+ CB1
1662
+ ren (mb, u)
1663
+ � �
1664
+ CB1∗
1665
+ ren (mb, u′)
1666
+
1667
+ �Jren (mb (p+ + ω) , u, u′) Sren(ω)�
1668
+ ��
1669
+ .
1670
+ This is our final result. Endpoint divergences are manifestly absent, assuming one performs
1671
+ the integrals over ω1 after adding the first and second terms together. Similarly, the integrals
1672
+ over u should be performed after adding the last two lines.
1673
+ This renormalised factorisation
1674
+ theorem allows for a consistent resummation of large logarithms within the resolved O8 − O8,
1675
+ using standard RG methods owing to the fact that each object appearing in the above equation
1676
+ is a single scale object. However, a judicious choice of scale might be necessary.
1677
+ 19
1678
+
1679
+ 5
1680
+ Summary and Outlook
1681
+ In the present paper, we identified the divergences in the resolved, but also in the direct subleading
1682
+ O8 − O8 as endpoint divergences which lead to a breakdown of the factorisation theorem already
1683
+ at leading order in four space-time dimensions. The failure of naive factorisation does not allow
1684
+ for consistent separation of scales and, consequently, resummation of large logarithms.
1685
+ However, it was recently shown [9] that the resolved contributions still represent the most
1686
+ significant uncertainty in the inclusive ¯B → Xsγ decay. Large scale dependence and also a large
1687
+ charm mass dependence were identified in the lowest order result of the resolved contribution,
1688
+ which calls for a systematic calculation of αs corrections and RG summation of all resolved
1689
+ contributions [9]. A mandatory input for this task is a well-defined factorisation formula for these
1690
+ subleading corrections. This critical step was established in this paper. The next step consists of
1691
+ computing renormalisation kernels for the NLP soft and jet functions, extracting the anomalous
1692
+ dimensions and solving the RG equations to resum large logarithms.
1693
+ Recent intensive studies of the power corrections in collider applications of SCET [19,22–24,
1694
+ 42,52] lead to the development of new techniques that allow for a reshuffling of terms within the
1695
+ factorisation formula so that all endpoint divergences cancel out. We used these new techniques in
1696
+ our flavour application which includes nonperturbative functions typically not present in collider
1697
+ applications of SCET. Unlike in the h → γγ decay [22], in the considered SCETI problem, there
1698
+ are no leftover terms present after renormalisation.
1699
+ To derive a consistent factorisation theorem, we first established the bare factorisation theorem
1700
+ for the resolved and direct contributions on the operatorial level. Then we derived the all-orders
1701
+ refactorisation conditions applicable to our process. This idea is based on the fact that in certain
1702
+ limits, the two terms of the subleading O8 − O8 contribution have the same structure, which
1703
+ guarantees that the endpoint divergences cancel between the two terms to all orders. Finally, we
1704
+ proved that we could express the factorisation theorem in terms of renormalised objects so that the
1705
+ result can be used for the resummation of the large logarithms within the resolved contributions.
1706
+ Acknowledgements
1707
+ We thank Martin Beneke and Matthias Neubert for their valuable discussions. RS would also like
1708
+ to thank Mathias Garny and Jian Wang for many discussions on power corrections in SCET and
1709
+ Mikolaj Misiak for a discussion on the theoretical predictions for B → Xsγ. TH is grateful to
1710
+ Michael Benzke for uncounted discussions on the resolved contributions. RS is supported by the
1711
+ United States Department of Energy under Grant Contract DESC0012704. TH is supported by
1712
+ the Cluster of Excellence “Precision Physics, Fundamental Interactions, and Structure of Matter"
1713
+ (PRISMA+ EXC 2118/1) funded by the German Research Foundation (DFG) within the German
1714
+ Excellence Strategy (Project ID 39083149), as well as by the BMBF Verbundprojekt 05H2018 -
1715
+ Belle II. TH also thanks the CERN theory group for its hospitality during his regular visits to
1716
+ CERN where part of the work was done.
1717
+ 20
1718
+
1719
+ References
1720
+ [1] M. Beneke, “Soft-collinear factorization in B decays,” Nucl. Part. Phys. Proc. 261-262, 311-
1721
+ 337 (2015) [arXiv:1501.07374 [hep-ph]].
1722
+ [2] M. Misiak, H. M. Asatrian, R. Boughezal, M. Czakon, T. Ewerth, A. Ferroglia, P. Fiedler,
1723
+ P. Gambino, C. Greub and U. Haisch, et al. “Updated NNLO QCD predictions for the weak
1724
+ radiative B-meson decays,” Phys. Rev. Lett. 114, no.22, 221801 (2015) [arXiv:1503.01789
1725
+ [hep-ph]].
1726
+ [3] T. Hurth and M. Nakao, “Radiative and Electroweak Penguin Decays of B Mesons,” Ann.
1727
+ Rev. Nucl. Part. Sci. 60, 645-677 (2010) [arXiv:1005.1224 [hep-ph]].
1728
+ [4] M. Benzke, S. J. Lee, M. Neubert and G. Paz, “Factorization at Subleading Power and
1729
+ Irreducible Uncertainties in ¯B → Xsγ Decay,” JHEP 08, 099 (2010) [arXiv:1003.5012 [hep-
1730
+ ph]].
1731
+ [5] M. Benzke, S. J. Lee, M. Neubert and G. Paz, “Long-Distance Dominance of the CP Asym-
1732
+ metry in B → Xs,d + γ Decays,” Phys. Rev. Lett. 106, 141801 (2011) [arXiv:1012.3167
1733
+ [hep-ph]].
1734
+ [6] T. Hurth, M. Fickinger, S. Turczyk and M. Benzke, “Resolved Power Corrections to the Inclu-
1735
+ sive Decay ¯B → Xsℓ+ℓ−,” Nucl. Part. Phys. Proc. 285-286, 57-62 (2017) [arXiv:1711.01162
1736
+ [hep-ph]].
1737
+ [7] M. Benzke, T. Hurth and S. Turczyk, “Subleading power factorization in ¯B → Xsℓ+ℓ−,”
1738
+ JHEP 10, 031 (2017) [arXiv:1705.10366 [hep-ph]].
1739
+ [8] A. Gunawardana and G. Paz, “Reevaluating uncertainties in B → Xsγ decay,” JHEP 11,
1740
+ 141 (2019) [arXiv:1908.02812 [hep-ph]].
1741
+ [9] M. Benzke and T. Hurth, “Resolved 1/mb contributions to ¯B → Xs,dℓ+ℓ− and ¯B → Xsγ,”
1742
+ Phys. Rev. D 102, 114024 (2020) [arXiv:2006.00624 [hep-ph]].
1743
+ [10] E. Lunghi, D. Pirjol and D. Wyler, “Factorization in leptonic radiative B → γeν decays,”
1744
+ Nucl. Phys. B 649, 349-364 (2003) [arXiv:hep-ph/0210091 [hep-ph]].
1745
+ [11] M. Beneke and T. Feldmann, “Factorization of heavy to light form-factors in soft collinear
1746
+ effective theory,” Nucl. Phys. B 685, 249-296 (2004) doi:10.1016/j.nuclphysb.2004.02.033
1747
+ [arXiv:hep-ph/0311335 [hep-ph]].
1748
+ [12] S. W. Bosch, R. J. Hill, B. O. Lange and M. Neubert, “Factorization and Sudakov resumma-
1749
+ tion in leptonic radiative B decay,” Phys. Rev. D 67, 094014 (2003) [arXiv:hep-ph/0301123
1750
+ [hep-ph]].
1751
+ [13] M. Beneke, A. Broggio, M. Garny, S. Jaskiewicz, R. Szafron, L. Vernazza and J. Wang,
1752
+ “Leading-logarithmic threshold resummation of the Drell-Yan process at next-to-leading
1753
+ power,” JHEP 03, 043 (2019) [arXiv:1809.10631 [hep-ph]].
1754
+ [14] M. Beneke, A. Broggio, S. Jaskiewicz and L. Vernazza, “Threshold factorization of the Drell-
1755
+ Yan process at next-to-leading power,” JHEP 07, 078 (2020) [arXiv:1912.01585 [hep-ph]].
1756
+ 21
1757
+
1758
+ [15] I. Moult, I. W. Stewart and G. Vita, “Subleading Power Factorization with Radiative Func-
1759
+ tions,” JHEP 11, 153 (2019) [arXiv:1905.07411 [hep-ph]].
1760
+ [16] E. Laenen, J. Sinninghe Damsté, L. Vernazza, W. Waalewijn and L. Zoppi, “Towards all-
1761
+ order factorization of QED amplitudes at next-to-leading power,” Phys. Rev. D 103, no.3,
1762
+ 034022 (2021) [arXiv:2008.01736 [hep-ph]].
1763
+ [17] Z. L. Liu and M. Neubert, “Two-Loop Radiative Jet Function for Exclusive B-Meson and
1764
+ Higgs Decays,” JHEP 06, 060 (2020) [arXiv:2003.03393 [hep-ph]].
1765
+ [18] Z. L. Liu, M. Neubert, M. Schnubel and X. Wang, “Radiative quark jet function with an
1766
+ external gluon,” JHEP 02, 075 (2022) [arXiv:2112.00018 [hep-ph]].
1767
+ [19] M. Beneke, M. Garny, R. Szafron and J. Wang, “Violation of the Kluberg-Stern-Zuber the-
1768
+ orem in SCET,” JHEP 09, 101 (2019) [arXiv:1907.05463 [hep-ph]].
1769
+ [20] M. Beneke, M. Garny, S. Jaskiewicz, R. Szafron, L. Vernazza and J. Wang, “Leading-
1770
+ logarithmic threshold resummation of Higgs production in gluon fusion at next-to-leading
1771
+ power,” JHEP 01, 094 (2020) [arXiv:1910.12685 [hep-ph]].
1772
+ [21] J. Wang, “Resummation of double logarithms in loop-induced processes with effective field
1773
+ theory,” [arXiv:1912.09920 [hep-ph]].
1774
+ [22] Z. L. Liu and M. Neubert, “Factorization at subleading power and endpoint-divergent con-
1775
+ volutions in h → γγ decay,” JHEP 04, 033 (2020) [arXiv:1912.08818 [hep-ph]].
1776
+ [23] Z. L. Liu, B. Mecaj, M. Neubert and X. Wang, “Factorization at subleading power and
1777
+ endpoint divergences in h → γγ decay. Part II. Renormalization and scale evolution,” JHEP
1778
+ 01, 077 (2021) [arXiv:2009.06779 [hep-ph]].
1779
+ [24] M. Beneke, M. Garny, S. Jaskiewicz, R. Szafron, L. Vernazza and J. Wang, “Large-x resum-
1780
+ mation of off-diagonal deep-inelastic parton scattering from d-dimensional refactorization,”
1781
+ JHEP 10, 196 (2020) [arXiv:2008.04943 [hep-ph]].
1782
+ [25] M. Beneke, M. Garny, S. Jaskiewicz, J. Strohm, R. Szafron, L. Vernazza and J. Wang, “Next-
1783
+ to-leading power endpoint factorization and resummation for off-diagonal “gluon” thrust,”
1784
+ JHEP 07, 144 (2022) [arXiv:2205.04479 [hep-ph]].
1785
+ [26] Z. L. Liu, M. Neubert, M. Schnubel and X. Wang, “Factorization at Next-to-Leading Power
1786
+ and Endpoint Divergences in gg → h Production,” [arXiv:2212.10447 [hep-ph]].
1787
+ [27] C. Cornella, M. König and M. Neubert, “Structure-Dependent QED Effects in Exclusive B
1788
+ Decays at Subleading Power,” [arXiv:2212.14430 [hep-ph]].
1789
+ [28] M. Beneke, F. Campanario, T. Mannel and B. D. Pecjak, “Power corrections to anti-B —>
1790
+ X(u) l anti-nu (X(s) gamma) decay spectra in the ’shape-function’ region,” JHEP 06, 071
1791
+ (2005) [arXiv:hep-ph/0411395 [hep-ph]].
1792
+ [29] S. W. Bosch, M. Neubert and G. Paz, “Subleading shape functions in inclusive B decays,”
1793
+ JHEP 11, 073 (2004) [arXiv:hep-ph/0409115 [hep-ph]].
1794
+ 22
1795
+
1796
+ [30] M. Beneke, G. Buchalla, M. Neubert and C. T. Sachrajda, “QCD factorization in B —>
1797
+ pi K, pi pi decays and extraction of Wolfenstein parameters,” Nucl. Phys. B 606, 245-321
1798
+ (2001) [arXiv:hep-ph/0104110 [hep-ph]].
1799
+ [31] C. W. Bauer, S. Fleming, D. Pirjol and I. W. Stewart, “An Effective field theory for collinear
1800
+ and soft gluons:
1801
+ Heavy to light decays,” Phys. Rev. D 63, 114020 (2001) [arXiv:hep-
1802
+ ph/0011336 [hep-ph]].
1803
+ [32] C. W. Bauer, D. Pirjol and I. W. Stewart, “Soft collinear factorization in effective field
1804
+ theory,” Phys. Rev. D 65, 054022 (2002) [arXiv:hep-ph/0109045 [hep-ph]].
1805
+ [33] M. Beneke, A. P. Chapovsky, M. Diehl and T. Feldmann, “Soft collinear effective theory
1806
+ and heavy to light currents beyond leading power,” Nucl. Phys. B 643, 431-476 (2002)
1807
+ [arXiv:hep-ph/0206152 [hep-ph]].
1808
+ [34] M. Beneke and T. Feldmann, “Multipole expanded soft collinear effective theory with non-
1809
+ Abelian gauge symmetry,” Phys. Lett. B 553, 267-276 (2003) [arXiv:hep-ph/0211358 [hep-
1810
+ ph]].
1811
+ [35] M. Beneke, M. Garny, R. Szafron and J. Wang, “Anomalous dimension of subleading-power
1812
+ N-jet operators,” JHEP 03, 001 (2018) [arXiv:1712.04416 [hep-ph]].
1813
+ [36] M. Beneke, M. Garny, R. Szafron and J. Wang, “Subleading-power N-jet operators and the
1814
+ LBK amplitude in SCET,” PoS RADCOR2017, 048 (2017) [arXiv:1712.07462 [hep-ph]].
1815
+ [37] M. Beneke, M. Garny, R. Szafron and J. Wang, “Anomalous dimension of subleading-power
1816
+ N-jet operators. Part II,” JHEP 11, 112 (2018) [arXiv:1808.04742 [hep-ph]].
1817
+ [38] S. Jaskiewicz, “Next-to-leading power threshold factorization for Drell-Yan production,”
1818
+ [arXiv:1912.08882 [hep-ph]].
1819
+ [39] D. W. Kolodrubetz, I. Moult and I. W. Stewart, “Building Blocks for Subleading Helicity
1820
+ Operators,” JHEP 05, 139 (2016) [arXiv:1601.02607 [hep-ph]].
1821
+ [40] I. Feige, D. W. Kolodrubetz, I. Moult and I. W. Stewart, “A Complete Basis of Helicity
1822
+ Operators for Subleading Factorization,” JHEP 11, 142 (2017) [arXiv:1703.03411 [hep-ph]].
1823
+ [41] I. Moult, I. W. Stewart, G. Vita and H. X. Zhu, “First Subleading Power Resummation for
1824
+ Event Shapes,” JHEP 08, 013 (2018) [arXiv:1804.04665 [hep-ph]].
1825
+ [42] I. Moult, I. W. Stewart, G. Vita and H. X. Zhu, “The Soft Quark Sudakov,” JHEP 05, 089
1826
+ (2020) [arXiv:1910.14038 [hep-ph]].
1827
+ [43] M. Beneke and D. Yang, “Heavy-to-light B meson form-factors at large recoil energy:
1828
+ Spectator-scattering corrections,” Nucl. Phys. B 736, 34-81 (2006) [arXiv:hep-ph/0508250
1829
+ [hep-ph]].
1830
+ [44] G. Vita, “QCD Beyond Leading Power,” [arXiv:2008.10606 [hep-ph]].
1831
+ [45] S. E. Jaskiewicz, “Factorization and Resummation at Subleading Powers,” (Doctoral disser-
1832
+ tation, Technische Universität München)
1833
+ 23
1834
+
1835
+ [46] M. Neubert, “Analysis of the photon spectrum in inclusive B —> X(s) gamma decays,” Phys.
1836
+ Rev. D 49 (1994), 4623-4633 [arXiv:hep-ph/9312311 [hep-ph]].
1837
+ [47] G. Paz,
1838
+ “Subleading Jet Functions in Inclusive B Decays,”
1839
+ JHEP 06,
1840
+ 083 (2009)
1841
+ [arXiv:0903.3377 [hep-ph]].
1842
+ [48] T. Becher, M. Neubert and G. Xu, “Dynamical Threshold Enhancement and Resummation
1843
+ in Drell-Yan Production,” JHEP 07, 030 (2008) [arXiv:0710.0680 [hep-ph]].
1844
+ [49] M. Beneke, C. Bobeth and R. Szafron, “Enhanced electromagnetic correction to the rare
1845
+ B-meson decay Bs,d → µ+µ−,” Phys. Rev. Lett. 120, no.1, 011801 (2018) [arXiv:1708.09152
1846
+ [hep-ph]].
1847
+ [50] M. Beneke, C. Bobeth and R. Szafron, “Power-enhanced leading-logarithmic QED corrections
1848
+ to Bq → µ+µ−,” JHEP 10, 232 (2019) [erratum: JHEP 11, 099 (2022)] [arXiv:1908.07011
1849
+ [hep-ph]].
1850
+ [51] S. W. Bosch, B. O. Lange, M. Neubert and G. Paz, “Factorization and shape function effects
1851
+ in inclusive B meson decays,” Nucl. Phys. B 699, 335-386 (2004) [arXiv:hep-ph/0402094
1852
+ [hep-ph]].
1853
+ [52] Z. L. Liu, B. Mecaj, M. Neubert and X. Wang, “Factorization at subleading power, Sudakov
1854
+ resummation, and endpoint divergences in soft-collinear effective theory,” Phys. Rev. D 104,
1855
+ no.1, 014004 (2021) [arXiv:2009.04456 [hep-ph]].
1856
+ [53] T. Becher and G. Bell, “The gluon jet function at two-loop order,” Phys. Lett. B 695, 252-258
1857
+ (2011) [arXiv:1008.1936 [hep-ph]].
1858
+ [54] P. Banerjee, P. K. Dhani and V. Ravindran, “Gluon jet function at three loops in QCD,”
1859
+ Phys. Rev. D 98, no.9, 094016 (2018) [arXiv:1805.02637 [hep-ph]].
1860
+ [55] A. G. Grozin and G. P. Korchemsky, “Renormalized sum rules for structure functions of
1861
+ heavy mesons decays,” Phys. Rev. D 53, 1378-1390 (1996) [arXiv:hep-ph/9411323 [hep-ph]].
1862
+ [56] Z. L. Liu, B. Mecaj, M. Neubert, X. Wang and S. Fleming, “Renormalization and Scale
1863
+ Evolution of the Soft-Quark Soft Function,” JHEP 07, 104 (2020) [arXiv:2005.03013 [hep-
1864
+ ph]].
1865
+ 24
1866
+
G9AzT4oBgHgl3EQfxf6F/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
GdFIT4oBgHgl3EQfWysJ/content/2301.11240v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8d07c6c4d8019ce7558bc4f7c31885615c2d3a16a36283af10fa3cf986440b3a
3
+ size 1119430
GtFAT4oBgHgl3EQftR52/content/2301.08663v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b47189ec99c16168c721b6e3324cbee377cf8a9912476498cd3e1b929322881d
3
+ size 188892
GtFAT4oBgHgl3EQftR52/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c490381f8e57ec78a8f9df4560ce522c3a7a700d888381102a1bc28b97a7d5a5
3
+ size 1835053
GtFAT4oBgHgl3EQftR52/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ae0ef3568b437e6de5835e95c65183698118060d61452310f0272b8a7dcb2f2b
3
+ size 77716
INE1T4oBgHgl3EQfXwS1/content/tmp_files/2301.03131v1.pdf.txt ADDED
@@ -0,0 +1,1508 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03131v1 [math.AT] 9 Jan 2023
2
+ INTRINSIC CONVERGENCE OF THE HOMOLOGICAL TAYLOR TOWER FOR
3
+ r-IMMERSIONS IN Rn
4
+ GREGORY ARONE AND FRANJO ˇSARˇCEVI´C
5
+ Abstract. For an integer r ≥ 2, the space of r-immersions of M in Rn is defined to be the
6
+ space of immersions of M in Rn such that at most r − 1 points of M are mapped to the same
7
+ point in Rn. The space of r-immersions lies “between” the embeddings and the immersions.
8
+ We calculate the connectivity of the layers in the homological Taylor tower for the space of r-
9
+ immersions in Rn (modulo immersions), and give conditions that guarantee that the connectivity
10
+ of the maps in the tower approaches infinity as one goes up the tower. We also compare the
11
+ homological tower with the homotopical tower, and show that up to degree 2r − 1 there is a
12
+ “Hurewicz isomorphism” between the first non-trivial homotopy groups of the layers of the two
13
+ towers.
14
+ Contents
15
+ 1.
16
+ Introduction
17
+ 1
18
+ 2.
19
+ Prerequisites
20
+ 5
21
+ 2.1.
22
+ Cubical diagrams
23
+ 5
24
+ 2.2.
25
+ Manifold calculus of functors
26
+ 6
27
+ 2.3.
28
+ Spectra
29
+ 9
30
+ 3.
31
+ The homological Taylor tower for reduced r-immersions in Rn
32
+ 12
33
+ 4.
34
+ r-configuration spaces in Rn as complements of subspace arrangements
35
+ 13
36
+ 5.
37
+ Total fiber of a retractive cubical diagram
38
+ 16
39
+ 6.
40
+ The cube of r-configuration spaces is retractive
41
+ 18
42
+ 7.
43
+ Connectivity of the cube of (co)homologies of r-configuration spaces
44
+ 19
45
+ 8.
46
+ Convergence result
47
+ 22
48
+ 9.
49
+ Comparing with the unstable tower
50
+ 23
51
+ 10.
52
+ Further questions
53
+ 26
54
+ References
55
+ 27
56
+ 1. Introduction
57
+ Let M be a smooth manifold of dimension m, and fix an integer r ≥ 2. An r-immersion of M
58
+ in Rn is an immersion of M in Rn such that the preimage of every point in Rn contains at most
59
+ r − 1 points of M. The space of r-immersions of M in Rn is denoted by rImm(M, Rn). For
60
+ 2020 Mathematics Subject Classification. Primary: 57R42; Secondary: 55R80, 57R40, 55P42.
61
+ Key words and phrases. calculus of functors, manifold calculus, Taylor tower, embeddings, immersions, r-
62
+ immersions, homotopy of spectra, homological convergence, partial configuration space.
63
+ Acknowledgements. F. ˇSarˇcevi´c was partially supported by the grant P20 01109 (JUNTA/FEDER, UE).
64
+ 1
65
+
66
+ r = 2, 2-immersions are the same thing as injective immersions, which are essentially the same
67
+ as embeddings in nice cases. In any case, we have inclusions of subspaces
68
+ Emb(M, Rn) ⊆ 2 Imm(M, Rn) ⊂ 3 Imm(M, Rn) ⊂ · · · ⊂ rImm(M, Rn) ⊂ · · · ⊂ Imm(M, Rn).
69
+ In this paper we study the homological Taylor tower of the r-immersions functor. The “Taylor
70
+ tower” is meant in the sense of manifold calculus (also known as embedding calculus) developed
71
+ by Weiss [Wei99] and Goodwillie-Weiss [GW99].
72
+ The basic idea of manifold calculus is the following. In order to study the homotopy type of a space
73
+ such as rImm(M, Rn), one views it as a particular value of the presheaf rImm(−, Rn) defined on
74
+ M (one can also consider more general target manifolds than Rn, but we will content ourselves
75
+ with maps into Rn). A presheaf is a contravariant functor on the poset O(M) of open subsets
76
+ of M. Inside O(M) there is a sequence of subposets O1(M) ⊂ · · ·Ok(M) ⊂ · · · ⊂ O∞(M),
77
+ where Ok(M) is the poset of open subsets of M that are diffeomorphic to the disjoint union of
78
+ at most k copies of Rm. By restricting a presheaf F to Ok(M) and then extrapolating back to
79
+ O(M) one obtains a tower of approximations to F, which is usually denoted as follows
80
+ F → (T∞F → · · · → TkF → Tk−1F → · · · T0F).
81
+ This is called the “Taylor tower” of F. Manifold calculus, and the Taylor tower in particular, has
82
+ had many consequences and applications [Mun05], [Vol06], [ALV07], [Mun11], [DH12], [ST16],
83
+ [BdBW18].
84
+ In this paper we investigate the Taylor tower that calculates the homology of the space rImm(M, Rn).
85
+ In practice, this means the following. First of all, it is convenient to replace the space of r-
86
+ immersions with r-immersions modulo immersions. Let us suppose that we fix a basepoint in
87
+ Imm(M, Rn), and let rImm(M, Rn) be the homotopy fiber of the inclusion map rImm(M, Rn) →
88
+ Imm(M, Rn). Let HZ denote the Eilenberg-MacLane spectrum. We are interested in the Taylor
89
+ tower of the presheaf of Spectra, defined by the formula
90
+ U �→ HZ ∧ rImm(U, Rn).
91
+ (more precise definitions are given in Section 2).
92
+ Our main result concerns the rate of convergence of the Taylor tower of this functor.
93
+ The
94
+ question of convergence is a fundamental one.
95
+ We will distinguish between two aspects of
96
+ convergence: how strongly the tower converges to its limit, and what it converges to. We will
97
+ say that the Taylor tower of a functor F converges intrinsically at M if the connectivity of the
98
+ map TkF(M) → Tk−1F(M) approaches ∞ as k approaches ∞. We say that the Taylor tower
99
+ of F converges strongly to F(M) if the connectivity of the map F(M) → TkF(M) approaches
100
+ ∞ as k approaches ∞. Strong convergence implies intrinsic convergence, but the converse does
101
+ not have to be true. In practice it seems that for “natural” functors that we know, whenever the
102
+ Taylor tower of F converges intrinsically, it converges strongly to F. But intrinsic convergence
103
+ is usually much easier to prove than strong convergence.
104
+ Before we state our main result, let us recall, for context, that one of the deepest results in
105
+ functor calculus is the Goodwillie-Klein-Weiss convergence theorem [GW99], [GK08], [GK15].
106
+ Theorem 1.1 (Convergence of the Taylor tower for spaces of embeddings). If M is a smooth
107
+ closed manifold of dimension m, and N is a smooth manifold of dimension n, then the map
108
+ Emb(M, N) → Tk Emb(M, N)
109
+ 2
110
+
111
+ is
112
+ k(n − m − 2) + 1 − m-connected.
113
+ In particular, if n−m−2 > 0, then the connectivities grow with k and the Taylor tower therefore
114
+ converges strongly to Emb(M, N).
115
+ There is an easier, but also important convergence result for the homological version of the tower,
116
+ which is more directly relevant to this paper. Define Emb(M, Rn) to be the homotopy fiber of
117
+ the inclusion Emb(M, Rn) → Imm(M, Rn). Consider the contravariant functor from O(M) to
118
+ Spectra that sends U to HZ ∧ Emb(U, Rn). This functor represents the homology of the space
119
+ of embeddings modulo immersions. The Taylor tower of this functor is known to converge when
120
+ n > 2m + 1 [Wei04].
121
+ Now let us state our main result
122
+ Theorem 1.2. Let M be m-dimensional. Assume that n ≥ 2. If r ≤ n + 1, the Taylor tower
123
+ for HZ ∧ rImm(M, Rn) converges intrinsically when
124
+ n > rm + 1
125
+ r − 1 .
126
+ If r ≥ n + 1 then the Taylor tower converges intrinsically when n > m + 1.
127
+ Remarks 1.3.
128
+ (1) When r = n + 1 the two statements are equivalent.
129
+ Indeed, the function f(n) =
130
+ n2 − nm − m − 1, n ∈ N, is positive only for n > m + 1.
131
+ (2) When r = 2 we get the condition n > 2m + 1, which is the known condition for the
132
+ convergence of the Taylor tower of HZ ∧ Emb(M, Rn).
133
+ (3) The condition n > rm+1
134
+ r−1 is equivalent to rm−(r−1)n < −1. The number rm−(r−1)n
135
+ equals, at least when it is positive, to the dimension of the intersection of r copies of Rm
136
+ embedded in Rn in a general position.
137
+ Next let us discuss the proof. Let F be a presheaf defined on a suitable category of m-dimensional
138
+ manifolds and codimension zero embeddings. The basic building blocks in the construction of
139
+ the Taylor tower of F are spaces of the form F(�
140
+ i Rm), for i = 0, 1, 2, . . .. The homotopy fiber
141
+ of the map TkF → Tk−1F depends on the total homotopy fiber of the following cubical diagram,
142
+ indexed by the poset of subsets of k = {1, . . . , k}:
143
+ (1)
144
+ S �→ F
145
+
146
+ �
147
+ k\S
148
+ Rm
149
+
150
+
151
+ This homotopy fiber is sometimes called the k-th derivative (or the k-th cross-effect) of F at
152
+ ∅. The following fact is particularly important for analysing intrinsic convergence. Recall that a
153
+ cubical diagram is called c-cartesian if the map from the initial object to the homotopy limit of the
154
+ rest of the cubical diagram is c-connected. Suppose the cubical diagram (1) is ck-cartesian. Then
155
+ the map TkF(M) → Tk−1F(M) is ck − mk-connected. Thus the Taylor tower of F converges
156
+ intrinsically at M if the number ck − mk approaches ∞ as k approaches ∞.
157
+ When F(M) = Emb(M, Rn), there is a well-known equivalence Emb(�
158
+ k Rm, Rn) ≃ Conf(k, Rn),
159
+ where Conf(k, Rn) is the configuration space of ordered k-tuples of pairwise distinct points in Rn.
160
+ 3
161
+
162
+ Similarly, there is an equivalence between rImm(�
163
+ k Rm, Rn) and the so-called r-configuration
164
+ space, also called no r-equal configuration space, defined by
165
+ rConf(k, Rn) := rImm(k, Rn).
166
+ This is the space of ordered k-tuples of points in Rn where at most r −1 are allowed to be equal.
167
+ A proof of the equivalence
168
+ rImm(
169
+
170
+ k
171
+ Rm, Rn)
172
+ ≃−→ rConf(k, Rn)
173
+ is given in [AˇS22]. Thus r-configuration spaces are basic building blocks in the Taylor tower of
174
+ rImm(M, Rn).
175
+ To analyse the intrinsic convergence of the Taylor tower of the functor HZ ∧ rImm(−, Rn), one
176
+ needs to calculate how cartesian the following k-dimensional cubical diagram is
177
+ (2)
178
+ S �→ HZ ∧ rConf(k \ S, Rn).
179
+ The space rConf(i, Rn) is the complement of a subspace arrangement in Rni. It follows that the
180
+ homology of r-configuration spaces is accessible by means of the Goresky-MacPherson formula
181
+ and other such tools. The homology of r-configuration spaces was studied by a number of people,
182
+ starting with Bj¨orner and Welker [BW95].
183
+ Using the Goresky-MacPherson formula and the results in [BW95] we prove the following result
184
+ (it is combining Proposition 7.7 and Theorem 8.1)
185
+ Theorem 1.4. When r ≤ n + 1, the cube (2) is k(n − 1) +
186
+ � k
187
+ r
188
+
189
+ (r − n − 1)-cartesian, and the
190
+ map
191
+ pk : TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn)
192
+ is
193
+ k
194
+
195
+ nr − 1
196
+ r
197
+ − m − 1
198
+ r
199
+
200
+ − (k mod r)
201
+ r
202
+ (r − n − 1)-connected.
203
+ Here (k mod r) := k − r
204
+ � k
205
+ r
206
+
207
+ .
208
+ When r ≥ n + 1, the cube (2) is k(n − 1) + r − n − 1-cartesian, and the map pk is
209
+ k(n − m − 1) + r − n − 1-connected.
210
+ Theorem 1.2 follows easily from Theorem 1.4.
211
+ In Section 9 we compare the tower of the homological functor HZ ∧ rImm(M, Rn) with that of
212
+ the tower of the homotopical functor rImm(M, Rn). Let us suppose that we chose a basepoint in
213
+ the space rImm(M, Rn). In this case the presheaf rImm(−, Rn) takes values in pointed spaces,
214
+ and we have the following diagram of presheaves:
215
+ (3)
216
+ rImm(−, Rn)
217
+ i←− rImm(−, Rn)
218
+ h−→ Ω∞HZ ∧ rImm(−, Rn).
219
+ It is well-known that the map i induces an equivalence of all layers except the first one. Indeed,
220
+ the map i is the homotopy fiber of the map from rImm(−, Rn) to its linear approximation. Thus
221
+ we can view the map h as a map from the higher layers/derivatives of rImm(−, Rn) to the
222
+ corresponding layers/derivatives of Ω∞HZ∧rImm(−, Rn), which are essentially the same as the
223
+ layers/derivatives of HZ ∧ rImm(−, Rn), since Ω∞ commutes with Taylor approximations.
224
+ 4
225
+
226
+ When r = 2, the second derivative of rImm(−, Rn) is equivalent to Sn−1, and the second
227
+ derivative of HZ ∧ rImm(−, Rn) is HZ ∧ Sn−1. It follows that in the case r = 2, the map h
228
+ in (3) induces the Hurewicz homomorphism from the second derivatives of rImm(−, Rn) to the
229
+ second derivative of HZ ∧ rImm(−, Rn). In particular, it follows that the connectivity of the
230
+ quadratic layers of the Taylor towers of rImm(−, Rn) and of HZ ∧ rImm(−, Rn) is the same,
231
+ and their first non-trivial homotopy groups are isomorphic.
232
+ By contrast, at degrees higher than 2, the layers of the homotopical tower rImm(−, Rn) and of
233
+ the homological tower of the functor HZ ∧ rImm(−, Rn) have different connectivities, and there
234
+ is no Hurewicz type isomorphism between them.
235
+ And again by contrast, in Section 9 we show that for r > 2 the map h in diagram (3) induces
236
+ a Hurewicz type isomorphism between first non-trivial homotopy groups of layers roughly up to
237
+ degree 2r − 1. See Theorem 9.1 for precise statement.
238
+ Organization of the paper. In Section 2 we review some background material on cubical diagrams,
239
+ manifold calculus and spectra. In Section 3 we introduce the homological Taylor tower that is
240
+ the main subject of this paper.
241
+ In Section 4 we make an excursion into the subspace arrangements. We describe r-configuration
242
+ spaces via subspace arrangements and compute their cohomology using the Goresky-MacPherson
243
+ theorem.
244
+ In Section 5 we define the notion of a retractive cubical diagram. This is a diagram where the
245
+ maps have sections that satisfy a certain hypothesis. We prove that the homotopy groups of
246
+ the total homotopy fiber of a retractive cube are isomorphic to the total kernel of the cube of
247
+ homotopy groups.
248
+ In Section 6 we prove that the cube of r-configuration spaces that controls the layers in the Taylor
249
+ tower is retractive. In Section 7 we prove our main result about the homological connectivity
250
+ of the cube of r-configuration spaces. In Section 8 we prove the main result about the intrinsic
251
+ convergence of the Taylor tower of HZ ∧ rImm(M, Rn).
252
+ In Section 9 we compare the tower of HZ ∧ rImm(M, Rn) with the tower of rImm(M, Rn) in
253
+ low degrees. We prove that the layers in the two towers have the same connectivity up to degree
254
+ 2r − 1 (with some exceptions in the cases r = 2, 3).
255
+ In Section 10 we discuss some possible directions for further exploration.
256
+ 2. Prerequisites
257
+ 2.1. Cubical diagrams. Cubical diagrams play an important role in functor calculus, and in this
258
+ paper in particular, so we will recall a few elementary facts about them. All the results in this
259
+ subsection, and much more, can be found in [Goo92].
260
+ Let k denote the standard set with k elements {1, . . . , k}. Let P(k), or just P(k), denote the
261
+ poset of subsets of k. A k-dimensional cubical diagram in a category C is a functor χ: P → C.
262
+ It is easy to see that P(k) is equivalent to P(k)op, so a contravariant functor from P(k) to C is
263
+ called a cubical diagram as well. We will mostly consider cubical diagrams in (pointed) spaces
264
+ and spectra, and also in abelian groups.
265
+ 5
266
+
267
+ Given a cubical diagram χ in topological spaces or spectra, there is a natural map
268
+ iχ : χ(∅) → holim
269
+ ∅̸=S⊂k χ(S).
270
+ We say that χ is c-cartesian, if this map is c-connected. The homotopy fiber of this map is called
271
+ the total homotopy fiber of χ. The total homotopy fiber of χ is denoted by tfiber(χ). Clearly if
272
+ χ is c-cartesian then tfiber(χ) is c−1-connected. The converse always holds for cubical diagrams
273
+ of spectra, and it holds for spaces under the additional assumption that iχ is surjective on path
274
+ components.
275
+ One can identify a k-dimensional cubical diagram with a map of two k − 1-dimensional cubical
276
+ diagrams. Given a k-dimensional cubical diagram χ, let us define two k − 1-dimensional cubical
277
+ diagrams χ1 and χ2 as follows: χ1(U) = χ(U), and χ2(U) = χ(U ∪ {k}). Then χ can be
278
+ identified with the map of cubes χ1 → χ2. Furthermore, there is a homotopy fibration sequence
279
+ whose meaning is that total homotopy fiber can be calculated as an iterated homotopy fiber
280
+ tfiber(χ) ≃ hofiber(tfiber(χ1) → tfiber(χ2)).
281
+ When χ is a cubical diagram of abelian groups, we de��ne the total kernel of χ to be
282
+ tkernel(χ) := ker(χ(∅) →
283
+ k
284
+
285
+ i=1
286
+ χ({i})).
287
+ Just as with total fibers, the total kernel can be calculated as an iterated kernel. There is a
288
+ natural isomorphism
289
+ tkernel(χ) ∼= ker(tkernel(χ1) → tkernel(χ2)).
290
+ When χ is a cubical diagram of spaces or spectra, there is a natural homomorphism of graded
291
+ groups
292
+ π∗(tfiber χ) → tkernel(π∗χ).
293
+ This homomorphism is not an isomorphism in general. In Section 5 we will investigate a condition
294
+ on a cubical diagram that guarantees for it to be an isomorphism.
295
+ 2.2. Manifold calculus of functors. Let M be a smooth manifold of dimension m. Define
296
+ O(M) to be the poset category of open subsets of M. Objects of O(M) are open sets U ⊆ M,
297
+ and morphisms U → V are the inclusions U ⊆ V .
298
+ Manifold calculus of functors, developed by Weiss [Wei99] and Goodwillie-Weiss [GW99], studies
299
+ contravariant functors from O(M) to a category that supports a reasonable notion of homo-
300
+ topy. In their foundational papers, Goodwillie and Weiss only considered functors with values in
301
+ topological spaces, and maybe spectra. Nowadays it is natural to let the target category to be
302
+ an ∞-category. We will content ourselves with functors with values in (pointed) spaces and in
303
+ spectra.
304
+ Technically speaking, manifold calculus applies to functors that are good, in the sense that they
305
+ satisfy the following two conditions:
306
+ (i) they are isotopy functors, and
307
+ (ii) they are finitary.
308
+ A functor is an isotopy functor if it takes isotopy equivalences to weak homotopy equivalences
309
+ (for the definition of isotopy equivalence see [MV15, Definition 10.2.2]). It is finitary if for every
310
+ 6
311
+
312
+ monotone union �
313
+ i Ui (where Ui ⊂ Ui+1 for i = 1, 2, ...) the canonical map from F(�
314
+ i Ui) to
315
+ holimi F(Ui) is a weak homotopy equivalence.
316
+ If F is a ”half-good” contravariant functor (cofunctor), i.e. an isotopy functor which is not a
317
+ finitary functor, then we need to tame this functor. We call V ∈ O(M) tame if V is the interior
318
+ of a compact smooth codimension zero submanifold of M. As mentioned in [GKW01], property
319
+ (ii) ensures that a good cofunctor F on O(M) is essentially determined by its behavior on tame
320
+ open subsets of M.
321
+ In particular, suppose F is a cofunctor from O(M) to Top having property (i). Then the functor
322
+ defined by
323
+ F #(V ) := holimtame U⊂V F(U)
324
+ for V ∈ O(M) has also property (ii), i.e. F # is a good cofunctor on O(M). We call F # the
325
+ taming of F.
326
+ There exists a natural transformation F → F #. The map F(V ) → F #(V ) is an equivalence
327
+ whenever either F or V is tame.
328
+ The motivating example for the development of the manifold calculus of functors is the embedding
329
+ functor.
330
+ Definition 2.1. (Space of embeddings) Let M and N be smooth manifolds.
331
+ • A smooth embedding of M in N is a smooth map f : M → N such that
332
+ 1. the map of tangent spaces
333
+ Dxf : TxM → Tf(x)N
334
+ is an injection for all x ∈ M, i.e. the derivative of f is a fiberwise injection, and
335
+ 2. f : M → f(M) is a homeomorphism.
336
+ • The space of embeddings, Emb(M, N), is the subspace of the space of smooth maps
337
+ from M to N consisting of smooth embeddings of M in N. The space Emb(M, N) is
338
+ topologized using Whitney C∞-topology; for an explanation see [MV15, Appendix A.2.2]).
339
+ An important example of a space of embeddings with very rich theory is the space of classical
340
+ knots defined to be the space Emb(S1, R3).
341
+ Definition 2.2. (Embedding functor)
342
+ For a smooth n-dimensional manifold N, the embedding functor Emb(−, N) : O(M) → Top is
343
+ a contravariant functor given by U �→ Emb(U, N).
344
+ The contravariance follows from the fact that an inclusion of open subsets of a manifold M gives
345
+ a restriction map of embedding spaces of manifolds.
346
+ A related notion is the space of immersions Imm(M, N), which is a space of smooth maps
347
+ f : M → N such that just the derivative of f is a fiberwise injection, (property 1.
348
+ from
349
+ Definition 2.1). If M is a compact manifold and f is an injective immersion M → N, then f is
350
+ an embedding.
351
+ The corresponding functor is the immersion functor Imm(−, N) : O(M) → Top given by
352
+ U �→ Imm(U, N).
353
+ Functors Emb(−, N) and Imm(−, N) are examples of good functors (see [Wei99] and [GKW01]).
354
+ 7
355
+
356
+ The idea of the manifold calculus of functors is to approximate a good functor with simpler,
357
+ polynomial functors.
358
+ Definition 2.3. (Polynomial functor)
359
+ A good contravariant functor F : O(M) → Top is called polynomial of degree ≤ k if for all
360
+ U ∈ O(M) and for all pairwise disjoint closed subsets A0, ..., Ak ⊂ U, the (k + 1)-cube
361
+ P(k + 1) → Top
362
+ S �→ F(U −
363
+
364
+ i∈S
365
+ Ai)
366
+ is homotopy cartesian; equivalently, the map F(U) → holimS̸=∅ F(U − �
367
+ i∈S Ai) is a homotopy
368
+ equivalence. Here P(k + 1) is the poset category of all subsets of the set k + 1 = {1, ..., k + 1}
369
+ with ⊂ as the relation of partial order. Its shape is an (k + 1)-dimensional cubical diagram.
370
+ It is well known that a polynomial f : R → R of degree k such that f(0) = 0 is uniquely
371
+ determined by its values on k distinct points. In analogy, a polynomial functor is completely
372
+ determined by its values on the category of at most k open discs.
373
+ [Mun10] provides more
374
+ analogies between the ordinary calculus of functions and the manifold calculus of functors.
375
+ More precisely, let Ok(M) be the full subcategory of M consisting of open subsets of M diffeo-
376
+ morphic to ≤ k disjoint discs. We have the following theorem due to Weiss ([Wei99, Theorem
377
+ 5.1]).
378
+ Theorem 2.4. Suppose F, G : O(M) −→ Top are good functors that are polynomials of degree
379
+ ≤ k. If T : F → G is a natural transformation that is an equivalence for all U ∈ Ok(M), then
380
+ T is an equivalence for all U ∈ O(M).
381
+ Example 2.5.
382
+ • The functor U �→ Imm(U, N) is a polynomial of degree ≤ 1.
383
+ • The functor U �→ Emb(U, N) is not a polynomial of degree ≤ k for any k.
384
+ For the details, see [MV15, Example 10.2.10], [Wei99, Example 2.3], [Mun10, Examples 4.7 and
385
+ 4.8].
386
+ Definition 2.6. (Polynomial approximations)
387
+ For a good functor F, define for each U ∈ O(M) the kth polynomial approximation of F to be
388
+ TkF(U) = holimV ∈Ok(U) F(V ).
389
+ As Weiss proved in [Wei99, Theorems 3.9. and 6.1], such defined TkF is polynomial of degree
390
+ ≤ k. Also, higher derivatives of such defined polynomial functors vanish and derivatives of a
391
+ functor and derivatives of its kth polynomial approximation agree up to kth degree, where the
392
+ derivatives of functors are defined as follows:
393
+ Definition 2.7. (Derivative of a functor)
394
+ Let Dm
395
+ 1 , ..., Dm
396
+ k be pairwise disjoint open discs in M. Define a k-cube of spaces by the rule
397
+ S �→ F(�
398
+ i/∈S Dm
399
+ i ). We define the kth derivative of F at the empty set, denoted F (k)(∅), to be
400
+ the total homotopy fiber of the cube S �→ F(�
401
+ i/∈S Dm
402
+ i ).
403
+ 8
404
+
405
+ For example, the 1st derivative of embeddings are immersions. Also, the linearization of the space
406
+ of embeddings is the space of immersions, namely there exists an equivalence T1 Emb(−, N) ≃
407
+ Imm(−, N) ([Wei99]).
408
+ For more details and intuition behind this, see Munson’s survey [Mun10]. For other relevant
409
+ results, see [MV15, Theorem 10.2.16] and [Wei99].
410
+ The inclusion Ok−1(U) → Ok(U) induces a map TkF(U) → Tk−1F(U) and so we obtain a tower
411
+ of functors, called the manifold calculus Taylor tower of F:
412
+ (4)
413
+ F(−)
414
+ �❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥
415
+
416
+ �▼
417
+
418
+
419
+
420
+
421
+
422
+
423
+
424
+
425
+
426
+ �❳
427
+
428
+
429
+
430
+
431
+
432
+
433
+
434
+
435
+
436
+
437
+
438
+
439
+
440
+
441
+
442
+
443
+
444
+
445
+
446
+
447
+
448
+
449
+
450
+
451
+
452
+
453
+
454
+
455
+
456
+
457
+ T0F(−)
458
+ · · ·
459
+
460
+ Tk−1F(−)
461
+
462
+ TkF(−)
463
+
464
+ · · ·
465
+
466
+ T∞F(−)
467
+
468
+ Here T∞F denotes the homotopy inverse limit of this tower. TkF is also called the kth stage of
469
+ the Tower.
470
+ By evaluating diagram (4) on U ∈ O(M), we get a diagram of spaces with maps between the
471
+ stages that are fibrations. In particular, we can set U = M.
472
+ Definition 2.8. (Layer)
473
+ Define the kth layer of the manifold calculus Taylor tower of F to be the homotopy fiber of the
474
+ map between two successive stages of the tower, that is,
475
+ LkF = hofiber(TkF → Tk−1F).
476
+ We need to work here with a based Taylor tower. It can be accomplished by choosing a basepoint
477
+ in the space F(M) which then also bases the spaces TkF(U) for all k and U.
478
+ One of the fundamental results, which is a consequence of the Classification of homogeneous
479
+ functors theorem ([Wei99, Theorem 8.5], see also [MV15, Theorem 10.2.23 and Proposition
480
+ 10.2.26]) is the following
481
+ Proposition 2.9. For a good functor F defined on m-dimensional manifolds, if the cube
482
+ S �→ F
483
+
484
+ �
485
+ k\S
486
+ Dm
487
+
488
+
489
+ is ck-cartesian, then the map TkF(M) → Tk−1F(M) is ck − km-connected. More generally, if
490
+ U has handle dimension j, then the map TkF(U) → Tk−1F(U) is (ck − kj)-connected.
491
+ For the definition of handle dimension, see [MV15, Appendix A.2.1].
492
+ It follows that the Taylor tower of F converges intrinsically at M if the number ck−mk approaches
493
+ ∞ as k approaches ∞.
494
+ 2.3. Spectra. The subject of this paper is a functor that represents homology. We had a choice
495
+ between working with chain complexes and the singular chains functor, or working with spectra
496
+ and using smash product with the Eilenberg-MacLane spectrum to represent homology. We chose
497
+ the latter.
498
+ 9
499
+
500
+ We adopt a naive, old-fashioned view of spectra as sequences of spaces equipped with structure
501
+ maps between them.
502
+ Definition 2.10. (Spectrum)
503
+ A spectrum E is a sequence of based spaces {En}n∈N0 together with basepoint-preserving maps
504
+ (called structure maps)
505
+ (5)
506
+ ΣEn → En+1,
507
+ or, equivalently, the maps
508
+ (6)
509
+ En → ΩEn+1,
510
+ where Σ and Ω denote suspension and loop space, respectively.
511
+ If the maps (6) are weak equivalences, then E is called an Ω-spectrum.
512
+ Each En from an
513
+ Ω-spectrum is called an infinite loop space.
514
+ Example 2.11. (Eilenberg-MacLane spectrum)
515
+ Let n be an arbitrary positive integer and G be an arbitrary group, abelian for n > 1. Then there
516
+ exists a CW complex X such that
517
+ (7)
518
+ πn(X) ∼= G and πk(X) is trivial for k ̸= n.
519
+ A topological space X with property (7) is called an Eilenberg-MacLane space K(G, n). For
520
+ example, K(Z, 1) ≃ S1.
521
+ For an abelian group G, the Eilenberg-MacLane spectrum, denoted by HG, is defined to be the
522
+ spectrum {En}n∈N0 with En = K(G, n + 1) and maps
523
+ (8)
524
+ K(G, n + 1) → ΩK(G, n + 2).
525
+ The maps (8) are weak equivalences, hence HG is an Ω-spectrum.
526
+ Since for a spectrum E there exist maps
527
+ πi+n(En) → πi+n+1(En+1)
528
+ (for details, see [Hat02, Section 4.F]), it makes sense to define the ith homotopy group of the
529
+ spectrum E as
530
+ πi(E) = colimn πi+n(En).
531
+ Definition 2.12. A map of spectra f : E → F is a collection of maps
532
+ fn : En → Fn, n ≥ 0
533
+ that commute with the structure maps in E = {En} and F = {Fn}.
534
+ Taking spectra as objects and maps of spectra as morphisms we can define the category of
535
+ spectra. It is denoted by Spectra.
536
+ A spectrum can be smashed with a pointed space.
537
+ Definition 2.13. Let E = {En} be a spectrum and X be a based space. The spectrum E ∧ X
538
+ is defined by
539
+ (E ∧ X)n = En ∧ X.
540
+ 10
541
+
542
+ Since Σ(En ∧ X) ∼= (ΣEn) ∧ X, the structure maps in the spectrum E ∧ X are the products of
543
+ structure maps in E and the identity map. For a spectrum E∧X the homotopy groups πi(E∧X)
544
+ are the groups colimn πi+n(En∧X). These groups define a generalized reduced homology theory,
545
+ determined by E.
546
+ The following result is a consequence of Proposition 4F.2 in [Hat02]. See also [Whi62] for more
547
+ details on representing generalized homology theories with spectra.
548
+ Proposition 2.14. For the Eilenberg-MacLane spectrum HZ there exists an isomorphism
549
+ πi(X ∧ HZ) ∼= �Hi(X; Z).
550
+ If a spectrum E = {En}n≥0 is an Ω-spectrum, then πn(E) is
551
+ πn(E) =
552
+
553
+ πn(E0),
554
+ for n ≥ 0
555
+ π0(E−n),
556
+ for n ≤ 0
557
+ Let us note that smash product with a spectrum can be extended from pointed to unpointed
558
+ spaces.
559
+ Definition 2.15. Let E be a spectrum and X an unpointed space. Define the smash product
560
+ of E and X to be the homotopy fiber of the map
561
+ E ∧ X+ → E
562
+ induced by the canonical map X+ → S0.
563
+ For any choice of basepoint in X, there is a canonical equivalence between the new and the old
564
+ definition E ∧ X. But the new definition does not depend on a choice of basepoint. This is a
565
+ variant of the fact that reduced homology can be defined as relative homology to a basepoint,
566
+ but also can be defined independently of basepoint, using the augmented chain complex.
567
+ However, it is also important to note that without a choice of basepoint in X, there is no natural
568
+ map X → Ω∞HZ ∧ X representing the Hurewicz homomorphism. Such a map is defined only
569
+ with a choice of basepoint.
570
+ We can assume that each spectrum is an Ω-spectrum up to weak equivalence. Precisely, the
571
+ following result holds.
572
+ Proposition 2.16. Every spectrum is weakly equivalent to an Ω-spectrum.
573
+ If two spectra E and F are weak equivalent, we write E ≃ F.
574
+ Operation Σ∞ which assigns to a based space X its suspension spectrum Σ∞X, defined by
575
+ En = ΣnX with identities as structure maps, is a functor
576
+ Σ∞ : Top∗ → Spectra.
577
+ Its adjoint functor
578
+ Ω∞ : Spectra → Top∗
579
+ is defined to be the functor which takes a spectrum E = {En}n≥0, then replaces it by an
580
+ equivalent Ω-spectrum F = {Fn}n≥0 (which exists using proposition 2.16) and finally picks off
581
+ the first place F0. In short, Ω∞(E) = F0 where F = {Fn}n≥0 ≃ E. This F0 is an infinite loop
582
+ space, which explains the notation.
583
+ 11
584
+
585
+ It follows from the results and comments above that nth homotopy group of a spectrum E equals
586
+ the nth homotopy group of the space Ω∞(E).
587
+ Finally, let us mention that in addition to the smash product of a spectrum with a space, there is
588
+ a very important notion of smash product of spectra. For our purposes, the most naive version
589
+ of the construction suffices. Given two spectra E = {En} and F = {Fn}, we define their smash
590
+ product E ∧ F by the formulas (E ∧ F)2n = En ∧ Fn, and (E ∧ F)2n+1 = En+1 ∧ Fn, with
591
+ the structure maps being induced from the structure maps in E and F in the obvious way. The
592
+ sphere spectrum is the unit (up to homotopy) for this smash product.
593
+ One feature of smash product of spectra that plays a role in this paper is that unlike smash
594
+ product of spaces, smash product with a fixed spectrum commutes with finite homotopy limits
595
+ of spectra. More generally, it commutes with homotopy limits over a category whose classifying
596
+ space is compact. This is discussed in some detail in [LRV03]. The significance for us is that
597
+ if F is a good presheaf of spectra on M, and E is a fixed spectrum, then there are natural
598
+ equivalences
599
+ E ∧ TkF ≃ TkE ∧ F
600
+ and
601
+ E ∧ LkF ≃ LkE ∧ F.
602
+ 3. The homological Taylor tower for reduced r-immersions in Rn
603
+ The main goal of this paper is to give a convergence result about the homological Taylor tower
604
+ for the space of r-immersions of a smooth manifold M in Rn. As is often the case, when studying
605
+ the homological tower, it is convenient to replace the functor of r-immersions by r-immersions
606
+ ��modulo immersions”. This enables us to express the layers in the Taylor tower in terms of
607
+ r-configuration spaces.
608
+ Let M be a smooth manifold. Assume that a basepoint in the space Imm(M, Rn) is chosen, and
609
+ therefore the functor U �→ Imm(U, Rn) is a presheaf of pointed spaces on M. Recall that for
610
+ U ⊂ M, rImm(U, Rn) denotes the homotopy fiber of the map rImm(U, Rn) → Imm(U, Rn).
611
+ Let HZ denote the Eilenberg-Mac Lane spectrum. The functor
612
+ X �→ HZ ∧ X
613
+ represents reduced homology, in the sense that there is a natural isomorphism
614
+ (9)
615
+ π∗(HZ ∧ X) ∼= �H∗(X; Z).
616
+ Furthermore, recall that the functor can be extended to unpointed spaces, by defining HZ ∧ X
617
+ for unpointed X to be the homotopy fiber of the map HZ ∧ X+ → HZ. In this paper we study
618
+ the following functor
619
+ HZ ∧ rImm(−, Rn):
620
+ O(M)
621
+
622
+ Spectra
623
+ U
624
+ �→
625
+ HZ ∧ rImm(U, Rn)
626
+ This functor is representing the homology of rImm(−, Rn).
627
+ 12
628
+
629
+ Remark 3.1. Instead of using spectra and the functor HZ ∧ − to represent homology, we could
630
+ have used chain complexes and the singular chains functor. One reason for choosing spectra is
631
+ their topological nature. The category of spectra, and of HZ-module spectra, is tensored and
632
+ cotensored over topological spaces, while the category of chain complexes is not. Of course,
633
+ this is a minor technical issue that can be overcome, but anyway it was one reason for us to
634
+ work with HZ-modules rather than chain complexes. Another reason is that working with HZ-
635
+ modules readily points to generalizations. In particular, most of our results about the functor
636
+ HZ ∧ rImm(−, Rn) can be extended to the functor Σ∞rImm(−, Rn), which in turn can be used
637
+ to obtain information about the unstable Taylor tower of rImm(−, Rn).
638
+ Remark 3.2. In [GKW01] and [Wei04], Goodwillie, Weiss and Klein point out that for a con-
639
+ travariant functor F : O(M) → Top, the cofunctor λJF given by
640
+ U �→ F(U)+ ∧ J
641
+ for a fixed spectrum J is only ”half-good”, even if F is good. Namely, it is an isotopy functor
642
+ but it fails to be finitary. As mentioned in Section 2.2, to fix this they suggest to use the taming
643
+ of λJF. We will denote the taming of a functor such as λJF by λJF #. The functor λJF # is
644
+ a good cofunctor, and there is a natural transformation λJF → λJF #, which is an equivalence
645
+ when evaluated on a tame subset of M, where by a tame subset we mean an open subset which
646
+ is diffeomorphic to the interior of a compact manifold with boundary. From now on, whenever
647
+ we write HZ ∧ rImm(−, Rn) we really mean the taming of this functor. In practice it makes no
648
+ difference since we only are interested in evaluating our functors on tame manifolds.
649
+ So we need to figure out the connectivity of the kth layer of the Taylor tower for the space
650
+ HZ∧rImm(M, Rn). By Proposition 2.9, this is determined by the homotopy fiber of the cubical
651
+ diagram, indexed by subsets of {1, . . . , k},
652
+ S �→ HZ ∧ rImm
653
+
654
+ �
655
+ k\S
656
+ Dm, Rn
657
+
658
+  .
659
+ There is a natural map rImm(�
660
+ k\S Dm, Rn) → rConf(k \ S, Rn), which is the composition of
661
+ the natural map into rImm(�
662
+ k\S Dm, Rn), followed by evaluation at the centers of the discs.
663
+ By the main result of [AˇS22], this map is an equivalence. It follows that the connectivity of the
664
+ layers of HZ ∧ rImm(M, Rn) is determined by the connectivity of the total fiber of the cubical
665
+ diagram
666
+ S �→ HZ ∧ rConf(k \ S, Rn).
667
+ To analyze the total fiber of this cube, we need to review some facts about the homology of
668
+ r-configuration spaces. This will be done in the next section.
669
+ 4. r-configuration spaces in Rn as complements of subspace arrangements
670
+ We saw in the previous section that the convergence of the Taylor tower of the functor HZ ∧
671
+ rImm(−, Rn) is determined by the homology of r-configuration spaces rConf(k, Rn). These con-
672
+ figuration spaces can be interpreted as the complement of an arrangement of subspaces of (Rn)k.
673
+ The combinatorics and topology (in particular, homology and cohomology) of subspace arrange-
674
+ ments and their complements are well studied. Some of main references are [OS80], [GM80],
675
+ [GM83a], [GM83b], [BEZ90]. In particular, the (co)homology of r-configuration was studied from
676
+ 13
677
+
678
+ this perspective first by Bj¨orner and Welker in [BW95], and by a number of people after that.
679
+ In this section we review a qualitative description of the cohomology of r-configuration spaces,
680
+ based on the Goresky-MacPherson formula. We will also describe the effect on cohomology of
681
+ restriction maps between configuration spaces.
682
+ Recall that an r-configuration space of k points in Rn is defined to be the space
683
+ rConf(k, Rn) = {(v1, ..., vk) ∈ (Rn)k : ∄1 ≤ i1 < · · · < ir ≤ k such that vi1 = ... = vir}.
684
+ The space rConf(k, Rn) is an example of the complement of a subspace arrangement. Let us
685
+ now recall some formal definitions.
686
+ Definition 4.1. Suppose I is an r-tuple of integers I = (i1, . . . , ir), where 1 ≤ i1 < · · · < ir ≤ k.
687
+ Let us denote the set of all such r-tuples by
688
+ �k
689
+ r
690
+
691
+ . De���ne
692
+ AI = {(v1, . . . , vk) ∈ (Rn)k | vi1 = · · · = vir}.
693
+ Let A =
694
+
695
+ AI | I ∈
696
+ �k
697
+ r
698
+ ��
699
+ . When we need to make the set k explicit, we write Ak. More generally,
700
+ for any set T define AT to be the set of “r-equal” diagonals in (Rn)T.
701
+ Note that one can identify rConf(k, Rn) with the complement of the union of the AIs:
702
+ rConf(k, Rn) = (Rn)k \
703
+
704
+ I∈(k
705
+ r)
706
+ AI.
707
+ Example 4.2.
708
+ • If k < r, rConf(k, Rn) ∼= (Rn)k ≃ ∗
709
+ • If k = r, rConf(k, Rn) ∼= (Rn)r − ∆ ≃ S(r−1)n−1, where ∆ is the thin diagonal in (Rn)r
710
+ and S(r−1)n−1 is the sphere of dimension (r − 1)n − 1.
711
+ The collection A of linear subspaces of Rnk is an example of a subspace arrangement. Recall
712
+ that the intersection lattice of A is the poset LA consisting of all the intersections AI1 ∩· · ·∩AIt
713
+ of elements of A, ordered by reverse inclusion. We include in LA the “empty intersection” of
714
+ AIs, which is Rnk. The space Rnk is the minimal element of LA. It will be denoted by ˆ0. The
715
+ maximal element of LA is the intersection of all the AI, which, assuming k ≥ r, is the diagonal
716
+ copy of Rn in Rnk. We denote the maximal elements of LA by ˆ1.
717
+ The poset LA is isomorphic to the poset Πk,r of partitions of {1, . . . , k} whose every block is
718
+ either a singleton or contains at least r elements. We call elements of Πk,r r-equal partitions
719
+ of {1, . . . , k}. The partitions are ordered from finer to coarser. The isomorphism Πk,r → LA
720
+ sends a partition λ of {1, . . . , k} to the space of k-tuples of vectors (v1, . . . , vk) ∈ (Rn)k with
721
+ the property that vi = vj whenever i and j are in the same block of λ. Equivalently, one can
722
+ say that λ is sent to the space of functions from k to Rn that are constant on each block of λ.
723
+ From now on we will identify the posets LA and Πk,r.
724
+ Because LA is a partially ordered set, we can define the open interval (x, y) in LA to be the set
725
+ (x, y) = {z ∈ LA | x < z < y}.
726
+ Definition 4.3. The order complex ∆(x, y) of an open interval (x, y) in LA, is the abstract
727
+ simplicial complex whose vertices are the elements of (x, y) and whose p-simplices are the chains
728
+ x0 < ... < xp in (x, y).
729
+ 14
730
+
731
+ Let �Hi(x, y) denote the ith reduced simplicial homology group of ∆(x, y) with integer coefficients.
732
+ Similarly, �H
733
+ i(x, y) denotes the ith reduced cohomology group of ∆(x, y).
734
+ The (reduced) cohomology groups of the space rConf(k, Rn) = Rnk\�
735
+ I∈(k
736
+ r) AI can be described
737
+ in terms of (reduced) homology groups of the order complex of intervals in the intersection lattice
738
+ of A. This is known as the Goresky-MacPherson formula. For the original proof of the Goresky-
739
+ MacPherson formula by means of stratified Morse theory see [GM88, Part III]. An elementary
740
+ proof was given by Ziegler and ˇZivaljevi´c in [ZˇZ93]. For the original calculation of the cohomology
741
+ rConf(k, Rn) using the Goresky-MacPherson formula see [BW95]. Here is the statement, in the
742
+ case relevant to us.
743
+ Theorem 4.4 (Special case of Goresky-MacPherson formula). There is an isomorphism
744
+ (10)
745
+ �H
746
+ i(rConf(k, Rn)) ∼=
747
+
748
+ x∈L>ˆ0
749
+ A
750
+ �Hcodim(x)−2−i(ˆ0, x)
751
+ Here, the direct sum is indexed by all x ̸= ˆ0 in LA, and codim(x) is the codimension of the space
752
+ x as the subspace of Rnk.
753
+ For each diagonal x ∈ LA, let c(x) denote the number of components of the partition of k which
754
+ determines the diagonal x. Obviously, dimension of x in (Rn)k is dim(x) = n · c(x), so
755
+ (11)
756
+ codim(x) = n(k − c(x)).
757
+ The following easy example of 3-configuration spaces of 4 points illustrates the application of
758
+ formula (10).
759
+ Example 4.5. Let A is the set of all (at least 3)-diagonals in (Rn)4. Then 3 Conf(4, Rn) =
760
+ (Rn)4 − A. The intersection lattice LA of A is pictured in Figure 1. Using Theorem 4.4, we find
761
+ that for every n > 1,
762
+ H0(3 Conf(4, Rn)) ∼= Z,
763
+ H2n−1(3 Conf(4, Rn)) ∼= Z4,
764
+ H3n−2(3 Conf(4, Rn)) ∼= Z3,
765
+ and other cohomology groups are trivial. For n = 1, the formula is still valid, except that in this
766
+ case 2n−1 = 3n−2 = 1, so the two cohomology groups add together. So H0(3 Conf(4, R)) ∼= Z
767
+ and H1(3 Conf(4, R)) ∼= Z7. For n = 1, 2, the cohomology of 3 Conf(4, Rn) can be read off the
768
+ tables at the end of [BW95].
769
+ For the purpose of analysing the layers in the homological Taylor tower for r-immersions it also is
770
+ desirable to know the effect of restriction maps between r-configuration spaces on cohomology.
771
+ Suppose we have a subset T ⊂ {1, . . . , k}. Then we have a restriction map rConf(k, Rn) →
772
+ rConf(T, Rn). We want to describe the induced homomorphism on cohomology, in terms of
773
+ formula (10). The inclusion T ֒→ {1, . . . , k} induces an inclusion of the poset of r-equal partitions
774
+ of T into the poset of r-equal partitions of {1, . . . , k}, by making each element of {1, . . . , k} \ T
775
+ into a singleton. Notice that for every r-equal partition of T, the codimension of the corresponding
776
+ diagonal is the same whether it is considered a diagonal in (Rn)T or in (Rn)k. This is so because
777
+ the codimension of a diagonal determined by a partition is determined by the difference between
778
+ 15
779
+
780
+ (1)(2)(3)(4)
781
+ (1)(2, 3, 4)
782
+ (1, 2, 3, 4)
783
+ (2)(1, 2, 3)
784
+ (3)(1, 2, 4)
785
+ (4)(1, 2, 3)
786
+ Figure 1. Intersection lattice for 3 Conf(4, Rn), also known as Π4,3
787
+ the cardinality of the set and the number of blocks of the partition, by formula (11). This number
788
+ remains unchanged if one adds some singletons to a partition. Thus we have a homomorphism
789
+ (12)
790
+
791
+ x∈L>ˆ0
792
+ AT
793
+ �Hcodim(x)−2−i(ˆ0, x) →
794
+
795
+ x∈L>ˆ0
796
+ Ak
797
+ �Hcodim(x)−2−i(ˆ0, x)
798
+ which is defined by the inclusion L>ˆ0
799
+ AT ֒→ L>ˆ0
800
+ Ak, and uses the fact that for every x ∈ L>ˆ0
801
+ AT , the
802
+ number codim(x) is the same whether x is considered an element of L>ˆ0
803
+ AT or of L>ˆ0
804
+ Ak.
805
+ Lemma 4.6. The homomorphism �H
806
+ i(rConf(T, Rn)) → �H
807
+ i(rConf(k, Rn)) corresponds, under
808
+ the isomorphism (10), to the homomorphism (12) that we just described.
809
+ Proof. This follows easily from the fact that the Goresky-MacPherson formula is natural with
810
+ respect to inclusions of subarrangements [Hu94, Corollary 2.1]
811
+
812
+ 5. Total fiber of a retractive cubical diagram
813
+ In general homotopy groups do not commute with total homotopy fibers of cubical diagrams.
814
+ In this section we will show that for a class of cubes that we call retractive they do commute.
815
+ More precisely, we show that for retractive cubes, the homotopy groups of the total fiber are
816
+ canonically isomorphic to the total kernel of the cube of homotopy groups.
817
+ Suppose we have a two-dimensional cubical diagram of spaces or spectra
818
+ (13)
819
+ E∅
820
+ i∅,1 �
821
+ i∅,2
822
+
823
+ E1
824
+ i1,12
825
+
826
+ E2
827
+ i2,12
828
+ � E12
829
+ 16
830
+
831
+ Suppose that all the maps in the square (13) have homotopy sections, so that the square of
832
+ sections
833
+ E12
834
+ s12,1 �
835
+ s12,2
836
+
837
+ E1
838
+ s1,∅
839
+
840
+ E2
841
+ s2,∅
842
+ � E0
843
+ commutes up to homotopy, and so that the following mixed square
844
+ E2
845
+ i2,12 �
846
+ s2,∅
847
+
848
+ E12
849
+ s12,1
850
+
851
+ E0
852
+ i∅,1
853
+ � E1
854
+ also commutes up to homotopy. Note that the vertical maps in the mixed square are sections,
855
+ while the horizontal maps are from the original square.
856
+ Let us call a square (13) with such sections a retractive square.
857
+ More generally, let us define a retractive cubical diagram as follows.
858
+ Definition 5.1. Let χ be a k-dimensional cubical diagram. We say that χ is retractive if for
859
+ every U ⊂ {1, . . . , k} and every i /∈ U, the map χ(U) → χ(U ∪ {i}) has a homotopy section,
860
+ the cube of sections commutes up to homotopy, and furthermore whenever U ⊂ {1, . . . , k}, and
861
+ i, j ∈ {1, . . . , k} \ U, with i < j, the following mixed square commutes up to homotopy
862
+ χ(U ∪ {j})
863
+
864
+
865
+ χ(U ∪ {i, j})
866
+
867
+ χ(U)
868
+ � χ(U ∪ {i})
869
+ .
870
+ Lemma 5.2. Let χ be a retractive k-dimensional cubical diagram of spectra. Let E∗ be any
871
+ homology theory, and let E∗ be a cohomology theory. Then E∗(tfiber χ) (resp. E∗(tfiber χ)) is a
872
+ direct summand of E∗(χ(∅)) (resp. of E∗(χ(∅))). Moreover, the following natural homomorphism
873
+ is an isomorphism:
874
+ E∗(tfiber χ)
875
+
876
+ =−→ tkernel (E∗χ) .
877
+ Similarly, there is a natural isomorphism
878
+ tcokernel(E∗χ)
879
+
880
+ =−→ E∗(tfiber χ).
881
+ Proof. We will prove the claim for homology. The proof of the cohomological statement is the
882
+ same, reversing all arrows. The proof is by induction on k, starting with with the case k = 1,
883
+ which is elementary and well-known. Let us review it anyway. A retractive 1-dimensional cube
884
+ is a map χ(∅) → χ(1), together with a homotopy section χ(1) → χ(∅). The total fiber of
885
+ the cube is the homotopy fiber of the map χ(∅) → χ(1). By homotopy section we mean that
886
+ the composition χ(1) → χ(∅) → χ(1) is a weak equivalence. It follows that the composition
887
+ E∗χ(1) → E∗χ(∅) → E∗χ(1) is an isomorphism. From here it readily follows that the long
888
+ exact sequence in E∗ associated with the fibration sequence tfiber χ → χ(∅) → χ(1) splits as a
889
+ 17
890
+
891
+ direct sum of split short exact sequences in each degree. Furthermore it readily follows that the
892
+ following homomorphisms are isomorphisms
893
+ E∗ tfiber χ
894
+
895
+ =−→ ker (E∗χ(∅) → E∗χ(1))
896
+
897
+ =−→ coker (E∗χ(1) → E∗(χ(∅))) .
898
+ Now suppose the lemma holds for cubes of dimension less than k and let χ be a retractive
899
+ cube of dimension k. Let χ1 and χ2 be k − 1-dimensional cubes defined by χ1(U) = χ(U)
900
+ and χ2(U) = χ(U ∪ {k}). Then χ can be identified with the natural map of cubes χ1 → χ2.
901
+ The cubes χ1 and χ2 are retractive, so by induction hypothesis, the lemma holds for them. The
902
+ retractions do not quite define a map of cubes χ2 → χ1, because we only assumed that the mixed
903
+ squares commute up to homotopy. But they do define a homomorphism of cubes E∗χ2 → E∗χ1,
904
+ which is a section of the homomorphism of cubes E∗χ1 → E∗χ2. We have the following diagram
905
+ E∗ tfiber χ
906
+ E∗ tfiber χ1
907
+ E∗ tfiber χ2
908
+ tkernel E∗χ2
909
+ tkernel E∗χ1
910
+ tkernel E∗χ2
911
+
912
+ =
913
+
914
+ =
915
+
916
+ =
917
+ The top row is induced by applying E∗ to a fibration sequence of spectra. The vertical homomor-
918
+ phisms are isomorphisms by induction hypothesis. It follows that the upper right homomorphism
919
+ is a split surjection, and the top row is a split short exact sequence in each dimension. Fur-
920
+ thermore, E∗ tfiber χ maps isomorphically onto the kernel of the bottom right map, which is
921
+ tkernel E∗χ.
922
+
923
+ 6. The cube of r-configuration spaces is retractive
924
+ Lemma 6.1. The k-cube of spaces
925
+ S �→ rConf(k \ S, Rn)
926
+ is retractive for n ≥ 2.
927
+ Proof. Let T be a finite set and suppose x /∈ T. Our first step it to construct a section to the
928
+ restriction map
929
+ rT∪{x},T : rConf(T ∪ {x}, Rn) → rConf(T, Rn).
930
+ Let p1: Rn → R be projection onto the first coordinate. Define a map
931
+ sT,T∪{x}: rConf(T, Rn) → rConf(T ∪ {x}, Rn)
932
+ as follows. An element of rConf(T, Rn) is a function f : T → Rn with the property that no r
933
+ points of T go to the same point. Extend f to a function from T ∪ {x} by sending x to
934
+ (max{p1f(t) | t ∈ T} + 1, 0, . . . , 0).
935
+ In words, x is sent to the point of Rn whose first coordinate is one more than the maximal
936
+ first coordinate of the existing points, and all other coordinates are zero. It is clear that the
937
+ image of x is different from all the other points in the configuration.
938
+ Thus if f was an r-
939
+ immersion, then the resulting map T ∪ {x} → Rn is still an r-immersion. We have defined a
940
+ 18
941
+
942
+ map sT,T∪{x}: rConf(T, Rn) → rConf(T ∪ {x}, Rn). It is clear that the following composition
943
+ is the identity (not even just homotopic to the identity but is the actual identity map)
944
+ rConf(T, Rn)
945
+ sT,T ∪{x}
946
+ −−−−−→ rConf(T ∪ {x}, Rn)
947
+ rT ∪{x},T
948
+ −−−−−→ rConf(T, Rn).
949
+ It follows that sT,T∪{x} is a section of rT∪{x},T. Next, we need to show that whenever x, y /∈ T,
950
+ the following diagram commutes up to homotopy
951
+ rConf(T, Rn)
952
+
953
+
954
+ rConf(T ∪ {x}, Rn)
955
+
956
+ rConf(T ∪ {y}, Rn)
957
+ � rConf(T ∪ {x, y}, Rn)
958
+ It is for this step that we need to assume n ≥ 2.
959
+ Let f : T → Rn represent an element
960
+ of rConf(T, Rn). The images of f in rConf(T ∪ {x, y}, Rn) under the two ways around the
961
+ diagram are two extensions of f from T to T ∪ {x, y}.
962
+ One of the extensions sends x to
963
+ (max{p1f(t) | t ∈ T} + 1, 0, . . . , 0), and sends y to (max{p1f(t) | t ∈ T} + 2, 0, . . . , 0). The
964
+ other extension does the same thing, with x and y switched. It is clear that one can write a
965
+ homotopy between the two maps, by swapping the images of x and y along a circle in the plane
966
+ spanned by the first two coordinates of Rn.
967
+ Finally we need to check that the following mixed square commutes up to homotopy
968
+ rConf(T ∪ {x}, Rn)
969
+
970
+
971
+ rConf(T, Rn)
972
+
973
+ rConf(T ∪ {x, y}, Rn)
974
+ � rConf(T ∪ {y}, Rn)
975
+ .
976
+ This, too, is clear. In fact, it is easy to check that there is a well-defined straight line homotopy
977
+ between the two maps around the square.
978
+ We have shown that the section maps that we have defined make the cube of r-configuration
979
+ spaces and restriction maps between them into a retractive cube.
980
+
981
+ 7. Connectivity of the cube of (co)homologies of r-configuration spaces
982
+ We have seen that the cube of spaces S �→ rConf(k \ S, Rn), where S ranges over the subsets
983
+ of {1, . . . , k} is retractive (Lemma 6.1). It follows that the cube of spectra obtained by applying
984
+ the suspension spectrum functor to it, i.e., the cube
985
+ (14)
986
+ S �→ Σ∞ rConf(k \ S, Rn),
987
+ is also retractive.
988
+ Our goal is to analyse how cartesian is the cube S �→ HZ∧Σ∞ rConf(k\S, Rn). Smash product
989
+ commutes with total fibers of cubical diagrams of spectra. Therefore, the answer is the same
990
+ as for the cubical diagram (14). However, we want to use the description of the cohomology
991
+ of r-configuration spaces given by the Goresky-MacPherson formula. The following lemma says
992
+ that the homology and cohomology groups of the relevant spectrum are isomorphic.
993
+ Lemma 7.1. The homology and cohomology groups of the total fiber of (14) are (non-canonically)
994
+ isomorphic.
995
+ 19
996
+
997
+ Proof. It is known, for example by the results of [BW95], that the homology groups of the space
998
+ rConf(k, Rn), and therefore also of the suspension spectrum of this space, are finitely generated
999
+ free abelian groups. Since the cube Σ∞ rConf(k \ S, Rn) is retractive, it follows by Lemma 5.2
1000
+ that the homology of the total fiber of the cube Σ∞ rConf(k \ S, Rn) is a direct summand of
1001
+ the homology of Σ∞ rConf(k, Rn). Therefore, the homology groups of the total fiber are also
1002
+ finitely generated free abelian groups. Therefore they are isomorphic to the cohomology groups
1003
+ of the total fiber, by the universal coefficients theorem.
1004
+
1005
+ It follows that the homological connectivity of the total fiber of (14) is equivalent to the coho-
1006
+ mological connectivity. Next, we give a qualitative description of the cohomology of the total
1007
+ fiber, in the style of Theorem 4.4.
1008
+ Let Π≥r(k) denote the set partitions of k with the property that each component has at least r
1009
+ elements (i.e., elements of Πk,r without singletons).
1010
+ Lemma 7.2. The i-th cohomology group of the total fiber of the cube (14) is isomorphic to the
1011
+ following direct sum:
1012
+ (15)
1013
+
1014
+ x∈Π≥r(k)
1015
+ �Hcodim (x)−2−i(ˆ0, x)
1016
+ Proof. The cube (14) is retractive. Using the cohomological part of Lemma 5.2, we conclude
1017
+ that the i-th cohomology of the total fiber is isomorphic to the cokernel of the homomorphism
1018
+ k
1019
+
1020
+ i=1
1021
+ �H
1022
+ i rConf(k \ {i}, Rn) → �H
1023
+ i rConf(k, Rn).
1024
+ By Lemma 4.6, this homomorphism can be identified with the following homomorphism
1025
+ (16)
1026
+ k
1027
+
1028
+ i=1
1029
+
1030
+ x∈L>ˆ0
1031
+ Ak\{i}
1032
+ �Hcodim(x)−2−i(ˆ0, x) →
1033
+
1034
+ x∈L>ˆ0
1035
+ Ak
1036
+ �Hcodim(x)−2−i(ˆ0, x)
1037
+ The homomorphism maps each summand in the source isomorphically onto a summand in the tar-
1038
+ get (some summands in the source go to the same summand in the target, so the homomorphism
1039
+ is not injective). The image of the homomorphism is the sum of terms corresponding to r-equal
1040
+ partitions with at least one singleton. The cokernel is the direct sum of terms corresponding to
1041
+ r-equal partitions that do not have a singleton.
1042
+
1043
+ It follows from Lemma 7.2 that to find how cartesian the cube (14) is, we need to find the
1044
+ smallest i for which the homology group
1045
+ (17)
1046
+ �Hcodim(x)−2−i(ˆ0, x)
1047
+ is non-trivial for some x ∈ Π≥r(k).
1048
+ Throughout this section, let x be a partition of {1, . . . , k} where each block has at least r
1049
+ elements. Recall that c(x) denotes the number of blocks of x. Note that if k1, . . . , kc(x) are the
1050
+ sizes of the blocks of x, then k1 + · · · + kc(x) = k. Let [ˆ0, x] be the closed interval in Πk,r.
1051
+ Lemma 7.3. Let x be as above. Suppose x has c(x) blocks, of sizes k1, . . . , kc(x). Then there
1052
+ is an isomorphism of posets
1053
+ [ˆ0, x] ∼= Πk1,r × · · · × Πkc(x),r.
1054
+ 20
1055
+
1056
+ Proof. The interval [ˆ0, x] consists of r-equal partitions of {1, . . . , k} that are refinements of x.
1057
+ This is the same data as an r-equal partition of each block of x, which is the same as an element
1058
+ of Πk1,r × · · · × Πkc(x),r.
1059
+
1060
+ Given a poset P with a minimum and maximum element, let P0 be the poset P with the minimum
1061
+ and maximum removed.
1062
+ Corollary 7.4. Let x be as in the previous lemma. Then there is a homotopy equivalence (∗
1063
+ denotes joint)
1064
+ |∆(ˆ0, x)| ≃ Σc(x)−1|Π0
1065
+ k1,r| ∗ · · · ∗ |Π0
1066
+ kc(x),r|.
1067
+ Proof. This follows from the lemma, and the well-known fact that given two posets P and Q
1068
+ with minimum and maximum objects, there is a homotopy equivalence [Wal88, Theorem 5.1 (d)]
1069
+ |(P × Q)0| ≃ Σ|P0| ∗ |Q0|.
1070
+
1071
+ Lemma 7.5. Let x be as in the previous lemma and corollary. Then |∆(ˆ0, x)| is homotopy
1072
+ equivalent to a complex of dimension k−c(x)(r−1)−2. Furthermore, the homology of |∆(ˆ0, x)|
1073
+ in dimension k − c(x)(r − 1) − 2 is non zero.
1074
+ Proof. By the corollary, the space |∆(ˆ0, x)| is homotopy equivalent to Σc(x)−1|Π0
1075
+ k1,r| ∗ · · · ∗
1076
+ |Π0
1077
+ kc(x),r|. By the results of [BW95], |Π0
1078
+ k,r| is homotopy equivalent to a wedge of spheres, not all
1079
+ of the same dimension, and the top homology of this space occurs in dimension k − r − 1. It
1080
+ follows that the space Σc(x)−1|Π0
1081
+ k1,r|∗· · ·∗|Π0
1082
+ kc(x),r| is a wedge of spheres, with the top homology
1083
+ occurring in dimension
1084
+ c(x) − 1 + (k1 − r − 1) + · · · + (kc(x) − r − 1) + c(x) − 1 = k − c(x)(r − 1) − 2.
1085
+
1086
+ Example 7.6. If r ≤ k < 2r, there is only one summand x in (15) - this is the partition {k}, or
1087
+ in other words the thin diagonal. For this x, dim ∆(ˆ0, x) = k − r − 1.
1088
+ Now we can state and prove the main result of this section
1089
+ Proposition 7.7. When r ≤ n + 1, the cube (14) is k(n − 1) +
1090
+ � k
1091
+ r
1092
+
1093
+ (r − n − 1)-cartesian.
1094
+ When r ≥ n + 1, the cube (14) is k(n − 1) + r − n − 1-cartesian.
1095
+ Remark 7.8. Note that when r = n+1 both formulas say that the cube (14) is k(n−1)-cartesian.
1096
+ Proof. Given x, the smallest i for which the homology (17) might be non-trivial is one that
1097
+ satisfies codim(x)−2−i = dim ∆(ˆ0, x). Using Lemma 7.5 we have that the smallest i for which
1098
+ the total cokernel (15) might be non-trivial is one that satisfies
1099
+ codim(x) − 2 − i = k − c(x)(r − 1) − 2.
1100
+ Because codim(x) = n(k − c(x)) for x ∈ Π≥r(k), it follows that
1101
+ (18)
1102
+ i = k(n − 1) + c(x)(r − n − 1).
1103
+ 21
1104
+
1105
+ We have to see for which x this number i is the smallest possible. We distinguish between two
1106
+ overlapping cases, depending on the sign of r − n − 1.
1107
+ 1) When r − n − 1 ≤ 0, i.e. when r ≤ n + 1, finding i as small as possible is the same as finding
1108
+ x ∈ Π≥r(k) with the biggest number c(x) of components. Since all components have to be of
1109
+ the size at least r, the largest number of them is attained when there is a maximum number of
1110
+ them of the size r. In that case, c(x) =
1111
+ � k
1112
+ r
1113
+
1114
+ , so the smallest i is
1115
+ i = k(n − 1) +
1116
+ �k
1117
+ r
1118
+
1119
+ (r − n − 1).
1120
+ So in this case, the cubical diagram (14) is k(n − 1) +
1121
+ � k
1122
+ r
1123
+
1124
+ (r − n − 1)-cartesian.
1125
+ 2) When r − n − 1 ≥ 0, i.e. r ≥ n + 1, finding i as small as possible is the same as finding
1126
+ x ∈ Π≥r(k) with the smallest number c(x) of components. Thus we need c(x) to be equal to 1.
1127
+ This x is actually the thin diagonal in the space (Rn)k that corresponds to the partition {k} of
1128
+ k. In that case,
1129
+ i = k(n − 1) + r − n − 1,
1130
+ hence (14) is k(n − 1) + r − n − 1-cartesian.
1131
+
1132
+ 8. Convergence result
1133
+ Let M be a smooth manifold of dimension m. Now we finally can calculate the connectivity of
1134
+ the map
1135
+ (19)
1136
+ TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn).
1137
+ Knowing that ck-connectivity of the total fiber of the cube (14) implies (ck−km+1)-connectivity
1138
+ of the map (19), we can find the conditions under which the Taylor tower converges, using results
1139
+ from Section 7. There are three different cases.
1140
+ 1) For r − n − 1 < 0, the connectivity of the map (19) is
1141
+ (20)
1142
+ k(n − 1) +
1143
+ �k
1144
+ r
1145
+
1146
+ (r − n − 1) − 1 − mk + 1 = k(n − m − 1) +
1147
+ �k
1148
+ r
1149
+
1150
+ (r − n − 1)
1151
+ = k(n − m − 1) +
1152
+ �k
1153
+ r − k mod r
1154
+ r
1155
+
1156
+ (r − n − 1)
1157
+ = k
1158
+
1159
+ n − m − n
1160
+ r − 1
1161
+ r
1162
+
1163
+ − k mod r
1164
+ r
1165
+ (r − n − 1)
1166
+ = k
1167
+
1168
+ nr − 1
1169
+ r
1170
+ − m − 1
1171
+ r
1172
+
1173
+ − k mod r
1174
+ r
1175
+ (r − n − 1)
1176
+ where we noted that
1177
+ � k
1178
+ r
1179
+
1180
+ = k/r − (k mod r)/r. Note now that
1181
+ −k mod r
1182
+ r
1183
+ (r − n − 1)
1184
+ 22
1185
+
1186
+ is nonnegative since r − n − 1 < 0. This means that, as long as
1187
+ nr − 1
1188
+ r
1189
+ − m − 1
1190
+ r > 0,
1191
+ the connectivities increase with k.
1192
+ 2) For r − n − 1 = 0, the connectivity of the map (19) is
1193
+ (21)
1194
+ k(n − 1) − 1 − mk + 1 = k(n − m − 1),
1195
+ which goes to +∞ as k −→ +∞ if n − m − 1 > 0.
1196
+ 3) For r − n − 1 > 0, the connectivity of the map (19) is
1197
+ (22)
1198
+ k(n − 1) + r − n − 2 − mk + 1 = k(n − m − 1) + r − n − 1,
1199
+ which goes to +∞ as k −→ +∞ if n − m − 1 > 0.
1200
+ Thus we proved the following theorem.
1201
+ Theorem 8.1. (Homological convergence of the Taylor tower for r-immersions in Rn)
1202
+ Let M be an m-dimensional smooth manifold and Rn the n-dimensional Euclidean space. Assume
1203
+ n > 1. Let rImm(M, Rn) be the space of r-immersions of M in Rn. Consider the map
1204
+ pk : TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn).
1205
+ a) For r ≤ n + 1 the map pk is
1206
+ k
1207
+
1208
+ nr − 1
1209
+ r
1210
+ − m − 1
1211
+ r
1212
+
1213
+ − k mod r
1214
+ r
1215
+ (r − n − 1)
1216
+ -connected. The tower converges intrinsically if n > rm+1
1217
+ r−1 .
1218
+ b) For r ≥ n + 1 the map pk is k(n − m − 1) + r − n − 1-connected. The tower converges
1219
+ intrinsically if n > m + 1.
1220
+ Proof. Only the assertions regarding intrinsic convergence remain to be checked.
1221
+ The tower
1222
+ converges intrinsically if the connectivity of pk approaches ∞ with k. In the case r ≤ n+1, since
1223
+ (k mod r) is a bounded function of k, this is equivalent to the condition nr−1
1224
+ r
1225
+ − m − 1
1226
+ r > 0,
1227
+ which is the same as n > rm+1
1228
+ r−1 . In the case r ≥ n + 1, the formula for the connectivity of pk
1229
+ clearly tells us that the connectivity goes to ∞ if n > m + 1.
1230
+
1231
+ 9. Comparing with the unstable tower
1232
+ In this section we will compare the layers, and the connectivities of the maps in the Taylor tower
1233
+ of HZ ∧ rImm(M, Rn) with those in the Taylor tower of the unstabilized functor rImm(M, Rn).
1234
+ We will show that roughly up to degree 2r − 1 the connectivities of the maps in the two towers
1235
+ are the same, and the first non-trivial homotopy groups of the layers are isomorphic.
1236
+ 23
1237
+
1238
+ In this section, let us assume that we chose a basepoint in rImm(M, Rn) rather than just in
1239
+ Imm(M, Rn), so that the presheaf rImm(−, Rn) takes values in pointed spaces. We have a
1240
+ diagram of presheaves
1241
+ (23)
1242
+ rImm(−, Rn)
1243
+ i←− rImm(−, Rn)
1244
+ s−→ Ω∞Σ∞rImm(−, Rn)
1245
+ h−→ Ω∞HZ ∧ rImm(−, Rn).
1246
+ The map i induces an equivalence of derivatives and layers beyond the first one. The map h
1247
+ induces the Hurewicz homomorphism. In particular, it induces a Hurewicz isomorphism on the
1248
+ first non-trivial homotopy group of each layer. We focus on the question for which k the map s,
1249
+ and therefore also h ◦ s, induces an isomorphism on the first nontrivial homotopy group of the
1250
+ k-th layer. When r = 2, the answer is known to be: only for k = 2. We show that for r > 2 the
1251
+ answer is: for all k ≤ 2r − 1, with a small caveat for r = 3.
