Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- .gitattributes +56 -0
- 0tE2T4oBgHgl3EQfNAZ6/content/2301.03731v1.pdf +3 -0
- 0tE2T4oBgHgl3EQfNAZ6/vector_store/index.faiss +3 -0
- 0tE2T4oBgHgl3EQfNAZ6/vector_store/index.pkl +3 -0
- 1NE0T4oBgHgl3EQfdgAR/content/2301.02376v1.pdf +3 -0
- 1dE1T4oBgHgl3EQfRwNN/content/tmp_files/2301.03056v1.pdf.txt +0 -0
- 1dE1T4oBgHgl3EQfRwNN/content/tmp_files/load_file.txt +0 -0
- 1dFQT4oBgHgl3EQfEjV1/content/2301.13238v1.pdf +3 -0
- 1dFQT4oBgHgl3EQfEjV1/vector_store/index.faiss +3 -0
- 1dFQT4oBgHgl3EQfEjV1/vector_store/index.pkl +3 -0
- 1tE3T4oBgHgl3EQfngpH/content/tmp_files/2301.04625v1.pdf.txt +1109 -0
- 3dE1T4oBgHgl3EQfAQLV/content/2301.02838v1.pdf +3 -0
- 3dE1T4oBgHgl3EQfAQLV/vector_store/index.faiss +3 -0
- 3dE1T4oBgHgl3EQfAQLV/vector_store/index.pkl +3 -0
- 3dE4T4oBgHgl3EQfbAyT/content/2301.05069v1.pdf +3 -0
- 3dE4T4oBgHgl3EQfbAyT/vector_store/index.pkl +3 -0
- 4NE1T4oBgHgl3EQfSgOT/vector_store/index.faiss +3 -0
- 5dE1T4oBgHgl3EQfTAM3/content/tmp_files/2301.03072v1.pdf.txt +1624 -0
- 5dE1T4oBgHgl3EQfTAM3/content/tmp_files/load_file.txt +0 -0
- 6tE5T4oBgHgl3EQfPw5R/vector_store/index.faiss +3 -0
- 79AzT4oBgHgl3EQfE_pK/vector_store/index.pkl +3 -0
- 7NE2T4oBgHgl3EQfkwf2/content/tmp_files/2301.03983v1.pdf.txt +862 -0
- 7NE2T4oBgHgl3EQfkwf2/content/tmp_files/load_file.txt +395 -0
- 7tE0T4oBgHgl3EQffQCV/vector_store/index.faiss +3 -0
- 7tE0T4oBgHgl3EQffQCV/vector_store/index.pkl +3 -0
- 8dAzT4oBgHgl3EQfSPuZ/vector_store/index.pkl +3 -0
- 9dAzT4oBgHgl3EQfSfu4/content/tmp_files/2301.01234v1.pdf.txt +855 -0
- 9dAzT4oBgHgl3EQfSfu4/content/tmp_files/load_file.txt +0 -0
- 9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/2301.05519v1.pdf.txt +0 -0
- 9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/load_file.txt +0 -0
- AdE1T4oBgHgl3EQfpAU_/content/tmp_files/2301.03326v1.pdf.txt +419 -0
- AdE1T4oBgHgl3EQfpAU_/content/tmp_files/load_file.txt +139 -0
- B9E0T4oBgHgl3EQfgAGB/content/tmp_files/2301.02412v1.pdf.txt +1572 -0
- B9E0T4oBgHgl3EQfgAGB/content/tmp_files/load_file.txt +0 -0
- BdAzT4oBgHgl3EQfTfx4/content/2301.01250v1.pdf +3 -0
- BdAzT4oBgHgl3EQfTfx4/vector_store/index.faiss +3 -0
- BdAzT4oBgHgl3EQfTfx4/vector_store/index.pkl +3 -0
- CdE1T4oBgHgl3EQfDwOw/content/tmp_files/2301.02882v1.pdf.txt +816 -0
- CdE1T4oBgHgl3EQfDwOw/content/tmp_files/load_file.txt +0 -0
- ENE3T4oBgHgl3EQfVQoB/content/tmp_files/2301.04457v1.pdf.txt +1631 -0
- ENE3T4oBgHgl3EQfVQoB/content/tmp_files/load_file.txt +0 -0
- F9AzT4oBgHgl3EQfi_2P/content/2301.01509v1.pdf +3 -0
- HNE3T4oBgHgl3EQfuAs1/content/2301.04680v1.pdf +3 -0
- HNE3T4oBgHgl3EQfuAs1/vector_store/index.faiss +3 -0
- HNE3T4oBgHgl3EQfuAs1/vector_store/index.pkl +3 -0
- HtFIT4oBgHgl3EQfXys9/vector_store/index.faiss +3 -0
- INFJT4oBgHgl3EQfFiwP/vector_store/index.faiss +3 -0
- IdAzT4oBgHgl3EQfU_z6/vector_store/index.faiss +3 -0
- JdFAT4oBgHgl3EQfvB7v/vector_store/index.faiss +3 -0
- JtAzT4oBgHgl3EQfj_0_/content/tmp_files/2301.01524v1.pdf.txt +911 -0
.gitattributes
CHANGED
@@ -2577,3 +2577,59 @@ otFMT4oBgHgl3EQf7TEy/content/2301.12463v1.pdf filter=lfs diff=lfs merge=lfs -tex
|
|
2577 |
JdFAT4oBgHgl3EQfvB7v/content/2301.08674v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2578 |
6tE5T4oBgHgl3EQfPw5R/content/2301.05507v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2579 |
otFMT4oBgHgl3EQf7TEy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2577 |
JdFAT4oBgHgl3EQfvB7v/content/2301.08674v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2578 |
6tE5T4oBgHgl3EQfPw5R/content/2301.05507v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2579 |
otFMT4oBgHgl3EQf7TEy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2580 |
+
F9AzT4oBgHgl3EQfi_2P/content/2301.01509v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2581 |
+
6tE5T4oBgHgl3EQfPw5R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2582 |
+
YNFOT4oBgHgl3EQf9jQ2/content/2301.12970v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2583 |
+
ztFRT4oBgHgl3EQfkDcP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2584 |
+
IdAzT4oBgHgl3EQfU_z6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2585 |
+
_dAyT4oBgHgl3EQfdvdN/content/2301.00307v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2586 |
+
4NE1T4oBgHgl3EQfSgOT/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2587 |
+
KNFJT4oBgHgl3EQfwy3r/content/2301.11632v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2588 |
+
YtAzT4oBgHgl3EQfmv2c/content/2301.01569v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2589 |
+
ntE3T4oBgHgl3EQfjAo0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2590 |
+
stE3T4oBgHgl3EQf9Quo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2591 |
+
ztFRT4oBgHgl3EQfkDcP/content/2301.13593v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2592 |
+
JdFAT4oBgHgl3EQfvB7v/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2593 |
+
1dFQT4oBgHgl3EQfEjV1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2594 |
+
KNAyT4oBgHgl3EQf6Ppp/content/2301.00818v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2595 |
+
KNFJT4oBgHgl3EQfwy3r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2596 |
+
vNAzT4oBgHgl3EQfdPyu/content/2301.01418v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2597 |
+
etE3T4oBgHgl3EQffAo5/content/2301.04548v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2598 |
+
atAyT4oBgHgl3EQf9_py/content/2301.00884v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2599 |
+
xtFQT4oBgHgl3EQfAjU_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2600 |
+
x9E4T4oBgHgl3EQfYQwo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2601 |
+
0tE2T4oBgHgl3EQfNAZ6/content/2301.03731v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2602 |
+
XtE2T4oBgHgl3EQfYgfk/content/2301.03856v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2603 |
+
0tE2T4oBgHgl3EQfNAZ6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2604 |
+
HNE3T4oBgHgl3EQfuAs1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2605 |
+
INFJT4oBgHgl3EQfFiwP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2606 |
+
YdE2T4oBgHgl3EQfEQZV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2607 |
+
1dFQT4oBgHgl3EQfEjV1/content/2301.13238v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2608 |
+
i9E4T4oBgHgl3EQfSwzD/content/2301.05002v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2609 |
+
BdAzT4oBgHgl3EQfTfx4/content/2301.01250v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2610 |
+
3dE1T4oBgHgl3EQfAQLV/content/2301.02838v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2611 |
+
HNE3T4oBgHgl3EQfuAs1/content/2301.04680v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2612 |
+
kb_46/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2613 |
+
_dAyT4oBgHgl3EQfRfZA/content/2301.00066v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2614 |
+
1NE0T4oBgHgl3EQfdgAR/content/2301.02376v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2615 |
+
BdAzT4oBgHgl3EQfTfx4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2616 |
+
pNE0T4oBgHgl3EQf9AKq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2617 |
+
dNE2T4oBgHgl3EQfGAZK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2618 |
+
YtAzT4oBgHgl3EQfmv2c/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2619 |
+
kNE3T4oBgHgl3EQfJglg/content/2301.04344v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2620 |
+
YdE1T4oBgHgl3EQfcQQe/content/2301.03181v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2621 |
+
NdFQT4oBgHgl3EQfWTbR/content/2301.13304v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2622 |
+
_dAyT4oBgHgl3EQfRfZA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2623 |
+
HtFIT4oBgHgl3EQfXys9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2624 |
+
YdE1T4oBgHgl3EQfcQQe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2625 |
+
3dE1T4oBgHgl3EQfAQLV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2626 |
+
M9E4T4oBgHgl3EQf9A55/content/2301.05352v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2627 |
+
_dA0T4oBgHgl3EQfPf96/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2628 |
+
ntE3T4oBgHgl3EQfjAo0/content/2301.04584v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2629 |
+
7tE0T4oBgHgl3EQffQCV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2630 |
+
TNFAT4oBgHgl3EQf2R4K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2631 |
+
S9AzT4oBgHgl3EQfJfsf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2632 |
+
X9FRT4oBgHgl3EQfODd9/content/2301.13512v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2633 |
+
3dE4T4oBgHgl3EQfbAyT/content/2301.05069v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2634 |
+
n9E5T4oBgHgl3EQfjw-t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2635 |
+
M9E4T4oBgHgl3EQf9A55/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
0tE2T4oBgHgl3EQfNAZ6/content/2301.03731v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:956c8991803491d00146631264cbeecb0ae4623d5ea5e482084b21cd521d0681
|
3 |
+
size 3728778
|
0tE2T4oBgHgl3EQfNAZ6/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:59b72a2fd37ad72781f2c49270c5f2384136ca2026da61db52bea1a15c716d5b
|
3 |
+
size 8454189
|
0tE2T4oBgHgl3EQfNAZ6/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7562496f1e6b033293289ba5b1495c2668f1616413ef8c280692c239b0f21ca5
|
3 |
+
size 249671
|
1NE0T4oBgHgl3EQfdgAR/content/2301.02376v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6fe1d0176f291a1c898c912d97c9bb2ff87e6af41f06fe5277110f7774e24c46
|
3 |
+
size 9737225
|
1dE1T4oBgHgl3EQfRwNN/content/tmp_files/2301.03056v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1dE1T4oBgHgl3EQfRwNN/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1dFQT4oBgHgl3EQfEjV1/content/2301.13238v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7353a08540c0739c53790c24a3b792e485198afb8251f1c81c01f6fb45987296
|
3 |
+
size 2156805
|
1dFQT4oBgHgl3EQfEjV1/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7e6cc031260e980661b204291664edb6faa5918c2ebb614815847eb606ad6bf4
|
3 |
+
size 7405613
|
1dFQT4oBgHgl3EQfEjV1/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:26dca59b394389c4d0dbf777388a807a85934b3e01453cd20e5e23466752996c
|
3 |
+
size 274641
|
1tE3T4oBgHgl3EQfngpH/content/tmp_files/2301.04625v1.pdf.txt
ADDED
@@ -0,0 +1,1109 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Multivariate Regression via Enhanced
|
2 |
+
Response Envelope: Envelope Regularization
|
3 |
+
and Double Descent
|
4 |
+
Oh-Ran Kwon and Hui Zou
|
5 |
+
School of Statistics, University of Minnesota
|
6 |
+
Abstract
|
7 |
+
The envelope model provides substantial efficiency gains over the standard multi-
|
8 |
+
variate linear regression by identifying the material part of the response to the model
|
9 |
+
and by excluding the immaterial part. In this paper, we propose the enhanced response
|
10 |
+
envelope by incorporating a novel envelope regularization term in its formulation. It is
|
11 |
+
shown that the enhanced response envelope can yield better prediction risk than the
|
12 |
+
original envelope estimator. The enhanced response envelope naturally handles high-
|
13 |
+
dimensional data for which the original response envelope is not serviceable without
|
14 |
+
necessary remedies. In an asymptotic high-dimensional regime where the ratio of the
|
15 |
+
number of predictors over the number of samples converges to a non-zero constant, we
|
16 |
+
characterize the risk function and reveal an interesting double descent phenomenon for
|
17 |
+
the first time for the envelope model. A simulation study confirms our main theoret-
|
18 |
+
ical findings. Simulations and real data applications demonstrate that the enhanced
|
19 |
+
response envelope does have significantly improved prediction performance over the
|
20 |
+
original envelope method.
|
21 |
+
Keywords: Double descent, Envelope model, High-dimension asymptotics, Prediction, Reg-
|
22 |
+
ularization
|
23 |
+
1
|
24 |
+
arXiv:2301.04625v1 [stat.ME] 11 Jan 2023
|
25 |
+
|
26 |
+
1
|
27 |
+
Introduction
|
28 |
+
The envelope model first introduced by Cook et al. (2010) is a modern approach to estimat-
|
29 |
+
ing an unknown regression coefficient matrix β ∈ Rr×p in multivariate linear regression of
|
30 |
+
the response vector y ∈ Rr on the predictors x ∈ Rp. It was shown by Cook et al. (2010) that
|
31 |
+
the envelope estimator of β results in substantial efficiency gains relative to the standard
|
32 |
+
maximum likelihood estimator of β. The gains arise by identifying the part of the response
|
33 |
+
vector that is material to the regression and by excluding the immaterial part in the estima-
|
34 |
+
tion. The original envelope model has been later extended to the envelope model based on
|
35 |
+
excluding immaterial parts of the predictors to the regression by Cook et al. (2013). Cook
|
36 |
+
et al. (2013) then established the connection between the latter envelope model and partial
|
37 |
+
least squares, providing a statistical understanding of partial least squares algorithms.
|
38 |
+
The success of the envelope models and their theories motivated some authors to propose
|
39 |
+
new envelope models by applying or extending the core idea of envelope modeling to various
|
40 |
+
statistical models. The two most common are the response envelope models and the predictor
|
41 |
+
envelope models. The response envelope models (predictor envelope models) achieve estima-
|
42 |
+
tion and prediction gains by eliminating the variability arising from the immaterial part of
|
43 |
+
the responses (predictors) that is invariant to the changes in the predictors (responses). Pa-
|
44 |
+
pers on response envelope models include the original envelope model (Cook et al., 2010), the
|
45 |
+
partial envelope model (Su and Cook, 2011), the scaled response envelope model (Cook and
|
46 |
+
Su, 2013), the reduced-rank envelope model (Cook et al., 2015), the sparse envelope model
|
47 |
+
(Su et al., 2016), the Bayesian envelope model (Khare et al., 2017), the tensor response enve-
|
48 |
+
lope model (Li and Zhang, 2017), the envelope model for matrix variate regression (Ding and
|
49 |
+
Cook, 2018), and the spatial envelope model for spatially correlated data (Rekabdarkolaee
|
50 |
+
et al., 2020). Papers on predictor envelope models include the envelope model for predictor
|
51 |
+
reduction (Cook et al., 2013), the envelope model for generalized linear models and Cox’s
|
52 |
+
proportional hazard model (Cook and Zhang, 2015a), the scaled predictor envelope model
|
53 |
+
(Cook and Su, 2016), the envelope quantile regression model (Ding et al., 2020), the envelope
|
54 |
+
model for the censored quantile regression (Zhao et al., 2022), tensor envelope partial least
|
55 |
+
squares regression (Zhang and Li, 2017), and envelope-based sparse partial least squares
|
56 |
+
regression (Zhu and Su, 2020). For a comprehensive review of the envelope models, readers
|
57 |
+
2
|
58 |
+
|
59 |
+
are referred to Cook (2018).
|
60 |
+
High-dimensional data have become common in many fields. It is only natural to consider
|
61 |
+
the performance of the envelope model under high dimensions. The likelihood-based method
|
62 |
+
to estimate β under both the response/predictor envelope model is not serviceable for high-
|
63 |
+
dimensional data because the likelihood-based method requires the inversion of the sample
|
64 |
+
covariance matrix of predictors. Hence, one has to find effective ways to mitigate this issue.
|
65 |
+
For the predictor envelope model, its connection to partial least squares provides one solution.
|
66 |
+
Partial least squares (De Jong, 1993) can be used for estimating β for the predictor envelope
|
67 |
+
model (Cook et al., 2013). The partial least squares algorithm is an iterative moment-based
|
68 |
+
algorithm involving the sample covariance of predictors and the sample covariance between
|
69 |
+
the response vector and predictors, which does not require inversion of the sample covariance
|
70 |
+
matrix of predictors. In addition, the algorithm provides the root-n consistent estimator of β
|
71 |
+
in the predictor envelope model with the number of predictors fixed (Chun and Kele¸s, 2010;
|
72 |
+
Cook et al., 2013) and can yield accurate prediction in the asymptotic high-dimensional
|
73 |
+
regime when the response is univariate (Cook and Forzani, 2019). Motivated by this, Zhu and
|
74 |
+
Su (2020) introduced envelope-based sparse partial least squares and showed the consistency
|
75 |
+
of the estimator for the sparse predictor envelope model. Zhang and Li (2017) proposed a
|
76 |
+
tensor envelope partial least squares algorithm, which provides the consistent estimator for
|
77 |
+
the tensor predictor envelope model. Another way to apply predictor envelope models for
|
78 |
+
high-dimensional data is by selecting the principal components of predictors and then using
|
79 |
+
likelihood-based estimation on the principal components. This simple remedy is adapted by
|
80 |
+
Rimal et al. (2019) to compare the prediction performance of the likelihood-based predictor
|
81 |
+
envelope method, principal component regression, and partial least squares regression for
|
82 |
+
high-dimensional data. Their extensive numerical study showed that this simple remedy
|
83 |
+
produced better prediction performance than principal component regression and partial
|
84 |
+
least squares regression. The impact of high dimensions is more severe for the response
|
85 |
+
envelope. There is far less work on making the response envelope model serviceable for high-
|
86 |
+
dimensional data. The Bayesian approach for the response envelope model (Khare et al.,
|
87 |
+
2017) can handle high-dimensional data. The sparse envelope model (Su et al., 2016) which
|
88 |
+
performs variable selection on the responses can handle data with the sample size smaller
|
89 |
+
3
|
90 |
+
|
91 |
+
than the number of responses, but still requires the number of predictors smaller than the
|
92 |
+
number of sample size.
|
93 |
+
In this paper, we propose the enhanced response envelope for high-dimensional data by
|
94 |
+
incorporating a novel envelope regularization term in its formulation. The envelope regu-
|
95 |
+
larization term respects the fundamental idea of the original envelope model by considering
|
96 |
+
the presence of the material and immaterial parts of the response in the model. The en-
|
97 |
+
hancements are twofold. First, our enhanced response envelope estimator can handle both
|
98 |
+
low- and high-dimensional data, while the original envelope estimator can only handle low-
|
99 |
+
dimensional data where the sample size n is smaller than the number of predictors p. From
|
100 |
+
the connection between the original envelope estimator and the enhanced response envelope
|
101 |
+
estimator in low-dimension, we extend the definition of the original envelope estimator to
|
102 |
+
high-dimensional data by considering the limiting case of the enhanced response envelope es-
|
103 |
+
timator with a vanishing regularization parameter; see the discussion in Section 2.3. Second,
|
104 |
+
we prove that the enhanced response envelope can reduce the prediction risk relative to the
|
105 |
+
original envelope for all values of n and p. Moreover, we study the asymptotics of the predic-
|
106 |
+
tion risk for the original envelope estimator and the enhanced response envelope estimator
|
107 |
+
when both n, p → ∞ and their ratio converges to a nonzero constant p/n → γ ∈ (0, ∞).
|
108 |
+
This kind of asymptotic regime has been considered in high-dimensional machine learning
|
109 |
+
theory (El Karoui, 2018; Dobriban and Wager, 2018; Liang and Rakhlin, 2020; Hastie et al.,
|
110 |
+
2022) for analyzing the behavior of prediction risk of certain predictive models. We derive an
|
111 |
+
interesting asymptotic prediction risk curve for the envelope estimator. The risk increases as
|
112 |
+
γ increases, and then decreases after γ > 1. This phenomenon is known as the double descent
|
113 |
+
phenomenon in the machine learning literature. Although the double descent phenomenon
|
114 |
+
has been observed for neural networks and ridgeless regression (Belkin et al., 2019; Hastie
|
115 |
+
et al., 2022), this is the first time that such a phenomenon is shown for the envelope models.
|
116 |
+
The rest of the paper is organized as follows. We review the original envelope model
|
117 |
+
and the corresponding envelope estimator in Section 2.1. In Section 2.2, we introduce a
|
118 |
+
new regularization term called the envelope regularization based on which we propose the
|
119 |
+
enhanced response envelope in section 2.3. The enhanced response envelope estimator nat-
|
120 |
+
urally provides a definition for the envelope estimator when p > n. Section 2.4 describes
|
121 |
+
4
|
122 |
+
|
123 |
+
how to implement this new method in practice. In Section 3.1, we prove that the enhanced
|
124 |
+
response envelope can yield better prediction risk than the original envelope for any (n, p)
|
125 |
+
pair. Considering n, p → ∞ and p/n → γ ∈ (0, ∞), we derive the limiting prediction risk
|
126 |
+
result of the original envelope and the enhanced response envelope in Section 3.2. This result
|
127 |
+
along with our simulation study in Section 4 verify the double descent phenomenon. Real
|
128 |
+
data analyses are presented in Section 5. Proofs of theorems are provided in Appendix A.
|
129 |
+
2
|
130 |
+
Enhanced response envelope
|
131 |
+
2.1
|
132 |
+
Review of envelope model
|
133 |
+
Envelope model
|
134 |
+
Let us begin with the classical multivariate linear regression model of a
|
135 |
+
response vector y ∈ Rr given a predictor vector x ∈ Rp:
|
136 |
+
y = βx + ε, ε ∼ N(0, Σ),
|
137 |
+
(1)
|
138 |
+
where ε is the error vector with a positive definite Σ and independent to x. β ∈ Rr×p is
|
139 |
+
an unknown matrix of regression coefficients and x ∼ Px where Px is a distribution on Rp
|
140 |
+
such that E(x) = 0 and Cov(x) = Σx. We omit an intercept by assuming E(y) = 0 for easy
|
141 |
+
communication.
|
142 |
+
The envelope model allows for the possibility that there is a part of the response vector
|
143 |
+
that is unaffected by changes in the predictor vector. Specifically, let E ⊆ Rr be a subspace
|
144 |
+
such that for all x1 and x2,
|
145 |
+
(i) QEy|(x = x1) ∼ QEy|(x = x2) and (ii) PEy ⊥⊥ QEy|x,
|
146 |
+
(2)
|
147 |
+
where PE is the projection onto E and QE = I − PE. Condition (i) states that the marginal
|
148 |
+
distribution of QEy is invariant to changes in x. Condition (ii) says that QEy does not
|
149 |
+
affect PEy if x is provided. Conditions together imply that PE includes the relevant depen-
|
150 |
+
dency information of y on x (the material part) while QE is the irrelevant information (the
|
151 |
+
immaterial part).
|
152 |
+
Let B = span(β). The conditions in (2) hold if and only if
|
153 |
+
span(β) = B ⊆ E and Σ = PEΣPE + QEΣQE.
|
154 |
+
(3)
|
155 |
+
5
|
156 |
+
|
157 |
+
The definition of an envelope introduced by Cook et al. (2007, 2010) formalizes the smallest
|
158 |
+
subspace satisfying the conditions in (2) using the equivalence relation of (2) and (3). The
|
159 |
+
envelope is defined as the intersection of all subspaces E satisfying (3) and is denoted by
|
160 |
+
EΣ,B, Σ-envelope of B.
|
161 |
+
The envelope model arises by parameterizing the multivariate linear model in terms of
|
162 |
+
the envelope EΣ,B. The parameterization is as follows. Let u = dim(EΣ,B), Γ ∈ Rr×u be any
|
163 |
+
semi-orthogonal basis matrix for EΣ,B, and Γ0 ∈ Rr×(r−u) is any semi-orthogonal basis matrix
|
164 |
+
for the orthogonal complement of EΣ,B. Then the multivariate linear model can be written
|
165 |
+
as
|
166 |
+
y = Γηx + ε, ε ∼ N(0, ΓΩΓT + Γ0Ω0ΓT
|
167 |
+
0 ),
|
168 |
+
(4)
|
169 |
+
where β = Γη with η ∈ Ru×p, and Ω ∈ Rr×r and Ω0 ∈ R(r−u)×(r−u) are symmetric positive
|
170 |
+
definite matrices. Model (4) is called the envelope model.
|
171 |
+
Envelope estimator The parameters in the envelope model are estimated by maximizing
|
172 |
+
the likelihood function from model (4). Assume that p+r < n and u is the dimension u of the
|
173 |
+
envelope. SX = n−1XTX, SY = n−1YTY, SY,X = n−1YTX, and SY|X = SY−SY,XS−1
|
174 |
+
X SX,Y,
|
175 |
+
where Y ∈ Rn×r has rows yT
|
176 |
+
i and X ∈ Rn×p has rows xT
|
177 |
+
i .
|
178 |
+
The envelope estimator of β is determined as
|
179 |
+
ˆEΣ,B = span{arg
|
180 |
+
min
|
181 |
+
G∈Gr(r,u)(log |GTSY|XG| + log |GTS−1
|
182 |
+
Y G|)},
|
183 |
+
(5)
|
184 |
+
where Gr(r, u) = {G ∈ Rr×u : G is a semi-orthogonal matrix}. Define ˆΓ as any semi-
|
185 |
+
orthogonal basis matrix for ˆEΣ,B and let ˆΓ0 be any semi-orthogonal basis matrix for the
|
186 |
+
orthogonal complement of ˆEΣ,B. The estimator of β is given by
|
187 |
+
ˆβ = ˆΓˆΓTSY,XS−1
|
188 |
+
X ,
|
189 |
+
(6)
|
190 |
+
and Σ is estimated by ˆΣ = ˆΓ ˆΩˆΓ + ˆΓT
|
191 |
+
0 ˆΩ0ˆΓ0 where
|
192 |
+
ˆΩ = ˆΓTSY|XˆΓ,
|
193 |
+
ˆΩ0 = ˆΓT
|
194 |
+
0 SY ˆΓ0,
|
195 |
+
(7)
|
196 |
+
2.2
|
197 |
+
Envelope regularization
|
198 |
+
In this section, we introduce the envelope regularization term that respects the fundamental
|
199 |
+
idea in the envelope model by considering the presence of material and immaterial parts,
|
200 |
+
6
|
201 |
+
|
202 |
+
PEΣ,By and QEΣ,By, in the regression.
|
203 |
+
We define the envelope regularization term as
|
204 |
+
ρ(η, Ω) = tr(ηTΩ−1η).
|
205 |
+
(8)
|
206 |
+
The envelope model distinguishes between PEΣ,By and QEΣ,By in the estimation process.
|
207 |
+
The log-likelihood function of the envelope model is decomposed into two log-likelihood
|
208 |
+
functions. One is the log-likelihood function for the multivariate regression of ΓTy on x,
|
209 |
+
ΓTy = ηx+ΓTε where ΓTε ∼ N(0, Ω). The other is the log-likelihood function for the zero-
|
210 |
+
mean model of ΓT
|
211 |
+
0 y, ΓT
|
212 |
+
0 y = ΓT
|
213 |
+
0 ε where ΓT
|
214 |
+
0 ε ∼ N(0, Ω0). The envelope regularization term
|
215 |
+
(8) is the function of η and Ω, the parameters in the likelihood for the material part of the
|
216 |
+
envelope model. The envelope regularization term (8) can be seen as imposing the Frobenius
|
217 |
+
norm regularization on the coefficient after standardizing the material part of the regression
|
218 |
+
to have uncorrelated errors, Ω−1/2ΓTy = Ω−1/2ηx + Ω−1/2ΓTε where Ω−1/2ΓTε ∼ N(0, I).
|
219 |
+
We emphasize that the envelope regularization is different from the ridge regularization.
|
220 |
+
While the ridge regularization ∥β∥2
|
221 |
+
F is the quadratic function of β, the envelope regulariza-
|
222 |
+
tion is not because the components of Ω are not fixed values. The envelope regularization is
|
223 |
+
the function of both η and Ω, and thus is optimized over η and Ω simultaneously, as shown
|
224 |
+
in the next subsection.
|
225 |
+
2.3
|
226 |
+
The proposed estimator
|
227 |
+
We only assume that r ≤ n but p is allowed to be bigger than n. The log-likelihood function
|
228 |
+
under the envelope model (4) is
|
229 |
+
Lu(η, EΣ,B, Ω, Ω0) = − (nr/2) log(2π) − (n/2) log |ΓΩΓT + Γ0Ω0ΓT
|
230 |
+
0 |
|
231 |
+
− (1/2)
|
232 |
+
n
|
233 |
+
�
|
234 |
+
i=1
|
235 |
+
(yi − Γηxi)T(ΓΩΓT + Γ0Ω0ΓT
|
236 |
+
0 )−1(yi − Γηxi).
|
237 |
+
By incorporating the envelope regularization term ρ given in the last subsection, we propose
|
238 |
+
the following enhanced response envelope estimator via penalized maximum likelihood:
|
239 |
+
arg max{Lu(η, EΣ,B, Ω, Ω0) − n
|
240 |
+
2λ · ρ(η, Ω)},
|
241 |
+
(9)
|
242 |
+
where λ > 0 serves as a regularization parameter.
|
243 |
+
7
|
244 |
+
|
245 |
+
Let SX = n−1XTX, SY = n−1YTY, SY,X = n−1YTX, Sλ
|
246 |
+
X = SX + λI and Sλ
|
247 |
+
Y|X =
|
248 |
+
SY − SY,X(Sλ
|
249 |
+
X)−1SX,Y. After some basic calculations, (9) can be expressed as
|
250 |
+
ˆEΣ,B(λ) = span{arg
|
251 |
+
min
|
252 |
+
G∈Gr(r,u)(log |GTSλ
|
253 |
+
Y|XG| + log |GTS−1
|
254 |
+
Y G|)},
|
255 |
+
(10)
|
256 |
+
where Gr(r, u) = {G ∈ Rr×u : G is a semi-orthogonal matrix}. Let ˆΓλ be any semi-orthogonal
|
257 |
+
basis matrix for ˆEΣ,B(λ) and ˆΓ0,λ be any semi-orthogonal basis matrix for the orthogonal
|
258 |
+
complement of ˆEΣ,B(λ). The enhanced envelope estimator of β is given by
|
259 |
+
ˆβ(λ) = ˆΓλˆΓT
|
260 |
+
λSY,X(Sλ
|
261 |
+
X)−1
|
262 |
+
(11)
|
263 |
+
and Σ is estimated by ˆΣ(λ) = ˆΓλ ˆΩ(λ)ˆΓλ + ˆΓT
|
264 |
+
0,λ ˆΩ0(λ)ˆΓ0,λ where
|
265 |
+
ˆΩ(λ) = ˆΓT
|
266 |
+
λSλ
|
267 |
+
Y|XˆΓλ,
|
268 |
+
ˆΩ0(λ) = ˆΓT
|
269 |
+
0,λSY ˆΓ0,λ,
|
270 |
+
(12)
|
271 |
+
The enhanced response envelope estimator can naturally handle the case where p ≥ n−r,
|
272 |
+
while the original envelope estimator (5) does not. Motivated by the definition of ridgeless
|
273 |
+
regression (Hastie et al., 2022), we can consider taking the limit of the enhanced response
|
274 |
+
envelope estimator with λ → 0+:
|
275 |
+
ˆEΣ,B = span{arg
|
276 |
+
min
|
277 |
+
G∈Gr(r,u)( lim
|
278 |
+
λ→0+ log |GTSλ
|
279 |
+
Y|XG| + log |GTS−1
|
280 |
+
Y G|)},
|
281 |
+
ˆβ = lim
|
282 |
+
λ→0+ ˆβ(λ)
|
283 |
+
(13)
|
284 |
+
We take (13) as the definition of envelope estimator. Obviously, when p < n−r, this extended
|
285 |
+
definition recovers the original envelope estimator (5). This definition enables the use of the
|
286 |
+
envelope estimator when p ≥ n−r, without altering the definition of the original envelope
|
287 |
+
estimator (5) when p < n−r. In practice, we implement (13) by computing the enhanced
|
288 |
+
response envelope estimator (10) with a very small value of λ such as 10−8.
|
289 |
+
As the enhanced response envelope estimator (9) has flexibility on λ, the enhanced re-
|
290 |
+
sponse envelope estimator with an appropriate choice of λ can yield better prediction risk
|
291 |
+
compared to the envelope estimator, which is discussed in Section 3. We discuss the Grass-
|
292 |
+
mannian manifold optimization required in (10) in the next subsection.
|
293 |
+
2.4
|
294 |
+
Implementation
|
295 |
+
Suppose that the dimension u is specified and λ is given. Our proposed estimator ˆEΣ,B(λ)
|
296 |
+
for EΣ(B) requires the optimization over the Grassmannian G(u, r). Such a computation
|
297 |
+
8
|
298 |
+
|
299 |
+
problem exists for the original envelope model as well. So far, the best-known algorithm for
|
300 |
+
solving envelope models is the algorithm introduced by Cook et al. (2016). Thus, we employ
|
301 |
+
their algorithm to compute ˆEΣ,B(λ) in (10). Note that we standardize X so that each column
|
302 |
+
has a mean of 0 and a standard deviation of 1 before fitting any model.
|
303 |
+
In practice, the tuning parameter λ and the dimension u of the envelope are unknown. We
|
304 |
+
use the cross-validation method to choose (u, λ). For the original envelope, u can be selected
|
305 |
+
by using AIC, BIC, LRT or cross-validation. BIC and LRT may be preferred as shown by
|
306 |
+
simulations in Su and Cook (2013). Because the enhanced response envelope model has an
|
307 |
+
additional tuning parameter λ, we propose to use cross-validation to find the best tuning
|
308 |
+
parameter combination of u and λ.
|
309 |
+
We have implemented the enhanced response envelope method in R and the code is
|
310 |
+
available upon request.
|
311 |
+
3
|
312 |
+
Theory
|
313 |
+
In this section, we show that the enhanced response envelope can reduce the prediction risk
|
314 |
+
over the envelope for any (n, p) pair. We then consider the asymptotic setting when n, p → ∞
|
315 |
+
p/n → γ ∈ (0, ∞). This asymptotic regime has been considered in the literature (El Karoui,
|
316 |
+
2018; Dobriban and Wager, 2018; Liang and Rakhlin, 2020; Hastie et al., 2022) for analyzing
|
317 |
+
the behavior of prediction risk of certain predictive models.
|
318 |
+
In our discussion, we consider the case where EΣ(B) is known, which has been assumed
|
319 |
+
in the existing envelope papers to understand the core mechanism of envelope methodologies
|
320 |
+
(Cook et al., 2013; Cook and Zhang, 2015a,b).
|
321 |
+
3.1
|
322 |
+
Reduction in prediction risk
|
323 |
+
Consider a test point xnew ∼ Px. For an estimator ˆβ, we define the prediction risk as
|
324 |
+
R( ˆβ|X) = E[∥ ˆβxnew − βxnew∥2|X].
|
325 |
+
Note that this definition has the bias-variance decomposition,
|
326 |
+
R( ˆβ|X) = ∥bias(vec( ˆβ)|X)∥2 + tr{Var(vec( ˆβ)|X)}.
|
327 |
+
9
|
328 |
+
|
329 |
+
Let Γ be a semi-orthogonal basis matrix for EΣ,B. Following the discussion in Section 2.3,
|
330 |
+
we take (13) as the definition of the envelope estimator ˆβΓ . The prediction risk of ˆβΓ is
|
331 |
+
R( ˆβΓ|X) = vecT(β)[ΠXΣxΠX ⊗ Ir]vec(β)
|
332 |
+
�
|
333 |
+
��
|
334 |
+
�
|
335 |
+
bias2
|
336 |
+
+ tr(Ω)
|
337 |
+
n
|
338 |
+
tr(S+
|
339 |
+
XΣx)
|
340 |
+
�
|
341 |
+
��
|
342 |
+
�
|
343 |
+
var
|
344 |
+
,
|
345 |
+
where ΠX = Ip − S+
|
346 |
+
XSX.
|
347 |
+
The prediction risk of the enhanced response envelope estimator ˆβΓ(λ) is
|
348 |
+
R( ˆβΓ(λ)|X) = E[∥ ˆβΓ(λ)xnew − βxnew∥2|X]
|
349 |
+
= λ2vecT(β)[(SX + λI)−1Σx(SX + λI)−1 ⊗ Ir]vec(β)
|
350 |
+
�
|
351 |
+
��
|
352 |
+
�
|
353 |
+
bias2
|
354 |
+
+ tr(Ω)
|
355 |
+
n
|
356 |
+
tr(ΣxSX(SX + λI)−2)
|
357 |
+
�
|
358 |
+
��
|
359 |
+
�
|
360 |
+
var
|
361 |
+
.
|
362 |
+
(14)
|
363 |
+
Theorem 1 shows that using the envelope regularization always improves the prediction
|
364 |
+
risk of the envelope model.
|
365 |
+
Theorem 1. There always exists a λ > 0 such that R( ˆβΓ(λ)|X) < R( ˆβΓ|X).
|
366 |
+
3.2
|
367 |
+
Limiting prediction risk and double descent phenomenon
|
368 |
+
The asymptotics of the envelope model are well-established in the case where n diverges
|
369 |
+
while p is fixed (Cook et al., 2010), while not in a high-dimensional asymptotic setup. In
|
370 |
+
this section, we examine the limiting risk of both the enhanced response envelope estimator
|
371 |
+
and the envelope estimator in the high-dimensional asymptotic regime where n, p → ∞ with
|
372 |
+
p/n → γ ∈ (0, ∞). The number of response variables r is fixed. This kind of asymptotic
|
373 |
+
regime has been considered in high-dimensional machine learning theory (El Karoui, 2018;
|
374 |
+
Dobriban and Wager, 2018; Liang and Rakhlin, 2020; Hastie et al., 2022) for analyzing the
|
375 |
+
behavior of prediction risk of certain predictive models.
|
376 |
+
Let x = Σ1/2
|
377 |
+
x x∗, where E(x∗) = 0 and Cov(x∗) = Ip. Then the envelope model (4) of y
|
378 |
+
on x can be expressed as the envelope model of y on x∗:
|
379 |
+
y = Γηx + ε = Γη∗x∗ + ε,
|
380 |
+
where η∗ = ηΣ1/2 and ε ∼ N(0, ΓΩΓT + Γ0Ω0ΓT
|
381 |
+
0 ). We take advantage of the invariance
|
382 |
+
property of the envelope model in the analysis. Considering the envelope on (y, x∗) amounts
|
383 |
+
to assuming the covariance of the predictor is Ip.
|
384 |
+
10
|
385 |
+
|
386 |
+
0
|
387 |
+
2
|
388 |
+
4
|
389 |
+
6
|
390 |
+
8
|
391 |
+
0
|
392 |
+
5
|
393 |
+
10
|
394 |
+
15
|
395 |
+
20
|
396 |
+
25
|
397 |
+
γ
|
398 |
+
Limiting prediction risk
|
399 |
+
Envelope
|
400 |
+
Enhanced response envelope
|
401 |
+
Figure 1: The limiting prediction risks of the enhanced response envelope with λ∗ =
|
402 |
+
tr(Ω)γ/c2 (gray solid line) and the envelope (black solid line), illustrating Theorem 2 when
|
403 |
+
tr(Ω) = 10 and tr(βTβ) = 10.
|
404 |
+
Theorem 2. Assume that x has a bounded 4th moment and that tr(ηTη) = c2 for all n, p.
|
405 |
+
Then as n, p → ∞, such that p/n → γ ∈ (0, ∞), almost surely,
|
406 |
+
R( ˆβΓ|X) →
|
407 |
+
�
|
408 |
+
�
|
409 |
+
�
|
410 |
+
�
|
411 |
+
�
|
412 |
+
tr(Ω)
|
413 |
+
γ
|
414 |
+
1−γ
|
415 |
+
for γ < 1
|
416 |
+
c2(1 − 1
|
417 |
+
γ) + tr(Ω)
|
418 |
+
1
|
419 |
+
γ−1
|
420 |
+
for γ > 1,
|
421 |
+
and
|
422 |
+
R( ˆβΓ(λ∗)|X) → tr(Ω)γm(−λ∗),
|
423 |
+
where λ∗ = tr(Ω)γ/c2 and m(z) =
|
424 |
+
1−γ−z−√
|
425 |
+
(1−γ−z)2−4γz
|
426 |
+
(2γz)
|
427 |
+
.
|
428 |
+
Figure 1 visualizes the limiting prediction risk curves in Theorem 2. It plots the limiting
|
429 |
+
risks of envelope (black solid line) and the enhanced response envelope with λ∗ = tr(Ω)γ/c2
|
430 |
+
(dark-gray solid line), when tr(Ω) = 10 and tr(ηTη) = 10.
|
431 |
+
We have four remarks from Theorem 2. The limiting risk of envelope increases before
|
432 |
+
γ = 1 and then decreases after γ = 1. The double descent phenomenon has been observed in
|
433 |
+
popular methods such as neural networks, kernel machines and ridgeless regression (Belkin
|
434 |
+
et al., 2019; Hastie et al., 2022), but this is the first time that such a result is established
|
435 |
+
11
|
436 |
+
|
437 |
+
in the envelope literature. Second, the enhanced response envelope estimator always has a
|
438 |
+
better asymptotic prediction risk than the envelope estimator (for any c2, tr(Ω), and γ).
|
439 |
+
Third, in Theorem 1, we show the existence of a λ that gives a smaller prediction risk of
|
440 |
+
the enhanced response envelope than the envelope estimator. In an asymptotic regime, we
|
441 |
+
specify such a λ value: λ∗ = tr(Ω)γ/c2. Lastly, the gap between two limiting prediction risks,
|
442 |
+
limn,p→∞ R( ˆβΓ|X) and n,p→∞R( ˆβΓ(λ∗)|X), increases as γ increases from 0 to 1. It is easy to
|
443 |
+
see as
|
444 |
+
1
|
445 |
+
1−γ > m(−λ∗), 0 < γ < 1.
|
446 |
+
4
|
447 |
+
Simulation
|
448 |
+
In this section, we use simulations to compare the performance of the enhanced response
|
449 |
+
envelope estimator and the envelope estimator in terms of the prediction risk, E[∥ ˆβxnew −
|
450 |
+
βxnew∥2|X] = tr[( ˆβ − β)Cov(xnew)( ˆβ − β)T]. In addition, we use simulations to have a
|
451 |
+
numeric illustration of the double descent phenomenon to confirm the asymptotic theory.
|
452 |
+
We consider a setting where yi ∈ R3 is generated from the model
|
453 |
+
yi = βxi + εi, εi ∼ N(0, Σ), i = 1, . . . , n,
|
454 |
+
and xi ∈ Rp is generated independently from xi ∼ N(0, Σx(ρ)) where (i, j)th element of
|
455 |
+
Σx(ρ) ∈ Rp×p is ρ|i−j|. The covariance matrix Σ is set using three orthonormal vectors and
|
456 |
+
has eigenvalues 10, 8 and 2. The columns of Γ are the second and third eigenvectors of Σ.
|
457 |
+
Each component of ˜η ∈ R2×p is generated from the standard normal distribution. We then
|
458 |
+
set η =
|
459 |
+
√
|
460 |
+
10 · ˜η/∥˜η∥F. In this setting, tr(ηTη) = 10, tr(Ω) = 10, and tr(Ω0) = 10. We
|
461 |
+
assume that dim(EΣ,B) = 2 is known.
|
462 |
+
Prediction risk comparison
|
463 |
+
In this simulation, we try different combinations of n, p
|
464 |
+
and ρ where n ∈ {50, 90, 200, 500}, p/n ∈ {0.1, 0.8, 1.2} and ρ ∈ {0, 0.8}. We compare the
|
465 |
+
prediction risk of the enhanced response envelope estimator to three different estimators: the
|
466 |
+
envelope estimator, multivariate linear regression, and multivariate ridge regression.
|
467 |
+
For the enhanced response envelope and the multivariate ridge regression, we perform
|
468 |
+
ten-fold cross-validation on simulated data to select λ among equally spaced 100 candidate
|
469 |
+
λ-values in the scale of logarithm base 10. We compute the envelope estimator for data
|
470 |
+
12
|
471 |
+
|
472 |
+
with n ≤ p−r by taking a very small value of λ = 10−8 in the enhanced response envelope
|
473 |
+
estimator. We fit multivariate regression model to n < p data by taking a tiny value of
|
474 |
+
λ = 10−8 in the multivariate ridge regression. We then calculate the prediction risk. This
|
475 |
+
process is repeated 100 times.
|
476 |
+
In Table 1, we report the prediction risk averaged over 100 replications. First, we see that
|
477 |
+
the prediction risks from the enhanced response envelope are consistently smaller than the
|
478 |
+
envelope, as indicated in Theorem 1. Second, the enhanced response envelope consistently
|
479 |
+
gives smaller prediction risks compared to the multivariate ridge regression. When u = r, the
|
480 |
+
enhanced response envelope model reduces to the multivariate ridge regression. Therefore,
|
481 |
+
the prediction risk of the enhanced envelope model can be smaller than that of multivariate
|
482 |
+
ridge regression as long as tr(Ω0) > 0.
|
483 |
+
Double descent confirmation
|
484 |
+
This simulation is designed to support Theorem 2 and
|
485 |
+
to illustrate the double descent phenomenon in the envelope model. We set n ∈ {200, 2000}
|
486 |
+
and ρ = 0. p/n varies from 0.1 to 8. We compute the envelope and the enhanced response
|
487 |
+
envelope with setting λ∗ = tr(Ω)p/(nc2) = p/n on simulated data. We then calculate the
|
488 |
+
prediction risk for each estimator. Again, we fit n ≤ p−r data to the envelope estimator by
|
489 |
+
taking a very small value of λ = 10−8 in the enhanced response envelope estimator.
|
490 |
+
Figure 2 displays the prediction risks from n = 2000 with various p values. The gray
|
491 |
+
rectangle points denote the prediction risk for the enhanced response envelope estimator. The
|
492 |
+
black triangle points are the prediction risk for the envelope estimator. We see a fascinating
|
493 |
+
double descent prediction risk curve for the envelope model, as discussed in Theorem 2. Also,
|
494 |
+
the enhanced response envelope gives a smaller prediction risk across the entire range of p/n.
|
495 |
+
Figure 3 plots the prediction risk curves from n = 200. We see that Figure 3 exhibits the
|
496 |
+
same messages for the much smaller sample size. Although Theorem 2 is established when
|
497 |
+
considering EΣ,B is known, we did not use this information in the actual estimation in the
|
498 |
+
simulation study, yet the core message of Theorem 2 is confirmed by the simulation.
|
499 |
+
13
|
500 |
+
|
501 |
+
n
|
502 |
+
p
|
503 |
+
Enhanced
|
504 |
+
envelope
|
505 |
+
Envelope
|
506 |
+
Multivariate
|
507 |
+
linear reg
|
508 |
+
Multivariate
|
509 |
+
ridge reg
|
510 |
+
Example 1: p/n = 0.1, ρ = 0
|
511 |
+
50
|
512 |
+
5
|
513 |
+
1.31 (0.11)
|
514 |
+
1.40 (0.12)
|
515 |
+
2.39 (0.17)
|
516 |
+
2.04 (0.12)
|
517 |
+
90
|
518 |
+
9
|
519 |
+
1.24 (0.08)
|
520 |
+
1.41 (0.10)
|
521 |
+
2.33 (0.13)
|
522 |
+
1.92 (0.09)
|
523 |
+
200
|
524 |
+
20
|
525 |
+
1.16 (0.04)
|
526 |
+
1.26 (0.05)
|
527 |
+
2.31 (0.05)
|
528 |
+
1.93 (0.04)
|
529 |
+
500
|
530 |
+
50
|
531 |
+
1.06 (0.03)
|
532 |
+
1.18 (0.03)
|
533 |
+
2.28 (0.04)
|
534 |
+
1.85 (0.04)
|
535 |
+
Example 2: p/n = 0.8, ρ = 0
|
536 |
+
50
|
537 |
+
40
|
538 |
+
6.73 (0.18)
|
539 |
+
60.89 (5.80)
|
540 |
+
104.45 (7.09)
|
541 |
+
7.16 (0.11)
|
542 |
+
90
|
543 |
+
72
|
544 |
+
6.44 (0.14)
|
545 |
+
55.10 (2.93)
|
546 |
+
94.81 (3.24)
|
547 |
+
7.05 (0.08)
|
548 |
+
200
|
549 |
+
160
|
550 |
+
5.86 (0.10)
|
551 |
+
42.50 (0.99)
|
552 |
+
81.33 (1.63)
|
553 |
+
6.91 (0.06)
|
554 |
+
500
|
555 |
+
400
|
556 |
+
5.67 (0.04)
|
557 |
+
40.61 (0.85)
|
558 |
+
79.17 (1.11)
|
559 |
+
6.89 (0.03)
|
560 |
+
Example 3: p/n = 1.2, ρ = 0
|
561 |
+
50
|
562 |
+
60
|
563 |
+
8.02 (0.23)
|
564 |
+
33.70 (1.33)
|
565 |
+
93.79 (3.83)
|
566 |
+
8.08 (0.11)
|
567 |
+
90
|
568 |
+
108
|
569 |
+
7.58 (0.13)
|
570 |
+
41.01 (1.36)
|
571 |
+
94.38 (3.60)
|
572 |
+
7.98 (0.07)
|
573 |
+
200
|
574 |
+
240
|
575 |
+
7.02 (0.07)
|
576 |
+
47.91 (1.18)
|
577 |
+
99.94 (2.83)
|
578 |
+
7.82 (0.04)
|
579 |
+
500
|
580 |
+
600
|
581 |
+
6.78 (0.04)
|
582 |
+
50.43 (0.91)
|
583 |
+
103.33 (1.55)
|
584 |
+
7.75 (0.03)
|
585 |
+
Example 4: p/n = 0.1, ρ = 0.8
|
586 |
+
50
|
587 |
+
5
|
588 |
+
1.76 (0.11)
|
589 |
+
1.98 (0.19)
|
590 |
+
2.39 (0.17)
|
591 |
+
1.84 (0.07)
|
592 |
+
90
|
593 |
+
9
|
594 |
+
1.02 (0.05)
|
595 |
+
1.40 (0.08)
|
596 |
+
2.33 (0.13)
|
597 |
+
1.45 (0.06)
|
598 |
+
200
|
599 |
+
20
|
600 |
+
0.90 (0.03)
|
601 |
+
1.30 (0.04)
|
602 |
+
2.31 (0.05)
|
603 |
+
1.31 (0.03)
|
604 |
+
500
|
605 |
+
50
|
606 |
+
0.78 (0.02)
|
607 |
+
1.19 (0.03)
|
608 |
+
2.28 (0.04)
|
609 |
+
1.22 (0.02)
|
610 |
+
Example 5: p/n = 0.8, ρ = 0.8
|
611 |
+
50
|
612 |
+
40
|
613 |
+
4.16 (0.17)
|
614 |
+
62.50 (6.34)
|
615 |
+
104.45 (7.09)
|
616 |
+
4.76 (0.12)
|
617 |
+
90
|
618 |
+
72
|
619 |
+
3.78 (0.15)
|
620 |
+
55.14 (2.85)
|
621 |
+
94.81 (3.24)
|
622 |
+
4.63 (0.10)
|
623 |
+
200
|
624 |
+
160
|
625 |
+
3.32 (0.05)
|
626 |
+
42.40 (0.99)
|
627 |
+
81.33 (1.63)
|
628 |
+
4.28 (0.05)
|
629 |
+
500
|
630 |
+
400
|
631 |
+
3.09 (0.03)
|
632 |
+
40.69 (0.87)
|
633 |
+
79.17 (1.11)
|
634 |
+
4.05 (0.03)
|
635 |
+
Example 6: p/n = 1.2, ρ = 0.8
|
636 |
+
50
|
637 |
+
60
|
638 |
+
5.24 (0.23)
|
639 |
+
36.43 (1.12)
|
640 |
+
104.17 (4.37)
|
641 |
+
5.80 (0.14)
|
642 |
+
90
|
643 |
+
108
|
644 |
+
4.41 (0.12)
|
645 |
+
44.84 (1.68)
|
646 |
+
103.01 (4.03)
|
647 |
+
5.16 (0.09)
|
648 |
+
200
|
649 |
+
240
|
650 |
+
4.05 (0.07)
|
651 |
+
51.46 (1.30)
|
652 |
+
109.34 (3.17)
|
653 |
+
4.98 (0.06)
|
654 |
+
500
|
655 |
+
600
|
656 |
+
3.86 (0.03)
|
657 |
+
54.21 (0.98)
|
658 |
+
112.62 (1.71)
|
659 |
+
4.82 (0.03)
|
660 |
+
Table 1: Prediction risk, averaged over 100 replications. The standard error is given in paren-
|
661 |
+
theses. For n ≤ p−r data, we compute the envelope by taking a very small value of λ = 10−8
|
662 |
+
in the enhanced response envelope; see the definition of the envelope estimator (13) in Sec-
|
663 |
+
tion 2.3. For n < p data, we fit the multivariate regression model by taking a tiny value of
|
664 |
+
λ = 10−8 in the multivariate ridge regression.
|
665 |
+
14
|
666 |
+
|
667 |
+
0
|
668 |
+
2
|
669 |
+
4
|
670 |
+
6
|
671 |
+
8
|
672 |
+
0
|
673 |
+
5
|
674 |
+
10
|
675 |
+
15
|
676 |
+
20
|
677 |
+
25
|
678 |
+
p/n
|
679 |
+
Prediction risk
|
680 |
+
Envelope
|
681 |
+
Enhanced response envelope
|
682 |
+
Figure 2: Prediction risk of the envelope and the enhanced response envelope with λ∗ =
|
683 |
+
tr(Ω)p/(nc2), when n = 2000 and p varies. For n ≤ p−r data, we fit the envelope by taking
|
684 |
+
a very small value of λ = 10−8 in the enhanced response envelope estimator; see the definition
|
685 |
+
of the envelope estimator (13) in Section 2.3.
|
686 |
+
5
|
687 |
+
Real data
|
688 |
+
In this section, we use two real datasets to illustrate the enhanced response envelope esti-
|
689 |
+
mator. We use air pollution data in which the number of samples is bigger than the number
|
690 |
+
of predictors (n > p) in the next subsection. In Subsection 5.2, we analyze near-infrared
|
691 |
+
spectroscopy data in which the number of predictors is much bigger than the number of
|
692 |
+
predictors (p ≫ n).
|
693 |
+
We compare the prediction performance of the enhanced response envelope estimator to
|
694 |
+
the envelope estimator, multivariate regression, and multivariate ridge regression.
|
695 |
+
5.1
|
696 |
+
Air pollution data
|
697 |
+
The air pollution data are available and obtained directly from Table 1.5 of Johnson et al.
|
698 |
+
(2002). The response vector y ∈ R5 consists of atmospheric concentrations of CO, NO, NO2,
|
699 |
+
O3, and HC, recorded at noon in the Los Angeles area on 42 different days. The two predictors
|
700 |
+
15
|
701 |
+
|
702 |
+
0
|
703 |
+
2
|
704 |
+
4
|
705 |
+
6
|
706 |
+
8
|
707 |
+
0
|
708 |
+
5
|
709 |
+
10
|
710 |
+
15
|
711 |
+
20
|
712 |
+
25
|
713 |
+
p/n
|
714 |
+
Prediction risk
|
715 |
+
Envelope
|
716 |
+
Enhanced response envelope
|
717 |
+
Figure 3: Prediction risk of the envelope and the enhanced response envelope with λ∗ =
|
718 |
+
tr(Ω)p/(nc2), when n = 200 and p varies. For n ≤ p−r data, we fit the envelope by taking a
|
719 |
+
very small value of λ = 10−8 in the enhanced response envelope estimator; see the definition
|
720 |
+
of the envelope estimator (13) in Section 2.3.
|
721 |
+
are wind speed and solar radiation. This data were analyzed in Cook (2018) to illustrate the
|
722 |
+
effectiveness of the original envelope model compared to the standard multivariate regression
|
723 |
+
model. They showed that the asymptotic standard errors of estimated components of β
|
724 |
+
from the envelope model are significantly reduced compared to those from the standard
|
725 |
+
multivariate regression model. We use the data to predict atmospheric concentrations from
|
726 |
+
wind speed and solar radiation and compare the prediction performance of the enhanced
|
727 |
+
response envelope estimator to the envelope estimator, the standard multivariate regression,
|
728 |
+
and multivariate ridge regression.
|
729 |
+
To compare the prediction performance, we borrow the nested cross validation idea
|
730 |
+
(Wang and Zou, 2021; Bates et al., 2021), in which an inner cross-validation is performed
|
731 |
+
to tune a model and an outer cross-validation is performed to provide a prediction error of
|
732 |
+
the tuned model. We adopt the leave-one-out cross-validation (LOOCV) procedure for the
|
733 |
+
outer loop because the LOOCV error is an unbiased estimator of the generalization error
|
734 |
+
of the tuned model and is shown to have nice performance compared to other methods for
|
735 |
+
16
|
736 |
+
|
737 |
+
Enhanced
|
738 |
+
envelope
|
739 |
+
Envelope
|
740 |
+
Multivariate
|
741 |
+
linear reg
|
742 |
+
Multivariate
|
743 |
+
ridge reg
|
744 |
+
Error
|
745 |
+
8.859
|
746 |
+
8.951
|
747 |
+
9.192
|
748 |
+
9.124
|
749 |
+
Table 2: Air pollution data: prediction error of the enhanced response envelope method,
|
750 |
+
the original envelope method, the multivariate linear regression, and the multivariate ridge
|
751 |
+
regression.
|
752 |
+
estimating generalization errors (Wang and Zou, 2021).
|
753 |
+
We take the ith observation out from the data and set the remaining n−1 observations
|
754 |
+
as the training set to fit and tune models. We standardize X of the training set so that each
|
755 |
+
column has a mean of 0 and a standard deviation of 1. We perform ten-fold cross-validation
|
756 |
+
to select (u, λ) from a fine grid of u ∈ {0, . . . , 5} and 20 equally spaced candidate λ-values
|
757 |
+
in the scale of logarithm base 10 for the enhanced response envelope. For the envelope,
|
758 |
+
we perform ten-fold cross-validation to choose u from {0, . . . , 5}. For the multivariate ridge
|
759 |
+
model, ten-fold cross-validation is performed to select λ from 20 equally spaced λ-values in
|
760 |
+
the scale of logarithm base 10. The ith observation we take out at the beginning is set as
|
761 |
+
the test set. We standardize xi of the test set using the mean and standard deviation of the
|
762 |
+
training data. We then calculate the squared prediction error, ∥yi − ˆβ(−i)xi∥2
|
763 |
+
2/r, where ˆβ(−i)
|
764 |
+
is the estimated regression coefficient derived from the training set. We repeat this process
|
765 |
+
for i = 1, . . . , n and report �n
|
766 |
+
i=1 ∥yi − ˆβ(−i)xi∥2
|
767 |
+
2/(nr) in Table 2. We see that the enhanced
|
768 |
+
response envelope estimator gives the smallest prediction error among all competitors.
|
769 |
+
5.2
|
770 |
+
Near-infrared spectroscopy data of fresh cattle manure
|
771 |
+
Near-infrared spectroscopy data of cattle manure were collected by Gog´e et al. (2021). The
|
772 |
+
data are available in the Data INRAE Repository at https://doi.org/10.15454/JIGO8R. This
|
773 |
+
data contain 73 cattle manure samples that were analyzed by near-infrared spectroscopy
|
774 |
+
using a NIRFlex device. Near-infrared spectra were recorded every 2 nm from 1100 to 2498
|
775 |
+
nm on fresh homogenized samples. In addition, the cattle manure samples were analyzed
|
776 |
+
for three chemical properties: the amount of dry matter, magnesium oxide, and potassium
|
777 |
+
17
|
778 |
+
|
779 |
+
Enhanced
|
780 |
+
envelope
|
781 |
+
Envelope
|
782 |
+
Multivariate
|
783 |
+
linear reg
|
784 |
+
Multivariate
|
785 |
+
ridge reg
|
786 |
+
Error
|
787 |
+
0.437
|
788 |
+
0.460
|
789 |
+
0.692
|
790 |
+
0.492
|
791 |
+
Table 3: Near-infrared spectroscopy data: prediction error from the enhanced response enve-
|
792 |
+
lope method, the envelope method, the multivariate linear regression, and the multivariate
|
793 |
+
ridge regression. We compute the envelope estimator by taking a very small value of λ = 10−8
|
794 |
+
in the enhanced response envelope estimator; see the definition of the envelope estimator
|
795 |
+
(13) in Section 2.3. We fit the multivariate regression model by taking a very small value of
|
796 |
+
λ = 10−8 in the multivariate ridge regression.
|
797 |
+
oxide. We use the data of 62 cattle manure samples which have no missing values. We
|
798 |
+
standardize each chemical property to have a sample mean of 0 and a standard deviation of
|
799 |
+
1. In our analysis, we consider the multivariate linear model, where xi ∈ R700 is the vector
|
800 |
+
of near-infrared spectroscopy measurements and yi ∈ R3 is the vector of three chemical
|
801 |
+
measurements to predict the three chemical properties from the absorbance spectra.
|
802 |
+
In Table 3, we report the prediction error which is calculated using the same procedure
|
803 |
+
described in the previous subsection, except that u is chosen from {0, . . . , 3}. Again, We see
|
804 |
+
that the enhanced response envelope estimator has the smallest prediction error among all
|
805 |
+
competitors.
|
806 |
+
6
|
807 |
+
Discussion
|
808 |
+
In this paper, we have developed a novel envelope regularization function which is used to
|
809 |
+
define the enhanced envelope estimator. We have shown that the enhanced envelope estimator
|
810 |
+
is indeed better than the un-regularized envelope estimator in prediction. The asymptotic
|
811 |
+
analysis of the risk function of envelope reveals, for the first time in the envelope literature,
|
812 |
+
an interesting double descent phenomenon. The numeric examples in this work also suggest
|
813 |
+
that the enhanced response envelope estimator is a promising new tool for multivariate
|
814 |
+
regression.
|
815 |
+
18
|
816 |
+
|
817 |
+
Although this paper is focused on the case where the number of responses (r) is less
|
818 |
+
than the number of samples and the number of predictors, it is interesting to consider the
|
819 |
+
case when r → ∞ in ultrahigh-dimensional problems. Su et al. (2016) studied the response
|
820 |
+
envelope for r → ∞ but p is fixed. When both p, r > n and diverge, there are additional
|
821 |
+
technical issues to be addressed. For example, we may need another penalty term to handle
|
822 |
+
the issues caused by the large r in the model. This direction of research will be investigated
|
823 |
+
in a separate paper.
|
824 |
+
References
|
825 |
+
Bai, Z., Miao, B., and Pan, G. (2007), “On asymptotics of eigenvectors of large sample
|
826 |
+
covariance matrix,” The Annals of Probability, 35, 1532–1572.
|
827 |
+
Bai, Z.-D. and Yin, Y.-Q. (2008), “Limit of the smallest eigenvalue of a large dimensional
|
828 |
+
sample covariance matrix,” in Advances In Statistics, World Scientific, pp. 108–127.
|
829 |
+
Bates, S., Hastie, T., and Tibshirani, R. (2021), “Cross-validation: what does it estimate and
|
830 |
+
how well does it do it?” arXiv preprint arXiv:2104.00673.
|
831 |
+
Belkin, M., Hsu, D., Ma, S., and Mandal, S. (2019), “Reconciling modern machine-learning
|
832 |
+
practice and the classical bias–variance trade-off,” Proceedings of the National Academy
|
833 |
+
of Sciences, 116, 15849–15854.
|
834 |
+
Chun, H. and Kele¸s, S. (2010), “Sparse partial least squares regression for simultaneous
|
835 |
+
dimension reduction and variable selection,” Journal of the Royal Statistical Society: Series
|
836 |
+
B (Statistical Methodology), 72, 3–25.
|
837 |
+
Cook, R. (2018), An Introduction to Envelopes: Dimension Reduction for Efficient Estima-
|
838 |
+
tion in Multivariate Statistics, Wiley Series in Probability and Statistics, Wiley.
|
839 |
+
Cook, R. D. and Forzani, L. (2019), “Partial least squares prediction in high-dimensional
|
840 |
+
regression,” The Annals of Statistics, 47, 884–908.
|
841 |
+
Cook, R. D., Forzani, L., and Su, Z. (2016), “A note on fast envelope estimation,” Journal
|
842 |
+
of Multivariate Analysis, 150, 42–54.
|
843 |
+
19
|
844 |
+
|
845 |
+
Cook, R. D., Forzani, L., and Zhang, X. (2015), “Envelopes and reduced-rank regression,”
|
846 |
+
Biometrika, 102, 439–456.
|
847 |
+
Cook, R. D., Helland, I., and Su, Z. (2013), “Envelopes and partial least squares regression,”
|
848 |
+
Journal of the Royal Statistical Society: Series B (Statistical Methodology), 75, 851–877.
|
849 |
+
Cook, R. D., Li, B., and Chiaromonte, F. (2007), “Dimension reduction in regression without
|
850 |
+
matrix inversion,” Biometrika, 94, 569–584.
|
851 |
+
— (2010), “Envelope models for parsimonious and efficient multivariate linear regression,”
|
852 |
+
Statistica Sinica, 927–960.
|
853 |
+
Cook, R. D. and Su, Z. (2013), “Scaled envelopes: scale-invariant and efficient estimation in
|
854 |
+
multivariate linear regression,” Biometrika, 100, 939–954.
|
855 |
+
— (2016), “Scaled predictor envelopes and partial least-squares regression,” Technometrics,
|
856 |
+
58, 155–165.
|
857 |
+
Cook, R. D. and Zhang, X. (2015a), “Foundations for envelope models and methods,” Journal
|
858 |
+
of the American Statistical Association, 110, 599–611.
|
859 |
+
— (2015b), “Simultaneous envelopes for multivariate linear regression,” Technometrics, 57,
|
860 |
+
11–25.
|
861 |
+
De Jong, S. (1993), “SIMPLS: an alternative approach to partial least squares regression,”
|
862 |
+
Chemometrics and intelligent laboratory systems, 18, 251–263.
|
863 |
+
Ding, S. and Cook, R. D. (2018), “Matrix variate regressions and envelope models,” Journal
|
864 |
+
of the Royal Statistical Society: Series B (Statistical Methodology), 80, 387–408.
|
865 |
+
Ding, S., Su, Z., Zhu, G., and Wang, L. (2020), “Envelope quantile regression,” Statistica
|
866 |
+
Sinica.
|
867 |
+
Dobriban, E. and Wager, S. (2018), “High-dimensional asymptotics of prediction: Ridge
|
868 |
+
regression and classification,” The Annals of Statistics, 46, 247–279.
|
869 |
+
20
|
870 |
+
|
871 |
+
El Karoui, N. (2018), “On the impact of predictor geometry on the performance on high-
|
872 |
+
dimensional ridge-regularized generalized robust regression estimators,” Probability Theory
|
873 |
+
and Related Fields, 170, 95–175.
|
874 |
+
Gog´e, F., Thuri`es, L., Fouad, Y., Damay, N., Davrieux, F., Moussard, G., Le Roux, C.,
|
875 |
+
Trupin-Maudemain, S., Val´e, M., and Morvan, T. (2021), “Dataset of chemical and near-
|
876 |
+
infrared spectroscopy measurements of fresh and dried poultry and cattle manure,” Data
|
877 |
+
in Brief, 34, 106647.
|
878 |
+
Hastie, T., Montanari, A., Rosset, S., and Tibshirani, R. J. (2022), “Surprises in high-
|
879 |
+
dimensional ridgeless least squares interpolation,” The Annals of Statistics, 50, 949–986.
|
880 |
+
Johnson, R. A., Wichern, D. W., et al. (2002), Applied multivariate statistical analysis, vol. 5,
|
881 |
+
Prentice hall Upper Saddle River, NJ.
|
882 |
+
Khare, K., Pal, S., and Su, Z. (2017), “A bayesian approach for envelope models,” The
|
883 |
+
Annals of Statistics, 196–222.
|
884 |
+
Li, L. and Zhang, X. (2017), “Parsimonious tensor response regression,” Journal of the
|
885 |
+
American Statistical Association, 112, 1131–1146.
|
886 |
+
Liang, T. and Rakhlin, A. (2020), “Just Interpolate: Kernel “Ridgeless” Regression can
|
887 |
+
generalize,” Annals of Statistics, 48, 1329–1347.
|
888 |
+
Rekabdarkolaee, H. M., Wang, Q., Naji, Z., and Fuente, M. (2020), “NEW PARSIMONIOUS
|
889 |
+
MULTIVARIATE SPATIAL MODEL,” Statistica Sinica, 30, 1583–1604.
|
890 |
+
Rimal, R., Almøy, T., and Sæbø, S. (2019), “Comparison of multi-response prediction meth-
|
891 |
+
ods,” Chemometrics and Intelligent Laboratory Systems, 190, 10–21.
|
892 |
+
Su, Z. and Cook, R. D. (2011), “Partial envelopes for efficient estimation in multivariate
|
893 |
+
linear regression,” Biometrika, 98, 133–146.
|
894 |
+
— (2013), “Estimation of multivariate means with heteroscedastic errors using envelope
|
895 |
+
models,” Statistica Sinica, 213–230.
|
896 |
+
21
|
897 |
+
|
898 |
+
Su, Z., Zhu, G., Chen, X., and Yang, Y. (2016), “Sparse envelope model: efficient estimation
|
899 |
+
and response variable selection in multivariate linear regression,” Biometrika, 103, 579–
|
900 |
+
593.
|
901 |
+
Wang, B. and Zou, H. (2021), “Honest leave-one-out cross-validation for estimating post-
|
902 |
+
tuning generalization error,” Stat, 10, e413.
|
903 |
+
Zhang, X. and Li, L. (2017), “Tensor envelope partial least-squares regression,” Technomet-
|
904 |
+
rics, 59, 426–436.
|
905 |
+
Zhao, Y., Van Keilegom, I., and Ding, S. (2022), “Envelopes for censored quantile regression,”
|
906 |
+
Scandinavian Journal of Statistics.
|
907 |
+
Zhu, G. and Su, Z. (2020), “Envelope-based sparse partial least squares,” The Annals of
|
908 |
+
Statistics, 48, 161–182.
|
909 |
+
A
|
910 |
+
Proofs of Theorems
|
911 |
+
A.1
|
912 |
+
Proof of Theorem 1
|
913 |
+
Note that
|
914 |
+
R( ˆβΓ(λ)|X) = λ2tr(β(SX + λI)−1Σx(SX + λI)−1βT) + tr(Ω)
|
915 |
+
n
|
916 |
+
tr(ΣxSX(SX + λI)−2).
|
917 |
+
Therefore, we have
|
918 |
+
∂
|
919 |
+
∂λR( ˆβΓ(λ)|X)
|
920 |
+
= 2λ · tr(βSX(SX + λI)−2Σx(SX + λI)−1βT) − 2tr(Ω)
|
921 |
+
n
|
922 |
+
tr(ΣxSX(SX + λI)−3)
|
923 |
+
≤
|
924 |
+
p
|
925 |
+
�
|
926 |
+
i=1
|
927 |
+
�
|
928 |
+
2λ · σi(βTβ) − 2tr(Ω)
|
929 |
+
n
|
930 |
+
�
|
931 |
+
σi(ΣxSX(SX + λI)−3),
|
932 |
+
where σi(M) denotes the i-th largest eigenvalue of M. The inequality above comes from Von
|
933 |
+
Neumann’s trace inequality.
|
934 |
+
22
|
935 |
+
|
936 |
+
Since
|
937 |
+
∂
|
938 |
+
∂λR( ˆβΓ(λ)|X) < 0 if λ < tr(Ω)/(nσ1
|
939 |
+
�
|
940 |
+
βTβ)
|
941 |
+
�
|
942 |
+
, R( ˆβΓ(λ)|X) is a monotonically
|
943 |
+
decreasing function if 0 ≤ λ ≤ tr(Ω)/(nσ1
|
944 |
+
�
|
945 |
+
βTβ)
|
946 |
+
�
|
947 |
+
. Therefore, we have
|
948 |
+
R( ˆβΓ(λ)|X) < tr(Ω)
|
949 |
+
n
|
950 |
+
tr(ΣxS+
|
951 |
+
X),
|
952 |
+
when 0 < λ < tr(Ω)/(nσ1
|
953 |
+
�
|
954 |
+
βTβ)
|
955 |
+
�
|
956 |
+
. Since
|
957 |
+
tr(Ω)
|
958 |
+
n
|
959 |
+
tr(ΣxS+
|
960 |
+
X) ≤ R( ˆβΓ|X),
|
961 |
+
we prove the theorem.
|
962 |
+
A.2
|
963 |
+
Proof of Theorem 2
|
964 |
+
Our analyses of limiting prediction risk follow that of Hastie et al. (2022).
|
965 |
+
As Σx = I,
|
966 |
+
R( ˆβΓ|X) = vecT(β)[ΠX ⊗ Ir]vec(β) + tr(Ω)
|
967 |
+
n
|
968 |
+
tr(S+
|
969 |
+
X),
|
970 |
+
R( ˆβΓ(λ)|X) = λ2tr(β(SX + λI)−2βT) + tr(Ω)
|
971 |
+
n
|
972 |
+
tr(SX(SX + λI)−2),
|
973 |
+
where ΠX = Ip − S+
|
974 |
+
XSX.
|
975 |
+
A.2.1
|
976 |
+
Proof for envelope estimator when γ < 1
|
977 |
+
Let us consider the case where p/n → γ ∈ (0, 1). From Theorem 1 of Bai and Yin (2008),
|
978 |
+
σmin(SX) ≥ (1 − √γ)2/2 and σmax(SX) ≤ 2(1 + √γ)2 almost surely for all sufficiently large
|
979 |
+
n. Therefore, in this case, SX is invertible and the bias term of R( ˆβΓ|X) is 0, almost surely.
|
980 |
+
The variance term of R( ˆβΓ|X) is
|
981 |
+
tr(Ω)
|
982 |
+
n
|
983 |
+
tr(S+
|
984 |
+
X) = p · tr(Ω)
|
985 |
+
n
|
986 |
+
� 1
|
987 |
+
sdFSX(s),
|
988 |
+
where FSX(s) is the spectral measure of SX. By the Marchenko-Pastur theorem, which says
|
989 |
+
that FSX → Fγ, and the Portmanteau theorem,
|
990 |
+
� 2(1+√γ)2/
|
991 |
+
(1−√γ)2/2
|
992 |
+
1
|
993 |
+
sdFSX(s) →
|
994 |
+
� 2(1+√γ)2/
|
995 |
+
(1−√γ)2/2
|
996 |
+
1
|
997 |
+
sdFγ(s) =
|
998 |
+
� 1
|
999 |
+
sdFγ(s).
|
1000 |
+
23
|
1001 |
+
|
1002 |
+
The equality is because the support of Fγ is [(1 − √γ)2, (1 + √γ)2]. We can also remove the
|
1003 |
+
upper and lower limits of integration on the left-hand side by Theorem 1 of Bai and Yin
|
1004 |
+
(2008). Thus, combining above results, we arrive at
|
1005 |
+
R( ˆβΓ|X) → γ · tr(Ω)
|
1006 |
+
� 1
|
1007 |
+
sdFγ(s).
|
1008 |
+
The Stieltjes transformation of Fγ is given by
|
1009 |
+
m(z) =
|
1010 |
+
�
|
1011 |
+
1
|
1012 |
+
s − zdFγ(s) = (1 − γ − z) −
|
1013 |
+
�
|
1014 |
+
(1 − γ − z)2 − 4γz)
|
1015 |
+
2γz
|
1016 |
+
,
|
1017 |
+
for any real z < 0. By taking the limit z → 0−, the proof is completed.
|
1018 |
+
A.2.2
|
1019 |
+
Proof for envelope estimator when γ > 1
|
1020 |
+
The variance term of R( ˆβΓ|X) is
|
1021 |
+
tr(Ω)
|
1022 |
+
n
|
1023 |
+
tr(S+
|
1024 |
+
X) = tr(Ω)
|
1025 |
+
n
|
1026 |
+
tr((XXT/n)+) = tr(Ω)
|
1027 |
+
p
|
1028 |
+
tr((XXT/p)+).
|
1029 |
+
Considering n/p → τ = 1/γ < 1, by the same arguments from the proof above, we conclude
|
1030 |
+
that
|
1031 |
+
tr(Ω)
|
1032 |
+
n
|
1033 |
+
tr(S+
|
1034 |
+
X) → tr(Ω)
|
1035 |
+
1
|
1036 |
+
γ − 1.
|
1037 |
+
Let β = [bT
|
1038 |
+
1 . . . bT
|
1039 |
+
r ]. The bias term is
|
1040 |
+
vecT(β)[ΠX ⊗ Ir]vec(β) =
|
1041 |
+
r
|
1042 |
+
�
|
1043 |
+
i=1
|
1044 |
+
bT
|
1045 |
+
i ΠXbi =
|
1046 |
+
r
|
1047 |
+
�
|
1048 |
+
i=1
|
1049 |
+
lim
|
1050 |
+
z→0+ zbT
|
1051 |
+
i (SX + zI)−1bi.
|
1052 |
+
From Theorem 1 of Bai et al. (2007), we have that
|
1053 |
+
zbT
|
1054 |
+
i (SX + zI)−1bi → z
|
1055 |
+
�
|
1056 |
+
1
|
1057 |
+
s + zFγ(s) = z∥bi∥2m(−z) a.s.,
|
1058 |
+
for any i = 1, . . . , r. We further have that
|
1059 |
+
r
|
1060 |
+
�
|
1061 |
+
i=1
|
1062 |
+
zbT
|
1063 |
+
i (SX + zI)−1bi → zc2m(−z) a.s.
|
1064 |
+
By the Arzela-Ascoli theorem and the Moore-Osgood theorem, we exchange limits and
|
1065 |
+
arrive at
|
1066 |
+
lim
|
1067 |
+
z→0+
|
1068 |
+
r
|
1069 |
+
�
|
1070 |
+
i=1
|
1071 |
+
zbT
|
1072 |
+
i (SX + zI)−1bi → c2 lim
|
1073 |
+
z→0+ zm(−z) = c2(1 − 1/γ) a.s.
|
1074 |
+
Combining the variance and the bias terms, we complete the proof.
|
1075 |
+
24
|
1076 |
+
|
1077 |
+
A.2.3
|
1078 |
+
Proof for enhanced envelope estimator
|
1079 |
+
We use the similar techniques from the envelope estimator for both variance and bias terms.
|
1080 |
+
The variance term of R( ˆβΓ(λ)) becomes
|
1081 |
+
tr(Ω)
|
1082 |
+
n
|
1083 |
+
tr(SX(SX + λI)−2) → γtr(Ω)
|
1084 |
+
�
|
1085 |
+
s
|
1086 |
+
(s + λ)2Fγ(s).
|
1087 |
+
Let gn,λ(η) = λ · tr(β(SX + λ(1 + η)I)−1βT), η ∈ [−1/2, 1/2]. The bias term of R( ˆβΓ(λ))
|
1088 |
+
is
|
1089 |
+
λ2tr(β(SX + λI)−2βT) = − ∂
|
1090 |
+
∂ηgn(λ, 0).
|
1091 |
+
Because
|
1092 |
+
gn,λ(η) → λc2m(−λ(1 + η)) = λc2
|
1093 |
+
�
|
1094 |
+
1
|
1095 |
+
s + λ(1 + η)dFγ(s),
|
1096 |
+
and derivative and limit are exchangeable, we have that
|
1097 |
+
λ2tr(β(SX + λI)−2βT) → λ2c2
|
1098 |
+
�
|
1099 |
+
1
|
1100 |
+
(s + λ)2dFγ(s).
|
1101 |
+
We can conclude that,
|
1102 |
+
R( ˆβΓ(λ)) →
|
1103 |
+
� λ2c2 + s · γtr(Ω)
|
1104 |
+
(s + λ)2
|
1105 |
+
Fγ(s).
|
1106 |
+
The right-hand side is minimized at λ∗ = γtr(Ω)/c2. In such case, the right-hand side
|
1107 |
+
becomes γtr(Ω) · m(−λ∗).
|
1108 |
+
25
|
1109 |
+
|
3dE1T4oBgHgl3EQfAQLV/content/2301.02838v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e0837ed0c3df524e38a21a6954f002c1272b36ef37b480000a4c7a0ef52176cb
|
3 |
+
size 231226
|
3dE1T4oBgHgl3EQfAQLV/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:798d6c2a760bf034eee02c0dd046c4d72187e3f9cc4ccd0c8c294484c79645d3
|
3 |
+
size 6225965
|
3dE1T4oBgHgl3EQfAQLV/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fb50a5434f2e85fd7042880ed69c6fa83d21dd9a79ceb50059878e231a8a5650
|
3 |
+
size 182460
|
3dE4T4oBgHgl3EQfbAyT/content/2301.05069v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fd9e808758fb729a8ab4490b0704b38c81a0bfb39c68b5139c49de5e1462d328
|
3 |
+
size 126906
|
3dE4T4oBgHgl3EQfbAyT/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:08bdf721dd42755b1bd53d508f34b35a151b92e588f9d7b03d52262f142ceab0
|
3 |
+
size 72302
|
4NE1T4oBgHgl3EQfSgOT/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:45e44ee5aaa29576abe2a1cfcccea1737d79adccedcc04a075d6413b337c9e1d
|
3 |
+
size 2949165
|
5dE1T4oBgHgl3EQfTAM3/content/tmp_files/2301.03072v1.pdf.txt
ADDED
@@ -0,0 +1,1624 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Bipartite unique-neighbour expanders via Ramanujan graphs
|
2 |
+
Ron Asherov and Irit Dinur∗
|
3 |
+
Weizmann Institute, Rehovot, Israel
|
4 |
+
Abstract
|
5 |
+
We construct an infinite family of bounded-degree bipartite unique-neighbour expander graphs with
|
6 |
+
arbitrarily unbalanced sides. Although weaker than the lossless expanders constructed by Capalbo et
|
7 |
+
al., our construction is simpler and may be closer to be implementable in practice due to the smaller
|
8 |
+
constants. We construct these graphs by composing bipartite Ramanujan graphs with a fixed-size gadget
|
9 |
+
in a way that generalizes the construction of unique neighbour expanders by Alon and Capalbo. For
|
10 |
+
the analysis of our construction we prove a strong upper bound on average degrees in small induced
|
11 |
+
subgraphs of bipartite Ramanujan graphs. Our bound generalizes Kahale’s average degree bound to
|
12 |
+
bipartite Ramanujan graphs, and may be of independent interest. Surprisingly, our bound strongly relies
|
13 |
+
on the exact Ramanujan-ness of the graph and is not known to hold for nearly-Ramanujan graphs.
|
14 |
+
1
|
15 |
+
Introduction
|
16 |
+
An infinite family Gn = (Ln ⊔ Rn, En) of (c, d)-biregular graphs with |Ln| + |Rn| → ∞ is called a unique
|
17 |
+
neighbour expander family if there exists δ > 0 such that for every n and every set of left side vertices S ⊆ Ln
|
18 |
+
of size |S| ≤ δ|Ln| there exists a unique neighbour of S in Gn, namely a vertex in Rn that is connected to
|
19 |
+
exactly one vertex in S. We only require that sets of left vertices have unique neighbours, and arbitrarily
|
20 |
+
small right side sets may have no unique neighbour.
|
21 |
+
Alon and Capalbo [AC02] construct several explicit families of unique neighbour expanders, via an elegant
|
22 |
+
composition of a Ramanujan graph and a gadget. They construct three families of general (non-bipartite)
|
23 |
+
graphs in which all small sets have unique neighbours, and one family of slightly unbalanced bipartite graphs
|
24 |
+
where small sets on the left have unique neighbors on the right. In their construction the left side is 22/21
|
25 |
+
times bigger than the right side. The more imbalanced the graph, the harder it is for small left hand side
|
26 |
+
sets to expand into the right hand side. Capalbo et. al. [Cap+02] construct arbitrarily unbalanced bipar-
|
27 |
+
tite graphs that are lossless expanders, a notion strictly stronger than unique neighbour expansion. Their
|
28 |
+
construction is based on a sequence of somewhat involved composition steps using randomness conductors.
|
29 |
+
Our main theorem is an efficient construction of an infinite family of bipartite unique neighbour expanders
|
30 |
+
for any constant imbalance α, and any sufficiently large left-regularity degrees of a specific form:
|
31 |
+
Theorem 1. There is a function ˆq : N × R → N such that for every integer c0 > 5 and real number α > 1,
|
32 |
+
if q > ˆq(c0, α) is a prime power and αc0(q + 1) is an integer, then there is a polynomial-time construction of
|
33 |
+
an infinite family of (c0(q + 1), αc0(q + 1))-biregular unique neighbour expanders.
|
34 |
+
The theorem is proven in Section 6.2, and provides a way to compute ˆq(c0, α). Here are some computed
|
35 |
+
values of ˆq(c0, α) for several values of c0, α.
|
36 |
+
∗Irit Dinur acknowledges support by ERC grant 772839 and ISF grant 2073/21.
|
37 |
+
1
|
38 |
+
arXiv:2301.03072v1 [math.CO] 8 Jan 2023
|
39 |
+
|
40 |
+
c0
|
41 |
+
α
|
42 |
+
ˆq(c0, α)
|
43 |
+
10
|
44 |
+
2
|
45 |
+
18907
|
46 |
+
35
|
47 |
+
2
|
48 |
+
1492
|
49 |
+
100
|
50 |
+
100
|
51 |
+
136051
|
52 |
+
100
|
53 |
+
1.01
|
54 |
+
1135
|
55 |
+
Notice that ˆq(co, α) increases with α, reflecting the fact that constructions with larger α (namely, more
|
56 |
+
imbalanced sides) are harder to come by, and require larger degrees.
|
57 |
+
The construction uses an infinite family of bipartite Ramanujan graphs, namely graphs whose non-
|
58 |
+
trivial spectrum is contained in the spectrum of the (c, d)-biregular tree (see Preliminaries for details). We
|
59 |
+
construct the unique neighbour expander family by taking a family of bipartite Ramanujan graphs and
|
60 |
+
combining them with a fixed size graph (“gadget”), with a good unique neighbour property (small sets have
|
61 |
+
unique neighbours), whose existence is shown via the probabilistic method (Lemma 11). The combination
|
62 |
+
is done as follows. We first place a copy of the gadget for every right side vertex of the Ramanujan graph.
|
63 |
+
The vertex is replaced by the right side of the gadget, and its neighbours are identified with the left side of
|
64 |
+
the gadget. The gadget is used to route the neighbours of each left side vertex in the Ramanujan graph to
|
65 |
+
its neighbours in the product graph.
|
66 |
+
Expansion in the product graph comes from unique neighbour expansion of the gadget together with
|
67 |
+
low degree vertices in the Ramanujan graph. Sufficiently low degree vertices are guaranteed to exist thanks
|
68 |
+
to the following (new) bound on the average degree of induced subgraphs of bipartite Ramanujan graphs,
|
69 |
+
which may be of independent interest.
|
70 |
+
Theorem 2. Let G = (L ⊔ R, E) be a (c, d)-biregular Ramanujan graph, and let ε > 0. Then there exists
|
71 |
+
δ > 0, that depends only on ε, c, d, such that for every S ⊂ L of size |S| ≤ δ|L|, the set N(S) ⊆ R of the
|
72 |
+
neighbours of S satisfies
|
73 |
+
c|S|
|
74 |
+
|N(S)| ≤ 1 + (1 + ε)
|
75 |
+
�
|
76 |
+
d − 1
|
77 |
+
c − 1 .
|
78 |
+
The theorem shows that every small set on the left side admits neighbours on the right side with low degree
|
79 |
+
in the induced subgraph. The proof involves recursive analysis of non-backtracking paths. Interestingly, the
|
80 |
+
recursion has a nice solution only when the graph is Ramanujan. It is unclear whether this method can be
|
81 |
+
extended to “nearly-Ramanujan” graphs.
|
82 |
+
Combining the average degree upper bound with the gadget, the low-degree right-side vertices in the
|
83 |
+
Ramanujan graph imply a small set of left-side vertices in the gadget; this set will have a unique neighbour
|
84 |
+
in the gadget, which gives (via Lemma 12) a unique neighbour in the constructed graph.
|
85 |
+
Even though Ramanujan graphs are the best spectral expanders one can hope for, an efficient construc-
|
86 |
+
tion of Ramanujan graphs (be them bipartite or not) does not immediately imply that we can construct
|
87 |
+
unique neighbour expanders. In the d-regular case, Kahale shows ([Kah95, Thm 5.2]) that there are nearly-
|
88 |
+
Ramanujan graphs with expansion at most d/2, which is not enough for unique neighbour expansion. In fact,
|
89 |
+
recently Kamber and Kaufman [KK22] proved that some Ramanujan graphs strongly fail to have unique
|
90 |
+
neighbour expansion, by giving explicit constructions of arbitrarily small sets that do not admit a unique
|
91 |
+
neighbour.
|
92 |
+
As mentioned, the graph product we define requires a fixed size gadget, whose proof of existence is not
|
93 |
+
constructive. In principle, such a gadget could be found by exhaustive search since we are working in a
|
94 |
+
constant size search space. The gadget’s size in our construction is at least cubic in q, so exhaustive search
|
95 |
+
is impractical for even small values of q. Unfortunately we know of no efficient construction of a gadget with
|
96 |
+
the required parameters. It is possible that the graph sampling method present in [AK19] can be used to
|
97 |
+
construct fixed size gadgets more efficiently.
|
98 |
+
The rest of this work is organized as follows. In Section 2 we survey some of the uses of unique neighbour
|
99 |
+
expanders, and mention known constructions of such graphs. Section 3 provides basic definitions and results.
|
100 |
+
Our main technical tool, that asserts the low induced degree in bipartite Ramanujan graph, is stated and
|
101 |
+
proven in Section 4. We prove the existence of a fixed-size gadget with good unique neighbour expansion
|
102 |
+
2
|
103 |
+
|
104 |
+
properties in Section 5. In Section 6 we define the way we use the Ramanujan graphs and the gadget to
|
105 |
+
construct bipartite unique neighbour expanders, and by that prove Theorem 1.
|
106 |
+
2
|
107 |
+
Related work
|
108 |
+
One of the prominent uses of bipartite expanders in general and bipartite unique neighbour expanders in
|
109 |
+
particular, and the motivation for this work, is the construction of error correcting codes. The works of
|
110 |
+
Tanner [Tan81] and later Sipser and Spielman [SS96] construct linear error correcting codes C(B, C0) from
|
111 |
+
a bipartite graph B and a smaller linear code C0. It is shown that under some assumptions on the code C0
|
112 |
+
and the expansion properties of the bipartite graph B, the resulting code has good distance. This gives a
|
113 |
+
way to take a family of graphs and transform it into a family of codes. Our work describes a construction
|
114 |
+
that, in a sense, goes the other way around: given two bipartite graphs, B and B0, we view B0 as a parity
|
115 |
+
check graph1 of the base code C0, and B plays the role of the underlying graph of a Tanner code C(B, C0).
|
116 |
+
Our output graph is just the parity check graph of C(B, C0). We give full details of this graph product in
|
117 |
+
Section 6.1.
|
118 |
+
In [DSW06; BV09] it is shown that codes constructed on top of unique neighbour expanders are weakly
|
119 |
+
smooth and can be used to construct robustly testable codes. But the uses of unique neighbour expanders are
|
120 |
+
not limited to error correcting codes: for example, such graphs may be used in the context of non-blocking
|
121 |
+
networks, where it is required to connect several input-output terminals via paths in a non-intersecting
|
122 |
+
fashion. Arora et al. [ALM96] use graphs with expansion beyond the d/2 barrier to establish the existence
|
123 |
+
of unique neighbours in the graph, which are useful in finding input-output paths in the online settings.
|
124 |
+
Roughly speaking, when routing a set of input-output pairs, the algorithm can use all unique neighbours
|
125 |
+
freely since they are guaranteed not to interfere with any other paths.
|
126 |
+
Pippenger [Pip93] uses explicit
|
127 |
+
constructions of spectral expanders in order to solve a similar problem, in the case where the route planning
|
128 |
+
is computed locally. There the spectral expansion of a graph is proven to imply a combinatorial expansion,
|
129 |
+
in a similar way to our Theorem 2.
|
130 |
+
Another use for unique neigbhour expanders is for load-balancing problems, such as the token distribution
|
131 |
+
problem described in [PU89], and the similar pebble distribution problem, briefly discussed in [AC02]. In
|
132 |
+
the latter, pebbles are placed arbitrarily on vertices of a graph, and need to be distributed via edges of the
|
133 |
+
graph such that no vertex has more than one pebble. Given that the total number of pebbles is small and
|
134 |
+
that the graph has the unique neighbour property, we have an efficient parallel algorithm for redistributing
|
135 |
+
the pebbles.
|
136 |
+
Alon and Capalbo [AC02] construct several families of unique neighbour expanders, one of them is a
|
137 |
+
family of bipartite graphs whose left side is 22/21 times bigger than the right side. Similar to the construction
|
138 |
+
presented at this work, each graph in the constructed family is a combination of a Ramanujan graph and a
|
139 |
+
fixed graph. These graphs are not (bi-)regular but their degrees are bounded by a constant. Becker [Bec16]
|
140 |
+
uses a different family of 8-regular Ramanujan graphs in order to construct a family of (non-bipartite) unique
|
141 |
+
neighbour expanders, with the additional property that each graph in the family is a Cayley graph.
|
142 |
+
A different approach to constructing bipartite graphs uses randomness conductors. Randomness conduc-
|
143 |
+
tors are functions that receive a bitstring with some entropy (according to some measure of entropy), and a
|
144 |
+
uniformly random bitstring, and output a bitstring, with certain guarantees on its entropy. Some conduc-
|
145 |
+
tors can be constructed explicitly via a spectral method, and Capalbo et al. [Cap+02] combine them in a
|
146 |
+
zig-zag-like fashion in order to construct an infinite family of bipartite lossless expanders, namely bipartite
|
147 |
+
graphs with fixed left-regularity c where small enough sets contained in the left side have at least c(1 − ε)
|
148 |
+
neighbours on the right side. These graphs are trivially unique neighbour expanders, since a simple counting
|
149 |
+
argument shows that if a set expands by a factor of more than c/2, then it has unique neighbours.
|
150 |
+
1This is a bipartite graph whose incidence structure is given by the parity check matrix.
|
151 |
+
3
|
152 |
+
|
153 |
+
3
|
154 |
+
Preliminaries
|
155 |
+
3.1
|
156 |
+
Expander graphs
|
157 |
+
In this work we deal with undirected graphs, that may contain multiple edges between two vertices, but do
|
158 |
+
not contain self-loops. For a graph G and a subset of its vertices S we denote by NG(S) the neighbourhood
|
159 |
+
of S, namely all vertices adjacent to some vertex in S. When the graph in discussion is obvious, we may
|
160 |
+
omit it and write N(S). We say that v is a unique neighbour of S if there is a unique u ∈ S that is adjacent
|
161 |
+
to v.
|
162 |
+
Let (Gn) be a series of graphs with the number of vertices growing to infinity. There are several well
|
163 |
+
studied notions of expansion in graph families; we note some of them.
|
164 |
+
1. Vertex expansion. (Gn) is a (δ, α)-vertex expander if for every n and any subset S ⊆ VGn, if |S| ≤ δ|VGN |
|
165 |
+
we have that |NGN (S)| ≥ α|S|.
|
166 |
+
2. Edge expansion. (Gn) is a (δ, α)-edge expander if for every n and any subset S ⊆ VGn, if |S| ≤ δ|VGN |
|
167 |
+
we have that at least an α-fraction of the edges with one endpoint in S have their other endpoint
|
168 |
+
outside of S.
|
169 |
+
3. Spectral expansion. Assume that (Gn) are all d-regular, and let An be the adjacency operator associated
|
170 |
+
with Gn, so An is indexed by vertices of Gn and (An)uv counts how many edges there are between
|
171 |
+
u and v in Gn. Let λ1 ≥ . . . ≥ λVn be its spectrum. It can be seen that λ1 = d. Then (Gn) is a
|
172 |
+
λ-spectral expander if for all n and i ̸= 1 we have |λi| ≤ λ.
|
173 |
+
4. Unique neighbour expansion. (Gn) is a δ-unique neighbour expander if for every n, any subset S ⊆ VGn
|
174 |
+
of size at most δ|VGN | has a unique neighbour.
|
175 |
+
These definitions apply to bipartite graphs Gn = (Ln ⊔ Rn, En) as well, with the exception that we usually
|
176 |
+
consider sets contained in the left side only, and require that Ln/Rn is a constant, normally greater than
|
177 |
+
1. In this case we note that edge expansion is meaningless (since all edges leaving the left side enter the
|
178 |
+
right side), and if a bipartite graph is (c, d)-biregular, namely if all left-side vertices have degree c and all
|
179 |
+
right-side vertices have degree d, then the largest eigenvalue of the associated adjacency operator is
|
180 |
+
√
|
181 |
+
cd.
|
182 |
+
It can be seen that for d-regular graphs, the best spectral expansion we can hope for is α = 2
|
183 |
+
√
|
184 |
+
d − 1.
|
185 |
+
These graphs are known as Ramanujan graphs.
|
186 |
+
3.2
|
187 |
+
Bipartite Ramanujan graphs
|
188 |
+
Ramanujan graphs have the best spectral gap [Nil91], and their non-trivial eigenvalues are contained in the
|
189 |
+
spectrum of the infinite d-regular tree Td. Similarly, in the bipartite case, Biregular Ramanujan graphs are
|
190 |
+
defined via their relation to the infinite biregular trees: the infinite (c, d)-biregular tree Tc,d, for d > c, has
|
191 |
+
the spectrum
|
192 |
+
λ ∈ spec(Tc,d) ⇔ |λ| ∈ {0} ∪
|
193 |
+
�√
|
194 |
+
d − 1 −
|
195 |
+
√
|
196 |
+
c − 1,
|
197 |
+
√
|
198 |
+
d − 1 +
|
199 |
+
√
|
200 |
+
c − 1
|
201 |
+
�
|
202 |
+
(see, e.g., [GM88], [LS96].) We therefore say that a finite (c, d)-biregular graph is bipartite Ramanujan if its
|
203 |
+
nontrivial eigenvalues lie in this set. That means that every eigenvalue λ of a bipartite Ramanujan graph
|
204 |
+
belongs to one of these classes:
|
205 |
+
1. Trivial: λ = ±
|
206 |
+
√
|
207 |
+
cd, with eigenvectors fixed on either sides, or λ = 0;
|
208 |
+
2. λ ∈ [
|
209 |
+
√
|
210 |
+
d − 1 − √c − 1,
|
211 |
+
√
|
212 |
+
d − 1 + √c − 1] are the nontrivial positive eigenvalues;
|
213 |
+
3. λ ∈ [−√c − 1 −
|
214 |
+
√
|
215 |
+
d − 1, √c − 1 −
|
216 |
+
√
|
217 |
+
d − 1] are the nontrivial negative eigenvalues. Note that since the
|
218 |
+
graph is bipartite, λ is an eigenvalue if and only if −λ is an eigenvalue.
|
219 |
+
4
|
220 |
+
|
221 |
+
By an extension of the Alon-Boppana bound, given in [FL96], this is the best spectral gap we can hope for,
|
222 |
+
at least as far as upper bounds for |λ| are concerned. We note that unlike the d-regular case, we require a
|
223 |
+
lower bound to |λ| too, which is essential for our proof.
|
224 |
+
While there is a vast literature on the construction of d-regular Ramanujan graph (most prominently
|
225 |
+
[LPS88] and [Mar88]), less is known about bipartite Ramanujan graphs. In 2014 Marcus et al. [MSS13]
|
226 |
+
proved the existence of biregular graphs with one-sided spectral graphs that resemble the Ramanujan bounds:
|
227 |
+
these graphs satisfy the one-sided inequality only, namely |λ| ≤
|
228 |
+
√
|
229 |
+
d − 1 + √c − 1 for every nontrivial eigen-
|
230 |
+
value λ. Gribinski et al. [GM21] showed a polynomial-time construction of such graphs, for every degrees
|
231 |
+
(d, kd) for any integers d, k. These graphs do not suffice for our analysis, since we make explicit use of the
|
232 |
+
lower bound |λ| ≥
|
233 |
+
√
|
234 |
+
d − 1 − √c − 1 too.
|
235 |
+
In 2021 Brito et al. [BDH22] proved that a random biregular graph is nearly Ramanujan with high
|
236 |
+
probability. Interestingly, and unlike other works in this field, our proof strongly relies on the graph to be
|
237 |
+
exactly Ramanujan, so we cannot use those constructions either.
|
238 |
+
We use an explicit construction of bipartite Ramanujan graphs (with both bounds on non-trivial eigen-
|
239 |
+
values) given by Ballantine et al.:
|
240 |
+
Theorem 3 ([Bal+15]). For every prime power q, there exists an explicit construction of a (q + 1, q3 + 1)-
|
241 |
+
biregular Ramanujan graph.
|
242 |
+
4
|
243 |
+
Vertex expansion in biregular Ramanujan graphs
|
244 |
+
Our main technical tool is the following theorem showing that bipartite Ramanujan graphs exhibit excellent
|
245 |
+
left-to-right expansion. We restate the theorem for convenience.
|
246 |
+
Theorem 2. Let G = (L ⊔ R, E) be a (c, d)-biregular Ramanujan graph, and let ε > 0. Then there exists
|
247 |
+
δ > 0, that depends only on ε, c, d, such that for every S ⊂ L of size |S| ≤ δ|L|, the set N(S) ⊆ R of the
|
248 |
+
neighbours of S satisfies
|
249 |
+
c|S|
|
250 |
+
|N(S)| ≤ 1 + (1 + ε)
|
251 |
+
�
|
252 |
+
d − 1
|
253 |
+
c − 1 .
|
254 |
+
We note that the quantity on the left hand side of the inequality can be interpreted as follows. Look
|
255 |
+
at the bipartite graph induced by taking the vertices S on the left and N(S) on the right. Since every left
|
256 |
+
vertex has c outgoing edges, the total number of edges in the induced subgraph is c|S|. This means that
|
257 |
+
the expression on the left hand side of the inequality is exactly the average degree of the right side of the
|
258 |
+
induced subgraph. Interestingly, the bound in this theorem is strictly stronger than what we would get from
|
259 |
+
just applying the expander mixing lemma which amounts to
|
260 |
+
c|S|
|
261 |
+
|N(S)| ≤ (1 + ε) ·
|
262 |
+
�
|
263 |
+
1 + d − 1
|
264 |
+
c − 1 + 2
|
265 |
+
�
|
266 |
+
d − 1
|
267 |
+
c − 1
|
268 |
+
�
|
269 |
+
.
|
270 |
+
See Claim 4 for details. The fact that we improve upon the expander mixing lemma is perhaps not surprising
|
271 |
+
since our analysis is based on enumerating non-backtracking paths, and not just on magnitude of the second
|
272 |
+
largest eigenvalue. We also use lower bounds on the magnitude of all nontrivial eigenvalues, whereas the
|
273 |
+
expander mixing lemma uses just upper bounds.
|
274 |
+
4.1
|
275 |
+
Comparison to known bounds
|
276 |
+
As noted above, Theorem 2 is an improvement of the bound that the expander mixing lemma gives in similar
|
277 |
+
settings, which only uses the one-sided inequality |λ| ≤
|
278 |
+
√
|
279 |
+
d − 1 + √c − 1. For reference, we state and prove
|
280 |
+
the expander mixing lemma for bipartite Ramanujan graphs.
|
281 |
+
5
|
282 |
+
|
283 |
+
Claim 4 (Expander mixing lemma for bipartite Ramanujan graphs). Let G = (L⊔R, E) be a (c, d)-biregular
|
284 |
+
Ramanujan graph, and let ε > 0. Then there exists δ > 0 such that for every S ⊆ L of size |S| ≤ δ|L|, the
|
285 |
+
neighbourhood of S satisfies
|
286 |
+
c|S|
|
287 |
+
|N(S)| ≤ (1 + ε)
|
288 |
+
�
|
289 |
+
1 + d − 1
|
290 |
+
c − 1 + 2
|
291 |
+
√
|
292 |
+
d − 1
|
293 |
+
√c − 1
|
294 |
+
�
|
295 |
+
.
|
296 |
+
Proof. The expander mixing lemma for biregular graphs says that for every S ⊆ L, T ⊆ R we have
|
297 |
+
����
|
298 |
+
|e(S, T)|
|
299 |
+
|E|
|
300 |
+
− |S|
|
301 |
+
|L| · |T|
|
302 |
+
|R|
|
303 |
+
���� ≤
|
304 |
+
λ
|
305 |
+
√
|
306 |
+
cd
|
307 |
+
�
|
308 |
+
|S|
|
309 |
+
|L| · |T|
|
310 |
+
|R|
|
311 |
+
where λ is the second largest eigenvalue of G (see, e.g., [Hae95]). It is clarified that we consider the spectrum
|
312 |
+
of G as an adjacency operator, so the largest eigenvalue is
|
313 |
+
√
|
314 |
+
cd.
|
315 |
+
Picking T = N(S) means all edges coming out from S are in the cut, namely |e(S, T)| = c|S|. Plugging
|
316 |
+
that in gives
|
317 |
+
����
|
318 |
+
c|S|
|
319 |
+
c|L| − |S|
|
320 |
+
|L| · |N(S)|
|
321 |
+
|R|
|
322 |
+
���� ≤
|
323 |
+
λ
|
324 |
+
√
|
325 |
+
cd
|
326 |
+
�
|
327 |
+
|S|
|
328 |
+
|L| · |N(S)|
|
329 |
+
|R|
|
330 |
+
.
|
331 |
+
Multiplying both sides by |L|
|
332 |
+
|S| gives
|
333 |
+
����1 − |N(S)|
|
334 |
+
|R|
|
335 |
+
���� ≤
|
336 |
+
λ
|
337 |
+
√
|
338 |
+
cd
|
339 |
+
�
|
340 |
+
|S|
|
341 |
+
|L| · |N(S)|
|
342 |
+
|R|
|
343 |
+
· |L|
|
344 |
+
|S| =
|
345 |
+
λ
|
346 |
+
√
|
347 |
+
cd
|
348 |
+
�
|
349 |
+
|N(S)|
|
350 |
+
|R|
|
351 |
+
· |L|
|
352 |
+
|S| =
|
353 |
+
λ
|
354 |
+
√
|
355 |
+
cd
|
356 |
+
�
|
357 |
+
|N(S)|
|
358 |
+
|S|
|
359 |
+
·
|
360 |
+
�
|
361 |
+
d
|
362 |
+
c = λ
|
363 |
+
c
|
364 |
+
�
|
365 |
+
|N(S)|
|
366 |
+
|S|
|
367 |
+
(1)
|
368 |
+
where we also used the fact that |E| = c|L| = d|R|.
|
369 |
+
Let us assume that |S| = α|L|. Then we can upper bound |N(S)| by
|
370 |
+
|N(S)| ≤ c|S| = αc|L| = αd|R|
|
371 |
+
and so we have
|
372 |
+
1 − |N(S)|
|
373 |
+
|R|
|
374 |
+
≥ 1 − dα|R|
|
375 |
+
|R|
|
376 |
+
= 1 − dα.
|
377 |
+
We square (1) and plug in the last inequality to get
|
378 |
+
(1 − dα)2 ≤ λ2
|
379 |
+
c · |N(S)|
|
380 |
+
c|S| .
|
381 |
+
Recall that G is bipartite Ramanujan, so |λ| ≤
|
382 |
+
√
|
383 |
+
d − 1 + √c − 1. Use that and rearrange:
|
384 |
+
c|S|
|
385 |
+
|N(S)| ≤ λ2
|
386 |
+
c (1 − dα)−2
|
387 |
+
≤ d − 1 + c − 1 + 2
|
388 |
+
√
|
389 |
+
d − 1√c − 1
|
390 |
+
c
|
391 |
+
(1 − dα)−2
|
392 |
+
≤ d − 1 + c − 1 + 2
|
393 |
+
√
|
394 |
+
d − 1√c − 1
|
395 |
+
c − 1
|
396 |
+
(1 − dα)−2
|
397 |
+
=
|
398 |
+
�
|
399 |
+
1 + d − 1
|
400 |
+
c − 1 + 2
|
401 |
+
√
|
402 |
+
d − 1
|
403 |
+
√c − 1
|
404 |
+
�
|
405 |
+
(1 − dα)−2.
|
406 |
+
The claim is proven by noting that there is some δ > 0 such that (1 − dα)−2 ≤ 1 + ε for every α < δ, namely
|
407 |
+
whenever |S| ≤ δ|L|.
|
408 |
+
6
|
409 |
+
|
410 |
+
Kahale proved ([Kah95, Thm 4.2]) that in d-regular Ramanujan graphs (not necessarily bipartite), small
|
411 |
+
induced subgraphs have average degree at most 1 +
|
412 |
+
√
|
413 |
+
d − 1. Interestingly, this result can be deduced almost
|
414 |
+
immediately from Theorem 2. This is due to the following lemma, proven in Appendix A, which asserts that
|
415 |
+
the edge-vertex incidence graph (see [SS96]) of a d-regular Ramanujan graph is a (2, d)-biregular Ramanujan
|
416 |
+
graph:
|
417 |
+
Lemma 5. Let G be a d-regular Ramanujan graph, and G′ its edge-vertex incidence graph. Then G′ is a
|
418 |
+
(2, d)-biregular Ramanujan graph.
|
419 |
+
We state and prove Kahale’s bound, but we will not use it in our construction.
|
420 |
+
Corollary 6. Let G = (VG, EG) be a d-regular Ramanujan graph, and let ε > 0. Then there exists δ > 0
|
421 |
+
such that for every induced subgraph S with at most δ|VG| vertices, the average degree of S is at most
|
422 |
+
dS := 2|ES|
|
423 |
+
|VS| ≤ 1 + (1 + ε)
|
424 |
+
√
|
425 |
+
d − 1.
|
426 |
+
Proof. Let G = (VG, EG) be a d-regular Ramanujan graph and ε > 0. We define G′ = (LG′ ⊔ RG′, EG′) as
|
427 |
+
the edge-vertex incidence graph, namely LG′ = EG, RG′ = VG, and for every edge e = {u, v} in G we have
|
428 |
+
the two edges {e, u} and {e, v} in G′. Since the degree of every vertex in G is d, and since every edge has
|
429 |
+
two endpoints, we have that G′ is a (2, d)-biregular graph. Lemma 5 asserts that G′ is Ramanujan in the
|
430 |
+
bipartite sense. By Theorem 2, there exists δ > 0 such that if T ⊆ LG′ is of size at most δ|LG′|, then
|
431 |
+
2|T|
|
432 |
+
|NG′(T)| ≤ 1 + (1 + ε)
|
433 |
+
√
|
434 |
+
d − 1.
|
435 |
+
A subgraph S = (VS, ES) of G satisfies that ES is a subset of left-side vertices in G′, VS is a subset of
|
436 |
+
right-side vertices in G′, and VS = NG′(ES) (because if an edge is in the subgraph then both of its endpoints
|
437 |
+
are in the subgraph, and we assume that the subgraph does not contain an isolated vertex). Therefore, if ES
|
438 |
+
is sufficiently small, namely if |ES| ≤ δ|LG′| = δ|EG|, then by Theorem 2 the average degree of NG′(ES) = VS
|
439 |
+
is bounded by 1 + (1 + ε)
|
440 |
+
√
|
441 |
+
d − 1.
|
442 |
+
We add that if we wish to find a bound the number of vertices, we note that |ES| ≤ d
|
443 |
+
2|VS|. So every
|
444 |
+
induced subgraph with no more than
|
445 |
+
2
|
446 |
+
dδ|EG| = δ|VG| vertices will satisfy the required average degree
|
447 |
+
bound.
|
448 |
+
4.2
|
449 |
+
Proof of Theorem 2
|
450 |
+
Theorem 2 is proven by enumerating non-backtracking paths. A non-backtracking path of length ℓ is a
|
451 |
+
sequence of edges ((s(ei), t(ei)))ℓ
|
452 |
+
i=1 such that for every i, t(ei) = s(ei+1) and s(ei) ̸= t(ei+1).
|
453 |
+
For a bipartite graph G and a subset S of left side vertices we define Mℓ(S) to be the number of all non-
|
454 |
+
backtracking paths whose all left-side vertices are in S, and Mℓ(S, G) to be the number of non-backtracking
|
455 |
+
paths whose first and last left-side vertices are in S. Clearly Mℓ(S) ≤ Mℓ(S, G), as paths of the latter type
|
456 |
+
may leave S ⊔N(S) (before re-entering S at the last step). We use a lower bound on Mℓ(S) due to [Kam19]:
|
457 |
+
Lemma 7. For every undirected bipartite graph G = (LG ⊔ RG, EG) and integer l it holds that
|
458 |
+
Mℓ(LG) ≥ |EG|
|
459 |
+
��
|
460 |
+
( ¯dL − 1)( ¯dR − 1)
|
461 |
+
�ℓ−1
|
462 |
+
where ¯dL, ¯dR are the average degrees of the left and right sides of G respectively.
|
463 |
+
We state and prove an upper bound on Mℓ(S, G):
|
464 |
+
7
|
465 |
+
|
466 |
+
Lemma 8. Let G be a (c, d)-biregular Ramanujan graph with n vertices on the left side, and S a subset of
|
467 |
+
the left side. Then for every integer ℓ:
|
468 |
+
M2ℓ(S, G) ≤ |S|
|
469 |
+
�
|
470 |
+
(2 +
|
471 |
+
√
|
472 |
+
d − 1)ℓ + 2
|
473 |
+
�
|
474 |
+
(c − 1)ℓ/2(d − 1)ℓ/2
|
475 |
+
provided that S is small enough:
|
476 |
+
|S|(c − 1)ℓ/2(d − 1)ℓ/2 ≤ n.
|
477 |
+
(2)
|
478 |
+
Before proving the upper bound, we show how these bounds can be combined to obtain Theorem 2.
|
479 |
+
Proof of Theorem 2. Let ℓ be an integer to be determined later, S ⊆ L a sufficiently small subset (where
|
480 |
+
sufficiently smalls means (2)). Denote by N(S) ⊆ R the neighbours of S. The subgraph induced on S ∪N(S)
|
481 |
+
has c|S| edges, with left degrees all c and average right degree ¯dR =
|
482 |
+
c|S|
|
483 |
+
|N(S)|.
|
484 |
+
Chaining the inequalities in Lemma 7 and Lemma 8, we have
|
485 |
+
c|S|
|
486 |
+
�
|
487 |
+
(c − 1)( ¯dR − 1)
|
488 |
+
� 2ℓ−1
|
489 |
+
2
|
490 |
+
≤ M2ℓ(S) ≤ M2ℓ(S, VG) ≤ |S| ·
|
491 |
+
�
|
492 |
+
(2 +
|
493 |
+
√
|
494 |
+
d − 1)ℓ + 2
|
495 |
+
�
|
496 |
+
· (c − 1)ℓ/2(d − 1)ℓ/2.
|
497 |
+
Simplifying, we get,
|
498 |
+
c(c − 1)ℓ− 1
|
499 |
+
2 ( ¯dR − 1)ℓ− 1
|
500 |
+
2 ≤
|
501 |
+
�
|
502 |
+
(2 +
|
503 |
+
√
|
504 |
+
d − 1)ℓ + 2
|
505 |
+
�
|
506 |
+
· (c − 1)ℓ/2 · (d − 1)ℓ/2
|
507 |
+
( ¯dR − 1)ℓ− 1
|
508 |
+
2 ≤
|
509 |
+
�
|
510 |
+
(2 +
|
511 |
+
√
|
512 |
+
d − 1)ℓ + 2
|
513 |
+
� √c − 1
|
514 |
+
c
|
515 |
+
��
|
516 |
+
d − 1
|
517 |
+
c − 1
|
518 |
+
�ℓ
|
519 |
+
¯dR − 1 ≤
|
520 |
+
�
|
521 |
+
�
|
522 |
+
�
|
523 |
+
�
|
524 |
+
�
|
525 |
+
(2 +
|
526 |
+
√
|
527 |
+
d − 1)ℓ + 2
|
528 |
+
� √c − 1
|
529 |
+
� ¯d − 1
|
530 |
+
c
|
531 |
+
�
|
532 |
+
��
|
533 |
+
�
|
534 |
+
⋆
|
535 |
+
�
|
536 |
+
�
|
537 |
+
�
|
538 |
+
�
|
539 |
+
1/ℓ
|
540 |
+
·
|
541 |
+
�
|
542 |
+
d − 1
|
543 |
+
c − 1
|
544 |
+
Since ¯d ≤ d, we have that ⋆ = O(ℓ), so ⋆1/ℓ = O(1), hence for a fixed ε > 0 there exists a constant ℓ (that
|
545 |
+
depends only on ε, c, d) such that ⋆1/ℓ ≤ 1 + ε; this ℓ determines, via inequality (2), a fixed δ such that
|
546 |
+
whenever |S| ≤ δn we have
|
547 |
+
¯dR ≤ 1 + (1 + ε)
|
548 |
+
�
|
549 |
+
d − 1
|
550 |
+
c − 1 .
|
551 |
+
We proceed to prove Lemma 8.
|
552 |
+
For a bipartite graph G = (LG ⊔ RG, EG) and an integer ℓ, we define ALL
|
553 |
+
ℓ
|
554 |
+
, ALR
|
555 |
+
ℓ
|
556 |
+
, ARL
|
557 |
+
ℓ
|
558 |
+
, ARR
|
559 |
+
ℓ
|
560 |
+
as operators
|
561 |
+
corresponding to non-backtracking paths of length ℓ, i.e.
|
562 |
+
ALL
|
563 |
+
ℓ
|
564 |
+
: L2(LG) → L2(LG)
|
565 |
+
,
|
566 |
+
(ALL
|
567 |
+
ℓ
|
568 |
+
f)(x) =
|
569 |
+
�
|
570 |
+
(e1,...,eℓ),t(eℓ)=x,s(e1),t(eℓ)∈LG
|
571 |
+
f(s(e1))
|
572 |
+
with the summation over all non-backtracking paths of length ℓ, and similarly for the other operators.
|
573 |
+
Let M be the operator corresponding to a single step from the right side G to the left side of G, namely
|
574 |
+
M has |RG| rows and |LG| columns, with Muv counting the number of edges between u ∈ RG and v ∈ LG
|
575 |
+
in G. Then the following recursive formulae hold for every integer ℓ > 1:
|
576 |
+
M ⊤ALL
|
577 |
+
ℓ
|
578 |
+
= ARL
|
579 |
+
ℓ+1 + (d − 1)ARL
|
580 |
+
ℓ−1
|
581 |
+
M ⊤ALR
|
582 |
+
ℓ
|
583 |
+
= ARR
|
584 |
+
ℓ+1 + (d − 1)ARR
|
585 |
+
ℓ−1
|
586 |
+
MARL
|
587 |
+
ℓ
|
588 |
+
= ALL
|
589 |
+
ℓ+1 + (c − 1)ALL
|
590 |
+
ℓ−1
|
591 |
+
MARR
|
592 |
+
ℓ
|
593 |
+
= ALR
|
594 |
+
ℓ+1 + (c − 1)ALR
|
595 |
+
ℓ−1
|
596 |
+
8
|
597 |
+
|
598 |
+
The first formula is explained as follows.
|
599 |
+
Every non-backtracking path from R to L of length ℓ + 1 is
|
600 |
+
composed of a non-backtracking path from L to L of length ℓ plus an extra step (that’s the M ⊤ALL
|
601 |
+
ℓ
|
602 |
+
factor.)
|
603 |
+
The opposite is true, except for paths counted in M ⊤ALL
|
604 |
+
ℓ
|
605 |
+
that do backtrack, namely those made of a non-
|
606 |
+
backtracking path of length ℓ − 1, and walking back and forth along the same edge. There are d − 1 ways to
|
607 |
+
choose that edge (since it cannot be the one that was last in the path of length ℓ − 1, otherwise it wouldn’t
|
608 |
+
be counted in M ⊤ALL
|
609 |
+
ℓ
|
610 |
+
), so we need to subtract (d − 1)ARL
|
611 |
+
ℓ−1. The rest of the equations are explained in an
|
612 |
+
analog way.
|
613 |
+
Due to symmetry we have:
|
614 |
+
(ALL
|
615 |
+
ℓ
|
616 |
+
)⊤ = ALL
|
617 |
+
ℓ
|
618 |
+
,
|
619 |
+
(ARR
|
620 |
+
ℓ
|
621 |
+
)⊤ = ARR
|
622 |
+
ℓ
|
623 |
+
,
|
624 |
+
(ALR
|
625 |
+
ℓ
|
626 |
+
)⊤ = ARL
|
627 |
+
ℓ
|
628 |
+
And since the graph is bipartite we have:
|
629 |
+
ALR
|
630 |
+
2ℓ = 0
|
631 |
+
,
|
632 |
+
ARL
|
633 |
+
2ℓ = 0
|
634 |
+
ALL
|
635 |
+
2ℓ+1 = 0
|
636 |
+
,
|
637 |
+
ARR
|
638 |
+
2ℓ+1 = 0
|
639 |
+
These equations yield a recursive formula for ALL
|
640 |
+
ℓ
|
641 |
+
, with the following initial conditions:
|
642 |
+
ALL
|
643 |
+
2
|
644 |
+
= MM ⊤ − cI
|
645 |
+
ALL
|
646 |
+
4
|
647 |
+
= MM ⊤ALL
|
648 |
+
2
|
649 |
+
− (c − 1 + d − 1)ALL
|
650 |
+
2
|
651 |
+
− c(d − 1)I
|
652 |
+
MM ⊤ALL
|
653 |
+
ℓ
|
654 |
+
= ALL
|
655 |
+
ℓ+2 + ((c − 1) + (d − 1))ALL
|
656 |
+
ℓ
|
657 |
+
+ (c − 1)(d − 1)ALL
|
658 |
+
ℓ−2
|
659 |
+
,
|
660 |
+
∀ℓ ≥ 4
|
661 |
+
(3)
|
662 |
+
The following lemma, proven in Appendix A, suggests a way to find a non-recursive formula for ALL
|
663 |
+
2ℓ , given
|
664 |
+
such linear recursive relations with fixed coefficients.
|
665 |
+
Lemma 9. Let (xn) be a series defined via a second order linear recurrence with fixed coefficients A, B ∈ C:
|
666 |
+
xn = Axn−1 + Bxn−2
|
667 |
+
Assume λ1 ̸= λ2 are (real or complex) roots of the characteristic polynomial λ2 − Aλ − B. Then there are
|
668 |
+
α, β ∈ C, that depend on the initial conditions x0, x1, such that
|
669 |
+
xn = αλn
|
670 |
+
1 + βλn
|
671 |
+
2
|
672 |
+
for every n ≥ 0.
|
673 |
+
If the characteristic polynomial has a single root λ of multiplicity 2, then there are α, β ∈ C such that
|
674 |
+
xn = αλn + βnλn
|
675 |
+
for every n ≥ 0.
|
676 |
+
We use the lemma to bound the eigenvalues of ALL
|
677 |
+
2ℓ given bounds on the spectrum of the biregular graph.
|
678 |
+
Lemma 10. Let G be a (c, d)-biregular graph. Then there is a sequence of polynomials with integer coeffi-
|
679 |
+
cients (pℓ(x)) such that for every eigenpair (λ, v) of G, pℓ(λ2) is an eigenvalue of ALL
|
680 |
+
2ℓ , and moreover, for
|
681 |
+
every λ ∈ R, if
|
682 |
+
|λ| ∈ {0} ∪ [
|
683 |
+
√
|
684 |
+
d − 1 −
|
685 |
+
√
|
686 |
+
c − 1,
|
687 |
+
√
|
688 |
+
d − 1 +
|
689 |
+
√
|
690 |
+
c − 1]
|
691 |
+
(4)
|
692 |
+
then
|
693 |
+
|pℓ(λ2)| ≤ (2 +
|
694 |
+
√
|
695 |
+
d − 1)ℓ(c − 1)ℓ/2(d − 1)ℓ/2.
|
696 |
+
(5)
|
697 |
+
9
|
698 |
+
|
699 |
+
Proof. The recursive formulae proven above (3) suggest that there is a series of polynomials pn(x) with
|
700 |
+
integer coefficients such that ALL
|
701 |
+
2n = pn(MM ⊤). Note that the graph’s adjacency matrix is
|
702 |
+
AG =
|
703 |
+
� 0
|
704 |
+
M
|
705 |
+
M ⊤
|
706 |
+
0
|
707 |
+
�
|
708 |
+
And so, if (λ, v) is an eigenpair of G, then (λ2, v) is an eigenpair of
|
709 |
+
A2
|
710 |
+
G =
|
711 |
+
�MM ⊤
|
712 |
+
0
|
713 |
+
0
|
714 |
+
M ⊤M
|
715 |
+
�
|
716 |
+
.
|
717 |
+
This shows that pℓ(λ2) is an eigenvalue of ALL
|
718 |
+
2ℓ whenever λ is an eigenvalue of G. The converse is also true.
|
719 |
+
The formulae (3) can be transformed so as to convey that pn(x) satisfies these equations:
|
720 |
+
p1(x) = x − c
|
721 |
+
,
|
722 |
+
p2(x) = x2 + (2 − 2c − d)x + c(c − 1)
|
723 |
+
xpn(x) = pn+1(x) + (c − 1 + d − 1)pn(x) + (c − 1)(d − 1)pn−1(x)
|
724 |
+
for all n > 1. Setting n = 1 gives an equation involving p0(x), p1(x), p2(x). We can solve this equation for
|
725 |
+
p0(x) and get a simpler description of the initial conditions:
|
726 |
+
p0(x) =
|
727 |
+
c
|
728 |
+
c − 1
|
729 |
+
,
|
730 |
+
p1(x) = x − c
|
731 |
+
(6)
|
732 |
+
xpn(x) = pn+1(x) + (c − 1 + d − 1)pn(x) + (c − 1)(d − 1)pn−1(x)
|
733 |
+
(7)
|
734 |
+
for all n > 0.
|
735 |
+
We fix some t that satisfies (4), namely such that
|
736 |
+
|t| ∈ {0} ∪ [
|
737 |
+
√
|
738 |
+
d − 1 −
|
739 |
+
√
|
740 |
+
c − 1,
|
741 |
+
√
|
742 |
+
d − 1 +
|
743 |
+
√
|
744 |
+
c − 1].
|
745 |
+
We first deal with the case where |t| ∈ (
|
746 |
+
√
|
747 |
+
d − 1 − √c − 1,
|
748 |
+
√
|
749 |
+
d − 1 + √c − 1), and later we will consider the
|
750 |
+
edge cases where t is one of the endpoints of the segment or 0. Let us write x = t2. We have that for this
|
751 |
+
fixed x, the series (pn(x))n satisfies a second order linear recurrence with fixed coefficients. Using Lemma 9,
|
752 |
+
we conclude that there are functions α(x), λ1(x), β(x), λ2(x) that depend only on x, c and d, such that
|
753 |
+
pn(x) = α(x)(λ1(x))n + β(x)(λ2(x))n
|
754 |
+
(8)
|
755 |
+
for every n.
|
756 |
+
In order to find λ1, λ2 we solve for λ the characteristic polynomial, namely the following quadratic
|
757 |
+
equation derived from (7):
|
758 |
+
xλ = λ2 + (c − 1 + d − 1)λ + (c − 1)(d − 1)
|
759 |
+
To obtain
|
760 |
+
λ1,2(x) = x − (c − 1) − (d − 1) ±
|
761 |
+
�
|
762 |
+
∆(x)
|
763 |
+
2
|
764 |
+
where
|
765 |
+
∆(x) = x2 − 2x((c − 1) + (d − 1)) + (c − d)2.
|
766 |
+
(9)
|
767 |
+
Using the initial values for p0(x), p1(x) from (6), and plugging back into (8) we get the equations
|
768 |
+
c
|
769 |
+
c − 1 = α(x)(λ1(x))0 + β(x)(λ2(x))0 = α(x) + β(x)
|
770 |
+
x − c = α(x)(λ1(x))1 + β(x)(λ2(x))1 = α(x)λ1(x) + β(x)λ2(x)
|
771 |
+
10
|
772 |
+
|
773 |
+
whose solution is
|
774 |
+
α(x) = (c − 1)x − (c − 1)2 − (c − 1) + (c − 1)(d − 1) + (c − 1)
|
775 |
+
�
|
776 |
+
∆(x) − x + d − 1 +
|
777 |
+
�
|
778 |
+
∆(x)
|
779 |
+
2(c − 1)
|
780 |
+
�
|
781 |
+
∆(x)
|
782 |
+
β(x) =
|
783 |
+
c
|
784 |
+
c − 1 − α(x).
|
785 |
+
We check when ∆(x) = 0 by solving (9) for x:
|
786 |
+
x1,2 = 2((c − 1) + (d − 1)) ±
|
787 |
+
�
|
788 |
+
4(c − 1 + d − 1)2 − 4(c − d)2
|
789 |
+
2
|
790 |
+
= (c − 1 + d − 1) ±
|
791 |
+
�
|
792 |
+
(c + d)2 − 4(c + d) + 4 − (c − d)2
|
793 |
+
= (c − 1 + d − 1) ±
|
794 |
+
�
|
795 |
+
c2 + 2cd + d2 − 4c − 4d + 4 − c2 + 2cd − d2
|
796 |
+
= (c − 1 + d − 1) ±
|
797 |
+
√
|
798 |
+
4cd − 4c − 4d + 4
|
799 |
+
= (c − 1 + d − 1) ± 2
|
800 |
+
√
|
801 |
+
c − 1
|
802 |
+
√
|
803 |
+
d − 1
|
804 |
+
= (
|
805 |
+
√
|
806 |
+
d − 1 ±
|
807 |
+
√
|
808 |
+
c − 1)2
|
809 |
+
We see that ∆(x) is quadratic in x and has roots at (
|
810 |
+
√
|
811 |
+
d − 1 ± √c − 1)2. This gives a nice factorization of
|
812 |
+
∆(x):
|
813 |
+
∆(x) = x2 − 2x((c − 1) + (d − 1)) + (c − d)2
|
814 |
+
=
|
815 |
+
�
|
816 |
+
x −
|
817 |
+
�√
|
818 |
+
d − 1 +
|
819 |
+
√
|
820 |
+
c − 1
|
821 |
+
�2� �
|
822 |
+
x −
|
823 |
+
�√
|
824 |
+
d − 1 −
|
825 |
+
√
|
826 |
+
c − 1
|
827 |
+
�2�
|
828 |
+
Recall that for the x we fixed we have √x = t ∈ (
|
829 |
+
√
|
830 |
+
d − 1 − √c − 1,
|
831 |
+
√
|
832 |
+
d − 1 + √c − 1), so the first term in the
|
833 |
+
product is negative and the second term is positive, so ∆ < 0, and so λ1,2 are complex numbers (conjugate
|
834 |
+
to one another), with magnitude
|
835 |
+
|λ1,2|2 = (x − (c − 1) − (d − 1))2 − ∆(x)
|
836 |
+
4
|
837 |
+
= x2 − 2x((c − 1) + (d − 1)) + (c − 1 + d − 1)2 − (x2 − 2x((c − 1) + (d − 1)) + (c − d)2)
|
838 |
+
4
|
839 |
+
= (c + d − 2)2 − (c − d)2
|
840 |
+
4
|
841 |
+
= (c − 1)(d − 1)
|
842 |
+
(10)
|
843 |
+
A very similar calculation shows that α, β are conjugates with magnitude
|
844 |
+
|α|2 = |β|2 =
|
845 |
+
x(x − cd)
|
846 |
+
∆(x) · (c − 1)
|
847 |
+
This finishes the proof for all such x’s:
|
848 |
+
|pℓ(x)| = |α(x)λℓ
|
849 |
+
1 + β(x)λℓ
|
850 |
+
2| ≤ |α(x)λℓ
|
851 |
+
1| + |β(x)λℓ
|
852 |
+
2|
|
853 |
+
= |α(x)||λ1|ℓ + |β(x)||λ2|ℓ
|
854 |
+
= 2
|
855 |
+
�
|
856 |
+
x(x − cd)
|
857 |
+
∆(x) · (c − 1)(c − 1)ℓ/2(d − 1)ℓ/2
|
858 |
+
We keep in mind that x is fixed, so the expression is smaller than (2 +
|
859 |
+
√
|
860 |
+
d − 1) · ℓ · (c − 1)ℓ/2(d − 1)ℓ/2 for
|
861 |
+
large enough ℓ.
|
862 |
+
We are left with the cases x = t2 for t = 0,
|
863 |
+
√
|
864 |
+
d − 1 ± √c − 1:
|
865 |
+
11
|
866 |
+
|
867 |
+
1. t = 0. We use the same methods and find that the characteristic polynomial is
|
868 |
+
λ2 + (c − 1 + d − 1)λ + (c − 1)(d − 1)
|
869 |
+
whose roots are
|
870 |
+
λ1 = −(c − 1)
|
871 |
+
,
|
872 |
+
λ2 = −(d − 1).
|
873 |
+
Using the initial conditions (p0(0) = c/(c − 1), p1(0) = −c) we obtain
|
874 |
+
α(0) =
|
875 |
+
c
|
876 |
+
c − 1
|
877 |
+
,
|
878 |
+
β(0) = 0
|
879 |
+
and using the fact that c < d we get
|
880 |
+
|pℓ(0)| = |α(0)λℓ
|
881 |
+
1 + β(0)λℓ
|
882 |
+
2|
|
883 |
+
=
|
884 |
+
c
|
885 |
+
c − 1(c − 1)ℓ
|
886 |
+
< 2l(c − 1)ℓ/2(c − 1)ℓ/2
|
887 |
+
< 2l(c − 1)ℓ/2(d − 1)ℓ/2.
|
888 |
+
2. t =
|
889 |
+
√
|
890 |
+
d − 1 + √c − 1. Then x = t2 = (
|
891 |
+
√
|
892 |
+
d − 1 + √c − 1)2 = d − 1 + c − 1 + 2
|
893 |
+
√
|
894 |
+
d − 1√c − 1, and the
|
895 |
+
characteristic polynomial has a single root of multiplicity 2, namely
|
896 |
+
λ = x − (c − 1) − (d − 1)
|
897 |
+
2
|
898 |
+
=
|
899 |
+
√
|
900 |
+
d − 1
|
901 |
+
√
|
902 |
+
c − 1.
|
903 |
+
The solution, therefore, takes the form
|
904 |
+
pn(x) = (α(x) + nβ(x))(c − 1)n/2(d − 1)n/2.
|
905 |
+
Using the initial values we get
|
906 |
+
α(x) =
|
907 |
+
c
|
908 |
+
c − 1
|
909 |
+
,
|
910 |
+
β(x) =
|
911 |
+
x − c
|
912 |
+
√
|
913 |
+
d − 1√c − 1 −
|
914 |
+
c
|
915 |
+
c − 1 = 2 +
|
916 |
+
d − 2
|
917 |
+
√
|
918 |
+
d − 1√c − 1 −
|
919 |
+
c
|
920 |
+
c − 1.
|
921 |
+
1 <
|
922 |
+
c
|
923 |
+
c−1 ≤ 2 so β(x) ≤
|
924 |
+
√
|
925 |
+
d − 1 + 1, and in total we get
|
926 |
+
|pℓ(x)| = |α(x) + ℓβ(x)|(c − 1)ℓ/2(d − 1)ℓ/2
|
927 |
+
≤
|
928 |
+
�����
|
929 |
+
1
|
930 |
+
ℓ ·
|
931 |
+
c
|
932 |
+
c − 1
|
933 |
+
���� + |β(x)|
|
934 |
+
�
|
935 |
+
ℓ(c − 1)ℓ/2(d − 1)ℓ/2
|
936 |
+
≤
|
937 |
+
�
|
938 |
+
2 +
|
939 |
+
√
|
940 |
+
d − 1
|
941 |
+
�
|
942 |
+
ℓ(c − 1)ℓ/2(d − 1)ℓ/2
|
943 |
+
For sufficiently large ℓ.
|
944 |
+
3. t =
|
945 |
+
√
|
946 |
+
d − 1 − √c − 1. We get x = t2 = d − 1 + c − 1 − 2
|
947 |
+
√
|
948 |
+
d − 1√c − 1, and the rest follows the same
|
949 |
+
calculations as in the previous case.
|
950 |
+
Bounds on the spectrum of ALL
|
951 |
+
2ℓ give bounds on the number of non-backtracking paths completely con-
|
952 |
+
tained in a small set, hence gives Lemma 8.
|
953 |
+
12
|
954 |
+
|
955 |
+
Proof of Lemma 8. Recall that M2ℓ(S, G) counts the number of non-backtracking paths of length 2ℓ that
|
956 |
+
start and end in S, so by the definition of the ALL
|
957 |
+
n
|
958 |
+
operatore, we have M2ℓ(S, G) = ⟨ALL
|
959 |
+
2ℓ 1S, 1S⟩.
|
960 |
+
We note that ALL
|
961 |
+
2ℓ 1L = c(c − 1)ℓ−1(d − 1)ℓ1L, because every non-backtracking path starting at a given
|
962 |
+
vertex is made of picking the first left-to-right edge (we have c such edges to pick from), and then alternating
|
963 |
+
between picking any of the d or c edges adjacent to the current vertex, except for the edge we picked to get
|
964 |
+
to it.
|
965 |
+
Write 1S =
|
966 |
+
|S|
|
967 |
+
n 1L + r, with r ⊥ 1L, and ∥r∥2
|
968 |
+
2 ≤ ∥1S∥2
|
969 |
+
2 = |S|. Since the graph is Ramanujan, the
|
970 |
+
nontrivial eigenvalues in its spectral decomposition have their absolute value in the set {0} ∪ [
|
971 |
+
√
|
972 |
+
d − 1 −
|
973 |
+
√c − 1,
|
974 |
+
√
|
975 |
+
d − 1 + √c − 1].
|
976 |
+
We only care about the nontrivial eigenvalues because r ⊥ 1L, hence in the
|
977 |
+
writing of r in the orthogonal basis made of eigenvectors, only eigenvectors with nontrivial eigenvalues
|
978 |
+
appear. We use Lemma 10 to get
|
979 |
+
⟨ALL
|
980 |
+
2ℓ r, r⟩ ≤ (2 +
|
981 |
+
√
|
982 |
+
d − 1)ℓ(c − 1)ℓ/2(d − 1)ℓ/2 · ∥r∥2
|
983 |
+
2 .
|
984 |
+
Combine everything to get
|
985 |
+
M2ℓ(S, G) = ⟨ALL
|
986 |
+
2ℓ 1S, 1S⟩ =
|
987 |
+
�
|
988 |
+
ALL
|
989 |
+
2ℓ
|
990 |
+
|S|
|
991 |
+
n 1L + r, |S|
|
992 |
+
n 1L + r
|
993 |
+
�
|
994 |
+
= |S|2
|
995 |
+
n2 ⟨ALL
|
996 |
+
2ℓ 1L, 1L⟩ + ⟨ALL
|
997 |
+
2ℓ r, r⟩
|
998 |
+
= |S|2
|
999 |
+
n2 · c(c − 1)ℓ−1(d − 1)ℓ⟨1L, 1L⟩ + ⟨ALL
|
1000 |
+
2ℓ r, r⟩
|
1001 |
+
≤ |S|2
|
1002 |
+
n c(c − 1)ℓ−1(d − 1)ℓ + (2 +
|
1003 |
+
√
|
1004 |
+
d − 1)ℓ(c − 1)ℓ/2(d − 1)ℓ/2 ∥r∥2
|
1005 |
+
2
|
1006 |
+
≤ |S|
|
1007 |
+
�|S| · c · (c − 1)ℓ/2(d − 1)ℓ/2
|
1008 |
+
n(c − 1)
|
1009 |
+
+ (2 +
|
1010 |
+
√
|
1011 |
+
d − 1)ℓ
|
1012 |
+
�
|
1013 |
+
(c − 1)ℓ/2(d − 1)ℓ/2
|
1014 |
+
≤ |S|
|
1015 |
+
�
|
1016 |
+
c
|
1017 |
+
c − 1 + (2 +
|
1018 |
+
√
|
1019 |
+
d − 1)ℓ
|
1020 |
+
�
|
1021 |
+
(c − 1)ℓ/2(d − 1)ℓ/2
|
1022 |
+
≤ |S|
|
1023 |
+
�
|
1024 |
+
(2 +
|
1025 |
+
√
|
1026 |
+
d − 1)ℓ + 2
|
1027 |
+
�
|
1028 |
+
(c − 1)ℓ/2(d − 1)ℓ/2
|
1029 |
+
5
|
1030 |
+
Random gadget
|
1031 |
+
In this section we prove the existence of bipartite graphs such that every small set of left-side vertices has
|
1032 |
+
a unique neighbour on the right side. We draw a random biregular graph from a similar distribution as in
|
1033 |
+
[Pip77], and use techniques similiar to [Vad+12, Thm 4.4].
|
1034 |
+
Lemma 11. For every integers L, R, c, d with Lc = Rd, L > R, c > 3, if k is an integer that satisfies the
|
1035 |
+
inequality
|
1036 |
+
k
|
1037 |
+
c−3
|
1038 |
+
2
|
1039 |
+
≤
|
1040 |
+
1
|
1041 |
+
2Le ·
|
1042 |
+
� R
|
1043 |
+
3ec
|
1044 |
+
� c−1
|
1045 |
+
2
|
1046 |
+
then there is a (c, d)-biregular graph with sides [L] and [R] such that every set of left vertices of size at most
|
1047 |
+
k has a unique neighbour.
|
1048 |
+
We draw a random (c, d)-biregular graph in the following way: fix L vertices on the left side and R
|
1049 |
+
vertices on the right side (cL = dR), write c copies of each left-side vertex and d copies of each right-side
|
1050 |
+
vertex, and connect them via a uniformly random matching. That is, pick a uniformly random permutation
|
1051 |
+
π : L × [c] → R × [d], and for every u ∈ L, v ∈ R, i ∈ [c], j ∈ [d], if π(u, i) = (v, j), then add (u, v) as an edge.
|
1052 |
+
Note that we allow multiple edges between two vertices (if there are several i, j satisfying π(u, i) = (v, j)).
|
1053 |
+
13
|
1054 |
+
|
1055 |
+
Let G be a random bipartite graph with L vertices on the left side and R vertices on the right side drawn
|
1056 |
+
from said distribution. Let A be a subset of left vertices of size k. We note that if A expands by at least
|
1057 |
+
(c + 1)/2, then, by a simple counting argument, A has a unique neighbour. It is therefore sufficient to find
|
1058 |
+
the probability that A expands by at least (c + 1)/2.
|
1059 |
+
Let us fix an arbitary ordering of the ck edges leaving A, and denote it e1, . . . , eck. We say that ei is a
|
1060 |
+
repeat if it touches a previously covered vertex, that is, if its right endpoint is contained in the set of right
|
1061 |
+
endpoints of the set e1, . . . , ei−1. We note that if A does not expand by at least (c + 1)/2, then, again by a
|
1062 |
+
simple counting argument, there are at least (c − 1)k/2 repeats. This is because the number of repeats and
|
1063 |
+
the size of the set of the neighbours of A add up to the number of edges leaving A, namely ck.
|
1064 |
+
We note that for every i, ei is a repeat if it touches one of i − 1 or less previously covered vertices. This
|
1065 |
+
means that Pr[ei is a repeat] ≤ i−1
|
1066 |
+
R < ck
|
1067 |
+
R . Moreover, if we condition on the event that some of the first i − 1
|
1068 |
+
edges are also repeats, then the probability that ei is a repeat may only decrease, since it means that there
|
1069 |
+
are less “forbidden” endpoints. We conclude that for every set of l edges:
|
1070 |
+
Pr[ei1, . . . , eil are repeats] =
|
1071 |
+
l�
|
1072 |
+
j=1
|
1073 |
+
Pr[eij is a repeat | ei1, . . . eij−1 are repeats] <
|
1074 |
+
�ck
|
1075 |
+
R
|
1076 |
+
�l
|
1077 |
+
.
|
1078 |
+
If A expands too little, then there are many repeats. We can use it to bound the probability that A has
|
1079 |
+
no unqiue neighbour:
|
1080 |
+
Pr[A has no unique neighbour] ≤ Pr[A expands by < (c + 1)/2]
|
1081 |
+
≤ Pr[there are at least (c − 1)k/2 repeats]
|
1082 |
+
≤
|
1083 |
+
�
|
1084 |
+
i1,...,i(c−1)k/2∈(
|
1085 |
+
ck
|
1086 |
+
(c−1)k/2)
|
1087 |
+
Pr[{ei1, . . . , ei(c−1)k/2} are repeats]
|
1088 |
+
<
|
1089 |
+
� ck
|
1090 |
+
c−1
|
1091 |
+
2 k
|
1092 |
+
�
|
1093 |
+
·
|
1094 |
+
�ck
|
1095 |
+
R
|
1096 |
+
� c−1
|
1097 |
+
2 k
|
1098 |
+
And by a union bound over the possible choices of A:
|
1099 |
+
Pr[∃ “bad” A of size k] ≤
|
1100 |
+
�L
|
1101 |
+
k
|
1102 |
+
�
|
1103 |
+
· Pr[A expands by < (c + 1)/2]
|
1104 |
+
≤
|
1105 |
+
�L
|
1106 |
+
k
|
1107 |
+
�
|
1108 |
+
·
|
1109 |
+
� ck
|
1110 |
+
c−1
|
1111 |
+
2 k
|
1112 |
+
�
|
1113 |
+
·
|
1114 |
+
�ck
|
1115 |
+
R
|
1116 |
+
� c−1
|
1117 |
+
2 k
|
1118 |
+
≤
|
1119 |
+
�Le
|
1120 |
+
k
|
1121 |
+
�k
|
1122 |
+
·
|
1123 |
+
� cke
|
1124 |
+
c−1
|
1125 |
+
2 k
|
1126 |
+
� c−1
|
1127 |
+
2 k
|
1128 |
+
·
|
1129 |
+
�ck
|
1130 |
+
R
|
1131 |
+
� c−1
|
1132 |
+
2 k
|
1133 |
+
=
|
1134 |
+
�
|
1135 |
+
Le
|
1136 |
+
k ·
|
1137 |
+
� 2ce
|
1138 |
+
c − 1 · ck
|
1139 |
+
R
|
1140 |
+
� c−1
|
1141 |
+
2 �k
|
1142 |
+
≤
|
1143 |
+
�
|
1144 |
+
Le
|
1145 |
+
k ·
|
1146 |
+
�3eck
|
1147 |
+
R
|
1148 |
+
� c−1
|
1149 |
+
2 �k
|
1150 |
+
(11)
|
1151 |
+
Where the last inequality follows from assuming that c ≥ 3 so
|
1152 |
+
2c
|
1153 |
+
c−1 ≤ 3.
|
1154 |
+
We are now ready to prove Lemma 11.
|
1155 |
+
Proof of Lemma 11. Let us draw a (c, d)-biregular graph G = ([L] ⊔ [R], E) from the distribution described
|
1156 |
+
above. Let k be an integer satsifying (11). Using a union bound and the inequality in (11), we have (where
|
1157 |
+
14
|
1158 |
+
|
1159 |
+
probability is taken over the choice of G):
|
1160 |
+
Pr[∃ “bad” A ⊆ [L] of size ≤ k] =
|
1161 |
+
k
|
1162 |
+
�
|
1163 |
+
a=1
|
1164 |
+
Pr[∃ “bad” A ⊆ [L] of size a]
|
1165 |
+
≤
|
1166 |
+
k
|
1167 |
+
�
|
1168 |
+
a=1
|
1169 |
+
�
|
1170 |
+
Le
|
1171 |
+
a ·
|
1172 |
+
�3eca
|
1173 |
+
R
|
1174 |
+
� c−1
|
1175 |
+
2 �a
|
1176 |
+
<
|
1177 |
+
∞
|
1178 |
+
�
|
1179 |
+
a=1
|
1180 |
+
�
|
1181 |
+
Le
|
1182 |
+
k ·
|
1183 |
+
�3eck
|
1184 |
+
R
|
1185 |
+
� c−1
|
1186 |
+
2 �a
|
1187 |
+
=
|
1188 |
+
∞
|
1189 |
+
�
|
1190 |
+
a=1
|
1191 |
+
�
|
1192 |
+
k
|
1193 |
+
c−1
|
1194 |
+
3
|
1195 |
+
· Le ·
|
1196 |
+
�3ec
|
1197 |
+
R
|
1198 |
+
� c−1
|
1199 |
+
2 �a
|
1200 |
+
≤
|
1201 |
+
∞
|
1202 |
+
�
|
1203 |
+
a=1
|
1204 |
+
�1
|
1205 |
+
2
|
1206 |
+
�a
|
1207 |
+
< 1.
|
1208 |
+
We see that with strictly positive probability, a random graph has no “bad” subsets of size ≤ k, hence there
|
1209 |
+
exists a graph with the desired unique neighbour property.
|
1210 |
+
6
|
1211 |
+
Construction
|
1212 |
+
6.1
|
1213 |
+
Routed product definition
|
1214 |
+
Let us begin with a brief coding theory motivation. An error-correcting code is often given via an m × n
|
1215 |
+
parity check matrix H, so that C = Ker H ⊆ {0, 1}n. The matrix H can be visualized as a bipartite graph,
|
1216 |
+
called the parity check graph, with n left and m right vertices, and an edge i ∼ j whenever H(j, i) ̸= 0. A
|
1217 |
+
Tanner code is defined given a bipartite graph B and a base code C0 = Ker H0 [Tan81]. One way to view
|
1218 |
+
the routed product is through the point of view of codes. Consider the parity check graph B0 of H0 and
|
1219 |
+
define the routed product of B and B0 to be simply the parity check graph of the Tanner code C(B, C0).
|
1220 |
+
Here is a more detailed and combinatorial definition of the routed product without mention of codes.
|
1221 |
+
Let G = (L ⊔ R, E) be a (c, d)-biregular graph and G0 = (L0 ⊔ R0, E0) a (c0, d0)-biregular graph.
|
1222 |
+
We
|
1223 |
+
think of G as a big graph (in practice, an infinite family of Ramanujan graphs), and G0 as a fixed size graph
|
1224 |
+
(gadget). Assume that |L0| = d, and let us think of the edges of G as a function E : R × [d] → L which
|
1225 |
+
maps a right side vertex v and an index i to the ith neighbour of v in G.
|
1226 |
+
We can define the routed product graph G′ = G ◦ G0 as the bipartite graph whose left side is L, right
|
1227 |
+
side is the cartesian product R × R0, and the set of edges is
|
1228 |
+
E′ = {(E(v, i), (v, j)) : v ∈ R, i ∈ [d], j ∈ [R0], (i, j) ∈ E0}.
|
1229 |
+
That is, we write R0 copies of each vertex in R, and every right side vertex v in the big graph G and an
|
1230 |
+
edge (i, j) in the small gadget G0 gives an edge between the ith neighbour of v in G, and the jth vertex of
|
1231 |
+
the copy of G0 assigned to v in G′. Otherwise put, we use G0 to route every edge of the big graph G to c0
|
1232 |
+
edges in the product graph G′.
|
1233 |
+
More precisely, for every v ∈ R, the bipartite subgraph of G′ whose left side is NG(v) and right side
|
1234 |
+
is (v, ·) is isomorphic to G0. This means that, roughly speaking, unique neighbours are inherited from the
|
1235 |
+
small graph to the product graph:
|
1236 |
+
Lemma 12. Let S ⊆ L, v ∈ NG(S). Define S′ = {i : E(v, i) ∈ S} ⊆ [d] as the indexed neighbours of v in
|
1237 |
+
S. If S′, as a set of vertices in the gadget G0, has a unique neighbour j ∈ R0 in G0, then (v, j) is a unique
|
1238 |
+
neighbour of S in the product graph G′.
|
1239 |
+
The proof is immediate while staring at Fig. 1, but for the sake of completion it is given in Appendix A.
|
1240 |
+
15
|
1241 |
+
|
1242 |
+
Figure 1: An example of a bipartite graph G (dashed, red), a small gadget G0 (dotted, green), and the
|
1243 |
+
routed product G′ = G ◦ G0 (solid, blue). The set S ⊆ L has a neighbour v ∈ R, and so S is associated with
|
1244 |
+
a set S′ of left side vertices of the copy of G0 associated with v. Since (i′, j) is the only edge connecting j
|
1245 |
+
to S′ in G0, we have that (v, j) is a unique neighbour of S in G′.
|
1246 |
+
16
|
1247 |
+
|
1248 |
+
S6.2
|
1249 |
+
Proof of Theorem 1
|
1250 |
+
Let q be a prime power, c0 an integer, and α > 1. Assume that αc0(q + 1) is an integer. We construct an
|
1251 |
+
infinite family of (c0(q + 1), αc0(q + 1))-biregular graphs with the unique neighbour property under some
|
1252 |
+
assumptions specified below.
|
1253 |
+
Denote c = q + 1 and d = q3 + 1. By Theorem 3 there is an efficient construction of an infinite family
|
1254 |
+
of (c, d)-biregular Ramanujan graphs (Gn). Let G0 = (L0 ⊔ R0, E0) be a gadget: a c0-left-regular bipartite
|
1255 |
+
graph with |L0| = d = q3 + 1 vertices on the left side and R0 vertices on the right side, such that every
|
1256 |
+
left-side set of sufficiently small size admits a unique neighbour on the right side, where “sufficiently small”
|
1257 |
+
here means the bound given in Lemma 11. For the constructed graph to have the left side α times bigger
|
1258 |
+
than the right side, we set R0 =
|
1259 |
+
d
|
1260 |
+
αc =
|
1261 |
+
q3+1
|
1262 |
+
α(q+1).
|
1263 |
+
We define G′
|
1264 |
+
n = Gn ◦ G0 as the routed product of Gn and G0. For the rest of this (short) proof let us
|
1265 |
+
suppress n from the notation, for convenience.
|
1266 |
+
Let ε < 1
|
1267 |
+
q. By Theorem 2, there exists δ > 0 such that for every S ⊆ L of size at most δ|L|, the “average
|
1268 |
+
right degree” ¯dS, namely the average of the degrees of vertices in NG(S) in the induced subgraph S ⊔NG(S),
|
1269 |
+
is bounded:
|
1270 |
+
¯dS :=
|
1271 |
+
c|S|
|
1272 |
+
|NG(S)| ≤ 1 + (1 + ε)
|
1273 |
+
�
|
1274 |
+
d − 1
|
1275 |
+
c − 1 .
|
1276 |
+
We show that such S has a unique neighbour in G′.
|
1277 |
+
We note that d−1
|
1278 |
+
c−1 = q2, so since ε < 1
|
1279 |
+
q we have a vertex v ∈ R of “degree” at most q + 1 in G, that is, the
|
1280 |
+
set S′ ⊆ [d] of v’s neighbours in S is of size at most q + 1. By Lemma 12, if S′, as a set of left-side vertices
|
1281 |
+
in G0, has a unique neighbour j in G0, then our original set S has a unique neighbour (v, j) in G.
|
1282 |
+
It remains to choose the parameters in a way that all left-side sets of size at most q + 1 have a unique
|
1283 |
+
neighbour in G0. By Lemma 11, we need to have:
|
1284 |
+
(q + 1)
|
1285 |
+
c0−3
|
1286 |
+
2
|
1287 |
+
≤
|
1288 |
+
1
|
1289 |
+
2(q3 + 1)e ·
|
1290 |
+
�
|
1291 |
+
�
|
1292 |
+
q3+1
|
1293 |
+
α(q+1)
|
1294 |
+
3ec0
|
1295 |
+
�
|
1296 |
+
�
|
1297 |
+
c0−1
|
1298 |
+
2
|
1299 |
+
.
|
1300 |
+
(12)
|
1301 |
+
The LHS is O(q
|
1302 |
+
c0−3
|
1303 |
+
2 ) and RHS is Θ(qc0−4), so if c0 > 5 then for sufficiently large q the construction gives a
|
1304 |
+
unique neighbour expander. That is, there exists some ˆq(c0, α) such that if q > ˆq then (12) holds, hence we
|
1305 |
+
constructed a bipartite unique neighbour expander as promised in Theorem 1.
|
1306 |
+
7
|
1307 |
+
Future work
|
1308 |
+
The main pitfall of our approach is the non-constructive nature of the gadget. Theoretically since the gadget
|
1309 |
+
has constant size this is no issue. However, exhaustive search is impractical even for small values of q. This
|
1310 |
+
is because the gadget’s size is cubic in q so the search space is of size exponential in q3. A natural question
|
1311 |
+
would be whether it is possible to construct such a gadget in an efficient way, since that would lead to the
|
1312 |
+
whole unique neighbour expander family to be constructible in practice. For the bipartite Ramanujan family
|
1313 |
+
chosen in our work (the one by Ballantine et al. [Bal+15]) we ask the following.
|
1314 |
+
Question 13. For which prime power q and real number α ≥ 1 can one construct efficiently a biregular
|
1315 |
+
graph with left side q3 + 1, right side
|
1316 |
+
q3+1
|
1317 |
+
α(q+1), such that every left side set of size at most q + 1 has a unique
|
1318 |
+
neighbour?
|
1319 |
+
We note that the fixed size graph given in [AC02, Lemma 4.3] is a good gadget (for α = 22/21 and the
|
1320 |
+
edge-vertex incidence graphs of a 44-regular Ramanujan graph family), and indeed these graphs can be used
|
1321 |
+
to construct bipartite unique neighbour expanders.
|
1322 |
+
Since we prove that a random gadget is, with non-negligble probability, good for our construction, it
|
1323 |
+
may be interesting to construct such gadget by simply drawing random gadgets and testing whether they
|
1324 |
+
are good. Since drawing is simple, we are left with the task of testing. We therefore ask:
|
1325 |
+
17
|
1326 |
+
|
1327 |
+
Question 14. Given a bipartite graph, can one efficiently find the smallest nonempty set of left-side vertices
|
1328 |
+
that has no unique neighbours?
|
1329 |
+
We currently know of no better way than just enumerating all left-side sets, which is exponential in the
|
1330 |
+
size of the graph, hence impractical. We refer to [AK19] for an interesting approach to testing expansion of
|
1331 |
+
random graphs.
|
1332 |
+
The methods presented in this work are not limited to the (q+1, q3 +1)-biregular Ramanujan family. We
|
1333 |
+
can therefore ask the question the other way around – find a gadget (by sampling or any other way), and see
|
1334 |
+
whether we can efficiently construct a bipartite Ramanujan family that will make it work, i.e. that would
|
1335 |
+
allow us to rewrite the proof of Theorem 1. This emphasizes the well-known natural question of constructing
|
1336 |
+
Ramanujan graphs with arbitrary degrees, specifically in the bipartite and biregular setting,
|
1337 |
+
Question 15. For which integers c < d can one construct efficiently an infinite family of (c, d)-biregular
|
1338 |
+
Ramanujan graphs?
|
1339 |
+
We note that our construction is far from “right-side unique neighbour expansion,” as the complete right
|
1340 |
+
side of a single gadget is a constant-size set with no unique neighbours on the left. We wonder whether it is
|
1341 |
+
possible to construct a bipartite graph where all small size sets (be them contained in either sides, or both)
|
1342 |
+
have unique neighbours.
|
1343 |
+
18
|
1344 |
+
|
1345 |
+
References
|
1346 |
+
[AC02]
|
1347 |
+
Noga Alon and Michael Capalbo. “Explicit unique-neighbor expanders”. In: The 43rd Annual
|
1348 |
+
IEEE Symposium on Foundations of Computer Science, 2002. Proceedings. IEEE. 2002, pp. 73–
|
1349 |
+
79.
|
1350 |
+
[AK19]
|
1351 |
+
Benny Applebaum and Eliran Kachlon. “Sampling graphs without forbidden subgraphs and un-
|
1352 |
+
balanced expanders with negligible error”. In: 2019 IEEE 60th Annual Symposium on Foundations
|
1353 |
+
of Computer Science (FOCS). IEEE. 2019, pp. 171–179.
|
1354 |
+
[ALM96]
|
1355 |
+
Sanjeev Arora, Frank Thomson Leighton, and Bruce M Maggs. “On-line algorithms for path
|
1356 |
+
selection in a nonblocking network”. In: SIAM Journal on Computing 25.3 (1996), pp. 600–625.
|
1357 |
+
[Bal+15]
|
1358 |
+
Cristina Ballantine, Brooke Feigon, Radhika Ganapathy, Janne Kool, Kathrin Maurischat, and
|
1359 |
+
Amy Wooding. “Explicit construction of Ramanujan bigraphs”. In: Women in numbers europe.
|
1360 |
+
Springer, 2015, pp. 1–16.
|
1361 |
+
[BDH22]
|
1362 |
+
Gerandy Brito, Ioana Dumitriu, and Kameron Decker Harris. “Spectral gap in random bipartite
|
1363 |
+
biregular graphs and applications”. In: Combinatorics, Probability and Computing 31.2 (2022),
|
1364 |
+
pp. 229–267.
|
1365 |
+
[Bec16]
|
1366 |
+
Oren Becker. “Symmetric unique neighbor expanders and good LDPC codes”. In: Discrete Applied
|
1367 |
+
Mathematics 211 (2016), pp. 211–216. issn: 0166-218X. doi: https://doi.org/10.1016/
|
1368 |
+
j.dam.2016.04.022. url: https://www.sciencedirect.com/science/article/pii/
|
1369 |
+
S0166218X16301810.
|
1370 |
+
[BV09]
|
1371 |
+
Eli Ben-Sasson and Michael Viderman. “Tensor products of weakly smooth codes are robust”.
|
1372 |
+
In: Theory of Computing 5.1 (2009), pp. 239–255.
|
1373 |
+
[Cap+02]
|
1374 |
+
Michael Capalbo, Omer Reingold, Salil Vadhan, and Avi Wigderson. “Randomness conductors
|
1375 |
+
and constant-degree expansion beyond the degree/2 barrier”. In: Proceedings of the 34th Annual
|
1376 |
+
ACM Symposium on Theory of Computing. 2002, pp. 659–668.
|
1377 |
+
[DSW06]
|
1378 |
+
Irit Dinur, Madhu Sudan, and Avi Wigderson. “Robust local testability of tensor products of
|
1379 |
+
LDPC codes”. In: Approximation, Randomization, and Combinatorial Optimization. Algorithms
|
1380 |
+
and Techniques. Springer, 2006, pp. 304–315.
|
1381 |
+
[FL96]
|
1382 |
+
Keqin Feng and Wen-Ch’ing Winnie Li. “Spectra of hypergraphs and applications”. In: Journal
|
1383 |
+
of number theory 60.1 (1996), pp. 1–22.
|
1384 |
+
[GM21]
|
1385 |
+
Aurelien Gribinski and Adam W Marcus. “Existence and polynomial time construction of bireg-
|
1386 |
+
ular, bipartite Ramanujan graphs of all degrees”. In: arXiv preprint arXiv:2108.02534 (2021).
|
1387 |
+
[GM88]
|
1388 |
+
Chris D Godsil and Bojan Mohar. “Walk generating functions and spectral measures of infinite
|
1389 |
+
graphs”. In: Linear Algebra and its Applications 107 (1988), pp. 191–206.
|
1390 |
+
[Hae95]
|
1391 |
+
Willem H Haemers. “Interlacing eigenvalues and graphs”. In: Linear Algebra and its applications
|
1392 |
+
226 (1995), pp. 593–616.
|
1393 |
+
[Kah95]
|
1394 |
+
Nabil Kahale. “Eigenvalues and expansion of regular graphs”. In: Journal of the ACM (JACM)
|
1395 |
+
42.5 (1995), pp. 1091–1106.
|
1396 |
+
[Kam19]
|
1397 |
+
Amitay Kamber. Lp Expander Graphs. 2019. arXiv: 1609.04433 [math.CO].
|
1398 |
+
[KK22]
|
1399 |
+
Amitay Kamber and Tali Kaufman. “Combinatorics via closed orbits: number theoretic Ramanu-
|
1400 |
+
jan graphs are not unique neighbor expanders”. In: Proceedings of the 54th Annual ACM SIGACT
|
1401 |
+
Symposium on Theory of Computing. 2022, pp. 426–435.
|
1402 |
+
[LPS88]
|
1403 |
+
Alexander Lubotzky, Ralph Phillips, and Peter Sarnak. “Ramanujan graphs”. In: Combinatorica
|
1404 |
+
8.3 (1988), pp. 261–277.
|
1405 |
+
[LS96]
|
1406 |
+
Wen-Ch’ing Winnie Li and Patrick Solé. “Spectra of Regular Graphs and Hypergraphs and
|
1407 |
+
Orthogonal Polynomials”. In: European Journal of Combinatorics 17.5 (1996), pp. 461–477. doi:
|
1408 |
+
https://doi.org/10.1006/eujc.1996.0040.
|
1409 |
+
19
|
1410 |
+
|
1411 |
+
[Mar88]
|
1412 |
+
G. A. Margulis. “Explicit group-theoretical constructions of combinatorial schemes and their
|
1413 |
+
application to the design of expanders and concentrators”. In: Problemy peredachi informatsii
|
1414 |
+
24.1 (1988), pp. 51–60.
|
1415 |
+
[MSS13]
|
1416 |
+
Adam Marcus, Daniel A Spielman, and Nikhil Srivastava. “Interlacing families I: Bipartite Ra-
|
1417 |
+
manujan graphs of all degrees”. In: 2013 IEEE 54th Annual Symposium on Foundations of com-
|
1418 |
+
puter science. IEEE. 2013, pp. 529–537.
|
1419 |
+
[Nil91]
|
1420 |
+
Alon Nilli. “On the second eigenvalue of a graph”. In: Discrete Mathematics 91.2 (1991), pp. 207–
|
1421 |
+
210.
|
1422 |
+
[Pip77]
|
1423 |
+
Nicholas Pippenger. “Superconcentrators”. In: SIAM Journal on Computing 6.2 (1977), pp. 298–
|
1424 |
+
304.
|
1425 |
+
[Pip93]
|
1426 |
+
Nicholas Pippenger. “Self-routing superconcentrators”. In: Proceedings of the twenty-fifth annual
|
1427 |
+
ACM symposium on Theory of Computing. 1993, pp. 355–361.
|
1428 |
+
[PU89]
|
1429 |
+
David Peleg and Eli Upfal. “The token distribution problem”. In: SIAM journal on computing
|
1430 |
+
18.2 (1989), pp. 229–243.
|
1431 |
+
[SS96]
|
1432 |
+
Michael Sipser and Daniel A Spielman. “Expander codes”. In: IEEE transactions on Information
|
1433 |
+
Theory 42.6 (1996), pp. 1710–1722.
|
1434 |
+
[Tan81]
|
1435 |
+
R Tanner. “A recursive approach to low complexity codes”. In: IEEE Transactions on information
|
1436 |
+
theory 27.5 (1981), pp. 533–547.
|
1437 |
+
[Vad+12]
|
1438 |
+
Salil P Vadhan et al. “Pseudorandomness”. In: Foundations and Trends in Theoretical Computer
|
1439 |
+
Science 7.1–3 (2012).
|
1440 |
+
20
|
1441 |
+
|
1442 |
+
8
|
1443 |
+
Appendix A
|
1444 |
+
We restate and prove the lemmas we used throughout the work.
|
1445 |
+
Lemma 5. Let G be a d-regular Ramanujan graph, and G′ its edge-vertex incidence graph. Then G′ is a
|
1446 |
+
(2, d)-biregular Ramanujan graph.
|
1447 |
+
Proof. Let G = (V, E) a d-regular Ramanujan graph. The adjacency matrix of G′ is A =
|
1448 |
+
� 0
|
1449 |
+
M
|
1450 |
+
M ⊤
|
1451 |
+
0
|
1452 |
+
�
|
1453 |
+
where
|
1454 |
+
M has |E| rows, each containing two 1’s, and |V | columns, each containing d 1’s. Let v be an eigenvector of
|
1455 |
+
A with eigenvalue λ; then v is an eigenvector of A2 with eigenvalue λ2. We note that
|
1456 |
+
A2 =
|
1457 |
+
�
|
1458 |
+
MM ⊤
|
1459 |
+
0
|
1460 |
+
0
|
1461 |
+
M ⊤M
|
1462 |
+
�
|
1463 |
+
so it suffices to consider the spectrum of M ⊤M, which is essentially the operator corresponding to a walk
|
1464 |
+
from a vertex of G to an edge that touches it and back to one of its endpoints (possibly the same vertex we
|
1465 |
+
started at).
|
1466 |
+
For every v ∈ V , there are d ways to walk from it to an edge and then back to v; all other legal paths
|
1467 |
+
correspond to picking an edge touching v. We conclude that M ⊤M = dI + A, so every eigenvalue λ of G′
|
1468 |
+
satisfies λ2 = d + σ where σ is an eigenvalue of G.
|
1469 |
+
The lemma is proven by noting that |σ| ≤ 2
|
1470 |
+
√
|
1471 |
+
d − 1 (since G is Ramanujan), so
|
1472 |
+
d − 2
|
1473 |
+
√
|
1474 |
+
d − 1 ≤ λ2 ≤ d + 2
|
1475 |
+
√
|
1476 |
+
d − 1
|
1477 |
+
The terms on the extreme sides of the inequality can be verified to be (
|
1478 |
+
√
|
1479 |
+
d − 1 ± 1)2 so we get |λ| ∈
|
1480 |
+
[
|
1481 |
+
√
|
1482 |
+
d − 1 − 1,
|
1483 |
+
√
|
1484 |
+
d − 1 + 1], as needed (recall that in G′ the left-regularity is c = 2 so √c − 1 = 1).
|
1485 |
+
Lemma 9. Let (xn) be a series defined via a second order linear recurrence with fixed coefficients A, B ∈ C:
|
1486 |
+
xn = Axn−1 + Bxn−2
|
1487 |
+
Assume λ1 ̸= λ2 are (real or complex) roots of the characteristic polynomial λ2 − Aλ − B. Then there are
|
1488 |
+
α, β ∈ C, that depend on the initial conditions x0, x1, such that
|
1489 |
+
xn = αλn
|
1490 |
+
1 + βλn
|
1491 |
+
2
|
1492 |
+
for every n ≥ 0.
|
1493 |
+
If the characteristic polynomial has a single root λ of multiplicity 2, then there are α, β ∈ C such that
|
1494 |
+
xn = αλn + βnλn
|
1495 |
+
for every n ≥ 0.
|
1496 |
+
Proof. We note that for every n ≥ 2 we have
|
1497 |
+
� xn
|
1498 |
+
xn−1
|
1499 |
+
�
|
1500 |
+
=
|
1501 |
+
�Axn−1 + Bxn−2
|
1502 |
+
xn−1
|
1503 |
+
�
|
1504 |
+
=
|
1505 |
+
�A
|
1506 |
+
B
|
1507 |
+
1
|
1508 |
+
0
|
1509 |
+
� �xn−1
|
1510 |
+
xn−2
|
1511 |
+
�
|
1512 |
+
Denote the 2 × 2 matrix by D, so by induction,
|
1513 |
+
� xn
|
1514 |
+
xn−1
|
1515 |
+
�
|
1516 |
+
= Dn
|
1517 |
+
�x1
|
1518 |
+
x0
|
1519 |
+
�
|
1520 |
+
Let us diagonalize D. The characteristic polyonmial is
|
1521 |
+
pD(λ) = det(λI − D) =
|
1522 |
+
����
|
1523 |
+
λ − A
|
1524 |
+
−B
|
1525 |
+
−1
|
1526 |
+
λ
|
1527 |
+
���� = λ(λ − A) − B = λ2 − Aλ − B
|
1528 |
+
21
|
1529 |
+
|
1530 |
+
If pD(λ) has two distinct roots λ1, λ2, then the matrix is diagonalizable; that means that there exists a 2 × 2
|
1531 |
+
matrix M such that D = M · diag{λ1, λ2} · M −1. We get:
|
1532 |
+
� xn
|
1533 |
+
xn−1
|
1534 |
+
�
|
1535 |
+
= M
|
1536 |
+
�λ1
|
1537 |
+
0
|
1538 |
+
0
|
1539 |
+
λ2
|
1540 |
+
�n
|
1541 |
+
M −1
|
1542 |
+
�x1
|
1543 |
+
x0
|
1544 |
+
�
|
1545 |
+
= M
|
1546 |
+
�λn
|
1547 |
+
1
|
1548 |
+
0
|
1549 |
+
0
|
1550 |
+
λn
|
1551 |
+
2
|
1552 |
+
�
|
1553 |
+
M −1
|
1554 |
+
�x1
|
1555 |
+
x0
|
1556 |
+
�
|
1557 |
+
We can compute M, M −1 explicitly, multiple the matrices and get α, β ∈ C such that xn = αλn
|
1558 |
+
1 + βλn
|
1559 |
+
2 as
|
1560 |
+
required.
|
1561 |
+
Otherwise, if pD(λ) has a single root λ of multiplicity 2, then we can find its Jordan form, i.e. find M
|
1562 |
+
such that
|
1563 |
+
D = M
|
1564 |
+
�λ
|
1565 |
+
1
|
1566 |
+
0
|
1567 |
+
λ
|
1568 |
+
�
|
1569 |
+
M −1
|
1570 |
+
Dn = M
|
1571 |
+
�λ
|
1572 |
+
1
|
1573 |
+
0
|
1574 |
+
λ
|
1575 |
+
�n
|
1576 |
+
M −1 = M
|
1577 |
+
�λn
|
1578 |
+
nλn−1
|
1579 |
+
0
|
1580 |
+
λn
|
1581 |
+
�
|
1582 |
+
M −1
|
1583 |
+
Where the last equality follows from a simple induction.
|
1584 |
+
Similarly, we get
|
1585 |
+
� xn
|
1586 |
+
xn−1
|
1587 |
+
�
|
1588 |
+
= M
|
1589 |
+
�λ
|
1590 |
+
1
|
1591 |
+
0
|
1592 |
+
λ
|
1593 |
+
�n
|
1594 |
+
M −1
|
1595 |
+
�x1
|
1596 |
+
x0
|
1597 |
+
�
|
1598 |
+
= M
|
1599 |
+
�λn
|
1600 |
+
nλn−1
|
1601 |
+
0
|
1602 |
+
λn
|
1603 |
+
�
|
1604 |
+
M −1
|
1605 |
+
�x1
|
1606 |
+
x0
|
1607 |
+
�
|
1608 |
+
And again we can find α, β ∈ C as required.
|
1609 |
+
For the following lemma we remind that G = (L ⊔ R, E) is a (c, d)-biregular graph, G0 = (L0 ⊔ R0, E0) is
|
1610 |
+
a (c0, d0)-biregular graph, and G′ = G ◦ G0 is the routed product of G and G0. Recall that the edges of G′
|
1611 |
+
are (E(v, i), (v, j)) when v ∈ R is a right side vertex of G, i ∈ [d], E(v, i) is the ith neighbour of v according
|
1612 |
+
to G, and (i, j) ∈ E0.
|
1613 |
+
Lemma 12. Let S ⊆ L, v ∈ NG(S). Define S′ = {i : E(v, i) ∈ S} ⊆ [d] as the indexed neighbours of v in
|
1614 |
+
S. If S′, as a set of vertices in the gadget G0, has a unique neighbour j ∈ R0 in G0, then (v, j) is a unique
|
1615 |
+
neighbour of S in the product graph G′.
|
1616 |
+
Proof. Assume that i′ ∈ S′ is the unique neighbour of j in G0. By the definition of the routed product
|
1617 |
+
we have that (E(v, i′), (v, j)) is an edge in G. Since i′ ∈ S′ we have that E(v, i′) ∈ S, so indeed (v, j) is
|
1618 |
+
a neighbour of S in G′. It is therefore remaining to show that it is unique, i.e. that E(v, i′) is the only
|
1619 |
+
neighbour of (v, j) in S.
|
1620 |
+
The neighbours of (v, j) in G are E(v, i) for every i such that (i, j) ∈ E0. If E(v, i) ∈ S, then by the
|
1621 |
+
definition of S′ we have that i ∈ S′, so i is a neighbour of j in E0. But we know that j is a unique neighbour
|
1622 |
+
of S′ in E0, so we must have that i = i′, and indeed (v, j) is a unique neighbour of S in G′.
|
1623 |
+
22
|
1624 |
+
|
5dE1T4oBgHgl3EQfTAM3/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
6tE5T4oBgHgl3EQfPw5R/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0aa089410482e3b8e239c4daeb154da00b1f938224a1aedb6fbe20459d0d0d98
|
3 |
+
size 1703981
|
79AzT4oBgHgl3EQfE_pK/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8afa56797092ba656ec64adcbbcd3831cf73ba77c257e8369657e932f20aa5fc
|
3 |
+
size 133263
|
7NE2T4oBgHgl3EQfkwf2/content/tmp_files/2301.03983v1.pdf.txt
ADDED
@@ -0,0 +1,862 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.03983v1 [cs.IT] 10 Jan 2023
|
2 |
+
On the Performance of Dual RIS-assisted V2I
|
3 |
+
Communication under Nakagami-m Fading
|
4 |
+
Mohd Hamza Naim Shaikh, Khaled Rabie◦, Xingwang Li#, Theodoros Tsiftsis†, and Galymzhan Nauryzbayev
|
5 |
+
School of Engineering and Digital Sciences, Nazarbayev University, Nur-Sultan City, 010000, Kazakhstan
|
6 |
+
◦Department of Engineering, Manchester Metropolitan University, Manchester, M15 6BH, UK
|
7 |
+
#School of Physics and Electronic Information Engineering, Henan Polytechnic University, Jiaozuo 454000, China
|
8 |
+
†Department of Informatics & Telecommunications, University of Thessaly, Greece;
|
9 |
+
†School of Intelligent Systems Science and Engineering, Jinan University, China
|
10 |
+
Email: {hamza.shaikh, galymzhan.nauryzbayev}@nu.edu.kz, ◦[email protected],
|
11 | |
12 |
+
Abstract—Vehicle-to-everything (V2X) connectivity in 5G-and-
|
13 |
+
beyond communication networks supports the futuristic intelligent
|
14 |
+
transportation system (ITS) by allowing vehicles to intelligently
|
15 |
+
connect with everything. The advent of reconfigurable intelligent
|
16 |
+
surfaces (RISs) has led to realizing the true potential of V2X
|
17 |
+
communication. In this work, we propose a dual RIS-based
|
18 |
+
vehicle-to-infrastructure (V2I) communication scheme. Following
|
19 |
+
that, the performance of the proposed communication scheme
|
20 |
+
is evaluated in terms of deriving the closed-form expressions
|
21 |
+
for outage probability, spectral efficiency and energy efficiency.
|
22 |
+
Finally, the analytical findings are corroborated with simulations
|
23 |
+
which illustrate the superiority of the RIS-assisted vehicular
|
24 |
+
networks.
|
25 |
+
Keywords— Reconfigurable intelligent surface (RIS), dual RIS,
|
26 |
+
energy efficiency, spectral efficiency, vehicular communication.
|
27 |
+
I. INTRODUCTION
|
28 |
+
As a key enabler for intelligent transportation systems (ITSs),
|
29 |
+
vehicle-to-everything (V2X) communication has sparked a re-
|
30 |
+
newed interest in the research community. V2X encompasses
|
31 |
+
a wide range of wireless technologies such as vehicle-to-
|
32 |
+
pedestrian (V2P), vehicle-to-infrastructure (V2I), and vehicle-
|
33 |
+
to-vehicle (V2V). Additionally, it also includes the vehicu-
|
34 |
+
lar communications with vulnerable road users (VRUs), grid
|
35 |
+
(V2G), network (V2N) and cloud (V2C) [1]. The V2X com-
|
36 |
+
munications will be a critical component of the futuristic
|
37 |
+
connected and self-driving cars, envisioned and enabled by
|
38 |
+
the sixth-generation (6G) wireless technologies. Furthermore,
|
39 |
+
the V2X communications will also enhance and transform
|
40 |
+
the quality-of-service (QoS) in terms of unparalleled user
|
41 |
+
experience, ultra-high road safety and air quality improvement.
|
42 |
+
In addition, a slew of advanced applications will also be
|
43 |
+
supported like platooning, trajectory alignments, exchanging
|
44 |
+
sensor data and high precision maps, and so on [2]. Thanks to
|
45 |
+
the enhanced capabilities of 6G, vehicles will receive accurate
|
46 |
+
safety information, intelligent traffic management support, and
|
47 |
+
innovative infotainment features. Thus, the 6G services will be
|
48 |
+
used to create a fully automated, autonomous, and ubiquitously
|
49 |
+
connected vehicular network [3].
|
50 |
+
Recently, reconfigurable intelligent surfaces (RISs) have
|
51 |
+
emerged as a breakthrough technology that offers a great deal
|
52 |
+
in terms of wireless communication [4]. Inherently, RIS is a
|
53 |
+
software-defined artificial structure made up of a large number
|
54 |
+
of scattering passive elements, termed as reflecting units (RUs).
|
55 |
+
These RUs are capable to adjust the electromagnetic (EM)
|
56 |
+
properties of a reflected wave that is incident on them. Thus,
|
57 |
+
RIS can use not only this ability to boost the received signal’s
|
58 |
+
power, but also the capability to create an additional reflective
|
59 |
+
link to mitigate the impact of blockages. With the large number
|
60 |
+
of RUs, RISs are particularly known to have large spectral and
|
61 |
+
energy efficiency [5]. As a result, RIS may be used to improve
|
62 |
+
the quality of vehicular communication through establishing
|
63 |
+
a low-cost, highly energy efficient indirect line-of-sight (LoS)
|
64 |
+
communications [6].
|
65 |
+
In [7], the authors investigated the outage performance for
|
66 |
+
RIS-assisted vehicular communication networks. Likewise, the
|
67 |
+
secrecy outage performance of RIS-aided vehicular communi-
|
68 |
+
cations has been studied in [8]. RISs were also investigated for
|
69 |
+
detecting VRUs such as cyclists, pedestrians and wheelchair
|
70 |
+
users [9]. Specifically, the authors utilized RISs for enhancing
|
71 |
+
the radar visibility for VRUs. Further, in [10], the authors
|
72 |
+
provided a optimization framework for resource allocation
|
73 |
+
in the RIS-aided vehicular communications. Specifically, they
|
74 |
+
jointly optimized the power allocation, RIS reflection coeffi-
|
75 |
+
cients and spectrum allocation for different QoS requirements
|
76 |
+
of the V2V and V2I communication links. Likewise, in [11],
|
77 |
+
the authors discussed a system model where RSU leverages RIS
|
78 |
+
to connect the dark zones, i.e., areas blocked due by obstacles.
|
79 |
+
Moreover, a comprehensive overview on the recent advances
|
80 |
+
in 6G vehicular networks was provided in [12, 13], where the
|
81 |
+
authors also described various open challenges and possible
|
82 |
+
research directions.
|
83 |
+
Motivated by the above, in this work, we investigate the
|
84 |
+
performance of a dual RIS-assisted V2I communication net-
|
85 |
+
work scenario. Specifically, the proposed scenario considers the
|
86 |
+
uplink transmission where the vehicle is communicating with
|
87 |
+
the base station. To enhance the communication capabilities, the
|
88 |
+
vehicle is supported through two RISs which create a virtual
|
89 |
+
line-of-sight (LoS) link, which, otherwise, was inherently non-
|
90 |
+
LoS (NLoS). The major contributions can be summarized as
|
91 |
+
• Explicitly, we invoked the central limit theorem (CLT) to
|
92 |
+
characterize the received signal-to-noise ratio (SNR) for
|
93 |
+
|
94 |
+
Vehicle-to-Vehicle (V2V)
|
95 |
+
Vehicle-to-Infrastructure (V2I)
|
96 |
+
Fig. 1. Schematic for the considered dual RIS-aided V2I communication.
|
97 |
+
the proposed dual RIS case. Further, based on this, we
|
98 |
+
derived the closed-form expression for outage probability.
|
99 |
+
• Further, we derived the closed-form expressions for the
|
100 |
+
upper and lower bounds of SE and EE of the proposed
|
101 |
+
dual RIS-assisted V2I communication scenario.
|
102 |
+
• Finally, as a performance benchmark, the proposed sce-
|
103 |
+
nario is compared with the single RIS-assisted V2I com-
|
104 |
+
munication and with RIS V2I communication. The results
|
105 |
+
show the superiority of the proposed scenario of dual RIS-
|
106 |
+
assisted V2I over the single RIS-assisted V2I communi-
|
107 |
+
cation case.
|
108 |
+
II. SYSTEM MODEL
|
109 |
+
As illustrated in Fig. 1, in this work, we consider a V2I
|
110 |
+
communication model, wherein the vehicular user (V) tries to
|
111 |
+
communicate with a nearby base station (BS). Apart from the
|
112 |
+
direct cellular link, a reflected path through RISs is considered
|
113 |
+
to support this uplink transmission. In particular, we consider
|
114 |
+
a dual RIS-assisted uplink V2I transmission with two RISs,
|
115 |
+
one each placed near V and BS both, respectively. For the two
|
116 |
+
RISs, the number of RUs is assumed to be M1 and M2 for
|
117 |
+
RIS-1 and RIS-2, respectively, while keeping the total number
|
118 |
+
of RUs unchanged, i.e., M1+M2 = N, where N is the number
|
119 |
+
of RUs in large RIS for the single RIS scenario, which is the
|
120 |
+
benchmark for comparison. Thus, based on RIS, the following
|
121 |
+
scenarios are considered in this work
|
122 |
+
• Dual RIS-assisted Transmission (DRAT): In DRAT, the
|
123 |
+
transmission takes place only through the two RISs and
|
124 |
+
the reflected link, as shown in Fig. 1.
|
125 |
+
• Single RIS-assisted Transmission (SRAT): In SRAT, the
|
126 |
+
transmission takes place through single large RIS which
|
127 |
+
is placed near to BS.
|
128 |
+
• Direct Cellular Transmission (DCT): In DCT, V commu-
|
129 |
+
nicates with BS directly without utilizing RISs. Thus, the
|
130 |
+
transmission is inherently NLoS and experiences a higher
|
131 |
+
pathloss exponent. This would also serve as the baseline
|
132 |
+
scheme for the performance comparison of the above two
|
133 |
+
cases.
|
134 |
+
A. Channel Model
|
135 |
+
The channels between V-to-RIS-1 and RIS-2-to-BS can
|
136 |
+
be modeled as deterministic LOS channels as the distances
|
137 |
+
are small and the probability of having LoS is very high.
|
138 |
+
However, the distance between RIS-1 and RIS-2 is large and
|
139 |
+
thus the small scale fading for the channel between the ith
|
140 |
+
element of RIS-1 and the jth element of RIS-2, denoted by
|
141 |
+
hRR
|
142 |
+
ij , is modeled through Nakagami-m fading. Hence, for
|
143 |
+
i = {1, 2, . . ., M1} and j = {1, 2, . . ., M2}. Further, the
|
144 |
+
distances related to the V-to-RIS-1, RIS-1-to-RIS-2 and RIS-2-
|
145 |
+
to-BS links are represented by d1, dRR and d2, respectively.
|
146 |
+
B. Received Signal Model
|
147 |
+
The received base-band signal at BS, denoted by r, for the
|
148 |
+
dual RIS-aided transmission case can be expressed as
|
149 |
+
r =
|
150 |
+
�
|
151 |
+
B Pt
|
152 |
+
��M1
|
153 |
+
i=1
|
154 |
+
�M2
|
155 |
+
j=1 ejφ(1)
|
156 |
+
i hRR
|
157 |
+
ij ejφ(2)
|
158 |
+
j
|
159 |
+
�
|
160 |
+
s + No,
|
161 |
+
(1)
|
162 |
+
where Pt is the transmit power constraint at V, B is the distance-
|
163 |
+
dependent pathloss, s ∼ CN (0, 1) is the transmitted symbol,
|
164 |
+
and No ∼ CN
|
165 |
+
�
|
166 |
+
0, σ2�
|
167 |
+
is the additive white Gaussian noise
|
168 |
+
(AWGN). Further, φ1 and φ2 are the phase of the V-to-RIS1
|
169 |
+
and RIS2-to-BS channels. Further, for a link distance d, B at
|
170 |
+
the carrier frequency of 3 GHz can be given by [14]
|
171 |
+
B(d) [dB] =
|
172 |
+
�
|
173 |
+
−37.5 − 22 log10(d/1 m)
|
174 |
+
if LOS,
|
175 |
+
−35.1 − 36.7 log10(d/1 m)
|
176 |
+
if NLOS.
|
177 |
+
(2)
|
178 |
+
Likewise, instantaneous SNR at BS can be formulated as
|
179 |
+
γ =
|
180 |
+
����
|
181 |
+
�M1
|
182 |
+
i=1
|
183 |
+
�M2
|
184 |
+
j=1 δije
|
185 |
+
j
|
186 |
+
�
|
187 |
+
φ(1)
|
188 |
+
i
|
189 |
+
+φ(2)
|
190 |
+
j
|
191 |
+
−ϕij
|
192 |
+
�����
|
193 |
+
2
|
194 |
+
B Pt
|
195 |
+
σ2
|
196 |
+
,
|
197 |
+
(3)
|
198 |
+
where δij and ϕij denote the amplitude and phase of hRR
|
199 |
+
ij .
|
200 |
+
1) RIS Reflection Parameters: Now, SNR at BS can be
|
201 |
+
maximized through adjusting the phase at RISs to cancel
|
202 |
+
the resultant phase, i.e., φ(1)
|
203 |
+
i
|
204 |
+
+ φ(2)
|
205 |
+
j
|
206 |
+
− ϕij = 0, for i =
|
207 |
+
{1, 2, . . ., M1} and j = {1, 2, . . ., M2}. Thus, by substituting
|
208 |
+
ϕij = φ(1)
|
209 |
+
i
|
210 |
+
+ φ(2)
|
211 |
+
j , ∀i, j, the received signal power at BS can
|
212 |
+
be maximized. Consequently, maximized SNR corresponding
|
213 |
+
to the optimal phase can be given as
|
214 |
+
γmax =
|
215 |
+
����M1
|
216 |
+
i=1
|
217 |
+
�M2
|
218 |
+
j=1 δij
|
219 |
+
���
|
220 |
+
2
|
221 |
+
B Pt
|
222 |
+
σ2
|
223 |
+
= A2B Pt
|
224 |
+
σ2
|
225 |
+
= A2 B ¯γ,
|
226 |
+
(4)
|
227 |
+
where A2 =
|
228 |
+
���
|
229 |
+
�M1
|
230 |
+
i=1
|
231 |
+
�M2
|
232 |
+
j=1 δij
|
233 |
+
���
|
234 |
+
2
|
235 |
+
is the cascaded channel gain
|
236 |
+
provided by RISs, and ¯γ = Pt/σ2 is transmit SNR.
|
237 |
+
Likewise, proceeding in the similar way, for the SRAT
|
238 |
+
scenario, maximized SNR at BS can be given as1
|
239 |
+
ˆγmax =
|
240 |
+
��N
|
241 |
+
i=1 βi
|
242 |
+
�2
|
243 |
+
¯�� = B2¯γ,
|
244 |
+
(5)
|
245 |
+
where βi is the amplitude of a channel between RIS and
|
246 |
+
V, denoted by hRU
|
247 |
+
i
|
248 |
+
, i.e., hRU
|
249 |
+
i
|
250 |
+
= βie−jϕi, and B2 is the
|
251 |
+
corresponding channel gain provided by single RIS.
|
252 |
+
1For the SRAT scenario, the analysis is similar. Thus, the detailed description
|
253 |
+
is omitted for the sake of brevity. In particular, for SRAT, large RIS with N
|
254 |
+
RUs is present near BS, where N = M1 + M2. Likewise, the RIS-to-BS link
|
255 |
+
is also modeled as Nakagami-m fading with the rest of the parameters being
|
256 |
+
the same, as in DRAT, like transmit power constraint at V, etc.
|
257 |
+
|
258 |
+
III. PERFORMANCE ANALYSIS
|
259 |
+
This section initially evaluates SNR for the dual RIS-aided
|
260 |
+
V2I scenario. Utilizing the SNR expressions formulated earlier,
|
261 |
+
the outage probability, SE and EE are derived.
|
262 |
+
A. Statistical Characterization of the Dual RIS Channel Gain
|
263 |
+
Now utilizing CLT for M
|
264 |
+
≫ 1, A = �M1
|
265 |
+
i=1
|
266 |
+
�M2
|
267 |
+
j=1 δij
|
268 |
+
can be approximated through a Gaussian distribution, i.e.,
|
269 |
+
A ∼ N(µy, σ2
|
270 |
+
y) [15], with a probability density function (PDF)
|
271 |
+
given by
|
272 |
+
fA(y) =
|
273 |
+
|
274 |
+
|
275 |
+
|
276 |
+
1
|
277 |
+
√
|
278 |
+
2πσ2
|
279 |
+
A exp
|
280 |
+
�
|
281 |
+
−(y−µA)2
|
282 |
+
2σ2
|
283 |
+
A
|
284 |
+
�
|
285 |
+
,
|
286 |
+
if y > 0,
|
287 |
+
0,
|
288 |
+
if y = 0,
|
289 |
+
(6)
|
290 |
+
where µA = �M1
|
291 |
+
i=1
|
292 |
+
�M2
|
293 |
+
j=1 µij, σ2
|
294 |
+
A = �M1
|
295 |
+
i=1
|
296 |
+
�M2
|
297 |
+
j=1 σ2
|
298 |
+
ij. Here,
|
299 |
+
µij and σ2
|
300 |
+
ij are the mean and variance of the random variable
|
301 |
+
δij, which follows the Nakagami-m distribution. Hence, µij =
|
302 |
+
Γ(m1+ 1
|
303 |
+
2 )
|
304 |
+
Γ(m1)
|
305 |
+
�� Ωm1
|
306 |
+
m1
|
307 |
+
�
|
308 |
+
and σ2
|
309 |
+
ij = Ωm1
|
310 |
+
�
|
311 |
+
1 −
|
312 |
+
1
|
313 |
+
m1
|
314 |
+
�
|
315 |
+
Γ(m1+ 1
|
316 |
+
2 )
|
317 |
+
Γ(m1)
|
318 |
+
�2�
|
319 |
+
,
|
320 |
+
for all i = {1, . . . , M1} and j = {1, . . ., M2}.
|
321 |
+
Likewise the cumulative distribution function (CDF) of A
|
322 |
+
can be derived from its PDF as
|
323 |
+
FA(y)=
|
324 |
+
� y
|
325 |
+
−∞
|
326 |
+
fA(y)dy =
|
327 |
+
�
|
328 |
+
1−Q
|
329 |
+
�
|
330 |
+
y−µA
|
331 |
+
σ2
|
332 |
+
A
|
333 |
+
�
|
334 |
+
,
|
335 |
+
if y > 0,
|
336 |
+
0,
|
337 |
+
if y = 0.
|
338 |
+
(7)
|
339 |
+
B. Outage Probability
|
340 |
+
The normalized instantaneous rate, denoted by Rin, for the
|
341 |
+
DRAT scenario can be formulated from (4) and expressed as
|
342 |
+
Rin = log2 (1 + γmax) = log2
|
343 |
+
�
|
344 |
+
1 + A2¯γ
|
345 |
+
�
|
346 |
+
.
|
347 |
+
(8)
|
348 |
+
Now, the end-to-end outage from V to BS via RIS, denoted by
|
349 |
+
Pout, can be defined in terms of a rate threshold, Rth, as
|
350 |
+
Pout = Pr [Rin < Rth] = Pr
|
351 |
+
�
|
352 |
+
log2
|
353 |
+
�
|
354 |
+
1 + A2¯γ
|
355 |
+
�
|
356 |
+
< Rth
|
357 |
+
�
|
358 |
+
= Pr
|
359 |
+
|
360 |
+
A <
|
361 |
+
�
|
362 |
+
2Rth − 1
|
363 |
+
¯γ
|
364 |
+
|
365 |
+
= Pr [A < Υth] ,
|
366 |
+
(9)
|
367 |
+
where Υth =
|
368 |
+
�
|
369 |
+
2Rth −1
|
370 |
+
¯γ
|
371 |
+
. Thus, the closed-form expression of
|
372 |
+
the outage probability DRAT can be evaluated as
|
373 |
+
Pout =
|
374 |
+
� Υth
|
375 |
+
0
|
376 |
+
fA(y)dy,
|
377 |
+
=FA (Υth) = 1 − Q
|
378 |
+
�Υth − µA
|
379 |
+
σ2
|
380 |
+
A
|
381 |
+
�
|
382 |
+
.
|
383 |
+
(10)
|
384 |
+
C. Spectral Efficiency
|
385 |
+
SE for the DRAT scenario can be defined from (8) as
|
386 |
+
SE =E [Rin] = E
|
387 |
+
�
|
388 |
+
log2
|
389 |
+
�
|
390 |
+
1 + A2 B ¯γ
|
391 |
+
��
|
392 |
+
,
|
393 |
+
=
|
394 |
+
� ∞
|
395 |
+
0
|
396 |
+
log2
|
397 |
+
�
|
398 |
+
1 + y2 B ¯γ
|
399 |
+
�
|
400 |
+
fA(y)dy.
|
401 |
+
(11)
|
402 |
+
The exact derivation of the integral in (11) is mathematically
|
403 |
+
intractable, and thus a closed-form expression may not be
|
404 |
+
derived. Hence, we resort to approximate SE with tight upper
|
405 |
+
and lower bounds by invoking Jensen’s inequality.
|
406 |
+
1) Upper Bound: Applying Jensen’s inequality, we define
|
407 |
+
the upper bound for SE as SEu, where SE ≤ SEu. Now,
|
408 |
+
SEu can be evaluated from (11) as
|
409 |
+
SEu = log2
|
410 |
+
�
|
411 |
+
1 + ¯γ B E
|
412 |
+
�
|
413 |
+
A2��
|
414 |
+
,
|
415 |
+
(12)
|
416 |
+
and expressed as
|
417 |
+
SEu = log2 [1 + ¯γ B M1M2 Ωm1
|
418 |
+
×
|
419 |
+
�
|
420 |
+
1 + (M1 M2 − 1)
|
421 |
+
m1
|
422 |
+
�Γ(m1 + 1
|
423 |
+
2)
|
424 |
+
Γ(m1)
|
425 |
+
�2��
|
426 |
+
.
|
427 |
+
(13)
|
428 |
+
Evaluation of Upper Bound: In (12), E
|
429 |
+
�
|
430 |
+
A2�
|
431 |
+
can be evaluated
|
432 |
+
utilizing the relation Var [X] = E
|
433 |
+
�
|
434 |
+
X2�
|
435 |
+
− (E [X])2 as
|
436 |
+
E
|
437 |
+
�
|
438 |
+
A2�
|
439 |
+
=Var [A] + (E [A])2 = σ2
|
440 |
+
A + µ2
|
441 |
+
A.
|
442 |
+
(14)
|
443 |
+
After substituting the values of µ2
|
444 |
+
A and σ2
|
445 |
+
A in (12), the upper
|
446 |
+
bound for DRAT-based SE can be evaluated.
|
447 |
+
2) Lower Bound: Likewise, we define the lower bound for
|
448 |
+
SE as SEl, where SE ≥ SEl. Now, SEl can again be be
|
449 |
+
defined from (11) as
|
450 |
+
SEl = log2
|
451 |
+
�
|
452 |
+
1 +
|
453 |
+
¯γ B
|
454 |
+
E
|
455 |
+
� 1
|
456 |
+
A2
|
457 |
+
�
|
458 |
+
�
|
459 |
+
,
|
460 |
+
(15)
|
461 |
+
and expressed as given in (16), on the top of next page.
|
462 |
+
Evaluation of Lower Bound: In (15), the expectation
|
463 |
+
E
|
464 |
+
�
|
465 |
+
1/A2�
|
466 |
+
can be solved utilizing the Taylor series expansion
|
467 |
+
and approximated as [15]
|
468 |
+
E
|
469 |
+
� 1
|
470 |
+
A2
|
471 |
+
�
|
472 |
+
≈
|
473 |
+
1
|
474 |
+
E [A2] + Var
|
475 |
+
�
|
476 |
+
A2�
|
477 |
+
[E [A2]]3 .
|
478 |
+
(17)
|
479 |
+
Since the statistical characteristics of A is known to be Gaussian
|
480 |
+
distributed (as discussed earlier in subsection A), A2 will
|
481 |
+
follow a non-central chi-square distribution. Thus, the mean
|
482 |
+
and variance of A2 can be expressed as
|
483 |
+
Var
|
484 |
+
�
|
485 |
+
A2�
|
486 |
+
= 2 σ2
|
487 |
+
A
|
488 |
+
�
|
489 |
+
σ2
|
490 |
+
A + 2 µ2
|
491 |
+
A
|
492 |
+
�
|
493 |
+
,
|
494 |
+
(18)
|
495 |
+
E
|
496 |
+
�
|
497 |
+
A2�
|
498 |
+
= σ2
|
499 |
+
A + µ2
|
500 |
+
A,
|
501 |
+
(19)
|
502 |
+
respectively. Thus, utilizing these expressions and substituting
|
503 |
+
the values of µ2
|
504 |
+
A and σ2
|
505 |
+
A, the lower bound for SE of the DRAT
|
506 |
+
scenario can be evaluated.
|
507 |
+
3) Approximation for Large M: We define SE as approx-
|
508 |
+
imate SE (ASE) for large M1 and M2. Now, with the upper
|
509 |
+
and lower bounds of SE of the DRAT scenario, exact SE lies
|
510 |
+
in-between and can be expressed as
|
511 |
+
SEl ≤ SE ≤ SEu.
|
512 |
+
(20)
|
513 |
+
However, for larger M1 and M2, i.e., M1, M2 ≫ 1, both SEl
|
514 |
+
and SEu converge to SE. Thus, ASE can be given as
|
515 |
+
SE = log2
|
516 |
+
�
|
517 |
+
1 + ¯γ B M 2
|
518 |
+
1 M 2
|
519 |
+
2 Ωm1
|
520 |
+
m1
|
521 |
+
�Γ(m1 + 1
|
522 |
+
2)
|
523 |
+
Γ(m1)
|
524 |
+
�2�
|
525 |
+
.
|
526 |
+
(21)
|
527 |
+
It can be noted from (21) that, through utilizing dual RIS,
|
528 |
+
the fourth order channel gain can be realized, i.e., M 2
|
529 |
+
1 M 2
|
530 |
+
2 ,
|
531 |
+
whereas, for single RIS, the maximum channel gain is of the
|
532 |
+
second order, i.e., N 2.
|
533 |
+
|
534 |
+
SEl = log2
|
535 |
+
|
536 |
+
1 + ¯γ B
|
537 |
+
M1M2 Ωm1
|
538 |
+
�
|
539 |
+
1 + (M1 M2−1)
|
540 |
+
m1
|
541 |
+
� Γ(m1+ 1
|
542 |
+
2 )
|
543 |
+
Γ(m1)
|
544 |
+
�2�3
|
545 |
+
2
|
546 |
+
�
|
547 |
+
1 + (2M1 M2−1)
|
548 |
+
m1
|
549 |
+
� Γ(m1+ 1
|
550 |
+
2 )
|
551 |
+
Γ(m1)
|
552 |
+
�2� �
|
553 |
+
1 −
|
554 |
+
1
|
555 |
+
m1
|
556 |
+
� Γ(m1+ 1
|
557 |
+
2 )
|
558 |
+
Γ(m1)
|
559 |
+
�2�
|
560 |
+
+
|
561 |
+
�
|
562 |
+
1 + (M1 M2−1)
|
563 |
+
m1
|
564 |
+
� Γ(m1+ 1
|
565 |
+
2 )
|
566 |
+
Γ(m1)
|
567 |
+
�2�2
|
568 |
+
|
569 |
+
|
570 |
+
(16)
|
571 |
+
TABLE I
|
572 |
+
SIMULATION PARAMETERS
|
573 |
+
Parameter
|
574 |
+
Simulation Values
|
575 |
+
Circuit Power
|
576 |
+
PBS=10 dBm, PU=10 dBm [5]
|
577 |
+
Fading Parameter for DRAT
|
578 |
+
m1= 10
|
579 |
+
Fading Parameter for Direct Links
|
580 |
+
m3= 1
|
581 |
+
RIS Power Consumption
|
582 |
+
PRE = 10 dBm [5]
|
583 |
+
HPA Power Consumption Factor
|
584 |
+
α = 1.2
|
585 |
+
Noise Floor
|
586 |
+
σ2 = -120 dBm
|
587 |
+
D. Energy Efficiency
|
588 |
+
Now, EE of the dual RIS-aided system is defined as the
|
589 |
+
ratio of SE over the total power consumed and can be ex-
|
590 |
+
pressed as EE =
|
591 |
+
SE
|
592 |
+
Ptot , where Ptot denotes the total power
|
593 |
+
consumed, which consists of the transmit power, the circuit
|
594 |
+
power consumption at BS and V, and the power consumed at
|
595 |
+
RIS. Considering all the power consumed, the EE in can be
|
596 |
+
expressed
|
597 |
+
EE =
|
598 |
+
SE
|
599 |
+
(1 + ξ)Pt + P c
|
600 |
+
V + (M1 + M2)P c
|
601 |
+
RIS + P c
|
602 |
+
BS
|
603 |
+
,
|
604 |
+
(22)
|
605 |
+
where P c
|
606 |
+
RIS denotes the power utilized by each RU, ξ =
|
607 |
+
1
|
608 |
+
ω
|
609 |
+
and ω is the drain efficiency of HPA. Likewise, P c
|
610 |
+
V , i.e., the
|
611 |
+
power consumed in other circuit components excluding HPA at
|
612 |
+
V and P c
|
613 |
+
BS is the circuit power consumption at BS.
|
614 |
+
This completes the analytical derivation of the outage, SE,
|
615 |
+
and EE for DRAT of the uplink of V2I communication.
|
616 |
+
IV. SIMULATION RESULTS
|
617 |
+
This section discusses and presents the simulation results for
|
618 |
+
the performance of the dual RIS-assisted V2I communication.
|
619 |
+
Further, the results for the SRAT and DCT scenarios are
|
620 |
+
presented for the sake of comparison. The distances between
|
621 |
+
V-to-RIS1, RIS1-to-RIS2 and RIS2-to-BS are assumed to be
|
622 |
+
5, 100 and 5 meters, respectively. Similarly for the simulation
|
623 |
+
purpose, M = M1 = M2 and N is taken as to be N = 2 M,
|
624 |
+
in order to maintain the fairness in the comparison. The rest of
|
625 |
+
the simulation parameters are summarized in Table I.
|
626 |
+
Fig. 2 shows the SE performance for the DRAT scenario,
|
627 |
+
where the solid lines without marker points show the exact
|
628 |
+
(simulation) performance of DRAT, whereas the markers show
|
629 |
+
the analytically derived upper and lower bounds on SE. Ad-
|
630 |
+
ditionally, ASE for large M is also plotted. The simulation
|
631 |
+
verifies that the derived upper and lower bounds are quite
|
632 |
+
tight as the analytically derived bounds are remarkably close
|
633 |
+
to the actual performance. Further, it can also be noted that
|
634 |
+
the difference between exact SE and ASE (as shown in (21))
|
635 |
+
diminishes as M increases. For instance, at M = 10 and
|
636 |
+
0
|
637 |
+
5
|
638 |
+
10
|
639 |
+
15
|
640 |
+
20
|
641 |
+
25
|
642 |
+
30
|
643 |
+
35
|
644 |
+
40
|
645 |
+
45
|
646 |
+
50
|
647 |
+
SNR (dB)
|
648 |
+
0
|
649 |
+
2
|
650 |
+
4
|
651 |
+
6
|
652 |
+
8
|
653 |
+
10
|
654 |
+
12
|
655 |
+
14
|
656 |
+
16
|
657 |
+
18
|
658 |
+
20
|
659 |
+
SE (bps/Hz)
|
660 |
+
Sim
|
661 |
+
UB
|
662 |
+
LB
|
663 |
+
Approx
|
664 |
+
M = 10, 20, 50, 100
|
665 |
+
Fig. 2. SE with respect to ¯γ for different M of the proposed DRAT scenario.
|
666 |
+
0
|
667 |
+
500
|
668 |
+
1000
|
669 |
+
1500
|
670 |
+
2000
|
671 |
+
2500
|
672 |
+
M
|
673 |
+
0
|
674 |
+
5
|
675 |
+
10
|
676 |
+
15
|
677 |
+
20
|
678 |
+
25
|
679 |
+
SE (bps/Hz)
|
680 |
+
DRAT
|
681 |
+
SRAT
|
682 |
+
DCT
|
683 |
+
Fig. 3. SE with respect to M for the proposed DRAT scenario.
|
684 |
+
0
|
685 |
+
2
|
686 |
+
4
|
687 |
+
6
|
688 |
+
8
|
689 |
+
10
|
690 |
+
12
|
691 |
+
14
|
692 |
+
16
|
693 |
+
18
|
694 |
+
20
|
695 |
+
SNR (dB)
|
696 |
+
10-6
|
697 |
+
10-5
|
698 |
+
10-4
|
699 |
+
10-3
|
700 |
+
10-2
|
701 |
+
10-1
|
702 |
+
100
|
703 |
+
Outage
|
704 |
+
Rth=5
|
705 |
+
Rth=7.5
|
706 |
+
Rth=10
|
707 |
+
Fig. 4. Outage with respect to Pt for different rate thresholds for DRAT.
|
708 |
+
¯γ = 30 dB, SE is 1.5037 bps/Hz whereas SE is 1.5034
|
709 |
+
bps/Hz; however, at M = 50 and ¯γ = 15 dB, SE is 5.2201
|
710 |
+
whereas SE is 5.2200 bps/Hz. Thus, it shows that the bounds
|
711 |
+
are quite accurate and near to the exact simulation value.
|
712 |
+
Fig. 3 shows the SE results for the DRAT scenario, and
|
713 |
+
compares them with the SRAT and DCT scenarios. Specifically,
|
714 |
+
it shows SE for a varying number of RUs. The following
|
715 |
+
observations can be easily inferred from this plot: 1) Apart
|
716 |
+
from smaller M, SE of DRAT is always better than SE of the
|
717 |
+
SRAT scheme due to the fourth order gain provided by dual
|
718 |
+
RIS. This can also be inferred from the analytical evaluation in
|
719 |
+
(31). 2) Due to the multiplicative pathloss, for less number of
|
720 |
+
RUs, i.e., smaller M, the DCT scenario may provide better SE
|
721 |
+
performance than the RIS-reflected link for both DRAT and
|
722 |
+
|
723 |
+
0
|
724 |
+
500
|
725 |
+
1000
|
726 |
+
1500
|
727 |
+
2000
|
728 |
+
2500
|
729 |
+
M
|
730 |
+
0
|
731 |
+
0.1
|
732 |
+
0.2
|
733 |
+
0.3
|
734 |
+
0.4
|
735 |
+
0.5
|
736 |
+
0.6
|
737 |
+
0.7
|
738 |
+
EE (bits/Hz/Joule)
|
739 |
+
DRAT
|
740 |
+
SRAT
|
741 |
+
DCT
|
742 |
+
(a) EE with respect to M, here Pt = 10 dBm.
|
743 |
+
0
|
744 |
+
5
|
745 |
+
10
|
746 |
+
15
|
747 |
+
20
|
748 |
+
25
|
749 |
+
30
|
750 |
+
SNR (dB)
|
751 |
+
0
|
752 |
+
0.5
|
753 |
+
1
|
754 |
+
1.5
|
755 |
+
EE (bits/Hz/Joule)
|
756 |
+
DRAT
|
757 |
+
SRAT
|
758 |
+
DCT
|
759 |
+
(b) EE with respect to SNR, here M = 1000.
|
760 |
+
Fig. 5. EE comparison for DRAT with respect to the SRAT and DCT scenarios.
|
761 |
+
SRAT scenarios. However, as the number of RUs increases,
|
762 |
+
the RIS-based scenarios outperform DCT. 3) Similar to single
|
763 |
+
RIS, dual RIS-based DRAT also suffers from the multiplicative
|
764 |
+
effect of pathloss. Thus, for smaller RUs, the SRAT scenario
|
765 |
+
shows better SE than the DRAT one. 4) As the number of RUs
|
766 |
+
increases sufficiently, DRAT outperforms SRAT significantly.
|
767 |
+
Fig. 4 shows the outage probability of the DRAT scenario for
|
768 |
+
three different rate thresholds, i.e., Rth = {5, 7.5, 10} bps/Hz.
|
769 |
+
As evident from the result, the outage can be improved either
|
770 |
+
through increasing the transmit power or the number of RUs.
|
771 |
+
Since, the transmit power at BS is usually constrained, RIS
|
772 |
+
provides an alternate to improve the outage through increasing
|
773 |
+
RUs, instead of increasing the transmit power. Thus, to circum-
|
774 |
+
vent the power constraint, the number of RUs at RIS can be
|
775 |
+
scaled accordingly.
|
776 |
+
Fig. 5 shows the EE results of the DRAT scenario, the EE
|
777 |
+
plots of the SRAT and DCT scenarios are also plotted here
|
778 |
+
for comparison. Specifically, in Fig. 5(a), the performance is
|
779 |
+
with respect to M, while in Fig. 5(b), the EE curve is plotted
|
780 |
+
against SNR. It can be observed that, for large M, the DRAT
|
781 |
+
scenario is the most energy-efficient. Although, for smaller M,
|
782 |
+
single RIS provides better EE; this is due to the fact that the
|
783 |
+
received signal of the dual RIS-reflected link suffers from the
|
784 |
+
multiplicative pathloss that can be mitigated by by large M.
|
785 |
+
From the above results on SE and EE, it can be easily inferred
|
786 |
+
that the proposed DRAT scheme outperforms SRAT in terms of
|
787 |
+
both SE as well as EE. Similarly, the above results also show
|
788 |
+
that, for a fixed rate requirement, DRAT requires lower transmit
|
789 |
+
power and hence is more energy efficient.
|
790 |
+
V. CONCLUSION
|
791 |
+
V2X has opened up a slew of novel possibilities in the
|
792 |
+
wireless vehicular communication arena, but its potential for
|
793 |
+
enabling true ITS has yet to be explored completely, despite
|
794 |
+
its significant importance in the safety of autonomous driving.
|
795 |
+
In this work, we have envisioned the integration of RIS into
|
796 |
+
vehicular networks to realize the true potential in enhancing the
|
797 |
+
performance of the V2I communication. Specifically, we have
|
798 |
+
evaluated the performance of a dual-RIS assisted V2I uplink
|
799 |
+
communication scenario in terms of the outage probability, SE
|
800 |
+
and EE. Novel closed-form expressions are derived and verified
|
801 |
+
through the extensive numerical simulations. The results show
|
802 |
+
a significant gain in the performance can be achieved through
|
803 |
+
the proposed RIS scenario.
|
804 |
+
VI. ACKNOWLEDGEMENT
|
805 |
+
This work was supported by the Nazarbayev University CRP
|
806 |
+
Grant no. 11022021CRP1513.
|
807 |
+
REFERENCES
|
808 |
+
[1] J. Wang, K. Zhu, and E. Hossain, “Green internet of vehicles (IoV) in the
|
809 |
+
6G era: Toward sustainable vehicular communications and networking,”
|
810 |
+
IEEE Trans. Green Commun. Netw., vol. 6, no. 1, pp. 391–423, Mar.
|
811 |
+
2022.
|
812 |
+
[2] Y. Cao, S. Xu, J. Liu, and N. Kato, “Toward smart and secure V2X
|
813 |
+
communication in 5G and beyond: A UAV-enabled aerial intelligent
|
814 |
+
reflecting surface solution,” IEEE Veh. Tech. Mag., 2022.
|
815 |
+
[3] X. Cheng, Z. Huang, and S. Chen, “Vehicular communication channel
|
816 |
+
measurement, modelling, and application for beyond 5G and 6G,” IET
|
817 |
+
Commun., vol. 14, no. 19, pp. 3303–3311, 2020.
|
818 |
+
[4] Q. Wu, S. Zhang, B. Zheng, C. You, and R. Zhang, “Intelligent reflecting
|
819 |
+
surface-aided wireless communications: A tutorial,” IEEE Trans. Com-
|
820 |
+
mun., vol. 69, no. 5, pp. 3313–3351, May 2021.
|
821 |
+
[5] C. Huang, A. Zappone, G. C. Alexandropoulos, M. Debbah, and C. Yuen,
|
822 |
+
“Reconfigurable intelligent surfaces for energy efficiency in wireless
|
823 |
+
communication,” IEEE Trans. Wireless Commun., vol. 18, no. 8, pp.
|
824 |
+
4157–4170, Aug. 2019.
|
825 |
+
[6] M. A. Javed et al., “Reliable communications for cybertwin driven 6G
|
826 |
+
IoVs using intelligent reflecting surfaces,” IEEE Trans. Ind. Info., 2022.
|
827 |
+
[7] J. Wang et al., “Outage analysis for intelligent reflecting surface assisted
|
828 |
+
vehicular communication networks,” in IEEE Global Commun. Conf.,
|
829 |
+
2020, pp. 1–6.
|
830 |
+
[8] Y. Ai et al., “Secure vehicular communications through reconfigurable
|
831 |
+
intelligent surfaces,” IEEE Trans. Veh. Tech., vol. 70, no. 7, pp. 7272–
|
832 |
+
7276, Jul. 2021.
|
833 |
+
[9] S. K. Dehkordi and G. Caire, “Reconfigurable propagation environment
|
834 |
+
for enhancing vulnerable road users’ visibility to automotive radar,” in
|
835 |
+
IEEE Intelligent Veh. Symp. (IV), 2021, pp. 1523–1528.
|
836 |
+
[10] Y. Chen et al., “Resource allocation for intelligent reflecting surface aided
|
837 |
+
vehicular communications,” IEEE Trans. Veh. Tech., vol. 69, no. 10, pp.
|
838 |
+
12 321–12 326, Oct. 2020.
|
839 |
+
[11] A. Al-Hilo et al., “Reconfigurable intelligent surface enabled vehicular
|
840 |
+
communication: Joint user scheduling and passive beamforming,” IEEE
|
841 |
+
Trans. Veh. Tech., vol. 71, no. 3, pp. 2333–2345, Mar. 2022.
|
842 |
+
[12] M.
|
843 |
+
Noor-A-Rahim
|
844 |
+
et
|
845 |
+
al.,
|
846 |
+
“6G
|
847 |
+
for
|
848 |
+
vehicle-to-everything
|
849 |
+
(V2X)
|
850 |
+
communications: Enabling technologies, challenges, and opportunities,”
|
851 |
+
2020. [Online]. Available: https://arxiv.org/abs/2012.07753
|
852 |
+
[13] Y. Zhu et al., “Intelligent reflecting surface-aided vehicular networks
|
853 |
+
toward 6G: Vision, proposal, and future directions,” IEEE Veh. Tech.
|
854 |
+
Mag., vol. 16, no. 4, pp. 48–56, Dec. 2021.
|
855 |
+
[14] E. Bjornson, O. Ozdogan, and E. G. Larsson, “Intelligent reflecting
|
856 |
+
surface versus decode-and-forward: How large surfaces are needed to
|
857 |
+
beat relaying?” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 244–
|
858 |
+
248, 2020.
|
859 |
+
[15] D. Kudathanthirige, D. Gunasinghe, and G. Amarasuriya, “Performance
|
860 |
+
analysis of intelligent reflective surfaces for wireless communication,” in
|
861 |
+
IEEE Int. Conf. Commun. (ICC), 2020, pp. 1–6.
|
862 |
+
|
7NE2T4oBgHgl3EQfkwf2/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,395 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf,len=394
|
2 |
+
page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
3 |
+
page_content='03983v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
4 |
+
page_content='IT] 10 Jan 2023 On the Performance of Dual RIS-assisted V2I Communication under Nakagami-m Fading Mohd Hamza Naim Shaikh,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
5 |
+
page_content=' Khaled Rabie◦,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
6 |
+
page_content=' Xingwang Li#,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
7 |
+
page_content=' Theodoros Tsiftsis†,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
8 |
+
page_content=' and Galymzhan Nauryzbayev School of Engineering and Digital Sciences,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
9 |
+
page_content=' Nazarbayev University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
10 |
+
page_content=' Nur-Sultan City,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
11 |
+
page_content=' 010000,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
12 |
+
page_content=' Kazakhstan Department of Engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
13 |
+
page_content=' Manchester Metropolitan University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
14 |
+
page_content=' Manchester,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
15 |
+
page_content=' M15 6BH,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
16 |
+
page_content=' UK #School of Physics and Electronic Information Engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
17 |
+
page_content=' Henan Polytechnic University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
18 |
+
page_content=' Jiaozuo 454000,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
19 |
+
page_content=' China †Department of Informatics & Telecommunications,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
20 |
+
page_content=' University of Thessaly,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
21 |
+
page_content=' Greece;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
22 |
+
page_content=' †School of Intelligent Systems Science and Engineering, Jinan University, China Email: {hamza.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
23 |
+
page_content='shaikh, galymzhan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
24 |
+
page_content='nauryzbayev}@nu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
25 |
+
page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
26 |
+
page_content='kz, ◦k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
27 |
+
page_content='rabie@mmu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
28 |
+
page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
29 |
+
page_content='uk, #lixingwang@hpu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
30 |
+
page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
31 |
+
page_content='cn, †tsiftsis@ieee.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
32 |
+
page_content='org Abstract—Vehicle-to-everything (V2X) connectivity in 5G-and- beyond communication networks supports the futuristic intelligent transportation system (ITS) by allowing vehicles to intelligently connect with everything.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
33 |
+
page_content=' The advent of reconfigurable intelligent surfaces (RISs) has led to realizing the true potential of V2X communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
34 |
+
page_content=' In this work, we propose a dual RIS-based vehicle-to-infrastructure (V2I) communication scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
35 |
+
page_content=' Following that, the performance of the proposed communication scheme is evaluated in terms of deriving the closed-form expressions for outage probability, spectral efficiency and energy efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
36 |
+
page_content=' Finally, the analytical findings are corroborated with simulations which illustrate the superiority of the RIS-assisted vehicular networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
37 |
+
page_content=' Keywords— Reconfigurable intelligent surface (RIS), dual RIS, energy efficiency, spectral efficiency, vehicular communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
38 |
+
page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
39 |
+
page_content=' INTRODUCTION As a key enabler for intelligent transportation systems (ITSs), vehicle-to-everything (V2X) communication has sparked a re- newed interest in the research community.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
40 |
+
page_content=' V2X encompasses a wide range of wireless technologies such as vehicle-to- pedestrian (V2P), vehicle-to-infrastructure (V2I), and vehicle- to-vehicle (V2V).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
41 |
+
page_content=' Additionally, it also includes the vehicu- lar communications with vulnerable road users (VRUs), grid (V2G), network (V2N) and cloud (V2C) [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
42 |
+
page_content=' The V2X com- munications will be a critical component of the futuristic connected and self-driving cars, envisioned and enabled by the sixth-generation (6G) wireless technologies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
43 |
+
page_content=' Furthermore, the V2X communications will also enhance and transform the quality-of-service (QoS) in terms of unparalleled user experience, ultra-high road safety and air quality improvement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
44 |
+
page_content=' In addition, a slew of advanced applications will also be supported like platooning, trajectory alignments, exchanging sensor data and high precision maps, and so on [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
45 |
+
page_content=' Thanks to the enhanced capabilities of 6G, vehicles will receive accurate safety information, intelligent traffic management support, and innovative infotainment features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
46 |
+
page_content=' Thus, the 6G services will be used to create a fully automated, autonomous, and ubiquitously connected vehicular network [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
47 |
+
page_content=' Recently, reconfigurable intelligent surfaces (RISs) have emerged as a breakthrough technology that offers a great deal in terms of wireless communication [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
48 |
+
page_content=' Inherently, RIS is a software-defined artificial structure made up of a large number of scattering passive elements, termed as reflecting units (RUs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
49 |
+
page_content=' These RUs are capable to adjust the electromagnetic (EM) properties of a reflected wave that is incident on them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
50 |
+
page_content=' Thus, RIS can use not only this ability to boost the received signal’s power, but also the capability to create an additional reflective link to mitigate the impact of blockages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
51 |
+
page_content=' With the large number of RUs, RISs are particularly known to have large spectral and energy efficiency [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
52 |
+
page_content=' As a result, RIS may be used to improve the quality of vehicular communication through establishing a low-cost, highly energy efficient indirect line-of-sight (LoS) communications [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
53 |
+
page_content=' In [7], the authors investigated the outage performance for RIS-assisted vehicular communication networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
54 |
+
page_content=' Likewise, the secrecy outage performance of RIS-aided vehicular communi- cations has been studied in [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
55 |
+
page_content=' RISs were also investigated for detecting VRUs such as cyclists, pedestrians and wheelchair users [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
56 |
+
page_content=' Specifically, the authors utilized RISs for enhancing the radar visibility for VRUs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
57 |
+
page_content=' Further, in [10], the authors provided a optimization framework for resource allocation in the RIS-aided vehicular communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
58 |
+
page_content=' Specifically, they jointly optimized the power allocation, RIS reflection coeffi- cients and spectrum allocation for different QoS requirements of the V2V and V2I communication links.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
59 |
+
page_content=' Likewise, in [11], the authors discussed a system model where RSU leverages RIS to connect the dark zones, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
60 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
61 |
+
page_content=', areas blocked due by obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
62 |
+
page_content=' Moreover, a comprehensive overview on the recent advances in 6G vehicular networks was provided in [12, 13], where the authors also described various open challenges and possible research directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
63 |
+
page_content=' Motivated by the above, in this work, we investigate the performance of a dual RIS-assisted V2I communication net- work scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
64 |
+
page_content=' Specifically, the proposed scenario considers the uplink transmission where the vehicle is communicating with the base station.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
65 |
+
page_content=' To enhance the communication capabilities, the vehicle is supported through two RISs which create a virtual line-of-sight (LoS) link, which, otherwise, was inherently non- LoS (NLoS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
66 |
+
page_content=' The major contributions can be summarized as Explicitly, we invoked the central limit theorem (CLT) to characterize the received signal-to-noise ratio (SNR) for Vehicle-to-Vehicle (V2V) Vehicle-to-Infrastructure (V2I) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
67 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
68 |
+
page_content=' Schematic for the considered dual RIS-aided V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
69 |
+
page_content=' the proposed dual RIS case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
70 |
+
page_content=' Further, based on this, we derived the closed-form expression for outage probability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
71 |
+
page_content=' Further, we derived the closed-form expressions for the upper and lower bounds of SE and EE of the proposed dual RIS-assisted V2I communication scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
72 |
+
page_content=' Finally, as a performance benchmark, the proposed sce- nario is compared with the single RIS-assisted V2I com- munication and with RIS V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
73 |
+
page_content=' The results show the superiority of the proposed scenario of dual RIS- assisted V2I over the single RIS-assisted V2I communi- cation case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
74 |
+
page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
75 |
+
page_content=' SYSTEM MODEL As illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
76 |
+
page_content=' 1, in this work, we consider a V2I communication model, wherein the vehicular user (V) tries to communicate with a nearby base station (BS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
77 |
+
page_content=' Apart from the direct cellular link, a reflected path through RISs is considered to support this uplink transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
78 |
+
page_content=' In particular, we consider a dual RIS-assisted uplink V2I transmission with two RISs, one each placed near V and BS both, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
79 |
+
page_content=' For the two RISs, the number of RUs is assumed to be M1 and M2 for RIS-1 and RIS-2, respectively, while keeping the total number of RUs unchanged, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
80 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
81 |
+
page_content=', M1+M2 = N, where N is the number of RUs in large RIS for the single RIS scenario, which is the benchmark for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
82 |
+
page_content=' Thus, based on RIS, the following scenarios are considered in this work Dual RIS-assisted Transmission (DRAT): In DRAT, the transmission takes place only through the two RISs and the reflected link, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
83 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
84 |
+
page_content=' Single RIS-assisted Transmission (SRAT): In SRAT, the transmission takes place through single large RIS which is placed near to BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
85 |
+
page_content=' Direct Cellular Transmission (DCT): In DCT, V commu- nicates with BS directly without utilizing RISs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
86 |
+
page_content=' Thus, the transmission is inherently NLoS and experiences a higher pathloss exponent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
87 |
+
page_content=' This would also serve as the baseline scheme for the performance comparison of the above two cases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
88 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
89 |
+
page_content=' Channel Model The channels between V-to-RIS-1 and RIS-2-to-BS can be modeled as deterministic LOS channels as the distances are small and the probability of having LoS is very high.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
90 |
+
page_content=' However, the distance between RIS-1 and RIS-2 is large and thus the small scale fading for the channel between the ith element of RIS-1 and the jth element of RIS-2, denoted by hRR ij , is modeled through Nakagami-m fading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
91 |
+
page_content=' Hence, for i = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
92 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
93 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
94 |
+
page_content=', M1} and j = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
95 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
96 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
97 |
+
page_content=', M2}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
98 |
+
page_content=' Further, the distances related to the V-to-RIS-1, RIS-1-to-RIS-2 and RIS-2- to-BS links are represented by d1, dRR and d2, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
99 |
+
page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
100 |
+
page_content=' Received Signal Model The received base-band signal at BS, denoted by r, for the dual RIS-aided transmission case can be expressed as r = � B Pt ��M1 i=1 �M2 j=1 ejφ(1) i hRR ij ejφ(2) j � s + No, (1) where Pt is the transmit power constraint at V, B is the distance- dependent pathloss, s ∼ CN (0, 1) is the transmitted symbol, and No ∼ CN � 0, σ2� is the additive white Gaussian noise (AWGN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
101 |
+
page_content=' Further, φ1 and φ2 are the phase of the V-to-RIS1 and RIS2-to-BS channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
102 |
+
page_content=' Further, for a link distance d, B at the carrier frequency of 3 GHz can be given by [14] B(d) [dB] = � −37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
103 |
+
page_content='5 − 22 log10(d/1 m) if LOS, −35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
104 |
+
page_content='1 − 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
105 |
+
page_content='7 log10(d/1 m) if NLOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
106 |
+
page_content=' (2) Likewise, instantaneous SNR at BS can be formulated as γ = ���� �M1 i=1 �M2 j=1 δije j � φ(1) i +φ(2) j −ϕij ����� 2 B Pt σ2 , (3) where δij and ϕij denote the amplitude and phase of hRR ij .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
107 |
+
page_content=' 1) RIS Reflection Parameters: Now, SNR at BS can be maximized through adjusting the phase at RISs to cancel the resultant phase, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
108 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
109 |
+
page_content=', φ(1) i + φ(2) j − ϕij = 0, for i = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
110 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
111 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
112 |
+
page_content=', M1} and j = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
113 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
114 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
115 |
+
page_content=', M2}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
116 |
+
page_content=' Thus, by substituting ϕij = φ(1) i + φ(2) j , ∀i, j, the received signal power at BS can be maximized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
117 |
+
page_content=' Consequently, maximized SNR corresponding to the optimal phase can be given as γmax = ����M1 i=1 �M2 j=1 δij ��� 2 B Pt σ2 = A2B Pt σ2 = A2 B ¯γ, (4) where A2 = ��� �M1 i=1 �M2 j=1 δij ��� 2 is the cascaded channel gain provided by RISs, and ¯γ = Pt/σ2 is transmit SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
118 |
+
page_content=' Likewise, proceeding in the similar way, for the SRAT scenario, maximized SNR at BS can be given as1 ˆγmax = ��N i=1 βi �2 ¯γ = B2¯γ, (5) where βi is the amplitude of a channel between RIS and V, denoted by hRU i , i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
119 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
120 |
+
page_content=', hRU i = βie−jϕi, and B2 is the corresponding channel gain provided by single RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
121 |
+
page_content=' 1For the SRAT scenario, the analysis is similar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
122 |
+
page_content=' Thus, the detailed description is omitted for the sake of brevity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
123 |
+
page_content=' In particular, for SRAT, large RIS with N RUs is present near BS, where N = M1 + M2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
124 |
+
page_content=' Likewise, the RIS-to-BS link is also modeled as Nakagami-m fading with the rest of the parameters being the same, as in DRAT, like transmit power constraint at V, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
125 |
+
page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
126 |
+
page_content=' PERFORMANCE ANALYSIS This section initially evaluates SNR for the dual RIS-aided V2I scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
127 |
+
page_content=' Utilizing the SNR expressions formulated earlier, the outage probability, SE and EE are derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
128 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
129 |
+
page_content=' Statistical Characterization of the Dual RIS Channel Gain Now utilizing CLT for M ≫ 1, A = �M1 i=1 �M2 j=1 δij can be approximated through a Gaussian distribution, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
130 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
131 |
+
page_content=', A ∼ N(µy, σ2 y) [15], with a probability density function (PDF) given by fA(y) = \uf8f1 \uf8f2 \uf8f3 1 √ 2πσ2 A exp � −(y−µA)2 2σ2 A � , if y > 0, 0, if y = 0, (6) where µA = �M1 i=1 �M2 j=1 µij, σ2 A = �M1 i=1 �M2 j=1 σ2 ij.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
132 |
+
page_content=' Here, µij and σ2 ij are the mean and variance of the random variable δij, which follows the Nakagami-m distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
133 |
+
page_content=' Hence, µij = Γ(m1+ 1 2 ) Γ(m1) �� Ωm1 m1 � and σ2 ij = Ωm1 � 1 − 1 m1 � Γ(m1+ 1 2 ) Γ(m1) �2� , for all i = {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
134 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
135 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
136 |
+
page_content=' , M1} and j = {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
137 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
138 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
139 |
+
page_content=', M2}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
140 |
+
page_content=' Likewise the cumulative distribution function (CDF) of A can be derived from its PDF as FA(y)= � y −∞ fA(y)dy = � 1−Q � y−µA σ2 A � , if y > 0, 0, if y = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
141 |
+
page_content=' (7) B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
142 |
+
page_content=' Outage Probability The normalized instantaneous rate, denoted by Rin, for the DRAT scenario can be formulated from (4) and expressed as Rin = log2 (1 + γmax) = log2 � 1 + A2¯γ � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
143 |
+
page_content=' (8) Now, the end-to-end outage from V to BS via RIS, denoted by Pout, can be defined in terms of a rate threshold, Rth, as Pout = Pr [Rin < Rth] = Pr � log2 � 1 + A2¯γ � < Rth � = Pr \uf8ee \uf8f0A < � 2Rth − 1 ¯γ \uf8f9 \uf8fb = Pr [A < Υth] , (9) where Υth = � 2Rth −1 ¯γ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
144 |
+
page_content=' Thus, the closed-form expression of the outage probability DRAT can be evaluated as Pout = � Υth 0 fA(y)dy, =FA (Υth) = 1 − Q �Υth − µA σ2 A � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
145 |
+
page_content=' (10) C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
146 |
+
page_content=' Spectral Efficiency SE for the DRAT scenario can be defined from (8) as SE =E [Rin] = E � log2 � 1 + A2 B ¯γ �� , = � ∞ 0 log2 � 1 + y2 B ¯γ � fA(y)dy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
147 |
+
page_content=' (11) The exact derivation of the integral in (11) is mathematically intractable, and thus a closed-form expression may not be derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
148 |
+
page_content=' Hence, we resort to approximate SE with tight upper and lower bounds by invoking Jensen’s inequality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
149 |
+
page_content=' 1) Upper Bound: Applying Jensen’s inequality, we define the upper bound for SE as SEu, where SE ≤ SEu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
150 |
+
page_content=' Now, SEu can be evaluated from (11) as SEu = log2 � 1 + ¯γ B E � A2�� , (12) and expressed as SEu = log2 [1 + ¯γ B M1M2 Ωm1 × � 1 + (M1 M2 − 1) m1 �Γ(m1 + 1 2) Γ(m1) �2�� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
151 |
+
page_content=' (13) Evaluation of Upper Bound: In (12), E � A2� can be evaluated utilizing the relation Var [X] = E � X2� − (E [X])2 as E � A2� =Var [A] + (E [A])2 = σ2 A + µ2 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
152 |
+
page_content=' (14) After substituting the values of µ2 A and σ2 A in (12), the upper bound for DRAT-based SE can be evaluated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
153 |
+
page_content=' 2) Lower Bound: Likewise, we define the lower bound for SE as SEl, where SE ≥ SEl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
154 |
+
page_content=' Now, SEl can again be be defined from (11) as SEl = log2 � 1 + ¯γ B E � 1 A2 � � , (15) and expressed as given in (16), on the top of next page.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
155 |
+
page_content=' Evaluation of Lower Bound: In (15), the expectation E � 1/A2� can be solved utilizing the Taylor series expansion and approximated as [15] E � 1 A2 � ≈ 1 E [A2] + Var � A2� [E [A2]]3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
156 |
+
page_content=' (17) Since the statistical characteristics of A is known to be Gaussian distributed (as discussed earlier in subsection A), A2 will follow a non-central chi-square distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
157 |
+
page_content=' Thus, the mean and variance of A2 can be expressed as Var � A2� = 2 σ2 A � σ2 A + 2 µ2 A � , (18) E � A2� = σ2 A + µ2 A, (19) respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
158 |
+
page_content=' Thus, utilizing these expressions and substituting the values of µ2 A and σ2 A, the lower bound for SE of the DRAT scenario can be evaluated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
159 |
+
page_content=' 3) Approximation for Large M: We define SE as approx- imate SE (ASE) for large M1 and M2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
160 |
+
page_content=' Now, with the upper and lower bounds of SE of the DRAT scenario, exact SE lies in-between and can be expressed as SEl ≤ SE ≤ SEu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
161 |
+
page_content=' (20) However, for larger M1 and M2, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
162 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
163 |
+
page_content=', M1, M2 ≫ 1, both SEl and SEu converge to SE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
164 |
+
page_content=' Thus, ASE can be given as SE = log2 � 1 + ¯γ B M 2 1 M 2 2 Ωm1 m1 �Γ(m1 + 1 2) Γ(m1) �2� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
165 |
+
page_content=' (21) It can be noted from (21) that, through utilizing dual RIS, the fourth order channel gain can be realized, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
166 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
167 |
+
page_content=', M 2 1 M 2 2 , whereas, for single RIS, the maximum channel gain is of the second order, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
168 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
169 |
+
page_content=', N 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
170 |
+
page_content=' SEl = log2 \uf8ee \uf8ef\uf8ef\uf8ef\uf8f01 + ¯γ B M1M2 Ωm1 � 1 + (M1 M2−1) m1 � Γ(m1+ 1 2 ) Γ(m1) �2�3 2 � 1 + (2M1 M2−1) m1 � Γ(m1+ 1 2 ) Γ(m1) �2� � 1 − 1 m1 � Γ(m1+ 1 2 ) Γ(m1) �2� + � 1 + (M1 M2−1) m1 � Γ(m1+ 1 2 ) Γ(m1) �2�2 \uf8f9 \uf8fa\uf8fa\uf8fa\uf8fb (16) TABLE I SIMULATION PARAMETERS Parameter Simulation Values Circuit Power PBS=10 dBm,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
171 |
+
page_content=' PU=10 dBm [5] Fading Parameter for DRAT m1= 10 Fading Parameter for Direct Links m3= 1 RIS Power Consumption PRE = 10 dBm [5] HPA Power Consumption Factor α = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
172 |
+
page_content='2 Noise Floor σ2 = -120 dBm D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
173 |
+
page_content=' Energy Efficiency Now, EE of the dual RIS-aided system is defined as the ratio of SE over the total power consumed and can be ex- pressed as EE = SE Ptot , where Ptot denotes the total power consumed, which consists of the transmit power, the circuit power consumption at BS and V, and the power consumed at RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
174 |
+
page_content=' Considering all the power consumed, the EE in can be expressed EE = SE (1 + ξ)Pt + P c V + (M1 + M2)P c RIS + P c BS , (22) where P c RIS denotes the power utilized by each RU, ξ = 1 ω and ω is the drain efficiency of HPA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
175 |
+
page_content=' Likewise, P c V , i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
176 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
177 |
+
page_content=', the power consumed in other circuit components excluding HPA at V and P c BS is the circuit power consumption at BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
178 |
+
page_content=' This completes the analytical derivation of the outage, SE, and EE for DRAT of the uplink of V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
179 |
+
page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
180 |
+
page_content=' SIMULATION RESULTS This section discusses and presents the simulation results for the performance of the dual RIS-assisted V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
181 |
+
page_content=' Further, the results for the SRAT and DCT scenarios are presented for the sake of comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
182 |
+
page_content=' The distances between V-to-RIS1, RIS1-to-RIS2 and RIS2-to-BS are assumed to be 5, 100 and 5 meters, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
183 |
+
page_content=' Similarly for the simulation purpose, M = M1 = M2 and N is taken as to be N = 2 M, in order to maintain the fairness in the comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
184 |
+
page_content=' The rest of the simulation parameters are summarized in Table I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
185 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
186 |
+
page_content=' 2 shows the SE performance for the DRAT scenario, where the solid lines without marker points show the exact (simulation) performance of DRAT, whereas the markers show the analytically derived upper and lower bounds on SE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
187 |
+
page_content=' Ad- ditionally, ASE for large M is also plotted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
188 |
+
page_content=' The simulation verifies that the derived upper and lower bounds are quite tight as the analytically derived bounds are remarkably close to the actual performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
189 |
+
page_content=' Further, it can also be noted that the difference between exact SE and ASE (as shown in (21)) diminishes as M increases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
190 |
+
page_content=' For instance, at M = 10 and 0 5 10 15 20 25 30 35 40 45 50 SNR (dB) 0 2 4 6 8 10 12 14 16 18 20 SE (bps/Hz) Sim UB LB Approx M = 10, 20, 50, 100 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
191 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
192 |
+
page_content=' SE with respect to ¯γ for different M of the proposed DRAT scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
193 |
+
page_content=' 0 500 1000 1500 2000 2500 M 0 5 10 15 20 25 SE (bps/Hz) DRAT SRAT DCT Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
194 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
195 |
+
page_content=' SE with respect to M for the proposed DRAT scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
196 |
+
page_content=' 0 2 4 6 8 10 12 14 16 18 20 SNR (dB) 10-6 10-5 10-4 10-3 10-2 10-1 100 Outage Rth=5 Rth=7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
197 |
+
page_content='5 Rth=10 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
198 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
199 |
+
page_content=' Outage with respect to Pt for different rate thresholds for DRAT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
200 |
+
page_content=' ¯γ = 30 dB, SE is 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
201 |
+
page_content='5037 bps/Hz whereas SE is 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
202 |
+
page_content='5034 bps/Hz;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
203 |
+
page_content=' however, at M = 50 and ¯γ = 15 dB, SE is 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
204 |
+
page_content='2201 whereas SE is 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
205 |
+
page_content='2200 bps/Hz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
206 |
+
page_content=' Thus, it shows that the bounds are quite accurate and near to the exact simulation value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
207 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
208 |
+
page_content=' 3 shows the SE results for the DRAT scenario, and compares them with the SRAT and DCT scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
209 |
+
page_content=' Specifically, it shows SE for a varying number of RUs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
210 |
+
page_content=' The following observations can be easily inferred from this plot: 1) Apart from smaller M, SE of DRAT is always better than SE of the SRAT scheme due to the fourth order gain provided by dual RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
211 |
+
page_content=' This can also be inferred from the analytical evaluation in (31).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
212 |
+
page_content=' 2) Due to the multiplicative pathloss, for less number of RUs, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
213 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
214 |
+
page_content=', smaller M, the DCT scenario may provide better SE performance than the RIS-reflected link for both DRAT and 0 500 1000 1500 2000 2500 M 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
215 |
+
page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
216 |
+
page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
217 |
+
page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
218 |
+
page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
219 |
+
page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
220 |
+
page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
221 |
+
page_content='7 EE (bits/Hz/Joule) DRAT SRAT DCT (a) EE with respect to M, here Pt = 10 dBm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
222 |
+
page_content=' 0 5 10 15 20 25 30 SNR (dB) 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
223 |
+
page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
224 |
+
page_content='5 EE (bits/Hz/Joule) DRAT SRAT DCT (b) EE with respect to SNR, here M = 1000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
225 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
226 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
227 |
+
page_content=' EE comparison for DRAT with respect to the SRAT and DCT scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
228 |
+
page_content=' SRAT scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
229 |
+
page_content=' However, as the number of RUs increases, the RIS-based scenarios outperform DCT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
230 |
+
page_content=' 3) Similar to single RIS, dual RIS-based DRAT also suffers from the multiplicative effect of pathloss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
231 |
+
page_content=' Thus, for smaller RUs, the SRAT scenario shows better SE than the DRAT one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
232 |
+
page_content=' 4) As the number of RUs increases sufficiently, DRAT outperforms SRAT significantly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
233 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
234 |
+
page_content=' 4 shows the outage probability of the DRAT scenario for three different rate thresholds, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
235 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
236 |
+
page_content=', Rth = {5, 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
237 |
+
page_content='5, 10} bps/Hz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
238 |
+
page_content=' As evident from the result, the outage can be improved either through increasing the transmit power or the number of RUs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
239 |
+
page_content=' Since, the transmit power at BS is usually constrained, RIS provides an alternate to improve the outage through increasing RUs, instead of increasing the transmit power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
240 |
+
page_content=' Thus, to circum- vent the power constraint, the number of RUs at RIS can be scaled accordingly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
241 |
+
page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
242 |
+
page_content=' 5 shows the EE results of the DRAT scenario, the EE plots of the SRAT and DCT scenarios are also plotted here for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
243 |
+
page_content=' Specifically, in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
244 |
+
page_content=' 5(a), the performance is with respect to M, while in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
245 |
+
page_content=' 5(b), the EE curve is plotted against SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
246 |
+
page_content=' It can be observed that, for large M, the DRAT scenario is the most energy-efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
247 |
+
page_content=' Although, for smaller M, single RIS provides better EE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
248 |
+
page_content=' this is due to the fact that the received signal of the dual RIS-reflected link suffers from the multiplicative pathloss that can be mitigated by by large M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
249 |
+
page_content=' From the above results on SE and EE, it can be easily inferred that the proposed DRAT scheme outperforms SRAT in terms of both SE as well as EE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
250 |
+
page_content=' Similarly, the above results also show that, for a fixed rate requirement, DRAT requires lower transmit power and hence is more energy efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
251 |
+
page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
252 |
+
page_content=' CONCLUSION V2X has opened up a slew of novel possibilities in the wireless vehicular communication arena, but its potential for enabling true ITS has yet to be explored completely, despite its significant importance in the safety of autonomous driving.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
253 |
+
page_content=' In this work, we have envisioned the integration of RIS into vehicular networks to realize the true potential in enhancing the performance of the V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
254 |
+
page_content=' Specifically, we have evaluated the performance of a dual-RIS assisted V2I uplink communication scenario in terms of the outage probability, SE and EE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
255 |
+
page_content=' Novel closed-form expressions are derived and verified through the extensive numerical simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
256 |
+
page_content=' The results show a significant gain in the performance can be achieved through the proposed RIS scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
257 |
+
page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
258 |
+
page_content=' ACKNOWLEDGEMENT This work was supported by the Nazarbayev University CRP Grant no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
259 |
+
page_content=' 11022021CRP1513.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
260 |
+
page_content=' REFERENCES [1] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
261 |
+
page_content=' Wang, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
262 |
+
page_content=' Zhu, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
263 |
+
page_content=' Hossain, “Green internet of vehicles (IoV) in the 6G era: Toward sustainable vehicular communications and networking,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
264 |
+
page_content=' Green Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
265 |
+
page_content=' Netw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
266 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
267 |
+
page_content=' 6, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
268 |
+
page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
269 |
+
page_content=' 391–423, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
270 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
271 |
+
page_content=' [2] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
272 |
+
page_content=' Cao, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
273 |
+
page_content=' Xu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
274 |
+
page_content=' Liu, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
275 |
+
page_content=' Kato, “Toward smart and secure V2X communication in 5G and beyond: A UAV-enabled aerial intelligent reflecting surface solution,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
276 |
+
page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
277 |
+
page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
278 |
+
page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
279 |
+
page_content=' [3] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
280 |
+
page_content=' Cheng, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
281 |
+
page_content=' Huang, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
282 |
+
page_content=' Chen, “Vehicular communication channel measurement, modelling, and application for beyond 5G and 6G,” IET Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
283 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
284 |
+
page_content=' 14, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
285 |
+
page_content=' 19, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
286 |
+
page_content=' 3303–3311, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
287 |
+
page_content=' [4] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
288 |
+
page_content=' Wu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
289 |
+
page_content=' Zhang, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
290 |
+
page_content=' Zheng, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
291 |
+
page_content=' You, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
292 |
+
page_content=' Zhang, “Intelligent reflecting surface-aided wireless communications: A tutorial,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
293 |
+
page_content=' Com- mun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
294 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
295 |
+
page_content=' 69, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
296 |
+
page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
297 |
+
page_content=' 3313–3351, May 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
298 |
+
page_content=' [5] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
299 |
+
page_content=' Huang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
300 |
+
page_content=' Zappone, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
301 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
302 |
+
page_content=' Alexandropoulos, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
303 |
+
page_content=' Debbah, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
304 |
+
page_content=' Yuen, “Reconfigurable intelligent surfaces for energy efficiency in wireless communication,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
305 |
+
page_content=' Wireless Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
306 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
307 |
+
page_content=' 18, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
308 |
+
page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
309 |
+
page_content=' 4157–4170, Aug.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
310 |
+
page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
311 |
+
page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
312 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
313 |
+
page_content=' Javed et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
314 |
+
page_content=', “Reliable communications for cybertwin driven 6G IoVs using intelligent reflecting surfaces,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
315 |
+
page_content=' Ind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
316 |
+
page_content=' Info.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
317 |
+
page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
318 |
+
page_content=' [7] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
319 |
+
page_content=' Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
320 |
+
page_content=', “Outage analysis for intelligent reflecting surface assisted vehicular communication networks,” in IEEE Global Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
321 |
+
page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
322 |
+
page_content=', 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
323 |
+
page_content=' 1–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
324 |
+
page_content=' [8] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
325 |
+
page_content=' Ai et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
326 |
+
page_content=', “Secure vehicular communications through reconfigurable intelligent surfaces,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
327 |
+
page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
328 |
+
page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
329 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
330 |
+
page_content=' 70, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
331 |
+
page_content=' 7, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
332 |
+
page_content=' 7272– 7276, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
333 |
+
page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
334 |
+
page_content=' [9] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
335 |
+
page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
336 |
+
page_content=' Dehkordi and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
337 |
+
page_content=' Caire, “Reconfigurable propagation environment for enhancing vulnerable road users’ visibility to automotive radar,” in IEEE Intelligent Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
338 |
+
page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
339 |
+
page_content=' (IV), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
340 |
+
page_content=' 1523–1528.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
341 |
+
page_content=' [10] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
342 |
+
page_content=' Chen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
343 |
+
page_content=', “Resource allocation for intelligent reflecting surface aided vehicular communications,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
344 |
+
page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
345 |
+
page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
346 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
347 |
+
page_content=' 69, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
348 |
+
page_content=' 10, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
349 |
+
page_content=' 12 321–12 326, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
350 |
+
page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
351 |
+
page_content=' [11] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
352 |
+
page_content=' Al-Hilo et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
353 |
+
page_content=', “Reconfigurable intelligent surface enabled vehicular communication: Joint user scheduling and passive beamforming,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
354 |
+
page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
355 |
+
page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
356 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
357 |
+
page_content=' 71, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
358 |
+
page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
359 |
+
page_content=' 2333–2345, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
360 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
361 |
+
page_content=' [12] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
362 |
+
page_content=' Noor-A-Rahim et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
363 |
+
page_content=', “6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities,” 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
364 |
+
page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
365 |
+
page_content=' Available: https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
366 |
+
page_content='org/abs/2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
367 |
+
page_content='07753 [13] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
368 |
+
page_content=' Zhu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
369 |
+
page_content=', “Intelligent reflecting surface-aided vehicular networks toward 6G: Vision, proposal, and future directions,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
370 |
+
page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
371 |
+
page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
372 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
373 |
+
page_content=' 16, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
374 |
+
page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
375 |
+
page_content=' 48–56, Dec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
376 |
+
page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
377 |
+
page_content=' [14] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
378 |
+
page_content=' Bjornson, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
379 |
+
page_content=' Ozdogan, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
380 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
381 |
+
page_content=' Larsson, “Intelligent reflecting surface versus decode-and-forward: How large surfaces are needed to beat relaying?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
382 |
+
page_content=' IEEE Wireless Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
383 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
384 |
+
page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
385 |
+
page_content=' 9, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
386 |
+
page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
387 |
+
page_content=' 244– 248, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
388 |
+
page_content=' [15] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
389 |
+
page_content=' Kudathanthirige, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
390 |
+
page_content=' Gunasinghe, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
391 |
+
page_content=' Amarasuriya, “Performance analysis of intelligent reflective surfaces for wireless communication,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
392 |
+
page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
393 |
+
page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
394 |
+
page_content=' (ICC), 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
395 |
+
page_content=' 1–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
|
7tE0T4oBgHgl3EQffQCV/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8369595ea6c4ab58f336b2984fe71df4fc2dc632d60ab4826cf38f0bf14178fb
|
3 |
+
size 5505069
|
7tE0T4oBgHgl3EQffQCV/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6adccef6ed621617cec8c0ccb7c8d1203fc77eb0ab63d61ca7b321fed8ab8372
|
3 |
+
size 192388
|
8dAzT4oBgHgl3EQfSPuZ/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:98b695a693e02b9c52b02dfe40c931b50d1b31815f87afcd6b12e39b66186e87
|
3 |
+
size 161506
|
9dAzT4oBgHgl3EQfSfu4/content/tmp_files/2301.01234v1.pdf.txt
ADDED
@@ -0,0 +1,855 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
AmbieGen: A Search-based Framework for Autonomous
|
2 |
+
Systems Testing
|
3 |
+
Dmytro Humeniuk, Foutse Khomh, Giuliano Antoniol
|
4 |
+
Polytechnique Montr´eal, 2500 Chemin de Polytechnique, QC H3T 1J4, Montr´eal,
|
5 |
+
Canada
|
6 |
+
Abstract
|
7 |
+
Thorough testing of safety-critical autonomous systems, such as self-driving
|
8 |
+
cars, autonomous robots, and drones, is essential for detecting potential fail-
|
9 |
+
ures before deployment. One crucial testing stage is model-in-the-loop test-
|
10 |
+
ing, where the system model is evaluated by executing various scenarios in
|
11 |
+
a simulator. However, the search space of possible parameters defining these
|
12 |
+
test scenarios is vast, and simulating all combinations is computationally in-
|
13 |
+
feasible. To address this challenge, we introduce AmbieGen, a search-based
|
14 |
+
test case generation framework for autonomous systems.
|
15 |
+
AmbieGen uses
|
16 |
+
evolutionary search to identify the most critical scenarios for a given system,
|
17 |
+
and has a modular architecture that allows for the addition of new systems
|
18 |
+
under test, algorithms, and search operators. Currently, AmbieGen supports
|
19 |
+
test case generation for autonomous robots and autonomous car lane keep-
|
20 |
+
ing assist systems. In this paper, we provide a high-level overview of the
|
21 |
+
framework’s architecture and demonstrate its practical use cases.
|
22 |
+
Keywords:
|
23 |
+
evolutionary search, autonomous systems, self driving cars,
|
24 |
+
autonomous robots, neural network testing
|
25 |
+
Metadata
|
26 |
+
The project metadata is presented in Table 1.
|
27 |
+
1. Motivation and significance
|
28 |
+
Autonomous systems, including autonomous vehicles, robots, or drones
|
29 |
+
can provide a number of benefits such as driving assistance, high-risk zone
|
30 |
+
Preprint submitted to Science of Computer Programming
|
31 |
+
January 4, 2023
|
32 |
+
arXiv:2301.01234v1 [cs.RO] 1 Jan 2023
|
33 |
+
|
34 |
+
Nr.
|
35 |
+
Code metadata description
|
36 |
+
Please fill in this column
|
37 |
+
C1
|
38 |
+
Current code version
|
39 |
+
v0.1.0
|
40 |
+
C2
|
41 |
+
Permanent link to code/repository
|
42 |
+
used for this code version
|
43 |
+
For
|
44 |
+
example:
|
45 |
+
https://github.
|
46 |
+
com/swat-lab-optimization/
|
47 |
+
AmbieGen-tool
|
48 |
+
C3
|
49 |
+
Permanent
|
50 |
+
link
|
51 |
+
to
|
52 |
+
Reproducible
|
53 |
+
Capsule
|
54 |
+
https://codeocean.com/
|
55 |
+
capsule/1741442/tree
|
56 |
+
C4
|
57 |
+
Legal Code License
|
58 |
+
MIT license (MIT)
|
59 |
+
C5
|
60 |
+
Code versioning system used
|
61 |
+
git
|
62 |
+
C6
|
63 |
+
Software code languages, tools, and
|
64 |
+
services used
|
65 |
+
python
|
66 |
+
C7
|
67 |
+
Compilation requirements, operat-
|
68 |
+
ing environments and dependencies
|
69 |
+
indicated in requirements.txt
|
70 |
+
C8
|
71 |
+
If available, link to developer docu-
|
72 |
+
mentation/manual
|
73 |
+
https://github.com/
|
74 |
+
swat-lab-optimization/
|
75 |
+
AmbieGen-tool/blob/master/
|
76 |
+
README.md
|
77 |
+
C9
|
78 |
+
Support email for questions
|
79 | |
80 |
+
Table 1: Code metadata (mandatory)
|
81 |
+
exploration, and aid in rescue operations. At the same time, these are safety-
|
82 |
+
critical systems and it is very important to ensure they are robust to unseen
|
83 |
+
environments and conditions. This can be done by thorough testing prior
|
84 |
+
to their deployment. Typically, at the initial development stages model-in-
|
85 |
+
the-loop testing is performed [1], where the system is tested in a simulation
|
86 |
+
environment. Given the complexity of autonomous systems, the number of
|
87 |
+
potential test scenarios is vast and exhaustive execution is not feasible. For
|
88 |
+
example, an autonomous vehicle scenario could involve a variety of param-
|
89 |
+
eters such as road topology, the movement and behavior of other vehicles
|
90 |
+
and pedestrians, traffic signs, weather conditions, etc. We surmise that in
|
91 |
+
order to identify the most critical scenarios for a given system, application
|
92 |
+
of search algorithms is necessary.
|
93 |
+
In this work, we propose AmbieGen, a search based framework for gen-
|
94 |
+
erating adversarial test scenarios for autonomous systems.
|
95 |
+
By leveraging
|
96 |
+
evolutionary search AmbieGen allows to find challenging and diverse test
|
97 |
+
scenarios.
|
98 |
+
2
|
99 |
+
|
100 |
+
The problem of identifying critical scenarios for a system has been ad-
|
101 |
+
dressed in several previous works on falsifying temporal logic requirements
|
102 |
+
of cyber-physical systems, such as S-Taliro [2], Breach [3], and ARIsTEO [4].
|
103 |
+
These works typically consider falsifying a model of the system that takes a
|
104 |
+
set of input signals and produces a set of output signals.
|
105 |
+
In our work, we focus on testing autonomous systems for which the input
|
106 |
+
signals are complex and may include data from various sensors and cameras.
|
107 |
+
Generating a valid combination of falsifying input signals (such as lidar read-
|
108 |
+
ings and RGB camera readings) directly would be challenging. Therefore,
|
109 |
+
we propose a method for generating test cases that specify a virtual environ-
|
110 |
+
ment for the autonomous system, rather than the input signals. The input
|
111 |
+
signals are generated in the virtual environment during simulation based on
|
112 |
+
the actions of the autonomous agent.
|
113 |
+
Several approaches have been proposed for generating virtual environ-
|
114 |
+
ments for testing autonomous driving and robotics systems, including As-
|
115 |
+
Fault [5], Frenetic [6], DeepJanus [7], DeepHyperion [8] and others presented
|
116 |
+
at the SBST 2021 [9] and SBST 2022 [10] tool competitions.
|
117 |
+
The tool we present in this paper, AmbieGen, is the winner of SBST 2022
|
118 |
+
tool competition. It could produce the biggest number of diverse fault reveal-
|
119 |
+
ing scenarios for an autonomous vehicle lane keeping assist system (LKAS)
|
120 |
+
given a limited time budget. More details about the search algorithm im-
|
121 |
+
plementation can be found in our research paper [11]. In our work we have
|
122 |
+
shown that the simplified model of the system can be effective in guiding the
|
123 |
+
search for producing the test scenarios for the full, simulator based, model
|
124 |
+
of the system.
|
125 |
+
Our framework can be used for further research in the search algorithms,
|
126 |
+
search operator and fitness function design for autonomous systems adver-
|
127 |
+
sarial testing. We built the framework to be modular, and thus easily cus-
|
128 |
+
tomizable. By referring to project documentation as well as the example
|
129 |
+
implementations we provide, researchers can specify their own test scenario
|
130 |
+
generation problems, fitness functions, crossover and mutation operators.
|
131 |
+
This tool is developed in Python and can be easily run as a python package.
|
132 |
+
More instructions and examples are provided in the AmbieGen repository.
|
133 |
+
2. Software description
|
134 |
+
In this work, we present AmbieGen, an open-source Python framework
|
135 |
+
that utilizes evolutionary search for the generation of test scenarios for au-
|
136 |
+
3
|
137 |
+
|
138 |
+
tonomous systems. Currently, AmbieGen supports the creation of test sce-
|
139 |
+
narios for lane keeping assist systems (LKAS) in autonomous vehicles and
|
140 |
+
for autonomous robots navigating a closed room with obstacles.
|
141 |
+
The test scenarios for LKAS in vehicles are designed to challenge the
|
142 |
+
system with various road topologies, while the scenarios for autonomous
|
143 |
+
robots involve navigating a closed room with obstacles.
|
144 |
+
Examples of the
|
145 |
+
generated scenarios can be seen in Figure 1.
|
146 |
+
Figure 1: An example of the test case for LKAS system (a) and an autonomous robot (b).
|
147 |
+
The x-axis represents the map length in meters, and the y-axis represents the map width
|
148 |
+
in meters.
|
149 |
+
2.1. Software architecture
|
150 |
+
This subsection provides a detailed description of the software imple-
|
151 |
+
mentation of AmbieGen. The key components of AmbieGen are illustrated
|
152 |
+
in Figure 2, which are common components for implementing evolutionary
|
153 |
+
search. We use the Pymoo framework [12] to implement the search algo-
|
154 |
+
rithms. The most important modules and classes are outlined below:
|
155 |
+
• Solution - this is one of the most important classes, which contains all
|
156 |
+
the necessary attributes and functions needed to represent the candi-
|
157 |
+
date solution of the algorithm. It should contain a scenario attribute
|
158 |
+
with the list of test case parameters, function for fitness evaluation,
|
159 |
+
novelty calculation, as well as, optionally, image generation.
|
160 |
+
4
|
161 |
+
|
162 |
+
200
|
163 |
+
a
|
164 |
+
40
|
165 |
+
b
|
166 |
+
口
|
167 |
+
Ci
|
168 |
+
■
|
169 |
+
35-
|
170 |
+
■
|
171 |
+
■
|
172 |
+
■
|
173 |
+
30
|
174 |
+
■
|
175 |
+
25
|
176 |
+
Robotpath
|
177 |
+
20-
|
178 |
+
Walls
|
179 |
+
V
|
180 |
+
国
|
181 |
+
15 -
|
182 |
+
■
|
183 |
+
■
|
184 |
+
口
|
185 |
+
■
|
186 |
+
10
|
187 |
+
5
|
188 |
+
■
|
189 |
+
■
|
190 |
+
fo
|
191 |
+
0
|
192 |
+
0
|
193 |
+
5
|
194 |
+
10
|
195 |
+
15
|
196 |
+
20
|
197 |
+
25
|
198 |
+
200
|
199 |
+
30
|
200 |
+
35
|
201 |
+
40Figure 2: AmbieGen architecture
|
202 |
+
• Sampling - this is the class for initial population generation. At the
|
203 |
+
output it provides N instances of the Solution class, with the initial-
|
204 |
+
ized scenario attribute, defining the test scenario. Typically the test
|
205 |
+
scenario is represented by a two dimensional array, randomly initial-
|
206 |
+
ized based on the minimum and maximum values of the test case pa-
|
207 |
+
rameters, defined in the configuration file. Each column of the array
|
208 |
+
corresponds to some part of the environment. More information about
|
209 |
+
the representation of the test scenarios that we used can be found in
|
210 |
+
the repository page as well as in our research article.
|
211 |
+
• Problem - in this class, we define the logic for evaluating the fitness
|
212 |
+
of each solution. For single-objective search (using GA), we specify
|
213 |
+
the fitness function for evaluating the scenario fault revealing power.
|
214 |
+
For two-objective search (using NSGA-II), we define two objectives:
|
215 |
+
fault revealing power and novelty calculation. The novelty objective
|
216 |
+
is calculated as the average novelty of a given test scenario relative to
|
217 |
+
the 5 solutions with the highest fault revealing power fitness. If the
|
218 |
+
problem has any constraints, such as a minimum required fitness value,
|
219 |
+
they should also be specified in this class.
|
220 |
+
• TC to environment - this is a function to transform the test case (TC)
|
221 |
+
encoded as a 2D array of parameters, to the input format suitable for
|
222 |
+
the system model. For example, for the LKAS problem, the model
|
223 |
+
input is a list of the 2D coordinates of points, defining the road topol-
|
224 |
+
ogy. The test case itself is represented as a sequence of transformations
|
225 |
+
5
|
226 |
+
|
227 |
+
Pymoo
|
228 |
+
post_processing()
|
229 |
+
Sampling
|
230 |
+
Solution object 1
|
231 |
+
TC to environment ()
|
232 |
+
+gen_randomscenario()
|
233 |
+
Solution object 2
|
234 |
+
Problem
|
235 |
+
fitness evaluation ()
|
236 |
+
Solution object 3
|
237 |
+
Solution
|
238 |
+
Crossover
|
239 |
+
+map_size
|
240 |
+
Solution object 4
|
241 |
+
configuration file
|
242 |
+
+scenario
|
243 |
+
Mutation
|
244 |
+
+fitness eval()
|
245 |
+
Population size
|
246 |
+
Solution object N
|
247 |
+
Numberofgenerations
|
248 |
+
+novelty eval()
|
249 |
+
Crossover/mutationrate
|
250 |
+
+build image()
|
251 |
+
TCparameterranges
|
252 |
+
Folderto save resultsneeded to perform to obtain the points. For the autonomous robot the
|
253 |
+
test scenario is represented as a sequence of parameters describing the
|
254 |
+
2D map with obstacles. The TC to environment module is used to
|
255 |
+
create a 2D bitmap from the given parameters. The bitmap is given
|
256 |
+
as the input to the autonomous robot model, which runs a planning
|
257 |
+
algorithm to find the shortest path between the start and goal location.
|
258 |
+
• fitness evaluation - a function to calculate the fitness i.e fault revealing
|
259 |
+
power of the scenario. It takes the output of the TC to environment
|
260 |
+
function as the input and execute the system model. It collects the
|
261 |
+
data about the model behaviour during execution and computes the
|
262 |
+
fitness score. For the LKAS system, the fitness is defined by the biggest
|
263 |
+
deviation from the lane center and for the autonomous robot - by the
|
264 |
+
length of the path to reach the goal.
|
265 |
+
• Crossover - in this class the crossover operator is defined. Currently
|
266 |
+
we are using a one point crossover, which can be applied to fixed and
|
267 |
+
variable length solutions.
|
268 |
+
• Mutation - in this class the mutation operator is implemented. We
|
269 |
+
have 2 types of mutations: exchange and change of variable. In ex-
|
270 |
+
change mutation, two randomly selected columns of the test case are
|
271 |
+
exchanged. In the case of the road topology, it would correspond to
|
272 |
+
exchanging the positions of two random road segments. In change of
|
273 |
+
variable mutation, a randomly selected parameter value in the test case
|
274 |
+
matrix is changed. In the road topology example it could correspond
|
275 |
+
to the change of the length of one of the straight road segments.
|
276 |
+
• post processing - The post-processing module of our framework includes
|
277 |
+
several functions for handling the test suite and its metadata.
|
278 |
+
The
|
279 |
+
function get test suite() retrieves the test suite, get stats() retrieves
|
280 |
+
metadata such as fitness and novelty scores, and save tcs images()
|
281 |
+
saves the images of the test cases. The size of the test suite, denoted
|
282 |
+
as T, can be specified in the configuration file. In our experiments, T
|
283 |
+
was typically set to 30, representing the best solutions found by the
|
284 |
+
algorithm.
|
285 |
+
Metadata for the test suite includes the fitness of the top T solutions,
|
286 |
+
their novelty (calculated as the average novelty between all pairs of
|
287 |
+
scenarios in the test suite), and the convergence (best solution fitness
|
288 |
+
6
|
289 |
+
|
290 |
+
found at each epoch).
|
291 |
+
The post-processing module also includes a
|
292 |
+
compare.py script for comparing the results of different algorithms,
|
293 |
+
using the collected metadata to generate convergence plots and fitness
|
294 |
+
and diversity boxplots.
|
295 |
+
• configuration file - finally we have a configuration file, where the pa-
|
296 |
+
rameters of the algorithm, such as: the population size, the number
|
297 |
+
of generations, crossover/mutation rate, and the test suite size are de-
|
298 |
+
fined. Users should also specify the allowable ranges for the test case
|
299 |
+
parameters and the paths for saving the resulting test suite and its
|
300 |
+
metadata.
|
301 |
+
Currently, when adding a new problem, one should provide the implemen-
|
302 |
+
tation of each of the modules as well as the TC to environment and fitness
|
303 |
+
evaluation functions. We are working on reducing the number of additional
|
304 |
+
implementations needed. Our framework includes the implementation of all
|
305 |
+
the modules for the LKAS and autonomous robot test case generation prob-
|
306 |
+
lems.
|
307 |
+
2.2. Software functionalities
|
308 |
+
AmbieGen public version 0.1.0 as presented in this paper offers the fol-
|
309 |
+
lowing major functionalities:
|
310 |
+
• Autonomous vehicle LKAS system testing: generating scenarios, rep-
|
311 |
+
resented as a list of 2D coordinates defining the road topology.
|
312 |
+
• Autonomous robot testing: generating scenarios, represented as the 2D
|
313 |
+
bitmap, defining obstacle locations in a fixed sized map.
|
314 |
+
• Search-based generation: our framework provides options for search-
|
315 |
+
based test suite generation, including random search, single-objective
|
316 |
+
genetic algorithm (GA), and two-objective genetic algorithm (NSGA-
|
317 |
+
II). The search algorithms are implemented using the Pymoo frame-
|
318 |
+
work [12], and can be easily extended to support additional algorithms
|
319 |
+
supported by Pymoo with minor modifications.
|
320 |
+
The single-objective GA optimizes the test suite for scenario fault re-
|
321 |
+
vealing power, while the two-objective NSGA-II optimizes for both
|
322 |
+
fault revealing power and diversity.
|
323 |
+
As demonstrated in our previ-
|
324 |
+
ous work [11], the two-objective algorithm allows to produce a more
|
325 |
+
diverse set of test scenarios compared to the single-objective search.
|
326 |
+
7
|
327 |
+
|
328 |
+
• Experiment data tracking: AmbieGen tracks the results of each ex-
|
329 |
+
periment and saves them in a user-defined location. The saved data
|
330 |
+
includes the T (as determined by the user) best test scenarios identified
|
331 |
+
based on their fitness or crowding distance, as well as their associated
|
332 |
+
metadata such as fitness, average diversity, and visualizations. This
|
333 |
+
allows for easy analysis and comparison of the results of different ex-
|
334 |
+
periments.
|
335 |
+
2.3. Use cases of the software
|
336 |
+
In this subsection we provide an illustrative example of how to use Am-
|
337 |
+
bieGen to generate test cases for an autonomous robot planning algorithm
|
338 |
+
testing. Suppose we want to perform 30 runs of the NSGA-II algorithm with
|
339 |
+
150 individuals and 200 generations to evaluate this configuration. We want
|
340 |
+
to save the generated test cases, their illustrations as well as their metadata,
|
341 |
+
such as fitness and diversity. Below you can see the configuration file entries
|
342 |
+
with the parameters we chose for the genetic algorithm and well as the path
|
343 |
+
to save the experiment results:
|
344 |
+
ga = {" pop_size ": 150, "n_gen ": 200, "mut_rate ": 0.4, "cross_rate ": 0.9,
|
345 |
+
" test_suite_size ": 30 }
|
346 |
+
files = {" stats_path ": "stats", "tcs_path ": "tcs", "images_path ": images "}
|
347 |
+
Now we are ready to start the test case generation. We can launch Am-
|
348 |
+
bieGen with the following command and parameters:
|
349 |
+
python
|
350 |
+
optimize.py --problem =" robot" --algo =" nsga2" --runs =30 \\
|
351 |
+
--save_results=True
|
352 |
+
The search will start and you could see some printouts, such as in Fig. 3 with
|
353 |
+
the current number of generation (n gen), number of evaluations (n eval),
|
354 |
+
constraint violation (cv min), number of non-dominant solution for NSGA-
|
355 |
+
II algorithm (n nds) and the best solution found (f opt) for GA algorithm.
|
356 |
+
More details about the printed information can be found on the Pymoo page
|
357 |
+
(https://pymoo.org/interface/display.html).
|
358 |
+
After a successful run, you will see the confirmation about the run exe-
|
359 |
+
cution time, saved test cases, their metadata and the images, as in Fig. 4
|
360 |
+
In Fig. 5 you can see examples of the metadata saved, such as the algo-
|
361 |
+
rithm convergence 5a (the best fitness value at each generation in the format
|
362 |
+
”evaluation number”: best fitness found), the fitness of the test cases in the
|
363 |
+
test suite as well as their average diversity i.e., novelty 5b. Novelty is cal-
|
364 |
+
culated as the average diversity of all of the pairs of the test cases in the
|
365 |
+
8
|
366 |
+
|
367 |
+
Figure 3: Printouts during the search
|
368 |
+
Figure 4: Successful run confirmation
|
369 |
+
test suite. In Fig. 6 we show an example of the test case images saved for a
|
370 |
+
particular run.
|
371 |
+
(a) Scenario fitness convergence
|
372 |
+
(b) Final test suite fitness and diversity
|
373 |
+
Figure 5: Metadata for the generated scenarios
|
374 |
+
Finally, let us suppose we also want to run a random search with the same
|
375 |
+
evaluation budget to be able to compare the performance of our configuration
|
376 |
+
of NSGA-II algorithm to some baseline. We can run the random search by
|
377 |
+
9
|
378 |
+
|
379 |
+
01:0602.320 INFO
|
380 |
+
started test generation,writing logs to file: logs.txt
|
381 |
+
-12-9101:0602,320INFO
|
382 |
+
Running the optimization
|
383 |
+
2-12-9801:0602,321INFO
|
384 |
+
Problem: robot,Algorithm:nsga2,Runs number:3e,Saving the results:True
|
385 |
+
2-12-9101:06.02,343INFO
|
386 |
+
Executing run o:
|
387 |
+
2-12-9101:06:02344INFO
|
388 |
+
Using random seed:1753925990
|
389 |
+
n_gen
|
390 |
+
n_eval
|
391 |
+
innds
|
392 |
+
cvmin
|
393 |
+
cv_avg
|
394 |
+
eps
|
395 |
+
indicator
|
396 |
+
1
|
397 |
+
150
|
398 |
+
1
|
399 |
+
5.474517E+01
|
400 |
+
8.330072E+91
|
401 |
+
2
|
402 |
+
300
|
403 |
+
1
|
404 |
+
4.684567E+01
|
405 |
+
7.742613E+01
|
406 |
+
3
|
407 |
+
450
|
408 |
+
1
|
409 |
+
4.436039E+01
|
410 |
+
7.231653E+01
|
411 |
+
4
|
412 |
+
600
|
413 |
+
工
|
414 |
+
3.167410E+01
|
415 |
+
6.692135E+01
|
416 |
+
5
|
417 |
+
750
|
418 |
+
1
|
419 |
+
7.8751083190
|
420 |
+
6.161694E+0103:21:13,072INFO
|
421 |
+
Execution time,6909.677314 sec
|
422 |
+
,088INFO
|
423 |
+
Test suite of 3o test scenarios generated
|
424 |
+
$,103INFO
|
425 |
+
Thehighest fitnessfound:224.994949
|
426 |
+
3:211L3,103INFO
|
427 |
+
Average diversity:0.720751
|
428 |
+
03:21:25,148INFO
|
429 |
+
Stats savedas stats nsga231-12-2022-stats.json
|
430 |
+
03:21:25,157INFO
|
431 |
+
Stats saved asstats nsga231-12-2022-conv.json
|
432 |
+
3:21:25,361INFO
|
433 |
+
Test cases saved as tcs nsga2l31-12-2022-tcs.json
|
434 |
+
03:21:53,871INFO
|
435 |
+
Images saved in tc images nsga2
|
436 |
+
21:53,871INFO
|
437 |
+
Images saved in tcimagesnsga2rung":f
|
438 |
+
"158":97.81219330881972
|
439 |
+
200":99.59797974644661
|
440 |
+
"250":99.59797974644661,
|
441 |
+
"300":186.18376618487352,
|
442 |
+
"350":186.18376618407352,
|
443 |
+
"480":106.18376618407352,
|
444 |
+
"450:107.25483399593897,
|
445 |
+
"500":107.25483399593897,
|
446 |
+
"550":130.56854249492375,
|
447 |
+
"600":130.56854249492375,
|
448 |
+
"650":130.56854249492375,
|
449 |
+
"700":130.56854249492375,
|
450 |
+
"888"130.56854249492375
|
451 |
+
"850":
|
452 |
+
130.56854249492375,
|
453 |
+
"900":rune":f
|
454 |
+
"fitness":[
|
455 |
+
198.7106781186548
|
456 |
+
171.8538238691624,
|
457 |
+
192.02438661763966,
|
458 |
+
194.46803743153552,
|
459 |
+
190.36753236814718,
|
460 |
+
211.88225099390866,
|
461 |
+
209.88225099390866,
|
462 |
+
194.85281374238588,
|
463 |
+
168.71067811865476,
|
464 |
+
191.8822509939086,
|
465 |
+
181.15432893255073,
|
466 |
+
183.39696961967007
|
467 |
+
novelty":0.23096571372433472
|
468 |
+
runi"Figure 6: Images of the generated scenarios
|
469 |
+
executing the following command:
|
470 |
+
python
|
471 |
+
optimize.py --problem =" robot" --algo =" random" --runs =30 \\
|
472 |
+
--save_results=True
|
473 |
+
The random search will be run and the metadata saved, as in the previous
|
474 |
+
case. Now we can compare the results produced by the two different search
|
475 |
+
algorithms via executing the following command:
|
476 |
+
python
|
477 |
+
compare.py --stats_path =" stats_nsga2" " stats_random" \\
|
478 |
+
--stats_names "NSGA -II" "Random"
|
479 |
+
In the stats path argument we specify the paths of the metadata for the
|
480 |
+
runs we wish to compare and in the stats names the names we assign for the
|
481 |
+
runs.
|
482 |
+
In Fig.7 and Fig. 8 we can see examples of the outputs produced by the
|
483 |
+
compare.py script. Fig. 7a shows the fitness and Fig. 7b the diversity of the
|
484 |
+
scenarios in the test suites produced over the specified number of runs. Fig.
|
485 |
+
8 shows the best values found by the compared search algorithms over the
|
486 |
+
generations.
|
487 |
+
3. Illustrative examples
|
488 |
+
In this section, we present the summarized results of several test genera-
|
489 |
+
tion case studies using the AmbieGen tool. The full results can be found in
|
490 |
+
our research paper [11] and the SBST 2022 competition report [10].
|
491 |
+
We conducted a case study on an autonomous robot with an obstacle
|
492 |
+
avoidance algorithm based on nearness diagrams [13]. The robot model was
|
493 |
+
a Pioneer 3-AT equipped with a SICK LMS200 laser with a sensing range
|
494 |
+
of 10 meters. The simulations were run in the Player/Stage simulator [14].
|
495 |
+
10
|
496 |
+
|
497 |
+
2022-10-15-images_fin_rob
|
498 |
+
Vruno
|
499 |
+
o.png
|
500 |
+
1.png
|
501 |
+
2.png
|
502 |
+
Test case fitenss 198.7106781186548
|
503 |
+
3.png
|
504 |
+
Robotpathm
|
505 |
+
质4.png
|
506 |
+
Walls
|
507 |
+
35
|
508 |
+
5.png
|
509 |
+
6.png
|
510 |
+
30
|
511 |
+
7.png
|
512 |
+
25
|
513 |
+
8.png
|
514 |
+
9.png
|
515 |
+
U
|
516 |
+
20
|
517 |
+
10.png
|
518 |
+
U
|
519 |
+
15
|
520 |
+
11.png
|
521 |
+
U
|
522 |
+
10
|
523 |
+
12.png
|
524 |
+
U
|
525 |
+
13.png
|
526 |
+
U
|
527 |
+
5
|
528 |
+
14.png
|
529 |
+
U
|
530 |
+
15.png
|
531 |
+
U
|
532 |
+
0
|
533 |
+
5
|
534 |
+
10
|
535 |
+
15
|
536 |
+
20
|
537 |
+
30
|
538 |
+
35
|
539 |
+
40(a) Scenario fitness
|
540 |
+
(b) Scenario diversity
|
541 |
+
Figure 7: Evaluating the NSGA-II algorithm for autonomous robot test case generation
|
542 |
+
Figure 8: Comparing the convergence of NSGA-II and random search for autonomous
|
543 |
+
robot case study
|
544 |
+
You can see an illustration of the simulation environment in Fig. 9a. We
|
545 |
+
used AmbieGen to generate diverse maps with obstacles to test the robot’s
|
546 |
+
performance. We identified several scenarios in which the robot became stuck
|
547 |
+
and failed to reach its goal location. An example of such a scenario can be
|
548 |
+
found in the following video: Video.
|
549 |
+
To evaluate the effectiveness of our tool, we allocated a two-hour budget
|
550 |
+
for AmbieGen to generate test scenarios. The generated scenarios were then
|
551 |
+
passed to the simulator and executed. We repeated the experiment 30 times,
|
552 |
+
using both the NSGA-II and random search configurations of AmbieGen.
|
553 |
+
The average number of failures detected is shown in Fig. 9b. On average,
|
554 |
+
11
|
555 |
+
|
556 |
+
220
|
557 |
+
NSGA-II
|
558 |
+
Random
|
559 |
+
200
|
560 |
+
180
|
561 |
+
Fitness
|
562 |
+
160
|
563 |
+
140
|
564 |
+
120
|
565 |
+
100
|
566 |
+
80
|
567 |
+
0
|
568 |
+
20
|
569 |
+
40
|
570 |
+
60
|
571 |
+
80
|
572 |
+
100
|
573 |
+
120
|
574 |
+
140
|
575 |
+
Numberofgenerations250
|
576 |
+
200
|
577 |
+
itness
|
578 |
+
.150
|
579 |
+
左 100
|
580 |
+
50
|
581 |
+
0
|
582 |
+
Random
|
583 |
+
NSGA-II
|
584 |
+
Algorithm0.8
|
585 |
+
0.6
|
586 |
+
Novelty
|
587 |
+
0.4
|
588 |
+
0.2
|
589 |
+
0.0
|
590 |
+
Random
|
591 |
+
NSGA-II
|
592 |
+
AlgorithmAmbieGen detected 9 failures in two hours, compared to 2 failures for random
|
593 |
+
search
|
594 |
+
(a) Executing autonomous robot scenario in the Play-
|
595 |
+
er/Stage simulator
|
596 |
+
(b) The number of failures revealed by AmbieGen for
|
597 |
+
the robot case study
|
598 |
+
Figure 9: Using AmbieGen for testing autonomous robot navigation algorithm
|
599 |
+
In the second case study, we evaluated the performance of our test gener-
|
600 |
+
ation tool on an autonomous vehicle lane keeping assist system (LKAS) using
|
601 |
+
the BeamNg simulator [15]. We used the AmbieGen tool to generate diverse,
|
602 |
+
fault-revealing road topologies, which were then simulated in the BeamNg
|
603 |
+
environment (shown in Fig. 10a). During the simulations, we identified a
|
604 |
+
number of scenarios in which the vehicle left its lane (an example of which
|
605 |
+
can be seen in the video at Video).
|
606 |
+
We ran our tool for a time budget of 2 hours, using the SBST22 compe-
|
607 |
+
tition code pipeline. The failure criterion for the LKAS system was defined
|
608 |
+
as more than 85% of the car’s area leaving the lane. The driving agent had
|
609 |
+
a maximum speed of 70 Km/h. We compared the results of AmbieGen’s
|
610 |
+
NSGA-II configuration, Random Search configuration, and the Frenetic tool
|
611 |
+
[6], which was also given a 2-hour time budget for test generation.
|
612 |
+
As shown in Fig. 10b, out of 30 runs, AmbieGen and Frenetic on average
|
613 |
+
produced almost the same number of failures (14), while Random Search
|
614 |
+
produced an average of 9 failures.
|
615 |
+
The obtained results suggest that AmbieGen could effectively identify
|
616 |
+
failures in the autonomous systems under test.
|
617 |
+
4. Impact
|
618 |
+
Autonomous systems testing is an important area of research, and finding
|
619 |
+
test scenarios that reveal a diverse range of system failures within a limited
|
620 |
+
12
|
621 |
+
|
622 |
+
25
|
623 |
+
faults
|
624 |
+
20
|
625 |
+
15
|
626 |
+
Revealed
|
627 |
+
10
|
628 |
+
5
|
629 |
+
0
|
630 |
+
AmbieGen
|
631 |
+
RandomSearch
|
632 |
+
Generationmethod(a) Executing the LKAS scenario in the BeamNg sim-
|
633 |
+
ulator
|
634 |
+
(b) The number of failures revealed by AmbieGen for
|
635 |
+
the LKAS case study
|
636 |
+
Figure 10: Using AmbieGen to test autonomous vehicle LKAS model
|
637 |
+
time and evaluation budget is a significant challenge [16]. One of the common
|
638 |
+
solutions is to use evolutionary search to guide the sampling towards more
|
639 |
+
challenging scenarios [5, 7]. These search based techniques allow to identify
|
640 |
+
potential failures and improve the overall reliability of the system.
|
641 |
+
AmbieGen is a test generation tool that uses evolutionary search to gen-
|
642 |
+
erate test scenarios for autonomous systems. Its modular design allows for
|
643 |
+
customization of the initial population generation function, fitness evaluation
|
644 |
+
function, search operators (such as crossover and mutation), and the search
|
645 |
+
algorithm itself. Out of the box, AmbieGen supports testing of autonomous
|
646 |
+
robots and vehicle LKAS systems, and additional systems can be added using
|
647 |
+
the provided implementations as examples.
|
648 |
+
AmbieGen is a valuable resource for research on search-based test case
|
649 |
+
generation for autonomous systems. Its built-in modules enable easy com-
|
650 |
+
parison of different search algorithms and their modifications, based on the
|
651 |
+
quality and diversity of the generated solutions, as well as the convergence
|
652 |
+
of the algorithm over time.
|
653 |
+
AmbieGen can help answer research questions that are not frequently
|
654 |
+
discussed in the literature, such as:
|
655 |
+
• To what extent the diversity preservation technique A helps improve
|
656 |
+
the diversity of the test suite? The importance of the diversity in test
|
657 |
+
case generation is extensively discussed in the work of Klikovits et al.
|
658 |
+
[17].
|
659 |
+
• To what extent does the search operator A helps improve the conver-
|
660 |
+
gence over the operator B? To what extent the algorithm A outperforms
|
661 |
+
13
|
662 |
+
|
663 |
+
30
|
664 |
+
25
|
665 |
+
ults
|
666 |
+
20
|
667 |
+
led
|
668 |
+
15
|
669 |
+
veal
|
670 |
+
Rev
|
671 |
+
10
|
672 |
+
5
|
673 |
+
0
|
674 |
+
AmbieGen
|
675 |
+
Frenetic
|
676 |
+
RandomSearch
|
677 |
+
Generationmethodthe algorithm B for the test case generation? Improvements to the base-
|
678 |
+
line genetic algorithms implementations can lead to better results, as
|
679 |
+
discussed by Abdessalem et al. [18], where multi-objective population-
|
680 |
+
based search algorithms and decision tree classification were combined.
|
681 |
+
• What fitness criteria are more relevant for guiding the system towards
|
682 |
+
fault revealing scenarios? This question includes the comparison of the
|
683 |
+
single, multi-objective based search as well surrogate model assisted
|
684 |
+
search.
|
685 |
+
AmbieGen can also be useful in the pursuit of actively studied research ques-
|
686 |
+
tions, where the fault revealing test case generation is required, such as:
|
687 |
+
transferability of failures from simulation to the real world [19], autonomous
|
688 |
+
system failure prediction [20], test case prioritization [21] and others.
|
689 |
+
AmbieGen has proven its effectiveness in fault revealing by winning this
|
690 |
+
year’s edition of the SBST 2022 cyber-physical testing tool competition. Our
|
691 |
+
submission is described in the following article [22] and is available at the fol-
|
692 |
+
lowing link https://github.com/dgumenyuk/tool-competition-av.
|
693 |
+
We
|
694 |
+
have always kept our tool open sourced and we expect more people to start
|
695 |
+
using it. We welcome all the contributions for expanding our framework.
|
696 |
+
5. Conclusions
|
697 |
+
In this paper, we present the AmbieGen framework for search based test
|
698 |
+
case generation for autonomous systems, in its public version 0.1.0.
|
699 |
+
We
|
700 |
+
briefly outline the motivation for developing this framework, its workflow and
|
701 |
+
main functionalities. We also provide illustrative examples for using the tool
|
702 |
+
for autonomous vehicle lane keeping assist system testing and autonomous
|
703 |
+
robot obstacle avoiding algorithm testing.
|
704 |
+
The main features of our tool
|
705 |
+
include:
|
706 |
+
• modular architecture, which allows researchers to easily modify the
|
707 |
+
existing modules, such as initial population generation, crossover, mu-
|
708 |
+
tation, fitness function as well as introduce new problems and run ex-
|
709 |
+
periments;
|
710 |
+
• we provide implementations of test case generation for two systems
|
711 |
+
under test: autonomous vehicle LKAS system and autonomous robot;
|
712 |
+
this implementation includes three search algorithms: random search,
|
713 |
+
14
|
714 |
+
|
715 |
+
single objective genetic algorithm and a two-objective NSGA-II genetic
|
716 |
+
algorithm;
|
717 |
+
• our framework is built to be compatible with Pymoo framework [12],
|
718 |
+
allowing to fully benefit from the Pymoo framework features, such as
|
719 |
+
high number of implemented algorithms in Pymoo.
|
720 |
+
6. Future Plans
|
721 |
+
Our framework currently includes the implementation of two test case
|
722 |
+
generation problems, as well as three algorithms (random search, GA, NSGA-
|
723 |
+
II) for generating test cases. The fitness function is calculated based on a
|
724 |
+
simplified model of the system, and test scenarios are represented as 2D
|
725 |
+
arrays, with each column describing a discrete aspect of the scenario. In the
|
726 |
+
future, we plan to expand the capabilities of our framework to include:
|
727 |
+
• new algorithms, especially the ones based on the quality-diversity search
|
728 |
+
[23]
|
729 |
+
• new test case generation problems, for instance more complex test sce-
|
730 |
+
narios that include moving pedestrians, other vehicles and traffic signs;
|
731 |
+
• new fitness functions e.g based on surrogate models of the system under
|
732 |
+
test, as in the work of Ramakrishna et al. [24], functions based on
|
733 |
+
neuron coverage [25] and surprise adequacy [26] dedicated to testing
|
734 |
+
systems containing neural networks;
|
735 |
+
• add new problem representations, supporting popular scenario specifi-
|
736 |
+
cation languages such as SCENIC [27];
|
737 |
+
• add an integration with popular simulators, for instance CARLA [28]
|
738 |
+
or LGSVL [29]. This will allow to directly evaluate the system model
|
739 |
+
with the generated scenarios. Also the feedback from the simulators
|
740 |
+
could be incorporated in fitness functions for guiding the test scenario
|
741 |
+
sampling.
|
742 |
+
Acknowledgements
|
743 |
+
This work is partly funded by the by the Fonds de Recherche du Qu´ebec
|
744 |
+
(FRQ), the Natural Sciences and Engineering Research Council of Canada
|
745 |
+
(NSERC), and the Canadian Institute for Advanced Research (CIFAR).
|
746 |
+
15
|
747 |
+
|
748 |
+
References
|
749 |
+
[1] D. Bruggner, A. Hegde, F. S. Acerbo, D. Gulati, T. D. Son, Model in the
|
750 |
+
loop testing and validation of embedded autonomous driving algorithms,
|
751 |
+
in: 2021 IEEE Intelligent Vehicles Symposium (IV), IEEE, 2021, pp.
|
752 |
+
136–141.
|
753 |
+
[2] Y. Annpureddy, C. Liu, G. Fainekos, S. Sankaranarayanan, S-taliro: A
|
754 |
+
tool for temporal logic falsification for hybrid systems, in: International
|
755 |
+
Conference on Tools and Algorithms for the Construction and Analysis
|
756 |
+
of Systems, Springer, 2011, pp. 254–257.
|
757 |
+
[3] A. Donz´e, Breach, a toolbox for verification and parameter synthesis
|
758 |
+
of hybrid systems, in: International Conference on Computer Aided
|
759 |
+
Verification, Springer, 2010, pp. 167–170.
|
760 |
+
[4] C. Menghi, S. Nejati, L. Briand, Y. I. Parache, Approximation-
|
761 |
+
refinement testing of compute-intensive cyber-physical models: An ap-
|
762 |
+
proach based on system identification, in: 2020 IEEE/ACM 42nd Inter-
|
763 |
+
national Conference on Software Engineering (ICSE), IEEE, 2020, pp.
|
764 |
+
372–384.
|
765 |
+
[5] A. Gambi, M. Mueller, G. Fraser, Automatically testing self-driving cars
|
766 |
+
with search-based procedural content generation, in: Proceedings of the
|
767 |
+
28th ACM SIGSOFT International Symposium on Software Testing and
|
768 |
+
Analysis, IEEE, 2019, pp. 318–328.
|
769 |
+
[6] E. Castellano, A. Cetinkaya, C. H. Thanh, S. Klikovits, X. Zhang, P. Ar-
|
770 |
+
caini, Frenetic at the sbst 2021 tool competition, in: 2021 IEEE/ACM
|
771 |
+
14th International Workshop on Search-Based Software Testing (SBST),
|
772 |
+
IEEE, 2021, pp. 36–37.
|
773 |
+
[7] V. Riccio, P. Tonella, Model-based exploration of the frontier of be-
|
774 |
+
haviours for deep learning system testing, in: Proceedings of the 28th
|
775 |
+
ACM Joint Meeting on European Software Engineering Conference and
|
776 |
+
Symposium on the Foundations of Software Engineering, 2020, pp. 876–
|
777 |
+
888.
|
778 |
+
[8] T. Zohdinasab, V. Riccio, A. Gambi, P. Tonella, Deephyperion: explor-
|
779 |
+
ing the feature space of deep learning-based systems through illumina-
|
780 |
+
16
|
781 |
+
|
782 |
+
tion search, in: Proceedings of the 30th ACM SIGSOFT International
|
783 |
+
Symposium on Software Testing and Analysis, 2021, pp. 79–90.
|
784 |
+
[9] S. Panichella, A. Gambi, F. Zampetti, V. Riccio, Sbst tool competition
|
785 |
+
2021, in: 2021 IEEE/ACM 14th International Workshop on Search-
|
786 |
+
Based Software Testing (SBST), IEEE, 2021, pp. 20–27.
|
787 |
+
[10] A. Gambi, G. Jahangirova, V. Riccio, F. Zampetti, Sbst tool competition
|
788 |
+
2022, in: 2022 IEEE/ACM 15th International Workshop on Search-
|
789 |
+
Based Software Testing (SBST), IEEE, 2022, pp. 25–32.
|
790 |
+
[11] D. Humeniuk, F. Khomh, G. Antoniol, A search-based framework for
|
791 |
+
automatic generation of testing environments for cyber–physical sys-
|
792 |
+
tems, Information and Software Technology 149 (2022) 106936. doi:
|
793 |
+
https://doi.org/10.1016/j.infsof.2022.106936.
|
794 |
+
[12] J. Blank, K. Deb, pymoo: Multi-objective optimization in python, IEEE
|
795 |
+
Access 8 (2020) 89497–89509.
|
796 |
+
[13] J. Minguez, L. Montano, Nearness diagram (nd) navigation: collision
|
797 |
+
avoidance in troublesome scenarios, IEEE Transactions on Robotics and
|
798 |
+
Automation 20 (1) (2004) 45–59.
|
799 |
+
[14] M. Kranz, R. B. Rusu, A. Maldonado, M. Beetz, A. Schmidt, A play-
|
800 |
+
er/stage system for context-aware intelligent environments, Proceedings
|
801 |
+
of UbiSys 6 (8) (2006) 17–21.
|
802 |
+
[15] BeamNG.tech, Beamng gmbh. (2021).
|
803 |
+
URL https://www.beamng.gmbh/research
|
804 |
+
[16] W. Ding, C. Xu, M. Arief, H. Lin, B. Li, D. Zhao, A survey on
|
805 |
+
safety-critical driving scenario generation – a methodological perspec-
|
806 |
+
tive (2022). doi:10.48550/ARXIV.2202.02215.
|
807 |
+
URL https://arxiv.org/abs/2202.02215
|
808 |
+
[17] S. Klikovits, V. Riccio, E. Castellano, A. Cetinkaya, A. Gambi, P. Ar-
|
809 |
+
caini, Does road diversity really matter in testing automated driving
|
810 |
+
systems?–a registered report, arXiv preprint arXiv:2209.05947 (2022).
|
811 |
+
[18] R. B. Abdessalem, S. Nejati, L. C. Briand, T. Stifter, Testing vision-
|
812 |
+
based control systems using learnable evolutionary algorithms, in: 2018
|
813 |
+
17
|
814 |
+
|
815 |
+
IEEE/ACM 40th International Conference on Software Engineering
|
816 |
+
(ICSE), IEEE, 2018, pp. 1016–1026.
|
817 |
+
[19] A. Stocco, B. Pulfer, P. Tonella, Mind the gap! a study on the transfer-
|
818 |
+
ability of virtual vs physical-world testing of autonomous driving sys-
|
819 |
+
tems, IEEE Transactions on Software Engineering (2022).
|
820 |
+
[20] A. Stocco, P. Tonella, Confidence-driven weighted retraining for pre-
|
821 |
+
dicting safety-critical failures in autonomous driving systems, Journal
|
822 |
+
of Software: Evolution and Process (2021) e2386.
|
823 |
+
[21] A. Arrieta, P. Valle, J. A. Agirre, G. Sagardui, Some seeds are strong:
|
824 |
+
Seeding strategies for search-based test case selection, ACM Transac-
|
825 |
+
tions on Software Engineering and Methodology (2022).
|
826 |
+
[22] D. Humeniuk, G. Antoniol, F. Khomh, Ambiegen tool at the sbst 2022
|
827 |
+
tool competition, in: 2022 IEEE/ACM 15th International Workshop on
|
828 |
+
Search-Based Software Testing (SBST), IEEE, 2022, pp. 43–46.
|
829 |
+
[23] J. K. Pugh, L. B. Soros, K. O. Stanley, Quality diversity: A new frontier
|
830 |
+
for evolutionary computation, Frontiers in Robotics and AI (2016) 40.
|
831 |
+
[24] S. Ramakrishna, B. Luo, Y. Barve, G. Karsai, A. Dubey, Risk-aware
|
832 |
+
scene sampling for dynamic assurance of autonomous systems, in: 2022
|
833 |
+
IEEE International Conference on Assured Autonomy (ICAA), IEEE,
|
834 |
+
2022, pp. 107–116.
|
835 |
+
[25] K. Pei, Y. Cao, J. Yang, S. Jana, Deepxplore: Automated whitebox
|
836 |
+
testing of deep learning systems, in: proceedings of the 26th Symposium
|
837 |
+
on Operating Systems Principles, 2017, pp. 1–18.
|
838 |
+
[26] J. Kim, R. Feldt, S. Yoo, Guiding deep learning system testing using
|
839 |
+
surprise adequacy, in: 2019 IEEE/ACM 41st International Conference
|
840 |
+
on Software Engineering (ICSE), IEEE, 2019, pp. 1039–1049.
|
841 |
+
[27] D. J. Fremont, E. Kim, T. Dreossi, S. Ghosh, X. Yue, A. L. Sangiovanni-
|
842 |
+
Vincentelli, S. A. Seshia, Scenic: A language for scenario specification
|
843 |
+
and data generation, Machine Learning (2022) 1–45.
|
844 |
+
[28] A. Dosovitskiy, G. Ros, F. Codevilla, A. Lopez, V. Koltun, Carla: An
|
845 |
+
open urban driving simulator, in: Conference on robot learning, PMLR,
|
846 |
+
2017, pp. 1–16.
|
847 |
+
18
|
848 |
+
|
849 |
+
[29] G. Rong, B. H. Shin, H. Tabatabaee, Q. Lu, S. Lemke, M. Moˇzeiko,
|
850 |
+
E. Boise, G. Uhm, M. Gerow, S. Mehta, et al., Lgsvl simulator: A high
|
851 |
+
fidelity simulator for autonomous driving, in: 2020 IEEE 23rd Interna-
|
852 |
+
tional conference on intelligent transportation systems (ITSC), IEEE,
|
853 |
+
2020, pp. 1–6.
|
854 |
+
19
|
855 |
+
|
9dAzT4oBgHgl3EQfSfu4/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/2301.05519v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
AdE1T4oBgHgl3EQfpAU_/content/tmp_files/2301.03326v1.pdf.txt
ADDED
@@ -0,0 +1,419 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Simulating the radio emission of dark matter for new
|
2 |
+
high-resolution observations with MeerKAT
|
3 |
+
M Sarkis and G Beck
|
4 |
+
School of Physics, University of the Witwatersrand, Private Bag 3, WITS-2050, Johannesburg,
|
5 |
+
South Africa
|
6 |
+
E-mail: [email protected]
|
7 |
+
Abstract.
|
8 |
+
Recent work has shown that searches for diffuse radio emission by MeerKAT - and
|
9 |
+
eventually the SKA - are well suited to provide some of the strongest constraints yet on dark
|
10 |
+
matter annihilations. To make full use of the observations by these facilities, accurate simulations
|
11 |
+
of the expected dark matter abundance and diffusion mechanisms in these astrophysical objects
|
12 |
+
are required. However, because of the computational costs involved, various mathematical and
|
13 |
+
numerical techniques have been developed to perform the calculations in a feasible manner.
|
14 |
+
Here we provide the first quantitative comparison between methods that are commonly used in
|
15 |
+
the literature, and outline the applicability of each one in various simulation scenarios. These
|
16 |
+
considerations are becoming ever more important as the hunt for dark matter continues into a
|
17 |
+
new era of precision radio observations.
|
18 |
+
1. Introduction
|
19 |
+
Despite decades of work, indirect Dark Matter (DM) searches – those that look for emission from
|
20 |
+
the annihilation and decay products of DM particles – are yet to find a signal that can be solely
|
21 |
+
attributed to DM. Until such a detection is made, and as our observing capabilities improve
|
22 |
+
with newer and more sophisticated telescopes, we continue to methodically move through the
|
23 |
+
parameter spaces of candidate DM models and eliminate those that conflict with the data. The
|
24 |
+
recent public release of the MeerKAT Galaxy Cluster Legacy Survey data [1], together with recent
|
25 |
+
studies that show the competitiveness of using DM radio emission for indirect detection [2, 3, 4],
|
26 |
+
provides strong motivation for a renewed and continued effort in radio DM searches. In this work
|
27 |
+
we take a brief but detailed look at the various theoretical aspects involved in the modelling
|
28 |
+
of the radio emission from DM, and comment on how the choice of model will likely play an
|
29 |
+
important role in indirect searches with high-resolution instruments.
|
30 |
+
Our analysis includes simulations of the DM host environments for two source targets, the
|
31 |
+
Coma galaxy cluster and the M31 galaxy, and a calculation of the synchrotron emission resulting
|
32 |
+
from the annihilation of Weakly Interacting Massive Particles (WIMPs) therein. We model our
|
33 |
+
DM halos with a set of reasonable source parameters and find the emission after solving the
|
34 |
+
electron propagation equation in each environment. The methods of solving this equation are
|
35 |
+
a major focus point of this work, as the choice of technique used can lead to a non-negligible
|
36 |
+
change in the observed emission, particularly in smaller source targets where diffusion effects are
|
37 |
+
significant. With < 10 arcsecond resolution capabilities, observations with MeerKAT (and soon
|
38 |
+
the SKA) are for the first time able to probe the inner regions of these targets, which is where
|
39 |
+
the strongest constraints on DM can be found. Therefore, accurate spatial modelling of these
|
40 |
+
targets is essential for us to make full use of the new data.
|
41 |
+
arXiv:2301.03326v1 [astro-ph.CO] 9 Jan 2023
|
42 |
+
|
43 |
+
2. Modelling
|
44 |
+
The two source targets in this work, the Coma galaxy cluster and the M31 galaxy, were chosen
|
45 |
+
for their well-characterised properties in the literature. Of particular importance are the profiles
|
46 |
+
of their magnetic fields and thermal gas densities; as these quantities appear in the modelling
|
47 |
+
process (but are often underspecified), the uncertainty of the final solution depends strongly
|
48 |
+
on the treatment of these factors [5]. However, since the simulation of the halo environment
|
49 |
+
is not the central focus of this work (and for the sake of brevity), we refer the reader to the
|
50 |
+
following sources for details regarding the parameters in the Coma cluster [6, 7] and in the M31
|
51 |
+
galaxy [8, 9].
|
52 |
+
In each halo environment, the emission of synchrotron radiation will be determined by the
|
53 |
+
spatial and energy equilibrium distribution of charged annihilation products, ψ(x, E). In this
|
54 |
+
work the products considered are electrons and positrons. The evolution of these distributions
|
55 |
+
over time is then given by the following propagation equation, which includes the dominant
|
56 |
+
effects of energy losses and spatial diffusion:
|
57 |
+
∂ψ(x, E)
|
58 |
+
∂t
|
59 |
+
= ∇ ·
|
60 |
+
�
|
61 |
+
D(x, E)∇ψ(x, E)
|
62 |
+
�
|
63 |
+
+ ∂
|
64 |
+
∂E
|
65 |
+
�
|
66 |
+
b(x, E)ψ(x, E)
|
67 |
+
�
|
68 |
+
+ Q(x, E).
|
69 |
+
(1)
|
70 |
+
Here D, b and Q are the diffusion, energy-loss and DM annihilation source functions respectively,
|
71 |
+
and the determination of the exact forms of these functions follows the methods laid out in [5].
|
72 |
+
2.1. Solving the propagation equation
|
73 |
+
We determine the equilibrium electron distribution ψ using two independent techniques. The
|
74 |
+
first, referred to here as the ‘Green’s Function (GF) method’ [2, 10], uses a Green’s function
|
75 |
+
with simplified forms of D and b to solve Eq. 1 semi-analytically. The second, referred to as the
|
76 |
+
‘Alternating Direction Implicit (ADI) method’ [11, 12], uses a numerical approach to solve Eq. 1
|
77 |
+
iteratively. In both methods we consider the halo environment to be spherically symmetric, so
|
78 |
+
that x may be replaced by r in Eq. 1. We also note here that we have assumed a simplified
|
79 |
+
form of D, which would be a tensor in a more general case. As our methodology closely follows
|
80 |
+
the above-mentioned literature, we only summarise these methods and point out any major
|
81 |
+
differences in the following sections.
|
82 |
+
GF method
|
83 |
+
If the forms of the diffusion and energy-loss functions are simplified so that they have
|
84 |
+
no spatial dependence, a solution to Eq. 1 can be found directly with the use of Green’s functions
|
85 |
+
and image charges. However, these simplifications often have an impact on the calculated
|
86 |
+
emission (for a review on this topic, see [5]). In this work we use non-weighted averages for the
|
87 |
+
magnetic field and thermal gas densities, found using an averaging scale radius that matches
|
88 |
+
the scale radius of the DM halo. This choice encapsulates the region in the halo that contains
|
89 |
+
the majority of WIMP annihilations – and thus best represents the spatial structure of the
|
90 |
+
halo – while allowing us to forgo any explicit spatial dependence in Eq. 1. Now, the equilibrium
|
91 |
+
distribution of electrons in the halo can be calculated using
|
92 |
+
ψ(r, E) =
|
93 |
+
1
|
94 |
+
b(E)
|
95 |
+
� mχ
|
96 |
+
E
|
97 |
+
dE′G(r, ∆v)Q(r, E′) ,
|
98 |
+
(2)
|
99 |
+
with mχ as the WIMP mass and the Green’s function (G) given by
|
100 |
+
G(r, ∆v) =
|
101 |
+
1
|
102 |
+
√
|
103 |
+
4π∆v
|
104 |
+
∞
|
105 |
+
�
|
106 |
+
n=−∞
|
107 |
+
(−1)n
|
108 |
+
� rmax
|
109 |
+
0
|
110 |
+
dr′ r′
|
111 |
+
rn
|
112 |
+
�
|
113 |
+
�exp
|
114 |
+
�
|
115 |
+
−(r′ − rn)2
|
116 |
+
4∆v
|
117 |
+
�
|
118 |
+
− exp
|
119 |
+
�
|
120 |
+
−(r′ + rn)2
|
121 |
+
4∆v
|
122 |
+
��
|
123 |
+
� Q(r′)
|
124 |
+
Q(r) .
|
125 |
+
(3)
|
126 |
+
|
127 |
+
Here rmax is the maximum radius for any diffusion processes and rn = (−1)nr + 2nrmax is the
|
128 |
+
location of the nth image charge. The quantity ∆v is calculated as
|
129 |
+
∆v = v(E) − v(E′) ,
|
130 |
+
(4)
|
131 |
+
where
|
132 |
+
v(E) =
|
133 |
+
� mχ
|
134 |
+
E
|
135 |
+
dx D(x)
|
136 |
+
b(x) .
|
137 |
+
(5)
|
138 |
+
ADI method
|
139 |
+
In this method, we discretise Eq. 1 and solve for the equilibrium distribution
|
140 |
+
iteratively. Since the ADI method retains the radial dependence in the diffusion and energy loss
|
141 |
+
functions (where the GF method does not), the problem becomes 2-dimensional in energy and
|
142 |
+
space. Using a traditional finite-difference technique in this scenario could be computationally
|
143 |
+
expensive, which is why we opt for a method that uses so-called ‘operator splitting’ to treat
|
144 |
+
each dimension separately and divide the problem into smaller, more manageable pieces. Thus,
|
145 |
+
during each step of the method, we use a general form of the 1-dimensional Crank-Nicolson
|
146 |
+
(CN), scheme (see, for instance, [13]) which is a finite-differencing technique that includes the
|
147 |
+
average of second-order implicit and explicit terms in the updating equation, thereby leveraging
|
148 |
+
the unconditional stability of a fully implicit method while maintaining second-order accuracy in
|
149 |
+
space and time. This scheme is relatively easy to solve, as the updating equation turns out to be
|
150 |
+
a set of linear equations with tridiagonal coefficient matrices. We write this, as in [11, 12], as
|
151 |
+
− α1
|
152 |
+
2 ψn+1
|
153 |
+
x−1 +
|
154 |
+
�
|
155 |
+
1 + α2
|
156 |
+
2
|
157 |
+
�
|
158 |
+
ψn+1
|
159 |
+
x
|
160 |
+
− α3
|
161 |
+
2 ψn+1
|
162 |
+
x+1 = α1
|
163 |
+
2 ψn
|
164 |
+
x−1 +
|
165 |
+
�
|
166 |
+
1 − α2
|
167 |
+
2
|
168 |
+
�
|
169 |
+
ψn
|
170 |
+
x + α3
|
171 |
+
2 ψn
|
172 |
+
x+1 + Qx∆t.
|
173 |
+
(6)
|
174 |
+
Here n is the temporal grid index (with the spacing between indices given by ∆t) and x represents
|
175 |
+
either the energy or spatial grid index. The forms of the α coefficients, which encapsulate the
|
176 |
+
diffusion and energy loss effects, need to be found by discretising the relevant operators from
|
177 |
+
Eq. 1. The scheme we have used for this is as follows:
|
178 |
+
1
|
179 |
+
r2
|
180 |
+
∂
|
181 |
+
∂r
|
182 |
+
�
|
183 |
+
r2D∂ψ
|
184 |
+
∂r
|
185 |
+
�
|
186 |
+
−−−−−−−−→
|
187 |
+
discretisation C−2
|
188 |
+
˜r
|
189 |
+
�
|
190 |
+
�ψi+1 − ψi−1
|
191 |
+
2∆˜r
|
192 |
+
�
|
193 |
+
log(10)D + ∂D
|
194 |
+
∂˜r
|
195 |
+
������
|
196 |
+
˜r=˜ri
|
197 |
+
+ ψi+1 − 2ψi + ψi−1
|
198 |
+
∆˜r2
|
199 |
+
D|˜r=˜ri
|
200 |
+
�
|
201 |
+
(7)
|
202 |
+
for the radial operator and
|
203 |
+
∂
|
204 |
+
∂E (bψ) −−−−−−−−→
|
205 |
+
discretisation C−1
|
206 |
+
˜E
|
207 |
+
�b| ˜E= ˜Ej(ψj+1 − ψj)
|
208 |
+
∆ ˜E
|
209 |
+
�
|
210 |
+
(8)
|
211 |
+
for energy operator, where C˜r = (r0 log(10)10˜ri), C ˜E = (E0 log(10)10 ˜Ej) and ∆˜r, ∆ ˜E represent
|
212 |
+
the radial and energy grid spacings, respectively. We use i and j to denote positions in the
|
213 |
+
radial and energy grids, and have omitted the temporal indices as these forms will apply to both
|
214 |
+
implicit and explicit terms in the same way. The vertical bars denote that the functions which
|
215 |
+
they are attached to are evaluated at the given grid index. We have also made the variable
|
216 |
+
transformations ˜r = log10(r/r0) and ˜E = log10(E/E0) (similarly to [12], except with base 10
|
217 |
+
instead of e), which allows us to more accurately track the electron distribution in our grids
|
218 |
+
when the involved processes operate over a wide range of physical scales. Finally, note that in
|
219 |
+
the case of energy losses, we only consider upstream differencing.
|
220 |
+
|
221 |
+
The α values can now be found by taking Eqs. 7 and 8 and equating coefficients with Eq. 6;
|
222 |
+
once these are found, the updating equation can be solved with some matrix solution algorithm.
|
223 |
+
If we represent the discretisation schemes shown above by the symbol Ψ, the overall iterative
|
224 |
+
solution can be summarised with the steps
|
225 |
+
ψn+1/2 = Ψ ˜E(ψn)
|
226 |
+
ψn+1 = Ψ˜r(ψn+1/2) ,
|
227 |
+
(9)
|
228 |
+
which are repeatedly solved (using Eq. 6) until the value of ψ has converged to the equilibrium
|
229 |
+
value. The other minutiae of this method, including initial and boundary conditions, convergence
|
230 |
+
criteria and stability considerations, can be found in [11, 12].
|
231 |
+
2.2. Synchrotron emission
|
232 |
+
Once found via the GF or ADI methods, the equilibrium distribution is used to calculate the
|
233 |
+
radio emissivity, given by
|
234 |
+
jsync(ν, r) =
|
235 |
+
� mχ
|
236 |
+
0
|
237 |
+
dE ψe±(E, r)Psync(ν, E, r) ,
|
238 |
+
(10)
|
239 |
+
where ν is the synchrotron frequency, ψe± is the sum of electron and positron equilibrium
|
240 |
+
distributions and Psync is the power emitted by an electron with an energy of E (this is calculated
|
241 |
+
as in [2]). The emissivity is then used to calculate the two main results in this work. Firstly, the
|
242 |
+
azimuthally averaged surface brightness curves,
|
243 |
+
Isync(ν, r, Θ, ∆Ω) =
|
244 |
+
�
|
245 |
+
∆Ω
|
246 |
+
dΩ
|
247 |
+
�
|
248 |
+
l.o.s.
|
249 |
+
dl jsync(ν, l)
|
250 |
+
4π
|
251 |
+
,
|
252 |
+
(11)
|
253 |
+
where l.o.s. is the line-of-sight to a point in the halo at radius r, which makes an angle of Θ with
|
254 |
+
the centre of the halo, and ∆Ω is the solid angle over which the surface brightness is calculated.
|
255 |
+
In this work we show results for a single representative frequency of ν = 0.5 GHz. Secondly, we
|
256 |
+
calculate the integrated flux density by
|
257 |
+
Ssync(ν, R) =
|
258 |
+
� R
|
259 |
+
0
|
260 |
+
d3r′ jsync(ν, r′)
|
261 |
+
4πd2
|
262 |
+
L
|
263 |
+
,
|
264 |
+
(12)
|
265 |
+
where the emissivity is integrated over the region enclosed by R and dL is the luminosity distance
|
266 |
+
to the target. For the results shown in this work we consider R to be the virial radius of the halo.
|
267 |
+
3. Results
|
268 |
+
Here we provide the details of the simulations we have performed, and show the results for two
|
269 |
+
observables: the radio surface brightness (Eq. 11) and integrated flux (Eq. 12). We use a set of
|
270 |
+
reasonable source parameters for the halo environments that respect observational constraints,
|
271 |
+
and aim to use WIMP parameter values that are representative of the many viable candidates.
|
272 |
+
We thus consider a large range of particle masses, from 10 to 1000 GeV, and use a set of four
|
273 |
+
annihilation channels, {bb, e+e−, µ+µ−, τ +τ −}. Since the focus of this work is on a comparison
|
274 |
+
between the two solution methods, particurly in the way that they differ with various source
|
275 |
+
targets, we show the results side-by-side and in the same manner for both targets. In Fig. 1 we
|
276 |
+
show the surface brightness curves for the Coma cluster (left-hand panels) and M31 (right-hand
|
277 |
+
panels), and Fig. 2 shows the integrated fluxes from the same targets for a range of frequencies.
|
278 |
+
|
279 |
+
10−8
|
280 |
+
10−4
|
281 |
+
100
|
282 |
+
b¯b
|
283 |
+
e+e−
|
284 |
+
10−2
|
285 |
+
10−1
|
286 |
+
100
|
287 |
+
101
|
288 |
+
10−8
|
289 |
+
10−4
|
290 |
+
100
|
291 |
+
µ+µ−
|
292 |
+
10−2
|
293 |
+
10−1
|
294 |
+
100
|
295 |
+
101
|
296 |
+
τ +τ −
|
297 |
+
Angular radius from halo centre (arcmin)
|
298 |
+
Surface Brightness (Jy/arcmin2)
|
299 |
+
10−7
|
300 |
+
10−4
|
301 |
+
10−1
|
302 |
+
b¯b
|
303 |
+
e+e−
|
304 |
+
100
|
305 |
+
102
|
306 |
+
10−7
|
307 |
+
10−4
|
308 |
+
10−1
|
309 |
+
µ+µ−
|
310 |
+
100
|
311 |
+
102
|
312 |
+
τ +τ −
|
313 |
+
Angular radius from halo centre (arcmin)
|
314 |
+
χ Mass
|
315 |
+
10 GeV
|
316 |
+
1000 GeV
|
317 |
+
Method
|
318 |
+
ADI
|
319 |
+
GF
|
320 |
+
Figure 1. Surface brightness curves for the Coma galaxy cluster (left-hand panels) and the M31
|
321 |
+
galaxy (right-hand panels). Each of the four panels show different annihilation channels, given
|
322 |
+
by the label in the top right of each plot. The ADI and GF methods are represented by the
|
323 |
+
red and blue colours respectively, and the region in which the results overlap are given by the
|
324 |
+
combination of these (the purple colour). These shaded regions represent the full mass range of
|
325 |
+
the WIMPs (from 10 to 1000 GeV), and the domain of each panel runs up until the halo’s virial
|
326 |
+
radius R (in angular units).
|
327 |
+
600
|
328 |
+
800
|
329 |
+
1000
|
330 |
+
1200
|
331 |
+
1400
|
332 |
+
Frequency (MHz)
|
333 |
+
10−3
|
334 |
+
10−2
|
335 |
+
Flux (Jy)
|
336 |
+
Channels
|
337 |
+
bb
|
338 |
+
µ+µ−
|
339 |
+
τ +τ −
|
340 |
+
e+e−
|
341 |
+
Methods
|
342 |
+
ADI
|
343 |
+
Greens
|
344 |
+
600
|
345 |
+
800
|
346 |
+
1000
|
347 |
+
1200
|
348 |
+
1400
|
349 |
+
Frequency (MHz)
|
350 |
+
10−3
|
351 |
+
10−2
|
352 |
+
10−1
|
353 |
+
100
|
354 |
+
Channels
|
355 |
+
bb
|
356 |
+
µ+µ−
|
357 |
+
τ +τ −
|
358 |
+
e+e−
|
359 |
+
Methods
|
360 |
+
ADI
|
361 |
+
Greens
|
362 |
+
Figure 2. The integrated fluxes, calculated using Eq. 12, for the Coma galaxy cluster (left) and
|
363 |
+
the M31 galaxy (right). The different linestyles represent the two solution methods presented in
|
364 |
+
Sec. 2.1, and each colour indicates the use of a different annihilation channel.
|
365 |
+
4. Discussion and conclusions
|
366 |
+
In Figs. 1, we see generally good agreement between the GF and ADI methods, which can be
|
367 |
+
inferred from the significant amount of overlap between the curves in each panel. Noticeably
|
368 |
+
however, we see more disagreement (less overlap) between the methods in the M31 galaxy than
|
369 |
+
we do for the Coma galaxy cluster. Our explanation for this lies in the mathematical techniques
|
370 |
+
employed by each method, and how they each treat the spatial dependence of the diffusion
|
371 |
+
function in particular. In the galaxy cluster environment of Coma, diffusion effects are negligible
|
372 |
+
on sufficiently large scales [10, 5], whereas in the physically smaller galaxy, diffusion effects
|
373 |
+
start to influence the surface brightness distribution at all relevant scales. Since the GF and
|
374 |
+
ADI methods leverage a spatially independent and dependent diffusion function (respectively),
|
375 |
+
the resulting equilibrium distributions will tend to differ in the environments where the length
|
376 |
+
|
377 |
+
scales in question do not greatly exceed the diffusion length, as is the case for M31. This trend
|
378 |
+
is also seen in the fluxes from Fig. 2, which show a clear disagreement in all channels for the
|
379 |
+
M31 galaxy, and relative agreement in all channels in the Coma cluster. Based on these results
|
380 |
+
and the comparison of target environments presented in [5], we also expect that smaller target
|
381 |
+
environments (like the dwarf spheroidal satellite galaxies of the Milky Way) would show further
|
382 |
+
disagreement between the solution methods, as diffusion effects would be even more significant
|
383 |
+
in these environments.
|
384 |
+
The other notable result we see from these simulations is that the methods differ on small
|
385 |
+
scales, even in the large Coma cluster. This is significant, as the inner regions of the DM halos
|
386 |
+
are where we would observe the strongest emission. With high-resolution radio interferometers
|
387 |
+
allowing us to resolve these smaller scales, our models could be tested against the strongest
|
388 |
+
possible DM emission, allowing us to find more stringent constraints on DM properties than
|
389 |
+
previously possible. In this regard, the surface brightness curves displayed here would be especially
|
390 |
+
valuable results when determining new observational limits, as their emission profiles are highly
|
391 |
+
dependent on the spatial structure of the DM halo.
|
392 |
+
With the impressive spatial resolution of telescopes like MeerKAT and the SKA, we are now
|
393 |
+
able to probe the inner regions of these DM halos – regions which have formerly been hidden
|
394 |
+
from our view. The need for accurate modelling techniques is thus more necessary than ever
|
395 |
+
before, and the considerations presented in this work should help inform the modelling choices
|
396 |
+
made in future radio searches for DM.
|
397 |
+
Acknowledgments
|
398 |
+
This work is based on the research that was supported by the National Research Foundation
|
399 |
+
of South Africa (Bursary No. 112332). G.B. acknowledges support from a National Research
|
400 |
+
Foundation of South Africa Thuthuka grant no. 117969.
|
401 |
+
References
|
402 |
+
[1] Knowles K, Cotton W D, Rudnick L et al. 2022 Astronomy & Astrophysics 657 A56
|
403 |
+
[2] Beck G 2019 Galaxies 7 16
|
404 |
+
[3] Regis M, Reynoso-Cordova J, Filipovi´c M D et al. 2021 Journal of Cosmology and Astroparticle Physics 2021
|
405 |
+
046
|
406 |
+
[4] Chan M 2021 Galaxies 9 11
|
407 |
+
[5] Sarkis M and Beck G 2022 The Proceedings of SAIP2021 ed Prinsloo A (UJ) pp 316–322 ISBN 978-0-620-
|
408 |
+
97693-0
|
409 |
+
[6] Bonafede A, Feretti L, Murgia M et al. 2010 Astronomy and Astrophysics 513 A30
|
410 |
+
[7] �Lokas E L and Mamon G A 2003 Monthly Notices of the Royal Astronomical Society 343 401–412
|
411 |
+
[8] Ruiz-Granados B, Rubi˜no-Mart´ın J A, Florido E et al. 2010 The Astrophysical Journal 723 L44–L48
|
412 |
+
[9] Tamm A, Tempel E, Tenjes P et al. 2012 Astronomy & Astrophysics 546 A4
|
413 |
+
[10] Colafrancesco S, Profumo S and Ullio P 2006 Astronomy & Astrophysics 455 21–43
|
414 |
+
[11] Strong A W and Moskalenko I V 1998 The Astrophysical Journal 509 212–228
|
415 |
+
[12] Regis M, Richter L, Colafrancesco S et al. 2015 Monthly Notices of the Royal Astronomical Society 448
|
416 |
+
3747–3765
|
417 |
+
[13] Press W H, Teukolsky S A and Vetterling W T 2007 Numerical Recipes: The Art of Scientific Computing 3rd
|
418 |
+
ed (Cambridge University Press) ISBN 978-0-521-88068-8
|
419 |
+
|
AdE1T4oBgHgl3EQfpAU_/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,139 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf,len=138
|
2 |
+
page_content='Simulating the radio emission of dark matter for new high-resolution observations with MeerKAT M Sarkis and G Beck School of Physics, University of the Witwatersrand, Private Bag 3, WITS-2050, Johannesburg, South Africa E-mail: michael.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
3 |
+
page_content='sarkis@students.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
4 |
+
page_content='wits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
5 |
+
page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
6 |
+
page_content='za Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
7 |
+
page_content=' Recent work has shown that searches for diffuse radio emission by MeerKAT - and eventually the SKA - are well suited to provide some of the strongest constraints yet on dark matter annihilations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
8 |
+
page_content=' To make full use of the observations by these facilities, accurate simulations of the expected dark matter abundance and diffusion mechanisms in these astrophysical objects are required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
9 |
+
page_content=' However, because of the computational costs involved, various mathematical and numerical techniques have been developed to perform the calculations in a feasible manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
10 |
+
page_content=' Here we provide the first quantitative comparison between methods that are commonly used in the literature, and outline the applicability of each one in various simulation scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
11 |
+
page_content=' These considerations are becoming ever more important as the hunt for dark matter continues into a new era of precision radio observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
12 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
13 |
+
page_content=' Introduction Despite decades of work, indirect Dark Matter (DM) searches – those that look for emission from the annihilation and decay products of DM particles – are yet to find a signal that can be solely attributed to DM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
14 |
+
page_content=' Until such a detection is made, and as our observing capabilities improve with newer and more sophisticated telescopes, we continue to methodically move through the parameter spaces of candidate DM models and eliminate those that conflict with the data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
15 |
+
page_content=' The recent public release of the MeerKAT Galaxy Cluster Legacy Survey data [1], together with recent studies that show the competitiveness of using DM radio emission for indirect detection [2, 3, 4], provides strong motivation for a renewed and continued effort in radio DM searches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
16 |
+
page_content=' In this work we take a brief but detailed look at the various theoretical aspects involved in the modelling of the radio emission from DM, and comment on how the choice of model will likely play an important role in indirect searches with high-resolution instruments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
17 |
+
page_content=' Our analysis includes simulations of the DM host environments for two source targets, the Coma galaxy cluster and the M31 galaxy, and a calculation of the synchrotron emission resulting from the annihilation of Weakly Interacting Massive Particles (WIMPs) therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
18 |
+
page_content=' We model our DM halos with a set of reasonable source parameters and find the emission after solving the electron propagation equation in each environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
19 |
+
page_content=' The methods of solving this equation are a major focus point of this work, as the choice of technique used can lead to a non-negligible change in the observed emission, particularly in smaller source targets where diffusion effects are significant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
20 |
+
page_content=' With < 10 arcsecond resolution capabilities, observations with MeerKAT (and soon the SKA) are for the first time able to probe the inner regions of these targets, which is where the strongest constraints on DM can be found.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
21 |
+
page_content=' Therefore, accurate spatial modelling of these targets is essential for us to make full use of the new data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
22 |
+
page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
23 |
+
page_content='03326v1 [astro-ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
24 |
+
page_content='CO] 9 Jan 2023 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
25 |
+
page_content=' Modelling The two source targets in this work, the Coma galaxy cluster and the M31 galaxy, were chosen for their well-characterised properties in the literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
26 |
+
page_content=' Of particular importance are the profiles of their magnetic fields and thermal gas densities;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
27 |
+
page_content=' as these quantities appear in the modelling process (but are often underspecified), the uncertainty of the final solution depends strongly on the treatment of these factors [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
28 |
+
page_content=' However, since the simulation of the halo environment is not the central focus of this work (and for the sake of brevity), we refer the reader to the following sources for details regarding the parameters in the Coma cluster [6, 7] and in the M31 galaxy [8, 9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
29 |
+
page_content=' In each halo environment, the emission of synchrotron radiation will be determined by the spatial and energy equilibrium distribution of charged annihilation products, ψ(x, E).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
30 |
+
page_content=' In this work the products considered are electrons and positrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
31 |
+
page_content=' The evolution of these distributions over time is then given by the following propagation equation, which includes the dominant effects of energy losses and spatial diffusion: ∂ψ(x, E) ∂t = ∇ · � D(x, E)∇ψ(x, E) � + ∂ ∂E � b(x, E)ψ(x, E) � + Q(x, E).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
32 |
+
page_content=' (1) Here D, b and Q are the diffusion, energy-loss and DM annihilation source functions respectively, and the determination of the exact forms of these functions follows the methods laid out in [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
33 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
34 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
35 |
+
page_content=' Solving the propagation equation We determine the equilibrium electron distribution ψ using two independent techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
36 |
+
page_content=' The first, referred to here as the ‘Green’s Function (GF) method’ [2, 10], uses a Green’s function with simplified forms of D and b to solve Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
37 |
+
page_content=' 1 semi-analytically.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
38 |
+
page_content=' The second, referred to as the ‘Alternating Direction Implicit (ADI) method’ [11, 12], uses a numerical approach to solve Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
39 |
+
page_content=' 1 iteratively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
40 |
+
page_content=' In both methods we consider the halo environment to be spherically symmetric, so that x may be replaced by r in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
41 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
42 |
+
page_content=' We also note here that we have assumed a simplified form of D, which would be a tensor in a more general case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
43 |
+
page_content=' As our methodology closely follows the above-mentioned literature, we only summarise these methods and point out any major differences in the following sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
44 |
+
page_content=' GF method If the forms of the diffusion and energy-loss functions are simplified so that they have no spatial dependence, a solution to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
45 |
+
page_content=' 1 can be found directly with the use of Green’s functions and image charges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
46 |
+
page_content=' However, these simplifications often have an impact on the calculated emission (for a review on this topic, see [5]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
47 |
+
page_content=' In this work we use non-weighted averages for the magnetic field and thermal gas densities, found using an averaging scale radius that matches the scale radius of the DM halo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
48 |
+
page_content=' This choice encapsulates the region in the halo that contains the majority of WIMP annihilations – and thus best represents the spatial structure of the halo – while allowing us to forgo any explicit spatial dependence in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
49 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
50 |
+
page_content=' Now, the equilibrium distribution of electrons in the halo can be calculated using ψ(r, E) = 1 b(E) � mχ E dE′G(r, ∆v)Q(r, E′) , (2) with mχ as the WIMP mass and the Green’s function (G) given by G(r, ∆v) = 1 √ 4π∆v ∞ � n=−∞ (−1)n � rmax 0 dr′ r′ rn � �exp � −(r′ − rn)2 4∆v � − exp � −(r′ + rn)2 4∆v �� � Q(r′) Q(r) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
51 |
+
page_content=' (3) Here rmax is the maximum radius for any diffusion processes and rn = (−1)nr + 2nrmax is the location of the nth image charge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
52 |
+
page_content=' The quantity ∆v is calculated as ∆v = v(E) − v(E′) , (4) where v(E) = � mχ E dx D(x) b(x) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
53 |
+
page_content=' (5) ADI method In this method, we discretise Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
54 |
+
page_content=' 1 and solve for the equilibrium distribution iteratively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
55 |
+
page_content=' Since the ADI method retains the radial dependence in the diffusion and energy loss functions (where the GF method does not), the problem becomes 2-dimensional in energy and space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
56 |
+
page_content=' Using a traditional finite-difference technique in this scenario could be computationally expensive, which is why we opt for a method that uses so-called ‘operator splitting’ to treat each dimension separately and divide the problem into smaller, more manageable pieces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
57 |
+
page_content=' Thus, during each step of the method, we use a general form of the 1-dimensional Crank-Nicolson (CN), scheme (see, for instance, [13]) which is a finite-differencing technique that includes the average of second-order implicit and explicit terms in the updating equation, thereby leveraging the unconditional stability of a fully implicit method while maintaining second-order accuracy in space and time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
58 |
+
page_content=' This scheme is relatively easy to solve, as the updating equation turns out to be a set of linear equations with tridiagonal coefficient matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
59 |
+
page_content=' We write this, as in [11, 12], as − α1 2 ψn+1 x−1 + � 1 + α2 2 � ψn+1 x − α3 2 ψn+1 x+1 = α1 2 ψn x−1 + � 1 − α2 2 � ψn x + α3 2 ψn x+1 + Qx∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
60 |
+
page_content=' (6) Here n is the temporal grid index (with the spacing between indices given by ∆t) and x represents either the energy or spatial grid index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
61 |
+
page_content=' The forms of the α coefficients, which encapsulate the diffusion and energy loss effects, need to be found by discretising the relevant operators from Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
62 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
63 |
+
page_content=' The scheme we have used for this is as follows: 1 r2 ∂ ∂r � r2D∂ψ ∂r � −−−−−−−−→ discretisation C−2 ˜r � �ψi+1 − ψi−1 2∆˜r � log(10)D + ∂D ∂˜r ������ ˜r=˜ri + ψi+1 − 2ψi + ψi−1 ∆˜r2 D|˜r=˜ri � (7) for the radial operator and ∂ ∂E (bψ) −−−−−−−−→ discretisation C−1 ˜E �b| ˜E= ˜Ej(ψj+1 − ψj) ∆ ˜E � (8) for energy operator, where C˜r = (r0 log(10)10˜ri), C ˜E = (E0 log(10)10 ˜Ej) and ∆˜r, ∆ ˜E represent the radial and energy grid spacings, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
64 |
+
page_content=' We use i and j to denote positions in the radial and energy grids, and have omitted the temporal indices as these forms will apply to both implicit and explicit terms in the same way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
65 |
+
page_content=' The vertical bars denote that the functions which they are attached to are evaluated at the given grid index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
66 |
+
page_content=' We have also made the variable transformations ˜r = log10(r/r0) and ˜E = log10(E/E0) (similarly to [12], except with base 10 instead of e), which allows us to more accurately track the electron distribution in our grids when the involved processes operate over a wide range of physical scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
67 |
+
page_content=' Finally, note that in the case of energy losses, we only consider upstream differencing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
68 |
+
page_content=' The α values can now be found by taking Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
69 |
+
page_content=' 7 and 8 and equating coefficients with Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
70 |
+
page_content=' 6;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
71 |
+
page_content=' once these are found, the updating equation can be solved with some matrix solution algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
72 |
+
page_content=' If we represent the discretisation schemes shown above by the symbol Ψ, the overall iterative solution can be summarised with the steps ψn+1/2 = Ψ ˜E(ψn) ψn+1 = Ψ˜r(ψn+1/2) , (9) which are repeatedly solved (using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
73 |
+
page_content=' 6) until the value of ψ has converged to the equilibrium value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
74 |
+
page_content=' The other minutiae of this method, including initial and boundary conditions, convergence criteria and stability considerations, can be found in [11, 12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
75 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
76 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
77 |
+
page_content=' Synchrotron emission Once found via the GF or ADI methods, the equilibrium distribution is used to calculate the radio emissivity, given by jsync(ν, r) = � mχ 0 dE ψe±(E, r)Psync(ν, E, r) , (10) where ν is the synchrotron frequency, ψe± is the sum of electron and positron equilibrium distributions and Psync is the power emitted by an electron with an energy of E (this is calculated as in [2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
78 |
+
page_content=' The emissivity is then used to calculate the two main results in this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
79 |
+
page_content=' Firstly, the azimuthally averaged surface brightness curves, Isync(ν, r, Θ, ∆Ω) = � ∆Ω dΩ � l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
80 |
+
page_content='o.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
81 |
+
page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
82 |
+
page_content=' dl jsync(ν, l) 4π , (11) where l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
83 |
+
page_content='o.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
84 |
+
page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
85 |
+
page_content=' is the line-of-sight to a point in the halo at radius r, which makes an angle of Θ with the centre of the halo, and ∆Ω is the solid angle over which the surface brightness is calculated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
86 |
+
page_content=' In this work we show results for a single representative frequency of ν = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
87 |
+
page_content='5 GHz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
88 |
+
page_content=' Secondly, we calculate the integrated flux density by Ssync(ν, R) = � R 0 d3r′ jsync(ν, r′) 4πd2 L , (12) where the emissivity is integrated over the region enclosed by R and dL is the luminosity distance to the target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
89 |
+
page_content=' For the results shown in this work we consider R to be the virial radius of the halo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
90 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
91 |
+
page_content=' Results Here we provide the details of the simulations we have performed, and show the results for two observables: the radio surface brightness (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
92 |
+
page_content=' 11) and integrated flux (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
93 |
+
page_content=' 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
94 |
+
page_content=' We use a set of reasonable source parameters for the halo environments that respect observational constraints, and aim to use WIMP parameter values that are representative of the many viable candidates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
95 |
+
page_content=' We thus consider a large range of particle masses, from 10 to 1000 GeV, and use a set of four annihilation channels, {bb, e+e−, µ+µ−, τ +τ −}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
96 |
+
page_content=' Since the focus of this work is on a comparison between the two solution methods, particurly in the way that they differ with various source targets, we show the results side-by-side and in the same manner for both targets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
97 |
+
page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
98 |
+
page_content=' 1 we show the surface brightness curves for the Coma cluster (left-hand panels) and M31 (right-hand panels), and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
99 |
+
page_content=' 2 shows the integrated fluxes from the same targets for a range of frequencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
100 |
+
page_content=' 10−8 10−4 100 b¯b e+e− 10−2 10−1 100 101 10−8 10−4 100 µ+µ− 10−2 10−1 100 101 τ +τ − Angular radius from halo centre (arcmin) Surface Brightness (Jy/arcmin2) 10−7 10−4 10−1 b¯b e+e− 100 102 10−7 10−4 10−1 µ+µ− 100 102 τ +τ − Angular radius from halo centre (arcmin) χ Mass 10 GeV 1000 GeV Method ADI GF Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
101 |
+
page_content=' Surface brightness curves for the Coma galaxy cluster (left-hand panels) and the M31 galaxy (right-hand panels).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
102 |
+
page_content=' Each of the four panels show different annihilation channels, given by the label in the top right of each plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
103 |
+
page_content=' The ADI and GF methods are represented by the red and blue colours respectively, and the region in which the results overlap are given by the combination of these (the purple colour).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
104 |
+
page_content=' These shaded regions represent the full mass range of the WIMPs (from 10 to 1000 GeV), and the domain of each panel runs up until the halo’s virial radius R (in angular units).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
105 |
+
page_content=' 600 800 1000 1200 1400 Frequency (MHz) 10−3 10−2 Flux (Jy) Channels bb µ+µ− τ +τ − e+e− Methods ADI Greens 600 800 1000 1200 1400 Frequency (MHz) 10−3 10−2 10−1 100 Channels bb µ+µ− τ +τ − e+e− Methods ADI Greens Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
106 |
+
page_content=' The integrated fluxes, calculated using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
107 |
+
page_content=' 12, for the Coma galaxy cluster (left) and the M31 galaxy (right).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
108 |
+
page_content=' The different linestyles represent the two solution methods presented in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
109 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
110 |
+
page_content='1, and each colour indicates the use of a different annihilation channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
111 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
112 |
+
page_content=' Discussion and conclusions In Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
113 |
+
page_content=' 1, we see generally good agreement between the GF and ADI methods, which can be inferred from the significant amount of overlap between the curves in each panel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
114 |
+
page_content=' Noticeably however, we see more disagreement (less overlap) between the methods in the M31 galaxy than we do for the Coma galaxy cluster.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
115 |
+
page_content=' Our explanation for this lies in the mathematical techniques employed by each method, and how they each treat the spatial dependence of the diffusion function in particular.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
116 |
+
page_content=' In the galaxy cluster environment of Coma, diffusion effects are negligible on sufficiently large scales [10, 5], whereas in the physically smaller galaxy, diffusion effects start to influence the surface brightness distribution at all relevant scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
117 |
+
page_content=' Since the GF and ADI methods leverage a spatially independent and dependent diffusion function (respectively), the resulting equilibrium distributions will tend to differ in the environments where the length scales in question do not greatly exceed the diffusion length, as is the case for M31.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
118 |
+
page_content=' This trend is also seen in the fluxes from Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
119 |
+
page_content=' 2, which show a clear disagreement in all channels for the M31 galaxy, and relative agreement in all channels in the Coma cluster.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
120 |
+
page_content=' Based on these results and the comparison of target environments presented in [5], we also expect that smaller target environments (like the dwarf spheroidal satellite galaxies of the Milky Way) would show further disagreement between the solution methods, as diffusion effects would be even more significant in these environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
121 |
+
page_content=' The other notable result we see from these simulations is that the methods differ on small scales, even in the large Coma cluster.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
122 |
+
page_content=' This is significant, as the inner regions of the DM halos are where we would observe the strongest emission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
123 |
+
page_content=' With high-resolution radio interferometers allowing us to resolve these smaller scales, our models could be tested against the strongest possible DM emission, allowing us to find more stringent constraints on DM properties than previously possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
124 |
+
page_content=' In this regard, the surface brightness curves displayed here would be especially valuable results when determining new observational limits, as their emission profiles are highly dependent on the spatial structure of the DM halo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
125 |
+
page_content=' With the impressive spatial resolution of telescopes like MeerKAT and the SKA, we are now able to probe the inner regions of these DM halos – regions which have formerly been hidden from our view.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
126 |
+
page_content=' The need for accurate modelling techniques is thus more necessary than ever before, and the considerations presented in this work should help inform the modelling choices made in future radio searches for DM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
127 |
+
page_content=' Acknowledgments This work is based on the research that was supported by the National Research Foundation of South Africa (Bursary No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
128 |
+
page_content=' 112332).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
129 |
+
page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
130 |
+
page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
131 |
+
page_content=' acknowledges support from a National Research Foundation of South Africa Thuthuka grant no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
132 |
+
page_content=' 117969.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
133 |
+
page_content=' References [1] Knowles K, Cotton W D, Rudnick L et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
134 |
+
page_content=' 2022 Astronomy & Astrophysics 657 A56 [2] Beck G 2019 Galaxies 7 16 [3] Regis M, Reynoso-Cordova J, Filipovi´c M D et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
135 |
+
page_content=' 2021 Journal of Cosmology and Astroparticle Physics 2021 046 [4] Chan M 2021 Galaxies 9 11 [5] Sarkis M and Beck G 2022 The Proceedings of SAIP2021 ed Prinsloo A (UJ) pp 316–322 ISBN 978-0-620- 97693-0 [6] Bonafede A, Feretti L, Murgia M et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
136 |
+
page_content=' 2010 Astronomy and Astrophysics 513 A30 [7] �Lokas E L and Mamon G A 2003 Monthly Notices of the Royal Astronomical Society 343 401–412 [8] Ruiz-Granados B, Rubi˜no-Mart´ın J A, Florido E et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
137 |
+
page_content=' 2010 The Astrophysical Journal 723 L44–L48 [9] Tamm A, Tempel E, Tenjes P et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
138 |
+
page_content=' 2012 Astronomy & Astrophysics 546 A4 [10] Colafrancesco S, Profumo S and Ullio P 2006 Astronomy & Astrophysics 455 21–43 [11] Strong A W and Moskalenko I V 1998 The Astrophysical Journal 509 212–228 [12] Regis M, Richter L, Colafrancesco S et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
139 |
+
page_content=' 2015 Monthly Notices of the Royal Astronomical Society 448 3747–3765 [13] Press W H, Teukolsky S A and Vetterling W T 2007 Numerical Recipes: The Art of Scientific Computing 3rd ed (Cambridge University Press) ISBN 978-0-521-88068-8' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
|
B9E0T4oBgHgl3EQfgAGB/content/tmp_files/2301.02412v1.pdf.txt
ADDED
@@ -0,0 +1,1572 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Adversarial Attacks on Neural Models of Code via
|
2 |
+
Code Difference Reduction
|
3 |
+
Zhao Tian
|
4 |
+
College of Intelligence and
|
5 |
+
Computing, Tianjin University
|
6 |
+
Tianjin, China
|
7 | |
8 |
+
Junjie Chen†
|
9 |
+
College of Intelligence and
|
10 |
+
Computing, Tianjin University
|
11 |
+
Tianjin, China
|
12 | |
13 |
+
Zhi Jin
|
14 |
+
Key Lab of High Confidence Software
|
15 |
+
Technologies, Peking University
|
16 |
+
Beijing, China
|
17 | |
18 |
+
Abstract—Deep learning has been widely used to solve various
|
19 |
+
code-based tasks by building deep code models based on a
|
20 |
+
large number of code snippets. However, deep code models
|
21 |
+
are still vulnerable to adversarial attacks. As source code is
|
22 |
+
discrete and has to strictly stick to the grammar and semantics
|
23 |
+
constraints, the adversarial attack techniques in other domains
|
24 |
+
are not applicable. Moreover, the attack techniques specific to
|
25 |
+
deep code models suffer from the effectiveness issue due to
|
26 |
+
the enormous attack space. In this work, we propose a novel
|
27 |
+
adversarial attack technique (i.e., CODA). Its key idea is to
|
28 |
+
use the code differences between the target input and reference
|
29 |
+
inputs (that have small code differences but different prediction
|
30 |
+
results with the target one) to guide the generation of adversarial
|
31 |
+
examples. It considers both structure differences and identifier
|
32 |
+
differences to preserve the original semantics. Hence, the attack
|
33 |
+
space can be largely reduced as the one constituted by the two
|
34 |
+
kinds of code differences, and thus the attack process can be
|
35 |
+
largely improved by designing corresponding equivalent structure
|
36 |
+
transformations and identifier renaming transformations. Our
|
37 |
+
experiments on 10 deep code models (i.e., two pre-trained models
|
38 |
+
with five code-based tasks) demonstrate the effectiveness and
|
39 |
+
efficiency of CODA, the naturalness of its generated examples,
|
40 |
+
and its capability of defending against attacks after adversarial
|
41 |
+
fine-tuning. For example, CODA improves the state-of-the-art
|
42 |
+
techniques (i.e., CARROT and ALERT) by 79.25% and 72.20%
|
43 |
+
on average in terms of the attack success rate, respectively.
|
44 |
+
I. INTRODUCTION
|
45 |
+
In recent years, deep learning (DL) has been widely used
|
46 |
+
to solve code-based software engineering tasks, such as code
|
47 |
+
clone detection [1], vulnerability prediction [2], and code com-
|
48 |
+
pletion [3], by building DL models based on a large amount of
|
49 |
+
training code snippets (also called deep code models). Indeed,
|
50 |
+
deep code models have achieved notable performance and
|
51 |
+
largely promoted the process of software development and
|
52 |
+
maintenance [4]–[7]. In particular, some industrial products on
|
53 |
+
deep code models have been released and received extensive
|
54 |
+
attention, such as AlphaCode [8] and Codex [9].
|
55 |
+
Like DL models in other areas (e.g., image processing [10]
|
56 |
+
and speech recognition [11]), the robustness of deep code
|
57 |
+
models is also critical [12]. However, the existing adversarial
|
58 |
+
attack techniques proposed in other areas are not applicable to
|
59 |
+
deep code models. This is because these techniques perturb an
|
60 |
+
input in a continuous space for altering the model prediction
|
61 |
+
result, while the inputs (i.e., source code) for deep code models
|
62 |
+
†Junjie Chen is the corresponding author.
|
63 |
+
are discrete. Moreover, source code has to strictly stick to
|
64 |
+
the grammar and semantics constraints, i.e., the adversarial
|
65 |
+
example generated from an original input should have no
|
66 |
+
grammar errors and preserve the original semantics.
|
67 |
+
Indeed, some adversarial attack techniques specific to deep
|
68 |
+
code models have been proposed recently, such as MHM [13],
|
69 |
+
CARROT [12], and ALERT [14]. In general, they share two
|
70 |
+
main steps: (1) designing a series of semantic-preserving code
|
71 |
+
transformation rules (e.g., identifier renaming or dead code
|
72 |
+
insertion), and (2) searching ingredients from the space defined
|
73 |
+
by the rules (e.g., a valid identifier name is an ingredient for
|
74 |
+
the rule of identifier renaming) for transforming an input to a
|
75 |
+
semantic-preserving adversarial example. For example, CAR-
|
76 |
+
ROT designs two semantic-preserving code transformation
|
77 |
+
rules (i.e., identifier renaming and dead code insertion), and
|
78 |
+
uses the hill-climbing algorithm to search for the ingredients
|
79 |
+
from the entire space with the guidance of gradients and
|
80 |
+
changes of model prediction results. ALERT considers the rule
|
81 |
+
of identifier renaming, and uses the naturalness (i.e., natural
|
82 |
+
semantics of code) and changes of model prediction results to
|
83 |
+
guide the ingredient search process from the entire space.
|
84 |
+
Although some of them have been demonstrated to be
|
85 |
+
effective to some degree, these existing techniques still suffer
|
86 |
+
from major limitations:
|
87 |
+
• The ingredient space defined by the code transformation
|
88 |
+
rules is enormous. For example, for the rule of identifier
|
89 |
+
renaming, all valid identifier names could be the ingredi-
|
90 |
+
ents for renaming the target identifier. Hence, searching
|
91 |
+
for the ingredients that can help attack the target model
|
92 |
+
successfully is challenging. The existing techniques tend
|
93 |
+
to utilize the changes of model prediction results after
|
94 |
+
performing semantic-preserving transformations on the
|
95 |
+
target input to guide the search process, which is very
|
96 |
+
likely to fall into local optimum in the enormous space
|
97 |
+
and thus limits their attack effectiveness.
|
98 |
+
• Frequently invoking the target model can negatively af-
|
99 |
+
fect the efficiency of adversarial attack techniques, as
|
100 |
+
model invocation is the most costly part during the
|
101 |
+
attack process [12]. Also, when the model is deployed
|
102 |
+
remotely, frequent model invocations could be identified
|
103 |
+
as malicious attacks and thus lead to blocking access to
|
104 |
+
the model. However, the existing techniques often involve
|
105 |
+
1
|
106 |
+
arXiv:2301.02412v1 [cs.CR] 6 Jan 2023
|
107 |
+
|
108 |
+
frequent model invocations due to calculating gradients
|
109 |
+
or guiding the search direction via model prediction.
|
110 |
+
• Developers care about the natural semantics of code since
|
111 |
+
it is helpful to assist human comprehension [15]. Hence,
|
112 |
+
guaranteeing the naturalness of generated adversarial ex-
|
113 |
+
amples (i.e., source code in our task) is important. How-
|
114 |
+
ever, all the existing techniques (except ALERT [14]) do
|
115 |
+
not consider this factor. For example, CARROT designs
|
116 |
+
the rule of dead code insertion, but it may largely damage
|
117 |
+
the naturalness of the generated examples (especially
|
118 |
+
when a large amount of dead code is inserted).
|
119 |
+
Overall, a more effective adversarial attack technique spe-
|
120 |
+
cific to deep code models should enhance the attack effective-
|
121 |
+
ness by improving the ingredient search process, and guarantee
|
122 |
+
the naturalness of generated adversarial examples as much as
|
123 |
+
possible and the times of model invocations as few as possible.
|
124 |
+
Our work does propose such a technique, called CODA (COde
|
125 |
+
Difference guided Attacking).
|
126 |
+
To improve the attack effectiveness, the key idea of CODA
|
127 |
+
is to use the inputs, which have small code differences with
|
128 |
+
the target input but have different prediction results, to largely
|
129 |
+
reduce the ingredient space. For ease of presentation, we call
|
130 |
+
such inputs reference inputs. Actually, reference inputs can
|
131 |
+
be regarded as invalid successfully-attacking adversarial ex-
|
132 |
+
amples generated from the target input, where “invalid” refers
|
133 |
+
to altering the original semantics and “successfully-attacking”
|
134 |
+
refers to producing different prediction results. Over the target
|
135 |
+
input, the code differences brought by reference inputs con-
|
136 |
+
tribute to the invalid but successful attack to a large extent.
|
137 |
+
Hence, if we extract the ingredients from the code differences
|
138 |
+
to support semantic-preserving transformations on the target
|
139 |
+
input, their code differences can be gradually reduced without
|
140 |
+
altering the original semantics, and thus a valid successfully-
|
141 |
+
attacking adversarial example is likely to be generated. In
|
142 |
+
this way, the ingredient space is effectively reduced as the
|
143 |
+
one constituted by only code differences between reference
|
144 |
+
inputs and the target input, and thus the search process
|
145 |
+
can be largely improved. Please note that taking reference
|
146 |
+
inputs (especially code differences brought by them) as the
|
147 |
+
guidance for generating adversarial examples is an innovative
|
148 |
+
perspective, which closely utilizes the unique characteristics
|
149 |
+
of deep code models (e.g., source code is discrete).
|
150 |
+
To preserve the semantics of the target input during the
|
151 |
+
attack process, CODA considers code structure differences
|
152 |
+
and identifier differences, and thus extracts the ingredients to
|
153 |
+
support equivalent structure transformations and identifier re-
|
154 |
+
naming transformations. Equivalent structure transformations
|
155 |
+
(e.g., transforming a for loop to an equivalent while loop)
|
156 |
+
do not affect the naturalness of generated examples, and thus
|
157 |
+
CODA first applies this kind of transformations to reduce
|
158 |
+
code differences for generating adversarial examples. Then,
|
159 |
+
identifier renaming transformations are applied to further
|
160 |
+
reduce code differences to improve the attack effectiveness.
|
161 |
+
To ensure the naturalness of generated examples by this
|
162 |
+
kind of transformations, CODA measures semantic similarity
|
163 |
+
between identifiers for guiding iterative transformations. In
|
164 |
+
particular, CODA just involves necessary model invocations
|
165 |
+
to check whether the generated example attacks successfully,
|
166 |
+
without extra gradient calculation and a large amount of model
|
167 |
+
prediction for guiding the search process.
|
168 |
+
We conducted an extensive study to evaluate CODA based
|
169 |
+
on two popular pre-trained models (i.e., CodeBERT [6] and
|
170 |
+
GraphCodeBERT [7]) and five code-based tasks (i.e., vul-
|
171 |
+
nerability prediction [2], clone detection [16], authorship
|
172 |
+
attribution [17], functionality classification [18], and defect
|
173 |
+
prediction [12]). In total, we used 10 subjects. Our results
|
174 |
+
demonstrate the effectiveness and efficiency of CODA. For
|
175 |
+
example, on average across the ten subjects, CODA improves
|
176 |
+
the two state-of-the-art adversarial attack techniques specific
|
177 |
+
to deep code models (i.e., CARROT [12] and ALERT [14])
|
178 |
+
by 79.25% and 72.20% respectively in terms of the attack
|
179 |
+
success rate. The time spent by CODA on completing the
|
180 |
+
attack process for the ten subjects is just 39.59 hours, while
|
181 |
+
those by CARROT and ALERT are 159.19 hours and 198.89
|
182 |
+
hours, respectively. Also, we investigated the value of the
|
183 |
+
generated adversarial examples by using them to improve
|
184 |
+
the robustness of the target model via an adversarial fine-
|
185 |
+
tuning strategy. The results show that the models after fine-
|
186 |
+
tuning with the examples generated by CODA can successfully
|
187 |
+
defend against attacks from 63.64%, 66.96%, and 76.68%
|
188 |
+
of adversarial examples generated by CARROT, ALERT, and
|
189 |
+
CODA on average, respectively. Besides, we conducted a user
|
190 |
+
study to confirm the naturalness of the generated examples by
|
191 |
+
CODA and an ablation experiment to confirm the contribution
|
192 |
+
of each main component in CODA.
|
193 |
+
To sum up, our work makes the four major contributions:
|
194 |
+
• Novel Perspective. We propose a novel perspective of
|
195 |
+
utilizing code differences between reference inputs and
|
196 |
+
the target input to guide the adversarial attack process
|
197 |
+
for deep code models.
|
198 |
+
• Technique Implementation. We implement CODA fol-
|
199 |
+
lowing the novel perspective by measuring code structure
|
200 |
+
and identifier differences and designing the corresponding
|
201 |
+
semantic-preserving code transformation rules.
|
202 |
+
• Performance Evaluation. We conducted an extensive
|
203 |
+
study on two popular pre-trained models and five code-
|
204 |
+
based tasks, demonstrating the effectiveness and effi-
|
205 |
+
ciency of CODA over two state-of-the-art techniques.
|
206 |
+
• Public Artifact. We released all the experimental data
|
207 |
+
and our source code at the project homepage [19] for
|
208 |
+
experiment replication, future research, and practical use.
|
209 |
+
II. BACKGROUND AND MOTIVATION
|
210 |
+
In this section, we first introduce the background of deep
|
211 |
+
code models (Section II-A), define our problem (Section II-B),
|
212 |
+
and motivate our key idea with an example (Section II-C).
|
213 |
+
A. Deep Code Models
|
214 |
+
In the area of software engineering, DL has been widely-
|
215 |
+
used to process source code [2], [3], [16], [20]. In particular,
|
216 |
+
some popular pre-trained DL models have been constructed
|
217 |
+
based on a large number of code snippets, among which
|
218 |
+
2
|
219 |
+
|
220 |
+
1
|
221 |
+
2
|
222 |
+
3
|
223 |
+
4
|
224 |
+
5
|
225 |
+
6
|
226 |
+
7
|
227 |
+
8
|
228 |
+
9
|
229 |
+
10
|
230 |
+
11
|
231 |
+
12
|
232 |
+
13
|
233 |
+
14
|
234 |
+
1
|
235 |
+
2
|
236 |
+
3
|
237 |
+
4
|
238 |
+
5
|
239 |
+
6
|
240 |
+
7
|
241 |
+
8
|
242 |
+
9
|
243 |
+
10
|
244 |
+
11
|
245 |
+
12
|
246 |
+
13
|
247 |
+
14
|
248 |
+
1
|
249 |
+
2
|
250 |
+
3
|
251 |
+
4
|
252 |
+
5
|
253 |
+
6
|
254 |
+
7
|
255 |
+
8
|
256 |
+
9
|
257 |
+
10
|
258 |
+
11
|
259 |
+
12
|
260 |
+
13
|
261 |
+
14
|
262 |
+
void f1(int a[], int n){
|
263 |
+
int i; int j; int k;
|
264 |
+
for (i = 0; i < n; i++) {
|
265 |
+
for (j = 0; j < ((n - i) - 1); j++) {
|
266 |
+
if (a[j] > a[j + 1]){
|
267 |
+
k = a[j];
|
268 |
+
a[j] = a[j + 1];
|
269 |
+
a[j + 1] = k;
|
270 |
+
}
|
271 |
+
}
|
272 |
+
}
|
273 |
+
}
|
274 |
+
int f2(int t[], int len){
|
275 |
+
int i; int j;
|
276 |
+
i = 0; j = 0;
|
277 |
+
while (len != 0) {
|
278 |
+
t[i] = len % 10;
|
279 |
+
len /= 10;
|
280 |
+
i = i + 1;
|
281 |
+
}
|
282 |
+
while (j < i){
|
283 |
+
if (t[j] != t[(i - j) - 1]) return 0;
|
284 |
+
j = j + 1;
|
285 |
+
}
|
286 |
+
return 1;
|
287 |
+
}
|
288 |
+
void f3(int t[], int len){
|
289 |
+
int i; int j; int k;
|
290 |
+
i = 0;
|
291 |
+
while (i < len) {
|
292 |
+
j = 0;
|
293 |
+
while (j < ((len - i) - 1)) {
|
294 |
+
if (t[j] > t[j + 1]){
|
295 |
+
k = t[j];
|
296 |
+
t[j] = t[j + 1];
|
297 |
+
t[j + 1] = k;
|
298 |
+
} j = j + 1;
|
299 |
+
} i = i + 1;
|
300 |
+
}
|
301 |
+
}
|
302 |
+
Ground-truth Label: sort
|
303 |
+
Prediction Result: sort (96.52%)
|
304 |
+
Ground-truth Label: palindrome
|
305 |
+
Prediction Result: palindrome (99.98%)
|
306 |
+
Ground-truth Label: sort
|
307 |
+
Prediction Result: palindrome (90.88%)
|
308 |
+
Fig. 1. An illustrating example (the target input f1, a reference input f2, and a successfully-attacking adversarial example f3 generated from f1)
|
309 |
+
CodeBERT [6] and GraphCodeBERT [7] are two state-of-the-
|
310 |
+
art pre-trained models. CodeBERT learns features from bi-
|
311 |
+
modal data in the form of programming languages and natural
|
312 |
+
languages, while GraphCodeBERT takes into consideration the
|
313 |
+
code structure and data flow information. Same as the existing
|
314 |
+
work [14], we used them in our evaluation (Section IV).
|
315 |
+
These
|
316 |
+
pre-trained
|
317 |
+
models
|
318 |
+
have
|
319 |
+
brought
|
320 |
+
breakthrough
|
321 |
+
changes to many downstream code-based tasks [21], including
|
322 |
+
both classification tasks and generation tasks, by fine-tuning
|
323 |
+
them on the datasets of the corresponding tasks. The former
|
324 |
+
makes classification based on the given code snippets (e.g.,
|
325 |
+
clone detection [16] and vulnerability prediction [2]), while the
|
326 |
+
latter produces a sequence of information based on code snip-
|
327 |
+
pets or natural language descriptions (e.g., code completion [3]
|
328 |
+
and code summarization [22]). Following most of the existing
|
329 |
+
work on attacking deep code models [12]–[14], our work also
|
330 |
+
focuses on the classification tasks and takes the generation
|
331 |
+
tasks as our future work. In particular, in our study, we adopted
|
332 |
+
all the tasks used in the studies of evaluating the state-of-the-
|
333 |
+
art attack techniques (i.e., CARROT [12] and ALERT [14]),
|
334 |
+
i.e., five classification tasks including vulnerability prediction,
|
335 |
+
clone detection, authorship attribution, functionality classifica-
|
336 |
+
tion, and defect prediction.
|
337 |
+
B. Problem Definition
|
338 |
+
Given a code snippet x that is processed as the required
|
339 |
+
format by the target deep code model M (e.g., abstract syntax
|
340 |
+
trees required by code2seq [4], control-flow graphs required
|
341 |
+
by DGCNN [23], or data-flow graphs required by GraphCode-
|
342 |
+
BERT [7]), M can predict a probability vector for x, each
|
343 |
+
element in which represents the probability classifying x to
|
344 |
+
the corresponding class. The class with the largest probability
|
345 |
+
is the final prediction result of M for x. If the prediction result
|
346 |
+
is different from the ground-truth label (denoted as y) of x, it
|
347 |
+
means that M makes a wrong prediction on x; otherwise, M
|
348 |
+
makes a correct prediction.
|
349 |
+
Although deep code models can achieve great performance
|
350 |
+
on the given test sets, they may be vulnerable to adversarial
|
351 |
+
examples [12]–[14]. The goal of our work is to generate
|
352 |
+
successfully-attacking adversarial examples as much as pos-
|
353 |
+
sible, so as to improve the model robustness. As source code
|
354 |
+
is discrete and has to stick to the grammar and semantics con-
|
355 |
+
straints, the existing adversarial example generation techniques
|
356 |
+
proposed in other domains are not applicable.
|
357 |
+
The existing attack techniques specific to deep code models
|
358 |
+
always generate adversarial examples from a target input by
|
359 |
+
performing a series of semantic-preserving code transforma-
|
360 |
+
tions [12]–[14], which is also followed by our work. For ease
|
361 |
+
of understanding, we formally define our target problem is to
|
362 |
+
find {x′|x′ ∈ ϵ ∧ y = M(x) ̸= M(x′)} from a target input x
|
363 |
+
for the target model M. Here, ϵ refers to the universal set of
|
364 |
+
code snippets that satisfy the grammar constraints and preserve
|
365 |
+
the semantics of x. y = M(x) means that we just regard the
|
366 |
+
test inputs on which M makes correct predictions as target
|
367 |
+
inputs, where M(x) refers to the prediction result of M on
|
368 |
+
x. M(x) ̸= M(x′) means that x′ successfully attacks M, that
|
369 |
+
is, it is a successfully-attacking adversarial example generated
|
370 |
+
from x. Besides, an effective attack technique should be also
|
371 |
+
efficient to find x′ and ensure the naturalness of x′ (i.e., natural
|
372 |
+
to human comprehension [14]), which are indeed carefully
|
373 |
+
considered by the proposed technique in our work.
|
374 |
+
C. Motivating Example
|
375 |
+
We then use a real-world example (simplified for ease of
|
376 |
+
illustration) to help motivate our key idea: utilizing the code
|
377 |
+
differences between reference inputs and the target input to
|
378 |
+
guide the generation of adversarial examples. In Figure 1, the
|
379 |
+
first code snippet f1 is the target input from the test set of
|
380 |
+
the functionality classification task [18], and the two state-
|
381 |
+
of-the-art techniques (i.e., CARROT [12] and ALERT [14])
|
382 |
+
do not generate successfully-attacking adversarial examples
|
383 |
+
from it since they can fall into local optimum in the enormous
|
384 |
+
ingredient space. In this figure, the second code snippet f2 is
|
385 |
+
a reference input from the training set of this task, which has
|
386 |
+
the different label with f1.
|
387 |
+
In fact, f2 can be regarded as an invalid successfully-
|
388 |
+
attacking example from f1, as they are semantically inconsis-
|
389 |
+
tent but have different prediction results. The code differences
|
390 |
+
between f1 and f2 mainly contribute to this phenomenon. From
|
391 |
+
this perspective, to generate a valid successfully-attacking
|
392 |
+
adversarial example (denoted as f3) from f1, we should per-
|
393 |
+
form semantic-preserving code transformations on f1, and the
|
394 |
+
transformations should reduce the code differences between f1
|
395 |
+
and f2 in order to alter the prediction result of the target model
|
396 |
+
on f1. That is, the ingredients supporting these transformations
|
397 |
+
3
|
398 |
+
|
399 |
+
Initial
|
400 |
+
Snippet
|
401 |
+
Adversarial
|
402 |
+
Snippet
|
403 |
+
Input
|
404 |
+
Output
|
405 |
+
Training
|
406 |
+
Data
|
407 |
+
Input
|
408 |
+
Target
|
409 |
+
Model
|
410 |
+
Test
|
411 |
+
Test
|
412 |
+
Report
|
413 |
+
Attack
|
414 |
+
Success ?
|
415 |
+
Fig. 2. Overview of CODA.
|
416 |
+
should be extracted from the code differences brought by
|
417 |
+
f2. With this intuition, by performing equivalent structure
|
418 |
+
transformations on f1 (i.e., transforming for loops to while
|
419 |
+
loops, where while loops are the used loop structure in f2)
|
420 |
+
and identifier remaining transformations (i.e., renaming a and
|
421 |
+
n to t and len respectively, where t and len are the used
|
422 |
+
identifier names in f2), f3 is generated as shown in the third
|
423 |
+
code snippet in Figure 1 and indeed attacks successfully,
|
424 |
+
i.e., making a wrong prediction (palindrome) with a high
|
425 |
+
confidence (90.88%).
|
426 |
+
Based on the code differences between the target input and
|
427 |
+
the reference input, the ingredient space is largely reduced. For
|
428 |
+
example, the ingredient space defined by identifier renaming
|
429 |
+
transformations is reduced from all valid identifier names
|
430 |
+
(i.e., almost infinite) to the identifier names occurring in the
|
431 |
+
reference input but not in the target input (i.e., only two
|
432 |
+
identifier names in this simplified example). Hence, it can help
|
433 |
+
improve the ingredient search process and thus improve the
|
434 |
+
attack effectiveness. On the other hand, too small ingredient
|
435 |
+
space could also lose too many ingredients useful to successful
|
436 |
+
attacks, and thus we will select a set of reference inputs (rather
|
437 |
+
than only one reference input) for guiding the attack process
|
438 |
+
in order to balance the size of the ingredient space and the
|
439 |
+
number of useful ingredients.
|
440 |
+
III. APPROACH
|
441 |
+
A. Overview
|
442 |
+
In this work, we propose a novel perspective to attack
|
443 |
+
deep code models more effectively and more efficiently, which
|
444 |
+
utilizes the code differences between reference inputs and the
|
445 |
+
target input to guide the generation of adversarial examples.
|
446 |
+
From this perspective, we design an effective attack technique,
|
447 |
+
called CODA. Specifically, the code differences brought by
|
448 |
+
reference inputs provide effective ingredients for altering the
|
449 |
+
prediction result of the target input by transforming it with
|
450 |
+
these ingredients, which can contribute to successful attacks in
|
451 |
+
CODA. However, as the semantics of reference inputs and the
|
452 |
+
target input are different, the ingredients from some kinds of
|
453 |
+
code differences can alter the original semantics, which is not
|
454 |
+
allowed by the adversarial attack for deep code models. Hence,
|
455 |
+
in CODA, we consider the structure differences and identifier
|
456 |
+
differences for measuring code differences between them,
|
457 |
+
which can preserve the original semantics during the attack
|
458 |
+
process. In this way, the ingredient space can be effectively
|
459 |
+
reduced as the one constituted by the two kinds of code
|
460 |
+
differences between reference inputs and the target input, and
|
461 |
+
thus the ingredient search process (for generating adversarial
|
462 |
+
examples) can be largely improved.
|
463 |
+
In fact, not all the inputs that have different prediction
|
464 |
+
results with the target one, can be regarded as effective
|
465 |
+
reference inputs for improving the adversarial attack process.
|
466 |
+
In other words, different inputs could have different degrees
|
467 |
+
of capabilities for reducing the ingredient search space and
|
468 |
+
providing effective ingredients for altering the prediction result
|
469 |
+
of the target input. Therefore, the first step in CODA is
|
470 |
+
to select effective reference inputs for the target input in
|
471 |
+
order to improve the attack effectiveness as much as possible
|
472 |
+
(to be presented in Section III-B). Based on the selected
|
473 |
+
reference inputs, CODA then measures the structure differ-
|
474 |
+
ences and identifier differences over the target input, which
|
475 |
+
support extracting the ingredients for two corresponding kinds
|
476 |
+
of semantic-preserving code transformations (i.e., equivalent
|
477 |
+
structure transformations and identifier renaming transforma-
|
478 |
+
tions). With the guidance of reducing their code differences
|
479 |
+
based on the two kinds of transformations, the target input
|
480 |
+
could be effectively transformed to a successfully-attacking
|
481 |
+
adversarial example. As equivalent structure transformations
|
482 |
+
do not affect the naturalness of generated examples, CODA
|
483 |
+
first applies this kind of transformations to reduce the code
|
484 |
+
differences for improving the attack effectiveness (to be pre-
|
485 |
+
sented in Section III-C). Then, we apply identifier renaming
|
486 |
+
transformations to further reduce the code differences for
|
487 |
+
improving the generation of successfully-attacking adversarial
|
488 |
+
examples (to be presented in Section III-D). In particular,
|
489 |
+
CODA measures the semantic similarity between identifiers
|
490 |
+
to guarantee the naturalness of generated examples.
|
491 |
+
Figure 2 shows the overview of CODA. In a nutshell, by
|
492 |
+
successively applying equivalent structure transformations and
|
493 |
+
identifier renaming transformations to the target input with
|
494 |
+
the ingredient space defined by the code differences between
|
495 |
+
the selected reference inputs and the target one, adversarial
|
496 |
+
examples can be generated towards the direction of reducing
|
497 |
+
the code differences without altering the original semantics. In
|
498 |
+
this way, the prediction result of the target input is more likely
|
499 |
+
to be changed, leading to a successfully-attacking adversarial
|
500 |
+
example. Due to the smaller ingredient search space (but
|
501 |
+
including effective ingredients) and the clearer attack direction,
|
502 |
+
the attack effectiveness could be largely improved by CODA.
|
503 |
+
B. Reference Inputs Selection
|
504 |
+
The goal of reference inputs is to largely reduce the in-
|
505 |
+
gredient space. Also, the reduced space should include the
|
506 |
+
ingredients that are effective to transform the target input
|
507 |
+
to a successfully-attacking adversarial example. In this way,
|
508 |
+
the adversarial attack process can be largely improved by
|
509 |
+
searching for effective ingredients more efficiently.
|
510 |
+
4
|
511 |
+
|
512 |
+
TABLE I
|
513 |
+
DESCRIPTIONS OF EQUIVALENT STRUCTURE TRANSFORMATIONS
|
514 |
+
Transformation
|
515 |
+
Description
|
516 |
+
Example Before Transformation
|
517 |
+
Example After Transformation
|
518 |
+
R1-loop
|
519 |
+
equivalent transformation among for structure
|
520 |
+
for ( i=0; i<9; i++ ) {
|
521 |
+
i=0; while ( i<9 ) {
|
522 |
+
and while structure
|
523 |
+
Body; }
|
524 |
+
Body; i++; }
|
525 |
+
R2-branch
|
526 |
+
equivalent transformation between if-else(-if)
|
527 |
+
if ( A ) { BodyA; }
|
528 |
+
if ( A ) { BodyA; }
|
529 |
+
structure and if-if structure
|
530 |
+
else if ( B ) { BodyB; }
|
531 |
+
if ( !A && B ) { BodyB; }
|
532 |
+
R3-calculation
|
533 |
+
equivalent numerical calculation transformation, e.g.,
|
534 |
+
i += 1;
|
535 |
+
i = i + 1;
|
536 |
+
++, --, +=, -=, *=, /=, %=, <<=, >>=, &=, |= , ˆ =
|
537 |
+
R4-constant
|
538 |
+
equivalent transformation between a constant and
|
539 |
+
println("Hello, World!");
|
540 |
+
String i = "Hello, World!";
|
541 |
+
a variable assigned by the same constant
|
542 |
+
println(i);
|
543 |
+
Although all the inputs that have different prediction results
|
544 |
+
with the target one can provide ingredients for altering the pre-
|
545 |
+
diction result of the target one after transformations, their capa-
|
546 |
+
bilities for successful attacks could be different. To transform
|
547 |
+
the target input to a successfully-attacking adversarial example
|
548 |
+
with fewer perturbations, CODA should select the reference
|
549 |
+
inputs, which can provide the ingredients that are more likely
|
550 |
+
to conduct successful attacks for the target input. Similar to the
|
551 |
+
existing work [24]–[27], we assume that the prediction result
|
552 |
+
of the target input is more likely to be changed from its original
|
553 |
+
class denoted as ci (with the largest probability predicted
|
554 |
+
by the target model) to the class with the second largest
|
555 |
+
probability (denoted as cj). Hence, the ingredients in the inputs
|
556 |
+
belonging to cj are more likely to attack successfully on the
|
557 |
+
target input, and thus CODA selects the inputs belonging to
|
558 |
+
cj as the initial set of reference inputs. Please note that all
|
559 |
+
the reference inputs are selected from the training set to avoid
|
560 |
+
introducing the contents beyond the cognitive scope of the
|
561 |
+
target model. Meanwhile, we only consider the training inputs
|
562 |
+
whose prediction results are consistent with their ground-truth
|
563 |
+
labels in order to avoid introducing noise.
|
564 |
+
However, the number of inputs belonging to the same class
|
565 |
+
(i.e., cj as above) could be large, and thus the ingredient space
|
566 |
+
constituted by code differences between them and the target
|
567 |
+
input could be also large. Hence, to further reduce the ingre-
|
568 |
+
dient space for more effective adversarial example generation,
|
569 |
+
CODA selects a subset of inputs with high similarity to the
|
570 |
+
target input from the initial set of reference inputs, as the
|
571 |
+
final set of reference inputs used by CODA. This is because
|
572 |
+
smaller code differences can effectively limit the number of
|
573 |
+
ingredients, leading to smaller ingredient space. CODA does
|
574 |
+
not select only one reference input, as too small ingredient
|
575 |
+
space could incur a high risk of missing too many ingredients
|
576 |
+
contributing to successful attacks. That is, CODA selects a
|
577 |
+
small set of reference inputs following the above two steps of
|
578 |
+
selection to balance the ingredient space size and the amount
|
579 |
+
of ingredients contributing to successful attacks in the space.
|
580 |
+
We further introduce how to measure the similarity be-
|
581 |
+
tween the target input (denoted as t) and a reference input
|
582 |
+
(denoted as r) for the second step of selection in CODA. In
|
583 |
+
general, we can adopt some pre-trained models to represent
|
584 |
+
the code as a vector and then measure code similarity by
|
585 |
+
calculating the vector distance, like many existing studies [5],
|
586 |
+
[6], [28]. However, as presented in Section III-A, CODA
|
587 |
+
first applies equivalent structure transformations (rather than
|
588 |
+
identifier renaming transformations) to reduce code differences
|
589 |
+
for adversarial attacks, as this kind of transformations does not
|
590 |
+
affect the naturalness of generated examples. Moreover, the
|
591 |
+
identifiers used in different code snippets are usually different
|
592 |
+
due to the enormous identifier space, which may lead to the
|
593 |
+
low similarity between various code snippets. Hence, when
|
594 |
+
measuring code similarity, CODA eliminates the influence
|
595 |
+
of identifiers by replacing them with the placeholder <unk>.
|
596 |
+
Specifically, CODA first represents t and r after placeholder
|
597 |
+
replacement as vectors respectively based on CodeBERT [6]
|
598 |
+
(one of the most widely-used pre-trained models [29]–[31]),
|
599 |
+
and then calculates the cosine similarity between the two
|
600 |
+
vectors. As the descending order of the calculated similarity,
|
601 |
+
CODA selects Top-N reference inputs for the follow-up ad-
|
602 |
+
versarial attack process. Please note that to make the selection
|
603 |
+
process efficient, we randomly sampled U inputs from the
|
604 |
+
initial set for the second step of selection. We will investigate
|
605 |
+
the influence of both U and N on CODA in Section VI.
|
606 |
+
C. Equivalent Structure Transformation
|
607 |
+
Based on the small set of selected reference inputs, CODA
|
608 |
+
then extracts ingredients from the space defined by their
|
609 |
+
brought code differences over the target input. That is, CODA
|
610 |
+
transforms the target input to an adversarial example towards
|
611 |
+
the direction of reducing code differences. CODA first reduces
|
612 |
+
structure differences by applying equivalent structure transfor-
|
613 |
+
mations to the target input as they do not affect the naturalness
|
614 |
+
of generated examples.
|
615 |
+
To preserve the semantics of the target input, we design four
|
616 |
+
categories of equivalent structure transformations in CODA
|
617 |
+
inspired by the existing work in metamorphic testing and
|
618 |
+
code refactoring [32], [33]. In particular, we systematically
|
619 |
+
consider all common kinds of code structures, i.e., loop struc-
|
620 |
+
tures, branch structures, and sequential structures (including
|
621 |
+
numerical calculation and constant usage). We explain the four
|
622 |
+
categories in detail in Table I, each of which is also illustrated
|
623 |
+
with an example. For each category of transformations, it
|
624 |
+
may include several specific rules. For example, the rules
|
625 |
+
of transformation on += and transformation on -= belong to
|
626 |
+
the category of R3-calculation, and the rules of transforming
|
627 |
+
for loop to while loop and transforming while loop to for
|
628 |
+
loop belong to the category of R1-loop. In total, CODA has
|
629 |
+
20 specific rules for the four categories of transformations.
|
630 |
+
Please note that not all the rules are applicable to the code
|
631 |
+
5
|
632 |
+
|
633 |
+
programmed by any programming language. For example, ++
|
634 |
+
and -- in R3-calculation are not supported by Python. Also,
|
635 |
+
in R4-constant, the newly-defined variable cannot be the same
|
636 |
+
as the existing variables in the code; otherwise, it may incur
|
637 |
+
grammar errors and alter the original semantics. Due to the
|
638 |
+
space limit, we put more details about all these specific rules
|
639 |
+
at our project homepage [19].
|
640 |
+
Then, we illustrate how to apply each rule for reducing code
|
641 |
+
differences. Each rule involves two structures, i.e., the one
|
642 |
+
before transformation (sb) and the one after transformation
|
643 |
+
(sa). CODA first counts the occurring times of sb and sa in
|
644 |
+
the set of selected reference inputs (denoted as nb and na),
|
645 |
+
and then calculates their occurring distribution, i.e.,
|
646 |
+
nb
|
647 |
+
nb+na
|
648 |
+
and
|
649 |
+
na
|
650 |
+
nb+na . Further, CODA applies each rule in a probabilistic
|
651 |
+
way to reduce the occurring distribution differences in terms
|
652 |
+
of sb and sa between reference inputs and the target input. In
|
653 |
+
this way, the structure differences in terms of sb and sa can
|
654 |
+
be reduced effectively. More specifically, for each occurrence
|
655 |
+
of sb in the target input, CODA applies this rule with the
|
656 |
+
probability of
|
657 |
+
na
|
658 |
+
nb+na , also indicating that it can be retained
|
659 |
+
with the probability of
|
660 |
+
nb
|
661 |
+
nb+na .
|
662 |
+
In this step, CODA obtains M inputs from the target input,
|
663 |
+
each of which is generated by applying all the applicable rules
|
664 |
+
in the above probabilistic way, and then selects the input with
|
665 |
+
the highest average similarity (also measured by the method
|
666 |
+
described in Section III-B) to the selected reference inputs as
|
667 |
+
the one for the follow-up adversarial attack process.
|
668 |
+
D. Identifier Renaming Transformation
|
669 |
+
To facilitate the generation of successfully-attacking ad-
|
670 |
+
versarial examples, CODA then applies identifier renaming
|
671 |
+
transformations to further reduce code differences. Inspired by
|
672 |
+
the existing work [12]–[14], identifier renaming transformation
|
673 |
+
in CODA refers to replacing the name of an identifier in the
|
674 |
+
target input with the name of an identifier in the selected
|
675 |
+
reference inputs. For ease of presentation, we denote the set of
|
676 |
+
identifiers in the target input as Vt and the set of identifiers in
|
677 |
+
the selected reference inputs as Vr. To preserve the semantics
|
678 |
+
of the target input and guarantee the grammatical correctness
|
679 |
+
of the generated example, CODA ensures that the identifier
|
680 |
+
used for replacement does not exist in the target input.
|
681 |
+
Then, we illustrate how to apply this kind of transformations
|
682 |
+
to the input obtained from the last step (i.e., equivalent
|
683 |
+
structure transformations). As demonstrated by the existing
|
684 |
+
work [12]–[14], renaming identifiers is effective to generate
|
685 |
+
successfully-attacking adversarial examples, but can negatively
|
686 |
+
affect the naturalness of generated examples. To ensure the
|
687 |
+
naturalness of generated examples, CODA considers the se-
|
688 |
+
mantic similarity between identifiers and designs an iterative
|
689 |
+
transformation process like ALERT [14]. Specifically, CODA
|
690 |
+
measures the semantic similarity between each identifier in
|
691 |
+
Vt and each identifier in Vr by representing each identifier as
|
692 |
+
a vector via word embedding. Here, CODA builds the pre-
|
693 |
+
trained language model with the FastText algorithm [34] and
|
694 |
+
calculates the cosine similarity between vectors to measure
|
695 |
+
their semantic similarity. Then, CODA prioritizes each pair
|
696 |
+
TABLE II
|
697 |
+
STATISTICS OF OUR USED SUBJECTS
|
698 |
+
Task
|
699 |
+
Train/Validate/Test
|
700 |
+
Class
|
701 |
+
Language
|
702 |
+
Model
|
703 |
+
Acc.
|
704 |
+
Vulnerability
|
705 |
+
21,854/2,732/2,732
|
706 |
+
2
|
707 |
+
C
|
708 |
+
CB
|
709 |
+
63.76%
|
710 |
+
Prediction
|
711 |
+
GCB
|
712 |
+
63.65%
|
713 |
+
Clone
|
714 |
+
90,102/4,000/4,000
|
715 |
+
2
|
716 |
+
Java
|
717 |
+
CB
|
718 |
+
96.97%
|
719 |
+
Detection
|
720 |
+
GCB
|
721 |
+
97.36%
|
722 |
+
Authorship
|
723 |
+
528/–/132
|
724 |
+
66
|
725 |
+
Python
|
726 |
+
CB
|
727 |
+
90.35%
|
728 |
+
Attribution
|
729 |
+
GCB
|
730 |
+
89.48%
|
731 |
+
Functionality
|
732 |
+
41,581/–/10,395
|
733 |
+
104
|
734 |
+
C
|
735 |
+
CB
|
736 |
+
98.18%
|
737 |
+
Classification
|
738 |
+
GCB
|
739 |
+
98.66%
|
740 |
+
Defect
|
741 |
+
27,058/–/6,764
|
742 |
+
4
|
743 |
+
C/C++
|
744 |
+
CB
|
745 |
+
84.37%
|
746 |
+
Prediction
|
747 |
+
GCB
|
748 |
+
83.98%
|
749 |
+
* CB is short for CodeBERT and GCB is short for GraphCodeBERT.
|
750 |
+
of identifiers as the descending order of their semantic sim-
|
751 |
+
ilarity, and iteratively applies this transformation based on
|
752 |
+
each pair of identifiers in the ranking list, which ensures
|
753 |
+
that more natural transformations can be first performed.
|
754 |
+
After each iteration, CODA invokes the target model to
|
755 |
+
check whether a successfully-attacking adversarial example
|
756 |
+
is generated. The iterative attack process terminates until a
|
757 |
+
successfully-attacking adversarial example is generated or all
|
758 |
+
the pairs are used by this transformation. Please note that
|
759 |
+
CODA ensures that the pair of identifiers will not introduce
|
760 |
+
repetitive identifiers in the generated example in each iteration;
|
761 |
+
otherwise, this pair will be discarded.
|
762 |
+
Overall, CODA only invokes the target model when check-
|
763 |
+
ing if a successfully-attacking adversarial example is gen-
|
764 |
+
erated. They are necessary model invocations for this task.
|
765 |
+
Hence, CODA can largely reduce the number of model
|
766 |
+
invocations compared with the existing techniques (e.g.,
|
767 |
+
ALERT [14]), which is confirmed by our study (Section V-A).
|
768 |
+
IV. EVALUATION DESIGN
|
769 |
+
In the study, we address four research questions (RQs):
|
770 |
+
• RQ1: How does CODA perform in terms of effectiveness
|
771 |
+
and efficiency compared with state-of-the-art techniques?
|
772 |
+
• RQ2: Are the adversarial examples generated by CODA
|
773 |
+
natural for humans?
|
774 |
+
• RQ3: Are the adversarial examples generated by CODA
|
775 |
+
useful to improve the robustness of deep code models?
|
776 |
+
• RQ4: Does each main component contribute to the over-
|
777 |
+
all effectiveness of CODA?
|
778 |
+
A. Subjects
|
779 |
+
1) Datasets and Tasks: To sufficiently evaluate CODA,
|
780 |
+
we consider all the five code-based tasks in the studies of
|
781 |
+
evaluating state-of-the-art techniques (i.e., CARROT [12] and
|
782 |
+
ALERT [14]). The statistics of datasets is shown at the first
|
783 |
+
four columns in Table II, each of which represents the task, the
|
784 |
+
number of inputs in the training/validation/test set, the number
|
785 |
+
of classes for the classification task, and the programming
|
786 |
+
language for the inputs.
|
787 |
+
The task of vulnerability prediction aims to predict whether
|
788 |
+
a given code snippet has vulnerabilities. Its used dataset is ex-
|
789 |
+
tracted from two C projects (i.e., FFmpeg [35] and Qemu [36])
|
790 |
+
by Zhou et al. [2] and has been integrated as part of the
|
791 |
+
CodeXGLUE benchmark [30]. The task of clone detection
|
792 |
+
6
|
793 |
+
|
794 |
+
aims to detect whether two given code snippets are equivalent
|
795 |
+
in semantics. Its used dataset is from BigCloneBench [37],
|
796 |
+
the most widely-used dataset for clone detection. The existing
|
797 |
+
work [14] randomly sampled 90,102/4,000/4,000 inputs from
|
798 |
+
the benchmark for training/validation/testing, to make the
|
799 |
+
experiment at a computationally friendly scale. In our study,
|
800 |
+
we used the same dataset. The task of authorship attribution
|
801 |
+
aims to identify the author of a given code snippet. Its used
|
802 |
+
dataset is the Google Code Jam (GCJ) dataset [17]. The task
|
803 |
+
of functionality classification aims to classify the functionality
|
804 |
+
of a given code snippet. If code snippets solve the same
|
805 |
+
problem, they are regarded to have the same functionality [18].
|
806 |
+
Its used dataset is the Open Judge (OJ) benchmark [38],
|
807 |
+
which has been also integrated as part of the CodeXGLUE
|
808 |
+
benchmark [30]. The task of defect prediction aims to predict
|
809 |
+
whether a given code snippet is defective and its defect type.
|
810 |
+
Its used dataset is the CodeChef dataset [39], which is labeled
|
811 |
+
by the execution results on the CodeChef platform (i.e., four
|
812 |
+
defect types: no defect, wrong answer, timeout, runtime error).
|
813 |
+
2) Models: Following the existing work [14], we adopted
|
814 |
+
two state-of-the-art pre-trained models for code-based tasks,
|
815 |
+
i.e., CodeBERT [6] and GraphCodeBERT [7], and then fine-
|
816 |
+
tuned them on the five tasks based on the corresponding
|
817 |
+
datasets, respectively. In total, we obtained 10 deep code
|
818 |
+
models as the subjects. The last two columns in Table II show
|
819 |
+
the used pre-trained model and the accuracy of the deep code
|
820 |
+
model after fine-tuning, respectively. When fine-tuning Code-
|
821 |
+
BERT and GraphCodeBERT on these tasks (except Graph-
|
822 |
+
CodeBERT on functionality classification and defect predic-
|
823 |
+
tion), we used the same hyper-parameter settings provided by
|
824 |
+
the existing work [12], [14]. As there is no instruction on the
|
825 |
+
hyper-parameter settings for fine-tuning GraphCodeBERT on
|
826 |
+
functionality classification and defect prediction, we used the
|
827 |
+
same settings as the one used by authorship attribution (they
|
828 |
+
are all multi-class classification tasks). Indeed, the achieved
|
829 |
+
model performance outperforms that achieved by the models
|
830 |
+
(e.g., TBCNN [38] and CodeBERT [6]) used in the existing
|
831 |
+
work [12] on the same datasets [12], indicating that the
|
832 |
+
transferred hyper-parameter settings are reasonable.
|
833 |
+
Overall, the subjects used in our study are indeed diverse,
|
834 |
+
involving different tasks, different pre-trained models, different
|
835 |
+
numbers of classes, different programming languages, etc. It is
|
836 |
+
very helpful to sufficiently evaluate the performance of CODA.
|
837 |
+
B. Compared Techniques
|
838 |
+
In the study, we compared CODA with two state-of-the-art
|
839 |
+
techniques attacking deep code models, i.e., CARROT [12]
|
840 |
+
and ALERT [14], which have been introduced in Section I (the
|
841 |
+
third paragraph). We adopted their implementations and the
|
842 |
+
recommended parameter settings provided by the correspond-
|
843 |
+
ing papers [12], [14]. As the original version of CARROT can
|
844 |
+
only support to attack C/C++ code, we extended it to attack
|
845 |
+
Python and Java code for sufficient comparison.
|
846 |
+
C. Implementations
|
847 |
+
We implemented CODA in Python and adopted tree-
|
848 |
+
sitter [40] to extract identifiers from code following the exist-
|
849 |
+
ing work [14]. We set the parameters in CODA by conducting
|
850 |
+
a preliminary experiment, i.e., U = 256, N = 64, and
|
851 |
+
M = 64. We discuss the influence of the settings of main
|
852 |
+
parameters on CODA in Section VI. We released our code
|
853 |
+
and experimental data at our project homepage [19]. All the
|
854 |
+
experiments were conducted on a server with an Ubuntu 20.04
|
855 |
+
system with Intel(R) Xeon(R) Silver 4214 @ 2.20GHz CPU,
|
856 |
+
256GB memory, and NVIDIA GeForce RTX 2080 Ti GPU.
|
857 |
+
V. RESULTS AND ANALYSIS
|
858 |
+
A. RQ1: Effectiveness and Efficiency
|
859 |
+
1) Setup: For each deep code model, we applied CODA,
|
860 |
+
CARROT, ALERT to generate adversarial examples from each
|
861 |
+
target input in the test set, respectively. We measured their
|
862 |
+
effectiveness and efficiency based on the following metrics.
|
863 |
+
To reduce the influence of randomness, we repeated all the
|
864 |
+
experiments (including those for other RQs) 10 times, and
|
865 |
+
reported the average results.
|
866 |
+
Following the existing work [14], we adopted the at-
|
867 |
+
tack success rate (ASR) to measure the effectiveness of
|
868 |
+
each technique. ASR is the percentage of the target inputs
|
869 |
+
from which an attack technique can generate a successfully-
|
870 |
+
attacking adversarial example. Larger ASR values mean better
|
871 |
+
attack effectiveness. Also, it is important to measure whether
|
872 |
+
the prediction confidence (i.e., the probability of being the
|
873 |
+
ground-truth class of the target input) is decreased by the gen-
|
874 |
+
erated examples (although there is no successfully-attacking
|
875 |
+
adversarial example generated from a target input). Hence, we
|
876 |
+
also calculated prediction confidence decrement (PCD) to
|
877 |
+
measure the effectiveness of each technique. PCD is calculated
|
878 |
+
by the prediction confidence of the target input minus the min-
|
879 |
+
imum prediction confidence of the set of generated examples
|
880 |
+
from the target input. If the former is smaller than the latter,
|
881 |
+
we regard PCD to be 0, indicating that the generated examples
|
882 |
+
cannot decrease the prediction confidence of the target input.
|
883 |
+
Larger PCD values mean better attack effectiveness.
|
884 |
+
In addition, following the existing work [12], [14], we used
|
885 |
+
the time spent on the overall attack process (i.e., completing
|
886 |
+
the adversarial example generation process from all the target
|
887 |
+
inputs) and the average number of model invocations for
|
888 |
+
generating examples from one target input, to measure
|
889 |
+
the efficiency of each technique. Less time and fewer model
|
890 |
+
invocations mean higher efficiency.
|
891 |
+
2) Results: Table III shows the comparison results among
|
892 |
+
CARROT, ALERT, and CODA in terms of ASR. From this
|
893 |
+
table, CODA always outperforms CARROT and ALERT on
|
894 |
+
all the tasks based on both CodeBERT and GraphCodeBERT,
|
895 |
+
demonstrating the stable attack effectiveness of CODA. On
|
896 |
+
average, CODA improves 70.11% and 89.83% higher ASR
|
897 |
+
than CARROT and ALERT across all the five tasks on
|
898 |
+
CodeBERT, and improves 89.34% and 57.67% higher ASR
|
899 |
+
on GraphCodeBERT, respectively.
|
900 |
+
Figures 3(a) and 3(b) show the comparison results among
|
901 |
+
the three techniques in terms of PCD on CodeBERT and
|
902 |
+
GraphCodeBERT, respectively. From these figures, the upper
|
903 |
+
quartile, median, and lower quartile of CODA are always
|
904 |
+
7
|
905 |
+
|
906 |
+
TABLE III
|
907 |
+
EFFECTIVENESS COMPARISON IN TERMS OF ASR
|
908 |
+
Task
|
909 |
+
CodeBERT
|
910 |
+
GraphCodeBERT
|
911 |
+
CARROT
|
912 |
+
ALERT
|
913 |
+
CODA
|
914 |
+
CARROT
|
915 |
+
ALERT
|
916 |
+
CODA
|
917 |
+
Vulnerability Prediction
|
918 |
+
33.72%
|
919 |
+
53.62%
|
920 |
+
89.58%
|
921 |
+
37.40%
|
922 |
+
76.95%
|
923 |
+
94.72%
|
924 |
+
Clone Detection
|
925 |
+
20.78%
|
926 |
+
27.79%
|
927 |
+
44.65%
|
928 |
+
3.50%
|
929 |
+
7.96%
|
930 |
+
27.37%
|
931 |
+
Authorship Attribution
|
932 |
+
44.44%
|
933 |
+
35.78%
|
934 |
+
79.05%
|
935 |
+
31.68%
|
936 |
+
61.47%
|
937 |
+
92.00%
|
938 |
+
Functionality Classification
|
939 |
+
44.15%
|
940 |
+
10.04%
|
941 |
+
56.74%
|
942 |
+
42.76%
|
943 |
+
11.22%
|
944 |
+
57.44%
|
945 |
+
Defect Prediction
|
946 |
+
71.59%
|
947 |
+
65.15%
|
948 |
+
95.18%
|
949 |
+
79.08%
|
950 |
+
75.87%
|
951 |
+
96.58%
|
952 |
+
Average
|
953 |
+
42.94%
|
954 |
+
38.48%
|
955 |
+
73.04%
|
956 |
+
38.88%
|
957 |
+
46.69%
|
958 |
+
73.62%
|
959 |
+
(a) PCD on attacking CodeBERT
|
960 |
+
(b) PCD on attacking GraphCodeBERT
|
961 |
+
Fig. 3. Comparison in terms of prediction confidence decrement
|
962 |
+
(a) Model invocation times on attacking CodeBERT
|
963 |
+
(b) Model invocation times on attacking GraphCodeBERT
|
964 |
+
Fig. 4. Comparison in terms of model invocation times (y-axis refers to the normalized values following the existing work [14])
|
965 |
+
larger than (or equal to) those of both CARROT and ALERT
|
966 |
+
regardless of the tasks and the pre-trained models, demon-
|
967 |
+
strating that CODA produces more significant attacks for
|
968 |
+
decreasing prediction confidence of target inputs. For example,
|
969 |
+
on CodeBERT, the average improvements of CODA over
|
970 |
+
CARROT and ALERT are 101.88% and 520.65% across all
|
971 |
+
the tasks in terms of average PCD, respectively. Similarly, on
|
972 |
+
GraphCodeBERT, the average improvements of CODA over
|
973 |
+
CARROT and ALERT are 76.35% and 560.15%, respectively.
|
974 |
+
Besides, CARROT, ALERT, and CODA take 159.19 hours,
|
975 |
+
198.89 hours, and 39.59 hours to complete the entire attack
|
976 |
+
process on all five tasks, respectively. Further, we measured
|
977 |
+
the number of model invocations for each target input during
|
978 |
+
the attack process, whose results are shown in Figure 4(a)
|
979 |
+
and 4(b). From these figures, CODA performs fewer model
|
980 |
+
invocations than both CARROT and ALERT regardless of the
|
981 |
+
tasks and pre-trained models. On average, CODA performs
|
982 |
+
65.73% and 78.58% fewer model invocations than CARROT
|
983 |
+
and ALERT across all the tasks on CodeBERT, and 34.07%
|
984 |
+
and 75.31% fewer model invocations on GraphCodeBERT,
|
985 |
+
respectively. The results demonstrate that CODA has the
|
986 |
+
significantly highest efficiency among the three techniques.
|
987 |
+
Answer to RQ1: CODA spends less time with fewer
|
988 |
+
model invocations on completing the entire attack
|
989 |
+
process, but generates more successfully-attacking ex-
|
990 |
+
amples with more significant prediction confidence
|
991 |
+
decrement on all the subjects, than the state-of-the-art
|
992 |
+
techniques (i.e., CARROT and ALERT).
|
993 |
+
B. RQ2: Naturalness of Adversarial Examples
|
994 |
+
1) Setup: It is important to check whether the generated
|
995 |
+
adversarial examples are natural to human judges [14], [41].
|
996 |
+
Here, we conducted a user study to compare the naturalness
|
997 |
+
of examples generated by CODA, CARROT, and ALERT, and
|
998 |
+
our user study shares the same design as the one conducted
|
999 |
+
by the existing work [14]:
|
1000 |
+
Data Preparation. For each subject, we randomly sampled
|
1001 |
+
10 target inputs, and then for each technique we randomly
|
1002 |
+
sampled an adversarial example from the set of examples
|
1003 |
+
generated from each sampled target input. That is, for each
|
1004 |
+
sampled target input, we construct three pairs of code snippets,
|
1005 |
+
each of which contains the target input and an adversarial
|
1006 |
+
example generated by CODA, CARROT, or ALERT. In total,
|
1007 |
+
we obtained 300 pairs of code snippets for the user study due
|
1008 |
+
to 10 subjects × 3 techniques.
|
1009 |
+
Participants. Same as the existing work [14], the user study
|
1010 |
+
also involves four non-author participants, each of whom has
|
1011 |
+
8
|
1012 |
+
|
1013 |
+
Fig. 5. Average score to evaluate naturalness of examples per participant
|
1014 |
+
a Bachelor/Master degree in Computer Science with at least
|
1015 |
+
five years of programming experience.
|
1016 |
+
Process. For objective evaluation, we did not tell partici-
|
1017 |
+
pants which technique generates the adversarial example in a
|
1018 |
+
pair of code snippets. Also, we highlighted the changes in each
|
1019 |
+
pair of code snippets for facilitating manual evaluation. Then,
|
1020 |
+
each participant individually evaluated each pair by evaluating
|
1021 |
+
to what extent the changes are natural to the code context
|
1022 |
+
and the changed identifiers preserve the original semantics,
|
1023 |
+
following the existing work [14]. Specifically, participants
|
1024 |
+
gave a score for each pair based on a 5-point Likert scale [42]
|
1025 |
+
(1 means strongly disagree and 5 means strongly agree)
|
1026 |
+
following the existing work [14], [43].
|
1027 |
+
2) Results: Figure 5 shows the average score of the ad-
|
1028 |
+
versarial examples generated by each technique for each
|
1029 |
+
participant. From this figure, the conclusions from different
|
1030 |
+
participants are consistent: the naturalness of the adversarial
|
1031 |
+
examples generated by CODA and ALERT is closely high
|
1032 |
+
(round 4.50 on average), and significantly higher than that by
|
1033 |
+
CARROT (just 2.89 on average). ALERT is a naturalness-
|
1034 |
+
aware technique, whose core contribution is to ensure the
|
1035 |
+
naturalness of generated examples, but CODA achieves similar
|
1036 |
+
naturalness scores to it, demonstrating that CODA can also
|
1037 |
+
generate highly natural adversarial examples.
|
1038 |
+
Answer to RQ2: The adversarial examples gener-
|
1039 |
+
ated by CODA are natural closely to the state-of-the-
|
1040 |
+
art naturalness-aware attack technique (i.e., ALERT),
|
1041 |
+
which is consistently confirmed by participants.
|
1042 |
+
C. RQ3: Model Robustness Improvement
|
1043 |
+
1) Setup: We studied the value of generated adversarial
|
1044 |
+
examples by using them to improve the robustness of the target
|
1045 |
+
model via an adversarial fine-tuning strategy. For each subject,
|
1046 |
+
we divided the test set into two equal parts (S1 and S2),
|
1047 |
+
so as to avoid data leakage between the adversarial training
|
1048 |
+
set and the evaluation set constructed by the same technique.
|
1049 |
+
Specifically, we applied each technique to generate examples
|
1050 |
+
from S1, and selected one generated adversarial example
|
1051 |
+
for each target input, i.e., the one that successfully attacks
|
1052 |
+
the model or achieves the largest decrement on prediction
|
1053 |
+
confidence (if no successfully-attack example is generated).
|
1054 |
+
The selected examples were integrated with the training set to
|
1055 |
+
form the adversarial training set, which is used for fine-tuning
|
1056 |
+
the model. Thus, for a given subject, the size of the adversarial
|
1057 |
+
training set constructed by each technique is the same.
|
1058 |
+
After obtaining a fine-tuned model for each subject with
|
1059 |
+
each technique, we evaluated it on the evaluation set of
|
1060 |
+
the successfully-attacking examples generated from S2 by
|
1061 |
+
CODA, CARROT, ALERT, respectively. Then, we measured
|
1062 |
+
the accuracy of the fine-tuned model on the three evaluation
|
1063 |
+
sets to measure its ability of defending against attacks.
|
1064 |
+
2) Results: Table IV shows the effectiveness of improving
|
1065 |
+
the model robustness with the generated examples by the
|
1066 |
+
studied techniques, respectively. The first row represents the
|
1067 |
+
evaluation set constructed by the corresponding technique,
|
1068 |
+
while the second row represents the adversarial training set
|
1069 |
+
constructed by the corresponding technique. The value in each
|
1070 |
+
cell represents the ratio of the adversarial examples in the
|
1071 |
+
evaluation set that can be defended by the fine-tuned model
|
1072 |
+
based on the adversarial training set. We found on most sub-
|
1073 |
+
jects, CODA improves the model robustness to defend against
|
1074 |
+
attacks from the largest ratio of adversarial examples generated
|
1075 |
+
by CODA, CARROT, ALERT, respectively. On average, the
|
1076 |
+
models fine-tuned by CODA can defend against attacks from
|
1077 |
+
63.64%, 66.96%, 76.68% of successfully-attacking examples
|
1078 |
+
generated by CARROT, ALERT, CODA respectively, with
|
1079 |
+
the improvement of 6.35%, 25.69%, 42.67% over those by
|
1080 |
+
CARROT and 32.65%, 11.70%, 25.99% over those by ALERT
|
1081 |
+
respectively. Besides, the results of attack defense between
|
1082 |
+
different techniques indicate that the examples generated by
|
1083 |
+
CODA could subsume those by CARROT and ALERT to
|
1084 |
+
a large extent. We also applied each fine-tuned model to
|
1085 |
+
the corresponding test set, and found its accuracy is almost
|
1086 |
+
consistent with the original accuracy (all the absolute accuracy
|
1087 |
+
differences are less than 1%). The results demonstrate that
|
1088 |
+
CODA is more helpful to improve the model robustness than
|
1089 |
+
CARROT and ALERT without damaging the original model
|
1090 |
+
performance. In four evaluation sets (constructed by ALERT or
|
1091 |
+
CARROT), CODA performs worse than ALERT or CARROT,
|
1092 |
+
as the adversarial training set and the evaluation set generated
|
1093 |
+
by the same technique could be more similar.
|
1094 |
+
Answer to RQ3: CODA helps improve the model ro-
|
1095 |
+
bustness more effectively than CARROT and ALERT,
|
1096 |
+
in terms of defending against attacks from the adver-
|
1097 |
+
sarial examples generated by itself as well as the adver-
|
1098 |
+
sarial examples generated by the other two techniques.
|
1099 |
+
D. RQ4: Contribution of Each Main Component
|
1100 |
+
1) Setup: We studied the contribution of each main compo-
|
1101 |
+
nent in CODA, i.e., reference inputs selection (RIS), equivalent
|
1102 |
+
structure transformations (EST), and identifier renaming trans-
|
1103 |
+
formations (IRT). We constructed three variants of CODA:
|
1104 |
+
• w/o RIS: we replaced RIS with the method that randomly
|
1105 |
+
selects N inputs from training data as reference inputs.
|
1106 |
+
• w/o EST: we removed EST from CODA, i.e., it directly
|
1107 |
+
performs identifier renaming transformations after select-
|
1108 |
+
ing reference inputs.
|
1109 |
+
• w/o IRT: we removed IRT from CODA, i.e., it directly
|
1110 |
+
checks whether a successfully-attacking example is gen-
|
1111 |
+
erated after equivalent structure transformations.
|
1112 |
+
9
|
1113 |
+
|
1114 |
+
TABLE IV
|
1115 |
+
ROBUSTNESS IMPROVEMENT OF THE TARGET MODELS AFTER ADVERSARIAL FINE-TUNING
|
1116 |
+
Task
|
1117 |
+
Model
|
1118 |
+
CARROT
|
1119 |
+
ALERT
|
1120 |
+
CODA
|
1121 |
+
CARROT
|
1122 |
+
ALERT
|
1123 |
+
CODA
|
1124 |
+
CARROT
|
1125 |
+
ALERT
|
1126 |
+
CODA
|
1127 |
+
CARROT
|
1128 |
+
ALERT
|
1129 |
+
CODA
|
1130 |
+
Vulnerability
|
1131 |
+
CodeBERT
|
1132 |
+
29.14%
|
1133 |
+
21.11%
|
1134 |
+
29.69%
|
1135 |
+
23.43%
|
1136 |
+
26.27%
|
1137 |
+
34.44%
|
1138 |
+
32.16%
|
1139 |
+
31.73%
|
1140 |
+
38.82%
|
1141 |
+
Prediction
|
1142 |
+
GraphCodeBERT
|
1143 |
+
12.37%
|
1144 |
+
19.59%
|
1145 |
+
21.65%
|
1146 |
+
16.33%
|
1147 |
+
17.35%
|
1148 |
+
23.71%
|
1149 |
+
25.77%
|
1150 |
+
24.74%
|
1151 |
+
34.02%
|
1152 |
+
Clone
|
1153 |
+
CodeBERT
|
1154 |
+
83.15%
|
1155 |
+
42.31%
|
1156 |
+
94.44%
|
1157 |
+
52.65%
|
1158 |
+
72.46%
|
1159 |
+
75.32%
|
1160 |
+
38.51%
|
1161 |
+
71.45%
|
1162 |
+
89.78%
|
1163 |
+
Detection
|
1164 |
+
GraphCodeBERT
|
1165 |
+
75.00%
|
1166 |
+
66.67%
|
1167 |
+
77.50%
|
1168 |
+
79.17%
|
1169 |
+
84.29%
|
1170 |
+
92.31%
|
1171 |
+
35.71%
|
1172 |
+
57.69%
|
1173 |
+
92.97%
|
1174 |
+
Authorship
|
1175 |
+
CodeBERT
|
1176 |
+
45.06%
|
1177 |
+
40.67%
|
1178 |
+
41.03%
|
1179 |
+
51.25%
|
1180 |
+
56.25%
|
1181 |
+
58.82%
|
1182 |
+
45.67%
|
1183 |
+
43.33%
|
1184 |
+
76.47%
|
1185 |
+
Attribution
|
1186 |
+
GraphCodeBERT
|
1187 |
+
81.75%
|
1188 |
+
67.08%
|
1189 |
+
72.40%
|
1190 |
+
79.41%
|
1191 |
+
78.67%
|
1192 |
+
100.00%
|
1193 |
+
45.59%
|
1194 |
+
80.39%
|
1195 |
+
84.75%
|
1196 |
+
Functionality
|
1197 |
+
CodeBERT
|
1198 |
+
83.46%
|
1199 |
+
72.80%
|
1200 |
+
81.51%
|
1201 |
+
70.83%
|
1202 |
+
71.75%
|
1203 |
+
79.41%
|
1204 |
+
78.92%
|
1205 |
+
71.18%
|
1206 |
+
95.43%
|
1207 |
+
Classification
|
1208 |
+
GraphCodeBERT
|
1209 |
+
67.53%
|
1210 |
+
75.19%
|
1211 |
+
77.27%
|
1212 |
+
32.04%
|
1213 |
+
52.62%
|
1214 |
+
62.98%
|
1215 |
+
91.22%
|
1216 |
+
90.81%
|
1217 |
+
93.08%
|
1218 |
+
Defect
|
1219 |
+
CodeBERT
|
1220 |
+
52.73%
|
1221 |
+
25.81%
|
1222 |
+
66.03%
|
1223 |
+
74.88%
|
1224 |
+
75.87%
|
1225 |
+
83.12%
|
1226 |
+
76.86%
|
1227 |
+
68.66%
|
1228 |
+
85.36%
|
1229 |
+
Prediction
|
1230 |
+
GraphCodeBERT
|
1231 |
+
68.20%
|
1232 |
+
48.54%
|
1233 |
+
74.88%
|
1234 |
+
52.73%
|
1235 |
+
63.91%
|
1236 |
+
59.45%
|
1237 |
+
67.08%
|
1238 |
+
68.66%
|
1239 |
+
76.14%
|
1240 |
+
Average
|
1241 |
+
59.84%
|
1242 |
+
47.98%
|
1243 |
+
63.64%
|
1244 |
+
53.27%
|
1245 |
+
59.94%
|
1246 |
+
66.96%
|
1247 |
+
53.75%
|
1248 |
+
60.86%
|
1249 |
+
76.68%
|
1250 |
+
TABLE V
|
1251 |
+
ABLATION TEST FOR CODA IN TERMS OF AVERAGE ASR
|
1252 |
+
Model
|
1253 |
+
w/o RIS
|
1254 |
+
w/o EST
|
1255 |
+
w/o IRT
|
1256 |
+
CODA
|
1257 |
+
CodeBERT
|
1258 |
+
30.83%
|
1259 |
+
62.73%
|
1260 |
+
35.14%
|
1261 |
+
73.04%
|
1262 |
+
GraphCodeBERT
|
1263 |
+
29.49%
|
1264 |
+
62.41%
|
1265 |
+
26.24%
|
1266 |
+
73.62%
|
1267 |
+
TABLE VI
|
1268 |
+
INFLUENCE OF HYPER-PARAMETER U.
|
1269 |
+
U
|
1270 |
+
64
|
1271 |
+
128
|
1272 |
+
256
|
1273 |
+
512
|
1274 |
+
1024
|
1275 |
+
CodeBERT
|
1276 |
+
60.14%
|
1277 |
+
67.90%
|
1278 |
+
73.04%
|
1279 |
+
75.27%
|
1280 |
+
75.83%
|
1281 |
+
GraphCodeBERT
|
1282 |
+
61.92%
|
1283 |
+
70.16%
|
1284 |
+
73.62%
|
1285 |
+
74.98%
|
1286 |
+
75.69%
|
1287 |
+
2) Results: Table V shows the average ASR values of each
|
1288 |
+
technique across all the tasks on CodeBERT and GraphCode-
|
1289 |
+
BERT, respectively. The results on each task can be found at
|
1290 |
+
our project homepage [19] due to the space limit. We found
|
1291 |
+
that CODA outperforms all three variants in terms of average
|
1292 |
+
ASR with improvements of 17.20%∼143.14%, demonstrating
|
1293 |
+
the contribution of each main component in CODA. Also, ref-
|
1294 |
+
erence inputs selection and identifier renaming transformations
|
1295 |
+
contribute more than equivalent structure transformations. The
|
1296 |
+
possible reason is that not all the rules of equivalent structure
|
1297 |
+
transformations can be applicable to all the target inputs,
|
1298 |
+
but identifier renaming transformations are applicable to all
|
1299 |
+
the inputs. We can enrich the rules of equivalent structure
|
1300 |
+
transformations in the future to further improve the attack
|
1301 |
+
effectiveness.
|
1302 |
+
Answer to RQ4: All the components of reference in-
|
1303 |
+
put selection, equivalent structure transformations, and
|
1304 |
+
identifier renaming transformations make contributions
|
1305 |
+
to the overall effectiveness of CODA, demonstrating
|
1306 |
+
the necessity of each of them in CODA.
|
1307 |
+
VI. THREATS TO VALIDITY
|
1308 |
+
The main threat to validity lies in the settings of param-
|
1309 |
+
eters in CODA. Here, we investigated the influence of two
|
1310 |
+
important parameters in CODA (i.e., U and N introduced in
|
1311 |
+
Section III-B). They affect the selection of reference inputs.
|
1312 |
+
Tables VI and VII show the influence of U and N in
|
1313 |
+
terms of average ASR across all the tasks. As U increases,
|
1314 |
+
CODA performs better, as incorporating more inputs for the
|
1315 |
+
second step of selection can increase the possibility of finding
|
1316 |
+
TABLE VII
|
1317 |
+
INFLUENCE OF HYPER-PARAMETER N
|
1318 |
+
N
|
1319 |
+
1
|
1320 |
+
4
|
1321 |
+
16
|
1322 |
+
32
|
1323 |
+
64
|
1324 |
+
128
|
1325 |
+
CodeBERT
|
1326 |
+
28.08%
|
1327 |
+
46.33%
|
1328 |
+
61.07%
|
1329 |
+
67.12%
|
1330 |
+
73.04%
|
1331 |
+
76.38%
|
1332 |
+
GraphCodeBERT
|
1333 |
+
31.84%
|
1334 |
+
46.46%
|
1335 |
+
60.40%
|
1336 |
+
66.12%
|
1337 |
+
73.62%
|
1338 |
+
74.93%
|
1339 |
+
more effective reference inputs. Similarly, as N increases
|
1340 |
+
within our studied range, more effective ingredients could
|
1341 |
+
be included, leading to better effectiveness. However, the
|
1342 |
+
amount of increase in terms of average ASR becomes smaller
|
1343 |
+
with U and N increasing, and meanwhile incorporating more
|
1344 |
+
inputs can incur more costs in similarity calculation or code
|
1345 |
+
transformations. Hence, by balancing the effectiveness and
|
1346 |
+
efficiency of CODA, we set U to 256 and N to 64 as the
|
1347 |
+
default settings in CODA for practical use.
|
1348 |
+
VII. RELATED WORK
|
1349 |
+
Besides the state-of-the-art techniques compared in our
|
1350 |
+
study (i.e., CARROT [12] and ALERT [14]), there are some
|
1351 |
+
other adversarial example generation techniques for deep code
|
1352 |
+
models. For example, Yefet et al. [44] proposed DAMP, which
|
1353 |
+
changes variables in the target input by gradient computation.
|
1354 |
+
It only works for the models using one-hot encoding to process
|
1355 |
+
code, and thus cannot attack the models based on state-
|
1356 |
+
of-the-art CodeBERT [6] and GraphCodeBERT [7] due to
|
1357 |
+
different encoding methods. Zhang et al. [13] proposed MHM,
|
1358 |
+
which iteratively performs identifier renaming transformations
|
1359 |
+
to generate adversarial examples based on the Metropolis-
|
1360 |
+
Hastings [45]–[47] algorithm. MHM underperforms CARROT
|
1361 |
+
and ALERT as presented by the existing studies [12], [14].
|
1362 |
+
Pour et al. [48] proposed a search-based technique with an
|
1363 |
+
iterative refactoring-based process. It does not ensure the
|
1364 |
+
naturalness of generated examples, especially with the rule
|
1365 |
+
of dead code insertion. These techniques still search for
|
1366 |
+
effective ingredients in the enormous space, limiting their
|
1367 |
+
effectiveness. Different from them, our work designs the first
|
1368 |
+
code-difference-guided attack technique, which can largely
|
1369 |
+
reduce ingredient space for improving the attack effectiveness.
|
1370 |
+
There are also many adversarial attack techniques in other
|
1371 |
+
domains, such as FGSM [49], JSMA [50], and BIM [10] in
|
1372 |
+
image processing. However, they are not applicable to attack
|
1373 |
+
deep code models as source code is discrete and has to strictly
|
1374 |
+
stick to the grammar and semantics constraints.
|
1375 |
+
10
|
1376 |
+
|
1377 |
+
VIII. CONCLUSION
|
1378 |
+
To improve the attack effectiveness to deep code models, we
|
1379 |
+
propose a novel perspective by exploiting the code differences
|
1380 |
+
between reference inputs and the target input to guide the
|
1381 |
+
generation of adversarial examples. From this perspective, we
|
1382 |
+
design CODA, which reduces the ingredient space as the one
|
1383 |
+
constituted by structure and identifier differences and designs
|
1384 |
+
equivalent structure transformations and identifier renaming
|
1385 |
+
transformations to preserve original semantics. We conducted
|
1386 |
+
an extensive study on two popular pre-trained models with
|
1387 |
+
five tasks. The results demonstrate that CODA performs more
|
1388 |
+
successful attacks with less time than the state-of-the-art
|
1389 |
+
techniques (i.e., CARROT and ALERT), and confirm the
|
1390 |
+
naturalness of its generated examples as well as the capability
|
1391 |
+
of improving the model robustness.
|
1392 |
+
REFERENCES
|
1393 |
+
[1] M. White, M. Tufano, C. Vendome, and D. Poshyvanyk, “Deep learning
|
1394 |
+
code fragments for code clone detection,” in 2016 31st IEEE/ACM
|
1395 |
+
International Conference on Automated Software Engineering (ASE).
|
1396 |
+
IEEE, 2016, pp. 87–98.
|
1397 |
+
[2] Y. Zhou, S. Liu, J. Siow, X. Du, and Y. Liu, “Devign: effective vulner-
|
1398 |
+
ability identification by learning comprehensive program semantics via
|
1399 |
+
graph neural networks,” in Proceedings of the 33rd International Con-
|
1400 |
+
ference on Neural Information Processing Systems, 2019, pp. 10 197–
|
1401 |
+
10 207.
|
1402 |
+
[3] J. Li, Y. Wang, M. R. Lyu, and I. King, “Code completion with neural
|
1403 |
+
attention and pointer networks,” in Proceedings of the 27th International
|
1404 |
+
Joint Conference on Artificial Intelligence, 2018, pp. 4159–25.
|
1405 |
+
[4] U. Alon, S. Brody, O. Levy, and E. Yahav, “code2seq: Generating
|
1406 |
+
sequences from structured representations of code,” in International
|
1407 |
+
Conference on Learning Representations, 2018.
|
1408 |
+
[5] U. Alon, M. Zilberstein, O. Levy, and E. Yahav, “code2vec: Learning
|
1409 |
+
distributed representations of code,” Proceedings of the ACM on Pro-
|
1410 |
+
gramming Languages, vol. 3, no. POPL, pp. 1–29, 2019.
|
1411 |
+
[6] Z. Feng, D. Guo, D. Tang, N. Duan, X. Feng, M. Gong, L. Shou, B. Qin,
|
1412 |
+
T. Liu, D. Jiang et al., “Codebert: A pre-trained model for programming
|
1413 |
+
and natural languages,” in Findings of the Association for Computational
|
1414 |
+
Linguistics: EMNLP 2020, 2020, pp. 1536–1547.
|
1415 |
+
[7] D. Guo, S. Ren, S. Lu, Z. Feng, D. Tang, S. Liu, L. Zhou, N. Duan,
|
1416 |
+
A. Svyatkovskiy, S. Fu et al., “Graphcodebert: Pre-training code repre-
|
1417 |
+
sentations with data flow,” in ICLR, 2021.
|
1418 |
+
[8] Y. Li, D. Choi, J. Chung, N. Kushman, J. Schrittwieser, R. Leblond,
|
1419 |
+
T. Eccles, J. Keeling, F. Gimeno, A. D. Lago et al., “Competition-
|
1420 |
+
level code generation with alphacode,” arXiv preprint arXiv:2203.07814,
|
1421 |
+
2022.
|
1422 |
+
[9] M. Chen, J. Tworek, H. Jun, Q. Yuan, H. P. d. O. Pinto, J. Kaplan,
|
1423 |
+
H. Edwards, Y. Burda, N. Joseph, G. Brockman et al., “Evaluating large
|
1424 |
+
language models trained on code,” arXiv preprint arXiv:2107.03374,
|
1425 |
+
2021.
|
1426 |
+
[10] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial examples
|
1427 |
+
in the physical world,” in Artificial intelligence safety and security.
|
1428 |
+
Chapman and Hall/CRC, 2018, pp. 99–112.
|
1429 |
+
[11] Y. Qin, N. Carlini, G. Cottrell, I. Goodfellow, and C. Raffel, “Imper-
|
1430 |
+
ceptible, robust, and targeted adversarial examples for automatic speech
|
1431 |
+
recognition,” in International conference on machine learning.
|
1432 |
+
PMLR,
|
1433 |
+
2019, pp. 5231–5240.
|
1434 |
+
[12] H. Zhang, Z. Fu, G. Li, L. Ma, Z. Zhao, H. Yang, Y. Sun, Y. Liu,
|
1435 |
+
and Z. Jin, “Towards robustness of deep program processing mod-
|
1436 |
+
els—detection, estimation, and enhancement,” ACM Transactions on
|
1437 |
+
Software Engineering and Methodology (TOSEM), vol. 31, no. 3, pp.
|
1438 |
+
1–40, 2022.
|
1439 |
+
[13] H. Zhang, Z. Li, G. Li, L. Ma, Y. Liu, and Z. Jin, “Generating adversarial
|
1440 |
+
examples for holding robustness of source code processing models,” in
|
1441 |
+
Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34,
|
1442 |
+
no. 01, 2020, pp. 1169–1176.
|
1443 |
+
[14] Z. Yang, J. Shi, J. He, and D. Lo, “Natural attack for pre-trained models
|
1444 |
+
of code,” arXiv preprint arXiv:2201.08698, 2022.
|
1445 |
+
[15] C. Casalnuovo, E. T. Barr, S. K. Dash, P. Devanbu, and E. Morgan, “A
|
1446 |
+
theory of dual channel constraints,” in 2020 IEEE/ACM 42nd Interna-
|
1447 |
+
tional Conference on Software Engineering: New Ideas and Emerging
|
1448 |
+
Results (ICSE-NIER).
|
1449 |
+
IEEE, 2020, pp. 25–28.
|
1450 |
+
[16] H. Wei and M. Li, “Supervised deep features for software functional
|
1451 |
+
clone detection by exploiting lexical and syntactical information in
|
1452 |
+
source code.” in IJCAI, 2017, pp. 3034–3040.
|
1453 |
+
[17] B. Alsulami, E. Dauber, R. Harang, S. Mancoridis, and R. Greenstadt,
|
1454 |
+
“Source code authorship attribution using long short-term memory based
|
1455 |
+
networks,” in European Symposium on Research in Computer Security.
|
1456 |
+
Springer, 2017, pp. 65–82.
|
1457 |
+
[18] J. Zhang, X. Wang, H. Zhang, H. Sun, K. Wang, and X. Liu, “A novel
|
1458 |
+
neural source code representation based on abstract syntax tree,” in
|
1459 |
+
2019 IEEE/ACM 41st International Conference on Software Engineering
|
1460 |
+
(ICSE).
|
1461 |
+
IEEE, 2019, pp. 783–794.
|
1462 |
+
[19] “Coda,” To be announced later, Accessed: 2022.
|
1463 |
+
[20] Q. Huang, X. Xia, Z. Xing, D. Lo, and X. Wang, “Api method
|
1464 |
+
recommendation without worrying about the task-api knowledge gap,” in
|
1465 |
+
2018 33rd IEEE/ACM International Conference on Automated Software
|
1466 |
+
Engineering (ASE).
|
1467 |
+
IEEE, 2018, pp. 293–304.
|
1468 |
+
[21] A. Karmakar and R. Robbes, “What do pre-trained code models know
|
1469 |
+
about code?” in 2021 36th IEEE/ACM International Conference on
|
1470 |
+
Automated Software Engineering (ASE).
|
1471 |
+
IEEE, 2021, pp. 1332–1336.
|
1472 |
+
[22] M. Allamanis, H. Peng, and C. Sutton, “A convolutional attention net-
|
1473 |
+
work for extreme summarization of source code,” in 33rd International
|
1474 |
+
Conference on Machine Learning: ICML 2016. PMLR, 2016, pp. 2091–
|
1475 |
+
2100.
|
1476 |
+
[23] A. V. Phan, M. Le Nguyen, and L. T. Bui, “Convolutional neural
|
1477 |
+
networks over control flow graphs for software defect prediction,”
|
1478 |
+
in 2017 IEEE 29th International Conference on Tools with Artificial
|
1479 |
+
Intelligence (ICTAI).
|
1480 |
+
IEEE, 2017, pp. 45–52.
|
1481 |
+
[24] M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “Accessorize to
|
1482 |
+
a crime: Real and stealthy attacks on state-of-the-art face recognition,”
|
1483 |
+
in Proceedings of the 2016 acm sigsac conference on computer and
|
1484 |
+
communications security, 2016, pp. 1528–1540.
|
1485 |
+
[25] K. Grosse, P. Manoharan, N. Papernot, M. Backes, and P. McDaniel,
|
1486 |
+
“On the (statistical) detection of adversarial examples,” arXiv preprint
|
1487 |
+
arXiv:1702.06280, 2017.
|
1488 |
+
[26] A. Prakash, N. Moran, S. Garber, A. DiLillo, and J. Storer, “Deflecting
|
1489 |
+
adversarial attacks with pixel deflection,” in Proceedings of the IEEE
|
1490 |
+
conference on computer vision and pattern recognition, 2018, pp. 8571–
|
1491 |
+
8580.
|
1492 |
+
[27] W. Shen, Y. Li, L. Chen, Y. Han, Y. Zhou, and B. Xu, “Multiple-
|
1493 |
+
boundary clustering and prioritization to promote neural network retrain-
|
1494 |
+
ing,” in Proceedings of the 35th IEEE/ACM International Conference on
|
1495 |
+
Automated Software Engineering, 2020, pp. 410–422.
|
1496 |
+
[28] G. Zhao and J. Huang, “Deepsim: deep learning code functional similar-
|
1497 |
+
ity,” in Proceedings of the 2018 26th ACM Joint Meeting on European
|
1498 |
+
Software Engineering Conference and Symposium on the Foundations
|
1499 |
+
of Software Engineering, 2018, pp. 141–151.
|
1500 |
+
[29] X. Zhou, D. Han, and D. Lo, “Assessing generalizability of codebert,”
|
1501 |
+
in 2021 IEEE International Conference on Software Maintenance and
|
1502 |
+
Evolution (ICSME).
|
1503 |
+
IEEE, 2021, pp. 425–436.
|
1504 |
+
[30] S. Lu, D. Guo, S. Ren, J. Huang, A. Svyatkovskiy, A. Blanco,
|
1505 |
+
C. Clement, D. Drain, D. Jiang, D. Tang et al., “Codexglue: A machine
|
1506 |
+
learning benchmark dataset for code understanding and generation,”
|
1507 |
+
in Thirty-fifth Conference on Neural Information Processing Systems
|
1508 |
+
Datasets and Benchmarks Track (Round 1), 2021.
|
1509 |
+
[31] C. Pan, M. Lu, and B. Xu, “An empirical study on software defect
|
1510 |
+
prediction using codebert model,” Applied Sciences, vol. 11, no. 11, p.
|
1511 |
+
4793, 2021.
|
1512 |
+
[32] K. Nakamura and N. Ishiura, “Random testing of c compilers based on
|
1513 |
+
test program generation by equivalence transformation,” in 2016 IEEE
|
1514 |
+
Asia Pacific Conference on Circuits and Systems (APCCAS).
|
1515 |
+
IEEE,
|
1516 |
+
2016, pp. 676–679.
|
1517 |
+
[33] H. Cheers, Y. Lin, and S. P. Smith, “Spplagiarise: A tool for generating
|
1518 |
+
simulated semantics-preserving plagiarism of java source code,” in 2019
|
1519 |
+
IEEE 10th International conference on software engineering and service
|
1520 |
+
science (ICSESS).
|
1521 |
+
IEEE, 2019, pp. 617–622.
|
1522 |
+
[34] P. Bojanowski, E. Grave, A. Joulin, and T. Mikolov, “Enriching word
|
1523 |
+
vectors with subword information,” Transactions of the association for
|
1524 |
+
computational linguistics, vol. 5, pp. 135–146, 2017.
|
1525 |
+
[35] “Ffmpeg,” https://www.ffmpeg.org/, Accessed: 2022.
|
1526 |
+
[36] “Qemu,” https://www.qemu.org/, Accessed: 2022.
|
1527 |
+
11
|
1528 |
+
|
1529 |
+
[37] J. Svajlenko, J. F. Islam, I. Keivanloo, C. K. Roy, and M. M. Mia,
|
1530 |
+
“Towards a big data curated benchmark of inter-project code clones,”
|
1531 |
+
in 2014 IEEE International Conference on Software Maintenance and
|
1532 |
+
Evolution.
|
1533 |
+
IEEE, 2014, pp. 476–480.
|
1534 |
+
[38] L. Mou, G. Li, L. Zhang, T. Wang, and Z. Jin, “Convolutional neural
|
1535 |
+
networks over tree structures for programming language processing,” in
|
1536 |
+
Thirtieth AAAI conference on artificial intelligence, 2016.
|
1537 |
+
[39] “Codechef,” https://codechef.com/, Accessed: 2022.
|
1538 |
+
[40] “Tree-sitter,” https://tree-sitter.github.io/tree-sitter/, Accessed: 2022.
|
1539 |
+
[41] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Good-
|
1540 |
+
fellow, and R. Fergus, “Intriguing properties of neural networks,” in
|
1541 |
+
2nd International Conference on Learning Representations, ICLR 2014,
|
1542 |
+
2014.
|
1543 |
+
[42] A. Joshi, S. Kale, S. Chandel, and D. K. Pal, “Likert scale: Explored
|
1544 |
+
and explained,” British journal of applied science & technology, vol. 7,
|
1545 |
+
no. 4, p. 396, 2015.
|
1546 |
+
[43] D. Jin, Z. Jin, J. T. Zhou, and P. Szolovits, “Is bert really robust?
|
1547 |
+
a strong baseline for natural language attack on text classification
|
1548 |
+
and entailment,” in Proceedings of the AAAI conference on artificial
|
1549 |
+
intelligence, vol. 34, no. 05, 2020, pp. 8018–8025.
|
1550 |
+
[44] N. Yefet, U. Alon, and E. Yahav, “Adversarial examples for models of
|
1551 |
+
code,” Proceedings of the ACM on Programming Languages, vol. 4, no.
|
1552 |
+
OOPSLA, pp. 1–30, 2020.
|
1553 |
+
[45] N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and
|
1554 |
+
E. Teller, “Equation of state calculations by fast computing machines,”
|
1555 |
+
The journal of chemical physics, vol. 21, no. 6, pp. 1087–1092, 1953.
|
1556 |
+
[46] W. K. Hastings, “Monte carlo sampling methods using markov chains
|
1557 |
+
and their applications,” 1970.
|
1558 |
+
[47] S. Chib and E. Greenberg, “Understanding the metropolis-hastings
|
1559 |
+
algorithm,” The american statistician, vol. 49, no. 4, pp. 327–335, 1995.
|
1560 |
+
[48] M. V. Pour, Z. Li, L. Ma, and H. Hemmati, “A search-based testing
|
1561 |
+
framework for deep neural networks of source code embedding,” in 2021
|
1562 |
+
14th IEEE Conference on Software Testing, Verification and Validation
|
1563 |
+
(ICST).
|
1564 |
+
IEEE, 2021, pp. 36–46.
|
1565 |
+
[49] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing
|
1566 |
+
adversarial examples,” arXiv preprint arXiv:1412.6572, 2014.
|
1567 |
+
[50] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and
|
1568 |
+
A. Swami, “The limitations of deep learning in adversarial settings,” in
|
1569 |
+
2016 IEEE European symposium on security and privacy (EuroS&P).
|
1570 |
+
IEEE, 2016, pp. 372–387.
|
1571 |
+
12
|
1572 |
+
|
B9E0T4oBgHgl3EQfgAGB/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
BdAzT4oBgHgl3EQfTfx4/content/2301.01250v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7a7cb07df110b98119bf1f8eafd840d8daa0eb6c1dd912eab384efb90916a837
|
3 |
+
size 890339
|
BdAzT4oBgHgl3EQfTfx4/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2e02dabcad61541e501cab7b09ffcedf8485d1e9d46188c1348ba45ecff58b51
|
3 |
+
size 5570605
|
BdAzT4oBgHgl3EQfTfx4/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ed692422150df9a6750ca6120e07ccb0b138b798f81885e7d2c39b7641cd6adc
|
3 |
+
size 224161
|
CdE1T4oBgHgl3EQfDwOw/content/tmp_files/2301.02882v1.pdf.txt
ADDED
@@ -0,0 +1,816 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
MLMC techniques for discontinuous functions
|
2 |
+
Michael B. Giles
|
3 |
+
Abstract The Multilevel Monte Carlo (MLMC) approach usually works well when
|
4 |
+
estimating the expected value of a quantity which is a Lipschitz function of inter-
|
5 |
+
mediate quantities, but if it is a discontinuous function it can lead to a much slower
|
6 |
+
decay in the variance of the MLMC correction. This article reviews the literature
|
7 |
+
on techniques which can be used to overcome this challenge in a variety of different
|
8 |
+
contexts, and discusses recent developments using either a branching diffusion or
|
9 |
+
adaptive sampling.
|
10 |
+
1 Introduction
|
11 |
+
The Multilevel Monte Carlo (MLMC) method is based on the telescoping sum
|
12 |
+
E[ �𝑃𝐿] = E[ �𝑃0] +
|
13 |
+
𝐿
|
14 |
+
∑︁
|
15 |
+
ℓ=1
|
16 |
+
E[ �𝑃ℓ−�𝑃ℓ−1]
|
17 |
+
where �𝑃ℓ represents an approximation to an output quantity of interest 𝑃 on level ℓ,
|
18 |
+
with the weak error
|
19 |
+
���E[ �𝑃ℓ−𝑃]
|
20 |
+
��� and MLMC variance V[ �𝑃ℓ−�𝑃ℓ−1], both decreasing
|
21 |
+
as the level ℓ increases, but with the corresponding computational cost per sample
|
22 |
+
increasing.
|
23 |
+
If �𝑌ℓ has expected value E[ �𝑃ℓ−�𝑃ℓ−1], with variance 𝑉ℓ and cost 𝐶ℓ, then for a
|
24 |
+
given target RMS error 𝜀, the number of levels 𝐿 and the number of independent
|
25 |
+
samples on each level can be optimised [13, 14] to give an overall cost which is
|
26 |
+
approximately equal to 𝜀−2
|
27 |
+
� 𝐿
|
28 |
+
∑︁
|
29 |
+
ℓ=0
|
30 |
+
√︁
|
31 |
+
𝐶ℓ𝑉ℓ
|
32 |
+
�2
|
33 |
+
.
|
34 |
+
Michael B. Giles
|
35 |
+
University of Oxford Mathematical Institute, Woodstock Rd, Oxford OX2 6GG, UK
|
36 |
+
e-mail: [email protected]
|
37 |
+
1
|
38 |
+
arXiv:2301.02882v1 [math.NA] 7 Jan 2023
|
39 |
+
|
40 |
+
2
|
41 |
+
Michael B. Giles
|
42 |
+
If 𝐶ℓ𝑉ℓ → 0 as ℓ → ∞, then the cost is dominated by the first term from level 0,
|
43 |
+
and the cost is approximately 𝜀−2𝐶0𝑉0, so proportional to 𝜀−2.
|
44 |
+
If 𝐶ℓ𝑉ℓ → const as ℓ → ∞, then the contributions to the cost are spread almost
|
45 |
+
equally across all levels and the cost is approximately 𝜀−2𝐿2𝐶𝐿𝑉𝐿, proportional to
|
46 |
+
𝜀−2| log 𝜀|2 if E[ �𝑃ℓ−𝑃] decays exponentially with ℓ.
|
47 |
+
Even worse, if 𝐶ℓ𝑉ℓ → ∞ then the cost is dominated by the contribution from the
|
48 |
+
finest level and so is approximately 𝜀−2𝐶𝐿𝑉𝐿 which is 𝑂(𝜀−2−(𝛾−𝛽)/𝛼) if E[ �𝑃ℓ−𝑃] ∼
|
49 |
+
2−𝛼ℓ, 𝑉ℓ ∼ 2−𝛽ℓ and 𝐶ℓ ∼ 2𝛾ℓ.
|
50 |
+
In most MLMC applications, 𝑃 is a smooth function of some intermediate solution
|
51 |
+
quantities, such as the solution of an SDE, a PDE with stochastic coefficients or
|
52 |
+
initial/boundary data, or an estimate of an inner conditional expectation. Under
|
53 |
+
these circumstances we usually have 𝛽 ≥ 𝛾 and so the MLMC complexity is 𝑂(𝜀−2)
|
54 |
+
or 𝑂(𝜀−2| log 𝜀|2).
|
55 |
+
This article is concerned with the small but important class of applications where
|
56 |
+
𝑃 is a discontinuous function of the intermediate quantities, and because of this the
|
57 |
+
MLMC variance 𝑉ℓ can decay much more slowly, leading to the complexity falling
|
58 |
+
into the third category of being 𝑂(𝜀−2−(𝛾−𝛽)/𝛼).
|
59 |
+
The good news is that there has been considerable research within the MLMC
|
60 |
+
community to address this challenge. This article surveys the variety of methods
|
61 |
+
which have been developed in the hope that this can aid researchers meeting similar
|
62 |
+
challenges in future applications.
|
63 |
+
To illustrate things, we begin by detailing two specific application challenges
|
64 |
+
which have motivated much of this research. We then discuss the many approaches
|
65 |
+
which have been developed, several of which have borrowed ideas from the literature
|
66 |
+
on computing sensitivities (the “greeks” in mathematical finance literature) of the
|
67 |
+
form
|
68 |
+
𝜕
|
69 |
+
𝜕𝛼E [ 𝑓 (𝜔, 𝛼)]
|
70 |
+
using the pathwise sensitivity approach [24] (also known as Infinitesimal Perturba-
|
71 |
+
tion Analysis, IPA for short [30]) or Likelihood Ratio Method [31], or from methods
|
72 |
+
from improving integrand smoothness to improve the rate of convergence for QMC
|
73 |
+
integration [1, 6].
|
74 |
+
1.1 Challenge 1: nested expectation
|
75 |
+
Suppose 𝑓 is a scalar function and we want to estimate the nested expectation
|
76 |
+
E [ 𝑓 (E[𝑍|𝑋]) ], where the outer expectation is with respect to a random variable
|
77 |
+
𝑋 and we will assume that the inner conditional expectation E[𝑍|𝑋] has a bounded
|
78 |
+
density near zero.
|
79 |
+
A very simple MLMC treatment 1 uses 𝑀ℓ = 2ℓ𝑀0 inner samples on level ℓ, so
|
80 |
+
estimators on level 0 and the higher levels are simply
|
81 |
+
1 Note that if 𝑓 is smooth, or at least Lipschitz, then it is better to use an “antithetic” estimator
|
82 |
+
[8, 14, 15, 18], but this does not give a better order of convergence when 𝑓 is discontinuous.
|
83 |
+
|
84 |
+
MLMC techniques for discontinuous functions
|
85 |
+
3
|
86 |
+
�𝑌0 = 𝑓 (𝑍
|
87 |
+
(0,𝑀0)),
|
88 |
+
�𝑌ℓ = 𝑓 (𝑍
|
89 |
+
(ℓ,𝑀ℓ)) − 𝑓 (𝑍
|
90 |
+
(ℓ,𝑀ℓ−1)),
|
91 |
+
where 𝑍
|
92 |
+
(ℓ,𝑀ℓ) and 𝑍
|
93 |
+
(ℓ,𝑀ℓ−1) represent independent averages of 𝑀ℓ and 𝑀ℓ−1 inde-
|
94 |
+
pendent samples of 𝑍, all conditional on the same value of 𝑋 [14, 15].
|
95 |
+
If V[𝑍|𝑋] is finite, and 𝑓 is Lipschitz with constant 𝐿 𝑓 , then
|
96 |
+
E
|
97 |
+
��
|
98 |
+
𝑓 (𝑍
|
99 |
+
(ℓ,𝑀ℓ)) − 𝑓 (E[𝑍|𝑋])
|
100 |
+
�2
|
101 |
+
| 𝑋
|
102 |
+
�
|
103 |
+
≤ 𝐿2
|
104 |
+
𝑓 E
|
105 |
+
��
|
106 |
+
𝑍
|
107 |
+
(ℓ,𝑀ℓ) − E[𝑍|𝑋]
|
108 |
+
�2
|
109 |
+
| 𝑋
|
110 |
+
�
|
111 |
+
= 𝐿2
|
112 |
+
𝑓 𝑀−1
|
113 |
+
ℓ V[𝑍|𝑋],
|
114 |
+
and hence E[�𝑌2
|
115 |
+
ℓ |𝑋] ≤ 4 𝐿2
|
116 |
+
𝑓 (𝑀−1
|
117 |
+
ℓ
|
118 |
+
+ 𝑀−1
|
119 |
+
ℓ−1)V[𝑍|𝑋] for ℓ>0. If V[𝑍|𝑋] is uniformly
|
120 |
+
bounded it follows that 𝑉ℓ = 𝑂(𝑀−1
|
121 |
+
ℓ ). If the cost of each conditional sample of 𝑍 is
|
122 |
+
𝑂(1) then 𝐶ℓ = 𝑂(𝑀ℓ) and hence the complexity is 𝑂(𝜀−2| log 𝜀|2).
|
123 |
+
Unfortunately, the situation is significantly poorer when 𝑓 is the Heaviside step
|
124 |
+
function 𝐻 defined by 𝐻(𝑥)=0 if 𝑥<0, and 𝐻(𝑥)=1 if 𝑥≥0. This occurs in many
|
125 |
+
applications because P [E[𝑍|𝑋] > 𝐾] = E [𝐻(E[𝑍|𝑋] − 𝐾)] , so it corresponds to
|
126 |
+
the probability of a conditional expectation exceeding some threshold 𝐾, which is a
|
127 |
+
very important quantity in risk calculations.
|
128 |
+
If 𝐾=0 and 𝐸[𝑍|𝑋] has a bounded density near zero then there is an 𝑂(𝑀−1/2
|
129 |
+
ℓ
|
130 |
+
)
|
131 |
+
probability that |𝐸[𝑍|𝑋] | = 𝑂(𝑀−1/2
|
132 |
+
ℓ
|
133 |
+
), which is the circumstance under which there
|
134 |
+
is an 𝑂(1) probability that �𝑌ℓ = ±1 due to 𝑍
|
135 |
+
(ℓ,𝑀ℓ) being positive and 𝑍
|
136 |
+
(ℓ,𝑀ℓ−1) being
|
137 |
+
negative, or vice versa. Hence 𝑉ℓ ≈ 𝑂(𝑀−1/2
|
138 |
+
ℓ
|
139 |
+
) and the complexity is approximately
|
140 |
+
𝑂(𝜀−5/2) [19].
|
141 |
+
This challenge is the primary motivation for Section 7, and also arises in the
|
142 |
+
context of Section 3.
|
143 |
+
1.2 Challenge 2: discontinuous payoff function
|
144 |
+
In the case of a scalar SDE
|
145 |
+
d𝑆𝑡 = 𝑎(𝑆𝑡) d𝑡 + 𝑏(𝑆𝑡) d𝑊𝑡,
|
146 |
+
(1)
|
147 |
+
with an output quantity of interest 𝑃 ≡ 𝑓 (𝑆𝑇 ), the standard estimator is
|
148 |
+
�𝑌ℓ = �𝑃ℓ − �𝑃ℓ−1
|
149 |
+
where the same Brownian motion 𝑊𝑡 is used to calculate both �𝑃ℓ and �𝑃ℓ−1, but with
|
150 |
+
different uniform timesteps ℎℓ and ℎℓ−1.
|
151 |
+
If 𝑓 is Lipschitz with constant 𝐿 𝑓 , then
|
152 |
+
𝑉ℓ ≤ E
|
153 |
+
�
|
154 |
+
( �𝑃ℓ − �𝑃ℓ−1)2�
|
155 |
+
≤ 𝐿2
|
156 |
+
𝑓 E
|
157 |
+
�
|
158 |
+
(�𝑆ℓ − �𝑆ℓ−1)2�
|
159 |
+
|
160 |
+
4
|
161 |
+
Michael B. Giles
|
162 |
+
where �𝑆ℓ is the level ℓ numerical approximation to 𝑆𝑇 . Hence, based on standard
|
163 |
+
strong convergence results [28] we have 𝑉ℓ = 𝑂(ℎℓ) for an Euler-Maruyama dis-
|
164 |
+
cretisation of the SDE, and 𝑉ℓ = 𝑂(ℎ2
|
165 |
+
ℓ) for the first order Milstein discretisation.
|
166 |
+
The cost 𝐶ℓ is 𝑂(ℎ−1
|
167 |
+
ℓ ) in both cases, giving MLMC complexities of 𝑂(𝜀−2| log 𝜀|2)
|
168 |
+
and 𝑂(𝜀−2), respectively,
|
169 |
+
In mathematical finance, a digital call option payoff is 0 or 1, depending on
|
170 |
+
whether 𝑆𝑇 is below or above the strike 𝐾, so the payoff function can be written
|
171 |
+
as 𝑓 (𝑆𝑇 ) = 𝐻(𝑆𝑇 −𝐾). The MLMC problem is that a small difference between the
|
172 |
+
coarse and fine paths can give a payoff difference of ±1 if the two paths straddle the
|
173 |
+
strike, i.e. are on different sides of the strike.
|
174 |
+
When using the Euler-Maruyama approximation of the SDE, �𝑆ℓ−�𝑆ℓ−1 = 𝑂(ℎ1/2
|
175 |
+
ℓ ).
|
176 |
+
Speaking loosely (see [4, 21] for the rigorous analysis) an 𝑂(ℎ1/2
|
177 |
+
ℓ ) fraction of
|
178 |
+
fine/coarse pairs straddle the strike, so 𝑉ℓ = 𝑂(ℎ1/2
|
179 |
+
ℓ ) and hence the complexity is
|
180 |
+
𝑂(𝜀−5/2).
|
181 |
+
Similarly, using the Milstein approximation gives �𝑆ℓ−�𝑆ℓ−1 = 𝑂(ℎℓ) so 𝑉ℓ =
|
182 |
+
𝑂(ℎℓ). This is clearly better, and gives a complexity which is 𝑂(𝜀−2| log 𝜀|2), but
|
183 |
+
there is still the problem that most MLMC samples 𝑌ℓ are zero on the finer levels, so
|
184 |
+
the kurtosis is 𝑂(ℎ−1
|
185 |
+
ℓ ) which causes problems in practice in estimating 𝑉ℓ accurately
|
186 |
+
to determine the number of samples 𝑁ℓ to use on level ℓ. In addition, there is the
|
187 |
+
difficulty that the Milstein discretisation of multi-dimensional SDEs often requires
|
188 |
+
the simulation of Lévy areas, though this problem can be addressed through the use
|
189 |
+
of an antithetic estimator [23].
|
190 |
+
This challenge is the primary motivation for Sections 2, 4, 5 and 6, also also arises
|
191 |
+
in Sections 3 and 7.
|
192 |
+
2 Explicit smoothing
|
193 |
+
The pathwise sensitivity analysis (or IPA) approach to compute the parameter sen-
|
194 |
+
sitivities known as Greeks in mathematical finance [24] requires that the payoff
|
195 |
+
function 𝑓 is continuous and piecewise smooth. This is clearly a problem with digi-
|
196 |
+
tal options, and one standard approach is to smooth the payoff function by replacing
|
197 |
+
the Heaviside step function 𝐻 with a smoothed approximation 𝐻𝛿(𝑥) ≡ 𝑔(𝑥/𝛿),
|
198 |
+
with 𝑔(𝑥) → 0 as 𝑥 → −∞ and 𝑔(𝑥) → 1 as 𝑥 → +∞, so the discontinuity is
|
199 |
+
smoothed over a width of 𝑂(𝛿).
|
200 |
+
For financial reasons, the preference is often to use a one-sided smoothing, such
|
201 |
+
as the piecewise linear approximation shown in yellow in Figure 1. This one-sided
|
202 |
+
approximation introduces a weak error, or bias, which is 𝑂(𝛿). If it is used for
|
203 |
+
MLMC, then 𝐻′
|
204 |
+
𝛿(𝑆𝑇 ) = 𝛿−1 for the 𝑂(𝛿) fraction of the paths which end up in the
|
205 |
+
ramp region, and therefore 𝑉ℓ = 𝑂(𝛿 × (𝛿−1)2) = 𝑂(𝛿−1). Hence the optimal choice
|
206 |
+
of 𝛿 involves a tradeoff between bias and variance.
|
207 |
+
The bias can be reduced by making the smoothing anti-symmetric about 𝑥 = 0 so
|
208 |
+
that 𝐻𝛿(𝑥) − 𝐻(𝑥) = −(𝐻𝛿(−𝑥) − 𝐻(−𝑥)), for example by choosing 𝑔(𝑥) ≡ Φ(𝑥)
|
209 |
+
|
210 |
+
MLMC techniques for discontinuous functions
|
211 |
+
5
|
212 |
+
as illustrated in orange in Figure 1. If 𝑆𝑇 has the smooth probability density 𝜌(𝑆)
|
213 |
+
then the weak error is
|
214 |
+
∫ ∞
|
215 |
+
−∞
|
216 |
+
(𝐻𝛿(𝑆−𝐾) − 𝐻(𝑆−𝐾)) 𝜌(𝑆) d𝑆 = 𝛿
|
217 |
+
∫ ∞
|
218 |
+
−∞
|
219 |
+
(𝑔(𝑥) − 𝐻(𝑥)) 𝜌(𝐾+𝑥𝛿) d𝑥
|
220 |
+
and a Taylor series expansion of 𝜌(𝐾+𝑥𝛿) results in the asymptotic error expansion
|
221 |
+
𝑎1𝜌(𝐾) 𝛿 + 𝑎2𝜌′(𝐾) 𝛿2 + 𝑎3𝜌′′(𝐾) 𝛿3 + 𝑎4𝜌′′′(𝐾) 𝛿4 + 𝑂(𝛿5)
|
222 |
+
where
|
223 |
+
𝑎𝑘 =
|
224 |
+
∫ ∞
|
225 |
+
−∞
|
226 |
+
𝑥𝑘−1 (𝑔(𝑥) − 𝐻(𝑥)) d𝑥.
|
227 |
+
If 𝑔(𝑥) − 𝐻(𝑥) = − (𝑔(−𝑥) − 𝐻(−𝑥)) then 𝑎1 = 𝑎3 = 0, and
|
228 |
+
𝑎2 = 2
|
229 |
+
∫ ∞
|
230 |
+
0
|
231 |
+
𝑥(𝑔(𝑥) − 1) d𝑥,
|
232 |
+
𝑎4 = 2
|
233 |
+
∫ ∞
|
234 |
+
0
|
235 |
+
𝑥3(𝑔(𝑥) − 1) d𝑥.
|
236 |
+
If 𝑔(𝑥) is monotonic, then 𝑎2 ≠ 0, but by considering non-monotonic functions
|
237 |
+
such as 𝑔(𝑥) = (4/3) Φ(𝑥) − (1/3) Φ(2𝑥) it is possible to set 𝑎2 = 0 making the
|
238 |
+
weak error 𝑂(𝛿4). Hence, to achieve 𝑂(𝜀) accuracy overall we need 𝛿=𝑂(𝜀1/4), and
|
239 |
+
then on the coarsest levels 𝑉ℓ = 𝑂(𝛿−1) = 𝑂(𝜀−1/4) so the overall complexity is
|
240 |
+
approximately 𝑂(𝜀−2−1/4) in the best cases where the overall cost is dominated by
|
241 |
+
the cost on the coarsest levels.
|
242 |
+
Giles, Nagapetyan & Ritter [22] used explicit smoothing for estimating cumulative
|
243 |
+
distribution functions (CDFs). For a scalar random variable 𝑋, to estimate 𝐶(𝑥) =
|
244 |
+
P(𝑋 < 𝑥) = E[𝐻(𝑥−𝑋)], the approach they adopted was to use MLMC to estimate
|
245 |
+
𝐶(𝑥 𝑗) for a set of spline points 𝑥 𝑗 and then interpolate these values with a cubic
|
246 |
+
spline. Overall, their method balanced three weak errors, the SDE discretisation error
|
247 |
+
on the finest level, the smoothing error due to 𝐻𝛿, and the cubic spline interpolation
|
248 |
+
error, in addition to the MLMC sampling error.
|
249 |
+
0.5
|
250 |
+
1
|
251 |
+
1.5
|
252 |
+
ST
|
253 |
+
0
|
254 |
+
0.2
|
255 |
+
0.4
|
256 |
+
0.6
|
257 |
+
0.8
|
258 |
+
1
|
259 |
+
f(S T)
|
260 |
+
Fig. 1 Two explicitly smoothed versions of the Heaviside step function for a digital call option
|
261 |
+
|
262 |
+
6
|
263 |
+
Michael B. Giles
|
264 |
+
3 Integration/differentiation and Malliavin calculus
|
265 |
+
Krumscheid & Nobile [29] used a slightly different approach for estimating CDFs,
|
266 |
+
particularly in the context of risk estimation. Starting from the identity
|
267 |
+
d
|
268 |
+
d𝑥 E [ max(0, 𝑥−𝑆𝑇 ) ] = E[ 𝐻(𝑥−𝑆𝑇 ) ]
|
269 |
+
they used MLMC to estimate E[ max(0, 𝑥 𝑗−𝑆𝑇 ) ] for a set of spline points 𝑥 𝑗,
|
270 |
+
interpolated these with a cubic spline, and and then differentiated the spline to
|
271 |
+
obtain an approximation to the CDF 𝐶(𝑥). This avoids the extra weak error due to
|
272 |
+
smoothing the Heaviside function, but differentiating the cubic spline amplifies the
|
273 |
+
noise in the spline data.
|
274 |
+
On a similar note, Altmayer & Neuenkirch [2] used Malliavin calculus integration
|
275 |
+
by parts to treat discontinuous payoffs based on solutions of the Heston stochastic
|
276 |
+
volatility SDE. They observed that asymptotically this improves the MLMC vari-
|
277 |
+
ance on the finer levels, but it increases the variance on coarse levels. To address
|
278 |
+
this, they split the payoff into a smooth part which they treated with the standard
|
279 |
+
MLMC approach, and a compact-support discontinuous part for which they used the
|
280 |
+
Malliavin MLMC.
|
281 |
+
Malliavin calculus was originally developed for computing sensitivities, so this
|
282 |
+
is another example of the literature on sensitivity calculations being exploited to
|
283 |
+
develop improved MLMC algorithms.
|
284 |
+
4 Conditional expectation
|
285 |
+
When using the first order Milstein discretisation for an SDE, one way to improve
|
286 |
+
the MLMC variance for digital options is to switch to the Euler-Maruyama approxi-
|
287 |
+
mation for the final timestep, and then take the conditional expectation with respect
|
288 |
+
to the final fine path Brownian increment Δ𝑊 [12, 17].
|
289 |
+
For the fine path approximation of the scalar SDE (1) with 𝑁 timesteps of size
|
290 |
+
ℎℓ, the path value 𝑆𝑇 at the final time 𝑇 is given by
|
291 |
+
�𝑆 𝑓
|
292 |
+
𝑇 = �𝑆 𝑓
|
293 |
+
𝑇 −ℎℓ + 𝑎(�𝑆 𝑓
|
294 |
+
𝑇 −ℎℓ) ℎℓ + 𝑏(�𝑆 𝑓
|
295 |
+
𝑇 −ℎℓ) Δ𝑊𝑁 ,
|
296 |
+
and therefore the conditional expected value for the digital call option is
|
297 |
+
�𝑃 𝑓
|
298 |
+
ℓ
|
299 |
+
= E
|
300 |
+
�
|
301 |
+
𝐻(�𝑆 𝑓
|
302 |
+
𝑇 −𝐾) | �𝑆 𝑓
|
303 |
+
𝑇 −ℎℓ
|
304 |
+
�
|
305 |
+
= Φ ��
|
306 |
+
�
|
307 |
+
�𝑆 𝑓
|
308 |
+
𝑇 −ℎℓ + 𝑎(�𝑆 𝑓
|
309 |
+
𝑇 −ℎℓ) ℎℓ − 𝐾
|
310 |
+
𝑏(�𝑆 𝑓
|
311 |
+
𝑇 −ℎℓ) √ℎℓ
|
312 |
+
��
|
313 |
+
�
|
314 |
+
.
|
315 |
+
Similarly, for the coarse path with coarse timestep ℎℓ−1 = 2 ℎℓ, the Brownian incre-
|
316 |
+
ment for the final coarse timestep is the sum of the last two Brownian increments for
|
317 |
+
the fine path, Δ𝑊𝑁 −1+Δ𝑊𝑁 , and therefore
|
318 |
+
|
319 |
+
MLMC techniques for discontinuous functions
|
320 |
+
7
|
321 |
+
�𝑆𝑐
|
322 |
+
𝑇 = �𝑆𝑐
|
323 |
+
𝑇 −ℎℓ−1 + 𝑎(�𝑆𝑐
|
324 |
+
𝑇 −ℎℓ−1) ℎℓ−1 + 𝑏(�𝑆𝑐
|
325 |
+
𝑇 −ℎℓ−1) (Δ𝑊𝑁 −1+Δ𝑊𝑁 ) ,
|
326 |
+
from which we obtain
|
327 |
+
�𝑃𝑐
|
328 |
+
ℓ−1 = E
|
329 |
+
�
|
330 |
+
𝐻(�𝑆𝑐
|
331 |
+
𝑇 −𝐾) | �𝑆𝑐
|
332 |
+
𝑇 −ℎℓ−1, Δ𝑊𝑁 −1
|
333 |
+
�
|
334 |
+
= Φ
|
335 |
+
� �𝑆𝑐
|
336 |
+
𝑇 −ℎℓ−1 + 𝑎(�𝑆𝑐
|
337 |
+
𝑇 −ℎℓ−1) ℎℓ−1 + 𝑏(�𝑆𝑐
|
338 |
+
𝑇 −ℎℓ−1) Δ𝑊𝑁 −1 − 𝐾
|
339 |
+
𝑏(�𝑆𝑐
|
340 |
+
𝑇 −ℎℓ−1) √ℎℓ
|
341 |
+
�
|
342 |
+
.
|
343 |
+
With �𝑌ℓ ≡ �𝑃ℓ−�𝑃ℓ−1, numerical analysis [17] proves that 𝑉ℓ ≈ 𝑂(ℎ3/2
|
344 |
+
ℓ ) so the
|
345 |
+
MLMC complexity is 𝑂(𝜀−2). Heuristically, this is because there is an 𝑂(ℎ1/2
|
346 |
+
ℓ )
|
347 |
+
probability of paths being within 𝑂(ℎ1/2
|
348 |
+
ℓ ) of the strike 𝐾, and for these
|
349 |
+
�𝑆 𝑓
|
350 |
+
𝑇 −ℎℓ−1 − �𝑆𝑐
|
351 |
+
𝑇 −ℎℓ−1 = 𝑂(ℎℓ),
|
352 |
+
𝜕 �𝑃
|
353 |
+
𝜕�𝑆
|
354 |
+
= 𝑂(ℎ−1/2
|
355 |
+
ℓ
|
356 |
+
)
|
357 |
+
=⇒
|
358 |
+
�𝑃ℓ − �𝑃ℓ−1 = 𝑂(ℎ1/2
|
359 |
+
ℓ ),
|
360 |
+
so 𝑉ℓ ≈ 𝑂(ℎ1/2
|
361 |
+
ℓ
|
362 |
+
× (ℎ1/2
|
363 |
+
ℓ )2) = 𝑂(ℎ3/2
|
364 |
+
ℓ ). In addition, the kurtosis is improved to
|
365 |
+
𝑂(ℎ−1/2
|
366 |
+
ℓ
|
367 |
+
).
|
368 |
+
Unfortunately, the conditional expectation approach does not help when the Euler-
|
369 |
+
Maruyama discretisation is used for the entire path since �𝑆 𝑓
|
370 |
+
𝑇 −ℎℓ−1−�𝑆𝑐
|
371 |
+
𝑇 −ℎℓ−1 = 𝑂(ℎ1/2
|
372 |
+
ℓ )
|
373 |
+
and so �𝑃ℓ − �𝑃ℓ−1 = 𝑂(1)
|
374 |
+
The use of this kind of conditional expectation is a standard technique for smooth-
|
375 |
+
ing the payoff to enable IPA/pathwise sensitivity calculations [24]. Another example
|
376 |
+
is a down-and-out barrier option, where the option is knocked out if the path drops
|
377 |
+
below a certain value. In this case the payoff can be smoothed by computing the
|
378 |
+
probability of this happening, conditional on the computed path approximations at
|
379 |
+
discrete timesteps [24]. Again, this works well for MLMC when using the first or-
|
380 |
+
der Milstein discretisation [12, 17], but it does not help with the Euler-Maruyama
|
381 |
+
discretisation.
|
382 |
+
A different kind of conditional expectation smoothing was introduced by Achtsis,
|
383 |
+
Cools & Nuyens [1] and Bayer, Siebenmorgen & Tempone [6] to improve the
|
384 |
+
convergence of QMC computations, and then used by Bayer, Ben Hammouda &
|
385 |
+
Tempone [5] to improve the MLMC variance for digital options.
|
386 |
+
In its simplest form, they split the random inputs for the numerical simulation into
|
387 |
+
a scalar 𝑍 and the remainder 𝑍𝑟, and express the desired MLMC level ℓ expectation
|
388 |
+
as
|
389 |
+
E[ �𝑃ℓ−�𝑃ℓ−1] = E
|
390 |
+
�
|
391 |
+
E[ �𝑃ℓ−�𝑃ℓ−1 | 𝑍𝑟]
|
392 |
+
�
|
393 |
+
and observe that in many financial applications it is possible to perform this split
|
394 |
+
in a way such that the conditional expectations E[ �𝑃ℓ | 𝑍𝑟], E[ �𝑃ℓ−1 | 𝑍𝑟] are smooth
|
395 |
+
functions of 𝑍𝑟, and can be evaluated analytically or very accurately by 1D numerical
|
396 |
+
quadrature when there is just a single discontinuity with respect to changes in 𝑍.
|
397 |
+
|
398 |
+
8
|
399 |
+
Michael B. Giles
|
400 |
+
For a scalar SDE, 𝑍 could be the terminal value of the driving Brownian motion,
|
401 |
+
in which case 𝑍𝑟 would represent the other Normal random variables required for a
|
402 |
+
Brownian Bridge construction of the Brownian increments.
|
403 |
+
5 Change of measure
|
404 |
+
Another approach to treating digital options using the Milstein discretisation is to
|
405 |
+
use a change of measure [9, 14], which has connections to the Likelihood Ratio
|
406 |
+
Method (LRM) that is used for sensitivity analysis [31].
|
407 |
+
For both the fine and coarse paths, we have conditional Gaussian distributions for
|
408 |
+
�𝑆𝑇 , with slightly different means and variances, as illustrated in Figure 2. We can
|
409 |
+
therefore perform a change of measure to the same Gaussian distribution with mean
|
410 |
+
𝜇 and variance 𝜎2, also illustrated in Figure 2, and then pick the same sample �𝑆𝑇
|
411 |
+
for both paths from this common Gaussian distribution.
|
412 |
+
The resulting MLMC estimator is
|
413 |
+
�𝑌ℓ = 𝑓 (�𝑆𝑇 ) (𝑅ℓ − 𝑅ℓ−1)
|
414 |
+
where 𝑅ℓ, 𝑅ℓ−1 are the respective Radon-Nikodym derivatives for the fine and coarse
|
415 |
+
paths. For the scalar SDE (1), 𝑅ℓ is
|
416 |
+
𝑅ℓ =
|
417 |
+
𝜎
|
418 |
+
𝑏(�𝑆 𝑓
|
419 |
+
𝑇 −ℎℓ)√ℎℓ
|
420 |
+
exp
|
421 |
+
�
|
422 |
+
− (�𝑆𝑇 − �𝑆 𝑓
|
423 |
+
𝑇 −ℎℓ − 𝑎(�𝑆 𝑓
|
424 |
+
𝑇 −ℎℓ) ℎℓ)2 / (2 𝑏2(�𝑆 𝑓
|
425 |
+
𝑇 −ℎℓ) ℎℓ)
|
426 |
+
�
|
427 |
+
exp
|
428 |
+
�
|
429 |
+
− (�𝑆𝑇 −𝜇)2 / (2𝜎2)
|
430 |
+
�
|
431 |
+
and 𝑅ℓ−1 is defined similarly. It can be shown that the difference 𝑅ℓ − 𝑅ℓ−1 is
|
432 |
+
approximately 𝑂(ℎ1/2
|
433 |
+
ℓ ), which implies that 𝑉ℓ ≈ 𝑂(ℎℓ). To improve the variance we
|
434 |
+
note that the conditional expected value of Radon-Nikodym derivatives is always 1,
|
435 |
+
0.6
|
436 |
+
0.8
|
437 |
+
1
|
438 |
+
1.2
|
439 |
+
1.4
|
440 |
+
ST
|
441 |
+
0
|
442 |
+
0.1
|
443 |
+
0.2
|
444 |
+
0.3
|
445 |
+
0.4
|
446 |
+
p(ST)
|
447 |
+
Fig. 2 Coarse and fine path conditional Gaussian distributions, plus third common distribution
|
448 |
+
|
449 |
+
MLMC techniques for discontinuous functions
|
450 |
+
9
|
451 |
+
0
|
452 |
+
0.2
|
453 |
+
0.4
|
454 |
+
0.6
|
455 |
+
0.8
|
456 |
+
1
|
457 |
+
1.2
|
458 |
+
t
|
459 |
+
1
|
460 |
+
1.5
|
461 |
+
2
|
462 |
+
S
|
463 |
+
Fig. 3 Illustration of coarse and fine jump-diffusion paths with jumps before and after 𝑇 = 1.
|
464 |
+
i.e. E[𝑅ℓ | �𝑆 𝑓
|
465 |
+
𝑇 −ℎℓ] = E[𝑅ℓ−1 | �𝑆𝑐
|
466 |
+
𝑇 −ℎℓ−1, Δ𝑊𝑁 −1] = 1, and therefore we can change
|
467 |
+
the definition of �𝑌ℓ to
|
468 |
+
�𝑌ℓ =
|
469 |
+
�
|
470 |
+
𝑓 (�𝑆𝑇 ) − 𝑓 (𝜇)
|
471 |
+
�
|
472 |
+
(𝑅ℓ − 𝑅ℓ−1)
|
473 |
+
without changing its expected value. This estimator is now non-zero only when �𝑆𝑇
|
474 |
+
and 𝜇 are on opposite sides of the strike 𝐾, which occurs for an 𝑂(ℎ1/2
|
475 |
+
ℓ ) fraction of
|
476 |
+
coarse/fine paths. Hence the new MLMC variance 𝑉ℓ is approximately 𝑂(ℎ3/2
|
477 |
+
ℓ ), as
|
478 |
+
with the use of the analytic conditional expectation.
|
479 |
+
The benefit of this approach is that it works well in multiple dimensions when it is
|
480 |
+
often not possible to evaluate the analytic conditional expectation [9, 14]. However,
|
481 |
+
again it does not help with the full path Euler-Maruyama discretisation because that
|
482 |
+
gives 𝑅ℓ − 𝑅ℓ−1 = 𝑂(1).
|
483 |
+
An earlier use of a change of measure in an MLMC computation was by Xia
|
484 |
+
[33, 34] for a Merton-style jump-diffusion SDE with a path-dependent jump rate
|
485 |
+
𝜆(𝑆, 𝑡). The challenge in this application, as illustrated in Figure 3, is that the
|
486 |
+
coarse and fine paths will jump at different times, and one might jump just before
|
487 |
+
the final time 𝑇, and the other just after, leading to a large jump in the computed
|
488 |
+
value of 𝑓 (𝑆𝑇 ). The path-dependent jump rate was treated by using the thinning
|
489 |
+
technique of Glasserman & Merener [25], over-sampling possible jump times using
|
490 |
+
a uniform rate 𝜆𝑠𝑢𝑝 > 𝜆(𝑆, 𝑡) and then using an acceptance/rejection step to select
|
491 |
+
the real jump times. Xia modified this with a change of measure to ensure the same
|
492 |
+
acceptance/rejection decision for both the fine and coarse paths so that they both
|
493 |
+
jump at the same time. This leads to an estimator of the form
|
494 |
+
�𝑌ℓ = �𝑃ℓ 𝑅ℓ − �𝑃ℓ−1 𝑅ℓ−1.
|
495 |
+
|
496 |
+
10
|
497 |
+
Michael B. Giles
|
498 |
+
When combined with a first order Milstein discretisation of the SDE between the
|
499 |
+
jump times, this gives 𝑉ℓ = 𝑂(ℎ2
|
500 |
+
ℓ) for Lipschitz payoff functions such as a standard
|
501 |
+
put or call option [33, 34].
|
502 |
+
6 Splitting
|
503 |
+
Returning to the challenge of digital options arising from the solution of an SDE,
|
504 |
+
a third approach is to use path-splitting to generate an unbiased estimate of the
|
505 |
+
conditional expectation introduced in Section 4 [14].
|
506 |
+
This is a variant of the general splitting technique [3]. As illustrated in Figure 4,
|
507 |
+
it involves performing a standard fine path simulation up until one timestep before
|
508 |
+
the final time 𝑇, and then performing multiple independent simulations of the final
|
509 |
+
timestep, averaging the payoff for each of these to get an approximation of the
|
510 |
+
conditional expectation. The same is done for the coarse path except that each of the
|
511 |
+
splits uses the same Δ𝑊𝑁 −1 that was used for the second to last fine path timestep.
|
512 |
+
Since the computational cost of the path up to the splitting time is 𝑂(ℎ−1
|
513 |
+
ℓ ), it means
|
514 |
+
that up to 𝑂(ℎ−1
|
515 |
+
ℓ ) splits can be used without increasing the path cost significantly. If
|
516 |
+
𝑀ℓ splits are used, then the standard splitting variance analysis gives
|
517 |
+
V[�𝑌ℓ] = V
|
518 |
+
�
|
519 |
+
E[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
|
520 |
+
�
|
521 |
+
+ 𝑀−1
|
522 |
+
ℓ E
|
523 |
+
�
|
524 |
+
V[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
|
525 |
+
�
|
526 |
+
.
|
527 |
+
As discussed previously V
|
528 |
+
�
|
529 |
+
E[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
|
530 |
+
�
|
531 |
+
= 𝑂(ℎ3/2
|
532 |
+
ℓ ), and similarly it
|
533 |
+
can be argued that E
|
534 |
+
�
|
535 |
+
V[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
|
536 |
+
�
|
537 |
+
= 𝑂(ℎℓ). Therefore choosing 𝑀ℓ
|
538 |
+
to lie between 𝑂(ℎ−1
|
539 |
+
ℓ ) and 𝑂(ℎ−1/2
|
540 |
+
ℓ
|
541 |
+
) ensures the benefits of the splitting are obtained
|
542 |
+
without significantly increasing the computational cost per sample.
|
543 |
+
0
|
544 |
+
0.2
|
545 |
+
0.4
|
546 |
+
0.6
|
547 |
+
0.8
|
548 |
+
1
|
549 |
+
t
|
550 |
+
0.8
|
551 |
+
1
|
552 |
+
1.2
|
553 |
+
1.4
|
554 |
+
1.6
|
555 |
+
1.8
|
556 |
+
St
|
557 |
+
Fig. 4 Path splitting in final timestep to estimate conditional expectation
|
558 |
+
|
559 |
+
MLMC techniques for discontinuous functions
|
560 |
+
11
|
561 |
+
As an additional bonus, one can use the more accurate Milstein discretisation
|
562 |
+
for the final timestep, instead of switching to the Euler-Maruyama discretisation.
|
563 |
+
Burgos [9, 10] gives more details of the analysis, and also used the same approach
|
564 |
+
for pathwise sensitivity analysis for a variety of financial options.
|
565 |
+
Giles & Bernal [16] also used splitting for Feynman-Kac functionals arising for
|
566 |
+
stopped diffusions, SDE simulations which terminate when the solution path leaves
|
567 |
+
a prescribed domain. The issue here is that when a fine path exits, there is an 𝑂(ℎ1/2
|
568 |
+
ℓ )
|
569 |
+
probability that the corresponding coarse path does not leave until much later. This
|
570 |
+
is addressed by estimating a conditional expectation by splitting the coarse path into
|
571 |
+
𝑂(ℎ−1/2
|
572 |
+
ℓ
|
573 |
+
) independent sub-simulations which continue until each of them leaves the
|
574 |
+
domain. 𝑉ℓ is improved from 𝑂(ℎ1/2
|
575 |
+
ℓ ) to approximately 𝑂(ℎℓ) without a significant
|
576 |
+
increase in the cost per sample, and finally the MLMC complexity achieved is
|
577 |
+
𝑂(𝜀−2| log 𝜀|3).
|
578 |
+
None of the three methods introduced so far (conditional expectation, change of
|
579 |
+
measure, splitting) helps when using the Euler-Maruyama discretisation. For this, a
|
580 |
+
new method has recently been developed by Giles & Haji-Ali [20].
|
581 |
+
It again uses splitting, but inspired by the simulation of branching diffusions, it
|
582 |
+
considers splits at multiple deterministic times, as illustrated in Figure 5 which shows
|
583 |
+
the logical structure of a set of split paths. Here we are considering a simulation
|
584 |
+
on the unit time interval. A single pair of fine/coarse paths is calculated up to time
|
585 |
+
𝑡 = 1/2, with the number of fine timesteps being 1
|
586 |
+
2 ℎ−1
|
587 |
+
ℓ . This simulation is then
|
588 |
+
split into two separate independent simulations up to time 𝑡 = 3/4, with the two
|
589 |
+
simulations between them accounting for an additional 1
|
590 |
+
2 ℎ−1
|
591 |
+
ℓ
|
592 |
+
fine timesteps. There
|
593 |
+
are further splits at 𝑡 = 3/4, then at 𝑡 = 7/8, and so on, with the final split when there
|
594 |
+
is just one coarse timestep left.
|
595 |
+
The total number of fine timesteps simulated is 𝑂(ℎ−1
|
596 |
+
ℓ | log ℎℓ|) so the computa-
|
597 |
+
tional cost is only slightly increased compared to the original method with a single
|
598 |
+
pair of fine/coarse paths. �𝑌ℓ is defined to be the average of the values �𝑃ℓ−�𝑃ℓ−1 for
|
599 |
+
each of the final paths, and it can be proved that its variance is 𝑂(ℎℓ), the same
|
600 |
+
0
|
601 |
+
0.2
|
602 |
+
0.4
|
603 |
+
0.6
|
604 |
+
0.8
|
605 |
+
1
|
606 |
+
t
|
607 |
+
-0.3
|
608 |
+
-0.2
|
609 |
+
-0.1
|
610 |
+
0
|
611 |
+
0.1
|
612 |
+
0.2
|
613 |
+
Fig. 5 Repeated path splitting to estimate conditional expectation
|
614 |
+
|
615 |
+
12
|
616 |
+
Michael B. Giles
|
617 |
+
asymptotic order of convergence as for Lipschitz payoff functions [20]. The kurtosis
|
618 |
+
is also improved, so this technique fully addresses the challenge of using MLMC
|
619 |
+
with the Euler-Maruyama discretisation to estimate digital option values.
|
620 |
+
7 Adaptive sampling
|
621 |
+
We return now to the challenge of estimating the nested expectation E [ 𝐻 (E[𝑍|𝑋]) ]
|
622 |
+
and we note that we only need an accurate estimate of the inner conditional expecta-
|
623 |
+
tion E[𝑍|𝑋] when it is near zero. This observation is the basis for the development
|
624 |
+
of adaptive sampling by Broadie, Du & Moallemi [7] within a standard Monte Carlo
|
625 |
+
procedure. This was then extended to adaptive sampling combined with MLMC by
|
626 |
+
Giles & Haji-Ali [19] by defining the number of inner samples 𝑀ℓ on level ℓ to be
|
627 |
+
•
|
628 |
+
𝑀ℓ = 2ℓ𝑀0 inner samples when |E[𝑍|𝑋]| ≫
|
629 |
+
√︁
|
630 |
+
V[𝑍|𝑋]/(2ℓ𝑀0)
|
631 |
+
This is the smallest number of samples used on level ℓ.
|
632 |
+
√︁
|
633 |
+
V[𝑍|𝑋]/(2ℓ𝑀0) is
|
634 |
+
the standard deviation of the Monte Carlo estimate for E[𝑍|𝑋], so the inequality
|
635 |
+
means that this number of samples is sufficient to be very sure that the estimate
|
636 |
+
has the correct sign.
|
637 |
+
•
|
638 |
+
𝑀ℓ = 4ℓ𝑀0 inner samples when |E[𝑍|𝑋]| = 𝑂(
|
639 |
+
√︁
|
640 |
+
V[𝑍|𝑋]/(4ℓ𝑀0))
|
641 |
+
This is the maximum number of samples used on level ℓ. In this case, the estimate
|
642 |
+
of E[𝑍|𝑋] may have the incorrect sign, but this will only happen when |E[𝑍|𝑋]| =
|
643 |
+
𝑂(2−ℓ) which occurs with probability 𝑂(2−ℓ). Likewise, the total cost of the
|
644 |
+
higher number of samples in this region is 𝑂(2−ℓ × 4ℓ) = 𝑂(2ℓ), so it does not
|
645 |
+
significantly increase the overall average cost.
|
646 |
+
•
|
647 |
+
2ℓ𝑀0 < 𝑀ℓ < 4ℓ𝑀0 for intermediate values
|
648 |
+
In this region the number of samples is chosen to be very sure that the estimate
|
649 |
+
of E[𝑍|𝑋] has the correct sign, and at the same time the total cost is 𝑂(2ℓ).
|
650 |
+
Overall, this adaptive sampling approach leads to 𝐶ℓ ∼ 2ℓ, 𝑉ℓ ∼ 2−ℓ and hence
|
651 |
+
a complexity of roughly 𝑂(𝜀−2) [19]. However, the kurtosis is 𝑂(2ℓ) since only an
|
652 |
+
𝑂(2−ℓ) fraction of the outer samples give non-zero values for �𝑌ℓ.
|
653 |
+
Haji-Ali, Spence & Teckentrup [27] have further extended this to estimate quan-
|
654 |
+
tities of the form
|
655 |
+
P[𝐺 ∈ Ω] ≡ E[1𝐺∈Ω]
|
656 |
+
where 𝐺 is a 𝑑-dimensional random variable which cannot be sampled directly.
|
657 |
+
In their paper they consider in particular the two challenges in this article. In the
|
658 |
+
context of the digital option with the Euler-Maruyama discretisation on the unit time
|
659 |
+
interval, the adaptive sampling varies the timestep used on level ℓ so that
|
660 |
+
•
|
661 |
+
ℎℓ = 2−ℓ when |�𝑆ℓ − 𝐾| is large compared to the strong error in the path approx-
|
662 |
+
imation
|
663 |
+
•
|
664 |
+
ℎℓ = 4−ℓ when |�𝑆ℓ − 𝐾| is of the same order as the strong error
|
665 |
+
|
666 |
+
MLMC techniques for discontinuous functions
|
667 |
+
13
|
668 |
+
•
|
669 |
+
2−ℓ < ℎℓ < 4−ℓ for intermediate values
|
670 |
+
A Brownian bridge construction is used when the timestep needs to be refined as
|
671 |
+
part of the adaptation procedure from its initial value ℎℓ = 2−ℓ. The adaptation again
|
672 |
+
leads to 𝐶ℓ ∼ 2ℓ, 𝑉ℓ ∼ 2−ℓ and hence a complexity of roughly 𝑂(𝜀−2), but there is
|
673 |
+
again a high kurtosis [27].
|
674 |
+
In earlier research, Elfverson, Hellman & Malqvist [11] considered estimation of
|
675 |
+
E[𝐻(𝑋)] where 𝑋 cannot be sampled exactly but there is a sequence of approxi-
|
676 |
+
mations 𝑋′
|
677 |
+
0, 𝑋′
|
678 |
+
1, 𝑋′
|
679 |
+
2, . . . 𝑋 of increasing accuracy and increasing cost. Motivated by
|
680 |
+
PDE applications with a well-behaved truncation error so that there are uniform
|
681 |
+
geometric bounds on |𝑋′
|
682 |
+
𝑗 − 𝑋|, level ℓ in their method uses
|
683 |
+
�𝑋ℓ = 𝑋′
|
684 |
+
𝑗,
|
685 |
+
𝑗 = min{ℓ, min 𝑗 : | �𝑋′
|
686 |
+
𝑗 − 𝑋| < |𝑋|}
|
687 |
+
and achieves similarly good MLMC benefits. This idea is essentially the same as in
|
688 |
+
the work of Haji-Ali et al but requiring a uniform bound on |𝑋′
|
689 |
+
𝑗−𝑋| is significantly
|
690 |
+
more restrictive than the bounds on E[ |𝑋′
|
691 |
+
𝑗−𝑋|𝑞] for some 𝑞>2 required by Haji-Ali
|
692 |
+
et al.
|
693 |
+
A final comment is that the analysis of Haji-Ali, Spence & Teckentrup can be gen-
|
694 |
+
eralised to a product of an indicator function and a Lipschitz function, E[1𝐺∈Ω 𝑓 (𝑆)],
|
695 |
+
and so can handle barrier options. Furthermore, Haji-Ali & Spence have extended
|
696 |
+
the adaptive sampling methodology to an extremely challenging triply-nested expec-
|
697 |
+
tation which arises in mathematical finance [26]. By incorporating the randomised
|
698 |
+
MLMC treatment of Rhee & Glynn [32] to handle the time discretisation of the
|
699 |
+
underlying SDEs as well as the sampling for the inner conditional expectations, they
|
700 |
+
achieve an overall complexity of approximately 𝑂(𝜀−2) which is very impressive for
|
701 |
+
such a difficult application.
|
702 |
+
-10
|
703 |
+
-5
|
704 |
+
0
|
705 |
+
5
|
706 |
+
10
|
707 |
+
E[Z|X]
|
708 |
+
0
|
709 |
+
0.5
|
710 |
+
1
|
711 |
+
1.5
|
712 |
+
2
|
713 |
+
2.5
|
714 |
+
Fig. 6 Error distributions for two conditional expectations with i) few samples being needed to
|
715 |
+
ensure the correct sign (left), and ii) many samples being insufficient to ensure the correct sign
|
716 |
+
(centre). The blue line represents the Heaviside step function.
|
717 |
+
|
718 |
+
14
|
719 |
+
Michael B. Giles
|
720 |
+
8 Conclusions
|
721 |
+
It is worth repeating that in most MLMC applications the output quantity of interest
|
722 |
+
is a Lipschitz function of the intermediate simulation quantities, so good strong
|
723 |
+
convergence for the intermediate quantities leads automatically to a good rate of
|
724 |
+
convergence of the MLMC variance 𝑉ℓ.
|
725 |
+
For those applications in which the function is discontinuous, this article shows
|
726 |
+
there is an extensive literature with a variety of different approaches to improve the
|
727 |
+
MLMC variance and try to recover the optimal 𝑂(𝜀−2) complexity. It is notable that
|
728 |
+
many of these methods have adapted ideas from Monte Carlo sensitivity analysis
|
729 |
+
which also has problems with discontinuous functionals. It is hoped that this survey
|
730 |
+
will assist future researchers facing similar challenges in other new application areas.
|
731 |
+
Acknowledgements This paper is based on research with many students, postdocs and other
|
732 |
+
collaborators and I am grateful to all of them. Funding for the research has been provided by the UK
|
733 |
+
Engineering and Physical Sciences Research Council through grants EP/E031455/1, EP/H05183X/1
|
734 |
+
and EP/P020720/2 as well as the Hong Kong Innovation and Technology Commission (InnoHK
|
735 |
+
Project CIMDA). The paper was written while visiting the Oden Institute at UT Austin, and I thank
|
736 |
+
my hosts for their warm hospitality.
|
737 |
+
References
|
738 |
+
1. N. Achtsis, R. Cools, and D. Nuyens. Conditional sampling for barrier option pricing under
|
739 |
+
the LT method. SIAM Journal on Financial Mathematics, 4:327–352, 2013.
|
740 |
+
2. M. Altmayer and A. Neuenkirch. Multilevel Monte Carlo quadrature of discontinuous payoffs
|
741 |
+
in the generalized Heston model using Malliavin integration by parts.
|
742 |
+
SIAM Journal on
|
743 |
+
Financial Mathematics, 6(1):22–52, 2015.
|
744 |
+
3. S. Asmussen and P.W. Glynn. Stochastic Simulation. Springer, New York, 2007.
|
745 |
+
4. R. Avikainen. On irregular functionals of SDEs and the Euler scheme. Finance and Stochastics,
|
746 |
+
13(3):381–401, 2009.
|
747 |
+
5. C. Bayer, C. Ben Hammouda, and R. Tempone.
|
748 |
+
Multilevel Monte Carlo combined with
|
749 |
+
numerical smoothing for robust and efficient option pricing and density estimation. ArXiv
|
750 |
+
preprint: 2003.05708, 2020.
|
751 |
+
6. C. Bayer, M. Siebenmorgen, and R. Tempone. Smoothing the payoff for efficient computation
|
752 |
+
of basket option prices. Quantitative Finance, 18(3):491–505, 2018.
|
753 |
+
7. M. Broadie, Y. Du, and C.C. Moallemi. Efficient risk estimation via nested sequential simula-
|
754 |
+
tion. Management Science, 57(6):1172–1194, 2011.
|
755 |
+
8. K. Bujok, B. Hambly, and C. Reisinger. Multilevel simulation of functionals of Bernoulli
|
756 |
+
random variables with application to basket credit derivatives. Methodology and Computing
|
757 |
+
in Applied Probability, 17(3):579–604, 2015.
|
758 |
+
9. S. Burgos. The computation of Greeks with multilevel Monte Carlo. DPhil thesis, University
|
759 |
+
of Oxford, 2014.
|
760 |
+
10. S. Burgos and M.B. Giles. Computing Greeks using multilevel path simulation. In L. Plaskota
|
761 |
+
and H. Woźniakowski, editors, Monte Carlo and Quasi-Monte Carlo Methods 2010, pages
|
762 |
+
281–296. Springer, 2012.
|
763 |
+
11. D. Elfverson, F. Hellman, and A. Målqvist. A multilevel Monte Carlo method for computing
|
764 |
+
failure probabilities. SIAM/ASA Journal on Uncertainty Quantification, 4(1):312–330, 2016.
|
765 |
+
|
766 |
+
MLMC techniques for discontinuous functions
|
767 |
+
15
|
768 |
+
12. M.B. Giles. Improved multilevel Monte Carlo convergence using the Milstein scheme. In
|
769 |
+
A. Keller, S. Heinrich, and H. Niederreiter, editors, Monte Carlo and Quasi-Monte Carlo
|
770 |
+
Methods 2006, pages 343–358. Springer, 2008.
|
771 |
+
13. M.B. Giles. Multilevel Monte Carlo path simulation. Operations Research, 56(3):607–617,
|
772 |
+
2008.
|
773 |
+
14. M.B. Giles. Multilevel Monte Carlo methods. Acta Numerica, 24:259–328, 2015.
|
774 |
+
15. M.B. Giles. MLMC for nested expectations. In Contemporary Computational Mathematics -
|
775 |
+
A Celebration of the 80th Birthday of Ian Sloan. Springer, 2018.
|
776 |
+
16. M.B. Giles and F. Bernal. Multilevel estimation of expected exit times and other functionals of
|
777 |
+
stopped diffusions. SIAM/ASA Journal on Uncertainty Quantification, 6(4):1454–1474, 2018.
|
778 |
+
17. M.B. Giles, K. Debrabant, and A. Rößler. Analysis of multilevel Monte Carlo path simulation
|
779 |
+
using the Milstein discretisation. Discrete and Continuous Dynamical Systems - series B,
|
780 |
+
24(8):3881–3903, 2019.
|
781 |
+
18. M.B. Giles and T. Goda.
|
782 |
+
Decision-making under uncertainty: using MLMC for efficient
|
783 |
+
estimation of EVPPI. Statistics and Computing, 29(4):739–751, 2019.
|
784 |
+
19. M.B. Giles and A.-L. Haji-Ali. Multilevel nested simulation for efficient risk estimation.
|
785 |
+
SIAM/ASA Journal on Uncertainty Quantification, 7(2):497–525, 2019.
|
786 |
+
20. M.B. Giles and A.-L. Haji-Ali. Multilevel path branching for digital options. arXiv pre-print:
|
787 |
+
2209.03017, 2022.
|
788 |
+
21. M.B. Giles, D.J. Higham, and X. Mao. Analysing multilevel Monte Carlo for options with
|
789 |
+
non-globally Lipschitz payoff. Finance and Stochastics, 13(3):403–413, 2009.
|
790 |
+
22. M.B. Giles, T. Nagapetyan, and K. Ritter. Multilevel Monte Carlo approximation of distribution
|
791 |
+
functions and densities. SIAM/ASA Journal on Uncertainty Quantification, 3(1):267–295,
|
792 |
+
2015.
|
793 |
+
23. M.B. Giles and L. Szpruch. Antithetic multilevel Monte Carlo estimation for multi-dimensional
|
794 |
+
SDEs without Lévy area simulation. Annals of Applied Probability, 24(4):1585–1620, 2014.
|
795 |
+
24. P. Glasserman. Monte Carlo Methods in Financial Engineering. Springer, New York, 2004.
|
796 |
+
25. P. Glasserman and N. Merener. Convergence of a discretization scheme for jump-diffusion
|
797 |
+
processes with state-dependent intensities. Proc. Royal Soc. London A, 460:111–127, 2004.
|
798 |
+
26. A.-L. Haji-Ali and J. Spence. Efficient risk estimation for the credit valuation adjustment. in
|
799 |
+
preparation, 2022.
|
800 |
+
27. A.-L. Haji-Ali, J. Spence, and A. Teckentrup. Adaptive multilevel Monte Carlo for probabilities.
|
801 |
+
SIAM Journal on Numerical Analysis, 60(4):2125–2149, 2022.
|
802 |
+
28. P.E. Kloeden and E. Platen. Numerical Solution of Stochastic Differential Equations. Springer,
|
803 |
+
Berlin, 1992.
|
804 |
+
29. S. Krumscheid and F. Nobile. Multilevel Monte Carlo approximation of functions. SIAM/ASA
|
805 |
+
Journal on Uncertainty Quantification, 6(3):1256–1293, 2018.
|
806 |
+
30. P. L’Ecuyer. A unified view of the IPA, SF and LR gradient estimation techniques. Management
|
807 |
+
Science, 36(11):1364–1383, 1990.
|
808 |
+
31. P. L’Ecuyer. On the interchange of derivative and expectation for likelihood ratio derivative
|
809 |
+
estimators. Management Science, 41(4):738–748, 1995.
|
810 |
+
32. C.-H. Rhee and P.W. Glynn. Unbiased estimation with square root convergence for SDE
|
811 |
+
models. Operations Research, 63(5):1026–1043, 2015.
|
812 |
+
33. Y. Xia. Multilevel Monte Carlo for jump processes. DPhil thesis, University of Oxford, 2014.
|
813 |
+
34. Y. Xia and M.B. Giles. Multilevel path simulation for jump-diffusion SDEs. In L. Plaskota
|
814 |
+
and H. Woźniakowski, editors, Monte Carlo and Quasi-Monte Carlo Methods 2010, pages
|
815 |
+
695–708. Springer, 2012.
|
816 |
+
|
CdE1T4oBgHgl3EQfDwOw/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
ENE3T4oBgHgl3EQfVQoB/content/tmp_files/2301.04457v1.pdf.txt
ADDED
@@ -0,0 +1,1631 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.04457v1 [gr-qc] 11 Jan 2023
|
2 |
+
Ghost and Laplacian Instabilities in Teleparallel Horndeski Gravity
|
3 |
+
Salvatore Capozziello,1, 2, 3, ∗ Maria Caruana,4, 5, † Jackson Levi Said,4, 5, ‡ and Joseph Sultana6, §
|
4 |
+
1Dipartimento di Fisica ”E. Pancini”, Universit`a degli Studi di Napoli,
|
5 |
+
”Federico II”, Complesso Universitario Monte S. Angelo,
|
6 |
+
Via Cinthia 9 Edificio G, 80126 Napoli, Italy
|
7 |
+
2Istituto Nazionale di Fisica Nucleare (INFN),
|
8 |
+
Sezione di Napoli Complesso Universitario Monte S. Angelo,
|
9 |
+
Via Cinthia 9 Edificio G, 80126 Napoli, Italy
|
10 |
+
3Scuola Superiore Meridionale, Largo San Marcellino 10, 80138 Napoli, Italy
|
11 |
+
4Institute of Space Sciences and Astronomy, University of Malta, Msida, Malta
|
12 |
+
5Department of Physics, University of Malta, Msida, Malta
|
13 |
+
6Department of Mathematics, University of Malta, Msida, Malta
|
14 |
+
Teleparallel geometry offers a platform on which to build up theories of gravity where torsion
|
15 |
+
rather than curvature mediates gravitational interaction. The teleparallel analogue of Horndeski
|
16 |
+
gravity is an approach to teleparallel geometry where scalar-tensor theories are considered in this
|
17 |
+
torsional framework. Being teleparallel gravity of lower order in dynamics, this turns out to be more
|
18 |
+
general than metric Horndeski gravity. In other words, the class of teleparallel Horndeski gravity
|
19 |
+
models is much broader than the standard metric one. In this work, we explore constraints on this
|
20 |
+
wide range of models coming from ghost and Laplacian instabilities. The aim is to limit pathological
|
21 |
+
branches of the theory by fundamental considerations. It is possible to conclude that a very large
|
22 |
+
class of models results physically viable.
|
23 |
+
I.
|
24 |
+
INTRODUCTION
|
25 |
+
General relativity (GR) has been the gravitational foundation of cosmology for over a century. Its latest
|
26 |
+
embodiment appears in a picture wherein the evolutionary processes of the Universe are described in the
|
27 |
+
framework of the so-called ΛCDM model [1, 2]. Supported by overwhelming observational evidences, this
|
28 |
+
model describes a Universe started with a big bang, then driven through an inflationary phase and other well
|
29 |
+
known epochs to eventually produce an accelerating Universe at late-times [3, 4]. In the ΛCDM model, the
|
30 |
+
late time acceleration expansion is driven by the cosmological constant or some form of dark energy. Despite
|
31 |
+
a lot of foundational works, internal consistency issues persist in this respect [5–7]. Recently, observational
|
32 |
+
challenges to the standard model has arisen in the form of cosmological tensions with statistically significant
|
33 |
+
differences between predictions of expansion from early time data [8–10] and measurements from late time
|
34 |
+
[11, 12]. These tensions continue to increase with new survey data [13–15], and may permeate into other
|
35 |
+
sectors of cosmology besides expansion [16–18]. This situation leads to take into account potential alternatives
|
36 |
+
to the standard cosmological ΛCDM model in the context of possible modifications to the gravitational sector.
|
37 |
+
A solution to the problem of cosmic tensions, as well as of other longstanding issues, can be offered by
|
38 |
+
alternative theories of gravity, in particular by scalar-tensor gravity. Scalar fields improve GR in view of Mach
|
39 |
+
principle and could naturally address several issues in cosmology and astrophysics like inflation, dark matter
|
40 |
+
and dark energy [19]. The most general scalar-tensor theory of gravity, where scalar fields are minimally and
|
41 |
+
non-minimally coupled to curvature, is the so-called Horndeski gravity [20]. It is the most general theory
|
42 |
+
of gravity producing second order field equations. This is advantageous because nature appears to produce,
|
43 |
+
generally, second order equations of motion. Furthermore, higher order theories can produce Ostrogradsky
|
44 |
+
instabilities making second order theories more attractive from a fundamental perspective [21–23]. Horndeski
|
45 |
+
gravity is formulated by four free functions of the scalar field and its kinetic term [24, 25]. This offers a
|
46 |
+
rich phenomenology on which to produce dark energy models but also dark matter and inflation. However,
|
47 |
+
recent multimessenger observations by the LIGO collaboration, in the gravitational event GW170817 [26], and
|
48 |
+
measurements of the companion electromagnetic counterpart, namely GRB170817A [27], has placed stringent
|
49 |
+
constraints on the speed of propagation of gravitational waves (GW) to within deviations of at most one part
|
50 | |
51 | |
52 | |
53 | |
54 |
+
|
55 |
+
2
|
56 |
+
in 1015. Considering these constraints, many branches of Horndeski gravity have been disqualified in regular
|
57 |
+
curvature-based gravity [28–30]. However, Horndeski gravity has a number of interesting generalizations
|
58 |
+
[31] where higher order terms, avoiding the Ostrogradsky instabilities, can be incorporated into the theory.
|
59 |
+
Another possibility is to reconsider the geometric foundations of curvature on which Horndeski gravity is
|
60 |
+
built. Curvature can be expressed through the Levi-Civita connection
|
61 |
+
◦Γ
|
62 |
+
λ
|
63 |
+
µν obtained from the metric [1].
|
64 |
+
Here an over-circle represents quantities determined by the Levi-Civita connection.
|
65 |
+
In teleparallel gravity (TG), the teleparallel connection (Γλ
|
66 |
+
µν) replaces the Levi-Civita connection and so
|
67 |
+
dynamics of gravity is replaced from curvature to torsion [32–35]. The teleparallel connection is curvatureless
|
68 |
+
and satisfies metricity. For this reason, the teleparallel Ricci scalar turns out to identically vanish, i.e. R = 0
|
69 |
+
(this is not to say that the standard Ricci scalar is zero, being, in general,
|
70 |
+
◦R ̸= 0). On the other hand, TG
|
71 |
+
naturally produces a torsion scalar (T ) [33], which turns out to be equal to the curvature-based Ricci scalar
|
72 |
+
up to a boundary term (B). For this reason, the linear torsion scalar produces the Teleparallel equivalent of
|
73 |
+
General Relativity (TEGR) which is dynamically equivalent to GR in the classical regime. This distinction
|
74 |
+
between the torsion scalar, producing second order terms in the equations of motion, and the boundary
|
75 |
+
term, producing fourth order terms in the equations of motion (when the boundary term is nonlinear in the
|
76 |
+
action), gives rise to a much richer landscape of theories on which to build cosmological models, if compared
|
77 |
+
with the standard Einstein-Hilbert action.
|
78 |
+
Another way to conceptualize this feature is through the teleparallel analogue of the Lovelock theorem
|
79 |
+
[36–38] which produces a much wider range of actions with second order field equations. Equivalences and
|
80 |
+
differences of these representations are discussed in Ref. [39].
|
81 |
+
Similar to GR, TEGR features many modifications such as f(T ) gravity [34, 40–46] which is generically
|
82 |
+
second order in nature, as well as f(T, B) gravity [47–55] which now features fourth order contributions
|
83 |
+
similar to f(
|
84 |
+
◦R) gravity [19, 56–62]. There have also been various formulations of scalar–tensor gravity. See,
|
85 |
+
e.g. Refs.[63–65].
|
86 |
+
Equipped with the TG formalism, one can consider the teleparallel analogue of Horndeski gravity [38] where
|
87 |
+
the generically lower order nature of TG turns out to produce a much richer structure to be developed. This
|
88 |
+
feature directly comes from the teleparallel analogue of the Lovelock theorem. This larger framework of
|
89 |
+
models means that there are many more classes of theories that now satisfy the speed of GWs constraint
|
90 |
+
[66, 67] as required from the above mentioned multimessenger analysis [68].
|
91 |
+
This class of gravitational
|
92 |
+
models also satisfies the parameterized post-Newtonian observational constraints [69] for a large number of
|
93 |
+
models. The teleparallel analogue of Horndeski gravity also produces a number of interesting cosmologies
|
94 |
+
such as those which are well-tempered [70, 71], as well as those that are derived from Noether symmetry
|
95 |
+
considerations [72–76]. In this way, all models that were previously disqualified in regular Horndeski may be
|
96 |
+
revived in this new formalism based on TG.
|
97 |
+
In this work, we perform a stability analysis of the teleparallel analogue of Horndeski gravity through
|
98 |
+
considerations on a Minkowski spacetime background. The Minkowski background is an ideal arena to probe
|
99 |
+
the fundamental behavior of theories with large classes of models since any astrophysical or cosmological
|
100 |
+
setting must first be stable on a Minkowski spacetime. In our analysis, we consider both background and
|
101 |
+
leading order perturbations in the context of a scalar-vector-tensor decomposition. This is important to fully
|
102 |
+
decompose any potentially problematic part of the theory in detail. In the TG setting, this is more intricate
|
103 |
+
since the metric tensor (gµν) is replaced as the fundamental dynamical variable of the field equations with
|
104 |
+
the tetrad (eA
|
105 |
+
µ) and the spin connection (ωA
|
106 |
+
Bµ), which are discussed in detail later on. In all cases, we
|
107 |
+
focus our study on the ghost and gradient instabilities, which can wreak havoc on gravitational models since
|
108 |
+
this may, respectively, produce scalar field kinetic terms with the wrong sign and unbounded propagation
|
109 |
+
speeds of particular perturbations, which can lead to unphysical models.
|
110 |
+
The structure of the manuscript is the following: in Sec. II, we summarize TG and its teleparallel analogue
|
111 |
+
of Horndeski gravity; this then leads to the Minkowski background equations of motion in Sec. III. Scalar–
|
112 |
+
vector–tensor perturbations are discussed in Sec. IV. From these perturbations, we are able to explore
|
113 |
+
potential instabilities in Sec. V where our main results are reported. Discussion and conclusions are drawn
|
114 |
+
in Sec. VI. In this work, we use geometric units and the signature (−, +, +, +).
|
115 |
+
|
116 |
+
3
|
117 |
+
II.
|
118 |
+
TELEPARALLEL HORNDESKI GRAVITY
|
119 |
+
GR, a curvature-based theory, is constructed on torsionless Levi-Civita connection
|
120 |
+
◦Γλ
|
121 |
+
µν, where, as said
|
122 |
+
above, the overhead circle (◦) represents quantities built with this connection.
|
123 |
+
This leads to numerous
|
124 |
+
theories of gravity beyond GR as the gravitational field can be expressed through the Riemann tensor and
|
125 |
+
its contractions such as the Ricci tensor and the Riemann scalar [59], the latter produces the Einstein-
|
126 |
+
Hilbert action [1]. On the other hand, TG incorporates the teleparallel connection, dubbed as teleparallel
|
127 |
+
connection Γλ
|
128 |
+
µν, leading to a theory satisfying the curvature-less and metricity conditions [32–35], resulting
|
129 |
+
in a torsionful theory. Later in this section, it will be shown that even though the Ricci scalar R vanishes,
|
130 |
+
due to the symmetry of the connection, the curvature-ful connection gives a non-zero value for the Riemann
|
131 |
+
tensor. Hence, the Ricci scalar
|
132 |
+
◦R can be defined through teleparallel quantities.
|
133 |
+
The fundamental dynamical object of GR is the metric tensor gµν, but within TG, the metric is expressed
|
134 |
+
through the tetrad eA
|
135 |
+
µ, which acts as a transformation between the local and general manifold spaces. The
|
136 |
+
tetrad and the inertial spin connection ωB
|
137 |
+
Cν become the fundamental objects [33] while creating a link
|
138 |
+
between the general manifold denoted through Greek indices to the local Minkowski manifold denoted by
|
139 |
+
Latin indices. Thus, the relationship between Minkowski and general spacetimes is given by [77]
|
140 |
+
gµν = ηAB eA
|
141 |
+
µ eB
|
142 |
+
ν ,
|
143 |
+
ηAB = gµν E
|
144 |
+
µ
|
145 |
+
A E
|
146 |
+
ν
|
147 |
+
B ,
|
148 |
+
(1)
|
149 |
+
where E
|
150 |
+
µ
|
151 |
+
A
|
152 |
+
is the inverse tetrad which satisfies orthogonality conditions
|
153 |
+
eA
|
154 |
+
µ E
|
155 |
+
µ
|
156 |
+
B
|
157 |
+
= δA
|
158 |
+
B ,
|
159 |
+
eA
|
160 |
+
µ E
|
161 |
+
ν
|
162 |
+
A
|
163 |
+
= δν
|
164 |
+
µ .
|
165 |
+
(2)
|
166 |
+
The teleparallel connection is defined through the TG variables as [34, 35]
|
167 |
+
Γλ
|
168 |
+
µν = E
|
169 |
+
λ
|
170 |
+
A
|
171 |
+
�
|
172 |
+
∂νeA
|
173 |
+
µ + ωA
|
174 |
+
BνeB
|
175 |
+
µ
|
176 |
+
�
|
177 |
+
.
|
178 |
+
(3)
|
179 |
+
Note, the quantities without an overhead circle will correspond to those objects that are related to teleparallel
|
180 |
+
gravity or calculated on its connection. The condition
|
181 |
+
∂[µωA
|
182 |
+
|B|ν] + ωA
|
183 |
+
C[µωC
|
184 |
+
|B|ν] ≡ 0 ,
|
185 |
+
(4)
|
186 |
+
results in a flat spin connection [32], where square brackets denote the antisymmetric operator, and can
|
187 |
+
equivalently be used to determine the components of the spin connection. The local Lorentz transformation
|
188 |
+
(LLT), wherein ΛA
|
189 |
+
B represents Lorentz boosts and rotations, is used to define the spin connection ωA
|
190 |
+
Bµ =
|
191 |
+
ΛA
|
192 |
+
C ∂µΛ
|
193 |
+
C
|
194 |
+
B
|
195 |
+
[33]. It plays a role in the field equations since an infinite number of tetrad choices could satisfy
|
196 |
+
Eq. (1) for a particular metric, thus the spin connection is used to counterbalance inertial effects. This
|
197 |
+
ensures the theory, in this case TG, remains covariant [78]. Moreover, there exists a Lorentz frame such that
|
198 |
+
the spin connection is set to zero. It is referred to as the Weitzenb¨ock gauge [35, 79]. Hence, from this point
|
199 |
+
onwards, the spin connection will be dropped following the application of the aforementioned gauge.
|
200 |
+
Similar to how the Riemann tensor, constructed on the Levi-Civita connection, is associated to the cur-
|
201 |
+
vature property of GR, the analogy of this for TG is the torsion tensor defined by the teleparallel connec-
|
202 |
+
tion [35, 80]
|
203 |
+
T A
|
204 |
+
µν = ΓA
|
205 |
+
νµ − ΓA
|
206 |
+
µν .
|
207 |
+
(5)
|
208 |
+
While curvature in GR is defined as a deformation of spacetime, the torsion tensor in TG represents the
|
209 |
+
field strength of gravitation that transforms covariantly under LLTs and diffeomorphisms [78]. Another
|
210 |
+
important aspect of TG is that the torsion tensor can be decomposed in irreducible parts [81–83], namely
|
211 |
+
aµ = 1
|
212 |
+
6ǫµνλρ T νλρ ,
|
213 |
+
(6)
|
214 |
+
vµ = T λ
|
215 |
+
λν ,
|
216 |
+
(7)
|
217 |
+
tλµν = 1
|
218 |
+
2(Tλµν + Tµλν) + 1
|
219 |
+
6(gνλvµ + gνµvλ) − 1
|
220 |
+
3gλµvν ,
|
221 |
+
(8)
|
222 |
+
|
223 |
+
4
|
224 |
+
giving the axial, vectorial and tensorial pieces, respectively, and ǫABCD being the four-dimensional Levi-
|
225 |
+
Civita tensor. Hence, the respective scalar invariants are given by [47, 82]
|
226 |
+
Tax = aµaµ = − 1
|
227 |
+
18Tλµν(T λµν − 2T µλν) ,
|
228 |
+
(9)
|
229 |
+
Tvec = vµvµ = T λ
|
230 |
+
λµT
|
231 |
+
ρµ
|
232 |
+
ρ
|
233 |
+
,
|
234 |
+
(10)
|
235 |
+
Tten = tλµνtλµν = 1
|
236 |
+
2Tλµν(T λµν + T µλν) − 1
|
237 |
+
2T λ
|
238 |
+
λµT ρµ
|
239 |
+
ρ
|
240 |
+
,
|
241 |
+
(11)
|
242 |
+
which, under parity transformation, are invariant scalars. On the other hand, terms such as P1 = vµaµ and
|
243 |
+
P2 = ǫµνσρtλµνtλ
|
244 |
+
ρσ are excluded due to parity-violation [38, 81]. The combination of the scalar invariants
|
245 |
+
leads to the torsion scalar
|
246 |
+
T = 3
|
247 |
+
2Tax + 2
|
248 |
+
3Tten − 2
|
249 |
+
3Tvec = 1
|
250 |
+
2
|
251 |
+
�
|
252 |
+
E
|
253 |
+
λ
|
254 |
+
A gρµE
|
255 |
+
ν
|
256 |
+
B
|
257 |
+
− 2E
|
258 |
+
ρ
|
259 |
+
B gλµE
|
260 |
+
ν
|
261 |
+
A + 1
|
262 |
+
2ηABgµρgνλ
|
263 |
+
�
|
264 |
+
T A
|
265 |
+
µνT B
|
266 |
+
ρλ .
|
267 |
+
(12)
|
268 |
+
An identical result can be obtained through contraction between the torsion tensor and the superpotential
|
269 |
+
S
|
270 |
+
µν
|
271 |
+
A
|
272 |
+
which represents the potential relation of the gravitational energy-momentum tensor [80, 84, 85]:
|
273 |
+
S
|
274 |
+
µν
|
275 |
+
A
|
276 |
+
= 1
|
277 |
+
2
|
278 |
+
�
|
279 |
+
Kµν
|
280 |
+
A − E
|
281 |
+
ν
|
282 |
+
A T αµ
|
283 |
+
α + E
|
284 |
+
µ
|
285 |
+
A T αν
|
286 |
+
α
|
287 |
+
�
|
288 |
+
,
|
289 |
+
(13)
|
290 |
+
where
|
291 |
+
Kλ
|
292 |
+
µν = Γλ
|
293 |
+
µν −
|
294 |
+
◦Γλ
|
295 |
+
µν = 1
|
296 |
+
2
|
297 |
+
�
|
298 |
+
T
|
299 |
+
λ
|
300 |
+
µ ν + T
|
301 |
+
λ
|
302 |
+
ν µ − T λ
|
303 |
+
µν
|
304 |
+
�
|
305 |
+
(14)
|
306 |
+
is the contorsion tensor relating TG and GR. These quantities can be used to form the torsion scalar [34],
|
307 |
+
written as
|
308 |
+
T = S
|
309 |
+
µν
|
310 |
+
A
|
311 |
+
T A
|
312 |
+
µν ,
|
313 |
+
(15)
|
314 |
+
which can be shown to be equivalent to the result obtained in Eq. (12). The Ricci scalar dependent on
|
315 |
+
the teleparallel connection, which vanishes, can be related, using the contorsion tensor, to the regular Ricci
|
316 |
+
scalar. This results in a relationship between the Levi-Civita and the teleparallel connections defined Ricci
|
317 |
+
scalar [47, 77]
|
318 |
+
R =
|
319 |
+
◦R + T − B = 0 ,
|
320 |
+
(16)
|
321 |
+
where B = 2
|
322 |
+
e∂µ(e T λ µ
|
323 |
+
λ ) = 2
|
324 |
+
◦∇µT λ µ
|
325 |
+
λ
|
326 |
+
is a boundary term and e = det(eA
|
327 |
+
µ) = ���−g is the tetrad determinant.
|
328 |
+
Hence, the curvature-ful Ricci scalar is non-vanishing being
|
329 |
+
◦R = −T + B .
|
330 |
+
(17)
|
331 |
+
The total divergence term found in B accounts for the fourth order derivative contributions to the field
|
332 |
+
equations in modified theories of gravity [47, 54]. This is embodied within the Ricci scalar in GR [57, 59].
|
333 |
+
Thus, the Teleparallel Equivalent of General Relativity (TEGR) [86, 87] is defined as the linear appearance
|
334 |
+
of the torsion scalar since both Lagrangians are equal up to a boundary term.
|
335 |
+
The equivalence principle in GR allows one to raise local Lorentz frames from a Minkowski metric to
|
336 |
+
a general metric tensor, and additionally, partial derivatives are raised to covariant derivatives defined by
|
337 |
+
the Levi-Civita connection [1]. This procedure, referred to as the minimal coupling prescription, if applied
|
338 |
+
within TG, is preserved for additional fields. Minkowski tetrads are raised to arbitrary ones and tangent
|
339 |
+
space partial derivatives are exchanged for covariant derivatives based on Levi-Civita connection [33, 88]
|
340 |
+
∂µ →
|
341 |
+
◦∇µ .
|
342 |
+
(18)
|
343 |
+
Thus, by having both gravitational and scalar fields well developed, it is possible to look at the teleparallel
|
344 |
+
analogue of Horndeski gravity, referred to at times as Bahamonde-Dialektopoulos-Levi Said (BDLS) the-
|
345 |
+
ory [38, 66, 69]. The construction of BDLS theory depends on the following criteria: (1) field equations are
|
346 |
+
|
347 |
+
5
|
348 |
+
at most second order with respect to the tetrad and scalar; (2) as previously mentioned, scalar invariants do
|
349 |
+
not violate parity; (3) contractions of the torsion tensor are at most quadratic [38]. All of these requirements
|
350 |
+
allow for an adequate extension of the standard metric Horndeski gravity. Note that Lovelock’s theorem
|
351 |
+
states that Einstein fields equations are the only second-order field equations from a Lagrangian density
|
352 |
+
constructed through a four-dimensional metric. TG allows for the weakening of Lovelock [36, 37] theory as
|
353 |
+
an additional scalar field φ is introduced, giving rise to further terms in the gravitational action.
|
354 |
+
Starting off with the non-minimal coupling of scalar and torsion field, the linear contraction is given by [38]
|
355 |
+
I2 = vµ ◦∇µφ ,
|
356 |
+
(19)
|
357 |
+
being the scalar I1 = tλµν
|
358 |
+
◦∇λφ
|
359 |
+
◦∇µφ
|
360 |
+
◦∇µφ = 0, due to the complete symmetry of the tensor decomposition,
|
361 |
+
Furthermore I3 = aλ
|
362 |
+
◦∇λφ violates the parity condition due to an odd number of axial parts. Moreover, the
|
363 |
+
quadratic contractions of this nature are given by [38]
|
364 |
+
J1 = aµaν ◦∇µφ
|
365 |
+
◦∇νφ ,
|
366 |
+
(20)
|
367 |
+
J3 = vλtλµν ◦∇µφ
|
368 |
+
◦∇νφ ,
|
369 |
+
(21)
|
370 |
+
J5 = tλµνt α
|
371 |
+
λ ν
|
372 |
+
◦∇µφ
|
373 |
+
◦∇αφ ,
|
374 |
+
(22)
|
375 |
+
J6 = tλµνt αβ
|
376 |
+
λ
|
377 |
+
◦∇µφ
|
378 |
+
◦∇νφ
|
379 |
+
◦∇αφ
|
380 |
+
◦∇βφ ,
|
381 |
+
(23)
|
382 |
+
J8 = tλµνt
|
383 |
+
α
|
384 |
+
λµ
|
385 |
+
◦∇νφ
|
386 |
+
◦∇αφ ,
|
387 |
+
(24)
|
388 |
+
J10 = ǫµ
|
389 |
+
νλρaνtαρλ ◦∇µφ
|
390 |
+
◦∇αφ ,
|
391 |
+
(25)
|
392 |
+
while other possibilities are eliminated as they have already been included:
|
393 |
+
J2 = vµvν ◦∇µφ
|
394 |
+
◦∇νφ = I2
|
395 |
+
2 ,
|
396 |
+
J4 = vµtλµν ◦∇λφ
|
397 |
+
◦∇νφ = J3 ,
|
398 |
+
J7 = tλµνtαβ
|
399 |
+
λ
|
400 |
+
◦∇µφ
|
401 |
+
◦∇νφ
|
402 |
+
◦∇αφ
|
403 |
+
◦∇βφ = −2J6 ,
|
404 |
+
(26)
|
405 |
+
while J9 = tλµνtαβγ
|
406 |
+
◦∇λφ
|
407 |
+
◦∇µφ
|
408 |
+
◦∇νφ
|
409 |
+
◦∇αφ
|
410 |
+
◦∇βφ
|
411 |
+
◦∇γφ = 0 due to the total symmetry of the tensor irreducible part.
|
412 |
+
Hence, BDLS action is described by [38]
|
413 |
+
SBDLS =
|
414 |
+
1
|
415 |
+
2κ2
|
416 |
+
�
|
417 |
+
d4x e LTele +
|
418 |
+
1
|
419 |
+
2κ2
|
420 |
+
5
|
421 |
+
�
|
422 |
+
i=2
|
423 |
+
�
|
424 |
+
d4x e Li +
|
425 |
+
�
|
426 |
+
d4x e Lm ,
|
427 |
+
(27)
|
428 |
+
where
|
429 |
+
LTele = GTele(φ, X, T, Tax, Tvec, I2, J1, J3.J5, J6, J8, J10) .
|
430 |
+
(28)
|
431 |
+
Here GTele is an arbitrary function, X := − 1
|
432 |
+
2∂µφ∂µφ and
|
433 |
+
L2 := G2(φ, X) ,
|
434 |
+
(29)
|
435 |
+
L3 := −G3(φ, X)
|
436 |
+
◦□φ ,
|
437 |
+
(30)
|
438 |
+
L4 := G4(φ, X)(−T + B) + G4,X(φ, X)[(
|
439 |
+
◦□φ)2 −
|
440 |
+
◦∇µ
|
441 |
+
◦∇νφ
|
442 |
+
◦∇µ ◦∇νφ] ,
|
443 |
+
(31)
|
444 |
+
L5 := G5(φ, X)
|
445 |
+
◦Gµν
|
446 |
+
◦∇µ
|
447 |
+
◦∇νφ
|
448 |
+
− 1
|
449 |
+
6G5,X(φ, X)[(
|
450 |
+
◦□φ)3 + 2
|
451 |
+
◦∇µ
|
452 |
+
◦∇νφ
|
453 |
+
◦∇ν
|
454 |
+
◦∇αφ
|
455 |
+
◦∇α
|
456 |
+
◦∇µφ − 3
|
457 |
+
◦∇µ
|
458 |
+
◦∇νφ
|
459 |
+
◦∇µ ◦∇νφ
|
460 |
+
◦□φ] ,
|
461 |
+
(32)
|
462 |
+
which are identical to the standard metric Horndeski Lagrangians [20] but calculated using the tetrad.
|
463 |
+
Finally, Lm is the matter Lagrangian in Jordan conformal frame,
|
464 |
+
◦Gµν is the Einstein tensor, and κ2 = 8πG
|
465 |
+
where G is the gravitational constant.
|
466 |
+
III.
|
467 |
+
MINKOWSKI BACKGROUND EQUATIONS IN TELEPARALLEL HORNDESKI GRAVITY
|
468 |
+
Let us explore now perturbations on a Minkowski background within the gravitational theory of teleparallel
|
469 |
+
analogue of Horndeski. Firstly, we tackle the background equations for a general flat Friedman–Lemaˆıtre–Robertson–Walker
|
470 |
+
|
471 |
+
6
|
472 |
+
(FLRW) metric to obtain the necessary constraints. Then, this is followed by the analysis for perturbation
|
473 |
+
theory up to second order which is needed for our approach since we consider the Euler-Lagrange equations
|
474 |
+
to get the cosmological equations of motion.
|
475 |
+
The flat FLRW metric in Cartesian coordinates is given by
|
476 |
+
ds2 = −N(t)2dt2 + a(t)2(dx2 + dy2 + dx2) ,
|
477 |
+
(33)
|
478 |
+
where N(t) is the lapse function and a(t) is the scale factor. As previously mentioned, this follows the metric
|
479 |
+
signature that is mostly positive. The tetrad can be written in diagonal form as [35]
|
480 |
+
eA
|
481 |
+
µ = diag(N(t), a(t), a(t), a(t)) ,
|
482 |
+
(34)
|
483 |
+
which is compatible with the Weitzenb¨ock gauge giving a vanishing spin connection. Hence, the action in
|
484 |
+
Eq. (27) can be re-expressed in terms of these background quantities. Friedman equations are then obtained
|
485 |
+
by varying with respect to the lapse function and scale factor. Additionally, the scalar field Klein-Gordon
|
486 |
+
equation can be obtained by varying with respect to the scalar field [38].
|
487 |
+
Since we will be working in
|
488 |
+
Minkowski background, the limits N(t) → 1 and a(t) → 1 are taken. Hence, the constraints obtained from
|
489 |
+
the Friedman equation and scalar field variation in Minkowski background are given by
|
490 |
+
0 = −G2 − GTele + 2XG2,X − 2XG3,φ + 2XGTele,X ,
|
491 |
+
(35)
|
492 |
+
0 = G2 + GTele − 2XG3,φ + 4XG4,φφ + 2¨φG4,φ − 2X ¨φG3,X + 4X ¨φG4,φX − d
|
493 |
+
dt( ˙φGTele,I2) ,
|
494 |
+
(36)
|
495 |
+
0 = G2,φ + GTele,φ − 2XG2,φX + 2XG3,φφ − 2XGTele,φX − G2,X ¨φ + 2G3,φ ¨φ − GTele,X ¨φ
|
496 |
+
− 2X ¨φGTele,X − 2X ¨φG2,XX + 2X ¨φG3,φX − 2X ¨φGTele,XX ,
|
497 |
+
(37)
|
498 |
+
where all scalar invariants are background quantities and comma ( , ) denotes partial derivative. Moreover,
|
499 |
+
the scalar field equation can also be expressed in terms of a Klein-Gordon equation as shown in Ref. [38].
|
500 |
+
IV.
|
501 |
+
SECOND ORDER PERTURBED ACTION WITH SCALAR-VECTOR-TENSOR
|
502 |
+
DECOMPOSITION
|
503 |
+
Here, we calculate the perturbed action up to second order terms which are necessary for the Euler-
|
504 |
+
Lagrange method to find the equations of motion of the system. By taking perturbations about a Minkowski
|
505 |
+
background for both tetrad and scalar field, we can build the action up to second order. The tetrad and
|
506 |
+
scalar perturbation are respectively given by
|
507 |
+
eA
|
508 |
+
µ → eA
|
509 |
+
µ + ǫ δeA
|
510 |
+
µ = δA
|
511 |
+
µ + ǫ δeA
|
512 |
+
µ ,
|
513 |
+
(38)
|
514 |
+
φ → φ + ǫ δφ ,
|
515 |
+
(39)
|
516 |
+
where ǫ is the perturbation parameter representing the perturbation order of background Minkowski tetrad.
|
517 |
+
It is given by a four-dimensional identity matrix given by the Kronecker delta δA
|
518 |
+
µ . It is sufficient to expand
|
519 |
+
the scalar field up to first order since higher order terms do not contribute. Additionally, it should be noted
|
520 |
+
that the background scalar field can be taken to be as a function of time and apply the unitary gauge such
|
521 |
+
that
|
522 |
+
φ → φ(t) .
|
523 |
+
(40)
|
524 |
+
Moreover, the perturbations of arbitrary functions present in the Lagrangian are obtained by performing a
|
525 |
+
Taylor expansion up to second order such that
|
526 |
+
Gi(φ, X) = Gi + ǫ Gi,XX(1) + ǫ2 �
|
527 |
+
1
|
528 |
+
2Gi,XX(X(1))2 + Gi,XX(2)�
|
529 |
+
,
|
530 |
+
(41)
|
531 |
+
GTele(φ, X, T, Tax, Tvec, I2, J1, J3, J5, J6, J8, J10)
|
532 |
+
= GTele + ǫ(GTele,XX(1) + GTele,I2I(1)
|
533 |
+
2 ) + 1
|
534 |
+
2ǫ2(GTele,XX(X(1))2 + GTele,I2I2(I(1)
|
535 |
+
2 )2)
|
536 |
+
+ ǫ2�
|
537 |
+
GTele,XX(2) + GTele,T T + GTele,TaxTax + GTele,TvecTvec + GTele,I2I(2)
|
538 |
+
2
|
539 |
+
�
|
540 |
+
,
|
541 |
+
(42)
|
542 |
+
|
543 |
+
7
|
544 |
+
where, for i = {2, 3, 4, 5}, j = {X, XX} and k = {X, T, Tax, Tvec, XX, I2I2}, Gi,j and GTele,k are background
|
545 |
+
functions, such that XX and I2I2 are the second order derivatives with respect to X and I2. The numbered
|
546 |
+
superscripts represent the order of perturbation of the scalar invariant.
|
547 |
+
In this section, we consider a scalar-vector-tensor (SVT) decomposition of the tetrad based on the formal-
|
548 |
+
ism applied in Ref. [89] for first order perturbations:
|
549 |
+
δeA
|
550 |
+
µ :=
|
551 |
+
|
552 |
+
|
553 |
+
ϕ
|
554 |
+
−(∂iβ + βi)
|
555 |
+
δI
|
556 |
+
i (∂ib + bi)
|
557 |
+
δIi �
|
558 |
+
−ψδij + ∂i∂jh + ∂ihj + ∂jhi + 1
|
559 |
+
2hij + ǫijk(∂kσ + σk)
|
560 |
+
�
|
561 |
+
|
562 |
+
,
|
563 |
+
(43)
|
564 |
+
where {ϕ, β, b, ψ, h} are scalars and σ is a pseudoscalar of 1 degree of freedom (DoF) each, {βi, bi, hi} are
|
565 |
+
vectors and σi is a pseudovector of 1 DoFs each, and hij is the tensor mode of 2 DoFs, for a total of of 16
|
566 |
+
DoFs. The tensor modes are symmetric hij = h(ij), traceless δijhij = 0 and divergenceless ∂ihij = 0. See
|
567 |
+
also Ref. [90, 91]. The divergenceless property also applies for vectors and pseudovectors such that ∂iαi = 0
|
568 |
+
where α = {β, b, h, σ}. Unlike Ref. [92, 93], the pseudoscalar and pseudovector are included to account for the
|
569 |
+
anti-symmetry of the tetrad. The mid-range Latin indices are spacial coordinates: {I, J, K, . . .} for spacial
|
570 |
+
inner bundle and {i, j, k, . . .} for spacial spacetime manifold. Note, δij is the spacial Minkowski metric such
|
571 |
+
that δij = −ηij. In turn, the first order metric perturbation from Eq. (1) is given by
|
572 |
+
δgµν =
|
573 |
+
|
574 |
+
|
575 |
+
2ϕ
|
576 |
+
∂iB + Bi
|
577 |
+
∂iB + Bi
|
578 |
+
2
|
579 |
+
�
|
580 |
+
−ψδij + ∂i∂jh + ∂ihj + ∂jhi + 1
|
581 |
+
2hij
|
582 |
+
�
|
583 |
+
|
584 |
+
,
|
585 |
+
(44)
|
586 |
+
where B = −β + b and Bi = −βi + bi. The off-diagonals are identical hence verifying the symmetry of the
|
587 |
+
metric. The pseudoscalar and pseudovectors no longer play a role, and thus, the number of DoFs reduces to
|
588 |
+
10.
|
589 |
+
The gauge transformation through the coordinate change [94–96] is
|
590 |
+
˜xµ → xµ + ξµ ,
|
591 |
+
(45)
|
592 |
+
where ξµ is a vector field applied to study the gauge transformation of perturbative quantities. Such a
|
593 |
+
coordinate transformation can be extended to include orders higher than second one, but it is sufficient to
|
594 |
+
consider up to this point. Thus, the transformations for first tetrad are given by [97]
|
595 |
+
δ˜eA
|
596 |
+
µ = δeA
|
597 |
+
µ + Lξ(1)eA (0)
|
598 |
+
µ
|
599 |
+
,
|
600 |
+
(46)
|
601 |
+
where Lξ is the Lie derivative along ξµ wherein ξµ = (ξ0, ξi + δij∂jξ) further splits and once again obeys
|
602 |
+
divergencelessness as ∂iξi = 0. The analysis of each combination of temporal and spatial parts of the tetrad
|
603 |
+
indicates that ψ, σ, βi and hij are gauge invariant in Minkowski background while the rest have the following
|
604 |
+
gauge transformations
|
605 |
+
˜ϕ = ϕ − ˙ξ0 ,
|
606 |
+
β = β − ξ0 ,
|
607 |
+
˜b = b − ˙ξ ,
|
608 |
+
˜h = h − ξ ,
|
609 |
+
˜bi = bi + ˙ξi ,
|
610 |
+
˜hi = hi + 1
|
611 |
+
2ξi ,
|
612 |
+
˜σi = σi − 1
|
613 |
+
2ǫijk∂jξk .
|
614 |
+
(47)
|
615 |
+
This shows that since the pseudoscalar σ is gauge-invariant, it can be treated separately than the rest of
|
616 |
+
the scalar modes, but the same cannot be said for the pseudovector. In fact, the pseudovector σi can be
|
617 |
+
expressed in terms of hi (and its derivative in terms of bi). This implies that the vector and pseudovector
|
618 |
+
cannot be decomposed [98].
|
619 |
+
Next, we construct groups of non-gauge invariant quantities: {ϕ, β}, {b, h} and {bi, hi, σi}. For gauge
|
620 |
+
choice, a quantity from each group is set to zero [98]. In particular, we will choose β = 0, h = 0 and σi = 0.
|
621 |
+
V.
|
622 |
+
GHOST AND LAPLACIAN INSTABILITIES IN MINKOWSKI BACKGROUND
|
623 |
+
Ghost instabilities stem from a negative kinetic term in the action associated to a propagating degree of
|
624 |
+
freedom. A ghost mode can be determined by expanding the action up to second order perturbations about
|
625 |
+
|
626 |
+
8
|
627 |
+
a background. Therefore, for a Lagrangian of the form L = ˙⃗χtA ˙⃗χ + . . ., we impose that the eigenvalues of
|
628 |
+
A should be positive to eliminate ghost modes. The procedure is applied in what follows. The second order
|
629 |
+
perturbation of the action is obtained by separately applying the scalar, vector and tensor field perturbations
|
630 |
+
given by Eq. (43). The dynamical fields in the action are identified, while a system of equations is obtained
|
631 |
+
by varying the action with respect to the auxiliary fields. This system of equations is substituted back into
|
632 |
+
the action to eliminate the non-dynamic fields [99, 100].
|
633 |
+
In order to obtain a gauge invariant action, the action is varied with respect to the temporal and spatial
|
634 |
+
part of the vector field associated with the coordinate transformation, and imposing that this vanishes. Then,
|
635 |
+
a diagonalized kinetic matrix is constructed and a constraint is generated for each entry. In general, these
|
636 |
+
constraints could be time dependent: this feature arises from the background spacetime and the background
|
637 |
+
quantities of fields. When looking at the propagating speeds of these modes, a positive definite value should
|
638 |
+
be applied in order to ensure that the perturbation does not lead to an exponential growth [101] i.e. c2 > 0,
|
639 |
+
referred to as gradient or Laplacian instability. Hence, both ghost and gradient instabilities are checked for
|
640 |
+
each mode in order to obtain the constraints which lead to a stable model.
|
641 |
+
A.
|
642 |
+
Tensor Perturbations
|
643 |
+
The tensor mode perturbations, presented in Eq. (43), can be extended as
|
644 |
+
eA
|
645 |
+
µ →
|
646 |
+
|
647 |
+
1
|
648 |
+
0
|
649 |
+
0 δij + 1
|
650 |
+
2ǫhij − 1
|
651 |
+
8ǫ2hikhk
|
652 |
+
j
|
653 |
+
|
654 |
+
,
|
655 |
+
(48)
|
656 |
+
analogous to the Arnowitt-Deser-Misner (ADM) for tensor modes [100]. The action can be extended to
|
657 |
+
second order perturbations such that
|
658 |
+
S(2)
|
659 |
+
T
|
660 |
+
= 1
|
661 |
+
2
|
662 |
+
�
|
663 |
+
d4x
|
664 |
+
�
|
665 |
+
MT ˙hij ˙hij − NT ∂mhij∂mhij + Phijhij�
|
666 |
+
(49)
|
667 |
+
where
|
668 |
+
MT = G4 − 2XG4,X + XG5,φ − GTele,T + 1
|
669 |
+
2XGTele,J5 + 2XGTele,J8 ,
|
670 |
+
(50)
|
671 |
+
NT = G4 − X(G5,φ + ¨φG5,X) − GTele,T ,
|
672 |
+
(51)
|
673 |
+
PT = − 1
|
674 |
+
2
|
675 |
+
d
|
676 |
+
dt( ˙φGTele,I2) .
|
677 |
+
(52)
|
678 |
+
For the sake of simplicity, we switch to Fourier space such that
|
679 |
+
S(2)
|
680 |
+
T
|
681 |
+
= 1
|
682 |
+
2
|
683 |
+
�
|
684 |
+
dt d3k
|
685 |
+
(2π)3
|
686 |
+
�
|
687 |
+
MT ˙hij ˙hij +
|
688 |
+
�
|
689 |
+
−k2NT + PT
|
690 |
+
�
|
691 |
+
hijhij .
|
692 |
+
�
|
693 |
+
(53)
|
694 |
+
This result is obtained after applying integration by parts, removing the surface terms and applying the
|
695 |
+
background Eqs. (35-37). By imposing MT > 0, the theory is ghost free in tensor modes. When considering
|
696 |
+
a constant background scalar φ, this implies that G4 − GTele,T > 0 which corresponds to the condition
|
697 |
+
G4 −GTele,T ̸= 0 imposed in Ref. [102] in order to ensure that there are tensor mode DoFs propagating. The
|
698 |
+
propagation speed of tensor modes is given by
|
699 |
+
c2
|
700 |
+
T = NT
|
701 |
+
MT
|
702 |
+
=
|
703 |
+
G4 − X(G5,φ + ¨φG5,X) − GTele,T
|
704 |
+
G4 − 2XG4,X + XG5,φ − GTele,T + 1
|
705 |
+
2XGTele,J5 + 2XGTele,J8
|
706 |
+
,
|
707 |
+
(54)
|
708 |
+
for which c2
|
709 |
+
T > 0 is required to ensure gradient stability. Hence, MT > 0 and NT > 0 result in ghost
|
710 |
+
and gradient stability, respectively. The same result would by obtained when eliminating I2 contribution
|
711 |
+
from the GTele function. Following the observations of gravitational wave signal GW170817 [103] and its
|
712 |
+
electromagnetic counterpart GRB170817A [27], it is interesting to calculate the deviation from speed of light
|
713 |
+
propagation such that the excess speed is given by
|
714 |
+
αT = c2
|
715 |
+
T − 1 =
|
716 |
+
X(2G4,X − 2G5,φ − ¨φG5,X − 1
|
717 |
+
2GTele,J5 − 2GTele,J8)
|
718 |
+
G4 − 2XG4,X + XG5,φ − GTele,T + 1
|
719 |
+
2XGTele,J5 + 2XGTele,J8
|
720 |
+
,
|
721 |
+
(55)
|
722 |
+
|
723 |
+
9
|
724 |
+
which corresponds to the result obtained through the GW propagation equation [66], a value which is highly
|
725 |
+
constrained such that a graviton mass would be minute.
|
726 |
+
Additionally, from the general result of teleparallel Horndeski analogue, given by Eq. (48), one may obtain
|
727 |
+
the results of well-studied theories from literature, as summarized in Table I. See also Ref.[73] for the
|
728 |
+
metric cases derived from Noether symmetries. As an extension analogous to standard Horndeski theory,
|
729 |
+
the stability conditions can be obtained by setting GTele = 0. The ghost modes are excluded for when
|
730 |
+
the constant of the kinetic term is G4 − 2XG4,X + XG5,X > 0 while gradient stability is obtained for
|
731 |
+
G4 − X(G5,φ + ¨φG5,X) > 0, in agreement with Refs. [101, 104–106] when taking the appropriate limits
|
732 |
+
to Minkowski spacetime. An example of a subclass of Horndeski gravity is the Brans-Dicke theory, where
|
733 |
+
G2 = 2wBDX
|
734 |
+
φ
|
735 |
+
and G4 = φ for which wBD is the Dicke coupling constant [107], other constants are set to
|
736 |
+
vanish and ghost instabilities are avoided for φ > 0. By considering the generalized Brans Dicke theory,
|
737 |
+
ghost instabilities are avoided for a positive value of a function of the scalar field, F(φ) > 0 [108]. Another
|
738 |
+
example is f(
|
739 |
+
◦R) where G2 = f(φ) − φf ′(φ), G4 = f ′(φ), the rest of the constants are zero, implying that
|
740 |
+
ghost stability is achieved for f ′(φ) > 0. A final subcase of Horndeski gravity considered here is GR. In this
|
741 |
+
case, the only non-vanishing constant is G4 = 1 for which there are no ghost modes since MT = 1 > 0. All
|
742 |
+
of these subcases do not result in any gradient instabilities as cT = 1 > 0.
|
743 |
+
Next, we look at cases that arise due to the inclusion of teleparallel terms. For a purely teleparallel theory
|
744 |
+
such as f(T ) gravity, all terms are set to vanish except for GTele,T = f(T ). This implies in −f ′(T ) > 0 to
|
745 |
+
avoid ghost modes similar to the result obtained in Ref. [98]. An equivalent result is obtained for scalar-
|
746 |
+
tensor theory with a Lagrangian of the form L = f(φ, T ) + XP(φ), an extension of f(T ) [100, 109]. Once
|
747 |
+
again, gradient instabilities are not an issue. Finally, the case where only I2 contributions are present is
|
748 |
+
considered. In this case, all constants are going to vanish while GTele,I2 ̸= 0 leads to a non-dynamical degree
|
749 |
+
of freedom.
|
750 |
+
Theory
|
751 |
+
Case
|
752 |
+
MT
|
753 |
+
NT
|
754 |
+
Horndeski
|
755 |
+
GTele = 0
|
756 |
+
G4 − 2XG4,X + ¨φXG5,X G4 − X(G5,φ + ¨φG5,X)
|
757 |
+
Generalized
|
758 |
+
Brans-Dicke
|
759 |
+
GTele = G5 = 0, G2 = B(φ)X
|
760 |
+
G3 = 2ξ(φ)X, G4 = 1
|
761 |
+
2F(φ)
|
762 |
+
1
|
763 |
+
2F(φ)
|
764 |
+
1
|
765 |
+
2F(φ)
|
766 |
+
Brans-Dicke
|
767 |
+
GTele = G3 = G5 = 0
|
768 |
+
G2 = 2wBDX
|
769 |
+
φ
|
770 |
+
, G4 = φ
|
771 |
+
φ
|
772 |
+
φ
|
773 |
+
f(
|
774 |
+
◦R)
|
775 |
+
GTele = G3 = G5 = 0
|
776 |
+
G2 = f(φ) − φf ′(φ), G4 = f ′(φ)
|
777 |
+
f ′(φ)
|
778 |
+
f ′(φ)
|
779 |
+
General Relativity
|
780 |
+
GTele = G2 = G3 = G5 = 0
|
781 |
+
G4 = 1
|
782 |
+
1
|
783 |
+
1
|
784 |
+
Teleparallel
|
785 |
+
or f(T )
|
786 |
+
G2 = G3 = G4 = G5 = 0,
|
787 |
+
GTele = f(T )
|
788 |
+
−f ′(T )
|
789 |
+
−f ′(T )
|
790 |
+
f(φ, T ) + XP(φ)
|
791 |
+
G3 = G4 = G5 = 0
|
792 |
+
G2 = XP(φ), GTele = f(φ, T )
|
793 |
+
−f,T (φ, T )
|
794 |
+
−f,T (φ, T )
|
795 |
+
GTele,I2 only
|
796 |
+
G2 = G3 = G4 = G5 = 0
|
797 |
+
GTele,T = 0
|
798 |
+
no propagating mode
|
799 |
+
TABLE I. List of literature models with the respective ghost MT and gradient stability NT conditions are positive
|
800 |
+
definite, while the propagation speed is cT = NT/MT for tensor modes. The models include Horndeski theory [20,
|
801 |
+
101, 104, 105], Generalized Brans-Dicke [108] and Brans-Dicke [107], f(˚
|
802 |
+
R) theory, General Relativity, f(T ) theory [98],
|
803 |
+
f(φ, T ) theory [100] and the case where the action is dependent on I2 only.
|
804 |
+
|
805 |
+
10
|
806 |
+
B.
|
807 |
+
Vector Perturbations
|
808 |
+
Next, we consider the vector perturbation of the tetrad (43) with the application of gauge fixing which
|
809 |
+
eliminates the pseudovector and any coupling with it such that
|
810 |
+
eA
|
811 |
+
µ →
|
812 |
+
|
813 |
+
|
814 |
+
1
|
815 |
+
−ǫβi
|
816 |
+
ǫδI
|
817 |
+
i bi δIi(δij + ǫ(∂ihj + ∂jhi))
|
818 |
+
|
819 |
+
.
|
820 |
+
(56)
|
821 |
+
This result is a case of only vector modes in this portion of decomposition. Extending the action to second
|
822 |
+
order vector perturbations, we obtain
|
823 |
+
S(2)
|
824 |
+
V
|
825 |
+
=
|
826 |
+
�
|
827 |
+
dt d3k
|
828 |
+
(2π)3
|
829 |
+
�
|
830 |
+
4k4Ahihi + E ˙βi ˙βi
|
831 |
+
+ k2(4B ˙hi( ˙hi − bi) + Cbibi + Dβiβi + 4Fhiβi + 4Ghi ˙βi − 2Hβibi)
|
832 |
+
�
|
833 |
+
,
|
834 |
+
(57)
|
835 |
+
where
|
836 |
+
A = GTele,Tvec + 1
|
837 |
+
9X
|
838 |
+
�
|
839 |
+
−GTele,J8 + XGTele,J6 − 5
|
840 |
+
2GTele,J5 − 3GTele,J3
|
841 |
+
�
|
842 |
+
,
|
843 |
+
B = G4 − 2XG4,X + XG5,φ − GTele,T + X
|
844 |
+
�
|
845 |
+
2GTele,J8 + 1
|
846 |
+
2GTele,J5
|
847 |
+
�
|
848 |
+
,
|
849 |
+
C = B + 1
|
850 |
+
2XGTele,J5 + 2
|
851 |
+
3XGTele,J10 + 2
|
852 |
+
9GTele,Tax ,
|
853 |
+
D = C + XGTele,J5 − 2XGTele,J8 − 2XGTele,J10 ,
|
854 |
+
E = 4A − 3GTele,Tvec + 2XGTele,J3 ,
|
855 |
+
F = 1
|
856 |
+
2 ˙φGTele,I2 − d
|
857 |
+
dt (G4 − 2XG4,X + XG5,φ) .
|
858 |
+
G = 2A − B − 3GTele,Tvec + 1
|
859 |
+
3XGTele,J3 − 2XGTele,J8 + 5
|
860 |
+
2XGTele,J5 ,
|
861 |
+
H = C − 2XGTele,J8 − 4
|
862 |
+
9GTele,Tax ,
|
863 |
+
(58)
|
864 |
+
While the decomposition along unitary gauge ensures that there are no higher order time derivatives, one
|
865 |
+
can see that the action contains higher order spatial derivatives [110]. Here, we will set the coefficients of
|
866 |
+
these derivatives to vanish, but it should be noted that a general analysis for each constraint should be
|
867 |
+
carried out before solving the next one and leading to a very complicate solution for the action. By imposing
|
868 |
+
the conditions A = 0 and B = 0, the latter condition accounting for the higher order mix of temporal and
|
869 |
+
spatial derivatives [111], the action reduces to
|
870 |
+
S(2)
|
871 |
+
V
|
872 |
+
=
|
873 |
+
�
|
874 |
+
dt d3k
|
875 |
+
(2π)3
|
876 |
+
�
|
877 |
+
E ˙βi ˙βi + k2(Cbibi + Dβiβi + 4Fhiβi + 4Ghi ˙βi − 2Hβibi)
|
878 |
+
�
|
879 |
+
,
|
880 |
+
(59)
|
881 |
+
where bi and hi are auxiliary vector modes. By varying with respect to each of these non-dynamical modes,
|
882 |
+
the respective field equations are given by
|
883 |
+
2k2(Cbi − Hβi) = 0 ,
|
884 |
+
and
|
885 |
+
4k2Fβi = 0 .
|
886 |
+
(60)
|
887 |
+
By solving for each auxiliary field and plugging it back in into Eq. (59), we get
|
888 |
+
S(2)
|
889 |
+
V
|
890 |
+
=
|
891 |
+
�
|
892 |
+
dt d3k
|
893 |
+
(2π)3
|
894 |
+
�
|
895 |
+
E ˙βi ˙βi − k2 �
|
896 |
+
H2
|
897 |
+
C − D
|
898 |
+
�
|
899 |
+
βiβi
|
900 |
+
�
|
901 |
+
,
|
902 |
+
(61)
|
903 |
+
wherein the action is expressed in terms of the dynamical non-gauge invariant mode βi. Thus the ghost and
|
904 |
+
Laplacian conditions are given respectively by
|
905 |
+
MV = E > 0 ,
|
906 |
+
and NV = H2
|
907 |
+
C − D > 0 .
|
908 |
+
(62)
|
909 |
+
suggesting that there is a propagating vector mode with speed
|
910 |
+
cV = H2 − CD
|
911 |
+
CE
|
912 |
+
.
|
913 |
+
(63)
|
914 |
+
This propagating mode generally steps from the introduction of the Ji terms in the BDLS action (27)
|
915 |
+
representing the quadratic contractions of the scalar and torsion fields.
|
916 |
+
|
917 |
+
11
|
918 |
+
a.
|
919 |
+
Vanishing Ji terms:
|
920 |
+
When considering the case were J1 = J3 = J5 = J6 = J10 = 0, the action (61)
|
921 |
+
reduces to
|
922 |
+
Svanishing J terms
|
923 |
+
V
|
924 |
+
=
|
925 |
+
�
|
926 |
+
dt d3k
|
927 |
+
(2π)3 k2
|
928 |
+
�
|
929 |
+
C − H2
|
930 |
+
C
|
931 |
+
�
|
932 |
+
βiβi ,
|
933 |
+
(64)
|
934 |
+
exhibiting no dynamical modes i.e. no propagating vector mode. In the case of only teleparallel function,
|
935 |
+
the same conditions apply with vanishing Horndeski terms in each constant.
|
936 |
+
The subcases of standard
|
937 |
+
Horndeski [31, 104], f(
|
938 |
+
◦R) [99, 112], Generalized Brans-Dicke[108] and f(T ) [98] fall under this category of
|
939 |
+
non-viable propagating vector mode.
|
940 |
+
b.
|
941 |
+
C = 0
|
942 |
+
: The Laplacian constraint, given in Eq. (62), is undefined for C = 0. By considering this
|
943 |
+
particular case, the action results in
|
944 |
+
SC=0
|
945 |
+
V
|
946 |
+
=
|
947 |
+
�
|
948 |
+
dt d3k
|
949 |
+
(2π)3 E ˙βi ˙βi ,
|
950 |
+
(65)
|
951 |
+
to which the Laplacian condition is violated since it is null. On the other hand, imposing only E = 0, the
|
952 |
+
ghost instability is generated since this value should be a positive definite value.
|
953 |
+
c.
|
954 |
+
Ji terms only:
|
955 |
+
On the other hand, when considering only the contribution of the quadratic contrac-
|
956 |
+
tions, the only surviving term is that with coefficient E leading to a ghost stability condition but leading
|
957 |
+
to Laplacian instability, similar to the C = 0 case. This implies the importance of having a combination of
|
958 |
+
the Ji terms along with the rest of the teleparallel scalar invariants to maintain stability conditions and a
|
959 |
+
possible propagating vector mode.
|
960 |
+
d.
|
961 |
+
Constant Background Scalar Field:
|
962 |
+
With regards to the scalar field, the unitary gauge is applied to
|
963 |
+
the perturbative part of the scalar, while, at background level, it is a function of time only. Alternatively,
|
964 |
+
if one considers a constant scalar field φ = c, then the entire action is vanishing such that no vector modes
|
965 |
+
propagate, thus it corresponds to the results in Ref. [67] for the DoF and polarisation modes in the vector
|
966 |
+
portion of the decomposition.
|
967 |
+
C.
|
968 |
+
Scalar Perturbations
|
969 |
+
Let us now consider the scalar modes. Since there is no mixing between the scalar and pseudoscalar modes,
|
970 |
+
we will treat them separately. The tetrad perturbation using scalar modes is given by
|
971 |
+
eA
|
972 |
+
µ →
|
973 |
+
|
974 |
+
1 + ϕ
|
975 |
+
0
|
976 |
+
δI
|
977 |
+
i ∂ib (1 − ψδIiδij .
|
978 |
+
|
979 |
+
|
980 |
+
(66)
|
981 |
+
As already stated, for the gauge invariant quantities, given by Eq. (47), the gauge choice is β = h = 0. The
|
982 |
+
pseudoscalar will be analyzed separately. It should be noted that this situation is identical to the Arnowitt-
|
983 |
+
Deser-Misner (ADM) decomposition used in torsion-based theories [100]. It leads to the same metric as that
|
984 |
+
applied to curvature-based theories [101]. On the other hand, the choice β = b = 0 results in the Newtonian
|
985 |
+
(longitudinal) gauge. Substituting the tetrad perturbation to the action, followed by integration by parts
|
986 |
+
and application of the background equations (35-37), the second order perturbation of the action is given by
|
987 |
+
S(2)
|
988 |
+
S
|
989 |
+
=
|
990 |
+
�
|
991 |
+
dt d3k
|
992 |
+
(2π)3
|
993 |
+
�
|
994 |
+
¯
|
995 |
+
Aϕ2 + 6 ¯Dψ2 − 6 ¯F ˙ψ2 − 6 ¯Gϕ ˙ψ
|
996 |
+
− k2(− ¯Bϕ2 − 2 ¯Eψ2 + 4 ¯Hϕψ − 2 ¯Gϕb − 4 ¯F ˙ψb) + k4 ¯Cb2�
|
997 |
+
(67)
|
998 |
+
|
999 |
+
12
|
1000 |
+
where
|
1001 |
+
¯
|
1002 |
+
A = XG2,X + 2X2G2,XX − 2XG3,φ − 2X2G3,φX + XGTele,X + 2X2GTele,XX ,
|
1003 |
+
¯B = GTele,Tvec + 2
|
1004 |
+
9X (2GTele,J8 + 2XGTele,J6 − 5GTele,J5 + 3GTele,J3) ,
|
1005 |
+
¯C = −GTele,Tvec + XGTele,I2I2 + 1
|
1006 |
+
3X(4GTele,J8 + GTele,J5) ,
|
1007 |
+
¯D = d
|
1008 |
+
dt( ˙φGTele,I2) ,
|
1009 |
+
¯E = G4 − X(G5,φ − ¨φG5,X) − GTele,T + 2GTele,Tvec + 1
|
1010 |
+
9X (−2GTele,J8 + 2XGTele,J6 − 5GTele,J5 − 6GTele,J3) ,
|
1011 |
+
¯F = G4 − 2XG4,X + XG5,φ − GTele,T + 3
|
1012 |
+
2(GTele,Tvec − XGTele,I2I2) ,
|
1013 |
+
¯G = − ˙φXG3,X + ˙φG4,φ + 2 ˙φXG4,φX + 1
|
1014 |
+
2 ˙φGTele,I2 + ˙φXGTele,XI2 ,
|
1015 |
+
¯H = G4 − 2XG4,X + XG5,φ − GTele,T + GTele,Tvec + 1
|
1016 |
+
9X(2GTele,J8 − 2XGTele,J6 + 5GTele,J5 + 3
|
1017 |
+
2GTele,J3) .
|
1018 |
+
(68)
|
1019 |
+
Here k is the co-vector. As shown in coefficient of ¯C in Eq. (67), there is a higher derivative contribution,
|
1020 |
+
hence it is set to vanish [110]. It is clear that variables ϕ and b are non-dynamical with respect to the time
|
1021 |
+
component. By varying with respect to each of these auxiliary fields, one obtains a set of equations
|
1022 |
+
0 = ( ¯
|
1023 |
+
A + k2 ¯B)ϕ − 3 ¯G ˙ψ + k2(2 ¯Hψ − ¯Gb) ,
|
1024 |
+
(69)
|
1025 |
+
0 = ¯Gϕ + 2 ¯F ˙ψ .
|
1026 |
+
(70)
|
1027 |
+
By solving these equations of motion for the modes ϕ and b, it leads to an action expressed in terms of the
|
1028 |
+
dynamical mode only, that is
|
1029 |
+
S(2)
|
1030 |
+
S
|
1031 |
+
=
|
1032 |
+
�
|
1033 |
+
dt d3k
|
1034 |
+
(2π)3
|
1035 |
+
�
|
1036 |
+
4k2 ¯B ¯F
|
1037 |
+
2
|
1038 |
+
¯G
|
1039 |
+
2
|
1040 |
+
˙ψ2 +
|
1041 |
+
�
|
1042 |
+
4 ¯
|
1043 |
+
A ¯F
|
1044 |
+
2
|
1045 |
+
¯G
|
1046 |
+
2
|
1047 |
+
+ 6 ¯F
|
1048 |
+
�
|
1049 |
+
˙ψ2 − k2
|
1050 |
+
�
|
1051 |
+
−2 ¯E + 4 d
|
1052 |
+
dt
|
1053 |
+
� ¯F ¯H
|
1054 |
+
¯G
|
1055 |
+
��
|
1056 |
+
ψ2 + 6 ¯Dψ2
|
1057 |
+
�
|
1058 |
+
.
|
1059 |
+
(71)
|
1060 |
+
Taking into account the mix of spatial and temporal higher-order derivatives, the first term of the action
|
1061 |
+
vanishes [111]. This implies that either ¯F = 0 (which renders the whole action without a dynamical mode),
|
1062 |
+
or ¯B = 0. By applying the latter condition, the action can be expressed in terms of a gauge invariant quantity
|
1063 |
+
within a Minkowski background and no higher-order terms. It is
|
1064 |
+
S(2)
|
1065 |
+
S
|
1066 |
+
=
|
1067 |
+
�
|
1068 |
+
dt d3k
|
1069 |
+
(2π)3
|
1070 |
+
��
|
1071 |
+
4 ¯
|
1072 |
+
A ¯F
|
1073 |
+
2
|
1074 |
+
¯G
|
1075 |
+
2
|
1076 |
+
+ 6 ¯F
|
1077 |
+
�
|
1078 |
+
˙ψ2 − k2
|
1079 |
+
�
|
1080 |
+
−2 ¯E + 4 d
|
1081 |
+
dt
|
1082 |
+
� ¯F ¯H
|
1083 |
+
¯G
|
1084 |
+
��
|
1085 |
+
ψ2 + 6 ¯Dψ2
|
1086 |
+
�
|
1087 |
+
.
|
1088 |
+
(72)
|
1089 |
+
In the case of teleparallel analogue of Horndeski theory, ghost stability and gradient stability are obtained,
|
1090 |
+
respectively, when
|
1091 |
+
MS = 4 ¯
|
1092 |
+
A ¯F
|
1093 |
+
2
|
1094 |
+
¯G
|
1095 |
+
2
|
1096 |
+
+ 6 ¯F > 0 ,
|
1097 |
+
(73)
|
1098 |
+
¯
|
1099 |
+
N S = −2 ¯F + 4 d
|
1100 |
+
dt
|
1101 |
+
� ¯F ¯H
|
1102 |
+
¯G
|
1103 |
+
�
|
1104 |
+
> 0 ,
|
1105 |
+
(74)
|
1106 |
+
and the propagating speed is
|
1107 |
+
cS = NS
|
1108 |
+
MS
|
1109 |
+
.
|
1110 |
+
(75)
|
1111 |
+
Different subcases are reported in Table II. Through the substitution of Eqs (73) and (74), conditions to
|
1112 |
+
avoid ghost and Laplacian instabilities are realised.
|
1113 |
+
a.
|
1114 |
+
Horndeski:
|
1115 |
+
The standard Horndeski case has identical expressions for ghost and gradient stability
|
1116 |
+
conditions as those for teleparallel Horndeski (73-74) with the difference that each constant does not have
|
1117 |
+
teleparallel contributions.
|
1118 |
+
|
1119 |
+
13
|
1120 |
+
b.
|
1121 |
+
Generalized Brans-Dicke:
|
1122 |
+
Considering Generalised Brans-Dicke (GBD) theory means that G2 =
|
1123 |
+
B(φ)X, G3 = 2Xξ(φ), G4 = 1
|
1124 |
+
2F(φ) and all other terms are set to zero. When we take the background
|
1125 |
+
equations
|
1126 |
+
B − 4Xξ′ = 0 ,
|
1127 |
+
and
|
1128 |
+
˙φ2F ′′ + ¨φ(F ′ − 2 ˙φ2ξ) = 0 ,
|
1129 |
+
(76)
|
1130 |
+
for ghost stability, we have
|
1131 |
+
MGBD
|
1132 |
+
S
|
1133 |
+
= F[3F ′2 − 4 ˙φ2(Fξ′ + 3ξF ′) + 12 ˙φ4ξ2]
|
1134 |
+
[F ′ − 2 ˙φ2ξ]2
|
1135 |
+
> 0 ,
|
1136 |
+
(77)
|
1137 |
+
where ′ denotes a derivative with respect to the respective variable of the function. In this case, it is φ, while
|
1138 |
+
the gradient condition is
|
1139 |
+
N GBD
|
1140 |
+
S
|
1141 |
+
= F[3F ′3 − 2 ˙φ2(5F ′2ξ − 4ξFF ′′ − 2Fξ′F ′) + 4 ˙φ4(F ′ξ2 − 2Fξ′ξ) + 8 ˙φ6ξ3]
|
1142 |
+
[F ′ − 2 ˙φ2ξ]3
|
1143 |
+
> 0 .
|
1144 |
+
(78)
|
1145 |
+
With these conditions, the speed of propagation is positive. It is
|
1146 |
+
(cGBD
|
1147 |
+
S
|
1148 |
+
)2 = 3F ′3 − 2 ˙φ2(5F ′2ξ − 4ξFF ′′ − 2Fξ′F ′) + 4 ˙φ4(F ′ξ2 − 2Fξ′ξ) + 8 ˙φ6ξ3
|
1149 |
+
[3F ′2 − 4 ˙φ2(Fξ′ + 3ξF ′) + 12 ˙φ4ξ2][F ′ − 2 ˙φ2ξ]
|
1150 |
+
,
|
1151 |
+
(79)
|
1152 |
+
which correlates with results obtained in Ref. [108] for a Minkowski background.
|
1153 |
+
c.
|
1154 |
+
Brans-Dicke:
|
1155 |
+
As for the Brans-Dicke theory in Ref. [107] with G2 = 2wBDX
|
1156 |
+
φ
|
1157 |
+
and G4 = φ, ghosts
|
1158 |
+
instabilities are avoided if 2φ(3 + 2wBD) > 0.
|
1159 |
+
Provided that φ > 0, this implies that the Brans-Dicke
|
1160 |
+
constant is wBD > − 3
|
1161 |
+
2 [99]. The gradient stability condition is given by 2φ(3 − 2φ¨φ/ ˙φ2) > 0 to ensure
|
1162 |
+
a positive propagating speed. Moreover, when applying the second Friedman Eq. (36), gradient condition
|
1163 |
+
reduces to 2φ(3 + wBD) such that wBD > −3 and a unitary propagating speed [113], analogous to ξ = 0,
|
1164 |
+
reported in Ref. [108], is obtained. The first Friedman Eq. (35) shows that the only non-trivial solution is
|
1165 |
+
that for wBD = 0, which results in identical ghost and gradient expressions.
|
1166 |
+
d.
|
1167 |
+
f(˚
|
1168 |
+
R):
|
1169 |
+
The scalar-tensor theory equivalent to f(R) [114] is given by setting G2 = f(φ) − φf ′(φ) and
|
1170 |
+
G4 = f ′(φ) while the rest of the functions are set to vanish. See also Ref. [73]. In order to have ghost
|
1171 |
+
stability, it has to be 6f ′(φ) > 0, i.e. f ′(φ) > 0. Once again, upon applying the background Eqs. (35-36),
|
1172 |
+
the gradient condition reduces to f ′(φ) > 0. In fact, as a subcase of GBD theory, the case ξ = 0 always
|
1173 |
+
results in a unitary speed propagating mode.
|
1174 |
+
e.
|
1175 |
+
GR, f(T ), f(φ, T ):
|
1176 |
+
When considering the cases of GR, f(T ) and f(φ, T ), the substitution in Eqs˜(73-
|
1177 |
+
74) results in an undefined expression. In these cases, although taking the appropriate limits of each coeffi-
|
1178 |
+
cient does lead to a positive ghost condition value, the propagating speed is negative, thus scalar modes are
|
1179 |
+
not viable. This is expected in GR. Additionally, Ref. [98] shows that the only propagating scalar field is that
|
1180 |
+
dependent on the perturbation of scalar field φ, while, in this paper, we are applying the unitary gauge. As
|
1181 |
+
in Ref. [100], f(φ, T ) theory gives rise to a propagating mode when considering cosmological perturbations.
|
1182 |
+
The same applies for GR with an additional canonical scalar field such that G2 = X − V (φ), G4 = M 2
|
1183 |
+
Pl/2,
|
1184 |
+
G3 = G5 = GTele = 0 [101].
|
1185 |
+
f.
|
1186 |
+
Teleparallel:
|
1187 |
+
If one considers only the teleparallel portions of the action, all terms from Eq. (71) are
|
1188 |
+
retained, with all standard Horndeski contributions set to vanish. This implies that the ghost and Laplacian
|
1189 |
+
instabilities coincide with the form of Eqs. (73) and (51), respectively, provided that the background equations
|
1190 |
+
are satisfied.
|
1191 |
+
D.
|
1192 |
+
Pseudoscalar Perturbations
|
1193 |
+
The gauge invariant pseudoscalar σ can be treated separately as
|
1194 |
+
eA
|
1195 |
+
µ →
|
1196 |
+
|
1197 |
+
1
|
1198 |
+
0
|
1199 |
+
0 δIi(δij + ǫ εijk∂kσ)
|
1200 |
+
|
1201 |
+
,
|
1202 |
+
(80)
|
1203 |
+
|
1204 |
+
14
|
1205 |
+
Theory
|
1206 |
+
Case
|
1207 |
+
MS
|
1208 |
+
NS
|
1209 |
+
Horndeski
|
1210 |
+
GTele = 0
|
1211 |
+
6 ¯
|
1212 |
+
F + 4 ¯
|
1213 |
+
A ¯
|
1214 |
+
F2
|
1215 |
+
¯
|
1216 |
+
G2
|
1217 |
+
−2 ¯
|
1218 |
+
E + 4 d
|
1219 |
+
dt ( ¯
|
1220 |
+
F2
|
1221 |
+
¯
|
1222 |
+
G )
|
1223 |
+
Generalized
|
1224 |
+
Brans-Dicke
|
1225 |
+
GTele = G5 = 0,
|
1226 |
+
G2 = B(φ)X, G3 = 2ξ(φ)X,
|
1227 |
+
G4 = 1
|
1228 |
+
2 F (φ)
|
1229 |
+
F [3F ′2−4 ˙φ2(F ξ′+3ξF′)+12 ˙φ4ξ2]
|
1230 |
+
[F ′−2 ˙φ2ξ]2
|
1231 |
+
F [3F ′3−2 ˙φ2(5F ′2ξ−4ξFF ′′−2F ξ′F ′)+4 ˙φ4(F ′ξ2−2F ξ′ξ)+8 ˙φ6ξ3]
|
1232 |
+
[F ′−2 ˙φ2ξ]3
|
1233 |
+
Brans-Dicke
|
1234 |
+
GTele = G3 = G5 = 0
|
1235 |
+
G2 = 2wBDX
|
1236 |
+
φ
|
1237 |
+
, G4 = φ
|
1238 |
+
2φ(3 + 2wBD)
|
1239 |
+
2(3φ −
|
1240 |
+
¨
|
1241 |
+
φ
|
1242 |
+
X ) → 2φ(3 + 2wBD)
|
1243 |
+
f( ◦
|
1244 |
+
R)
|
1245 |
+
GTele = G3 = G5 = 0
|
1246 |
+
G2 = f(φ) − φf′(φ),
|
1247 |
+
G4 = f′(φ)
|
1248 |
+
6f′(φ)
|
1249 |
+
−2f′(φ) + 4 d
|
1250 |
+
dt ( f′(φ)2
|
1251 |
+
˙φf′′(φ) ) → 6f′(φ)
|
1252 |
+
GR
|
1253 |
+
GTele = G2 = G3 = G5 = 0
|
1254 |
+
G4 = 1
|
1255 |
+
no propagating mode
|
1256 |
+
f(T )
|
1257 |
+
G2 = G3 = G4 = G5 = 0,
|
1258 |
+
GTele = f(T )
|
1259 |
+
no propagating mode
|
1260 |
+
f(φ, T ) + XP (φ)
|
1261 |
+
G3 = G4 = G5 = 0,
|
1262 |
+
G2 = XP (φ),
|
1263 |
+
GTele = f(φ, T )
|
1264 |
+
no propagating mode
|
1265 |
+
Teleparallel
|
1266 |
+
G2 = G3 = G4 = G5 = 0
|
1267 |
+
4 ¯
|
1268 |
+
A ¯
|
1269 |
+
F2
|
1270 |
+
¯
|
1271 |
+
G2
|
1272 |
+
+ 6 ¯
|
1273 |
+
F
|
1274 |
+
−2 ¯
|
1275 |
+
F + 4 d
|
1276 |
+
dt
|
1277 |
+
� ¯
|
1278 |
+
F ¯
|
1279 |
+
H
|
1280 |
+
¯
|
1281 |
+
G
|
1282 |
+
�
|
1283 |
+
TABLE II. List of literature models with the respective ghost MS and gradient stability NS conditions are positive
|
1284 |
+
definite, and propagation speed cS = NS/MS for scalar modes. The models include Horndeski theory [20, 101, 104,
|
1285 |
+
105], Generalized Brans-Dicke [108] and Brans-Dicke [107], f(˚
|
1286 |
+
R) theory , General Relativity, f(T ) theory [98], f(φ, T )
|
1287 |
+
theory [100]. and an action with only teleparallel terms.
|
1288 |
+
The action in Fourier space is expanded up to second order
|
1289 |
+
S(2)
|
1290 |
+
PS = −
|
1291 |
+
�
|
1292 |
+
dt d3k
|
1293 |
+
(2π)3
|
1294 |
+
��
|
1295 |
+
k2 d
|
1296 |
+
dt( ˙φGTele,I2) + 4
|
1297 |
+
9k4 (GTele,Tax − 2XGTele,J1)
|
1298 |
+
�
|
1299 |
+
σ2
|
1300 |
+
+k2
|
1301 |
+
�4
|
1302 |
+
9GTele,Tax + X
|
1303 |
+
�
|
1304 |
+
GTele,J5 + 4
|
1305 |
+
3GTele,J10
|
1306 |
+
��
|
1307 |
+
˙σ2
|
1308 |
+
�
|
1309 |
+
,
|
1310 |
+
(81)
|
1311 |
+
where the first term exhibits higher-order spatial derivatives and the second term exhibits higher order mixed
|
1312 |
+
derivatives. By imposing that GTele,Tax = 2XGTele,J1 = −X
|
1313 |
+
� 9
|
1314 |
+
4GTele,J5 + 3GTele,J10
|
1315 |
+
�
|
1316 |
+
, the action reduces to
|
1317 |
+
S(2)
|
1318 |
+
PS =
|
1319 |
+
�
|
1320 |
+
dt d3k
|
1321 |
+
(2π)3
|
1322 |
+
�
|
1323 |
+
− k2 d
|
1324 |
+
dt( ˙φGTele,I2)σ2�
|
1325 |
+
,
|
1326 |
+
(82)
|
1327 |
+
where σ is a non-dynamical mode and thus it is a non-propagating mode. This shows that in Minkowski
|
1328 |
+
background, the additional scalar invariants, provided by teleparallel analogue of Horndeski theory, do not
|
1329 |
+
contribute to any additional propagating DoF. See also Ref. [98].
|
1330 |
+
VI.
|
1331 |
+
DISCUSSION AND CONCLUSIONS
|
1332 |
+
We have investigated constraints emerging by considering the stability of perturbations about a Minkowski
|
1333 |
+
background in teleparallel analogue of Horndeski gravity. The approach is performed by exploring the ghost
|
1334 |
+
instabilities through looking at potentially negative expressions of kinetic term associated with propagating
|
1335 |
+
DoFs, as well as Laplacian instabilities emerging when propagation speeds of perturbations are not positive.
|
1336 |
+
This leads to possible exponential growth rates. These considerations are fundamental for the construction
|
1337 |
+
of robust and self-consistent cosmological models related to the scalar-tensor gravity.
|
1338 |
+
Specifically, we have discussed teleparallel analogue of Horndeski gravity where the most general scalar-
|
1339 |
+
tensor action is considered, provided that the Lagrangian terms are not parity violating and that scalars
|
1340 |
+
are produced by no more than quadratic contractions of torsion scalar. The naturally lower order nature
|
1341 |
+
of teleparallel gravity induces a much richer landscape of functional models when compared with standard
|
1342 |
+
metric Horndeski gravity, based on Levi-Civita connection. In other words, the replacement of torsion with
|
1343 |
+
curvature to lead dynamics turns out to manifest as a generalization of the standard Horndeski theory. Im-
|
1344 |
+
portantly, this produces a generalization of tensor mode propagation speed which means that the restrictions
|
1345 |
+
appearing in standard Horndeski gravity, due to the constraints on the gravitational waves speed, do not
|
1346 |
+
have the same effect here.
|
1347 |
+
|
1348 |
+
15
|
1349 |
+
Our calculations have proceeded by first deriving the background equations of motion (35–37) which are
|
1350 |
+
obtained by considering a flat FLRW background in which we take the Minkowski limit. We find this to
|
1351 |
+
be a convenient approach to determine the system of equations. These are useful equations for reducing
|
1352 |
+
the expressions of perturbations that ensue. The procedure is described in Sec. IV. We then proceeded to
|
1353 |
+
directly determine constraints to prevent ghost or Laplacian instabilities starting with tensor modes which
|
1354 |
+
results in the action in Eq. (53) and tensor propagation speed in Eq. (54). We collected the constraints for
|
1355 |
+
popular subclasses of BDLS theory in Table I where the known results are obtained for standard Horndeski
|
1356 |
+
gravity as well as f(
|
1357 |
+
◦R) and Brans-Dicke gravity, but new conditions are found in other cases. As for the
|
1358 |
+
vector perturbations, Sec. V B shows that vector modes are indeed propagating for some cases of GTele
|
1359 |
+
contribution, namely when Ji scalars appear in this function. However, these contributions may be small
|
1360 |
+
and within observational constraints.
|
1361 |
+
The scalar perturbations contain the most diverse range of DoFs. This rich structure produces the intricate
|
1362 |
+
action in Eq. (72), together with the propagation speed in Eq. (75). As in the case of tensor modes, constraints
|
1363 |
+
for each subclass of popular models is reported in Table II where results for the Minkowski perturbations are
|
1364 |
+
recovered for standard metric Horndeski gravity together with f(
|
1365 |
+
◦R) and Brans-Dicke gravity. Interestingly,
|
1366 |
+
either no constraints are set on some of the purely teleparallel models or only lightly limited cases are set.
|
1367 |
+
Importantly, these constraints are consistent with the tensor mode constraints on the functional models.
|
1368 |
+
These results are promising in terms of the viability of BDLS theory. As future work, it is intriguing to
|
1369 |
+
explore constraints from tachyonic instabilities. These constraints have been connected to Jeans instability
|
1370 |
+
where exponential growth of perturbations is slowed by the expansion of the Universe and where the matter
|
1371 |
+
dispersion relation has a negative mass term that renders it to vanish. This could lead to a more general
|
1372 |
+
consideration of perturbations about a flat FLRW background spacetime which would then be directly linked
|
1373 |
+
to observations such as those related to the growth of large scale structure. In forthcoming studies, possible
|
1374 |
+
observational constraints will be scrutinized.
|
1375 |
+
ACKNOWLEDGMENTS
|
1376 |
+
This paper is based upon work from COST Action CA21136 Addressing observational tensions in cosmology
|
1377 |
+
with systematics and fundamental physics (CosmoVerse) supported by COST (European Cooperation in
|
1378 |
+
Science and Technology). SC acknowledges the Istituto Nazionale di Fisica Nucleare (iniziative specifiche
|
1379 |
+
QGSKY and MOONLIGHT2). MC acknowledges funding by the Tertiary Education Scholarship Scheme
|
1380 |
+
(TESS, Malta).
|
1381 |
+
[1] C. Misner, K. Thorne, K. Thorne, J. Wheeler, W. Freeman, and Company, Gravitation. No. pt. 3 in
|
1382 |
+
Gravitation. W. H. Freeman, 1973. https://books.google.com.mt/books?id=w4Gigq3tY1kC.
|
1383 |
+
[2] T. Clifton, P. G. Ferreira, A. Padilla, and C. Skordis, “Modified Gravity and Cosmology,”
|
1384 |
+
Phys. Rept. 513 (2012) 1–189, arXiv:1106.2476 [astro-ph.CO].
|
1385 |
+
[3] Supernova Search Team Collaboration, A. G. Riess et al., “Observational evidence from supernovae for an
|
1386 |
+
accelerating universe and a cosmological constant,” Astron. J. 116 (1998) 1009–1038,
|
1387 |
+
arXiv:astro-ph/9805201.
|
1388 |
+
[4] Supernova Cosmology Project Collaboration, S. Perlmutter et al., “Measurements of Ω and Λ from 42
|
1389 |
+
high redshift supernovae,” Astrophys. J. 517 (1999) 565–586, arXiv:astro-ph/9812133.
|
1390 |
+
[5] S. Weinberg, “The Cosmological Constant Problem,” Rev. Mod. Phys. 61 (1989) 1–23.
|
1391 |
+
[6] S. Appleby and E. V. Linder, “The Well-Tempered Cosmological Constant,” JCAP 07 (2018) 034,
|
1392 |
+
arXiv:1805.00470 [gr-qc].
|
1393 |
+
[7] M. Ishak, “Testing General Relativity in Cosmology,” Living Rev. Rel. 22 (2019) no. 1, 1,
|
1394 |
+
arXiv:1806.10122 [astro-ph.CO].
|
1395 |
+
[8] J. L. Bernal, L. Verde, and A. G. Riess, “The trouble with H0,” JCAP 10 (2016) 019,
|
1396 |
+
arXiv:1607.05617 [astro-ph.CO].
|
1397 |
+
[9] E. Di Valentino et al., “Snowmass2021 - Letter of interest cosmology intertwined II: The hubble constant
|
1398 |
+
tension,” Astropart. Phys. 131 (2021) 102605, arXiv:2008.11284 [astro-ph.CO].
|
1399 |
+
[10] E. Di Valentino, O. Mena, S. Pan, L. Visinelli, W. Yang, A. Melchiorri, D. F. Mota, A. G. Riess, and J. Silk,
|
1400 |
+
“In the realm of the Hubble tension—a review of solutions,” Class. Quant. Grav. 38 (2021) no. 15, 153001,
|
1401 |
+
arXiv:2103.01183 [astro-ph.CO].
|
1402 |
+
|
1403 |
+
16
|
1404 |
+
[11] A. G. Riess, S. Casertano, W. Yuan, L. M. Macri, and D. Scolnic, “Large Magellanic Cloud Cepheid
|
1405 |
+
Standards Provide a 1% Foundation for the Determination of the Hubble Constant and Stronger Evidence for
|
1406 |
+
Physics beyond ΛCDM,” Astrophys. J. 876 (2019) no. 1, 85, arXiv:1903.07603 [astro-ph.CO].
|
1407 |
+
[12] K. C. Wong et al., “H0LiCOW – XIII. A 2.4 per cent measurement of H0 from lensed quasars: 5.3σ tension
|
1408 |
+
between early- and late-Universe probes,” Mon. Not. Roy. Astron. Soc. 498 (2020) no. 1, 1420–1439,
|
1409 |
+
arXiv:1907.04869 [astro-ph.CO].
|
1410 |
+
[13] A. G. Riess et al., “A Comprehensive Measurement of the Local Value of the Hubble Constant with 1 km s−1
|
1411 |
+
Mpc−1 Uncertainty from the Hubble Space Telescope and the SH0ES Team,”
|
1412 |
+
Astrophys. J. Lett. 934 (2022) no. 1, L7, arXiv:2112.04510 [astro-ph.CO].
|
1413 |
+
[14] D. Brout et al., “The Pantheon+ Analysis: SuperCal-fragilistic Cross Calibration, Retrained SALT2
|
1414 |
+
Light-curve Model, and Calibration Systematic Uncertainty,” Astrophys. J. 938 (2022) no. 2, 111,
|
1415 |
+
arXiv:2112.03864 [astro-ph.CO].
|
1416 |
+
[15] D. Scolnic et al., “The Pantheon+ Analysis: The Full Data Set and Light-curve Release,”
|
1417 |
+
Astrophys. J. 938 (2022) no. 2, 113, arXiv:2112.03863 [astro-ph.CO].
|
1418 |
+
[16] E. Abdalla et al., “Cosmology intertwined: A review of the particle physics, astrophysics, and cosmology
|
1419 |
+
associated with the cosmological tensions and anomalies,” JHEAp 34 (2022) 49–211,
|
1420 |
+
arXiv:2203.06142 [astro-ph.CO].
|
1421 |
+
[17] E. Di Valentino et al., “Cosmology Intertwined III: fσ8 and S8,” Astropart. Phys. 131 (2021) 102604,
|
1422 |
+
arXiv:2008.11285 [astro-ph.CO].
|
1423 |
+
[18] S. Capozziello, M. Benetti, and A. D. A. M. Spallicci, “Addressing the cosmological H0 tension by the
|
1424 |
+
Heisenberg uncertainty,” Found. Phys. 50 (2020) no. 9, 893–899, arXiv:2007.00462 [gr-qc].
|
1425 |
+
[19] S. Capozziello and V. Faraoni,
|
1426 |
+
Beyond Einstein Gravity: A Survey of Gravitational Theories for Cosmology and Astrophysics. Springer,
|
1427 |
+
Dordrecht, 2011.
|
1428 |
+
[20] G. W. Horndeski, “Second-order scalar-tensor field equations in a four-dimensional space,”
|
1429 |
+
Int. J. Theor. Phys. 10 (1974) 363–384.
|
1430 |
+
[21] R. P. Woodard, “Avoiding dark energy with 1/r modifications of gravity,”
|
1431 |
+
Lect. Notes Phys. 720 (2007) 403–433, arXiv:astro-ph/0601672.
|
1432 |
+
[22] H. Motohashi and T. Suyama, “Third order equations of motion and the Ostrogradsky instability,”
|
1433 |
+
Phys. Rev. D 91 (2015) no. 8, 085009, arXiv:1411.3721 [physics.class-ph].
|
1434 |
+
[23] E. Pagani, G. Tecchiolli, and S. Zerbini, “On the Problem of Stability for Higher Order Derivatives:
|
1435 |
+
Lagrangian Systems,” Lett. Math. Phys. 14 (1987) 311.
|
1436 |
+
[24] M. Miranda, D. Vernieri, S. Capozziello, and V. Faraoni, “Generalized McVittie geometry in Horndeski
|
1437 |
+
gravity with matter,” Phys. Rev. D 105 (2022) no. 12, 124024, arXiv:2204.09693 [gr-qc].
|
1438 |
+
[25] M. Miranda, D. Vernieri, S. Capozziello, and V. Faraoni, “Fluid nature constrains Horndeski gravity,”
|
1439 |
+
arXiv:2209.02727 [gr-qc].
|
1440 |
+
[26] LIGO Scientific, Virgo Collaboration, B. P. Abbott et al., “GW170817: Observation of Gravitational
|
1441 |
+
Waves from a Binary Neutron Star Inspiral,” Phys. Rev. Lett. 119 (2017) no. 16, 161101,
|
1442 |
+
arXiv:1710.05832 [gr-qc].
|
1443 |
+
[27] A. Goldstein et al., “An Ordinary Short Gamma-Ray Burst with Extraordinary Implications: Fermi-GBM
|
1444 |
+
Detection of GRB 170817A,” Astrophys. J. Lett. 848 (2017) no. 2, L14, arXiv:1710.05446 [astro-ph.HE].
|
1445 |
+
[28] T. Kobayashi, M. Yamaguchi, and J. Yokoyama, “Generalized G-inflation: Inflation with the most general
|
1446 |
+
second-order field equations,” Prog. Theor. Phys. 126 (2011) 511–529, arXiv:1105.5723 [hep-th].
|
1447 |
+
[29] J. Gleyzes, D. Langlois, F. Piazza, and F. Vernizzi, “Essential Building Blocks of Dark Energy,”
|
1448 |
+
JCAP 08 (2013) 025, arXiv:1304.4840 [hep-th].
|
1449 |
+
[30] K. Koyama, “Cosmological Tests of Modified Gravity,” Rept. Prog. Phys. 79 (2016) no. 4, 046902,
|
1450 |
+
arXiv:1504.04623 [astro-ph.CO].
|
1451 |
+
[31] T. Kobayashi, “Horndeski theory and beyond: a review,” Rept. Prog. Phys. 82 (2019) no. 8, 086901,
|
1452 |
+
arXiv:1901.07183 [gr-qc].
|
1453 |
+
[32] S. Bahamonde, K. F. Dialektopoulos, C. Escamilla-Rivera, G. Farrugia, V. Gakis, M. Hendry, M. Hohmann,
|
1454 |
+
J. L. Said, J. Mifsud, and E. Di Valentino, “Teleparallel Gravity: From Theory to Cosmology,”
|
1455 |
+
arXiv:2106.13793 [gr-qc].
|
1456 |
+
[33] R. Aldrovandi and J. G. Pereira, Teleparallel Gravity: An Introduction. Springer, 2013.
|
1457 |
+
[34] Y.-F. Cai, S. Capozziello, M. De Laurentis, and E. N. Saridakis, “f(T) teleparallel gravity and cosmology,”
|
1458 |
+
Rept. Prog. Phys. 79 (2016) no. 10, 106901, arXiv:1511.07586 [gr-qc].
|
1459 |
+
[35] M. Krssak, R. J. van den Hoogen, J. G. Pereira, C. G. B¨ohmer, and A. A. Coley, “Teleparallel theories of
|
1460 |
+
gravity: illuminating a fully invariant approach,” Class. Quant. Grav. 36 (2019) no. 18, 183001,
|
1461 |
+
arXiv:1810.12932 [gr-qc].
|
1462 |
+
[36] D. Lovelock, “The Einstein tensor and its generalizations,” J. Math. Phys. 12 (1971) 498–501.
|
1463 |
+
[37] P. A. Gonzalez and Y. Vasquez, “Teleparallel Equivalent of Lovelock Gravity,”
|
1464 |
+
Phys. Rev. D 92 (2015) no. 12, 124023, arXiv:1508.01174 [hep-th].
|
1465 |
+
|
1466 |
+
17
|
1467 |
+
[38] S. Bahamonde, K. F. Dialektopoulos, and J. Levi Said, “Can Horndeski Theory be recast using Teleparallel
|
1468 |
+
Gravity?,” Phys. Rev. D 100 (2019) no. 6, 064018, arXiv:1904.10791 [gr-qc].
|
1469 |
+
[39] S. Capozziello, V. De Falco, and C. Ferrara, “Comparing equivalent gravities: common features and
|
1470 |
+
differences,” Eur. Phys. J. C 82 (2022) no. 10, 865, arXiv:2208.03011 [gr-qc].
|
1471 |
+
[40] R. Ferraro and F. Fiorini, “Modified teleparallel gravity: Inflation without inflaton,”
|
1472 |
+
Phys. Rev. D 75 (2007) 084031, arXiv:gr-qc/0610067.
|
1473 |
+
[41] R. Ferraro and F. Fiorini, “On Born-Infeld Gravity in Weitzenbock spacetime,”
|
1474 |
+
Phys. Rev. D 78 (2008) 124019, arXiv:0812.1981 [gr-qc].
|
1475 |
+
[42] G. R. Bengochea and R. Ferraro, “Dark torsion as the cosmic speed-up,” Phys. Rev. D 79 (2009) 124019,
|
1476 |
+
arXiv:0812.1205 [astro-ph].
|
1477 |
+
[43] E. V. Linder, “Einstein’s Other Gravity and the Acceleration of the Universe,”
|
1478 |
+
Phys. Rev. D 81 (2010) 127301, arXiv:1005.3039 [astro-ph.CO]. [Erratum: Phys.Rev.D 82, 109902 (2010)].
|
1479 |
+
[44] S.-H. Chen, J. B. Dent, S. Dutta, and E. N. Saridakis, “Cosmological perturbations in f(T) gravity,”
|
1480 |
+
Phys. Rev. D 83 (2011) 023508, arXiv:1008.1250 [astro-ph.CO].
|
1481 |
+
[45] S. Bahamonde, K. Flathmann, and C. Pfeifer, “Photon sphere and perihelion shift in weak f(T ) gravity,”
|
1482 |
+
Phys. Rev. D 100 (2019) no. 8, 084064, arXiv:1907.10858 [gr-qc].
|
1483 |
+
[46] A. Rezaei Akbarieh and Y. Izadi, “Tachyon Inflation in Teleparallel Gravity,”
|
1484 |
+
Eur. Phys. J. C 79 (2019) no. 4, 366, arXiv:1812.06649 [gr-qc].
|
1485 |
+
[47] S. Bahamonde, C. G. B¨ohmer, and M. Wright, “Modified teleparallel theories of gravity,”
|
1486 |
+
Phys. Rev. D 92 (2015) no. 10, 104042, arXiv:1508.05120 [gr-qc].
|
1487 |
+
[48] S. Bahamonde and S. Capozziello, “Noether Symmetry Approach in f(T, B) teleparallel cosmology,”
|
1488 |
+
Eur. Phys. J. C 77 (2017) no. 2, 107, arXiv:1612.01299 [gr-qc].
|
1489 |
+
[49] A. Paliathanasis, “de Sitter and Scaling solutions in a higher-order modified teleparallel theory,”
|
1490 |
+
JCAP 08 (2017) 027, arXiv:1706.02662 [gr-qc].
|
1491 |
+
[50] G. Farrugia, J. Levi Said, V. Gakis, and E. N. Saridakis, “Gravitational Waves in Modified Teleparallel
|
1492 |
+
Theories,” Phys. Rev. D 97 (2018) no. 12, 124064, arXiv:1804.07365 [gr-qc].
|
1493 |
+
[51] S. Bahamonde, M. Zubair, and G. Abbas, “Thermodynamics and cosmological reconstruction in f(T, B)
|
1494 |
+
gravity,” Phys. Dark Univ. 19 (2018) 78–90, arXiv:1609.08373 [gr-qc].
|
1495 |
+
[52] M. Wright, “Conformal transformations in modified teleparallel theories of gravity revisited,”
|
1496 |
+
Phys. Rev. D 93 (2016) no. 10, 103002, arXiv:1602.05764 [gr-qc].
|
1497 |
+
[53] G. Farrugia, J. Levi Said, and A. Finch, “Gravitoelectromagnetism, Solar System Tests, and Weak-Field
|
1498 |
+
Solutions in f(T, B) Gravity with Observational Constraints,” Universe 6 (2020) no. 2, 34,
|
1499 |
+
arXiv:2002.08183 [gr-qc].
|
1500 |
+
[54] S. Capozziello, M. Capriolo, and L. Caso, “Weak field limit and gravitational waves in f(T, B) teleparallel
|
1501 |
+
gravity,” Eur. Phys. J. C 80 (2020) no. 2, 156, arXiv:1912.12469 [gr-qc].
|
1502 |
+
[55] C. Escamilla-Rivera and J. Levi Said, “Cosmological viable models in f(T, B) theory as solutions to the H0
|
1503 |
+
tension,” Class. Quant. Grav. 37 (2020) no. 16, 165002, arXiv:1909.10328 [gr-qc].
|
1504 |
+
[56] S. Capozziello, “Curvature quintessence,” Int. J. Mod. Phys. D 11 (2002) 483–492, arXiv:gr-qc/0201033.
|
1505 |
+
[57] T. P. Sotiriou and V. Faraoni, “f(R) Theories Of Gravity,” Rev. Mod. Phys. 82 (2010) 451–497,
|
1506 |
+
arXiv:0805.1726 [gr-qc].
|
1507 |
+
[58] V. Faraoni, “f(R) gravity: Successes and challenges,” in 18th SIGRAV Conference. 10, 2008.
|
1508 |
+
arXiv:0810.2602 [gr-qc].
|
1509 |
+
[59] S. Capozziello and M. De Laurentis, “Extended Theories of Gravity,” Phys. Rept. 509 (2011) 167–321,
|
1510 |
+
arXiv:1108.6266 [gr-qc].
|
1511 |
+
[60] S. Nojiri and S. D. Odintsov, “Introduction to modified gravity and gravitational alternative for dark energy,”
|
1512 |
+
eConf C0602061 (2006) 06, arXiv:hep-th/0601213.
|
1513 |
+
[61] S. Nojiri and S. D. Odintsov, “Unified cosmic history in modified gravity: from F(R) theory to Lorentz
|
1514 |
+
non-invariant models,” Phys. Rept. 505 (2011) 59–144, arXiv:1011.0544 [gr-qc].
|
1515 |
+
[62] S. Nojiri, S. D. Odintsov, and V. K. Oikonomou, “Modified Gravity Theories on a Nutshell: Inflation, Bounce
|
1516 |
+
and Late-time Evolution,” Phys. Rept. 692 (2017) 1–104, arXiv:1705.11098 [gr-qc].
|
1517 |
+
[63] M. Hohmann, “Scalar-torsion theories of gravity I: general formalism and conformal transformations,”
|
1518 |
+
Phys. Rev. D 98 (2018) no. 6, 064002, arXiv:1801.06528 [gr-qc].
|
1519 |
+
[64] M. Hohmann and C. Pfeifer, “Scalar-torsion theories of gravity II: L(T, X, Y, φ) theory,”
|
1520 |
+
Phys. Rev. D 98 (2018) no. 6, 064003, arXiv:1801.06536 [gr-qc].
|
1521 |
+
[65] M. Hohmann, “Scalar-torsion theories of gravity III: analogue of scalar-tensor gravity and conformal
|
1522 |
+
invariants,” Phys. Rev. D 98 (2018) no. 6, 064004, arXiv:1801.06531 [gr-qc].
|
1523 |
+
[66] S. Bahamonde, K. F. Dialektopoulos, V. Gakis, and J. Levi Said, “Reviving Horndeski theory using
|
1524 |
+
teleparallel gravity after GW170817,” Phys. Rev. D 101 (2020) no. 8, 084060, arXiv:1907.10057 [gr-qc].
|
1525 |
+
[67] S. Bahamonde, M. Caruana, K. F. Dialektopoulos, V. Gakis, M. Hohmann, J. Levi Said, E. N. Saridakis, and
|
1526 |
+
J. Sultana, “Gravitational-wave propagation and polarizations in the teleparallel analog of Horndeski gravity,”
|
1527 |
+
Phys. Rev. D 104 (2021) no. 8, 084082, arXiv:2105.13243 [gr-qc].
|
1528 |
+
|
1529 |
+
18
|
1530 |
+
[68] J. M. Ezquiaga and M. Zumalac´arregui, “Dark Energy After GW170817: Dead Ends and the Road Ahead,”
|
1531 |
+
Phys. Rev. Lett. 119 (2017) no. 25, 251304, arXiv:1710.05901 [astro-ph.CO].
|
1532 |
+
[69] S. Bahamonde, K. F. Dialektopoulos, M. Hohmann, and J. Levi Said, “Post-Newtonian limit of Teleparallel
|
1533 |
+
Horndeski gravity,” Class. Quant. Grav. 38 (2020) no. 2, 025006, arXiv:2003.11554 [gr-qc].
|
1534 |
+
[70] R. C. Bernardo, J. L. Said, M. Caruana, and S. Appleby, “Well-tempered teleparallel Horndeski cosmology: a
|
1535 |
+
teleparallel variation to the cosmological constant problem,” JCAP 10 (2021) 078,
|
1536 |
+
arXiv:2107.08762 [gr-qc].
|
1537 |
+
[71] R. C. Bernardo, J. L. Said, M. Caruana, and S. Appleby, “Well-tempered Minkowski solutions in teleparallel
|
1538 |
+
Horndeski theory,” Class. Quant. Grav. 39 (2022) no. 1, 015013, arXiv:2108.02500 [gr-qc].
|
1539 |
+
[72] S. Capozziello, M. De Laurentis, and K. F. Dialektopoulos, “Noether symmetries in Gauss–Bonnet-teleparallel
|
1540 |
+
cosmology,” Eur. Phys. J. C 76 (2016) no. 11, 629, arXiv:1609.09289 [gr-qc].
|
1541 |
+
[73] S. Capozziello, K. F. Dialektopoulos, and S. V. Sushkov, “Classification of the Horndeski cosmologies via
|
1542 |
+
Noether Symmetries,” Eur. Phys. J. C 78 (2018) no. 6, 447, arXiv:1803.01429 [gr-qc].
|
1543 |
+
[74] K. F. Dialektopoulos and S. Capozziello, “Noether Symmetries as a geometric criterion to select theories of
|
1544 |
+
gravity,” Int. J. Geom. Meth. Mod. Phys. 15 (2018) no. supp01, 1840007, arXiv:1808.03484 [gr-qc].
|
1545 |
+
[75] K. F. Dialektopoulos, J. L. Said, and Z. Oikonomopoulou, “Classification of teleparallel Horndeski cosmology
|
1546 |
+
via Noether symmetries,” Eur. Phys. J. C 82 (2022) no. 3, 259, arXiv:2112.15045 [gr-qc].
|
1547 |
+
[76] F. Bajardi and S. Capozziello, Noether Symmetries in Theories of Gravity. Cambridge Monographs on
|
1548 |
+
Mathematical Physics. Cambridge University Press, 11, 2022.
|
1549 |
+
[77] F. W. Hehl, P. Von Der Heyde, G. D. Kerlick, and J. M. Nester, “General Relativity with Spin and Torsion:
|
1550 |
+
Foundations and Prospects,” Rev. Mod. Phys. 48 (1976) 393–416.
|
1551 |
+
[78] M. Krˇsˇs´ak and E. N. Saridakis, “The covariant formulation of f(T) gravity,”
|
1552 |
+
Class. Quant. Grav. 33 (2016) no. 11, 115009, arXiv:1510.08432 [gr-qc].
|
1553 |
+
[79] R. Weitzenb¨ock, Invariantentheorie. P. Noordhoff, Groningen, 1923.
|
1554 |
+
[80] R. Aldrovandi, P. B. Barros, and J. G. Pereira, “Spin and anholonomy in general relativity,”
|
1555 |
+
arXiv:gr-qc/0402022.
|
1556 |
+
[81] K. Hayashi and T. Shirafuji, “New General Relativity,” Phys. Rev. D 19 (1979) 3524–3553. [Addendum:
|
1557 |
+
Phys.Rev.D 24, 3312–3314 (1982)].
|
1558 |
+
[82] S. Capozziello, G. Lambiase, and C. Stornaiolo, “Geometric classification of the torsion tensor in space-time,”
|
1559 |
+
Annalen Phys. 10 (2001) 713–727, arXiv:gr-qc/0101038.
|
1560 |
+
[83] S. Bahamonde, C. G. B¨ohmer, and M. Krˇsˇs´ak, “New classes of modified teleparallel gravity models,”
|
1561 |
+
Phys. Lett. B 775 (2017) 37–43, arXiv:1706.04920 [gr-qc].
|
1562 |
+
[84] S. Nesseris, S. Basilakos, E. N. Saridakis, and L. Perivolaropoulos, “Viable f(T ) models are practically
|
1563 |
+
indistinguishable from ΛCDM,” Phys. Rev. D 88 (2013) 103010, arXiv:1308.6142 [astro-ph.CO].
|
1564 |
+
[85] T. Koivisto, M. Hohmann, and L. Marzola, “Axiomatic derivation of coincident general relativity and its
|
1565 |
+
premetric extension,” Phys. Rev. D 103 (2021) no. 6, 064041, arXiv:1909.10415 [gr-qc].
|
1566 |
+
[86] F. W. Hehl, J. D. McCrea, E. W. Mielke, and Y. Ne’eman, “Metric affine gauge theory of gravity: Field
|
1567 |
+
equations, Noether identities, world spinors, and breaking of dilation invariance,”
|
1568 |
+
Phys. Rept. 258 (1995) 1–171, arXiv:gr-qc/9402012.
|
1569 |
+
[87] J. Beltr´an Jim´enez, L. Heisenberg, and T. S. Koivisto, “The Geometrical Trinity of Gravity,”
|
1570 |
+
Universe 5 (2019) no. 7, 173, arXiv:1903.06830 [hep-th].
|
1571 |
+
[88] J. Beltr´an Jim´enez, L. Heisenberg, and T. Koivisto, “The coupling of matter and spacetime geometry,”
|
1572 |
+
Class. Quant. Grav. 37 (2020) no. 19, 195013, arXiv:2004.04606 [hep-th].
|
1573 |
+
[89] S. Bahamonde, V. Gakis, S. Kiorpelidi, T. Koivisto, J. Levi Said, and E. N. Saridakis, “Cosmological
|
1574 |
+
perturbations in modified teleparallel gravity models: Boundary term extension,”
|
1575 |
+
Eur. Phys. J. C 81 (2021) no. 1, 53, arXiv:2009.02168 [gr-qc].
|
1576 |
+
[90] H. Abedi and S. Capozziello, “Gravitational waves in modified teleparallel theories of gravity,”
|
1577 |
+
Eur. Phys. J. C 78 (2018) no. 6, 474, arXiv:1712.05933 [gr-qc].
|
1578 |
+
[91] H. Abedi, S. Capozziello, R. D’Agostino, and O. Luongo, “Effective gravitational coupling in modified
|
1579 |
+
teleparallel theories,” Phys. Rev. D 97 (2018) no. 8, 084008, arXiv:1803.07171 [gr-qc].
|
1580 |
+
[92] Y.-P. Wu and C.-Q. Geng, “Matter Density Perturbations in Modified Teleparallel Theories,”
|
1581 |
+
JHEP 11 (2012) 142, arXiv:1211.1778 [gr-qc].
|
1582 |
+
[93] S.-H. Chen, J. B. Dent, S. Dutta, and E. N. Saridakis, “Cosmological perturbations in f(T) gravity,”
|
1583 |
+
Phys. Rev. D 83 (2011) 023508, arXiv:1008.1250 [astro-ph.CO].
|
1584 |
+
[94] M. Bruni, S. Matarrese, S. Mollerach, and S. Sonego, “Perturbations of space-time: Gauge transformations
|
1585 |
+
and gauge invariance at second order and beyond,” Class. Quant. Grav. 14 (1997) 2585–2606,
|
1586 |
+
arXiv:gr-qc/9609040.
|
1587 |
+
[95] K. A. Malik and D. Wands, “Cosmological perturbations,” Phys. Rept. 475 (2009) 1–51,
|
1588 |
+
arXiv:0809.4944 [astro-ph].
|
1589 |
+
[96] K. Nakamura, “Gauge-invariant formulation of the second-order cosmological perturbations,”
|
1590 |
+
Phys. Rev. D 74 (2006) 101301, arXiv:gr-qc/0605107.
|
1591 |
+
|
1592 |
+
19
|
1593 |
+
[97] M. Hohmann, “General cosmological perturbations in teleparallel gravity,”
|
1594 |
+
Eur. Phys. J. Plus 136 (2021) no. 1, 65, arXiv:2011.02491 [gr-qc].
|
1595 |
+
[98] K. Izumi and Y. C. Ong, “Cosmological Perturbation in f(T) Gravity Revisited,” JCAP 06 (2013) 029,
|
1596 |
+
arXiv:1212.5774 [gr-qc].
|
1597 |
+
[99] A. De Felice and S. Tsujikawa, “f(R) theories,” Living Rev. Rel. 13 (2010) 3, arXiv:1002.4928 [gr-qc].
|
1598 |
+
[100] M. Gonzalez-Espinoza, G. Otalora, and J. Saavedra, “Stability of scalar perturbations in scalar-torsion f(T,φ)
|
1599 |
+
gravity theories in the presence of a matter fluid,” JCAP 10 (2021) 007, arXiv:2101.09123 [gr-qc].
|
1600 |
+
[101] T. Kobayashi, “Horndeski theory and beyond: a review,” Rept. Prog. Phys. 82 (2019) no. 8, 086901,
|
1601 |
+
arXiv:1901.07183 [gr-qc].
|
1602 |
+
[102] S. Bahamonde, M. Caruana, K. F. Dialektopoulos, V. Gakis, M. Hohmann, J. Levi Said, E. N. Saridakis, and
|
1603 |
+
J. Sultana, “Gravitational-wave propagation and polarizations in the teleparallel analog of Horndeski gravity,”
|
1604 |
+
Phys. Rev. D 104 (2021) no. 8, 084082, arXiv:2105.13243 [gr-qc].
|
1605 |
+
[103] LIGO Scientific, Virgo Collaboration, B. P. Abbott et al., “GW170817: Observation of Gravitational
|
1606 |
+
Waves from a Binary Neutron Star Inspiral,” Phys. Rev. Lett. 119 (2017) no. 16, 161101,
|
1607 |
+
arXiv:1710.05832 [gr-qc].
|
1608 |
+
[104] A. De Felice and S. Tsujikawa, “Conditions for the cosmological viability of the most general scalar-tensor
|
1609 |
+
theories and their applications to extended Galileon dark energy models,” JCAP 02 (2012) 007,
|
1610 |
+
arXiv:1110.3878 [gr-qc].
|
1611 |
+
[105] T. Kobayashi, M. Yamaguchi, and J. Yokoyama, “Generalized G-inflation: Inflation with the most general
|
1612 |
+
second-order field equations,” Prog. Theor. Phys. 126 (2011) 511–529, arXiv:1105.5723 [hep-th].
|
1613 |
+
[106] X. Gao and D. A. Steer, “Inflation and primordial non-Gaussianities of ’generalized Galileons’,”
|
1614 |
+
JCAP 12 (2011) 019, arXiv:1107.2642 [astro-ph.CO].
|
1615 |
+
[107] C. Brans and R. H. Dicke, “Mach’s principle and a relativistic theory of gravitation,”
|
1616 |
+
Phys. Rev. 124 (1961) 925–935.
|
1617 |
+
[108] A. De Felice and S. Tsujikawa, “Generalized Brans-Dicke theories,” JCAP 07 (2010) 024,
|
1618 |
+
arXiv:1005.0868 [astro-ph.CO].
|
1619 |
+
[109] M. Hohmann, L. J¨arv, and U. Ualikhanova, “Covariant formulation of scalar-torsion gravity,”
|
1620 |
+
Phys. Rev. D 97 (2018) no. 10, 104011, arXiv:1801.05786 [gr-qc].
|
1621 |
+
[110] J. Gleyzes, D. Langlois, F. Piazza, and F. Vernizzi, “Essential Building Blocks of Dark Energy,”
|
1622 |
+
JCAP 08 (2013) 025, arXiv:1304.4840 [hep-th].
|
1623 |
+
[111] L. A. Gergely and S. Tsujikawa, “Effective field theory of modified gravity with two scalar fields: dark energy
|
1624 |
+
and dark matter,” Phys. Rev. D 89 (2014) no. 6, 064059, arXiv:1402.0553 [hep-th].
|
1625 |
+
[112] S. Capozziello and A. De Felice, “f(R) cosmology by Noether’s symmetry,” JCAP 08 (2008) 016,
|
1626 |
+
arXiv:0804.2163 [gr-qc].
|
1627 |
+
[113] H. ¨Ozer and O. Delice, “Gravitational waves in Brans–Dicke theory with a cosmological constant,”
|
1628 |
+
Eur. Phys. J. C 81 (2021) no. 4, 326, arXiv:2101.03594 [gr-qc].
|
1629 |
+
[114] P. Teyssandier and P. Tourrenc, “The Cauchy problem for the R+R**2 theories of gravity without torsion,”
|
1630 |
+
J. Math. Phys. 24 (1983) 2793.
|
1631 |
+
|
ENE3T4oBgHgl3EQfVQoB/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
F9AzT4oBgHgl3EQfi_2P/content/2301.01509v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:07e21ad1e3749d72d14f3450de96a1987caf8af15e4219a83685673e191b2892
|
3 |
+
size 5782055
|
HNE3T4oBgHgl3EQfuAs1/content/2301.04680v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:091943ee86890723cd377fd9dcfe5cc211fb8f8605a487252dd349ab8b689463
|
3 |
+
size 2551024
|
HNE3T4oBgHgl3EQfuAs1/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bc29f16265a200e6a62f4102eb36b664c15474d707639c7f1268fed2429017d4
|
3 |
+
size 3604525
|
HNE3T4oBgHgl3EQfuAs1/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:93934a7777fba30bbfa76fcff6cbba9bb2f9b2637966255970ea35cabcb52cd6
|
3 |
+
size 142022
|
HtFIT4oBgHgl3EQfXys9/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:05b96c8e6e4d08672ea566113f2a42c8e29a820cf1dbd734b8aa9b74d4e0a6c7
|
3 |
+
size 3670061
|
INFJT4oBgHgl3EQfFiwP/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:96bd4679b91c1714ae1cb16068467d7e61660d05b9931faea78b54487f274994
|
3 |
+
size 9961517
|
IdAzT4oBgHgl3EQfU_z6/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2a16d913678fda4af25ab7494a805a075e93a86ba7157da90df40c16f42443ba
|
3 |
+
size 4456493
|
JdFAT4oBgHgl3EQfvB7v/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1e657eb74ffe2cdb9f42e8ef63ff0b4a324edb924adbd6ab1dcf545040c70ec8
|
3 |
+
size 2228269
|
JtAzT4oBgHgl3EQfj_0_/content/tmp_files/2301.01524v1.pdf.txt
ADDED
@@ -0,0 +1,911 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Dynamic Behavior of a Railway Track Under a Moving Wheel
|
2 |
+
Load Modelled as a Sinusoidal Pulse
|
3 |
+
Mohammed Touati1, Nouzha Lamdouar1 and Chakir Tajani2,∗
|
4 |
+
1Civil Department, Mohammadia School of Engineers -Mohammed V University - Morocco
|
5 | |
6 |
+
2Department of Mathematics, Polydisciplinary faculty of Larache,
|
7 |
+
Abdelmalek Essadi University, Morocco
|
8 |
+
chakir [email protected]
|
9 |
+
Abstract
|
10 |
+
The aim of this paper is to evaluate the train/track induced loads on the substructure
|
11 |
+
by modelling the wheel, at each instant, as a moving sinusoidal pulse applied in a very short
|
12 |
+
period of time. This assumption has the advantage of being more realistic as it reduces the
|
13 |
+
impact of time on the load definition. To that end, mass, stiffness, and dumping matrices
|
14 |
+
of an elementary section of track will be determined. As a result, the equations of motion
|
15 |
+
of a section of track subjected to a sinusoidal pulse and a rectangular pulse respectively is
|
16 |
+
concluded. Two numerical methods of resolution of that equation, depending on the nature
|
17 |
+
of the dumping matrix, will be presented. The computation results will be compared in
|
18 |
+
order to conclude about the relevance of that load model. This approach is used in order to
|
19 |
+
assess the nature and the value of the loads received by the substructure.
|
20 |
+
2020 MSC: Primary 74S05, 37M05, 74-10 Secondary 37N30
|
21 |
+
Key Words and Phrases: Dynamic properties, Finite elements modelling, Railway
|
22 |
+
track dynamics, Sinusoidal pulse load.
|
23 |
+
1
|
24 |
+
Introduction
|
25 |
+
Various theoretical and experimental researches have been performed in order to assess train/track
|
26 |
+
induced loads on the substructure. Mohammed Touati and al. [1] determined the loads induced
|
27 |
+
by a non-linear 3D multi-body modelled train on the track with taking into account wheel/rail
|
28 |
+
contact properties and track irregularities. Yang Xinwen and al. [2] concluded, through a vehicle-
|
29 |
+
track-subgrade coupling dynamic theory and finite element method, about the train/track in-
|
30 |
+
duced loads on each layer of the substructure. As an experimental study, Al Shaer and al. [3]
|
31 |
+
presented the dynamic behavior of a portion of ballasted railway track subjected to cyclic loads
|
32 |
+
in substitution of a moving wheelset. In conclusion, the dynamics behavior of the substructure
|
33 |
+
is widely studied in the literature [4-8] based on the train/track coupling model.
|
34 |
+
Actually, even if modelling a wheel load as a rectangular pulse is a common assumption, real
|
35 |
+
measurements don’t show the same shape. In fact, ONCF (Moroccan railway network manager)
|
36 |
+
has many tools that record wheel pulse like GOTCHA. This system shows that the shape of
|
37 |
+
the load has never been rectangular, but it’s more likely compared to a sinusoidal pulse. Then,
|
38 |
+
this paper deals with evaluating train/track induced loads on the substructure by proposing a
|
39 |
+
new approach when it comes to modelling the shape of the wheel impact. Indeed, it’s common
|
40 |
+
to consider a moving load as a rectangular impulse applied on the nodes of a mesh structure in
|
41 |
+
each period of time depending on signal sampling. This paper shows that assuming the wheel
|
42 |
+
1
|
43 |
+
arXiv:2301.01524v1 [math.NA] 4 Jan 2023
|
44 |
+
|
45 |
+
Figure 1:
|
46 |
+
Elementary track modelling
|
47 |
+
load as a sinusoidal pulse may reduce the impact of the period of time of its application and,
|
48 |
+
consequently, minimize the loads induced on the substructure oversized by the common assump-
|
49 |
+
tion. In that matter, a finite element model of the track will be presented and the numerical
|
50 |
+
results will be compared.
|
51 |
+
2
|
52 |
+
Track elementary section modeling
|
53 |
+
2.1
|
54 |
+
Determination of mass, stiffness et dumping matrices
|
55 |
+
Let’s assume a portion of ballasted track composed of two elements of rail considered as a contin-
|
56 |
+
uous Euler-Bernoulli beam, fixed to two sleepers by a couples of springs/dampers representing
|
57 |
+
the railpads. The ballast is modelled as a couples of springs/dampers under each sleeper (Figure
|
58 |
+
1).
|
59 |
+
The displacement vector is written as:
|
60 |
+
U = [u1, θ1, u2, θ2, u3, θ3, uT1, uT2]
|
61 |
+
The effective mass and the stiffness matrices of an element of rail [9], are given by:
|
62 |
+
Mr = (ρrArL/420)
|
63 |
+
�
|
64 |
+
�������
|
65 |
+
156
|
66 |
+
22L
|
67 |
+
54
|
68 |
+
−13L
|
69 |
+
0
|
70 |
+
0
|
71 |
+
22L
|
72 |
+
4L2
|
73 |
+
13L
|
74 |
+
−3L2
|
75 |
+
0
|
76 |
+
0
|
77 |
+
54
|
78 |
+
13L
|
79 |
+
312
|
80 |
+
0
|
81 |
+
54
|
82 |
+
−13L
|
83 |
+
−13L
|
84 |
+
−3L2
|
85 |
+
0
|
86 |
+
8L2
|
87 |
+
13L
|
88 |
+
−3L2
|
89 |
+
0
|
90 |
+
0
|
91 |
+
54
|
92 |
+
13L
|
93 |
+
156
|
94 |
+
−22L
|
95 |
+
0
|
96 |
+
0
|
97 |
+
−13L
|
98 |
+
−3L2
|
99 |
+
−22L
|
100 |
+
4L2
|
101 |
+
�
|
102 |
+
�������
|
103 |
+
Kr =
|
104 |
+
�
|
105 |
+
ErIr/L3�
|
106 |
+
�
|
107 |
+
�������
|
108 |
+
12
|
109 |
+
6L
|
110 |
+
−12
|
111 |
+
6L
|
112 |
+
0
|
113 |
+
0
|
114 |
+
6L
|
115 |
+
4L2
|
116 |
+
−6L
|
117 |
+
2L2
|
118 |
+
0
|
119 |
+
0
|
120 |
+
−12
|
121 |
+
−6L
|
122 |
+
24
|
123 |
+
0
|
124 |
+
−12
|
125 |
+
6L
|
126 |
+
6L
|
127 |
+
2L2
|
128 |
+
0
|
129 |
+
8L2
|
130 |
+
−6L
|
131 |
+
2L2
|
132 |
+
0
|
133 |
+
0
|
134 |
+
−12
|
135 |
+
−6L
|
136 |
+
12
|
137 |
+
−6L
|
138 |
+
0
|
139 |
+
0
|
140 |
+
6L
|
141 |
+
2L2
|
142 |
+
−6L
|
143 |
+
4L2
|
144 |
+
�
|
145 |
+
�������
|
146 |
+
2
|
147 |
+
|
148 |
+
element1
|
149 |
+
blement 2
|
150 |
+
ua
|
151 |
+
2
|
152 |
+
kn2
|
153 |
+
c
|
154 |
+
"
|
155 |
+
ur2
|
156 |
+
Masse (m-)
|
157 |
+
Masse (m-)where ρr is the density of the rail, Ar is the surface of the rail section, Er is Young modulus,
|
158 |
+
and Ir is the rail moment of inertia. The dumping matrix of the rail is obtained as a linear
|
159 |
+
combination of mass and stiffness matrices by assuming that the displacements u1 and u3 are
|
160 |
+
completely dumped by the effect of railpads.
|
161 |
+
Therefore, the dumping matrix is written as:
|
162 |
+
C∗
|
163 |
+
r = a0 · M∗
|
164 |
+
r + a1 · K∗
|
165 |
+
r
|
166 |
+
where,
|
167 |
+
M∗
|
168 |
+
r = (ρrArL/420)
|
169 |
+
�
|
170 |
+
���
|
171 |
+
4L2
|
172 |
+
13L
|
173 |
+
−3L2
|
174 |
+
0
|
175 |
+
13L
|
176 |
+
312
|
177 |
+
0
|
178 |
+
−13L
|
179 |
+
−3L2
|
180 |
+
0
|
181 |
+
8L2
|
182 |
+
−3L2
|
183 |
+
0
|
184 |
+
13L
|
185 |
+
−3L2
|
186 |
+
4L2
|
187 |
+
�
|
188 |
+
���
|
189 |
+
K∗
|
190 |
+
r =
|
191 |
+
�
|
192 |
+
ErIr/L3�
|
193 |
+
�
|
194 |
+
���
|
195 |
+
4L2
|
196 |
+
−6L
|
197 |
+
2L2
|
198 |
+
0
|
199 |
+
−6L
|
200 |
+
24
|
201 |
+
0
|
202 |
+
6L
|
203 |
+
2L2
|
204 |
+
0
|
205 |
+
8L2
|
206 |
+
2L2
|
207 |
+
0
|
208 |
+
6L
|
209 |
+
2L2
|
210 |
+
4L2
|
211 |
+
�
|
212 |
+
���
|
213 |
+
a0 and a1 are concluded from the equation:
|
214 |
+
� a0
|
215 |
+
a1
|
216 |
+
�
|
217 |
+
=
|
218 |
+
�
|
219 |
+
2ω1ω2/
|
220 |
+
�
|
221 |
+
ω2
|
222 |
+
2 − ω2
|
223 |
+
1
|
224 |
+
�� �
|
225 |
+
ω2
|
226 |
+
−ω1
|
227 |
+
−1/ω2
|
228 |
+
1/ω1
|
229 |
+
� � ζ1
|
230 |
+
ζ2
|
231 |
+
�
|
232 |
+
where ωi2, (i = 1, 2) are the eigenvalues associated to the vibration of the rail described by
|
233 |
+
the matrices Mr∗ and Kr∗, and ζi, (i = 1, 2) are the dumping ratios according to the first and
|
234 |
+
second modes.
|
235 |
+
In one hand, the equation of motion of the rail is written as:
|
236 |
+
Mr ¨U ∗ + Cr ˙U ∗ + KrU ∗ = F
|
237 |
+
(1)
|
238 |
+
where Cr is the transformation of the matrix C∗
|
239 |
+
r in the base U ∗, and U ∗ is defined by:
|
240 |
+
U ∗ = [u1, θ1, u2, θ2, u3, θ3]
|
241 |
+
F is given by:
|
242 |
+
F =
|
243 |
+
�
|
244 |
+
�������
|
245 |
+
−ks (u1 − uT1) − cs ( ˙u1 − ˙uT1)
|
246 |
+
0
|
247 |
+
0
|
248 |
+
0
|
249 |
+
−ks (u3 − uT3) − cs ( ˙u3 − ˙uT3)
|
250 |
+
0
|
251 |
+
�
|
252 |
+
�������
|
253 |
+
In the other hand, the equations of motion of the sleepers are written as:
|
254 |
+
� mT ¨uT1 = ks (u1 − uT1) + cs ( ˙u1 − ˙uT1) − kbuT1 − cb ˙uT1
|
255 |
+
mT ¨uT2 = ks (u3 − uT2) + cs ( ˙u3 − ˙uT2) − kbuT2 − cb ˙uT2
|
256 |
+
(2)
|
257 |
+
From (1) and (2), we may conclude about the equation of motion of the track elementary
|
258 |
+
section as it’s modelled. It’s written as:
|
259 |
+
M ¨U + C ˙U + KU = 0
|
260 |
+
where M, C and K are the mass, dumping, and the stiffness of the track elementary section
|
261 |
+
respectively.
|
262 |
+
3
|
263 |
+
|
264 |
+
Symbol
|
265 |
+
Quantity
|
266 |
+
Value
|
267 |
+
ρr
|
268 |
+
Rail density (kg/m3)
|
269 |
+
7850
|
270 |
+
Ar
|
271 |
+
Rail section surface (cm²)
|
272 |
+
76.70
|
273 |
+
Er
|
274 |
+
Young modulus of the rail (GPa)
|
275 |
+
210
|
276 |
+
Ir
|
277 |
+
Rail moment of inertia (cm4)
|
278 |
+
3038.6
|
279 |
+
mT
|
280 |
+
Sleeper mass (kg)
|
281 |
+
90.84
|
282 |
+
ks
|
283 |
+
Railpad stiffness (MN/m)
|
284 |
+
90
|
285 |
+
cs
|
286 |
+
Railpad damping (kN.s/m)
|
287 |
+
30
|
288 |
+
kb
|
289 |
+
Ballast stiffness (MN/m)
|
290 |
+
25.5
|
291 |
+
cb
|
292 |
+
Ballast damping (kN.s/m)
|
293 |
+
40
|
294 |
+
ζ
|
295 |
+
Rail dumping ratio
|
296 |
+
5%
|
297 |
+
Table 1: Track properties
|
298 |
+
2.2
|
299 |
+
Numerical application
|
300 |
+
Let’s assume a track elementary section characterized by the data given in table 1 (we can refer
|
301 |
+
to ([10], [11], [12]).
|
302 |
+
The figure 2 illustrates the evolution of natural frequencies according to vibration modes. It
|
303 |
+
shows that:
|
304 |
+
• The frequencies of the 1st and 2nd modes correspond to a movement in phase between rail
|
305 |
+
and sleepers. It’s equal to 81.62 Hz;
|
306 |
+
• The frequency of the 3rd mode corresponds to a movement in opposition of phase between
|
307 |
+
rail and sleepers. It’s equal to 381.1 Hz.
|
308 |
+
3
|
309 |
+
Track response to a rectangular and a sinusoidal pulses
|
310 |
+
3.1
|
311 |
+
Description of the studied track
|
312 |
+
Let’s assume a section of track composed of N track elementary sections subjected to an external
|
313 |
+
load F as it’s shown in figure 3.
|
314 |
+
The number of degrees of freedom is given by:
|
315 |
+
Ndof = 8N − 3(N − 1)
|
316 |
+
The displacement vector is written as:
|
317 |
+
U =
|
318 |
+
�
|
319 |
+
���
|
320 |
+
...
|
321 |
+
uj,k
|
322 |
+
...
|
323 |
+
�
|
324 |
+
���
|
325 |
+
where,
|
326 |
+
� uj,k = u∗
|
327 |
+
j,k
|
328 |
+
where
|
329 |
+
k ∈ [1, 8]
|
330 |
+
if
|
331 |
+
j = 1
|
332 |
+
uj,k = u∗
|
333 |
+
j,k
|
334 |
+
where
|
335 |
+
k ∈ [3, 4, 5, 6, 8]
|
336 |
+
if
|
337 |
+
j ̸= 1
|
338 |
+
and,
|
339 |
+
U ∗
|
340 |
+
j = [uj,1, θj,1, uj,2, θj,2, uj,3, θj,3, uj,T1, uj,T2]
|
341 |
+
4
|
342 |
+
|
343 |
+
Figure 2:
|
344 |
+
Natural frequencies of an elementary track section
|
345 |
+
Figure 3:
|
346 |
+
Track section modelling
|
347 |
+
5
|
348 |
+
|
349 |
+
4.5
|
350 |
+
X104
|
351 |
+
3.5
|
352 |
+
(ZH)
|
353 |
+
3
|
354 |
+
2.5
|
355 |
+
2
|
356 |
+
1.5
|
357 |
+
1
|
358 |
+
0.5
|
359 |
+
0
|
360 |
+
0
|
361 |
+
0
|
362 |
+
0
|
363 |
+
1
|
364 |
+
2
|
365 |
+
3
|
366 |
+
4
|
367 |
+
5
|
368 |
+
6
|
369 |
+
7
|
370 |
+
8
|
371 |
+
6
|
372 |
+
10
|
373 |
+
NumerodumodeFigure 4:
|
374 |
+
Sinusoidal and rectangular pulses over a period of td
|
375 |
+
j refers to the element’s number.
|
376 |
+
The mass, stiffness and dumping matrices in the base U are obtained by assembling those
|
377 |
+
of a track elementary section determined earlier.
|
378 |
+
The vector of loads is defined by:
|
379 |
+
F =
|
380 |
+
�
|
381 |
+
���
|
382 |
+
...
|
383 |
+
fj
|
384 |
+
...
|
385 |
+
�
|
386 |
+
���
|
387 |
+
where,
|
388 |
+
�
|
389 |
+
�
|
390 |
+
�
|
391 |
+
�
|
392 |
+
�
|
393 |
+
�
|
394 |
+
�
|
395 |
+
�
|
396 |
+
�
|
397 |
+
�
|
398 |
+
�
|
399 |
+
�
|
400 |
+
�
|
401 |
+
�
|
402 |
+
�
|
403 |
+
�
|
404 |
+
�
|
405 |
+
�
|
406 |
+
�
|
407 |
+
�
|
408 |
+
�
|
409 |
+
�
|
410 |
+
�
|
411 |
+
N is even
|
412 |
+
�
|
413 |
+
�
|
414 |
+
�
|
415 |
+
�
|
416 |
+
�
|
417 |
+
�
|
418 |
+
�
|
419 |
+
�
|
420 |
+
�
|
421 |
+
�
|
422 |
+
�
|
423 |
+
N = 2
|
424 |
+
� fj = P
|
425 |
+
if
|
426 |
+
j = 5
|
427 |
+
fj = 0
|
428 |
+
else
|
429 |
+
N ̸= 2
|
430 |
+
� fj = P
|
431 |
+
if
|
432 |
+
j = (5N/2) + 1
|
433 |
+
fj = 0
|
434 |
+
else
|
435 |
+
N is uneven
|
436 |
+
� fj = P
|
437 |
+
if j = (5(N + 1)/2) − 1
|
438 |
+
fj = 0
|
439 |
+
else
|
440 |
+
P is a rectangular or a sinusoidal load given as:
|
441 |
+
• Sinusoidal pulse:
|
442 |
+
� P = P0 sin ωt
|
443 |
+
if
|
444 |
+
t ≤ td
|
445 |
+
P = 0
|
446 |
+
else
|
447 |
+
• Rectangular pulse:
|
448 |
+
� P = P0
|
449 |
+
if
|
450 |
+
t ≤ td
|
451 |
+
P = 0
|
452 |
+
else
|
453 |
+
Its shape is shown in the figure 4.
|
454 |
+
6
|
455 |
+
|
456 |
+
sinusoidal pulse
|
457 |
+
rectangular pulse
|
458 |
+
PO
|
459 |
+
P
|
460 |
+
x=0
|
461 |
+
x=td
|
462 |
+
X = 2td
|
463 |
+
→3.2
|
464 |
+
Description of the methods of resolution
|
465 |
+
The dynamic behavior of the section of track may be analyzed by modal superposition if the
|
466 |
+
dumping matrix verifies orthogonality properties.
|
467 |
+
That method is used in particular for an
|
468 |
+
undumped system. In that case, the equation of motion is reduced to:
|
469 |
+
M ¨U + KU = F
|
470 |
+
Let’s assume that ω2
|
471 |
+
i are the eigenvalues associated to the track vibration. We note {φi} the
|
472 |
+
normalized eigenvectors related to ω2
|
473 |
+
i . Therefore, the equation of motion is written as:
|
474 |
+
¨Z + diag(ω2
|
475 |
+
i )Z = φT F
|
476 |
+
(3)
|
477 |
+
where diag(ω2
|
478 |
+
i ) is a diagonal matrix of the eigenvalues and:
|
479 |
+
U = Φ.Z
|
480 |
+
The system of equations (3) is uncoupled where each equation is written as:
|
481 |
+
¨zi + ω2
|
482 |
+
i zi = Φj,iP(t)
|
483 |
+
The resolution of that equation is given by DUHAMEL integral:
|
484 |
+
zi(t) = (1/ωi)
|
485 |
+
� t
|
486 |
+
0
|
487 |
+
Φj,iP(τ) sin ωi(t − τ)dτ
|
488 |
+
Therefore, the solution for a sinusoidal pulse load is given as:
|
489 |
+
zi(t) =
|
490 |
+
� (Φj,iP0/ω2
|
491 |
+
i ).(1/(1 − β2))(sin ωt − β sin ωit)
|
492 |
+
if
|
493 |
+
t ≤ td
|
494 |
+
( ˙zi(td)/ωi) sin ωi(t − td) + zi(td) cos ωi(t − td)
|
495 |
+
if
|
496 |
+
t ≥ td
|
497 |
+
where,
|
498 |
+
β = ω/ωi
|
499 |
+
and the solution for a rectangular pulse load is given as:
|
500 |
+
zi(t) =
|
501 |
+
� (Φj,iP0/ω2
|
502 |
+
i )(1 − cos ωit)
|
503 |
+
if
|
504 |
+
t ≤ td
|
505 |
+
(Φj,iP0/ω2
|
506 |
+
i )(cos ωi(t − td) − cos ωit
|
507 |
+
if
|
508 |
+
t ≥ td
|
509 |
+
The figure 5 shows the response z(t) to a sinusoidal and a rectangular pulse. It’s obvious that
|
510 |
+
in the forced phase, the maximum rectangular response is higher than the maximum sinusoidal
|
511 |
+
response.
|
512 |
+
In general, the dumping matrix doesn’t verify the orthogonality characteristics. Therefore,
|
513 |
+
the modal superposition method is substituted by the following method.
|
514 |
+
The equation of motion can be written as:
|
515 |
+
¨Z + φT Cφ. ˙Z + diag(ω2
|
516 |
+
i ).Z = φT F
|
517 |
+
(4)
|
518 |
+
Where diag(ωi2) and φ are defined earlier. Knowing that:
|
519 |
+
˙Z − ˙Z = 0
|
520 |
+
(5)
|
521 |
+
(4) and (5) could be written as:
|
522 |
+
˙Y = D.Y + F ∗
|
523 |
+
(6)
|
524 |
+
7
|
525 |
+
|
526 |
+
Figure 5:
|
527 |
+
z(t) response to a rectangular and sinusoidal pulse td/T = 0.75
|
528 |
+
where,
|
529 |
+
Y =
|
530 |
+
� Z
|
531 |
+
˙Z
|
532 |
+
�
|
533 |
+
,
|
534 |
+
D = A−1B,
|
535 |
+
F ∗ = A−1
|
536 |
+
� φT F
|
537 |
+
0
|
538 |
+
�
|
539 |
+
and,
|
540 |
+
A =
|
541 |
+
� φT Cφ
|
542 |
+
I
|
543 |
+
I
|
544 |
+
0
|
545 |
+
�
|
546 |
+
,
|
547 |
+
B =
|
548 |
+
� diag(ω2
|
549 |
+
i )
|
550 |
+
0
|
551 |
+
0
|
552 |
+
−I
|
553 |
+
�
|
554 |
+
Let’s assume that {λi} are the eigenvalues associated to the matrix D. We note {ψi} the
|
555 |
+
normalized eigenvectors related to {ωi2}. We define X(t) as:
|
556 |
+
Z = ψ.X
|
557 |
+
The equation (6) is written as:
|
558 |
+
˙X = diag(λi).X + ψ−1F ∗
|
559 |
+
(7)
|
560 |
+
The system of equations (7) is uncoupled where each equation is written as:
|
561 |
+
˙xi(t) = ai.xi(t) + bi.P
|
562 |
+
(8)
|
563 |
+
where,
|
564 |
+
ai = λi
|
565 |
+
and
|
566 |
+
bi = χi
|
567 |
+
and,
|
568 |
+
χ = ψ−1
|
569 |
+
� φT
|
570 |
+
0
|
571 |
+
0
|
572 |
+
0
|
573 |
+
�
|
574 |
+
The resolution of the equation (8) gives:
|
575 |
+
8
|
576 |
+
|
577 |
+
sinusoidal pulse
|
578 |
+
rectangularpulse
|
579 |
+
2
|
580 |
+
-2
|
581 |
+
-3
|
582 |
+
-4
|
583 |
+
X=0
|
584 |
+
PI = X
|
585 |
+
x = 2td
|
586 |
+
PI =X
|
587 |
+
X = 4td
|
588 |
+
t• Sinusoidal pulse:
|
589 |
+
xi(t) =
|
590 |
+
�
|
591 |
+
biPω
|
592 |
+
a2
|
593 |
+
i +ω2 eait − aibiP
|
594 |
+
a2
|
595 |
+
i +ω2 sin ωt −
|
596 |
+
biPω
|
597 |
+
a2
|
598 |
+
i +ω2 cos ωt
|
599 |
+
if
|
600 |
+
t ≤ td
|
601 |
+
xi(td)eai(t−td)
|
602 |
+
if
|
603 |
+
t ≥ td
|
604 |
+
• Rectangular pulse:
|
605 |
+
xi(t) =
|
606 |
+
� (bP/a)(eait − 1)
|
607 |
+
if
|
608 |
+
t ≤ td
|
609 |
+
xi(td)eai(t−td)
|
610 |
+
if
|
611 |
+
t ≥ td
|
612 |
+
3.3
|
613 |
+
Results and discussion
|
614 |
+
The figures presented in this section show the numerical resolution of the system of equations
|
615 |
+
of a dumped track section subjected to a rectangular and sinusoidal loads. The properties of
|
616 |
+
the track are defined in table 1. In figure 6 and figure 7, the sinusoidal pulse is presented in red;
|
617 |
+
however, the rectangular pulse is presented in black.
|
618 |
+
1. Displacements and rotations of the rail
|
619 |
+
2. Displacements of the sleepers
|
620 |
+
It’s clear that the maximum values of rail and sleepers movement under rectangular pulse
|
621 |
+
are higher than those reached under a sinusoidal pulse. The figure 8 shows the maximum loads
|
622 |
+
induced in the substructure. The table 2 shows the repartition of the loads under the sleepers.
|
623 |
+
These results have many consequences in the railway field. Actually, we may optimize railway
|
624 |
+
infrastructure components for example (like ballast height). Moreover, the study is made by
|
625 |
+
considering a static load (10 T). This load is mainly amplified by rail/wheel interaction and
|
626 |
+
train speed [1].
|
627 |
+
Sleeper
|
628 |
+
number
|
629 |
+
% of load
|
630 |
+
(undumped -
|
631 |
+
sinusoidal load)
|
632 |
+
% of load
|
633 |
+
(dumped -
|
634 |
+
sinusoidal load)
|
635 |
+
% of load
|
636 |
+
(undumped -
|
637 |
+
rectangular
|
638 |
+
load)
|
639 |
+
% of load
|
640 |
+
(dumped -
|
641 |
+
rectangular
|
642 |
+
load)
|
643 |
+
13
|
644 |
+
4.49%
|
645 |
+
1.73%
|
646 |
+
5.50%
|
647 |
+
-
|
648 |
+
14
|
649 |
+
11.52%
|
650 |
+
6.12%
|
651 |
+
13.66%
|
652 |
+
6.63%
|
653 |
+
15
|
654 |
+
23.24%
|
655 |
+
15.29%
|
656 |
+
26.00%
|
657 |
+
16.41%
|
658 |
+
16
|
659 |
+
30.78%
|
660 |
+
22.43%
|
661 |
+
34.35%
|
662 |
+
23.55%
|
663 |
+
17
|
664 |
+
23.24%
|
665 |
+
15.29%
|
666 |
+
26.00%
|
667 |
+
16.41%
|
668 |
+
18
|
669 |
+
11.52%
|
670 |
+
6.12%
|
671 |
+
13.66%
|
672 |
+
6.63%
|
673 |
+
19
|
674 |
+
4.49%
|
675 |
+
1.73%
|
676 |
+
5.50%
|
677 |
+
-
|
678 |
+
Table 2:
|
679 |
+
Repartition of the loads under the sleepers (N = 30, td = 0.01s and P = 10 T)
|
680 |
+
4
|
681 |
+
Conclusion
|
682 |
+
Based on the results of the model analysis studied in order to determine the loads induced on
|
683 |
+
the substructure, the following conclusions can be drawn:
|
684 |
+
9
|
685 |
+
|
686 |
+
Figure 6:
|
687 |
+
Rail response under sinusoidal and rectangular pulse (N = 4, td = 0.01s and P = 10
|
688 |
+
T)
|
689 |
+
10
|
690 |
+
|
691 |
+
10-
|
692 |
+
X10-
|
693 |
+
X104
|
694 |
+
X10-
|
695 |
+
w)
|
696 |
+
0
|
697 |
+
0.02
|
698 |
+
0.04
|
699 |
+
0.06
|
700 |
+
0.02
|
701 |
+
0.04
|
702 |
+
0.06
|
703 |
+
0
|
704 |
+
0.02
|
705 |
+
0.04
|
706 |
+
0.06
|
707 |
+
0
|
708 |
+
0.02
|
709 |
+
0.04
|
710 |
+
0.06
|
711 |
+
t (s)
|
712 |
+
t (s)
|
713 |
+
t (s)
|
714 |
+
t (s)
|
715 |
+
a) Displacements and rotations of the 1st node
|
716 |
+
f) Displacements and rotations of the 6th node
|
717 |
+
×10~4
|
718 |
+
X104
|
719 |
+
(pe))
|
720 |
+
X104
|
721 |
+
PO'O
|
722 |
+
0.06
|
723 |
+
0.02
|
724 |
+
0.04
|
725 |
+
0.06
|
726 |
+
t (s)
|
727 |
+
t (s)
|
728 |
+
b) Displacements and rotations of the 2nd node
|
729 |
+
0.02
|
730 |
+
0.04
|
731 |
+
0.06
|
732 |
+
0.02
|
733 |
+
0.04
|
734 |
+
0.06
|
735 |
+
t (s)
|
736 |
+
t (s)
|
737 |
+
104
|
738 |
+
g) Displacements and rotations of the 7th node
|
739 |
+
(e)
|
740 |
+
X104
|
741 |
+
0.02
|
742 |
+
0.06
|
743 |
+
0
|
744 |
+
0.02
|
745 |
+
0.04
|
746 |
+
0.06
|
747 |
+
t (s)
|
748 |
+
t (s)
|
749 |
+
c) Displacements and rotations of the 3rd node
|
750 |
+
0.02
|
751 |
+
0.04
|
752 |
+
90'0
|
753 |
+
0
|
754 |
+
0.02
|
755 |
+
0.06
|
756 |
+
t (s)
|
757 |
+
t (s)
|
758 |
+
×10+
|
759 |
+
X104
|
760 |
+
h) Displacements and rotations of the 8th node
|
761 |
+
10-4
|
762 |
+
10
|
763 |
+
5-10
|
764 |
+
0.02
|
765 |
+
0.04
|
766 |
+
0.06
|
767 |
+
0.02
|
768 |
+
0.04
|
769 |
+
0.06
|
770 |
+
t (s)
|
771 |
+
t (s)
|
772 |
+
d) Displacements and rotations of the 4th node
|
773 |
+
0.020.04
|
774 |
+
0.06
|
775 |
+
t (s)
|
776 |
+
0.02
|
777 |
+
0.04
|
778 |
+
0.06
|
779 |
+
t (s)
|
780 |
+
i) Displacements and rotations of the 9th node
|
781 |
+
×10
|
782 |
+
X10-19
|
783 |
+
-
|
784 |
+
0.02
|
785 |
+
PO'O
|
786 |
+
0.06
|
787 |
+
2
|
788 |
+
0.02
|
789 |
+
0.04
|
790 |
+
0.06
|
791 |
+
t (s)
|
792 |
+
t (s)
|
793 |
+
e) Displacements and rotations of the 5th nodeFigure 7:
|
794 |
+
Sleeper response under sinusoidal and rectangular pulse (N = 4, td = 0.01s and P =
|
795 |
+
10 T)
|
796 |
+
Figure 8:
|
797 |
+
Loads induced in the substructure (N = 30, td = 0.01s and P = 10 T)
|
798 |
+
11
|
799 |
+
|
800 |
+
10-4
|
801 |
+
×10
|
802 |
+
[w)
|
803 |
+
-2
|
804 |
+
-2
|
805 |
+
0
|
806 |
+
0.02
|
807 |
+
0.04
|
808 |
+
0.06
|
809 |
+
0
|
810 |
+
0.02
|
811 |
+
0.04
|
812 |
+
0.06
|
813 |
+
t (s)
|
814 |
+
t (s)
|
815 |
+
a) Sleeper 1
|
816 |
+
b) Sleeper 2
|
817 |
+
×104
|
818 |
+
cement (m)
|
819 |
+
X104
|
820 |
+
-2
|
821 |
+
-5
|
822 |
+
10
|
823 |
+
0
|
824 |
+
0.02
|
825 |
+
0.04
|
826 |
+
0.06
|
827 |
+
0
|
828 |
+
0.02
|
829 |
+
0.04
|
830 |
+
0.06
|
831 |
+
(s) 1
|
832 |
+
t (s)
|
833 |
+
c) Sleeper 3
|
834 |
+
d) Sleeper 4
|
835 |
+
2
|
836 |
+
0
|
837 |
+
0.02
|
838 |
+
0.04
|
839 |
+
0.06
|
840 |
+
t (s)
|
841 |
+
e) Sleeper 50.5
|
842 |
+
X104
|
843 |
+
-0.5
|
844 |
+
-1
|
845 |
+
(N)
|
846 |
+
Force
|
847 |
+
-1.5
|
848 |
+
-2
|
849 |
+
-2.5
|
850 |
+
Undumped strcture-Sinusoidal pulse
|
851 |
+
Dumped strcture -Sinusoidalpulse
|
852 |
+
-3
|
853 |
+
Undumped strcture - Rectangular pulse
|
854 |
+
Dumpedstrcture-Rectangularpulse
|
855 |
+
-3.5
|
856 |
+
1
|
857 |
+
2
|
858 |
+
4
|
859 |
+
5
|
860 |
+
6
|
861 |
+
7
|
862 |
+
8
|
863 |
+
6
|
864 |
+
101112
|
865 |
+
13141516171819202122232425262728293031
|
866 |
+
Sleepernumber• The common modelling of the load applied on the track due to a moving wheel as a
|
867 |
+
rectangular pulse acting in the time sample of a force signal generates a higher rate of
|
868 |
+
movement in the track and over sizes the loads induced in the substructure than a sinusoidal
|
869 |
+
pulse model;
|
870 |
+
• Dumping matrix has a major influence on reducing the loads induced in the substructure.
|
871 |
+
Therefore, it’s necessary to preserve the quality of the track components while maintaining
|
872 |
+
it.
|
873 |
+
As an application, we may evaluate the track behavior according to different characteristics
|
874 |
+
of the track elements that degrade because of maintenance operations. Indeed, the ballast is
|
875 |
+
considered as the most affected element because of operations of damping required for track
|
876 |
+
geometry corrections.
|
877 |
+
References
|
878 |
+
[1] M. Touati, N. Lamdouar and A. Bouyahyaoui: Railway vehicle response under random
|
879 |
+
irregularities on a tangent track – nonlinear 3d multi-body modelling. Inter. J. of Mech.
|
880 |
+
Eng. and Tech. 9 (2018) 944–956.
|
881 |
+
[2] Y. Xiwen, G. Shaojie, Z. Shunhua, S. Yao, M. Xiaoyun: Vertical Vibration Analysis of
|
882 |
+
Vehicle-Track-Subgrade Coupled System in High Speed Railway with Dynamic Flexibility
|
883 |
+
Method. Transportation Research Procedia 25 (2017) 291–300.
|
884 |
+
[3] A. Al Shaer, D. Duhamel, K. Sab, G. Foret, L. Schmitt: Experimental settlement and
|
885 |
+
dynamic behavior of a portion of ballasted railway track under high speed trains. J. Sound
|
886 |
+
Vib. 316(1-5) (2008) 211–233.
|
887 |
+
[4] A. Kaynia, C. Madshus, P. Zackrisson: Ground Vibration from High-speed Trains: Predic-
|
888 |
+
tion and Countermeasure, J. of Geotech. and Geo-env. Eng.. 126 (2000) 531–537.
|
889 |
+
[5] H. Takemiya: Simulation of Track–ground Vibrations due to High-speed Trains, Proceedings
|
890 |
+
of the Eighth International Congress on Sound and Vibration. Hong Kong, China (2000)
|
891 |
+
2875–2882.
|
892 |
+
[6] C. Madshus, A. Kaynia: High-speed Railway Lines on Soft Ground: Dynamic Behaviour at
|
893 |
+
Critical Train Speed, Journal of Sound and Vibration. 231(3) (2000) 689-701.
|
894 |
+
[7] S. Qian, C. Ying: A Spatial Time-Varying Coupling Model for Dynamic Analysis of High
|
895 |
+
Speed Railway Subgrade, J. of South. Jiao. Univ. (2001) 36(5) 509-513.
|
896 |
+
[8] H. Chebli, D. Clouteau and L. Schmitt: Dynamic response of high-speed ballasted rail-
|
897 |
+
way tracks: 3D periodic model and in situ measurements. Soil Dynamics and Earthquake
|
898 |
+
Engineering, 28(2) (2008) 118-131.
|
899 |
+
[9] P. Mario and L. William, Structural dynamics: Theory and Computation, Springer US,
|
900 |
+
(2004).
|
901 |
+
[10] EN 13481 : Railway applications. Track. Performance requirements for fastening systems.
|
902 |
+
Definitions.
|
903 |
+
[11] G. Kouroussis, O. Verlinden and C. Conti: Prediction of vibratory nuisances of rail transport
|
904 |
+
vehicles. In 6th National Congress of Theoretical and Applied Mechanics, Ghent (Belgium),
|
905 |
+
(2003) National Committee for Theoretical and Applied Mechanics.
|
906 |
+
12
|
907 |
+
|
908 |
+
[12] W. Zhai and X. Sun: A detailed model for investigating vertical interaction between railway
|
909 |
+
vehicle and track. Vehicle System Dynamics 23(sup1) (1994) 603-615.
|
910 |
+
13
|
911 |
+
|