jackkuo commited on
Commit
0cbd176
·
verified ·
1 Parent(s): d57d448

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +56 -0
  2. 0tE2T4oBgHgl3EQfNAZ6/content/2301.03731v1.pdf +3 -0
  3. 0tE2T4oBgHgl3EQfNAZ6/vector_store/index.faiss +3 -0
  4. 0tE2T4oBgHgl3EQfNAZ6/vector_store/index.pkl +3 -0
  5. 1NE0T4oBgHgl3EQfdgAR/content/2301.02376v1.pdf +3 -0
  6. 1dE1T4oBgHgl3EQfRwNN/content/tmp_files/2301.03056v1.pdf.txt +0 -0
  7. 1dE1T4oBgHgl3EQfRwNN/content/tmp_files/load_file.txt +0 -0
  8. 1dFQT4oBgHgl3EQfEjV1/content/2301.13238v1.pdf +3 -0
  9. 1dFQT4oBgHgl3EQfEjV1/vector_store/index.faiss +3 -0
  10. 1dFQT4oBgHgl3EQfEjV1/vector_store/index.pkl +3 -0
  11. 1tE3T4oBgHgl3EQfngpH/content/tmp_files/2301.04625v1.pdf.txt +1109 -0
  12. 3dE1T4oBgHgl3EQfAQLV/content/2301.02838v1.pdf +3 -0
  13. 3dE1T4oBgHgl3EQfAQLV/vector_store/index.faiss +3 -0
  14. 3dE1T4oBgHgl3EQfAQLV/vector_store/index.pkl +3 -0
  15. 3dE4T4oBgHgl3EQfbAyT/content/2301.05069v1.pdf +3 -0
  16. 3dE4T4oBgHgl3EQfbAyT/vector_store/index.pkl +3 -0
  17. 4NE1T4oBgHgl3EQfSgOT/vector_store/index.faiss +3 -0
  18. 5dE1T4oBgHgl3EQfTAM3/content/tmp_files/2301.03072v1.pdf.txt +1624 -0
  19. 5dE1T4oBgHgl3EQfTAM3/content/tmp_files/load_file.txt +0 -0
  20. 6tE5T4oBgHgl3EQfPw5R/vector_store/index.faiss +3 -0
  21. 79AzT4oBgHgl3EQfE_pK/vector_store/index.pkl +3 -0
  22. 7NE2T4oBgHgl3EQfkwf2/content/tmp_files/2301.03983v1.pdf.txt +862 -0
  23. 7NE2T4oBgHgl3EQfkwf2/content/tmp_files/load_file.txt +395 -0
  24. 7tE0T4oBgHgl3EQffQCV/vector_store/index.faiss +3 -0
  25. 7tE0T4oBgHgl3EQffQCV/vector_store/index.pkl +3 -0
  26. 8dAzT4oBgHgl3EQfSPuZ/vector_store/index.pkl +3 -0
  27. 9dAzT4oBgHgl3EQfSfu4/content/tmp_files/2301.01234v1.pdf.txt +855 -0
  28. 9dAzT4oBgHgl3EQfSfu4/content/tmp_files/load_file.txt +0 -0
  29. 9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/2301.05519v1.pdf.txt +0 -0
  30. 9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/load_file.txt +0 -0
  31. AdE1T4oBgHgl3EQfpAU_/content/tmp_files/2301.03326v1.pdf.txt +419 -0
  32. AdE1T4oBgHgl3EQfpAU_/content/tmp_files/load_file.txt +139 -0
  33. B9E0T4oBgHgl3EQfgAGB/content/tmp_files/2301.02412v1.pdf.txt +1572 -0
  34. B9E0T4oBgHgl3EQfgAGB/content/tmp_files/load_file.txt +0 -0
  35. BdAzT4oBgHgl3EQfTfx4/content/2301.01250v1.pdf +3 -0
  36. BdAzT4oBgHgl3EQfTfx4/vector_store/index.faiss +3 -0
  37. BdAzT4oBgHgl3EQfTfx4/vector_store/index.pkl +3 -0
  38. CdE1T4oBgHgl3EQfDwOw/content/tmp_files/2301.02882v1.pdf.txt +816 -0
  39. CdE1T4oBgHgl3EQfDwOw/content/tmp_files/load_file.txt +0 -0
  40. ENE3T4oBgHgl3EQfVQoB/content/tmp_files/2301.04457v1.pdf.txt +1631 -0
  41. ENE3T4oBgHgl3EQfVQoB/content/tmp_files/load_file.txt +0 -0
  42. F9AzT4oBgHgl3EQfi_2P/content/2301.01509v1.pdf +3 -0
  43. HNE3T4oBgHgl3EQfuAs1/content/2301.04680v1.pdf +3 -0
  44. HNE3T4oBgHgl3EQfuAs1/vector_store/index.faiss +3 -0
  45. HNE3T4oBgHgl3EQfuAs1/vector_store/index.pkl +3 -0
  46. HtFIT4oBgHgl3EQfXys9/vector_store/index.faiss +3 -0
  47. INFJT4oBgHgl3EQfFiwP/vector_store/index.faiss +3 -0
  48. IdAzT4oBgHgl3EQfU_z6/vector_store/index.faiss +3 -0
  49. JdFAT4oBgHgl3EQfvB7v/vector_store/index.faiss +3 -0
  50. JtAzT4oBgHgl3EQfj_0_/content/tmp_files/2301.01524v1.pdf.txt +911 -0
.gitattributes CHANGED
@@ -2577,3 +2577,59 @@ otFMT4oBgHgl3EQf7TEy/content/2301.12463v1.pdf filter=lfs diff=lfs merge=lfs -tex
2577
  JdFAT4oBgHgl3EQfvB7v/content/2301.08674v1.pdf filter=lfs diff=lfs merge=lfs -text
2578
  6tE5T4oBgHgl3EQfPw5R/content/2301.05507v1.pdf filter=lfs diff=lfs merge=lfs -text
2579
  otFMT4oBgHgl3EQf7TEy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2577
  JdFAT4oBgHgl3EQfvB7v/content/2301.08674v1.pdf filter=lfs diff=lfs merge=lfs -text
2578
  6tE5T4oBgHgl3EQfPw5R/content/2301.05507v1.pdf filter=lfs diff=lfs merge=lfs -text
2579
  otFMT4oBgHgl3EQf7TEy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2580
+ F9AzT4oBgHgl3EQfi_2P/content/2301.01509v1.pdf filter=lfs diff=lfs merge=lfs -text
2581
+ 6tE5T4oBgHgl3EQfPw5R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2582
+ YNFOT4oBgHgl3EQf9jQ2/content/2301.12970v1.pdf filter=lfs diff=lfs merge=lfs -text
2583
+ ztFRT4oBgHgl3EQfkDcP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2584
+ IdAzT4oBgHgl3EQfU_z6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2585
+ _dAyT4oBgHgl3EQfdvdN/content/2301.00307v1.pdf filter=lfs diff=lfs merge=lfs -text
2586
+ 4NE1T4oBgHgl3EQfSgOT/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2587
+ KNFJT4oBgHgl3EQfwy3r/content/2301.11632v1.pdf filter=lfs diff=lfs merge=lfs -text
2588
+ YtAzT4oBgHgl3EQfmv2c/content/2301.01569v1.pdf filter=lfs diff=lfs merge=lfs -text
2589
+ ntE3T4oBgHgl3EQfjAo0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2590
+ stE3T4oBgHgl3EQf9Quo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2591
+ ztFRT4oBgHgl3EQfkDcP/content/2301.13593v1.pdf filter=lfs diff=lfs merge=lfs -text
2592
+ JdFAT4oBgHgl3EQfvB7v/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2593
+ 1dFQT4oBgHgl3EQfEjV1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2594
+ KNAyT4oBgHgl3EQf6Ppp/content/2301.00818v1.pdf filter=lfs diff=lfs merge=lfs -text
2595
+ KNFJT4oBgHgl3EQfwy3r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2596
+ vNAzT4oBgHgl3EQfdPyu/content/2301.01418v1.pdf filter=lfs diff=lfs merge=lfs -text
2597
+ etE3T4oBgHgl3EQffAo5/content/2301.04548v1.pdf filter=lfs diff=lfs merge=lfs -text
2598
+ atAyT4oBgHgl3EQf9_py/content/2301.00884v1.pdf filter=lfs diff=lfs merge=lfs -text
2599
+ xtFQT4oBgHgl3EQfAjU_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2600
+ x9E4T4oBgHgl3EQfYQwo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2601
+ 0tE2T4oBgHgl3EQfNAZ6/content/2301.03731v1.pdf filter=lfs diff=lfs merge=lfs -text
2602
+ XtE2T4oBgHgl3EQfYgfk/content/2301.03856v1.pdf filter=lfs diff=lfs merge=lfs -text
2603
+ 0tE2T4oBgHgl3EQfNAZ6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2604
+ HNE3T4oBgHgl3EQfuAs1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2605
+ INFJT4oBgHgl3EQfFiwP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2606
+ YdE2T4oBgHgl3EQfEQZV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2607
+ 1dFQT4oBgHgl3EQfEjV1/content/2301.13238v1.pdf filter=lfs diff=lfs merge=lfs -text
2608
+ i9E4T4oBgHgl3EQfSwzD/content/2301.05002v1.pdf filter=lfs diff=lfs merge=lfs -text
2609
+ BdAzT4oBgHgl3EQfTfx4/content/2301.01250v1.pdf filter=lfs diff=lfs merge=lfs -text
2610
+ 3dE1T4oBgHgl3EQfAQLV/content/2301.02838v1.pdf filter=lfs diff=lfs merge=lfs -text
2611
+ HNE3T4oBgHgl3EQfuAs1/content/2301.04680v1.pdf filter=lfs diff=lfs merge=lfs -text
2612
+ kb_46/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2613
+ _dAyT4oBgHgl3EQfRfZA/content/2301.00066v1.pdf filter=lfs diff=lfs merge=lfs -text
2614
+ 1NE0T4oBgHgl3EQfdgAR/content/2301.02376v1.pdf filter=lfs diff=lfs merge=lfs -text
2615
+ BdAzT4oBgHgl3EQfTfx4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2616
+ pNE0T4oBgHgl3EQf9AKq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2617
+ dNE2T4oBgHgl3EQfGAZK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2618
+ YtAzT4oBgHgl3EQfmv2c/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2619
+ kNE3T4oBgHgl3EQfJglg/content/2301.04344v1.pdf filter=lfs diff=lfs merge=lfs -text
2620
+ YdE1T4oBgHgl3EQfcQQe/content/2301.03181v1.pdf filter=lfs diff=lfs merge=lfs -text
2621
+ NdFQT4oBgHgl3EQfWTbR/content/2301.13304v1.pdf filter=lfs diff=lfs merge=lfs -text
2622
+ _dAyT4oBgHgl3EQfRfZA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2623
+ HtFIT4oBgHgl3EQfXys9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2624
+ YdE1T4oBgHgl3EQfcQQe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2625
+ 3dE1T4oBgHgl3EQfAQLV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2626
+ M9E4T4oBgHgl3EQf9A55/content/2301.05352v1.pdf filter=lfs diff=lfs merge=lfs -text
2627
+ _dA0T4oBgHgl3EQfPf96/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2628
+ ntE3T4oBgHgl3EQfjAo0/content/2301.04584v1.pdf filter=lfs diff=lfs merge=lfs -text
2629
+ 7tE0T4oBgHgl3EQffQCV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2630
+ TNFAT4oBgHgl3EQf2R4K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2631
+ S9AzT4oBgHgl3EQfJfsf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2632
+ X9FRT4oBgHgl3EQfODd9/content/2301.13512v1.pdf filter=lfs diff=lfs merge=lfs -text
2633
+ 3dE4T4oBgHgl3EQfbAyT/content/2301.05069v1.pdf filter=lfs diff=lfs merge=lfs -text
2634
+ n9E5T4oBgHgl3EQfjw-t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2635
+ M9E4T4oBgHgl3EQf9A55/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0tE2T4oBgHgl3EQfNAZ6/content/2301.03731v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:956c8991803491d00146631264cbeecb0ae4623d5ea5e482084b21cd521d0681
3
+ size 3728778
0tE2T4oBgHgl3EQfNAZ6/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:59b72a2fd37ad72781f2c49270c5f2384136ca2026da61db52bea1a15c716d5b
3
+ size 8454189
0tE2T4oBgHgl3EQfNAZ6/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7562496f1e6b033293289ba5b1495c2668f1616413ef8c280692c239b0f21ca5
3
+ size 249671
1NE0T4oBgHgl3EQfdgAR/content/2301.02376v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6fe1d0176f291a1c898c912d97c9bb2ff87e6af41f06fe5277110f7774e24c46
3
+ size 9737225
1dE1T4oBgHgl3EQfRwNN/content/tmp_files/2301.03056v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dE1T4oBgHgl3EQfRwNN/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dFQT4oBgHgl3EQfEjV1/content/2301.13238v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7353a08540c0739c53790c24a3b792e485198afb8251f1c81c01f6fb45987296
3
+ size 2156805
1dFQT4oBgHgl3EQfEjV1/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7e6cc031260e980661b204291664edb6faa5918c2ebb614815847eb606ad6bf4
3
+ size 7405613
1dFQT4oBgHgl3EQfEjV1/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:26dca59b394389c4d0dbf777388a807a85934b3e01453cd20e5e23466752996c
3
+ size 274641
1tE3T4oBgHgl3EQfngpH/content/tmp_files/2301.04625v1.pdf.txt ADDED
@@ -0,0 +1,1109 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Multivariate Regression via Enhanced
2
+ Response Envelope: Envelope Regularization
3
+ and Double Descent
4
+ Oh-Ran Kwon and Hui Zou
5
+ School of Statistics, University of Minnesota
6
+ Abstract
7
+ The envelope model provides substantial efficiency gains over the standard multi-
8
+ variate linear regression by identifying the material part of the response to the model
9
+ and by excluding the immaterial part. In this paper, we propose the enhanced response
10
+ envelope by incorporating a novel envelope regularization term in its formulation. It is
11
+ shown that the enhanced response envelope can yield better prediction risk than the
12
+ original envelope estimator. The enhanced response envelope naturally handles high-
13
+ dimensional data for which the original response envelope is not serviceable without
14
+ necessary remedies. In an asymptotic high-dimensional regime where the ratio of the
15
+ number of predictors over the number of samples converges to a non-zero constant, we
16
+ characterize the risk function and reveal an interesting double descent phenomenon for
17
+ the first time for the envelope model. A simulation study confirms our main theoret-
18
+ ical findings. Simulations and real data applications demonstrate that the enhanced
19
+ response envelope does have significantly improved prediction performance over the
20
+ original envelope method.
21
+ Keywords: Double descent, Envelope model, High-dimension asymptotics, Prediction, Reg-
22
+ ularization
23
+ 1
24
+ arXiv:2301.04625v1 [stat.ME] 11 Jan 2023
25
+
26
+ 1
27
+ Introduction
28
+ The envelope model first introduced by Cook et al. (2010) is a modern approach to estimat-
29
+ ing an unknown regression coefficient matrix β ∈ Rr×p in multivariate linear regression of
30
+ the response vector y ∈ Rr on the predictors x ∈ Rp. It was shown by Cook et al. (2010) that
31
+ the envelope estimator of β results in substantial efficiency gains relative to the standard
32
+ maximum likelihood estimator of β. The gains arise by identifying the part of the response
33
+ vector that is material to the regression and by excluding the immaterial part in the estima-
34
+ tion. The original envelope model has been later extended to the envelope model based on
35
+ excluding immaterial parts of the predictors to the regression by Cook et al. (2013). Cook
36
+ et al. (2013) then established the connection between the latter envelope model and partial
37
+ least squares, providing a statistical understanding of partial least squares algorithms.
38
+ The success of the envelope models and their theories motivated some authors to propose
39
+ new envelope models by applying or extending the core idea of envelope modeling to various
40
+ statistical models. The two most common are the response envelope models and the predictor
41
+ envelope models. The response envelope models (predictor envelope models) achieve estima-
42
+ tion and prediction gains by eliminating the variability arising from the immaterial part of
43
+ the responses (predictors) that is invariant to the changes in the predictors (responses). Pa-
44
+ pers on response envelope models include the original envelope model (Cook et al., 2010), the
45
+ partial envelope model (Su and Cook, 2011), the scaled response envelope model (Cook and
46
+ Su, 2013), the reduced-rank envelope model (Cook et al., 2015), the sparse envelope model
47
+ (Su et al., 2016), the Bayesian envelope model (Khare et al., 2017), the tensor response enve-
48
+ lope model (Li and Zhang, 2017), the envelope model for matrix variate regression (Ding and
49
+ Cook, 2018), and the spatial envelope model for spatially correlated data (Rekabdarkolaee
50
+ et al., 2020). Papers on predictor envelope models include the envelope model for predictor
51
+ reduction (Cook et al., 2013), the envelope model for generalized linear models and Cox’s
52
+ proportional hazard model (Cook and Zhang, 2015a), the scaled predictor envelope model
53
+ (Cook and Su, 2016), the envelope quantile regression model (Ding et al., 2020), the envelope
54
+ model for the censored quantile regression (Zhao et al., 2022), tensor envelope partial least
55
+ squares regression (Zhang and Li, 2017), and envelope-based sparse partial least squares
56
+ regression (Zhu and Su, 2020). For a comprehensive review of the envelope models, readers
57
+ 2
58
+
59
+ are referred to Cook (2018).
60
+ High-dimensional data have become common in many fields. It is only natural to consider
61
+ the performance of the envelope model under high dimensions. The likelihood-based method
62
+ to estimate β under both the response/predictor envelope model is not serviceable for high-
63
+ dimensional data because the likelihood-based method requires the inversion of the sample
64
+ covariance matrix of predictors. Hence, one has to find effective ways to mitigate this issue.
65
+ For the predictor envelope model, its connection to partial least squares provides one solution.
66
+ Partial least squares (De Jong, 1993) can be used for estimating β for the predictor envelope
67
+ model (Cook et al., 2013). The partial least squares algorithm is an iterative moment-based
68
+ algorithm involving the sample covariance of predictors and the sample covariance between
69
+ the response vector and predictors, which does not require inversion of the sample covariance
70
+ matrix of predictors. In addition, the algorithm provides the root-n consistent estimator of β
71
+ in the predictor envelope model with the number of predictors fixed (Chun and Kele¸s, 2010;
72
+ Cook et al., 2013) and can yield accurate prediction in the asymptotic high-dimensional
73
+ regime when the response is univariate (Cook and Forzani, 2019). Motivated by this, Zhu and
74
+ Su (2020) introduced envelope-based sparse partial least squares and showed the consistency
75
+ of the estimator for the sparse predictor envelope model. Zhang and Li (2017) proposed a
76
+ tensor envelope partial least squares algorithm, which provides the consistent estimator for
77
+ the tensor predictor envelope model. Another way to apply predictor envelope models for
78
+ high-dimensional data is by selecting the principal components of predictors and then using
79
+ likelihood-based estimation on the principal components. This simple remedy is adapted by
80
+ Rimal et al. (2019) to compare the prediction performance of the likelihood-based predictor
81
+ envelope method, principal component regression, and partial least squares regression for
82
+ high-dimensional data. Their extensive numerical study showed that this simple remedy
83
+ produced better prediction performance than principal component regression and partial
84
+ least squares regression. The impact of high dimensions is more severe for the response
85
+ envelope. There is far less work on making the response envelope model serviceable for high-
86
+ dimensional data. The Bayesian approach for the response envelope model (Khare et al.,
87
+ 2017) can handle high-dimensional data. The sparse envelope model (Su et al., 2016) which
88
+ performs variable selection on the responses can handle data with the sample size smaller
89
+ 3
90
+
91
+ than the number of responses, but still requires the number of predictors smaller than the
92
+ number of sample size.
93
+ In this paper, we propose the enhanced response envelope for high-dimensional data by
94
+ incorporating a novel envelope regularization term in its formulation. The envelope regu-
95
+ larization term respects the fundamental idea of the original envelope model by considering
96
+ the presence of the material and immaterial parts of the response in the model. The en-
97
+ hancements are twofold. First, our enhanced response envelope estimator can handle both
98
+ low- and high-dimensional data, while the original envelope estimator can only handle low-
99
+ dimensional data where the sample size n is smaller than the number of predictors p. From
100
+ the connection between the original envelope estimator and the enhanced response envelope
101
+ estimator in low-dimension, we extend the definition of the original envelope estimator to
102
+ high-dimensional data by considering the limiting case of the enhanced response envelope es-
103
+ timator with a vanishing regularization parameter; see the discussion in Section 2.3. Second,
104
+ we prove that the enhanced response envelope can reduce the prediction risk relative to the
105
+ original envelope for all values of n and p. Moreover, we study the asymptotics of the predic-
106
+ tion risk for the original envelope estimator and the enhanced response envelope estimator
107
+ when both n, p → ∞ and their ratio converges to a nonzero constant p/n → γ ∈ (0, ∞).
108
+ This kind of asymptotic regime has been considered in high-dimensional machine learning
109
+ theory (El Karoui, 2018; Dobriban and Wager, 2018; Liang and Rakhlin, 2020; Hastie et al.,
110
+ 2022) for analyzing the behavior of prediction risk of certain predictive models. We derive an
111
+ interesting asymptotic prediction risk curve for the envelope estimator. The risk increases as
112
+ γ increases, and then decreases after γ > 1. This phenomenon is known as the double descent
113
+ phenomenon in the machine learning literature. Although the double descent phenomenon
114
+ has been observed for neural networks and ridgeless regression (Belkin et al., 2019; Hastie
115
+ et al., 2022), this is the first time that such a phenomenon is shown for the envelope models.
116
+ The rest of the paper is organized as follows. We review the original envelope model
117
+ and the corresponding envelope estimator in Section 2.1. In Section 2.2, we introduce a
118
+ new regularization term called the envelope regularization based on which we propose the
119
+ enhanced response envelope in section 2.3. The enhanced response envelope estimator nat-
120
+ urally provides a definition for the envelope estimator when p > n. Section 2.4 describes
121
+ 4
122
+
123
+ how to implement this new method in practice. In Section 3.1, we prove that the enhanced
124
+ response envelope can yield better prediction risk than the original envelope for any (n, p)
125
+ pair. Considering n, p → ∞ and p/n → γ ∈ (0, ∞), we derive the limiting prediction risk
126
+ result of the original envelope and the enhanced response envelope in Section 3.2. This result
127
+ along with our simulation study in Section 4 verify the double descent phenomenon. Real
128
+ data analyses are presented in Section 5. Proofs of theorems are provided in Appendix A.
129
+ 2
130
+ Enhanced response envelope
131
+ 2.1
132
+ Review of envelope model
133
+ Envelope model
134
+ Let us begin with the classical multivariate linear regression model of a
135
+ response vector y ∈ Rr given a predictor vector x ∈ Rp:
136
+ y = βx + ε, ε ∼ N(0, Σ),
137
+ (1)
138
+ where ε is the error vector with a positive definite Σ and independent to x. β ∈ Rr×p is
139
+ an unknown matrix of regression coefficients and x ∼ Px where Px is a distribution on Rp
140
+ such that E(x) = 0 and Cov(x) = Σx. We omit an intercept by assuming E(y) = 0 for easy
141
+ communication.
142
+ The envelope model allows for the possibility that there is a part of the response vector
143
+ that is unaffected by changes in the predictor vector. Specifically, let E ⊆ Rr be a subspace
144
+ such that for all x1 and x2,
145
+ (i) QEy|(x = x1) ∼ QEy|(x = x2) and (ii) PEy ⊥⊥ QEy|x,
146
+ (2)
147
+ where PE is the projection onto E and QE = I − PE. Condition (i) states that the marginal
148
+ distribution of QEy is invariant to changes in x. Condition (ii) says that QEy does not
149
+ affect PEy if x is provided. Conditions together imply that PE includes the relevant depen-
150
+ dency information of y on x (the material part) while QE is the irrelevant information (the
151
+ immaterial part).
152
+ Let B = span(β). The conditions in (2) hold if and only if
153
+ span(β) = B ⊆ E and Σ = PEΣPE + QEΣQE.
154
+ (3)
155
+ 5
156
+
157
+ The definition of an envelope introduced by Cook et al. (2007, 2010) formalizes the smallest
158
+ subspace satisfying the conditions in (2) using the equivalence relation of (2) and (3). The
159
+ envelope is defined as the intersection of all subspaces E satisfying (3) and is denoted by
160
+ EΣ,B, Σ-envelope of B.
161
+ The envelope model arises by parameterizing the multivariate linear model in terms of
162
+ the envelope EΣ,B. The parameterization is as follows. Let u = dim(EΣ,B), Γ ∈ Rr×u be any
163
+ semi-orthogonal basis matrix for EΣ,B, and Γ0 ∈ Rr×(r−u) is any semi-orthogonal basis matrix
164
+ for the orthogonal complement of EΣ,B. Then the multivariate linear model can be written
165
+ as
166
+ y = Γηx + ε, ε ∼ N(0, ΓΩΓT + Γ0Ω0ΓT
167
+ 0 ),
168
+ (4)
169
+ where β = Γη with η ∈ Ru×p, and Ω ∈ Rr×r and Ω0 ∈ R(r−u)×(r−u) are symmetric positive
170
+ definite matrices. Model (4) is called the envelope model.
171
+ Envelope estimator The parameters in the envelope model are estimated by maximizing
172
+ the likelihood function from model (4). Assume that p+r < n and u is the dimension u of the
173
+ envelope. SX = n−1XTX, SY = n−1YTY, SY,X = n−1YTX, and SY|X = SY−SY,XS−1
174
+ X SX,Y,
175
+ where Y ∈ Rn×r has rows yT
176
+ i and X ∈ Rn×p has rows xT
177
+ i .
178
+ The envelope estimator of β is determined as
179
+ ˆEΣ,B = span{arg
180
+ min
181
+ G∈Gr(r,u)(log |GTSY|XG| + log |GTS−1
182
+ Y G|)},
183
+ (5)
184
+ where Gr(r, u) = {G ∈ Rr×u : G is a semi-orthogonal matrix}. Define ˆΓ as any semi-
185
+ orthogonal basis matrix for ˆEΣ,B and let ˆΓ0 be any semi-orthogonal basis matrix for the
186
+ orthogonal complement of ˆEΣ,B. The estimator of β is given by
187
+ ˆβ = ˆΓˆΓTSY,XS−1
188
+ X ,
189
+ (6)
190
+ and Σ is estimated by ˆΣ = ˆΓ ˆΩˆΓ + ˆΓT
191
+ 0 ˆΩ0ˆΓ0 where
192
+ ˆΩ = ˆΓTSY|XˆΓ,
193
+ ˆΩ0 = ˆΓT
194
+ 0 SY ˆΓ0,
195
+ (7)
196
+ 2.2
197
+ Envelope regularization
198
+ In this section, we introduce the envelope regularization term that respects the fundamental
199
+ idea in the envelope model by considering the presence of material and immaterial parts,
200
+ 6
201
+
202
+ PEΣ,By and QEΣ,By, in the regression.
203
+ We define the envelope regularization term as
204
+ ρ(η, Ω) = tr(ηTΩ−1η).
205
+ (8)
206
+ The envelope model distinguishes between PEΣ,By and QEΣ,By in the estimation process.
207
+ The log-likelihood function of the envelope model is decomposed into two log-likelihood
208
+ functions. One is the log-likelihood function for the multivariate regression of ΓTy on x,
209
+ ΓTy = ηx+ΓTε where ΓTε ∼ N(0, Ω). The other is the log-likelihood function for the zero-
210
+ mean model of ΓT
211
+ 0 y, ΓT
212
+ 0 y = ΓT
213
+ 0 ε where ΓT
214
+ 0 ε ∼ N(0, Ω0). The envelope regularization term
215
+ (8) is the function of η and Ω, the parameters in the likelihood for the material part of the
216
+ envelope model. The envelope regularization term (8) can be seen as imposing the Frobenius
217
+ norm regularization on the coefficient after standardizing the material part of the regression
218
+ to have uncorrelated errors, Ω−1/2ΓTy = Ω−1/2ηx + Ω−1/2ΓTε where Ω−1/2ΓTε ∼ N(0, I).
219
+ We emphasize that the envelope regularization is different from the ridge regularization.
220
+ While the ridge regularization ∥β∥2
221
+ F is the quadratic function of β, the envelope regulariza-
222
+ tion is not because the components of Ω are not fixed values. The envelope regularization is
223
+ the function of both η and Ω, and thus is optimized over η and Ω simultaneously, as shown
224
+ in the next subsection.
225
+ 2.3
226
+ The proposed estimator
227
+ We only assume that r ≤ n but p is allowed to be bigger than n. The log-likelihood function
228
+ under the envelope model (4) is
229
+ Lu(η, EΣ,B, Ω, Ω0) = − (nr/2) log(2π) − (n/2) log |ΓΩΓT + Γ0Ω0ΓT
230
+ 0 |
231
+ − (1/2)
232
+ n
233
+
234
+ i=1
235
+ (yi − Γηxi)T(ΓΩΓT + Γ0Ω0ΓT
236
+ 0 )−1(yi − Γηxi).
237
+ By incorporating the envelope regularization term ρ given in the last subsection, we propose
238
+ the following enhanced response envelope estimator via penalized maximum likelihood:
239
+ arg max{Lu(η, EΣ,B, Ω, Ω0) − n
240
+ 2λ · ρ(η, Ω)},
241
+ (9)
242
+ where λ > 0 serves as a regularization parameter.
243
+ 7
244
+
245
+ Let SX = n−1XTX, SY = n−1YTY, SY,X = n−1YTX, Sλ
246
+ X = SX + λI and Sλ
247
+ Y|X =
248
+ SY − SY,X(Sλ
249
+ X)−1SX,Y. After some basic calculations, (9) can be expressed as
250
+ ˆEΣ,B(λ) = span{arg
251
+ min
252
+ G∈Gr(r,u)(log |GTSλ
253
+ Y|XG| + log |GTS−1
254
+ Y G|)},
255
+ (10)
256
+ where Gr(r, u) = {G ∈ Rr×u : G is a semi-orthogonal matrix}. Let ˆΓλ be any semi-orthogonal
257
+ basis matrix for ˆEΣ,B(λ) and ˆΓ0,λ be any semi-orthogonal basis matrix for the orthogonal
258
+ complement of ˆEΣ,B(λ). The enhanced envelope estimator of β is given by
259
+ ˆβ(λ) = ˆΓλˆΓT
260
+ λSY,X(Sλ
261
+ X)−1
262
+ (11)
263
+ and Σ is estimated by ˆΣ(λ) = ˆΓλ ˆΩ(λ)ˆΓλ + ˆΓT
264
+ 0,λ ˆΩ0(λ)ˆΓ0,λ where
265
+ ˆΩ(λ) = ˆΓT
266
+ λSλ
267
+ Y|XˆΓλ,
268
+ ˆΩ0(λ) = ˆΓT
269
+ 0,λSY ˆΓ0,λ,
270
+ (12)
271
+ The enhanced response envelope estimator can naturally handle the case where p ≥ n−r,
272
+ while the original envelope estimator (5) does not. Motivated by the definition of ridgeless
273
+ regression (Hastie et al., 2022), we can consider taking the limit of the enhanced response
274
+ envelope estimator with λ → 0+:
275
+ ˆEΣ,B = span{arg
276
+ min
277
+ G∈Gr(r,u)( lim
278
+ λ→0+ log |GTSλ
279
+ Y|XG| + log |GTS−1
280
+ Y G|)},
281
+ ˆβ = lim
282
+ λ→0+ ˆβ(λ)
283
+ (13)
284
+ We take (13) as the definition of envelope estimator. Obviously, when p < n−r, this extended
285
+ definition recovers the original envelope estimator (5). This definition enables the use of the
286
+ envelope estimator when p ≥ n−r, without altering the definition of the original envelope
287
+ estimator (5) when p < n−r. In practice, we implement (13) by computing the enhanced
288
+ response envelope estimator (10) with a very small value of λ such as 10−8.
289
+ As the enhanced response envelope estimator (9) has flexibility on λ, the enhanced re-
290
+ sponse envelope estimator with an appropriate choice of λ can yield better prediction risk
291
+ compared to the envelope estimator, which is discussed in Section 3. We discuss the Grass-
292
+ mannian manifold optimization required in (10) in the next subsection.
293
+ 2.4
294
+ Implementation
295
+ Suppose that the dimension u is specified and λ is given. Our proposed estimator ˆEΣ,B(λ)
296
+ for EΣ(B) requires the optimization over the Grassmannian G(u, r). Such a computation
297
+ 8
298
+
299
+ problem exists for the original envelope model as well. So far, the best-known algorithm for
300
+ solving envelope models is the algorithm introduced by Cook et al. (2016). Thus, we employ
301
+ their algorithm to compute ˆEΣ,B(λ) in (10). Note that we standardize X so that each column
302
+ has a mean of 0 and a standard deviation of 1 before fitting any model.
303
+ In practice, the tuning parameter λ and the dimension u of the envelope are unknown. We
304
+ use the cross-validation method to choose (u, λ). For the original envelope, u can be selected
305
+ by using AIC, BIC, LRT or cross-validation. BIC and LRT may be preferred as shown by
306
+ simulations in Su and Cook (2013). Because the enhanced response envelope model has an
307
+ additional tuning parameter λ, we propose to use cross-validation to find the best tuning
308
+ parameter combination of u and λ.
309
+ We have implemented the enhanced response envelope method in R and the code is
310
+ available upon request.
311
+ 3
312
+ Theory
313
+ In this section, we show that the enhanced response envelope can reduce the prediction risk
314
+ over the envelope for any (n, p) pair. We then consider the asymptotic setting when n, p → ∞
315
+ p/n → γ ∈ (0, ∞). This asymptotic regime has been considered in the literature (El Karoui,
316
+ 2018; Dobriban and Wager, 2018; Liang and Rakhlin, 2020; Hastie et al., 2022) for analyzing
317
+ the behavior of prediction risk of certain predictive models.
318
+ In our discussion, we consider the case where EΣ(B) is known, which has been assumed
319
+ in the existing envelope papers to understand the core mechanism of envelope methodologies
320
+ (Cook et al., 2013; Cook and Zhang, 2015a,b).
321
+ 3.1
322
+ Reduction in prediction risk
323
+ Consider a test point xnew ∼ Px. For an estimator ˆβ, we define the prediction risk as
324
+ R( ˆβ|X) = E[∥ ˆβxnew − βxnew∥2|X].
325
+ Note that this definition has the bias-variance decomposition,
326
+ R( ˆβ|X) = ∥bias(vec( ˆβ)|X)∥2 + tr{Var(vec( ˆβ)|X)}.
327
+ 9
328
+
329
+ Let Γ be a semi-orthogonal basis matrix for EΣ,B. Following the discussion in Section 2.3,
330
+ we take (13) as the definition of the envelope estimator ˆβΓ . The prediction risk of ˆβΓ is
331
+ R( ˆβΓ|X) = vecT(β)[ΠXΣxΠX ⊗ Ir]vec(β)
332
+
333
+ ��
334
+
335
+ bias2
336
+ + tr(Ω)
337
+ n
338
+ tr(S+
339
+ XΣx)
340
+
341
+ ��
342
+
343
+ var
344
+ ,
345
+ where ΠX = Ip − S+
346
+ XSX.
347
+ The prediction risk of the enhanced response envelope estimator ˆβΓ(λ) is
348
+ R( ˆβΓ(λ)|X) = E[∥ ˆβΓ(λ)xnew − βxnew∥2|X]
349
+ = λ2vecT(β)[(SX + λI)−1Σx(SX + λI)−1 ⊗ Ir]vec(β)
350
+
351
+ ��
352
+
353
+ bias2
354
+ + tr(Ω)
355
+ n
356
+ tr(ΣxSX(SX + λI)−2)
357
+
358
+ ��
359
+
360
+ var
361
+ .
362
+ (14)
363
+ Theorem 1 shows that using the envelope regularization always improves the prediction
364
+ risk of the envelope model.
365
+ Theorem 1. There always exists a λ > 0 such that R( ˆβΓ(λ)|X) < R( ˆβΓ|X).
366
+ 3.2
367
+ Limiting prediction risk and double descent phenomenon
368
+ The asymptotics of the envelope model are well-established in the case where n diverges
369
+ while p is fixed (Cook et al., 2010), while not in a high-dimensional asymptotic setup. In
370
+ this section, we examine the limiting risk of both the enhanced response envelope estimator
371
+ and the envelope estimator in the high-dimensional asymptotic regime where n, p → ∞ with
372
+ p/n → γ ∈ (0, ∞). The number of response variables r is fixed. This kind of asymptotic
373
+ regime has been considered in high-dimensional machine learning theory (El Karoui, 2018;
374
+ Dobriban and Wager, 2018; Liang and Rakhlin, 2020; Hastie et al., 2022) for analyzing the
375
+ behavior of prediction risk of certain predictive models.
376
+ Let x = Σ1/2
377
+ x x∗, where E(x∗) = 0 and Cov(x∗) = Ip. Then the envelope model (4) of y
378
+ on x can be expressed as the envelope model of y on x∗:
379
+ y = Γηx + ε = Γη∗x∗ + ε,
380
+ where η∗ = ηΣ1/2 and ε ∼ N(0, ΓΩΓT + Γ0Ω0ΓT
381
+ 0 ). We take advantage of the invariance
382
+ property of the envelope model in the analysis. Considering the envelope on (y, x∗) amounts
383
+ to assuming the covariance of the predictor is Ip.
384
+ 10
385
+
386
+ 0
387
+ 2
388
+ 4
389
+ 6
390
+ 8
391
+ 0
392
+ 5
393
+ 10
394
+ 15
395
+ 20
396
+ 25
397
+ γ
398
+ Limiting prediction risk
399
+ Envelope
400
+ Enhanced response envelope
401
+ Figure 1: The limiting prediction risks of the enhanced response envelope with λ∗ =
402
+ tr(Ω)γ/c2 (gray solid line) and the envelope (black solid line), illustrating Theorem 2 when
403
+ tr(Ω) = 10 and tr(βTβ) = 10.
404
+ Theorem 2. Assume that x has a bounded 4th moment and that tr(ηTη) = c2 for all n, p.
405
+ Then as n, p → ∞, such that p/n → γ ∈ (0, ∞), almost surely,
406
+ R( ˆβΓ|X) →
407
+
408
+
409
+
410
+
411
+
412
+ tr(Ω)
413
+ γ
414
+ 1−γ
415
+ for γ < 1
416
+ c2(1 − 1
417
+ γ) + tr(Ω)
418
+ 1
419
+ γ−1
420
+ for γ > 1,
421
+ and
422
+ R( ˆβΓ(λ∗)|X) → tr(Ω)γm(−λ∗),
423
+ where λ∗ = tr(Ω)γ/c2 and m(z) =
424
+ 1−γ−z−√
425
+ (1−γ−z)2−4γz
426
+ (2γz)
427
+ .
428
+ Figure 1 visualizes the limiting prediction risk curves in Theorem 2. It plots the limiting
429
+ risks of envelope (black solid line) and the enhanced response envelope with λ∗ = tr(Ω)γ/c2
430
+ (dark-gray solid line), when tr(Ω) = 10 and tr(ηTη) = 10.
431
+ We have four remarks from Theorem 2. The limiting risk of envelope increases before
432
+ γ = 1 and then decreases after γ = 1. The double descent phenomenon has been observed in
433
+ popular methods such as neural networks, kernel machines and ridgeless regression (Belkin
434
+ et al., 2019; Hastie et al., 2022), but this is the first time that such a result is established
435
+ 11
436
+
437
+ in the envelope literature. Second, the enhanced response envelope estimator always has a
438
+ better asymptotic prediction risk than the envelope estimator (for any c2, tr(Ω), and γ).
439
+ Third, in Theorem 1, we show the existence of a λ that gives a smaller prediction risk of
440
+ the enhanced response envelope than the envelope estimator. In an asymptotic regime, we
441
+ specify such a λ value: λ∗ = tr(Ω)γ/c2. Lastly, the gap between two limiting prediction risks,
442
+ limn,p→∞ R( ˆβΓ|X) and n,p→∞R( ˆβΓ(λ∗)|X), increases as γ increases from 0 to 1. It is easy to
443
+ see as
444
+ 1
445
+ 1−γ > m(−λ∗), 0 < γ < 1.
446
+ 4
447
+ Simulation
448
+ In this section, we use simulations to compare the performance of the enhanced response
449
+ envelope estimator and the envelope estimator in terms of the prediction risk, E[∥ ˆβxnew −
450
+ βxnew∥2|X] = tr[( ˆβ − β)Cov(xnew)( ˆβ − β)T]. In addition, we use simulations to have a
451
+ numeric illustration of the double descent phenomenon to confirm the asymptotic theory.
452
+ We consider a setting where yi ∈ R3 is generated from the model
453
+ yi = βxi + εi, εi ∼ N(0, Σ), i = 1, . . . , n,
454
+ and xi ∈ Rp is generated independently from xi ∼ N(0, Σx(ρ)) where (i, j)th element of
455
+ Σx(ρ) ∈ Rp×p is ρ|i−j|. The covariance matrix Σ is set using three orthonormal vectors and
456
+ has eigenvalues 10, 8 and 2. The columns of Γ are the second and third eigenvectors of Σ.
457
+ Each component of ˜η ∈ R2×p is generated from the standard normal distribution. We then
458
+ set η =
459
+
460
+ 10 · ˜η/∥˜η∥F. In this setting, tr(ηTη) = 10, tr(Ω) = 10, and tr(Ω0) = 10. We
461
+ assume that dim(EΣ,B) = 2 is known.
462
+ Prediction risk comparison
463
+ In this simulation, we try different combinations of n, p
464
+ and ρ where n ∈ {50, 90, 200, 500}, p/n ∈ {0.1, 0.8, 1.2} and ρ ∈ {0, 0.8}. We compare the
465
+ prediction risk of the enhanced response envelope estimator to three different estimators: the
466
+ envelope estimator, multivariate linear regression, and multivariate ridge regression.
467
+ For the enhanced response envelope and the multivariate ridge regression, we perform
468
+ ten-fold cross-validation on simulated data to select λ among equally spaced 100 candidate
469
+ λ-values in the scale of logarithm base 10. We compute the envelope estimator for data
470
+ 12
471
+
472
+ with n ≤ p−r by taking a very small value of λ = 10−8 in the enhanced response envelope
473
+ estimator. We fit multivariate regression model to n < p data by taking a tiny value of
474
+ λ = 10−8 in the multivariate ridge regression. We then calculate the prediction risk. This
475
+ process is repeated 100 times.
476
+ In Table 1, we report the prediction risk averaged over 100 replications. First, we see that
477
+ the prediction risks from the enhanced response envelope are consistently smaller than the
478
+ envelope, as indicated in Theorem 1. Second, the enhanced response envelope consistently
479
+ gives smaller prediction risks compared to the multivariate ridge regression. When u = r, the
480
+ enhanced response envelope model reduces to the multivariate ridge regression. Therefore,
481
+ the prediction risk of the enhanced envelope model can be smaller than that of multivariate
482
+ ridge regression as long as tr(Ω0) > 0.
483
+ Double descent confirmation
484
+ This simulation is designed to support Theorem 2 and
485
+ to illustrate the double descent phenomenon in the envelope model. We set n ∈ {200, 2000}
486
+ and ρ = 0. p/n varies from 0.1 to 8. We compute the envelope and the enhanced response
487
+ envelope with setting λ∗ = tr(Ω)p/(nc2) = p/n on simulated data. We then calculate the
488
+ prediction risk for each estimator. Again, we fit n ≤ p−r data to the envelope estimator by
489
+ taking a very small value of λ = 10−8 in the enhanced response envelope estimator.
490
+ Figure 2 displays the prediction risks from n = 2000 with various p values. The gray
491
+ rectangle points denote the prediction risk for the enhanced response envelope estimator. The
492
+ black triangle points are the prediction risk for the envelope estimator. We see a fascinating
493
+ double descent prediction risk curve for the envelope model, as discussed in Theorem 2. Also,
494
+ the enhanced response envelope gives a smaller prediction risk across the entire range of p/n.
495
+ Figure 3 plots the prediction risk curves from n = 200. We see that Figure 3 exhibits the
496
+ same messages for the much smaller sample size. Although Theorem 2 is established when
497
+ considering EΣ,B is known, we did not use this information in the actual estimation in the
498
+ simulation study, yet the core message of Theorem 2 is confirmed by the simulation.
499
+ 13
500
+
501
+ n
502
+ p
503
+ Enhanced
504
+ envelope
505
+ Envelope
506
+ Multivariate
507
+ linear reg
508
+ Multivariate
509
+ ridge reg
510
+ Example 1: p/n = 0.1, ρ = 0
511
+ 50
512
+ 5
513
+ 1.31 (0.11)
514
+ 1.40 (0.12)
515
+ 2.39 (0.17)
516
+ 2.04 (0.12)
517
+ 90
518
+ 9
519
+ 1.24 (0.08)
520
+ 1.41 (0.10)
521
+ 2.33 (0.13)
522
+ 1.92 (0.09)
523
+ 200
524
+ 20
525
+ 1.16 (0.04)
526
+ 1.26 (0.05)
527
+ 2.31 (0.05)
528
+ 1.93 (0.04)
529
+ 500
530
+ 50
531
+ 1.06 (0.03)
532
+ 1.18 (0.03)
533
+ 2.28 (0.04)
534
+ 1.85 (0.04)
535
+ Example 2: p/n = 0.8, ρ = 0
536
+ 50
537
+ 40
538
+ 6.73 (0.18)
539
+ 60.89 (5.80)
540
+ 104.45 (7.09)
541
+ 7.16 (0.11)
542
+ 90
543
+ 72
544
+ 6.44 (0.14)
545
+ 55.10 (2.93)
546
+ 94.81 (3.24)
547
+ 7.05 (0.08)
548
+ 200
549
+ 160
550
+ 5.86 (0.10)
551
+ 42.50 (0.99)
552
+ 81.33 (1.63)
553
+ 6.91 (0.06)
554
+ 500
555
+ 400
556
+ 5.67 (0.04)
557
+ 40.61 (0.85)
558
+ 79.17 (1.11)
559
+ 6.89 (0.03)
560
+ Example 3: p/n = 1.2, ρ = 0
561
+ 50
562
+ 60
563
+ 8.02 (0.23)
564
+ 33.70 (1.33)
565
+ 93.79 (3.83)
566
+ 8.08 (0.11)
567
+ 90
568
+ 108
569
+ 7.58 (0.13)
570
+ 41.01 (1.36)
571
+ 94.38 (3.60)
572
+ 7.98 (0.07)
573
+ 200
574
+ 240
575
+ 7.02 (0.07)
576
+ 47.91 (1.18)
577
+ 99.94 (2.83)
578
+ 7.82 (0.04)
579
+ 500
580
+ 600
581
+ 6.78 (0.04)
582
+ 50.43 (0.91)
583
+ 103.33 (1.55)
584
+ 7.75 (0.03)
585
+ Example 4: p/n = 0.1, ρ = 0.8
586
+ 50
587
+ 5
588
+ 1.76 (0.11)
589
+ 1.98 (0.19)
590
+ 2.39 (0.17)
591
+ 1.84 (0.07)
592
+ 90
593
+ 9
594
+ 1.02 (0.05)
595
+ 1.40 (0.08)
596
+ 2.33 (0.13)
597
+ 1.45 (0.06)
598
+ 200
599
+ 20
600
+ 0.90 (0.03)
601
+ 1.30 (0.04)
602
+ 2.31 (0.05)
603
+ 1.31 (0.03)
604
+ 500
605
+ 50
606
+ 0.78 (0.02)
607
+ 1.19 (0.03)
608
+ 2.28 (0.04)
609
+ 1.22 (0.02)
610
+ Example 5: p/n = 0.8, ρ = 0.8
611
+ 50
612
+ 40
613
+ 4.16 (0.17)
614
+ 62.50 (6.34)
615
+ 104.45 (7.09)
616
+ 4.76 (0.12)
617
+ 90
618
+ 72
619
+ 3.78 (0.15)
620
+ 55.14 (2.85)
621
+ 94.81 (3.24)
622
+ 4.63 (0.10)
623
+ 200
624
+ 160
625
+ 3.32 (0.05)
626
+ 42.40 (0.99)
627
+ 81.33 (1.63)
628
+ 4.28 (0.05)
629
+ 500
630
+ 400
631
+ 3.09 (0.03)
632
+ 40.69 (0.87)
633
+ 79.17 (1.11)
634
+ 4.05 (0.03)
635
+ Example 6: p/n = 1.2, ρ = 0.8
636
+ 50
637
+ 60
638
+ 5.24 (0.23)
639
+ 36.43 (1.12)
640
+ 104.17 (4.37)
641
+ 5.80 (0.14)
642
+ 90
643
+ 108
644
+ 4.41 (0.12)
645
+ 44.84 (1.68)
646
+ 103.01 (4.03)
647
+ 5.16 (0.09)
648
+ 200
649
+ 240
650
+ 4.05 (0.07)
651
+ 51.46 (1.30)
652
+ 109.34 (3.17)
653
+ 4.98 (0.06)
654
+ 500
655
+ 600
656
+ 3.86 (0.03)
657
+ 54.21 (0.98)
658
+ 112.62 (1.71)
659
+ 4.82 (0.03)
660
+ Table 1: Prediction risk, averaged over 100 replications. The standard error is given in paren-
661
+ theses. For n ≤ p−r data, we compute the envelope by taking a very small value of λ = 10−8
662
+ in the enhanced response envelope; see the definition of the envelope estimator (13) in Sec-
663
+ tion 2.3. For n < p data, we fit the multivariate regression model by taking a tiny value of
664
+ λ = 10−8 in the multivariate ridge regression.
665
+ 14
666
+
667
+ 0
668
+ 2
669
+ 4
670
+ 6
671
+ 8
672
+ 0
673
+ 5
674
+ 10
675
+ 15
676
+ 20
677
+ 25
678
+ p/n
679
+ Prediction risk
680
+ Envelope
681
+ Enhanced response envelope
682
+ Figure 2: Prediction risk of the envelope and the enhanced response envelope with λ∗ =
683
+ tr(Ω)p/(nc2), when n = 2000 and p varies. For n ≤ p−r data, we fit the envelope by taking
684
+ a very small value of λ = 10−8 in the enhanced response envelope estimator; see the definition
685
+ of the envelope estimator (13) in Section 2.3.
686
+ 5
687
+ Real data
688
+ In this section, we use two real datasets to illustrate the enhanced response envelope esti-
689
+ mator. We use air pollution data in which the number of samples is bigger than the number
690
+ of predictors (n > p) in the next subsection. In Subsection 5.2, we analyze near-infrared
691
+ spectroscopy data in which the number of predictors is much bigger than the number of
692
+ predictors (p ≫ n).
693
+ We compare the prediction performance of the enhanced response envelope estimator to
694
+ the envelope estimator, multivariate regression, and multivariate ridge regression.
695
+ 5.1
696
+ Air pollution data
697
+ The air pollution data are available and obtained directly from Table 1.5 of Johnson et al.
698
+ (2002). The response vector y ∈ R5 consists of atmospheric concentrations of CO, NO, NO2,
699
+ O3, and HC, recorded at noon in the Los Angeles area on 42 different days. The two predictors
700
+ 15
701
+
702
+ 0
703
+ 2
704
+ 4
705
+ 6
706
+ 8
707
+ 0
708
+ 5
709
+ 10
710
+ 15
711
+ 20
712
+ 25
713
+ p/n
714
+ Prediction risk
715
+ Envelope
716
+ Enhanced response envelope
717
+ Figure 3: Prediction risk of the envelope and the enhanced response envelope with λ∗ =
718
+ tr(Ω)p/(nc2), when n = 200 and p varies. For n ≤ p−r data, we fit the envelope by taking a
719
+ very small value of λ = 10−8 in the enhanced response envelope estimator; see the definition
720
+ of the envelope estimator (13) in Section 2.3.
721
+ are wind speed and solar radiation. This data were analyzed in Cook (2018) to illustrate the
722
+ effectiveness of the original envelope model compared to the standard multivariate regression
723
+ model. They showed that the asymptotic standard errors of estimated components of β
724
+ from the envelope model are significantly reduced compared to those from the standard
725
+ multivariate regression model. We use the data to predict atmospheric concentrations from
726
+ wind speed and solar radiation and compare the prediction performance of the enhanced
727
+ response envelope estimator to the envelope estimator, the standard multivariate regression,
728
+ and multivariate ridge regression.
729
+ To compare the prediction performance, we borrow the nested cross validation idea
730
+ (Wang and Zou, 2021; Bates et al., 2021), in which an inner cross-validation is performed
731
+ to tune a model and an outer cross-validation is performed to provide a prediction error of
732
+ the tuned model. We adopt the leave-one-out cross-validation (LOOCV) procedure for the
733
+ outer loop because the LOOCV error is an unbiased estimator of the generalization error
734
+ of the tuned model and is shown to have nice performance compared to other methods for
735
+ 16
736
+
737
+ Enhanced
738
+ envelope
739
+ Envelope
740
+ Multivariate
741
+ linear reg
742
+ Multivariate
743
+ ridge reg
744
+ Error
745
+ 8.859
746
+ 8.951
747
+ 9.192
748
+ 9.124
749
+ Table 2: Air pollution data: prediction error of the enhanced response envelope method,
750
+ the original envelope method, the multivariate linear regression, and the multivariate ridge
751
+ regression.
752
+ estimating generalization errors (Wang and Zou, 2021).
753
+ We take the ith observation out from the data and set the remaining n−1 observations
754
+ as the training set to fit and tune models. We standardize X of the training set so that each
755
+ column has a mean of 0 and a standard deviation of 1. We perform ten-fold cross-validation
756
+ to select (u, λ) from a fine grid of u ∈ {0, . . . , 5} and 20 equally spaced candidate λ-values
757
+ in the scale of logarithm base 10 for the enhanced response envelope. For the envelope,
758
+ we perform ten-fold cross-validation to choose u from {0, . . . , 5}. For the multivariate ridge
759
+ model, ten-fold cross-validation is performed to select λ from 20 equally spaced λ-values in
760
+ the scale of logarithm base 10. The ith observation we take out at the beginning is set as
761
+ the test set. We standardize xi of the test set using the mean and standard deviation of the
762
+ training data. We then calculate the squared prediction error, ∥yi − ˆβ(−i)xi∥2
763
+ 2/r, where ˆβ(−i)
764
+ is the estimated regression coefficient derived from the training set. We repeat this process
765
+ for i = 1, . . . , n and report �n
766
+ i=1 ∥yi − ˆβ(−i)xi∥2
767
+ 2/(nr) in Table 2. We see that the enhanced
768
+ response envelope estimator gives the smallest prediction error among all competitors.
769
+ 5.2
770
+ Near-infrared spectroscopy data of fresh cattle manure
771
+ Near-infrared spectroscopy data of cattle manure were collected by Gog´e et al. (2021). The
772
+ data are available in the Data INRAE Repository at https://doi.org/10.15454/JIGO8R. This
773
+ data contain 73 cattle manure samples that were analyzed by near-infrared spectroscopy
774
+ using a NIRFlex device. Near-infrared spectra were recorded every 2 nm from 1100 to 2498
775
+ nm on fresh homogenized samples. In addition, the cattle manure samples were analyzed
776
+ for three chemical properties: the amount of dry matter, magnesium oxide, and potassium
777
+ 17
778
+
779
+ Enhanced
780
+ envelope
781
+ Envelope
782
+ Multivariate
783
+ linear reg
784
+ Multivariate
785
+ ridge reg
786
+ Error
787
+ 0.437
788
+ 0.460
789
+ 0.692
790
+ 0.492
791
+ Table 3: Near-infrared spectroscopy data: prediction error from the enhanced response enve-
792
+ lope method, the envelope method, the multivariate linear regression, and the multivariate
793
+ ridge regression. We compute the envelope estimator by taking a very small value of λ = 10−8
794
+ in the enhanced response envelope estimator; see the definition of the envelope estimator
795
+ (13) in Section 2.3. We fit the multivariate regression model by taking a very small value of
796
+ λ = 10−8 in the multivariate ridge regression.
797
+ oxide. We use the data of 62 cattle manure samples which have no missing values. We
798
+ standardize each chemical property to have a sample mean of 0 and a standard deviation of
799
+ 1. In our analysis, we consider the multivariate linear model, where xi ∈ R700 is the vector
800
+ of near-infrared spectroscopy measurements and yi ∈ R3 is the vector of three chemical
801
+ measurements to predict the three chemical properties from the absorbance spectra.
802
+ In Table 3, we report the prediction error which is calculated using the same procedure
803
+ described in the previous subsection, except that u is chosen from {0, . . . , 3}. Again, We see
804
+ that the enhanced response envelope estimator has the smallest prediction error among all
805
+ competitors.
806
+ 6
807
+ Discussion
808
+ In this paper, we have developed a novel envelope regularization function which is used to
809
+ define the enhanced envelope estimator. We have shown that the enhanced envelope estimator
810
+ is indeed better than the un-regularized envelope estimator in prediction. The asymptotic
811
+ analysis of the risk function of envelope reveals, for the first time in the envelope literature,
812
+ an interesting double descent phenomenon. The numeric examples in this work also suggest
813
+ that the enhanced response envelope estimator is a promising new tool for multivariate
814
+ regression.
815
+ 18
816
+
817
+ Although this paper is focused on the case where the number of responses (r) is less
818
+ than the number of samples and the number of predictors, it is interesting to consider the
819
+ case when r → ∞ in ultrahigh-dimensional problems. Su et al. (2016) studied the response
820
+ envelope for r → ∞ but p is fixed. When both p, r > n and diverge, there are additional
821
+ technical issues to be addressed. For example, we may need another penalty term to handle
822
+ the issues caused by the large r in the model. This direction of research will be investigated
823
+ in a separate paper.
824
+ References
825
+ Bai, Z., Miao, B., and Pan, G. (2007), “On asymptotics of eigenvectors of large sample
826
+ covariance matrix,” The Annals of Probability, 35, 1532–1572.
827
+ Bai, Z.-D. and Yin, Y.-Q. (2008), “Limit of the smallest eigenvalue of a large dimensional
828
+ sample covariance matrix,” in Advances In Statistics, World Scientific, pp. 108–127.
829
+ Bates, S., Hastie, T., and Tibshirani, R. (2021), “Cross-validation: what does it estimate and
830
+ how well does it do it?” arXiv preprint arXiv:2104.00673.
831
+ Belkin, M., Hsu, D., Ma, S., and Mandal, S. (2019), “Reconciling modern machine-learning
832
+ practice and the classical bias–variance trade-off,” Proceedings of the National Academy
833
+ of Sciences, 116, 15849–15854.
834
+ Chun, H. and Kele¸s, S. (2010), “Sparse partial least squares regression for simultaneous
835
+ dimension reduction and variable selection,” Journal of the Royal Statistical Society: Series
836
+ B (Statistical Methodology), 72, 3–25.
837
+ Cook, R. (2018), An Introduction to Envelopes: Dimension Reduction for Efficient Estima-
838
+ tion in Multivariate Statistics, Wiley Series in Probability and Statistics, Wiley.
839
+ Cook, R. D. and Forzani, L. (2019), “Partial least squares prediction in high-dimensional
840
+ regression,” The Annals of Statistics, 47, 884–908.
841
+ Cook, R. D., Forzani, L., and Su, Z. (2016), “A note on fast envelope estimation,” Journal
842
+ of Multivariate Analysis, 150, 42–54.
843
+ 19
844
+
845
+ Cook, R. D., Forzani, L., and Zhang, X. (2015), “Envelopes and reduced-rank regression,”
846
+ Biometrika, 102, 439–456.
847
+ Cook, R. D., Helland, I., and Su, Z. (2013), “Envelopes and partial least squares regression,”
848
+ Journal of the Royal Statistical Society: Series B (Statistical Methodology), 75, 851–877.
849
+ Cook, R. D., Li, B., and Chiaromonte, F. (2007), “Dimension reduction in regression without
850
+ matrix inversion,” Biometrika, 94, 569–584.
851
+ — (2010), “Envelope models for parsimonious and efficient multivariate linear regression,”
852
+ Statistica Sinica, 927–960.
853
+ Cook, R. D. and Su, Z. (2013), “Scaled envelopes: scale-invariant and efficient estimation in
854
+ multivariate linear regression,” Biometrika, 100, 939–954.
855
+ — (2016), “Scaled predictor envelopes and partial least-squares regression,” Technometrics,
856
+ 58, 155–165.
857
+ Cook, R. D. and Zhang, X. (2015a), “Foundations for envelope models and methods,” Journal
858
+ of the American Statistical Association, 110, 599–611.
859
+ — (2015b), “Simultaneous envelopes for multivariate linear regression,” Technometrics, 57,
860
+ 11–25.
861
+ De Jong, S. (1993), “SIMPLS: an alternative approach to partial least squares regression,”
862
+ Chemometrics and intelligent laboratory systems, 18, 251–263.
863
+ Ding, S. and Cook, R. D. (2018), “Matrix variate regressions and envelope models,” Journal
864
+ of the Royal Statistical Society: Series B (Statistical Methodology), 80, 387–408.
865
+ Ding, S., Su, Z., Zhu, G., and Wang, L. (2020), “Envelope quantile regression,” Statistica
866
+ Sinica.
867
+ Dobriban, E. and Wager, S. (2018), “High-dimensional asymptotics of prediction: Ridge
868
+ regression and classification,” The Annals of Statistics, 46, 247–279.
869
+ 20
870
+
871
+ El Karoui, N. (2018), “On the impact of predictor geometry on the performance on high-
872
+ dimensional ridge-regularized generalized robust regression estimators,” Probability Theory
873
+ and Related Fields, 170, 95–175.
874
+ Gog´e, F., Thuri`es, L., Fouad, Y., Damay, N., Davrieux, F., Moussard, G., Le Roux, C.,
875
+ Trupin-Maudemain, S., Val´e, M., and Morvan, T. (2021), “Dataset of chemical and near-
876
+ infrared spectroscopy measurements of fresh and dried poultry and cattle manure,” Data
877
+ in Brief, 34, 106647.
878
+ Hastie, T., Montanari, A., Rosset, S., and Tibshirani, R. J. (2022), “Surprises in high-
879
+ dimensional ridgeless least squares interpolation,” The Annals of Statistics, 50, 949–986.
880
+ Johnson, R. A., Wichern, D. W., et al. (2002), Applied multivariate statistical analysis, vol. 5,
881
+ Prentice hall Upper Saddle River, NJ.
882
+ Khare, K., Pal, S., and Su, Z. (2017), “A bayesian approach for envelope models,” The
883
+ Annals of Statistics, 196–222.
884
+ Li, L. and Zhang, X. (2017), “Parsimonious tensor response regression,” Journal of the
885
+ American Statistical Association, 112, 1131–1146.
886
+ Liang, T. and Rakhlin, A. (2020), “Just Interpolate: Kernel “Ridgeless” Regression can
887
+ generalize,” Annals of Statistics, 48, 1329–1347.
888
+ Rekabdarkolaee, H. M., Wang, Q., Naji, Z., and Fuente, M. (2020), “NEW PARSIMONIOUS
889
+ MULTIVARIATE SPATIAL MODEL,” Statistica Sinica, 30, 1583–1604.
890
+ Rimal, R., Almøy, T., and Sæbø, S. (2019), “Comparison of multi-response prediction meth-
891
+ ods,” Chemometrics and Intelligent Laboratory Systems, 190, 10–21.
892
+ Su, Z. and Cook, R. D. (2011), “Partial envelopes for efficient estimation in multivariate
893
+ linear regression,” Biometrika, 98, 133–146.
894
+ — (2013), “Estimation of multivariate means with heteroscedastic errors using envelope
895
+ models,” Statistica Sinica, 213–230.
896
+ 21
897
+
898
+ Su, Z., Zhu, G., Chen, X., and Yang, Y. (2016), “Sparse envelope model: efficient estimation
899
+ and response variable selection in multivariate linear regression,” Biometrika, 103, 579–
900
+ 593.
901
+ Wang, B. and Zou, H. (2021), “Honest leave-one-out cross-validation for estimating post-
902
+ tuning generalization error,” Stat, 10, e413.
903
+ Zhang, X. and Li, L. (2017), “Tensor envelope partial least-squares regression,” Technomet-
904
+ rics, 59, 426–436.
905
+ Zhao, Y., Van Keilegom, I., and Ding, S. (2022), “Envelopes for censored quantile regression,”
906
+ Scandinavian Journal of Statistics.
907
+ Zhu, G. and Su, Z. (2020), “Envelope-based sparse partial least squares,” The Annals of
908
+ Statistics, 48, 161–182.
909
+ A
910
+ Proofs of Theorems
911
+ A.1
912
+ Proof of Theorem 1
913
+ Note that
914
+ R( ˆβΓ(λ)|X) = λ2tr(β(SX + λI)−1Σx(SX + λI)−1βT) + tr(Ω)
915
+ n
916
+ tr(ΣxSX(SX + λI)−2).
917
+ Therefore, we have
918
+
919
+ ∂λR( ˆβΓ(λ)|X)
920
+ = 2λ · tr(βSX(SX + λI)−2Σx(SX + λI)−1βT) − 2tr(Ω)
921
+ n
922
+ tr(ΣxSX(SX + λI)−3)
923
+
924
+ p
925
+
926
+ i=1
927
+
928
+ 2λ · σi(βTβ) − 2tr(Ω)
929
+ n
930
+
931
+ σi(ΣxSX(SX + λI)−3),
932
+ where σi(M) denotes the i-th largest eigenvalue of M. The inequality above comes from Von
933
+ Neumann’s trace inequality.
934
+ 22
935
+
936
+ Since
937
+
938
+ ∂λR( ˆβΓ(λ)|X) < 0 if λ < tr(Ω)/(nσ1
939
+
940
+ βTβ)
941
+
942
+ , R( ˆβΓ(λ)|X) is a monotonically
943
+ decreasing function if 0 ≤ λ ≤ tr(Ω)/(nσ1
944
+
945
+ βTβ)
946
+
947
+ . Therefore, we have
948
+ R( ˆβΓ(λ)|X) < tr(Ω)
949
+ n
950
+ tr(ΣxS+
951
+ X),
952
+ when 0 < λ < tr(Ω)/(nσ1
953
+
954
+ βTβ)
955
+
956
+ . Since
957
+ tr(Ω)
958
+ n
959
+ tr(ΣxS+
960
+ X) ≤ R( ˆβΓ|X),
961
+ we prove the theorem.
962
+ A.2
963
+ Proof of Theorem 2
964
+ Our analyses of limiting prediction risk follow that of Hastie et al. (2022).
965
+ As Σx = I,
966
+ R( ˆβΓ|X) = vecT(β)[ΠX ⊗ Ir]vec(β) + tr(Ω)
967
+ n
968
+ tr(S+
969
+ X),
970
+ R( ˆβΓ(λ)|X) = λ2tr(β(SX + λI)−2βT) + tr(Ω)
971
+ n
972
+ tr(SX(SX + λI)−2),
973
+ where ΠX = Ip − S+
974
+ XSX.
975
+ A.2.1
976
+ Proof for envelope estimator when γ < 1
977
+ Let us consider the case where p/n → γ ∈ (0, 1). From Theorem 1 of Bai and Yin (2008),
978
+ σmin(SX) ≥ (1 − √γ)2/2 and σmax(SX) ≤ 2(1 + √γ)2 almost surely for all sufficiently large
979
+ n. Therefore, in this case, SX is invertible and the bias term of R( ˆβΓ|X) is 0, almost surely.
980
+ The variance term of R( ˆβΓ|X) is
981
+ tr(Ω)
982
+ n
983
+ tr(S+
984
+ X) = p · tr(Ω)
985
+ n
986
+ � 1
987
+ sdFSX(s),
988
+ where FSX(s) is the spectral measure of SX. By the Marchenko-Pastur theorem, which says
989
+ that FSX → Fγ, and the Portmanteau theorem,
990
+ � 2(1+√γ)2/
991
+ (1−√γ)2/2
992
+ 1
993
+ sdFSX(s) →
994
+ � 2(1+√γ)2/
995
+ (1−√γ)2/2
996
+ 1
997
+ sdFγ(s) =
998
+ � 1
999
+ sdFγ(s).
1000
+ 23
1001
+
1002
+ The equality is because the support of Fγ is [(1 − √γ)2, (1 + √γ)2]. We can also remove the
1003
+ upper and lower limits of integration on the left-hand side by Theorem 1 of Bai and Yin
1004
+ (2008). Thus, combining above results, we arrive at
1005
+ R( ˆβΓ|X) → γ · tr(Ω)
1006
+ � 1
1007
+ sdFγ(s).
1008
+ The Stieltjes transformation of Fγ is given by
1009
+ m(z) =
1010
+
1011
+ 1
1012
+ s − zdFγ(s) = (1 − γ − z) −
1013
+
1014
+ (1 − γ − z)2 − 4γz)
1015
+ 2γz
1016
+ ,
1017
+ for any real z < 0. By taking the limit z → 0−, the proof is completed.
1018
+ A.2.2
1019
+ Proof for envelope estimator when γ > 1
1020
+ The variance term of R( ˆβΓ|X) is
1021
+ tr(Ω)
1022
+ n
1023
+ tr(S+
1024
+ X) = tr(Ω)
1025
+ n
1026
+ tr((XXT/n)+) = tr(Ω)
1027
+ p
1028
+ tr((XXT/p)+).
1029
+ Considering n/p → τ = 1/γ < 1, by the same arguments from the proof above, we conclude
1030
+ that
1031
+ tr(Ω)
1032
+ n
1033
+ tr(S+
1034
+ X) → tr(Ω)
1035
+ 1
1036
+ γ − 1.