1252
+ Theorem 9.1. Assume 0 < dim(M) < n, r > 2.
1253
+ For 1 < k < r, the following maps are equivalences:
1254
+ Tk rImm(M, Rn) → T1 rImm(M, Rn) ≃ Imm(M, Rn)
1255
+ and
1256
+ TkHZ ∧ rImm(M, Rn) → T1HZ ∧ rImm(M, Rn) ≃ ∗.
1257
+ For r ≤ k ≤ 2r − 1, the connectivity of the map Tk rImm(M, Rn) → Tk−1 rImm(M, Rn) is the
1258
+ same as the connectivity of the map TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn).
1259
+ When r = 3, k = 2r − 1 = 5, the map s, and therefore also h ◦ s in diagram (23), induces an
1260
+ epimorphism on the first non-trivial homotopy group of the k-th layer. In all other cases when
1261
+ r > 2, r ≤ k ≤ 2r − 1, the maps s and h ◦ s induce an isomorphism on the first non-trivial
1262
+ homotopy group of the k-th layer.
1263
+ Remark 9.2. The case k = r, r + 1 of the last assertion of the theorem can be obtained by
1264
+ comparing our Theorem 8.1 with the calculations done in [SˇSV20].
1265
+ Proof. The assertion that T1 rImm(M, Rn) ≃ Imm(M, Rn) follows from the fact that when
1266
+ M = Dm, the following maps are equivalences [AˇS22]
1267
+ Emb(Dm, Rn)
1268
+ ���−→ rImm(Dm, Rn)
1269
+ ≃−→ Imm(Dm, Rn),
1270
+ together with the fact that the functor Imm(−, Rn) is linear, at least on manifolds whose handle
1271
+ dimension is less than n.
1272
+ The assertion that both towers are constant for k < r follows from the fact that the derivatives of
1273
+ both functors vanish below degree r. Indeed, the k-th layer in the Taylor tower of rImm(M, Rn)
1274
+ is determined by the following k-dimensional cubical diagram
1275
+ S �→ rImm(
1276
+
1277
+ k\S
1278
+ Dm, Rm).
1279
+ By the result of [AˇS22], this cubical diagram is equivalent to the diagram
1280
+ S �→ L(Rm, Rn)k\S × rConf(k \ S, Rn).
1281
+ 24
1282
+
1283
+ Here L(Rm, Rn) is the space of injective linear maps from Rm to Rn. This is the “tangential
1284
+ data” of an immersion. When k > 1 the tangential data cancels out, and the last cube is as
1285
+ cartesian as the following cube
1286
+ (24)
1287
+ S �→ rConf(k \ S, Rn).
1288
+ On the other hand, the k-th layer in the Taylor tower of Ω∞Σ∞ rImm(M, Rn) is determined by
1289
+ the following k-dimensional cubical diagram
1290
+ (25)
1291
+ S �→ Ω∞Σ∞ rConf(k \ S, Rn).
1292
+ To prove the assertion about the connectivities of the maps in the two towers, we need to
1293
+ show that the cubical diagram (24) is as cartesian as the diagram (25) in the indicated cases.
1294
+ Furthermore, we want to prove that the map s in (23) induces an isomorphism/epimorphism on
1295
+ the first non-trivial homotopy groups of the total homotopy fibers in the appropriate cases.
1296
+ The map s induces the following map of cubical diagrams, indexed by the poset of subsets S ⊂ k,
1297
+ (26)
1298
+ rConf(k \ S, Rn)
1299
+ s−→ Ω∞Σ∞ rConf(k \ S, Rn).
1300
+ The spaces rConf(k \ S, Rn) are (r − 1)n − 2-connected. By Freudenthal suspension theorem,
1301
+ the maps (26) are 2(r−1)n−3-connected. On the other hand, both cubes are retractive cubes by
1302
+ Lemma 6.1. It follows that the homotopy groups of the total homotopy fibers of both cubes are
1303
+ isomorphic to the total kernels of the corresponding cubes of homotopy groups. Proposition 7.7
1304
+ tells us the connectivity of the total homotopy fiber of (25), and therefore also the connectivity
1305
+ of the total kernel of the corresponding cube of homotopy groups. If this connectivity is smaller
1306
+ than (resp. equals to) the connectivity of the maps in (26), then (26) induces an isomorphism
1307
+ (resp: an epimorphism) between the first non-trivial homotopy groups of the total homotopy
1308
+ fibers. So we have to check that the range provided by Proposition 7.7 is smaller than (or equals
1309
+ to) 2(r − 1)n − 3 in the cases indicated in the statement that we are trying to prove.
1310
+ Suppose first that r > n+ 1. In this case, Proposition 7.7 says that (25) is k(n−1) + r −n−1-
1311
+ cartesian. So we have to check that the inequality
1312
+ k(n − 1) + r − n − 1 < 2(r − 1)n − 3
1313
+ holds whenever k < 2r. Simplifying, we obtain the inequality
1314
+ k < (2n − 1)r − 3
1315
+ n − 1
1316
+ − 1.
1317
+ So it is enough to check the inequality
1318
+ 2r ≤ (2n − 1)r − 3
1319
+ n − 1
1320
+ − 1.
1321
+ Multiplying by n − 1 we obtain the inequality
1322
+ 2r(n − 1) ≤ (2n − 1)r − 3 − n + 1,
1323
+ which is equivalent to r ≥ n + 2, which is what we assumed.
1324
+ Now suppose that r ≤ n + 1. Then Proposition 7.7 says that (25) is k(n − 1) +
1325
+ � k
1326
+ r
1327
+
1328
+ (r − n − 1)-
1329
+ cartesian. So we have to check that the inequality
1330
+ k(n − 1) +
1331
+ �k
1332
+ r
1333
+
1334
+ (r − n − 1) < 2(r − 1)n − 3
1335
+ 25
1336
+
1337
+ holds when r ≤ k < 2r, with the exception that when r = 3, k = 5 it is in fact an equality. The
1338
+ reader can check that in this case we do indeed obtain the equality
1339
+ 5(n − 1) +
1340
+ �5
1341
+ 3
1342
+
1343
+ (3 − n − 1) = 4n − 3.
1344
+ In other cases, the assumption r ≤ k < 2r implies
1345
+ � k
1346
+ r
1347
+
1348
+ = 1. So we have to check the inequality
1349
+ k(n − 1) + r − n − 1 < 2(r − 1)n − 3.
1350
+ We can rewrite the inequality as follows
1351
+ k(n − 1) < (2r − 1)(n − 1) + r − 3,
1352
+ or equivalently
1353
+ k < 2r − 1 + r − 3
1354
+ n − 1.
1355
+ For r = 3 this inequality is equivalent to k < 5. For 3 < r ≤ n + 1, this holds for all k ≤ 2r − 1,
1356
+ as stated.
1357
+
1358
+ 10. Further questions
1359
+ 1. We gave conditions on the m and n that guarantee intrinsic convergence of the Taylor tower
1360
+ of HZ ∧ rImm(M, Rn). The next question is, what does the Taylor tower from Theorem 8.1
1361
+ converge to? It is natural to guess that whenever the Taylor tower converges intrinsically, it
1362
+ actually converges to HZ ∧ rImm(M, Rn).
1363
+ 2.
1364
+ What can one say about the convergence of the Taylor tower for the unstable functor
1365
+ rImm(M, Rn)? The question of intrinsic convergence of the unstable tower might be tractable,
1366
+ and is a good place to start. One can use the methods of this paper to describe the layers
1367
+ of the functor Σ∞rImm(M, Rn). Given this, one can try to analyse the layers of the functor
1368
+ rImm(M, Rn) via the cobar construction
1369
+ cobar(Ω∞, Σ∞Ω∞, Σ∞rImm(M, Rn)),
1370
+ in the style of [AC11]. It is conceivable that one can use these methods to obtain conditions on
1371
+ m, n, and r that guarantee that the tower converges intrinsically.
1372
+ Then there is a question of what the tower actually converges to. Once again, it seems reasonable
1373
+ to guess that whenever the Taylor tower of a “natural” functor converges intrinsically, then it
1374
+ actually converges to the functor.
1375
+ 3. What can one say about r-immersions into a general manifold N? In order to understand the
1376
+ layers of the tower of the functor Σ∞rImm(M, N) one needs to understand (the stable homotopy
1377
+ type of) the homotopy fiber of the map rConf(k, N) → Nk. For r = 2 this homotopy fiber was
1378
+ analysed in [Aro09], and it seems likely that a similar analysis can be done for general r.
1379
+ 4. Construct interesting invariants/obstructions to existence of r-immersions, using the Taylor
1380
+ tower. In this paper we focused on situations where the connectivity of the k-th layer in the
1381
+ tower goes to infinity as k goes to infinity. But situations when the connectivity does not go to
1382
+ infinity also can be interesting. Of particular potential interest are situations where the layers are
1383
+ all either −1-connected or −2-connected. In the former case, the bottom homotopy groups of
1384
+ the layers give invariants, in the latter case they give obstructions to existence.
1385
+ 26
1386
+
1387
+ For example, it follows from Theorem 8.1 that when n = m+1 and r = n+1, then all the layers
1388
+ of HZ∧(n+ 1) Imm(M, Rn) are −1-connected. The 0-th homotopy groups of the layers should
1389
+ give invariants of r-immersions. In the case n = 2, and say M = S1, 3 Imm(S1, R2) is the space
1390
+ of smooth curves in R2 that do not have triple intersections. Spaces of such curves were studied
1391
+ quite intensely, starting with Arnol’d [Arn94, Tab96, Shu95]. In particular, Arnol’d developed the
1392
+ theory of finite type invariants for such curves. We expect these invariants to show up in the
1393
+ Taylor tower of HZ ∧ 3 Imm(S1, R2). In particular we speculate that the first non-trivial layer of
1394
+ the tower, which by Theorem 9.1 is the third layer, detects the “Strangeness” invariant, defined
1395
+ in [Arn94] and studied further in [Tab96] and [Shu95].
1396
+ References
1397
+ [AC11]
1398
+ Greg Arone and Michael Ching. Operads and chain rules for the calculus of functors. Ast´erisque
1399
+ 338:vi+158, 2011.
1400
+ [ALV07]
1401
+ Gregory Arone, Pascal Lambrechts, and Ismar Voli´c. Calculus of functors, operad formality, and rational
1402
+ homology of embedding spaces. Acta Math. 1999(2):153–198, 2007.
1403
+ [Arn94]
1404
+ V. I. Arnol’d. Plane curves, their invariants, perestroikas and classifications. In Singularities and bi-
1405
+ furcations, volume 21 of Adv. Soviet Math., pages 33–91. Amer. Math. Soc., Providence, RI. 1994.
1406
+ With an appendix by F. Aicardi.
1407
+ [Aro09]
1408
+ Gregory Arone. Derivatives of embedding functors. I. The stable case. J. Topol., 2(3):461–516, 2009.
1409
+ [AˇS22]
1410
+ Gregory Arone and Franjo ˇSarˇcevi´c. The space of r-immersions of a union of discs in Rn. 2022.
1411
+ arXiv:2212.09809
1412
+ [BdBW18] Pedro Boavida de Brito and Michael Weiss. Spaces of smooth embeddings and configuration categories.
1413
+ J. Topol., 11(1):65–143, 2018.
1414
+ [BEZ90]
1415
+ Anders Bj¨orner, Paul H. Edelman, and G¨unter M. Ziegler. Hyperplane arrangements with a lattice of
1416
+ regions. Discrete Comput. Geom., 5(3):263–288, 1990.
1417
+ [BW95]
1418
+ Anders Bj¨orner and Volkmar Welker. The Homology of ”k-Equal” Manifolds and Related Partition
1419
+ Lattices. Adv. Math., 110(2):277–313, 1995.
1420
+ [DH12]
1421
+ William Dwyer and Kathryn Hess. Long knots and maps between operads. Geom. Topol., 16(2):919–
1422
+ 955, 2012.
1423
+ [GK08]
1424
+ Thomas G. Goodwillie and John R. Klein. Multiple disjunction for spaces of Poincar´e embeddings. J.
1425
+ Topol., 1(4):761–803, 2008.
1426
+ [GK15]
1427
+ Thomas G. Goodwillie and John R. Klein. Multiple disjunction for spaces of smooth embeddings. J.
1428
+ Topol., 8(3):651–674, 2015.
1429
+ [GKW01]
1430
+ Thomas G. Goodwillie, John R. Klein, and Michael S. Weiss. Spaces of smooth embeddings, disjunction
1431
+ and surgery. In Surveys on surgery theory, Vol. 2, volume 149 of Ann. of Math. Stud., pages 221–284.
1432
+ Princeton Univ. Press, Princeton, NJ, 2001.
1433
+ [GM80]
1434
+ Mark Goresky and Robert MacPherson. Intersection homology theory. Topology, 19(2):135–162, 1980.
1435
+ [GM83a]
1436
+ Mark Goresky and Robert MacPherson. Intersection homology II. Invent. Math., 72(1):77–129, 1983.
1437
+ [GM83b]
1438
+ Mark Goresky and Robert MacPherson. Morse theory and intersection homology theory. In Analyse
1439
+ et topologie sur les espaces singuliers (II-III) - 6 - 10 juillet 1981, no. 101–102 in Ast´erisque, pages
1440
+ 135–192. Soci´et´e math´ematique de France, 1983.
1441
+ [GM88]
1442
+ Mark Goresky and Robert MacPherson. Stratified Morse Theory. Springer, Berlin-Heidelberg, 1988.
1443
+ [Goo92]
1444
+ Thomas G. Goodwillie. Calculus II: Analytic functors. K-Theory, 5(4):295–332. 1991/92.
1445
+ [GW99]
1446
+ Thomas G. Goodwillie and Michael Weiss. Embeddings from the point of view of immersion theory
1447
+ II. Geom. Topol., 3:103–118 (electronic), 1999.
1448
+ [Hat02]
1449
+ Allen Hatcher. Algebraic topology. Cambridge University Press, Cambridge, 2002.
1450
+ [Hu94]
1451
+ Yi Hu. On the homology of complements of arrangements of subspaces and spheres. Proc. Amer.
1452
+ Math. Soc., 122(1):285–290, 1994.
1453
+ [LRV03]
1454
+ Wolfgang L¨uck, Holger Reich and Marco Varisco. Commuting homotopy limits and smash products.
1455
+ K-Theory, 30(2):137–165, 2003.
1456
+ 27
1457
+
1458
+ [Mun05]
1459
+ Brian A. Munson. Embeddings in the 3/4 range. Topology, 44(6):1133–1157, 2005.
1460
+ [Mun10]
1461
+ Brian A. Munson. Introduction to the manifold calculus of Goodwillie-Weiss. Morfismos, 14(1):1–50,
1462
+ 2010.
1463
+ [Mun11]
1464
+ Brian A. Munson. Derivatives of the identity and generalizations of Milnor’s invariants. J. Topol.,
1465
+ 4(2):383–405, 2011.
1466
+ [MV15]
1467
+ Brian A. Munson and Ismar Voli´c. Cubical homotopy theory, volume 25 of New Mathematical Mono-
1468
+ graphs. Cambridge University Press, Cambridge, 2015.
1469
+ [OS80]
1470
+ Peter Orlik and Louis Solomon. Combinatorics and topology of complements of hyperplanes. Invent.
1471
+ Math., 56(2):167–189, 1980.
1472
+ [Shu95]
1473
+ Alexander Shumakovich. Explicit formulas for the strangeness of plane curves. Algebra i Analiz,
1474
+ 7(3):165–199, 1995.
1475
+ [SˇSV20]
1476
+ Bridget Schreiner, Franjo ˇSarˇcevi´c, and Ismar Voli´c. Low stages of the Taylor tower for r-immersions
1477
+ Involve, a J. of Math., 13(1):51–75, 2020.
1478
+ [ST16]
1479
+ Paul Arnaud Songhafouo Tsopm´en´e. The rational homology of spaces of long links. Algebr. Geom.
1480
+ Topol., 16(2):757–782, 2016.
1481
+ [Tab96]
1482
+ Serge Tabachnikov. Invariants of smooth triple point free plane curves. J. Knot Theory Ramif.,
1483
+ 5(4):531–552, 1996.
1484
+ [Vol06]
1485
+ Ismar Voli´c. Finite type knot invariants and the calculus of functors. Compos. Math., 142(1):222–250,
1486
+ 2006.
1487
+ [Wal88]
1488
+ James W. Walker. Canonical homeomorphisms of posets. Eur. J. Comb., 9(2):97–107, 1988.
1489
+ [Wei99]
1490
+ Michael S. Weiss. Embeddings from the point of view of immersion theory I. Geom. Topol., 3:67–101
1491
+ (electronic), 1999.
1492
+ [Wei04]
1493
+ Michael S. Weiss. Homology of spaces of smooth embeddings. Q. J. Math., 55(4):499–504, 2004.
1494
+ [Whi62]
1495
+ George W. Whitehead. Generalized Homology Theories. Trans. Am. Math. Soc., 102(2):227–283,
1496
+ 1962.
1497
+ [ZˇZ93]
1498
+ G¨unter Ziegler and Rade ˇZivaljevi´c. Homotopy types of subspace arrangements via diagrams of spaces.
1499
+ Math. Ann., 295:527–548, 1993.
1500
+ Gregory Arone
1501
+ Department of Mathematics, Stockholm University
1502
+ Email address: [email protected]
1503
+ Franjo ˇSarˇcevi´c
1504
+ Department of Mathematics, University of Sarajevo
1505
+ Email address: [email protected]
1506
+ URL: pmf.unsa.ba/franjos
1507
+ 28
1508
+
INE1T4oBgHgl3EQfXwS1/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
INE3T4oBgHgl3EQfugsS/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:aaaeef02dc8465720e976678e21ac4b2611a2352463c6d4fdd2c18056ed5c6b9
3
+ size 2293805
KtE0T4oBgHgl3EQfzgKz/content/2301.02674v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4557865cd7d2681ff8587a8f1d1aba1e7a860e6acd74bcfd99a1e1b8765569c9
3
+ size 8520311
KtE0T4oBgHgl3EQfzgKz/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3b40867abe79da9ca87dc9c3d320e082cc4d6f7f413005a0b31872078d7a820a
3
+ size 10027053
KtFRT4oBgHgl3EQfDzfl/content/tmp_files/2301.13474v1.pdf.txt ADDED
@@ -0,0 +1,603 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13474v1 [math.NT] 31 Jan 2023
2
+ GENERALIZED FRUIT DIOPHANTINE EQUATION AND
3
+ HYPERELLIPTIC CURVES
4
+ OM PRAKASH AND KALYAN CHAKRABORTY
5
+ Abstract. We show the insolvability of the Diophantine equation axd −y2 −z2 +xyz −
6
+ b = 0 in Z for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3, where d is an
7
+ odd integer and is a multiple of 3. Further, we investigate the more general family with
8
+ b = 2da − 3r, where r is a positive odd integer. As a consequence, we found an infinite
9
+ family of hyperelliptic curves with trivial torsion over Q. We conclude by providing some
10
+ numerical evidence corroborating the main results.
11
+ 1. Introduction
12
+ One of the earliest topics in number theory is the study of Diophantine equations. In
13
+ the third century, Greek mathematician Diophantus of ‘Alexandria’ began this study. A
14
+ polynomial equation of the form
15
+ P(x1, x2, · · · , xn) = 0
16
+ is known as a Diophantine equation. Finding all of its integer solutions, or all of the
17
+ n−tuples (x1, x2, · · · , xn) ∈ Z that satisfy the above equation, is of prime interest. The
18
+ main task is to investigate whether solutions exist for a given Diophantine equation. If
19
+ they do, it would be the aim to know how many are there and how to find all. There
20
+ are certain Diophantine equations which has no non zero integer solutions, for example,
21
+ Fermat’s equation xn + yn = zn for n ≥ 3. The tenth of Hilbert’s 23 problems, which
22
+ he presented in 1900, dealt with Diophantine equations. Hilbert asked, is there an al-
23
+ gorithm to determine weather a given Diophantine equation has a solution or not? and
24
+ Matiyasevich in 1970 answered it negatively.
25
+ We investigate a class of Diophantine equations of the form axd−y2−z2+xyz−b = 0 for
26
+ fixed a and b. Due to its emergence when attempting to solve an equation involving fruits,
27
+ this type of Diophantine equations were given the name “Fruit Diophantine equation” by
28
+ B. Sury and D. Majumdar [5] and they proved the following:
29
+ 2010 Mathematics Subject Classification. Primary: 11D41, 11D72. Secondary: 11G30.
30
+ Key words and phrases. Diophantine equation, Quadratic residue, Elliptic curves, Hyperelliptic curves.
31
+ 1
32
+
33
+ 2
34
+ OM PRAKASH AND KALYAN CHAKRABORTY
35
+ Theorem 1.1. [5] The equation
36
+ y2 − xyz + z2 = x3 − 5
37
+ has no integer solution in x, y and z.
38
+ Similar type of equations were previously studied by F. Luca and A. Togb´e. In particu-
39
+ lar, Luca and Togb´e [4] studied the solution of the Diophantine equation x3+by+1−xyz =
40
+ 0 and later, Togb´e [7] independently studied the equation x3 + by + 4 − xyz = 0.
41
+ As a consequence of Theorem 1.1 Majumdar and Sury proved the following:
42
+ Theorem 1.2. [5] For any integer m, the elliptic curve
43
+ Em : y2 − mxy = x3 + m2 + 5
44
+ has no integral point.
45
+ L. Vaishya and R. Sharma expanded on Majumdar and Sury’s work in [8]. A class of
46
+ fruit Diophantine equations without an integer solution was found by them. In particular
47
+ Vaishya and Sharma showed,
48
+ Theorem 1.3. [8] For fixed integers a and b with a ≡ 1 (mod 12) and b = 8a − 3. The
49
+ Diophantine equation
50
+ ax3 − y2 − z2 + xyz − b = 0
51
+ has no integer solution.
52
+ Using Nagell-Lutz theorem [6] and Theorem 1.3 they got hold of an infinite family of
53
+ elliptic curves with torsion-free Mordell-Weil group over Q.
54
+ Theorem 1.4. [8] Let a and b be as in Theorem 1.3.
55
+ • For any even integer m the elliptic curve
56
+ Ee
57
+ m,a,b : y2 = x3 + 1
58
+ 4m2x2 − a2 �
59
+ m2 + b
60
+
61
+ has torsion-free Mordell-Weil group.
62
+ • For any odd integer m the elliptic curve
63
+ Eo
64
+ m,a,b : y2 = x3 + m2x2 − 64a2 �
65
+ m2 + b
66
+
67
+ has torsion-free Mordell-Weil group.
68
+
69
+ GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
70
+ 3
71
+ We extend Vaishya and Sharma’s results [8] for higher exponents. We obtain a family
72
+ of hyperelliptic curves, by carrying out some appropriate transformations. In 2013, D.
73
+ Grant gave an analogue of Nagell-Lutz theorem for hyperelliptic curves [3], using which
74
+ we conclude that the Mordell-Weil group of each member of the corresponding family of
75
+ hyperelliptic curves is torsion-free.
76
+ 2. Insolvability
77
+ Here we state and prove the main theorem and derive a couple of interesting corollaries.
78
+ We end this section by looking into a couple of examples.
79
+ Theorem 2.1. The equation
80
+ axd − y2 − z2 + xyz − b = 0
81
+ has no integer solutions for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3,
82
+ where d is an odd integer and divisible by 3.
83
+ Proof. Consider
84
+ axd − y2 − z2 + xyz − b = 0.
85
+ (2.1)
86
+ If possible, let (x, y, z) be an integer solution of (2.1). Let us fix x = α. Then (2.1) can
87
+ be re-written as,
88
+ y2 + z2 + b = aαd + αyz.
89
+ (2.2)
90
+ We consider the cases of α being even or odd separately.
91
+ Case 1. If α is even. Then, we write (2.2) as:
92
+
93
+ y − αz
94
+ 2
95
+ �2
96
+
97
+ �α2
98
+ 4 − 1
99
+
100
+ z2 = aαd − b
101
+ (2.3)
102
+ and set Y = y − αz
103
+ 2 , β = α
104
+ 2 and z = Z. Thus (2.3) becomes,
105
+ Y 2 −
106
+
107
+ β2 − 1
108
+
109
+ Z2 = aαd − b = 2dβda − b.
110
+ (2.4)
111
+ • If β is even, say β = 2n for some integer n, then reducing (2.4) modulo 4 gives,
112
+ Y 2 + Z2 ≡ 3
113
+ (mod 4),
114
+ (2.5)
115
+ which is not possible in Z/4Z.
116
+
117
+ 4
118
+ OM PRAKASH AND KALYAN CHAKRABORTY
119
+ • If β is odd, then β = 2n + 1 for some integer n. Reduction of (2.4) modulo 4
120
+ entails,
121
+ Y 2 ≡ 3
122
+ (mod 4)
123
+ (2.6)
124
+ which is impossible.
125
+ Case 2. If α is odd, say, α = 2n + 1 for some integer n. Then,
126
+ y2 + z2 + b
127
+ =
128
+ aαd + αyz
129
+ y2 + z2 + a2d − 3
130
+ =
131
+ a (2n + 1)d + αyz
132
+ y2 + z2 − (2n + 1) yz
133
+ =
134
+ a (2n + 1)d − a2d + 3.
135
+ Now
136
+ y2 + z2 + yz
137
+
138
+ a + 3
139
+ (mod 2),
140
+ ⇒ y2 + z2 + yz
141
+
142
+ 0
143
+ (mod 2).
144
+ Note that y2 + z2 + yz ≡ a + 3 (mod 2) has only solution y ≡ 0 ≡ z in Z/2Z, that is, y
145
+ and z are even. Thus (2.3) becomes
146
+ aαd − b ≡ 0
147
+ (mod 4).
148
+ If we write a = 12l + 1 for some integer l, then,
149
+ αd −
150
+
151
+ a2d − 3
152
+
153
+
154
+ 0
155
+ (mod 4),
156
+ ⇒ αd + 3
157
+
158
+ 0
159
+ (mod 4),
160
+ ⇒ αd
161
+
162
+ 1
163
+ (mod 4),
164
+ ⇒ α
165
+
166
+ 1
167
+ (mod 4).
168
+ Let us consider
169
+
170
+ y − αz
171
+ 2
172
+ �2
173
+
174
+ �α2
175
+ 4 − 1
176
+
177
+ z2
178
+ =
179
+ aαd − b,
180
+ i.e.
181
+
182
+ y − αz
183
+ 2
184
+ �2
185
+
186
+
187
+ α2 − 4
188
+ � �z
189
+ 2
190
+ �2
191
+ =
192
+ aαd − b.
193
+ Further, we set Y = y − αz
194
+ 2 and Z = z
195
+ 2. Then,
196
+ Y 2 −
197
+
198
+ α2 − 4
199
+
200
+ Z2 = aαd − b
201
+ (2.7)
202
+ where α ≡ 1 (mod 4), a ≡ 1 (mod 12) and b = a2d − 3. Three sub cases need to be
203
+ considered.
204
+
205
+ GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
206
+ 5
207
+ Sub-case 1. If α ≡ 1 (mod 12), write α = 12l + 1 for some integer l. Then,
208
+ α ≡ 1
209
+ (mod 3)
210
+ ⇒ α + 2 ≡ 0
211
+ (mod 3).
212
+ Substituting α = 12l + 1 in 2.7, we get
213
+ Y 2 −
214
+
215
+ (12l + 1)2 − 4
216
+
217
+ Z2
218
+ =
219
+ aαd − b,
220
+ ⇒ Y 2 ≡ aαd − b
221
+ (mod 3),
222
+ ⇒ Y 2 ≡ a (12l + 1)d − a2d + 3
223
+ (mod 3),
224
+ ⇒ Y ≡ 1 − 2d
225
+ (mod 3),
226
+ ⇒ Y 2 ≡ 2
227
+ (mod 3).
228
+ A contradiction as 2 is not square modulo 3.
229
+ Sub-case 2. If α ≡ 9 (mod 12). Then, there is a prime factor p ≡ 5 or 7 (mod 12) of
230
+ (α − 2). Let p ≡ 5 or 7 (mod 12) be a prime factor of (α − 2). Thus,
231
+ Y 2 ≡ aαd − b
232
+ (mod p).
233
+ Let α = pl + 2 for some integer l. Then,
234
+ Y 2
235
+
236
+ a (pl + 2)d − b
237
+ (mod p),
238
+ ⇒ Y 2
239
+
240
+ 3
241
+ (mod p).
242
+ This leads to a contradiction as 3 is not a quadratic residue modulo p.
243
+ Sub-case 3. When α ≡ 5 (mod 12), we substitute α = 3k + 2 for some integer k and
244
+ get,
245
+ Y 2 −
246
+
247
+ (3l + 2)2 − 4
248
+
249
+ Z2
250
+ =
251
+ (12l + 1) (3k + 2) − 2d (12l + 1) + 3,
252
+ ⇒ Y 2
253
+
254
+ 2 − 2d ≡ 0
255
+ (mod 3),
256
+ ⇒ Y
257
+
258
+ 0
259
+ (mod 3).
260
+
261
+ 6
262
+ OM PRAKASH AND KALYAN CHAKRABORTY
263
+ Further, we substitute Y = 3m and α = 12n + 5 for some integers n and m in 2.7 and
264
+ arrive onto,
265
+ 9m2 − (12n + 3) (12n + 7) Z2
266
+ =
267
+ a (12n + 5)d − b,
268
+ ⇒ − (n + 1) Z2
269
+
270
+ d−1
271
+
272
+ i=0
273
+ (12n + 5)d−1−i 2i
274
+ (mod 3),
275
+ ⇒ − (n + 1) Z2
276
+
277
+ 1
278
+ (mod 3),
279
+ ⇒ n
280
+
281
+ 1
282
+ (mod 3).
283
+ Hence, α ≡ 17 (mod 36).
284
+ Note that 3 divides (α − 2). Thus there is a prime factor p ≡ 5 or 7 (mod 12) of (α−2)
285
+ 3
286
+ ,
287
+ otherwise it would mean that α−2
288
+ 3
289
+ is congruent to ±1, which is not the case. Therefore,
290
+ α − 2 ≡ 0
291
+ (mod p).
292
+ Thus,
293
+ Y 2 ≡ aαd − b
294
+ (mod p).
295
+ Substituting α = pl + 2 for some integer l, we have
296
+ Y 2 ≡ 3
297
+ (mod p),
298
+ which contradicts the fact that 3 is quadratic residue modulo p if p ≡ ±1 (mod 12).
299
+
300
+ Remark 1. The result of Sury and Majumdar [5] follows by substituting a = 1 and d = 3
301
+ in Theorem 2.1. The particular case d = 3 in the same theorem deduces the results of
302
+ Vaishya and Sharma [8].
303
+ By increasing the exponents in the expression for b to 3, we will now examine the
304
+ Diophantine equation with a little more generality. The potential of a solution in this
305
+ scenario is described by the following two corollaries, along with a few examples.
306
+ Corollary 2.1. The equation
307
+ axd − y2 − z2 + xyz − b = 0
308
+ has no integer solution (x, y, z) with x even for fixed integers a and b such that a ≡ 1
309
+ (mod 12) and b = 2da − 3r with positive odd integers r and d as in Theorem 2.1.
310
+
311
+ GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
312
+ 7
313
+ Proof. We follow exactly the same steps as in Case 1 of Theorem 2.1. Suppose there is a
314
+ solution with x = α even, then we write (2.2) as:
315
+
316
+ y − αz
317
+ 2
318
+ �2
319
+
320
+ �α2
321
+ 4 − 1
322
+
323
+ z2 = aαd − b.
324
+ (2.8)
325
+ Let Y = y − αz
326
+ 2 , β = α
327
+ 2 and z = Z. Then (2.8) can be written as,
328
+ Y 2 −
329
+
330
+ β2 − 1
331
+
332
+ Z2 = aαd − b = 2dβda − b.
333
+ (2.9)
334
+ • If β is even, say β = 2n for some integer n, then the reduction modulo 4 of (2.9)
335
+ will give,
336
+ Y 2 + Z2 ≡ 3r ≡ 3
337
+ (mod 4),
338
+ (2.10)
339
+ which is not feasible in Z/4Z.
340
+ • If β is odd, say β = 2n + 1 for some integer n. Then, the reduction modulo 4 of
341
+ (2.9) provides,
342
+ Y 2 ≡ 3r ≡ 3
343
+ (mod 4),
344
+ (2.11)
345
+ which again is not possible.
346
+
347
+ The following corollary deals with solutions having x, an odd integer:
348
+ Corollary 2.2. The equation
349
+ axd − y2 − z2 + xyz − b = 0
350
+ has no integer solution in x, y and z with x ≡ 1 or 9 (mod 12), for fixed integers a, b
351
+ such that a ≡ 1 (mod 12) and b = 2da − 3r, for r and d as in Corollary 2.1.
352
+ Proof. Analogous steps as in Sub-case 2 and 3 of Theorem 2.1 will give the proof.
353
+
354
+ Remark 2. Corollary 2.2 says that, if there is a solution of axd − y2 − z2 + xyz − b = 0
355
+ with a and b as described in the Corollary 2.2, then x must be 5 modulo 12.
356
+ We will see some examples.
357
+ Example 1. For a = 25, d = 3 and r = 3. The equation
358
+ 25x3 − y2 − z2 + xyz − 173 = 0
359
+ (2.12)
360
+ has no integer solution.
361
+
362
+ 8
363
+ OM PRAKASH AND KALYAN CHAKRABORTY
364
+ Example 2 shows that the equation may not have solution even with x ≡ 5 (mod 12).
365
+ However, the next examples tell us the other possibility as well.
366
+ Example 2. If a = 13, d = 3 and r = 3, then
367
+ 13x3 − y2 − z2 + xyz − 77 = 0
368
+ (2.13)
369
+ has an integer solution (5, = 18, −102).
370
+ Remark 3. The condition that r should be odd is rigid.
371
+ Example 3. For a = 13, d = 3 and r = 2, the equation
372
+ 13x3 − y2 − z2 + xyz − 95 = 0
373
+ (2.14)
374
+ has an integer solution (2, −10, −7).
375
+ 3. Hyperelliptic curves
376
+ A hyperelliptic curve H over Q is a smooth projective curve associated to an affine plane
377
+ curve given by the equation y2 = f (x), where f is a square-free polynomial of degree at
378
+ least 5. If the degree of f is 2g + 1 or 2g + 2, then the curve has genus g. We write H (Q)
379
+ for the set of Q-points on H. Determining rational points on hyperelliptic curve is one
380
+ of the major problems in mathematics. The following is the general result regarding the
381
+ size of H (Q), which was conjectured by Mordell and was proved by Faltings:
382
+ Theorem 3.1. [2] If C is a smooth, projective and absolutely irreducible curve over Q of
383
+ genus at least 2, then C (Q) is finite.
384
+ We may thus, at least theoretically, write down the finite set C (Q). It is still a signifi-
385
+ cant unresolved problem to perform this practically for a given curve.
386
+ Given a hyperelliptic curve H, we can define the height (classical) function to be the
387
+ maximum of absolute values of the coefficients. The Northcott property tells us that there
388
+ are finitely many equations with bounded height. Thus, one may talk about the density
389
+ and averages. In this regard, Bhargava [1] has proved that most of the hyperelliptic curve
390
+ over Q has no rational point. So, most of the times calculating H (Q) means proving
391
+ H (Q) = φ.
392
+ In this section, we construct hyperelliptic curves corresponding to the equation axd −
393
+ y2 − z2 + xyz − b = 0 with a and b as mentioned in Theorem 2.1.
394
+ Then, we prove
395
+ that H (Q) = φ (corroborating Bhargava [1]). The main ingredient to prove this is the
396
+ following Nagell-Lutz type theorem (Theorem 3, [3]) proved by D. Grant.
397
+
398
+ GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
399
+ 9
400
+ Theorem 3.2. [3] Let C be a nonsingular projective curve of genus g ≥ 1 given by
401
+ y2 = x2g+1 + b1x2g + · · · + b2gx + b2g+1, where bi ∈ Z. Suppose
402
+ ψ : C (Q) → J (Q)
403
+ be the Abel-Jacobi map, defined by ψ (p) = [p − ∞], where J (Q) is the Jacobian variety.
404
+ If p = (x, y) ∈ C (Q) \ {∞} and ψ (p) ∈ J (Q)tors, then, x, y ∈ Z and either y = 0 or y2
405
+ divides discriminant of the polynomial x2g+1 + b1x2g + · · · + b2gx + b2g+1.
406
+ For fixed m we define hyperelliptic curves,
407
+ Hm,a,b : y2 − mxy = axd − m2 − b.
408
+ • Suppose m is even. Then write (2.1) as:
409
+
410
+ y − mx
411
+ 2
412
+ �2
413
+ − m2x2
414
+ 4
415
+ = axd − m2 − b.
416
+ (3.1)
417
+ Multiplying (3.1) by ad−1 throughout, and using the fact that d is odd and divisible
418
+ by 3, we have,
419
+ ��
420
+ y − mx
421
+ 2
422
+
423
+ a
424
+ d−1
425
+ 2
426
+ �2
427
+ − ad−1m2x2
428
+ 4
429
+ = (ax)d − m2ad−1 − bad−1.
430
+ (3.2)
431
+ We get the following hyperelliptic curve by substituting
432
+ ��
433
+ y − mx
434
+ 2
435
+
436
+ a
437
+ d−1
438
+ 2
439
+
440
+ = Y and
441
+ ax = X,
442
+ He
443
+ m,a,b : Y 2 − ad−3m2X2
444
+ 4
445
+ = Xd − m2ad−1 − bad−1.
446
+ (3.3)
447
+ • Now if m is odd, multiply (3.2) by 4d throughout to get
448
+ ��
449
+ y − mx
450
+ 2
451
+
452
+ a
453
+ d−1
454
+ 2 2d�2
455
+ − (4a)d−1 m2x2 = (4ax)d − m2ad−14d − bad−14d.
456
+ Finally substitute
457
+ ��
458
+ y − mx
459
+ 2
460
+
461
+ a
462
+ d−1
463
+ 2 2d�
464
+ = Y and 4ax = X, to get
465
+ Ho
466
+ m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.
467
+ (3.4)
468
+ Let,
469
+ Hm,a,b =
470
+
471
+
472
+
473
+ He
474
+ m,a,b
475
+ if m is even
476
+ Ho
477
+ m,a,b
478
+ if m is odd,
479
+ (3.5)
480
+ be the hyperelliptic curves.
481
+ Theorem 3.3. Let a and b be as defined in Theorem 2.1. For any m ∈ N, the hyperelliptic
482
+ curve Hm,a,b has torsion-free Mordell-Weil group over Q.
483
+
484
+ 10
485
+ OM PRAKASH AND KALYAN CHAKRABORTY
486
+ Proof. Let a and b be fixed positive integers with a ≡ 1 (mod 12) and b = 2da − 3.
487
+ • For any even integer m, consider the hyperelliptic curve
488
+ He
489
+ m,a,b : Y 2 − ad−3m2X2
490
+ 4
491
+ = Xd − m2ad−1 − bad−1.
492
+ (3.6)
493
+ By Theorem 3 of [3], if (3.6) has an integer solution (X0, Y0),
494
+ then
495
+
496
+ aX0,
497
+ ��
498
+ Y0 − mX0
499
+ 2
500
+
501
+ a
502
+ d−1
503
+ 2
504
+
505
+ , m
506
+
507
+ is a solution of (2.1). However, in Theorem
508
+ 2.1 we have proved that it has no integer solutions.
509
+ • For an odd integer m, consider the hyperelliptic curve
510
+ Ho
511
+ m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.
512
+ (3.7)
513
+ Suppose (3.7) has a solution (X0, Y0), then
514
+
515
+ 4aX0,
516
+ ��
517
+ Y0 − mX0
518
+ 2
519
+
520
+ a
521
+ d−1
522
+ 2 2d�
523
+ , m
524
+
525
+ is a
526
+ solution of (2.1), which is a contradiction.
527
+
528
+ 4. Numerical examples
529
+ In this section we give some numerical examples corroborating our results in Corollary
530
+ 2.2 and Remark 2.
531
+ a
532
+ d
533
+ r
534
+ Equation
535
+ Solution
536
+ 1
537
+ 3
538
+ 3
539
+ x3 − y2 − z2 + xyz + 19 = 0
540
+ (5, 0, −12)
541
+ 1
542
+ 3
543
+ 5
544
+ x3 − y2 − z2 + xyz + 235 = 0
545
+ (29, 12, −60)
546
+ 1
547
+ 3
548
+ 7
549
+ x3 − y2 − z2 + xyz + 2179 = 0
550
+ (5, 0, −48)
551
+ 1
552
+ 3
553
+ 9
554
+ x3 − y2 − z2 + xyz + 19675 = 0
555
+ (−31, 12, −30)
556
+ 13
557
+ 3
558
+ 3
559
+ 13x3 − y2 − z2 + xyz − 77 = 0
560
+ (5, −18, −102)
561
+ 13
562
+ 3
563
+ 5
564
+ 13x3 − y2 − z2 + xyz + 139 = 0
565
+ (5, 0, −42)
566
+ 13
567
+ 3
568
+ 7
569
+ 13x3 − y2 − z2 + xyz + 2083 = 0
570
+ ?
571
+ 25
572
+ 3
573
+ 3
574
+ 25x3 − y2 − z2 + xyz − 173 = 0
575
+ (5, 0, −42)
576
+ Acknowledgement
577
+ This work is done during the first author’s visit to Institute of Mathematical Sci-
578
+ ences (IMSc), Chennai, and he is grateful to the Institute for the hospitality and the
579
+ wonderful working ambience. Both the authors are grateful to Kerala School of Mathe-
580
+ matics(KSoM), Kozhikode, for it’s support and wonderful ambience.
581
+
582
+ GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
583
+ 11
584
+ References
585
+ [1] M. Bhargava, Most hyperelliptic curve over Q have no rational point, arXiv:1308.0395.
586
+ [2] G. Faltings, “Finiteness theorems for abelian varieties over number fields”, Invent. Math., 73 (1983),
587
+ 349–366.
588
+ [3] D. Grant, On an analogue of the Lutz-Nagell theorem for hyperelliptic curves, J. Number Theory,
589
+ 133 (2013), 963–969.
590
+ [4] F. Luca and A. Togb´e, On the positive integral solution of the Diophantine equation x3+by+1−xyz,
591
+ Bull. Malays. Math. Sci. Soc., 31 (2008), 129–134.
592
+ [5] D. Majumdar and B. Sury, Fruit Diophantine Equation,https://arxiv.org/abs/2108.02640.
593
+ [6] J.H. Silverman, , J.T. Tate, Rational Points on Elliptic Curves, Undergraduate Texts in Mathematics.
594
+ Springer-Verlag, New York (1992).
595
+ [7] A. Togb´e, On the positive integral solution of the Diophantine equation x3 + by + 4 − xyz, Afr.
596
+ Diaspora J. Math., 8 (2009), 81–89.
597
+ [8] L. Vaishya and R. Sharma, A class of fruit Diophantine equations, Monatshefte f¨ur Mathematik, 199
598
+ (2022), 899–907.
599
+ Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.
600
+ Email address: [email protected]
601
+ Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.
602
+ Email address: [email protected]
603
+
KtFRT4oBgHgl3EQfDzfl/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,291 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf,len=290
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
3
+ page_content='13474v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
4
+ page_content='NT] 31 Jan 2023 GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES OM PRAKASH AND KALYAN CHAKRABORTY Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
5
+ page_content=' We show the insolvability of the Diophantine equation axd −y2 −z2 +xyz − b = 0 in Z for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3, where d is an odd integer and is a multiple of 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
6
+ page_content=' Further, we investigate the more general family with b = 2da − 3r, where r is a positive odd integer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
7
+ page_content=' As a consequence, we found an infinite family of hyperelliptic curves with trivial torsion over Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
8
+ page_content=' We conclude by providing some numerical evidence corroborating the main results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
9
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
10
+ page_content=' Introduction One of the earliest topics in number theory is the study of Diophantine equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
11
+ page_content=' In the third century, Greek mathematician Diophantus of ‘Alexandria’ began this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
12
+ page_content=' A polynomial equation of the form P(x1, x2, · · · , xn) = 0 is known as a Diophantine equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
13
+ page_content=' Finding all of its integer solutions, or all of the n−tuples (x1, x2, · · · , xn) ∈ Z that satisfy the above equation, is of prime interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
14
+ page_content=' The main task is to investigate whether solutions exist for a given Diophantine equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
15
+ page_content=' If they do, it would be the aim to know how many are there and how to find all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
16
+ page_content=' There are certain Diophantine equations which has no non zero integer solutions, for example, Fermat’s equation xn + yn = zn for n ≥ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
17
+ page_content=' The tenth of Hilbert’s 23 problems, which he presented in 1900, dealt with Diophantine equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
18
+ page_content=' Hilbert asked, is there an al- gorithm to determine weather a given Diophantine equation has a solution or not?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
19
+ page_content=' and Matiyasevich in 1970 answered it negatively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
20
+ page_content=' We investigate a class of Diophantine equations of the form axd−y2−z2+xyz−b = 0 for fixed a and b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
21
+ page_content=' Due to its emergence when attempting to solve an equation involving fruits, this type of Diophantine equations were given the name “Fruit Diophantine equation” by B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
22
+ page_content=' Sury and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
23
+ page_content=' Majumdar [5] and they proved the following: 2010 Mathematics Subject Classification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
24
+ page_content=' Primary: 11D41, 11D72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
25
+ page_content=' Secondary: 11G30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
26
+ page_content=' Key words and phrases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
27
+ page_content=' Diophantine equation, Quadratic residue, Elliptic curves, Hyperelliptic curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
28
+ page_content=' 1 2 OM PRAKASH AND KALYAN CHAKRABORTY Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
29
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
30
+ page_content=' [5] The equation y2 − xyz + z2 = x3 − 5 has no integer solution in x, y and z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
31
+ page_content=' Similar type of equations were previously studied by F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
32
+ page_content=' Luca and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
33
+ page_content=' Togb´e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
34
+ page_content=' In particu- lar, Luca and Togb´e [4] studied the solution of the Diophantine equation x3+by+1−xyz = 0 and later, Togb´e [7] independently studied the equation x3 + by + 4 − xyz = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
35
+ page_content=' As a consequence of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
36
+ page_content='1 Majumdar and Sury proved the following: Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
37
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
38
+ page_content=' [5] For any integer m, the elliptic curve Em : y2 − mxy = x3 + m2 + 5 has no integral point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
39
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
40
+ page_content=' Vaishya and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
41
+ page_content=' Sharma expanded on Majumdar and Sury’s work in [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
42
+ page_content=' A class of fruit Diophantine equations without an integer solution was found by them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
43
+ page_content=' In particular Vaishya and Sharma showed, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
44
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
45
+ page_content=' [8] For fixed integers a and b with a ≡ 1 (mod 12) and b = 8a − 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
46
+ page_content=' The Diophantine equation ax3 − y2 − z2 + xyz − b = 0 has no integer solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
47
+ page_content=' Using Nagell-Lutz theorem [6] and Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
48
+ page_content='3 they got hold of an infinite family of elliptic curves with torsion-free Mordell-Weil group over Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
49
+ page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
50
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
51
+ page_content=' [8] Let a and b be as in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
52
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
53
+ page_content=' For any even integer m the elliptic curve Ee m,a,b : y2 = x3 + 1 4m2x2 − a2 � m2 + b � has torsion-free Mordell-Weil group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
54
+ page_content=' For any odd integer m the elliptic curve Eo m,a,b : y2 = x3 + m2x2 − 64a2 � m2 + b � has torsion-free Mordell-Weil group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
55
+ page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 3 We extend Vaishya and Sharma’s results [8] for higher exponents.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
56
+ page_content=' We obtain a family of hyperelliptic curves, by carrying out some appropriate transformations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
57
+ page_content=' In 2013, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
58
+ page_content=' Grant gave an analogue of Nagell-Lutz theorem for hyperelliptic curves [3], using which we conclude that the Mordell-Weil group of each member of the corresponding family of hyperelliptic curves is torsion-free.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
59
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
60
+ page_content=' Insolvability Here we state and prove the main theorem and derive a couple of interesting corollaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
61
+ page_content=' We end this section by looking into a couple of examples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
62
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
63
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
64
+ page_content=' The equation axd − y2 − z2 + xyz − b = 0 has no integer solutions for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3, where d is an odd integer and divisible by 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
65
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
66
+ page_content=' Consider axd − y2 − z2 + xyz − b = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
67
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
68
+ page_content='1) If possible, let (x, y, z) be an integer solution of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
69
+ page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
70
+ page_content=' Let us fix x = α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
71
+ page_content=' Then (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
72
+ page_content='1) can be re-written as, y2 + z2 + b = aαd + αyz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
73
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
74
+ page_content='2) We consider the cases of α being even or odd separately.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
75
+ page_content=' Case 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
76
+ page_content=' If α is even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
77
+ page_content=' Then, we write (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
78
+ page_content='2) as: � y − αz 2 �2 − �α2 4 − 1 � z2 = aαd − b (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
79
+ page_content='3) and set Y = y − αz 2 , β = α 2 and z = Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
80
+ page_content=' Thus (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
81
+ page_content='3) becomes, Y 2 − � β2 − 1 � Z2 = aαd − b = 2dβda − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
82
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
83
+ page_content='4) If β is even, say β = 2n for some integer n, then reducing (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
84
+ page_content='4) modulo 4 gives, Y 2 + Z2 ≡ 3 (mod 4), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
85
+ page_content='5) which is not possible in Z/4Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
86
+ page_content=' 4 OM PRAKASH AND KALYAN CHAKRABORTY If β is odd, then β = 2n + 1 for some integer n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
87
+ page_content=' Reduction of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
88
+ page_content='4) modulo 4 entails, Y 2 ≡ 3 (mod 4) (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
89
+ page_content='6) which is impossible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
90
+ page_content=' Case 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
91
+ page_content=' If α is odd, say, α = 2n + 1 for some integer n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
92
+ page_content=' Then, y2 + z2 + b = aαd + αyz y2 + z2 + a2d − 3 = a (2n + 1)d + αyz y2 + z2 − (2n + 1) yz = a (2n + 1)d − a2d + 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
93
+ page_content=' Now y2 + z2 + yz ≡ a + 3 (mod 2), ⇒ y2 + z2 + yz ≡ 0 (mod 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
94
+ page_content=' Note that y2 + z2 + yz ≡ a + 3 (mod 2) has only solution y ≡ 0 ≡ z in Z/2Z, that is, y and z are even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
95
+ page_content=' Thus (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
96
+ page_content='3) becomes aαd − b ≡ 0 (mod 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
97
+ page_content=' If we write a = 12l + 1 for some integer l, then, αd − � a2d − 3 � ≡ 0 (mod 4), ⇒ αd + 3 ≡ 0 (mod 4), ⇒ αd ≡ 1 (mod 4), ⇒ α ≡ 1 (mod 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
98
+ page_content=' Let us consider � y − αz 2 �2 − �α2 4 − 1 � z2 = aαd − b, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
99
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
100
+ page_content=' � y − αz 2 �2 − � α2 − 4 � �z 2 �2 = aαd − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
101
+ page_content=' Further, we set Y = y − αz 2 and Z = z 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
102
+ page_content=' Then, Y 2 − � α2 − 4 � Z2 = aαd − b (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
103
+ page_content='7) where α ≡ 1 (mod 4), a ≡ 1 (mod 12) and b = a2d − 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
104
+ page_content=' Three sub cases need to be considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
105
+ page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 5 Sub-case 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
106
+ page_content=' If α ≡ 1 (mod 12), write α = 12l + 1 for some integer l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
107
+ page_content=' Then, α ≡ 1 (mod 3) ⇒ α + 2 ≡ 0 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
108
+ page_content=' Substituting α = 12l + 1 in 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
109
+ page_content='7, we get Y 2 − � (12l + 1)2 − 4 � Z2 = aαd − b, ⇒ Y 2 ≡ aαd − b (mod 3), ⇒ Y 2 ≡ a (12l + 1)d − a2d + 3 (mod 3), ⇒ Y ≡ 1 − 2d (mod 3), ⇒ Y 2 ≡ 2 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
110
+ page_content=' A contradiction as 2 is not square modulo 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
111
+ page_content=' Sub-case 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
112
+ page_content=' If α ≡ 9 (mod 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
113
+ page_content=' Then, there is a prime factor p ≡ 5 or 7 (mod 12) of (α − 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
114
+ page_content=' Let p ≡ 5 or 7 (mod 12) be a prime factor of (α − 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
115
+ page_content=' Thus, Y 2 ≡ aαd − b (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
116
+ page_content=' Let α = pl + 2 for some integer l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
117
+ page_content=' Then, Y 2 ≡ a (pl + 2)d − b (mod p), ⇒ Y 2 ≡ 3 (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
118
+ page_content=' This leads to a contradiction as 3 is not a quadratic residue modulo p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
119
+ page_content=' Sub-case 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
120
+ page_content=' When α ≡ 5 (mod 12), we substitute α = 3k + 2 for some integer k and get, Y 2 − � (3l + 2)2 − 4 � Z2 = (12l + 1) (3k + 2) − 2d (12l + 1) + 3, ⇒ Y 2 ≡ 2 − 2d ≡ 0 (mod 3), ⇒ Y ≡ 0 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
121
+ page_content=' 6 OM PRAKASH AND KALYAN CHAKRABORTY Further, we substitute Y = 3m and α = 12n + 5 for some integers n and m in 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
122
+ page_content='7 and arrive onto, 9m2 − (12n + 3) (12n + 7) Z2 = a (12n + 5)d − b, ⇒ − (n + 1) Z2 ≡ d−1 � i=0 (12n + 5)d−1−i 2i (mod 3), ⇒ − (n + 1) Z2 ≡ 1 (mod 3), ⇒ n ≡ 1 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
123
+ page_content=' Hence, α ≡ 17 (mod 36).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
124
+ page_content=' Note that 3 divides (α − 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
125
+ page_content=' Thus there is a prime factor p ≡ 5 or 7 (mod 12) of (α−2) 3 , otherwise it would mean that α−2 3 is congruent to ±1, which is not the case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
126
+ page_content=' Therefore, α − 2 ≡ 0 (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
127
+ page_content=' Thus, Y 2 ≡ aαd − b (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
128
+ page_content=' Substituting α = pl + 2 for some integer l, we have Y 2 ≡ 3 (mod p), which contradicts the fact that 3 is quadratic residue modulo p if p ≡ ±1 (mod 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
129
+ page_content=' □ Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
130
+ page_content=' The result of Sury and Majumdar [5] follows by substituting a = 1 and d = 3 in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
131
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
132
+ page_content=' The particular case d = 3 in the same theorem deduces the results of Vaishya and Sharma [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
133
+ page_content=' By increasing the exponents in the expression for b to 3, we will now examine the Diophantine equation with a little more generality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
134
+ page_content=' The potential of a solution in this scenario is described by the following two corollaries, along with a few examples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
135
+ page_content=' Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
136
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
137
+ page_content=' The equation axd − y2 − z2 + xyz − b = 0 has no integer solution (x, y, z) with x even for fixed integers a and b such that a ≡ 1 (mod 12) and b = 2da − 3r with positive odd integers r and d as in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
138
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
139
+ page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 7 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
140
+ page_content=' We follow exactly the same steps as in Case 1 of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
141
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
142
+ page_content=' Suppose there is a solution with x = α even, then we write (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
143
+ page_content='2) as: � y − αz 2 �2 − �α2 4 − 1 � z2 = aαd − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
144
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
145
+ page_content='8) Let Y = y − αz 2 , β = α 2 and z = Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
146
+ page_content=' Then (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
147
+ page_content='8) can be written as, Y 2 − � β2 − 1 � Z2 = aαd − b = 2dβda − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
148
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
149
+ page_content='9) If β is even, say β = 2n for some integer n, then the reduction modulo 4 of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
150
+ page_content='9) will give, Y 2 + Z2 ≡ 3r ≡ 3 (mod 4), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
151
+ page_content='10) which is not feasible in Z/4Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
152
+ page_content=' If β is odd, say β = 2n + 1 for some integer n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
153
+ page_content=' Then, the reduction modulo 4 of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
154
+ page_content='9) provides, Y 2 ≡ 3r ≡ 3 (mod 4), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
155
+ page_content='11) which again is not possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
156
+ page_content=' □ The following corollary deals with solutions having x, an odd integer: Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
157
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
158
+ page_content=' The equation axd − y2 − z2 + xyz − b = 0 has no integer solution in x, y and z with x ≡ 1 or 9 (mod 12), for fixed integers a, b such that a ≡ 1 (mod 12) and b = 2da − 3r, for r and d as in Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
159
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
160
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
161
+ page_content=' Analogous steps as in Sub-case 2 and 3 of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
162
+ page_content='1 will give the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
163
+ page_content=' □ Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
164
+ page_content=' Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
165
+ page_content='2 says that, if there is a solution of axd − y2 − z2 + xyz − b = 0 with a and b as described in the Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
166
+ page_content='2, then x must be 5 modulo 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
167
+ page_content=' We will see some examples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
168
+ page_content=' Example 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
169
+ page_content=' For a = 25, d = 3 and r = 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
170
+ page_content=' The equation 25x3 − y2 − z2 + xyz − 173 = 0 (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
171
+ page_content='12) has no integer solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
172
+ page_content=' 8 OM PRAKASH AND KALYAN CHAKRABORTY Example 2 shows that the equation may not have solution even with x ≡ 5 (mod 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
173
+ page_content=' However, the next examples tell us the other possibility as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
174
+ page_content=' Example 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
175
+ page_content=' If a = 13, d = 3 and r = 3, then 13x3 − y2 − z2 + xyz − 77 = 0 (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
176
+ page_content='13) has an integer solution (5, = 18, −102).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
177
+ page_content=' Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
178
+ page_content=' The condition that r should be odd is rigid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
179
+ page_content=' Example 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
180
+ page_content=' For a = 13, d = 3 and r = 2, the equation 13x3 − y2 − z2 + xyz − 95 = 0 (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
181
+ page_content='14) has an integer solution (2, −10, −7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
182
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
183
+ page_content=' Hyperelliptic curves A hyperelliptic curve H over Q is a smooth projective curve associated to an affine plane curve given by the equation y2 = f (x), where f is a square-free polynomial of degree at least 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
184
+ page_content=' If the degree of f is 2g + 1 or 2g + 2, then the curve has genus g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
185
+ page_content=' We write H (Q) for the set of Q-points on H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
186
+ page_content=' Determining rational points on hyperelliptic curve is one of the major problems in mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
187
+ page_content=' The following is the general result regarding the size of H (Q), which was conjectured by Mordell and was proved by Faltings: Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
188
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
189
+ page_content=' [2] If C is a smooth, projective and absolutely irreducible curve over Q of genus at least 2, then C (Q) is finite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
190
+ page_content=' We may thus, at least theoretically, write down the finite set C (Q).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
191
+ page_content=' It is still a signifi- cant unresolved problem to perform this practically for a given curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
192
+ page_content=' Given a hyperelliptic curve H, we can define the height (classical) function to be the maximum of absolute values of the coefficients.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
193
+ page_content=' The Northcott property tells us that there are finitely many equations with bounded height.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
194
+ page_content=' Thus, one may talk about the density and averages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
195
+ page_content=' In this regard, Bhargava [1] has proved that most of the hyperelliptic curve over Q has no rational point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
196
+ page_content=' So, most of the times calculating H (Q) means proving H (Q) = φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
197
+ page_content=' In this section, we construct hyperelliptic curves corresponding to the equation axd − y2 − z2 + xyz − b = 0 with a and b as mentioned in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
198
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
199
+ page_content=' Then, we prove that H (Q) = φ (corroborating Bhargava [1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
200
+ page_content=' The main ingredient to prove this is the following Nagell-Lutz type theorem (Theorem 3, [3]) proved by D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
201
+ page_content=' Grant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
202
+ page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 9 Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
203
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
204
+ page_content=' [3] Let C be a nonsingular projective curve of genus g ≥ 1 given by y2 = x2g+1 + b1x2g + · · · + b2gx + b2g+1, where bi ∈ Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
205
+ page_content=' Suppose ψ : C (Q) → J (Q) be the Abel-Jacobi map, defined by ψ (p) = [p − ∞], where J (Q) is the Jacobian variety.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
206
+ page_content=' If p = (x, y) ∈ C (Q) \\ {∞} and ψ (p) ∈ J (Q)tors, then, x, y ∈ Z and either y = 0 or y2 divides discriminant of the polynomial x2g+1 + b1x2g + · · · + b2gx + b2g+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
207
+ page_content=' For fixed m we define hyperelliptic curves, Hm,a,b : y2 − mxy = axd − m2 − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
208
+ page_content=' Suppose m is even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
209
+ page_content=' Then write (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
210
+ page_content='1) as: � y − mx 2 �2 − m2x2 4 = axd − m2 − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
211
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
212
+ page_content='1) Multiplying (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
213
+ page_content='1) by ad−1 throughout, and using the fact that d is odd and divisible by 3, we have, �� y − mx 2 � a d−1 2 �2 − ad−1m2x2 4 = (ax)d − m2ad−1 − bad−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
214
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
215
+ page_content='2) We get the following hyperelliptic curve by substituting �� y − mx 2 � a d−1 2 � = Y and ax = X, He m,a,b : Y 2 − ad−3m2X2 4 = Xd − m2ad−1 − bad−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
216
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
217
+ page_content='3) Now if m is odd, multiply (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
218
+ page_content='2) by 4d throughout to get �� y − mx 2 � a d−1 2 2d�2 − (4a)d−1 m2x2 = (4ax)d − m2ad−14d − bad−14d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
219
+ page_content=' Finally substitute �� y − mx 2 � a d−1 2 2d� = Y and 4ax = X, to get Ho m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
220
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
221
+ page_content='4) Let, Hm,a,b = \uf8f1 \uf8f2 \uf8f3 He m,a,b if m is even Ho m,a,b if m is odd, (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
222
+ page_content='5) be the hyperelliptic curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
223
+ page_content=' Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
224
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
225
+ page_content=' Let a and b be as defined in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
226
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
227
+ page_content=' For any m ∈ N, the hyperelliptic curve Hm,a,b has torsion-free Mordell-Weil group over Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
228
+ page_content=' 10 OM PRAKASH AND KALYAN CHAKRABORTY Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
229
+ page_content=' Let a and b be fixed positive integers with a ≡ 1 (mod 12) and b = 2da − 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
230
+ page_content=' For any even integer m, consider the hyperelliptic curve He m,a,b : Y 2 − ad−3m2X2 4 = Xd − m2ad−1 − bad−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
231
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
232
+ page_content='6) By Theorem 3 of [3], if (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
233
+ page_content='6) has an integer solution (X0, Y0), then � aX0, �� Y0 − mX0 2 � a d−1 2 � , m � is a solution of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
234
+ page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
235
+ page_content=' However, in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
236
+ page_content='1 we have proved that it has no integer solutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
237
+ page_content=' For an odd integer m, consider the hyperelliptic curve Ho m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
238
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
239
+ page_content='7) Suppose (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
240
+ page_content='7) has a solution (X0, Y0), then � 4aX0, �� Y0 − mX0 2 � a d−1 2 2d� , m � is a solution of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
241
+ page_content='1), which is a contradiction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
242
+ page_content=' □ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
243
+ page_content=' Numerical examples In this section we give some numerical examples corroborating our results in Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
244
+ page_content='2 and Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
245
+ page_content=' a d r Equation Solution 1 3 3 x3 − y2 − z2 + xyz + 19 = 0 (5, 0, −12) 1 3 5 x3 − y2 − z2 + xyz + 235 = 0 (29, 12, −60) 1 3 7 x3 − y2 − z2 + xyz + 2179 = 0 (5, 0, −48) 1 3 9 x3 − y2 − z2 + xyz + 19675 = 0 (−31, 12, −30) 13 3 3 13x3 − y2 − z2 + xyz − 77 = 0 (5, −18, −102) 13 3 5 13x3 − y2 − z2 + xyz + 139 = 0 (5, 0, −42) 13 3 7 13x3 − y2 − z2 + xyz + 2083 = 0 ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
246
+ page_content=' 25 3 3 25x3 − y2 − z2 + xyz − 173 = 0 (5, 0, −42) Acknowledgement This work is done during the first author’s visit to Institute of Mathematical Sci- ences (IMSc), Chennai, and he is grateful to the Institute for the hospitality and the wonderful working ambience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
247
+ page_content=' Both the authors are grateful to Kerala School of Mathe- matics(KSoM), Kozhikode, for it’s support and wonderful ambience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
248
+ page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 11 References [1] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
249
+ page_content=' Bhargava, Most hyperelliptic curve over Q have no rational point, arXiv:1308.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
250
+ page_content='0395.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
251
+ page_content=' [2] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
252
+ page_content=' Faltings, “Finiteness theorems for abelian varieties over number fields”, Invent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
253
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
254
+ page_content=', 73 (1983), 349–366.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
255
+ page_content=' [3] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
256
+ page_content=' Grant, On an analogue of the Lutz-Nagell theorem for hyperelliptic curves, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
257
+ page_content=' Number Theory, 133 (2013), 963–969.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
258
+ page_content=' [4] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
259
+ page_content=' Luca and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
260
+ page_content=' Togb´e, On the positive integral solution of the Diophantine equation x3+by+1−xyz, Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
261
+ page_content=' Malays.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
262
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
263
+ page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
264
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
265
+ page_content=', 31 (2008), 129–134.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
266
+ page_content=' [5] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
267
+ page_content=' Majumdar and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
268
+ page_content=' Sury, Fruit Diophantine Equation,https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
269
+ page_content='org/abs/2108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
270
+ page_content='02640.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
271
+ page_content=' [6] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
272
+ page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
273
+ page_content=' Silverman, , J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
274
+ page_content='T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
275
+ page_content=' Tate, Rational Points on Elliptic Curves, Undergraduate Texts in Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
276
+ page_content=' Springer-Verlag, New York (1992).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
277
+ page_content=' [7] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
278
+ page_content=' Togb´e, On the positive integral solution of the Diophantine equation x3 + by + 4 − xyz, Afr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
279
+ page_content=' Diaspora J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
280
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
281
+ page_content=', 8 (2009), 81–89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
282
+ page_content=' [8] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
283
+ page_content=' Vaishya and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
284
+ page_content=' Sharma, A class of fruit Diophantine equations, Monatshefte f¨ur Mathematik, 199 (2022), 899–907.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
285
+ page_content=' Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
286
+ page_content=' Email address: omprakash@ksom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
287
+ page_content='res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
288
+ page_content='in Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
289
+ page_content=' Email address: kalychak@ksom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
290
+ page_content='res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
291
+ page_content='in' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
MNE3T4oBgHgl3EQfBAmd/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0aa18c9fdf8bc8ea10c4432f15219a675424e60cc18266f3d160f42f5e898796
3
+ size 3080237
MNFAT4oBgHgl3EQfxB7a/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d31bb317a7aa665bf352388bcbf9c13185b2e2f37690e3b1b1973a576bf005c7
3
+ size 188349
NdFPT4oBgHgl3EQflzWN/content/tmp_files/2301.13123v1.pdf.txt ADDED
@@ -0,0 +1,1848 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Exploring Current Constraints on Antineutrino Production by 241Pu and Paths Towards the
2
+ Precision Reactor Flux Era
3
+ Yoshi Fujikake, Bryce Littlejohn,* and Ohana B. Rodrigues†
4
+ Physics Department, Illinois Institute of Technology, Chicago, IL 60616, USA
5
+ Pranava Teja Surukuchi‡
6
+ Wright Laboratory, Yale University, New Haven, CT 06520, USA
7
+ By performing global fits to inverse beta decay (IBD) yield measurements from existing neutrino experi-
8
+ ments based at highly 235U enriched reactor cores and conventional low-enriched cores, we explore current
9
+ direct bounds on neutrino production by the sub-dominant fission isotope 241Pu. For this nuclide, we determine
10
+ an IBD yield of σ241 = 8.16 ± 3.47 cm2/fission, a value (135 ± 58)% that of current beta conversion models.
11
+ This constraint is shown to derive from the non-linear relationship between burn-in of 241Pu and 239Pu in con-
12
+ ventional reactor fuel. By considering new hypothetical neutrino measurements at high-enriched, low-enriched,
13
+ mixed-oxide, and fast reactor facilities, we investigate the feasible limits of future knowledge of IBD yields
14
+ for 235U, 238U, 239Pu, 241Pu, and 240Pu. We find that first direct measurement of the 240Pu IBD yield can be
15
+ performed at plutonium-burning fast reactors, while a suite of correlated measurements at multiple reactor types
16
+ can achieve a precision in direct 238U, 239Pu, and 241Pu yield knowledge that meets or exceeds that of current
17
+ theoretical predictions.
18
+ I.
19
+ INTRODUCTION
20
+ A nuclear reactor primarily generates thermal energy as
21
+ product nuclei inherit (as kinetic energy) and deposit (through
22
+ repeated elastic collisions) excess rest mass energy from the
23
+ fission of heavy nuclides in the reactor’s fuel, such as 235U,
24
+ 238U, 239Pu, 241Pu, and more. Successive decays of these
25
+ neutron-rich product nuclei release additional energy in the
26
+ form of beta particles, gamma-rays, and antineutrinos. While
27
+ the two former product types are additional, sub-dominant
28
+ contributors to heat generation in a reactor, the antineutri-
29
+ nos (νe ) and their associated kinetic energy entirely escape
30
+ the reactor core, offering an attractive avenue for studying
31
+ the properties of neutrinos [1–3], interrogating state-of-the-
32
+ art nuclear data [4], and non-intrusively monitoring nuclear
33
+ reactor cores [5]. Reactor-based νe detectors have demon-
34
+ strated that neutrinos have mass [6–9], and have searched for
35
+ the existence of new heavy neutrino states [10–15] and other
36
+ new physics phenomena [16–23]. By observing discrepan-
37
+ cies with respect to existing theoretical νe flux and energy
38
+ spectrum predictions, they have also highlighted limitations of
39
+ and/or inaccuracies in community fission yield and beta decay
40
+ databases [7, 9, 24–32]. Antineutrino monitoring case studies
41
+ have explored a variety of potential use case scenarios, such
42
+ as thermal power load-following and determination of reactor
43
+ fissile inventory [33–37], and existing νe detectors have con-
44
+ firmed the feasibility of some of these activities [25, 38, 39].
45
+ The average number of antineutrinos released or detected
46
+ per nuclear fission depends on the fission isotope in question:
47
+ different fission isotopes have different fission product yields,
48
+ with each product varying in its distance from the line of sta-
49
+ bility and having its own unique nuclear structure and decay
50
51
52
53
+ scheme. Thus, reactor cores with differing fuel compositions
54
+ are expected to differ in their rate of νe output. These ex-
55
+ pected differences have been explicitly demonstrated in recent
56
+ νe experiments using the inverse beta decay (IBD) interaction
57
+ process, p + νe → e++ n, which has a 1.8 MeV interaction
58
+ threshold and a precisely-predicted cross-section, σIBD(Eν),
59
+ versus νe energy Eν [40]. For these experiments, measured
60
+ νe fluxes have been expressed in terms of an IBD yield per
61
+ fission σf [1]:
62
+ σf(t) =
63
+
64
+ i
65
+ Fi(t)σi.
66
+ (1)
67
+ In this expression, Fi(t) is the fraction of fissions contributed
68
+ by isotope i in the sampled reactor core(s) during the experi-
69
+ ment’s measurement period and σi its IBD yield per fission,
70
+ σi =
71
+
72
+ Si(Eν)σIBD(Eν)dEν.
73
+ (2)
74
+ Here, Si(Eν) is the true produced νe energy (Eν) spectrum
75
+ per fission for isotope i, and σIBD is the inverse beta decay
76
+ interaction cross-section.
77
+ In a straightforward demonstration of variations in νe emis-
78
+ sion between fission isotopes, reported IBD yields σf are
79
+ clearly offset [41] between measurements at 235U-burning
80
+ highly enriched reactor cores [42–48] and measurements per-
81
+ formed at commercial cores burning a mixture of 235U, 238U,
82
+ 239Pu, and 241Pu [7, 49–56]. In a separate demonstration, the
83
+ Daya Bay and RENO experiments have compared IBD yields
84
+ measured in the same detectors at differing points in their sam-
85
+ pled commercial reactors’ fuel cycles, observing higher yields
86
+ during periods with higher (lower) 235U (239Pu) fission frac-
87
+ tions [25, 55].
88
+ By performing fits to a set of σf measurements at reactors
89
+ of well-known fission fraction Fi, one can use Equations 1
90
+ and 2 to directly determine the isotopic IBD yield σi of one
91
+ or more fission isotopes. With a single HEU-based experi-
92
+ ment, the IBD yield for 235U, σ235, can be trivially deter-
93
+ mined as σ235 = σf, since F235 approaches unity for these
94
+ arXiv:2301.13123v1 [hep-ph] 30 Jan 2023
95
+
96
+ 2
97
+ cores. On their own, HEU-based σ235 measurements exhibit
98
+ deficits [57] with respect to commonly-used beta-conversion
99
+ predictions [58, 59], indicating issues in modeling either the
100
+ core’s νe emissions or νe behavior during propagation [60].
101
+ Daya Bay and RENO σf measurements, which encompass
102
+ multiple data points with differing LEU fuel composition
103
+ F235, 238, 239, 241, when combined with modest theoretical
104
+ constraints on σ238, 241, yields from the sub-dominant iso-
105
+ topes 238U and 241Pu, enable determination of isotopic yields
106
+ for both 235U and 239Pu [25, 55]. These measurements show
107
+ a deficit with respect to 235U conversion predictions, but no
108
+ such deficit for 239Pu, providing further credence to the νe
109
+ emission mis-modelling hypothesis. Going further, global fits
110
+ of both LEU and HEU datasets can be used to simultaneously
111
+ determine σ235, 238, 239 [61]: the measured σ238 shows a sig-
112
+ nificant (33±14)% deficit [62] with respect to summation pre-
113
+ dictions based on community-standard nuclear databases [59],
114
+ suggesting potential issues in current 238U fission yield mea-
115
+ surements or evaluations. Future direct determination of iso-
116
+ topic IBD yields for a wider array of fission isotopes beyond
117
+ 235U, 239Pu, and 238U, as well as improved precision for these
118
+ three isotopes, can lead to further understanding or improve-
119
+ ment of existing nuclear data, reactor νe models, and reactor-
120
+ based fundamental physics studies.
121
+ Improved isotopic IBD yield measurements also hold po-
122
+ tential benefits for future νe -based applications. Some ad-
123
+ vanced reactor technologies present unique safeguards chal-
124
+ lenges that may be satisfied by near-field νe -based monitor-
125
+ ing capabilities [63]. However, neutrino emissions have never
126
+ been measured at advanced reactor cores, some of which dif-
127
+ fer substantially from measured HEU and LEU reactor types
128
+ in both fuel composition and core neutronics [35, 64, 65].
129
+ For example, mixed-oxide reactor fuels, which, unlike con-
130
+ ventional low-enriched fuel, are produced from a mixture of
131
+ uranium and plutonium isotopes, may be deployed in future
132
+ reactors to realize a closed nuclear fuel cycle or as a means of
133
+ disposing of existing plutonium stockpiles. Fast fission reac-
134
+ tor technologies, which, unlike conventional thermal reactors,
135
+ rely on fast neutron induced fission to maintain criticality, may
136
+ offer safety and sustainability advantages with respect to con-
137
+ ventional reactor types. For these reactors, better direct deter-
138
+ minations of true underlying σi can enable more robust and
139
+ reliable future monitoring capabilities than would be possible
140
+ using existing demonstrably imperfect models of νe produc-
141
+ tion per fission.
142
+ In this paper, we study how existing and potential future
143
+ IBD measurements can provide first direct glimpses at νe
144
+ production by previously unexplored fission isotopes and im-
145
+ prove our precision in understanding of the more-studied iso-
146
+ topes 235U, 239Pu, and 238U. By performing loosely con-
147
+ strained fits of isotopic IBD yields to existing LEU and HEU
148
+ datasets, we demonstrate the feasibility of achieving non-
149
+ trivial future bounds on νe production by 241Pu. By applying
150
+ the same fit techniques to hypothetical future high-precision
151
+ IBD yield measurements at HEU, LEU, MOX, and fast fis-
152
+ sion reactors, we show that direct IBD yield determinations
153
+ for all four primary fission isotopes (235U, 238U, 239Pu, and
154
+ 241Pu) can meet or exceed the claimed precision of exist-
155
+ ing conversion-based predictions while also placing the first
156
+ meaningful bounds on 240Pu νe production.
157
+ We begin in Section II with a description of the global fit
158
+ and existing and hypothetical future IBD yield datasets. Re-
159
+ sults of the fit to existing datasets and studies of 241Pu limits
160
+ are presented and discussed in Sections III. In Section IV, we
161
+ describe the set of considered future hypothetical experiments
162
+ and the result of applying global fits to the hypothetical re-
163
+ sults of these experiments. Main results are then summarized
164
+ in Section V.
165
+ II.
166
+ GLOBAL DATASETS AND FIT TECHNIQUE
167
+ In this analysis we perform fits to a set of IBD rate measure-
168
+ ments with varying degrees of systematic correlation between
169
+ each measurement set. For an individual measurement, the
170
+ number of IBD interactions N detected per time interval t can
171
+ be described as:
172
+ N = NpεP(L)
173
+ 4πL2
174
+ � Wth(t)σf(t)
175
+ ¯E(t)
176
+ dt,
177
+ (3)
178
+ where Np is the number of target protons, ε is the efficiency
179
+ of detecting IBDs, P(L) is the survival probability due to
180
+ neutrino oscillations, and L is the core-detector distance. Of
181
+ the time-dependent quantities, Wth(t) is the reactor’s thermal
182
+ power, ¯E(t) = �
183
+ i Fi(t)ei is the core’s average energy re-
184
+ leased per fission, ei is the average energy released per fission
185
+ of isotope i, and Fi(t) and σf(t), as in Equations 1 and 2, are
186
+ the fission yields and IBD yields of isotope i. In order to per-
187
+ form one or multiple measurements of σf, a reactor νe flux
188
+ experiment must measure N while characterizing the other
189
+ reactor and detector inputs in Equation 3.
190
+ A.
191
+ Existing Datasets
192
+ Many experiments have successfully measured σf values
193
+ and associated statistical and systematic uncertainties. As in-
194
+ put for this study, we include time-integrated IBD yield mea-
195
+ surements and uncertainties reported by the Goesgen, Bugey-
196
+ 3, Bugey-4, Rovno, Palo Verde, CHOOZ, and Double Chooz
197
+ LEU-based experiments and the ILL, Savannah River, Kras-
198
+ noyarsk, Nucifer and STEREO HEU-based experiments, as
199
+ well as the highly-correlated datasets at varying Fi from the
200
+ Daya Bay and RENO experiments. Calculated fission frac-
201
+ tions and measured yields for these experiments, as well as as-
202
+ sociated uncertainties and cross-measurement systematic cor-
203
+ relations, have been summarized in Ref. [66], and are used
204
+ for portions of this paper’s analysis. Input data tables are pro-
205
+ vided in the public GitHub repository [67] provided by the
206
+ authors as an accompaniment to this analysis. Since we do
207
+ not consider short-baseline oscillations as part of this analysis,
208
+ reactor-detector baselines are not used in analysis of existing
209
+ datasets, but are nonetheless provided in these tables.
210
+
211
+ 3
212
+ B.
213
+ Hypothetical Future Datasets
214
+ For this study, we also generate hypothetical future IBD
215
+ yield datasets and uncertainty budgets matching the expected
216
+ capabilities of experimental deployments at HEU, LEU, MOX
217
+ and fast reactor types. These are also provided in the GitHub
218
+ supplementary materials, along with assumed uncertainty co-
219
+ variance matrices for all considered hypothetical measure-
220
+ ments.
221
+ Hypothetical IBD yield measurements are Asimov
222
+ datasets free of statistical and systematic fluctuations that are
223
+ generated according to Equation 3. As input to this equa-
224
+ tion, fission fractions are required for each host reactor and
225
+ are described below.
226
+ To match general indications from
227
+ recent summations [32] and fission beta [68], and νe flux
228
+ evolution [25] measurements, and matching the approach in
229
+ Ref. [61], we choose input ‘true’ IBD yield values match-
230
+ ing a scenario where Huber-Mueller modelled yields [69]
231
+ are only incorrect for 235U: (σ235, σ238, σ239, σ241) =
232
+ (6.05,10.10,4.40,6.03) ×10−43 cm2/fission.
233
+ The yield for
234
+ 240Pu has not been predicted in the literature to our knowl-
235
+ edge, so we estimate it by applying a 3Z-A scaling suggested
236
+ in Ref. [70] to the four previously-mentioned isotopes; the
237
+ determined central value is σ240 = 4.96 ×10−43 cm2/fission.
238
+ Other experimental assumptions regarding detector, reactor,
239
+ and experimental layout parameters are then required to de-
240
+ fine the statistical and systematic uncertainties associated with
241
+ each hypothetical IBD yield measurement.
242
+ The HEU-based measurement is modeled after the HFIR
243
+ facility at Oak Ridge National Laboratory, sporting 85 MW
244
+ of thermal power, a 100% 235U fission fraction, and a 7 m
245
+ reactor-detector center-to-center distance. LEU-based mea-
246
+ surements are assumed to occur at a 20 m center-to-center dis-
247
+ tance from a core following the attributes of a 2.9 GWth Daya
248
+ Bay core with an 18 month fuel cycle. Assumed fission frac-
249
+ tions are chosen to fall roughly in the middle of the range
250
+ reported for Daya Bay’s cores in Fig. 1 of Ref. [75], and cor-
251
+ respond to a fully-loaded core with roughly 1/3 of its rods con-
252
+ taining fresh (pure uranium oxide at start-up) fuel; this level
253
+ of partial reloading is customary when operating cores of this
254
+ type.
255
+ MOX-based measurements are modelled after the MOX
256
+ reactor studies of Ref. [72], and is assumed to occur 20 m
257
+ from a core with a 3.2 GWth thermal power and 18 month cy-
258
+ cle length, and fission fractions matching those of the sim-
259
+ ulated 50% weapons-grade MOX-burning core.
260
+ Weapons-
261
+ grade (WG) plutonium is characterized by low 240Pu and
262
+ 241Pu isotopic fractions, and thus a low F241 fission fraction
263
+ at reactor start-up. These WG-MOX core parameters corre-
264
+ spond to a realizable operational scenario implemented for
265
+ the goal of plutonium stockpile disposition in a commercial
266
+ reactor core. We will also reference a similar case where 50%
267
+ reactor-grade (RG) MOX fuel is used in the same reactor type;
268
+ these parameters correspond to an operational scenario for a
269
+ commercial complex operated as part of a closed nuclear fuel
270
+ cycle program. Following recommendations of the authors
271
+ of Ref. [72], fission fractions for the WG-MOX core exam-
272
+ ple are assumed to match the reported fission fractions for the
273
+ first third of pictured 50% WG-MOX running in Ref. [72],
274
+ while fractions from the RG-MOX case are assumed to match
275
+ the those of 50% WG-MOX running between days 800 and
276
+ 1350 [76]; fission fractions were extracted by interpolating
277
+ fission rates from this reference and normalizing such that the
278
+ sum for the four primary fission isotopes is equal to unity.
279
+ It should be stressed that modeled fuel content evolution for
280
+ LEU and MOX cores is highly dependent on the initial condi-
281
+ tions of the fuel, on the neutronics of the involved core type,
282
+ and on reactor operations. In this study, we include one spe-
283
+ cific fission fraction set for each fuel type – LEU, WG-MOX,
284
+ and RG-MOX; the impact or potential benefits of further vari-
285
+ ations between LEU or MOX core types is not considered.
286
+ Finally, two experiments are assumed to occur at the base-
287
+ lines of 20 m and 7 m distances from the primarily plutonium-
288
+ burning 1.25 GWth PFBR fast breeder reactor in India [73]
289
+ and the 300 GWth Versatile Test Reactor fast reactor [74] re-
290
+ spectively. The former reactor plays a central role in plans for
291
+ realization of an independent, sustainable nuclear fuel cycle
292
+ in India, while the latter has been developed as a US-based
293
+ reactor materials and irradiation R&D facility based at Idaho
294
+ National Laboratory [64]. Assumed reactor and site parame-
295
+ ters for all measurements are summarized in Table I; fission
296
+ fraction values for all hypothetical measurement data points
297
+ used in this study are illustrated in Figure 1.
298
+ 0
299
+ 5
300
+ 10
301
+ 15
302
+ 20
303
+ 25
304
+ 30
305
+ Data Points
306
+ 0
307
+ 0.2
308
+ 0.4
309
+ 0.6
310
+ 0.8
311
+ 1
312
+ Fission Fraction
313
+ Fission fractions in PROS HEU+LEU+WGMOX+RGMOX+VTRRx+PFBR
314
+ U235
315
+ U238
316
+ Pu239
317
+ Pu240
318
+ Pu241
319
+ HEU
320
+ LEU
321
+ WG MOX
322
+ RG MOX
323
+ VTR
324
+ PFBR
325
+ FIG. 1. Fission fractions used for hypothetical future measurement
326
+ data points described in this section. See text for details.
327
+ For all experiments, an IBD detector matching qualities of
328
+ the 4 ton PROSPECT reactor νe detector are used [77]; rel-
329
+ evant parameters are also listed in Table I. In some cases, a
330
+ 1 ton detector with otherwise similar experimental parame-
331
+ ters is also considered; this case enables investigation of the
332
+ value of using a near-future compact νe monitoring detector,
333
+ such as the Mobile Antineutrino Demonstrator [78] (MAD),
334
+ to perform IBD yield benchmarking measurements at multi-
335
+ ple reactor locations. In all cases, the statistical uncertain-
336
+ ties associated with each datapoint for each reactor-detector
337
+ combination are estimated using the associated detector and
338
+ reactor parameters quoted in Table. I and lie between 0.15
339
+ % and 0.2 %. For simplicity, we do not consider statistical
340
+
341
+ 4
342
+ Parameter
343
+ HEU LEU MOX Fast (PFBR) Fast (VTR)
344
+ Reactor
345
+ Thermal Power (MWth)
346
+ 85
347
+ 2900 3200
348
+ 1250
349
+ 300
350
+ Burnup Profile
351
+ -
352
+ [71]
353
+ [72]
354
+ [73]
355
+ [74]
356
+ Reactor Cycle Length
357
+ 24 d
358
+ 1.5 y 1.5 y
359
+ 1.5 y
360
+ 100 d
361
+ Experimental
362
+ Core-Detector Distance (m)
363
+ 7 m
364
+ 20 m 20 m
365
+ 20 m
366
+ 20 m
367
+ Data-Taking Length
368
+ 3 y
369
+ 1.5 y 1.5 y
370
+ 1 y
371
+ 100 d
372
+ Detector
373
+ Active Mass
374
+ 4 ton (1 ton)
375
+ Target Protons
376
+ 2×1029 (0.5×1029)
377
+ IBD Detection Efficiency
378
+ 40%
379
+ Uncertainty, Reactor
380
+ Thermal Power
381
+ 1.0% 0.5% 0.5%
382
+ 1.0%
383
+ 1.0%
384
+ Fission Fractions
385
+ -
386
+ 0.6% 0.6%
387
+ 0.6%
388
+ 0.6%
389
+ Energy per Fission
390
+ 0.1% 0.2% 0.2%
391
+ 0.2%
392
+ 0.2%
393
+ Uncertainty, Detector
394
+ Target Protons
395
+ 1.0%
396
+ Detection Efficiency
397
+ 0.75%
398
+ IBD Cross Section
399
+ 0.1%
400
+ Total Reactor Systematic
401
+ 0.5% 0.8% 0.8%
402
+ 1.2%
403
+ 1.2%
404
+ Total Detector Systematic
405
+ 1.3%
406
+ TABLE I. Assumed reactor and site parameters for the hypothetical future short-baseline reactor experiments described in the text.
407
+ and systematic uncertainty contributions from IBD-like back-
408
+ grounds; for a PROSPECT-like detector expecting signal-to-
409
+ background ratios of better than 4 (10) deployed on-surface at
410
+ an HEU (LEU) reactor [79], IBD counts would be expected to
411
+ dominate measurement statistical uncertainties.
412
+ Hypothetical measurements should also be accompanied by
413
+ predicted reactor- and detector-related systematic uncertain-
414
+ ties, which are also summarized in Table I. Systematics for
415
+ most cores are dominated by the uncertainty in the thermal
416
+ power produced by the operating core. Commercial reactor
417
+ companies have provided sub-percent precision in reported
418
+ thermal powers for existing IBD yield measurements at nu-
419
+ merous reactor sites [80, 81]; for this reason, we choose 0.5%
420
+ uncertainty for LEU and MOX cores. While similar thermal
421
+ power measurement devices and strategies could be applied
422
+ to HEU facilities, in practice, legacy systems used in exist-
423
+ ing HEU facilities have recently provided thermal power un-
424
+ certainties closer to 2% [48]; for this analysis, we optimisti-
425
+ cally assume implementation of upgraded measurement sys-
426
+ tems or techniques capable of providing 1% precision at an
427
+ HEU core. Advanced technologies for time-stable and high-
428
+ precision thermal power monitoring in sodium-cooled fast re-
429
+ actors like PFBR and VTR are under active development, due
430
+ to the difficulties associated with the coolant’s high temper-
431
+ ature and chemical corrosiveness; given the lack of available
432
+ quantitatively demonstrated capabilities, we also assume a 1%
433
+ thermal power uncertainty for this core type. While thermal
434
+ power uncertainties for different reactors are assumed to be
435
+ uncorrelated, this uncertainty is correlated between multiple
436
+ measurements at the same core. Measured IBD yields for an
437
+ experiment will also be uncertain due to the limits in knowl-
438
+ edge of fission fractions in the core, which is defined via de-
439
+ tailed reactor core simulations. In the absence of these cal-
440
+ culations for all core types, we will assume an uncertianty
441
+ of 0% for the HEU experiment and 0.6% for all other cores,
442
+ following the value quoted by Daya Bay and others for LEU
443
+ cores [71]. This uncertainty is also assumed to be uncorre-
444
+ lated between cores, but correlated between measurements at
445
+ the same core. Isotopic energy release per fission ei – re-
446
+ quired for calculating expected experiment statistics – have
447
+ minor IBD yield uncertainty contributions of 0.1% to 0.2%
448
+ depending on core fuel content [82]; the ei central value and
449
+ uncertainty for 240Pu is assumed to match that of 241Pu.
450
+ On the detector side, uncertainties are dominated by the
451
+ limited knowledge of IBD detection efficiency, assumed to be
452
+ known with 0.75% precision, as well as knowledge of the to-
453
+ tal number of protons within the detector’s target region, as-
454
+ sumed to be known to 1%; these chosen values reflect those
455
+ achieved in a range of recent large- and small-detector IBD
456
+ experiments [48, 55, 83, 84]. In this analysis, we consider
457
+ the possibility of moving a single reactor neutrino detector to
458
+ multiple reactor core types to perform systematically corre-
459
+ lated IBD yield measurements; for this reason, unless other-
460
+ wise mentioned, we treat detector systematic uncertainties as
461
+ correlated between all measurements.
462
+
463
+ 5
464
+ C.
465
+ Global Fit Approach
466
+ To obtain isotopic IBD yields in this analysis, we use a
467
+ least-squares test statistic:
468
+ χ2 =
469
+
470
+ a,b
471
+
472
+ σf,a − r
473
+
474
+ i
475
+ Fi,aσi
476
+
477
+ V−1
478
+ ab
479
+
480
+ σf,b − r
481
+
482
+ i
483
+ Fi,bσi
484
+
485
+ +
486
+
487
+ j,k
488
+ (σth
489
+ j − σj)V−1
490
+ ext,jk(σth
491
+ k − σk).
492
+ (4)
493
+ In this fit, experimental inputs Fi and σf are as described
494
+ above, and the sum i is run over five fission isotopes, 235U,
495
+ 238U, 239Pu, 241Pu, and 240Pu, with five attendant IBD yield
496
+ fit parameters.
497
+ The experimental covariance matrix V de-
498
+ fines the uncertainties for each experiment and their cross-
499
+ correlations, as described in the previous-subsection.
500
+ The
501
+ final term is used to constrain fitted σi values to theoreti-
502
+ cal predictions by adding a penalty that increases as the two
503
+ quantities diverge.
504
+ In contrast to most recent global IBD
505
+ yield fits [25, 57, 85], we are interested in examining weakly-
506
+ constrained or un-constrained simultaneous fits of all relevant
507
+ fission isotopes’ IBD yields. For this reason, j and k sum only
508
+ over the three sub-dominant isotopes, 238U, 241Pu, and 240Pu,
509
+ and the 3×3 V−1
510
+ ext is diagonal (no assumed uncertainty correla-
511
+ tion between isotopes), with elements set to achieve wide 1σ
512
+ theoretical constraints of 75% of the predicted yield. To com-
513
+ pare to previous IBD yield fits [61, 86], we occasionally con-
514
+ sider the much tighter (2.6%) bounds on σ241 quoted by the
515
+ Huber model [58]. For fits not involving fast reactor datasets,
516
+ σ240 is pegged to the theoretically-predicted value, and has no
517
+ effect on the subsequent 4-parameter fit.
518
+ III.
519
+ FITS TO EXISTING DATASETS AND 241PU IBD
520
+ YIELD CONSTRAINTS
521
+ We first consider IBD yield fits applied to the existing
522
+ global yield datasets described briefly in Section II A. By first
523
+ applying tight 2.6% constraint on 241Pu, we largely reproduce
524
+ unconstrained 235U, 238U, and 239Pu yield best-fit values re-
525
+ ported for the oscillation-free fit in Ref. [86]. Test statistic
526
+ values with respect to the best-fit (∆χ2) versus input value
527
+ are shown for each isotope in Figure 2, while minimizing over
528
+ the three other isotopic yield parameters. We observe a best-
529
+ fit 235U yield more than 3σ (5%) below the Huber-predicted
530
+ value, and a best-fit 238U yield that deviates from the pre-
531
+ dicted central value by (36±20), slightly more than in previ-
532
+ ous fits [86]. As in previous fits, the 239Pu yield is found to be
533
+ consistent with Huber-predicted values within a 5%, ∼ 1σ un-
534
+ certainty band. This similarity in results indicates that the rel-
535
+ atively new STEREO data point [48], while qualitatively bol-
536
+ stering confidence in historical observations of a ∼5% yield
537
+ deficit at HEU cores [87], has fairly modest quantitative im-
538
+ pact on the primary issues surrounding data-model agreement
539
+ for conversion-predicted uranium IBD yields.
540
+ With consistency established with respect to previous anal-
541
+ yses, we proceed with loosening of yield constraints for all
542
+ 0.4
543
+ 0.5
544
+ 0.6
545
+ 0.7
546
+ 0.8
547
+ 0.9
548
+ 1
549
+ 1.1 1.2
550
+ i
551
+ R
552
+ 0
553
+ 1
554
+ 2
555
+ 3
556
+ 4
557
+ 5
558
+ 6
559
+ 7
560
+ 8
561
+ 9
562
+ 10
563
+ 2
564
+ χ
565
+
566
+
567
+ 0.013
568
+ ±
569
+ = 0.953
570
+ 235
571
+ σ
572
+ 0.201
573
+ ±
574
+ = 0.642
575
+ 238
576
+ σ
577
+ 0.044
578
+ ±
579
+ = 1.047
580
+ 239
581
+ σ
582
+ 0.026
583
+ ±
584
+ = 1.001
585
+ 241
586
+ σ
587
+ 0.6
588
+ 0.8
589
+ 1
590
+ 1.2
591
+ 1.4
592
+ 1.6
593
+ i
594
+ R
595
+ 0
596
+ 1
597
+ 2
598
+ 3
599
+ 4
600
+ 5
601
+ 6
602
+ 7
603
+ 8
604
+ 9
605
+ 10
606
+ 2
607
+ χ
608
+
609
+
610
+ 0.013
611
+ ±
612
+ = 0.953
613
+ 235
614
+ σ
615
+ 0.264
616
+ ±
617
+ = 0.730
618
+ 238
619
+ σ
620
+ 0.252
621
+ ±
622
+ = 0.910
623
+ 239
624
+ σ
625
+ 0.426
626
+ ±
627
+ = 1.353
628
+ 241
629
+ σ
630
+ FIG. 2. Isotopic IBD yield fit results for the existing global dataset
631
+ with tight (top, 2.6%) and loose (bottom, 75%) external constraints
632
+ on the 241Pu yield. Test statistic values with respect to the best-fit
633
+ (∆χ2) are shown versus input value for each of the four primary
634
+ fission isotopes. For each isotope’s curve, the fit is marginalized over
635
+ the other isotopes.
636
+ fission isotopes. Figure 2 shows reported isotopic ∆χ2 test
637
+ statistic values versus input σ value for each isotope while
638
+ applying a looser constraint on 241Pu of 75%. Best-fit param-
639
+ eters and 1σ ranges are found to be:
640
+ σ235 = 6.37 ± 0.08;
641
+ σ238 = 7.37 ± 1.95;
642
+ σ239 = 4.00 ± 1.01;
643
+ σ241 = 8.16 ± 3.47.
644
+ (5)
645
+ The best-fit χ2
646
+ min is found to be 26.2 for 38 degrees of free-
647
+ dom (41 data points, 3 fit parameters), indicating an accept-
648
+
649
+ 6
650
+ able goodness-of-fit.
651
+ However, this value is only slightly
652
+ lower than that provided by the more-constrained fit (χ2
653
+ min
654
+ = 26.6), indicating that this enhanced freedom has not sub-
655
+ stantially improved data-model agreement.
656
+ Central values
657
+ of 235U, 238U, and 239Pu fit parameters are relatively sta-
658
+ ble, remaining within 15% of those provided by the more-
659
+ constrained fit. Meanwhile, the newly freed 241Pu yield in-
660
+ creases by 35%, although σ241 nonetheless remains consistent
661
+ with its model-predicted value within its large 43% relative
662
+ uncertainty band. Thus it appears that the current global IBD
663
+ yield dataset does not have the statistical power to provide
664
+ meaningful tests of underlying modelling issues for 241Pu.
665
+ The disappointing lack of new insight should not be too sur-
666
+ prising, given the small (O(5%) or less) fractional contribu-
667
+ tion of 241Pu fissions in all existing measured reactor cores.
668
+ However, it is interesting to note that σ241 1σ error bands
669
+ are found to be tighter than the externally-applied constraint.
670
+ This indicates that there are features in the existing global
671
+ dataset that provide the power to specifically constrain 241Pu.
672
+ To attempt to identify these features, we examined correla-
673
+ tions between fitted isotopic yields, which are depicted in Fig-
674
+ ure 3 as best-fit parameter space regions in two dimensions be-
675
+ tween 241Pu and the other three isotopes. Substantial 241Pu-
676
+ 239Pu and 241Pu-238U degeneracies can be observed, with the
677
+ former reflected in a more than five-fold increase in uncertain-
678
+ ties on σ239 between the more-constrained (4% uncertainty)
679
+ and less-constrained (25% uncertainty) fits. Degeneracies can
680
+ also be expressed by calculating correlation coefficients be-
681
+ tween the fitted yield parameters, which are also given in the
682
+ legends of Fig 3:
683
+ ρσi,σj = (σi − σi)(σj − σi)
684
+ σσiσσj
685
+ (6)
686
+ The extreme 241Pu-239Pu correlation can be understood by
687
+ observing the fission fraction evolution trends experienced by
688
+ LEU reactors, as depicted in Figure 1. In these cores, F239
689
+ and F241 rise in tandem with reactor fuel burn-up, making it
690
+ hard for unconstrained fits to simultaneously determine both
691
+ σ239 and σ241. It can also be understood as a simple reality
692
+ of underlying nuclear physics in the core: 241Pu is produced
693
+ by via multi-neutron capture on 239Pu, and thus its build-up in
694
+ the core is dependent on the build-up of the latter. In aspects
695
+ of previous multi-datapoint LEU analyses, such as those of
696
+ Daya Bay [25, 88] and RENO [55], 241Pu and 239Pu fission
697
+ fractions are treated as explicitly linearly correlated.
698
+ We examine the limits of this linear correlation by gener-
699
+ ating hypothetical LEU reactor IBD yield datasets following
700
+ the method described in Section II B and fission yields from
701
+ Figure 1: one dataset assumes isotopic yields matching the
702
+ best-fit for the existing global dataset, and the other assumes
703
+ true 241Pu and 239Pu yields close to the axis of anti-correlation
704
+ between the two datasets, but beyond the 1σ bounds allowed
705
+ by the data. Chosen true yields for this test are illustrated
706
+ in the right panel of Figure 3; the 238U yield for this case,
707
+ 8.8 cm2/fission, was chosen to vertically align the two yield
708
+ datasets for easier comparison of trends. Hypothetical yields
709
+ for these two cases are pictured in Figure 4. The test cases
710
+ clearly differ in the change in slope, or curvature, present in
711
+ the LEU data points, providing an indication of the primary
712
+ source of unique 241Pu yield information in current and fu-
713
+ ture experimental data. The extreme 239Pu-241Pu yield offset
714
+ in this example amplifies the impact of a modest non-constant
715
+ relationship between F239 and F241 in LEU-based datasets,
716
+ which is also illustrated in Figure 4. To test the validity of
717
+ this hypothesis with existing datasets, we perform a fit to only
718
+ the RENO and Daya Bay LEU datasets while applying loose
719
+ 75% external constraints on all four isotopes. While large un-
720
+ certainty increases are seen in σ235 and σ238, σ239 and σ241
721
+ fractional uncertainties are altered by <30%, and fractional
722
+ bounds on σ241 (43%) remain tighter than the 75% external
723
+ constraint. Thus, in the existing global dataset, it does ap-
724
+ pear that that the Daya Bay and RENO LEU data points are
725
+ responsible for the modest breaking of degeneracy between
726
+ 239Pu and 241Pu yields.
727
+ Adding this to previously-established trends, it is straight-
728
+ forward to recount the independent features of the global IBD
729
+ yield dataset that enable determination of all four isotopes’
730
+ IBD yields:
731
+ • HEU-based experiments’ σf measurements directly
732
+ constrain σ235 [57].
733
+ • The measured relative linear σf slope versus fuel
734
+ burn-up at LEU-based experiments directly constrains
735
+ σ239 [25].
736
+ • The time-integrated offset in σf between HEU and LEU
737
+ cores constrains σ238 [61].
738
+ • The curvature of σf slope versus fuel burn-up at LEU
739
+ experiments constrains σ241.
740
+ As we move on to consider possible future IBD yield mea-
741
+ surement scenarios, these high-level principles serve to guide
742
+ attention toward those with particular promise for improving
743
+ global knowledge of isotopic yields. In particular, we will
744
+ look to explore new multi-dataset measurements that can pro-
745
+ vide an enhanced view of σf curvature with host reactor fuel
746
+ evolution.
747
+ We end this Section by noting that within the current global
748
+ dataset, Daya Bay contains currently-unexploited potential.
749
+ Ref. [75] indicates O(5%) F241/F239 variations between re-
750
+ actor cycles that are averaged out in its current fuel content
751
+ binning scheme. To estimate the achievable gains in the fis-
752
+ sion yields, we generate an Asimov IBD yield dataset with fis-
753
+ sion fractions taken from a combination of rates, RENO and
754
+ Daya Bay-like experiment is divided into two halves; one with
755
+ the default fission fractions while the other having F241/F239
756
+ relatively reduced by 2.5%. The systematic and statistical un-
757
+ certainties are assumed to match the existing global dataset
758
+ and the yields are generated using best-fit results from the
759
+ global dataset. Such a joint fit provides a modest improvement
760
+ in the precision of fission yield of (σ235, σ238, σ239, σ241) =
761
+ (1.3%, 24.8%, 19.7%, 39.2%) compared to the precision of
762
+ (1.3%, 26.4%, 25.2%, 42.6%) for the existing global dataset.
763
+ If we further double the statistics of the Daya Bay Asimov
764
+ data–as expected from the full Daya Bay dataset—in conjunc-
765
+ tion with the modified binning in fission fractions, we find
766
+
767
+ 7
768
+ 0
769
+ 1
770
+ 2
771
+ 3
772
+ 4
773
+ 5
774
+ 6
775
+ 7
776
+ 8
777
+ /fission]
778
+ 2
779
+ cm
780
+ -43
781
+ [10
782
+ 239
783
+ σ
784
+ 0
785
+ 2
786
+ 4
787
+ 6
788
+ 8
789
+ 10
790
+ 12
791
+ 14
792
+ 16
793
+ 18
794
+ 20
795
+ 22
796
+ /fission]
797
+ 2
798
+ cm
799
+ -43
800
+ [10
801
+ 241
802
+ σ
803
+ Correlation: -0.990
804
+ 6
805
+ 6.2
806
+ 6.4
807
+ 6.6
808
+ 6.8
809
+ /fission]
810
+ 2
811
+ cm
812
+ -43
813
+ [10
814
+ 235
815
+ σ
816
+ 0
817
+ 2
818
+ 4
819
+ 6
820
+ 8
821
+ 10
822
+ 12
823
+ 14
824
+ 16
825
+ 18
826
+ 20
827
+ 22
828
+ /fission]
829
+ 2
830
+ cm
831
+ -43
832
+ [10
833
+ 241
834
+ σ
835
+ Correlation: 0.013
836
+ 0
837
+ 2
838
+ 4
839
+ 6
840
+ 8
841
+ 10
842
+ 12
843
+ 14
844
+ /fission]
845
+ 2
846
+ cm
847
+ -43
848
+ [10
849
+ 238
850
+ σ
851
+ 0
852
+ 2
853
+ 4
854
+ 6
855
+ 8
856
+ 10
857
+ 12
858
+ 14
859
+ 16
860
+ 18
861
+ 20
862
+ 22
863
+ /fission]
864
+ 2
865
+ cm
866
+ -43
867
+ [10
868
+ 241
869
+ σ
870
+ Correlation: 0.757
871
+ FIG. 3. Isotopic IBD yield fits for the existing global dataset with loose (75%) external constraints on the 241Pu IBD yield, σ241. Contours
872
+ are pictured for σ241 relative to the other isotopic yields, with the fit marginalized over the non-pictured isotopes. Correlation coefficients
873
+ between fitted σ241 and the other yields are given in the plot legends. Also shown in dashed lines are the theoretical IBD yields predicted by
874
+ the Huber-Mueller model. Stars indicate IBD yields chosen for illustration in Fig. 4.
875
+ 5.65
876
+ 5.7
877
+ 5.75
878
+ 5.8
879
+ 5.85
880
+ 5.9
881
+ 5.95
882
+ 6
883
+ 6.05
884
+ 6.1
885
+ /fission]
886
+ 2
887
+ cm
888
+ -43
889
+ IBD yield [10
890
+ Nominal IBD yields
891
+ Modified IBD yields
892
+ 0.45
893
+ 0.5
894
+ 0.55
895
+ 0.6
896
+ 0.65
897
+ 0.7
898
+ 0.75
899
+ 235
900
+ F
901
+ 0.14
902
+ 0.16
903
+ 0.18
904
+ 0.2
905
+ 0.22
906
+ 0.24
907
+ 239
908
+ /F
909
+ 241
910
+ F
911
+ Daya Bay
912
+ RENO
913
+ FIG. 4. Top: IBD yield sets for two hypothetical LEU measure-
914
+ ments: one assuming measurements align with isotopic IBD yields
915
+ matching the best-fit for the existing global dataset, and another as-
916
+ suming alignment with σ239 and σ241 values matching those indi-
917
+ cated in Figure 3. The latter scenario’s values lie outside of the 1
918
+ σ region preferred by the global IBD yield dataset; for this scenario,
919
+ σ238 is reduced to enable better vertical alignment of the two datasets
920
+ and easier comparison of slopes. Bottom: Ratio (F241/F239) of the
921
+ fission yields of 241Pu and239Pu for the hypothetical LEU dataset.
922
+ Realized F235 ranges for RENO and Daya Bay datasets are also pic-
923
+ tured.
924
+ a further improvement in precision to (1.3%, 21.7%, 16.4%,
925
+ 30.8%). Thus, we conclude that it may be worthwhile for
926
+ Daya Bay to consider a more diversified fuel content binning
927
+ scheme in a future analysis of its final full-statistics IBD yield
928
+ dataset. This observation may also be applicable to other high-
929
+ statistics datasets spanning many LEU reactor cycles, such as
930
+ those recorded by RENO and DANSS [12].
931
+ IV.
932
+ FUTURE IMPROVEMENTS FROM NEW
933
+ MEASUREMENTS AT MULTIPLE CORE TYPES
934
+ We now turn to consideration of future improvements in
935
+ global knowledge of isotopic IBD yields by performing new
936
+ measurements at a range of different reactor core types. We
937
+ will begin by considering the most imminently-achievable
938
+ next steps: short baseline measurements of a single LEU
939
+ core over a full fuel cycle, and a subsequent systematically-
940
+ correlated measurement at an HEU using the same νe de-
941
+ tector.
942
+ We will then proceed to study possible improve-
943
+ ments gained by making measurements at mixed-oxide and
944
+ plutonium-burning fast reactor core types.
945
+ A.
946
+ Benefits of New HEU and LEU Measurements
947
+ Some benefits of new measurements of IBD yields at short
948
+ distances from a full LEU reactor core cycle have already been
949
+ discussed in the literature [61], and have served as part of the
950
+ physics motivation for the NEOS-II experiment [89]. In par-
951
+ ticular, this configuration enables access to a wider range of
952
+ F239 and F235 values beyond those achieved at θ13 exper-
953
+ iments sampling multiple cores, which should result in im-
954
+ proved σ239 constraints. When coupled with a systematically-
955
+ correlated HEU-based measurement, which could be achieved
956
+
957
+ 8
958
+ via two site deployments of the same detector system, di-
959
+ rect constraints on σ238 may exceed the claimed precision
960
+ of the summation prediction of Mueller et al. [59]. Multi-
961
+ ple current or near-future efforts, such as PROSPECT-II [79]
962
+ or MAD [78], are well-suited to realize part or all of this com-
963
+ bined LEU-HEU measurement program.
964
+ Such a setup would also broaden access to LEU fuel content
965
+ regimes with less linear relationships between F239 and F241,
966
+ allowing for improved constraint of σ241. This improvement
967
+ was demonstrated above for the hypothetical LEU measure-
968
+ ments in Figure 4. Realized effective F239 ranges for Daya
969
+ Bay and RENO are also highlighted with shaded bands; we
970
+ note that offsets in median F235 (and, while not pictured, also
971
+ F241/F239) between hypothetical LEU and Daya Bay/RENO
972
+ cases is due to the specifics of the single cycle core loading
973
+ simulated in Ref. [71]. A new short-baseline LEU measure-
974
+ ment set can capture periods earlier and later in the fuel cycle
975
+ of a conventional LEU core with respect to RENO and Daya
976
+ Bay, when relative contributions of 239Pu and
977
+ 241Pu fissions
978
+ deviate most strongly from their cycle-integrated mean. For
979
+ the hypothetical short-baseline LEU measurement, F239/F241
980
+ varies roughly 6%, from 17% to 23%, over a cycle. Daya
981
+ Bay’s and RENO’s F241/F239 ratios, meanwhile vary by only
982
+ 3% or less, with maximums and minimums of 20% and 17%,
983
+ respectively [25, 55].
984
+ The extent to which these HEU and LEU measurements can
985
+ improve constraints on σ241 has so far not been investigated in
986
+ the literature. To do so, we apply the four-parameter yield fit
987
+ of Eq. 5 to the hypothetical HEU and LEU datasets described
988
+ in Section II B, Table I, and Figure 1. Table II gives the result-
989
+ ing precision in measurements of the four isotopic IBD yields
990
+ probed by this new HEU+LEU dataset. The most striking dif-
991
+ ference with respect to the current global dataset is the sub-
992
+ stantial improvement in knowledge of 239Pu and 241Pu yields.
993
+ Uncertainties in σ239 and σ241 are improved from 25.2% and
994
+ 42.6% in the existing dataset to 4.6% and 10.5%, respectively,
995
+ greater than four-fold improvement in both values. As illus-
996
+ trated in Figure 5, this improvement can be partially attributed
997
+ to the reduction in degeneracy between these two isotopes’ fis-
998
+ sion fraction variations over a full LEU fuel cycle. If all mea-
999
+ surements are instead performed with a 1 ton detector, more
1000
+ closely approximating the expected size of the MAD detec-
1001
+ tor, uncertainties are similar in size, with σ235,238,239,241 shift-
1002
+ ing from (1.6%, 11.2%, 4.6%, 10.5%) for the PROSPECT-II
1003
+ sized detector case to (1.62%, 11.7%, 6.1%, 14.6%) for the
1004
+ MAD detector case. Thus, the HEU+LEU deployment sce-
1005
+ nario may yield major benefits for both physics-oriented or
1006
+ smaller applications-oriented future detectors.
1007
+ As noted in Ref. [61], σ238 constraints are also significantly
1008
+ improved, primarily due to the correlated nature of the detec-
1009
+ tor systematics assumed between the HEU and LEU measure-
1010
+ ments. If this correlation is removed, or if the chosen opti-
1011
+ mistic 1% HEU thermal power uncertainties are increased to
1012
+ the currently-achievable 2% level, precision in knowledge of
1013
+ the 238U yield is substantially reduced – to 18.1% and 17.2%
1014
+ for these two cases, respectively – while precision in knowl-
1015
+ edge of the 241Pu yield is virtually unchanged. Thus, follow-
1016
+ ing the next generation of short-baseline HEU and LEU mea-
1017
+ surements, the precision of knowledge of the 241Pu yield may
1018
+ rival that of its sub-dominant 238U counterpart, and will be
1019
+ less dependent on a detailed understanding of host reactors’
1020
+ thermal powers and on movement-induced changes in detec-
1021
+ tor response. At this point, direct νe -based measurements of
1022
+ 241Pu fission attributes may begin to have useful application
1023
+ in testing the general accuracy of nuclear data knowledge for
1024
+ this isotope – similar to the value provided by νe -based con-
1025
+ straints of 238U from the current global dataset.
1026
+ B.
1027
+ Benefits from MOX Reactor Measurements
1028
+ Reactors burning mixed-oxide (MOX) fuels are another
1029
+ promising venue for performing IBD yield measurements
1030
+ with unique Fi combinations.
1031
+ In particular, the RG-MOX
1032
+ measurement case may be an imminently realizable one, given
1033
+ the presence and operation of RG-MOX commercial cores in
1034
+ Europe and Japan. The 50% reactor-grade mixed-oxide (RG-
1035
+ MOX) core described in Section II B features F239 far higher
1036
+ than an LEU core and broad variations in F241 from nearly
1037
+ 15% at reactor start-up to roughly 25% after one cycle. Ra-
1038
+ tios F239/F241 vary much more widely from cycle beginning
1039
+ (27%) to end (45%) compared to the LEU reactor case above.
1040
+ Amidst these substantial fission fraction variations, 238U frac-
1041
+ tions remain relatively consistent between LEU and RG-MOX
1042
+ cases, offering further opportunity for reduction in degeneracy
1043
+ between 238U and the other isotopes.
1044
+ Addition of a hypothetical ten-datapoint IBD yield dataset
1045
+ from this RG-MOX reactor core provides substantial enhance-
1046
+ ments in IBD yield precision when added to those of the short-
1047
+ baseline HEU and LEU datasets, which are also summarized
1048
+ in Table II. Expected precision of yields σ239 and σ241 are im-
1049
+ proved by another factor of ∼ 2 and ∼ 3 respectively when the
1050
+ hypothetical RG-MOX is added to the fit alongside the hypo-
1051
+ thetical HEU and LEU datasets. Meanwhile, σ238 yield preci-
1052
+ sion is also tightened to 9.7% expected relative uncertainty.
1053
+ Correlations between yield fit parameters for this case are
1054
+ also pictured in Figure 5, and appear further reduced between
1055
+ 239Pu and 241Pu with respect to the hypothetical HEU+LEU
1056
+ case. As with the HEU+LEU case, if measurements are per-
1057
+ formed instead with a MAD-sized 1 ton detector target, only
1058
+ modest degradation in precision is seen: σ235,238,239,241 un-
1059
+ certainties shift from (1.6%, 9.7%, 2.2%, 3.4%) for a 4 ton
1060
+ target to (1.6%, 10.3%, 2.5%, 3.9%) for a 1 ton target. un-
1061
+ certainty. On the other hand, if the correlation between the
1062
+ reactor measurements are removed, or if the chosen opti-
1063
+ mistic 1% HEU thermal power uncertainties are increased to
1064
+ the currently-achievable 2% level, precision in knowledge of
1065
+ the 238U and 241Pu yields are reduced—to 14.9%, 15.4% and
1066
+ 4.3%, 5.0% respectively— and are moderately worse than the
1067
+ theoretical yields. Comparing this with the HEU+LEU case
1068
+ where the precision achievable on 238U yield is 11.1%, the
1069
+ improvement provided by the addition of RG-MOX reactor
1070
+ data doesn’t fully compensate for the loss in precision due to
1071
+ the lack of correlation or a reduction in thermal power uncer-
1072
+ tainty.
1073
+ With measurements at three reactor types – HEU, LEU, and
1074
+
1075
+ 9
1076
+ Case
1077
+ Description
1078
+ Precision on σi (%)
1079
+ 235U 238U 239Pu 240Pu 241Pu
1080
+ -
1081
+ Existing Global Data
1082
+ 1.3
1083
+ 26.4
1084
+ 25.2
1085
+ -
1086
+ 42.6
1087
+ 1
1088
+ HEU + LEU
1089
+ 1.6
1090
+ 11.1
1091
+ 4.6
1092
+ -
1093
+ 10.5
1094
+ 3
1095
+ HEU + LEU + RG-MOX
1096
+ 1.6
1097
+ 9.7
1098
+ 2.2
1099
+ -
1100
+ 3.4
1101
+ 2
1102
+ HEU + LEU + WG-MOX
1103
+ 1.6
1104
+ 9.9
1105
+ 2.5
1106
+ -
1107
+ 3.6
1108
+ 4
1109
+ HEU + LEU + Fast
1110
+ 1.6
1111
+ 10.9
1112
+ 4.6
1113
+ 27.2
1114
+ 10.3
1115
+ 5
1116
+ All
1117
+ 1.6
1118
+ 9.5
1119
+ 2.1
1120
+ 23.6
1121
+ 3.3
1122
+ 6
1123
+ All, Uncorrelated
1124
+ 1.5
1125
+ 14.3
1126
+ 2.1
1127
+ 36.2
1128
+ 4.2
1129
+ -
1130
+ Model Uncertainty [66]
1131
+ 2.1
1132
+ 8.2
1133
+ 2.5
1134
+ -
1135
+ 2.2
1136
+ TABLE II. Constraints on IBD yields of 235U, 238U, 239Pu, 240Pu, and 241Pu, from future hypothetical datasets from LEU and HEU reactors,
1137
+ given as a percentage of the best fit yield. For all cases unless noted, detector systematic uncertainties are assumed to be correlated between
1138
+ measurements, and a 75% external constraint is used for 241Pu and for 240Pu when applicable. The ‘All’ case considers inclusion of HEU, LEU,
1139
+ RG-MOX, VTR and PFBR yield measurements employing the same detector. Model prediction uncertainties from [66] are also provided.
1140
+ 5.8
1141
+ 6
1142
+ 6.2
1143
+ 6.4
1144
+ /fission]
1145
+ 2
1146
+ cm
1147
+ -43
1148
+ [10
1149
+ 235
1150
+ σ
1151
+ 7
1152
+ 8
1153
+ 9
1154
+ 10
1155
+ 11
1156
+ 12
1157
+ 13
1158
+ 14
1159
+ /fission]
1160
+ 2
1161
+ cm
1162
+ -43
1163
+ [10
1164
+ 238
1165
+ σ
1166
+ Correlation: -0.383
1167
+ 5.8
1168
+ 6
1169
+ 6.2
1170
+ 6.4
1171
+ /fission]
1172
+ 2
1173
+ cm
1174
+ -43
1175
+ [10
1176
+ 235
1177
+ σ
1178
+ 4
1179
+ 4.1
1180
+ 4.2
1181
+ 4.3
1182
+ 4.4
1183
+ 4.5
1184
+ 4.6
1185
+ 4.7
1186
+ 4.8
1187
+ /fission]
1188
+ 2
1189
+ cm
1190
+ -43
1191
+ [10
1192
+ 239
1193
+ σ
1194
+ Correlation: 0.772
1195
+ 5.8
1196
+ 6
1197
+ 6.2
1198
+ 6.4
1199
+ /fission]
1200
+ 2
1201
+ cm
1202
+ -43
1203
+ [10
1204
+ 235
1205
+ σ
1206
+ 5.2
1207
+ 5.4
1208
+ 5.6
1209
+ 5.8
1210
+ 6
1211
+ 6.2
1212
+ 6.4
1213
+ 6.6
1214
+ 6.8
1215
+ /fission]
1216
+ 2
1217
+ cm
1218
+ -43
1219
+ [10
1220
+ 241
1221
+ σ
1222
+ Correlation: 0.727
1223
+ 7
1224
+ 8
1225
+ 9
1226
+ 10
1227
+ 11
1228
+ 12
1229
+ 13
1230
+ 14
1231
+ /fission]
1232
+ 2
1233
+ cm
1234
+ -43
1235
+ [10
1236
+ 238
1237
+ σ
1238
+ 4
1239
+ 4.1
1240
+ 4.2
1241
+ 4.3
1242
+ 4.4
1243
+ 4.5
1244
+ 4.6
1245
+ 4.7
1246
+ 4.8
1247
+ /fission]
1248
+ 2
1249
+ cm
1250
+ -43
1251
+ [10
1252
+ 239
1253
+ σ
1254
+ Correlation: -0.511
1255
+ 7
1256
+ 8
1257
+ 9
1258
+ 10
1259
+ 11
1260
+ 12
1261
+ 13
1262
+ 14
1263
+ /fission]
1264
+ 2
1265
+ cm
1266
+ -43
1267
+ [10
1268
+ 238
1269
+ σ
1270
+ 5.2
1271
+ 5.4
1272
+ 5.6
1273
+ 5.8
1274
+ 6
1275
+ 6.2
1276
+ 6.4
1277
+ 6.6
1278
+ 6.8
1279
+ /fission]
1280
+ 2
1281
+ cm
1282
+ -43
1283
+ [10
1284
+ 241
1285
+ σ
1286
+ Correlation: -0.681
1287
+ 4
1288
+ 4.1 4.2
1289
+ 4.3
1290
+ 4.4
1291
+ 4.5
1292
+ 4.6
1293
+ 4.7
1294
+ 4.8
1295
+ /fission]
1296
+ 2
1297
+ cm
1298
+ -43
1299
+ [10
1300
+ 239
1301
+ σ
1302
+ 5.2
1303
+ 5.4
1304
+ 5.6
1305
+ 5.8
1306
+ 6
1307
+ 6.2
1308
+ 6.4
1309
+ 6.6
1310
+ 6.8
1311
+ /fission]
1312
+ 2
1313
+ cm
1314
+ -43
1315
+ [10
1316
+ 241
1317
+ σ
1318
+ Correlation: 0.490
1319
+ FIG. 5. Isotopic IBD yield contours for a combined fit of hypothetical HEU, LEU, and RG-MOX datasets. In each panel, fits are marginalized
1320
+ over the undepicted isotopes. Correlation coefficients between each pair of isotopes are provided in the legend.
1321
+ MOX – with a common detector, direct IBD-based constraints
1322
+ on νe production by the four primary fission isotopes may
1323
+ be expected to rival or exceed the precision of conversion-
1324
+ based predictions. Most of these direct isotopic yield uncer-
1325
+ tainties are also smaller and more well-defined in origin than
1326
+ the O(5%) uncertainty attributed to summation predictions for
1327
+ these isotopes. Thus, with a global HEU+LEU+MOX dataset,
1328
+ one could generate IBD-based reactor νe flux predictions for
1329
+ many existing or future reactor types free from biases known
1330
+ to be present in conversion-predicted models without sacrific-
1331
+ ing relative model precision.
1332
+ Expected isotopic IBD yield measurement precision de-
1333
+ livered by instead combining a ten datapoint weapons-grade
1334
+ mixed-oxide (WG-MOX) measurement with the hypothetical
1335
+ HEU and LEU datasets has also been considered. IBD yield
1336
+ uncertainties for a HEU+LEU+WG-MOX measurement set
1337
+ are slightly worse than a HEU+LEU+RG-MOX set for σ238,
1338
+ σ239, and σ241 as shown in Table II. Similarity in results be-
1339
+ tween MOX fuel types should not be too surprising, since both
1340
+ WG-MOX and RG-MOX cycles roughly span a ∼ 16−17%
1341
+
1342
+ 10
1343
+ range in F239/F241 fission fraction ratios.
1344
+ It is worth noting that wide variations in F239/F241 should
1345
+ also expected to be provided by conventional LEU cores burn-
1346
+ ing entirely fresh fuel, such as would occur upon first oper-
1347
+ ation of a new commercial power plant [90]. In this case,
1348
+ F239/F241 fission fraction ratios should be expected to vary
1349
+ by well over 10% over course of a fuel cycle [76]. Thus, in
1350
+ lieu of MOX-based options, IBD yield measurement regimes
1351
+ including newly started commercial cores likely serve as an-
1352
+ other promising avenue for producing precise constraints on
1353
+ all main fission isotopes.
1354
+ C.
1355
+ Benefits from Fast Reactor Measurements
1356
+ Since fast fission cross-sections of many minor actinides
1357
+ – particularly 240Pu – are substantially higher than ther-
1358
+ mal fission cross-sections, fission fractions in the VTR and
1359
+ PFBR fast reactors are substantially different than those of
1360
+ the high-MOX-fraction conventional core configurations de-
1361
+ scribed in [72]. In particular, 240Pu fissions now compose a
1362
+ non-negligible fraction of the total, and, as a result, 241Pu fis-
1363
+ sion fractions are substantially lower. The addition of the two
1364
+ fast reactor dataset to the hypothetical HEU and LEU datasets
1365
+ is also summarized in Table II. The most striking product of
1366
+ introducing these datasets to the fit is the potential for set-
1367
+ ting the first-ever meaningful constraints on νe production
1368
+ by 240Pu. We find roughly comparable 240Pu yield measure-
1369
+ ments when either VTR or PFBR are fitted separately with the
1370
+ other datasets. Such a measurement could prompt new and
1371
+ deeper study of fission yields and decay data for this minor
1372
+ actinide, which plays a major role in the operation of next-
1373
+ generation fast reactor systems. The level of achievable preci-
1374
+ sion in the σ240 measurement is primarily driven by the preci-
1375
+ sion in understanding the thermal output of these fast reactor
1376
+ cores – an instrumentation challenge under active investiga-
1377
+ tion in the nuclear engineering community.
1378
+ Inclusion of fast reactor datasets generates only minor im-
1379
+ provements in the knowledge of σi for the other primary
1380
+ fission isotopes beyond that achievable with the HEU+LEU
1381
+ measurement scenario. While this results primarily from the
1382
+ general lack of knowledge of the value of σ240, it also high-
1383
+ lights the value delivered by multiple highly systematically
1384
+ correlated measurements at differing fuel composition, like
1385
+ that provided by the MOX reactor cases, in contrast to the sin-
1386
+ gle measurement provided by the relatively static composition
1387
+ of these fast reactor cores. Were F240 to evolve in a meaning-
1388
+ ful way for either core, it is likely that the isotopic IBD yield
1389
+ knowledge delivered by this core would be substantially im-
1390
+ proved.
1391
+ V.
1392
+ DISCUSSION AND SUMMARY
1393
+ After observing that the current global IBD yield dataset
1394
+ exhibits some capability to constrain antineutrino production
1395
+ by 235U, 238U, 239Pu, and 241Pu, we have investigated how
1396
+ suites of future systematically-correlated measurements at di-
1397
+ verse reactor core types can improve knowledge for these
1398
+ and other fission isotopes. We have observed that with the
1399
+ simplest combination of correlated HEU and LEU measure-
1400
+ ments using a PROSPECT-sized or MAD-sized IBD detec-
1401
+ tor, an IBD yield measurement precision of 12% or better can
1402
+ be achieved for all four fission isotopes. With a combina-
1403
+ tion of HEU, LEU, and RG-MOX datasets, all isotopic yields
1404
+ can be directly measured with a precision rivaling or exceed-
1405
+ ing the precision claimed by conversion-predicted models. If
1406
+ measurements of fast reactors are also included in the global
1407
+ dataset, first constraints of order 25% precision can be placed
1408
+ on antineutrino production by 240Pu. Beyond future measure-
1409
+ ments, we also noted other avenues for improving knowledge
1410
+ of isotopic IBD yields with current data: in particular, mea-
1411
+ surements performed over multiple LEU fuel cycles, such as
1412
+ Daya Bay and DANSS, can benefit from exploiting known
1413
+ variations in 241Pu between cycles.
1414
+ With a combined global dataset in hand from multiple
1415
+ reactor types, one can generate IBD-based reactor νe flux
1416
+ predictions for many existing or future reactor types free
1417
+ from biases known to be present in conversion-predicted
1418
+ models without sacrificing in relative model precision.
1419
+ If
1420
+ one considers the full suite of correlated HEU, LEU, RG-
1421
+ MOX and fast reactor measurements (the “All” scenario
1422
+ in Table II), the resultant data-based model would include
1423
+ (σ235, σ238, σ239, σ240, σ241,) uncertainties of (1.6, 9.5, 2.1,
1424
+ 23.6, 3.3)%.
1425
+ The correlation between these achievable
1426
+ directly-constrained uncertainties has also been calculated,
1427
+ and can be seen in Figure 6, alongside those of the Huber-
1428
+ Mueller model [91]. Besides representing the similar mag-
1429
+ nitudes in uncertainty, Figure 6 shows direct measurements’
1430
+ reduced correlations between 235U, 239Pu, and 241Puwith re-
1431
+ spect to conversion predictions, which are primarily caused
1432
+ by the common experimental apparatus used at ILL for input
1433
+ fission beta measurements [92, 93].
1434
+ This kind of direct and precise understanding of all of the
1435
+ major fission isotopes’ contributions to reactor antineutrino
1436
+ emissions would represent movement into an era of ‘preci-
1437
+ sion flux physics’ offering many potential pure and applied
1438
+ physics benefits. On the applications side, it would enable
1439
+ unbiased, high-fidelity monitoring, and performing of robust
1440
+ case studies for, a broad array of current and future reactor
1441
+ types. Well-measured isotopic antineutrino fluxes could be
1442
+ compared to summation-predicted ones to provide enhanced
1443
+ benchmarking and improvement of nuclear data associated
1444
+ with the main fission isotopes and their daughters, as well
1445
+ as the first meaningful integral datasets for validating the nu-
1446
+ clear data of 240Pu.
1447
+ These models and correlated datasets
1448
+ would allow for precise independent tests of each of the four
1449
+ IBD yield predictions provided by the Huber-Mueller model,
1450
+ enabling thorough investigation of the hypothesis that mis-
1451
+ modelling of one or more isotopes’ yields is responsible for
1452
+ the reactor antineutrino anomaly. Precise and reliable IBD-
1453
+ based flux constraints would also improve the reach of be-
1454
+ yond standard model searches with signal-dominated coherent
1455
+ neutrino-nucleus scattering detectors [3]. Finally, by probing
1456
+ for persistent residual IBD yield deficits common to all iso-
1457
+
1458
+ 11
1459
+ 1.6
1460
+ -2.4
1461
+ 1.6
1462
+ 3.6
1463
+ 2.0
1464
+ -2.4
1465
+ 9.5
1466
+ -3.2
1467
+ -12.8
1468
+ -4.6
1469
+ 1.6
1470
+ -3.2
1471
+ 2.1
1472
+ 3.6
1473
+ 1.9
1474
+ 3.6
1475
+ -12.8
1476
+ 3.6
1477
+ 23.6
1478
+ 7.0
1479
+ 2.0
1480
+ -4.6
1481
+ 1.9
1482
+ 7.0
1483
+ 3.3
1484
+
1485
+ 235
1486
+ U
1487
+
1488
+ 238
1489
+ U
1490
+
1491
+ 239
1492
+ Pu
1493
+
1494
+ 240
1495
+ Pu
1496
+
1497
+ 241
1498
+ Pu
1499
+
1500
+
1501
+ 235
1502
+ U
1503
+
1504
+ 238
1505
+ U
1506
+
1507
+ 239
1508
+ Pu
1509
+
1510
+ 240
1511
+ Pu
1512
+
1513
+ 241
1514
+ Pu
1515
+
1516
+ 15
1517
+
1518
+ 10
1519
+
1520
+ 5
1521
+
1522
+ 0
1523
+ 5
1524
+ 10
1525
+ 15
1526
+ 20
1527
+ 25
1528
+ Uncertainty [%]
1529
+ 2.4
1530
+ 2.6
1531
+ 2.5
1532
+ 8.2
1533
+ 2.6
1534
+ 2.9
1535
+ 2.7
1536
+ 100.0
1537
+ 2.5
1538
+ 2.7
1539
+ 2.6
1540
+
1541
+ 235
1542
+ U
1543
+
1544
+ 238
1545
+ U
1546
+
1547
+ 239
1548
+ Pu
1549
+
1550
+ 240
1551
+ Pu
1552
+
1553
+ 241
1554
+ Pu
1555
+
1556
+
1557
+ 235
1558
+ U
1559
+
1560
+ 238
1561
+ U
1562
+
1563
+ 239
1564
+ Pu
1565
+
1566
+ 240
1567
+ Pu
1568
+
1569
+ 241
1570
+ Pu
1571
+
1572
+ 15
1573
+
1574
+ 10
1575
+
1576
+ 5
1577
+
1578
+ 0
1579
+ 5
1580
+ 10
1581
+ 15
1582
+ 20
1583
+ 25
1584
+ Uncertainty [%]
1585
+ FIG. 6. Left: Uncertainties in isotopic IBD yield measurements based on a hypothetical global dataset including HEU, LEU, RG-MOX, and
1586
+ fast reactor IBD yield measurements. Diagonal elements correspond to the uncertainty in isotopic yields given for the “All” case in Table II,
1587
+ while off-diagonal elements describe the correlations between them. The values are extracted by taking the square root of the corresponding
1588
+ elements of the correlation matrix and are assigned a negative value where the correlations are negative. Full covariance matrices are provided
1589
+ in the supplementary materials accompanying this paper. Right: Uncertainties in IBD yields predicted by the Huber-Mueller model [66]. Since
1590
+ there are no theoretical models predicting σ240, we assign 100% uncertainty on it.
1591
+ topes with respect to conversion or summation models, the
1592
+ community can search for enduring hints of sterile neutrino
1593
+ oscillations, even in the presence of other confounding effects,
1594
+ such as neutrino decay or wave packet de-coherence [94]. We
1595
+ encourage the use of the forecasted flux uncertainty matrix
1596
+ provided above and in the supplementary materials as input
1597
+ for future physics sensitivity and use case studies; these ex-
1598
+ ercises would help to directly demonstrate the value of this
1599
+ achievable advance reactor neutrino flux knowledge.
1600
+ VI.
1601
+ ACKNOWLEDGEMENTS
1602
+ This work was supported by DOE Office of Science, un-
1603
+ der award No. DE-SC0008347, as well as by the IIT College
1604
+ of Science. We thank Anna Erickson, Jon Link, and Patrick
1605
+ Huber for useful comments and discussion, and Nathaniel
1606
+ Bowden and Carlo Giunti for comments on early manuscript
1607
+ drafts.
1608
+ [1] C. Bemporad, G. Gratta, and P. Vogel, Rev.Mod.Phys. 74, 297
1609
+ (2002).
1610
+ [2] X. Qian and J.-C. Peng, Rept. Prog. Phys. 82, 036201 (2019),
1611
+ arXiv:1801.05386 [hep-ex].
1612
+ [3] O. A. Akindele et al. (CONNIE, CHILLAX, CONUS), in 2022
1613
+ Snowmass Summer Study (2022) arXiv:2203.07214 [hep-ex].
1614
+ [4] C. Romano et al., “Nuclear Data to Reduce Uncertain-
1615
+ ties
1616
+ in
1617
+ Reactor
1618
+ Antineutrino
1619
+ Measurements:
1620
+ Summary
1621
+ Report
1622
+ of
1623
+ the
1624
+ Workshop
1625
+ on
1626
+ Nuclear
1627
+ Data
1628
+ for
1629
+ Reac-
1630
+ tor Antineutrino Measurements (WoNDRAM),”
1631
+ (2022),
1632
+ https://www.osti.gov/servlets/purl/1842423/.
1633
+ [5] A. Bernstein, N. Bowden, B. L. Goldblum, P. Huber, I. Jo-
1634
+ vanovic, and J. Mattingly, Rev. Mod. Phys. 92, 011003 (2020),
1635
+ arXiv:1908.07113 [physics.soc-ph].
1636
+ [6] K. Eguchi et al. (KamLAND), Phys. Rev. Lett. 90, 021802
1637
+ (2003), arXiv:hep-ex/0212021.
1638
+ [7] F. An et al. (Daya Bay), Phys. Rev. Lett. 108, 171803 (2012),
1639
+ arXiv:1203.1669 [hep-ex].
1640
+ [8] J. Ahn et al. (RENO Collaboration), Phys. Rev. Lett. 108,
1641
+ 191802 (2012).
1642
+ [9] Y. Abe et al. (Double Chooz), JHEP 10, 086 (2014), [Erratum:
1643
+ JHEP 02, 074 (2015)], arXiv:1406.7763 [hep-ex].
1644
+ [10] Y. Declais et al., Nucl. Phys. B 434, 503 (1995).
1645
+ [11] Y. Ko et al. (NEOS), Phys. Rev. Lett. 118, 121802 (2017),
1646
+ arXiv:1610.05134 [hep-ex].
1647
+ [12] I. Alekseev et al. (DANSS), Phys. Lett. B 787, 56 (2018),
1648
+ arXiv:1804.04046 [hep-ex].
1649
+ [13] H. Almaz´an et al. (STEREO), Phys. Rev. D 102, 052002
1650
+ (2020), arXiv:1912.06582 [hep-ex].
1651
+ [14] M. Andriamirado et al. (PROSPECT), Phys. Rev. D 103,
1652
+ 032001 (2021), arXiv:2006.11210 [hep-ex].
1653
+ [15] F. An et al. (Daya Bay), Phys. Rev. Lett. 113, 141802 (2014),
1654
+ arXiv:1407.7259 [hep-ex].
1655
+ [16] C. Hagner, M. Altmann, F. von Feilitzsch, L. Oberauer, Y. De-
1656
+ clais, and E. Kajfasz, Phys. Rev. D 52, 1343 (1995).
1657
+
1658
+ 12
1659
+ [17] M. Deniz et al. (TEXONO), Phys. Rev. D 82, 033004 (2010),
1660
+ arXiv:1006.1947 [hep-ph].
1661
+ [18] Y. Abe et al. (Double Chooz), Phys. Rev. D 86, 112009 (2012),
1662
+ arXiv:1209.5810 [hep-ex].
1663
+ [19] D. Adey et al. (Daya Bay), Phys. Rev. D 98, 092013 (2018),
1664
+ arXiv:1809.04660 [hep-ex].
1665
+ [20] L. Singh et al. (TEXONO), Phys. Rev. D 99, 032009 (2019),
1666
+ arXiv:1808.02719 [hep-ph].
1667
+ [21] A. Aguilar-Arevalo et al. (CONNIE), JHEP 04, 054 (2020),
1668
+ arXiv:1910.04951 [hep-ex].
1669
+ [22] M.
1670
+ Andriamirado
1671
+ et
1672
+ al.
1673
+ (PROSPECT),
1674
+ (2021),
1675
+ arXiv:2104.11219 [hep-ex].
1676
+ [23] H. Almaz´an et al., Phys. Rev. Lett. 128, 061801 (2022),
1677
+ arXiv:2111.01519 [hep-ex].
1678
+ [24] J. Choi et al. (RENO), Phys. Rev. Lett. 116, 211801 (2016),
1679
+ arXiv:1511.05849 [hep-ex].
1680
+ [25] F. An et al. (Daya Bay), Phys. Rev. Lett. 118, 251801 (2017),
1681
+ arXiv:1704.01082 [hep-ex].
1682
+ [26] J. Ashenfelter et al. (PROSPECT), Phys. Rev. Lett. 122, 251801
1683
+ (2019), arXiv:1812.10877 [nucl-ex].
1684
+ [27] H. Almaz´an Molina et al. (STEREO), Journal of Physics G 48,
1685
+ 075107 (2021), arXiv:2010.01876 [hep-ex].
1686
+ [28] F. P. An et al. (Daya Bay), (2022), arXiv:2203.06686 [hep-ex].
1687
+ [29] M. Fallot et al., Phys. Rev. Lett. 109, 202504 (2012),
1688
+ arXiv:1208.3877 [nucl-ex].
1689
+ [30] A. A. Sonzogni, E. A. McCutchan, T. D. Johnson, and P. Dim-
1690
+ itriou, Phys. Rev. Lett. 116, 132502 (2016).
1691
+ [31] T. Yoshida, T. Tachibana, S. Okumura,
1692
+ and S. Chiba, Phys.
1693
+ Rev. C 98, 041303 (2018).
1694
+ [32] M. Estienne et al., Phys. Rev. Lett. 123, 022502 (2019),
1695
+ arXiv:1904.09358 [nucl-ex].
1696
+ [33] E. Christensen, P. Huber, P. Jaffke, and T. E. Shea, Phys. Rev.
1697
+ Lett. 113, 042503 (2014), arXiv:1403.7065 [physics.ins-det].
1698
+ [34] E. Christensen, P. Huber,
1699
+ and P. Jaffke, Science and Global
1700
+ Security 23, 20 (2015).
1701
+ [35] A. Bernstein, N. S. Bowden, and A. S. Erickson, Phys. Rev.
1702
+ Applied 9, 014003 (2018).
1703
+ [36] P. Jaffke and P. Huber, Phys. Rev. Applied 8, 034005 (2017),
1704
+ arXiv:1612.06494 [physics.ins-det].
1705
+ [37] C. Stewart, A. Abou-Jaoude, and A. Erickson, Nature Com-
1706
+ mun. 10, 3527 (2019).
1707
+ [38] Y. Klimov, V. Kopeikin, L. Mikaelyan, K. Ozerov, and V. Sinev,
1708
+ Atomic Energy 76, 123 (1994).
1709
+ [39] N. Bowden, A. Bernstein, S. Dazeley, R. Svoboda, A. Mis-
1710
+ ner,
1711
+ and T. Palmer, J. Appl. Phys. 105, 064902 (2009),
1712
+ arXiv:0808.0698 [nucl-ex].
1713
+ [40] P. Vogel and J. F. Beacom, Phys. Rev. D 60, 053003 (1999).
1714
+ [41] J. M. Berryman and P. Huber, JHEP 01, 167 (2021),
1715
+ arXiv:2005.01756 [hep-ph].
1716
+ [42] G. Vidyakin, V. Vyrodov, I. Gurevich, Y. Kozlov, V. Marte-
1717
+ myanov, S. Sukhotin, V. Tarasenkov, and S. Khakimov, Sov.
1718
+ Phys. JETP 66, 243 (1987).
1719
+ [43] G. Vidyakin, V. Vyrodov, I. Gurevich, Y. Kozlov, V. Marte-
1720
+ myanov, S. Sukhotin, V. Tarasenkov, and S. Khakimov, Sov.
1721
+ Phys. JETP 71, 424 (1990).
1722
+ [44] Y. Kozlov, S. Khalturtsev, I. Machulin, A. Martemyanov,
1723
+ V. Martemyanov, S. Sukhotin, V. Tarasenkov, E. Turbin, and
1724
+ V. Vyrodov, Phys. Atom. Nucl. 63, 1016 (2000), arXiv:hep-
1725
+ ex/9912047.
1726
+ [45] H. Kwon, F. Boehm, A. Hahn, H. Henrikson, J. Vuilleumier,
1727
+ J. Cavaignac, D. Koang, B. Vignon, F. Von Feilitzsch,
1728
+ and
1729
+ R. Mossbauer, Phys. Rev. D 24, 1097 (1981).
1730
+ [46] G. Boireau et al. (NUCIFER), Phys. Rev. D 93, 112006 (2016),
1731
+ arXiv:1509.05610 [physics.ins-det].
1732
+ [47] Z. Greenwood et al., Phys. Rev. D 53, 6054 (1996).
1733
+ [48] H. Almaz´an et al. (STEREO), Phys. Rev. Lett. 125, 201801
1734
+ (2020), arXiv:2004.04075 [hep-ex].
1735
+ [49] G. Zacek et al. (CALTECH-SIN-TUM), Phys. Rev. D 34, 2621
1736
+ (1986).
1737
+ [50] A. I. Afonin et al., Sov. Phys. JETP 67, 213 (1988).
1738
+ [51] A. Kuvshinnikov et al., JETP Lett. 54, 253 (1991).
1739
+ [52] Y. Declais et al., Phys. Lett. B 338, 383 (1994).
1740
+ [53] B. Achkar et al., Phys. Lett. B 374, 243 (1996).
1741
+ [54] M. Apollonio et al. (CHOOZ), Phys. Lett. B 466, 415 (1999),
1742
+ arXiv:hep-ex/9907037.
1743
+ [55] G. Bak et al. (RENO), Phys. Rev. Lett. 122, 232501 (2019),
1744
+ arXiv:1806.00574 [hep-ex].
1745
+ [56] H. de Kerret et al. (Double Chooz), Nature Phys. 16, 558
1746
+ (2020), arXiv:1901.09445 [hep-ex].
1747
+ [57] C. Giunti, Phys. Lett. B 764, 145 (2017), arXiv:1608.04096
1748
+ [hep-ph].
1749
+ [58] P. Huber, Phys. Rev. C 84, 024617 (2011), [Erratum:
1750
+ Phys.Rev.C 85, 029901 (2012)], arXiv:1106.0687 [hep-ph].
1751
+ [59] T. A. Mueller et al., Phys. Rev. C 83, 054615 (2011).
1752
+ [60] G. Mention, M. Fechner, T. Lasserre, T. Mueller, D. Lhuil-
1753
+ lier, M. Cribier, and A. Letourneau, Phys. Rev. D 83, 073006
1754
+ (2011), arXiv:1101.2755 [hep-ex].
1755
+ [61] Y. Gebre, B. Littlejohn, and P. Surukuchi, Phys. Rev. D 97,
1756
+ 013003 (2018), arXiv:1709.10051 [hep-ph].
1757
+ [62] C. Giunti, X. Ji, M. Laveder, Y. Li, and B. Littlejohn, JHEP 10,
1758
+ 143 (2017), arXiv:1708.01133 [hep-ph].
1759
+ [63] O.
1760
+ Akindele
1761
+ et
1762
+ al.,
1763
+ (2021),
1764
+ 10.2172/1826602,
1765
+ arXiv:2112.12593 [hep-ph].
1766
+ [64] J. Roglans-Ribas, K. Pasamehmetoglu,
1767
+ and T. J. O’Connor,
1768
+ Nuclear Science and Engineering 196, 1 (2022).
1769
+ [65] B. Littlejohn, A. Conant, D. Dwyer, A. Erickson, I. Gustafson,
1770
+ and
1771
+ K.
1772
+ Hermanek,
1773
+ Phys.
1774
+ Rev.
1775
+ D
1776
+ 97,
1777
+ 073007
1778
+ (2018),
1779
+ arXiv:1803.01787 [nucl-th].
1780
+ [66] S. Gariazzo, C. Giunti, M. Laveder, and Y. Li, JHEP 06, 135
1781
+ (2017), arXiv:1703.00860 [hep-ph].
1782
+ [67] https://github.com/iit-neutrino/AGRIYA.
1783
+ [68] V. Kopeikin, M. Skorokhvatov, and O. Titov, Phys. Rev. D 104,
1784
+ L071301 (2021), arXiv:2103.01684 [nucl-ex].
1785
+ [69] K. Abazajian et al., (2012), arXiv:1204.5379 [hep-ph].
1786
+ [70] A. Sonzogni, T. Johnson, and E. McCutchan, Phys. Rev. C 91,
1787
+ 011301 (2015).
1788
+ [71] F. P. An et al. (Daya Bay), Chin. Phys. C 41, 013002 (2017),
1789
+ arXiv:1607.05378 [hep-ex].
1790
+ [72] A. Bernstein, N. S. Bowden, and A. S. Erickson, Phys. Rev.
1791
+ Applied 9, 014003 (2018), arXiv:1612.00540 [nucl-ex].
1792
+ [73] S. P. Behera, D. K. Mishra, and L. M. Pant, Phys. Rev. D 102,
1793
+ 013002 (2020), arXiv:2007.00392 [hep-ph].
1794
+ [74] M. Bergevin et al., (2019), arXiv:1911.06834 [hep-ex].
1795
+ [75] D. Adey et al. (Daya Bay), Phys. Rev. Lett. 123, 111801 (2019),
1796
+ arXiv:1904.07812 [hep-ex].
1797
+ [76] A. Erickson, personal communication.
1798
+ [77] J. Ashenfelter et al. (PROSPECT), Nucl. Instrum. Meth. A 922,
1799
+ 287 (2019), arXiv:1808.00097 [physics.ins-det].
1800
+ [78] N. S. Bowden, J. M. Link, and W. Wang (NF07 Applications
1801
+ Topical Group Community), in 2022 Snowmass Summer Study
1802
+ (2022) arXiv:2209.07483 [hep-ex].
1803
+ [79] M. Andriamirado et al., (2021), arXiv:2107.03934 [hep-ex].
1804
+ [80] J. Cao, Nucl. Phys. B Proc. Suppl. 229-232, 205 (2012),
1805
+ arXiv:1101.2266 [hep-ex].
1806
+ [81] A. Conant,
1807
+ Ph.D. Thesis, Georgia Institute of Technol-
1808
+ ogy
1809
+ (2019),
1810
+ https://prospect.yale.edu/sites/
1811
+ default/files/conant-dissertation-2019.
1812
+ pdf.
1813
+
1814
+ 13
1815
+ [82] X. B. Ma et al., Phys. Rev. C 88, 014605 (2013).
1816
+ [83] D. Adey et al. (Daya Bay), Phys. Rev. D 100, 052004 (2019),
1817
+ arXiv:1808.10836 [hep-ex].
1818
+ [84] H. de Kerret et al. (Double Chooz), Nature Phys. 16, 558
1819
+ (2020), arXiv:1901.09445 [hep-ex].
1820
+ [85] C. Giunti, Phys. Rev. D 96, 033005 (2017), arXiv:1704.02276
1821
+ [hep-ph].
1822
+ [86] C. Giunti, Y. Li, B. Littlejohn, and P. Surukuchi, Phys. Rev. D
1823
+ 99, 073005 (2019), arXiv:1901.01807 [hep-ph].
1824
+ [87] H. Almaz´an et al. (STEREO), Phys. Rev. Lett. 125, 201801
1825
+ (2020), arXiv:2004.04075 [hep-ex].
1826
+ [88] F. P. An et al. (Daya Bay), Chin. Phys. C 45, 073001 (2021),
1827
+ arXiv:2102.04614 [hep-ex].
1828
+ [89] Y. Jeong et al. (NEOS II), J. Korean Phys. Soc. 77, 1118 (2020),
1829
+ arXiv:2009.13355 [physics.ins-det].
1830
+ [90] A schedule of forecasted reactor facility start-ups world-
1831
+ wide
1832
+ are
1833
+ given
1834
+ at
1835
+ https://world-nuclear.org/information-
1836
+ library/current-and-future-generation/plans-for-new-reactors-
1837
+ worldwide.aspx.
1838
+ [91] Both hypothetical future and Huber-Mueller model IBD yield
1839
+ covariance matrices are included in supplementary materials
1840
+ accompanying this paper.
1841
+ [92] F. Von Feilitzsch, A. A. Hahn,
1842
+ and K. Schreckenbach,
1843
+ Phys.Lett. B118, 162 (1982).
1844
+ [93] A. A. Hahn et al., Phys.Lett. B218, 365 (1989).
1845
+ [94] C. A. Arg¨uelles, I. Esteban, M. Hostert, K. J. Kelly, J. Kopp,
1846
+ P. A. N. Machado, I. Martinez-Soler, and Y. F. Perez-Gonzalez,
1847
+ (2021), arXiv:2111.10359 [hep-ph].
1848
+
NdFPT4oBgHgl3EQflzWN/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
PtFJT4oBgHgl3EQfJCwC/content/tmp_files/2301.11458v1.pdf.txt ADDED
@@ -0,0 +1,1913 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Superconductivity of anomalous pseudospin
2
+ Han Gyeol Suh1, Yue Yu1,2, Tatsuya Shishidou1, Michael Weinert1, P. M. R. Brydon3, and Daniel F. Agterberg1
3
+ 1Department of Physics, University of Wisconsin, Milwaukee, Wisconsin 53201, USA
4
+ 2Department of Physics, Stanford University, 476 Lomita Mall, Stanford, CA 94305, USA and
5
+ 3Department of Physics and MacDiarmid Institute for Advanced Materials and Nanotechnology,
6
+ University of Otago, P.O. Box 56, Dunedin 9054, New Zealand
7
+ In materials with both time-reversal (T) and inversion symmetry (I), superconductivity is formed
8
+ by pairing fermion pseudospin partners at momenta k and −k. Typically, pseudospin shares the
9
+ same symmetry properties as usual spin-1/2. Here we consider non-symmorphic materials with mo-
10
+ mentum space spin-textures that exhibit an anomalous pseudospin with different symmetry prop-
11
+ erties than usual spin-1/2. We provide a comprehensive list of space groups for which anomalous
12
+ pseudospin occurs on planes in momentum space and carry out a complete categorization and anal-
13
+ ysis of superconductivity for Fermi surfaces centered on all possible T, I invariant momenta (TRIM)
14
+ in these planes. We show that superconductivity from this anomalous pseudospin leads to a vari-
15
+ ety of unusual consequences for superconductivity including: extremely large Pauli limiting fields
16
+ and residual Knight shifts for pseudospin singlet superconductors; field induced pair density wave
17
+ states; field induced pseudospin singlet to pseudospin triplet transitions; fully gapped ‘nodal’ super-
18
+ conductors; and additional insight into the breakdown of Blount’s theorem for pseudospin triplet
19
+ superconductors. We apply our results to UPt3, BiS2-based superconductors, Fe-based supercon-
20
+ ductors, and paramagnetic UCoGe.
21
+ I.
22
+ INTRODUCTION
23
+ Momentum space spin-textures of electronic bands are known to underlie spintronic and superconducting properties of
24
+ quantum materials [1–3]. In the spintronics context, Rashba-like spin textures allow control of electronic spin through
25
+ applied electric fields [1, 3].
26
+ In superconductors, these same spin textures lead to unusual and counter-intuitive
27
+ magnetic response, such as the robustness of spin-singlet superconductivity to applied magnetic fields, pair density
28
+ wave states, and singlet-triplet mixing [2]. While such spin-textures are common when inversion symmetry is broken,
29
+ it has been realized that these can occur when inversion symmetry is present. This has lead to the notion of hidden
30
+ spin-textures [4] and locally non-centrosymmetric superconductivity [5], where inversion related sectors each allow a
31
+ Rashba-like spin-texture due to the local inversion symmetry breaking. These spin-textures are of opposite sign on
32
+ the two sectors, so that global inversion symmetry is restored. These hidden spin-textures allows the novel physics
33
+ associated with spin-orbit coupling (SOC) to emerge even when inversion symmetry is not broken. It further allows
34
+ for new physics to emerge. One notable example is a field induced transition from an even-parity (pseudospin singlet)
35
+ to odd-parity (pseudospin triplet) observed in CeRh2As2 [6–9].
36
+ Key to observing novel physics associated with these spin-textures in inversion symmetric materials, is that the
37
+ inversion related sectors are weakly coupled [5, 9–11]. Theoretical proposals for how to achieve this fall under two
38
+ approaches: the first is to tailor weak coupling between the inversion related sectors, for example by separating two
39
+ inversion symmetry related layers so that the interlayer coupling is weak [6]; the second is to exploit symmetries that
40
+ ensure that this inter-sector coupling vanishes. The symmetry based approach has been applied to points and lines
41
+ in momentum space. Examples include two-dimensional (2D) transition metal dichalcogenides near the K-point [12]
42
+ and non-symmorphic symmetries near the X −M line in BaNiS2 with space group 129 (P4/nmm) [10]. In these cases,
43
+ the only energy splitting between the inversion-related sectors is due to SOC - a situation conceptually similar to
44
+ materials with broken inversion symmetry, where the usual two-fold pseudopsin degeneracy is broken solely by SOC.
45
+ Here we generalize this symmetry based approach by identifying electronic band degeneracies that are split solely
46
+ by SOC in materials with both inversion, I, and time-reversal, T, symmetries. This requires bands that are at least
47
+ four-fold degenerate when SOC is ignored. Such band degeneracies are not generic and require symmetries beyond the
48
+ usual two-fold pseudospin (or Kramers) degeneracy that arises from TI symmetry. Here we focus on 2D momentum
49
+ planes, nodal planes, where this occurs. This is the largest region in momentum space for which the required four-
50
+ fold electronic degeneracies can appear when SOC is ignored. As discussed in a variety of contexts [13–16], such
51
+ nodal planes arise in non-symmorphic crystal structures. Here we provide a complete list of space groups for which
52
+ this occurs and provide symmetry based kp theories for all time-reversal-invariant momenta (TRIM) on these nodal
53
+ planes. As discussed later, many relevant superconductors exhibit Fermi surfaces near these TRIM. We find that the
54
+ SOC-split electronic states on these nodal planes generically exhibit a pseudospin that has a different symmetry than
55
+ that of usual spin-1/2 fermions (this generalizes a result we found for space group P4/nmm [9]). Here we name this
56
+ anomalous pseudospin and examine the consequences of this anomalous pseudospin on superconductivity. We find
57
+ that this anomalous pseudospin plays a central role on the superconducting magnetic response and on the properties
58
+ arXiv:2301.11458v1 [cond-mat.supr-con] 26 Jan 2023
59
+
60
+ 2
61
+ of spin-triplet superconductivity. Our results complement and provide further insight on earlier nodal and topological
62
+ classifications of superconductivity in non-symmorphic materials [17–21].
63
+ In this paper we begin by defining anomalous pseudospin on nodal momenta planes, we then characterize all possible
64
+ symmetry based kp theories near TRIM points on these nodal planes. Using these kp theories, we analyse the magnetic
65
+ response and nodal excitations of superconducting states formed from anomalous pseudospin. We apply this analysis
66
+ to a series of materials that exhibit Fermi surfaces that lie on or near these nodal planes. More specifically we reveal
67
+ how anomalous pseudospin: explains critical fields that far exceed the Pauli field in BiS2-based materials [22] and the
68
+ observed magnetic response 3D Fe-based superconductors [23]; identifies which space groups and TRIM are ideal to
69
+ find a field induced even parity to odd parity transition akin to that observed in CeRh2As2 [7]; provides insight into
70
+ the gap symmetry of UPt3 [24]; and shines new light on re-entrant superconductivity in UCoGe [25].
71
+ II.
72
+ ANOMALOUS PSEUDOSPIN: SYMMETRY ORIGIN
73
+ Our aim is to exploit symmetry to find nodal plane band degeneracies that are lifted solely by SOC. As discussed
74
+ below, once these band degeneracies are lifted, a two-fold pseudospin degeneracy will remain. We find that generically,
75
+ the pseudospin that results from this procedure does not share the same symmetry properties as usual spin 1/2 and
76
+ hence we name this anomalous pseudospin.
77
+ Pseudospin describes the two-fold Kramers degeneracy that arises at each momentum point k when the product of
78
+ time-reversal T and inversion I symmetries, TI, is present. The product TI is anti-unitary and for fermions satisfies
79
+ (TI)2 = −1, ensuring at least a two-fold degeneracy. It is often the case that this pseudospin behaves as spin-1/2
80
+ under rotations [26]. However, when symmetries beyond TI are present, it is possible that this is not the case. One
81
+ example of this is the angular momentum jz = ±3/2 electronic states that arise when cubic symmetry or a three-fold
82
+ rotation axis is present [2, 27, 28]. In the latter case, this gives rise to so-called type-II Ising superconductivity in 2D
83
+ materials [28, 29] where large in-plane critical fields appear when the Fermi surface is sufficiently close to momentum
84
+ points with this three-fold rotation symmetry. In our case, the anomalous pseudospin appears on momentum planes
85
+ in the Brillouin zone, allowing a larger phase space for the physical properties of anomalous pseudospin to manifest.
86
+ To ensure the requisite band degeneracy on a nodal plane, consider the symmetry elements that keep a momentum
87
+ point on the plane invariant (here taken to be normal to the ˆn axis). These are {E, ˜
88
+ Mˆn, TI, T ˜C2,ˆn}, where
89
+ ˜
90
+ Mˆn
91
+ is a translation mirror symmetry and ˜C2,ˆn is a translation two-fold rotation symmetry. Their point group rotation
92
+ and translation component can be denoted using Seitz notation, for example ˜
93
+ Mˆn = {Mˆn|t1, t2, t3} where Mˆn is a
94
+ point group mirror symmetry along ˆn and (t1, t2, t3) is a fractional translation vector. Since we are searching for a
95
+ degeneracy that appears without SOC, we consider orbital or sublattice degrees of freedom for which (TI)2 = 1. The
96
+ only remaining symmetry that can enforce a two-fold degeneracy is T ˜C2,ˆn, since this is anti-unitary, it must satisfy
97
+ (T ˜C2,ˆn)2 = −1 to do so. Since T commutes with rotations, this implies ˜C2
98
+ 2,ˆn = −1. When operating on orbital or
99
+ sublattice degrees of freedom, ˜C2
100
+ 2,ˆn is typically 1, suggesting it is not possible to have the required degeneracy. However,
101
+ in non-symmorphic groups, ˜C2,ˆn can be a screw axis, for which it is possible to satisfy ˜C2
102
+ 2,ˆn = −1. In particular, using
103
+ Seitz notation ˜C2,ˆn = {C2ˆn|t1, t2, 1/2} (here t1 and t2 correspond to either a half in-plane translation vector or to no
104
+ translation) we have ( ˜C2,ˆn)2 = {E|0, 0, 1}. When operating on a state carrying momentum k, ( ˜C2,ˆn)2 is represented
105
+ by eik·ˆn. Hence if the nodal plane sits at momentum k · ˆn = π, then ˜C2
106
+ 2,ˆn = −1 and a two-fold orbital or sublattice
107
+ degeneracy is ensured. When spin-degeneracy is also included, these states are then four-fold degenerate when SOC
108
+ is ignored.
109
+ When SOC is included, it is possible to show that the TI pseudospin partners have the same Mˆn mirror eigenvalue
110
+ (this result is generalization of that given in Ref. [9] where t1 = 0 and t2 = 0 was used). That is, labeling the two
111
+ Kramers degenerate states as |+⟩ and TI|+⟩, both belong to the same eigenstate of ˜
112
+ Mˆn. As a consequence, all Pauli
113
+ matrices ˜σi made from the two states |+⟩ TI|+⟩ must all be invariant under ˜
114
+ Mˆn. It is this feature that differs from
115
+ usual spin-1/2. Of the three Pauli matrices σi, constructed from usual spin-1/2 states, two will be odd under ˜
116
+ Mˆn and
117
+ one will be even under ˜
118
+ Mˆn. It is this symmetry distinction between the anomalous pseudospin operators (˜σi) and
119
+ usual spin 1/2 operators (σi) that underlie the unusual superconducting properties discussed below.
120
+ The above argument can also be applied to nodal lines generated by the symmetry elements {E, ˜C2,ˆn, TI, T ˜
121
+ Mˆn}
122
+ with (T ˜
123
+ Mˆn)2 = −1 when applied to orbital or sublattice degrees of freedom.
124
+ In this case, repeating the same
125
+ arguments above show that SOC will also split the band degeneracy and lead to anomalous pseudospin. Here, due
126
+ to the larger available momentum phase space, we restrict our analysis and classification to nodal planes and leave
127
+ an analysis of nodal lines to a later work. For all space groups that host nodal planes, we develop symmetry-based
128
+ kp theories valid near all TRIM on theses nodal planes. We emphasis these TRIM since Cooper pairs are formed by
129
+ pairing states at momenta k and −k with the momentum origin given by a TRIM. We then consider Fermi surfaces
130
+
131
+ 3
132
+ Z
133
+ E
134
+ B
135
+ D
136
+ Y
137
+ C
138
+ A
139
+ Γ
140
+ FIG. 1.
141
+ Example from space group 14 where the green shading reveals the planes and lines in momentum space on which
142
+ anomalous pseudospin exists. A Fermi surface located near the momentum plane kz = π (as depicted by the dark Fermi surface
143
+ near the Z point) will have its superconducting properties governed by pairing of anomalous pseudospin. However, Fermi
144
+ surfaces far from these planes (such as that depicted near the Γ point) will exhibit more usual superconducting properties.
145
+ near these TRIM and discuss the resultant superconducting properties. Figure 1 illustrates our approach. Here, in
146
+ green, we show the nodal planes and lines that exhibit anomalous pseudospin. Here we examine the properties of
147
+ superconductivity for a Fermi surface near the Z point, which is a TRIM on the nodal plane. The properties of
148
+ superconductivity for a Fermi surface near the Γ point, for which pseudospin is typically not anomalous, are described
149
+ in earlier review articles [30, 31]. We note that many superconducting materials, including the examples discussed in
150
+ this paper, exhibit Fermi surfaces near nodal planes.
151
+ III.
152
+ NODAL PLANE SPACE GROUPS AND SINGLE-PARTICLE kp HAMILTONIANS
153
+ Here we identify all space groups that allow anomalous pseudospin on nodal planes and construct the corresponding
154
+ symmetry-based kp-like Hamiltonians for all TRIM on these planes.
155
+ A.
156
+ Space groups with nodal planes
157
+ To identify these nodal planes, all space groups containing inversion symmetry I = {I|0, 0, 0} and the screw axis
158
+ ˜C2,ˆn = {C2ˆn|t1, t2, 1/2} (where t1 = 0, 1/2 and t2 = 0, 1/2) were identified. For these space groups, the nodal planes
159
+ lie on the Brillouin zone boundary. Table 1 lists the resultant space groups, point groups, nodal planes, and types
160
+ of kp theories allowed for these space groups. As discussed in the previous section, the degeneracies of these nodal
161
+ planes is generically lifted by SOC, yielding anomalous pseudospin.
162
+ B.
163
+ Symmetry based kp theories near TRIM
164
+ To understand the consequences of anomalous pseudospin on superconductivity requires a theory for the normal
165
+ state. Cooper pairs rely on the degeneracy between states of momenta k and −k and this degeneracy is ensured by
166
+ both T and I symmetries. For this reason, we develop symmetry-based kp theories expanded around TRIM. To derive
167
+ these kp-like Hamiltonians, we have used the real representations for the TRIM given in the Bilbao Crystallographic
168
+
169
+ 4
170
+ Crystal Type
171
+ Number
172
+ Name
173
+ Nodal planes
174
+ kp theory classes
175
+ Monoclinic (C2h)
176
+ 11
177
+ P21/m
178
+ (u, 1/2, w)
179
+ Ctype1
180
+ 2h,1
181
+ 14
182
+ P21/c
183
+ (u, 1/2, w)
184
+ Ctype1
185
+ 2h,1 , Ctype2
186
+ 2h,2
187
+ Orthorhombic (D2h)
188
+ 51
189
+ Pmma
190
+ (1/2, v, w)
191
+ Dtype1
192
+ 2h,3
193
+ 52
194
+ Pnna
195
+ (u, 1/2, w)
196
+ Dtype1
197
+ 2h,3 , Dtype2
198
+ 2h,4 , 8-fold
199
+ 53
200
+ Pmna
201
+ (u, v, 1/2)
202
+ Dtype1
203
+ 2h,3 , Dtype2
204
+ 2h,4
205
+ 54
206
+ Pcca
207
+ (1/2, v, w)
208
+ Dtype1
209
+ 2h,3 , 8-fold
210
+ 55
211
+ Pbam
212
+ (1/2, v, w), (u, 1/2, w)
213
+ Dtype2
214
+ 2h,2 , Dtype1
215
+ 2h,3
216
+ 56
217
+ Pccn
218
+ (1/2, v, w), (u, 1/2, w)
219
+ Dtype1
220
+ 2h,1 , Dtype2
221
+ 2h,2 , Dtype1
222
+ 2h,3 , 8-fold
223
+ 57
224
+ Pbcm
225
+ (u, v, 1/2), (u, 1/2, w)
226
+ Dtype1
227
+ 2h,3 , 8-fold
228
+ 58
229
+ Pnnm
230
+ (1/2, v, w), (u, 1/2, w)
231
+ Dtype1
232
+ 2h,1 , Dtype2
233
+ 2h,2 , Dtype1
234
+ 2h,3 , Dtype2
235
+ 2h,4
236
+ 59
237
+ Pmmn
238
+ (1/2, v, w), (u, 1/2, w)
239
+ Dtype1
240
+ 2h,1 , Dtype1
241
+ 2h,3
242
+ 60
243
+ Pbcn
244
+ (1/2, v, w), (u, v, 1/2)
245
+ Dtype1
246
+ 2h,3 , Dtype2
247
+ 2h,4 , 8-fold
248
+ 61
249
+ Pbca
250
+ (1/2, v, w), (u, v, 1/2), (u, 1/2, w)
251
+ Dtype1
252
+ 2h,3 , 8-fold
253
+ 62
254
+ Pnma
255
+ (1/2, v, w), (u, v, 1/2), (u, 1/2, w)
256
+ Dtype1
257
+ 2h,1 , Dtype1
258
+ 2h,3 , 8-fold
259
+ 63
260
+ Cmcm
261
+ (u, v, 1/2)
262
+ Ctype1
263
+ 2h,1 , Dtype1
264
+ 2h,3
265
+ 64
266
+ Cmce
267
+ (u, v, 1/2)
268
+ Ctype2
269
+ 2h,2 , Dtype1
270
+ 2h,3
271
+ Tetragonal (D4h)
272
+ 127
273
+ P4/mbm
274
+ (u, 1/2, w)
275
+ Dtype1
276
+ 2h,3 , Dtype2
277
+ 4h,2 , Dtype2
278
+ 4h,4
279
+ 128
280
+ P4/mnc
281
+ (u, 1/2, w)
282
+ Dtype1
283
+ 2h,3 , Dtype2
284
+ 2h,4 , Dtype2
285
+ 4h,2 , Dtype2
286
+ 4h,4 , Dtype1
287
+ 4h,5 , 8-fold
288
+ 129
289
+ P4/nmm
290
+ (u, 1/2, w)
291
+ Dtype1
292
+ 2h,3 , Dtype1
293
+ 4h,1 , Dtype1
294
+ 4h,3
295
+ 130
296
+ P4/ncc
297
+ (u, 1/2, w)
298
+ Dtype1
299
+ 2h,3 , Dtype1
300
+ 4h,1 , Dtype1
301
+ 4h,3 , 8-fold
302
+ 135
303
+ P42/mbc
304
+ (u, 1/2, w)
305
+ Dtype1
306
+ 2h,3 , Dtype2
307
+ 4h,2 , Dtype2
308
+ 4h,4 , 8-fold
309
+ 136
310
+ P42/mnm
311
+ (u, 1/2, w)
312
+ Dtype1
313
+ 2h,3 , Dtype2
314
+ 2h,4 , Dtype1
315
+ 4h,1 , Dtype2
316
+ 4h,2 , Dtype1
317
+ 4h,3 , Dtype2
318
+ 4h,4
319
+ 137
320
+ P42/nmc
321
+ (u, 1/2, w)
322
+ Dtype1
323
+ 2h,3 , Dtype1
324
+ 4h,1 , Dtype1
325
+ 4h,3 , Dtype1
326
+ 4h,5 , 8-fold
327
+ 138
328
+ P42/ncm
329
+ (u, 1/2, w)
330
+ Dtype1
331
+ 2h,3 , Dtype1
332
+ 4h,1 , Dtype2
333
+ 4h,2 , Dtype1
334
+ 4h,3 , Dtype2
335
+ 4h,4 , 8-fold
336
+ Hexagonal (C6h)
337
+ 176
338
+ P63/m
339
+ (u, v, 1/2)
340
+ Ctype1
341
+ 2h,1 , Ctype1
342
+ 6h
343
+ , 8-fold
344
+ Hexagonal (D6h)
345
+ 193
346
+ P63/mcm
347
+ (u, v, 1/2)
348
+ Dtype1
349
+ 2h,3 , Dtype1
350
+ 6h
351
+ , 8-fold
352
+ 194
353
+ P63/mmc
354
+ (u, v, 1/2)
355
+ Dtype1
356
+ 2h,3 , Dtype1
357
+ 6h
358
+ , 8-fold
359
+ Cubic (Th)
360
+ 205
361
+ Pa3
362
+ (u, 1/2, w)
363
+ Dtype1
364
+ 2h,3 , 8-fold
365
+ TABLE I. Space groups with nodal planes
366
+ server [32–34]. For these TRIM, we initially consider space group irreducible representations that do not include spin,
367
+ which, for simplicity, we name orbital representations. These representations are either 2-fold or 4-fold degenerate
368
+ (when spin is added, these becomes 4-fold and 8-fold degenerate respectively). The full kp-like Hamiltonians are only
369
+ listed for the 2-fold degenerate representations. We present a partial classification of the 4-fold degenerate orbital
370
+ representations near the end of this paper.
371
+ In constructing the kp theories for the 2-fold orbital degenerate TRIM points, we choose τi to be Pauli matrices that
372
+ encode the orbital degrees of freedom, and σi to be spin Pauli matrices. We take T = τ0(iσy)K where K is the complex
373
+ conjugation operator, hence the τ2 operator is odd under time-reversal. For a given doubly degenerate space group
374
+ representation on a TRIM, constructing its direct product leads to four irreducible point group representations. These
375
+ four representations each correspond to an orbital operator τi, and this partially dictates the momentum dependencies
376
+ of symmetry allowed terms in the kp Hamiltonian. We present our results for the kp Hamiltonians in Table 2. The
377
+ first row of each box gives the type of the kp theory class and the point group representations of the orbital operators
378
+ that are given by Pauli matrices τi. In this decomposition, the square brackets correspond to the antisymmetric τ2
379
+ operator and remaining terms correspond to τ0, τ1, and τ3. The second row of a box gives the kp Hamiltonian, and
380
+ the last part of a box lists the space groups and TRIM points representations that belong to the kp Hamiltonian class.
381
+ We have tabulated the kp Hamiltonians for 122 TRIM points and we find that only 13 different kp theories appear.
382
+ These are of two types, which we call type 1 and type 2. Type 1 kp theories have degenerate even and odd parity
383
+ orbital basis functions. Type 2 kp theories has two degenerate orbital basis functions with the same parity symmetry.
384
+ The generic form of these kp theories are
385
+ H(k) = ε0,k + t1,kτ1 + tα,kτα + τβ(λk · σ) = ε0,k + Hδ(k) ,
386
+ (1)
387
+
388
+ 5
389
+ (I, τα, τβ) =
390
+
391
+ (τ1, τ2, τ3)
392
+ for type 1 ,
393
+ (τ0, τ3, τ2)
394
+ for type 2 ,
395
+ (2)
396
+ where Hδ(k) = H(k) − ε0,k and α and β are type indices will be used the remaining context. For parity mixed, type
397
+ 1, kp theories, the degeneracy at TRIM points is not broken by SOC. This is because the non-symmorphic symmetries
398
+ combined with topological arguments imply these TRIM must have an odd number of Dirac lines passing through
399
+ them [35]. These Dirac lines lie in the nodal plane. Elsewhere in the nodal plane, SOC lifts the 4-fold degeneracy.
400
+ We will discuss some consequences of these Dirac lines later. The non trivial inversion symmetry for type 1, I = τ1,
401
+ implies the parity of the momentum functions that ε0,k = ε0,−k, t1,k = t1,−k, t2,k = −t2,−k, and λk = −λ−k.
402
+ This form of Hamiltonian has often been used to understand locally non-centrosymmetric superconductors [2] and
403
+ hidden spin polarization in inversion symmetric materials [11].
404
+ In these contexts, the orbital degrees of freedom
405
+ reside on different sectors that are related by inversion symmetry and there is typically no symmetry requirement
406
+ that ensures the SOC dominates. The τ3 matrix is odd under inversion symmetry, allowing the odd-parity SOC
407
+ λk to appear. Many superconductors of interest have Fermi surfaces near type 1 TRIM points, examples include:
408
+ Fe-based superconductors, which often have electron pockets near the M point in space group 129 (classes Dtype1
409
+ 4h,1
410
+ or
411
+ Dtype1
412
+ 4h,3 ) [23], in this context the high Tc superconductor monolayer FeSe is of interest, since it only has Fermi surfaces
413
+ near the M point [36]; CeRh2As2 which exhibits a field induced transition from an even parity to an odd-parity
414
+ superconducting state [7, 8] and has Fermi surfaces near the M point in space group 129 (classes Dtype1
415
+ 4h,1
416
+ or Dtype1
417
+ 4h,3 );
418
+ BiS2-based superconductors [22] which has superconductivity that survives to very high fields and which has electron
419
+ pockets near the X point in space group 129 (class Dtype1
420
+ 2h,3 ); the odd-parity heavy fermion superconductor UPt3
421
+ [24] which has a pancake-like Fermi surface at kz = π/c in space group 193 (class Dtype1
422
+ 6h
423
+ ); and the ferromagnetic
424
+ superconductor UCoGe [25] with space group 62 and a Fermi surface near the T point (class Dtype1
425
+ 2h,1 ).
426
+ For type 2 kp theories, the 4-fold degeneracy is sometimes already split into 2 at the TRIM point when SOC is
427
+ added, unlike what occurs for type 1 kp theories. This happens in classes Ctype2
428
+ 2h,2
429
+ and Dtype2
430
+ 2h,1 . For the other type 2
431
+ classes, this degeneracy at the TRIM point is not split. In these cases, an even number of Dirac lines pass through
432
+ the TRIM point. These Dirac lines lie in the nodal plane. Since I = τ0 for type 2, all terms in the Hamiltonian are
433
+ even parity, that is, unchanged under k → −k. One example where type 2 kp theories apply is in strain induced
434
+ superconductivity in RuO2[37, 38]. Without strain, RuO2 is thought to be a non-superconducting altermagnet [39].
435
+ When strain is applied, bands near the X-M-R-A Brillouin zone face are most strongly affected [37]. RuO2 has space
436
+ group 136 with the R and M points belonging to classes Dtype2
437
+ 2h,4 , Dtype2
438
+ 4h,2 , or Dtype2
439
+ 4h,4 . Later we discuss the ferromagnetic
440
+ superconductor UCoGe with space group 62 [25]. In this example we highlight the role of 8-fold degenerate points
441
+ which exhibit some properties similar to that found for type 2 TRIM points.
442
+ Type 1 and type 2 kp Hamiltonians share some common features that play an important role in understanding
443
+ the properties of the superconducting states. The first is that the non-symmorphic symmetry dictates that these
444
+ Hamiltonians are best described as two-band systems with eigenenergies given by
445
+ E±(k) = ε0,k ±
446
+
447
+ t2
448
+ 1,k + t2
449
+ α,k + |λk|2 = ε0,k ± εδ,k ,
450
+ (3)
451
+ where α is the type index in Eq. 2. The second feature is that both simplify dramatically on the nodal plane, where
452
+ only the coefficient functions ε0,k and λk·ˆn are non-vanishing (that is t1,k = t2,k = t3,k = |λk׈n| = 0). This property
453
+ is a direct consequence of the anomalous pseudopspin. The symmetry arguments discussed in the previous section
454
+ enforce this condition. In particular, for momenta on the nodal plane, the mirror operator through the nodal plane,
455
+ UM, takes the from UM = −iτβ(σ · ˆn). The requirement that these Hamiltonians obey time-reversal and inversion
456
+ symmetries and commute with UM lead to this simple form of the kp theories in the nodal plane. The final important
457
+ property of these kp Hamiltonians is that the SOC terms are often the leading order terms in the kp expansions, that
458
+ is, they appear with the lowest powers of ki. This is the case for classes Ctype2
459
+ 2h,2 , Dtype1
460
+ 2h,1 , Dtype2
461
+ 2h,4 , Dtype1
462
+ 4h,2 , Dtype1
463
+ 4h,3 , and
464
+ Dtype1
465
+ 4h,5 . This feature ensures that there exists a limit in which the SOC is the dominant single-particle interaction on
466
+ the Fermi surface and hence the unusual magnetic superconducting response we later discuss must exist.
467
+ IV.
468
+ SUPERCONDUCTING STATES
469
+ In the previous section, complete symmetry-dictated kp theories were found for anomalous pseudospin.
470
+ These
471
+ theories are complete in the sense that they include all operators of the form τiσj allowed by symmetry. For super-
472
+ conductivity, the orbital degree of freedom enlarges the corresponding space of possible gap functions compared to
473
+ the usual even-parity (pseudospin-singlet) ˜∆(k) = ψk(iσy) and odd-parity (pseudospin-triplet) ˜∆(k) = dk · σ(iσy)
474
+
475
+ 6
476
+ Class
477
+ Symmetry
478
+ Hamiltonian
479
+ Space Group Momenta
480
+ Ctype1
481
+ 2h,1
482
+ Ag + Bg + [Au] + Bu
483
+ H = ϵ0 + (t1xkx + t1zkz)kyτ1 + t2kyτ2
484
+ + τ3[λxkyσx + (λyxkx + λyzkz)σy + λzkyσz]
485
+ 11(C1, D1, E1, Z1), 14(Z1),
486
+ 63(R1(yz)), 176(L1(yz))
487
+ Ctype2
488
+ 2h,2
489
+ Ag + 2Bg + [Ag]
490
+ H = ϵ0 + (t1xkx + t1zkz)kyτ1 + (t3xkx + t3zkz)kyτ3
491
+ +τ2[(λxxkx + λxzkz)kyσx + λyσy + (λzxkx + λzzkz)kyσz]
492
+ 14(D±
493
+ 1 D±
494
+ 2 ), 64(R±
495
+ 1 R±
496
+ 2 (yz))
497
+ Dtype1
498
+ 2h,1
499
+ Ag + B1g + [Au] + B1u
500
+ H = ϵ0 + t1kxkyτ1 + t2kxkykzτ2
501
+ + τ3[λxkyσx + λykxσy + λzkxkykzσz]
502
+ 56(S1,2), 58(R1,2)
503
+ 59(S1,2, R1,2), 62(T1,2(xz))
504
+ Dtype2
505
+ 2h,2
506
+ Ag + 2B1g + [Ag]
507
+ H = ϵ0 + t1kxkyτ1 + t3kxkyτ3
508
+ + τ2[λxkykzσx + λykxkzσy + λzkxkyσz]
509
+ 55(S±
510
+ 1 S±
511
+ 2 , S±
512
+ 3 S±
513
+ 4 , R±
514
+ 1 R±
515
+ 2 , R±
516
+ 3 R±
517
+ 4 )
518
+ 56(R±
519
+ 1 R±
520
+ 2 , R±
521
+ 3 R±
522
+ 4 ), 58(S±
523
+ 1 S±
524
+ 2 , S±
525
+ 3 S±
526
+ 4 )
527
+ Dtype1
528
+ 2h,3
529
+ Ag + B2g + [B1u] + B3u
530
+ H = ϵ0 + t1kxkzτ1 + t2kzτ2
531
+ + τ3[λxkxkykzσx + λykzσy + λzkyσz]
532
+ 51(X1,2, S1,2, U1,2, R1,2), 52(R1,2(xy), Y1,2(xyz))
533
+ 53(Z1,2(zyx), T1,2(zyx)), 54(X1,2, S1,2)
534
+ 55(U1,2(yz), X1,2(yz), Y1,2(xyz), T1,2(xyz))
535
+ 56(X1,2, Y1,2(xy))
536
+ 57(S1,2(xyz), Y1,2(xyz), Z1,2(zyx), U1,2(zyx))
537
+ 58(X1,2(yz), Y1,2(xyz))
538
+ 59(X1,2, U1,2, T1,2(xy), Y1,2(xy)), 60(X1,2, Z1,2(zyx))
539
+ 61(X1,2, Y1,2(xyz), Z1,2(zyx))
540
+ 62(X1,2, Z1,2(xz), Y1,2(xyz))
541
+ 63(T1,2(zyx), Z1,2(zyx)), 64(T1,2(zyx), Z1,2(zyx))
542
+ 127(X1,2(xyz), R1,2(xyz)), 128(X1,2(xyz))
543
+ 129(X1,2(xy), R1,2(xy)), 130(X1,2(xy))
544
+ 135(X1,2(xyz), R1,2(xyz)), 136(X1,2(xyz))
545
+ 137(R1,2(xy), X1,2(xy)), 138(X1,2(xy))
546
+ 193(L1,2), 194(L1,2(xy))
547
+ 205(X1,2(xyz))
548
+ Dtype2
549
+ 2h,4
550
+ Ag + B1g + B3g + [B2g]
551
+ H = ϵ0 + t1kxkyτ1 + t3kykzτ3
552
+ + τ2[λxkxkyσx + λyσy + λzkykzσz]
553
+ 52(T ±
554
+ 1 ), 53(U ±
555
+ 1 (yz), R±
556
+ 1 (yz))
557
+ 58(T ±
558
+ 1 , U ±
559
+ 1 (xy)), 60(S±
560
+ 1 (xy))
561
+ 128(R±
562
+ 1 ), 136(R±
563
+ 1 )
564
+ Dtype1
565
+ 4h,1
566
+ A1g + B2g + [A1u] + B2u
567
+ H = ϵ0 + t1kxkyτ1 + t2kxkykz(k2
568
+ x − k2
569
+ y)τ2
570
+ + τ3[λx(kxσy + kyσx) + λ3kxkykzσz]
571
+ 129(M1,2, A1,2), 130(M1,2)
572
+ 136(A3,4), 137(M1,2), 138(M1,2)
573
+ Dtype2
574
+ 4h,2
575
+ A1g + 2B2g + [A1g]
576
+ H = ϵ0 + t1kxkyτ1 + t3kxkyτ3
577
+ + τ2[λx(kykzσx + kxkzσy) + λzkxky(k2
578
+ x − k2
579
+ y)σz]
580
+ 127(M ±
581
+ 1 M ±
582
+ 4 , M ±
583
+ 2 M ±
584
+ 3 , A±
585
+ 1 A±
586
+ 4 , A±
587
+ 2 A±
588
+ 3 )
589
+ 128(M ±
590
+ 1 M ±
591
+ 4 , M ±
592
+ 2 M ±
593
+ 3 ), 135(M ±
594
+ 1 M ±
595
+ 4 , M ±
596
+ 2 M ±
597
+ 3 )
598
+ 136(M ±
599
+ 1 M ±
600
+ 4 , M ±
601
+ 2 M ±
602
+ 3 ), 138(A±
603
+ 1 A±
604
+ 4 , A±
605
+ 2 A±
606
+ 3 )
607
+ Dtype1
608
+ 4h,3
609
+ A1g + B2g + [B1u] + A2u
610
+ H = ϵ0 + t1kxkyτ1 + t2kxkykzτ2
611
+ + τ3[λx(kxσy − kyσx) + λzkxkykz(k2
612
+ x − k2
613
+ y)σz]
614
+ 129(M3,4, A3,4), 130(M3,4)
615
+ 136(A1,2), 137(M3,4), 138(M3,4)
616
+ Dtype2
617
+ 4h,4
618
+ A1g + A2g + B2g + [B1g]
619
+ H = ϵ0 + t1kxky(k2
620
+ x − k2
621
+ y)τ1 + t3kxkyτ3
622
+ + τ2[λx(kykzσx + kxkzσy) + λzkxkyσz]
623
+ 127(M ±
624
+ 5 , A±
625
+ 5 ), 128(M ±
626
+ 5 )
627
+ 135(M ±
628
+ 5 ), 136(M ±
629
+ 5 ), 138(A±
630
+ 5 )
631
+ Dtype1
632
+ 4h,5
633
+ A1g + A2g + [B1u] + B2u
634
+ H = ϵ0 + t1kxky(k2
635
+ x − k2
636
+ y)τ1 + t2kxkykzτ2
637
+ + τ3[λx(kxσy + kyσx) + λzkxkykzσz]
638
+ 128(A1,2), 137(A1,2)
639
+ Ctype1
640
+ 6h
641
+ Ag + Bg + [Au] + Bu
642
+ H = ϵ0 + (t1xkx(k2
643
+ x − 3k2
644
+ y) + t1yky(3k2
645
+ x − k2
646
+ y))kzτ1
647
+ + t2kzτ2 + τ3[λxkz(2kxkyσx + (k2
648
+ x − k2
649
+ y)σy)
650
+ + (λzxkx(k2
651
+ x − 3k2
652
+ y) + λzyky(3k2
653
+ x − k2
654
+ y))σz]
655
+ 176(A1)
656
+ Dtype1
657
+ 6h
658
+ A1g + B2g + [A2u] + B1u
659
+ H = ϵ0 + t1kxkz(k2
660
+ x − 3k2
661
+ y)τ1 + t2kzτ2
662
+ +τ3[λxkz(2kxkyσx + (k2
663
+ x − k2
664
+ y)σy) + λzky(3k2
665
+ x − k2
666
+ y)σz]
667
+ 193(A1,2), 194(A1,2(xy))
668
+ TABLE II. Classification of kp theories. Subscript numbering of momenta represents different real representations on the same
669
+ momentum point, and a permutation of the axes is denoted by the cyclic notation. For example, 128(X1,2(xyz)) represents
670
+ that there are two representations X1 and X2 on X = (0, 1/2, 0) space group 128, and their local theory is obtained by
671
+ Dtype1
672
+ 2h,3
673
+ Hamiltonian under x → y → z → x relabelling. The representation convention is following Bilbao Crystallographic
674
+ servera[32–34] except for the L point in 193 and 194.
675
+ a https://www.cryst.ehu.es/ Representations and Applications → Point and Space Groups → - Representations → SG Physically
676
+ irreducible representations given in a real basis
677
+
678
+ 7
679
+ states that appear in single-band theories [30, 31]. Nevertheless, it is possible to understand some general properties
680
+ of the allowed pairing states.
681
+ To deduce the symmetry properties of possible pairing channels in this larger space of electronic states, it is useful
682
+ to define gap function differently than usual [40, 41]. In particular, we take
683
+ H =
684
+
685
+ i,j,k
686
+ Hij(k)c†
687
+ k,ick,j + 1
688
+ 2
689
+
690
+ i,j,k
691
+ [∆ij(k)c†
692
+ k,i˜c†
693
+ k,j + h.c.].
694
+ (4)
695
+ where i, j are combined spin and orbital indices, h.c. means Hermitian conjugate, ck(c†
696
+ k) is the Fermionic spin-half
697
+ particle creation(annihilation) operator, and ˜ck(˜c†
698
+ k) is the time reversed partner of ck(c†
699
+ k). In the usual formulation ˜c†
700
+ k,j
701
+ is replaced c†
702
+ −k,j which leads a different gap function ˜∆ij and to difficulties in interpreting the symmetry transformation
703
+ properties of this gap function [40, 41]. For a single-band, these new gap functions become ∆(k) = ψkσ0 for even-
704
+ parity and ∆(k) = dk · σ for odd-parity. The key use of Eq. 4 is that the ∆ij(k) transform under rotations in the
705
+ same way as the Hij(k), allowing the symmetry properties of the gap functions to be deduced. The disadvantage of
706
+ this approach is that the antisymmetry of the gap functions that follows from the Pauli exclusion principle is not as
707
+ readily apparent compared to the usual formulation [40, 41].
708
+ Enforcing the Pauli exclusion principle leads to eight types of gap functions that generalize the pseudospin-singlet
709
+ and pseudospin-triplet of single-band gap functions. Six of these are simple generalizations of the single-band gap
710
+ functions: τiψk and τi(dk · σ) for i = 0, 1, and 3 where ψ−k = ψk and d−k = −dk. Two are new gap functions:
711
+ τ2(ψk · σ) and τ2dk with ψ−k = ψk and d−k = −dk. It is possible to determine whether these gaps functions are
712
+ either even or odd-parity and this depends upon whether the kp Hamiltonian is type 1 or type 2. These gap functions
713
+ and their parity symmetry are listed in Table III. Without further consideration of additional symmetries, the gap
714
+ function will in general be a linear combination all the even (or odd) parity gap functions.
715
+ To gain an understanding of the relative importance of these pairing states it is useful to project these gaps onto the
716
+ band basis. Such a projection is meaningful if the energy separation between the two bands is much larger than the gap
717
+ magnitude. For many of the kp Hamiltonians, due to the presence of Dirac lines, there will exist regions in momentum
718
+ space for which this condition is not satisfied. However, these regions represent a small portion of the Fermi surface
719
+ when the SOC energies are much larger than the gap energies, so that an examination of the projected gap is still
720
+ qualitatively useful in this limit. Provided the superconducting state does not break time-reversal symmetry, the
721
+ projected gap magnitude on band a can be found through [42]
722
+ ˜∆2
723
+ ± = Tr[|{Hδ, ∆}|2P±]
724
+ Tr[|Hδ|2]
725
+ .
726
+ (5)
727
+ where P±(k) = 1
728
+ 2(1 ± Hδ(k)/εδ,k) which is a projection operator onto ± band by the energy dispersion Eq. 3. This
729
+ projected gap magnitude is related to superconducting fitness [43, 44]: if it vanishes, the corresponding gap function
730
+ is called unfit and will have a Tc = 0 in the weak coupling limit. Table III gives the projected gap functions for
731
+ the pairing states discussed above. The projection generally reduces the size of the gap, with the exception of the
732
+ usual even-parity τ0ψk state (interestingly, the odd-parity τ0(dk ·σ) state has a gap that is generically reduced). This
733
+ reduction strongly suppresses the Tc of the pairings state, where it enters exponentially in the weak-coupling limit.
734
+ We later examine the different kp classes to identify fit gap functions since the Tc of these states will be the largest,
735
+ given a fixed attractive interaction strength.
736
+ On the nodal plane, the projected gap functions, shown in Table III, simplify considerably since only ε0 and λk · ˆn
737
+ are non-zero. For both type 1 and type 2 Hamiltonians, this leads to two gap functions that are fully fit, that is,
738
+ not reduced by the projection. For type 1 Hamiltonians, these fully fit states are τ0ψk and τ3ψk. The state τ0ψk is
739
+ even-parity and the state τ3ψk is odd-parity and, as discussed later, these two states play an important role in the
740
+ appearance of a field-induced transition from even to odd parity superconductivity as observed in CeRh2As2. For
741
+ gap functions described by vectors, for example dk, the projected gaps on the nodal plane are of the form |dk · ˆn|2
742
+ or |dk × ˆn|2. This is qualitatively different than the usual odd-parity single-band gap, where the gap magnitude is
743
+ |dk|2. The latter requires that all three components of dk must vanish to have nodes. For the projected gaps on the
744
+ nodal planes, this requirement less stringent: only one or two components of dk need to vanish to have nodes. This
745
+ is closely related to the violation of Blount’s theorem on the nodal planes.
746
+ A.
747
+ Gap projection and the violation of Blount’s theorem
748
+ Blount’s theorem states that time-reversal symmetric odd-parity superconductors cannot have line nodes when SOC
749
+ is present [40]. Key to Blount’s theorem is the assumption that pseudsopsin shares the same symmetry properties
750
+
751
+ 8
752
+ Type 1
753
+ Type 2
754
+ Gap function Inversion
755
+ Gap projection
756
+ Gap on nodal plane Inversion
757
+ Gap projection
758
+ Gap on nodal plane
759
+ τ0ψ
760
+ +
761
+ |ψ|2
762
+ |ψ|2
763
+ +
764
+ |ψ|2
765
+ |ψ|2
766
+ τ0(d · σ)
767
+
768
+ (t2
769
+ 1 + t2
770
+ 2)|d|2 + |d · λ|2
771
+ t2
772
+ 1 + t2
773
+ 2 + |λ|2
774
+ |d · ˆn|2
775
+
776
+ (t2
777
+ 1 + t2
778
+ 2)|d|2 + |d · λ|2
779
+ t2
780
+ 1 + t2
781
+ 2 + |λ|2
782
+ |d · ˆn|2
783
+ τ3ψ
784
+
785
+ |λ|2|ψ|2
786
+ t2
787
+ 1 + t2
788
+ 2 + |λ|2
789
+ |ψ|2
790
+ +
791
+ t2
792
+ 3|ψ|2
793
+ t2
794
+ 1 + t2
795
+ 3 + |λ|2
796
+ 0
797
+ τ3(d · σ)
798
+ +
799
+ |d · λ|2
800
+ t2
801
+ 1 + t2
802
+ 2 + |λ|2
803
+ |d · ˆn|2
804
+
805
+ t2
806
+ 3|d|2 + |d × λ|2
807
+ t2
808
+ 1 + t2
809
+ 3 + |λ|2
810
+ |d × ˆn|2
811
+ τ1ψ
812
+ +
813
+ t2
814
+ 1|ψ|2
815
+ t2
816
+ 1 + t2
817
+ 2 + |λ|2
818
+ 0
819
+ +
820
+ t2
821
+ 1|ψ|2
822
+ t2
823
+ 1 + t2
824
+ 3 + |λ|2
825
+ 0
826
+ τ1(d · σ)
827
+
828
+ t2
829
+ 1|d|2 + |d × λ|2
830
+ t2
831
+ 1 + t2
832
+ 2 + |λ|2
833
+ |d × ˆn|2
834
+
835
+ t2
836
+ 1|d|2 + |d × λ|2
837
+ t2
838
+ 1 + t2
839
+ 2 + |λ|2
840
+ |d × ˆn|2
841
+ τ2d
842
+ +
843
+ t2
844
+ 2|d|2
845
+ t2
846
+ 1 + t2
847
+ 2 + |λ|2
848
+ 0
849
+
850
+ |λ|2|d|2
851
+ t2
852
+ 1 + t2
853
+ 3 + |λ|2
854
+ |d|2
855
+ τ2(ψ · σ)
856
+
857
+ t2
858
+ 2|ψ|2 + |ψ × λ|2
859
+ t2
860
+ 1 + t2
861
+ 2 + |λ|2
862
+ |ψ × ˆn|2
863
+ +
864
+ |ψ · λ|2
865
+ t2
866
+ 1 + t2
867
+ 3 + |λ|2
868
+ |ψ · ˆn|2
869
+ TABLE III. Classification of allowed pairing states for the kp theories. For both type I and II TRIMs we give the symmetry
870
+ under inversion, the gap projection onto the Fermi surface, and the gap on the nodal plane. The momentum subscript indices
871
+ k of the coefficient functions are omitted here.
872
+ as usual spin [40]. While the violation of Blount’s theorem in non-symmorphic space groups has been demonstrated
873
+ earlier [18, 20, 21], here we present a simple proof that closely links anomalous pseudopsin to the violation of Blount’s
874
+ theorem.
875
+ The existence of anomalous pseudospin requires the presence of the translation mirror symmetry ˜
876
+ Mˆn. Consequently,
877
+ the gap function can be classified as even or odd under this symmetry. Momenta on the nodal plane are invariant
878
+ under ˜
879
+ Mˆn. Hence, for these momenta, U †
880
+ M∆(k)UM = ±∆(k) where the + (−) holds for a mirror-even (mirror-odd)
881
+ gap function. For our basis choice UM = −iτβ(σ · ˆn). Importantly, for both types the kp theories on the nodal plane
882
+ are given by H(k) = ε0,k +iUM(λk · ˆn). This defines the two bands E±(k) = ε0,k ±|λk · ˆn|. Written in the band basis,
883
+ we can divide the pairing potential into intraband and interband components. On the nodal plane the intraband gap
884
+ functions are explicitly given by
885
+ P±∆P± = 1
886
+ 4(−UM ± i sgn(λk · ˆn)){UM, ∆} ,
887
+ (6)
888
+ while the interband components are
889
+ P±∆P∓ = 1
890
+ 4(−UM ± i sgn(λk · ˆn))[UM, ∆]
891
+ (7)
892
+ We observe that since a mirror-even gap function satisfies [UM, ∆] = 0, the interband gap components must vanish
893
+ on the nodal plane, i.e. the pairing only involves particles from the same band. The general form of the BdG energy
894
+ dispersion relation is then
895
+ ±′ �
896
+ (ε0,k ± |λk · ˆn|)2 + |∆±±|2 ,
897
+ (8)
898
+ where intraband gap magnitude |∆±±|2 =
899
+ 1
900
+ 4Tr[|P±∆P±|2] and ±′ is the particle-hole symmetry index which is
901
+ independent of band index ±. Since there is no requirement that |∆±±|2 = 0, line nodes are therefore not expected
902
+ on the nodal plane, but rather we should generically find two-gap behavior with different size gaps on the two bands.
903
+ In contrast, for the mirror-odd gap functions we have {UM, ∆} = 0, so there is no intraband pairing on the nodal
904
+ plane. The eigenenergies for this interband pairing state are then
905
+ ±′ �
906
+ ±|λk · ˆn| +
907
+
908
+ ϵ2
909
+ 0,k + |∆±∓|2
910
+
911
+ ,
912
+ (9)
913
+ where intraband gap magnitude |∆±∓|2 = 1
914
+ 4Tr[|P±∆P∓|2]. The gap has line nodes provided |λk · ˆn|2 > |∆±∓|2. This
915
+ result depends only on the mirror-odd symmetry of the gap, and not on the parity symmetry. Since gaps which are
916
+ odd under both mirror and parity symmetry are allowed, this result shows that odd-parity gaps can have line nodes,
917
+ thus demonstrating a violation of Blount’s theorem.
918
+
919
+ 9
920
+ The origin of these nodes due to purely interband pairing implies that the nodes are shifted off the Fermi surface
921
+ [45]. If the spin-orbit coupling is too weak, i.e. |λk · ˆn|2 < |∆±∓|2, the nodes can annihilate with each other and are
922
+ absent. This possibility has been discussed in the context of monolayer FeSe [46] and UPt3 [47]. The analysis above
923
+ is valid even when Dirac lines pass through the TRIM points, as is the case in most of the derived kp theories. On
924
+ the Dirac lines, the condition |λk · ˆn|2 < |∆±∓|2 must occur and the spectrum is therefore gapped. In the Appendix
925
+ A we present exact expressions for the energy eigenstates on the nodal plane for all possible combinations of mirror
926
+ and parity gap symmetries.
927
+ B.
928
+ Unconventional pairing states from electron-phonon interactions
929
+ To highlight how pairing of anomalous pseudospin can differ from the single-band superconductivity, it is instructive
930
+ to consider an attractive U Hubbard model. Such a model is often used to capture the physics of electron-phonon
931
+ driven s-wave superconductivity in single-band models. Here we show that this coupling also allows unconventional
932
+ pairings states. In particular, odd-parity states in type 1 kp Hamiltonians. Such a state has recently likley been
933
+ observed in CeRh2As2.
934
+ Here we consider a local Hubbard-U attraction on each site of the lattice and do not consider any longer range
935
+ Coulomb interactions. These sites are defined by their Wyckoff positions. Importantly, for the non-symmorphic groups
936
+ we have considered here, each Wyckoff position has a multiplicity greater than one. Here we limit our discussion to
937
+ Wyckoff positions with multiplicity two, which implies that there are two inequivalent atoms per unit cell.
938
+ An
939
+ attractive U on these sites stabilizes a local spin-singlet Cooper pair. Since there are two sites per unit cell this
940
+ implies that there are two stable superconducting degrees of freedom per unit cell. These two superconducting states
941
+ can be constructed by setting the phase of Cooper pair wavefunction on each site to be the same or opposite. Since
942
+ only local interactions are included, both these two states will have the same pairing interaction. The in-phase state
943
+ is a usual s-wave τ0ψk state. Identifying the other, out of phase, superconducting state requires an understanding of
944
+ the relationship between the basis states for the kp Hamiltonians and orbitals located at the Wyckoff positions. In
945
+ general, this will depend on the specific orbitals included in the theory. However, the condition that the resultant
946
+ pairing states must be spin-singlet and local in space (hence momentum independent) allows only two possibilities
947
+ for this additional pairing state: it is either a τ1ψk or a τ3ψk pairing state. Of these states, for two reasons, the τ3ψk
948
+ state for type 1 Hamiltonains is of particular interest. The first reason is that this state is odd-parity and therefore
949
+ offers a route towards topological superconductivity [48, 49]. The second reason is that of the four possible states
950
+ (τ1ψk or τ3ψk for type 1 or type 2 Hamiltonians), this is the only state that is fully fit on the nodal plane (as can be
951
+ seen in Table III, the other three states have zero gap projection on the nodal plane). This implies that for type 1
952
+ Hamiltonians, the odd-parity τ3ψk and the s-wave τ0ψk states can have comparable Tc since they both have the same
953
+ pairing interaction. In practice, the τ3ψk state will have a lower Tc than the τ0ψk state since it will not be fully fit away
954
+ from the nodal plane. Table III reveals that this projection is given by the ratio |λk|2/(t2
955
+ 1,k +t2
956
+ 2,k +|λk|2). For classes
957
+ Dtype1
958
+ 2h,1 , Dtype1
959
+ 4h,1 , Dtype1
960
+ 4h,3 , and Dtype1
961
+ 4h,5 , this ratio is nearly one since the SOC terms are the largest in the kp Hamiltonian.
962
+ This suggests that these classes offer a promising route towards stabilizing odd-parity superconductivity. We stress
963
+ that because |λk|2/(t2
964
+ 1,k + t2
965
+ 2,k + |λk|2) is slightly less than one, the Tc of the odd-parity τ3ψk will be comparable but
966
+ less than that of the usual s-wave state. However, as we discuss later, the τ3ψk state can be stabilized over the usual
967
+ s-wave τ0ψk state in an applied field. The identification of classes Dtype1
968
+ 2h,1 , Dtype1
969
+ 4h,1 , Dtype1
970
+ 4h,3 , and Dtype1
971
+ 4h,5
972
+ that maximize
973
+ the Tc of odd-parity pairing from electron-phonon interactions allows the earlier theory for a field induced even to
974
+ odd parity transition CeRh2As2 [9] (with space group 129) to be generalized to many other space groups.
975
+ While the above odd-parity state is only relevant for type 1 Hamiltonians, for type 2 Hamiltonians, the usual s-wave
976
+ interaction can develop a novel structure. In particular, for the classes Ctype2
977
+ 2h,2
978
+ and Dtype2
979
+ 2h,4 , Table II shows that the
980
+ state τ2σy is maximally fit and has s-wave symmetry. Consequently, this state will admix with the usual s-wave τ0ψ
981
+ state. The theory describing this admixture formally resembles that of a Hund pairing mechanism proposed to explain
982
+ the appearance of nodes in the likely s-wave superconductor KFe2As2 [50]. The results of this analysis and a follow
983
+ up analysis [51] allows some of the properties of this state to be understood. An important conclusion of these works
984
+ is that an s-wave superconducting state can emerge even when pairing for the usual s-wave state is repulsive (that is
985
+ for the Hubbard U > 0). This holds if two conditions are met: the effective interaction for the τ2σy state is attractive
986
+ (to first approximation, this effective interaction does not depend upon U [50, 51]) and the two bands that emerge in
987
+ the kp theory both cross the chemical potential. This s-wave pairing state naturally lead to nodes.
988
+
989
+ 10
990
+ V.
991
+ ROLE OF MAGNETIC FIELDS
992
+ The role of anomalous pseudopsin is perhaps most unusual in response to magnetic fields. In many superconductors,
993
+ there has been a push to drive up the magnetic field at which these are operational. Ising superconductors are one
994
+ class of materials for which this has been successful, the in-plane critical field far surpasses the Pauli field, opening
995
+ the door to applications [52]. Another relevant example is the field induced transition from an even parity to an
996
+ odd-parity state observed in CeRh2As2 [7, 8].
997
+ Recently, a powerful method to examine the response of superconductors to time-reversal symmetry-breaking fields
998
+ has been developed by the projection onto the band-basis[42]. The form of the kp theories we have developed allows
999
+ for the direct application of this projection method. The response of superconductivity to time-reversal symmetry-
1000
+ breaking is described by a time-reversal symmetry-breaking interaction Hh(k). A common form of TRSB Hamiltonian,
1001
+ and the one we emphasize here, is the Zeeman field interaction term, which is represented by
1002
+ Hh(k) = τ0(h · σ) ,
1003
+ (10)
1004
+ where h is a magnetic field parameter in the system. We note that our qualitative results apply to a broader range of
1005
+ TRSB Hamiltonians. In particular, this is true if the TRSB field shares the same symmetry properties as a Zeeman
1006
+ field (for example if Hh(k) describes the coupling between orbital angular momentum and an applied field).
1007
+ The theory introduces two parameters that quantify the response of superconductivity to time-reversal symmetry-
1008
+ breaking. The first parameter is an effective g-factor given by
1009
+ ˜g2
1010
+ ±,k,h = 2Tr[|{Hδ, Hh}|2P±]
1011
+ Tr[|Hδ|2]Tr[|Hh|2] .
1012
+ (11)
1013
+ The second parameter is the field-fitness, given by
1014
+ ˜F±,k,h =
1015
+ Tr[|{{Hδ, ˜∆}, {Hδ, Hh}}|2P±]
1016
+ 2Tr[|{Hδ, Hh}|2P±]Tr[|{Hδ, ˜∆}|2P±]
1017
+ .
1018
+ (12)
1019
+ This field-fitness function ranges in value from zero to one. When the field-fitness is zero, the superconducting state
1020
+ is not suppressed by the time-reversal symmetry breaking perturbation. With these two parameters, the response of
1021
+ superconductivity to applied fields and the temperature dependence of magnetic susceptibility in the superconducting
1022
+ state can be determined. With the choice of the time-reversal symmetry-breaking field as the Zeeman field, Eq. 10,
1023
+ one finds
1024
+ ˜g2
1025
+ ±,k,h =
1026
+ t2
1027
+ 1,k + t2
1028
+ α,k + (λk · ˆh)2
1029
+ t2
1030
+ 1,k + t2
1031
+ α,k + λ2
1032
+ k
1033
+ (13)
1034
+ where α is a type index that is 2 for type 1 and 3 for type 2. This agrees with results in [53] derived for Hamiltonians
1035
+ that resemble type 1 Hamiltonians. We note that the band index ± and the magnitude of field h in the field-fitness
1036
+ and the g-factor do not change the outcome, thus they will be omitted in the subsequent sections and they will be
1037
+ denoted by ˜F 2
1038
+ k,ˆh and ˜g2
1039
+ k,ˆh.
1040
+ A.
1041
+ Even parity superconductors
1042
+ It can be shown that the field-fitness parameter in Eq. 12 is 1 for all even parity states. Consequently, the magnetic
1043
+ response is governed solely by the generalized g-factor given in Eq. 13. For momenta on the nodal plane, where
1044
+ t1,k = t2,k = t3,k = λk × ˆn = 0, the g-factor vanishes for magnetic fields orthogonal to ˆn. This is a direct consequence
1045
+ of the anomalous pseudospin, since the symmetries of the Pauli matrices formed from anomalous pseudospin do
1046
+ not allow any coupling to a Zeeman field perpendicular to ˆn. An immediate consequence is that superconductivity
1047
+ survives to much stronger fields than expected for these field orientations. However, momenta that do not sit on
1048
+ the nodal plane also contribute to the superconducting state and their contribution needs to be included as well. To
1049
+ quantify this, we solve for the Pauli limiting field within weak coupling theory at T = 0. For an isotropic s-wave
1050
+ superconductor, we find
1051
+ ln
1052
+ hP,ˆh
1053
+ h0
1054
+ = −⟨ln |˜gk,ˆh|⟩k
1055
+ (14)
1056
+
1057
+ 11
1058
+ -1.0
1059
+ -0.5
1060
+ 0.0
1061
+ 0.5
1062
+ 1.0
1063
+ Γ
1064
+ X
1065
+ M
1066
+ (a)
1067
+ Energy (eV)
1068
+ -1.0
1069
+ -0.5
1070
+ 0.0
1071
+ 0.5
1072
+ 1.0
1073
+ Γ
1074
+ X
1075
+ M
1076
+ (b)
1077
+ FIG. 2.
1078
+ DFT bands of BiS2 near the X point (a) without and (b) with the SOC. The bands highlighted in the box are our
1079
+ focus.
1080
+ for field along direction ˆh, where h0 is the usual Pauli limiting field (found when the SOC is ignored), and ⟨·⟩k means
1081
+ an average over the Fermi surface weighted by the density of states. Below, we apply this formula to BiS2-based
1082
+ superconductors. We note that the spin susceptibility in the superconducting state can also be expressed using ˜gk,ˆh
1083
+ as well [42], and this shows that a non-zero spin susceptibility is predicted at zero temperature whenever the critical
1084
+ field surpasses h0.
1085
+ 1.
1086
+ Enhanced in plane field Pauli for BiS2-based superconductors
1087
+ Here we turn to recent experimental results on BiS2-based superconductors [22, 54]. This material has the tetragonal
1088
+ space group 129 (P4/nmm) and it exhibits two electron pockets about the two equivalent X points [55]. When S is
1089
+ replaced with Se, it has been observed that the in-plane upper critical field surpasses the usual Pauli limiting field by
1090
+ a factor of 7 [54]. While it has been suggested that the local non-centrosymmetric structure is the source of this large
1091
+ critical field [54], there has been no quantitative calculation for this. Here we apply Eq. 14 to the kp theory at the
1092
+ X-point to see if it is possible to account for this large critical field. The X point in space group 129 belongs to class
1093
+ Dtype1
1094
+ 2h,3 .For BiS2, the dispersion is known to be strongly two-dimensional (2D) [22, 55] so we consider the kp theory in
1095
+ the 2D limit. This kp theory is
1096
+ HBiS2 = ¯h2
1097
+ 2m
1098
+
1099
+ k2
1100
+ x + γ2k2
1101
+ y
1102
+
1103
+ − µ + t2kyτ2 + λxkyτ3σx + λykxτ3σy.
1104
+ (15)
1105
+ Assuming s-wave superconductivity and accounting for the two equivalent pockets yields
1106
+ hP,ˆx = h0
1107
+
1108
+ t2
1109
+ 2 + λ2x + |γλy|
1110
+
1111
+ |t2| + |γλy|(t2
1112
+ 2 + λ2x)1/4
1113
+ (16)
1114
+ where h0 is the usual Pauli limiting field. For simplicity we consider γ = 1 in the following. Eq. 16 reveals that a large
1115
+ enhancement of the limiting field is possible and requires two conditions. The first is that t2 << λx, λy and second is
1116
+ that these is substantial anisotropy in λx and λy. To understand if these conditions are reasonable, we have carried
1117
+ out density-functional theory (DFT) calculations on LaO1/2F1/2BiS2 with and without SOC. DFT calculations for
1118
+ LaO1/2F1/2BiS2 were carried out by the full-potential linearized augmented plane wave method [56]. The Perdew-
1119
+ Burke-Ernzerhof form of the exchange correlation functional [57], wave function and potential energy cutoffs of 14 and
1120
+ 200 Ry, respectively, muffin-tin sphere radii of 1.15, 1.2, 1.3, 1.0 ˚A for Bi, S, La, O atoms, respectively, the experimental
1121
+ lattice parameters [58], and an 15 × 15 × 5 k-point mesh were employed for the self-consistent field calculation. The
1122
+ virtual crystal approximation was used by setting the nuclear charge Z = 8.5 at O(F) sites. The resultant bands are
1123
+ shown in Fig. 2. Without SOC, the band splitting along Γ to X yields an estimate for t2. When SOC is present, the
1124
+ band splitting along the X to M yields λy and the band splitting along Γ to X yields
1125
+
1126
+ λ2x + t2
1127
+ 2. The DFT calculated
1128
+ splittings suggest that λx is the largest parameter by a factor of 3-4, while t2 and λy are comparable. This suggests
1129
+ that the conditions to achieve a large critical field are realistic in BiS2-based superconductors. Note that the largest
1130
+
1131
+ 12
1132
+ observed Pauli fields are found when the S is substituted by Se [54]. Se has a larger SOC than S, suggesting that the
1133
+ λi parameters will be increased from what we estimate here. This is currently under exploration.
1134
+ It is worthwhile contrasting the above theory with that for Fe-based materials in which electron pockets exist near
1135
+ the M point of space group 129. The M-point is described by class Dtype1
1136
+ 4h,1 . In this case, an analysis similar to to
1137
+ BiS2 gives an enhancement of only
1138
+
1139
+ 2 of the Pauli field for in-plane fields. For c-axis fields, this class implies a
1140
+ significantly enhanced Pauli limiting field. These results are consistent with experimental fits to upper critical fields
1141
+ in Fe-based superconductors that reveal that the upper critical field for in-plane fields are Pauli suppressed while those
1142
+ for field along the c-axis are not [59]. The contrast bewteen Fe-based materials and BiS2-based materials highlights the
1143
+ importance of the different classes. In particular, the lower orthorhombic symmetry of the X point allows protection
1144
+ to in-plane fields not afforded to the M point, where the theory is strongly constrained by tetragonal symmetry.
1145
+ 2.
1146
+ Pair density wave states
1147
+ In BCS theory, a spin-singlet superconductor is suppressed by the Zeeman effect.
1148
+ Under a sufficiently strong
1149
+ magnetic field, the pairing susceptibility can be peaked at non-zero Cooper pair momenta, leading to a pair density
1150
+ wave or FFLO state [60–62]. A schematic phase diagram for a centrosymmetric system is shown in the left panel
1151
+ of Fig.3. The typically first order phase transition (double solid line) between the uniform and FFLO state ends at
1152
+ a bicritical point (Tb, Hb), i.e. FFLO state only exists for T < Tb. A weak-coupling calculation reveals that for the
1153
+ usual FFLO phase, Tb/Tc = 0.56
1154
+ It is known that for locally non-centrosymmetric superconductors, FFLO-like phases can appear at lower fields Hb
1155
+ and higher temperatures Tb than the usual FFLO-like instability [5]. This is closely linked to the symmetry required
1156
+ instability to a pair density wave state for non-centrosymmetric superconductors when a field is applied [2]. For a
1157
+ non-centrosymmetric system under magnetic field, both inversion and time-reversal symmetry are broken. As a result,
1158
+ the pairing susceptibility is generically peaked at non-zero momentum and Tb = Tc. For locally non-centrosymmtric
1159
+ superconductors, inversion symmetry is locally broken on each sublattice. In an extreme case, if the two sublattices
1160
+ are decoupled, then the system effectively becomes non-centrosymmetric, and under a small magnetic field, an FFLO
1161
+ state can exists right below the zero-field superconducting Tc. However, these sublattices are generically coupled so
1162
+ that Tb = Tc is not realized in practice. Here we show that for type 1 Hamiltonians, FFLO-like states can in principle
1163
+ exist up to Tb = Tc.
1164
+ FIG. 3. Schematic phase diagram for a spin-singlet superconductor under Zeeman effect. Single solid lines denote continuous
1165
+ phase transitions while double solid lines denote first-order phase transitions.
1166
+ To show this, we consider the 2D version of class Dtype1
1167
+ 4h,1
1168
+ and use the pairing susceptibility to calculate Tb and Hb.
1169
+ In 2D, class Dtype1
1170
+ 4h,1
1171
+ has the following normal state Hamiltonian:
1172
+ HD4h,1 = ¯h2
1173
+ 2m(k2
1174
+ x + k2
1175
+ y) − µ + t1kxkyτ1 + λxτ3(kyσx + kxσy) + Hxσx
1176
+ (17)
1177
+ λx denotes the strength of the local inversion symmetry breaking (local Rashba SOC), while t1 is the inter-sublattice
1178
+
1179
+ 13
1180
+ coupling. The pairing susceptibility for an s-wave state with gap function τ0ψk is
1181
+ χpairing(Q) = − 1
1182
+ β
1183
+
1184
+ ωn
1185
+
1186
+ (p,p+Q)∈FS
1187
+ Tr [G0(Q + p, ωn)G0(p, ωn)] ,
1188
+ (18)
1189
+ where G0 is the normal state Green’s function written in Nambu space. The FFLO state is favored, if the pairing
1190
+ susceptibility is peaked at non-zero Q. We examine the position of the bicritical point (Tb, Hb), as a function of
1191
+ λx/(t1kF ). We use the following two equations to locate the bicritical point: (1) The bicritical point lies on the BCS
1192
+ transition for the uniform superconductivity. (2) The bicritical point is a continuous phase transition between uniform
1193
+ and FFLO superconductivity, where ∇2
1194
+ Qχpairing(Q) = 0. The result is in Fig. 4. 1000 × 1000 points are sampled in
1195
+ the 2D Brillouin zone. Other parameters are t1 = 0.2, t = µ = 1. An energy cutoff of Ec = 0.1 is applied to determine
1196
+ the position of the Fermi surface.
1197
+ 0
1198
+ 0.02
1199
+ 0.04
1200
+ 0.06
1201
+ 0.08
1202
+ 0.1
1203
+ x/t 1/kF
1204
+ 0
1205
+ 0.2
1206
+ 0.4
1207
+ 0.6
1208
+ 0.8
1209
+ 1
1210
+ Tb/Tc
1211
+ 0
1212
+ 0.02
1213
+ 0.04
1214
+ 0.06
1215
+ 0.08
1216
+ 0.1
1217
+ x/t 1/kF
1218
+ 0
1219
+ 0.2
1220
+ 0.4
1221
+ 0.6
1222
+ 0.8
1223
+ 1
1224
+ Hb/Hb( x=0)
1225
+ FIG. 4. The position of the bicritical point (Tb, Hb), as a function of λx/kF t1.
1226
+ These results show that for zero λx/kF t1, a usual FFLO phase is found (that is Tb/Tc ≈ 0.56). As the SOC λx
1227
+ increases or equivalently, as kF decreases, Tb increases and approaches the zero-field critical temperature. In the
1228
+ meantime, Hb monotonically decreases.
1229
+ We have shown that the FFLO phase can exist up to Tb = Tc for a 2D version of class Dtype1
1230
+ 4h,1 . Key is that SOC is
1231
+ the leading order term in the kp theory and this is also the case for other type 1 Hamiltonians. Hence the optimal
1232
+ conditions for an enhanced FFLO phase to occur are when fields are applied in-plane (perpendicular to the c-axis)
1233
+ for classes Dtype1
1234
+ 2h,1 , Dtype1
1235
+ 4h,1 , Dtype1
1236
+ 4h,3 , and Dtype1
1237
+ 4h,5 .
1238
+ B.
1239
+ Odd-parity superconductors
1240
+ For odd parity superconductors, the field fitness parameter ˜Fk,ˆh can become less than 1 [42]. Of particular interest
1241
+ is when ˜Fk,ˆh = 0 since this implies that Tc is unchanged by the time-reversal symmetry breaking field (this is
1242
+ independent of the effective g-factor) [42]. For anomalous pseudospin this possibility leads to two consequences not
1243
+ expected for spin-triplet states made from usual spin-1/2 fermions. The first is a field induced transition from an
1244
+ even to an odd parity state. The second is that, in spite of the presence of strong SOC, the superconducting state is
1245
+ immune to magnetic fields for all field orientations. We discuss these each in turn.
1246
+ 1.
1247
+ Field induced even to odd parity transitions
1248
+ In CeRh2As2, a field induced even to odd parity transition has been observed for the field oriented along the c-axis
1249
+ in this tetragonal material [7, 8]. Earlier, we argued that this was due the anomalous pseudospin that arises on the
1250
+ Brillouin zone faces in the non-symmorphic space group P4/nmm [9]. Here we show how this can be generalized
1251
+ to other space groups that admit type 1 kp theories and determine which classes are optimal for observing such a
1252
+ transition. As discussed in Section IV C, an attractive electron-phonon like interaction gives rise to both both a usual
1253
+
1254
+ 14
1255
+ s-wave τ0ψk state and an odd-parity τ3ψk state. These two states have the same pairing interaction, but the gap
1256
+ projected onto the band basis is generally smaller for the τ3ψk state than for the τ0ψk state, implying that τ0ψk state
1257
+ has the higher Tc. For the type 1 classes Dtype1
1258
+ 2h,1 , Dtype1
1259
+ 4h,1 , Dtype1
1260
+ 4h,3 , and Dtype1
1261
+ 4h,5 , anomalous pseudospin leads to Tc’s that
1262
+ are nearly the same for the even τ0ψ and odd-parity τ3ψ states. These classes are therefore promising for observing
1263
+ a field induced transition from an even-parity to an odd-parity state.
1264
+ To determine if a such a field induced transition occurs we compute ˜Fk,ˆh for a pairing state ˜∆ = τ3. We find for
1265
+ type 1 kp theories
1266
+ ˜Fk,ˆh =
1267
+ (ˆh · λk)2(t2
1268
+ 1,k + t2
1269
+ 2,k + |λk|2)
1270
+ |λk|2[ˆh2(t2
1271
+ 1,k + t2
1272
+ 2,k) + (ˆh · λk)2]
1273
+ .
1274
+ (19)
1275
+ Notice if ˆh · λk = 0, then ˜Fk,ˆh = 0 which maximizes Tc. To determine the field orientations for which ˜Fk,ˆh = 0, we
1276
+ examine the form of λk in the type 1 classes discussed above. In all these classes, the λz,k component appears with a
1277
+ higher power of momenta than the other components. Consequently, the field should be applied along the ˆz direction.
1278
+ As an example, consider the class Dtype1
1279
+ 4h,3 . Here λz,k ∝ kxkykz(k2
1280
+ x − k2
1281
+ y) while λx,k ∝ ky and λy,k ∝ ky. In this case
1282
+ λk will be in-plane to an excellent approximation, and an even to odd-parity transition can be expected for the field
1283
+ along the c-axis. Consequently, classes Dtype1
1284
+ 2h,1 , Dtype1
1285
+ 4h,1 , Dtype1
1286
+ 4h,3 , and Dtype1
1287
+ 4h,5
1288
+ and, hence, space groups 56, 58, 59, 62,
1289
+ 128, 129, 130, 136, 137, and 138 are promising for realizing a field-induced even to odd parity transition.
1290
+ 2.
1291
+ Field immune odd-parity superconductivity
1292
+ For a conventional spin-triplet superconductor (with ∆ = dk · σ) formed from usual spin-1/2 pseudospin, SOC
1293
+ typically pins the direction of the vector dk. If the applied field is perpendicular to dk, that is if dk · ˆh = 0, then the
1294
+ Tc for this field orientation is unchanged [63–65]. Since there exists at least one field direction for which dk · ˆh ̸= 0, it
1295
+ is not expected that usual spin-triplet superconductors are immune to fields applied in all directions. For anomalous
1296
+ pseudopsin, this is not the case, it is possible for an odd-parity state to be robust against suppression for arbitrarily
1297
+ oriented magnetic fields. To show how this is possible, we calculate ˜Fk,ˆh for ∆ = τ0(dk · σ) for type 1 kp theories,
1298
+ this yields
1299
+ ˜Fk,ˆh =
1300
+ [(t2
1301
+ 1,k + t2
1302
+ 2,k)dk · ˆh + (dk · λk)(λk · ˆh)]2
1303
+ [(t2
1304
+ 1,k + t2
1305
+ 2,k)ˆh2 + (λk · ˆh)2][(t2
1306
+ 1,k + t2
1307
+ 2,k)|dk|2 + (dk · λk)2]
1308
+ .
1309
+ (20)
1310
+ We first note that near the nodal plane, the effective g-factor is small for in-plane fields ˆn·⃗h = 0, so that for these field
1311
+ orientations superconductivity is not strongly suppressed (this is true for both even and odd-parity superconducting
1312
+ states). Hence, to show that an odd-parity state survives for all field orientations, we need to show that ˜Fk,ˆh ≈ 0
1313
+ for a field applied along the nodal plane normal where λk · ˆh becomes maximal. Near the plane we expect that
1314
+ λk · ˆh ≫
1315
+
1316
+ t2
1317
+ 1,k + t2
1318
+ 2,k. Also, (t2
1319
+ 1,k + t2
1320
+ 2,k) is small compared to λ2
1321
+ k, so ˜Fk,ˆh is dominated by the dk · λk term in the
1322
+ numerator. Hence if the denominator |t1,2dk| is much bigger than dk ·λk, then ˜Fk,ˆh ≈ 0. Given that λˆn is the largest
1323
+ SOC component, this requirement is equivalent to λ⊥ ≪ t1,2 and dk ⊥ ˆn (where λ⊥ is the magnitude of the SOC
1324
+ perpendicular to ˆn).
1325
+ As a relevant example of the above mechanism we consider UPt3 [24]. The superconducting state in UPt3 is believed
1326
+ to be an E2u state, with order parameter ∆ = ηp(σxky + σykx) + ηfσzkzkxky (we only include one component of
1327
+ this two-component order parameter since similar arguments hold for the second component). In general, since the
1328
+ p-wave and f-wave components have the same symmetry, both ηp and ηf are non-zero. However, theories based on
1329
+ the usual pseudospin typically require ηp = 0 due to the experimental observations discussed below [66–68]. Below we
1330
+ further show that ηp = 0 is not required for these experimental observations when anomalous pseudospin is considered.
1331
+ Indeed, these experiments are consistent with ηf = 0 and ηp ̸= 0 if pairing occurs predominantly near the nodal plane
1332
+ kz = π/c.
1333
+ Thermal conductivity experiments suggest the existence of line nodes [24]. For usual pseudospin, the state σxky +
1334
+ σykx is either fully gapped or has only point nodes. This is one reason to expect that ηp = 0. However, as illustrated
1335
+ in Table II, line nodes are expected for this state on the kz = π/c plane (note this conclusion also follows from
1336
+ Refs [18, 19, 21]). This is relevant for UPt3 since it is known to have the ‘starfish’ Fermi surface near this nodal plane
1337
+ [24] which belongs to class Dtype1
1338
+ 6h
1339
+ In terms of paramagnetic suppression, the superconducting state is known to be more robust under B ⊥ z compared
1340
+ to B ∥ z [68]. For the usual pseudospin, this requires dk ∥ z, and thus ηp = 0. However, on the ‘starfish’ Fermi
1341
+
1342
+ 15
1343
+ surface, the small g-factor for B ⊥ z can serve to protect the p-wave state against paramagnetic suppression. As
1344
+ discussed above, the suppression from B ∥ z depends on the ratio λx,y/t1,2, while the g-factor for B ⊥ z depends
1345
+ on the ratio (t1,2, λx,y)/λz. The requirement λx,y/t1,2 > (t1,2, λx,y)/λz is thus sufficient to match the observations
1346
+ on the upper critical fields. If both ratios are much smaller than one, the p-wave state is immune to paramagnetic
1347
+ suppression for field along arbitrary directions. This could be relevant to the approximately unchanged Knight shift
1348
+ in the superconducting state [69]. We note that the use of ˜Fk,ˆh to determine the magnetic response relies on the
1349
+ validity of projection to a single band. However, for class Dtype1
1350
+ 6h
1351
+ band degeneracies exist along three Dirac lines for
1352
+ which this projection is not valid. In Appendix B we include a detailed numerical calculation that includes interband
1353
+ effects.
1354
+ VI.
1355
+ 8-FOLD DEGENERATE POINTS: APPLICATION TO UCOGE
1356
+ The arguments presented above relied on the 4-fold degeneracy at TRIM points when SOC is not present. However,
1357
+ some of these TRIM points have an 8-fold degeneracy without SOC. It is reasonable to ask if the conclusions found for
1358
+ kp theories of 4-fold degenerate points discussed above survive to 8-fold degenerate points. To address this, we have
1359
+ determined the symmetries of all orbital operators in Appendix C. We find that in most cases, the 8-fold degeneracy
1360
+ at these TRIM is split by a single SOC term of the form Oσi where O is a momentum independent 4 by 4 orbital
1361
+ matrix. In Table.IV, we give the direction of the spin component σi that appears in this SOC term at the TRIM point.
1362
+ The existence of this single SOC term ensures small effective g-factors for fields perpendicular to the spin-component
1363
+ direction. Consequently, the conclusions associated with the effective g-factor anisotropy discussed in Section V still
1364
+ hold for these 8-fold degenerate points. We note that the 8-fold degeneracy at the A point of space groups 130 and
1365
+ 135 are not split by SOC and these points provide examples of double Dirac points examined in [70, 71].
1366
+ Spin Alignment
1367
+ Space Group Momenta
1368
+ σx
1369
+ 54(U1U2),54(R1R2),56(U1U2),60(R1R2),61(S1S2),62(S1S2),205(M1M2)
1370
+ σy
1371
+ 52(S1S2),56(T1T2),57(T1T2),57(R1R2),61(T1T2),130(R1R2),138(R1R2)
1372
+ σz
1373
+ 60(T1T2),60(U1U2),61(U1U2),62(R1R2),128(A3A4),137(A3A4),176(A2A3),193(A3),194(A3)
1374
+ TABLE IV. Spin alignment of 8-fold degenerate TRIM.
1375
+ One material for which these 8-fold degenerate points are likely to be relevant is the ferromagetic superconductor
1376
+ UCoGe, which crystalizes in space group 62 (Pnma) [25]. UCoGe is believed to be a possibly topological odd-parity
1377
+ superconductor [17, 25]. Our Fermi surface (given in Figure 3) reveals that all Fermi surface sheets lie near nodal
1378
+ planes with anomalous pseudospin and further reveal tube-shaped pockets that enclose the zone-boundary S point
1379
+ and stretch along the S-R axis. Here we focus on these Fermi surfaces. This feature reasonably agrees with previous
1380
+ works [72–74] using local density approximation and the existence of these tube shaped Fermi surfaces is consistent
1381
+ with quantum oscillation measurements [75]. Here density-functional theory calculations for UCoGe were carried
1382
+ out by the full-potential linearized augmented plane wave method [56]. Perdew-Burke-Ernzerhof form of exchange
1383
+ correlation functional [57], wave function and potential energy cutoffs of 16 and 200 Ry, respectively, muffin-tin sphere
1384
+ radii of 1.4 ˚A for U and 1.2 ˚A for Co and Ge, respectively, the experimental lattice parameters [76], and an 8 × 12 × 8
1385
+ k-point mesh were employed for the self-consistent field calculation. Spin-orbit was fully taken into account in the
1386
+ assumed nonmagnetic state. Fermi surface was determined on a dense 30 × 50 × 30 k-point mesh and visualized by
1387
+ using FermiSurfer [77].
1388
+ Both the R and S points are 8-fold degenerate TRIM when SOC is not included for space group 62. Interestingly,
1389
+ from Table IV, the effective g-factors for fields along ˆy and ˆz directions are zero at the S-point and are zero for fields
1390
+ along ˆx and ˆy directions at the R-point. This indicates that superconductivity (both even and odd-parity) on the
1391
+ tube-shaped Fermi surfaces will be robust against magnetic fields applied along the ˆy direction. This is the field
1392
+ direction for which the upper critical field is observed to be the highest and for which an unusual S-shaped critical
1393
+ field curve appears [25]. We leave a detailed examination of the consequences of anomalous pseudospin in space group
1394
+ 62 on superconductivity to a later work.
1395
+ VII.
1396
+ CONCLUSIONS
1397
+ Non-symmorphic symmetries allow the existence of nodal planes at Brillouin zone edges when no SOC is present.
1398
+ When SOC is added, the pseudospin on these nodal planes has different symmetry properties than usual pseudospin-
1399
+
1400
+ 16
1401
+ X
1402
+ U
1403
+ Z
1404
+ Y
1405
+ S
1406
+ R
1407
+ !
1408
+ T
1409
+ FIG. 5.
1410
+ DFT Fermi surface of UCoGe.
1411
+ 1/2. Here we have classified all space groups and effective single-particle theories near TRIM points on these nodal
1412
+ planes and examined the consequences of this anomalous pseudospin on the superconducting state. We have shown
1413
+ how this enhances the Tc for odd-parity superconducting states due to attractive interactions, leads to unexpected
1414
+ superconducting nodal properties, allows large Pauli limiting fields and pair density wave states for spin-singlet
1415
+ superconductors, gives rise to field immune odd-parity superconductivity, and to field driven even to odd-parity
1416
+ superconducting transitions. While we have emphasized nodal planes on which anomalous pseudospin exists, there
1417
+ are also materials for which anomalous pseudospin develops on nodal lines and not on nodal planes. Some such
1418
+ materials also exhibit unusual response to magnetic fields [78–80], suggesting a broader range of applicability for
1419
+ anomalous pseudospin superconductivity.
1420
+ VIII.
1421
+ ACKNOWLEDGEMENTS
1422
+ DFA, HGS, and YY were supported by the US Department of Energy, Office of Basic Energy Sciences, Division of
1423
+ Materials Sciences and Engineering under Award DE-SC0021971 and by a UWM Discovery and Innovation Grant.
1424
+ MW and TS were supported by the US Department of Energy, Office of Basic Energy Sciences, Division of Materials
1425
+ Sciences and Engineering under Award DE-SC0017632. PMRB was supported by the Marsden Fund Council from
1426
+ Government funding, managed by Royal Society Te Aparangi. We acknowledge useful discussions with Mark Fischer,
1427
+ Elena Hassinger, Seunghyun Khim, Igor Mazin, and Manfred Sigrist.
1428
+ [1] A. Manchon, H. C. Koo, J. Nitta, S. M. Frolov, and R. A. Duine, New perspectives for rashba spin–orbit coupling, Nature
1429
+ Materials 14, 871 (2015).
1430
+ [2] M. Smidman, M. B. Salamon, H. Q. Yuan, and D. F. Agterberg, Superconductivity and spin–orbit coupling in non-
1431
+ centrosymmetric materials: a review, Reports on Progress in Physics 80, 036501 (2017).
1432
+ [3] V. Baltz, A. Manchon, M. Tsoi, T. Moriyama, T. Ono, and Y. Tserkovnyak, Antiferromagnetic spintronics, Rev. Mod.
1433
+ Phys. 90, 015005 (2018).
1434
+ [4] X. Zhang, Q. Liu, J.-W. Luo, A. J. Freeman, and A. Zunger, Hidden spin polarization in inversion-symmetric bulk crystals,
1435
+ Nature Physics 10, 387 (2014).
1436
+ [5] M. H. Fischer,
1437
+ M. Sigrist,
1438
+ D. F. Agterberg, and Y. Yanase, Superconductivity and local inversion-symmetry
1439
+ breaking, Annual Review of Condensed Matter Physics 14,
1440
+ 10.1146/annurev-conmatphys-040521-042511 (2023),
1441
+ https://doi.org/10.1146/annurev-conmatphys-040521-042511.
1442
+ [6] T. Yoshida, M. Sigrist, and Y. Yanase, Pair-density wave states through spin-orbit coupling in multilayer superconductors,
1443
+ Phys. Rev. B 86, 134514 (2012).
1444
+ [7] S. Khim, J. F. Landaeta, J. Banda, N. Bannor, M. Brando, P. M. R. Brydon, D. Hafner, R. K¨uchler, R. Cardoso-
1445
+ Gil, U. Stockert, A. P. Mackenzie, D. F. Agterberg, C. Geibel, and E. Hassinger, Field-induced transition within the
1446
+ superconducting state of CeRh2As2, Science 373, 1012 (2021), https://www.science.org/doi/pdf/10.1126/science.abe7518.
1447
+
1448
+ 717
1449
+ [8] J. F. Landaeta, P. Khanenko, D. C. Cavanagh, C. Geibel, S. Khim, S. Mishra, I. Sheikin, P. M. R. Brydon, D. F. Agterberg,
1450
+ M. Brando, and E. Hassinger, Field-Angle Dependence Reveals Odd-Parity Superconductivity in CeRh2As2, Phys. Rev.
1451
+ X 12, 031001 (2022).
1452
+ [9] D. C. Cavanagh, T. Shishidou, M. Weinert, P. M. R. Brydon, and D. F. Agterberg, Nonsymmorphic symmetry and
1453
+ field-driven odd-parity pairing in CeRh2As2, Physical Review B 105, 10.1103/physrevb.105.l020505 (2022).
1454
+ [10] L. Yuan, Q. Liu, X. Zhang, J.-W. Luo, S.-S. Li, and A. Zunger, Uncovering and tailoring hidden rashba spin–orbit splitting
1455
+ in centrosymmetric crystals, Nature Communications 10, 10.1038/s41467-019-08836-4 (2019).
1456
+ [11] P. Li and I. Appelbaum, Illuminating ”spin-polarized” bloch wave-function projection from degenerate bands in decom-
1457
+ posable centrosymmetric lattices, Phys. Rev. B 97, 125434 (2018).
1458
+ [12] Y. Nakamura and Y. Yanase, Odd-parity superconductivity in bilayer transition metal dichalcogenides, Phys. Rev. B 96,
1459
+ 054501 (2017).
1460
+ [13] B.-J. Yang, T. A. Bojesen, T. Morimoto, and A. Furusaki, Topological semimetals protected by off-centered symmetries
1461
+ in nonsymmorphic crystals, Physical Review B 95, 10.1103/physrevb.95.075135 (2017).
1462
+ [14] J. Zhang, Y.-H. Chan, C.-K. Chiu, M. G. Vergniory, L. M. Schoop, and A. P. Schnyder, Topological band crossings in
1463
+ hexagonal materials, Physical Review Materials 2, 10.1103/physrevmaterials.2.074201 (2018).
1464
+ [15] M. M. Hirschmann, A. Leonhardt, B. Kilic, D. H. Fabini, and A. P. Schnyder, Symmetry-enforced band crossings in
1465
+ tetragonal materials: Dirac and weyl degeneracies on points, lines, and planes, Physical Review Materials 5, 10.1103/phys-
1466
+ revmaterials.5.054202 (2021).
1467
+ [16] A. Leonhardt, M. M. Hirschmann, N. Heinsdorf, X. Wu, D. H. Fabini, and A. P. Schnyder, Symmetry-enforced topological
1468
+ band crossings in orthorhombic crystals: Classification and materials discovery, Physical Review Materials 5, 10.1103/phys-
1469
+ revmaterials.5.124202 (2021).
1470
+ [17] A. Daido, T. Yoshida, and Y. Yanase, Z4 topological superconductivity in ucoge, Phys. Rev. Lett. 122, 227001 (2019).
1471
+ [18] S. Sumita and Y. Yanase, Unconventional superconducting gap structure protected by space group symmetry, Physical
1472
+ Review B 97, 10.1103/physrevb.97.134512 (2018).
1473
+ [19] S. Kobayashi, Y. Yanase, and M. Sato, Topologically stable gapless phases in nonsymmorphic superconductors, Physical
1474
+ Review B 94, 10.1103/physrevb.94.134512 (2016).
1475
+ [20] S. Kobayashi, K. Shiozaki, Y. Tanaka, and M. Sato, Topological blount’s theorem of odd-parity superconductors, Physical
1476
+ Review B 90, 10.1103/physrevb.90.024516 (2014).
1477
+ [21] T. Micklitz and M. R. Norman, Odd parity and line nodes in nonsymmorphic superconductors, Phys. Rev. B 80, 100506
1478
+ (2009).
1479
+ [22] Y. Mizuguchi, Review of superconductivity in BiS2-based layered materials, Journal of Physics and Chemistry of Solids
1480
+ 84, 34 (2015), focus issue on the Study of matter at extreme conditions and related phenomena.
1481
+ [23] G. R. Stewart, Superconductivity in iron compounds, Rev. Mod. Phys. 83, 1589 (2011).
1482
+ [24] R. Joynt and L. Taillefer, The superconducting phases of UPt3, Rev. Mod. Phys. 74, 235 (2002).
1483
+ [25] D. Aoki, K. Ishida, and J. Flouquet, Review of U-based Ferromagnetic Superconductors: Comparison between UGe2,
1484
+ URhGe, and UCoGe, Journal of the Physical Society of Japan 88, 022001 (2019).
1485
+ [26] L. Fu, Parity-breaking phases of spin-orbit-coupled metals with gyrotropic, ferroelectric, and multipolar orders, Phys. Rev.
1486
+ Lett. 115, 026401 (2015).
1487
+ [27] P. Brydon, L. Wang, M. Weinert, and D. Agterberg, Pairing of j = 3/2 fermions in half-heusler superconductors, Physical
1488
+ Review Letters 116, 10.1103/physrevlett.116.177001 (2016).
1489
+ [28] C. Wang, B. Lian, X. Guo, J. Mao, Z. Zhang, D. Zhang, B.-L. Gu, Y. Xu, and W. Duan, Type-II Ising superconductivity
1490
+ in two-dimensional materials with spin-orbit coupling, Phys. Rev. Lett. 123, 126402 (2019).
1491
+ [29] J. Falson, Y. Xu, M. Liao, Y. Zang, K. Zhu, C. Wang, Z. Zhang, H. Liu, W. Duan, K. He, H. Liu, J. H. Smet, D. Zhang,
1492
+ and Q.-K. Xue, Type-II Ising pairing in few-layer stanene, Science 367, 1454 (2020).
1493
+ [30] M. Sigrist and K. Ueda, Phenomenological theory of unconventional superconductivity, Rev. Mod. Phys. 63, 239 (1991).
1494
+ [31] L. P. Gor’kov and E. I. Rashba, Superconducting 2D System with Lifted Spin Degeneracy: Mixed Singlet-Triplet State,
1495
+ Phys. Rev. Lett. 87, 037004 (2001).
1496
+ [32] M. I. Aroyo, J. M. Perez-Mato, C. Capillas, E. Kroumova, S. Ivantchev, G. Madariaga, A. Kirov, and H. Wondratschek,
1497
+ Bilbao crystallographic server: I. databases and crystallographic computing programs, Zeitschrift f¨ur Kristallographie -
1498
+ Crystalline Materials 221, 15 (2006).
1499
+ [33] M. I. Aroyo, A. Kirov, C. Capillas, J. M. Perez-Mato, and H. Wondratschek, Bilbao Crystallographic Server. II. Represen-
1500
+ tations of crystallographic point groups and space groups, Acta Crystallographica Section A 62, 115 (2006).
1501
+ [34] H. T. Stokes, B. J. Campbell, and R. Cordes, Tabulation of irreducible representations of the crystallographic space groups
1502
+ and their superspace extensions, Acta Crystallographica Section A 69, 388 (2013).
1503
+ [35] Y. X. Zhao and A. P. Schnyder, Nonsymmorphic symmetry-required band crossings in topological semimetals, Physical
1504
+ Review B 94, 10.1103/physrevb.94.195109 (2016).
1505
+ [36] D. Huang and J. E. Hoffman, Monolayer FeSe on SrTiO3, Annual Review of Condensed Matter Physics 8, 311 (2017),
1506
+ https://doi.org/10.1146/annurev-conmatphys-031016-025242.
1507
+ [37] J. P. Ruf, H. Paik, N. J. Schreiber, H. P. Nair, L. Miao, J. K. Kawasaki, J. N. Nelson, B. D. Faeth, Y. Lee, B. H. Goodge,
1508
+ B. Pamuk, C. J. Fennie, L. F. Kourkoutis, D. G. Schlom, and K. M. Shen, Strain-stabilized superconductivity, Nature
1509
+ Communications 12, 10.1038/s41467-020-20252-7 (2021).
1510
+ [38] M. Uchida, T. Nomoto, M. Musashi, R. Arita, and M. Kawasaki, Superconductivity in Uniquely Strained RuO2 Films,
1511
+ Phys. Rev. Lett. 125, 147001 (2020).
1512
+
1513
+ 18
1514
+ [39] L. ˇSmejkal, J. Sinova, and T. Jungwirth, Emerging Research Landscape of Altermagnetism, Phys. Rev. X 12, 040501
1515
+ (2022).
1516
+ [40] E. I. Blount, Symmetry properties of triplet superconductors, Phys. Rev. B 32, 2935 (1985).
1517
+ [41] K. Samokhin, On the pseudospin description of the electron bloch bands, Annals of Physics 407, 179 (2019).
1518
+ [42] D. C. Cavanagh, D. F. Agterberg, and P. M. R. Brydon, Pair-breaking in superconductors with strong spin-orbit coupling
1519
+ (2022).
1520
+ [43] A. Ramires and M. Sigrist, Identifying detrimental effects for multiorbital superconductivity: Application to Sr2RuO4,
1521
+ Physical Review B 94, 10.1103/physrevb.94.104501 (2016).
1522
+ [44] A. Ramires, D. F. Agterberg, and M. Sigrist, Tailoring Tc by symmetry principles: The concept of superconducting fitness,
1523
+ Physical Review B 98, 10.1103/physrevb.98.024501 (2018).
1524
+ [45] A. V. Chubukov, O. Vafek, and R. M. Fernandes, Displacement and annihilation of Dirac gap nodes in d-wave iron-based
1525
+ superconductors, Phys. Rev. B 94, 174518 (2016).
1526
+ [46] D. Agterberg, T. Shishidou, J. O’Halloran, P. Brydon, and M. Weinert, Resilient Nodeless d -Wave Superconductivity in
1527
+ Monolayer FeSe, Physical Review Letters 119, 10.1103/physrevlett.119.267001 (2017).
1528
+ [47] Y. Yanase and K. Shiozaki, M¨obius topological superconductivity in UPt3, Phys. Rev. B 95, 224514 (2017).
1529
+ [48] L. Fu and E. Berg, Odd-Parity Topological Superconductors: Theory and Application to CuxBi2Se3, Phys. Rev. Lett. 105,
1530
+ 097001 (2010).
1531
+ [49] S. Qin, C. Fang, F.-c. Zhang, and J. Hu, Spin-triplet superconductivity in nonsymmorphic crystals (2022).
1532
+ [50] O. Vafek and A. V. Chubukov, Hund interaction, spin-orbit coupling, and the mechanism of superconductivity in strongly
1533
+ hole-doped iron pnictides, Physical Review Letters 118, 10.1103/physrevlett.118.087003 (2017).
1534
+ [51] A. K. C. Cheung and D. F. Agterberg, Superconductivity in the presence of spin-orbit interactions stabilized by hund
1535
+ coupling, Physical Review B 99, 10.1103/physrevb.99.024516 (2019).
1536
+ [52] C. Wang, Y. Xu, and W. Duan, Ising Superconductivity and Its Hidden Variants, Accounts of Materials Research 2, 526
1537
+ (2021), https://doi.org/10.1021/accountsmr.1c00068.
1538
+ [53] A. Skurativska, M. Sigrist, and M. H. Fischer, Spin response and topology of a staggered-rashba superconductor, Phys.
1539
+ Rev. Research 3, 033133 (2021).
1540
+ [54] K. Hoshi, R. Kurihara, Y. Goto, M. Tokunaga, and Y. Mizuguchi, Extremely high upper critical field in BiCh2-based (Ch:
1541
+ S and Se) layered superconductor LaO0.5F0.5BiS2−xSex (x = 0.22 and 0.69), Scientific Reports 12, 10.1038/s41598-021-
1542
+ 04393-3 (2022).
1543
+ [55] H. Usui, K. Suzuki, and K. Kuroki, Minimal electronic models for superconducting BiS2 layers, Phys. Rev. B 86, 220501
1544
+ (2012).
1545
+ [56] M. Weinert, G. Schneider, R. Podloucky, and J. Redinger, FLAPW: Applications and implementations, J. Phys. Condens.
1546
+ Matter 21, 084201 (2009).
1547
+ [57] J. P. Perdew, K. Burke, and M. Ernzerhof, Generalized Gradient Approximation Made Simple, Phys. Rev. Lett. 77, 3865
1548
+ (1996).
1549
+ [58] Y. Mizuguchi, S. Demura, K. Deguchi, Y. Takano, H. Fujihisa, Y. Gotoh, H. Izawa, and O. Miura, Superconductivity in
1550
+ Novel BiS2-Based Layered Superconductor LaO1−xFxBiS2, Journal of the Physical Society of Japan 81, 114725 (2012),
1551
+ https://doi.org/10.1143/JPSJ.81.114725.
1552
+ [59] J. lei Zhang, L. Jiao, Y. Chen, and H. qiu Yuan, Universal behavior of the upper critical field in iron-based superconductors,
1553
+ Frontiers of Physics 6, 463 (2011).
1554
+ [60] P. Fulde and R. A. Ferrell, Superconductivity in a strong spin-exchange field, Phys. Rev. 135, A550 (1964).
1555
+ [61] A. Larkin and Y. Ovchinnikov, Inhomogeneous state of superconductors, Sov. Phys. JETP 20, 762 (1965).
1556
+ [62] D. F. Agterberg, J. S. Davis, S. D. Edkins, E. Fradkin, D. J. Van Harlingen, S. A. Kivelson, P. A. Lee, L. Radzihovsky,
1557
+ J. M. Tranquada, and Y. Wang, The physics of pair-density waves: Cuprate superconductors and beyond, Annual Review
1558
+ of Condensed Matter Physics 11, 231 (2020).
1559
+ [63] M.
1560
+ Sigrist,
1561
+ Introduction
1562
+ to
1563
+ Unconventional
1564
+ Superconductivity,
1565
+ AIP
1566
+ Conference
1567
+ Proceedings
1568
+ 789,
1569
+ 165
1570
+ (2005),
1571
+ https://aip.scitation.org/doi/pdf/10.1063/1.2080350.
1572
+ [64] V. Mineev and K. Samokhin, Introduction to Unconventional Superconductivity (Gordon and Breach Science Publishers,
1573
+ 1999).
1574
+ [65] K. Machida, T. Ohmi, and M.-a. Ozaki, Anisotropy of Upper Critical Fields for d- and p-Wave Pairing Superconductivity,
1575
+ Journal of the Physical Society of Japan 54, 1552 (1985), https://doi.org/10.1143/JPSJ.54.1552.
1576
+ [66] J. Sauls, The order parameter for the superconducting phases of UPt3, Advances in Physics 43, 113 (1994).
1577
+ [67] Y. Yanase, Nonsymmorphic Weyl superconductivity in UPt3 based on E2u representation, Phys. Rev. B 94, 174502 (2016).
1578
+ [68] C. H. Choi and J. A. Sauls, Identification of odd-parity superconductivity in UPt3 from paramagnetic effects on the upper
1579
+ critical field, Phys. Rev. Lett. 66, 484 (1991).
1580
+ [69] H. Tou, Y. Kitaoka, K. Asayama, N. Kimura, Y. ¯Onuki, E. Yamamoto, and K. Maezawa, Odd-Parity Superconductivity
1581
+ with Parallel Spin Pairing in UPt3: Evidence from 195Pt Knight Shift Study, Phys. Rev. Lett. 77, 1374 (1996).
1582
+ [70] B. J. Wieder, Y. Kim, A. M. Rappe, and C. L. Kane, Double dirac semimetals in three dimensions, Phys. Rev. Lett. 116,
1583
+ 186402 (2016).
1584
+ [71] B.
1585
+ Bradlyn,
1586
+ J.
1587
+ Cano,
1588
+ Z.
1589
+ Wang,
1590
+ M.
1591
+ G.
1592
+ Vergniory,
1593
+ C.
1594
+ Felser,
1595
+ R.
1596
+ J.
1597
+ Cava,
1598
+ and
1599
+ B.
1600
+ A.
1601
+ Bernevig,
1602
+ Beyond
1603
+ dirac and weyl fermions:
1604
+ Unconventional quasiparticles in conventional crystals, Science 353, aaf5037 (2016),
1605
+ https://www.science.org/doi/pdf/10.1126/science.aaf5037.
1606
+ [72] M. Samsel-Czeka�la, S. Elgazzar, P. M. Oppeneer, E. Talik, W. Walerczyk, and R. Tro´c, The electronic structure of UCoGe
1607
+ by ab initio calculations and XPS experiment, Journal of Physics: Condensed Matter 22, 015503 (2009).
1608
+
1609
+ 19
1610
+ [73] S.-i. Fujimori, T. Ohkochi, I. Kawasaki, A. Yasui, Y. Takeda, T. Okane, Y. Saitoh, A. Fujimori, H. Yamagami, Y. Haga,
1611
+ E. Yamamoto, and Y. ¯Onuki, Electronic structures of ferromagnetic superconductors UGe2 and UCoGe studied by angle-
1612
+ resolved photoelectron spectroscopy, Phys. Rev. B 91, 174503 (2015).
1613
+ [74] A. Daido, T. Yoshida, and Y. Yanase, Z4 Topological Superconductivity in UCoGe, Phys. Rev. Lett. 122, 227001 (2019).
1614
+ [75] G. Bastien, A. Gourgout, D. Aoki, A. Pourret, I. Sheikin, G. Seyfarth, J. Flouquet, and G. Knebel, Lifshitz Transitions in
1615
+ the Ferromagnetic Superconductor UCoGe, Phys. Rev. Lett. 117, 206401 (2016).
1616
+ [76] F. Canepa, P. Manfrinetti, M. Pani, and A. Palenzona, Structural and transport properties of some UTX compounds
1617
+ where T = Fe, Co, Ni and X = Si, Ge, Journal of Alloys and Compounds 234, 225 (1996).
1618
+ [77] M. Kawamura, FermiSurfer: Fermi-surface viewer providing multiple representation schemes, Computer Physics Commu-
1619
+ nications 239, 197 (2019).
1620
+ [78] Y. Shimizu, D. Braithwaite, D. Aoki, B. Salce, and J.-P. Brison, Spin-Triplet p-Wave Superconductivity Revealed under
1621
+ High Pressure in UBe13, Phys. Rev. Lett. 122, 067001 (2019).
1622
+ [79] K. Ma, K. Gornicka, R. Lef`e vre, Y. Yang, H. M. Rønnow, H. O. Jeschke, T. Klimczuk, and F. O. von Rohr, Supercon-
1623
+ ductivity with High Upper Critical Field in the Cubic Centrosymmetric η-Carbide Nb4Rh2C1−δ, ACS Materials Au 1, 55
1624
+ (2021).
1625
+ [80] B.-B. Ruan, M.-H. Zhou, Q.-S. Yang, Y.-D. Gu, M.-W. Ma, G.-F. Chen, and Z.-A. Ren, Superconductivity with a Violation
1626
+ of Pauli Limit and Evidences for Multigap in η-Carbide Type Ti4Ir2O, Chinese Physics Letters 39, 027401 (2022).
1627
+
1628
+ 20
1629
+ Appendix A: Full excitation spectrum on the nodal plane
1630
+ On the nodal plane, the Bogoliubov de-Gennes Hamiltonian takes the form
1631
+ H =
1632
+
1633
+ k
1634
+ Ψ†
1635
+ k
1636
+
1637
+ ε0,k + τ3(λk · ˆn)(σ · ˆn)
1638
+ ∆k
1639
+ Ơ
1640
+ k
1641
+ −ε0,k − τ3(λk · ˆn)(σ · ˆn)
1642
+
1643
+ Ψk,
1644
+ (A1)
1645
+ It is possible to classify the gap symmetry as even or odd under both inversion and mirror symmetries. For momenta
1646
+ on the nodal surface we have,
1647
+ U †
1648
+ P ∆kUP = ± ∆−k
1649
+ U †
1650
+ M∆kUM = ± ∆k
1651
+ (A2)
1652
+ where for type 1 TRIM UP = τ1 and UM = −iτ3σz and for type 2 TRIM UP = τ0 and UM = −iτ2σz. We label the
1653
+ gaps as ∆1(2),i,j where i = ± labels the parity symmetry and j = ± labels the mirror symmetry. Here, for clarity,
1654
+ we drop the k labels (note that k is unchanged by the mirror symmetry). For the type 1 TRIM, we write the gap
1655
+ functions in terms of the complete set of gap functions with the correct symmetries given in Table III as
1656
+ ∆1,++ =
1657
+ ψ0τ0 + (dz · ˆn)(σ · ˆn)τ3
1658
+ ∆1,+− =
1659
+ ψxτ1 + (dz × ˆn) · (σ × ˆn)τ3 + dyτ2
1660
+ ∆1,−+ =(d0 · ˆn)(σ · ˆn)τ0 + (dx × ˆn) · (σ × ˆn)τ1 + ψzτ3 + (ψ × ˆn) · (σ × ˆn)τ2
1661
+ ∆1,−− =
1662
+ (d0 × ˆn) · (σ × ˆn)τ0 + (dx · ˆn)(σ · ˆn)τ1 + (ψ · ˆn)(σ · ˆn)τ2
1663
+ (A3)
1664
+ where di are odd functions of k and ψi are even functions of k.
1665
+ Using Eq. A1, the corresponding quasiparticle
1666
+ excitation energies can be found to be
1667
+ E1,++ =
1668
+ ±′ �
1669
+ (ϵ0 ± λ · ˆn)2 + (ψ0 ± dz · ˆn)2
1670
+ E1,+− =
1671
+ ±′ ��
1672
+ ϵ2
1673
+ 0 + ψ2x + (dz × ˆn)2 + d2y ± λ · ˆn
1674
+
1675
+ E1,−+ = ±′ �
1676
+ (ϵ0 ± λ · ˆn)2 + (ψz ± d0 · ˆn)2 + (dx × ˆn)2 + (ψ × ˆn)2 ± 2(dx × ψ) · ˆn
1677
+ E1,−− =
1678
+ ±′ ��
1679
+ ϵ2
1680
+ 0 + (d0 × ˆn)2 + (dx · ˆn)2 + (ψ · ˆn)2 ± λ · ˆn
1681
+
1682
+ (A4)
1683
+ where the prime denotes independent choices of the sign. For type 2 TRIM we similarly have
1684
+ ∆2,++ =
1685
+ ψ0τ0 + (ψ · ˆn)(σ · ˆn)τ2
1686
+ ∆2,+− =
1687
+ ψxτ1 + ψzτ3 + (ψ × ˆn) · (σ × ˆn)τ2
1688
+ ∆2,−+ =(d0 · ˆn)(σ · ˆn)τ0 + (dx × ˆn) · (σ × ˆn)τ1 + (dz × ˆn) · (σ × ˆn)τ3 + dyτ2
1689
+ ∆2,−− =
1690
+ (d0 × ˆn) · (σ × ˆn)τ0 + (dx · ˆn)(σ · ˆn)τ1 + (dz · ˆn)(σ · ˆn)τ3
1691
+ (A5)
1692
+ The quasiparticle excitation spectra for these states are
1693
+ E2,++ =
1694
+ ±′ �
1695
+ (ϵ0 ± λ · ˆn)2 + (ψ0 ± ψ · ˆn)2
1696
+ E2,+− =
1697
+ ±′ ��
1698
+ ϵ2
1699
+ 0 + ψ2x + ψ2z + (ψ × ˆn)2 ± λ · ˆn
1700
+
1701
+ E2,−+ = ±′ �
1702
+ (ϵ0 ± λ · ˆn)2 + (dy ± d0 · ˆn)2 + (dx × ˆn)2 + (dz × ˆn)2 ± 2(dx × dz) · ˆn
1703
+ E2,−− =
1704
+ ±′ ��
1705
+ ϵ2
1706
+ 0 + (d0 × ˆn)2 + (dx · ˆn)2 + (dz · ˆn)2 ± λ · ˆn
1707
+
1708
+ (A6)
1709
+
1710
+ 21
1711
+ Appendix B: Magnetic susceptibility UPt3
1712
+ In the main text, we illustrated how the p-wave state in UPt3 is immune to the magnetic field along arbitrary
1713
+ directions.
1714
+ An important step is to consider the small g-factor for field B ⊥ z.
1715
+ However, the discussion is not
1716
+ complete. In the normal state, there exist 4-fold degenerate Dirac lines on the plane kz = π/c, where the g-factor is
1717
+ not small. In terms of the field fitness, Eq.20 in the main text only considered doubly degenerate bands. In principle,
1718
+ extra terms in the field fitness are needed for to describe these Dirac lines. However, the Fermi surface is not right
1719
+ on the nodal plane. This can make the Dirac lines unimportant. In this section, we will explicitly check the field
1720
+ response in the superconducting state through a numerical calculation on a tight-binding model for UPt3.
1721
+ In the following calculations, we will focus on the Knight shift (spin-susceptibility). Knight shift measures spin
1722
+ polarization at atom sites. By extracting spin susceptibility χs, one can determine pairing functions of an uncon-
1723
+ ventional superconductor. For a single-band spin-triplet superconductor, the change of Knight shift depends on the
1724
+ orientation of magnetic field with respect to the d-vector of the superconducting state. If the magnetic field is per-
1725
+ pendicular to the d-vector, the Knight shift should be a constant across superconducting Tc. If the magnetic field is
1726
+ parallel to the d-vector, the Knight shift will decrease to zero as temperature approaches zero. For the multi-band
1727
+ non-symmorphic superconductor UPt3, Knight shift is almost unchanged for all field orientations, suggesting the
1728
+ importance of spin-orbit coupling in this heavy fermion material.
1729
+ One of the Fermi surfaces (‘starfish’) of UPt3 is flat and located near the high symmetry plane kz = π/c. Zeeman
1730
+ terms Bxσx and Byσy then becomes inter-band. From non-generate perturbation theory, spin susceptibilities are
1731
+ inversely proportional to the band gap. This is different from the intra-band Zeeman effect, where susceptibilities are
1732
+ proportional to the density of states on Fermi surface, according to degenerate perturbation theory.
1733
+ Since the superconducting gap is much smaller than the band gap, inter-band susceptibilities will be unchanged
1734
+ across Tc. If the superconductivity is mainly developed on the above flat Fermi surface, then Knight shift is expected
1735
+ to be unchanged for in-plane magnetic fields, regardless of the superconducting pairing symmetry. If the d-vector is
1736
+ in-plane, then Knight shift will also be unchanged for a perpendicular magnetic field. In this section, we will explicitly
1737
+ illustrate this idea to understand the experimental results on UPt3.
1738
+ FIG. 6. Crystal structure of UPt3 with the unit vector e1 = (1, 0, 0).
1739
+ The 4 × 4 normal state Hamiltonian reads [67]:
1740
+ H = ε(k) + gz(k)σzτ3 + a1(k)τ1 + a2(k)τ2 + [gx(k)σx + gy(k)σy] τ3
1741
+ εk = 2t
1742
+
1743
+ i=1,2,3
1744
+ cos k∥ · ei + 2t3 cos kz − µ,
1745
+ gz(k) = gz0
1746
+
1747
+ i
1748
+ sin k∥ · ei
1749
+ a1(k) = 2t′ sin kz
1750
+ 2
1751
+
1752
+ i=1,2,3
1753
+ sin k∥ · ri,
1754
+ a2(k) = 2t′ sin kz
1755
+ 2
1756
+
1757
+ i=1,2,3
1758
+ cos k∥ · ri
1759
+ gx(k) = gx0fxfy sin kz,
1760
+ gy(k) = gy0(f 2
1761
+ x − f 2
1762
+ y ) sin kz
1763
+ fx ≡ sin k∥ · e1 − sin k∥ · e2 + sin k∥ · e3
1764
+ 2
1765
+ ,
1766
+ fy ≡
1767
+
1768
+ 3 sin k∥ · e2 − sin k∥ · e3,
1769
+ (B1)
1770
+ here (kx, ky, kz) are relative to the high symmetry point (0, 0, π). Relevant vectors ei and ri can be found in Fig.6.
1771
+ τi matrices live in the sublattice space. On the high-symmetry plane kz = 0, the inter-sublattice hopping a1,2 and
1772
+ the spin-flip SOC gx,y vanish. |k, m = 1, ↑⟩ and |k, m = 2, ↓⟩ states form a pseudospin band, while |k, m = 2, ↑⟩ and
1773
+ |k, m = 1, ↓⟩ states form another band.
1774
+
1775
+ 22
1776
+ We now study spin susceptibilities. We will focus on a p-wave state in the E2u channel. Its d-vector is in-plane:
1777
+ d = ∆(T)(fx, −fy, 0). fx and fy are introduced in Eq.B1, and they transform as kx and ky. The gap magnitude is
1778
+ taken to be ∆(T) = ∆0
1779
+
1780
+ 1 − T/Tc. t = 1, t3 = −4, gz0 = 2, µ = 12 and ∆0 = Tc = 0.001 is taken in the calculation.
1781
+ 0
1782
+ 0.2
1783
+ 0.4
1784
+ 0.6
1785
+ 0.8
1786
+ 1
1787
+ T/Tc
1788
+ 0
1789
+ 0.02
1790
+ 0.04
1791
+ 0.06
1792
+ 0.08
1793
+ 0.1
1794
+ t'=0, gx0=gy0=0
1795
+ x
1796
+ z
1797
+ 0
1798
+ 0.2
1799
+ 0.4
1800
+ 0.6
1801
+ 0.8
1802
+ 1
1803
+ T/Tc
1804
+ 0
1805
+ 0.02
1806
+ 0.04
1807
+ 0.06
1808
+ 0.08
1809
+ 0.1
1810
+ t'=0, gx0=gy0=0.1
1811
+ x
1812
+ z
1813
+ x,inter
1814
+ z,inter
1815
+ 0
1816
+ 0.2
1817
+ 0.4
1818
+ 0.6
1819
+ 0.8
1820
+ 1
1821
+ T/Tc
1822
+ 0
1823
+ 0.02
1824
+ 0.04
1825
+ 0.06
1826
+ 0.08
1827
+ 0.1
1828
+ t'=0.1, gx0=gy0=0
1829
+ x
1830
+ z
1831
+ x,inter
1832
+ z,inter
1833
+ FIG. 7. Spin susceptibilities as a function of temperature, for (left) a1 = a2 = gx = gy = 0, which would be the case if the
1834
+ Fermi surface exactly lied on the high-symmetry plane. (middle) non-zero spin-flip SOC but zero inter-sublattice hopping.
1835
+ (right) non-zero inter-sublattice hopping but zero spin-flip SOC.
1836
+ To illustrate the effect of the anomalous pseudospin, we start with a toy model with zero inter-sublattice hopping
1837
+ and spin-flip SOC: t′ = gx0 = gy0. The corresponding four terms vanish in the normal state Hamiltonian: a1 = a2 =
1838
+ gx = gy = 0. In this extreme case, the spin susceptibilities are unchanged across Tc, as shown in the left panel of
1839
+ Fig.7.
1840
+ We now turn on the spin-flip SOC (gx0 and gy0), while keeping the inter-sublattice hopping t′ to be zero. hxσx
1841
+ develops an intra-band component, which will be suppressed in the superconducting state. As a result, the total
1842
+ χx deep in the superconducting state starts to decrease as function of temperature. For χz, spin-flip SOC induces
1843
+ higher-order terms in the E2u channel. The d-vector develops non-zero z-component in the band basis. This causes
1844
+ a decrease in χz. The result for gx0 = gy0 can be found in the middle panel of Fig.7. The inter-band susceptibilities
1845
+ in the normal state are included in dashed lines.
1846
+ We now turn on the inter-sublattice hopping t′, while keeping the spin-flip SOC (gx0 and gy0) to be zero. A similar
1847
+ effect is expected for χx due to the intra-band contribution. For χz, since σz is a good quantum number, χz will be
1848
+ unchanged. The result can be found in the right panel of Fig.7.
1849
+ Experimentally, the superconducting state is known to be more robust under B ∥ x compared to B ∥ z. In other
1850
+ words, the decrease in χx needs to be smaller than χz. This scenario is closer to the second limit.
1851
+
1852
+ 23
1853
+ Appendix C: 8-fold Representations
1854
+ Here, we list the symmetries of all orbital operators near the 8-fold degenerate points. The point group that keeps
1855
+ the TRIM point invariant can be found in the title. The bracket notation [·] is also used for antisymmetric operators
1856
+ which was τ2 in the main context, but in 8-fold cases, the antisymmtric component is not unique due to the higher
1857
+ degrees of freedom.
1858
+ Space group momenta
1859
+ Point group D2h
1860
+ 54(U1U2)
1861
+ Ag + 2B1g + 2B2g + B3g + 2Au + B1u + B2u + [Ag] + [B3g] + [B1u] + [B2u] + 2[B3u]
1862
+ 54(R1R2)
1863
+ Ag + 2B1g + 2B2g + B3g + 2Au + B1u + B2u + [Ag] + [B3g] + [B1u] + [B2u] + 2[B3u]
1864
+ 56(U1U2)
1865
+ Ag + 2B1g + 2B2g + B3g + 2Au + B1u + B2u + [Ag] + [B3g] + [B1u] + [B2u] + 2[B3u]
1866
+ 60(R1R2)
1867
+ Ag + 2B1g + 2B2g + B3g + Au + 2B2u + B3u + [Ag] + [B3g] + [Au] + 2[B1u] + [B3u]
1868
+ 61(S1S2)
1869
+ Ag + 2B1g + 2B2g + B3g + Au + 2B1u + B3u + [Ag] + [B3g] + [Au] + 2[B2u] + [B3u]
1870
+ 62(S1S2)
1871
+ Ag + 2B1g + 2B2g + B3g + Au + 2B1u + B3u + [Ag] + [B3g] + [Au] + 2[B2u] + [B3u]
1872
+ 205(M1M2)
1873
+ Ag + 2B1g + 2B2g + B3g + Au + 2B1u + B3u + [Ag] + [B3g] + [Au] + 2[B2u] + [B3u]
1874
+ 52(S1S2)
1875
+ Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
1876
+ 56(T1T2)
1877
+ Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
1878
+ 57(T1T2)
1879
+ Ag + 2B1g + B2g + 2B3g + Au + B2u + 2B3u + [Ag] + [B2g] + [Au] + 2[B1u] + [B2u]
1880
+ 57(R1R2)
1881
+ Ag + 2B1g + B2g + 2B3g + Au + B2u + 2B3u + [Ag] + [B2g] + [Au] + 2[B1u] + [B2u]
1882
+ 61(T1T2)
1883
+ Ag + 2B1g + B2g + 2B3g + Au + B2u + 2B3u + [Ag] + [B2g] + [Au] + 2[B1u] + [B2u]
1884
+ 130(R1R2)
1885
+ Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
1886
+ 138(R1R2)
1887
+ Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
1888
+ 60(T1T2)
1889
+ Ag + B1g + 2B2g + 2B3g + 2Au + B2u + B3u + [Ag] + [B1g] + 2[B1u] + [B2u] + [B3u]
1890
+ 60(U1U2)
1891
+ Ag + B1g + 2B2g + 2B3g + Au + B1u + 2B2u + [Ag] + [B1g] + [Au] + [B1u] + 2[B3u]
1892
+ 61(U1U2)
1893
+ Ag + B1g + 2B2g + 2B3g + Au + B1u + 2B2u + [Ag] + [B1g] + [Au] + [B1u] + 2[B3u]
1894
+ 62(R1R2)
1895
+ Ag + B1g + 2B2g + 2B3g + 2B1u + B2u + B3u + [Ag] + [B1g] + 2[Au] + [B2u] + [B3u]
1896
+ Space group momenta
1897
+ Point group D4h
1898
+ 128(A3A4)
1899
+ A1g + A2g + 2B1g + 2B2g + A1u + A2u + 2B2u + [A1g] + [A2g] + [A1u] + [A2u] + 2[B1u]
1900
+ 137(A3A4)
1901
+ A1g + A2g + 2B1g + 2B2g + A1u + A2u + 2B2u + [A1g] + [A2g] + [A1u] + [A2u] + 2[B1u]
1902
+ Space group momenta
1903
+ Point group C6h
1904
+ 176(A2A3)
1905
+ Ag + Bg + E1g + E2g + Au + Bu + E1u + [Ag] + [Bg] + [Au] + [Bu] + [E2u]
1906
+ Space group momenta
1907
+ Point group D6h
1908
+ 193(A3)
1909
+ A1g + B2g + E1g + E2g + A1u + B1u + E1u + [A2g] + [B1g] + [A2u] + [B2u] + [E2u]
1910
+ 194(A3)
1911
+ A1g + B1g + E1g + E2g + A1u + B2u + E1u + [A2g] + [B2g] + [A2u] + [B1u] + [E2u]
1912
+ TABLE V. Symmetries of orbital operators at the 8-fold degenerate points.
1913
+
PtFJT4oBgHgl3EQfJCwC/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff