Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -NAyT4oBgHgl3EQfRPZI/content/tmp_files/2301.00061v1.pdf.txt +3077 -0
- -NAyT4oBgHgl3EQfRPZI/content/tmp_files/load_file.txt +0 -0
- -tAyT4oBgHgl3EQfRPa5/content/2301.00063v1.pdf +3 -0
- -tAyT4oBgHgl3EQfRPa5/vector_store/index.faiss +3 -0
- -tAyT4oBgHgl3EQfRPa5/vector_store/index.pkl +3 -0
- .gitattributes +57 -0
- 29E2T4oBgHgl3EQf5whX/content/tmp_files/2301.04193v1.pdf.txt +999 -0
- 29E2T4oBgHgl3EQf5whX/content/tmp_files/load_file.txt +0 -0
- 3NAzT4oBgHgl3EQfR_tE/content/2301.01224v1.pdf +3 -0
- 5NE3T4oBgHgl3EQfpArI/content/tmp_files/2301.04639v1.pdf.txt +131 -0
- 5NE3T4oBgHgl3EQfpArI/content/tmp_files/load_file.txt +95 -0
- 5dAyT4oBgHgl3EQfcfda/content/2301.00283v1.pdf +3 -0
- 5dAyT4oBgHgl3EQfcfda/vector_store/index.faiss +3 -0
- 5dAyT4oBgHgl3EQfcfda/vector_store/index.pkl +3 -0
- 7NE3T4oBgHgl3EQfqApm/content/tmp_files/2301.04647v1.pdf.txt +0 -0
- 7tAzT4oBgHgl3EQfSPsA/content/2301.01227v1.pdf +3 -0
- 7tAzT4oBgHgl3EQfSPsA/vector_store/index.faiss +3 -0
- 7tAzT4oBgHgl3EQfSPsA/vector_store/index.pkl +3 -0
- 8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/2301.04216v1.pdf.txt +1215 -0
- 8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/load_file.txt +0 -0
- 99E5T4oBgHgl3EQfRQ7z/content/tmp_files/2301.05520v1.pdf.txt +2503 -0
- 99E5T4oBgHgl3EQfRQ7z/content/tmp_files/load_file.txt +0 -0
- 99FRT4oBgHgl3EQfrDen/content/tmp_files/2301.13619v1.pdf.txt +1011 -0
- 99FRT4oBgHgl3EQfrDen/content/tmp_files/load_file.txt +0 -0
- 9dAzT4oBgHgl3EQf-_6e/content/2301.01942v1.pdf +3 -0
- 9dAzT4oBgHgl3EQf-_6e/vector_store/index.faiss +3 -0
- 9dAzT4oBgHgl3EQf-_6e/vector_store/index.pkl +3 -0
- AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/2301.03553v1.pdf.txt +1891 -0
- AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/load_file.txt +0 -0
- BNAyT4oBgHgl3EQfRvex/content/tmp_files/2301.00073v1.pdf.txt +1874 -0
- BNAyT4oBgHgl3EQfRvex/content/tmp_files/load_file.txt +0 -0
- CtAzT4oBgHgl3EQfGfuT/content/tmp_files/2301.01029v1.pdf.txt +1261 -0
- CtAzT4oBgHgl3EQfGfuT/content/tmp_files/load_file.txt +0 -0
- CtE2T4oBgHgl3EQf9Ant/vector_store/index.pkl +3 -0
- DtAzT4oBgHgl3EQfT_x1/vector_store/index.faiss +3 -0
- E9AyT4oBgHgl3EQfevjq/content/tmp_files/2301.00329v1.pdf.txt +1253 -0
- E9AyT4oBgHgl3EQfevjq/content/tmp_files/load_file.txt +0 -0
- E9AzT4oBgHgl3EQfG_uu/content/tmp_files/2301.01038v1.pdf.txt +1438 -0
- E9AzT4oBgHgl3EQfG_uu/content/tmp_files/load_file.txt +0 -0
- E9E0T4oBgHgl3EQfQwCg/content/2301.02198v1.pdf +3 -0
- E9E0T4oBgHgl3EQfQwCg/vector_store/index.faiss +3 -0
- FdAyT4oBgHgl3EQfe_hY/content/tmp_files/2301.00331v1.pdf.txt +2743 -0
- FdAyT4oBgHgl3EQfe_hY/content/tmp_files/load_file.txt +0 -0
- FdE2T4oBgHgl3EQf-QlB/content/tmp_files/2301.04236v1.pdf.txt +593 -0
- FdE2T4oBgHgl3EQf-QlB/content/tmp_files/load_file.txt +300 -0
- GtE5T4oBgHgl3EQfWA9Z/vector_store/index.faiss +3 -0
- IdFIT4oBgHgl3EQfYSv6/content/tmp_files/2301.11248v1.pdf.txt +1567 -0
- IdFIT4oBgHgl3EQfYSv6/content/tmp_files/load_file.txt +0 -0
- JNFAT4oBgHgl3EQfvB44/content/2301.08673v1.pdf +3 -0
- JNFAT4oBgHgl3EQfvB44/vector_store/index.faiss +3 -0
-NAyT4oBgHgl3EQfRPZI/content/tmp_files/2301.00061v1.pdf.txt
ADDED
@@ -0,0 +1,3077 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
A Global Optimization Algorithm for K-Center
|
2 |
+
Clustering of One Billion Samples
|
3 |
+
Jiayang Ren1, Ningning You2, Kaixun Hua1, Chaojie Ji3, Yankai Cao1
|
4 |
+
1Department of Chemical and Biological Engineering, University of British Columbia, Vancouver, BC, Canada,
|
5 | |
6 |
+
2Antai College of Economics and Management, Shanghai Jiao Tong University, Shanghai, China,
|
7 | |
8 |
+
3Department of Mathematics, University of British Columbia, Vancouver, BC, Canada,
|
9 | |
10 |
+
This paper presents a practical global optimization algorithm for the K-center clustering problem, which
|
11 |
+
aims to select K samples as the cluster centers to minimize the maximum within-cluster distance. This
|
12 |
+
algorithm is based on a reduced-space branch and bound scheme and guarantees convergence to the global
|
13 |
+
optimum in a finite number of steps by only branching on the regions of centers. To improve efficiency,
|
14 |
+
we have designed a two-stage decomposable lower bound, the solution of which can be derived in a closed
|
15 |
+
form. In addition, we also propose several acceleration techniques to narrow down the region of centers,
|
16 |
+
including bounds tightening, sample reduction, and parallelization. Extensive studies on synthetic and real-
|
17 |
+
world datasets have demonstrated that our algorithm can solve the K-center problems to global optimal
|
18 |
+
within 4 hours for ten million samples in the serial mode and one billion samples in the parallel
|
19 |
+
mode. Moreover, compared with the state-of-the-art heuristic methods, the global optimum obtained by our
|
20 |
+
algorithm can averagely reduce the objective function by 25.8% on all the synthetic and real-world datasets.
|
21 |
+
Key words : global optimization; K-center clustering; branch and bound; two-stage decomposition; bounds
|
22 |
+
tightening
|
23 |
+
1. Introduction
|
24 |
+
Cluster analysis is a task to group similar samples into the same cluster while separating less
|
25 |
+
similar samples into different clusters. It is a fundamental unsupervised machine learning task that
|
26 |
+
explores the character of datasets without the need to annotate cluster classes. Clustering plays
|
27 |
+
a vital role in various fields, such as data summarization (Kleindessner et al. 2019, Hesabi et al.
|
28 |
+
1
|
29 |
+
arXiv:2301.00061v1 [math.OC] 30 Dec 2022
|
30 |
+
|
31 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
32 |
+
2
|
33 |
+
2015), customer grouping (Aggarwal et al. 2004), facility location determination (Hansen et al.
|
34 |
+
2009), and etc.
|
35 |
+
There are several typical cluster models, including connectivity-based models, centroid-based
|
36 |
+
models, distribution-based models, density-based models, etc. This work focuses on one of the fun-
|
37 |
+
damental centroid-based clustering models called the K-center problem. The goal of the K-center
|
38 |
+
problem is to minimize the maximum within-cluster distance
|
39 |
+
(Kaufman and Rousseeuw 2009).
|
40 |
+
Specifically, given a dataset with S samples and the desired number of clusters K, the K-center
|
41 |
+
problem aims to select K samples from the dataset as centers and to minimize the maximum
|
42 |
+
distance from other samples to its closest center. The K-center problem is a combinatorial opti-
|
43 |
+
mization problem that has been widely studied in theoretical computer science (Lim et al. 2005).
|
44 |
+
Moreover, it has been intensively explored as a symmetric and uncapacitated case of the p-center
|
45 |
+
facility location problem in operations research and management science (Garcia-Diaz et al. 2019),
|
46 |
+
where the number of facilities corresponds to the variable k in a standard K-center problem.
|
47 |
+
Formally, provided a K, the objective function of K-center problem can be formulated as follows:
|
48 |
+
min
|
49 |
+
µ∈X max
|
50 |
+
s∈S min
|
51 |
+
k∈K ||xs − µk||2
|
52 |
+
2
|
53 |
+
(1)
|
54 |
+
where X = {x1,...,xS} is the dataset with S samples and A attributes, in which xs = [xs,1,...,xs,A] ∈
|
55 |
+
RA is the sth sample and xs,a is the ath attribute of ith sample, s ∈ S := {1,··· ,S} is the index set
|
56 |
+
of samples. As to the variables related to clusters, k ∈ K := {1,··· ,K} is the index set of clusters,
|
57 |
+
µ := {µ1,··· ,µK} represents the center set of clusters, µk = [µk
|
58 |
+
1,...,µk
|
59 |
+
A] ∈ RA is the center of kth
|
60 |
+
cluster. Here, µ are the variables to be determined in this problem. We use µ ∈ X to denote the
|
61 |
+
“centers on samples” constraint in which each cluster’s center is restricted to the existing samples.
|
62 |
+
1.1. Literature Review
|
63 |
+
The K-center problem has been shown to be NP-hard (Gonzalez 1985), which means that it is
|
64 |
+
unlikely to find an optimal solution in polynomial time unless P = NP (Garey and Johnson 1979).
|
65 |
+
As a remedy, heuristic algorithms, which aim to find a good but not necessarily optimal solution,
|
66 |
+
|
67 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
68 |
+
3
|
69 |
+
are often used to solve the K-center problem on large-scale datasets. The study of exact algorithms,
|
70 |
+
which provide an optimal solution but may hardly be terminated in an acceptable time, is restricted
|
71 |
+
to small-scale datasets due to this poor scalability on larger datasets.
|
72 |
+
Regarding heuristic algorithms, there are several 2-approximation algorithms that provide a
|
73 |
+
theoretical guarantee of their distance from the optimal solution for the K-center problem, but do
|
74 |
+
not provide a guarantee on their running time (Plesn´ık 1987, Gonzalez 1985, Dyer and Frieze 1985,
|
75 |
+
Hochbaum and Shmoys 1985, Cook et al. 1995). Among these 2-approximation algorithms, Furthest
|
76 |
+
Point First (FPF) algorithm proposed by Gonzalez (1985) is known to be the fastest in practice
|
77 |
+
(Miheliˇc and Robic 2005). It works by starting with a randomly selected center and then adding
|
78 |
+
points that are farthest from the existing centers to the center set. Despite their solution quality
|
79 |
+
guarantee, these 2-approximation algorithms may not always provide close-to-optimal solutions in
|
80 |
+
practice (Garcia-Diaz et al. 2019). Another kind of heuristic methods with a polynomial running
|
81 |
+
time but a weaker solution quality guarantee is also intensively studied in the literature (Miheliˇc
|
82 |
+
and Robic 2005, Garcia-Diaz et al. 2017). Besides heuristic methods, there are also metaheuristic
|
83 |
+
methods that do not have a polynomial running time or a solution quality guarantee, but have
|
84 |
+
been shown to provide near-optimal solutions in some cases (Mladenovi´c et al. 2003, Pullan 2008,
|
85 |
+
Davidovi´c et al. 2011). In sum, none of these algorithms can deterministically guarantee a global
|
86 |
+
optimal solution for the K-center problem.
|
87 |
+
In contrast to the numerous heuristic algorithms, the study of exact algorithms, which provide
|
88 |
+
the optimal solution but no solution time guarantee, is still struggling with small-scale problems
|
89 |
+
(e.g., thousands of samples). Early exact works are inspired by the relationship between K-center
|
90 |
+
and set-covering problems (Minieka 1970). Daskin (2000) transferred the K-center problem to a
|
91 |
+
maximal covering problem, in which the number of covered samples by K centers is maximized.
|
92 |
+
Then, they proposed an iterative binary search scheme to accelerate the solving procedure. Ilhan
|
93 |
+
and Pinar (2001) considered iteratively setting a maximum distance and validating if it can cover
|
94 |
+
all the samples. Elloumi et al. (2004) designed a new integer linear programming formulation of
|
95 |
+
|
96 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
97 |
+
4
|
98 |
+
the K-center problem, then solved this new formulation by leveraging the binary search scheme
|
99 |
+
and linear programming relaxation. These algorithms have been shown to provide practical results
|
100 |
+
on small-scale datasets with up to 1,817 samples.
|
101 |
+
Another research direction models the K-center problem as a Mixed Integer Programming (MIP)
|
102 |
+
formulation, allowing for the use of the branch and bound technique to find an optimal solution.
|
103 |
+
However, the vanilla implementations of the branch and bound technique are confined to small-scale
|
104 |
+
datasets with fewer than 250 samples (Brusco and Stahl 2005). Hence, constraint programming is
|
105 |
+
introduced to address the larger scale K-center problems. Dao et al. (2013) designed two sets of
|
106 |
+
variables describing the cluster centers and sample belongings, then updated the solution through
|
107 |
+
constraint propagation and branching. They further reduced the sets of variables and proposed a
|
108 |
+
more general framework in Duong et al. (2017). By involving constraint programming, their works
|
109 |
+
can solve the datasets with up to 5,000 samples.
|
110 |
+
Recently, researchers have explored iterative techniques to solve the K-center problem on large
|
111 |
+
datasets by breaking it down into smaller subproblems, such as iterative sampling (Aloise and
|
112 |
+
Contardo 2018) and row generation (Contardo et al. 2019). In Aloise and Contardo (2018), a
|
113 |
+
sampling-based algorithm was proposed that alternates between an exact procedure on a small
|
114 |
+
subset of the data and a heuristic procedure to test the optimality of the current solution. This
|
115 |
+
algorithm is capable to solve a dataset containing 581,012 samples within 4 hours. However, a report
|
116 |
+
about the optimality gap is absent, which is an important measure of solution quality. According to
|
117 |
+
that computing the covering set for a subset of all samples is cheaper than all (Chen and Handler
|
118 |
+
1987, Chen and Chen 2009), the same research group proposed a row generation algorithm that
|
119 |
+
relies on computing a much smaller sub-matrix (Contardo et al. 2019). This approach is able to
|
120 |
+
solve a dataset with 1 million samples to a 6% gap in 9 hours. However, neither of these methods
|
121 |
+
provides a finite-step convergence guarantee, which results in that they may not always converge
|
122 |
+
to an arbitrarily small gap within a finite number of steps. Therefore, these methods can lead to a
|
123 |
+
nontrivial optimality gap, especially for large datasets.
|
124 |
+
|
125 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
126 |
+
5
|
127 |
+
1.2. Main contributions
|
128 |
+
Recently, Cao and Zavala (2019) proposed a reduced-space spatial branch and bound (BB) scheme
|
129 |
+
for two-stage stochastic nonlinear programs. Hua et al. (2021) adopted this reduced-space BB
|
130 |
+
scheme and Lagrangian decomposition to solve the K-means clustering problem with a global
|
131 |
+
optimal guarantee. They solve the large-scale K-means problems up to 210,000 samples to 2.6%
|
132 |
+
optimality gap within 4 hours. However, these works can not be directly applied to the K-center
|
133 |
+
problem. The challenge is that the K-center problem minimizes the maximum within-cluster dis-
|
134 |
+
tance instead of the average within-cluster distance. Therefore, utilizing the Lagrangian decom-
|
135 |
+
position method to compute the lower bound is impossible. Moreover, because of the “centers on
|
136 |
+
samples” constraint in the K-center problem, the direct application of Hua’s algorithm will lead
|
137 |
+
to infeasible solutions.
|
138 |
+
To address these challenges, we propose a tailored reduced-space branch and bound algorithm
|
139 |
+
for the K-center problem. We also design several bounds tightening (BT) and sample reduction
|
140 |
+
methods to accelerate the BB procedure. Our algorithm is unique in that it only branches on the
|
141 |
+
region of centers, which allows us to guarantee convergence to the global optimum within a finite
|
142 |
+
number of steps. In contrast, traditional branch and bound algorithms must branch on all integer
|
143 |
+
variables, which can become computationally infeasible for large-scale problems. By focusing on
|
144 |
+
the limited region of centers, our algorithm is capable to solve even large-scale K-center problems.
|
145 |
+
Specifically, the main contributions of this paper are as follows:
|
146 |
+
• We propose an exact global optimization algorithm based on a tailored reduced-space branch
|
147 |
+
and bound scheme for the K-center problem. To increase efficiency, we develop a two-stage decom-
|
148 |
+
posable lower bounding method with a closed-form solution, eliminating the need for using any
|
149 |
+
MIP solver in the optimization process. Moreover, the convergence of our algorithm to the global
|
150 |
+
optimum is guaranteed by branching only on the region of centers.
|
151 |
+
• We demonstrate that the assignment of clusters can be determined for many samples without
|
152 |
+
knowing the optimal solution. Based on this characteristic, we propose several bounds tightening
|
153 |
+
|
154 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
155 |
+
6
|
156 |
+
and sample reduction techniques to further reduce the search space and accelerate the solving
|
157 |
+
procedure. Moreover, we also implement a sample-level parallelization strategy to fully utilize
|
158 |
+
computational resources.
|
159 |
+
• An open-source Julia implementation of the algorithm is provided. Extensive studies on 5
|
160 |
+
synthetic and 33 real-world datasets have demonstrated that we can obtain the global solution for
|
161 |
+
datasets with up to 1 billion samples and 12 features, a feat that has not been achieved so far.
|
162 |
+
Especially, compared with the heuristic methods, the global optimum obtained by our algorithm
|
163 |
+
can averagely reduce the objective function by 25.8% on all the synthetic and real-world datasets.
|
164 |
+
This paper is an expanded version of our proceeding publication (Shi et al. 2022) that includes one
|
165 |
+
new acceleration technique called sample reduction and a parallel implementation. These improve-
|
166 |
+
ments have significantly increased the scale of the optimally solvable K-center problem from 14
|
167 |
+
million samples to 1 billion. In this version, we provide more detailed proof of the global opti-
|
168 |
+
mum convergence of our algorithm. In addition, we have designed more comprehensive numerical
|
169 |
+
experiments on a broader range of datasets and parameters.
|
170 |
+
1.3. Outline
|
171 |
+
This paper is organized as follows: Section 2 introduces a two-stage formulation and a Mixed Integer
|
172 |
+
Nonlinear Programming (MINLP) formulation for the K-center problem. Section 3 presents the
|
173 |
+
details of the reduced-space branch and bound algorithm, including the lower bound, upper bound
|
174 |
+
methods, and convergence analysis. Section 4 discusses the accelerating techniques for our BB
|
175 |
+
algorithm, including bounds tightening, sample reduction, and parallel implementation techniques.
|
176 |
+
Section 5 presents the detailed proof of convergence to the global optimum in the finite steps.
|
177 |
+
Section 6 gives extensive numerical results compared with other algorithms. Finally, Section 7
|
178 |
+
concludes the paper.
|
179 |
+
|
180 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
181 |
+
7
|
182 |
+
2. K-center Formulation
|
183 |
+
2.1. Two-stage Formulation
|
184 |
+
To introduce the lower bounding method in the branch and bound scheme, we first propose a
|
185 |
+
two-stage optimization form of the K-center Problem 1. The first-stage problem is as follows:
|
186 |
+
z =
|
187 |
+
min
|
188 |
+
µ∈X∩M0 max
|
189 |
+
s∈S Qs(µ).
|
190 |
+
(2)
|
191 |
+
where the center set µ is the so-called first-stage variable, Qs(µ) is the optimal value of the second-
|
192 |
+
stage optimization problem:
|
193 |
+
Qs(µ) = min
|
194 |
+
k∈K ||xs − µk||2
|
195 |
+
2
|
196 |
+
(3)
|
197 |
+
We denote a closed set M0 := {µ | µ ≤ µ ≤ ¯µ} as the region of centers, where µ is the lower bound of
|
198 |
+
centers and ¯µ is the upper bound, i.e., µk
|
199 |
+
a = min
|
200 |
+
s∈S Xs,a, ¯µk
|
201 |
+
a = max
|
202 |
+
s∈S Xs,a, ∀k ∈ K, a ∈ {1,··· ,A}. Here,
|
203 |
+
the constraint µ ∈ M0 is introduced to simplify the discussion of the BB scheme. Since M0 can be
|
204 |
+
inferred directly from data, it will not affect the optimal solution of Problem 1. Constraint µ ∈
|
205 |
+
X ∩ M0 means the center of each cluster is selected from the samples belonging to the intersection
|
206 |
+
set of the corresponding region M0 and the dataset X
|
207 |
+
2.2. MINLP Formulation
|
208 |
+
To introduce the bounds tightening and sample reduction methods, we propose a MINLP formu-
|
209 |
+
lation of the K-center Problem 1:
|
210 |
+
min
|
211 |
+
µ,d,b,λ d∗
|
212 |
+
(4a)
|
213 |
+
s.t. dk
|
214 |
+
s ≥ ||xs − µk||2
|
215 |
+
2
|
216 |
+
(4b)
|
217 |
+
− N1(1 − bk
|
218 |
+
s) ≤ d∗
|
219 |
+
s − dk
|
220 |
+
s ≤ 0
|
221 |
+
(4c)
|
222 |
+
d∗ ≥ d∗
|
223 |
+
s
|
224 |
+
(4d)
|
225 |
+
�
|
226 |
+
k∈K
|
227 |
+
bk
|
228 |
+
s = 1
|
229 |
+
(4e)
|
230 |
+
bk
|
231 |
+
s ∈ {0,1}
|
232 |
+
(4f)
|
233 |
+
|
234 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
235 |
+
8
|
236 |
+
− N2(1 − λk
|
237 |
+
s) ≤ xs − µk ≤ N2(1 − λk
|
238 |
+
s)
|
239 |
+
(4g)
|
240 |
+
�
|
241 |
+
s∈S
|
242 |
+
λk
|
243 |
+
s = 1
|
244 |
+
(4h)
|
245 |
+
λk
|
246 |
+
s ∈ {0,1}
|
247 |
+
(4i)
|
248 |
+
bk
|
249 |
+
s ≥ λk
|
250 |
+
s
|
251 |
+
(4j)
|
252 |
+
s ∈ S,k ∈ K
|
253 |
+
(4k)
|
254 |
+
where dk
|
255 |
+
s represents the distance between sample xs and center µk, d∗
|
256 |
+
s denotes the distance between
|
257 |
+
xs and the center of its cluster, N1 and N2 are both arbitrary large values. bk
|
258 |
+
s and λk
|
259 |
+
s are two binary
|
260 |
+
variables. bk
|
261 |
+
s is equal to 1 if sample xs belongs to the Kth cluster, and 0 otherwise. λk
|
262 |
+
s is equal to
|
263 |
+
1 if xs is the center of the Kth cluster µk, and 0 otherwise.
|
264 |
+
Constraint 4c is a big M formulation and ensures that d∗
|
265 |
+
s = dk
|
266 |
+
s if bk
|
267 |
+
s = 1 and d∗
|
268 |
+
s ≤ dk
|
269 |
+
s otherwise.
|
270 |
+
Constraint 4e guarantees that sample xs belongs to one cluster. We also adopt Constraint 4g, 4h
|
271 |
+
and 4j to represent the “centers on samples” constraints, µ ∈ X. Specifically, Constraint 4g uses a
|
272 |
+
big M formula to make sure that µk = xs if λk
|
273 |
+
s = 1 and Constraint 4h confirms that each center can
|
274 |
+
only be selected on one sample. Constraint 4j ensures that if xs is the center of the Kth cluster,
|
275 |
+
then it is assigned to the Kth cluster. It should be noted that the global optimizer CPLEX also
|
276 |
+
relies on this formulation to solve the K-center problem.
|
277 |
+
3. Tailored Reduced-space Branch and Bound Scheme
|
278 |
+
This section introduces a tailored reduced-space branch and bound algorithm for the K-center
|
279 |
+
problem with lower and upper bounding methods.
|
280 |
+
3.1. Lower Bounds
|
281 |
+
In this section, we adopt the two-stage formulation and derive a closed-form solution to obtain the
|
282 |
+
lower bound of the K-center Problem 1.
|
283 |
+
At each node in the BB procedure, we deal with a subset of M0, which is denoted as M, and
|
284 |
+
solve the following problem concerning M:
|
285 |
+
z(M) = min
|
286 |
+
µ∈X∩M max
|
287 |
+
s∈S Qs(µ)
|
288 |
+
(5)
|
289 |
+
|
290 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
291 |
+
9
|
292 |
+
This problem can be equivalently reformulated as the following problem by duplicating µ across
|
293 |
+
samples and enforcing them to be equal:
|
294 |
+
min
|
295 |
+
µs∈X∩M max
|
296 |
+
s∈S Qs(µs)
|
297 |
+
(6a)
|
298 |
+
s.t.
|
299 |
+
µs = µs+1,s ∈ {1,··· ,S − 1}
|
300 |
+
(6b)
|
301 |
+
We call constraints 6b the non-anticipativity constraints. By removing the “centers on samples”
|
302 |
+
constraint µ ∈ X and the non-anticipativity constraints 6b, we attain a lower bound formulation
|
303 |
+
as follow:
|
304 |
+
β(M) := min
|
305 |
+
µs∈M max
|
306 |
+
s∈S Qs(µs).
|
307 |
+
(7)
|
308 |
+
With constraints relaxed, the feasible region of Problem 7 is a superset of Problem 6’s feasible
|
309 |
+
region. Therefore, it is obvious that β(M) ≤ z(M).
|
310 |
+
In Problem 7, since µ of each sample is independent, it is obvious that:
|
311 |
+
β(M) = max
|
312 |
+
s∈S min
|
313 |
+
µs∈M Qs(µs).
|
314 |
+
(8)
|
315 |
+
Clearly, problem 8 can be decomposed into S subproblems with β(M) = max
|
316 |
+
s∈S βs(M):
|
317 |
+
βs(M) = min
|
318 |
+
µ∈M Qs(µ).
|
319 |
+
(9)
|
320 |
+
Denote the region of kth cluster’s center as M k := {µk : µk ≤ µk ≤ ¯µk} where µk and ¯µk are the
|
321 |
+
lower and upper bound of µk respectively. Since Qs(µ) = min
|
322 |
+
k∈K ||xs − µk||2
|
323 |
+
2, we have
|
324 |
+
βs(M) = min
|
325 |
+
k∈K min
|
326 |
+
µk∈Mk ||xs − µk||2
|
327 |
+
2,
|
328 |
+
(10)
|
329 |
+
which can be further decomposed into K subsubproblems with βs(M)=min
|
330 |
+
k∈K βk
|
331 |
+
s (M k):
|
332 |
+
βk
|
333 |
+
s (M k) = min
|
334 |
+
µk∈Mk ||xs − µk||2
|
335 |
+
2.
|
336 |
+
(11)
|
337 |
+
The analytical solution to Problem 11 is: µk
|
338 |
+
a
|
339 |
+
∗ = mid{µk
|
340 |
+
a, xs,a, ¯µk
|
341 |
+
a},∀a ∈ {1,··· ,A}. Consequently,
|
342 |
+
the closed-form solution to Problem 7 can be easily computed by the max-min operation on all the
|
343 |
+
samples.
|
344 |
+
|
345 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
346 |
+
10
|
347 |
+
3.2. Upper Bounds
|
348 |
+
At each node in the BB procedure, the upper bounds of Problem 5 can be obtained by fixing the
|
349 |
+
centers at a candidate feasible solution ˆµ ∈ X ∩ M. In this way, we can compute the upper bound
|
350 |
+
base on the following equation:
|
351 |
+
α(M) = max
|
352 |
+
s∈S min
|
353 |
+
k∈K ||xs − ˆµk||2
|
354 |
+
2
|
355 |
+
(12)
|
356 |
+
Since ˆµ is a feasible solution, we have z(M) ≤ α(M), ∀ˆµ ∈ X ∩ M. In our implementation, we
|
357 |
+
use two methods to obtain the candidate feasible solutions. At the root node, we use a heuristic
|
358 |
+
method called Farthest First Traversal (Gonzalez 1985) to obtain a candidate solution ˆµ ∈ X ∩M0.
|
359 |
+
Using this method, we randomly pick an initial point and select each following point as far as
|
360 |
+
possible from the previously selected points. Algorithm 2 describes the details of the farthest first
|
361 |
+
traversal, where d(xs,T) represents the minimum distance from sample xs to any sample in set T.
|
362 |
+
We use FFT(M0) to denote the upper bound obtained using this approach. At a child node with
|
363 |
+
center region M, for each cluster, we select the data sample closest to the middle point of M k as
|
364 |
+
ˆµk, and obtain the corresponding upper bound α(M).
|
365 |
+
3.3. Branching
|
366 |
+
Our algorithm only needs to branch on the region of centers, M := {µ : µ ≤ µ ≤ ¯µ}, to guarantee
|
367 |
+
convergence, which would be theoretically discussed in Section 5, o. Since the desired number of
|
368 |
+
clusters is K and the number of attributes is A, the number of possible branching variables is K ×A.
|
369 |
+
The selection of branching variables and values will dramatically influence the BB procedure’s
|
370 |
+
efficiency. In our implementation, we select the max-range variable at each node as the branching
|
371 |
+
variable and the midpoint of this variable as the branching value.
|
372 |
+
3.4. Branch and Bound Scheme
|
373 |
+
The detailed reduced-space branch and bound algorithm for the K-center Problem 1 are given in
|
374 |
+
the Algorithm 1. In the algorithm, We use relint(.) to denote the relative interior of a set. We can
|
375 |
+
|
376 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
377 |
+
11
|
378 |
+
also establish the convergence of the branch-and-bound scheme in Algorithm 1. The BB procedure
|
379 |
+
can generate a monotonically non-ascending sequence {αi} and a monotonically non-descending
|
380 |
+
sequence {βi}. We can show that they both converge to z in a finite number of steps.
|
381 |
+
Theorem 1. Algorithm 1 is convergent to the global optimal solution after a finite step L, with
|
382 |
+
βL = z = αL, by only branching on the region of centers.
|
383 |
+
Since the following acceleration techniques also influence the global convergence in Section 4. We
|
384 |
+
present the detailed proof of Theorem 1 in Section 5 after introducing the acceleration techniques.
|
385 |
+
Algorithm 1 Branch and Bound Scheme
|
386 |
+
Initialization
|
387 |
+
Initialize the iteration index i ← 0;
|
388 |
+
Set M ← {M0}, and tolerance ϵ > 0;
|
389 |
+
Compute initial lower and upper bounds βi = β(M0), αi =
|
390 |
+
FFT(M0) // Alg. 2 ;
|
391 |
+
Select K farthest initial seeds // Sec.4.1.1;
|
392 |
+
while M ̸= ∅ do
|
393 |
+
Node Selection
|
394 |
+
Select a set M satisfying β(M) = βi from M and delete it
|
395 |
+
from M;
|
396 |
+
Update i ← i + 1;
|
397 |
+
Bounds Tightening
|
398 |
+
Cluster Assignment // Alg. 3;
|
399 |
+
Bounds Tightening // Alg. 4;
|
400 |
+
Obtain the tightened node ˆ
|
401 |
+
M;
|
402 |
+
If i % isr = 0, Sample Reduction // Alg. 5;
|
403 |
+
if ∃|X ∩ M k| > 1,k ∈ K then
|
404 |
+
Branching
|
405 |
+
Find two subsets M1
|
406 |
+
and M2
|
407 |
+
s.t. relint(M1) ∩
|
408 |
+
relint(M2) = ∅ and M1 ∪ M2 = M;
|
409 |
+
Update M ← M∪{Mi}, if X ∩M k
|
410 |
+
i ̸= ∅,∀k ∈ K,i ∈ 1,2;
|
411 |
+
end if
|
412 |
+
Bounding
|
413 |
+
Compute upper and lower bound α(M1), β(M1), α(M2),
|
414 |
+
β(M2);
|
415 |
+
Let βi ← min{β(M ′) | M ′ ∈ M};
|
416 |
+
Let αi ← min{αi−1,α(M1),α(M2)};
|
417 |
+
Remove all M ′ from M if β(M ′) ≥ αi;
|
418 |
+
If βi − αi ≤ ϵ, STOP;
|
419 |
+
end while
|
420 |
+
Algorithm 2 Farthest First Traversal
|
421 |
+
Initialization
|
422 |
+
Randomly pick s ∈ S;
|
423 |
+
Denote T as the set of K points selected by farthest first
|
424 |
+
traversal;
|
425 |
+
Set T ← {xs};
|
426 |
+
while |T| < K do
|
427 |
+
Compute xs ∈ arg max
|
428 |
+
xs∈X d(xs,T) to find xs which is the
|
429 |
+
farthest away from set T;
|
430 |
+
T ← T ∪ {xs};
|
431 |
+
end while
|
432 |
+
Algorithm 3 Cluster Assignment
|
433 |
+
Center Based Assignment
|
434 |
+
for sample xs ∈ X do
|
435 |
+
if bk
|
436 |
+
s == 0,∀k ∈ K then
|
437 |
+
if βk
|
438 |
+
s (M k) > α,∀k ∈ K \ {k′} then
|
439 |
+
xs is assigned to cluster k′ with bk′
|
440 |
+
s = 1;
|
441 |
+
end if
|
442 |
+
end if
|
443 |
+
end for
|
444 |
+
Sample Based Assignment
|
445 |
+
if All clusters have at least one sample assigned then
|
446 |
+
for sample xs ∈ X do
|
447 |
+
if ∀k ∈ K \ {k′}, ∃ xj assigned to kth cluster, ||xs −
|
448 |
+
xj||2
|
449 |
+
2 > 4α then
|
450 |
+
xs is assigned to cluster k′ with bk′
|
451 |
+
s = 1.
|
452 |
+
end if
|
453 |
+
end for
|
454 |
+
end if
|
455 |
+
Algorithm 4 Bounds Tightening
|
456 |
+
Given the current center region M and upper bound α
|
457 |
+
for Cluster k ∈ K do
|
458 |
+
Obtain the assigned sample set J k using Alg.3;
|
459 |
+
Compute the ball-based or box-boxed area of each
|
460 |
+
assigned sample, Bα(xj) or Rα(xj);
|
461 |
+
Tighten the center region by M k ∩Bα(xj) or M k ∩Rα(xj)
|
462 |
+
, ∀j ∈ J k;
|
463 |
+
Further tighten according to the “centers on samples”
|
464 |
+
constraint;
|
465 |
+
end for
|
466 |
+
Algorithm 5 Sample Reduction
|
467 |
+
Initialize the index set of redundant samples as R ← S
|
468 |
+
for all BB nodes do
|
469 |
+
Obtain the index set of redundant samples for lower
|
470 |
+
bounds, RLB, according to the criterion in Sec. 4.2.1;
|
471 |
+
Obtain the index set of redundant samples for upper
|
472 |
+
bounds, RUB, according to the criterion in Sec. 4.2.2;
|
473 |
+
Update the redundant index set, R ← R ∩ RLB ∩ RUB;
|
474 |
+
end for
|
475 |
+
Delete samples in the redundant set R from the current
|
476 |
+
dataset.
|
477 |
+
|
478 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
479 |
+
12
|
480 |
+
4. Acceleration Techniques
|
481 |
+
Although the lower bound introduced in Section 3.1 is enough to guarantee convergence, it might
|
482 |
+
not be very tight, leading to tremendous iterations. Therefore, we propose several acceleration
|
483 |
+
techniques to reduce the search space and speed up the BB procedure. Since Algorithm 1 only
|
484 |
+
branches on the region of centers M := {µ : µ ≤ µ ≤ ¯µ}, we focus on reducing the region of centers
|
485 |
+
to accelerate the solution process while not excluding the optimal solution of the original K-center
|
486 |
+
problem.
|
487 |
+
4.1. Bounds Tightening Techniques
|
488 |
+
In each node, the assignment of many samples (i.e., which cluster the sample is assigned to) can be
|
489 |
+
pre-determined by the geometrical relationship of samples and regions of centers. This information
|
490 |
+
can be further used to reduce the region of µ.
|
491 |
+
4.1.1. Cluster Assignment
|
492 |
+
The task of cluster assignment is to pre-determine some values
|
493 |
+
of bk
|
494 |
+
s in the MINLP Formulation 4 at each BB node before finding the global optimal solution.
|
495 |
+
We first demonstrate the relations between samples and centers. Denote α as the upper bound
|
496 |
+
obtained using methods described in Section 3.2. Then based on Objective 4a and Constraint 4d,
|
497 |
+
we have d∗
|
498 |
+
s ≤ d∗ ≤ α. From Constraint 4b and 4c, we can conclude that if bk
|
499 |
+
s = 1, then ||xs −µk||2
|
500 |
+
2 ≤
|
501 |
+
d∗
|
502 |
+
s ≤ α. Therefore, we can derive Lemma 1:
|
503 |
+
Lemma 1. If sample xs is in the kth cluster, then ||xs − µk||2
|
504 |
+
2 ≤ α, where α is an upper bound of
|
505 |
+
the K-center problem.
|
506 |
+
Besides the relation between samples and centers, cluster assignments may also be determined
|
507 |
+
from the distance of two samples. Suppose sample xi and xj belong to the kth cluster, then from
|
508 |
+
Lemma 1 we have ||xi − µk||2
|
509 |
+
2 ≤ α and ||xj − µk||2
|
510 |
+
2 ≤ α. Thus ||xi − xj||2
|
511 |
+
2 = ||xi − µk + µk − xj||2
|
512 |
+
2 ≤
|
513 |
+
(||xi − µk||2 + ||µk − xj||2)2 ≤ 4α. Therefore, we have Lemma 2:
|
514 |
+
Lemma 2. If two samples xi and xj are in the same cluster, then ||xi − xj||2
|
515 |
+
2 ≤ 4α where α is an
|
516 |
+
upper bound of the K-center problem.
|
517 |
+
|
518 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
519 |
+
13
|
520 |
+
We propose three methods for pre-assigning samples based on these two Lemmas:
|
521 |
+
K Farthest Initial Seeds: From Lemma 2, if ||xi − xj||2
|
522 |
+
2 > 4α, then xi and xj are not in the
|
523 |
+
same cluster. At the root node, if we can find K samples with the distance between any two of
|
524 |
+
these samples xi and xj satisfying ||xi − xj||2
|
525 |
+
2 > 4α, then we can conclude that these K samples
|
526 |
+
must belong to K distinct clusters. Figure 1 shows an example of this property, in which three
|
527 |
+
samples are pre-assigned to 3 distinct clusters. We call these K points initial seeds. To find the
|
528 |
+
initial seeds, every two samples must be as far as possible. Therefore, in our implementation, we use
|
529 |
+
the heuristic Farthest First Traversal (FFT) (Algorithm 2) to obtain K farthest points. For about
|
530 |
+
half of the case studies shown in Section 6, we can obtain the initial seeds using FFT. However, for
|
531 |
+
other cases, initial seeds can not be obtained using FFT, or the initial seeds may not even exist.
|
532 |
+
Center-Based Assignment: From Lemma 1, if ||xs − µk||2
|
533 |
+
2 > α, then xs does not belong to
|
534 |
+
kth cluster, which is bk
|
535 |
+
s = 0. Consequently, if we can determine that bk
|
536 |
+
s = 0,∀k ∈ K \ {k′}, then
|
537 |
+
bk′
|
538 |
+
s = 1. However, the value of µ here is unknown before obtaining the optimal solution. One
|
539 |
+
observation is that if the BB node with region M contains the optimal solution, then we have
|
540 |
+
βk
|
541 |
+
s (M k) = min
|
542 |
+
µk∈Mk ||xs − µk||2
|
543 |
+
2 ≤ ||xs − µk||2
|
544 |
+
2. Therefore, if βk
|
545 |
+
s (M k) > α, sample xs is not in the kth
|
546 |
+
cluster and bk
|
547 |
+
s = 0. In summary, for sample xs, if ∀k ∈ K \ {k′}, βk
|
548 |
+
s (M k) > α, then xs is assigned to
|
549 |
+
cluster k′ with bk′
|
550 |
+
s = 1. Figure 2 illustrates an example in two-dimensional space with three clusters.
|
551 |
+
This center-based method can be adopted at every node of the BB scheme. Since βk
|
552 |
+
s (M k) is
|
553 |
+
already obtained when computing the lower bound in Section 4.2.1, there is no additional compu-
|
554 |
+
tational cost. Nevertheless, we do not need to apply this method at the root node since M 1
|
555 |
+
0 = ··· =
|
556 |
+
M K
|
557 |
+
0 . As the BB scheme continues branching on the regions of centers, M k becomes more and more
|
558 |
+
different from others. Then more samples can be pre-assigned using this center-based method.
|
559 |
+
Sample-Based Assignment: Besides utilizing centers to pre-assign samples, assigned samples
|
560 |
+
can also help pre-assign other samples. From Lemma 2, if ||xi −xj||2
|
561 |
+
2 > 4α, then xi and xj are not in
|
562 |
+
the same cluster. If xj belongs to kth cluster, then obviously xi cannot be assigned to kthe cluster
|
563 |
+
and bk
|
564 |
+
i = 0. With this relationship, if all the other K − 1 clusters are excluded, xi will be assigned
|
565 |
+
to the remaining cluster. Figure 3 shows an example of the sample-based assignment.
|
566 |
+
|
567 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
568 |
+
14
|
569 |
+
There is a prerequisite to using this sample-based method. For each cluster, there must be at least
|
570 |
+
one sample already assigned to the cluster. Based on this prerequisite, sample-based assignment is
|
571 |
+
utilized only after at least one sample is pre-assigned for each cluster.
|
572 |
+
4.1.2. Bounds Tightening
|
573 |
+
In this subsection, we adopt the Bounds Tightening (BT) tech-
|
574 |
+
nique and the cluster assignment information to reduce the region of µ.
|
575 |
+
Ball-based Bounds Tightening: For a sample j, Bα(xj)={x| ||x − xj||2
|
576 |
+
2 ≤ α} represents the
|
577 |
+
ball with center xj and radius √α. By using cluster assignment methods in Section 4.1.1, assuming
|
578 |
+
that sample j belongs to kth cluster is already known, by Lemma 1, then µk ∈ Bα(xj) holds. We
|
579 |
+
use J k to denote the index of all samples assigned to kth cluster, i.e., J k = {j ∈ S | bk
|
580 |
+
j = 1},
|
581 |
+
then µk ∈ Bα(xj),∀j ∈ J k. Besides this, we also know that µk ∈ X ∩ M k. Denote Sk
|
582 |
+
+ as the index
|
583 |
+
set of samples satisfying all these constraints, Sk
|
584 |
+
+(M) := {s ∈ S |xs ∈ X ∩ M k,xs ∈ Bα(xj),∀j ∈
|
585 |
+
J k}. In this way, we can obtain a tightened box containing all feasible solutions of kth center,
|
586 |
+
ˆ
|
587 |
+
M k={µk|ˆµk ≤ µk ≤ ˆ¯µk}, with the bounds of ath attribute in kth center to be ˆµk
|
588 |
+
a=
|
589 |
+
min
|
590 |
+
s∈Sk
|
591 |
+
+(M)xk
|
592 |
+
s,a and
|
593 |
+
ˆ¯µk
|
594 |
+
s= max
|
595 |
+
s∈Sk
|
596 |
+
+(M)xk
|
597 |
+
s,a. Figure 4 gives an example of bounds tightening using this method. One challenge
|
598 |
+
of this ball-based bounds tightening method is that it needs to compute the distance of xs and xj
|
599 |
+
for all s ∈ S and j ∈ J k. If we know the assignments of the majority of the samples, we need to
|
600 |
+
do at most S2 times of distance calculation. Note that we only need to do S ∗ K times of distance
|
601 |
+
calculation to compute a lower bound. To reduce the computational time, we set a threshold on
|
602 |
+
the maximum number of balls (default: 50) utilized to tighten bounds in our implementation.
|
603 |
+
Box-based Bounds Tightening: Another strategy to reduce the computation burden is based
|
604 |
+
on the relaxation of Bα(xj). For any ball Bα(xj), the closed set Rα(xj) = {x | xj − √α ≤ x ≤
|
605 |
+
xj + √α} is the smallest box containing Bα(xj). Then we have µk ∈ Rα(xj),∀j ∈ J k. Since Rα(xj)
|
606 |
+
and M k are all boxes, we can easily compute the tighten bounds ˆ
|
607 |
+
M k=�
|
608 |
+
j∈J k Rα(xj) ∩ M k. Figure
|
609 |
+
5 gives an example of box-based bounds tightening using this method. Obviously, the bounds
|
610 |
+
generated in Figure 4 is much tighter, while the method in Figure 5 is much faster. Consequently,
|
611 |
+
if |J k| is small for all clusters, the ball-based bounds tightening method gives more satisfactory
|
612 |
+
results. While if |J k| is large for any k, box-based bounds tightening provides a cheaper alternative.
|
613 |
+
|
614 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
615 |
+
15
|
616 |
+
4.1.3. Symmetry Breaking
|
617 |
+
Another way to get tighter bounds is based on symmetry-
|
618 |
+
breaking constraints. We add the constraints µ1
|
619 |
+
1 ≤ µ2
|
620 |
+
1 ≤ ··· ≤ µK
|
621 |
+
1 in the BB algorithm 1, in which
|
622 |
+
µk
|
623 |
+
a denotes ath attribute of kth center. Note that symmetry-breaking constraints and FFT-based
|
624 |
+
initial seeds in Section 4.1.1 both break symmetry by providing a certain order for the clusters, so
|
625 |
+
they cannot be combined. Our implementation uses symmetric breaking only when initial seeds are
|
626 |
+
not found from FFT at the root node. It should be noted that we also add this symmetry-breaking
|
627 |
+
constraints when using CPLEX to solve the MINLP formulation 4 of the K-center problem.
|
628 |
+
4.2. Sample Reduction
|
629 |
+
Some samples may become redundant during the lower and upper bounding procedure without
|
630 |
+
contributing to the bound improvements. If these samples are proven to be redundant in all the
|
631 |
+
current and future branch nodes, we can conclude they will not influence the bounding results
|
632 |
+
anymore, resulting in sample reduction.
|
633 |
+
4.2.1. Redundant samples in lower bounding
|
634 |
+
Denote β as the current best lower bound
|
635 |
+
obtained using methods described in Section 3.1. According to Equation 8, lower bound β(M) is
|
636 |
+
the maximum value of each sample’s optimal value, βs(M). Based on this observation, we further
|
637 |
+
define the best maximum distance of sample s to the center region of µ as
|
638 |
+
αs(M) = min
|
639 |
+
k∈K max
|
640 |
+
µk∈Mk ||xs − µk||2
|
641 |
+
2,
|
642 |
+
(13)
|
643 |
+
It is obvious that βs(M) ≤ αs(M). If αs(M) < β, we have βs(M) < β, which means sample s is
|
644 |
+
not the sample corresponding to maximum within-cluster distance. Hence, we can conclude that
|
645 |
+
sample s is a redundant sample in lower bounding for this BB node. Moreover, ∀M ′ ⊂ M, we
|
646 |
+
have βs(M ′) ≤ αs(M ′) ≤ αs(M). According to the shrinking nature of center region M and the
|
647 |
+
non-descending nature of lower bound β, if αs(M) < β is true in a BB node, sample s will remain
|
648 |
+
redundant in all the child nodes of this branch node. It should be noted that αs(M) can be
|
649 |
+
calculated using an analytical solution similar to βs(M), which is µk
|
650 |
+
a = µk
|
651 |
+
a if |µk
|
652 |
+
a −xs,a| > |¯µk
|
653 |
+
a −xs,a|,
|
654 |
+
otherwise ¯µk
|
655 |
+
a.
|
656 |
+
|
657 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
658 |
+
16
|
659 |
+
4.2.2. Redundant samples in upper bounding
|
660 |
+
Obviously, a sample xj cannot be the
|
661 |
+
center for kth cluster if it does not belong to M k. Moreover, according to Lemma 1, if a sample xj
|
662 |
+
is the center for cluster K, ||xi −xj||2
|
663 |
+
2 ≤ α must hold for all the samples xi assigned to this cluster.
|
664 |
+
Hence, a sample xj also cannot be the center for kth cluster, if there exists a sample xi assigned to
|
665 |
+
kth cluster satisfying ||xi −xj||2
|
666 |
+
2 > α. If sample xj cannot be centers for any cluster, we denote this
|
667 |
+
sample xj as a redundant sample for upper bounding. Since the non-ascending nature of upper
|
668 |
+
bound α, if sample s is redundant for upper bounding in a branch node, it will remain redundant
|
669 |
+
in all the child nodes of this branch node. It should be noted that the calculations in this method
|
670 |
+
are identical to Sample-Based Assignment in Section 4.1.1 with no extra calculations introduced
|
671 |
+
in this method.
|
672 |
+
4.2.3. Sample reduction
|
673 |
+
If a sample s is redundant in lower bounding, it implies that sample
|
674 |
+
s is not the “worst-case sample” corresponding to the maximum within-cluster distance. If a sample
|
675 |
+
s is redundant in upper bounding, then it means that sample s cannot be a center for any cluster. If
|
676 |
+
the sample s is redundant in both lower bounding and upper bounding, then removing this sample
|
677 |
+
will not affect the solution of this BB node and all its child BB nodes. Algorithm 5 describes the
|
678 |
+
procedure of sample reduction: first, obtain the redundant samples for lower and upper bounding
|
679 |
+
in each branch node; then, we can delete the samples that are redundant for both lower and upper
|
680 |
+
bounding in all the branch nodes. In our implementation, this sample reduction method is executed
|
681 |
+
for every isr iterations.
|
682 |
+
4.2.4. Effects on computation
|
683 |
+
Sample reduction can reduce the number of samples that
|
684 |
+
need to be explored by deleting redundant samples every isr iterations, as described in Algorithm
|
685 |
+
5. It can also accelerate the calculation of lower bounds and bounds tightening at each iteration.
|
686 |
+
For the lower bounding method in Section 3.1, we only need to solve the second-stage problems for
|
687 |
+
non-redundant samples that have been validated by the lower-bounding criterion in Section 4.2.1.
|
688 |
+
Additionally, once a sample is deemed redundant for lower bounding in a particular node, it will
|
689 |
+
remain redundant in all child nodes of that node. This means that we do not need to solve the
|
690 |
+
|
691 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
692 |
+
17
|
693 |
+
second-stage problem for this sample in the current node or any of its child nodes. For the bounds
|
694 |
+
tightening methods in Section 4.1.2, we only need to calculate the bounds based on non-redundant
|
695 |
+
samples that have been validated by the upper-bounding criterion in Section 4.2.2. Similarly, if
|
696 |
+
a sample is redundant for upper bounding in a node, it will remain redundant in all child nodes
|
697 |
+
of that node, and can be eliminated from the bounds tightening calculations in the current node
|
698 |
+
and its child nodes. In this way, sample reduction can not only delete redundant samples at every
|
699 |
+
isr iterations, but also eliminate redundant information in the current node and its child nodes,
|
700 |
+
thereby accelerating the overall calculation.
|
701 |
+
4.3. Parallelization
|
702 |
+
We also provide a parallel implementation of the whole algorithm to accelerate the solving process.
|
703 |
+
Since our algorithm is primarily executed at the sample level, like βs(M) in the lower bounding, we
|
704 |
+
can parallelize the algorithm by distributing the dataset to each process equally, then calculating
|
705 |
+
on each process with the local dataset and communicating the results as needed. The detailed
|
706 |
+
parallelization framework is shown in Figure 6. Here, the green modules represent the parallel
|
707 |
+
operations at each process, and the blue modules represent serial reduction operations. This par-
|
708 |
+
allelization framework is realized utilizing Message-Passing Interface (MPI) and MPI.jl by (Byrne
|
709 |
+
et al. 2021).
|
710 |
+
5. Convergence Analysis
|
711 |
+
As stated in Theorem 1, the branch-and-bound scheme for the K-center problem in Algorithm 1
|
712 |
+
converges to the global optimal solution after a finite step. In this section, we present the proof of
|
713 |
+
this theorem.
|
714 |
+
Specifically, the branch-and-bound scheme in Algorithm 1 branches on the region of centers, µ,
|
715 |
+
and generates a rooted tree with the search space M0 at the root node. For the child node at qth
|
716 |
+
level and lqth iteration, we denote the search space as Mlq. The search space of its child node is
|
717 |
+
denoted as Mlq+1 satisfying Mlq+1 ⊂ Mlq. We denote the decreasing sequence from the root node
|
718 |
+
|
719 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
720 |
+
18
|
721 |
+
with M0 to the child node with Mlq as {Mlq}. The search space of kth cluster center at Mlq is
|
722 |
+
denoted as M k
|
723 |
+
lq. Along the branch-and-bound process, we can obtain a monotonically non-ascending
|
724 |
+
upper bound sequence {αi} and a monotonically non-descending lower bound sequence {βi}.
|
725 |
+
In the following convergence analysis, we adapt the fundamental conclusions from (Horst and
|
726 |
+
Tuy 2013) to our algorithm. It should be noted that the convergence of the K-center problem
|
727 |
+
here is stronger than the convergence analysis in (Cao and Zavala 2019) for two-stage nonlinear
|
728 |
+
optimization problems or the convergence proof in (Hua et al. 2021) for K-means clustering prob-
|
729 |
+
lem. Both Cao and Zavala (2019) and Hua et al. (2021) guarantee the convergence in the sense of
|
730 |
+
lim
|
731 |
+
i→∞αi = lim
|
732 |
+
i→∞βi = z. They can only produce a global ϵ-optimal solution in a finite number of steps.
|
733 |
+
While for the K-center problem, the algorithm can obtain an exact optimal solution (e.g., ϵ = 0)
|
734 |
+
in a finite number of steps.
|
735 |
+
Definition 1. (Definition IV.3 (Horst and Tuy 2013)) A bounding operation is called finitely
|
736 |
+
consistent if, at every step, any unfathomed partition element can be further refined and if any
|
737 |
+
decreasing sequence {Mlq} successively refined partition elements is finite.
|
738 |
+
Lemma 3. The bounding operation in Algorithm 1 is finitely consistent.
|
739 |
+
Proof. Firstly, we prove that any unfathomed partition element Mlq can be further refined. Any
|
740 |
+
unfathomed Mlq satisfies two conditions: (1) ∃|X ∩ M k
|
741 |
+
lq| > 1,k ∈ K, and (2) αl − β(Mlq) > ϵ,ϵ > 0.
|
742 |
+
Obviously, there exists at least one partition to be further refined.
|
743 |
+
We then prove any decreasing sequences {Mlq} successively refined partition elements are finite.
|
744 |
+
Assuming by contradiction that a sequence {Mlq} is infinite. In our algorithm, since we branch
|
745 |
+
on the first-stage variable µ corresponding to the diameter of M, this subdivision is exhaustive.
|
746 |
+
Therefore, we have lim
|
747 |
+
q→∞δ(Mlq) = 0 and {Mlq} converge to one point ¯µ at each cluster, where δ(Mlq)
|
748 |
+
is the the diameter of set Mlq.
|
749 |
+
If this point ¯µ ∈ X, there exists a ball around ¯µ, denoted as Br(¯µ) = {µ | ||µ − ¯µ|| ≤ r}, fulfilling
|
750 |
+
|X ∩Br(¯µ)| = 1. There exists a level q0 that Mlq ⊂ Br(¯µ),∀q ≥ q0. At this lq0th iteration, according
|
751 |
+
to the terminal conditions |X ∩ M k
|
752 |
+
lq| = 1,∀k ∈ K, the partition elements Mlq0 will not be branched
|
753 |
+
|
754 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
755 |
+
19
|
756 |
+
anymore. Because the dataset X is finite, we have the sequence {Mlq} is finite in this case. If ¯µ ̸⊂ X,
|
757 |
+
there is a ball around ¯µ, denoted as Br(¯µ) = {µ | ||µ − ¯µ|| ≤ r}, satisfying |X ∩ Br(¯µ)| = 0. There
|
758 |
+
exists a level q0 that Mlq ⊂ Br(¯µ),∀q ≥ q0. At this lq0th iteration, Mlq0 will be deleted according to
|
759 |
+
the terminal conditions. Consequently, the sequence {Mlq} is also finite in this case. In conclusion,
|
760 |
+
it is impossible to exist a sequence {Mlq} that is infinite.
|
761 |
+
Theorem 2. (Theorem IV.1 (Horst and Tuy 2013)) In a BB procedure, suppose that the bounding
|
762 |
+
operation is finitely consistent. Then the procedure terminates after finitely many steps.
|
763 |
+
Lemma 4. Algorithm 1 terminates after finitely many steps.
|
764 |
+
Proof. From Lemma 3, the bounding operation in Algorithm 1 is finitely consistent. According to
|
765 |
+
Theorem 2, we have Algorithm 1 terminates after finitely many steps
|
766 |
+
Finally, we prove that the BB scheme for the K-center problem is convergent:
|
767 |
+
Theorem 1. Algorithm 1 is convergent to the global optimal solution after a finite step L, with
|
768 |
+
βL = z = αL, by only branching on the space of µ.
|
769 |
+
Proof. From Lemma 4, Algorithm 1 terminates after finite steps. The algorithm terminates with
|
770 |
+
two situations. The first situations is |βl − αl| ≤ ϵ,ϵ ≥ 0. When ϵ is set to be 0, we have βl = z = αl.
|
771 |
+
The second situation is the branch node set M = ∅. A branch node with M is deleted from M
|
772 |
+
and not further partitioned if it satisfies β(M) > αl or |X ∩ M k| = 1,∀k ∈ K. In the first case, it
|
773 |
+
is obvious that this branch node does not contain the global optimal solution µ∗. Therefore, the
|
774 |
+
branch node with M ′ containing the optimal solution µ∗ is not further partitioned because the
|
775 |
+
second case |X ∩ M ′k| = 1,∀k ∈ K. After bounds tightening according to the “centers on samples”
|
776 |
+
constraint, the tightened node M ′ = {µ∗}. Obviously for this tightened node, we have βl = β(M ′) =
|
777 |
+
z = α(M ′) = αl. In this way, we have proved Theorem 1.
|
778 |
+
6. Numerical Results
|
779 |
+
In this section, we report the detailed implementation of our algorithm and the numerical results
|
780 |
+
on synthetic and real-world datasets.
|
781 |
+
|
782 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
783 |
+
20
|
784 |
+
6.1. Implementation Details
|
785 |
+
We denote our tailored reduced-space branch and bound algorithm 1 with and without acceleration
|
786 |
+
techniques as BB+CF+BT and BB+CF correspondingly. All our algorithms are implemented in Julia,
|
787 |
+
and the parallel version is realized using Message Passing Interface through the MPI.jl module.
|
788 |
+
We compare the performance of our algorithm with the state-of-art global optimizer CPLEX 20.1.0
|
789 |
+
(Cplex 2020) and the heuristic algorithm, Farthest First Traversal (FFT) as shown in Algorithm
|
790 |
+
2. The initial points severely influence the results of FFT. Therefore, we execute FFT for 100 trails
|
791 |
+
with randomly selected initial points and report the best results. As for CPLEX, we use the
|
792 |
+
MINLP formulation 4 with the symmetry-breaking constraints to solve the K-center problem.
|
793 |
+
We executed all experiments on the high-performance computing cluster Niagara in the Digital
|
794 |
+
Research Alliance of Canada. Each computing node of the Niagara cluster has 40 Intel “Skylake”
|
795 |
+
cores and 188 GiB of RAM. For the global optimizer CPLEX and our algorithms, a time limit of
|
796 |
+
4 hours is set to compare the performance fairly and avoid unacceptable computational costs.
|
797 |
+
For our algorithms, there is also an optimality gap limit of 0.1%. The source code is available at
|
798 |
+
https://github.com/YankaiGroup/global_kcenter_extended.
|
799 |
+
In order to evaluate the performance extensively, we execute all the algorithms on both syn-
|
800 |
+
thetic and real-world datasets. The synthetic datasets are generated using Distributions.jl and
|
801 |
+
Random.jl modules in Julia. We generate the synthetic datasets with 3 Gaussian clusters, 2
|
802 |
+
attributes, and varying numbers of samples. As for the real-world datasets, we use 30 datasets
|
803 |
+
from the UCI Machine Learning Repository (Dua and Graff 2017), datasets Pr2392 from (Padberg
|
804 |
+
and Rinaldi 1991), Hemi from (Wang et al. 2022) and Taxi from (Schneider 2015). The number
|
805 |
+
of samples ranges from 150 to 1,120,841,769. The number of attributes ranges from 2 to 68. The
|
806 |
+
detailed characteristics of datasets can be found in the following result tables.
|
807 |
+
We report four criteria in the following result tables to compare the performance of algorithms:
|
808 |
+
upper bound (UB), optimality gap (Gap), the number of solved BB nodes (Nodes), and the run
|
809 |
+
time (Time). UB is the best objective value of the K-center Problem 1. Gap represents the relative
|
810 |
+
|
811 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
812 |
+
21
|
813 |
+
difference between the best lower bound (LB) and UB. It is defined as Gap = UB−LB
|
814 |
+
UB
|
815 |
+
× 100%.
|
816 |
+
The optimality gap is a unique property of the deterministic global optimization algorithm. The
|
817 |
+
heuristic algorithm (FFT) does not have this property. Nodes and Time are the iteration number
|
818 |
+
and the run time of the BB scheme from the beginning to the termination.
|
819 |
+
6.2. Serial Results on Synthetic Datasets
|
820 |
+
Table 1 reports the serial results of synthetic datasets with different numbers of samples and
|
821 |
+
different desired clusters (K = 3,5,10). Compared with the heuristic method FFT, our algorithm
|
822 |
+
BB+LD+BT can reduce UB by 29.4% average on these synthetic datasets. These results validate the
|
823 |
+
conclusion from Garcia-Diaz et al. (2019) that these 2-approximation heuristic algorithms perform
|
824 |
+
poorly in practice despite the solution quality guarantee.
|
825 |
+
As for the comparison of global optimizers, the direct usage of CPLEX on Problem 4 could not
|
826 |
+
converge to a small optimality gap≤ 0.1% within 4 hours on all the synthetic datasets. BB+LD with-
|
827 |
+
out acceleration techniques can obtain the small optimality gap≤ 0.1% within 4 hours on synthetic
|
828 |
+
datasets smaller than 42,000 samples with desired clusters K = 3. The algorithm BB+LD+BT can
|
829 |
+
obtain the best upper bounds and reach a satisfactory gap≤ 0.1% in most experiments within 4
|
830 |
+
hours. Moreover, compared with BB+LD, BB+LD+BT needs fewer nodes and less run time to obtain
|
831 |
+
the same optimality gap. For example, for the Syn-1200 dataset with K = 3, BB+LD need 1,155,375
|
832 |
+
nodes and 3609 seconds to reach a gap≤ 0.1%, while BB+LD+BT only needs 23 nodes and 13.5 sec-
|
833 |
+
onds. These comparisons between BB+LD and BB+LD+BT demonstrate the acceleration techniques in
|
834 |
+
Section 4 can significantly reduce the search space and accelerate the BB procedure.
|
835 |
+
6.3. Serial Results on Real-world datasets
|
836 |
+
Table 2, Table 3, and Table 4 show the serial results on real-world datasets with different sample
|
837 |
+
numbers and desired cluster numbers (K = 3,5,10). In these tables, we highlight the best results
|
838 |
+
among these algorithms with the optimality gap≤ 0.1%. These real-world results are consistent
|
839 |
+
with the results of synthetic datasets.
|
840 |
+
|
841 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
842 |
+
22
|
843 |
+
The best solutions generated by the heuristic method (FFT) can be far from optimal in these
|
844 |
+
tables, even for very small datasets. For example, for IRIS dataset, FFT obtains UB of 3.66 while
|
845 |
+
our algorithm and CPLEX give a UB of 2.04 with ≤ 0.1% gap. Compared with FFT, our algorithm
|
846 |
+
BB+CF+BT can averagely reduce the UB by 22.2% on these real-world datasets and 25.8% on all the
|
847 |
+
synthetic and real-world datasets. Even for experiments terminated with large gaps, in most cases,
|
848 |
+
BB+CF+BT can obtain a smaller UB than FFT.
|
849 |
+
For small datasets, our algorithms BB+CF and BB+CF+BT can obtain the same UB as CPLEX.
|
850 |
+
However, CPLEX needs significantly more run time and nodes than our algorithms. For all datasets
|
851 |
+
with more than 740 samples, CPLEX cannot even give an optimality gap≤ 50% within 4 hours. On
|
852 |
+
the contrary, BB+CF+BT can obtain the best UB and a satisfactory gap≤ 0.1% for most datasets.
|
853 |
+
The comparisons of the two versions of our algorithms BB+CF and BB+CF+BT demonstrate that
|
854 |
+
the acceleration techniques in Section 4 can significantly reduce the computational time and the
|
855 |
+
number of BB nodes to solve the problems. Remarkably, with these acceleration techniques, we
|
856 |
+
can even solve several datasets in the root node (Nodes=1), e.g., the datasets iris, HF, and SGC.
|
857 |
+
Besides, BB+CF+BT results with superscript 1 in these tables mean we can assign K farthest initial
|
858 |
+
seeds through FFT at the root node as described in Section 4.1.1. We can obtain the initial seeds
|
859 |
+
for about half of the datasets when K = 3. Moreover, the number of nodes is much smaller for the
|
860 |
+
datasets with initial seeds than the datasets without initial seeds. This phenomenon indicates the
|
861 |
+
initial seeds are essential for cluster assignment and bounds tightening since we need at least one
|
862 |
+
assigned sample at each cluster to execute the sample-based assignment.
|
863 |
+
For most of the datasets with millions of samples and K = 3 in Table 4, BB+CF+BT can converge
|
864 |
+
to a small gap≤ 0.1% and provide the best optimal solution after 4 hours of running. To the best
|
865 |
+
of our knowledge, it is the first time that the K-center problem is solved under a relatively small
|
866 |
+
gap≤ 0.1% within 4 hours on datasets over 14 million samples in the serial mode.
|
867 |
+
As a drawback, our algorithm BB+LD+BT still struggles to obtain a small optimality gap when the
|
868 |
+
desired number of clusters is larger than 3. However, it should be noted the state-of-art global opti-
|
869 |
+
mizer CPLEX cannot even solve any datasets to gap≤ 50% when K > 3. On the contrary, BB+LD+BT
|
870 |
+
|
871 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
872 |
+
23
|
873 |
+
can obtain gap≤ 0.1% on most datasets with less than 5 million samples and K = 5. Moreover, for
|
874 |
+
the cases when our algorithm BB+LD+BT cannot obtain a small optimality gap, it still gives the best
|
875 |
+
UB among all the algorithms in these experiments.
|
876 |
+
6.4. Parallel Results on Huge-scale Real-world datasets
|
877 |
+
To fully utilize the computational ability of high-performance clusters, we implement our algorithm
|
878 |
+
BB+CF+BT in a parallel manner as shown in Section 4.3. Here, we test the parallel algorithm on
|
879 |
+
datasets that couldn’t obtain a small gap≤ 0.1% for K = 3 within 4 hours in the serial mode,
|
880 |
+
including two datasets with ten million samples, HIGGS and BigCross. Moreover, we also extend
|
881 |
+
the experiments to a billion-scale dataset called Taxi. This billion-scale dataset contains over 1.1
|
882 |
+
billion individual taxi trips with 12 attributes in New York City from January 2009 through June
|
883 |
+
2015. We preprocess the Taxi dataset according to the analysis by Schneider (2015) to remove
|
884 |
+
outliers and missing values in the dataset. As an outcome shown in Table 5, the parallel version
|
885 |
+
of BB+CF+BT can reach a small optimality gap≤ 0.1% and a better UB on the datasets BigCross
|
886 |
+
and Taxi within 4 hours. For the dataset HIGGS, the parallel version achieves a smaller UB and
|
887 |
+
gap compared to the heuristic method and the serial version. As far as we know, this is the first
|
888 |
+
time that the K-center problem is solved under a relatively small gap≤ 0.1% within 4 hours on the
|
889 |
+
billion-scale dataset.
|
890 |
+
7. Conclusion
|
891 |
+
We propose a global optimization algorithm for the K-center problem using a tailored reduced
|
892 |
+
space branch and bound scheme. In this algorithm, we only need to branch on the region of cluster
|
893 |
+
centers to guarantee convergence to the global optimal solution in a finite step.
|
894 |
+
We give a two-stage decomposable formulation and an MINLP formulation of the K-center
|
895 |
+
problem. With this two-stage formulation, we develop a lower bound with closed-form solutions by
|
896 |
+
relaxing the non-anticipativity constraints and the “centers on sample” constraints. As an outcome,
|
897 |
+
the proposed bounding methods are extremely computationally efficient with no needs to solve any
|
898 |
+
optimization sub-problems using any optimizers.
|
899 |
+
|
900 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
901 |
+
24
|
902 |
+
Along with the BB procedure, we introduce several acceleration techniques based on the MINLP
|
903 |
+
formulation, including bounds tightening, and sample reduction. Numerical experiments show these
|
904 |
+
acceleration techniques can significantly reduce the search space and accelerate the solving pro-
|
905 |
+
cedure. Moreover, we also give a parallel implementation of our algorithm to fully utilize the
|
906 |
+
computational power of modern high performance clusters.
|
907 |
+
Extensive numerical experiments have been conducted on synthetic and real-world datasets.
|
908 |
+
These results exhibit the efficiency of our algorithm: we can solve the real-world datasets with up
|
909 |
+
to ten million samples in the serial mode and one billion samples in the parallel mode to a
|
910 |
+
small optimality gap (≤0.1%) within 4 hours.
|
911 |
+
Finally, we also declare that our algorithm is promised to extend to deal with certain constrained
|
912 |
+
versions of K-center problems. For example, the capacitated restricted version, absolute and vertex
|
913 |
+
restricted version (Calik 2013). We are interested in developing these variants in future work.
|
914 |
+
Acknowledgments
|
915 |
+
The authors acknowledge funding from the discovery program of the Natural Science and Engineering
|
916 |
+
Research Council of Canada under grant RGPIN-2019-05499 and the computing resources provided by SciNet
|
917 |
+
(www.scinethpc.ca) and Digital Research Alliance of Canada (www.alliancecan.ca). Jiayang Ren acknowl-
|
918 |
+
edges the financial support from the China Scholarship Council.
|
919 |
+
References
|
920 |
+
Aggarwal CC, Wolf JL, Yu PSl (2004) Method for targeted advertising on the web based on accumulated
|
921 |
+
self-learning data, clustering users and semantic node graph techniques. US Patent 6,714,975.
|
922 |
+
Aloise D, Contardo C (2018) A sampling-based exact algorithm for the solution of the minimax diameter
|
923 |
+
clustering problem. Journal of Global Optimization 71(3):613–630.
|
924 |
+
Brusco MJ, Stahl S (2005) Branch-and-Bound Applications in Combinatorial Data Analysis (New York:
|
925 |
+
Springer).
|
926 |
+
Byrne S, Wilcox LC, Churavy V (2021) MPI.jl: Julia bindings for the Message Passing Interface. Proceedings
|
927 |
+
of the JuliaCon Conferences 1(1):68.
|
928 |
+
|
929 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
930 |
+
25
|
931 |
+
Calik H (2013) Exact Solution Methodologies for the P-Center Problem under Single and Multiple Allocation
|
932 |
+
Strategies. Theses, Bilkent University.
|
933 |
+
Cao Y, Zavala VM (2019) A scalable global optimization algorithm for stochastic nonlinear programs. Journal
|
934 |
+
of Global Optimization 75(2):393–416.
|
935 |
+
Chen D, Chen R (2009) New relaxation-based algorithms for the optimal solution of the continuous and
|
936 |
+
discrete p-center problems. Computers & Operations Research 36(5):1646–1655.
|
937 |
+
Chen R, Handler GY (1987) Relaxation method for the solution of the minimax location-allocation problem
|
938 |
+
in euclidean space. Naval Research Logistics (NRL) 34(6):775–788.
|
939 |
+
Contardo C, Iori M, Kramer R (2019) A scalable exact algorithm for the vertex p-center problem. Computers
|
940 |
+
& Operations Research 103:211–220.
|
941 |
+
Cook W, Lovasz L, Seymour P, eds. (1995) Combinatorial Optimization. DIMACS Series in Discrete Mathe-
|
942 |
+
matics and Theoretical Computer Science (Providence, Rhode Island: American Mathematical Society).
|
943 |
+
Cplex II (2020) V20.1.0: User’s Manual for CPLEX. International Business Machines Corporation .
|
944 |
+
Dao TBH, Duong KC, Vrain C (2013) A declarative framework for constrained clustering. Machine Learning
|
945 |
+
and Knowledge Discovery in Databases, volume 8190, 419–434.
|
946 |
+
Daskin MS (2000) A new approach to solving the vertex p-center problem to optimality: Algorithm and
|
947 |
+
computational results. Communications of the Operations Research Society of Japan 45(9):428–436.
|
948 |
+
Davidovi´c T, Ramljak D, ˇSelmi´c M, Teodorovi´c D (2011) Bee colony optimization for the p-center problem.
|
949 |
+
Computers and Operations Research 38(10):1367–1376.
|
950 |
+
Dua D, Graff C (2017) UCI machine learning repository. URL http://archive.ics.uci.edu/ml.
|
951 |
+
Duong KC, Vrain C, et al. (2017) Constrained clustering by constraint programming. Artificial Intelligence
|
952 |
+
244:70–94.
|
953 |
+
Dyer ME, Frieze AM (1985) A simple heuristic for the p-centre problem. Operations Research Letters
|
954 |
+
3(6):285–288.
|
955 |
+
Elloumi S, Labb´e M, Pochet Y (2004) A new formulation and resolution method for the p-center problem.
|
956 |
+
INFORMS Journal on Computing 16(1):84–94.
|
957 |
+
|
958 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
959 |
+
26
|
960 |
+
Garcia-Diaz J, Menchaca-Mendez R, Menchaca-Mendez R, Pomares Hern´andez S, P´erez-Sansalvador JC,
|
961 |
+
Lakouari N (2019) Approximation algorithms for the vertex K-Center problem: survey and experimental
|
962 |
+
evaluation. IEEE Access 7:109228–109245.
|
963 |
+
Garcia-Diaz J, Sanchez-Hernandez J, Menchaca-Mendez R, Menchaca-Mendez R (2017) When a worse
|
964 |
+
approximation factor gives better performance: a 3-approximation algorithm for the vertex k-center
|
965 |
+
problem. Journal of Heuristics 23(5):349–366.
|
966 |
+
Garey M, Johnson D (1979) Computers and Intractability: A Guide to the Theory of NP-Completeness (New
|
967 |
+
York: W. H. Freeman).
|
968 |
+
Gonzalez TF (1985) Clustering to minimize the maximum intercluster distance. Theoretical Computer Sci-
|
969 |
+
ence 38:293–306.
|
970 |
+
Hansen P, Brimberg J, Uroˇsevi´c D, Mladenovi´c N (2009) Solving large p-median clustering problems by
|
971 |
+
primal–dual variable neighborhood search. Data Mining and Knowledge Discovery 19(3):351–375.
|
972 |
+
Hesabi ZR, Tari Z, Goscinski A, Fahad A, Khalil I, Queiroz C (2015) Data summarization techniques for
|
973 |
+
big data—a survey. Handbook on Data Centers, 1109–1152.
|
974 |
+
Hochbaum DS, Shmoys DB (1985) A best possible heuristic for the K-Center problem. Mathematics of
|
975 |
+
Operations Research 10(2):180–184.
|
976 |
+
Horst R, Tuy H (2013) Global optimization: Deterministic approaches (Springer Science & Business Media).
|
977 |
+
Hua K, Shi M, Cao Y (2021) A scalable deterministic global optimization algorithm for clustering problems.
|
978 |
+
International Conference on Machine Learning, 4391–4401.
|
979 |
+
Ilhan T, Pinar MC (2001) An efficient exact algorithm for the vertex p-center problem. Preprint.[Online].
|
980 |
+
Available: http://www.ie.bilkent.edu.tr/mustafap/pubs .
|
981 |
+
Kaufman L, Rousseeuw PJ (2009) Finding Groups in Data: an Introduction to Cluster Analysis (John Wiley
|
982 |
+
& Sons).
|
983 |
+
Kleindessner M, Awasthi P, Morgenstern J (2019) Fair k-center clustering for data summarization. Interna-
|
984 |
+
tional Conference on Machine Learning, 3448–3457.
|
985 |
+
Lim A, Rodrigues B, Wang F, Xu Z (2005) K-Center problems with minimum coverage. Theoretical Computer
|
986 |
+
Science 332(1):1–17.
|
987 |
+
|
988 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
989 |
+
27
|
990 |
+
Miheliˇc J, Robic B (2005) Solving the k-center problem efficiently with a dominating set algorithm. Journal
|
991 |
+
of computing and information technology 13:225–234.
|
992 |
+
Minieka E (1970) The m-Center Problem. SIAM Review 12(01).
|
993 |
+
Mladenovi´c N, Labb´e M, Hansen P (2003) Solving the p-Center problem with Tabu search and variable
|
994 |
+
neighborhood Search. Networks 42(1):48–64.
|
995 |
+
Padberg M, Rinaldi G (1991) A branch-and-cut algorithm for the resolution of large-scale symmetric traveling
|
996 |
+
salesman problems. SIAM review 33(1):60–100.
|
997 |
+
Plesn´ık J (1987) A heuristic for the p-center problems in graphs. Discrete Applied Mathematics 17(3):263–
|
998 |
+
268.
|
999 |
+
Pullan W (2008) A memetic genetic algorithm for the vertex p-center problem. Evolutionary Computation
|
1000 |
+
16(3):417–436.
|
1001 |
+
Schneider T (2015) Analyzing 1.1 billion NYC taxi and uber trips with a vengeance. URL https://
|
1002 |
+
toddwschneider.com/posts/analyzing-1-1-billion-nyc-taxi-and-uber-trips-with-a-vengeance/.
|
1003 |
+
Shi M, Hua K, Ren J, Cao Y (2022) Global optimization of K-Center clustering. Proceedings of the 39th
|
1004 |
+
International Conference on Machine Learning, 19956–19966.
|
1005 |
+
Wang E, Cai G, Ballachay R, Cao Y, Trajano HL (2022) Predicting xylose yield in prehydrolysis of hard-
|
1006 |
+
woods: a machine learning approach. Frontiers in Chemical Engineering 84.
|
1007 |
+
|
1008 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
1009 |
+
28
|
1010 |
+
Table 1
|
1011 |
+
Serial results on synthetic datasets
|
1012 |
+
Dataset
|
1013 |
+
Sam
|
1014 |
+
ple
|
1015 |
+
Dimen
|
1016 |
+
sion
|
1017 |
+
Method
|
1018 |
+
K=3
|
1019 |
+
K=5
|
1020 |
+
K=10
|
1021 |
+
UB
|
1022 |
+
Nodes
|
1023 |
+
Gap
|
1024 |
+
(%)
|
1025 |
+
Time
|
1026 |
+
(s)
|
1027 |
+
UB
|
1028 |
+
Nodes
|
1029 |
+
Gap
|
1030 |
+
(%)
|
1031 |
+
Time
|
1032 |
+
(s)
|
1033 |
+
UB
|
1034 |
+
Nodes
|
1035 |
+
Gap
|
1036 |
+
(%)
|
1037 |
+
Time
|
1038 |
+
(s)
|
1039 |
+
Syn-300
|
1040 |
+
3.0E+2
|
1041 |
+
2
|
1042 |
+
FFT
|
1043 |
+
69.68
|
1044 |
+
-
|
1045 |
+
-
|
1046 |
+
-
|
1047 |
+
43.33
|
1048 |
+
-
|
1049 |
+
-
|
1050 |
+
-
|
1051 |
+
21.88
|
1052 |
+
-
|
1053 |
+
-
|
1054 |
+
-
|
1055 |
+
CPLEX
|
1056 |
+
61.75
|
1057 |
+
2.9E+4
|
1058 |
+
≤0.1
|
1059 |
+
29
|
1060 |
+
37.14
|
1061 |
+
2.3E+7
|
1062 |
+
19.4
|
1063 |
+
4h
|
1064 |
+
16.06
|
1065 |
+
1.2E+7
|
1066 |
+
100.0
|
1067 |
+
4h
|
1068 |
+
BB+CF
|
1069 |
+
61.75
|
1070 |
+
5.5E+4
|
1071 |
+
≤0.1
|
1072 |
+
46
|
1073 |
+
37.14
|
1074 |
+
2.3E+6
|
1075 |
+
16.2
|
1076 |
+
4h
|
1077 |
+
15.64
|
1078 |
+
1.7E+6
|
1079 |
+
100.0
|
1080 |
+
4h
|
1081 |
+
BB+CF+BT
|
1082 |
+
61.75
|
1083 |
+
17
|
1084 |
+
≤0.1
|
1085 |
+
13
|
1086 |
+
37.14
|
1087 |
+
1,764
|
1088 |
+
≤0.1
|
1089 |
+
15
|
1090 |
+
12.31 2.0E+4 ≤0.1
|
1091 |
+
38
|
1092 |
+
Syn-1200
|
1093 |
+
1.2E+3
|
1094 |
+
2
|
1095 |
+
FFT
|
1096 |
+
93.34
|
1097 |
+
-
|
1098 |
+
-
|
1099 |
+
-
|
1100 |
+
58.46
|
1101 |
+
-
|
1102 |
+
-
|
1103 |
+
-
|
1104 |
+
30.49
|
1105 |
+
-
|
1106 |
+
-
|
1107 |
+
-
|
1108 |
+
CPLEX
|
1109 |
+
84.81
|
1110 |
+
5.8E+6
|
1111 |
+
1.6
|
1112 |
+
4h
|
1113 |
+
34.29
|
1114 |
+
3.5E+6
|
1115 |
+
7.8
|
1116 |
+
4h
|
1117 |
+
89.32
|
1118 |
+
8.1E+5
|
1119 |
+
100.0
|
1120 |
+
4h
|
1121 |
+
BB+CF
|
1122 |
+
84.81
|
1123 |
+
1.2E+6
|
1124 |
+
≤0.1
|
1125 |
+
3,609
|
1126 |
+
34.29
|
1127 |
+
1.4E+6
|
1128 |
+
12.5
|
1129 |
+
4h
|
1130 |
+
21.81
|
1131 |
+
1.0E+6
|
1132 |
+
100.0
|
1133 |
+
4h
|
1134 |
+
BB+CF+BT
|
1135 |
+
84.81
|
1136 |
+
23
|
1137 |
+
≤0.11
|
1138 |
+
14
|
1139 |
+
34.29
|
1140 |
+
411
|
1141 |
+
≤0.1
|
1142 |
+
15
|
1143 |
+
14.51 3.0E+4 ≤0.1
|
1144 |
+
148
|
1145 |
+
Syn-2100
|
1146 |
+
2.1E+3
|
1147 |
+
2
|
1148 |
+
FFT
|
1149 |
+
106.50
|
1150 |
+
-
|
1151 |
+
-
|
1152 |
+
-
|
1153 |
+
72.70
|
1154 |
+
-
|
1155 |
+
-
|
1156 |
+
-
|
1157 |
+
36.04
|
1158 |
+
-
|
1159 |
+
-
|
1160 |
+
-
|
1161 |
+
CPLEX
|
1162 |
+
95.10
|
1163 |
+
3.0E+6
|
1164 |
+
0.2
|
1165 |
+
4h
|
1166 |
+
49.32
|
1167 |
+
1.3E+6
|
1168 |
+
100.0
|
1169 |
+
4h
|
1170 |
+
193.26
|
1171 |
+
3.4E+5
|
1172 |
+
100.0
|
1173 |
+
4h
|
1174 |
+
BB+CF
|
1175 |
+
95.10
|
1176 |
+
1.5E+6
|
1177 |
+
≤0.1
|
1178 |
+
11,606
|
1179 |
+
42.58
|
1180 |
+
1.0E+6
|
1181 |
+
20.8
|
1182 |
+
4h
|
1183 |
+
25.78
|
1184 |
+
5.3E+5
|
1185 |
+
100.0
|
1186 |
+
4h
|
1187 |
+
BB+CF+BT
|
1188 |
+
95.10
|
1189 |
+
17
|
1190 |
+
≤0.11
|
1191 |
+
13
|
1192 |
+
42.58
|
1193 |
+
455
|
1194 |
+
≤0.1
|
1195 |
+
16
|
1196 |
+
17.65 8.9E+4 ≤0.1
|
1197 |
+
725
|
1198 |
+
Syn-42000
|
1199 |
+
4.2E+4
|
1200 |
+
2
|
1201 |
+
FFT
|
1202 |
+
161.98
|
1203 |
+
-
|
1204 |
+
-
|
1205 |
+
-
|
1206 |
+
96.12
|
1207 |
+
-
|
1208 |
+
-
|
1209 |
+
-
|
1210 |
+
47.21
|
1211 |
+
-
|
1212 |
+
-
|
1213 |
+
-
|
1214 |
+
CPLEX
|
1215 |
+
No feasible solution
|
1216 |
+
No feasible solution
|
1217 |
+
No feasible solution
|
1218 |
+
BB+CF
|
1219 |
+
142.33
|
1220 |
+
1.7E+5
|
1221 |
+
6.7
|
1222 |
+
4h
|
1223 |
+
63.40
|
1224 |
+
1.0E+5
|
1225 |
+
28.1
|
1226 |
+
4h
|
1227 |
+
44.24
|
1228 |
+
5.4E+4
|
1229 |
+
100.0
|
1230 |
+
4h
|
1231 |
+
BB+CF+BT 142.33
|
1232 |
+
103
|
1233 |
+
≤0.1
|
1234 |
+
21
|
1235 |
+
62.77 5.0E+3 ≤0.1
|
1236 |
+
363
|
1237 |
+
28.29
|
1238 |
+
5.8E+4
|
1239 |
+
36.1
|
1240 |
+
4h
|
1241 |
+
Syn-210000 2.1E+5
|
1242 |
+
2
|
1243 |
+
FFT
|
1244 |
+
175.81
|
1245 |
+
-
|
1246 |
+
-
|
1247 |
+
-
|
1248 |
+
120.78
|
1249 |
+
-
|
1250 |
+
-
|
1251 |
+
-
|
1252 |
+
66.79
|
1253 |
+
-
|
1254 |
+
-
|
1255 |
+
-
|
1256 |
+
CPLEX
|
1257 |
+
No feasible solution
|
1258 |
+
No feasible solution
|
1259 |
+
No feasible solution
|
1260 |
+
BB+CF
|
1261 |
+
168.57
|
1262 |
+
4.4E+4
|
1263 |
+
7.0
|
1264 |
+
4h
|
1265 |
+
77.02
|
1266 |
+
2.5E+4
|
1267 |
+
43.8
|
1268 |
+
4h
|
1269 |
+
53.73
|
1270 |
+
1.4E+4
|
1271 |
+
100.0
|
1272 |
+
4h
|
1273 |
+
BB+CF+BT 168.57
|
1274 |
+
5
|
1275 |
+
≤0.11
|
1276 |
+
21
|
1277 |
+
71.88 2.4E+3 ≤0.1 1,118
|
1278 |
+
44.48
|
1279 |
+
1.2E+4
|
1280 |
+
72.2
|
1281 |
+
4h
|
1282 |
+
1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
|
1283 |
+
|
1284 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
1285 |
+
29
|
1286 |
+
Table 2
|
1287 |
+
Serial results on small-scale datasets (S ≤ 1,000)
|
1288 |
+
Dataset
|
1289 |
+
Sam
|
1290 |
+
ple
|
1291 |
+
Dimen
|
1292 |
+
sion
|
1293 |
+
Method
|
1294 |
+
K=3
|
1295 |
+
K=5
|
1296 |
+
K=10
|
1297 |
+
UB
|
1298 |
+
Nodes
|
1299 |
+
Gap
|
1300 |
+
(%)
|
1301 |
+
Time
|
1302 |
+
(s)
|
1303 |
+
UB
|
1304 |
+
Nodes
|
1305 |
+
Gap
|
1306 |
+
(%)
|
1307 |
+
Time
|
1308 |
+
(s)
|
1309 |
+
UB
|
1310 |
+
Nodes
|
1311 |
+
Gap
|
1312 |
+
(%)
|
1313 |
+
Time
|
1314 |
+
(s)
|
1315 |
+
iris
|
1316 |
+
150
|
1317 |
+
4
|
1318 |
+
FFT
|
1319 |
+
2.65
|
1320 |
+
-
|
1321 |
+
-
|
1322 |
+
-
|
1323 |
+
1.80
|
1324 |
+
-
|
1325 |
+
-
|
1326 |
+
-
|
1327 |
+
0.95
|
1328 |
+
-
|
1329 |
+
-
|
1330 |
+
-
|
1331 |
+
CPLEX
|
1332 |
+
2.04
|
1333 |
+
1.2E+5
|
1334 |
+
≤0.1
|
1335 |
+
46
|
1336 |
+
1.54
|
1337 |
+
2.8E+6
|
1338 |
+
60.0
|
1339 |
+
4h
|
1340 |
+
1.21
|
1341 |
+
1.4E+7
|
1342 |
+
100.0
|
1343 |
+
4h
|
1344 |
+
BB+CF
|
1345 |
+
2.04
|
1346 |
+
1.3E+4
|
1347 |
+
≤0.1
|
1348 |
+
17
|
1349 |
+
1.20
|
1350 |
+
3.1E+6
|
1351 |
+
≤0.1
|
1352 |
+
5,472
|
1353 |
+
0.74
|
1354 |
+
2.2E+6
|
1355 |
+
100.0
|
1356 |
+
4h
|
1357 |
+
BB+CF+BT
|
1358 |
+
2.04
|
1359 |
+
1
|
1360 |
+
≤0.11
|
1361 |
+
12
|
1362 |
+
1.20
|
1363 |
+
409
|
1364 |
+
≤0.1
|
1365 |
+
14
|
1366 |
+
0.66
|
1367 |
+
9.6E+5
|
1368 |
+
25.8
|
1369 |
+
4h
|
1370 |
+
seeds
|
1371 |
+
210
|
1372 |
+
7
|
1373 |
+
FFT
|
1374 |
+
13.17
|
1375 |
+
-
|
1376 |
+
-
|
1377 |
+
-
|
1378 |
+
9.01
|
1379 |
+
-
|
1380 |
+
-
|
1381 |
+
-
|
1382 |
+
4.48
|
1383 |
+
-
|
1384 |
+
-
|
1385 |
+
-
|
1386 |
+
CPLEX
|
1387 |
+
10.44
|
1388 |
+
1.2E+6
|
1389 |
+
≤0.1
|
1390 |
+
542
|
1391 |
+
11.61
|
1392 |
+
2.5E+6
|
1393 |
+
96.1
|
1394 |
+
4h
|
1395 |
+
21.48
|
1396 |
+
5.6E+5
|
1397 |
+
100.0
|
1398 |
+
4h
|
1399 |
+
BB+CF
|
1400 |
+
10.44
|
1401 |
+
7.2E+3
|
1402 |
+
≤0.1
|
1403 |
+
17
|
1404 |
+
7.22
|
1405 |
+
2.7E+6
|
1406 |
+
8.3
|
1407 |
+
4h
|
1408 |
+
3.51
|
1409 |
+
1.5E+6
|
1410 |
+
100.0
|
1411 |
+
4h
|
1412 |
+
BB+CF+BT
|
1413 |
+
10.44
|
1414 |
+
21
|
1415 |
+
≤0.11
|
1416 |
+
13
|
1417 |
+
7.22
|
1418 |
+
1,444
|
1419 |
+
≤0.1
|
1420 |
+
15
|
1421 |
+
2.92
|
1422 |
+
2.1E+5 ≤0.1
|
1423 |
+
569
|
1424 |
+
glass
|
1425 |
+
214
|
1426 |
+
9
|
1427 |
+
FFT
|
1428 |
+
27.52
|
1429 |
+
-
|
1430 |
+
-
|
1431 |
+
-
|
1432 |
+
22.28
|
1433 |
+
-
|
1434 |
+
-
|
1435 |
+
-
|
1436 |
+
11.73
|
1437 |
+
-
|
1438 |
+
-
|
1439 |
+
-
|
1440 |
+
CPLEX
|
1441 |
+
Out of memory
|
1442 |
+
Out of memory
|
1443 |
+
Out of memory
|
1444 |
+
BB+CF
|
1445 |
+
27.52
|
1446 |
+
5.6E+3
|
1447 |
+
≤0.1
|
1448 |
+
15
|
1449 |
+
16.44
|
1450 |
+
9.7E+5
|
1451 |
+
≤0.1
|
1452 |
+
1,522
|
1453 |
+
10.64
|
1454 |
+
1.4E+6
|
1455 |
+
100.0
|
1456 |
+
4h
|
1457 |
+
BB+CF+BT
|
1458 |
+
27.52
|
1459 |
+
191
|
1460 |
+
≤0.1
|
1461 |
+
13
|
1462 |
+
16.44
|
1463 |
+
4.4E+3
|
1464 |
+
≤0.1
|
1465 |
+
17
|
1466 |
+
7.95
|
1467 |
+
1.7E+6 ≤0.1 9,180
|
1468 |
+
BM
|
1469 |
+
249
|
1470 |
+
6
|
1471 |
+
FFT
|
1472 |
+
1.52E+04
|
1473 |
+
-
|
1474 |
+
-
|
1475 |
+
-
|
1476 |
+
1.12E+04
|
1477 |
+
-
|
1478 |
+
-
|
1479 |
+
-
|
1480 |
+
5.33E+03
|
1481 |
+
-
|
1482 |
+
-
|
1483 |
+
-
|
1484 |
+
CPLEX
|
1485 |
+
No feasible solution
|
1486 |
+
1.48E+04
|
1487 |
+
8.8E+6
|
1488 |
+
100.0
|
1489 |
+
4h
|
1490 |
+
1.63E+04
|
1491 |
+
2.4E+6
|
1492 |
+
100.0
|
1493 |
+
4h
|
1494 |
+
BB+CF
|
1495 |
+
1.05E+04
|
1496 |
+
1.4E+4
|
1497 |
+
≤0.1
|
1498 |
+
22
|
1499 |
+
6.32E+03
|
1500 |
+
2.2E+6
|
1501 |
+
12.0
|
1502 |
+
4h
|
1503 |
+
5.01E+03
|
1504 |
+
1.4E+6
|
1505 |
+
100.0
|
1506 |
+
4h
|
1507 |
+
BB+CF+BT 1.05E+04
|
1508 |
+
63
|
1509 |
+
≤0.11
|
1510 |
+
13
|
1511 |
+
6.32E+03 1.8E+4
|
1512 |
+
≤0.1
|
1513 |
+
29
|
1514 |
+
4.98E+03
|
1515 |
+
6.7E+5
|
1516 |
+
97.9
|
1517 |
+
4h
|
1518 |
+
UK
|
1519 |
+
258
|
1520 |
+
5
|
1521 |
+
FFT
|
1522 |
+
0.70
|
1523 |
+
-
|
1524 |
+
-
|
1525 |
+
-
|
1526 |
+
0.57
|
1527 |
+
-
|
1528 |
+
-
|
1529 |
+
-
|
1530 |
+
0.42
|
1531 |
+
-
|
1532 |
+
-
|
1533 |
+
-
|
1534 |
+
CPLEX
|
1535 |
+
Out of memory
|
1536 |
+
Out of memory
|
1537 |
+
Out of memory
|
1538 |
+
BB+CF
|
1539 |
+
0.53
|
1540 |
+
3.2E+5
|
1541 |
+
≤0.1
|
1542 |
+
258
|
1543 |
+
0.43
|
1544 |
+
1.5E+6
|
1545 |
+
43.9
|
1546 |
+
4h
|
1547 |
+
0.33
|
1548 |
+
1.4E+6
|
1549 |
+
100.0
|
1550 |
+
4h
|
1551 |
+
BB+CF+BT
|
1552 |
+
0.53
|
1553 |
+
1.6E+4
|
1554 |
+
≤0.1
|
1555 |
+
23
|
1556 |
+
0.43
|
1557 |
+
8.9E+5
|
1558 |
+
26.9
|
1559 |
+
4h
|
1560 |
+
0.31
|
1561 |
+
6.1E+5
|
1562 |
+
97.3
|
1563 |
+
4h
|
1564 |
+
HF
|
1565 |
+
299
|
1566 |
+
12
|
1567 |
+
FFT
|
1568 |
+
2.69E+10
|
1569 |
+
-
|
1570 |
+
-
|
1571 |
+
-
|
1572 |
+
1.17E+10
|
1573 |
+
-
|
1574 |
+
-
|
1575 |
+
-
|
1576 |
+
1.68E+09
|
1577 |
+
-
|
1578 |
+
-
|
1579 |
+
-
|
1580 |
+
CPLEX
|
1581 |
+
No feasible solution
|
1582 |
+
No feasible solution
|
1583 |
+
No feasible solution
|
1584 |
+
BB+CF
|
1585 |
+
1.72E+10
|
1586 |
+
339
|
1587 |
+
≤0.1
|
1588 |
+
10
|
1589 |
+
1.02E+10
|
1590 |
+
2.1E+4
|
1591 |
+
≤0.1
|
1592 |
+
44
|
1593 |
+
1.52E+09
|
1594 |
+
3.4E+6
|
1595 |
+
100.0
|
1596 |
+
4h
|
1597 |
+
BB+CF+BT 1.72E+10
|
1598 |
+
1
|
1599 |
+
≤0.11
|
1600 |
+
12
|
1601 |
+
1.02E+10
|
1602 |
+
557
|
1603 |
+
≤0.1
|
1604 |
+
14
|
1605 |
+
1.44E+09
|
1606 |
+
1.2E+6
|
1607 |
+
53.2
|
1608 |
+
4h
|
1609 |
+
Who
|
1610 |
+
440
|
1611 |
+
8
|
1612 |
+
FFT
|
1613 |
+
4.58E+09
|
1614 |
+
-
|
1615 |
+
-
|
1616 |
+
-
|
1617 |
+
3.18E+09
|
1618 |
+
-
|
1619 |
+
-
|
1620 |
+
-
|
1621 |
+
9.81E+08
|
1622 |
+
-
|
1623 |
+
-
|
1624 |
+
-
|
1625 |
+
CPLEX
|
1626 |
+
No feasible solution
|
1627 |
+
No feasible solution
|
1628 |
+
No feasible solution
|
1629 |
+
BB+CF
|
1630 |
+
3.49E+09
|
1631 |
+
3.4E+3
|
1632 |
+
≤0.1
|
1633 |
+
15
|
1634 |
+
2.11E+09
|
1635 |
+
1.7E+5
|
1636 |
+
≤0.1
|
1637 |
+
341
|
1638 |
+
9.27E+08
|
1639 |
+
1.5E+6
|
1640 |
+
100.0
|
1641 |
+
4h
|
1642 |
+
BB+CF+BT 3.49E+09
|
1643 |
+
375
|
1644 |
+
≤0.1
|
1645 |
+
14
|
1646 |
+
2.11E+09 2.3E+3
|
1647 |
+
≤0.1
|
1648 |
+
16
|
1649 |
+
8.21E+08
|
1650 |
+
8.4E+5
|
1651 |
+
62.0
|
1652 |
+
4h
|
1653 |
+
HCV
|
1654 |
+
602
|
1655 |
+
12
|
1656 |
+
FFT
|
1657 |
+
1.75E+05
|
1658 |
+
-
|
1659 |
+
-
|
1660 |
+
-
|
1661 |
+
8.38E+04
|
1662 |
+
-
|
1663 |
+
-
|
1664 |
+
-
|
1665 |
+
3.03E+04
|
1666 |
+
-
|
1667 |
+
-
|
1668 |
+
-
|
1669 |
+
CPLEX
|
1670 |
+
1.41E+05
|
1671 |
+
9.5E+5
|
1672 |
+
≤0.1
|
1673 |
+
3,720
|
1674 |
+
8.73E+04
|
1675 |
+
5.1E+5
|
1676 |
+
100.0
|
1677 |
+
4h
|
1678 |
+
4.47E+04
|
1679 |
+
3.8E+5
|
1680 |
+
100.0
|
1681 |
+
4h
|
1682 |
+
BB+CF
|
1683 |
+
1.41E+05
|
1684 |
+
291
|
1685 |
+
≤0.1
|
1686 |
+
10
|
1687 |
+
6.37E+04
|
1688 |
+
2.2E+4
|
1689 |
+
≤0.1
|
1690 |
+
76
|
1691 |
+
2.36E+04
|
1692 |
+
1.4E+6
|
1693 |
+
100.0
|
1694 |
+
4h
|
1695 |
+
BB+CF+BT 1.41E+05
|
1696 |
+
39
|
1697 |
+
≤0.1
|
1698 |
+
13
|
1699 |
+
6.37E+04
|
1700 |
+
583
|
1701 |
+
≤0.1
|
1702 |
+
15
|
1703 |
+
2.16E+04 7.6E+5 ≤0.1 6,300
|
1704 |
+
Abs
|
1705 |
+
740
|
1706 |
+
21
|
1707 |
+
FFT
|
1708 |
+
1.94E+04
|
1709 |
+
-
|
1710 |
+
-
|
1711 |
+
-
|
1712 |
+
1.19E+04
|
1713 |
+
-
|
1714 |
+
-
|
1715 |
+
-
|
1716 |
+
7.81E+03
|
1717 |
+
-
|
1718 |
+
-
|
1719 |
+
-
|
1720 |
+
CPLEX
|
1721 |
+
1.72E+04
|
1722 |
+
9.3E+5
|
1723 |
+
52.0
|
1724 |
+
4h
|
1725 |
+
3.02E+04
|
1726 |
+
1.7E+4
|
1727 |
+
100.0
|
1728 |
+
4h
|
1729 |
+
No feasible solution
|
1730 |
+
BB+CF
|
1731 |
+
1.39E+04
|
1732 |
+
3.3E+4
|
1733 |
+
≤0.1
|
1734 |
+
153
|
1735 |
+
9.93E+03
|
1736 |
+
1.5E+6
|
1737 |
+
18.9
|
1738 |
+
4h
|
1739 |
+
6.15E+03
|
1740 |
+
9.8E+5
|
1741 |
+
100.0
|
1742 |
+
4h
|
1743 |
+
BB+CF+BT 1.39E+04
|
1744 |
+
611
|
1745 |
+
≤0.1
|
1746 |
+
15
|
1747 |
+
9.92E+03 5.0E+4
|
1748 |
+
≤0.1
|
1749 |
+
178
|
1750 |
+
6.37E+03
|
1751 |
+
4.6E+5
|
1752 |
+
98.3
|
1753 |
+
4h
|
1754 |
+
TR
|
1755 |
+
980
|
1756 |
+
10
|
1757 |
+
FFT
|
1758 |
+
7.32
|
1759 |
+
-
|
1760 |
+
-
|
1761 |
+
-
|
1762 |
+
6.42
|
1763 |
+
-
|
1764 |
+
-
|
1765 |
+
-
|
1766 |
+
4.41
|
1767 |
+
-
|
1768 |
+
-
|
1769 |
+
-
|
1770 |
+
CPLEX
|
1771 |
+
8.32
|
1772 |
+
1.6E+6
|
1773 |
+
54.5
|
1774 |
+
4h
|
1775 |
+
7.82
|
1776 |
+
2.0E+5
|
1777 |
+
100.0
|
1778 |
+
4h
|
1779 |
+
8.70
|
1780 |
+
3.3E+4
|
1781 |
+
100.0
|
1782 |
+
4h
|
1783 |
+
BB+CF
|
1784 |
+
5.94
|
1785 |
+
7.4E+5
|
1786 |
+
≤0.1
|
1787 |
+
2,953
|
1788 |
+
4.49
|
1789 |
+
1.3E+6
|
1790 |
+
47.7
|
1791 |
+
4h
|
1792 |
+
3.69
|
1793 |
+
9.8E+5
|
1794 |
+
100.0
|
1795 |
+
4h
|
1796 |
+
BB+CF+BT
|
1797 |
+
5.94
|
1798 |
+
3.3E+4
|
1799 |
+
≤0.1
|
1800 |
+
83
|
1801 |
+
4.49
|
1802 |
+
1.0E+6
|
1803 |
+
24.6
|
1804 |
+
4h
|
1805 |
+
3.73
|
1806 |
+
5.0E+5
|
1807 |
+
99.9
|
1808 |
+
4h
|
1809 |
+
SGC
|
1810 |
+
1,000
|
1811 |
+
21
|
1812 |
+
FFT
|
1813 |
+
1.33E+07
|
1814 |
+
-
|
1815 |
+
-
|
1816 |
+
-
|
1817 |
+
4.08E+06
|
1818 |
+
-
|
1819 |
+
-
|
1820 |
+
-
|
1821 |
+
9.50E+05
|
1822 |
+
-
|
1823 |
+
-
|
1824 |
+
-
|
1825 |
+
CPLEX
|
1826 |
+
9.45E+06
|
1827 |
+
5.0E+4
|
1828 |
+
100.0
|
1829 |
+
4h
|
1830 |
+
1.56E+08
|
1831 |
+
10
|
1832 |
+
100.0
|
1833 |
+
4h
|
1834 |
+
No feasible solution
|
1835 |
+
BB+CF
|
1836 |
+
9.45E+06
|
1837 |
+
411
|
1838 |
+
≤0.1
|
1839 |
+
12
|
1840 |
+
3.91E+06
|
1841 |
+
2.8E+4
|
1842 |
+
≤0.1
|
1843 |
+
185
|
1844 |
+
9.50E+05
|
1845 |
+
9.6E+5
|
1846 |
+
100.0
|
1847 |
+
4h
|
1848 |
+
BB+CF+BT 9.45E+06
|
1849 |
+
1
|
1850 |
+
≤0.11
|
1851 |
+
12
|
1852 |
+
3.91E+06
|
1853 |
+
1
|
1854 |
+
≤0.11
|
1855 |
+
12
|
1856 |
+
9.50E+05
|
1857 |
+
5.8E+5
|
1858 |
+
100.0
|
1859 |
+
4h
|
1860 |
+
1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
|
1861 |
+
|
1862 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
1863 |
+
30
|
1864 |
+
Table 3
|
1865 |
+
Serial results on large-scale datasets (1,000<S<1,000,000)
|
1866 |
+
Dataset
|
1867 |
+
Sam
|
1868 |
+
ple
|
1869 |
+
Dimen
|
1870 |
+
sion
|
1871 |
+
Method
|
1872 |
+
K=3
|
1873 |
+
K=5
|
1874 |
+
K=10
|
1875 |
+
UB
|
1876 |
+
Nodes
|
1877 |
+
Gap
|
1878 |
+
(%)
|
1879 |
+
Time
|
1880 |
+
(s)
|
1881 |
+
UB
|
1882 |
+
Nodes
|
1883 |
+
Gap
|
1884 |
+
(%)
|
1885 |
+
Time
|
1886 |
+
(s)
|
1887 |
+
UB
|
1888 |
+
Nodes
|
1889 |
+
Gap
|
1890 |
+
(%)
|
1891 |
+
Time
|
1892 |
+
(s)
|
1893 |
+
hemi
|
1894 |
+
1,955
|
1895 |
+
7
|
1896 |
+
FFT
|
1897 |
+
1.06E+05
|
1898 |
+
-
|
1899 |
+
-
|
1900 |
+
-
|
1901 |
+
3.31E+04
|
1902 |
+
-
|
1903 |
+
-
|
1904 |
+
-
|
1905 |
+
1.42E+04
|
1906 |
+
-
|
1907 |
+
-
|
1908 |
+
-
|
1909 |
+
CPLEX
|
1910 |
+
4.08E+05
|
1911 |
+
1.4E+5
|
1912 |
+
100.0
|
1913 |
+
4h
|
1914 |
+
4.08E+05
|
1915 |
+
1.2E+5
|
1916 |
+
100.0
|
1917 |
+
4h
|
1918 |
+
4.08E+05
|
1919 |
+
5
|
1920 |
+
100.0
|
1921 |
+
4h
|
1922 |
+
BB+CF
|
1923 |
+
4.08E+05
|
1924 |
+
1.4E+5
|
1925 |
+
50.0
|
1926 |
+
4h
|
1927 |
+
2.18E+04
|
1928 |
+
6.8E+5
|
1929 |
+
≤0.1
|
1930 |
+
4,212
|
1931 |
+
1.42E+04
|
1932 |
+
7.1E+5 100.0
|
1933 |
+
4h
|
1934 |
+
BB+CF+BT 6.49E+04
|
1935 |
+
11
|
1936 |
+
≤0.11
|
1937 |
+
14
|
1938 |
+
2.18E+04
|
1939 |
+
158
|
1940 |
+
≤0.1
|
1941 |
+
14
|
1942 |
+
7.20E+03 8.2E+3 ≤0.1
|
1943 |
+
89
|
1944 |
+
pr2392
|
1945 |
+
2,392
|
1946 |
+
2
|
1947 |
+
FFT
|
1948 |
+
3.75E+07
|
1949 |
+
-
|
1950 |
+
-
|
1951 |
+
-
|
1952 |
+
2.11E+07
|
1953 |
+
-
|
1954 |
+
-
|
1955 |
+
-
|
1956 |
+
1.02E+07
|
1957 |
+
-
|
1958 |
+
-
|
1959 |
+
-
|
1960 |
+
CPLEX
|
1961 |
+
6.51E+07
|
1962 |
+
2.1E+5
|
1963 |
+
100.0
|
1964 |
+
4h
|
1965 |
+
5.66E+07
|
1966 |
+
3.6E+4
|
1967 |
+
100.0
|
1968 |
+
4h
|
1969 |
+
4.23E+07
|
1970 |
+
4.8E+4 100.0
|
1971 |
+
4h
|
1972 |
+
BB+CF
|
1973 |
+
2.93E+07
|
1974 |
+
5.9E+4
|
1975 |
+
≤0.1
|
1976 |
+
297
|
1977 |
+
1.52E+07
|
1978 |
+
8.3E+5
|
1979 |
+
20.9
|
1980 |
+
4h
|
1981 |
+
1.02E+07
|
1982 |
+
6.0E+5 100.0
|
1983 |
+
4h
|
1984 |
+
BB+CF+BT 2.93E+07
|
1985 |
+
207
|
1986 |
+
≤0.1
|
1987 |
+
15
|
1988 |
+
1.46E+07 6.6E+3 ≤0.1
|
1989 |
+
45
|
1990 |
+
8.70E+06
|
1991 |
+
4.2E+5
|
1992 |
+
59.6
|
1993 |
+
4h
|
1994 |
+
TRR
|
1995 |
+
5,454
|
1996 |
+
24
|
1997 |
+
FFT
|
1998 |
+
101.55
|
1999 |
+
-
|
2000 |
+
-
|
2001 |
+
-
|
2002 |
+
95.26
|
2003 |
+
-
|
2004 |
+
-
|
2005 |
+
-
|
2006 |
+
86.87
|
2007 |
+
-
|
2008 |
+
-
|
2009 |
+
-
|
2010 |
+
CPLEX
|
2011 |
+
166.61
|
2012 |
+
1
|
2013 |
+
100.0
|
2014 |
+
4h
|
2015 |
+
No feasible solution
|
2016 |
+
No feasible solution
|
2017 |
+
BB+CF
|
2018 |
+
89.78
|
2019 |
+
3.6E+5
|
2020 |
+
73.1
|
2021 |
+
4h
|
2022 |
+
85.07
|
2023 |
+
2.7E+5
|
2024 |
+
100.0
|
2025 |
+
4h
|
2026 |
+
78.53
|
2027 |
+
1.7E+5 100.0
|
2028 |
+
4h
|
2029 |
+
BB+CF+BT
|
2030 |
+
88.30
|
2031 |
+
2.8E+5
|
2032 |
+
64.2
|
2033 |
+
4h
|
2034 |
+
84.80
|
2035 |
+
2.0E+5
|
2036 |
+
100.0
|
2037 |
+
4h
|
2038 |
+
77.37
|
2039 |
+
1.3E+5 100.0
|
2040 |
+
4h
|
2041 |
+
AC
|
2042 |
+
7,195
|
2043 |
+
22
|
2044 |
+
FFT
|
2045 |
+
3.59
|
2046 |
+
-
|
2047 |
+
-
|
2048 |
+
-
|
2049 |
+
2.79
|
2050 |
+
-
|
2051 |
+
-
|
2052 |
+
-
|
2053 |
+
2.28
|
2054 |
+
-
|
2055 |
+
-
|
2056 |
+
-
|
2057 |
+
CPLEX
|
2058 |
+
No feasible solution
|
2059 |
+
No feasible solution
|
2060 |
+
No feasible solution
|
2061 |
+
BB+CF
|
2062 |
+
2.75
|
2063 |
+
3.1E+5
|
2064 |
+
42.6
|
2065 |
+
4h
|
2066 |
+
2.26
|
2067 |
+
2.3E+5
|
2068 |
+
72.0
|
2069 |
+
4h
|
2070 |
+
2.14
|
2071 |
+
1.4E+5 100.0
|
2072 |
+
4h
|
2073 |
+
BB+CF+BT
|
2074 |
+
2.78
|
2075 |
+
2.7E+5
|
2076 |
+
38.9
|
2077 |
+
4h
|
2078 |
+
2.26
|
2079 |
+
1.8E+5
|
2080 |
+
70.2
|
2081 |
+
4h
|
2082 |
+
1.90
|
2083 |
+
1.2E+5 100.0
|
2084 |
+
4h
|
2085 |
+
rds cnt
|
2086 |
+
10,000
|
2087 |
+
4
|
2088 |
+
FFT
|
2089 |
+
1.93E+04
|
2090 |
+
-
|
2091 |
+
-
|
2092 |
+
-
|
2093 |
+
5.93E+03
|
2094 |
+
-
|
2095 |
+
-
|
2096 |
+
-
|
2097 |
+
1.44E+03
|
2098 |
+
-
|
2099 |
+
-
|
2100 |
+
-
|
2101 |
+
CPLEX
|
2102 |
+
6.86E+04
|
2103 |
+
3.2E+4
|
2104 |
+
100.0
|
2105 |
+
4h
|
2106 |
+
No feasible solution
|
2107 |
+
No feasible solution
|
2108 |
+
BB+CF
|
2109 |
+
1.39E+04
|
2110 |
+
639
|
2111 |
+
≤0.1
|
2112 |
+
25
|
2113 |
+
4.90E+03
|
2114 |
+
1.6E+5
|
2115 |
+
≤0.1
|
2116 |
+
6,048
|
2117 |
+
1.44E+03
|
2118 |
+
1.8E+5 100.0
|
2119 |
+
4h
|
2120 |
+
BB+CF+BT 1.39E+04
|
2121 |
+
1
|
2122 |
+
≤0.11
|
2123 |
+
12
|
2124 |
+
4.90E+03
|
2125 |
+
107
|
2126 |
+
≤0.11
|
2127 |
+
16
|
2128 |
+
1.44E+03
|
2129 |
+
1.8E+5 100.0
|
2130 |
+
4h
|
2131 |
+
HTRU2
|
2132 |
+
17,898
|
2133 |
+
8
|
2134 |
+
FFT
|
2135 |
+
7.11E+04
|
2136 |
+
-
|
2137 |
+
-
|
2138 |
+
-
|
2139 |
+
3.36E+04
|
2140 |
+
-
|
2141 |
+
-
|
2142 |
+
-
|
2143 |
+
1.37E+04
|
2144 |
+
-
|
2145 |
+
-
|
2146 |
+
-
|
2147 |
+
CPLEX
|
2148 |
+
No feasible solution
|
2149 |
+
No feasible solution
|
2150 |
+
No feasible solution
|
2151 |
+
BB+CF
|
2152 |
+
5.24E+04
|
2153 |
+
1.1E+4
|
2154 |
+
≤0.1
|
2155 |
+
627
|
2156 |
+
2.12E+04
|
2157 |
+
2.1E+5
|
2158 |
+
14.4
|
2159 |
+
4h
|
2160 |
+
1.37E+04
|
2161 |
+
9.6E+4 100.0
|
2162 |
+
4h
|
2163 |
+
BB+CF+BT 5.24E+04
|
2164 |
+
25
|
2165 |
+
≤0.11
|
2166 |
+
15
|
2167 |
+
2.09E+04 5.1E+3 ≤0.1
|
2168 |
+
282
|
2169 |
+
1.37E+04
|
2170 |
+
7.9E+4
|
2171 |
+
99.5
|
2172 |
+
4h
|
2173 |
+
GT
|
2174 |
+
36,733
|
2175 |
+
11
|
2176 |
+
FFT
|
2177 |
+
4.57E+03
|
2178 |
+
-
|
2179 |
+
-
|
2180 |
+
-
|
2181 |
+
4.00E+03
|
2182 |
+
-
|
2183 |
+
-
|
2184 |
+
-
|
2185 |
+
2.59E+03
|
2186 |
+
-
|
2187 |
+
-
|
2188 |
+
-
|
2189 |
+
CPLEX
|
2190 |
+
No feasible solution
|
2191 |
+
No feasible solution
|
2192 |
+
No feasible solution
|
2193 |
+
BB+CF
|
2194 |
+
3.07E+03
|
2195 |
+
1.4E+5
|
2196 |
+
27.6
|
2197 |
+
4h
|
2198 |
+
2.83E+03
|
2199 |
+
8.2E+4
|
2200 |
+
62.2
|
2201 |
+
4h
|
2202 |
+
2.35E+03
|
2203 |
+
4.7E+4 100.0
|
2204 |
+
4h
|
2205 |
+
BB+CF+BT 2.98E+03 2.1E+4 ≤0.1 2,053 2.81E+03
|
2206 |
+
6.3E+4
|
2207 |
+
60.9
|
2208 |
+
4h
|
2209 |
+
2.29E+03
|
2210 |
+
4.0E+4 100.0
|
2211 |
+
4h
|
2212 |
+
rds
|
2213 |
+
50,000
|
2214 |
+
3
|
2215 |
+
FFT
|
2216 |
+
0.11
|
2217 |
+
-
|
2218 |
+
-
|
2219 |
+
-
|
2220 |
+
0.06
|
2221 |
+
-
|
2222 |
+
-
|
2223 |
+
-
|
2224 |
+
0.03
|
2225 |
+
-
|
2226 |
+
-
|
2227 |
+
-
|
2228 |
+
CPLEX
|
2229 |
+
No feasible solution
|
2230 |
+
No feasible solution
|
2231 |
+
No feasible solution
|
2232 |
+
BB+CF
|
2233 |
+
0.08
|
2234 |
+
1.3E+5
|
2235 |
+
4.8
|
2236 |
+
4h
|
2237 |
+
0.05
|
2238 |
+
8.5E+4
|
2239 |
+
26.2
|
2240 |
+
4h
|
2241 |
+
0.03
|
2242 |
+
4.4E+4 100.0
|
2243 |
+
4h
|
2244 |
+
BB+CF+BT
|
2245 |
+
0.08
|
2246 |
+
719
|
2247 |
+
≤0.1
|
2248 |
+
16
|
2249 |
+
0.05
|
2250 |
+
3.6E+4 ≤0.1 3,429
|
2251 |
+
0.02
|
2252 |
+
4.1E+4 100.0
|
2253 |
+
4h
|
2254 |
+
KEGG
|
2255 |
+
53,413
|
2256 |
+
23
|
2257 |
+
FFT
|
2258 |
+
6.20E+06
|
2259 |
+
-
|
2260 |
+
-
|
2261 |
+
-
|
2262 |
+
1.70E+06
|
2263 |
+
-
|
2264 |
+
-
|
2265 |
+
-
|
2266 |
+
2.13E+05
|
2267 |
+
-
|
2268 |
+
-
|
2269 |
+
-
|
2270 |
+
CPLEX
|
2271 |
+
Out of memory
|
2272 |
+
No feasible solution
|
2273 |
+
No feasible solution
|
2274 |
+
BB+CF
|
2275 |
+
4.98E+06
|
2276 |
+
87
|
2277 |
+
≤0.1
|
2278 |
+
41
|
2279 |
+
7.58E+05
|
2280 |
+
5.8E+3
|
2281 |
+
≤0.1
|
2282 |
+
2,416
|
2283 |
+
2.13E+05
|
2284 |
+
2.3E+4 100.0
|
2285 |
+
4h
|
2286 |
+
BB+CF+BT 4.98E+06
|
2287 |
+
1
|
2288 |
+
≤0.11
|
2289 |
+
13
|
2290 |
+
7.58E+05
|
2291 |
+
1
|
2292 |
+
≤0.11
|
2293 |
+
14
|
2294 |
+
2.04E+05
|
2295 |
+
3.0E+4 100.0
|
2296 |
+
4h
|
2297 |
+
rng agr
|
2298 |
+
199,843
|
2299 |
+
7
|
2300 |
+
FFT
|
2301 |
+
4.68E+10
|
2302 |
+
-
|
2303 |
+
-
|
2304 |
+
-
|
2305 |
+
1.61E+10
|
2306 |
+
-
|
2307 |
+
-
|
2308 |
+
-
|
2309 |
+
7.47E+09
|
2310 |
+
-
|
2311 |
+
-
|
2312 |
+
-
|
2313 |
+
CPLEX
|
2314 |
+
Out of memory
|
2315 |
+
No feasible solution
|
2316 |
+
No feasible solution
|
2317 |
+
BB+CF
|
2318 |
+
3.16E+10
|
2319 |
+
3.7E+4
|
2320 |
+
4.8
|
2321 |
+
4h
|
2322 |
+
1.37E+10
|
2323 |
+
2.0E+4
|
2324 |
+
35.4
|
2325 |
+
4h
|
2326 |
+
7.47E+09
|
2327 |
+
1.2E+4 100.0
|
2328 |
+
4h
|
2329 |
+
BB+CF+BT 3.14E+10 2.3E+3 ≤0.11
|
2330 |
+
239
|
2331 |
+
1.20E+10 2.0E+4 ≤0.11 3,330 7.02E+09
|
2332 |
+
9.1E+3 100.0
|
2333 |
+
4h
|
2334 |
+
urbanGB 360,177
|
2335 |
+
2
|
2336 |
+
FFT
|
2337 |
+
7.63
|
2338 |
+
-
|
2339 |
+
-
|
2340 |
+
-
|
2341 |
+
5.62
|
2342 |
+
-
|
2343 |
+
-
|
2344 |
+
-
|
2345 |
+
2.81
|
2346 |
+
-
|
2347 |
+
-
|
2348 |
+
-
|
2349 |
+
CPLEX
|
2350 |
+
Out of memory
|
2351 |
+
No feasible solution
|
2352 |
+
No feasible solution
|
2353 |
+
BB+CF
|
2354 |
+
5.48
|
2355 |
+
1.6E+4
|
2356 |
+
≤0.1 10,713
|
2357 |
+
4.48
|
2358 |
+
1.5E+4
|
2359 |
+
59.1
|
2360 |
+
4h
|
2361 |
+
2.81
|
2362 |
+
7.7E+3 100.0
|
2363 |
+
4h
|
2364 |
+
BB+CF+BT
|
2365 |
+
5.48
|
2366 |
+
171
|
2367 |
+
≤0.11
|
2368 |
+
66
|
2369 |
+
3.86
|
2370 |
+
3.0E+3 ≤0.1 2,710
|
2371 |
+
2.60
|
2372 |
+
6.3E+3
|
2373 |
+
92.6
|
2374 |
+
4h
|
2375 |
+
spnet3D 434,876
|
2376 |
+
3
|
2377 |
+
FFT
|
2378 |
+
822.03
|
2379 |
+
-
|
2380 |
+
-
|
2381 |
+
-
|
2382 |
+
256.87
|
2383 |
+
-
|
2384 |
+
-
|
2385 |
+
-
|
2386 |
+
68.19
|
2387 |
+
-
|
2388 |
+
-
|
2389 |
+
-
|
2390 |
+
CPLEX
|
2391 |
+
Out of memory
|
2392 |
+
No feasible solution
|
2393 |
+
No feasible solution
|
2394 |
+
BB+CF
|
2395 |
+
569.91
|
2396 |
+
2.2E+4
|
2397 |
+
0.3
|
2398 |
+
4h
|
2399 |
+
216.25
|
2400 |
+
1.3E+4
|
2401 |
+
16.8
|
2402 |
+
4h
|
2403 |
+
68.19
|
2404 |
+
6.2E+3 100.0
|
2405 |
+
4h
|
2406 |
+
BB+CF+BT
|
2407 |
+
569.80
|
2408 |
+
85
|
2409 |
+
≤0.11
|
2410 |
+
28
|
2411 |
+
205.89
|
2412 |
+
3.5E+3 ≤0.11
|
2413 |
+
661
|
2414 |
+
68.19
|
2415 |
+
4.6E+3 100.0
|
2416 |
+
4h
|
2417 |
+
1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
|
2418 |
+
|
2419 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
2420 |
+
31
|
2421 |
+
Table 4
|
2422 |
+
Serial results on datasets with millions of samples
|
2423 |
+
Dataset
|
2424 |
+
Sam
|
2425 |
+
ple
|
2426 |
+
Dimen
|
2427 |
+
sion
|
2428 |
+
Method
|
2429 |
+
K=3
|
2430 |
+
K=5
|
2431 |
+
K=10
|
2432 |
+
UB
|
2433 |
+
Nodes
|
2434 |
+
Gap
|
2435 |
+
(%)
|
2436 |
+
Time
|
2437 |
+
(s)
|
2438 |
+
UB
|
2439 |
+
Nodes
|
2440 |
+
Gap
|
2441 |
+
(%)
|
2442 |
+
Time
|
2443 |
+
(s)
|
2444 |
+
UB
|
2445 |
+
Nodes
|
2446 |
+
Gap
|
2447 |
+
(%)
|
2448 |
+
Time
|
2449 |
+
(s)
|
2450 |
+
USC1990 2,458,285
|
2451 |
+
68
|
2452 |
+
FFT
|
2453 |
+
2.04E+11
|
2454 |
+
-
|
2455 |
+
-
|
2456 |
+
-
|
2457 |
+
7.47E+10
|
2458 |
+
-
|
2459 |
+
-
|
2460 |
+
-
|
2461 |
+
1.87E+10
|
2462 |
+
-
|
2463 |
+
-
|
2464 |
+
-
|
2465 |
+
CPLEX
|
2466 |
+
No feasible solution
|
2467 |
+
No feasible solution
|
2468 |
+
No feasible solution
|
2469 |
+
BB+CF
|
2470 |
+
1.69E+11
|
2471 |
+
916
|
2472 |
+
3.6
|
2473 |
+
4h
|
2474 |
+
7.47E+10
|
2475 |
+
352
|
2476 |
+
100.0
|
2477 |
+
4h
|
2478 |
+
1.87E+10
|
2479 |
+
168
|
2480 |
+
100.0
|
2481 |
+
4h
|
2482 |
+
BB+CF+BT 1.68E+11
|
2483 |
+
1
|
2484 |
+
≤0.11
|
2485 |
+
277
|
2486 |
+
6.05E+10
|
2487 |
+
256
|
2488 |
+
≤0.11 1,781
|
2489 |
+
1.87E+10
|
2490 |
+
396
|
2491 |
+
61.0
|
2492 |
+
4h
|
2493 |
+
Gas
|
2494 |
+
methane
|
2495 |
+
4,178,504
|
2496 |
+
18
|
2497 |
+
FFT
|
2498 |
+
1.31E+08
|
2499 |
+
-
|
2500 |
+
-
|
2501 |
+
-
|
2502 |
+
1.17E+08
|
2503 |
+
-
|
2504 |
+
-
|
2505 |
+
-
|
2506 |
+
6.95E+07
|
2507 |
+
-
|
2508 |
+
-
|
2509 |
+
-
|
2510 |
+
CPLEX
|
2511 |
+
No feasible solution
|
2512 |
+
No feasible solution
|
2513 |
+
No feasible solution
|
2514 |
+
BB+CF
|
2515 |
+
1.04E+08 1.2E+3
|
2516 |
+
31.1
|
2517 |
+
4h
|
2518 |
+
8.82E+07
|
2519 |
+
488
|
2520 |
+
100.0
|
2521 |
+
4h
|
2522 |
+
6.95E+07
|
2523 |
+
244
|
2524 |
+
100.0
|
2525 |
+
4h
|
2526 |
+
BB+CF+BT 1.02E+08
|
2527 |
+
65
|
2528 |
+
≤0.11 1,272 7.21E+07
|
2529 |
+
807
|
2530 |
+
19.9
|
2531 |
+
4h
|
2532 |
+
6.95E+07
|
2533 |
+
410
|
2534 |
+
100.0
|
2535 |
+
4h
|
2536 |
+
Gas
|
2537 |
+
CO
|
2538 |
+
4,208,261
|
2539 |
+
18
|
2540 |
+
FFT
|
2541 |
+
8.83E+08
|
2542 |
+
-
|
2543 |
+
-
|
2544 |
+
-
|
2545 |
+
5.17E+08
|
2546 |
+
-
|
2547 |
+
-
|
2548 |
+
-
|
2549 |
+
2.05E+08
|
2550 |
+
-
|
2551 |
+
-
|
2552 |
+
-
|
2553 |
+
CPLEX
|
2554 |
+
No feasible solution
|
2555 |
+
No feasible solution
|
2556 |
+
No feasible solution
|
2557 |
+
BB+CF
|
2558 |
+
5.66E+08 1.1E+3
|
2559 |
+
12.8
|
2560 |
+
4h
|
2561 |
+
4.09E+08
|
2562 |
+
449
|
2563 |
+
100.0
|
2564 |
+
4h
|
2565 |
+
2.05E+08
|
2566 |
+
241
|
2567 |
+
100.0
|
2568 |
+
4h
|
2569 |
+
BB+CF+BT 5.46E+08
|
2570 |
+
66
|
2571 |
+
≤0.1 1,053 2.80E+08
|
2572 |
+
670
|
2573 |
+
≤0.1
|
2574 |
+
9,612
|
2575 |
+
2.05E+08
|
2576 |
+
398
|
2577 |
+
100.0
|
2578 |
+
4h
|
2579 |
+
kddcup
|
2580 |
+
4,898,431
|
2581 |
+
38
|
2582 |
+
FFT
|
2583 |
+
4.71E+17
|
2584 |
+
-
|
2585 |
+
-
|
2586 |
+
-
|
2587 |
+
9.71E+16
|
2588 |
+
-
|
2589 |
+
-
|
2590 |
+
-
|
2591 |
+
5.96E+14
|
2592 |
+
-
|
2593 |
+
-
|
2594 |
+
-
|
2595 |
+
CPLEX
|
2596 |
+
No feasible solution
|
2597 |
+
No feasible solution
|
2598 |
+
No feasible solution
|
2599 |
+
BB+CF
|
2600 |
+
2.25E+17
|
2601 |
+
63
|
2602 |
+
≤0.1
|
2603 |
+
2,461
|
2604 |
+
4.73E+16
|
2605 |
+
229
|
2606 |
+
100.0
|
2607 |
+
4h
|
2608 |
+
5.96E+14
|
2609 |
+
124
|
2610 |
+
100.0
|
2611 |
+
4h
|
2612 |
+
BB+CF+BT 2.25E+17
|
2613 |
+
37
|
2614 |
+
≤0.1
|
2615 |
+
958
|
2616 |
+
4.73E+16
|
2617 |
+
417
|
2618 |
+
≤0.1 10,116 2.58E+14
|
2619 |
+
1
|
2620 |
+
≤0.11 586
|
2621 |
+
HIGGS
|
2622 |
+
11,000,000
|
2623 |
+
29
|
2624 |
+
FFT
|
2625 |
+
368.35
|
2626 |
+
-
|
2627 |
+
-
|
2628 |
+
-
|
2629 |
+
320.91
|
2630 |
+
-
|
2631 |
+
-
|
2632 |
+
-
|
2633 |
+
198.71
|
2634 |
+
-
|
2635 |
+
-
|
2636 |
+
-
|
2637 |
+
CPLEX
|
2638 |
+
No feasible solution
|
2639 |
+
No feasible solution
|
2640 |
+
No feasible solution
|
2641 |
+
BB+CF
|
2642 |
+
247.03
|
2643 |
+
368
|
2644 |
+
67.9
|
2645 |
+
4h
|
2646 |
+
249.45
|
2647 |
+
210
|
2648 |
+
100.0
|
2649 |
+
4h
|
2650 |
+
198.71
|
2651 |
+
98
|
2652 |
+
100.0
|
2653 |
+
4h
|
2654 |
+
BB+CF+BT
|
2655 |
+
237.91
|
2656 |
+
290
|
2657 |
+
65.5
|
2658 |
+
4h
|
2659 |
+
235.68
|
2660 |
+
185
|
2661 |
+
100.0
|
2662 |
+
4h
|
2663 |
+
198.71
|
2664 |
+
100
|
2665 |
+
100.0
|
2666 |
+
4h
|
2667 |
+
BigCross 11,620,300
|
2668 |
+
56
|
2669 |
+
FFT
|
2670 |
+
1.43E+07
|
2671 |
+
-
|
2672 |
+
-
|
2673 |
+
-
|
2674 |
+
7.54E+06
|
2675 |
+
-
|
2676 |
+
-
|
2677 |
+
-
|
2678 |
+
4.24E+06
|
2679 |
+
-
|
2680 |
+
-
|
2681 |
+
-
|
2682 |
+
CPLEX
|
2683 |
+
No feasible solution
|
2684 |
+
No feasible solution
|
2685 |
+
No feasible solution
|
2686 |
+
BB+CF
|
2687 |
+
1.09E+07
|
2688 |
+
148
|
2689 |
+
32.9
|
2690 |
+
4h
|
2691 |
+
7.54E+06
|
2692 |
+
122
|
2693 |
+
100.0
|
2694 |
+
4h
|
2695 |
+
4.24E+06
|
2696 |
+
66
|
2697 |
+
100.0
|
2698 |
+
4h
|
2699 |
+
BB+CF+BT
|
2700 |
+
9.97E+06
|
2701 |
+
211
|
2702 |
+
19.7
|
2703 |
+
4h
|
2704 |
+
7.54E+06
|
2705 |
+
135
|
2706 |
+
100.0
|
2707 |
+
4h
|
2708 |
+
4.24E+06
|
2709 |
+
66
|
2710 |
+
100.0
|
2711 |
+
4h
|
2712 |
+
Phones
|
2713 |
+
acceler
|
2714 |
+
ometer
|
2715 |
+
13,062,475
|
2716 |
+
6
|
2717 |
+
FFT
|
2718 |
+
2.04E+28
|
2719 |
+
-
|
2720 |
+
-
|
2721 |
+
-
|
2722 |
+
1.09E+28
|
2723 |
+
-
|
2724 |
+
-
|
2725 |
+
-
|
2726 |
+
3.89E+26
|
2727 |
+
-
|
2728 |
+
-
|
2729 |
+
-
|
2730 |
+
CPLEX
|
2731 |
+
No feasible solution
|
2732 |
+
No feasible solution
|
2733 |
+
No feasible solution
|
2734 |
+
BB+CF
|
2735 |
+
1.46E+28
|
2736 |
+
51
|
2737 |
+
≤0.1
|
2738 |
+
2,038
|
2739 |
+
6.17E+27
|
2740 |
+
303
|
2741 |
+
100.0
|
2742 |
+
4h
|
2743 |
+
3.89E+26
|
2744 |
+
148
|
2745 |
+
100.0
|
2746 |
+
4h
|
2747 |
+
BB+CF+BT 1.46E+28
|
2748 |
+
-
|
2749 |
+
≤0.11
|
2750 |
+
309
|
2751 |
+
6.17E+27
|
2752 |
+
354
|
2753 |
+
100.0
|
2754 |
+
4h
|
2755 |
+
3.89E+26
|
2756 |
+
154
|
2757 |
+
100.0
|
2758 |
+
4h
|
2759 |
+
Phones
|
2760 |
+
gyro
|
2761 |
+
scope
|
2762 |
+
13,932,632
|
2763 |
+
6
|
2764 |
+
FFT
|
2765 |
+
1.51E+28
|
2766 |
+
-
|
2767 |
+
-
|
2768 |
+
-
|
2769 |
+
1.09E+28
|
2770 |
+
-
|
2771 |
+
-
|
2772 |
+
-
|
2773 |
+
2.61E+26
|
2774 |
+
-
|
2775 |
+
-
|
2776 |
+
-
|
2777 |
+
CPLEX
|
2778 |
+
No feasible solution
|
2779 |
+
No feasible solution
|
2780 |
+
No feasible solution
|
2781 |
+
BB+CF
|
2782 |
+
1.46E+28
|
2783 |
+
51
|
2784 |
+
≤0.1
|
2785 |
+
2,195
|
2786 |
+
6.18E+27
|
2787 |
+
286
|
2788 |
+
100.0
|
2789 |
+
4h
|
2790 |
+
2.61E+26
|
2791 |
+
136
|
2792 |
+
100.0
|
2793 |
+
4h
|
2794 |
+
BB+CF+BT 1.46E+28
|
2795 |
+
1
|
2796 |
+
≤0.11
|
2797 |
+
294
|
2798 |
+
6.18E+27
|
2799 |
+
330
|
2800 |
+
100.0
|
2801 |
+
4h
|
2802 |
+
2.61E+26
|
2803 |
+
140
|
2804 |
+
100.0
|
2805 |
+
4h
|
2806 |
+
AADP
|
2807 |
+
14,057,567
|
2808 |
+
3
|
2809 |
+
FFT
|
2810 |
+
3.82E+03
|
2811 |
+
-
|
2812 |
+
-
|
2813 |
+
-
|
2814 |
+
2.98E+03
|
2815 |
+
-
|
2816 |
+
-
|
2817 |
+
-
|
2818 |
+
1.90E+03
|
2819 |
+
-
|
2820 |
+
-
|
2821 |
+
-
|
2822 |
+
CPLEX
|
2823 |
+
No feasible solution
|
2824 |
+
No feasible solution
|
2825 |
+
No feasible solution
|
2826 |
+
BB+CF
|
2827 |
+
2.66E+03
|
2828 |
+
602
|
2829 |
+
35.9
|
2830 |
+
4h
|
2831 |
+
2.49E+03
|
2832 |
+
324
|
2833 |
+
100.0
|
2834 |
+
4h
|
2835 |
+
1.90E+03
|
2836 |
+
147
|
2837 |
+
100.0
|
2838 |
+
4h
|
2839 |
+
BB+CF+BT 2.55E+03
|
2840 |
+
196
|
2841 |
+
≤0.1 4,321 2.46E+03
|
2842 |
+
290
|
2843 |
+
98.9
|
2844 |
+
4h
|
2845 |
+
1.90E+03
|
2846 |
+
145
|
2847 |
+
100.0
|
2848 |
+
4h
|
2849 |
+
1 Can assign K initial seeds through FFT at the root node. BB+CF+BT results without this superscript means can not assign initial seeds.
|
2850 |
+
Table 5
|
2851 |
+
Parallel results of BB+CF+BT (K = 3)
|
2852 |
+
Dataset
|
2853 |
+
Sample
|
2854 |
+
Dimension
|
2855 |
+
Method
|
2856 |
+
UB
|
2857 |
+
Nodes
|
2858 |
+
Gap
|
2859 |
+
(%)
|
2860 |
+
Time
|
2861 |
+
(s)
|
2862 |
+
HIGGS
|
2863 |
+
11,000,000
|
2864 |
+
29
|
2865 |
+
Heuristic
|
2866 |
+
368.35
|
2867 |
+
-
|
2868 |
+
-
|
2869 |
+
-
|
2870 |
+
Serial
|
2871 |
+
237.91
|
2872 |
+
290
|
2873 |
+
65.5
|
2874 |
+
4h
|
2875 |
+
Parallel
|
2876 |
+
(400 cores)
|
2877 |
+
227.91
|
2878 |
+
12,576
|
2879 |
+
30.2
|
2880 |
+
4h
|
2881 |
+
Bigcross
|
2882 |
+
11,620,300
|
2883 |
+
56
|
2884 |
+
Heuristic
|
2885 |
+
1.43E+07
|
2886 |
+
-
|
2887 |
+
-
|
2888 |
+
-
|
2889 |
+
Serial
|
2890 |
+
9.97E+06
|
2891 |
+
211
|
2892 |
+
19.7
|
2893 |
+
4h
|
2894 |
+
Parallel
|
2895 |
+
(400 cores)
|
2896 |
+
9.38E+06
|
2897 |
+
10,071
|
2898 |
+
≤0.1
|
2899 |
+
6,444
|
2900 |
+
Taxi
|
2901 |
+
1,120,841,769
|
2902 |
+
12
|
2903 |
+
Heuristic
|
2904 |
+
3.09E+04
|
2905 |
+
-
|
2906 |
+
-
|
2907 |
+
-
|
2908 |
+
Parallel
|
2909 |
+
(2000 cores)
|
2910 |
+
1.62E+04
|
2911 |
+
1,063
|
2912 |
+
≤0.1
|
2913 |
+
5,705
|
2914 |
+
|
2915 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
2916 |
+
32
|
2917 |
+
× x1
|
2918 |
+
× x2
|
2919 |
+
×
|
2920 |
+
x3
|
2921 |
+
||x1 − x2||2
|
2922 |
+
2 > 4α
|
2923 |
+
||x2 − x3||2
|
2924 |
+
2 > 4α
|
2925 |
+
||x3 − x1||2
|
2926 |
+
2 > 4α
|
2927 |
+
Figure 1
|
2928 |
+
Initial seeds with 3 clusters. In this example, ||x1 − x2||2
|
2929 |
+
2 > 4α, ||x2 − x3||2
|
2930 |
+
2 > 4α and ||x3 − x1||2
|
2931 |
+
2 > 4α.
|
2932 |
+
Therefore, we can arbitrarily assign x1,x2,x3 to 3 distinct clusters.
|
2933 |
+
× xs
|
2934 |
+
M 1
|
2935 |
+
M 2
|
2936 |
+
M 3
|
2937 |
+
β2
|
2938 |
+
s(M 2) > α
|
2939 |
+
β3
|
2940 |
+
s(M 3) > α
|
2941 |
+
Figure 2
|
2942 |
+
Center-based assignment with 3 clusters. In this example, β2
|
2943 |
+
s(M 2) > α (b2
|
2944 |
+
s = 0) and β3
|
2945 |
+
s(M 3) > α (b3
|
2946 |
+
s = 0).
|
2947 |
+
Therefore, we assign xs to the first cluster (b1
|
2948 |
+
s = 1).
|
2949 |
+
× x1
|
2950 |
+
× x2
|
2951 |
+
×x3
|
2952 |
+
× xs
|
2953 |
+
M 1
|
2954 |
+
M 2
|
2955 |
+
M 3
|
2956 |
+
||xs − x1||2
|
2957 |
+
2 > 4α
|
2958 |
+
||xs − x2||2
|
2959 |
+
2 > 4α
|
2960 |
+
Figure 3
|
2961 |
+
Sample-based assignment with 3 clusters. Assume we already know that x1,x2,x3 belong to cluster 1,2
|
2962 |
+
and 3, respectively. xs is the sample to be determined. In this example, ||xs − x1||2
|
2963 |
+
2 > 4α (b1
|
2964 |
+
s = 0) and
|
2965 |
+
||xs − x2||2
|
2966 |
+
2 > 4α (b2
|
2967 |
+
s = 0). Therefore, xs is assigned to cluster 3 (b3
|
2968 |
+
s = 1).
|
2969 |
+
|
2970 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
2971 |
+
33
|
2972 |
+
×
|
2973 |
+
×
|
2974 |
+
×
|
2975 |
+
×
|
2976 |
+
×
|
2977 |
+
×
|
2978 |
+
×
|
2979 |
+
×
|
2980 |
+
×
|
2981 |
+
×xi
|
2982 |
+
×
|
2983 |
+
xj
|
2984 |
+
M k
|
2985 |
+
×
|
2986 |
+
×
|
2987 |
+
Bα(xi)
|
2988 |
+
Bα(xj)
|
2989 |
+
√α
|
2990 |
+
√α
|
2991 |
+
Figure 4
|
2992 |
+
Ball-based bounds tightening in two-dimensional space. In this example, suppose it is determined that
|
2993 |
+
two points xi and xj belong to the Kth cluster. We first compute the index set of samples within all
|
2994 |
+
balls and original box, Sk
|
2995 |
+
+(M) := {s ∈ S |xs ∈ X ∩M k ∩Bα(xi)∩Bα(xj)}. We then generate the smallest
|
2996 |
+
box containing these samples in Sk
|
2997 |
+
+(M). The red rectangle is the tightened bounds we obtain.
|
2998 |
+
×
|
2999 |
+
×
|
3000 |
+
×
|
3001 |
+
×
|
3002 |
+
×
|
3003 |
+
×
|
3004 |
+
×
|
3005 |
+
×
|
3006 |
+
×
|
3007 |
+
×xi
|
3008 |
+
×
|
3009 |
+
xj
|
3010 |
+
M k
|
3011 |
+
×
|
3012 |
+
×
|
3013 |
+
Bα(xi)
|
3014 |
+
Bα(xj)
|
3015 |
+
Rα(xi)
|
3016 |
+
Rα(xj)
|
3017 |
+
√α
|
3018 |
+
√α
|
3019 |
+
Figure 5
|
3020 |
+
Box-based bounds tightening in two-dimensional space. In this example, we first generate two boxes
|
3021 |
+
with Rα(xi) := {x| xi −√α ≤ x ≤ xi +√α} and Rα(xj) = {x| xj −√α ≤ x ≤ xj +√α}. We then create a
|
3022 |
+
tighten bounds with ˆ
|
3023 |
+
M k=Rα(xi) ∩ Rα(xj) ∩ M k. The red rectangle is the tightened bounds we obtain.
|
3024 |
+
|
3025 |
+
Ren et al.: Global Optimization for K-Center of One Billion Samples
|
3026 |
+
34
|
3027 |
+
Dataset
|
3028 |
+
Subset
|
3029 |
+
Subset
|
3030 |
+
Subset
|
3031 |
+
Subset
|
3032 |
+
. . .
|
3033 |
+
Tightened space of centers:
|
3034 |
+
Bound
|
3035 |
+
Tightening
|
3036 |
+
Bound
|
3037 |
+
Tightening
|
3038 |
+
Bound
|
3039 |
+
Tightening
|
3040 |
+
Bound
|
3041 |
+
Tightening
|
3042 |
+
. . .
|
3043 |
+
LB & UB
|
3044 |
+
Bounding
|
3045 |
+
LB & UB
|
3046 |
+
Bounding
|
3047 |
+
LB & UB
|
3048 |
+
Bounding
|
3049 |
+
LB & UB
|
3050 |
+
Bounding
|
3051 |
+
. . .
|
3052 |
+
Lower bounds:
|
3053 |
+
,
|
3054 |
+
Upper bounds:
|
3055 |
+
Sample
|
3056 |
+
reduction
|
3057 |
+
Sample
|
3058 |
+
reduction
|
3059 |
+
Sample
|
3060 |
+
reduction
|
3061 |
+
Sample
|
3062 |
+
reduction
|
3063 |
+
. . .
|
3064 |
+
Index set of redundant samples:
|
3065 |
+
|
3066 |
+
Update dataset according to the redundant index set
|
3067 |
+
Gather from each process
|
3068 |
+
Gather from each process
|
3069 |
+
Gather from each process
|
3070 |
+
Spread to each proccess equally
|
3071 |
+
Parallel
|
3072 |
+
(Map)
|
3073 |
+
Serial
|
3074 |
+
(Reduce)
|
3075 |
+
Figure 6
|
3076 |
+
Parallelization of the reduced-space branch and bound scheme
|
3077 |
+
|
-NAyT4oBgHgl3EQfRPZI/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
-tAyT4oBgHgl3EQfRPa5/content/2301.00063v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:67ce83df66d036d979828e955a4b7635a48e887b6017d0c8a208b84fd3d0a658
|
3 |
+
size 209391
|
-tAyT4oBgHgl3EQfRPa5/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a73e1c40378107ecf41e6d94310419fe782930f8fd26b3230059ab1baba6d76b
|
3 |
+
size 2293805
|
-tAyT4oBgHgl3EQfRPa5/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:383e4142e4bb1fca2e4ce2e91419819a1a096b81cdeadbc8632212b1851d78ca
|
3 |
+
size 101678
|
.gitattributes
CHANGED
@@ -3332,3 +3332,60 @@ T9E5T4oBgHgl3EQfbA-t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
3332 |
cNE1T4oBgHgl3EQfLAMX/content/2301.02970v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3333 |
S9AyT4oBgHgl3EQfVfdE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3334 |
9NFJT4oBgHgl3EQfoSxe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3332 |
cNE1T4oBgHgl3EQfLAMX/content/2301.02970v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3333 |
S9AyT4oBgHgl3EQfVfdE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3334 |
9NFJT4oBgHgl3EQfoSxe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3335 |
+
odE_T4oBgHgl3EQf8hwH/content/2301.08375v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3336 |
+
S9AyT4oBgHgl3EQfVfdE/content/2301.00144v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3337 |
+
mNAyT4oBgHgl3EQf_vq9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3338 |
+
ktE1T4oBgHgl3EQf0gVV/content/2301.03456v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3339 |
+
3NAzT4oBgHgl3EQfR_tE/content/2301.01224v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3340 |
+
odE_T4oBgHgl3EQf8hwH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3341 |
+
7tAzT4oBgHgl3EQfSPsA/content/2301.01227v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3342 |
+
XdAzT4oBgHgl3EQfYfz7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3343 |
+
k9AyT4oBgHgl3EQfYPfO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3344 |
+
y9AyT4oBgHgl3EQfO_Zw/content/2301.00016v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3345 |
+
_9E1T4oBgHgl3EQfowSL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3346 |
+
y9AyT4oBgHgl3EQfO_Zw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3347 |
+
ttE5T4oBgHgl3EQfLA54/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3348 |
+
btE5T4oBgHgl3EQffA_l/content/2301.05624v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3349 |
+
jNE3T4oBgHgl3EQfJAm8/content/2301.04340v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3350 |
+
XNE3T4oBgHgl3EQfbwpA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3351 |
+
JNFAT4oBgHgl3EQfvB44/content/2301.08673v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3352 |
+
htE3T4oBgHgl3EQfIgkt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3353 |
+
MtE2T4oBgHgl3EQfBQa7/content/2301.03601v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3354 |
+
E9E0T4oBgHgl3EQfQwCg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3355 |
+
GtE5T4oBgHgl3EQfWA9Z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3356 |
+
x9E2T4oBgHgl3EQf3wgd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3357 |
+
QtE3T4oBgHgl3EQfDAk3/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3358 |
+
ttE5T4oBgHgl3EQfLA54/content/2301.05470v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3359 |
+
5dAyT4oBgHgl3EQfcfda/content/2301.00283v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3360 |
+
jdAyT4oBgHgl3EQfX_es/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3361 |
+
h9FKT4oBgHgl3EQfvC6t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3362 |
+
JNFAT4oBgHgl3EQfvB44/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3363 |
+
7tAzT4oBgHgl3EQfSPsA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3364 |
+
x9E2T4oBgHgl3EQf3wgd/content/2301.04173v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3365 |
+
-tAyT4oBgHgl3EQfRPa5/content/2301.00063v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3366 |
+
DtAzT4oBgHgl3EQfT_x1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3367 |
+
btFIT4oBgHgl3EQfmivq/content/2301.11310v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3368 |
+
5dAyT4oBgHgl3EQfcfda/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3369 |
+
9dAzT4oBgHgl3EQf-_6e/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3370 |
+
xdFJT4oBgHgl3EQfgyzk/content/2301.11563v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3371 |
+
9dAzT4oBgHgl3EQf-_6e/content/2301.01942v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3372 |
+
q9FKT4oBgHgl3EQf0C6i/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3373 |
+
XNE3T4oBgHgl3EQfbwpA/content/2301.04518v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3374 |
+
kdFKT4oBgHgl3EQfCS2q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3375 |
+
qtFIT4oBgHgl3EQfxSst/content/2301.11355v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3376 |
+
kb_36/content/kb_36.pdf filter=lfs diff=lfs merge=lfs -text
|
3377 |
+
kdFKT4oBgHgl3EQfCS2q/content/2301.11707v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3378 |
+
-tAyT4oBgHgl3EQfRPa5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3379 |
+
ZtFRT4oBgHgl3EQfPze-/content/2301.13519v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3380 |
+
qtFIT4oBgHgl3EQfxSst/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3381 |
+
h9FKT4oBgHgl3EQfvC6t/content/2301.11893v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3382 |
+
MtE2T4oBgHgl3EQfBQa7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3383 |
+
cNE1T4oBgHgl3EQfLAMX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3384 |
+
xdFJT4oBgHgl3EQfgyzk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3385 |
+
jtE1T4oBgHgl3EQfgQQH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3386 |
+
c9E4T4oBgHgl3EQfQAyD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3387 |
+
v9FRT4oBgHgl3EQfgDc7/content/2301.13578v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3388 |
+
E9E0T4oBgHgl3EQfQwCg/content/2301.02198v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3389 |
+
p9E1T4oBgHgl3EQfPQN5/content/2301.03025v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3390 |
+
c9E4T4oBgHgl3EQfQAyD/content/2301.04978v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3391 |
+
SdFAT4oBgHgl3EQf1h7S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
29E2T4oBgHgl3EQf5whX/content/tmp_files/2301.04193v1.pdf.txt
ADDED
@@ -0,0 +1,999 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics
|
2 |
+
1
|
3 |
+
New Exact Betchov-like Relation for the
|
4 |
+
Helicity Flux in Homogeneous Turbulence
|
5 |
+
Damiano Capocci1†, Perry L. Johnson2, Sean Oughton3,
|
6 |
+
Luca Biferale1 and Moritz Linkmann4‡
|
7 |
+
1Department of Physics and INFN, University of Rome Tor Vergata, Rome, Italy
|
8 |
+
2Department of Mechanical and Aerospace Engineering, University of California, Irvine, USA
|
9 |
+
3Department of Mathematics, University of Waikato, Hamilton, New Zealand
|
10 |
+
4School of Mathematics and Maxwell Institute for Mathematical Sciences,
|
11 |
+
University of Edinburgh, Edinburgh, EH9 3FD, United Kingdom
|
12 |
+
(Received xx; revised xx; accepted xx)
|
13 |
+
In homogeneous and isotropic turbulence, the relative contributions of different physical
|
14 |
+
mechanisms to the energy cascade can be quantified by an exact decomposition of the
|
15 |
+
energy flux (P. Johnson, Phys. Rev. Lett., 124, 104501 (2020), J. Fluid Mech. 922,
|
16 |
+
A3(2021)). We extend the formalism to the transfer of kinetic helicity across scales,
|
17 |
+
important in the presence of large-scale mirror breaking mechanisms, to identify physical
|
18 |
+
processes resulting in helicity transfer and quantify their contributions to the mean flux
|
19 |
+
in the inertial range. All subfluxes transfer helicity from large to small scales. About 50%
|
20 |
+
of the mean flux is due to the scale-local vortex flattening and vortex twisting. We derive
|
21 |
+
a new exact relation between these effects, similar to the Betchov relation for the energy
|
22 |
+
flux, revealing that the mean contribution of the former is three times larger than that
|
23 |
+
of the latter. Multi-scale effects account for the remaining 50% of the mean flux, with
|
24 |
+
approximate equipartition between multi-scale vortex flattening, twisting and entangling.
|
25 |
+
1. Introduction
|
26 |
+
The kinetic helicity, defined as the L2-inner product of velocity u and vorticity ω, has
|
27 |
+
dynamical, topological, geometrical, and statistical interpretations in turbulence. It is
|
28 |
+
a dynamical and topological inviscid invariant, where the latter refers to its connection
|
29 |
+
with the linking number of infinitesimal vortex lines (Moffatt 1969). Geometrically, it
|
30 |
+
quantifies the alignment of velocity and vorticity in a volume-averaged sense. Within
|
31 |
+
a statistical approach to turbulence, helicity is the correlation between velocity and
|
32 |
+
vorticity. In a rotationally invariant ensemble, it is connected to the breaking of the
|
33 |
+
symmetry under inversion of all axes. Inspired by its relevance to turbulence in atmo-
|
34 |
+
spheric flows (Lilly 1986), dynamical and statistical effects connected with helicity have
|
35 |
+
been studied in the atmospheric boundary layer (Deusebio & Lindborg 2014) and in
|
36 |
+
rotating turbulence (Mininni & Pouquet 2010a,b), and more generally in homogeneous
|
37 |
+
and isotropic turbulence (Chen et al. 2003a,b; Gledzer & Chkhetiani 2015; Kessar et al.
|
38 |
+
2015; Sahoo et al. 2015; Stepanov et al. 2015; Alexakis 2017; Sahoo et al. 2017; Milanese
|
39 |
+
et al. 2021; Yan et al. 2020), as well as shear flows (Yan et al. 2020; Yu et al. 2022) and
|
40 |
+
in laboratory experiments (Scheeler et al. 2017).
|
41 |
+
The level of helicity in a turbulent flow affects turbulent statistics and dynamics, and
|
42 |
+
is thus of relevance from a fundamental theory perspective as well as for subgrid-scale
|
43 |
+
† Email address for correspondence: [email protected]
|
44 |
+
‡ Email address for correspondence: [email protected]
|
45 |
+
arXiv:2301.04193v1 [physics.flu-dyn] 10 Jan 2023
|
46 |
+
|
47 |
+
2
|
48 |
+
D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
|
49 |
+
(SGS) modelling. As an alignment of velocity and vorticity weakens the nonlinearity of
|
50 |
+
the Navier–Stokes equations, high levels of helicity have been connected with a depletion
|
51 |
+
of the kinetic energy flux across scales by an analysis of the coupling between helical
|
52 |
+
Fourier modes (Kraichnan 1973), and with regions of low dissipation (Moffatt 2014).
|
53 |
+
These effects can be quantified by upper bound theory applied to helical forcing and
|
54 |
+
direct numerical simulation — the energy flux of turbulence sustained by fully helical
|
55 |
+
forcing is about 30% lower than in the non-helical case (Linkmann 2018).
|
56 |
+
Helicity affects turbulence not only globally, that is, in terms of mean energy fluxes,
|
57 |
+
but also on a scale-by-scale level. As a solenoidal vector field, the velocity field u can
|
58 |
+
be decomposed into positively and negatively helical components u± (Herring 1974;
|
59 |
+
Constantin & Majda 1988; Waleffe 1992), u(x, t) = u+(x, t) + u−(x, t), where u±
|
60 |
+
are obtained by projecting the Fourier coefficients ˆu(k, t) onto basis vectors which are
|
61 |
+
eigenfunctions of the curl operator in Fourier space. That is, ˆu±(k, t) = u±(k, t)h±(k) ,
|
62 |
+
where ik × kh±(k) = ±h±(k) and u±(k, t) = ˆu(k, t) · h±(k). The energy flux can
|
63 |
+
then be decomposed into different triadic couplings between positively and negatively
|
64 |
+
helical velocity-field fluctuations (Waleffe 1992). Interestingly, interactions among helical
|
65 |
+
Fourier modes of like-signed helicity leads to an inverse energy transfer across scales in
|
66 |
+
the inertial range (Waleffe 1992; Biferale et al. 2012, 2013; Sahoo et al. 2015), while
|
67 |
+
interactions of oppositely-signed helical modes transfer energy from large to small scales
|
68 |
+
(Waleffe 1992; Alexakis 2017; Alexakis & Biferale 2018). For turbulent flows of electrically
|
69 |
+
conducting fluids such as liquid metals or plasmas in the fluid approximation, helicity
|
70 |
+
alters the evolution of both velocity and magnetic-field fluctuations profoundly. Here,
|
71 |
+
small-scale kinetic helicity facilitates the formation of large-scale coherent magnetic
|
72 |
+
structures through the large-scale dynamo (Steenbeck et al. 1966; Brandenburg 2001;
|
73 |
+
Brandenburg & Subramanian 2005; Tobias et al. 2013; Linkmann et al. 2016, 2017).
|
74 |
+
The cascade of kinetic helicity itself is predicted to be direct, that is, it proceeds from
|
75 |
+
large to small scales (Brissaud et al. 1973; Waleffe 1992), and scale-local (Eyink 2005). It
|
76 |
+
results, as discussed by Eyink (2006) in the context of a multi-scale gradient expansion,
|
77 |
+
from a twisting of small-scale vortices into a local alignment with the small-scale velocity
|
78 |
+
fluctuations by large-scale differential vorticity (‘screw’). However, being sign-indefinite,
|
79 |
+
numerical results on helicity fluxes can be difficult to interpret as a loss of positive helicity
|
80 |
+
at a given scale may be viewed as a gain of negative helicity at the same scale.
|
81 |
+
In the context of SGS modelling, the effect helicity has on a turbulent flow is usually
|
82 |
+
taken into account though additional diffusive model terms (Yokoi & Yoshizawa 1993;
|
83 |
+
Li et al. 2006; Baerenzung et al. 2008; Inagaki et al. 2017). However, a combination of
|
84 |
+
a-priori and a-posteriori analyses of different SGS models for isotropic helical turbulence
|
85 |
+
found the effect of the additional diffusive model terms to be small and that a classical
|
86 |
+
Smagorinsky model best represents the resolved-scale dynamics (Li et al. 2006). Similarly,
|
87 |
+
based on analytical and numerical results, Linkmann (2018) suggests an adjustment of
|
88 |
+
the Smagorinsky constant to account for high levels of helicity. So far, SGS analyses of
|
89 |
+
helical turbulence have mainly been concerned with energy transfers.
|
90 |
+
Here, we focus on the helicity flux across scales in statistically stationary homogeneous
|
91 |
+
and isotropic turbulence, with large-scale forcing breaking mirror symmetry. For the
|
92 |
+
energy flux, the Betchov (1956) relation states that the mean contribution from vortex
|
93 |
+
stretching to the energy cascade is triple that due to strain self-amplification. Carbone
|
94 |
+
& Wilczek (2022) recently showed that there are no further kinematic relations for the
|
95 |
+
energy flux in statistically stationary homogeneous and isotropic turbulence with zero net
|
96 |
+
helicity. However, we prove here that a new exact kinematic Betchov-type relation exists
|
97 |
+
for the mean helicity flux. Furthermore, we also present an exact decomposition of the
|
98 |
+
helicity flux in analogy to that of the kinetic energy flux derived by Johnson (2020, 2021),
|
99 |
+
|
100 |
+
Helicity fluxes in homogeneous turbulence
|
101 |
+
3
|
102 |
+
whereby the relative contributions of physical mechanisms, such as vortex stretching and
|
103 |
+
strain self-amplification, to the energy cascade can be quantified in terms of the overall
|
104 |
+
contribution and their scale-locality. The aim is to identify physical mechanisms that
|
105 |
+
transfer kinetic helicity across scales and to quantify their relative contributions to the
|
106 |
+
mean helicity flux and its fluctuations, which may be useful for the construction of SGS
|
107 |
+
models when resolving the helicity cascade is of interest.
|
108 |
+
2. Exact decomposition of the kinetic helicity flux
|
109 |
+
To derive the aforementioned exact decomposition of the helicity flux and relations
|
110 |
+
between the resulting subfluxes, we begin with the three-dimensional (3D) incompressible
|
111 |
+
Navier–Stokes equations, here written in component form
|
112 |
+
∂tui + ∂j (uiuj) = −∂jpδij + 2ν∂jSij + fi ,
|
113 |
+
(2.1)
|
114 |
+
∂juj = 0 ,
|
115 |
+
(2.2)
|
116 |
+
where u = (u1, u2, u3) is the velocity field, p the pressure divided by the constant density,
|
117 |
+
ν the kinematic viscosity, Sij the rate-of-strain tensor, and f = (f1, f2, f3) an external
|
118 |
+
solenoidal force that may be present. To define the helicity flux across scales, we introduce
|
119 |
+
a filtering operation to separate large- and small-scale dynamics (e.g., Germano 1992).
|
120 |
+
Specifically, for a generic function φ, the filtered version at scale ℓ is φ
|
121 |
+
ℓ = Gℓ ∗ φ , where
|
122 |
+
Gℓ is a filter kernel with filter width ℓ and the asterisk denotes the convolution operation.
|
123 |
+
Applying the filter to the Navier–Stokes equations (2.1)–(2.2) results in
|
124 |
+
∂tuℓ
|
125 |
+
i + ∂j
|
126 |
+
�
|
127 |
+
uℓ
|
128 |
+
iuℓ
|
129 |
+
j + pℓδij − 2νS
|
130 |
+
ℓ
|
131 |
+
ij + τ ℓ
|
132 |
+
ij
|
133 |
+
�
|
134 |
+
= f
|
135 |
+
ℓ
|
136 |
+
i ,
|
137 |
+
(2.3)
|
138 |
+
where τ ℓ
|
139 |
+
ij = τ ℓ(ui, uj) = uiujℓ − uℓ
|
140 |
+
iuℓ
|
141 |
+
j is the SGS stress tensor. Here, we follow the
|
142 |
+
notation of Germano (1992) in defining the generalised second moment for any two fields
|
143 |
+
as τ ℓ(a, b) = ab
|
144 |
+
ℓ − aℓb
|
145 |
+
ℓ. We also require the filtered vorticity equation
|
146 |
+
∂tωℓ
|
147 |
+
i + ∂j
|
148 |
+
�
|
149 |
+
ωℓ
|
150 |
+
iuℓ
|
151 |
+
j − uℓ
|
152 |
+
iωℓ
|
153 |
+
j − ν∂jωℓ
|
154 |
+
i
|
155 |
+
�
|
156 |
+
− gℓ
|
157 |
+
i = −∂j
|
158 |
+
�
|
159 |
+
ϵimn∂mτ ℓ
|
160 |
+
nj
|
161 |
+
�
|
162 |
+
,
|
163 |
+
(2.4)
|
164 |
+
where g = ∇ × f. The large-scale helicity density, Hℓ = uℓ
|
165 |
+
iωℓ
|
166 |
+
i, then evolves according to
|
167 |
+
∂tHℓ + ∂j
|
168 |
+
�
|
169 |
+
Hℓuℓ
|
170 |
+
j + (pℓ − 1
|
171 |
+
2uℓ
|
172 |
+
iuℓ
|
173 |
+
i)ωℓ
|
174 |
+
j − ν∂jHℓ�
|
175 |
+
+ 2ν(∂juℓ
|
176 |
+
i)(∂jωℓ
|
177 |
+
i) − ωℓ
|
178 |
+
if
|
179 |
+
ℓ
|
180 |
+
i − uℓ
|
181 |
+
igℓ
|
182 |
+
i
|
183 |
+
= −∂j
|
184 |
+
�
|
185 |
+
2ωℓ
|
186 |
+
iτ ℓ
|
187 |
+
ij + ϵijkuℓ
|
188 |
+
i∂mτ ℓ
|
189 |
+
km
|
190 |
+
�
|
191 |
+
+ 2τ ℓ
|
192 |
+
ij∂jωℓ
|
193 |
+
i
|
194 |
+
(2.5)
|
195 |
+
The last term in this equation is the helicity flux
|
196 |
+
ΠH,ℓ = −2τ ℓ
|
197 |
+
ij∂jωℓ
|
198 |
+
i ,
|
199 |
+
(2.6)
|
200 |
+
and is the central focus herein. It has an alternative form (Yan et al. 2020),
|
201 |
+
˜ΠH,ℓ = −τ ℓ
|
202 |
+
ij∂jωℓ
|
203 |
+
i −
|
204 |
+
�
|
205 |
+
τ ℓ(ωi, uj) − τ ℓ(ui, ωj)
|
206 |
+
�
|
207 |
+
∂juℓ
|
208 |
+
i ,
|
209 |
+
(2.7)
|
210 |
+
and it can be shown that the RHSs of (2.6) and (2.7) differ by an expression that can
|
211 |
+
be written as a divergence and therefore vanishes after averaging spatially, at least for
|
212 |
+
statistically homogeneous turbulence (Yan et al. 2020). This implies ⟨ΠH,ℓ⟩ = ⟨ ˜ΠH,ℓ⟩.
|
213 |
+
Eyink (2006) links the first term in (2.7) — which is proportional to ΠH,ℓ — to vortex
|
214 |
+
twisting and Yan et al. (2020) attribute the second term to vortex stretching. In what
|
215 |
+
follows we discuss an exact decomposition of ΠH,ℓ, and show that both effects can be
|
216 |
+
identified therein. We also use ΠH,ℓ for our numerical evaluations (cf. Chen et al. 2003a;
|
217 |
+
Eyink 2006).
|
218 |
+
|
219 |
+
4
|
220 |
+
D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
|
221 |
+
2.1. Gaussian filter relations for the helicity flux
|
222 |
+
So far all expressions are exact and filter-independent. To derive exact decompositions
|
223 |
+
of the helicity flux in both representations, we now focus on Gaussian filters. For that
|
224 |
+
case, Johnson (2020, 2021) showed that the subgrid-scale stresses can be obtained as the
|
225 |
+
solution of a forced diffusion equation with ℓ2 being the time-like variable, resulting in
|
226 |
+
τ ℓ
|
227 |
+
ij = τ ℓ(ui, uj) = ℓ2A
|
228 |
+
ℓ
|
229 |
+
ikA
|
230 |
+
ℓ
|
231 |
+
jk +
|
232 |
+
� ℓ2
|
233 |
+
0
|
234 |
+
dθ τ φ
|
235 |
+
�
|
236 |
+
A
|
237 |
+
√
|
238 |
+
θ
|
239 |
+
ik , A
|
240 |
+
√
|
241 |
+
θ
|
242 |
+
kj
|
243 |
+
�
|
244 |
+
,
|
245 |
+
(2.8)
|
246 |
+
where φ(θ) =
|
247 |
+
√
|
248 |
+
ℓ2 − θ, and Aij = ∂jui are the velocity-field gradients. Since the SGS
|
249 |
+
stress tensor τ ℓ
|
250 |
+
ij is symmetric, for the first form of the helicity flux we obtain in analogy
|
251 |
+
to the energy flux
|
252 |
+
ΠH,ℓ = −2τ ℓ
|
253 |
+
ijS
|
254 |
+
ℓ
|
255 |
+
ω,ij,
|
256 |
+
(2.9)
|
257 |
+
where Sω is the symmetric component of the vorticity gradient tensor, with components
|
258 |
+
Sω,ij = (∂jωi + ∂iωj)/2. Employing (2.8) this yields
|
259 |
+
ΠH,ℓ = −2ℓ2S
|
260 |
+
ℓ
|
261 |
+
ω,ijA
|
262 |
+
ℓ
|
263 |
+
ikA
|
264 |
+
ℓ
|
265 |
+
jk − 2
|
266 |
+
� ℓ2
|
267 |
+
0
|
268 |
+
dθ S
|
269 |
+
ℓ
|
270 |
+
ω,ijτ φ
|
271 |
+
�
|
272 |
+
A
|
273 |
+
√
|
274 |
+
θ
|
275 |
+
ik , A
|
276 |
+
√
|
277 |
+
θ
|
278 |
+
kj
|
279 |
+
�
|
280 |
+
.
|
281 |
+
(2.10)
|
282 |
+
The first term involves a product of gradient tensors filtered at the same scale, ℓ; hence
|
283 |
+
we refer to it as being single-scale, and denote it ΠH,ℓ
|
284 |
+
s
|
285 |
+
. In mean, it coincides with the
|
286 |
+
nonlinear LES model for the SGS-stresses (Eyink 2006). In contrast, the second term
|
287 |
+
encodes the correlation between resolved-scale vorticity-field gradients and (summed)
|
288 |
+
velocity-field gradients at each scale smaller than ℓ, so that we refer to it as multi-scale.
|
289 |
+
Splitting the velocity gradient tensors into symmetric and anti-symmetric parts, that
|
290 |
+
is, into the rate-of-strain tensor S = (A + At)/2 and vorticity tensor Ω = (A − At)/2,
|
291 |
+
where At is the transpose of A, the helicity flux can be decomposed into six subfluxes
|
292 |
+
ΠH,ℓ = Πℓ
|
293 |
+
s,SS + Πℓ
|
294 |
+
s,ΩΩ + Πℓ
|
295 |
+
s,SΩ + Πℓ
|
296 |
+
m,SS + Πℓ
|
297 |
+
m,ΩΩ + Πℓ
|
298 |
+
m,SΩ,
|
299 |
+
(2.11)
|
300 |
+
where the single-scale terms are
|
301 |
+
ΠH,ℓ
|
302 |
+
s,SS = −2ℓ2S
|
303 |
+
ℓ
|
304 |
+
ω,ijS
|
305 |
+
ℓ
|
306 |
+
ikS
|
307 |
+
ℓ
|
308 |
+
jk = −2ℓ2tr
|
309 |
+
�
|
310 |
+
(S
|
311 |
+
ℓ
|
312 |
+
ω)tS
|
313 |
+
ℓ(S
|
314 |
+
ℓ)t�
|
315 |
+
,
|
316 |
+
(2.12)
|
317 |
+
ΠH,ℓ
|
318 |
+
s,ΩΩ = −2ℓ2S
|
319 |
+
ℓ
|
320 |
+
ω,ijΩ
|
321 |
+
ℓ
|
322 |
+
ikΩ
|
323 |
+
ℓ
|
324 |
+
jk = −2ℓ2tr
|
325 |
+
�
|
326 |
+
(S
|
327 |
+
ℓ
|
328 |
+
ω)tΩ
|
329 |
+
ℓ(Ω
|
330 |
+
ℓ)t�
|
331 |
+
,
|
332 |
+
(2.13)
|
333 |
+
ΠH,ℓ
|
334 |
+
s,SΩ = −2ℓ2S
|
335 |
+
ℓ
|
336 |
+
ω,ij
|
337 |
+
�
|
338 |
+
S
|
339 |
+
ℓ
|
340 |
+
ikΩ
|
341 |
+
ℓ
|
342 |
+
jk − Ω
|
343 |
+
ℓ
|
344 |
+
ikS
|
345 |
+
ℓ
|
346 |
+
jk
|
347 |
+
�
|
348 |
+
= −4ℓ2tr
|
349 |
+
�
|
350 |
+
(S
|
351 |
+
ℓ
|
352 |
+
ω)tS
|
353 |
+
ℓ(Ω
|
354 |
+
ℓ)t�
|
355 |
+
,
|
356 |
+
(2.14)
|
357 |
+
and tr {·} denotes the trace. Similarly, the multi-scale terms are
|
358 |
+
ΠH,ℓ
|
359 |
+
m,SS = −2
|
360 |
+
� ℓ2
|
361 |
+
0
|
362 |
+
dθ S
|
363 |
+
ℓ
|
364 |
+
ω,ijτ φ
|
365 |
+
�
|
366 |
+
S
|
367 |
+
√
|
368 |
+
θ
|
369 |
+
ik , S
|
370 |
+
√
|
371 |
+
θ
|
372 |
+
kj
|
373 |
+
�
|
374 |
+
,
|
375 |
+
(2.15)
|
376 |
+
ΠH,ℓ
|
377 |
+
m,ΩΩ =
|
378 |
+
2
|
379 |
+
� ℓ2
|
380 |
+
0
|
381 |
+
dθ S
|
382 |
+
ℓ
|
383 |
+
ω,ijτ φ
|
384 |
+
�
|
385 |
+
Ω
|
386 |
+
√
|
387 |
+
θ
|
388 |
+
ik , Ω
|
389 |
+
√
|
390 |
+
θ
|
391 |
+
kj
|
392 |
+
�
|
393 |
+
,
|
394 |
+
(2.16)
|
395 |
+
ΠH,ℓ
|
396 |
+
m,SΩ = −2
|
397 |
+
� ℓ2
|
398 |
+
0
|
399 |
+
dθ S
|
400 |
+
ℓ
|
401 |
+
ω,ij
|
402 |
+
�
|
403 |
+
τ φ
|
404 |
+
�
|
405 |
+
S
|
406 |
+
√
|
407 |
+
θ
|
408 |
+
ik , Ω
|
409 |
+
√
|
410 |
+
θ
|
411 |
+
jk
|
412 |
+
�
|
413 |
+
+ τ φ
|
414 |
+
�
|
415 |
+
Ω
|
416 |
+
√
|
417 |
+
θ
|
418 |
+
ik , S
|
419 |
+
√
|
420 |
+
θ
|
421 |
+
jk
|
422 |
+
��
|
423 |
+
= −4
|
424 |
+
� ℓ2
|
425 |
+
0
|
426 |
+
dθ S
|
427 |
+
ℓ
|
428 |
+
ω,ijτ φ
|
429 |
+
�
|
430 |
+
S
|
431 |
+
√
|
432 |
+
θ
|
433 |
+
ik , Ω
|
434 |
+
√
|
435 |
+
θ
|
436 |
+
jk
|
437 |
+
�
|
438 |
+
.
|
439 |
+
(2.17)
|
440 |
+
We recall that ⟨ΠH,ℓ
|
441 |
+
s,ΩΩ⟩, the spatial average of the contribution to the helicity flux due
|
442 |
+
|
443 |
+
Helicity fluxes in homogeneous turbulence
|
444 |
+
5
|
445 |
+
to coupling of resolved-scale vorticity strain with resolved-scale vorticity, vanishes
|
446 |
+
⟨ΠH,ℓ
|
447 |
+
s,ΩΩ⟩ = −ℓ2
|
448 |
+
4
|
449 |
+
��
|
450 |
+
∂jωℓ
|
451 |
+
i + ∂iωℓ
|
452 |
+
j
|
453 |
+
�
|
454 |
+
ωℓ
|
455 |
+
iωℓ
|
456 |
+
j
|
457 |
+
�
|
458 |
+
= −ℓ2
|
459 |
+
4
|
460 |
+
�
|
461 |
+
∂j(ωℓ
|
462 |
+
iωℓ
|
463 |
+
iωℓ
|
464 |
+
j)
|
465 |
+
�
|
466 |
+
= 0 ,
|
467 |
+
(2.18)
|
468 |
+
due to periodic boundary conditions and the divergence-free nature of the vorticity field,
|
469 |
+
as previously discussed by Eyink (2006) in the context of a multi-scale gradient expansion
|
470 |
+
of the SGS stress tensor.
|
471 |
+
The physics encoded in these transfer terms may be understood in terms of three
|
472 |
+
effects: (i) “vortex flattening” – compression and stretching of a vortex tube into a
|
473 |
+
vortex sheet by large-scale straining motion, with the principal axes of the vorticity
|
474 |
+
deformation tensor Sω aligning with that of the strain-rate tensor at smaller scale,
|
475 |
+
see (2.12) and (2.15); (ii) “vortex twisting” – a twisting of small-scale vortex tubes
|
476 |
+
by large-scale differential vorticity into thinner tubes consisting of helical vortex lines,
|
477 |
+
and subsequent small-scale alignment between the resulting vorticity vectors and the
|
478 |
+
extensile stress generated thereby (Eyink 2006), see (2.14) and (2.17); and (iii) “vortex
|
479 |
+
entangling” – twisting of entangled vortex lines, see (2.13) and (2.16). Interpreting
|
480 |
+
helicity as the correlation between velocity and vorticity, a change in this correlation
|
481 |
+
(or alignment) across scales occurs by vorticity deformation through straining motions
|
482 |
+
or differential vorticity. This results in decorrelation at large scales and an increase in
|
483 |
+
small-scale correlation.
|
484 |
+
2.2. An exact Betchov-type relation for the helicity flux
|
485 |
+
In homogeneous turbulence, the Betchov (1956) relation is an exact expression con-
|
486 |
+
necting the contributions associated with vortex stretching and strain self-amplification
|
487 |
+
to the mean energy flux across scales. Here we show that there is an analogous exact
|
488 |
+
expression relating two (single scale) mean helicity subfluxes: 3⟨ΠH,ℓ
|
489 |
+
s,SS⟩ = ⟨ΠH,ℓ
|
490 |
+
s,SΩ⟩. These
|
491 |
+
subfluxes are associated with vortex flattening, ⟨ΠH,ℓ
|
492 |
+
s,SS⟩, and vortex twisting, ⟨ΠH,ℓ
|
493 |
+
s,SΩ⟩.
|
494 |
+
Written in terms of the definitions given in (2.12) and (2.14), this expression reads
|
495 |
+
3
|
496 |
+
�
|
497 |
+
tr
|
498 |
+
�
|
499 |
+
S
|
500 |
+
ℓ
|
501 |
+
ωS
|
502 |
+
ℓS
|
503 |
+
ℓ��
|
504 |
+
= 2
|
505 |
+
�
|
506 |
+
tr
|
507 |
+
�
|
508 |
+
S
|
509 |
+
ℓ
|
510 |
+
ωΩ
|
511 |
+
ℓS
|
512 |
+
ℓ��
|
513 |
+
.
|
514 |
+
(2.19)
|
515 |
+
The main steps in a proof of this are now summarised. Following an argument analogous
|
516 |
+
to that used in proving the Betchov (1956) relation for the energy flux, and using tensor
|
517 |
+
symmetry properties and (2.18), one obtains (Eyink 2006)
|
518 |
+
�
|
519 |
+
tr
|
520 |
+
�
|
521 |
+
S
|
522 |
+
ℓ
|
523 |
+
ωS
|
524 |
+
ℓS
|
525 |
+
ℓ��
|
526 |
+
= −
|
527 |
+
�
|
528 |
+
tr
|
529 |
+
�
|
530 |
+
Ω
|
531 |
+
ℓ
|
532 |
+
ω(S
|
533 |
+
ℓΩ
|
534 |
+
ℓ + Ω
|
535 |
+
ℓS
|
536 |
+
ℓ)
|
537 |
+
��
|
538 |
+
= −2
|
539 |
+
�
|
540 |
+
tr
|
541 |
+
�
|
542 |
+
Ω
|
543 |
+
ℓ
|
544 |
+
ωΩ
|
545 |
+
ℓS
|
546 |
+
ℓ��
|
547 |
+
,
|
548 |
+
(2.20)
|
549 |
+
where Ωω is the antisymmetric part of the vorticity gradient tensor. This yields
|
550 |
+
1
|
551 |
+
2
|
552 |
+
�
|
553 |
+
tr
|
554 |
+
�
|
555 |
+
∇ωℓ �
|
556 |
+
∇uℓ�t ��
|
557 |
+
∇uℓ + ∇uℓ�t���
|
558 |
+
=
|
559 |
+
�
|
560 |
+
tr
|
561 |
+
�3
|
562 |
+
2 S
|
563 |
+
ℓ
|
564 |
+
ωS
|
565 |
+
ℓS
|
566 |
+
ℓ − S
|
567 |
+
ℓ
|
568 |
+
ωΩ
|
569 |
+
ℓS
|
570 |
+
ℓ��
|
571 |
+
.
|
572 |
+
(2.21)
|
573 |
+
Thus, showing that the lefthand side (LHS) of this expression vanishes will prove the
|
574 |
+
Betchov relation for the helicity flux, (2.19). To do so, we express the LHS of eq. (2.21)
|
575 |
+
using the chain rule and in index notation
|
576 |
+
�
|
577 |
+
∂jωℓ
|
578 |
+
i∂juℓ
|
579 |
+
kS
|
580 |
+
ℓ
|
581 |
+
ki
|
582 |
+
�
|
583 |
+
=
|
584 |
+
�
|
585 |
+
∂j
|
586 |
+
�
|
587 |
+
ωℓ
|
588 |
+
i∂juℓ
|
589 |
+
kS
|
590 |
+
ℓ
|
591 |
+
ki
|
592 |
+
��
|
593 |
+
−
|
594 |
+
�
|
595 |
+
ωℓ
|
596 |
+
i∂j∂juℓ
|
597 |
+
kS
|
598 |
+
ℓ
|
599 |
+
ki
|
600 |
+
�
|
601 |
+
−
|
602 |
+
�
|
603 |
+
ωℓ
|
604 |
+
iS
|
605 |
+
ℓ
|
606 |
+
kj∂jS
|
607 |
+
ℓ
|
608 |
+
ki
|
609 |
+
�
|
610 |
+
−
|
611 |
+
�
|
612 |
+
ωℓ
|
613 |
+
iΩ
|
614 |
+
ℓ
|
615 |
+
kj∂jS
|
616 |
+
ℓ
|
617 |
+
ki
|
618 |
+
�
|
619 |
+
.
|
620 |
+
(2.22)
|
621 |
+
The first term on the RHS of this expression vanishes making use of periodic boundary
|
622 |
+
conditions. Using incompressibility and integration by parts it can be shown that the
|
623 |
+
|
624 |
+
6
|
625 |
+
D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
|
626 |
+
N
|
627 |
+
E
|
628 |
+
ν
|
629 |
+
ε
|
630 |
+
εH
|
631 |
+
L
|
632 |
+
τ
|
633 |
+
Reλ η/10−3 kmax kmaxη ∆t/τ
|
634 |
+
#
|
635 |
+
1024 7.26 0.001 3.33 5.02 1.12 0.50 327
|
636 |
+
4.20
|
637 |
+
340
|
638 |
+
1.43
|
639 |
+
0.60
|
640 |
+
39
|
641 |
+
Table 1. Simulation parameters and key observables, where N is the number of collocation
|
642 |
+
points in each coordinate, E the (mean) total kinetic energy, ν the kinematic viscosity, ε the mean
|
643 |
+
energy dissipation rate, εH the mean helicity dissipation rate, L = (3π/4E)
|
644 |
+
� kmax
|
645 |
+
0
|
646 |
+
dk E(k)/k
|
647 |
+
the integral scale, τ = L/
|
648 |
+
�
|
649 |
+
2E/3 the large-eddy turnover time, Reλ the Taylor-scale Reynolds
|
650 |
+
number, η = (ν3/ε)1/4 the Kolmogorov microscale, kmax the largest wave number after
|
651 |
+
de-aliasing, ∆t the sampling interval which is calculated from the length of the averaging
|
652 |
+
interval divided by the number of equispaced snapshots, and # the number of snapshots. The
|
653 |
+
data corresponds to run 22 of
|
654 |
+
Sahoo et al. (2017). It is available for download using the
|
655 |
+
SMART-Turb portal http://smart-turb.roma2.infn.it.
|
656 |
+
last term also vanishes. The two remaining terms cancel out, which is shown by similar
|
657 |
+
arguments and using the properties of the Levi-Civita tensor. This completes the proof.
|
658 |
+
The mean single-scale terms also arise as the first-order contribution in a multi-scale
|
659 |
+
expansion of the SGS stress tensor (Eyink 2006), where (2.20) is used to deduce that
|
660 |
+
the full vorticity gradient, not only either its symmetric or antisymmetric component, is
|
661 |
+
involved in the helicity flux across scales. In consequence, (2.19) and (2.20) assert that
|
662 |
+
the mean transfers involving the symmetric or the antisymmetric parts of the vorticity
|
663 |
+
gradient can be related to one another, and thus the single-scale contribution to the mean
|
664 |
+
helicity flux can be written as
|
665 |
+
�
|
666 |
+
ΠH,ℓ
|
667 |
+
s
|
668 |
+
�
|
669 |
+
= −8ℓ2 �
|
670 |
+
tr
|
671 |
+
�
|
672 |
+
S
|
673 |
+
ℓ
|
674 |
+
ωS
|
675 |
+
ℓS
|
676 |
+
ℓ��
|
677 |
+
= −16
|
678 |
+
3 ℓ2 �
|
679 |
+
tr
|
680 |
+
�
|
681 |
+
S
|
682 |
+
ℓ
|
683 |
+
ωΩ
|
684 |
+
ℓS
|
685 |
+
ℓ��
|
686 |
+
.
|
687 |
+
(2.23)
|
688 |
+
3. Numerical details and data
|
689 |
+
Data has been generated by direct numerical simulation of the incompressible 3D
|
690 |
+
Navier–Stokes equations (2.1) and (2.2) on a triply periodic domain of size Lbox =
|
691 |
+
2π in each direction, where the forcing f is a random Gaussian process with zero
|
692 |
+
mean, fully helical f = f +, and active in the wavenumber band k ∈ [0.5, 2.4]. The
|
693 |
+
spatial discretisation is implemented through the standard, fully dealiased pseudospectral
|
694 |
+
method with 1024 collocation points in each direction. Further details and mean values
|
695 |
+
of key observables are summarised in table 1.
|
696 |
+
Figure 1(a) presents the time series of the total kinetic energy per unit volume, E(t).
|
697 |
+
Time-averaged kinetic energy spectra of positively and negatively helical fluctuations,
|
698 |
+
E±(k) = ⟨ 1
|
699 |
+
2
|
700 |
+
�
|
701 |
+
k⩽|k|<k+1 |ˆu±(k)|2⟩ and the total energy spectrum E(k) = E+(k)+E−(k),
|
702 |
+
are shown in in Kolmogorov-compensated form in Fig. 1(b). As can be seen by comparison
|
703 |
+
of E+(k) and E−(k), the large-scale velocity-field fluctuations are dominantly positively
|
704 |
+
helical, which is a consequence of the forcing. Decreasing in scale, we observe that
|
705 |
+
negatively helical fluctuations increase in amplitude, and approximate equipartition
|
706 |
+
between E+(k) and E−(k) is reached for k ⩾ 20. That is, a helically forced turbulent
|
707 |
+
flow, where mirror-symmetry is broken at and close to the forcing scale, restores mirror-
|
708 |
+
symmetry at smaller scales through nonlinear interactions (Chen et al. 2003a; Deusebio
|
709 |
+
& Lindborg 2014; Kessar et al. 2015).
|
710 |
+
|
711 |
+
Helicity fluxes in homogeneous turbulence
|
712 |
+
7
|
713 |
+
0
|
714 |
+
5
|
715 |
+
10
|
716 |
+
15
|
717 |
+
20
|
718 |
+
25
|
719 |
+
t/τ
|
720 |
+
−0.4
|
721 |
+
−0.2
|
722 |
+
0.0
|
723 |
+
0.2
|
724 |
+
0.4
|
725 |
+
E(t)/E − 1
|
726 |
+
(a)
|
727 |
+
10−2
|
728 |
+
10−1
|
729 |
+
100
|
730 |
+
kη
|
731 |
+
10−2
|
732 |
+
10−1
|
733 |
+
100
|
734 |
+
k5/3E(k)/ε2/3
|
735 |
+
E(k)
|
736 |
+
E+(k)
|
737 |
+
E−(k)
|
738 |
+
(b)
|
739 |
+
Figure 1. (a) Time evolution of the total energy normalised by its mean value, E. Time
|
740 |
+
is given in units of large-eddy turnover time τ. The red dots correspond to the sampled
|
741 |
+
velocity-field configurations. (b) Time-averaged energy spectra in Kolmogorov-compensated
|
742 |
+
form. The grey-shaded area indicates the forcing range. The dashed line indicates a Kolmogorov
|
743 |
+
constant CK ≈ 1.6.
|
744 |
+
10−2
|
745 |
+
10−1
|
746 |
+
100
|
747 |
+
k η
|
748 |
+
0.0
|
749 |
+
0.2
|
750 |
+
0.4
|
751 |
+
0.6
|
752 |
+
0.8
|
753 |
+
1.0
|
754 |
+
⟨ΠH,ℓ⟩/εH
|
755 |
+
⟨ΠH,ℓ⟩
|
756 |
+
⟨ΠH,ℓ
|
757 |
+
s,SΩ⟩
|
758 |
+
⟨ΠH,ℓ
|
759 |
+
s,SS⟩
|
760 |
+
⟨ΠH,ℓ
|
761 |
+
s,ΩΩ⟩
|
762 |
+
⟨ΠH,ℓ
|
763 |
+
m,SS⟩
|
764 |
+
⟨ΠH,ℓ
|
765 |
+
m,ΩΩ⟩
|
766 |
+
⟨ΠH,ℓ
|
767 |
+
m,SΩ⟩
|
768 |
+
3·⟨ΠH,ℓ
|
769 |
+
s,SS⟩
|
770 |
+
Figure 2. Decomposed helicity fluxes normalised with the mean helicity dissipation rate εH.
|
771 |
+
Filled markers corresponds to single-scale contributions while empty symbols are related to
|
772 |
+
multi-scale contributions. The error bars indicate one standard error. The subflux ⟨ΠH,ℓ
|
773 |
+
s,SΩ⟩ has
|
774 |
+
been superposed with 3⟨ΠH,ℓ
|
775 |
+
s,SS⟩ in order to highlight the Betchov-type relation (2.19).
|
776 |
+
4. Numerical results for mean subfluxes and fluctuations
|
777 |
+
Figure 2 shows the total helicity flux and all subfluxes, normalised by the total helicity
|
778 |
+
dissipation rate εH. As can be seen in the figure, the term ⟨ΠH,ℓ
|
779 |
+
s,ΩΩ⟩ is identically zero,
|
780 |
+
which must be the case according to (2.18). Moreover, the helicity Betchov relation
|
781 |
+
(2.19) derived here is satisfied as it must be – the terms ⟨ΠH,ℓ
|
782 |
+
s,SΩ⟩ and 3 ⟨ΠH,ℓ
|
783 |
+
s,SS⟩ are
|
784 |
+
visually indistinguishable, with a relative error between them of order 10−6 (not shown).
|
785 |
+
A few further observations can be made from the data. The non-vanishing multi-scale
|
786 |
+
terms, ⟨ΠH
|
787 |
+
m,SΩ⟩, ⟨ΠH
|
788 |
+
m,SS⟩ and ⟨ΠH
|
789 |
+
m,ΩΩ⟩ are comparable in magnitude across all scales.
|
790 |
+
They are approximately scale-independent in the interval 10−2 ⩽ kη ⩽ 10−1, with each
|
791 |
+
accounting for about 15−20% of the total helicity flux in this range of scales. Even though
|
792 |
+
clear plateaux are not present for the two non-vanishing single-scale terms, ⟨ΠH
|
793 |
+
s,SΩ⟩ and
|
794 |
+
⟨ΠH
|
795 |
+
s,SS⟩, one could tentatively extrapolate that at higher Re, about 30% of the mean
|
796 |
+
flux originates from scale-local vortex twisting and 10% from vortex flattening. That is,
|
797 |
+
the multi-scale contributions amount to 50%-60% and the scale-local contributions to
|
798 |
+
40-50% of the total helicity flux across scales, at least for this particular simulation.
|
799 |
+
|
800 |
+
8
|
801 |
+
D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
|
802 |
+
−100 −75 −50 −25
|
803 |
+
0
|
804 |
+
25
|
805 |
+
50
|
806 |
+
75
|
807 |
+
100
|
808 |
+
ΠH,ℓ
|
809 |
+
X /σX
|
810 |
+
10−1
|
811 |
+
10−3
|
812 |
+
10−5
|
813 |
+
10−7
|
814 |
+
10−9
|
815 |
+
σX · P(ΠH,ℓ
|
816 |
+
X )
|
817 |
+
kη = 8.4×10−2
|
818 |
+
(a)
|
819 |
+
ΠH,ℓ
|
820 |
+
s,ΩΩ
|
821 |
+
ΠH,ℓ
|
822 |
+
s
|
823 |
+
ΠH,ℓ
|
824 |
+
s,SS
|
825 |
+
ΠH,ℓ
|
826 |
+
s,SΩ
|
827 |
+
−100 −75 −50 −25
|
828 |
+
0
|
829 |
+
25
|
830 |
+
50
|
831 |
+
75
|
832 |
+
100
|
833 |
+
ΠH,ℓ
|
834 |
+
X /σX
|
835 |
+
10−1
|
836 |
+
10−3
|
837 |
+
10−5
|
838 |
+
10−7
|
839 |
+
10−9
|
840 |
+
σX · P(ΠH,ℓ
|
841 |
+
X )
|
842 |
+
kη = 8.4×10−2
|
843 |
+
(b)
|
844 |
+
ΠH,ℓ
|
845 |
+
m,SS
|
846 |
+
ΠH,ℓ
|
847 |
+
m
|
848 |
+
ΠH,ℓ
|
849 |
+
m,SΩ
|
850 |
+
ΠH,ℓ
|
851 |
+
m,ΩΩ
|
852 |
+
Figure 3. Standardised PDFs of helicity subfluxes ΠH,ℓ
|
853 |
+
X , where X refers to the subflux identifier,
|
854 |
+
for (a) single-scale and (b) multi-scale contributions; σX denotes the standard deviation of each
|
855 |
+
respective term.
|
856 |
+
Having discussed the mean subfluxes, we now consider the fluctuations of each subflux
|
857 |
+
term, in order to quantify the level of fluctuations in each term and the presence and
|
858 |
+
magnitude of helicity backscatter. Figure 3 presents standardised probability density
|
859 |
+
functions (PDFs) of all helicity subfluxes at k = π/ℓ = 20, which is in the inertial range.
|
860 |
+
These PDFs are fairly symmetric, much more so than for the kinetic energy fluxes, have
|
861 |
+
wide tails, and are strongly non-Gaussian. Single- and multi-scale terms all have strong
|
862 |
+
fluctuations of about 75 standard deviations. Interestingly, the subflux term ΠH,ℓ
|
863 |
+
s,ΩΩ, which
|
864 |
+
necessarily vanishes in mean (see (2.18)), has the strongest fluctuations (i.e., is the most
|
865 |
+
intermittent). PDFs for all the other subfluxes are comparable. The symmetry is more
|
866 |
+
pronounced in the single-scale rather than the multi-scale terms, as can be seen by
|
867 |
+
comparison of the left and right panels of fig. 3. As all averaged fluxes (except ⟨ΠH,ℓ
|
868 |
+
s,ΩΩ⟩
|
869 |
+
which is zero) transfer positive helicity from large to small scales, symmetry in the PDFs
|
870 |
+
indicates strong backscatter of positive helicity, or forward scatter of negative helicity.
|
871 |
+
The PDFs become even broader with decreasing filter scale (not shown). A comparison
|
872 |
+
between the PDFs of ΠH,ℓ and the alternate description based on SGS stresses related
|
873 |
+
to vortex stretching, ˜ΠH,ℓ, has been carried out by Yan et al. (2020), indicating more
|
874 |
+
intense backscatter in the latter compared to the former. Adding or removing a total
|
875 |
+
gradient can strongly reduce the negative tail of the SGS energy transfer (Vela-Mart´ın
|
876 |
+
2022), and the same may apply to the helicity flux.
|
877 |
+
5. Conclusions
|
878 |
+
We have derived an exact decomposition of the helicity flux across scales in terms
|
879 |
+
of interactions between vorticity gradients and velocity gradients, and in terms of their
|
880 |
+
scale locality. Decomposing all gradient tensors into symmetric and anti-symmetric parts
|
881 |
+
allows for a discussion and quantification of different physical mechanisms that constitute
|
882 |
+
the helicity cascade. Simulation results indicate that all subfluxes transfer helicity from
|
883 |
+
large to small scales, albeit with strong backscatter. In the inertial range, about 50% of
|
884 |
+
the total mean helicity flux is due to the action of two scale-local processes: (i) vortex
|
885 |
+
flattening and (ii) vortex twisting. We have also shown that these two effects are related
|
886 |
+
in mean through a newly derived exact (Betchov-type) relation, which implies that the
|
887 |
+
contribution of the former is exactly three times larger than that of the latter. Multi-scale
|
888 |
+
effects account for the remaining 50%, with approximate equipartition between multi-
|
889 |
+
scale versions of the two aforementioned effects and multi-scale vortex entangling. Thus,
|
890 |
+
it seems likely that, in LES contexts, accurate modeling of the helicity cascade should not
|
891 |
+
neglect the multi-scale contributions. Although our numerical quantification of the fluxes
|
892 |
+
is obtained using data from a single simulation with an inertial range of limited length,
|
893 |
+
|
894 |
+
Helicity fluxes in homogeneous turbulence
|
895 |
+
9
|
896 |
+
we conjecture that the results obtained are robust in the sense that we expect them to
|
897 |
+
hold for flows with larger Reynolds numbers. Similar flux decompositions can be derived
|
898 |
+
for magnetohydrodynamics. We will report results of these investigations elsewhere in
|
899 |
+
due course.
|
900 |
+
Computational resources were provided through Scottish Academic Access on
|
901 |
+
Cirrus (www.cirrus.ac.uk), and the UK Turbulence Consortium on ARCHER2
|
902 |
+
(www.archer2.ac.uk). This work received funding from the European Research Council
|
903 |
+
(ERC) under the European Union’s Horizon 2020 research and innovation programme
|
904 |
+
(grant agreement No 882340) and from the Priority Programme SPP 1881 “Turbulent
|
905 |
+
Superstructures” of the Deutsche Forschungsgemeinschaft (DFG, Li3694/1).
|
906 |
+
Competing interests: the authors declare none.
|
907 |
+
REFERENCES
|
908 |
+
Alexakis, A. 2017 Helically Decomposed Turbulence. J. Fluid Mech. 812, 752–770.
|
909 |
+
Alexakis, A. & Biferale, L. 2018 Cascades and transitions in turbulent flows. Physics Reports
|
910 |
+
767-769, 1–101.
|
911 |
+
Baerenzung, J., Politano, H., Ponty, Y. & Pouquet, A. 2008 Spectral modeling of
|
912 |
+
turbulent flows and the role of helicity. Phys. Rev. E. 77, 046303.
|
913 |
+
Betchov, R. 1956 An inequality concerning the production of vorticity in isotropic turbulence.
|
914 |
+
J. Fluid Mech. 1, 497.
|
915 |
+
Biferale, L., Musacchio, S. & Toschi, F. 2012 Inverse energy cascade in three-dimensional
|
916 |
+
isotropic turbulence. Phys. Rev. Lett. 108, 164501.
|
917 |
+
Biferale, L., Musacchio, S. & Toschi, F. 2013 Split Energy-Helicity cascades in three
|
918 |
+
dimensional Homogeneous and Isotropic Turbulence. J. Fluid Mech. 730, 309–327.
|
919 |
+
Brandenburg, A. 2001 The inverse cascade and nonlinear alpha-effect in simulations of
|
920 |
+
isotropic helical magnetohydrodynamic turbulence. Astrophys. J. 550, 824–840.
|
921 |
+
Brandenburg, A. & Subramanian, K. 2005 Astrophysical magnetic fields and nonlinear
|
922 |
+
dynamo theory. Phys. Reports 417, 1–209.
|
923 |
+
Brissaud, A., Frisch, U., L´eorat, J., Lesieur, M. & Mazure, A. 1973 Helicity cascades
|
924 |
+
in fully developed isotropic turbulence. Phys. Fluids 16, 1366–1367.
|
925 |
+
Carbone, M. & Wilczek, M. 2022 Only two Betchov homogeneity constraints exist for
|
926 |
+
isotropic turbulence. J. Fluid Mech. 948, R2.
|
927 |
+
Chen, Q., Chen, S. & Eyink, G. L. 2003a The joint cascade of energy and helicity in three-
|
928 |
+
dimensional turbulence. Phys. Fluids 15, 361–374.
|
929 |
+
Chen, Q., Chen, S., Eyink, G. L. & Holm, D. D. 2003b Intermittency in the joint cascade
|
930 |
+
of energy and helicity. Phys. Rev. Lett. 90, 214503.
|
931 |
+
Constantin, P. & Majda, A. 1988 The Beltrami spectrum for incompressible flows. Commun.
|
932 |
+
Math. Phys. 115, 435–456.
|
933 |
+
Deusebio, E. & Lindborg, E. 2014 Helicity in the Ekman boundary layer. J. Fluid Mech.
|
934 |
+
755, 654–671.
|
935 |
+
Eyink, G. L. 2005 Locality of turbulent cascades. Physica D 207, 91–116.
|
936 |
+
Eyink, G. L. 2006 Multi-scale gradient expansion of the turbulent stress tensor. J. Fluid Mech.
|
937 |
+
549, 159–190.
|
938 |
+
Germano, M. 1992 Turbulence — the filtering approach. J. Fluid Mech. 238, 325–336.
|
939 |
+
Gledzer, E. B. & Chkhetiani, O. G. 2015 Inverse energy cascade in developed turbulence
|
940 |
+
at the breaking of the symmetry of helical modes. JETP Letters 102, 465–472.
|
941 |
+
Herring, J. R. 1974 Approach of axisymmetric turbulence to isotropy. Phys. Fluids 17, 859.
|
942 |
+
Inagaki, K., Yokoi, N. & Hamba, F. 2017 Mechanism of mean flow generation in rotating
|
943 |
+
turbulence through inhomogeneous helicity. Phys. Rev. Fluids 2, 114605.
|
944 |
+
Johnson, P. L. 2020 Energy transfer from large to small scales in turbulence by multiscale
|
945 |
+
nonlinear strain and vorticity interactions. Phys. Rev. Lett. 124, 104501.
|
946 |
+
Johnson, P. L. 2021 On the role of vorticity stretching and strain self-amplification in the
|
947 |
+
turbulence energy cascade. J. Fluid Mech. 922, A3.
|
948 |
+
|
949 |
+
10
|
950 |
+
D. Capocci, P. Johnson, S. Oughton, L. Biferale, M. Linkmann
|
951 |
+
Kessar, M., Plunian, F., Stepanov, R. & Balarac, G. 2015 Non-Kolmogorov cascade of
|
952 |
+
helicity-driven turbulence. Phys. Rev. E 92, 031004(R).
|
953 |
+
Kraichnan, R. 1973 Helical turbulence and absolute equilibrium. J. Fluid Mech. 59, 745–752.
|
954 |
+
Li, Y., Meneveau, C., Chen, S. & Eyink, G. L. 2006 Subgrid-scale modeling of helicity and
|
955 |
+
energy dissipation in helical turbulence. Phys. Rev. E. 74, 026310.
|
956 |
+
Lilly, D. K. 1986 The structure, energetics, and propagation of rotating convective storms.
|
957 |
+
Part II: Helicity and storm stabilization. J. Atmos. Sci. 43, 126.
|
958 |
+
Linkmann, M. 2018 Effects of helicity on dissipation in homogeneous box turbulence. J. Fluid
|
959 |
+
Mech. 856, 79–102.
|
960 |
+
Linkmann, M. F., Berera, A., McKay, M. E. & J¨ager, J. 2016 Helical mode interactions
|
961 |
+
and spectral energy transfer in magnetohydrodynamic turbulence. J. Fluid Mech. 791,
|
962 |
+
61–96.
|
963 |
+
Linkmann, M. F., Sahoo, G., McKay, M. E., Berera, A. & Biferale, L. 2017 Effects
|
964 |
+
of Magnetic and Kinetic Helicities on the Growth of Magnetic Fields in Laminar and
|
965 |
+
Turbulent Flows by Helical Fourier Decomposition. Astrophys. J. 836, 26.
|
966 |
+
Milanese, L. M., Loureiro, N. F. & Boldyrev, S. 2021 Dynamic Phase Alignment in
|
967 |
+
Navier-Stokes Turbulence. Phys. Rev. Lett. 127, 274501.
|
968 |
+
Mininni, P. D. & Pouquet, A. G. 2010a Rotating helical turbulence. I. Global evolution and
|
969 |
+
spectral behavior. Phys. Fluids 22, 035105.
|
970 |
+
Mininni, P. D. & Pouquet, A. G. 2010b Rotating helical turbulence. II. Intermittency, scale
|
971 |
+
invariance, and structures. Phys. Fluids 22, 035106.
|
972 |
+
Moffatt, H. K. 1969 The degree of knottedness of tangled vortex lines. J. Fluid Mech. 35,
|
973 |
+
117–129.
|
974 |
+
Moffatt, H. K. 2014 Helicity and singular structures in fluid dynamics. Proc. Natl. Acad. Sci.
|
975 |
+
111 (10), 3663–3670.
|
976 |
+
Sahoo, G., Alexakis, A. & Biferale, L. 2017 Discontinuous transition from direct to inverse
|
977 |
+
cascade in three-dimensional turbulence. Phys. Rev. Lett. 118, 164501.
|
978 |
+
Sahoo, G., Bonaccorso, F. & Biferale, L. 2015 Role of helicity for large- and small-scale
|
979 |
+
turbulent fluctuations. Phys. Rev. E 92, 051002.
|
980 |
+
Scheeler, M. W., van Rees, W. M., Kedia, H., Kleckner, D. & Irvine, W. T. M. 2017
|
981 |
+
Complete measurement of helicity and its dynamics in vortix tubes. Science 357, 487–491.
|
982 |
+
Steenbeck, M., Krause, F. & R¨adler, K.-H. 1966 Berechnung der mittleren Lorentz-
|
983 |
+
Feldst¨arke v x B f¨ur ein elektrisch leitendes Medium in turbulenter, durch Coriolis-Kr¨afte
|
984 |
+
beeinflußter Bewegung. Z. Naturforsch. A 21, 369.
|
985 |
+
Stepanov, R., Golbraikh, E., Frick, P. & Shestakov, A. 2015 Hindered energy cascade
|
986 |
+
in highly helical isotropic turbulence. Phys. Rev. Lett. 115, 234501.
|
987 |
+
Tobias, S. M., Cattaneo, F. & Boldyrev, S. 2013 MHD Dynamos and Turbulence. In Ten
|
988 |
+
Chapters in Turbulence. Cambridge University Press.
|
989 |
+
Vela-Mart´ın, A. 2022 Subgrid-scale models of isotropic turbulence need not produce energy
|
990 |
+
backscatter. J. Fluid Mech. 937, A14.
|
991 |
+
Waleffe, F. 1992 The nature of triad interactions in homogeneous turbulence. Phys. Fluids A
|
992 |
+
4, 350–363.
|
993 |
+
Yan, Z., Li, X., Yu, C., Wang, J. & Chen, S. 2020 Dual channels of helicity cascade in
|
994 |
+
turbulent flows. J. Fluid Mech. 894, R2.
|
995 |
+
Yokoi, N. & Yoshizawa, A. 1993 Statistical analysis of the effects of helicity in inhomogeneous
|
996 |
+
turbulence. Phys. Fluids A 5, 464.
|
997 |
+
Yu, C, Hu, R., Yan, Z. & Li, X. 2022 Helicity distributions and transfer in turbulent channel
|
998 |
+
flows with streamwise rotation. J. Fluid Mech. 940, A18.
|
999 |
+
|
29E2T4oBgHgl3EQf5whX/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
3NAzT4oBgHgl3EQfR_tE/content/2301.01224v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a0a74cf5e0a8243aa19a754da43f85d47a14264f056629ac94945cc226fbf8a7
|
3 |
+
size 7402666
|
5NE3T4oBgHgl3EQfpArI/content/tmp_files/2301.04639v1.pdf.txt
ADDED
@@ -0,0 +1,131 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Experimental verification of the temperature coefficient of
|
2 |
+
resistivity
|
3 |
+
Robert D. Polak1, Michael R. Harris1, Kiet A. Nguyen1, and Anthony Kearns1
|
4 |
+
1Department of Physics, Loyola University Chicago, Chicago, IL 60660, USA
|
5 |
+
We have created an experimental procedure for determining the temperature coefficient of resis-
|
6 |
+
tivity, αR, for introductory physics laboratories. As in the procedure from Henry [1], this method
|
7 |
+
examines the relationship between temperature and resistivity to establish αR within 10% of the
|
8 |
+
accepted value.
|
9 |
+
Electrical resistivity, ρ, varies with temperature according to:
|
10 |
+
ρ = ρo(1 + αR(T − To))
|
11 |
+
(1)
|
12 |
+
where ρo is the resistivity for a given temperature To, T is the temperature of the material, and αR
|
13 |
+
is the temperature coefficient of resistivity. For a wire of length, L, and cross-sectional area, A, the
|
14 |
+
resistance of a wire, R, is defined accordingly as
|
15 |
+
R = ρ L
|
16 |
+
A .
|
17 |
+
(2)
|
18 |
+
While resistance will increase as a product of both increased length and resistivity, the increase in
|
19 |
+
length provides a negligible increase in resistance. This is evident from observing that the thermal
|
20 |
+
coefficient of resistivity is approximately two orders of magnitude larger than the coefficient of
|
21 |
+
thermal expansion. As such, the change in resistivity is primarily responsible for the increase in
|
22 |
+
resistance. Hence, R will vary similarly with
|
23 |
+
R = Ro(1 + αR(T − To))
|
24 |
+
(3)
|
25 |
+
where Ro is the resistance of the wire at a temperature To.
|
26 |
+
By applying a current through the wire, its temperature will also vary as a result of Joule heating
|
27 |
+
and the resistance of the wire can be measured based on a given current, I, and difference in voltage,
|
28 |
+
∆V , by
|
29 |
+
R = ∆V
|
30 |
+
I
|
31 |
+
.
|
32 |
+
(4)
|
33 |
+
Hence, by measuring the resistance as a function of temperature, we can determine αR by plotting
|
34 |
+
R vs. T − To and performing a linear fit using Eq. (3).
|
35 |
+
To perform the experiment, we created a closed circuit (see Fig. 1) in which a carbon steel
|
36 |
+
wire [2] is suspended under tension above a surface, as in most stringed instruments. Two digital
|
37 |
+
1
|
38 |
+
arXiv:2301.04639v1 [physics.ed-ph] 21 Nov 2022
|
39 |
+
|
40 |
+
multimeters were used to record the voltage across and current through a 0.016 inch (0.406 mm)
|
41 |
+
diameter, 40-cm long wire. Temperature measurements were taken using liquid crystal thermometers
|
42 |
+
[3] placed in thermal contact with the wire by fastening them to the wire with an adhesive backing.
|
43 |
+
Two thermometers were used, one ranging from 14−31oC and the other from 32−49oC, to provide
|
44 |
+
an overall temperature range of 14−49oC. For the most accurate temperature readings, we found it
|
45 |
+
is essential to avoid all contact with the thermometers during the experiment. To collect the data,
|
46 |
+
we applied different currents to the wire, ranging from 0.2A to 1.0A. We used a BK Precision 1787B
|
47 |
+
power supply that allows for digital control of the current. We found that having initial steps of
|
48 |
+
0.2A and later reduced to 0.1A created consistent temperature changes in the wire of 2 − 3oC. The
|
49 |
+
experiment proved much more difficult to complete using an analog power supply because of the
|
50 |
+
difficulty in creating the precise changes in current needed to have a well formed data set. After
|
51 |
+
allowing around 30 seconds for the system to reach thermal equilibrium, the recorded temperature of
|
52 |
+
each trial was given as the uppermost visible temperature reading of the liquid crystal thermometer,
|
53 |
+
as seen in Fig. 2. We recorded the temperature of, current through and voltage across the wire, and
|
54 |
+
calculated its resistance using Eq. (4).
|
55 |
+
By graphing the resistance of the wire as a function of T −To, where To is the temperature of the
|
56 |
+
wire with the lowest current applied, we can then apply a linear fit to the data with the y-intercept
|
57 |
+
yielding Ro and slope giving RoαR, according to Eq. (3). Figure 4 shows example experimental
|
58 |
+
results with the fit giving Ro = 0.744Ω and αR = 0.0039K−1. This is within 5% of the accepted
|
59 |
+
value of αR = 0.0041K−1 [4]. Repeated experiments found these results to be reproducible with αR
|
60 |
+
consistently measured within 10% of the accepted value.
|
61 |
+
To get the best results, we found that the resistance of the wire should be at least 0.3Ω to allow
|
62 |
+
for accurate resistance measurements. Furthermore, the wires need to be thick enough to support
|
63 |
+
the thermometers.
|
64 |
+
As such, we achieved the best results when using steel as opposed to other
|
65 |
+
materials with lower resistivity and tensile strength, such as copper and aluminum.
|
66 |
+
This experiment can be completed in less than 2 hours and uses equipment that is commonly
|
67 |
+
present in a typical introductory physics lab, with the exception of relatively low cost supplies such
|
68 |
+
as music wire and liquid crystal thermometers. It also reinforces key ideas from introductory physics
|
69 |
+
such as conservation of energy, where electrical energy becomes thermal energy, Ohm’s Law, and
|
70 |
+
the temperature dependence of resistance.
|
71 |
+
References
|
72 |
+
1. D. Henry, “Resistance of a wire as a function of temperature”, The Physics Teacher 33, 96-97
|
73 |
+
(1995) https://doi.org/10.1119/1.2344149
|
74 |
+
2. Precision Brand Music Wire (0.016 inch diameter); UPC. No. 21016
|
75 |
+
3. TelaTemp reversible LCT strip model 416-2 (14 − 31oC) and 416-3 (32 − 49oC)
|
76 |
+
4. S. Yafei , N. Dongjie, and S. Jing, 4th IEEE Conference on Industrial Electronics and Applications,
|
77 |
+
368-372 (2009).
|
78 |
+
2
|
79 |
+
|
80 |
+
Figure 1: The experimental setup (bottom) with the wire suspended above the box, and a circuit
|
81 |
+
diagram (top). The circuit consists of two multimeters set up to measure current and voltage and a
|
82 |
+
digital power supply. The liquid crystal thermometers are affixed to the top of the wire.
|
83 |
+
Figure 2: An example of a temperature reading corresponding to 37◦C (98◦F), according to the
|
84 |
+
procedure of reading the uppermost visible indication of the liquid crystal thermometer (the yellow
|
85 |
+
bar spanning 37◦C).
|
86 |
+
3
|
87 |
+
|
88 |
+
L.C.Thermometers
|
89 |
+
Power
|
90 |
+
V
|
91 |
+
Supply
|
92 |
+
A
|
93 |
+
20cm
|
94 |
+
15
|
95 |
+
40
|
96 |
+
25
|
97 |
+
30
|
98 |
+
10
|
99 |
+
35
|
100 |
+
TonsKala
|
101 |
+
NEVA10440
|
102 |
+
102
|
103 |
+
39
|
104 |
+
100
|
105 |
+
38
|
106 |
+
98
|
107 |
+
37
|
108 |
+
5
|
109 |
+
35
|
110 |
+
34
|
111 |
+
33Figure 3: Plot of resistance against the associated change in temperature for currents from 0.2 A to
|
112 |
+
1.0 A. A linear fit of the data yields αR = 0.0039K−1.
|
113 |
+
4
|
114 |
+
|
115 |
+
0.80 -
|
116 |
+
0.79-
|
117 |
+
0.78
|
118 |
+
R
|
119 |
+
0.77
|
120 |
+
0.76 -
|
121 |
+
0.75
|
122 |
+
0.0
|
123 |
+
2.5
|
124 |
+
5.0
|
125 |
+
7.5
|
126 |
+
10.0
|
127 |
+
12.5
|
128 |
+
15.0
|
129 |
+
17.5
|
130 |
+
20.0
|
131 |
+
T- To (K)
|
5NE3T4oBgHgl3EQfpArI/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,95 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf,len=94
|
2 |
+
page_content='Experimental verification of the temperature coefficient of resistivity Robert D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
3 |
+
page_content=' Polak1, Michael R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
4 |
+
page_content=' Harris1, Kiet A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
5 |
+
page_content=' Nguyen1, and Anthony Kearns1 1Department of Physics, Loyola University Chicago, Chicago, IL 60660, USA We have created an experimental procedure for determining the temperature coefficient of resis- tivity, αR, for introductory physics laboratories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
6 |
+
page_content=' As in the procedure from Henry [1], this method examines the relationship between temperature and resistivity to establish αR within 10% of the accepted value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
7 |
+
page_content=' Electrical resistivity, ρ, varies with temperature according to: ρ = ρo(1 + αR(T − To)) (1) where ρo is the resistivity for a given temperature To, T is the temperature of the material, and αR is the temperature coefficient of resistivity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
8 |
+
page_content=' For a wire of length, L, and cross-sectional area, A, the resistance of a wire, R, is defined accordingly as R = ρ L A .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
9 |
+
page_content=' (2) While resistance will increase as a product of both increased length and resistivity, the increase in length provides a negligible increase in resistance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
10 |
+
page_content=' This is evident from observing that the thermal coefficient of resistivity is approximately two orders of magnitude larger than the coefficient of thermal expansion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
11 |
+
page_content=' As such, the change in resistivity is primarily responsible for the increase in resistance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
12 |
+
page_content=' Hence, R will vary similarly with R = Ro(1 + αR(T − To)) (3) where Ro is the resistance of the wire at a temperature To.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
13 |
+
page_content=' By applying a current through the wire, its temperature will also vary as a result of Joule heating and the resistance of the wire can be measured based on a given current, I, and difference in voltage, ∆V , by R = ∆V I .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
14 |
+
page_content=' (4) Hence, by measuring the resistance as a function of temperature, we can determine αR by plotting R vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
15 |
+
page_content=' T − To and performing a linear fit using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
16 |
+
page_content=' (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
17 |
+
page_content=' To perform the experiment, we created a closed circuit (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
18 |
+
page_content=' 1) in which a carbon steel wire [2] is suspended under tension above a surface, as in most stringed instruments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
19 |
+
page_content=' Two digital 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
20 |
+
page_content='04639v1 [physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
21 |
+
page_content='ed-ph] 21 Nov 2022 multimeters were used to record the voltage across and current through a 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
22 |
+
page_content='016 inch (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
23 |
+
page_content='406 mm) diameter, 40-cm long wire.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
24 |
+
page_content=' Temperature measurements were taken using liquid crystal thermometers [3] placed in thermal contact with the wire by fastening them to the wire with an adhesive backing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
25 |
+
page_content=' Two thermometers were used, one ranging from 14−31oC and the other from 32−49oC, to provide an overall temperature range of 14−49oC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
26 |
+
page_content=' For the most accurate temperature readings, we found it is essential to avoid all contact with the thermometers during the experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
27 |
+
page_content=' To collect the data, we applied different currents to the wire, ranging from 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
28 |
+
page_content='2A to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
29 |
+
page_content='0A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
30 |
+
page_content=' We used a BK Precision 1787B power supply that allows for digital control of the current.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
31 |
+
page_content=' We found that having initial steps of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
32 |
+
page_content='2A and later reduced to 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
33 |
+
page_content='1A created consistent temperature changes in the wire of 2 − 3oC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
34 |
+
page_content=' The experiment proved much more difficult to complete using an analog power supply because of the difficulty in creating the precise changes in current needed to have a well formed data set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
35 |
+
page_content=' After allowing around 30 seconds for the system to reach thermal equilibrium, the recorded temperature of each trial was given as the uppermost visible temperature reading of the liquid crystal thermometer, as seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
36 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
37 |
+
page_content=' We recorded the temperature of, current through and voltage across the wire, and calculated its resistance using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
38 |
+
page_content=' (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
39 |
+
page_content=' By graphing the resistance of the wire as a function of T −To, where To is the temperature of the wire with the lowest current applied, we can then apply a linear fit to the data with the y-intercept yielding Ro and slope giving RoαR, according to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
40 |
+
page_content=' (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
41 |
+
page_content=' Figure 4 shows example experimental results with the fit giving Ro = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
42 |
+
page_content='744Ω and αR = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
43 |
+
page_content='0039K−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
44 |
+
page_content=' This is within 5% of the accepted value of αR = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
45 |
+
page_content='0041K−1 [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
46 |
+
page_content=' Repeated experiments found these results to be reproducible with αR consistently measured within 10% of the accepted value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
47 |
+
page_content=' To get the best results, we found that the resistance of the wire should be at least 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
48 |
+
page_content='3Ω to allow for accurate resistance measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
49 |
+
page_content=' Furthermore, the wires need to be thick enough to support the thermometers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
50 |
+
page_content=' As such, we achieved the best results when using steel as opposed to other materials with lower resistivity and tensile strength, such as copper and aluminum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
51 |
+
page_content=' This experiment can be completed in less than 2 hours and uses equipment that is commonly present in a typical introductory physics lab, with the exception of relatively low cost supplies such as music wire and liquid crystal thermometers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
52 |
+
page_content=' It also reinforces key ideas from introductory physics such as conservation of energy, where electrical energy becomes thermal energy, Ohm’s Law, and the temperature dependence of resistance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
53 |
+
page_content=' References 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
54 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
55 |
+
page_content=' Henry, “Resistance of a wire as a function of temperature”, The Physics Teacher 33, 96-97 (1995) https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
56 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
57 |
+
page_content='1119/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
58 |
+
page_content='2344149 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
59 |
+
page_content=' Precision Brand Music Wire (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
60 |
+
page_content='016 inch diameter);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
61 |
+
page_content=' UPC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
62 |
+
page_content=' No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
63 |
+
page_content=' 21016 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
64 |
+
page_content=' TelaTemp reversible LCT strip model 416-2 (14 − 31oC) and 416-3 (32 − 49oC) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
65 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
66 |
+
page_content=' Yafei , N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
67 |
+
page_content=' Dongjie, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
68 |
+
page_content=' Jing, 4th IEEE Conference on Industrial Electronics and Applications, 368-372 (2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
69 |
+
page_content=' 2 Figure 1: The experimental setup (bottom) with the wire suspended above the box, and a circuit diagram (top).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
70 |
+
page_content=' The circuit consists of two multimeters set up to measure current and voltage and a digital power supply.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
71 |
+
page_content=' The liquid crystal thermometers are affixed to the top of the wire.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
72 |
+
page_content=' Figure 2: An example of a temperature reading corresponding to 37◦C (98◦F), according to the procedure of reading the uppermost visible indication of the liquid crystal thermometer (the yellow bar spanning 37◦C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
73 |
+
page_content=' 3 L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
74 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
75 |
+
page_content='Thermometers Power V Supply A 20cm 15 40 25 30 10 35 TonsKala NEVA10440 102 39 100 38 98 37 5 35 34 33Figure 3: Plot of resistance against the associated change in temperature for currents from 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
76 |
+
page_content='2 A to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
77 |
+
page_content='0 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
78 |
+
page_content=' A linear fit of the data yields αR = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
79 |
+
page_content='0039K−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
80 |
+
page_content=' 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
81 |
+
page_content='80 - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
82 |
+
page_content='79- 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
83 |
+
page_content='78 R 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
84 |
+
page_content='77 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
85 |
+
page_content='76 - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
86 |
+
page_content='75 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
87 |
+
page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
88 |
+
page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
89 |
+
page_content='0 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
90 |
+
page_content='5 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
91 |
+
page_content='0 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
92 |
+
page_content='5 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
93 |
+
page_content='0 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
94 |
+
page_content='5 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
95 |
+
page_content='0 T- To (K)' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5NE3T4oBgHgl3EQfpArI/content/2301.04639v1.pdf'}
|
5dAyT4oBgHgl3EQfcfda/content/2301.00283v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:12d5de394da3173c221a606599ef5884ce4875a7e9a7219b916e7ca716d73512
|
3 |
+
size 128709
|
5dAyT4oBgHgl3EQfcfda/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6db39fcef97b8837e433555f494c7dbd4cb80a9ff2485bfff62ca2b90d842359
|
3 |
+
size 1245229
|
5dAyT4oBgHgl3EQfcfda/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:152a6f1e55d80ec87598eb80d6c1a6079cea720d8aaa99b6060a9c251a1648f6
|
3 |
+
size 45128
|
7NE3T4oBgHgl3EQfqApm/content/tmp_files/2301.04647v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
7tAzT4oBgHgl3EQfSPsA/content/2301.01227v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8d358250e55aedcfc2b93c2cd797212f4d9bc12a879a1405073f4a9f2bcb40c0
|
3 |
+
size 2505252
|
7tAzT4oBgHgl3EQfSPsA/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4112d3584753430b4e5c801a8e8310303d1969d5d10793d7f1f09260d5ea2d2d
|
3 |
+
size 10354733
|
7tAzT4oBgHgl3EQfSPsA/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ad54c4a1b9090da4cc2be3a805be1da93b0f8c8952aa03e3899187fc47b37652
|
3 |
+
size 411471
|
8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/2301.04216v1.pdf.txt
ADDED
@@ -0,0 +1,1215 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
An Efficient Drifters Deployment Strategy to
|
2 |
+
Evaluate Water Current Velocity Fields
|
3 |
+
Murad Tukan, Eli Biton, Roee Diamant, Senior Member, IEEE
|
4 |
+
Abstract
|
5 |
+
Water current prediction is essential for understanding ecosystems, and to shed light on the role
|
6 |
+
of the ocean in the global climate context. Solutions vary from physical modeling, and long-term
|
7 |
+
observations, to short-term measurements. In this paper, we consider a common approach for water
|
8 |
+
current prediction that uses Lagrangian floaters for water current prediction by interpolating the trajectory
|
9 |
+
of the elements to reflect the velocity field. Here, an important aspect that has not been addressed before
|
10 |
+
is where to initially deploy the drifting elements such that the acquired velocity field would efficiently
|
11 |
+
represent the water current. To that end, we use a clustering approach that relies on a physical model of
|
12 |
+
the velocity field. Our method segments the modeled map and determines the deployment locations as
|
13 |
+
those that will lead the floaters to ’visit’ the center of the different segments. This way, we validate that
|
14 |
+
the area covered by the floaters will capture the in-homogeneously in the velocity field. Exploration over
|
15 |
+
a dataset of velocity field maps that span over a year demonstrates the applicability of our approach,
|
16 |
+
and shows a considerable improvement over the common approach of uniformly randomly choosing the
|
17 |
+
initial deployment sites. Finally, our implementation code can be found in [1].
|
18 |
+
Index Terms
|
19 |
+
Water currents, Positioning, Data processing, Coresets, Lagrangian floaters.
|
20 |
+
M. Tukan(corresponding author [email protected]) and R. Diamant are with the Department of Marine Technologies,
|
21 |
+
University of Haifa, 3498838 Haifa, Israel.
|
22 |
+
E. Biton is with the Dept. of physical oceanography, Israel Oceanographic and Limnological Research, 3109701 Haifa, Israel.
|
23 |
+
This work was sponsored in part by the MOST-BMBF German-Israeli Cooperation in Marine Sciences 2018-2020 (Grant #
|
24 |
+
3-16573), by the MOST action for Agriculture, Environment, and Water for the year 2019 (Grant # 3-16728), and by a grant
|
25 |
+
from the University of Haifa’s Data Science Research Center. This work has been submitted to the IEEE for possible publication.
|
26 |
+
Copyright may be transferred without notice, after which this version may no longer be accessible.
|
27 |
+
arXiv:2301.04216v1 [cs.LG] 10 Jan 2023
|
28 |
+
|
29 |
+
I. INTRODUCTION
|
30 |
+
Knowledge and information about the ocean’s flow is highly applicable to scientific purposes
|
31 |
+
such as climate change, global heat distribution, air-sea interactions, eddy formations, convection,
|
32 |
+
tides, biological productivity, to name a few. Prediction of the water current is also required for
|
33 |
+
operational needs such as marine conservation, search and rescue, the fishing industry, navigation,
|
34 |
+
the development of marine infrastructure, tracking oil-spill distribution, tsunami warnings, and
|
35 |
+
renewable energy. The study of the complex oceanic flow field variability - characterized by
|
36 |
+
a wide range of spatial-temporal scales of processes - demands the combination of physical
|
37 |
+
models and observations. In particular, the latter can be used to calibrate or to validate the
|
38 |
+
model’s parameters, as well as to serve as a database for statistical evaluation.
|
39 |
+
Existing systems for directly measuring the water current (WC) mostly involve current profiling
|
40 |
+
at a fixed deployment position, such as acoustic Doppler current profiles (e.g., ADCPs), or cover
|
41 |
+
extensive areas, but only of the sea surface (e.g., HF radar and satellite elevation data). The data
|
42 |
+
collected is used as an input for analytical and numerical models in a data assimilation fashion [2],
|
43 |
+
[3], [4]. These models rely on local environmental information such as temperature, wind velocity,
|
44 |
+
bathythermy and bathytermic, and need to be calibrated [5], [6] Another solution is to use
|
45 |
+
Lagrangian floaters to in-situ evaluate the velocity field for data assimilation. Recently, [7] has
|
46 |
+
developed a methodology to estimate the 3D flow field, based on the tracking of the trajectories of
|
47 |
+
surface or submerged floaters. The method has been successfully implemented to restore/complete
|
48 |
+
data gaps in a flow field. Other works have shown that the accuracy of the estimated flow field
|
49 |
+
depends not only on the number of floats, but also on the locations of their initial deployments [8].
|
50 |
+
As such, it is necessary to develop sophisticated methods for optimal dispersion of the floaters.
|
51 |
+
Clearly, this optimal setup should be related to the flow’s characteristics.
|
52 |
+
In this work, we develop a scheme how to plan ahead the initial positioning of Lagrangian
|
53 |
+
floaters, such as to improve flow field reconstruction [7], [9].
|
54 |
+
Our scheme is useful as a perpetration for in-situ calibration of a given water current flow field
|
55 |
+
model. We analyze a given flow field map that is generated by a physical model to plan where
|
56 |
+
to initially deploy a fixed number of floats. After executing our deployment planning scheme,
|
57 |
+
the floats are released at the proposed locations and move freely with the water current for a
|
58 |
+
|
59 |
+
fixed time frame, while their locations is tracked by e.g., acoustic positioning [10]. After this
|
60 |
+
in-situ operation, the trajectories of the floats are used to generate a flow field using e.g., [7] or
|
61 |
+
to validate or calibrate the given physical model. In the above described process, as illustrated
|
62 |
+
good coverage of the flow field by the floats is required. This is illustrated in the two examples in
|
63 |
+
Fig. 1. Here, we include a map of the WC velocity field’s magnitude and heading by the length
|
64 |
+
and direction of the dark arrows. We observe homogeneous areas in the WC by small variations
|
65 |
+
of the arrows and areas of a complex WC structure by a large diversity in the size and direction
|
66 |
+
of the arrows. A group of 3 floats marked in orange lines are deployed in homogeneous sections
|
67 |
+
of the flow field and thus do not capture the complexity of the water current, whereas a group
|
68 |
+
of floats marked in green lines is well distributed to pass through all diverse sections in the
|
69 |
+
flow field map. Clearly, the difference between the two groups is by their initial position. Our
|
70 |
+
approach applies machine learning tools over the given flow field map. Particularly, inspired by
|
71 |
+
computational geometry, we turn to coresets for the task of planning the initial location of the
|
72 |
+
floaters. Informally speaking, given input data, a coreset is a weighted subset of the original data
|
73 |
+
that approximates the original data in some provable sense with respect to a (usually infinite)
|
74 |
+
set of queries or models and an objective loss/cost function [11]. We use coresets to find those
|
75 |
+
“regions of interest” where the floaters should visit in order to most efficiently represent the WC
|
76 |
+
structure. The method is tested on a finite resolution circulation model results that span over a
|
77 |
+
year. Results show that using our algorithm, the floats better capture the complex structure of
|
78 |
+
the WC, compared to the case of randomly deploying the floaters.
|
79 |
+
To the best of our knowledge, our approach is the first to consider the problem of optimal de-
|
80 |
+
ployment of floats for the task of WC prediction and is the first to use coresets for oceanographic
|
81 |
+
applications. Our contribution is threefold:
|
82 |
+
(i) A coreset-based solution for WC segmentation. A novel partitioning of the WC velocity
|
83 |
+
field into segments of homogenous WC.
|
84 |
+
(ii) A clustering scheme for the segmentation of the WC’s flow field. Primarily, reducing the
|
85 |
+
problem of WC clustering into an instance of sets clustering.
|
86 |
+
(iii) A sub-optimal solution to determine the deployment location of floaters for WC’s estimation.
|
87 |
+
A graph theory-based approach to plan the deployment location of floaters such that the
|
88 |
+
|
89 |
+
Fig. 1: The setting of a real-time sea experiment. This map was generated using SHYFEM [12]
|
90 |
+
(System of Hydrodynamic Finite Element Modules) by setting different variables, e.g.,
|
91 |
+
bathymetry, wind velocity, wind direction, etc. The direction of any arrow describes the direction
|
92 |
+
of the WC at that discrete position p, while the length of the arrow represents the speed of the
|
93 |
+
WC at p.
|
94 |
+
floaters explore the different clusters of the WC.
|
95 |
+
The paper is organized as follows. Related work is discussed in Section II. System setup
|
96 |
+
and preliminaries are given in Section III. In Section IV, we discuss the methodology of our
|
97 |
+
proposed approach. Section V presents the numerical and experimental results, and conclusions
|
98 |
+
are drawn in Section VI.
|
99 |
+
|
100 |
+
30
|
101 |
+
25
|
102 |
+
20
|
103 |
+
15
|
104 |
+
10
|
105 |
+
5
|
106 |
+
0
|
107 |
+
0
|
108 |
+
5
|
109 |
+
10
|
110 |
+
15
|
111 |
+
20
|
112 |
+
25
|
113 |
+
30II. RELATED WORK
|
114 |
+
Constructing WC flow fields based on Lagrangian particle trajectories has been gaining increas-
|
115 |
+
ing attention over recent years [13], [14]. The main difference between the available approaches
|
116 |
+
lies on the formalization of the relationships between the floaters’ trajectories. In [15], a model
|
117 |
+
for the flow field is used to find such a connection. Another solution is offered in [7], where the
|
118 |
+
relations between drifter trajectories are calculated by statistical models. In [16], a cooperative
|
119 |
+
solution is adopted to recover the flow field by formulating the integration error. Specifically, the
|
120 |
+
motion-integration errors of multiple autonomous underwater vehicles (AUVs) in a 2D flow are
|
121 |
+
obtained. The relation between the flow model and motion-integration errors is then formulated
|
122 |
+
as a system of nonlinear equations followed by an iterative algorithm that is designed to estimate
|
123 |
+
the flow field. While the above techniques for data assimilation are able to merge measurements
|
124 |
+
with a model to estimate the WC, as shown in [17], the results are sensitive to the initial
|
125 |
+
deployment of the drifters. More specifically, an overly-close deployment would not capture the
|
126 |
+
spatial dependency of the velocity field, while a too-far deployment, even below the Rossby
|
127 |
+
radius of deformation, may break the assumed correlation between the sensors’ drifting velocity.
|
128 |
+
A key challenge in determining the floaters’ deployment locations is to spread the sensors
|
129 |
+
across diverse sections of the explored area. One option is to allow maneuvering such that floaters
|
130 |
+
can escape areas of homogeneous velocity field [18]. Another option is to direct the initial floater
|
131 |
+
positions along the out-flowing branch of Lagrangian boundaries for better relative dispersion
|
132 |
+
of floaters [19]. In contrast, in [20] a sequential protocol was employed, where floaters are
|
133 |
+
deployed one after the other, and their deployment locations are based on the trajectory obtained
|
134 |
+
by the previously deployed floaters. First, the flow field is estimated using Gaussian processes
|
135 |
+
(GP) [21], followed by trajectory estimation using OpenDrift [22]. The estimated trajectories are
|
136 |
+
then ranked to find the next deployment location with the aim of obtaining a longer, unexplored,
|
137 |
+
trajectory. The process then repeats until all floaters are deployed. While this method holds
|
138 |
+
potential for exploring non-homogeneous patches in the velocity field, its optimality can only
|
139 |
+
be reached when a large number of floats are in use. Further, the method makes perhaps a too
|
140 |
+
hard assumption that the WC is stable throughout a long enough observation window to deploy
|
141 |
+
and recover the floats one by one.
|
142 |
+
|
143 |
+
While the models above are comparative to our work, they either assumed that (i) the moving
|
144 |
+
agents have the ability to maneuver their own path, (ii) a large number of floaters is available
|
145 |
+
to ensure good quality, (iii) or the velocity field is stable throughout a long enough observation
|
146 |
+
window. These assumptions may be too hard in practical cases where the WC is time-varying,
|
147 |
+
and when the number of floaters is limited. For these cases, we present an alternative solution.
|
148 |
+
III. SYSTEM MODEL
|
149 |
+
A. Setup details
|
150 |
+
Consider a set of K submerged floaters X = {1, · · · , K}, each of which drifts with the
|
151 |
+
WC for a time frame of T seconds. During their operations, the floaters’ locations are known
|
152 |
+
- either through a self-navigation process or using acoustic localization [23]. The analysis is
|
153 |
+
performed over a given time instance, 0 < t < T, that can be configured according to the
|
154 |
+
expected time it takes a float to cover the given area for exploration. In this time frame, each
|
155 |
+
of the floaters in X measures the velocity of the WC. This can be done directly, using sensors
|
156 |
+
like Doppler velocity loggers; indirectly, using the time-varying position of the floaters; or by
|
157 |
+
simple periodic surfacing to obtain GPS fixes as performed for the Argo floaters [24]. Assuming
|
158 |
+
for simplicity, that at time instance t only one of the floaters measures the WC, we construct
|
159 |
+
vector p(t) = [px(t), py(t), pz(t), t] for the x and y UTM coordinates of the floater, its depth
|
160 |
+
pz(t) in meters, and the observation’s time instance, t, respectively. Similarly, we obtain vector
|
161 |
+
v(t) = [vx(t), vy(t), vz(t)] representing the WC’s speed at the x, y, and z directions, respectively.
|
162 |
+
We consider two scenarios: 1) the floaters are recovered after T seconds and the prediction
|
163 |
+
of the WC’s velocity field is performed offline, and 2) the prediction is performed online based
|
164 |
+
on past WC velocity observations, in which case the operation must involve communicating
|
165 |
+
between the floaters. The first scenario mostly applies to the validation of a WC model, while
|
166 |
+
the second can assist in the path planning of a submerged vessel. In this work, we are interested
|
167 |
+
in determining the initial deployment position, p(0), of the floaters such that the WC is best
|
168 |
+
predicted. To this end, we rely on our previously developed technique [7] as a utility metric to
|
169 |
+
evaluate the WC’s velocity field from the floaters’ trajectories.
|
170 |
+
|
171 |
+
B. Assumptions
|
172 |
+
We make the following assumptions. First, the floaters are assumed to be Lagrangian, such
|
173 |
+
that their motion is completely attributed to the WC. We also assume the existence of a WC
|
174 |
+
model that provides velocity predictions in a two-dimensional plane for the explored area. The
|
175 |
+
spatial resolution of the given model is fixed, and the accuracy of our approach is directly related
|
176 |
+
to the model’s accuracy.
|
177 |
+
The interesting case that we are aiming for is a non-homogeneous WC with patches of
|
178 |
+
homogeneity, such that a number of floaters are needed in order to well explore the WC’s
|
179 |
+
velocity field. These patches are assumed to change slowly in space, such that their borders
|
180 |
+
are smooth and form convex sets. An example of such a velocity field is presented in Fig. 3a
|
181 |
+
with arrows representing the magnitude and direction of the WC in a single cell in space. To
|
182 |
+
simulate the floaters’ motion within the modeled WC, the trajectories of the floaters can follow
|
183 |
+
these arrows. The example in Fig. 4 shows such motion for a set of two floaters. We observe
|
184 |
+
differences in the trajectory of the simulated floaters, which reflects the non-homogeneity of the
|
185 |
+
WC.
|
186 |
+
C. Preliminaries
|
187 |
+
a) Notations: For integers n and d ≥ 2, we denote by [n] the set {1, · · · , n}, by Rn×d the
|
188 |
+
union over every n × d real matrix, and by Id ∈ Rd×d the identity matrix. A matrix A ∈ Rd×d
|
189 |
+
is said to be (i) an orthogonal if and only if ATA = AAT = Id, or (ii) a positive definite matrix
|
190 |
+
if and only if for every column vector x ̸= 0d, xTAx > 0. For every set A ⊆ Rd, we denote by
|
191 |
+
|A| the number of elements of A. Finally, throughout the paper, vectors are addressed as column
|
192 |
+
vectors.
|
193 |
+
1) Volume approximation: In what follows, we define what is known as the Löwner ellipsoid,
|
194 |
+
a tool that will aid us in obtaining an ε-coreset in the context of volume approximation.
|
195 |
+
Definition 1 (Theorem III, [25]). Let L ⊆ Rd be a set of points. Let c ∈ Rd be a vector, and let
|
196 |
+
G ∈ Rd×d be a positive definite matrix. We say that ellipsoid E =
|
197 |
+
�
|
198 |
+
x ∈ Rd���(x − c)T G (x − c) ≤ 1
|
199 |
+
�
|
200 |
+
,
|
201 |
+
is an MVEE (short for the Minimum Volume Enclosing Ellipsoid) of L if
|
202 |
+
1
|
203 |
+
d (E − c) + c ⊆ Conv (L) ⊆ E,
|
204 |
+
(1)
|
205 |
+
|
206 |
+
where E − c denotes the set {x − c|x ∈ E}, 1
|
207 |
+
dE denotes the set
|
208 |
+
� 1
|
209 |
+
dx
|
210 |
+
��x ∈ E
|
211 |
+
�
|
212 |
+
, and Conv (L)
|
213 |
+
denotes the convex hull of L.
|
214 |
+
Definition 2 (Similar to that of [26]). Let ε > 0 be an approximation factor, and let X ⊆ Rd
|
215 |
+
be a set of points. The set S ⊆ X is defined to be an ε-coreset for the MVEE of X, if
|
216 |
+
Vol (MVEE (X)) ≤ (1 + ε) Vol (MVEE (S)) ,
|
217 |
+
(2)
|
218 |
+
where Vol (A) denotes the volume of A and MVEE (A) denotes the MVEE of A, for any A ⊆ Rd.
|
219 |
+
2) Clustering of sets: To determine the initial location of the floaters, we first need to perform
|
220 |
+
clustering to group together sets of similar WC. Thus, the following definitions will be used for
|
221 |
+
the task of clustering.
|
222 |
+
Definition 3 (Variant of Definition 2.3,[27]). Let m, n, d be a triplet of positive integers. An
|
223 |
+
m-set P is a set of m distinct points in Rd. An (m, n)-set is a set P =
|
224 |
+
�
|
225 |
+
P
|
226 |
+
��P ⊆ Rd, |P| = m
|
227 |
+
�
|
228 |
+
such that |P| = n.
|
229 |
+
The following defines a distance between an m-set and a set of k centers.
|
230 |
+
Definition 4 (Variant of Definition 2.1, [27]). Let
|
231 |
+
�
|
232 |
+
Rd, D
|
233 |
+
�
|
234 |
+
be a metric space, where D : P
|
235 |
+
�
|
236 |
+
Rd�
|
237 |
+
×
|
238 |
+
P
|
239 |
+
�
|
240 |
+
Rd�
|
241 |
+
→ [0, ∞) be a function that maps every two subsets P, C ⊆ Rd to
|
242 |
+
D (P, C) =
|
243 |
+
min
|
244 |
+
p∈P,x∈C ∥p − x∥2
|
245 |
+
2 .
|
246 |
+
(3)
|
247 |
+
For an integer k ≥ 1, define Xk =
|
248 |
+
�
|
249 |
+
C ⊆ Rd��|C| = k
|
250 |
+
�
|
251 |
+
.
|
252 |
+
The following defines a coreset for the sets clustering problem [27].
|
253 |
+
Definition 5 ([27]). Let n, m, k be a triplet of positive integers, P be an (n, m)-set as in Defi-
|
254 |
+
nition 3, and let ε, δ > 0 denote the approximation error and probability of failure, respectively.
|
255 |
+
(S, v) is an ε-coreset, where S ⊆ P and v : S → [0, ∞) is a weight function, if for every
|
256 |
+
C ⊆ Xk
|
257 |
+
�����
|
258 |
+
�
|
259 |
+
P∈P
|
260 |
+
D (P, C) −
|
261 |
+
�
|
262 |
+
Q∈S
|
263 |
+
v(Q)D (Q, C)
|
264 |
+
����� ≤ ε
|
265 |
+
�
|
266 |
+
P∈P
|
267 |
+
D (P, C) ,
|
268 |
+
(4)
|
269 |
+
occurs with probability at least 1 − δ.
|
270 |
+
|
271 |
+
3) Prediction of WC: In our work, we use the scheme in [7] as cost function for predicting the
|
272 |
+
WC. The prediction is based on calculating a function that links the positions and velocities of
|
273 |
+
the floaters. This function can be linear, in which case the calculation is performed by a weighted
|
274 |
+
least squares; or non-linear, in which case the estimation involves support vector regression with
|
275 |
+
a non-linear kernel function. Once the relation between the floaters’ positions and their velocity
|
276 |
+
is established, the WC’s velocity at any given location (within the area explored by the floaters)
|
277 |
+
is evaluated by operating the resulting function over the given location.
|
278 |
+
IV. METHODOLOGY
|
279 |
+
Fig. 2: A flow chart illustrating our approach for determining the floaters’ best deployment
|
280 |
+
position.
|
281 |
+
|
282 |
+
Iterative water current segmentation
|
283 |
+
Sample point
|
284 |
+
ε-approximation of
|
285 |
+
from ε-grid
|
286 |
+
water current
|
287 |
+
Velocity map
|
288 |
+
Is there
|
289 |
+
anymore
|
290 |
+
Active coreset
|
291 |
+
Yes
|
292 |
+
sampled
|
293 |
+
based ellipsoid
|
294 |
+
uncovered
|
295 |
+
bounding
|
296 |
+
point?
|
297 |
+
Floater initial positioning
|
298 |
+
Water current clustering
|
299 |
+
Dissect each
|
300 |
+
Apply a
|
301 |
+
Either
|
302 |
+
variant of k-
|
303 |
+
segment into
|
304 |
+
set of sets
|
305 |
+
means
|
306 |
+
Graph based
|
307 |
+
Heuristically
|
308 |
+
approachA. Key idea
|
309 |
+
Recall that we are interested in a solution that, given a WC flow field map, how to setup
|
310 |
+
the deployment of a fixed number of Lagrangian floaters such as to best explore the flow field
|
311 |
+
in-situ. The problem of setting the floaters’ initial deployment is treated here as maximizing the
|
312 |
+
information gained by the floaters with respect to the actual WC velocity’s field. Such a problem
|
313 |
+
can be reduced to the robot coverage path planning problem [28], which aims to provide full
|
314 |
+
coverage of an explored area while also minimizing the number of repeated visits. In the context
|
315 |
+
of our problem, a variant of the coverage path planning problem is used: Given K robots without
|
316 |
+
the ability to control their movement, and a state space where each state moves the robot to
|
317 |
+
a different state, the goal is to cover as many states as possible while moving through already
|
318 |
+
discovered states as little as possible. This problem can be shown to be NP-hard [29]. However,
|
319 |
+
in our case, the space is not continuous, but rather discrete and bounded by the resolution of the
|
320 |
+
given model. Such a setting simplifies the problem and makes it polynomial in nature (rather
|
321 |
+
than exponential).
|
322 |
+
The steps of our algorithm are illustrated in the block diagram in Fig. 2, and a toy example
|
323 |
+
is illustrated in Fig. 4. Given a map M of M × N velocity vectors forming a snippet of
|
324 |
+
a WC’s flow field (see example in Fig. 3a), the algorithm first partitions M into segments
|
325 |
+
of homogeneous patches. This is translated into first applying an ε-grid on the map. That is,
|
326 |
+
dissecting the map into a set of (M/ε) × (N/ε) cells (see Fig. 4a). Then, from each cell we
|
327 |
+
sample one representative. For each sampled point, we next check whether the point is covered
|
328 |
+
by a segment in which case we proceed to the next sampled point. Otherwise, we find the
|
329 |
+
smallest ellipsoid in volume that encloses a homogeneous patch, including the sampled point.
|
330 |
+
We then obtain an εβ-approximation towards the enclosed patch of the WC in the obtained
|
331 |
+
ellipsoid from the previous step, as illustrated in Fig. 4b. The above steps are repeated over the
|
332 |
+
set of sampled points until all points are covered.
|
333 |
+
As an approach for segmenting the flow field map, ˆ
|
334 |
+
M, a clustering scheme is applied. Each
|
335 |
+
segment is dissected into an (n, 3)-set (see Definition 3), where n =
|
336 |
+
� size of segment
|
337 |
+
3
|
338 |
+
�
|
339 |
+
, such that
|
340 |
+
each point in the (n, 3)-set is composed of its coordinates on the map M and the velocity vector
|
341 |
+
that is present at those coordinates. We then normalize the velocity vector such that its norm
|
342 |
+
|
343 |
+
is equal to the norm of its corresponding coordinates at M. In the last stage of clustering, we
|
344 |
+
generate a coreset for the sets clustering problem on the merged set of sets M (see Definition 5),
|
345 |
+
followed by a variant of the k-means algorithm, where k here is equal to the number of floaters.
|
346 |
+
The result is a set of k centers that defines a clustering on �
|
347 |
+
M as shown in Fig. 4c. Finally,
|
348 |
+
based on the clustered �
|
349 |
+
M, we determine the deployment position of the K floaters using two
|
350 |
+
main techniques (i) heuristics: where the placement locations are chosen as the farthest point in
|
351 |
+
the opposite direction of the dominating direction of each cluster or (ii) graph-based: following
|
352 |
+
the longest path formed in the flow filed map.
|
353 |
+
We handle the task of clustering by coresets. Coresets are a weighted subset of the input
|
354 |
+
data. They were first introduced in computational geometry as a means to reduce the size of
|
355 |
+
large datasets. Throughout recent years, coresets have been extended and developed for various
|
356 |
+
optimization problems from different fields. One key component associated with coresets is that
|
357 |
+
they aim to encapsulate the hidden structure in the data that the optimization problem at hand
|
358 |
+
entails. Other approaches such as matrix sketches [30] or submodular maximization [31] can
|
359 |
+
also be used for clustering. The advantage of coresets is that it is a subset of the data where
|
360 |
+
the coreset guarantee is satisfied for any query, e.g., any k centers in the context of k-means
|
361 |
+
clustering. Such coresets are referred as “strong coresets” in the literature [32].
|
362 |
+
B. Our Floater Deployment Scheme
|
363 |
+
We formulate our problem as follows. Let S denote the space of all possible placements.
|
364 |
+
For every x ∈ X, let f(x) ∈ S, denote the position of floater x. Assume that each p ∈ S is
|
365 |
+
associated with a loss function φ : S → S that maps p to some state q ∈ S. Finally, let P (S)
|
366 |
+
denote the power set of S, π : S → P(S) denote the path of visited states given the initial state
|
367 |
+
for a floater, ℓ(p(f(x)) denote the length of the path associated with the floater x, and S4
|
368 |
+
i=1 be
|
369 |
+
a set of orthants of S such that for each i, j ∈ [4], Si ⊆ S and Si ∩ Sj = ∅ with i ̸= j. The
|
370 |
+
|
371 |
+
(a) Map of velocities
|
372 |
+
(b) Zoomed area with respect to our toy map.
|
373 |
+
Fig. 3: A toy example of a flow field map. The color bar denotes the magnitude of the velocity
|
374 |
+
vectors. Example produced from the SELIPS model [33]. Fig. 3b depicts a zoomed area that is
|
375 |
+
contained in the dotted black rectangle at Fig. 3a.
|
376 |
+
optimization problem is formalized by
|
377 |
+
max
|
378 |
+
4
|
379 |
+
�
|
380 |
+
j=1
|
381 |
+
log
|
382 |
+
�����
|
383 |
+
� �
|
384 |
+
x∈X
|
385 |
+
p (f(x))
|
386 |
+
�
|
387 |
+
∩ Sj
|
388 |
+
����
|
389 |
+
�
|
390 |
+
�
|
391 |
+
x∈X
|
392 |
+
ℓ(p(f(x))
|
393 |
+
s.t.
|
394 |
+
x ∈ X
|
395 |
+
f(x) ∈ S
|
396 |
+
(5)
|
397 |
+
In (5), the size of the union of different sets (denoted by the absolute function over a set)
|
398 |
+
accounts for each state that is visited by some floater only once, and the loss function forces
|
399 |
+
the solver to find initial states whose path must at least pass through one state from each of the
|
400 |
+
subspaces {Si}4
|
401 |
+
i=1 of S. The loss function aims to guide the solver to choose placements that
|
402 |
+
doesn’t lead to infinite loops.
|
403 |
+
1) Iterative WC segmentation: Our solution starts by identifying segments in the WC’s
|
404 |
+
velocity field. Each segment contains a homogeneous set of WC vectors representing the WC’s
|
405 |
+
magnitude and direction. The task is performed by oracle-based algorithms. The data is assumed
|
406 |
+
to be “hidden” and only available to the oracle, and the user is allowed to ask the oracle questions
|
407 |
+
|
408 |
+
Cm/s
|
409 |
+
35
|
410 |
+
35
|
411 |
+
34.5
|
412 |
+
30
|
413 |
+
25
|
414 |
+
Longitude
|
415 |
+
34
|
416 |
+
20
|
417 |
+
33.5
|
418 |
+
15
|
419 |
+
33
|
420 |
+
10
|
421 |
+
32.5
|
422 |
+
5
|
423 |
+
32
|
424 |
+
1
|
425 |
+
0
|
426 |
+
31.5
|
427 |
+
32
|
428 |
+
32.5
|
429 |
+
33
|
430 |
+
33.5
|
431 |
+
LatitudeCm/s
|
432 |
+
32.5
|
433 |
+
35
|
434 |
+
32.4
|
435 |
+
30
|
436 |
+
25
|
437 |
+
Longitude
|
438 |
+
32.3
|
439 |
+
20
|
440 |
+
15
|
441 |
+
32.2
|
442 |
+
10
|
443 |
+
5
|
444 |
+
32.1
|
445 |
+
1
|
446 |
+
32
|
447 |
+
0
|
448 |
+
32
|
449 |
+
32.1
|
450 |
+
32.2
|
451 |
+
32.3
|
452 |
+
32.4
|
453 |
+
32.5
|
454 |
+
Latitude(a) Map partitioning into grids
|
455 |
+
(b) WC segmentation
|
456 |
+
(c) Clustering set of sets
|
457 |
+
Fig. 4: Illustration of running our model on the toy example Fig. 3. Fig. 4a presents a partitioning
|
458 |
+
of the flow field such that from each grid cell, a representative is randomly selected. Fig. 4b
|
459 |
+
presents our segmentation which entails grouping areas of similar direction and speed. Fig. 4c
|
460 |
+
clusters the segments to ensure that the number of clusters is equal to the number of floaters.
|
461 |
+
with “yes/no” responses. Such oracles are known by the term membership oracles. The motivation
|
462 |
+
behind such decisions is scalable algorithms for segmentation. Using the oracle-based approach,
|
463 |
+
the emphasis is to segment the map into a set of segments using minimal oracle queries. In
|
464 |
+
addition, such approaches enable the handling of large-scale velocity maps in near-linear time.
|
465 |
+
In our context, the oracle has the ability to distinguish between different current patches.
|
466 |
+
With such an oracle, we find the minimal volume enclosing ellipsoid (or MVEE in short, see
|
467 |
+
Definition 2) of each WC patch. Specifically, using the given membership oracle, a separation
|
468 |
+
|
469 |
+
Cm/s
|
470 |
+
35
|
471 |
+
35
|
472 |
+
34.5
|
473 |
+
30
|
474 |
+
25
|
475 |
+
Longitude
|
476 |
+
34
|
477 |
+
20
|
478 |
+
33.5
|
479 |
+
15
|
480 |
+
33
|
481 |
+
10
|
482 |
+
32.5
|
483 |
+
5
|
484 |
+
32
|
485 |
+
1
|
486 |
+
0
|
487 |
+
31.5
|
488 |
+
32
|
489 |
+
32.5
|
490 |
+
33
|
491 |
+
33.5
|
492 |
+
Latitude35.0
|
493 |
+
34.5
|
494 |
+
e
|
495 |
+
34.0
|
496 |
+
itude
|
497 |
+
33.5
|
498 |
+
g
|
499 |
+
33.0
|
500 |
+
32.5
|
501 |
+
32.0
|
502 |
+
31.5
|
503 |
+
32.0
|
504 |
+
32.5
|
505 |
+
33.0
|
506 |
+
33.5
|
507 |
+
Latitude35.0
|
508 |
+
34.5
|
509 |
+
34.0
|
510 |
+
itude
|
511 |
+
33.5
|
512 |
+
ngi
|
513 |
+
33.0
|
514 |
+
32.5
|
515 |
+
32.0
|
516 |
+
31.5
|
517 |
+
32.0
|
518 |
+
32.5
|
519 |
+
33.0
|
520 |
+
33.5
|
521 |
+
Latitudeoracle can be constructed in polynomial time. The response of the separation oracle is “True” if
|
522 |
+
a point lies inside the body of interest. If the point lies outside the body of interest, the oracle
|
523 |
+
outputs a hyperplane, separating the point from the WC patch. Using the separation oracle,
|
524 |
+
the ellipsoid method [34] can be leveraged to find a (1 + O (ε))-approximation for the optimal
|
525 |
+
MVEE. The time complexity of such algorithms is O
|
526 |
+
�
|
527 |
+
nd4 logO(1) � d
|
528 |
+
ε
|
529 |
+
��
|
530 |
+
; recall that in our setting,
|
531 |
+
d ∈ O (1); hence, the time complexity of our algorithm is linear in the number of points n. We
|
532 |
+
refer the reader to [35], [36], [37] for an extensive analysis of this method.
|
533 |
+
Once a WC patch P has been enclosed by an ellipsoid, we proceed to obtain an εβ-approximation
|
534 |
+
towards the volume of P, i.e., we aim to find C ⊆ P such that
|
535 |
+
Vol (Conv (C))
|
536 |
+
Vol (Conv (P)) ≥ 1 − εβ.
|
537 |
+
(6)
|
538 |
+
For this task, we first dissect P to Vol (P) εd
|
539 |
+
β cells (see Definition 2). From each cell of this
|
540 |
+
type, we uniformly choose a representative point at random. This ensures that the volume of the
|
541 |
+
set of sampled points approximates the volume of P, which in turn approximates the structural
|
542 |
+
properties of P [38].
|
543 |
+
2) Clustering WC: A fundamental clustering approach is k-means, which can also be used
|
544 |
+
here to cluster WC. However, k-means will disregard the connectivity between points (segment
|
545 |
+
points). Instead, we use sets clustering [27], which is a generalization of k-means to cluster
|
546 |
+
dependent sets of points.
|
547 |
+
Each approximated WC patch is partitioned into a set of triplets based on distance. More
|
548 |
+
specifically, each point is associated with the closest two points to it based on Euclidean distance.
|
549 |
+
The result is a (3, n)-set P, where P ∈ P is a set of 3 WC velocity vectors, and n denotes
|
550 |
+
the number of all such sets (see Definition 3). The time complexity for finding a “sub-optimal”
|
551 |
+
solution for such clustering is O
|
552 |
+
�
|
553 |
+
n log n (nk)dk�
|
554 |
+
[27], where n denotes the number of sets of
|
555 |
+
points, k denotes the number of desired clusters, and d denotes the dimension of each point in
|
556 |
+
the sets of points. Such a solution is, at most, worse than the optimal solution by a multiplicative
|
557 |
+
factor of O (log n). Leveraging the use of coresets, we can reduce the running time to n log nk3+
|
558 |
+
� log n
|
559 |
+
ε dk3�O(dk), while maintaining a solution that is associated with an approximation factor of
|
560 |
+
O ((1 + ε) log n) [27]. It can be shown that solving the clustering problem on the coreset admits
|
561 |
+
an approximation towards the optimal clustering obtained on all of the data, as follows.
|
562 |
+
|
563 |
+
Claim 6. Let P be an (n, 3), ε ∈ (0, 0.5), and (C, w) denote its ε-coreset as in Definition 5. Let
|
564 |
+
XC denote the optimal clustering with respect to the coreset (C, w) and XP denote the optimal
|
565 |
+
clustering with respect to P. Then
|
566 |
+
�
|
567 |
+
P∈P
|
568 |
+
D (P, XC) ∈ (1 + O(ε))
|
569 |
+
�
|
570 |
+
P∈P
|
571 |
+
D (P, XP) .
|
572 |
+
Proof. Observe that
|
573 |
+
�
|
574 |
+
P∈P
|
575 |
+
D (P, XP) ≤
|
576 |
+
�
|
577 |
+
P∈P
|
578 |
+
D (P, XC)
|
579 |
+
≤
|
580 |
+
1
|
581 |
+
1 − ε
|
582 |
+
�
|
583 |
+
P∈C
|
584 |
+
w(P)D (P, XC)
|
585 |
+
≤
|
586 |
+
1
|
587 |
+
1 − ε
|
588 |
+
�
|
589 |
+
P∈C
|
590 |
+
w(P)D (P, XP)
|
591 |
+
≤ 1 + ε
|
592 |
+
1 − ε
|
593 |
+
�
|
594 |
+
P∈P
|
595 |
+
D (P, XP) ,
|
596 |
+
(7)
|
597 |
+
where the first inequality holds by definition of XP, the second and last inequality follows from
|
598 |
+
Definition 5, and the third inequality holds by definition of XC.
|
599 |
+
The claim holds since 1+ε
|
600 |
+
1−ε ≤ 1 + 4ε due to the fact that ε ∈ (0, 0.5).
|
601 |
+
Since the input of our algorithm is a discrete map, usually represented via a grid, the input
|
602 |
+
to the clustering must also incorporate the coordinates of each point in any WC patch in the
|
603 |
+
given map. For such a task, to each point p in each triplet P, we concatenate the corresponding
|
604 |
+
coordinates in the map, resulting in ˆp, while the set P is then referred to as ˆP. To ensure fairness
|
605 |
+
across the two feature vectors that ˆp is composed of, we ensure that their norm is roughly equal
|
606 |
+
through scaling. The set of all ˆP is then passed to the sets clustering scheme, and the result is
|
607 |
+
treated at the clustering on the original set P.
|
608 |
+
3) Towards optimal floater deployment while seeking maximal coverage: Once the WC map
|
609 |
+
has been clustered, we determine the deployment position of the floaters to obtain the best WC
|
610 |
+
velocity field estimation. We consider two types of solutions to the deployment strategy. The
|
611 |
+
first is a heuristic approach, referred to as heuristic, where each cluster is assigned a unique
|
612 |
+
floater. The floater’s location is then set at the farthest point along the negative of the dominating
|
613 |
+
direction from the cluster, thereby obtaining the longest traversal inside the cluster. Here, the
|
614 |
+
|
615 |
+
dominating direction of a cluster refers to the direction that most points in the cluster either
|
616 |
+
point to, or are very close to in terms of cosine similarity. This approach ensures that each
|
617 |
+
cluster is covered, while allowing for additional data collection from the deployment position
|
618 |
+
to the cluster’s boundaries. However, the scheme is not optimal for the probable case where the
|
619 |
+
number of clusters is lower than or equal to the number of floaters.
|
620 |
+
A more rigorous approach would be to employ concepts from graph theory, and we refer to
|
621 |
+
it as graph-based approach. Each cluster S is represented as a directed graph GS := (VS, ES),
|
622 |
+
where each point in S is assigned a vertex in GS. As for the set of edges of GS, an edge
|
623 |
+
e := v → u exists in GS if q is reachable from p following the velocity vector of p, where p
|
624 |
+
and q are the corresponding points in S of that of v and u, respectively. In other words, an edge
|
625 |
+
exists if, and only if, (i) one can move from p to q using the velocity vector that is associated
|
626 |
+
with p, and (ii) q ∈ B (p, 1) where B(x, r) denotes a ball centered at x, with a radius of r. At this
|
627 |
+
stage, we have K disconnected graphs for K floaters. For each graph, we compute the longest
|
628 |
+
path from the set of shortest paths between each pair of graph nodes by applying a breadth-first
|
629 |
+
search (BFS) algorithm [39] each time from a different node. The running time of this procedure
|
630 |
+
is O
|
631 |
+
�
|
632 |
+
|VS|2 + |VS| |ES|
|
633 |
+
�
|
634 |
+
for any graph GS. Our above algorithm can be generalized by taking
|
635 |
+
into account weights, in which case, the BFS algorithm is replaced by Johnson’s algorithm [40].
|
636 |
+
A modification of this graph-based approach, referred to as the inter-graph scheme, connects
|
637 |
+
these graphs by checking whether the roots and leaves of one graph can be connected to another
|
638 |
+
graph. The connectivity is applied to each pair of graphs, and the resulting graph is denoted by
|
639 |
+
Gall. The BFS algorithm is then used again to compute the K largest non-intersecting paths in
|
640 |
+
Gall. Finally, the floaters’ deployment positions are set to be the starting vertices of the selected
|
641 |
+
paths.
|
642 |
+
V. EXPERIMENTAL ANALYSIS
|
643 |
+
In this section, we evaluate the performance of our three strategies for determining the floaters’
|
644 |
+
deployment positions, namely, heuristics, graph-based and inter graph-based. Without alternative
|
645 |
+
benchmark for determining the initial position of the floats for WC prediction, we compare the
|
646 |
+
performance of our schemes to the common approach of sampling the initial deployment locations
|
647 |
+
uniformly at random. We follow [7] to evaluate the performance of the different deployment
|
648 |
+
|
649 |
+
schemes in terms of the velocity field prediction. For any location p(x, y) in the velocity field,
|
650 |
+
we denote the ground truth velocity vector at p(x, y) by
|
651 |
+
�
|
652 |
+
�vx
|
653 |
+
vy
|
654 |
+
�
|
655 |
+
�, and the predicted velocity
|
656 |
+
vector at p(x, y) by
|
657 |
+
�
|
658 |
+
�vpred
|
659 |
+
x
|
660 |
+
vpred
|
661 |
+
y
|
662 |
+
�
|
663 |
+
�. The latter is obtained by applying the method in [7], each time for
|
664 |
+
the different the floaters’ trajectories as obtained after deployment based on the four different
|
665 |
+
deployment strategies. The prediction error is defined by
|
666 |
+
ρspeed =
|
667 |
+
��
|
668 |
+
vx − vpred
|
669 |
+
x
|
670 |
+
�2
|
671 |
+
+
|
672 |
+
�
|
673 |
+
vy − vpred
|
674 |
+
y
|
675 |
+
�2
|
676 |
+
.
|
677 |
+
(8)
|
678 |
+
Note that the method in [7] interpolates the floaters information towards the prediction of the
|
679 |
+
flow field away from the floaters’ trajectories. As such, the prediction error in (8) is calculated
|
680 |
+
for each location in the explored area.
|
681 |
+
A. Experimental Settings
|
682 |
+
The method in [7] offers a linear and a non-linear prediction models. Here, since we aim
|
683 |
+
for complex flow fields with non-homogeneous sections, we choose the latter that is based on
|
684 |
+
support vector regression (SVR) model with a radial bases function (RBF) kernel. To train the
|
685 |
+
RBF-SVR model, we used a grid-search approach with cross validation [41], [42] to determine
|
686 |
+
the best model parameters. The tuned parameters are (i) C – a regularization parameters, (ii) ϵ
|
687 |
+
– an optimization-related parameter with respect to the SVR model, and (iii) γ – the exponent
|
688 |
+
which controls the deviation of the spread of the radial basis function. For more details, we refer
|
689 |
+
the reader to “Scikit-Learn” [43].
|
690 |
+
As a WC model (and ground truth), we use 48 WC maps, as produced by the SELIPS
|
691 |
+
model [33] for the Gulf of Haifa, Israel. The maps span over a time period of 12 months.
|
692 |
+
Model SELIPS is an operational forecasting system based on POM, a 3D numerical model for
|
693 |
+
the simulation of ocean dynamics, with a horizontal resolution of about 1 km. The output was
|
694 |
+
given as 3 hour averages of the velocity components. We explore the results for two options:
|
695 |
+
1) clean map: the WC model is the same as the velocity field used to simulate the drift of the
|
696 |
+
floaters, and 2) noisy map: the velocity field used for the simulation is a noisy version of the
|
697 |
+
|
698 |
+
WC model. We explore the results for different number of floaters, K, and for different model
|
699 |
+
parameters.
|
700 |
+
B. Experimental Analysis
|
701 |
+
1) The Toy Example: We start by showing the performance of each of our proposed deploy-
|
702 |
+
ment strategies on the toy example in Fig. 3a. In Fig. 5, we present the empirical cumulative
|
703 |
+
distribution function (CDF) results of the velocity error vector (8), as generated by predicting
|
704 |
+
the flow field for each point in the map. We observe that the performance of our proposed
|
705 |
+
strategies exceeds that of the uniformly choosing deployment strategy. This indicates that, from
|
706 |
+
a statistical point of view, our method forms better candidates for deployment position strategies
|
707 |
+
than sampling uniformly. Comparing the performance of our three schemes, we conclude that
|
708 |
+
the inter-graph-based approach is better, mostly because of the complexity in the structure of
|
709 |
+
the velocity field, which induces diversity in the WC. The inter-graph approach, which is more
|
710 |
+
rigorous, can better capture this diversity.
|
711 |
+
Fig. 5: CDF of the norm of velocity error (8). The results show our advantage upon using
|
712 |
+
uniform sampling for determining deployment positions.
|
713 |
+
|
714 |
+
1.0
|
715 |
+
w
|
716 |
+
V
|
717 |
+
20.8
|
718 |
+
error
|
719 |
+
velocity
|
720 |
+
0.6
|
721 |
+
0.4
|
722 |
+
Uniform sampling
|
723 |
+
0.2
|
724 |
+
our heuristic
|
725 |
+
our graph based
|
726 |
+
our inter-graph based
|
727 |
+
0.0
|
728 |
+
0
|
729 |
+
5
|
730 |
+
10
|
731 |
+
15
|
732 |
+
20
|
733 |
+
25
|
734 |
+
[曾]2) Choosing the “best” parameters for our model: Our model relies on a predefined set of
|
735 |
+
parameters. Specifically, the approximation error εβ with respect to the volume of the explored
|
736 |
+
area, which is required for the iterative segmentation stage, and the coreset size µ with respect
|
737 |
+
to the clustering phase. To explore the sensitivity of the graph-based and inter-graph-based
|
738 |
+
approaches to the choice of these parameters, we use the clean simulation setup for all 48 WC
|
739 |
+
maps to show that our model is robust against changes in these parameters. As seen in Fig 6, best
|
740 |
+
results are associated with µ := 1500 and εβ := 0.05. Still, the difference is rather small, which
|
741 |
+
reflects on the robustness of our approach. In the below we choose µ := 1500 and εβ := 0.05
|
742 |
+
for both the clean maps, for the noisy maps.
|
743 |
+
(a)
|
744 |
+
(b)
|
745 |
+
Fig. 6: CDF of the averaged prediction error across 48 “clean” maps when using different model
|
746 |
+
parameters with respect to our graph-based approach (left-most), and with respect to our inter-
|
747 |
+
graph based (right-most).
|
748 |
+
3) Comparison Against Uniform Sampling on a Variety of Maps: We now explore the efficacy
|
749 |
+
of the three schemes for different WC maps in the clean map setup against Uniform sampling.
|
750 |
+
Fig. 7 presents the CDF of the averaged prediction errors across the 48 maps. We observe that
|
751 |
+
the heuristic-based strategy for deployment outperforms most of the deployment strategies. This
|
752 |
+
is due to the fact that there are no obstacles in each of the 48 maps. That is an area in the
|
753 |
+
WC flow field with zeroed-out velocity vectors, e.g., an island. Observe that while the graph-
|
754 |
+
|
755 |
+
1.0
|
756 |
+
(m)
|
757 |
+
V
|
758 |
+
20.8
|
759 |
+
error
|
760 |
+
Ivelocity
|
761 |
+
0.6
|
762 |
+
8g = 5e -02. u= 500
|
763 |
+
8g = 5e-02. μ= 1000
|
764 |
+
0.4
|
765 |
+
3 = 5e - 02. μ= 1500
|
766 |
+
β = 8e - 02, μ= 500
|
767 |
+
0.2
|
768 |
+
8β = 8e - 02, μ= 1000
|
769 |
+
8g = 8e- 02. μ= 1500
|
770 |
+
0.0
|
771 |
+
0
|
772 |
+
10
|
773 |
+
20
|
774 |
+
30
|
775 |
+
40
|
776 |
+
50
|
777 |
+
m1.0
|
778 |
+
)
|
779 |
+
V
|
780 |
+
20.8
|
781 |
+
error
|
782 |
+
0.6
|
783 |
+
8g = 5e-02. μ= 500
|
784 |
+
8g= 5e-02.μ= 1000
|
785 |
+
0.4
|
786 |
+
3 = 5e - 02. μ= 1500
|
787 |
+
8β = 8e - 02, μ= 500
|
788 |
+
0.2
|
789 |
+
8β = 8e - 02, μ= 1000
|
790 |
+
83 = 8e- 02.μ= 1500
|
791 |
+
0.0
|
792 |
+
2
|
793 |
+
3
|
794 |
+
4
|
795 |
+
5Fig. 7: CDF of the averaged prediction error across 48 maps.
|
796 |
+
based approach is comparable to the heuristic-based approach, at some point it starts being
|
797 |
+
less efficient. This is due to the fact that the graph-based method needs denser clusters, i.e.,
|
798 |
+
the parameter εβ needs to be smaller leading to larger and denser clusters, e.g., the effect of
|
799 |
+
εβ is best observed visually in Fig. 4c. In turn, the graphs generated from the clusters hold
|
800 |
+
more information regarding the flow field. This will yield better results than our heuristic-based
|
801 |
+
approach. In addition, the same behavior appears also when observing the inter-graph-based
|
802 |
+
approach.
|
803 |
+
4) Robustness Against Noise: We explore the performance of the three schemes when the
|
804 |
+
noisy map setup is considered. For our toy map M, we produce its noisy map M ′ by adding a
|
805 |
+
Gaussian noise with zero mean, and a standard deviation equal to σ% of the standard deviation
|
806 |
+
of M. The added noise is added to a fraction of the WC map, denoted by η ∈ (0, 1), representing
|
807 |
+
the corruption ratio of the WC map.
|
808 |
+
To generate a difference between the WC map and the velocity field used, we determine the
|
809 |
+
deployment positions of the floaters, p(0), based on the given WC model (i.e., without the added
|
810 |
+
noise), but calculate the trajectories of the floaters based on the noisy WC map. As a result,
|
811 |
+
the assumed map is mismatched with the noisy one. The effect of η and σ on our toy example
|
812 |
+
|
813 |
+
1.0
|
814 |
+
(m)
|
815 |
+
V
|
816 |
+
20.8
|
817 |
+
error
|
818 |
+
0.6
|
819 |
+
0.4
|
820 |
+
--→-. Uniform sampling
|
821 |
+
ourheuristic
|
822 |
+
0.2
|
823 |
+
our graph based
|
824 |
+
our inter-graph based
|
825 |
+
0.0
|
826 |
+
5
|
827 |
+
10
|
828 |
+
15
|
829 |
+
20
|
830 |
+
mη%
|
831 |
+
σ%
|
832 |
+
15
|
833 |
+
133
|
834 |
+
15
|
835 |
+
100
|
836 |
+
TABLE I: The effect of added noise on our toy example.
|
837 |
+
are presented in Table I. With a small corruption percent (small η), we observe that the resulted
|
838 |
+
map is not that different from its clean version; see Figure 3a. As η and σ increase, the map
|
839 |
+
loses its underlying structure almost entirely, as depicted at the rightmost lower cell of Table I.
|
840 |
+
The results are given in Fig. 8. We observe that the average error increases with σ%. We argue
|
841 |
+
that, as σ% increases, the correlation between the generated deployment positions on the clean
|
842 |
+
map and the resulted noisy map becomes less strong leading to an increase in the average error.
|
843 |
+
The heuristic-based and graph-based approaches still outperform the uniform sampling, but for
|
844 |
+
the inter-graph-based approach which is sensitive to the smoothness of the maps, becomes less
|
845 |
+
efficient in the presence of noise.
|
846 |
+
5) Assessing the effect of K: In this experiment, we explore the effect of increasing the
|
847 |
+
number of floaters on the error of reconstructing flow fields. Fig. 9 presents the average error
|
848 |
+
|
849 |
+
Cm/s
|
850 |
+
35
|
851 |
+
35
|
852 |
+
34.5
|
853 |
+
30
|
854 |
+
25
|
855 |
+
Longitude
|
856 |
+
34
|
857 |
+
20
|
858 |
+
33.5
|
859 |
+
15
|
860 |
+
33
|
861 |
+
10
|
862 |
+
32.5
|
863 |
+
5
|
864 |
+
32
|
865 |
+
1
|
866 |
+
0
|
867 |
+
31.5
|
868 |
+
32
|
869 |
+
32.5
|
870 |
+
33
|
871 |
+
33.5
|
872 |
+
LatitudeCm/s
|
873 |
+
35
|
874 |
+
35
|
875 |
+
34.5
|
876 |
+
30
|
877 |
+
25
|
878 |
+
Longitude
|
879 |
+
34
|
880 |
+
20
|
881 |
+
33.5
|
882 |
+
15
|
883 |
+
33
|
884 |
+
10
|
885 |
+
32.5
|
886 |
+
5
|
887 |
+
32
|
888 |
+
1
|
889 |
+
0
|
890 |
+
31.5
|
891 |
+
32
|
892 |
+
32.5
|
893 |
+
33
|
894 |
+
33.5
|
895 |
+
LatitudeCm/s
|
896 |
+
35
|
897 |
+
35
|
898 |
+
34.5
|
899 |
+
30
|
900 |
+
25
|
901 |
+
Longitude
|
902 |
+
34
|
903 |
+
20
|
904 |
+
33.5
|
905 |
+
15
|
906 |
+
33
|
907 |
+
10
|
908 |
+
32.5
|
909 |
+
5
|
910 |
+
32
|
911 |
+
1
|
912 |
+
0
|
913 |
+
31.5
|
914 |
+
32
|
915 |
+
32.5
|
916 |
+
33
|
917 |
+
33.5
|
918 |
+
LatitudeCm/s
|
919 |
+
35
|
920 |
+
35
|
921 |
+
34.5
|
922 |
+
30
|
923 |
+
25
|
924 |
+
Longitude
|
925 |
+
34
|
926 |
+
20
|
927 |
+
33.5
|
928 |
+
15
|
929 |
+
33
|
930 |
+
10
|
931 |
+
32.5
|
932 |
+
5
|
933 |
+
32
|
934 |
+
1
|
935 |
+
0
|
936 |
+
31.5
|
937 |
+
32
|
938 |
+
32.5
|
939 |
+
33
|
940 |
+
33.5
|
941 |
+
Latitude(a) η = 15%
|
942 |
+
(b) η = 40%
|
943 |
+
(c) η = 95%
|
944 |
+
Fig. 8: The averaged norm of the velocity error on our toy map as a function σ, when using
|
945 |
+
three different corruption percents η ∈ {0.15, 0.4, 0.95}.
|
946 |
+
(a)
|
947 |
+
(b)
|
948 |
+
Fig. 9: On the left graph, the averaged norm of the velocity error across the 48 maps as a function
|
949 |
+
of the number of floaters K. On the right graph, we zoom in Fig. 9a showing the averaged norm
|
950 |
+
of the velocity error across the 48 maps as a function of the number of floaters K. In both
|
951 |
+
figures, the shaded regions denote a 95% confidence bar.
|
952 |
+
across the 48 WC maps. We observe that as the number of floaters increases, the average error
|
953 |
+
for each of the 4 deployment strategies decreases. This is due to the fact that the amount of
|
954 |
+
collective data also increases as more floaters are available, hinging upon a larger discovery of
|
955 |
+
the underlying structure of the flow fields. The results show that graph-based and heuristic-based
|
956 |
+
|
957 |
+
25
|
958 |
+
23
|
959 |
+
Uniform sampling
|
960 |
+
our heuristic
|
961 |
+
22
|
962 |
+
our graph based
|
963 |
+
our inter-graph based
|
964 |
+
0.2
|
965 |
+
0.4
|
966 |
+
0.6
|
967 |
+
0.8
|
968 |
+
1.0
|
969 |
+
1.2
|
970 |
+
[.]
|
971 |
+
a24
|
972 |
+
.... Uniform sampling
|
973 |
+
our heuristic
|
974 |
+
22
|
975 |
+
our graph based
|
976 |
+
our inter-graph based
|
977 |
+
0.2
|
978 |
+
0.4
|
979 |
+
0.6
|
980 |
+
0.8
|
981 |
+
1.0
|
982 |
+
1.2
|
983 |
+
[曾]
|
984 |
+
a23
|
985 |
+
..... Uniform sampling
|
986 |
+
our heuristic
|
987 |
+
our graph based
|
988 |
+
our inter-graph based
|
989 |
+
0.2
|
990 |
+
0.4
|
991 |
+
0.6
|
992 |
+
0.8
|
993 |
+
1.0
|
994 |
+
1.2
|
995 |
+
["]
|
996 |
+
a12
|
997 |
+
T.... Uniform sampling
|
998 |
+
.... our heuristic
|
999 |
+
10
|
1000 |
+
... our graph based
|
1001 |
+
our inter-graph based
|
1002 |
+
4
|
1003 |
+
2
|
1004 |
+
6
|
1005 |
+
8
|
1006 |
+
10
|
1007 |
+
12
|
1008 |
+
14
|
1009 |
+
Number of floaters3.4
|
1010 |
+
our heuristic
|
1011 |
+
our graph based
|
1012 |
+
3.2
|
1013 |
+
3.0
|
1014 |
+
2.8
|
1015 |
+
2.6
|
1016 |
+
2.4
|
1017 |
+
6
|
1018 |
+
8
|
1019 |
+
10
|
1020 |
+
12
|
1021 |
+
14
|
1022 |
+
Number of floaters(a)
|
1023 |
+
(b)
|
1024 |
+
Fig. 10: On the right, we present the average error of each of our deployment methods with
|
1025 |
+
respect to WC reconstruction as a function of εβ. On the left, we present the running time
|
1026 |
+
needed to generate the positions for our graph-based approach εβ. Shaded regions denote the
|
1027 |
+
standard deviation with respect to the y-axis.
|
1028 |
+
outperform uniform sampling by at least 225%. This is due to the nature of our approaches,
|
1029 |
+
which rely on information about the structural properties of the WC maps. On the other hand,
|
1030 |
+
the performance of our inter-graph-based approach is sometimes weaker than uniform sampling.
|
1031 |
+
This is mainly due to the fact that the former method requires denser graphs, ultimately leading
|
1032 |
+
to lower εβ.
|
1033 |
+
6) When to use each of our deployment strategies: Finally, we explore the best setups that
|
1034 |
+
fit best each of our deployment strategies.
|
1035 |
+
a) When accuracy matters more than run-time: Figure 10a presents the effect of εβ on each
|
1036 |
+
of our proposed strategies. When εβ decreases, the best strategy is the graph-based approach. It
|
1037 |
+
lines well with the observation that this method uses the underline structure of the map. However,
|
1038 |
+
the cost of using such low εβ is reflected in Figure 10b. Using an AMD Ryzen Threadripper
|
1039 |
+
3990X 2.9 GHz 64-Core with 128GB RAM, the run time increases from minutes to hours. The
|
1040 |
+
run time for the heuristic-based approach ranges between 3000 seconds (at εβ = 0.01) and 4500
|
1041 |
+
seconds (at εβ = 0.001), while the run time of the inter-graph-based approach is similar to that
|
1042 |
+
|
1043 |
+
lvelocity errorll2
|
1044 |
+
our heuristic
|
1045 |
+
our graph based
|
1046 |
+
our inter-graph based
|
1047 |
+
22
|
1048 |
+
21
|
1049 |
+
0.010
|
1050 |
+
0.008
|
1051 |
+
0.006
|
1052 |
+
0.004
|
1053 |
+
0.002our graph-based
|
1054 |
+
12000
|
1055 |
+
10000
|
1056 |
+
8000
|
1057 |
+
6000
|
1058 |
+
4000
|
1059 |
+
0.010
|
1060 |
+
0.008
|
1061 |
+
0.006
|
1062 |
+
0.004
|
1063 |
+
0.002
|
1064 |
+
EβFig. 11: The averaged norm of the velocity error across the 48 maps as a function σ, where the
|
1065 |
+
corruption percent η is 100%. The shaded regions denote a 95% confidence bar.
|
1066 |
+
of the graph-based approach.
|
1067 |
+
b) Corrupted maps: We explore the performance of the three schemes when the given
|
1068 |
+
model is different than the real channel, i.e., using the noisy map setup. For each map M from
|
1069 |
+
our set of 48 flow field maps, we produce its noisy map M ′ by adding a Gaussian noise with
|
1070 |
+
zero mean, and a standard deviation equals to σ% of the standard deviation of M. Here the
|
1071 |
+
corruption percentage, η is 100%. The results are given in Fig. 11 for different σ2 values. We
|
1072 |
+
observe that the average error decreases as the added noise increases. This rather non-intuitive
|
1073 |
+
result is due to the fact that, as noise increases, the obtained map becomes similar to a Gaussian
|
1074 |
+
distributed. Consequently, the distribution of the map’s entries can be better estimated from the
|
1075 |
+
learning phase, i.e., the path traversed by the floaters. That is, the impact of the floater’s initial
|
1076 |
+
location becomes less dominant as the noise increases and the mismatch between the model and
|
1077 |
+
the actual map increases. That said, since the structure of the noise field still dominates over
|
1078 |
+
the added noise, we observe that our inter-graph-based approach is on par with the uniform
|
1079 |
+
deployment approach. This is because the former is the least information-collective approach
|
1080 |
+
among our three deployment strategies.
|
1081 |
+
|
1082 |
+
23
|
1083 |
+
Uniform sampling
|
1084 |
+
our heuristic
|
1085 |
+
22
|
1086 |
+
our graph based
|
1087 |
+
our inter-graph based
|
1088 |
+
21
|
1089 |
+
20
|
1090 |
+
2~1
|
1091 |
+
0.0
|
1092 |
+
0.2
|
1093 |
+
0.4
|
1094 |
+
0.6
|
1095 |
+
0.8
|
1096 |
+
1.0
|
1097 |
+
1.2
|
1098 |
+
["]VI. CONCLUSIONS AND FUTURE WORK
|
1099 |
+
In this paper, we explored how to determine the initial deployment positions of a group of
|
1100 |
+
floaters to best evaluate the WC flow field. Our approach relies on clustering a given model of
|
1101 |
+
the WC into segments, each of which is represented by a coreset, and determining the floaters’
|
1102 |
+
initial deployment positions with the aim of visiting all coresets under constraints: the number
|
1103 |
+
of floaters, and the time frame used for evaluation. We analyzed the results of our scheme over
|
1104 |
+
a database of 48 WC maps that span over a year of measurements in the Gulf of Haifa, Israel.
|
1105 |
+
Compared to the uniform sampling benchmark, the results show that our scheme is more accurate
|
1106 |
+
in terms of the WC’s prediction, and is more robust to mismatches between the given WC model
|
1107 |
+
and the actual one. Future work will identify gaps in the given model and complete them by
|
1108 |
+
guiding the floaters to visit these locations.
|
1109 |
+
VII. ACKNOWLEDGEMENTS
|
1110 |
+
This work was supported in part by the MOST action for Agriculture, Environment, and Water
|
1111 |
+
for the 490 year 2019 (Grant # 3-16728) and by the the University of Haifa’s Data Science
|
1112 |
+
Research Center.
|
1113 |
+
REFERENCES
|
1114 |
+
[1] “Open source code for all the algorithms presented in this paper,” 2022, Link for open-source code.
|
1115 |
+
[2] L. Kuznetsov, K. Ide, and C. K. Jones, “A method for assimilation of Lagrangian data,” Monthly Weather Review, vol.
|
1116 |
+
131, no. 10, pp. 2247–2260, 2003.
|
1117 |
+
[3] R. N. Miller, Numerical modeling of ocean circulation.
|
1118 |
+
Cambridge University Press, 2007.
|
1119 |
+
[4] M. Santoki, S. Ratheesh, R. Sharma, K. Joshipura, and S. Basu, “Assimilation of drifter data in a circulation model of the
|
1120 |
+
Indian Ocean,” IEEE Geoscience and Remote Sensing Letters, vol. 9, no. 1, pp. 100–103, 2011.
|
1121 |
+
[5] S. Castellari, A. Griffa, T. M. Özgökmen, and P.-M. Poulain, “Prediction of particle trajectories in the adriatic sea using
|
1122 |
+
Lagrangian data assimilation,” