jackkuo commited on
Commit
1628bd5
·
verified ·
1 Parent(s): 87089c3

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -NAyT4oBgHgl3EQfRPZI/content/tmp_files/2301.00061v1.pdf.txt +3077 -0
  2. -NAyT4oBgHgl3EQfRPZI/content/tmp_files/load_file.txt +0 -0
  3. -tAyT4oBgHgl3EQfRPa5/content/2301.00063v1.pdf +3 -0
  4. -tAyT4oBgHgl3EQfRPa5/vector_store/index.faiss +3 -0
  5. -tAyT4oBgHgl3EQfRPa5/vector_store/index.pkl +3 -0
  6. .gitattributes +57 -0
  7. 29E2T4oBgHgl3EQf5whX/content/tmp_files/2301.04193v1.pdf.txt +999 -0
  8. 29E2T4oBgHgl3EQf5whX/content/tmp_files/load_file.txt +0 -0
  9. 3NAzT4oBgHgl3EQfR_tE/content/2301.01224v1.pdf +3 -0
  10. 5NE3T4oBgHgl3EQfpArI/content/tmp_files/2301.04639v1.pdf.txt +131 -0
  11. 5NE3T4oBgHgl3EQfpArI/content/tmp_files/load_file.txt +95 -0
  12. 5dAyT4oBgHgl3EQfcfda/content/2301.00283v1.pdf +3 -0
  13. 5dAyT4oBgHgl3EQfcfda/vector_store/index.faiss +3 -0
  14. 5dAyT4oBgHgl3EQfcfda/vector_store/index.pkl +3 -0
  15. 7NE3T4oBgHgl3EQfqApm/content/tmp_files/2301.04647v1.pdf.txt +0 -0
  16. 7tAzT4oBgHgl3EQfSPsA/content/2301.01227v1.pdf +3 -0
  17. 7tAzT4oBgHgl3EQfSPsA/vector_store/index.faiss +3 -0
  18. 7tAzT4oBgHgl3EQfSPsA/vector_store/index.pkl +3 -0
  19. 8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/2301.04216v1.pdf.txt +1215 -0
  20. 8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/load_file.txt +0 -0
  21. 99E5T4oBgHgl3EQfRQ7z/content/tmp_files/2301.05520v1.pdf.txt +2503 -0
  22. 99E5T4oBgHgl3EQfRQ7z/content/tmp_files/load_file.txt +0 -0
  23. 99FRT4oBgHgl3EQfrDen/content/tmp_files/2301.13619v1.pdf.txt +1011 -0
  24. 99FRT4oBgHgl3EQfrDen/content/tmp_files/load_file.txt +0 -0
  25. 9dAzT4oBgHgl3EQf-_6e/content/2301.01942v1.pdf +3 -0
  26. 9dAzT4oBgHgl3EQf-_6e/vector_store/index.faiss +3 -0
  27. 9dAzT4oBgHgl3EQf-_6e/vector_store/index.pkl +3 -0
  28. AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/2301.03553v1.pdf.txt +1891 -0
  29. AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/load_file.txt +0 -0
  30. BNAyT4oBgHgl3EQfRvex/content/tmp_files/2301.00073v1.pdf.txt +1874 -0
  31. BNAyT4oBgHgl3EQfRvex/content/tmp_files/load_file.txt +0 -0
  32. CtAzT4oBgHgl3EQfGfuT/content/tmp_files/2301.01029v1.pdf.txt +1261 -0
  33. CtAzT4oBgHgl3EQfGfuT/content/tmp_files/load_file.txt +0 -0
  34. CtE2T4oBgHgl3EQf9Ant/vector_store/index.pkl +3 -0
  35. DtAzT4oBgHgl3EQfT_x1/vector_store/index.faiss +3 -0
  36. E9AyT4oBgHgl3EQfevjq/content/tmp_files/2301.00329v1.pdf.txt +1253 -0
  37. E9AyT4oBgHgl3EQfevjq/content/tmp_files/load_file.txt +0 -0
  38. E9AzT4oBgHgl3EQfG_uu/content/tmp_files/2301.01038v1.pdf.txt +1438 -0
  39. E9AzT4oBgHgl3EQfG_uu/content/tmp_files/load_file.txt +0 -0
  40. E9E0T4oBgHgl3EQfQwCg/content/2301.02198v1.pdf +3 -0
  41. E9E0T4oBgHgl3EQfQwCg/vector_store/index.faiss +3 -0
  42. FdAyT4oBgHgl3EQfe_hY/content/tmp_files/2301.00331v1.pdf.txt +2743 -0
  43. FdAyT4oBgHgl3EQfe_hY/content/tmp_files/load_file.txt +0 -0
  44. FdE2T4oBgHgl3EQf-QlB/content/tmp_files/2301.04236v1.pdf.txt +593 -0
  45. FdE2T4oBgHgl3EQf-QlB/content/tmp_files/load_file.txt +300 -0
  46. GtE5T4oBgHgl3EQfWA9Z/vector_store/index.faiss +3 -0
  47. IdFIT4oBgHgl3EQfYSv6/content/tmp_files/2301.11248v1.pdf.txt +1567 -0
  48. IdFIT4oBgHgl3EQfYSv6/content/tmp_files/load_file.txt +0 -0
  49. JNFAT4oBgHgl3EQfvB44/content/2301.08673v1.pdf +3 -0
  50. JNFAT4oBgHgl3EQfvB44/vector_store/index.faiss +3 -0
-NAyT4oBgHgl3EQfRPZI/content/tmp_files/2301.00061v1.pdf.txt ADDED
@@ -0,0 +1,3077 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A Global Optimization Algorithm for K-Center
2
+ Clustering of One Billion Samples
3
+ Jiayang Ren1, Ningning You2, Kaixun Hua1, Chaojie Ji3, Yankai Cao1
4
+ 1Department of Chemical and Biological Engineering, University of British Columbia, Vancouver, BC, Canada,
5
6
+ 2Antai College of Economics and Management, Shanghai Jiao Tong University, Shanghai, China,
7
8
+ 3Department of Mathematics, University of British Columbia, Vancouver, BC, Canada,
9
10
+ This paper presents a practical global optimization algorithm for the K-center clustering problem, which
11
+ aims to select K samples as the cluster centers to minimize the maximum within-cluster distance. This
12
+ algorithm is based on a reduced-space branch and bound scheme and guarantees convergence to the global
13
+ optimum in a finite number of steps by only branching on the regions of centers. To improve efficiency,
14
+ we have designed a two-stage decomposable lower bound, the solution of which can be derived in a closed
15
+ form. In addition, we also propose several acceleration techniques to narrow down the region of centers,
16
+ including bounds tightening, sample reduction, and parallelization. Extensive studies on synthetic and real-
17
+ world datasets have demonstrated that our algorithm can solve the K-center problems to global optimal
18
+ within 4 hours for ten million samples in the serial mode and one billion samples in the parallel
19
+ mode. Moreover, compared with the state-of-the-art heuristic methods, the global optimum obtained by our
20
+ algorithm can averagely reduce the objective function by 25.8% on all the synthetic and real-world datasets.
21
+ Key words : global optimization; K-center clustering; branch and bound; two-stage decomposition; bounds
22
+ tightening
23
+ 1. Introduction
24
+ Cluster analysis is a task to group similar samples into the same cluster while separating less
25
+ similar samples into different clusters. It is a fundamental unsupervised machine learning task that
26
+ explores the character of datasets without the need to annotate cluster classes. Clustering plays
27
+ a vital role in various fields, such as data summarization (Kleindessner et al. 2019, Hesabi et al.
28
+ 1
29
+ arXiv:2301.00061v1 [math.OC] 30 Dec 2022
30
+
31
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
32
+ 2
33
+ 2015), customer grouping (Aggarwal et al. 2004), facility location determination (Hansen et al.
34
+ 2009), and etc.
35
+ There are several typical cluster models, including connectivity-based models, centroid-based
36
+ models, distribution-based models, density-based models, etc. This work focuses on one of the fun-
37
+ damental centroid-based clustering models called the K-center problem. The goal of the K-center
38
+ problem is to minimize the maximum within-cluster distance
39
+ (Kaufman and Rousseeuw 2009).
40
+ Specifically, given a dataset with S samples and the desired number of clusters K, the K-center
41
+ problem aims to select K samples from the dataset as centers and to minimize the maximum
42
+ distance from other samples to its closest center. The K-center problem is a combinatorial opti-
43
+ mization problem that has been widely studied in theoretical computer science (Lim et al. 2005).
44
+ Moreover, it has been intensively explored as a symmetric and uncapacitated case of the p-center
45
+ facility location problem in operations research and management science (Garcia-Diaz et al. 2019),
46
+ where the number of facilities corresponds to the variable k in a standard K-center problem.
47
+ Formally, provided a K, the objective function of K-center problem can be formulated as follows:
48
+ min
49
+ µ∈X max
50
+ s∈S min
51
+ k∈K ||xs − µk||2
52
+ 2
53
+ (1)
54
+ where X = {x1,...,xS} is the dataset with S samples and A attributes, in which xs = [xs,1,...,xs,A] ∈
55
+ RA is the sth sample and xs,a is the ath attribute of ith sample, s ∈ S := {1,··· ,S} is the index set
56
+ of samples. As to the variables related to clusters, k ∈ K := {1,··· ,K} is the index set of clusters,
57
+ µ := {µ1,··· ,µK} represents the center set of clusters, µk = [µk
58
+ 1,...,µk
59
+ A] ∈ RA is the center of kth
60
+ cluster. Here, µ are the variables to be determined in this problem. We use µ ∈ X to denote the
61
+ “centers on samples” constraint in which each cluster’s center is restricted to the existing samples.
62
+ 1.1. Literature Review
63
+ The K-center problem has been shown to be NP-hard (Gonzalez 1985), which means that it is
64
+ unlikely to find an optimal solution in polynomial time unless P = NP (Garey and Johnson 1979).
65
+ As a remedy, heuristic algorithms, which aim to find a good but not necessarily optimal solution,
66
+
67
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
68
+ 3
69
+ are often used to solve the K-center problem on large-scale datasets. The study of exact algorithms,
70
+ which provide an optimal solution but may hardly be terminated in an acceptable time, is restricted
71
+ to small-scale datasets due to this poor scalability on larger datasets.
72
+ Regarding heuristic algorithms, there are several 2-approximation algorithms that provide a
73
+ theoretical guarantee of their distance from the optimal solution for the K-center problem, but do
74
+ not provide a guarantee on their running time (Plesn´ık 1987, Gonzalez 1985, Dyer and Frieze 1985,
75
+ Hochbaum and Shmoys 1985, Cook et al. 1995). Among these 2-approximation algorithms, Furthest
76
+ Point First (FPF) algorithm proposed by Gonzalez (1985) is known to be the fastest in practice
77
+ (Miheliˇc and Robic 2005). It works by starting with a randomly selected center and then adding
78
+ points that are farthest from the existing centers to the center set. Despite their solution quality
79
+ guarantee, these 2-approximation algorithms may not always provide close-to-optimal solutions in
80
+ practice (Garcia-Diaz et al. 2019). Another kind of heuristic methods with a polynomial running
81
+ time but a weaker solution quality guarantee is also intensively studied in the literature (Miheliˇc
82
+ and Robic 2005, Garcia-Diaz et al. 2017). Besides heuristic methods, there are also metaheuristic
83
+ methods that do not have a polynomial running time or a solution quality guarantee, but have
84
+ been shown to provide near-optimal solutions in some cases (Mladenovi´c et al. 2003, Pullan 2008,
85
+ Davidovi´c et al. 2011). In sum, none of these algorithms can deterministically guarantee a global
86
+ optimal solution for the K-center problem.
87
+ In contrast to the numerous heuristic algorithms, the study of exact algorithms, which provide
88
+ the optimal solution but no solution time guarantee, is still struggling with small-scale problems
89
+ (e.g., thousands of samples). Early exact works are inspired by the relationship between K-center
90
+ and set-covering problems (Minieka 1970). Daskin (2000) transferred the K-center problem to a
91
+ maximal covering problem, in which the number of covered samples by K centers is maximized.
92
+ Then, they proposed an iterative binary search scheme to accelerate the solving procedure. Ilhan
93
+ and Pinar (2001) considered iteratively setting a maximum distance and validating if it can cover
94
+ all the samples. Elloumi et al. (2004) designed a new integer linear programming formulation of
95
+
96
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
97
+ 4
98
+ the K-center problem, then solved this new formulation by leveraging the binary search scheme
99
+ and linear programming relaxation. These algorithms have been shown to provide practical results
100
+ on small-scale datasets with up to 1,817 samples.
101
+ Another research direction models the K-center problem as a Mixed Integer Programming (MIP)
102
+ formulation, allowing for the use of the branch and bound technique to find an optimal solution.
103
+ However, the vanilla implementations of the branch and bound technique are confined to small-scale
104
+ datasets with fewer than 250 samples (Brusco and Stahl 2005). Hence, constraint programming is
105
+ introduced to address the larger scale K-center problems. Dao et al. (2013) designed two sets of
106
+ variables describing the cluster centers and sample belongings, then updated the solution through
107
+ constraint propagation and branching. They further reduced the sets of variables and proposed a
108
+ more general framework in Duong et al. (2017). By involving constraint programming, their works
109
+ can solve the datasets with up to 5,000 samples.
110
+ Recently, researchers have explored iterative techniques to solve the K-center problem on large
111
+ datasets by breaking it down into smaller subproblems, such as iterative sampling (Aloise and
112
+ Contardo 2018) and row generation (Contardo et al. 2019). In Aloise and Contardo (2018), a
113
+ sampling-based algorithm was proposed that alternates between an exact procedure on a small
114
+ subset of the data and a heuristic procedure to test the optimality of the current solution. This
115
+ algorithm is capable to solve a dataset containing 581,012 samples within 4 hours. However, a report
116
+ about the optimality gap is absent, which is an important measure of solution quality. According to
117
+ that computing the covering set for a subset of all samples is cheaper than all (Chen and Handler
118
+ 1987, Chen and Chen 2009), the same research group proposed a row generation algorithm that
119
+ relies on computing a much smaller sub-matrix (Contardo et al. 2019). This approach is able to
120
+ solve a dataset with 1 million samples to a 6% gap in 9 hours. However, neither of these methods
121
+ provides a finite-step convergence guarantee, which results in that they may not always converge
122
+ to an arbitrarily small gap within a finite number of steps. Therefore, these methods can lead to a
123
+ nontrivial optimality gap, especially for large datasets.
124
+
125
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
126
+ 5
127
+ 1.2. Main contributions
128
+ Recently, Cao and Zavala (2019) proposed a reduced-space spatial branch and bound (BB) scheme
129
+ for two-stage stochastic nonlinear programs. Hua et al. (2021) adopted this reduced-space BB
130
+ scheme and Lagrangian decomposition to solve the K-means clustering problem with a global
131
+ optimal guarantee. They solve the large-scale K-means problems up to 210,000 samples to 2.6%
132
+ optimality gap within 4 hours. However, these works can not be directly applied to the K-center
133
+ problem. The challenge is that the K-center problem minimizes the maximum within-cluster dis-
134
+ tance instead of the average within-cluster distance. Therefore, utilizing the Lagrangian decom-
135
+ position method to compute the lower bound is impossible. Moreover, because of the “centers on
136
+ samples” constraint in the K-center problem, the direct application of Hua’s algorithm will lead
137
+ to infeasible solutions.
138
+ To address these challenges, we propose a tailored reduced-space branch and bound algorithm
139
+ for the K-center problem. We also design several bounds tightening (BT) and sample reduction
140
+ methods to accelerate the BB procedure. Our algorithm is unique in that it only branches on the
141
+ region of centers, which allows us to guarantee convergence to the global optimum within a finite
142
+ number of steps. In contrast, traditional branch and bound algorithms must branch on all integer
143
+ variables, which can become computationally infeasible for large-scale problems. By focusing on
144
+ the limited region of centers, our algorithm is capable to solve even large-scale K-center problems.
145
+ Specifically, the main contributions of this paper are as follows:
146
+ • We propose an exact global optimization algorithm based on a tailored reduced-space branch
147
+ and bound scheme for the K-center problem. To increase efficiency, we develop a two-stage decom-
148
+ posable lower bounding method with a closed-form solution, eliminating the need for using any
149
+ MIP solver in the optimization process. Moreover, the convergence of our algorithm to the global
150
+ optimum is guaranteed by branching only on the region of centers.
151
+ • We demonstrate that the assignment of clusters can be determined for many samples without
152
+ knowing the optimal solution. Based on this characteristic, we propose several bounds tightening
153
+
154
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
155
+ 6
156
+ and sample reduction techniques to further reduce the search space and accelerate the solving
157
+ procedure. Moreover, we also implement a sample-level parallelization strategy to fully utilize
158
+ computational resources.
159
+ • An open-source Julia implementation of the algorithm is provided. Extensive studies on 5
160
+ synthetic and 33 real-world datasets have demonstrated that we can obtain the global solution for
161
+ datasets with up to 1 billion samples and 12 features, a feat that has not been achieved so far.
162
+ Especially, compared with the heuristic methods, the global optimum obtained by our algorithm
163
+ can averagely reduce the objective function by 25.8% on all the synthetic and real-world datasets.
164
+ This paper is an expanded version of our proceeding publication (Shi et al. 2022) that includes one
165
+ new acceleration technique called sample reduction and a parallel implementation. These improve-
166
+ ments have significantly increased the scale of the optimally solvable K-center problem from 14
167
+ million samples to 1 billion. In this version, we provide more detailed proof of the global opti-
168
+ mum convergence of our algorithm. In addition, we have designed more comprehensive numerical
169
+ experiments on a broader range of datasets and parameters.
170
+ 1.3. Outline
171
+ This paper is organized as follows: Section 2 introduces a two-stage formulation and a Mixed Integer
172
+ Nonlinear Programming (MINLP) formulation for the K-center problem. Section 3 presents the
173
+ details of the reduced-space branch and bound algorithm, including the lower bound, upper bound
174
+ methods, and convergence analysis. Section 4 discusses the accelerating techniques for our BB
175
+ algorithm, including bounds tightening, sample reduction, and parallel implementation techniques.
176
+ Section 5 presents the detailed proof of convergence to the global optimum in the finite steps.
177
+ Section 6 gives extensive numerical results compared with other algorithms. Finally, Section 7
178
+ concludes the paper.
179
+
180
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
181
+ 7
182
+ 2. K-center Formulation
183
+ 2.1. Two-stage Formulation
184
+ To introduce the lower bounding method in the branch and bound scheme, we first propose a
185
+ two-stage optimization form of the K-center Problem 1. The first-stage problem is as follows:
186
+ z =
187
+ min
188
+ µ∈X∩M0 max
189
+ s∈S Qs(µ).
190
+ (2)
191
+ where the center set µ is the so-called first-stage variable, Qs(µ) is the optimal value of the second-
192
+ stage optimization problem:
193
+ Qs(µ) = min
194
+ k∈K ||xs − µk||2
195
+ 2
196
+ (3)
197
+ We denote a closed set M0 := {µ | µ ≤ µ ≤ ¯µ} as the region of centers, where µ is the lower bound of
198
+ centers and ¯µ is the upper bound, i.e., µk
199
+ a = min
200
+ s∈S Xs,a, ¯µk
201
+ a = max
202
+ s∈S Xs,a, ∀k ∈ K, a ∈ {1,··· ,A}. Here,
203
+ the constraint µ ∈ M0 is introduced to simplify the discussion of the BB scheme. Since M0 can be
204
+ inferred directly from data, it will not affect the optimal solution of Problem 1. Constraint µ ∈
205
+ X ∩ M0 means the center of each cluster is selected from the samples belonging to the intersection
206
+ set of the corresponding region M0 and the dataset X
207
+ 2.2. MINLP Formulation
208
+ To introduce the bounds tightening and sample reduction methods, we propose a MINLP formu-
209
+ lation of the K-center Problem 1:
210
+ min
211
+ µ,d,b,λ d∗
212
+ (4a)
213
+ s.t. dk
214
+ s ≥ ||xs − µk||2
215
+ 2
216
+ (4b)
217
+ − N1(1 − bk
218
+ s) ≤ d∗
219
+ s − dk
220
+ s ≤ 0
221
+ (4c)
222
+ d∗ ≥ d∗
223
+ s
224
+ (4d)
225
+
226
+ k∈K
227
+ bk
228
+ s = 1
229
+ (4e)
230
+ bk
231
+ s ∈ {0,1}
232
+ (4f)
233
+
234
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
235
+ 8
236
+ − N2(1 − λk
237
+ s) ≤ xs − µk ≤ N2(1 − λk
238
+ s)
239
+ (4g)
240
+
241
+ s∈S
242
+ λk
243
+ s = 1
244
+ (4h)
245
+ λk
246
+ s ∈ {0,1}
247
+ (4i)
248
+ bk
249
+ s ≥ λk
250
+ s
251
+ (4j)
252
+ s ∈ S,k ∈ K
253
+ (4k)
254
+ where dk
255
+ s represents the distance between sample xs and center µk, d∗
256
+ s denotes the distance between
257
+ xs and the center of its cluster, N1 and N2 are both arbitrary large values. bk
258
+ s and λk
259
+ s are two binary
260
+ variables. bk
261
+ s is equal to 1 if sample xs belongs to the Kth cluster, and 0 otherwise. λk
262
+ s is equal to
263
+ 1 if xs is the center of the Kth cluster µk, and 0 otherwise.
264
+ Constraint 4c is a big M formulation and ensures that d∗
265
+ s = dk
266
+ s if bk
267
+ s = 1 and d∗
268
+ s ≤ dk
269
+ s otherwise.
270
+ Constraint 4e guarantees that sample xs belongs to one cluster. We also adopt Constraint 4g, 4h
271
+ and 4j to represent the “centers on samples” constraints, µ ∈ X. Specifically, Constraint 4g uses a
272
+ big M formula to make sure that µk = xs if λk
273
+ s = 1 and Constraint 4h confirms that each center can
274
+ only be selected on one sample. Constraint 4j ensures that if xs is the center of the Kth cluster,
275
+ then it is assigned to the Kth cluster. It should be noted that the global optimizer CPLEX also
276
+ relies on this formulation to solve the K-center problem.
277
+ 3. Tailored Reduced-space Branch and Bound Scheme
278
+ This section introduces a tailored reduced-space branch and bound algorithm for the K-center
279
+ problem with lower and upper bounding methods.
280
+ 3.1. Lower Bounds
281
+ In this section, we adopt the two-stage formulation and derive a closed-form solution to obtain the
282
+ lower bound of the K-center Problem 1.
283
+ At each node in the BB procedure, we deal with a subset of M0, which is denoted as M, and
284
+ solve the following problem concerning M:
285
+ z(M) = min
286
+ µ∈X∩M max
287
+ s∈S Qs(µ)
288
+ (5)
289
+
290
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
291
+ 9
292
+ This problem can be equivalently reformulated as the following problem by duplicating µ across
293
+ samples and enforcing them to be equal:
294
+ min
295
+ µs∈X∩M max
296
+ s∈S Qs(µs)
297
+ (6a)
298
+ s.t.
299
+ µs = µs+1,s ∈ {1,··· ,S − 1}
300
+ (6b)
301
+ We call constraints 6b the non-anticipativity constraints. By removing the “centers on samples”
302
+ constraint µ ∈ X and the non-anticipativity constraints 6b, we attain a lower bound formulation
303
+ as follow:
304
+ β(M) := min
305
+ µs∈M max
306
+ s∈S Qs(µs).
307
+ (7)
308
+ With constraints relaxed, the feasible region of Problem 7 is a superset of Problem 6’s feasible
309
+ region. Therefore, it is obvious that β(M) ≤ z(M).
310
+ In Problem 7, since µ of each sample is independent, it is obvious that:
311
+ β(M) = max
312
+ s∈S min
313
+ µs∈M Qs(µs).
314
+ (8)
315
+ Clearly, problem 8 can be decomposed into S subproblems with β(M) = max
316
+ s∈S βs(M):
317
+ βs(M) = min
318
+ µ∈M Qs(µ).
319
+ (9)
320
+ Denote the region of kth cluster’s center as M k := {µk : µk ≤ µk ≤ ¯µk} where µk and ¯µk are the
321
+ lower and upper bound of µk respectively. Since Qs(µ) = min
322
+ k∈K ||xs − µk||2
323
+ 2, we have
324
+ βs(M) = min
325
+ k∈K min
326
+ µk∈Mk ||xs − µk||2
327
+ 2,
328
+ (10)
329
+ which can be further decomposed into K subsubproblems with βs(M)=min
330
+ k∈K βk
331
+ s (M k):
332
+ βk
333
+ s (M k) = min
334
+ µk∈Mk ||xs − µk||2
335
+ 2.
336
+ (11)
337
+ The analytical solution to Problem 11 is: µk
338
+ a
339
+ ∗ = mid{µk
340
+ a, xs,a, ¯µk
341
+ a},∀a ∈ {1,··· ,A}. Consequently,
342
+ the closed-form solution to Problem 7 can be easily computed by the max-min operation on all the
343
+ samples.
344
+
345
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
346
+ 10
347
+ 3.2. Upper Bounds
348
+ At each node in the BB procedure, the upper bounds of Problem 5 can be obtained by fixing the
349
+ centers at a candidate feasible solution ˆµ ∈ X ∩ M. In this way, we can compute the upper bound
350
+ base on the following equation:
351
+ α(M) = max
352
+ s∈S min
353
+ k∈K ||xs − ˆµk||2
354
+ 2
355
+ (12)
356
+ Since ˆµ is a feasible solution, we have z(M) ≤ α(M), ∀ˆµ ∈ X ∩ M. In our implementation, we
357
+ use two methods to obtain the candidate feasible solutions. At the root node, we use a heuristic
358
+ method called Farthest First Traversal (Gonzalez 1985) to obtain a candidate solution ˆµ ∈ X ∩M0.
359
+ Using this method, we randomly pick an initial point and select each following point as far as
360
+ possible from the previously selected points. Algorithm 2 describes the details of the farthest first
361
+ traversal, where d(xs,T) represents the minimum distance from sample xs to any sample in set T.
362
+ We use FFT(M0) to denote the upper bound obtained using this approach. At a child node with
363
+ center region M, for each cluster, we select the data sample closest to the middle point of M k as
364
+ ˆµk, and obtain the corresponding upper bound α(M).
365
+ 3.3. Branching
366
+ Our algorithm only needs to branch on the region of centers, M := {µ : µ ≤ µ ≤ ¯µ}, to guarantee
367
+ convergence, which would be theoretically discussed in Section 5, o. Since the desired number of
368
+ clusters is K and the number of attributes is A, the number of possible branching variables is K ×A.
369
+ The selection of branching variables and values will dramatically influence the BB procedure’s
370
+ efficiency. In our implementation, we select the max-range variable at each node as the branching
371
+ variable and the midpoint of this variable as the branching value.
372
+ 3.4. Branch and Bound Scheme
373
+ The detailed reduced-space branch and bound algorithm for the K-center Problem 1 are given in
374
+ the Algorithm 1. In the algorithm, We use relint(.) to denote the relative interior of a set. We can
375
+
376
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
377
+ 11
378
+ also establish the convergence of the branch-and-bound scheme in Algorithm 1. The BB procedure
379
+ can generate a monotonically non-ascending sequence {αi} and a monotonically non-descending
380
+ sequence {βi}. We can show that they both converge to z in a finite number of steps.
381
+ Theorem 1. Algorithm 1 is convergent to the global optimal solution after a finite step L, with
382
+ βL = z = αL, by only branching on the region of centers.
383
+ Since the following acceleration techniques also influence the global convergence in Section 4. We
384
+ present the detailed proof of Theorem 1 in Section 5 after introducing the acceleration techniques.
385
+ Algorithm 1 Branch and Bound Scheme
386
+ Initialization
387
+ Initialize the iteration index i ← 0;
388
+ Set M ← {M0}, and tolerance ϵ > 0;
389
+ Compute initial lower and upper bounds βi = β(M0), αi =
390
+ FFT(M0) // Alg. 2 ;
391
+ Select K farthest initial seeds // Sec.4.1.1;
392
+ while M ̸= ∅ do
393
+ Node Selection
394
+ Select a set M satisfying β(M) = βi from M and delete it
395
+ from M;
396
+ Update i ← i + 1;
397
+ Bounds Tightening
398
+ Cluster Assignment // Alg. 3;
399
+ Bounds Tightening // Alg. 4;
400
+ Obtain the tightened node ˆ
401
+ M;
402
+ If i % isr = 0, Sample Reduction // Alg. 5;
403
+ if ∃|X ∩ M k| > 1,k ∈ K then
404
+ Branching
405
+ Find two subsets M1
406
+ and M2
407
+ s.t. relint(M1) ∩
408
+ relint(M2) = ∅ and M1 ∪ M2 = M;
409
+ Update M ← M∪{Mi}, if X ∩M k
410
+ i ̸= ∅,∀k ∈ K,i ∈ 1,2;
411
+ end if
412
+ Bounding
413
+ Compute upper and lower bound α(M1), β(M1), α(M2),
414
+ β(M2);
415
+ Let βi ← min{β(M ′) | M ′ ∈ M};
416
+ Let αi ← min{αi−1,α(M1),α(M2)};
417
+ Remove all M ′ from M if β(M ′) ≥ αi;
418
+ If βi − αi ≤ ϵ, STOP;
419
+ end while
420
+ Algorithm 2 Farthest First Traversal
421
+ Initialization
422
+ Randomly pick s ∈ S;
423
+ Denote T as the set of K points selected by farthest first
424
+ traversal;
425
+ Set T ← {xs};
426
+ while |T| < K do
427
+ Compute xs ∈ arg max
428
+ xs∈X d(xs,T) to find xs which is the
429
+ farthest away from set T;
430
+ T ← T ∪ {xs};
431
+ end while
432
+ Algorithm 3 Cluster Assignment
433
+ Center Based Assignment
434
+ for sample xs ∈ X do
435
+ if bk
436
+ s == 0,∀k ∈ K then
437
+ if βk
438
+ s (M k) > α,∀k ∈ K \ {k′} then
439
+ xs is assigned to cluster k′ with bk′
440
+ s = 1;
441
+ end if
442
+ end if
443
+ end for
444
+ Sample Based Assignment
445
+ if All clusters have at least one sample assigned then
446
+ for sample xs ∈ X do
447
+ if ∀k ∈ K \ {k′}, ∃ xj assigned to kth cluster, ||xs −
448
+ xj||2
449
+ 2 > 4α then
450
+ xs is assigned to cluster k′ with bk′
451
+ s = 1.
452
+ end if
453
+ end for
454
+ end if
455
+ Algorithm 4 Bounds Tightening
456
+ Given the current center region M and upper bound α
457
+ for Cluster k ∈ K do
458
+ Obtain the assigned sample set J k using Alg.3;
459
+ Compute the ball-based or box-boxed area of each
460
+ assigned sample, Bα(xj) or Rα(xj);
461
+ Tighten the center region by M k ∩Bα(xj) or M k ∩Rα(xj)
462
+ , ∀j ∈ J k;
463
+ Further tighten according to the “centers on samples”
464
+ constraint;
465
+ end for
466
+ Algorithm 5 Sample Reduction
467
+ Initialize the index set of redundant samples as R ← S
468
+ for all BB nodes do
469
+ Obtain the index set of redundant samples for lower
470
+ bounds, RLB, according to the criterion in Sec. 4.2.1;
471
+ Obtain the index set of redundant samples for upper
472
+ bounds, RUB, according to the criterion in Sec. 4.2.2;
473
+ Update the redundant index set, R ← R ∩ RLB ∩ RUB;
474
+ end for
475
+ Delete samples in the redundant set R from the current
476
+ dataset.
477
+
478
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
479
+ 12
480
+ 4. Acceleration Techniques
481
+ Although the lower bound introduced in Section 3.1 is enough to guarantee convergence, it might
482
+ not be very tight, leading to tremendous iterations. Therefore, we propose several acceleration
483
+ techniques to reduce the search space and speed up the BB procedure. Since Algorithm 1 only
484
+ branches on the region of centers M := {µ : µ ≤ µ ≤ ¯µ}, we focus on reducing the region of centers
485
+ to accelerate the solution process while not excluding the optimal solution of the original K-center
486
+ problem.
487
+ 4.1. Bounds Tightening Techniques
488
+ In each node, the assignment of many samples (i.e., which cluster the sample is assigned to) can be
489
+ pre-determined by the geometrical relationship of samples and regions of centers. This information
490
+ can be further used to reduce the region of µ.
491
+ 4.1.1. Cluster Assignment
492
+ The task of cluster assignment is to pre-determine some values
493
+ of bk
494
+ s in the MINLP Formulation 4 at each BB node before finding the global optimal solution.
495
+ We first demonstrate the relations between samples and centers. Denote α as the upper bound
496
+ obtained using methods described in Section 3.2. Then based on Objective 4a and Constraint 4d,
497
+ we have d∗
498
+ s ≤ d∗ ≤ α. From Constraint 4b and 4c, we can conclude that if bk
499
+ s = 1, then ||xs −µk||2
500
+ 2 ≤
501
+ d∗
502
+ s ≤ α. Therefore, we can derive Lemma 1:
503
+ Lemma 1. If sample xs is in the kth cluster, then ||xs − µk||2
504
+ 2 ≤ α, where α is an upper bound of
505
+ the K-center problem.
506
+ Besides the relation between samples and centers, cluster assignments may also be determined
507
+ from the distance of two samples. Suppose sample xi and xj belong to the kth cluster, then from
508
+ Lemma 1 we have ||xi − µk||2
509
+ 2 ≤ α and ||xj − µk||2
510
+ 2 ≤ α. Thus ||xi − xj||2
511
+ 2 = ||xi − µk + µk − xj||2
512
+ 2 ≤
513
+ (||xi − µk||2 + ||µk − xj||2)2 ≤ 4α. Therefore, we have Lemma 2:
514
+ Lemma 2. If two samples xi and xj are in the same cluster, then ||xi − xj||2
515
+ 2 ≤ 4α where α is an
516
+ upper bound of the K-center problem.
517
+
518
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
519
+ 13
520
+ We propose three methods for pre-assigning samples based on these two Lemmas:
521
+ K Farthest Initial Seeds: From Lemma 2, if ||xi − xj||2
522
+ 2 > 4α, then xi and xj are not in the
523
+ same cluster. At the root node, if we can find K samples with the distance between any two of
524
+ these samples xi and xj satisfying ||xi − xj||2
525
+ 2 > 4α, then we can conclude that these K samples
526
+ must belong to K distinct clusters. Figure 1 shows an example of this property, in which three
527
+ samples are pre-assigned to 3 distinct clusters. We call these K points initial seeds. To find the
528
+ initial seeds, every two samples must be as far as possible. Therefore, in our implementation, we use
529
+ the heuristic Farthest First Traversal (FFT) (Algorithm 2) to obtain K farthest points. For about
530
+ half of the case studies shown in Section 6, we can obtain the initial seeds using FFT. However, for
531
+ other cases, initial seeds can not be obtained using FFT, or the initial seeds may not even exist.
532
+ Center-Based Assignment: From Lemma 1, if ||xs − µk||2
533
+ 2 > α, then xs does not belong to
534
+ kth cluster, which is bk
535
+ s = 0. Consequently, if we can determine that bk
536
+ s = 0,∀k ∈ K \ {k′}, then
537
+ bk′
538
+ s = 1. However, the value of µ here is unknown before obtaining the optimal solution. One
539
+ observation is that if the BB node with region M contains the optimal solution, then we have
540
+ βk
541
+ s (M k) = min
542
+ µk∈Mk ||xs − µk||2
543
+ 2 ≤ ||xs − µk||2
544
+ 2. Therefore, if βk
545
+ s (M k) > α, sample xs is not in the kth
546
+ cluster and bk
547
+ s = 0. In summary, for sample xs, if ∀k ∈ K \ {k′}, βk
548
+ s (M k) > α, then xs is assigned to
549
+ cluster k′ with bk′
550
+ s = 1. Figure 2 illustrates an example in two-dimensional space with three clusters.
551
+ This center-based method can be adopted at every node of the BB scheme. Since βk
552
+ s (M k) is
553
+ already obtained when computing the lower bound in Section 4.2.1, there is no additional compu-
554
+ tational cost. Nevertheless, we do not need to apply this method at the root node since M 1
555
+ 0 = ··· =
556
+ M K
557
+ 0 . As the BB scheme continues branching on the regions of centers, M k becomes more and more
558
+ different from others. Then more samples can be pre-assigned using this center-based method.
559
+ Sample-Based Assignment: Besides utilizing centers to pre-assign samples, assigned samples
560
+ can also help pre-assign other samples. From Lemma 2, if ||xi −xj||2
561
+ 2 > 4α, then xi and xj are not in
562
+ the same cluster. If xj belongs to kth cluster, then obviously xi cannot be assigned to kthe cluster
563
+ and bk
564
+ i = 0. With this relationship, if all the other K − 1 clusters are excluded, xi will be assigned
565
+ to the remaining cluster. Figure 3 shows an example of the sample-based assignment.
566
+
567
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
568
+ 14
569
+ There is a prerequisite to using this sample-based method. For each cluster, there must be at least
570
+ one sample already assigned to the cluster. Based on this prerequisite, sample-based assignment is
571
+ utilized only after at least one sample is pre-assigned for each cluster.
572
+ 4.1.2. Bounds Tightening
573
+ In this subsection, we adopt the Bounds Tightening (BT) tech-
574
+ nique and the cluster assignment information to reduce the region of µ.
575
+ Ball-based Bounds Tightening: For a sample j, Bα(xj)={x| ||x − xj||2
576
+ 2 ≤ α} represents the
577
+ ball with center xj and radius √α. By using cluster assignment methods in Section 4.1.1, assuming
578
+ that sample j belongs to kth cluster is already known, by Lemma 1, then µk ∈ Bα(xj) holds. We
579
+ use J k to denote the index of all samples assigned to kth cluster, i.e., J k = {j ∈ S | bk
580
+ j = 1},
581
+ then µk ∈ Bα(xj),∀j ∈ J k. Besides this, we also know that µk ∈ X ∩ M k. Denote Sk
582
+ + as the index
583
+ set of samples satisfying all these constraints, Sk
584
+ +(M) := {s ∈ S |xs ∈ X ∩ M k,xs ∈ Bα(xj),∀j ∈
585
+ J k}. In this way, we can obtain a tightened box containing all feasible solutions of kth center,
586
+ ˆ
587
+ M k={µk|ˆµk ≤ µk ≤ ˆ¯µk}, with the bounds of ath attribute in kth center to be ˆµk
588
+ a=
589
+ min
590
+ s∈Sk
591
+ +(M)xk
592
+ s,a and
593
+ ˆ¯µk
594
+ s= max
595
+ s∈Sk
596
+ +(M)xk
597
+ s,a. Figure 4 gives an example of bounds tightening using this method. One challenge
598
+ of this ball-based bounds tightening method is that it needs to compute the distance of xs and xj
599
+ for all s ∈ S and j ∈ J k. If we know the assignments of the majority of the samples, we need to
600
+ do at most S2 times of distance calculation. Note that we only need to do S ∗ K times of distance
601
+ calculation to compute a lower bound. To reduce the computational time, we set a threshold on
602
+ the maximum number of balls (default: 50) utilized to tighten bounds in our implementation.
603
+ Box-based Bounds Tightening: Another strategy to reduce the computation burden is based
604
+ on the relaxation of Bα(xj). For any ball Bα(xj), the closed set Rα(xj) = {x | xj − √α ≤ x ≤
605
+ xj + √α} is the smallest box containing Bα(xj). Then we have µk ∈ Rα(xj),∀j ∈ J k. Since Rα(xj)
606
+ and M k are all boxes, we can easily compute the tighten bounds ˆ
607
+ M k=�
608
+ j∈J k Rα(xj) ∩ M k. Figure
609
+ 5 gives an example of box-based bounds tightening using this method. Obviously, the bounds
610
+ generated in Figure 4 is much tighter, while the method in Figure 5 is much faster. Consequently,
611
+ if |J k| is small for all clusters, the ball-based bounds tightening method gives more satisfactory
612
+ results. While if |J k| is large for any k, box-based bounds tightening provides a cheaper alternative.
613
+
614
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
615
+ 15
616
+ 4.1.3. Symmetry Breaking
617
+ Another way to get tighter bounds is based on symmetry-
618
+ breaking constraints. We add the constraints µ1
619
+ 1 ≤ µ2
620
+ 1 ≤ ··· ≤ µK
621
+ 1 in the BB algorithm 1, in which
622
+ µk
623
+ a denotes ath attribute of kth center. Note that symmetry-breaking constraints and FFT-based
624
+ initial seeds in Section 4.1.1 both break symmetry by providing a certain order for the clusters, so
625
+ they cannot be combined. Our implementation uses symmetric breaking only when initial seeds are
626
+ not found from FFT at the root node. It should be noted that we also add this symmetry-breaking
627
+ constraints when using CPLEX to solve the MINLP formulation 4 of the K-center problem.
628
+ 4.2. Sample Reduction
629
+ Some samples may become redundant during the lower and upper bounding procedure without
630
+ contributing to the bound improvements. If these samples are proven to be redundant in all the
631
+ current and future branch nodes, we can conclude they will not influence the bounding results
632
+ anymore, resulting in sample reduction.
633
+ 4.2.1. Redundant samples in lower bounding
634
+ Denote β as the current best lower bound
635
+ obtained using methods described in Section 3.1. According to Equation 8, lower bound β(M) is
636
+ the maximum value of each sample’s optimal value, βs(M). Based on this observation, we further
637
+ define the best maximum distance of sample s to the center region of µ as
638
+ αs(M) = min
639
+ k∈K max
640
+ µk∈Mk ||xs − µk||2
641
+ 2,
642
+ (13)
643
+ It is obvious that βs(M) ≤ αs(M). If αs(M) < β, we have βs(M) < β, which means sample s is
644
+ not the sample corresponding to maximum within-cluster distance. Hence, we can conclude that
645
+ sample s is a redundant sample in lower bounding for this BB node. Moreover, ∀M ′ ⊂ M, we
646
+ have βs(M ′) ≤ αs(M ′) ≤ αs(M). According to the shrinking nature of center region M and the
647
+ non-descending nature of lower bound β, if αs(M) < β is true in a BB node, sample s will remain
648
+ redundant in all the child nodes of this branch node. It should be noted that αs(M) can be
649
+ calculated using an analytical solution similar to βs(M), which is µk
650
+ a = µk
651
+ a if |µk
652
+ a −xs,a| > |¯µk
653
+ a −xs,a|,
654
+ otherwise ¯µk
655
+ a.
656
+
657
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
658
+ 16
659
+ 4.2.2. Redundant samples in upper bounding
660
+ Obviously, a sample xj cannot be the
661
+ center for kth cluster if it does not belong to M k. Moreover, according to Lemma 1, if a sample xj
662
+ is the center for cluster K, ||xi −xj||2
663
+ 2 ≤ α must hold for all the samples xi assigned to this cluster.
664
+ Hence, a sample xj also cannot be the center for kth cluster, if there exists a sample xi assigned to
665
+ kth cluster satisfying ||xi −xj||2
666
+ 2 > α. If sample xj cannot be centers for any cluster, we denote this
667
+ sample xj as a redundant sample for upper bounding. Since the non-ascending nature of upper
668
+ bound α, if sample s is redundant for upper bounding in a branch node, it will remain redundant
669
+ in all the child nodes of this branch node. It should be noted that the calculations in this method
670
+ are identical to Sample-Based Assignment in Section 4.1.1 with no extra calculations introduced
671
+ in this method.
672
+ 4.2.3. Sample reduction
673
+ If a sample s is redundant in lower bounding, it implies that sample
674
+ s is not the “worst-case sample” corresponding to the maximum within-cluster distance. If a sample
675
+ s is redundant in upper bounding, then it means that sample s cannot be a center for any cluster. If
676
+ the sample s is redundant in both lower bounding and upper bounding, then removing this sample
677
+ will not affect the solution of this BB node and all its child BB nodes. Algorithm 5 describes the
678
+ procedure of sample reduction: first, obtain the redundant samples for lower and upper bounding
679
+ in each branch node; then, we can delete the samples that are redundant for both lower and upper
680
+ bounding in all the branch nodes. In our implementation, this sample reduction method is executed
681
+ for every isr iterations.
682
+ 4.2.4. Effects on computation
683
+ Sample reduction can reduce the number of samples that
684
+ need to be explored by deleting redundant samples every isr iterations, as described in Algorithm
685
+ 5. It can also accelerate the calculation of lower bounds and bounds tightening at each iteration.
686
+ For the lower bounding method in Section 3.1, we only need to solve the second-stage problems for
687
+ non-redundant samples that have been validated by the lower-bounding criterion in Section 4.2.1.
688
+ Additionally, once a sample is deemed redundant for lower bounding in a particular node, it will
689
+ remain redundant in all child nodes of that node. This means that we do not need to solve the
690
+
691
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
692
+ 17
693
+ second-stage problem for this sample in the current node or any of its child nodes. For the bounds
694
+ tightening methods in Section 4.1.2, we only need to calculate the bounds based on non-redundant
695
+ samples that have been validated by the upper-bounding criterion in Section 4.2.2. Similarly, if
696
+ a sample is redundant for upper bounding in a node, it will remain redundant in all child nodes
697
+ of that node, and can be eliminated from the bounds tightening calculations in the current node
698
+ and its child nodes. In this way, sample reduction can not only delete redundant samples at every
699
+ isr iterations, but also eliminate redundant information in the current node and its child nodes,
700
+ thereby accelerating the overall calculation.
701
+ 4.3. Parallelization
702
+ We also provide a parallel implementation of the whole algorithm to accelerate the solving process.
703
+ Since our algorithm is primarily executed at the sample level, like βs(M) in the lower bounding, we
704
+ can parallelize the algorithm by distributing the dataset to each process equally, then calculating
705
+ on each process with the local dataset and communicating the results as needed. The detailed
706
+ parallelization framework is shown in Figure 6. Here, the green modules represent the parallel
707
+ operations at each process, and the blue modules represent serial reduction operations. This par-
708
+ allelization framework is realized utilizing Message-Passing Interface (MPI) and MPI.jl by (Byrne
709
+ et al. 2021).
710
+ 5. Convergence Analysis
711
+ As stated in Theorem 1, the branch-and-bound scheme for the K-center problem in Algorithm 1
712
+ converges to the global optimal solution after a finite step. In this section, we present the proof of
713
+ this theorem.
714
+ Specifically, the branch-and-bound scheme in Algorithm 1 branches on the region of centers, µ,
715
+ and generates a rooted tree with the search space M0 at the root node. For the child node at qth
716
+ level and lqth iteration, we denote the search space as Mlq. The search space of its child node is
717
+ denoted as Mlq+1 satisfying Mlq+1 ⊂ Mlq. We denote the decreasing sequence from the root node
718
+
719
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
720
+ 18
721
+ with M0 to the child node with Mlq as {Mlq}. The search space of kth cluster center at Mlq is
722
+ denoted as M k
723
+ lq. Along the branch-and-bound process, we can obtain a monotonically non-ascending
724
+ upper bound sequence {αi} and a monotonically non-descending lower bound sequence {βi}.
725
+ In the following convergence analysis, we adapt the fundamental conclusions from (Horst and
726
+ Tuy 2013) to our algorithm. It should be noted that the convergence of the K-center problem
727
+ here is stronger than the convergence analysis in (Cao and Zavala 2019) for two-stage nonlinear
728
+ optimization problems or the convergence proof in (Hua et al. 2021) for K-means clustering prob-
729
+ lem. Both Cao and Zavala (2019) and Hua et al. (2021) guarantee the convergence in the sense of
730
+ lim
731
+ i→∞αi = lim
732
+ i→∞βi = z. They can only produce a global ϵ-optimal solution in a finite number of steps.
733
+ While for the K-center problem, the algorithm can obtain an exact optimal solution (e.g., ϵ = 0)
734
+ in a finite number of steps.
735
+ Definition 1. (Definition IV.3 (Horst and Tuy 2013)) A bounding operation is called finitely
736
+ consistent if, at every step, any unfathomed partition element can be further refined and if any
737
+ decreasing sequence {Mlq} successively refined partition elements is finite.
738
+ Lemma 3. The bounding operation in Algorithm 1 is finitely consistent.
739
+ Proof. Firstly, we prove that any unfathomed partition element Mlq can be further refined. Any
740
+ unfathomed Mlq satisfies two conditions: (1) ∃|X ∩ M k
741
+ lq| > 1,k ∈ K, and (2) αl − β(Mlq) > ϵ,ϵ > 0.
742
+ Obviously, there exists at least one partition to be further refined.
743
+ We then prove any decreasing sequences {Mlq} successively refined partition elements are finite.
744
+ Assuming by contradiction that a sequence {Mlq} is infinite. In our algorithm, since we branch
745
+ on the first-stage variable µ corresponding to the diameter of M, this subdivision is exhaustive.
746
+ Therefore, we have lim
747
+ q→∞δ(Mlq) = 0 and {Mlq} converge to one point ¯µ at each cluster, where δ(Mlq)
748
+ is the the diameter of set Mlq.
749
+ If this point ¯µ ∈ X, there exists a ball around ¯µ, denoted as Br(¯µ) = {µ | ||µ − ¯µ|| ≤ r}, fulfilling
750
+ |X ∩Br(¯µ)| = 1. There exists a level q0 that Mlq ⊂ Br(¯µ),∀q ≥ q0. At this lq0th iteration, according
751
+ to the terminal conditions |X ∩ M k
752
+ lq| = 1,∀k ∈ K, the partition elements Mlq0 will not be branched
753
+
754
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
755
+ 19
756
+ anymore. Because the dataset X is finite, we have the sequence {Mlq} is finite in this case. If ¯µ ̸⊂ X,
757
+ there is a ball around ¯µ, denoted as Br(¯µ) = {µ | ||µ − ¯µ|| ≤ r}, satisfying |X ∩ Br(¯µ)| = 0. There
758
+ exists a level q0 that Mlq ⊂ Br(¯µ),∀q ≥ q0. At this lq0th iteration, Mlq0 will be deleted according to
759
+ the terminal conditions. Consequently, the sequence {Mlq} is also finite in this case. In conclusion,
760
+ it is impossible to exist a sequence {Mlq} that is infinite.
761
+ Theorem 2. (Theorem IV.1 (Horst and Tuy 2013)) In a BB procedure, suppose that the bounding
762
+ operation is finitely consistent. Then the procedure terminates after finitely many steps.
763
+ Lemma 4. Algorithm 1 terminates after finitely many steps.
764
+ Proof. From Lemma 3, the bounding operation in Algorithm 1 is finitely consistent. According to
765
+ Theorem 2, we have Algorithm 1 terminates after finitely many steps
766
+ Finally, we prove that the BB scheme for the K-center problem is convergent:
767
+ Theorem 1. Algorithm 1 is convergent to the global optimal solution after a finite step L, with
768
+ βL = z = αL, by only branching on the space of µ.
769
+ Proof. From Lemma 4, Algorithm 1 terminates after finite steps. The algorithm terminates with
770
+ two situations. The first situations is |βl − αl| ≤ ϵ,ϵ ≥ 0. When ϵ is set to be 0, we have βl = z = αl.
771
+ The second situation is the branch node set M = ∅. A branch node with M is deleted from M
772
+ and not further partitioned if it satisfies β(M) > αl or |X ∩ M k| = 1,∀k ∈ K. In the first case, it
773
+ is obvious that this branch node does not contain the global optimal solution µ∗. Therefore, the
774
+ branch node with M ′ containing the optimal solution µ∗ is not further partitioned because the
775
+ second case |X ∩ M ′k| = 1,∀k ∈ K. After bounds tightening according to the “centers on samples”
776
+ constraint, the tightened node M ′ = {µ∗}. Obviously for this tightened node, we have βl = β(M ′) =
777
+ z = α(M ′) = αl. In this way, we have proved Theorem 1.
778
+ 6. Numerical Results
779
+ In this section, we report the detailed implementation of our algorithm and the numerical results
780
+ on synthetic and real-world datasets.
781
+
782
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
783
+ 20
784
+ 6.1. Implementation Details
785
+ We denote our tailored reduced-space branch and bound algorithm 1 with and without acceleration
786
+ techniques as BB+CF+BT and BB+CF correspondingly. All our algorithms are implemented in Julia,
787
+ and the parallel version is realized using Message Passing Interface through the MPI.jl module.
788
+ We compare the performance of our algorithm with the state-of-art global optimizer CPLEX 20.1.0
789
+ (Cplex 2020) and the heuristic algorithm, Farthest First Traversal (FFT) as shown in Algorithm
790
+ 2. The initial points severely influence the results of FFT. Therefore, we execute FFT for 100 trails
791
+ with randomly selected initial points and report the best results. As for CPLEX, we use the
792
+ MINLP formulation 4 with the symmetry-breaking constraints to solve the K-center problem.
793
+ We executed all experiments on the high-performance computing cluster Niagara in the Digital
794
+ Research Alliance of Canada. Each computing node of the Niagara cluster has 40 Intel “Skylake”
795
+ cores and 188 GiB of RAM. For the global optimizer CPLEX and our algorithms, a time limit of
796
+ 4 hours is set to compare the performance fairly and avoid unacceptable computational costs.
797
+ For our algorithms, there is also an optimality gap limit of 0.1%. The source code is available at
798
+ https://github.com/YankaiGroup/global_kcenter_extended.
799
+ In order to evaluate the performance extensively, we execute all the algorithms on both syn-
800
+ thetic and real-world datasets. The synthetic datasets are generated using Distributions.jl and
801
+ Random.jl modules in Julia. We generate the synthetic datasets with 3 Gaussian clusters, 2
802
+ attributes, and varying numbers of samples. As for the real-world datasets, we use 30 datasets
803
+ from the UCI Machine Learning Repository (Dua and Graff 2017), datasets Pr2392 from (Padberg
804
+ and Rinaldi 1991), Hemi from (Wang et al. 2022) and Taxi from (Schneider 2015). The number
805
+ of samples ranges from 150 to 1,120,841,769. The number of attributes ranges from 2 to 68. The
806
+ detailed characteristics of datasets can be found in the following result tables.
807
+ We report four criteria in the following result tables to compare the performance of algorithms:
808
+ upper bound (UB), optimality gap (Gap), the number of solved BB nodes (Nodes), and the run
809
+ time (Time). UB is the best objective value of the K-center Problem 1. Gap represents the relative
810
+
811
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
812
+ 21
813
+ difference between the best lower bound (LB) and UB. It is defined as Gap = UB−LB
814
+ UB
815
+ × 100%.
816
+ The optimality gap is a unique property of the deterministic global optimization algorithm. The
817
+ heuristic algorithm (FFT) does not have this property. Nodes and Time are the iteration number
818
+ and the run time of the BB scheme from the beginning to the termination.
819
+ 6.2. Serial Results on Synthetic Datasets
820
+ Table 1 reports the serial results of synthetic datasets with different numbers of samples and
821
+ different desired clusters (K = 3,5,10). Compared with the heuristic method FFT, our algorithm
822
+ BB+LD+BT can reduce UB by 29.4% average on these synthetic datasets. These results validate the
823
+ conclusion from Garcia-Diaz et al. (2019) that these 2-approximation heuristic algorithms perform
824
+ poorly in practice despite the solution quality guarantee.
825
+ As for the comparison of global optimizers, the direct usage of CPLEX on Problem 4 could not
826
+ converge to a small optimality gap≤ 0.1% within 4 hours on all the synthetic datasets. BB+LD with-
827
+ out acceleration techniques can obtain the small optimality gap≤ 0.1% within 4 hours on synthetic
828
+ datasets smaller than 42,000 samples with desired clusters K = 3. The algorithm BB+LD+BT can
829
+ obtain the best upper bounds and reach a satisfactory gap≤ 0.1% in most experiments within 4
830
+ hours. Moreover, compared with BB+LD, BB+LD+BT needs fewer nodes and less run time to obtain
831
+ the same optimality gap. For example, for the Syn-1200 dataset with K = 3, BB+LD need 1,155,375
832
+ nodes and 3609 seconds to reach a gap≤ 0.1%, while BB+LD+BT only needs 23 nodes and 13.5 sec-
833
+ onds. These comparisons between BB+LD and BB+LD+BT demonstrate the acceleration techniques in
834
+ Section 4 can significantly reduce the search space and accelerate the BB procedure.
835
+ 6.3. Serial Results on Real-world datasets
836
+ Table 2, Table 3, and Table 4 show the serial results on real-world datasets with different sample
837
+ numbers and desired cluster numbers (K = 3,5,10). In these tables, we highlight the best results
838
+ among these algorithms with the optimality gap≤ 0.1%. These real-world results are consistent
839
+ with the results of synthetic datasets.
840
+
841
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
842
+ 22
843
+ The best solutions generated by the heuristic method (FFT) can be far from optimal in these
844
+ tables, even for very small datasets. For example, for IRIS dataset, FFT obtains UB of 3.66 while
845
+ our algorithm and CPLEX give a UB of 2.04 with ≤ 0.1% gap. Compared with FFT, our algorithm
846
+ BB+CF+BT can averagely reduce the UB by 22.2% on these real-world datasets and 25.8% on all the
847
+ synthetic and real-world datasets. Even for experiments terminated with large gaps, in most cases,
848
+ BB+CF+BT can obtain a smaller UB than FFT.
849
+ For small datasets, our algorithms BB+CF and BB+CF+BT can obtain the same UB as CPLEX.
850
+ However, CPLEX needs significantly more run time and nodes than our algorithms. For all datasets
851
+ with more than 740 samples, CPLEX cannot even give an optimality gap≤ 50% within 4 hours. On
852
+ the contrary, BB+CF+BT can obtain the best UB and a satisfactory gap≤ 0.1% for most datasets.
853
+ The comparisons of the two versions of our algorithms BB+CF and BB+CF+BT demonstrate that
854
+ the acceleration techniques in Section 4 can significantly reduce the computational time and the
855
+ number of BB nodes to solve the problems. Remarkably, with these acceleration techniques, we
856
+ can even solve several datasets in the root node (Nodes=1), e.g., the datasets iris, HF, and SGC.
857
+ Besides, BB+CF+BT results with superscript 1 in these tables mean we can assign K farthest initial
858
+ seeds through FFT at the root node as described in Section 4.1.1. We can obtain the initial seeds
859
+ for about half of the datasets when K = 3. Moreover, the number of nodes is much smaller for the
860
+ datasets with initial seeds than the datasets without initial seeds. This phenomenon indicates the
861
+ initial seeds are essential for cluster assignment and bounds tightening since we need at least one
862
+ assigned sample at each cluster to execute the sample-based assignment.
863
+ For most of the datasets with millions of samples and K = 3 in Table 4, BB+CF+BT can converge
864
+ to a small gap≤ 0.1% and provide the best optimal solution after 4 hours of running. To the best
865
+ of our knowledge, it is the first time that the K-center problem is solved under a relatively small
866
+ gap≤ 0.1% within 4 hours on datasets over 14 million samples in the serial mode.
867
+ As a drawback, our algorithm BB+LD+BT still struggles to obtain a small optimality gap when the
868
+ desired number of clusters is larger than 3. However, it should be noted the state-of-art global opti-
869
+ mizer CPLEX cannot even solve any datasets to gap≤ 50% when K > 3. On the contrary, BB+LD+BT
870
+
871
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
872
+ 23
873
+ can obtain gap≤ 0.1% on most datasets with less than 5 million samples and K = 5. Moreover, for
874
+ the cases when our algorithm BB+LD+BT cannot obtain a small optimality gap, it still gives the best
875
+ UB among all the algorithms in these experiments.
876
+ 6.4. Parallel Results on Huge-scale Real-world datasets
877
+ To fully utilize the computational ability of high-performance clusters, we implement our algorithm
878
+ BB+CF+BT in a parallel manner as shown in Section 4.3. Here, we test the parallel algorithm on
879
+ datasets that couldn’t obtain a small gap≤ 0.1% for K = 3 within 4 hours in the serial mode,
880
+ including two datasets with ten million samples, HIGGS and BigCross. Moreover, we also extend
881
+ the experiments to a billion-scale dataset called Taxi. This billion-scale dataset contains over 1.1
882
+ billion individual taxi trips with 12 attributes in New York City from January 2009 through June
883
+ 2015. We preprocess the Taxi dataset according to the analysis by Schneider (2015) to remove
884
+ outliers and missing values in the dataset. As an outcome shown in Table 5, the parallel version
885
+ of BB+CF+BT can reach a small optimality gap≤ 0.1% and a better UB on the datasets BigCross
886
+ and Taxi within 4 hours. For the dataset HIGGS, the parallel version achieves a smaller UB and
887
+ gap compared to the heuristic method and the serial version. As far as we know, this is the first
888
+ time that the K-center problem is solved under a relatively small gap≤ 0.1% within 4 hours on the
889
+ billion-scale dataset.
890
+ 7. Conclusion
891
+ We propose a global optimization algorithm for the K-center problem using a tailored reduced
892
+ space branch and bound scheme. In this algorithm, we only need to branch on the region of cluster
893
+ centers to guarantee convergence to the global optimal solution in a finite step.
894
+ We give a two-stage decomposable formulation and an MINLP formulation of the K-center
895
+ problem. With this two-stage formulation, we develop a lower bound with closed-form solutions by
896
+ relaxing the non-anticipativity constraints and the “centers on sample” constraints. As an outcome,
897
+ the proposed bounding methods are extremely computationally efficient with no needs to solve any
898
+ optimization sub-problems using any optimizers.
899
+
900
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
901
+ 24
902
+ Along with the BB procedure, we introduce several acceleration techniques based on the MINLP
903
+ formulation, including bounds tightening, and sample reduction. Numerical experiments show these
904
+ acceleration techniques can significantly reduce the search space and accelerate the solving pro-
905
+ cedure. Moreover, we also give a parallel implementation of our algorithm to fully utilize the
906
+ computational power of modern high performance clusters.
907
+ Extensive numerical experiments have been conducted on synthetic and real-world datasets.
908
+ These results exhibit the efficiency of our algorithm: we can solve the real-world datasets with up
909
+ to ten million samples in the serial mode and one billion samples in the parallel mode to a
910
+ small optimality gap (≤0.1%) within 4 hours.
911
+ Finally, we also declare that our algorithm is promised to extend to deal with certain constrained
912
+ versions of K-center problems. For example, the capacitated restricted version, absolute and vertex
913
+ restricted version (Calik 2013). We are interested in developing these variants in future work.
914
+ Acknowledgments
915
+ The authors acknowledge funding from the discovery program of the Natural Science and Engineering
916
+ Research Council of Canada under grant RGPIN-2019-05499 and the computing resources provided by SciNet
917
+ (www.scinethpc.ca) and Digital Research Alliance of Canada (www.alliancecan.ca). Jiayang Ren acknowl-
918
+ edges the financial support from the China Scholarship Council.
919
+ References
920
+ Aggarwal CC, Wolf JL, Yu PSl (2004) Method for targeted advertising on the web based on accumulated
921
+ self-learning data, clustering users and semantic node graph techniques. US Patent 6,714,975.
922
+ Aloise D, Contardo C (2018) A sampling-based exact algorithm for the solution of the minimax diameter
923
+ clustering problem. Journal of Global Optimization 71(3):613–630.
924
+ Brusco MJ, Stahl S (2005) Branch-and-Bound Applications in Combinatorial Data Analysis (New York:
925
+ Springer).
926
+ Byrne S, Wilcox LC, Churavy V (2021) MPI.jl: Julia bindings for the Message Passing Interface. Proceedings
927
+ of the JuliaCon Conferences 1(1):68.
928
+
929
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
930
+ 25
931
+ Calik H (2013) Exact Solution Methodologies for the P-Center Problem under Single and Multiple Allocation
932
+ Strategies. Theses, Bilkent University.
933
+ Cao Y, Zavala VM (2019) A scalable global optimization algorithm for stochastic nonlinear programs. Journal
934
+ of Global Optimization 75(2):393–416.
935
+ Chen D, Chen R (2009) New relaxation-based algorithms for the optimal solution of the continuous and
936
+ discrete p-center problems. Computers & Operations Research 36(5):1646–1655.
937
+ Chen R, Handler GY (1987) Relaxation method for the solution of the minimax location-allocation problem
938
+ in euclidean space. Naval Research Logistics (NRL) 34(6):775–788.
939
+ Contardo C, Iori M, Kramer R (2019) A scalable exact algorithm for the vertex p-center problem. Computers
940
+ & Operations Research 103:211–220.
941
+ Cook W, Lovasz L, Seymour P, eds. (1995) Combinatorial Optimization. DIMACS Series in Discrete Mathe-
942
+ matics and Theoretical Computer Science (Providence, Rhode Island: American Mathematical Society).
943
+ Cplex II (2020) V20.1.0: User’s Manual for CPLEX. International Business Machines Corporation .
944
+ Dao TBH, Duong KC, Vrain C (2013) A declarative framework for constrained clustering. Machine Learning
945
+ and Knowledge Discovery in Databases, volume 8190, 419–434.
946
+ Daskin MS (2000) A new approach to solving the vertex p-center problem to optimality: Algorithm and
947
+ computational results. Communications of the Operations Research Society of Japan 45(9):428–436.
948
+ Davidovi´c T, Ramljak D, ˇSelmi´c M, Teodorovi´c D (2011) Bee colony optimization for the p-center problem.
949
+ Computers and Operations Research 38(10):1367–1376.
950
+ Dua D, Graff C (2017) UCI machine learning repository. URL http://archive.ics.uci.edu/ml.
951
+ Duong KC, Vrain C, et al. (2017) Constrained clustering by constraint programming. Artificial Intelligence
952
+ 244:70–94.
953
+ Dyer ME, Frieze AM (1985) A simple heuristic for the p-centre problem. Operations Research Letters
954
+ 3(6):285–288.
955
+ Elloumi S, Labb´e M, Pochet Y (2004) A new formulation and resolution method for the p-center problem.
956
+ INFORMS Journal on Computing 16(1):84–94.
957
+
958
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
959
+ 26
960
+ Garcia-Diaz J, Menchaca-Mendez R, Menchaca-Mendez R, Pomares Hern´andez S, P´erez-Sansalvador JC,
961
+ Lakouari N (2019) Approximation algorithms for the vertex K-Center problem: survey and experimental
962
+ evaluation. IEEE Access 7:109228–109245.
963
+ Garcia-Diaz J, Sanchez-Hernandez J, Menchaca-Mendez R, Menchaca-Mendez R (2017) When a worse
964
+ approximation factor gives better performance: a 3-approximation algorithm for the vertex k-center
965
+ problem. Journal of Heuristics 23(5):349–366.
966
+ Garey M, Johnson D (1979) Computers and Intractability: A Guide to the Theory of NP-Completeness (New
967
+ York: W. H. Freeman).
968
+ Gonzalez TF (1985) Clustering to minimize the maximum intercluster distance. Theoretical Computer Sci-
969
+ ence 38:293–306.
970
+ Hansen P, Brimberg J, Uroˇsevi´c D, Mladenovi´c N (2009) Solving large p-median clustering problems by
971
+ primal–dual variable neighborhood search. Data Mining and Knowledge Discovery 19(3):351–375.
972
+ Hesabi ZR, Tari Z, Goscinski A, Fahad A, Khalil I, Queiroz C (2015) Data summarization techniques for
973
+ big data—a survey. Handbook on Data Centers, 1109–1152.
974
+ Hochbaum DS, Shmoys DB (1985) A best possible heuristic for the K-Center problem. Mathematics of
975
+ Operations Research 10(2):180–184.
976
+ Horst R, Tuy H (2013) Global optimization: Deterministic approaches (Springer Science & Business Media).
977
+ Hua K, Shi M, Cao Y (2021) A scalable deterministic global optimization algorithm for clustering problems.
978
+ International Conference on Machine Learning, 4391–4401.
979
+ Ilhan T, Pinar MC (2001) An efficient exact algorithm for the vertex p-center problem. Preprint.[Online].
980
+ Available: http://www.ie.bilkent.edu.tr/mustafap/pubs .
981
+ Kaufman L, Rousseeuw PJ (2009) Finding Groups in Data: an Introduction to Cluster Analysis (John Wiley
982
+ & Sons).
983
+ Kleindessner M, Awasthi P, Morgenstern J (2019) Fair k-center clustering for data summarization. Interna-
984
+ tional Conference on Machine Learning, 3448–3457.
985
+ Lim A, Rodrigues B, Wang F, Xu Z (2005) K-Center problems with minimum coverage. Theoretical Computer
986
+ Science 332(1):1–17.
987
+
988
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
989
+ 27
990
+ Miheliˇc J, Robic B (2005) Solving the k-center problem efficiently with a dominating set algorithm. Journal
991
+ of computing and information technology 13:225–234.
992
+ Minieka E (1970) The m-Center Problem. SIAM Review 12(01).
993
+ Mladenovi´c N, Labb´e M, Hansen P (2003) Solving the p-Center problem with Tabu search and variable
994
+ neighborhood Search. Networks 42(1):48–64.
995
+ Padberg M, Rinaldi G (1991) A branch-and-cut algorithm for the resolution of large-scale symmetric traveling
996
+ salesman problems. SIAM review 33(1):60–100.
997
+ Plesn´ık J (1987) A heuristic for the p-center problems in graphs. Discrete Applied Mathematics 17(3):263–
998
+ 268.
999
+ Pullan W (2008) A memetic genetic algorithm for the vertex p-center problem. Evolutionary Computation
1000
+ 16(3):417–436.
1001
+ Schneider T (2015) Analyzing 1.1 billion NYC taxi and uber trips with a vengeance. URL https://
1002
+ toddwschneider.com/posts/analyzing-1-1-billion-nyc-taxi-and-uber-trips-with-a-vengeance/.
1003
+ Shi M, Hua K, Ren J, Cao Y (2022) Global optimization of K-Center clustering. Proceedings of the 39th
1004
+ International Conference on Machine Learning, 19956–19966.
1005
+ Wang E, Cai G, Ballachay R, Cao Y, Trajano HL (2022) Predicting xylose yield in prehydrolysis of hard-
1006
+ woods: a machine learning approach. Frontiers in Chemical Engineering 84.
1007
+
1008
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
1009
+ 28
1010
+ Table 1
1011
+ Serial results on synthetic datasets
1012
+ Dataset
1013
+ Sam
1014
+ ple
1015
+ Dimen
1016
+ sion
1017
+ Method
1018
+ K=3
1019
+ K=5
1020
+ K=10
1021
+ UB
1022
+ Nodes
1023
+ Gap
1024
+ (%)
1025
+ Time
1026
+ (s)
1027
+ UB
1028
+ Nodes
1029
+ Gap
1030
+ (%)
1031
+ Time
1032
+ (s)
1033
+ UB
1034
+ Nodes
1035
+ Gap
1036
+ (%)
1037
+ Time
1038
+ (s)
1039
+ Syn-300
1040
+ 3.0E+2
1041
+ 2
1042
+ FFT
1043
+ 69.68
1044
+ -
1045
+ -
1046
+ -
1047
+ 43.33
1048
+ -
1049
+ -
1050
+ -
1051
+ 21.88
1052
+ -
1053
+ -
1054
+ -
1055
+ CPLEX
1056
+ 61.75
1057
+ 2.9E+4
1058
+ ≤0.1
1059
+ 29
1060
+ 37.14
1061
+ 2.3E+7
1062
+ 19.4
1063
+ 4h
1064
+ 16.06
1065
+ 1.2E+7
1066
+ 100.0
1067
+ 4h
1068
+ BB+CF
1069
+ 61.75
1070
+ 5.5E+4
1071
+ ≤0.1
1072
+ 46
1073
+ 37.14
1074
+ 2.3E+6
1075
+ 16.2
1076
+ 4h
1077
+ 15.64
1078
+ 1.7E+6
1079
+ 100.0
1080
+ 4h
1081
+ BB+CF+BT
1082
+ 61.75
1083
+ 17
1084
+ ≤0.1
1085
+ 13
1086
+ 37.14
1087
+ 1,764
1088
+ ≤0.1
1089
+ 15
1090
+ 12.31 2.0E+4 ≤0.1
1091
+ 38
1092
+ Syn-1200
1093
+ 1.2E+3
1094
+ 2
1095
+ FFT
1096
+ 93.34
1097
+ -
1098
+ -
1099
+ -
1100
+ 58.46
1101
+ -
1102
+ -
1103
+ -
1104
+ 30.49
1105
+ -
1106
+ -
1107
+ -
1108
+ CPLEX
1109
+ 84.81
1110
+ 5.8E+6
1111
+ 1.6
1112
+ 4h
1113
+ 34.29
1114
+ 3.5E+6
1115
+ 7.8
1116
+ 4h
1117
+ 89.32
1118
+ 8.1E+5
1119
+ 100.0
1120
+ 4h
1121
+ BB+CF
1122
+ 84.81
1123
+ 1.2E+6
1124
+ ≤0.1
1125
+ 3,609
1126
+ 34.29
1127
+ 1.4E+6
1128
+ 12.5
1129
+ 4h
1130
+ 21.81
1131
+ 1.0E+6
1132
+ 100.0
1133
+ 4h
1134
+ BB+CF+BT
1135
+ 84.81
1136
+ 23
1137
+ ≤0.11
1138
+ 14
1139
+ 34.29
1140
+ 411
1141
+ ≤0.1
1142
+ 15
1143
+ 14.51 3.0E+4 ≤0.1
1144
+ 148
1145
+ Syn-2100
1146
+ 2.1E+3
1147
+ 2
1148
+ FFT
1149
+ 106.50
1150
+ -
1151
+ -
1152
+ -
1153
+ 72.70
1154
+ -
1155
+ -
1156
+ -
1157
+ 36.04
1158
+ -
1159
+ -
1160
+ -
1161
+ CPLEX
1162
+ 95.10
1163
+ 3.0E+6
1164
+ 0.2
1165
+ 4h
1166
+ 49.32
1167
+ 1.3E+6
1168
+ 100.0
1169
+ 4h
1170
+ 193.26
1171
+ 3.4E+5
1172
+ 100.0
1173
+ 4h
1174
+ BB+CF
1175
+ 95.10
1176
+ 1.5E+6
1177
+ ≤0.1
1178
+ 11,606
1179
+ 42.58
1180
+ 1.0E+6
1181
+ 20.8
1182
+ 4h
1183
+ 25.78
1184
+ 5.3E+5
1185
+ 100.0
1186
+ 4h
1187
+ BB+CF+BT
1188
+ 95.10
1189
+ 17
1190
+ ≤0.11
1191
+ 13
1192
+ 42.58
1193
+ 455
1194
+ ≤0.1
1195
+ 16
1196
+ 17.65 8.9E+4 ≤0.1
1197
+ 725
1198
+ Syn-42000
1199
+ 4.2E+4
1200
+ 2
1201
+ FFT
1202
+ 161.98
1203
+ -
1204
+ -
1205
+ -
1206
+ 96.12
1207
+ -
1208
+ -
1209
+ -
1210
+ 47.21
1211
+ -
1212
+ -
1213
+ -
1214
+ CPLEX
1215
+ No feasible solution
1216
+ No feasible solution
1217
+ No feasible solution
1218
+ BB+CF
1219
+ 142.33
1220
+ 1.7E+5
1221
+ 6.7
1222
+ 4h
1223
+ 63.40
1224
+ 1.0E+5
1225
+ 28.1
1226
+ 4h
1227
+ 44.24
1228
+ 5.4E+4
1229
+ 100.0
1230
+ 4h
1231
+ BB+CF+BT 142.33
1232
+ 103
1233
+ ≤0.1
1234
+ 21
1235
+ 62.77 5.0E+3 ≤0.1
1236
+ 363
1237
+ 28.29
1238
+ 5.8E+4
1239
+ 36.1
1240
+ 4h
1241
+ Syn-210000 2.1E+5
1242
+ 2
1243
+ FFT
1244
+ 175.81
1245
+ -
1246
+ -
1247
+ -
1248
+ 120.78
1249
+ -
1250
+ -
1251
+ -
1252
+ 66.79
1253
+ -
1254
+ -
1255
+ -
1256
+ CPLEX
1257
+ No feasible solution
1258
+ No feasible solution
1259
+ No feasible solution
1260
+ BB+CF
1261
+ 168.57
1262
+ 4.4E+4
1263
+ 7.0
1264
+ 4h
1265
+ 77.02
1266
+ 2.5E+4
1267
+ 43.8
1268
+ 4h
1269
+ 53.73
1270
+ 1.4E+4
1271
+ 100.0
1272
+ 4h
1273
+ BB+CF+BT 168.57
1274
+ 5
1275
+ ≤0.11
1276
+ 21
1277
+ 71.88 2.4E+3 ≤0.1 1,118
1278
+ 44.48
1279
+ 1.2E+4
1280
+ 72.2
1281
+ 4h
1282
+ 1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
1283
+
1284
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
1285
+ 29
1286
+ Table 2
1287
+ Serial results on small-scale datasets (S ≤ 1,000)
1288
+ Dataset
1289
+ Sam
1290
+ ple
1291
+ Dimen
1292
+ sion
1293
+ Method
1294
+ K=3
1295
+ K=5
1296
+ K=10
1297
+ UB
1298
+ Nodes
1299
+ Gap
1300
+ (%)
1301
+ Time
1302
+ (s)
1303
+ UB
1304
+ Nodes
1305
+ Gap
1306
+ (%)
1307
+ Time
1308
+ (s)
1309
+ UB
1310
+ Nodes
1311
+ Gap
1312
+ (%)
1313
+ Time
1314
+ (s)
1315
+ iris
1316
+ 150
1317
+ 4
1318
+ FFT
1319
+ 2.65
1320
+ -
1321
+ -
1322
+ -
1323
+ 1.80
1324
+ -
1325
+ -
1326
+ -
1327
+ 0.95
1328
+ -
1329
+ -
1330
+ -
1331
+ CPLEX
1332
+ 2.04
1333
+ 1.2E+5
1334
+ ≤0.1
1335
+ 46
1336
+ 1.54
1337
+ 2.8E+6
1338
+ 60.0
1339
+ 4h
1340
+ 1.21
1341
+ 1.4E+7
1342
+ 100.0
1343
+ 4h
1344
+ BB+CF
1345
+ 2.04
1346
+ 1.3E+4
1347
+ ≤0.1
1348
+ 17
1349
+ 1.20
1350
+ 3.1E+6
1351
+ ≤0.1
1352
+ 5,472
1353
+ 0.74
1354
+ 2.2E+6
1355
+ 100.0
1356
+ 4h
1357
+ BB+CF+BT
1358
+ 2.04
1359
+ 1
1360
+ ≤0.11
1361
+ 12
1362
+ 1.20
1363
+ 409
1364
+ ≤0.1
1365
+ 14
1366
+ 0.66
1367
+ 9.6E+5
1368
+ 25.8
1369
+ 4h
1370
+ seeds
1371
+ 210
1372
+ 7
1373
+ FFT
1374
+ 13.17
1375
+ -
1376
+ -
1377
+ -
1378
+ 9.01
1379
+ -
1380
+ -
1381
+ -
1382
+ 4.48
1383
+ -
1384
+ -
1385
+ -
1386
+ CPLEX
1387
+ 10.44
1388
+ 1.2E+6
1389
+ ≤0.1
1390
+ 542
1391
+ 11.61
1392
+ 2.5E+6
1393
+ 96.1
1394
+ 4h
1395
+ 21.48
1396
+ 5.6E+5
1397
+ 100.0
1398
+ 4h
1399
+ BB+CF
1400
+ 10.44
1401
+ 7.2E+3
1402
+ ≤0.1
1403
+ 17
1404
+ 7.22
1405
+ 2.7E+6
1406
+ 8.3
1407
+ 4h
1408
+ 3.51
1409
+ 1.5E+6
1410
+ 100.0
1411
+ 4h
1412
+ BB+CF+BT
1413
+ 10.44
1414
+ 21
1415
+ ≤0.11
1416
+ 13
1417
+ 7.22
1418
+ 1,444
1419
+ ≤0.1
1420
+ 15
1421
+ 2.92
1422
+ 2.1E+5 ≤0.1
1423
+ 569
1424
+ glass
1425
+ 214
1426
+ 9
1427
+ FFT
1428
+ 27.52
1429
+ -
1430
+ -
1431
+ -
1432
+ 22.28
1433
+ -
1434
+ -
1435
+ -
1436
+ 11.73
1437
+ -
1438
+ -
1439
+ -
1440
+ CPLEX
1441
+ Out of memory
1442
+ Out of memory
1443
+ Out of memory
1444
+ BB+CF
1445
+ 27.52
1446
+ 5.6E+3
1447
+ ≤0.1
1448
+ 15
1449
+ 16.44
1450
+ 9.7E+5
1451
+ ≤0.1
1452
+ 1,522
1453
+ 10.64
1454
+ 1.4E+6
1455
+ 100.0
1456
+ 4h
1457
+ BB+CF+BT
1458
+ 27.52
1459
+ 191
1460
+ ≤0.1
1461
+ 13
1462
+ 16.44
1463
+ 4.4E+3
1464
+ ≤0.1
1465
+ 17
1466
+ 7.95
1467
+ 1.7E+6 ≤0.1 9,180
1468
+ BM
1469
+ 249
1470
+ 6
1471
+ FFT
1472
+ 1.52E+04
1473
+ -
1474
+ -
1475
+ -
1476
+ 1.12E+04
1477
+ -
1478
+ -
1479
+ -
1480
+ 5.33E+03
1481
+ -
1482
+ -
1483
+ -
1484
+ CPLEX
1485
+ No feasible solution
1486
+ 1.48E+04
1487
+ 8.8E+6
1488
+ 100.0
1489
+ 4h
1490
+ 1.63E+04
1491
+ 2.4E+6
1492
+ 100.0
1493
+ 4h
1494
+ BB+CF
1495
+ 1.05E+04
1496
+ 1.4E+4
1497
+ ≤0.1
1498
+ 22
1499
+ 6.32E+03
1500
+ 2.2E+6
1501
+ 12.0
1502
+ 4h
1503
+ 5.01E+03
1504
+ 1.4E+6
1505
+ 100.0
1506
+ 4h
1507
+ BB+CF+BT 1.05E+04
1508
+ 63
1509
+ ≤0.11
1510
+ 13
1511
+ 6.32E+03 1.8E+4
1512
+ ≤0.1
1513
+ 29
1514
+ 4.98E+03
1515
+ 6.7E+5
1516
+ 97.9
1517
+ 4h
1518
+ UK
1519
+ 258
1520
+ 5
1521
+ FFT
1522
+ 0.70
1523
+ -
1524
+ -
1525
+ -
1526
+ 0.57
1527
+ -
1528
+ -
1529
+ -
1530
+ 0.42
1531
+ -
1532
+ -
1533
+ -
1534
+ CPLEX
1535
+ Out of memory
1536
+ Out of memory
1537
+ Out of memory
1538
+ BB+CF
1539
+ 0.53
1540
+ 3.2E+5
1541
+ ≤0.1
1542
+ 258
1543
+ 0.43
1544
+ 1.5E+6
1545
+ 43.9
1546
+ 4h
1547
+ 0.33
1548
+ 1.4E+6
1549
+ 100.0
1550
+ 4h
1551
+ BB+CF+BT
1552
+ 0.53
1553
+ 1.6E+4
1554
+ ≤0.1
1555
+ 23
1556
+ 0.43
1557
+ 8.9E+5
1558
+ 26.9
1559
+ 4h
1560
+ 0.31
1561
+ 6.1E+5
1562
+ 97.3
1563
+ 4h
1564
+ HF
1565
+ 299
1566
+ 12
1567
+ FFT
1568
+ 2.69E+10
1569
+ -
1570
+ -
1571
+ -
1572
+ 1.17E+10
1573
+ -
1574
+ -
1575
+ -
1576
+ 1.68E+09
1577
+ -
1578
+ -
1579
+ -
1580
+ CPLEX
1581
+ No feasible solution
1582
+ No feasible solution
1583
+ No feasible solution
1584
+ BB+CF
1585
+ 1.72E+10
1586
+ 339
1587
+ ≤0.1
1588
+ 10
1589
+ 1.02E+10
1590
+ 2.1E+4
1591
+ ≤0.1
1592
+ 44
1593
+ 1.52E+09
1594
+ 3.4E+6
1595
+ 100.0
1596
+ 4h
1597
+ BB+CF+BT 1.72E+10
1598
+ 1
1599
+ ≤0.11
1600
+ 12
1601
+ 1.02E+10
1602
+ 557
1603
+ ≤0.1
1604
+ 14
1605
+ 1.44E+09
1606
+ 1.2E+6
1607
+ 53.2
1608
+ 4h
1609
+ Who
1610
+ 440
1611
+ 8
1612
+ FFT
1613
+ 4.58E+09
1614
+ -
1615
+ -
1616
+ -
1617
+ 3.18E+09
1618
+ -
1619
+ -
1620
+ -
1621
+ 9.81E+08
1622
+ -
1623
+ -
1624
+ -
1625
+ CPLEX
1626
+ No feasible solution
1627
+ No feasible solution
1628
+ No feasible solution
1629
+ BB+CF
1630
+ 3.49E+09
1631
+ 3.4E+3
1632
+ ≤0.1
1633
+ 15
1634
+ 2.11E+09
1635
+ 1.7E+5
1636
+ ≤0.1
1637
+ 341
1638
+ 9.27E+08
1639
+ 1.5E+6
1640
+ 100.0
1641
+ 4h
1642
+ BB+CF+BT 3.49E+09
1643
+ 375
1644
+ ≤0.1
1645
+ 14
1646
+ 2.11E+09 2.3E+3
1647
+ ≤0.1
1648
+ 16
1649
+ 8.21E+08
1650
+ 8.4E+5
1651
+ 62.0
1652
+ 4h
1653
+ HCV
1654
+ 602
1655
+ 12
1656
+ FFT
1657
+ 1.75E+05
1658
+ -
1659
+ -
1660
+ -
1661
+ 8.38E+04
1662
+ -
1663
+ -
1664
+ -
1665
+ 3.03E+04
1666
+ -
1667
+ -
1668
+ -
1669
+ CPLEX
1670
+ 1.41E+05
1671
+ 9.5E+5
1672
+ ≤0.1
1673
+ 3,720
1674
+ 8.73E+04
1675
+ 5.1E+5
1676
+ 100.0
1677
+ 4h
1678
+ 4.47E+04
1679
+ 3.8E+5
1680
+ 100.0
1681
+ 4h
1682
+ BB+CF
1683
+ 1.41E+05
1684
+ 291
1685
+ ≤0.1
1686
+ 10
1687
+ 6.37E+04
1688
+ 2.2E+4
1689
+ ≤0.1
1690
+ 76
1691
+ 2.36E+04
1692
+ 1.4E+6
1693
+ 100.0
1694
+ 4h
1695
+ BB+CF+BT 1.41E+05
1696
+ 39
1697
+ ≤0.1
1698
+ 13
1699
+ 6.37E+04
1700
+ 583
1701
+ ≤0.1
1702
+ 15
1703
+ 2.16E+04 7.6E+5 ≤0.1 6,300
1704
+ Abs
1705
+ 740
1706
+ 21
1707
+ FFT
1708
+ 1.94E+04
1709
+ -
1710
+ -
1711
+ -
1712
+ 1.19E+04
1713
+ -
1714
+ -
1715
+ -
1716
+ 7.81E+03
1717
+ -
1718
+ -
1719
+ -
1720
+ CPLEX
1721
+ 1.72E+04
1722
+ 9.3E+5
1723
+ 52.0
1724
+ 4h
1725
+ 3.02E+04
1726
+ 1.7E+4
1727
+ 100.0
1728
+ 4h
1729
+ No feasible solution
1730
+ BB+CF
1731
+ 1.39E+04
1732
+ 3.3E+4
1733
+ ≤0.1
1734
+ 153
1735
+ 9.93E+03
1736
+ 1.5E+6
1737
+ 18.9
1738
+ 4h
1739
+ 6.15E+03
1740
+ 9.8E+5
1741
+ 100.0
1742
+ 4h
1743
+ BB+CF+BT 1.39E+04
1744
+ 611
1745
+ ≤0.1
1746
+ 15
1747
+ 9.92E+03 5.0E+4
1748
+ ≤0.1
1749
+ 178
1750
+ 6.37E+03
1751
+ 4.6E+5
1752
+ 98.3
1753
+ 4h
1754
+ TR
1755
+ 980
1756
+ 10
1757
+ FFT
1758
+ 7.32
1759
+ -
1760
+ -
1761
+ -
1762
+ 6.42
1763
+ -
1764
+ -
1765
+ -
1766
+ 4.41
1767
+ -
1768
+ -
1769
+ -
1770
+ CPLEX
1771
+ 8.32
1772
+ 1.6E+6
1773
+ 54.5
1774
+ 4h
1775
+ 7.82
1776
+ 2.0E+5
1777
+ 100.0
1778
+ 4h
1779
+ 8.70
1780
+ 3.3E+4
1781
+ 100.0
1782
+ 4h
1783
+ BB+CF
1784
+ 5.94
1785
+ 7.4E+5
1786
+ ≤0.1
1787
+ 2,953
1788
+ 4.49
1789
+ 1.3E+6
1790
+ 47.7
1791
+ 4h
1792
+ 3.69
1793
+ 9.8E+5
1794
+ 100.0
1795
+ 4h
1796
+ BB+CF+BT
1797
+ 5.94
1798
+ 3.3E+4
1799
+ ≤0.1
1800
+ 83
1801
+ 4.49
1802
+ 1.0E+6
1803
+ 24.6
1804
+ 4h
1805
+ 3.73
1806
+ 5.0E+5
1807
+ 99.9
1808
+ 4h
1809
+ SGC
1810
+ 1,000
1811
+ 21
1812
+ FFT
1813
+ 1.33E+07
1814
+ -
1815
+ -
1816
+ -
1817
+ 4.08E+06
1818
+ -
1819
+ -
1820
+ -
1821
+ 9.50E+05
1822
+ -
1823
+ -
1824
+ -
1825
+ CPLEX
1826
+ 9.45E+06
1827
+ 5.0E+4
1828
+ 100.0
1829
+ 4h
1830
+ 1.56E+08
1831
+ 10
1832
+ 100.0
1833
+ 4h
1834
+ No feasible solution
1835
+ BB+CF
1836
+ 9.45E+06
1837
+ 411
1838
+ ≤0.1
1839
+ 12
1840
+ 3.91E+06
1841
+ 2.8E+4
1842
+ ≤0.1
1843
+ 185
1844
+ 9.50E+05
1845
+ 9.6E+5
1846
+ 100.0
1847
+ 4h
1848
+ BB+CF+BT 9.45E+06
1849
+ 1
1850
+ ≤0.11
1851
+ 12
1852
+ 3.91E+06
1853
+ 1
1854
+ ≤0.11
1855
+ 12
1856
+ 9.50E+05
1857
+ 5.8E+5
1858
+ 100.0
1859
+ 4h
1860
+ 1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
1861
+
1862
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
1863
+ 30
1864
+ Table 3
1865
+ Serial results on large-scale datasets (1,000<S<1,000,000)
1866
+ Dataset
1867
+ Sam
1868
+ ple
1869
+ Dimen
1870
+ sion
1871
+ Method
1872
+ K=3
1873
+ K=5
1874
+ K=10
1875
+ UB
1876
+ Nodes
1877
+ Gap
1878
+ (%)
1879
+ Time
1880
+ (s)
1881
+ UB
1882
+ Nodes
1883
+ Gap
1884
+ (%)
1885
+ Time
1886
+ (s)
1887
+ UB
1888
+ Nodes
1889
+ Gap
1890
+ (%)
1891
+ Time
1892
+ (s)
1893
+ hemi
1894
+ 1,955
1895
+ 7
1896
+ FFT
1897
+ 1.06E+05
1898
+ -
1899
+ -
1900
+ -
1901
+ 3.31E+04
1902
+ -
1903
+ -
1904
+ -
1905
+ 1.42E+04
1906
+ -
1907
+ -
1908
+ -
1909
+ CPLEX
1910
+ 4.08E+05
1911
+ 1.4E+5
1912
+ 100.0
1913
+ 4h
1914
+ 4.08E+05
1915
+ 1.2E+5
1916
+ 100.0
1917
+ 4h
1918
+ 4.08E+05
1919
+ 5
1920
+ 100.0
1921
+ 4h
1922
+ BB+CF
1923
+ 4.08E+05
1924
+ 1.4E+5
1925
+ 50.0
1926
+ 4h
1927
+ 2.18E+04
1928
+ 6.8E+5
1929
+ ≤0.1
1930
+ 4,212
1931
+ 1.42E+04
1932
+ 7.1E+5 100.0
1933
+ 4h
1934
+ BB+CF+BT 6.49E+04
1935
+ 11
1936
+ ≤0.11
1937
+ 14
1938
+ 2.18E+04
1939
+ 158
1940
+ ≤0.1
1941
+ 14
1942
+ 7.20E+03 8.2E+3 ≤0.1
1943
+ 89
1944
+ pr2392
1945
+ 2,392
1946
+ 2
1947
+ FFT
1948
+ 3.75E+07
1949
+ -
1950
+ -
1951
+ -
1952
+ 2.11E+07
1953
+ -
1954
+ -
1955
+ -
1956
+ 1.02E+07
1957
+ -
1958
+ -
1959
+ -
1960
+ CPLEX
1961
+ 6.51E+07
1962
+ 2.1E+5
1963
+ 100.0
1964
+ 4h
1965
+ 5.66E+07
1966
+ 3.6E+4
1967
+ 100.0
1968
+ 4h
1969
+ 4.23E+07
1970
+ 4.8E+4 100.0
1971
+ 4h
1972
+ BB+CF
1973
+ 2.93E+07
1974
+ 5.9E+4
1975
+ ≤0.1
1976
+ 297
1977
+ 1.52E+07
1978
+ 8.3E+5
1979
+ 20.9
1980
+ 4h
1981
+ 1.02E+07
1982
+ 6.0E+5 100.0
1983
+ 4h
1984
+ BB+CF+BT 2.93E+07
1985
+ 207
1986
+ ≤0.1
1987
+ 15
1988
+ 1.46E+07 6.6E+3 ≤0.1
1989
+ 45
1990
+ 8.70E+06
1991
+ 4.2E+5
1992
+ 59.6
1993
+ 4h
1994
+ TRR
1995
+ 5,454
1996
+ 24
1997
+ FFT
1998
+ 101.55
1999
+ -
2000
+ -
2001
+ -
2002
+ 95.26
2003
+ -
2004
+ -
2005
+ -
2006
+ 86.87
2007
+ -
2008
+ -
2009
+ -
2010
+ CPLEX
2011
+ 166.61
2012
+ 1
2013
+ 100.0
2014
+ 4h
2015
+ No feasible solution
2016
+ No feasible solution
2017
+ BB+CF
2018
+ 89.78
2019
+ 3.6E+5
2020
+ 73.1
2021
+ 4h
2022
+ 85.07
2023
+ 2.7E+5
2024
+ 100.0
2025
+ 4h
2026
+ 78.53
2027
+ 1.7E+5 100.0
2028
+ 4h
2029
+ BB+CF+BT
2030
+ 88.30
2031
+ 2.8E+5
2032
+ 64.2
2033
+ 4h
2034
+ 84.80
2035
+ 2.0E+5
2036
+ 100.0
2037
+ 4h
2038
+ 77.37
2039
+ 1.3E+5 100.0
2040
+ 4h
2041
+ AC
2042
+ 7,195
2043
+ 22
2044
+ FFT
2045
+ 3.59
2046
+ -
2047
+ -
2048
+ -
2049
+ 2.79
2050
+ -
2051
+ -
2052
+ -
2053
+ 2.28
2054
+ -
2055
+ -
2056
+ -
2057
+ CPLEX
2058
+ No feasible solution
2059
+ No feasible solution
2060
+ No feasible solution
2061
+ BB+CF
2062
+ 2.75
2063
+ 3.1E+5
2064
+ 42.6
2065
+ 4h
2066
+ 2.26
2067
+ 2.3E+5
2068
+ 72.0
2069
+ 4h
2070
+ 2.14
2071
+ 1.4E+5 100.0
2072
+ 4h
2073
+ BB+CF+BT
2074
+ 2.78
2075
+ 2.7E+5
2076
+ 38.9
2077
+ 4h
2078
+ 2.26
2079
+ 1.8E+5
2080
+ 70.2
2081
+ 4h
2082
+ 1.90
2083
+ 1.2E+5 100.0
2084
+ 4h
2085
+ rds cnt
2086
+ 10,000
2087
+ 4
2088
+ FFT
2089
+ 1.93E+04
2090
+ -
2091
+ -
2092
+ -
2093
+ 5.93E+03
2094
+ -
2095
+ -
2096
+ -
2097
+ 1.44E+03
2098
+ -
2099
+ -
2100
+ -
2101
+ CPLEX
2102
+ 6.86E+04
2103
+ 3.2E+4
2104
+ 100.0
2105
+ 4h
2106
+ No feasible solution
2107
+ No feasible solution
2108
+ BB+CF
2109
+ 1.39E+04
2110
+ 639
2111
+ ≤0.1
2112
+ 25
2113
+ 4.90E+03
2114
+ 1.6E+5
2115
+ ≤0.1
2116
+ 6,048
2117
+ 1.44E+03
2118
+ 1.8E+5 100.0
2119
+ 4h
2120
+ BB+CF+BT 1.39E+04
2121
+ 1
2122
+ ≤0.11
2123
+ 12
2124
+ 4.90E+03
2125
+ 107
2126
+ ≤0.11
2127
+ 16
2128
+ 1.44E+03
2129
+ 1.8E+5 100.0
2130
+ 4h
2131
+ HTRU2
2132
+ 17,898
2133
+ 8
2134
+ FFT
2135
+ 7.11E+04
2136
+ -
2137
+ -
2138
+ -
2139
+ 3.36E+04
2140
+ -
2141
+ -
2142
+ -
2143
+ 1.37E+04
2144
+ -
2145
+ -
2146
+ -
2147
+ CPLEX
2148
+ No feasible solution
2149
+ No feasible solution
2150
+ No feasible solution
2151
+ BB+CF
2152
+ 5.24E+04
2153
+ 1.1E+4
2154
+ ≤0.1
2155
+ 627
2156
+ 2.12E+04
2157
+ 2.1E+5
2158
+ 14.4
2159
+ 4h
2160
+ 1.37E+04
2161
+ 9.6E+4 100.0
2162
+ 4h
2163
+ BB+CF+BT 5.24E+04
2164
+ 25
2165
+ ≤0.11
2166
+ 15
2167
+ 2.09E+04 5.1E+3 ≤0.1
2168
+ 282
2169
+ 1.37E+04
2170
+ 7.9E+4
2171
+ 99.5
2172
+ 4h
2173
+ GT
2174
+ 36,733
2175
+ 11
2176
+ FFT
2177
+ 4.57E+03
2178
+ -
2179
+ -
2180
+ -
2181
+ 4.00E+03
2182
+ -
2183
+ -
2184
+ -
2185
+ 2.59E+03
2186
+ -
2187
+ -
2188
+ -
2189
+ CPLEX
2190
+ No feasible solution
2191
+ No feasible solution
2192
+ No feasible solution
2193
+ BB+CF
2194
+ 3.07E+03
2195
+ 1.4E+5
2196
+ 27.6
2197
+ 4h
2198
+ 2.83E+03
2199
+ 8.2E+4
2200
+ 62.2
2201
+ 4h
2202
+ 2.35E+03
2203
+ 4.7E+4 100.0
2204
+ 4h
2205
+ BB+CF+BT 2.98E+03 2.1E+4 ≤0.1 2,053 2.81E+03
2206
+ 6.3E+4
2207
+ 60.9
2208
+ 4h
2209
+ 2.29E+03
2210
+ 4.0E+4 100.0
2211
+ 4h
2212
+ rds
2213
+ 50,000
2214
+ 3
2215
+ FFT
2216
+ 0.11
2217
+ -
2218
+ -
2219
+ -
2220
+ 0.06
2221
+ -
2222
+ -
2223
+ -
2224
+ 0.03
2225
+ -
2226
+ -
2227
+ -
2228
+ CPLEX
2229
+ No feasible solution
2230
+ No feasible solution
2231
+ No feasible solution
2232
+ BB+CF
2233
+ 0.08
2234
+ 1.3E+5
2235
+ 4.8
2236
+ 4h
2237
+ 0.05
2238
+ 8.5E+4
2239
+ 26.2
2240
+ 4h
2241
+ 0.03
2242
+ 4.4E+4 100.0
2243
+ 4h
2244
+ BB+CF+BT
2245
+ 0.08
2246
+ 719
2247
+ ≤0.1
2248
+ 16
2249
+ 0.05
2250
+ 3.6E+4 ≤0.1 3,429
2251
+ 0.02
2252
+ 4.1E+4 100.0
2253
+ 4h
2254
+ KEGG
2255
+ 53,413
2256
+ 23
2257
+ FFT
2258
+ 6.20E+06
2259
+ -
2260
+ -
2261
+ -
2262
+ 1.70E+06
2263
+ -
2264
+ -
2265
+ -
2266
+ 2.13E+05
2267
+ -
2268
+ -
2269
+ -
2270
+ CPLEX
2271
+ Out of memory
2272
+ No feasible solution
2273
+ No feasible solution
2274
+ BB+CF
2275
+ 4.98E+06
2276
+ 87
2277
+ ≤0.1
2278
+ 41
2279
+ 7.58E+05
2280
+ 5.8E+3
2281
+ ≤0.1
2282
+ 2,416
2283
+ 2.13E+05
2284
+ 2.3E+4 100.0
2285
+ 4h
2286
+ BB+CF+BT 4.98E+06
2287
+ 1
2288
+ ≤0.11
2289
+ 13
2290
+ 7.58E+05
2291
+ 1
2292
+ ≤0.11
2293
+ 14
2294
+ 2.04E+05
2295
+ 3.0E+4 100.0
2296
+ 4h
2297
+ rng agr
2298
+ 199,843
2299
+ 7
2300
+ FFT
2301
+ 4.68E+10
2302
+ -
2303
+ -
2304
+ -
2305
+ 1.61E+10
2306
+ -
2307
+ -
2308
+ -
2309
+ 7.47E+09
2310
+ -
2311
+ -
2312
+ -
2313
+ CPLEX
2314
+ Out of memory
2315
+ No feasible solution
2316
+ No feasible solution
2317
+ BB+CF
2318
+ 3.16E+10
2319
+ 3.7E+4
2320
+ 4.8
2321
+ 4h
2322
+ 1.37E+10
2323
+ 2.0E+4
2324
+ 35.4
2325
+ 4h
2326
+ 7.47E+09
2327
+ 1.2E+4 100.0
2328
+ 4h
2329
+ BB+CF+BT 3.14E+10 2.3E+3 ≤0.11
2330
+ 239
2331
+ 1.20E+10 2.0E+4 ≤0.11 3,330 7.02E+09
2332
+ 9.1E+3 100.0
2333
+ 4h
2334
+ urbanGB 360,177
2335
+ 2
2336
+ FFT
2337
+ 7.63
2338
+ -
2339
+ -
2340
+ -
2341
+ 5.62
2342
+ -
2343
+ -
2344
+ -
2345
+ 2.81
2346
+ -
2347
+ -
2348
+ -
2349
+ CPLEX
2350
+ Out of memory
2351
+ No feasible solution
2352
+ No feasible solution
2353
+ BB+CF
2354
+ 5.48
2355
+ 1.6E+4
2356
+ ≤0.1 10,713
2357
+ 4.48
2358
+ 1.5E+4
2359
+ 59.1
2360
+ 4h
2361
+ 2.81
2362
+ 7.7E+3 100.0
2363
+ 4h
2364
+ BB+CF+BT
2365
+ 5.48
2366
+ 171
2367
+ ≤0.11
2368
+ 66
2369
+ 3.86
2370
+ 3.0E+3 ≤0.1 2,710
2371
+ 2.60
2372
+ 6.3E+3
2373
+ 92.6
2374
+ 4h
2375
+ spnet3D 434,876
2376
+ 3
2377
+ FFT
2378
+ 822.03
2379
+ -
2380
+ -
2381
+ -
2382
+ 256.87
2383
+ -
2384
+ -
2385
+ -
2386
+ 68.19
2387
+ -
2388
+ -
2389
+ -
2390
+ CPLEX
2391
+ Out of memory
2392
+ No feasible solution
2393
+ No feasible solution
2394
+ BB+CF
2395
+ 569.91
2396
+ 2.2E+4
2397
+ 0.3
2398
+ 4h
2399
+ 216.25
2400
+ 1.3E+4
2401
+ 16.8
2402
+ 4h
2403
+ 68.19
2404
+ 6.2E+3 100.0
2405
+ 4h
2406
+ BB+CF+BT
2407
+ 569.80
2408
+ 85
2409
+ ≤0.11
2410
+ 28
2411
+ 205.89
2412
+ 3.5E+3 ≤0.11
2413
+ 661
2414
+ 68.19
2415
+ 4.6E+3 100.0
2416
+ 4h
2417
+ 1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
2418
+
2419
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
2420
+ 31
2421
+ Table 4
2422
+ Serial results on datasets with millions of samples
2423
+ Dataset
2424
+ Sam
2425
+ ple
2426
+ Dimen
2427
+ sion
2428
+ Method
2429
+ K=3
2430
+ K=5
2431
+ K=10
2432
+ UB
2433
+ Nodes
2434
+ Gap
2435
+ (%)
2436
+ Time
2437
+ (s)
2438
+ UB
2439
+ Nodes
2440
+ Gap
2441
+ (%)
2442
+ Time
2443
+ (s)
2444
+ UB
2445
+ Nodes
2446
+ Gap
2447
+ (%)
2448
+ Time
2449
+ (s)
2450
+ USC1990 2,458,285
2451
+ 68
2452
+ FFT
2453
+ 2.04E+11
2454
+ -
2455
+ -
2456
+ -
2457
+ 7.47E+10
2458
+ -
2459
+ -
2460
+ -
2461
+ 1.87E+10
2462
+ -
2463
+ -
2464
+ -
2465
+ CPLEX
2466
+ No feasible solution
2467
+ No feasible solution
2468
+ No feasible solution
2469
+ BB+CF
2470
+ 1.69E+11
2471
+ 916
2472
+ 3.6
2473
+ 4h
2474
+ 7.47E+10
2475
+ 352
2476
+ 100.0
2477
+ 4h
2478
+ 1.87E+10
2479
+ 168
2480
+ 100.0
2481
+ 4h
2482
+ BB+CF+BT 1.68E+11
2483
+ 1
2484
+ ≤0.11
2485
+ 277
2486
+ 6.05E+10
2487
+ 256
2488
+ ≤0.11 1,781
2489
+ 1.87E+10
2490
+ 396
2491
+ 61.0
2492
+ 4h
2493
+ Gas
2494
+ methane
2495
+ 4,178,504
2496
+ 18
2497
+ FFT
2498
+ 1.31E+08
2499
+ -
2500
+ -
2501
+ -
2502
+ 1.17E+08
2503
+ -
2504
+ -
2505
+ -
2506
+ 6.95E+07
2507
+ -
2508
+ -
2509
+ -
2510
+ CPLEX
2511
+ No feasible solution
2512
+ No feasible solution
2513
+ No feasible solution
2514
+ BB+CF
2515
+ 1.04E+08 1.2E+3
2516
+ 31.1
2517
+ 4h
2518
+ 8.82E+07
2519
+ 488
2520
+ 100.0
2521
+ 4h
2522
+ 6.95E+07
2523
+ 244
2524
+ 100.0
2525
+ 4h
2526
+ BB+CF+BT 1.02E+08
2527
+ 65
2528
+ ≤0.11 1,272 7.21E+07
2529
+ 807
2530
+ 19.9
2531
+ 4h
2532
+ 6.95E+07
2533
+ 410
2534
+ 100.0
2535
+ 4h
2536
+ Gas
2537
+ CO
2538
+ 4,208,261
2539
+ 18
2540
+ FFT
2541
+ 8.83E+08
2542
+ -
2543
+ -
2544
+ -
2545
+ 5.17E+08
2546
+ -
2547
+ -
2548
+ -
2549
+ 2.05E+08
2550
+ -
2551
+ -
2552
+ -
2553
+ CPLEX
2554
+ No feasible solution
2555
+ No feasible solution
2556
+ No feasible solution
2557
+ BB+CF
2558
+ 5.66E+08 1.1E+3
2559
+ 12.8
2560
+ 4h
2561
+ 4.09E+08
2562
+ 449
2563
+ 100.0
2564
+ 4h
2565
+ 2.05E+08
2566
+ 241
2567
+ 100.0
2568
+ 4h
2569
+ BB+CF+BT 5.46E+08
2570
+ 66
2571
+ ≤0.1 1,053 2.80E+08
2572
+ 670
2573
+ ≤0.1
2574
+ 9,612
2575
+ 2.05E+08
2576
+ 398
2577
+ 100.0
2578
+ 4h
2579
+ kddcup
2580
+ 4,898,431
2581
+ 38
2582
+ FFT
2583
+ 4.71E+17
2584
+ -
2585
+ -
2586
+ -
2587
+ 9.71E+16
2588
+ -
2589
+ -
2590
+ -
2591
+ 5.96E+14
2592
+ -
2593
+ -
2594
+ -
2595
+ CPLEX
2596
+ No feasible solution
2597
+ No feasible solution
2598
+ No feasible solution
2599
+ BB+CF
2600
+ 2.25E+17
2601
+ 63
2602
+ ≤0.1
2603
+ 2,461
2604
+ 4.73E+16
2605
+ 229
2606
+ 100.0
2607
+ 4h
2608
+ 5.96E+14
2609
+ 124
2610
+ 100.0
2611
+ 4h
2612
+ BB+CF+BT 2.25E+17
2613
+ 37
2614
+ ≤0.1
2615
+ 958
2616
+ 4.73E+16
2617
+ 417
2618
+ ≤0.1 10,116 2.58E+14
2619
+ 1
2620
+ ≤0.11 586
2621
+ HIGGS
2622
+ 11,000,000
2623
+ 29
2624
+ FFT
2625
+ 368.35
2626
+ -
2627
+ -
2628
+ -
2629
+ 320.91
2630
+ -
2631
+ -
2632
+ -
2633
+ 198.71
2634
+ -
2635
+ -
2636
+ -
2637
+ CPLEX
2638
+ No feasible solution
2639
+ No feasible solution
2640
+ No feasible solution
2641
+ BB+CF
2642
+ 247.03
2643
+ 368
2644
+ 67.9
2645
+ 4h
2646
+ 249.45
2647
+ 210
2648
+ 100.0
2649
+ 4h
2650
+ 198.71
2651
+ 98
2652
+ 100.0
2653
+ 4h
2654
+ BB+CF+BT
2655
+ 237.91
2656
+ 290
2657
+ 65.5
2658
+ 4h
2659
+ 235.68
2660
+ 185
2661
+ 100.0
2662
+ 4h
2663
+ 198.71
2664
+ 100
2665
+ 100.0
2666
+ 4h
2667
+ BigCross 11,620,300
2668
+ 56
2669
+ FFT
2670
+ 1.43E+07
2671
+ -
2672
+ -
2673
+ -
2674
+ 7.54E+06
2675
+ -
2676
+ -
2677
+ -
2678
+ 4.24E+06
2679
+ -
2680
+ -
2681
+ -
2682
+ CPLEX
2683
+ No feasible solution
2684
+ No feasible solution
2685
+ No feasible solution
2686
+ BB+CF
2687
+ 1.09E+07
2688
+ 148
2689
+ 32.9
2690
+ 4h
2691
+ 7.54E+06
2692
+ 122
2693
+ 100.0
2694
+ 4h
2695
+ 4.24E+06
2696
+ 66
2697
+ 100.0
2698
+ 4h
2699
+ BB+CF+BT
2700
+ 9.97E+06
2701
+ 211
2702
+ 19.7
2703
+ 4h
2704
+ 7.54E+06
2705
+ 135
2706
+ 100.0
2707
+ 4h
2708
+ 4.24E+06
2709
+ 66
2710
+ 100.0
2711
+ 4h
2712
+ Phones
2713
+ acceler
2714
+ ometer
2715
+ 13,062,475
2716
+ 6
2717
+ FFT
2718
+ 2.04E+28
2719
+ -
2720
+ -
2721
+ -
2722
+ 1.09E+28
2723
+ -
2724
+ -
2725
+ -
2726
+ 3.89E+26
2727
+ -
2728
+ -
2729
+ -
2730
+ CPLEX
2731
+ No feasible solution
2732
+ No feasible solution
2733
+ No feasible solution
2734
+ BB+CF
2735
+ 1.46E+28
2736
+ 51
2737
+ ≤0.1
2738
+ 2,038
2739
+ 6.17E+27
2740
+ 303
2741
+ 100.0
2742
+ 4h
2743
+ 3.89E+26
2744
+ 148
2745
+ 100.0
2746
+ 4h
2747
+ BB+CF+BT 1.46E+28
2748
+ -
2749
+ ≤0.11
2750
+ 309
2751
+ 6.17E+27
2752
+ 354
2753
+ 100.0
2754
+ 4h
2755
+ 3.89E+26
2756
+ 154
2757
+ 100.0
2758
+ 4h
2759
+ Phones
2760
+ gyro
2761
+ scope
2762
+ 13,932,632
2763
+ 6
2764
+ FFT
2765
+ 1.51E+28
2766
+ -
2767
+ -
2768
+ -
2769
+ 1.09E+28
2770
+ -
2771
+ -
2772
+ -
2773
+ 2.61E+26
2774
+ -
2775
+ -
2776
+ -
2777
+ CPLEX
2778
+ No feasible solution
2779
+ No feasible solution
2780
+ No feasible solution
2781
+ BB+CF
2782
+ 1.46E+28
2783
+ 51
2784
+ ≤0.1
2785
+ 2,195
2786
+ 6.18E+27
2787
+ 286
2788
+ 100.0
2789
+ 4h
2790
+ 2.61E+26
2791
+ 136
2792
+ 100.0
2793
+ 4h
2794
+ BB+CF+BT 1.46E+28
2795
+ 1
2796
+ ≤0.11
2797
+ 294
2798
+ 6.18E+27
2799
+ 330
2800
+ 100.0
2801
+ 4h
2802
+ 2.61E+26
2803
+ 140
2804
+ 100.0
2805
+ 4h
2806
+ AADP
2807
+ 14,057,567
2808
+ 3
2809
+ FFT
2810
+ 3.82E+03
2811
+ -
2812
+ -
2813
+ -
2814
+ 2.98E+03
2815
+ -
2816
+ -
2817
+ -
2818
+ 1.90E+03
2819
+ -
2820
+ -
2821
+ -
2822
+ CPLEX
2823
+ No feasible solution
2824
+ No feasible solution
2825
+ No feasible solution
2826
+ BB+CF
2827
+ 2.66E+03
2828
+ 602
2829
+ 35.9
2830
+ 4h
2831
+ 2.49E+03
2832
+ 324
2833
+ 100.0
2834
+ 4h
2835
+ 1.90E+03
2836
+ 147
2837
+ 100.0
2838
+ 4h
2839
+ BB+CF+BT 2.55E+03
2840
+ 196
2841
+ ≤0.1 4,321 2.46E+03
2842
+ 290
2843
+ 98.9
2844
+ 4h
2845
+ 1.90E+03
2846
+ 145
2847
+ 100.0
2848
+ 4h
2849
+ 1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
2850
+ Table 5
2851
+ Parallel results of BB+CF+BT (K = 3)
2852
+ Dataset
2853
+ Sample
2854
+ Dimension
2855
+ Method
2856
+ UB
2857
+ Nodes
2858
+ Gap
2859
+ (%)
2860
+ Time
2861
+ (s)
2862
+ HIGGS
2863
+ 11,000,000
2864
+ 29
2865
+ Heuristic
2866
+ 368.35
2867
+ -
2868
+ -
2869
+ -
2870
+ Serial
2871
+ 237.91
2872
+ 290
2873
+ 65.5
2874
+ 4h
2875
+ Parallel
2876
+ (400 cores)
2877
+ 227.91
2878
+ 12,576
2879
+ 30.2
2880
+ 4h
2881
+ Bigcross
2882
+ 11,620,300
2883
+ 56
2884
+ Heuristic
2885
+ 1.43E+07
2886
+ -
2887
+ -
2888
+ -
2889
+ Serial
2890
+ 9.97E+06
2891
+ 211
2892
+ 19.7
2893
+ 4h
2894
+ Parallel
2895
+ (400 cores)
2896
+ 9.38E+06
2897
+ 10,071
2898
+ ≤0.1
2899
+ 6,444
2900
+ Taxi
2901
+ 1,120,841,769
2902
+ 12
2903
+ Heuristic
2904
+ 3.09E+04
2905
+ -
2906
+ -
2907
+ -
2908
+ Parallel
2909
+ (2000 cores)
2910
+ 1.62E+04
2911
+ 1,063
2912
+ ≤0.1
2913
+ 5,705
2914
+
2915
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
2916
+ 32
2917
+ × x1
2918
+ × x2
2919
+ ×
2920
+ x3
2921
+ ||x1 − x2||2
2922
+ 2 > 4α
2923
+ ||x2 − x3||2
2924
+ 2 > 4α
2925
+ ||x3 − x1||2
2926
+ 2 > 4α
2927
+ Figure 1
2928
+ Initial seeds with 3 clusters. In this example, ||x1 − x2||2
2929
+ 2 > 4α, ||x2 − x3||2
2930
+ 2 > 4α and ||x3 − x1||2
2931
+ 2 > 4α.
2932
+ Therefore, we can arbitrarily assign x1,x2,x3 to 3 distinct clusters.
2933
+ × xs
2934
+ M 1
2935
+ M 2
2936
+ M 3
2937
+ β2
2938
+ s(M 2) > α
2939
+ β3
2940
+ s(M 3) > α
2941
+ Figure 2
2942
+ Center-based assignment with 3 clusters. In this example, β2
2943
+ s(M 2) > α (b2
2944
+ s = 0) and β3
2945
+ s(M 3) > α (b3
2946
+ s = 0).
2947
+ Therefore, we assign xs to the first cluster (b1
2948
+ s = 1).
2949
+ × x1
2950
+ × x2
2951
+ ×x3
2952
+ × xs
2953
+ M 1
2954
+ M 2
2955
+ M 3
2956
+ ||xs − x1||2
2957
+ 2 > 4α
2958
+ ||xs − x2||2
2959
+ 2 > 4α
2960
+ Figure 3
2961
+ Sample-based assignment with 3 clusters. Assume we already know that x1,x2,x3 belong to cluster 1,2
2962
+ and 3, respectively. xs is the sample to be determined. In this example, ||xs − x1||2
2963
+ 2 > 4α (b1
2964
+ s = 0) and
2965
+ ||xs − x2||2
2966
+ 2 > 4α (b2
2967
+ s = 0). Therefore, xs is assigned to cluster 3 (b3
2968
+ s = 1).
2969
+
2970
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
2971
+ 33
2972
+ ×
2973
+ ×
2974
+ ×
2975
+ ×
2976
+ ×
2977
+ ×
2978
+ ×
2979
+ ×
2980
+ ×
2981
+ ×xi
2982
+ ×
2983
+ xj
2984
+ M k
2985
+ ×
2986
+ ×
2987
+ Bα(xi)
2988
+ Bα(xj)
2989
+ √α
2990
+ √α
2991
+ Figure 4
2992
+ Ball-based bounds tightening in two-dimensional space. In this example, suppose it is determined that
2993
+ two points xi and xj belong to the Kth cluster. We first compute the index set of samples within all
2994
+ balls and original box, Sk
2995
+ +(M) := {s ∈ S |xs ∈ X ∩M k ∩Bα(xi)∩Bα(xj)}. We then generate the smallest
2996
+ box containing these samples in Sk
2997
+ +(M). The red rectangle is the tightened bounds we obtain.
2998
+ ×
2999
+ ×
3000
+ ×
3001
+ ×
3002
+ ×
3003
+ ×
3004
+ ×
3005
+ ×
3006
+ ×
3007
+ ×xi
3008
+ ×
3009
+ xj
3010
+ M k
3011
+ ×
3012
+ ×
3013
+ Bα(xi)
3014
+ Bα(xj)
3015
+ Rα(xi)
3016
+ Rα(xj)
3017
+ √α
3018
+ √α
3019
+ Figure 5
3020
+ Box-based bounds tightening in two-dimensional space. In this example, we first generate two boxes
3021
+ with Rα(xi) := {x| xi −√α ≤ x ≤ xi +√α} and Rα(xj) = {x| xj −√α ≤ x ≤ xj +√α}. We then create a
3022
+ tighten bounds with ˆ
3023
+ M k=Rα(xi) ∩ Rα(xj) ∩ M k. The red rectangle is the tightened bounds we obtain.
3024
+
3025
+ Ren et al.: Global Optimization for K-Center of One Billion Samples
3026
+ 34
3027
+ Dataset
3028
+ Subset
3029
+ Subset
3030
+ Subset
3031
+ Subset
3032
+ . . .
3033
+ Tightened space of centers:
3034
+ Bound
3035
+ Tightening
3036
+ Bound
3037
+ Tightening
3038
+ Bound
3039
+ Tightening
3040
+ Bound
3041
+ Tightening
3042
+ . . .
3043
+ LB & UB
3044
+ Bounding
3045
+ LB & UB
3046
+ Bounding
3047
+ LB & UB
3048
+ Bounding
3049
+ LB & UB
3050
+ Bounding
3051
+ . . .
3052
+ Lower bounds:
3053
+ ,
3054
+ Upper bounds:
3055
+ Sample
3056
+ reduction
3057
+ Sample
3058
+ reduction
3059
+ Sample
3060
+ reduction
3061
+ Sample
3062
+ reduction
3063
+ . . .
3064
+ Index set of redundant samples:
3065
+
3066
+ Update dataset according to the redundant index set
3067
+ Gather from each process
3068
+ Gather from each process
3069
+ Gather from each process
3070
+ Spread to each proccess equally
3071
+ Parallel
3072
+ (Map)
3073
+ Serial
3074
+ (Reduce)
3075
+ Figure 6
3076
+ Parallelization of the reduced-space branch and bound scheme
3077
+
-NAyT4oBgHgl3EQfRPZI/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-tAyT4oBgHgl3EQfRPa5/content/2301.00063v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:67ce83df66d036d979828e955a4b7635a48e887b6017d0c8a208b84fd3d0a658
3
+ size 209391
-tAyT4oBgHgl3EQfRPa5/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a73e1c40378107ecf41e6d94310419fe782930f8fd26b3230059ab1baba6d76b
3
+ size 2293805
-tAyT4oBgHgl3EQfRPa5/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:383e4142e4bb1fca2e4ce2e91419819a1a096b81cdeadbc8632212b1851d78ca
3
+ size 101678
.gitattributes CHANGED
@@ -3332,3 +3332,60 @@ T9E5T4oBgHgl3EQfbA-t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
3332
  cNE1T4oBgHgl3EQfLAMX/content/2301.02970v1.pdf filter=lfs diff=lfs merge=lfs -text
3333
  S9AyT4oBgHgl3EQfVfdE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3334
  9NFJT4oBgHgl3EQfoSxe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3332
  cNE1T4oBgHgl3EQfLAMX/content/2301.02970v1.pdf filter=lfs diff=lfs merge=lfs -text
3333
  S9AyT4oBgHgl3EQfVfdE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3334
  9NFJT4oBgHgl3EQfoSxe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3335
+ odE_T4oBgHgl3EQf8hwH/content/2301.08375v1.pdf filter=lfs diff=lfs merge=lfs -text
3336
+ S9AyT4oBgHgl3EQfVfdE/content/2301.00144v1.pdf filter=lfs diff=lfs merge=lfs -text
3337
+ mNAyT4oBgHgl3EQf_vq9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3338
+ ktE1T4oBgHgl3EQf0gVV/content/2301.03456v1.pdf filter=lfs diff=lfs merge=lfs -text
3339
+ 3NAzT4oBgHgl3EQfR_tE/content/2301.01224v1.pdf filter=lfs diff=lfs merge=lfs -text
3340
+ odE_T4oBgHgl3EQf8hwH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3341
+ 7tAzT4oBgHgl3EQfSPsA/content/2301.01227v1.pdf filter=lfs diff=lfs merge=lfs -text
3342
+ XdAzT4oBgHgl3EQfYfz7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3343
+ k9AyT4oBgHgl3EQfYPfO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3344
+ y9AyT4oBgHgl3EQfO_Zw/content/2301.00016v1.pdf filter=lfs diff=lfs merge=lfs -text
3345
+ _9E1T4oBgHgl3EQfowSL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3346
+ y9AyT4oBgHgl3EQfO_Zw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3347
+ ttE5T4oBgHgl3EQfLA54/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3348
+ btE5T4oBgHgl3EQffA_l/content/2301.05624v1.pdf filter=lfs diff=lfs merge=lfs -text
3349
+ jNE3T4oBgHgl3EQfJAm8/content/2301.04340v1.pdf filter=lfs diff=lfs merge=lfs -text
3350
+ XNE3T4oBgHgl3EQfbwpA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3351
+ JNFAT4oBgHgl3EQfvB44/content/2301.08673v1.pdf filter=lfs diff=lfs merge=lfs -text
3352
+ htE3T4oBgHgl3EQfIgkt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3353
+ MtE2T4oBgHgl3EQfBQa7/content/2301.03601v1.pdf filter=lfs diff=lfs merge=lfs -text
3354
+ E9E0T4oBgHgl3EQfQwCg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3355
+ GtE5T4oBgHgl3EQfWA9Z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3356
+ x9E2T4oBgHgl3EQf3wgd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3357
+ QtE3T4oBgHgl3EQfDAk3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3358
+ ttE5T4oBgHgl3EQfLA54/content/2301.05470v1.pdf filter=lfs diff=lfs merge=lfs -text
3359
+ 5dAyT4oBgHgl3EQfcfda/content/2301.00283v1.pdf filter=lfs diff=lfs merge=lfs -text
3360
+ jdAyT4oBgHgl3EQfX_es/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3361
+ h9FKT4oBgHgl3EQfvC6t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3362
+ JNFAT4oBgHgl3EQfvB44/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3363
+ 7tAzT4oBgHgl3EQfSPsA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3364
+ x9E2T4oBgHgl3EQf3wgd/content/2301.04173v1.pdf filter=lfs diff=lfs merge=lfs -text
3365
+ -tAyT4oBgHgl3EQfRPa5/content/2301.00063v1.pdf filter=lfs diff=lfs merge=lfs -text
3366
+ DtAzT4oBgHgl3EQfT_x1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3367
+ btFIT4oBgHgl3EQfmivq/content/2301.11310v1.pdf filter=lfs diff=lfs merge=lfs -text
3368
+ 5dAyT4oBgHgl3EQfcfda/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3369
+ 9dAzT4oBgHgl3EQf-_6e/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3370
+ xdFJT4oBgHgl3EQfgyzk/content/2301.11563v1.pdf filter=lfs diff=lfs merge=lfs -text
3371
+ 9dAzT4oBgHgl3EQf-_6e/content/2301.01942v1.pdf filter=lfs diff=lfs merge=lfs -text
3372
+ q9FKT4oBgHgl3EQf0C6i/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3373
+ XNE3T4oBgHgl3EQfbwpA/content/2301.04518v1.pdf filter=lfs diff=lfs merge=lfs -text
3374
+ kdFKT4oBgHgl3EQfCS2q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3375
+ qtFIT4oBgHgl3EQfxSst/content/2301.11355v1.pdf filter=lfs diff=lfs merge=lfs -text
3376
+ kb_36/content/kb_36.pdf filter=lfs diff=lfs merge=lfs -text
3377
+ kdFKT4oBgHgl3EQfCS2q/content/2301.11707v1.pdf filter=lfs diff=lfs merge=lfs -text
3378
+ -tAyT4oBgHgl3EQfRPa5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3379
+ ZtFRT4oBgHgl3EQfPze-/content/2301.13519v1.pdf filter=lfs diff=lfs merge=lfs -text
3380
+ qtFIT4oBgHgl3EQfxSst/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3381
+ h9FKT4oBgHgl3EQfvC6t/content/2301.11893v1.pdf filter=lfs diff=lfs merge=lfs -text
3382
+ MtE2T4oBgHgl3EQfBQa7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3383
+ cNE1T4oBgHgl3EQfLAMX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3384
+ xdFJT4oBgHgl3EQfgyzk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3385
+ jtE1T4oBgHgl3EQfgQQH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3386
+ c9E4T4oBgHgl3EQfQAyD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3387
+ v9FRT4oBgHgl3EQfgDc7/content/2301.13578v1.pdf filter=lfs diff=lfs merge=lfs -text
3388
+ E9E0T4oBgHgl3EQfQwCg/content/2301.02198v1.pdf filter=lfs diff=lfs merge=lfs -text
3389
+ p9E1T4oBgHgl3EQfPQN5/content/2301.03025v1.pdf filter=lfs diff=lfs merge=lfs -text
3390
+ c9E4T4oBgHgl3EQfQAyD/content/2301.04978v1.pdf filter=lfs diff=lfs merge=lfs -text
3391
+ SdFAT4oBgHgl3EQf1h7S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
29E2T4oBgHgl3EQf5whX/content/tmp_files/2301.04193v1.pdf.txt ADDED
@@ -0,0 +1,999 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics
2
+ 1
3
+ New Exact Betchov-like Relation for the
4
+ Helicity Flux in Homogeneous Turbulence
5
+ Damiano Capocci1†, Perry L. Johnson2, Sean Oughton3,
6
+ Luca Biferale1 and Moritz Linkmann4‡
7
+ 1Department of Physics and INFN, University of Rome Tor Vergata, Rome, Italy
8
+ 2Department of Mechanical and Aerospace Engineering, University of California, Irvine, USA
9
+ 3Department of Mathematics, University of Waikato, Hamilton, New Zealand
10
+ 4School of Mathematics and Maxwell Institute for Mathematical Sciences,
11
+ University of Edinburgh, Edinburgh, EH9 3FD, United Kingdom
12
+ (Received xx; revised xx; accepted xx)
13
+ In homogeneous and isotropic turbulence, the relative contributions of different physical
14
+ mechanisms to the energy cascade can be quantified by an exact decomposition of the
15
+ energy flux (P. Johnson, Phys. Rev. Lett., 124, 104501 (2020), J. Fluid Mech. 922,
16
+ A3(2021)). We extend the formalism to the transfer of kinetic helicity across scales,
17
+ important in the presence of large-scale mirror breaking mechanisms, to identify physical
18
+ processes resulting in helicity transfer and quantify their contributions to the mean flux
19
+ in the inertial range. All subfluxes transfer helicity from large to small scales. About 50%
20
+ of the mean flux is due to the scale-local vortex flattening and vortex twisting. We derive
21
+ a new exact relation between these effects, similar to the Betchov relation for the energy
22
+ flux, revealing that the mean contribution of the former is three times larger than that
23
+ of the latter. Multi-scale effects account for the remaining 50% of the mean flux, with
24
+ approximate equipartition between multi-scale vortex flattening, twisting and entangling.
25
+ 1. Introduction
26
+ The kinetic helicity, defined as the L2-inner product of velocity u and vorticity ω, has
27
+ dynamical, topological, geometrical, and statistical interpretations in turbulence. It is
28
+ a dynamical and topological inviscid invariant, where the latter refers to its connection
29
+ with the linking number of infinitesimal vortex lines (Moffatt 1969). Geometrically, it
30
+ quantifies the alignment of velocity and vorticity in a volume-averaged sense. Within
31
+ a statistical approach to turbulence, helicity is the correlation between velocity and
32
+ vorticity. In a rotationally invariant ensemble, it is connected to the breaking of the
33
+ symmetry under inversion of all axes. Inspired by its relevance to turbulence in atmo-
34
+ spheric flows (Lilly 1986), dynamical and statistical effects connected with helicity have
35
+ been studied in the atmospheric boundary layer (Deusebio & Lindborg 2014) and in
36
+ rotating turbulence (Mininni & Pouquet 2010a,b), and more generally in homogeneous
37
+ and isotropic turbulence (Chen et al. 2003a,b; Gledzer & Chkhetiani 2015; Kessar et al.
38
+ 2015; Sahoo et al. 2015; Stepanov et al. 2015; Alexakis 2017; Sahoo et al. 2017; Milanese
39
+ et al. 2021; Yan et al. 2020), as well as shear flows (Yan et al. 2020; Yu et al. 2022) and
40
+ in laboratory experiments (Scheeler et al. 2017).
41
+ The level of helicity in a turbulent flow affects turbulent statistics and dynamics, and
42
+ is thus of relevance from a fundamental theory perspective as well as for subgrid-scale
43
+ † Email address for correspondence: [email protected]
44
+ ‡ Email address for correspondence: [email protected]
45
+ arXiv:2301.04193v1 [physics.flu-dyn] 10 Jan 2023
46
+
47
+ 2
48
+ D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
49
+ (SGS) modelling. As an alignment of velocity and vorticity weakens the nonlinearity of
50
+ the Navier–Stokes equations, high levels of helicity have been connected with a depletion
51
+ of the kinetic energy flux across scales by an analysis of the coupling between helical
52
+ Fourier modes (Kraichnan 1973), and with regions of low dissipation (Moffatt 2014).
53
+ These effects can be quantified by upper bound theory applied to helical forcing and
54
+ direct numerical simulation — the energy flux of turbulence sustained by fully helical
55
+ forcing is about 30% lower than in the non-helical case (Linkmann 2018).
56
+ Helicity affects turbulence not only globally, that is, in terms of mean energy fluxes,
57
+ but also on a scale-by-scale level. As a solenoidal vector field, the velocity field u can
58
+ be decomposed into positively and negatively helical components u± (Herring 1974;
59
+ Constantin & Majda 1988; Waleffe 1992), u(x, t) = u+(x, t) + u−(x, t), where u±
60
+ are obtained by projecting the Fourier coefficients ˆu(k, t) onto basis vectors which are
61
+ eigenfunctions of the curl operator in Fourier space. That is, ˆu±(k, t) = u±(k, t)h±(k) ,
62
+ where ik × kh±(k) = ±h±(k) and u±(k, t) = ˆu(k, t) · h±(k). The energy flux can
63
+ then be decomposed into different triadic couplings between positively and negatively
64
+ helical velocity-field fluctuations (Waleffe 1992). Interestingly, interactions among helical
65
+ Fourier modes of like-signed helicity leads to an inverse energy transfer across scales in
66
+ the inertial range (Waleffe 1992; Biferale et al. 2012, 2013; Sahoo et al. 2015), while
67
+ interactions of oppositely-signed helical modes transfer energy from large to small scales
68
+ (Waleffe 1992; Alexakis 2017; Alexakis & Biferale 2018). For turbulent flows of electrically
69
+ conducting fluids such as liquid metals or plasmas in the fluid approximation, helicity
70
+ alters the evolution of both velocity and magnetic-field fluctuations profoundly. Here,
71
+ small-scale kinetic helicity facilitates the formation of large-scale coherent magnetic
72
+ structures through the large-scale dynamo (Steenbeck et al. 1966; Brandenburg 2001;
73
+ Brandenburg & Subramanian 2005; Tobias et al. 2013; Linkmann et al. 2016, 2017).
74
+ The cascade of kinetic helicity itself is predicted to be direct, that is, it proceeds from
75
+ large to small scales (Brissaud et al. 1973; Waleffe 1992), and scale-local (Eyink 2005). It
76
+ results, as discussed by Eyink (2006) in the context of a multi-scale gradient expansion,
77
+ from a twisting of small-scale vortices into a local alignment with the small-scale velocity
78
+ fluctuations by large-scale differential vorticity (‘screw’). However, being sign-indefinite,
79
+ numerical results on helicity fluxes can be difficult to interpret as a loss of positive helicity
80
+ at a given scale may be viewed as a gain of negative helicity at the same scale.
81
+ In the context of SGS modelling, the effect helicity has on a turbulent flow is usually
82
+ taken into account though additional diffusive model terms (Yokoi & Yoshizawa 1993;
83
+ Li et al. 2006; Baerenzung et al. 2008; Inagaki et al. 2017). However, a combination of
84
+ a-priori and a-posteriori analyses of different SGS models for isotropic helical turbulence
85
+ found the effect of the additional diffusive model terms to be small and that a classical
86
+ Smagorinsky model best represents the resolved-scale dynamics (Li et al. 2006). Similarly,
87
+ based on analytical and numerical results, Linkmann (2018) suggests an adjustment of
88
+ the Smagorinsky constant to account for high levels of helicity. So far, SGS analyses of
89
+ helical turbulence have mainly been concerned with energy transfers.
90
+ Here, we focus on the helicity flux across scales in statistically stationary homogeneous
91
+ and isotropic turbulence, with large-scale forcing breaking mirror symmetry. For the
92
+ energy flux, the Betchov (1956) relation states that the mean contribution from vortex
93
+ stretching to the energy cascade is triple that due to strain self-amplification. Carbone
94
+ & Wilczek (2022) recently showed that there are no further kinematic relations for the
95
+ energy flux in statistically stationary homogeneous and isotropic turbulence with zero net
96
+ helicity. However, we prove here that a new exact kinematic Betchov-type relation exists
97
+ for the mean helicity flux. Furthermore, we also present an exact decomposition of the
98
+ helicity flux in analogy to that of the kinetic energy flux derived by Johnson (2020, 2021),
99
+
100
+ Helicity fluxes in homogeneous turbulence
101
+ 3
102
+ whereby the relative contributions of physical mechanisms, such as vortex stretching and
103
+ strain self-amplification, to the energy cascade can be quantified in terms of the overall
104
+ contribution and their scale-locality. The aim is to identify physical mechanisms that
105
+ transfer kinetic helicity across scales and to quantify their relative contributions to the
106
+ mean helicity flux and its fluctuations, which may be useful for the construction of SGS
107
+ models when resolving the helicity cascade is of interest.
108
+ 2. Exact decomposition of the kinetic helicity flux
109
+ To derive the aforementioned exact decomposition of the helicity flux and relations
110
+ between the resulting subfluxes, we begin with the three-dimensional (3D) incompressible
111
+ Navier–Stokes equations, here written in component form
112
+ ∂tui + ∂j (uiuj) = −∂jpδij + 2ν∂jSij + fi ,
113
+ (2.1)
114
+ ∂juj = 0 ,
115
+ (2.2)
116
+ where u = (u1, u2, u3) is the velocity field, p the pressure divided by the constant density,
117
+ ν the kinematic viscosity, Sij the rate-of-strain tensor, and f = (f1, f2, f3) an external
118
+ solenoidal force that may be present. To define the helicity flux across scales, we introduce
119
+ a filtering operation to separate large- and small-scale dynamics (e.g., Germano 1992).
120
+ Specifically, for a generic function φ, the filtered version at scale ℓ is φ
121
+ ℓ = Gℓ ∗ φ , where
122
+ Gℓ is a filter kernel with filter width ℓ and the asterisk denotes the convolution operation.
123
+ Applying the filter to the Navier–Stokes equations (2.1)–(2.2) results in
124
+ ∂tuℓ
125
+ i + ∂j
126
+
127
+ uℓ
128
+ iuℓ
129
+ j + pℓδij − 2νS
130
+
131
+ ij + τ ℓ
132
+ ij
133
+
134
+ = f
135
+
136
+ i ,
137
+ (2.3)
138
+ where τ ℓ
139
+ ij = τ ℓ(ui, uj) = uiujℓ − uℓ
140
+ iuℓ
141
+ j is the SGS stress tensor. Here, we follow the
142
+ notation of Germano (1992) in defining the generalised second moment for any two fields
143
+ as τ ℓ(a, b) = ab
144
+ ℓ − aℓb
145
+ ℓ. We also require the filtered vorticity equation
146
+ ∂tωℓ
147
+ i + ∂j
148
+
149
+ ωℓ
150
+ iuℓ
151
+ j − uℓ
152
+ iωℓ
153
+ j − ν∂jωℓ
154
+ i
155
+
156
+ − gℓ
157
+ i = −∂j
158
+
159
+ ϵimn∂mτ ℓ
160
+ nj
161
+
162
+ ,
163
+ (2.4)
164
+ where g = ∇ × f. The large-scale helicity density, Hℓ = uℓ
165
+ iωℓ
166
+ i, then evolves according to
167
+ ∂tHℓ + ∂j
168
+
169
+ Hℓuℓ
170
+ j + (pℓ − 1
171
+ 2uℓ
172
+ iuℓ
173
+ i)ωℓ
174
+ j − ν∂jHℓ�
175
+ + 2ν(∂juℓ
176
+ i)(∂jωℓ
177
+ i) − ωℓ
178
+ if
179
+
180
+ i − uℓ
181
+ igℓ
182
+ i
183
+ = −∂j
184
+
185
+ 2ωℓ
186
+ iτ ℓ
187
+ ij + ϵijkuℓ
188
+ i∂mτ ℓ
189
+ km
190
+
191
+ + 2τ ℓ
192
+ ij∂jωℓ
193
+ i
194
+ (2.5)
195
+ The last term in this equation is the helicity flux
196
+ ΠH,ℓ = −2τ ℓ
197
+ ij∂jωℓ
198
+ i ,
199
+ (2.6)
200
+ and is the central focus herein. It has an alternative form (Yan et al. 2020),
201
+ ˜ΠH,ℓ = −τ ℓ
202
+ ij∂jωℓ
203
+ i −
204
+
205
+ τ ℓ(ωi, uj) − τ ℓ(ui, ωj)
206
+
207
+ ∂juℓ
208
+ i ,
209
+ (2.7)
210
+ and it can be shown that the RHSs of (2.6) and (2.7) differ by an expression that can
211
+ be written as a divergence and therefore vanishes after averaging spatially, at least for
212
+ statistically homogeneous turbulence (Yan et al. 2020). This implies ⟨ΠH,ℓ⟩ = ⟨ ˜ΠH,ℓ⟩.
213
+ Eyink (2006) links the first term in (2.7) — which is proportional to ΠH,ℓ — to vortex
214
+ twisting and Yan et al. (2020) attribute the second term to vortex stretching. In what
215
+ follows we discuss an exact decomposition of ΠH,ℓ, and show that both effects can be
216
+ identified therein. We also use ΠH,ℓ for our numerical evaluations (cf. Chen et al. 2003a;
217
+ Eyink 2006).
218
+
219
+ 4
220
+ D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
221
+ 2.1. Gaussian filter relations for the helicity flux
222
+ So far all expressions are exact and filter-independent. To derive exact decompositions
223
+ of the helicity flux in both representations, we now focus on Gaussian filters. For that
224
+ case, Johnson (2020, 2021) showed that the subgrid-scale stresses can be obtained as the
225
+ solution of a forced diffusion equation with ℓ2 being the time-like variable, resulting in
226
+ τ ℓ
227
+ ij = τ ℓ(ui, uj) = ℓ2A
228
+
229
+ ikA
230
+
231
+ jk +
232
+ � ℓ2
233
+ 0
234
+ dθ τ φ
235
+
236
+ A
237
+
238
+ θ
239
+ ik , A
240
+
241
+ θ
242
+ kj
243
+
244
+ ,
245
+ (2.8)
246
+ where φ(θ) =
247
+
248
+ ℓ2 − θ, and Aij = ∂jui are the velocity-field gradients. Since the SGS
249
+ stress tensor τ ℓ
250
+ ij is symmetric, for the first form of the helicity flux we obtain in analogy
251
+ to the energy flux
252
+ ΠH,ℓ = −2τ ℓ
253
+ ijS
254
+
255
+ ω,ij,
256
+ (2.9)
257
+ where Sω is the symmetric component of the vorticity gradient tensor, with components
258
+ Sω,ij = (∂jωi + ∂iωj)/2. Employing (2.8) this yields
259
+ ΠH,ℓ = −2ℓ2S
260
+
261
+ ω,ijA
262
+
263
+ ikA
264
+
265
+ jk − 2
266
+ � ℓ2
267
+ 0
268
+ dθ S
269
+
270
+ ω,ijτ φ
271
+
272
+ A
273
+
274
+ θ
275
+ ik , A
276
+
277
+ θ
278
+ kj
279
+
280
+ .
281
+ (2.10)
282
+ The first term involves a product of gradient tensors filtered at the same scale, ℓ; hence
283
+ we refer to it as being single-scale, and denote it ΠH,ℓ
284
+ s
285
+ . In mean, it coincides with the
286
+ nonlinear LES model for the SGS-stresses (Eyink 2006). In contrast, the second term
287
+ encodes the correlation between resolved-scale vorticity-field gradients and (summed)
288
+ velocity-field gradients at each scale smaller than ℓ, so that we refer to it as multi-scale.
289
+ Splitting the velocity gradient tensors into symmetric and anti-symmetric parts, that
290
+ is, into the rate-of-strain tensor S = (A + At)/2 and vorticity tensor Ω = (A − At)/2,
291
+ where At is the transpose of A, the helicity flux can be decomposed into six subfluxes
292
+ ΠH,ℓ = Πℓ
293
+ s,SS + Πℓ
294
+ s,ΩΩ + Πℓ
295
+ s,SΩ + Πℓ
296
+ m,SS + Πℓ
297
+ m,ΩΩ + Πℓ
298
+ m,SΩ,
299
+ (2.11)
300
+ where the single-scale terms are
301
+ ΠH,ℓ
302
+ s,SS = −2ℓ2S
303
+
304
+ ω,ijS
305
+
306
+ ikS
307
+
308
+ jk = −2ℓ2tr
309
+
310
+ (S
311
+
312
+ ω)tS
313
+ ℓ(S
314
+ ℓ)t�
315
+ ,
316
+ (2.12)
317
+ ΠH,ℓ
318
+ s,ΩΩ = −2ℓ2S
319
+
320
+ ω,ijΩ
321
+
322
+ ikΩ
323
+
324
+ jk = −2ℓ2tr
325
+
326
+ (S
327
+
328
+ ω)tΩ
329
+ ℓ(Ω
330
+ ℓ)t�
331
+ ,
332
+ (2.13)
333
+ ΠH,ℓ
334
+ s,SΩ = −2ℓ2S
335
+
336
+ ω,ij
337
+
338
+ S
339
+
340
+ ikΩ
341
+
342
+ jk − Ω
343
+
344
+ ikS
345
+
346
+ jk
347
+
348
+ = −4ℓ2tr
349
+
350
+ (S
351
+
352
+ ω)tS
353
+ ℓ(Ω
354
+ ℓ)t�
355
+ ,
356
+ (2.14)
357
+ and tr {·} denotes the trace. Similarly, the multi-scale terms are
358
+ ΠH,ℓ
359
+ m,SS = −2
360
+ � ℓ2
361
+ 0
362
+ dθ S
363
+
364
+ ω,ijτ φ
365
+
366
+ S
367
+
368
+ θ
369
+ ik , S
370
+
371
+ θ
372
+ kj
373
+
374
+ ,
375
+ (2.15)
376
+ ΠH,ℓ
377
+ m,ΩΩ =
378
+ 2
379
+ � ℓ2
380
+ 0
381
+ dθ S
382
+
383
+ ω,ijτ φ
384
+
385
+
386
+
387
+ θ
388
+ ik , Ω
389
+
390
+ θ
391
+ kj
392
+
393
+ ,
394
+ (2.16)
395
+ ΠH,ℓ
396
+ m,SΩ = −2
397
+ � ℓ2
398
+ 0
399
+ dθ S
400
+
401
+ ω,ij
402
+
403
+ τ φ
404
+
405
+ S
406
+
407
+ θ
408
+ ik , Ω
409
+
410
+ θ
411
+ jk
412
+
413
+ + τ φ
414
+
415
+
416
+
417
+ θ
418
+ ik , S
419
+
420
+ θ
421
+ jk
422
+ ��
423
+ = −4
424
+ � ℓ2
425
+ 0
426
+ dθ S
427
+
428
+ ω,ijτ φ
429
+
430
+ S
431
+
432
+ θ
433
+ ik , Ω
434
+
435
+ θ
436
+ jk
437
+
438
+ .
439
+ (2.17)
440
+ We recall that ⟨ΠH,ℓ
441
+ s,ΩΩ⟩, the spatial average of the contribution to the helicity flux due
442
+
443
+ Helicity fluxes in homogeneous turbulence
444
+ 5
445
+ to coupling of resolved-scale vorticity strain with resolved-scale vorticity, vanishes
446
+ ⟨ΠH,ℓ
447
+ s,ΩΩ⟩ = −ℓ2
448
+ 4
449
+ ��
450
+ ∂jωℓ
451
+ i + ∂iωℓ
452
+ j
453
+
454
+ ωℓ
455
+ iωℓ
456
+ j
457
+
458
+ = −ℓ2
459
+ 4
460
+
461
+ ∂j(ωℓ
462
+ iωℓ
463
+ iωℓ
464
+ j)
465
+
466
+ = 0 ,
467
+ (2.18)
468
+ due to periodic boundary conditions and the divergence-free nature of the vorticity field,
469
+ as previously discussed by Eyink (2006) in the context of a multi-scale gradient expansion
470
+ of the SGS stress tensor.
471
+ The physics encoded in these transfer terms may be understood in terms of three
472
+ effects: (i) “vortex flattening” – compression and stretching of a vortex tube into a
473
+ vortex sheet by large-scale straining motion, with the principal axes of the vorticity
474
+ deformation tensor Sω aligning with that of the strain-rate tensor at smaller scale,
475
+ see (2.12) and (2.15); (ii) “vortex twisting” – a twisting of small-scale vortex tubes
476
+ by large-scale differential vorticity into thinner tubes consisting of helical vortex lines,
477
+ and subsequent small-scale alignment between the resulting vorticity vectors and the
478
+ extensile stress generated thereby (Eyink 2006), see (2.14) and (2.17); and (iii) “vortex
479
+ entangling” – twisting of entangled vortex lines, see (2.13) and (2.16). Interpreting
480
+ helicity as the correlation between velocity and vorticity, a change in this correlation
481
+ (or alignment) across scales occurs by vorticity deformation through straining motions
482
+ or differential vorticity. This results in decorrelation at large scales and an increase in
483
+ small-scale correlation.
484
+ 2.2. An exact Betchov-type relation for the helicity flux
485
+ In homogeneous turbulence, the Betchov (1956) relation is an exact expression con-
486
+ necting the contributions associated with vortex stretching and strain self-amplification
487
+ to the mean energy flux across scales. Here we show that there is an analogous exact
488
+ expression relating two (single scale) mean helicity subfluxes: 3⟨ΠH,ℓ
489
+ s,SS⟩ = ⟨ΠH,ℓ
490
+ s,SΩ⟩. These
491
+ subfluxes are associated with vortex flattening, ⟨ΠH,ℓ
492
+ s,SS⟩, and vortex twisting, ⟨ΠH,ℓ
493
+ s,SΩ⟩.
494
+ Written in terms of the definitions given in (2.12) and (2.14), this expression reads
495
+ 3
496
+
497
+ tr
498
+
499
+ S
500
+
501
+ ωS
502
+ ℓS
503
+ ℓ��
504
+ = 2
505
+
506
+ tr
507
+
508
+ S
509
+
510
+ ωΩ
511
+ ℓS
512
+ ℓ��
513
+ .
514
+ (2.19)
515
+ The main steps in a proof of this are now summarised. Following an argument analogous
516
+ to that used in proving the Betchov (1956) relation for the energy flux, and using tensor
517
+ symmetry properties and (2.18), one obtains (Eyink 2006)
518
+
519
+ tr
520
+
521
+ S
522
+
523
+ ωS
524
+ ℓS
525
+ ℓ��
526
+ = −
527
+
528
+ tr
529
+
530
+
531
+
532
+ ω(S
533
+ ℓΩ
534
+ ℓ + Ω
535
+ ℓS
536
+ ℓ)
537
+ ��
538
+ = −2
539
+
540
+ tr
541
+
542
+
543
+
544
+ ωΩ
545
+ ℓS
546
+ ℓ��
547
+ ,
548
+ (2.20)
549
+ where Ωω is the antisymmetric part of the vorticity gradient tensor. This yields
550
+ 1
551
+ 2
552
+
553
+ tr
554
+
555
+ ∇ωℓ �
556
+ ∇uℓ�t ��
557
+ ∇uℓ + ∇uℓ�t���
558
+ =
559
+
560
+ tr
561
+ �3
562
+ 2 S
563
+
564
+ ωS
565
+ ℓS
566
+ ℓ − S
567
+
568
+ ωΩ
569
+ ℓS
570
+ ℓ��
571
+ .
572
+ (2.21)
573
+ Thus, showing that the lefthand side (LHS) of this expression vanishes will prove the
574
+ Betchov relation for the helicity flux, (2.19). To do so, we express the LHS of eq. (2.21)
575
+ using the chain rule and in index notation
576
+
577
+ ∂jωℓ
578
+ i∂juℓ
579
+ kS
580
+
581
+ ki
582
+
583
+ =
584
+
585
+ ∂j
586
+
587
+ ωℓ
588
+ i∂juℓ
589
+ kS
590
+
591
+ ki
592
+ ��
593
+
594
+
595
+ ωℓ
596
+ i∂j∂juℓ
597
+ kS
598
+
599
+ ki
600
+
601
+
602
+
603
+ ωℓ
604
+ iS
605
+
606
+ kj∂jS
607
+
608
+ ki
609
+
610
+
611
+
612
+ ωℓ
613
+ iΩ
614
+
615
+ kj∂jS
616
+
617
+ ki
618
+
619
+ .
620
+ (2.22)
621
+ The first term on the RHS of this expression vanishes making use of periodic boundary
622
+ conditions. Using incompressibility and integration by parts it can be shown that the
623
+
624
+ 6
625
+ D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
626
+ N
627
+ E
628
+ ν
629
+ ε
630
+ εH
631
+ L
632
+ τ
633
+ Reλ η/10−3 kmax kmaxη ∆t/τ
634
+ #
635
+ 1024 7.26 0.001 3.33 5.02 1.12 0.50 327
636
+ 4.20
637
+ 340
638
+ 1.43
639
+ 0.60
640
+ 39
641
+ Table 1. Simulation parameters and key observables, where N is the number of collocation
642
+ points in each coordinate, E the (mean) total kinetic energy, ν the kinematic viscosity, ε the mean
643
+ energy dissipation rate, εH the mean helicity dissipation rate, L = (3π/4E)
644
+ � kmax
645
+ 0
646
+ dk E(k)/k
647
+ the integral scale, τ = L/
648
+
649
+ 2E/3 the large-eddy turnover time, Reλ the Taylor-scale Reynolds
650
+ number, η = (ν3/ε)1/4 the Kolmogorov microscale, kmax the largest wave number after
651
+ de-aliasing, ∆t the sampling interval which is calculated from the length of the averaging
652
+ interval divided by the number of equispaced snapshots, and # the number of snapshots. The
653
+ data corresponds to run 22 of
654
+ Sahoo et al. (2017). It is available for download using the
655
+ SMART-Turb portal http://smart-turb.roma2.infn.it.
656
+ last term also vanishes. The two remaining terms cancel out, which is shown by similar
657
+ arguments and using the properties of the Levi-Civita tensor. This completes the proof.
658
+ The mean single-scale terms also arise as the first-order contribution in a multi-scale
659
+ expansion of the SGS stress tensor (Eyink 2006), where (2.20) is used to deduce that
660
+ the full vorticity gradient, not only either its symmetric or antisymmetric component, is
661
+ involved in the helicity flux across scales. In consequence, (2.19) and (2.20) assert that
662
+ the mean transfers involving the symmetric or the antisymmetric parts of the vorticity
663
+ gradient can be related to one another, and thus the single-scale contribution to the mean
664
+ helicity flux can be written as
665
+
666
+ ΠH,ℓ
667
+ s
668
+
669
+ = −8ℓ2 �
670
+ tr
671
+
672
+ S
673
+
674
+ ωS
675
+ ℓS
676
+ ℓ��
677
+ = −16
678
+ 3 ℓ2 �
679
+ tr
680
+
681
+ S
682
+
683
+ ωΩ
684
+ ℓS
685
+ ℓ��
686
+ .
687
+ (2.23)
688
+ 3. Numerical details and data
689
+ Data has been generated by direct numerical simulation of the incompressible 3D
690
+ Navier–Stokes equations (2.1) and (2.2) on a triply periodic domain of size Lbox =
691
+ 2π in each direction, where the forcing f is a random Gaussian process with zero
692
+ mean, fully helical f = f +, and active in the wavenumber band k ∈ [0.5, 2.4]. The
693
+ spatial discretisation is implemented through the standard, fully dealiased pseudospectral
694
+ method with 1024 collocation points in each direction. Further details and mean values
695
+ of key observables are summarised in table 1.
696
+ Figure 1(a) presents the time series of the total kinetic energy per unit volume, E(t).
697
+ Time-averaged kinetic energy spectra of positively and negatively helical fluctuations,
698
+ E±(k) = ⟨ 1
699
+ 2
700
+
701
+ k⩽|k|<k+1 |ˆu±(k)|2⟩ and the total energy spectrum E(k) = E+(k)+E−(k),
702
+ are shown in in Kolmogorov-compensated form in Fig. 1(b). As can be seen by comparison
703
+ of E+(k) and E−(k), the large-scale velocity-field fluctuations are dominantly positively
704
+ helical, which is a consequence of the forcing. Decreasing in scale, we observe that
705
+ negatively helical fluctuations increase in amplitude, and approximate equipartition
706
+ between E+(k) and E−(k) is reached for k ⩾ 20. That is, a helically forced turbulent
707
+ flow, where mirror-symmetry is broken at and close to the forcing scale, restores mirror-
708
+ symmetry at smaller scales through nonlinear interactions (Chen et al. 2003a; Deusebio
709
+ & Lindborg 2014; Kessar et al. 2015).
710
+
711
+ Helicity fluxes in homogeneous turbulence
712
+ 7
713
+ 0
714
+ 5
715
+ 10
716
+ 15
717
+ 20
718
+ 25
719
+ t/τ
720
+ −0.4
721
+ −0.2
722
+ 0.0
723
+ 0.2
724
+ 0.4
725
+ E(t)/E − 1
726
+ (a)
727
+ 10−2
728
+ 10−1
729
+ 100
730
+
731
+ 10−2
732
+ 10−1
733
+ 100
734
+ k5/3E(k)/ε2/3
735
+ E(k)
736
+ E+(k)
737
+ E−(k)
738
+ (b)
739
+ Figure 1. (a) Time evolution of the total energy normalised by its mean value, E. Time
740
+ is given in units of large-eddy turnover time τ. The red dots correspond to the sampled
741
+ velocity-field configurations. (b) Time-averaged energy spectra in Kolmogorov-compensated
742
+ form. The grey-shaded area indicates the forcing range. The dashed line indicates a Kolmogorov
743
+ constant CK ≈ 1.6.
744
+ 10−2
745
+ 10−1
746
+ 100
747
+ k η
748
+ 0.0
749
+ 0.2
750
+ 0.4
751
+ 0.6
752
+ 0.8
753
+ 1.0
754
+ ⟨ΠH,ℓ⟩/εH
755
+ ⟨ΠH,ℓ⟩
756
+ ⟨ΠH,ℓ
757
+ s,SΩ⟩
758
+ ⟨ΠH,ℓ
759
+ s,SS⟩
760
+ ⟨ΠH,ℓ
761
+ s,ΩΩ⟩
762
+ ⟨ΠH,ℓ
763
+ m,SS⟩
764
+ ⟨ΠH,ℓ
765
+ m,ΩΩ⟩
766
+ ⟨ΠH,ℓ
767
+ m,SΩ⟩
768
+ 3·⟨ΠH,ℓ
769
+ s,SS⟩
770
+ Figure 2. Decomposed helicity fluxes normalised with the mean helicity dissipation rate εH.
771
+ Filled markers corresponds to single-scale contributions while empty symbols are related to
772
+ multi-scale contributions. The error bars indicate one standard error. The subflux ⟨ΠH,ℓ
773
+ s,SΩ⟩ has
774
+ been superposed with 3⟨ΠH,ℓ
775
+ s,SS⟩ in order to highlight the Betchov-type relation (2.19).
776
+ 4. Numerical results for mean subfluxes and fluctuations
777
+ Figure 2 shows the total helicity flux and all subfluxes, normalised by the total helicity
778
+ dissipation rate εH. As can be seen in the figure, the term ⟨ΠH,ℓ
779
+ s,ΩΩ⟩ is identically zero,
780
+ which must be the case according to (2.18). Moreover, the helicity Betchov relation
781
+ (2.19) derived here is satisfied as it must be – the terms ⟨ΠH,ℓ
782
+ s,SΩ⟩ and 3 ⟨ΠH,ℓ
783
+ s,SS⟩ are
784
+ visually indistinguishable, with a relative error between them of order 10−6 (not shown).
785
+ A few further observations can be made from the data. The non-vanishing multi-scale
786
+ terms, ⟨ΠH
787
+ m,SΩ⟩, ⟨ΠH
788
+ m,SS⟩ and ⟨ΠH
789
+ m,ΩΩ⟩ are comparable in magnitude across all scales.
790
+ They are approximately scale-independent in the interval 10−2 ⩽ kη ⩽ 10−1, with each
791
+ accounting for about 15−20% of the total helicity flux in this range of scales. Even though
792
+ clear plateaux are not present for the two non-vanishing single-scale terms, ⟨ΠH
793
+ s,SΩ⟩ and
794
+ ⟨ΠH
795
+ s,SS⟩, one could tentatively extrapolate that at higher Re, about 30% of the mean
796
+ flux originates from scale-local vortex twisting and 10% from vortex flattening. That is,
797
+ the multi-scale contributions amount to 50%-60% and the scale-local contributions to
798
+ 40-50% of the total helicity flux across scales, at least for this particular simulation.
799
+
800
+ 8
801
+ D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
802
+ −100 −75 −50 −25
803
+ 0
804
+ 25
805
+ 50
806
+ 75
807
+ 100
808
+ ΠH,ℓ
809
+ X /σX
810
+ 10−1
811
+ 10−3
812
+ 10−5
813
+ 10−7
814
+ 10−9
815
+ σX · P(ΠH,ℓ
816
+ X )
817
+ kη = 8.4×10−2
818
+ (a)
819
+ ΠH,ℓ
820
+ s,ΩΩ
821
+ ΠH,ℓ
822
+ s
823
+ ΠH,ℓ
824
+ s,SS
825
+ ΠH,ℓ
826
+ s,SΩ
827
+ −100 −75 −50 −25
828
+ 0
829
+ 25
830
+ 50
831
+ 75
832
+ 100
833
+ ΠH,ℓ
834
+ X /σX
835
+ 10−1
836
+ 10−3
837
+ 10−5
838
+ 10−7
839
+ 10−9
840
+ σX · P(ΠH,ℓ
841
+ X )
842
+ kη = 8.4×10−2
843
+ (b)
844
+ ΠH,ℓ
845
+ m,SS
846
+ ΠH,ℓ
847
+ m
848
+ ΠH,ℓ
849
+ m,SΩ
850
+ ΠH,ℓ
851
+ m,ΩΩ
852
+ Figure 3. Standardised PDFs of helicity subfluxes ΠH,ℓ
853
+ X , where X refers to the subflux identifier,
854
+ for (a) single-scale and (b) multi-scale contributions; σX denotes the standard deviation of each
855
+ respective term.
856
+ Having discussed the mean subfluxes, we now consider the fluctuations of each subflux
857
+ term, in order to quantify the level of fluctuations in each term and the presence and
858
+ magnitude of helicity backscatter. Figure 3 presents standardised probability density
859
+ functions (PDFs) of all helicity subfluxes at k = π/ℓ = 20, which is in the inertial range.
860
+ These PDFs are fairly symmetric, much more so than for the kinetic energy fluxes, have
861
+ wide tails, and are strongly non-Gaussian. Single- and multi-scale terms all have strong
862
+ fluctuations of about 75 standard deviations. Interestingly, the subflux term ΠH,ℓ
863
+ s,ΩΩ, which
864
+ necessarily vanishes in mean (see (2.18)), has the strongest fluctuations (i.e., is the most
865
+ intermittent). PDFs for all the other subfluxes are comparable. The symmetry is more
866
+ pronounced in the single-scale rather than the multi-scale terms, as can be seen by
867
+ comparison of the left and right panels of fig. 3. As all averaged fluxes (except ⟨ΠH,ℓ
868
+ s,ΩΩ⟩
869
+ which is zero) transfer positive helicity from large to small scales, symmetry in the PDFs
870
+ indicates strong backscatter of positive helicity, or forward scatter of negative helicity.
871
+ The PDFs become even broader with decreasing filter scale (not shown). A comparison
872
+ between the PDFs of ΠH,ℓ and the alternate description based on SGS stresses related
873
+ to vortex stretching, ˜ΠH,ℓ, has been carried out by Yan et al. (2020), indicating more
874
+ intense backscatter in the latter compared to the former. Adding or removing a total
875
+ gradient can strongly reduce the negative tail of the SGS energy transfer (Vela-Mart´ın
876
+ 2022), and the same may apply to the helicity flux.
877
+ 5. Conclusions
878
+ We have derived an exact decomposition of the helicity flux across scales in terms
879
+ of interactions between vorticity gradients and velocity gradients, and in terms of their
880
+ scale locality. Decomposing all gradient tensors into symmetric and anti-symmetric parts
881
+ allows for a discussion and quantification of different physical mechanisms that constitute
882
+ the helicity cascade. Simulation results indicate that all subfluxes transfer helicity from
883
+ large to small scales, albeit with strong backscatter. In the inertial range, about 50% of
884
+ the total mean helicity flux is due to the action of two scale-local processes: (i) vortex
885
+ flattening and (ii) vortex twisting. We have also shown that these two effects are related
886
+ in mean through a newly derived exact (Betchov-type) relation, which implies that the
887
+ contribution of the former is exactly three times larger than that of the latter. Multi-scale
888
+ effects account for the remaining 50%, with approximate equipartition between multi-
889
+ scale versions of the two aforementioned effects and multi-scale vortex entangling. Thus,
890
+ it seems likely that, in LES contexts, accurate modeling of the helicity cascade should not
891
+ neglect the multi-scale contributions. Although our numerical quantification of the fluxes
892
+ is obtained using data from a single simulation with an inertial range of limited length,
893
+
894
+ Helicity fluxes in homogeneous turbulence
895
+ 9
896
+ we conjecture that the results obtained are robust in the sense that we expect them to
897
+ hold for flows with larger Reynolds numbers. Similar flux decompositions can be derived
898
+ for magnetohydrodynamics. We will report results of these investigations elsewhere in
899
+ due course.
900
+ Computational resources were provided through Scottish Academic Access on
901
+ Cirrus (www.cirrus.ac.uk), and the UK Turbulence Consortium on ARCHER2
902
+ (www.archer2.ac.uk). This work received funding from the European Research Council
903
+ (ERC) under the European Union’s Horizon 2020 research and innovation programme
904
+ (grant agreement No 882340) and from the Priority Programme SPP 1881 “Turbulent
905
+ Superstructures” of the Deutsche Forschungsgemeinschaft (DFG, Li3694/1).
906
+ Competing interests: the authors declare none.
907
+ REFERENCES
908
+ Alexakis, A. 2017 Helically Decomposed Turbulence. J. Fluid Mech. 812, 752–770.
909
+ Alexakis, A. & Biferale, L. 2018 Cascades and transitions in turbulent flows. Physics Reports
910
+ 767-769, 1–101.
911
+ Baerenzung, J., Politano, H., Ponty, Y. & Pouquet, A. 2008 Spectral modeling of
912
+ turbulent flows and the role of helicity. Phys. Rev. E. 77, 046303.
913
+ Betchov, R. 1956 An inequality concerning the production of vorticity in isotropic turbulence.
914
+ J. Fluid Mech. 1, 497.
915
+ Biferale, L., Musacchio, S. & Toschi, F. 2012 Inverse energy cascade in three-dimensional
916
+ isotropic turbulence. Phys. Rev. Lett. 108, 164501.
917
+ Biferale, L., Musacchio, S. & Toschi, F. 2013 Split Energy-Helicity cascades in three
918
+ dimensional Homogeneous and Isotropic Turbulence. J. Fluid Mech. 730, 309–327.
919
+ Brandenburg, A. 2001 The inverse cascade and nonlinear alpha-effect in simulations of
920
+ isotropic helical magnetohydrodynamic turbulence. Astrophys. J. 550, 824–840.
921
+ Brandenburg, A. & Subramanian, K. 2005 Astrophysical magnetic fields and nonlinear
922
+ dynamo theory. Phys. Reports 417, 1–209.
923
+ Brissaud, A., Frisch, U., L´eorat, J., Lesieur, M. & Mazure, A. 1973 Helicity cascades
924
+ in fully developed isotropic turbulence. Phys. Fluids 16, 1366–1367.
925
+ Carbone, M. & Wilczek, M. 2022 Only two Betchov homogeneity constraints exist for
926
+ isotropic turbulence. J. Fluid Mech. 948, R2.
927
+ Chen, Q., Chen, S. & Eyink, G. L. 2003a The joint cascade of energy and helicity in three-
928
+ dimensional turbulence. Phys. Fluids 15, 361–374.
929
+ Chen, Q., Chen, S., Eyink, G. L. & Holm, D. D. 2003b Intermittency in the joint cascade
930
+ of energy and helicity. Phys. Rev. Lett. 90, 214503.
931
+ Constantin, P. & Majda, A. 1988 The Beltrami spectrum for incompressible flows. Commun.
932
+ Math. Phys. 115, 435–456.
933
+ Deusebio, E. & Lindborg, E. 2014 Helicity in the Ekman boundary layer. J. Fluid Mech.
934
+ 755, 654–671.
935
+ Eyink, G. L. 2005 Locality of turbulent cascades. Physica D 207, 91–116.
936
+ Eyink, G. L. 2006 Multi-scale gradient expansion of the turbulent stress tensor. J. Fluid Mech.
937
+ 549, 159–190.
938
+ Germano, M. 1992 Turbulence — the filtering approach. J. Fluid Mech. 238, 325–336.
939
+ Gledzer, E. B. & Chkhetiani, O. G. 2015 Inverse energy cascade in developed turbulence
940
+ at the breaking of the symmetry of helical modes. JETP Letters 102, 465–472.
941
+ Herring, J. R. 1974 Approach of axisymmetric turbulence to isotropy. Phys. Fluids 17, 859.
942
+ Inagaki, K., Yokoi, N. & Hamba, F. 2017 Mechanism of mean flow generation in rotating
943
+ turbulence through inhomogeneous helicity. Phys. Rev. Fluids 2, 114605.
944
+ Johnson, P. L. 2020 Energy transfer from large to small scales in turbulence by multiscale
945
+ nonlinear strain and vorticity interactions. Phys. Rev. Lett. 124, 104501.
946
+ Johnson, P. L. 2021 On the role of vorticity stretching and strain self-amplification in the
947
+ turbulence energy cascade. J. Fluid Mech. 922, A3.
948
+
949
+ 10
950
+ D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
951
+ Kessar, M., Plunian, F., Stepanov, R. & Balarac, G. 2015 Non-Kolmogorov cascade of
952
+ helicity-driven turbulence. Phys. Rev. E 92, 031004(R).
953
+ Kraichnan, R. 1973 Helical turbulence and absolute equilibrium. J. Fluid Mech. 59, 745–752.
954
+ Li, Y., Meneveau, C., Chen, S. & Eyink, G. L. 2006 Subgrid-scale modeling of helicity and
955
+ energy dissipation in helical turbulence. Phys. Rev. E. 74, 026310.
956
+ Lilly, D. K. 1986 The structure, energetics, and propagation of rotating convective storms.
957
+ Part II: Helicity and storm stabilization. J. Atmos. Sci. 43, 126.
958
+ Linkmann, M. 2018 Effects of helicity on dissipation in homogeneous box turbulence. J. Fluid
959
+ Mech. 856, 79–102.
960
+ Linkmann, M. F., Berera, A., McKay, M. E. & J¨ager, J. 2016 Helical mode interactions
961
+ and spectral energy transfer in magnetohydrodynamic turbulence. J. Fluid Mech. 791,
962
+ 61–96.
963
+ Linkmann, M. F., Sahoo, G., McKay, M. E., Berera, A. & Biferale, L. 2017 Effects
964
+ of Magnetic and Kinetic Helicities on the Growth of Magnetic Fields in Laminar and
965
+ Turbulent Flows by Helical Fourier Decomposition. Astrophys. J. 836, 26.
966
+ Milanese, L. M., Loureiro, N. F. & Boldyrev, S. 2021 Dynamic Phase Alignment in
967
+ Navier-Stokes Turbulence. Phys. Rev. Lett. 127, 274501.
968
+ Mininni, P. D. & Pouquet, A. G. 2010a Rotating helical turbulence. I. Global evolution and
969
+ spectral behavior. Phys. Fluids 22, 035105.
970
+ Mininni, P. D. & Pouquet, A. G. 2010b Rotating helical turbulence. II. Intermittency, scale
971
+ invariance, and structures. Phys. Fluids 22, 035106.
972
+ Moffatt, H. K. 1969 The degree of knottedness of tangled vortex lines. J. Fluid Mech. 35,
973
+ 117–129.
974
+ Moffatt, H. K. 2014 Helicity and singular structures in fluid dynamics. Proc. Natl. Acad. Sci.
975
+ 111 (10), 3663–3670.
976
+ Sahoo, G., Alexakis, A. & Biferale, L. 2017 Discontinuous transition from direct to inverse
977
+ cascade in three-dimensional turbulence. Phys. Rev. Lett. 118, 164501.
978
+ Sahoo, G., Bonaccorso, F. & Biferale, L. 2015 Role of helicity for large- and small-scale
979
+ turbulent fluctuations. Phys. Rev. E 92, 051002.
980
+ Scheeler, M. W., van Rees, W. M., Kedia, H., Kleckner, D. & Irvine, W. T. M. 2017
981
+ Complete measurement of helicity and its dynamics in vortix tubes. Science 357, 487–491.
982
+ Steenbeck, M., Krause, F. & R¨adler, K.-H. 1966 Berechnung der mittleren Lorentz-
983
+ Feldst¨arke v x B f¨ur ein elektrisch leitendes Medium in turbulenter, durch Coriolis-Kr¨afte
984
+ beeinflußter Bewegung. Z. Naturforsch. A 21, 369.
985
+ Stepanov, R., Golbraikh, E., Frick, P. & Shestakov, A. 2015 Hindered energy cascade
986
+ in highly helical isotropic turbulence. Phys. Rev. Lett. 115, 234501.
987
+ Tobias, S. M., Cattaneo, F. & Boldyrev, S. 2013 MHD Dynamos and Turbulence. In Ten
988
+ Chapters in Turbulence. Cambridge University Press.
989
+ Vela-Mart´ın, A. 2022 Subgrid-scale models of isotropic turbulence need not produce energy
990
+ backscatter. J. Fluid Mech. 937, A14.
991
+ Waleffe, F. 1992 The nature of triad interactions in homogeneous turbulence. Phys. Fluids A
992
+ 4, 350–363.
993
+ Yan, Z., Li, X., Yu, C., Wang, J. & Chen, S. 2020 Dual channels of helicity cascade in
994
+ turbulent flows. J. Fluid Mech. 894, R2.
995
+ Yokoi, N. & Yoshizawa, A. 1993 Statistical analysis of the effects of helicity in inhomogeneous
996
+ turbulence. Phys. Fluids A 5, 464.
997
+ Yu, C, Hu, R., Yan, Z. & Li, X. 2022 Helicity distributions and transfer in turbulent channel
998
+ flows with streamwise rotation. J. Fluid Mech. 940, A18.
999
+
29E2T4oBgHgl3EQf5whX/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
3NAzT4oBgHgl3EQfR_tE/content/2301.01224v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a0a74cf5e0a8243aa19a754da43f85d47a14264f056629ac94945cc226fbf8a7
3
+ size 7402666
5NE3T4oBgHgl3EQfpArI/content/tmp_files/2301.04639v1.pdf.txt ADDED
@@ -0,0 +1,131 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Experimental verification of the temperature coefficient of
2
+ resistivity
3
+ Robert D. Polak1, Michael R. Harris1, Kiet A. Nguyen1, and Anthony Kearns1
4
+ 1Department of Physics, Loyola University Chicago, Chicago, IL 60660, USA
5
+ We have created an experimental procedure for determining the temperature coefficient of resis-
6
+ tivity, αR, for introductory physics laboratories. As in the procedure from Henry [1], this method
7
+ examines the relationship between temperature and resistivity to establish αR within 10% of the
8
+ accepted value.
9
+ Electrical resistivity, ρ, varies with temperature according to:
10
+ ρ = ρo(1 + αR(T − To))
11
+ (1)
12
+ where ρo is the resistivity for a given temperature To, T is the temperature of the material, and αR
13
+ is the temperature coefficient of resistivity. For a wire of length, L, and cross-sectional area, A, the
14
+ resistance of a wire, R, is defined accordingly as
15
+ R = ρ L
16
+ A .
17
+ (2)
18
+ While resistance will increase as a product of both increased length and resistivity, the increase in
19
+ length provides a negligible increase in resistance. This is evident from observing that the thermal
20
+ coefficient of resistivity is approximately two orders of magnitude larger than the coefficient of
21
+ thermal expansion. As such, the change in resistivity is primarily responsible for the increase in
22
+ resistance. Hence, R will vary similarly with
23
+ R = Ro(1 + αR(T − To))
24
+ (3)
25
+ where Ro is the resistance of the wire at a temperature To.
26
+ By applying a current through the wire, its temperature will also vary as a result of Joule heating
27
+ and the resistance of the wire can be measured based on a given current, I, and difference in voltage,
28
+ ∆V , by
29
+ R = ∆V
30
+ I
31
+ .
32
+ (4)
33
+ Hence, by measuring the resistance as a function of temperature, we can determine αR by plotting
34
+ R vs. T − To and performing a linear fit using Eq. (3).
35
+ To perform the experiment, we created a closed circuit (see Fig. 1) in which a carbon steel
36
+ wire [2] is suspended under tension above a surface, as in most stringed instruments. Two digital
37
+ 1
38
+ arXiv:2301.04639v1 [physics.ed-ph] 21 Nov 2022
39
+
40
+ multimeters were used to record the voltage across and current through a 0.016 inch (0.406 mm)
41
+ diameter, 40-cm long wire. Temperature measurements were taken using liquid crystal thermometers
42
+ [3] placed in thermal contact with the wire by fastening them to the wire with an adhesive backing.
43
+ Two thermometers were used, one ranging from 14−31oC and the other from 32−49oC, to provide
44
+ an overall temperature range of 14−49oC. For the most accurate temperature readings, we found it
45
+ is essential to avoid all contact with the thermometers during the experiment. To collect the data,
46
+ we applied different currents to the wire, ranging from 0.2A to 1.0A. We used a BK Precision 1787B
47
+ power supply that allows for digital control of the current. We found that having initial steps of
48
+ 0.2A and later reduced to 0.1A created consistent temperature changes in the wire of 2 − 3oC. The
49
+ experiment proved much more difficult to complete using an analog power supply because of the
50
+ difficulty in creating the precise changes in current needed to have a well formed data set. After
51
+ allowing around 30 seconds for the system to reach thermal equilibrium, the recorded temperature of
52
+ each trial was given as the uppermost visible temperature reading of the liquid crystal thermometer,
53
+ as seen in Fig. 2. We recorded the temperature of, current through and voltage across the wire, and
54
+ calculated its resistance using Eq. (4).
55
+ By graphing the resistance of the wire as a function of T −To, where To is the temperature of the
56
+ wire with the lowest current applied, we can then apply a linear fit to the data with the y-intercept
57
+ yielding Ro and slope giving RoαR, according to Eq. (3). Figure 4 shows example experimental
58
+ results with the fit giving Ro = 0.744Ω and αR = 0.0039K−1. This is within 5% of the accepted
59
+ value of αR = 0.0041K−1 [4]. Repeated experiments found these results to be reproducible with αR
60
+ consistently measured within 10% of the accepted value.
61
+ To get the best results, we found that the resistance of the wire should be at least 0.3Ω to allow
62
+ for accurate resistance measurements. Furthermore, the wires need to be thick enough to support
63
+ the thermometers.
64
+ As such, we achieved the best results when using steel as opposed to other
65
+ materials with lower resistivity and tensile strength, such as copper and aluminum.
66
+ This experiment can be completed in less than 2 hours and uses equipment that is commonly
67
+ present in a typical introductory physics lab, with the exception of relatively low cost supplies such
68
+ as music wire and liquid crystal thermometers. It also reinforces key ideas from introductory physics
69
+ such as conservation of energy, where electrical energy becomes thermal energy, Ohm’s Law, and
70
+ the temperature dependence of resistance.
71
+ References
72
+ 1. D. Henry, “Resistance of a wire as a function of temperature”, The Physics Teacher 33, 96-97
73
+ (1995) https://doi.org/10.1119/1.2344149
74
+ 2. Precision Brand Music Wire (0.016 inch diameter); UPC. No. 21016
75
+ 3. TelaTemp reversible LCT strip model 416-2 (14 − 31oC) and 416-3 (32 − 49oC)
76
+ 4. S. Yafei , N. Dongjie, and S. Jing, 4th IEEE Conference on Industrial Electronics and Applications,
77
+ 368-372 (2009).
78
+ 2
79
+
80
+ Figure 1: The experimental setup (bottom) with the wire suspended above the box, and a circuit
81
+ diagram (top). The circuit consists of two multimeters set up to measure current and voltage and a
82
+ digital power supply. The liquid crystal thermometers are affixed to the top of the wire.
83
+ Figure 2: An example of a temperature reading corresponding to 37◦C (98◦F), according to the
84
+ procedure of reading the uppermost visible indication of the liquid crystal thermometer (the yellow
85
+ bar spanning 37◦C).
86
+ 3
87
+
88
+ L.C.Thermometers
89
+ Power
90
+ V
91
+ Supply
92
+ A
93
+ 20cm
94
+ 15
95
+ 40
96
+ 25
97
+ 30
98
+ 10
99
+ 35
100
+ TonsKala
101
+ NEVA10440
102
+ 102
103
+ 39
104
+ 100
105
+ 38
106
+ 98
107
+ 37
108
+ 5
109
+ 35
110
+ 34
111
+ 33Figure 3: Plot of resistance against the associated change in temperature for currents from 0.2 A to
112
+ 1.0 A. A linear fit of the data yields αR = 0.0039K−1.
113
+ 4
114
+
115
+ 0.80 -
116
+ 0.79-
117
+ 0.78
118
+ R
119
+ 0.77
120
+ 0.76 -
121
+ 0.75
122
+ 0.0
123
+ 2.5
124
+ 5.0
125
+ 7.5
126
+ 10.0
127
+ 12.5
128
+ 15.0
129
+ 17.5
130
+ 20.0
131
+ T- To (K)
5NE3T4oBgHgl3EQfpArI/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,95 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf,len=94
2
+ page_content='Experimental verification of the temperature coefficient of resistivity Robert D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
3
+ page_content=' Polak1, Michael R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
4
+ page_content=' Harris1, Kiet A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
5
+ page_content=' Nguyen1, and Anthony Kearns1 1Department of Physics, Loyola University Chicago, Chicago, IL 60660, USA We have created an experimental procedure for determining the temperature coefficient of resis- tivity, αR, for introductory physics laboratories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
6
+ page_content=' As in the procedure from Henry [1], this method examines the relationship between temperature and resistivity to establish αR within 10% of the accepted value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
7
+ page_content=' Electrical resistivity, ρ, varies with temperature according to: ρ = ρo(1 + αR(T − To)) (1) where ρo is the resistivity for a given temperature To, T is the temperature of the material, and αR is the temperature coefficient of resistivity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
8
+ page_content=' For a wire of length, L, and cross-sectional area, A, the resistance of a wire, R, is defined accordingly as R = ρ L A .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
9
+ page_content=' (2) While resistance will increase as a product of both increased length and resistivity, the increase in length provides a negligible increase in resistance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
10
+ page_content=' This is evident from observing that the thermal coefficient of resistivity is approximately two orders of magnitude larger than the coefficient of thermal expansion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
11
+ page_content=' As such, the change in resistivity is primarily responsible for the increase in resistance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
12
+ page_content=' Hence, R will vary similarly with R = Ro(1 + αR(T − To)) (3) where Ro is the resistance of the wire at a temperature To.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
13
+ page_content=' By applying a current through the wire, its temperature will also vary as a result of Joule heating and the resistance of the wire can be measured based on a given current, I, and difference in voltage, ∆V , by R = ∆V I .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
14
+ page_content=' (4) Hence, by measuring the resistance as a function of temperature, we can determine αR by plotting R vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
15
+ page_content=' T − To and performing a linear fit using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
16
+ page_content=' (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
17
+ page_content=' To perform the experiment, we created a closed circuit (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
18
+ page_content=' 1) in which a carbon steel wire [2] is suspended under tension above a surface, as in most stringed instruments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
19
+ page_content=' Two digital 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
20
+ page_content='04639v1 [physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
21
+ page_content='ed-ph] 21 Nov 2022 multimeters were used to record the voltage across and current through a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
22
+ page_content='016 inch (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
23
+ page_content='406 mm) diameter, 40-cm long wire.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
24
+ page_content=' Temperature measurements were taken using liquid crystal thermometers [3] placed in thermal contact with the wire by fastening them to the wire with an adhesive backing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
25
+ page_content=' Two thermometers were used, one ranging from 14−31oC and the other from 32−49oC, to provide an overall temperature range of 14−49oC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
26
+ page_content=' For the most accurate temperature readings, we found it is essential to avoid all contact with the thermometers during the experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
27
+ page_content=' To collect the data, we applied different currents to the wire, ranging from 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
28
+ page_content='2A to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
29
+ page_content='0A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
30
+ page_content=' We used a BK Precision 1787B power supply that allows for digital control of the current.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
31
+ page_content=' We found that having initial steps of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
32
+ page_content='2A and later reduced to 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
33
+ page_content='1A created consistent temperature changes in the wire of 2 − 3oC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
34
+ page_content=' The experiment proved much more difficult to complete using an analog power supply because of the difficulty in creating the precise changes in current needed to have a well formed data set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
35
+ page_content=' After allowing around 30 seconds for the system to reach thermal equilibrium, the recorded temperature of each trial was given as the uppermost visible temperature reading of the liquid crystal thermometer, as seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
36
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
37
+ page_content=' We recorded the temperature of, current through and voltage across the wire, and calculated its resistance using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
38
+ page_content=' (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
39
+ page_content=' By graphing the resistance of the wire as a function of T −To, where To is the temperature of the wire with the lowest current applied, we can then apply a linear fit to the data with the y-intercept yielding Ro and slope giving RoαR, according to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
40
+ page_content=' (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
41
+ page_content=' Figure 4 shows example experimental results with the fit giving Ro = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
42
+ page_content='744Ω and αR = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
43
+ page_content='0039K−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
44
+ page_content=' This is within 5% of the accepted value of αR = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
45
+ page_content='0041K−1 [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
46
+ page_content=' Repeated experiments found these results to be reproducible with αR consistently measured within 10% of the accepted value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
47
+ page_content=' To get the best results, we found that the resistance of the wire should be at least 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
48
+ page_content='3Ω to allow for accurate resistance measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
49
+ page_content=' Furthermore, the wires need to be thick enough to support the thermometers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
50
+ page_content=' As such, we achieved the best results when using steel as opposed to other materials with lower resistivity and tensile strength, such as copper and aluminum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
51
+ page_content=' This experiment can be completed in less than 2 hours and uses equipment that is commonly present in a typical introductory physics lab, with the exception of relatively low cost supplies such as music wire and liquid crystal thermometers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
52
+ page_content=' It also reinforces key ideas from introductory physics such as conservation of energy, where electrical energy becomes thermal energy, Ohm’s Law, and the temperature dependence of resistance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
53
+ page_content=' References 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
54
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
55
+ page_content=' Henry, “Resistance of a wire as a function of temperature”, The Physics Teacher 33, 96-97 (1995) https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
56
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
57
+ page_content='1119/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
58
+ page_content='2344149 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
59
+ page_content=' Precision Brand Music Wire (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
60
+ page_content='016 inch diameter);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
61
+ page_content=' UPC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
62
+ page_content=' No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
63
+ page_content=' 21016 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
64
+ page_content=' TelaTemp reversible LCT strip model 416-2 (14 − 31oC) and 416-3 (32 − 49oC) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
65
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
66
+ page_content=' Yafei , N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
67
+ page_content=' Dongjie, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
68
+ page_content=' Jing, 4th IEEE Conference on Industrial Electronics and Applications, 368-372 (2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
69
+ page_content=' 2 Figure 1: The experimental setup (bottom) with the wire suspended above the box, and a circuit diagram (top).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
70
+ page_content=' The circuit consists of two multimeters set up to measure current and voltage and a digital power supply.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
71
+ page_content=' The liquid crystal thermometers are affixed to the top of the wire.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
72
+ page_content=' Figure 2: An example of a temperature reading corresponding to 37◦C (98◦F), according to the procedure of reading the uppermost visible indication of the liquid crystal thermometer (the yellow bar spanning 37◦C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
73
+ page_content=' 3 L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
74
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
75
+ page_content='Thermometers Power V Supply A 20cm 15 40 25 30 10 35 TonsKala NEVA10440 102 39 100 38 98 37 5 35 34 33Figure 3: Plot of resistance against the associated change in temperature for currents from 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
76
+ page_content='2 A to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
77
+ page_content='0 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
78
+ page_content=' A linear fit of the data yields αR = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
79
+ page_content='0039K−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
80
+ page_content=' 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
81
+ page_content='80 - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
82
+ page_content='79- 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
83
+ page_content='78 R 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
84
+ page_content='77 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
85
+ page_content='76 - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
86
+ page_content='75 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
87
+ page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
88
+ page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
89
+ page_content='0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
90
+ page_content='5 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
91
+ page_content='0 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
92
+ page_content='5 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
93
+ page_content='0 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
94
+ page_content='5 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
95
+ page_content='0 T- To (K)' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
5dAyT4oBgHgl3EQfcfda/content/2301.00283v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:12d5de394da3173c221a606599ef5884ce4875a7e9a7219b916e7ca716d73512
3
+ size 128709
5dAyT4oBgHgl3EQfcfda/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6db39fcef97b8837e433555f494c7dbd4cb80a9ff2485bfff62ca2b90d842359
3
+ size 1245229
5dAyT4oBgHgl3EQfcfda/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:152a6f1e55d80ec87598eb80d6c1a6079cea720d8aaa99b6060a9c251a1648f6
3
+ size 45128
7NE3T4oBgHgl3EQfqApm/content/tmp_files/2301.04647v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
7tAzT4oBgHgl3EQfSPsA/content/2301.01227v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8d358250e55aedcfc2b93c2cd797212f4d9bc12a879a1405073f4a9f2bcb40c0
3
+ size 2505252
7tAzT4oBgHgl3EQfSPsA/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4112d3584753430b4e5c801a8e8310303d1969d5d10793d7f1f09260d5ea2d2d
3
+ size 10354733
7tAzT4oBgHgl3EQfSPsA/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ad54c4a1b9090da4cc2be3a805be1da93b0f8c8952aa03e3899187fc47b37652
3
+ size 411471
8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/2301.04216v1.pdf.txt ADDED
@@ -0,0 +1,1215 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ An Efficient Drifters Deployment Strategy to
2
+ Evaluate Water Current Velocity Fields
3
+ Murad Tukan, Eli Biton, Roee Diamant, Senior Member, IEEE
4
+ Abstract
5
+ Water current prediction is essential for understanding ecosystems, and to shed light on the role
6
+ of the ocean in the global climate context. Solutions vary from physical modeling, and long-term
7
+ observations, to short-term measurements. In this paper, we consider a common approach for water
8
+ current prediction that uses Lagrangian floaters for water current prediction by interpolating the trajectory
9
+ of the elements to reflect the velocity field. Here, an important aspect that has not been addressed before
10
+ is where to initially deploy the drifting elements such that the acquired velocity field would efficiently
11
+ represent the water current. To that end, we use a clustering approach that relies on a physical model of
12
+ the velocity field. Our method segments the modeled map and determines the deployment locations as
13
+ those that will lead the floaters to ’visit’ the center of the different segments. This way, we validate that
14
+ the area covered by the floaters will capture the in-homogeneously in the velocity field. Exploration over
15
+ a dataset of velocity field maps that span over a year demonstrates the applicability of our approach,
16
+ and shows a considerable improvement over the common approach of uniformly randomly choosing the
17
+ initial deployment sites. Finally, our implementation code can be found in [1].
18
+ Index Terms
19
+ Water currents, Positioning, Data processing, Coresets, Lagrangian floaters.
20
+ M. Tukan(corresponding author [email protected]) and R. Diamant are with the Department of Marine Technologies,
21
+ University of Haifa, 3498838 Haifa, Israel.
22
+ E. Biton is with the Dept. of physical oceanography, Israel Oceanographic and Limnological Research, 3109701 Haifa, Israel.
23
+ This work was sponsored in part by the MOST-BMBF German-Israeli Cooperation in Marine Sciences 2018-2020 (Grant #
24
+ 3-16573), by the MOST action for Agriculture, Environment, and Water for the year 2019 (Grant # 3-16728), and by a grant
25
+ from the University of Haifa’s Data Science Research Center. This work has been submitted to the IEEE for possible publication.
26
+ Copyright may be transferred without notice, after which this version may no longer be accessible.
27
+ arXiv:2301.04216v1 [cs.LG] 10 Jan 2023
28
+
29
+ I. INTRODUCTION
30
+ Knowledge and information about the ocean’s flow is highly applicable to scientific purposes
31
+ such as climate change, global heat distribution, air-sea interactions, eddy formations, convection,
32
+ tides, biological productivity, to name a few. Prediction of the water current is also required for
33
+ operational needs such as marine conservation, search and rescue, the fishing industry, navigation,
34
+ the development of marine infrastructure, tracking oil-spill distribution, tsunami warnings, and
35
+ renewable energy. The study of the complex oceanic flow field variability - characterized by
36
+ a wide range of spatial-temporal scales of processes - demands the combination of physical
37
+ models and observations. In particular, the latter can be used to calibrate or to validate the
38
+ model’s parameters, as well as to serve as a database for statistical evaluation.
39
+ Existing systems for directly measuring the water current (WC) mostly involve current profiling
40
+ at a fixed deployment position, such as acoustic Doppler current profiles (e.g., ADCPs), or cover
41
+ extensive areas, but only of the sea surface (e.g., HF radar and satellite elevation data). The data
42
+ collected is used as an input for analytical and numerical models in a data assimilation fashion [2],
43
+ [3], [4]. These models rely on local environmental information such as temperature, wind velocity,
44
+ bathythermy and bathytermic, and need to be calibrated [5], [6] Another solution is to use
45
+ Lagrangian floaters to in-situ evaluate the velocity field for data assimilation. Recently, [7] has
46
+ developed a methodology to estimate the 3D flow field, based on the tracking of the trajectories of
47
+ surface or submerged floaters. The method has been successfully implemented to restore/complete
48
+ data gaps in a flow field. Other works have shown that the accuracy of the estimated flow field
49
+ depends not only on the number of floats, but also on the locations of their initial deployments [8].
50
+ As such, it is necessary to develop sophisticated methods for optimal dispersion of the floaters.
51
+ Clearly, this optimal setup should be related to the flow’s characteristics.
52
+ In this work, we develop a scheme how to plan ahead the initial positioning of Lagrangian
53
+ floaters, such as to improve flow field reconstruction [7], [9].
54
+ Our scheme is useful as a perpetration for in-situ calibration of a given water current flow field
55
+ model. We analyze a given flow field map that is generated by a physical model to plan where
56
+ to initially deploy a fixed number of floats. After executing our deployment planning scheme,
57
+ the floats are released at the proposed locations and move freely with the water current for a
58
+
59
+ fixed time frame, while their locations is tracked by e.g., acoustic positioning [10]. After this
60
+ in-situ operation, the trajectories of the floats are used to generate a flow field using e.g., [7] or
61
+ to validate or calibrate the given physical model. In the above described process, as illustrated
62
+ good coverage of the flow field by the floats is required. This is illustrated in the two examples in
63
+ Fig. 1. Here, we include a map of the WC velocity field’s magnitude and heading by the length
64
+ and direction of the dark arrows. We observe homogeneous areas in the WC by small variations
65
+ of the arrows and areas of a complex WC structure by a large diversity in the size and direction
66
+ of the arrows. A group of 3 floats marked in orange lines are deployed in homogeneous sections
67
+ of the flow field and thus do not capture the complexity of the water current, whereas a group
68
+ of floats marked in green lines is well distributed to pass through all diverse sections in the
69
+ flow field map. Clearly, the difference between the two groups is by their initial position. Our
70
+ approach applies machine learning tools over the given flow field map. Particularly, inspired by
71
+ computational geometry, we turn to coresets for the task of planning the initial location of the
72
+ floaters. Informally speaking, given input data, a coreset is a weighted subset of the original data
73
+ that approximates the original data in some provable sense with respect to a (usually infinite)
74
+ set of queries or models and an objective loss/cost function [11]. We use coresets to find those
75
+ “regions of interest” where the floaters should visit in order to most efficiently represent the WC
76
+ structure. The method is tested on a finite resolution circulation model results that span over a
77
+ year. Results show that using our algorithm, the floats better capture the complex structure of
78
+ the WC, compared to the case of randomly deploying the floaters.
79
+ To the best of our knowledge, our approach is the first to consider the problem of optimal de-
80
+ ployment of floats for the task of WC prediction and is the first to use coresets for oceanographic
81
+ applications. Our contribution is threefold:
82
+ (i) A coreset-based solution for WC segmentation. A novel partitioning of the WC velocity
83
+ field into segments of homogenous WC.
84
+ (ii) A clustering scheme for the segmentation of the WC’s flow field. Primarily, reducing the
85
+ problem of WC clustering into an instance of sets clustering.
86
+ (iii) A sub-optimal solution to determine the deployment location of floaters for WC’s estimation.
87
+ A graph theory-based approach to plan the deployment location of floaters such that the
88
+
89
+ Fig. 1: The setting of a real-time sea experiment. This map was generated using SHYFEM [12]
90
+ (System of Hydrodynamic Finite Element Modules) by setting different variables, e.g.,
91
+ bathymetry, wind velocity, wind direction, etc. The direction of any arrow describes the direction
92
+ of the WC at that discrete position p, while the length of the arrow represents the speed of the
93
+ WC at p.
94
+ floaters explore the different clusters of the WC.
95
+ The paper is organized as follows. Related work is discussed in Section II. System setup
96
+ and preliminaries are given in Section III. In Section IV, we discuss the methodology of our
97
+ proposed approach. Section V presents the numerical and experimental results, and conclusions
98
+ are drawn in Section VI.
99
+
100
+ 30
101
+ 25
102
+ 20
103
+ 15
104
+ 10
105
+ 5
106
+ 0
107
+ 0
108
+ 5
109
+ 10
110
+ 15
111
+ 20
112
+ 25
113
+ 30II. RELATED WORK
114
+ Constructing WC flow fields based on Lagrangian particle trajectories has been gaining increas-
115
+ ing attention over recent years [13], [14]. The main difference between the available approaches
116
+ lies on the formalization of the relationships between the floaters’ trajectories. In [15], a model
117
+ for the flow field is used to find such a connection. Another solution is offered in [7], where the
118
+ relations between drifter trajectories are calculated by statistical models. In [16], a cooperative
119
+ solution is adopted to recover the flow field by formulating the integration error. Specifically, the
120
+ motion-integration errors of multiple autonomous underwater vehicles (AUVs) in a 2D flow are
121
+ obtained. The relation between the flow model and motion-integration errors is then formulated
122
+ as a system of nonlinear equations followed by an iterative algorithm that is designed to estimate
123
+ the flow field. While the above techniques for data assimilation are able to merge measurements
124
+ with a model to estimate the WC, as shown in [17], the results are sensitive to the initial
125
+ deployment of the drifters. More specifically, an overly-close deployment would not capture the
126
+ spatial dependency of the velocity field, while a too-far deployment, even below the Rossby
127
+ radius of deformation, may break the assumed correlation between the sensors’ drifting velocity.
128
+ A key challenge in determining the floaters’ deployment locations is to spread the sensors
129
+ across diverse sections of the explored area. One option is to allow maneuvering such that floaters
130
+ can escape areas of homogeneous velocity field [18]. Another option is to direct the initial floater
131
+ positions along the out-flowing branch of Lagrangian boundaries for better relative dispersion
132
+ of floaters [19]. In contrast, in [20] a sequential protocol was employed, where floaters are
133
+ deployed one after the other, and their deployment locations are based on the trajectory obtained
134
+ by the previously deployed floaters. First, the flow field is estimated using Gaussian processes
135
+ (GP) [21], followed by trajectory estimation using OpenDrift [22]. The estimated trajectories are
136
+ then ranked to find the next deployment location with the aim of obtaining a longer, unexplored,
137
+ trajectory. The process then repeats until all floaters are deployed. While this method holds
138
+ potential for exploring non-homogeneous patches in the velocity field, its optimality can only
139
+ be reached when a large number of floats are in use. Further, the method makes perhaps a too
140
+ hard assumption that the WC is stable throughout a long enough observation window to deploy
141
+ and recover the floats one by one.
142
+
143
+ While the models above are comparative to our work, they either assumed that (i) the moving
144
+ agents have the ability to maneuver their own path, (ii) a large number of floaters is available
145
+ to ensure good quality, (iii) or the velocity field is stable throughout a long enough observation
146
+ window. These assumptions may be too hard in practical cases where the WC is time-varying,
147
+ and when the number of floaters is limited. For these cases, we present an alternative solution.
148
+ III. SYSTEM MODEL
149
+ A. Setup details
150
+ Consider a set of K submerged floaters X = {1, · · · , K}, each of which drifts with the
151
+ WC for a time frame of T seconds. During their operations, the floaters’ locations are known
152
+ - either through a self-navigation process or using acoustic localization [23]. The analysis is
153
+ performed over a given time instance, 0 < t < T, that can be configured according to the
154
+ expected time it takes a float to cover the given area for exploration. In this time frame, each
155
+ of the floaters in X measures the velocity of the WC. This can be done directly, using sensors
156
+ like Doppler velocity loggers; indirectly, using the time-varying position of the floaters; or by
157
+ simple periodic surfacing to obtain GPS fixes as performed for the Argo floaters [24]. Assuming
158
+ for simplicity, that at time instance t only one of the floaters measures the WC, we construct
159
+ vector p(t) = [px(t), py(t), pz(t), t] for the x and y UTM coordinates of the floater, its depth
160
+ pz(t) in meters, and the observation’s time instance, t, respectively. Similarly, we obtain vector
161
+ v(t) = [vx(t), vy(t), vz(t)] representing the WC’s speed at the x, y, and z directions, respectively.
162
+ We consider two scenarios: 1) the floaters are recovered after T seconds and the prediction
163
+ of the WC’s velocity field is performed offline, and 2) the prediction is performed online based
164
+ on past WC velocity observations, in which case the operation must involve communicating
165
+ between the floaters. The first scenario mostly applies to the validation of a WC model, while
166
+ the second can assist in the path planning of a submerged vessel. In this work, we are interested
167
+ in determining the initial deployment position, p(0), of the floaters such that the WC is best
168
+ predicted. To this end, we rely on our previously developed technique [7] as a utility metric to
169
+ evaluate the WC’s velocity field from the floaters’ trajectories.
170
+
171
+ B. Assumptions
172
+ We make the following assumptions. First, the floaters are assumed to be Lagrangian, such
173
+ that their motion is completely attributed to the WC. We also assume the existence of a WC
174
+ model that provides velocity predictions in a two-dimensional plane for the explored area. The
175
+ spatial resolution of the given model is fixed, and the accuracy of our approach is directly related
176
+ to the model’s accuracy.
177
+ The interesting case that we are aiming for is a non-homogeneous WC with patches of
178
+ homogeneity, such that a number of floaters are needed in order to well explore the WC’s
179
+ velocity field. These patches are assumed to change slowly in space, such that their borders
180
+ are smooth and form convex sets. An example of such a velocity field is presented in Fig. 3a
181
+ with arrows representing the magnitude and direction of the WC in a single cell in space. To
182
+ simulate the floaters’ motion within the modeled WC, the trajectories of the floaters can follow
183
+ these arrows. The example in Fig. 4 shows such motion for a set of two floaters. We observe
184
+ differences in the trajectory of the simulated floaters, which reflects the non-homogeneity of the
185
+ WC.
186
+ C. Preliminaries
187
+ a) Notations: For integers n and d ≥ 2, we denote by [n] the set {1, · · · , n}, by Rn×d the
188
+ union over every n × d real matrix, and by Id ∈ Rd×d the identity matrix. A matrix A ∈ Rd×d
189
+ is said to be (i) an orthogonal if and only if ATA = AAT = Id, or (ii) a positive definite matrix
190
+ if and only if for every column vector x ̸= 0d, xTAx > 0. For every set A ⊆ Rd, we denote by
191
+ |A| the number of elements of A. Finally, throughout the paper, vectors are addressed as column
192
+ vectors.
193
+ 1) Volume approximation: In what follows, we define what is known as the Löwner ellipsoid,
194
+ a tool that will aid us in obtaining an ε-coreset in the context of volume approximation.
195
+ Definition 1 (Theorem III, [25]). Let L ⊆ Rd be a set of points. Let c ∈ Rd be a vector, and let
196
+ G ∈ Rd×d be a positive definite matrix. We say that ellipsoid E =
197
+
198
+ x ∈ Rd���(x − c)T G (x − c) ≤ 1
199
+
200
+ ,
201
+ is an MVEE (short for the Minimum Volume Enclosing Ellipsoid) of L if
202
+ 1
203
+ d (E − c) + c ⊆ Conv (L) ⊆ E,
204
+ (1)
205
+
206
+ where E − c denotes the set {x − c|x ∈ E}, 1
207
+ dE denotes the set
208
+ � 1
209
+ dx
210
+ ��x ∈ E
211
+
212
+ , and Conv (L)
213
+ denotes the convex hull of L.
214
+ Definition 2 (Similar to that of [26]). Let ε > 0 be an approximation factor, and let X ⊆ Rd
215
+ be a set of points. The set S ⊆ X is defined to be an ε-coreset for the MVEE of X, if
216
+ Vol (MVEE (X)) ≤ (1 + ε) Vol (MVEE (S)) ,
217
+ (2)
218
+ where Vol (A) denotes the volume of A and MVEE (A) denotes the MVEE of A, for any A ⊆ Rd.
219
+ 2) Clustering of sets: To determine the initial location of the floaters, we first need to perform
220
+ clustering to group together sets of similar WC. Thus, the following definitions will be used for
221
+ the task of clustering.
222
+ Definition 3 (Variant of Definition 2.3,[27]). Let m, n, d be a triplet of positive integers. An
223
+ m-set P is a set of m distinct points in Rd. An (m, n)-set is a set P =
224
+
225
+ P
226
+ ��P ⊆ Rd, |P| = m
227
+
228
+ such that |P| = n.
229
+ The following defines a distance between an m-set and a set of k centers.
230
+ Definition 4 (Variant of Definition 2.1, [27]). Let
231
+
232
+ Rd, D
233
+
234
+ be a metric space, where D : P
235
+
236
+ Rd�
237
+ ×
238
+ P
239
+
240
+ Rd�
241
+ → [0, ∞) be a function that maps every two subsets P, C ⊆ Rd to
242
+ D (P, C) =
243
+ min
244
+ p∈P,x∈C ∥p − x∥2
245
+ 2 .
246
+ (3)
247
+ For an integer k ≥ 1, define Xk =
248
+
249
+ C ⊆ Rd��|C| = k
250
+
251
+ .
252
+ The following defines a coreset for the sets clustering problem [27].
253
+ Definition 5 ([27]). Let n, m, k be a triplet of positive integers, P be an (n, m)-set as in Defi-
254
+ nition 3, and let ε, δ > 0 denote the approximation error and probability of failure, respectively.
255
+ (S, v) is an ε-coreset, where S ⊆ P and v : S → [0, ∞) is a weight function, if for every
256
+ C ⊆ Xk
257
+ �����
258
+
259
+ P∈P
260
+ D (P, C) −
261
+
262
+ Q∈S
263
+ v(Q)D (Q, C)
264
+ ����� ≤ ε
265
+
266
+ P∈P
267
+ D (P, C) ,
268
+ (4)
269
+ occurs with probability at least 1 − δ.
270
+
271
+ 3) Prediction of WC: In our work, we use the scheme in [7] as cost function for predicting the
272
+ WC. The prediction is based on calculating a function that links the positions and velocities of
273
+ the floaters. This function can be linear, in which case the calculation is performed by a weighted
274
+ least squares; or non-linear, in which case the estimation involves support vector regression with
275
+ a non-linear kernel function. Once the relation between the floaters’ positions and their velocity
276
+ is established, the WC’s velocity at any given location (within the area explored by the floaters)
277
+ is evaluated by operating the resulting function over the given location.
278
+ IV. METHODOLOGY
279
+ Fig. 2: A flow chart illustrating our approach for determining the floaters’ best deployment
280
+ position.
281
+
282
+ Iterative water current segmentation
283
+ Sample point
284
+ ε-approximation of
285
+ from ε-grid
286
+ water current
287
+ Velocity map
288
+ Is there
289
+ anymore
290
+ Active coreset
291
+ Yes
292
+ sampled
293
+ based ellipsoid
294
+ uncovered
295
+ bounding
296
+ point?
297
+ Floater initial positioning
298
+ Water current clustering
299
+ Dissect each
300
+ Apply a
301
+ Either
302
+ variant of k-
303
+ segment into
304
+ set of sets
305
+ means
306
+ Graph based
307
+ Heuristically
308
+ approachA. Key idea
309
+ Recall that we are interested in a solution that, given a WC flow field map, how to setup
310
+ the deployment of a fixed number of Lagrangian floaters such as to best explore the flow field
311
+ in-situ. The problem of setting the floaters’ initial deployment is treated here as maximizing the
312
+ information gained by the floaters with respect to the actual WC velocity’s field. Such a problem
313
+ can be reduced to the robot coverage path planning problem [28], which aims to provide full
314
+ coverage of an explored area while also minimizing the number of repeated visits. In the context
315
+ of our problem, a variant of the coverage path planning problem is used: Given K robots without
316
+ the ability to control their movement, and a state space where each state moves the robot to
317
+ a different state, the goal is to cover as many states as possible while moving through already
318
+ discovered states as little as possible. This problem can be shown to be NP-hard [29]. However,
319
+ in our case, the space is not continuous, but rather discrete and bounded by the resolution of the
320
+ given model. Such a setting simplifies the problem and makes it polynomial in nature (rather
321
+ than exponential).
322
+ The steps of our algorithm are illustrated in the block diagram in Fig. 2, and a toy example
323
+ is illustrated in Fig. 4. Given a map M of M × N velocity vectors forming a snippet of
324
+ a WC’s flow field (see example in Fig. 3a), the algorithm first partitions M into segments
325
+ of homogeneous patches. This is translated into first applying an ε-grid on the map. That is,
326
+ dissecting the map into a set of (M/ε) × (N/ε) cells (see Fig. 4a). Then, from each cell we
327
+ sample one representative. For each sampled point, we next check whether the point is covered
328
+ by a segment in which case we proceed to the next sampled point. Otherwise, we find the
329
+ smallest ellipsoid in volume that encloses a homogeneous patch, including the sampled point.
330
+ We then obtain an εβ-approximation towards the enclosed patch of the WC in the obtained
331
+ ellipsoid from the previous step, as illustrated in Fig. 4b. The above steps are repeated over the
332
+ set of sampled points until all points are covered.
333
+ As an approach for segmenting the flow field map, ˆ
334
+ M, a clustering scheme is applied. Each
335
+ segment is dissected into an (n, 3)-set (see Definition 3), where n =
336
+ � size of segment
337
+ 3
338
+
339
+ , such that
340
+ each point in the (n, 3)-set is composed of its coordinates on the map M and the velocity vector
341
+ that is present at those coordinates. We then normalize the velocity vector such that its norm
342
+
343
+ is equal to the norm of its corresponding coordinates at M. In the last stage of clustering, we
344
+ generate a coreset for the sets clustering problem on the merged set of sets M (see Definition 5),
345
+ followed by a variant of the k-means algorithm, where k here is equal to the number of floaters.
346
+ The result is a set of k centers that defines a clustering on �
347
+ M as shown in Fig. 4c. Finally,
348
+ based on the clustered �
349
+ M, we determine the deployment position of the K floaters using two
350
+ main techniques (i) heuristics: where the placement locations are chosen as the farthest point in
351
+ the opposite direction of the dominating direction of each cluster or (ii) graph-based: following
352
+ the longest path formed in the flow filed map.
353
+ We handle the task of clustering by coresets. Coresets are a weighted subset of the input
354
+ data. They were first introduced in computational geometry as a means to reduce the size of
355
+ large datasets. Throughout recent years, coresets have been extended and developed for various
356
+ optimization problems from different fields. One key component associated with coresets is that
357
+ they aim to encapsulate the hidden structure in the data that the optimization problem at hand
358
+ entails. Other approaches such as matrix sketches [30] or submodular maximization [31] can
359
+ also be used for clustering. The advantage of coresets is that it is a subset of the data where
360
+ the coreset guarantee is satisfied for any query, e.g., any k centers in the context of k-means
361
+ clustering. Such coresets are referred as “strong coresets” in the literature [32].
362
+ B. Our Floater Deployment Scheme
363
+ We formulate our problem as follows. Let S denote the space of all possible placements.
364
+ For every x ∈ X, let f(x) ∈ S, denote the position of floater x. Assume that each p ∈ S is
365
+ associated with a loss function φ : S → S that maps p to some state q ∈ S. Finally, let P (S)
366
+ denote the power set of S, π : S → P(S) denote the path of visited states given the initial state
367
+ for a floater, ℓ(p(f(x)) denote the length of the path associated with the floater x, and S4
368
+ i=1 be
369
+ a set of orthants of S such that for each i, j ∈ [4], Si ⊆ S and Si ∩ Sj = ∅ with i ̸= j. The
370
+
371
+ (a) Map of velocities
372
+ (b) Zoomed area with respect to our toy map.
373
+ Fig. 3: A toy example of a flow field map. The color bar denotes the magnitude of the velocity
374
+ vectors. Example produced from the SELIPS model [33]. Fig. 3b depicts a zoomed area that is
375
+ contained in the dotted black rectangle at Fig. 3a.
376
+ optimization problem is formalized by
377
+ max
378
+ 4
379
+
380
+ j=1
381
+ log
382
+ �����
383
+ � �
384
+ x∈X
385
+ p (f(x))
386
+
387
+ ∩ Sj
388
+ ����
389
+
390
+
391
+ x∈X
392
+ ℓ(p(f(x))
393
+ s.t.
394
+ x ∈ X
395
+ f(x) ∈ S
396
+ (5)
397
+ In (5), the size of the union of different sets (denoted by the absolute function over a set)
398
+ accounts for each state that is visited by some floater only once, and the loss function forces
399
+ the solver to find initial states whose path must at least pass through one state from each of the
400
+ subspaces {Si}4
401
+ i=1 of S. The loss function aims to guide the solver to choose placements that
402
+ doesn’t lead to infinite loops.
403
+ 1) Iterative WC segmentation: Our solution starts by identifying segments in the WC’s
404
+ velocity field. Each segment contains a homogeneous set of WC vectors representing the WC’s
405
+ magnitude and direction. The task is performed by oracle-based algorithms. The data is assumed
406
+ to be “hidden” and only available to the oracle, and the user is allowed to ask the oracle questions
407
+
408
+ Cm/s
409
+ 35
410
+ 35
411
+ 34.5
412
+ 30
413
+ 25
414
+ Longitude
415
+ 34
416
+ 20
417
+ 33.5
418
+ 15
419
+ 33
420
+ 10
421
+ 32.5
422
+ 5
423
+ 32
424
+ 1
425
+ 0
426
+ 31.5
427
+ 32
428
+ 32.5
429
+ 33
430
+ 33.5
431
+ LatitudeCm/s
432
+ 32.5
433
+ 35
434
+ 32.4
435
+ 30
436
+ 25
437
+ Longitude
438
+ 32.3
439
+ 20
440
+ 15
441
+ 32.2
442
+ 10
443
+ 5
444
+ 32.1
445
+ 1
446
+ 32
447
+ 0
448
+ 32
449
+ 32.1
450
+ 32.2
451
+ 32.3
452
+ 32.4
453
+ 32.5
454
+ Latitude(a) Map partitioning into grids
455
+ (b) WC segmentation
456
+ (c) Clustering set of sets
457
+ Fig. 4: Illustration of running our model on the toy example Fig. 3. Fig. 4a presents a partitioning
458
+ of the flow field such that from each grid cell, a representative is randomly selected. Fig. 4b
459
+ presents our segmentation which entails grouping areas of similar direction and speed. Fig. 4c
460
+ clusters the segments to ensure that the number of clusters is equal to the number of floaters.
461
+ with “yes/no” responses. Such oracles are known by the term membership oracles. The motivation
462
+ behind such decisions is scalable algorithms for segmentation. Using the oracle-based approach,
463
+ the emphasis is to segment the map into a set of segments using minimal oracle queries. In
464
+ addition, such approaches enable the handling of large-scale velocity maps in near-linear time.
465
+ In our context, the oracle has the ability to distinguish between different current patches.
466
+ With such an oracle, we find the minimal volume enclosing ellipsoid (or MVEE in short, see
467
+ Definition 2) of each WC patch. Specifically, using the given membership oracle, a separation
468
+
469
+ Cm/s
470
+ 35
471
+ 35
472
+ 34.5
473
+ 30
474
+ 25
475
+ Longitude
476
+ 34
477
+ 20
478
+ 33.5
479
+ 15
480
+ 33
481
+ 10
482
+ 32.5
483
+ 5
484
+ 32
485
+ 1
486
+ 0
487
+ 31.5
488
+ 32
489
+ 32.5
490
+ 33
491
+ 33.5
492
+ Latitude35.0
493
+ 34.5
494
+ e
495
+ 34.0
496
+ itude
497
+ 33.5
498
+ g
499
+ 33.0
500
+ 32.5
501
+ 32.0
502
+ 31.5
503
+ 32.0
504
+ 32.5
505
+ 33.0
506
+ 33.5
507
+ Latitude35.0
508
+ 34.5
509
+ 34.0
510
+ itude
511
+ 33.5
512
+ ngi
513
+ 33.0
514
+ 32.5
515
+ 32.0
516
+ 31.5
517
+ 32.0
518
+ 32.5
519
+ 33.0
520
+ 33.5
521
+ Latitudeoracle can be constructed in polynomial time. The response of the separation oracle is “True” if
522
+ a point lies inside the body of interest. If the point lies outside the body of interest, the oracle
523
+ outputs a hyperplane, separating the point from the WC patch. Using the separation oracle,
524
+ the ellipsoid method [34] can be leveraged to find a (1 + O (ε))-approximation for the optimal
525
+ MVEE. The time complexity of such algorithms is O
526
+
527
+ nd4 logO(1) � d
528
+ ε
529
+ ��
530
+ ; recall that in our setting,
531
+ d ∈ O (1); hence, the time complexity of our algorithm is linear in the number of points n. We
532
+ refer the reader to [35], [36], [37] for an extensive analysis of this method.
533
+ Once a WC patch P has been enclosed by an ellipsoid, we proceed to obtain an εβ-approximation
534
+ towards the volume of P, i.e., we aim to find C ⊆ P such that
535
+ Vol (Conv (C))
536
+ Vol (Conv (P)) ≥ 1 − εβ.
537
+ (6)
538
+ For this task, we first dissect P to Vol (P) εd
539
+ β cells (see Definition 2). From each cell of this
540
+ type, we uniformly choose a representative point at random. This ensures that the volume of the
541
+ set of sampled points approximates the volume of P, which in turn approximates the structural
542
+ properties of P [38].
543
+ 2) Clustering WC: A fundamental clustering approach is k-means, which can also be used
544
+ here to cluster WC. However, k-means will disregard the connectivity between points (segment
545
+ points). Instead, we use sets clustering [27], which is a generalization of k-means to cluster
546
+ dependent sets of points.
547
+ Each approximated WC patch is partitioned into a set of triplets based on distance. More
548
+ specifically, each point is associated with the closest two points to it based on Euclidean distance.
549
+ The result is a (3, n)-set P, where P ∈ P is a set of 3 WC velocity vectors, and n denotes
550
+ the number of all such sets (see Definition 3). The time complexity for finding a “sub-optimal”
551
+ solution for such clustering is O
552
+
553
+ n log n (nk)dk�
554
+ [27], where n denotes the number of sets of
555
+ points, k denotes the number of desired clusters, and d denotes the dimension of each point in
556
+ the sets of points. Such a solution is, at most, worse than the optimal solution by a multiplicative
557
+ factor of O (log n). Leveraging the use of coresets, we can reduce the running time to n log nk3+
558
+ � log n
559
+ ε dk3�O(dk), while maintaining a solution that is associated with an approximation factor of
560
+ O ((1 + ε) log n) [27]. It can be shown that solving the clustering problem on the coreset admits
561
+ an approximation towards the optimal clustering obtained on all of the data, as follows.
562
+
563
+ Claim 6. Let P be an (n, 3), ε ∈ (0, 0.5), and (C, w) denote its ε-coreset as in Definition 5. Let
564
+ XC denote the optimal clustering with respect to the coreset (C, w) and XP denote the optimal
565
+ clustering with respect to P. Then
566
+
567
+ P∈P
568
+ D (P, XC) ∈ (1 + O(ε))
569
+
570
+ P∈P
571
+ D (P, XP) .
572
+ Proof. Observe that
573
+
574
+ P∈P
575
+ D (P, XP) ≤
576
+
577
+ P∈P
578
+ D (P, XC)
579
+
580
+ 1
581
+ 1 − ε
582
+
583
+ P∈C
584
+ w(P)D (P, XC)
585
+
586
+ 1
587
+ 1 − ε
588
+
589
+ P∈C
590
+ w(P)D (P, XP)
591
+ ≤ 1 + ε
592
+ 1 − ε
593
+
594
+ P∈P
595
+ D (P, XP) ,
596
+ (7)
597
+ where the first inequality holds by definition of XP, the second and last inequality follows from
598
+ Definition 5, and the third inequality holds by definition of XC.
599
+ The claim holds since 1+ε
600
+ 1−ε ≤ 1 + 4ε due to the fact that ε ∈ (0, 0.5).
601
+ Since the input of our algorithm is a discrete map, usually represented via a grid, the input
602
+ to the clustering must also incorporate the coordinates of each point in any WC patch in the
603
+ given map. For such a task, to each point p in each triplet P, we concatenate the corresponding
604
+ coordinates in the map, resulting in ˆp, while the set P is then referred to as ˆP. To ensure fairness
605
+ across the two feature vectors that ˆp is composed of, we ensure that their norm is roughly equal
606
+ through scaling. The set of all ˆP is then passed to the sets clustering scheme, and the result is
607
+ treated at the clustering on the original set P.
608
+ 3) Towards optimal floater deployment while seeking maximal coverage: Once the WC map
609
+ has been clustered, we determine the deployment position of the floaters to obtain the best WC
610
+ velocity field estimation. We consider two types of solutions to the deployment strategy. The
611
+ first is a heuristic approach, referred to as heuristic, where each cluster is assigned a unique
612
+ floater. The floater’s location is then set at the farthest point along the negative of the dominating
613
+ direction from the cluster, thereby obtaining the longest traversal inside the cluster. Here, the
614
+
615
+ dominating direction of a cluster refers to the direction that most points in the cluster either
616
+ point to, or are very close to in terms of cosine similarity. This approach ensures that each
617
+ cluster is covered, while allowing for additional data collection from the deployment position
618
+ to the cluster’s boundaries. However, the scheme is not optimal for the probable case where the
619
+ number of clusters is lower than or equal to the number of floaters.
620
+ A more rigorous approach would be to employ concepts from graph theory, and we refer to
621
+ it as graph-based approach. Each cluster S is represented as a directed graph GS := (VS, ES),
622
+ where each point in S is assigned a vertex in GS. As for the set of edges of GS, an edge
623
+ e := v → u exists in GS if q is reachable from p following the velocity vector of p, where p
624
+ and q are the corresponding points in S of that of v and u, respectively. In other words, an edge
625
+ exists if, and only if, (i) one can move from p to q using the velocity vector that is associated
626
+ with p, and (ii) q ∈ B (p, 1) where B(x, r) denotes a ball centered at x, with a radius of r. At this
627
+ stage, we have K disconnected graphs for K floaters. For each graph, we compute the longest
628
+ path from the set of shortest paths between each pair of graph nodes by applying a breadth-first
629
+ search (BFS) algorithm [39] each time from a different node. The running time of this procedure
630
+ is O
631
+
632
+ |VS|2 + |VS| |ES|
633
+
634
+ for any graph GS. Our above algorithm can be generalized by taking
635
+ into account weights, in which case, the BFS algorithm is replaced by Johnson’s algorithm [40].
636
+ A modification of this graph-based approach, referred to as the inter-graph scheme, connects
637
+ these graphs by checking whether the roots and leaves of one graph can be connected to another
638
+ graph. The connectivity is applied to each pair of graphs, and the resulting graph is denoted by
639
+ Gall. The BFS algorithm is then used again to compute the K largest non-intersecting paths in
640
+ Gall. Finally, the floaters’ deployment positions are set to be the starting vertices of the selected
641
+ paths.
642
+ V. EXPERIMENTAL ANALYSIS
643
+ In this section, we evaluate the performance of our three strategies for determining the floaters’
644
+ deployment positions, namely, heuristics, graph-based and inter graph-based. Without alternative
645
+ benchmark for determining the initial position of the floats for WC prediction, we compare the
646
+ performance of our schemes to the common approach of sampling the initial deployment locations
647
+ uniformly at random. We follow [7] to evaluate the performance of the different deployment
648
+
649
+ schemes in terms of the velocity field prediction. For any location p(x, y) in the velocity field,
650
+ we denote the ground truth velocity vector at p(x, y) by
651
+
652
+ �vx
653
+ vy
654
+
655
+ �, and the predicted velocity
656
+ vector at p(x, y) by
657
+
658
+ �vpred
659
+ x
660
+ vpred
661
+ y
662
+
663
+ �. The latter is obtained by applying the method in [7], each time for
664
+ the different the floaters’ trajectories as obtained after deployment based on the four different
665
+ deployment strategies. The prediction error is defined by
666
+ ρspeed =
667
+ ��
668
+ vx − vpred
669
+ x
670
+ �2
671
+ +
672
+
673
+ vy − vpred
674
+ y
675
+ �2
676
+ .
677
+ (8)
678
+ Note that the method in [7] interpolates the floaters information towards the prediction of the
679
+ flow field away from the floaters’ trajectories. As such, the prediction error in (8) is calculated
680
+ for each location in the explored area.
681
+ A. Experimental Settings
682
+ The method in [7] offers a linear and a non-linear prediction models. Here, since we aim
683
+ for complex flow fields with non-homogeneous sections, we choose the latter that is based on
684
+ support vector regression (SVR) model with a radial bases function (RBF) kernel. To train the
685
+ RBF-SVR model, we used a grid-search approach with cross validation [41], [42] to determine
686
+ the best model parameters. The tuned parameters are (i) C – a regularization parameters, (ii) ϵ
687
+ – an optimization-related parameter with respect to the SVR model, and (iii) γ – the exponent
688
+ which controls the deviation of the spread of the radial basis function. For more details, we refer
689
+ the reader to “Scikit-Learn” [43].
690
+ As a WC model (and ground truth), we use 48 WC maps, as produced by the SELIPS
691
+ model [33] for the Gulf of Haifa, Israel. The maps span over a time period of 12 months.
692
+ Model SELIPS is an operational forecasting system based on POM, a 3D numerical model for
693
+ the simulation of ocean dynamics, with a horizontal resolution of about 1 km. The output was
694
+ given as 3 hour averages of the velocity components. We explore the results for two options:
695
+ 1) clean map: the WC model is the same as the velocity field used to simulate the drift of the
696
+ floaters, and 2) noisy map: the velocity field used for the simulation is a noisy version of the
697
+
698
+ WC model. We explore the results for different number of floaters, K, and for different model
699
+ parameters.
700
+ B. Experimental Analysis
701
+ 1) The Toy Example: We start by showing the performance of each of our proposed deploy-
702
+ ment strategies on the toy example in Fig. 3a. In Fig. 5, we present the empirical cumulative
703
+ distribution function (CDF) results of the velocity error vector (8), as generated by predicting
704
+ the flow field for each point in the map. We observe that the performance of our proposed
705
+ strategies exceeds that of the uniformly choosing deployment strategy. This indicates that, from
706
+ a statistical point of view, our method forms better candidates for deployment position strategies
707
+ than sampling uniformly. Comparing the performance of our three schemes, we conclude that
708
+ the inter-graph-based approach is better, mostly because of the complexity in the structure of
709
+ the velocity field, which induces diversity in the WC. The inter-graph approach, which is more
710
+ rigorous, can better capture this diversity.
711
+ Fig. 5: CDF of the norm of velocity error (8). The results show our advantage upon using
712
+ uniform sampling for determining deployment positions.
713
+
714
+ 1.0
715
+ w
716
+ V
717
+ 20.8
718
+ error
719
+ velocity
720
+ 0.6
721
+ 0.4
722
+ Uniform sampling
723
+ 0.2
724
+ our heuristic
725
+ our graph based
726
+ our inter-graph based
727
+ 0.0
728
+ 0
729
+ 5
730
+ 10
731
+ 15
732
+ 20
733
+ 25
734
+ [曾]2) Choosing the “best” parameters for our model: Our model relies on a predefined set of
735
+ parameters. Specifically, the approximation error εβ with respect to the volume of the explored
736
+ area, which is required for the iterative segmentation stage, and the coreset size µ with respect
737
+ to the clustering phase. To explore the sensitivity of the graph-based and inter-graph-based
738
+ approaches to the choice of these parameters, we use the clean simulation setup for all 48 WC
739
+ maps to show that our model is robust against changes in these parameters. As seen in Fig 6, best
740
+ results are associated with µ := 1500 and εβ := 0.05. Still, the difference is rather small, which
741
+ reflects on the robustness of our approach. In the below we choose µ := 1500 and εβ := 0.05
742
+ for both the clean maps, for the noisy maps.
743
+ (a)
744
+ (b)
745
+ Fig. 6: CDF of the averaged prediction error across 48 “clean” maps when using different model
746
+ parameters with respect to our graph-based approach (left-most), and with respect to our inter-
747
+ graph based (right-most).
748
+ 3) Comparison Against Uniform Sampling on a Variety of Maps: We now explore the efficacy
749
+ of the three schemes for different WC maps in the clean map setup against Uniform sampling.
750
+ Fig. 7 presents the CDF of the averaged prediction errors across the 48 maps. We observe that
751
+ the heuristic-based strategy for deployment outperforms most of the deployment strategies. This
752
+ is due to the fact that there are no obstacles in each of the 48 maps. That is an area in the
753
+ WC flow field with zeroed-out velocity vectors, e.g., an island. Observe that while the graph-
754
+
755
+ 1.0
756
+ (m)
757
+ V
758
+ 20.8
759
+ error
760
+ Ivelocity
761
+ 0.6
762
+ 8g = 5e -02. u= 500
763
+ 8g = 5e-02. μ= 1000
764
+ 0.4
765
+ 3 = 5e - 02. μ= 1500
766
+ β = 8e - 02, μ= 500
767
+ 0.2
768
+ 8β = 8e - 02, μ= 1000
769
+ 8g = 8e- 02. μ= 1500
770
+ 0.0
771
+ 0
772
+ 10
773
+ 20
774
+ 30
775
+ 40
776
+ 50
777
+ m1.0
778
+ )
779
+ V
780
+ 20.8
781
+ error
782
+ 0.6
783
+ 8g = 5e-02. μ= 500
784
+ 8g= 5e-02.μ= 1000
785
+ 0.4
786
+ 3 = 5e - 02. μ= 1500
787
+ 8β = 8e - 02, μ= 500
788
+ 0.2
789
+ 8β = 8e - 02, μ= 1000
790
+ 83 = 8e- 02.μ= 1500
791
+ 0.0
792
+ 2
793
+ 3
794
+ 4
795
+ 5Fig. 7: CDF of the averaged prediction error across 48 maps.
796
+ based approach is comparable to the heuristic-based approach, at some point it starts being
797
+ less efficient. This is due to the fact that the graph-based method needs denser clusters, i.e.,
798
+ the parameter εβ needs to be smaller leading to larger and denser clusters, e.g., the effect of
799
+ εβ is best observed visually in Fig. 4c. In turn, the graphs generated from the clusters hold
800
+ more information regarding the flow field. This will yield better results than our heuristic-based
801
+ approach. In addition, the same behavior appears also when observing the inter-graph-based
802
+ approach.
803
+ 4) Robustness Against Noise: We explore the performance of the three schemes when the
804
+ noisy map setup is considered. For our toy map M, we produce its noisy map M ′ by adding a
805
+ Gaussian noise with zero mean, and a standard deviation equal to σ% of the standard deviation
806
+ of M. The added noise is added to a fraction of the WC map, denoted by η ∈ (0, 1), representing
807
+ the corruption ratio of the WC map.
808
+ To generate a difference between the WC map and the velocity field used, we determine the
809
+ deployment positions of the floaters, p(0), based on the given WC model (i.e., without the added
810
+ noise), but calculate the trajectories of the floaters based on the noisy WC map. As a result,
811
+ the assumed map is mismatched with the noisy one. The effect of η and σ on our toy example
812
+
813
+ 1.0
814
+ (m)
815
+ V
816
+ 20.8
817
+ error
818
+ 0.6
819
+ 0.4
820
+ --→-. Uniform sampling
821
+ ourheuristic
822
+ 0.2
823
+ our graph based
824
+ our inter-graph based
825
+ 0.0
826
+ 5
827
+ 10
828
+ 15
829
+ 20
830
+ mη%
831
+ σ%
832
+ 15
833
+ 133
834
+ 15
835
+ 100
836
+ TABLE I: The effect of added noise on our toy example.
837
+ are presented in Table I. With a small corruption percent (small η), we observe that the resulted
838
+ map is not that different from its clean version; see Figure 3a. As η and σ increase, the map
839
+ loses its underlying structure almost entirely, as depicted at the rightmost lower cell of Table I.
840
+ The results are given in Fig. 8. We observe that the average error increases with σ%. We argue
841
+ that, as σ% increases, the correlation between the generated deployment positions on the clean
842
+ map and the resulted noisy map becomes less strong leading to an increase in the average error.
843
+ The heuristic-based and graph-based approaches still outperform the uniform sampling, but for
844
+ the inter-graph-based approach which is sensitive to the smoothness of the maps, becomes less
845
+ efficient in the presence of noise.
846
+ 5) Assessing the effect of K: In this experiment, we explore the effect of increasing the
847
+ number of floaters on the error of reconstructing flow fields. Fig. 9 presents the average error
848
+
849
+ Cm/s
850
+ 35
851
+ 35
852
+ 34.5
853
+ 30
854
+ 25
855
+ Longitude
856
+ 34
857
+ 20
858
+ 33.5
859
+ 15
860
+ 33
861
+ 10
862
+ 32.5
863
+ 5
864
+ 32
865
+ 1
866
+ 0
867
+ 31.5
868
+ 32
869
+ 32.5
870
+ 33
871
+ 33.5
872
+ LatitudeCm/s
873
+ 35
874
+ 35
875
+ 34.5
876
+ 30
877
+ 25
878
+ Longitude
879
+ 34
880
+ 20
881
+ 33.5
882
+ 15
883
+ 33
884
+ 10
885
+ 32.5
886
+ 5
887
+ 32
888
+ 1
889
+ 0
890
+ 31.5
891
+ 32
892
+ 32.5
893
+ 33
894
+ 33.5
895
+ LatitudeCm/s
896
+ 35
897
+ 35
898
+ 34.5
899
+ 30
900
+ 25
901
+ Longitude
902
+ 34
903
+ 20
904
+ 33.5
905
+ 15
906
+ 33
907
+ 10
908
+ 32.5
909
+ 5
910
+ 32
911
+ 1
912
+ 0
913
+ 31.5
914
+ 32
915
+ 32.5
916
+ 33
917
+ 33.5
918
+ LatitudeCm/s
919
+ 35
920
+ 35
921
+ 34.5
922
+ 30
923
+ 25
924
+ Longitude
925
+ 34
926
+ 20
927
+ 33.5
928
+ 15
929
+ 33
930
+ 10
931
+ 32.5
932
+ 5
933
+ 32
934
+ 1
935
+ 0
936
+ 31.5
937
+ 32
938
+ 32.5
939
+ 33
940
+ 33.5
941
+ Latitude(a) η = 15%
942
+ (b) η = 40%
943
+ (c) η = 95%
944
+ Fig. 8: The averaged norm of the velocity error on our toy map as a function σ, when using
945
+ three different corruption percents η ∈ {0.15, 0.4, 0.95}.
946
+ (a)
947
+ (b)
948
+ Fig. 9: On the left graph, the averaged norm of the velocity error across the 48 maps as a function
949
+ of the number of floaters K. On the right graph, we zoom in Fig. 9a showing the averaged norm
950
+ of the velocity error across the 48 maps as a function of the number of floaters K. In both
951
+ figures, the shaded regions denote a 95% confidence bar.
952
+ across the 48 WC maps. We observe that as the number of floaters increases, the average error
953
+ for each of the 4 deployment strategies decreases. This is due to the fact that the amount of
954
+ collective data also increases as more floaters are available, hinging upon a larger discovery of
955
+ the underlying structure of the flow fields. The results show that graph-based and heuristic-based
956
+
957
+ 25
958
+ 23
959
+ Uniform sampling
960
+ our heuristic
961
+ 22
962
+ our graph based
963
+ our inter-graph based
964
+ 0.2
965
+ 0.4
966
+ 0.6
967
+ 0.8
968
+ 1.0
969
+ 1.2
970
+ [.]
971
+ a24
972
+ .... Uniform sampling
973
+ our heuristic
974
+ 22
975
+ our graph based
976
+ our inter-graph based
977
+ 0.2
978
+ 0.4
979
+ 0.6
980
+ 0.8
981
+ 1.0
982
+ 1.2
983
+ [曾]
984
+ a23
985
+ ..... Uniform sampling
986
+ our heuristic
987
+ our graph based
988
+ our inter-graph based
989
+ 0.2
990
+ 0.4
991
+ 0.6
992
+ 0.8
993
+ 1.0
994
+ 1.2
995
+ ["]
996
+ a12
997
+ T.... Uniform sampling
998
+ .... our heuristic
999
+ 10
1000
+ ... our graph based
1001
+ our inter-graph based
1002
+ 4
1003
+ 2
1004
+ 6
1005
+ 8
1006
+ 10
1007
+ 12
1008
+ 14
1009
+ Number of floaters3.4
1010
+ our heuristic
1011
+ our graph based
1012
+ 3.2
1013
+ 3.0
1014
+ 2.8
1015
+ 2.6
1016
+ 2.4
1017
+ 6
1018
+ 8
1019
+ 10
1020
+ 12
1021
+ 14
1022
+ Number of floaters(a)
1023
+ (b)
1024
+ Fig. 10: On the right, we present the average error of each of our deployment methods with
1025
+ respect to WC reconstruction as a function of εβ. On the left, we present the running time
1026
+ needed to generate the positions for our graph-based approach εβ. Shaded regions denote the
1027
+ standard deviation with respect to the y-axis.
1028
+ outperform uniform sampling by at least 225%. This is due to the nature of our approaches,
1029
+ which rely on information about the structural properties of the WC maps. On the other hand,
1030
+ the performance of our inter-graph-based approach is sometimes weaker than uniform sampling.
1031
+ This is mainly due to the fact that the former method requires denser graphs, ultimately leading
1032
+ to lower εβ.
1033
+ 6) When to use each of our deployment strategies: Finally, we explore the best setups that
1034
+ fit best each of our deployment strategies.
1035
+ a) When accuracy matters more than run-time: Figure 10a presents the effect of εβ on each
1036
+ of our proposed strategies. When εβ decreases, the best strategy is the graph-based approach. It
1037
+ lines well with the observation that this method uses the underline structure of the map. However,
1038
+ the cost of using such low εβ is reflected in Figure 10b. Using an AMD Ryzen Threadripper
1039
+ 3990X 2.9 GHz 64-Core with 128GB RAM, the run time increases from minutes to hours. The
1040
+ run time for the heuristic-based approach ranges between 3000 seconds (at εβ = 0.01) and 4500
1041
+ seconds (at εβ = 0.001), while the run time of the inter-graph-based approach is similar to that
1042
+
1043
+ lvelocity errorll2
1044
+ our heuristic
1045
+ our graph based
1046
+ our inter-graph based
1047
+ 22
1048
+ 21
1049
+ 0.010
1050
+ 0.008
1051
+ 0.006
1052
+ 0.004
1053
+ 0.002our graph-based
1054
+ 12000
1055
+ 10000
1056
+ 8000
1057
+ 6000
1058
+ 4000
1059
+ 0.010
1060
+ 0.008
1061
+ 0.006
1062
+ 0.004
1063
+ 0.002
1064
+ EβFig. 11: The averaged norm of the velocity error across the 48 maps as a function σ, where the
1065
+ corruption percent η is 100%. The shaded regions denote a 95% confidence bar.
1066
+ of the graph-based approach.
1067
+ b) Corrupted maps: We explore the performance of the three schemes when the given
1068
+ model is different than the real channel, i.e., using the noisy map setup. For each map M from
1069
+ our set of 48 flow field maps, we produce its noisy map M ′ by adding a Gaussian noise with
1070
+ zero mean, and a standard deviation equals to σ% of the standard deviation of M. Here the
1071
+ corruption percentage, η is 100%. The results are given in Fig. 11 for different σ2 values. We
1072
+ observe that the average error decreases as the added noise increases. This rather non-intuitive
1073
+ result is due to the fact that, as noise increases, the obtained map becomes similar to a Gaussian
1074
+ distributed. Consequently, the distribution of the map’s entries can be better estimated from the
1075
+ learning phase, i.e., the path traversed by the floaters. That is, the impact of the floater’s initial
1076
+ location becomes less dominant as the noise increases and the mismatch between the model and
1077
+ the actual map increases. That said, since the structure of the noise field still dominates over
1078
+ the added noise, we observe that our inter-graph-based approach is on par with the uniform
1079
+ deployment approach. This is because the former is the least information-collective approach
1080
+ among our three deployment strategies.
1081
+
1082
+ 23
1083
+ Uniform sampling
1084
+ our heuristic
1085
+ 22
1086
+ our graph based
1087
+ our inter-graph based
1088
+ 21
1089
+ 20
1090
+ 2~1
1091
+ 0.0
1092
+ 0.2
1093
+ 0.4
1094
+ 0.6
1095
+ 0.8
1096
+ 1.0
1097
+ 1.2
1098
+ ["]VI. CONCLUSIONS AND FUTURE WORK
1099
+ In this paper, we explored how to determine the initial deployment positions of a group of
1100
+ floaters to best evaluate the WC flow field. Our approach relies on clustering a given model of
1101
+ the WC into segments, each of which is represented by a coreset, and determining the floaters’
1102
+ initial deployment positions with the aim of visiting all coresets under constraints: the number
1103
+ of floaters, and the time frame used for evaluation. We analyzed the results of our scheme over
1104
+ a database of 48 WC maps that span over a year of measurements in the Gulf of Haifa, Israel.
1105
+ Compared to the uniform sampling benchmark, the results show that our scheme is more accurate
1106
+ in terms of the WC’s prediction, and is more robust to mismatches between the given WC model
1107
+ and the actual one. Future work will identify gaps in the given model and complete them by
1108
+ guiding the floaters to visit these locations.
1109
+ VII. ACKNOWLEDGEMENTS
1110
+ This work was supported in part by the MOST action for Agriculture, Environment, and Water
1111
+ for the 490 year 2019 (Grant # 3-16728) and by the the University of Haifa’s Data Science
1112
+ Research Center.
1113
+ REFERENCES
1114
+ [1] “Open source code for all the algorithms presented in this paper,” 2022, Link for open-source code.
1115
+ [2] L. Kuznetsov, K. Ide, and C. K. Jones, “A method for assimilation of Lagrangian data,” Monthly Weather Review, vol.
1116
+ 131, no. 10, pp. 2247–2260, 2003.
1117
+ [3] R. N. Miller, Numerical modeling of ocean circulation.
1118
+ Cambridge University Press, 2007.
1119
+ [4] M. Santoki, S. Ratheesh, R. Sharma, K. Joshipura, and S. Basu, “Assimilation of drifter data in a circulation model of the
1120
+ Indian Ocean,” IEEE Geoscience and Remote Sensing Letters, vol. 9, no. 1, pp. 100–103, 2011.
1121
+ [5] S. Castellari, A. Griffa, T. M. Özgökmen, and P.-M. Poulain, “Prediction of particle trajectories in the adriatic sea using
1122
+ Lagrangian data assimilation,” Journal of Marine Systems, vol. 29, no. 1-4, pp. 33–50, 2001.
1123
+ [6] M. J. Carrier, H. Ngodock, S. Smith, G. Jacobs, P. Muscarella, T. Ozgokmen, B. Haus, and B. Lipphardt, “Impact of
1124
+ assimilating ocean velocity observations inferred from Lagrangian drifter data using the NCOM-4DVAR,” Monthly Weather
1125
+ Review, vol. 142, no. 4, pp. 1509–1524, 2014.
1126
+ [7] R. Diamant, “Prediction of water current using a swarm of submerged drifters,” IEEE Sensors Journal, vol. 20, no. 19,
1127
+ pp. 11 598–11 607, 2020.
1128
+ [8] A. Molcard, L. I. Piterbarg, A. Griffa, T. M. Özgökmen, and A. J. Mariano, “Assimilation of drifter observations for the
1129
+ reconstruction of the Eulerian circulation field,” Journal of Geophysical Research: Oceans, vol. 108, no. C3, 2003.
1130
+
1131
+ [9] J. L. Callaham, K. Maeda, and S. L. Brunton, “Robust flow reconstruction from limited measurements via sparse
1132
+ representation,” Physical Review Fluids, vol. 4, no. 10, p. 103907, 2019.
1133
+ [10] J. S. Jaffe, P. J. Franks, P. L. Roberts, D. Mirza, C. Schurgers, R. Kastner, and A. Boch, “A swarm of autonomous miniature
1134
+ underwater robot drifters for exploring submesoscale ocean dynamics,” Nature communications, vol. 8, no. 1, pp. 1–8,
1135
+ 2017.
1136
+ [11] M. Tukan, C. Baykal, D. Feldman, and D. Rus, “On coresets for support vector machines,” in International Conference
1137
+ on Theory and Applications of Models of Computation.
1138
+ Springer, 2020, pp. 287–299.
1139
+ [12] G. Umgiesser, D. M. Canu, A. Cucco, and C. Solidoro, “A finite element model for the venice lagoon. development, set
1140
+ up, calibration and validation,” Journal of Marine Systems, vol. 51, no. 1-4, pp. 123–145, 2004.
1141
+ [13] H. Salman, K. Ide, and C. K. Jones, “Using flow geometry for drifter deployment in Lagrangian data assimilation,” Tellus
1142
+ A: Dynamic Meteorology and Oceanography, vol. 60, no. 2, pp. 321–335, 2008.
1143
+ [14] C. Chapman and J.-B. Sallée, “Can we reconstruct mean and eddy fluxes from Argo floats?” Ocean Modelling, vol. 120,
1144
+ pp. 83–100, 2017.
1145
+ [15] H. Bai, “Motion-dependent estimation of a spatial vector field with multiple vehicles,” in 2018 IEEE conference on decision
1146
+ and control (CDC).
1147
+ IEEE, 2018, pp. 1379–1384.
1148
+ [16] L. Shi, R. Zheng, S. Zhang, and M. Liu, “Cooperative estimation to reconstruct the parametric flow field using multiple
1149
+ AUVs,” IEEE Transactions on Instrumentation and Measurement, vol. 70, pp. 1–10, 2021.
1150
+ [17] M. Rafiee, Q. Wu, and A. M. Bayen, “Kalman filter based estimation of flow states in open channels using Lagrangian
1151
+ sensing,” in Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese
1152
+ Control Conference.
1153
+ IEEE, 2009, pp. 8266–8271.
1154
+ [18] G. A. Hollinger and G. S. Sukhatme, “Sampling-based motion planning for robotic information gathering.” in Robotics:
1155
+ Science and Systems, vol. 3, no. 5.
1156
+ Citeseer, 2013.
1157
+ [19] A. Molcard, A. C. Poje, and T. M. Özgökmen, “Directed drifter launch strategies for Lagrangian data assimilation using
1158
+ hyperbolic trajectories,” Ocean Modelling, vol. 12, no. 3-4, pp. 268–289, 2006.
1159
+ [20] J. Hansen and G. Dudek, “Coverage optimization with non-actuated, floating mobile sensors using iterative trajectory
1160
+ planning in marine flow fields,” in 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
1161
+ IEEE, 2018, pp. 1906–1912.
1162
+ [21] K. Kim, D. Lee, and I. Essa, “Gaussian process regression flow for analysis of motion trajectories,” in 2011 International
1163
+ Conference on Computer Vision.
1164
+ IEEE, 2011, pp. 1164–1171.
1165
+ [22] K.-F. Dagestad, J. Röhrs, Ø. Breivik, and B. Ådlandsvik, “Opendrift v1. 0: a generic framework for trajectory modelling,”
1166
+ Geoscientific Model Development, vol. 11, no. 4, pp. 1405–1420, 2018.
1167
+ [23] H.-P. Tan, R. Diamant, W. K. Seah, and M. Waldmeyer, “A survey of techniques and challenges in underwater localization,”
1168
+ Ocean Engineering, vol. 38, no. 14-15, pp. 1663–1676, 2011.
1169
+ [24] T. Alexandri, M. Walter, and R. Diamant, “A time-difference-of-arrival based target motion analysis for localization of
1170
+ underwater vehicles,” IEEE Transactions on Vehicular Technology, 2021.
1171
+ [25] F. John, “Extremum problems with inequalities as subsidiary conditions,” in Traces and emergence of nonlinear
1172
+ programming.
1173
+ Springer, 2014, pp. 197–215.
1174
+
1175
+ [26] M. J. Todd and E. A. Yıldırım, “On Khachiyan’s algorithm for the computation of minimum-volume enclosing ellipsoids,”
1176
+ Discrete Applied Mathematics, vol. 155, no. 13, pp. 1731–1744, 2007.
1177
+ [27] I. Jubran, M. Tukan, A. Maalouf, and D. Feldman, “Sets clustering,” in International Conference on Machine Learning.
1178
+ PMLR, 2020, pp. 4994–5005.
1179
+ [28] Y.-Y. Lin, C.-C. Ni, N. Lei, X. David Gu, and J. Gao, “Robot coverage path planning for general surfaces using quadratic
1180
+ differentials,” in 2017 IEEE International Conference on Robotics and Automation (ICRA), 2017, pp. 5005–5011.
1181
+ [29] X. Zheng, S. Jain, S. Koenig, and D. Kempe, “Multi-robot forest coverage,” in 2005 IEEE/RSJ International Conference
1182
+ on Intelligent Robots and Systems.
1183
+ IEEE, 2005, pp. 3852–3857.
1184
+ [30] D. P. Woodruff, “Sketching as a tool for numerical linear algebra,” arXiv preprint arXiv:1411.4357, 2014.
1185
+ [31] A. Badanidiyuru, B. Mirzasoleiman, A. Karbasi, and A. Krause, “Streaming submodular maximization: Massive data
1186
+ summarization on the fly,” in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery
1187
+ and data mining, 2014, pp. 671–680.
1188
+ [32] D. Feldman, “Core-sets: Updated survey,” in Sampling techniques for supervised or unsupervised tasks.
1189
+ Springer, 2020,
1190
+ pp. 23–44.
1191
+ [33] R. Goldman, E. Biton, E. Brokovich, S. Kark, and N. Levin, “Oil spill contamination probability in the southeastern
1192
+ Levantine basin,” Marine Pollution Bulletin, vol. 91, no. 1, pp. 347–356, 2015.
1193
+ [34] M. Grötschel, L. Lovász, and A. Schrijver, “The ellipsoid method,” in Geometric Algorithms and Combinatorial
1194
+ Optimization.
1195
+ Springer, 1993, pp. 64–101.
1196
+ [35] M. Grötschel, L. Lovász, and A. Schrijver, Geometric algorithms and combinatorial optimization.
1197
+ Springer Science &
1198
+ Business Media, 2012, vol. 2.
1199
+ [36] Y. T. Lee, A. Sidford, and S. S. Vempala, “Efficient convex optimization with membership oracles,” in Conference On
1200
+ Learning Theory.
1201
+ PMLR, 2018, pp. 1292–1294.
1202
+ [37] M. Tukan, A. Maalouf, D. Feldman, and R. Poranne, “Obstacle aware sampling for path planning,” in 2022 IEEE/RSJ
1203
+ International Conference on Intelligent Robots and Systems (IROS), 2022, pp. 13 676–13 683.
1204
+ [38] S. Har-Peled, Geometric approximation algorithms.
1205
+ American Mathematical Soc., 2011, no. 173.
1206
+ [39] A. Bundy and L. Wallen, “Breadth-first search,” in Catalogue of artificial intelligence tools.
1207
+ Springer, 1984, pp. 13–13.
1208
+ [40] D. B. Johnson, “Efficient algorithms for shortest paths in sparse networks,” Journal of the ACM (JACM), vol. 24, no. 1,
1209
+ pp. 1–13, 1977.
1210
+ [41] P. Refaeilzadeh, L. Tang, and H. Liu, “Cross-validation.” Encyclopedia of database systems, vol. 5, pp. 532–538, 2009.
1211
+ [42] M. Claesen and B. De Moor, “Hyperparameter search in machine learning,” arXiv preprint arXiv:1502.02127, 2015.
1212
+ [43] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss,
1213
+ V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, “Scikit-learn: Machine
1214
+ learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825–2830, 2011.
1215
+
8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
99E5T4oBgHgl3EQfRQ7z/content/tmp_files/2301.05520v1.pdf.txt ADDED
@@ -0,0 +1,2503 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Draft version January 16, 2023
2
+ Typeset using LATEX twocolumn style in AASTeX631
3
+ Toward accurate measurement of property-dependent galaxy clustering:
4
+ II. Tests of the smoothed density-corrected Vmax method
5
+ Lei Yang (杨蕾)
6
+ 1 and Zhigang Li (李志刚)2
7
+ 1South-Western Institute for Astronomy Research, Yunnan University
8
+ Kunming, Yunnan 650500, China
9
+ 2College of Physics and Electronic Engineering, Nanyang Normal University
10
+ Nanyang, Henan, 473061, China
11
+ ABSTRACT
12
+ We present a smoothed density-corrected Vmax technique for building a random catalog for property-
13
+ dependent galaxy clustering estimation. This approach is essentially based on the density-corrected
14
+ Vmax method of Cole (2011), with three improvements to the original method. To validate the improved
15
+ method, we generate two sets of flux-limited samples from two independent mock catalogs with different
16
+ k + e corrections. By comparing the two-point correlation functions, our results demonstrate that the
17
+ random catalog created by the smoothed density-corrected Vmax approach provides a more accurate
18
+ and precise measurement for both sets of mock samples than the commonly used Vmax method and
19
+ redshift shuffled method. For flux-limited samples and color-dependent subsamples, the accuracy for
20
+ the projected correlation function is well constrained within 1% on the scale 0.07h−1Mpc to 30h−1Mpc.
21
+ The accuracy of the redshift-space correlation function is less than 2% as well. Currently, it is the
22
+ only approach that holds promise for achieving the high-accuracy goal of clustering measures for next-
23
+ generation surveys.
24
+ Keywords: Galaxies(573) — Galaxy evolution(594) — Large-scale structure of the universe(902) —
25
+ Two-point correlation function(1951)
26
+ 1. INTRODUCTION
27
+ Over the last couple of decades, the successful observa-
28
+ tion of galaxy redshift surveys (e.g., Two Degree Field
29
+ Galaxy Redshift Survey, 2dFGRS, Colless et al. 2003;
30
+ the Sloan Digital Sky Survey, SDSS, York et al. 2000; the
31
+ Baryon Oscillation SpectroscopicSurvey, BOSS, Eisen-
32
+ stein et al. 2011; the VIMOS Public Extragalactic Red-
33
+ shift Survey, VIPERS, Garilli et al. 2012) enable sig-
34
+ nificant progress has been achieved on our understand-
35
+ ing of galaxy formation and evolution (Madgwick et al.
36
+ 2003; Berlind et al. 2006; Guo et al. 2011, 2018; Zu et al.
37
+ 2021), the galaxy-halo connection (Jing et al. 1998; Yang
38
+ et al. 2003, 2008, 2012; Zheng et al. 2005, 2009; Vale &
39
+ Ostriker 2004; Alam et al. 2021a; Wechsler & Tinker
40
+ 2018; Behroozi et al. 2019), and the nature of grav-
41
+ ity and dark energy ( Peacock et al. 2001; Weinberg
42
+ Corresponding author: Lei Yang
43
44
+ et al. 2013; Samushia et al. 2013; Alam et al. 2021b and
45
+ reference therein).
46
+ In the upcoming years, the next-
47
+ generation surveys, such as the Dark Energy Spectro-
48
+ scopic Instrument (DESI; Levi et al. 2013; DESI Col-
49
+ laboration et al. 2016a,b), the Legacy Survey of Space
50
+ and Time (LSST; LSST Dark Energy Science Collabo-
51
+ ration 2012), the space mission Euclid (Amendola et al.
52
+ 2013) and CSST (Cao et al. 2018; Gong et al. 2019),
53
+ will map the 3D galaxy distribution in an unprecedent-
54
+ edly volume, leading to about an order of magnitude
55
+ more extragalactic spectroscopic redshifts than that of
56
+ SDSS, BOSS and eBOSS have achieved (Zarrouk et al.
57
+ 2021; Yuan et al. 2022b; Myers et al. 2022; Schlegel
58
+ et al. 2022). Massive amounts of data from deeper in
59
+ the sky will provide new insights into the physics of
60
+ galaxy formation, as well as the nature of dark matter
61
+ and dark energy (Hahn et al. 2022). Galaxy two-point
62
+ statistics, being one of the most fundamental tools, will
63
+ continue to play a crucial role in future data analysis
64
+ (Valluri et al. 2022; Amin et al. 2022), as they have in
65
+ the past (Zehavi et al. 2011; Nuza et al. 2013; Skibba
66
+ arXiv:2301.05520v1 [astro-ph.CO] 13 Jan 2023
67
+
68
+ ID2
69
+ Yang et al.
70
+ et al. 2014; Samushia et al. 2014; Guo et al. 2014; Planck
71
+ Collaboration et al. 2016; Shi et al. 2018). Due to dif-
72
+ ferent systematics, it is still difficult to reliably mea-
73
+ sure small-scale property-dependent galaxy clustering at
74
+ the present time.
75
+ These systematics include redshift-
76
+ dependent completeness, the missing galaxies in ob-
77
+ servations (Reid et al. 2016; Bianchi & Percival 2017;
78
+ Bianchi & Verde 2020), the incorrect estimation of the
79
+ radial selection model (Ross et al. 2012; Yang et al.
80
+ 2020), among others (Breton & de la Torre 2021; Farrow
81
+ et al. 2021; Merz et al. 2021). Fortunately, the coming
82
+ big data will considerably reduce random errors in clus-
83
+ tering determination, but to reach the high accuracy of
84
+ clustering analysis required by the next generation sur-
85
+ veys, we must eliminate systematic errors in measure-
86
+ ment (Beutler et al. 2014; Reid et al. 2016; Glanville
87
+ et al. 2021; D´avila-Kurb´an et al. 2021). In this study, the
88
+ systematic bias produced by the radial selection model
89
+ is investigated in greater detail.
90
+ To measure the galaxy two-point correlation function
91
+ (hereafter 2PCF), we must build a random catalog with
92
+ the same angular and radial selection functions as the
93
+ observed sample, but with a random distribution in the
94
+ observed space (Davis & Peebles 1983; Hamilton 1993).
95
+ The angular selection function is easy to obtain from
96
+ observation, but the radial selection function is difficult
97
+ to estimate accurately. As the sample has a fixed num-
98
+ ber density and the redshift distribution of a random
99
+ catalog is straightforward to construct (Tegmark et al.
100
+ 2004), previous works often use a volume-limited sample
101
+ for clustering analysis (Norberg et al. 2002; Zehavi et al.
102
+ 2002, 2005, 2011; McBride et al. 2011; Shi et al. 2016;
103
+ Mohammad et al. 2018). However, due to the need of
104
+ excluding a substantial number of galaxies, the statisti-
105
+ cal precision of the clustering measurement is reduced
106
+ (Zehavi et al. 2005; Xu et al. 2016).
107
+ Alternatively, a
108
+ flux-limited sample may optimize the utilization of ob-
109
+ served galaxies, but since its radial selection function
110
+ φ(z) changes with redshift, it is not easy to build the
111
+ redshifts of random galaxies for a flux-limited sample
112
+ unless we know the galaxy luminosity function (here-
113
+ after LF) Φ(Mr) (Loveday et al. 2015; Karademir et al.
114
+ 2021).
115
+ The radial selection function for the flux-limited sam-
116
+ ple has been recovered using a number of ways. For in-
117
+ stance, the smooth spline fit approach utilizes a ‘spline’
118
+ model to fit the redshift distribution of a galaxy sam-
119
+ ple (Reid et al. 2010; Wang et al. 2017).
120
+ The Vmax
121
+ method populates random galaxies within the maximum
122
+ viewable volume of a real galaxy, which is dependent
123
+ on the galaxy’s observational limitations. The redshift
124
+ ‘shuffled’ technique is a commonly employed alternative
125
+ (Guo et al. 2013; Zu & Mandelbaum 2015; Wang et al.
126
+ 2021). This approach chooses redshifts at random from
127
+ the real galaxy sample and assigns them to the ran-
128
+ dom galaxy catalog. Through clustering analysis of the
129
+ VIPERS data, de la Torre et al. (2013) showed that the
130
+ spline fit approach underestimates the predicted 2PCF
131
+ in comparison to the Vmax method, particularly on scales
132
+ larger than 3 h−1Mpc.
133
+ In the BOSS systematics in-
134
+ vestigation, Ross et al. (2012) revealed that the shuf-
135
+ fled technique had a minor bias in BAO measurement
136
+ compared to the spline fit method (Ross et al. 2015).
137
+ However, de Mattia & Ruhlmann-Kleider (2019) demon-
138
+ strated that the shuffled approach suffers from the ‘inte-
139
+ gral constraint’ effect when measuring the power spec-
140
+ trum. Using mocks from a high-resolution simulation,
141
+ Yang et al. (2020) (hereafter Paper I) found that both
142
+ the redshift shuffled technique and the Vmax method un-
143
+ derestimate galaxy clustering by 30% and 20%, respec-
144
+ tively, on scales ≳ 10h−1Mpc for flux-limited samples.
145
+ Consequently, as long as we continue to use the afore-
146
+ mentioned radial selection methods to construct the red-
147
+ shifts for random catalogs for a flux-limited sample, our
148
+ clustering measurement will contain an unavoidable sys-
149
+ tematic deviation from the true galaxy clustering.
150
+ Cole (2011) proposes a density-corrected Vmax tech-
151
+ nique for concurrently estimating LF and generating a
152
+ random catalog for a flux-limited sample.
153
+ Unlike the
154
+ conventional Vmax method, this technique can success-
155
+ fully eliminate density fluctuations.
156
+ In Cole (2011),
157
+ they examine the radial distribution of random galax-
158
+ ies, which is in excellent agreement with the input
159
+ galaxy sample. This method has been employed to de-
160
+ termine property-dependent galaxy clustering (Farrow
161
+ et al. 2015) and clustering analysis (de la Torre et al.
162
+ 2017; Pezzotta et al. 2017; Loveday et al. 2018; John-
163
+ ston et al. 2021). However, its clustering measurement
164
+ performance has not been assessed. The purpose of this
165
+ study is to test the Cole (2011) technique for clustering
166
+ measurements using mock data. In addition, some mod-
167
+ ifications are made to the original approach in order to
168
+ improve its measurement accuracy.
169
+ This paper is structured as follows.
170
+ In Section 2,
171
+ we review the Cole (2011) method and introduce the
172
+ smoothed density-corrected Vmax method.
173
+ The con-
174
+ structions of mock galaxy catalogs are detailed in Sec-
175
+ tion 3.
176
+ We present the testing results of the correla-
177
+ tion functions in Section 4. In Section 5, we assess the
178
+ smoothed density-corrected Vmax method and discuss
179
+ the potential sources of uncertainty in estimate.
180
+ We
181
+ conclude the paper in Section 6.
182
+
183
+ The smoothed Vmax method
184
+ 3
185
+ 2. THE SMOOTHED DENSITY-CORRECTED Vmax
186
+ METHOD
187
+ To address the difficulty of recovering the radial selec-
188
+ tion function of property-dependent galaxy sample, Cole
189
+ (2011) developed a density-corrected Vmax approach for
190
+ galaxy clustering estimate. This section starts with a
191
+ briefly overview of the Cole (2011) technique. Follow-
192
+ ing that, we detail the improvements to the original
193
+ Cole (2011) methodology, which we call the smoothed
194
+ density-corrected Vmax method.
195
+ 2.1. The Cole (2011) method
196
+ On the basis of the standard Vmax approach, Cole
197
+ (2011) presented a weighted Vmax method based on a
198
+ joint stepwise maximum likelihood method, which effec-
199
+ tively eliminates the influence of density fluctuation. In
200
+ this method, a density-weighted maximum volume V DC
201
+ max
202
+ 1 is defined, which is the normal Vmax weighted by the
203
+ estimated galaxy overdensities ∆(z) and the LF density
204
+ evolution P(z). They further define a weight
205
+ wα ≡
206
+ Vα,max
207
+ V dc
208
+ α,max + µVα,max
209
+ ,
210
+ (1)
211
+ where Vα,max and V dc
212
+ α,max are the normal Vmax and
213
+ density-corrected Vmax for the αth galaxy in the ob-
214
+ served sample.
215
+ µ is a Lagrange multiplier providing
216
+ constraints with ⟨
217
+ Vα,max
218
+ V DC
219
+ α,max+µVα,max ⟩ = 1 when estimating
220
+ LF for the galaxy sample. Lastly, a random catalog can
221
+ be created by replicating individual galaxies nα = nwα
222
+ times and distributing them at random across the Vα,max
223
+ volume. Note that, unlike the standard Vmax approach,
224
+ nα is no longer the same for all galaxies and the selec-
225
+ tion rate of random galaxies is adjusted by weight wα.
226
+ The brightness of the galaxy may be over- or under-
227
+ represented in the observed sample as a result of the
228
+ density variation in the Vmax volume being appropri-
229
+ ately compensated by the weight wα. By comparing the
230
+ output redshift distribution to that of the input galaxy
231
+ sample, Cole (2011) proved that the random catalog cre-
232
+ ated by this density-weighted Vmax technique could re-
233
+ cover the genuine galaxy selection function. While this
234
+ approach has not yet been tested on galaxy clustering
235
+ using mock galaxy catalog, it remains to be validated
236
+ using mocks.
237
+ 2.2. The smoothed density-corrected Vmax method
238
+ Before testing the Cole (2011) method, we perform
239
+ three modifications to the original public code 2. The
240
+ 1 See their equation (11) and (16) in Cole (2011).
241
+ 2 http://astro.dur.ac.uk/∼cole/random cats/
242
+ original algorithm is only applicable to galaxy sample
243
+ with a single faint flux cut, but by adding zmin estimate,
244
+ our first update makes the code applicable to a generic
245
+ double flux-cut sample 3. The maximum(minimum) red-
246
+ shifts zmax(min) in our updated code is same as Paper I
247
+ which are determined as follows:
248
+ zmax = min[zmag,max, zsample,max],
249
+ (2)
250
+ zmin = max[zmag,min, zsample,min],
251
+ (3)
252
+ where zsample,max(min) is the redshift limits of galaxy
253
+ sample, and zmag,max(min) is derived by
254
+ mfaint = M + DM(zmag,max) + k(z) − E(z),
255
+ (4)
256
+ mbright = M + DM(zmag,min) + k(z) − E(z),
257
+ (5)
258
+ where the flux limits are set by apparent magnitude
259
+ mbright(faint), M is the absolute magnitude, the distance
260
+ modulus is DM = 5log10(dL) + 25 − 5log10h, k(z) is the
261
+ k-correction, and E(z) is the luminosity evolution cor-
262
+ rection (e-correction). Our second code improvement is
263
+ the k-correction. In the original code, the k-correction is
264
+ performed for all galaxies depending on the input func-
265
+ tion k(z), which hinders the method’s ability to apply
266
+ to a real galaxy sample whose k-correction is depen-
267
+ dent not just on redshift but also on galaxy properties
268
+ (e.g., color). We modify the code to take a k(z, color)
269
+ model as input, allowing k-correction to be conducted
270
+ on individual galaxies based on their redshifts and col-
271
+ ors. This makes the technique more applicable to ob-
272
+ servable galaxies. Following the aforementioned mod-
273
+ ifications, the output cloned random catalog from the
274
+ updated algorithm is basically consistent with the gen-
275
+ uine radial distribution of the galaxy number density
276
+ ntrue(z). However, there are small fluctuations in the
277
+ output radial distribution that have a considerable in-
278
+ fluence on the final clustering estimate. Our final mod-
279
+ ification to the algorithm is to smooth the radial dis-
280
+ tribution of the output cloned random galaxies. In the
281
+ smooth procedure, we begin by generating a histogram
282
+ of comoving distance d for the random galaxies. We set
283
+ a bin size of ∆d = 5h−1Mpc, and N(d)hist represents
284
+ the number of random galaxies in each bin. Secondly,
285
+ we employ a convolution operator to smooth the his-
286
+ togram as N s
287
+ hist = [Nhist ∗ ∆smooth], where ∆smooth = 5
288
+ is the smooth box size in 1D and N s
289
+ hist is the smooth
290
+ radial distribution of random galaxies. Final redshifts
291
+ for random galaxies are generated based on the profile
292
+ of N s
293
+ hist that has been smoothed. In Section 4.2, we will
294
+ 3 This modification primarily changes the step-function S from
295
+ S(Lmin|L) to S(Lmin, Lmax|L) in equation(5) and the lower limit
296
+ of Vmax integration in equation (11) and (39) in Cole (2011).
297
+
298
+ 4
299
+ Yang et al.
300
+ observe that our modifications enhance the clustering
301
+ measurement accuracy significantly.
302
+ Farrow et al. (2015) recently developed the Cole
303
+ (2011) technique to quantify the property-dependent
304
+ galaxy clustering of GAMA II data (Driver et al. 2011;
305
+ Liske et al. 2015). They found that the Cole (2011) tech-
306
+ nique yields a redshift distribution that is too broad for
307
+ cloned random galaxies, which may be the result of lumi-
308
+ nosity evolution. To mitigate this unanticipated impact,
309
+ Farrow et al. (2015) developed a Gaussian window func-
310
+ tion to restrict the redshift distribution of the cloned
311
+ galaxies. In the first place, the mock galaxy catalogs
312
+ that we construct in this study resemble the low red-
313
+ shift SDSS data, as opposed to the GAMA data, which
314
+ encompass a relatively broad redshift range of 0∼0.5. In
315
+ our mock galaxies, luminosity evolution is expected to
316
+ have negligible effects. Second, our first adjustment to
317
+ the zmin calculation narrows the distribution of cloned
318
+ random galaxies. Our test findings in Section 4.2 will
319
+ demonstrate that the smoothed density-corrected Vmax
320
+ approach is adequate for obtaining accurate galaxy clus-
321
+ tering determination.
322
+ 3. THE MOCK GALAXY CATALOGS
323
+ In this part, we describe the construction of mock
324
+ galaxy catalogs for a robust test of the smooth density-
325
+ corrected Vmax approach on clustering estimation. We
326
+ build two sets of mock samples, one with simple k + e-
327
+ corrections and the other with complex k+e-corrections
328
+ for galaxies.
329
+ The first group of mock galaxy catalogs is created in
330
+ a manner similar to Paper I. For the halo catalog, we
331
+ adopt the WMAP 3072 600 cosmological N-body sim-
332
+ ulation from the CosmicGrowth simulation suite (Jing
333
+ 2019). This simulation starts at redshift 144 with 30723
334
+ particles evolving in a 600 h−1Mpc cube box. The sim-
335
+ ulation assumes a standard flat ΛCDM cosmology with
336
+ {Ωm = 0.268, Ωb = 0.045, σ8 = 0.83, ns = 0.968} and
337
+ h = H0/(100 km s−1Mpc−1) = 0.71, which are compati-
338
+ ble with the Nine-Year Wilkinson Microwave Anisotropy
339
+ Probe (WMAP 9) observations (Hinshaw et al. 2013;
340
+ Bennett et al. 2013). This simulation has a mass reso-
341
+ lution of 5.54 × 108 h−1M⊙. To identify halos for each
342
+ output snapshot, the friends-of-friends technique is used
343
+ with a linking length of 0.2 in units of the mean parti-
344
+ cle separation (Davis et al. 1985). Hierarchical Bound-
345
+ Tracing technique is used to find subhalos and their
346
+ merger histories. In this study, the snapshot at z = 0
347
+ is utilized to build the halo catalog, and each halo con-
348
+ tains at least 50 particles. The “orphan” halos are also
349
+ maintained in the catalog 4 (Yang et al. 2019).
350
+ We use the subhalo abundance matching (SHAM)
351
+ method to establish the connection between galaxies
352
+ and subhalos. Based on the galaxy absolute magnitude
353
+ M 0.1
354
+ r
355
+ and the peak mass Mpeak of subhalos, a mono-
356
+ tonic relationship between the cumulative number den-
357
+ sity n(< M 0.1
358
+ r
359
+ ) = n(> Mpeak) has been constructed
360
+ (Conroy et al. 2006; Hearin et al. 2014; Wechsler & Tin-
361
+ ker 2018; Contreras et al. 2021).
362
+ We employ the lu-
363
+ minosity function of the SDSS DR7 full 1 sample of
364
+ the New York University Value-Added catalog (NYU-
365
+ VAGC)5 (Blanton et al. 2001, 2003, 2005), for which
366
+ the r−band absolute magnitude M 0.1
367
+ r
368
+ of galaxies has
369
+ been k− and e−corrected to z = 0.1.
370
+ The Mpeak is
371
+ the maximum mass ever attained by a subhalo over its
372
+ entire evolutionary history.
373
+ Once a subhalo has been
374
+ matched to a galaxy, its position and velocity are given
375
+ to the galaxy. By periodically rotating and stacking the
376
+ mock box, we generate 60 mock galaxy catalogs from
377
+ the parent catalog. Random sites are assigned to the ob-
378
+ server. The observed redshift zobs is determined by the
379
+ galaxy’s position and velocity relative to the observer.
380
+ To obtain the apparent magnitude mr, the k− correc-
381
+ tion and e− correction, as described in equation (4) and
382
+ equation (5), must be provided. Real data processing
383
+ determines these values by fitting the observed galaxy
384
+ flux to a library of synthetic spectrum models, which is
385
+ generally inapplicable to mock galaxies and also beyond
386
+ the scope of this work. For the sake of simplicity, we
387
+ consider two simple k− and e−correction cases here. In
388
+ the first case, no k+e corrections are applied to the mock
389
+ galaxies. In the second case, we suppose that all galax-
390
+ ies follow a simple k− and e−correction model. For the
391
+ k−correction, we take the model of Smith et al. (2017):
392
+ k0.1(z) =
393
+ 4
394
+
395
+ i=0
396
+ Ai(z − 0.1)4−i.
397
+ (6)
398
+ Smith et al. (2017) fit the above fourth-order polynomial
399
+ to individual GAMA galaxies, where Ai is the polyno-
400
+ mial’s fitting coefficient (McNaught-Roberts et al. 2014).
401
+ There are seven color-dependent k(z) models (see sec-
402
+ tion below) and we adopt the (g − r)0.1
403
+ med = 0.603 model
404
+ with the following fitting coefficients:
405
+ A0 = −3.428,
406
+ A1 = 9.478, A2 = −2.703, and A3 = 0.7646. For the
407
+ 4 In the evolution process, some subhalos go below the resolution
408
+ limit due to the tidal stripping.
409
+ We keep subhalos whose in-
410
+ fall time is shorter than the merger time, and those subhalos do
411
+ not merge into the core of the host halo and host the “orphan”
412
+ galaxies.
413
+ 5 lfvmax − q2.00a − 1.00.dr72full1.fits.
414
+
415
+ The smoothed Vmax method
416
+ 5
417
+ e−correction, we use the SDSS model (Blanton 2006) :
418
+ E(z) = q0[1 + q1(z − z0))](z − z0),
419
+ (7)
420
+ where z0 = 0.1 is the zero point redshift for evolu-
421
+ tion correction, q0 = 2 denotes the evolution of mag-
422
+ nitude per redshift, q1 = −1 is the nonlinear param-
423
+ eter in redshift evolution. After applying the k− and
424
+ e−corrections to the mock galaxies, our final samples
425
+ are constructed as follows.
426
+ For each mock catalog in
427
+ each k + e correction case, we first generate a flux-
428
+ limited sample with flux cuts at mr = [15, 17] and a
429
+ sky coverage of ∼ 5950 deg2.
430
+ The flux-limited cata-
431
+ log is then divided into two luminosity-dependent sam-
432
+ ples, named LC1 with M 0.1
433
+ r
434
+ = [−19, −22] and LC2 with
435
+ M 0.1
436
+ r
437
+ = [−20, −23]. Using these selection criteria, the
438
+ galaxy sample’s number density changes as a function
439
+ of redshift. Figure 13 in Appendix A displays the av-
440
+ erage number density n(z) of 60 samples for two lumi-
441
+ nosity cuts in each k + e correction case. This redshift-
442
+ dependent number density typically prevents us from
443
+ obtaining an accurate measurementof galaxy clustering
444
+ particularly at scales ≤ 30h−1Mpc for flux-limited sam-
445
+ ples (Yuan et al. 2022a). In the following text, the above
446
+ mock samples generated from the simulation of (Jing
447
+ 2019) are referred to as LC samples.
448
+ The second group of mock galaxy catalogs is built
449
+ from the lightcone catalog of Smith et al. (2017) 6. It
450
+ is essential to access the radial selection model using a
451
+ catalog of galaxies that closely resembles the observed
452
+ galaxies. The Smith et al. (2017) catalog is constructed
453
+ using the MXXL simulation (Angulo et al. 2012), which
454
+ assumes a ΛCDM cosmology with WMAP1 parameters
455
+ {Ωm = 0.25, σ8 = 0.9, ns = 0.968, h = 0.73} and
456
+ operates in a 3h−1Gpc box. The mass of the particle
457
+ is 6.17 × 109h−1M⊙.
458
+ Smith et al. (2017) created the
459
+ lightcone catalog by applying the halo occupation dis-
460
+ tribution method to link galaxies to subhalos. To assign
461
+ colors to the galaxies, they utilize an enhanced redshift-
462
+ dependent Skibba & Sheth (2009) model. The galaxy
463
+ k+e corrections in their lightcone catalog are more com-
464
+ plicated than the ones we use for LC samples. They em-
465
+ ploy color-dependent k−corrections obtained from the
466
+ GAMA survey for the k−corrections. In brief, they esti-
467
+ mate the k−corrections for individual galaxies in GAMA
468
+ data by fitting with equation (6), and they determine the
469
+ median k−correction in seven evenly spaced color bins to
470
+ construct seven k−correction models. These models are
471
+ (g −r)0.1
472
+ med = 0.131, 0.298, 0.443, 0.603, 0.785, 0.933, 1.067
473
+ with different polynomial coefficients. The k(z, color) is
474
+ 6 http://icc.dur.ac.uk/data/
475
+ then interpolated for the lightcone catalog using seven
476
+ median color (g − r)0.1
477
+ med models based on the galaxy’s
478
+ color and redshift 7.
479
+ For the LF evolution, they em-
480
+ ployed the evolving Schechter function derived from
481
+ GAMA data. In the low redshift region z ≲ 0.13, the LF
482
+ of their catalog coincides with the LF of Blanton et al.
483
+ (2003), which we employ for LC samples, , and in the
484
+ median redshift region, the LF evolves to the GAMA
485
+ LF. The luminosity(color)-dependent galaxy clusterings
486
+ in Smith et al. (2017) catalog are generally consistent
487
+ with the SDSS DR7 results measured by Zehavi et al.
488
+ (2011) at low redshift, as well as the GAMA results mea-
489
+ sured by Farrow et al. (2015) at the median redshift.
490
+ Therefore, this catalog is suitable for testing different
491
+ radial selection models for property-dependent cluster-
492
+ ing measurement. We construct ten flux-limited sam-
493
+ ples from the full-sky lightcone catalog by rotating the
494
+ sky, using the galaxy selection criteria (mr = [15, 17])
495
+ and sky coverage (∼ 5950 deg2).
496
+ Two luminosity-
497
+ dependent galaxies, LS1 (M 0.1
498
+ r
499
+ = [−19, −22]) and LS2
500
+ (M 0.1
501
+ r
502
+ = [−20, −23]), are generated from each flux-
503
+ limited sample, much as we did for the LC samples.
504
+ As our sample selection resembles the SDSS DR7 data,
505
+ we further divide the luminosity-dependent sample into
506
+ blue subsample and red subsample using the color-cut
507
+ equation (g − r)0.1
508
+ cut = 0.21 − 0.03M 0.1
509
+ r
510
+ of Zehavi et al.
511
+ (2011). In the rest of this study, we refer to the mock
512
+ galaxy samples built from Smith et al. (2017) catalog as
513
+ LS samples.
514
+ In summary, we generate two sets of mock samples
515
+ from two simulations using the same selection criterion
516
+ for galaxies.
517
+ For the LC samples, flux-limited sam-
518
+ ples are constructed from sixty mocks with two abso-
519
+ lute magnitude cuts. Two cases are considered for k + e
520
+ corrections: (1) there are no k + e corrections; (2) all
521
+ galaxies are assumed to follow a simple k + e correction
522
+ model. Ten LS samples are created in the same man-
523
+ ner as LC samples, but using a public lightcone cata-
524
+ log. The LS samples, however, feature a color-dependent
525
+ k−correction and a complex e−correction that are un-
526
+ known to us. In order to examine the color-dependent
527
+ clustering, the luminosity-dependent LS data are split
528
+ into blue and red subsamples. We emphasize that nei-
529
+ ther the LC samples nor the LS samples are subjected
530
+ to any deliberate impact (e.g., fiber collision) in or-
531
+ der to decrease unknown systematic uncertainty in our
532
+ later tests.
533
+ In addition, when calculating the comov-
534
+ ing distance from redshift, we employ the cosmological
535
+ 7 For details see Setion4.3 in Smith et al. (2017)
536
+
537
+ 6
538
+ Yang et al.
539
+ model of the simulation from which the samples are con-
540
+ structed, separately.
541
+ 4. TEST THE SMOOTHED
542
+ DENSITY-CORRECTED Vmax METHOD WITH
543
+ THE 2PCFS
544
+ In this section, we describe the construction of ran-
545
+ dom galaxy catalog, focusing on the radial distribution
546
+ of random galaxies derived from various radial selec-
547
+ tion models. Following that, we compare the correla-
548
+ tion functions generated by the random catalogs used in
549
+ these models.
550
+ 4.1. Construction of the random catalogs
551
+ The random catalogs are constructed as follows. For
552
+ the angular distribution, we first generate a large num-
553
+ ber of random points that are uniformly dispersed across
554
+ the surface of a unit sphere.
555
+ For each mock sample
556
+ and subsample, we extract a collection of points with
557
+ the same sky coverage as the corresponding sample and
558
+ subsample.
559
+ We consider the positions of these points
560
+ to be the angular distribution (ra, dec) of the random
561
+ galaxies, with no angular selection effect or survey masks
562
+ imposed. For the redshifts of random galaxies, the fol-
563
+ lowing radial selection models are used in our tests:
564
+ 1. ntrue method, which generates the redshift distri-
565
+ bution for random galaxies using the true galaxy
566
+ number density n(z)true taken from the LF of the
567
+ parent mock catalog.
568
+ 2. VSDC
569
+ max method, in which redshifts for random cat-
570
+ alog are generated using the smoothed density-
571
+ corrected Vmax method.
572
+ 3. VDC
573
+ max method, in which the density-corrected
574
+ Vmax method of Cole (2011) is utilized, but with-
575
+ out the smoothing procedure.
576
+ 4. Vmax method, where the normal Vmax method is
577
+ adopted.
578
+ 5. Shuffled method, which applies the redshift shuf-
579
+ fled method. In this method, galaxy redshifts of
580
+ the sample are randomly assigned to the random
581
+ galaxies.
582
+ For LC samples, it is simple to incorporate the k + e
583
+ corrections into the redshift generation process.
584
+ En-
585
+ abling the validation of the capacity of different radial
586
+ selection models to restore the true radial selection func-
587
+ tion n(z)true. Figure 1 shows comparison between the
588
+ radial distributions of a single LC sample and random
589
+ catalogs generated by aforementioned radial selection
590
+ methods in the case of no k + e corrections. In the left
591
+ and right panels, the comparisons for LC1 and LC2 sam-
592
+ ples are presented, respectively. The second row of pan-
593
+ els displays the deviation of random galaxy number rela-
594
+ tive to the galaxy number in each comoving distance bin,
595
+ which is defined as ∆g = (nr −ng)/ng. The third row of
596
+ panels displays the deviation of the random galaxy num-
597
+ ber of the other four techniques from the number of the
598
+ ntrue approach, defined as ∆ntrue = (nr −nr,true)/nr,true.
599
+ The black histograms in the top row of panels denote
600
+ the distribution of galaxies in flux-limited samples. The
601
+ radial distribution of random catalogs created by the
602
+ ntrue method is represented by green lines, which in-
603
+ dicate the distribution arising from the genuine selec-
604
+ tion function. The purple dashed line is the distribution
605
+ producing from the V DC
606
+ max approach. We see small fluc-
607
+ tuations in the radial distribution, which are notably
608
+ clear in the bottom row of panels. These noisy fluctua-
609
+ tions have been reduced by the smoothing process in the
610
+ V SDC
611
+ max approach; as indicated by the blue solid lines, the
612
+ smoothed radial distribution is in excellent agreement
613
+ with the distribution predicted by the ntrue method.
614
+ The radial distributions from the Vmax method and
615
+ the shuffled method are represented by red and yel-
616
+ low lines, respectively.
617
+ As shown in the bottom pan-
618
+ els, ∆ntrue of the Vmax approach exhibits a systematic
619
+ bias in both luminosity-dependent LC samples as a re-
620
+ sult of the influence of large-scale structures in galaxy
621
+ radial distribution. The Vmax approach creates an ex-
622
+ cess of random galaxies near these structures; hence, the
623
+ amount of random galaxies in the high-redshift tail have
624
+ been decreased. Figure 2 shows the same comparison as
625
+ Figure 1 for LC samples with the simple k + e correc-
626
+ tions. The deviations of different approaches from the
627
+ ntrue method shown in the bottom panels are similar to
628
+ those in Figure 1.
629
+ Figure 3 shows a comparison for the LS samples, em-
630
+ ploying the same color-coded lines as Figure 1. The left
631
+ panels compare an LS1 sample, whereas the middle and
632
+ right panels compare its blue and red subsamples, re-
633
+ spectively.
634
+ For the ntrue method, the radial selection
635
+ function derived from the LF of the lightcone catalog is
636
+ applied. The k + e corrections are appropriately incor-
637
+ porated into the redshift generation process for the ntrue
638
+ and Vmax methods. For the V SDC
639
+ max
640
+ and V DC
641
+ max methods,
642
+ the same k−correction models that Smith et al. (2017)
643
+ performed for their lightcone database are employed,
644
+ which interpolate the k−correction from seven models
645
+ based on the color and redshift of individual galaxies.
646
+ The e−correction is also properly applied to LS samples
647
+ and their color-dependent subsamples by using the evo-
648
+ lutionary property of the lightcone catalog. The results
649
+
650
+ The smoothed Vmax method
651
+ 7
652
+ of the comparison are generally consistent with those of
653
+ the LC samples. The redshifts generated by the Vmax
654
+ technique are substantially influenced by the sample’s
655
+ structures; the bias in ∆ntrue is greater than that of LC
656
+ samples, which reaches 20% on the high redshift tail (red
657
+ solid lines). The redshifts from the V SDC
658
+ max approach suc-
659
+ cessfully mitigate this impact, resulting in a relatively
660
+ small deviation in ∆ntrue (blue solid lines).
661
+ For both
662
+ LC and LS samples, the redshifts of random catalogs
663
+ obtained by the shuffled approach replicate the radial
664
+ distribution of galaxies (yellow solid lines), hence, the
665
+ structures are also cloned. In the following section, we
666
+ will examine how galaxy clustering measurements are
667
+ affected by the deviations in these radial distributions
668
+ that differ from the expected distribution produced by
669
+ the ntrue model.
670
+ 4.2. Comparison of the correlation functions
671
+ This section introduces the 2PCF estimator that we
672
+ employ to measure galaxy clustering. Then, we provide
673
+ comparison of the projected 2PCFs and the redshift-
674
+ space 2PCFs determined from random catalogs gener-
675
+ ated by the aforementioned radial selection methods.
676
+ 4.2.1. Estimator
677
+ We measure the 2PCF in the same way as Paper I.
678
+ First, we define the redshift separation vector s and the
679
+ line-of-sight vector l as s ≡ υ1 −υ2 and l ≡ (υ1 +υ2)/2,
680
+ where υ1 and υ2 are redshift-space position vectors of
681
+ a pair of galaxies (Hamilton 1992; Fisher et al. 1994).
682
+ Separations that are parallel (π) and perpendicular (rp)
683
+ to the line-of-sight direction are derived as
684
+ π ≡ s · l
685
+ |l| ,
686
+ r2
687
+ p ≡ s · s − π2.
688
+ (8)
689
+ We construct a grid of π and rp by taking 1 h−1Mpc
690
+ as the bin size for π from 0 up to πmax = 40 h−1Mpc
691
+ linearly, and a bin size of 0.2 for rp is adopted logarith-
692
+ mically in the range of [0.01, 40] h−1Mpc. Estimator
693
+ of Landy & Szalay (1993) is used to calculate the 2D
694
+ correlation function as
695
+ ξ(rp, π) = DD − 2DR + RR
696
+ RR
697
+ ,
698
+ (9)
699
+ where DD, DR, and RR are the numbers of data-data,
700
+ data-random, and random-random pairs. Given s2 =
701
+ |s|2 = r2
702
+ p + π2, we derive the redshift-space correlation
703
+ function ξ(s). By integrating ξ(rp, π) along the line-of-
704
+ sight direction, we estimate the projected 2PCF (Davis
705
+ & Peebles 1983) by
706
+ wp(rp) ≡ 2
707
+ � ∞
708
+ 0
709
+ ξ(rp, π) dπ ≈ 2
710
+ � πmax=40
711
+ 0
712
+ ξ(rp, π) dπ.
713
+ (10)
714
+ We employ the public code CORRFUNC (Sinha & Garri-
715
+ son 2019) for pair counting in this work. To reduce the
716
+ shot noise on small-scale clustering, we use 50 times the
717
+ number of galaxies in the random catalogs for random
718
+ galaxies.
719
+ 4.2.2. Comparison of projected 2PCFs
720
+ The projected 2PCFs for LC samples without and
721
+ with simple k + e corrections are compared in Figure 4
722
+ and Figure 5, respectively. We compare the average pro-
723
+ jected 2PCF estimated using random catalogs produced
724
+ by the radial selection models outlined in Section 4.1. In
725
+ the left and right panels for the LC1 and LC2 samples,
726
+ respectively, the estimated mean wp of 60 mock samples
727
+ are displayed. In the top panels, wp,true computed using
728
+ random catalog from the ntrue model is represented by
729
+ solid black points with errors representing the 1σ dis-
730
+ persion across individual wp,trues of samples. The blue
731
+ dashed lines, green dotted lines, red long-dashed lines,
732
+ and orange lines represent wps estimated from random
733
+ catalogs of the V SDC
734
+ max
735
+ technique, V DC
736
+ max method, Vmax
737
+ method, and shuffled method, respectively. The aver-
738
+ age offsets [wp − wp,true] from wp,true for the models are
739
+ shown in the middle row of panels, which are defined as
740
+ [wp − wp,true] =
741
+ 1
742
+ 60
743
+ �60
744
+ i=1 wi
745
+ p − wi
746
+ p,true, where wi
747
+ p is the
748
+ projected 2PCF measured for the ith LC sample. The
749
+ offsets increase when the scale drops below 1h−1Mpc for
750
+ both the V DC
751
+ max method (green dotted lines) and shuffled
752
+ method (orange diamonds).
753
+ When using the random
754
+ catalogs of the V SDC
755
+ max technique to measure wp, the little
756
+ positive offsets in the blue open rolls with error bars in-
757
+ dicate a slight overestimation on scale rp ≲ 0.4h−1Mpc.
758
+ On a small scale, there are apparent offsets for the Vmax
759
+ approach for LC1 samples in both k+e correction cases,
760
+ as seen by the open red squares with error bars. For
761
+ LC2 samples, there are extremely modest systematic
762
+ offsets for the Vmax technique across all of the scales
763
+ tested, and these offsets are smaller than those for the
764
+ V SDC
765
+ max method. Compared to the 1σtrue (gray solid lines)
766
+ among 60 wp,trues, the V SDC
767
+ max and Vmax methods’ offsets
768
+ are essentially insignificant.
769
+ In the bottom panels of Figure 4 and Figure 5, we dis-
770
+ play the average deviation from wp,true for each model,
771
+ using the same color-coded symbols and lines as the mid-
772
+ dle panels. The mean deviation [(wp − wp,true)/wp,true]
773
+ is calculated from 60 mock samples in the same manner
774
+ as [(wp − wp,true)]. Clearly, wps derived using random
775
+ catalogs from the V SDC
776
+ max approach provide a mostly un-
777
+ biased estimate of the genuine projected 2PCFs for both
778
+ LC1 and LC2 samples in both no k + e correction case
779
+ (Figure 4) and simple k + e correction case (Figure 5).
780
+ The 1σ deviations among 60 samples for the V SDC
781
+ max ap-
782
+
783
+ 8
784
+ Yang et al.
785
+ Figure 1. In the case of no k + e correction, a comparison of the radial distributions of one LC sample and its corresponding
786
+ random catalogs. The bin size is ∆d = 5 h−1Mpc. The LC samples have a flux cut at mr = [15, 17] and two luminosity cuts
787
+ at M 0.1
788
+ r
789
+ = [−19, −22] (left panels) and M 0.1
790
+ r
791
+ = [−20, −23] (right panels). The black histogram denotes galaxy distribution.
792
+ Random catalogs generated by the n(z)true method, the V SDC
793
+ max
794
+ method, the V DC
795
+ max method, the Vmax method, and the shuffled
796
+ method are represented by the green line, the blue line, the purple dashed line, the red line, and the yellow line, respectively.
797
+ The second row of panels displays the number bias ∆g in each bin of the random catalogs compared to the galaxies, calculated
798
+ as ∆g = (nr − ng)/ng. The third row of panels displays the number bias of random catalogs compared to n(z)true, which is
799
+ defined as ∆ntrue = (nr − nr,true)/nr,true.
800
+ Figure 2. The same as Figure 1 but for the simple k + e correction case of LC samples.
801
+
802
+ 4000-
803
+ Galaxies
804
+ ntrue
805
+ Vmax
806
+ 4000
807
+ VSDC
808
+ Shuffled
809
+ 3000
810
+ max
811
+ 3000
812
+ Number
813
+ mr=[15,17]
814
+ 2000
815
+ mr=[15,17]
816
+ 2000
817
+ M9.1=[-19,-22]
818
+ M9.1=[-20, -23]
819
+ 1000
820
+ 1000
821
+ No k + e corrections
822
+ 0
823
+ 0-
824
+ 100
825
+ 200
826
+ 400
827
+ 500
828
+ 100
829
+ 400
830
+ 500
831
+ 300
832
+ 200
833
+ 300
834
+ 600
835
+ 0.5
836
+ 0.5
837
+ 0.0
838
+ -0.5
839
+ -0.5
840
+ 100
841
+ 200
842
+ 400
843
+ 500
844
+ 100
845
+ 200
846
+ 400
847
+ 600
848
+ 300
849
+ 300
850
+ 500
851
+ 0.1
852
+ 0.1
853
+ 0.0
854
+ 0.0
855
+ -0.1
856
+ -0.1
857
+ 200
858
+ 300
859
+ 400
860
+ 500
861
+ 100
862
+ 200
863
+ 400
864
+ 500
865
+ 600
866
+ 100
867
+ 300
868
+ d h-1Mpc
869
+ d h-1MpcGalaxies
870
+ VDC
871
+ max
872
+ 4000
873
+ ntrue
874
+ Vmax
875
+ 3000
876
+ VSDC
877
+ Shuffle
878
+ max
879
+ 3000
880
+ Number
881
+ 2000
882
+ mr=[15,17]
883
+ mr=[15,17]
884
+ 2000
885
+ M9.1=[-20,-23]
886
+ M9.1 =[-19, -22]
887
+ 1000
888
+ 1000
889
+ Simple k + e corrections
890
+ 0
891
+ 0
892
+ 100
893
+ 200
894
+ 400
895
+ 500
896
+ 400
897
+ 500
898
+ 300
899
+ 100
900
+ 200
901
+ 300
902
+ 600
903
+ 0.5
904
+ 0.5
905
+ 0.0
906
+ 0.0
907
+ 0.5
908
+ 0.5-
909
+ 200
910
+ 400
911
+ 500
912
+ 100
913
+ 500
914
+ 600
915
+ 100
916
+ 300
917
+ 200
918
+ 300
919
+ 400
920
+ 0.1
921
+ 0.1
922
+ Itrue
923
+ 0.0
924
+ 0.0
925
+ -0.1
926
+ -0.1
927
+ 200
928
+ 300
929
+ 100
930
+ 400
931
+ 500
932
+ 100
933
+ 200
934
+ 400
935
+ 500
936
+ 600
937
+ 300
938
+ d h-1Mpc
939
+ d h-1MpcThe smoothed Vmax method
940
+ 9
941
+ Figure 3. The same as Figure 1 but for the LS1 samples.
942
+
943
+ All
944
+ Blue
945
+ Red
946
+ 6000
947
+ Vmax
948
+ Galaxies
949
+ 2000-
950
+ 3000
951
+ ntrue
952
+ Shuffle
953
+ VDC
954
+ 1500-
955
+ max
956
+ 2000
957
+ 1000-
958
+ 2000
959
+ 1000
960
+ Imr=[15,17]
961
+ 500
962
+ M9.1 =[-19, - 22]
963
+ 0 -
964
+ 0-
965
+ 0
966
+ 200
967
+ 400
968
+ 600
969
+ 200
970
+ 800
971
+ 400
972
+ 600
973
+ 800
974
+ 200
975
+ 400
976
+ 600
977
+ 800
978
+ 0.5
979
+ 0.5-
980
+ 0.5
981
+ 0.0
982
+ 0.0
983
+ 0.5
984
+ -0.5-
985
+ -0.5
986
+ 600
987
+ 600
988
+ 600
989
+ 200
990
+ 400
991
+ 800
992
+ 200
993
+ 400
994
+ 800
995
+ 200
996
+ 400
997
+ 800
998
+ 0.2
999
+ 0.2
1000
+ 0.2
1001
+ NM
1002
+ 0.1
1003
+ 0.1
1004
+ 0.1
1005
+ 0.0
1006
+ 0.0
1007
+ 0.0
1008
+ N
1009
+ K
1010
+ -0.1
1011
+ -0.1-
1012
+ -0.1-
1013
+ -0.2
1014
+ -0.2
1015
+ -0.2
1016
+ 200
1017
+ 400
1018
+ 600
1019
+ 800
1020
+ 200
1021
+ 400
1022
+ 600
1023
+ 800
1024
+ 200
1025
+ 400
1026
+ 600
1027
+ 800
1028
+ d h-1Mpc
1029
+ d h-1Mpc
1030
+ d h-1Mpc10
1031
+ Yang et al.
1032
+ Figure 4. Top panels: The average projected correlation functions wp for LC1 (left panel) and LC2 (right panel) samples in
1033
+ the case of no k + e corrections. LC1 samples have a flux-cut at mr = [15, 17] and a luminosity cut at M 0.1
1034
+ r
1035
+ = [−19, −22]. LC2
1036
+ samples have the same flux-cut as LC1 samples but a brighter luminosity cut at M 0.1
1037
+ r
1038
+ = [−20, −23]. The solid black points
1039
+ with error bars represent the wp,true and 1σ dispersion across 60 LS samples utilizing random catalogs generated by the ntrue
1040
+ approach. wp of the V SDC
1041
+ max
1042
+ method, V DC
1043
+ max method, Vmax method, and shuffled technique are shown by the blue dashed lines,
1044
+ the green dotted line, the red long-dashed lines, and the orange lines, respectively. Middle panels: The average deviations
1045
+ from wp,true for various techniques of assigning redshifts to random catalogs, as determined by wp of 60 LC samples. The blue
1046
+ open rolls with error bars represent the mean offset and 1σ deviations of wp for the V SDC
1047
+ max technique. The results of the Vmax
1048
+ technique are displayed as open red squares with error bars. The mean offsets computed from wp for the V DC
1049
+ max and shuffled
1050
+ methods are shown by green dashed lines and a yellow open diamond, accordingly. The gray lines represent the 1σ dispersion
1051
+ of wp,true among 60 LC samples. The horizontal dashed black lines indicate the zero offset. Bottom panels: The average bias
1052
+ of wp relative to wp,true for four radial selection models, defined as [(wp − wp,true)/wp,true]. The color-coded lines and symbols
1053
+ are identical to those in the middle panels.
1054
+ proach (blue error bars) are significantly smaller than
1055
+ those for the Vmax method (red error bars). For LC1
1056
+ samples in both k + e correction cases, the Vmax ap-
1057
+ proach underestimates wp by less than 1%, and this bias
1058
+ worsens as scale grows. At rp ∼ 30h−1Mpc, the bias
1059
+ reaches 13% with a substantial variance 8. For LC2 sam-
1060
+ 8 This bias is marginally less than the 20% bias found for the Vmax
1061
+ approach by Paper I. This may be owing to the increase in the
1062
+ number of galaxies in the samples, as the LC samples cover twice
1063
+ as much sky as the flux-limited samples in Paper I.
1064
+ ples, the measurement accuracies for both the V SDC
1065
+ max and
1066
+ Vmax methods are equivalent at scale rp ≲ 4h−1Mpc for
1067
+ both methods. On a larger scale, deviation of the Vmax
1068
+ method grows to 4%, but remains within the margin of
1069
+ error.
1070
+ These discrepancies in wp from wp,true for the
1071
+ Vmax model are mostly attributable to density fluctua-
1072
+ tions in galaxy samples. wps measured using random
1073
+ catalogs from the V DC
1074
+ max approach are overestimated at
1075
+ scale rp ≲ 2h−1Mpc and underestimated at larger scales
1076
+ for both LC1 and LC2 samples as shown in the bottom
1077
+ panels (green dashed lines) of Figure 4 and Figure 5. As
1078
+
1079
+ 103
1080
+ No k + e corrections
1081
+ mr = [15,17]
1082
+ mr = [15, 17]
1083
+ M0.1 = [-19, -22]
1084
+ Mo.1 = [-20, -23]
1085
+ 102
1086
+ 10-
1087
+ ntrue
1088
+ Vmax
1089
+ dm
1090
+ VSDC
1091
+ ShufHed
1092
+ max
1093
+ 100
1094
+ VDC
1095
+ max
1096
+ 8
1097
+ dm
1098
+ true
1099
+ -8
1100
+ 0.05
1101
+ 0.00
1102
+ 'dm
1103
+ -0.05
1104
+ _dm.
1105
+ -0.10
1106
+
1107
+ Vmax
1108
+ VSDC
1109
+ 0
1110
+ max
1111
+ Shuffed
1112
+ VDC
1113
+ max
1114
+ -0.15
1115
+ 10
1116
+ 100
1117
+ 101
1118
+ 10°
1119
+ 100
1120
+ 101
1121
+ Tp (h-1Mpc)
1122
+ p (h-1Mpc)The smoothed Vmax method
1123
+ 11
1124
+ Figure 5. The same as Figure 4 but for the LC samples with a simple k + e corrections.
1125
+ seen in Figure 1 and Figure 2, this tendency of deviation
1126
+ is the result of small fluctuations in the radial distribu-
1127
+ tion of the random catalog generated by the V DC
1128
+ max model.
1129
+ In essence, the fluctuations increase the number of RR
1130
+ pairs at the fluctuation-scale, resulting in an underes-
1131
+ timating of wp. Due to the integral constraint effect,
1132
+ a small-scale overestimation of wp is unavoidable. Af-
1133
+ ter smoothing out the fluctuations, the V SDC
1134
+ max approach
1135
+ yields estimates that are almost unbiased of wp,true. The
1136
+ results of the shuffled technique are consistent with Pa-
1137
+ per I, which shows that an underestimating of wp grows
1138
+ as the scale increases.
1139
+ Due to the severe deviations of wps for the V DC
1140
+ max model
1141
+ in the tests using LC samples, the following compari-
1142
+ son for LS samples will focus on testing for the V SDC
1143
+ max
1144
+ method, Vmax method, and shuffled method. Figure 6
1145
+ and Figure 7 display comparison results for LS sam-
1146
+ ples with the two luminosity-cuts, respectively.
1147
+ The
1148
+ left, middle, and right panels, respectively, present wp
1149
+ comparisons for luminosity-dependent samples and their
1150
+ blue and red subsamples. From 10 mock galaxy samples,
1151
+ the mean wp, [wp − wp,true], [(wp − wp,true)/wp,true] are
1152
+ calculated (from top to bottom panels).
1153
+ The ntrue
1154
+ method, the V SDC
1155
+ max method, the Vmax method, and the
1156
+ shuffled method all utilize the same color-coded lines
1157
+ and symbols as those used for figures of LC samples.
1158
+ For the LS1 samples in Figure 6, the V SDC
1159
+ max model pro-
1160
+ duces tiny wp offsets from wp,true, which are consistent
1161
+ with the findings for LC samples.
1162
+ Significant offsets
1163
+ are seen for the Vmax and shuffled methods, notably
1164
+ for the LS1 samples and their blue subsamples, where
1165
+ the offsets are more than 1σ dispersion of wp,true at
1166
+ rp ≲ 3h−1Mpc scale. The average deviations displayed
1167
+ in the bottom panels clearly demonstrate the superior-
1168
+ ity of the V SDC
1169
+ max
1170
+ approach over the Vmax method and
1171
+ the shuffled method when measuring projected 2PCFs.
1172
+ ∼ 0.5% deviations are detected for both LS1 samples
1173
+ and their color-dependent subsamples, which is essen-
1174
+ tially within the 1σ error margin.
1175
+ For the Vmax ap-
1176
+ proach, [(wp − wp,true)/wp,true]s deviate by 6%, 5%, and
1177
+ 9% for LS1 samples, blue subsamples, and red subsam-
1178
+ ples, respectively, which are considerably larger than 1σ
1179
+ errors.
1180
+ At rp ≲ 10h−1Mpc, the mean deviations for
1181
+ the shuffled approach are marginally better than those
1182
+
1183
+ 103
1184
+ Simple k + e corrections mr = [15, 17]
1185
+ mr = [15,17]
1186
+ M0.1 = [-19, -22]
1187
+ M0.1 = [-20, -23]
1188
+ 102
1189
+ 10-
1190
+ Vmax
1191
+ dm
1192
+ ntrue
1193
+ VSDC
1194
+ ShufHed
1195
+ max
1196
+ 100
1197
+ VDC
1198
+ max
1199
+ 8
1200
+ true
1201
+ -8
1202
+ 0.05
1203
+ 0.00
1204
+ 'dm
1205
+ -0.05
1206
+ dm.
1207
+ -0.10
1208
+ Vmax
1209
+ VSDC
1210
+
1211
+ 0
1212
+ max
1213
+ Shuffed
1214
+ VDC
1215
+ max
1216
+ -0.15
1217
+ 10
1218
+ 100
1219
+ 101
1220
+ 100
1221
+ 10°
1222
+ 101
1223
+ rp (h-1Mpc)
1224
+ p (h-1Mpc)12
1225
+ Yang et al.
1226
+ Figure 6. Similar to Figure 4: comparison of wp for LS1 samples (left panels) and their blue (middle panels) and red (right
1227
+ panels) subsamples. The color-coded lines and symbols are identical to those in Figure 4, excluding the result of the V DC
1228
+ max
1229
+ technique.
1230
+ for the Vmax method, but worsen as the scale increases,
1231
+ which is consistent with the test results for LC samples.
1232
+ Figure 7 presents a comparison of wps for the LS2 sam-
1233
+ ples. The offsets from wp,true for the V SDC
1234
+ max
1235
+ technique
1236
+ are roughly comparable with the LS1 sample results.
1237
+ wps measured using random catalogs from the Vmax ap-
1238
+ proach exhibits large offsets from wp,true that are worse
1239
+ than the offsets for the shuffled method on small scales,
1240
+ particularly for LS2 samples (left middle panel) and red
1241
+ subsamples (right middle panel). In the bottom pan-
1242
+ els of Figure 7, the accuracy of measurement for three
1243
+ models is shown clearly. At scale rp < 1h−1Mpc, there
1244
+ is a ∼ 0.5% underestimate for the LS2 samples (bottom
1245
+ left panel). At a larger scale, this deviation becomes an
1246
+ overestimation, reaching 2% at rp ∼ 30h−1Mpc while
1247
+ being within the margin of error. The mean deviations
1248
+ for the blue and red subsamples are well constrained
1249
+ within 1%. The results of the Vmax approach exhibit
1250
+ larger mean deviations than the LS1 samples, which are
1251
+ even worse than the results of the shuffled method. The
1252
+ deviations for LS2 samples, blue subsamples, and red
1253
+ subsamples are roughly 9%, 8%, and 10%, respectively.
1254
+ wps determined for red subsamples exhibit more severe
1255
+ departures from wp,true for the Vmax technique for both
1256
+ LS1 and LS2 samples, demonstrating density fluctua-
1257
+ tions have a greater impact on clustering determination
1258
+ for red galaxies.
1259
+ To better quantify the measurement accuracy of pro-
1260
+ jected 2PCF for various radial selection models, we cal-
1261
+ culate the χ2 between wp and wp,true for the V SDC
1262
+ max tech-
1263
+ nique, the Vmax method, and the shuffled method, re-
1264
+ spectively, as shown in Table 1. χ2 is computed as fol-
1265
+ lows:
1266
+ χ2 =
1267
+ N
1268
+
1269
+ i=0
1270
+ (wi
1271
+ p − wp,true)2
1272
+ σ2
1273
+ true
1274
+ .
1275
+ (11)
1276
+ The number of mock samples N is 60 for LC samples
1277
+ and 10 for LS samples. For the LC samples, with the
1278
+ exception of the LC2 samples with simple k + e correc-
1279
+ tions for which χ2s of the V SDC
1280
+ max method and the Vmax
1281
+
1282
+ 103
1283
+ mr = [15, 17]
1284
+ Blue subsamples
1285
+ Red subsamples
1286
+ (h-1Mpc)
1287
+ M0.1
1288
+ =「19,—22]
1289
+ 102
1290
+ FLLL
1291
+ ntrue
1292
+ dm
1293
+ VSDC
1294
+ max
1295
+ 101
1296
+ Shuffled
1297
+ 60
1298
+ ToI
1299
+ VSDC
1300
+ ShufHed
1301
+ max
1302
+ 40
1303
+ Vmax
1304
+ Otrue
1305
+ 20
1306
+ 0
1307
+
1308
+
1309
+
1310
+
1311
+ dm
1312
+ -20
1313
+ T
1314
+ 40
1315
+ ?
1316
+ 0.89
1317
+ 0.00 -
1318
+ -0.02
1319
+ ant'dm.
1320
+ -0.04
1321
+ anut'dm
1322
+ -0.06
1323
+ _dm.
1324
+ -0.08
1325
+ -0.10
1326
+ -0.12
1327
+ 100
1328
+ 101
1329
+ 10
1330
+ 100
1331
+ 101
1332
+ 10-
1333
+ 100
1334
+ 10-
1335
+ -1
1336
+ 101
1337
+ rp (h-1Mpc)
1338
+ Tp (h-1Mpc)
1339
+ rp (h-1Mpc)The smoothed Vmax method
1340
+ 13
1341
+ Figure 7.
1342
+ The same as Figure 6 but for LS2 samples (left panels) and their blue (middle panels) and red (right panel)
1343
+ subsamples.
1344
+ method are essentially equal, wps of the V SDC
1345
+ max method
1346
+ exhibit the least χ2 from wp,true when compared to other
1347
+ two models. For all LS samples and their blue and red
1348
+ subsamples, the V SDC
1349
+ max approach also yields the least χ2
1350
+ among three methods. The χ2 values for the LS sam-
1351
+ ples are greater than those for the LC samples for all
1352
+ three models. This may probably due to the fact that
1353
+ the LS samples built from a lightcone catalog contain
1354
+ more complicated k + e corrections than LC samples.
1355
+ On the basis of the preceding figures and χ2 tests, we
1356
+ demonstrate that wps measured using the random cata-
1357
+ logs generated by the V SDC
1358
+ max approach result in the least
1359
+ deviation from wp,true for both flux-limited samples and
1360
+ their color-dependent subsamples. In Section 5, we pro-
1361
+ vide more discussion on the performance of the radial
1362
+ selection models for LC and LS samples
1363
+ 4.2.3. Comparison of the redshift-space 2PCFs
1364
+ The redshift-space correlation functions are compared
1365
+ in the same manner as wp for both the LC and LS sam-
1366
+ ples, and the results for different radial selection models
1367
+ Table 1. χ2 of the projected 2PCFs for the mock samples
1368
+ Samples
1369
+ χ2
1370
+ V SDC
1371
+ max
1372
+ Vmax
1373
+ Shuffled
1374
+ LC1(no k + e)
1375
+ 1.364
1376
+ 6.264
1377
+ 107.225
1378
+ LC2(no k + e)
1379
+ 1.460
1380
+ 4.254
1381
+ 62.329
1382
+ LC1(simple k + e)
1383
+ 3.531
1384
+ 6.351
1385
+ 108.770
1386
+ LC2(simple k + e)
1387
+ 2.757
1388
+ 2.667
1389
+ 106.466
1390
+ LS1
1391
+ 1.893
1392
+ 1618.495
1393
+ 977.362
1394
+ LS1 (blue)
1395
+ 33.013
1396
+ 161.187
1397
+ 124.543
1398
+ LS1 (red)
1399
+ 19.525
1400
+ 2769.991
1401
+ 1988.678
1402
+ LS2
1403
+ 45.168
1404
+ 3416.047
1405
+ 857.843
1406
+ LS2 (blue)
1407
+ 63.572
1408
+ 925.400
1409
+ 240.416
1410
+ LS2 (red)
1411
+ 71.431
1412
+ 5054.464
1413
+ 1562.508
1414
+ are generally consistent with the comparisons for wps in
1415
+ the previous section. The mean ξ0, [ξ0 − ξ0,true], and
1416
+ [(ξ0 − ξ0,true)/ξ0,true] for LC samples with simple k + e
1417
+ corrections are shown in Figure 8, from top to bottom,
1418
+
1419
+ 103
1420
+ mr = [15, 17]
1421
+ Blue subsamples
1422
+ Red subsamples
1423
+ (h-1Mpc)
1424
+ M0.1
1425
+ =「—20,—23]
1426
+ 102
1427
+ ntrue
1428
+ dm
1429
+ VSDC
1430
+ max
1431
+ 101
1432
+ ShufHed
1433
+ 60
1434
+ ToI
1435
+ VSDC
1436
+ ShufHed
1437
+ max
1438
+ 40
1439
+ Vmax
1440
+ true
1441
+ 20
1442
+ 0
1443
+ LOHO
1444
+ OHOO
1445
+ Ol
1446
+
1447
+ dm
1448
+
1449
+
1450
+ -40
1451
+ TOI
1452
+ -60
1453
+ 0.02
1454
+ 0.00 .
1455
+ -
1456
+ 0.02
1457
+ nf'dm
1458
+ -0.04
1459
+ ut'dm
1460
+ -0.06
1461
+ dm.
1462
+ -0.08
1463
+ -0.10
1464
+ -0.12
1465
+ 100
1466
+ 101
1467
+ 10
1468
+ 100
1469
+ 101
1470
+ 10-
1471
+ 100
1472
+ 10-
1473
+ 101
1474
+ rp (h-1Mpc)
1475
+ Tp (h-1Mpc)
1476
+ rp (h-1Mpc)14
1477
+ Yang et al.
1478
+ Figure 8. Similar to Figure 4, a comparison of ξ0s for the redshift-space 2PCFs of LC1 samples (left panels) and LC2 samples
1479
+ (right panels) with simple k + e corrections.
1480
+ respectively. Estimates of ξ0 derived from random cata-
1481
+ logs created by the V SDC
1482
+ max approach display the smallest
1483
+ offsets and deviations from ξ0,true for both LC1 (left
1484
+ panels) and LC2 (right panels) samples. For the V DC
1485
+ max
1486
+ technique, ξ0s at scale rp < 1h−1Mpc exhibit large off-
1487
+ sets and deviations compared to the findings of wp. For
1488
+ the Vmax method, ξ0 deviations are marginally attenu-
1489
+ ated compared to the results of wp, indicating that the
1490
+ impact of density fluctuations on clustering is less signif-
1491
+ icant in redshift space. The ξ0s for the shuffled approach
1492
+ exhibit the same offsets and deviations from ξ0,true as
1493
+ wp. As the results of LC samples without k + e correc-
1494
+ tions are similar to Figure 8, they are omitted here.
1495
+ Figure 9 illustrates a comparison of ξ0 for LS1 samples
1496
+ (left panels), their blue (middle panels), and red (right
1497
+ panels) subsamples, respectively. Compared to the Vmax
1498
+ and shuffled methods, the V SDC
1499
+ max approach produces the
1500
+ least offsets and deviations from ξ0,true for LS1 samples
1501
+ and red subsamples. For the blue subsamples, the V SDC
1502
+ max
1503
+ method’s mean offset at s ∼ 0.07h−1Mpc is slightly
1504
+ larger than the Vmax method’s mean offset, and both
1505
+ approaches have comparable deviations at that scale.
1506
+ This is not a worry because the amount of uncertainty
1507
+ at this scale is also high due to the shot noise. In general
1508
+ on ξ0 measurements, the V SDC
1509
+ max
1510
+ technique continues to
1511
+ outperform the other two radial selection models. Since
1512
+ the findings of LS2 samples are basically consistent to
1513
+ Figure 9, they are also excluded here.
1514
+ In Figure 10, the average 2D correlation functions
1515
+ ξ(rp, π) for LS samples are presented. ξ(rp, π)s for LS1
1516
+ samples (left panel), blue subsamples (middle panel),
1517
+ and red samples (right panel) are displayed in the up-
1518
+ per panels. ξ(rp, π)s for the ntrue method, the V SDC
1519
+ max
1520
+ method, the Vmax method, and the shuffled method are
1521
+ represented by black solid lines, blue dashed lines, red
1522
+ dashed lines, and yellow dashed lines, respectively. The
1523
+ 1σtrue dispersion of ξtrue(rp, π) among 10 mock samples
1524
+ is denoted by dotted gray lines in places with shading.
1525
+ ξ(rp, π)s of the V SDC
1526
+ max model provide the best agreement
1527
+ with ξtrue(rp, π) for LS1 samples and color-dependent
1528
+ subsamples. For ξ(rp, π) of the Vmax method and the
1529
+ shuffled method, there are offsets of varying degrees;
1530
+ yet, the offsets stay within the 1σtrue error margins;
1531
+ however, the contour shapes are altered. In the lower
1532
+ panels displaying ξ(rp, π)s for LS2 samples, the major-
1533
+ ity of contours for the V SDC
1534
+ max model are consistent with
1535
+ ξtrue(rp, π). 1% ∼ 2% deviations seen in wp (bottom left
1536
+ panel in Figure 7) for both LS2 samples and blue sub-
1537
+ samples are also observed in contours at large scale. For
1538
+ the Vmax technique and the shuffled method, the offsets
1539
+ in the ξ(rp, π) contours are close to the error margins
1540
+ of 1σtrue; thus, the contour shapes are altered as well.
1541
+
1542
+ 102
1543
+ mr = [15, 17]
1544
+ mr = [15, 17]
1545
+ M0.1 = [-19, -22]
1546
+ M0.1
1547
+ =「—20,23]
1548
+ 101
1549
+ Simple k + e corrections
1550
+ 100
1551
+ ntrue
1552
+ VSDC
1553
+ ShufHed
1554
+ max
1555
+ VDC
1556
+ max
1557
+ 10-2
1558
+ Tol
1559
+ VSDC
1560
+ 5
1561
+ ShufHed
1562
+ max
1563
+ VDC
1564
+ true
1565
+ max
1566
+ -5
1567
+ 0.05
1568
+ 0.00
1569
+ 50.
1570
+ -0.05
1571
+ So,
1572
+ -0.10
1573
+ -0.15
1574
+ 10
1575
+ 100
1576
+ 101
1577
+ 100
1578
+ 101
1579
+ 10
1580
+ s (h-1Mpc)
1581
+ s (h-1Mpc)The smoothed Vmax method
1582
+ 15
1583
+ Figure 9. Similar to Figure 6, a comparison of ξ0s for the redshift-space 2PCFs of LS1 samples (left panels) and their blue
1584
+ (middle panels) and red (right panels) subsamples.
1585
+ Since the comparisons for LC samples are substantially
1586
+ identical to those in Figure 10, they are excluded here.
1587
+ 5. DISCUSSION
1588
+ Our tests demonstrate that, for flux-limited sample
1589
+ with a redshift-dependent number density n(z), utilizing
1590
+ the random catalog generated by the V SDC
1591
+ max technique to
1592
+ measure galaxy clustering produces the least deviation
1593
+ from the true clustering when compared to the other
1594
+ radial selection methods. Some aspects of the perfor-
1595
+ mance of the V SDC
1596
+ max technique remain to be clarified and
1597
+ discussed, as detailed below.
1598
+ 5.1. The impact of smoothness parameters on
1599
+ clustering estimation
1600
+ For the V SDC
1601
+ max
1602
+ approach, we add a smoothing step
1603
+ to eliminate the unanticipated small fluctuations in the
1604
+ redshift distribution of the cloned random galaxies gen-
1605
+ erated by the V DC
1606
+ max method.
1607
+ Previous comparison of
1608
+ 2PCFs for the V SDC
1609
+ max
1610
+ and V DC
1611
+ max methods demonstrate
1612
+ the necessity of a smooth procedure for random catalog
1613
+ in order to produce a nearly unbiased clustering mea-
1614
+ surement for flux-limited sample.
1615
+ Smoothing requires
1616
+ a selection of histogram bin size ∆d and smooth box
1617
+ size ∆smooth.
1618
+ To determine the effect of varying ∆d
1619
+ and ∆smooth values on the final galaxy clustering de-
1620
+ termination, we vary these two smoothness parameters
1621
+ and regenerate random catalogs to perform the estimate.
1622
+ First, we set ∆d = 5h−1Mpc and ∆smooth = 5 as the
1623
+ fiducial case, which we have used for the V SDC
1624
+ max
1625
+ tech-
1626
+ nique in previous tests in Section 4.2. Second, we chose
1627
+ ∆d = 2.5h−1Mpc and 10h−1Mpc for histogram bin size,
1628
+ with ∆smooth = 5 set to smooth.
1629
+ Thirdly, we select
1630
+ ∆smooth = 3 and 7 for smooth with ∆d = 5h−1Mpc
1631
+ set.
1632
+ Figure 11 displays the average deviations of wp
1633
+ from wp,true for random catalogs created by the V SDC
1634
+ max
1635
+ technique with various ∆d and ∆smooth values. To sim-
1636
+ plify the assessment, we just test the projected 2PCFs
1637
+ of the LC samples here. In the absence of k + e correc-
1638
+ tions, the upper panels of Figure 11 depict the mean
1639
+ deviations of wp for the LC1 (left panel) and LC2
1640
+ (right panel) samples, respectively. We see that a finer
1641
+
1642
+ Blue subsamples
1643
+ Red subsamples
1644
+ mr = [15, 17]
1645
+ EELL
1646
+ M0.1
1647
+ =「-19,-22]
1648
+ 101
1649
+ LLL
1650
+ ntrue
1651
+ 100
1652
+ VSDC
1653
+ max
1654
+ 10-1
1655
+ Shuffled
1656
+ ToI
1657
+ VSDC
1658
+ ShufHed
1659
+ 10 -
1660
+ max
1661
+ Vmax
1662
+ Otrue
1663
+ 5
1664
+ 0
1665
+ Y
1666
+
1667
+
1668
+
1669
+
1670
+
1671
+
1672
+
1673
+ -5
1674
+ -10
1675
+ 0.03
1676
+ 0.00
1677
+ -0.03
1678
+ Eo,tr
1679
+ -0.06
1680
+ -0.09
1681
+ -0.12
1682
+ 100
1683
+ 101
1684
+ 10-
1685
+ 10
1686
+ 100
1687
+ 101
1688
+ 10-
1689
+ 100
1690
+ 101
1691
+ s (h-1Mpc)
1692
+ s (h-1Mpc)
1693
+ s (h-1Mpc)16
1694
+ Yang et al.
1695
+ Figure 10. Comparison of the average 2D correlation function ξ(rp, π) for the luminosity-dependent flux-limited samples. The
1696
+ L1-C1 sample, the L2-C1 sample, and the L3-C1 sample are shown from top to bottom accordingly, their blue/red subsamples
1697
+ are shown in the middle and right panels in each row. Here, ξ(rp, π) is the averaged ξ(rp, π) among 60 mock samples. The
1698
+ true ξ(rp, π) measured using the random catalog from the n(z)true method is in the black contour. The gray shaded region
1699
+ with dotted lines mark the 1σ scatter of the true ξ(rp, π) among 60 mock samples. The yellow, red, and blue dashed contours
1700
+ denote the ξ(rp, π) of the shuffled method, Vmax method, and the V SDC
1701
+ max method, respectively. The contour levels from outside-in
1702
+ correspond to ξ(rp, π) = [0.1, 0.2, 0.3, 0.5, 1.0, 2.0, 5.0]. The middle column and right column panels show the comparison of the
1703
+ blue/red subsamples
1704
+ value of ∆d = 2.5h−1Mpc (green dashed lines) and
1705
+ ∆smooth = 3 (light blue lines) lead to a constant drop
1706
+ of [(wp − wp,true)/wp,true] on all test scales, resulting
1707
+ in reduced deviations at rp ≲ 2h−1Mpc and an un-
1708
+ derestimate on a larger scale, especially for LC1 sam-
1709
+ ples. In contrast, a coarser size of ∆smooth = 7 (orange
1710
+ long-dashed lines) results in an overall increase relative
1711
+ to the mean deviation in fiducial case (open blue rolls
1712
+ with error bars), resulting in an overestimation at scale
1713
+ rp ≲ 20h−1Mpc. A coarser size of ∆d = 10h−1Mpc (yel-
1714
+ low short-dashed lines) leads in a ∼ 1% increase in the
1715
+ mean deviation of wp relative to the deviation in fiducial
1716
+ case; this is the only mean deviation that exceeds the
1717
+ 1σ errors but is still around ∼ 1%. In the lower panels,
1718
+ the test results for LC samples with simple k +e correc-
1719
+ tions are displayed, which are essentially identical to the
1720
+ findings in the above panels, suggesting that the smooth
1721
+ process is insensitive to galaxy samples when different
1722
+ k + e corrections are applied. Our tests indicate that
1723
+ the variation of ∆d and ∆smooth in the smooth process
1724
+ of the V SDC
1725
+ max technique affects the accuracy of clustering
1726
+ measurement, however the effect on deviations is much
1727
+ less than 1%. The advantage of the V SDC
1728
+ max technique over
1729
+ other radial selection models still stands.
1730
+ 5.2. Difference in clustering uncertainty
1731
+ In prior tests, the uncertainties in clustering devia-
1732
+ tions among 60 LC samples are significantly larger than
1733
+ the uncertainties in 10 LS samples, which is not expected
1734
+ intuitively. In addition, the deviation uncertainties for
1735
+ the V SDC
1736
+ max approach are approximately a fourth of those
1737
+ for the Vmax method in LC samples. As seen in Fig-
1738
+ ure 12, we further investigate the radial distribution of
1739
+ the LC and LS samples in order to determine the prob-
1740
+ able distinct drivers of these discrepancies.
1741
+ Here, we
1742
+ take into account the LC samples without k + e correc-
1743
+ tions and the LS1 samples, which are sufficient to ex-
1744
+ plain the difference in uncertainty. Firstly, we compute
1745
+ the normalized radial distribution for galaxy samples
1746
+ and random catalogs created using the n(z)true method,
1747
+ the V SDC
1748
+ max
1749
+ method, and the Vmax method, respectively.
1750
+
1751
+ 501
1752
+ 50 于
1753
+ 50
1754
+ mr = [15, 17]
1755
+ ntrue
1756
+ 45
1757
+ 45
1758
+ 45.
1759
+ Mo.1 =[-19,-22]
1760
+ Otrue
1761
+ Blue subsamples
1762
+ Red subsamples
1763
+ 40
1764
+ 40
1765
+ 40
1766
+ VSDC
1767
+ max
1768
+ 35
1769
+ 35
1770
+ 35
1771
+ Vmax
1772
+ 1Mpc)
1773
+ 30
1774
+ 30
1775
+ 30
1776
+ ShufHed
1777
+ C
1778
+ 25
1779
+ 25
1780
+ 25
1781
+ s
1782
+ 20
1783
+ 20
1784
+ 20
1785
+ 15
1786
+ 15
1787
+ 15
1788
+ 10
1789
+ 10
1790
+ 5
1791
+ 5
1792
+ 5
1793
+ 0
1794
+ 0:
1795
+ ¥40 45 50
1796
+ 5
1797
+ 10 15 20 25 30 35
1798
+ 0
1799
+ 30 35 40 45 50
1800
+ 20 25 30 35 40 45 50
1801
+ 0
1802
+ 5
1803
+ 10 15
1804
+ 20
1805
+ ¥25
1806
+ 0
1807
+ 1015
1808
+ 5
1809
+ 50于
1810
+ 50
1811
+ mr = [15, 17]
1812
+ 45
1813
+ 45
1814
+ 45
1815
+ M0.1 = [-20,-23]
1816
+ 40
1817
+ 40
1818
+ 40
1819
+ 35
1820
+ 35
1821
+ 35
1822
+ 30
1823
+ 30
1824
+ 30
1825
+ 25
1826
+ 25
1827
+ 25
1828
+ 20
1829
+ 20
1830
+ 20
1831
+ 15
1832
+ 15
1833
+ 15
1834
+ 10
1835
+ 10
1836
+ 10
1837
+ 5
1838
+ 5
1839
+ 1
1840
+ 01
1841
+ 0
1842
+ 0
1843
+ 5
1844
+ 10 15
1845
+ 20
1846
+ 25
1847
+ 3035
1848
+ 404550
1849
+ 5
1850
+ 10
1851
+ 15
1852
+ 20
1853
+ 25
1854
+ 30
1855
+ 4045
1856
+ 50
1857
+ 0
1858
+ 1015
1859
+ 2025
1860
+ 3035
1861
+ 404550
1862
+ 0
1863
+ 35
1864
+ Tp (h-1Mpc)
1865
+ Tp (h-1Mpc)
1866
+ rp (h-1Mpc)The smoothed Vmax method
1867
+ 17
1868
+ Figure 11. The average deviations of wp from wp,true for the V SDC
1869
+ max
1870
+ method, in which alternative histogram bin sizes and
1871
+ smooth box sizes are adopted in the smooth process in order to assess the impact of multiple choices on clustering estimation.
1872
+ The fiducial bin size and smooth box size used in Section 4.2 are ∆d = 5h−1Mpc and ∆smooth = 5, respectively, as indicated
1873
+ by the open blue circles with error bars. The alternate histogram bin sizes are ∆d = 2.5h−1Mpc and ∆d = 10h−1Mpc , with
1874
+ the same smooth box size as the fiducial one, as indicated by the green dashed lines and the light blue lines, respectively. The
1875
+ alternate smooth box sizes are ∆smooth = 3 and ∆smooth = 7, with the same fixed histogram bin size as the fiducial one, as
1876
+ shown by the yellow short-dashed and orange long-dashed lines, respectively. The zero deviation is shown by the horizontal black
1877
+ dashed lines. Upper panels: Tests for the LC1 samples (left panel) and LC2 samples (right panel) for the no k + e correction
1878
+ case. Lower panels: Similar tests for LC1 and LC2 samples to those in the upper panels, but for the simple k + e correction
1879
+ case.
1880
+ To quantify the density fluctuations relative to the true
1881
+ smooth distribution created by n(z)true method, we esti-
1882
+ mate the average deviations ∆ and 1σ variances of these
1883
+ distributions from the genuine normalized distribution
1884
+ for sixty LC samples and ten LS1 samples separately, as
1885
+ shown in Figure 12 from top to bottom.
1886
+ The ∆ and 1σ variance for the galaxy samples are
1887
+ shown by the thick gray line and thin light gray line.
1888
+ For both LC1 (upper panel) and LC2 (middle panel)
1889
+ samples, the variations across sixty individual samples
1890
+ vary greatly, as indicated by 1σ variance, whereas ∆
1891
+ exhibits a relatively small deviation from the true nor-
1892
+ malized distribution. The light yellow and light orange
1893
+ regions denote the locations in which 90 percent and 60
1894
+ percent of the expected random galaxies are likely to
1895
+ be distributed, and we anticipate that the bulk of pairs
1896
+ used to estimate clustering are from 90% region. ∆ (red
1897
+ thick lines) and σ (light red thin lines) of the Vmax tech-
1898
+ nique reveal that this approach corrects the fluctuations
1899
+ in galaxy samples; nonetheless, the imprints of large-
1900
+ scale structures are still discernible. For instance, ∆ for
1901
+ LC1 samples shows a small but observable deviation at
1902
+ 100 ∼ 450h−1Mpc where 90% of galaxies are located.
1903
+ This explains the consistent bias noticed in wp and ξ
1904
+ in previous testing.
1905
+ For LC2 samples, the systematic
1906
+ bias is almost imperceptible, with just a tiny overesti-
1907
+ mation at d ≳ 500h−1Mpc, indicating a clustering bias
1908
+ that has been detected in prior tests.
1909
+ For the V SDC
1910
+ max
1911
+ approach, there are noisy fluctuations in ∆ (blue thick
1912
+ lines) for both LC1 and LC2 samples, indicating that
1913
+ the smooth does not eliminate all noisy fluctuations in
1914
+ radial distribution and there is still room to improve the
1915
+ smooth. Fortunately, these fluctuations are complimen-
1916
+ tary in certain degree, yielding a substantially unbiased
1917
+ measurement for galaxy clustering. We observe that the
1918
+ 1σ errors (light blue thin lines) for the V SDC
1919
+ max approach
1920
+ are less than those for the Vmax method, especially for
1921
+ the LC1 samples at 60% region. This is essentially the
1922
+
1923
+ 0.02
1924
+ No k + e corrections
1925
+ 0.01
1926
+ 0.00
1927
+ _dm
1928
+ -0.01
1929
+ mr = [15, 17]
1930
+ mr = [15, 17]
1931
+ -0.02
1932
+ M0.1 = [-19, -22]
1933
+ Mo.1 = [-20,-23]
1934
+ -0.03
1935
+ 0.02
1936
+ Simple k + e corrections
1937
+ 0.01
1938
+ 0.00
1939
+ dm
1940
+ 0.01
1941
+ VSDC (△d = 5, △smooth = 5)
1942
+ max
1943
+ △d = 10, △smooth = 5
1944
+ -0.02
1945
+ △d = 5, △smooth = 7
1946
+ △d = 2.5, △smooth = 5
1947
+ -0.03
1948
+ 10-1
1949
+ 100
1950
+ 101
1951
+ 100
1952
+ 101
1953
+ rp (h-1Mpc)
1954
+ rp (h-1Mpc)18
1955
+ Yang et al.
1956
+ reason for the substantial difference in uncertainty found
1957
+ between the two techniques for wp and ξ, demonstrating
1958
+ once again that the V SDC
1959
+ max method can more successfully
1960
+ rectify the effect of density fluctuations on individual
1961
+ samples, and thus the clustering estimations converge
1962
+ to the genuine galaxy clustering.
1963
+ As demonstrated in the bottom panel, ∆ for the LS1
1964
+ samples deviates significantly from the genuine distri-
1965
+ bution when compared to the LC samples. By rotating
1966
+ the sky, just 10 LS1 samples are created from a single
1967
+ lightcone catalog. These samples have a significantly re-
1968
+ duced 1σ variance than LC samples, particularly at 60%
1969
+ region. In LS1 samples, the advantage of density cor-
1970
+ rection in the V SDC
1971
+ max approach is exhibited more clearly
1972
+ compared to the Vmax method. Both approaches have
1973
+ equal errors, but the ∆ of the V SDC
1974
+ max method deviates less
1975
+ from the true distribution, resulting in a more accurate
1976
+ clustering measurement. In contrast, the Vmax technique
1977
+ predicts too many random galaxies at d ≲ 400 and fewer
1978
+ galaxies at high d due to strong fluctuations in galaxy
1979
+ samples, hence exhibiting a greater deviation in ∆ in
1980
+ comparison to ∆ of LC samples. This also explains the
1981
+ extremely systematic bias in wp observed for the Vmax
1982
+ approach on all testing scales in earlier tests.
1983
+ Last but not least, the LC samples and LS samples
1984
+ are derived from distinct parent mock catalogs utilizing
1985
+ two simulations with different resolutions and galaxy-
1986
+ halo connection models. Both LC and LS samples are
1987
+ complete at M 0.1
1988
+ r
1989
+ ≤ −18, however the simulation of
1990
+ (Jing 2019) used to generate LC samples has a mass
1991
+ resolution that is an order of magnitude higher than
1992
+ that of MXXL simulation (Angulo et al. 2012), imply-
1993
+ ing that more halo and galaxy structures are resolved
1994
+ in LC samples. Moreover, despite the fact that the LC
1995
+ samples are constructed using a simple galaxy-halo con-
1996
+ nection model with simple k + e corrections, the benefit
1997
+ is that all model parameters are clear and straightfor-
1998
+ ward; hence, the potential deviation and error sources
1999
+ are comprehendible. For LS samples, with a more so-
2000
+ phisticated galaxy evolution and k−correction, the light-
2001
+ cone catalog of Smith et al. (2017) is theoretically closer
2002
+ to actual observation data; the main drawback is a re-
2003
+ stricted number of samples. The test results of these two
2004
+ sample groups demonstrate that either the k + e correc-
2005
+ tions are based on simple or more complex and realistic
2006
+ mock catalogs, the Vmax technique may produce an in-
2007
+ accurate measurement of galaxy clustering, whereas the
2008
+ V SDC
2009
+ max method can always produce an accurate and pre-
2010
+ cise estimate of clustering.
2011
+ 5.3. The effect of k + e corrections on galaxy clustering
2012
+ 6. CONCLUSIONS
2013
+ Figure 12. Top panel: The average deviations ∆ and 1σ er-
2014
+ rors from the radial distribution of random catalog obtained
2015
+ by the n(z)true method. The mean deviation is computed
2016
+ using the equation ∆ = (ni − ni
2017
+ true)/ni
2018
+ true, where ni is the
2019
+ normalized radial distribution of the ith LC1 sample and
2020
+ random catalog produced using the V SDC
2021
+ max
2022
+ and Vmax meth-
2023
+ ods. The ∆ of the LC1 samples is shown by the thick gray
2024
+ lines, while the 1σ errors over 60 samples are represented
2025
+ by the thin gray lines. The thick blue lines and thin light
2026
+ blue lines represent ∆ and errors for the random catalogs
2027
+ generated by the V SDC
2028
+ max
2029
+ technique. The thick red lines and
2030
+ thin light red lines represent the Vmax algorithm. The light
2031
+ yellow and light orange regions indicate the locations of 90%
2032
+ and 60% of galaxies, respectively. Middle panel: Similar to
2033
+ the top panel, it presents the average deviations and errors
2034
+ for LC2 samples and their corresponding random catalogs.
2035
+ Bottom panel: Similar to top panel, it displays the average
2036
+ deviations and errors for LS1 samples and their correspond-
2037
+ ing random catalogs.
2038
+ In this paper, we provide a radial selection model, the
2039
+ V SDC
2040
+ max approach, for generating the redshifts of random
2041
+ catalogs in galaxy two-point statistics that allows for a
2042
+ high level of accuracy and precision in the estimation.
2043
+
2044
+ 0.10.
2045
+ LCl (noke)
2046
+ 0.05
2047
+ Galaxy
2048
+ 0.00
2049
+ nax
2050
+ -0.05
2051
+ 90%
2052
+ -0.10
2053
+ 60%
2054
+ 0.10
2055
+ LC2 (noke)
2056
+ 0.05
2057
+ 0.00
2058
+ -0.05
2059
+ -0.10.
2060
+ 0.2
2061
+ LS1
2062
+ 0.1
2063
+
2064
+ 0.0
2065
+ -0.1-
2066
+ -0.2
2067
+ 100
2068
+ 200
2069
+ 300
2070
+ 400
2071
+ 500
2072
+ 600
2073
+ 700
2074
+ d h-1MpcThe smoothed Vmax method
2075
+ 19
2076
+ This method is an improvement on the density-corrected
2077
+ Vmax method proposed by Cole (2011), and it consists
2078
+ mostly of three modifications: (1) Adding estimate of
2079
+ zmin and expanding the code’s application to a general
2080
+ flux-limited sample; (2) Support for a redshift and color
2081
+ dependent k−correction model applicable to individual
2082
+ galaxies; (3) Adding a smooth step to the output cloned
2083
+ radial distribution of random galaxies. These modifica-
2084
+ tions are crucial for obtaining a smooth radial distribu-
2085
+ tion for a random catalog that is unaffected by galaxy
2086
+ density fluctuations, which is the key to a clustering
2087
+ measure with high precision and accuracy.
2088
+ We measure 2PCFs using two groups of flux-limited
2089
+ samples, designated LC and LS, to validate the V SDC
2090
+ max
2091
+ approach. The flux-limited LC samples are constructed
2092
+ from sixty mock catalogs with two luminosity cuts and
2093
+ two simple k+e correction cases. Using the same sample
2094
+ selection criteria and luminosity thresholds as for the LC
2095
+ samples, ten LS samples are generated using the light-
2096
+ cone catalog of Smith et al. (2017). To test property-
2097
+ dependent clustering, LS samples are subdivided into
2098
+ blue and red subsamples.
2099
+ We compare the projected
2100
+ and redshift-space 2PCFs using random catalogs cre-
2101
+ ated from the ntrue method, the V SDC
2102
+ max
2103
+ method, the
2104
+ V DC
2105
+ max method, the Vmax method, and the redshift shuffled
2106
+ method. Our test results demonstrate that the V SDC
2107
+ max ap-
2108
+ proach is the only reliable radial selection model capable
2109
+ of achieving sub-percent accuracy for wp measurement
2110
+ on scales ranging from 0.07h−1Mpc to ∼ 40h−1Mpc. A
2111
+ 2% deviation arises on a large scale for the LS2 sample,
2112
+ however it is still less than the deviations of other radial
2113
+ selection models. In general, the V SDC
2114
+ max
2115
+ technique can
2116
+ constrain the measure accuracy of wp to within 1% for
2117
+ color-dependent galaxy clustering, validating its supe-
2118
+ riority over the Vmax method and the redshift shuffled
2119
+ method.
2120
+ The next generation of spectroscopic surveys, specif-
2121
+ ically the DESI experiment, will obtain the spectra of
2122
+ around 40 million galaxies and quasars over 14,000 deg2,
2123
+ which is almost an order of magnitude more than the
2124
+ previous observed galaxies (Myers et al. 2022). These
2125
+ extra-galactic objects include 13 million bright galaxy
2126
+ sample (2 magnitude deeper than SDSS main sam-
2127
+ ple) (Lan et al. 2022), 8 million luminous red galaxies
2128
+ (LRGs), 16 million emission line galaxies (ELG), and
2129
+ 3 million quasars (Levi et al. 2013; DESI Collabora-
2130
+ tion et al. 2016a,b; Raichoor et al. 2022). On the one
2131
+ hand, the two-point statistics of these up-coming galax-
2132
+ ies will surely afford us an unprecedented opportunity to
2133
+ comprehend the physics of galaxy formation and evolu-
2134
+ tion, improve the galaxy-halo connection, and shed light
2135
+ on the role of the halo environment in determining the
2136
+ galaxy’s physical properties (Ferreira et al. 2022). On
2137
+ the other hand, how to fully exploit these galaxies, par-
2138
+ ticularly with the assistance of galaxy 2PCFs, remains
2139
+ a challenge. Using volume-limited catalogs to conduct
2140
+ the 2PCF analysis will not only result in the rejection
2141
+ of a considerable number of galaxies, but it may also
2142
+ lead to the loss of crucial information imprinted in clus-
2143
+ tering. The density-corrected Vmax approach proposed
2144
+ by (Cole 2011) solves this problem, and our improve-
2145
+ ments and tests confirm that the V SDC
2146
+ max method is a vi-
2147
+ able technique for accurately measuring clustering for
2148
+ flux-limited and color-dependent samples, hence maxi-
2149
+ mizing the use of galaxies. Our present tests are pre-
2150
+ liminary, concentrating mostly on low redshift galaxies.
2151
+ In the future, we will continue to improve this approach
2152
+ and conduct more tests on various properties of galax-
2153
+ ies (e.g., stellar mass, star-formation rate, and so forth)
2154
+ as well as tests employing relative high redshift galaxies
2155
+ (e.g., CMASS, BOSS and eBOSS) and mocks.
2156
+ We appreciate the referee’s insightful comments and
2157
+ suggestions, which substantially improve this article.
2158
+ We would like to thank Yipeng Jing for carefully read-
2159
+ ing the manuscript and providing valuable comments.
2160
+ We are also grateful to Yipeng Jing for generously pro-
2161
+ viding the simulation data.
2162
+ Lei Yang expresses grat-
2163
+ itude to Chun Xia for assisting with the use of the
2164
+ Yunnan University Astronomy Supercomputer.
2165
+ This
2166
+ work is sponsored by grants from Yunnan Univer-
2167
+ sity’s Launching Research Fund for Postdoctoral Fel-
2168
+ low (C176220200) and the China Postdoctoral Science
2169
+ Foundation (2020M683387).
2170
+ The majority of calcula-
2171
+ tions were performed on the Yunnan University Astron-
2172
+ omy Supercomputer.
2173
+ 1
2174
+ 2
2175
+ 3
2176
+ 4
2177
+ 5
2178
+ 6
2179
+ 7
2180
+ 8
2181
+ 9
2182
+ 10
2183
+ 11
2184
+ 12
2185
+ 13
2186
+ 14
2187
+
2188
+ 20
2189
+ Yang et al.
2190
+ Figure 13. The mean number density n(z) among 60 LC mock samples. These samples have a flux cut at mr = [15, 17] and
2191
+ two luminosity cuts at M 0.1
2192
+ r
2193
+ = [−19, −22] for LC1 samples and M 0.1
2194
+ r
2195
+ = [−20, −23] for LC2 samples. In the case of no k + e
2196
+ corrections, the light blue and dark blue points with error bars represent the n(z) and 1σ variance for the LC1 and LC2 samples,
2197
+ respectively. The light orange and orange lines show the input nDR7 derived by the input LF and sample selection criteria. In
2198
+ the case of simple k + e corrections, the orange and red triangles with errors indicate n(z) and 1σ for LC1 and LC2 samples,
2199
+ respectively. The inputs nDR7 are shown in light gray and gray lines.
2200
+ APPENDIX
2201
+ A. THE MOCK SAMPLES
2202
+ As an example, Figure 13 displays the estimated average galaxy number density n(z) for 60 LC samples. The n(z)
2203
+ of these flux-limited samples changes as a function of comoving distance. The n(z)s of the LC samples are in excellent
2204
+ agreement with the predicted input nDR7 derived from the input luminosity function and the corresponding sample
2205
+ selection criteria. As predicted, n(z) for LS2 samples contains more brighter and high redshift galaxies than n(z) for
2206
+ LS1 samples. In addition, the n(z) for the samples with simple k + e corrections exhibits a slight evolution toward
2207
+ higher redshift when compared to samples without k + e corrections.
2208
+ Figure 14 displays the LS samples on the redshift-magnitude diagram (left panel) and color-magnitude diagram
2209
+ (right panel), respectively. The flux-limited LS samples are constructed from a lightcone catalog with two luminosity
2210
+ cuts. At low-redshift regions, the lightcone catalog mimic the SDSS DR7 data and, hence, has a LF of Blanton et al.
2211
+ (2003). We use the method described in Zehavi et al. (2011) to divide the galaxies into blue and red galaxies, as
2212
+ indicated by the red line in the right panel. Additionally, the LS samples have a redshift-dependent number density
2213
+ identical to that observed in Figure 13 and spanning a broader redshift range.
2214
+ REFERENCES
2215
+ Alam, S., de Mattia, A., Tamone, A., et al. 2021a, MNRAS,
2216
+ 504, 4667, doi: 10.1093/mnras/stab1150
2217
+ Alam, S., Aubert, M., Avila, S., et al. 2021b, PhRvD, 103,
2218
+ 083533, doi: 10.1103/PhysRevD.103.083533
2219
+ Amendola, L., Appleby, S., Bacon, D., et al. 2013, Living
2220
+ Reviews in Relativity, 16, 6, doi: 10.12942/lrr-2013-6
2221
+ Amin, M. A., Cyr-Racine, F.-Y., Eifler, T., et al. 2022,
2222
+ arXiv e-prints, arXiv:2203.07946.
2223
+ https://arxiv.org/abs/2203.07946
2224
+ Angulo, R. E., Springel, V., White, S. D. M., et al. 2012,
2225
+ MNRAS, 426, 2046,
2226
+ doi: 10.1111/j.1365-2966.2012.21830.x
2227
+ Behroozi, P., Wechsler, R. H., Hearin, A. P., & Conroy, C.
2228
+ 2019, MNRAS, 488, 3143, doi: 10.1093/mnras/stz1182
2229
+ Bennett, C. L., Larson, D., Weiland, J. L., et al. 2013,
2230
+ ApJS, 208, 20, doi: 10.1088/0067-0049/208/2/20
2231
+ Berlind, A. A., et al. 2006, ApJS, 167, 1,
2232
+ doi: 10.1086/508170
2233
+
2234
+ ((h-1Mpc)
2235
+ 10
2236
+ No k + e corrections
2237
+ Input nDR7(z):[-19,-22]
2238
+ Mock n(z) :
2239
+ 「-19,-22]
2240
+ Input nDR7(z) :[-20,-23]
2241
+ n(
2242
+ Mock n(z) :「-20,-23l
2243
+ Simple k + e corrections
2244
+ Input nDR7(z) :[-19,-22]
2245
+ 10-6,
2246
+ Mock n(z) :
2247
+ [19,—22]
2248
+ Input nDR7(z) :[-20,-23]
2249
+ Mock n(z) :
2250
+ [—20,—23]
2251
+ 10-7
2252
+ 60
2253
+ 100
2254
+ 200
2255
+ 500
2256
+ d (h-1Mpc)The smoothed Vmax method
2257
+ 21
2258
+ Figure 14. Left panel: LS samples on the magnitude-redshift diagram. The light blue points denote galaxies in one of LS1
2259
+ samples with a flux cut at mr = [15, 17] and luminosity cut at M 0.1
2260
+ r
2261
+ = [−19, −22]. The dark blue points stand for one of LS2
2262
+ samples with cuts of mr = [15, 17] and M 0.1
2263
+ r
2264
+ = [−20, −23]. The samples have a sky coverage of 5950 deg2. Right panel: LS
2265
+ samples on the color-magnitude diagram. LS1 and LS2 samples are color-coded similarly to the panel on the left. The red line
2266
+ referred to by Zehavi et al. (2011) splits galaxies into blue and red subsamples.
2267
+ Beutler, F., Saito, S., Seo, H.-J., et al. 2014, MNRAS, 443,
2268
+ 1065, doi: 10.1093/mnras/stu1051
2269
+ Bianchi, D., & Percival, W. J. 2017, MNRAS, 472, 1106,
2270
+ doi: 10.1093/mnras/stx2053
2271
+ Bianchi, D., & Verde, L. 2020, MNRAS, 495, 1511,
2272
+ doi: 10.1093/mnras/staa1267
2273
+ Blanton, M. R. 2006, ApJ, 648, 268, doi: 10.1086/505628
2274
+ Blanton, M. R., et al. 2001, AJ, 121, 2358,
2275
+ doi: 10.1086/320405
2276
+ Blanton, M. R., Hogg, D. W., Bahcall, N. A., et al. 2003,
2277
+ ApJ, 592, 819, doi: 10.1086/375776
2278
+ Blanton, M. R., et al. 2005, AJ, 129, 2562,
2279
+ doi: 10.1086/429803
2280
+ Breton, M.-A., & de la Torre, S. 2021, A&A, 646, A40,
2281
+ doi: 10.1051/0004-6361/202039603
2282
+ Cao, Y., Gong, Y., Meng, X.-M., et al. 2018, MNRAS, 480,
2283
+ 2178, doi: 10.1093/mnras/sty1980
2284
+ Cole, S. 2011, MNRAS, 416, 739,
2285
+ doi: 10.1111/j.1365-2966.2011.19093.x
2286
+ Colless, M., et al. 2003, ArXiv Astrophysics e-prints
2287
+ Conroy, C., Wechsler, R. H., & Kravtsov, A. V. 2006, ApJ,
2288
+ 647, 201, doi: 10.1086/503602
2289
+ Contreras, S., Angulo, R. E., & Zennaro, M. 2021,
2290
+ MNRAS, 508, 175, doi: 10.1093/mnras/stab2560
2291
+ D´avila-Kurb´an, F., S´anchez, A. G., Lares, M., & Ruiz,
2292
+ A. N. 2021, MNRAS, 506, 4667,
2293
+ doi: 10.1093/mnras/stab1622
2294
+ Davis, M., Efstathiou, G., Frenk, C. S., & White, S. D. M.
2295
+ 1985, ApJ, 292, 371, doi: 10.1086/163168
2296
+ Davis, M., & Peebles, P. J. E. 1983, ApJ, 267, 465,
2297
+ doi: 10.1086/160884
2298
+ de la Torre, S., et al. 2013, A&A, 557, A54,
2299
+ doi: 10.1051/0004-6361/201321463
2300
+ de la Torre, S., Jullo, E., Giocoli, C., et al. 2017, A&A, 608,
2301
+ A44, doi: 10.1051/0004-6361/201630276
2302
+ de Mattia, A., & Ruhlmann-Kleider, V. 2019, JCAP, 2019,
2303
+ 036, doi: 10.1088/1475-7516/2019/08/036
2304
+ DESI Collaboration, Aghamousa, A., Aguilar, J., et al.
2305
+ 2016a, ArXiv e-prints. https://arxiv.org/abs/1611.00036
2306
+ —. 2016b, ArXiv e-prints.
2307
+ https://arxiv.org/abs/1611.00037
2308
+ Driver, S. P., Hill, D. T., Kelvin, L. S., et al. 2011,
2309
+ MNRAS, 413, 971, doi: 10.1111/j.1365-2966.2010.18188.x
2310
+ Eisenstein, D. J., Weinberg, D. H., Agol, E., et al. 2011,
2311
+ AJ, 142, 72, doi: 10.1088/0004-6256/142/3/72
2312
+ Farrow, D. J., Cole, S., Norberg, P., et al. 2015, MNRAS,
2313
+ 454, 2120, doi: 10.1093/mnras/stv2075
2314
+ Farrow, D. J., S´anchez, A. G., Ciardullo, R., et al. 2021,
2315
+ MNRAS, 507, 3187, doi: 10.1093/mnras/stab1986
2316
+ Ferreira, L., Adams, N., Conselice, C. J., et al. 2022, ApJL,
2317
+ 938, L2, doi: 10.3847/2041-8213/ac947c
2318
+ Fisher, K. B., Davis, M., Strauss, M. A., Yahil, A., &
2319
+ Huchra, J. 1994, MNRAS, 266, 50
2320
+ Garilli, B., Paioro, L., Scodeggio, M., et al. 2012, PASP,
2321
+ 124, 1232, doi: 10.1086/668681
2322
+ Glanville, A., Howlett, C., & Davis, T. M. 2021, MNRAS,
2323
+ 503, 3510, doi: 10.1093/mnras/stab657
2324
+ Gong, Y., Liu, X., Cao, Y., et al. 2019, ApJ, 883, 203,
2325
+ doi: 10.3847/1538-4357/ab391e
2326
+ Guo, H., Yang, X., & Lu, Y. 2018, ApJ, 858, 30,
2327
+ doi: 10.3847/1538-4357/aabc56
2328
+ Guo, H., Zehavi, I., Zheng, Z., et al. 2013, ApJ, 767, 122,
2329
+ doi: 10.1088/0004-637X/767/2/122
2330
+ Guo, H., et al. 2014, MNRAS, 441, 2398,
2331
+ doi: 10.1093/mnras/stu763
2332
+
2333
+ -23.0 -
2334
+ -22.5
2335
+ -22.0
2336
+ -21.5-
2337
+ -21.0
2338
+ M
2339
+ -20.5
2340
+ Sky coverage: 5950 deg?
2341
+ -20.0
2342
+ mr=[15,17]
2343
+ -19.5
2344
+ M9.1 =[-20,-23]
2345
+ M9.1=[-19,-22]
2346
+ -19.0
2347
+ 0.05
2348
+ 0.10
2349
+ 0.15
2350
+ 0.20
2351
+ 0.25
2352
+ 0.2
2353
+ 0.4
2354
+ 0.6
2355
+ 0.8
2356
+ 1.0
2357
+ 1.2
2358
+ Z
2359
+ g-r22
2360
+ Yang et al.
2361
+ Guo, Q., White, S., Boylan-Kolchin, M., et al. 2011,
2362
+ MNRAS, 413, 101, doi: 10.1111/j.1365-2966.2010.18114.x
2363
+ Hahn, C., Wilson, M. J., Ruiz-Macias, O., et al. 2022,
2364
+ arXiv e-prints, arXiv:2208.08512.
2365
+ https://arxiv.org/abs/2208.08512
2366
+ Hamilton, A. J. S. 1992, ApJL, 385, L5,
2367
+ doi: 10.1086/186264
2368
+ —. 1993, ApJ, 417, 19, doi: 10.1086/173288
2369
+ Hearin, A. P., Watson, D. F., Becker, M. R., et al. 2014,
2370
+ MNRAS, 444, 729, doi: 10.1093/mnras/stu1443
2371
+ Hinshaw, G., Larson, D., Komatsu, E., et al. 2013, ApJS,
2372
+ 208, 19, doi: 10.1088/0067-0049/208/2/19
2373
+ Jing, Y. 2019, Science China Physics, Mechanics, and
2374
+ Astronomy, 62, 19511, doi: 10.1007/s11433-018-9286-x
2375
+ Jing, Y. P., Mo, H. J., & B¨orner, G. 1998, ApJ, 494, 1,
2376
+ doi: 10.1086/305209
2377
+ Johnston, H., Joachimi, B., Norberg, P., et al. 2021, A&A,
2378
+ 646, A147, doi: 10.1051/0004-6361/202039682
2379
+ Karademir, G. S., Taylor, E. N., Blake, C., et al. 2021,
2380
+ arXiv e-prints, arXiv:2109.06136.
2381
+ https://arxiv.org/abs/2109.06136
2382
+ Lan, T.-W., Tojeiro, R., Armengaud, E., et al. 2022, arXiv
2383
+ e-prints, arXiv:2208.08516.
2384
+ https://arxiv.org/abs/2208.08516
2385
+ Landy, S. D., & Szalay, A. S. 1993, ApJ, 412, 64,
2386
+ doi: 10.1086/172900
2387
+ Levi, M., Bebek, C., Beers, T., et al. 2013, ArXiv e-prints.
2388
+ https://arxiv.org/abs/1308.0847
2389
+ Liske, J., Baldry, I. K., Driver, S. P., et al. 2015, MNRAS,
2390
+ 452, 2087, doi: 10.1093/mnras/stv1436
2391
+ Loveday, J., Norberg, P., Baldry, I. K., et al. 2015,
2392
+ MNRAS, 451, 1540, doi: 10.1093/mnras/stv1013
2393
+ Loveday, J., Christodoulou, L., Norberg, P., et al. 2018,
2394
+ MNRAS, 474, 3435, doi: 10.1093/mnras/stx2971
2395
+ LSST Dark Energy Science Collaboration. 2012, arXiv
2396
+ e-prints, arXiv:1211.0310.
2397
+ https://arxiv.org/abs/1211.0310
2398
+ Madgwick, D. S., et al. 2003, MNRAS, 344, 847,
2399
+ doi: 10.1046/j.1365-8711.2003.06861.x
2400
+ McBride, C. K., Connolly, A. J., Gardner, J. P., et al. 2011,
2401
+ ApJ, 726, 13, doi: 10.1088/0004-637X/726/1/13
2402
+ McNaught-Roberts, T., Norberg, P., Baugh, C., et al. 2014,
2403
+ MNRAS, 445, 2125, doi: 10.1093/mnras/stu1886
2404
+ Merz, G., Rezaie, M., Seo, H.-J., et al. 2021, MNRAS, 506,
2405
+ 2503, doi: 10.1093/mnras/stab1887
2406
+ Mohammad, F. G., Granett, B. R., Guzzo, L., et al. 2018,
2407
+ A&A, 610, A59, doi: 10.1051/0004-6361/201731685
2408
+ Myers, A. D., Moustakas, J., Bailey, S., et al. 2022, arXiv
2409
+ e-prints, arXiv:2208.08518.
2410
+ https://arxiv.org/abs/2208.08518
2411
+ Norberg, P., et al. 2002, MNRAS, 332, 827,
2412
+ doi: 10.1046/j.1365-8711.2002.05348.x
2413
+ Nuza, S. E., et al. 2013, MNRAS, 432, 743,
2414
+ doi: 10.1093/mnras/stt513
2415
+ Peacock, J. A., Cole, S., Norberg, P., et al. 2001, Nature,
2416
+ 410, 169
2417
+ Pezzotta, A., de la Torre, S., Bel, J., et al. 2017, A&A, 604,
2418
+ A33, doi: 10.1051/0004-6361/201630295
2419
+ Planck Collaboration, Ade, P. A. R., Aghanim, N., et al.
2420
+ 2016, A&A, 594, A13, doi: 10.1051/0004-6361/201525830
2421
+ Raichoor, A., Moustakas, J., Newman, J. A., et al. 2022,
2422
+ arXiv e-prints, arXiv:2208.08513.
2423
+ https://arxiv.org/abs/2208.08513
2424
+ Reid, B., Ho, S., Padmanabhan, N., et al. 2016, MNRAS,
2425
+ 455, 1553, doi: 10.1093/mnras/stv2382
2426
+ Reid, B. A., Percival, W. J., Eisenstein, D. J., et al. 2010,
2427
+ MNRAS, 404, 60, doi: 10.1111/j.1365-2966.2010.16276.x
2428
+ Ross, A. J., Samushia, L., Howlett, C., et al. 2015,
2429
+ MNRAS, 449, 835, doi: 10.1093/mnras/stv154
2430
+ Ross, A. J., Percival, W. J., S´anchez, A. G., et al. 2012,
2431
+ MNRAS, 424, 564, doi: 10.1111/j.1365-2966.2012.21235.x
2432
+ Samushia, L., et al. 2013, MNRAS, 429, 1514,
2433
+ doi: 10.1093/mnras/sts443
2434
+ —. 2014, MNRAS, 439, 3504, doi: 10.1093/mnras/stu197
2435
+ Schlegel, D. J., Ferraro, S., Aldering, G., et al. 2022, arXiv
2436
+ e-prints, arXiv:2209.03585.
2437
+ https://arxiv.org/abs/2209.03585
2438
+ Shi, F., Yang, X., Wang, H., et al. 2016, ApJ, 833, 241,
2439
+ doi: 10.3847/1538-4357/833/2/241
2440
+ —. 2018, ApJ, 861, 137, doi: 10.3847/1538-4357/aacb20
2441
+ Sinha, M., & Garrison, L. 2019, in Software Challenges to
2442
+ Exascale Computing, ed. A. Majumdar & R. Arora
2443
+ (Singapore: Springer Singapore), 3–20.
2444
+ https://doi.org/10.1007/978-981-13-7729-7 1
2445
+ Skibba, R. A., & Sheth, R. K. 2009, MNRAS, 392, 1080,
2446
+ doi: 10.1111/j.1365-2966.2008.14007.x
2447
+ Skibba, R. A., et al. 2014, ApJ, 784, 128,
2448
+ doi: 10.1088/0004-637X/784/2/128
2449
+ Smith, A., Cole, S., Baugh, C., et al. 2017, MNRAS, 470,
2450
+ 4646, doi: 10.1093/mnras/stx1432
2451
+ Tegmark, M., Strauss, M. A., Blanton, M. R., et al. 2004,
2452
+ PhRvD, 69, 103501, doi: 10.1103/PhysRevD.69.103501
2453
+ Vale, A., & Ostriker, J. P. 2004, MNRAS, 353, 189,
2454
+ doi: 10.1111/j.1365-2966.2004.08059.x
2455
+ Valluri, M., Chabanier, S., Irsic, V., et al. 2022, arXiv
2456
+ e-prints, arXiv:2203.07491.
2457
+ https://arxiv.org/abs/2203.07491
2458
+ Wang, S.-J., Guo, Q., & Cai, R.-G. 2017, MNRAS, 472,
2459
+ 2869, doi: 10.1093/mnras/stx2183
2460
+
2461
+ The smoothed Vmax method
2462
+ 23
2463
+ Wang, Z., Xu, H., Yang, X., et al. 2021, Science China
2464
+ Physics, Mechanics, and Astronomy, 64, 289811,
2465
+ doi: 10.1007/s11433-021-1707-6
2466
+ Wechsler, R. H., & Tinker, J. L. 2018, ARA&A, 56, 435,
2467
+ doi: 10.1146/annurev-astro-081817-051756
2468
+ Weinberg, D. H., Mortonson, M. J., Eisenstein, D. J., et al.
2469
+ 2013, PhR, 530, 87, doi: 10.1016/j.physrep.2013.05.001
2470
+ Xu, H., Zheng, Z., Guo, H., Zhu, J., & Zehavi, I. 2016,
2471
+ MNRAS, 460, 3647, doi: 10.1093/mnras/stw1259
2472
+ Yang, L., Jing, Y., Yang, X., & Han, J. 2019, ApJ, 872, 26,
2473
+ doi: 10.3847/1538-4357/aafc22
2474
+ Yang, L., Jing, Y.-P., Li, Z.-G., & Yang, X.-H. 2020,
2475
+ Research in Astronomy and Astrophysics, 20, 054,
2476
+ doi: 10.1088/1674-4527/20/4/54
2477
+ Yang, X., Mo, H. J., & van den Bosch, F. C. 2003, MNRAS,
2478
+ 339, 1057, doi: 10.1046/j.1365-8711.2003.06254.x
2479
+ —. 2008, ApJ, 676, 248, doi: 10.1086/528954
2480
+ Yang, X., Mo, H. J., van den Bosch, F. C., Zhang, Y., &
2481
+ Han, J. 2012, ApJ, 752, 41,
2482
+ doi: 10.1088/0004-637X/752/1/41
2483
+ York, D. G., et al. 2000, AJ, 120, 1579, doi: 10.1086/301513
2484
+ Yuan, S., Hadzhiyska, B., & Abel, T. 2022a, arXiv e-prints,
2485
+ arXiv:2211.02068. https://arxiv.org/abs/2211.02068
2486
+ Yuan, S., Hadzhiyska, B., Bose, S., & Eisenstein, D. J.
2487
+ 2022b, arXiv e-prints, arXiv:2202.12911.
2488
+ https://arxiv.org/abs/2202.12911
2489
+ Zarrouk, P., Ruiz-Macias, O., Cole, S., et al. 2021, arXiv
2490
+ e-prints, arXiv:2106.13120.
2491
+ https://arxiv.org/abs/2106.13120
2492
+ Zehavi, I., et al. 2002, ApJ, 571, 172, doi: 10.1086/339893
2493
+ —. 2005, ApJ, 630, 1, doi: 10.1086/431891
2494
+ —. 2011, ApJ, 736, 59, doi: 10.1088/0004-637X/736/1/59
2495
+ Zheng, Z., Zehavi, I., Eisenstein, D. J., Weinberg, D. H., &
2496
+ Jing, Y. P. 2009, ApJ, 707, 554,
2497
+ doi: 10.1088/0004-637X/707/1/554
2498
+ Zheng, Z., et al. 2005, ApJ, 633, 791, doi: 10.1086/466510
2499
+ Zu, Y., & Mandelbaum, R. 2015, MNRAS, 454, 1161,
2500
+ doi: 10.1093/mnras/stv2062
2501
+ Zu, Y., Shan, H., Zhang, J., et al. 2021, MNRAS, 505,
2502
+ 5117, doi: 10.1093/mnras/stab1712
2503
+
99E5T4oBgHgl3EQfRQ7z/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
99FRT4oBgHgl3EQfrDen/content/tmp_files/2301.13619v1.pdf.txt ADDED
@@ -0,0 +1,1011 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Brillouin and Kerr nonlinearities of a low-index silicon oxynitride platform
2
+ Kaixuan Ye,1 Yvan Klaver,1 Oscar A Jimenez Gordillo,2 Roel Botter,1
3
+ Okky Daulay,1 Francesco Morichetti,2 Andrea Melloni,2 and David Marpaung1, ∗
4
+ 1Nonlinear Nanophotonics, MESA+ Institute of Nanotechnology,
5
+ University of Twente, Enschede, the Netherlands
6
+ 2Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, 20133, Italy
7
+ (Dated: February 1, 2023)
8
+ Nonlinear optical effects including stimulated Brillouin scattering (SBS) and four-wave mixing
9
+ (FWM) play an important role in microwave photonics, optical frequency combs, and quantum
10
+ photonics. Harnessing SBS and FWM in a low-loss and versatile integrated platform would open
11
+ the path to building large-scale Brillouin/Kerr-based photonic integrated circuits. In this letter, we
12
+ investigate the Brillouin and Kerr properties of a low-index (n=1.513 @ 1550 nm) silicon oxynitride
13
+ (SiON) platform. We observed, for the first time, backward SBS in SiON waveguides with a Brillouin
14
+ gain coefficient of 0.3 m−1W−1, which can potentially be increased to 0.95 m−1W−1 by just tailoring
15
+ the waveguide cross-section. We also performed FWM experiments in SiON rings and obtained the
16
+ nonlinear parameter γ, of 0.02 m−1W−1. Our results point to a low-loss and low-index photonic
17
+ integrated platform that is both Brillouin and Kerr active.
18
+ INTRODUCTION
19
+ Stimulated Brillouin scattering (SBS), which is an in-
20
+ teraction between optical and acoustic waves, is currently
21
+ revolutionizing photonic integrated circuit designs [1–8].
22
+ Featuring a narrow-band (tens of MHz) gain resonance
23
+ shifted around tens of GHz away from the pump light, the
24
+ on-chip SBS plays a significant role in microwave photon-
25
+ ics [9–11], narrow-linewidth integrated lasers [7, 12, 13],
26
+ and on-chip nonreciprocal light propagation [3, 14].
27
+ Efficient on-chip SBS process requires simultaneously
28
+ guiding both the optical and gigahertz acoustic waves
29
+ in a waveguide, making it challenging to be realized in
30
+ most integrated platforms. Several encouraging results
31
+ have been demonstrated recently in various platforms,
32
+ including chalcogenide [2], silicon [5], doped silica [15],
33
+ aluminum gallium arsenide [16], and aluminum nitride
34
+ [17]. In addition, SBS has also been observed in silicon
35
+ nitride-based waveguides [7, 8, 18], opening the pathway
36
+ to intersect Brillouin scattering with Kerr nonlinearities
37
+ in low-loss and mature platforms.
38
+ Silicon oxynitride (SiON) is another highly-developed
39
+ integrated platform that has appealing properties includ-
40
+ ing low propagation loss, wide transparency window, ab-
41
+ sence of multi-photon absorption effects, and stress-free
42
+ fabrication [19, 20].
43
+ The optical and mechanical properties of SiON could
44
+ be tuned continuously between those of SiO2
45
+ and
46
+ Si3N4 at different nitrogen/oxygen (N/O) ratios [21,
47
+ 22].
48
+ For example, a variety of SiON, known as Hy-
49
+ dex (n=1.7 @ 1550 nm), has been widely used for
50
+ Kerr-based nonlinear optic applications including opti-
51
+ cal frequency comb [23], optical neural network [24],
52
+ and quantum photonics [25].
53
+ A slightly higher in-
54
+ dex SiON (n=1.83 @ 1550 nm) was also proposed in
55
+ ∗ Corresponding author: [email protected]
56
+ Fig. 1. (a) Artistic representation of the SiON waveguides,
57
+ showing the four-wave mixing process in an all-pass microring
58
+ resonator and the backward stimulated Brillouin scattering
59
+ (SBS) in a spiral waveguide.
60
+ (b) The cross-section of the
61
+ SiON platform in our work. (c) The chip photograph of the
62
+ SiON microring resonators with a FSR of 50 GHz. (d) The
63
+ chip photograph of the 5-cm SiON straight waveguide.
64
+ [20, 26] for Kerr-based applications. In both cases, the
65
+ SiON platforms have a refractive index close to sili-
66
+ con nitride (n=1.98 @ 1550 nm) instead of silicon oxide
67
+ (n=1.45 @ 1550nm). The relatively high refractive in-
68
+ dex induces a high nonlinear index, making it useful for
69
+ Kerr-based nonlinear optic applications.
70
+ But from the Brillouin perspectives, high refractive in-
71
+ dex SiON is less attractive due to the high content of the
72
+ nitrogen that leads to a meager photoelastic coefficient
73
+ p12 because of the weak p12 of the Si3N4 [18]. Moreover,
74
+ high-index SiON also has similar mechanical properties
75
+ arXiv:2301.13619v1 [physics.optics] 31 Jan 2023
76
+
77
+ fp
78
+ a
79
+ fs
80
+ fp
81
+ probe
82
+ fs
83
+ Amplified probe
84
+ SiON chip
85
+ pump
86
+ SiO2 (1.45)
87
+ 7um
88
+ SiON
89
+ (1.513)
90
+ 2.2um
91
+ 2.2um
92
+ 15um
93
+ b
94
+ Si (3.45)
95
+ dFig. 2. (a) Simulated optical mode of the SiON waveguide.
96
+ (b) Simulated acoustic response of the SiON waveguide. (c)-
97
+ (h) Measured SBS gain spectra of the 2.0 µm, 2.2 µm, 2.3 µm,
98
+ 2.4 µm, 2.6 µm, and 3.5 µm-wide SiON waveguides, respec-
99
+ tively. (i) Brillouin gain coefficients and linewidth of the SiON
100
+ waveguides with different widths.
101
+ to Si3N4, such as high acoustic velocity that prevents
102
+ acoustic confinement when cladded with SiO2 [7, 8, 18].
103
+ In this paper, we investigate the Brillouin and Kerr
104
+ properties of a SiON integrated platform with a rela-
105
+ tively lower refractive index (n=1.513 @ 1550 nm). Con-
106
+ trasting to SiON platforms mentioned above, the SiON
107
+ platform investigated here has a larger photoelastic co-
108
+ efficient p12, lower acoustic velocity, and a larger cross-
109
+ section, all of which lead to an enhanced SBS effect. We
110
+ experimentally observed, for the first time to our knowl-
111
+ edge, backward SBS in SiON waveguides. We also char-
112
+ acterized the Brillouin gain coefficient gb of the SiON
113
+ waveguides with different widths. We found out the gb
114
+ of this SiON waveguide can potentially be increased to
115
+ around 0.95 m−1W−1 by simply tailoring the waveguide
116
+ cross-section. This sufficiently large Brillouin gain coef-
117
+ ficient, together with the low propagation loss, makes it
118
+ possible to generate decent SBS gain for a plethora of
119
+ Brillouin-based applications in this SiON platform.
120
+ Furthermore, we also measured the nonlinear param-
121
+ eter γ and nonlinear index n2 of this SiON platform
122
+ through four-wave mixing (FWM) experiments in a ring
123
+ resonator. While the measured γ is an order of magni-
124
+ tude lower when compared to that of high-index SiON,
125
+ we expect that with lower losses and higher pump power,
126
+ the unique interplay between the SBS and Kerr effect
127
+ such as Brillouin-assisted Kerr frequency comb [27, 28]
128
+ could be observed in this integrated platform.
129
+ RESULTS
130
+ We performed the backward SBS and four-wave mix-
131
+ ing experiments in single-pass (spiral or straight) wave-
132
+ guides and microring resonators respectively, as shown in
133
+ Fig. 1(a). The cross-section of this platform is shown in
134
+ Fig. 1(b) [29, 30]. The 2.2 µm-thick SiON layer has a
135
+ refractive index n of 1.513 at 1550 nm. It is on top of a
136
+ 15-µm SiO2 layer and is covered by a 7 µm-thick SiO2 up-
137
+ per cladding. The refractive index contrast ∆n between
138
+ the core and the cladding is 4.4%, enabling a bending ra-
139
+ dius of 600 µm with negligible radiation losses. Fig. 1(c)
140
+ shows the photograph of the microring resonators in this
141
+ platform with a free spectral range (FSR) of 50 GHz and
142
+ coupling coefficients varying from 0.05 to 0.8. Fig. 1(d)
143
+ shows the photograph of several groups of 5-cm straight
144
+ waveguides with different widths. The measured prop-
145
+ agation loss of those straight waveguides is 0.25 dB/cm
146
+ with coupling loss to lensed-tip fibers of approximately
147
+ 3 dB/facet.
148
+ Stimulated Brillouin Scattering in SiON Waveguides
149
+ We developed a finite element model [8] in COMSOL to
150
+ estimate the SBS response of the SiON waveguides. The
151
+ simulated optical field and the corresponding acoustic re-
152
+ sponse of the 2.2 µm-wide SiON waveguide are shown
153
+ in Fig. 2(a) and (b), respectively.
154
+ The optical field is
155
+ well confined around the SiON core area because of the
156
+ total internal reflection (TIR). However, the TIR condi-
157
+ tion does not hold for the acoustic response because the
158
+ acoustic velocity of the SiON (∼ 6.2 km/s) is higher than
159
+ that of the SiO2 (∼ 5.9 km/s). As a result, part of the
160
+ acoustic field would leak into the cladding as shown in
161
+ Fig. 2(b). Nevertheless, most of the acoustic field still
162
+
163
+ Normalized electric field
164
+ Normalized displacement field
165
+ a
166
+ 2.2 um
167
+ 2.2 um
168
+ 2.2 um
169
+ 2.2 um
170
+ 0
171
+ 0.8
172
+ c
173
+ 2.0 um
174
+ d
175
+ 2.2 um
176
+ 8
177
+ 0.
178
+ j0.10 m-1 w-1
179
+ FWHM
180
+ 0.15 m-1 W-1
181
+ FWHM
182
+ g
183
+ @14.22 GHz
184
+ 358 MHz
185
+ @14.31 GHz
186
+ 282 MHz
187
+ 0.4
188
+ 0,2
189
+ M
190
+ 0
191
+ 0
192
+ [a.u.]
193
+ 13.5
194
+ 14.0
195
+ 14.5
196
+ 15.0
197
+ 13.5
198
+ 14.0
199
+ 14.5
200
+ 15.0
201
+ Normalized amplitude
202
+ e
203
+ 2.3 um
204
+ 2.4 um
205
+ 0.8
206
+ 0.8
207
+ 0.17 m-1 w-1
208
+ FWHM
209
+ 0.19 m-1 w-1
210
+ FWHM
211
+ 0.6
212
+ @14.40 GHz
213
+ 280 MHz
214
+ @14.44 GHz
215
+ 269 MHz
216
+ 0.4
217
+ 0.4
218
+ 0,2
219
+ umy
220
+ 0
221
+ 13.5
222
+ 14.0
223
+ 14.5
224
+ 15.0
225
+ 13.5
226
+ 14.0
227
+ 14.5
228
+ 15.0
229
+ 0.8
230
+ g
231
+ 2.6 um
232
+ 0.8
233
+ h
234
+ 3.5 um
235
+ 0.24 m-1 w-1
236
+ FWHM
237
+ 0.32 m-1 w-1
238
+ 0.6
239
+ FWHM
240
+ 9
241
+ @14.43 GHz
242
+ 224 MHz
243
+ @14.48 GHz
244
+ 105 MHz
245
+ 0.4
246
+ 0.4
247
+ 0,2
248
+ 0
249
+ 0
250
+ 13.5
251
+ 14.0
252
+ 14.5
253
+ 15.0
254
+ 13.5
255
+ 14.0
256
+ 14.5
257
+ 15.0
258
+ Brillouin frequency shift [GHz]
259
+ 350
260
+ 0.30
261
+ 300
262
+ Linewidth [MHz]
263
+ 0.25
264
+ [m-1 W-1]
265
+ 250 200 150
266
+ 0.15 0.20
267
+ 0.10
268
+ 100
269
+ 2.0
270
+ 2.5
271
+ 3.0
272
+ 3.5
273
+ Waveguide width [μm]Fig. 3. (a) Simulated optical mode and (b) simulated acous-
274
+ tic response and (c) simulated Brillouin gain spectrum of the
275
+ optimized SiON waveguide. (d) Estimated SBS gain from the
276
+ optimized and current SiON waveguides.
277
+ remains inside the SiON core because of the relatively
278
+ large cross-section area [31]. This results in a large over-
279
+ lap between the optical and acoustic fields that leads to
280
+ improved Brillouin gain coefficient. Extensive simulation
281
+ results of the SBS gain coefficients are included in the
282
+ Supplementary.
283
+ To verify the simulation results, we characterized the
284
+ SBS responses of the SiON waveguides with a pump-
285
+ probe experimental apparatus [8, 18].
286
+ The pump and
287
+ probe light are intensity-modulated and coupled into the
288
+ opposite facets of the waveguide. We keep the pump fre-
289
+ quency fixed at 1561 nm while sweeping the probe at fre-
290
+ quencies down shifted from the pump by about 15 GHz.
291
+ When the frequency difference between the pump and
292
+ the probe is close to the Brillouin frequency shift of the
293
+ SiON waveguide, the probe will experience the SBS gain
294
+ and a peak will be detected at the lock-in amplifier (See
295
+ the Supplementary for more details about the SBS ex-
296
+ periment).
297
+ Several 5 cm-long SiON waveguides are characterized
298
+ to investigate the influence of waveguide width on the
299
+ Brillouin gain spectra.
300
+ The measured SBS responses
301
+ of the 2.0 µm, 2.2 µm, 2.3 µm, 2.4 µm, 2.6 µm, and
302
+ 3.5 µm-wide waveguides are shown in Fig. 2(c) to (h),
303
+ respectively. All waveguides show a clear SBS peak well
304
+ above the noise floor with the Brillouin frequency shift in-
305
+ creases from 14.22 GHz for the 2.0 µm-wide waveguide to
306
+ 14.48 GHz for the 3.5 µm-wide waveguide. Fig. 2(i) plots
307
+ the measured Brillouin gain coefficient gb and the SBS
308
+ linewidth of the SiON waveguides with different widths
309
+ (See the Supplementary for more details about the Bril-
310
+ louin gain coefficient calculation). The Brillouin gain co-
311
+ efficient gb increases from 0.1 m−1W−1 to 0.32 m−1W−1
312
+ when the waveguide width increases from 2.0 µm to
313
+ 3.5 µm.
314
+ In the meantime, the linewidth of the SBS
315
+ peak reduces from 358 MHz to 105 MHz. The increasing
316
+ Brillouin gain coefficient and the narrowing of the SBS
317
+ linewidth indicate an improvement in acoustic confine-
318
+ ment when the SiON waveguides become wider.
319
+ The Brillouin gain coefficient can be further increased
320
+ by optimizing the cross-section of the waveguide through
321
+ the genetic algorithm [8]. Fig. 3 (a) and (b) show the
322
+ simulated optical mode and the acoustic response of a
323
+ SiON waveguide with the same core refractive index but
324
+ with an optimized cross-section for SBS gain. The di-
325
+ mension of such a waveguide is 4.0 µm × 3.2 µm with a
326
+ top cladding of 3 µm and a bottom cladding of 10 µm.
327
+ Compared to the optical and acoustic fields of the wave-
328
+ guide structure in this work, less acoustic field is scat-
329
+ tered into the cladding while the optical field is still well
330
+ confined in the optimized waveguide structure. The Bril-
331
+ louin gain spectrum of the optimized waveguide structure
332
+ is shown in Fig. 3 (c). The simulated peak Brillouin gain
333
+ coefficient of this waveguide is 0.95 m−1W−1, which is
334
+ 3× higher than the waveguide structure measured in this
335
+ work. Furthermore, the propagation loss in this SiON
336
+ platform can also be significantly lowered by reducing
337
+ sidewall roughness and improving the thermal anneal-
338
+ ing process [30], allowing for longer effective waveguide
339
+ length for the SBS process. Fig. 3 (d) estimates the SBS
340
+ gain of both the measured and the optimized SiON wave-
341
+ guides with different propagation losses. The optimized
342
+ Brillouin gain coefficient (around 0.95 m−1W−1), along
343
+ with the improved propagation loss (around 0.1 dB/cm),
344
+ can enhance the SBS gain from less than 0.5 dB to near
345
+ 1.5 dB for a 60-cm waveguide, which is sufficient for ap-
346
+ plications like SBS-based narrow-bandwidth microwave
347
+ photonic notch filters [8, 10].
348
+ Four-wave mixing in SiON Waveguides
349
+ We further investigate the Kerr nonlinearities of this
350
+ SiON platform. High-index SiON platforms are widely
351
+ used for Kerr-based nonlinear optics applications because
352
+ of the relatively large nonlinear parameter γ [19]. How-
353
+ ever, the nonlinear parameter γ is highly dependent on
354
+ the refractive index and the geometry of the waveguide.
355
+ The SiON waveguide in this work has a relatively lower
356
+ refractive index and a larger cross-section compared with
357
+ other SiON platforms [19, 20], and the nonlinear index
358
+ n2 and nonlinear parameter γ of the SiON waveguide in
359
+ this platform has never been characterized before.
360
+ We devised a four-wave mixing (FWM) experiment
361
+ for the nonlinear parameter characterization.
362
+ Because
363
+ of the limited effective length of the available samples,
364
+ the FWM conversion efficiency of the straight waveguide
365
+ is comparable with that of the fiber pigtails, making it
366
+ difficult to accurately measure the n2 and the γ.
367
+ We
368
+ use the all-pass ring resonators to enhance the FWM in
369
+ the SiON waveguide so that the contribution from fibers
370
+ in the setup can be neglected [32]. The ring resonator
371
+
372
+ Normalized electric field
373
+ Normalized displacement field
374
+ a
375
+ b
376
+ 4.0 um
377
+ 4.0 um
378
+ 3.2um
379
+ 3.2um
380
+ c
381
+ d
382
+ 5
383
+ 0.10 dB/cm
384
+ SBS gain [dB]
385
+ 0.15 dB/cm
386
+ 0.95 m-1 W-1
387
+ [m-1 W-1]
388
+ 0.25 dB/cm
389
+ @ 15.76 GHz
390
+ 5.
391
+ optimized
392
+ 0
393
+ This work
394
+ 0.0
395
+ 0.
396
+ 0
397
+ 15.5
398
+ 15.7
399
+ 15.9
400
+ 16.1
401
+ 0
402
+ 20
403
+ 40
404
+ 60
405
+ Brillouin frequency shift [GHz]
406
+ Waveguide length [cm]Fig. 4. (a) Measured resonance response of the SiON ring
407
+ resonator.
408
+ (b) Measured four-wave mixing response of the
409
+ SiON ring resonator. (c) Conversion efficiency of the four-
410
+ wave mixing at different pump power.
411
+ (d) The estimated
412
+ nonlinear parameter γ of the SiON waveguides with different
413
+ widths.
414
+ applied in our experiment is made of the 2.2 µm-wide
415
+ SiON waveguide and it has a free spectral range (FSR)
416
+ of 50 GHz and a power coupling coefficient of 0.05. The
417
+ pump laser is locked close to the resonance of the ring
418
+ resonator to mitigate the thermal influence on the ring
419
+ resonator. The signal laser is set close to 2 × FSR away
420
+ from the pump signal and is combined with the pump
421
+ light with a 99:1 coupler. The combined pump and sig-
422
+ nal are coupled into the all-pass ring resonator with a
423
+ lensed fiber with a spot size of 2 µm.
424
+ The generated
425
+ idler is then coupled out from the chip and sent to the
426
+ optical spectrum analyzer to measure the conversion ef-
427
+ ficiency from the signal to the generated idler (See the
428
+ Supplementary for details of the FWM experiment).
429
+ To determine the field enhancement factor of the FWM
430
+ process in the ring resonator, we first characterized the
431
+ resonance response of the ring resonator with a vector
432
+ network analyzer, as shown in Fig. 4 (a) (See the Supple-
433
+ mentary for details of the characterization). The mea-
434
+ sured full-width at half-maximum (FWHM) is 612 MHz
435
+ with an extinction ratio of 8.9 dB, corresponding to a
436
+ loaded Q-factor of 330,000 and a propagation loss of
437
+ 0.27 dB/cm. Fig. 4 (b) shows the measured FWM re-
438
+ sponse of the 50 GHz SiON ring resonator. A clear peak
439
+ is shown at 2 × FSR down shifted from the pump fre-
440
+ quency, which is the idler generated from the FWM pro-
441
+ cess between the pump and signal in the ring resonator.
442
+ The nonlinear index n2 and nonlinear parameter γ of
443
+ the SiON waveguide in this platform can be estimated
444
+ from the conversion efficiency between the signal and
445
+ the idler (See the supplementary for details of the cal-
446
+ culation). Fig. 4 (c) shows the measured conversion ef-
447
+ ficiency of the FWM process at different pump power.
448
+ Based on this measurement, the calculated γ and n2
449
+ of the 2.2 µm-wide SiON waveguide are 0.024 m−1W−1
450
+ and 4.16 ×10−20 m2/W, respectively. We also estimated
451
+ the nonlinear parameter γ of the SiON waveguides with
452
+ different widths based on the measured value of n2, as
453
+ shown in Fig. 4 (d).
454
+ The γ decreases from around
455
+ 0.025 m−1W−1 to 0.020 m−1W−1 when the waveguide
456
+ width reduces from 2.0 µm to 3.5 µm.
457
+ DISCUSSION
458
+ For Brillouin-Kerr interactions, the balance between
459
+ the nonlinearities needs to be considered. In microcavi-
460
+ ties, it is generally preferred to have larger Brillouin gain,
461
+ as it is easier to inhibit cascading or other unwanted in-
462
+ teractions via mode manipulation. Comparing the values
463
+ of the measured gb in Fig. 2 (i) and γ in Fig. 4 (a), the
464
+ SiON waveguides reported here have an order of magni-
465
+ tude larger Brillouin gain compared to Kerr nonlinearity.
466
+ This gb/γ ratio is similar to previous demonstrations of
467
+ Brillouin-assisted Kerr frequency combs in [27, 28], show-
468
+ ing the potential to realize it in an integrated platform.
469
+ In conclusion, we have investigated the Brillouin and
470
+ Kerr properties of a SiON integrated platform with a
471
+ relatively low refractive index. We observed, for the first
472
+ time, the backward SBS response of those SiON wave-
473
+ guides.
474
+ We also measured its nonlinear index n2 and
475
+ nonlinear parameter γ. These SiON waveguides can be
476
+ fabricated in a versatile and low-loss integrated platform,
477
+ and can potentially lead to a plethora of Brillouin and
478
+ Kerr-based applications,
479
+ including narrow-bandwidth
480
+ microwave photonic filters, and narrow-linewidth lasers,
481
+ and optical frequency combs.
482
+ AUTHOR CONTRIBUTIONS
483
+ D.M. and K.Y. developed the concept and proposed
484
+ the physical system.
485
+ K.Y. and Y.K. developed and
486
+ performed numerical simulations.
487
+ K.Y. performed the
488
+ SBS characterisation with input from R.B., K.Y., and
489
+ O.D. Y.K. and K.Y. performed the FWM experiments.
490
+ O.A.J.G., F.M., and A.M. developed and fabricated the
491
+ samples. K.Y., D.M., and Y.K. wrote the manuscript.
492
+ D.M. led and supervised the entire project.
493
+ FUNDING INFORMATION
494
+ This project is funded by the European Research
495
+ Council Consolidator Grant (101043229 TRIFFIC) and
496
+ Nederlandse Organisatie voor Wetenschappelijk Onder-
497
+ zoek (NWO) projects (740.018.021 and 15702).
498
+
499
+ Pump
500
+ -80 -70 -60 -50 -40 -30
501
+ a
502
+ Signal
503
+ 2
504
+ Power [dBm]
505
+ FWHM:
506
+ 2 x FSR
507
+ 612 MHz
508
+ S
509
+ Idler
510
+ 8
511
+ 2
512
+ 4
513
+ 6
514
+ -100
515
+ -50
516
+ 50
517
+ 100
518
+ Frequency [GHz]
519
+ Frequency [GHz]
520
+ d
521
+ c
522
+ 0.021 0.023 0.025
523
+ -34
524
+ n [dB]
525
+ -38
526
+ -42
527
+ -46
528
+ 21
529
+ 23
530
+ 25
531
+ 27
532
+ 2.0
533
+ 2.5
534
+ 3.0
535
+ 3.5
536
+ Pump power [dBm]
537
+ Waveguide width [μm][1] B. J. Eggleton, C. G. Poulton, P. T. Rakich, M. J. Steel,
538
+ and G. Bahl, “Brillouin integrated photonics,” Nature
539
+ Photonics, 2019.
540
+ [2] R. Pant, C. G. Poulton, D.-Y. Choi et al., “On-chip stim-
541
+ ulated brillouin scattering,” Optics Express, vol. 19, pp.
542
+ 8285–8290, 4 2011.
543
+ [3] E. A. Kittlaus, N. T. Otterstrom, P. Kharel, S. Gertler,
544
+ and P. T. Rakich, “Non-reciprocal interband brillouin
545
+ modulation,” Nature Photonics, vol. 12, pp. 613–619,
546
+ 2018.
547
+ [4] E. A. Kittlaus, N. T. Otterstrom, and P. T. Rakich, “On-
548
+ chip inter-modal brillouin scattering,” Nature Communi-
549
+ cations, vol. 8, pp. 1–9, 2017.
550
+ [5] E. A. Kittlaus, H. Shin, and P. T. Rakich, “Large bril-
551
+ louin amplification in silicon,” Nature Photonics, vol. 10,
552
+ pp. 463–467, 2016.
553
+ [6] P. T. Rakich, C. Reinke, R. Camacho, P. Davids, and
554
+ Z. Wang, “Giant enhancement of stimulated brillouin
555
+ scattering in the subwavelength limit,” Physical Review
556
+ X, vol. 2, p. 11008, 2012.
557
+ [7] S. Gundavarapu, G. M. Brodnik, M. Puckett et al., “Sub-
558
+ hertz fundamental linewidth photonic integrated bril-
559
+ louin laser,” Nature Photonics, vol. 13, pp. 60–67, 12
560
+ 2018.
561
+ [8] R. Botter, K. Ye, Y. Klaver et al., “Guided-acoustic stim-
562
+ ulated brillouin scattering in silicon nitride photonic cir-
563
+ cuits,” Science Advances, vol. 8, p. 2196, 10 2022.
564
+ [9] D. Marpaung, J. Yao, and J. Capmany, “Integrated mi-
565
+ crowave photonics,” Nature Photonics, vol. 13, pp. 80–90,
566
+ 2019.
567
+ [10] D. Marpaung, B. Morrison, M. Pagani et al., “Low-
568
+ power, chip-based stimulated brillouin scattering mi-
569
+ crowave photonic filter with ultrahigh selectivity,” Op-
570
+ tica, vol. 2, p. 76, 2015.
571
+ [11] L. McKay, M. Merklein, A. C. Bedoya et al., “Brillouin-
572
+ based phase shifter in a silicon waveguide,” Optica, Vol.
573
+ 6, Issue 7, pp. 907-913, vol. 6, pp. 907–913, 7 2019.
574
+ [12] N. T. Otterstrom, R. O. Behunin, E. A. Kittlaus,
575
+ Z. Wang, and P. T. Rakich, “A silicon brillouin laser,”
576
+ Science, vol. 360, pp. 1113–1116, 6 2018.
577
+ [13] N. Chauhan, A. Isichenko, K. Liu et al., “Visible light
578
+ photonic integrated brillouin laser,” Nature Communica-
579
+ tions 2021 12:1, vol. 12, pp. 1–8, 8 2021.
580
+ [14] J.
581
+ Kim,
582
+ M.
583
+ C.
584
+ Kuzyk,
585
+ K.
586
+ Han,
587
+ H.
588
+ Wang,
589
+ and
590
+ G. Bahl, “Non-reciprocal brillouin scattering induced
591
+ transparency,” Nature Physics, vol. 11, pp. 275–280, 1
592
+ 2015.
593
+ [15] S. Li, X. Li, W. Zhang, J. Chen, and W. Zou, “Inves-
594
+ tigation of brillouin properties in high-loss doped silica
595
+ waveguides by comparison experiment,” IEEE Photon-
596
+ ics Technology Letters, vol. 32, pp. 948–951, 2020.
597
+ [16] W. Jin, L. Chang, W. Xie et al., “Stimulated brillouin
598
+ scattering in algaas on insulator waveguides,” Conference
599
+ on Lasers and Electro-Optics, paper SM4L.7, 2020.
600
+ [17] Q. Liu, H. Li, and M. Li, “Electromechanical brillouin
601
+ scattering in integrated optomechanical waveguides,”
602
+ Optica, vol. 6, pp. 778–785, 2019.
603
+ [18] F. Gyger, J. Liu, F. Yang et al., “Observation of stim-
604
+ ulated brillouin scattering in silicon nitride integrated
605
+ waveguides,” Physical Review Letters, vol. 124, 2020.
606
+ [19] D. J. Moss, R. Morandotti, A. L. Gaeta, and M. Lipson,
607
+ “New cmos-compatible platforms based on silicon nitride
608
+ and hydex for nonlinear optics,” Nature Photonics, vol. 7,
609
+ pp. 597–607, 7 2013.
610
+ [20] A. Trenti, M. Borghi, S. Biasi et al., “Thermo-optic coef-
611
+ ficient and nonlinear refractive index of silicon oxynitride
612
+ waveguides,” AIP Advances, vol. 8, p. 025311, 2 2018.
613
+ [21] T. Baak, “Silicon oxynitride; a material for grin optics,”
614
+ Applied Optics, Vol. 21, Issue 6, pp. 1069-1072, vol. 21,
615
+ pp. 1069–1072, 3 1982.
616
+ [22] H. T. Grahn, H. J. Maris, J. Tauc, and K. S. Hat-
617
+ ton, “Elastic properties of silicon oxynitride films deter-
618
+ mined by picosecond acoustics,” Applied Physics Letters,
619
+ vol. 53, p. 2281, 12 1998.
620
+ [23] M. Rowley, P. H. Hanzard, A. Cutrona et al., “Self-
621
+ emergence of robust solitons in a microcavity,” Nature
622
+ 2022 608:7922, vol. 608, pp. 303–309, 8 2022.
623
+ [24] X. Xu, M. Tan, B. Corcoran et al., “11 tops photonic con-
624
+ volutional accelerator for optical neural networks,” Na-
625
+ ture 2020 589:7840, vol. 589, pp. 44–51, 1 2021.
626
+ [25] C. Reimer, M. Kues, P. Roztocki et al., “Generation of
627
+ multiphoton entangled quantum states by means of in-
628
+ tegrated frequency combs,” Science, vol. 351, pp. 1176–
629
+ 1180, 3 2016.
630
+ [26] G. Piccoli,
631
+ M. Sanna,
632
+ M. Borghi,
633
+ L. Pavesi,
634
+ and
635
+ M. Ghulinyan, “Silicon oxynitride platform for linear and
636
+ nonlinear photonics at nir wavelengths,” Optical Materi-
637
+ als Express, vol. 12, 2022.
638
+ [27] Y. Bai, M. Zhang, Q. Shi et al., “Brillouin-kerr soliton
639
+ frequency combs in an optical microresonator,” Phys.
640
+ Rev. Lett., vol. 126, p. 063901, Feb 2021.
641
+ [28] M. Nie, K. Jia, Y. Xie et al., “Synthesized spatiotem-
642
+ poral mode-locking and photonic flywheel in multimode
643
+ mesoresonators,” Nature Communications 2022 13:1,
644
+ vol. 13, pp. 1–9, 10 2022.
645
+ [29] F. Morichetti, S. Grillanda, S. Manandhar et al., “Alpha
646
+ radiation effects on silicon oxynitride waveguides,” ACS
647
+ Photonics, vol. 3, pp. 1569–1574, 9 2016.
648
+ [30] F. Morichetti, A. Melloni, A. Breda et al., “A reconfig-
649
+ urable architecture for continuously variable optical slow-
650
+ wave delay lines,” Optics Express, vol. 15, pp. 17 273–
651
+ 17 282, 12 2007.
652
+ [31] C. G. Poulton, R. Pant, and B. J. Eggleton, “Acoustic
653
+ confinement and stimulated brillouin scattering in inte-
654
+ grated optical waveguides,” JOSA B, vol. 30, pp. 2657–
655
+ 2664, 10 2013.
656
+ [32] P. P. Absil, J. V. Hryniewicz, B. E. Little et al., “Wave-
657
+ length conversion in gaas micro-ring resonators,” Optics
658
+ Letters, vol. 25, pp. 554–556, 4 2000.
659
+
660
+ SUPPLEMENTARY NOTE A: DETAILS OF THE SBS EXPERIMENTS
661
+ Experiment setup
662
+ We applied the double-intensity-modulation pump-probe technique to characterize the Brillouin gain coefficient of
663
+ the SiON 5-cm straight waveguides with different widths. Fig. S1 shows the schematic of the experimental setup. The
664
+ pump laser (Agere D2525P22) operates at 1562 nm and is modulated by an intensity modulator (Thorlabs LN81S-FC)
665
+ with a 10.075 MHz sine signal generated by an RF signal generator (Keysight EDU33212A). The pump signal is then
666
+ amplified by an Erbium-doped fiber amplifier (EDFA, Amonics AEDFA-33-B-FA) to 28.7 dBm. After that, the pump
667
+ signal passes an optical circulator (Thorlabs 6015-3-APC) and a polarization controller (Thorlabs FPC032) before it
668
+ is coupled into the chip with an AR-coated polarization maintaining lensed fiber with a spot size of 2 µm (OZ optics).
669
+ The transmitted pump power is monitored with a power meter (Thorlabs S144C). The coupling loss of the sample is
670
+ 3 dB per facet.
671
+ Fig. S1. Schematic of the setup used for the SBS characterization. EDFA: erbium-doped fiber amplifier, PM: optical power
672
+ meter, PC: fiber polarization controller, PD: photodetector, RF: radiofrequency signal generator.
673
+ The probe laser (Newport TLB-6728-P) sweeps at frequencies down shifted from the pump laser by about 15 GHz.
674
+ The probe is modulated by an intensity modulator of the same model (Thorlabs LN81S-FC) with a 10 MHz signal
675
+ generated by the other channel of the RF signal generator (Keysight EDU33212A). It is then amplified by an EDFA
676
+ (Amonics AEDFA-PA-35-B-FA) to 21.6 dBm. After that, the probe signal passes an optical circulator (Thorlabs
677
+ 6015-3-APC) and a polarization controller (Thorlabs FPC032) before it is coupled into the other side of the chip with
678
+ an identical lensed fiber. The transmitted probe signal passes through an optical bandpass filter (EXFO XTM-50) to
679
+ filter out the reflected pump. After that, 1% of the probe signal is tapped into the power meter (Thorlabs S144C).
680
+ The remaining probe signal is sent into a photodiode (Optilab PD-23-C-DC). The detected electrical signal is then
681
+ analyzed with a lock-in amplifier (Z¨urich Instruments, MFLI 500 kHz) that is synchronized with the RF source.
682
+ TABLE S1 lists the experimental parameters of the setup.
683
+ TABLE S1. The experimental parameters of the SBS characterization setup.
684
+ Parameter Value
685
+ Unit
686
+ Description
687
+ Pprobe
688
+ 21.6
689
+ dBm
690
+ Probe optical power after amplification
691
+ Ppump
692
+ 28.7
693
+ dBm
694
+ Pump optical power after amplification
695
+ Vπ,probe
696
+ 7.2
697
+ V
698
+ Vπ @ DC of the probe modulator
699
+ Vπ,pump
700
+ 6.4
701
+ V
702
+ Vπ @ DC of the pump modulator
703
+ Pmod,probe
704
+ 0
705
+ dBm
706
+ RF power sent to probe modulator
707
+ Pmod,pump
708
+ 0
709
+ dBm
710
+ RF power sent to pump modulator
711
+ rpd
712
+ 1.05
713
+ A/W
714
+ Photodiode sensitivity
715
+ Ppd
716
+ 6.0
717
+ dBm
718
+ Optical power detected at the photodiode
719
+ αc
720
+ 3
721
+ dB/facet Coupling loss per facet, including fiber components
722
+
723
+ Optical path
724
+ RF path
725
+ sync. clk
726
+ RF
727
+ Lock-in
728
+ amplifier
729
+ source
730
+ PD
731
+ 99%
732
+ 1%
733
+ Z
734
+ PM 2
735
+ 10 MHz
736
+ 10 MHz + 75 kHz
737
+ PM 1
738
+ Optical
739
+ bandpass filter
740
+ PC1
741
+ PC2
742
+ Intensity
743
+ Intensity
744
+ Probe w1
745
+ EDFA 1
746
+ SiON waveguides
747
+ EDFA 2
748
+ zm dwnd
749
+ modulator 1
750
+ modulator 2TABLE S2. Simulated and measured Brillouin properties of SiON waveguides.
751
+ Waveguide
752
+ Frequency shift
753
+ Linewidth
754
+ Gain coefficient
755
+ width
756
+ Simulated Measured Simulated Measured Simulated Measured
757
+ (µm)
758
+ (GHz)
759
+ (GHz)
760
+ (MHz)
761
+ (MHz)
762
+ (m−1W−1) (m−1W−1)
763
+ 2.0
764
+ 15.70
765
+ 14.22
766
+ 154
767
+ 358
768
+ 0.35
769
+ 0.10
770
+ 2.2
771
+ 15.70
772
+ 14.31
773
+ 139
774
+ 282
775
+ 0.40
776
+ 0.15
777
+ 2.3
778
+ 15.71
779
+ 14.40
780
+ 131
781
+ 280
782
+ 0.42
783
+ 0.17
784
+ 2.4
785
+ 15.71
786
+ 14.44
787
+ 125
788
+ 269
789
+ 0.44
790
+ 0.19
791
+ 2.6
792
+ 15.71
793
+ 14.43
794
+ 115
795
+ 213
796
+ 0.47
797
+ 0.24
798
+ 3.5
799
+ 15.73
800
+ 14.48
801
+ 92
802
+ 105
803
+ 0.52
804
+ 0.32
805
+ Brillouin gain coefficient calculation
806
+ The SBS gain in a waveguide is determined by:
807
+ G = egBLeffPpump,
808
+ (S1)
809
+ where gB is the Brillouin gain coefficient in m−1W−1, Leff is the effective length of the waveguide, and Ppump is the
810
+ on-chip pump power.
811
+ The effective length of a waveguide is calculated using:
812
+ Leff = 1 − e−αL
813
+ α
814
+ ,
815
+ (S2)
816
+ where α is the propagation loss, and L is the actual waveguide length.
817
+ By using (S1), and taking the small signal approximation we can calculate the gain coefficient using:
818
+ gB,SDS = VSDS
819
+ Vfiber
820
+ gB,fiberLeff,fiberPpump,fiber
821
+ Leff,SDSPpump,SDS
822
+ (S3)
823
+ Here V denotes the signal voltage measured by the lock-in amplifier, the subscripts fiber and SDS refer to the
824
+ properties of the fiber and chip used in this experiment.
825
+ Comparison between the measurement and simulation results
826
+ The simulated SBS responses of the 2.0 µm, 2.2 µm, 2.3 µm, 2.4 µm, 2.6 µm, and 3.5 µm-wide SiON waveguides
827
+ are shown in Fig. S2. The peak of the simulated SBS responses increases and shifts towards higher frequencies as the
828
+ waveguide becomes wider, in the meantime, the linewidth also becomes narrower, all of which are coherent with the
829
+ trend of our measurement results.
830
+ We compared the Brillouin frequency shift, linewidth, and the Brillouin gain coefficient of different waveguides
831
+ between the simulation and the measurement results in TABLE S2.
832
+ The simulated Brillouin frequency shift is
833
+ 1.3 GHz higher than the measured results, which is less than 10% of the total frequency shift. The measured SBS
834
+ linewidth of different waveguides are constantly larger than the simulations, however, the discrepancy keeps reducing
835
+ as the waveguide becomes wider. The broader linewidth we measured could be contributed to the non-uniformity of
836
+ the waveguides. There is also a discrepancy between the measured and the simulated Brillouin gain coefficients of
837
+ different waveguides. The lower measurement values could come from the increasing coupling loss when we pump
838
+ higher power into the samples. Nevertheless, the measured value also matches better with the simulation results for
839
+ the wider waveguides.
840
+
841
+ Fig. S2. Simulated SBS responses of the 2.0 µm, 2.2 µm, 2.3 µm, 2.4 µm, 2.6 µm, and 3.5 µm-wide SiON waveguides.
842
+ SUPPLEMENTARY NOTE B: DETAILS OF THE FWM EXPERIMENTS
843
+ Ring resonator characterization
844
+ Before we performed the four-wave mixing (FWM) experiment, we first characterized the ring resonator with the
845
+ experimental setup shown in Fig. S3.
846
+ The laser (Agere D2525P22) was modulated with an intensity modulator
847
+ (Thorlabs LN05S-FC) and was sent to the optical bandpass filter (EXFO XTM-50) to filter out the lower sideband.
848
+ After that, the light is coupled into the sample with the lensed fiber and coupled out from the other side of the
849
+ chip. The signal was then amplified by the EDFA (Amonics AEDFA-33-B-FA) and converted to the RF domain
850
+ with a photodiode (Optilab PD-23-C-DC). We swept the sideband of the light across the resonance response of the
851
+ ring resonator using the vector network analyzer (VNA, Keysight P5007A) with an RF power of -5 dBm. From the
852
+ measured S21 parameter, we then can get the linewidth of the ring resonator with MHz-level resolution, in addition,
853
+ we can use phase information to confirm the ring is over-coupled.
854
+
855
+ 0.5
856
+ 2.0 um
857
+ 1
858
+ 1
859
+ 0.0
860
+ -
861
+ 0.5
862
+ -
863
+ 2.2 um
864
+ 0.0
865
+ -
866
+ 0.5
867
+ 2.3 um
868
+ [m-1 W-1]
869
+ 0.0
870
+ b
871
+ 60
872
+ 0.5
873
+ 2.4 um
874
+ 0.0
875
+ 0.5
876
+ 2.6 um
877
+ 0.0
878
+ 0.5
879
+ 3.5 um
880
+ F0'0
881
+ 15.3
882
+ 15.5
883
+ 15.7
884
+ 15.9
885
+ 16.1
886
+ Brillouin frequency shift [GHz]Fig. S3. Schematic of the setup used for ring resonator characterization. PC: polarization controller, PD: photodetector,
887
+ EDFA: erbium-doped fiber amplifier, VNA: vector network analyzer.
888
+ TABLE S3. The experimental parameters of the FWM characterization setup.
889
+ Parameter Value Unit
890
+ Description
891
+ Ppump
892
+ 20.3
893
+ dBm
894
+ Input pump optical power
895
+ Psignal
896
+ 6.3
897
+ dBm
898
+ Input signal optical power
899
+ Pider
900
+ -38.7
901
+ dBm
902
+ Output idler optical power
903
+ δvpump
904
+ 110
905
+ MHz
906
+ Detuning of the pump light
907
+ δvsignal
908
+ 197.5
909
+ MHz
910
+ Detuning of the signal light
911
+ δvidler
912
+ 417.5
913
+ MHz
914
+ Detuning of the idler light
915
+ FEpump
916
+ 31
917
+ -
918
+ Enhancement factor of the pump light
919
+ FEsignal
920
+ 25.2
921
+ -
922
+ Enhancement factor of the signal light
923
+ FEider
924
+ 12.4
925
+ -
926
+ Enhancement factor of the idler light
927
+ Leff
928
+ 386
929
+ mm
930
+ Effective length of the ring resonator
931
+ FWM experiment setup
932
+ We measured the nonlinear index n2 and nonlinear parameter γ of the SiON waveguide with the FWM experiments
933
+ in the all-pass ring resonator. The experimental setup was shown in Fig.S4. The pump laser (Santec TSL-210) operates
934
+ at 1562 nm and is amplified with an EDFA (Amonics AEDFA-33-B-FA). After that, the pump is sent to an optical
935
+ bandpass filter (EXFO XTM-50) to filter out the amplified spontaneous emission. The signal laser (Agere D2525P22)
936
+ is set close to 2xFSR (100 GHz) away from the pump and is amplified with an EDFA (Amonics AEDFA-37-R-FA).
937
+ The pump is thermally locked close to the resonance of the ring resonator, while the frequency of the probe is tuned
938
+ manually. The pump and the signal are combined with a 99:1 optic coupler (Thorlabs TN1550R1A2) and coupled
939
+ into the all-pass ring resonator with an AR-coated lensed fiber with a spot size of 2 µm (OZ optics). The generated
940
+ idler together with the pump and signal is then coupled out from the chip and sent to the optical spectrum analyzer
941
+ (Finisar Waveanalyzer 1500S) to measure the conversion efficiency from the signal to the idler. The experimental
942
+ parameters are listed in TABLE S3.
943
+ The conversion efficiency η of the four-wave mixing in an all-pass ring resonator is [32]:
944
+ Fig. S4. Schematic of the setup used for four-wave mixing experiment. PC: polarization controller, EDFA: erbium-doped fiber
945
+ amplifier, OSA: optical spectrum analyzer.
946
+
947
+ VNA
948
+ Optical path
949
+ RF path
950
+ 88
951
+ PC
952
+ PD
953
+ Laser
954
+ Intensity
955
+ Optical
956
+ SiON all-pass
957
+ EDFA
958
+ modulator
959
+ bandpass filter
960
+ ring resonatorPC1
961
+ EDFA 1
962
+ Optical
963
+ Pump w1
964
+ bandpass filter
965
+ 99%
966
+ 88
967
+ OSA
968
+ 1%
969
+ PC2
970
+ SiON all-pass ring resonator
971
+ Signal w2
972
+ EDFA 2η = (γLeffPp)2 |FE (ωp)|4 |FE (ωs)|2 |FE (ωi)|2 ,
973
+ (S4)
974
+ where the L is the circumference of the ring resonator, Pp is the on-chip pump power, and the FE(ωp,s,i) is the field
975
+ enhancement factor of the pump, signal, and idler, respectively.
976
+ The effective length considers both the attenuation and the phase mismatch of the four-wave mixing process:
977
+ L2
978
+ eff = L2e−αL
979
+ ����
980
+ 1 − exp(−α + i∆kL)
981
+ αL − i∆kL
982
+ ����
983
+ 2
984
+ ,
985
+ (S5)
986
+ where α is the propagation loss, and the ∆k is the phase mismatch between the pump, signal, and idler.
987
+ The field enhancement factor can be calculated by:
988
+ |FE| =
989
+ �����
990
+ √κ
991
+ 1 − √1 − κ exp(−αL/2) cos
992
+
993
+ − 2πδv
994
+ F SR
995
+
996
+ ����� ,
997
+ (S6)
998
+ where the κ is the power coupling coefficient and the δv is the detuning. We calculated the detuning of the pump and
999
+ the signal by comparing the extinction ratio of the light and the resonance response of the ring resonator. Assuming
1000
+ negligible dispersion, the detuning of the idler can be obtained based on:
1001
+ ��vidler = 2δvpump + δvsignal
1002
+ (S7)
1003
+ The nonlinear parameter γ can be calculated by combining (S4 - S7). Moreover, the nonlinear index n2 can be
1004
+ calculated from the nonlinear parameter γ by:
1005
+ n2 = cAeffγ
1006
+ ω
1007
+ ,
1008
+ (S8)
1009
+ where the ω is the angular frequency of the pump, c is the speed of light in the vacuum and Aeff is the effective mode
1010
+ area of the waveguide.
1011
+
99FRT4oBgHgl3EQfrDen/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9dAzT4oBgHgl3EQf-_6e/content/2301.01942v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b085152b9d5598edee2034512802290c33ac99ecff4f2ef7a63e453e9331eede
3
+ size 1720528
9dAzT4oBgHgl3EQf-_6e/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1d67426d3901afd2d43bf634cebb9f1a657f930f00780e1a3441aeae99d38065
3
+ size 3211309
9dAzT4oBgHgl3EQf-_6e/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9b332f894a5efdb73cf51ca7c3af0b80791803fff541a44fc7a1ff1e1bbbf24a
3
+ size 110998
AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/2301.03553v1.pdf.txt ADDED
@@ -0,0 +1,1891 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ FedDebug: Systematic Debugging for Federated
2
+ Learning Applications
3
+ Waris Gill
4
+ Computer Science Department
5
+ Virginia Tech
6
+ Blacksburg, USA
7
8
+ Ali Anwar
9
+ Computer Science and Engineering Department
10
+ University of Minnesota
11
+ Minneapolis, USA
12
13
+ Muhammad Ali Gulzar
14
+ Computer Science Department
15
+ Virginia Tech
16
+ Blacksburg, USA
17
18
+ Abstract—In Federated Learning (FL), clients train a model
19
+ locally and share it with a central aggregator to build a global
20
+ model. Impermissibility to access client’s data and collaborative
21
+ training makes FL appealing for applications with data-privacy
22
+ concerns such as medical imaging. However, these FL charac-
23
+ teristics pose unprecedented challenges for debugging. When a
24
+ global model’s performance deteriorates, finding the round and
25
+ the clients responsible is a major pain point. Developers resort
26
+ to trial-and-error debugging with subsets of clients, hoping to
27
+ increase the accuracy or let future FL rounds retune the model,
28
+ which are time-consuming and costly.
29
+ We design a systematic fault localization framework, FEDDE-
30
+ BUG, that advances the FL debugging on two novel fronts. First,
31
+ FEDDEBUG enables interactive debugging of realtime collabora-
32
+ tive training in FL by leveraging record and replay techniques
33
+ to construct a simulation that mirrors live FL. FEDDEBUG’s
34
+ breakpoint can help inspect an FL state (round, client, and
35
+ global model) and seamlessly move between rounds and clients’
36
+ models, enabling a fine-grained step-by-step inspection. Second,
37
+ FEDDEBUG automatically identifies the client responsible for
38
+ lowering global model’s performance without any testing data
39
+ and labels–both are essential for existing debugging techniques.
40
+ FEDDEBUG’s strengths come from adapting differential testing
41
+ in conjunction with neurons activations to determine the precise
42
+ client deviating from normal behavior. FEDDEBUG achieves
43
+ 100% to find a single client and 90.3% accuracy to find multiple
44
+ faulty clients. FEDDEBUG’s interactive debugging incurs 1.2%
45
+ overhead during training, while it localizes a faulty client in only
46
+ 2.1% of a round’s training time. With FEDDEBUG, we bring
47
+ effective debugging practices to federated learning, improving
48
+ the quality and productivity of FL application developers.
49
+ Index Terms—software debugging, federated learning, testing,
50
+ fault localization
51
+ I. INTRODUCTION
52
+ Many machine learning models today require private user
53
+ information for training accurate models. However, users are
54
+ naturally reluctant to share such data to minimize the risk
55
+ of privacy violation. To address the above needs, Federated
56
+ Learning (FL) [42] enables individual participating clients
57
+ (e.g., smart-home edge devices) to train a machine learning
58
+ (ML) model on their local data in a privacy-preserving envi-
59
+ ronment, and then send the trained model (e.g., the weights
60
+ of the neural network) to a central aggregator to build a
61
+ global model. FL trains highly accurate models without ever
62
+ accessing user data, keeping clients’ data privacy intact [33].
63
+ With the advent of frameworks like Fedml [15], and IBMFL
64
+ [38], FL is actively used in solving real-world problems [20],
65
+ [37], [47], [73].
66
+ Problems.
67
+ The
68
+ support
69
+ for
70
+ collaborative
71
+ yet
72
+ privacy-
73
+ preserving training on FL frameworks comes at the cost
74
+ of transparency and comprehension, making debugging pro-
75
+ hibitively complicated. For instance, a faulty client can send
76
+ an inaccurate model to the aggregator either due to noisy labels
77
+ [18], [22], [28], [30], [31], [44], [72] in the training data or
78
+ malicious intent to deteriorate the global model’s performance
79
+ [1]–[3], [7]. Finding such a faulty client is challenging due
80
+ to a large number of unpredictable clients, that may not have
81
+ participated in every round because of a poor network connec-
82
+ tion or low battery power [54], [63]. The FL training process
83
+ also spans numerous rounds which significantly increases the
84
+ search space for identifying the true, culprit round. None of
85
+ the existing FL frameworks provide debugging and testing
86
+ support to assist the developers building FL applications using
87
+ FL frameworks [24]. These developers rely on guesswork and
88
+ expensive trail-error debugging to find a fault-inducing client.
89
+ Challenges. FL poses two fundamental challenges when de-
90
+ signing a debugging technique. First, in FL deployments, train
91
+ and test data are kept private and strictly reside with clients.
92
+ Access to such data could allow developers to evaluate indi-
93
+ vidual clients’ models sent to the aggregator and identify the
94
+ lowest performing model as the culprit, similar to traditional
95
+ ML model testing. Neither test data nor labels are available
96
+ to an FL application developer and, therefore, existing ML
97
+ debugging approaches [4], [13], [45], [46], [52], [55], [57],
98
+ [59], [61], [62], [71] are also inapplicable.
99
+ Second, due to the unpredictability of clients’ participation
100
+ in a round and the ephemeral nature of their contributions
101
+ in the global model, reproducing a fault (i.e., faulty client)
102
+ and then debugging it is not feasible. Traditional breakpoint
103
+ debugging will pause the entire training process in FL across
104
+ all clients, causing severe side-effects such as data loss as
105
+ clients may not have persistent storage to store data. Live
106
+ postmortem or trial-error debugging may lead to a new set of
107
+ clients for each round, based on client availability and quorum,
108
+ thus making debugging even more ineffective. Considering the
109
+ above limitations and challenges, we must design a debugging
110
+ approach that does not rely on clients’ data, can debug a live
111
+ arXiv:2301.03553v1 [cs.SE] 9 Jan 2023
112
+
113
+ FL application without any interference, and can localize a
114
+ faulty client precisely.
115
+ Contributions. We take inspiration from traditional debug-
116
+ gers, such as gdb, and redesign traditional debugging con-
117
+ structs that are tailored to the needs of an FL application
118
+ developer. Our approach, FEDDEBUG, selectively records an
119
+ FL application’s telemetry data to enable realtime interactive
120
+ debugging on a simulation that mirrors a live FL application.
121
+ With FEDDEBUG’s breakpoint, a developer can spawn a
122
+ simulation of a live FL application and inspect the current
123
+ state containing information such as clients’ models and their
124
+ reported metrics (e.g., their training loss or hyperparameters).
125
+ It also allows a seamless transition between the rounds and
126
+ clients at a given breakpoint, enabling a fine-grained step-by-
127
+ step inspection of the application’s state. When a developer
128
+ finds a suspicious state (e.g., multiple clients report high
129
+ training loss), FEDDEBUG’s novel automated fault localization
130
+ approach precisely identifies the faulty client without ever
131
+ needing any test data or labels. Once a faulty client is iden-
132
+ tified, FEDDEBUG’s fix and replay repairs the global training
133
+ by retroactively removing the client and resumes the live FL
134
+ training.
135
+ Key Insights. FEDDEBUG leverages several insights to enable
136
+ systematic FL debugging while preserving clients’ privacy. We
137
+ observe that instead of debugging a live FL application, we
138
+ can record a set of runtime metrics essential to regenerate a
139
+ given state in an FL application. Thus, FEDDEBUG performs
140
+ debugging on a regenerated simulated state equivalent to a
141
+ live state. To have a measurable impact on the global model,
142
+ a faulty client’s model must behave differently than the regular
143
+ clients. Every client in an FL application has the same model
144
+ architecture, so their internal behaviors are comparable. Based
145
+ on this insight, FEDDEBUG proposes an inference-guided
146
+ test selection method to select high-quality and diverse test
147
+ data from a pool of randomly generated input images using
148
+ Kaiming Initialization [17]. However, an auto-generated data
149
+ does not include the class label i.e., an oracle. To address the
150
+ oracle problem with such data, FEDDEBUG adapts differential
151
+ testing to FL domain. It captures differences in the models’
152
+ execution via neuron activations instead of output labels to
153
+ identify diverging behavior of a faulty client.
154
+ Evaluations. We perform large-scale, extensive evaluation of
155
+ FEDDEBUG on popular models, two large-scale datasets, two
156
+ well-established FL data distributions, and a real-world fault-
157
+ injection technique in a total of 68 different FL configurations.
158
+ We evaluate FEDDEBUG on fault localizability, debugging
159
+ time, performance overhead over a vanilla FL framework
160
+ (IBMFL), and scalability. FEDDEBUG shows remarkable suc-
161
+ cess in identifying faulty clients. It can localize the real-
162
+ world faulty client with 100% accuracy within 2.1% of a
163
+ round’s training time. When faced with multiple faulty clients,
164
+ FEDDEBUG retains the high fault localization accuracy i.e.,
165
+ 90.3%. FEDDEBUG’s debugging constructs incur an overhead
166
+ of 48% of the aggregation time to record telemetry data for
167
+ state regeneration. Surprisingly, this time is only 1.2% of
168
+ a single round’s training time in our experiments. Through
169
+ Hospital1
170
+ 2
171
+ HospitalN
172
+ 2
173
+ Hospital2
174
+ 2
175
+ Hospital3
176
+ 2
177
+ Central
178
+ Aggregator
179
+ Server
180
+ 4
181
+
182
+ 1
183
+ 1
184
+ 1
185
+ 1
186
+ 3
187
+ 3
188
+ 3
189
+ 3
190
+ Aggregation
191
+ Developer
192
+ Fig. 1: In a centralized FL architecture, an aggregator sends a
193
+ global model to clients (step 1). Each client trains the model
194
+ on local data (step 2) and sends the locally trained model back
195
+ to the server (step 3). The server aggregates all models to form
196
+ a new global model (step 4).
197
+ our evaluation, we demonstrate that FEDDEBUG effectively
198
+ conducts interactive debugging and efficiently automates fault
199
+ localization without incurring high runtime costs. FEDDEBUG
200
+ augments the IBMFL framework, but its underlying insights
201
+ can be adapted for other FL frameworks.
202
+ We summarize FEDDEBUG’s contributions below:
203
+ • Originality: To the best of our knowledge, FEDDEBUG
204
+ is the first general-purpose debugging framework for fed-
205
+ erated learning applications that is not limited by access
206
+ to clients’ data. It addresses open debugging challenges
207
+ in FL [24].
208
+ • Approach: Traditional ML trains a single model, whereas
209
+ FL involves distributed training across hundreds of clients
210
+ over multiple rounds. Thus, existing ML debugging ap-
211
+ proaches are inapplicable on FL. FEDDEBUG’s novelty
212
+ lies in observations about FL and the exploitation of in-
213
+ sights on reproducibility, inference guided test generation,
214
+ and differential testing that do not impede performance
215
+ or violate FL privacy principles.
216
+ • Benchmark: We evaluate FEDDEBUG in 68 FL config-
217
+ urations derived from well-established datasets, models,
218
+ varying clients, data distribution, and fault-injections.
219
+ We package our experiment environment into a public
220
+ benchmark for future research use.
221
+ • Usefulness: Our extensive experiments demonstrate that
222
+ FEDDEBUG successfully locates faulty client(s) with-
223
+ out impeding the FL workflow. On a wide range of
224
+ experiments, FEDDEBUG exhibits robust results against
225
+ multiple faulty clients, challenging data distributions, and
226
+ a large number of clients.
227
+ II. BACKGROUND AND MOTIVATION
228
+ A. Federated Learning
229
+ In Federated Learning, multiple clients locally train a model
230
+ on their data and share it with a central server (also called
231
+ an aggregator) to construct a global model. During this col-
232
+ laborative training, clients’ training data never leaves their
233
+ premises [24]. Figure 1 shows an FL setting where multiple
234
+ hospitals collaboratively train a global model on their local
235
+ labeled medical imaging data.
236
+ 1) In the first step, the aggregator sends copies of the
237
+ current global model, i.e., the global model weights,
238
+
239
+ and hyperparameters (e.g., learning rate and epochs) to
240
+ participating clients (Step 1 of Figure 1).
241
+ 2) Using the global model as initial parameters, each client
242
+ trains a model on its local data similar to traditional ML
243
+ training (Step 2 of Figure 1).
244
+ 3) Once trained, each client sends its local model, in the
245
+ form of updated weights, back to the aggregator as
246
+ shown in Step 3 of Figure 1. Additionally, clients share
247
+ performance metrics such as training loss and qual-
248
+ ity/quantity of training data with the central aggregator.
249
+ 4) After receiving model updates, the server aggregates the
250
+ updated weights from all clients using established model
251
+ aggregations such as FedAvg [42] to form a new global
252
+ model (Step 4 in Figure 1).
253
+ The four steps are repeated for a fixed number of rounds
254
+ or until the global model meets some convergence criteria, for
255
+ example, when training loss is close to zero. Note that not
256
+ every client participates in every round. There are additional
257
+ variants of federated learning (FL) such as vertical FL [36],
258
+ FL with differential privacy [60], decentralized FL [43], and
259
+ personalized FL [53]. Our work mainly focuses on the standard
260
+ FL, where the goal is to train a single global model.
261
+ B. Motivating Scenario
262
+ Suppose that an FL application developer trains a global
263
+ neural network model, ResNet [16], on chest X-ray images
264
+ from hospitals across the country to diagnose respiratory
265
+ diseases (e.g., Covid-19). We use the term developer to refer to
266
+ a person who writes, deploys, and monitors the FL application
267
+ at the central server as shown in Figure 1. Every participating
268
+ hospital collects X-rays of patients labelled by radiologists and
269
+ trains a local ResNet model on that data. Hospitals periodically
270
+ share their locally trained models with a central server. The
271
+ central server then aggregates these shared models into one
272
+ global model using FedAvg [42]. After aggregation, the central
273
+ server sends the updated global model to each hospital to
274
+ incorporate in local training in the next round, as shown in
275
+ Figure 1.
276
+ The developer observes that multiple hospitals are reporting
277
+ a high training loss from their preceding training rounds.
278
+ One plausible reason is that one of the hospitals performed
279
+ training on noisy, mislabelling by inexperienced staff [8], [22],
280
+ [30], [31] and continuously impacted the global model during
281
+ aggregation. Thus, when the global model is shared back with
282
+ the other hospitals, it influences their training.
283
+ Limitations for FL Debugging. After noticing an increase
284
+ in training loss, the developer must investigate the root cause,
285
+ as misdiagnosis can lead to ill-treatment. To debug the FL ap-
286
+ plication at this scale, the developer starts manually inspection
287
+ of the collected logs such as global model weights, shared
288
+ local models from hospitals, response/training time of each
289
+ hospital, at the central server. Due to patient’s privacy, the hos-
290
+ pitals refrain from sharing their labelled training data, which
291
+ is critical for correctly evaluating the quality of a model and
292
+ thus essential for localizing the faulty round and model. Even
293
+ if she can find the problematic round, she cannot isolate the
294
+ hospital(s) responsible for affecting the global model without
295
+ test data. One option is cross validating each client’s model
296
+ by requesting that other clients test the model on their local
297
+ data. This is prohibited in practice, as it adds computational
298
+ burden on clients (e.g., edge devices) and can potentially cause
299
+ data privacy violation. Lastly, statically inspecting hospitals’
300
+ models does not provide any meaningful information. Without
301
+ any debugging techniques at her disposal, she resorts to using
302
+ guesswork to identify the hospital with noisy labels (i.e., faulty
303
+ client).
304
+ FedDebug. The developer decides to use FEDDEBUG to
305
+ investigate the root cause behind high training loss. When
306
+ enabled, FEDDEBUG allows a developer to set a breakpoint
307
+ at any round with training loss. This breakpoint separately
308
+ invokes a debugging session, a simulation of the original FL
309
+ service, without stopping the live training. In the debugging
310
+ session, the developer uses FEDDEBUG’s step-back and step-
311
+ next constructs to move between rounds, inspecting the global
312
+ and local models of hospitals recorded by FEDDEBUG. Upon
313
+ inspecting the training rounds, she finds the specific round,
314
+ e.g., Round-8, where the performance starts to deteriorate.
315
+ This round can be different from the breakpoint enabled
316
+ round, as performance issues can manifest in earlier rounds but
317
+ surface later. During this inspection, FEDDEBUG also reports
318
+ the list of hospitals that participated in that round. Next, she
319
+ invokes FEDDEBUG’s fault localization algorithm to precisely
320
+ identify the hospital responsible for deteriorating the global
321
+ model, leading to lower performance. After finding the hospital
322
+ with noisy labels, developer removes it from the problematic
323
+ round (i.e., Round-8) and onwards. FEDDEBUG’s fix and
324
+ replay starts retraining from round Round-8 to the current
325
+ round, and then replaces the impacted global model with
326
+ the retrained global model and continues the original FL
327
+ application.
328
+ III. FEDDEBUG’S DEBUGGING CONSTRUCTS
329
+ The goal of FEDDEBUG is to facilitate an FL application
330
+ developer in isolating a faulty client responsible for dete-
331
+ riorating the global training. Recent studies emphasize the
332
+ need for debugging techniques in FL applications and the
333
+ challenges associated with providing debugging support in FL
334
+ frameworks [24]. To this end, we must overcome the following
335
+ major challenges in designing FEDDEBUG. First, the privacy
336
+ concerns of FL put restrictions on any client-side interference.
337
+ Second, the unpredictable and ephemeral nature of clients in
338
+ FL threatens reproducibility, which is critical for debugging
339
+ a live system. Third, the distributed nature with hundreds of
340
+ participating clients makes traditional breakpoint debugging
341
+ ineffective in FL. Pausing the entire FL application at this
342
+ scale will be prohibitively expensive. Therefore, traditional
343
+ debugging approaches, such as gdb, are not suited for the
344
+ FL systems’ scale and architecture.
345
+ In FEDDEBUG, we address the above challenges and ad-
346
+ vance the systematic FL application debugging. We enable
347
+ realtime, interactive debugging on a simulation of the live
348
+ FL application. To do so, FEDDEBUG’s continuously collects
349
+
350
+ G
351
+ Algo 2: Faulty Client Localization
352
+ Step back
353
+ C1
354
+ C3
355
+ C8
356
+ C20
357
+ FedAvg
358
+ C1
359
+ C3
360
+ C5
361
+ C8
362
+ C20
363
+ G
364
+ R20
365
+ FedAvg
366
+ C1
367
+ C3
368
+ C8
369
+ C20
370
+ FedAvg
371
+ C1
372
+ C3
373
+ C5
374
+ C8
375
+ C20
376
+ G
377
+ R21
378
+ FedAvg
379
+ C1
380
+ C3
381
+ C8
382
+ C20
383
+ G
384
+ R23
385
+ FedAvg
386
+ C1
387
+ C3
388
+ C5
389
+ C8
390
+ C20
391
+ R22
392
+ FedAvg
393
+ C1
394
+ C3
395
+ C8
396
+ C20
397
+ G
398
+ FedAvg
399
+ Step next
400
+ Step next
401
+ C5
402
+ C5
403
+ Step in
404
+ G
405
+ G
406
+ Resume
407
+ Resume
408
+ G
409
+ 3
410
+ 2
411
+ 4
412
+ 5
413
+ Breakpoint
414
+ 1
415
+ C5
416
+ Debugging Interface
417
+ IBMFL Interface
418
+ Fig. 2: Using FEDDEBUG, a developer can set a breakpoint
419
+ at round R20. When the FL application finishes round R20,
420
+ FEDDEBUG launches a Debugging Interface, reflected on the
421
+ right. Step next (—) takes the developer to the next step (round
422
+ or client). Step-in increases the granularity of computation,
423
+ e.g., round to client level. Resume (˜) will re-join the current
424
+ execution status of the FL application if no intrusive actions
425
+ are taken. At a given round, FEDDEBUG can automatically
426
+ localize the faulty client (™) and then resume (š) upon which
427
+ the global model will be recomputed without the faulty client.
428
+ This model will replace the corresponding round's model, and
429
+ FEDDEBUG will start retraining from that round, R22, in the
430
+ FL interface.
431
+ and stores concise telemetry data from a live FL application.
432
+ Whenever a debugging need arises, the developer can interact
433
+ with the FEDDEBUG’s debugging interface, which uses the
434
+ telemetry data to regenerate an FL application state.
435
+ A. Selective Telemetry
436
+ FEDDEBUG collects critical FL execution metrics to repro-
437
+ duce an FL application's state for the developer to interact with
438
+ it while investigating the root cause of a problem. Existing FL
439
+ frameworks are carefully architected to refrain from revealing
440
+ private data. As a result, most debugging data is private and
441
+ cannot be investigated.
442
+ FEDDEBUG’s debugging approach takes inspiration from
443
+ replay debugging. As with any other replay debugging, it
444
+ is essential that FEDDEBUG stores the necessary runtime
445
+ metrics to reproduce an FL application's state if requested
446
+ by the developer. We design a highly selective FL event
447
+ telemetry technique that records the concise execution data
448
+ available at the central aggregator that is vital for generating
449
+ any prior FL application state. FEDDEBUG is different from
450
+ traditional replay debugging as it only tracks the information
451
+ needed to recreate an observable event and does not log the
452
+ information unavailable to the developer in a live application.
453
+ This design reduces the size of continuously growing telemetry
454
+ data and minimizes the likelihood of information leakage.
455
+ FEDDEBUG mainly stores the information available after
456
+ step 3 of Figure 1 which is clients’ models, their reported
457
+ metrics such as response time, training loss, validation loss,
458
+ performance metric (e.g., F1 score), hyperparameters (e.g.,
459
+ learning rates, epochs, weight decay), and round ID. Note that
460
+ the FL application, including client-side training, will continue
461
+ uninterrupted in the background with FEDDEBUG’s telemetry
462
+ module continuously collecting execution traces.
463
+ B. Interactive Replay Debugging
464
+ To start the interactive debugging process, a developer can
465
+ invoke FEDDEBUG’s debugging constructs that let the devel-
466
+ oper leverage the telemetry data to investigate the root cause.
467
+ Breakpoint debugging is the de-facto method of debugging a
468
+ program. It pauses the program when the execution reaches
469
+ it. At that point, a developer can inspect the values assigned
470
+ to different variables, both local and global, and examine
471
+ the method stack. Such debugging features are not applicable
472
+ in FL. The traditional breakpoint will pause the distributed
473
+ training (i.e., none of the clients will be able to train its model),
474
+ resulting in unnecessary idling. Additionally, since the state
475
+ of a round is not saved, it is currently impossible for the
476
+ developer to inspect previous rounds. For instance, a developer
477
+ may want to debug a latent issue that was introduced by a
478
+ client five rounds ago but surfaced in the current round when
479
+ the same client participated in training again.
480
+ We make the following observation about FL frameworks.
481
+ An FL application only reveals aggregator's events to a de-
482
+ veloper. In contrast, events on the client's side are entirely
483
+ hidden from the developer except the ones relayed to the
484
+ aggregator by the client. Building on this observation and the
485
+ telemetry data captured by FEDDEBUG, our insight is that
486
+ instead of debugging a system in real-time, we can recreate
487
+ its observable behavior in a simulated environment, giving
488
+ an illusion of debugging an FL application in real-time. By
489
+ doing so, inspections with FEDDEBUG are side-effect free,
490
+ i.e., they will not interfere or interrupt the live FL application,
491
+ thus eliminating the need to pause client-side training or halt
492
+ aggregator execution.
493
+ Breakpoint. To this end, FEDDEBUG offers breakpoint that
494
+ can help a developer inspect intermediate states of an FL
495
+ application in real-time without stopping the training process.
496
+ FEDDEBUG’s breakpoint operates on computation units of
497
+ rounds and clients. A developer can set a breakpoint on either
498
+ a round (e.g., round R20) or on both a round and a client
499
+ (e.g., round R20, client C5) to inspect the state of FL training
500
+ using metrics such as training loss, clients’ participation, and
501
+ response time. When the live FL application arrives on a
502
+ breakpoint, FEDDEBUG spawns a new debugging interface
503
+ on the aggregator side, as shown in – in Figure 2, while
504
+ continuing the live FL training in the background.
505
+ Step in/Step out. While at a breakpoint in a debugging
506
+ session, a developer can use its step-in and step-out actions to
507
+ switch between different granularities of computational units.
508
+ Traditionally, these two actions are used to go one-level deeper
509
+ in the stack (e.g., inside a function call) and move one level up
510
+ in the stack (e.g., outside the function call), respectively. Based
511
+ on this convention, we define a round as a coarse-grained unit
512
+ of computation that can be decomposed into a subset of clients
513
+ participating in that round. Suppose the current breakpoint is
514
+ at round R20. In that case, step-in will take the developer
515
+ to the client-level granularity (— in Figure 2) where trained
516
+ models from clients are being aggregated incrementally. Step-
517
+ out will take the developer back to round, where they can
518
+
519
+ inspect the global trained model at the granularity of round.
520
+ Inspecting a state at client-level granularity entails evaluating
521
+ the performance of a partially-aggregated global model. For
522
+ example, in Figure 2, step-in at — will take the execution
523
+ between C1 and C3, where the global model has yet to
524
+ incorporate the local models of client C3 and onwards.
525
+ Step Next/Step Back. Similar to step-in/out, step next and
526
+ step back helps a developer transition from one state to
527
+ another. For instance, if the current breakpoint is at round
528
+ R20, step next will take the execution to round R21 in the
529
+ debugging interface, showing all the information correspond-
530
+ ing to that round only. Similarly, if the current breakpoint is at
531
+ client C5, step back will take the execution state to a partial
532
+ global model after aggregating models from clients C1 and
533
+ C3 only (Step back in Figure 2).
534
+ Resume. Unlike resume in gdb, FEDDEBUG’s resume does
535
+ not resume any paused execution. Instead, resume gives the
536
+ illusion to the developer that execution is being continued
537
+ from where it left off. FEDDEBUG creates this environment by
538
+ replaying the telemetry data that was captured while the FL
539
+ application was being inspected using breakpoints, in case the
540
+ developer does not find any faults in the round under inspec-
541
+ tion. Once the sequence of events in telemetry catches up with
542
+ the live execution of the FL application, FEDDEBUG switches
543
+ to the FL interface and shuts down the debugging interface.
544
+ This three-step process is nearly indistinguishable from an FL
545
+ application with FEDDEBUG disabled, giving the impression
546
+ of debugging a real-time FL application interactively. Resume
547
+ is also illustrated in Figure 2 - ˜.
548
+ C. Fix and Replay
549
+ When the developer successfully identifies a faulty client
550
+ in any round, FEDDEBUG offers Fix and Replay to allow a
551
+ developer to roll back the training and provide a retrained
552
+ global model (the one without a faulty client). We describe
553
+ the technique to identify a faulty client in Section IV. A faulty
554
+ client may have a compound effect on the global model, as
555
+ it may have begun to share its noisy model updates latently
556
+ several rounds ago, which only later becomes noticeable. In
557
+ such cases, it is important to rectify the impact of a faulty
558
+ client's inclusion in prior training rounds by removing its
559
+ contributions. This requires retraining over multiple rounds,
560
+ which is not possible as clients may not store the data used in
561
+ training in the prior rounds. Figure 2-™ shows the removal of
562
+ a faulty client (C5) in round R21. FEDDEBUG recomputes the
563
+ global model in the debugging interface and then replaces the
564
+ actual global model in round R22 with the newly recomputed
565
+ global model, after the fix and replay action in Figure 2-š. By
566
+ default, FEDDEBUG forbids the faulty client from participating
567
+ in the FL training. However, it is up to the developer to weigh
568
+ the benefits of including the faulty client in future rounds.
569
+ IV. FAULTY CLIENT LOCALIZATION
570
+ Faults in a client’s model can arise due to measurement
571
+ errors, human labeling errors, data poisoning, communication
572
+ problems, or subjective biases of labellers [10], [11], [29],
573
+ Algorithm 1: Inference-Guided Test Input Selection
574
+ Input: shape: dimension of the random input to be generated.
575
+ Input: κ: number of inputs to be generated.
576
+ Input: η: minimum number of clients for same prediction.
577
+ Output: X: a list containing auto-generated test inputs.
578
+ 1 rand inputs = lazilyGenerateRandInputs(shape)
579
+ 2 X = list()// a list for inference guided test inputs
580
+ 3 seen clients sequences = list()
581
+ 4 while length(X) < κ do
582
+ 5
583
+ r input = pop(rand inputs)
584
+ 6
585
+ clients preds = getP redictions(clients, r input)
586
+ 7
587
+ for label ∈ class labels do
588
+ 8
589
+ clients seq = sameP redClients(clients preds, label)
590
+ 9
591
+ if clients seq ̸∈ seen clients sequences and
592
+ length(clients seq) ≥ η then
593
+ 10
594
+ seen sequences.append(clients seq)
595
+ 11
596
+ X.append(r input) // valid test input
597
+ 12
598
+ break
599
+ 13
600
+ if length(rand inputs) < 1 then
601
+ 14
602
+ rand inputs = lazilyGenerateRandInputs(shape)
603
+ 15 return X
604
+ [51]. To achieve optimal performance of the global model, it
605
+ is critical to correctly identify a faulty client and potentially
606
+ restrict its participation. Manually identifying faulty clients
607
+ is neither scalable nor effective due to a large number of
608
+ participating clients in FL and their uninterpretable models i.e.,
609
+ model parameters do not provide any meaningful debugging
610
+ information. To automate faulty client localization, we must
611
+ define a feedback mechanism to guide our search for faulty
612
+ clients efficiently. Automated debugging tools [27], [66] for
613
+ regular software address this problem by relying on multiple
614
+ test inputs and a test oracle. For example, unit tests can guide
615
+ the search toward concise input leading to incorrect program
616
+ output [66]. In FL, the two (i.e., inputs and oracle) translate
617
+ into diverse test data and the corresponding accurate labels;
618
+ both of which are unavailable in FL applications.
619
+ FEDDEBUG addresses the challenges of automated fault
620
+ localization with a two-pronged approach. First, it generates
621
+ a pool of random test inputs and applies a novel inference-
622
+ guided test input selection to construct a suite of test inputs, as
623
+ shown in Figure 3-A. Since the test inputs are autonomously
624
+ generated, and they are not accompanied with ground truth
625
+ labels, and hence metrics such as F1 score or accuracy cannot
626
+ be used as oracle feedback to find a faulty client. Instead,
627
+ FEDDEBUG performs differential testing of clients’ models to
628
+ measure similarities and differences among models’ behaviors
629
+ on selected inputs (Figure 3-B). FEDDEBUG fingerprints a
630
+ neural network behavior on an input by profiling the internal
631
+ neurons’ contributions towards a prediction of the model.
632
+ Subsequently, it accurately recognizes a client as faulty if
633
+ its behavior deviates from the norm i.e., the majority of the
634
+ clients’ behavior. Our insight is that a faulty client’s model
635
+ will show a noticeable difference in its internal neuron values
636
+ compared to benign clients’ models, based on the principle
637
+ that faulty executions are intrinsically different from correct
638
+ ones. The same principle is behind popular fault localization
639
+ techniques, such as Spectra-based Fault Localization [23] and
640
+ Delta Debugging [66].
641
+
642
+ Select
643
+ Clients’ Models
644
+ Test Input
645
+ Differential Execution of Clients’ Models
646
+ Client 1
647
+ Client 2
648
+ Client 3
649
+ Client 4
650
+ Faulty Client
651
+ Clients 1-4 are benign because
652
+ they have the highest
653
+ common activated neurons.
654
+ Activated Neuron
655
+ Inactivated Neuron
656
+ (A): Inference Guided Input Selection
657
+ (B): Fault Localization
658
+ . . .
659
+ Infer
660
+ Criteria 1: Minimum
661
+ (η=3) clients predict
662
+ same label
663
+ Criteria 2: Unique
664
+ (η=3) clients’
665
+ combination
666
+ Random Input Pool
667
+ If met
668
+ If not met
669
+
670
+ x
671
+ Client 5
672
+ Fig. 3: An overview of FEDDEBUG’s fault localization ap-
673
+ proach. Firstly, it selects a random input that invokes diverse
674
+ model behavior (A). Secondly, it applies differential execution
675
+ on clients’ models to localize a faulty client (B).
676
+ Inference-Guided Test Input Selection. As shown in Fig-
677
+ ure 3-A, FEDDEBUG first lazily generates a pool of random
678
+ test inputs (e.g., 32x32 images constructed from random values
679
+ within the RGB scale) using Kaiming Initialization [17]. It
680
+ then automatically selects only those inputs that lead to a con-
681
+ sensus on predictions among a unique subset of clients. FED-
682
+ DEBUG selects up to κ test inputs (default is κ = 10) among
683
+ the pool of 1000 random inputs. The goal is to minimize any
684
+ overlapping behavior between clients while inferring unique
685
+ class labels on selected test inputs. This is similar to achieving
686
+ maximum code coverage in regular software with minimum
687
+ tests. Algorithm 1 selects a test input (line 5) if at least (η ≥ 5)
688
+ clients predict the same label and that subset of clients has not
689
+ been seen in the previously selected input (line 6-11). On the
690
+ next random input, if the previously observed subset of clients
691
+ (i.e., clients seq ∈ seen clients sequences) predict the
692
+ same class label, we discard this input. If a unique combination
693
+ of clients predicts an unseen label, we include the input in the
694
+ test suite. This process is repeated until we collect a user-
695
+ defined, κ, number of test inputs.
696
+ Differential Execution of Clients Models. In the absence
697
+ of correct labels of generated test inputs, FEDDEBUG adapts
698
+ differential testing to find behavioral differences and sim-
699
+ ilarities among clients’ models, as shown in Figure 3-B.
700
+ FEDDEBUG profiles the contributions of individual neurons
701
+ during model inference on an input and uses it to identify
702
+ models with common behavior. Note that clients’ models
703
+ in FL are comparable due to having a similar architecture.
704
+ Algorithm 2 describes the faulty client localization process.
705
+ For a selected test input, FEDDEBUG exhaustively iterates all
706
+ possible combinations of potentially non-faulty clients (i.e.,
707
+ �n
708
+ 1
709
+
710
+ combinations). For each combination, it performs model
711
+ inference on the test input and captures its neuron profiles. It
712
+ aims to find one combination of clients that has the highest
713
+ overlap in behavior, representing the true n − 1 benign clients
714
+ and consequently isolating the precise faulty client. This is a
715
+ Algorithm 2: Faulty Client Localization using Differ-
716
+ ential Testing
717
+ Input: clients: a list of clients participated in the given FL round.
718
+ Input: x: a random input belongs to X.
719
+ Input: na t: a threshold to profile neuron activations.
720
+ Output: faulty client: the faulty client who has abnormal behaviour.
721
+ 1 all clients combinations = nChooseK(clients, 1)
722
+ 2 benign clients = set()
723
+ 3 max common activations = −1
724
+ 4 for t clients ∈ all clients combinations do
725
+ 5
726
+ neuron ids = ActivatedNeurons(t clients, x, na t)
727
+ 6
728
+ t clients common neurons = intersection(neuron ids)
729
+ 7
730
+ temp n = length(t clients common neurons)
731
+ 8
732
+ if temp n > max common activations then
733
+ 9
734
+ max common activations = temp n
735
+ 10
736
+ benign clients = t clients
737
+ 11 faulty client = clients − benign clients
738
+ 12 return faulty client
739
+ lightweight process due to the negligible model inference time
740
+ and the iterations’ linear time (O(n)) complexity.
741
+ Our insight is that among all possible combinations of
742
+ clients, only one represents true benign clients’ subset. The
743
+ remaining combinations contain the faulty client with abnor-
744
+ mal neuron activations, reducing the model behavior overlap
745
+ within that set. In summary, at a given ill-performing round in
746
+ FL, FEDDEBUG takes in all participating clients’ models as the
747
+ only input. It automatically generates test inputs and employs
748
+ differential testing on clients’ models to monitor abnormal
749
+ behavior to precisely identify a faulty client.
750
+ V. EVALUATION
751
+ We evaluate FEDDEBUG on (1) runtime performance over-
752
+ head, (2) debugging time, (3) fault localizability and (4)
753
+ scalability. Our evaluation targets to answer the following
754
+ research questions:
755
+ • RQ1. What impact does FEDDEBUG have on the baseline
756
+ FL framework’s performance?
757
+ • RQ2. How accurate is FEDDEBUG in identifying a faulty
758
+ client?
759
+ • RQ3. Can FEDDEBUG identify multiple faulty clients?
760
+ • RQ4. Can FEDDEBUG scale to large number of clients
761
+ and find a faulty client efficiently?
762
+ Datasets, Model, & FL Framework. We evaluate FEDDE-
763
+ BUG on CIFAR-10 and FEMNIST. Both are considered as gold
764
+ standard to evaluate both FL frameworks [5], [9], [35], [49],
765
+ [58] and deep learning testing techniques [13], [46], [57], [61],
766
+ [62]. FEMNIST is a modified version of MNIST presented in
767
+ the FL LEAF Benchmark [6] and the Non-IID Bench [34]. The
768
+ FEMNIST dataset contains over 340K training and over 40K
769
+ testing grayscale, 28x28 images spanning ten different classes.
770
+ CIFAR-10 contains 50K training 32x32 RGB images that
771
+ span ten different classes and 10K instances for testing. We
772
+ adopt popular CNN models i.e., ResNet, VGG, and DenseNet
773
+ architectures [16], [19], [50]. We set the learning rate between
774
+ 0.0001 and 0.001, the number of epochs between 10 and 25,
775
+ the batch size from 512 to 2048, and the weight to 0.0001.
776
+ We realize FEDDEBUG’s design in the IBMFL library [38] due
777
+ to its ease-of-use, open documentation, and publicly available
778
+
779
+ codebase. These techniques should be equally applicable to
780
+ other FL frameworks.
781
+ Evaluation Environment Specifications. We run our exper-
782
+ iments on an AMD 16-core processor, with 128 GB RAM and
783
+ an NVIDIA Tesla T4 GPU. To measure the performance of
784
+ FEDDEBUG in terms of runtime and debugging overhead, we
785
+ simulate IBMFL framework deployment on a MacBook Pro
786
+ with Quad-core Intel Core i5 processor and 16 GB RAM.
787
+ Federated Learning Experimental Settings. Prior FL lit-
788
+ erature [6], [34] establishes two data distribution strategies
789
+ among FL clients: IID (independent and identically distributed
790
+ data), and Non-IID (non-independent and identically dis-
791
+ tributed data)
792
+ [34]. For Non-IID, we use the quantity base
793
+ imbalance [34] where clients have an unequal quantity of data,
794
+ and the class distribution is random. In IID, the clients receive
795
+ the same quantity of data. None of the clients share the same
796
+ data points in both settings. We simulate FL with varying
797
+ quantities of clients, ranging from 10 to 400 clients.
798
+ Fault Injection. Since there is no existing FL benchmark
799
+ with faulty clients, FEDDEBUG adopts a standard noisy labels
800
+ approach from prior machine learning literature to inject a
801
+ faulty client into experiments [10], [18], [21], [32], [64].
802
+ Similar to prior work [11], [30], [41], we arbitrarily add noise
803
+ by changing training data labels (e.g., changing label “bird”
804
+ to “cat”). When such a client’s model is merged with the
805
+ global model, the global model’s performance (e.g., accuracy)
806
+ deteriorates. We define different strengths of noise with a noise
807
+ rate that controls the amount of labels modified in a faulty
808
+ client. Noise rate is defined as a ratio between changed labels
809
+ and original labels (change labels/original labels).
810
+ Figure 4 shows the impact of different noise rates on the
811
+ global model’s accuracy, with one faulty client and nine benign
812
+ clients. Low noise rates, ranging from 0.2 to 0.7, barely affect
813
+ the global model performance. With a 0.7 noise rate, the
814
+ accuracy is lowered by 4.8% and 5.5% in CIFAR-10 and
815
+ FEMNIST, respectively. A noise rate of 0.9 incurs a 16.2% and
816
+ 9.9% reduction in the global model accuracy in both settings.
817
+ Thus, to have a measurable impact on the global model’s
818
+ performance, we select a noise rate of one for a faulty client.
819
+ 0.0 0.2 0.4 0.6 0.8
820
+ 0
821
+ 20
822
+ 40
823
+ 60
824
+ 80
825
+ 100
826
+ Noise Rate
827
+ Global Model
828
+ Accuracy (%)
829
+ (a) CIFAR-10
830
+ 0.0 0.2 0.4 0.6 0.8
831
+ Noise Rate
832
+ (b) FEMNIST
833
+ Fig. 4: Global model (ResNet-34) prediction accuracy in the
834
+ presence of a faulty client with different noise rates. Lower
835
+ noise rates hardly degrade global model performance.
836
+ Neuron Activation Threshold. We adopt the method from
837
+ Harel-Canada et al. [14] to profile neuron activations. We
838
+ empirically find 0.003 to be the optimal value for the default
839
+ activation threshold. A neuron is considered active when its
840
+ value crosses this threshold.
841
+ 5
842
+ 10
843
+ 20
844
+ 30
845
+ 40
846
+ 50
847
+ 60
848
+ 70
849
+ 80
850
+ 90
851
+ 100
852
+ 0
853
+ 10
854
+ 20
855
+ 30
856
+ 40
857
+ 0.3
858
+ 0.6
859
+ 1.9
860
+ 2.5
861
+ 3.4
862
+ 4.7
863
+ 4.8
864
+ 13.4
865
+ 18
866
+ 21
867
+ 23.8
868
+ 0.6
869
+ 1.2
870
+ 2.2
871
+ 3.9
872
+ 5.8
873
+ 6.6
874
+ 8.7
875
+ 15.5
876
+ 19.7
877
+ 27.5
878
+ 28.3
879
+ Number of Clients in an FL Setting
880
+ Aggregation Time (s)
881
+ Vanilla-IBMFL
882
+ FEDDEBUG-IBMFL
883
+ Fig. 5: FEDDEBUG’s runtime overhead as a comparison be-
884
+ tween vanilla FL framework’s aggregation time with FEDDE-
885
+ BUG enabled FL aggregation.
886
+ Faulty Client Localization Accuracy. We calculate faulty
887
+ client localization accuracy as the ratio between (a) the number
888
+ of test inputs on which faulty clients are correctly identified
889
+ and (b) the total number of test inputs. For instance, if
890
+ FEDDEBUG identifies the correct set of faulty clients on four
891
+ out of ten test inputs generated by Alogrithm 1, we report 40%
892
+ fault localization accuracy.
893
+ A. FEDDEBUG’s Performance
894
+ Capturing telemetry data in realtime may slow down the
895
+ performance of the FL application’s aggregator. In this sub-
896
+ section, we present our evaluation results of FEDDEBUG’s
897
+ runtime overhead as well as the fault localization time. These
898
+ experiment settings employ ResNet-18 with CIFAR-10.
899
+ Runtime Overhead (RQ1). To evaluate the impact on the
900
+ FL application’s performance, we measure the slowdown in
901
+ the running time that FEDDEBUG incurs. We compare the
902
+ cumulative processing time of the vanilla IBMFL’s aggregator
903
+ (baseline) against that of the FEDDEBUG-enabled aggregator
904
+ on a variety of client combinations i.e., from 5 clients to
905
+ 100 clients, simulating a real-world FL deployment. The
906
+ aggregation time varies with the model’s architecture and the
907
+ number of clients participating in a round, but it is completely
908
+ independent of the models’ quality. Therefore, we create up
909
+ to 100 pre-trained ResNet-18 models and perform the FL
910
+ aggregation.
911
+ Figure 5 compares the baseline’s aggregation time with the
912
+ FEDDEBUG enabled aggregation time. The X-axis represents
913
+ the number of clients ranging from 5 to 100 clients, and
914
+ the Y-axis represents the average time across two FL rounds.
915
+ For instance, with 30 clients, FEDDEBUG takes 3.9 seconds
916
+ compared to the 2.5 seconds for the baseline to aggregate
917
+ 30 trained models into a global model. Overall, FEDDEBUG
918
+ takes approximately 48% additional aggregation time across
919
+ all experiments. However, in an end-to-end round, the training
920
+ phase on the clients’ end occupies the majority (up to 97.8% in
921
+ our experiments) of the round’s time. Compared to the training
922
+ time of a round, the aggregation time is almost negligible, as
923
+ low as 1.2% in our experiments.
924
+
925
+ 10
926
+ 30
927
+ 50
928
+ 100
929
+ 102
930
+ 2.4
931
+ 0.2
932
+ 0.5
933
+ 0.1
934
+ 0.5
935
+ 0.8
936
+ 48
937
+ 132.2
938
+ 279.5
939
+ Number of Clients in an FL Setting
940
+ Time (s), Log Scale
941
+ Input Time
942
+ Localization Time
943
+ Training Time
944
+ Fig. 6: FEDDEBUG’s debugging time contains input generation
945
+ time and faulty client detection time and is compared against
946
+ a round’s training time.
947
+ Summary: Considering the training and aggregation time
948
+ of each FL round, FEDDEBUG’s runtime overhead is a very
949
+ small fraction, 1.2%, of the training time. Hence, capturing
950
+ telemetry data for replay debugging does not impede the FL
951
+ application’s runtime performance.
952
+ Debugging Time (RQ1). To assess the localizability of FED-
953
+ DEBUG, we design experiments to measure FEDDEBUG’s
954
+ debugging time, the time it takes to localize a faulty client.
955
+ We then compare this time with the training time of that
956
+ round. Since there is no comparable approach to localize a
957
+ faulty client, we use training time as a baseline to provide a
958
+ meaningful scale for the cost of debugging.
959
+ Figure 6 shows the results of these experiments. The X-
960
+ axis represents the number of clients, and the Y-axis shows
961
+ the debugging time in seconds on a logarithmic scale. For 30
962
+ clients, FEDDEBUG’s input generation and selection takes 0.2
963
+ seconds to find high-quality test input, and its fault localization
964
+ takes approximately 0.5 seconds to localize a faulty client. In
965
+ a ten clients setting, input selection takes more time due to
966
+ the stricter constraint of (i.e., η = 4) for criteria 1 in Figure 3,
967
+ i.e., at least four previously unseen clients should predict the
968
+ same label on newly selected test input.
969
+ Overall, our results show an increasing debugging time
970
+ when the number of clients increases, which is expected as
971
+ increasing the number of clients increases the search space.
972
+ Note that the debugging time is still in the order of seconds,
973
+ even for 50 clients. This is because 1) for n clients, the search
974
+ space has at most n possible combinations of potentially
975
+ benign n-1 clients, representing linear complexity, and 2) on a
976
+ given input, FEDDEBUG only profiles neuron activations once
977
+ while iterating over the n combinations.
978
+ Summary: On average, FEDDEBUG can efficiently identify
979
+ a faulty client in 2.1% of the total training time of a round.
980
+ B. Localization of Faulty Client
981
+ To answer RQ2, we measure how accurate FEDDEBUG is
982
+ in localizing a faulty client. We automatically inject a faulty
983
+ client that is representative of a real-world scenario and can
984
+ cause a measurable change in the global model’s performance.
985
+ By varying the number of clients, datasets, models, and data
986
+ Clients
987
+ Dataset
988
+ Architecture
989
+ Accuracy
990
+ % (IID)
991
+ Accuracy
992
+ % (Non-
993
+ IID)
994
+ Avg.
995
+ Input
996
+ Time (s)
997
+ Avg. Lo-
998
+ calization
999
+ Time (s)
1000
+ 10
1001
+ CIFAR10
1002
+ DenseNet-121
1003
+ 100
1004
+ 100
1005
+ 2.41
1006
+ 0.44
1007
+ 10
1008
+ CIFAR10
1009
+ ResNet-50
1010
+ 100
1011
+ 100
1012
+ 2.40
1013
+ 0.22
1014
+ 10
1015
+ CIFAR10
1016
+ VGG-16
1017
+ 100
1018
+ 100
1019
+ 2.40
1020
+ 0.21
1021
+ 30
1022
+ CIFAR10
1023
+ DenseNet-121
1024
+ 100
1025
+ 100
1026
+ 2.42
1027
+ 1.29
1028
+ 30
1029
+ CIFAR10
1030
+ ResNet-50
1031
+ 100
1032
+ 100
1033
+ 1.18
1034
+ 0.70
1035
+ 30
1036
+ CIFAR10
1037
+ VGG-16
1038
+ 100
1039
+ 100
1040
+ 2.41
1041
+ 0.47
1042
+ 50
1043
+ CIFAR10
1044
+ DenseNet-121
1045
+ 100
1046
+ 100
1047
+ 2.42
1048
+ 3.26
1049
+ 50
1050
+ CIFAR10
1051
+ ResNet-50
1052
+ 100
1053
+ 100
1054
+ 1.37
1055
+ 1.24
1056
+ 50
1057
+ CIFAR10
1058
+ VGG-16
1059
+ 100
1060
+ 100
1061
+ 2.43
1062
+ 0.91
1063
+ 10
1064
+ FEMNIST
1065
+ DenseNet-121
1066
+ 100
1067
+ 100
1068
+ 2.40
1069
+ 0.47
1070
+ 10
1071
+ FEMNIST
1072
+ ResNet-50
1073
+ 100
1074
+ 100
1075
+ 2.40
1076
+ 0.25
1077
+ 10
1078
+ FEMNIST
1079
+ VGG-16
1080
+ 100
1081
+ 100
1082
+ 2.40
1083
+ 0.18
1084
+ 30
1085
+ FEMNIST
1086
+ DenseNet-121
1087
+ 100
1088
+ 100
1089
+ 2.41
1090
+ 1.37
1091
+ 30
1092
+ FEMNIST
1093
+ ResNet-50
1094
+ 100
1095
+ 100
1096
+ 0.91
1097
+ 0.68
1098
+ 30
1099
+ FEMNIST
1100
+ VGG-16
1101
+ 100
1102
+ 100
1103
+ 2.41
1104
+ 0.55
1105
+ 50
1106
+ FEMNIST
1107
+ DenseNet-121
1108
+ 100
1109
+ 100
1110
+ 2.24
1111
+ 2.44
1112
+ 50
1113
+ FEMNIST
1114
+ ResNet-50
1115
+ 100
1116
+ 100
1117
+ 1.42
1118
+ 1.24
1119
+ 50
1120
+ FEMNIST
1121
+ VGG-16
1122
+ 100
1123
+ 100
1124
+ 2.40
1125
+ 1.25
1126
+ TABLE I: FEDDEBUG’s debugging time and accuracy when
1127
+ localizing a faulty client in 36 different FL settings with 100
1128
+ test inputs.
1129
+ 0.2
1130
+ 0.4
1131
+ 0.6
1132
+ 0.8
1133
+ 0
1134
+ 20
1135
+ 40
1136
+ 60
1137
+ 80
1138
+ 100
1139
+ Noise Rate
1140
+ Fault Localization
1141
+ Accuracy (%)
1142
+ (a) ResNet-34
1143
+ 0.2
1144
+ 0.4
1145
+ 0.6
1146
+ 0.8
1147
+ 0
1148
+ 20
1149
+ 40
1150
+ 60
1151
+ 80
1152
+ 100
1153
+ Noise Rate
1154
+ (b) DenseNet-121
1155
+ Fig. 7: FEDDEBUG localization performance when a faulty
1156
+ client has varying fault strength (i.e., low noise rate).
1157
+ distributions (IID and Non-IID), we create 36 different FL
1158
+ configurations for FEDDEBUG’s evaluation.
1159
+ Column 4 and 5 of Table I show the accuracy of FEDDEBUG
1160
+ in the IID and Non-IID settings, respectively. We repeat each
1161
+ experiment on 100 generated test inputs and take the average
1162
+ of each metric to generalize the results. FEDDEBUG correctly
1163
+ identifies a faulty client with 100% accuracy in both IID and
1164
+ Non-IID settings.
1165
+ Varying Noise Rate. Figure 4 shows the impact of different
1166
+ noise rates on the global model prediction accuracy. We
1167
+ observe that a faulty client has measurable impact on the
1168
+ global model with a noise rate of > 0.8. The global model’s
1169
+ accuracy merely drops from 73.8% to 71.1% when the faulty
1170
+ client has 0.6 noise rate and drops to 57% when the noise
1171
+ is close to one. FEDDEBUG accurately localizes a faulty
1172
+ client with low noise rates, showing its robustness. Figure 7
1173
+ shows the evaluations on varying noise rates in 10 clients FL
1174
+ settings with ResNet and DenseNet architectures. The X-axis
1175
+ shows the faulty client’s noise rate, and the Y-axis represents
1176
+ the average fault localization accuracy on the CIFAR-10 and
1177
+ FEMNIST datasets. The results, as seen in Figure 7, indicate
1178
+ that FEDDEBUG has the capability to identify low noise faults–
1179
+ it successfully localizes a faulty client with 0.4 noise rate
1180
+ with approximately 58% and 87.5% accuracy in DenseNet and
1181
+ ResNet settings, respectively.
1182
+
1183
+ Summary: FEDDEBUG achieves 100% fault localization
1184
+ accuracy on average on a total of 3600 test inputs, when
1185
+ the faulty client significantly deters the global model per-
1186
+ formance in both IID and Non-IID settings.
1187
+ Detecting Multiple Faulty Clients (RQ3). We evaluate FED-
1188
+ DEBUG’s ability to identify multiple faulty clients in an FL
1189
+ application. To this end, we inject up to seven faulty clients
1190
+ in the following experiment settings. We train ResNet-50 and
1191
+ DenseNet-121 on the CIFAR-10 and FEMNIST datasets in
1192
+ 30 and 50 clients FL settings. Each setting is evaluated on
1193
+ 10 test inputs. By default, FEDDEBUG’s fault localization
1194
+ technique finds a single faulty client. We apply FEDDEBUG in
1195
+ an iterative manner to find multiple faulty clients by removing
1196
+ one faulty client on each iteration, similar to traditional bug
1197
+ repair process, where one bug is fixed first before the next one
1198
+ is investigated.
1199
+ Table II presents the results of finding multiple faulty clients
1200
+ in 32 FL configurations. For instance, when 7 out of 30
1201
+ clients are faulty and the model is ResNet-50, FEDDEBUG
1202
+ finds all seven faulty clients with 100% accuracy on CIFAR-
1203
+ 10 and 97.1% accuracy on FEMNIST. Compared to ResNet,
1204
+ FEDDEBUG performs relatively better with DenseNet. This
1205
+ behavior is expected because, compared to ResNet, DenseNet
1206
+ learns better features due to dense concatenation among its
1207
+ layers, resulting in better performance [69]. Thus, FEDDEBUG
1208
+ performs well in localizing multiple faults with DenseNet with
1209
+ an average accuracy of 99.7% on both datasets compared to
1210
+ ResNet’s 80.8%.
1211
+ Table II also reveals that, generally, FEDDEBUG’s local-
1212
+ ization performance is positively correlated to the number of
1213
+ training data points per client. Large, high-quality training
1214
+ data promotes better feature learning among neurons and thus,
1215
+ yields better performance. Since the number of data points
1216
+ in FEMNIST (340K) is large compared to CIFAR-10 (40K),
1217
+ clients in FEMNIST have significantly larger training data
1218
+ than clients in CIFAR-10. As a result, FEDDEBUG average
1219
+ localization accuracy is 78.5% in ResNet-CIFAR experiment,
1220
+ while it has 83.1% localization accuracy in the ResNet-
1221
+ FEMNIST experiment. FEDDEBUG finds multiple faults with
1222
+ linear time complexity, as shown in Figure 8 with 50 clients.
1223
+ The input generation time is almost constant, as the number
1224
+ of clients is fixed. However, the localization time increases as
1225
+ we increase the number of faults from 2 to 7. For instance,
1226
+ it localizes two faulty clients in 3.6 seconds and five faulty
1227
+ clients in 4 seconds.
1228
+ Scalability (RQ4): Our findings also show that FEDDEBUG is
1229
+ scalable to larger datasets and an increasing number of clients
1230
+ in FL. Figure 9 summarizes the impact on FEDDEBUG’s
1231
+ ability to identify a faulty client when the number of clients
1232
+ changes from 25 to 400 and the training data size per client
1233
+ changes. We perform this experiment with two faulty clients
1234
+ in the FEMNIST-DenseNet configuration. Figure 9-(a) verifies
1235
+ that FEDDEBUG’s fault localization accuracy only reduces
1236
+ to 75% even when the number of clients increases to 400.
1237
+ FEDDEBUG’s debugging time increases linearly as the number
1238
+ TABLE II: FEDDEBUG’s fault localization in 32 FL configu-
1239
+ rations with multiple faulty clients, ranging from two to seven.
1240
+ Faulty
1241
+ Clients
1242
+ Total
1243
+ Clients
1244
+ Architecture
1245
+ Accuracy %
1246
+ (CIFAR-10)
1247
+ Accuracy %
1248
+ (FEMNIST)
1249
+ 2
1250
+ 30
1251
+ ResNet-50
1252
+ 100
1253
+ 100
1254
+ 3
1255
+ 30
1256
+ ResNet-50
1257
+ 100
1258
+ 100
1259
+ 5
1260
+ 30
1261
+ ResNet-50
1262
+ 100
1263
+ 98
1264
+ 7
1265
+ 30
1266
+ ResNet-50
1267
+ 100
1268
+ 97.1
1269
+ 2
1270
+ 30
1271
+ DenseNet-121
1272
+ 100
1273
+ 100
1274
+ 3
1275
+ 30
1276
+ DenseNet-121
1277
+ 100
1278
+ 100
1279
+ 5
1280
+ 30
1281
+ DenseNet-121
1282
+ 100
1283
+ 100
1284
+ 7
1285
+ 30
1286
+ DenseNet-121
1287
+ 100
1288
+ 100
1289
+ 2
1290
+ 50
1291
+ ResNet-50
1292
+ 50
1293
+ 80
1294
+ 3
1295
+ 50
1296
+ ResNet-50
1297
+ 66.7
1298
+ 66.7
1299
+ 5
1300
+ 50
1301
+ ResNet-50
1302
+ 54
1303
+ 60
1304
+ 7
1305
+ 50
1306
+ ResNet-50
1307
+ 57.1
1308
+ 62.9
1309
+ 2
1310
+ 50
1311
+ DenseNet-121
1312
+ 100
1313
+ 100
1314
+ 3
1315
+ 50
1316
+ DenseNet-121
1317
+ 100
1318
+ 100
1319
+ 5
1320
+ 50
1321
+ DenseNet-121
1322
+ 100
1323
+ 100
1324
+ 7
1325
+ 50
1326
+ DenseNet-121
1327
+ 100
1328
+ 95.7
1329
+ 2
1330
+ 3
1331
+ 4
1332
+ 5
1333
+ 6
1334
+ 7
1335
+ 0
1336
+ 2
1337
+ 4
1338
+ 6
1339
+ # of Faulty Clients
1340
+ Time (s)
1341
+ (a) DenseNet-121 and CIFAR-10
1342
+ Input Generation Time
1343
+ Fault Localization Time
1344
+ 2
1345
+ 3
1346
+ 4
1347
+ 5
1348
+ 6
1349
+ 7
1350
+ 0
1351
+ 2
1352
+ 4
1353
+ 6
1354
+ # of Faulty Clients
1355
+ Time (s)
1356
+ (b) ResNet-50 and CIFAR-10
1357
+ Input Generation Time
1358
+ Fault Localization Time
1359
+ Fig. 8: FEDDEBUG finds multiple faulty clients in a linear
1360
+ time. Total clients are 50 in each graph.
1361
+ of clients increases, consistent with the scale-up properties
1362
+ of general distributed systems, as shown in Figure 9-(b).
1363
+ When the number of clients increases, less data is used to
1364
+ train a client’s model, which may reduce the accuracy of
1365
+ clients’ models. Figure 9-(c) also shows that FEDDEBUG’s
1366
+ fault localizability also increases when the number of data
1367
+ points per client increases, and it is also robust against low
1368
+ performing client models. For instance, when the number of
1369
+ data points increases from 850 to 1700, FEDDEBUG’s local-
1370
+ ization accuracy also changes from 75% to 85%, respectively.
1371
+ 100 200 300 400
1372
+ 0
1373
+ 20
1374
+ 40
1375
+ 60
1376
+ 80
1377
+ 100
1378
+ Clients
1379
+ Localization Accuracy
1380
+ (a)
1381
+ 100 200 300 400
1382
+ 101
1383
+ 102
1384
+ 103
1385
+ 104
1386
+ Clients
1387
+ Time (s), Log Scale
1388
+ (b)
1389
+ Input Generation Time
1390
+ Fault Localization Time
1391
+ 0
1392
+ 0.5
1393
+ 1
1394
+ ·104
1395
+ 0
1396
+ 20
1397
+ 40
1398
+ 60
1399
+ 80
1400
+ 100
1401
+ Data/Client
1402
+ Localization Accuracy
1403
+ (c)
1404
+ Fig. 9: FEDDEBUG retains scalability on a large number of
1405
+ clients.
1406
+ Summary: Our experiment results provide concrete evi-
1407
+ dence that FEDDEBUG preserves scalability properties both
1408
+ in terms of time overhead and in the presence of multiple
1409
+ faults. It successfully identifies multiple faulty clients in
1410
+ 32 different FL configurations with an average accuracy of
1411
+ 90.3%.
1412
+
1413
+ 0
1414
+ 0.2 0.4 0.6 0.8
1415
+ 60
1416
+ 70
1417
+ 80
1418
+ 90
1419
+ 100
1420
+ Localization Accuracy (%)
1421
+ (a) ResNet-50 and CIFAR-10
1422
+ 0
1423
+ 0.2 0.4 0.6 0.8
1424
+ 20
1425
+ 40
1426
+ 60
1427
+ 80
1428
+ 100
1429
+ (b) ResNet-50 and FEMNIST
1430
+ 0
1431
+ 0.2 0.4 0.6 0.8
1432
+ 20
1433
+ 40
1434
+ 60
1435
+ 80
1436
+ 100
1437
+ Neuron Activation Threshold
1438
+ Localization Accuracy (%)
1439
+ (c) DenseNet-121 and CIFAR-10
1440
+ 0
1441
+ 0.2 0.4 0.6 0.8
1442
+ 20
1443
+ 40
1444
+ 60
1445
+ 80
1446
+ 100
1447
+ Neuron Activation Threshold
1448
+ (d) DenseNet-121 and FEMNIST
1449
+ Fig. 10: FEDDEBUG performance at neuron activation thresh-
1450
+ old on 30 clients, including five faulty clients.
1451
+ C. Neuron Activation Threshold
1452
+ There is no standard threshold of neuron activations [46]
1453
+ and prior work uses experiential value for different use
1454
+ cases [14]. We evaluate the impact of different activation
1455
+ thresholds on FEDDEBUG’s faulty client localizability. We
1456
+ take 30 clients including five faulty clients, and train ResNet-
1457
+ 50 and DenseNet-121 on both the CIFAR-10 and FEMNIST
1458
+ datasets. We repeat each experiment on 10 different inputs
1459
+ generated by Algorithm 1.
1460
+ Figure 10 shows the result of these experiments. The X-
1461
+ axis represents the neuron activation thresholds, ranging from
1462
+ 0 to 0.9. The Y-axis shows the FEDDEBUG’s localization
1463
+ accuracy in a given experiment setting. For instance, at the
1464
+ 0.003 threshold, the average localization accuracy across four
1465
+ settings is 100%. On the other hand, at 0.5 threshold, the
1466
+ average accuracy decreases significantly to 73.5% across these
1467
+ configurations. Specifically, for DenseNet-121 and FEMNIST
1468
+ experiment in Figure 10-(d), the localization drops to 64%
1469
+ at the 0.5 neuron activation threshold. We observe that FED-
1470
+ DEBUG performs better at lower thresholds (< 0.01) across
1471
+ different models and datasets. This behavior is expected be-
1472
+ cause lower thresholds increase the sensitivity of FEDDEBUG’s
1473
+ localization approach. It starts monitoring the majority of the
1474
+ neurons compared to a higher threshold, where FEDDEBUG
1475
+ profiles only a few neurons crossing the threshold.
1476
+ D. Threats to Validity
1477
+ To alleviate threats to external validity, we use established
1478
+ state-of-the-art FL experimental models (ResNet-18, ResNet-
1479
+ 34, ResNet-50, DenseNet-121, and VGG-16), two standard-
1480
+ ized datasets from FL benchmarks, two real-world data dis-
1481
+ tributions, and an industrial scale FL framework. Similarly,
1482
+ we remove bias in fault injection using standard noisy labels
1483
+ technique from the ML literature, to make a fault reflective
1484
+ of real-world scenarios. We also experiment with varying
1485
+ noise rates for better evaluations, transparency, and fairness.
1486
+ Another source of external threats to validity is randomness in
1487
+ the FEDDEBUG’s input selection method. We minimize such
1488
+ randomness by evaluating each configuration on at least 10
1489
+ and 100 test inputs and reporting the average results.
1490
+ VI. RELATED WORK
1491
+ Debugging ML models has been extensively explored in
1492
+ recent works [4], [13], [45], [46], [57], [59], [62]. The primary
1493
+ objectives of these approaches are interpretability, generating
1494
+ new test cases by carefully perturbing the real-world training
1495
+ inputs to improve performance and find bugs and corner cases
1496
+ in the given model. These approaches require access to the
1497
+ training and testing data, and some are limited to testing a sin-
1498
+ gle neural network; hence, such approaches cannot be directly
1499
+ imported in FL. Lack of access to client data and resources in
1500
+ FL settings makes testing and debugging FL more challenging.
1501
+ If applied to FL, these testing approaches will find every
1502
+ client’s model defective. Clients’ models are architecturally
1503
+ similar, but trained on local clients’ data, and thus their models
1504
+ are semantically different from each other. Identifying defects
1505
+ in an isolated model is not practical either. Every client’s
1506
+ model has weaknesses that will surface on carefully selected
1507
+ test data. FEDDEBUG overcomes these problems by focusing
1508
+ on the commonality of models instead of differences.
1509
+ Most relevant work to FEDDEBUG primarily focuses on
1510
+ finding clients’ contributions to a global model without ex-
1511
+ posing the private data to a central server [67]. In practice,
1512
+ individual clients report information about training such as
1513
+ dataset size and performance metrics to the central aggregator
1514
+ [12], [25], [26], [48], [65], [68], [70]. Existing approaches
1515
+ use prior information e.g., previous task performance and data
1516
+ quality obtained via third-party services to evaluate clients’
1517
+ models [56]. Some approaches recommend cross-validating
1518
+ clients’ models on another client’s local dataset [40]. Another
1519
+ alternate is to maintain a validation dataset at the central server
1520
+ to evaluate clients’ models [8], [39]. A major limitation of the
1521
+ above FL-related approaches is that the aggregator server is
1522
+ entirely dependent on the client's reported information or test
1523
+ data to evaluate clients’ models. The aggregator also assumes
1524
+ that all clients are trustworthy about their performance in these
1525
+ approaches, which invites adversarial clients to exploit FL
1526
+ in order to retrieve clients’ private data. Cross validation is
1527
+ also prohibited due to limited computing resources for edge
1528
+ devices such as smart home sensors. FEDDEBUG overcomes
1529
+ the limitations of debugging faulty clients with interactive and
1530
+ automated approaches that are privacy preserving.
1531
+ VII. CONCLUSION
1532
+ Federated learning promotes accurate and collaborative
1533
+ model training across millions of clients–a type of learning
1534
+ that was previously impossible due to privacy concerns related
1535
+ to user data. However, FL poses unprecedented challenges
1536
+ in debugging a faulty client responsible for deterring global
1537
+ training. With minimal information about the training process
1538
+ and non-existent debugging techniques, such issues are often
1539
+
1540
+ left untreated. FEDDEBUG enables interactive and automated
1541
+ fault localization in FL. It adapts conventional debugging
1542
+ practices in FL with its breakpoint and fix and replay feature.
1543
+ It offers a novel differential testing technique to automatically
1544
+ identify the precise faulty clients. We demonstrate that FED-
1545
+ DEBUG identifies a faulty client with 100% accuracy within
1546
+ 2.1% of a round’s training time, advocating for FEDDEBUG’s
1547
+ efficacy and efficiency. With FEDDEBUG, we pave the way
1548
+ for advanced software debugging techniques to be adapted
1549
+ in the emerging area of federated learning and the broader
1550
+ community of machine learning practitioners.
1551
+ REFERENCES
1552
+ [1] Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and
1553
+ Vitaly Shmatikov. How to backdoor federated learning. In International
1554
+ Conference on Artificial Intelligence and Statistics, pages 2938–2948.
1555
+ PMLR, 2020.
1556
+ [2] Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin
1557
+ Calo.
1558
+ Analyzing federated learning through an adversarial lens.
1559
+ In
1560
+ International Conference on Machine Learning, pages 634–643. PMLR,
1561
+ 2019.
1562
+ [3] Battista Biggio, Blaine Nelson, and Pavel Laskov. Poisoning attacks
1563
+ against support vector machines. arXiv preprint arXiv:1206.6389, 2012.
1564
+ [4] Houssem Ben Braiek and Foutse Khomh.
1565
+ Deepevolution: A search-
1566
+ based testing approach for deep neural networks. In 2019 IEEE Inter-
1567
+ national Conference on Software Maintenance and Evolution (ICSME),
1568
+ pages 454–458. IEEE, 2019.
1569
+ [5] Lukas Burkhalter, Hidde Lycklama, Alexander Viand, Nicolas K¨uchler,
1570
+ and Anwar Hithnawi. Rofl: Attestable robustness for secure federated
1571
+ learning. arXiv preprint arXiv:2107.03311, 2021.
1572
+ [6] Sebastian Caldas, Sai Meher Karthik Duddu, Peter Wu, Tian Li,
1573
+ Jakub Koneˇcn`y, H Brendan McMahan, Virginia Smith, and Ameet
1574
+ Talwalkar. Leaf: A benchmark for federated settings. arXiv preprint
1575
+ arXiv:1812.01097, 2018.
1576
+ [7] Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. Tar-
1577
+ geted backdoor attacks on deep learning systems using data poisoning.
1578
+ arXiv preprint arXiv:1712.05526, 2017.
1579
+ [8] Yiqiang Chen, Xiaodong Yang, Xin Qin, Han Yu, Biao Chen, and Zhiqi
1580
+ Shen. Focus: Dealing with label quality disparity in federated learning.
1581
+ arXiv preprint arXiv:2001.11359, 2020.
1582
+ [9] Liam Collins, Hamed Hassani, Aryan Mokhtari, and Sanjay Shakkottai.
1583
+ Exploiting shared representations for personalized federated learning.
1584
+ In International Conference on Machine Learning, pages 2089–2099.
1585
+ PMLR, 2021.
1586
+ [10] Benoˆıt Fr´enay and Michel Verleysen. Classification in the presence of
1587
+ label noise: a survey. IEEE transactions on neural networks and learning
1588
+ systems, 25(5):845–869, 2013.
1589
+ [11] Aritra Ghosh, Himanshu Kumar, and P. S. Sastry. Robust loss functions
1590
+ under label noise for deep neural networks.
1591
+ In Proceedings of the
1592
+ Thirty-First AAAI Conference on Artificial Intelligence, AAAI’17, page
1593
+ 1919–1925. AAAI Press, 2017.
1594
+ [12] Jack Goetz, Kshitiz Malik, Duc Bui, Seungwhan Moon, Honglei
1595
+ Liu, and Anuj Kumar.
1596
+ Active federated learning.
1597
+ arXiv preprint
1598
+ arXiv:1909.12641, 2019.
1599
+ [13] Jianmin Guo, Yu Jiang, Yue Zhao, Quan Chen, and Jiaguang Sun.
1600
+ Dlfuzz: Differential fuzzing testing of deep learning systems.
1601
+ In
1602
+ Proceedings of the 2018 26th ACM Joint Meeting on European Software
1603
+ Engineering Conference and Symposium on the Foundations of Software
1604
+ Engineering, pages 739–743, 2018.
1605
+ [14] Fabrice Harel-Canada, Lingxiao Wang, Muhammad Ali Gulzar, Quan-
1606
+ quan Gu, and Miryung Kim. Is neuron coverage a meaningful measure
1607
+ for testing deep neural networks? In Proceedings of the 28th ACM Joint
1608
+ Meeting on European Software Engineering Conference and Symposium
1609
+ on the Foundations of Software Engineering, pages 851–862, 2020.
1610
+ [15] Chaoyang He, Songze Li, Jinhyun So, Xiao Zeng, Mi Zhang, Hongyi
1611
+ Wang, Xiaoyang Wang, Praneeth Vepakomma, Abhishek Singh, Hang
1612
+ Qiu, et al.
1613
+ Fedml: A research library and benchmark for federated
1614
+ machine learning. arXiv preprint arXiv:2007.13518, 2020.
1615
+ [16] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun.
1616
+ Deep
1617
+ residual learning for image recognition, 2015.
1618
+ [17] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving
1619
+ deep into rectifiers: Surpassing human-level performance on imagenet
1620
+ classification. In Proceedings of the IEEE international conference on
1621
+ computer vision, pages 1026–1034, 2015.
1622
+ [18] Dan Hendrycks, Mantas Mazeika, Duncan Wilson, and Kevin Gimpel.
1623
+ Using trusted data to train deep networks on labels corrupted by severe
1624
+ noise. Advances in neural information processing systems, 31, 2018.
1625
+ [19] Gao Huang, Zhuang Liu, Laurens Van Der Maaten, and Kilian Q
1626
+ Weinberger. Densely connected convolutional networks. In Proceedings
1627
+ of the IEEE conference on computer vision and pattern recognition,
1628
+ pages 4700–4708, 2017.
1629
+ [20] Ji Chu Jiang, Burak Kantarci, Sema Oktug, and Tolga Soyata. Federated
1630
+ learning in smart city sensing: Challenges and opportunities. Sensors,
1631
+ 20(21):6230, 2020.
1632
+ [21] Lu Jiang, Di Huang, Mason Liu, and Weilong Yang. Beyond synthetic
1633
+ noise: Deep learning on controlled noisy labels.
1634
+ In International
1635
+ Conference on Machine Learning, pages 4804–4815. PMLR, 2020.
1636
+ [22] Lu Jiang, Zhengyuan Zhou, Thomas Leung, Li-Jia Li, and Li Fei-
1637
+ Fei. Mentornet: Learning data-driven curriculum for very deep neural
1638
+ networks on corrupted labels. In International conference on machine
1639
+ learning, pages 2304–2313. PMLR, 2018.
1640
+ [23] James A. Jones, Mary Jean Harrold, and John Stasko.
1641
+ Visualization
1642
+ of test information to assist fault localization. In Proceedings of the
1643
+ 24th International Conference on Software Engineering, ICSE ’02, pages
1644
+ 467–477, New York, NY, USA, 2002. ACM.
1645
+ [24] Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aur´elien Bellet,
1646
+ Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles,
1647
+ Graham Cormode, Rachel Cummings, Rafael G. L. D’Oliveira, Hubert
1648
+ Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary
1649
+ Garrett, Adri`a Gasc´on, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser,
1650
+ Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson,
1651
+ Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Kho-
1652
+ dak, Jakub Koneˇcn´y, Aleksandra Korolova, Farinaz Koushanfar, Sanmi
1653
+ Koyejo, Tancr`ede Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri,
1654
+ Richard Nock, Ayfer ¨Ozg¨ur, Rasmus Pagh, Mariana Raykova, Hang Qi,
1655
+ Daniel Ramage, Ramesh Raskar, Dawn Song, Weikang Song, Sebas-
1656
+ tian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tram`er,
1657
+ Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang,
1658
+ Felix X. Yu, Han Yu, and Sen Zhao. Advances and open problems in
1659
+ federated learning, 2021.
1660
+ [25] Jiawen Kang, Zehui Xiong, Dusit Niyato, Han Yu, Ying-Chang Liang,
1661
+ and Dong In Kim.
1662
+ Incentive design for efficient federated learning
1663
+ in mobile networks: A contract theory approach. In 2019 IEEE VTS
1664
+ Asia Pacific Wireless Communications Symposium (APWCS), pages 1–
1665
+ 5. IEEE, 2019.
1666
+ [26] Tra Huong Thi Le, Nguyen H Tran, Yan Kyaw Tun, Minh NH Nguyen,
1667
+ Shashi Raj Pandey, Zhu Han, and Choong Seon Hong. An incentive
1668
+ mechanism for federated learning in wireless cellular networks: An
1669
+ auction approach.
1670
+ IEEE Transactions on Wireless Communications,
1671
+ 20(8):4874–4887, 2021.
1672
+ [27] Claire Le Goues, ThanhVu Nguyen, Stephanie Forrest, and Westley
1673
+ Weimer.
1674
+ Genprog: A generic method for automatic software repair.
1675
+ Ieee transactions on software engineering, 38(1):54–72, 2011.
1676
+ [28] Kuang-Huei Lee, Xiaodong He, Lei Zhang, and Linjun Yang. Cleannet:
1677
+ Transfer learning for scalable image classifier training with label noise.
1678
+ In Proceedings of the IEEE conference on computer vision and pattern
1679
+ recognition, pages 5447–5456, 2018.
1680
+ [29] Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. Data poi-
1681
+ soning attacks on factorization-based collaborative filtering. Advances
1682
+ in neural information processing systems, 29, 2016.
1683
+ [30] Junnan Li, Richard Socher, and Steven CH Hoi.
1684
+ Dividemix: Learn-
1685
+ ing with noisy labels as semi-supervised learning.
1686
+ arXiv preprint
1687
+ arXiv:2002.07394, 2020.
1688
+ [31] Junnan Li, Yongkang Wong, Qi Zhao, and Mohan S Kankanhalli.
1689
+ Learning to learn from noisy labeled data.
1690
+ In Proceedings of the
1691
+ IEEE/CVF Conference on Computer Vision and Pattern Recognition,
1692
+ pages 5051–5059, 2019.
1693
+ [32] Junnan Li, Caiming Xiong, and Steven CH Hoi.
1694
+ Learning from
1695
+ noisy data with robust representation learning. In Proceedings of the
1696
+ IEEE/CVF International Conference on Computer Vision, pages 9485–
1697
+ 9494, 2021.
1698
+ [33] Mu Li, David G Andersen, Jun Woo Park, Alexander J Smola, Amr
1699
+ Ahmed, Vanja Josifovski, James Long, Eugene J Shekita, and Bor-
1700
+ Yiing Su.
1701
+ Scaling distributed machine learning with the parameter
1702
+
1703
+ server. In 11th {USENIX} Symposium on Operating Systems Design
1704
+ and Implementation ({OSDI} 14), pages 583–598, 2014.
1705
+ [34] Qinbin Li, Yiqun Diao, Quan Chen, and Bingsheng He.
1706
+ Federated
1707
+ learning on non-iid data silos: An experimental study.
1708
+ In IEEE
1709
+ International Conference on Data Engineering, 2022.
1710
+ [35] Tian Li, Shengyuan Hu, Ahmad Beirami, and Virginia Smith. Ditto: Fair
1711
+ and robust federated learning through personalization. In International
1712
+ Conference on Machine Learning, pages 6357–6368. PMLR, 2021.
1713
+ [36] Yang Liu, Yan Kang, Liping Li, Xinwei Zhang, Yong Cheng, Tianjian
1714
+ Chen, Mingyi Hong, and Qiang Yang.
1715
+ A communication efficient
1716
+ vertical federated learning framework. Scanning Electron Microsc Meet
1717
+ at, 2019.
1718
+ [37] Guodong Long, Yue Tan, Jing Jiang, and Chengqi Zhang. Federated
1719
+ learning for open banking.
1720
+ In Federated learning, pages 240–254.
1721
+ Springer, 2020.
1722
+ [38] Heiko Ludwig, Nathalie Baracaldo, Gegi Thomas, Yi Zhou, Ali Anwar,
1723
+ Shashank Rajamoni, Yuya Ong, Jayaram Radhakrishnan, Ashish Verma,
1724
+ Mathieu Sinn, et al. Ibm federated learning: an enterprise framework
1725
+ white paper v0. 1. arXiv preprint arXiv:2007.10987, 2020.
1726
+ [39] Lingjuan Lyu, Xinyi Xu, Qian Wang, and Han Yu. Collaborative fairness
1727
+ in federated learning. In Federated Learning, pages 189–204. Springer,
1728
+ 2020.
1729
+ [40] Lingjuan Lyu, Jiangshan Yu, Karthik Nandakumar, Yitong Li, Xingjun
1730
+ Ma, Jiong Jin, Han Yu, and Kee Siong Ng. Towards fair and privacy-
1731
+ preserving federated deep models. IEEE Transactions on Parallel and
1732
+ Distributed Systems, 31(11):2524–2541, 2020.
1733
+ [41] Xingjun Ma, Yisen Wang, Michael E Houle, Shuo Zhou, Sarah Erfani,
1734
+ Shutao Xia, Sudanthi Wijewickrema, and James Bailey. Dimensionality-
1735
+ driven learning with noisy labels.
1736
+ In International Conference on
1737
+ Machine Learning, pages 3355–3364. PMLR, 2018.
1738
+ [42] Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and
1739
+ Blaise Aguera y Arcas.
1740
+ Communication-efficient learning of deep
1741
+ networks from decentralized data. In Artificial intelligence and statistics,
1742
+ pages 1273–1282. PMLR, 2017.
1743
+ [43] Vaikkunth Mugunthan, Ravi Rahman, and Lalana Kagal.
1744
+ Blockflow:
1745
+ An accountable and privacy-preserving solution for federated learning.
1746
+ arXiv preprint arXiv:2007.03856, 2020.
1747
+ [44] Nagarajan Natarajan, Inderjit S Dhillon, Pradeep K Ravikumar, and
1748
+ Ambuj Tewari.
1749
+ Learning with noisy labels.
1750
+ Advances in neural
1751
+ information processing systems, 26:1196–1204, 2013.
1752
+ [45] Augustus Odena, Catherine Olsson, David Andersen, and Ian Good-
1753
+ fellow. Tensorfuzz: Debugging neural networks with coverage-guided
1754
+ fuzzing. In International Conference on Machine Learning, pages 4901–
1755
+ 4911. PMLR, 2019.
1756
+ [46] Kexin Pei, Yinzhi Cao, Junfeng Yang, and Suman Jana. Deepxplore:
1757
+ Automated whitebox testing of deep learning systems. In proceedings
1758
+ of the 26th Symposium on Operating Systems Principles, pages 1–18,
1759
+ 2017.
1760
+ [47] Nicola Rieke, Jonny Hancox, Wenqi Li, Fausto Milletari, Holger R
1761
+ Roth, Shadi Albarqouni, Spyridon Bakas, Mathieu N Galtier, Bennett A
1762
+ Landman, Klaus Maier-Hein, et al. The future of digital health with
1763
+ federated learning. NPJ digital medicine, 3(1):1–7, 2020.
1764
+ [48] Yunus Sarikaya and Ozgur Ercetin.
1765
+ Motivating workers in federated
1766
+ learning: A stackelberg game perspective.
1767
+ IEEE Networking Letters,
1768
+ 2(1):23–27, 2019.
1769
+ [49] Aviv Shamsian, Aviv Navon, Ethan Fetaya, and Gal Chechik.
1770
+ Per-
1771
+ sonalized federated learning using hypernetworks.
1772
+ arXiv preprint
1773
+ arXiv:2103.04628, 2021.
1774
+ [50] Karen Simonyan and Andrew Zisserman.
1775
+ Very deep convolu-
1776
+ tional networks for large-scale image recognition.
1777
+ arXiv preprint
1778
+ arXiv:1409.1556, 2014.
1779
+ [51] Jacob Steinhardt, Pang Wei W Koh, and Percy S Liang.
1780
+ Certified
1781
+ defenses for data poisoning attacks.
1782
+ Advances in neural information
1783
+ processing systems, 30, 2017.
1784
+ [52] Youcheng Sun, Xiaowei Huang, Daniel Kroening, James Sharp, Matthew
1785
+ Hill, and Rob Ashmore.
1786
+ Deepconcolic: testing and debugging deep
1787
+ neural networks.
1788
+ In 2019 IEEE/ACM 41st International Conference
1789
+ on Software Engineering: Companion Proceedings (ICSE-Companion),
1790
+ pages 111–114. IEEE, 2019.
1791
+ [53] Canh T Dinh, Nguyen Tran, and Josh Nguyen. Personalized federated
1792
+ learning with moreau envelopes.
1793
+ Advances in Neural Information
1794
+ Processing Systems, 33:21394–21405, 2020.
1795
+ [54] Shunpu Tang, Wenqi Zhou, Lunyuan Chen, Lijia Lai, Junjuan Xia, and
1796
+ Liseng Fan. Battery-constrained federated edge learning in uav-enabled
1797
+ iot for b5g/6g networks. Physical Communication, 47:101381, 2021.
1798
+ [55] Yuchi Tian, Kexin Pei, Suman Jana, and Baishakhi Ray.
1799
+ Deeptest:
1800
+ Automated testing of deep-neural-network-driven autonomous cars. In
1801
+ Proceedings of the 40th international conference on software engineer-
1802
+ ing, pages 303–314, 2018.
1803
+ [56] Muhammad Habib ur Rehman, Ahmed Mukhtar Dirir, Khaled Salah,
1804
+ Ernesto Damiani, and Davor Svetinovic.
1805
+ Trustfed: a framework for
1806
+ fair and trustworthy cross-device federated learning in iiot.
1807
+ IEEE
1808
+ Transactions on Industrial Informatics, 17(12):8485–8494, 2021.
1809
+ [57] Muhammad Usman, Yannic Noller, Corina S P˘as˘areanu, Youcheng Sun,
1810
+ and Divya Gopinath.
1811
+ Neurospf: A tool for the symbolic analysis of
1812
+ neural networks.
1813
+ In 2021 IEEE/ACM 43rd International Conference
1814
+ on Software Engineering: Companion Proceedings (ICSE-Companion),
1815
+ pages 25–28. IEEE, 2021.
1816
+ [58] Saeed Vahidian, Mahdi Morafah, and Bill Lin. Personalized federated
1817
+ learning by structured and unstructured pruning under data hetero-
1818
+ geneity.
1819
+ In 2021 IEEE 41st International Conference on Distributed
1820
+ Computing Systems Workshops (ICDCSW), pages 27–34. IEEE, 2021.
1821
+ [59] Mohammad Wardat, Wei Le, and Hridesh Rajan. Deeplocalize: fault
1822
+ localization for deep neural networks.
1823
+ In 2021 IEEE/ACM 43rd
1824
+ International Conference on Software Engineering (ICSE), pages 251–
1825
+ 262. IEEE, 2021.
1826
+ [60] Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad
1827
+ Farokhi, Shi Jin, Tony QS Quek, and H Vincent Poor.
1828
+ Federated
1829
+ learning with differential privacy: Algorithms and performance analysis.
1830
+ IEEE Transactions on Information Forensics and Security, 15:3454–
1831
+ 3469, 2020.
1832
+ [61] Xiaofei Xie, Lei Ma, Felix Juefei-Xu, Minhui Xue, Hongxu Chen, Yang
1833
+ Liu, Jianjun Zhao, Bo Li, Jianxiong Yin, and Simon See. Deephunter:
1834
+ a coverage-guided fuzz testing framework for deep neural networks. In
1835
+ Proceedings of the 28th ACM SIGSOFT International Symposium on
1836
+ Software Testing and Analysis, pages 146–157, 2019.
1837
+ [62] Xiaofei Xie, Lei Ma, Haijun Wang, Yuekang Li, Yang Liu, and Xiaohong
1838
+ Li. Diffchaser: Detecting disagreements for deep neural networks. In
1839
+ IJCAI, pages 5772–5778, 2019.
1840
+ [63] Zichen Xu, Li Li, and Wenting Zou. Exploring federated learning on
1841
+ battery-powered devices. In Proceedings of the ACM Turing Celebration
1842
+ Conference-China, pages 1–6, 2019.
1843
+ [64] Jiangchao Yao, Jiajie Wang, Ivor W Tsang, Ya Zhang, Jun Sun,
1844
+ Chengqi Zhang, and Rui Zhang.
1845
+ Deep learning from noisy image
1846
+ labels with quality embedding. IEEE Transactions on Image Processing,
1847
+ 28(4):1909–1922, 2018.
1848
+ [65] Dongdong Ye, Rong Yu, Miao Pan, and Zhu Han. Federated learning
1849
+ in vehicular edge computing: A selective model aggregation approach.
1850
+ IEEE Access, 8:23920–23935, 2020.
1851
+ [66] Andreas Zeller and Ralf Hildebrandt. Simplifying and isolating failure-
1852
+ inducing input. Software Engineering, IEEE Transactions on, 28(2):183–
1853
+ 200, 2002.
1854
+ [67] Rongfei Zeng, Chao Zeng, Xingwei Wang, Bo Li, and Xiaowen Chu.
1855
+ A comprehensive survey of incentive mechanism for federated learning.
1856
+ arXiv preprint arXiv:2106.15406, 2021.
1857
+ [68] Rongfei Zeng, Shixun Zhang, Jiaqi Wang, and Xiaowen Chu. Fmore:
1858
+ An incentive scheme of multi-dimensional auction for federated learning
1859
+ in mec. In 2020 IEEE 40th International Conference on Distributed
1860
+ Computing Systems (ICDCS), pages 278–288. IEEE, 2020.
1861
+ [69] Chaoning Zhang, Philipp Benz, Dawit Mureja Argaw, Seokju Lee,
1862
+ Junsik Kim, Francois Rameau, Jean-Charles Bazin, and In So Kweon.
1863
+ Resnet or densenet? introducing dense shortcuts to resnet. In Proceed-
1864
+ ings of the IEEE/CVF winter conference on applications of computer
1865
+ vision, pages 3550–3559, 2021.
1866
+ [70] Jingfeng Zhang, Cheng Li, Antonio Robles-Kelly, and Mohan Kankan-
1867
+ halli.
1868
+ Hierarchically
1869
+ fair
1870
+ federated
1871
+ learning.
1872
+ arXiv
1873
+ preprint
1874
+ arXiv:2004.10386, 2020.
1875
+ [71] Mengshi Zhang, Yuqun Zhang, Lingming Zhang, Cong Liu, and Sar-
1876
+ fraz Khurshid.
1877
+ Deeproad: Gan-based metamorphic testing and input
1878
+ validation framework for autonomous driving systems. In 2018 33rd
1879
+ IEEE/ACM International Conference on Automated Software Engineer-
1880
+ ing (ASE), pages 132–142. IEEE, 2018.
1881
+ [72] Zhilu Zhang and Mert Sabuncu.
1882
+ Generalized cross entropy loss for
1883
+ training deep neural networks with noisy labels. Advances in neural
1884
+ information processing systems, 31, 2018.
1885
+
1886
+ [73] Zhaohua Zheng, Yize Zhou, Yilong Sun, Zhang Wang, Boyi Liu, and
1887
+ Keqiu Li.
1888
+ Applications of federated learning in smart cities: recent
1889
+ advances, taxonomy, and open challenges. Connection Science, pages
1890
+ 1–28, 2021.
1891
+
AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BNAyT4oBgHgl3EQfRvex/content/tmp_files/2301.00073v1.pdf.txt ADDED
@@ -0,0 +1,1874 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00073v1 [cs.IT] 30 Dec 2022
2
+ 1
3
+ Fluid Antenna System: New Insights on
4
+ Outage Probability and Diversity Gain
5
+ Wee Kiat New, Member, IEEE, Kai-Kit Wong, Fellow, IEEE, Xu Hao, Member,
6
+ IEEE, Kin-Fai Tong, Fellow, IEEE, and Chan-Byoung Chae, Fellow, IEEE
7
+ Abstract
8
+ To enable innovative applications and services, both industry and academia are exploring new
9
+ technologies for sixth generation (6G) communications. One of the promising candidates is fluid antenna
10
+ system (FAS). Unlike existing systems, FAS is a novel communication technology where its antenna
11
+ can freely change its position and shape within a given space. Compared to the traditional systems, this
12
+ unique capability has the potential of providing higher diversity and interference-free communications.
13
+ Nevertheless, the performance limits of FAS remain unclear as its channels and system properties are
14
+ highly peculiar to be analyzed. To address this, we approximate the outage probability and diversity
15
+ gain of FAS in closed-form expressions. We then propose a suboptimal FAS with N ∗ ports, where a
16
+ significant gain can be obtained over FAS with N ∗ − 1 ports whilst FAS with N ∗ + 1 ports only yields
17
+ marginal improvement over the proposed suboptimal FAS. In this paper, we also provide analytical and
18
+ simulation results to unfold the key factors that affect the performance of FAS. Limited to systems
19
+ with one active radio frequency (RF)-chain, we show that the proposed suboptimal FAS outperforms
20
+ single-antenna (SISO) system and selection combining (SC) system in terms of outage probability.
21
+ Interestingly, when the given space is λ
22
+ 2 , the outage probability of the proposed suboptimal FAS with
23
+ one active RF-chain achieves near to that of the maximal ratio combining (MRC) system with multiple
24
+ active RF-chains.
25
+ Index Terms
26
+ 6G, fluid antenna system, outage probability, diversity gain, performance analysis.
27
+ The work is supported by the Engineering and Physical Sciences Research Council (EPSRC) under grant EP/W026813/1. For
28
+ the purpose of open access, the authors will apply a Creative Commons Attribution (CC BY) licence to any Author Accepted
29
+ Manuscript version arising. (Corresponding author: Kai-Kit Wong)
30
+ Wee Kiat New (email: [email protected]), Kai-Kit Wong (email: [email protected]), Xu Hao (email:[email protected]), and
31
+ Kin-Fai Tong (email: [email protected]) are with the Department of Electronic and Electrical Engineering, University College
32
+ London, London WC1E 6BT, United Kingdom.
33
+ Kai-Kit Wong and Chan-Byoung Chae (email: [email protected]) are with School of Integrated Technology, Yonsei
34
+ University, Seoul, Korea.
35
+
36
+ 2
37
+ I. INTRODUCTION
38
+ Fifth generation (5G) wireless networks have recently been deployed worldwide and thus the
39
+ industry and academia are now looking for new technologies to maximize the potentials of sixth
40
+ generation (6G) wireless networks. One of the promising candidates is fluid antenna system
41
+ (FAS). Unlike traditional antenna systems, FAS is a software-controllable fluidic, conductive, or
42
+ dielectric structure that can freely adjust its position and shape within a given space [1].
43
+ For example, the most basic single fluid antenna consists of one radio frequency (RF)-chain
44
+ and N ports that are distributed in a given space. The radiating element of the fluid antenna
45
+ can freely switch its position among the ports (e.g., the strongest port) to obtain a stronger
46
+ channel gain, lower interference, and other desirable performance [2]. This is achievable due
47
+ to the recent advancement of using liquid metals (e.g., Galistan and Eutectic Gallium Indium)
48
+ and ionized solutions (e.g., sodium chloride and potassium chloride) for antennas. Note that
49
+ software-controlled pixel antennas, moveable antennas and other flexible antenna structures are
50
+ also considered as fluid antenna [3]. Besides, FAS can co-exist with other 6G candidates such
51
+ as re-configurable intelligent surfaces [4], surface-wave communications [5], intelligent massive
52
+ multiple-input multiple-output [6], and terahertz communications [7].
53
+ Despite its advantages, the fundamental limits of FAS and key factors that affect its perfor-
54
+ mance remain unclear. One of the reasons is because the channels of FAS are strongly correlated
55
+ since the ports can be closely placed to each other. Consequently, the probability density function
56
+ (PDF) and cumulative distribution function (CDF) of FAS channels are intractable [8]. As a result,
57
+ the outage probability and diversity gain of FAS are not known in closed-form expressions. In
58
+ addition, increasing the number of ports of FAS has an inherit diminishing gain due to one active
59
+ RF-chain [9].1 Thus, a suboptimal number of ports that are required to achieve a satisfactory
60
+ performance is not known. Yet, this number is practically and theoretically important as it reduces
61
+ the implementation challenges and analysis complexity.
62
+ Researchers might argue that FAS resembles a traditional selection combining (SC) system as
63
+ the strongest antenna is selected in a point-to-point setting. From this viewpoint, some similarities
64
+ are observed as there is a set of antennas/ports to select from and both systems only use one
65
+ active RF-chain for communications. Nevertheless, FAS can have infinitely many ports (e.g.,
66
+ 1Throughout this paper, we refer to an active RF-chain as the RF-chain used for communications. In contrast, the term
67
+ RF-chains refers to a collection of RF-chains that are connected to each antenna for it to work as intended.
68
+
69
+ 3
70
+ when using liquid metals) which makes the implementation and analysis much more challenging.
71
+ In addition, the unique capability of freely switching the radiating element among the ports can
72
+ be exploited to mitigate multi-user interference. These features are impractical or too costly in
73
+ traditional SC systems.
74
+ State-of-the-arts show that FAS outperforms maximal ratio combining (MRC) system if the
75
+ number of ports is sufficiently large [3]. In fact, [3] proves that FAS achieves arbitrarily small
76
+ outage for a fixed rate/signal-to-noise ratio (SNR) as N → ∞. In [10], the authors reveal that the
77
+ ergodic capacity of FAS increases with N and thus FAS can outperform MRC in terms of ergodic
78
+ capacity. Interestingly, FAS can also be used for multiple access. Specifically, [11] proposes a
79
+ fluid antenna multiple access (FAMA) system which leverages the moment of deep fades in space
80
+ to reduce multi-user interference. Motivated by these works, [12] employs stochastic geometry
81
+ to analyze the outage probability of FAS in large-scale downlink cellular networks and [13]
82
+ analyzes the performance of FAS in a more general correlated fading channel.
83
+ Nevertheless, [14] alludes that the channel modeling in the previous works might be inaccurate.
84
+ To address this, [8] proposes a highly complicated channel model to follow closely the spatial
85
+ correlation of the Jake’s model. Using this channel model, they highlight that FAS has limited
86
+ performance gain as N increases. Yet, the key reasons that limit the performance of FAS remain
87
+ ambiguous. This is because the eigenvalue and eigenvector entries that are used in the analytical
88
+ PDF/CDF expressions provide limited insights.
89
+ It is important to highlight that deriving the PDF/CDF of FAS channels is extremely challeng-
90
+ ing [8]. This is because the channels of FAS are strongly correlated and thus they have to be
91
+ formulated in terms of multivariate distributions. Over the past few decades, extensive efforts have
92
+ been dedicated to this problem [15]. However, most of the works only obtain the bivariate [16],
93
+ [17], trivariate [16], [18], [19], or quadvariate [19], [20] distributions while other works restrict
94
+ the correlation matrix to certain forms (e.g., equally correlated [21] and exponentially correlated
95
+ [22]). Fortunately, the multivariate PDF/CDF of arbitrarily correlated Rayleigh distributions are
96
+ recently derived in [23]–[25]. Nevertheless, the assumption of non-singular correlation matrix
97
+ is retained. In this paper, we omit this assumption (i.e., our correlation matrix could be near-
98
+ singular) and address the computation problem via a suboptimal approximation.2
99
+ 2The computational problem of a near-singular correlation matrix is much harder to address than that of a singular matrix.
100
+ This is because we can obtain an independent matrix from a singular matrix by removing the dependent entries [26]. But in the
101
+ near-singular case, this approach cannot be applied. Instead, we need to rely on approximations.
102
+
103
+ 4
104
+ In addition to the above works, [27] develops a port selection algorithm that can approach the
105
+ performance of optimal FAS when only the received SNR of a few ports are observed. Further-
106
+ more, [28] considers a field-response channel model while omitting the spatial correlation effect
107
+ and [29] extends the model to a multiple-input multiple-output (MIMO) scenario. Moreover,
108
+ FAMA can be categorized into i) slow-FAMA and ii) fast-FAMA. The earlier switches its port
109
+ when the channel changes [30] while the latter switches its port on a symbol-by-symbol basis
110
+ [31]. The analytical outage probability of two-user FAMA is also derived in [32].
111
+ Motivated by the aforementioned works, this paper aims to understand the fundamental limits
112
+ of FAS as well as the key factors that affect its performance. To this end, we approximate
113
+ the outage probability and diversity gain of FAS in closed-form expressions via a simple and
114
+ accurate channel model that follows closely the spatial correlation of Jake’s model. In addition,
115
+ we propose a suboptimal FAS with N∗ ports as well as an algorithm to approximate N∗. The
116
+ main contributions of our paper are summarized as follows:
117
+ • We employ a simple and accurate channel model that follows the spatial correlation of Jake’s
118
+ model. Based on this channel model, we approximate the outage probability in closed-form
119
+ expressions. By applying Taylor series approximation, we simplify the outage probability at
120
+ high SNR into a simpler and more meaningful expression. Using this result, we also obtain
121
+ the diversity gain of FAS.
122
+ • We propose a suboptimal FAS with N∗ ports. The proposed suboptimal FAS plays an
123
+ important role as it enables FAS to achieve near-optimal performance with minimal number
124
+ of ports. In particular, one may define εtol to adjust the sub-optimality of the proposed FAS.
125
+ For example, if εtol is small, the proposed FAS is quantifiably near-optimal at a cost of more
126
+ ports. In addition, we develop a polynomial-time algorithm to approximate N∗. Besides,
127
+ N∗ can be used to address the near-singular correlation matrix problem.
128
+ • We provide analytical and simulation results to demonstrate the key parameters that affect the
129
+ performance of FAS. Our discussions include intuitive insights on the system characteristics
130
+ as well as practical guidelines for efficient FAS design.
131
+ The rest of the paper is organized as follows: Section II details the system model and performance
132
+ metrics. Section III presents the outage probabiility and diversity gain of FAS. The details of
133
+ suboptimal FAS and the algorithm to approximate N∗ are discussed in Section IV. Section V
134
+ provides our numerical results and we conclude the paper in Section VI.
135
+ Notations: Scalar variables are denoted by italic letters (e.g., c), vectors are denoted by boldface
136
+
137
+ 5
138
+ italic small letters (e.g., c) and matrices are denoted by boldface italic capital letters (e.g., C).
139
+ Besides, (·)T denotes transpose, (·)H denotes conjugate transpose while |·| and ∥·∥F denotes
140
+ absolute and Frobenius norm, respectively. Throughout this paper, log(·) denotes logarithm with
141
+ base 2, E [·] denotes the expectation and P {·} denotes the probability of an event. In addition,
142
+ fc (·) denotes the PDF of c, and Fc (·) denotes the CDF of c. The notation 1c {·} is an indication
143
+ function for condition c and [·]+/−
144
+ c
145
+ outputs the argument that is lower/upper bounded by c.
146
+ II. SYSTEM MODEL
147
+ In this paper, we consider a point-to-point FAS where the transmitter is equipped with a
148
+ conventional antenna and the receiver is equipped with a fluid antenna. The fluid antenna consists
149
+ of N ports, which are evenly distributed along a linear dimension of length Wλ where λ is the
150
+ wavelength of the operating system. Since the ports are closely packed together, there is a strong
151
+ spatial correlation among them. Based on Jake’s model [33], the spatial correlation between the
152
+ mth and nth ports is given by
153
+ Jm,n = σ2J0
154
+
155
+ 2π(m − n)
156
+ N − 1 W
157
+
158
+ ,
159
+ (1)
160
+ where σ2 accounts for the large-scale fading effect and J0 (·) is the zero-order Bessel function
161
+ of the first kind.
162
+ For ease of analysis, we introduce the correlation matrix J where
163
+ J =
164
+
165
+ 
166
+ J1,1
167
+ · · ·
168
+ J1,N
169
+ ...
170
+ ...
171
+ ...
172
+ JN,1
173
+ · · ·
174
+ JN,N
175
+
176
+  .
177
+ (2)
178
+ In (2), we have Jm,n = Jn,m. Therefore, using eigenvalue decomposition, we can obtain J =
179
+ UΛU H where U is an N × N matrix whose n-th column (denoted by un) is the eigenvector
180
+ of J and Λ = diag (λ1, . . . , λN) is an N × N diagonal matrix whose n-th diagonal entries are
181
+ the corresponding eigenvalues of un. Without loss of generality, we assume that the values of
182
+ the eigenvalues in Λ are arranged in descending order. i.e., λ1 ≥ · · · ≥ λN.
183
+ Throughout this paper, we assume there is only one RF chain in FAS and thus only one port
184
+ can be activated for communications. The received signal of the nth port is expressed as
185
+ yn = hnx + wn, n = 1, . . . , N,
186
+ (3)
187
+
188
+ 6
189
+ where hn is the complex channel coefficient of the nth port, x is the information signal with
190
+ E
191
+
192
+ |x|2�
193
+ = P and wn ∼ CN (0, N0) , ∀n is the additive white Gaussian noise of the nth port.
194
+ Due to the spatial correlation of the ports, hn can be modeled as
195
+ hn =
196
+ N
197
+
198
+ m=1
199
+ un,m
200
+
201
+ λmzm,
202
+ (4)
203
+ where un,m is the (n, m)-th entry of U, zn = an + jbn, where an, bn, ∀n, are i.i.d. Gaussian ran-
204
+ dom variables with zero mean and variance of 1
205
+ 2. According to [8], (4) can also be approximated
206
+ as
207
+ ˆhn = Ψvn +
208
+ ǫ-rank
209
+
210
+ m=1
211
+ un,m
212
+
213
+ λmzm,
214
+ (5)
215
+ where ǫ-rank is a modeling parameter, Ψ =
216
+
217
+ σ2 − �ǫ-rank
218
+ m=1 u2
219
+ n,mλm, vn = cn + jdn and
220
+ cn, dn, ∀n, are i.i.d. Gaussian random variables with zero mean and variance of 1
221
+ 2.
222
+ To obtain the global optimum performance, FAS activates a port with the maximum signal
223
+ envelope [3],3 i.e.,
224
+ |hFAS| = max {|h1| , . . . , |hN|} .
225
+ (6)
226
+ The average received SNR of the receiver is found as
227
+ Θ = |hFAS|2 P
228
+ N0
229
+ = |hFAS|2 SNR,
230
+ (7)
231
+ where SNR =
232
+ P
233
+ N0 is the transmit SNR and its outage probability is defined as
234
+ P {log (1 + Θ) < q} = P {|hFAS| < Ω} ,
235
+ (8)
236
+ where Ω =
237
+
238
+ 2q−1
239
+ SNR and q is the minimum required rate. In addition, the diversity gain of FAS
240
+ can be defined as [34]
241
+ lim
242
+ SNR→∞ − log Pe (SNR)
243
+ log (SNR)
244
+ (a)
245
+ =
246
+ lim
247
+ SNR→∞ − log P
248
+
249
+ log
250
+
251
+ 1 + |hFAS|2 SNR
252
+
253
+ < q
254
+
255
+ log (SNR)
256
+ = d,
257
+ (9)
258
+ where (a) follows from the fact that error probability and outage probability differ by a constant
259
+ shift at high SNR [35].
260
+ 3Due to the port spatial correlation, it is shown in [30] that only a small number of observed ports/training is required to
261
+ obtain the full channel state information.
262
+
263
+ 7
264
+ III. OUTAGE PROBABILITY AND DIVERSITY GAIN OF FAS
265
+ As it is seen in (4), the complex channel coefficients h = [h1, . . . , hN]T are correlated.
266
+ Therefore, |h| is a correlated Rayleigh random vector. We present the following lemmas to
267
+ obtain the closed-form outage probability and diversity gain of FAS.
268
+ Lemma 1. The PDF of |h| can be approximated as
269
+ f|h| (r1, . . . , rN)
270
+ ≈ η
271
+ s0
272
+
273
+ s1=0
274
+ s1
275
+
276
+ s2=0
277
+ . . .
278
+ sT −1
279
+
280
+ sT =0
281
+ �1
282
+ 2
283
+ ��T
284
+ t=1 s∗
285
+ t
286
+ T�
287
+ t=1
288
+ β (t, s∗
289
+ t)
290
+
291
+ v∈V
292
+
293
+
294
+ T�
295
+ t=1
296
+
297
+  s∗
298
+ t
299
+ vt
300
+
301
+
302
+
303
+
304
+
305
+ (2π)N
306
+ N
307
+
308
+ i=1
309
+ 1{∆i=0}
310
+
311
+ .
312
+ (10)
313
+ Proof: See Appendix A.
314
+ In (10), η =
315
+ N
316
+
317
+ n=1
318
+ |hn|
319
+ πNdet(J) exp
320
+
321
+
322
+ �N
323
+ n=1|hn|2Kn,n
324
+ det(J)
325
+
326
+ , T = N(N−1)
327
+ 2
328
+ , β (t, st) ≜ ζst
329
+ t
330
+ st! , ζt = −2Km,n|hn||hm|
331
+ det(J)
332
+ ,
333
+ and s∗
334
+ t = st − st+1 with sT+1 = 0. The subscript t and m, n are related as follows: t =
335
+ n + (m − 1) N − m(m+1)
336
+ 2
337
+ , m < n, while m, n can be obtained from t with m = min m′ ∈ Z
338
+ subject to �m′
339
+ i=1 (N − i) > t and n = t − (m − 1) N + m(m+1)
340
+ 2
341
+ .
342
+ Note that s0 is a finite constant which has to be large for the approximation to be accurate.
343
+ In addition, v = [v1, . . . , vT]T, V denotes the set of all the possible permutations, and ∆i =
344
+ �N
345
+ n=1 Gi,n + �N
346
+ n=1 Gn,i − Gi,i. Furthermore, Km,n is the (m, n)-th entry of K where K is the
347
+ co-factor of J, and Gm,n is the (m, n)-th entry of G where G is defined as
348
+ G =
349
+
350
+ 
351
+ 0
352
+ γ1
353
+ γ2
354
+ · · ·
355
+ γN−1
356
+ γN
357
+ · · ·
358
+ γ2N−3
359
+ ...
360
+ ...
361
+ ...
362
+ γT
363
+ 0
364
+ · · ·
365
+ 0
366
+
367
+ 
368
+ ,
369
+ (11)
370
+ and γt = 2vt − j∗
371
+ t ∈ Z.
372
+ Lemma 2. The CDF of |h| can be approximated as
373
+ F|h| (R1, . . . , RN) ≈
374
+ j0
375
+
376
+ j1=0
377
+ j1
378
+
379
+ j2=0
380
+ . . .
381
+ jp−1
382
+
383
+ jp=0
384
+ g (s∗)
385
+ πNdet(J)
386
+ T
387
+
388
+ t=1
389
+ (−Kt)s∗
390
+ t
391
+ s∗
392
+ t!det(J)s∗
393
+ t ×
394
+ N
395
+
396
+ n=1
397
+ � Kn,n
398
+ det(J)
399
+ �− ¯sn
400
+ 2 −1 �
401
+ Γ
402
+
403
+ 1 + ¯sn
404
+ 2
405
+
406
+ − Γ
407
+
408
+ 1 + ¯sn
409
+ 2 , Kn,nR2
410
+ n
411
+ det(J)
412
+ ��
413
+ .
414
+ (12)
415
+
416
+ 8
417
+ Proof: See Appendix B.
418
+ In (12), ¯sn is the sum of s∗
419
+ t→m,n affecting |hn| and
420
+ g (s∗) =
421
+ �1
422
+ 2
423
+ ��T
424
+ t=1 s∗
425
+ t �
426
+ v∈V
427
+
428
+
429
+ T�
430
+ t=1
431
+
432
+  s∗
433
+ t
434
+ vt
435
+
436
+
437
+
438
+  (2π)N
439
+ N
440
+
441
+ i=1
442
+ 1{∆i=0}.
443
+ (13)
444
+ The expressions in (10) and (12) are extremely complicated. Nevertheless, they enable us to
445
+ obtain more insightful derivations as shown later in this paper. Using the above lemmas, we
446
+ present the following theorems.
447
+ Theorem 3. The outage probability of FAS can be approximated in a closed-form expression as
448
+ P {|hFAS| < Ω} = F|h| (Ω, . . . , Ω)
449
+ (14)
450
+
451
+ j0
452
+
453
+ j1=0
454
+ j1
455
+
456
+ j2=0
457
+ . . .
458
+ jp−1
459
+
460
+ jp=0
461
+ g (s∗)
462
+ πNdet(J)
463
+ T�
464
+ t=1
465
+ (−Kt)s∗
466
+ t
467
+ s∗
468
+ t!det(J)s∗
469
+ t ×
470
+ N
471
+
472
+ n=1
473
+ � Kn,n
474
+ det(J)
475
+ �− ¯sn
476
+ 2 −1 �
477
+ Γ
478
+
479
+ 1 + ¯sn
480
+ 2
481
+
482
+ − Γ
483
+
484
+ 1 + ¯sn
485
+ 2 , Kn,nΩ2
486
+ det(J)
487
+ ��
488
+ .
489
+ Proof: The result can be obtained using Lemma 2 and substituting R1 = · · · = RN = Ω.
490
+ Remark 4. According to [8], h can be modeled using ˆh =
491
+
492
+ ˆh1, . . . , ˆhN
493
+ �T
494
+ and using the latter
495
+ model, they show that the outage probability of FAS can be approximated by
496
+ F|hFAS| (Ω) ≈
497
+
498
+
499
+ N
500
+
501
+ n=1
502
+
503
+ ˆ
504
+ 0
505
+ 1
506
+ �ǫ−rank
507
+ m=1
508
+ u2n,mλm
509
+ exp
510
+
511
+
512
+ r
513
+ �ǫ−rank
514
+ m=1
515
+ u2n,mλm
516
+
517
+ ×
518
+
519
+ 1 − Q1
520
+ �√
521
+ 2r
522
+ Ψ ,
523
+
524
+ 2Ω
525
+ Ψ
526
+ ��L
527
+ dr
528
+
529
+
530
+ 1
531
+ L
532
+ ,
533
+ (15)
534
+ where Q1 (·, ·) is the Marcum-Q function and L = min
535
+
536
+ 1.52(N−1)
537
+ 2πW
538
+ , N
539
+
540
+ . Note that (15) is a
541
+ remarkable expression as each n term only has a single integral. Nevertheless, we found that it
542
+ is challenging to obtain deeper insights from this expression.
543
+ Theorem 5. The outage probability of FAS at high SNR is given by
544
+ P {|hFAS| < Ω} =
545
+ 1
546
+ det(J)ΩN + o
547
+
548
+ 1
549
+ SNRN
550
+
551
+ .
552
+ (16)
553
+ Proof: See Appendix C.
554
+
555
+ 9
556
+ Theorem 6. The diversity gain of FAS is approximately expressed as
557
+ DFAS ≈ min {N, N′} ,
558
+ (17)
559
+ where N′ is the rank of J ′ such that J ′ is the covariance matrix as defined in (2) with N → ∞
560
+ for a fixed W.
561
+ Proof: See Appendix D.
562
+ In Theorem 5, we can interpret det
563
+
564
+ J −1�
565
+ as the penalty term and Ω as gain of FAS that scales
566
+ exponentially w.r.t. N. Meanwhile, the term with little-o can be ignored as it approaches zero if
567
+ the SNR is high. Nevertheless, in Theorem 6, we can see that the diversity gain is limited by
568
+ min {N, N′}. Thus, increasing N over N′ might not be useful. Notice that these interpretations
569
+ cannot be directly obtained from (15).
570
+ IV. SUBOPTIMAL SOLUTION: FAS WITH N∗ PORTS
571
+ At a fundamental level, [9] showed that increasing the number of channels (or ports) would
572
+ yield a diminishing gain (i.e., the average received SNR gain is �N
573
+ n
574
+ 1
575
+ n.). In fact, [8] showed that
576
+ for a fixed W, the outage probability of FAS might remain similar after some N. For ease of
577
+ expositions, we denote this N as N∗ where N∗ ≤ N.
578
+ To the best of our knowledge, little is known about N∗. In fact, it is very challenging to
579
+ obtain N∗ as it varies with the parameter W or more precisely the correlation matrix J.4 Yet,
580
+ finding N∗ is essential in both theory and practice since it helps FAS to achieve an efficient
581
+ performance with a minimal number of ports. In this section, we present a simple method to
582
+ approximate N∗ for a given W.
583
+ To begin with, we present the following theorem.
584
+ Theorem 7. Suppose the channels of FAS with N ports are denoted by h. Then h can be
585
+ well-approximated by ˜h =
586
+
587
+ ˜h1, . . . , ˜hN
588
+ �T
589
+ where
590
+ ˜hn =
591
+ ˜
592
+ N
593
+
594
+ m=1
595
+ un,m
596
+
597
+ λmzm,
598
+ (18)
599
+ where ˜N is the numerical rank of J. That is, the PDF and CDF of h and ˜h are similar.
600
+ 4Referring to (1) and (2), we can see that N ∗ depends on the parameter W .
601
+
602
+ 10
603
+ Proof: Let ˜N be the numerical rank of J where ˜N ≤ N. Using the definition of numerical
604
+ rank, we have λn < ǫ for n ∈
605
+
606
+ ˜N + 1, . . . , N
607
+
608
+ where ǫ ≈ 0. According to Eckart-Young-Mirsky
609
+ theorem [36], the optimal ˜J that minimizes the Frobenius norm between matrix J and ˜J subject
610
+ to the constraint that rank
611
+
612
+ ˜J
613
+
614
+ ≤ ˜N is ˜J = U ˜ΛU H where ˜Λ = diag (λ1, . . . , λ ˜
615
+ N, 0, . . . 0).
616
+ Using this insight, we introduce ˜h as defined in Theorem 7 where the covariance of ˜h is ˜J
617
+ (i.e., the best approximation of J for rank
618
+
619
+ ˜J
620
+
621
+ ≤ ˜N). As a result, we can well-approximate h
622
+ using ˜h since the Frechet distance between the two distributions is [37]
623
+ W2
624
+
625
+ CN (0N×1, J) , CN
626
+
627
+ 0N×1, ˜J
628
+ ��
629
+ =
630
+ ����(Λ)
631
+ 1
632
+ 2 −
633
+
634
+ ˜Λ
635
+ � 1
636
+ 2
637
+ ����
638
+ 2
639
+ F
640
+ ≈ 0.
641
+ (19)
642
+ Corollary 8. If we have the exact eigenvalues and rank of J, then h = ˜h.
643
+ Proof: Let Λ and ˜N be the exact rank and eigenvalues of J. Using the definition of rank,
644
+ we have λn = 0 for n ∈
645
+
646
+ ˜N + 1, . . . , N
647
+
648
+ . It then follows that the Frechet distance between the
649
+ distributions of h and ˜h is zero.
650
+ As seen in (19), it is the eigenvalues of correlation matrix that plays a critical role in the
651
+ channel approximation. Motivated by this insight, we introduce a new formula as follows:
652
+ εN∗ = SN − SN∗ = σ2 − SN∗,
653
+ (20)
654
+ where SN∗ = 1
655
+ N
656
+ �N∗
657
+ n=1 λn. Note that (20) is analogous to (19) in the sense that the left hand side
658
+ of (20) measures the gap between the distributions of h and h∗, where h∗ is similarly defined
659
+ as in (18) but we instead replace ˜N with N∗ and impose that N∗ ≤ ˜N. Meanwhile, on the right
660
+ hand side of (20), we consider the average eigenvalues of J ∗, where J ∗ is the covariance of h∗.
661
+ To reduce the number of required ports, we define εtol > 0 and find the smallest integer N∗
662
+ such that εtol ≥ εN∗. Since J ∗ only has N∗ dominant eigenvalues, we propose to employ a
663
+ suboptimal FAS with N∗ ports. Interestingly, εtol has a nice heuristic interpretation in practice.
664
+ Specifically, it defines the sub-optimality of the proposed FAS, i.e., the proposed FAS is near
665
+ optimal if εtol is small and less optimal if εtol is large.
666
+ By fixing εtol appropriately,5 we observe that FAS with N∗ ports yields considerable improve-
667
+ ment over all FAS with N < N∗ ports while most of the FAS with N > N∗ ports yields
668
+ 5We recommend to set εtol = 0.01σ2 (i.e., the average eigenvalues of J ∗ is 99% of that of J)
669
+
670
+ 11
671
+ Algorithm 1 Method of approximating N∗ given W
672
+ 1: Input: W, εtol; Output: N∗
673
+ 2: Compute J = UΛU H
674
+ 3: Define n = 1 and compute εn
675
+ 4:
676
+ While εtol < εn and n < ˜N
677
+ 5:
678
+ n = n + 1
679
+ 6:
680
+ εn = σ2 − Sn
681
+ 7: end
682
+ 8: Return n as N∗
683
+ marginal improvement over FAS with N − 1 ports. Note that we usually have N∗ < ˜N if J is
684
+ ill-conditioned and N∗ = ˜N if J is well-conditioned.
685
+ The method of approximating N∗ is given in Algorithm 1. To measure the computational
686
+ complexity of our algorithm, we consider the floating-point operations (flops). A flop is defined
687
+ as one addition, subtraction, multiplication or division of two floating point numbers [38].
688
+ In Algorithm 1, computing J and UΛU H requires 6N2 and 21N3 flops, respectively [39].
689
+ Computing εn requires n + 1 flops for each n. Therefore, the total flops of Algorithm 1 is
690
+ 21N3 +6N2 + 1
691
+ 2N∗2 + 3
692
+ 2N∗, which has a polynomial time-complexity of O (N3) since N∗ ≤ N.
693
+ In other words, Algorithm 1 is only dominated by the computation of UΛU H.
694
+ Note that N∗ is also useful in theory. For example, Lemma 1 and 2 and Theorem 3, 5, and
695
+ 6 are incalculable if J is near-singular. To address this, we present the following theorem.
696
+ Theorem 9. If J is near-singular, then we can approximate the channels of FAS with N ports
697
+ using N∗ ports from a computational perspective. Nevertheless, a small gap between the channel
698
+ distributions of FAS with N ports and that of N∗ ports might exist.
699
+ Proof: If J is near-singular, then one or more entries are almost linear combinations of
700
+ the other entries. Thus, we can remove these nearly-dependent entries and only consider N∗
701
+ independent entries. Since FAS with N∗ ports has N∗ dominant eigenvalues, Lemma 1 and 2
702
+ and Theorem 3, 5, and 6 are calculable. Nevertheless, there might be a small gap between the
703
+ channel distributions of FAS with N ports and that of N∗ ports since the entries are nearly-
704
+ dependent only.
705
+
706
+ 12
707
+ (a)
708
+ (b)
709
+ Figure 1: FAS with 2 ports: (a) joint PDF; (b) joint CDF.
710
+ V. RESULTS AND DISCUSSION
711
+ In this section, we present simulation results to better understand the performance of FAS.
712
+ We focus on the design of an efficient FAS as well as the factors that limit its performance.
713
+ Unless stated otherwise, we assume that σ2 = 1, N = 50, W = 0.5, q = 10 and SNR = 30dB.
714
+ Firstly, we demonstrate the accuracy of (10) and (12). In order to visualize the joint PDF and
715
+ CDF of |h|, we consider a FAS with 2 ports (i.e., N = 2). In Fig. 1, the red grid represents
716
+ the numerical PDF/CDF while the solid surface is the analytical PDF/CDF. As observed, the
717
+ approximation of the PDF/CDF of |h| matches closely with the numerical ones over all the
718
+ distributed region. Still, it is worth noting that (10) and (12) are very complicated. Thus,
719
+ approximations with simpler expressions remain desirable.
720
+ In Fig. 2, we compute the outage probability of FAS versus SNR for different N and W.
721
+ Comparing Fig. 2(a) and Fig. 2(b), we can clearly see that the outage probability is mainly
722
+ limited by W. In particular, if W is small and N is large, the outage probability remains similar
723
+ which is in alignment with the findings of [8]. Nevertheless, if W is sufficiently large, the outage
724
+ probability decreases significantly as N increases.
725
+ To better understand this, we further compare the outage probability of FAS to (15) and (16).
726
+ In Fig. 3, we can see that (15) is less accurate while (16) is accurate as SNR increases. From
727
+ (16), we learn that det
728
+
729
+ J −1�
730
+ plays a critical role in the performance of FAS. In particular, J
731
+ has to be well-conditioned in order for ΩN to be the dominant term. If J is near-singular, then
732
+
733
+ 30.8
734
+ 0.6
735
+ CDF
736
+ 0.4
737
+ 0.2
738
+ 0
739
+ 4
740
+ 3
741
+ 2
742
+ 1
743
+ 1
744
+ 0
745
+ 0
746
+ [h2]
747
+ [hi]0.03Q.0
748
+ 0.6
749
+ PDF
750
+ 0.4
751
+ 0.2
752
+ 0
753
+ 4
754
+ 3
755
+ 2
756
+ 2
757
+ 1
758
+ 1
759
+ [h2]
760
+ 0
761
+ 0
762
+ [hi]13
763
+ 10
764
+ 15
765
+ 20
766
+ 25
767
+ 30
768
+ 35
769
+ 40
770
+ 45
771
+ 50
772
+ SNR
773
+ 10-6
774
+ 10-5
775
+ 10-4
776
+ 10-3
777
+ 10-2
778
+ 10-1
779
+ 100
780
+ Outage probability
781
+ (a)
782
+ 10
783
+ 15
784
+ 20
785
+ 25
786
+ 30
787
+ 35
788
+ 40
789
+ 45
790
+ 50
791
+ SNR
792
+ 10-6
793
+ 10-5
794
+ 10-4
795
+ 10-3
796
+ 10-2
797
+ 10-1
798
+ 100
799
+ Outage probability
800
+ (b)
801
+ Figure 2: Outage probability of FAS versus SNR for different N and W: (a) W = 0.5; (b)
802
+ W = 10.
803
+ 10
804
+ 15
805
+ 20
806
+ 25
807
+ 30
808
+ 35
809
+ 40
810
+ 45
811
+ 50
812
+ 55
813
+ 60
814
+ SNR
815
+ 10-7
816
+ 10-6
817
+ 10-5
818
+ 10-4
819
+ 10-3
820
+ 10-2
821
+ 10-1
822
+ 100
823
+ Outage probability
824
+ Figure 3: Outage probability of FAS at high SNR.
825
+ the parameter N is no longer important. This is because det
826
+
827
+ J −1�
828
+ cannot be compensated by
829
+ ΩN. To make J a well-conditioned matrix, we can either increase W for a fixed N or decrease
830
+ N for a fixed W. Nevertheless, we believe that larger N does not cause any harm to the system
831
+ in practice. It only makes the theoretical analysis harder.
832
+ As shown in Fig. 4(a), we compare the outage probability of FAS with N ports and that of
833
+ N′ ports for different W where N < N′. As it is seen, the outage probability of the earlier
834
+ is lower bounded by the latter regardless of W. In Fig. 4(b), we investigate the opposite case
835
+
836
+ 14
837
+ 10
838
+ 15
839
+ 20
840
+ 25
841
+ 30
842
+ 35
843
+ 40
844
+ 45
845
+ 50
846
+ SNR
847
+ 10-4
848
+ 10-3
849
+ 10-2
850
+ 10-1
851
+ 100
852
+ Outage probability
853
+ (a)
854
+ 10
855
+ 15
856
+ 20
857
+ 25
858
+ 30
859
+ 35
860
+ 40
861
+ 45
862
+ 50
863
+ SNR
864
+ 10-4
865
+ 10-3
866
+ 10-2
867
+ 10-1
868
+ 100
869
+ Outage probability
870
+ (b)
871
+ Figure 4: Outage probability of FAS with N ports versus ˜N ports: (a) N = 3 <
872
+ ˜N; (b)
873
+ N = 50 > ˜N .
874
+ where N > N′. As observed, the outage probability of FAS with N ports and that of N′ ports
875
+ are the same for different W. Thus, the diversity gain of FAS is limited by min {N, N′}, which
876
+ verifies Theorem 6. Theorem 6 also suggests that increasing the ports beyond N′ provides no
877
+ improvement in a point-to-point setting.
878
+ Fig. 5(a) presents the CDF of h and ˜h where we fix R1 = · · · = RN = R. In the result, no
879
+ significant variation is observed between h and ˜h regardless of R, N and W. This is because
880
+ the Frechet distance between the two distributions is always near zero. This confirms Theorem
881
+ 7 and suggests that one can always use ˜h instead of h. In addition, Fig. 5(b) shows the CDF of
882
+ h and h∗. Unlike the previous result, there is a small gap between the two distributions as W
883
+ increases. Despite having some gaps, the approximation is still fairly good. This result verifies
884
+ Theorem 9.
885
+ Next, we investigate the accuracy of Algorithm 1 and the efficiency of the proposed suboptimal
886
+ FAS. The parameter N∗ for different W using Algorithm 1 is summarized in Table I. As it is
887
+ seen, the outage probability of FAS with N∗ ports is promising. Specifically, FAS with N∗ ports
888
+ yields a significant improvement over FAS with N∗ −1 ports. Meanwhile, FAS with N +1 ports
889
+ provides negligible improvement over FAS with N∗ ports. Thus, we may use the suboptimal
890
+ FAS for an efficient performance.
891
+ Finally in Fig. 7, we compare the outage probability of the proposed suboptimal FAS, the
892
+
893
+ 15
894
+ 0
895
+ 0.5
896
+ 1
897
+ 1.5
898
+ 2
899
+ 2.5
900
+ 3
901
+ 3.5
902
+ 4
903
+ 0
904
+ 0.1
905
+ 0.2
906
+ 0.3
907
+ 0.4
908
+ 0.5
909
+ 0.6
910
+ 0.7
911
+ 0.8
912
+ 0.9
913
+ 1
914
+ CDF
915
+ (a)
916
+ 0
917
+ 0.5
918
+ 1
919
+ 1.5
920
+ 2
921
+ 2.5
922
+ 3
923
+ 3.5
924
+ 4
925
+ 0
926
+ 0.1
927
+ 0.2
928
+ 0.3
929
+ 0.4
930
+ 0.5
931
+ 0.6
932
+ 0.7
933
+ 0.8
934
+ 0.9
935
+ 1
936
+ CDF
937
+ (b)
938
+ Figure 5: CDF between: (a) h and ˜h; (b) h and h∗.
939
+ Table I: Parameter N∗ generated by algorithm 1 for different W.
940
+ W
941
+ 0.5
942
+ 1
943
+ 2
944
+ 3
945
+ 4
946
+ N ∗
947
+ 3
948
+ 4
949
+ 6
950
+ 8
951
+ 10
952
+ optimal FAS, the single antenna (SISO) system, the N-branch SC system, and the N-branch
953
+ MRC system. In SC and MRC systems, we assume there are N RF-chains where each antenna
954
+ has to be at least λ
955
+ 2 apart and their spatial correlations are considered. Results show that the
956
+ proposed suboptimal FAS outperforms SISO and SC systems. This improvement is due to the
957
+ ability of FAS switching to the best port within a finite W.
958
+ In addition, MRC has the lowest outage probability. It outperforms optimal FAS. This su-
959
+ periority is due to the power gain where a larger number of active RF-chains (i.e.,
960
+ � W
961
+ 0.5
962
+
963
+ + 1)
964
+ is utilized. Although MRC is more superior than the suboptimal FAS, the latter can achieve a
965
+ similar performance as compared to the earlier when W = 0.5. Yet, it is important to recall
966
+ that MRC has one additional RF-chain as compared to the suboptimal FAS in this case. Thus, it
967
+ will be very interesting to compare the performance of MIMO-FAS and MIMO with the same
968
+ number of RF-chains.
969
+
970
+ 16
971
+ 10
972
+ 15
973
+ 20
974
+ 25
975
+ 30
976
+ 35
977
+ 40
978
+ 45
979
+ 50
980
+ SNR
981
+ 10-4
982
+ 10-3
983
+ 10-2
984
+ 10-1
985
+ 100
986
+ Outage probability
987
+ W=4
988
+ W=2
989
+ W=1
990
+ W=0.5
991
+ W=3
992
+ Figure 6: Outage probability of suboptimal FAS.
993
+ 0.5
994
+ 1
995
+ 1.5
996
+ 2
997
+ 2.5
998
+ 3
999
+ 3.5
1000
+ 4
1001
+ 10-6
1002
+ 10-5
1003
+ 10-4
1004
+ 10-3
1005
+ 10-2
1006
+ 10-1
1007
+ 100
1008
+ Outage probability
1009
+ Figure 7: Outage probability of suboptimal FAS vs. SISO, SC, and MRC.
1010
+ VI. CONCLUSIONS
1011
+ In this paper, we consider FAS and approximate its outage probability and diversity gain in
1012
+ closed-form expressions. New meaningful insights are obtained from the analytical results, and
1013
+ simulation results are given to better understand the factors that limit the performance of FAS.
1014
+ Our results show that the performance of FAS strongly depends on the spatial correlation matrix
1015
+ J. Specifically, increasing the ports beyond N′ yields no diversity gain in a point-to-point setting.
1016
+ Instead, increasing N causes the correlation matrix J to be ill-conditioned. To address this, one
1017
+ can either increase W for a fixed N or decrease N for a fixed W. In addition, we propose a
1018
+ suboptimal FAS with N∗ ports. By fixing an appropriate εtol, the proposed scheme enables us to
1019
+
1020
+ 17
1021
+ obtain a significant gain over FAS with N∗ − 1 while it nearly achieves the same performance
1022
+ as FAS with N∗ + 1 ports. Thus, the approximation of N∗ is pragmatically useful since a larger
1023
+ number of ports yields diminishing gains and additional costs. Furthermore, N∗ can be used to
1024
+ approximate the channels of FAS with N ports if the correlation matrix J is near-singular. Last
1025
+ but not least, the proposed suboptimal FAS outperforms SISO and SC systems but falls behind
1026
+ MRC due to having a single active RF-chain. Nevertheless, it is discovered that suboptimal FAS
1027
+ and MRC achieve similar performance when W = 0.5. Thus, it will be interesting to study the
1028
+ performance of MIMO-FAS and MIMO in the future.
1029
+ APPENDIX A: APPROXIMATED PDF OF |h|
1030
+ The exact PDF of |h| is first derived in [23]–[25]. In this paper, we employ similar steps
1031
+ and further approximate the PDF of |h| by introducing G: an N × N matrix, using an accurate
1032
+ binomial theorem, and truncating the infinite series to a finite one for ease of computation.
1033
+ According to [34], the PDF of a circularly symmetric complex Gaussian random variables is
1034
+ known as
1035
+ f (h) =
1036
+ 1
1037
+ πNdet(J) exp
1038
+
1039
+ −hHJ −1h
1040
+
1041
+ ,
1042
+ (21)
1043
+ where J −1 =
1044
+ KT
1045
+ det(J) via Crammer rule. Using [40, (7-8) & (7-9)], the PDF of (21) in terms of
1046
+ its amplitude and phase can be obtained as
1047
+ f|h|,θ (|h1| , θ1, . . . , |hN| , θN) = η
1048
+ T�
1049
+ t=1
1050
+ exp
1051
+
1052
+ ζt cos
1053
+ �¯θt
1054
+ ��
1055
+ ,
1056
+ (22)
1057
+ where η =
1058
+ N
1059
+
1060
+ n=1
1061
+ |hn|
1062
+ πNdet(J) exp
1063
+
1064
+
1065
+ �N
1066
+ n=1|hn|2Kn,n
1067
+ det(J)
1068
+
1069
+ , T = N(N−1)
1070
+ 2
1071
+ , ζt = −2Km,n|hn||hm|
1072
+ det(J)
1073
+ and ¯θt = θn − θm.
1074
+ In (22), we use the mapping function where t = n + (m − 1) N − m(m+1)
1075
+ 2
1076
+ , m < n, while
1077
+ (m, n) can be obtained from t by setting m = min m′ ∈ Z subject to �m′
1078
+ i=1 (N − i) > t and
1079
+ n = t − (m − 1) N + m(m+1)
1080
+ 2
1081
+ .
1082
+
1083
+ 18
1084
+ Integrating (22) w.r.t. θn, ∀n over [0, 2π], we have
1085
+ f|h| (|h1| , . . . , |hN|)
1086
+ =
1087
+ ˆ 2π
1088
+ 0
1089
+ · · ·
1090
+ ˆ 2π
1091
+ 0
1092
+ f (|h1| , θ1, . . . , |hN| , θN) dθ1 . . . dθN
1093
+ (23)
1094
+ (a)
1095
+
1096
+ ˆ 2π
1097
+ 0
1098
+ · · ·
1099
+ ˆ 2π
1100
+ 0
1101
+ T�
1102
+ t=1
1103
+
1104
+
1105
+ st=0
1106
+ ζst
1107
+ t
1108
+ st! cos
1109
+ �¯θt
1110
+ �st dθ1 . . . dθN
1111
+ (24)
1112
+ (b)
1113
+
1114
+
1115
+
1116
+ s1=0
1117
+ s1
1118
+
1119
+ s2=0
1120
+ . . .
1121
+ sT −1
1122
+
1123
+ sT =0
1124
+ T�
1125
+ t=1
1126
+ β (t, s∗
1127
+ t)
1128
+ ˆ 2π
1129
+ 0
1130
+ · · ·
1131
+ ˆ 2π
1132
+ 0
1133
+ cos
1134
+ �¯θt
1135
+ �s∗
1136
+ t dθ1 . . . dθN
1137
+ (25)
1138
+ (c)
1139
+
1140
+
1141
+
1142
+ s1=0
1143
+ s1
1144
+
1145
+ s2=0
1146
+ . . .
1147
+ sT −1
1148
+
1149
+ sT =0
1150
+ �1
1151
+ 2
1152
+ ��T
1153
+ t=1 s∗
1154
+ t
1155
+ T�
1156
+ t=1
1157
+ β (t, s∗
1158
+ t) ×
1159
+ (26)
1160
+ ˆ 2π
1161
+ 0
1162
+ · · ·
1163
+ ˆ 2π
1164
+ 0
1165
+ T�
1166
+ t=1
1167
+
1168
+ exp
1169
+
1170
+ j¯θt
1171
+
1172
+ + exp
1173
+
1174
+ −j¯θt
1175
+ ��s∗
1176
+ t dθ1 . . . dθN
1177
+ (d)
1178
+
1179
+
1180
+
1181
+ s1=0
1182
+ . . .
1183
+ sT −1
1184
+
1185
+ sT =0
1186
+ �1
1187
+ 2
1188
+ ��T
1189
+ t=1 s∗
1190
+ t
1191
+ T�
1192
+ t=1
1193
+ β (t, s∗
1194
+ t)
1195
+
1196
+ v∈V
1197
+ T
1198
+
1199
+ t=1
1200
+
1201
+  s∗
1202
+ t
1203
+ vt
1204
+
1205
+  ×
1206
+ (27)
1207
+ ˆ 2π
1208
+ 0
1209
+ · · ·
1210
+ ˆ 2π
1211
+ 0
1212
+ exp
1213
+
1214
+ j
1215
+ T
1216
+
1217
+ t=1
1218
+ γt¯θt
1219
+
1220
+ dθ1 . . . dθN,
1221
+ where (24) is obtained by using exp {x} = �∞
1222
+ s=0
1223
+ xs
1224
+ s! and (25) is obtained using Cauchy product
1225
+ of power series where β (t, st) ≜
1226
+ ζst
1227
+ t
1228
+ st! and s∗
1229
+ t = st − st+1 with sT+1 = 0. Furthermore, (26)
1230
+ is obtained using cos (x) = exp(jx)+exp(−jx)
1231
+ 2
1232
+ and (27) is obtained using binomial theorem where
1233
+ v = [v1, . . . , vT]T, V denotes the set of all the possible permutations and γt = 2vt − j∗
1234
+ t ∈ Z.
1235
+ Note that
1236
+ ´ 2π
1237
+ 0
1238
+ · · ·
1239
+ ´ 2π
1240
+ 0
1241
+ exp
1242
+
1243
+ j �T
1244
+ t=1 γt¯xt
1245
+
1246
+ dθ1 . . . dθN = (2π)N if and only if �T
1247
+ t=1 γt¯xt = 0,
1248
+ and otherwise zero. Therefore, we introduce a new matrix G as defined in (11) and the matrix
1249
+ ¯Θ given by
1250
+ ¯Θ =
1251
+
1252
+ 
1253
+ 0
1254
+ ¯θ1
1255
+ ¯θ2
1256
+ . . .
1257
+ ¯θN−1
1258
+ ¯θN
1259
+ . . .
1260
+ ¯θ2N−3
1261
+ ...
1262
+ ...
1263
+ ...
1264
+ ¯θT
1265
+ 0
1266
+ . . .
1267
+ 0
1268
+
1269
+ 
1270
+ =
1271
+
1272
+ 
1273
+ 0
1274
+ θ2 − θ1
1275
+ θ3 − θ1
1276
+ . . .
1277
+ θN − θ1
1278
+ θ3 − θ2
1279
+ . . .
1280
+ θN − θ2
1281
+ ...
1282
+ ...
1283
+ ...
1284
+ θN − θN−1
1285
+ 0
1286
+ . . .
1287
+ 0
1288
+
1289
+ 
1290
+ .
1291
+ (28)
1292
+ Using ¯Θ and G, we can easily integrate (27) w.r.t. to θi by taking the sum of the same entries
1293
+
1294
+ 19
1295
+ of G as that of ¯Θ with θi, i.e., ∆i = �N
1296
+ n=1 Gi,n + �N
1297
+ n=1 Gn,i − Gi,i. Therefore, (27) leads to
1298
+ (27) =η
1299
+
1300
+
1301
+ s1=0
1302
+ s1
1303
+
1304
+ s2=0
1305
+ . . .
1306
+ sT −1
1307
+
1308
+ sT =0
1309
+ �1
1310
+ 2
1311
+ ��T
1312
+ t=1 s∗
1313
+ t
1314
+ T
1315
+
1316
+ t=1
1317
+ β (t, s∗
1318
+ t)
1319
+
1320
+ v∈V
1321
+
1322
+
1323
+ T�
1324
+ t=1
1325
+
1326
+  s∗
1327
+ t
1328
+ vt
1329
+
1330
+
1331
+
1332
+
1333
+
1334
+ (2π)N
1335
+ N
1336
+
1337
+ i=1
1338
+ 1{∆=0}
1339
+
1340
+ (29)
1341
+ (a)
1342
+ ≈η
1343
+ s0
1344
+
1345
+ s1=0
1346
+ s1
1347
+
1348
+ s2=0
1349
+ . . .
1350
+ sT −1
1351
+
1352
+ sT =0
1353
+ �1
1354
+ 2
1355
+ ��T
1356
+ t=1 s∗
1357
+ t
1358
+ T
1359
+
1360
+ t=1
1361
+ β (t, s∗
1362
+ t)
1363
+
1364
+ v∈V
1365
+
1366
+
1367
+ T�
1368
+ t=1
1369
+
1370
+  s∗
1371
+ t
1372
+ vt
1373
+
1374
+
1375
+
1376
+
1377
+
1378
+ (2π)N
1379
+ N
1380
+
1381
+ i=1
1382
+ 1{∆i=0}
1383
+
1384
+ ,
1385
+ (30)
1386
+ where (a) can be obtained since β (t, s∗
1387
+ t) ≈ 0 if s∗
1388
+ t is sufficiently large.
1389
+ APPENDIX B: APPROXIMATED CDF OF |h|
1390
+ Using (10), the CDF of |h| can be obtained as
1391
+ F (R1, . . . , RN)
1392
+
1393
+ ˆ R1
1394
+ 0
1395
+ . . .
1396
+ ˆ RN
1397
+ 0
1398
+ f|h| (|h1| , . . . , |hN|) d |h1| · · · d |hN|
1399
+ (31)
1400
+ =
1401
+ s0
1402
+
1403
+ s1=0
1404
+ s1
1405
+
1406
+ s2=0
1407
+ . . .
1408
+ sT −1
1409
+
1410
+ sT =0
1411
+ g (s∗)
1412
+ πNdet(J)
1413
+ T�
1414
+ t=1
1415
+ (−2Km,n→t)s∗
1416
+ t
1417
+ s∗
1418
+ t!det(J)s∗
1419
+ t
1420
+ ˆ R1
1421
+ 0
1422
+ . . .
1423
+ ˆ RN
1424
+ 0
1425
+ ×
1426
+ (32)
1427
+ N
1428
+
1429
+ n=1
1430
+ |hn|
1431
+ N
1432
+
1433
+ n=1
1434
+ N
1435
+
1436
+ m<n
1437
+ (|hn| |hm|)s∗
1438
+ t→m,n exp
1439
+
1440
+
1441
+ �N
1442
+ n=1 |hn|2 Kn,n
1443
+ det(J)
1444
+
1445
+ d |h1| · · · d |hN|
1446
+ =
1447
+ s0
1448
+
1449
+ s1=0
1450
+ s1
1451
+
1452
+ s2=0
1453
+ . . .
1454
+ sT −1
1455
+
1456
+ sT =0
1457
+ g (s∗)
1458
+ πNdet(J)
1459
+ T�
1460
+ t=1
1461
+ (−2Km,n→t)s∗
1462
+ t
1463
+ s∗
1464
+ t!det(J)s∗
1465
+ t
1466
+ ×
1467
+ (33)
1468
+ N
1469
+
1470
+ n=1
1471
+ ˆ Rn
1472
+ 0
1473
+ |hn|¯sn+1 exp
1474
+
1475
+ −|hn|2 Kn,n
1476
+ det(J)
1477
+
1478
+ d |h1| · · · d |hN|
1479
+ =
1480
+ j0
1481
+
1482
+ j1=0
1483
+ j1
1484
+
1485
+ j2=0
1486
+ . . .
1487
+ jp−1
1488
+
1489
+ jp=0
1490
+ g (s∗)
1491
+ πNdet(J)
1492
+ T�
1493
+ t=1
1494
+ (−Kt)s∗
1495
+ t
1496
+ s∗
1497
+ t!det(J)s∗
1498
+ t ×
1499
+ (34)
1500
+ N
1501
+
1502
+ n=1
1503
+ � Kn,n
1504
+ det(J)
1505
+ �− ¯sn
1506
+ 2 −1 �
1507
+ Γ
1508
+
1509
+ 1 + ¯sn
1510
+ 2
1511
+
1512
+ − Γ
1513
+
1514
+ 1 + ¯sn
1515
+ 2 , Kn,nR2
1516
+ n
1517
+ det(J)
1518
+ ��
1519
+ ,
1520
+ where ¯sn is the sum of s∗
1521
+ t→m,n affecting (|hn| |hm|)s∗
1522
+ t→m,n and
1523
+ g (s∗) =
1524
+ �1
1525
+ 2
1526
+ ��T
1527
+ t=1 s∗
1528
+ t �
1529
+ v∈V
1530
+
1531
+
1532
+ T�
1533
+ t=1
1534
+
1535
+  s∗
1536
+ t
1537
+ vt
1538
+
1539
+
1540
+
1541
+  (2π)N
1542
+ N
1543
+
1544
+ i=1
1545
+ 1{∆i=0}.
1546
+
1547
+ 20
1548
+ APPENDIX C: OUTAGE PROBABILITY OF FAS AT HIGH SNR
1549
+ According to [35], the outage probability of a wireless communication system at high SNR can
1550
+ be obtained via the PDF of its fading channels. In particular, suppose the PDF of the channels
1551
+ at high SNR can be approximated as
1552
+ f|hFAS| (Ω) = 2ξΩ2M+1 + o
1553
+
1554
+ Ω2M+1�
1555
+ .
1556
+ (35)
1557
+ Then the outage probability at high SNR is found as
1558
+ P {|hFAS| < Ω} =
1559
+ ξ
1560
+ M + 1ΩM+1 + o
1561
+
1562
+ 1
1563
+ SNRM+1
1564
+
1565
+ .
1566
+ (36)
1567
+ Before approximating the PDF of FAS at high SNR, we highlight that the PDF of (21) in
1568
+ terms of its amplitude and phase can be rewritten as
1569
+ f|h|,θ (|h1| , θ1, . . . , |hN| , θN) =
1570
+ N
1571
+
1572
+ n=1
1573
+ |hn| Hn
1574
+ πNdet(J)
1575
+ (37)
1576
+ where
1577
+ Hn = exp
1578
+
1579
+ −Kn,n |hn|2 + 2 �N
1580
+ m=n+1 Km,n |hn| |hm| cos (θn − θm)
1581
+ det(J)
1582
+
1583
+ .
1584
+ (38)
1585
+ Using (37), the approximated PDF of FAS at high SNR can be derived as
1586
+ f|hFAS| (Ω) =∂F|hFAS| (Ω)
1587
+ ∂Ω
1588
+ (39)
1589
+ (a)
1590
+ =N
1591
+ ˆ Ω
1592
+ 0
1593
+ . . .
1594
+ ˆ Ω
1595
+ 0
1596
+ ˆ 2π
1597
+ 0
1598
+ · · ·
1599
+ ˆ 2π
1600
+ 0
1601
+ f|h|,θ (|h1| , θ1, . . . , |hN−1| , θN−1, Ω, θN)
1602
+ (40)
1603
+ d |h1| · · · d |hN−1| dθ1 . . . dθN
1604
+ (b)
1605
+ =
1606
+ NΩ
1607
+ πNdet(J)
1608
+ ˆ 2π
1609
+ 0
1610
+ · · ·
1611
+ ˆ 2π
1612
+ 0
1613
+ HN
1614
+ ˆ Ω
1615
+ 0
1616
+ |hN−1|
1617
+
1618
+ HN−1 × . . .
1619
+ (41)
1620
+ �ˆ Ω
1621
+ 0
1622
+ |h2| H2
1623
+ �ˆ Ω
1624
+ 0
1625
+ |h1| H1d |h1|
1626
+
1627
+ d |h2|
1628
+
1629
+ · · · d |hN−1|
1630
+
1631
+ dθ1 . . . dθN,
1632
+ where (a) is obtained using Leibniz integral and (b) is obtained using (37).
1633
+ According to [41], the term
1634
+ ´ Ω
1635
+ 0 |hn| Hnd |hn| can be solved by applying Taylor series approx-
1636
+ imation at around zero. Specifically, we have
1637
+ ˆ Ω
1638
+ 0
1639
+ |hn| Hnd |hn| = Ω2
1640
+ 2 + o
1641
+
1642
+ Ω2�
1643
+ , n = {1, . . . , N − 1}
1644
+ (42)
1645
+ and the Taylor series approximation of HN at zero is
1646
+ HN = 1 + o (1) .
1647
+ (43)
1648
+
1649
+ 21
1650
+ Substituting (42) and (43) into (41), we have
1651
+ f|hFAS| (Ω) =
1652
+ NΩ
1653
+ πNdet(J)
1654
+ �Ω2
1655
+ 2 + o
1656
+
1657
+ Ω2��N−1 ˆ 2π
1658
+ 0
1659
+ · · ·
1660
+ ˆ 2π
1661
+ 0
1662
+ dθ1 . . . dθN
1663
+ (44)
1664
+ = 2N
1665
+ det(J)Ω2N−1 + o
1666
+
1667
+ Ω2N−1�
1668
+ .
1669
+ (45)
1670
+ Comparing (45) to (35), we have M = N − 1 and ξ =
1671
+ N
1672
+ det(J). Applying (36), we have
1673
+ P {|hFAS| < Ω} ≈
1674
+ ΩN
1675
+ det(J) + o
1676
+
1677
+ 1
1678
+ SNRN
1679
+
1680
+ .
1681
+ (46)
1682
+ APPENDIX D: DIVERSITY GAIN OF FAS
1683
+ Let us consider the case where W → ∞. According to [35], the diversity gain of a wireless
1684
+ communication system can be obtained via the PDF of its fading channels at high SNR. Specif-
1685
+ ically, suppose the PDF of the channels at high SNR can be approximated as in (35). Then
1686
+ diversity gain of such system is given by
1687
+ D = M + 1.
1688
+ (47)
1689
+ In Appendix C, we have M = N − 1. Thus, it is straightforward that the diversity gain of
1690
+ FAS as W → ∞ is N. Nevertheless, if W is finite, J might be near to being singular. To
1691
+ see this, let us consider FAS with N → ∞ ports within a finite W where each port is equally
1692
+ separated, and they are indexed as 1, 2, . . .. Without loss of generality, let us focus on two
1693
+ ports: n-th and (n + 1)-th port. The correlation between the n-th port and (n + 1)-th port is
1694
+ J n,n+1 = lim
1695
+ N→∞σ2J0
1696
+
1697
+
1698
+ 1
1699
+ N−1W
1700
+
1701
+ = σ2J0 (0), and we have hn+1 = hn. Thus, the joint CDF of hn
1702
+ and hn+1 is Fhn,hn+1 (g1, g2) = Fhn (min {g1, g2}), which implies that they reduce to singularity.
1703
+ Since there are many such ports, we can use a finite N′ ports to approximate the channels of
1704
+ FAS with N ports, where N′ is the rank of J′ such that J ′ is covariance matrix as defined in
1705
+ (2) with N → ∞ for a fixed W. As a result, the diversity gain of FAS is approximately limited
1706
+ by min {N, N′}. If N is large, the same observation can be obtained. To remove the nearly-
1707
+ dependent entries of J, one may employ rank-revealing QR factorization [42] or Gauss-Jordan
1708
+ elimination with a given tolerance.
1709
+ REFERENCES
1710
+ [1] A. Shojaeifard, K.-K. Wong, K.-F. Tong, Z. Chu, A. Mourad, A. Haghighat, I. Hemadeh, N. T. Nguyen, V. Tapio, and
1711
+ M. Juntti, “MIMO evolution beyond 5G through reconfigurable intelligent surfaces and fluid antenna systems,” Proceedings
1712
+ of the IEEE, vol. 110, no. 9, pp. 1244–1265, 2022. I
1713
+
1714
+ 22
1715
+ [2] K. K. Wong, K.-F. Tong, Y. Shen, Y. Chen, and Y. Zhang, “Bruce Lee-inspired fluid antenna system: Six research topics
1716
+ and the potentials for 6G,” Frontiers in Communications and Networks, p. 5, 2022. I
1717
+ [3] K.-K. Wong, A. Shojaeifard, K.-F. Tong, and Y. Zhang, “Fluid antenna systems,” IEEE Transactions on Wireless
1718
+ Communications, vol. 20, no. 3, pp. 1950–1962, 2021. I, II
1719
+ [4] E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, and R. Zhang, “Wireless communications through
1720
+ reconfigurable intelligent surfaces,” IEEE Access, vol. 7, pp. 116 753–116 773, 2019. I
1721
+ [5] K.-K. Wong, K.-F. Tong, Z. Chu, and Y. Zhang, “A vision to smart radio environment: Surface wave communication
1722
+ superhighways,” IEEE Wireless Communications, vol. 28, no. 1, pp. 112–119, 2021. I
1723
+ [6] O. Elijah, S. K. Abdul Rahim, W. K. New, C. Y. Leow, K. Cumanan, and T. Kim Geok, “Intelligent massive MIMO
1724
+ systems for beyond 5G networks: An overview and future trends,” IEEE Access, vol. 10, pp. 102 532–102 563, 2022. I
1725
+ [7] C.-X. Wang, J. Wang, S. Hu, Z. H. Jiang, J. Tao, and F. Yan, “Key technologies in 6G terahertz wireless communication
1726
+ systems: A survey,” IEEE Vehicular Technology Magazine, vol. 16, no. 4, pp. 27–37, 2021. I
1727
+ [8] M. Khammassi, A. Kammoun, and M.-S. Alouini, “A new analytical approximation of the fluid antenna system channel,”
1728
+ arXiv preprint arXiv:2203.09318, 2022. I, II, 4, IV, V
1729
+ [9] D. G. Brennan, “Linear diversity combining techniques,” Proceedings of the IRE, vol. 47, no. 6, pp. 1075–1102, 1959. I,
1730
+ IV
1731
+ [10] K. K. Wong, A. Shojaeifard, K.-F. Tong, and Y. Zhang, “Performance limits of fluid antenna systems,” IEEE Communi-
1732
+ cations Letters, vol. 24, no. 11, pp. 2469–2472, 2020. I
1733
+ [11] K.-K. Wong and K.-F. Tong, “Fluid antenna multiple access,” IEEE Transactions on Wireless Communications, vol. 21,
1734
+ no. 7, pp. 4801–4815, 2022. I
1735
+ [12] C. Skouroumounis and I. Krikidis, “Large-scale fluid antenna systems with linear MMSE channel estimation,” in ICC 2022
1736
+ - IEEE International Conference on Communications, 2022, pp. 1330–1335. I
1737
+ [13] L. Tlebaldiyeva, G. Nauryzbayev, S. Arzykulov, A. Eltawil, and T. Tsiftsis, “Enhancing QoS through fluid antenna
1738
+ systems over correlated Nakagami-m fading channels,” in 2022 IEEE Wireless Communications and Networking Conference
1739
+ (WCNC), 2022, pp. 78–83. I
1740
+ [14] K. Wong, K. Tong, Y. Chen, and Y. Zhang, “Closed-form expressions for spatial correlation parameters for performance
1741
+ analysis of fluid antenna systems,” Electronics Letters, vol. 58, no. 11, pp. 454–457, 2022. I
1742
+ [15] K. N. Le, “A review of selection combining receivers over correlated rician fading,” Digital Signal Processing, vol. 88,
1743
+ pp. 1–22, 2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1051200418307176 I
1744
+ [16] K. S. Miller, “Complex Gaussian processes,” Siam Review, vol. 11, no. 4, pp. 544–567, 1969. I
1745
+ [17] C. Tan and N. Beaulieu, “Infinite series representations of the bivariate Rayleigh and Nakagami-m distributions,” IEEE
1746
+ Transactions on Communications, vol. 45, no. 10, pp. 1159–1161, 1997. I
1747
+ [18] P. Dharmawansa, N. Rajatheva, and C. Tellambura, “On the trivariate Rician distribution,” IEEE Transactions on
1748
+ Communications, vol. 56, no. 12, pp. 1993–1997, 2008. I
1749
+ [19] Y. Chen and C. Tellambura, “Infinite series representations of the trivariate and quadrivariate Rayleigh distribution and
1750
+ their applications,” IEEE Transactions on Communications, vol. 53, no. 12, pp. 2092–2101, 2005. I
1751
+ [20] M. Tekinay and C. Beard, “Moments of the quadrivariate Rayleigh distribution with applications for diversity receivers,”
1752
+ Annals of Telecommunications, vol. 75, no. 7, pp. 447–459, 2020. I
1753
+ [21] Y. Chen and C. Tellambura, “Distribution functions of selection combiner output in equally correlated Rayleigh, Rician,
1754
+ and Nakagami-m fading channels,” IEEE Transactions on Communications, vol. 52, no. 11, pp. 1948–1956, 2004. I
1755
+ [22] G. Karagiannidis, D. Zogas, and S. Kotsopoulos, “On the multivariate Nakagami-m distribution with exponential
1756
+ correlation,” IEEE Transactions on Communications, vol. 51, no. 8, pp. 1240–1244, 2003. I
1757
+
1758
+ 23
1759
+ [23] M. Wiegand and S. Nadarajah, “A series representation for multidimensional Rayleigh distributions,” International
1760
+ Journal
1761
+ of
1762
+ Communication
1763
+ Systems,
1764
+ vol.
1765
+ 31,
1766
+ no.
1767
+ 6,
1768
+ p.
1769
+ e3510,
1770
+ 2018,
1771
+ e3510
1772
+ dac.3510.
1773
+ [Online].
1774
+ Available:
1775
+ https://onlinelibrary.wiley.com/doi/abs/10.1002/dac.3510 I, VI
1776
+ [24] ——, “Series approximations for Rayleigh distributions of arbitrary dimensions and covariance matrices,” Signal
1777
+ Processing, vol. 165, pp. 20–29, 2019. I, VI
1778
+ [25] ——,
1779
+ “New
1780
+ generalised
1781
+ approximation
1782
+ methods
1783
+ for
1784
+ the
1785
+ cumulative
1786
+ distribution
1787
+ function
1788
+ of
1789
+ arbitrary
1790
+ multivariate
1791
+ Rayleigh
1792
+ random
1793
+ variables,”
1794
+ Signal
1795
+ Processing,
1796
+ vol.
1797
+ 176,
1798
+ p.
1799
+ 107664,
1800
+ 2020.
1801
+ [Online].
1802
+ Available:
1803
+ https://www.sciencedirect.com/science/article/pii/S0165168420302073 I, VI
1804
+ [26] R. G. Gallager, Principles of digital communication.
1805
+ Cambridge University Press Cambridge, UK, 2008, vol. 1. 2
1806
+ [27] Z. Chai, K.-K. Wong, K.-F. Tong, Y. Chen, and Y. Zhang, “Port selection for fluid antenna systems,” IEEE Communications
1807
+ Letters, vol. 26, no. 5, pp. 1180–1184, 2022. I
1808
+ [28] L. Zhu, W. Ma, and R. Zhang, “Modeling and performance analysis for movable antenna enabled wireless communications,”
1809
+ arXiv preprint arXiv:2210.05325, 2022. I
1810
+ [29] W. Ma, L. Zhu, and R. Zhang, “MIMO capacity characterization for movable antenna systems,” arXiv preprint
1811
+ arXiv:2210.05396, 2022. I
1812
+ [30] N. Waqar, K.-K. Wong, K.-F. Tong, and S. Adrian, “Deep learning enabled slow fluid antenna multiple access,” Submitted
1813
+ to IEEE Communications Letters, 2022. I, 3
1814
+ [31] K.-K. Wong, K.-F. Tong, Y. Chen, and Y. Zhang, “Fast fluid antenna multiple access enabling massive connectivity,”
1815
+ Submmited to IEEE Communications Letters, 2022. I
1816
+ [32] H. Xu, K.-K. Wong, W. K. New, and K.-F. Tong, “On the outage probability for two-user fluid antenna multiple access,”
1817
+ Submitted to 2023 IEEE International Conference on Communications (ICC), 2023. I
1818
+ [33] G. L. Stüber and G. L. Steuber, Principles of mobile communication.
1819
+ Springer, 1996, vol. 2. II
1820
+ [34] D. Tse and P. Viswanath, Fundamentals of wireless communication.
1821
+ Cambridge university press, 2005. II, VI
1822
+ [35] Z. Wang and G. Giannakis, “A simple and general parameterization quantifying performance in fading channels,” IEEE
1823
+ Transactions on Communications, vol. 51, no. 8, pp. 1389–1398, 2003. II, VI, VI
1824
+ [36] G. Golub, A. Hoffman, and G. Stewart, “A generalization of the eckart-young-mirsky matrix approximation
1825
+ theorem,”
1826
+ Linear
1827
+ Algebra
1828
+ and
1829
+ its
1830
+ Applications,
1831
+ vol.
1832
+ 88-89,
1833
+ pp.
1834
+ 317–327,
1835
+ 1987.
1836
+ [Online].
1837
+ Available:
1838
+ https://www.sciencedirect.com/science/article/pii/0024379587901145 IV
1839
+ [37] D.
1840
+ Dowson
1841
+ and
1842
+ B.
1843
+ Landau,
1844
+ “The
1845
+ Frechet
1846
+ distance
1847
+ between
1848
+ multivariate
1849
+ normal
1850
+ distributions,”
1851
+ Journal
1852
+ of
1853
+ Multivariate
1854
+ Analysis,
1855
+ vol.
1856
+ 12,
1857
+ no.
1858
+ 3,
1859
+ pp.
1860
+ 450–455,
1861
+ 1982.
1862
+ [Online].
1863
+ Available:
1864
+ https://www.sciencedirect.com/science/article/pii/0047259X8290077X IV
1865
+ [38] S. Boyd, S. P. Boyd, and L. Vandenberghe, Convex optimization.
1866
+ Cambridge university press, 2004. IV
1867
+ [39] W. Ford, Numerical linear algebra with applications: Using MATLAB.
1868
+ Academic Press, 2014. IV
1869
+ [40] A. Papoulis and S. U. Pillai, “Probability, random variables, and stochastic processes,” 2002. VI
1870
+ [41] S. Liu, J. Cheng, and N. C. Beaulieu, “Asymptotic error analysis of diversity schemes on arbitrarily correlated Rayleigh
1871
+ channels,” IEEE Transactions on Communications, vol. 58, no. 5, pp. 1351–1355, 2010. VI
1872
+ [42] G. Golub, “Numerical methods for solving linear least squares problems,” Numerische Mathematik, vol. 7, no. 3, pp.
1873
+ 206–216, 1965. VI
1874
+
BNAyT4oBgHgl3EQfRvex/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CtAzT4oBgHgl3EQfGfuT/content/tmp_files/2301.01029v1.pdf.txt ADDED
@@ -0,0 +1,1261 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01029v1 [cond-mat.str-el] 3 Jan 2023
2
+ Ab-initio study of phononic thermal conduction in ScAgC half-Heusler
3
+ Vinod Kumar Solet1,∗ and Sudhir K. Pandey1,†
4
+ 1School of Mechanical and Materials Engineering,
5
+ Indian Institute of Technology Mandi, Kamand - 175075, India
6
+ (Dated: January 4, 2023)
7
+ We present a first-principles lattice calculations to comprehend the thermal expansion
8
+ α(T ) and lattice thermal conductivity κph of ScAgC. The obtained positive frequencies of phonon
9
+ dispersion shows the dynamical stability of ScAgC in FCC structure. The estimated α(T ) from
10
+ quasi-harmonic approximation (QHA) at 300(1200) K is ∼4(4.6)×10−6 K−1. The predicted value
11
+ of total κph from phonon-phonon interaction (PPI) at 300(1200) K is ∼7.4(1.8) Wm−1K−1. The
12
+ highest group velocity for acoustic & optical branches (AB & OB) is ∼6.7 and ∼3.5 km/s, respec-
13
+ tively. The predicted average phonon lifetime (τλ) for AB(OB) is ∼2.5(1.65) ps at 300 K, whereas it
14
+ is ∼0.6(0.4) ps at 1200 K. The estimated highest heat capacity (Cλ) at 200 K for AB(OB) is ∼23.5
15
+ (19.5) meV/K. We fitted the equation AκT−xκ(AτT−xτ ) in the κph(τλ) curve to gain a thorough
16
+ understanding of temperature-dependent κph trend. The xκ for total branches is calculated to be
17
+ ∼1.02. The xτ value due to total AB(OB) is estimated to be ∼1.04(1.02), while it is ∼1.03 for total
18
+ branches. The calculated xκ for total AB(OB) is ∼1.04(0.95), implying that AB contributes more
19
+ to the total κph. This research could be important for enhancing the properties of ScAgC regarding
20
+ thermoelectric and photovoltaic applications.
21
+ I.
22
+ INTRODUCTION
23
+ Energy demand is continuously growing in to-
24
+ day’s technological world. Understanding the transport
25
+ properties of materials, and in particular, the capacity
26
+ to conduct heat throughout the crystal, is critical due
27
+ to its technological influence on energy-related devices.
28
+ The subject of heat transportation is vast in solid state
29
+ physics [1], but we have focused attention on thermal
30
+ transport by phonons here. Basically, the knowledge of
31
+ phonons is very critical in accounting for many physical
32
+ properties and behaviours of crystals, such as thermal
33
+ transport properties, thermal expansion, phase transi-
34
+ tion, mechanical properties, and certain electrical proper-
35
+ ties (superconductivity), etc., [1]. Studying the thermal
36
+ behaviour of heat energy transported by the motion of
37
+ atoms has always been a challenging task for researchers.
38
+ The starting point for almost all theories related to lat-
39
+ tice dynamics is harmonic approximation (HA), which
40
+ ignores the concept of PPI [1, 2].
41
+ However, HA is no
42
+ longer sufficient for accessing transport properties such
43
+ as κph due to the infinite lifetime of phonons. We can
44
+ cope with this problem by taking into account the scat-
45
+ tering of the harmonic phonons by other phonons (PPI),
46
+ defects, and crystal boundaries, etc., [1, 3] because it is
47
+ well known that the κph is a crucial property in semicon-
48
+ ducting thermoelectrics [4], solar photovoltaic (PV) cells
49
+ [5], nuclear reactors [6], and heat management systems
50
+ [7, 8], etc. At near or above room temperature, the PPI is
51
+ an important factor to consider in the quantitative study
52
+ of the κph of non-metallic solids, which is an anharmonic
53
+ phenomenon [1].
54
+ This anharmonicity causes complica-
55
+ tions in the prediction of these transport coefficients at a
56
57
58
+ finite temperature. However, high-performance comput-
59
+ ers have contributed to some improvements in the calcu-
60
+ lation of the transport properties of solids.
61
+ In the last few decades, interesting developments
62
+ toward describing the lattice dynamics and related prop-
63
+ erties of materials have been made from first-principles
64
+ molecular dynamics simulations [9, 10]. But such calcu-
65
+ lations carry a large computational effort, and their im-
66
+ plementation is not straightforward. In this regard, one
67
+ can cope with these problems by using first-principles
68
+ density functional theory (DFT) based methods, which
69
+ are the appropriate and generally less expensive ways to
70
+ analyse the phonon-based properties [11]. However, the
71
+ use of methods beyond DFT is required for exploring
72
+ the temperature-dependent transport coefficients.
73
+ Re-
74
+ cently, many-body theory based computational methods
75
+ have become useful in exploring the PPI effects in crys-
76
+ tals [12]. Another physical property, the τλ of phonons, is
77
+ most important to take into account in seeking the mech-
78
+ anism of phononic thermal conduction. The imaginary
79
+ part of phonon self-energy enables us to see the strength
80
+ of coupling between phonons as well as calculate the τλ of
81
+ phonons. Nowadays, the study of anharmonic effects and
82
+ the calculation of τλ is a highly active fields of research.
83
+ The knowledge of α(T ) and κph is helpful for ma-
84
+ terials used in thermoelectric (TE) applications. TE ma-
85
+ terials are not only helpful to generate electricity from
86
+ waste heat but also provide cooling power by allowing
87
+ an electric current to flow through them [4, 13]. These
88
+ materials are particularly attractive for refrigerators, air
89
+ conditioners, heat pumps, automobile applications, and
90
+ etc., since they are reliable, quiet, and devoid of any mov-
91
+ ing parts [13]. The most difficult challenge for researchers
92
+ working with TE compounds is increasing the nondimen-
93
+ sional parameter, figure-of-merit ZT [14], which is de-
94
+ fined as ZT = S2σT/κ. Where S, σ, κ and T are known
95
+ as the material’s Seebeck coefficient, electrical conduc-
96
+
97
+ 2
98
+ tivity, total thermal conductivity, and absolute temper-
99
+ ature, respectively. Total κ has two parts: an electronic
100
+ part (κe) and a lattice part (κph). The ZT value of an
101
+ efficient TE material should be greater than one [15]. As
102
+ a result, ZT can be improved by increasing S2σ or de-
103
+ creasing κ. Obtaining a high ZT is actually quite difficult
104
+ due to the strong correlation between S, σ, and κe via
105
+ charge carriers [1, 16]. Hence, an understanding of κph
106
+ is necessary to know the efficiency of TE materials. The
107
+ α(T ) provides the idea of a change in the length of TE
108
+ materials during heating or cooling processes. In many
109
+ instances, some TE materials are subjected to enough
110
+ thermal or mechanical stress, which is generated during
111
+ a large number of heating and cooling cycles [17]. This
112
+ mechanical stress is usually referred to by the term “ther-
113
+ mal fatigue ”. The product of elastic modulus and linear
114
+ thermal expansion coefficient is an important quantity to
115
+ be taken into account just before analysing the TE mate-
116
+ rials for thermal fatigue [17, 18]. The lower value of this
117
+ product gives the lower value of thermal fatigue in the
118
+ materials. The microcracking and porosity in TE ma-
119
+ terials, which have an impact on their performance, are
120
+ also caused by α(T ) [17]. Zhang et al. [19] have reported
121
+ the effect of microcracking on S2σ of skutterudite TE
122
+ material in the 20-800 K temperature range. The α(T )
123
+ and κph are directly related to the phonon calculations.
124
+ Apart from electronic properties, phonon properties cal-
125
+ culated from DFT provide reliable accuracy, which was
126
+ understood in many previous works [20–22].
127
+ With all
128
+ this in mind, the ScAgC half-Heusler (HH) compound
129
+ has been chosen to explore the phonon-based properties.
130
+ Heusler compounds have recently received much
131
+ interest from researchers due to their great capabilities
132
+ in different energy fields, including TE [22–25], PV so-
133
+ lar cell [26, 27], topological insulators [23, 28],etc. This
134
+ type of material has a general formula of XY Z (HH)
135
+ or X2Y Z (full-Heuslers), where X and Y are mainly the
136
+ transition elements and Z belongs to the p-block element.
137
+ Our earlier study predicts that ScAgC is a promising HH
138
+ TE compound and the highest predicted ZT is ∼0.53 at
139
+ 1200 K temperature [29]. One can achieve a high ZT
140
+ by lowering the κ. Further, ScAgC can also be used to
141
+ make solar cell devices because it has a strong absorp-
142
+ tion of ∼1.7×106 cm−1 at photon energy ∼8.5 eV and a
143
+ low reflectivity of ∼0.24 at ∼4.7 eV [29]. At 300 K, the
144
+ highest PV efficiency of ∼33% is also observed at ∼1 µm
145
+ thickness. The remaining absorbed solar energy will be
146
+ transformed into thermal energy inside the cell and could
147
+ raise the temperature at the junction until the heat is not
148
+ dissipated effectively to the environment [30]. This rise
149
+ in temperature reduces the mobility of charge carriers,
150
+ which may be one reason for the decreased efficiency of
151
+ solar cells [5]. Therefore, κph is critical in determining
152
+ the efficiency of solar cell devices. Our earlier work [29]
153
+ gives full information about the electronic related prop-
154
+ erties, which is not sufficient for materials to design the
155
+ TE and solar cell devices. Although the DFPT method
156
+ was used to investigate phonon-based thermodynamical
157
+ properties but κph was not calculated accurately in this
158
+ work [29]. In this direction, it is mandatory to know a
159
+ more accurate κph in order to use ScAgC for making PV
160
+ and TE devices.
161
+ Hence, the present research includes phonon-
162
+ based properties estimated by first-principles calcula-
163
+ tions.
164
+ First of all, phonon dispersion
165
+
166
+ with and with-
167
+ out including non-analytic term correction (NAC)
168
+
169
+ and
170
+ phonon DOS have been calculated by considering super-
171
+ cell and finite displacement approaches under HA. Both
172
+ dispersion plots have no negative branches, which means
173
+ that ScAgC is stable in the FCC structure. Next, α(T )
174
+ has also been estimated via QHA. The expected room
175
+ temperature value of α(T ) is ∼4×10−6 K−1, whereas
176
+ it reaches a value of ∼4.6×10−6 K−1 at 1200 K. Sim-
177
+ ilarly, first-principle lattice calculations with an anhar-
178
+ monic force constant are used to capture the κph by as-
179
+ suming PPI only. The observed value of κph at 300 K is
180
+ ∼7.4 Wm−1K−1, while it decreases to ∼1.8 Wm−1K−1
181
+ at 1200 K. Furthermore, τλ and Cλ of each branch at
182
+ different temperatures, as well as group velocity vλ of all
183
+ phonon branches, are also calculated. The equation of
184
+ temperature-dependent κph(AκT−xκ) and τλ(AτT−xτ )
185
+ is also fitted in the respective curve.
186
+ The value of xκ
187
+ is found to be almost 1.02 for total branches, while it
188
+ is ∼1.04(0.95) for AB(OB). The estimated value of xτ
189
+ for total branches is ∼1.03, whereas it is ∼1.04(1.02) for
190
+ AB(OB), which aids in understanding the temperature-
191
+ dependent κph trend.
192
+ II.
193
+ COMPUTATIONAL DETAILS
194
+ Phonon dispersion relations are carried out by
195
+ means of the supercell approach and finite displace-
196
+ ment method (FDM) [31] in the Phonopy code [32]. A
197
+ 2×2×2 supercell is constructed to obtain displacements
198
+ from the equilibrium positions of atoms in the conven-
199
+ tional unit cell. Then forces on these supercells (with 96
200
+ atoms) are calculated from ABINIT software [33] within
201
+ the projector-augmented wave (PAW) method [34] under
202
+ DFT. These atoms are displaced with a fixed harmonic
203
+ distance of 0.01 ˚A from their equilibrium positions [32].
204
+ The PBE-GGA type of XC functional has been consid-
205
+ ered in our calculations [35]. Converged results have been
206
+ obtained by using cutoff and PAW cutoff kinetic energy
207
+ for plane wave basis sets of 25 and 50 Ha, respectively.
208
+ In the supercell, a 4×4×4 k-point grid is integrated over
209
+ the Brillouin zone. The lattice parameter value of 5.6 ˚A
210
+ is used in the entire calculations [29]. A force conver-
211
+ gance criteria is set to be 5 × 10−8 Ha/Bohr. The DFPT
212
+ method, as implemented in the ABINIT code [36, 37], has
213
+ been used to obtain born effective charges (BEC) and
214
+ static dielectric constants of atoms for including long-
215
+ range interactions within primitive cells. The QHA [32]
216
+ based method in the Phonopy code is used to evaluate
217
+ the coefficient of α(T ). Next, the phono3py [12] package
218
+ is used to calculate κph, and a 2×2×2 supercell is built to
219
+
220
+ 3
221
+ Γ
222
+ X
223
+ Γ
224
+ L
225
+ W
226
+ Γ
227
+ 0
228
+ 10
229
+ 20
230
+ 30
231
+ 40
232
+ 50
233
+ 60
234
+ Energy (meV)
235
+ Γ
236
+ X
237
+ Γ
238
+ L
239
+ W
240
+ Γ
241
+ 0
242
+ 10
243
+ 20
244
+ 30
245
+ 40
246
+ 50
247
+ 60
248
+ Energy (meV)
249
+ without NAC
250
+ with NAC
251
+ (b)
252
+ (a)
253
+ FIG. 1: The harmonic phonon dispersion (a) before
254
+ including NAC and (b) after including NAC of ScAgC.
255
+ obtain the second and third order force constants. But
256
+ here only those supercells are considered that have inter-
257
+ actions between only three neighbouring atoms (uto 7.5
258
+ Bohr), and the forces on these supercells have been ob-
259
+ tained from the ABINIT code within the PAW method.
260
+ Finally, these force constants are used to calculate the τλ
261
+ from imaginary part of phonon self-energy and then κph
262
+ by using a heavy q-mesh size of 21×21×21 under single
263
+ mode relaxation time approximation [12].
264
+ III.
265
+ RESULTS AND DISCUSSION
266
+ A.
267
+ Phonon properties
268
+ This section presents the phonon dispersion curve
269
+ and phonon DOS of ScAgC estimated under HA. To con-
270
+ firm the stability of this compound, the phonon disper-
271
+ sion is calculated in the first Brillouin zone along the
272
+ high symmetry direction of Γ-X-Γ-L-W-Γ. The disper-
273
+ sion plot of Fig. 1(a) does not embody NAC. This plot
274
+ contains a total of nine positive phonon branches, cor-
275
+ responding to three atoms in the primitive unit cell.
276
+ Among them, three are AB, and the remaining six are
277
+ OB. The AB have energies varying from 0 to ∼15.85
278
+ meV, with one being longitudinal AB (LAB) and two be-
279
+ ing transverse AB (TAB). Similarly, two longitudinal OB
280
+ (LOB) and four transverse OB (TOB) are contributed in
281
+ OB modes. The two AB are degenrate along the X-Γ
282
+ and Γ-L directions. The maximum phonon energy is es-
283
+ timated as ∼58 meV. One can also observe the minimum
284
+ energy gap of ∼8.6 meV between AB and OB. Three
285
+ of the OB modes, which are located in the middle en-
286
+ ergy range (∼24.5 meV to ∼35 meV), are well separated
287
+ with an energy gap of ∼10 meV from the remaining three
288
+ modes. These remaining branches are found in a higher
289
+ energy range of ∼45 meV to ∼58 meV. Due to this gap,
290
+ the coupling between the AB (OB) and OB (OB) may
291
+ be weaker, which is expected to be the largest contribu-
292
+ tor to κph. The OB modes are doubly degenerate along
293
+ the X-Γ-L direction, and they are triply degenerate at
294
+ the Γ-point. The AB are almost linear near the Γ-point,
295
+ implying that group velocity and phase velocity will be
296
+ the same in this region [1]. The slop of AB is used to
297
+ 0
298
+ 10
299
+ 20
300
+ 30
301
+ 40
302
+ 50
303
+ 60
304
+ Energy (meV)
305
+ 0
306
+ 0.3
307
+ 0.6
308
+ 0.9
309
+ 1.2
310
+ 1.5
311
+ 1.8
312
+ 2.1
313
+ 2.4
314
+ Phonon DOS (states/meV)
315
+ Total
316
+ Sc
317
+ Ag
318
+ C
319
+ FIG. 2: The total phonon DOS per unit cell and partial
320
+ DOS per atom of ScAgC.
321
+ estimate sound velocity, which is an important factor in
322
+ calculating the κph of solids [1].
323
+ We proceed now to see the effect of long-range
324
+ Coulomb interactions or dipole-dipole interactions on
325
+ the ions present in the ionic crystals. It is well known
326
+ that polar crystals become polarized by taking small
327
+ atomic displacements from their equilibrium positions,
328
+ and the resulting macroscopic field modifies the force con-
329
+ stants close to the Γ-point [38]. Basically, LOB create a
330
+ macroscopic electric field near the Γ-point in non-metallic
331
+ solids, and thus NAC is calculated to take this contribu-
332
+ tion into harmonic phonon dispersion. As a result, the
333
+ LOB is lifted up, and TOB and LOB split close to the
334
+ Γ-point. One can clearly observe this LO-TO splitting
335
+ at the Γ-point in Fig. 1(b). Now the maximum energy
336
+ of phonons at Γ-point is ∼58 meV and an energy gap of
337
+ ∼10 meV is also created. The splitting of OB also creates
338
+ a minimum energy gap of ∼3 meV. In practice, the BEC
339
+ of ions and the dielectric constant are required quantities
340
+ for NAC at OB frequencies [38]. The calculated dielec-
341
+ tric constant is ∼13.9, which is the same in all directions
342
+ due to the cubic symmetry of ScAgC, while the BEC of
343
+ Sc, Ag, and C ions is ∼2.5, ∼0.4, ∼ −2.9, respectively.
344
+ According to this, the inclusion of NAC can play an im-
345
+ portant role in deciding the phonon properties. However,
346
+ in the presence of NAC, the other part of the dispersion
347
+ is barely affected when compared to Fig.
348
+ 1(a). These
349
+ theoretical aspects can be probed and verified if someone
350
+ measures them by experiment.
351
+ Further, the phonon DOS and a partial DOS have
352
+ been studied in order to investigate the effect of AB and
353
+ OB in ScAgC during heat transfer processes.
354
+ Fig.
355
+ 2
356
+ indicates the obtained graph of total phonon DOS per
357
+ unit cell and partial phonon DOS per atom. The total
358
+ DOS plot has three main peaks around the energies of
359
+ ∼14.5, ∼30 and ∼48 meV, respectively. One can see the
360
+ gap in the DOS around 25 (40) meV, which separates
361
+ the states corresponding to AB (OB) and OB (OB). In
362
+ the figure, the AB in the lower energy region (below 25
363
+ meV) have the major contributions due to the vibrations
364
+ of the heavier mass Ag atoms. The middle energy range
365
+ of OB is mainly influenced by the atomic vibrations of Sc
366
+ atoms. While the main contribution of lighter C atoms
367
+
368
+ 4
369
+ to vibrations is seen in higher (above 45 meV) energetic
370
+ OB modes.
371
+ B.
372
+ Thermal expansion
373
+ We shall now investigate the features of how the
374
+ lattice can expand as a result of the thermal motion
375
+ of ions at finite temperatures.
376
+ The definition of α(T )
377
+ and κph of compounds breaks down at the harmonic re-
378
+ gion for crystal potential.
379
+ The normal-mode frequen-
380
+ cies of purely harmonic crystals are unaffected by the
381
+ change of equilibrium volume and therefore do not lead
382
+ to α(T ) [1].
383
+ Further, anharmonic interaction in solid
384
+ gives the α(T ) because it leads to asymmetry in crys-
385
+ tals.
386
+ In this regard, it has been discovered that the
387
+ QHA [2] is a respectably good approximation for cap-
388
+ turing the α(T ). It is known that normal mode frequen-
389
+ cies do not always have volume dependence, but QHA
390
+ considers volume-dependent phonon properties here [1].
391
+ Accordingly, the thermal coefficient of linear expansion
392
+ α(T ) of ScAgC is estimated under QHA. In this way,
393
+ the total free energy as a function of primitive cell vol-
394
+ ume is calculated at various temperatures ranging from
395
+ 0 to 1200 K with a step size of 100 K, as shown in
396
+ Fig. 3(a). For this, ten different supercells are created
397
+ around the equilibrium lattice constant with different ex-
398
+ pansions and compressions. The total F at a given tem-
399
+ perature and volume can be estimated as, F(T ; V ) =
400
+ [Uel(V )−Uel(V0)]+Fph(T ; V ). Where Uel(V )−Uel(V0) is
401
+ the relative DFT energy of the electronic system, V0 is
402
+ the equilibrium volume at 0 K. Fph(T ; V ) is related to the
403
+ phonon contribution to Helmholtz free energy. At each
404
+ temperature, free energy has one minima corresponding
405
+ to the equilibrium volume of a primitive cell, which is
406
+ estimated after fitting the Birch-Murnaghan equation of
407
+ states [39] to the F versus volume plot. In Fig.
408
+ 3(a),
409
+ the solid red line connects every such energy point at
410
+ equilibrium volume for a given temperature. Then, Fig.
411
+ 3(b) presents these equilibrium volumes as a function of
412
+ temperature up to 1200 K. The calculated equilibrium
413
+ volume at 0 K is ∼175.7 ˚A3, while it increases to ∼176.5
414
+ ˚A3 at 1200 K. When compared to its ground state vol-
415
+ ume, the volume increases by up to ∼0.4% at 1200 K.
416
+ From knowing the minimum free energy for equi-
417
+ librium primitive cell volume, one can easily calculate
418
+ linear coefficient of thermal expansion α(T ) from the ex-
419
+ pression of α(T ) = 1
420
+ 3β(T ) [1]. Here, the term β(T ) is
421
+ known as the volumetric thermal expansion coefficient,
422
+ which is estimated as follows: β(T ) =
423
+ 1
424
+ V (T )
425
+ ∂V (T )
426
+ ∂T
427
+ . Where
428
+ V (T ) represents the volume of a primitive cell as a func-
429
+ tion of temperature, as illustrated in Fig. 3(b). Because
430
+ our compound has cubic symmetry, the expansion is uni-
431
+ form in all three directions, and thus α(T ) is one-third of
432
+ β(T ) [1]. Fig. 3(c) shows a plot of the calculated α(T )
433
+ versus temperature from 0-1200 K. The corresponding
434
+ figure depicts a rapid increase in α(T ) up to ∼200 K, fol-
435
+ lowed by a slow increment in temperature up to ∼500
436
+ 160
437
+ 170
438
+ 180
439
+ 190
440
+ Volume (Å3)
441
+ -6
442
+ -4
443
+ -2
444
+ 0
445
+ 2
446
+ 4
447
+ 6
448
+ 8
449
+ Free energy F (eV)
450
+ 175.6
451
+ 175.8
452
+ 176
453
+ 176.2
454
+ 176.4
455
+ 176.6
456
+ Volume (Å
457
+ 3)
458
+ 0
459
+ 200
460
+ 400
461
+ 600
462
+ 800
463
+ 1000
464
+ 1200
465
+ Temperature (K)
466
+ 0
467
+ 1
468
+ 2
469
+ 3
470
+ 4
471
+ 5
472
+ α(Τ) (×10
473
+ −6 Κ
474
+ −1)
475
+ 0 K
476
+ 1200 K
477
+ (a)
478
+ (b)
479
+ (c)
480
+ FIG. 3: (a) Variation of total free energy F with
481
+ primitive cell volume. (b) Change in primitive cell
482
+ volume with temperature. (c) The coefficient of linear
483
+ thermal expansion α(T ) with respect to temperature for
484
+ ScAgC.
485
+ K. The rate of volume change in the crystal is high-
486
+ est in the 0-200 K temperature range.
487
+ From ∼500 K
488
+ to highest studied temperature, the α(T ) shows almost
489
+ constant behaviour with respect to temperature. At low
490
+ temperatures, α(T ) varies as ∼T 3 and becomes nearly
491
+ constant at higher temperatures, exhibiting nearly the
492
+ same temperature dependence behaviour to specific heat
493
+ Cv in both cases [1, 29]. The predicted value of α(T ) at
494
+ room temperature is ∼4×10−6 K−1, while at 1200 K, it
495
+ is ∼4.6×10−6 K−1. ScAgC has lower α(T ) values than
496
+ other HH compounds like FeVSb [22], and ZrNiSn [24].
497
+ From an application standpoint, the information about
498
+ the α(T ) of materials is very helpful if one wants to utilize
499
+ them for making real TE devices.
500
+ C.
501
+ Lattice thermal conductivity
502
+ The obtained total κph for ScAgC in the temper-
503
+ ature range of 300-1200 K is presented in Fig.
504
+ 4(a).
505
+ One can notice the decreasing behaviour of κph with in-
506
+ creasing temperature. The expected value of total κph
507
+ at 300 K is ∼7.4 Wm−1K−1, whereas it decreases to
508
+ ∼1.8 Wm−1K−1 at 1200 K. One can generally expect
509
+ this decreasing behaviour since the phonon-phonon scat-
510
+ tering rate increases with increasing temperature. The
511
+ branch–dependent κph is also calculated to know the per-
512
+ centage weight of κph of AB and OB in the total κph,
513
+ which is shown in Fig. 4(b). In this figure, the first three
514
+ AB1-AB3 are the AB, while OB1-OB6 indicate the six
515
+ OB. The AB2 shows largest κph among all the branches
516
+ and the value is ∼2.5(0.6) Wm−1K−1 at 300(1200) K.
517
+ One can also observe that the AB (OB) contribute nearly
518
+ 77–80 (20–23)% of the total κph in the studied temper-
519
+ ature window.
520
+ This percentage decreases for AB and
521
+ increases for OB as temperature rises.
522
+ This is due to
523
+ the fact that the number of AB (OB) modes decreases
524
+ (increases) as the temperature rises. Basically, this cal-
525
+ culation of κph considers only PPI. But in reality, the κph
526
+ also affected by the phonon-electron interactions (PEI),
527
+
528
+ 5
529
+ 300
530
+ 450
531
+ 600
532
+ 750
533
+ 900
534
+ 1050
535
+ 1200
536
+ Temperature (K)
537
+ 0
538
+ 0.5
539
+ 1
540
+ 1.5
541
+ 2
542
+ 2.5
543
+ κph (W/mK)
544
+ AB1
545
+ AB2
546
+ AB3
547
+ OB1
548
+ OB2
549
+ OB3
550
+ OB4
551
+ OB5
552
+ OB6
553
+ 300
554
+ 450
555
+ 600
556
+ 750
557
+ 900
558
+ 1050
559
+ 1200
560
+ Temperature (K)
561
+ 0
562
+ 1
563
+ 2
564
+ 3
565
+ 4
566
+ 5
567
+ 6
568
+ 7
569
+ 8
570
+ κph (W/mK)
571
+ AB
572
+ OB
573
+ TB
574
+ (a)
575
+ (b)
576
+ FIG. 4: The calculated κph for (a) acoustic branches
577
+ (AB), optical branches (OB), and total branches (TB)
578
+ (b) nine phonon branches as a function of temperature.
579
+ phonon-defect interactions, etc.
580
+ Apart from this, the
581
+ DFT-based phonon band structure has been used in the
582
+ estimation of temperature-dependent κph here. However,
583
+ in the real world, phonon band structure is temperature
584
+ dependent. Therefore, one can get a more realistic result
585
+ of κph with the inclusion of all the above aspects. But
586
+ large computational efforts are required to address these
587
+ challenges.
588
+ Now we shall focus on understanding the different
589
+ physical parameters that contribute to the prediction of
590
+ κph. Recalling Eq. (1), the variation of vλ with phonon
591
+ frequency, and Cλ, τλ with respect to temperature have
592
+ been studied. The calculated vλ, which is directly pro-
593
+ portional to κph, is presented in Fig. 5(a). In this figure,
594
+ each data point represents a phonon mode for a par-
595
+ ticular q-point in the irreducible part of the Brillouin
596
+ zone (IBZ). The AB3 has the highest vλ among all the
597
+ branches, and the value is ∼6.7 km/s, which is almost a
598
+ double value of the highest vλ (∼3.5 km/s) of the OB9.
599
+ The relatively flat dispersion of OB in Fig.
600
+ 1(b) may
601
+ be one of the reasons for the low vλ of OB compared
602
+ to AB. Here, we have not considered the temperature-
603
+ dependent vλ. Nextly, the calculated Cλ for all branches
604
+ as a function of temperature is plotted in Fig. 5(b). In
605
+ the studied temperature window, the AB have relatively
606
+ large Cλ compared to the OB. At 200 K, the Cλ of AB1-
607
+ AB3(OB1-OB3) branches is calculated to be ∼23.5(19.5)
608
+ meV/K. At same temperature, the calculated Cλ of OB4-
609
+ OB5(OB6) branches is ∼13.5(11.5) meV/K. This can be
610
+ viewed from the Bose-Einstein distribution function, in
611
+ which the phonon mode population is decreased by in-
612
+ creasing the mode’s frequency at a fixed temperature.
613
+ Consequently, OB have lower heat capacities, contribut-
614
+ ing less to κph. Indeed, Cλ stays almost constant with a
615
+ small ∼2–11% deviation (∼2% for 630 K and ∼11% for
616
+ 300 K) from a constant value (∼24.5 meV/K) of a clas-
617
+ sical limit of Cλ at higher temperatures
618
+
619
+ T≫ΘD(∼630K
620
+ [29])
621
+
622
+ , where ΘD is the Debye temperature. This obser-
623
+ vation reveals that AB modes are the dominant phonon
624
+ modes and therefore make a large contribution to κph.
625
+ The consideration of temperature-independent vλ
626
+ and nearly non-varying Cλ behaviour in the tempera-
627
+ 0
628
+ 3
629
+ 6
630
+ 9
631
+ 12
632
+ 15
633
+ Frequency (THz)
634
+ 0
635
+ 1
636
+ 2
637
+ 3
638
+ 4
639
+ 5
640
+ 6
641
+ 7
642
+ Group velocity (km/s)
643
+ AB1
644
+ AB2
645
+ AB3
646
+ OB1
647
+ OB2
648
+ OB3
649
+ OB4
650
+ OB5
651
+ OB6
652
+ 0
653
+ 200
654
+ 400
655
+ 600
656
+ 800
657
+ 1000
658
+ 1200
659
+ Temperature (K)
660
+ 0
661
+ 5
662
+ 10
663
+ 15
664
+ 20
665
+ 25
666
+ Heat capacity (meV/K)
667
+ AB1
668
+ AB2
669
+ AB3
670
+ OB1
671
+ OB2
672
+ OB3
673
+ OB4
674
+ OB5
675
+ OB6
676
+ (a)
677
+ (b)
678
+ FIG. 5: The calculated mode dependent phonon (a)
679
+ group velocity vλ and (b) heat capacity Cλ for nine
680
+ phonon branches.
681
+ 300
682
+ 450
683
+ 600
684
+ 750
685
+ 900
686
+ 1050
687
+ 1200
688
+ Temperature (K)
689
+ 0
690
+ 0.5
691
+ 1
692
+ 1.5
693
+ 2
694
+ 2.5
695
+ 3
696
+ 3.5
697
+ 4
698
+ Phonon lifetime (ps)
699
+ AB1
700
+ AB2
701
+ AB3
702
+ OB1
703
+ OB2
704
+ OB3
705
+ OB4
706
+ OB5
707
+ OB6
708
+ 300
709
+ 450
710
+ 600
711
+ 750
712
+ 900
713
+ 1050
714
+ 1200
715
+ Temperature (K)
716
+ 0.3
717
+ 0.6
718
+ 0.9
719
+ 1.2
720
+ 1.5
721
+ 1.8
722
+ 2.1
723
+ 2.4
724
+ Phonon lifetime (ps)
725
+ AB
726
+ OB
727
+ TB
728
+ (a)
729
+ (b)
730
+ FIG. 6: The phonon lifetime τλ for (a) nine phonon
731
+ branches (b) acoustic branches (AB), optical branches
732
+ (OB), and total branches (TB) as a function of
733
+ temperature.
734
+ ture range of 300-1200 K motivates us to look closely
735
+ the temperature variation of τλ for all phonon branches.
736
+ Here, from Eq. (4), τλ due to only PPI is estimated to
737
+ understand the behaviour of κph in the 300-1200 K tem-
738
+ perature range, which is shown in Fig. 6. In Fig. 6(a),
739
+ τλ of all nine branches is obtained by taking the average
740
+ weight of all q-points in the IBZ. Here, the same method
741
+ is used for the calculation of τλ as employed in earlier
742
+ work by Shastri et. al [40]. In the figure, one can clearly
743
+ notice that OB1 and OB2 have the highest τλ, signify-
744
+ ing the lowest phonon-phonon scattering among all the
745
+ branches.
746
+ The value of these branches is found to be
747
+ ∼3.9(0.95) ps at 300(1200) K. The last OB9 branch has
748
+ a shorter τλ with a value of ∼0.07(0.02) ps at 300(1200)
749
+ K, indicating a higher scattering rate than other phonon
750
+ branches. All of the branches show decreasing τλ with in-
751
+ creasing temperature, indicating that phonons feel more
752
+ scattering at high temperatures than phonons at low
753
+ temperatures. It is also clear from the figure that the
754
+ decrement rate of τλ for the last three OB4-OB6 is much
755
+ slower than for other phonons with increasing temper-
756
+ ature that produce low κph.
757
+ This can be understood
758
+ through the PDOS plot in Fig. 2, in which the phonon
759
+ number densities of the last three OB are comparably
760
+ larger than other branches.
761
+ The corresponding region
762
+ contains strong phonon-phonon scattering interactions.
763
+ The τλ of TB, AB, and OB is also estimated by aver-
764
+
765
+ 6
766
+ TABLE I: The variation of τλ (κph) with a relation of
767
+ AτT−xτ (AκT−xκ) [1] for acoustic branches (AB), optical
768
+ branches (OB), and total branches (TB).
769
+ Phonon branches Aτ(ps×K) xτ
770
+ Aκ (W/m)
771
+
772
+ AB1
773
+ 1050
774
+ 1.06
775
+ 786
776
+ 1.05
777
+ AB2
778
+ 1113
779
+ 1.03
780
+ 893
781
+ 1.03
782
+ AB3
783
+ 628
784
+ 1.01
785
+ 463
786
+ 1.02
787
+ OB1
788
+ 1263
789
+ 1.02
790
+ 95
791
+ 0.95
792
+ OB2
793
+ 1288
794
+ 1.02
795
+ 119
796
+ 0.94
797
+ OB3
798
+ 609
799
+ 1.03
800
+ 127
801
+ 0.95
802
+ OB4
803
+ 59
804
+ 1.02
805
+ 0.81
806
+ 0.85
807
+ OB5
808
+ 54
809
+ 1.02
810
+ 1.12
811
+ 0.84
812
+ OB6
813
+ 17
814
+ 0.98
815
+ 0.76
816
+ 0.75
817
+ AB
818
+ 924
819
+ 1.04
820
+ 2133
821
+ 1.04
822
+ OB
823
+ 548
824
+ 1.02
825
+ 342
826
+ 0.95
827
+ TB
828
+ 672
829
+ 1.03
830
+ 2413
831
+ 1.02
832
+ aging the corresponding number of phonon branches, as
833
+ shown in Fig. 6(b). The τλ of TB due to PPI is obtained
834
+ by taking the average of all phonon branches. The figure
835
+ presents that OB have lower τλ than AB and the values
836
+ are ∼1.65(2.5) ps and ∼0.4(0.6) ps for OB(AB) branches
837
+ at 300 and 1200 K, respectively. This means that the
838
+ AB transport more heat energy than OB in the form of
839
+ κph. The calculated room temperature value of τλ of TB
840
+ is ∼1.93 ps, while it decreases as temperature increases,
841
+ with a value of ∼0.46 ps at 1200 K.
842
+ The total number of phonons in a solid is pro-
843
+ portional to temperature T at higher temperatures (T≫
844
+ ΘD), which can be understood from Eq. (3). Since a
845
+ phonon that contributes to thermal conduction is more
846
+ likely to be scattered with other phonons that are present
847
+ in crystal, one should expect τλ to exhibit a decreas-
848
+ ing behaviour as temperature rises.
849
+ At high temper-
850
+ atures, the Cλ follows the Dulong-Petit law and be-
851
+ comes temperature-independent, which can also be ob-
852
+ served in Fig. 5(b). vλ is assumed to be a temperature-
853
+ independent constant in the Debye model, and even in
854
+ more accurate models, it will not have a significant con-
855
+ tribution to κph [1]. Therefore, in the high-temperature
856
+ regime, the κph should decrease as the temperature
857
+ rises. This temperature-dependence behaviour is con-
858
+ firmed by the experiment, and the rate of decline is
859
+ AκT−xκ [1]. The variables Aκ and xκ are temperature-
860
+ independent and the value of xκ lies between 1 and 2 [1].
861
+ Aκ and xκ are calculated by fitting the above relation in
862
+ the respective κph curve, which is shown in Table 1. The
863
+ calculated value of xκ for TB is ∼1.02, which is within
864
+ the experimental range. From the above discussion, it
865
+ is important to note that this kind of behaviour is valid
866
+ for T≫ ΘD. However, in our case, ΘD is estimated to
867
+ be ∼630 K [29], but the calculated κph follows this trend
868
+ at temperatures above 300 K. The xκ value for each AB
869
+ is greater than one and less than one for each OB. Also,
870
+ the xκ value for AB(OB) is ∼1.04(0.95), indicating that
871
+ AB controls the behaviour of xκ in TB. To deeply under-
872
+ stand the κph behaviour with temperature, the equation
873
+ τλ = AτT−xτ is also fitted in the respective plots. Here,
874
+ Aτ and xτ are also temperature-independent variables.
875
+ The value of xτ for TB is ∼1.03, while the values for AB
876
+ and OB are ∼1.04 and ∼1.02, respectively. Each phonon
877
+ branch (except OB6) has a xτ value greater than one,
878
+ while OB6 has a value of ∼0.98. Also, xτ and xκ due to
879
+ AB1-AB3 are nearly identical, whereas these values differ
880
+ slightly for OB1-OB6. This means that xτ values for all
881
+ AB contribute significantly more to xκ than the xτ val-
882
+ ues of all OB. The OB2 has highest Aτ of ∼1288 ps×K,
883
+ whereas AB2 has highest Aκ of ∼893 W/m.
884
+ Finally,
885
+ the conclusion can be drawn that acoustic modes are
886
+ the dominant heat carriers in the temperature-dependent
887
+ κph.
888
+ As a result, AB are dominant carriers in all three
889
+ previously studied parameters (vλ, Cλ and τλ), becom-
890
+ ing the larger contributor to the heat transfer process
891
+ in ScAgC in terms of κph. Among threes, the reduced
892
+ trend of τλ with increasing temperature leads directly to
893
+ the gradual decrement of κph in Fig. 4 with temperature.
894
+ One can get a high ZT by reducing the κph as much as
895
+ possible. Since τλ is higher for AB than OB, one can re-
896
+ duce the τλ of AB by accounting for the extra scattering
897
+ centres in the form of alloying, nanostructuring, and etc.,
898
+ [15, 41] in the energy range of AB. These extra scatter-
899
+ ings can provide a low κph and hence may give rise to a
900
+ high ZT , which is a positive sign for compounds used in
901
+ TE applications.
902
+ IV.
903
+ CONCLUSIONS
904
+ Here, we have performed the DFT calculations to
905
+ understand the lattice transport mechanisms of ScAgC
906
+ combined with the HA and QHA. The phonon band dis-
907
+ persion and phonon DOS are calculated under HA. The
908
+ obtained positive frequencies (with and without NAC)
909
+ of dispersion suggest the mechanical stability of ScAgC
910
+ in the FCC structure. The value of α(T ) is found to be
911
+ ∼4×10−6 K−1 and ∼4.6×10−6 K−1 at 300 K and 1200
912
+ K, respectively. Similarly, first-principles based anhar-
913
+ monic phonon calculations have been used to analyse the
914
+ κph and the value is obtained as ∼7.4(1.8) Wm−1K−1 at
915
+ 300(1200) K. The value of total τλ at 300 K is calculated
916
+ to be ∼1.93 ps, whereas it is observed as ∼0.46 ps at
917
+ 1200 K. The highest calculated vλ for AB (OB) is ∼6.7
918
+ (3.5) km/s. At 200 K, the AB (OB) have the highest
919
+ (lowest) Cλ with a value of ∼23.5 (11.5) meV/K. By fit-
920
+ ting the equation of AκT−xκ(AτT−xτ ) in κph(τλ) curve,
921
+ the temperature-dependent behaviour is also understood.
922
+ The xκ value for AB(OB) is predicted to be ∼1.04(0.95),
923
+ while it is ∼1.02 for TB. Similarly, the obtained value of
924
+ xτ is ∼1.04(AB), ∼1.02(OB), and ∼1.03(TB). Our study
925
+ can be helpful in order to use ScAgC for renewable energy
926
+ sources such as TE and PV applications.
927
+
928
+ 7
929
+ [1] N. W. Ashcroft and N. D. Mermin, Solid State Physics,
930
+ Vol. 239 (Saunders College Publishing, New York, 1976).
931
+ [2] G. P. Srivastava, The physics of phonons (Taylor and
932
+ Francis Group, New York, 1990).
933
+ [3] L. Chaput, Phys. Rev. Lett. 110, 265506 (2013).
934
+ [4] F. J. DiSalvo, Science 285, 703 (1999).
935
+ [5] V.
936
+ L.
937
+ Dalal
938
+ and
939
+ A.
940
+ R.
941
+ Moore,
942
+ J. Appl. Phys. 48, 1244 (1977).
943
+ [6] M.
944
+ Lambert
945
+ and
946
+ L.
947
+ Fletcher,
948
+ J Thermophys Heat Trans. 11, 129 (1997).
949
+ [7] S.
950
+ E.
951
+ Kim,
952
+ F.
953
+ Mujid,
954
+ A.
955
+ Rai,
956
+ and
957
+ et
958
+ al.,
959
+ Nature 597, 660 (2021).
960
+ [8] H. Song, J. Liu, B. Liu, and et al., Joule 2, 442 (2018).
961
+ [9] O.
962
+ Hellman,
963
+ I.
964
+ Abrikosov,
965
+ and
966
+ S.
967
+ Simak,
968
+ Phys. Rev. B 84, 180301 (2011).
969
+ [10] T.
970
+ Tadano
971
+ and
972
+ S.
973
+ Tsuneyuki,
974
+ Phys. Rev. B 92, 054301 (2015).
975
+ [11] W. Kohn and L. J. Sham, Phys. Rev. 140, A1133 (1965).
976
+ [12] A.
977
+ Togo,
978
+ L.
979
+ Chaput,
980
+ and
981
+ I.
982
+ Tanaka,
983
+ Phys. Rev. B 91, 094306 (2015).
984
+ [13] L. E. Bell, Science 321, 1457 (2008).
985
+ [14] Y.
986
+ Pei,
987
+ X.
988
+ Shi,
989
+ A.
990
+ LaLonde,
991
+ and
992
+ et
993
+ al.,
994
+ Nature 473, 66 (2011).
995
+ [15] G. Snyder and E. Toberer, Nat. Mater. 7, 105 (2008).
996
+ [16] S.
997
+ Sk,
998
+ P.
999
+ Devi,
1000
+ S.
1001
+ Singh,
1002
+ and
1003
+ et
1004
+ al.,
1005
+ Mater. Res. Express 6, 026302 (2018).
1006
+ [17] E. D. Case, J. Electron. Mater. 41, 1811 (2012).
1007
+ [18] D.
1008
+ Music,
1009
+ R.
1010
+ W.
1011
+ Geyer,
1012
+ and
1013
+ P.
1014
+ Keuter,
1015
+ Appl. Phys. Lett. 109, 223903 (2016).
1016
+ [19] L.
1017
+ Zhang,
1018
+ A.
1019
+ Grytsiv,
1020
+ B.
1021
+ Bonarski,
1022
+ and
1023
+ et
1024
+ al.,
1025
+ J. Alloys Compd. 494, 78 (2010).
1026
+ [20] S.
1027
+ Sk
1028
+ and
1029
+ S.
1030
+ K.
1031
+ Pandey,
1032
+ EPL (Europhys. Lett.) 137, 66002 (2022).
1033
+ [21] S. Sk and S. K. Pandey, arXiv preprint arXiv:2204.11198
1034
+ (2022).
1035
+ [22] S.
1036
+ S.
1037
+ Shastri
1038
+ and
1039
+ S.
1040
+ K.
1041
+ Pandey,
1042
+ J. Phys. Condens. Matter 33, 085704 (2020).
1043
+ [23] T.
1044
+ Graf,
1045
+ C.
1046
+ Felser,
1047
+ and
1048
+ S.
1049
+ S.
1050
+ Parkin,
1051
+ Prog. Solid State Chem. 39, 1 (2011).
1052
+ [24] S.
1053
+ S.
1054
+ Shastri
1055
+ and
1056
+ S.
1057
+ K.
1058
+ Pandey,
1059
+ J. Phys. Condens. Matter 32, 355705 (2020).
1060
+ [25] J.
1061
+ Shiomi,
1062
+ K.
1063
+ Esfarjani,
1064
+ and
1065
+ G.
1066
+ Chen,
1067
+ Phys. Rev. B 84, 104302 (2011).
1068
+ [26] L.
1069
+ Yu
1070
+ and
1071
+ A.
1072
+ Zunger,
1073
+ Phys. Rev. Lett. 108, 068701 (2012).
1074
+ [27] T. Gruhn, Phys. Rev. B 82, 125210 (2010).
1075
+ [28] V.
1076
+ Pandey,
1077
+ A.
1078
+ Sihi,
1079
+ and
1080
+ S.
1081
+ K.
1082
+ Pandey,
1083
+ J. Phys. Condens. Matter 33, 475503 (2021).
1084
+ [29] V.
1085
+ K.
1086
+ Solet,
1087
+ S.
1088
+ Sk,
1089
+ and
1090
+ S.
1091
+ K.
1092
+ Pandey,
1093
+ Phys. Scr. 97, 105711 (2022).
1094
+ [30] A.
1095
+ Royne,
1096
+ C.
1097
+ J.
1098
+ Dey,
1099
+ and
1100
+ D.
1101
+ R.
1102
+ Mills,
1103
+ Sol. Energy Mater. Sol. Cells 86, 451 (2005).
1104
+ [31] G.
1105
+ Kresse,
1106
+ J.
1107
+ Furthm¨uller,
1108
+ and
1109
+ J.
1110
+ Hafner,
1111
+ Europhys. Lett. 32, 729 (1995).
1112
+ [32] A. Togo and I. Tanaka, Scr. Mater. 108, 1 (2015).
1113
+ [33] X. Gonze,
1114
+ J.-M. Beuken,
1115
+ R. Caracas, and et al.,
1116
+ Comput. Mater. Sci. 25, 478 (2002).
1117
+ [34] P. E. Bl¨ochl, Phys. Rev. B 50, 17953 (1994).
1118
+ [35] J.
1119
+ P.
1120
+ Perdew,
1121
+ K.
1122
+ Burke,
1123
+ and
1124
+ M.
1125
+ Ernzerhof,
1126
+ Phys. Rev. Lett. 77, 3865 (1996).
1127
+ [36] X. Gonze, B. Amadon, P.-M. Anglade, and et al.,
1128
+ Comput. Phys. Comm. 180, 2582 (2009).
1129
+ [37] J. Zwanziger, J. Galbraith, Y. Kipouros, and et al.,
1130
+ Comput. Mater. Sci. 58, 113 (2012).
1131
+ [38] F.
1132
+ Detraux,
1133
+ P.
1134
+ Ghosez,
1135
+ and
1136
+ X.
1137
+ Gonze,
1138
+ Phys. Rev. Lett. 81, 3297 (1998).
1139
+ [39] F. Birch, Phys. Rev. 71, 809 (1947).
1140
+ [40] S.
1141
+ S.
1142
+ Shastri
1143
+ and
1144
+ S.
1145
+ K.
1146
+ Pandey,
1147
+ J. Phys. Condens. Matter 33, 265702 (2021).
1148
+ [41] D. J. Singh and I. Terasaki, Nat. Mater. 7, 616 (2008).
1149
+ [42] A. Maradudin and A. Fein, Phys. Rev. 128, 2589 (1962).
1150
+
1151
+ 8
1152
+ Supplementary material for “Ab-initio study of
1153
+ phononic thermal conduction in ScAgC
1154
+ half-Heusler”
1155
+ V.
1156
+ METHOD OF CALCULATION OF LATTICE
1157
+ THERMAL CONDUCTIVITY
1158
+ After getting the full solution of LBTE using the
1159
+ single mode relaxation time (SMRT) approximation [2],
1160
+ the closed tensor form of lattice thermal conductivity κph
1161
+ is written as follows [12]:
1162
+ κph =
1163
+ 1
1164
+ NV0
1165
+
1166
+ λ
1167
+ Cλvλ ⊗ vλτ SMRT
1168
+ λ
1169
+ .
1170
+ (1)
1171
+ Here, N and V0 are the number of unit cells and vol-
1172
+ ume of unit cell, respectively. Cλ and vλ is the model
1173
+ specific heat and phonon group velocity of phonon mode
1174
+ λ, respectively. Here λ is the phonon mode denoted by
1175
+ a set of (q, j) with wave vector q in branch j. τ SMRT
1176
+ λ
1177
+ is the relaxation time of corresponding phonon mode λ.
1178
+ τ SMRT
1179
+ λ
1180
+ is approximately considered to be phonon lifetime
1181
+ τλ in order to further calculate κph. Then, τλ is obtained
1182
+ from the imaginary part of phonon self-energy Γλ(ωλ) by
1183
+ considering only phonon-phonon interaction (PPI). The
1184
+ anharmonic third-order force constant is used to calcu-
1185
+ late the Γλ(ωλ), which is obtained from the many-body
1186
+ perturbation theory as [12],
1187
+ Γλ(ω) = 18π
1188
+ ℏ2
1189
+
1190
+ λ′ λ′′
1191
+ ��Φ−λλ′ λ′′ ��2
1192
+ ��
1193
+ nλ′ + nλ′′ + 1
1194
+
1195
+ ×δ
1196
+
1197
+ ω − ωλ′ − ωλ′′ �
1198
+ +
1199
+
1200
+ nλ′ − nλ′′ �
1201
+ ×
1202
+
1203
+ δ
1204
+
1205
+ ω + ωλ′ − ωλ′′ �
1206
+ −δ
1207
+
1208
+ ω − ωλ′ + ωλ′′ ���
1209
+ .
1210
+ (2)
1211
+ Where nλ represents the Bose–Einstein thermal distribu-
1212
+ tion function at the equilibrium of a particular phonon
1213
+ mode λ, which is given as,
1214
+ nλ =
1215
+ 1
1216
+ exp(ℏωλ/kBT ) − 1
1217
+ (3)
1218
+ Φ−λλ′ λ′′ indicates the all possible three-phonon
1219
+ interaction strengths between modes of λ, λ
1220
+ ′ and λ
1221
+ ′′ in-
1222
+ volving in the scattering, which can be obtained from
1223
+ anharmonic third-order force constants.
1224
+ From Eq. (2), one can calculate the τλ of phonon
1225
+ branch λ as [12, 42],
1226
+ τ SMRT
1227
+ λ
1228
+ ≡ τλ =
1229
+ 1
1230
+ 2Γλ(ωλ)
1231
+ (4)
1232
+ Where 2Γλ(ωλ) is the phonon linewidth and ωλ denotes
1233
+ the harmonic phonon frequency of a mode λ.
1234
+ The mode-dependent Cλ and vλ can be estimated
1235
+ directly from the solution of eigan-value problem [12],
1236
+ Cλ = kB
1237
+ � ℏωλ
1238
+ kBT
1239
+ �2
1240
+ exp(ℏωλ/kBT )
1241
+ [exp(ℏωλ/kBT ) − 1]2 ,
1242
+ (5)
1243
+ and,
1244
+ vα(λ) ≡ ∂ωλ
1245
+ ∂qα
1246
+ =
1247
+ 1
1248
+ 2ωλ
1249
+
1250
+ kk′ βγ
1251
+ Wβ(k, λ)∂Dβγ(kk
1252
+ ′, q)
1253
+ ∂qα
1254
+ Wγ(k
1255
+ ′, λ).
1256
+ (6)
1257
+ where α, β, and γ are the Cartesian indices. Wβ(k, λ) is
1258
+ the polarization vector of kth atom in a unit cell, which
1259
+ is obtained after solving the eigan-value equation of a
1260
+ dynamical matrix D(q) [12].
1261
+
CtAzT4oBgHgl3EQfGfuT/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CtE2T4oBgHgl3EQf9Ant/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:18c3b910344161e4ddbf62a79de6a803486c02eb61263ba502910874dcfc21dd
3
+ size 233137
DtAzT4oBgHgl3EQfT_x1/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:acd37976edb13d06aea18e7c6160a2018668f238ea0afb45bcf623e603eb275c
3
+ size 11468845
E9AyT4oBgHgl3EQfevjq/content/tmp_files/2301.00329v1.pdf.txt ADDED
@@ -0,0 +1,1253 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Moduli Stabilisation, de Sitter Vacua and Hybrid Inflation
2
+ in Large Volume Compactifications
3
+ Waqas Ahmeda 1, Athanasios Karozasb 2, George K. Leontarisb 3, Ilias Tavellarisb 4
4
+ a School of Mathematics and Physics, Hubei Polytechnic University
5
+ Huangshi 435003, China
6
+ b Physics Department, University of Ioannina
7
+ 45110, Ioannina, Greece
8
+ Abstract
9
+ We study the cosmological implications of an effective field theory model derived within a con-
10
+ figuration of D7 brane stacks in the framework of type-IIB string theory. We consider a suitable
11
+ geometric setup where the Kähler moduli fields are stabilised and the parametric space is constrained
12
+ so that a de Sitter vacuum is ensured. In addition to the moduli fields we also take into account the
13
+ usual Higgs and matter fields included in the effective field theory. In this background we implement
14
+ the standard hybrid inflation scenario with a singlet scalar field acting as the inflaton and the Higgs
15
+ states serving as waterfall fields. Radiative corrections and soft supersymmetry breaking terms play
16
+ an essential role in the realisation of a successful inflationary scenario consistent with the present
17
+ cosmological data. Small tensor-to-scalar ratio values are predicted, which can be probed in future
18
+ planned experiments. Further constraints on the model’s parameters are derived from bounds on
19
+ dark radiation which is measured as a contribution to the effective number of neutrino species Nef f .
20
+ In particular, we find an excess of ∆Nef f ≤ 0.95 at 2σ confidence level with natural values of the
21
+ involved couplings.
22
+ 1E-mail: [email protected]
23
+ 2E-mail: mailto:[email protected]
24
+ 3E-mail: [email protected]
25
+ 4E-mail: [email protected]
26
+ arXiv:2301.00329v1 [hep-ph] 1 Jan 2023
27
+
28
+ Contents
29
+ 1
30
+ Introduction
31
+ 1
32
+ 2
33
+ Description of the model and its constituents
34
+ 3
35
+ 3
36
+ The effective potential
37
+ 5
38
+ 3.1
39
+ Inflationary phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
+ 8
41
+ 3.2
42
+ Numerical results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
+ 10
44
+ 4
45
+ Reheating and dark radiation
46
+ 12
47
+ 5
48
+ Conclusions
49
+ 15
50
+ 1
51
+ Introduction
52
+ Cosmological inflation is one of the most successful candidate scenarios in explaining the evolution
53
+ of the Universe and its large scale structure observed today. Meanwhile, numerous effective quantum
54
+ field theory models have been built aimed to conciliating cosmic inflation with particle physics models
55
+ describing the low energy observables. A key criterion on the quest for appropriate models would be to
56
+ have an ultra-violet (UV) completion in a quantum theory of gravity, valid up to the Planck scale MP. In
57
+ this context, at present, string theory appears to be the only promising candidate for a consistent quantum
58
+ theory at such a high scale which incorporates the Standard Model (SM) and its minimal supersymmetric
59
+ extension (MSSM). String theory, however, is formulated in a ten dimensional spacetime framework
60
+ and, therefore, compactification of the six extra dimensions is required to achieve a four-dimensional
61
+ effective field theory compatible with the observed world. The reduction of the corresponding higher
62
+ dimensional string action to four spacetime dimensions, however, entails an immense set of string vacua
63
+ which is commonly nicknamed the string landscape. Yet, starting from a successful effective field theory
64
+ which describes adequately the known physics phenomena, we cannot always embed it in a string theory
65
+ framework.
66
+ On the other hand, consistent effective field theory models emerging after compactification should
67
+ possess a number of important features. Amongst them, they should predict a positive tiny cosmological
68
+ constant Λ of the order Λ ≈ 10−120 M4
69
+ P which could account for the dark energy, as suggested by cos-
70
+ mological observations. A simple way to realise such a scenario is within an effective model involving
71
+ a scalar field φ with a potential V(φ) which displays a (possibly metastable) positive minimum equal to
72
+ the cosmological constant Λ. In fact, effective field theory models from strings compactified on Calabi-
73
+ Yau (CY) manifolds contain a vast number of moduli fields and some of them could play the role of the
74
+ inflaton φ. In this context, it is inferred that the cosmological issues are intertwined with the well known
75
+ problem of moduli stabilisation. In fact, moduli stabilisation and (metastable) de Sitter vacua, play a key
76
+ role for the successful implementation of the cosmological inflationary scenario in effective field theory
77
+
78
+ (EFT) models of string origin. Therefore, reconciling these two issues is essential in the quest for a suit-
79
+ able non-vanishing effective potential of some scalar field enacting as the inflaton φ which rolls down
80
+ to the minimum of its (relatively shallow) potential. This enables the required exponential growth of the
81
+ Universe, provided that the trajectory length ∼ ∆φ of the field φ to reach the minimum is sufficiently
82
+ long to trigger inflation.
83
+ A particular class of models involves constructions with large volume compactification scenarios [1]
84
+ and inflatons associated with the Kähler moduli fields Tk = τk +iak. In previous scenarios [2, 3] consid-
85
+ ered in the context of type-IIB theory it was shown that the internal volume modulus V expressed in terms
86
+ of the real components of Kähler moduli, ReTk = τk, is a suitable candidate for this role, (φ ∝ logV ).
87
+ Radiative corrections associated with intersecting space-filling D7 branes on the other hand, provide a
88
+ stabilisation mechanism for Kähler moduli, and an uplift to their scalar potential through their universal
89
+ abelian factors, this way leading to a positive cosmological constant. In particular, Kähler moduli stabil-
90
+ isation is achieved through a non-zero potential generated by α′ and radiative (logarithmic) corrections
91
+ induced when closed string loops traverse their codimension-two bulk towards localised gravity sources.
92
+ Furthermore, the dS vacuum is obtained due to the positive D-term contributions, (originally proposed
93
+ in [4]) from the intersecting D7-branes.
94
+ In the large volume limit, the induced effective potential for the Kähler moduli receives a simple
95
+ structure possessing two local extrema (a minimum and a maximum) and approaches to zero for φ → ∞.
96
+ The separation distance of its two local extrema is of the order, ∆φ = φmax − φmin ∝ log(Vmax/Vmin).
97
+ In the minimal effective model involving only moduli fields, it can be parametrised in terms of a single
98
+ non-negative parameter while the larger possible separation ∆φ occurs at a critical value of this parameter
99
+ where beyond this point only AdS solutions appear. A non-zero value of the aforementioned parameter
100
+ exists at which a new inflationary small-field scenario is successfully implemented. In this novel scenario
101
+ most of the required number N0 of efolds (N0 ∼ 60) are collected in the vicinity of the minimum of the
102
+ potential and the prediction for the tensor-to-scalar ratio density fluctuations in the early universe is
103
+ r ≈ 4 × 10−4. Despite these successes of the model, yet the picture is not complete and a waterfall
104
+ mechanism has to be realised in order to end inflation and bring the dS vacuum down to a lower value
105
+ compatible with the cosmological constant. It has been shown [5] that when open string states appearing
106
+ in the D7 brane intersections are included in the massless spectrum, appropriate magnetic fluxes and
107
+ specific brane separations can be chosen in a way that, for V less than some critical value, a charged
108
+ open string scalar becomes tachyonic. In [5, 6] it was shown that such a state can represent a waterfall
109
+ field. In possible generalisations of this scenario, one may include several of such fields, which end
110
+ inflation and provide a deeper vacuum in accordance with the present value of Λ.
111
+ In the present work an alternative scenario is proposed where it is taken into account that, in addition
112
+ to the moduli fields, the EFT model accommodates the ordinary fermion matter and the Higgs fields in
113
+ appropriate representations on the gauge group stemming from the specific details of the compactifica-
114
+ tion procedure. Then, a possible and interesting variation of the scenario described previously would be
115
+ that the Higgs rolls down a potential hill towards a new lower minimum, where its initial condition is de-
116
+ fined around the metastable vacuum of the moduli potential. In the present construction, the metastable
117
+ vacuum is determined by the Kähler moduli and the associated compactification volume V . More pre-
118
+ 2
119
+
120
+ cisely, we implement the standard hybrid inflation with a singlet scalar field acting as inflaton and the
121
+ Higgses used as waterfall fields. In this scenario the vacuum energy is determined by the scalar field
122
+ and waterfall fields. We consider radiative corrections which are essential in shaping the slope along the
123
+ inflationary track. Since supersymmetry (SUSY) is broken during inflation, we also include SUSY soft
124
+ terms as well. The soft terms play an important role in order to achieve spectral index (ns) values consis-
125
+ tent with the current experimental bounds. We find small tensor-to-scalar values which can be probed in
126
+ future designed experiments. We also discuss dark radiation and show that change in the effective degree
127
+ of neutrinos satisfy the bound 0.95% confidence level with natural values of the involved couplings.
128
+ The paper is organised as follows. In Section 2 we present the basic features of the model including
129
+ the Kähler potential and the superpotential. An analysis of the effective potential is given in Section 3
130
+ followed by the presentation of the inflation setup along with our inflationary numerical predictions. In
131
+ Section 4 we discuss reheating and dark radiation predictions. Section 5 concludes the paper.
132
+ 2
133
+ Description of the model and its constituents
134
+ In this work we consider a type-IIB string framework in ten dimensions where six of them are compact-
135
+ ified on a Calabi-Yau threefold X . We restrict our attention mainly to the moduli spectrum and use the
136
+ following notation: φ represents the dilaton field, while Ti, and za denote the Kähler and the complex
137
+ structure (CS) moduli respectively. Furthermore, we introduce the usual axion-dilaton combination
138
+ τ = C0 +ie−φ ≡ C0 + i
139
+ gs
140
+ ,
141
+ (2.1)
142
+ where gs is the string coupling and C0 a 0-form potential (RR-scalar). We assume a perturbative -flux
143
+ induced- superpotential W0 of the form proposed in [7]. At the classical level, W0 is a holomorphic
144
+ function which depends on the axion-dilaton modulus τ, and the CS moduli za 5. τ and za are stabilised
145
+ in the standard supersymmetric way, by solving DτW0 = 0, DzaW0 = 0, where DI = ∂IW +W∂IK are the
146
+ covariant derivatives.
147
+ We consider a geometric configuration of three intersecting D7-brane stacks equipped with magnetic
148
+ fluxes. Regarding the Kähler potential, we will take into account α′ corrections as well as the effects
149
+ of a novel four-dimensional Einstein-Hilbert (EH) term (localised in the internal space) which is gener-
150
+ ated from higher derivative terms in the ten-dimensional string effective action [3]. This setup induces
151
+ logarithmic corrections to the scalar potential via loop effects. Taking into account these corrections the
152
+ relevant part of the Kähler potential receives the form [3]
153
+ K = −2log(V +ξ0 +η0 logV )+···
154
+ (2.2)
155
+ where the dots stand for terms depending on za and τi. The general form of the volume is given by
156
+ V = 1
157
+ 6κi jktit jtk where ti are the two-cycle Kähler moduli fields and κi jk are triple intersection numbers
158
+ 5We dispense with the use of non-perturbative corrections which would also introduce the Kähler moduli through terms of
159
+ the form WNP ∝ e−aTk. As explained in the subsequent analysis, Tk can be perturbatively stabilised through one-loop corrected
160
+ Kähler potential.
161
+ 3
162
+
163
+ on X . We will assume a particular CY manifold with three Kähler moduli fields where the simple
164
+ relation τi = at jtk (where a a positive constant) holds between the two- and four-cycle moduli, and the
165
+ volume is simply given by [8]
166
+ V = at1t2t3 = τiti = 1
167
+ √a
168
+ √τ1τ2τ3
169
+ (2.3)
170
+ As will be shown subsequently, the quantum corrections break the no-scale structure of the effective
171
+ theory and give a non-zero contribution to the F-part of the supergravity scalar potential.
172
+ After the dimensional reduction, the effective field theory model is assumed to be either some Grand
173
+ Unified Theory (GUT) or directly the MSSM model where the ordinary low energy (super)-fields appear
174
+ in appropriate representations of the EFT gauge group. Thus, in addition to the quantum corrections
175
+ considered above, we also include matter fields in the Kähler potential. These contributions to the Käh-
176
+ ler potential are essential in studying soft supersymmetry breaking effects and cosmological inflation.
177
+ Within the present context, in particular, we focus on the Higgs sector which plays a vital role in im-
178
+ plementing the scenario of hybrid inflation and investigating the possible production of dark radiation.
179
+ Thus, we consider a generic set of Higgs pairs Φi, ¯Φi which are assumed to break the gauge group at
180
+ some GUT scale much lower that the Planck scale MP. We have also introduced a field S, representing
181
+ a gauge singlet superfield which realises the trilinear superpotential couplings of the form SΦ ¯Φ. Such
182
+ singlet fields are ubiquitous in effective string theory models. In the setup described so far, the relevant
183
+ terms of the superpotential have the following generic form
184
+ W = W0 +κS(ΦΦ−M2)+···
185
+ (2.4)
186
+ where κ is a coupling constant coefficient, M represents a high scale mass parameter, W0 the flux induced
187
+ part introduced previously, and dots stand for possible terms irrelevant to our discussion.
188
+ Including contributions of the above matter fields in the Kähler potential (2.2), while setting the
189
+ Planck mass, MP = 1, we obtain the following generic form
190
+ K = −2log
191
+
192
+
193
+
194
+ 3
195
+
196
+ k=1
197
+ (Tk + ¯Tk)
198
+ � 1
199
+ 2
200
+ +C
201
+
202
+ �+
203
+ 3
204
+
205
+ k=1
206
+ ak
207
+ Tk + ¯Tk
208
+ fk(Φi, ¯Φi...,S, ¯S)
209
+ (2.5)
210
+ where C is a function with a logarithmic dependence on the three moduli fields T1,2,3 defined as
211
+ C = ξ0 +η0log
212
+
213
+ 3
214
+
215
+ k=1
216
+ (Tk + ¯Tk)
217
+
218
+ .
219
+ (2.6)
220
+ In the above equation the parameter ξ0 stands for α′3 corrections [9] and is proportional to the Euler
221
+ characteristic χCY of the Calabi-Yau manifold
222
+ ξ0 = −ζ(3)
223
+ 4
224
+ χCY ,
225
+ (2.7)
226
+ and η0 is an order one coefficient [3]. The functions fk in Eq (2.5) describe the visible Higgs sector. For
227
+ simplicity we will assume that all fk are the same and have the following form
228
+ f(Φ,Φ,S) = αΦΦ† +βΦΦ
229
+ † +γSS† +λ(ΦΦ+h.c.)
230
+ (2.8)
231
+ 4
232
+
233
+ where α,β,γ and λ are dimensionless couplings. Furthermore, we will adopt the approach used in [10]
234
+ and we will express the matter contribution term in (2.5) in terms of the compactification volume (note
235
+ that T ∝ V 2/3), hence, the Kähler potential in Eq. (2.5) is reduced to the following form
236
+ K = −2log[V +ξ0 +η0log(V )]+ 3a
237
+ V 2/3
238
+
239
+ αΦΦ† +βΦΦ
240
+ † +γSS† +λ(ΦΦ+h.c)
241
+
242
+ (2.9)
243
+ where a is a constant and V is defined in (2.3).
244
+ Up to this point we have presented the minimum number of moduli and matter fields which are
245
+ necessary for our subsequent analysis. Next, we proceed with the computation of the scalar potential
246
+ which is essential to investigate the properties of the model and compute the various cosmological and
247
+ other phenomenological observables.
248
+ 3
249
+ The effective potential
250
+ The scalar potential of the effective field theory model receives various contributions. As we will see
251
+ shortly, in the present construction there are F- and D-terms associated with the moduli sector, and
252
+ contributions from the EFT matter fields, as well as supersymmetry breaking terms. We start with the
253
+ F-term potential which is given by the generic formula
254
+ VF = eG �
255
+ GiG−1
256
+ i j∗ G j∗ −3
257
+
258
+ ,
259
+ (3.1)
260
+ where
261
+ G = K +log|W|2 ≡ K +logW +logW ∗
262
+ and the indices i, j in (3.1) denote the derivatives with respect to the various moduli and other fields.
263
+ Computing the derivatives, and substituting in Eq. (3.1) while keeping only the leading order terms,
264
+ the F-term potential receives the following simplified form
265
+ VF
266
+
267
+ κ2αβ
268
+
269
+ M2 −ϕϕ
270
+ �2 +γκ2S2 �
271
+ αϕ2 +βϕ2�
272
+ 3aαβγV 4/3
273
+ + 3W 2
274
+ 0 (2η0 logV −8η0 +ξ0)
275
+ 2V 3
276
+ ,
277
+ (3.2)
278
+ where ϕ and ϕ are the bosonic components of the superfields Φ and Φ.
279
+ At the extrema of the F-term potential the fields take the following values 6
280
+ So = 0,
281
+ ϕoϕo = M2,
282
+ Vo = e
283
+ 13
284
+ 3 − ξ0
285
+ 2η0 .
286
+ (3.3)
287
+ Substituting the solution (3.3) into (3.2) we obtain
288
+ V extr.
289
+ F
290
+ =
291
+ 3|W0|2η0(2logVo −8+ ξ0
292
+ η0 )
293
+ 2V 3
294
+ o
295
+ ≡ η0
296
+ |W0|2
297
+ V 3
298
+ o
299
+ .
300
+ (3.4)
301
+ 6In more general EFT backgrounds it is possible that minimisation with respect to the fields S,Φi leads to a potential
302
+ of the form V ∼
303
+ a
304
+ 5V 4/3 + 1
305
+ 3
306
+ b+η logV
307
+ V 3
308
+ . In this case it is possible to have a dS minimum with the volume acquiring a value
309
+ V 5/3
310
+ 0
311
+ =
312
+ � 9n
313
+ 4a
314
+
315
+ W
316
+
317
+ 4a
318
+ 9n
319
+
320
+ e
321
+ 1
322
+ 3 − b
323
+ n
324
+ �5/3�
325
+ , where W is the product-log (Lambert) function.
326
+ 5
327
+
328
+ 20000
329
+ 30000
330
+ 40000
331
+ 50000
332
+ 60000
333
+ -2.×10-13
334
+ -1.5×10-13
335
+ -1.×10-13
336
+ -5.×10-14
337
+ x
338
+ V (x)
339
+ 25000 30000 35000 40000 45000 50000 55000 60000
340
+ 1.×10-15
341
+ 2.×10-15
342
+ 3.×10-15
343
+ 4.×10-15
344
+ 5.×10-15
345
+ 6.×10-15
346
+ 7.×10-15
347
+ x
348
+ V (x)
349
+ Figure 1: Plots of the potential along the volume direction. The left panel shows the F-term potential, while in
350
+ the right panel the D-term potential has also been included. We choose ξ0 = 10, η0 = −0.92, S = 0, ϕ = ϕ = M,
351
+ κ = 0.1 and γ = 1. Here x represents the volume, x ≡ V .
352
+ A simple analysis shows that this is a minimum of the potential as long as η0 < 0. However, since
353
+ |W0|2
354
+ V 3
355
+ 0
356
+ > 0, the potential (3.4) at the minimum aquires a negative value, hence it turns out that the F-term
357
+ potential predicts an anti-de Sitter (AdS) vacuum. In Fig. 1, left panel, the F-term potential with AdS
358
+ minimum is plotted for a choice of the parameters ξ0,η0,W0.
359
+ Despite the forgoing negative F-term contribution, the potential can be lifted to a de Sitter minimum,
360
+ once D-term contributions [4, 11] associated with the U(1) symmetries of the D7-branes are taken into
361
+ account [2]. More precisely, in the present geometric setting, there are D-term contributions due to the
362
+ universal U(1) factors associated with the D7 brane stacks. These terms have the general form [2, 11]
363
+ VD =
364
+ 3
365
+
366
+ i=1
367
+ g2
368
+ D7i
369
+ 2
370
+
371
+ Qi∂TiK +∑
372
+ j
373
+ qj|Θj|2
374
+ �2
375
+ ,
376
+ (3.5)
377
+ where gD7i = (ReTi)−1 and Qi,qj are “charges” while Θj represent possible gauge singlets of the effective
378
+ field theory model. For ⟨Θj⟩ = 0 (see [11] for an extended discussion related to D-terms) the second term
379
+ in the parenthesis vanishes and each component of the D-term aquires a simple -model independent- form
380
+ VDi ≈ Q2
381
+ i /τ3
382
+ i . Then, the total D-term potential, being the sum of three components, is approximated by [2]
383
+ VD =
384
+ 3
385
+
386
+ i=1
387
+ di
388
+ τi
389
+ �∂K
390
+ ∂τi
391
+ �2
392
+
393
+ 3
394
+
395
+ i=1
396
+ di
397
+ τ3
398
+ i
399
+ ≡ d1
400
+ τ3
401
+ 1
402
+ + d3
403
+ τ3
404
+ 3
405
+ + d2τ3
406
+ 1τ3
407
+ 3
408
+ V 6
409
+ ,
410
+ (3.6)
411
+ Here, di are positive constants related to the charges di ∼ Q2
412
+ i > 0. Furthermore, using the volume formula
413
+ V 2 = τ1τ2τ3, we have substituted the modulus τ2 with its equivalent τ2 = V 2/(τ1τ3) . Then, the total
414
+ effective potential is the sum Veff = VF +VD which we must minimise it with respect to V and the two
415
+ remaining Kähler moduli τ1,2. We have assumed that the F-part of the potential depends on the total
416
+ volume, hence the explicit dependence of Veff on τ1,τ3 only comes through the VD part. It is found
417
+ that the two minimisation conditions with respect to τ1,3 determine the ratios between the moduli, i.e.,
418
+
419
+ τi
420
+ τ j
421
+ �3
422
+ = di
423
+ d j [12]. Expressed in terms of the stabilised total volume V , the conditions for the two τi can
424
+ 6
425
+
426
+ Figure 2: The shape of the effective potential ϕ − S plane for the choice of parameters ξ0 = 10, η0 = −0.92,
427
+ V0 = 32000, κ = 0.1, γ = 1. Here x represents the compactification volume, x ≡ V .
428
+ be written as
429
+ τ3
430
+ i =
431
+ � d2
432
+ i
433
+ dkdj
434
+ � 1
435
+ 3
436
+ V 2 ,
437
+ where i = 1,3. In this case the D-term potential receives the simple form
438
+ VD ≈ d
439
+ V 2 ,
440
+ with
441
+ d = 3(d1d2d3)
442
+ 1
443
+ 3 .
444
+ (3.7)
445
+ By choosing ϕ = ϕ and α = β, the D-term contribution from the Higgs fields vanishes. Then the effective
446
+ potential has the following form
447
+ Veff
448
+
449
+ κ2αβ
450
+
451
+ M2 −ϕϕ
452
+ �2 +γκ2S2 �
453
+ αϕ2 +βϕ2�
454
+ 3aαβγV 4/3
455
+ + 3W 2
456
+ 0 (2η0 log(V )−8η0 +ξ0)
457
+ 2V 3
458
+ + d
459
+ V 2 . (3.8)
460
+ The shape of the potential along the volume modulus V when both F- and D-terms are included is shown
461
+ in the right panel of Fig. 1. As can be seen, a positive D-term is sufficient to uplift the potential along the
462
+ volume direction so that we achieve a de Sitter minimum. In order to find the extrema of the potential
463
+ along the ϕ and S directions, we require the vanishing of its corresponding derivatives. Thus, for ϕ we
464
+ impose the condition
465
+ dVeff
466
+
467
+ =
468
+ 0 ⇒ κ2 �
469
+ 4α2ϕ3 −4α2M2ϕ +4αγS2ϕ
470
+
471
+ 3aα2γV 4/3
472
+ = 0
473
+ (3.9)
474
+ which is solved for the following three ϕ-values
475
+ ϕ = 0,
476
+ ϕ± = ±
477
+
478
+ M2 − γ
479
+ α S2.
480
+ (3.10)
481
+ 7
482
+
483
+ Similarly along the S direction
484
+ dVeff
485
+ dS
486
+ =
487
+ 0 ⇒ 4κ2Sϕ2
488
+ 3aαV 4/3 = 0
489
+ (3.11)
490
+ which yields
491
+ S = 0.
492
+ (3.12)
493
+ Combining Equations (3.10) and (3.12), in the large volume limit we obtain the following solutions
494
+ (S = 0,ϕ = 0),
495
+ (S = 0,ϕ = ±M).
496
+ (3.13)
497
+ We have already dealt with the minimisation of VF with respect to the volume modulus. However, in
498
+ the presence of D-terms the minima along the volume direction are shifted. Thus, requiring the vanishing
499
+ of the derivative of (3.8) with respect to V , we obtain the equation
500
+ dVef f
501
+ dV
502
+ = 0
503
+
504
+ −4κ2 �
505
+ α2ϕ4 +α2M4 −2α2M2ϕ2 +2αγS2ϕ2�
506
+ 9aα2γV 7/3
507
+ − 2d
508
+ V 3
509
+
510
+ 9
511
+
512
+ 2η0W 2
513
+ 0 log(V )−8η0W 2
514
+ 0 +ξ0W 2
515
+ 0
516
+
517
+ 2V 4
518
+ + 3η0W 2
519
+ 0
520
+ V 4
521
+ = 0.
522
+ (3.14)
523
+ In the large volume limit, to a good approximation, the above equation gives the solution
524
+ V0 ≈ 9η0W 2
525
+ 0
526
+ 2d
527
+ W
528
+
529
+ �2de
530
+ 13
531
+ 3 − ξ0
532
+ 2η0
533
+ 9η0W 2
534
+ 0
535
+
536
+ �,
537
+ (3.15)
538
+ where W represents the product-log (Lambert) function. The shape of the scalar potential Ve f f in the
539
+ ϕ-S plane is displayed in Fig. 2. As discussed earlier the D-term contribution in the effective potential is
540
+ essential in order to ensure de Sitter vacua when S approaches zero.
541
+ 3.1
542
+ Inflationary phase
543
+ Up to this point we have analysed in detail the scalar potential of the effective theory and the role of the
544
+ various fields on its final shape. Therefore we are now fully equipped with all the tools and the necessary
545
+ ingredients to examine whether cosmological inflation is realised in the present model. In a previous
546
+ approach, within the same type-IIB framework and the geometric setup of intersecting D7 brane stacks,
547
+ the role of the inflaton field was associated with the logarithm of the compactification volume modulus.
548
+ The accumulation of the required 60 efolds to realise slow-roll inflation was converted to a lower bound
549
+ on the minimum vacuum energy [12], yet much bigger than the cosmological constant. Subsequently,
550
+ a new “waterfall” field was introduced which adds a new direction of the potential. The waterfall field
551
+ rolls down towards the new lower minimum while at the same time it ends inflation. It was shown [5]
552
+ that this role can be realised by open string states oscillating near the intersections of the D7 stacks.
553
+ In the present case where the physical states from the effective theory model have been taken into
554
+ account, new possibilities have emerged. At the minimum along the compactification volume modulus
555
+ 8
556
+
557
+ V , the Higgs field ϕ, and the singlet S add new directions (transverse to that of V ) providing new
558
+ lower minima for the scalar potential. As such, they are potential candidates for waterfall fields. In the
559
+ present scenario inflation proceeds along the local minimum ϕ = 0 (the inflationary track), beginning at
560
+ large S values. An instability occurs at the waterfall point S2
561
+ c = M2 , which is the value of S, such that
562
+ Sc = ∂ 2V
563
+ ∂S2 |S= 0. At this point the field falls naturally into one of the two SUSY minima at ϕ = ±M . At
564
+ large S, the scalar potential is approximately quadratic in ϕ, whereas at S = 0, equation (3.8) becomes a
565
+ Higgs potential. Along the inflationary track the constant term
566
+ V vol
567
+ 0
568
+ = κ2M4
569
+ 3aV 4/3
570
+ 0
571
+ + 3W 2
572
+ 0 (2η0 log(V0)−8η0 +ξ0)
573
+ 2V 3
574
+ 0
575
+ ,
576
+ is present at tree level, thus SUSY is broken during inflation. When SUSY breaks, splitting between
577
+ fermionic and bosonic mass multiplets is created and contributions to radiative corrections occurs. Fol-
578
+ lowing [13, 14], the soft terms are
579
+ ∆Vsoft = (m2
580
+ 3/2 +V0)M2y2 +O(1/V0)
581
+ (3.16)
582
+ where in above equation y defines the ratio y = S/M. The first extremum (S = 0,ϕ = 0) is the maxi-
583
+ mum of the potential. The ϕ = 0 corresponds to the trajectory of the standard hybrid inflation for which
584
+ {ϕ = 0, S > M}. When the inflaton reaches at S = M, the waterfall field takes over and the inflaton
585
+ moves towards the SUSY minimum at ϕ = ±M. Since the potential is non-zero along the inflationary
586
+ track, SUSY is broken along the latter, and the radiative corrections along with the soft SUSY-breaking
587
+ potential Vsoft can lift its flatness, while also providing the necessary slope for driving inflation. The ef-
588
+ fective contribution of the one-loop radiative corrections can be calculated using the Coleman-Weinberg
589
+ formula [15] as
590
+ ∆V1-loop =
591
+ κ4M4y4
592
+ 48π2a2α2γV 8/3
593
+ 0
594
+ �F(y)
595
+ 3γ − κ2
596
+ 2
597
+
598
+ ,
599
+ (3.17)
600
+ where
601
+ F(y) = log
602
+
603
+ κ2M2y2
604
+ 3aαγQ2V 4/3
605
+ 0
606
+
607
+ − 9a2α2γ2
608
+ V 4/3
609
+ 0
610
+ log
611
+ �κ2M2y2
612
+ Q2V 2
613
+ 0
614
+
615
+ .
616
+ (3.18)
617
+ Including the various contributions computed above, we may write the scalar potential along the infla-
618
+ tionary trajectory (i.e. ϕ = ϕ = 0) as follows,
619
+ V
620
+
621
+ VF +VD +∆V1-loop +∆Vsoft,
622
+
623
+ κ2M4
624
+
625
+ V vol
626
+ 0
627
+ κ2M4 +
628
+ κ2y4F(y)
629
+ 144π2a2α2γ2V 8/3
630
+ 0
631
+
632
+ κ2y4
633
+ 96π2a2α2γ2V 8/3
634
+ 0
635
+ + M2
636
+ Sy2
637
+ κ2M2
638
+
639
+ .
640
+ (3.19)
641
+ The prediction for the various inflationary observables are estimated using the standard slow-roll
642
+ parameters defined as,
643
+ ε = 1
644
+ 4
645
+ � 1
646
+ M
647
+ �2 �V ′
648
+ V
649
+ �2
650
+ , η = 1
651
+ 2
652
+ � 1
653
+ M
654
+ �2 �V ′′
655
+ V
656
+
657
+ ,
658
+ ξ 2 = 1
659
+ 4
660
+ � 1
661
+ M
662
+ �4 �V ′V ′′′
663
+ V 2
664
+
665
+ ,
666
+ (3.20)
667
+ 9
668
+
669
+ where prime denotes the derivative with respect to y. Note that the extra factor of 1/2 is due to the
670
+ relation between the canonically normalised real inflaton field, σ ≡ |S|/
671
+
672
+ 2, and the complex field, S. In
673
+ the slow-roll approximation, the scalar spectral index ns, the tensor-to-scalar ratio r and the running of
674
+ the scalar spectral index αs ≡ dns/d lnk are given by,
675
+ ns ≃ 1+2η −6ε,
676
+ r ≃ 16ε,
677
+ αs ≃ 16ε η −24ε2 −2ξ 2.
678
+ (3.21)
679
+ The value of the scalar spectral index ns in the ΛCDM model is ns = 0.9665±0.0038 [16].
680
+ The amplitude of the scalar power spectrum is given by,
681
+ As(k0) =
682
+ 1
683
+ 24π2
684
+ �V(y0)
685
+ ε(y0)
686
+
687
+ ,
688
+ (3.22)
689
+ where As(k0) = 2.137×10−9 at the pivot scale k0 = 0.05Mpc−1 as measured by Planck 2018 [16]. The
690
+ relevant number of e-folds, N0, before the end of inflation is,
691
+ N0 = 2M2
692
+ � y0
693
+ ye
694
+ � V
695
+ V ′
696
+
697
+ dy,
698
+ (3.23)
699
+ where y0 ≡ y(k0) is the field value at the pivot scale k0, and ye is the field value at the end of inflation.
700
+ As the case may be, the value of ye is fixed either by the breakdown of the slow-roll approximation
701
+ (η(ye) = −1), or by a ‘waterfall’ destabilisation occurring at the value ye = 1.
702
+ 3.2
703
+ Numerical results
704
+ The results of our numerical calculations are displayed in Fig. 3, which show the ranges of r, m3/2 and a
705
+ in the M −κ plane. We have used up to second-order approximation on the slow-roll parameters, and for
706
+ simplicity we have set γ = 1, α = 0.25, V0 = 32000 and ye = M. Moreover, we have fixed the spectral
707
+ index ns to the central value (ns = 0.96655) from Planck’s data.
708
+ We further require a ≤ 1, m3/2 ≲ 6 × 1011 GeV, Higgs mass parameter M ≤ Mstring ∼ 1/V01/2 =
709
+ 5.5×10−10Mp = 1.36×1016 GeV and FT which is defined as the difference of field value at pivot scale
710
+ and end of inflation FT ≡ y0 − ye ≲ 0.01. These constraints appear in Fig. 3 as the boundaries of the
711
+ allowed region in the M −κ plane. In our analysis the soft SUSY contributions along with the radiative
712
+ corrections play the dominant role in order to obtain a parametric space consistent with experimental
713
+ bounds, parametrised by m3/2, a and the logarithmic term. It is useful to analytically examine some
714
+ approximate equations to understand the behaviour depicted in Fig. 3. The spectral index ns and tensor-
715
+ to-scalar ratio r in the leading order slow-roll approximation are given by
716
+ ns ≃ 1+ 2M2
717
+ s
718
+ κ2M4 +
719
+ κ2y2
720
+ 0
721
+ 36π2a2α2γ2M2V 8/3
722
+ 0
723
+
724
+ 3log
725
+
726
+ κ2M2y2
727
+ 0
728
+ 3aαγQ2V 4/3
729
+ 0
730
+
731
+ −1
732
+
733
+ ,
734
+ (3.24)
735
+ r ≃ 4
736
+ M2
737
+
738
+
739
+
740
+
741
+ 2M2
742
+ s y0
743
+ κ2M2 +
744
+ κ2y3
745
+ 0
746
+
747
+ log
748
+
749
+ κ2M2y2
750
+ 0
751
+ 3aαγQ2V 4/3
752
+ 0
753
+
754
+ −1
755
+
756
+ 36π2a2α2γ2V 8/3
757
+ 0
758
+
759
+
760
+
761
+
762
+ 2
763
+ .
764
+ (3.25)
765
+ 10
766
+
767
+ 10-5
768
+ 10-4
769
+ 0.001
770
+ 0.010
771
+ 0.100
772
+ 1
773
+ 1012
774
+ 1013
775
+ 1014
776
+ 1015
777
+ 1016
778
+ κ
779
+ M (GeV)
780
+ M=Mstring=1.36×1016(GeV)
781
+ Ms=6×1011(GeV)
782
+ κ=1
783
+ =1
784
+ =0.1688
785
+ FT=y0-ye=0.01%
786
+ DR Area
787
+ r=5×10-7
788
+ r=10-10
789
+ r=10-13
790
+ r=10-16
791
+ 10-5
792
+ 10-4
793
+ 0.001
794
+ 0.010
795
+ 0.100
796
+ 1
797
+ 1012
798
+ 1013
799
+ 1014
800
+ 1015
801
+ 1016
802
+ κ
803
+ M (GeV)
804
+ M=Mstring=1.36×1016(GeV)
805
+ Ms=6×1011(GeV)
806
+ κ=1
807
+ =1
808
+ =0.1688
809
+ FT=y0-ye=0.01%
810
+ DR Area
811
+ =10-2
812
+ =10-4
813
+ =10-6
814
+ 10-5
815
+ 10-4
816
+ 0.001
817
+ 0.010
818
+ 0.100
819
+ 1
820
+ 1012
821
+ 1013
822
+ 1014
823
+ 1015
824
+ 1016
825
+ κ
826
+ M (GeV)
827
+ M=Mstring=1.36×1016(GeV)
828
+ Ms=6×1011(GeV)
829
+ κ=1
830
+ =1
831
+ =0.2117
832
+ FT=y0-ye=0.01%
833
+ DR Area
834
+ Ms=5×1010GeV
835
+ Ms=109GeV
836
+ Ms=107GeV
837
+ Ms=105GeV
838
+ Figure 3: Variations of r, m3/2 and a in M − κ plane. The solution between a = 0.1688 to a = 1 shows the
839
+ parametric space consistent with dark radiation.
840
+ Solving these two equations simultaneously, we obtain
841
+ ns ≃ 0.96655, r ≃ 1.44×10−5
842
+ for the following values of the parameters
843
+ y0 ≃ 11.89, a ∼ 2.02×10−4, Ms ∼ 5.76×1011GeV, M ∼ 1016GeV, γ ∼ 1, α ∼ 0.25.
844
+ These approximate values are very close to the actual ones obtained in the numerical calculations.
845
+ The above analytical equations therefore give a valid approximation of our numerical results displayed
846
+ in Fig. 3.
847
+ For the scalar spectral index ns fixed at Planck’s central value, ns = 0.96655, according to our nu-
848
+ 11
849
+
850
+ merical analysis the exact range of parameters where acceptable solutions occurs is presented below
851
+ 1.6×10−5 ≲ κ ≲ 1,
852
+ (2.19×1012 ≲ M ≲ 1.3×1016) GeV,
853
+ (1.8×104 ≲ MS ≲ 6×1011) GeV,
854
+ 9.1×10−20 ≲ r ≲ 2×10−5,
855
+ 1.6×10−8 ≲ a ≲ 1.
856
+ From the exact ranges of solutions we can see that our calculations predict a low tensor-to-scalar
857
+ ratio (r) compared to the current experimental bounds. However, ongoing and future gravity waves
858
+ experiments are expected to reach much smaller ranges of tensor-to-scalar ratio values comparable to
859
+ our numerical predictions.
860
+ In all plots of Fig. 3 the solution between a = 0.1688 (blue curve) to a = 1 shows the parametric
861
+ space consistent with dark radiation conditions which we discuss next.
862
+ 4
863
+ Reheating and dark radiation
864
+ After the end of inflation, the lightest moduli will begin to oscillate around their minima, acquiring a
865
+ large energy density in the process. The decay products of the modulus fall into two categories. The
866
+ first are decays that go to the visible sector that is, particles of the SM, or its extensions such as the
867
+ MSSM. The decays to visible matter induce reheating, after which the standard hot Big Bang cosmology
868
+ follows. In addition, there may also be decays to hidden sector states. The hidden sector contains several
869
+ candidates for dark radiation, such as massless axions or light hidden gauge bosons. Let us consider the
870
+ three Kähler moduli case, Tk = τk +iak,V = √τ1τ2τ3 where ak is the RR-axion. Decay to the light axion
871
+ ak takes place primarily through the supergravity kinetic terms for the Kähler moduli which read as,
872
+ L ⊃ Ki ¯j∂µT i∂ µT ¯j.
873
+ (4.1)
874
+ The tree level Kähler potential is,
875
+ K = −2log
876
+
877
+ (T1 + ¯T1)(T2 + ¯T2)(T3 + ¯T3) = −log(τ1τ2τ3)+···
878
+ (4.2)
879
+ where the dots represent constant terms which are ignored. Then, the Kähler matrix is found to be
880
+ Ki ¯j = 1
881
+ 4diag
882
+ � 1
883
+ τ2
884
+ 1
885
+ , 1
886
+ τ2
887
+ 3
888
+ , 1
889
+ τ2
890
+ 3
891
+
892
+ .
893
+ (4.3)
894
+ Therefore, Eq (4.1) can be rewritten as,
895
+ L ⊃ 1
896
+ 4
897
+ 1
898
+ τ2
899
+ i
900
+ ∂µτi∂ µτi
901
+ Note here that we have set the reduced Planck mass Mp = 1. To put this into canonical form we need to
902
+ find the transformation τi(ui) so that
903
+ L ⊃ 1
904
+ 2 ∑
905
+ i
906
+ ∂µui∂ µui.
907
+ 12
908
+
909
+ This implies
910
+ τi = e
911
+
912
+ 2ui
913
+ . The moduli fields for canonical kinetic terms take the form
914
+ uk = 1
915
+
916
+ 2
917
+ logτk
918
+ . The corresponding volume modulus is
919
+ t = u1 +u2 +u3
920
+
921
+ 3
922
+ = 1
923
+
924
+ 3
925
+ 1
926
+
927
+ 2 ∑
928
+ k
929
+ logτk =
930
+
931
+ 2
932
+ 3 logV
933
+ . The transverse directions are
934
+ u = u1 −u2
935
+
936
+ 2
937
+ = 1
938
+ 2 log τ1
939
+ τ2
940
+ , v = u1 +u2 −2u3
941
+
942
+ 6
943
+ = 1
944
+
945
+ 3 log τ1τ2
946
+ τ2
947
+ 3
948
+ . We reverse the relations
949
+
950
+
951
+
952
+ u1
953
+ u2
954
+ u3
955
+
956
+
957
+ � =
958
+
959
+
960
+
961
+
962
+ 1
963
+
964
+ 3
965
+ 1
966
+
967
+ 2
968
+ 1
969
+
970
+ 6
971
+ 1
972
+
973
+ 3
974
+ − 1
975
+
976
+ 2
977
+ 1
978
+
979
+ 6
980
+ 1
981
+
982
+ 3
983
+ 0
984
+
985
+
986
+ 2
987
+ 3
988
+
989
+
990
+
991
+
992
+
993
+
994
+
995
+ t
996
+ u
997
+ v
998
+
999
+
1000
+
1001
+ while substituting to the Lagrangian part for axions we have
1002
+ L
1003
+
1004
+ 1
1005
+
1006
+ 3t
1007
+
1008
+ ∂µa1∂ µa1 +∂µa2∂ µa2 +∂µa3∂ µa3
1009
+
1010
+ + 1
1011
+
1012
+ 2
1013
+ u
1014
+
1015
+ ∂µa1∂ µa1 −∂µa2∂ µa2
1016
+
1017
+ + 1
1018
+
1019
+ 6
1020
+ v
1021
+
1022
+ ∂µa1∂ µa1 +∂µa2∂ µa2 −2∂µa3∂ µa3
1023
+
1024
+ .
1025
+ (4.4)
1026
+ The decay rate of the lightest modulus u to axions is given by,
1027
+ Γ(u → a1a1) =
1028
+ 1
1029
+ 64π m3
1030
+ u
1031
+ (4.5)
1032
+ where mu is the modulus mass. In the large volume scenario a distinct hierarchy of mass scales is
1033
+ generated, (for details see Ref [17, 18]). The mass eigenstates after diagonalisation in a unit of Mp = 1
1034
+ can be written as,
1035
+ mt = mu = mv ∼
1036
+ 1
1037
+ V 3/2
1038
+ 0
1039
+ ,
1040
+ mai ∼ e−2πV 2/3
1041
+ 0
1042
+ ,
1043
+ mso ft ∼ 1
1044
+ V 2
1045
+ 0
1046
+ ,
1047
+ m3/2 ∼ 1
1048
+ V0
1049
+ ,
1050
+ Mstring ∼
1051
+ 1
1052
+ V 1/2
1053
+ 0
1054
+ .
1055
+ Similarly the dominant visible-sector decay channel is the decay to Higgs bosons. Specialising to
1056
+ the MSSM case, we can make the identifications Φ = Hu and Φ = Hd. Each of these is a two-component
1057
+ complex field, so there are eight degrees of freedom. Then the decay rate can be derived by including
1058
+ the matter contribution to the Kähler potential
1059
+ L ⊃ 3aλ
1060
+
1061
+ 2
1062
+ HuHd□u+h.c.+··· .
1063
+ (4.6)
1064
+ 13
1065
+
1066
+ 0.2
1067
+ 0.4
1068
+ 0.6
1069
+ 0.8
1070
+ 1.0
1071
+ 2×107
1072
+ 4×107
1073
+ 6×107
1074
+ 8×107
1075
+
1076
+ Tr(GeV)
1077
+ Figure 4: Variations of the reheating temperature (Tr) with respect to coefficient a consistent with dark radiation
1078
+ constraint (∆Neff ≲ 0.95) at 95% confidence level.
1079
+ The dominant contribution to the decay of light moduli u comes from the Giudice-Masiero coupling [19]
1080
+ 3aλHuHd□u as all other couplings are mass-suppressed [20]. Each field is a complex doublet, hence we
1081
+ include the partial widths from each of the four decay channels. This yields
1082
+ Γ(u −→ HuHd) = 9a2λ 2
1083
+
1084
+ m3
1085
+ u.
1086
+ (4.7)
1087
+ The present-day radiation content of the Universe can be described in terms of the energy density asso-
1088
+ ciated with each relativistic particle species at present. This radiation consists of photons and neutrinos
1089
+ plus any additional hidden components, which we call dark radiation (DR):
1090
+ ρradiation = ρphoton +ρneutrino +ρDR
1091
+ (4.8)
1092
+ We can express this in terms of an effective number of neutrino species, Neff, as follows
1093
+ ρradiation = ρphoton
1094
+
1095
+ 1+ 7
1096
+ 8
1097
+ � 4
1098
+ 11
1099
+ �4/3
1100
+ Neff
1101
+
1102
+ .
1103
+ (4.9)
1104
+ Any excess can be accounted for by the presence of DR which is expressed as
1105
+ ρDR = ρphoton
1106
+
1107
+ 7
1108
+ 8
1109
+ � 4
1110
+ 11
1111
+ �4/3
1112
+ ∆Neff
1113
+
1114
+ ,
1115
+ (4.10)
1116
+ where ∆Neff = Neff − 3.046 is the change in the effective number of neutrino species. If there were no
1117
+ dark radiation we would expect to find Neff = 3.046 which is slightly greater than 3 to account for partial
1118
+ 14
1119
+
1120
+ reheating due to e+e− annihilation. ∆Neff can also be written in terms of decay rate channels
1121
+ ∆Neff = 43
1122
+ 7
1123
+ � 10.75
1124
+ g∗(Tr)
1125
+ � 1
1126
+ 3 Γτ→DR
1127
+ Γτ→SM
1128
+ = 43
1129
+ 7
1130
+ � 10.75
1131
+ g∗(Tr)
1132
+ � 1
1133
+ 3
1134
+ 1
1135
+ 72a2λ 2 ,
1136
+ (4.11)
1137
+ where g∗(TRh) is the effective degree of freedom at the time of reheating the Universe. The measured
1138
+ values of Neff require ∆Neff ≲ 0.95 at the 95% confidence level, which translates into a bound on the pa-
1139
+ rameters of the model, a·λ ≳ 0.1688. In Fig. 3 the parametric space between 0.1688 ≤ a ≤ 1 represents
1140
+ the solutions consistent with dark radiation. In this parametric space we receive tensor-to-scalar ratio
1141
+ values r ≤ 1.5×10−9, M ≲ 2.54×1012 GeV and soft mass parameter Ms ≤ 4.98×109 GeV.
1142
+ The isotropy of the Cosmic microwave background (CMB) over large scales can be explained by
1143
+ inflation, which is followed by a period of reheating. During that, the expansion slows and energy is
1144
+ transferred to the SM particles, which enter local thermal equilibrium. We consider the scenario where
1145
+ the Universe is reheated by a modulus u decaying into SM particles. In this case the reheating temperature
1146
+ Tr, using Eq.(4.5) and Eq.(4.11) is defined as
1147
+ Tr =
1148
+
1149
+ Γu =
1150
+
1151
+ 63
1152
+ 344π ∆Neff
1153
+ �g∗(Tr)
1154
+ 10.75
1155
+ �1/2
1156
+ a2λ 2m3u.
1157
+ (4.12)
1158
+ For a SUSY scale at the TeV regime, the constraint on reheating temperature is Tr ≲ 1 GeV, which
1159
+ corresponds to g∗(Tr) = 224/7, see Ref [21, 22]. For the present model we have V0 ∼ 3.2 × 104 which
1160
+ corresponds to split scale SUSY: msoft ∼ V −2
1161
+ 0
1162
+ = 9.7656 × 10−10 = 2.3 × 109 GeV. As a result, the
1163
+ constraint on the reheating temperature is relaxed in this scenario. For split or high scale SUSY we have
1164
+ g∗(Tr) = 106.75, so the reheating temperature is Tr ∼ 107 GeV as shown in Fig. 4.
1165
+ 5
1166
+ Conclusions
1167
+ We investigated the cosmological and low energy supersymmetry implications of an effective model [2]
1168
+ stemming from a geometric configuration of intersecting three D7-branes stacks, within the framework
1169
+ of type-IIB string theory. In this model perturbative string loop corrections which depend logarithmically
1170
+ on the compactification volume V , and D-terms associated with the universal U(1) factors of D7-brane
1171
+ stacks generate an effective scalar potential with de Sitter vacuum, and stabilise all three Kähler moduli
1172
+ fields of the specific geometric setting. In the present work we took into account the effects of ordinary
1173
+ matter contributions in the Kähler potential of the effective model and, in particular, we focused on
1174
+ the role of a generic pair of Higgs fields Φ, ¯Φ (related to the gauge group of the effective theory) on
1175
+ low energy phenomenology predictions and various cosmological observables. We included matter field
1176
+ content and soft-term contributions as well as Coleman-Weinberg corrections to the previously derived
1177
+ potential and studied the implementation of the standard hybrid inflationary scenario where a singlet
1178
+ gauge field sharing common couplings with the Higgs fields in the superpotential plays the role of the
1179
+ inflaton whilst the Higgs states act as waterfall fields. Fixing the spectral intex at central value, ns =
1180
+ 0.96655, we provided predictions for the remaining cosmological observables in accordance with the
1181
+ latest Planck data. In particular, we predicted the value of the tensor-to-scalar ratio to be r ∼ .2×10−4
1182
+ 15
1183
+
1184
+ which is much smaller than the current experimental bounds, but within the reach of future designed
1185
+ experiments. Next, we discussed the decay of the lighter Kähler moduli after the end of inflation, which
1186
+ includes modes to visible as well as invisible particles. In particular, in the context of an MSSM effective
1187
+ theory and in the presence of a Giudice-Masiero coupling, the dominant decay of the lightest modulus
1188
+ is to the Higgs fields, in accordance with previous computations [21]. Furthermore, we investigated
1189
+ predictions of the model to dark radiation production and we found ∆Ne f f ≤ 0.95 at 2σ confidence
1190
+ level. This requires the model parameters a and λ (associated with the couplings ∝ aλ(Φ ¯Φ + h.c) in the
1191
+ Kähler potential) to satisfy the bound aλ ≳ 0.1688, which for λ ≈ 1 translates into a bound for a in the
1192
+ perturbative regime. Regarding other vital low energy predictions for a volume fixed at V0 ∼ 3.2 × 104
1193
+ which ensures a dS minimum, we fould that the (split)-SUSY scale is around mso ft ∼ V −2
1194
+ 0
1195
+ MP ≈ 2.3×109
1196
+ GeV. As a result, the constraint imposed on the reheating temperature is relaxed in this scenario. For split
1197
+ or high scale SUSY we have g∗(Tr) = 106.75 [21], and the reheating temperature is Tr ∼ 107 GeV .
1198
+ Acknowledgements
1199
+ The work of GKL was supported by the “Hellenic Foundation for Research and Innovation (H.F.R.I.)
1200
+ under the “First Call for H.F.R.I. Research Projects to support Faculty members and Researchers and
1201
+ the procurement of high-cost research equipment grant” (Project Number: 2251)”
1202
+ 16
1203
+
1204
+ References
1205
+ [1] V. Balasubramanian, P. Berglund, J. P. Conlon and F. Quevedo, “Systematics of moduli stabilisation
1206
+ in Calabi-Yau flux compactifications,” JHEP 03 (2005), 007 [arXiv:hep-th/0502058 [hep-th]].
1207
+ [2] I. Antoniadis, Y. Chen and G. K. Leontaris, “Perturbative moduli stabilisation in type IIB/F-theory
1208
+ framework,” Eur. Phys. J. C 78 (2018) no.9, 766 [arXiv:1803.08941 [hep-th]].
1209
+ [3] I. Antoniadis, Y. Chen and G. K. Leontaris, “Logarithmic loop corrections, moduli stabilisation and
1210
+ de Sitter vacua in string theory,” JHEP 01, 149 (2020) [arXiv:1909.10525 [hep-th]].
1211
+ [4] C. P. Burgess, R. Kallosh and F. Quevedo, “De Sitter string vacua from supersymmetric D terms,”
1212
+ JHEP 10, 056 (2003) [arXiv:hep-th/0309187 [hep-th]].
1213
+ [5] I. Antoniadis, O. Lacombe and G. K. Leontaris, “Hybrid inflation and waterfall field in string theory
1214
+ from D7-branes,” JHEP 01 (2022), 011 [arXiv:2109.03243 [hep-th]].
1215
+ [6] Ignatios Antoniadis, Osmin Lacombe and George K. Leontaris, “Type IIB moduli stabilization,
1216
+ inflation and waterfall fields”, International Journal of Modern Physics A, September 2022,
1217
+ [7] S. Gukov, C. Vafa and E. Witten, “CFT’s from Calabi-Yau four folds,” Nucl. Phys. B 584 (2000),
1218
+ 69-108 [arXiv:hep-th/9906070 [hep-th]].
1219
+ [8] G. K. Leontaris and P. Shukla, “Stabilising all Kähler moduli in perturbative LVS,” JHEP 07 (2022),
1220
+ 047 [arXiv:2203.03362 [hep-th]].
1221
+ [9] K. Becker, M. Becker, M. Haack and J. Louis, “Supersymmetry breaking and alpha-prime correc-
1222
+ tions to flux induced potentials,” JHEP 06, 060 (2002) [arXiv:hep-th/0204254 [hep-th]].
1223
+ [10] R. Blumenhagen, J. P. Conlon, S. Krippendorf, S. Moster and F. Quevedo, “SUSY Breaking in
1224
+ Local String/F-Theory Models,” JHEP 09 (2009), 007 [arXiv:0906.3297 [hep-th]].
1225
+ [11] M. Haack, D. Krefl, D. Lust, A. Van Proeyen and M. Zagermann, “Gaugino Condensates and D-
1226
+ terms from D7-branes,” JHEP 01 (2007), 078 [arXiv:hep-th/0609211 [hep-th]].
1227
+ [12] I. Antoniadis, O. Lacombe and G. K. Leontaris, “Inflation near a metastable de Sitter vacuum from
1228
+ moduli stabilisation,” Eur. Phys. J. C 80, no.11, 1014 (2020) [arXiv:2007.10362 [hep-th]].
1229
+ [13] A. Brignole, L. E. Ibanez and C. Munoz, “Towards a theory of soft terms for the supersymmetric
1230
+ Standard Model,” Nucl. Phys. B 422, 125-171 (1994) [erratum: Nucl. Phys. B 436, 747-748 (1995)]
1231
+ [arXiv:hep-ph/9308271 [hep-ph]].
1232
+ [14] J. P. Conlon, S. S. Abdussalam, F. Quevedo and K. Suruliz, “Soft SUSY Breaking Terms for Chiral
1233
+ Matter in IIB String Compactifications,” JHEP 01, 032 (2007) [arXiv:hep-th/0610129 [hep-th]].
1234
+ [15] S.R. Coleman and E.J. Weinberg, “Radiative Corrections as the Origin of Spontaneous Symmetry
1235
+ Breaking,” Phys. Rev. D 7, 1888 (1973) [arXiv:hep-ph/].
1236
+ 17
1237
+
1238
+ [16] Y. Akrami et al. [Planck], “Planck 2018 results. X. Constraints on inflation,” Astron. Astrophys.
1239
+ 641 (2020), A10 [arXiv:1807.06211 [astro-ph.CO]].
1240
+ [17] J. P. Conlon, F. Quevedo and K. Suruliz, “Large-volume flux compactifications: Moduli spectrum
1241
+ and D3/D7 soft supersymmetry breaking,” JHEP 08, 007 (2005) [arXiv:hep-th/0505076 [hep-th]].
1242
+ [18] M. Cicoli, C. P. Burgess and F. Quevedo, “Anisotropic Modulus Stabilisation: Strings at LHC
1243
+ Scales with Micron-sized Extra Dimensions,” JHEP 10, 119 (2011) [arXiv:1105.2107 [hep-th]].
1244
+ [19] G. F. Giudice and A. Masiero, “A Natural Solution to the mu Problem in Supergravity Theories,”
1245
+ Phys. Lett. B 206 (1988), 480-484
1246
+ [20] S. Angus, J. P. Conlon, U. Haisch and A. J. Powell, “Loop corrections to ∆Ne f f in large volume
1247
+ models,” JHEP 12 (2013), 061 [arXiv:1305.4128 [hep-ph]].
1248
+ [21] A. Hebecker, P. Mangat, F. Rompineve and L. T. Witkowski, “Dark Radiation predictions from
1249
+ general Large Volume Scenarios,” JHEP 09, 140 (2014) [arXiv:1403.6810 [hep-ph]].
1250
+ [22] M. Cicoli, K. Sinha and R. Wiley Deal, “The dark universe after reheating in string inflation,” JHEP
1251
+ 12 (2022), 068 [arXiv:2208.01017 [hep-th]].
1252
+ 18
1253
+
E9AyT4oBgHgl3EQfevjq/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
E9AzT4oBgHgl3EQfG_uu/content/tmp_files/2301.01038v1.pdf.txt ADDED
@@ -0,0 +1,1438 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ HETEROGENEOUS DOMAIN ADAPTATION AND EQUIPMENT
2
+ MATCHING: DANN-BASED ALIGNMENT WITH CYCLIC
3
+ SUPERVISION (DBACS)
4
+ A PREPRINT
5
+ Natalie Gentner∗
6
+ Infineon Technologies AG
7
+ Am Campeon 1-15,
8
+ 85579 Neubiberg, Germany
9
+ Gian Antonio Stusto †
10
+ Department of Information Engineering
11
+ University of Padova
12
+ Via Gradenigo 6/B,
13
+ 35131 Padova, Italy
14
+ January 4, 2023
15
+ ABSTRACT
16
+ Process monitoring and control are essential in modern industries for ensuring high quality standards
17
+ and optimizing production performance. These technologies have a long history of application in
18
+ production and have had numerous positive impacts, but also hold great potential when integrated
19
+ with Industry 4.0 and advanced machine learning, particularly deep learning, solutions. However, in
20
+ order to implement these solutions in production and enable widespread adoption, the scalability and
21
+ transferability of deep learning methods have become a focus of research. While transfer learning has
22
+ proven successful in many cases, particularly with computer vision and homogenous data inputs, it
23
+ can be challenging to apply to heterogeneous data.
24
+ Motivated by the need to transfer and standardize established processes to different, non-identical
25
+ environments and by the challenge of adapting to heterogeneous data representations, this work
26
+ introduces the Domain Adaptation Neural Network with Cyclic Supervision (DBACS) approach.
27
+ DBACS addresses the issue of model generalization through domain adaptation, specifically for
28
+ heterogeneous data, and enables the transfer and scalability of deep learning-based statistical control
29
+ methods in a general manner. Additionally, the cyclic interactions between the different parts of
30
+ the model enable DBACS to not only adapt to the domains, but also match them. To the best of
31
+ our knowledge, DBACS is the first deep learning approach to combine adaptation and matching
32
+ for heterogeneous data settings. For comparison, this work also describes and analyzes subspace
33
+ alignment and a multi-view learning method that deals with heterogeneous representations, called
34
+ views, by mapping data into correlated latent feature spaces. Finally, the DBACS method, with its
35
+ ability to adapt and match, is applied to a virtual metrology use case for an etching process run on
36
+ different machine types in semiconductor manufacturing.
37
+ Keywords deep learning · equipment matching · heterogeneous domain adaptation · multi-view learning · semiconductor
38
+ manufacturing · virtual metrology
39
+ 1
40
+ Introduction
41
+ Process control and monitoring are essential elements in any automated production setting. Both have a long history
42
+ of use, particularly in specialized and demanding manufacturing environments. In recent years, the complexity of
43
+ these systems has made them the focus of ongoing research, particularly in the context of Industry 4.0 and due to
44
+ ∗natalie.gentner@infineon.com (Natalie Gentner)
45
+ [email protected] (Gian Antonio Susto)
46
+ arXiv:2301.01038v1 [cs.LG] 3 Jan 2023
47
+
48
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
49
+ (DBACS)
50
+ A PREPRINT
51
+ the increasing usage of sophisticated artificial intelligence-based solutions. While various machine learning and deep
52
+ learning techniques have been applied successfully to a wide range of data types, the current focus is on scalability and
53
+ the generalization of models, particularly for non-standardized environments.
54
+ Despite the potential of machine learning-based technologies to improve automation in production, there are several
55
+ issues that continue to limit their widespread success. These include limited data availability, small data sets, lack of
56
+ standardization, low or inconsistent data quality, and complex, fragmented data. These challenges can make it difficult
57
+ to transfer and generalize models, hindering progress towards higher levels of fab automation and overall digitalization.
58
+ As a result, the focus is now on standardization and scalability, particularly for application-driven research. This is
59
+ important due to the financial and technological investments required for method and model development, as well as the
60
+ need for 24/7 support for critical production infrastructure and maintenance in highly automated environments.
61
+ In non-standardized environments, there are two main approaches to supporting the scalability of methods and model
62
+ transfer, as discussed in the semiconductor literature: (i) matching and (ii) transfer learning, with a focus on domain
63
+ adaptation. The goal of matching is to harmonize environments and processes by using data and expert knowledge, with
64
+ the aim of eliminating differences. Transfer learning, on the other hand, uses a purely data-driven approach to change
65
+ the data representation (but not the data itself or any equipment or process properties) in order to bring corresponding
66
+ data sets closer together, or in the best case, make them indistinguishable.
67
+ However, most machine learning-based transfer learning methods, which are driven by computer vision and naturally
68
+ homogeneous data input, are not designed to handle heterogeneous data. While this is not a common issue when
69
+ modeling tasks use images as the main input, it becomes a significant challenge in semiconductor scenarios where an
70
+ established process must be transferred to a different, non-identical equipment due to availability or utilization. This
71
+ raises the question of how to match non-identical equipment and use knowledge gained from one tool to optimize the
72
+ same process on a different, non-identical tool in order to improve output quality.
73
+ To address the research gap related to heterogeneous domain adaptation (DA), this paper introduces an extended version
74
+ of DBAM called DANN-based Alignment with Cyclic Supervision (DBACS). This method, which was previously
75
+ applied to a homogeneous VM modeling task in previous studies Gentner et al. [2020, 2021], has the ability to map
76
+ unpaired samples in their original feature spaces, enabling the functionality of matching. This capability allows DBACS
77
+ to naturally enrich the existing method.
78
+ This contribution methodically extends the work presented in Gentner et al. [2021] by demonstrating an extension
79
+ suitable for heterogeneous domain adaptation (DA) and matching. The main contributions of the proposed DBACS
80
+ method are as follows:
81
+ • DBACS is able to handle high data complexity caused by heterogeneous systems in production and is applicable
82
+ to various data types, such as time series data;
83
+ • DBACS is able to tackle both supervised and unsupervised adaptation for heterogeneous input data using the
84
+ original input feature spaces;
85
+ • DBACS enables model scaling by allowing the use of a well-trained model for another data set with no
86
+ assumption of the same feature representation, but only identical underlying physical information;
87
+ • DBACS ensures interpretability and comparability of all parts of the model and allows unpaired feature
88
+ matching on top of the adaptation in both directions.
89
+ To evaluate the performance of DBACS in the context of heterogeneous data, the method is compared to selected
90
+ benchmark models, including subspace alignment (SA) using principle component analysis (PCA) with and without
91
+ correlation alignment (CORAL) and canonical correlation analysis (CCA), a method well known in the field of
92
+ multi-view learning.
93
+ Virtual metrology (VM), a representative of standard process control mechanisms, is chosen as a real-world application
94
+ showcase for this study. VM, also known as a soft sensor, is a statistical model that predicts inline wafer properties based
95
+ on process information and sensor measurements. Since its introduction to the semiconductor industry in 2005 Chen
96
+ et al. [2005], VM has a long research history and has benefited greatly from the adoption of new modeling techniques
97
+ driven by Industry 4.0 and the use of artificial intelligence. In addition to being useful for predictive maintenance,
98
+ fault detection and classification, and defect classification, VM is a key mechanism for direct/early fault detection and
99
+ enabling quality improvements by increasing monitoring capacity, control through real-time process corrections in
100
+ combination with a Run-to-Run system, and smart capacity usage by preparing input for smart sampling strategies and
101
+ improved decision making.
102
+ The rest of the paper is organized into six more sections: Section 2 introduces related literature, Section 3 formalizes the
103
+ problem and presents the main model DBACS and selected benchmarks. Section 4 gives details on virtual metrology,
104
+ 2
105
+
106
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
107
+ (DBACS)
108
+ A PREPRINT
109
+ etching process, data, preprocessing and the experimental design, while in Section 5 implementation details including
110
+ hyperparameter and architectures as well as results are reported. Finally in Section 6 DBACS suitability for matching is
111
+ discussed. Section 7 closes with conclusive remarks and future research directions are envisioned.
112
+ 2
113
+ Literature and Background
114
+ In this section we summarize literature related to both relevant methodological approaches as well as application works.
115
+ One of the main issue in adopting ML-based solutions in complex production is the need for scalability. With a large
116
+ number of machines, products, and recipes (e.g., in semiconductor production), it is often infeasible to build ad-hoc
117
+ analytics solutions for each scenario. In this context, scalability in learning frameworks is critical. In this context,
118
+ scalability in learning framework is of fundamental importance; one of this is matching, which has Matching has a
119
+ long history in non-standardized manufacturing environments and can be implemented using both classical methods
120
+ Chouichi et al. [2020] and DL techniques Heng et al. [2021].
121
+ With the rise of Domain Adversarial networks (DANNs) Ganin et al. [2016] and the related concept of domain
122
+ adaptation, a theory made to deal with occurrence of different data distributions for one modeling task, there has
123
+ been a surge in the number of publications focusing on transfer learning for semiconductor applications Kang [2017],
124
+ Tsutsui and Matsuzawa [2019] and Chien et al. [2022a]. Domain adaptation also enables semi-supervised learning,
125
+ as demonstrated in Farahani et al. [2020] and Li et al. [2020]. Unsupervised domain adaptation for semiconductor
126
+ applications has also been explored using DANNs Shim and Kang [2022]. A variety of metrics and losses can be
127
+ used to measure distribution distances in domain adaptation settings, such as maximum mean discrepancy (MMD)
128
+ Azamfar et al. [2020]. For a broader overview of domain adaptation, see Wang and Deng [2018] for a computer
129
+ vision survey and Courty et al. [2017] for an example using optimal transport. Generative models have also been
130
+ widely used in production-related research. For example, Lu et al. [2019] presents a generative adversarial network
131
+ (GAN)-inspired approach using pseudo labeling to address class imbalance in defect inspection in industrial settings.
132
+ While the literature on homogeneous domain adaptation for semiconductor applications is growing, there is still a
133
+ lack of research on heterogeneous domain adaptation for specific semiconductor use cases. However, literature from
134
+ other industry sectors shows promising results for heterogeneous domain adaptation tasks, such as classification of
135
+ heterogeneous information networks Yang et al. [2020], image-to-text transfer Fang et al. [2022], Tsai et al. [2016] and
136
+ the combination of distribution alignment via subspace mapping with pseudo-labeling Alipour and Tahmoresnezhad
137
+ [2022].
138
+ Another approach for handling heterogeneous data distributions is multi-view learning (MVL) Perry et al. [2021]. A
139
+ systematic overview of MVL can be found in Sun [2013] and in Xu et al. [2013]. There are few examples of MVL
140
+ applied to fault detection and performance systems in manufacturing environments, such as Chen et al. [2016] and Yu
141
+ et al. [2021], which use correlation and Canonical Correlation Analysis (CCA) Hardoon et al. [2004] for fault detection
142
+ and performance evaluation. A review of MVL in the deep learning (DL) context is provided by Yan et al. [2021], while
143
+ a range of CCA approaches is discussed in Chapman and Wang [2021].
144
+ Metrology and its relationship to process control have been discussed in the literature, such as in early works such as
145
+ Chen et al. [2005] and Su et al. [2007]. While metrology is essential for quality and control, it can be costly in terms
146
+ of productivity, which has led to the development of numerous virtual metrology (VM) approaches in the literature.
147
+ VM is still an active research topic, with state-of-the-art methods like isolation forest being used in a decision-based
148
+ model framework (e.g., Chien et al. [2022b]). VM tools are often developed based on data from fault detection
149
+ and classification (FDC) systems, which are monitoring software used to overview different types of equipment in
150
+ semiconductor manufacturing. FDC data typically consists of descriptive statistics computed from raw, time-dependent
151
+ physical sensor measurements installed on the equipment, making the VM problem a classic tabular data regression
152
+ task. Given the high dimensionality of FDC data, feature selection is an important step in the context of tabular data
153
+ VM and has been widely discussed in the literature ; see Saeys et al. [2007] for a general review of selection techniques
154
+ and Kang et al. [2016] or Lynn et al. [2009] and Fan et al. [2020] for more sophisticated VM specific preprocessing and
155
+ selection techniques. Other notable regression methods for VM prediction include those presented in Lynn et al. [2009],
156
+ Susto and Beghi [2012] and Park and Kim [2016]. Chen et al. [2020] compares tree-based methods for VM modeling
157
+ to other regression methods and neural networks.
158
+ Another set of approaches in the VM literature aims to solve the regression task using time series data collected
159
+ from equipment sensor data. These approaches include those presented in Park and Kim [2016] and add Susto et al.
160
+ [2015], which introduced the Supervised Aggregative Feature Extraction framework for feature selection. DL-based
161
+ approaches have also been successfully employed for modeling with time series input data, such as in Lee and Kim
162
+ [2020], Maggipinto et al. [2018, 2019] and Lee and Kim [2020].
163
+ 3
164
+
165
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
166
+ (DBACS)
167
+ A PREPRINT
168
+ 3
169
+ Proposed Approaches
170
+ In this section, a general description and mathematical formalization of a modeling task with heterogeneous input are
171
+ given, including the necessary assumptions. We also provide a formal description of the methods and algorithms used
172
+ to solve the task under exam.
173
+ The modeling task at hand is formulated as regression, with the goal of scaling a selected model to make it usable
174
+ for two data sets with different distributions and heterogeneous data representations. Since the input spaces do not
175
+ have a common subspace sufficient for the task, the modeling must be done in a domain-specific manner. To address
176
+ scalability, the goal is to use a trained statistical model for both data sets in parallel while minimizing the prediction
177
+ error and maximizing the accuracy of a dedicated model. To achieve this, we compare methods from the field of domain
178
+ adaptation and multi-view learning.
179
+ First, we mathematically formalize the regression task followed by selected methods. Let fS define a modeling task,
180
+ let a hypothesis class H be a set of all possible modeling functions h ∈ H that are considered for a specific task. Let
181
+ XS ⊂ RnS be defined as the first input space and Y as the output space. The output space Y is defined as Y ⊂ R in
182
+ case of a regression task. A distribution over XS × Y is called source domain. For time series data, let XS ⊂ T × RnS
183
+ where T describes the set of considered points in time and xt
184
+ S ∈ RnS a sample from the source feature space taken
185
+ at a fixed point in time t ∈ T . A learning algorithm is provided with a source data set S drawn i.i.d. from the source
186
+ domain DS with XS × YS, XS ⊂ X, YS ⊂ Y . In the SSL setting, it is distinguished between labeled and unlabeled
187
+ data and define S := SL ∪ SU where SU stands for the unlabeled source sample subset and SL for the labeled one.
188
+ Without loss of generality for UDA and SSL, SU = ∅ sine the source domain is assumed to be labeled. Hence
189
+ S = {XS, YS} = {XSL, YSL} = {xi
190
+ S, yi
191
+ S}nS
192
+ i=1 ∼ {DS}ns,
193
+ (1)
194
+ with nS being the number of drawn samples (all labeled) and therefore XS = XSL ⊂ RnS, YS = YSL ⊂ Y .
195
+ A learning algorithm is provided with a second set T drawn i.i.d. from the target domain DT with different data
196
+ distribution, representation and feature space. Hence, let T = TL ∪ TU be the second called target data set T drawn
197
+ i.i.d. from a target domain DT with a distribution over XT × YT , XT ⊂ RnT , YT ⊂ Y , and consisting of unlabeled
198
+ TU and/or labeled TL samples.
199
+ TL = {XT L, YT L} = {xj
200
+ T , yj
201
+ T }nT −l
202
+ j=1
203
+ ∼ {DT }nt−l;
204
+ (2)
205
+ TU = {XT U} = {xj
206
+ T }nT
207
+ j=nT −l+1 ∼ {DX
208
+ T }nt;
209
+ (3)
210
+ with nT being the number of drawn target samples, therefore XT L ⊂ XT ⊂ RnT , YT L ⊂ YT ⊂ Y and XT U ⊂ XT ⊂
211
+ RnT . For time series data, let XT ⊂ T × RnT where T describes the set of considered points in time and xt
212
+ T ∈ RnT a
213
+ sample from the target feature space taken at a fixed point in time t ∈ T .
214
+ 3.1
215
+ DANN-based Alignment with Cyclic Supervision (DBACS)
216
+ In this work, we present a new framework, called DANN-based Alignment with Cyclic Supervision (DBACS). The
217
+ DBACS approach (illustrated in Figure 1) is an extented version of DBAM Gentner et al. [2021] and is designed for
218
+ binary heterogeneous domain adaptation using source and target domain. DBACS consists of five main parts:
219
+ • the baseline or reference prediction model P;
220
+ • an encoder/alignment model called aligner F used to map the target domain to the source domain (the output
221
+ of the aligner is called aligned);
222
+ • F is connected to a second encoder/alignment model aligner G that maps the source domain to the target
223
+ domain. By combining both aligners, it is possible to introduce cycle-consistency by comparing source samples
224
+ with its cycled sample and target samples with its cycled samples;
225
+ • a domain discriminator A for classification of source domain versus aligned target domain;
226
+ • Adversarial training in both directions is enabled by adding a second domain discriminator (called discriminator
227
+ B) for target versus aligned source comparison.
228
+ The various components of the DBACS architecture are discussed in the following.
229
+ 4
230
+
231
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
232
+ (DBACS)
233
+ A PREPRINT
234
+ Figure 1: Graphical representation of the proposed DBACS system exploiting input data from two non-identical
235
+ domains. The arrows represent the data flows. An autoencoder shaped aligner can be used for noise reduction especially
236
+ for homogeneous DA but is not mandatory.
237
+ Prediction loss
238
+ Let hP : XS → Y be a dedicated statistical model trained on a data set S, let S be a labeled source
239
+ sample set drawn i.i.d. from a domain DS with nS = |S| being the number of drawn samples. The neural network
240
+ representation is parameterized by θP and P(xS, θP ) where P is the model function with parameters θP that outputs
241
+ the prediction for xS ∈ XS. The loss LP used for training and minimization is defined as:
242
+ min
243
+ hP ∈H LP (XS) = min
244
+ hP ∈H LDS(hP (XS)) = min
245
+ θP LDS(XS, θP ) = min
246
+ θP L(x,y)∈S (P (x, θP ) , y) .
247
+ (4)
248
+ where L is selected based on the modeling task at hand; for VM regression task we choose mean absolute error (MAE).
249
+ Cycle consistency loss
250
+ Let hF : XT → XS be a statistical model function aligning target to source and F(xT , θF )
251
+ be its parameterized representation where F is the model function with parameters θF that outputs the prediction
252
+ for xT ∈ XT . Let hG : XS → XT be a statistical model function aligning source to target and G(xS, θG) be its
253
+ parameterized representation where G is the model function with parameters θG that outputs the prediction for xS ∈ XS.
254
+ Let xS ∼ DS the data distribution according to DS and xT ∼ DT according to DT . Then, the cycle-consistency loss
255
+ is defined as:
256
+ LcycleS(XS) := LG,F,DS(XS) = LxS∼DS (F(G (xS, θG), θF )) = LxS∼DS(F(G(xS)), xS);
257
+ (5)
258
+ LcycleT (XT ) := LF,G,DT (XT ) = LxT ∼DT (G(F (xT , θF ), θG)) = LxT ∼DT (G(F(xT )), xT ).
259
+ (6)
260
+ To give an example we follow the description in Zhu et al. [2017] where the L1 norm is used as cycle loss function:
261
+ LcycleS(XS) = LxS∼DS(F(G(xS)), xS) = ExS∼DS [∥F(G(xS)) − xS∥1]
262
+ (7)
263
+ LcycleT (XT ) = LxT ∼DT (G(F(xT )), xT ) = ExT ∼DT [∥G(F(xT )) − xT ∥1]
264
+ (8)
265
+ In short, the cycle consistency loss is defined as
266
+ Lcyc(F, G, XS, XT ) = LcycleS(XS) + LcycleT (XT ).
267
+ (9)
268
+ Here, the optimization goal is to reproduce a bijective mapping so that each xS ∈ XS is mapped to XT and back to XS
269
+ with F(G(xS)) ≈ xS. The same goes for xT ∈ XT with G(F(xT )) ≈ xT .
270
+ 5
271
+
272
+ source
273
+ Aligner F
274
+ Classifierf
275
+ aligned
276
+ target
277
+ target
278
+ IC
279
+ Discriminator A
280
+ aligned
281
+ source
282
+ source
283
+ Aligner G
284
+ DiscriminatorBHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
285
+ (DBACS)
286
+ A PREPRINT
287
+ Adversarial loss
288
+ Let hDA : XS → I, hDB : XT → I with I = [0, 1] be two statistical model functions describing
289
+ respectively the distance of source versus aligned target and target versus aligned source. Let hDA be parameterized by
290
+ θDA and let DA(xS, θDA) be the parameter representation of discriminator A where DA is the model function with
291
+ parameters θDA that outputs the prediction for xS ∈ XS. Let hDB be parameterized by θDB and let DB(xT , θDB) be
292
+ the parameter representation of discriminator B where DB is the model function with parameters θDB that outputs the
293
+ prediction for xT ∈ XT . Then the adversarial loss first for source LadvS and second for target LadvT is defined based
294
+ on a selected loss function L:
295
+ LadvS(XS, XT ) := LDA,DS(XS) − LDA,DT (XT )
296
+ = LxS∼DX
297
+ S (hDA (xS)) − LxT ∼DX
298
+ T (hDA (hF (xT )))
299
+ = LxS∼DX
300
+ S (DA (xS, θDA)) − LxT ∼DX
301
+ T (DA (F(xT , θF ), θDA))
302
+ (10)
303
+ LadvT (XS, XT ) := LDB,DT (XT ) − LDB,DS(XS)
304
+ = LxT ∼DX
305
+ T (hDB (xT )) − LxS∼DX
306
+ S (hDB (hG(xS)))
307
+ = LxT ∈DX
308
+ T (DB (xT , θDB)) − LxS∼DX
309
+ S (DB (G(xS, θG), θDB))
310
+ (11)
311
+ The adversarial loss is applied to the output of each discriminator and enables an adversarial training approach (see
312
+ Gentner et al. [2021], Gulrajani et al. [2017]). For a regression modeling task: Let I ⊂ R or I = R and the discriminator
313
+ a regression model with linear output activation function. Then the adversarial loss is defined as
314
+ LadvS(XS, XT ) = ExS∼DS [DA (xS, θDA)] − ExT ∼DT [(DA(F(xT , θF ), θDA))],
315
+ (12)
316
+ LadvT (XS, XT ) = ExT ∼DT [DB (xT , θDB)] − ExS∼DS[(DB(G(xS, θG), θDB))],
317
+ (13)
318
+ where E defines the expected value and the loss is an approximation of the Wasserstein distance of two sampled
319
+ distributions, for details see Gulrajani et al. [2017].
320
+ Remark
321
+ It is recommended by Zhu et al. [2017] based on Taigman et al. [2017] to add one more additional loss term
322
+ namely the identity loss. The idea is that if almost identical samples in the other domain occur, the aligner should per-
323
+ form close to an identity function. Since source and target are heterogeneous in our case we do not apply this kind of loss.
324
+ The training itself happens in an adversarial setting with a two-player game approach. The adversarial training routine
325
+ includes parallel training of both aligner and both discriminator using adversarial loss plus inclusion of the additional
326
+ loss terms. For training, two fixed training data sets S and T (training samples are drawn i.i.d from DS and DT ) are
327
+ used. During the aligners training phase, the adversarial loss is minimized, during discriminator training phase it is
328
+ maximized (or its negative value minimized).:
329
+ • The first competitor of the adversarial training is the discriminator DA trained to distinguish between source
330
+ and aligned target data meaning optimizing the adversarial source loss. In parallel the discriminator DB is
331
+ trained to distinguish between target and aligned source data also meaning optimizing the adversarial target
332
+ loss. The optimization of the discriminator A and discriminator B loss LDtotal is defined as
333
+ max
334
+ θDA,θDB
335
+ LDtotal(XS, XT ) = max
336
+ θDA
337
+ LadvS(XS, XT ) + max
338
+ θDB
339
+ LadvT (XS, XT )
340
+ = max
341
+ θDA
342
+ LDA,DS(XS, θDA) − LDA,DT (F(XT , θF ), θDA)
343
+ + max
344
+ θDB
345
+ LDB,DT (XT , θDB) − LDB,DS(G(XS, θG), θDB)
346
+ = max
347
+ θDA
348
+ LxS∈S (DA (xS, θDA)) − LxT ∈T (DA (F(xT , θF ), θDA))
349
+ + max
350
+ θDB
351
+ LxT ∈T (DB (xT , θDB)) − LxS∈S (DB (G(xS, θG), θDB))
352
+ (14)
353
+ • The second competitor in the adversarial training is the aligner cycle. We define LAtotal using the adversarial
354
+ loss for both aligners and the cycle consistency loss. In case of labeled target data the aligner F is also updated
355
+ in order to optimize prediction loss LP for aligned target data. The adversarial part of the aligner losses is set
356
+ in opposite direction compared to the ones used to update the two discriminator:
357
+ min
358
+ θF ,θG LAtotal(XS, XT ) = min
359
+ θF ,θG λadvSLadvS (XS, XT ) + λP LP (F(XT )) + λadvT LadvT (XS, XT )
360
+ = min
361
+ θF ,θG[−LxT ∈T (DA (F(xT , θF ), θDA))
362
+ + λP L(xT ,y)∈T L(P (F(xT , θF ), θP )) − LxS∈S (DB (G(xS, θG), θDB))]
363
+ (15)
364
+ 6
365
+
366
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
367
+ (DBACS)
368
+ A PREPRINT
369
+ where λ(·) represents the weight assigned to each corresponding loss term. For λP = 0 the training happens in
370
+ an unsupervised setting where no target labels are available. A gradient penalty regularization term is added
371
+ when updating both aligners following the recommendations of Gulrajani et al. [2017].
372
+ 3.2
373
+ Subspace Alignment using Principle Component Analysis
374
+ Subspace Alignment (SA), presented by Fernando et al. [2013], linearly aligns subspaces generated by Principle
375
+ Component Analysis (PCA).
376
+ SA was introduced as unsupervised DA method for classification task. Overall benefits of SA lies in the simplicity and
377
+ in the speed of the method while still presenting high accuracy. For heterogeneous domain adaptation, we slightly adapt
378
+ here the SA approach by first applying PCA separately to source and target and then align the corresponding subspaces
379
+ using CORrelation ALignment (CORAL). CORAL by Sun et al. [2016] is an unsupervised domain adaptation method
380
+ that aligns second order statistics of source and target domain.
381
+ PCA
382
+ Principle Component Analysis (PCA) is a linear transformation of a vector space with respect to its points/vectors.
383
+ The projection is created in a way that highest occurring variance is represented by the first latent dimension (the
384
+ so-called first principle component), the second highest variance by the second principle component and so on. Let X
385
+ be a vector space, let ψ : X → X′ define the nonlinear principle component transformation to be computed. Then PCA
386
+ is formalized via
387
+ x′ = ψ(x) = ΓT x
388
+ (16)
389
+ where x′ ∈ X′ describes the transformed input, Γ consists of the eigenvectors and is computed via Λ = ΓT ΣΓ where
390
+ Λ is a diagonal matrix defined by the eigenvalues and Σ is the covariance matrix. PCA is applied to XS and XT
391
+ accordingly resulting in S′ and T ′ as projected input sets. Since PCA is a very well-known method, we refer to Jolliffe
392
+ [2010] for a more detailed description.
393
+ CORAL
394
+ Let S′ = {x′
395
+ Si}, T ′ = {x′
396
+ Ti} be the PCA projected input sets from the source and target domains. Let
397
+ Υ : X′
398
+ S → X′
399
+ T with Υ(X′
400
+ S) = X′
401
+ S ∗ A describe the feature transformation of the source space to the target space. Let
402
+ µS′, µT ′ be the feature mean of S′, T ′ and CS′, CT ′ the corresponding covariance matrices. Then, the distance between
403
+ the covariance matrices (assuming normalized features with zero mean) is minimized by:
404
+ min
405
+ A
406
+ ��C ˆ
407
+ S′ − CT ′��2
408
+ F = min
409
+ A
410
+ ��AT CS′A − C′
411
+ T
412
+ ��2
413
+ F
414
+ where A is the matrix used in linear transformation that is applied to the source, C ˆ
415
+ S′ describes the covariance of the
416
+ transformed source features S′∗A and ∥·∥2
417
+ F denoting the squared Frobenius norm selected as distance metric. It is
418
+ called CORAL loss. In order to solve this equation, we follow Algorithm 1 in Sun et al. [2016] and compute first the
419
+ covariance matrices followed by whitening the source and then recoloring it with the target covariance.
420
+ 3.3
421
+ Canonical Correlation Analysis (CCA)
422
+ Canonical Correlation Analysis (CCA) defines linear transformation for each set of variables such that after the
423
+ transformation the projected features are maximal correlated. A summary of the descriptions is taken from Hardoon
424
+ et al. [2004].
425
+ Let S = {xS}, T = {xT } be two sample sets wanted to be projected into direction wS, wT . Let ΦS : XS → X′
426
+ S,
427
+ ΦT : XT → X′
428
+ T define the linear transformation for each domain. Then:
429
+ ΦS(S) = S
430
+ ′ = SxS,wS = ⟨wS, xS⟩,
431
+ ΦT (T) = T
432
+ ′ = TxT ,wT = ⟨wT , xT ⟩.
433
+ (17)
434
+ Specifically, it is looked for wS, wT such that the correlation between the projected vectors is maximised, hence:
435
+ ρ = max
436
+ wS,wT corr (SxS,wS, TxT ,wT ) = max
437
+ wS,wT
438
+ ⟨SxS,wS, TxT ,wT ⟩
439
+ ∥SxS,wS∥ · ∥TxT ,wT ∥.
440
+ (18)
441
+ The previous equation can be reformulated as
442
+ ρ = max
443
+ wS,wT
444
+ w′
445
+ sE[xSx′
446
+ T ]wT
447
+
448
+ w′
449
+ SE[xSx′
450
+ S]wSw′
451
+ T E[xT x′
452
+ T ]wT
453
+ (19)
454
+ 7
455
+
456
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
457
+ (DBACS)
458
+ A PREPRINT
459
+ with E denoting the discrete empirical expectation, ′ denotes the transpose of a vector or a matrix and properties of the
460
+ inner product are used. Using the covariance matrix with
461
+ C = C(xS, xT ) = E[xSxT ] =
462
+ �CxSxS
463
+ CxT xS
464
+ CxSxT
465
+ CxT xT
466
+
467
+ (20)
468
+ where C is a block matrix with the within-covariance CxSxS, CxT xT and between-covariance matrices CxSxT , CxT xS
469
+ as entries. Finally the optimization problem can be formulated in the following way:
470
+ ρ = max
471
+ wS,wT
472
+ w′
473
+ sCxSxT wT
474
+
475
+ w′
476
+ SCxSxSwSw′
477
+ T CxT xT wT
478
+ (21)
479
+ By checking that rescaling of wS, wT does not change the problem, it can be maximized subject to
480
+ w′
481
+ SCxSxSwS = 1,
482
+ w′
483
+ T CxT xT wT = 1.
484
+ (22)
485
+ The formulation of the dual problem is used, hence computing the corresponding Lagrangian L leads to
486
+ L(λ, wS, wT ) = w′
487
+ sCxSxT wT − λS
488
+ 2 (w′
489
+ SCxSxSwS − 1) − λT
490
+ 2 (w′
491
+ T CxT xT wT − 1).
492
+ (23)
493
+ The partial derivatives in the direction of wS, wT are:
494
+ ∂L
495
+ wS
496
+ = CxSxT wT − λSCxSxSwS = 0,
497
+ (24)
498
+ ∂L
499
+ wT
500
+ = CxT xSwS − λT CxT xT wT = 0.
501
+ (25)
502
+ Multiplying (25) with wS∗ and multiplying (24) with wT ∗ and subtracting the one from the other, define λ = λS = λT ,
503
+ assuming CxT xT is invertible, rearrange the equation and use the partial derivative leaves to
504
+ CxSxT C−1
505
+ xT xT CxT xSwS = λ2CxSxSwS
506
+ (26)
507
+ which is equivalent to a generalised eigenproblem of the form Ax = λBx. Using Cholesky decomposition, the previous
508
+ can be even more simplified to a symmetric eigenvalue problem Ax = λx. For visualization see Figure 2.
509
+ Figure 2: Visualization of Canonical Correlation Analysis (CCA). The canonical components of source and target
510
+ are a weighted combination of corresponding input features. The correlation of the canonical components within the
511
+ red box is maximized. Similarly to PCA, the number of canonical components can be tuned.
512
+ 4
513
+ Case Study: Dataset Description and Experimental Settings
514
+ 4.1
515
+ Semiconductor Manufacturing: Etching process and Virtual Metrology
516
+ Wafers are the basis for every semiconductor manufacturing process. A wafer consists of pure (99.9999%) silicon, has a
517
+ disc shape and houses several thousand chips (the end product) on average. The specific technology structure of a chip
518
+ is built up layer by layer on the wafer during a couple of hundred process steps. Each wafer is considered a separate
519
+ sample in this work.
520
+ 8
521
+
522
+ Source
523
+ TargetHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
524
+ (DBACS)
525
+ A PREPRINT
526
+ Etching is a common process in semiconductor manufacturing and is frequently studied and discussed in semiconductor
527
+ research and literature, along with chemical vapor deposition and implantation. The etching process removes material
528
+ from a surface or transfers a structure created during the lithography step to the layer below Hilleringmann [1996],
529
+ May and Spanos [2006]. Reactive-ion etching uses a high-frequency alternating energy field applied to the cathode on
530
+ which the wafer is placed. Positively charged ions in the plasma are accelerated towards the wafer and collide with its
531
+ surface at high kinetic energy, causing atoms from the wafer’s surface to be dislodged from the crystal lattice, resulting
532
+ in partial physical etching. In addition, a partial chemical reaction occurs due to the highly reactive free radicals.
533
+ The plasma etching process includes up to ten sub-steps during which input sensors must be adjusted to the target values
534
+ specified in a recipe. Sensors that measure properties such as chamber pressure, applied high frequency voltage, gas
535
+ type, gas flow, and wafer temperature, as well as electrode temperature and bias, play a crucial role in achieving the
536
+ desired wafer properties. End point detection, or the etching time, is one of the most critical aspects of the process, as it
537
+ is highly sensitive and closely related to other variables such as gases, pressure, current, and temperature. Incorrect
538
+ etching times, inadequate end point detection, uncontrolled reactions, and interference in the chamber can negatively
539
+ affect the layer thickness and overall quality and functionality of the wafer.
540
+ Process monitoring and control are essential for reliable, standardized, and repeatable production processes that produce
541
+ high-quality products. In this work, we focus on a process control method called virtual metrology (VM) and analyze it
542
+ through a case study involving an etching process. In general, control quantities are typically measured in metrology
543
+ stations or tools after the process is completed, using multiple measurements on a sample of wafers. Traditional
544
+ metrology is a univariate or multivariate control system that uses control charts with defined upper and lower control
545
+ limits to monitor process performance. However, due to cost and time constraints, not all wafers can be physically
546
+ measured after the process.
547
+ Virtual metrology (VM) or soft sensing modules utilize data collected by process equipment to model the relationship
548
+ between wafer properties and process input and feedback sensor measurements. VM techniques allow for the inclusion
549
+ of non-measured but predicted control measures in order to enhance analysis. VM technologies offer several benefits,
550
+ including:
551
+ • costs and time savings due to reduced mandatory measurements;
552
+ • quality assurance through enhanced and comprehensive monitoring;
553
+ • real-time control, assessment and process updates in conjunction with Run-to-Run controllers Su et al. [2007];
554
+ • data-driven process optimization including fault detection, root cause analysis and improved sample selection
555
+ Feng et al. [2019].
556
+ 4.2
557
+ Data Preparation
558
+ The data used in this work is collected from two different etching equipment types from the same vendor. The data set
559
+ is restricted to a specific etching recipe that was transferred from one equipment to the other and now runs regularly
560
+ on both equipment. Raw sensor measurements in form of time series data and their corresponding metrology/inline
561
+ measurements over a period of 3 years are considered.
562
+ • The equipment type 1 with 35 activated sensors - older equipment type hence higher number of samples (∼10
563
+ 000) and original tool to run the specific recipe- is selected as source;
564
+ • the equipment type 2 with 55 activated sensors - newer equipment type with ∼6000 data samples - is defined
565
+ as target.
566
+ The following preprocessing steps were applied to the collected time series sensor data, with each equipment treated
567
+ separately due to its heterogeneous nature:
568
+ 1. removal of constant features;
569
+ 2. removal of features that show small fluctuation that can be detect as noise (variations smaller than 0.01) and a
570
+ constant behavior underneath the noise;
571
+ 3. removal of samples showing label outliers based on interquantile range;
572
+ 4. removal of samples where the length of the time series lies below or above 25 percent respective 75 percent
573
+ quantile of time series length;
574
+ 5. equal-distributed upsampling of timestamps and feature values to generate time series with equal length.
575
+ 33 features for equipment type 1 respective 49 for equipment type 2 are finally selected as input features. No significant
576
+ label shift is detected, see Figure 3.
577
+ 9
578
+
579
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
580
+ (DBACS)
581
+ A PREPRINT
582
+ Figure 3: Boxplot of normalized layer thickness from two equipment. Boxplot graphs of normalized metrol-
583
+ ogy/inline measurements from both equipment types considered in the analysis.
584
+ 4.3
585
+ Experimental Design
586
+ Virtual metrology is modeled as prediction task with sensor data as input mapped to a single continuous metrology
587
+ value. Due to the heterogeneous nature of the data representation from equipment type 1 and 2, no common model can
588
+ be used without additional transfer. We present the analysis in the following order:
589
+ 1. DBACS is trained and tested as domain adaptation model using autoencoder to align the original input features
590
+ to enable usage of a dedicated pretrained model;
591
+ 2. PCA and CCA are selected as benchmark models; for the heterogeneous VM task the alignment happens by
592
+ creating a common (latent) feature space that is then used to train a common model. CORAL on the latent
593
+ features is tested as final combination for both PCA and CCA.
594
+ For training, distribution comparison and alignment evaluation the following metrics are considered:
595
+ • Mean absolute error (MAE) is used as performance based loss; Adam optimizer is applied for training;
596
+ • To test inner versus outer domain distance - the divergence between data selected from source and data selected
597
+ from target domain - we use Frechet inception distance (FID);
598
+ • 5-fold cross validation is applied, hence split both data sets into 5 subsets each and using 4 merged sets as
599
+ train and 1 as test set per fold. Architectures of all models stay fixed for all 5 folds;
600
+ • pearson correlation of features is tested after alignment.
601
+ For the correlation analysis we use the function implementation available in python module numpy Harris et al. [2020]
602
+ and for PCA and CCA we use existing function implementation in the python module scikit-learn Pedregosa et al.
603
+ [2011]. For CORAL we use the implementations from the python module transfertools Vincent et al. [2020]. DBACS
604
+ is trained using the described adversarial training approach. PCA and CCA expect a two dimensional input, hence
605
+ we keep the original data and reshape the 3 dimensional sample into a two dimensional one by treating each value at
606
+ each time step as separate sample. The selected number of latent features are based on the variation coverage of both
607
+ domains. In the following, model details and hyperparameters choices are reported.
608
+ DBCAS
609
+ 1DCNN is chosen since it is simple but proven to be well performing for time series data Gentner et al.
610
+ [2021].
611
+ • The predictor consists of 3 convolutional layers (dimension 32, 16, 8 and kernel size 53, 33 and 33), followed
612
+ by one max pooling layer, a flattening layer and two dense layers (dimension 16 and 1, Leaky ReLU activation
613
+ except sigmoid output).
614
+ • The domain discriminators both have the same architecture besides the respective input shape: 3 convolutional
615
+ layers (dimension 24, 16 and 8, kernel size 17), causal padding and leaky ReLU activation function, max
616
+ 10
617
+
618
+ Normalized metrology measurementsforboth equipment types
619
+ 1.0
620
+ 0.8
621
+ 0.6
622
+ 0.4
623
+ 0.2
624
+ 0.0
625
+ equipment type 1 - train data
626
+ equipment type 1 -test data
627
+ equipment type 2 - train data
628
+ equipment type 2 -test dataHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
629
+ (DBACS)
630
+ A PREPRINT
631
+ pooling of size 4 and 2 times 2, followed by a flattening layer and 6 dense layers (dimension 512, 256, 128, 64,
632
+ 32, 1, Leaky ReLU activation and linear output).
633
+ • Both aligners consist of 6 convolutional layers, first 5 followed by Leaky ReLU activation function, the final
634
+ output is kept linear. The aligner that maps target domain to source domain has filter size 48, 42, 36, 32, 32
635
+ and final filter size is set to number of features of the source domain; kernel size is 37, 37, 37, 37, 57 and 7.
636
+ Upsampling with size 3 and 2 is done after 4th and 5th layer block. The aligner that maps source domain to
637
+ target domain has filter size 32, 36, 42, 46, 48 and final filter size is set to number of features of the target
638
+ domain; kernel size is also 37, 37, 37, 37, 57 and 7. Upsampling with size 3 and 2 is also done after 4th and
639
+ 5th layer block.
640
+ For an improved initialization both aligners are pretrained separately using SSIM loss Wang et al. [2004]: therefore, we
641
+ select sample pairs from source and target based on closest label value.
642
+ PCA and CORAL
643
+ The 3 dimensional input is reshaped into a two dimensional one by treating each value at each
644
+ time step as separate sample. For each equipment type, we select the first 10 principal components in order to cover
645
+ around 95% variance and to create same dimensional input space. For equipment type 1 we cover 97% of the variance
646
+ and for equipment type 2 we cover 94%. 1DCNN prediction model with reduced number of features based on PCA
647
+ (reshaped back to 3 dimensions) of source and target domain is used as prediction model.
648
+ CCA
649
+ 27 canonical components (CCs) are kept since it shows the most stable results in our experiments. The original
650
+ data is reshaped from 3 dimensional input into a two dimensional one by treating each value at each time step as separate
651
+ sample. 1DCNN prediction model with reduced number of features based on CCA (reshaped back to 3 dimensions) of
652
+ source and target domain is used as prediction model.
653
+ 5
654
+ Experimental Results
655
+ Table 1 shows the average 5 fold CV results for DBACS compared to the dedicated lower bound values meaning perfor-
656
+ mance errors for dedicated models trained only on source and only on target data. The numbers given in Table 1 confirm
657
+ DBACS MAE for source and aligned target
658
+ Source domain
659
+ Target domain
660
+ Train
661
+ Test
662
+ Train
663
+ Test
664
+ Lower Bound
665
+ 0.084
666
+ 0.094
667
+ 0.102
668
+ 0.128
669
+ DBACS
670
+ 0.084
671
+ 0.094
672
+ 0.102
673
+ 0.131
674
+ Table 1: DBACS performance errors for source and aligned target. Source and aligned target data DBACS training
675
+ and test scores average over 5 fold CV. Target data is mapped to source domain using trained aligner F from DBACS
676
+ and evaluated after the mapping using the VM prediction model trained on source. Lower bound prediction models are
677
+ dedicated meaning trained only on source train data and evaluated only on source test data respective trained only on
678
+ target train data and evaluated only on target test data.
679
+ the visual convergence seen in the t-SNE plot in Figure 4. This is supported by frechet inception distance (FID) 0.01 for
680
+ outer domain distance after alignment compared to FID inner domain distance close to 0 for equipment type 1 as well as
681
+ for equipment type 2. Next, Figure 5 shows true versus predicted values of different alignment states - randomly initial-
682
+ ized aligner, after the pretraining of the aligner and after DA training with DBACS). Again, the visualization supports the
683
+ results presented in Table 1: Enabeling usage of a dedicated source model to mapped target data for high accuracy pre-
684
+ dictions. A visualization of both aligners output is presented in Figure 6 and compared to original domain sensor signals.
685
+ Next, we present results for PCA analysis in Table 2. Optional DA with CORAL on top shows slightly improved results
686
+ if model is trained on data from both domains. The FID score for outer domain distance after PCA + CORAL on the
687
+ latent features generated by PCA is significant lower than before with 0.0001 for train and 0.001 for test. Only the first
688
+ two principal components show a correlation higher than r = 0.5.
689
+ For CCA, the performance is presented in Table 3. Optional DA with CORAL on top shows improved results since
690
+ model training for both domains is enabled and can be executed using CCs. The FID score for outer domain distance
691
+ after CCA + CORAL on the latent features generated by CCA is again significant lower than before with very close to 0
692
+ 11
693
+
694
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
695
+ (DBACS)
696
+ A PREPRINT
697
+ Figure 4: T-SNE visualization before and after alignment with DBACS. Graphical t-SNE representation of source
698
+ and target domain in different stages of the alignment process: (a) shows features mapped by a randomly initialized
699
+ aligner, (b) after the pretraining of the aligner and (c) after DA with DBACS is done. The source is colored in blue
700
+ and contains data from equipment type 1, the target is colored red and contains data from the equipment type 2. The
701
+ axes are dimensionless. The effect of the adaptation of the input features after DBACS is applied during training. The
702
+ adaptation brings the distributions of the target domain closer and finally target overlaps source domain.
703
+ Figure 5: True versus predicted scatter plot for DBACS before and after alignment. The graph shows predictions of
704
+ aligned target data after mapped to source space by a randomly initialized aligner, after the pretraining of the aligner
705
+ and predictions of aligned target data after DA training with DBACS is done. Only test data is presented, the test source
706
+ data is colored in blue, the the aligned target test data is colored in red.
707
+ for train and test. The first five CCs have a correlation higher than r = 0.5.
708
+ 6
709
+ Equipment Matching Experiments
710
+ Having with DBACS a methodology that allows parallel training and transfer in both directions - source to target
711
+ but also target to source - mis- or abnormal behavior detected for aligned data can be compared to normal as well as
712
+ abnormal data from source. These kind of comparisons enables equipment matching for nonidentical equipment with
713
+ heterogeneous data representations.
714
+ 12
715
+
716
+ 20
717
+ 0
718
+ -20
719
+ -20
720
+ 0
721
+ 20
722
+ 4020
723
+ 10
724
+ 0
725
+ -10
726
+ 20
727
+ -30
728
+ -20
729
+ -10
730
+ 0
731
+ 10
732
+ 20
733
+ 3040
734
+ 20
735
+ 0
736
+ -20
737
+ 20
738
+ 20sourcetestset
739
+ alignedtargettest
740
+ 0.8
741
+ 0.6
742
+ value
743
+ 0.4
744
+ 0.0
745
+ 0.0
746
+ 0.2
747
+ 0.4
748
+ 0.6
749
+ 0.8
750
+ 1.0
751
+ true values1.0
752
+ source test set
753
+ aligned target test set
754
+ 0.8
755
+ 0.6
756
+ edicted
757
+ 0.4
758
+ 0.2
759
+ 0.0
760
+ 0.0
761
+ 0.2
762
+ 0.4
763
+ 0.6
764
+ 0.8
765
+ 1.0
766
+ true values1.0
767
+ sourcetestset
768
+ aligned target test set
769
+ 0.8
770
+ E0.6
771
+ 0.2
772
+ 0.0
773
+ 0.0
774
+ 0.2
775
+ 0.4
776
+ 0.6
777
+ 0.8
778
+ 1.0
779
+ true valuesHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
780
+ (DBACS)
781
+ A PREPRINT
782
+ Figure 6: Aligner F and G visualizations of 2 times 3 raw sensor measurements of both equipment types before and
783
+ after the corresponding alignment. The graph shows results for trained aligner F and mapped sensor signals from
784
+ target to source domain in red and compares it to corresponding original source sensor signals plotted in black. It also
785
+ shows results from trained aligner G and mapped sensor signals from source to target domain in blue and compares it to
786
+ corresponding original target sensor signals plotted in black. A good alignment is visible as well. The x axis shows the
787
+ timestamps of the sensor signals, y axis the sensor measurement values.
788
+ VM prediction model performance for PCA based principle components
789
+ Source domain
790
+ Target domain
791
+ Train MAE
792
+ Test MAE
793
+ Train MAE
794
+ Test MAE
795
+ PCA(source)
796
+ 0.09
797
+ 0.09
798
+ 0.32
799
+ 0.33
800
+ PCA(target)
801
+ 0.47
802
+ 0.47
803
+ 0.12
804
+ 0.13
805
+ PCA(both)
806
+ 0.10
807
+ 0.14
808
+ 0.09
809
+ 0.14
810
+ PCA+CORAL(both)
811
+ 0.08
812
+ 0.09
813
+ 0.12
814
+ 0.13
815
+ Table 2: VM prediction model performance for PCA based principle components. Results for VM prediction
816
+ models that are trained with reduced number of latent features that are created via PCA.
817
+ First, we compare source signals with its cycled signals on the signal shape itself as well target signals with its cycled
818
+ target signals. Examples from both are presented in Figure 7.
819
+ Next, we check differences within source domain of samples having a high, middle and low prediction value. This
820
+ helps to better understand univariate feature behavior for source. The middle prediction is the preferred and targeted
821
+ one. Figure 8 shows euclidean barycenter averages of tree example signals from source domain for low, middle and
822
+ high label values. Sensor offsets for deviating metrology measurements are clearly visible for some of the signals.
823
+ For final equipment matching, we compare preferred shape of signals from the source domain meaning signals
824
+ with metrology measurements close to target 0.5 (see Figure 8 to corresponding as well as deviating signals from
825
+ target domain. Therefore, we use the DBACS to map selected source signals into the target domain. Different
826
+ sensors measurements and their euclidean barycenter averages of groups according to low, middle and high metrology
827
+ measurements are shown in Figure 9 and compared to mapped sensor signals (source to target) corresponding to the
828
+ middle meaning preferred metrology group in the source domain.
829
+ 13
830
+
831
+ 1.0
832
+ 1.0
833
+ 1.0
834
+ source-domain
835
+ target domain aligned
836
+ 0.8
837
+ 0.8
838
+ 0.6
839
+ 0.6
840
+ 0.4
841
+ 0.4
842
+ 0.4
843
+ 0.2
844
+ 0.2
845
+ 0.0
846
+ 0.0
847
+ 0.0
848
+ 0
849
+ 200
850
+ 400
851
+ 600
852
+ 800
853
+ 1000
854
+ 200
855
+ 400
856
+ 600
857
+ 800
858
+ 1000
859
+ 0
860
+ 200
861
+ 400
862
+ 600
863
+ 800
864
+ 1000
865
+ time
866
+ time
867
+ time1.0
868
+ 1.0
869
+ 1.0
870
+ targetdomain
871
+ source domain aligned
872
+ 0.8
873
+ 0.8
874
+ 0.8
875
+ 0.6
876
+ 0.6
877
+ 0.6
878
+ 0.4
879
+ 0.4
880
+ 0.2
881
+ 0.2
882
+ 0.2
883
+ 0.0
884
+ 0.0
885
+ 0.0
886
+ 200
887
+ 400
888
+ 600
889
+ 800
890
+ 1000
891
+ 200
892
+ 400
893
+ 600
894
+ 800
895
+ 1000
896
+ 200
897
+ 400
898
+ 600
899
+ 800
900
+ 1000
901
+ time
902
+ time
903
+ timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
904
+ (DBACS)
905
+ A PREPRINT
906
+ VM prediction model performance for CCA based canonical components
907
+ Source domain
908
+ Target domain
909
+ Train MAE
910
+ Test MAE
911
+ Train MAE
912
+ Test MAE
913
+ CCA(source)
914
+ 0.12
915
+ 0.13
916
+ 0.29
917
+ 0.29
918
+ CCA(target)
919
+ 0.29
920
+ 0.29
921
+ 0.10
922
+ 0.14
923
+ CCA(both)
924
+ 0.10
925
+ 0.13
926
+ 0.12
927
+ 0.14
928
+ CCA+CORAL(both)
929
+ 0.07
930
+ 0.08
931
+ 0.13
932
+ 0.13
933
+ Table 3: VM prediction model performance for CCA based canonical components. Results for VM prediction
934
+ models that are trained with latent features created via CCA.
935
+ Figure 7: Aligner F and G visualizations of 2 times 3 cycled raw sensor measurements of both equipment types
936
+ in its original form as well as after its bijective mapping. The first graph shows results for source signals and cycled
937
+ source signals from source to target to source domain. The cycled signals are plotted in red and compared to its original
938
+ source sensor signals plotted in black. The second graph shows results for target signals and cycled target signals from
939
+ target to source back to target domain. The cycled signals are plotted in blue and compared to its original target sensor
940
+ signals plotted in black. The x axis shows the timestamps of the sensor signals, y axis the sensor measurement values.
941
+ 7
942
+ Conclusion and Future Work
943
+ The paper presents DBACS, a Deep Learning approach that is able to deal with heterogeneous domain adaptation while
944
+ allowing comparison of aligned signals for a VM use case in semiconductor manufacturing. Linear transformation
945
+ methods from subspace alignment and multi-view learning are selected as benchmarks and show comparable results
946
+ when training with data from both domains is possible. Especially for classification tasks, the correlation within
947
+ CCA can be further exploited for cross-modal or mate-based retrieval. A big advantage of DBACS is the presented
948
+ combination of domain adaptation with matching, two of the main approaches for standardization and scalability in the
949
+ semiconductor field.
950
+ Envisioned future work could go in the direction of root cause analysis based on the matching results. Another important
951
+ step could to enrich the data with more equipment for multi-source or multi-target alignment. Other applications from
952
+ semiconductor manufacturing like predictive maintenance and defect classification could be involved and tested for
953
+ example against computer vision inspired state-of-the-art transfer learning benchmark models like pseudo-labeling.
954
+ Since only offline model training is executed (training time is not a critical aspect of VM here), online model training
955
+ could also be explored in that context.
956
+ 14
957
+
958
+ 1.0
959
+ 1.0
960
+ 1.0
961
+ source_domain
962
+ source domain cycled
963
+ 0.8
964
+ 0.8
965
+ 0.8
966
+ value
967
+ 0.6
968
+ 0.6
969
+ 0.4
970
+ 0.4
971
+ 0.2
972
+ 0.2
973
+ 0.2
974
+ 0.0
975
+ 0.0
976
+ 0.0
977
+ 0
978
+ 200
979
+ 400
980
+ 600
981
+ 800
982
+ 1000
983
+ 200
984
+ 400
985
+ 600
986
+ 800
987
+ 1000
988
+ 200
989
+ 400
990
+ 600
991
+ 800
992
+ 1000
993
+ time
994
+ time
995
+ time1.0
996
+ 1.0
997
+ 1.0
998
+ target domain
999
+ target domain cycled
1000
+ 0.8
1001
+ 0.8
1002
+ 0.8
1003
+ 0.6
1004
+ 0.6
1005
+ 0.4
1006
+ 0.4
1007
+ 0.2
1008
+ 0.2
1009
+ 0.2
1010
+ 0.0
1011
+ 400
1012
+ 600
1013
+ 800
1014
+ 1000
1015
+ 0.0
1016
+ 200
1017
+ 400
1018
+ 600
1019
+ 800
1020
+ 0.0
1021
+ 200
1022
+ 0
1023
+ 1000
1024
+ 0
1025
+ 200
1026
+ 400
1027
+ 600
1028
+ 800
1029
+ 1000
1030
+ time
1031
+ time
1032
+ timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
1033
+ (DBACS)
1034
+ A PREPRINT
1035
+ Figure 8: Comparison of raw source sensor measurements via barycenter average grouped into low, middle
1036
+ high label values. Graphical representation of euclidean barycenter averages for 3 example sensors of the source
1037
+ domain. The x axis shows the timestamps of the sensor signals, y axis the sensor measurement values. Example sensor
1038
+ measurements of samples corresponding to low label values - meaning values smaller 0.1 - are plotted in green, example
1039
+ sensor measurements of samples corresponding to middle therefore preferred label values - meaning values around 0.5 -
1040
+ are plotted in grey and example sensor measurements of samples corresponding to high label values - meaning values
1041
+ higher than 0.9 - are plotted in orange. Sensor offsets for deviating metrology measurements are clearly visible.
1042
+ Acknowledgment
1043
+ Infineon Technologies AG is gratefully acknowledged for the financial support of this research. The Italian Government
1044
+ PNRR iniatiatives ’Partenariato 11: Made in Italy circolare e sostenibile’ and ’Ecosistema dell’Innovazione - iNest’ are
1045
+ also gratefully acknowledged for partially financing this research activity.
1046
+ References
1047
+ N. Alipour and J. Tahmoresnezhad. Heterogeneous domain adaptation with statistical distribution alignment and
1048
+ progressive pseudo label selection. Appl. Intell., 52:8038–8055, 2022. doi:https://doi.org/10.1007/s10489-021-02756-
1049
+ x.
1050
+ M. Azamfar, X. Li, and J. Lee.
1051
+ Deep learning-based domain adaptation method for fault diagnosis in
1052
+ semiconductor manufacturing.
1053
+ IEEE Transactions on Semiconductor Manufacturing, 33(3):445–453, 2020.
1054
+ doi:https://doi.org/10.1109/TSM.2020.2995548.
1055
+ J. Chapman and H.-T. Wang.
1056
+ Cca-zoo: A collection of regularized, deep learning based, kernel, and proba-
1057
+ bilistic cca methods in a scikit-learn style framework.
1058
+ Journal of Open Source Software, 6(68):3823, 2021.
1059
+ doi:https://doi.org/10.21105/joss.03823.
1060
+ C.-H. Chen,
1061
+ W.-D. Zhao,
1062
+ T. Pang,
1063
+ and Y.-Z. Lin.
1064
+ Virtual metrology of semiconductor pvd pro-
1065
+ cess based on combination of tree-based ensemble model.
1066
+ ISA Transactions, 103:192 – 202, 2020.
1067
+ doi:https://doi.org/10.1016/j.isatra.2020.03.031.
1068
+ P. Chen, S. Wu, J. Lin, F. Ko, H. Lo, J. Wang, C. Yu, and M. Liang. Virtual metrology: a solution for wafer to wafer
1069
+ advanced process control. In ISSM 2005, IEEE International Symposium on Semiconductor Manufacturing, 2005.,
1070
+ pages 155–157, 2005. doi:https://doi.org/10.1109/ISSM.2005.1513322.
1071
+ Z. Chen, K. Zhang, S. X. Ding, Y. A. Shardt, and Z. Hu.
1072
+ Improved canonical correlation analysis-
1073
+ based fault detection methods for industrial processes.
1074
+ Journal of Process Control, 41:26–34, 2016.
1075
+ doi:https://doi.org/10.1016/j.jprocont.2016.02.006.
1076
+ C.-F. Chien, W.-T. Hung, and E. T.-Y. Liao. Redefining monitoring rules for intelligent fault detection and classification
1077
+ via cnn transfer learning for smart manufacturing. IEEE Transactions on Semiconductor Manufacturing, 35(2):
1078
+ 158–165, 2022a. doi:https://doi.org/10.1109/TSM.2022.3164904.
1079
+ C.-F. Chien, W.-T. Hung, C.-W. Pan, and T. H. Van Nguyen. Decision-based virtual metrology for advanced process
1080
+ control to empower smart production and an empirical study for semiconductor manufacturing. Computers &
1081
+ Industrial Engineering, page 108245, 2022b.
1082
+ A. Chouichi,
1083
+ J. Blue,
1084
+ C. Yugma,
1085
+ and F. Pasqualini.
1086
+ Chamber-to-chamber discrepancy detection in
1087
+ semiconductor manufacturing.
1088
+ IEEE Transactions on Semiconductor Manufacturing, 33(1):86–95, 2020.
1089
+ doi:https://doi.org/10.1109/TSM.2020.2965288.
1090
+ 15
1091
+
1092
+ 1.0
1093
+ 1.0
1094
+ 1.0
1095
+ low
1096
+ middle
1097
+ high
1098
+ 0.8
1099
+ 0.8
1100
+ 0.8
1101
+ I sensor value
1102
+ value
1103
+ value
1104
+ 0.6
1105
+ 0.6
1106
+ sensor
1107
+ 0.6
1108
+ 0.4
1109
+ 0.2
1110
+ 0.2
1111
+ 0.2
1112
+ 0.0 +
1113
+ 400
1114
+ 0.0 +
1115
+ 400
1116
+ 600
1117
+ 800
1118
+ 0.0 +
1119
+ 0
1120
+ 200
1121
+ 600
1122
+ 800
1123
+ 1000
1124
+ 200
1125
+ 1000
1126
+ 0
1127
+ 200
1128
+ 400
1129
+ 600
1130
+ 800
1131
+ 1000
1132
+ time
1133
+ time
1134
+ timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
1135
+ (DBACS)
1136
+ A PREPRINT
1137
+ Figure 9: Visualization of equipment matching: mapped source sensors vs. target sensors grouped into low,
1138
+ middle high label values. Graphical representation of 6 sensor signals. The plots show euclidean barycenter averages
1139
+ of signals. Groups are defined by their metrology values and plotted in different colors. The x axis shows the
1140
+ timestamps of the sensor signals, y axis the sensor measurement values. Selected target sensor measurements of
1141
+ samples corresponding to low label values - meaning values smaller 0.1 - are plotted in green, example target sensor
1142
+ measurements of samples corresponding to middle therefore preferred label values - meaning values around 0.5 - are
1143
+ plotted in black and example sensor measurements of samples corresponding to high label values - meaning values
1144
+ higher than 0.9 - are plotted in orange. Mapped sensor signals corresponding to source samples with middle label
1145
+ values are colored black. Sensor offsets for deviating metrology measurements are clearly visible from middle target as
1146
+ well as mapped middle source signals.
1147
+ N. Courty,
1148
+ R. Flamary,
1149
+ D. Tuia,
1150
+ and A. Rakotomamonjy.
1151
+ Optimal transport for domain adapta-
1152
+ tion.
1153
+ IEEE Transactions on Pattern Analysis and Machine Intelligence,
1154
+ 39(9):1853–1865,
1155
+ 2017.
1156
+ doi:https://doi.org/10.1109/TPAMI.2016.2615921.
1157
+ S.-K. S. Fan, C.-Y. Hsu, D.-M. Tsai, F. He, and C.-C. Cheng. Data-driven approach for fault detection and diagnostic in
1158
+ semiconductor manufacturing. IEEE Transactions on Automation Science and Engineering, 17(4):1925–1936, 2020.
1159
+ doi:https://doi.org/10.1109/TASE.2020.2983061.
1160
+ Z. Fang, J. Lu, F. Liu, and G. Zhang.
1161
+ Semi-supervised heterogeneous domain adaptation:
1162
+ Theory and
1163
+ algorithms.
1164
+ IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(1):1087–1105, 2022.
1165
+ doi:https://doi.org/10.1109/TPAMI.2022.3146234.
1166
+ H. S. Farahani, A. Fatehi, A. Nadali, and M. A. Shoorehdeli. A novel method for designing transferable soft sensors
1167
+ and its application. arXiv, 2020. doi:https://doi.org/10.48550/arxiv.2008.02186.
1168
+ J. Feng, X. Jia, F. Zhu, J. Moyne, J. Iskandar, and J. Lee. An online virtual metrology model with sample selection for the
1169
+ tracking of dynamic manufacturing processes with slow drift. IEEE Transactions on Semiconductor Manufacturing,
1170
+ 32(4):574–582, 2019. doi:https://doi.org/10.1109/TSM.2019.2942768.
1171
+ B. Fernando, A. Habrard, M. Sebban, and T. Tuytelaars.
1172
+ Unsupervised visual domain adaptation using sub-
1173
+ space alignment.
1174
+ In 2013 IEEE International Conference on Computer Vision, pages 2960–2967, 2013.
1175
+ doi:https://doi.org/10.1109/ICCV.2013.368.
1176
+ Y. Ganin, E. Ustinova, H. Ajakan, P. Germain, H. Larochelle, F. Laviolette, M. Marchand, and V. Lempit-
1177
+ sky.
1178
+ Domain-adversarial training of neural networks.
1179
+ J. Mach. Learn. Res., 17(1):2096–2030, Jan. 2016.
1180
+ doi:https://doi.org/10.5555/2946645.2946704.
1181
+ N. Gentner, M. Carletti, A. Kyek, G. A. Susto, and Y. Yang. Enhancing scalability of virtual metrology: A deep
1182
+ learning-based approach for domain adaptation. In Proceedings of the 2020 Winter Simulation Conference, pages
1183
+ 1898–1909, 2020. doi:https://doi.org/10.1109/WSC48552.2020.9383945.
1184
+ 16
1185
+
1186
+ 1.0
1187
+ 1.0
1188
+ 1.0
1189
+ low
1190
+ mapped middle
1191
+ middle
1192
+ 0.8
1193
+ 0.8
1194
+ 0.8
1195
+ high
1196
+ 0.6
1197
+ 0.6
1198
+ 0.6
1199
+ 0.4
1200
+ 0.4
1201
+ 0.4
1202
+ 0.2
1203
+ 0.2
1204
+ 0.2
1205
+ 0.0 +
1206
+ 0.0
1207
+ 0.0 +
1208
+ 0
1209
+ 200
1210
+ 400
1211
+ 600
1212
+ 800
1213
+ 1000
1214
+ 0
1215
+ 200
1216
+ 400
1217
+ 600
1218
+ 800
1219
+ 1000
1220
+ 0
1221
+ 200
1222
+ 400
1223
+ 600
1224
+ 800
1225
+ 1000
1226
+ time
1227
+ time
1228
+ time
1229
+ 1.0
1230
+ 1.0
1231
+ 1.0
1232
+ 0.8
1233
+ 0.8
1234
+ 0.8
1235
+ value
1236
+ physical sensor value
1237
+ physical sensor
1238
+ 0.6
1239
+ 0.6
1240
+ 0.6
1241
+ 0.4
1242
+ 0.4
1243
+ 0.4
1244
+ 0.2
1245
+ 0.2
1246
+ 0.2
1247
+ 0.0
1248
+ 0
1249
+ 0
1250
+ 200
1251
+ 400
1252
+ 600
1253
+ 800
1254
+ 1000
1255
+ 0
1256
+ 200
1257
+ 400
1258
+ 600
1259
+ 800
1260
+ 1000
1261
+ U
1262
+ 200
1263
+ 400
1264
+ 600
1265
+ 800
1266
+ 1000
1267
+ time
1268
+ time
1269
+ timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
1270
+ (DBACS)
1271
+ A PREPRINT
1272
+ N. Gentner, M. Carletti, A. Kyek, G. A. Susto, and Y. Yang.
1273
+ Dbam: Making virtual metrology/soft sens-
1274
+ ing with time series data scalable through deep learning.
1275
+ Control Engineering Practice, 116:104914, 2021.
1276
+ doi:https://doi.org/10.1016/j.conengprac.2021.104914.
1277
+ I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. Courville. Improved training of wasserstein gans. In
1278
+ Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS’17, page
1279
+ 5769–5779, Red Hook, NY, USA, 2017. Curran Associates Inc. doi:https://doi.org/10.48550/arxiv.1704.00028.
1280
+ D. R. Hardoon, S. Szedmak, and J. Shawe-Taylor. Canonical correlation analysis: An overview with application to
1281
+ learning methods. Neural Computation, 16(12):2639–2664, 2004. doi:https://doi.org/10.1162/0899766042321814.
1282
+ C. R. Harris, K. J. Millman, S. J. van der Walt, R. Gommers, P. Virtanen, D. Cournapeau, E. Wieser, J. Taylor, S. Berg,
1283
+ N. J. Smith, R. Kern, M. Picus, S. Hoyer, M. H. van Kerkwijk, M. Brett, A. Haldane, J. F. del Río, M. Wiebe,
1284
+ P. Peterson, P. Gérard-Marchant, K. Sheppard, T. Reddy, W. Weckesser, H. Abbasi, C. Gohlke, and T. E. Oliphant.
1285
+ Array programming with NumPy. Nature, 585(7825):357–362, Sept. 2020. doi:https://doi.org/10.1038/s41586-020-
1286
+ 2649-2.
1287
+ H. Heng, T. Liao, S. Didari, and H. Rajagopal. Chamber matching with neural networks in semiconductor equipment
1288
+ tools. Applied Materials, Inc., US Patent 11,133,204, 2021.
1289
+ U. Hilleringmann. Silizium-Halbleitertechnologie. Springer, 1996.
1290
+ I. Jolliffe. Principal Component Analysis. Springer Series in Statistics. Springer New York, 2010. ISBN 9781441929990.
1291
+ S. Kang.
1292
+ On effectiveness of transfer learning approach for neural network-based virtual metrol-
1293
+ ogy
1294
+ modeling.
1295
+ IEEE
1296
+ Transactions
1297
+ on
1298
+ Semiconductor
1299
+ Manufacturing,
1300
+ 31(1):149–155,
1301
+ 2017.
1302
+ doi:https://doi.org/10.1109/TSM.2017.2787550.
1303
+ S. Kang, D. Kim, and S. Cho.
1304
+ Efficient feature selection-based on random forward search for vir-
1305
+ tual metrology modeling.
1306
+ IEEE Transactions on Semiconductor Manufacturing, 29(4):391–398, 2016.
1307
+ doi:https://doi.org/10.1109/TSM.2016.2594033.
1308
+ K. B. Lee and C. O. Kim.
1309
+ Recurrent feature-incorporated convolutional neural network for virtual metrology
1310
+ of the chemical mechanical planarization process.
1311
+ Journal of Intelligent Manufacturing, 31(1):73–86, 2020.
1312
+ doi:https://doi.org/10.1007/s10845-018-1437-4.
1313
+ B. Li, Y. Wang, S. Zhang, D. Li, T. Darrell, K. Keutzer, and H. Zhao. Learning invariant representations and risks for
1314
+ semi-supervised domain adaptation. arXiv, 2020. doi:https://doi.org/10.48550/arxiv.2010.04647.
1315
+ Y.-W. Lu, K.-L. Liu, and C.-Y. Hsu. Conditional generative adversarial network for defect classification with class
1316
+ imbalance. In 2019 IEEE International Conference on Smart Manufacturing, Industrial & Logistics Engineering
1317
+ (SMILE), pages 146–149, 2019. doi:https://doi.org/10.1109/SMILE45626.2019.8965320.
1318
+ S. Lynn, J. Ringwood, E. Ragnoli, S. McLoone, and N. MacGearailty. Virtual metrology for plasma etch using tool
1319
+ variables. In 2009 IEEE/SEMI Advanced Semiconductor Manufacturing Conference, pages 143–148. IEEE, 2009.
1320
+ doi:https://doi.org/10.1109/ASMC.2009.5155972.
1321
+ M. Maggipinto, C. Masiero, A. Beghi, and G. A. Susto. A convolutional autoencoder approach for feature extraction in
1322
+ virtual metrology. Procedia Manufacturing, 17:126–133, 2018. doi:https://doi.org/10.1016/j.promfg.2018.10.023.
1323
+ 28th International Conference on Flexible Automation and Intelligent Manufacturing (FAIM2018), June 11-14, 2018,
1324
+ Columbus, OH, USAGlobal Integration of Intelligent Manufacturing and Smart Industry for Good of Humanity.
1325
+ M. Maggipinto, A. Beghi, S. McLoone, and G. A. Susto.
1326
+ Deepvm: A deep learning-based approach with au-
1327
+ tomatic feature extraction for 2d input data virtual metrology.
1328
+ Journal of Process Control, 84:24–34, 2019.
1329
+ doi:https://doi.org/10.1016/j.jprocont.2019.08.006.
1330
+ G. May and C. Spanos. Fundamentals of Semiconductor Manufacturing and Process Control. IEEE Press. John Wiley
1331
+ & Sons, 2006.
1332
+ C. Park and S. B. Kim. Virtual metrology modeling of time-dependent spectroscopic signals by a fused lasso algorithm.
1333
+ Journal of Process Control, 42:51–58, 2016. doi:https://doi.org/10.1016/j.jprocont.2016.04.002.
1334
+ F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer,
1335
+ R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duches-
1336
+ nay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830, 2011.
1337
+ doi:https://doi.org/10.5555/1953048.2078195.
1338
+ R. Perry, G. Mischler, R. Guo, T. Lee, A. Chang, A. Koul, C. Franz, H. Richard, I. Carmichael, P. Ablin, A. Gramfort,
1339
+ and J. T. Vogelstein. mvlearn: Multiview machine learning in python. Journal of Machine Learning Research, 22
1340
+ (109):1–7, 2021. doi:https://doi.org/10.5555/3546258.3546367.
1341
+ 17
1342
+
1343
+ Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
1344
+ (DBACS)
1345
+ A PREPRINT
1346
+ Y. Saeys, I. Inza, and P. Larrañaga. A review of feature selection techniques in bioinformatics. Bioinformatics (Oxford,
1347
+ England), 23(19):2507–2517, 08 2007. doi:https://doi.org/10.1093/bioinformatics/btm344.
1348
+ J. Shim and S. Kang. Domain-adaptive active learning for cost-effective virtual metrology modeling. Computers in
1349
+ Industry, 135, 2022. doi:https://doi.org/10.1016/j.compind.2021.103572.
1350
+ A.-J. Su, J.-C. Jeng, H.-P. Huang, C.-C. Yu, S.-Y. Hung, and C.-K. Chao. Control relevant issues in semiconduc-
1351
+ tor manufacturing: Overview with some new results. Control Engineering Practice, 15(10):1268–1279, 2007.
1352
+ doi:https://doi.org/10.1016/j.conengprac.2006.11.003. Special Issue - International Symposium on Advanced Control
1353
+ of Chemical Processes (ADCHEM).
1354
+ B. Sun, J. Feng, and K. Saenko. Return of frustratingly easy domain adaptation. In Proceedings of the AAAI Conference
1355
+ on Artificial Intelligence, volume 30, 2016. doi:https://doi.org/10.5555/3016100.3016186.
1356
+ S. Sun.
1357
+ A survey of multi-view machine learning.
1358
+ Neural Computing and Applications, 23, 12 2013.
1359
+ doi:https://doi.org/10.1007/s00521-013-1362-6.
1360
+ G.
1361
+ A.
1362
+ Susto
1363
+ and
1364
+ A.
1365
+ Beghi.
1366
+ Least
1367
+ angle
1368
+ regression
1369
+ for
1370
+ semiconductor
1371
+ manufacturing
1372
+ modeling.
1373
+ In
1374
+ 2012
1375
+ IEEE
1376
+ International
1377
+ Conference
1378
+ on
1379
+ Control
1380
+ Applications,
1381
+ pages
1382
+ 658–663.
1383
+ IEEE,
1384
+ 2012.
1385
+ doi:https://doi.org/10.1109/CCA.2012.6402409.
1386
+ G. A. Susto, A. Schirru, S. Pampuri, S. McLoone, and A. Beghi.
1387
+ Machine learning for predictive mainte-
1388
+ nance: A multiple classifier approach.
1389
+ IEEE Transactions on Industrial Informatics, 11(3):812–820, 2015.
1390
+ doi:https://doi.org/10.1109/TII.2014.2349359.
1391
+ Y. Taigman, A. Polyak, and L. Wolf. Unsupervised cross-domain image generation. ArXiv, abs/1611.02200, 2017.
1392
+ doi:https://doi.org/10.48550/arxiv.1611.02200.
1393
+ Y.-H. H. Tsai, Y.-R. Yeh, and Y.-C. F. Wang. Heterogeneous domain adaptation with label and structure consistency. In
1394
+ 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2842–2846, 2016.
1395
+ doi:https://doi.org/10.1007/s11042-020-08731-x.
1396
+ T. Tsutsui and T. Matsuzawa.
1397
+ Virtual metrology model robustness against chamber condition varia-
1398
+ tion using deep learning.
1399
+ IEEE Transactions on Semiconductor Manufacturing, 32(4):428–433, 2019.
1400
+ doi:https://doi.org/10.1109/ISSM.2018.8651170.
1401
+ V. Vincent, M. Wannes, and D. Jesse. Transfer learning for anomaly detection through localized and unsupervised
1402
+ instance selection. Proceedings of the AAAI Conference on Artificial Intelligence, 34(04):6054–6061, Apr. 2020.
1403
+ doi:https://doi.org/10.1609/aaai.v34i04.6068.
1404
+ M. Wang and W. Deng.
1405
+ Deep visual domain adaptation: A survey.
1406
+ Neurocomputing, 312:135–153, 2018.
1407
+ doi:https://doi.org/10.1016/j.neucom.2018.05.083.
1408
+ Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli. Image quality assessment: from error visibility to structural similarity.
1409
+ IEEE Transactions on Image Processing, 13(4):600–612, 2004. doi:https://doi.org/10.1109/TIP.2003.819861.
1410
+ C.
1411
+ Xu,
1412
+ D.
1413
+ Tao,
1414
+ and
1415
+ C.
1416
+ Xu.
1417
+ A
1418
+ survey
1419
+ on
1420
+ multi-view
1421
+ learning.
1422
+ arXiv,
1423
+ 2013.
1424
+ doi:https://doi.org/10.48550/ARXIV.1304.5634.
1425
+ X. Yan, S. Hu, Y. Mao, Y. Ye, and H. Yu. Deep multi-view learning methods: A review. Neurocomputing, 448:106–129,
1426
+ 2021. doi:https://doi.org/10.1016/j.neucom.2021.03.090.
1427
+ S. Yang, G. Song, Y. Jin, and L. Du. Domain adaptive classification on heterogeneous information networks. In
1428
+ C. Bessiere, editor, Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence,
1429
+ IJCAI-20, pages 1410–1416. International Joint Conferences on Artificial Intelligence Organization, 7 2020.
1430
+ doi:https://doi.org/10.5555/3491440.3491636.
1431
+ Q. Yu, L. Li, H. Zhao, Y. Liu, and K.-Y. Lin. Evaluation system and correlation analysis for determining the
1432
+ performance of a semiconductor manufacturing system. Complex System Modeling and Simulation, 1(3):218–231,
1433
+ 2021. doi:https://doi.org/10.23919/CSMS.2021.0015.
1434
+ J.-Y. Zhu, T. Park, P. Isola, and A. A. Efros. Unpaired image-to-image translation using cycle-consistent adver-
1435
+ sarial networks. In 2017 IEEE International Conference on Computer Vision (ICCV), pages 2242–2251, 2017.
1436
+ doi:10.1109/ICCV.2017.244.
1437
+ 18
1438
+
E9AzT4oBgHgl3EQfG_uu/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
E9E0T4oBgHgl3EQfQwCg/content/2301.02198v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e1efc988f5e0ebd48e7e573ccd598491f7741d6fc6cd3a74b99c41f60989b493
3
+ size 4455192
E9E0T4oBgHgl3EQfQwCg/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3f0751cdd39d7ac738ba34b192cfa13466685787a4227f63bb087fb492432fe0
3
+ size 4915245
FdAyT4oBgHgl3EQfe_hY/content/tmp_files/2301.00331v1.pdf.txt ADDED
@@ -0,0 +1,2743 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00331v1 [math.AG] 1 Jan 2023
2
+ Optimality of Curtiss Bound on
3
+ Poincare Multiplier for
4
+ Positive Univariate Polynomials
5
+ Hoon Hong and Brittany Riggs
6
+ December 31 2022
7
+ Abstract
8
+ Let f be a monic univariate polynomial with non-zero constant term. We say that f is positive if
9
+ f(x) is positive over all x ≥ 0. If all the coefficients of f are non-negative, then f is trivially positive.
10
+ In 1888, Poincar´e proved thatf is positive if and only if there exists a monic polynomial g such that all
11
+ the coefficients of gf are non-negative. Such polynomial g is called a Poincar´e multiplier for the positive
12
+ polynomial f. Of course one hopes to find a multiplier with smallest degree. This naturally raised a
13
+ challenge: find an upper bound on the smallest degree of multipliers. In 1918, Curtiss provided such a
14
+ bound. Curtiss also showed that the bound is optimal (smallest) when degree of f is 1 or 2. It is easy to
15
+ show that the bound is not optimal when degree of f is higher. The Curtiss bound is a simple expression
16
+ that depends only on the angle (argument) of non-real roots of f. In this paper, we show that the Curtiss
17
+ bound is optimal among all the bounds that depends only on the angles.
18
+ 1
19
+ Introduction
20
+ Let f be a monic univariate polynomial with non-zero constant term. We say that f is positive if f(x) is
21
+ positive over all x ≥ 0. Consider the following small (toy) examples,
22
+ • f1 = x4 + x3 + 10x2 + 2x + 10
23
+ • f2 = x4 − x3 − 10x2 − 2x + 10
24
+ • f3 = x4 − x3 + 10x2 − 2x + 10
25
+ Note that all the coefficients of f1 are non-negative. Thus it is trivial to see that f1 is positive. However f2
26
+ and f3 have non-negative coefficients, and thus it is not obvious whether they are positive or not. It turns
27
+ out that f2 is not positive and f3 is positive.
28
+ In 1888, Poincar´e [5] proved a general result that implies the following specific claim: f is positive if
29
+ and only if there exists a monic polynomial g such that all the coefficients of gf are non-negative. Such
30
+ polynomial g is called a Poincar´e multiplier for the positive polynomial f. For the above examples, we have
31
+ • Since f2 is not positive, there is no a Poincar´e multiplier for f2.
32
+ • Since f3 is positive, there is a Poincar´e multiplier for f3. For instance, let g = x + 1. Then
33
+ gf3 = (x + 1)
34
+
35
+ x4 − x3 + 10x2 − 2x + 10
36
+
37
+ = x5 + 9x3 + 8x2 + 8x + 10
38
+ Note that all the coefficients of gf3 are non-negative.
39
+ 1
40
+
41
+ Note that there are (infinitely) many Poincar´e multipliers for f3. For instance, let g = x2 + x + 1. Then
42
+ gf3 =
43
+
44
+ x2 + x + 1
45
+ � �
46
+ x4 − x3 + 10x2 − 2x + 10
47
+
48
+ = x6 + 10x4 + 7x3 + 18x2 + 8x + 10
49
+ Note that all the coefficients of gf3 are again non-negative. Of course one hopes to find a Poincar´e multiplier
50
+ with optimal (smallest) degree. It turns out that the smallest degree for Poincar´e multipliers for f3 is 1.
51
+ This naturally raised a challenge: find an upper bound on the smallest degree of multipliers.
52
+ In 1918, Curtiss [3] provided such a bound (See Theorem 1). Curtiss also showed that the bound is
53
+ optimal when degree of f
54
+ is 1 or 2. It is easy to show that the bound is not optimal when degree of f is
55
+ higher. For example, the Curtiss bound for f3 is 2, which is bigger than the optimal degree which is 1.
56
+ It seems that Curtiss bound was forgotten for almost a century. In 2010 Avenda˜no [1] (see Lemma 2.1),
57
+ evidently not informed of the Curtiss bound, derived another bound implicitly. Its derivation is very elegant
58
+ and short, but it turns out that the implied bound is roughly twice the Curtiss bound.
59
+ Boththe Curtiss bound and Avenda˜no bound depend only on the angles (arguments) of non-real roots of
60
+ f. The main contribution of this paper is to show that the Curtiss bound is optimal among all the bounds
61
+ that depends only on the angles of the non-real roots (see Theorem 2).
62
+ 2
63
+ Main Result
64
+ Let f ∈ R [x] be monic such that ∀
65
+ x≥0f (x) > 0, that is, f does not have any non-negative real root.
66
+ Definition 1 (Optimal Bound) The optimal degree for f, written as opt (f), is defined by
67
+ opt (f) =
68
+ min
69
+ g∈R[x]\0
70
+ coeff(gf)≥0
71
+ deg(g)
72
+ Theorem 1 (Curtiss Bound 1918[3]) Let r1e±iθ1, . . . , rme±iθm be the non-real roots of f where multiple
73
+ roots are repeated. Let
74
+ b (f) =
75
+ m
76
+
77
+ i=1
78
+ �� π
79
+ θi
80
+
81
+ − 2
82
+
83
+ Then opt (f) ≤ b (f) and the equality holds if deg f ≤ 2.
84
+ Theorem 2 (Main Result: Angle-Based Optimality of Curtiss Bound) We have
85
+
86
+ θ1,...,θm∈(0,π)
87
+
88
+ p1,...,pt>0
89
+
90
+ r1,...,rm>0 opt (f) = b (f)
91
+ 3
92
+ Proof of Curtiss Bound (Theorem 1)
93
+ In this section, we will provide an alternative proof for Curtiss’ theorem (Theorem 1). This alternative proof
94
+ will be based on a new proof strategy that will be found crucial for proving our main result (Theorem 2).
95
+ Let f ∈ R [x] be monic without losing generality. Assume that f does not have any non-negative real roots.
96
+ The problem is to find non-zero g ∈ R [x] such that coeffs (gf) ≥ 0. We will reduce the problem to that of
97
+ linear algebra. Let
98
+ f = anxn + · · · + a0x0
99
+ g = bsxs + · · · + b0x0
100
+ where an = 1 and bs = 1. We first rewrite them using vectors. Let
101
+ a =
102
+
103
+ a0
104
+ · · ·
105
+ an
106
+
107
+ b =
108
+
109
+ b0
110
+ · · ·
111
+ bs
112
+
113
+ 2
114
+
115
+ and let
116
+ xk =
117
+
118
+ 
119
+ x0
120
+ ...
121
+ xk
122
+
123
+ 
124
+ Then we can write f and g compactly as
125
+ f = axn
126
+ g = bxs
127
+ Let
128
+ As =
129
+
130
+ 
131
+ a0
132
+ · · ·
133
+ · · ·
134
+ an
135
+ ...
136
+ ...
137
+ a0
138
+ · · ·
139
+ · · ·
140
+ an
141
+
142
+  ∈ R(s+1)×(s+n+1)
143
+ Lemma 3 coeffs (gf) = bAs
144
+ Proof: Note
145
+ gf = (bxs) (axn)
146
+ = b (xsaxn)
147
+ = b
148
+
149
+ 
150
+ x0
151
+ ...
152
+ xs
153
+
154
+ 
155
+
156
+ a0
157
+ · · ·
158
+ an
159
+
160
+
161
+ 
162
+ x0
163
+ ...
164
+ xn
165
+
166
+ 
167
+ = b
168
+
169
+ 
170
+ a0
171
+ · · ·
172
+ · · ·
173
+ an
174
+ ...
175
+ ...
176
+ a0
177
+ · · ·
178
+ · · ·
179
+ an
180
+
181
+ 
182
+
183
+ 
184
+ x0
185
+ ...
186
+ xs+n
187
+
188
+ 
189
+ = bAsxs+n
190
+ Hence coeffs (gf) = bAs. □
191
+ We partition As into two submatrices as As = [Ls|Rs] where
192
+ Ls =
193
+
194
+ 
195
+ a0
196
+ · · ·
197
+ an−1
198
+ ...
199
+ ...
200
+ a0
201
+
202
+ 
203
+ ∈ R(s+1)×n
204
+ and Rs =
205
+
206
+ 
207
+ an
208
+ ...
209
+ ...
210
+ ...
211
+ ...
212
+ a0
213
+ ...
214
+ ...
215
+ ...
216
+ a0
217
+ · · ·
218
+ · · ·
219
+ an
220
+
221
+ 
222
+ ∈ R(s+1)×(s+1)
223
+ Let
224
+ c = bRs
225
+ ∈ R1×(s+1)
226
+ Ts = R−1
227
+ s Ls
228
+ ∈ R(s+1)×n
229
+ Lemma 4 coeffs (gf) = c [Ts|I]
230
+ 3
231
+
232
+ Proof: Note
233
+ bAs = b
234
+
235
+ RsR−1
236
+ s
237
+
238
+ As
239
+ = (bRs)
240
+
241
+ R−1
242
+ s As
243
+
244
+ = (bRs)
245
+
246
+ R−1
247
+ s
248
+ [Ls|Rs]
249
+
250
+ = (bRs)
251
+
252
+ R−1
253
+ s Ls|R−1
254
+ s Rs
255
+
256
+ = (bRs)
257
+
258
+ R−1
259
+ s Ls|I
260
+
261
+ = c [Ts|I]
262
+ where c = bRs
263
+ and Ts = R−1
264
+ s Ls
265
+
266
+ Lemma 5 We have
267
+
268
+ g̸=0, deg(g)≤s coeffs (gf) ≥ 0
269
+ ⇐⇒
270
+ ConvexHull (Ts) ∩ Rn
271
+ ≥0 ̸= ∅
272
+ where Ts is a viewed as a set of row vectors.
273
+ Proof: Note
274
+
275
+ g̸=0, deg(g)≤s coeffs (gf) ≥ 0
276
+ ⇐⇒
277
+
278
+ c̸=0 c [Ts|I] ≥ 0
279
+ (from Lemma 4)
280
+ ⇐⇒
281
+
282
+ c̸=0 cTs ≥ 0 and c ≥ 0
283
+ ⇐⇒
284
+
285
+ c≥0, c̸=0 cTs ≥ 0
286
+ ⇐⇒
287
+
288
+ c≥0, c0+···+cs=1 cTs ≥ 0
289
+ ⇐⇒
290
+ ConvexHull (Ts) ∩ Rn
291
+ ≥0 ̸= ∅
292
+
293
+ Let
294
+ f = an
295
+ n
296
+
297
+ i=1
298
+ (x − αi)
299
+ Lemma 6 The entries of Ts are given by
300
+ Tskℓ = −|N|
301
+ |D|
302
+ where
303
+ D =
304
+
305
+ 
306
+ α0
307
+ 1
308
+ · · ·
309
+ α0
310
+ n
311
+ ...
312
+ ...
313
+ αn−1
314
+ 1
315
+ · · ·
316
+ αn−1
317
+ n
318
+
319
+ 
320
+ and N is obtained from D by replacing the ℓ-th row with
321
+
322
+ αk+n
323
+ 1
324
+ · · ·
325
+ αk+n
326
+ n
327
+
328
+ .
329
+ Proof: Note
330
+ xsf = Asxs+n
331
+ 4
332
+
333
+ = RsR−1
334
+ s Asxs+n
335
+ = RsR−1
336
+ s
337
+ [Ls|Rs] xs+n
338
+ = Rs
339
+
340
+ R−1
341
+ s Ls|R−1
342
+ s Rs
343
+
344
+ xs+n
345
+ = Rs [Ts|I] xs+n
346
+ = Rs
347
+
348
+
349
+
350
+ Ts
351
+
352
+ 
353
+ x0
354
+ ...
355
+ xn−1
356
+
357
+  +
358
+
359
+ 
360
+ xn
361
+ ...
362
+ xs+n
363
+
364
+ 
365
+
366
+
367
+
368
+
369
+ By evaluating the above on each root, we have
370
+
371
+ 
372
+ α0
373
+ i
374
+ ...
375
+ αs
376
+ i
377
+
378
+  f (αi) = Rs
379
+
380
+
381
+
382
+ Ts
383
+
384
+ 
385
+ α0
386
+ i
387
+ ...
388
+ αn−1
389
+ i
390
+
391
+  +
392
+
393
+ 
394
+ αn
395
+ i
396
+ ...
397
+ αs+n
398
+ i
399
+
400
+ 
401
+
402
+
403
+
404
+
405
+ Since f (αi) = 0, we have
406
+ 0 = Rs
407
+
408
+
409
+
410
+ Ts
411
+
412
+ 
413
+ α0
414
+ i
415
+ ...
416
+ αn−1
417
+ i
418
+
419
+  +
420
+
421
+ 
422
+ αn
423
+ i
424
+ ...
425
+ αs+n
426
+ i
427
+
428
+ 
429
+
430
+
431
+
432
+
433
+ Since Rs is an invertible matrix, we have
434
+ 0 = Ts
435
+
436
+ 
437
+ α0
438
+ i
439
+ α1
440
+ i
441
+ ...
442
+ αn−1
443
+ i
444
+
445
+ 
446
+ +
447
+
448
+ 
449
+ αn
450
+ i
451
+ ...
452
+ αs+n
453
+ i
454
+
455
+ 
456
+ Rearranging,
457
+ Ts
458
+
459
+ 
460
+ α0
461
+ i
462
+ α1
463
+ i
464
+ ...
465
+ αn−1
466
+ i
467
+
468
+ 
469
+ = −
470
+
471
+ 
472
+ αn
473
+ i
474
+ ...
475
+ αn+s
476
+ i
477
+
478
+ 
479
+ Combining the above equations for all the roots, we have
480
+ Ts
481
+
482
+ 
483
+ α0
484
+ 1
485
+ · · ·
486
+ α0
487
+ n
488
+ ...
489
+ ...
490
+ αn−1
491
+ 1
492
+ · · ·
493
+ αn−1
494
+ n
495
+
496
+  = −
497
+
498
+ 
499
+ αn
500
+ 1
501
+ · · ·
502
+ αn
503
+ n
504
+ ...
505
+ αs+n
506
+ 1
507
+ · · ·
508
+ αs+n
509
+ n
510
+
511
+ 
512
+ By applying Cramer’s rule, we have
513
+ Tskℓ = −|N|
514
+ |D|
515
+ where
516
+ D =
517
+
518
+ 
519
+ α0
520
+ 1
521
+ · · ·
522
+ α0
523
+ n
524
+ ...
525
+ ...
526
+ αn−1
527
+ 1
528
+ · · ·
529
+ αn−1
530
+ n
531
+
532
+ 
533
+ and N is obtained from D by replacing the ℓ-th row with
534
+
535
+ αk+n
536
+ 1
537
+ · · ·
538
+ αk+n
539
+ n
540
+
541
+ . □
542
+ 5
543
+
544
+ Remark 7 Note that Tskℓ does not depend on s. Thus we will often write it as Tkℓ.
545
+ Lemma 8 Let f ∈ R[x] be such that deg(f) = 2 without real roots. Let the roots be α1 = reiθ and α2 = re−iθ.
546
+ Then we have
547
+ Tk0
548
+ =
549
+ +rk+2 sin (k + 1) θ
550
+ sin θ
551
+ =
552
+ r2 Im(αk+1
553
+ i
554
+ )
555
+ Im(αi)
556
+ Tk1
557
+ =
558
+ −rk+1 sin(k + 2)θ
559
+ sin θ
560
+ =
561
+ − Im(αk+2
562
+ i
563
+ )
564
+ Im(αi)
565
+ Proof: From Lemma 6 we have
566
+ Tk0
567
+ = −
568
+ �����
569
+ αk+2
570
+ 1
571
+ αk+2
572
+ 2
573
+ α1
574
+ 1
575
+ α1
576
+ 2
577
+ �����
578
+ �����
579
+ α0
580
+ 1
581
+ α0
582
+ 2
583
+ α1
584
+ 1
585
+ α1
586
+ 2
587
+ �����
588
+ = −αk+2
589
+ 1
590
+ α2 − α1αk+2
591
+ 2
592
+ α2 − α1
593
+ = −rk+2 +2i sin(k + 1) θ
594
+ −2i sinθ
595
+ = +rk+2 sin (k + 1) θ
596
+ sin θ
597
+ = r2 Im(αk+1
598
+ i
599
+ )
600
+ Im(αi)
601
+ Tk1
602
+ = −
603
+ �������
604
+ α0
605
+ 1
606
+ α0
607
+ 2
608
+ αk+2
609
+ 1
610
+ αk+2
611
+ 2
612
+ �������
613
+ �������
614
+ α0
615
+ 1
616
+ α0
617
+ 2
618
+ α1
619
+ 1
620
+ α1
621
+ 2
622
+ �������
623
+ = −αk+2
624
+ 2
625
+ − αk+2
626
+ 1
627
+ α2 − α1
628
+ = −rk+1 −2i sin(k + 2)θ
629
+ −2i sinθ
630
+ = −rk+1 sin(k + 2)θ
631
+ sin θ
632
+ = − Im(αk+2
633
+ i
634
+ )
635
+ Im(αi)
636
+
637
+ Lemma 9 Let f ∈ R[x] be such that deg(f) = 2 without real roots. Let α1 = reiθ and α2 = re−iθ be the
638
+ roots of f.
639
+ s =
640
+ �π
641
+ θ
642
+
643
+ − 2.
644
+ Then
645
+
646
+ g̸=0, deg(g)≤s coe��s (gf) ≥ 0.
647
+ Proof: Note
648
+
649
+ g̸=0, deg(g)≤s coeffs (gf) ≥ 0
650
+ ⇐⇒
651
+ ConvexHull (Ts) ∩ Rn
652
+ ≥0 ̸= ∅
653
+ (from Lemma 5)
654
+ ⇐=
655
+ Ts0, Ts1 ≥ 0
656
+ ⇐⇒
657
+ sin (s + 1) θ ≥ 0 ∧ sin (s + 2) θ ≤ 0 (from Lemma 8)
658
+ ⇐=
659
+ 0 < (s + 1)θ ≤ π ∧ π ≤ (s + 2)θ < 2π
660
+ ⇐⇒
661
+ s ≤ π
662
+ θ − 1 ∧ s ≥ π
663
+ θ − 2
664
+ ⇐⇒
665
+ π
666
+ θ − 2 ≤ s ≤ π
667
+ θ − 1
668
+ ⇐=
669
+ s =
670
+ �π
671
+ θ
672
+
673
+ − 2
674
+
675
+ Proof: [Proof of Theorem 1]
676
+ 6
677
+
678
+ 1. Let f be quadratic with non-real roots re±iθ. Note that bc(f) is optimal for any f with π
679
+ 2 ≤ θ < π
680
+ since bc(f) = 0. Let 0 < θ < π
681
+ 2 . Let g be such that g ̸= 0 and deg(g) = v < s, where s = bc(f). Thus
682
+ k
683
+ ≤ v
684
+ =⇒
685
+ k
686
+ < s
687
+ =⇒
688
+ k
689
+ <
690
+ �π
691
+ θ
692
+
693
+ − 2
694
+ =⇒
695
+ k
696
+ < π
697
+ θ − 2
698
+ (since k ≤
699
+ �π
700
+ θ
701
+
702
+ − 3)
703
+ =⇒
704
+ (k + 2)θ
705
+ < π
706
+ =⇒
707
+ sin(k + 2)θ
708
+ > 0
709
+ (since (k + 2)θ > 0)
710
+ =⇒
711
+ −rk+1 sin(k + 2)θ
712
+ sin θ
713
+ < 0
714
+ ⇐⇒
715
+ Tvk1
716
+ < 0
717
+ ⇐⇒
718
+ ConvexHull (Tv) ∩ R2
719
+ ≥0
720
+ = ∅
721
+ ⇐⇒
722
+ coeffs (gf)
723
+ < 0
724
+ (by Lemma 5)
725
+ Hence, opt(f) ̸< s. By Lemma 9, opt(f) = s.
726
+ 2. Consider the factorization of f over R into linear and irreducible quadratic factors as follows.
727
+ f = (x + p1) · · · (x + pt)
728
+
729
+ x2 − 2r1 cos θ1x + r2
730
+ 1
731
+
732
+ · · ·
733
+
734
+ x2 − 2rm cos θmx + r2
735
+ m
736
+
737
+ f = l1 · · · lt q1 · · · qm
738
+ where
739
+ li = x + pi
740
+ qi = x2 − 2ri cos θix + r2
741
+ i
742
+ where again −pi stand for negative real roots and ri (cos θi ± i sin θi) stand for the complex conjugate
743
+ root pairs. The coefficients of each li and qi with π
744
+ 2 ≤ θi < π are non-negative. From Lemma 8, for those
745
+ qi with 0 < θi < π
746
+ 2 , there exists non-zero gi ∈ R[x] such that coeffs (gi qi) ≥ 0 and deg(gi) =
747
+ � π
748
+ θi
749
+
750
+ − 2.
751
+ Let g = g1 · · · gm. Then coeffs (gf) ≥ 0 and deg(g) =
752
+ m
753
+
754
+ i=1
755
+ �� π
756
+ θi
757
+
758
+ − 2
759
+
760
+ = b(f). Hence we have
761
+ opt (f) ≤ b (f) .
762
+
763
+ 4
764
+ Proof of Angle-Based Optimality (Theorem 2)
765
+ Let
766
+ f = fπ,p fφ,rφ fθ,rθ
767
+ fπ,p =
768
+
769
+ 1≤i≤t
770
+ (x + pi) where pi > 0
771
+ fφ,rφ =
772
+
773
+ 1≤i≤k
774
+ π
775
+ 2 ≤φi<π
776
+
777
+ x2 − 2rφi cos φi x + r2
778
+ φi
779
+
780
+ where rφi > 0 and π > φ1 ≥ · · · ≥ φk ≥ π
781
+ 2
782
+ 7
783
+
784
+ fθ,rθ =
785
+
786
+ 1≤i≤ℓ
787
+ 0<θi< π
788
+ 2
789
+
790
+ x2 − 2rθi cos θi x + r2
791
+ θi
792
+
793
+ where rθi > 0 and π
794
+ 2 > θ1 ≥ · · · ≥ θℓ > 0
795
+ where k + ℓ = m (the number of complex root pairs of f) and 2m + t = n = deg(f).
796
+ Proof: [Proof of Theorem 2]
797
+ 1. We need to show
798
+
799
+ π>φ1≥···≥φk≥ π
800
+ 2
801
+
802
+ π
803
+ 2 >θ1≥···≥θℓ>0
804
+
805
+ p1,...,pt>0
806
+
807
+ rφ1,...,rφk>0
808
+
809
+ rθ1 ,...,rθℓ>0
810
+ opt (f) = b (f)
811
+ 2. Let π > φ1 ≥ · · · ≥ φk ≥ π
812
+ 2 and π
813
+ 2 > θ1 ≥ · · · ≥ θℓ > 0 be arbitrary but fixed. We need to show
814
+
815
+ p1,...,pt>0
816
+
817
+ rφ1,...,rφk>0
818
+
819
+ rθ1 ,...,rθℓ>0
820
+ opt (f) = b (f) .
821
+ We need to find a witness for p, rφ, rθ such that opt (f) = b (f).
822
+ 3. We propose a witness candidate as follows.
823
+ (a) From Lemma 10, for the fixed θ, we have
824
+
825
+ rθ1 ,...,rθℓ>0
826
+ opt (fθ,rθ) = b (fθ,rθ)
827
+ (1)
828
+ (b) From Lemma 15, for the fixed φ and θ, we have
829
+
830
+ p1,...,pt>0
831
+
832
+ rφ1 ,...,rφk>0
833
+
834
+ rθ1 ,...,rθℓ>0
835
+ opt
836
+
837
+ fπ,p fφ,rφ fθ,rθ
838
+
839
+ = opt (fθ,rθ)
840
+ (2)
841
+ (c) We propose p, rφ, rθ appearing in the above two facts as a witness candidate.
842
+ 4. We verify that the proposed candidate is indeed a witness, that is, opt (f) = b (f).
843
+ Note
844
+ opt (f) = opt
845
+
846
+ fπ,p fφ,rφ fθ,rθ
847
+
848
+ = opt (fθ,rθ)
849
+ by (2)
850
+ = b (fθ,rθ) by (1)
851
+ = b (fπ,p) + b
852
+
853
+ fφ,rφ
854
+
855
+ + b (fθ,rθ) since b (fπ,p) = b
856
+
857
+ fφ,rφ
858
+
859
+ = 0
860
+ = b
861
+
862
+ fπ,p fφ,rφ fθ,rθ
863
+
864
+ = b (f)
865
+
866
+ 5
867
+ Supporting Lemmas for Proof of Theorem 2
868
+ 5.1
869
+ Concerning Irreducible Quadratic Factors with 0 < θ < π
870
+ 2
871
+ Let
872
+ αi = rieiθi
873
+ for 1 ≤ i ≤ ℓ
874
+ 8
875
+
876
+ αm+i = rie−iθi
877
+ for 1 ≤ i ≤ ℓ
878
+ ti = cos θi
879
+ f =
880
+
881
+
882
+ i=1
883
+
884
+ x2 − 2ritix + r2
885
+ i
886
+
887
+ =
888
+
889
+
890
+ i=1
891
+ (x − αi)(x − αℓ+i) =
892
+ 2ℓ
893
+
894
+ i=0
895
+ aixi
896
+ s = b(f)
897
+ g = xs−1 + bs−2xs−2 + · · · + b1x + b0
898
+ ck = coeff(gf, xk)
899
+ Note that
900
+ 1. ai = (−1)2ℓ−ie2ℓ−i (α1, . . . , α2ℓ) where ek (α1, . . . , α2ℓ) is the elementary symmetric polynomial of
901
+ degree k in the roots α1, . . . , α2ℓ. When ℓ = 0, we define e0 = 1.
902
+ 2. ti > 0 since 0 < θi < π
903
+ 2 .
904
+ Lemma 10
905
+
906
+ ℓ≥0
907
+
908
+ π
909
+ 2 >θ1≥...≥θℓ>0
910
+
911
+ rθ1,...,rθℓ>0 opt (fθ,rθ) = b (fθ,rθ)
912
+ Proof: We need to prove the following claim for every ℓ ≥ 0.
913
+
914
+ π
915
+ 2 >θ1≥...≥θℓ>0
916
+
917
+ rθ1 ,...,rθℓ>0 opt (fθ,rθ) = s
918
+ By Lemma 11, it suffices to show
919
+
920
+ π
921
+ 2 >θ1≥...≥θℓ>0
922
+
923
+ rθ1 ,...,rθℓ>0
924
+
925
+ g∈R[x]
926
+ deg(g)=s−1
927
+
928
+ 0≤k≤2ℓ+s−1 ck < 0
929
+ ⇐⇒
930
+
931
+ 0<t1≤···≤tℓ<1
932
+
933
+ rθ1 ,...,rθℓ>0 ∀
934
+ b
935
+
936
+ 0≤k≤2ℓ+s−1
937
+ ck < 0
938
+ ⇐⇒
939
+
940
+ 0<t1≤···≤tℓ<1
941
+
942
+ rθ1 ,...,rθℓ>0 ∀
943
+ b
944
+
945
+ 0≤k≤2ℓ+s−2
946
+ ck < 0
947
+ (since the leading coefficient bs−1 = 1)
948
+ 1. Case 1: ℓ = 0
949
+ Here, f = 1. The claim is trivially true since opt (fθ,rθ) = b (fθ,rθ) = 0.
950
+ 2. Case 2: ℓ = 1
951
+ Immediate from Remark ??.
952
+ 3. Case 3: ℓ = 2
953
+ Immediate from Lemma 12.
954
+ 4. Case 3: ℓ ≥ 3
955
+ Immediate from Lemma 13.
956
+
957
+ Lemma 11
958
+
959
+ g, deg(g)=s ∀
960
+ k ck ≥ 0
961
+ =⇒
962
+
963
+ g, deg(g)<s ∀
964
+ k ck ≥ 0
965
+ Proof: We will prove via the contrapositive:
966
+
967
+ g, deg(g)<s ∀
968
+ k ck ≥ 0
969
+ =⇒
970
+
971
+ g, deg(g)=s ∀
972
+ k ck ≥ 0
973
+ 9
974
+
975
+ 1. Assume
976
+
977
+ g, deg(g)<s
978
+
979
+ k
980
+ ck ≥ 0.
981
+ Then there exists a g with deg(g) = t < s such that gf has all
982
+ non-negative coefficients. Let u = s − t.
983
+ 2. Consider the multiplier xu g. Note that xu gf = xu(gf) must have all non-negative coefficients and
984
+ deg(xu g) = u + t = s.
985
+ 3. Then there exists a multiplier, xu g with degree equal to s such that the product has all non-negative
986
+ coefficients.
987
+ 4. Hence we have
988
+
989
+ g, deg(g)<s ∀
990
+ k ck ≥ 0
991
+ =⇒
992
+
993
+ g, deg(g)=s ∀
994
+ k ck ≥ 0
995
+
996
+ Lemma 12 For ℓ = 2,
997
+
998
+ 0<t1≤t2<1
999
+
1000
+ r1,r2>0 ∀
1001
+ b
1002
+
1003
+ 0≤k≤2ℓ+s−2
1004
+ ck < 0
1005
+ Proof: We will prove the following stronger statement.
1006
+
1007
+ 0<t1≤t2<1
1008
+
1009
+ r1,r2>0 ∀
1010
+ b
1011
+
1012
+ k∈{s−2,s−1, 2ℓ+s−3, 2ℓ+s−2}
1013
+ ck < 0.
1014
+ 1. Let t1, t2 be such that 0 < t1 ≤ t2 < 1. Let r1 > 0.
1015
+ 2. Note
1016
+ cs−2 = a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + a4bs−6
1017
+ = a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + bs−6
1018
+ cs−1 = a0bs−1 + a1bs−2 + a2bs−3 + a3bs−4 + a4bs−5
1019
+ = a0 + a1bs−2 + a2bs−3 + a3bs−4 + bs−5
1020
+ c2ℓ+s−3 = a2bs−1 + a3bs−2 + a4bs−3
1021
+ = a2 + a3bs−2 + bs−3
1022
+ c2ℓ+s−2 = a3bs−1 + a4bs−2
1023
+ = a3 + bs−2
1024
+ (a) Note that coeff(gf, xk) =
1025
+
1026
+ i+j=k
1027
+ aibj =
1028
+ k
1029
+
1030
+ i=0
1031
+ aibk−i for 0 ≤ k ≤ 2ℓ + s − 1.
1032
+ Recall from Lemma 3 for 0 ≤ i ≤ 2ℓ and 0 ≤ j ≤ s − 1
1033
+ coeffs(gf) =
1034
+
1035
+ b0
1036
+ · · ·
1037
+ bs−1
1038
+
1039
+
1040
+ 
1041
+ a0
1042
+ · · ·
1043
+ · · ·
1044
+ a2ℓ
1045
+ ...
1046
+ ...
1047
+ a0
1048
+ · · ·
1049
+ · · ·
1050
+ a2ℓ
1051
+
1052
+ 
1053
+ Then
1054
+ coeff(gf, xk) =
1055
+
1056
+ i+j=k
1057
+ aibj
1058
+ 10
1059
+
1060
+ (b) Then
1061
+ cs−2 =
1062
+
1063
+ i+j=s−2
1064
+ aibj
1065
+ = a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + a4bs−6
1066
+ = a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + bs−6
1067
+ since a4 = 1
1068
+ cs−1 =
1069
+
1070
+ i+j=s−1
1071
+ aibj
1072
+ = a0bs−1 + a1bs−2 + a2bs−3 + a3bs−4 + a4bs−5
1073
+ = a0 + a1bs−2 + a2bs−3 + a3bs−4 + bs−5
1074
+ since a4 = bs−1 = 1
1075
+ c2ℓ+s−3 =
1076
+
1077
+ i+j=2ℓ+s−3
1078
+ aibj =
1079
+
1080
+ i+j=s+1
1081
+ aibj
1082
+ = a2bs−1 + a3bs−2 + a4bs−3
1083
+ = a2 + a3bs−2 + bs−3
1084
+ since a4 = bs−1 = 1
1085
+ c2ℓ+s−2 =
1086
+
1087
+ i+j=2ℓ+s−2
1088
+ aibj =
1089
+
1090
+ i+j=s+2
1091
+ aibj
1092
+ = a3bs−1 + a4bs−2
1093
+ = a3 + bs−2
1094
+ since a4 = bs−1 = 1
1095
+ 3. Claim 1: When s = 2,
1096
+
1097
+ r(1)
1098
+ 2
1099
+ >0
1100
+
1101
+ r2≥r(1)
1102
+ 2
1103
+
1104
+ b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0.
1105
+ (a) Note
1106
+ cs−1 = a0 + a1b0
1107
+ c2ℓ+s−2 = a3 + b0
1108
+ (b) We have
1109
+ cs−1 < 0
1110
+ ⇐⇒
1111
+ b0 > −a0
1112
+ a1
1113
+ ⇐⇒
1114
+ b0 > e4(α1, α2, α3, α4)
1115
+ e3(α1, α2, α3, α4)
1116
+ ⇐⇒
1117
+ b0 >
1118
+ r1r2
1119
+ 2r2t1 + 2r1t2
1120
+ c2ℓ+s−2 < 0
1121
+ ⇐⇒
1122
+ b0 < −a3
1123
+ ⇐⇒
1124
+ b0 < e1(α1, α2, α3, α4)
1125
+ ⇐⇒
1126
+ b0 < 2r1t1 + 2r2t2
1127
+ (c) Note
1128
+
1129
+ r2>0 ∀
1130
+ b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0. Note
1131
+
1132
+ b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0
1133
+ ⇐=
1134
+ r1r2
1135
+ 2r2t1 + 2r1t2
1136
+ < 2r1t1 + 2r2t2
1137
+ ⇐⇒
1138
+ r1r2
1139
+ (2r2t1 + 2r1t2)(2r1t1 + 2r2t2)
1140
+ < 1
1141
+ Note
1142
+
1143
+ b0
1144
+ lim
1145
+ r2→∞
1146
+ r1r2
1147
+ (2r2t1 + 2r1t2)(2r1t1 + 2r2t2) = 0
1148
+ since
1149
+ degr2 (r1r2) = 1
1150
+ degr2 ((2r2t1 + 2r1t2)(2r1t1 + 2r2t2)) = 2
1151
+ (d) Hence
1152
+
1153
+ r2>0 ∀
1154
+ b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0.
1155
+ 11
1156
+
1157
+ 4. Let s ≥ 3.
1158
+ 5. Note
1159
+ cs−2 = 0 ⇐⇒ bs−3 = −a0
1160
+ a1
1161
+ bs−2 − a2bs−4 + a3bs−5 + bs−6
1162
+ a1
1163
+ c2ℓ+s−3 = 0 ⇐⇒ bs−3 = −a3bs−2 − a2
1164
+ Let b0, . . . , bs−4 be arbitrary but fixed.
1165
+ Let Lk be the line given by ck = 0. Let µk be the slope of Lk. Then µs−2 = −a0
1166
+ a1
1167
+ and µ2ℓ+s−3 = −a3.
1168
+ 6. Since ai = (−1)4−ie4−i (α1, α2, α3, α4), we have
1169
+ a0 = e4 (α1, α2, α3, α4)
1170
+ a1 = −e3 (α1, α2, α3, α4)
1171
+ a3 = −e1 (α1, α2, α3, α4)
1172
+ Then
1173
+ µs−2
1174
+ = e4 (α1, α2, α3, α4)
1175
+ e3 (α1, α2, α3, α4)
1176
+ =
1177
+ r1r2
1178
+ 2r2t1 + 2r1t2
1179
+ µ2ℓ+s−3
1180
+ = e1 (α1, α2, α3, α4)
1181
+ = 2r1t1 + 2r2t2
1182
+ 7. Claim 2:
1183
+
1184
+ r(2)
1185
+ 2
1186
+ >0
1187
+
1188
+ r2≥r(2)
1189
+ 2
1190
+ µ2ℓ+s−3 > µs−2.
1191
+ (a) Note
1192
+ µ2ℓ+s−3
1193
+ > µs−2
1194
+ ⇐⇒
1195
+ 2r1t1 + 2r2t2
1196
+ >
1197
+ r1r2
1198
+ 2r2t1 + 2r1t2
1199
+ ⇐⇒
1200
+ 1
1201
+ >
1202
+ r1r2
1203
+ (2r2t1 + 2r1t2)(2r1t1 + 2r2t2)
1204
+ (b) Note
1205
+ lim
1206
+ r2→∞
1207
+ r1r2
1208
+ (2r2t1 + 2r1t2)(2r1t1 + 2r2t2) = 0
1209
+ since
1210
+ degr2 (r1r2) = 1
1211
+ degr2 ((2r2t1 + 2r1t2)(2r1t1 + 2r2t2)) = 2
1212
+ 8. Let r(2)
1213
+ 2
1214
+ be such that
1215
+
1216
+ r2≥r(2)
1217
+ 2
1218
+ µ2ℓ+s−3 > µs−2. Such r(2)
1219
+ 2
1220
+ exists due to the previous claim. Let r2 be
1221
+ arbitrary but fixed such that r2 ≥ r(2)
1222
+ 2 .
1223
+ 9. Over the space (bs−2, bs−3), there exists a unique intersection point of Ls−2 and L2ℓ+s−3. Let (p, q) be
1224
+ the intersection point.
1225
+ 10. We have p = a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
1226
+ a0a4 − a1a3
1227
+ and q = −a0a3 − a3(−a2bs−4 − a3bs−5 − bs−6)
1228
+ a0a4 − a1a3
1229
+ .
1230
+ 12
1231
+
1232
+ Note
1233
+ cs−2 = 0
1234
+
1235
+ c2ℓ+s−3 = 0
1236
+ ⇐⇒
1237
+ a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + bs−6 = 0
1238
+
1239
+ a2 + a3bs−2 + a4bs−3 = 0
1240
+ ⇐⇒
1241
+ a0bs−2 + a1bs−3 = −a2bs−4 − a3bs−5 − bs−6
1242
+
1243
+ a3bs−2 + a4bs−3 = −a2
1244
+ ⇐⇒
1245
+
1246
+ a0
1247
+ a1
1248
+ a3
1249
+ a4
1250
+ � �
1251
+ bs−2
1252
+ bs−3
1253
+
1254
+ =
1255
+
1256
+ −a2bs−4 − a3bs−5 − bs−6
1257
+ −a3
1258
+
1259
+ ⇐⇒
1260
+ bs−2 =
1261
+ �������
1262
+ −a2bs−4 − a3bs−5 − bs−6
1263
+ a1
1264
+ −a3
1265
+ a4
1266
+ �������
1267
+ �������
1268
+ a0
1269
+ a1
1270
+ a3
1271
+ a4
1272
+ �������
1273
+
1274
+ bs−3 =
1275
+ �������
1276
+ a0
1277
+ −a2bs−4 − a3bs−5 − bs−6
1278
+ a3
1279
+ −a3
1280
+ �������
1281
+ �������
1282
+ a0
1283
+ a1
1284
+ a3
1285
+ a4
1286
+ �������
1287
+ ⇐⇒
1288
+ bs−2 = a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
1289
+ a0a4 − a1a3
1290
+
1291
+ bs−3 = −a0a3 − a3(−a2bs−4 − a3bs−5 − bs−6)
1292
+ a0a4 − a1a3
1293
+ 11. Claim 3:
1294
+
1295
+ r(2)
1296
+ 2
1297
+ >0
1298
+
1299
+ r2≥r(2)
1300
+ 2
1301
+
1302
+ b0,...,bs−2
1303
+ bs−2>p
1304
+ cs−2 < 0 ∨ c2ℓ+s−3 < 0.
1305
+ Let r(2)
1306
+ 2
1307
+ be such that
1308
+
1309
+ r2≥r(2)
1310
+ 2
1311
+ µ2ℓ+s−3 > µs−2. In the above, we have shown that such r(2)
1312
+ 2
1313
+ exists.
1314
+ Let r2 ≥ r(2)
1315
+ 2
1316
+ be arbitrary but fixed.
1317
+ Let b0, . . . , bs−4 be arbitrary but fixed. We need to show
1318
+
1319
+ bs−2,bs−3
1320
+ bs−2>p
1321
+ cs−2 < 0 ∨ c2ℓ+s−3 < 0.
1322
+ (a) Over the space (bs−2, bs−3) where bs−2 > p, we have
1323
+ i. c2ℓ+s−3 = 0 line and cs−2 = 0 line do not intersect
1324
+ ii. c2ℓ+s−3 = 0 line is above cs−2 = 0 line.
1325
+ (b) Let (bs−2, bs−3) be an arbitrary but fixed point such that bs−2 > p. Then (bs−2, bs−3) is above
1326
+ Ls−2 or below L2ℓ+s−3.
1327
+ (c) Note
1328
+ (bs−2, bs−3) is above Ls−2
1329
+ ⇐⇒
1330
+ bs−3 > − a0
1331
+ a1 bs−2 − a2bs−4+a3bs−5+bs−6
1332
+ a1
1333
+ ⇐⇒
1334
+ cs−2 < 0
1335
+ (bs−2, bs−3) is below L2ℓ+s−3
1336
+ ⇐⇒
1337
+ bs−3 < −a3bs−2 − a2
1338
+ ⇐⇒
1339
+ c2ℓ+s−3 < 0
1340
+ (d) Thus cs−2 < 0 or c2ℓ+s−3 < 0.
1341
+ 12. Claim 4:
1342
+
1343
+ r(3)
1344
+ 2
1345
+ >0
1346
+
1347
+ r2≥r(3)
1348
+ 2
1349
+
1350
+ b0,...,bs−2
1351
+ bs−2≤p
1352
+ c2ℓ+s−2 < 0.
1353
+ (a) Note
1354
+
1355
+ r2>0
1356
+
1357
+ b0,...,bs−2
1358
+ bs−2≤p
1359
+ a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
1360
+ e1 (α1, α2, α3, α4) (a0a4 − a1a3)
1361
+ < 1
1362
+ =⇒
1363
+ c2ℓ+s−2 < 0
1364
+ 13
1365
+
1366
+ since
1367
+ c2ℓ+s−2
1368
+ < 0
1369
+ ⇐⇒
1370
+ bs−2
1371
+ < −a3
1372
+ ⇐=
1373
+ p
1374
+ < −a3
1375
+ since bs−2 ≤ p
1376
+ ⇐⇒
1377
+ a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
1378
+ a0a4 − a1a3
1379
+ < e1 (α1, α2, α3, α4)
1380
+ ⇐⇒
1381
+ a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
1382
+ e1 (α1, α2, α3, α4) (a0a4 − a1a3)
1383
+ < 1
1384
+ (b) Let ek = ek (α1, α2, α3, α4). Note
1385
+ a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
1386
+ e1 (α1, α2, α3, α4) (a0a4 − a1a3)
1387
+ = e3e1 − e0(e2bs−4 − e1bs−5 + bs−6)
1388
+ e1 (e4e0 − e3e1)
1389
+ (c) Note
1390
+
1391
+ b0,...,bs−2
1392
+ lim
1393
+ r2→∞
1394
+ e3e1 − e0(e2bs−4 − e1bs−5 + bs−6)
1395
+ e1 (e4e0 − e3e1)
1396
+ = 0
1397
+ since
1398
+ degr2
1399
+ �e3e1 − e0(e2bs−4 − e1bs−5 + bs−6)
1400
+ e1 (e4e0 − e3e1)
1401
+
1402
+ ≤ 3
1403
+ degr2 (e1 (e4e0 − e3e1)) = 4
1404
+ 13. Claim 5:
1405
+
1406
+ r2>0
1407
+
1408
+ b0,...,bs−2
1409
+
1410
+ 0≤k≤2ℓ+s−2
1411
+ ck < 0
1412
+ From Claim 1, when s = 2, for some r(1)
1413
+ 2
1414
+ > 0 we have
1415
+
1416
+ r2>0 ∀
1417
+ b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0.
1418
+ From Claim 3, when s ≥ 3, for some r(2)
1419
+ 2
1420
+ > 0 we have
1421
+
1422
+ r2>r(1)
1423
+ 2
1424
+
1425
+ b0,...,bs−2
1426
+ bs−2>p
1427
+ cs−2 < 0 ∨ c2ℓ+s−3 < 0.
1428
+ From Claim 4, when s ≥ 3, for some r(3)
1429
+ 2
1430
+ > 0 we have
1431
+
1432
+ r2≥r(2)
1433
+ 2
1434
+
1435
+ b0,...,bs−2
1436
+ bs−2≤p
1437
+ c2ℓ+s−2 < 0.
1438
+ Then for r∗
1439
+ 2 = max{r(1)
1440
+ 2 , r(2)
1441
+ 2 , r(3)
1442
+ 2 }, we have
1443
+
1444
+ r2≥r∗
1445
+ 2
1446
+
1447
+ 
1448
+
1449
+ b0,...,bs−2
1450
+ bs−2>p
1451
+ cs−1 < 0 ∨ cs−2 < 0 ∨ c2ℓ+s−3 < 0
1452
+
1453
+
1454
+ b0,...,bs−2
1455
+ bs−2≤p
1456
+ cs−1 < 0 ∨ c2ℓ+s−2 < 0
1457
+
1458
+ 
1459
+ Hence
1460
+
1461
+ r2>0
1462
+
1463
+ b0,...,bs−2
1464
+
1465
+ k∈{s−2,s−1,2ℓ+s−3,2+s−2}
1466
+ ck < 0.
1467
+
1468
+ Lemma 13 For ℓ ≥ 3,
1469
+
1470
+ 0<t1≤···≤tℓ<1
1471
+
1472
+ r1,...,rℓ>0 ∀
1473
+ b
1474
+
1475
+ 0≤k≤2ℓ+s−2
1476
+ ck < 0
1477
+ 14
1478
+
1479
+ Proof: We will prove the following stronger statement.
1480
+
1481
+ 0<t1≤···≤tℓ<1
1482
+
1483
+ r1,...,rℓ−1>0
1484
+ C(r)<1
1485
+
1486
+ rℓ>0 ∀
1487
+ b
1488
+
1489
+ k∈{s−2, 2ℓ+s−5, 2ℓ+s−2}
1490
+ ck < 0
1491
+ where C(r) = e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1492
+ e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1).
1493
+ 1. Let t1, . . . , tℓ be such that 0 < t1 ≤ · · · ≤ tℓ < 1.
1494
+ 2. Claim 1:
1495
+
1496
+ 0<t1≤···≤tℓ−1<1
1497
+
1498
+ r1,...,rℓ−1>0 C(r) < 1
1499
+ (a) Note
1500
+ e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) = 1
1501
+ e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) = α1 + · · · + αℓ−1 + αℓ+1 + · · · + α2ℓ−1
1502
+ = (α1 + αℓ+1) + · · · + (αℓ−1 + α2ℓ−1)
1503
+ = 2r1t1 + · · · + 2rℓ−1tℓ−1
1504
+ e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) =
1505
+
1506
+ i∈{1,...,ℓ−1,ℓ+1,...,2ℓ−1}
1507
+
1508
+ �
1509
+ j̸=i
1510
+ αj
1511
+
1512
+
1513
+ =
1514
+
1515
+ 1≤i≤ℓ−1
1516
+
1517
+ �
1518
+ j̸=i
1519
+ αj +
1520
+
1521
+ j̸=ℓ+i
1522
+ αj
1523
+
1524
+
1525
+ =
1526
+
1527
+ 1≤i≤ℓ−1
1528
+
1529
+ (αℓ+i + αi)
1530
+
1531
+ j̸=i,ℓ+1
1532
+ αj
1533
+
1534
+
1535
+ =
1536
+
1537
+ 1≤i≤ℓ−1
1538
+
1539
+ (2riti)
1540
+
1541
+ j̸=i
1542
+ r2
1543
+ j
1544
+
1545
+
1546
+ e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) = α1 · · · αℓ−1αℓ+1 · · · α2ℓ−1
1547
+ = α1αℓ+1 · · · αℓ−1α2ℓ−1
1548
+ = r2
1549
+ 1 · · · r2
1550
+ ℓ−1
1551
+ Then
1552
+ C(r) = e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1553
+ e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1554
+ =
1555
+ r2
1556
+ 1 · · · r2
1557
+ ℓ−1
1558
+ (2r1t1 + · · · + 2rℓ−1tℓ−1)
1559
+ ��
1560
+ 1≤i≤ℓ−1
1561
+
1562
+ (2riti) �
1563
+ j̸=i r2
1564
+ j
1565
+ ��
1566
+ =
1567
+ r1 · · · rℓ−1
1568
+ (2r1t1 + · · · + 2rℓ−1tℓ−1)
1569
+ ��
1570
+ 1≤i≤ℓ−1
1571
+
1572
+ (2ti) �
1573
+ j̸=i rj
1574
+ ��
1575
+ =
1576
+ 1
1577
+ (2r1t1 + · · · + 2rℓ−1tℓ−1)
1578
+ �2t1
1579
+ r1
1580
+ + · · · + 2tℓ−1
1581
+ rℓ−1
1582
+
1583
+ (b) Consider the following witness candidates for the existentially quantified variables r1, . . . , rℓ−1:
1584
+ r1 = 2t1
1585
+ 15
1586
+
1587
+ ri = 1
1588
+ 2ti
1589
+ for 2 ≤ t ≤ ℓ − 1
1590
+ (c) Obviously, r1, . . . , rℓ−1 > 0. Note
1591
+ 1
1592
+ (2r1t1 + 2r2t2 + · · · + 2rℓ−1tℓ−1)
1593
+ �2t1
1594
+ r1
1595
+ + 2t2
1596
+ r2
1597
+ + · · · + 2tℓ−1
1598
+ rℓ−1
1599
+
1600
+ =
1601
+ 1
1602
+
1603
+ 2 (2t1) t1 + 2
1604
+ � 1
1605
+ 2t2
1606
+
1607
+ t2 + · · · + 2
1608
+
1609
+ 1
1610
+ 2tℓ−1
1611
+
1612
+ tℓ−1
1613
+ � �
1614
+ 2t1
1615
+ 2t1
1616
+ + 2t2
1617
+ 1
1618
+ 2t2
1619
+ + · · · + 2tℓ−1
1620
+ 1
1621
+ 2tℓ−1
1622
+
1623
+ =
1624
+ 1
1625
+ (4t2
1626
+ 1 + 1 + · · · + 1)
1627
+
1628
+ 1 + 4t2
1629
+ 2 + · · · + 4t2
1630
+ ℓ−1
1631
+
1632
+ < 1
1633
+ Hence the candidates are witnesses.
1634
+ 3. Let r1, . . . , rℓ−1 > 0 be such that C(r) < 1.
1635
+ 4. Note
1636
+ cs−2 = a0bs−2 + a1bs−3 +
1637
+ s−2
1638
+
1639
+ i=2
1640
+ aib(s−2)−i
1641
+ c2ℓ+s−5 = a2ℓ−4bs−1 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + a2ℓbs−5
1642
+ = a2ℓ−4 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + bs−5
1643
+ c2ℓ+s−2 = a2ℓ−1bs−1 + a2ℓbs−2
1644
+ = a2ℓ−1 + bs−2
1645
+ (a) Note that coeff(gf, xk) =
1646
+
1647
+ i+j=k
1648
+ aibj =
1649
+ k
1650
+
1651
+ i=0
1652
+ aibk−i for 0 ≤ k ≤ 2ℓ + s − 1.
1653
+ Recall from Lemma 3 for 0 ≤ i ≤ 2ℓ and 0 ≤ j ≤ s − 1
1654
+ coeffs(gf) =
1655
+
1656
+ b0
1657
+ · · ·
1658
+ bs−1
1659
+
1660
+
1661
+ 
1662
+ a0
1663
+ · · ·
1664
+ · · ·
1665
+ a2ℓ
1666
+ ...
1667
+ ...
1668
+ a0
1669
+ · · ·
1670
+ · · ·
1671
+ a2ℓ
1672
+
1673
+ 
1674
+ Then
1675
+ coeff(gf, xk) =
1676
+
1677
+ i+j=k
1678
+ aibj
1679
+ =
1680
+ k
1681
+
1682
+ i=0
1683
+ aibk−i
1684
+ (b) Then
1685
+ cs−2 =
1686
+ s−2
1687
+
1688
+ i=0
1689
+ aib(s−2)−i
1690
+ 16
1691
+
1692
+ = a0bs−2 + a1bs−3 +
1693
+ s−2
1694
+
1695
+ i=2
1696
+ aib(s−2)−i
1697
+ c2ℓ+s−5 =
1698
+
1699
+ i+j=2ℓ+s−5
1700
+ aibj
1701
+ = a2ℓ−4bs−1 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + a2ℓbs−5
1702
+ = a2ℓ−4 + a2m−3bs−2 + a2m−2bs−3 + a2m−1bs−4 + bs−5
1703
+ since a2ℓ = bs−1 = 1
1704
+ c2ℓ+s−2 =
1705
+
1706
+ i+j=2ℓ+s−2
1707
+ aibj
1708
+ = a2ℓ−1bs−1 + a2ℓbs−2
1709
+ = a2ℓ−1 + bs−2
1710
+ since a2ℓ = bs−1 = 1
1711
+ 5. Note
1712
+ cs−2 = 0 ⇐⇒ bs−3 = −a0
1713
+ a1
1714
+ bs−2 −
1715
+ s−2
1716
+
1717
+ i=2
1718
+ ai
1719
+ a1
1720
+ b(s−2)−i
1721
+ c2ℓ+s−5 = 0 ⇐⇒ bs−3 = −a2ℓ−3
1722
+ a2ℓ−2
1723
+ bs−2 − a2ℓ−1bs−4 + bs−5 + a2ℓ−4
1724
+ a2ℓ−2
1725
+ Let b0, . . . , bs−4 be arbitrary but fixed.
1726
+ Let Lk be the line given by ck = 0. Let µk be the slope of Lk. Then µs−2 = −a0
1727
+ a1
1728
+ and µ2ℓ+s−5 = −a2ℓ−3
1729
+ a2ℓ−2
1730
+ .
1731
+ 6. Since ai = (−1)2ℓ−ie2ℓ−i (α1, . . . , α2ℓ), we have
1732
+ a0 = e2ℓ (α1, . . . , α2ℓ)
1733
+ a1 = −e2ℓ−1 (α1, . . . , α2ℓ)
1734
+ a2ℓ−3 = −e3 (α1, . . . , α2ℓ)
1735
+ a2ℓ−2 = e2 (α1, . . . , α2ℓ)
1736
+ Then µs−2 =
1737
+ e2ℓ (α1, . . . , α2ℓ)
1738
+ e2ℓ−1 (α1, . . . , α2ℓ) and µ2ℓ+s−5 = e3 (α1, . . . , α2ℓ)
1739
+ e2 (α1, . . . , α2ℓ).
1740
+ 7. Claim 2:
1741
+
1742
+ r(1)
1743
+
1744
+ >0
1745
+
1746
+ rℓ≥r(1)
1747
+
1748
+ µ2ℓ+s−5 > µs−2.
1749
+ (a) Note as rℓ → ∞
1750
+ e2ℓ (α1, . . . , α2ℓ) → αℓα2ℓ e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1751
+ e2ℓ−1 (α1, . . . , α2ℓ) → αℓα2ℓ e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1752
+ e3 (α1, . . . , α2ℓ) → αℓα2ℓ e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1753
+ e2 (α1, . . . , α2ℓ) → αℓα2ℓ e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1754
+ Then
1755
+ µs−2 → e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1756
+ e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1757
+ µ2ℓ+s−5 → e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1758
+ e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1759
+ 17
1760
+
1761
+ (b) Then for sufficiently large rℓ,
1762
+ µ2ℓ+s−5
1763
+ > µs−2
1764
+ ⇐⇒
1765
+ e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1766
+ e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1767
+ > e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1768
+ e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
1769
+ ⇐⇒
1770
+ 1
1771
+ > C(r)
1772
+ which is true for the r1, . . . , rℓ−1 we have chosen based on Claim 1.
1773
+ 8. Let r(1)
1774
+
1775
+ be such that
1776
+
1777
+ rℓ≥r(1)
1778
+
1779
+ µ2ℓ+s−5 > µs−2. Such r(1)
1780
+
1781
+ exists due to the previous claim. Let rℓ be
1782
+ arbitrary but fixed such that rℓ ≥ r(1)
1783
+ ℓ .
1784
+ 9. Over the space (bs−2, bs−3), there exists a unique intersection point of Ls−2 and L2ℓ+s−5. Let (p, q) be
1785
+ the intersection point.
1786
+ 10. We have p =
1787
+ a2ℓ−2d0 − a1d1
1788
+ a0a2ℓ−2 − a1a2ℓ−3
1789
+ and q =
1790
+ a0d1 − a2ℓ−3d0
1791
+ a0a2ℓ−2 − a1a2ℓ−3
1792
+ where d0 = −
1793
+ s−2
1794
+
1795
+ i=2
1796
+ aib(s−2)−i and d1 =
1797
+ −a2ℓ−1bs−4 − bs−5 − a2ℓ−4.
1798
+ Note
1799
+ cs−2 = 0
1800
+
1801
+ c2ℓ+s−5 = 0
1802
+ ⇐⇒
1803
+ a0bs−2 + a1bs−3 + �s−2
1804
+ i=2 aib(s−2)−i = 0
1805
+
1806
+ a2ℓ−4 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + bs−5 = 0
1807
+ ⇐⇒
1808
+ a0bs−2 + a1bs−3 = − �s−2
1809
+ i=2 aib(s−2)−i
1810
+
1811
+ a2ℓ−3bs−2 + a2ℓ−2bs−3 = −a2ℓ−1bs−4 − bs−5 − a2ℓ−4
1812
+ ⇐⇒
1813
+ a0bs−2 + a1bs−3 = d0
1814
+ where d0 = − �s−2
1815
+ i=2 aib(s−2)−i
1816
+
1817
+ a2ℓ−3bs−2 + a2ℓ−2bs−3 = d1
1818
+ where d1 = −a2ℓ−1bs−4 − bs−5 − a2ℓ−4
1819
+ ⇐⇒
1820
+
1821
+ a0
1822
+ a1
1823
+ a2ℓ−3
1824
+ a2ℓ−2
1825
+ � �
1826
+ bs−2
1827
+ bs−3
1828
+
1829
+ =
1830
+
1831
+ d0
1832
+ d1
1833
+
1834
+ ⇐⇒
1835
+ bs−2 =
1836
+ �������
1837
+ d0
1838
+ a1
1839
+ d1
1840
+ a2ℓ−2
1841
+ �������
1842
+ �������
1843
+ a0
1844
+ a1
1845
+ a2ℓ−3
1846
+ a2ℓ−2
1847
+ �������
1848
+
1849
+ bs−3 =
1850
+ �������
1851
+ a0
1852
+ d0
1853
+ a2ℓ−3
1854
+ d1
1855
+ �������
1856
+ �������
1857
+ a0
1858
+ a1
1859
+ a2ℓ−3
1860
+ a2ℓ−2
1861
+ �������
1862
+ ⇐⇒
1863
+ bs−2 =
1864
+ a2ℓ−2d0 − a1d1
1865
+ a0a2ℓ−2 − a1a2ℓ−3
1866
+
1867
+ bs−3 =
1868
+ a0d1 − a2ℓ−3d0
1869
+ a0a2ℓ−2 − a1a2ℓ−3
1870
+ 11. Claim 3:
1871
+
1872
+ r(1)
1873
+
1874
+ >0
1875
+
1876
+ rℓ≥r(1)
1877
+
1878
+
1879
+ b0,...,bs−2
1880
+ bs−2>p
1881
+ cs−2 < 0 ∨ c2ℓ+s−5 < 0.
1882
+ Let r(1)
1883
+
1884
+ be such that
1885
+
1886
+ rℓ≥r(1)
1887
+
1888
+ µ2ℓ+s−5 > µs−2. In the above, we have shown that such r(1)
1889
+
1890
+ exists.
1891
+ Let rℓ ≥ r(1)
1892
+
1893
+ be arbitrary but fixed.
1894
+ Let b0, . . . , bs−4 be arbitrary but fixed. We need to show
1895
+
1896
+ bs−2,bs−3
1897
+ bs−2>p
1898
+ cs−2 < 0 ∨ c2ℓ+s−5 < 0.
1899
+ (a) Over the space (bs−2, bs−3) where bs−2 > p, we have
1900
+ 18
1901
+
1902
+ i. c2ℓ+s−5 = 0 line and cs−2 = 0 line do not intersect
1903
+ ii. c2ℓ+s−5 = 0 line is above cs−2 = 0 line.
1904
+ (b) Let (bs−2, bs−3) be an arbitrary but fixed point such that bs−2 > p. Then (bs−2, bs−3) is above
1905
+ Ls−2 or below L2ℓ+s−5.
1906
+ (c) Note
1907
+ (bs−2, bs−3) is above Ls−2
1908
+ ⇐⇒
1909
+ bs−3 > − a0
1910
+ a1 bs−2 − d0
1911
+ a1
1912
+ ⇐⇒
1913
+ cs−2 < 0
1914
+ (bs−2, bs−3) is below L2ℓ+s−5
1915
+ ⇐⇒
1916
+ bs−3 < − a2ℓ−3
1917
+ a2ℓ−2 bs−2 −
1918
+ d1
1919
+ a2ℓ−2
1920
+ ⇐⇒
1921
+ c2ℓ+s−5 < 0
1922
+ since a1 = (−1)2ℓ−1e2ℓ−1 (α1, . . . , α2ℓ) < 0 and a2ℓ−2 = (−1)2e2 (α1, . . . , α2ℓ) > 0.
1923
+ (d) Thus cs−2 < 0 or c2ℓ+s−5 < 0.
1924
+ 12. Claim 4:
1925
+
1926
+ r(2)
1927
+
1928
+ >0
1929
+
1930
+ rℓ≥r(2)
1931
+
1932
+
1933
+ b0,...,bs−2
1934
+ bs−2≤p
1935
+ c2ℓ+s−2 < 0.
1936
+ (a) Note
1937
+
1938
+ rℓ>0
1939
+
1940
+ b0,...,bs−2
1941
+ bs−2≤p
1942
+ a2ℓ−2d0 − a1d1
1943
+ e1 (α1, . . . , α2ℓ) (a0a2ℓ−2 − a1a2ℓ−3) < 1
1944
+ =⇒
1945
+ c2+s−2 < 0
1946
+ since
1947
+ c2ℓ+s−2
1948
+ < 0
1949
+ ⇐⇒
1950
+ bs−2
1951
+ < −a2ℓ−1
1952
+ ⇐=
1953
+ p
1954
+ < −a2ℓ−1
1955
+ since bs−2 ≤ p
1956
+ ⇐⇒
1957
+ a2ℓ−2d0 − a1d1
1958
+ a0a2ℓ−2 − a1a2ℓ−3
1959
+ < e1 (α1, . . . , α2ℓ)
1960
+ ⇐⇒
1961
+ a2ℓ−2d0 − a1d1
1962
+ e1 (α1, . . . , α2ℓ) (a0a2ℓ−2 − a1a2ℓ−3)
1963
+ < 1
1964
+ (b) Let ek = ek (α1, . . . , α2ℓ). Note
1965
+ a2ℓ−2d0 − a1d1
1966
+ e1 (α1, . . . , α2ℓ) (a0a2ℓ−2 − a1a2ℓ−3)
1967
+ = −e2
1968
+ �s−2
1969
+ i=2 (−1)2ℓ−ie2ℓ−ib(s−2)−i + e2ℓ−1 (e1bs−4 − bs−5 − e4)
1970
+ e1 (e2ℓe2 − e2ℓ−1e3)
1971
+ (c) Note
1972
+
1973
+ b0,...,bs−2
1974
+ lim
1975
+ rℓ→∞
1976
+ −e2
1977
+ �s−2
1978
+ i=2 (−1)2ℓ−ie2ℓ−ib(s−2)−i + e2ℓ−1 (e1bs−4 − bs−5 − e4)
1979
+ e1 (e2ℓe2 − e2ℓ−1e3)
1980
+ = 0
1981
+ since
1982
+ degrℓ
1983
+
1984
+ −e2
1985
+ s−2
1986
+
1987
+ i=2
1988
+ (−1)2ℓ−ie2ℓ−ib(s−2)−i + e2ℓ−1 (e1bs−4 − bs−5 − e4)
1989
+
1990
+ ≤ 4
1991
+ degrℓ (e1 (e2ℓe2 − e2ℓ−1e3)) = 5
1992
+ 13. Claim 5:
1993
+
1994
+ rℓ>0
1995
+
1996
+ b0,...,bs−2
1997
+
1998
+ 0≤k≤2ℓ+s−2
1999
+ ck < 0
2000
+ From Claim 3, for some r(1)
2001
+
2002
+ > 0 we have
2003
+
2004
+ rℓ>r(1)
2005
+
2006
+
2007
+ b0,...,bs−2
2008
+ bs−2>p
2009
+ cs−2 < 0 ∨ c2ℓ+s−5 < 0.
2010
+ 19
2011
+
2012
+ From Claim 4, for some r(2)
2013
+
2014
+ > 0 we have
2015
+
2016
+ rℓ≥r(2)
2017
+
2018
+
2019
+ b0,...,bs−2
2020
+ bs−2≤p
2021
+ c2ℓ+s−2 < 0.
2022
+ Then for r∗
2023
+ ℓ = max{r(1)
2024
+ ℓ , r(2)
2025
+ ℓ }, we have
2026
+
2027
+ rℓ≥r∗
2028
+
2029
+
2030
+ 
2031
+
2032
+ b0,...,bs−2
2033
+ bs−2>p
2034
+ cs−2 < 0 ∨ c2ℓ+s−5 < 0
2035
+
2036
+
2037
+ b0,...,bs−2
2038
+ bs−2≤p
2039
+ c2ℓ+s−2 < 0
2040
+
2041
+ 
2042
+ Hence
2043
+
2044
+ rℓ>0
2045
+
2046
+ b0,...,bs−2
2047
+
2048
+ k∈{s−2,2ℓ+s−5,2ℓ+s−2}
2049
+ ck < 0.
2050
+
2051
+ Lemma 14 If arg(αi) < π
2052
+ 2 , then ek (α1, . . . , α2ℓ) > 0 for k = 0, . . . , 2ℓ.
2053
+ Proof: We will induct on ℓ, the number of quadratic factors of f with non-real roots.
2054
+ 1. Base Case: ℓ = 0
2055
+ Note that e0 = 1 > 0.
2056
+ 2. Hypothesis: Assume ek (α1, . . . , α2ℓ) > 0 for ℓ ≥ 1 and 0 ≤ k ≤ 2ℓ.
2057
+ 3. Induction Step: Prove ek
2058
+
2059
+ α1, . . . , α2(ℓ+1)
2060
+
2061
+ > 0 for 0 ≤ k ≤ 2(ℓ + 1).
2062
+ Let fℓ =
2063
+
2064
+
2065
+ i=1
2066
+
2067
+ x2 − 2ritix + r2
2068
+ i
2069
+
2070
+ and aℓ,k = coeff(fℓ, xk). Note that
2071
+ fℓ+1
2072
+ =
2073
+
2074
+ x2 − 2rℓ+1tℓ+1x + r2
2075
+ ℓ+1
2076
+
2077
+ fℓ
2078
+ aℓ+1,k
2079
+ = aℓ,k−2 − 2rℓ+1,t+1aℓ,k−1 + r2
2080
+ ℓ+1aℓ,k
2081
+ Then
2082
+ aℓ+1,k = (−1)2(ℓ+1)−ke2(ℓ+1)−k
2083
+
2084
+ α1, . . . , α2(ℓ+1)
2085
+
2086
+ = (−1)2ℓ−(k−2)e2ℓ−(k−2) (α1, . . . , α2ℓ)
2087
+ − 2rℓ+1tℓ+1(−1)2ℓ−(k−1)e2ℓ−(k−1) (α1, . . . , α2ℓ)
2088
+ + r2
2089
+ ℓ+1(−1)2ℓ−ke2ℓ−k (α1, . . . , α2ℓ)
2090
+ Hence
2091
+ e2(ℓ+1)−k
2092
+
2093
+ α1, . . . , α2(ℓ+1)
2094
+
2095
+ = e2ℓ−(k−2) (α1, . . . , α2ℓ)
2096
+ − 2rℓ+1tℓ+1(−1)−1e2ℓ−(k−1) (α1, . . . , α2ℓ)
2097
+ + r2
2098
+ ℓ+1(−1)−2e2ℓ−k (α1, . . . , α2ℓ)
2099
+ = e2ℓ−(k−2) (α1, . . . , α2ℓ)
2100
+ + 2rℓ+1tℓ+1e2ℓ−(k−1) (α1, . . . , α2ℓ)
2101
+ + r2
2102
+ ℓ+1e2ℓ−k (α1, . . . , α2ℓ)
2103
+ > 0
2104
+ by the inductive hypothesis and the fact that rℓ+1, tℓ+1 > 0.
2105
+
2106
+ 20
2107
+
2108
+ 5.2
2109
+ Concerning Linear and Irreducible Quadratic Factors with π
2110
+ 2 < θ < π
2111
+ Lemma 15 We have
2112
+
2113
+ π>φ1≥···≥φk≥ π
2114
+ 2
2115
+
2116
+ π
2117
+ 2 >θ1≥···≥θℓ>0
2118
+
2119
+ p1,...,pt>0
2120
+
2121
+ rφ1,...,rφk>0
2122
+
2123
+ rθ1,...,θℓ>0
2124
+ opt
2125
+
2126
+ fπ,p fφ,rφ fθ,rθ
2127
+
2128
+ = opt (fθ,rθ)
2129
+ Proof: We will first induct on k, the number of quadratic factors with π
2130
+ 2 ≤ φi < π in fφ,rφ, to show that
2131
+ opt
2132
+
2133
+ fφ,rφ fθ,rθ
2134
+
2135
+ = opt (fθ,rθ).
2136
+ 1. Base: The claim holds for k = 0.
2137
+ Trivially true.
2138
+ 2. Hypo: Assume the claim holds for k quadratic factors with π
2139
+ 2 ≤ φi < π.
2140
+
2141
+ rφ1,...,rφk>0
2142
+
2143
+ rθ1 ,...,rθℓ>0
2144
+ opt
2145
+
2146
+ fφ,rφ fθ,rθ
2147
+
2148
+ = opt (fθ,rθ)
2149
+ 3. Induction Step: Consider k + 1 quadratic factors with π
2150
+ 2 ≤ φi < π.
2151
+ Assume rφ1, . . . , rφk > 0 are such that the induction hypothesis holds. By Lemma 19,
2152
+
2153
+ rφk+1 >0
2154
+
2155
+ rθ1,...,rθℓ>0
2156
+ opt
2157
+ ��
2158
+ x2 − 2rφk+1 cos φk+1 x + r2
2159
+ φk+1
2160
+
2161
+ fφ,rφ fθ,rθ
2162
+
2163
+ = opt
2164
+
2165
+ x2 − 2rφk+1 cos φk+1 x + r2
2166
+ φk+1
2167
+
2168
+ + opt
2169
+
2170
+ fφ,rφ fθ,rθ
2171
+
2172
+ By Remark ??, opt
2173
+
2174
+ x2 − 2rφk+1 cos φk+1 x + r2
2175
+ φk+1
2176
+
2177
+ = 0, so we have
2178
+ opt
2179
+ ��
2180
+ x2 − 2rφk+1 cos φk+1 x + r2
2181
+ φk+1
2182
+
2183
+ fφ,rφ fθ,rθ
2184
+
2185
+ = opt
2186
+
2187
+ fφ,rφ fθ,rθ
2188
+
2189
+ = opt (fθ,rθ)
2190
+ Hence, we have
2191
+
2192
+ rφ1,...,rφk>0
2193
+
2194
+ rθ1 ,...,rθℓ>0
2195
+ opt
2196
+
2197
+ fφ,rφ fθ,rθ
2198
+
2199
+ = opt (fθ,rθ).
2200
+ Now we will induct on t, the number of linear factors in fπ,p, to show that
2201
+
2202
+ p1,...,pt>0
2203
+
2204
+ rφ1,...,rφk>0
2205
+
2206
+ rθ1,...,rθℓ>0
2207
+ opt
2208
+
2209
+ fπ,p fφ,rφ fθ,rθ
2210
+
2211
+ = opt (fθ,rθ)
2212
+ 1. Base: The claim holds for t = 0.
2213
+ Trivially true.
2214
+ 2. Hypo: Assume the claim holds for t linear factors.
2215
+
2216
+ p1,...,pt>0
2217
+
2218
+ rφ1,...,rφk>0
2219
+
2220
+ rθ1 ,...,rθℓ>0
2221
+ opt
2222
+
2223
+ fπ,p fφ,rφ fθ,rθ
2224
+
2225
+ = opt (fθ,rθ)
2226
+ 3. Induction Step: Consider t + 1 linear factors.
2227
+ Assume p1, . . . , pt, rφ1, . . . , rφk > 0 are such that the induction hypothesis holds. By Lemma 18,
2228
+
2229
+ pt+1>0
2230
+
2231
+ rθ1,...,rθℓ>0
2232
+ opt ((x + pt+1) fπ,p fφ,σ fθ,τ) = opt (x + pt+1) + opt (fπ,p fφ,σ fθ,τ)
2233
+ By Lemma 16, opt (x + pt+1) = 0, so we have
2234
+ opt ((x + pt+1) fπ,p fφ,σ fθ,τ) = opt
2235
+
2236
+ fπ,p fφ,rφ fθ,rθ
2237
+
2238
+ = opt (fθ,rθ)
2239
+ Hence, we have
2240
+
2241
+ p1,...,pt>0
2242
+
2243
+ rφ1 ,...,rφk>0
2244
+
2245
+ rθ1,...,rθℓ>0
2246
+ opt
2247
+
2248
+ fπ,p fφ,rφ fθ,rθ
2249
+
2250
+ = opt (fθ,rθ).
2251
+ 21
2252
+
2253
+
2254
+ Notation 2 Note
2255
+ • hr = x + r
2256
+ • hθ,r = x2 − 2r cos θ x + r2
2257
+ • P = {f ∈ R[x] : f(x) > 0 for x ≥ 0}
2258
+ Lemma 16
2259
+
2260
+ f∈P, deg(f)=1 opt (f) = b (f)
2261
+ Proof: Note that b (f) = 0. □
2262
+ Lemma 17
2263
+
2264
+ f∈P, deg(f)=2 opt (f) = b (f)
2265
+ Proof: By Theorem 1. □
2266
+ Lemma 18
2267
+
2268
+ f∈P, deg(f)≥1 ∃
2269
+ r>0 opt (hr f) = opt (hr) + opt (f)
2270
+ Proof: Let f ∈ P. Let h = hr f. We need to show ∃
2271
+ r>0 opt(h) = opt(f). We will divide the proof into several
2272
+ claims.
2273
+ C1:
2274
+
2275
+ r>0 opt(h) = opt(f)
2276
+ ⇐=
2277
+
2278
+ r>0 CH(T ∗
2279
+ h,0, . . . , T ∗
2280
+ h,s−1) ∩ Rn
2281
+ ≥0 = ∅
2282
+ where
2283
+ • n = deg (f)
2284
+ • s = opt(f)
2285
+ • The Th,i are the rows of Ts−1 for h.
2286
+ • T ∗
2287
+ h,i is obtained from Th,i by deleting the first element.
2288
+ Proof: Note
2289
+ opt(h) = opt(f)
2290
+ ⇐⇒
2291
+ opt(h) ≥ s
2292
+ since
2293
+ opt(h) ≤ opt(f) + opt(x + r) = opt(f) = s
2294
+ ⇐⇒
2295
+ ¬
2296
+
2297
+ g̸=0, deg(g)<s coeffs(gh) ≥ 0
2298
+ ⇐⇒
2299
+ ¬
2300
+
2301
+ CH(Th,0, . . . , Th,s−1) ∩ Rn+1
2302
+ ≥0
2303
+ ̸= ∅
2304
+
2305
+ ⇐⇒
2306
+ CH(Th,0, . . . , Th,s−1) ∩ Rn+1
2307
+ ≥0
2308
+ = ∅
2309
+ ⇐=
2310
+ CH(T ∗
2311
+ h,0, . . . , T ∗
2312
+ h,s−1) ∩ Rn
2313
+ ≥0 = ∅.
2314
+ C2:
2315
+
2316
+ r>0 opt(h) = opt(f)
2317
+ ⇐=
2318
+
2319
+ r>0εh (r) > 0
2320
+ where εh (r) stands for the minimum Euclidean distance between CH(T ∗
2321
+ h,0, . . . , T ∗
2322
+ h,s−1) and Rn
2323
+ ≥0, that
2324
+ is,
2325
+ εh(r) :=
2326
+ min
2327
+ x∈CH(T ∗
2328
+ h,0,...,T ∗
2329
+ h,s−1)
2330
+ y∈Rn
2331
+ ≥0
2332
+ ∥x − y∥
2333
+ Proof: Immediate from the above claim.
2334
+ 22
2335
+
2336
+ C3: εh (r) is continuous at r = 0.
2337
+ Proof: We will divide it into several steps.
2338
+ (a) Note
2339
+ εh(r) =
2340
+ min
2341
+ c∈Rs
2342
+ ≥0
2343
+ c0+···+cs−1=1
2344
+ y∈Rn
2345
+ ≥0
2346
+ �����
2347
+ s−1
2348
+
2349
+ i=0
2350
+ ciT ∗
2351
+ h,i − y
2352
+ �����
2353
+ =
2354
+ min
2355
+ c∈Rs
2356
+ ≥0
2357
+ c0+···+cs−1=1
2358
+ y∈Rn
2359
+ ≥0
2360
+ �����
2361
+ �s−1
2362
+
2363
+ i=0
2364
+ ciT ∗
2365
+ h,i,1 − y1 , . . . ,
2366
+ s−1
2367
+
2368
+ i=0
2369
+ ciT ∗
2370
+ h,i,n − yn
2371
+ ������
2372
+ =
2373
+ min
2374
+ z∈Rs+n
2375
+ ≥0
2376
+ z0+···+zs−1=1
2377
+ �����
2378
+ �s−1
2379
+
2380
+ i=0
2381
+ ziT ∗
2382
+ h,i,1 − zs , . . . ,
2383
+ s−1
2384
+
2385
+ i=0
2386
+ ziT ∗
2387
+ h,i,n − zs+n−1
2388
+ ������
2389
+ where z = (c, y)
2390
+ = min
2391
+ z∈C p (z, r)
2392
+ where p(z, r) is Euclidean distance and
2393
+ C =
2394
+
2395
+ z ∈ Rs+n
2396
+ ≥0 : z1 + · · · + zs = 1
2397
+
2398
+ .
2399
+ (b) Note, since p(z, r) is the distance between two closed sets, the minimum distance is realized by a
2400
+ point in each set. Hence,
2401
+ εh(r) = min
2402
+ z∈C p (z, r) = inf
2403
+ z∈C p (z, r) .
2404
+ (c) Note the following:
2405
+ i. By Section 3.1.5 of [2], p(z, r) is a convex function since p(z, r) is a norm.
2406
+ ii. By Section 3.2.5 of [2], εh(r) = inf
2407
+ z∈C p (z, r) is a convex function, since C is convex and p(z, r)
2408
+ is bounded below.
2409
+ iii. By Corollary 3.5.3 in [4], since εh(r) is a convex function defined on a convex set R, εh(r) is
2410
+ continuous on the relative interior of R, ri (R) = R.
2411
+ iv. Hence, εh(r) is continuous at r = 0.
2412
+ C4: εh (0) > 0.
2413
+ Proof: Let r = 0. Then h = x · f.
2414
+ (a) Subclaim: T ∗
2415
+ h,i,j = Tf,i,j. Note that these are the entries of T ∗
2416
+ h,s−1 and Tf,s−1. We will prove the
2417
+ claim using the fact that Ts−1 = R−1
2418
+ s−1Ls−1 for any f.
2419
+ i. Note Rf,s−1 = Rh,s−1. This is clear from the definition of Rs−1. Hence R−1
2420
+ f,s−1 = R−1
2421
+ h,s−1.
2422
+ ii. Note that Lf,i,j = Lh,i,j+1. This is clear from the definition of Ls−1, since Lh,s−1 is composed
2423
+ of Lf,s−1 with a column of zeroes added on the left.
2424
+ iii. Note that for i = 0, . . . , s − 1 and j = 0, . . . , n − 1,
2425
+ T ∗
2426
+ h,i,j = Th,i,j+1
2427
+ =
2428
+ s−1
2429
+
2430
+ k=0
2431
+ R−1
2432
+ h,i,kLh,k,j+1
2433
+ 23
2434
+
2435
+ =
2436
+ s−1
2437
+
2438
+ k=0
2439
+ R−1
2440
+ f,i,kLf,k,j
2441
+ = Tf,i,j
2442
+ Hence T ∗
2443
+ h,i,j = Tf,i,j.
2444
+ (b) Subclaim: εh(0) = εf
2445
+ where εf stands for the minimum Euclidean distance between CH(Tf,0, . . . , Tf,s−1) and Rn
2446
+ ≥0, that
2447
+ is,
2448
+ εf :=
2449
+ min
2450
+ x∈CH(Tf,0,...,Tf,s−1)
2451
+ y∈Rn
2452
+ ≥0
2453
+ ∥x − y∥.
2454
+ To see this, note
2455
+ εh(0) =
2456
+ min
2457
+ c∈Rs
2458
+ ≥0
2459
+ c0+···+cs−1=1
2460
+ y∈Rn
2461
+ ≥0
2462
+ �����
2463
+ s−1
2464
+
2465
+ i=0
2466
+ ciT ∗
2467
+ h,i − y
2468
+ �����
2469
+ =
2470
+ min
2471
+ c∈Rs
2472
+ ≥0
2473
+ c0+···+cs−1=1
2474
+ y∈Rn
2475
+ ≥0
2476
+ �����
2477
+ s−1
2478
+
2479
+ i=0
2480
+ ciTf,i − y
2481
+ �����
2482
+ =
2483
+ min
2484
+ x∈CH(Tf,0,...,Tf,s−1)
2485
+ y∈Rn
2486
+ ≥0
2487
+ ∥x − y∥
2488
+ = εf
2489
+ (c) Subclaim: εf > 0.
2490
+ Note since opt (f) = s, we have CH(Tf,0, . . . , Tf,s−1) ∩ Rn
2491
+ ≥0 = ∅. Thus εf > 0.
2492
+ (d) From the above two subclaims, we have εh (0) > 0.
2493
+ From the above four claims, we immediately have
2494
+
2495
+ r>0 opt(h) = opt(f).
2496
+
2497
+ Lemma 19
2498
+
2499
+ f∈P, deg(f)≥1
2500
+
2501
+ π
2502
+ 2 ≤θ< π
2503
+ 1
2504
+
2505
+ r>0 opt (hθ,r f) = opt (hθ,r) + opt (f)
2506
+ Proof: Let f ∈ P and h = hθ,r f. We need to show ∃
2507
+ r>0 opt(h) = opt(f) since opt(hθ,r) = 0. We will divide
2508
+ the proof into several claims.
2509
+ C1:
2510
+
2511
+ r>0 opt(h) = opt(f)
2512
+ ⇐=
2513
+
2514
+ r>0 CH(T ∗
2515
+ h,0, . . . , T ∗
2516
+ h,s−1) ∩ Rn
2517
+ ≥0 = ∅
2518
+ where
2519
+ • n = deg (f)
2520
+ • s = opt(f)
2521
+ • The Th,i are the rows of Ts−1 for h.
2522
+ • T ∗
2523
+ h,i is obtained from Th,i by deleting the first two elements.
2524
+ 24
2525
+
2526
+ Proof: Note
2527
+ opt(h) = opt(f)
2528
+ ⇐⇒
2529
+ opt(h) ≥ s
2530
+ since
2531
+ opt(h) ≤ opt(f) + opt(hr,θ) = opt(f) = s
2532
+ ⇐⇒
2533
+ ¬
2534
+
2535
+ g̸=0, deg(g)<s coeffs(gh) ≥ 0
2536
+ ⇐⇒
2537
+ ¬
2538
+
2539
+ CH(Th,0, . . . , Th,s−1) ∩ Rn+2
2540
+ ≥0
2541
+ ̸= ∅
2542
+
2543
+ ⇐⇒
2544
+ CH(Th,0, . . . , Th,s−1) ∩ Rn+2
2545
+ ≥0
2546
+ = ∅
2547
+ ⇐=
2548
+ CH(T ∗
2549
+ h,0, . . . , T ∗
2550
+ h,s−1) ∩ Rn
2551
+ ≥0 = ∅.
2552
+ C2:
2553
+
2554
+ r>0 opt(h) = opt(f)
2555
+ ⇐=
2556
+
2557
+ r>0εh (r) > 0
2558
+ where εh (r) stands for the minimum Euclidean distance between CH(T ∗
2559
+ h,0, . . . , T ∗
2560
+ h,s−1) and Rn
2561
+ ≥0, that
2562
+ is,
2563
+ εh(r) :=
2564
+ min
2565
+ x∈CH(T ∗
2566
+ h,0,...,T ∗
2567
+ h,s−1)
2568
+ y∈Rn
2569
+ ≥0
2570
+ ∥x − y∥
2571
+ Proof: Immediate from the above claim.
2572
+ C3: εh (r) is continuous at r = 0.
2573
+ Proof: We will divide it into several steps.
2574
+ (a) Note
2575
+ εh(r) =
2576
+ min
2577
+ c∈Rs
2578
+ ≥0
2579
+ c0+···+cs−1=1
2580
+ y∈Rn
2581
+ ≥0
2582
+ �����
2583
+ s−1
2584
+
2585
+ i=0
2586
+ ciT ∗
2587
+ h,i − y
2588
+ �����
2589
+ =
2590
+ min
2591
+ c∈Rs
2592
+ ≥0
2593
+ c0+···+cs−1=1
2594
+ y∈Rn
2595
+ ≥0
2596
+ �����
2597
+ �s−1
2598
+
2599
+ i=0
2600
+ ciT ∗
2601
+ h,i,1 − y1 , . . . ,
2602
+ s−1
2603
+
2604
+ i=0
2605
+ ciT ∗
2606
+ h,i,n − yn
2607
+ ������
2608
+ =
2609
+ min
2610
+ z∈Rs+n
2611
+ ≥0
2612
+ z0+···+zs−1=1
2613
+ �����
2614
+ �s−1
2615
+
2616
+ i=0
2617
+ ziT ∗
2618
+ h,i,1 − zs , . . . ,
2619
+ s−1
2620
+
2621
+ i=0
2622
+ ziT ∗
2623
+ h,i,n − zs+n−1
2624
+ ������
2625
+ where z = (c, y)
2626
+ = min
2627
+ z∈C p (z, r)
2628
+ where p(z, r) is Euclidean distance and
2629
+ C =
2630
+
2631
+ z ∈ Rs+n
2632
+ ≥0 : z1 + · · · + zs = 1
2633
+
2634
+ .
2635
+ (b) Note, since p(z, r) is the distance between two closed sets, the minimum distance is realized by a
2636
+ point in each set. Hence,
2637
+ εh(r) = min
2638
+ z∈C p (z, r) = inf
2639
+ z∈C p (z, r) .
2640
+ (c) Note the following:
2641
+ i. By Section 3.1.5 of [2], p(z, r) is a convex function since p(z, r) is a norm.
2642
+ ii. By Section 3.2.5 of [2], εh(r) = inf
2643
+ z∈C p (z, r) is a convex function, since C is convex and p(z, r)
2644
+ is bounded below.
2645
+ 25
2646
+
2647
+ iii. By Corollary 3.5.3 in [4], since εh(r) is a convex function defined on a convex set R, εh(r) is
2648
+ continuous on the relative interior of R, ri (R) = R.
2649
+ iv. Hence, εh(r) is continuous at r = 0.
2650
+ C4: εh (0) > 0.
2651
+ Proof: Let r = 0. Then h = x2 · f.
2652
+ (a) Subclaim: T ∗
2653
+ h,i,j = Tf,i,j. Note that these are the entries of T ∗
2654
+ h,s−1 and Tf,s−1. We will prove the
2655
+ claim using the fact that Ts−1 = R−1
2656
+ s−1Ls−1 for any f.
2657
+ i. Note Rf,s−1 = Rh,s−1. This is clear from the definition of Rs−1. Hence R−1
2658
+ f,s−1 = R−1
2659
+ h,s−1.
2660
+ ii. Note that Lf,i,j = Lh,i,j+2. This is clear from the definition of Ls−1, since Lh,s−1 is composed
2661
+ of Lf,s−1 with two columns of zeroes added on the left.
2662
+ iii. Note that for i = 0, . . . , s − 1 and j = 0, . . . , n − 1,
2663
+ T ∗
2664
+ h,i,j = Th,i,j+2
2665
+ =
2666
+ s−1
2667
+
2668
+ k=0
2669
+ R−1
2670
+ h,i,kLh,k,j+2
2671
+ =
2672
+ s−1
2673
+
2674
+ k=0
2675
+ R−1
2676
+ f,i,kLf,k,j
2677
+ = Tf,i,j
2678
+ Hence T ∗
2679
+ h,i,j = Tf,i,j.
2680
+ (b) Subclaim: εh(0) = εf
2681
+ where εf stands for the minimum Euclidean distance between CH(Tf,0, . . . , Tf,s−1) and Rn
2682
+ ≥0, that
2683
+ is,
2684
+ εf :=
2685
+ min
2686
+ x∈CH(Tf,0,...,Tf,s−1)
2687
+ y∈Rn
2688
+ ≥0
2689
+ ∥x − y∥.
2690
+ To see this, note
2691
+ εh(0) =
2692
+ min
2693
+ c∈Rs
2694
+ ≥0
2695
+ c0+···+cs−1=1
2696
+ y∈Rn
2697
+ ≥0
2698
+ �����
2699
+ s−1
2700
+
2701
+ i=0
2702
+ ciT ���
2703
+ h,i − y
2704
+ �����
2705
+ =
2706
+ min
2707
+ c∈Rs
2708
+ ≥0
2709
+ c0+···+cs−1=1
2710
+ y∈Rn
2711
+ ≥0
2712
+ �����
2713
+ s−1
2714
+
2715
+ i=0
2716
+ ciTf,i − y
2717
+ �����
2718
+ =
2719
+ min
2720
+ x∈CH(Tf,0,...,Tf,s−1)
2721
+ y∈Rn
2722
+ ≥0
2723
+ ∥x − y∥
2724
+ = εf
2725
+ (c) Subclaim: εf > 0.
2726
+ Note since opt (f) = s, we have CH(Tf,0, . . . , Tf,s−1) ∩ Rn
2727
+ ≥0 = ∅. Thus εf > 0.
2728
+ (d) From the above two subclaims, we have εh (0) > 0.
2729
+ From the above four claims, we immediately have
2730
+
2731
+ r>0 opt(h) = opt(f).
2732
+
2733
+ 26
2734
+
2735
+ References
2736
+ [1] M. Avendano. Descartes’ rule of signs is exact! Journal of Algebra - J ALGEBRA, 324:2884–2892, 11
2737
+ 2010.
2738
+ [2] S. Boyd and L. Vandenberghe. Convex optimization. Cambridge University Press, 2004.
2739
+ [3] D. Curtiss. Recent extensions of descartes rule of signs. Annals of Mathematics, 19(4):251–278, 6 1918.
2740
+ [4] C. Niculescu and L. Persson. Convex functions and their applications. Springer Verlag New York, 2006.
2741
+ [5] H. Poincar´e. Sur les ´equations alg´ebriques. Comptes Rendus, 97:1418–1419, 1888.
2742
+ 27
2743
+
FdAyT4oBgHgl3EQfe_hY/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FdE2T4oBgHgl3EQf-QlB/content/tmp_files/2301.04236v1.pdf.txt ADDED
@@ -0,0 +1,593 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04236v1 [math.AP] 10 Jan 2023
2
+ Infinitely many solutions for Kirchhoff equations with
3
+ indefinite potential
4
+ Shuai Jiang a, Shibo Liu b
5
+ aSchool of Mathematical Sciences, Xiamen University
6
+ Xiamen 361006, P.R. China
7
+ bDepartment of Mathematical Sciences, Florida Institute of Technology
8
+ Melbourne, FL 32901, USA
9
+ Abstract. We obtain a sequence of solutions converging to zero for the Kirchhoff
10
+ equation
11
+
12
+
13
+ 1 +
14
+ ˆ
15
+
16
+ |∇u|2
17
+
18
+ ∆u + V(x)u = f(u),
19
+ u ∈ H1
20
+ 0(Ω)
21
+ via truncating technique and a variant of Clark’s theorem due to Liu–Wang, where Ω
22
+ is a bounded smooth domain Ω ⊂ RN. Similar result for Schr¨odinger-Poisson system
23
+ on a bounded smooth domain Ω ⊂ R3 is also presented.
24
+ 1. Introduction
25
+ In a recent paper [8], He and Wu studied the following elliptic boundary value
26
+ problem
27
+ −∆u + V(x)u = f (x, u),
28
+ u ∈ H1
29
+ 0(Ω)
30
+ with indefinite linear part −∆ + V, where Ω ⊂ RN is a bounded smooth domain and the
31
+ odd nonlinearity f : Ω × R → R is sublinear at zero:
32
+ lim
33
+ |t|→0
34
+ 1
35
+ t2
36
+ ˆ t
37
+ 0
38
+ f (x, s) ds = +∞.
39
+ Using truncating technique and Liu–Wang’s variant of Clark’s theorem [9, Theorem
40
+ 1.1], they obtained a sequence of solutions conversing to zero in H1
41
+ 0(Ω).
42
+ Motivated by [8], in this note we consider the following Kirchhoff equation on a
43
+ bounded smooth domain Ω ⊂ RN,
44
+
45
+
46
+ 1 +
47
+ ˆ
48
+
49
+ |∇u|2
50
+
51
+ ∆u + V(x)u = f (x, u),
52
+ u ∈ H1
53
+ 0(Ω).
54
+ (1.1)
55
+ We impose the following conditions on the potential V and the nonlinearity f ,
56
+ (V) V ∈ C(Ω) is bounded;
57
+ 1
58
+
59
+ 2
60
+ S. JIANG AND S. LIU
61
+ ( f1) f ∈ C(Ω × R) is subcritical, that is
62
+ lim
63
+ |t|→∞
64
+ f (x, t)t
65
+ |t|2∗
66
+ = 0,
67
+ where 2∗ =
68
+ 2N
69
+ N − 2 is the critical exponent;
70
+ ( f2) f (x, ·) is odd for all x ∈ Ω, f (x, 0) = 0, and is sublinear at zero:
71
+ lim
72
+ |t|→0
73
+ F(x, t)
74
+ t2
75
+ = +∞,
76
+ where F(x, t) =
77
+ ˆ t
78
+ 0
79
+ f (x, s) ds.
80
+ (1.2)
81
+ We will prove the following theorem.
82
+ Theorem 1.1. Suppose (V), (f1) and (f2) hold, then the problem (1.1) possesses a
83
+ sequence of nontrivial solutions converging to zero.
84
+ Boundary value problems of the form (1.1) are closely related to the wave equation
85
+ ψtt −
86
+
87
+ a + b
88
+ ˆ
89
+
90
+ |∇ψ|2
91
+
92
+ ∆ψ = g(x, ψ),
93
+ (t, x) ∈ (0, T) × Ω,
94
+ which was used by G. Kirchhoff to investigate vibrations of elastic strings with chang-
95
+ ing length. Starting from Alves et al. [1], where a variational approach is developed
96
+ to solve (1.1), many existence results for (1.1) appear. For example, Cheng et al. [4]
97
+ considered the case that V(x) = 0 and the nonlinearity is of the form
98
+ f (x, t) = α(x) |t|q−2 t + g(x, t),
99
+ (1.3)
100
+ where q ∈ (1, 2), g(x, t) = o(|t|) as t → 0. Obviously such f satisfies our assumption
101
+ ( f2). Since they need H1
102
+ 0(Ω) ֒→ Lr(Ω) for r > 4, it is assumed in [4] that N ≤ 3.
103
+ Furtado and Zanata [7] also considered (1.1) with V(x) = 0 and f as in (1.3); but they
104
+ only imposed local conditions to g(x, t) for |t| small (g needs not be odd and subcritical
105
+ for |t| large). Using some idea from Wang [11], they got a sequence of solutions {uk} for
106
+ the truncated problem with an odd and subcritical ˜g in place of g, ˜g(x, t) = g(x, t) for |t|
107
+ small; then applied L∞-estimate to show that |uk|∞ → 0 and concluded that for k large
108
+ uk are solutions of the original problem. Since our problem (1.1) may be indefinite,
109
+ such L∞-estimate seems not applicable, this is why we need f to be globally odd and
110
+ subcritical. For more recent papers on Kirchhoff equations, the reader is referred to
111
+ [5,6,10].
112
+ When N = 3, for the following Schr¨odinger-Poisson system on a bounded smooth
113
+ domain Ω
114
+ 
115
+ −∆u + V(x)u + φu = f (x, u)
116
+ in Ω,
117
+ −∆φ = u2
118
+ in Ω,
119
+ u = φ = 0
120
+ on ∂Ω,
121
+ (1.4)
122
+ we have similar result.
123
+ Theorem 1.2. Suppose (V), (f1) and (f2) hold, then the problem (1.4) possesses a
124
+ sequence of nontrivial solutions (un, φn) → (0, 0) in H1
125
+ 0(Ω) × H1
126
+ 0(Ω).
127
+ Since the seminar work or Benci et al. [3], Schr¨odinger-Poisson system has been
128
+ an active field of research, for recent work on Schr¨odinger-Poisson system on bounded
129
+ domain we mention [2,12,13].
130
+
131
+ INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL
132
+ 3
133
+ 2. Proof of Theorem 1.1
134
+ The dependence on x in f (x, u) is not essential in our discussion of (1.1) and (1.4).
135
+ Therefore in what follows we write f (u) for f (x, u) for simplicity.
136
+ It is well known that to find weak solutions of (1.1), it suffices to find critical points
137
+ of the C1-functional Φ : H1
138
+ 0(Ω) → R defined by
139
+ Φ(u) = 1
140
+ 2
141
+ ˆ �
142
+ |∇u|2 + V(x)u
143
+
144
+ + 1
145
+ 4
146
+ �ˆ
147
+ |∇u|2
148
+ �2
149
+
150
+ ˆ
151
+ F(u),
152
+ (2.1)
153
+ here and below the integrals are taken over Ω. Let E−, E0, and E+ be the negative
154
+ space, null space, and positive space of the quadratic form (the first term) in (2.1). For
155
+ u ∈ E := H1
156
+ 0(Ω), we always denote by u± and u0 the orthogonal projections of u on E±
157
+ and E0. Because of the condition (V), there is an equivalent norm ∥ · ∥ on E such that
158
+ Φ(u) = 1
159
+ 2
160
+
161
+ ∥u+∥2 −
162
+ ���u−���
163
+ 2�
164
+ + 1
165
+ 4
166
+ �ˆ
167
+ |∇u|2
168
+ �2
169
+
170
+ ˆ
171
+ F(u).
172
+ We denote by (·, ·) the corresponding inner product.
173
+ To prove Theorem 1.1 it suffices to find a sequence of critical points of Φ. For this
174
+ purpose, we need the following variant of the Clark’s theorem due to Liu–Wang [9].
175
+ Theorem 2.1 ([9, Theorem 1.1]). Let E be a Banach space and Φ ∈ C1(E, R) be an
176
+ even coercive functional satisfying the (PS ) condition and Φ(0) = 0. If for any k ∈ N,
177
+ there is an k-dimensional subspace Xk and ρk > 0 such that
178
+ sup
179
+ Xk∩S ρk
180
+ Φ < 0,
181
+ (2.2)
182
+ where S r = {u ∈ E| ∥u∥ = r}, then Φ has a sequence of critical points uk � 0 such that
183
+ Φ(uk) ≤ 0, uk → 0.
184
+ As pointed out in He–Wu [8, Remark 2.5], in Theorem 2.1, instead of (PS ) con-
185
+ dition, it suffices to assume (PS )c for c ≤ 0. That is, any sequence {un} such that
186
+ Φ′(un) → 0 and Φ(un) → c ≤ 0, possesses a convergent subsequence.
187
+ We need the following lemma.
188
+ Lemma 2.2. If un ⇀ u in E, then
189
+ lim
190
+ n→∞
191
+ ��ˆ
192
+ |∇un|2
193
+ � ˆ
194
+ ∇un · ∇(un − u) −
195
+ �ˆ
196
+ |∇u|2
197
+ � ˆ
198
+ ∇u · ∇(un − u)
199
+
200
+ ≥ 0,
201
+ (2.3)
202
+ Proof. By direct computation we have
203
+ �ˆ
204
+ |∇un|2
205
+ � ˆ
206
+ ∇un · ∇(un − u) −
207
+ �ˆ
208
+ |∇u|2
209
+ � ˆ
210
+ ∇u · ∇(un − u)
211
+ =
212
+ �ˆ
213
+ |∇un|2
214
+ � ˆ
215
+ |∇(un − u)|2 +
216
+ �ˆ
217
+ |∇un|2 −
218
+ ˆ
219
+ |∇u|2
220
+ � ˆ
221
+ ∇u · ∇(un − u)
222
+
223
+ �ˆ
224
+ |∇un|2 −
225
+ ˆ
226
+ |∇u|2
227
+ � ˆ
228
+ ∇u · ∇(un − u).
229
+
230
+ 4
231
+ S. JIANG AND S. LIU
232
+ Since un ⇀ u in E, the right hand side goes to zero. The desired result follows from
233
+ taking lower limit on both sides of the above inequality.
234
+ Now, we are ready to prove Theorem 1.1.
235
+ Proof (
236
+ Proof of Theorem 1.1). Let φ : [0, ∞) → R be a decreasing C∞-function
237
+ such that |φ′(t)| ≤ 2,
238
+ φ(t) = 1
239
+ for t ∈ [0, 1] ,
240
+ φ(t) = 0
241
+ for t ≥ 2.
242
+ We consider the following truncated functional I : E → R, which is a modification of
243
+ the truncated functional used in [8],
244
+ I(u) = 1
245
+ 2 ∥u∥2 − 1
246
+ 2
247
+
248
+ ∥u∗∥2 + 2
249
+ ˆ
250
+ F(u)
251
+
252
+ φ(∥u∥2) + 1
253
+ 4
254
+ �ˆ
255
+ |∇u|2
256
+ �2
257
+ ,
258
+ (2.4)
259
+ where u∗ = u− + u0 ∈ E− ⊕ E0. The derivative I′ is given by
260
+ ⟨I′(u), v⟩ =
261
+
262
+ 1 −
263
+
264
+ ∥u∗∥2 + 2
265
+ ˆ
266
+ F(u)
267
+
268
+ φ′(∥u∥2)
269
+
270
+ (u, v)
271
+
272
+
273
+ (u∗, v∗) +
274
+ ˆ
275
+ f (u)v
276
+
277
+ φ(∥u∥2) +
278
+ �ˆ
279
+ |∇u|2
280
+ � ˆ
281
+ ∇u · ∇v
282
+ (2.5)
283
+ for u, v ∈ E.
284
+ We will apply Theorem 2.1 to I to get a sequence of critical points {uk} for I such
285
+ that
286
+ I(uk) ≤ 0,
287
+ uk → 0.
288
+ Since I(u) = Φ(u) for ∥u∥ ≤ 1, we see that for large k all the uk are critical points of Φ
289
+ and Theorem 1.1 is proved.
290
+ Obviously I is even. If ∥u∥ ≥ 2, then φ(∥u∥2) = 0. Hence
291
+ I(u) = 1
292
+ 2 ∥u∥2 + 1
293
+ 4
294
+ �ˆ
295
+ |∇u|2
296
+ �2
297
+ ≥ 1
298
+ 2 ∥u∥2 → +∞,
299
+ as ∥u∥ → ∞.
300
+ This means that I is coercive.
301
+ To verify (PS )c for c ≤ 0, let {un} be a sequence in E such that I(un) → c ≤ 0,
302
+ I′(un) → 0. Since I is coercive, {un} is bounded in E. Up to a subsequence, we may
303
+ assume that un ⇀ u in E. Then
304
+
305
+ ����u∗
306
+ n
307
+ ���
308
+ 2 + 2
309
+ ˆ
310
+ F(un)
311
+
312
+ φ(∥un∥2) = 2I(un) − ∥un∥2 − 1
313
+ 2
314
+ �ˆ
315
+ |∇un|2
316
+ �2
317
+ ≤ 0.
318
+ Hence
319
+ ���u∗
320
+ n
321
+ ���
322
+ 2 + 2
323
+ ˆ
324
+ F(un) ≥ 0.
325
+ (2.6)
326
+ Because φ′(∥un∥2) ≤ 0 and
327
+ lim
328
+ n→∞
329
+ (un, un − u) = lim
330
+ n→∞
331
+ ∥un∥2 − ∥u∥2 ≥ 0,
332
+
333
+ INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL
334
+ 5
335
+ up to a further subsequence we may assume
336
+ ����u∗
337
+ n
338
+ ���
339
+ 2 + 2
340
+ ˆ
341
+ F(un)
342
+
343
+ φ′(∥un∥2) (un, un − u) −→ α ≤ 0,
344
+ (2.7)
345
+ note here that by the boundedness of {un}, the coefficient of (un, un − u) is bounded.
346
+ Thanks to Lemma 2.2, we may also assume
347
+ �ˆ
348
+ |∇un|2
349
+ � ˆ
350
+ ∇un · ∇(un − u) −
351
+ �ˆ
352
+ |∇u|2
353
+ � ˆ
354
+ ∇u · ∇(un − u) −→ β ≥ 0.
355
+ (2.8)
356
+ From the subcritical assumption (f1) and the compact embedding E ֒→ L2(Ω), it is well
357
+ known that
358
+ ˆ
359
+ f (un) (un − u) → 0,
360
+ ˆ
361
+ f (u) (un − u) → 0.
362
+ (2.9)
363
+ Finally, because dim(E− ⊕ E0) < ∞, we also have
364
+ �u∗
365
+ n, u∗
366
+ n − u∗� → 0,
367
+ �u∗, u∗
368
+ n − u∗� → 0.
369
+ (2.10)
370
+ Computing ⟨I′(un), un − u⟩ and ⟨I′(u), un − u⟩ via (2.5) then subtracting the results, we
371
+ deduce from (2.7), (2.8), (2.9) and (2.10) that
372
+ ∥un − u∥2 = ⟨I′(un) − I′(u), un − u⟩
373
+ +
374
+ ����u∗
375
+ n
376
+ ���
377
+ 2 + 2
378
+ ˆ
379
+ F(un)
380
+
381
+ φ′(∥un∥2) (un, un − u)
382
+
383
+
384
+ ∥u∗∥2 + 2
385
+ ˆ
386
+ F(u)
387
+
388
+ φ′(∥u∥2) (u, un − u)
389
+ +
390
+ ��u∗
391
+ n, u∗
392
+ n − u∗� +
393
+ ˆ
394
+ f (un) (un − u)
395
+
396
+ φ(∥un∥2)
397
+
398
+ ��u∗, u∗
399
+ n − u∗� +
400
+ ˆ
401
+ f (u) (un − u)
402
+
403
+ φ(∥u∥2)
404
+
405
+ �ˆ
406
+ |∇un|2
407
+ � ˆ
408
+ ∇un · ∇(un − u) +
409
+ �ˆ
410
+ |∇u|2
411
+ � ˆ
412
+ ∇u · ∇(un − u)
413
+ = �o(1) + α − β� → (α − β) ≤ 0.
414
+ (2.11)
415
+ It follows that un → u in E and I satisfies (PS )c for c ≤ 0.
416
+ Finally, for k ∈ N, let Xk be an arbitrary k-dimensional subspace of E. There is
417
+ Λk > 0 such that
418
+ |u|2
419
+ 2 ≥ Λk ∥u∥2
420
+ for u ∈ Xk.
421
+ There is also a constant η > 0 such that for all u ∈ E we have
422
+ ˆ
423
+ |∇u|2 ≤ η ∥u∥2 .
424
+ From (f2), there is δ > 0 such that
425
+ F(t) ≥ 1 + η2
426
+ Λk
427
+ t2
428
+ for t ∈ (−δ, δ) .
429
+ (2.12)
430
+
431
+ 6
432
+ S. JIANG AND S. LIU
433
+ Take ρk ∈ (0, 1) such that if u ∈ Xk, ∥u∥ = ρk, then |u|∞ < δ. For u ∈ Xk ∩ S ρk we have
434
+ |u(x)| ≤ δ for all x ∈ Ω. Hence by (2.12),
435
+ I(u) = Φ(u) = 1
436
+ 2
437
+
438
+ ∥u+∥2 −
439
+ ���u−���
440
+ 2�
441
+ + 1
442
+ 4
443
+ �ˆ
444
+ |∇u|2
445
+ �2
446
+
447
+ ˆ
448
+ F(u)
449
+ ≤ ∥u∥2 + η2
450
+ 4 ∥u∥4 − 1 + η2
451
+ Λk
452
+ ˆ
453
+ u2
454
+ ≤ η2
455
+ 4 ρ4
456
+ k − η2ρ2
457
+ k ≤ −3η2
458
+ 4 ρ2
459
+ k.
460
+ Thus
461
+ sup
462
+ Xk∩S ρk
463
+ I ≤ −3η2
464
+ 4 ρ2
465
+ k < 0.
466
+ Now, by Theorem 2.1, I has a sequence of critical points {uk} such that uk → 0 in E.
467
+ For some k0, if k ≥ k0 then ∥uk∥ < 1 and uk is a critical point of Φ. Hence Φ has a
468
+ sequence of critical points {uk}k≥k0 converging to zero.
469
+ 3. Proof of Theorem 1.2
470
+ Given u ∈ E, let φu be the solution of the second equation in the system (1.4). It is
471
+ well known that if u ∈ E is a critical point of Φ : E → R,
472
+ Φ(u) = 1
473
+ 2
474
+ ˆ �
475
+ |∇u|2 + V(x)u2�
476
+ + 1
477
+ 4
478
+ ˆ
479
+ φuu2 −
480
+ ˆ
481
+ F(u)
482
+ = 1
483
+ 2
484
+
485
+ ∥u+∥2 −
486
+ ���u−���
487
+ 2�
488
+ + 1
489
+ 4
490
+ ˆ
491
+ φuu2 −
492
+ ˆ
493
+ F(u),
494
+ then (u, φu) is a solution of (1.4), this idea was initiated from Benci et al. [3]. Similar
495
+ to (2.4) we consider a truncated functional I : E → R
496
+ I(u) = 1
497
+ 2 ∥u∥2 − 1
498
+ 2
499
+
500
+ ∥u∗∥2 + 2
501
+ ˆ
502
+ F(u)
503
+
504
+ φ(∥u∥2) + 1
505
+ 4
506
+ ˆ
507
+ φuu2.
508
+ Then I is an even coercive functional with I(0) = 0. Similar to the last section, using
509
+ ( f2), for k-dimensional subspace Xk there is ρk > 0 such that (2.2) holds.
510
+ To verify the (PS )c condition with c ≤ 0 for I, we need the following analogue of
511
+ Lemma 2.2.
512
+ Lemma 3.1. If un ⇀ u in E, then
513
+ lim
514
+ n→∞
515
+ �ˆ
516
+ φunun (un − u) −
517
+ ˆ
518
+ φuu (un − u)
519
+
520
+ = 0.
521
+ (3.1)
522
+ Proof. It is well known that φu is obtained from applying Riesz lemma to the func-
523
+ tional ℓu : v �→
524
+ ´
525
+ u2v on E. Thus
526
+ ∥φu∥ = ∥ℓu∥ = sup
527
+ ∥v∥=1
528
+ �����
529
+ ˆ
530
+ u2v
531
+ �����
532
+ ≤ sup
533
+ ∥v∥=1
534
+
535
+ |u2|3 |v|3/2
536
+
537
+ = |u|2
538
+ 6 sup
539
+ ∥v∥=1
540
+ |v|3/2 ≤ C ∥u∥2 .
541
+ (3.2)
542
+
543
+ INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL
544
+ 7
545
+ Since {un} is bounded, we know that �φun
546
+ � is also bounded in E. By the compactness of
547
+ the embedding E ֒→ L12/5(Ω), up to a subsequence we have un → u in L12/5(Ω). Hence
548
+ �����
549
+ ˆ
550
+ φunun (un − u)
551
+ ����� ≤
552
+ ���φun
553
+ ���6 |un|12/5 |un − u|12/5 → 0,
554
+ because �φun
555
+ � and {un} are bounded in L6(Ω) and L12/5(Ω), respectively. Similarly, the
556
+ second integral in (3.1) vanishes as n → ∞.
557
+ Let {un} be a (PS )c sequence of Φ with c ≤ 0. It is easy to see that (2.6) still holds
558
+ in current situation, thus we have (2.7). Using (2.7), (2.9), (2.10), and Lemma 3.1 we
559
+ have an analogue of (2.11)
560
+ ∥un − u∥2 → α ≤ 0.
561
+ Thus un → u in E and (PS )c is verified. Applying Theorem 2.1, I has a sequence of
562
+ critical points uk → 0. Since I(u) = Φ(u) for ∥u∥ ≤ 1, for large k, uk is critical point of
563
+ Φ. Thus Φ has a sequence of critical points uk → 0 in E. From (3.2) we have φuk → 0
564
+ in E. Thus (1.4) has a sequence of solutions (uk, φuk) → (0, 0) in E × E.
565
+ References
566
+ [1] C. O. Alves, F. J. S. A. Corrˆea, and T. F. Ma, Positive solutions for a quasilinear elliptic equation
567
+ of Kirchhoff type, Comput. Math. Appl., 49 (2005), pp. 85–93.
568
+ [2] C. O. Alves and M. A. S. Souto, Existence of least energy nodal solution for a Schr¨odinger-Poisson
569
+ system in bounded domains, Z. Angew. Math. Phys., 65 (2014), pp. 1153–1166.
570
+ [3] V. Benci and D. Fortunato, An eigenvalue problem for the Schr¨odinger-Maxwell equations, Topol.
571
+ Methods Nonlinear Anal., 11 (1998), pp. 283–293.
572
+ [4] B. Cheng, X. Wu, and J. Liu, Multiple solutions for a class of Kirchhoff type problems with concave
573
+ nonlinearity, NoDEA Nonlinear Differential Equations Appl., 19 (2012), pp. 521–537.
574
+ [5] F. Faraci and K. Silva, On the Brezis-Nirenberg problem for a Kirchhoff type equation in high
575
+ dimension, Calc. Var. Partial Differential Equations, 60 (2021), pp. Paper No. 22, 33.
576
+ [6] M. C. Ferreira and P. Ubilla, A critical concave-convex Kirchhoff-type equation in R4 involving
577
+ potentials which may vanish at infinity, Ann. Henri Poincar´e, 23 (2022), pp. 25–47.
578
+ [7] M. F. Furtado and H. R. Zanata, Multiple solutions for a Kirchhoff equation with nonlinearity
579
+ having arbitrary growth, Bull. Aust. Math. Soc., 96 (2017), pp. 98–109.
580
+ [8] W. He and Q. Wu, Multiplicity results for sublinear elliptic equations with sign-changing potential
581
+ and general nonlinearity, Bound. Value Probl., (2020), pp. Paper No. 159, 9.
582
+ [9] Z. Liu and Z.-Q. Wang, On Clark’s theorem and its applications to partially sublinear problems,
583
+ Ann. Inst. H. Poincar´e Anal. Non Lin´eaire, 32 (2015), pp. 1015–1037.
584
+ [10] R. Pei and C. Ma, Multiple solutions for a Kirchhoff-type equation, Mediterr. J. Math., 17 (2020),
585
+ pp. Paper No. 78, 16.
586
+ [11] Z.-Q. Wang, Nonlinear boundary value problems with concave nonlinearities near the origin,
587
+ NoDEA Nonlinear Differential Equations Appl., 8 (2001), pp. 15–33.
588
+ [12] Z.-L. Yang and Z.-Q. Ou, Nodal solutions for Schr¨odinger-Poisson systems with concave-convex
589
+ nonlinearities, J. Math. Anal. Appl., 499 (2021), pp. Paper No. 125006, 15.
590
+ [13] S. Yu and Z. Zhang, Sufficient and necessary conditions for ground state sign-changing solutions
591
+ to the Schr¨odinger-Poisson system with cubic nonlinearity on bounded domains, Appl. Math. Lett.,
592
+ 123 (2022), pp. Paper No. 107570, 5.
593
+
FdE2T4oBgHgl3EQf-QlB/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,300 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf,len=299
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
3
+ page_content='04236v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
4
+ page_content='AP] 10 Jan 2023 Infinitely many solutions for Kirchhoff equations with indefinite potential Shuai Jiang a, Shibo Liu b aSchool of Mathematical Sciences, Xiamen University Xiamen 361006, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
5
+ page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
6
+ page_content=' China bDepartment of Mathematical Sciences, Florida Institute of Technology Melbourne, FL 32901, USA Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
7
+ page_content=' We obtain a sequence of solutions converging to zero for the Kirchhoff equation − � 1 + ˆ Ω |∇u|2 � ∆u + V(x)u = f(u), u ∈ H1 0(Ω) via truncating technique and a variant of Clark’s theorem due to Liu–Wang, where Ω is a bounded smooth domain Ω ⊂ RN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
8
+ page_content=' Similar result for Schr¨odinger-Poisson system on a bounded smooth domain Ω ⊂ R3 is also presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
9
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
10
+ page_content=' Introduction In a recent paper [8], He and Wu studied the following elliptic boundary value problem −∆u + V(x)u = f (x, u), u ∈ H1 0(Ω) with indefinite linear part −∆ + V, where Ω ⊂ RN is a bounded smooth domain and the odd nonlinearity f : Ω × R → R is sublinear at zero: lim |t|→0 1 t2 ˆ t 0 f (x, s) ds = +∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
11
+ page_content=' Using truncating technique and Liu–Wang’s variant of Clark’s theorem [9, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
12
+ page_content='1], they obtained a sequence of solutions conversing to zero in H1 0(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
13
+ page_content=' Motivated by [8], in this note we consider the following Kirchhoff equation on a bounded smooth domain Ω ⊂ RN, − � 1 + ˆ Ω |∇u|2 � ∆u + V(x)u = f (x, u), u ∈ H1 0(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
14
+ page_content=' (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
15
+ page_content='1) We impose the following conditions on the potential V and the nonlinearity f , (V) V ∈ C(Ω) is bounded;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
16
+ page_content=' 1 2 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
17
+ page_content=' JIANG AND S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
18
+ page_content=' LIU ( f1) f ∈ C(Ω × R) is subcritical, that is lim |t|→∞ f (x, t)t |t|2∗ = 0, where 2∗ = 2N N − 2 is the critical exponent;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
19
+ page_content=' ( f2) f (x, ·) is odd for all x ∈ Ω, f (x, 0) = 0, and is sublinear at zero: lim |t|→0 F(x, t) t2 = +∞, where F(x, t) = ˆ t 0 f (x, s) ds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
20
+ page_content=' (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
21
+ page_content='2) We will prove the following theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
22
+ page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
23
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
24
+ page_content=' Suppose (V), (f1) and (f2) hold, then the problem (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
25
+ page_content='1) possesses a sequence of nontrivial solutions converging to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
26
+ page_content=' Boundary value problems of the form (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
27
+ page_content='1) are closely related to the wave equation ψtt − � a + b ˆ Ω |∇ψ|2 � ∆ψ = g(x, ψ), (t, x) ∈ (0, T) × Ω, which was used by G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
28
+ page_content=' Kirchhoff to investigate vibrations of elastic strings with chang- ing length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
29
+ page_content=' Starting from Alves et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
30
+ page_content=' [1], where a variational approach is developed to solve (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
31
+ page_content='1), many existence results for (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
32
+ page_content='1) appear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
33
+ page_content=' For example, Cheng et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
34
+ page_content=' [4] considered the case that V(x) = 0 and the nonlinearity is of the form f (x, t) = α(x) |t|q−2 t + g(x, t), (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
35
+ page_content='3) where q ∈ (1, 2), g(x, t) = o(|t|) as t → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
36
+ page_content=' Obviously such f satisfies our assumption ( f2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
37
+ page_content=' Since they need H1 0(Ω) ֒→ Lr(Ω) for r > 4, it is assumed in [4] that N ≤ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
38
+ page_content=' Furtado and Zanata [7] also considered (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
39
+ page_content='1) with V(x) = 0 and f as in (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
40
+ page_content='3);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
41
+ page_content=' but they only imposed local conditions to g(x, t) for |t| small (g needs not be odd and subcritical for |t| large).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
42
+ page_content=' Using some idea from Wang [11], they got a sequence of solutions {uk} for the truncated problem with an odd and subcritical ˜g in place of g, ˜g(x, t) = g(x, t) for |t| small;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
43
+ page_content=' then applied L∞-estimate to show that |uk|∞ → 0 and concluded that for k large uk are solutions of the original problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
44
+ page_content=' Since our problem (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
45
+ page_content='1) may be indefinite, such L∞-estimate seems not applicable, this is why we need f to be globally odd and subcritical.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
46
+ page_content=' For more recent papers on Kirchhoff equations, the reader is referred to [5,6,10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
47
+ page_content=' When N = 3, for the following Schr¨odinger-Poisson system on a bounded smooth domain Ω \uf8f1\uf8f4\uf8f4\uf8f4\uf8f2\uf8f4\uf8f4\uf8f4\uf8f3 −∆u + V(x)u + φu = f (x, u) in Ω, −∆φ = u2 in Ω, u = φ = 0 on ∂Ω, (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
48
+ page_content='4) we have similar result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
49
+ page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
50
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
51
+ page_content=' Suppose (V), (f1) and (f2) hold, then the problem (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
52
+ page_content='4) possesses a sequence of nontrivial solutions (un, φn) → (0, 0) in H1 0(Ω) × H1 0(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
53
+ page_content=' Since the seminar work or Benci et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
54
+ page_content=' [3], Schr¨odinger-Poisson system has been an active field of research, for recent work on Schr¨odinger-Poisson system on bounded domain we mention [2,12,13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
55
+ page_content=' INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL 3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
56
+ page_content=' Proof of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
57
+ page_content='1 The dependence on x in f (x, u) is not essential in our discussion of (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
58
+ page_content='1) and (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
59
+ page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
60
+ page_content=' Therefore in what follows we write f (u) for f (x, u) for simplicity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
61
+ page_content=' It is well known that to find weak solutions of (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
62
+ page_content='1), it suffices to find critical points of the C1-functional Φ : H1 0(Ω) → R defined by Φ(u) = 1 2 ˆ � |∇u|2 + V(x)u � + 1 4 �ˆ |∇u|2 �2 − ˆ F(u), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
63
+ page_content='1) here and below the integrals are taken over Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
64
+ page_content=' Let E−, E0, and E+ be the negative space, null space, and positive space of the quadratic form (the first term) in (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
65
+ page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
66
+ page_content=' For u ∈ E := H1 0(Ω), we always denote by u± and u0 the orthogonal projections of u on E± and E0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
67
+ page_content=' Because of the condition (V), there is an equivalent norm ∥ · ∥ on E such that Φ(u) = 1 2 � ∥u+∥2 − ���u−��� 2� + 1 4 �ˆ |∇u|2 �2 − ˆ F(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
68
+ page_content=' We denote by (·, ·) the corresponding inner product.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
69
+ page_content=' To prove Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
70
+ page_content='1 it suffices to find a sequence of critical points of Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
71
+ page_content=' For this purpose, we need the following variant of the Clark’s theorem due to Liu–Wang [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
72
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
73
+ page_content='1 ([9, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
74
+ page_content='1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
75
+ page_content=' Let E be a Banach space and Φ ∈ C1(E, R) be an even coercive functional satisfying the (PS ) condition and Φ(0) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
76
+ page_content=' If for any k ∈ N, there is an k-dimensional subspace Xk and ρk > 0 such that sup Xk∩S ρk Φ < 0, (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
77
+ page_content='2) where S r = {u ∈ E| ∥u∥ = r}, then Φ has a sequence of critical points uk � 0 such that Φ(uk) ≤ 0, uk → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
78
+ page_content=' As pointed out in He–Wu [8, Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
79
+ page_content='5], in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
80
+ page_content='1, instead of (PS ) con- dition, it suffices to assume (PS )c for c ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
81
+ page_content=' That is, any sequence {un} such that Φ′(un) → 0 and Φ(un) → c ≤ 0, possesses a convergent subsequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
82
+ page_content=' We need the following lemma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
83
+ page_content=' Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
84
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
85
+ page_content=' If un ⇀ u in E, then lim n→∞ ��ˆ |∇un|2 � ˆ ∇un · ∇(un − u) − �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) � ≥ 0, (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
86
+ page_content='3) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
87
+ page_content=' By direct computation we have �ˆ |∇un|2 � ˆ ∇un · ∇(un − u) − �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) = �ˆ |∇un|2 � ˆ |∇(un − u)|2 + �ˆ |∇un|2 − ˆ |∇u|2 � ˆ ∇u · ∇(un − u) ≥ �ˆ |∇un|2 − ˆ |∇u|2 � ˆ ∇u · ∇(un − u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
88
+ page_content=' 4 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
89
+ page_content=' JIANG AND S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
90
+ page_content=' LIU Since un ⇀ u in E, the right hand side goes to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
91
+ page_content=' The desired result follows from taking lower limit on both sides of the above inequality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
92
+ page_content=' Now, we are ready to prove Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
93
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
94
+ page_content=' Proof ( Proof of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
95
+ page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
96
+ page_content=' Let φ : [0, ∞) → R be a decreasing C∞-function such that |φ′(t)| ≤ 2, φ(t) = 1 for t ∈ [0, 1] , φ(t) = 0 for t ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
97
+ page_content=' We consider the following truncated functional I : E → R, which is a modification of the truncated functional used in [8], I(u) = 1 2 ∥u∥2 − 1 2 � ∥u∗∥2 + 2 ˆ F(u) � φ(∥u∥2) + 1 4 �ˆ |∇u|2 �2 , (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
98
+ page_content='4) where u∗ = u− + u0 ∈ E− ⊕ E0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
99
+ page_content=' The derivative I′ is given by ⟨I′(u), v⟩ = � 1 − � ∥u∗∥2 + 2 ˆ F(u) � φ′(∥u∥2) � (u, v) − � (u∗, v∗) + ˆ f (u)v � φ(∥u∥2) + �ˆ |∇u|2 � ˆ ∇u · ∇v (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
100
+ page_content='5) for u, v ∈ E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
101
+ page_content=' We will apply Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
102
+ page_content='1 to I to get a sequence of critical points {uk} for I such that I(uk) ≤ 0, uk → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
103
+ page_content=' Since I(u) = Φ(u) for ∥u∥ ≤ 1, we see that for large k all the uk are critical points of Φ and Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
104
+ page_content='1 is proved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
105
+ page_content=' Obviously I is even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
106
+ page_content=' If ∥u∥ ≥ 2, then φ(∥u∥2) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
107
+ page_content=' Hence I(u) = 1 2 ∥u∥2 + 1 4 �ˆ |∇u|2 �2 ≥ 1 2 ∥u∥2 → +∞, as ∥u∥ → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
108
+ page_content=' This means that I is coercive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
109
+ page_content=' To verify (PS )c for c ≤ 0, let {un} be a sequence in E such that I(un) → c ≤ 0, I′(un) → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
110
+ page_content=' Since I is coercive, {un} is bounded in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
111
+ page_content=' Up to a subsequence, we may assume that un ⇀ u in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
112
+ page_content=' Then − ����u∗ n ��� 2 + 2 ˆ F(un) � φ(∥un∥2) = 2I(un) − ∥un∥2 − 1 2 �ˆ |∇un|2 �2 ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
113
+ page_content=' Hence ���u∗ n ��� 2 + 2 ˆ F(un) ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
114
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
115
+ page_content='6) Because φ′(∥un∥2) ≤ 0 and lim n→∞ (un, un − u) = lim n→∞ ∥un∥2 − ∥u∥2 ≥ 0, INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL 5 up to a further subsequence we may assume ����u∗ n ��� 2 + 2 ˆ F(un) � φ′(∥un∥2) (un, un − u) −→ α ≤ 0, (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
116
+ page_content='7) note here that by the boundedness of {un}, the coefficient of (un, un − u) is bounded.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
117
+ page_content=' Thanks to Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
118
+ page_content='2, we may also assume �ˆ |∇un|2 � ˆ ∇un · ∇(un − u) − �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) −→ β ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
119
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
120
+ page_content='8) From the subcritical assumption (f1) and the compact embedding E ֒→ L2(Ω), it is well known that ˆ f (un) (un − u) → 0, ˆ f (u) (un − u) → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
121
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
122
+ page_content='9) Finally, because dim(E− ⊕ E0) < ∞, we also have �u∗ n, u∗ n − u∗� → 0, �u∗, u∗ n − u∗� → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
123
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
124
+ page_content='10) Computing ⟨I′(un), un − u⟩ and ⟨I′(u), un − u⟩ via (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
125
+ page_content='5) then subtracting the results, we deduce from (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
126
+ page_content='7), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
127
+ page_content='8), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
128
+ page_content='9) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
129
+ page_content='10) that ∥un − u∥2 = ⟨I′(un) − I′(u), un − u⟩ + ����u∗ n ��� 2 + 2 ˆ F(un) � φ′(∥un∥2) (un, un − u) − � ∥u∗∥2 + 2 ˆ F(u) � φ′(∥u∥2) (u, un − u) + ��u∗ n, u∗ n − u∗� + ˆ f (un) (un − u) � φ(∥un∥2) − ��u∗, u∗ n − u∗� + ˆ f (u) (un − u) � φ(∥u∥2) − �ˆ |∇un|2 � ˆ ∇un · ∇(un − u) + �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) = �o(1) + α − β� → (α − β) ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
130
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
131
+ page_content='11) It follows that un → u in E and I satisfies (PS )c for c ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
132
+ page_content=' Finally, for k ∈ N, let Xk be an arbitrary k-dimensional subspace of E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
133
+ page_content=' There is Λk > 0 such that |u|2 2 ≥ Λk ∥u∥2 for u ∈ Xk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
134
+ page_content=' There is also a constant η > 0 such that for all u ∈ E we have ˆ |∇u|2 ≤ η ∥u∥2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
135
+ page_content=' From (f2), there is δ > 0 such that F(t) ≥ 1 + η2 Λk t2 for t ∈ (−δ, δ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
136
+ page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
137
+ page_content='12) 6 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
138
+ page_content=' JIANG AND S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
139
+ page_content=' LIU Take ρk ∈ (0, 1) such that if u ∈ Xk, ∥u∥ = ρk, then |u|∞ < δ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
140
+ page_content=' For u ∈ Xk ∩ S ρk we have |u(x)| ≤ δ for all x ∈ Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
141
+ page_content=' Hence by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
142
+ page_content='12), I(u) = Φ(u) = 1 2 � ∥u+∥2 − ���u−��� 2� + 1 4 �ˆ |∇u|2 �2 − ˆ F(u) ≤ ∥u∥2 + η2 4 ∥u∥4 − 1 + η2 Λk ˆ u2 ≤ η2 4 ρ4 k − η2ρ2 k ≤ −3η2 4 ρ2 k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
143
+ page_content=' Thus sup Xk∩S ρk I ≤ −3η2 4 ρ2 k < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
144
+ page_content=' Now, by Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
145
+ page_content='1, I has a sequence of critical points {uk} such that uk → 0 in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
146
+ page_content=' For some k0, if k ≥ k0 then ∥uk∥ < 1 and uk is a critical point of Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
147
+ page_content=' Hence Φ has a sequence of critical points {uk}k≥k0 converging to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
148
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
149
+ page_content=' Proof of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
150
+ page_content='2 Given u ∈ E, let φu be the solution of the second equation in the system (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
151
+ page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
152
+ page_content=' It is well known that if u ∈ E is a critical point of Φ : E → R, Φ(u) = 1 2 ˆ � |∇u|2 + V(x)u2� + 1 4 ˆ φuu2 − ˆ F(u) = 1 2 � ∥u+∥2 − ���u−��� 2� + 1 4 ˆ φuu2 − ˆ F(u), then (u, φu) is a solution of (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
153
+ page_content='4), this idea was initiated from Benci et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
154
+ page_content=' [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
155
+ page_content=' Similar to (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
156
+ page_content='4) we consider a truncated functional I : E → R I(u) = 1 2 ∥u∥2 − 1 2 � ∥u∗∥2 + 2 ˆ F(u) � φ(∥u∥2) + 1 4 ˆ φuu2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
157
+ page_content=' Then I is an even coercive functional with I(0) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
158
+ page_content=' Similar to the last section, using ( f2), for k-dimensional subspace Xk there is ρk > 0 such that (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
159
+ page_content='2) holds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
160
+ page_content=' To verify the (PS )c condition with c ≤ 0 for I, we need the following analogue of Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
161
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
162
+ page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
163
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
164
+ page_content=' If un ⇀ u in E, then lim n→∞ �ˆ φunun (un − u) − ˆ φuu (un − u) � = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
165
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
166
+ page_content='1) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
167
+ page_content=' It is well known that φu is obtained from applying Riesz lemma to the func- tional ℓu : v �→ ´ u2v on E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
168
+ page_content=' Thus ∥φu∥ = ∥ℓu∥ = sup ∥v∥=1 ����� ˆ u2v ����� ≤ sup ∥v∥=1 � |u2|3 |v|3/2 � = |u|2 6 sup ∥v∥=1 |v|3/2 ≤ C ∥u∥2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
169
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
170
+ page_content='2) INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL 7 Since {un} is bounded, we know that �φun � is also bounded in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
171
+ page_content=' By the compactness of the embedding E ֒→ L12/5(Ω), up to a subsequence we have un → u in L12/5(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
172
+ page_content=' Hence ����� ˆ φunun (un − u) ����� ≤ ���φun ���6 |un|12/5 |un − u|12/5 → 0, because �φun � and {un} are bounded in L6(Ω) and L12/5(Ω), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
173
+ page_content=' Similarly, the second integral in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
174
+ page_content='1) vanishes as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
175
+ page_content=' Let {un} be a (PS )c sequence of Φ with c ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
176
+ page_content=' It is easy to see that (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
177
+ page_content='6) still holds in current situation, thus we have (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
178
+ page_content='7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
179
+ page_content=' Using (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
180
+ page_content='7), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
181
+ page_content='9), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
182
+ page_content='10), and Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
183
+ page_content='1 we have an analogue of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
184
+ page_content='11) ∥un − u∥2 → α ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
185
+ page_content=' Thus un → u in E and (PS )c is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
186
+ page_content=' Applying Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
187
+ page_content='1, I has a sequence of critical points uk → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
188
+ page_content=' Since I(u) = Φ(u) for ∥u∥ ≤ 1, for large k, uk is critical point of Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
189
+ page_content=' Thus Φ has a sequence of critical points uk → 0 in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
190
+ page_content=' From (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
191
+ page_content='2) we have φuk → 0 in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
192
+ page_content=' Thus (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
193
+ page_content='4) has a sequence of solutions (uk, φuk) → (0, 0) in E × E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
194
+ page_content=' References [1] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
195
+ page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
196
+ page_content=' Alves, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
197
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
198
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
199
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
200
+ page_content=' Corrˆea, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
201
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
202
+ page_content=' Ma, Positive solutions for a quasilinear elliptic equation of Kirchhoff type, Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
203
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
204
+ page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
205
+ page_content=', 49 (2005), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
206
+ page_content=' 85–93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
207
+ page_content=' [2] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
208
+ page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
209
+ page_content=' Alves and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
210
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
211
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
212
+ page_content=' Souto, Existence of least energy nodal solution for a Schr¨odinger-Poisson system in bounded domains, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
213
+ page_content=' Angew.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
214
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
215
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
216
+ page_content=', 65 (2014), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
217
+ page_content=' 1153–1166.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
218
+ page_content=' [3] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
219
+ page_content=' Benci and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
220
+ page_content=' Fortunato, An eigenvalue problem for the Schr¨odinger-Maxwell equations, Topol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
221
+ page_content=' Methods Nonlinear Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
222
+ page_content=', 11 (1998), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
223
+ page_content=' 283–293.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
224
+ page_content=' [4] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
225
+ page_content=' Cheng, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
226
+ page_content=' Wu, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
227
+ page_content=' Liu, Multiple solutions for a class of Kirchhoff type problems with concave nonlinearity, NoDEA Nonlinear Differential Equations Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
228
+ page_content=', 19 (2012), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
229
+ page_content=' 521–537.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
230
+ page_content=' [5] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
231
+ page_content=' Faraci and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
232
+ page_content=' Silva, On the Brezis-Nirenberg problem for a Kirchhoff type equation in high dimension, Calc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
233
+ page_content=' Var.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
234
+ page_content=' Partial Differential Equations, 60 (2021), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
235
+ page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
236
+ page_content=' 22, 33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
237
+ page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
238
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
239
+ page_content=' Ferreira and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
240
+ page_content=' Ubilla, A critical concave-convex Kirchhoff-type equation in R4 involving potentials which may vanish at infinity, Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
241
+ page_content=' Henri Poincar´e, 23 (2022), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
242
+ page_content=' 25–47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
243
+ page_content=' [7] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
244
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
245
+ page_content=' Furtado and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
246
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
247
+ page_content=' Zanata, Multiple solutions for a Kirchhoff equation with nonlinearity having arbitrary growth, Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
248
+ page_content=' Aust.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
249
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
250
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
251
+ page_content=', 96 (2017), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
252
+ page_content=' 98–109.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
253
+ page_content=' [8] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
254
+ page_content=' He and Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
255
+ page_content=' Wu, Multiplicity results for sublinear elliptic equations with sign-changing potential and general nonlinearity, Bound.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
256
+ page_content=' Value Probl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
257
+ page_content=', (2020), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
258
+ page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
259
+ page_content=' 159, 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
260
+ page_content=' [9] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
261
+ page_content=' Liu and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
262
+ page_content='-Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
263
+ page_content=' Wang, On Clark’s theorem and its applications to partially sublinear problems, Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
264
+ page_content=' Inst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
265
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
266
+ page_content=' Poincar´e Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
267
+ page_content=' Non Lin´eaire, 32 (2015), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
268
+ page_content=' 1015–1037.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
269
+ page_content=' [10] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
270
+ page_content=' Pei and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
271
+ page_content=' Ma, Multiple solutions for a Kirchhoff-type equation, Mediterr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
272
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
273
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
274
+ page_content=', 17 (2020), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
275
+ page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
276
+ page_content=' 78, 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
277
+ page_content=' [11] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
278
+ page_content='-Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
279
+ page_content=' Wang, Nonlinear boundary value problems with concave nonlinearities near the origin, NoDEA Nonlinear Differential Equations Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
280
+ page_content=', 8 (2001), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
281
+ page_content=' 15–33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
282
+ page_content=' [12] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
283
+ page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
284
+ page_content=' Yang and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
285
+ page_content='-Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
286
+ page_content=' Ou, Nodal solutions for Schr¨odinger-Poisson systems with concave-convex nonlinearities, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
287
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
288
+ page_content=' Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
289
+ page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
290
+ page_content=', 499 (2021), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
291
+ page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
292
+ page_content=' 125006, 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
293
+ page_content=' [13] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
294
+ page_content=' Yu and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
295
+ page_content=' Zhang, Sufficient and necessary conditions for ground state sign-changing solutions to the Schr¨odinger-Poisson system with cubic nonlinearity on bounded domains, Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
296
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
297
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
298
+ page_content=', 123 (2022), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
299
+ page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
300
+ page_content=' 107570, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
GtE5T4oBgHgl3EQfWA9Z/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6e04662af5f0860e556184910d515211a53be8714ccb4a1fe98b2231e5e6d859
3
+ size 4849709
IdFIT4oBgHgl3EQfYSv6/content/tmp_files/2301.11248v1.pdf.txt ADDED
@@ -0,0 +1,1567 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ SUPERCONCENTRATION FOR MINIMAL SURFACES IN
2
+ FIRST PASSAGE PERCOLATION AND
3
+ DISORDERED ISING FERROMAGNETS
4
+ BARBARA DEMBIN
5
+ CHRISTOPHE GARBAN
6
+ Abstract. We consider the standard first passage percolation model on Zd
7
+ with a distribution G taking two values 0 < a < b. We study the maximal
8
+ flow through the cylinder [0, n]d−1 × [0, hn] between its top and bottom as
9
+ well as its associated minimal surface(s). We prove that the variance of the
10
+ maximal flow is superconcentrated, i.e. in O( nd−1
11
+ log n ), for h ≥ h0 (for a large
12
+ enough constant h0 = h0(a, b)).
13
+ Equivalently, we obtain that the ground state energy of a disordered Ising
14
+ ferromagnet in a cylinder [0, n]d−1 × [0, hn] is superconcentrated when opposite
15
+ boundary conditions are applied at the top and bottom faces and for a large
16
+ enough constant h ≥ h0 (which depends on the law of the coupling constants).
17
+ Our proof is inspired by the proof of Benjamini–Kalai–Schramm [3]. Yet,
18
+ one major difficulty in this setting is to control the influence of the edges since
19
+ the averaging trick used in [3] fails for surfaces.
20
+ Of independent interest, we prove that minimal surfaces (in the present
21
+ discrete setting) cannot have long thin chimneys.
22
+ 1. Introduction
23
+ 1.1. Context and main results. We focus in this paper on the fluctuations of the
24
+ maximal flow (or equivalently of the minimal surface of the dual problem) through
25
+ a cylinder in Zd of the form [0, n]d−1 × [0, H], where the vertical height H will
26
+ be through most of this text of order hn. It is defined informally as follows (see
27
+ Subsection 1.3 below for a more formal definition). Each non-oriented edge e inside
28
+ [0, n]d−1 × [0, hn] carries an i.i.d capacity t(e) whose distribution takes two values
29
+ 0 < a < b. Without much loss of generality, one can think of t(e) ∈ {1, 2} with
30
+ equal probability. The (vertical) maximum flow through this cylinder is informally
31
+ the maximum amount of water which can be injected at the bottom, say, of the
32
+ cylinder so that it can flow upwards in such a way that the amount of water flowing
33
+ through any given edge e is less or equal than t(e). Let us denote this maximal flow
34
+ by Φ = Φ([0, n]d−1 × {0}, H). By max-flow/min-cut principle, it is well-known that
35
+ this maximal flow can be computed by minimizing the capacity over all possible
36
+ cut-sets. I.e,
37
+ Φ = min
38
+ E
39
+ ��
40
+ e∈E
41
+ t(e)
42
+
43
+ ,
44
+ where the mimimum is taken over all cut-sets E which separate the bottom [0, n]d−1×
45
+ {0} from the top [0, n]d−1 × {H}. There may be several such minimizing cut-sets E
46
+ and by duality each of those correspond to a minimal surface embedded in Rd (see
47
+ Figure 1).
48
+ In dimension d = 2, the minimal cut-sets in [0, n] × [0, H] correspond to geodesics
49
+ on the dual graph (Z2)∗ = Z2 + ( 1
50
+ 2, 1
51
+ 2) which connect the left and right boundaries
52
+ of the rectangle. The maximal flow can then be studied as a random metric problem
53
+ 1
54
+ arXiv:2301.11248v1 [math.PR] 26 Jan 2023
55
+
56
+ 2
57
+ BARBARA DEMBIN
58
+ CHRISTOPHE GARBAN
59
+ in this special case and much is known about fluctuations, large-deviations etc. in
60
+ this case. Let us mention in particular the breakthrough work by Benjamini-Kalai-
61
+ Schramm [3] which implies in the present setting that Var[Φ([0, n] × {0}, H)] =
62
+ O(
63
+ n
64
+ log n) as long as H = Ω(nϵ). Furthermore, in this d = 2 case, the fluctuations
65
+ are believed to be described as n → ∞ by the KPZ universality class (in particular
66
+ it is conjectured that Var[Φ] ≍ n2/3, see for example [19] where this is proved for
67
+ directed last-passage percolation).
68
+ In higher dimensions d ≥ 3, the problem may no longer be formulated in terms of
69
+ geodesics and is expressed instead in terms of minimal surfaces (of co-dimension 1).
70
+ The analysis of such maximal flows/minimal surfaces in d ≥ 3 was first considered in
71
+ the seminal paper by Kesten for d = 3: Surfaces with minimal random weights and
72
+ maximal flows: a higher dimensional version of first-passage percolation ([20]) where
73
+ he obtained a law of large numbers for Φ as well as some large deviations estimates.
74
+ Since the work [20], there has been a lot of activity on the analysis of the maximal
75
+ flow Φ: Kesten’s results were extended by Zhang [27] to any dimensions, and by
76
+ Rossignol–Théret in [24] to any dimensions for tilted flat cylinders (with height
77
+ H = o(n)). Cerf–Théret proved a law of large number for more general domains
78
+ in [5]. They later studied the speed of upper and lower large deviations in [6, 7].
79
+ Interestingly, upper large deviations are in nd while lower large deviations are in
80
+ nd−1. In [15, 14], Dembin–Théret proved upper and lower large deviations principle
81
+ for the maximal flow in general domains.
82
+ Let us now introduce another setting where minimal surfaces appear in the same
83
+ fashion. Consider the disordered Ising ferromagnet in [0, n]d−1×[0, hn] with opposite
84
+ boundary conditions applied at the top and the bottom. Each non-oriented edge
85
+ e inside [0, n]d−1 × [0, hn] carries an i.i.d coupling constant Je whose distribution
86
+ takes two values 0 < a < b. For a configuration σ ∈ {−1, 1}[0,n]d−1×[0,hn]∩Zd, its
87
+ associated energy is
88
+ H(σ) = −
89
+
90
+ e={x,y}
91
+ Jeσxσy.
92
+ One can check that the ground state energy (i.e. the minimal energy) corresponds
93
+ to Φ and the corresponding minimal surface corresponds to the interface of a ground
94
+ state (i.e. a configuration achieving the minimal energy). This connection was
95
+ mentioned for example in Licea–Newman [21].
96
+ To our knowledge, prior to this work, nothing was known on the fluctuations of
97
+ Φ = Φ([0, n]d−1 × [0, H]) (besides the easy upper bound Var[Φ] = O(nd−1)). As
98
+ we shall explain further in the next subsection, this may be due to the following
99
+ reason. A crucial step in the proof of Benjamini-Kalai-Schramm in [3] is based on a
100
+ beautiful averaging trick which no longer works with minimal surfaces.
101
+ Our main result can be stated as follows.
102
+ Theorem 1.1. For any d ≥ 2 and any distribution G on 0 < a < b, there exist
103
+ C > 0 and h0 > 0, such that for any n ≥ 1 and H ≥ h0n, we have
104
+ Var(Φ([0, n]d−1 × {0}, H) ≤ C nd−1
105
+ log n .
106
+ As it has been identified in the seminal work by Chatterjee [8], a variance of
107
+ order O( nd−1
108
+ log n ) versus a variance of order Ω(nd−1) induces a completely different
109
+ behaviour of minimal cut-sets under small random perturbations of the capacities
110
+ {t(e)}e. Indeed, a variance negligible w.r.t nd−1 corresponds to the phenomenon of
111
+ superconcentration ([8]) and it implies a certain chaoticity property for the minimal
112
+ cut-sets. We shall illustrate this in Corollary 6.1 where we will rely on a mild
113
+ extension of a very useful identity from [26]. See also the recent work of Chatterjee [9]
114
+
115
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
116
+ 3
117
+ which analyzed the groundstate of an Ising model with non-ferromagnetic disordered
118
+ coupling constants.
119
+ We complete our analysis of the fluctuations of Φ = Φ([0, n]d−1 × {0}, H) by the
120
+ following easier lower bound on the variance. Its proof in Section 5 will rely on the
121
+ martingale decomposition method from Newman–Piza [22].
122
+ Theorem 1.2. Let G be a distribution on {a, b} such that G({b}) > pc, where pc
123
+ is the critical parameter for Bernoulli bond percolation on (Zd, Ed). There exists a
124
+ constant c = c(G) > 0 such that for all n, H ≥ 1, we have
125
+ Var(Φ([0, n]d−1 × {0}, H)) ≥ cnd−1
126
+ H
127
+ .
128
+ We now introduce a slightly different model for which a greatly simplified version
129
+ of our proof also implies superconcentration (see Remark 1 below). In the same
130
+ cylinder [0, n]d−1 × [0, H], we now assign i.i.d weights {t(x)} to the vertices of the
131
+ cylinder, again with a distribution G on 0 < a < b. We consider the following
132
+ minimal weight
133
+ ΨLip = ΨLip([0, n]d−1 × {0}, H) := min
134
+ ψ
135
+
136
+
137
+
138
+
139
+ u∈[0,n]d−1
140
+ t(u, ψ(u))
141
+
142
+
143
+ � ,
144
+ where the minimum is taken over all 1-Lipschitz functions ψ : [0, n]d−1 → {0, 1, . . . , H}
145
+ (i.e. such that |ψi − ψj| ≤ 1 for any i ∼ j in [0, n]d−1). We obtain in this setting
146
+ the analog of Theorem 1.1.
147
+ Theorem 1.3. There exist C, c > 0 and h0 > 0, both depending on 0 < a < b, such
148
+ that for any n ≥ 1 and H ≥ h0n, we have
149
+
150
+ cnd−1
151
+ H
152
+
153
+
154
+ Var(ΨLip([0, n]d−1 × {0}, H) ≤ C nd−1
155
+ log n .
156
+ To conclude this introduction, we wish to emphasise that if minimal surfaces
157
+ happen to be anchored at some deterministic curve along the boundary of the
158
+ cylinder, then we expect a completely different scenario for their fluctuations in
159
+ large enough dimensions d. We discuss two possible such situations:
160
+ (1) Instead of considering the maximum flow Φ from the bottom [0, n]d−1×{0} to
161
+ the top [0, n]d−1×{H}, let us consider the maximal flow τ([0, n]d−1×{0}, H)
162
+ between the bottom half and the top half of the cylinder, (i.e. between
163
+ ∂([0, n]d−1 × [0, H]) ∩ {x ∈ Rd, x · ed < H
164
+ 2 ]} and ∂([0, n]d−1 × [0, H]) ∩ {x ∈
165
+ Rd, x·ed > H
166
+ 2 ]}). Then, the associated minimal surfaces are anchored in the
167
+ boundary of the meridian plane of the cylinder [0, n]d−1 ×{ H
168
+ 2 }. For a formal
169
+ definition, we refer to [24]. In high dimensions, by analogy to other models
170
+ of surface (see in particular [23]), we expect that the anchored surface is
171
+ localized, that is, there exists a constant C > 0 such that for any n, almost
172
+ all the surface is within distance C of the meridian plane [0, n]d−1 × { H
173
+ 2 }.
174
+ In that case, by a similar proof as Theorem 1.2, we can prove that there
175
+ exists c > 0 depending on G such that for all n, H ≥ 1
176
+ Var(τ([0, n]d−1 × {0}, H)) ≥ cnd−1 .
177
+ This implies that in high dimensions, we don’t expect the variance of the
178
+ anchored surface to be superconcentrated. This is another hint that minimal
179
+ surfaces behave very differently as geodesics (of codimension d − 1) in
180
+ standard first percolation theory.
181
+
182
+ 4
183
+ BARBARA DEMBIN
184
+ CHRISTOPHE GARBAN
185
+ (2) In the spirit of the easier Theorem 1.3, we may further restrict the 1-Lipschitz
186
+ functions ψ to be equal to H
187
+ 2 along ∂[0, n]d−1. The localisation result for
188
+ uniform such 1-Lipschitz functions proved by Peled in [23] highly suggests
189
+ that in high enough dimension, the variance of the associated minimal weight
190
+ Ψanchored
191
+ Lip
192
+ will be ≥ cnd−1.
193
+ We shall discuss this expected different behaviour further in Proposition 5.1 as well
194
+ as in open question 1.
195
+ 1.2. Idea of proof.
196
+ Benjamini-Kalai-Schramm and Talagrand. As we mentioned above, a similar
197
+ theorem was first proved for the study of passage times in first passage percolation
198
+ by Benjamini–Kalai–Schramm [3]. A key ingredient of [3] which we will also use
199
+ is Talagrand’s inequality [25] (see Theorem 1.4). To obtain a “sub-surface” (i.e.
200
+ o(nd−1)) upper-bound using Talagrand’s inequality, one needs to prove that most
201
+ edges have a low influence on the maximal flow Φ. In [3], the influence of an edge is
202
+ related to the probability that the geodesic goes through that edge. In our setting,
203
+ it will be related to the probability that the minimal surfaces goes through the
204
+ plaquette dual to that edge. We refer to [17, 16] for background on the interplay
205
+ between Boolean functions and statistical physics.
206
+ The main difficulty of this approach, already in [3], is that it happens to be very
207
+ challenging to upper-bound the influence of any fixed given edge. In fact, for the
208
+ passage times in first passage percolation, proving that the maximum influence in
209
+ the bulk goes to zero (this is known as the BKS midpoint problem) was only proved
210
+ a few years ago by Damron–Hanson [10], Ahlberg–Hoffman [1] and was recently
211
+ solved quantitatively by Dembin–Elboim–Peled in [13].
212
+ To circumvent this, Benjamini–Kalai–Schramm relied in [3] on a very nice av-
213
+ eraging trick by randomizing the endpoints of the desired passage times. Since
214
+ the randomized endpoints remain close to the original endpoints of the geodesic,
215
+ it follows that the difference of passage times between the new geodesic and the
216
+ original geodesic is negligible compared to the upper bound on standard deviation
217
+ √n.
218
+ No averaging trick for surfaces. We now explain why this averaging trick fails
219
+ for surfaces. Indeed, consider two surfaces anchored respectively in the boundary of
220
+ [0, n]d−1 × {0} and [0, n]d−1 × {1}, the best control we can get on the difference of
221
+ capacity is of order nd−2. When d ≥ 3, we have nd−2 ≥ n(d−1)/2 where n(d−1)/2 is
222
+ the order of the upper bound for the standard deviation for surfaces (obtained for
223
+ example via Efron-Stein). This shows that as soon as d ≥ 3, we need to proceed
224
+ differently as in [3] and a close inspection of influences will be needed.
225
+ Idea and structure of the proof. We start by noting that if we were considering
226
+ a maximal flow in a transitive graph, for example the maximal flow with non-trivial
227
+ homology along the dth direction in a torus Td−1
228
+ n
229
+ × TH, then a direct application of
230
+ Talagrand’s inequality (Theorem 1.4) would readily imply fluctuations of order at
231
+ most n
232
+ d−1
233
+ 2 /√log n for any H ≥ Ω(nϵ) just by using the fact that all edges have the
234
+ same influence by transitivity of the graph.
235
+ In our present case, despite the lack of transitive action acting on the cylinder
236
+ [0, n]d−1 × [0, H], the rough idea is that if the minimal surface En (chosen among all
237
+ possible minimal surfaces in any deterministic way, say) happens to be with high
238
+ probability at distance at least 1 from the top and bottom boundary, then if we shift
239
+ vertically by one the set of capacities {t(e)} (and also replace the missing bottom
240
+ capacities by the top capacities that went off the cylinder), one may guess that,
241
+ again with high probability, the new minimal surface En(tshifted) will be nothing but
242
+
243
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
244
+ 5
245
+ the vertical shift of En(t). Of course what could prevent this to happen comes from
246
+ the effect of shuffling the top and bottom capacities. If one could prove that these
247
+ two claims indeed happen with high enough probability, then it would imply that
248
+ all edges in a vertical column have a very close influence which would allow us to
249
+ conclude using Talagrand’s inequality 1.4.
250
+ In the end, we do not quite succeed making this intuition rigorous but our proof
251
+ is strongly influenced by analysing the effect of such vertical shifts. The proof of
252
+ Theorem 1.1 will be based on the following three main steps which are of independent
253
+ interest and do not have an analog in the analysis of Benjamini-Kalai-Schramm in
254
+ [3]:
255
+ (1) First, we shall prove that minimal surfaces cannot wiggle too much vertically.
256
+ This will be achieved in Proposition 2.1. A similar phenomenon is known to
257
+ arise in the analysis of minimal surfaces, see [12]. Our proof in the discrete
258
+ setting will rely on the isoperimetric bounds in Zd obtained in [4]. This
259
+ proposition is the technical step which is causing the restriction h ≥ h0 in
260
+ our main theorem. Its proof will be given in Section 3.
261
+ (2) Second, we need to know that minimal surfaces are unlikely to stay too
262
+ close to the top and bottom boundaries. We will not prove this for the
263
+ true minimal surfaces which lead to the maximal flow Φ([0, n]d−1 × {0}, H)
264
+ but rather for a slightly modified notion of maximal flow in which minimal
265
+ surfaces too close to the top and bottom boundaries receive a penalisation.
266
+ This modified notion of maximal flow is called �Φ (see (5)) and is introduced
267
+ in Section 2. For this modified maximal flow �Φ, we can show that the
268
+ associated minimal surfaces are typically away from the top and bottom
269
+ boundaries. This is the purpose of Proposition 4.1.
270
+ (3) Finally, the last difficulty we are facing is the possibility that the minimal
271
+ surface (for the modified �Φ) may often produce a high vertical cliff at certain
272
+ locations. This would make the influence profile too inhomogeneous to
273
+ allow us to control the magnitude of influences. Using a deep estimate from
274
+ Zhang’s work [27] (inspired by the original work by Kesten [20]), we will
275
+ prove Proposition 2.2 which shows that there are only few edges that may
276
+ carry a large influence (we believe such edges do not exist but we cannot
277
+ rule this out rigorously). Its proof will be the purpose of Section 4.
278
+ Remark 1. We claim that one can prove Theorem 1.2 using the same proof, except
279
+ there are several drastic simplifications. First, the absence of long thin chimneys
280
+ (Proposition 2.1) is obvious in this case. Also, vertical cliffs do not exist by definition
281
+ (thanks to the 1-Lipschitz condition) and as such Proposition 2.2 is much easier to
282
+ prove in this case. We leave the details to the reader.
283
+ 1.3. Background.
284
+ Definition of maximal flow. We now provide a more formal definition of maximal
285
+ flows/minimal surfaces. We consider a first passage percolation on the graph (Zd, Ed)
286
+ where Ed is the set of edges that link all the nearest neighbors for the Euclidean norm
287
+ in Zd. Write (e1, . . . , ed) for the canonical basis of Rd. We consider a distribution
288
+ G on R+. For each edge e in Ed we assign a random variable te of distribution G
289
+ such that the family (te)e∈Ed is independent.
290
+ Let A ⊂ Rd−1 × {0}. Let h > 0, we denote by cyl(A, h) the cylinder of basis A
291
+ and height h defined by
292
+ cyl(A, h) := {x + ted : x ∈ A, t ∈ [0, h]} .
293
+
294
+ 6
295
+ BARBARA DEMBIN
296
+ CHRISTOPHE GARBAN
297
+ Define the discretized versions B(A, h) and T(A, h) of the bottom and the top of
298
+ the cylinder cyl(A, h)
299
+ B(A, h) :=
300
+
301
+ x ∈ Zd ∩ cyl(A, h) :
302
+ ∃y /∈ cyl(A, h), ⟨x, y⟩ ∈ Ed
303
+ and ⟨x, y⟩ intersects A
304
+
305
+ and
306
+ T(A, h) :=
307
+
308
+ x ∈ Zd ∩ cyl(A, h) :
309
+ ∃y /∈ cyl(A, h), ⟨x, y⟩ ∈ Ed
310
+ and ⟨x, y⟩ intersects A + hed
311
+
312
+ .
313
+ Let E ⊂ Ed be a set of edges. We say that E cuts B(A, h) from T(A, h) in
314
+ cyl(A, h) (or is a cutset, for short) if any path from B(A, h) to T(A, h) in cyl(A, h)
315
+ intersects E.
316
+ We associate with any set of edges E ⊂ Ed its capacity T(E) defined by
317
+ T(E) :=
318
+
319
+ e∈E
320
+ te .
321
+ We define the maximal flow from the top to the bottom of the cylinder cyl(A, h)
322
+ Φ(A, h) := min{T(E) : E cuts T(A, h) from B(A, h) in cyl(A, h)} .
323
+ (1)
324
+ As already mentioned in the introduction, we use the terminology maximal flow as
325
+ by max-flow min-cut theorem, the dual problem of finding minimal surface boils
326
+ down to computing the maximal flow.
327
+ From now on, we assume that G can only take two values 0 < a < b. See Open
328
+ Question 3 for a discussion of possible extensions to more general distributions using
329
+ for example [2, 11].
330
+ Dual representation of cutsets. Let E ⊂ Ed be a cutset separating T(A, h)
331
+ from B(A, h) in cyl(A, h). The set E is a (d − 1)-dimensional object, that can be
332
+ seen as a surface. To better understand this interpretation in term of surfaces,
333
+ we can associate with each edge e ∈ E a small plaquette e∗. The plaquette e∗ is
334
+ an hypersquare of dimension d − 1 whose sides have length one and are parallel
335
+ to the edges of the graphs, such that e∗ is normal to e and cuts it in its middle.
336
+ We also define the dual of a set of edge E by E∗ := {e∗, e ∈ E} (see Figure 1).
337
+ Roughly speaking, if the set of edges E cuts T(A, h) from B(A, h) in cyl(A, h), the
338
+ surface of plaquettes E∗ disconnects T(A, h) from B(A, h) in cyl(A, h). Note that,
339
+ in dimension 2, a surface of plaquettes is very similar to a path in the dual graph of
340
+ Z2 and thus the study of minimal cutsets is very similar to the study of geodesics.
341
+ e
342
+ e∗
343
+ Figure 1. The dual of a cutset between the top and the bottom
344
+ of a cylinder for d = 3.
345
+
346
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
347
+ 7
348
+ Concentration inequalities. Let J be a finite set of indices. For ω ∈ {a, b}J and
349
+ j ∈ J denote σjω the function that switches the value in the j-th coordinate. For
350
+ f : {a, b}J → R, denote
351
+ ∂jf := f − f ◦ σj
352
+ 2
353
+ .
354
+ For p ∈ (0, 1), consider µp the product measure on {a, b}J which gives a with
355
+ probability p and b with probability 1 − p. We denote ∥f∥2
356
+ 2 =
357
+
358
+ f 2dµp.
359
+ Theorem 1.4 (Talagrand’s inequality [25] Theorem 1.5). Let f : {a, b}J → R and
360
+ p ∈ {0, 1}. We have
361
+ Var(f) ≤ C log
362
+ 2
363
+ p(1 − p)
364
+
365
+ j∈J
366
+ ∥∂jf∥2
367
+ 2
368
+ 1 + log(∥∂jf∥2/∥∂jf∥1)
369
+ (2)
370
+ where C is a universal constant.
371
+ The following proposition is an upper bound on the variance using Efron–Stein
372
+ inequality.
373
+ Theorem 1.5 (Efron-Stein inequality). Let X = (X1, . . . , Xn) and X′ = (X′
374
+ 1, . . . , X′
375
+ n)
376
+ be two independent and identically distributed vectors taking values in a space X n.
377
+ Let f : X n → R. We have
378
+ Var(f(X)) ≤
379
+ n
380
+
381
+ i=1
382
+ E
383
+
384
+ (f(X) − E[f(X(i))|X])2�
385
+ =
386
+ n
387
+
388
+ i=1
389
+ E
390
+
391
+ (f(X) − f(X(i)))2
392
+
393
+
394
+ ,
395
+ where X(i) := (X1, . . . , Xi−1, X′
396
+ i, Xi+1, . . . , Xn) and x− = max(−x, 0).
397
+ 2. Proof of the main theorem
398
+ In this section, we state the main intermediate Propositions which were mentioned
399
+ in the Section idea of proof and which will be proved in the next two Sections. We
400
+ also implement the penalisation scheme used to “localize” the optimal surface away
401
+ from the top and bottom boundaries. This will be the purpose of the re-weighting
402
+ function Yi below. Finally, using these ingredients we give the proof of Theorem 1.1.
403
+ Geometric control on minimal surfaces. The proposition stated below will be
404
+ proved in Section 3.
405
+ Proposition 2.1 (“Absence of long thin chimneys”). Fix 0 < a < b. There exists
406
+ an even h0 > 0 depending only on 0 < a < b such that for any n ≥ 1, H ≥ 1
407
+ 2h0n and
408
+ any configuration of capacities in {a, b} assigned to the edges of [0, n]d−1 ×[0, H], all
409
+ minimal-cut sets E (i.e. that achieve the infimum in Φ([0, n]d−1 × {0}, H) defined
410
+ in (1)) are contained in a cylinder of vertical height bounded by 1
411
+ 2h0n. I.e. for any
412
+ minimal cut-set E, there exists some u ≥ 0 such that E ⊂ [0, n]d−1 × [u, u + 1
413
+ 2h0n].
414
+ Fix H ≥ h0n. Write A = [0, n]d−1 × {0}. Define for i ≤ H − 1
415
+ 2h0n
416
+ Xi := min
417
+
418
+
419
+ �T(E) :
420
+ E cuts B(A + ied, 1
421
+ 2h0n) from T(A + ied, 1
422
+ 2h0n)
423
+ in cyl(A + ied, 1
424
+ 2h0n)
425
+ and E ∩ (B(A + ied, 1
426
+ 2h0n) ∪ T(A + ied, 1
427
+ 2h0n)) ̸= ∅
428
+
429
+
430
+ � .
431
+ (3)
432
+
433
+ 8
434
+ BARBARA DEMBIN
435
+ CHRISTOPHE GARBAN
436
+ Penalisation scheme. Let 0 < ε < δ < 1/4. Set M := ⌊nε⌋ where ⌊x⌋ denotes
437
+ the largest integer smaller than x. Let (Zi)1≤i≤M be a family of i.i.d. random
438
+ variables that takes the value −1 with probability G({a}) and 1 with probability
439
+ 1 − G({a}) = G({b}). The reason for this choice is that to apply Talagrand formula
440
+ (Theorem 1.4) the te and Zi must be parameterized by a Bernoulli random variable
441
+ with the same parameter. Set
442
+ SM :=
443
+ M
444
+
445
+ k=1
446
+ Zi.
447
+ We define
448
+ i0 :=
449
+ �H
450
+ 2
451
+
452
+ + SM.
453
+ In particular i0 is a random integer variable taking value in [⌊H/2⌋−M, ⌊H/2⌋+M].
454
+ We define the family (Yi)1≤i≤H as follows
455
+ ∀1 ≤ i ≤ H
456
+ Yi = Yi(i0) :=
457
+
458
+ 0
459
+ if |i0 − i| ≤ H
460
+ 2 − nδ
461
+ n(d−1)/2
462
+ nδ log n
463
+
464
+ |i0 − i| − H
465
+ 2 + nδ�
466
+ otherwise.
467
+ (4)
468
+ Let j0 be such that
469
+ Xj0 + Yj0 =
470
+ min
471
+ 1≤i≤H− 1
472
+ 2 h0n Xi + Yi.
473
+ If there are several possible choices, we pick the smallest. Let Emin(j0) be the surface
474
+ achieving the minimum in the definition of Xj0. Again if there are several possible
475
+ choices, we choose in a deterministic way (that is invariant by translation along the
476
+ ed axis).
477
+ Edges with large influence. The following proposition will be proved in Section
478
+ 4.
479
+ Proposition 2.2. There exist n0 = n0(G) and ξ > 0 such that for all n ≥ n0
480
+ ���
481
+ e ∈ cyl(A, H) : P(e ∈ Emin(j0)) ≥ n−ξ��� ≤ nd−1−ξ.
482
+ We are now in position of proving Theorem 1.1.
483
+ Proof of Theorem 1.1. Set E be the set of edges in cyl([0, n]d−1 × {0}, H). Let I be
484
+ the set of indices that encode the choice of i0, in particular |I| = M. Set
485
+ �Φ :=
486
+ min
487
+ 1≤i≤H− 1
488
+ 2 h0n(Xi + Yi)
489
+ (5)
490
+ where (Xi)i was defined in (3) and (Yi)i in (4). Thanks to Proposition 2.1, we have
491
+ Φ([0, n]d−1 × {0}, H) =
492
+ min
493
+ 1≤i≤H− 1
494
+ 2 h0n Xi.
495
+ It is easy to check that
496
+ �����
497
+ min
498
+ 1≤i≤H− 1
499
+ 2 h0n(Xi + Yi) −
500
+ min
501
+ 1≤i≤H− 1
502
+ 2 h0n Xi
503
+ ����� ≤ n(d−1)/2
504
+ log n
505
+ .
506
+ It follows that
507
+ ���E[�Φ] − E[Φ([0, n]d−1 × {0}, H)]
508
+ ��� ≤ n(d−1)/2
509
+ log n
510
+ .
511
+
512
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
513
+ 9
514
+ and
515
+ Var(Φ([0, n]d−1 × {0}, H))
516
+ = E((Φ([0, n]d−1 × {0}, H) − EΦ([0, n]d−1 × {0}, H))2)
517
+ = E((Φ([0, n]d−1 × {0}, H) − �Φ + E�Φ − EΦ([0, n]d−1 × {0}, H) + �Φ − E�Φ)2)
518
+ ≤ 3
519
+
520
+ Var(�Φ) + 2nd−1
521
+ log n
522
+
523
+ .
524
+ (6)
525
+ Let us compute the influence of the bits in I and E. For j ∈ I, we have |∂jSM| ≤ 2
526
+ and it yields that
527
+ |∂ji0| ≤ 2
528
+ and
529
+ |∂jYi0| ≤ 2n(d−1)/2
530
+ nδ log n .
531
+ As a result,
532
+ ∀j ∈ I
533
+ |∂j �Φ|2 ≤
534
+ 4nd−1
535
+ n2δ log2 n.
536
+ Denote ∆e�Φ = �Φ ◦ σb
537
+ e − �Φ ◦ σa
538
+ e where σa
539
+ e, σb
540
+ e is the function that changes the value
541
+ of the edge e to a, respectively b. We have
542
+ P(∂e�Φ ̸= 0) = P(∆e�Φ ̸= 0) =
543
+ 1
544
+ G({a})P(∆e�Φ ̸= 0, te = a) ≤
545
+ 1
546
+ G({a})P(e ∈ Emin(j0)).
547
+ Note that if ∆e�Φ ̸= 0 and te = a, then necessarily e has to belong to the minimal
548
+ surface. For e ∈ E, thanks to the previous inequality, we have
549
+ ∥∂e�Φ∥2
550
+ 2 ≤ (b − a)2
551
+ 4
552
+ P(∂e�Φ ̸= 0) ≤ (b − a)2
553
+ 4G({a})P(e ∈ Emin(j0)).
554
+ Besides, we have by Cauchy–Schwarz inequality
555
+ ∥∂e�Φ∥1 = E
556
+ ����∂e�Φ
557
+ ���
558
+ ���
559
+
560
+
561
+ P(∂e�Φ ̸= 0) ∥∂e�Φ∥2 ≤
562
+
563
+ G({a})−1P(e ∈ Emin(j0)) ∥∂e�Φ∥2.
564
+ Let n0 be as in the statement of Proposition 2.2. Finally, by applying Theorem 1.4
565
+ and Proposition 2.2, we get for n ≥ n0
566
+ Var(�Φ)
567
+ ≤ C
568
+
569
+
570
+
571
+
572
+
573
+ j∈I
574
+ ∥∂j �Φ∥2
575
+ 2 +
576
+
577
+ e∈E:
578
+ P(e∈Emin(j0))≥n−ξ
579
+ ∥∂e�Φ∥2
580
+ 2 +
581
+
582
+ e∈E:
583
+ P(e∈Emin(j0))<n−ξ
584
+ ∥∂e�Φ∥2
585
+ 2
586
+ 1 − log(G({a})−1P(e ∈ Emin(j0))/2
587
+
588
+
589
+
590
+
591
+ ≤ C
592
+
593
+ |I|
594
+ nd−1
595
+ n2δ log2 n + (b − a)2
596
+ G({a}) nd−1−ξ +
597
+ (b − a)2
598
+ G({a})(1 + ξ
599
+ 4 log n)
600
+
601
+ e∈E
602
+ P(e ∈ Emin(j0)))
603
+
604
+ .
605
+ (7)
606
+ Besides, note that the following set is a cutset from the top to the bottom of the
607
+ cylinder cyl
608
+
609
+ A +
610
+ � H
611
+ 2
612
+
613
+ ed, 1
614
+ 2h0n
615
+
616
+ F :=
617
+
618
+ {x, x + ed}, x ∈
619
+
620
+ [0, n]d−1 ×
621
+ ��H
622
+ 2
623
+ ���
624
+ ∩ Zd
625
+
626
+ .
627
+ It follows that
628
+ �Φ ≤ X⌊ H
629
+ 2 ⌋ ≤ b|F| = b(n + 1)d−1
630
+ and
631
+ a|Emin(j0)| ≤ b(n + 1)d−1.
632
+ (8)
633
+ We conclude by combining inequalities (6), (7) and (8).
634
+
635
+
636
+ 10
637
+ BARBARA DEMBIN
638
+ CHRISTOPHE GARBAN
639
+ 3. Proof of Proposition 2.1 (absence of long chimneys)
640
+ We shall need the following discrete isoperimetric inequality from [4] (N.B. the
641
+ result in [4] is essentially sharp both in the side-length n and in the dimension d − 1,
642
+ we only need the weaker statement given below).
643
+ Theorem 3.1 (Corollary of Theorem 2 in [4]). For any d ≥ 2, there exists c =
644
+ c(d) > 0 s.t. for any n ≥ 1 and any set A ⊂ [0, n]d−1,
645
+ |∆A| ≥ c|A|1−
646
+ 1
647
+ d−1 ∧ ((n + 1)d−1 − |A|)1−
648
+ 1
649
+ d−1 ,
650
+ where ∆A stands for the edge boundary of the set A in [0, n]d−1 (i.e.
651
+ ∆A :=
652
+
653
+ {i, j}, ∥i − j∥2 = 1, i ∈ A and j ∈ [0, n]d−1 \ A
654
+
655
+ ).
656
+ Proof of Proposition 2.1. Let h0 > 0 whose value will be chosen later depending on
657
+ a and b. Let H ≥ 1
658
+ 2h0n and let E ⊂ Ed be a cut-set that achieves the infimum in
659
+ Φ([0, n]d−1 × {0}, H).
660
+ Let hmax be the maximum height in {0, . . . , H} of a vertex belonging to an edge in
661
+ the minimal cut-set E. Define similarly hmin. Our goal is then to show that uniformly
662
+ in the configuration of capacities {t(e)}, one necessarily has hmax − hmin ≤ h0
663
+ 2 .
664
+ Scanning the upper horizontal slices. We start by scanning the upper horizon-
665
+ tal layers of the cut-set E as follows. For any 1 ≤ i ≤ hmax, we call the ith upper
666
+ layer, Ui := [0, n]d−1 × {hmax − i} and we define the following subset of Ui. Let
667
+ A(i) ⊂ Ui be the set of all points x ∈ Ui such that any path γ connecting x to
668
+ [0, n]d−1 × {H} inside the cylinder [0, n]d−1 × [hmax − i, H] necessarily intersects E.
669
+ Let us start with the following two easy observations:
670
+ • Since E is a minimal cut-set, it is easy to check that A(i) ̸= ∅ for all i ≥ 1.
671
+ • Notice that the edge boundary ∆A(i) ⊂ E ∩ Ui (N.B. in general, there is
672
+ no equality).
673
+ We will need the following Lemma.
674
+ Lemma 3.2. For each i ≥ 1, let Fi := E ∩ [0, n]d−1 × [0, hmax − i], i.e. the set
675
+ of all edges in E that belong to the layer Ui or are below that layer. Then for any
676
+ i ≥ 1, the set
677
+ Ei := Fi ∪
678
+
679
+ {x, x − ed}, x ∈ A(i)
680
+
681
+ is a cut-set of the cylinder [0, n]d−1×[0, H]. (N.B. Its dual may no longer correspond
682
+ to a simply connected surface. See Figure 2).
683
+ Proof.
684
+ Let γ = {x0, x1, . . . , xN} be any connected vertex-path connecting the
685
+ bottom to the top of the cylinder. Let 1 ≤ m < N be the first time where the
686
+ path reaches the layer Ui, i.e x0, . . . , xm−1 stays strictly below Li and xm ∈ Ui.
687
+ We need to discuss the following two cases: First, if xm ∈ A(i), then we are
688
+ done as the edge {xm−1, xm} belongs to
689
+
690
+ {x, x − ed}, x ∈ A(i)
691
+
692
+ . If, on the other
693
+ hand, the point xm /∈ A(i), then we claim that the path {x0, . . . , xm} has necessarily
694
+ intersected an edge of Fi. Indeed, if this was not the case then the path {x0, . . . , xm}
695
+ would arrive at xm /∈ A(i) without ever crossing E and by definition of A(i), one
696
+ could find a connected continuation of this path y1, . . . , yM such that the path
697
+ x0, . . . , xm, y1, . . . , yM connects the bottom to the top of the cylinder without ever
698
+ intersecting the cut-set E. This gives us a contradiction and thus concludes our
699
+ proof.
700
+
701
+ The reason of this Lemma is that it immediately provides us with the following
702
+ highly useful constraint: since E is a minimal cut-set and since Fi ∪
703
+
704
+ {x, x−ed}, x ∈
705
+ A(i)
706
+
707
+ is a cut-set, we have for all i ≥ 1,
708
+ a |E \ Fi| ≤ b|
709
+
710
+ {x, x − ed}, x ∈ A(i)
711
+
712
+ | = b |A(i)|
713
+ (9)
714
+
715
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
716
+ 11
717
+ i
718
+ Figure 2. Illustration in dimension d = 2(= 1 + 1) of the cut-set
719
+ Ei defined in Lemma 3.2. It is made here of all the blue edges
720
+ below level i as well as the additional green edges. By extrapolating
721
+ such a picture in higher dimension d ≥ 3, one can easily produce
722
+ situations where the set Ei splits into distant disconnected parts
723
+ even though it arises from a minimal cut-set.
724
+ We now define
725
+ T := min{i ≥ 1 s.t. |A(i)| ≥ (1 − a
726
+ 10b)(n + 1)d−1} .
727
+ (10)
728
+ We shall prove the following Lemma.
729
+ Lemma 3.3. For any 0 < a < b, there exists ϵ = ϵ(a, b) > 0 s.t. for any 1 ≤ k ≤
730
+ T − 1,
731
+ |∆A(k)| ≥ ϵ kd−2 ,
732
+ The Lemma is easily proved by induction as follows. Unless T = 1, the lemma
733
+ clearly holds for k = 1. (This is because in this case ∅ ⊊ A(1) ⊊ [0, n]d−1). Now,
734
+ suppose the Lemma holds for a certain constant ϵ > 0 for all m < k ≤ T − 1.
735
+ We shall use the above constraint (9) at the layer i = k. Notice that the set of
736
+ edges E \ Fk is by definition the set of edges that are above the layer k (including
737
+ some vertical edges pointing at that layer). In particular, this set is larger than the
738
+ set of horizontal edges which lie above the kth layer Uk, namely,
739
+ E \ Fk ⊃
740
+ k−1
741
+
742
+ m=1
743
+ E ∩ Um .
744
+ Our next crucial point is the fact that for any m, as pointed out earlier, one has
745
+ ∆A(m) ⊂ E ∩ Um. As such, this gives us
746
+ |E \ Fk| ≥
747
+ k−1
748
+
749
+ m=1
750
+ |E ∩ Um| ≥
751
+ k−1
752
+
753
+ m=1
754
+ |∆A(m)|
755
+ ≥ ϵ
756
+ k−1
757
+
758
+ m=1
759
+ md−2 ≥ ϵ C(d) kd−1 .
760
+ Now plugging this into the constraint (9) gives us
761
+ b|A(k)| ≥ a|E \ Fk| ≥ aϵ C(d) kd−1 .
762
+ (11)
763
+
764
+ 12
765
+ BARBARA DEMBIN
766
+ CHRISTOPHE GARBAN
767
+ Now, using the fact that |A(k)| < (1 −
768
+ a
769
+ 10b)(n + 1)d−1 (this is because k < T), we
770
+ obtain from Theorem 3.1 that
771
+ |∆A(k)| ≥ c(a, b)|A(k)|1−
772
+ 1
773
+ d−1 .
774
+ (Where for example c(a, b) = c( a
775
+ 20b)1−
776
+ 1
777
+ d−1 ). Plugging this into (11) now gives us
778
+ |∆A(k)| ≥ c(a, b)
779
+ �aϵC(d)
780
+ b
781
+ �1−
782
+ 1
783
+ d−1
784
+ kd−2 .
785
+ For 0 < a < b and the dimension d fixed, one can choose the constant ϵ small
786
+ enough so that
787
+ c(a, b)
788
+ �aϵC(d)
789
+ b
790
+ �1−
791
+ 1
792
+ d−1
793
+ > ϵ ,
794
+ which ends the proof of the Lemma.
795
+
796
+ Now using the Lemma 3.3 until k = T − 1, we extract the following estimate:
797
+ C(d)ϵT d−1 ≤
798
+ T −1
799
+
800
+ k=1
801
+ |∆A(k)| ≤ |E \ FT | ≤ |E| ≤ b
802
+ a(n + 1)d−1 .
803
+ This implies the deterministic statement that the stopping time T is always bounded
804
+ from above by ¯h0 n, where ¯h0 is a constant which only depends on 0 < a < b and
805
+ the dimension d.
806
+ The rest of the proof will proceed as follows: we will now scan horizontally the
807
+ cut-set E from its bottom hmin and proceed upwards until we reach hmin + T ′. We
808
+ will be left with showing that hmax − T cannot be much bigger than hmin + T ′. In
809
+ order to keep a control on hmax − T versus hmin + T ′, it will be important to use
810
+ exactly the same combinatorial definitions when scanning from below.
811
+ Scanning the lower horizontal slices. We proceed in the same fashion. For
812
+ any 1 ≤ i ≤ H − hmin, we call the ith lower layer, Li := [0, n]d−1 × {hmin + i}
813
+ and we define the following subset of Li. Let ˆA(i) ⊂ Li be the set of all points
814
+ x ∈ Li such that any path γ connecting x to [0, n]d−1 × {H} inside the cylinder
815
+ [0, n]d−1 × [hmax − i, H] necessarily intersects E. (Notice and this is a key point
816
+ that the set ˆA(i) is nothing but the previous set A(j) with j = hmax − hmin − i).
817
+ We will need the following slight adaptation of Lemma 3.2 where we now add
818
+ additional edges on the top of the complement of ˆA(i).
819
+ Lemma 3.4. For each i ≥ 1, let Gi := E ∩ [0, n]d−1 × [hmin + i, H], i.e. the set
820
+ of all edges in E that belong to the layer Li or are above that layer. Then for any
821
+ i ≥ 1, the set
822
+ ˆEi := Gi ∪
823
+
824
+ {x, x + ed}, x /∈ ˆA(i)
825
+
826
+ is a cut-set of the cylinder [0, n]d−1 × [0, H].
827
+ Proof. Let γ = {x0, x1, . . . , xN} be any connected vertex-path connecting the bottom
828
+ to the top of the cylinder. Let 1 ≤ m < N be the last passage time of this path
829
+ through the layer Li. If xm ∈ ˆA(i), then by definition of this set, the rest of the
830
+ connected path {xm, . . . , xN} will go through an edge in Gi. If on the other hand
831
+ xm /∈ ˆA(i), then since xm is the last passage through Li, the next edge is necessarily
832
+ a vertical edge {xm, xm+ed} which belongs to
833
+
834
+ {x, x + ed}, x /∈ ˆA(i)
835
+
836
+ , this ends the
837
+ proof.
838
+
839
+ Similarly as for the upper layers, we define
840
+ ˆT := min{i ≥ 1 s.t. |( ˆA(i))c| ≥ (1 − a
841
+ 10b)(n + 1)d−1} .
842
+ (12)
843
+
844
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
845
+ 13
846
+ We claim that the exact same analysis as for the upper layers shows the following
847
+ two facts:
848
+ (1) for any 1 ≤ k ≤ ˆT − 1, |∆ ˆA(k)| = |∆( ˆA(k)c| ≥ ϵ kd−2.
849
+ (2) ˆT ≤ ¯h0n.
850
+ To conclude our proof, it remains to show that the upper layer where we stop the
851
+ scanning from above, i.e. hmax − T cannot be much higher then the lower layer
852
+ hmin + ˆT at which we stop the scanning from below. In fact, with our choices
853
+ of stopping times T and ˆT, we will show more in the next Lemma, i.e. that up
854
+ to a safety margin of 1, the top exploration necessarily stops below the bottom
855
+ exploration.
856
+ Lemma 3.5.
857
+ hmin + ˆT + 1 ≥ hmax − T .
858
+ To prove this Lemma, now that we have analyzed upper and lower horizontal
859
+ slices, it remains to understand what would happen for the intermediate slices if
860
+ they were to exist.
861
+ Scanning the intermediate slices. Let us suppose by contradiction that hmin +
862
+ ˆT + 1 < hmax − T. Introduce
863
+ M := hmax − T − hmin − ˆT (M ≥ 2),
864
+ the number of intermediate slices. Let us reparametrize the layers so that i = 0
865
+ corresponds to the height hmin + ˆT while i = M corresponds to the top intermediate
866
+ layer hmax − T. We shall denote by { ˜A(i)}1≤i≤M−1 the same sets as before (we
867
+ use ˜A instead of A or ˆA just because of the reparametrization). Note that we have
868
+ ˜A(0) = ˆA( ˆT) and ˜A(M) = A(T).
869
+ Lemma 3.6. For each 1 ≤ i ≤ M − 1, we have the following 2 constraints.
870
+ (1) a| ˜A(i)c| ≤ b|A(T)c| (≤
871
+ a
872
+ 10
873
+ (n+1)d−1
874
+ 2
875
+ )
876
+ (2) a| ˜A(i)| ≤ b| ˆA( ˆT)| (≤
877
+ a
878
+ 10
879
+ (n+1)d−1
880
+ 2
881
+ )
882
+ For the inequalities in the parenthesis, we used the definitions of our stopping
883
+ times T and ˆT (given in (10) and (12)). Conditions 1) and 2) are incompatible.
884
+ Therefore this lemma implies that such intermediate layers cannot exist. This implies
885
+ Lemma 3.5. To conclude the proof of Proposition 2.1, we are thus left with proving
886
+ Lemma 3.6.
887
+ Proof of Lemma 3.6. Let us start with item 1. Each point x in the intermediate
888
+ layer i (i.e. at height hmin + ˆT + i) which belongs to the set ( ˜A(i))c has a path in
889
+ its upper cylinder which connects it to [0, n]d−1 × {H} without intersecting E. By
890
+ concatenating this path together with a vertical path pointing down all the way
891
+ from x to the bottom face [0, n]d−1 × {0}, since E is a cut-set, it is necessary that
892
+ at least one edges in this vertical path belongs to E. This implies in particular that
893
+ we have at least |( ˜A(i))c| edges of E which are located below layer i. Finally, there
894
+ cannot be too many such edges since E is a minimal cut-set. Using Lemma 3.4 for
895
+ the layer at height hmax − T (or i = M), leads us precisely to the constraint 1).
896
+ Item 2 is proved in a similar way. For any point x which belongs to ˜A(i), if we
897
+ follow the vertical path above x until we reach the top layer [0, n]d−1 × {T}, then
898
+ by definition of ˜A(i), the path will go through at least one edge of E. This implies
899
+ in particular that there are at least | ˜A(i)| edges in E above (or touching) layer i.
900
+ Now using Lemma 3.2 for the layer at height hmin + ˆT (or i = 0) together with the
901
+ fact that E is minimal leads us to constraint 2.
902
+
903
+
904
+ 14
905
+ BARBARA DEMBIN
906
+ CHRISTOPHE GARBAN
907
+ Remark 2. In the context of minimal surfaces in the continuum setting, a similar
908
+ phenomenon of absence of “long thin chimneys" has been observed for example in
909
+ [12].
910
+ 4. Proof of Proposition 2.2
911
+ Let us first prove the following proposition which states that it is unlikely that
912
+ the minimal surface Emin(j0) sticks to the bottom or the top of the cylinder.
913
+ Proposition 4.1. There exists n0 = n0(G) ≥ 1 such that for all n ≥ n0, we have
914
+ P (j0 ∈ {1, 2}) ≤
915
+ 2
916
+ √n
917
+ and
918
+ P
919
+
920
+ j0 ∈
921
+
922
+ H − 1
923
+ 2h0n, H − 1
924
+ 2h0n − 1
925
+ ��
926
+
927
+ 2
928
+ √n.
929
+ To prove this proposition, we will need the following upper bound on the variance.
930
+ Proposition 4.2 (Efron–Stein). There exists a constant β > 0 depending on G
931
+ such that for all n ≥ 1 and H ≥ 1, we have
932
+ Var(Φ([0, n]d−1 × {0}, H)) ≤ βnd−1 .
933
+ Proof. The proof is a straightforward application of Theorem 1.5. Let e1, . . . , eN
934
+ be a deterministic ordering of the edges of the cylinder cyl([0, n]d−1 × {0}, H)).
935
+ Set X = (te1, . . . , ten) and f(X) = Φ([0, n]d−1 × {0}, H). Let Emin be a minimal
936
+ surface for X (chosen according to a deterministic rule in case of ties). Recall that
937
+ X(i) denotes the vector X where the i-th edge has been resampled. Note that if
938
+ f(X) < f(X(i)) then ei belongs Emin. By similar reasoning as in (8), we have
939
+ |Emin| ≤ b
940
+ a(n + 1)d−1.
941
+ By applying Theorem 1.5, it follows that
942
+ Var(f(X)) ≤
943
+ N
944
+
945
+ i=1
946
+ (b − a)2P(ei ∈ Emin) ≤ (b − a)2 b
947
+ a(n + 1)d−1.
948
+ This concludes the proof.
949
+
950
+ Proof of Proposition 4.1. Thanks to Proposition 2.1, we have
951
+ Φ([0, n]d−1 × {0}, H) =
952
+ min
953
+ 1≤i≤H− h0
954
+ 2 n
955
+ Xi .
956
+ We will just prove the first inequality as the proof for the second inequality is similar.
957
+ Let us assume by contradiction that
958
+ P (j0 = 1) = P
959
+
960
+ min
961
+ 1≤i≤H− 1
962
+ 2 h0n Xi + Yi = X1 + Y1
963
+
964
+
965
+ 1
966
+ √n .
967
+ We have for n large enough
968
+ |i0 − 1| ≥ H
969
+ 2 − nε − 1 > H
970
+ 2 − nδ + nδ
971
+ 2
972
+ and
973
+ Y1 ≥ n(d−1)/2
974
+ 2 log n .
975
+ For all i ∈ [2nδ, 3H/4], we have Yi = 0. On the event {min1≤i≤H− 1
976
+ 2 h0n Xi + Yi =
977
+ X1 + Y1}, we have
978
+ X1 ≤
979
+ min
980
+ i∈[2nδ,3H/4] Xi − n(d−1)/2
981
+ 2 log n .
982
+
983
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
984
+ 15
985
+ Hence,
986
+ P
987
+
988
+ X1 ≤
989
+ min
990
+ i∈[2nδ,3H/4] Xi − n(d−1)/2
991
+ 2 log n
992
+
993
+
994
+ 1
995
+ √n .
996
+ Set
997
+ Ej :=
998
+
999
+ Xj ≤
1000
+ min
1001
+ i∈[j+2nδ,3H/4] Xi − n(d−1)/2
1002
+ 2 log n
1003
+
1004
+ .
1005
+ Since the distribution of (Xi)1≤i≤3H/4 is the same as the distribution of (Xi)j≤i≤3H/4+j−1,
1006
+ we have
1007
+ P(Ej) ≥
1008
+ 1
1009
+ √n .
1010
+ Set for 1 ≤ k ≤ H/4nδ
1011
+ Ik := [4knδ, 2(2k + 1)nδ]
1012
+ and
1013
+ Fk :=
1014
+
1015
+ j∈Ik
1016
+ Ej .
1017
+ Let N be the number of k ≤ H/4nδ such that Fk occurs, that is,
1018
+ N :=
1019
+
1020
+ 1≤k≤H/4nδ
1021
+ 1Fk .
1022
+ We have
1023
+ E[N] ≥
1024
+
1025
+ 1≤k≤H/4nδ
1026
+ P(Fk) ≥ h0
1027
+ √n
1028
+ 4nδ
1029
+ ≥ h0
1030
+ 2 n1/4
1031
+ (13)
1032
+ where we recall that H ≥ h0n. Let i1 < · · · < iN be integers such that they all
1033
+ belong to different intervals in (Ik, 1 ≤ k ≤ H/4nδ) and for all 1 ≤ j ≤ N, the
1034
+ event Eij occurs. Note that ij+1 − ij ≥ 2nδ since they belong to different intervals.
1035
+ Moreover, on the event Eij, we have
1036
+ Xij ≤ Xij+1 − n(d−1)/2
1037
+ 2 log n .
1038
+ We can prove by induction that for 0 ≤ k ≤ N − 1
1039
+ XiN−k ≤
1040
+ min
1041
+ H/2+1≤i≤3H/4 Xi − (k + 1)n(d−1)/2
1042
+ 2 log n .
1043
+ Hence,
1044
+ min
1045
+ 1≤i≤H/2 Xi ≤
1046
+ min
1047
+ H/2+1≤i≤3H/4 Xi − Nn(d−1)/2
1048
+ 2 log n .
1049
+ It follows that for t ≥ 0 using Bienaymé–Chebyshev’s inequality and Proposition 4.2
1050
+ P(N ≥ 2t log2 n) ≤ P
1051
+
1052
+ min
1053
+ H/2+1≤i≤3H/4 Xi −
1054
+ min
1055
+ 1≤i≤H/2 Xi ≥ tn(d−1)/2
1056
+
1057
+ ≤ 2Var(min1≤i≤H/2 Xi)
1058
+ t2nd−1
1059
+ ≤ 2β
1060
+ t2 .
1061
+ It yields that
1062
+ E(N) ≤ 2(1 + 2β) log2 n .
1063
+ This contradicts inequality (13) for n large enough depending on G. By the same
1064
+ reasoning we can prove that
1065
+ P (j0 = 2) ≤
1066
+ 1
1067
+ √n.
1068
+ This completes the proof.
1069
+
1070
+ To prove Proposition 2.2, we will also need the following lemma on the regularity
1071
+ of influences under translation by ed.
1072
+
1073
+ 16
1074
+ BARBARA DEMBIN
1075
+ CHRISTOPHE GARBAN
1076
+ Lemma 4.3. There exists n0 = n0(G) such that for all n ≥ n0, H ≥ h0n the
1077
+ following holds. Let e be an edge of cyl(A, H) such that e + 2ed ⊂ cyl(A, H), we
1078
+ have
1079
+ |P(e ∈ Emin(j0)) − P(e + 2ed ∈ Emin(j0))| ≤
1080
+ 2
1081
+ nε/2 .
1082
+ Proof of Lemma 4.3. Let (te)e∈cyl(A,h). We define t′
1083
+ e as follows
1084
+ t′
1085
+ e :=
1086
+ � te+2ed
1087
+ if e + 2ed ∈ cyl(A, H)
1088
+ t′′
1089
+ e
1090
+ otherwise
1091
+ where (t′′
1092
+ e)e∈cyl(A,h) is independent from (te). Let (Zi)1≤i≤M, (Z′
1093
+ i)1≤i≤M be two
1094
+ independent family of random variables that take the value −1 with probability
1095
+ G({a}) and 1 with probability 1 − G({a}) = G({b}). Set
1096
+ Sk :=
1097
+ k
1098
+
1099
+ k=1
1100
+ Zi
1101
+ and
1102
+ S′
1103
+ k :=
1104
+ k
1105
+
1106
+ k=1
1107
+ Z′
1108
+ i.
1109
+ Let
1110
+ τ := inf{k ∈ {1, . . . , M} : S′
1111
+ k ≥ Sk + 2}
1112
+ where we use the convention inf ∅ = +∞. Finally, we set
1113
+ i0 :=
1114
+ M
1115
+
1116
+ k=1
1117
+ Zk
1118
+ and
1119
+ i′
1120
+ 0 :=
1121
+ min(τ,M)
1122
+
1123
+ k=1
1124
+ Z′
1125
+ k +
1126
+ M
1127
+
1128
+ k=min(τ,M)+1
1129
+ Zk.
1130
+ Denote by E′
1131
+ min(j′
1132
+ 0) the minimal cutset corresponding to the family (t′
1133
+ e)e∈cyl(A,h)
1134
+ and i′
1135
+ 0. It is easy to check that it has the same law as Emin(j0). Moreover, there
1136
+ exists a universal C > 0 s.t.
1137
+ P(i′
1138
+ 0 − i0 ̸= 2) = P(τ = ∞) = P(∀k ∈ {1, . . . , M}
1139
+ Sk − S′
1140
+ k ≥ 0) ≤
1141
+ C
1142
+
1143
+ M
1144
+ .
1145
+ On the event {i′
1146
+ 0 = i0 + 2} ∩ {j0 /∈ {H − 1
1147
+ 2h0n, H − 1
1148
+ 2h0n − 1}} ∩ {j′
1149
+ 0 /∈ {1, 2}}, we
1150
+ have
1151
+ ∀1 ≤ j ≤ H − 1
1152
+ 2h0n − 2
1153
+ Xj(te) + Yj(i0) = Xj+2(t′
1154
+ e) + Yj+2(i′
1155
+ 0)
1156
+ and Emin(j0) + 2ed = E′
1157
+ min(j′
1158
+ 0). It yields
1159
+ |P(e ∈ Emin(j0)) − P(e + 2ed ∈ Emin(j0))|
1160
+ ≤ P(i′
1161
+ 0 − i0 ̸= 2) + P(j0 ∈ {1, 2}) + P
1162
+
1163
+ j0 ∈
1164
+
1165
+ H − 1
1166
+ 2h0n, H − 1
1167
+ 2h0n − 1
1168
+ ��
1169
+ .
1170
+ Finally, by combining the two previous inequalities and using Proposition 4.1, it
1171
+ follows that for n ≥ n0 (where n0 is as in the statement of Proposition 4.1)
1172
+ |P(e ∈ Emin(j0)) − P(e + 2ed ∈ Emin(j0))| ≤
1173
+ 2
1174
+ nε/2
1175
+ The result follows.
1176
+
1177
+ Proof of Proposition 2.2. Let n0 be as in the statement of Lemma 4.3. Let n ≥ n0.
1178
+ Let m ≥ 1 that we will choose later depending on n.
1179
+ Set k = ⌊n/m⌋.
1180
+ For
1181
+ i = (i1, . . . , id−1) ∈ {1, . . . , k}d−1, we define
1182
+ Ai :=
1183
+ d
1184
+
1185
+ j=1
1186
+ [(ij − 1)m, ijm) × {0} .
1187
+ We denote by J the set of cylinders that contain an edge such that P(e ∈ Emin(j0)) ≥
1188
+ n−ε/8, that is,
1189
+ J :=
1190
+
1191
+ i ∈ {1, . . . , k}d−1 : ∃e ∈ cyl(Ai, H)
1192
+ P(e ∈ Emin(j0)) ≥ n−ε/8�
1193
+ .
1194
+
1195
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
1196
+ 17
1197
+ Note that the set J is deterministic. By definition, the edges e ∈ cyl(Ai, H) for i /∈ J
1198
+ have a small influence. We need to make sure that there is a negligible number of
1199
+ edges with a large influence in cyl(Ai, H) for i ∈ J. In particular, we need to avoid
1200
+ that the minimal surface has a too large intersection with these cylinders.
1201
+ Let us first bound the size of J. Let us assume that there exists e ∈ cyl(Ai, H) such
1202
+ that P(e ∈ Emin(j0)) ≥ n−ε/8. Without loss of generality assume that e + √ned ∈
1203
+ cyl(Ai, H). By Proposition 4.3, we have
1204
+ |P(e ∈ Emin(j0)) − P(e + 2jed ∈ Emin(j0))| ≤
1205
+ 2j
1206
+ nε/2 .
1207
+ Hence, for every j ≤ nε/4/4, we have
1208
+ P(e + 2jed ∈ Emin(j0)) ≥
1209
+ 1
1210
+ nε/8 − 2j
1211
+ nε/2 ≥
1212
+ 1
1213
+ 2nε/8 .
1214
+ It yields that
1215
+ E[|Emin(j0) ∩ cyl(Ai, H)|] ≥ nε/4
1216
+ 8nε/8 ≥ 1
1217
+ 8nε/8 .
1218
+ Hence, we get using inequality (8)
1219
+ |J|nε/8
1220
+ 8
1221
+
1222
+
1223
+ i∈J
1224
+ E[|Emin(j0) ∩ cyl(Ai, H)|] ≤ E[|Emin(j0) ∩ cyl(A, H)|] ≤ b
1225
+ a(n + 1)d−1,
1226
+ it follows that for some positive constant β depending on a, b and d
1227
+ |J| ≤ βnd−1−ε/8.
1228
+ Next, we aim at upper bounding the total influence of edges in cyl(Ai, H) for i ∈ J,
1229
+ that is E [|Emin(j0) ∩ ∪i∈J cyl(Ai, H)|].
1230
+ Let E be a cutset in the cylinder cyl(A, h), one can check that E ∩ cyl(Ai, H) is
1231
+ also a cutset from the top to the bottom for the cylinder cyl(Ai, H). It follows that
1232
+ Φ(Ai, H) ≤ T(E ∩ cyl(Ai, H)).
1233
+ Hence, it yields
1234
+
1235
+ i∈{1,...,k}d−1\J
1236
+ Φ(Ai, H)+a
1237
+
1238
+ i∈J
1239
+ |Emin(j0)∩cyl(Ai, H)| ≤ T(Emin(j0)) ≤ Φ(A, H)+n(d−1)/2.
1240
+ Taking the expectation, we get
1241
+ aE
1242
+ ��
1243
+ i∈J
1244
+ |Emin(j0) ∩ cyl(Ai, H)|
1245
+
1246
+ ≤ E[Φ(A, H)]−
1247
+
1248
+ i∈{1,...,k}d−1\J
1249
+ E[Φ(Ai, H)]+n(d−1)/2 .
1250
+ (14)
1251
+ To control the right hand side, we will need a result of Zhang [27].
1252
+ Let K = ⌈n/(m − ⌊m5/6⌋)⌉. Set A′ := [0, K(m − ⌊m5/6⌋)]d−1 × {0} where K was
1253
+ chosen in such a way that A ⊂ A′. Thanks to the fine study of Zhang [27, inequality
1254
+ (10.22)], there exists C > 0 such that we have
1255
+ E[Φ(A′, H)] ≤
1256
+
1257
+ i∈{1,...,K}d−1
1258
+ E[Φ(Ai, H)] + C nd−1
1259
+ m1/16 .
1260
+ (15)
1261
+ Let us briefly explain how to prove this inequality. Let us assume we could
1262
+ prescribe in each cylinder cyl(Ai, H) a boundary condition for the minimal surface
1263
+ (that is the trace of the surface on the lateral side) in such a way that these boundary
1264
+ conditions match for adjacent cylinders. In other words, by taking the union of all
1265
+ minimal cutsets in cyl(Ai, H), i ∈ {1, . . . , k}d−1, one would get a cutset in the big
1266
+ cylinder cyl(A, H) and so Φ(A, H)] ≤ � Φ(Ai, H). The issue with this strategy is
1267
+ as follows: in order to prescribe a boundary condition without affecting too much
1268
+ the expectation E[Φ(Ai, H)], one needs that the trace of the minimal cutset on the
1269
+
1270
+ 18
1271
+ BARBARA DEMBIN
1272
+ CHRISTOPHE GARBAN
1273
+ lateral sides is negligible with nd−1. Since this fact is not known, Zhang overpasses
1274
+ this issue by slightly reducing the dimensions of the cylinder’s basis (it accounts for
1275
+ the m − ⌊m5/6⌋)): since the total size of the minimal surface is of order md−1, we
1276
+ can find a smaller cylinder where the trace of the minimal surface on the lateral
1277
+ sides is negligible. Once we can prescribe a given boundary condition, we use the
1278
+ symmetry to prescribe to adjacent cylinders some symmetric matching boundary
1279
+ conditions. The union of all these cutsets form a cutset in the big cylinder. Since
1280
+ the cylinders with prescribed boundary conditions are smaller than the original ones,
1281
+ we need to use a larger K ≥ k to be sure that A ⊂ A′.
1282
+ Let us now explain how we can control the right hand side of (14) using (15)
1283
+ from [27, inequality (10.22)]. The notation τmin(k1, . . . , kd−1, m) corresponds to
1284
+ Φ(�
1285
+ i=1...d[0, ki] × {0}, m). We apply the inequality with k1 = · · · = kd−1 = m,
1286
+ w1 = · · · = wd−1 = K, δ = 1/2. With these notations, the left hand side in (10.22)
1287
+ is equal to E[Φ(A′, H)]. Since A ⊂ A′, we have E[Φ(A, H)] ≤ E[Φ(A′, H)]. It follows
1288
+ that
1289
+ E[Φ(A, H)]−
1290
+
1291
+ i∈{1,...,k}d−1\J
1292
+ E[Φ(Ai, H)]
1293
+ ≤ E[Φ(A, H)] −
1294
+
1295
+ i∈{1,...,K}d−1
1296
+ E[Φ(Ai, H)] + (|J| + (K − k)d−1)bmd−1
1297
+ ≤ C nd−1
1298
+ m1/16 + bβnd−1−ε/8md−1 + b
1299
+ nd−1
1300
+ m(d−1)/6 .
1301
+ (16)
1302
+ Finally, combining (14) and (16), we get
1303
+ a E
1304
+ ��
1305
+ i∈J
1306
+ |Emin(j0) ∩ cyl(Ai, H)|
1307
+
1308
+ ≤ nd−1
1309
+ m1/16 + bβnd−1−ε/8md−1 + n(d−1)/2.
1310
+ Now choose m = nε/(16(d−1)). There exists ξ ≤ ε/16 depending on ε such that for n
1311
+ large enough
1312
+ E
1313
+ ��
1314
+ i∈J
1315
+ |Emin(j0) ∩ cyl(Ai, H)|
1316
+
1317
+ ≤ nd−1−ξ.
1318
+ We conclude that
1319
+ �����
1320
+
1321
+ e ∈
1322
+
1323
+ i∈J
1324
+ cyl(Ai, H) : P(e ∈ Emin(j0)) ≥ n−ξ/2
1325
+ ������ ≤ nd−1−ξ/2.
1326
+ Since ξ ≤ ε/16, we have by definition of J
1327
+ ���
1328
+
1329
+ e ∈ cyl(A, H) : P(e ∈ Emin(j0)) ≥ n−ξ/2���� ≤ nd−1−ξ/2
1330
+ (indeed, in the remaining cylinders, all edges have influence less than n−ε/8 which is
1331
+ smaller than n−ξ/2). As such, the result follows.
1332
+
1333
+ 5. Proof of Theorem 1.2 and fluctuations of anchored
1334
+ surfaces
1335
+ We start with the proof of Theorem 1.2 which relies on the martingale decompo-
1336
+ sition method from Newman–Piza [22].
1337
+ Proof of Theorem 1.2.
1338
+ Let e1, . . . , eN be a deterministic ordering of the edges of the cylinder cyl([0, n]d−1×
1339
+ {0}, H)). Denote by Fk the σ-algebra generated by te1, . . . , tek. To simplify the
1340
+
1341
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
1342
+ 19
1343
+ notations, denote f(te1, . . . , teN ) = Φ([0, n]d−1 × {0}, H)). We have the following
1344
+ martingale decomposition
1345
+ Var(f) =
1346
+ N
1347
+
1348
+ k=1
1349
+ E[(E(f|Fk) − E(f|Fk−1))2).
1350
+ Let (t′
1351
+ e) be an independent family distributed as (te) and denote
1352
+ tk := (te1, . . . , tek, t′
1353
+ ek+1, . . . , t′
1354
+ eN ),
1355
+ tk
1356
+ a := (te1, . . . , tek−1, a, t′
1357
+ ek+1, . . . , t′
1358
+ eN )
1359
+ and
1360
+ tk
1361
+ b := (te1, . . . , tek−1, b, t′
1362
+ ek+1, . . . , t′
1363
+ eN ).
1364
+ In particular, we have
1365
+ f(tk) = (tek − a)1f(tk
1366
+ b )−f(tka)>0 + f(tk
1367
+ a).
1368
+ If f(tk
1369
+ b)−f(tk
1370
+ a) > 0 we say that the edge ek is pivotal. We can rewrite the expression
1371
+ as follows
1372
+ Var(f) =
1373
+ N
1374
+
1375
+ k=1
1376
+ E[E(f(tk) − f(tk−1)|(te)e)2) =
1377
+ N
1378
+
1379
+ k=1
1380
+ E(E((tek − t′
1381
+ ek)1f(tk
1382
+ b )−f(tk
1383
+ a)>0|(te)e)2)
1384
+ ≥ Var(te)
1385
+ N
1386
+
1387
+ k=1
1388
+ P(f(tk
1389
+ b) − f(tk
1390
+ a) > 0)2
1391
+ ≥ Var(te)
1392
+ N
1393
+
1394
+ k=1
1395
+ P(ek ∈ Emin, tek = b)2.
1396
+ When G({b}) > pc(d), there exists c > 0 such that the number of disjoint paths
1397
+ from the top to the bottom of the cylinder with only edges of time b is at least cnd−1
1398
+ with high probability (see for instance Theorem 7.68 in [18]). In particular, we have
1399
+ E[#{e ∈ Emin, te = b}] ≥ cnd−1.
1400
+ It follows that by Cauchy-Schwarz inequality
1401
+ Var(f) ≥ Var(te)
1402
+ N
1403
+ E[#{e ∈ Emin, te = b}]2 ≥ c0
1404
+ nd−1
1405
+ H
1406
+ where c0 depends on G and d.
1407
+
1408
+ The same proof allows us to show that fluctuations for anchored surfaces are
1409
+ not superconcentrated under the following hypothesis (H) of localisation. For any
1410
+ sequence (hn) such that hn goes to infinity with n, we have
1411
+ lim
1412
+ C→∞ lim sup
1413
+ n→∞
1414
+ 1
1415
+ nd−1 E[#{e ∈ Emin : e /∈ {x ∈ Rd : |x · ed − hn
1416
+ 2 | ≤ C}] = 0
1417
+ (H)
1418
+ where Emin is the minimal cutset for the anchored flow τ([0, n]d−1, hn).
1419
+ Proposition 5.1. Under the hypothesis (H), the variance of the anchored flow
1420
+ τ([0, n]d−1, H) (defined at the end of the introduction) is in Ω(nd−1).
1421
+ 6. Chaoticity of the minimal surface
1422
+ Consider the notations of the previous section: f(te1, . . . , teN ) = Φ([0, n]d−1 ×
1423
+ {0}, H)). Set X := (te1, . . . , teN ). Let X′ be an independent vector distributed as
1424
+ X. Consider (U1, . . . , UN) an i.i.d. family of uniform random variables on [0, 1]. For
1425
+ any t ∈ [0, 1], we define
1426
+ ∀ 1 ≤ i ≤ N
1427
+ Xt
1428
+ i :=
1429
+ � Xi
1430
+ if Ui ≥ t
1431
+ X′
1432
+ i
1433
+ otherwise.
1434
+
1435
+ 20
1436
+ BARBARA DEMBIN
1437
+ CHRISTOPHE GARBAN
1438
+ Denote by Pt the set of pivotal edges for f(Xt) and by It the set of edges that are
1439
+ in the intersection of all the minimal surfaces for f(Xt). It is easy to check that
1440
+ It ⊂ Pt. Following [8], we obtain the following Corollary of Theorem 1.1.
1441
+ Corollary 6.1. There exists a positive constant C such that for any n ≥ 1 and
1442
+ H ≥ h0n
1443
+ ∀t ≥ 0
1444
+ E[|I0 ∩ It|] ≤ E[|P0 ∩ Pt|] ≤ C
1445
+ nd−1
1446
+ t log n Var(te).
1447
+ More precisely, this result follows from the following mild extension of Lemma
1448
+ 3.3 from [26].
1449
+ Lemma 6.2 (Small extension of Lemma 3.3 in [26]). For any n ≥ 1 and H ≥ h0n,
1450
+ we have
1451
+ Var(Φ([0, n]d−1 × {0}, H)) = Var(te)
1452
+ � 1
1453
+ 0
1454
+ E[|P0 ∩ Pt|]dt .
1455
+ Moreover, the function t → E[|P0 ∩ Pt|] is non-increasing.
1456
+ 7. Open questions
1457
+ Open question 1. Prove that anchored maximal flow / minimal surfaces are not
1458
+ superconcentrated in high enough dimension d. (Thanks to Proposition 5.1, this
1459
+ boils down to showing that Hypothesis (H) holds).
1460
+ Open question 2. Prove superconcentration for maximal flows/minimal surfaces
1461
+ in more general domains, as considered for example in [5, 6, 7]. In fact, even
1462
+ extending Theorem 1.1 to the case of tilted cylinders with a rational slope appears to
1463
+ be challenging as Zhang’s inequality from [27] relies strongly on symmetry and does
1464
+ not adapt easily to rational directions.
1465
+ Open question 3. In this work, we focused on distributions G taking two values
1466
+ 0 < a < b. It would be interesting to extend this analysis to more general distributions.
1467
+ The works [2, 11] by Benaïm–Rossignol and Damron–Hanson–Sosoe, where they
1468
+ extend the study of [3] to more general distributions are likely to play a key role
1469
+ here.
1470
+ Note that for a continuous distribution G, the chaoticity property proved in
1471
+ Corollary 6.1 would be more meaningful as the minimal surface would then be a.s.
1472
+ unique. In particular one would control the true intersection of minimal surfaces
1473
+ before and after noise.
1474
+ Open question 4. Our main result, Theorem 1.1, only works for thick enough
1475
+ cylinders (H ≥ h0n, for some large enough constant h0). This barrier h0 is there
1476
+ only for technical reasons (coming from Proposition 2.1). Show that the result still
1477
+ holds for any H ≥ Ω(nϵ).
1478
+ Open question 5. How do the fluctuations scale with n ? Is there an exponent
1479
+ α(d) ∈ (d − 2, d − 1) which describes the variance of Φ([0, n]d−1 × {0}, H) when H
1480
+ is, say, linear in n ?
1481
+ Acknowledgments. We wish to thank Itai Benjamini, Guy David, Simon Masnou,
1482
+ Ron Peled and Hugo Vanneuville for useful discussions. The research of B.D is
1483
+ supported by the European Research Council (ERC) under the European Union’s
1484
+ Horizon 2020 research and innovation program (grant agreement No 851565). The
1485
+ research of C.G. is supported by the Institut Universitaire de France (IUF) and the
1486
+ French ANR grant ANR-21-CE40-0003.
1487
+
1488
+ SUPERCONCENTRATION FOR MINIMAL SURFACES
1489
+ 21
1490
+ References
1491
+ [1] Daniel Ahlberg and Christopher Hoffman.
1492
+ Random coalescing geodesics in first-passage
1493
+ percolation, 2019.
1494
+ [2] Michel Benaïm and Raphaël Rossignol. Exponential concentration for first passage percolation
1495
+ through modified Poincaré inequalities. Annales de l’Institut Henri Poincaré, Probabilités et
1496
+ Statistiques, 44(3):544 – 573, 2008.
1497
+ [3] Itai Benjamini, Gil Kalai, and Oded Schramm. First passage percolation has sublinear distance
1498
+ variance. Ann. Probab., 31:1970–1978, January 2003.
1499
+ [4] Béla Bollobás and Imre Leader. Edge-isoperimetric inequalities in the grid. Combinatorica,
1500
+ 11(4):299–314, 1991.
1501
+ [5] Raphaël Cerf and Marie Théret. Law of large numbers for the maximal flow through a domain
1502
+ of Rd in first passage percolation. Trans. Amer. Math. Soc., 363(7):3665–3702, 2011.
1503
+ [6] Raphaël Cerf and Marie Théret. Lower large deviations for the maximal flow through a
1504
+ domain of Rd in first passage percolation. Probability Theory and Related Fields, 150:635–661,
1505
+ 2011.
1506
+ [7] Raphaël Cerf and Marie Théret. Upper large deviations for the maximal flow through a
1507
+ domain of Rd in first passage percolation. Annals of Applied Probability, 21(6):2075–2108,
1508
+ 2011.
1509
+ [8] Sourav Chatterjee. Superconcentration and related topics, volume 15. Springer, 2014.
1510
+ [9] Sourav Chatterjee. Spin glass phase at zero temperature in the edwards-anderson model.
1511
+ arXiv preprint arXiv:2301.04112, 2023.
1512
+ [10] Michael Damron and Jack Hanson. Bigeodesics in first-passage percolation. Communications
1513
+ in Mathematical Physics, 349(2):753–776, 2017.
1514
+ [11] Michael Damron, Jack Hanson, and Philippe Sosoe.
1515
+ Sublinear variance in first-passage
1516
+ percolation for general distributions. Probability Theory and Related Fields, 163(1):223–258,
1517
+ Oct 2015.
1518
+ [12] Guy David and Stephen Semmes. Quasiminimal surfaces of codimension 1 and john domains.
1519
+ pacific journal of mathematics, 183(2):213–277, 1998.
1520
+ [13] Barbara Dembin, Dor Elboim, and Ron Peled. Coalescence of geodesics and the bks midpoint
1521
+ problem in planar first-passage percolation, 2022.
1522
+ [14] Barbara Dembin and Marie Théret. Large deviation principle for the streams and the maximal
1523
+ flow in first passage percolation, 2020.
1524
+ [15] Barbara Dembin and Marie Théret. Large deviation principle for the cutsets and lower large
1525
+ deviation principle for the maximal flow in first passage percolation, 2021.
1526
+ [16] Hugo Duminil-Copin, Aran Raoufi, and Vincent Tassion. Sharp phase transition for the
1527
+ random-cluster and potts models via decision trees. Annals of Mathematics, 189(1):75–99,
1528
+ 2019.
1529
+ [17] Christophe Garban and Jeffrey E Steif. Noise sensitivity of Boolean functions and percolation,
1530
+ volume 5. Cambridge University Press, 2014.
1531
+ [18] Geoffrey Grimmett.
1532
+ Percolation, volume 321 of Grundlehren der Mathematischen Wis-
1533
+ senschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin,
1534
+ second edition, 1999.
1535
+ [19] Kurt Johansson. Shape fluctuations and random matrices. Communications in mathematical
1536
+ physics, 209(2):437–476, 2000.
1537
+ [20] Harry Kesten. Surfaces with minimal random weights and maximal flows: a higher dimensional
1538
+ version of first-passage percolation. Illinois Journal of Mathematics, 31(1):99–166, 1987.
1539
+ [21] Cristina Licea and Charles M. Newman. Geodesics in two-dimensional first-passage percolation.
1540
+ The Annals of Probability, 24(1):399 – 410, 1996.
1541
+ [22] Charles M Newman and Marcelo ST Piza. Divergence of shape fluctuations in two dimensions.
1542
+ The Annals of Probability, pages 977–1005, 1995.
1543
+ [23] Ron Peled. High-dimensional lipschitz functions are typically flat. The Annals of Probability,
1544
+ 45(3):1351–1447, 2017.
1545
+ [24] Raphaël Rossignol and Marie Théret. Lower large deviations and laws of large numbers for
1546
+ maximal flows through a box in first passage percolation. Ann. Inst. Henri Poincaré Probab.
1547
+ Stat., 46(4):1093–1131, 2010.
1548
+ [25] Michel Talagrand.
1549
+ On Russo’s Approximate Zero-One Law.
1550
+ The Annals of Probability,
1551
+ 22(3):1576 – 1587, 1994.
1552
+ [26] Vincent Tassion and Hugo Vanneuville.
1553
+ Noise sensitivity of percolation via differential
1554
+ inequalities. arXiv preprint arXiv:2011.04572, 2020.
1555
+ [27] Yu Zhang. Limit theorems for maximum flows on a lattice. Probability Theory and Related
1556
+ Fields, May 2017.
1557
+
1558
+ 22
1559
+ BARBARA DEMBIN
1560
+ CHRISTOPHE GARBAN
1561
+ D-MATH, ETH Zürich, Rämistrasse 101, 8092 Zürich, Switzerland
1562
+ Email address: [email protected]
1563
+ Université Claude Bernard Lyon 1, CNRS UMR 5208, Institut Camille
1564
+ Jordan, 69622 Villeurbanne, France , Institut Universitaire de France
1565
+ (IUF) and Université de Genève (Unige)
1566
+ Email address: [email protected]
1567
+
IdFIT4oBgHgl3EQfYSv6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
JNFAT4oBgHgl3EQfvB44/content/2301.08673v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9efc2bda1e46df1f6d9b27b00e157b78566493d483fb8f735c96121f196536d7
3
+ size 8527001
JNFAT4oBgHgl3EQfvB44/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:86cc3c7e2ece07bb4d4248be7881af3131d561790023ec0f69eb623317d268c7
3
+ size 3145773