1037
+ Let β = [bT
1038
+ 1 . . . bT
1039
+ r ]. The bias term is
1040
+ vecT(β)[ΠX ⊗ Ir]vec(β) =
1041
+ r
1042
+
1043
+ i=1
1044
+ bT
1045
+ i ΠXbi =
1046
+ r
1047
+
1048
+ i=1
1049
+ lim
1050
+ z→0+ zbT
1051
+ i (SX + zI)−1bi.
1052
+ From Theorem 1 of Bai et al. (2007), we have that
1053
+ zbT
1054
+ i (SX + zI)−1bi → z
1055
+
1056
+ 1
1057
+ s + zFγ(s) = z∥bi∥2m(−z) a.s.,
1058
+ for any i = 1, . . . , r. We further have that
1059
+ r
1060
+
1061
+ i=1
1062
+ zbT
1063
+ i (SX + zI)−1bi → zc2m(−z) a.s.
1064
+ By the Arzela-Ascoli theorem and the Moore-Osgood theorem, we exchange limits and
1065
+ arrive at
1066
+ lim
1067
+ z→0+
1068
+ r
1069
+
1070
+ i=1
1071
+ zbT
1072
+ i (SX + zI)−1bi → c2 lim
1073
+ z→0+ zm(−z) = c2(1 − 1/γ) a.s.
1074
+ Combining the variance and the bias terms, we complete the proof.
1075
+ 24
1076
+
1077
+ A.2.3
1078
+ Proof for enhanced envelope estimator
1079
+ We use the similar techniques from the envelope estimator for both variance and bias terms.
1080
+ The variance term of R( ˆβΓ(λ)) becomes
1081
+ tr(Ω)
1082
+ n
1083
+ tr(SX(SX + λI)−2) → γtr(Ω)
1084
+
1085
+ s
1086
+ (s + λ)2Fγ(s).
1087
+ Let gn,λ(η) = λ · tr(β(SX + λ(1 + η)I)−1βT), η ∈ [−1/2, 1/2]. The bias term of R( ˆβΓ(λ))
1088
+ is
1089
+ λ2tr(β(SX + λI)−2βT) = − ∂
1090
+ ∂ηgn(λ, 0).
1091
+ Because
1092
+ gn,λ(η) → λc2m(−λ(1 + η)) = λc2
1093
+
1094
+ 1
1095
+ s + λ(1 + η)dFγ(s),
1096
+ and derivative and limit are exchangeable, we have that
1097
+ λ2tr(β(SX + λI)−2βT) → λ2c2
1098
+
1099
+ 1
1100
+ (s + λ)2dFγ(s).
1101
+ We can conclude that,
1102
+ R( ˆβΓ(λ)) →
1103
+ � λ2c2 + s · γtr(Ω)
1104
+ (s + λ)2
1105
+ Fγ(s).
1106
+ The right-hand side is minimized at λ∗ = γtr(Ω)/c2. In such case, the right-hand side
1107
+ becomes γtr(Ω) · m(−λ∗).
1108
+ 25
1109
+
3dE1T4oBgHgl3EQfAQLV/content/2301.02838v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e0837ed0c3df524e38a21a6954f002c1272b36ef37b480000a4c7a0ef52176cb
3
+ size 231226
3dE1T4oBgHgl3EQfAQLV/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:798d6c2a760bf034eee02c0dd046c4d72187e3f9cc4ccd0c8c294484c79645d3
3
+ size 6225965
3dE1T4oBgHgl3EQfAQLV/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fb50a5434f2e85fd7042880ed69c6fa83d21dd9a79ceb50059878e231a8a5650
3
+ size 182460
3dE4T4oBgHgl3EQfbAyT/content/2301.05069v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fd9e808758fb729a8ab4490b0704b38c81a0bfb39c68b5139c49de5e1462d328
3
+ size 126906
3dE4T4oBgHgl3EQfbAyT/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:08bdf721dd42755b1bd53d508f34b35a151b92e588f9d7b03d52262f142ceab0
3
+ size 72302
4NE1T4oBgHgl3EQfSgOT/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:45e44ee5aaa29576abe2a1cfcccea1737d79adccedcc04a075d6413b337c9e1d
3
+ size 2949165
5dE1T4oBgHgl3EQfTAM3/content/tmp_files/2301.03072v1.pdf.txt ADDED
@@ -0,0 +1,1624 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Bipartite unique-neighbour expanders via Ramanujan graphs
2
+ Ron Asherov and Irit Dinur∗
3
+ Weizmann Institute, Rehovot, Israel
4
+ Abstract
5
+ We construct an infinite family of bounded-degree bipartite unique-neighbour expander graphs with
6
+ arbitrarily unbalanced sides. Although weaker than the lossless expanders constructed by Capalbo et
7
+ al., our construction is simpler and may be closer to be implementable in practice due to the smaller
8
+ constants. We construct these graphs by composing bipartite Ramanujan graphs with a fixed-size gadget
9
+ in a way that generalizes the construction of unique neighbour expanders by Alon and Capalbo. For
10
+ the analysis of our construction we prove a strong upper bound on average degrees in small induced
11
+ subgraphs of bipartite Ramanujan graphs. Our bound generalizes Kahale’s average degree bound to
12
+ bipartite Ramanujan graphs, and may be of independent interest. Surprisingly, our bound strongly relies
13
+ on the exact Ramanujan-ness of the graph and is not known to hold for nearly-Ramanujan graphs.
14
+ 1
15
+ Introduction
16
+ An infinite family Gn = (Ln ⊔ Rn, En) of (c, d)-biregular graphs with |Ln| + |Rn| → ∞ is called a unique
17
+ neighbour expander family if there exists δ > 0 such that for every n and every set of left side vertices S ⊆ Ln
18
+ of size |S| ≤ δ|Ln| there exists a unique neighbour of S in Gn, namely a vertex in Rn that is connected to
19
+ exactly one vertex in S. We only require that sets of left vertices have unique neighbours, and arbitrarily
20
+ small right side sets may have no unique neighbour.
21
+ Alon and Capalbo [AC02] construct several explicit families of unique neighbour expanders, via an elegant
22
+ composition of a Ramanujan graph and a gadget. They construct three families of general (non-bipartite)
23
+ graphs in which all small sets have unique neighbours, and one family of slightly unbalanced bipartite graphs
24
+ where small sets on the left have unique neighbors on the right. In their construction the left side is 22/21
25
+ times bigger than the right side. The more imbalanced the graph, the harder it is for small left hand side
26
+ sets to expand into the right hand side. Capalbo et. al. [Cap+02] construct arbitrarily unbalanced bipar-
27
+ tite graphs that are lossless expanders, a notion strictly stronger than unique neighbour expansion. Their
28
+ construction is based on a sequence of somewhat involved composition steps using randomness conductors.
29
+ Our main theorem is an efficient construction of an infinite family of bipartite unique neighbour expanders
30
+ for any constant imbalance α, and any sufficiently large left-regularity degrees of a specific form:
31
+ Theorem 1. There is a function ˆq : N × R → N such that for every integer c0 > 5 and real number α > 1,
32
+ if q > ˆq(c0, α) is a prime power and αc0(q + 1) is an integer, then there is a polynomial-time construction of
33
+ an infinite family of (c0(q + 1), αc0(q + 1))-biregular unique neighbour expanders.
34
+ The theorem is proven in Section 6.2, and provides a way to compute ˆq(c0, α). Here are some computed
35
+ values of ˆq(c0, α) for several values of c0, α.
36
+ ∗Irit Dinur acknowledges support by ERC grant 772839 and ISF grant 2073/21.
37
+ 1
38
+ arXiv:2301.03072v1 [math.CO] 8 Jan 2023
39
+
40
+ c0
41
+ α
42
+ ˆq(c0, α)
43
+ 10
44
+ 2
45
+ 18907
46
+ 35
47
+ 2
48
+ 1492
49
+ 100
50
+ 100
51
+ 136051
52
+ 100
53
+ 1.01
54
+ 1135
55
+ Notice that ˆq(co, α) increases with α, reflecting the fact that constructions with larger α (namely, more
56
+ imbalanced sides) are harder to come by, and require larger degrees.
57
+ The construction uses an infinite family of bipartite Ramanujan graphs, namely graphs whose non-
58
+ trivial spectrum is contained in the spectrum of the (c, d)-biregular tree (see Preliminaries for details). We
59
+ construct the unique neighbour expander family by taking a family of bipartite Ramanujan graphs and
60
+ combining them with a fixed size graph (“gadget”), with a good unique neighbour property (small sets have
61
+ unique neighbours), whose existence is shown via the probabilistic method (Lemma 11). The combination
62
+ is done as follows. We first place a copy of the gadget for every right side vertex of the Ramanujan graph.
63
+ The vertex is replaced by the right side of the gadget, and its neighbours are identified with the left side of
64
+ the gadget. The gadget is used to route the neighbours of each left side vertex in the Ramanujan graph to
65
+ its neighbours in the product graph.
66
+ Expansion in the product graph comes from unique neighbour expansion of the gadget together with
67
+ low degree vertices in the Ramanujan graph. Sufficiently low degree vertices are guaranteed to exist thanks
68
+ to the following (new) bound on the average degree of induced subgraphs of bipartite Ramanujan graphs,
69
+ which may be of independent interest.
70
+ Theorem 2. Let G = (L ⊔ R, E) be a (c, d)-biregular Ramanujan graph, and let ε > 0. Then there exists
71
+ δ > 0, that depends only on ε, c, d, such that for every S ⊂ L of size |S| ≤ δ|L|, the set N(S) ⊆ R of the
72
+ neighbours of S satisfies
73
+ c|S|
74
+ |N(S)| ≤ 1 + (1 + ε)
75
+
76
+ d − 1
77
+ c − 1 .
78
+ The theorem shows that every small set on the left side admits neighbours on the right side with low degree
79
+ in the induced subgraph. The proof involves recursive analysis of non-backtracking paths. Interestingly, the
80
+ recursion has a nice solution only when the graph is Ramanujan. It is unclear whether this method can be
81
+ extended to “nearly-Ramanujan” graphs.
82
+ Combining the average degree upper bound with the gadget, the low-degree right-side vertices in the
83
+ Ramanujan graph imply a small set of left-side vertices in the gadget; this set will have a unique neighbour
84
+ in the gadget, which gives (via Lemma 12) a unique neighbour in the constructed graph.
85
+ Even though Ramanujan graphs are the best spectral expanders one can hope for, an efficient construc-
86
+ tion of Ramanujan graphs (be them bipartite or not) does not immediately imply that we can construct
87
+ unique neighbour expanders. In the d-regular case, Kahale shows ([Kah95, Thm 5.2]) that there are nearly-
88
+ Ramanujan graphs with expansion at most d/2, which is not enough for unique neighbour expansion. In fact,
89
+ recently Kamber and Kaufman [KK22] proved that some Ramanujan graphs strongly fail to have unique
90
+ neighbour expansion, by giving explicit constructions of arbitrarily small sets that do not admit a unique
91
+ neighbour.
92
+ As mentioned, the graph product we define requires a fixed size gadget, whose proof of existence is not
93
+ constructive. In principle, such a gadget could be found by exhaustive search since we are working in a
94
+ constant size search space. The gadget’s size in our construction is at least cubic in q, so exhaustive search
95
+ is impractical for even small values of q. Unfortunately we know of no efficient construction of a gadget with
96
+ the required parameters. It is possible that the graph sampling method present in [AK19] can be used to
97
+ construct fixed size gadgets more efficiently.
98
+ The rest of this work is organized as follows. In Section 2 we survey some of the uses of unique neighbour
99
+ expanders, and mention known constructions of such graphs. Section 3 provides basic definitions and results.
100
+ Our main technical tool, that asserts the low induced degree in bipartite Ramanujan graph, is stated and
101
+ proven in Section 4. We prove the existence of a fixed-size gadget with good unique neighbour expansion
102
+ 2
103
+
104
+ properties in Section 5. In Section 6 we define the way we use the Ramanujan graphs and the gadget to
105
+ construct bipartite unique neighbour expanders, and by that prove Theorem 1.
106
+ 2
107
+ Related work
108
+ One of the prominent uses of bipartite expanders in general and bipartite unique neighbour expanders in
109
+ particular, and the motivation for this work, is the construction of error correcting codes. The works of
110
+ Tanner [Tan81] and later Sipser and Spielman [SS96] construct linear error correcting codes C(B, C0) from
111
+ a bipartite graph B and a smaller linear code C0. It is shown that under some assumptions on the code C0
112
+ and the expansion properties of the bipartite graph B, the resulting code has good distance. This gives a
113
+ way to take a family of graphs and transform it into a family of codes. Our work describes a construction
114
+ that, in a sense, goes the other way around: given two bipartite graphs, B and B0, we view B0 as a parity
115
+ check graph1 of the base code C0, and B plays the role of the underlying graph of a Tanner code C(B, C0).
116
+ Our output graph is just the parity check graph of C(B, C0). We give full details of this graph product in
117
+ Section 6.1.
118
+ In [DSW06; BV09] it is shown that codes constructed on top of unique neighbour expanders are weakly
119
+ smooth and can be used to construct robustly testable codes. But the uses of unique neighbour expanders are
120
+ not limited to error correcting codes: for example, such graphs may be used in the context of non-blocking
121
+ networks, where it is required to connect several input-output terminals via paths in a non-intersecting
122
+ fashion. Arora et al. [ALM96] use graphs with expansion beyond the d/2 barrier to establish the existence
123
+ of unique neighbours in the graph, which are useful in finding input-output paths in the online settings.
124
+ Roughly speaking, when routing a set of input-output pairs, the algorithm can use all unique neighbours
125
+ freely since they are guaranteed not to interfere with any other paths.
126
+ Pippenger [Pip93] uses explicit
127
+ constructions of spectral expanders in order to solve a similar problem, in the case where the route planning
128
+ is computed locally. There the spectral expansion of a graph is proven to imply a combinatorial expansion,
129
+ in a similar way to our Theorem 2.
130
+ Another use for unique neigbhour expanders is for load-balancing problems, such as the token distribution
131
+ problem described in [PU89], and the similar pebble distribution problem, briefly discussed in [AC02]. In
132
+ the latter, pebbles are placed arbitrarily on vertices of a graph, and need to be distributed via edges of the
133
+ graph such that no vertex has more than one pebble. Given that the total number of pebbles is small and
134
+ that the graph has the unique neighbour property, we have an efficient parallel algorithm for redistributing
135
+ the pebbles.
136
+ Alon and Capalbo [AC02] construct several families of unique neighbour expanders, one of them is a
137
+ family of bipartite graphs whose left side is 22/21 times bigger than the right side. Similar to the construction
138
+ presented at this work, each graph in the constructed family is a combination of a Ramanujan graph and a
139
+ fixed graph. These graphs are not (bi-)regular but their degrees are bounded by a constant. Becker [Bec16]
140
+ uses a different family of 8-regular Ramanujan graphs in order to construct a family of (non-bipartite) unique
141
+ neighbour expanders, with the additional property that each graph in the family is a Cayley graph.
142
+ A different approach to constructing bipartite graphs uses randomness conductors. Randomness conduc-
143
+ tors are functions that receive a bitstring with some entropy (according to some measure of entropy), and a
144
+ uniformly random bitstring, and output a bitstring, with certain guarantees on its entropy. Some conduc-
145
+ tors can be constructed explicitly via a spectral method, and Capalbo et al. [Cap+02] combine them in a
146
+ zig-zag-like fashion in order to construct an infinite family of bipartite lossless expanders, namely bipartite
147
+ graphs with fixed left-regularity c where small enough sets contained in the left side have at least c(1 − ε)
148
+ neighbours on the right side. These graphs are trivially unique neighbour expanders, since a simple counting
149
+ argument shows that if a set expands by a factor of more than c/2, then it has unique neighbours.
150
+ 1This is a bipartite graph whose incidence structure is given by the parity check matrix.
151
+ 3
152
+
153
+ 3
154
+ Preliminaries
155
+ 3.1
156
+ Expander graphs
157
+ In this work we deal with undirected graphs, that may contain multiple edges between two vertices, but do
158
+ not contain self-loops. For a graph G and a subset of its vertices S we denote by NG(S) the neighbourhood
159
+ of S, namely all vertices adjacent to some vertex in S. When the graph in discussion is obvious, we may
160
+ omit it and write N(S). We say that v is a unique neighbour of S if there is a unique u ∈ S that is adjacent
161
+ to v.
162
+ Let (Gn) be a series of graphs with the number of vertices growing to infinity. There are several well
163
+ studied notions of expansion in graph families; we note some of them.
164
+ 1. Vertex expansion. (Gn) is a (δ, α)-vertex expander if for every n and any subset S ⊆ VGn, if |S| ≤ δ|VGN |
165
+ we have that |NGN (S)| ≥ α|S|.
166
+ 2. Edge expansion. (Gn) is a (δ, α)-edge expander if for every n and any subset S ⊆ VGn, if |S| ≤ δ|VGN |
167
+ we have that at least an α-fraction of the edges with one endpoint in S have their other endpoint
168
+ outside of S.
169
+ 3. Spectral expansion. Assume that (Gn) are all d-regular, and let An be the adjacency operator associated
170
+ with Gn, so An is indexed by vertices of Gn and (An)uv counts how many edges there are between
171
+ u and v in Gn. Let λ1 ≥ . . . ≥ λVn be its spectrum. It can be seen that λ1 = d. Then (Gn) is a
172
+ λ-spectral expander if for all n and i ̸= 1 we have |λi| ≤ λ.
173
+ 4. Unique neighbour expansion. (Gn) is a δ-unique neighbour expander if for every n, any subset S ⊆ VGn
174
+ of size at most δ|VGN | has a unique neighbour.
175
+ These definitions apply to bipartite graphs Gn = (Ln ⊔ Rn, En) as well, with the exception that we usually
176
+ consider sets contained in the left side only, and require that Ln/Rn is a constant, normally greater than
177
+ 1. In this case we note that edge expansion is meaningless (since all edges leaving the left side enter the
178
+ right side), and if a bipartite graph is (c, d)-biregular, namely if all left-side vertices have degree c and all
179
+ right-side vertices have degree d, then the largest eigenvalue of the associated adjacency operator is
180
+
181
+ cd.
182
+ It can be seen that for d-regular graphs, the best spectral expansion we can hope for is α = 2
183
+
184
+ d − 1.
185
+ These graphs are known as Ramanujan graphs.
186
+ 3.2
187
+ Bipartite Ramanujan graphs
188
+ Ramanujan graphs have the best spectral gap [Nil91], and their non-trivial eigenvalues are contained in the
189
+ spectrum of the infinite d-regular tree Td. Similarly, in the bipartite case, Biregular Ramanujan graphs are
190
+ defined via their relation to the infinite biregular trees: the infinite (c, d)-biregular tree Tc,d, for d > c, has
191
+ the spectrum
192
+ λ ∈ spec(Tc,d) ⇔ |λ| ∈ {0} ∪
193
+ �√
194
+ d − 1 −
195
+
196
+ c − 1,
197
+
198
+ d − 1 +
199
+
200
+ c − 1
201
+
202
+ (see, e.g., [GM88], [LS96].) We therefore say that a finite (c, d)-biregular graph is bipartite Ramanujan if its
203
+ nontrivial eigenvalues lie in this set. That means that every eigenvalue λ of a bipartite Ramanujan graph
204
+ belongs to one of these classes:
205
+ 1. Trivial: λ = ±
206
+
207
+ cd, with eigenvectors fixed on either sides, or λ = 0;
208
+ 2. λ ∈ [
209
+
210
+ d − 1 − √c − 1,
211
+
212
+ d − 1 + √c − 1] are the nontrivial positive eigenvalues;
213
+ 3. λ ∈ [−√c − 1 −
214
+
215
+ d − 1, √c − 1 −
216
+
217
+ d − 1] are the nontrivial negative eigenvalues. Note that since the
218
+ graph is bipartite, λ is an eigenvalue if and only if −λ is an eigenvalue.
219
+ 4
220
+
221
+ By an extension of the Alon-Boppana bound, given in [FL96], this is the best spectral gap we can hope for,
222
+ at least as far as upper bounds for |λ| are concerned. We note that unlike the d-regular case, we require a
223
+ lower bound to |λ| too, which is essential for our proof.
224
+ While there is a vast literature on the construction of d-regular Ramanujan graph (most prominently
225
+ [LPS88] and [Mar88]), less is known about bipartite Ramanujan graphs. In 2014 Marcus et al. [MSS13]
226
+ proved the existence of biregular graphs with one-sided spectral graphs that resemble the Ramanujan bounds:
227
+ these graphs satisfy the one-sided inequality only, namely |λ| ≤
228
+
229
+ d − 1 + √c − 1 for every nontrivial eigen-
230
+ value λ. Gribinski et al. [GM21] showed a polynomial-time construction of such graphs, for every degrees
231
+ (d, kd) for any integers d, k. These graphs do not suffice for our analysis, since we make explicit use of the
232
+ lower bound |λ| ≥
233
+
234
+ d − 1 − √c − 1 too.
235
+ In 2021 Brito et al. [BDH22] proved that a random biregular graph is nearly Ramanujan with high
236
+ probability. Interestingly, and unlike other works in this field, our proof strongly relies on the graph to be
237
+ exactly Ramanujan, so we cannot use those constructions either.
238
+ We use an explicit construction of bipartite Ramanujan graphs (with both bounds on non-trivial eigen-
239
+ values) given by Ballantine et al.:
240
+ Theorem 3 ([Bal+15]). For every prime power q, there exists an explicit construction of a (q + 1, q3 + 1)-
241
+ biregular Ramanujan graph.
242
+ 4
243
+ Vertex expansion in biregular Ramanujan graphs
244
+ Our main technical tool is the following theorem showing that bipartite Ramanujan graphs exhibit excellent
245
+ left-to-right expansion. We restate the theorem for convenience.
246
+ Theorem 2. Let G = (L ⊔ R, E) be a (c, d)-biregular Ramanujan graph, and let ε > 0. Then there exists
247
+ δ > 0, that depends only on ε, c, d, such that for every S ⊂ L of size |S| ≤ δ|L|, the set N(S) ⊆ R of the
248
+ neighbours of S satisfies
249
+ c|S|
250
+ |N(S)| ≤ 1 + (1 + ε)
251
+
252
+ d − 1
253
+ c − 1 .
254
+ We note that the quantity on the left hand side of the inequality can be interpreted as follows. Look
255
+ at the bipartite graph induced by taking the vertices S on the left and N(S) on the right. Since every left
256
+ vertex has c outgoing edges, the total number of edges in the induced subgraph is c|S|. This means that
257
+ the expression on the left hand side of the inequality is exactly the average degree of the right side of the
258
+ induced subgraph. Interestingly, the bound in this theorem is strictly stronger than what we would get from
259
+ just applying the expander mixing lemma which amounts to
260
+ c|S|
261
+ |N(S)| ≤ (1 + ε) ·
262
+
263
+ 1 + d − 1
264
+ c − 1 + 2
265
+
266
+ d − 1
267
+ c − 1
268
+
269
+ .
270
+ See Claim 4 for details. The fact that we improve upon the expander mixing lemma is perhaps not surprising
271
+ since our analysis is based on enumerating non-backtracking paths, and not just on magnitude of the second
272
+ largest eigenvalue. We also use lower bounds on the magnitude of all nontrivial eigenvalues, whereas the
273
+ expander mixing lemma uses just upper bounds.
274
+ 4.1
275
+ Comparison to known bounds
276
+ As noted above, Theorem 2 is an improvement of the bound that the expander mixing lemma gives in similar
277
+ settings, which only uses the one-sided inequality |λ| ≤
278
+
279
+ d − 1 + √c − 1. For reference, we state and prove
280
+ the expander mixing lemma for bipartite Ramanujan graphs.
281
+ 5
282
+
283
+ Claim 4 (Expander mixing lemma for bipartite Ramanujan graphs). Let G = (L⊔R, E) be a (c, d)-biregular
284
+ Ramanujan graph, and let ε > 0. Then there exists δ > 0 such that for every S ⊆ L of size |S| ≤ δ|L|, the
285
+ neighbourhood of S satisfies
286
+ c|S|
287
+ |N(S)| ≤ (1 + ε)
288
+
289
+ 1 + d − 1
290
+ c − 1 + 2
291
+
292
+ d − 1
293
+ √c − 1
294
+
295
+ .
296
+ Proof. The expander mixing lemma for biregular graphs says that for every S ⊆ L, T ⊆ R we have
297
+ ����
298
+ |e(S, T)|
299
+ |E|
300
+ − |S|
301
+ |L| · |T|
302
+ |R|
303
+ ���� ≤
304
+ λ
305
+
306
+ cd
307
+
308
+ |S|
309
+ |L| · |T|
310
+ |R|
311
+ where λ is the second largest eigenvalue of G (see, e.g., [Hae95]). It is clarified that we consider the spectrum
312
+ of G as an adjacency operator, so the largest eigenvalue is
313
+
314
+ cd.
315
+ Picking T = N(S) means all edges coming out from S are in the cut, namely |e(S, T)| = c|S|. Plugging
316
+ that in gives
317
+ ����
318
+ c|S|
319
+ c|L| − |S|
320
+ |L| · |N(S)|
321
+ |R|
322
+ ���� ≤
323
+ λ
324
+
325
+ cd
326
+
327
+ |S|
328
+ |L| · |N(S)|
329
+ |R|
330
+ .
331
+ Multiplying both sides by |L|
332
+ |S| gives
333
+ ����1 − |N(S)|
334
+ |R|
335
+ ���� ≤
336
+ λ
337
+
338
+ cd
339
+
340
+ |S|
341
+ |L| · |N(S)|
342
+ |R|
343
+ · |L|
344
+ |S| =
345
+ λ
346
+
347
+ cd
348
+
349
+ |N(S)|
350
+ |R|
351
+ · |L|
352
+ |S| =
353
+ λ
354
+
355
+ cd
356
+
357
+ |N(S)|
358
+ |S|
359
+ ·
360
+
361
+ d
362
+ c = λ
363
+ c
364
+
365
+ |N(S)|
366
+ |S|
367
+ (1)
368
+ where we also used the fact that |E| = c|L| = d|R|.
369
+ Let us assume that |S| = α|L|. Then we can upper bound |N(S)| by
370
+ |N(S)| ≤ c|S| = αc|L| = αd|R|
371
+ and so we have
372
+ 1 − |N(S)|
373
+ |R|
374
+ ≥ 1 − dα|R|
375
+ |R|
376
+ = 1 − dα.
377
+ We square (1) and plug in the last inequality to get
378
+ (1 − dα)2 ≤ λ2
379
+ c · |N(S)|
380
+ c|S| .
381
+ Recall that G is bipartite Ramanujan, so |λ| ≤
382
+
383
+ d − 1 + √c − 1. Use that and rearrange:
384
+ c|S|
385
+ |N(S)| ≤ λ2
386
+ c (1 − dα)−2
387
+ ≤ d − 1 + c − 1 + 2
388
+
389
+ d − 1√c − 1
390
+ c
391
+ (1 − dα)−2
392
+ ≤ d − 1 + c − 1 + 2
393
+
394
+ d − 1√c − 1
395
+ c − 1
396
+ (1 − dα)−2
397
+ =
398
+
399
+ 1 + d − 1
400
+ c − 1 + 2
401
+
402
+ d − 1
403
+ √c − 1
404
+
405
+ (1 − dα)−2.
406
+ The claim is proven by noting that there is some δ > 0 such that (1 − dα)−2 ≤ 1 + ε for every α < δ, namely
407
+ whenever |S| ≤ δ|L|.
408
+ 6
409
+
410
+ Kahale proved ([Kah95, Thm 4.2]) that in d-regular Ramanujan graphs (not necessarily bipartite), small
411
+ induced subgraphs have average degree at most 1 +
412
+
413
+ d − 1. Interestingly, this result can be deduced almost
414
+ immediately from Theorem 2. This is due to the following lemma, proven in Appendix A, which asserts that
415
+ the edge-vertex incidence graph (see [SS96]) of a d-regular Ramanujan graph is a (2, d)-biregular Ramanujan
416
+ graph:
417
+ Lemma 5. Let G be a d-regular Ramanujan graph, and G′ its edge-vertex incidence graph. Then G′ is a
418
+ (2, d)-biregular Ramanujan graph.
419
+ We state and prove Kahale’s bound, but we will not use it in our construction.
420
+ Corollary 6. Let G = (VG, EG) be a d-regular Ramanujan graph, and let ε > 0. Then there exists δ > 0
421
+ such that for every induced subgraph S with at most δ|VG| vertices, the average degree of S is at most
422
+ dS := 2|ES|
423
+ |VS| ≤ 1 + (1 + ε)
424
+
425
+ d − 1.
426
+ Proof. Let G = (VG, EG) be a d-regular Ramanujan graph and ε > 0. We define G′ = (LG′ ⊔ RG′, EG′) as
427
+ the edge-vertex incidence graph, namely LG′ = EG, RG′ = VG, and for every edge e = {u, v} in G we have
428
+ the two edges {e, u} and {e, v} in G′. Since the degree of every vertex in G is d, and since every edge has
429
+ two endpoints, we have that G′ is a (2, d)-biregular graph. Lemma 5 asserts that G′ is Ramanujan in the
430
+ bipartite sense. By Theorem 2, there exists δ > 0 such that if T ⊆ LG′ is of size at most δ|LG′|, then
431
+ 2|T|
432
+ |NG′(T)| ≤ 1 + (1 + ε)
433
+
434
+ d − 1.
435
+ A subgraph S = (VS, ES) of G satisfies that ES is a subset of left-side vertices in G′, VS is a subset of
436
+ right-side vertices in G′, and VS = NG′(ES) (because if an edge is in the subgraph then both of its endpoints
437
+ are in the subgraph, and we assume that the subgraph does not contain an isolated vertex). Therefore, if ES
438
+ is sufficiently small, namely if |ES| ≤ δ|LG′| = δ|EG|, then by Theorem 2 the average degree of NG′(ES) = VS
439
+ is bounded by 1 + (1 + ε)
440
+
441
+ d − 1.
442
+ We add that if we wish to find a bound the number of vertices, we note that |ES| ≤ d
443
+ 2|VS|. So every
444
+ induced subgraph with no more than
445
+ 2
446
+ dδ|EG| = δ|VG| vertices will satisfy the required average degree
447
+ bound.
448
+ 4.2
449
+ Proof of Theorem 2
450
+ Theorem 2 is proven by enumerating non-backtracking paths. A non-backtracking path of length ℓ is a
451
+ sequence of edges ((s(ei), t(ei)))ℓ
452
+ i=1 such that for every i, t(ei) = s(ei+1) and s(ei) ̸= t(ei+1).
453
+ For a bipartite graph G and a subset S of left side vertices we define Mℓ(S) to be the number of all non-
454
+ backtracking paths whose all left-side vertices are in S, and Mℓ(S, G) to be the number of non-backtracking
455
+ paths whose first and last left-side vertices are in S. Clearly Mℓ(S) ≤ Mℓ(S, G), as paths of the latter type
456
+ may leave S ⊔N(S) (before re-entering S at the last step). We use a lower bound on Mℓ(S) due to [Kam19]:
457
+ Lemma 7. For every undirected bipartite graph G = (LG ⊔ RG, EG) and integer l it holds that
458
+ Mℓ(LG) ≥ |EG|
459
+ ��
460
+ ( ¯dL − 1)( ¯dR − 1)
461
+ �ℓ−1
462
+ where ¯dL, ¯dR are the average degrees of the left and right sides of G respectively.
463
+ We state and prove an upper bound on Mℓ(S, G):
464
+ 7
465
+
466
+ Lemma 8. Let G be a (c, d)-biregular Ramanujan graph with n vertices on the left side, and S a subset of
467
+ the left side. Then for every integer ℓ:
468
+ M2ℓ(S, G) ≤ |S|
469
+
470
+ (2 +
471
+
472
+ d − 1)ℓ + 2
473
+
474
+ (c − 1)ℓ/2(d − 1)ℓ/2
475
+ provided that S is small enough:
476
+ |S|(c − 1)ℓ/2(d − 1)ℓ/2 ≤ n.
477
+ (2)
478
+ Before proving the upper bound, we show how these bounds can be combined to obtain Theorem 2.
479
+ Proof of Theorem 2. Let ℓ be an integer to be determined later, S ⊆ L a sufficiently small subset (where
480
+ sufficiently smalls means (2)). Denote by N(S) ⊆ R the neighbours of S. The subgraph induced on S ∪N(S)
481
+ has c|S| edges, with left degrees all c and average right degree ¯dR =
482
+ c|S|
483
+ |N(S)|.
484
+ Chaining the inequalities in Lemma 7 and Lemma 8, we have
485
+ c|S|
486
+
487
+ (c − 1)( ¯dR − 1)
488
+ � 2ℓ−1
489
+ 2
490
+ ≤ M2ℓ(S) ≤ M2ℓ(S, VG) ≤ |S| ·
491
+
492
+ (2 +
493
+
494
+ d − 1)ℓ + 2
495
+
496
+ · (c − 1)ℓ/2(d − 1)ℓ/2.
497
+ Simplifying, we get,
498
+ c(c − 1)ℓ− 1
499
+ 2 ( ¯dR − 1)ℓ− 1
500
+ 2 ≤
501
+
502
+ (2 +
503
+
504
+ d − 1)ℓ + 2
505
+
506
+ · (c − 1)ℓ/2 · (d − 1)ℓ/2
507
+ ( ¯dR − 1)ℓ− 1
508
+ 2 ≤
509
+
510
+ (2 +
511
+
512
+ d − 1)ℓ + 2
513
+ � √c − 1
514
+ c
515
+ ��
516
+ d − 1
517
+ c − 1
518
+ �ℓ
519
+ ¯dR − 1 ≤
520
+
521
+
522
+
523
+
524
+
525
+ (2 +
526
+
527
+ d − 1)ℓ + 2
528
+ � √c − 1
529
+ � ¯d − 1
530
+ c
531
+
532
+ ��
533
+
534
+
535
+
536
+
537
+
538
+
539
+ 1/ℓ
540
+ ·
541
+
542
+ d − 1
543
+ c − 1
544
+ Since ¯d ≤ d, we have that ⋆ = O(ℓ), so ⋆1/ℓ = O(1), hence for a fixed ε > 0 there exists a constant ℓ (that
545
+ depends only on ε, c, d) such that ⋆1/ℓ ≤ 1 + ε; this ℓ determines, via inequality (2), a fixed δ such that
546
+ whenever |S| ≤ δn we have
547
+ ¯dR ≤ 1 + (1 + ε)
548
+
549
+ d − 1
550
+ c − 1 .
551
+ We proceed to prove Lemma 8.
552
+ For a bipartite graph G = (LG ⊔ RG, EG) and an integer ℓ, we define ALL
553
+
554
+ , ALR
555
+
556
+ , ARL
557
+
558
+ , ARR
559
+
560
+ as operators
561
+ corresponding to non-backtracking paths of length ℓ, i.e.
562
+ ALL
563
+
564
+ : L2(LG) → L2(LG)
565
+ ,
566
+ (ALL
567
+
568
+ f)(x) =
569
+
570
+ (e1,...,eℓ),t(eℓ)=x,s(e1),t(eℓ)∈LG
571
+ f(s(e1))
572
+ with the summation over all non-backtracking paths of length ℓ, and similarly for the other operators.
573
+ Let M be the operator corresponding to a single step from the right side G to the left side of G, namely
574
+ M has |RG| rows and |LG| columns, with Muv counting the number of edges between u ∈ RG and v ∈ LG
575
+ in G. Then the following recursive formulae hold for every integer ℓ > 1:
576
+ M ⊤ALL
577
+
578
+ = ARL
579
+ ℓ+1 + (d − 1)ARL
580
+ ℓ−1
581
+ M ⊤ALR
582
+
583
+ = ARR
584
+ ℓ+1 + (d − 1)ARR
585
+ ℓ−1
586
+ MARL
587
+
588
+ = ALL
589
+ ℓ+1 + (c − 1)ALL
590
+ ℓ−1
591
+ MARR
592
+
593
+ = ALR
594
+ ℓ+1 + (c − 1)ALR
595
+ ℓ−1
596
+ 8
597
+
598
+ The first formula is explained as follows.
599
+ Every non-backtracking path from R to L of length ℓ + 1 is
600
+ composed of a non-backtracking path from L to L of length ℓ plus an extra step (that’s the M ⊤ALL
601
+
602
+ factor.)
603
+ The opposite is true, except for paths counted in M ⊤ALL
604
+
605
+ that do backtrack, namely those made of a non-
606
+ backtracking path of length ℓ − 1, and walking back and forth along the same edge. There are d − 1 ways to
607
+ choose that edge (since it cannot be the one that was last in the path of length ℓ − 1, otherwise it wouldn’t
608
+ be counted in M ⊤ALL
609
+
610
+ ), so we need to subtract (d − 1)ARL
611
+ ℓ−1. The rest of the equations are explained in an
612
+ analog way.
613
+ Due to symmetry we have:
614
+ (ALL
615
+
616
+ )⊤ = ALL
617
+
618
+ ,
619
+ (ARR
620
+
621
+ )⊤ = ARR
622
+
623
+ ,
624
+ (ALR
625
+
626
+ )⊤ = ARL
627
+
628
+ And since the graph is bipartite we have:
629
+ ALR
630
+ 2ℓ = 0
631
+ ,
632
+ ARL
633
+ 2ℓ = 0
634
+ ALL
635
+ 2ℓ+1 = 0
636
+ ,
637
+ ARR
638
+ 2ℓ+1 = 0
639
+ These equations yield a recursive formula for ALL
640
+
641
+ , with the following initial conditions:
642
+ ALL
643
+ 2
644
+ = MM ⊤ − cI
645
+ ALL
646
+ 4
647
+ = MM ⊤ALL
648
+ 2
649
+ − (c − 1 + d − 1)ALL
650
+ 2
651
+ − c(d − 1)I
652
+ MM ⊤ALL
653
+
654
+ = ALL
655
+ ℓ+2 + ((c − 1) + (d − 1))ALL
656
+
657
+ + (c − 1)(d − 1)ALL
658
+ ℓ−2
659
+ ,
660
+ ∀ℓ ≥ 4
661
+ (3)
662
+ The following lemma, proven in Appendix A, suggests a way to find a non-recursive formula for ALL
663
+ 2ℓ , given
664
+ such linear recursive relations with fixed coefficients.
665
+ Lemma 9. Let (xn) be a series defined via a second order linear recurrence with fixed coefficients A, B ∈ C:
666
+ xn = Axn−1 + Bxn−2
667
+ Assume λ1 ̸= λ2 are (real or complex) roots of the characteristic polynomial λ2 − Aλ − B. Then there are
668
+ α, β ∈ C, that depend on the initial conditions x0, x1, such that
669
+ xn = αλn
670
+ 1 + βλn
671
+ 2
672
+ for every n ≥ 0.
673
+ If the characteristic polynomial has a single root λ of multiplicity 2, then there are α, β ∈ C such that
674
+ xn = αλn + βnλn
675
+ for every n ≥ 0.
676
+ We use the lemma to bound the eigenvalues of ALL
677
+ 2ℓ given bounds on the spectrum of the biregular graph.
678
+ Lemma 10. Let G be a (c, d)-biregular graph. Then there is a sequence of polynomials with integer coeffi-
679
+ cients (pℓ(x)) such that for every eigenpair (λ, v) of G, pℓ(λ2) is an eigenvalue of ALL
680
+ 2ℓ , and moreover, for
681
+ every λ ∈ R, if
682
+ |λ| ∈ {0} ∪ [
683
+
684
+ d − 1 −
685
+
686
+ c − 1,
687
+
688
+ d − 1 +
689
+
690
+ c − 1]
691
+ (4)
692
+ then
693
+ |pℓ(λ2)| ≤ (2 +
694
+
695
+ d − 1)ℓ(c − 1)ℓ/2(d − 1)ℓ/2.
696
+ (5)
697
+ 9
698
+
699
+ Proof. The recursive formulae proven above (3) suggest that there is a series of polynomials pn(x) with
700
+ integer coefficients such that ALL
701
+ 2n = pn(MM ⊤). Note that the graph’s adjacency matrix is
702
+ AG =
703
+ � 0
704
+ M
705
+ M ⊤
706
+ 0
707
+
708
+ And so, if (λ, v) is an eigenpair of G, then (λ2, v) is an eigenpair of
709
+ A2
710
+ G =
711
+ �MM ⊤
712
+ 0
713
+ 0
714
+ M ⊤M
715
+
716
+ .
717
+ This shows that pℓ(λ2) is an eigenvalue of ALL
718
+ 2ℓ whenever λ is an eigenvalue of G. The converse is also true.
719
+ The formulae (3) can be transformed so as to convey that pn(x) satisfies these equations:
720
+ p1(x) = x − c
721
+ ,
722
+ p2(x) = x2 + (2 − 2c − d)x + c(c − 1)
723
+ xpn(x) = pn+1(x) + (c − 1 + d − 1)pn(x) + (c − 1)(d − 1)pn−1(x)
724
+ for all n > 1. Setting n = 1 gives an equation involving p0(x), p1(x), p2(x). We can solve this equation for
725
+ p0(x) and get a simpler description of the initial conditions:
726
+ p0(x) =
727
+ c
728
+ c − 1
729
+ ,
730
+ p1(x) = x − c
731
+ (6)
732
+ xpn(x) = pn+1(x) + (c − 1 + d − 1)pn(x) + (c − 1)(d − 1)pn−1(x)
733
+ (7)
734
+ for all n > 0.
735
+ We fix some t that satisfies (4), namely such that
736
+ |t| ∈ {0} ∪ [
737
+
738
+ d − 1 −
739
+
740
+ c − 1,
741
+
742
+ d − 1 +
743
+
744
+ c − 1].
745
+ We first deal with the case where |t| ∈ (
746
+
747
+ d − 1 − √c − 1,
748
+
749
+ d − 1 + √c − 1), and later we will consider the
750
+ edge cases where t is one of the endpoints of the segment or 0. Let us write x = t2. We have that for this
751
+ fixed x, the series (pn(x))n satisfies a second order linear recurrence with fixed coefficients. Using Lemma 9,
752
+ we conclude that there are functions α(x), λ1(x), β(x), λ2(x) that depend only on x, c and d, such that
753
+ pn(x) = α(x)(λ1(x))n + β(x)(λ2(x))n
754
+ (8)
755
+ for every n.
756
+ In order to find λ1, λ2 we solve for λ the characteristic polynomial, namely the following quadratic
757
+ equation derived from (7):
758
+ xλ = λ2 + (c − 1 + d − 1)λ + (c − 1)(d − 1)
759
+ To obtain
760
+ λ1,2(x) = x − (c − 1) − (d − 1) ±
761
+
762
+ ∆(x)
763
+ 2
764
+ where
765
+ ∆(x) = x2 − 2x((c − 1) + (d − 1)) + (c − d)2.
766
+ (9)
767
+ Using the initial values for p0(x), p1(x) from (6), and plugging back into (8) we get the equations
768
+ c
769
+ c − 1 = α(x)(λ1(x))0 + β(x)(λ2(x))0 = α(x) + β(x)
770
+ x − c = α(x)(λ1(x))1 + β(x)(λ2(x))1 = α(x)λ1(x) + β(x)λ2(x)
771
+ 10
772
+
773
+ whose solution is
774
+ α(x) = (c − 1)x − (c − 1)2 − (c − 1) + (c − 1)(d − 1) + (c − 1)
775
+
776
+ ∆(x) − x + d − 1 +
777
+
778
+ ∆(x)
779
+ 2(c − 1)
780
+
781
+ ∆(x)
782
+ β(x) =
783
+ c
784
+ c − 1 − α(x).
785
+ We check when ∆(x) = 0 by solving (9) for x:
786
+ x1,2 = 2((c − 1) + (d − 1)) ±
787
+
788
+ 4(c − 1 + d − 1)2 − 4(c − d)2
789
+ 2
790
+ = (c − 1 + d − 1) ±
791
+
792
+ (c + d)2 − 4(c + d) + 4 − (c − d)2
793
+ = (c − 1 + d − 1) ±
794
+
795
+ c2 + 2cd + d2 − 4c − 4d + 4 − c2 + 2cd − d2
796
+ = (c − 1 + d − 1) ±
797
+
798
+ 4cd − 4c − 4d + 4
799
+ = (c − 1 + d − 1) ± 2
800
+
801
+ c − 1
802
+
803
+ d − 1
804
+ = (
805
+
806
+ d − 1 ±
807
+
808
+ c − 1)2
809
+ We see that ∆(x) is quadratic in x and has roots at (
810
+
811
+ d − 1 ± √c − 1)2. This gives a nice factorization of
812
+ ∆(x):
813
+ ∆(x) = x2 − 2x((c − 1) + (d − 1)) + (c − d)2
814
+ =
815
+
816
+ x −
817
+ �√
818
+ d − 1 +
819
+
820
+ c − 1
821
+ �2� �
822
+ x −
823
+ �√
824
+ d − 1 −
825
+
826
+ c − 1
827
+ �2�
828
+ Recall that for the x we fixed we have √x = t ∈ (
829
+
830
+ d − 1 − √c − 1,
831
+
832
+ d − 1 + √c − 1), so the first term in the
833
+ product is negative and the second term is positive, so ∆ < 0, and so λ1,2 are complex numbers (conjugate
834
+ to one another), with magnitude
835
+ |λ1,2|2 = (x − (c − 1) − (d − 1))2 − ∆(x)
836
+ 4
837
+ = x2 − 2x((c − 1) + (d − 1)) + (c − 1 + d − 1)2 − (x2 − 2x((c − 1) + (d − 1)) + (c − d)2)
838
+ 4
839
+ = (c + d − 2)2 − (c − d)2
840
+ 4
841
+ = (c − 1)(d − 1)
842
+ (10)
843
+ A very similar calculation shows that α, β are conjugates with magnitude
844
+ |α|2 = |β|2 =
845
+ x(x − cd)
846
+ ∆(x) · (c − 1)
847
+ This finishes the proof for all such x’s:
848
+ |pℓ(x)| = |α(x)λℓ
849
+ 1 + β(x)λℓ
850
+ 2| ≤ |α(x)λℓ
851
+ 1| + |β(x)λℓ
852
+ 2|
853
+ = |α(x)||λ1|ℓ + |β(x)||λ2|ℓ
854
+ = 2
855
+
856
+ x(x − cd)
857
+ ∆(x) · (c − 1)(c − 1)ℓ/2(d − 1)ℓ/2
858
+ We keep in mind that x is fixed, so the expression is smaller than (2 +
859
+
860
+ d − 1) · ℓ · (c − 1)ℓ/2(d − 1)ℓ/2 for
861
+ large enough ℓ.
862
+ We are left with the cases x = t2 for t = 0,
863
+
864
+ d − 1 ± √c − 1:
865
+ 11
866
+
867
+ 1. t = 0. We use the same methods and find that the characteristic polynomial is
868
+ λ2 + (c − 1 + d − 1)λ + (c − 1)(d − 1)
869
+ whose roots are
870
+ λ1 = −(c − 1)
871
+ ,
872
+ λ2 = −(d − 1).
873
+ Using the initial conditions (p0(0) = c/(c − 1), p1(0) = −c) we obtain
874
+ α(0) =
875
+ c
876
+ c − 1
877
+ ,
878
+ β(0) = 0
879
+ and using the fact that c < d we get
880
+ |pℓ(0)| = |α(0)λℓ
881
+ 1 + β(0)λℓ
882
+ 2|
883
+ =
884
+ c
885
+ c − 1(c − 1)ℓ
886
+ < 2l(c − 1)ℓ/2(c − 1)ℓ/2
887
+ < 2l(c − 1)ℓ/2(d − 1)ℓ/2.
888
+ 2. t =
889
+
890
+ d − 1 + √c − 1. Then x = t2 = (
891
+
892
+ d − 1 + √c − 1)2 = d − 1 + c − 1 + 2
893
+
894
+ d − 1√c − 1, and the
895
+ characteristic polynomial has a single root of multiplicity 2, namely
896
+ λ = x − (c − 1) − (d − 1)
897
+ 2
898
+ =
899
+
900
+ d − 1
901
+
902
+ c − 1.
903
+ The solution, therefore, takes the form
904
+ pn(x) = (α(x) + nβ(x))(c − 1)n/2(d − 1)n/2.
905
+ Using the initial values we get
906
+ α(x) =
907
+ c
908
+ c − 1
909
+ ,
910
+ β(x) =
911
+ x − c
912
+
913
+ d − 1√c − 1 −
914
+ c
915
+ c − 1 = 2 +
916
+ d − 2
917
+
918
+ d − 1√c − 1 −
919
+ c
920
+ c − 1.
921
+ 1 <
922
+ c
923
+ c−1 ≤ 2 so β(x) ≤
924
+
925
+ d − 1 + 1, and in total we get
926
+ |pℓ(x)| = |α(x) + ℓβ(x)|(c − 1)ℓ/2(d − 1)ℓ/2
927
+
928
+ �����
929
+ 1
930
+ ℓ ·
931
+ c
932
+ c − 1
933
+ ���� + |β(x)|
934
+
935
+ ℓ(c − 1)ℓ/2(d − 1)ℓ/2
936
+
937
+
938
+ 2 +
939
+
940
+ d − 1
941
+
942
+ ℓ(c − 1)ℓ/2(d − 1)ℓ/2
943
+ For sufficiently large ℓ.
944
+ 3. t =
945
+
946
+ d − 1 − √c − 1. We get x = t2 = d − 1 + c − 1 − 2
947
+
948
+ d − 1√c − 1, and the rest follows the same
949
+ calculations as in the previous case.
950
+ Bounds on the spectrum of ALL
951
+ 2ℓ give bounds on the number of non-backtracking paths completely con-
952
+ tained in a small set, hence gives Lemma 8.
953
+ 12
954
+
955
+ Proof of Lemma 8. Recall that M2ℓ(S, G) counts the number of non-backtracking paths of length 2ℓ that
956
+ start and end in S, so by the definition of the ALL
957
+ n
958
+ operatore, we have M2ℓ(S, G) = ⟨ALL
959
+ 2ℓ 1S, 1S⟩.
960
+ We note that ALL
961
+ 2ℓ 1L = c(c − 1)ℓ−1(d − 1)ℓ1L, because every non-backtracking path starting at a given
962
+ vertex is made of picking the first left-to-right edge (we have c such edges to pick from), and then alternating
963
+ between picking any of the d or c edges adjacent to the current vertex, except for the edge we picked to get
964
+ to it.
965
+ Write 1S =
966
+ |S|
967
+ n 1L + r, with r ⊥ 1L, and ∥r∥2
968
+ 2 ≤ ∥1S∥2
969
+ 2 = |S|. Since the graph is Ramanujan, the
970
+ nontrivial eigenvalues in its spectral decomposition have their absolute value in the set {0} ∪ [
971
+
972
+ d − 1 −
973
+ √c − 1,
974
+
975
+ d − 1 + √c − 1].
976
+ We only care about the nontrivial eigenvalues because r ⊥ 1L, hence in the
977
+ writing of r in the orthogonal basis made of eigenvectors, only eigenvectors with nontrivial eigenvalues
978
+ appear. We use Lemma 10 to get
979
+ ⟨ALL
980
+ 2ℓ r, r⟩ ≤ (2 +
981
+
982
+ d − 1)ℓ(c − 1)ℓ/2(d − 1)ℓ/2 · ∥r∥2
983
+ 2 .
984
+ Combine everything to get
985
+ M2ℓ(S, G) = ⟨ALL
986
+ 2ℓ 1S, 1S⟩ =
987
+
988
+ ALL
989
+ 2ℓ
990
+ |S|
991
+ n 1L + r, |S|
992
+ n 1L + r
993
+
994
+ = |S|2
995
+ n2 ⟨ALL
996
+ 2ℓ 1L, 1L⟩ + ⟨ALL
997
+ 2ℓ r, r⟩
998
+ = |S|2
999
+ n2 · c(c − 1)ℓ−1(d − 1)ℓ⟨1L, 1L⟩ + ⟨ALL
1000
+ 2ℓ r, r⟩
1001
+ ≤ |S|2
1002
+ n c(c − 1)ℓ−1(d − 1)ℓ + (2 +
1003
+
1004
+ d − 1)ℓ(c − 1)ℓ/2(d − 1)ℓ/2 ∥r∥2
1005
+ 2
1006
+ ≤ |S|
1007
+ �|S| · c · (c − 1)ℓ/2(d − 1)ℓ/2
1008
+ n(c − 1)
1009
+ + (2 +
1010
+
1011
+ d − 1)ℓ
1012
+
1013
+ (c − 1)ℓ/2(d − 1)ℓ/2
1014
+ ≤ |S|
1015
+
1016
+ c
1017
+ c − 1 + (2 +
1018
+
1019
+ d − 1)ℓ
1020
+
1021
+ (c − 1)ℓ/2(d − 1)ℓ/2
1022
+ ≤ |S|
1023
+
1024
+ (2 +
1025
+
1026
+ d − 1)ℓ + 2
1027
+
1028
+ (c − 1)ℓ/2(d − 1)ℓ/2
1029
+ 5
1030
+ Random gadget
1031
+ In this section we prove the existence of bipartite graphs such that every small set of left-side vertices has
1032
+ a unique neighbour on the right side. We draw a random biregular graph from a similar distribution as in
1033
+ [Pip77], and use techniques similiar to [Vad+12, Thm 4.4].
1034
+ Lemma 11. For every integers L, R, c, d with Lc = Rd, L > R, c > 3, if k is an integer that satisfies the
1035
+ inequality
1036
+ k
1037
+ c−3
1038
+ 2
1039
+
1040
+ 1
1041
+ 2Le ·
1042
+ � R
1043
+ 3ec
1044
+ � c−1
1045
+ 2
1046
+ then there is a (c, d)-biregular graph with sides [L] and [R] such that every set of left vertices of size at most
1047
+ k has a unique neighbour.
1048
+ We draw a random (c, d)-biregular graph in the following way: fix L vertices on the left side and R
1049
+ vertices on the right side (cL = dR), write c copies of each left-side vertex and d copies of each right-side
1050
+ vertex, and connect them via a uniformly random matching. That is, pick a uniformly random permutation
1051
+ π : L × [c] → R × [d], and for every u ∈ L, v ∈ R, i ∈ [c], j ∈ [d], if π(u, i) = (v, j), then add (u, v) as an edge.
1052
+ Note that we allow multiple edges between two vertices (if there are several i, j satisfying π(u, i) = (v, j)).
1053
+ 13
1054
+
1055
+ Let G be a random bipartite graph with L vertices on the left side and R vertices on the right side drawn
1056
+ from said distribution. Let A be a subset of left vertices of size k. We note that if A expands by at least
1057
+ (c + 1)/2, then, by a simple counting argument, A has a unique neighbour. It is therefore sufficient to find
1058
+ the probability that A expands by at least (c + 1)/2.
1059
+ Let us fix an arbitary ordering of the ck edges leaving A, and denote it e1, . . . , eck. We say that ei is a
1060
+ repeat if it touches a previously covered vertex, that is, if its right endpoint is contained in the set of right
1061
+ endpoints of the set e1, . . . , ei−1. We note that if A does not expand by at least (c + 1)/2, then, again by a
1062
+ simple counting argument, there are at least (c − 1)k/2 repeats. This is because the number of repeats and
1063
+ the size of the set of the neighbours of A add up to the number of edges leaving A, namely ck.
1064
+ We note that for every i, ei is a repeat if it touches one of i − 1 or less previously covered vertices. This
1065
+ means that Pr[ei is a repeat] ≤ i−1
1066
+ R < ck
1067
+ R . Moreover, if we condition on the event that some of the first i − 1
1068
+ edges are also repeats, then the probability that ei is a repeat may only decrease, since it means that there
1069
+ are less “forbidden” endpoints. We conclude that for every set of l edges:
1070
+ Pr[ei1, . . . , eil are repeats] =
1071
+ l�
1072
+ j=1
1073
+ Pr[eij is a repeat | ei1, . . . eij−1 are repeats] <
1074
+ �ck
1075
+ R
1076
+ �l
1077
+ .
1078
+ If A expands too little, then there are many repeats. We can use it to bound the probability that A has
1079
+ no unqiue neighbour:
1080
+ Pr[A has no unique neighbour] ≤ Pr[A expands by < (c + 1)/2]
1081
+ ≤ Pr[there are at least (c − 1)k/2 repeats]
1082
+
1083
+
1084
+ i1,...,i(c−1)k/2∈(
1085
+ ck
1086
+ (c−1)k/2)
1087
+ Pr[{ei1, . . . , ei(c−1)k/2} are repeats]
1088
+ <
1089
+ � ck
1090
+ c−1
1091
+ 2 k
1092
+
1093
+ ·
1094
+ �ck
1095
+ R
1096
+ � c−1
1097
+ 2 k
1098
+ And by a union bound over the possible choices of A:
1099
+ Pr[∃ “bad” A of size k] ≤
1100
+ �L
1101
+ k
1102
+
1103
+ · Pr[A expands by < (c + 1)/2]
1104
+
1105
+ �L
1106
+ k
1107
+
1108
+ ·
1109
+ � ck
1110
+ c−1
1111
+ 2 k
1112
+
1113
+ ·
1114
+ �ck
1115
+ R
1116
+ � c−1
1117
+ 2 k
1118
+
1119
+ �Le
1120
+ k
1121
+ �k
1122
+ ·
1123
+ � cke
1124
+ c−1
1125
+ 2 k
1126
+ � c−1
1127
+ 2 k
1128
+ ·
1129
+ �ck
1130
+ R
1131
+ � c−1
1132
+ 2 k
1133
+ =
1134
+
1135
+ Le
1136
+ k ·
1137
+ � 2ce
1138
+ c − 1 · ck
1139
+ R
1140
+ � c−1
1141
+ 2 �k
1142
+
1143
+
1144
+ Le
1145
+ k ·
1146
+ �3eck
1147
+ R
1148
+ � c−1
1149
+ 2 �k
1150
+ (11)
1151
+ Where the last inequality follows from assuming that c ≥ 3 so
1152
+ 2c
1153
+ c−1 ≤ 3.
1154
+ We are now ready to prove Lemma 11.
1155
+ Proof of Lemma 11. Let us draw a (c, d)-biregular graph G = ([L] ⊔ [R], E) from the distribution described
1156
+ above. Let k be an integer satsifying (11). Using a union bound and the inequality in (11), we have (where
1157
+ 14
1158
+
1159
+ probability is taken over the choice of G):
1160
+ Pr[∃ “bad” A ⊆ [L] of size ≤ k] =
1161
+ k
1162
+
1163
+ a=1
1164
+ Pr[∃ “bad” A ⊆ [L] of size a]
1165
+
1166
+ k
1167
+
1168
+ a=1
1169
+
1170
+ Le
1171
+ a ·
1172
+ �3eca
1173
+ R
1174
+ � c−1
1175
+ 2 �a
1176
+ <
1177
+
1178
+
1179
+ a=1
1180
+
1181
+ Le
1182
+ k ·
1183
+ �3eck
1184
+ R
1185
+ � c−1
1186
+ 2 �a
1187
+ =
1188
+
1189
+
1190
+ a=1
1191
+
1192
+ k
1193
+ c−1
1194
+ 3
1195
+ · Le ·
1196
+ �3ec
1197
+ R
1198
+ � c−1
1199
+ 2 �a
1200
+
1201
+
1202
+
1203
+ a=1
1204
+ �1
1205
+ 2
1206
+ �a
1207
+ < 1.
1208
+ We see that with strictly positive probability, a random graph has no “bad” subsets of size ≤ k, hence there
1209
+ exists a graph with the desired unique neighbour property.
1210
+ 6
1211
+ Construction
1212
+ 6.1
1213
+ Routed product definition
1214
+ Let us begin with a brief coding theory motivation. An error-correcting code is often given via an m × n
1215
+ parity check matrix H, so that C = Ker H ⊆ {0, 1}n. The matrix H can be visualized as a bipartite graph,
1216
+ called the parity check graph, with n left and m right vertices, and an edge i ∼ j whenever H(j, i) ̸= 0. A
1217
+ Tanner code is defined given a bipartite graph B and a base code C0 = Ker H0 [Tan81]. One way to view
1218
+ the routed product is through the point of view of codes. Consider the parity check graph B0 of H0 and
1219
+ define the routed product of B and B0 to be simply the parity check graph of the Tanner code C(B, C0).
1220
+ Here is a more detailed and combinatorial definition of the routed product without mention of codes.
1221
+ Let G = (L ⊔ R, E) be a (c, d)-biregular graph and G0 = (L0 ⊔ R0, E0) a (c0, d0)-biregular graph.
1222
+ We
1223
+ think of G as a big graph (in practice, an infinite family of Ramanujan graphs), and G0 as a fixed size graph
1224
+ (gadget). Assume that |L0| = d, and let us think of the edges of G as a function E : R × [d] → L which
1225
+ maps a right side vertex v and an index i to the ith neighbour of v in G.
1226
+ We can define the routed product graph G′ = G ◦ G0 as the bipartite graph whose left side is L, right
1227
+ side is the cartesian product R × R0, and the set of edges is
1228
+ E′ = {(E(v, i), (v, j)) : v ∈ R, i ∈ [d], j ∈ [R0], (i, j) ∈ E0}.
1229
+ That is, we write R0 copies of each vertex in R, and every right side vertex v in the big graph G and an
1230
+ edge (i, j) in the small gadget G0 gives an edge between the ith neighbour of v in G, and the jth vertex of
1231
+ the copy of G0 assigned to v in G′. Otherwise put, we use G0 to route every edge of the big graph G to c0
1232
+ edges in the product graph G′.
1233
+ More precisely, for every v ∈ R, the bipartite subgraph of G′ whose left side is NG(v) and right side
1234
+ is (v, ·) is isomorphic to G0. This means that, roughly speaking, unique neighbours are inherited from the
1235
+ small graph to the product graph:
1236
+ Lemma 12. Let S ⊆ L, v ∈ NG(S). Define S′ = {i : E(v, i) ∈ S} ⊆ [d] as the indexed neighbours of v in
1237
+ S. If S′, as a set of vertices in the gadget G0, has a unique neighbour j ∈ R0 in G0, then (v, j) is a unique
1238
+ neighbour of S in the product graph G′.
1239
+ The proof is immediate while staring at Fig. 1, but for the sake of completion it is given in Appendix A.
1240
+ 15
1241
+
1242
+ Figure 1: An example of a bipartite graph G (dashed, red), a small gadget G0 (dotted, green), and the
1243
+ routed product G′ = G ◦ G0 (solid, blue). The set S ⊆ L has a neighbour v ∈ R, and so S is associated with
1244
+ a set S′ of left side vertices of the copy of G0 associated with v. Since (i′, j) is the only edge connecting j
1245
+ to S′ in G0, we have that (v, j) is a unique neighbour of S in G′.
1246
+ 16
1247
+
1248
+ S6.2
1249
+ Proof of Theorem 1
1250
+ Let q be a prime power, c0 an integer, and α > 1. Assume that αc0(q + 1) is an integer. We construct an
1251
+ infinite family of (c0(q + 1), αc0(q + 1))-biregular graphs with the unique neighbour property under some
1252
+ assumptions specified below.
1253
+ Denote c = q + 1 and d = q3 + 1. By Theorem 3 there is an efficient construction of an infinite family
1254
+ of (c, d)-biregular Ramanujan graphs (Gn). Let G0 = (L0 ⊔ R0, E0) be a gadget: a c0-left-regular bipartite
1255
+ graph with |L0| = d = q3 + 1 vertices on the left side and R0 vertices on the right side, such that every
1256
+ left-side set of sufficiently small size admits a unique neighbour on the right side, where “sufficiently small”
1257
+ here means the bound given in Lemma 11. For the constructed graph to have the left side α times bigger
1258
+ than the right side, we set R0 =
1259
+ d
1260
+ αc =
1261
+ q3+1
1262
+ α(q+1).
1263
+ We define G′
1264
+ n = Gn ◦ G0 as the routed product of Gn and G0. For the rest of this (short) proof let us
1265
+ suppress n from the notation, for convenience.
1266
+ Let ε < 1
1267
+ q. By Theorem 2, there exists δ > 0 such that for every S ⊆ L of size at most δ|L|, the “average
1268
+ right degree” ¯dS, namely the average of the degrees of vertices in NG(S) in the induced subgraph S ⊔NG(S),
1269
+ is bounded:
1270
+ ¯dS :=
1271
+ c|S|
1272
+ |NG(S)| ≤ 1 + (1 + ε)
1273
+
1274
+ d − 1
1275
+ c − 1 .
1276
+ We show that such S has a unique neighbour in G′.
1277
+ We note that d−1
1278
+ c−1 = q2, so since ε < 1
1279
+ q we have a vertex v ∈ R of “degree” at most q + 1 in G, that is, the
1280
+ set S′ ⊆ [d] of v’s neighbours in S is of size at most q + 1. By Lemma 12, if S′, as a set of left-side vertices
1281
+ in G0, has a unique neighbour j in G0, then our original set S has a unique neighbour (v, j) in G.
1282
+ It remains to choose the parameters in a way that all left-side sets of size at most q + 1 have a unique
1283
+ neighbour in G0. By Lemma 11, we need to have:
1284
+ (q + 1)
1285
+ c0−3
1286
+ 2
1287
+
1288
+ 1
1289
+ 2(q3 + 1)e ·
1290
+
1291
+
1292
+ q3+1
1293
+ α(q+1)
1294
+ 3ec0
1295
+
1296
+
1297
+ c0−1
1298
+ 2
1299
+ .
1300
+ (12)
1301
+ The LHS is O(q
1302
+ c0−3
1303
+ 2 ) and RHS is Θ(qc0−4), so if c0 > 5 then for sufficiently large q the construction gives a
1304
+ unique neighbour expander. That is, there exists some ˆq(c0, α) such that if q > ˆq then (12) holds, hence we
1305
+ constructed a bipartite unique neighbour expander as promised in Theorem 1.
1306
+ 7
1307
+ Future work
1308
+ The main pitfall of our approach is the non-constructive nature of the gadget. Theoretically since the gadget
1309
+ has constant size this is no issue. However, exhaustive search is impractical even for small values of q. This
1310
+ is because the gadget’s size is cubic in q so the search space is of size exponential in q3. A natural question
1311
+ would be whether it is possible to construct such a gadget in an efficient way, since that would lead to the
1312
+ whole unique neighbour expander family to be constructible in practice. For the bipartite Ramanujan family
1313
+ chosen in our work (the one by Ballantine et al. [Bal+15]) we ask the following.
1314
+ Question 13. For which prime power q and real number α ≥ 1 can one construct efficiently a biregular
1315
+ graph with left side q3 + 1, right side
1316
+ q3+1
1317
+ α(q+1), such that every left side set of size at most q + 1 has a unique
1318
+ neighbour?
1319
+ We note that the fixed size graph given in [AC02, Lemma 4.3] is a good gadget (for α = 22/21 and the
1320
+ edge-vertex incidence graphs of a 44-regular Ramanujan graph family), and indeed these graphs can be used
1321
+ to construct bipartite unique neighbour expanders.
1322
+ Since we prove that a random gadget is, with non-negligble probability, good for our construction, it
1323
+ may be interesting to construct such gadget by simply drawing random gadgets and testing whether they
1324
+ are good. Since drawing is simple, we are left with the task of testing. We therefore ask:
1325
+ 17
1326
+
1327
+ Question 14. Given a bipartite graph, can one efficiently find the smallest nonempty set of left-side vertices
1328
+ that has no unique neighbours?
1329
+ We currently know of no better way than just enumerating all left-side sets, which is exponential in the
1330
+ size of the graph, hence impractical. We refer to [AK19] for an interesting approach to testing expansion of
1331
+ random graphs.
1332
+ The methods presented in this work are not limited to the (q+1, q3 +1)-biregular Ramanujan family. We
1333
+ can therefore ask the question the other way around – find a gadget (by sampling or any other way), and see
1334
+ whether we can efficiently construct a bipartite Ramanujan family that will make it work, i.e. that would
1335
+ allow us to rewrite the proof of Theorem 1. This emphasizes the well-known natural question of constructing
1336
+ Ramanujan graphs with arbitrary degrees, specifically in the bipartite and biregular setting,
1337
+ Question 15. For which integers c < d can one construct efficiently an infinite family of (c, d)-biregular
1338
+ Ramanujan graphs?
1339
+ We note that our construction is far from “right-side unique neighbour expansion,” as the complete right
1340
+ side of a single gadget is a constant-size set with no unique neighbours on the left. We wonder whether it is
1341
+ possible to construct a bipartite graph where all small size sets (be them contained in either sides, or both)
1342
+ have unique neighbours.
1343
+ 18
1344
+
1345
+ References
1346
+ [AC02]
1347
+ Noga Alon and Michael Capalbo. “Explicit unique-neighbor expanders”. In: The 43rd Annual
1348
+ IEEE Symposium on Foundations of Computer Science, 2002. Proceedings. IEEE. 2002, pp. 73–
1349
+ 79.
1350
+ [AK19]
1351
+ Benny Applebaum and Eliran Kachlon. “Sampling graphs without forbidden subgraphs and un-
1352
+ balanced expanders with negligible error”. In: 2019 IEEE 60th Annual Symposium on Foundations
1353
+ of Computer Science (FOCS). IEEE. 2019, pp. 171–179.
1354
+ [ALM96]
1355
+ Sanjeev Arora, Frank Thomson Leighton, and Bruce M Maggs. “On-line algorithms for path
1356
+ selection in a nonblocking network”. In: SIAM Journal on Computing 25.3 (1996), pp. 600–625.
1357
+ [Bal+15]
1358
+ Cristina Ballantine, Brooke Feigon, Radhika Ganapathy, Janne Kool, Kathrin Maurischat, and
1359
+ Amy Wooding. “Explicit construction of Ramanujan bigraphs”. In: Women in numbers europe.
1360
+ Springer, 2015, pp. 1–16.
1361
+ [BDH22]
1362
+ Gerandy Brito, Ioana Dumitriu, and Kameron Decker Harris. “Spectral gap in random bipartite
1363
+ biregular graphs and applications”. In: Combinatorics, Probability and Computing 31.2 (2022),
1364
+ pp. 229–267.
1365
+ [Bec16]
1366
+ Oren Becker. “Symmetric unique neighbor expanders and good LDPC codes”. In: Discrete Applied
1367
+ Mathematics 211 (2016), pp. 211–216. issn: 0166-218X. doi: https://doi.org/10.1016/
1368
+ j.dam.2016.04.022. url: https://www.sciencedirect.com/science/article/pii/
1369
+ S0166218X16301810.
1370
+ [BV09]
1371
+ Eli Ben-Sasson and Michael Viderman. “Tensor products of weakly smooth codes are robust”.
1372
+ In: Theory of Computing 5.1 (2009), pp. 239–255.
1373
+ [Cap+02]
1374
+ Michael Capalbo, Omer Reingold, Salil Vadhan, and Avi Wigderson. “Randomness conductors
1375
+ and constant-degree expansion beyond the degree/2 barrier”. In: Proceedings of the 34th Annual
1376
+ ACM Symposium on Theory of Computing. 2002, pp. 659–668.
1377
+ [DSW06]
1378
+ Irit Dinur, Madhu Sudan, and Avi Wigderson. “Robust local testability of tensor products of
1379
+ LDPC codes”. In: Approximation, Randomization, and Combinatorial Optimization. Algorithms
1380
+ and Techniques. Springer, 2006, pp. 304–315.
1381
+ [FL96]
1382
+ Keqin Feng and Wen-Ch’ing Winnie Li. “Spectra of hypergraphs and applications”. In: Journal
1383
+ of number theory 60.1 (1996), pp. 1–22.
1384
+ [GM21]
1385
+ Aurelien Gribinski and Adam W Marcus. “Existence and polynomial time construction of bireg-
1386
+ ular, bipartite Ramanujan graphs of all degrees”. In: arXiv preprint arXiv:2108.02534 (2021).
1387
+ [GM88]
1388
+ Chris D Godsil and Bojan Mohar. “Walk generating functions and spectral measures of infinite
1389
+ graphs”. In: Linear Algebra and its Applications 107 (1988), pp. 191–206.
1390
+ [Hae95]
1391
+ Willem H Haemers. “Interlacing eigenvalues and graphs”. In: Linear Algebra and its applications
1392
+ 226 (1995), pp. 593–616.
1393
+ [Kah95]
1394
+ Nabil Kahale. “Eigenvalues and expansion of regular graphs”. In: Journal of the ACM (JACM)
1395
+ 42.5 (1995), pp. 1091–1106.
1396
+ [Kam19]
1397
+ Amitay Kamber. Lp Expander Graphs. 2019. arXiv: 1609.04433 [math.CO].
1398
+ [KK22]
1399
+ Amitay Kamber and Tali Kaufman. “Combinatorics via closed orbits: number theoretic Ramanu-
1400
+ jan graphs are not unique neighbor expanders”. In: Proceedings of the 54th Annual ACM SIGACT
1401
+ Symposium on Theory of Computing. 2022, pp. 426–435.
1402
+ [LPS88]
1403
+ Alexander Lubotzky, Ralph Phillips, and Peter Sarnak. “Ramanujan graphs”. In: Combinatorica
1404
+ 8.3 (1988), pp. 261–277.
1405
+ [LS96]
1406
+ Wen-Ch’ing Winnie Li and Patrick Solé. “Spectra of Regular Graphs and Hypergraphs and
1407
+ Orthogonal Polynomials”. In: European Journal of Combinatorics 17.5 (1996), pp. 461–477. doi:
1408
+ https://doi.org/10.1006/eujc.1996.0040.
1409
+ 19
1410
+
1411
+ [Mar88]
1412
+ G. A. Margulis. “Explicit group-theoretical constructions of combinatorial schemes and their
1413
+ application to the design of expanders and concentrators”. In: Problemy peredachi informatsii
1414
+ 24.1 (1988), pp. 51–60.
1415
+ [MSS13]
1416
+ Adam Marcus, Daniel A Spielman, and Nikhil Srivastava. “Interlacing families I: Bipartite Ra-
1417
+ manujan graphs of all degrees”. In: 2013 IEEE 54th Annual Symposium on Foundations of com-
1418
+ puter science. IEEE. 2013, pp. 529–537.
1419
+ [Nil91]
1420
+ Alon Nilli. “On the second eigenvalue of a graph”. In: Discrete Mathematics 91.2 (1991), pp. 207–
1421
+ 210.
1422
+ [Pip77]
1423
+ Nicholas Pippenger. “Superconcentrators”. In: SIAM Journal on Computing 6.2 (1977), pp. 298–
1424
+ 304.
1425
+ [Pip93]
1426
+ Nicholas Pippenger. “Self-routing superconcentrators”. In: Proceedings of the twenty-fifth annual
1427
+ ACM symposium on Theory of Computing. 1993, pp. 355–361.
1428
+ [PU89]
1429
+ David Peleg and Eli Upfal. “The token distribution problem”. In: SIAM journal on computing
1430
+ 18.2 (1989), pp. 229–243.
1431
+ [SS96]
1432
+ Michael Sipser and Daniel A Spielman. “Expander codes”. In: IEEE transactions on Information
1433
+ Theory 42.6 (1996), pp. 1710–1722.
1434
+ [Tan81]
1435
+ R Tanner. “A recursive approach to low complexity codes”. In: IEEE Transactions on information
1436
+ theory 27.5 (1981), pp. 533–547.
1437
+ [Vad+12]
1438
+ Salil P Vadhan et al. “Pseudorandomness”. In: Foundations and Trends in Theoretical Computer
1439
+ Science 7.1–3 (2012).
1440
+ 20
1441
+
1442
+ 8
1443
+ Appendix A
1444
+ We restate and prove the lemmas we used throughout the work.
1445
+ Lemma 5. Let G be a d-regular Ramanujan graph, and G′ its edge-vertex incidence graph. Then G′ is a
1446
+ (2, d)-biregular Ramanujan graph.
1447
+ Proof. Let G = (V, E) a d-regular Ramanujan graph. The adjacency matrix of G′ is A =
1448
+ � 0
1449
+ M
1450
+ M ⊤
1451
+ 0
1452
+
1453
+ where
1454
+ M has |E| rows, each containing two 1’s, and |V | columns, each containing d 1’s. Let v be an eigenvector of
1455
+ A with eigenvalue λ; then v is an eigenvector of A2 with eigenvalue λ2. We note that
1456
+ A2 =
1457
+
1458
+ MM ⊤
1459
+ 0
1460
+ 0
1461
+ M ⊤M
1462
+
1463
+ so it suffices to consider the spectrum of M ⊤M, which is essentially the operator corresponding to a walk
1464
+ from a vertex of G to an edge that touches it and back to one of its endpoints (possibly the same vertex we
1465
+ started at).
1466
+ For every v ∈ V , there are d ways to walk from it to an edge and then back to v; all other legal paths
1467
+ correspond to picking an edge touching v. We conclude that M ⊤M = dI + A, so every eigenvalue λ of G′
1468
+ satisfies λ2 = d + σ where σ is an eigenvalue of G.
1469
+ The lemma is proven by noting that |σ| ≤ 2
1470
+
1471
+ d − 1 (since G is Ramanujan), so
1472
+ d − 2
1473
+
1474
+ d − 1 ≤ λ2 ≤ d + 2
1475
+
1476
+ d − 1
1477
+ The terms on the extreme sides of the inequality can be verified to be (
1478
+
1479
+ d − 1 ± 1)2 so we get |λ| ∈
1480
+ [
1481
+
1482
+ d − 1 − 1,
1483
+
1484
+ d − 1 + 1], as needed (recall that in G′ the left-regularity is c = 2 so √c − 1 = 1).
1485
+ Lemma 9. Let (xn) be a series defined via a second order linear recurrence with fixed coefficients A, B ∈ C:
1486
+ xn = Axn−1 + Bxn−2
1487
+ Assume λ1 ̸= λ2 are (real or complex) roots of the characteristic polynomial λ2 − Aλ − B. Then there are
1488
+ α, β ∈ C, that depend on the initial conditions x0, x1, such that
1489
+ xn = αλn
1490
+ 1 + βλn
1491
+ 2
1492
+ for every n ≥ 0.
1493
+ If the characteristic polynomial has a single root λ of multiplicity 2, then there are α, β ∈ C such that
1494
+ xn = αλn + βnλn
1495
+ for every n ≥ 0.
1496
+ Proof. We note that for every n ≥ 2 we have
1497
+ � xn
1498
+ xn−1
1499
+
1500
+ =
1501
+ �Axn−1 + Bxn−2
1502
+ xn−1
1503
+
1504
+ =
1505
+ �A
1506
+ B
1507
+ 1
1508
+ 0
1509
+ � �xn−1
1510
+ xn−2
1511
+
1512
+ Denote the 2 × 2 matrix by D, so by induction,
1513
+ � xn
1514
+ xn−1
1515
+
1516
+ = Dn
1517
+ �x1
1518
+ x0
1519
+
1520
+ Let us diagonalize D. The characteristic polyonmial is
1521
+ pD(λ) = det(λI − D) =
1522
+ ����
1523
+ λ − A
1524
+ −B
1525
+ −1
1526
+ λ
1527
+ ���� = λ(λ − A) − B = λ2 − Aλ − B
1528
+ 21
1529
+
1530
+ If pD(λ) has two distinct roots λ1, λ2, then the matrix is diagonalizable; that means that there exists a 2 × 2
1531
+ matrix M such that D = M · diag{λ1, λ2} · M −1. We get:
1532
+ � xn
1533
+ xn−1
1534
+
1535
+ = M
1536
+ �λ1
1537
+ 0
1538
+ 0
1539
+ λ2
1540
+ �n
1541
+ M −1
1542
+ �x1
1543
+ x0
1544
+
1545
+ = M
1546
+ �λn
1547
+ 1
1548
+ 0
1549
+ 0
1550
+ λn
1551
+ 2
1552
+
1553
+ M −1
1554
+ �x1
1555
+ x0
1556
+
1557
+ We can compute M, M −1 explicitly, multiple the matrices and get α, β ∈ C such that xn = αλn
1558
+ 1 + βλn
1559
+ 2 as
1560
+ required.
1561
+ Otherwise, if pD(λ) has a single root λ of multiplicity 2, then we can find its Jordan form, i.e. find M
1562
+ such that
1563
+ D = M
1564
+ �λ
1565
+ 1
1566
+ 0
1567
+ λ
1568
+
1569
+ M −1
1570
+ Dn = M
1571
+ �λ
1572
+ 1
1573
+ 0
1574
+ λ
1575
+ �n
1576
+ M −1 = M
1577
+ �λn
1578
+ nλn−1
1579
+ 0
1580
+ λn
1581
+
1582
+ M −1
1583
+ Where the last equality follows from a simple induction.
1584
+ Similarly, we get
1585
+ � xn
1586
+ xn−1
1587
+
1588
+ = M
1589
+ �λ
1590
+ 1
1591
+ 0
1592
+ λ
1593
+ �n
1594
+ M −1
1595
+ �x1
1596
+ x0
1597
+
1598
+ = M
1599
+ �λn
1600
+ nλn−1
1601
+ 0
1602
+ λn
1603
+
1604
+ M −1
1605
+ �x1
1606
+ x0
1607
+
1608
+ And again we can find α, β ∈ C as required.
1609
+ For the following lemma we remind that G = (L ⊔ R, E) is a (c, d)-biregular graph, G0 = (L0 ⊔ R0, E0) is
1610
+ a (c0, d0)-biregular graph, and G′ = G ◦ G0 is the routed product of G and G0. Recall that the edges of G′
1611
+ are (E(v, i), (v, j)) when v ∈ R is a right side vertex of G, i ∈ [d], E(v, i) is the ith neighbour of v according
1612
+ to G, and (i, j) ∈ E0.
1613
+ Lemma 12. Let S ⊆ L, v ∈ NG(S). Define S′ = {i : E(v, i) ∈ S} ⊆ [d] as the indexed neighbours of v in
1614
+ S. If S′, as a set of vertices in the gadget G0, has a unique neighbour j ∈ R0 in G0, then (v, j) is a unique
1615
+ neighbour of S in the product graph G′.
1616
+ Proof. Assume that i′ ∈ S′ is the unique neighbour of j in G0. By the definition of the routed product
1617
+ we have that (E(v, i′), (v, j)) is an edge in G. Since i′ ∈ S′ we have that E(v, i′) ∈ S, so indeed (v, j) is
1618
+ a neighbour of S in G′. It is therefore remaining to show that it is unique, i.e. that E(v, i′) is the only
1619
+ neighbour of (v, j) in S.
1620
+ The neighbours of (v, j) in G are E(v, i) for every i such that (i, j) ∈ E0. If E(v, i) ∈ S, then by the
1621
+ definition of S′ we have that i ∈ S′, so i is a neighbour of j in E0. But we know that j is a unique neighbour
1622
+ of S′ in E0, so we must have that i = i′, and indeed (v, j) is a unique neighbour of S in G′.
1623
+ 22
1624
+
5dE1T4oBgHgl3EQfTAM3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6tE5T4oBgHgl3EQfPw5R/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0aa089410482e3b8e239c4daeb154da00b1f938224a1aedb6fbe20459d0d0d98
3
+ size 1703981
79AzT4oBgHgl3EQfE_pK/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8afa56797092ba656ec64adcbbcd3831cf73ba77c257e8369657e932f20aa5fc
3
+ size 133263
7NE2T4oBgHgl3EQfkwf2/content/tmp_files/2301.03983v1.pdf.txt ADDED
@@ -0,0 +1,862 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03983v1 [cs.IT] 10 Jan 2023
2
+ On the Performance of Dual RIS-assisted V2I
3
+ Communication under Nakagami-m Fading
4
+ Mohd Hamza Naim Shaikh, Khaled Rabie◦, Xingwang Li#, Theodoros Tsiftsis†, and Galymzhan Nauryzbayev
5
+ School of Engineering and Digital Sciences, Nazarbayev University, Nur-Sultan City, 010000, Kazakhstan
6
+ ◦Department of Engineering, Manchester Metropolitan University, Manchester, M15 6BH, UK
7
+ #School of Physics and Electronic Information Engineering, Henan Polytechnic University, Jiaozuo 454000, China
8
+ †Department of Informatics & Telecommunications, University of Thessaly, Greece;
9
+ †School of Intelligent Systems Science and Engineering, Jinan University, China
10
+ Email: {hamza.shaikh, galymzhan.nauryzbayev}@nu.edu.kz, ◦[email protected],
11
12
+ Abstract—Vehicle-to-everything (V2X) connectivity in 5G-and-
13
+ beyond communication networks supports the futuristic intelligent
14
+ transportation system (ITS) by allowing vehicles to intelligently
15
+ connect with everything. The advent of reconfigurable intelligent
16
+ surfaces (RISs) has led to realizing the true potential of V2X
17
+ communication. In this work, we propose a dual RIS-based
18
+ vehicle-to-infrastructure (V2I) communication scheme. Following
19
+ that, the performance of the proposed communication scheme
20
+ is evaluated in terms of deriving the closed-form expressions
21
+ for outage probability, spectral efficiency and energy efficiency.
22
+ Finally, the analytical findings are corroborated with simulations
23
+ which illustrate the superiority of the RIS-assisted vehicular
24
+ networks.
25
+ Keywords— Reconfigurable intelligent surface (RIS), dual RIS,
26
+ energy efficiency, spectral efficiency, vehicular communication.
27
+ I. INTRODUCTION
28
+ As a key enabler for intelligent transportation systems (ITSs),
29
+ vehicle-to-everything (V2X) communication has sparked a re-
30
+ newed interest in the research community. V2X encompasses
31
+ a wide range of wireless technologies such as vehicle-to-
32
+ pedestrian (V2P), vehicle-to-infrastructure (V2I), and vehicle-
33
+ to-vehicle (V2V). Additionally, it also includes the vehicu-
34
+ lar communications with vulnerable road users (VRUs), grid
35
+ (V2G), network (V2N) and cloud (V2C) [1]. The V2X com-
36
+ munications will be a critical component of the futuristic
37
+ connected and self-driving cars, envisioned and enabled by
38
+ the sixth-generation (6G) wireless technologies. Furthermore,
39
+ the V2X communications will also enhance and transform
40
+ the quality-of-service (QoS) in terms of unparalleled user
41
+ experience, ultra-high road safety and air quality improvement.
42
+ In addition, a slew of advanced applications will also be
43
+ supported like platooning, trajectory alignments, exchanging
44
+ sensor data and high precision maps, and so on [2]. Thanks to
45
+ the enhanced capabilities of 6G, vehicles will receive accurate
46
+ safety information, intelligent traffic management support, and
47
+ innovative infotainment features. Thus, the 6G services will be
48
+ used to create a fully automated, autonomous, and ubiquitously
49
+ connected vehicular network [3].
50
+ Recently, reconfigurable intelligent surfaces (RISs) have
51
+ emerged as a breakthrough technology that offers a great deal
52
+ in terms of wireless communication [4]. Inherently, RIS is a
53
+ software-defined artificial structure made up of a large number
54
+ of scattering passive elements, termed as reflecting units (RUs).
55
+ These RUs are capable to adjust the electromagnetic (EM)
56
+ properties of a reflected wave that is incident on them. Thus,
57
+ RIS can use not only this ability to boost the received signal’s
58
+ power, but also the capability to create an additional reflective
59
+ link to mitigate the impact of blockages. With the large number
60
+ of RUs, RISs are particularly known to have large spectral and
61
+ energy efficiency [5]. As a result, RIS may be used to improve
62
+ the quality of vehicular communication through establishing
63
+ a low-cost, highly energy efficient indirect line-of-sight (LoS)
64
+ communications [6].
65
+ In [7], the authors investigated the outage performance for
66
+ RIS-assisted vehicular communication networks. Likewise, the
67
+ secrecy outage performance of RIS-aided vehicular communi-
68
+ cations has been studied in [8]. RISs were also investigated for
69
+ detecting VRUs such as cyclists, pedestrians and wheelchair
70
+ users [9]. Specifically, the authors utilized RISs for enhancing
71
+ the radar visibility for VRUs. Further, in [10], the authors
72
+ provided a optimization framework for resource allocation
73
+ in the RIS-aided vehicular communications. Specifically, they
74
+ jointly optimized the power allocation, RIS reflection coeffi-
75
+ cients and spectrum allocation for different QoS requirements
76
+ of the V2V and V2I communication links. Likewise, in [11],
77
+ the authors discussed a system model where RSU leverages RIS
78
+ to connect the dark zones, i.e., areas blocked due by obstacles.
79
+ Moreover, a comprehensive overview on the recent advances
80
+ in 6G vehicular networks was provided in [12, 13], where the
81
+ authors also described various open challenges and possible
82
+ research directions.
83
+ Motivated by the above, in this work, we investigate the
84
+ performance of a dual RIS-assisted V2I communication net-
85
+ work scenario. Specifically, the proposed scenario considers the
86
+ uplink transmission where the vehicle is communicating with
87
+ the base station. To enhance the communication capabilities, the
88
+ vehicle is supported through two RISs which create a virtual
89
+ line-of-sight (LoS) link, which, otherwise, was inherently non-
90
+ LoS (NLoS). The major contributions can be summarized as
91
+ • Explicitly, we invoked the central limit theorem (CLT) to
92
+ characterize the received signal-to-noise ratio (SNR) for
93
+
94
+ Vehicle-to-Vehicle (V2V)
95
+ Vehicle-to-Infrastructure (V2I)
96
+ Fig. 1. Schematic for the considered dual RIS-aided V2I communication.
97
+ the proposed dual RIS case. Further, based on this, we
98
+ derived the closed-form expression for outage probability.
99
+ • Further, we derived the closed-form expressions for the
100
+ upper and lower bounds of SE and EE of the proposed
101
+ dual RIS-assisted V2I communication scenario.
102
+ • Finally, as a performance benchmark, the proposed sce-
103
+ nario is compared with the single RIS-assisted V2I com-
104
+ munication and with RIS V2I communication. The results
105
+ show the superiority of the proposed scenario of dual RIS-
106
+ assisted V2I over the single RIS-assisted V2I communi-
107
+ cation case.
108
+ II. SYSTEM MODEL
109
+ As illustrated in Fig. 1, in this work, we consider a V2I
110
+ communication model, wherein the vehicular user (V) tries to
111
+ communicate with a nearby base station (BS). Apart from the
112
+ direct cellular link, a reflected path through RISs is considered
113
+ to support this uplink transmission. In particular, we consider
114
+ a dual RIS-assisted uplink V2I transmission with two RISs,
115
+ one each placed near V and BS both, respectively. For the two
116
+ RISs, the number of RUs is assumed to be M1 and M2 for
117
+ RIS-1 and RIS-2, respectively, while keeping the total number
118
+ of RUs unchanged, i.e., M1+M2 = N, where N is the number
119
+ of RUs in large RIS for the single RIS scenario, which is the
120
+ benchmark for comparison. Thus, based on RIS, the following
121
+ scenarios are considered in this work
122
+ • Dual RIS-assisted Transmission (DRAT): In DRAT, the
123
+ transmission takes place only through the two RISs and
124
+ the reflected link, as shown in Fig. 1.
125
+ • Single RIS-assisted Transmission (SRAT): In SRAT, the
126
+ transmission takes place through single large RIS which
127
+ is placed near to BS.
128
+ • Direct Cellular Transmission (DCT): In DCT, V commu-
129
+ nicates with BS directly without utilizing RISs. Thus, the
130
+ transmission is inherently NLoS and experiences a higher
131
+ pathloss exponent. This would also serve as the baseline
132
+ scheme for the performance comparison of the above two
133
+ cases.
134
+ A. Channel Model
135
+ The channels between V-to-RIS-1 and RIS-2-to-BS can
136
+ be modeled as deterministic LOS channels as the distances
137
+ are small and the probability of having LoS is very high.
138
+ However, the distance between RIS-1 and RIS-2 is large and
139
+ thus the small scale fading for the channel between the ith
140
+ element of RIS-1 and the jth element of RIS-2, denoted by
141
+ hRR
142
+ ij , is modeled through Nakagami-m fading. Hence, for
143
+ i = {1, 2, . . ., M1} and j = {1, 2, . . ., M2}. Further, the
144
+ distances related to the V-to-RIS-1, RIS-1-to-RIS-2 and RIS-2-
145
+ to-BS links are represented by d1, dRR and d2, respectively.
146
+ B. Received Signal Model
147
+ The received base-band signal at BS, denoted by r, for the
148
+ dual RIS-aided transmission case can be expressed as
149
+ r =
150
+
151
+ B Pt
152
+ ��M1
153
+ i=1
154
+ �M2
155
+ j=1 ejφ(1)
156
+ i hRR
157
+ ij ejφ(2)
158
+ j
159
+
160
+ s + No,
161
+ (1)
162
+ where Pt is the transmit power constraint at V, B is the distance-
163
+ dependent pathloss, s ∼ CN (0, 1) is the transmitted symbol,
164
+ and No ∼ CN
165
+
166
+ 0, σ2�
167
+ is the additive white Gaussian noise
168
+ (AWGN). Further, φ1 and φ2 are the phase of the V-to-RIS1
169
+ and RIS2-to-BS channels. Further, for a link distance d, B at
170
+ the carrier frequency of 3 GHz can be given by [14]
171
+ B(d) [dB] =
172
+
173
+ −37.5 − 22 log10(d/1 m)
174
+ if LOS,
175
+ −35.1 − 36.7 log10(d/1 m)
176
+ if NLOS.
177
+ (2)
178
+ Likewise, instantaneous SNR at BS can be formulated as
179
+ γ =
180
+ ����
181
+ �M1
182
+ i=1
183
+ �M2
184
+ j=1 δije
185
+ j
186
+
187
+ φ(1)
188
+ i
189
+ +φ(2)
190
+ j
191
+ −ϕij
192
+ �����
193
+ 2
194
+ B Pt
195
+ σ2
196
+ ,
197
+ (3)
198
+ where δij and ϕij denote the amplitude and phase of hRR
199
+ ij .
200
+ 1) RIS Reflection Parameters: Now, SNR at BS can be
201
+ maximized through adjusting the phase at RISs to cancel
202
+ the resultant phase, i.e., φ(1)
203
+ i
204
+ + φ(2)
205
+ j
206
+ − ϕij = 0, for i =
207
+ {1, 2, . . ., M1} and j = {1, 2, . . ., M2}. Thus, by substituting
208
+ ϕij = φ(1)
209
+ i
210
+ + φ(2)
211
+ j , ∀i, j, the received signal power at BS can
212
+ be maximized. Consequently, maximized SNR corresponding
213
+ to the optimal phase can be given as
214
+ γmax =
215
+ ����M1
216
+ i=1
217
+ �M2
218
+ j=1 δij
219
+ ���
220
+ 2
221
+ B Pt
222
+ σ2
223
+ = A2B Pt
224
+ σ2
225
+ = A2 B ¯γ,
226
+ (4)
227
+ where A2 =
228
+ ���
229
+ �M1
230
+ i=1
231
+ �M2
232
+ j=1 δij
233
+ ���
234
+ 2
235
+ is the cascaded channel gain
236
+ provided by RISs, and ¯γ = Pt/σ2 is transmit SNR.
237
+ Likewise, proceeding in the similar way, for the SRAT
238
+ scenario, maximized SNR at BS can be given as1
239
+ ˆγmax =
240
+ ��N
241
+ i=1 βi
242
+ �2
243
+ ¯�� = B2¯γ,
244
+ (5)
245
+ where βi is the amplitude of a channel between RIS and
246
+ V, denoted by hRU
247
+ i
248
+ , i.e., hRU
249
+ i
250
+ = βie−jϕi, and B2 is the
251
+ corresponding channel gain provided by single RIS.
252
+ 1For the SRAT scenario, the analysis is similar. Thus, the detailed description
253
+ is omitted for the sake of brevity. In particular, for SRAT, large RIS with N
254
+ RUs is present near BS, where N = M1 + M2. Likewise, the RIS-to-BS link
255
+ is also modeled as Nakagami-m fading with the rest of the parameters being
256
+ the same, as in DRAT, like transmit power constraint at V, etc.
257
+
258
+ III. PERFORMANCE ANALYSIS
259
+ This section initially evaluates SNR for the dual RIS-aided
260
+ V2I scenario. Utilizing the SNR expressions formulated earlier,
261
+ the outage probability, SE and EE are derived.
262
+ A. Statistical Characterization of the Dual RIS Channel Gain
263
+ Now utilizing CLT for M
264
+ ≫ 1, A = �M1
265
+ i=1
266
+ �M2
267
+ j=1 δij
268
+ can be approximated through a Gaussian distribution, i.e.,
269
+ A ∼ N(µy, σ2
270
+ y) [15], with a probability density function (PDF)
271
+ given by
272
+ fA(y) =
273
+
274
+
275
+
276
+ 1
277
+
278
+ 2πσ2
279
+ A exp
280
+
281
+ −(y−µA)2
282
+ 2σ2
283
+ A
284
+
285
+ ,
286
+ if y > 0,
287
+ 0,
288
+ if y = 0,
289
+ (6)
290
+ where µA = �M1
291
+ i=1
292
+ �M2
293
+ j=1 µij, σ2
294
+ A = �M1
295
+ i=1
296
+ �M2
297
+ j=1 σ2
298
+ ij. Here,
299
+ µij and σ2
300
+ ij are the mean and variance of the random variable
301
+ δij, which follows the Nakagami-m distribution. Hence, µij =
302
+ Γ(m1+ 1
303
+ 2 )
304
+ Γ(m1)
305
+ �� Ωm1
306
+ m1
307
+
308
+ and σ2
309
+ ij = Ωm1
310
+
311
+ 1 −
312
+ 1
313
+ m1
314
+
315
+ Γ(m1+ 1
316
+ 2 )
317
+ Γ(m1)
318
+ �2�
319
+ ,
320
+ for all i = {1, . . . , M1} and j = {1, . . ., M2}.
321
+ Likewise the cumulative distribution function (CDF) of A
322
+ can be derived from its PDF as
323
+ FA(y)=
324
+ � y
325
+ −∞
326
+ fA(y)dy =
327
+
328
+ 1−Q
329
+
330
+ y−µA
331
+ σ2
332
+ A
333
+
334
+ ,
335
+ if y > 0,
336
+ 0,
337
+ if y = 0.
338
+ (7)
339
+ B. Outage Probability
340
+ The normalized instantaneous rate, denoted by Rin, for the
341
+ DRAT scenario can be formulated from (4) and expressed as
342
+ Rin = log2 (1 + γmax) = log2
343
+
344
+ 1 + A2¯γ
345
+
346
+ .
347
+ (8)
348
+ Now, the end-to-end outage from V to BS via RIS, denoted by
349
+ Pout, can be defined in terms of a rate threshold, Rth, as
350
+ Pout = Pr [Rin < Rth] = Pr
351
+
352
+ log2
353
+
354
+ 1 + A2¯γ
355
+
356
+ < Rth
357
+
358
+ = Pr
359
+
360
+ A <
361
+
362
+ 2Rth − 1
363
+ ¯γ
364
+
365
+  = Pr [A < Υth] ,
366
+ (9)
367
+ where Υth =
368
+
369
+ 2Rth −1
370
+ ¯γ
371
+ . Thus, the closed-form expression of
372
+ the outage probability DRAT can be evaluated as
373
+ Pout =
374
+ � Υth
375
+ 0
376
+ fA(y)dy,
377
+ =FA (Υth) = 1 − Q
378
+ �Υth − µA
379
+ σ2
380
+ A
381
+
382
+ .
383
+ (10)
384
+ C. Spectral Efficiency
385
+ SE for the DRAT scenario can be defined from (8) as
386
+ SE =E [Rin] = E
387
+
388
+ log2
389
+
390
+ 1 + A2 B ¯γ
391
+ ��
392
+ ,
393
+ =
394
+ � ∞
395
+ 0
396
+ log2
397
+
398
+ 1 + y2 B ¯γ
399
+
400
+ fA(y)dy.
401
+ (11)
402
+ The exact derivation of the integral in (11) is mathematically
403
+ intractable, and thus a closed-form expression may not be
404
+ derived. Hence, we resort to approximate SE with tight upper
405
+ and lower bounds by invoking Jensen’s inequality.
406
+ 1) Upper Bound: Applying Jensen’s inequality, we define
407
+ the upper bound for SE as SEu, where SE ≤ SEu. Now,
408
+ SEu can be evaluated from (11) as
409
+ SEu = log2
410
+
411
+ 1 + ¯γ B E
412
+
413
+ A2��
414
+ ,
415
+ (12)
416
+ and expressed as
417
+ SEu = log2 [1 + ¯γ B M1M2 Ωm1
418
+ ×
419
+
420
+ 1 + (M1 M2 − 1)
421
+ m1
422
+ �Γ(m1 + 1
423
+ 2)
424
+ Γ(m1)
425
+ �2��
426
+ .
427
+ (13)
428
+ Evaluation of Upper Bound: In (12), E
429
+
430
+ A2�
431
+ can be evaluated
432
+ utilizing the relation Var [X] = E
433
+
434
+ X2�
435
+ − (E [X])2 as
436
+ E
437
+
438
+ A2�
439
+ =Var [A] + (E [A])2 = σ2
440
+ A + µ2
441
+ A.
442
+ (14)
443
+ After substituting the values of µ2
444
+ A and σ2
445
+ A in (12), the upper
446
+ bound for DRAT-based SE can be evaluated.
447
+ 2) Lower Bound: Likewise, we define the lower bound for
448
+ SE as SEl, where SE ≥ SEl. Now, SEl can again be be
449
+ defined from (11) as
450
+ SEl = log2
451
+
452
+ 1 +
453
+ ¯γ B
454
+ E
455
+ � 1
456
+ A2
457
+
458
+
459
+ ,
460
+ (15)
461
+ and expressed as given in (16), on the top of next page.
462
+ Evaluation of Lower Bound: In (15), the expectation
463
+ E
464
+
465
+ 1/A2�
466
+ can be solved utilizing the Taylor series expansion
467
+ and approximated as [15]
468
+ E
469
+ � 1
470
+ A2
471
+
472
+
473
+ 1
474
+ E [A2] + Var
475
+
476
+ A2�
477
+ [E [A2]]3 .
478
+ (17)
479
+ Since the statistical characteristics of A is known to be Gaussian
480
+ distributed (as discussed earlier in subsection A), A2 will
481
+ follow a non-central chi-square distribution. Thus, the mean
482
+ and variance of A2 can be expressed as
483
+ Var
484
+
485
+ A2�
486
+ = 2 σ2
487
+ A
488
+
489
+ σ2
490
+ A + 2 µ2
491
+ A
492
+
493
+ ,
494
+ (18)
495
+ E
496
+
497
+ A2�
498
+ = σ2
499
+ A + µ2
500
+ A,
501
+ (19)
502
+ respectively. Thus, utilizing these expressions and substituting
503
+ the values of µ2
504
+ A and σ2
505
+ A, the lower bound for SE of the DRAT
506
+ scenario can be evaluated.
507
+ 3) Approximation for Large M: We define SE as approx-
508
+ imate SE (ASE) for large M1 and M2. Now, with the upper
509
+ and lower bounds of SE of the DRAT scenario, exact SE lies
510
+ in-between and can be expressed as
511
+ SEl ≤ SE ≤ SEu.
512
+ (20)
513
+ However, for larger M1 and M2, i.e., M1, M2 ≫ 1, both SEl
514
+ and SEu converge to SE. Thus, ASE can be given as
515
+ SE = log2
516
+
517
+ 1 + ¯γ B M 2
518
+ 1 M 2
519
+ 2 Ωm1
520
+ m1
521
+ �Γ(m1 + 1
522
+ 2)
523
+ Γ(m1)
524
+ �2�
525
+ .
526
+ (21)
527
+ It can be noted from (21) that, through utilizing dual RIS,
528
+ the fourth order channel gain can be realized, i.e., M 2
529
+ 1 M 2
530
+ 2 ,
531
+ whereas, for single RIS, the maximum channel gain is of the
532
+ second order, i.e., N 2.
533
+
534
+ SEl = log2
535
+
536
+ 1 + ¯γ B
537
+ M1M2 Ωm1
538
+
539
+ 1 + (M1 M2−1)
540
+ m1
541
+ � Γ(m1+ 1
542
+ 2 )
543
+ Γ(m1)
544
+ �2�3
545
+ 2
546
+
547
+ 1 + (2M1 M2−1)
548
+ m1
549
+ � Γ(m1+ 1
550
+ 2 )
551
+ Γ(m1)
552
+ �2� �
553
+ 1 −
554
+ 1
555
+ m1
556
+ � Γ(m1+ 1
557
+ 2 )
558
+ Γ(m1)
559
+ �2�
560
+ +
561
+
562
+ 1 + (M1 M2−1)
563
+ m1
564
+ � Γ(m1+ 1
565
+ 2 )
566
+ Γ(m1)
567
+ �2�2
568
+
569
+ 
570
+ (16)
571
+ TABLE I
572
+ SIMULATION PARAMETERS
573
+ Parameter
574
+ Simulation Values
575
+ Circuit Power
576
+ PBS=10 dBm, PU=10 dBm [5]
577
+ Fading Parameter for DRAT
578
+ m1= 10
579
+ Fading Parameter for Direct Links
580
+ m3= 1
581
+ RIS Power Consumption
582
+ PRE = 10 dBm [5]
583
+ HPA Power Consumption Factor
584
+ α = 1.2
585
+ Noise Floor
586
+ σ2 = -120 dBm
587
+ D. Energy Efficiency
588
+ Now, EE of the dual RIS-aided system is defined as the
589
+ ratio of SE over the total power consumed and can be ex-
590
+ pressed as EE =
591
+ SE
592
+ Ptot , where Ptot denotes the total power
593
+ consumed, which consists of the transmit power, the circuit
594
+ power consumption at BS and V, and the power consumed at
595
+ RIS. Considering all the power consumed, the EE in can be
596
+ expressed
597
+ EE =
598
+ SE
599
+ (1 + ξ)Pt + P c
600
+ V + (M1 + M2)P c
601
+ RIS + P c
602
+ BS
603
+ ,
604
+ (22)
605
+ where P c
606
+ RIS denotes the power utilized by each RU, ξ =
607
+ 1
608
+ ω
609
+ and ω is the drain efficiency of HPA. Likewise, P c
610
+ V , i.e., the
611
+ power consumed in other circuit components excluding HPA at
612
+ V and P c
613
+ BS is the circuit power consumption at BS.
614
+ This completes the analytical derivation of the outage, SE,
615
+ and EE for DRAT of the uplink of V2I communication.
616
+ IV. SIMULATION RESULTS
617
+ This section discusses and presents the simulation results for
618
+ the performance of the dual RIS-assisted V2I communication.
619
+ Further, the results for the SRAT and DCT scenarios are
620
+ presented for the sake of comparison. The distances between
621
+ V-to-RIS1, RIS1-to-RIS2 and RIS2-to-BS are assumed to be
622
+ 5, 100 and 5 meters, respectively. Similarly for the simulation
623
+ purpose, M = M1 = M2 and N is taken as to be N = 2 M,
624
+ in order to maintain the fairness in the comparison. The rest of
625
+ the simulation parameters are summarized in Table I.
626
+ Fig. 2 shows the SE performance for the DRAT scenario,
627
+ where the solid lines without marker points show the exact
628
+ (simulation) performance of DRAT, whereas the markers show
629
+ the analytically derived upper and lower bounds on SE. Ad-
630
+ ditionally, ASE for large M is also plotted. The simulation
631
+ verifies that the derived upper and lower bounds are quite
632
+ tight as the analytically derived bounds are remarkably close
633
+ to the actual performance. Further, it can also be noted that
634
+ the difference between exact SE and ASE (as shown in (21))
635
+ diminishes as M increases. For instance, at M = 10 and
636
+ 0
637
+ 5
638
+ 10
639
+ 15
640
+ 20
641
+ 25
642
+ 30
643
+ 35
644
+ 40
645
+ 45
646
+ 50
647
+ SNR (dB)
648
+ 0
649
+ 2
650
+ 4
651
+ 6
652
+ 8
653
+ 10
654
+ 12
655
+ 14
656
+ 16
657
+ 18
658
+ 20
659
+ SE (bps/Hz)
660
+ Sim
661
+ UB
662
+ LB
663
+ Approx
664
+ M = 10, 20, 50, 100
665
+ Fig. 2. SE with respect to ¯γ for different M of the proposed DRAT scenario.
666
+ 0
667
+ 500
668
+ 1000
669
+ 1500
670
+ 2000
671
+ 2500
672
+ M
673
+ 0
674
+ 5
675
+ 10
676
+ 15
677
+ 20
678
+ 25
679
+ SE (bps/Hz)
680
+ DRAT
681
+ SRAT
682
+ DCT
683
+ Fig. 3. SE with respect to M for the proposed DRAT scenario.
684
+ 0
685
+ 2
686
+ 4
687
+ 6
688
+ 8
689
+ 10
690
+ 12
691
+ 14
692
+ 16
693
+ 18
694
+ 20
695
+ SNR (dB)
696
+ 10-6
697
+ 10-5
698
+ 10-4
699
+ 10-3
700
+ 10-2
701
+ 10-1
702
+ 100
703
+ Outage
704
+ Rth=5
705
+ Rth=7.5
706
+ Rth=10
707
+ Fig. 4. Outage with respect to Pt for different rate thresholds for DRAT.
708
+ ¯γ = 30 dB, SE is 1.5037 bps/Hz whereas SE is 1.5034
709
+ bps/Hz; however, at M = 50 and ¯γ = 15 dB, SE is 5.2201
710
+ whereas SE is 5.2200 bps/Hz. Thus, it shows that the bounds
711
+ are quite accurate and near to the exact simulation value.
712
+ Fig. 3 shows the SE results for the DRAT scenario, and
713
+ compares them with the SRAT and DCT scenarios. Specifically,
714
+ it shows SE for a varying number of RUs. The following
715
+ observations can be easily inferred from this plot: 1) Apart
716
+ from smaller M, SE of DRAT is always better than SE of the
717
+ SRAT scheme due to the fourth order gain provided by dual
718
+ RIS. This can also be inferred from the analytical evaluation in
719
+ (31). 2) Due to the multiplicative pathloss, for less number of
720
+ RUs, i.e., smaller M, the DCT scenario may provide better SE
721
+ performance than the RIS-reflected link for both DRAT and
722
+
723
+ 0
724
+ 500
725
+ 1000
726
+ 1500
727
+ 2000
728
+ 2500
729
+ M
730
+ 0
731
+ 0.1
732
+ 0.2
733
+ 0.3
734
+ 0.4
735
+ 0.5
736
+ 0.6
737
+ 0.7
738
+ EE (bits/Hz/Joule)
739
+ DRAT
740
+ SRAT
741
+ DCT
742
+ (a) EE with respect to M, here Pt = 10 dBm.
743
+ 0
744
+ 5
745
+ 10
746
+ 15
747
+ 20
748
+ 25
749
+ 30
750
+ SNR (dB)
751
+ 0
752
+ 0.5
753
+ 1
754
+ 1.5
755
+ EE (bits/Hz/Joule)
756
+ DRAT
757
+ SRAT
758
+ DCT
759
+ (b) EE with respect to SNR, here M = 1000.
760
+ Fig. 5. EE comparison for DRAT with respect to the SRAT and DCT scenarios.
761
+ SRAT scenarios. However, as the number of RUs increases,
762
+ the RIS-based scenarios outperform DCT. 3) Similar to single
763
+ RIS, dual RIS-based DRAT also suffers from the multiplicative
764
+ effect of pathloss. Thus, for smaller RUs, the SRAT scenario
765
+ shows better SE than the DRAT one. 4) As the number of RUs
766
+ increases sufficiently, DRAT outperforms SRAT significantly.
767
+ Fig. 4 shows the outage probability of the DRAT scenario for
768
+ three different rate thresholds, i.e., Rth = {5, 7.5, 10} bps/Hz.
769
+ As evident from the result, the outage can be improved either
770
+ through increasing the transmit power or the number of RUs.
771
+ Since, the transmit power at BS is usually constrained, RIS
772
+ provides an alternate to improve the outage through increasing
773
+ RUs, instead of increasing the transmit power. Thus, to circum-
774
+ vent the power constraint, the number of RUs at RIS can be
775
+ scaled accordingly.
776
+ Fig. 5 shows the EE results of the DRAT scenario, the EE
777
+ plots of the SRAT and DCT scenarios are also plotted here
778
+ for comparison. Specifically, in Fig. 5(a), the performance is
779
+ with respect to M, while in Fig. 5(b), the EE curve is plotted
780
+ against SNR. It can be observed that, for large M, the DRAT
781
+ scenario is the most energy-efficient. Although, for smaller M,
782
+ single RIS provides better EE; this is due to the fact that the
783
+ received signal of the dual RIS-reflected link suffers from the
784
+ multiplicative pathloss that can be mitigated by by large M.
785
+ From the above results on SE and EE, it can be easily inferred
786
+ that the proposed DRAT scheme outperforms SRAT in terms of
787
+ both SE as well as EE. Similarly, the above results also show
788
+ that, for a fixed rate requirement, DRAT requires lower transmit
789
+ power and hence is more energy efficient.
790
+ V. CONCLUSION
791
+ V2X has opened up a slew of novel possibilities in the
792
+ wireless vehicular communication arena, but its potential for
793
+ enabling true ITS has yet to be explored completely, despite
794
+ its significant importance in the safety of autonomous driving.
795
+ In this work, we have envisioned the integration of RIS into
796
+ vehicular networks to realize the true potential in enhancing the
797
+ performance of the V2I communication. Specifically, we have
798
+ evaluated the performance of a dual-RIS assisted V2I uplink
799
+ communication scenario in terms of the outage probability, SE
800
+ and EE. Novel closed-form expressions are derived and verified
801
+ through the extensive numerical simulations. The results show
802
+ a significant gain in the performance can be achieved through
803
+ the proposed RIS scenario.
804
+ VI. ACKNOWLEDGEMENT
805
+ This work was supported by the Nazarbayev University CRP
806
+ Grant no. 11022021CRP1513.
807
+ REFERENCES
808
+ [1] J. Wang, K. Zhu, and E. Hossain, “Green internet of vehicles (IoV) in the
809
+ 6G era: Toward sustainable vehicular communications and networking,”
810
+ IEEE Trans. Green Commun. Netw., vol. 6, no. 1, pp. 391–423, Mar.
811
+ 2022.
812
+ [2] Y. Cao, S. Xu, J. Liu, and N. Kato, “Toward smart and secure V2X
813
+ communication in 5G and beyond: A UAV-enabled aerial intelligent
814
+ reflecting surface solution,” IEEE Veh. Tech. Mag., 2022.
815
+ [3] X. Cheng, Z. Huang, and S. Chen, “Vehicular communication channel
816
+ measurement, modelling, and application for beyond 5G and 6G,” IET
817
+ Commun., vol. 14, no. 19, pp. 3303–3311, 2020.
818
+ [4] Q. Wu, S. Zhang, B. Zheng, C. You, and R. Zhang, “Intelligent reflecting
819
+ surface-aided wireless communications: A tutorial,” IEEE Trans. Com-
820
+ mun., vol. 69, no. 5, pp. 3313–3351, May 2021.
821
+ [5] C. Huang, A. Zappone, G. C. Alexandropoulos, M. Debbah, and C. Yuen,
822
+ “Reconfigurable intelligent surfaces for energy efficiency in wireless
823
+ communication,” IEEE Trans. Wireless Commun., vol. 18, no. 8, pp.
824
+ 4157–4170, Aug. 2019.
825
+ [6] M. A. Javed et al., “Reliable communications for cybertwin driven 6G
826
+ IoVs using intelligent reflecting surfaces,” IEEE Trans. Ind. Info., 2022.
827
+ [7] J. Wang et al., “Outage analysis for intelligent reflecting surface assisted
828
+ vehicular communication networks,” in IEEE Global Commun. Conf.,
829
+ 2020, pp. 1–6.
830
+ [8] Y. Ai et al., “Secure vehicular communications through reconfigurable
831
+ intelligent surfaces,” IEEE Trans. Veh. Tech., vol. 70, no. 7, pp. 7272–
832
+ 7276, Jul. 2021.
833
+ [9] S. K. Dehkordi and G. Caire, “Reconfigurable propagation environment
834
+ for enhancing vulnerable road users’ visibility to automotive radar,” in
835
+ IEEE Intelligent Veh. Symp. (IV), 2021, pp. 1523–1528.
836
+ [10] Y. Chen et al., “Resource allocation for intelligent reflecting surface aided
837
+ vehicular communications,” IEEE Trans. Veh. Tech., vol. 69, no. 10, pp.
838
+ 12 321–12 326, Oct. 2020.
839
+ [11] A. Al-Hilo et al., “Reconfigurable intelligent surface enabled vehicular
840
+ communication: Joint user scheduling and passive beamforming,” IEEE
841
+ Trans. Veh. Tech., vol. 71, no. 3, pp. 2333–2345, Mar. 2022.
842
+ [12] M.
843
+ Noor-A-Rahim
844
+ et
845
+ al.,
846
+ “6G
847
+ for
848
+ vehicle-to-everything
849
+ (V2X)
850
+ communications: Enabling technologies, challenges, and opportunities,”
851
+ 2020. [Online]. Available: https://arxiv.org/abs/2012.07753
852
+ [13] Y. Zhu et al., “Intelligent reflecting surface-aided vehicular networks
853
+ toward 6G: Vision, proposal, and future directions,” IEEE Veh. Tech.
854
+ Mag., vol. 16, no. 4, pp. 48–56, Dec. 2021.
855
+ [14] E. Bjornson, O. Ozdogan, and E. G. Larsson, “Intelligent reflecting
856
+ surface versus decode-and-forward: How large surfaces are needed to
857
+ beat relaying?” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 244–
858
+ 248, 2020.
859
+ [15] D. Kudathanthirige, D. Gunasinghe, and G. Amarasuriya, “Performance
860
+ analysis of intelligent reflective surfaces for wireless communication,” in
861
+ IEEE Int. Conf. Commun. (ICC), 2020, pp. 1–6.
862
+
7NE2T4oBgHgl3EQfkwf2/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,395 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf,len=394
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
3
+ page_content='03983v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
4
+ page_content='IT] 10 Jan 2023 On the Performance of Dual RIS-assisted V2I Communication under Nakagami-m Fading Mohd Hamza Naim Shaikh,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
5
+ page_content=' Khaled Rabie◦,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
6
+ page_content=' Xingwang Li#,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
7
+ page_content=' Theodoros Tsiftsis†,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
8
+ page_content=' and Galymzhan Nauryzbayev School of Engineering and Digital Sciences,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
9
+ page_content=' Nazarbayev University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
10
+ page_content=' Nur-Sultan City,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
11
+ page_content=' 010000,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
12
+ page_content=' Kazakhstan Department of Engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
13
+ page_content=' Manchester Metropolitan University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
14
+ page_content=' Manchester,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
15
+ page_content=' M15 6BH,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
16
+ page_content=' UK #School of Physics and Electronic Information Engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
17
+ page_content=' Henan Polytechnic University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
18
+ page_content=' Jiaozuo 454000,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
19
+ page_content=' China †Department of Informatics & Telecommunications,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
20
+ page_content=' University of Thessaly,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
21
+ page_content=' Greece;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
22
+ page_content=' †School of Intelligent Systems Science and Engineering, Jinan University, China Email: {hamza.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
23
+ page_content='shaikh, galymzhan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
24
+ page_content='nauryzbayev}@nu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
25
+ page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
26
+ page_content='kz, ◦k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
27
+ page_content='rabie@mmu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
28
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
29
+ page_content='uk, #lixingwang@hpu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
30
+ page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
31
+ page_content='cn, †tsiftsis@ieee.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
32
+ page_content='org Abstract—Vehicle-to-everything (V2X) connectivity in 5G-and- beyond communication networks supports the futuristic intelligent transportation system (ITS) by allowing vehicles to intelligently connect with everything.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
33
+ page_content=' The advent of reconfigurable intelligent surfaces (RISs) has led to realizing the true potential of V2X communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
34
+ page_content=' In this work, we propose a dual RIS-based vehicle-to-infrastructure (V2I) communication scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
35
+ page_content=' Following that, the performance of the proposed communication scheme is evaluated in terms of deriving the closed-form expressions for outage probability, spectral efficiency and energy efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
36
+ page_content=' Finally, the analytical findings are corroborated with simulations which illustrate the superiority of the RIS-assisted vehicular networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
37
+ page_content=' Keywords— Reconfigurable intelligent surface (RIS), dual RIS, energy efficiency, spectral efficiency, vehicular communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
38
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
39
+ page_content=' INTRODUCTION As a key enabler for intelligent transportation systems (ITSs), vehicle-to-everything (V2X) communication has sparked a re- newed interest in the research community.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
40
+ page_content=' V2X encompasses a wide range of wireless technologies such as vehicle-to- pedestrian (V2P), vehicle-to-infrastructure (V2I), and vehicle- to-vehicle (V2V).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
41
+ page_content=' Additionally, it also includes the vehicu- lar communications with vulnerable road users (VRUs), grid (V2G), network (V2N) and cloud (V2C) [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
42
+ page_content=' The V2X com- munications will be a critical component of the futuristic connected and self-driving cars, envisioned and enabled by the sixth-generation (6G) wireless technologies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
43
+ page_content=' Furthermore, the V2X communications will also enhance and transform the quality-of-service (QoS) in terms of unparalleled user experience, ultra-high road safety and air quality improvement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
44
+ page_content=' In addition, a slew of advanced applications will also be supported like platooning, trajectory alignments, exchanging sensor data and high precision maps, and so on [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
45
+ page_content=' Thanks to the enhanced capabilities of 6G, vehicles will receive accurate safety information, intelligent traffic management support, and innovative infotainment features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
46
+ page_content=' Thus, the 6G services will be used to create a fully automated, autonomous, and ubiquitously connected vehicular network [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
47
+ page_content=' Recently, reconfigurable intelligent surfaces (RISs) have emerged as a breakthrough technology that offers a great deal in terms of wireless communication [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
48
+ page_content=' Inherently, RIS is a software-defined artificial structure made up of a large number of scattering passive elements, termed as reflecting units (RUs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
49
+ page_content=' These RUs are capable to adjust the electromagnetic (EM) properties of a reflected wave that is incident on them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
50
+ page_content=' Thus, RIS can use not only this ability to boost the received signal’s power, but also the capability to create an additional reflective link to mitigate the impact of blockages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
51
+ page_content=' With the large number of RUs, RISs are particularly known to have large spectral and energy efficiency [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
52
+ page_content=' As a result, RIS may be used to improve the quality of vehicular communication through establishing a low-cost, highly energy efficient indirect line-of-sight (LoS) communications [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
53
+ page_content=' In [7], the authors investigated the outage performance for RIS-assisted vehicular communication networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
54
+ page_content=' Likewise, the secrecy outage performance of RIS-aided vehicular communi- cations has been studied in [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
55
+ page_content=' RISs were also investigated for detecting VRUs such as cyclists, pedestrians and wheelchair users [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
56
+ page_content=' Specifically, the authors utilized RISs for enhancing the radar visibility for VRUs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
57
+ page_content=' Further, in [10], the authors provided a optimization framework for resource allocation in the RIS-aided vehicular communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
58
+ page_content=' Specifically, they jointly optimized the power allocation, RIS reflection coeffi- cients and spectrum allocation for different QoS requirements of the V2V and V2I communication links.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
59
+ page_content=' Likewise, in [11], the authors discussed a system model where RSU leverages RIS to connect the dark zones, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
60
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
61
+ page_content=', areas blocked due by obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
62
+ page_content=' Moreover, a comprehensive overview on the recent advances in 6G vehicular networks was provided in [12, 13], where the authors also described various open challenges and possible research directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
63
+ page_content=' Motivated by the above, in this work, we investigate the performance of a dual RIS-assisted V2I communication net- work scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
64
+ page_content=' Specifically, the proposed scenario considers the uplink transmission where the vehicle is communicating with the base station.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
65
+ page_content=' To enhance the communication capabilities, the vehicle is supported through two RISs which create a virtual line-of-sight (LoS) link, which, otherwise, was inherently non- LoS (NLoS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
66
+ page_content=' The major contributions can be summarized as Explicitly, we invoked the central limit theorem (CLT) to characterize the received signal-to-noise ratio (SNR) for Vehicle-to-Vehicle (V2V) Vehicle-to-Infrastructure (V2I) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
67
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
68
+ page_content=' Schematic for the considered dual RIS-aided V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
69
+ page_content=' the proposed dual RIS case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
70
+ page_content=' Further, based on this, we derived the closed-form expression for outage probability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
71
+ page_content=' Further, we derived the closed-form expressions for the upper and lower bounds of SE and EE of the proposed dual RIS-assisted V2I communication scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
72
+ page_content=' Finally, as a performance benchmark, the proposed sce- nario is compared with the single RIS-assisted V2I com- munication and with RIS V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
73
+ page_content=' The results show the superiority of the proposed scenario of dual RIS- assisted V2I over the single RIS-assisted V2I communi- cation case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
74
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
75
+ page_content=' SYSTEM MODEL As illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
76
+ page_content=' 1, in this work, we consider a V2I communication model, wherein the vehicular user (V) tries to communicate with a nearby base station (BS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
77
+ page_content=' Apart from the direct cellular link, a reflected path through RISs is considered to support this uplink transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
78
+ page_content=' In particular, we consider a dual RIS-assisted uplink V2I transmission with two RISs, one each placed near V and BS both, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
79
+ page_content=' For the two RISs, the number of RUs is assumed to be M1 and M2 for RIS-1 and RIS-2, respectively, while keeping the total number of RUs unchanged, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
80
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
81
+ page_content=', M1+M2 = N, where N is the number of RUs in large RIS for the single RIS scenario, which is the benchmark for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
82
+ page_content=' Thus, based on RIS, the following scenarios are considered in this work Dual RIS-assisted Transmission (DRAT): In DRAT, the transmission takes place only through the two RISs and the reflected link, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
83
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
84
+ page_content=' Single RIS-assisted Transmission (SRAT): In SRAT, the transmission takes place through single large RIS which is placed near to BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
85
+ page_content=' Direct Cellular Transmission (DCT): In DCT, V commu- nicates with BS directly without utilizing RISs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
86
+ page_content=' Thus, the transmission is inherently NLoS and experiences a higher pathloss exponent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
87
+ page_content=' This would also serve as the baseline scheme for the performance comparison of the above two cases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
88
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
89
+ page_content=' Channel Model The channels between V-to-RIS-1 and RIS-2-to-BS can be modeled as deterministic LOS channels as the distances are small and the probability of having LoS is very high.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
90
+ page_content=' However, the distance between RIS-1 and RIS-2 is large and thus the small scale fading for the channel between the ith element of RIS-1 and the jth element of RIS-2, denoted by hRR ij , is modeled through Nakagami-m fading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
91
+ page_content=' Hence, for i = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
92
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
93
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
94
+ page_content=', M1} and j = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
95
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
96
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
97
+ page_content=', M2}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
98
+ page_content=' Further, the distances related to the V-to-RIS-1, RIS-1-to-RIS-2 and RIS-2- to-BS links are represented by d1, dRR and d2, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
99
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
100
+ page_content=' Received Signal Model The received base-band signal at BS, denoted by r, for the dual RIS-aided transmission case can be expressed as r = � B Pt ��M1 i=1 �M2 j=1 ejφ(1) i hRR ij ejφ(2) j � s + No, (1) where Pt is the transmit power constraint at V, B is the distance- dependent pathloss, s ∼ CN (0, 1) is the transmitted symbol, and No ∼ CN � 0, σ2� is the additive white Gaussian noise (AWGN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
101
+ page_content=' Further, φ1 and φ2 are the phase of the V-to-RIS1 and RIS2-to-BS channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
102
+ page_content=' Further, for a link distance d, B at the carrier frequency of 3 GHz can be given by [14] B(d) [dB] = � −37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
103
+ page_content='5 − 22 log10(d/1 m) if LOS, −35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
104
+ page_content='1 − 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
105
+ page_content='7 log10(d/1 m) if NLOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
106
+ page_content=' (2) Likewise, instantaneous SNR at BS can be formulated as γ = ���� �M1 i=1 �M2 j=1 δije j � φ(1) i +φ(2) j −ϕij ����� 2 B Pt σ2 , (3) where δij and ϕij denote the amplitude and phase of hRR ij .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
107
+ page_content=' 1) RIS Reflection Parameters: Now, SNR at BS can be maximized through adjusting the phase at RISs to cancel the resultant phase, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
108
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
109
+ page_content=', φ(1) i + φ(2) j − ϕij = 0, for i = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
110
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
111
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
112
+ page_content=', M1} and j = {1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
113
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
114
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
115
+ page_content=', M2}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
116
+ page_content=' Thus, by substituting ϕij = φ(1) i + φ(2) j , ∀i, j, the received signal power at BS can be maximized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
117
+ page_content=' Consequently, maximized SNR corresponding to the optimal phase can be given as γmax = ����M1 i=1 �M2 j=1 δij ��� 2 B Pt σ2 = A2B Pt σ2 = A2 B ¯γ, (4) where A2 = ��� �M1 i=1 �M2 j=1 δij ��� 2 is the cascaded channel gain provided by RISs, and ¯γ = Pt/σ2 is transmit SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
118
+ page_content=' Likewise, proceeding in the similar way, for the SRAT scenario, maximized SNR at BS can be given as1 ˆγmax = ��N i=1 βi �2 ¯γ = B2¯γ, (5) where βi is the amplitude of a channel between RIS and V, denoted by hRU i , i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
119
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
120
+ page_content=', hRU i = βie−jϕi, and B2 is the corresponding channel gain provided by single RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
121
+ page_content=' 1For the SRAT scenario, the analysis is similar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
122
+ page_content=' Thus, the detailed description is omitted for the sake of brevity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
123
+ page_content=' In particular, for SRAT, large RIS with N RUs is present near BS, where N = M1 + M2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
124
+ page_content=' Likewise, the RIS-to-BS link is also modeled as Nakagami-m fading with the rest of the parameters being the same, as in DRAT, like transmit power constraint at V, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
125
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
126
+ page_content=' PERFORMANCE ANALYSIS This section initially evaluates SNR for the dual RIS-aided V2I scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
127
+ page_content=' Utilizing the SNR expressions formulated earlier, the outage probability, SE and EE are derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
128
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
129
+ page_content=' Statistical Characterization of the Dual RIS Channel Gain Now utilizing CLT for M ≫ 1, A = �M1 i=1 �M2 j=1 δij can be approximated through a Gaussian distribution, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
130
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
131
+ page_content=', A ∼ N(µy, σ2 y) [15], with a probability density function (PDF) given by fA(y) = \uf8f1 \uf8f2 \uf8f3 1 √ 2πσ2 A exp � −(y−µA)2 2σ2 A � , if y > 0, 0, if y = 0, (6) where µA = �M1 i=1 �M2 j=1 µij, σ2 A = �M1 i=1 �M2 j=1 σ2 ij.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
132
+ page_content=' Here, µij and σ2 ij are the mean and variance of the random variable δij, which follows the Nakagami-m distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
133
+ page_content=' Hence, µij = Γ(m1+ 1 2 ) Γ(m1) �� Ωm1 m1 � and σ2 ij = Ωm1 � 1 − 1 m1 � Γ(m1+ 1 2 ) Γ(m1) �2� , for all i = {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
134
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
135
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
136
+ page_content=' , M1} and j = {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
137
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
138
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
139
+ page_content=', M2}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
140
+ page_content=' Likewise the cumulative distribution function (CDF) of A can be derived from its PDF as FA(y)= � y −∞ fA(y)dy = � 1−Q � y−µA σ2 A � , if y > 0, 0, if y = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
141
+ page_content=' (7) B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
142
+ page_content=' Outage Probability The normalized instantaneous rate, denoted by Rin, for the DRAT scenario can be formulated from (4) and expressed as Rin = log2 (1 + γmax) = log2 � 1 + A2¯γ � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
143
+ page_content=' (8) Now, the end-to-end outage from V to BS via RIS, denoted by Pout, can be defined in terms of a rate threshold, Rth, as Pout = Pr [Rin < Rth] = Pr � log2 � 1 + A2¯γ � < Rth � = Pr \uf8ee \uf8f0A < � 2Rth − 1 ¯γ \uf8f9 \uf8fb = Pr [A < Υth] , (9) where Υth = � 2Rth −1 ¯γ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
144
+ page_content=' Thus, the closed-form expression of the outage probability DRAT can be evaluated as Pout = � Υth 0 fA(y)dy, =FA (Υth) = 1 − Q �Υth − µA σ2 A � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
145
+ page_content=' (10) C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
146
+ page_content=' Spectral Efficiency SE for the DRAT scenario can be defined from (8) as SE =E [Rin] = E � log2 � 1 + A2 B ¯γ �� , = � ∞ 0 log2 � 1 + y2 B ¯γ � fA(y)dy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
147
+ page_content=' (11) The exact derivation of the integral in (11) is mathematically intractable, and thus a closed-form expression may not be derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
148
+ page_content=' Hence, we resort to approximate SE with tight upper and lower bounds by invoking Jensen’s inequality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
149
+ page_content=' 1) Upper Bound: Applying Jensen’s inequality, we define the upper bound for SE as SEu, where SE ≤ SEu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
150
+ page_content=' Now, SEu can be evaluated from (11) as SEu = log2 � 1 + ¯γ B E � A2�� , (12) and expressed as SEu = log2 [1 + ¯γ B M1M2 Ωm1 × � 1 + (M1 M2 − 1) m1 �Γ(m1 + 1 2) Γ(m1) �2�� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
151
+ page_content=' (13) Evaluation of Upper Bound: In (12), E � A2� can be evaluated utilizing the relation Var [X] = E � X2� − (E [X])2 as E � A2� =Var [A] + (E [A])2 = σ2 A + µ2 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
152
+ page_content=' (14) After substituting the values of µ2 A and σ2 A in (12), the upper bound for DRAT-based SE can be evaluated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
153
+ page_content=' 2) Lower Bound: Likewise, we define the lower bound for SE as SEl, where SE ≥ SEl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
154
+ page_content=' Now, SEl can again be be defined from (11) as SEl = log2 � 1 + ¯γ B E � 1 A2 � � , (15) and expressed as given in (16), on the top of next page.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
155
+ page_content=' Evaluation of Lower Bound: In (15), the expectation E � 1/A2� can be solved utilizing the Taylor series expansion and approximated as [15] E � 1 A2 � ≈ 1 E [A2] + Var � A2� [E [A2]]3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
156
+ page_content=' (17) Since the statistical characteristics of A is known to be Gaussian distributed (as discussed earlier in subsection A), A2 will follow a non-central chi-square distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
157
+ page_content=' Thus, the mean and variance of A2 can be expressed as Var � A2� = 2 σ2 A � σ2 A + 2 µ2 A � , (18) E � A2� = σ2 A + µ2 A, (19) respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
158
+ page_content=' Thus, utilizing these expressions and substituting the values of µ2 A and σ2 A, the lower bound for SE of the DRAT scenario can be evaluated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
159
+ page_content=' 3) Approximation for Large M: We define SE as approx- imate SE (ASE) for large M1 and M2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
160
+ page_content=' Now, with the upper and lower bounds of SE of the DRAT scenario, exact SE lies in-between and can be expressed as SEl ≤ SE ≤ SEu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
161
+ page_content=' (20) However, for larger M1 and M2, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
162
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
163
+ page_content=', M1, M2 ≫ 1, both SEl and SEu converge to SE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
164
+ page_content=' Thus, ASE can be given as SE = log2 � 1 + ¯γ B M 2 1 M 2 2 Ωm1 m1 �Γ(m1 + 1 2) Γ(m1) �2� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
165
+ page_content=' (21) It can be noted from (21) that, through utilizing dual RIS, the fourth order channel gain can be realized, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
166
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
167
+ page_content=', M 2 1 M 2 2 , whereas, for single RIS, the maximum channel gain is of the second order, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
168
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
169
+ page_content=', N 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
170
+ page_content=' SEl = log2 \uf8ee \uf8ef\uf8ef\uf8ef\uf8f01 + ¯γ B M1M2 Ωm1 � 1 + (M1 M2−1) m1 � Γ(m1+ 1 2 ) Γ(m1) �2�3 2 � 1 + (2M1 M2−1) m1 � Γ(m1+ 1 2 ) Γ(m1) �2� � 1 − 1 m1 � Γ(m1+ 1 2 ) Γ(m1) �2� + � 1 + (M1 M2−1) m1 � Γ(m1+ 1 2 ) Γ(m1) �2�2 \uf8f9 \uf8fa\uf8fa\uf8fa\uf8fb (16) TABLE I SIMULATION PARAMETERS Parameter Simulation Values Circuit Power PBS=10 dBm,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
171
+ page_content=' PU=10 dBm [5] Fading Parameter for DRAT m1= 10 Fading Parameter for Direct Links m3= 1 RIS Power Consumption PRE = 10 dBm [5] HPA Power Consumption Factor α = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
172
+ page_content='2 Noise Floor σ2 = -120 dBm D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
173
+ page_content=' Energy Efficiency Now, EE of the dual RIS-aided system is defined as the ratio of SE over the total power consumed and can be ex- pressed as EE = SE Ptot , where Ptot denotes the total power consumed, which consists of the transmit power, the circuit power consumption at BS and V, and the power consumed at RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
174
+ page_content=' Considering all the power consumed, the EE in can be expressed EE = SE (1 + ξ)Pt + P c V + (M1 + M2)P c RIS + P c BS , (22) where P c RIS denotes the power utilized by each RU, ξ = 1 ω and ω is the drain efficiency of HPA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
175
+ page_content=' Likewise, P c V , i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
176
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
177
+ page_content=', the power consumed in other circuit components excluding HPA at V and P c BS is the circuit power consumption at BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
178
+ page_content=' This completes the analytical derivation of the outage, SE, and EE for DRAT of the uplink of V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
179
+ page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
180
+ page_content=' SIMULATION RESULTS This section discusses and presents the simulation results for the performance of the dual RIS-assisted V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
181
+ page_content=' Further, the results for the SRAT and DCT scenarios are presented for the sake of comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
182
+ page_content=' The distances between V-to-RIS1, RIS1-to-RIS2 and RIS2-to-BS are assumed to be 5, 100 and 5 meters, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
183
+ page_content=' Similarly for the simulation purpose, M = M1 = M2 and N is taken as to be N = 2 M, in order to maintain the fairness in the comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
184
+ page_content=' The rest of the simulation parameters are summarized in Table I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
185
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
186
+ page_content=' 2 shows the SE performance for the DRAT scenario, where the solid lines without marker points show the exact (simulation) performance of DRAT, whereas the markers show the analytically derived upper and lower bounds on SE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
187
+ page_content=' Ad- ditionally, ASE for large M is also plotted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
188
+ page_content=' The simulation verifies that the derived upper and lower bounds are quite tight as the analytically derived bounds are remarkably close to the actual performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
189
+ page_content=' Further, it can also be noted that the difference between exact SE and ASE (as shown in (21)) diminishes as M increases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
190
+ page_content=' For instance, at M = 10 and 0 5 10 15 20 25 30 35 40 45 50 SNR (dB) 0 2 4 6 8 10 12 14 16 18 20 SE (bps/Hz) Sim UB LB Approx M = 10, 20, 50, 100 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
191
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
192
+ page_content=' SE with respect to ¯γ for different M of the proposed DRAT scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
193
+ page_content=' 0 500 1000 1500 2000 2500 M 0 5 10 15 20 25 SE (bps/Hz) DRAT SRAT DCT Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
194
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
195
+ page_content=' SE with respect to M for the proposed DRAT scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
196
+ page_content=' 0 2 4 6 8 10 12 14 16 18 20 SNR (dB) 10-6 10-5 10-4 10-3 10-2 10-1 100 Outage Rth=5 Rth=7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
197
+ page_content='5 Rth=10 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
198
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
199
+ page_content=' Outage with respect to Pt for different rate thresholds for DRAT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
200
+ page_content=' ¯γ = 30 dB, SE is 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
201
+ page_content='5037 bps/Hz whereas SE is 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
202
+ page_content='5034 bps/Hz;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
203
+ page_content=' however, at M = 50 and ¯γ = 15 dB, SE is 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
204
+ page_content='2201 whereas SE is 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
205
+ page_content='2200 bps/Hz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
206
+ page_content=' Thus, it shows that the bounds are quite accurate and near to the exact simulation value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
207
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
208
+ page_content=' 3 shows the SE results for the DRAT scenario, and compares them with the SRAT and DCT scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
209
+ page_content=' Specifically, it shows SE for a varying number of RUs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
210
+ page_content=' The following observations can be easily inferred from this plot: 1) Apart from smaller M, SE of DRAT is always better than SE of the SRAT scheme due to the fourth order gain provided by dual RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
211
+ page_content=' This can also be inferred from the analytical evaluation in (31).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
212
+ page_content=' 2) Due to the multiplicative pathloss, for less number of RUs, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
213
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
214
+ page_content=', smaller M, the DCT scenario may provide better SE performance than the RIS-reflected link for both DRAT and 0 500 1000 1500 2000 2500 M 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
215
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
216
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
217
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
218
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
219
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
220
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
221
+ page_content='7 EE (bits/Hz/Joule) DRAT SRAT DCT (a) EE with respect to M, here Pt = 10 dBm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
222
+ page_content=' 0 5 10 15 20 25 30 SNR (dB) 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
223
+ page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
224
+ page_content='5 EE (bits/Hz/Joule) DRAT SRAT DCT (b) EE with respect to SNR, here M = 1000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
225
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
226
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
227
+ page_content=' EE comparison for DRAT with respect to the SRAT and DCT scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
228
+ page_content=' SRAT scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
229
+ page_content=' However, as the number of RUs increases, the RIS-based scenarios outperform DCT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
230
+ page_content=' 3) Similar to single RIS, dual RIS-based DRAT also suffers from the multiplicative effect of pathloss.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
231
+ page_content=' Thus, for smaller RUs, the SRAT scenario shows better SE than the DRAT one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
232
+ page_content=' 4) As the number of RUs increases sufficiently, DRAT outperforms SRAT significantly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
233
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
234
+ page_content=' 4 shows the outage probability of the DRAT scenario for three different rate thresholds, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
235
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
236
+ page_content=', Rth = {5, 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
237
+ page_content='5, 10} bps/Hz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
238
+ page_content=' As evident from the result, the outage can be improved either through increasing the transmit power or the number of RUs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
239
+ page_content=' Since, the transmit power at BS is usually constrained, RIS provides an alternate to improve the outage through increasing RUs, instead of increasing the transmit power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
240
+ page_content=' Thus, to circum- vent the power constraint, the number of RUs at RIS can be scaled accordingly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
241
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
242
+ page_content=' 5 shows the EE results of the DRAT scenario, the EE plots of the SRAT and DCT scenarios are also plotted here for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
243
+ page_content=' Specifically, in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
244
+ page_content=' 5(a), the performance is with respect to M, while in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
245
+ page_content=' 5(b), the EE curve is plotted against SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
246
+ page_content=' It can be observed that, for large M, the DRAT scenario is the most energy-efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
247
+ page_content=' Although, for smaller M, single RIS provides better EE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
248
+ page_content=' this is due to the fact that the received signal of the dual RIS-reflected link suffers from the multiplicative pathloss that can be mitigated by by large M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
249
+ page_content=' From the above results on SE and EE, it can be easily inferred that the proposed DRAT scheme outperforms SRAT in terms of both SE as well as EE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
250
+ page_content=' Similarly, the above results also show that, for a fixed rate requirement, DRAT requires lower transmit power and hence is more energy efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
251
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
252
+ page_content=' CONCLUSION V2X has opened up a slew of novel possibilities in the wireless vehicular communication arena, but its potential for enabling true ITS has yet to be explored completely, despite its significant importance in the safety of autonomous driving.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
253
+ page_content=' In this work, we have envisioned the integration of RIS into vehicular networks to realize the true potential in enhancing the performance of the V2I communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
254
+ page_content=' Specifically, we have evaluated the performance of a dual-RIS assisted V2I uplink communication scenario in terms of the outage probability, SE and EE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
255
+ page_content=' Novel closed-form expressions are derived and verified through the extensive numerical simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
256
+ page_content=' The results show a significant gain in the performance can be achieved through the proposed RIS scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
257
+ page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
258
+ page_content=' ACKNOWLEDGEMENT This work was supported by the Nazarbayev University CRP Grant no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
259
+ page_content=' 11022021CRP1513.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
260
+ page_content=' REFERENCES [1] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
261
+ page_content=' Wang, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
262
+ page_content=' Zhu, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
263
+ page_content=' Hossain, “Green internet of vehicles (IoV) in the 6G era: Toward sustainable vehicular communications and networking,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
264
+ page_content=' Green Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
265
+ page_content=' Netw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
266
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
267
+ page_content=' 6, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
268
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
269
+ page_content=' 391–423, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
270
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
271
+ page_content=' [2] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
272
+ page_content=' Cao, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
273
+ page_content=' Xu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
274
+ page_content=' Liu, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
275
+ page_content=' Kato, “Toward smart and secure V2X communication in 5G and beyond: A UAV-enabled aerial intelligent reflecting surface solution,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
276
+ page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
277
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
278
+ page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
279
+ page_content=' [3] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
280
+ page_content=' Cheng, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
281
+ page_content=' Huang, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
282
+ page_content=' Chen, “Vehicular communication channel measurement, modelling, and application for beyond 5G and 6G,” IET Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
283
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
284
+ page_content=' 14, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
285
+ page_content=' 19, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
286
+ page_content=' 3303–3311, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
287
+ page_content=' [4] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
288
+ page_content=' Wu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
289
+ page_content=' Zhang, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
290
+ page_content=' Zheng, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
291
+ page_content=' You, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
292
+ page_content=' Zhang, “Intelligent reflecting surface-aided wireless communications: A tutorial,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
293
+ page_content=' Com- mun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
294
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
295
+ page_content=' 69, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
296
+ page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
297
+ page_content=' 3313–3351, May 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
298
+ page_content=' [5] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
299
+ page_content=' Huang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
300
+ page_content=' Zappone, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
301
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
302
+ page_content=' Alexandropoulos, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
303
+ page_content=' Debbah, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
304
+ page_content=' Yuen, “Reconfigurable intelligent surfaces for energy efficiency in wireless communication,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
305
+ page_content=' Wireless Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
306
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
307
+ page_content=' 18, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
308
+ page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
309
+ page_content=' 4157–4170, Aug.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
310
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
311
+ page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
312
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
313
+ page_content=' Javed et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
314
+ page_content=', “Reliable communications for cybertwin driven 6G IoVs using intelligent reflecting surfaces,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
315
+ page_content=' Ind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
316
+ page_content=' Info.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
317
+ page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
318
+ page_content=' [7] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
319
+ page_content=' Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
320
+ page_content=', “Outage analysis for intelligent reflecting surface assisted vehicular communication networks,” in IEEE Global Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
321
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
322
+ page_content=', 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
323
+ page_content=' 1–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
324
+ page_content=' [8] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
325
+ page_content=' Ai et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
326
+ page_content=', “Secure vehicular communications through reconfigurable intelligent surfaces,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
327
+ page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
328
+ page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
329
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
330
+ page_content=' 70, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
331
+ page_content=' 7, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
332
+ page_content=' 7272– 7276, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
333
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
334
+ page_content=' [9] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
335
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
336
+ page_content=' Dehkordi and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
337
+ page_content=' Caire, “Reconfigurable propagation environment for enhancing vulnerable road users’ visibility to automotive radar,” in IEEE Intelligent Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
338
+ page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
339
+ page_content=' (IV), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
340
+ page_content=' 1523–1528.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
341
+ page_content=' [10] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
342
+ page_content=' Chen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
343
+ page_content=', “Resource allocation for intelligent reflecting surface aided vehicular communications,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
344
+ page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
345
+ page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
346
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
347
+ page_content=' 69, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
348
+ page_content=' 10, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
349
+ page_content=' 12 321–12 326, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
350
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
351
+ page_content=' [11] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
352
+ page_content=' Al-Hilo et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
353
+ page_content=', “Reconfigurable intelligent surface enabled vehicular communication: Joint user scheduling and passive beamforming,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
354
+ page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
355
+ page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
356
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
357
+ page_content=' 71, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
358
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
359
+ page_content=' 2333–2345, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
360
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
361
+ page_content=' [12] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
362
+ page_content=' Noor-A-Rahim et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
363
+ page_content=', “6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities,” 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
364
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
365
+ page_content=' Available: https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
366
+ page_content='org/abs/2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
367
+ page_content='07753 [13] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
368
+ page_content=' Zhu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
369
+ page_content=', “Intelligent reflecting surface-aided vehicular networks toward 6G: Vision, proposal, and future directions,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
370
+ page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
371
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
372
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
373
+ page_content=' 16, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
374
+ page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
375
+ page_content=' 48–56, Dec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
376
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
377
+ page_content=' [14] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
378
+ page_content=' Bjornson, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
379
+ page_content=' Ozdogan, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
380
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
381
+ page_content=' Larsson, “Intelligent reflecting surface versus decode-and-forward: How large surfaces are needed to beat relaying?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
382
+ page_content=' IEEE Wireless Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
383
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
384
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
385
+ page_content=' 9, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
386
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
387
+ page_content=' 244– 248, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
388
+ page_content=' [15] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
389
+ page_content=' Kudathanthirige, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
390
+ page_content=' Gunasinghe, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
391
+ page_content=' Amarasuriya, “Performance analysis of intelligent reflective surfaces for wireless communication,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
392
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
393
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
394
+ page_content=' (ICC), 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
395
+ page_content=' 1–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/7NE2T4oBgHgl3EQfkwf2/content/2301.03983v1.pdf'}
7tE0T4oBgHgl3EQffQCV/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8369595ea6c4ab58f336b2984fe71df4fc2dc632d60ab4826cf38f0bf14178fb
3
+ size 5505069
7tE0T4oBgHgl3EQffQCV/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6adccef6ed621617cec8c0ccb7c8d1203fc77eb0ab63d61ca7b321fed8ab8372
3
+ size 192388
8dAzT4oBgHgl3EQfSPuZ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:98b695a693e02b9c52b02dfe40c931b50d1b31815f87afcd6b12e39b66186e87
3
+ size 161506
9dAzT4oBgHgl3EQfSfu4/content/tmp_files/2301.01234v1.pdf.txt ADDED
@@ -0,0 +1,855 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ AmbieGen: A Search-based Framework for Autonomous
2
+ Systems Testing
3
+ Dmytro Humeniuk, Foutse Khomh, Giuliano Antoniol
4
+ Polytechnique Montr´eal, 2500 Chemin de Polytechnique, QC H3T 1J4, Montr´eal,
5
+ Canada
6
+ Abstract
7
+ Thorough testing of safety-critical autonomous systems, such as self-driving
8
+ cars, autonomous robots, and drones, is essential for detecting potential fail-
9
+ ures before deployment. One crucial testing stage is model-in-the-loop test-
10
+ ing, where the system model is evaluated by executing various scenarios in
11
+ a simulator. However, the search space of possible parameters defining these
12
+ test scenarios is vast, and simulating all combinations is computationally in-
13
+ feasible. To address this challenge, we introduce AmbieGen, a search-based
14
+ test case generation framework for autonomous systems.
15
+ AmbieGen uses
16
+ evolutionary search to identify the most critical scenarios for a given system,
17
+ and has a modular architecture that allows for the addition of new systems
18
+ under test, algorithms, and search operators. Currently, AmbieGen supports
19
+ test case generation for autonomous robots and autonomous car lane keep-
20
+ ing assist systems. In this paper, we provide a high-level overview of the
21
+ framework’s architecture and demonstrate its practical use cases.
22
+ Keywords:
23
+ evolutionary search, autonomous systems, self driving cars,
24
+ autonomous robots, neural network testing
25
+ Metadata
26
+ The project metadata is presented in Table 1.
27
+ 1. Motivation and significance
28
+ Autonomous systems, including autonomous vehicles, robots, or drones
29
+ can provide a number of benefits such as driving assistance, high-risk zone
30
+ Preprint submitted to Science of Computer Programming
31
+ January 4, 2023
32
+ arXiv:2301.01234v1 [cs.RO] 1 Jan 2023
33
+
34
+ Nr.
35
+ Code metadata description
36
+ Please fill in this column
37
+ C1
38
+ Current code version
39
+ v0.1.0
40
+ C2
41
+ Permanent link to code/repository
42
+ used for this code version
43
+ For
44
+ example:
45
+ https://github.
46
+ com/swat-lab-optimization/
47
+ AmbieGen-tool
48
+ C3
49
+ Permanent
50
+ link
51
+ to
52
+ Reproducible
53
+ Capsule
54
+ https://codeocean.com/
55
+ capsule/1741442/tree
56
+ C4
57
+ Legal Code License
58
+ MIT license (MIT)
59
+ C5
60
+ Code versioning system used
61
+ git
62
+ C6
63
+ Software code languages, tools, and
64
+ services used
65
+ python
66
+ C7
67
+ Compilation requirements, operat-
68
+ ing environments and dependencies
69
+ indicated in requirements.txt
70
+ C8
71
+ If available, link to developer docu-
72
+ mentation/manual
73
+ https://github.com/
74
+ swat-lab-optimization/
75
+ AmbieGen-tool/blob/master/
76
+ README.md
77
+ C9
78
+ Support email for questions
79
80
+ Table 1: Code metadata (mandatory)
81
+ exploration, and aid in rescue operations. At the same time, these are safety-
82
+ critical systems and it is very important to ensure they are robust to unseen
83
+ environments and conditions. This can be done by thorough testing prior
84
+ to their deployment. Typically, at the initial development stages model-in-
85
+ the-loop testing is performed [1], where the system is tested in a simulation
86
+ environment. Given the complexity of autonomous systems, the number of
87
+ potential test scenarios is vast and exhaustive execution is not feasible. For
88
+ example, an autonomous vehicle scenario could involve a variety of param-
89
+ eters such as road topology, the movement and behavior of other vehicles
90
+ and pedestrians, traffic signs, weather conditions, etc. We surmise that in
91
+ order to identify the most critical scenarios for a given system, application
92
+ of search algorithms is necessary.
93
+ In this work, we propose AmbieGen, a search based framework for gen-
94
+ erating adversarial test scenarios for autonomous systems.
95
+ By leveraging
96
+ evolutionary search AmbieGen allows to find challenging and diverse test
97
+ scenarios.
98
+ 2
99
+
100
+ The problem of identifying critical scenarios for a system has been ad-
101
+ dressed in several previous works on falsifying temporal logic requirements
102
+ of cyber-physical systems, such as S-Taliro [2], Breach [3], and ARIsTEO [4].
103
+ These works typically consider falsifying a model of the system that takes a
104
+ set of input signals and produces a set of output signals.
105
+ In our work, we focus on testing autonomous systems for which the input
106
+ signals are complex and may include data from various sensors and cameras.
107
+ Generating a valid combination of falsifying input signals (such as lidar read-
108
+ ings and RGB camera readings) directly would be challenging. Therefore,
109
+ we propose a method for generating test cases that specify a virtual environ-
110
+ ment for the autonomous system, rather than the input signals. The input
111
+ signals are generated in the virtual environment during simulation based on
112
+ the actions of the autonomous agent.
113
+ Several approaches have been proposed for generating virtual environ-
114
+ ments for testing autonomous driving and robotics systems, including As-
115
+ Fault [5], Frenetic [6], DeepJanus [7], DeepHyperion [8] and others presented
116
+ at the SBST 2021 [9] and SBST 2022 [10] tool competitions.
117
+ The tool we present in this paper, AmbieGen, is the winner of SBST 2022
118
+ tool competition. It could produce the biggest number of diverse fault reveal-
119
+ ing scenarios for an autonomous vehicle lane keeping assist system (LKAS)
120
+ given a limited time budget. More details about the search algorithm im-
121
+ plementation can be found in our research paper [11]. In our work we have
122
+ shown that the simplified model of the system can be effective in guiding the
123
+ search for producing the test scenarios for the full, simulator based, model
124
+ of the system.
125
+ Our framework can be used for further research in the search algorithms,
126
+ search operator and fitness function design for autonomous systems adver-
127
+ sarial testing. We built the framework to be modular, and thus easily cus-
128
+ tomizable. By referring to project documentation as well as the example
129
+ implementations we provide, researchers can specify their own test scenario
130
+ generation problems, fitness functions, crossover and mutation operators.
131
+ This tool is developed in Python and can be easily run as a python package.
132
+ More instructions and examples are provided in the AmbieGen repository.
133
+ 2. Software description
134
+ In this work, we present AmbieGen, an open-source Python framework
135
+ that utilizes evolutionary search for the generation of test scenarios for au-
136
+ 3
137
+
138
+ tonomous systems. Currently, AmbieGen supports the creation of test sce-
139
+ narios for lane keeping assist systems (LKAS) in autonomous vehicles and
140
+ for autonomous robots navigating a closed room with obstacles.
141
+ The test scenarios for LKAS in vehicles are designed to challenge the
142
+ system with various road topologies, while the scenarios for autonomous
143
+ robots involve navigating a closed room with obstacles.
144
+ Examples of the
145
+ generated scenarios can be seen in Figure 1.
146
+ Figure 1: An example of the test case for LKAS system (a) and an autonomous robot (b).
147
+ The x-axis represents the map length in meters, and the y-axis represents the map width
148
+ in meters.
149
+ 2.1. Software architecture
150
+ This subsection provides a detailed description of the software imple-
151
+ mentation of AmbieGen. The key components of AmbieGen are illustrated
152
+ in Figure 2, which are common components for implementing evolutionary
153
+ search. We use the Pymoo framework [12] to implement the search algo-
154
+ rithms. The most important modules and classes are outlined below:
155
+ • Solution - this is one of the most important classes, which contains all
156
+ the necessary attributes and functions needed to represent the candi-
157
+ date solution of the algorithm. It should contain a scenario attribute
158
+ with the list of test case parameters, function for fitness evaluation,
159
+ novelty calculation, as well as, optionally, image generation.
160
+ 4
161
+
162
+ 200
163
+ a
164
+ 40
165
+ b
166
+
167
+ Ci
168
+
169
+ 35-
170
+
171
+
172
+
173
+ 30
174
+
175
+ 25
176
+ Robotpath
177
+ 20-
178
+ Walls
179
+ V
180
+
181
+ 15 -
182
+
183
+
184
+
185
+
186
+ 10
187
+ 5
188
+
189
+
190
+ fo
191
+ 0
192
+ 0
193
+ 5
194
+ 10
195
+ 15
196
+ 20
197
+ 25
198
+ 200
199
+ 30
200
+ 35
201
+ 40Figure 2: AmbieGen architecture
202
+ • Sampling - this is the class for initial population generation. At the
203
+ output it provides N instances of the Solution class, with the initial-
204
+ ized scenario attribute, defining the test scenario. Typically the test
205
+ scenario is represented by a two dimensional array, randomly initial-
206
+ ized based on the minimum and maximum values of the test case pa-
207
+ rameters, defined in the configuration file. Each column of the array
208
+ corresponds to some part of the environment. More information about
209
+ the representation of the test scenarios that we used can be found in
210
+ the repository page as well as in our research article.
211
+ • Problem - in this class, we define the logic for evaluating the fitness
212
+ of each solution. For single-objective search (using GA), we specify
213
+ the fitness function for evaluating the scenario fault revealing power.
214
+ For two-objective search (using NSGA-II), we define two objectives:
215
+ fault revealing power and novelty calculation. The novelty objective
216
+ is calculated as the average novelty of a given test scenario relative to
217
+ the 5 solutions with the highest fault revealing power fitness. If the
218
+ problem has any constraints, such as a minimum required fitness value,
219
+ they should also be specified in this class.
220
+ • TC to environment - this is a function to transform the test case (TC)
221
+ encoded as a 2D array of parameters, to the input format suitable for
222
+ the system model. For example, for the LKAS problem, the model
223
+ input is a list of the 2D coordinates of points, defining the road topol-
224
+ ogy. The test case itself is represented as a sequence of transformations
225
+ 5
226
+
227
+ Pymoo
228
+ post_processing()
229
+ Sampling
230
+ Solution object 1
231
+ TC to environment ()
232
+ +gen_randomscenario()
233
+ Solution object 2
234
+ Problem
235
+ fitness evaluation ()
236
+ Solution object 3
237
+ Solution
238
+ Crossover
239
+ +map_size
240
+ Solution object 4
241
+ configuration file
242
+ +scenario
243
+ Mutation
244
+ +fitness eval()
245
+ Population size
246
+ Solution object N
247
+ Numberofgenerations
248
+ +novelty eval()
249
+ Crossover/mutationrate
250
+ +build image()
251
+ TCparameterranges
252
+ Folderto save resultsneeded to perform to obtain the points. For the autonomous robot the
253
+ test scenario is represented as a sequence of parameters describing the
254
+ 2D map with obstacles. The TC to environment module is used to
255
+ create a 2D bitmap from the given parameters. The bitmap is given
256
+ as the input to the autonomous robot model, which runs a planning
257
+ algorithm to find the shortest path between the start and goal location.
258
+ • fitness evaluation - a function to calculate the fitness i.e fault revealing
259
+ power of the scenario. It takes the output of the TC to environment
260
+ function as the input and execute the system model. It collects the
261
+ data about the model behaviour during execution and computes the
262
+ fitness score. For the LKAS system, the fitness is defined by the biggest
263
+ deviation from the lane center and for the autonomous robot - by the
264
+ length of the path to reach the goal.
265
+ • Crossover - in this class the crossover operator is defined. Currently
266
+ we are using a one point crossover, which can be applied to fixed and
267
+ variable length solutions.
268
+ • Mutation - in this class the mutation operator is implemented. We
269
+ have 2 types of mutations: exchange and change of variable. In ex-
270
+ change mutation, two randomly selected columns of the test case are
271
+ exchanged. In the case of the road topology, it would correspond to
272
+ exchanging the positions of two random road segments. In change of
273
+ variable mutation, a randomly selected parameter value in the test case
274
+ matrix is changed. In the road topology example it could correspond
275
+ to the change of the length of one of the straight road segments.
276
+ • post processing - The post-processing module of our framework includes
277
+ several functions for handling the test suite and its metadata.
278
+ The
279
+ function get test suite() retrieves the test suite, get stats() retrieves
280
+ metadata such as fitness and novelty scores, and save tcs images()
281
+ saves the images of the test cases. The size of the test suite, denoted
282
+ as T, can be specified in the configuration file. In our experiments, T
283
+ was typically set to 30, representing the best solutions found by the
284
+ algorithm.
285
+ Metadata for the test suite includes the fitness of the top T solutions,
286
+ their novelty (calculated as the average novelty between all pairs of
287
+ scenarios in the test suite), and the convergence (best solution fitness
288
+ 6
289
+
290
+ found at each epoch).
291
+ The post-processing module also includes a
292
+ compare.py script for comparing the results of different algorithms,
293
+ using the collected metadata to generate convergence plots and fitness
294
+ and diversity boxplots.
295
+ • configuration file - finally we have a configuration file, where the pa-
296
+ rameters of the algorithm, such as: the population size, the number
297
+ of generations, crossover/mutation rate, and the test suite size are de-
298
+ fined. Users should also specify the allowable ranges for the test case
299
+ parameters and the paths for saving the resulting test suite and its
300
+ metadata.
301
+ Currently, when adding a new problem, one should provide the implemen-
302
+ tation of each of the modules as well as the TC to environment and fitness
303
+ evaluation functions. We are working on reducing the number of additional
304
+ implementations needed. Our framework includes the implementation of all
305
+ the modules for the LKAS and autonomous robot test case generation prob-
306
+ lems.
307
+ 2.2. Software functionalities
308
+ AmbieGen public version 0.1.0 as presented in this paper offers the fol-
309
+ lowing major functionalities:
310
+ • Autonomous vehicle LKAS system testing: generating scenarios, rep-
311
+ resented as a list of 2D coordinates defining the road topology.
312
+ • Autonomous robot testing: generating scenarios, represented as the 2D
313
+ bitmap, defining obstacle locations in a fixed sized map.
314
+ • Search-based generation: our framework provides options for search-
315
+ based test suite generation, including random search, single-objective
316
+ genetic algorithm (GA), and two-objective genetic algorithm (NSGA-
317
+ II). The search algorithms are implemented using the Pymoo frame-
318
+ work [12], and can be easily extended to support additional algorithms
319
+ supported by Pymoo with minor modifications.
320
+ The single-objective GA optimizes the test suite for scenario fault re-
321
+ vealing power, while the two-objective NSGA-II optimizes for both
322
+ fault revealing power and diversity.
323
+ As demonstrated in our previ-
324
+ ous work [11], the two-objective algorithm allows to produce a more
325
+ diverse set of test scenarios compared to the single-objective search.
326
+ 7
327
+
328
+ • Experiment data tracking: AmbieGen tracks the results of each ex-
329
+ periment and saves them in a user-defined location. The saved data
330
+ includes the T (as determined by the user) best test scenarios identified
331
+ based on their fitness or crowding distance, as well as their associated
332
+ metadata such as fitness, average diversity, and visualizations. This
333
+ allows for easy analysis and comparison of the results of different ex-
334
+ periments.
335
+ 2.3. Use cases of the software
336
+ In this subsection we provide an illustrative example of how to use Am-
337
+ bieGen to generate test cases for an autonomous robot planning algorithm
338
+ testing. Suppose we want to perform 30 runs of the NSGA-II algorithm with
339
+ 150 individuals and 200 generations to evaluate this configuration. We want
340
+ to save the generated test cases, their illustrations as well as their metadata,
341
+ such as fitness and diversity. Below you can see the configuration file entries
342
+ with the parameters we chose for the genetic algorithm and well as the path
343
+ to save the experiment results:
344
+ ga = {" pop_size ": 150, "n_gen ": 200, "mut_rate ": 0.4, "cross_rate ": 0.9,
345
+ " test_suite_size ": 30 }
346
+ files = {" stats_path ": "stats", "tcs_path ": "tcs", "images_path ": images "}
347
+ Now we are ready to start the test case generation. We can launch Am-
348
+ bieGen with the following command and parameters:
349
+ python
350
+ optimize.py --problem =" robot" --algo =" nsga2" --runs =30 \\
351
+ --save_results=True
352
+ The search will start and you could see some printouts, such as in Fig. 3 with
353
+ the current number of generation (n gen), number of evaluations (n eval),
354
+ constraint violation (cv min), number of non-dominant solution for NSGA-
355
+ II algorithm (n nds) and the best solution found (f opt) for GA algorithm.
356
+ More details about the printed information can be found on the Pymoo page
357
+ (https://pymoo.org/interface/display.html).
358
+ After a successful run, you will see the confirmation about the run exe-
359
+ cution time, saved test cases, their metadata and the images, as in Fig. 4
360
+ In Fig. 5 you can see examples of the metadata saved, such as the algo-
361
+ rithm convergence 5a (the best fitness value at each generation in the format
362
+ ”evaluation number”: best fitness found), the fitness of the test cases in the
363
+ test suite as well as their average diversity i.e., novelty 5b. Novelty is cal-
364
+ culated as the average diversity of all of the pairs of the test cases in the
365
+ 8
366
+
367
+ Figure 3: Printouts during the search
368
+ Figure 4: Successful run confirmation
369
+ test suite. In Fig. 6 we show an example of the test case images saved for a
370
+ particular run.
371
+ (a) Scenario fitness convergence
372
+ (b) Final test suite fitness and diversity
373
+ Figure 5: Metadata for the generated scenarios
374
+ Finally, let us suppose we also want to run a random search with the same
375
+ evaluation budget to be able to compare the performance of our configuration
376
+ of NSGA-II algorithm to some baseline. We can run the random search by
377
+ 9
378
+
379
+ 01:0602.320 INFO
380
+ started test generation,writing logs to file: logs.txt
381
+ -12-9101:0602,320INFO
382
+ Running the optimization
383
+ 2-12-9801:0602,321INFO
384
+ Problem: robot,Algorithm:nsga2,Runs number:3e,Saving the results:True
385
+ 2-12-9101:06.02,343INFO
386
+ Executing run o:
387
+ 2-12-9101:06:02344INFO
388
+ Using random seed:1753925990
389
+ n_gen
390
+ n_eval
391
+ innds
392
+ cvmin
393
+ cv_avg
394
+ eps
395
+ indicator
396
+ 1
397
+ 150
398
+ 1
399
+ 5.474517E+01
400
+ 8.330072E+91
401
+ 2
402
+ 300
403
+ 1
404
+ 4.684567E+01
405
+ 7.742613E+01
406
+ 3
407
+ 450
408
+ 1
409
+ 4.436039E+01
410
+ 7.231653E+01
411
+ 4
412
+ 600
413
+
414
+ 3.167410E+01
415
+ 6.692135E+01
416
+ 5
417
+ 750
418
+ 1
419
+ 7.8751083190
420
+ 6.161694E+0103:21:13,072INFO
421
+ Execution time,6909.677314 sec
422
+ ,088INFO
423
+ Test suite of 3o test scenarios generated
424
+ $,103INFO
425
+ Thehighest fitnessfound:224.994949
426
+ 3:211L3,103INFO
427
+ Average diversity:0.720751
428
+ 03:21:25,148INFO
429
+ Stats savedas stats nsga231-12-2022-stats.json
430
+ 03:21:25,157INFO
431
+ Stats saved asstats nsga231-12-2022-conv.json
432
+ 3:21:25,361INFO
433
+ Test cases saved as tcs nsga2l31-12-2022-tcs.json
434
+ 03:21:53,871INFO
435
+ Images saved in tc images nsga2
436
+ 21:53,871INFO
437
+ Images saved in tcimagesnsga2rung":f
438
+ "158":97.81219330881972
439
+ 200":99.59797974644661
440
+ "250":99.59797974644661,
441
+ "300":186.18376618487352,
442
+ "350":186.18376618407352,
443
+ "480":106.18376618407352,
444
+ "450:107.25483399593897,
445
+ "500":107.25483399593897,
446
+ "550":130.56854249492375,
447
+ "600":130.56854249492375,
448
+ "650":130.56854249492375,
449
+ "700":130.56854249492375,
450
+ "888"130.56854249492375
451
+ "850":
452
+ 130.56854249492375,
453
+ "900":rune":f
454
+ "fitness":[
455
+ 198.7106781186548
456
+ 171.8538238691624,
457
+ 192.02438661763966,
458
+ 194.46803743153552,
459
+ 190.36753236814718,
460
+ 211.88225099390866,
461
+ 209.88225099390866,
462
+ 194.85281374238588,
463
+ 168.71067811865476,
464
+ 191.8822509939086,
465
+ 181.15432893255073,
466
+ 183.39696961967007
467
+ novelty":0.23096571372433472
468
+ runi"Figure 6: Images of the generated scenarios
469
+ executing the following command:
470
+ python
471
+ optimize.py --problem =" robot" --algo =" random" --runs =30 \\
472
+ --save_results=True
473
+ The random search will be run and the metadata saved, as in the previous
474
+ case. Now we can compare the results produced by the two different search
475
+ algorithms via executing the following command:
476
+ python
477
+ compare.py --stats_path =" stats_nsga2" " stats_random" \\
478
+ --stats_names "NSGA -II" "Random"
479
+ In the stats path argument we specify the paths of the metadata for the
480
+ runs we wish to compare and in the stats names the names we assign for the
481
+ runs.
482
+ In Fig.7 and Fig. 8 we can see examples of the outputs produced by the
483
+ compare.py script. Fig. 7a shows the fitness and Fig. 7b the diversity of the
484
+ scenarios in the test suites produced over the specified number of runs. Fig.
485
+ 8 shows the best values found by the compared search algorithms over the
486
+ generations.
487
+ 3. Illustrative examples
488
+ In this section, we present the summarized results of several test genera-
489
+ tion case studies using the AmbieGen tool. The full results can be found in
490
+ our research paper [11] and the SBST 2022 competition report [10].
491
+ We conducted a case study on an autonomous robot with an obstacle
492
+ avoidance algorithm based on nearness diagrams [13]. The robot model was
493
+ a Pioneer 3-AT equipped with a SICK LMS200 laser with a sensing range
494
+ of 10 meters. The simulations were run in the Player/Stage simulator [14].
495
+ 10
496
+
497
+ 2022-10-15-images_fin_rob
498
+ Vruno
499
+ o.png
500
+ 1.png
501
+ 2.png
502
+ Test case fitenss 198.7106781186548
503
+ 3.png
504
+ Robotpathm
505
+ 质4.png
506
+ Walls
507
+ 35
508
+ 5.png
509
+ 6.png
510
+ 30
511
+ 7.png
512
+ 25
513
+ 8.png
514
+ 9.png
515
+ U
516
+ 20
517
+ 10.png
518
+ U
519
+ 15
520
+ 11.png
521
+ U
522
+ 10
523
+ 12.png
524
+ U
525
+ 13.png
526
+ U
527
+ 5
528
+ 14.png
529
+ U
530
+ 15.png
531
+ U
532
+ 0
533
+ 5
534
+ 10
535
+ 15
536
+ 20
537
+ 30
538
+ 35
539
+ 40(a) Scenario fitness
540
+ (b) Scenario diversity
541
+ Figure 7: Evaluating the NSGA-II algorithm for autonomous robot test case generation
542
+ Figure 8: Comparing the convergence of NSGA-II and random search for autonomous
543
+ robot case study
544
+ You can see an illustration of the simulation environment in Fig. 9a. We
545
+ used AmbieGen to generate diverse maps with obstacles to test the robot’s
546
+ performance. We identified several scenarios in which the robot became stuck
547
+ and failed to reach its goal location. An example of such a scenario can be
548
+ found in the following video: Video.
549
+ To evaluate the effectiveness of our tool, we allocated a two-hour budget
550
+ for AmbieGen to generate test scenarios. The generated scenarios were then
551
+ passed to the simulator and executed. We repeated the experiment 30 times,
552
+ using both the NSGA-II and random search configurations of AmbieGen.
553
+ The average number of failures detected is shown in Fig. 9b. On average,
554
+ 11
555
+
556
+ 220
557
+ NSGA-II
558
+ Random
559
+ 200
560
+ 180
561
+ Fitness
562
+ 160
563
+ 140
564
+ 120
565
+ 100
566
+ 80
567
+ 0
568
+ 20
569
+ 40
570
+ 60
571
+ 80
572
+ 100
573
+ 120
574
+ 140
575
+ Numberofgenerations250
576
+ 200
577
+ itness
578
+ .150
579
+ 左 100
580
+ 50
581
+ 0
582
+ Random
583
+ NSGA-II
584
+ Algorithm0.8
585
+ 0.6
586
+ Novelty
587
+ 0.4
588
+ 0.2
589
+ 0.0
590
+ Random
591
+ NSGA-II
592
+ AlgorithmAmbieGen detected 9 failures in two hours, compared to 2 failures for random
593
+ search
594
+ (a) Executing autonomous robot scenario in the Play-
595
+ er/Stage simulator
596
+ (b) The number of failures revealed by AmbieGen for
597
+ the robot case study
598
+ Figure 9: Using AmbieGen for testing autonomous robot navigation algorithm
599
+ In the second case study, we evaluated the performance of our test gener-
600
+ ation tool on an autonomous vehicle lane keeping assist system (LKAS) using
601
+ the BeamNg simulator [15]. We used the AmbieGen tool to generate diverse,
602
+ fault-revealing road topologies, which were then simulated in the BeamNg
603
+ environment (shown in Fig. 10a). During the simulations, we identified a
604
+ number of scenarios in which the vehicle left its lane (an example of which
605
+ can be seen in the video at Video).
606
+ We ran our tool for a time budget of 2 hours, using the SBST22 compe-
607
+ tition code pipeline. The failure criterion for the LKAS system was defined
608
+ as more than 85% of the car’s area leaving the lane. The driving agent had
609
+ a maximum speed of 70 Km/h. We compared the results of AmbieGen’s
610
+ NSGA-II configuration, Random Search configuration, and the Frenetic tool
611
+ [6], which was also given a 2-hour time budget for test generation.
612
+ As shown in Fig. 10b, out of 30 runs, AmbieGen and Frenetic on average
613
+ produced almost the same number of failures (14), while Random Search
614
+ produced an average of 9 failures.
615
+ The obtained results suggest that AmbieGen could effectively identify
616
+ failures in the autonomous systems under test.
617
+ 4. Impact
618
+ Autonomous systems testing is an important area of research, and finding
619
+ test scenarios that reveal a diverse range of system failures within a limited
620
+ 12
621
+
622
+ 25
623
+ faults
624
+ 20
625
+ 15
626
+ Revealed
627
+ 10
628
+ 5
629
+ 0
630
+ AmbieGen
631
+ RandomSearch
632
+ Generationmethod(a) Executing the LKAS scenario in the BeamNg sim-
633
+ ulator
634
+ (b) The number of failures revealed by AmbieGen for
635
+ the LKAS case study
636
+ Figure 10: Using AmbieGen to test autonomous vehicle LKAS model
637
+ time and evaluation budget is a significant challenge [16]. One of the common
638
+ solutions is to use evolutionary search to guide the sampling towards more
639
+ challenging scenarios [5, 7]. These search based techniques allow to identify
640
+ potential failures and improve the overall reliability of the system.
641
+ AmbieGen is a test generation tool that uses evolutionary search to gen-
642
+ erate test scenarios for autonomous systems. Its modular design allows for
643
+ customization of the initial population generation function, fitness evaluation
644
+ function, search operators (such as crossover and mutation), and the search
645
+ algorithm itself. Out of the box, AmbieGen supports testing of autonomous
646
+ robots and vehicle LKAS systems, and additional systems can be added using
647
+ the provided implementations as examples.
648
+ AmbieGen is a valuable resource for research on search-based test case
649
+ generation for autonomous systems. Its built-in modules enable easy com-
650
+ parison of different search algorithms and their modifications, based on the
651
+ quality and diversity of the generated solutions, as well as the convergence
652
+ of the algorithm over time.
653
+ AmbieGen can help answer research questions that are not frequently
654
+ discussed in the literature, such as:
655
+ • To what extent the diversity preservation technique A helps improve
656
+ the diversity of the test suite? The importance of the diversity in test
657
+ case generation is extensively discussed in the work of Klikovits et al.
658
+ [17].
659
+ • To what extent does the search operator A helps improve the conver-
660
+ gence over the operator B? To what extent the algorithm A outperforms
661
+ 13
662
+
663
+ 30
664
+ 25
665
+ ults
666
+ 20
667
+ led
668
+ 15
669
+ veal
670
+ Rev
671
+ 10
672
+ 5
673
+ 0
674
+ AmbieGen
675
+ Frenetic
676
+ RandomSearch
677
+ Generationmethodthe algorithm B for the test case generation? Improvements to the base-
678
+ line genetic algorithms implementations can lead to better results, as
679
+ discussed by Abdessalem et al. [18], where multi-objective population-
680
+ based search algorithms and decision tree classification were combined.
681
+ • What fitness criteria are more relevant for guiding the system towards
682
+ fault revealing scenarios? This question includes the comparison of the
683
+ single, multi-objective based search as well surrogate model assisted
684
+ search.
685
+ AmbieGen can also be useful in the pursuit of actively studied research ques-
686
+ tions, where the fault revealing test case generation is required, such as:
687
+ transferability of failures from simulation to the real world [19], autonomous
688
+ system failure prediction [20], test case prioritization [21] and others.
689
+ AmbieGen has proven its effectiveness in fault revealing by winning this
690
+ year’s edition of the SBST 2022 cyber-physical testing tool competition. Our
691
+ submission is described in the following article [22] and is available at the fol-
692
+ lowing link https://github.com/dgumenyuk/tool-competition-av.
693
+ We
694
+ have always kept our tool open sourced and we expect more people to start
695
+ using it. We welcome all the contributions for expanding our framework.
696
+ 5. Conclusions
697
+ In this paper, we present the AmbieGen framework for search based test
698
+ case generation for autonomous systems, in its public version 0.1.0.
699
+ We
700
+ briefly outline the motivation for developing this framework, its workflow and
701
+ main functionalities. We also provide illustrative examples for using the tool
702
+ for autonomous vehicle lane keeping assist system testing and autonomous
703
+ robot obstacle avoiding algorithm testing.
704
+ The main features of our tool
705
+ include:
706
+ • modular architecture, which allows researchers to easily modify the
707
+ existing modules, such as initial population generation, crossover, mu-
708
+ tation, fitness function as well as introduce new problems and run ex-
709
+ periments;
710
+ • we provide implementations of test case generation for two systems
711
+ under test: autonomous vehicle LKAS system and autonomous robot;
712
+ this implementation includes three search algorithms: random search,
713
+ 14
714
+
715
+ single objective genetic algorithm and a two-objective NSGA-II genetic
716
+ algorithm;
717
+ • our framework is built to be compatible with Pymoo framework [12],
718
+ allowing to fully benefit from the Pymoo framework features, such as
719
+ high number of implemented algorithms in Pymoo.
720
+ 6. Future Plans
721
+ Our framework currently includes the implementation of two test case
722
+ generation problems, as well as three algorithms (random search, GA, NSGA-
723
+ II) for generating test cases. The fitness function is calculated based on a
724
+ simplified model of the system, and test scenarios are represented as 2D
725
+ arrays, with each column describing a discrete aspect of the scenario. In the
726
+ future, we plan to expand the capabilities of our framework to include:
727
+ • new algorithms, especially the ones based on the quality-diversity search
728
+ [23]
729
+ • new test case generation problems, for instance more complex test sce-
730
+ narios that include moving pedestrians, other vehicles and traffic signs;
731
+ • new fitness functions e.g based on surrogate models of the system under
732
+ test, as in the work of Ramakrishna et al. [24], functions based on
733
+ neuron coverage [25] and surprise adequacy [26] dedicated to testing
734
+ systems containing neural networks;
735
+ • add new problem representations, supporting popular scenario specifi-
736
+ cation languages such as SCENIC [27];
737
+ • add an integration with popular simulators, for instance CARLA [28]
738
+ or LGSVL [29]. This will allow to directly evaluate the system model
739
+ with the generated scenarios. Also the feedback from the simulators
740
+ could be incorporated in fitness functions for guiding the test scenario
741
+ sampling.
742
+ Acknowledgements
743
+ This work is partly funded by the by the Fonds de Recherche du Qu´ebec
744
+ (FRQ), the Natural Sciences and Engineering Research Council of Canada
745
+ (NSERC), and the Canadian Institute for Advanced Research (CIFAR).
746
+ 15
747
+
748
+ References
749
+ [1] D. Bruggner, A. Hegde, F. S. Acerbo, D. Gulati, T. D. Son, Model in the
750
+ loop testing and validation of embedded autonomous driving algorithms,
751
+ in: 2021 IEEE Intelligent Vehicles Symposium (IV), IEEE, 2021, pp.
752
+ 136–141.
753
+ [2] Y. Annpureddy, C. Liu, G. Fainekos, S. Sankaranarayanan, S-taliro: A
754
+ tool for temporal logic falsification for hybrid systems, in: International
755
+ Conference on Tools and Algorithms for the Construction and Analysis
756
+ of Systems, Springer, 2011, pp. 254–257.
757
+ [3] A. Donz´e, Breach, a toolbox for verification and parameter synthesis
758
+ of hybrid systems, in: International Conference on Computer Aided
759
+ Verification, Springer, 2010, pp. 167–170.
760
+ [4] C. Menghi, S. Nejati, L. Briand, Y. I. Parache, Approximation-
761
+ refinement testing of compute-intensive cyber-physical models: An ap-
762
+ proach based on system identification, in: 2020 IEEE/ACM 42nd Inter-
763
+ national Conference on Software Engineering (ICSE), IEEE, 2020, pp.
764
+ 372–384.
765
+ [5] A. Gambi, M. Mueller, G. Fraser, Automatically testing self-driving cars
766
+ with search-based procedural content generation, in: Proceedings of the
767
+ 28th ACM SIGSOFT International Symposium on Software Testing and
768
+ Analysis, IEEE, 2019, pp. 318–328.
769
+ [6] E. Castellano, A. Cetinkaya, C. H. Thanh, S. Klikovits, X. Zhang, P. Ar-
770
+ caini, Frenetic at the sbst 2021 tool competition, in: 2021 IEEE/ACM
771
+ 14th International Workshop on Search-Based Software Testing (SBST),
772
+ IEEE, 2021, pp. 36–37.
773
+ [7] V. Riccio, P. Tonella, Model-based exploration of the frontier of be-
774
+ haviours for deep learning system testing, in: Proceedings of the 28th
775
+ ACM Joint Meeting on European Software Engineering Conference and
776
+ Symposium on the Foundations of Software Engineering, 2020, pp. 876–
777
+ 888.
778
+ [8] T. Zohdinasab, V. Riccio, A. Gambi, P. Tonella, Deephyperion: explor-
779
+ ing the feature space of deep learning-based systems through illumina-
780
+ 16
781
+
782
+ tion search, in: Proceedings of the 30th ACM SIGSOFT International
783
+ Symposium on Software Testing and Analysis, 2021, pp. 79–90.
784
+ [9] S. Panichella, A. Gambi, F. Zampetti, V. Riccio, Sbst tool competition
785
+ 2021, in: 2021 IEEE/ACM 14th International Workshop on Search-
786
+ Based Software Testing (SBST), IEEE, 2021, pp. 20–27.
787
+ [10] A. Gambi, G. Jahangirova, V. Riccio, F. Zampetti, Sbst tool competition
788
+ 2022, in: 2022 IEEE/ACM 15th International Workshop on Search-
789
+ Based Software Testing (SBST), IEEE, 2022, pp. 25–32.
790
+ [11] D. Humeniuk, F. Khomh, G. Antoniol, A search-based framework for
791
+ automatic generation of testing environments for cyber–physical sys-
792
+ tems, Information and Software Technology 149 (2022) 106936. doi:
793
+ https://doi.org/10.1016/j.infsof.2022.106936.
794
+ [12] J. Blank, K. Deb, pymoo: Multi-objective optimization in python, IEEE
795
+ Access 8 (2020) 89497–89509.
796
+ [13] J. Minguez, L. Montano, Nearness diagram (nd) navigation: collision
797
+ avoidance in troublesome scenarios, IEEE Transactions on Robotics and
798
+ Automation 20 (1) (2004) 45–59.
799
+ [14] M. Kranz, R. B. Rusu, A. Maldonado, M. Beetz, A. Schmidt, A play-
800
+ er/stage system for context-aware intelligent environments, Proceedings
801
+ of UbiSys 6 (8) (2006) 17–21.
802
+ [15] BeamNG.tech, Beamng gmbh. (2021).
803
+ URL https://www.beamng.gmbh/research
804
+ [16] W. Ding, C. Xu, M. Arief, H. Lin, B. Li, D. Zhao, A survey on
805
+ safety-critical driving scenario generation – a methodological perspec-
806
+ tive (2022). doi:10.48550/ARXIV.2202.02215.
807
+ URL https://arxiv.org/abs/2202.02215
808
+ [17] S. Klikovits, V. Riccio, E. Castellano, A. Cetinkaya, A. Gambi, P. Ar-
809
+ caini, Does road diversity really matter in testing automated driving
810
+ systems?–a registered report, arXiv preprint arXiv:2209.05947 (2022).
811
+ [18] R. B. Abdessalem, S. Nejati, L. C. Briand, T. Stifter, Testing vision-
812
+ based control systems using learnable evolutionary algorithms, in: 2018
813
+ 17
814
+
815
+ IEEE/ACM 40th International Conference on Software Engineering
816
+ (ICSE), IEEE, 2018, pp. 1016–1026.
817
+ [19] A. Stocco, B. Pulfer, P. Tonella, Mind the gap! a study on the transfer-
818
+ ability of virtual vs physical-world testing of autonomous driving sys-
819
+ tems, IEEE Transactions on Software Engineering (2022).
820
+ [20] A. Stocco, P. Tonella, Confidence-driven weighted retraining for pre-
821
+ dicting safety-critical failures in autonomous driving systems, Journal
822
+ of Software: Evolution and Process (2021) e2386.
823
+ [21] A. Arrieta, P. Valle, J. A. Agirre, G. Sagardui, Some seeds are strong:
824
+ Seeding strategies for search-based test case selection, ACM Transac-
825
+ tions on Software Engineering and Methodology (2022).
826
+ [22] D. Humeniuk, G. Antoniol, F. Khomh, Ambiegen tool at the sbst 2022
827
+ tool competition, in: 2022 IEEE/ACM 15th International Workshop on
828
+ Search-Based Software Testing (SBST), IEEE, 2022, pp. 43–46.
829
+ [23] J. K. Pugh, L. B. Soros, K. O. Stanley, Quality diversity: A new frontier
830
+ for evolutionary computation, Frontiers in Robotics and AI (2016) 40.
831
+ [24] S. Ramakrishna, B. Luo, Y. Barve, G. Karsai, A. Dubey, Risk-aware
832
+ scene sampling for dynamic assurance of autonomous systems, in: 2022
833
+ IEEE International Conference on Assured Autonomy (ICAA), IEEE,
834
+ 2022, pp. 107–116.
835
+ [25] K. Pei, Y. Cao, J. Yang, S. Jana, Deepxplore: Automated whitebox
836
+ testing of deep learning systems, in: proceedings of the 26th Symposium
837
+ on Operating Systems Principles, 2017, pp. 1–18.
838
+ [26] J. Kim, R. Feldt, S. Yoo, Guiding deep learning system testing using
839
+ surprise adequacy, in: 2019 IEEE/ACM 41st International Conference
840
+ on Software Engineering (ICSE), IEEE, 2019, pp. 1039–1049.
841
+ [27] D. J. Fremont, E. Kim, T. Dreossi, S. Ghosh, X. Yue, A. L. Sangiovanni-
842
+ Vincentelli, S. A. Seshia, Scenic: A language for scenario specification
843
+ and data generation, Machine Learning (2022) 1–45.
844
+ [28] A. Dosovitskiy, G. Ros, F. Codevilla, A. Lopez, V. Koltun, Carla: An
845
+ open urban driving simulator, in: Conference on robot learning, PMLR,
846
+ 2017, pp. 1–16.
847
+ 18
848
+
849
+ [29] G. Rong, B. H. Shin, H. Tabatabaee, Q. Lu, S. Lemke, M. Moˇzeiko,
850
+ E. Boise, G. Uhm, M. Gerow, S. Mehta, et al., Lgsvl simulator: A high
851
+ fidelity simulator for autonomous driving, in: 2020 IEEE 23rd Interna-
852
+ tional conference on intelligent transportation systems (ITSC), IEEE,
853
+ 2020, pp. 1–6.
854
+ 19
855
+
9dAzT4oBgHgl3EQfSfu4/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/2301.05519v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
9tE5T4oBgHgl3EQfRQ5h/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
AdE1T4oBgHgl3EQfpAU_/content/tmp_files/2301.03326v1.pdf.txt ADDED
@@ -0,0 +1,419 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Simulating the radio emission of dark matter for new
2
+ high-resolution observations with MeerKAT
3
+ M Sarkis and G Beck
4
+ School of Physics, University of the Witwatersrand, Private Bag 3, WITS-2050, Johannesburg,
5
+ South Africa
6
+ E-mail: [email protected]
7
+ Abstract.
8
+ Recent work has shown that searches for diffuse radio emission by MeerKAT - and
9
+ eventually the SKA - are well suited to provide some of the strongest constraints yet on dark
10
+ matter annihilations. To make full use of the observations by these facilities, accurate simulations
11
+ of the expected dark matter abundance and diffusion mechanisms in these astrophysical objects
12
+ are required. However, because of the computational costs involved, various mathematical and
13
+ numerical techniques have been developed to perform the calculations in a feasible manner.
14
+ Here we provide the first quantitative comparison between methods that are commonly used in
15
+ the literature, and outline the applicability of each one in various simulation scenarios. These
16
+ considerations are becoming ever more important as the hunt for dark matter continues into a
17
+ new era of precision radio observations.
18
+ 1. Introduction
19
+ Despite decades of work, indirect Dark Matter (DM) searches – those that look for emission from
20
+ the annihilation and decay products of DM particles – are yet to find a signal that can be solely
21
+ attributed to DM. Until such a detection is made, and as our observing capabilities improve
22
+ with newer and more sophisticated telescopes, we continue to methodically move through the
23
+ parameter spaces of candidate DM models and eliminate those that conflict with the data. The
24
+ recent public release of the MeerKAT Galaxy Cluster Legacy Survey data [1], together with recent
25
+ studies that show the competitiveness of using DM radio emission for indirect detection [2, 3, 4],
26
+ provides strong motivation for a renewed and continued effort in radio DM searches. In this work
27
+ we take a brief but detailed look at the various theoretical aspects involved in the modelling
28
+ of the radio emission from DM, and comment on how the choice of model will likely play an
29
+ important role in indirect searches with high-resolution instruments.
30
+ Our analysis includes simulations of the DM host environments for two source targets, the
31
+ Coma galaxy cluster and the M31 galaxy, and a calculation of the synchrotron emission resulting
32
+ from the annihilation of Weakly Interacting Massive Particles (WIMPs) therein. We model our
33
+ DM halos with a set of reasonable source parameters and find the emission after solving the
34
+ electron propagation equation in each environment. The methods of solving this equation are
35
+ a major focus point of this work, as the choice of technique used can lead to a non-negligible
36
+ change in the observed emission, particularly in smaller source targets where diffusion effects are
37
+ significant. With < 10 arcsecond resolution capabilities, observations with MeerKAT (and soon
38
+ the SKA) are for the first time able to probe the inner regions of these targets, which is where
39
+ the strongest constraints on DM can be found. Therefore, accurate spatial modelling of these
40
+ targets is essential for us to make full use of the new data.
41
+ arXiv:2301.03326v1 [astro-ph.CO] 9 Jan 2023
42
+
43
+ 2. Modelling
44
+ The two source targets in this work, the Coma galaxy cluster and the M31 galaxy, were chosen
45
+ for their well-characterised properties in the literature. Of particular importance are the profiles
46
+ of their magnetic fields and thermal gas densities; as these quantities appear in the modelling
47
+ process (but are often underspecified), the uncertainty of the final solution depends strongly
48
+ on the treatment of these factors [5]. However, since the simulation of the halo environment
49
+ is not the central focus of this work (and for the sake of brevity), we refer the reader to the
50
+ following sources for details regarding the parameters in the Coma cluster [6, 7] and in the M31
51
+ galaxy [8, 9].
52
+ In each halo environment, the emission of synchrotron radiation will be determined by the
53
+ spatial and energy equilibrium distribution of charged annihilation products, ψ(x, E). In this
54
+ work the products considered are electrons and positrons. The evolution of these distributions
55
+ over time is then given by the following propagation equation, which includes the dominant
56
+ effects of energy losses and spatial diffusion:
57
+ ∂ψ(x, E)
58
+ ∂t
59
+ = ∇ ·
60
+
61
+ D(x, E)∇ψ(x, E)
62
+
63
+ + ∂
64
+ ∂E
65
+
66
+ b(x, E)ψ(x, E)
67
+
68
+ + Q(x, E).
69
+ (1)
70
+ Here D, b and Q are the diffusion, energy-loss and DM annihilation source functions respectively,
71
+ and the determination of the exact forms of these functions follows the methods laid out in [5].
72
+ 2.1. Solving the propagation equation
73
+ We determine the equilibrium electron distribution ψ using two independent techniques. The
74
+ first, referred to here as the ‘Green’s Function (GF) method’ [2, 10], uses a Green’s function
75
+ with simplified forms of D and b to solve Eq. 1 semi-analytically. The second, referred to as the
76
+ ‘Alternating Direction Implicit (ADI) method’ [11, 12], uses a numerical approach to solve Eq. 1
77
+ iteratively. In both methods we consider the halo environment to be spherically symmetric, so
78
+ that x may be replaced by r in Eq. 1. We also note here that we have assumed a simplified
79
+ form of D, which would be a tensor in a more general case. As our methodology closely follows
80
+ the above-mentioned literature, we only summarise these methods and point out any major
81
+ differences in the following sections.
82
+ GF method
83
+ If the forms of the diffusion and energy-loss functions are simplified so that they have
84
+ no spatial dependence, a solution to Eq. 1 can be found directly with the use of Green’s functions
85
+ and image charges. However, these simplifications often have an impact on the calculated
86
+ emission (for a review on this topic, see [5]). In this work we use non-weighted averages for the
87
+ magnetic field and thermal gas densities, found using an averaging scale radius that matches
88
+ the scale radius of the DM halo. This choice encapsulates the region in the halo that contains
89
+ the majority of WIMP annihilations – and thus best represents the spatial structure of the
90
+ halo – while allowing us to forgo any explicit spatial dependence in Eq. 1. Now, the equilibrium
91
+ distribution of electrons in the halo can be calculated using
92
+ ψ(r, E) =
93
+ 1
94
+ b(E)
95
+ � mχ
96
+ E
97
+ dE′G(r, ∆v)Q(r, E′) ,
98
+ (2)
99
+ with mχ as the WIMP mass and the Green’s function (G) given by
100
+ G(r, ∆v) =
101
+ 1
102
+
103
+ 4π∆v
104
+
105
+
106
+ n=−∞
107
+ (−1)n
108
+ � rmax
109
+ 0
110
+ dr′ r′
111
+ rn
112
+
113
+ �exp
114
+
115
+ −(r′ − rn)2
116
+ 4∆v
117
+
118
+ − exp
119
+
120
+ −(r′ + rn)2
121
+ 4∆v
122
+ ��
123
+ � Q(r′)
124
+ Q(r) .
125
+ (3)
126
+
127
+ Here rmax is the maximum radius for any diffusion processes and rn = (−1)nr + 2nrmax is the
128
+ location of the nth image charge. The quantity ∆v is calculated as
129
+ ∆v = v(E) − v(E′) ,
130
+ (4)
131
+ where
132
+ v(E) =
133
+ � mχ
134
+ E
135
+ dx D(x)
136
+ b(x) .
137
+ (5)
138
+ ADI method
139
+ In this method, we discretise Eq. 1 and solve for the equilibrium distribution
140
+ iteratively. Since the ADI method retains the radial dependence in the diffusion and energy loss
141
+ functions (where the GF method does not), the problem becomes 2-dimensional in energy and
142
+ space. Using a traditional finite-difference technique in this scenario could be computationally
143
+ expensive, which is why we opt for a method that uses so-called ‘operator splitting’ to treat
144
+ each dimension separately and divide the problem into smaller, more manageable pieces. Thus,
145
+ during each step of the method, we use a general form of the 1-dimensional Crank-Nicolson
146
+ (CN), scheme (see, for instance, [13]) which is a finite-differencing technique that includes the
147
+ average of second-order implicit and explicit terms in the updating equation, thereby leveraging
148
+ the unconditional stability of a fully implicit method while maintaining second-order accuracy in
149
+ space and time. This scheme is relatively easy to solve, as the updating equation turns out to be
150
+ a set of linear equations with tridiagonal coefficient matrices. We write this, as in [11, 12], as
151
+ − α1
152
+ 2 ψn+1
153
+ x−1 +
154
+
155
+ 1 + α2
156
+ 2
157
+
158
+ ψn+1
159
+ x
160
+ − α3
161
+ 2 ψn+1
162
+ x+1 = α1
163
+ 2 ψn
164
+ x−1 +
165
+
166
+ 1 − α2
167
+ 2
168
+
169
+ ψn
170
+ x + α3
171
+ 2 ψn
172
+ x+1 + Qx∆t.
173
+ (6)
174
+ Here n is the temporal grid index (with the spacing between indices given by ∆t) and x represents
175
+ either the energy or spatial grid index. The forms of the α coefficients, which encapsulate the
176
+ diffusion and energy loss effects, need to be found by discretising the relevant operators from
177
+ Eq. 1. The scheme we have used for this is as follows:
178
+ 1
179
+ r2
180
+
181
+ ∂r
182
+
183
+ r2D∂ψ
184
+ ∂r
185
+
186
+ −−−−−−−−→
187
+ discretisation C−2
188
+ ˜r
189
+
190
+ �ψi+1 − ψi−1
191
+ 2∆˜r
192
+
193
+ log(10)D + ∂D
194
+ ∂˜r
195
+ ������
196
+ ˜r=˜ri
197
+ + ψi+1 − 2ψi + ψi−1
198
+ ∆˜r2
199
+ D|˜r=˜ri
200
+
201
+ (7)
202
+ for the radial operator and
203
+
204
+ ∂E (bψ) −−−−−−−−→
205
+ discretisation C−1
206
+ ˜E
207
+ �b| ˜E= ˜Ej(ψj+1 − ψj)
208
+ ∆ ˜E
209
+
210
+ (8)
211
+ for energy operator, where C˜r = (r0 log(10)10˜ri), C ˜E = (E0 log(10)10 ˜Ej) and ∆˜r, ∆ ˜E represent
212
+ the radial and energy grid spacings, respectively. We use i and j to denote positions in the
213
+ radial and energy grids, and have omitted the temporal indices as these forms will apply to both
214
+ implicit and explicit terms in the same way. The vertical bars denote that the functions which
215
+ they are attached to are evaluated at the given grid index. We have also made the variable
216
+ transformations ˜r = log10(r/r0) and ˜E = log10(E/E0) (similarly to [12], except with base 10
217
+ instead of e), which allows us to more accurately track the electron distribution in our grids
218
+ when the involved processes operate over a wide range of physical scales. Finally, note that in
219
+ the case of energy losses, we only consider upstream differencing.
220
+
221
+ The α values can now be found by taking Eqs. 7 and 8 and equating coefficients with Eq. 6;
222
+ once these are found, the updating equation can be solved with some matrix solution algorithm.
223
+ If we represent the discretisation schemes shown above by the symbol Ψ, the overall iterative
224
+ solution can be summarised with the steps
225
+ ψn+1/2 = Ψ ˜E(ψn)
226
+ ψn+1 = Ψ˜r(ψn+1/2) ,
227
+ (9)
228
+ which are repeatedly solved (using Eq. 6) until the value of ψ has converged to the equilibrium
229
+ value. The other minutiae of this method, including initial and boundary conditions, convergence
230
+ criteria and stability considerations, can be found in [11, 12].
231
+ 2.2. Synchrotron emission
232
+ Once found via the GF or ADI methods, the equilibrium distribution is used to calculate the
233
+ radio emissivity, given by
234
+ jsync(ν, r) =
235
+ � mχ
236
+ 0
237
+ dE ψe±(E, r)Psync(ν, E, r) ,
238
+ (10)
239
+ where ν is the synchrotron frequency, ψe± is the sum of electron and positron equilibrium
240
+ distributions and Psync is the power emitted by an electron with an energy of E (this is calculated
241
+ as in [2]). The emissivity is then used to calculate the two main results in this work. Firstly, the
242
+ azimuthally averaged surface brightness curves,
243
+ Isync(ν, r, Θ, ∆Ω) =
244
+
245
+ ∆Ω
246
+ dΩ
247
+
248
+ l.o.s.
249
+ dl jsync(ν, l)
250
+
251
+ ,
252
+ (11)
253
+ where l.o.s. is the line-of-sight to a point in the halo at radius r, which makes an angle of Θ with
254
+ the centre of the halo, and ∆Ω is the solid angle over which the surface brightness is calculated.
255
+ In this work we show results for a single representative frequency of ν = 0.5 GHz. Secondly, we
256
+ calculate the integrated flux density by
257
+ Ssync(ν, R) =
258
+ � R
259
+ 0
260
+ d3r′ jsync(ν, r′)
261
+ 4πd2
262
+ L
263
+ ,
264
+ (12)
265
+ where the emissivity is integrated over the region enclosed by R and dL is the luminosity distance
266
+ to the target. For the results shown in this work we consider R to be the virial radius of the halo.
267
+ 3. Results
268
+ Here we provide the details of the simulations we have performed, and show the results for two
269
+ observables: the radio surface brightness (Eq. 11) and integrated flux (Eq. 12). We use a set of
270
+ reasonable source parameters for the halo environments that respect observational constraints,
271
+ and aim to use WIMP parameter values that are representative of the many viable candidates.
272
+ We thus consider a large range of particle masses, from 10 to 1000 GeV, and use a set of four
273
+ annihilation channels, {bb, e+e−, µ+µ−, τ +τ −}. Since the focus of this work is on a comparison
274
+ between the two solution methods, particurly in the way that they differ with various source
275
+ targets, we show the results side-by-side and in the same manner for both targets. In Fig. 1 we
276
+ show the surface brightness curves for the Coma cluster (left-hand panels) and M31 (right-hand
277
+ panels), and Fig. 2 shows the integrated fluxes from the same targets for a range of frequencies.
278
+
279
+ 10−8
280
+ 10−4
281
+ 100
282
+ b¯b
283
+ e+e−
284
+ 10−2
285
+ 10−1
286
+ 100
287
+ 101
288
+ 10−8
289
+ 10−4
290
+ 100
291
+ µ+µ−
292
+ 10−2
293
+ 10−1
294
+ 100
295
+ 101
296
+ τ +τ −
297
+ Angular radius from halo centre (arcmin)
298
+ Surface Brightness (Jy/arcmin2)
299
+ 10−7
300
+ 10−4
301
+ 10−1
302
+ b¯b
303
+ e+e−
304
+ 100
305
+ 102
306
+ 10−7
307
+ 10−4
308
+ 10−1
309
+ µ+µ−
310
+ 100
311
+ 102
312
+ τ +τ −
313
+ Angular radius from halo centre (arcmin)
314
+ χ Mass
315
+ 10 GeV
316
+ 1000 GeV
317
+ Method
318
+ ADI
319
+ GF
320
+ Figure 1. Surface brightness curves for the Coma galaxy cluster (left-hand panels) and the M31
321
+ galaxy (right-hand panels). Each of the four panels show different annihilation channels, given
322
+ by the label in the top right of each plot. The ADI and GF methods are represented by the
323
+ red and blue colours respectively, and the region in which the results overlap are given by the
324
+ combination of these (the purple colour). These shaded regions represent the full mass range of
325
+ the WIMPs (from 10 to 1000 GeV), and the domain of each panel runs up until the halo’s virial
326
+ radius R (in angular units).
327
+ 600
328
+ 800
329
+ 1000
330
+ 1200
331
+ 1400
332
+ Frequency (MHz)
333
+ 10−3
334
+ 10−2
335
+ Flux (Jy)
336
+ Channels
337
+ bb
338
+ µ+µ−
339
+ τ +τ −
340
+ e+e−
341
+ Methods
342
+ ADI
343
+ Greens
344
+ 600
345
+ 800
346
+ 1000
347
+ 1200
348
+ 1400
349
+ Frequency (MHz)
350
+ 10−3
351
+ 10−2
352
+ 10−1
353
+ 100
354
+ Channels
355
+ bb
356
+ µ+µ−
357
+ τ +τ −
358
+ e+e−
359
+ Methods
360
+ ADI
361
+ Greens
362
+ Figure 2. The integrated fluxes, calculated using Eq. 12, for the Coma galaxy cluster (left) and
363
+ the M31 galaxy (right). The different linestyles represent the two solution methods presented in
364
+ Sec. 2.1, and each colour indicates the use of a different annihilation channel.
365
+ 4. Discussion and conclusions
366
+ In Figs. 1, we see generally good agreement between the GF and ADI methods, which can be
367
+ inferred from the significant amount of overlap between the curves in each panel. Noticeably
368
+ however, we see more disagreement (less overlap) between the methods in the M31 galaxy than
369
+ we do for the Coma galaxy cluster. Our explanation for this lies in the mathematical techniques
370
+ employed by each method, and how they each treat the spatial dependence of the diffusion
371
+ function in particular. In the galaxy cluster environment of Coma, diffusion effects are negligible
372
+ on sufficiently large scales [10, 5], whereas in the physically smaller galaxy, diffusion effects
373
+ start to influence the surface brightness distribution at all relevant scales. Since the GF and
374
+ ADI methods leverage a spatially independent and dependent diffusion function (respectively),
375
+ the resulting equilibrium distributions will tend to differ in the environments where the length
376
+
377
+ scales in question do not greatly exceed the diffusion length, as is the case for M31. This trend
378
+ is also seen in the fluxes from Fig. 2, which show a clear disagreement in all channels for the
379
+ M31 galaxy, and relative agreement in all channels in the Coma cluster. Based on these results
380
+ and the comparison of target environments presented in [5], we also expect that smaller target
381
+ environments (like the dwarf spheroidal satellite galaxies of the Milky Way) would show further
382
+ disagreement between the solution methods, as diffusion effects would be even more significant
383
+ in these environments.
384
+ The other notable result we see from these simulations is that the methods differ on small
385
+ scales, even in the large Coma cluster. This is significant, as the inner regions of the DM halos
386
+ are where we would observe the strongest emission. With high-resolution radio interferometers
387
+ allowing us to resolve these smaller scales, our models could be tested against the strongest
388
+ possible DM emission, allowing us to find more stringent constraints on DM properties than
389
+ previously possible. In this regard, the surface brightness curves displayed here would be especially
390
+ valuable results when determining new observational limits, as their emission profiles are highly
391
+ dependent on the spatial structure of the DM halo.
392
+ With the impressive spatial resolution of telescopes like MeerKAT and the SKA, we are now
393
+ able to probe the inner regions of these DM halos – regions which have formerly been hidden
394
+ from our view. The need for accurate modelling techniques is thus more necessary than ever
395
+ before, and the considerations presented in this work should help inform the modelling choices
396
+ made in future radio searches for DM.
397
+ Acknowledgments
398
+ This work is based on the research that was supported by the National Research Foundation
399
+ of South Africa (Bursary No. 112332). G.B. acknowledges support from a National Research
400
+ Foundation of South Africa Thuthuka grant no. 117969.
401
+ References
402
+ [1] Knowles K, Cotton W D, Rudnick L et al. 2022 Astronomy & Astrophysics 657 A56
403
+ [2] Beck G 2019 Galaxies 7 16
404
+ [3] Regis M, Reynoso-Cordova J, Filipovi´c M D et al. 2021 Journal of Cosmology and Astroparticle Physics 2021
405
+ 046
406
+ [4] Chan M 2021 Galaxies 9 11
407
+ [5] Sarkis M and Beck G 2022 The Proceedings of SAIP2021 ed Prinsloo A (UJ) pp 316–322 ISBN 978-0-620-
408
+ 97693-0
409
+ [6] Bonafede A, Feretti L, Murgia M et al. 2010 Astronomy and Astrophysics 513 A30
410
+ [7] �Lokas E L and Mamon G A 2003 Monthly Notices of the Royal Astronomical Society 343 401–412
411
+ [8] Ruiz-Granados B, Rubi˜no-Mart´ın J A, Florido E et al. 2010 The Astrophysical Journal 723 L44–L48
412
+ [9] Tamm A, Tempel E, Tenjes P et al. 2012 Astronomy & Astrophysics 546 A4
413
+ [10] Colafrancesco S, Profumo S and Ullio P 2006 Astronomy & Astrophysics 455 21–43
414
+ [11] Strong A W and Moskalenko I V 1998 The Astrophysical Journal 509 212–228
415
+ [12] Regis M, Richter L, Colafrancesco S et al. 2015 Monthly Notices of the Royal Astronomical Society 448
416
+ 3747–3765
417
+ [13] Press W H, Teukolsky S A and Vetterling W T 2007 Numerical Recipes: The Art of Scientific Computing 3rd
418
+ ed (Cambridge University Press) ISBN 978-0-521-88068-8
419
+
AdE1T4oBgHgl3EQfpAU_/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,139 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf,len=138
2
+ page_content='Simulating the radio emission of dark matter for new high-resolution observations with MeerKAT M Sarkis and G Beck School of Physics, University of the Witwatersrand, Private Bag 3, WITS-2050, Johannesburg, South Africa E-mail: michael.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
3
+ page_content='sarkis@students.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
4
+ page_content='wits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
5
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
6
+ page_content='za Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
7
+ page_content=' Recent work has shown that searches for diffuse radio emission by MeerKAT - and eventually the SKA - are well suited to provide some of the strongest constraints yet on dark matter annihilations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
8
+ page_content=' To make full use of the observations by these facilities, accurate simulations of the expected dark matter abundance and diffusion mechanisms in these astrophysical objects are required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
9
+ page_content=' However, because of the computational costs involved, various mathematical and numerical techniques have been developed to perform the calculations in a feasible manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
10
+ page_content=' Here we provide the first quantitative comparison between methods that are commonly used in the literature, and outline the applicability of each one in various simulation scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
11
+ page_content=' These considerations are becoming ever more important as the hunt for dark matter continues into a new era of precision radio observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
12
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
13
+ page_content=' Introduction Despite decades of work, indirect Dark Matter (DM) searches – those that look for emission from the annihilation and decay products of DM particles – are yet to find a signal that can be solely attributed to DM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
14
+ page_content=' Until such a detection is made, and as our observing capabilities improve with newer and more sophisticated telescopes, we continue to methodically move through the parameter spaces of candidate DM models and eliminate those that conflict with the data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
15
+ page_content=' The recent public release of the MeerKAT Galaxy Cluster Legacy Survey data [1], together with recent studies that show the competitiveness of using DM radio emission for indirect detection [2, 3, 4], provides strong motivation for a renewed and continued effort in radio DM searches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
16
+ page_content=' In this work we take a brief but detailed look at the various theoretical aspects involved in the modelling of the radio emission from DM, and comment on how the choice of model will likely play an important role in indirect searches with high-resolution instruments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
17
+ page_content=' Our analysis includes simulations of the DM host environments for two source targets, the Coma galaxy cluster and the M31 galaxy, and a calculation of the synchrotron emission resulting from the annihilation of Weakly Interacting Massive Particles (WIMPs) therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
18
+ page_content=' We model our DM halos with a set of reasonable source parameters and find the emission after solving the electron propagation equation in each environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
19
+ page_content=' The methods of solving this equation are a major focus point of this work, as the choice of technique used can lead to a non-negligible change in the observed emission, particularly in smaller source targets where diffusion effects are significant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
20
+ page_content=' With < 10 arcsecond resolution capabilities, observations with MeerKAT (and soon the SKA) are for the first time able to probe the inner regions of these targets, which is where the strongest constraints on DM can be found.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
21
+ page_content=' Therefore, accurate spatial modelling of these targets is essential for us to make full use of the new data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
22
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
23
+ page_content='03326v1 [astro-ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
24
+ page_content='CO] 9 Jan 2023 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
25
+ page_content=' Modelling The two source targets in this work, the Coma galaxy cluster and the M31 galaxy, were chosen for their well-characterised properties in the literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
26
+ page_content=' Of particular importance are the profiles of their magnetic fields and thermal gas densities;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
27
+ page_content=' as these quantities appear in the modelling process (but are often underspecified), the uncertainty of the final solution depends strongly on the treatment of these factors [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
28
+ page_content=' However, since the simulation of the halo environment is not the central focus of this work (and for the sake of brevity), we refer the reader to the following sources for details regarding the parameters in the Coma cluster [6, 7] and in the M31 galaxy [8, 9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
29
+ page_content=' In each halo environment, the emission of synchrotron radiation will be determined by the spatial and energy equilibrium distribution of charged annihilation products, ψ(x, E).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
30
+ page_content=' In this work the products considered are electrons and positrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
31
+ page_content=' The evolution of these distributions over time is then given by the following propagation equation, which includes the dominant effects of energy losses and spatial diffusion: ∂ψ(x, E) ∂t = ∇ · � D(x, E)∇ψ(x, E) � + ∂ ∂E � b(x, E)ψ(x, E) � + Q(x, E).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
32
+ page_content=' (1) Here D, b and Q are the diffusion, energy-loss and DM annihilation source functions respectively, and the determination of the exact forms of these functions follows the methods laid out in [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
33
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
34
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
35
+ page_content=' Solving the propagation equation We determine the equilibrium electron distribution ψ using two independent techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
36
+ page_content=' The first, referred to here as the ‘Green’s Function (GF) method’ [2, 10], uses a Green’s function with simplified forms of D and b to solve Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
37
+ page_content=' 1 semi-analytically.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
38
+ page_content=' The second, referred to as the ‘Alternating Direction Implicit (ADI) method’ [11, 12], uses a numerical approach to solve Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
39
+ page_content=' 1 iteratively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
40
+ page_content=' In both methods we consider the halo environment to be spherically symmetric, so that x may be replaced by r in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
41
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
42
+ page_content=' We also note here that we have assumed a simplified form of D, which would be a tensor in a more general case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
43
+ page_content=' As our methodology closely follows the above-mentioned literature, we only summarise these methods and point out any major differences in the following sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
44
+ page_content=' GF method If the forms of the diffusion and energy-loss functions are simplified so that they have no spatial dependence, a solution to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
45
+ page_content=' 1 can be found directly with the use of Green’s functions and image charges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
46
+ page_content=' However, these simplifications often have an impact on the calculated emission (for a review on this topic, see [5]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
47
+ page_content=' In this work we use non-weighted averages for the magnetic field and thermal gas densities, found using an averaging scale radius that matches the scale radius of the DM halo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
48
+ page_content=' This choice encapsulates the region in the halo that contains the majority of WIMP annihilations – and thus best represents the spatial structure of the halo – while allowing us to forgo any explicit spatial dependence in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
49
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
50
+ page_content=' Now, the equilibrium distribution of electrons in the halo can be calculated using ψ(r, E) = 1 b(E) � mχ E dE′G(r, ∆v)Q(r, E′) , (2) with mχ as the WIMP mass and the Green’s function (G) given by G(r, ∆v) = 1 √ 4π∆v ∞ � n=−∞ (−1)n � rmax 0 dr′ r′ rn � �exp � −(r′ − rn)2 4∆v � − exp � −(r′ + rn)2 4∆v �� � Q(r′) Q(r) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
51
+ page_content=' (3) Here rmax is the maximum radius for any diffusion processes and rn = (−1)nr + 2nrmax is the location of the nth image charge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
52
+ page_content=' The quantity ∆v is calculated as ∆v = v(E) − v(E′) , (4) where v(E) = � mχ E dx D(x) b(x) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
53
+ page_content=' (5) ADI method In this method, we discretise Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
54
+ page_content=' 1 and solve for the equilibrium distribution iteratively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
55
+ page_content=' Since the ADI method retains the radial dependence in the diffusion and energy loss functions (where the GF method does not), the problem becomes 2-dimensional in energy and space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
56
+ page_content=' Using a traditional finite-difference technique in this scenario could be computationally expensive, which is why we opt for a method that uses so-called ‘operator splitting’ to treat each dimension separately and divide the problem into smaller, more manageable pieces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
57
+ page_content=' Thus, during each step of the method, we use a general form of the 1-dimensional Crank-Nicolson (CN), scheme (see, for instance, [13]) which is a finite-differencing technique that includes the average of second-order implicit and explicit terms in the updating equation, thereby leveraging the unconditional stability of a fully implicit method while maintaining second-order accuracy in space and time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
58
+ page_content=' This scheme is relatively easy to solve, as the updating equation turns out to be a set of linear equations with tridiagonal coefficient matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
59
+ page_content=' We write this, as in [11, 12], as − α1 2 ψn+1 x−1 + � 1 + α2 2 � ψn+1 x − α3 2 ψn+1 x+1 = α1 2 ψn x−1 + � 1 − α2 2 � ψn x + α3 2 ψn x+1 + Qx∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
60
+ page_content=' (6) Here n is the temporal grid index (with the spacing between indices given by ∆t) and x represents either the energy or spatial grid index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
61
+ page_content=' The forms of the α coefficients, which encapsulate the diffusion and energy loss effects, need to be found by discretising the relevant operators from Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
62
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
63
+ page_content=' The scheme we have used for this is as follows: 1 r2 ∂ ∂r � r2D∂ψ ∂r � −−−−−−−−→ discretisation C−2 ˜r � �ψi+1 − ψi−1 2∆˜r � log(10)D + ∂D ∂˜r ������ ˜r=˜ri + ψi+1 − 2ψi + ψi−1 ∆˜r2 D|˜r=˜ri � (7) for the radial operator and ∂ ∂E (bψ) −−−−−−−−→ discretisation C−1 ˜E �b| ˜E= ˜Ej(ψj+1 − ψj) ∆ ˜E � (8) for energy operator, where C˜r = (r0 log(10)10˜ri), C ˜E = (E0 log(10)10 ˜Ej) and ∆˜r, ∆ ˜E represent the radial and energy grid spacings, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
64
+ page_content=' We use i and j to denote positions in the radial and energy grids, and have omitted the temporal indices as these forms will apply to both implicit and explicit terms in the same way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
65
+ page_content=' The vertical bars denote that the functions which they are attached to are evaluated at the given grid index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
66
+ page_content=' We have also made the variable transformations ˜r = log10(r/r0) and ˜E = log10(E/E0) (similarly to [12], except with base 10 instead of e), which allows us to more accurately track the electron distribution in our grids when the involved processes operate over a wide range of physical scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
67
+ page_content=' Finally, note that in the case of energy losses, we only consider upstream differencing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
68
+ page_content=' The α values can now be found by taking Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
69
+ page_content=' 7 and 8 and equating coefficients with Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
70
+ page_content=' 6;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
71
+ page_content=' once these are found, the updating equation can be solved with some matrix solution algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
72
+ page_content=' If we represent the discretisation schemes shown above by the symbol Ψ, the overall iterative solution can be summarised with the steps ψn+1/2 = Ψ ˜E(ψn) ψn+1 = Ψ˜r(ψn+1/2) , (9) which are repeatedly solved (using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
73
+ page_content=' 6) until the value of ψ has converged to the equilibrium value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
74
+ page_content=' The other minutiae of this method, including initial and boundary conditions, convergence criteria and stability considerations, can be found in [11, 12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
75
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
76
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
77
+ page_content=' Synchrotron emission Once found via the GF or ADI methods, the equilibrium distribution is used to calculate the radio emissivity, given by jsync(ν, r) = � mχ 0 dE ψe±(E, r)Psync(ν, E, r) , (10) where ν is the synchrotron frequency, ψe± is the sum of electron and positron equilibrium distributions and Psync is the power emitted by an electron with an energy of E (this is calculated as in [2]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
78
+ page_content=' The emissivity is then used to calculate the two main results in this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
79
+ page_content=' Firstly, the azimuthally averaged surface brightness curves, Isync(ν, r, Θ, ∆Ω) = � ∆Ω dΩ � l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
80
+ page_content='o.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
81
+ page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
82
+ page_content=' dl jsync(ν, l) 4π , (11) where l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
83
+ page_content='o.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
84
+ page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
85
+ page_content=' is the line-of-sight to a point in the halo at radius r, which makes an angle of Θ with the centre of the halo, and ∆Ω is the solid angle over which the surface brightness is calculated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
86
+ page_content=' In this work we show results for a single representative frequency of ν = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
87
+ page_content='5 GHz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
88
+ page_content=' Secondly, we calculate the integrated flux density by Ssync(ν, R) = � R 0 d3r′ jsync(ν, r′) 4πd2 L , (12) where the emissivity is integrated over the region enclosed by R and dL is the luminosity distance to the target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
89
+ page_content=' For the results shown in this work we consider R to be the virial radius of the halo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
90
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
91
+ page_content=' Results Here we provide the details of the simulations we have performed, and show the results for two observables: the radio surface brightness (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
92
+ page_content=' 11) and integrated flux (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
93
+ page_content=' 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
94
+ page_content=' We use a set of reasonable source parameters for the halo environments that respect observational constraints, and aim to use WIMP parameter values that are representative of the many viable candidates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
95
+ page_content=' We thus consider a large range of particle masses, from 10 to 1000 GeV, and use a set of four annihilation channels, {bb, e+e−, µ+µ−, τ +τ −}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
96
+ page_content=' Since the focus of this work is on a comparison between the two solution methods, particurly in the way that they differ with various source targets, we show the results side-by-side and in the same manner for both targets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
97
+ page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
98
+ page_content=' 1 we show the surface brightness curves for the Coma cluster (left-hand panels) and M31 (right-hand panels), and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
99
+ page_content=' 2 shows the integrated fluxes from the same targets for a range of frequencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
100
+ page_content=' 10−8 10−4 100 b¯b e+e− 10−2 10−1 100 101 10−8 10−4 100 µ+µ− 10−2 10−1 100 101 τ +τ − Angular radius from halo centre (arcmin) Surface Brightness (Jy/arcmin2) 10−7 10−4 10−1 b¯b e+e− 100 102 10−7 10−4 10−1 µ+µ− 100 102 τ +τ − Angular radius from halo centre (arcmin) χ Mass 10 GeV 1000 GeV Method ADI GF Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
101
+ page_content=' Surface brightness curves for the Coma galaxy cluster (left-hand panels) and the M31 galaxy (right-hand panels).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
102
+ page_content=' Each of the four panels show different annihilation channels, given by the label in the top right of each plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
103
+ page_content=' The ADI and GF methods are represented by the red and blue colours respectively, and the region in which the results overlap are given by the combination of these (the purple colour).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
104
+ page_content=' These shaded regions represent the full mass range of the WIMPs (from 10 to 1000 GeV), and the domain of each panel runs up until the halo’s virial radius R (in angular units).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
105
+ page_content=' 600 800 1000 1200 1400 Frequency (MHz) 10−3 10−2 Flux (Jy) Channels bb µ+µ− τ +τ − e+e− Methods ADI Greens 600 800 1000 1200 1400 Frequency (MHz) 10−3 10−2 10−1 100 Channels bb µ+µ− τ +τ − e+e− Methods ADI Greens Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
106
+ page_content=' The integrated fluxes, calculated using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
107
+ page_content=' 12, for the Coma galaxy cluster (left) and the M31 galaxy (right).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
108
+ page_content=' The different linestyles represent the two solution methods presented in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
109
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
110
+ page_content='1, and each colour indicates the use of a different annihilation channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
111
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
112
+ page_content=' Discussion and conclusions In Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
113
+ page_content=' 1, we see generally good agreement between the GF and ADI methods, which can be inferred from the significant amount of overlap between the curves in each panel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
114
+ page_content=' Noticeably however, we see more disagreement (less overlap) between the methods in the M31 galaxy than we do for the Coma galaxy cluster.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
115
+ page_content=' Our explanation for this lies in the mathematical techniques employed by each method, and how they each treat the spatial dependence of the diffusion function in particular.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
116
+ page_content=' In the galaxy cluster environment of Coma, diffusion effects are negligible on sufficiently large scales [10, 5], whereas in the physically smaller galaxy, diffusion effects start to influence the surface brightness distribution at all relevant scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
117
+ page_content=' Since the GF and ADI methods leverage a spatially independent and dependent diffusion function (respectively), the resulting equilibrium distributions will tend to differ in the environments where the length scales in question do not greatly exceed the diffusion length, as is the case for M31.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
118
+ page_content=' This trend is also seen in the fluxes from Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
119
+ page_content=' 2, which show a clear disagreement in all channels for the M31 galaxy, and relative agreement in all channels in the Coma cluster.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
120
+ page_content=' Based on these results and the comparison of target environments presented in [5], we also expect that smaller target environments (like the dwarf spheroidal satellite galaxies of the Milky Way) would show further disagreement between the solution methods, as diffusion effects would be even more significant in these environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
121
+ page_content=' The other notable result we see from these simulations is that the methods differ on small scales, even in the large Coma cluster.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
122
+ page_content=' This is significant, as the inner regions of the DM halos are where we would observe the strongest emission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
123
+ page_content=' With high-resolution radio interferometers allowing us to resolve these smaller scales, our models could be tested against the strongest possible DM emission, allowing us to find more stringent constraints on DM properties than previously possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
124
+ page_content=' In this regard, the surface brightness curves displayed here would be especially valuable results when determining new observational limits, as their emission profiles are highly dependent on the spatial structure of the DM halo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
125
+ page_content=' With the impressive spatial resolution of telescopes like MeerKAT and the SKA, we are now able to probe the inner regions of these DM halos – regions which have formerly been hidden from our view.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
126
+ page_content=' The need for accurate modelling techniques is thus more necessary than ever before, and the considerations presented in this work should help inform the modelling choices made in future radio searches for DM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
127
+ page_content=' Acknowledgments This work is based on the research that was supported by the National Research Foundation of South Africa (Bursary No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
128
+ page_content=' 112332).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
129
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
130
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
131
+ page_content=' acknowledges support from a National Research Foundation of South Africa Thuthuka grant no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
132
+ page_content=' 117969.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
133
+ page_content=' References [1] Knowles K, Cotton W D, Rudnick L et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
134
+ page_content=' 2022 Astronomy & Astrophysics 657 A56 [2] Beck G 2019 Galaxies 7 16 [3] Regis M, Reynoso-Cordova J, Filipovi´c M D et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
135
+ page_content=' 2021 Journal of Cosmology and Astroparticle Physics 2021 046 [4] Chan M 2021 Galaxies 9 11 [5] Sarkis M and Beck G 2022 The Proceedings of SAIP2021 ed Prinsloo A (UJ) pp 316–322 ISBN 978-0-620- 97693-0 [6] Bonafede A, Feretti L, Murgia M et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
136
+ page_content=' 2010 Astronomy and Astrophysics 513 A30 [7] �Lokas E L and Mamon G A 2003 Monthly Notices of the Royal Astronomical Society 343 401–412 [8] Ruiz-Granados B, Rubi˜no-Mart´ın J A, Florido E et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
137
+ page_content=' 2010 The Astrophysical Journal 723 L44–L48 [9] Tamm A, Tempel E, Tenjes P et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
138
+ page_content=' 2012 Astronomy & Astrophysics 546 A4 [10] Colafrancesco S, Profumo S and Ullio P 2006 Astronomy & Astrophysics 455 21–43 [11] Strong A W and Moskalenko I V 1998 The Astrophysical Journal 509 212–228 [12] Regis M, Richter L, Colafrancesco S et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
139
+ page_content=' 2015 Monthly Notices of the Royal Astronomical Society 448 3747–3765 [13] Press W H, Teukolsky S A and Vetterling W T 2007 Numerical Recipes: The Art of Scientific Computing 3rd ed (Cambridge University Press) ISBN 978-0-521-88068-8' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdE1T4oBgHgl3EQfpAU_/content/2301.03326v1.pdf'}
B9E0T4oBgHgl3EQfgAGB/content/tmp_files/2301.02412v1.pdf.txt ADDED
@@ -0,0 +1,1572 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Adversarial Attacks on Neural Models of Code via
2
+ Code Difference Reduction
3
+ Zhao Tian
4
+ College of Intelligence and
5
+ Computing, Tianjin University
6
+ Tianjin, China
7
8
+ Junjie Chen†
9
+ College of Intelligence and
10
+ Computing, Tianjin University
11
+ Tianjin, China
12
13
+ Zhi Jin
14
+ Key Lab of High Confidence Software
15
+ Technologies, Peking University
16
+ Beijing, China
17
18
+ Abstract—Deep learning has been widely used to solve various
19
+ code-based tasks by building deep code models based on a
20
+ large number of code snippets. However, deep code models
21
+ are still vulnerable to adversarial attacks. As source code is
22
+ discrete and has to strictly stick to the grammar and semantics
23
+ constraints, the adversarial attack techniques in other domains
24
+ are not applicable. Moreover, the attack techniques specific to
25
+ deep code models suffer from the effectiveness issue due to
26
+ the enormous attack space. In this work, we propose a novel
27
+ adversarial attack technique (i.e., CODA). Its key idea is to
28
+ use the code differences between the target input and reference
29
+ inputs (that have small code differences but different prediction
30
+ results with the target one) to guide the generation of adversarial
31
+ examples. It considers both structure differences and identifier
32
+ differences to preserve the original semantics. Hence, the attack
33
+ space can be largely reduced as the one constituted by the two
34
+ kinds of code differences, and thus the attack process can be
35
+ largely improved by designing corresponding equivalent structure
36
+ transformations and identifier renaming transformations. Our
37
+ experiments on 10 deep code models (i.e., two pre-trained models
38
+ with five code-based tasks) demonstrate the effectiveness and
39
+ efficiency of CODA, the naturalness of its generated examples,
40
+ and its capability of defending against attacks after adversarial
41
+ fine-tuning. For example, CODA improves the state-of-the-art
42
+ techniques (i.e., CARROT and ALERT) by 79.25% and 72.20%
43
+ on average in terms of the attack success rate, respectively.
44
+ I. INTRODUCTION
45
+ In recent years, deep learning (DL) has been widely used
46
+ to solve code-based software engineering tasks, such as code
47
+ clone detection [1], vulnerability prediction [2], and code com-
48
+ pletion [3], by building DL models based on a large amount of
49
+ training code snippets (also called deep code models). Indeed,
50
+ deep code models have achieved notable performance and
51
+ largely promoted the process of software development and
52
+ maintenance [4]–[7]. In particular, some industrial products on
53
+ deep code models have been released and received extensive
54
+ attention, such as AlphaCode [8] and Codex [9].
55
+ Like DL models in other areas (e.g., image processing [10]
56
+ and speech recognition [11]), the robustness of deep code
57
+ models is also critical [12]. However, the existing adversarial
58
+ attack techniques proposed in other areas are not applicable to
59
+ deep code models. This is because these techniques perturb an
60
+ input in a continuous space for altering the model prediction
61
+ result, while the inputs (i.e., source code) for deep code models
62
+ †Junjie Chen is the corresponding author.
63
+ are discrete. Moreover, source code has to strictly stick to
64
+ the grammar and semantics constraints, i.e., the adversarial
65
+ example generated from an original input should have no
66
+ grammar errors and preserve the original semantics.
67
+ Indeed, some adversarial attack techniques specific to deep
68
+ code models have been proposed recently, such as MHM [13],
69
+ CARROT [12], and ALERT [14]. In general, they share two
70
+ main steps: (1) designing a series of semantic-preserving code
71
+ transformation rules (e.g., identifier renaming or dead code
72
+ insertion), and (2) searching ingredients from the space defined
73
+ by the rules (e.g., a valid identifier name is an ingredient for
74
+ the rule of identifier renaming) for transforming an input to a
75
+ semantic-preserving adversarial example. For example, CAR-
76
+ ROT designs two semantic-preserving code transformation
77
+ rules (i.e., identifier renaming and dead code insertion), and
78
+ uses the hill-climbing algorithm to search for the ingredients
79
+ from the entire space with the guidance of gradients and
80
+ changes of model prediction results. ALERT considers the rule
81
+ of identifier renaming, and uses the naturalness (i.e., natural
82
+ semantics of code) and changes of model prediction results to
83
+ guide the ingredient search process from the entire space.
84
+ Although some of them have been demonstrated to be
85
+ effective to some degree, these existing techniques still suffer
86
+ from major limitations:
87
+ • The ingredient space defined by the code transformation
88
+ rules is enormous. For example, for the rule of identifier
89
+ renaming, all valid identifier names could be the ingredi-
90
+ ents for renaming the target identifier. Hence, searching
91
+ for the ingredients that can help attack the target model
92
+ successfully is challenging. The existing techniques tend
93
+ to utilize the changes of model prediction results after
94
+ performing semantic-preserving transformations on the
95
+ target input to guide the search process, which is very
96
+ likely to fall into local optimum in the enormous space
97
+ and thus limits their attack effectiveness.
98
+ • Frequently invoking the target model can negatively af-
99
+ fect the efficiency of adversarial attack techniques, as
100
+ model invocation is the most costly part during the
101
+ attack process [12]. Also, when the model is deployed
102
+ remotely, frequent model invocations could be identified
103
+ as malicious attacks and thus lead to blocking access to
104
+ the model. However, the existing techniques often involve
105
+ 1
106
+ arXiv:2301.02412v1 [cs.CR] 6 Jan 2023
107
+
108
+ frequent model invocations due to calculating gradients
109
+ or guiding the search direction via model prediction.
110
+ • Developers care about the natural semantics of code since
111
+ it is helpful to assist human comprehension [15]. Hence,
112
+ guaranteeing the naturalness of generated adversarial ex-
113
+ amples (i.e., source code in our task) is important. How-
114
+ ever, all the existing techniques (except ALERT [14]) do
115
+ not consider this factor. For example, CARROT designs
116
+ the rule of dead code insertion, but it may largely damage
117
+ the naturalness of the generated examples (especially
118
+ when a large amount of dead code is inserted).
119
+ Overall, a more effective adversarial attack technique spe-
120
+ cific to deep code models should enhance the attack effective-
121
+ ness by improving the ingredient search process, and guarantee
122
+ the naturalness of generated adversarial examples as much as
123
+ possible and the times of model invocations as few as possible.
124
+ Our work does propose such a technique, called CODA (COde
125
+ Difference guided Attacking).
126
+ To improve the attack effectiveness, the key idea of CODA
127
+ is to use the inputs, which have small code differences with
128
+ the target input but have different prediction results, to largely
129
+ reduce the ingredient space. For ease of presentation, we call
130
+ such inputs reference inputs. Actually, reference inputs can
131
+ be regarded as invalid successfully-attacking adversarial ex-
132
+ amples generated from the target input, where “invalid” refers
133
+ to altering the original semantics and “successfully-attacking”
134
+ refers to producing different prediction results. Over the target
135
+ input, the code differences brought by reference inputs con-
136
+ tribute to the invalid but successful attack to a large extent.
137
+ Hence, if we extract the ingredients from the code differences
138
+ to support semantic-preserving transformations on the target
139
+ input, their code differences can be gradually reduced without
140
+ altering the original semantics, and thus a valid successfully-
141
+ attacking adversarial example is likely to be generated. In
142
+ this way, the ingredient space is effectively reduced as the
143
+ one constituted by only code differences between reference
144
+ inputs and the target input, and thus the search process
145
+ can be largely improved. Please note that taking reference
146
+ inputs (especially code differences brought by them) as the
147
+ guidance for generating adversarial examples is an innovative
148
+ perspective, which closely utilizes the unique characteristics
149
+ of deep code models (e.g., source code is discrete).
150
+ To preserve the semantics of the target input during the
151
+ attack process, CODA considers code structure differences
152
+ and identifier differences, and thus extracts the ingredients to
153
+ support equivalent structure transformations and identifier re-
154
+ naming transformations. Equivalent structure transformations
155
+ (e.g., transforming a for loop to an equivalent while loop)
156
+ do not affect the naturalness of generated examples, and thus
157
+ CODA first applies this kind of transformations to reduce
158
+ code differences for generating adversarial examples. Then,
159
+ identifier renaming transformations are applied to further
160
+ reduce code differences to improve the attack effectiveness.
161
+ To ensure the naturalness of generated examples by this
162
+ kind of transformations, CODA measures semantic similarity
163
+ between identifiers for guiding iterative transformations. In
164
+ particular, CODA just involves necessary model invocations
165
+ to check whether the generated example attacks successfully,
166
+ without extra gradient calculation and a large amount of model
167
+ prediction for guiding the search process.
168
+ We conducted an extensive study to evaluate CODA based
169
+ on two popular pre-trained models (i.e., CodeBERT [6] and
170
+ GraphCodeBERT [7]) and five code-based tasks (i.e., vul-
171
+ nerability prediction [2], clone detection [16], authorship
172
+ attribution [17], functionality classification [18], and defect
173
+ prediction [12]). In total, we used 10 subjects. Our results
174
+ demonstrate the effectiveness and efficiency of CODA. For
175
+ example, on average across the ten subjects, CODA improves
176
+ the two state-of-the-art adversarial attack techniques specific
177
+ to deep code models (i.e., CARROT [12] and ALERT [14])
178
+ by 79.25% and 72.20% respectively in terms of the attack
179
+ success rate. The time spent by CODA on completing the
180
+ attack process for the ten subjects is just 39.59 hours, while
181
+ those by CARROT and ALERT are 159.19 hours and 198.89
182
+ hours, respectively. Also, we investigated the value of the
183
+ generated adversarial examples by using them to improve
184
+ the robustness of the target model via an adversarial fine-
185
+ tuning strategy. The results show that the models after fine-
186
+ tuning with the examples generated by CODA can successfully
187
+ defend against attacks from 63.64%, 66.96%, and 76.68%
188
+ of adversarial examples generated by CARROT, ALERT, and
189
+ CODA on average, respectively. Besides, we conducted a user
190
+ study to confirm the naturalness of the generated examples by
191
+ CODA and an ablation experiment to confirm the contribution
192
+ of each main component in CODA.
193
+ To sum up, our work makes the four major contributions:
194
+ • Novel Perspective. We propose a novel perspective of
195
+ utilizing code differences between reference inputs and
196
+ the target input to guide the adversarial attack process
197
+ for deep code models.
198
+ • Technique Implementation. We implement CODA fol-
199
+ lowing the novel perspective by measuring code structure
200
+ and identifier differences and designing the corresponding
201
+ semantic-preserving code transformation rules.
202
+ • Performance Evaluation. We conducted an extensive
203
+ study on two popular pre-trained models and five code-
204
+ based tasks, demonstrating the effectiveness and effi-
205
+ ciency of CODA over two state-of-the-art techniques.
206
+ • Public Artifact. We released all the experimental data
207
+ and our source code at the project homepage [19] for
208
+ experiment replication, future research, and practical use.
209
+ II. BACKGROUND AND MOTIVATION
210
+ In this section, we first introduce the background of deep
211
+ code models (Section II-A), define our problem (Section II-B),
212
+ and motivate our key idea with an example (Section II-C).
213
+ A. Deep Code Models
214
+ In the area of software engineering, DL has been widely-
215
+ used to process source code [2], [3], [16], [20]. In particular,
216
+ some popular pre-trained DL models have been constructed
217
+ based on a large number of code snippets, among which
218
+ 2
219
+
220
+ 1
221
+ 2
222
+ 3
223
+ 4
224
+ 5
225
+ 6
226
+ 7
227
+ 8
228
+ 9
229
+ 10
230
+ 11
231
+ 12
232
+ 13
233
+ 14
234
+ 1
235
+ 2
236
+ 3
237
+ 4
238
+ 5
239
+ 6
240
+ 7
241
+ 8
242
+ 9
243
+ 10
244
+ 11
245
+ 12
246
+ 13
247
+ 14
248
+ 1
249
+ 2
250
+ 3
251
+ 4
252
+ 5
253
+ 6
254
+ 7
255
+ 8
256
+ 9
257
+ 10
258
+ 11
259
+ 12
260
+ 13
261
+ 14
262
+ void f1(int a[], int n){
263
+ int i; int j; int k;
264
+ for (i = 0; i < n; i++) {
265
+ for (j = 0; j < ((n - i) - 1); j++) {
266
+ if (a[j] > a[j + 1]){
267
+ k = a[j];
268
+ a[j] = a[j + 1];
269
+ a[j + 1] = k;
270
+ }
271
+ }
272
+ }
273
+ }
274
+ int f2(int t[], int len){
275
+ int i; int j;
276
+ i = 0; j = 0;
277
+ while (len != 0) {
278
+ t[i] = len % 10;
279
+ len /= 10;
280
+ i = i + 1;
281
+ }
282
+ while (j < i){
283
+ if (t[j] != t[(i - j) - 1]) return 0;
284
+ j = j + 1;
285
+ }
286
+ return 1;
287
+ }
288
+ void f3(int t[], int len){
289
+ int i; int j; int k;
290
+ i = 0;
291
+ while (i < len) {
292
+ j = 0;
293
+ while (j < ((len - i) - 1)) {
294
+ if (t[j] > t[j + 1]){
295
+ k = t[j];
296
+ t[j] = t[j + 1];
297
+ t[j + 1] = k;
298
+ } j = j + 1;
299
+ } i = i + 1;
300
+ }
301
+ }
302
+ Ground-truth Label: sort
303
+ Prediction Result: sort (96.52%)
304
+ Ground-truth Label: palindrome
305
+ Prediction Result: palindrome (99.98%)
306
+ Ground-truth Label: sort
307
+ Prediction Result: palindrome (90.88%)
308
+ Fig. 1. An illustrating example (the target input f1, a reference input f2, and a successfully-attacking adversarial example f3 generated from f1)
309
+ CodeBERT [6] and GraphCodeBERT [7] are two state-of-the-
310
+ art pre-trained models. CodeBERT learns features from bi-
311
+ modal data in the form of programming languages and natural
312
+ languages, while GraphCodeBERT takes into consideration the
313
+ code structure and data flow information. Same as the existing
314
+ work [14], we used them in our evaluation (Section IV).
315
+ These
316
+ pre-trained
317
+ models
318
+ have
319
+ brought
320
+ breakthrough
321
+ changes to many downstream code-based tasks [21], including
322
+ both classification tasks and generation tasks, by fine-tuning
323
+ them on the datasets of the corresponding tasks. The former
324
+ makes classification based on the given code snippets (e.g.,
325
+ clone detection [16] and vulnerability prediction [2]), while the
326
+ latter produces a sequence of information based on code snip-
327
+ pets or natural language descriptions (e.g., code completion [3]
328
+ and code summarization [22]). Following most of the existing
329
+ work on attacking deep code models [12]–[14], our work also
330
+ focuses on the classification tasks and takes the generation
331
+ tasks as our future work. In particular, in our study, we adopted
332
+ all the tasks used in the studies of evaluating the state-of-the-
333
+ art attack techniques (i.e., CARROT [12] and ALERT [14]),
334
+ i.e., five classification tasks including vulnerability prediction,
335
+ clone detection, authorship attribution, functionality classifica-
336
+ tion, and defect prediction.
337
+ B. Problem Definition
338
+ Given a code snippet x that is processed as the required
339
+ format by the target deep code model M (e.g., abstract syntax
340
+ trees required by code2seq [4], control-flow graphs required
341
+ by DGCNN [23], or data-flow graphs required by GraphCode-
342
+ BERT [7]), M can predict a probability vector for x, each
343
+ element in which represents the probability classifying x to
344
+ the corresponding class. The class with the largest probability
345
+ is the final prediction result of M for x. If the prediction result
346
+ is different from the ground-truth label (denoted as y) of x, it
347
+ means that M makes a wrong prediction on x; otherwise, M
348
+ makes a correct prediction.
349
+ Although deep code models can achieve great performance
350
+ on the given test sets, they may be vulnerable to adversarial
351
+ examples [12]–[14]. The goal of our work is to generate
352
+ successfully-attacking adversarial examples as much as pos-
353
+ sible, so as to improve the model robustness. As source code
354
+ is discrete and has to stick to the grammar and semantics con-
355
+ straints, the existing adversarial example generation techniques
356
+ proposed in other domains are not applicable.
357
+ The existing attack techniques specific to deep code models
358
+ always generate adversarial examples from a target input by
359
+ performing a series of semantic-preserving code transforma-
360
+ tions [12]–[14], which is also followed by our work. For ease
361
+ of understanding, we formally define our target problem is to
362
+ find {x′|x′ ∈ ϵ ∧ y = M(x) ̸= M(x′)} from a target input x
363
+ for the target model M. Here, ϵ refers to the universal set of
364
+ code snippets that satisfy the grammar constraints and preserve
365
+ the semantics of x. y = M(x) means that we just regard the
366
+ test inputs on which M makes correct predictions as target
367
+ inputs, where M(x) refers to the prediction result of M on
368
+ x. M(x) ̸= M(x′) means that x′ successfully attacks M, that
369
+ is, it is a successfully-attacking adversarial example generated
370
+ from x. Besides, an effective attack technique should be also
371
+ efficient to find x′ and ensure the naturalness of x′ (i.e., natural
372
+ to human comprehension [14]), which are indeed carefully
373
+ considered by the proposed technique in our work.
374
+ C. Motivating Example
375
+ We then use a real-world example (simplified for ease of
376
+ illustration) to help motivate our key idea: utilizing the code
377
+ differences between reference inputs and the target input to
378
+ guide the generation of adversarial examples. In Figure 1, the
379
+ first code snippet f1 is the target input from the test set of
380
+ the functionality classification task [18], and the two state-
381
+ of-the-art techniques (i.e., CARROT [12] and ALERT [14])
382
+ do not generate successfully-attacking adversarial examples
383
+ from it since they can fall into local optimum in the enormous
384
+ ingredient space. In this figure, the second code snippet f2 is
385
+ a reference input from the training set of this task, which has
386
+ the different label with f1.
387
+ In fact, f2 can be regarded as an invalid successfully-
388
+ attacking example from f1, as they are semantically inconsis-
389
+ tent but have different prediction results. The code differences
390
+ between f1 and f2 mainly contribute to this phenomenon. From
391
+ this perspective, to generate a valid successfully-attacking
392
+ adversarial example (denoted as f3) from f1, we should per-
393
+ form semantic-preserving code transformations on f1, and the
394
+ transformations should reduce the code differences between f1
395
+ and f2 in order to alter the prediction result of the target model
396
+ on f1. That is, the ingredients supporting these transformations
397
+ 3
398
+
399
+ Initial
400
+ Snippet
401
+ Adversarial
402
+ Snippet
403
+ Input
404
+ Output
405
+ Training
406
+ Data
407
+ Input
408
+ Target
409
+ Model
410
+ Test
411
+ Test
412
+ Report
413
+ Attack
414
+ Success ?
415
+ Fig. 2. Overview of CODA.
416
+ should be extracted from the code differences brought by
417
+ f2. With this intuition, by performing equivalent structure
418
+ transformations on f1 (i.e., transforming for loops to while
419
+ loops, where while loops are the used loop structure in f2)
420
+ and identifier remaining transformations (i.e., renaming a and
421
+ n to t and len respectively, where t and len are the used
422
+ identifier names in f2), f3 is generated as shown in the third
423
+ code snippet in Figure 1 and indeed attacks successfully,
424
+ i.e., making a wrong prediction (palindrome) with a high
425
+ confidence (90.88%).
426
+ Based on the code differences between the target input and
427
+ the reference input, the ingredient space is largely reduced. For
428
+ example, the ingredient space defined by identifier renaming
429
+ transformations is reduced from all valid identifier names
430
+ (i.e., almost infinite) to the identifier names occurring in the
431
+ reference input but not in the target input (i.e., only two
432
+ identifier names in this simplified example). Hence, it can help
433
+ improve the ingredient search process and thus improve the
434
+ attack effectiveness. On the other hand, too small ingredient
435
+ space could also lose too many ingredients useful to successful
436
+ attacks, and thus we will select a set of reference inputs (rather
437
+ than only one reference input) for guiding the attack process
438
+ in order to balance the size of the ingredient space and the
439
+ number of useful ingredients.
440
+ III. APPROACH
441
+ A. Overview
442
+ In this work, we propose a novel perspective to attack
443
+ deep code models more effectively and more efficiently, which
444
+ utilizes the code differences between reference inputs and the
445
+ target input to guide the generation of adversarial examples.
446
+ From this perspective, we design an effective attack technique,
447
+ called CODA. Specifically, the code differences brought by
448
+ reference inputs provide effective ingredients for altering the
449
+ prediction result of the target input by transforming it with
450
+ these ingredients, which can contribute to successful attacks in
451
+ CODA. However, as the semantics of reference inputs and the
452
+ target input are different, the ingredients from some kinds of
453
+ code differences can alter the original semantics, which is not
454
+ allowed by the adversarial attack for deep code models. Hence,
455
+ in CODA, we consider the structure differences and identifier
456
+ differences for measuring code differences between them,
457
+ which can preserve the original semantics during the attack
458
+ process. In this way, the ingredient space can be effectively
459
+ reduced as the one constituted by the two kinds of code
460
+ differences between reference inputs and the target input, and
461
+ thus the ingredient search process (for generating adversarial
462
+ examples) can be largely improved.
463
+ In fact, not all the inputs that have different prediction
464
+ results with the target one, can be regarded as effective
465
+ reference inputs for improving the adversarial attack process.
466
+ In other words, different inputs could have different degrees
467
+ of capabilities for reducing the ingredient search space and
468
+ providing effective ingredients for altering the prediction result
469
+ of the target input. Therefore, the first step in CODA is
470
+ to select effective reference inputs for the target input in
471
+ order to improve the attack effectiveness as much as possible
472
+ (to be presented in Section III-B). Based on the selected
473
+ reference inputs, CODA then measures the structure differ-
474
+ ences and identifier differences over the target input, which
475
+ support extracting the ingredients for two corresponding kinds
476
+ of semantic-preserving code transformations (i.e., equivalent
477
+ structure transformations and identifier renaming transforma-
478
+ tions). With the guidance of reducing their code differences
479
+ based on the two kinds of transformations, the target input
480
+ could be effectively transformed to a successfully-attacking
481
+ adversarial example. As equivalent structure transformations
482
+ do not affect the naturalness of generated examples, CODA
483
+ first applies this kind of transformations to reduce the code
484
+ differences for improving the attack effectiveness (to be pre-
485
+ sented in Section III-C). Then, we apply identifier renaming
486
+ transformations to further reduce the code differences for
487
+ improving the generation of successfully-attacking adversarial
488
+ examples (to be presented in Section III-D). In particular,
489
+ CODA measures the semantic similarity between identifiers
490
+ to guarantee the naturalness of generated examples.
491
+ Figure 2 shows the overview of CODA. In a nutshell, by
492
+ successively applying equivalent structure transformations and
493
+ identifier renaming transformations to the target input with
494
+ the ingredient space defined by the code differences between
495
+ the selected reference inputs and the target one, adversarial
496
+ examples can be generated towards the direction of reducing
497
+ the code differences without altering the original semantics. In
498
+ this way, the prediction result of the target input is more likely
499
+ to be changed, leading to a successfully-attacking adversarial
500
+ example. Due to the smaller ingredient search space (but
501
+ including effective ingredients) and the clearer attack direction,
502
+ the attack effectiveness could be largely improved by CODA.
503
+ B. Reference Inputs Selection
504
+ The goal of reference inputs is to largely reduce the in-
505
+ gredient space. Also, the reduced space should include the
506
+ ingredients that are effective to transform the target input
507
+ to a successfully-attacking adversarial example. In this way,
508
+ the adversarial attack process can be largely improved by
509
+ searching for effective ingredients more efficiently.
510
+ 4
511
+
512
+ TABLE I
513
+ DESCRIPTIONS OF EQUIVALENT STRUCTURE TRANSFORMATIONS
514
+ Transformation
515
+ Description
516
+ Example Before Transformation
517
+ Example After Transformation
518
+ R1-loop
519
+ equivalent transformation among for structure
520
+ for ( i=0; i<9; i++ ) {
521
+ i=0; while ( i<9 ) {
522
+ and while structure
523
+ Body; }
524
+ Body; i++; }
525
+ R2-branch
526
+ equivalent transformation between if-else(-if)
527
+ if ( A ) { BodyA; }
528
+ if ( A ) { BodyA; }
529
+ structure and if-if structure
530
+ else if ( B ) { BodyB; }
531
+ if ( !A && B ) { BodyB; }
532
+ R3-calculation
533
+ equivalent numerical calculation transformation, e.g.,
534
+ i += 1;
535
+ i = i + 1;
536
+ ++, --, +=, -=, *=, /=, %=, <<=, >>=, &=, |= , ˆ =
537
+ R4-constant
538
+ equivalent transformation between a constant and
539
+ println("Hello, World!");
540
+ String i = "Hello, World!";
541
+ a variable assigned by the same constant
542
+ println(i);
543
+ Although all the inputs that have different prediction results
544
+ with the target one can provide ingredients for altering the pre-
545
+ diction result of the target one after transformations, their capa-
546
+ bilities for successful attacks could be different. To transform
547
+ the target input to a successfully-attacking adversarial example
548
+ with fewer perturbations, CODA should select the reference
549
+ inputs, which can provide the ingredients that are more likely
550
+ to conduct successful attacks for the target input. Similar to the
551
+ existing work [24]–[27], we assume that the prediction result
552
+ of the target input is more likely to be changed from its original
553
+ class denoted as ci (with the largest probability predicted
554
+ by the target model) to the class with the second largest
555
+ probability (denoted as cj). Hence, the ingredients in the inputs
556
+ belonging to cj are more likely to attack successfully on the
557
+ target input, and thus CODA selects the inputs belonging to
558
+ cj as the initial set of reference inputs. Please note that all
559
+ the reference inputs are selected from the training set to avoid
560
+ introducing the contents beyond the cognitive scope of the
561
+ target model. Meanwhile, we only consider the training inputs
562
+ whose prediction results are consistent with their ground-truth
563
+ labels in order to avoid introducing noise.
564
+ However, the number of inputs belonging to the same class
565
+ (i.e., cj as above) could be large, and thus the ingredient space
566
+ constituted by code differences between them and the target
567
+ input could be also large. Hence, to further reduce the ingre-
568
+ dient space for more effective adversarial example generation,
569
+ CODA selects a subset of inputs with high similarity to the
570
+ target input from the initial set of reference inputs, as the
571
+ final set of reference inputs used by CODA. This is because
572
+ smaller code differences can effectively limit the number of
573
+ ingredients, leading to smaller ingredient space. CODA does
574
+ not select only one reference input, as too small ingredient
575
+ space could incur a high risk of missing too many ingredients
576
+ contributing to successful attacks. That is, CODA selects a
577
+ small set of reference inputs following the above two steps of
578
+ selection to balance the ingredient space size and the amount
579
+ of ingredients contributing to successful attacks in the space.
580
+ We further introduce how to measure the similarity be-
581
+ tween the target input (denoted as t) and a reference input
582
+ (denoted as r) for the second step of selection in CODA. In
583
+ general, we can adopt some pre-trained models to represent
584
+ the code as a vector and then measure code similarity by
585
+ calculating the vector distance, like many existing studies [5],
586
+ [6], [28]. However, as presented in Section III-A, CODA
587
+ first applies equivalent structure transformations (rather than
588
+ identifier renaming transformations) to reduce code differences
589
+ for adversarial attacks, as this kind of transformations does not
590
+ affect the naturalness of generated examples. Moreover, the
591
+ identifiers used in different code snippets are usually different
592
+ due to the enormous identifier space, which may lead to the
593
+ low similarity between various code snippets. Hence, when
594
+ measuring code similarity, CODA eliminates the influence
595
+ of identifiers by replacing them with the placeholder <unk>.
596
+ Specifically, CODA first represents t and r after placeholder
597
+ replacement as vectors respectively based on CodeBERT [6]
598
+ (one of the most widely-used pre-trained models [29]–[31]),
599
+ and then calculates the cosine similarity between the two
600
+ vectors. As the descending order of the calculated similarity,
601
+ CODA selects Top-N reference inputs for the follow-up ad-
602
+ versarial attack process. Please note that to make the selection
603
+ process efficient, we randomly sampled U inputs from the
604
+ initial set for the second step of selection. We will investigate
605
+ the influence of both U and N on CODA in Section VI.
606
+ C. Equivalent Structure Transformation
607
+ Based on the small set of selected reference inputs, CODA
608
+ then extracts ingredients from the space defined by their
609
+ brought code differences over the target input. That is, CODA
610
+ transforms the target input to an adversarial example towards
611
+ the direction of reducing code differences. CODA first reduces
612
+ structure differences by applying equivalent structure transfor-
613
+ mations to the target input as they do not affect the naturalness
614
+ of generated examples.
615
+ To preserve the semantics of the target input, we design four
616
+ categories of equivalent structure transformations in CODA
617
+ inspired by the existing work in metamorphic testing and
618
+ code refactoring [32], [33]. In particular, we systematically
619
+ consider all common kinds of code structures, i.e., loop struc-
620
+ tures, branch structures, and sequential structures (including
621
+ numerical calculation and constant usage). We explain the four
622
+ categories in detail in Table I, each of which is also illustrated
623
+ with an example. For each category of transformations, it
624
+ may include several specific rules. For example, the rules
625
+ of transformation on += and transformation on -= belong to
626
+ the category of R3-calculation, and the rules of transforming
627
+ for loop to while loop and transforming while loop to for
628
+ loop belong to the category of R1-loop. In total, CODA has
629
+ 20 specific rules for the four categories of transformations.
630
+ Please note that not all the rules are applicable to the code
631
+ 5
632
+
633
+ programmed by any programming language. For example, ++
634
+ and -- in R3-calculation are not supported by Python. Also,
635
+ in R4-constant, the newly-defined variable cannot be the same
636
+ as the existing variables in the code; otherwise, it may incur
637
+ grammar errors and alter the original semantics. Due to the
638
+ space limit, we put more details about all these specific rules
639
+ at our project homepage [19].
640
+ Then, we illustrate how to apply each rule for reducing code
641
+ differences. Each rule involves two structures, i.e., the one
642
+ before transformation (sb) and the one after transformation
643
+ (sa). CODA first counts the occurring times of sb and sa in
644
+ the set of selected reference inputs (denoted as nb and na),
645
+ and then calculates their occurring distribution, i.e.,
646
+ nb
647
+ nb+na
648
+ and
649
+ na
650
+ nb+na . Further, CODA applies each rule in a probabilistic
651
+ way to reduce the occurring distribution differences in terms
652
+ of sb and sa between reference inputs and the target input. In
653
+ this way, the structure differences in terms of sb and sa can
654
+ be reduced effectively. More specifically, for each occurrence
655
+ of sb in the target input, CODA applies this rule with the
656
+ probability of
657
+ na
658
+ nb+na , also indicating that it can be retained
659
+ with the probability of
660
+ nb
661
+ nb+na .
662
+ In this step, CODA obtains M inputs from the target input,
663
+ each of which is generated by applying all the applicable rules
664
+ in the above probabilistic way, and then selects the input with
665
+ the highest average similarity (also measured by the method
666
+ described in Section III-B) to the selected reference inputs as
667
+ the one for the follow-up adversarial attack process.
668
+ D. Identifier Renaming Transformation
669
+ To facilitate the generation of successfully-attacking ad-
670
+ versarial examples, CODA then applies identifier renaming
671
+ transformations to further reduce code differences. Inspired by
672
+ the existing work [12]–[14], identifier renaming transformation
673
+ in CODA refers to replacing the name of an identifier in the
674
+ target input with the name of an identifier in the selected
675
+ reference inputs. For ease of presentation, we denote the set of
676
+ identifiers in the target input as Vt and the set of identifiers in
677
+ the selected reference inputs as Vr. To preserve the semantics
678
+ of the target input and guarantee the grammatical correctness
679
+ of the generated example, CODA ensures that the identifier
680
+ used for replacement does not exist in the target input.
681
+ Then, we illustrate how to apply this kind of transformations
682
+ to the input obtained from the last step (i.e., equivalent
683
+ structure transformations). As demonstrated by the existing
684
+ work [12]–[14], renaming identifiers is effective to generate
685
+ successfully-attacking adversarial examples, but can negatively
686
+ affect the naturalness of generated examples. To ensure the
687
+ naturalness of generated examples, CODA considers the se-
688
+ mantic similarity between identifiers and designs an iterative
689
+ transformation process like ALERT [14]. Specifically, CODA
690
+ measures the semantic similarity between each identifier in
691
+ Vt and each identifier in Vr by representing each identifier as
692
+ a vector via word embedding. Here, CODA builds the pre-
693
+ trained language model with the FastText algorithm [34] and
694
+ calculates the cosine similarity between vectors to measure
695
+ their semantic similarity. Then, CODA prioritizes each pair
696
+ TABLE II
697
+ STATISTICS OF OUR USED SUBJECTS
698
+ Task
699
+ Train/Validate/Test
700
+ Class
701
+ Language
702
+ Model
703
+ Acc.
704
+ Vulnerability
705
+ 21,854/2,732/2,732
706
+ 2
707
+ C
708
+ CB
709
+ 63.76%
710
+ Prediction
711
+ GCB
712
+ 63.65%
713
+ Clone
714
+ 90,102/4,000/4,000
715
+ 2
716
+ Java
717
+ CB
718
+ 96.97%
719
+ Detection
720
+ GCB
721
+ 97.36%
722
+ Authorship
723
+ 528/–/132
724
+ 66
725
+ Python
726
+ CB
727
+ 90.35%
728
+ Attribution
729
+ GCB
730
+ 89.48%
731
+ Functionality
732
+ 41,581/–/10,395
733
+ 104
734
+ C
735
+ CB
736
+ 98.18%
737
+ Classification
738
+ GCB
739
+ 98.66%
740
+ Defect
741
+ 27,058/–/6,764
742
+ 4
743
+ C/C++
744
+ CB
745
+ 84.37%
746
+ Prediction
747
+ GCB
748
+ 83.98%
749
+ * CB is short for CodeBERT and GCB is short for GraphCodeBERT.
750
+ of identifiers as the descending order of their semantic sim-
751
+ ilarity, and iteratively applies this transformation based on
752
+ each pair of identifiers in the ranking list, which ensures
753
+ that more natural transformations can be first performed.
754
+ After each iteration, CODA invokes the target model to
755
+ check whether a successfully-attacking adversarial example
756
+ is generated. The iterative attack process terminates until a
757
+ successfully-attacking adversarial example is generated or all
758
+ the pairs are used by this transformation. Please note that
759
+ CODA ensures that the pair of identifiers will not introduce
760
+ repetitive identifiers in the generated example in each iteration;
761
+ otherwise, this pair will be discarded.
762
+ Overall, CODA only invokes the target model when check-
763
+ ing if a successfully-attacking adversarial example is gen-
764
+ erated. They are necessary model invocations for this task.
765
+ Hence, CODA can largely reduce the number of model
766
+ invocations compared with the existing techniques (e.g.,
767
+ ALERT [14]), which is confirmed by our study (Section V-A).
768
+ IV. EVALUATION DESIGN
769
+ In the study, we address four research questions (RQs):
770
+ • RQ1: How does CODA perform in terms of effectiveness
771
+ and efficiency compared with state-of-the-art techniques?
772
+ • RQ2: Are the adversarial examples generated by CODA
773
+ natural for humans?
774
+ • RQ3: Are the adversarial examples generated by CODA
775
+ useful to improve the robustness of deep code models?
776
+ • RQ4: Does each main component contribute to the over-
777
+ all effectiveness of CODA?
778
+ A. Subjects
779
+ 1) Datasets and Tasks: To sufficiently evaluate CODA,
780
+ we consider all the five code-based tasks in the studies of
781
+ evaluating state-of-the-art techniques (i.e., CARROT [12] and
782
+ ALERT [14]). The statistics of datasets is shown at the first
783
+ four columns in Table II, each of which represents the task, the
784
+ number of inputs in the training/validation/test set, the number
785
+ of classes for the classification task, and the programming
786
+ language for the inputs.
787
+ The task of vulnerability prediction aims to predict whether
788
+ a given code snippet has vulnerabilities. Its used dataset is ex-
789
+ tracted from two C projects (i.e., FFmpeg [35] and Qemu [36])
790
+ by Zhou et al. [2] and has been integrated as part of the
791
+ CodeXGLUE benchmark [30]. The task of clone detection
792
+ 6
793
+
794
+ aims to detect whether two given code snippets are equivalent
795
+ in semantics. Its used dataset is from BigCloneBench [37],
796
+ the most widely-used dataset for clone detection. The existing
797
+ work [14] randomly sampled 90,102/4,000/4,000 inputs from
798
+ the benchmark for training/validation/testing, to make the
799
+ experiment at a computationally friendly scale. In our study,
800
+ we used the same dataset. The task of authorship attribution
801
+ aims to identify the author of a given code snippet. Its used
802
+ dataset is the Google Code Jam (GCJ) dataset [17]. The task
803
+ of functionality classification aims to classify the functionality
804
+ of a given code snippet. If code snippets solve the same
805
+ problem, they are regarded to have the same functionality [18].
806
+ Its used dataset is the Open Judge (OJ) benchmark [38],
807
+ which has been also integrated as part of the CodeXGLUE
808
+ benchmark [30]. The task of defect prediction aims to predict
809
+ whether a given code snippet is defective and its defect type.
810
+ Its used dataset is the CodeChef dataset [39], which is labeled
811
+ by the execution results on the CodeChef platform (i.e., four
812
+ defect types: no defect, wrong answer, timeout, runtime error).
813
+ 2) Models: Following the existing work [14], we adopted
814
+ two state-of-the-art pre-trained models for code-based tasks,
815
+ i.e., CodeBERT [6] and GraphCodeBERT [7], and then fine-
816
+ tuned them on the five tasks based on the corresponding
817
+ datasets, respectively. In total, we obtained 10 deep code
818
+ models as the subjects. The last two columns in Table II show
819
+ the used pre-trained model and the accuracy of the deep code
820
+ model after fine-tuning, respectively. When fine-tuning Code-
821
+ BERT and GraphCodeBERT on these tasks (except Graph-
822
+ CodeBERT on functionality classification and defect predic-
823
+ tion), we used the same hyper-parameter settings provided by
824
+ the existing work [12], [14]. As there is no instruction on the
825
+ hyper-parameter settings for fine-tuning GraphCodeBERT on
826
+ functionality classification and defect prediction, we used the
827
+ same settings as the one used by authorship attribution (they
828
+ are all multi-class classification tasks). Indeed, the achieved
829
+ model performance outperforms that achieved by the models
830
+ (e.g., TBCNN [38] and CodeBERT [6]) used in the existing
831
+ work [12] on the same datasets [12], indicating that the
832
+ transferred hyper-parameter settings are reasonable.
833
+ Overall, the subjects used in our study are indeed diverse,
834
+ involving different tasks, different pre-trained models, different
835
+ numbers of classes, different programming languages, etc. It is
836
+ very helpful to sufficiently evaluate the performance of CODA.
837
+ B. Compared Techniques
838
+ In the study, we compared CODA with two state-of-the-art
839
+ techniques attacking deep code models, i.e., CARROT [12]
840
+ and ALERT [14], which have been introduced in Section I (the
841
+ third paragraph). We adopted their implementations and the
842
+ recommended parameter settings provided by the correspond-
843
+ ing papers [12], [14]. As the original version of CARROT can
844
+ only support to attack C/C++ code, we extended it to attack
845
+ Python and Java code for sufficient comparison.
846
+ C. Implementations
847
+ We implemented CODA in Python and adopted tree-
848
+ sitter [40] to extract identifiers from code following the exist-
849
+ ing work [14]. We set the parameters in CODA by conducting
850
+ a preliminary experiment, i.e., U = 256, N = 64, and
851
+ M = 64. We discuss the influence of the settings of main
852
+ parameters on CODA in Section VI. We released our code
853
+ and experimental data at our project homepage [19]. All the
854
+ experiments were conducted on a server with an Ubuntu 20.04
855
+ system with Intel(R) Xeon(R) Silver 4214 @ 2.20GHz CPU,
856
+ 256GB memory, and NVIDIA GeForce RTX 2080 Ti GPU.
857
+ V. RESULTS AND ANALYSIS
858
+ A. RQ1: Effectiveness and Efficiency
859
+ 1) Setup: For each deep code model, we applied CODA,
860
+ CARROT, ALERT to generate adversarial examples from each
861
+ target input in the test set, respectively. We measured their
862
+ effectiveness and efficiency based on the following metrics.
863
+ To reduce the influence of randomness, we repeated all the
864
+ experiments (including those for other RQs) 10 times, and
865
+ reported the average results.
866
+ Following the existing work [14], we adopted the at-
867
+ tack success rate (ASR) to measure the effectiveness of
868
+ each technique. ASR is the percentage of the target inputs
869
+ from which an attack technique can generate a successfully-
870
+ attacking adversarial example. Larger ASR values mean better
871
+ attack effectiveness. Also, it is important to measure whether
872
+ the prediction confidence (i.e., the probability of being the
873
+ ground-truth class of the target input) is decreased by the gen-
874
+ erated examples (although there is no successfully-attacking
875
+ adversarial example generated from a target input). Hence, we
876
+ also calculated prediction confidence decrement (PCD) to
877
+ measure the effectiveness of each technique. PCD is calculated
878
+ by the prediction confidence of the target input minus the min-
879
+ imum prediction confidence of the set of generated examples
880
+ from the target input. If the former is smaller than the latter,
881
+ we regard PCD to be 0, indicating that the generated examples
882
+ cannot decrease the prediction confidence of the target input.
883
+ Larger PCD values mean better attack effectiveness.
884
+ In addition, following the existing work [12], [14], we used
885
+ the time spent on the overall attack process (i.e., completing
886
+ the adversarial example generation process from all the target
887
+ inputs) and the average number of model invocations for
888
+ generating examples from one target input, to measure
889
+ the efficiency of each technique. Less time and fewer model
890
+ invocations mean higher efficiency.
891
+ 2) Results: Table III shows the comparison results among
892
+ CARROT, ALERT, and CODA in terms of ASR. From this
893
+ table, CODA always outperforms CARROT and ALERT on
894
+ all the tasks based on both CodeBERT and GraphCodeBERT,
895
+ demonstrating the stable attack effectiveness of CODA. On
896
+ average, CODA improves 70.11% and 89.83% higher ASR
897
+ than CARROT and ALERT across all the five tasks on
898
+ CodeBERT, and improves 89.34% and 57.67% higher ASR
899
+ on GraphCodeBERT, respectively.
900
+ Figures 3(a) and 3(b) show the comparison results among
901
+ the three techniques in terms of PCD on CodeBERT and
902
+ GraphCodeBERT, respectively. From these figures, the upper
903
+ quartile, median, and lower quartile of CODA are always
904
+ 7
905
+
906
+ TABLE III
907
+ EFFECTIVENESS COMPARISON IN TERMS OF ASR
908
+ Task
909
+ CodeBERT
910
+ GraphCodeBERT
911
+ CARROT
912
+ ALERT
913
+ CODA
914
+ CARROT
915
+ ALERT
916
+ CODA
917
+ Vulnerability Prediction
918
+ 33.72%
919
+ 53.62%
920
+ 89.58%
921
+ 37.40%
922
+ 76.95%
923
+ 94.72%
924
+ Clone Detection
925
+ 20.78%
926
+ 27.79%
927
+ 44.65%
928
+ 3.50%
929
+ 7.96%
930
+ 27.37%
931
+ Authorship Attribution
932
+ 44.44%
933
+ 35.78%
934
+ 79.05%
935
+ 31.68%
936
+ 61.47%
937
+ 92.00%
938
+ Functionality Classification
939
+ 44.15%
940
+ 10.04%
941
+ 56.74%
942
+ 42.76%
943
+ 11.22%
944
+ 57.44%
945
+ Defect Prediction
946
+ 71.59%
947
+ 65.15%
948
+ 95.18%
949
+ 79.08%
950
+ 75.87%
951
+ 96.58%
952
+ Average
953
+ 42.94%
954
+ 38.48%
955
+ 73.04%
956
+ 38.88%
957
+ 46.69%
958
+ 73.62%
959
+ (a) PCD on attacking CodeBERT
960
+ (b) PCD on attacking GraphCodeBERT
961
+ Fig. 3. Comparison in terms of prediction confidence decrement
962
+ (a) Model invocation times on attacking CodeBERT
963
+ (b) Model invocation times on attacking GraphCodeBERT
964
+ Fig. 4. Comparison in terms of model invocation times (y-axis refers to the normalized values following the existing work [14])
965
+ larger than (or equal to) those of both CARROT and ALERT
966
+ regardless of the tasks and the pre-trained models, demon-
967
+ strating that CODA produces more significant attacks for
968
+ decreasing prediction confidence of target inputs. For example,
969
+ on CodeBERT, the average improvements of CODA over
970
+ CARROT and ALERT are 101.88% and 520.65% across all
971
+ the tasks in terms of average PCD, respectively. Similarly, on
972
+ GraphCodeBERT, the average improvements of CODA over
973
+ CARROT and ALERT are 76.35% and 560.15%, respectively.
974
+ Besides, CARROT, ALERT, and CODA take 159.19 hours,
975
+ 198.89 hours, and 39.59 hours to complete the entire attack
976
+ process on all five tasks, respectively. Further, we measured
977
+ the number of model invocations for each target input during
978
+ the attack process, whose results are shown in Figure 4(a)
979
+ and 4(b). From these figures, CODA performs fewer model
980
+ invocations than both CARROT and ALERT regardless of the
981
+ tasks and pre-trained models. On average, CODA performs
982
+ 65.73% and 78.58% fewer model invocations than CARROT
983
+ and ALERT across all the tasks on CodeBERT, and 34.07%
984
+ and 75.31% fewer model invocations on GraphCodeBERT,
985
+ respectively. The results demonstrate that CODA has the
986
+ significantly highest efficiency among the three techniques.
987
+ Answer to RQ1: CODA spends less time with fewer
988
+ model invocations on completing the entire attack
989
+ process, but generates more successfully-attacking ex-
990
+ amples with more significant prediction confidence
991
+ decrement on all the subjects, than the state-of-the-art
992
+ techniques (i.e., CARROT and ALERT).
993
+ B. RQ2: Naturalness of Adversarial Examples
994
+ 1) Setup: It is important to check whether the generated
995
+ adversarial examples are natural to human judges [14], [41].
996
+ Here, we conducted a user study to compare the naturalness
997
+ of examples generated by CODA, CARROT, and ALERT, and
998
+ our user study shares the same design as the one conducted
999
+ by the existing work [14]:
1000
+ Data Preparation. For each subject, we randomly sampled
1001
+ 10 target inputs, and then for each technique we randomly
1002
+ sampled an adversarial example from the set of examples
1003
+ generated from each sampled target input. That is, for each
1004
+ sampled target input, we construct three pairs of code snippets,
1005
+ each of which contains the target input and an adversarial
1006
+ example generated by CODA, CARROT, or ALERT. In total,
1007
+ we obtained 300 pairs of code snippets for the user study due
1008
+ to 10 subjects × 3 techniques.
1009
+ Participants. Same as the existing work [14], the user study
1010
+ also involves four non-author participants, each of whom has
1011
+ 8
1012
+
1013
+ Fig. 5. Average score to evaluate naturalness of examples per participant
1014
+ a Bachelor/Master degree in Computer Science with at least
1015
+ five years of programming experience.
1016
+ Process. For objective evaluation, we did not tell partici-
1017
+ pants which technique generates the adversarial example in a
1018
+ pair of code snippets. Also, we highlighted the changes in each
1019
+ pair of code snippets for facilitating manual evaluation. Then,
1020
+ each participant individually evaluated each pair by evaluating
1021
+ to what extent the changes are natural to the code context
1022
+ and the changed identifiers preserve the original semantics,
1023
+ following the existing work [14]. Specifically, participants
1024
+ gave a score for each pair based on a 5-point Likert scale [42]
1025
+ (1 means strongly disagree and 5 means strongly agree)
1026
+ following the existing work [14], [43].
1027
+ 2) Results: Figure 5 shows the average score of the ad-
1028
+ versarial examples generated by each technique for each
1029
+ participant. From this figure, the conclusions from different
1030
+ participants are consistent: the naturalness of the adversarial
1031
+ examples generated by CODA and ALERT is closely high
1032
+ (round 4.50 on average), and significantly higher than that by
1033
+ CARROT (just 2.89 on average). ALERT is a naturalness-
1034
+ aware technique, whose core contribution is to ensure the
1035
+ naturalness of generated examples, but CODA achieves similar
1036
+ naturalness scores to it, demonstrating that CODA can also
1037
+ generate highly natural adversarial examples.
1038
+ Answer to RQ2: The adversarial examples gener-
1039
+ ated by CODA are natural closely to the state-of-the-
1040
+ art naturalness-aware attack technique (i.e., ALERT),
1041
+ which is consistently confirmed by participants.
1042
+ C. RQ3: Model Robustness Improvement
1043
+ 1) Setup: We studied the value of generated adversarial
1044
+ examples by using them to improve the robustness of the target
1045
+ model via an adversarial fine-tuning strategy. For each subject,
1046
+ we divided the test set into two equal parts (S1 and S2),
1047
+ so as to avoid data leakage between the adversarial training
1048
+ set and the evaluation set constructed by the same technique.
1049
+ Specifically, we applied each technique to generate examples
1050
+ from S1, and selected one generated adversarial example
1051
+ for each target input, i.e., the one that successfully attacks
1052
+ the model or achieves the largest decrement on prediction
1053
+ confidence (if no successfully-attack example is generated).
1054
+ The selected examples were integrated with the training set to
1055
+ form the adversarial training set, which is used for fine-tuning
1056
+ the model. Thus, for a given subject, the size of the adversarial
1057
+ training set constructed by each technique is the same.
1058
+ After obtaining a fine-tuned model for each subject with
1059
+ each technique, we evaluated it on the evaluation set of
1060
+ the successfully-attacking examples generated from S2 by
1061
+ CODA, CARROT, ALERT, respectively. Then, we measured
1062
+ the accuracy of the fine-tuned model on the three evaluation
1063
+ sets to measure its ability of defending against attacks.
1064
+ 2) Results: Table IV shows the effectiveness of improving
1065
+ the model robustness with the generated examples by the
1066
+ studied techniques, respectively. The first row represents the
1067
+ evaluation set constructed by the corresponding technique,
1068
+ while the second row represents the adversarial training set
1069
+ constructed by the corresponding technique. The value in each
1070
+ cell represents the ratio of the adversarial examples in the
1071
+ evaluation set that can be defended by the fine-tuned model
1072
+ based on the adversarial training set. We found on most sub-
1073
+ jects, CODA improves the model robustness to defend against
1074
+ attacks from the largest ratio of adversarial examples generated
1075
+ by CODA, CARROT, ALERT, respectively. On average, the
1076
+ models fine-tuned by CODA can defend against attacks from
1077
+ 63.64%, 66.96%, 76.68% of successfully-attacking examples
1078
+ generated by CARROT, ALERT, CODA respectively, with
1079
+ the improvement of 6.35%, 25.69%, 42.67% over those by
1080
+ CARROT and 32.65%, 11.70%, 25.99% over those by ALERT
1081
+ respectively. Besides, the results of attack defense between
1082
+ different techniques indicate that the examples generated by
1083
+ CODA could subsume those by CARROT and ALERT to
1084
+ a large extent. We also applied each fine-tuned model to
1085
+ the corresponding test set, and found its accuracy is almost
1086
+ consistent with the original accuracy (all the absolute accuracy
1087
+ differences are less than 1%). The results demonstrate that
1088
+ CODA is more helpful to improve the model robustness than
1089
+ CARROT and ALERT without damaging the original model
1090
+ performance. In four evaluation sets (constructed by ALERT or
1091
+ CARROT), CODA performs worse than ALERT or CARROT,
1092
+ as the adversarial training set and the evaluation set generated
1093
+ by the same technique could be more similar.
1094
+ Answer to RQ3: CODA helps improve the model ro-
1095
+ bustness more effectively than CARROT and ALERT,
1096
+ in terms of defending against attacks from the adver-
1097
+ sarial examples generated by itself as well as the adver-
1098
+ sarial examples generated by the other two techniques.
1099
+ D. RQ4: Contribution of Each Main Component
1100
+ 1) Setup: We studied the contribution of each main compo-
1101
+ nent in CODA, i.e., reference inputs selection (RIS), equivalent
1102
+ structure transformations (EST), and identifier renaming trans-
1103
+ formations (IRT). We constructed three variants of CODA:
1104
+ • w/o RIS: we replaced RIS with the method that randomly
1105
+ selects N inputs from training data as reference inputs.
1106
+ • w/o EST: we removed EST from CODA, i.e., it directly
1107
+ performs identifier renaming transformations after select-
1108
+ ing reference inputs.
1109
+ • w/o IRT: we removed IRT from CODA, i.e., it directly
1110
+ checks whether a successfully-attacking example is gen-
1111
+ erated after equivalent structure transformations.
1112
+ 9
1113
+
1114
+ TABLE IV
1115
+ ROBUSTNESS IMPROVEMENT OF THE TARGET MODELS AFTER ADVERSARIAL FINE-TUNING
1116
+ Task
1117
+ Model
1118
+ CARROT
1119
+ ALERT
1120
+ CODA
1121
+ CARROT
1122
+ ALERT
1123
+ CODA
1124
+ CARROT
1125
+ ALERT
1126
+ CODA
1127
+ CARROT
1128
+ ALERT
1129
+ CODA
1130
+ Vulnerability
1131
+ CodeBERT
1132
+ 29.14%
1133
+ 21.11%
1134
+ 29.69%
1135
+ 23.43%
1136
+ 26.27%
1137
+ 34.44%
1138
+ 32.16%
1139
+ 31.73%
1140
+ 38.82%
1141
+ Prediction
1142
+ GraphCodeBERT
1143
+ 12.37%
1144
+ 19.59%
1145
+ 21.65%
1146
+ 16.33%
1147
+ 17.35%
1148
+ 23.71%
1149
+ 25.77%
1150
+ 24.74%
1151
+ 34.02%
1152
+ Clone
1153
+ CodeBERT
1154
+ 83.15%
1155
+ 42.31%
1156
+ 94.44%
1157
+ 52.65%
1158
+ 72.46%
1159
+ 75.32%
1160
+ 38.51%
1161
+ 71.45%
1162
+ 89.78%
1163
+ Detection
1164
+ GraphCodeBERT
1165
+ 75.00%
1166
+ 66.67%
1167
+ 77.50%
1168
+ 79.17%
1169
+ 84.29%
1170
+ 92.31%
1171
+ 35.71%
1172
+ 57.69%
1173
+ 92.97%
1174
+ Authorship
1175
+ CodeBERT
1176
+ 45.06%
1177
+ 40.67%
1178
+ 41.03%
1179
+ 51.25%
1180
+ 56.25%
1181
+ 58.82%
1182
+ 45.67%
1183
+ 43.33%
1184
+ 76.47%
1185
+ Attribution
1186
+ GraphCodeBERT
1187
+ 81.75%
1188
+ 67.08%
1189
+ 72.40%
1190
+ 79.41%
1191
+ 78.67%
1192
+ 100.00%
1193
+ 45.59%
1194
+ 80.39%
1195
+ 84.75%
1196
+ Functionality
1197
+ CodeBERT
1198
+ 83.46%
1199
+ 72.80%
1200
+ 81.51%
1201
+ 70.83%
1202
+ 71.75%
1203
+ 79.41%
1204
+ 78.92%
1205
+ 71.18%
1206
+ 95.43%
1207
+ Classification
1208
+ GraphCodeBERT
1209
+ 67.53%
1210
+ 75.19%
1211
+ 77.27%
1212
+ 32.04%
1213
+ 52.62%
1214
+ 62.98%
1215
+ 91.22%
1216
+ 90.81%
1217
+ 93.08%
1218
+ Defect
1219
+ CodeBERT
1220
+ 52.73%
1221
+ 25.81%
1222
+ 66.03%
1223
+ 74.88%
1224
+ 75.87%
1225
+ 83.12%
1226
+ 76.86%
1227
+ 68.66%
1228
+ 85.36%
1229
+ Prediction
1230
+ GraphCodeBERT
1231
+ 68.20%
1232
+ 48.54%
1233
+ 74.88%
1234
+ 52.73%
1235
+ 63.91%
1236
+ 59.45%
1237
+ 67.08%
1238
+ 68.66%
1239
+ 76.14%
1240
+ Average
1241
+ 59.84%
1242
+ 47.98%
1243
+ 63.64%
1244
+ 53.27%
1245
+ 59.94%
1246
+ 66.96%
1247
+ 53.75%
1248
+ 60.86%
1249
+ 76.68%
1250
+ TABLE V
1251
+ ABLATION TEST FOR CODA IN TERMS OF AVERAGE ASR
1252
+ Model
1253
+ w/o RIS
1254
+ w/o EST
1255
+ w/o IRT
1256
+ CODA
1257
+ CodeBERT
1258
+ 30.83%
1259
+ 62.73%
1260
+ 35.14%
1261
+ 73.04%
1262
+ GraphCodeBERT
1263
+ 29.49%
1264
+ 62.41%
1265
+ 26.24%
1266
+ 73.62%
1267
+ TABLE VI
1268
+ INFLUENCE OF HYPER-PARAMETER U.
1269
+ U
1270
+ 64
1271
+ 128
1272
+ 256
1273
+ 512
1274
+ 1024
1275
+ CodeBERT
1276
+ 60.14%
1277
+ 67.90%
1278
+ 73.04%
1279
+ 75.27%
1280
+ 75.83%
1281
+ GraphCodeBERT
1282
+ 61.92%
1283
+ 70.16%
1284
+ 73.62%
1285
+ 74.98%
1286
+ 75.69%
1287
+ 2) Results: Table V shows the average ASR values of each
1288
+ technique across all the tasks on CodeBERT and GraphCode-
1289
+ BERT, respectively. The results on each task can be found at
1290
+ our project homepage [19] due to the space limit. We found
1291
+ that CODA outperforms all three variants in terms of average
1292
+ ASR with improvements of 17.20%∼143.14%, demonstrating
1293
+ the contribution of each main component in CODA. Also, ref-
1294
+ erence inputs selection and identifier renaming transformations
1295
+ contribute more than equivalent structure transformations. The
1296
+ possible reason is that not all the rules of equivalent structure
1297
+ transformations can be applicable to all the target inputs,
1298
+ but identifier renaming transformations are applicable to all
1299
+ the inputs. We can enrich the rules of equivalent structure
1300
+ transformations in the future to further improve the attack
1301
+ effectiveness.
1302
+ Answer to RQ4: All the components of reference in-
1303
+ put selection, equivalent structure transformations, and
1304
+ identifier renaming transformations make contributions
1305
+ to the overall effectiveness of CODA, demonstrating
1306
+ the necessity of each of them in CODA.
1307
+ VI. THREATS TO VALIDITY
1308
+ The main threat to validity lies in the settings of param-
1309
+ eters in CODA. Here, we investigated the influence of two
1310
+ important parameters in CODA (i.e., U and N introduced in
1311
+ Section III-B). They affect the selection of reference inputs.
1312
+ Tables VI and VII show the influence of U and N in
1313
+ terms of average ASR across all the tasks. As U increases,
1314
+ CODA performs better, as incorporating more inputs for the
1315
+ second step of selection can increase the possibility of finding
1316
+ TABLE VII
1317
+ INFLUENCE OF HYPER-PARAMETER N
1318
+ N
1319
+ 1
1320
+ 4
1321
+ 16
1322
+ 32
1323
+ 64
1324
+ 128
1325
+ CodeBERT
1326
+ 28.08%
1327
+ 46.33%
1328
+ 61.07%
1329
+ 67.12%
1330
+ 73.04%
1331
+ 76.38%
1332
+ GraphCodeBERT
1333
+ 31.84%
1334
+ 46.46%
1335
+ 60.40%
1336
+ 66.12%
1337
+ 73.62%
1338
+ 74.93%
1339
+ more effective reference inputs. Similarly, as N increases
1340
+ within our studied range, more effective ingredients could
1341
+ be included, leading to better effectiveness. However, the
1342
+ amount of increase in terms of average ASR becomes smaller
1343
+ with U and N increasing, and meanwhile incorporating more
1344
+ inputs can incur more costs in similarity calculation or code
1345
+ transformations. Hence, by balancing the effectiveness and
1346
+ efficiency of CODA, we set U to 256 and N to 64 as the
1347
+ default settings in CODA for practical use.
1348
+ VII. RELATED WORK
1349
+ Besides the state-of-the-art techniques compared in our
1350
+ study (i.e., CARROT [12] and ALERT [14]), there are some
1351
+ other adversarial example generation techniques for deep code
1352
+ models. For example, Yefet et al. [44] proposed DAMP, which
1353
+ changes variables in the target input by gradient computation.
1354
+ It only works for the models using one-hot encoding to process
1355
+ code, and thus cannot attack the models based on state-
1356
+ of-the-art CodeBERT [6] and GraphCodeBERT [7] due to
1357
+ different encoding methods. Zhang et al. [13] proposed MHM,
1358
+ which iteratively performs identifier renaming transformations
1359
+ to generate adversarial examples based on the Metropolis-
1360
+ Hastings [45]–[47] algorithm. MHM underperforms CARROT
1361
+ and ALERT as presented by the existing studies [12], [14].
1362
+ Pour et al. [48] proposed a search-based technique with an
1363
+ iterative refactoring-based process. It does not ensure the
1364
+ naturalness of generated examples, especially with the rule
1365
+ of dead code insertion. These techniques still search for
1366
+ effective ingredients in the enormous space, limiting their
1367
+ effectiveness. Different from them, our work designs the first
1368
+ code-difference-guided attack technique, which can largely
1369
+ reduce ingredient space for improving the attack effectiveness.
1370
+ There are also many adversarial attack techniques in other
1371
+ domains, such as FGSM [49], JSMA [50], and BIM [10] in
1372
+ image processing. However, they are not applicable to attack
1373
+ deep code models as source code is discrete and has to strictly
1374
+ stick to the grammar and semantics constraints.
1375
+ 10
1376
+
1377
+ VIII. CONCLUSION
1378
+ To improve the attack effectiveness to deep code models, we
1379
+ propose a novel perspective by exploiting the code differences
1380
+ between reference inputs and the target input to guide the
1381
+ generation of adversarial examples. From this perspective, we
1382
+ design CODA, which reduces the ingredient space as the one
1383
+ constituted by structure and identifier differences and designs
1384
+ equivalent structure transformations and identifier renaming
1385
+ transformations to preserve original semantics. We conducted
1386
+ an extensive study on two popular pre-trained models with
1387
+ five tasks. The results demonstrate that CODA performs more
1388
+ successful attacks with less time than the state-of-the-art
1389
+ techniques (i.e., CARROT and ALERT), and confirm the
1390
+ naturalness of its generated examples as well as the capability
1391
+ of improving the model robustness.
1392
+ REFERENCES
1393
+ [1] M. White, M. Tufano, C. Vendome, and D. Poshyvanyk, “Deep learning
1394
+ code fragments for code clone detection,” in 2016 31st IEEE/ACM
1395
+ International Conference on Automated Software Engineering (ASE).
1396
+ IEEE, 2016, pp. 87–98.
1397
+ [2] Y. Zhou, S. Liu, J. Siow, X. Du, and Y. Liu, “Devign: effective vulner-
1398
+ ability identification by learning comprehensive program semantics via
1399
+ graph neural networks,” in Proceedings of the 33rd International Con-
1400
+ ference on Neural Information Processing Systems, 2019, pp. 10 197–
1401
+ 10 207.
1402
+ [3] J. Li, Y. Wang, M. R. Lyu, and I. King, “Code completion with neural
1403
+ attention and pointer networks,” in Proceedings of the 27th International
1404
+ Joint Conference on Artificial Intelligence, 2018, pp. 4159–25.
1405
+ [4] U. Alon, S. Brody, O. Levy, and E. Yahav, “code2seq: Generating
1406
+ sequences from structured representations of code,” in International
1407
+ Conference on Learning Representations, 2018.
1408
+ [5] U. Alon, M. Zilberstein, O. Levy, and E. Yahav, “code2vec: Learning
1409
+ distributed representations of code,” Proceedings of the ACM on Pro-
1410
+ gramming Languages, vol. 3, no. POPL, pp. 1–29, 2019.
1411
+ [6] Z. Feng, D. Guo, D. Tang, N. Duan, X. Feng, M. Gong, L. Shou, B. Qin,
1412
+ T. Liu, D. Jiang et al., “Codebert: A pre-trained model for programming
1413
+ and natural languages,” in Findings of the Association for Computational
1414
+ Linguistics: EMNLP 2020, 2020, pp. 1536–1547.
1415
+ [7] D. Guo, S. Ren, S. Lu, Z. Feng, D. Tang, S. Liu, L. Zhou, N. Duan,
1416
+ A. Svyatkovskiy, S. Fu et al., “Graphcodebert: Pre-training code repre-
1417
+ sentations with data flow,” in ICLR, 2021.
1418
+ [8] Y. Li, D. Choi, J. Chung, N. Kushman, J. Schrittwieser, R. Leblond,
1419
+ T. Eccles, J. Keeling, F. Gimeno, A. D. Lago et al., “Competition-
1420
+ level code generation with alphacode,” arXiv preprint arXiv:2203.07814,
1421
+ 2022.
1422
+ [9] M. Chen, J. Tworek, H. Jun, Q. Yuan, H. P. d. O. Pinto, J. Kaplan,
1423
+ H. Edwards, Y. Burda, N. Joseph, G. Brockman et al., “Evaluating large
1424
+ language models trained on code,” arXiv preprint arXiv:2107.03374,
1425
+ 2021.
1426
+ [10] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial examples
1427
+ in the physical world,” in Artificial intelligence safety and security.
1428
+ Chapman and Hall/CRC, 2018, pp. 99–112.
1429
+ [11] Y. Qin, N. Carlini, G. Cottrell, I. Goodfellow, and C. Raffel, “Imper-
1430
+ ceptible, robust, and targeted adversarial examples for automatic speech
1431
+ recognition,” in International conference on machine learning.
1432
+ PMLR,
1433
+ 2019, pp. 5231–5240.
1434
+ [12] H. Zhang, Z. Fu, G. Li, L. Ma, Z. Zhao, H. Yang, Y. Sun, Y. Liu,
1435
+ and Z. Jin, “Towards robustness of deep program processing mod-
1436
+ els—detection, estimation, and enhancement,” ACM Transactions on
1437
+ Software Engineering and Methodology (TOSEM), vol. 31, no. 3, pp.
1438
+ 1–40, 2022.
1439
+ [13] H. Zhang, Z. Li, G. Li, L. Ma, Y. Liu, and Z. Jin, “Generating adversarial
1440
+ examples for holding robustness of source code processing models,” in
1441
+ Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34,
1442
+ no. 01, 2020, pp. 1169–1176.
1443
+ [14] Z. Yang, J. Shi, J. He, and D. Lo, “Natural attack for pre-trained models
1444
+ of code,” arXiv preprint arXiv:2201.08698, 2022.
1445
+ [15] C. Casalnuovo, E. T. Barr, S. K. Dash, P. Devanbu, and E. Morgan, “A
1446
+ theory of dual channel constraints,” in 2020 IEEE/ACM 42nd Interna-
1447
+ tional Conference on Software Engineering: New Ideas and Emerging
1448
+ Results (ICSE-NIER).
1449
+ IEEE, 2020, pp. 25–28.
1450
+ [16] H. Wei and M. Li, “Supervised deep features for software functional
1451
+ clone detection by exploiting lexical and syntactical information in
1452
+ source code.” in IJCAI, 2017, pp. 3034–3040.
1453
+ [17] B. Alsulami, E. Dauber, R. Harang, S. Mancoridis, and R. Greenstadt,
1454
+ “Source code authorship attribution using long short-term memory based
1455
+ networks,” in European Symposium on Research in Computer Security.
1456
+ Springer, 2017, pp. 65–82.
1457
+ [18] J. Zhang, X. Wang, H. Zhang, H. Sun, K. Wang, and X. Liu, “A novel
1458
+ neural source code representation based on abstract syntax tree,” in
1459
+ 2019 IEEE/ACM 41st International Conference on Software Engineering
1460
+ (ICSE).
1461
+ IEEE, 2019, pp. 783–794.
1462
+ [19] “Coda,” To be announced later, Accessed: 2022.
1463
+ [20] Q. Huang, X. Xia, Z. Xing, D. Lo, and X. Wang, “Api method
1464
+ recommendation without worrying about the task-api knowledge gap,” in
1465
+ 2018 33rd IEEE/ACM International Conference on Automated Software
1466
+ Engineering (ASE).
1467
+ IEEE, 2018, pp. 293–304.
1468
+ [21] A. Karmakar and R. Robbes, “What do pre-trained code models know
1469
+ about code?” in 2021 36th IEEE/ACM International Conference on
1470
+ Automated Software Engineering (ASE).
1471
+ IEEE, 2021, pp. 1332–1336.
1472
+ [22] M. Allamanis, H. Peng, and C. Sutton, “A convolutional attention net-
1473
+ work for extreme summarization of source code,” in 33rd International
1474
+ Conference on Machine Learning: ICML 2016. PMLR, 2016, pp. 2091–
1475
+ 2100.
1476
+ [23] A. V. Phan, M. Le Nguyen, and L. T. Bui, “Convolutional neural
1477
+ networks over control flow graphs for software defect prediction,”
1478
+ in 2017 IEEE 29th International Conference on Tools with Artificial
1479
+ Intelligence (ICTAI).
1480
+ IEEE, 2017, pp. 45–52.
1481
+ [24] M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “Accessorize to
1482
+ a crime: Real and stealthy attacks on state-of-the-art face recognition,”
1483
+ in Proceedings of the 2016 acm sigsac conference on computer and
1484
+ communications security, 2016, pp. 1528–1540.
1485
+ [25] K. Grosse, P. Manoharan, N. Papernot, M. Backes, and P. McDaniel,
1486
+ “On the (statistical) detection of adversarial examples,” arXiv preprint
1487
+ arXiv:1702.06280, 2017.
1488
+ [26] A. Prakash, N. Moran, S. Garber, A. DiLillo, and J. Storer, “Deflecting
1489
+ adversarial attacks with pixel deflection,” in Proceedings of the IEEE
1490
+ conference on computer vision and pattern recognition, 2018, pp. 8571–
1491
+ 8580.
1492
+ [27] W. Shen, Y. Li, L. Chen, Y. Han, Y. Zhou, and B. Xu, “Multiple-
1493
+ boundary clustering and prioritization to promote neural network retrain-
1494
+ ing,” in Proceedings of the 35th IEEE/ACM International Conference on
1495
+ Automated Software Engineering, 2020, pp. 410–422.
1496
+ [28] G. Zhao and J. Huang, “Deepsim: deep learning code functional similar-
1497
+ ity,” in Proceedings of the 2018 26th ACM Joint Meeting on European
1498
+ Software Engineering Conference and Symposium on the Foundations
1499
+ of Software Engineering, 2018, pp. 141–151.
1500
+ [29] X. Zhou, D. Han, and D. Lo, “Assessing generalizability of codebert,”
1501
+ in 2021 IEEE International Conference on Software Maintenance and
1502
+ Evolution (ICSME).
1503
+ IEEE, 2021, pp. 425–436.
1504
+ [30] S. Lu, D. Guo, S. Ren, J. Huang, A. Svyatkovskiy, A. Blanco,
1505
+ C. Clement, D. Drain, D. Jiang, D. Tang et al., “Codexglue: A machine
1506
+ learning benchmark dataset for code understanding and generation,”
1507
+ in Thirty-fifth Conference on Neural Information Processing Systems
1508
+ Datasets and Benchmarks Track (Round 1), 2021.
1509
+ [31] C. Pan, M. Lu, and B. Xu, “An empirical study on software defect
1510
+ prediction using codebert model,” Applied Sciences, vol. 11, no. 11, p.
1511
+ 4793, 2021.
1512
+ [32] K. Nakamura and N. Ishiura, “Random testing of c compilers based on
1513
+ test program generation by equivalence transformation,” in 2016 IEEE
1514
+ Asia Pacific Conference on Circuits and Systems (APCCAS).
1515
+ IEEE,
1516
+ 2016, pp. 676–679.
1517
+ [33] H. Cheers, Y. Lin, and S. P. Smith, “Spplagiarise: A tool for generating
1518
+ simulated semantics-preserving plagiarism of java source code,” in 2019
1519
+ IEEE 10th International conference on software engineering and service
1520
+ science (ICSESS).
1521
+ IEEE, 2019, pp. 617–622.
1522
+ [34] P. Bojanowski, E. Grave, A. Joulin, and T. Mikolov, “Enriching word
1523
+ vectors with subword information,” Transactions of the association for
1524
+ computational linguistics, vol. 5, pp. 135–146, 2017.
1525
+ [35] “Ffmpeg,” https://www.ffmpeg.org/, Accessed: 2022.
1526
+ [36] “Qemu,” https://www.qemu.org/, Accessed: 2022.
1527
+ 11
1528
+
1529
+ [37] J. Svajlenko, J. F. Islam, I. Keivanloo, C. K. Roy, and M. M. Mia,
1530
+ “Towards a big data curated benchmark of inter-project code clones,”
1531
+ in 2014 IEEE International Conference on Software Maintenance and
1532
+ Evolution.
1533
+ IEEE, 2014, pp. 476–480.
1534
+ [38] L. Mou, G. Li, L. Zhang, T. Wang, and Z. Jin, “Convolutional neural
1535
+ networks over tree structures for programming language processing,” in
1536
+ Thirtieth AAAI conference on artificial intelligence, 2016.
1537
+ [39] “Codechef,” https://codechef.com/, Accessed: 2022.
1538
+ [40] “Tree-sitter,” https://tree-sitter.github.io/tree-sitter/, Accessed: 2022.
1539
+ [41] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Good-
1540
+ fellow, and R. Fergus, “Intriguing properties of neural networks,” in
1541
+ 2nd International Conference on Learning Representations, ICLR 2014,
1542
+ 2014.
1543
+ [42] A. Joshi, S. Kale, S. Chandel, and D. K. Pal, “Likert scale: Explored
1544
+ and explained,” British journal of applied science & technology, vol. 7,
1545
+ no. 4, p. 396, 2015.
1546
+ [43] D. Jin, Z. Jin, J. T. Zhou, and P. Szolovits, “Is bert really robust?
1547
+ a strong baseline for natural language attack on text classification
1548
+ and entailment,” in Proceedings of the AAAI conference on artificial
1549
+ intelligence, vol. 34, no. 05, 2020, pp. 8018–8025.
1550
+ [44] N. Yefet, U. Alon, and E. Yahav, “Adversarial examples for models of
1551
+ code,” Proceedings of the ACM on Programming Languages, vol. 4, no.
1552
+ OOPSLA, pp. 1–30, 2020.
1553
+ [45] N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and
1554
+ E. Teller, “Equation of state calculations by fast computing machines,”
1555
+ The journal of chemical physics, vol. 21, no. 6, pp. 1087–1092, 1953.
1556
+ [46] W. K. Hastings, “Monte carlo sampling methods using markov chains
1557
+ and their applications,” 1970.
1558
+ [47] S. Chib and E. Greenberg, “Understanding the metropolis-hastings
1559
+ algorithm,” The american statistician, vol. 49, no. 4, pp. 327–335, 1995.
1560
+ [48] M. V. Pour, Z. Li, L. Ma, and H. Hemmati, “A search-based testing
1561
+ framework for deep neural networks of source code embedding,” in 2021
1562
+ 14th IEEE Conference on Software Testing, Verification and Validation
1563
+ (ICST).
1564
+ IEEE, 2021, pp. 36–46.
1565
+ [49] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing
1566
+ adversarial examples,” arXiv preprint arXiv:1412.6572, 2014.
1567
+ [50] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and
1568
+ A. Swami, “The limitations of deep learning in adversarial settings,” in
1569
+ 2016 IEEE European symposium on security and privacy (EuroS&P).
1570
+ IEEE, 2016, pp. 372–387.
1571
+ 12
1572
+
B9E0T4oBgHgl3EQfgAGB/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BdAzT4oBgHgl3EQfTfx4/content/2301.01250v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7a7cb07df110b98119bf1f8eafd840d8daa0eb6c1dd912eab384efb90916a837
3
+ size 890339
BdAzT4oBgHgl3EQfTfx4/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2e02dabcad61541e501cab7b09ffcedf8485d1e9d46188c1348ba45ecff58b51
3
+ size 5570605
BdAzT4oBgHgl3EQfTfx4/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ed692422150df9a6750ca6120e07ccb0b138b798f81885e7d2c39b7641cd6adc
3
+ size 224161
CdE1T4oBgHgl3EQfDwOw/content/tmp_files/2301.02882v1.pdf.txt ADDED
@@ -0,0 +1,816 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MLMC techniques for discontinuous functions
2
+ Michael B. Giles
3
+ Abstract The Multilevel Monte Carlo (MLMC) approach usually works well when
4
+ estimating the expected value of a quantity which is a Lipschitz function of inter-
5
+ mediate quantities, but if it is a discontinuous function it can lead to a much slower
6
+ decay in the variance of the MLMC correction. This article reviews the literature
7
+ on techniques which can be used to overcome this challenge in a variety of different
8
+ contexts, and discusses recent developments using either a branching diffusion or
9
+ adaptive sampling.
10
+ 1 Introduction
11
+ The Multilevel Monte Carlo (MLMC) method is based on the telescoping sum
12
+ E[ �𝑃𝐿] = E[ �𝑃0] +
13
+ 𝐿
14
+ ∑︁
15
+ ℓ=1
16
+ E[ �𝑃ℓ−�𝑃ℓ−1]
17
+ where �𝑃ℓ represents an approximation to an output quantity of interest 𝑃 on level ℓ,
18
+ with the weak error
19
+ ���E[ �𝑃ℓ−𝑃]
20
+ ��� and MLMC variance V[ �𝑃ℓ−�𝑃ℓ−1], both decreasing
21
+ as the level ℓ increases, but with the corresponding computational cost per sample
22
+ increasing.
23
+ If �𝑌ℓ has expected value E[ �𝑃ℓ−�𝑃ℓ−1], with variance 𝑉ℓ and cost 𝐶ℓ, then for a
24
+ given target RMS error 𝜀, the number of levels 𝐿 and the number of independent
25
+ samples on each level can be optimised [13, 14] to give an overall cost which is
26
+ approximately equal to 𝜀−2
27
+ � 𝐿
28
+ ∑︁
29
+ ℓ=0
30
+ √︁
31
+ 𝐶ℓ𝑉ℓ
32
+ �2
33
+ .
34
+ Michael B. Giles
35
+ University of Oxford Mathematical Institute, Woodstock Rd, Oxford OX2 6GG, UK
36
+ e-mail: [email protected]
37
+ 1
38
+ arXiv:2301.02882v1 [math.NA] 7 Jan 2023
39
+
40
+ 2
41
+ Michael B. Giles
42
+ If 𝐶ℓ𝑉ℓ → 0 as ℓ → ∞, then the cost is dominated by the first term from level 0,
43
+ and the cost is approximately 𝜀−2𝐶0𝑉0, so proportional to 𝜀−2.
44
+ If 𝐶ℓ𝑉ℓ → const as ℓ → ∞, then the contributions to the cost are spread almost
45
+ equally across all levels and the cost is approximately 𝜀−2𝐿2𝐶𝐿𝑉𝐿, proportional to
46
+ 𝜀−2| log 𝜀|2 if E[ �𝑃ℓ−𝑃] decays exponentially with ℓ.
47
+ Even worse, if 𝐶ℓ𝑉ℓ → ∞ then the cost is dominated by the contribution from the
48
+ finest level and so is approximately 𝜀−2𝐶𝐿𝑉𝐿 which is 𝑂(𝜀−2−(𝛾−𝛽)/𝛼) if E[ �𝑃ℓ−𝑃] ∼
49
+ 2−𝛼ℓ, 𝑉ℓ ∼ 2−𝛽ℓ and 𝐶ℓ ∼ 2𝛾ℓ.
50
+ In most MLMC applications, 𝑃 is a smooth function of some intermediate solution
51
+ quantities, such as the solution of an SDE, a PDE with stochastic coefficients or
52
+ initial/boundary data, or an estimate of an inner conditional expectation. Under
53
+ these circumstances we usually have 𝛽 ≥ 𝛾 and so the MLMC complexity is 𝑂(𝜀−2)
54
+ or 𝑂(𝜀−2| log 𝜀|2).
55
+ This article is concerned with the small but important class of applications where
56
+ 𝑃 is a discontinuous function of the intermediate quantities, and because of this the
57
+ MLMC variance 𝑉ℓ can decay much more slowly, leading to the complexity falling
58
+ into the third category of being 𝑂(𝜀−2−(𝛾−𝛽)/𝛼).
59
+ The good news is that there has been considerable research within the MLMC
60
+ community to address this challenge. This article surveys the variety of methods
61
+ which have been developed in the hope that this can aid researchers meeting similar
62
+ challenges in future applications.
63
+ To illustrate things, we begin by detailing two specific application challenges
64
+ which have motivated much of this research. We then discuss the many approaches
65
+ which have been developed, several of which have borrowed ideas from the literature
66
+ on computing sensitivities (the “greeks” in mathematical finance literature) of the
67
+ form
68
+ 𝜕
69
+ 𝜕𝛼E [ 𝑓 (𝜔, 𝛼)]
70
+ using the pathwise sensitivity approach [24] (also known as Infinitesimal Perturba-
71
+ tion Analysis, IPA for short [30]) or Likelihood Ratio Method [31], or from methods
72
+ from improving integrand smoothness to improve the rate of convergence for QMC
73
+ integration [1, 6].
74
+ 1.1 Challenge 1: nested expectation
75
+ Suppose 𝑓 is a scalar function and we want to estimate the nested expectation
76
+ E [ 𝑓 (E[𝑍|𝑋]) ], where the outer expectation is with respect to a random variable
77
+ 𝑋 and we will assume that the inner conditional expectation E[𝑍|𝑋] has a bounded
78
+ density near zero.
79
+ A very simple MLMC treatment 1 uses 𝑀ℓ = 2ℓ𝑀0 inner samples on level ℓ, so
80
+ estimators on level 0 and the higher levels are simply
81
+ 1 Note that if 𝑓 is smooth, or at least Lipschitz, then it is better to use an “antithetic” estimator
82
+ [8, 14, 15, 18], but this does not give a better order of convergence when 𝑓 is discontinuous.
83
+
84
+ MLMC techniques for discontinuous functions
85
+ 3
86
+ �𝑌0 = 𝑓 (𝑍
87
+ (0,𝑀0)),
88
+ �𝑌ℓ = 𝑓 (𝑍
89
+ (ℓ,𝑀ℓ)) − 𝑓 (𝑍
90
+ (ℓ,𝑀ℓ−1)),
91
+ where 𝑍
92
+ (ℓ,𝑀ℓ) and 𝑍
93
+ (ℓ,𝑀ℓ−1) represent independent averages of 𝑀ℓ and 𝑀ℓ−1 inde-
94
+ pendent samples of 𝑍, all conditional on the same value of 𝑋 [14, 15].
95
+ If V[𝑍|𝑋] is finite, and 𝑓 is Lipschitz with constant 𝐿 𝑓 , then
96
+ E
97
+ ��
98
+ 𝑓 (𝑍
99
+ (ℓ,𝑀ℓ)) − 𝑓 (E[𝑍|𝑋])
100
+ �2
101
+ | 𝑋
102
+
103
+ ≤ 𝐿2
104
+ 𝑓 E
105
+ ��
106
+ 𝑍
107
+ (ℓ,𝑀ℓ) − E[𝑍|𝑋]
108
+ �2
109
+ | 𝑋
110
+
111
+ = 𝐿2
112
+ 𝑓 𝑀−1
113
+ ℓ V[𝑍|𝑋],
114
+ and hence E[�𝑌2
115
+ ℓ |𝑋] ≤ 4 𝐿2
116
+ 𝑓 (𝑀−1
117
+
118
+ + 𝑀−1
119
+ ℓ−1)V[𝑍|𝑋] for ℓ>0. If V[𝑍|𝑋] is uniformly
120
+ bounded it follows that 𝑉ℓ = 𝑂(𝑀−1
121
+ ℓ ). If the cost of each conditional sample of 𝑍 is
122
+ 𝑂(1) then 𝐶ℓ = 𝑂(𝑀ℓ) and hence the complexity is 𝑂(𝜀−2| log 𝜀|2).
123
+ Unfortunately, the situation is significantly poorer when 𝑓 is the Heaviside step
124
+ function 𝐻 defined by 𝐻(𝑥)=0 if 𝑥<0, and 𝐻(𝑥)=1 if 𝑥≥0. This occurs in many
125
+ applications because P [E[𝑍|𝑋] > 𝐾] = E [𝐻(E[𝑍|𝑋] − 𝐾)] , so it corresponds to
126
+ the probability of a conditional expectation exceeding some threshold 𝐾, which is a
127
+ very important quantity in risk calculations.
128
+ If 𝐾=0 and 𝐸[𝑍|𝑋] has a bounded density near zero then there is an 𝑂(𝑀−1/2
129
+
130
+ )
131
+ probability that |𝐸[𝑍|𝑋] | = 𝑂(𝑀−1/2
132
+
133
+ ), which is the circumstance under which there
134
+ is an 𝑂(1) probability that �𝑌ℓ = ±1 due to 𝑍
135
+ (ℓ,𝑀ℓ) being positive and 𝑍
136
+ (ℓ,𝑀ℓ−1) being
137
+ negative, or vice versa. Hence 𝑉ℓ ≈ 𝑂(𝑀−1/2
138
+
139
+ ) and the complexity is approximately
140
+ 𝑂(𝜀−5/2) [19].
141
+ This challenge is the primary motivation for Section 7, and also arises in the
142
+ context of Section 3.
143
+ 1.2 Challenge 2: discontinuous payoff function
144
+ In the case of a scalar SDE
145
+ d𝑆𝑡 = 𝑎(𝑆𝑡) d𝑡 + 𝑏(𝑆𝑡) d𝑊𝑡,
146
+ (1)
147
+ with an output quantity of interest 𝑃 ≡ 𝑓 (𝑆𝑇 ), the standard estimator is
148
+ �𝑌ℓ = �𝑃ℓ − �𝑃ℓ−1
149
+ where the same Brownian motion 𝑊𝑡 is used to calculate both �𝑃ℓ and �𝑃ℓ−1, but with
150
+ different uniform timesteps ℎℓ and ℎℓ−1.
151
+ If 𝑓 is Lipschitz with constant 𝐿 𝑓 , then
152
+ 𝑉ℓ ≤ E
153
+
154
+ ( �𝑃ℓ − �𝑃ℓ−1)2�
155
+ ≤ 𝐿2
156
+ 𝑓 E
157
+
158
+ (�𝑆ℓ − �𝑆ℓ−1)2�
159
+
160
+ 4
161
+ Michael B. Giles
162
+ where �𝑆ℓ is the level ℓ numerical approximation to 𝑆𝑇 . Hence, based on standard
163
+ strong convergence results [28] we have 𝑉ℓ = 𝑂(ℎℓ) for an Euler-Maruyama dis-
164
+ cretisation of the SDE, and 𝑉ℓ = 𝑂(ℎ2
165
+ ℓ) for the first order Milstein discretisation.
166
+ The cost 𝐶ℓ is 𝑂(ℎ−1
167
+ ℓ ) in both cases, giving MLMC complexities of 𝑂(𝜀−2| log 𝜀|2)
168
+ and 𝑂(𝜀−2), respectively,
169
+ In mathematical finance, a digital call option payoff is 0 or 1, depending on
170
+ whether 𝑆𝑇 is below or above the strike 𝐾, so the payoff function can be written
171
+ as 𝑓 (𝑆𝑇 ) = 𝐻(𝑆𝑇 −𝐾). The MLMC problem is that a small difference between the
172
+ coarse and fine paths can give a payoff difference of ±1 if the two paths straddle the
173
+ strike, i.e. are on different sides of the strike.
174
+ When using the Euler-Maruyama approximation of the SDE, �𝑆ℓ−�𝑆ℓ−1 = 𝑂(ℎ1/2
175
+ ℓ ).
176
+ Speaking loosely (see [4, 21] for the rigorous analysis) an 𝑂(ℎ1/2
177
+ ℓ ) fraction of
178
+ fine/coarse pairs straddle the strike, so 𝑉ℓ = 𝑂(ℎ1/2
179
+ ℓ ) and hence the complexity is
180
+ 𝑂(𝜀−5/2).
181
+ Similarly, using the Milstein approximation gives �𝑆ℓ−�𝑆ℓ−1 = 𝑂(ℎℓ) so 𝑉ℓ =
182
+ 𝑂(ℎℓ). This is clearly better, and gives a complexity which is 𝑂(𝜀−2| log 𝜀|2), but
183
+ there is still the problem that most MLMC samples 𝑌ℓ are zero on the finer levels, so
184
+ the kurtosis is 𝑂(ℎ−1
185
+ ℓ ) which causes problems in practice in estimating 𝑉ℓ accurately
186
+ to determine the number of samples 𝑁ℓ to use on level ℓ. In addition, there is the
187
+ difficulty that the Milstein discretisation of multi-dimensional SDEs often requires
188
+ the simulation of Lévy areas, though this problem can be addressed through the use
189
+ of an antithetic estimator [23].
190
+ This challenge is the primary motivation for Sections 2, 4, 5 and 6, also also arises
191
+ in Sections 3 and 7.
192
+ 2 Explicit smoothing
193
+ The pathwise sensitivity analysis (or IPA) approach to compute the parameter sen-
194
+ sitivities known as Greeks in mathematical finance [24] requires that the payoff
195
+ function 𝑓 is continuous and piecewise smooth. This is clearly a problem with digi-
196
+ tal options, and one standard approach is to smooth the payoff function by replacing
197
+ the Heaviside step function 𝐻 with a smoothed approximation 𝐻𝛿(𝑥) ≡ 𝑔(𝑥/𝛿),
198
+ with 𝑔(𝑥) → 0 as 𝑥 → −∞ and 𝑔(𝑥) → 1 as 𝑥 → +∞, so the discontinuity is
199
+ smoothed over a width of 𝑂(𝛿).
200
+ For financial reasons, the preference is often to use a one-sided smoothing, such
201
+ as the piecewise linear approximation shown in yellow in Figure 1. This one-sided
202
+ approximation introduces a weak error, or bias, which is 𝑂(𝛿). If it is used for
203
+ MLMC, then 𝐻′
204
+ 𝛿(𝑆𝑇 ) = 𝛿−1 for the 𝑂(𝛿) fraction of the paths which end up in the
205
+ ramp region, and therefore 𝑉ℓ = 𝑂(𝛿 × (𝛿−1)2) = 𝑂(𝛿−1). Hence the optimal choice
206
+ of 𝛿 involves a tradeoff between bias and variance.
207
+ The bias can be reduced by making the smoothing anti-symmetric about 𝑥 = 0 so
208
+ that 𝐻𝛿(𝑥) − 𝐻(𝑥) = −(𝐻𝛿(−𝑥) − 𝐻(−𝑥)), for example by choosing 𝑔(𝑥) ≡ Φ(𝑥)
209
+
210
+ MLMC techniques for discontinuous functions
211
+ 5
212
+ as illustrated in orange in Figure 1. If 𝑆𝑇 has the smooth probability density 𝜌(𝑆)
213
+ then the weak error is
214
+ ∫ ∞
215
+ −∞
216
+ (𝐻𝛿(𝑆−𝐾) − 𝐻(𝑆−𝐾)) 𝜌(𝑆) d𝑆 = 𝛿
217
+ ∫ ∞
218
+ −∞
219
+ (𝑔(𝑥) − 𝐻(𝑥)) 𝜌(𝐾+𝑥𝛿) d𝑥
220
+ and a Taylor series expansion of 𝜌(𝐾+𝑥𝛿) results in the asymptotic error expansion
221
+ 𝑎1𝜌(𝐾) 𝛿 + 𝑎2𝜌′(𝐾) 𝛿2 + 𝑎3𝜌′′(𝐾) 𝛿3 + 𝑎4𝜌′′′(𝐾) 𝛿4 + 𝑂(𝛿5)
222
+ where
223
+ 𝑎𝑘 =
224
+ ∫ ∞
225
+ −∞
226
+ 𝑥𝑘−1 (𝑔(𝑥) − 𝐻(𝑥)) d𝑥.
227
+ If 𝑔(𝑥) − 𝐻(𝑥) = − (𝑔(−𝑥) − 𝐻(−𝑥)) then 𝑎1 = 𝑎3 = 0, and
228
+ 𝑎2 = 2
229
+ ∫ ∞
230
+ 0
231
+ 𝑥(𝑔(𝑥) − 1) d𝑥,
232
+ 𝑎4 = 2
233
+ ∫ ∞
234
+ 0
235
+ 𝑥3(𝑔(𝑥) − 1) d𝑥.
236
+ If 𝑔(𝑥) is monotonic, then 𝑎2 ≠ 0, but by considering non-monotonic functions
237
+ such as 𝑔(𝑥) = (4/3) Φ(𝑥) − (1/3) Φ(2𝑥) it is possible to set 𝑎2 = 0 making the
238
+ weak error 𝑂(𝛿4). Hence, to achieve 𝑂(𝜀) accuracy overall we need 𝛿=𝑂(𝜀1/4), and
239
+ then on the coarsest levels 𝑉ℓ = 𝑂(𝛿−1) = 𝑂(𝜀−1/4) so the overall complexity is
240
+ approximately 𝑂(𝜀−2−1/4) in the best cases where the overall cost is dominated by
241
+ the cost on the coarsest levels.
242
+ Giles, Nagapetyan & Ritter [22] used explicit smoothing for estimating cumulative
243
+ distribution functions (CDFs). For a scalar random variable 𝑋, to estimate 𝐶(𝑥) =
244
+ P(𝑋 < 𝑥) = E[𝐻(𝑥−𝑋)], the approach they adopted was to use MLMC to estimate
245
+ 𝐶(𝑥 𝑗) for a set of spline points 𝑥 𝑗 and then interpolate these values with a cubic
246
+ spline. Overall, their method balanced three weak errors, the SDE discretisation error
247
+ on the finest level, the smoothing error due to 𝐻𝛿, and the cubic spline interpolation
248
+ error, in addition to the MLMC sampling error.
249
+ 0.5
250
+ 1
251
+ 1.5
252
+ ST
253
+ 0
254
+ 0.2
255
+ 0.4
256
+ 0.6
257
+ 0.8
258
+ 1
259
+ f(S T)
260
+ Fig. 1 Two explicitly smoothed versions of the Heaviside step function for a digital call option
261
+
262
+ 6
263
+ Michael B. Giles
264
+ 3 Integration/differentiation and Malliavin calculus
265
+ Krumscheid & Nobile [29] used a slightly different approach for estimating CDFs,
266
+ particularly in the context of risk estimation. Starting from the identity
267
+ d
268
+ d𝑥 E [ max(0, 𝑥−𝑆𝑇 ) ] = E[ 𝐻(𝑥−𝑆𝑇 ) ]
269
+ they used MLMC to estimate E[ max(0, 𝑥 𝑗−𝑆𝑇 ) ] for a set of spline points 𝑥 𝑗,
270
+ interpolated these with a cubic spline, and and then differentiated the spline to
271
+ obtain an approximation to the CDF 𝐶(𝑥). This avoids the extra weak error due to
272
+ smoothing the Heaviside function, but differentiating the cubic spline amplifies the
273
+ noise in the spline data.
274
+ On a similar note, Altmayer & Neuenkirch [2] used Malliavin calculus integration
275
+ by parts to treat discontinuous payoffs based on solutions of the Heston stochastic
276
+ volatility SDE. They observed that asymptotically this improves the MLMC vari-
277
+ ance on the finer levels, but it increases the variance on coarse levels. To address
278
+ this, they split the payoff into a smooth part which they treated with the standard
279
+ MLMC approach, and a compact-support discontinuous part for which they used the
280
+ Malliavin MLMC.
281
+ Malliavin calculus was originally developed for computing sensitivities, so this
282
+ is another example of the literature on sensitivity calculations being exploited to
283
+ develop improved MLMC algorithms.
284
+ 4 Conditional expectation
285
+ When using the first order Milstein discretisation for an SDE, one way to improve
286
+ the MLMC variance for digital options is to switch to the Euler-Maruyama approxi-
287
+ mation for the final timestep, and then take the conditional expectation with respect
288
+ to the final fine path Brownian increment Δ𝑊 [12, 17].
289
+ For the fine path approximation of the scalar SDE (1) with 𝑁 timesteps of size
290
+ ℎℓ, the path value 𝑆𝑇 at the final time 𝑇 is given by
291
+ �𝑆 𝑓
292
+ 𝑇 = �𝑆 𝑓
293
+ 𝑇 −ℎℓ + 𝑎(�𝑆 𝑓
294
+ 𝑇 −ℎℓ) ℎℓ + 𝑏(�𝑆 𝑓
295
+ 𝑇 −ℎℓ) Δ𝑊𝑁 ,
296
+ and therefore the conditional expected value for the digital call option is
297
+ �𝑃 𝑓
298
+
299
+ = E
300
+
301
+ 𝐻(�𝑆 𝑓
302
+ 𝑇 −𝐾) | �𝑆 𝑓
303
+ 𝑇 −ℎℓ
304
+
305
+ = Φ ��
306
+
307
+ �𝑆 𝑓
308
+ 𝑇 −ℎℓ + 𝑎(�𝑆 𝑓
309
+ 𝑇 −ℎℓ) ℎℓ − 𝐾
310
+ 𝑏(�𝑆 𝑓
311
+ 𝑇 −ℎℓ) √ℎℓ
312
+ ��
313
+
314
+ .
315
+ Similarly, for the coarse path with coarse timestep ℎℓ−1 = 2 ℎℓ, the Brownian incre-
316
+ ment for the final coarse timestep is the sum of the last two Brownian increments for
317
+ the fine path, Δ𝑊𝑁 −1+Δ𝑊𝑁 , and therefore
318
+
319
+ MLMC techniques for discontinuous functions
320
+ 7
321
+ �𝑆𝑐
322
+ 𝑇 = �𝑆𝑐
323
+ 𝑇 −ℎℓ−1 + 𝑎(�𝑆𝑐
324
+ 𝑇 −ℎℓ−1) ℎℓ−1 + 𝑏(�𝑆𝑐
325
+ 𝑇 −ℎℓ−1) (Δ𝑊𝑁 −1+Δ𝑊𝑁 ) ,
326
+ from which we obtain
327
+ �𝑃𝑐
328
+ ℓ−1 = E
329
+
330
+ 𝐻(�𝑆𝑐
331
+ 𝑇 −𝐾) | �𝑆𝑐
332
+ 𝑇 −ℎℓ−1, Δ𝑊𝑁 −1
333
+
334
+ = Φ
335
+ � �𝑆𝑐
336
+ 𝑇 −ℎℓ−1 + 𝑎(�𝑆𝑐
337
+ 𝑇 −ℎℓ−1) ℎℓ−1 + 𝑏(�𝑆𝑐
338
+ 𝑇 −ℎℓ−1) Δ𝑊𝑁 −1 − 𝐾
339
+ 𝑏(�𝑆𝑐
340
+ 𝑇 −ℎℓ−1) √ℎℓ
341
+
342
+ .
343
+ With �𝑌ℓ ≡ �𝑃ℓ−�𝑃ℓ−1, numerical analysis [17] proves that 𝑉ℓ ≈ 𝑂(ℎ3/2
344
+ ℓ ) so the
345
+ MLMC complexity is 𝑂(𝜀−2). Heuristically, this is because there is an 𝑂(ℎ1/2
346
+ ℓ )
347
+ probability of paths being within 𝑂(ℎ1/2
348
+ ℓ ) of the strike 𝐾, and for these
349
+ �𝑆 𝑓
350
+ 𝑇 −ℎℓ−1 − �𝑆𝑐
351
+ 𝑇 −ℎℓ−1 = 𝑂(ℎℓ),
352
+ 𝜕 �𝑃
353
+ 𝜕�𝑆
354
+ = 𝑂(ℎ−1/2
355
+
356
+ )
357
+ =⇒
358
+ �𝑃ℓ − �𝑃ℓ−1 = 𝑂(ℎ1/2
359
+ ℓ ),
360
+ so 𝑉ℓ ≈ 𝑂(ℎ1/2
361
+
362
+ × (ℎ1/2
363
+ ℓ )2) = 𝑂(ℎ3/2
364
+ ℓ ). In addition, the kurtosis is improved to
365
+ 𝑂(ℎ−1/2
366
+
367
+ ).
368
+ Unfortunately, the conditional expectation approach does not help when the Euler-
369
+ Maruyama discretisation is used for the entire path since �𝑆 𝑓
370
+ 𝑇 −ℎℓ−1−�𝑆𝑐
371
+ 𝑇 −ℎℓ−1 = 𝑂(ℎ1/2
372
+ ℓ )
373
+ and so �𝑃ℓ − �𝑃ℓ−1 = 𝑂(1)
374
+ The use of this kind of conditional expectation is a standard technique for smooth-
375
+ ing the payoff to enable IPA/pathwise sensitivity calculations [24]. Another example
376
+ is a down-and-out barrier option, where the option is knocked out if the path drops
377
+ below a certain value. In this case the payoff can be smoothed by computing the
378
+ probability of this happening, conditional on the computed path approximations at
379
+ discrete timesteps [24]. Again, this works well for MLMC when using the first or-
380
+ der Milstein discretisation [12, 17], but it does not help with the Euler-Maruyama
381
+ discretisation.
382
+ A different kind of conditional expectation smoothing was introduced by Achtsis,
383
+ Cools & Nuyens [1] and Bayer, Siebenmorgen & Tempone [6] to improve the
384
+ convergence of QMC computations, and then used by Bayer, Ben Hammouda &
385
+ Tempone [5] to improve the MLMC variance for digital options.
386
+ In its simplest form, they split the random inputs for the numerical simulation into
387
+ a scalar 𝑍 and the remainder 𝑍𝑟, and express the desired MLMC level ℓ expectation
388
+ as
389
+ E[ �𝑃ℓ−�𝑃ℓ−1] = E
390
+
391
+ E[ �𝑃ℓ−�𝑃ℓ−1 | 𝑍𝑟]
392
+
393
+ and observe that in many financial applications it is possible to perform this split
394
+ in a way such that the conditional expectations E[ �𝑃ℓ | 𝑍𝑟], E[ �𝑃ℓ−1 | 𝑍𝑟] are smooth
395
+ functions of 𝑍𝑟, and can be evaluated analytically or very accurately by 1D numerical
396
+ quadrature when there is just a single discontinuity with respect to changes in 𝑍.
397
+
398
+ 8
399
+ Michael B. Giles
400
+ For a scalar SDE, 𝑍 could be the terminal value of the driving Brownian motion,
401
+ in which case 𝑍𝑟 would represent the other Normal random variables required for a
402
+ Brownian Bridge construction of the Brownian increments.
403
+ 5 Change of measure
404
+ Another approach to treating digital options using the Milstein discretisation is to
405
+ use a change of measure [9, 14], which has connections to the Likelihood Ratio
406
+ Method (LRM) that is used for sensitivity analysis [31].
407
+ For both the fine and coarse paths, we have conditional Gaussian distributions for
408
+ �𝑆𝑇 , with slightly different means and variances, as illustrated in Figure 2. We can
409
+ therefore perform a change of measure to the same Gaussian distribution with mean
410
+ 𝜇 and variance 𝜎2, also illustrated in Figure 2, and then pick the same sample �𝑆𝑇
411
+ for both paths from this common Gaussian distribution.
412
+ The resulting MLMC estimator is
413
+ �𝑌ℓ = 𝑓 (�𝑆𝑇 ) (𝑅ℓ − 𝑅ℓ−1)
414
+ where 𝑅ℓ, 𝑅ℓ−1 are the respective Radon-Nikodym derivatives for the fine and coarse
415
+ paths. For the scalar SDE (1), 𝑅ℓ is
416
+ 𝑅ℓ =
417
+ 𝜎
418
+ 𝑏(�𝑆 𝑓
419
+ 𝑇 −ℎℓ)√ℎℓ
420
+ exp
421
+
422
+ − (�𝑆𝑇 − �𝑆 𝑓
423
+ 𝑇 −ℎℓ − 𝑎(�𝑆 𝑓
424
+ 𝑇 −ℎℓ) ℎℓ)2 / (2 𝑏2(�𝑆 𝑓
425
+ 𝑇 −ℎℓ) ℎℓ)
426
+
427
+ exp
428
+
429
+ − (�𝑆𝑇 −𝜇)2 / (2𝜎2)
430
+
431
+ and 𝑅ℓ−1 is defined similarly. It can be shown that the difference 𝑅ℓ − 𝑅ℓ−1 is
432
+ approximately 𝑂(ℎ1/2
433
+ ℓ ), which implies that 𝑉ℓ ≈ 𝑂(ℎℓ). To improve the variance we
434
+ note that the conditional expected value of Radon-Nikodym derivatives is always 1,
435
+ 0.6
436
+ 0.8
437
+ 1
438
+ 1.2
439
+ 1.4
440
+ ST
441
+ 0
442
+ 0.1
443
+ 0.2
444
+ 0.3
445
+ 0.4
446
+ p(ST)
447
+ Fig. 2 Coarse and fine path conditional Gaussian distributions, plus third common distribution
448
+
449
+ MLMC techniques for discontinuous functions
450
+ 9
451
+ 0
452
+ 0.2
453
+ 0.4
454
+ 0.6
455
+ 0.8
456
+ 1
457
+ 1.2
458
+ t
459
+ 1
460
+ 1.5
461
+ 2
462
+ S
463
+ Fig. 3 Illustration of coarse and fine jump-diffusion paths with jumps before and after 𝑇 = 1.
464
+ i.e. E[𝑅ℓ | �𝑆 𝑓
465
+ 𝑇 −ℎℓ] = E[𝑅ℓ−1 | �𝑆𝑐
466
+ 𝑇 −ℎℓ−1, Δ𝑊𝑁 −1] = 1, and therefore we can change
467
+ the definition of �𝑌ℓ to
468
+ �𝑌ℓ =
469
+
470
+ 𝑓 (�𝑆𝑇 ) − 𝑓 (𝜇)
471
+
472
+ (𝑅ℓ − 𝑅ℓ−1)
473
+ without changing its expected value. This estimator is now non-zero only when �𝑆𝑇
474
+ and 𝜇 are on opposite sides of the strike 𝐾, which occurs for an 𝑂(ℎ1/2
475
+ ℓ ) fraction of
476
+ coarse/fine paths. Hence the new MLMC variance 𝑉ℓ is approximately 𝑂(ℎ3/2
477
+ ℓ ), as
478
+ with the use of the analytic conditional expectation.
479
+ The benefit of this approach is that it works well in multiple dimensions when it is
480
+ often not possible to evaluate the analytic conditional expectation [9, 14]. However,
481
+ again it does not help with the full path Euler-Maruyama discretisation because that
482
+ gives 𝑅ℓ − 𝑅ℓ−1 = 𝑂(1).
483
+ An earlier use of a change of measure in an MLMC computation was by Xia
484
+ [33, 34] for a Merton-style jump-diffusion SDE with a path-dependent jump rate
485
+ 𝜆(𝑆, 𝑡). The challenge in this application, as illustrated in Figure 3, is that the
486
+ coarse and fine paths will jump at different times, and one might jump just before
487
+ the final time 𝑇, and the other just after, leading to a large jump in the computed
488
+ value of 𝑓 (𝑆𝑇 ). The path-dependent jump rate was treated by using the thinning
489
+ technique of Glasserman & Merener [25], over-sampling possible jump times using
490
+ a uniform rate 𝜆𝑠𝑢𝑝 > 𝜆(𝑆, 𝑡) and then using an acceptance/rejection step to select
491
+ the real jump times. Xia modified this with a change of measure to ensure the same
492
+ acceptance/rejection decision for both the fine and coarse paths so that they both
493
+ jump at the same time. This leads to an estimator of the form
494
+ �𝑌ℓ = �𝑃ℓ 𝑅ℓ − �𝑃ℓ−1 𝑅ℓ−1.
495
+
496
+ 10
497
+ Michael B. Giles
498
+ When combined with a first order Milstein discretisation of the SDE between the
499
+ jump times, this gives 𝑉ℓ = 𝑂(ℎ2
500
+ ℓ) for Lipschitz payoff functions such as a standard
501
+ put or call option [33, 34].
502
+ 6 Splitting
503
+ Returning to the challenge of digital options arising from the solution of an SDE,
504
+ a third approach is to use path-splitting to generate an unbiased estimate of the
505
+ conditional expectation introduced in Section 4 [14].
506
+ This is a variant of the general splitting technique [3]. As illustrated in Figure 4,
507
+ it involves performing a standard fine path simulation up until one timestep before
508
+ the final time 𝑇, and then performing multiple independent simulations of the final
509
+ timestep, averaging the payoff for each of these to get an approximation of the
510
+ conditional expectation. The same is done for the coarse path except that each of the
511
+ splits uses the same Δ𝑊𝑁 −1 that was used for the second to last fine path timestep.
512
+ Since the computational cost of the path up to the splitting time is 𝑂(ℎ−1
513
+ ℓ ), it means
514
+ that up to 𝑂(ℎ−1
515
+ ℓ ) splits can be used without increasing the path cost significantly. If
516
+ 𝑀ℓ splits are used, then the standard splitting variance analysis gives
517
+ V[�𝑌ℓ] = V
518
+
519
+ E[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
520
+
521
+ + 𝑀−1
522
+ ℓ E
523
+
524
+ V[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
525
+
526
+ .
527
+ As discussed previously V
528
+
529
+ E[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
530
+
531
+ = 𝑂(ℎ3/2
532
+ ℓ ), and similarly it
533
+ can be argued that E
534
+
535
+ V[ �𝑃ℓ−�𝑃ℓ−1 | {Δ𝑊𝑛}𝑛<𝑁 ]
536
+
537
+ = 𝑂(ℎℓ). Therefore choosing 𝑀ℓ
538
+ to lie between 𝑂(ℎ−1
539
+ ℓ ) and 𝑂(ℎ−1/2
540
+
541
+ ) ensures the benefits of the splitting are obtained
542
+ without significantly increasing the computational cost per sample.
543
+ 0
544
+ 0.2
545
+ 0.4
546
+ 0.6
547
+ 0.8
548
+ 1
549
+ t
550
+ 0.8
551
+ 1
552
+ 1.2
553
+ 1.4
554
+ 1.6
555
+ 1.8
556
+ St
557
+ Fig. 4 Path splitting in final timestep to estimate conditional expectation
558
+
559
+ MLMC techniques for discontinuous functions
560
+ 11
561
+ As an additional bonus, one can use the more accurate Milstein discretisation
562
+ for the final timestep, instead of switching to the Euler-Maruyama discretisation.
563
+ Burgos [9, 10] gives more details of the analysis, and also used the same approach
564
+ for pathwise sensitivity analysis for a variety of financial options.
565
+ Giles & Bernal [16] also used splitting for Feynman-Kac functionals arising for
566
+ stopped diffusions, SDE simulations which terminate when the solution path leaves
567
+ a prescribed domain. The issue here is that when a fine path exits, there is an 𝑂(ℎ1/2
568
+ ℓ )
569
+ probability that the corresponding coarse path does not leave until much later. This
570
+ is addressed by estimating a conditional expectation by splitting the coarse path into
571
+ 𝑂(ℎ−1/2
572
+
573
+ ) independent sub-simulations which continue until each of them leaves the
574
+ domain. 𝑉ℓ is improved from 𝑂(ℎ1/2
575
+ ℓ ) to approximately 𝑂(ℎℓ) without a significant
576
+ increase in the cost per sample, and finally the MLMC complexity achieved is
577
+ 𝑂(𝜀−2| log 𝜀|3).
578
+ None of the three methods introduced so far (conditional expectation, change of
579
+ measure, splitting) helps when using the Euler-Maruyama discretisation. For this, a
580
+ new method has recently been developed by Giles & Haji-Ali [20].
581
+ It again uses splitting, but inspired by the simulation of branching diffusions, it
582
+ considers splits at multiple deterministic times, as illustrated in Figure 5 which shows
583
+ the logical structure of a set of split paths. Here we are considering a simulation
584
+ on the unit time interval. A single pair of fine/coarse paths is calculated up to time
585
+ 𝑡 = 1/2, with the number of fine timesteps being 1
586
+ 2 ℎ−1
587
+ ℓ . This simulation is then
588
+ split into two separate independent simulations up to time 𝑡 = 3/4, with the two
589
+ simulations between them accounting for an additional 1
590
+ 2 ℎ−1
591
+
592
+ fine timesteps. There
593
+ are further splits at 𝑡 = 3/4, then at 𝑡 = 7/8, and so on, with the final split when there
594
+ is just one coarse timestep left.
595
+ The total number of fine timesteps simulated is 𝑂(ℎ−1
596
+ ℓ | log ℎℓ|) so the computa-
597
+ tional cost is only slightly increased compared to the original method with a single
598
+ pair of fine/coarse paths. �𝑌ℓ is defined to be the average of the values �𝑃ℓ−�𝑃ℓ−1 for
599
+ each of the final paths, and it can be proved that its variance is 𝑂(ℎℓ), the same
600
+ 0
601
+ 0.2
602
+ 0.4
603
+ 0.6
604
+ 0.8
605
+ 1
606
+ t
607
+ -0.3
608
+ -0.2
609
+ -0.1
610
+ 0
611
+ 0.1
612
+ 0.2
613
+ Fig. 5 Repeated path splitting to estimate conditional expectation
614
+
615
+ 12
616
+ Michael B. Giles
617
+ asymptotic order of convergence as for Lipschitz payoff functions [20]. The kurtosis
618
+ is also improved, so this technique fully addresses the challenge of using MLMC
619
+ with the Euler-Maruyama discretisation to estimate digital option values.
620
+ 7 Adaptive sampling
621
+ We return now to the challenge of estimating the nested expectation E [ 𝐻 (E[𝑍|𝑋]) ]
622
+ and we note that we only need an accurate estimate of the inner conditional expecta-
623
+ tion E[𝑍|𝑋] when it is near zero. This observation is the basis for the development
624
+ of adaptive sampling by Broadie, Du & Moallemi [7] within a standard Monte Carlo
625
+ procedure. This was then extended to adaptive sampling combined with MLMC by
626
+ Giles & Haji-Ali [19] by defining the number of inner samples 𝑀ℓ on level ℓ to be
627
+
628
+ 𝑀ℓ = 2ℓ𝑀0 inner samples when |E[𝑍|𝑋]| ≫
629
+ √︁
630
+ V[𝑍|𝑋]/(2ℓ𝑀0)
631
+ This is the smallest number of samples used on level ℓ.
632
+ √︁
633
+ V[𝑍|𝑋]/(2ℓ𝑀0) is
634
+ the standard deviation of the Monte Carlo estimate for E[𝑍|𝑋], so the inequality
635
+ means that this number of samples is sufficient to be very sure that the estimate
636
+ has the correct sign.
637
+
638
+ 𝑀ℓ = 4ℓ𝑀0 inner samples when |E[𝑍|𝑋]| = 𝑂(
639
+ √︁
640
+ V[𝑍|𝑋]/(4ℓ𝑀0))
641
+ This is the maximum number of samples used on level ℓ. In this case, the estimate
642
+ of E[𝑍|𝑋] may have the incorrect sign, but this will only happen when |E[𝑍|𝑋]| =
643
+ 𝑂(2−ℓ) which occurs with probability 𝑂(2−ℓ). Likewise, the total cost of the
644
+ higher number of samples in this region is 𝑂(2−ℓ × 4ℓ) = 𝑂(2ℓ), so it does not
645
+ significantly increase the overall average cost.
646
+
647
+ 2ℓ𝑀0 < 𝑀ℓ < 4ℓ𝑀0 for intermediate values
648
+ In this region the number of samples is chosen to be very sure that the estimate
649
+ of E[𝑍|𝑋] has the correct sign, and at the same time the total cost is 𝑂(2ℓ).
650
+ Overall, this adaptive sampling approach leads to 𝐶ℓ ∼ 2ℓ, 𝑉ℓ ∼ 2−ℓ and hence
651
+ a complexity of roughly 𝑂(𝜀−2) [19]. However, the kurtosis is 𝑂(2ℓ) since only an
652
+ 𝑂(2−ℓ) fraction of the outer samples give non-zero values for �𝑌ℓ.
653
+ Haji-Ali, Spence & Teckentrup [27] have further extended this to estimate quan-
654
+ tities of the form
655
+ P[𝐺 ∈ Ω] ≡ E[1𝐺∈Ω]
656
+ where 𝐺 is a 𝑑-dimensional random variable which cannot be sampled directly.
657
+ In their paper they consider in particular the two challenges in this article. In the
658
+ context of the digital option with the Euler-Maruyama discretisation on the unit time
659
+ interval, the adaptive sampling varies the timestep used on level ℓ so that
660
+
661
+ ℎℓ = 2−ℓ when |�𝑆ℓ − 𝐾| is large compared to the strong error in the path approx-
662
+ imation
663
+
664
+ ℎℓ = 4−ℓ when |�𝑆ℓ − 𝐾| is of the same order as the strong error
665
+
666
+ MLMC techniques for discontinuous functions
667
+ 13
668
+
669
+ 2−ℓ < ℎℓ < 4−ℓ for intermediate values
670
+ A Brownian bridge construction is used when the timestep needs to be refined as
671
+ part of the adaptation procedure from its initial value ℎℓ = 2−ℓ. The adaptation again
672
+ leads to 𝐶ℓ ∼ 2ℓ, 𝑉ℓ ∼ 2−ℓ and hence a complexity of roughly 𝑂(𝜀−2), but there is
673
+ again a high kurtosis [27].
674
+ In earlier research, Elfverson, Hellman & Malqvist [11] considered estimation of
675
+ E[𝐻(𝑋)] where 𝑋 cannot be sampled exactly but there is a sequence of approxi-
676
+ mations 𝑋′
677
+ 0, 𝑋′
678
+ 1, 𝑋′
679
+ 2, . . . 𝑋 of increasing accuracy and increasing cost. Motivated by
680
+ PDE applications with a well-behaved truncation error so that there are uniform
681
+ geometric bounds on |𝑋′
682
+ 𝑗 − 𝑋|, level ℓ in their method uses
683
+ �𝑋ℓ = 𝑋′
684
+ 𝑗,
685
+ 𝑗 = min{ℓ, min 𝑗 : | �𝑋′
686
+ 𝑗 − 𝑋| < |𝑋|}
687
+ and achieves similarly good MLMC benefits. This idea is essentially the same as in
688
+ the work of Haji-Ali et al but requiring a uniform bound on |𝑋′
689
+ 𝑗−𝑋| is significantly
690
+ more restrictive than the bounds on E[ |𝑋′
691
+ 𝑗−𝑋|𝑞] for some 𝑞>2 required by Haji-Ali
692
+ et al.
693
+ A final comment is that the analysis of Haji-Ali, Spence & Teckentrup can be gen-
694
+ eralised to a product of an indicator function and a Lipschitz function, E[1𝐺∈Ω 𝑓 (𝑆)],
695
+ and so can handle barrier options. Furthermore, Haji-Ali & Spence have extended
696
+ the adaptive sampling methodology to an extremely challenging triply-nested expec-
697
+ tation which arises in mathematical finance [26]. By incorporating the randomised
698
+ MLMC treatment of Rhee & Glynn [32] to handle the time discretisation of the
699
+ underlying SDEs as well as the sampling for the inner conditional expectations, they
700
+ achieve an overall complexity of approximately 𝑂(𝜀−2) which is very impressive for
701
+ such a difficult application.
702
+ -10
703
+ -5
704
+ 0
705
+ 5
706
+ 10
707
+ E[Z|X]
708
+ 0
709
+ 0.5
710
+ 1
711
+ 1.5
712
+ 2
713
+ 2.5
714
+ Fig. 6 Error distributions for two conditional expectations with i) few samples being needed to
715
+ ensure the correct sign (left), and ii) many samples being insufficient to ensure the correct sign
716
+ (centre). The blue line represents the Heaviside step function.
717
+
718
+ 14
719
+ Michael B. Giles
720
+ 8 Conclusions
721
+ It is worth repeating that in most MLMC applications the output quantity of interest
722
+ is a Lipschitz function of the intermediate simulation quantities, so good strong
723
+ convergence for the intermediate quantities leads automatically to a good rate of
724
+ convergence of the MLMC variance 𝑉ℓ.
725
+ For those applications in which the function is discontinuous, this article shows
726
+ there is an extensive literature with a variety of different approaches to improve the
727
+ MLMC variance and try to recover the optimal 𝑂(𝜀−2) complexity. It is notable that
728
+ many of these methods have adapted ideas from Monte Carlo sensitivity analysis
729
+ which also has problems with discontinuous functionals. It is hoped that this survey
730
+ will assist future researchers facing similar challenges in other new application areas.
731
+ Acknowledgements This paper is based on research with many students, postdocs and other
732
+ collaborators and I am grateful to all of them. Funding for the research has been provided by the UK
733
+ Engineering and Physical Sciences Research Council through grants EP/E031455/1, EP/H05183X/1
734
+ and EP/P020720/2 as well as the Hong Kong Innovation and Technology Commission (InnoHK
735
+ Project CIMDA). The paper was written while visiting the Oden Institute at UT Austin, and I thank
736
+ my hosts for their warm hospitality.
737
+ References
738
+ 1. N. Achtsis, R. Cools, and D. Nuyens. Conditional sampling for barrier option pricing under
739
+ the LT method. SIAM Journal on Financial Mathematics, 4:327–352, 2013.
740
+ 2. M. Altmayer and A. Neuenkirch. Multilevel Monte Carlo quadrature of discontinuous payoffs
741
+ in the generalized Heston model using Malliavin integration by parts.
742
+ SIAM Journal on
743
+ Financial Mathematics, 6(1):22–52, 2015.
744
+ 3. S. Asmussen and P.W. Glynn. Stochastic Simulation. Springer, New York, 2007.
745
+ 4. R. Avikainen. On irregular functionals of SDEs and the Euler scheme. Finance and Stochastics,
746
+ 13(3):381–401, 2009.
747
+ 5. C. Bayer, C. Ben Hammouda, and R. Tempone.
748
+ Multilevel Monte Carlo combined with
749
+ numerical smoothing for robust and efficient option pricing and density estimation. ArXiv
750
+ preprint: 2003.05708, 2020.
751
+ 6. C. Bayer, M. Siebenmorgen, and R. Tempone. Smoothing the payoff for efficient computation
752
+ of basket option prices. Quantitative Finance, 18(3):491–505, 2018.
753
+ 7. M. Broadie, Y. Du, and C.C. Moallemi. Efficient risk estimation via nested sequential simula-
754
+ tion. Management Science, 57(6):1172–1194, 2011.
755
+ 8. K. Bujok, B. Hambly, and C. Reisinger. Multilevel simulation of functionals of Bernoulli
756
+ random variables with application to basket credit derivatives. Methodology and Computing
757
+ in Applied Probability, 17(3):579–604, 2015.
758
+ 9. S. Burgos. The computation of Greeks with multilevel Monte Carlo. DPhil thesis, University
759
+ of Oxford, 2014.
760
+ 10. S. Burgos and M.B. Giles. Computing Greeks using multilevel path simulation. In L. Plaskota
761
+ and H. Woźniakowski, editors, Monte Carlo and Quasi-Monte Carlo Methods 2010, pages
762
+ 281–296. Springer, 2012.
763
+ 11. D. Elfverson, F. Hellman, and A. Målqvist. A multilevel Monte Carlo method for computing
764
+ failure probabilities. SIAM/ASA Journal on Uncertainty Quantification, 4(1):312–330, 2016.
765
+
766
+ MLMC techniques for discontinuous functions
767
+ 15
768
+ 12. M.B. Giles. Improved multilevel Monte Carlo convergence using the Milstein scheme. In
769
+ A. Keller, S. Heinrich, and H. Niederreiter, editors, Monte Carlo and Quasi-Monte Carlo
770
+ Methods 2006, pages 343–358. Springer, 2008.
771
+ 13. M.B. Giles. Multilevel Monte Carlo path simulation. Operations Research, 56(3):607–617,
772
+ 2008.
773
+ 14. M.B. Giles. Multilevel Monte Carlo methods. Acta Numerica, 24:259–328, 2015.
774
+ 15. M.B. Giles. MLMC for nested expectations. In Contemporary Computational Mathematics -
775
+ A Celebration of the 80th Birthday of Ian Sloan. Springer, 2018.
776
+ 16. M.B. Giles and F. Bernal. Multilevel estimation of expected exit times and other functionals of
777
+ stopped diffusions. SIAM/ASA Journal on Uncertainty Quantification, 6(4):1454–1474, 2018.
778
+ 17. M.B. Giles, K. Debrabant, and A. Rößler. Analysis of multilevel Monte Carlo path simulation
779
+ using the Milstein discretisation. Discrete and Continuous Dynamical Systems - series B,
780
+ 24(8):3881–3903, 2019.
781
+ 18. M.B. Giles and T. Goda.
782
+ Decision-making under uncertainty: using MLMC for efficient
783
+ estimation of EVPPI. Statistics and Computing, 29(4):739–751, 2019.
784
+ 19. M.B. Giles and A.-L. Haji-Ali. Multilevel nested simulation for efficient risk estimation.
785
+ SIAM/ASA Journal on Uncertainty Quantification, 7(2):497–525, 2019.
786
+ 20. M.B. Giles and A.-L. Haji-Ali. Multilevel path branching for digital options. arXiv pre-print:
787
+ 2209.03017, 2022.
788
+ 21. M.B. Giles, D.J. Higham, and X. Mao. Analysing multilevel Monte Carlo for options with
789
+ non-globally Lipschitz payoff. Finance and Stochastics, 13(3):403–413, 2009.
790
+ 22. M.B. Giles, T. Nagapetyan, and K. Ritter. Multilevel Monte Carlo approximation of distribution
791
+ functions and densities. SIAM/ASA Journal on Uncertainty Quantification, 3(1):267–295,
792
+ 2015.
793
+ 23. M.B. Giles and L. Szpruch. Antithetic multilevel Monte Carlo estimation for multi-dimensional
794
+ SDEs without Lévy area simulation. Annals of Applied Probability, 24(4):1585–1620, 2014.
795
+ 24. P. Glasserman. Monte Carlo Methods in Financial Engineering. Springer, New York, 2004.
796
+ 25. P. Glasserman and N. Merener. Convergence of a discretization scheme for jump-diffusion
797
+ processes with state-dependent intensities. Proc. Royal Soc. London A, 460:111–127, 2004.
798
+ 26. A.-L. Haji-Ali and J. Spence. Efficient risk estimation for the credit valuation adjustment. in
799
+ preparation, 2022.
800
+ 27. A.-L. Haji-Ali, J. Spence, and A. Teckentrup. Adaptive multilevel Monte Carlo for probabilities.
801
+ SIAM Journal on Numerical Analysis, 60(4):2125–2149, 2022.
802
+ 28. P.E. Kloeden and E. Platen. Numerical Solution of Stochastic Differential Equations. Springer,
803
+ Berlin, 1992.
804
+ 29. S. Krumscheid and F. Nobile. Multilevel Monte Carlo approximation of functions. SIAM/ASA
805
+ Journal on Uncertainty Quantification, 6(3):1256–1293, 2018.
806
+ 30. P. L’Ecuyer. A unified view of the IPA, SF and LR gradient estimation techniques. Management
807
+ Science, 36(11):1364–1383, 1990.
808
+ 31. P. L’Ecuyer. On the interchange of derivative and expectation for likelihood ratio derivative
809
+ estimators. Management Science, 41(4):738–748, 1995.
810
+ 32. C.-H. Rhee and P.W. Glynn. Unbiased estimation with square root convergence for SDE
811
+ models. Operations Research, 63(5):1026–1043, 2015.
812
+ 33. Y. Xia. Multilevel Monte Carlo for jump processes. DPhil thesis, University of Oxford, 2014.
813
+ 34. Y. Xia and M.B. Giles. Multilevel path simulation for jump-diffusion SDEs. In L. Plaskota
814
+ and H. Woźniakowski, editors, Monte Carlo and Quasi-Monte Carlo Methods 2010, pages
815
+ 695–708. Springer, 2012.
816
+
CdE1T4oBgHgl3EQfDwOw/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ENE3T4oBgHgl3EQfVQoB/content/tmp_files/2301.04457v1.pdf.txt ADDED
@@ -0,0 +1,1631 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04457v1 [gr-qc] 11 Jan 2023
2
+ Ghost and Laplacian Instabilities in Teleparallel Horndeski Gravity
3
+ Salvatore Capozziello,1, 2, 3, ∗ Maria Caruana,4, 5, † Jackson Levi Said,4, 5, ‡ and Joseph Sultana6, §
4
+ 1Dipartimento di Fisica ”E. Pancini”, Universit`a degli Studi di Napoli,
5
+ ”Federico II”, Complesso Universitario Monte S. Angelo,
6
+ Via Cinthia 9 Edificio G, 80126 Napoli, Italy
7
+ 2Istituto Nazionale di Fisica Nucleare (INFN),
8
+ Sezione di Napoli Complesso Universitario Monte S. Angelo,
9
+ Via Cinthia 9 Edificio G, 80126 Napoli, Italy
10
+ 3Scuola Superiore Meridionale, Largo San Marcellino 10, 80138 Napoli, Italy
11
+ 4Institute of Space Sciences and Astronomy, University of Malta, Msida, Malta
12
+ 5Department of Physics, University of Malta, Msida, Malta
13
+ 6Department of Mathematics, University of Malta, Msida, Malta
14
+ Teleparallel geometry offers a platform on which to build up theories of gravity where torsion
15
+ rather than curvature mediates gravitational interaction. The teleparallel analogue of Horndeski
16
+ gravity is an approach to teleparallel geometry where scalar-tensor theories are considered in this
17
+ torsional framework. Being teleparallel gravity of lower order in dynamics, this turns out to be more
18
+ general than metric Horndeski gravity. In other words, the class of teleparallel Horndeski gravity
19
+ models is much broader than the standard metric one. In this work, we explore constraints on this
20
+ wide range of models coming from ghost and Laplacian instabilities. The aim is to limit pathological
21
+ branches of the theory by fundamental considerations. It is possible to conclude that a very large
22
+ class of models results physically viable.
23
+ I.
24
+ INTRODUCTION
25
+ General relativity (GR) has been the gravitational foundation of cosmology for over a century. Its latest
26
+ embodiment appears in a picture wherein the evolutionary processes of the Universe are described in the
27
+ framework of the so-called ΛCDM model [1, 2]. Supported by overwhelming observational evidences, this
28
+ model describes a Universe started with a big bang, then driven through an inflationary phase and other well
29
+ known epochs to eventually produce an accelerating Universe at late-times [3, 4]. In the ΛCDM model, the
30
+ late time acceleration expansion is driven by the cosmological constant or some form of dark energy. Despite
31
+ a lot of foundational works, internal consistency issues persist in this respect [5–7]. Recently, observational
32
+ challenges to the standard model has arisen in the form of cosmological tensions with statistically significant
33
+ differences between predictions of expansion from early time data [8–10] and measurements from late time
34
+ [11, 12]. These tensions continue to increase with new survey data [13–15], and may permeate into other
35
+ sectors of cosmology besides expansion [16–18]. This situation leads to take into account potential alternatives
36
+ to the standard cosmological ΛCDM model in the context of possible modifications to the gravitational sector.
37
+ A solution to the problem of cosmic tensions, as well as of other longstanding issues, can be offered by
38
+ alternative theories of gravity, in particular by scalar-tensor gravity. Scalar fields improve GR in view of Mach
39
+ principle and could naturally address several issues in cosmology and astrophysics like inflation, dark matter
40
+ and dark energy [19]. The most general scalar-tensor theory of gravity, where scalar fields are minimally and
41
+ non-minimally coupled to curvature, is the so-called Horndeski gravity [20]. It is the most general theory
42
+ of gravity producing second order field equations. This is advantageous because nature appears to produce,
43
+ generally, second order equations of motion. Furthermore, higher order theories can produce Ostrogradsky
44
+ instabilities making second order theories more attractive from a fundamental perspective [21–23]. Horndeski
45
+ gravity is formulated by four free functions of the scalar field and its kinetic term [24, 25]. This offers a
46
+ rich phenomenology on which to produce dark energy models but also dark matter and inflation. However,
47
+ recent multimessenger observations by the LIGO collaboration, in the gravitational event GW170817 [26], and
48
+ measurements of the companion electromagnetic counterpart, namely GRB170817A [27], has placed stringent
49
+ constraints on the speed of propagation of gravitational waves (GW) to within deviations of at most one part
50
51
52
53
54
+
55
+ 2
56
+ in 1015. Considering these constraints, many branches of Horndeski gravity have been disqualified in regular
57
+ curvature-based gravity [28–30]. However, Horndeski gravity has a number of interesting generalizations
58
+ [31] where higher order terms, avoiding the Ostrogradsky instabilities, can be incorporated into the theory.
59
+ Another possibility is to reconsider the geometric foundations of curvature on which Horndeski gravity is
60
+ built. Curvature can be expressed through the Levi-Civita connection
61
+ ◦Γ
62
+ λ
63
+ µν obtained from the metric [1].
64
+ Here an over-circle represents quantities determined by the Levi-Civita connection.
65
+ In teleparallel gravity (TG), the teleparallel connection (Γλ
66
+ µν) replaces the Levi-Civita connection and so
67
+ dynamics of gravity is replaced from curvature to torsion [32–35]. The teleparallel connection is curvatureless
68
+ and satisfies metricity. For this reason, the teleparallel Ricci scalar turns out to identically vanish, i.e. R = 0
69
+ (this is not to say that the standard Ricci scalar is zero, being, in general,
70
+ ◦R ̸= 0). On the other hand, TG
71
+ naturally produces a torsion scalar (T ) [33], which turns out to be equal to the curvature-based Ricci scalar
72
+ up to a boundary term (B). For this reason, the linear torsion scalar produces the Teleparallel equivalent of
73
+ General Relativity (TEGR) which is dynamically equivalent to GR in the classical regime. This distinction
74
+ between the torsion scalar, producing second order terms in the equations of motion, and the boundary
75
+ term, producing fourth order terms in the equations of motion (when the boundary term is nonlinear in the
76
+ action), gives rise to a much richer landscape of theories on which to build cosmological models, if compared
77
+ with the standard Einstein-Hilbert action.
78
+ Another way to conceptualize this feature is through the teleparallel analogue of the Lovelock theorem
79
+ [36–38] which produces a much wider range of actions with second order field equations. Equivalences and
80
+ differences of these representations are discussed in Ref. [39].
81
+ Similar to GR, TEGR features many modifications such as f(T ) gravity [34, 40–46] which is generically
82
+ second order in nature, as well as f(T, B) gravity [47–55] which now features fourth order contributions
83
+ similar to f(
84
+ ◦R) gravity [19, 56–62]. There have also been various formulations of scalar–tensor gravity. See,
85
+ e.g. Refs.[63–65].
86
+ Equipped with the TG formalism, one can consider the teleparallel analogue of Horndeski gravity [38] where
87
+ the generically lower order nature of TG turns out to produce a much richer structure to be developed. This
88
+ feature directly comes from the teleparallel analogue of the Lovelock theorem. This larger framework of
89
+ models means that there are many more classes of theories that now satisfy the speed of GWs constraint
90
+ [66, 67] as required from the above mentioned multimessenger analysis [68].
91
+ This class of gravitational
92
+ models also satisfies the parameterized post-Newtonian observational constraints [69] for a large number of
93
+ models. The teleparallel analogue of Horndeski gravity also produces a number of interesting cosmologies
94
+ such as those which are well-tempered [70, 71], as well as those that are derived from Noether symmetry
95
+ considerations [72–76]. In this way, all models that were previously disqualified in regular Horndeski may be
96
+ revived in this new formalism based on TG.
97
+ In this work, we perform a stability analysis of the teleparallel analogue of Horndeski gravity through
98
+ considerations on a Minkowski spacetime background. The Minkowski background is an ideal arena to probe
99
+ the fundamental behavior of theories with large classes of models since any astrophysical or cosmological
100
+ setting must first be stable on a Minkowski spacetime. In our analysis, we consider both background and
101
+ leading order perturbations in the context of a scalar-vector-tensor decomposition. This is important to fully
102
+ decompose any potentially problematic part of the theory in detail. In the TG setting, this is more intricate
103
+ since the metric tensor (gµν) is replaced as the fundamental dynamical variable of the field equations with
104
+ the tetrad (eA
105
+ µ) and the spin connection (ωA
106
+ Bµ), which are discussed in detail later on. In all cases, we
107
+ focus our study on the ghost and gradient instabilities, which can wreak havoc on gravitational models since
108
+ this may, respectively, produce scalar field kinetic terms with the wrong sign and unbounded propagation
109
+ speeds of particular perturbations, which can lead to unphysical models.
110
+ The structure of the manuscript is the following: in Sec. II, we summarize TG and its teleparallel analogue
111
+ of Horndeski gravity; this then leads to the Minkowski background equations of motion in Sec. III. Scalar–
112
+ vector–tensor perturbations are discussed in Sec. IV. From these perturbations, we are able to explore
113
+ potential instabilities in Sec. V where our main results are reported. Discussion and conclusions are drawn
114
+ in Sec. VI. In this work, we use geometric units and the signature (−, +, +, +).
115
+
116
+ 3
117
+ II.
118
+ TELEPARALLEL HORNDESKI GRAVITY
119
+ GR, a curvature-based theory, is constructed on torsionless Levi-Civita connection
120
+ ◦Γλ
121
+ µν, where, as said
122
+ above, the overhead circle (◦) represents quantities built with this connection.
123
+ This leads to numerous
124
+ theories of gravity beyond GR as the gravitational field can be expressed through the Riemann tensor and
125
+ its contractions such as the Ricci tensor and the Riemann scalar [59], the latter produces the Einstein-
126
+ Hilbert action [1]. On the other hand, TG incorporates the teleparallel connection, dubbed as teleparallel
127
+ connection Γλ
128
+ µν, leading to a theory satisfying the curvature-less and metricity conditions [32–35], resulting
129
+ in a torsionful theory. Later in this section, it will be shown that even though the Ricci scalar R vanishes,
130
+ due to the symmetry of the connection, the curvature-ful connection gives a non-zero value for the Riemann
131
+ tensor. Hence, the Ricci scalar
132
+ ◦R can be defined through teleparallel quantities.
133
+ The fundamental dynamical object of GR is the metric tensor gµν, but within TG, the metric is expressed
134
+ through the tetrad eA
135
+ µ, which acts as a transformation between the local and general manifold spaces. The
136
+ tetrad and the inertial spin connection ωB
137
+ Cν become the fundamental objects [33] while creating a link
138
+ between the general manifold denoted through Greek indices to the local Minkowski manifold denoted by
139
+ Latin indices. Thus, the relationship between Minkowski and general spacetimes is given by [77]
140
+ gµν = ηAB eA
141
+ µ eB
142
+ ν ,
143
+ ηAB = gµν E
144
+ µ
145
+ A E
146
+ ν
147
+ B ,
148
+ (1)
149
+ where E
150
+ µ
151
+ A
152
+ is the inverse tetrad which satisfies orthogonality conditions
153
+ eA
154
+ µ E
155
+ µ
156
+ B
157
+ = δA
158
+ B ,
159
+ eA
160
+ µ E
161
+ ν
162
+ A
163
+ = δν
164
+ µ .
165
+ (2)
166
+ The teleparallel connection is defined through the TG variables as [34, 35]
167
+ Γλ
168
+ µν = E
169
+ λ
170
+ A
171
+
172
+ ∂νeA
173
+ µ + ωA
174
+ BνeB
175
+ µ
176
+
177
+ .
178
+ (3)
179
+ Note, the quantities without an overhead circle will correspond to those objects that are related to teleparallel
180
+ gravity or calculated on its connection. The condition
181
+ ∂[µωA
182
+ |B|ν] + ωA
183
+ C[µωC
184
+ |B|ν] ≡ 0 ,
185
+ (4)
186
+ results in a flat spin connection [32], where square brackets denote the antisymmetric operator, and can
187
+ equivalently be used to determine the components of the spin connection. The local Lorentz transformation
188
+ (LLT), wherein ΛA
189
+ B represents Lorentz boosts and rotations, is used to define the spin connection ωA
190
+ Bµ =
191
+ ΛA
192
+ C ∂µΛ
193
+ C
194
+ B
195
+ [33]. It plays a role in the field equations since an infinite number of tetrad choices could satisfy
196
+ Eq. (1) for a particular metric, thus the spin connection is used to counterbalance inertial effects. This
197
+ ensures the theory, in this case TG, remains covariant [78]. Moreover, there exists a Lorentz frame such that
198
+ the spin connection is set to zero. It is referred to as the Weitzenb¨ock gauge [35, 79]. Hence, from this point
199
+ onwards, the spin connection will be dropped following the application of the aforementioned gauge.
200
+ Similar to how the Riemann tensor, constructed on the Levi-Civita connection, is associated to the cur-
201
+ vature property of GR, the analogy of this for TG is the torsion tensor defined by the teleparallel connec-
202
+ tion [35, 80]
203
+ T A
204
+ µν = ΓA
205
+ νµ − ΓA
206
+ µν .
207
+ (5)
208
+ While curvature in GR is defined as a deformation of spacetime, the torsion tensor in TG represents the
209
+ field strength of gravitation that transforms covariantly under LLTs and diffeomorphisms [78]. Another
210
+ important aspect of TG is that the torsion tensor can be decomposed in irreducible parts [81–83], namely
211
+ aµ = 1
212
+ 6ǫµνλρ T νλρ ,
213
+ (6)
214
+ vµ = T λ
215
+ λν ,
216
+ (7)
217
+ tλµν = 1
218
+ 2(Tλµν + Tµλν) + 1
219
+ 6(gνλvµ + gνµvλ) − 1
220
+ 3gλµvν ,
221
+ (8)
222
+
223
+ 4
224
+ giving the axial, vectorial and tensorial pieces, respectively, and ǫABCD being the four-dimensional Levi-
225
+ Civita tensor. Hence, the respective scalar invariants are given by [47, 82]
226
+ Tax = aµaµ = − 1
227
+ 18Tλµν(T λµν − 2T µλν) ,
228
+ (9)
229
+ Tvec = vµvµ = T λ
230
+ λµT
231
+ ρµ
232
+ ρ
233
+ ,
234
+ (10)
235
+ Tten = tλµνtλµν = 1
236
+ 2Tλµν(T λµν + T µλν) − 1
237
+ 2T λ
238
+ λµT ρµ
239
+ ρ
240
+ ,
241
+ (11)
242
+ which, under parity transformation, are invariant scalars. On the other hand, terms such as P1 = vµaµ and
243
+ P2 = ǫµνσρtλµνtλ
244
+ ρσ are excluded due to parity-violation [38, 81]. The combination of the scalar invariants
245
+ leads to the torsion scalar
246
+ T = 3
247
+ 2Tax + 2
248
+ 3Tten − 2
249
+ 3Tvec = 1
250
+ 2
251
+
252
+ E
253
+ λ
254
+ A gρµE
255
+ ν
256
+ B
257
+ − 2E
258
+ ρ
259
+ B gλµE
260
+ ν
261
+ A + 1
262
+ 2ηABgµρgνλ
263
+
264
+ T A
265
+ µνT B
266
+ ρλ .
267
+ (12)
268
+ An identical result can be obtained through contraction between the torsion tensor and the superpotential
269
+ S
270
+ µν
271
+ A
272
+ which represents the potential relation of the gravitational energy-momentum tensor [80, 84, 85]:
273
+ S
274
+ µν
275
+ A
276
+ = 1
277
+ 2
278
+
279
+ Kµν
280
+ A − E
281
+ ν
282
+ A T αµ
283
+ α + E
284
+ µ
285
+ A T αν
286
+ α
287
+
288
+ ,
289
+ (13)
290
+ where
291
+
292
+ µν = Γλ
293
+ µν −
294
+ ◦Γλ
295
+ µν = 1
296
+ 2
297
+
298
+ T
299
+ λ
300
+ µ ν + T
301
+ λ
302
+ ν µ − T λ
303
+ µν
304
+
305
+ (14)
306
+ is the contorsion tensor relating TG and GR. These quantities can be used to form the torsion scalar [34],
307
+ written as
308
+ T = S
309
+ µν
310
+ A
311
+ T A
312
+ µν ,
313
+ (15)
314
+ which can be shown to be equivalent to the result obtained in Eq. (12). The Ricci scalar dependent on
315
+ the teleparallel connection, which vanishes, can be related, using the contorsion tensor, to the regular Ricci
316
+ scalar. This results in a relationship between the Levi-Civita and the teleparallel connections defined Ricci
317
+ scalar [47, 77]
318
+ R =
319
+ ◦R + T − B = 0 ,
320
+ (16)
321
+ where B = 2
322
+ e∂µ(e T λ µ
323
+ λ ) = 2
324
+ ◦∇µT λ µ
325
+ λ
326
+ is a boundary term and e = det(eA
327
+ µ) = ���−g is the tetrad determinant.
328
+ Hence, the curvature-ful Ricci scalar is non-vanishing being
329
+ ◦R = −T + B .
330
+ (17)
331
+ The total divergence term found in B accounts for the fourth order derivative contributions to the field
332
+ equations in modified theories of gravity [47, 54]. This is embodied within the Ricci scalar in GR [57, 59].
333
+ Thus, the Teleparallel Equivalent of General Relativity (TEGR) [86, 87] is defined as the linear appearance
334
+ of the torsion scalar since both Lagrangians are equal up to a boundary term.
335
+ The equivalence principle in GR allows one to raise local Lorentz frames from a Minkowski metric to
336
+ a general metric tensor, and additionally, partial derivatives are raised to covariant derivatives defined by
337
+ the Levi-Civita connection [1]. This procedure, referred to as the minimal coupling prescription, if applied
338
+ within TG, is preserved for additional fields. Minkowski tetrads are raised to arbitrary ones and tangent
339
+ space partial derivatives are exchanged for covariant derivatives based on Levi-Civita connection [33, 88]
340
+ ∂µ →
341
+ ◦∇µ .
342
+ (18)
343
+ Thus, by having both gravitational and scalar fields well developed, it is possible to look at the teleparallel
344
+ analogue of Horndeski gravity, referred to at times as Bahamonde-Dialektopoulos-Levi Said (BDLS) the-
345
+ ory [38, 66, 69]. The construction of BDLS theory depends on the following criteria: (1) field equations are
346
+
347
+ 5
348
+ at most second order with respect to the tetrad and scalar; (2) as previously mentioned, scalar invariants do
349
+ not violate parity; (3) contractions of the torsion tensor are at most quadratic [38]. All of these requirements
350
+ allow for an adequate extension of the standard metric Horndeski gravity. Note that Lovelock’s theorem
351
+ states that Einstein fields equations are the only second-order field equations from a Lagrangian density
352
+ constructed through a four-dimensional metric. TG allows for the weakening of Lovelock [36, 37] theory as
353
+ an additional scalar field φ is introduced, giving rise to further terms in the gravitational action.
354
+ Starting off with the non-minimal coupling of scalar and torsion field, the linear contraction is given by [38]
355
+ I2 = vµ ◦∇µφ ,
356
+ (19)
357
+ being the scalar I1 = tλµν
358
+ ◦∇λφ
359
+ ◦∇µφ
360
+ ◦∇µφ = 0, due to the complete symmetry of the tensor decomposition,
361
+ Furthermore I3 = aλ
362
+ ◦∇λφ violates the parity condition due to an odd number of axial parts. Moreover, the
363
+ quadratic contractions of this nature are given by [38]
364
+ J1 = aµaν ◦∇µφ
365
+ ◦∇νφ ,
366
+ (20)
367
+ J3 = vλtλµν ◦∇µφ
368
+ ◦∇νφ ,
369
+ (21)
370
+ J5 = tλµνt α
371
+ λ ν
372
+ ◦∇µφ
373
+ ◦∇αφ ,
374
+ (22)
375
+ J6 = tλµνt αβ
376
+ λ
377
+ ◦∇µφ
378
+ ◦∇νφ
379
+ ◦∇αφ
380
+ ◦∇βφ ,
381
+ (23)
382
+ J8 = tλµνt
383
+ α
384
+ λµ
385
+ ◦∇νφ
386
+ ◦∇αφ ,
387
+ (24)
388
+ J10 = ǫµ
389
+ νλρaνtαρλ ◦∇µφ
390
+ ◦∇αφ ,
391
+ (25)
392
+ while other possibilities are eliminated as they have already been included:
393
+ J2 = vµvν ◦∇µφ
394
+ ◦∇νφ = I2
395
+ 2 ,
396
+ J4 = vµtλµν ◦∇λφ
397
+ ◦∇νφ = J3 ,
398
+ J7 = tλµνtαβ
399
+ λ
400
+ ◦∇µφ
401
+ ◦∇νφ
402
+ ◦∇αφ
403
+ ◦∇βφ = −2J6 ,
404
+ (26)
405
+ while J9 = tλµνtαβγ
406
+ ◦∇λφ
407
+ ◦∇µφ
408
+ ◦∇νφ
409
+ ◦∇αφ
410
+ ◦∇βφ
411
+ ◦∇γφ = 0 due to the total symmetry of the tensor irreducible part.
412
+ Hence, BDLS action is described by [38]
413
+ SBDLS =
414
+ 1
415
+ 2κ2
416
+
417
+ d4x e LTele +
418
+ 1
419
+ 2κ2
420
+ 5
421
+
422
+ i=2
423
+
424
+ d4x e Li +
425
+
426
+ d4x e Lm ,
427
+ (27)
428
+ where
429
+ LTele = GTele(φ, X, T, Tax, Tvec, I2, J1, J3.J5, J6, J8, J10) .
430
+ (28)
431
+ Here GTele is an arbitrary function, X := − 1
432
+ 2∂µφ∂µφ and
433
+ L2 := G2(φ, X) ,
434
+ (29)
435
+ L3 := −G3(φ, X)
436
+ ◦□φ ,
437
+ (30)
438
+ L4 := G4(φ, X)(−T + B) + G4,X(φ, X)[(
439
+ ◦□φ)2 −
440
+ ◦∇µ
441
+ ◦∇νφ
442
+ ◦∇µ ◦∇νφ] ,
443
+ (31)
444
+ L5 := G5(φ, X)
445
+ ◦Gµν
446
+ ◦∇µ
447
+ ◦∇νφ
448
+ − 1
449
+ 6G5,X(φ, X)[(
450
+ ◦□φ)3 + 2
451
+ ◦∇µ
452
+ ◦∇νφ
453
+ ◦∇ν
454
+ ◦∇αφ
455
+ ◦∇α
456
+ ◦∇µφ − 3
457
+ ◦∇µ
458
+ ◦∇νφ
459
+ ◦∇µ ◦∇νφ
460
+ ◦□φ] ,
461
+ (32)
462
+ which are identical to the standard metric Horndeski Lagrangians [20] but calculated using the tetrad.
463
+ Finally, Lm is the matter Lagrangian in Jordan conformal frame,
464
+ ◦Gµν is the Einstein tensor, and κ2 = 8πG
465
+ where G is the gravitational constant.
466
+ III.
467
+ MINKOWSKI BACKGROUND EQUATIONS IN TELEPARALLEL HORNDESKI GRAVITY
468
+ Let us explore now perturbations on a Minkowski background within the gravitational theory of teleparallel
469
+ analogue of Horndeski. Firstly, we tackle the background equations for a general flat Friedman–Lemaˆıtre–Robertson–Walker
470
+
471
+ 6
472
+ (FLRW) metric to obtain the necessary constraints. Then, this is followed by the analysis for perturbation
473
+ theory up to second order which is needed for our approach since we consider the Euler-Lagrange equations
474
+ to get the cosmological equations of motion.
475
+ The flat FLRW metric in Cartesian coordinates is given by
476
+ ds2 = −N(t)2dt2 + a(t)2(dx2 + dy2 + dx2) ,
477
+ (33)
478
+ where N(t) is the lapse function and a(t) is the scale factor. As previously mentioned, this follows the metric
479
+ signature that is mostly positive. The tetrad can be written in diagonal form as [35]
480
+ eA
481
+ µ = diag(N(t), a(t), a(t), a(t)) ,
482
+ (34)
483
+ which is compatible with the Weitzenb¨ock gauge giving a vanishing spin connection. Hence, the action in
484
+ Eq. (27) can be re-expressed in terms of these background quantities. Friedman equations are then obtained
485
+ by varying with respect to the lapse function and scale factor. Additionally, the scalar field Klein-Gordon
486
+ equation can be obtained by varying with respect to the scalar field [38].
487
+ Since we will be working in
488
+ Minkowski background, the limits N(t) → 1 and a(t) → 1 are taken. Hence, the constraints obtained from
489
+ the Friedman equation and scalar field variation in Minkowski background are given by
490
+ 0 = −G2 − GTele + 2XG2,X − 2XG3,φ + 2XGTele,X ,
491
+ (35)
492
+ 0 = G2 + GTele − 2XG3,φ + 4XG4,φφ + 2¨φG4,φ − 2X ¨φG3,X + 4X ¨φG4,φX − d
493
+ dt( ˙φGTele,I2) ,
494
+ (36)
495
+ 0 = G2,φ + GTele,φ − 2XG2,φX + 2XG3,φφ − 2XGTele,φX − G2,X ¨φ + 2G3,φ ¨φ − GTele,X ¨φ
496
+ − 2X ¨φGTele,X − 2X ¨φG2,XX + 2X ¨φG3,φX − 2X ¨φGTele,XX ,
497
+ (37)
498
+ where all scalar invariants are background quantities and comma ( , ) denotes partial derivative. Moreover,
499
+ the scalar field equation can also be expressed in terms of a Klein-Gordon equation as shown in Ref. [38].
500
+ IV.
501
+ SECOND ORDER PERTURBED ACTION WITH SCALAR-VECTOR-TENSOR
502
+ DECOMPOSITION
503
+ Here, we calculate the perturbed action up to second order terms which are necessary for the Euler-
504
+ Lagrange method to find the equations of motion of the system. By taking perturbations about a Minkowski
505
+ background for both tetrad and scalar field, we can build the action up to second order. The tetrad and
506
+ scalar perturbation are respectively given by
507
+ eA
508
+ µ → eA
509
+ µ + ǫ δeA
510
+ µ = δA
511
+ µ + ǫ δeA
512
+ µ ,
513
+ (38)
514
+ φ → φ + ǫ δφ ,
515
+ (39)
516
+ where ǫ is the perturbation parameter representing the perturbation order of background Minkowski tetrad.
517
+ It is given by a four-dimensional identity matrix given by the Kronecker delta δA
518
+ µ . It is sufficient to expand
519
+ the scalar field up to first order since higher order terms do not contribute. Additionally, it should be noted
520
+ that the background scalar field can be taken to be as a function of time and apply the unitary gauge such
521
+ that
522
+ φ → φ(t) .
523
+ (40)
524
+ Moreover, the perturbations of arbitrary functions present in the Lagrangian are obtained by performing a
525
+ Taylor expansion up to second order such that
526
+ Gi(φ, X) = Gi + ǫ Gi,XX(1) + ǫ2 �
527
+ 1
528
+ 2Gi,XX(X(1))2 + Gi,XX(2)�
529
+ ,
530
+ (41)
531
+ GTele(φ, X, T, Tax, Tvec, I2, J1, J3, J5, J6, J8, J10)
532
+ = GTele + ǫ(GTele,XX(1) + GTele,I2I(1)
533
+ 2 ) + 1
534
+ 2ǫ2(GTele,XX(X(1))2 + GTele,I2I2(I(1)
535
+ 2 )2)
536
+ + ǫ2�
537
+ GTele,XX(2) + GTele,T T + GTele,TaxTax + GTele,TvecTvec + GTele,I2I(2)
538
+ 2
539
+
540
+ ,
541
+ (42)
542
+
543
+ 7
544
+ where, for i = {2, 3, 4, 5}, j = {X, XX} and k = {X, T, Tax, Tvec, XX, I2I2}, Gi,j and GTele,k are background
545
+ functions, such that XX and I2I2 are the second order derivatives with respect to X and I2. The numbered
546
+ superscripts represent the order of perturbation of the scalar invariant.
547
+ In this section, we consider a scalar-vector-tensor (SVT) decomposition of the tetrad based on the formal-
548
+ ism applied in Ref. [89] for first order perturbations:
549
+ δeA
550
+ µ :=
551
+
552
+
553
+ ϕ
554
+ −(∂iβ + βi)
555
+ δI
556
+ i (∂ib + bi)
557
+ δIi �
558
+ −ψδij + ∂i∂jh + ∂ihj + ∂jhi + 1
559
+ 2hij + ǫijk(∂kσ + σk)
560
+
561
+
562
+  ,
563
+ (43)
564
+ where {ϕ, β, b, ψ, h} are scalars and σ is a pseudoscalar of 1 degree of freedom (DoF) each, {βi, bi, hi} are
565
+ vectors and σi is a pseudovector of 1 DoFs each, and hij is the tensor mode of 2 DoFs, for a total of of 16
566
+ DoFs. The tensor modes are symmetric hij = h(ij), traceless δijhij = 0 and divergenceless ∂ihij = 0. See
567
+ also Ref. [90, 91]. The divergenceless property also applies for vectors and pseudovectors such that ∂iαi = 0
568
+ where α = {β, b, h, σ}. Unlike Ref. [92, 93], the pseudoscalar and pseudovector are included to account for the
569
+ anti-symmetry of the tetrad. The mid-range Latin indices are spacial coordinates: {I, J, K, . . .} for spacial
570
+ inner bundle and {i, j, k, . . .} for spacial spacetime manifold. Note, δij is the spacial Minkowski metric such
571
+ that δij = −ηij. In turn, the first order metric perturbation from Eq. (1) is given by
572
+ δgµν =
573
+
574
+
575
+
576
+ ∂iB + Bi
577
+ ∂iB + Bi
578
+ 2
579
+
580
+ −ψδij + ∂i∂jh + ∂ihj + ∂jhi + 1
581
+ 2hij
582
+
583
+
584
+  ,
585
+ (44)
586
+ where B = −β + b and Bi = −βi + bi. The off-diagonals are identical hence verifying the symmetry of the
587
+ metric. The pseudoscalar and pseudovectors no longer play a role, and thus, the number of DoFs reduces to
588
+ 10.
589
+ The gauge transformation through the coordinate change [94–96] is
590
+ ˜xµ → xµ + ξµ ,
591
+ (45)
592
+ where ξµ is a vector field applied to study the gauge transformation of perturbative quantities. Such a
593
+ coordinate transformation can be extended to include orders higher than second one, but it is sufficient to
594
+ consider up to this point. Thus, the transformations for first tetrad are given by [97]
595
+ δ˜eA
596
+ µ = δeA
597
+ µ + Lξ(1)eA (0)
598
+ µ
599
+ ,
600
+ (46)
601
+ where Lξ is the Lie derivative along ξµ wherein ξµ = (ξ0, ξi + δij∂jξ) further splits and once again obeys
602
+ divergencelessness as ∂iξi = 0. The analysis of each combination of temporal and spatial parts of the tetrad
603
+ indicates that ψ, σ, βi and hij are gauge invariant in Minkowski background while the rest have the following
604
+ gauge transformations
605
+ ˜ϕ = ϕ − ˙ξ0 ,
606
+ β = β − ξ0 ,
607
+ ˜b = b − ˙ξ ,
608
+ ˜h = h − ξ ,
609
+ ˜bi = bi + ˙ξi ,
610
+ ˜hi = hi + 1
611
+ 2ξi ,
612
+ ˜σi = σi − 1
613
+ 2ǫijk∂jξk .
614
+ (47)
615
+ This shows that since the pseudoscalar σ is gauge-invariant, it can be treated separately than the rest of
616
+ the scalar modes, but the same cannot be said for the pseudovector. In fact, the pseudovector σi can be
617
+ expressed in terms of hi (and its derivative in terms of bi). This implies that the vector and pseudovector
618
+ cannot be decomposed [98].
619
+ Next, we construct groups of non-gauge invariant quantities: {ϕ, β}, {b, h} and {bi, hi, σi}. For gauge
620
+ choice, a quantity from each group is set to zero [98]. In particular, we will choose β = 0, h = 0 and σi = 0.
621
+ V.
622
+ GHOST AND LAPLACIAN INSTABILITIES IN MINKOWSKI BACKGROUND
623
+ Ghost instabilities stem from a negative kinetic term in the action associated to a propagating degree of
624
+ freedom. A ghost mode can be determined by expanding the action up to second order perturbations about
625
+
626
+ 8
627
+ a background. Therefore, for a Lagrangian of the form L = ˙⃗χtA ˙⃗χ + . . ., we impose that the eigenvalues of
628
+ A should be positive to eliminate ghost modes. The procedure is applied in what follows. The second order
629
+ perturbation of the action is obtained by separately applying the scalar, vector and tensor field perturbations
630
+ given by Eq. (43). The dynamical fields in the action are identified, while a system of equations is obtained
631
+ by varying the action with respect to the auxiliary fields. This system of equations is substituted back into
632
+ the action to eliminate the non-dynamic fields [99, 100].
633
+ In order to obtain a gauge invariant action, the action is varied with respect to the temporal and spatial
634
+ part of the vector field associated with the coordinate transformation, and imposing that this vanishes. Then,
635
+ a diagonalized kinetic matrix is constructed and a constraint is generated for each entry. In general, these
636
+ constraints could be time dependent: this feature arises from the background spacetime and the background
637
+ quantities of fields. When looking at the propagating speeds of these modes, a positive definite value should
638
+ be applied in order to ensure that the perturbation does not lead to an exponential growth [101] i.e. c2 > 0,
639
+ referred to as gradient or Laplacian instability. Hence, both ghost and gradient instabilities are checked for
640
+ each mode in order to obtain the constraints which lead to a stable model.
641
+ A.
642
+ Tensor Perturbations
643
+ The tensor mode perturbations, presented in Eq. (43), can be extended as
644
+ eA
645
+ µ →
646
+
647
+ 1
648
+ 0
649
+ 0 δij + 1
650
+ 2ǫhij − 1
651
+ 8ǫ2hikhk
652
+ j
653
+
654
+  ,
655
+ (48)
656
+ analogous to the Arnowitt-Deser-Misner (ADM) for tensor modes [100]. The action can be extended to
657
+ second order perturbations such that
658
+ S(2)
659
+ T
660
+ = 1
661
+ 2
662
+
663
+ d4x
664
+
665
+ MT ˙hij ˙hij − NT ∂mhij∂mhij + Phijhij�
666
+ (49)
667
+ where
668
+ MT = G4 − 2XG4,X + XG5,φ − GTele,T + 1
669
+ 2XGTele,J5 + 2XGTele,J8 ,
670
+ (50)
671
+ NT = G4 − X(G5,φ + ¨φG5,X) − GTele,T ,
672
+ (51)
673
+ PT = − 1
674
+ 2
675
+ d
676
+ dt( ˙φGTele,I2) .
677
+ (52)
678
+ For the sake of simplicity, we switch to Fourier space such that
679
+ S(2)
680
+ T
681
+ = 1
682
+ 2
683
+
684
+ dt d3k
685
+ (2π)3
686
+
687
+ MT ˙hij ˙hij +
688
+
689
+ −k2NT + PT
690
+
691
+ hijhij .
692
+
693
+ (53)
694
+ This result is obtained after applying integration by parts, removing the surface terms and applying the
695
+ background Eqs. (35-37). By imposing MT > 0, the theory is ghost free in tensor modes. When considering
696
+ a constant background scalar φ, this implies that G4 − GTele,T > 0 which corresponds to the condition
697
+ G4 −GTele,T ̸= 0 imposed in Ref. [102] in order to ensure that there are tensor mode DoFs propagating. The
698
+ propagation speed of tensor modes is given by
699
+ c2
700
+ T = NT
701
+ MT
702
+ =
703
+ G4 − X(G5,φ + ¨φG5,X) − GTele,T
704
+ G4 − 2XG4,X + XG5,φ − GTele,T + 1
705
+ 2XGTele,J5 + 2XGTele,J8
706
+ ,
707
+ (54)
708
+ for which c2
709
+ T > 0 is required to ensure gradient stability. Hence, MT > 0 and NT > 0 result in ghost
710
+ and gradient stability, respectively. The same result would by obtained when eliminating I2 contribution
711
+ from the GTele function. Following the observations of gravitational wave signal GW170817 [103] and its
712
+ electromagnetic counterpart GRB170817A [27], it is interesting to calculate the deviation from speed of light
713
+ propagation such that the excess speed is given by
714
+ αT = c2
715
+ T − 1 =
716
+ X(2G4,X − 2G5,φ − ¨φG5,X − 1
717
+ 2GTele,J5 − 2GTele,J8)
718
+ G4 − 2XG4,X + XG5,φ − GTele,T + 1
719
+ 2XGTele,J5 + 2XGTele,J8
720
+ ,
721
+ (55)
722
+
723
+ 9
724
+ which corresponds to the result obtained through the GW propagation equation [66], a value which is highly
725
+ constrained such that a graviton mass would be minute.
726
+ Additionally, from the general result of teleparallel Horndeski analogue, given by Eq. (48), one may obtain
727
+ the results of well-studied theories from literature, as summarized in Table I. See also Ref.[73] for the
728
+ metric cases derived from Noether symmetries. As an extension analogous to standard Horndeski theory,
729
+ the stability conditions can be obtained by setting GTele = 0. The ghost modes are excluded for when
730
+ the constant of the kinetic term is G4 − 2XG4,X + XG5,X > 0 while gradient stability is obtained for
731
+ G4 − X(G5,φ + ¨φG5,X) > 0, in agreement with Refs. [101, 104–106] when taking the appropriate limits
732
+ to Minkowski spacetime. An example of a subclass of Horndeski gravity is the Brans-Dicke theory, where
733
+ G2 = 2wBDX
734
+ φ
735
+ and G4 = φ for which wBD is the Dicke coupling constant [107], other constants are set to
736
+ vanish and ghost instabilities are avoided for φ > 0. By considering the generalized Brans Dicke theory,
737
+ ghost instabilities are avoided for a positive value of a function of the scalar field, F(φ) > 0 [108]. Another
738
+ example is f(
739
+ ◦R) where G2 = f(φ) − φf ′(φ), G4 = f ′(φ), the rest of the constants are zero, implying that
740
+ ghost stability is achieved for f ′(φ) > 0. A final subcase of Horndeski gravity considered here is GR. In this
741
+ case, the only non-vanishing constant is G4 = 1 for which there are no ghost modes since MT = 1 > 0. All
742
+ of these subcases do not result in any gradient instabilities as cT = 1 > 0.
743
+ Next, we look at cases that arise due to the inclusion of teleparallel terms. For a purely teleparallel theory
744
+ such as f(T ) gravity, all terms are set to vanish except for GTele,T = f(T ). This implies in −f ′(T ) > 0 to
745
+ avoid ghost modes similar to the result obtained in Ref. [98]. An equivalent result is obtained for scalar-
746
+ tensor theory with a Lagrangian of the form L = f(φ, T ) + XP(φ), an extension of f(T ) [100, 109]. Once
747
+ again, gradient instabilities are not an issue. Finally, the case where only I2 contributions are present is
748
+ considered. In this case, all constants are going to vanish while GTele,I2 ̸= 0 leads to a non-dynamical degree
749
+ of freedom.
750
+ Theory
751
+ Case
752
+ MT
753
+ NT
754
+ Horndeski
755
+ GTele = 0
756
+ G4 − 2XG4,X + ¨φXG5,X G4 − X(G5,φ + ¨φG5,X)
757
+ Generalized
758
+ Brans-Dicke
759
+ GTele = G5 = 0, G2 = B(φ)X
760
+ G3 = 2ξ(φ)X, G4 = 1
761
+ 2F(φ)
762
+ 1
763
+ 2F(φ)
764
+ 1
765
+ 2F(φ)
766
+ Brans-Dicke
767
+ GTele = G3 = G5 = 0
768
+ G2 = 2wBDX
769
+ φ
770
+ , G4 = φ
771
+ φ
772
+ φ
773
+ f(
774
+ ◦R)
775
+ GTele = G3 = G5 = 0
776
+ G2 = f(φ) − φf ′(φ), G4 = f ′(φ)
777
+ f ′(φ)
778
+ f ′(φ)
779
+ General Relativity
780
+ GTele = G2 = G3 = G5 = 0
781
+ G4 = 1
782
+ 1
783
+ 1
784
+ Teleparallel
785
+ or f(T )
786
+ G2 = G3 = G4 = G5 = 0,
787
+ GTele = f(T )
788
+ −f ′(T )
789
+ −f ′(T )
790
+ f(φ, T ) + XP(φ)
791
+ G3 = G4 = G5 = 0
792
+ G2 = XP(φ), GTele = f(φ, T )
793
+ −f,T (φ, T )
794
+ −f,T (φ, T )
795
+ GTele,I2 only
796
+ G2 = G3 = G4 = G5 = 0
797
+ GTele,T = 0
798
+ no propagating mode
799
+ TABLE I. List of literature models with the respective ghost MT and gradient stability NT conditions are positive
800
+ definite, while the propagation speed is cT = NT/MT for tensor modes. The models include Horndeski theory [20,
801
+ 101, 104, 105], Generalized Brans-Dicke [108] and Brans-Dicke [107], f(˚
802
+ R) theory, General Relativity, f(T ) theory [98],
803
+ f(φ, T ) theory [100] and the case where the action is dependent on I2 only.
804
+
805
+ 10
806
+ B.
807
+ Vector Perturbations
808
+ Next, we consider the vector perturbation of the tetrad (43) with the application of gauge fixing which
809
+ eliminates the pseudovector and any coupling with it such that
810
+ eA
811
+ µ →
812
+
813
+
814
+ 1
815
+ −ǫβi
816
+ ǫδI
817
+ i bi δIi(δij + ǫ(∂ihj + ∂jhi))
818
+
819
+  .
820
+ (56)
821
+ This result is a case of only vector modes in this portion of decomposition. Extending the action to second
822
+ order vector perturbations, we obtain
823
+ S(2)
824
+ V
825
+ =
826
+
827
+ dt d3k
828
+ (2π)3
829
+
830
+ 4k4Ahihi + E ˙βi ˙βi
831
+ + k2(4B ˙hi( ˙hi − bi) + Cbibi + Dβiβi + 4Fhiβi + 4Ghi ˙βi − 2Hβibi)
832
+
833
+ ,
834
+ (57)
835
+ where
836
+ A = GTele,Tvec + 1
837
+ 9X
838
+
839
+ −GTele,J8 + XGTele,J6 − 5
840
+ 2GTele,J5 − 3GTele,J3
841
+
842
+ ,
843
+ B = G4 − 2XG4,X + XG5,φ − GTele,T + X
844
+
845
+ 2GTele,J8 + 1
846
+ 2GTele,J5
847
+
848
+ ,
849
+ C = B + 1
850
+ 2XGTele,J5 + 2
851
+ 3XGTele,J10 + 2
852
+ 9GTele,Tax ,
853
+ D = C + XGTele,J5 − 2XGTele,J8 − 2XGTele,J10 ,
854
+ E = 4A − 3GTele,Tvec + 2XGTele,J3 ,
855
+ F = 1
856
+ 2 ˙φGTele,I2 − d
857
+ dt (G4 − 2XG4,X + XG5,φ) .
858
+ G = 2A − B − 3GTele,Tvec + 1
859
+ 3XGTele,J3 − 2XGTele,J8 + 5
860
+ 2XGTele,J5 ,
861
+ H = C − 2XGTele,J8 − 4
862
+ 9GTele,Tax ,
863
+ (58)
864
+ While the decomposition along unitary gauge ensures that there are no higher order time derivatives, one
865
+ can see that the action contains higher order spatial derivatives [110]. Here, we will set the coefficients of
866
+ these derivatives to vanish, but it should be noted that a general analysis for each constraint should be
867
+ carried out before solving the next one and leading to a very complicate solution for the action. By imposing
868
+ the conditions A = 0 and B = 0, the latter condition accounting for the higher order mix of temporal and
869
+ spatial derivatives [111], the action reduces to
870
+ S(2)
871
+ V
872
+ =
873
+
874
+ dt d3k
875
+ (2π)3
876
+
877
+ E ˙βi ˙βi + k2(Cbibi + Dβiβi + 4Fhiβi + 4Ghi ˙βi − 2Hβibi)
878
+
879
+ ,
880
+ (59)
881
+ where bi and hi are auxiliary vector modes. By varying with respect to each of these non-dynamical modes,
882
+ the respective field equations are given by
883
+ 2k2(Cbi − Hβi) = 0 ,
884
+ and
885
+ 4k2Fβi = 0 .
886
+ (60)
887
+ By solving for each auxiliary field and plugging it back in into Eq. (59), we get
888
+ S(2)
889
+ V
890
+ =
891
+
892
+ dt d3k
893
+ (2π)3
894
+
895
+ E ˙βi ˙βi − k2 �
896
+ H2
897
+ C − D
898
+
899
+ βiβi
900
+
901
+ ,
902
+ (61)
903
+ wherein the action is expressed in terms of the dynamical non-gauge invariant mode βi. Thus the ghost and
904
+ Laplacian conditions are given respectively by
905
+ MV = E > 0 ,
906
+ and NV = H2
907
+ C − D > 0 .
908
+ (62)
909
+ suggesting that there is a propagating vector mode with speed
910
+ cV = H2 − CD
911
+ CE
912
+ .
913
+ (63)
914
+ This propagating mode generally steps from the introduction of the Ji terms in the BDLS action (27)
915
+ representing the quadratic contractions of the scalar and torsion fields.
916
+
917
+ 11
918
+ a.
919
+ Vanishing Ji terms:
920
+ When considering the case were J1 = J3 = J5 = J6 = J10 = 0, the action (61)
921
+ reduces to
922
+ Svanishing J terms
923
+ V
924
+ =
925
+
926
+ dt d3k
927
+ (2π)3 k2
928
+
929
+ C − H2
930
+ C
931
+
932
+ βiβi ,
933
+ (64)
934
+ exhibiting no dynamical modes i.e. no propagating vector mode. In the case of only teleparallel function,
935
+ the same conditions apply with vanishing Horndeski terms in each constant.
936
+ The subcases of standard
937
+ Horndeski [31, 104], f(
938
+ ◦R) [99, 112], Generalized Brans-Dicke[108] and f(T ) [98] fall under this category of
939
+ non-viable propagating vector mode.
940
+ b.
941
+ C = 0
942
+ : The Laplacian constraint, given in Eq. (62), is undefined for C = 0. By considering this
943
+ particular case, the action results in
944
+ SC=0
945
+ V
946
+ =
947
+
948
+ dt d3k
949
+ (2π)3 E ˙βi ˙βi ,
950
+ (65)
951
+ to which the Laplacian condition is violated since it is null. On the other hand, imposing only E = 0, the
952
+ ghost instability is generated since this value should be a positive definite value.
953
+ c.
954
+ Ji terms only:
955
+ On the other hand, when considering only the contribution of the quadratic contrac-
956
+ tions, the only surviving term is that with coefficient E leading to a ghost stability condition but leading
957
+ to Laplacian instability, similar to the C = 0 case. This implies the importance of having a combination of
958
+ the Ji terms along with the rest of the teleparallel scalar invariants to maintain stability conditions and a
959
+ possible propagating vector mode.
960
+ d.
961
+ Constant Background Scalar Field:
962
+ With regards to the scalar field, the unitary gauge is applied to
963
+ the perturbative part of the scalar, while, at background level, it is a function of time only. Alternatively,
964
+ if one considers a constant scalar field φ = c, then the entire action is vanishing such that no vector modes
965
+ propagate, thus it corresponds to the results in Ref. [67] for the DoF and polarisation modes in the vector
966
+ portion of the decomposition.
967
+ C.
968
+ Scalar Perturbations
969
+ Let us now consider the scalar modes. Since there is no mixing between the scalar and pseudoscalar modes,
970
+ we will treat them separately. The tetrad perturbation using scalar modes is given by
971
+ eA
972
+ µ →
973
+
974
+ 1 + ϕ
975
+ 0
976
+ δI
977
+ i ∂ib (1 − ψδIiδij .
978
+
979
+
980
+ (66)
981
+ As already stated, for the gauge invariant quantities, given by Eq. (47), the gauge choice is β = h = 0. The
982
+ pseudoscalar will be analyzed separately. It should be noted that this situation is identical to the Arnowitt-
983
+ Deser-Misner (ADM) decomposition used in torsion-based theories [100]. It leads to the same metric as that
984
+ applied to curvature-based theories [101]. On the other hand, the choice β = b = 0 results in the Newtonian
985
+ (longitudinal) gauge. Substituting the tetrad perturbation to the action, followed by integration by parts
986
+ and application of the background equations (35-37), the second order perturbation of the action is given by
987
+ S(2)
988
+ S
989
+ =
990
+
991
+ dt d3k
992
+ (2π)3
993
+
994
+ ¯
995
+ Aϕ2 + 6 ¯Dψ2 − 6 ¯F ˙ψ2 − 6 ¯Gϕ ˙ψ
996
+ − k2(− ¯Bϕ2 − 2 ¯Eψ2 + 4 ¯Hϕψ − 2 ¯Gϕb − 4 ¯F ˙ψb) + k4 ¯Cb2�
997
+ (67)
998
+
999
+ 12
1000
+ where
1001
+ ¯
1002
+ A = XG2,X + 2X2G2,XX − 2XG3,φ − 2X2G3,φX + XGTele,X + 2X2GTele,XX ,
1003
+ ¯B = GTele,Tvec + 2
1004
+ 9X (2GTele,J8 + 2XGTele,J6 − 5GTele,J5 + 3GTele,J3) ,
1005
+ ¯C = −GTele,Tvec + XGTele,I2I2 + 1
1006
+ 3X(4GTele,J8 + GTele,J5) ,
1007
+ ¯D = d
1008
+ dt( ˙φGTele,I2) ,
1009
+ ¯E = G4 − X(G5,φ − ¨φG5,X) − GTele,T + 2GTele,Tvec + 1
1010
+ 9X (−2GTele,J8 + 2XGTele,J6 − 5GTele,J5 − 6GTele,J3) ,
1011
+ ¯F = G4 − 2XG4,X + XG5,φ − GTele,T + 3
1012
+ 2(GTele,Tvec − XGTele,I2I2) ,
1013
+ ¯G = − ˙φXG3,X + ˙φG4,φ + 2 ˙φXG4,φX + 1
1014
+ 2 ˙φGTele,I2 + ˙φXGTele,XI2 ,
1015
+ ¯H = G4 − 2XG4,X + XG5,φ − GTele,T + GTele,Tvec + 1
1016
+ 9X(2GTele,J8 − 2XGTele,J6 + 5GTele,J5 + 3
1017
+ 2GTele,J3) .
1018
+ (68)
1019
+ Here k is the co-vector. As shown in coefficient of ¯C in Eq. (67), there is a higher derivative contribution,
1020
+ hence it is set to vanish [110]. It is clear that variables ϕ and b are non-dynamical with respect to the time
1021
+ component. By varying with respect to each of these auxiliary fields, one obtains a set of equations
1022
+ 0 = ( ¯
1023
+ A + k2 ¯B)ϕ − 3 ¯G ˙ψ + k2(2 ¯Hψ − ¯Gb) ,
1024
+ (69)
1025
+ 0 = ¯Gϕ + 2 ¯F ˙ψ .
1026
+ (70)
1027
+ By solving these equations of motion for the modes ϕ and b, it leads to an action expressed in terms of the
1028
+ dynamical mode only, that is
1029
+ S(2)
1030
+ S
1031
+ =
1032
+
1033
+ dt d3k
1034
+ (2π)3
1035
+
1036
+ 4k2 ¯B ¯F
1037
+ 2
1038
+ ¯G
1039
+ 2
1040
+ ˙ψ2 +
1041
+
1042
+ 4 ¯
1043
+ A ¯F
1044
+ 2
1045
+ ¯G
1046
+ 2
1047
+ + 6 ¯F
1048
+
1049
+ ˙ψ2 − k2
1050
+
1051
+ −2 ¯E + 4 d
1052
+ dt
1053
+ � ¯F ¯H
1054
+ ¯G
1055
+ ��
1056
+ ψ2 + 6 ¯Dψ2
1057
+
1058
+ .
1059
+ (71)
1060
+ Taking into account the mix of spatial and temporal higher-order derivatives, the first term of the action
1061
+ vanishes [111]. This implies that either ¯F = 0 (which renders the whole action without a dynamical mode),
1062
+ or ¯B = 0. By applying the latter condition, the action can be expressed in terms of a gauge invariant quantity
1063
+ within a Minkowski background and no higher-order terms. It is
1064
+ S(2)
1065
+ S
1066
+ =
1067
+
1068
+ dt d3k
1069
+ (2π)3
1070
+ ��
1071
+ 4 ¯
1072
+ A ¯F
1073
+ 2
1074
+ ¯G
1075
+ 2
1076
+ + 6 ¯F
1077
+
1078
+ ˙ψ2 − k2
1079
+
1080
+ −2 ¯E + 4 d
1081
+ dt
1082
+ � ¯F ¯H
1083
+ ¯G
1084
+ ��
1085
+ ψ2 + 6 ¯Dψ2
1086
+
1087
+ .
1088
+ (72)
1089
+ In the case of teleparallel analogue of Horndeski theory, ghost stability and gradient stability are obtained,
1090
+ respectively, when
1091
+ MS = 4 ¯
1092
+ A ¯F
1093
+ 2
1094
+ ¯G
1095
+ 2
1096
+ + 6 ¯F > 0 ,
1097
+ (73)
1098
+ ¯
1099
+ N S = −2 ¯F + 4 d
1100
+ dt
1101
+ � ¯F ¯H
1102
+ ¯G
1103
+
1104
+ > 0 ,
1105
+ (74)
1106
+ and the propagating speed is
1107
+ cS = NS
1108
+ MS
1109
+ .
1110
+ (75)
1111
+ Different subcases are reported in Table II. Through the substitution of Eqs (73) and (74), conditions to
1112
+ avoid ghost and Laplacian instabilities are realised.
1113
+ a.
1114
+ Horndeski:
1115
+ The standard Horndeski case has identical expressions for ghost and gradient stability
1116
+ conditions as those for teleparallel Horndeski (73-74) with the difference that each constant does not have
1117
+ teleparallel contributions.
1118
+
1119
+ 13
1120
+ b.
1121
+ Generalized Brans-Dicke:
1122
+ Considering Generalised Brans-Dicke (GBD) theory means that G2 =
1123
+ B(φ)X, G3 = 2Xξ(φ), G4 = 1
1124
+ 2F(φ) and all other terms are set to zero. When we take the background
1125
+ equations
1126
+ B − 4Xξ′ = 0 ,
1127
+ and
1128
+ ˙φ2F ′′ + ¨φ(F ′ − 2 ˙φ2ξ) = 0 ,
1129
+ (76)
1130
+ for ghost stability, we have
1131
+ MGBD
1132
+ S
1133
+ = F[3F ′2 − 4 ˙φ2(Fξ′ + 3ξF ′) + 12 ˙φ4ξ2]
1134
+ [F ′ − 2 ˙φ2ξ]2
1135
+ > 0 ,
1136
+ (77)
1137
+ where ′ denotes a derivative with respect to the respective variable of the function. In this case, it is φ, while
1138
+ the gradient condition is
1139
+ N GBD
1140
+ S
1141
+ = F[3F ′3 − 2 ˙φ2(5F ′2ξ − 4ξFF ′′ − 2Fξ′F ′) + 4 ˙φ4(F ′ξ2 − 2Fξ′ξ) + 8 ˙φ6ξ3]
1142
+ [F ′ − 2 ˙φ2ξ]3
1143
+ > 0 .
1144
+ (78)
1145
+ With these conditions, the speed of propagation is positive. It is
1146
+ (cGBD
1147
+ S
1148
+ )2 = 3F ′3 − 2 ˙φ2(5F ′2ξ − 4ξFF ′′ − 2Fξ′F ′) + 4 ˙φ4(F ′ξ2 − 2Fξ′ξ) + 8 ˙φ6ξ3
1149
+ [3F ′2 − 4 ˙φ2(Fξ′ + 3ξF ′) + 12 ˙φ4ξ2][F ′ − 2 ˙φ2ξ]
1150
+ ,
1151
+ (79)
1152
+ which correlates with results obtained in Ref. [108] for a Minkowski background.
1153
+ c.
1154
+ Brans-Dicke:
1155
+ As for the Brans-Dicke theory in Ref. [107] with G2 = 2wBDX
1156
+ φ
1157
+ and G4 = φ, ghosts
1158
+ instabilities are avoided if 2φ(3 + 2wBD) > 0.
1159
+ Provided that φ > 0, this implies that the Brans-Dicke
1160
+ constant is wBD > − 3
1161
+ 2 [99]. The gradient stability condition is given by 2φ(3 − 2φ¨φ/ ˙φ2) > 0 to ensure
1162
+ a positive propagating speed. Moreover, when applying the second Friedman Eq. (36), gradient condition
1163
+ reduces to 2φ(3 + wBD) such that wBD > −3 and a unitary propagating speed [113], analogous to ξ = 0,
1164
+ reported in Ref. [108], is obtained. The first Friedman Eq. (35) shows that the only non-trivial solution is
1165
+ that for wBD = 0, which results in identical ghost and gradient expressions.
1166
+ d.
1167
+ f(˚
1168
+ R):
1169
+ The scalar-tensor theory equivalent to f(R) [114] is given by setting G2 = f(φ) − φf ′(φ) and
1170
+ G4 = f ′(φ) while the rest of the functions are set to vanish. See also Ref. [73]. In order to have ghost
1171
+ stability, it has to be 6f ′(φ) > 0, i.e. f ′(φ) > 0. Once again, upon applying the background Eqs. (35-36),
1172
+ the gradient condition reduces to f ′(φ) > 0. In fact, as a subcase of GBD theory, the case ξ = 0 always
1173
+ results in a unitary speed propagating mode.
1174
+ e.
1175
+ GR, f(T ), f(φ, T ):
1176
+ When considering the cases of GR, f(T ) and f(φ, T ), the substitution in Eqs˜(73-
1177
+ 74) results in an undefined expression. In these cases, although taking the appropriate limits of each coeffi-
1178
+ cient does lead to a positive ghost condition value, the propagating speed is negative, thus scalar modes are
1179
+ not viable. This is expected in GR. Additionally, Ref. [98] shows that the only propagating scalar field is that
1180
+ dependent on the perturbation of scalar field φ, while, in this paper, we are applying the unitary gauge. As
1181
+ in Ref. [100], f(φ, T ) theory gives rise to a propagating mode when considering cosmological perturbations.
1182
+ The same applies for GR with an additional canonical scalar field such that G2 = X − V (φ), G4 = M 2
1183
+ Pl/2,
1184
+ G3 = G5 = GTele = 0 [101].
1185
+ f.
1186
+ Teleparallel:
1187
+ If one considers only the teleparallel portions of the action, all terms from Eq. (71) are
1188
+ retained, with all standard Horndeski contributions set to vanish. This implies that the ghost and Laplacian
1189
+ instabilities coincide with the form of Eqs. (73) and (51), respectively, provided that the background equations
1190
+ are satisfied.
1191
+ D.
1192
+ Pseudoscalar Perturbations
1193
+ The gauge invariant pseudoscalar σ can be treated separately as
1194
+ eA
1195
+ µ →
1196
+
1197
+ 1
1198
+ 0
1199
+ 0 δIi(δij + ǫ εijk∂kσ)
1200
+
1201
+  ,
1202
+ (80)
1203
+
1204
+ 14
1205
+ Theory
1206
+ Case
1207
+ MS
1208
+ NS
1209
+ Horndeski
1210
+ GTele = 0
1211
+ 6 ¯
1212
+ F + 4 ¯
1213
+ A ¯
1214
+ F2
1215
+ ¯
1216
+ G2
1217
+ −2 ¯
1218
+ E + 4 d
1219
+ dt ( ¯
1220
+ F2
1221
+ ¯
1222
+ G )
1223
+ Generalized
1224
+ Brans-Dicke
1225
+ GTele = G5 = 0,
1226
+ G2 = B(φ)X, G3 = 2ξ(φ)X,
1227
+ G4 = 1
1228
+ 2 F (φ)
1229
+ F [3F ′2−4 ˙φ2(F ξ′+3ξF′)+12 ˙φ4ξ2]
1230
+ [F ′−2 ˙φ2ξ]2
1231
+ F [3F ′3−2 ˙φ2(5F ′2ξ−4ξFF ′′−2F ξ′F ′)+4 ˙φ4(F ′ξ2−2F ξ′ξ)+8 ˙φ6ξ3]
1232
+ [F ′−2 ˙φ2ξ]3
1233
+ Brans-Dicke
1234
+ GTele = G3 = G5 = 0
1235
+ G2 = 2wBDX
1236
+ φ
1237
+ , G4 = φ
1238
+ 2φ(3 + 2wBD)
1239
+ 2(3φ −
1240
+ ¨
1241
+ φ
1242
+ X ) → 2φ(3 + 2wBD)
1243
+ f( ◦
1244
+ R)
1245
+ GTele = G3 = G5 = 0
1246
+ G2 = f(φ) − φf′(φ),
1247
+ G4 = f′(φ)
1248
+ 6f′(φ)
1249
+ −2f′(φ) + 4 d
1250
+ dt ( f′(φ)2
1251
+ ˙φf′′(φ) ) → 6f′(φ)
1252
+ GR
1253
+ GTele = G2 = G3 = G5 = 0
1254
+ G4 = 1
1255
+ no propagating mode
1256
+ f(T )
1257
+ G2 = G3 = G4 = G5 = 0,
1258
+ GTele = f(T )
1259
+ no propagating mode
1260
+ f(φ, T ) + XP (φ)
1261
+ G3 = G4 = G5 = 0,
1262
+ G2 = XP (φ),
1263
+ GTele = f(φ, T )
1264
+ no propagating mode
1265
+ Teleparallel
1266
+ G2 = G3 = G4 = G5 = 0
1267
+ 4 ¯
1268
+ A ¯
1269
+ F2
1270
+ ¯
1271
+ G2
1272
+ + 6 ¯
1273
+ F
1274
+ −2 ¯
1275
+ F + 4 d
1276
+ dt
1277
+ � ¯
1278
+ F ¯
1279
+ H
1280
+ ¯
1281
+ G
1282
+
1283
+ TABLE II. List of literature models with the respective ghost MS and gradient stability NS conditions are positive
1284
+ definite, and propagation speed cS = NS/MS for scalar modes. The models include Horndeski theory [20, 101, 104,
1285
+ 105], Generalized Brans-Dicke [108] and Brans-Dicke [107], f(˚
1286
+ R) theory , General Relativity, f(T ) theory [98], f(φ, T )
1287
+ theory [100]. and an action with only teleparallel terms.
1288
+ The action in Fourier space is expanded up to second order
1289
+ S(2)
1290
+ PS = −
1291
+
1292
+ dt d3k
1293
+ (2π)3
1294
+ ��
1295
+ k2 d
1296
+ dt( ˙φGTele,I2) + 4
1297
+ 9k4 (GTele,Tax − 2XGTele,J1)
1298
+
1299
+ σ2
1300
+ +k2
1301
+ �4
1302
+ 9GTele,Tax + X
1303
+
1304
+ GTele,J5 + 4
1305
+ 3GTele,J10
1306
+ ��
1307
+ ˙σ2
1308
+
1309
+ ,
1310
+ (81)
1311
+ where the first term exhibits higher-order spatial derivatives and the second term exhibits higher order mixed
1312
+ derivatives. By imposing that GTele,Tax = 2XGTele,J1 = −X
1313
+ � 9
1314
+ 4GTele,J5 + 3GTele,J10
1315
+
1316
+ , the action reduces to
1317
+ S(2)
1318
+ PS =
1319
+
1320
+ dt d3k
1321
+ (2π)3
1322
+
1323
+ − k2 d
1324
+ dt( ˙φGTele,I2)σ2�
1325
+ ,
1326
+ (82)
1327
+ where σ is a non-dynamical mode and thus it is a non-propagating mode. This shows that in Minkowski
1328
+ background, the additional scalar invariants, provided by teleparallel analogue of Horndeski theory, do not
1329
+ contribute to any additional propagating DoF. See also Ref. [98].
1330
+ VI.
1331
+ DISCUSSION AND CONCLUSIONS
1332
+ We have investigated constraints emerging by considering the stability of perturbations about a Minkowski
1333
+ background in teleparallel analogue of Horndeski gravity. The approach is performed by exploring the ghost
1334
+ instabilities through looking at potentially negative expressions of kinetic term associated with propagating
1335
+ DoFs, as well as Laplacian instabilities emerging when propagation speeds of perturbations are not positive.
1336
+ This leads to possible exponential growth rates. These considerations are fundamental for the construction
1337
+ of robust and self-consistent cosmological models related to the scalar-tensor gravity.
1338
+ Specifically, we have discussed teleparallel analogue of Horndeski gravity where the most general scalar-
1339
+ tensor action is considered, provided that the Lagrangian terms are not parity violating and that scalars
1340
+ are produced by no more than quadratic contractions of torsion scalar. The naturally lower order nature
1341
+ of teleparallel gravity induces a much richer landscape of functional models when compared with standard
1342
+ metric Horndeski gravity, based on Levi-Civita connection. In other words, the replacement of torsion with
1343
+ curvature to lead dynamics turns out to manifest as a generalization of the standard Horndeski theory. Im-
1344
+ portantly, this produces a generalization of tensor mode propagation speed which means that the restrictions
1345
+ appearing in standard Horndeski gravity, due to the constraints on the gravitational waves speed, do not
1346
+ have the same effect here.
1347
+
1348
+ 15
1349
+ Our calculations have proceeded by first deriving the background equations of motion (35–37) which are
1350
+ obtained by considering a flat FLRW background in which we take the Minkowski limit. We find this to
1351
+ be a convenient approach to determine the system of equations. These are useful equations for reducing
1352
+ the expressions of perturbations that ensue. The procedure is described in Sec. IV. We then proceeded to
1353
+ directly determine constraints to prevent ghost or Laplacian instabilities starting with tensor modes which
1354
+ results in the action in Eq. (53) and tensor propagation speed in Eq. (54). We collected the constraints for
1355
+ popular subclasses of BDLS theory in Table I where the known results are obtained for standard Horndeski
1356
+ gravity as well as f(
1357
+ ◦R) and Brans-Dicke gravity, but new conditions are found in other cases. As for the
1358
+ vector perturbations, Sec. V B shows that vector modes are indeed propagating for some cases of GTele
1359
+ contribution, namely when Ji scalars appear in this function. However, these contributions may be small
1360
+ and within observational constraints.
1361
+ The scalar perturbations contain the most diverse range of DoFs. This rich structure produces the intricate
1362
+ action in Eq. (72), together with the propagation speed in Eq. (75). As in the case of tensor modes, constraints
1363
+ for each subclass of popular models is reported in Table II where results for the Minkowski perturbations are
1364
+ recovered for standard metric Horndeski gravity together with f(
1365
+ ◦R) and Brans-Dicke gravity. Interestingly,
1366
+ either no constraints are set on some of the purely teleparallel models or only lightly limited cases are set.
1367
+ Importantly, these constraints are consistent with the tensor mode constraints on the functional models.
1368
+ These results are promising in terms of the viability of BDLS theory. As future work, it is intriguing to
1369
+ explore constraints from tachyonic instabilities. These constraints have been connected to Jeans instability
1370
+ where exponential growth of perturbations is slowed by the expansion of the Universe and where the matter
1371
+ dispersion relation has a negative mass term that renders it to vanish. This could lead to a more general
1372
+ consideration of perturbations about a flat FLRW background spacetime which would then be directly linked
1373
+ to observations such as those related to the growth of large scale structure. In forthcoming studies, possible
1374
+ observational constraints will be scrutinized.
1375
+ ACKNOWLEDGMENTS
1376
+ This paper is based upon work from COST Action CA21136 Addressing observational tensions in cosmology
1377
+ with systematics and fundamental physics (CosmoVerse) supported by COST (European Cooperation in
1378
+ Science and Technology). SC acknowledges the Istituto Nazionale di Fisica Nucleare (iniziative specifiche
1379
+ QGSKY and MOONLIGHT2). MC acknowledges funding by the Tertiary Education Scholarship Scheme
1380
+ (TESS, Malta).
1381
+ [1] C. Misner, K. Thorne, K. Thorne, J. Wheeler, W. Freeman, and Company, Gravitation. No. pt. 3 in
1382
+ Gravitation. W. H. Freeman, 1973. https://books.google.com.mt/books?id=w4Gigq3tY1kC.
1383
+ [2] T. Clifton, P. G. Ferreira, A. Padilla, and C. Skordis, “Modified Gravity and Cosmology,”
1384
+ Phys. Rept. 513 (2012) 1–189, arXiv:1106.2476 [astro-ph.CO].
1385
+ [3] Supernova Search Team Collaboration, A. G. Riess et al., “Observational evidence from supernovae for an
1386
+ accelerating universe and a cosmological constant,” Astron. J. 116 (1998) 1009–1038,
1387
+ arXiv:astro-ph/9805201.
1388
+ [4] Supernova Cosmology Project Collaboration, S. Perlmutter et al., “Measurements of Ω and Λ from 42
1389
+ high redshift supernovae,” Astrophys. J. 517 (1999) 565–586, arXiv:astro-ph/9812133.
1390
+ [5] S. Weinberg, “The Cosmological Constant Problem,” Rev. Mod. Phys. 61 (1989) 1–23.
1391
+ [6] S. Appleby and E. V. Linder, “The Well-Tempered Cosmological Constant,” JCAP 07 (2018) 034,
1392
+ arXiv:1805.00470 [gr-qc].
1393
+ [7] M. Ishak, “Testing General Relativity in Cosmology,” Living Rev. Rel. 22 (2019) no. 1, 1,
1394
+ arXiv:1806.10122 [astro-ph.CO].
1395
+ [8] J. L. Bernal, L. Verde, and A. G. Riess, “The trouble with H0,” JCAP 10 (2016) 019,
1396
+ arXiv:1607.05617 [astro-ph.CO].
1397
+ [9] E. Di Valentino et al., “Snowmass2021 - Letter of interest cosmology intertwined II: The hubble constant
1398
+ tension,” Astropart. Phys. 131 (2021) 102605, arXiv:2008.11284 [astro-ph.CO].
1399
+ [10] E. Di Valentino, O. Mena, S. Pan, L. Visinelli, W. Yang, A. Melchiorri, D. F. Mota, A. G. Riess, and J. Silk,
1400
+ “In the realm of the Hubble tension—a review of solutions,” Class. Quant. Grav. 38 (2021) no. 15, 153001,
1401
+ arXiv:2103.01183 [astro-ph.CO].
1402
+
1403
+ 16
1404
+ [11] A. G. Riess, S. Casertano, W. Yuan, L. M. Macri, and D. Scolnic, “Large Magellanic Cloud Cepheid
1405
+ Standards Provide a 1% Foundation for the Determination of the Hubble Constant and Stronger Evidence for
1406
+ Physics beyond ΛCDM,” Astrophys. J. 876 (2019) no. 1, 85, arXiv:1903.07603 [astro-ph.CO].
1407
+ [12] K. C. Wong et al., “H0LiCOW – XIII. A 2.4 per cent measurement of H0 from lensed quasars: 5.3σ tension
1408
+ between early- and late-Universe probes,” Mon. Not. Roy. Astron. Soc. 498 (2020) no. 1, 1420–1439,
1409
+ arXiv:1907.04869 [astro-ph.CO].
1410
+ [13] A. G. Riess et al., “A Comprehensive Measurement of the Local Value of the Hubble Constant with 1 km s−1
1411
+ Mpc−1 Uncertainty from the Hubble Space Telescope and the SH0ES Team,”
1412
+ Astrophys. J. Lett. 934 (2022) no. 1, L7, arXiv:2112.04510 [astro-ph.CO].
1413
+ [14] D. Brout et al., “The Pantheon+ Analysis: SuperCal-fragilistic Cross Calibration, Retrained SALT2
1414
+ Light-curve Model, and Calibration Systematic Uncertainty,” Astrophys. J. 938 (2022) no. 2, 111,
1415
+ arXiv:2112.03864 [astro-ph.CO].
1416
+ [15] D. Scolnic et al., “The Pantheon+ Analysis: The Full Data Set and Light-curve Release,”
1417
+ Astrophys. J. 938 (2022) no. 2, 113, arXiv:2112.03863 [astro-ph.CO].
1418
+ [16] E. Abdalla et al., “Cosmology intertwined: A review of the particle physics, astrophysics, and cosmology
1419
+ associated with the cosmological tensions and anomalies,” JHEAp 34 (2022) 49–211,
1420
+ arXiv:2203.06142 [astro-ph.CO].
1421
+ [17] E. Di Valentino et al., “Cosmology Intertwined III: fσ8 and S8,” Astropart. Phys. 131 (2021) 102604,
1422
+ arXiv:2008.11285 [astro-ph.CO].
1423
+ [18] S. Capozziello, M. Benetti, and A. D. A. M. Spallicci, “Addressing the cosmological H0 tension by the
1424
+ Heisenberg uncertainty,” Found. Phys. 50 (2020) no. 9, 893–899, arXiv:2007.00462 [gr-qc].
1425
+ [19] S. Capozziello and V. Faraoni,
1426
+ Beyond Einstein Gravity: A Survey of Gravitational Theories for Cosmology and Astrophysics. Springer,
1427
+ Dordrecht, 2011.
1428
+ [20] G. W. Horndeski, “Second-order scalar-tensor field equations in a four-dimensional space,”
1429
+ Int. J. Theor. Phys. 10 (1974) 363–384.
1430
+ [21] R. P. Woodard, “Avoiding dark energy with 1/r modifications of gravity,”
1431
+ Lect. Notes Phys. 720 (2007) 403–433, arXiv:astro-ph/0601672.
1432
+ [22] H. Motohashi and T. Suyama, “Third order equations of motion and the Ostrogradsky instability,”
1433
+ Phys. Rev. D 91 (2015) no. 8, 085009, arXiv:1411.3721 [physics.class-ph].
1434
+ [23] E. Pagani, G. Tecchiolli, and S. Zerbini, “On the Problem of Stability for Higher Order Derivatives:
1435
+ Lagrangian Systems,” Lett. Math. Phys. 14 (1987) 311.
1436
+ [24] M. Miranda, D. Vernieri, S. Capozziello, and V. Faraoni, “Generalized McVittie geometry in Horndeski
1437
+ gravity with matter,” Phys. Rev. D 105 (2022) no. 12, 124024, arXiv:2204.09693 [gr-qc].
1438
+ [25] M. Miranda, D. Vernieri, S. Capozziello, and V. Faraoni, “Fluid nature constrains Horndeski gravity,”
1439
+ arXiv:2209.02727 [gr-qc].
1440
+ [26] LIGO Scientific, Virgo Collaboration, B. P. Abbott et al., “GW170817: Observation of Gravitational
1441
+ Waves from a Binary Neutron Star Inspiral,” Phys. Rev. Lett. 119 (2017) no. 16, 161101,
1442
+ arXiv:1710.05832 [gr-qc].
1443
+ [27] A. Goldstein et al., “An Ordinary Short Gamma-Ray Burst with Extraordinary Implications: Fermi-GBM
1444
+ Detection of GRB 170817A,” Astrophys. J. Lett. 848 (2017) no. 2, L14, arXiv:1710.05446 [astro-ph.HE].
1445
+ [28] T. Kobayashi, M. Yamaguchi, and J. Yokoyama, “Generalized G-inflation: Inflation with the most general
1446
+ second-order field equations,” Prog. Theor. Phys. 126 (2011) 511–529, arXiv:1105.5723 [hep-th].
1447
+ [29] J. Gleyzes, D. Langlois, F. Piazza, and F. Vernizzi, “Essential Building Blocks of Dark Energy,”
1448
+ JCAP 08 (2013) 025, arXiv:1304.4840 [hep-th].
1449
+ [30] K. Koyama, “Cosmological Tests of Modified Gravity,” Rept. Prog. Phys. 79 (2016) no. 4, 046902,
1450
+ arXiv:1504.04623 [astro-ph.CO].
1451
+ [31] T. Kobayashi, “Horndeski theory and beyond: a review,” Rept. Prog. Phys. 82 (2019) no. 8, 086901,
1452
+ arXiv:1901.07183 [gr-qc].
1453
+ [32] S. Bahamonde, K. F. Dialektopoulos, C. Escamilla-Rivera, G. Farrugia, V. Gakis, M. Hendry, M. Hohmann,
1454
+ J. L. Said, J. Mifsud, and E. Di Valentino, “Teleparallel Gravity: From Theory to Cosmology,”
1455
+ arXiv:2106.13793 [gr-qc].
1456
+ [33] R. Aldrovandi and J. G. Pereira, Teleparallel Gravity: An Introduction. Springer, 2013.
1457
+ [34] Y.-F. Cai, S. Capozziello, M. De Laurentis, and E. N. Saridakis, “f(T) teleparallel gravity and cosmology,”
1458
+ Rept. Prog. Phys. 79 (2016) no. 10, 106901, arXiv:1511.07586 [gr-qc].
1459
+ [35] M. Krssak, R. J. van den Hoogen, J. G. Pereira, C. G. B¨ohmer, and A. A. Coley, “Teleparallel theories of
1460
+ gravity: illuminating a fully invariant approach,” Class. Quant. Grav. 36 (2019) no. 18, 183001,
1461
+ arXiv:1810.12932 [gr-qc].
1462
+ [36] D. Lovelock, “The Einstein tensor and its generalizations,” J. Math. Phys. 12 (1971) 498–501.
1463
+ [37] P. A. Gonzalez and Y. Vasquez, “Teleparallel Equivalent of Lovelock Gravity,”
1464
+ Phys. Rev. D 92 (2015) no. 12, 124023, arXiv:1508.01174 [hep-th].
1465
+
1466
+ 17
1467
+ [38] S. Bahamonde, K. F. Dialektopoulos, and J. Levi Said, “Can Horndeski Theory be recast using Teleparallel
1468
+ Gravity?,” Phys. Rev. D 100 (2019) no. 6, 064018, arXiv:1904.10791 [gr-qc].
1469
+ [39] S. Capozziello, V. De Falco, and C. Ferrara, “Comparing equivalent gravities: common features and
1470
+ differences,” Eur. Phys. J. C 82 (2022) no. 10, 865, arXiv:2208.03011 [gr-qc].
1471
+ [40] R. Ferraro and F. Fiorini, “Modified teleparallel gravity: Inflation without inflaton,”
1472
+ Phys. Rev. D 75 (2007) 084031, arXiv:gr-qc/0610067.
1473
+ [41] R. Ferraro and F. Fiorini, “On Born-Infeld Gravity in Weitzenbock spacetime,”
1474
+ Phys. Rev. D 78 (2008) 124019, arXiv:0812.1981 [gr-qc].
1475
+ [42] G. R. Bengochea and R. Ferraro, “Dark torsion as the cosmic speed-up,” Phys. Rev. D 79 (2009) 124019,
1476
+ arXiv:0812.1205 [astro-ph].
1477
+ [43] E. V. Linder, “Einstein’s Other Gravity and the Acceleration of the Universe,”
1478
+ Phys. Rev. D 81 (2010) 127301, arXiv:1005.3039 [astro-ph.CO]. [Erratum: Phys.Rev.D 82, 109902 (2010)].
1479
+ [44] S.-H. Chen, J. B. Dent, S. Dutta, and E. N. Saridakis, “Cosmological perturbations in f(T) gravity,”
1480
+ Phys. Rev. D 83 (2011) 023508, arXiv:1008.1250 [astro-ph.CO].
1481
+ [45] S. Bahamonde, K. Flathmann, and C. Pfeifer, “Photon sphere and perihelion shift in weak f(T ) gravity,”
1482
+ Phys. Rev. D 100 (2019) no. 8, 084064, arXiv:1907.10858 [gr-qc].
1483
+ [46] A. Rezaei Akbarieh and Y. Izadi, “Tachyon Inflation in Teleparallel Gravity,”
1484
+ Eur. Phys. J. C 79 (2019) no. 4, 366, arXiv:1812.06649 [gr-qc].
1485
+ [47] S. Bahamonde, C. G. B¨ohmer, and M. Wright, “Modified teleparallel theories of gravity,”
1486
+ Phys. Rev. D 92 (2015) no. 10, 104042, arXiv:1508.05120 [gr-qc].
1487
+ [48] S. Bahamonde and S. Capozziello, “Noether Symmetry Approach in f(T, B) teleparallel cosmology,”
1488
+ Eur. Phys. J. C 77 (2017) no. 2, 107, arXiv:1612.01299 [gr-qc].
1489
+ [49] A. Paliathanasis, “de Sitter and Scaling solutions in a higher-order modified teleparallel theory,”
1490
+ JCAP 08 (2017) 027, arXiv:1706.02662 [gr-qc].
1491
+ [50] G. Farrugia, J. Levi Said, V. Gakis, and E. N. Saridakis, “Gravitational Waves in Modified Teleparallel
1492
+ Theories,” Phys. Rev. D 97 (2018) no. 12, 124064, arXiv:1804.07365 [gr-qc].
1493
+ [51] S. Bahamonde, M. Zubair, and G. Abbas, “Thermodynamics and cosmological reconstruction in f(T, B)
1494
+ gravity,” Phys. Dark Univ. 19 (2018) 78–90, arXiv:1609.08373 [gr-qc].
1495
+ [52] M. Wright, “Conformal transformations in modified teleparallel theories of gravity revisited,”
1496
+ Phys. Rev. D 93 (2016) no. 10, 103002, arXiv:1602.05764 [gr-qc].
1497
+ [53] G. Farrugia, J. Levi Said, and A. Finch, “Gravitoelectromagnetism, Solar System Tests, and Weak-Field
1498
+ Solutions in f(T, B) Gravity with Observational Constraints,” Universe 6 (2020) no. 2, 34,
1499
+ arXiv:2002.08183 [gr-qc].
1500
+ [54] S. Capozziello, M. Capriolo, and L. Caso, “Weak field limit and gravitational waves in f(T, B) teleparallel
1501
+ gravity,” Eur. Phys. J. C 80 (2020) no. 2, 156, arXiv:1912.12469 [gr-qc].
1502
+ [55] C. Escamilla-Rivera and J. Levi Said, “Cosmological viable models in f(T, B) theory as solutions to the H0
1503
+ tension,” Class. Quant. Grav. 37 (2020) no. 16, 165002, arXiv:1909.10328 [gr-qc].
1504
+ [56] S. Capozziello, “Curvature quintessence,” Int. J. Mod. Phys. D 11 (2002) 483–492, arXiv:gr-qc/0201033.
1505
+ [57] T. P. Sotiriou and V. Faraoni, “f(R) Theories Of Gravity,” Rev. Mod. Phys. 82 (2010) 451–497,
1506
+ arXiv:0805.1726 [gr-qc].
1507
+ [58] V. Faraoni, “f(R) gravity: Successes and challenges,” in 18th SIGRAV Conference. 10, 2008.
1508
+ arXiv:0810.2602 [gr-qc].
1509
+ [59] S. Capozziello and M. De Laurentis, “Extended Theories of Gravity,” Phys. Rept. 509 (2011) 167–321,
1510
+ arXiv:1108.6266 [gr-qc].
1511
+ [60] S. Nojiri and S. D. Odintsov, “Introduction to modified gravity and gravitational alternative for dark energy,”
1512
+ eConf C0602061 (2006) 06, arXiv:hep-th/0601213.
1513
+ [61] S. Nojiri and S. D. Odintsov, “Unified cosmic history in modified gravity: from F(R) theory to Lorentz
1514
+ non-invariant models,” Phys. Rept. 505 (2011) 59–144, arXiv:1011.0544 [gr-qc].
1515
+ [62] S. Nojiri, S. D. Odintsov, and V. K. Oikonomou, “Modified Gravity Theories on a Nutshell: Inflation, Bounce
1516
+ and Late-time Evolution,” Phys. Rept. 692 (2017) 1–104, arXiv:1705.11098 [gr-qc].
1517
+ [63] M. Hohmann, “Scalar-torsion theories of gravity I: general formalism and conformal transformations,”
1518
+ Phys. Rev. D 98 (2018) no. 6, 064002, arXiv:1801.06528 [gr-qc].
1519
+ [64] M. Hohmann and C. Pfeifer, “Scalar-torsion theories of gravity II: L(T, X, Y, φ) theory,”
1520
+ Phys. Rev. D 98 (2018) no. 6, 064003, arXiv:1801.06536 [gr-qc].
1521
+ [65] M. Hohmann, “Scalar-torsion theories of gravity III: analogue of scalar-tensor gravity and conformal
1522
+ invariants,” Phys. Rev. D 98 (2018) no. 6, 064004, arXiv:1801.06531 [gr-qc].
1523
+ [66] S. Bahamonde, K. F. Dialektopoulos, V. Gakis, and J. Levi Said, “Reviving Horndeski theory using
1524
+ teleparallel gravity after GW170817,” Phys. Rev. D 101 (2020) no. 8, 084060, arXiv:1907.10057 [gr-qc].
1525
+ [67] S. Bahamonde, M. Caruana, K. F. Dialektopoulos, V. Gakis, M. Hohmann, J. Levi Said, E. N. Saridakis, and
1526
+ J. Sultana, “Gravitational-wave propagation and polarizations in the teleparallel analog of Horndeski gravity,”
1527
+ Phys. Rev. D 104 (2021) no. 8, 084082, arXiv:2105.13243 [gr-qc].
1528
+
1529
+ 18
1530
+ [68] J. M. Ezquiaga and M. Zumalac´arregui, “Dark Energy After GW170817: Dead Ends and the Road Ahead,”
1531
+ Phys. Rev. Lett. 119 (2017) no. 25, 251304, arXiv:1710.05901 [astro-ph.CO].
1532
+ [69] S. Bahamonde, K. F. Dialektopoulos, M. Hohmann, and J. Levi Said, “Post-Newtonian limit of Teleparallel
1533
+ Horndeski gravity,” Class. Quant. Grav. 38 (2020) no. 2, 025006, arXiv:2003.11554 [gr-qc].
1534
+ [70] R. C. Bernardo, J. L. Said, M. Caruana, and S. Appleby, “Well-tempered teleparallel Horndeski cosmology: a
1535
+ teleparallel variation to the cosmological constant problem,” JCAP 10 (2021) 078,
1536
+ arXiv:2107.08762 [gr-qc].
1537
+ [71] R. C. Bernardo, J. L. Said, M. Caruana, and S. Appleby, “Well-tempered Minkowski solutions in teleparallel
1538
+ Horndeski theory,” Class. Quant. Grav. 39 (2022) no. 1, 015013, arXiv:2108.02500 [gr-qc].
1539
+ [72] S. Capozziello, M. De Laurentis, and K. F. Dialektopoulos, “Noether symmetries in Gauss–Bonnet-teleparallel
1540
+ cosmology,” Eur. Phys. J. C 76 (2016) no. 11, 629, arXiv:1609.09289 [gr-qc].
1541
+ [73] S. Capozziello, K. F. Dialektopoulos, and S. V. Sushkov, “Classification of the Horndeski cosmologies via
1542
+ Noether Symmetries,” Eur. Phys. J. C 78 (2018) no. 6, 447, arXiv:1803.01429 [gr-qc].
1543
+ [74] K. F. Dialektopoulos and S. Capozziello, “Noether Symmetries as a geometric criterion to select theories of
1544
+ gravity,” Int. J. Geom. Meth. Mod. Phys. 15 (2018) no. supp01, 1840007, arXiv:1808.03484 [gr-qc].
1545
+ [75] K. F. Dialektopoulos, J. L. Said, and Z. Oikonomopoulou, “Classification of teleparallel Horndeski cosmology
1546
+ via Noether symmetries,” Eur. Phys. J. C 82 (2022) no. 3, 259, arXiv:2112.15045 [gr-qc].
1547
+ [76] F. Bajardi and S. Capozziello, Noether Symmetries in Theories of Gravity. Cambridge Monographs on
1548
+ Mathematical Physics. Cambridge University Press, 11, 2022.
1549
+ [77] F. W. Hehl, P. Von Der Heyde, G. D. Kerlick, and J. M. Nester, “General Relativity with Spin and Torsion:
1550
+ Foundations and Prospects,” Rev. Mod. Phys. 48 (1976) 393–416.
1551
+ [78] M. Krˇsˇs´ak and E. N. Saridakis, “The covariant formulation of f(T) gravity,”
1552
+ Class. Quant. Grav. 33 (2016) no. 11, 115009, arXiv:1510.08432 [gr-qc].
1553
+ [79] R. Weitzenb¨ock, Invariantentheorie. P. Noordhoff, Groningen, 1923.
1554
+ [80] R. Aldrovandi, P. B. Barros, and J. G. Pereira, “Spin and anholonomy in general relativity,”
1555
+ arXiv:gr-qc/0402022.
1556
+ [81] K. Hayashi and T. Shirafuji, “New General Relativity,” Phys. Rev. D 19 (1979) 3524–3553. [Addendum:
1557
+ Phys.Rev.D 24, 3312–3314 (1982)].
1558
+ [82] S. Capozziello, G. Lambiase, and C. Stornaiolo, “Geometric classification of the torsion tensor in space-time,”
1559
+ Annalen Phys. 10 (2001) 713–727, arXiv:gr-qc/0101038.
1560
+ [83] S. Bahamonde, C. G. B¨ohmer, and M. Krˇsˇs´ak, “New classes of modified teleparallel gravity models,”
1561
+ Phys. Lett. B 775 (2017) 37–43, arXiv:1706.04920 [gr-qc].
1562
+ [84] S. Nesseris, S. Basilakos, E. N. Saridakis, and L. Perivolaropoulos, “Viable f(T ) models are practically
1563
+ indistinguishable from ΛCDM,” Phys. Rev. D 88 (2013) 103010, arXiv:1308.6142 [astro-ph.CO].
1564
+ [85] T. Koivisto, M. Hohmann, and L. Marzola, “Axiomatic derivation of coincident general relativity and its
1565
+ premetric extension,” Phys. Rev. D 103 (2021) no. 6, 064041, arXiv:1909.10415 [gr-qc].
1566
+ [86] F. W. Hehl, J. D. McCrea, E. W. Mielke, and Y. Ne’eman, “Metric affine gauge theory of gravity: Field
1567
+ equations, Noether identities, world spinors, and breaking of dilation invariance,”
1568
+ Phys. Rept. 258 (1995) 1–171, arXiv:gr-qc/9402012.
1569
+ [87] J. Beltr´an Jim´enez, L. Heisenberg, and T. S. Koivisto, “The Geometrical Trinity of Gravity,”
1570
+ Universe 5 (2019) no. 7, 173, arXiv:1903.06830 [hep-th].
1571
+ [88] J. Beltr´an Jim´enez, L. Heisenberg, and T. Koivisto, “The coupling of matter and spacetime geometry,”
1572
+ Class. Quant. Grav. 37 (2020) no. 19, 195013, arXiv:2004.04606 [hep-th].
1573
+ [89] S. Bahamonde, V. Gakis, S. Kiorpelidi, T. Koivisto, J. Levi Said, and E. N. Saridakis, “Cosmological
1574
+ perturbations in modified teleparallel gravity models: Boundary term extension,”
1575
+ Eur. Phys. J. C 81 (2021) no. 1, 53, arXiv:2009.02168 [gr-qc].
1576
+ [90] H. Abedi and S. Capozziello, “Gravitational waves in modified teleparallel theories of gravity,”
1577
+ Eur. Phys. J. C 78 (2018) no. 6, 474, arXiv:1712.05933 [gr-qc].
1578
+ [91] H. Abedi, S. Capozziello, R. D’Agostino, and O. Luongo, “Effective gravitational coupling in modified
1579
+ teleparallel theories,” Phys. Rev. D 97 (2018) no. 8, 084008, arXiv:1803.07171 [gr-qc].
1580
+ [92] Y.-P. Wu and C.-Q. Geng, “Matter Density Perturbations in Modified Teleparallel Theories,”
1581
+ JHEP 11 (2012) 142, arXiv:1211.1778 [gr-qc].
1582
+ [93] S.-H. Chen, J. B. Dent, S. Dutta, and E. N. Saridakis, “Cosmological perturbations in f(T) gravity,”
1583
+ Phys. Rev. D 83 (2011) 023508, arXiv:1008.1250 [astro-ph.CO].
1584
+ [94] M. Bruni, S. Matarrese, S. Mollerach, and S. Sonego, “Perturbations of space-time: Gauge transformations
1585
+ and gauge invariance at second order and beyond,” Class. Quant. Grav. 14 (1997) 2585–2606,
1586
+ arXiv:gr-qc/9609040.
1587
+ [95] K. A. Malik and D. Wands, “Cosmological perturbations,” Phys. Rept. 475 (2009) 1–51,
1588
+ arXiv:0809.4944 [astro-ph].
1589
+ [96] K. Nakamura, “Gauge-invariant formulation of the second-order cosmological perturbations,”
1590
+ Phys. Rev. D 74 (2006) 101301, arXiv:gr-qc/0605107.
1591
+
1592
+ 19
1593
+ [97] M. Hohmann, “General cosmological perturbations in teleparallel gravity,”
1594
+ Eur. Phys. J. Plus 136 (2021) no. 1, 65, arXiv:2011.02491 [gr-qc].
1595
+ [98] K. Izumi and Y. C. Ong, “Cosmological Perturbation in f(T) Gravity Revisited,” JCAP 06 (2013) 029,
1596
+ arXiv:1212.5774 [gr-qc].
1597
+ [99] A. De Felice and S. Tsujikawa, “f(R) theories,” Living Rev. Rel. 13 (2010) 3, arXiv:1002.4928 [gr-qc].
1598
+ [100] M. Gonzalez-Espinoza, G. Otalora, and J. Saavedra, “Stability of scalar perturbations in scalar-torsion f(T,φ)
1599
+ gravity theories in the presence of a matter fluid,” JCAP 10 (2021) 007, arXiv:2101.09123 [gr-qc].
1600
+ [101] T. Kobayashi, “Horndeski theory and beyond: a review,” Rept. Prog. Phys. 82 (2019) no. 8, 086901,
1601
+ arXiv:1901.07183 [gr-qc].
1602
+ [102] S. Bahamonde, M. Caruana, K. F. Dialektopoulos, V. Gakis, M. Hohmann, J. Levi Said, E. N. Saridakis, and
1603
+ J. Sultana, “Gravitational-wave propagation and polarizations in the teleparallel analog of Horndeski gravity,”
1604
+ Phys. Rev. D 104 (2021) no. 8, 084082, arXiv:2105.13243 [gr-qc].
1605
+ [103] LIGO Scientific, Virgo Collaboration, B. P. Abbott et al., “GW170817: Observation of Gravitational
1606
+ Waves from a Binary Neutron Star Inspiral,” Phys. Rev. Lett. 119 (2017) no. 16, 161101,
1607
+ arXiv:1710.05832 [gr-qc].
1608
+ [104] A. De Felice and S. Tsujikawa, “Conditions for the cosmological viability of the most general scalar-tensor
1609
+ theories and their applications to extended Galileon dark energy models,” JCAP 02 (2012) 007,
1610
+ arXiv:1110.3878 [gr-qc].
1611
+ [105] T. Kobayashi, M. Yamaguchi, and J. Yokoyama, “Generalized G-inflation: Inflation with the most general
1612
+ second-order field equations,” Prog. Theor. Phys. 126 (2011) 511–529, arXiv:1105.5723 [hep-th].
1613
+ [106] X. Gao and D. A. Steer, “Inflation and primordial non-Gaussianities of ’generalized Galileons’,”
1614
+ JCAP 12 (2011) 019, arXiv:1107.2642 [astro-ph.CO].
1615
+ [107] C. Brans and R. H. Dicke, “Mach’s principle and a relativistic theory of gravitation,”
1616
+ Phys. Rev. 124 (1961) 925–935.
1617
+ [108] A. De Felice and S. Tsujikawa, “Generalized Brans-Dicke theories,” JCAP 07 (2010) 024,
1618
+ arXiv:1005.0868 [astro-ph.CO].
1619
+ [109] M. Hohmann, L. J¨arv, and U. Ualikhanova, “Covariant formulation of scalar-torsion gravity,”
1620
+ Phys. Rev. D 97 (2018) no. 10, 104011, arXiv:1801.05786 [gr-qc].
1621
+ [110] J. Gleyzes, D. Langlois, F. Piazza, and F. Vernizzi, “Essential Building Blocks of Dark Energy,”
1622
+ JCAP 08 (2013) 025, arXiv:1304.4840 [hep-th].
1623
+ [111] L. A. Gergely and S. Tsujikawa, “Effective field theory of modified gravity with two scalar fields: dark energy
1624
+ and dark matter,” Phys. Rev. D 89 (2014) no. 6, 064059, arXiv:1402.0553 [hep-th].
1625
+ [112] S. Capozziello and A. De Felice, “f(R) cosmology by Noether’s symmetry,” JCAP 08 (2008) 016,
1626
+ arXiv:0804.2163 [gr-qc].
1627
+ [113] H. ¨Ozer and O. Delice, “Gravitational waves in Brans–Dicke theory with a cosmological constant,”
1628
+ Eur. Phys. J. C 81 (2021) no. 4, 326, arXiv:2101.03594 [gr-qc].
1629
+ [114] P. Teyssandier and P. Tourrenc, “The Cauchy problem for the R+R**2 theories of gravity without torsion,”
1630
+ J. Math. Phys. 24 (1983) 2793.
1631
+
ENE3T4oBgHgl3EQfVQoB/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9AzT4oBgHgl3EQfi_2P/content/2301.01509v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:07e21ad1e3749d72d14f3450de96a1987caf8af15e4219a83685673e191b2892
3
+ size 5782055
HNE3T4oBgHgl3EQfuAs1/content/2301.04680v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:091943ee86890723cd377fd9dcfe5cc211fb8f8605a487252dd349ab8b689463
3
+ size 2551024
HNE3T4oBgHgl3EQfuAs1/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bc29f16265a200e6a62f4102eb36b664c15474d707639c7f1268fed2429017d4
3
+ size 3604525
HNE3T4oBgHgl3EQfuAs1/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:93934a7777fba30bbfa76fcff6cbba9bb2f9b2637966255970ea35cabcb52cd6
3
+ size 142022
HtFIT4oBgHgl3EQfXys9/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:05b96c8e6e4d08672ea566113f2a42c8e29a820cf1dbd734b8aa9b74d4e0a6c7
3
+ size 3670061
INFJT4oBgHgl3EQfFiwP/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:96bd4679b91c1714ae1cb16068467d7e61660d05b9931faea78b54487f274994
3
+ size 9961517
IdAzT4oBgHgl3EQfU_z6/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2a16d913678fda4af25ab7494a805a075e93a86ba7157da90df40c16f42443ba
3
+ size 4456493
JdFAT4oBgHgl3EQfvB7v/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1e657eb74ffe2cdb9f42e8ef63ff0b4a324edb924adbd6ab1dcf545040c70ec8
3
+ size 2228269
JtAzT4oBgHgl3EQfj_0_/content/tmp_files/2301.01524v1.pdf.txt ADDED
@@ -0,0 +1,911 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dynamic Behavior of a Railway Track Under a Moving Wheel
2
+ Load Modelled as a Sinusoidal Pulse
3
+ Mohammed Touati1, Nouzha Lamdouar1 and Chakir Tajani2,∗
4
+ 1Civil Department, Mohammadia School of Engineers -Mohammed V University - Morocco
5
6
+ 2Department of Mathematics, Polydisciplinary faculty of Larache,
7
+ Abdelmalek Essadi University, Morocco
8
9
+ Abstract
10
+ The aim of this paper is to evaluate the train/track induced loads on the substructure
11
+ by modelling the wheel, at each instant, as a moving sinusoidal pulse applied in a very short
12
+ period of time. This assumption has the advantage of being more realistic as it reduces the
13
+ impact of time on the load definition. To that end, mass, stiffness, and dumping matrices
14
+ of an elementary section of track will be determined. As a result, the equations of motion
15
+ of a section of track subjected to a sinusoidal pulse and a rectangular pulse respectively is
16
+ concluded. Two numerical methods of resolution of that equation, depending on the nature
17
+ of the dumping matrix, will be presented. The computation results will be compared in
18
+ order to conclude about the relevance of that load model. This approach is used in order to
19
+ assess the nature and the value of the loads received by the substructure.
20
+ 2020 MSC: Primary 74S05, 37M05, 74-10 Secondary 37N30
21
+ Key Words and Phrases: Dynamic properties, Finite elements modelling, Railway
22
+ track dynamics, Sinusoidal pulse load.
23
+ 1
24
+ Introduction
25
+ Various theoretical and experimental researches have been performed in order to assess train/track
26
+ induced loads on the substructure. Mohammed Touati and al. [1] determined the loads induced
27
+ by a non-linear 3D multi-body modelled train on the track with taking into account wheel/rail
28
+ contact properties and track irregularities. Yang Xinwen and al. [2] concluded, through a vehicle-
29
+ track-subgrade coupling dynamic theory and finite element method, about the train/track in-
30
+ duced loads on each layer of the substructure. As an experimental study, Al Shaer and al. [3]
31
+ presented the dynamic behavior of a portion of ballasted railway track subjected to cyclic loads
32
+ in substitution of a moving wheelset. In conclusion, the dynamics behavior of the substructure
33
+ is widely studied in the literature [4-8] based on the train/track coupling model.
34
+ Actually, even if modelling a wheel load as a rectangular pulse is a common assumption, real
35
+ measurements don’t show the same shape. In fact, ONCF (Moroccan railway network manager)
36
+ has many tools that record wheel pulse like GOTCHA. This system shows that the shape of
37
+ the load has never been rectangular, but it’s more likely compared to a sinusoidal pulse. Then,
38
+ this paper deals with evaluating train/track induced loads on the substructure by proposing a
39
+ new approach when it comes to modelling the shape of the wheel impact. Indeed, it’s common
40
+ to consider a moving load as a rectangular impulse applied on the nodes of a mesh structure in
41
+ each period of time depending on signal sampling. This paper shows that assuming the wheel
42
+ 1
43
+ arXiv:2301.01524v1 [math.NA] 4 Jan 2023
44
+
45
+ Figure 1:
46
+ Elementary track modelling
47
+ load as a sinusoidal pulse may reduce the impact of the period of time of its application and,
48
+ consequently, minimize the loads induced on the substructure oversized by the common assump-
49
+ tion. In that matter, a finite element model of the track will be presented and the numerical
50
+ results will be compared.
51
+ 2
52
+ Track elementary section modeling
53
+ 2.1
54
+ Determination of mass, stiffness et dumping matrices
55
+ Let’s assume a portion of ballasted track composed of two elements of rail considered as a contin-
56
+ uous Euler-Bernoulli beam, fixed to two sleepers by a couples of springs/dampers representing
57
+ the railpads. The ballast is modelled as a couples of springs/dampers under each sleeper (Figure
58
+ 1).
59
+ The displacement vector is written as:
60
+ U = [u1, θ1, u2, θ2, u3, θ3, uT1, uT2]
61
+ The effective mass and the stiffness matrices of an element of rail [9], are given by:
62
+ Mr = (ρrArL/420)
63
+
64
+ �������
65
+ 156
66
+ 22L
67
+ 54
68
+ −13L
69
+ 0
70
+ 0
71
+ 22L
72
+ 4L2
73
+ 13L
74
+ −3L2
75
+ 0
76
+ 0
77
+ 54
78
+ 13L
79
+ 312
80
+ 0
81
+ 54
82
+ −13L
83
+ −13L
84
+ −3L2
85
+ 0
86
+ 8L2
87
+ 13L
88
+ −3L2
89
+ 0
90
+ 0
91
+ 54
92
+ 13L
93
+ 156
94
+ −22L
95
+ 0
96
+ 0
97
+ −13L
98
+ −3L2
99
+ −22L
100
+ 4L2
101
+
102
+ �������
103
+ Kr =
104
+
105
+ ErIr/L3�
106
+
107
+ �������
108
+ 12
109
+ 6L
110
+ −12
111
+ 6L
112
+ 0
113
+ 0
114
+ 6L
115
+ 4L2
116
+ −6L
117
+ 2L2
118
+ 0
119
+ 0
120
+ −12
121
+ −6L
122
+ 24
123
+ 0
124
+ −12
125
+ 6L
126
+ 6L
127
+ 2L2
128
+ 0
129
+ 8L2
130
+ −6L
131
+ 2L2
132
+ 0
133
+ 0
134
+ −12
135
+ −6L
136
+ 12
137
+ −6L
138
+ 0
139
+ 0
140
+ 6L
141
+ 2L2
142
+ −6L
143
+ 4L2
144
+
145
+ �������
146
+ 2
147
+
148
+ element1
149
+ blement 2
150
+ ua
151
+ 2
152
+ kn2
153
+ c
154
+ "
155
+ ur2
156
+ Masse (m-)
157
+ Masse (m-)where ρr is the density of the rail, Ar is the surface of the rail section, Er is Young modulus,
158
+ and Ir is the rail moment of inertia. The dumping matrix of the rail is obtained as a linear
159
+ combination of mass and stiffness matrices by assuming that the displacements u1 and u3 are
160
+ completely dumped by the effect of railpads.
161
+ Therefore, the dumping matrix is written as:
162
+ C∗
163
+ r = a0 · M∗
164
+ r + a1 · K∗
165
+ r
166
+ where,
167
+ M∗
168
+ r = (ρrArL/420)
169
+
170
+ ���
171
+ 4L2
172
+ 13L
173
+ −3L2
174
+ 0
175
+ 13L
176
+ 312
177
+ 0
178
+ −13L
179
+ −3L2
180
+ 0
181
+ 8L2
182
+ −3L2
183
+ 0
184
+ 13L
185
+ −3L2
186
+ 4L2
187
+
188
+ ���
189
+ K∗
190
+ r =
191
+
192
+ ErIr/L3�
193
+
194
+ ���
195
+ 4L2
196
+ −6L
197
+ 2L2
198
+ 0
199
+ −6L
200
+ 24
201
+ 0
202
+ 6L
203
+ 2L2
204
+ 0
205
+ 8L2
206
+ 2L2
207
+ 0
208
+ 6L
209
+ 2L2
210
+ 4L2
211
+
212
+ ���
213
+ a0 and a1 are concluded from the equation:
214
+ � a0
215
+ a1
216
+
217
+ =
218
+
219
+ 2ω1ω2/
220
+
221
+ ω2
222
+ 2 − ω2
223
+ 1
224
+ �� �
225
+ ω2
226
+ −ω1
227
+ −1/ω2
228
+ 1/ω1
229
+ � � ζ1
230
+ ζ2
231
+
232
+ where ωi2, (i = 1, 2) are the eigenvalues associated to the vibration of the rail described by
233
+ the matrices Mr∗ and Kr∗, and ζi, (i = 1, 2) are the dumping ratios according to the first and
234
+ second modes.
235
+ In one hand, the equation of motion of the rail is written as:
236
+ Mr ¨U ∗ + Cr ˙U ∗ + KrU ∗ = F
237
+ (1)
238
+ where Cr is the transformation of the matrix C∗
239
+ r in the base U ∗, and U ∗ is defined by:
240
+ U ∗ = [u1, θ1, u2, θ2, u3, θ3]
241
+ F is given by:
242
+ F =
243
+
244
+ �������
245
+ −ks (u1 − uT1) − cs ( ˙u1 − ˙uT1)
246
+ 0
247
+ 0
248
+ 0
249
+ −ks (u3 − uT3) − cs ( ˙u3 − ˙uT3)
250
+ 0
251
+
252
+ �������
253
+ In the other hand, the equations of motion of the sleepers are written as:
254
+ � mT ¨uT1 = ks (u1 − uT1) + cs ( ˙u1 − ˙uT1) − kbuT1 − cb ˙uT1
255
+ mT ¨uT2 = ks (u3 − uT2) + cs ( ˙u3 − ˙uT2) − kbuT2 − cb ˙uT2
256
+ (2)
257
+ From (1) and (2), we may conclude about the equation of motion of the track elementary
258
+ section as it’s modelled. It’s written as:
259
+ M ¨U + C ˙U + KU = 0
260
+ where M, C and K are the mass, dumping, and the stiffness of the track elementary section
261
+ respectively.
262
+ 3
263
+
264
+ Symbol
265
+ Quantity
266
+ Value
267
+ ρr
268
+ Rail density (kg/m3)
269
+ 7850
270
+ Ar
271
+ Rail section surface (cm²)
272
+ 76.70
273
+ Er
274
+ Young modulus of the rail (GPa)
275
+ 210
276
+ Ir
277
+ Rail moment of inertia (cm4)
278
+ 3038.6
279
+ mT
280
+ Sleeper mass (kg)
281
+ 90.84
282
+ ks
283
+ Railpad stiffness (MN/m)
284
+ 90
285
+ cs
286
+ Railpad damping (kN.s/m)
287
+ 30
288
+ kb
289
+ Ballast stiffness (MN/m)
290
+ 25.5
291
+ cb
292
+ Ballast damping (kN.s/m)
293
+ 40
294
+ ζ
295
+ Rail dumping ratio
296
+ 5%
297
+ Table 1: Track properties
298
+ 2.2
299
+ Numerical application
300
+ Let’s assume a track elementary section characterized by the data given in table 1 (we can refer
301
+ to ([10], [11], [12]).
302
+ The figure 2 illustrates the evolution of natural frequencies according to vibration modes. It
303
+ shows that:
304
+ • The frequencies of the 1st and 2nd modes correspond to a movement in phase between rail
305
+ and sleepers. It’s equal to 81.62 Hz;
306
+ • The frequency of the 3rd mode corresponds to a movement in opposition of phase between
307
+ rail and sleepers. It’s equal to 381.1 Hz.
308
+ 3
309
+ Track response to a rectangular and a sinusoidal pulses
310
+ 3.1
311
+ Description of the studied track
312
+ Let’s assume a section of track composed of N track elementary sections subjected to an external
313
+ load F as it’s shown in figure 3.
314
+ The number of degrees of freedom is given by:
315
+ Ndof = 8N − 3(N − 1)
316
+ The displacement vector is written as:
317
+ U =
318
+
319
+ ���
320
+ ...
321
+ uj,k
322
+ ...
323
+
324
+ ���
325
+ where,
326
+ � uj,k = u∗
327
+ j,k
328
+ where
329
+ k ∈ [1, 8]
330
+ if
331
+ j = 1
332
+ uj,k = u∗
333
+ j,k
334
+ where
335
+ k ∈ [3, 4, 5, 6, 8]
336
+ if
337
+ j ̸= 1
338
+ and,
339
+ U ∗
340
+ j = [uj,1, θj,1, uj,2, θj,2, uj,3, θj,3, uj,T1, uj,T2]
341
+ 4
342
+
343
+ Figure 2:
344
+ Natural frequencies of an elementary track section
345
+ Figure 3:
346
+ Track section modelling
347
+ 5
348
+
349
+ 4.5
350
+ X104
351
+ 3.5
352
+ (ZH)
353
+ 3
354
+ 2.5
355
+ 2
356
+ 1.5
357
+ 1
358
+ 0.5
359
+ 0
360
+ 0
361
+ 0
362
+ 0
363
+ 1
364
+ 2
365
+ 3
366
+ 4
367
+ 5
368
+ 6
369
+ 7
370
+ 8
371
+ 6
372
+ 10
373
+ NumerodumodeFigure 4:
374
+ Sinusoidal and rectangular pulses over a period of td
375
+ j refers to the element’s number.
376
+ The mass, stiffness and dumping matrices in the base U are obtained by assembling those
377
+ of a track elementary section determined earlier.
378
+ The vector of loads is defined by:
379
+ F =
380
+
381
+ ���
382
+ ...
383
+ fj
384
+ ...
385
+
386
+ ���
387
+ where,
388
+
389
+
390
+
391
+
392
+
393
+
394
+
395
+
396
+
397
+
398
+
399
+
400
+
401
+
402
+
403
+
404
+
405
+
406
+
407
+
408
+
409
+
410
+
411
+ N is even
412
+
413
+
414
+
415
+
416
+
417
+
418
+
419
+
420
+
421
+
422
+
423
+ N = 2
424
+ � fj = P
425
+ if
426
+ j = 5
427
+ fj = 0
428
+ else
429
+ N ̸= 2
430
+ � fj = P
431
+ if
432
+ j = (5N/2) + 1
433
+ fj = 0
434
+ else
435
+ N is uneven
436
+ � fj = P
437
+ if j = (5(N + 1)/2) − 1
438
+ fj = 0
439
+ else
440
+ P is a rectangular or a sinusoidal load given as:
441
+ • Sinusoidal pulse:
442
+ � P = P0 sin ωt
443
+ if
444
+ t ≤ td
445
+ P = 0
446
+ else
447
+ • Rectangular pulse:
448
+ � P = P0
449
+ if
450
+ t ≤ td
451
+ P = 0
452
+ else
453
+ Its shape is shown in the figure 4.
454
+ 6
455
+
456
+ sinusoidal pulse
457
+ rectangular pulse
458
+ PO
459
+ P
460
+ x=0
461
+ x=td
462
+ X = 2td
463
+ →3.2
464
+ Description of the methods of resolution
465
+ The dynamic behavior of the section of track may be analyzed by modal superposition if the
466
+ dumping matrix verifies orthogonality properties.
467
+ That method is used in particular for an
468
+ undumped system. In that case, the equation of motion is reduced to:
469
+ M ¨U + KU = F
470
+ Let’s assume that ω2
471
+ i are the eigenvalues associated to the track vibration. We note {φi} the
472
+ normalized eigenvectors related to ω2
473
+ i . Therefore, the equation of motion is written as:
474
+ ¨Z + diag(ω2
475
+ i )Z = φT F
476
+ (3)
477
+ where diag(ω2
478
+ i ) is a diagonal matrix of the eigenvalues and:
479
+ U = Φ.Z
480
+ The system of equations (3) is uncoupled where each equation is written as:
481
+ ¨zi + ω2
482
+ i zi = Φj,iP(t)
483
+ The resolution of that equation is given by DUHAMEL integral:
484
+ zi(t) = (1/ωi)
485
+ � t
486
+ 0
487
+ Φj,iP(τ) sin ωi(t − τ)dτ
488
+ Therefore, the solution for a sinusoidal pulse load is given as:
489
+ zi(t) =
490
+ � (Φj,iP0/ω2
491
+ i ).(1/(1 − β2))(sin ωt − β sin ωit)
492
+ if
493
+ t ≤ td
494
+ ( ˙zi(td)/ωi) sin ωi(t − td) + zi(td) cos ωi(t − td)
495
+ if
496
+ t ≥ td
497
+ where,
498
+ β = ω/ωi
499
+ and the solution for a rectangular pulse load is given as:
500
+ zi(t) =
501
+ � (Φj,iP0/ω2
502
+ i )(1 − cos ωit)
503
+ if
504
+ t ≤ td
505
+ (Φj,iP0/ω2
506
+ i )(cos ωi(t − td) − cos ωit
507
+ if
508
+ t ≥ td
509
+ The figure 5 shows the response z(t) to a sinusoidal and a rectangular pulse. It’s obvious that
510
+ in the forced phase, the maximum rectangular response is higher than the maximum sinusoidal
511
+ response.
512
+ In general, the dumping matrix doesn’t verify the orthogonality characteristics. Therefore,
513
+ the modal superposition method is substituted by the following method.
514
+ The equation of motion can be written as:
515
+ ¨Z + φT Cφ. ˙Z + diag(ω2
516
+ i ).Z = φT F
517
+ (4)
518
+ Where diag(ωi2) and φ are defined earlier. Knowing that:
519
+ ˙Z − ˙Z = 0
520
+ (5)
521
+ (4) and (5) could be written as:
522
+ ˙Y = D.Y + F ∗
523
+ (6)
524
+ 7
525
+
526
+ Figure 5:
527
+ z(t) response to a rectangular and sinusoidal pulse td/T = 0.75
528
+ where,
529
+ Y =
530
+ � Z
531
+ ˙Z
532
+
533
+ ,
534
+ D = A−1B,
535
+ F ∗ = A−1
536
+ � φT F
537
+ 0
538
+
539
+ and,
540
+ A =
541
+ � φT Cφ
542
+ I
543
+ I
544
+ 0
545
+
546
+ ,
547
+ B =
548
+ � diag(ω2
549
+ i )
550
+ 0
551
+ 0
552
+ −I
553
+
554
+ Let’s assume that {λi} are the eigenvalues associated to the matrix D. We note {ψi} the
555
+ normalized eigenvectors related to {ωi2}. We define X(t) as:
556
+ Z = ψ.X
557
+ The equation (6) is written as:
558
+ ˙X = diag(λi).X + ψ−1F ∗
559
+ (7)
560
+ The system of equations (7) is uncoupled where each equation is written as:
561
+ ˙xi(t) = ai.xi(t) + bi.P
562
+ (8)
563
+ where,
564
+ ai = λi
565
+ and
566
+ bi = χi
567
+ and,
568
+ χ = ψ−1
569
+ � φT
570
+ 0
571
+ 0
572
+ 0
573
+
574
+ The resolution of the equation (8) gives:
575
+ 8
576
+
577
+ sinusoidal pulse
578
+ rectangularpulse
579
+ 2
580
+ -2
581
+ -3
582
+ -4
583
+ X=0
584
+ PI = X
585
+ x = 2td
586
+ PI =X
587
+ X = 4td
588
+ t• Sinusoidal pulse:
589
+ xi(t) =
590
+
591
+ biPω
592
+ a2
593
+ i +ω2 eait − aibiP
594
+ a2
595
+ i +ω2 sin ωt −
596
+ biPω
597
+ a2
598
+ i +ω2 cos ωt
599
+ if
600
+ t ≤ td
601
+ xi(td)eai(t−td)
602
+ if
603
+ t ≥ td
604
+ • Rectangular pulse:
605
+ xi(t) =
606
+ � (bP/a)(eait − 1)
607
+ if
608
+ t ≤ td
609
+ xi(td)eai(t−td)
610
+ if
611
+ t ≥ td
612
+ 3.3
613
+ Results and discussion
614
+ The figures presented in this section show the numerical resolution of the system of equations
615
+ of a dumped track section subjected to a rectangular and sinusoidal loads. The properties of
616
+ the track are defined in table 1. In figure 6 and figure 7, the sinusoidal pulse is presented in red;
617
+ however, the rectangular pulse is presented in black.
618
+ 1. Displacements and rotations of the rail
619
+ 2. Displacements of the sleepers
620
+ It’s clear that the maximum values of rail and sleepers movement under rectangular pulse
621
+ are higher than those reached under a sinusoidal pulse. The figure 8 shows the maximum loads
622
+ induced in the substructure. The table 2 shows the repartition of the loads under the sleepers.
623
+ These results have many consequences in the railway field. Actually, we may optimize railway
624
+ infrastructure components for example (like ballast height). Moreover, the study is made by
625
+ considering a static load (10 T). This load is mainly amplified by rail/wheel interaction and
626
+ train speed [1].
627
+ Sleeper
628
+ number
629
+ % of load
630
+ (undumped -
631
+ sinusoidal load)
632
+ % of load
633
+ (dumped -
634
+ sinusoidal load)
635
+ % of load
636
+ (undumped -
637
+ rectangular
638
+ load)
639
+ % of load
640
+ (dumped -
641
+ rectangular
642
+ load)
643
+ 13
644
+ 4.49%
645
+ 1.73%
646
+ 5.50%
647
+ -
648
+ 14
649
+ 11.52%
650
+ 6.12%
651
+ 13.66%
652
+ 6.63%
653
+ 15
654
+ 23.24%
655
+ 15.29%
656
+ 26.00%
657
+ 16.41%
658
+ 16
659
+ 30.78%
660
+ 22.43%
661
+ 34.35%
662
+ 23.55%
663
+ 17
664
+ 23.24%
665
+ 15.29%
666
+ 26.00%
667
+ 16.41%
668
+ 18
669
+ 11.52%
670
+ 6.12%
671
+ 13.66%
672
+ 6.63%
673
+ 19
674
+ 4.49%
675
+ 1.73%
676
+ 5.50%
677
+ -
678
+ Table 2:
679
+ Repartition of the loads under the sleepers (N = 30, td = 0.01s and P = 10 T)
680
+ 4
681
+ Conclusion
682
+ Based on the results of the model analysis studied in order to determine the loads induced on
683
+ the substructure, the following conclusions can be drawn:
684
+ 9
685
+
686
+ Figure 6:
687
+ Rail response under sinusoidal and rectangular pulse (N = 4, td = 0.01s and P = 10
688
+ T)
689
+ 10
690
+
691
+ 10-
692
+ X10-
693
+ X104
694
+ X10-
695
+ w)
696
+ 0
697
+ 0.02
698
+ 0.04
699
+ 0.06
700
+ 0.02
701
+ 0.04
702
+ 0.06
703
+ 0
704
+ 0.02
705
+ 0.04
706
+ 0.06
707
+ 0
708
+ 0.02
709
+ 0.04
710
+ 0.06
711
+ t (s)
712
+ t (s)
713
+ t (s)
714
+ t (s)
715
+ a) Displacements and rotations of the 1st node
716
+ f) Displacements and rotations of the 6th node
717
+ ×10~4
718
+ X104
719
+ (pe))
720
+ X104
721
+ PO'O
722
+ 0.06
723
+ 0.02
724
+ 0.04
725
+ 0.06
726
+ t (s)
727
+ t (s)
728
+ b) Displacements and rotations of the 2nd node
729
+ 0.02
730
+ 0.04
731
+ 0.06
732
+ 0.02
733
+ 0.04
734
+ 0.06
735
+ t (s)
736
+ t (s)
737
+ 104
738
+ g) Displacements and rotations of the 7th node
739
+ (e)
740
+ X104
741
+ 0.02
742
+ 0.06
743
+ 0
744
+ 0.02
745
+ 0.04
746
+ 0.06
747
+ t (s)
748
+ t (s)
749
+ c) Displacements and rotations of the 3rd node
750
+ 0.02
751
+ 0.04
752
+ 90'0
753
+ 0
754
+ 0.02
755
+ 0.06
756
+ t (s)
757
+ t (s)
758
+ ×10+
759
+ X104
760
+ h) Displacements and rotations of the 8th node
761
+ 10-4
762
+ 10
763
+ 5-10
764
+ 0.02
765
+ 0.04
766
+ 0.06
767
+ 0.02
768
+ 0.04
769
+ 0.06
770
+ t (s)
771
+ t (s)
772
+ d) Displacements and rotations of the 4th node
773
+ 0.020.04
774
+ 0.06
775
+ t (s)
776
+ 0.02
777
+ 0.04
778
+ 0.06
779
+ t (s)
780
+ i) Displacements and rotations of the 9th node
781
+ ×10
782
+ X10-19
783
+ -
784
+ 0.02
785
+ PO'O
786
+ 0.06
787
+ 2
788
+ 0.02
789
+ 0.04
790
+ 0.06
791
+ t (s)
792
+ t (s)
793
+ e) Displacements and rotations of the 5th nodeFigure 7:
794
+ Sleeper response under sinusoidal and rectangular pulse (N = 4, td = 0.01s and P =
795
+ 10 T)
796
+ Figure 8:
797
+ Loads induced in the substructure (N = 30, td = 0.01s and P = 10 T)
798
+ 11
799
+
800
+ 10-4
801
+ ×10
802
+ [w)
803
+ -2
804
+ -2
805
+ 0
806
+ 0.02
807
+ 0.04
808
+ 0.06
809
+ 0
810
+ 0.02
811
+ 0.04
812
+ 0.06
813
+ t (s)
814
+ t (s)
815
+ a) Sleeper 1
816
+ b) Sleeper 2
817
+ ×104
818
+ cement (m)
819
+ X104
820
+ -2
821
+ -5
822
+ 10
823
+ 0
824
+ 0.02
825
+ 0.04
826
+ 0.06
827
+ 0
828
+ 0.02
829
+ 0.04
830
+ 0.06
831
+ (s) 1
832
+ t (s)
833
+ c) Sleeper 3
834
+ d) Sleeper 4
835
+ 2
836
+ 0
837
+ 0.02
838
+ 0.04
839
+ 0.06
840
+ t (s)
841
+ e) Sleeper 50.5
842
+ X104
843
+ -0.5
844
+ -1
845
+ (N)
846
+ Force
847
+ -1.5
848
+ -2
849
+ -2.5
850
+ Undumped strcture-Sinusoidal pulse
851
+ Dumped strcture -Sinusoidalpulse
852
+ -3
853
+ Undumped strcture - Rectangular pulse
854
+ Dumpedstrcture-Rectangularpulse
855
+ -3.5
856
+ 1
857
+ 2
858
+ 4
859
+ 5
860
+ 6
861
+ 7
862
+ 8
863
+ 6
864
+ 101112
865
+ 13141516171819202122232425262728293031
866
+ Sleepernumber• The common modelling of the load applied on the track due to a moving wheel as a
867
+ rectangular pulse acting in the time sample of a force signal generates a higher rate of
868
+ movement in the track and over sizes the loads induced in the substructure than a sinusoidal
869
+ pulse model;
870
+ • Dumping matrix has a major influence on reducing the loads induced in the substructure.
871
+ Therefore, it’s necessary to preserve the quality of the track components while maintaining
872
+ it.
873
+ As an application, we may evaluate the track behavior according to different characteristics
874
+ of the track elements that degrade because of maintenance operations. Indeed, the ballast is
875
+ considered as the most affected element because of operations of damping required for track
876
+ geometry corrections.
877
+ References
878
+ [1] M. Touati, N. Lamdouar and A. Bouyahyaoui: Railway vehicle response under random
879
+ irregularities on a tangent track – nonlinear 3d multi-body modelling. Inter. J. of Mech.
880
+ Eng. and Tech. 9 (2018) 944–956.
881
+ [2] Y. Xiwen, G. Shaojie, Z. Shunhua, S. Yao, M. Xiaoyun: Vertical Vibration Analysis of
882
+ Vehicle-Track-Subgrade Coupled System in High Speed Railway with Dynamic Flexibility
883
+ Method. Transportation Research Procedia 25 (2017) 291–300.
884
+ [3] A. Al Shaer, D. Duhamel, K. Sab, G. Foret, L. Schmitt: Experimental settlement and
885
+ dynamic behavior of a portion of ballasted railway track under high speed trains. J. Sound
886
+ Vib. 316(1-5) (2008) 211–233.
887
+ [4] A. Kaynia, C. Madshus, P. Zackrisson: Ground Vibration from High-speed Trains: Predic-
888
+ tion and Countermeasure, J. of Geotech. and Geo-env. Eng.. 126 (2000) 531–537.
889
+ [5] H. Takemiya: Simulation of Track–ground Vibrations due to High-speed Trains, Proceedings
890
+ of the Eighth International Congress on Sound and Vibration. Hong Kong, China (2000)
891
+ 2875–2882.
892
+ [6] C. Madshus, A. Kaynia: High-speed Railway Lines on Soft Ground: Dynamic Behaviour at
893
+ Critical Train Speed, Journal of Sound and Vibration. 231(3) (2000) 689-701.
894
+ [7] S. Qian, C. Ying: A Spatial Time-Varying Coupling Model for Dynamic Analysis of High
895
+ Speed Railway Subgrade, J. of South. Jiao. Univ. (2001) 36(5) 509-513.
896
+ [8] H. Chebli, D. Clouteau and L. Schmitt: Dynamic response of high-speed ballasted rail-
897
+ way tracks: 3D periodic model and in situ measurements. Soil Dynamics and Earthquake
898
+ Engineering, 28(2) (2008) 118-131.
899
+ [9] P. Mario and L. William, Structural dynamics: Theory and Computation, Springer US,
900
+ (2004).
901
+ [10] EN 13481 : Railway applications. Track. Performance requirements for fastening systems.
902
+ Definitions.
903
+ [11] G. Kouroussis, O. Verlinden and C. Conti: Prediction of vibratory nuisances of rail transport
904
+ vehicles. In 6th National Congress of Theoretical and Applied Mechanics, Ghent (Belgium),
905
+ (2003) National Committee for Theoretical and Applied Mechanics.
906
+ 12
907
+
908
+ [12] W. Zhai and X. Sun: A detailed model for investigating vertical interaction between railway
909
+ vehicle and track. Vehicle System Dynamics 23(sup1) (1994) 603-615.
910
+ 13
911
+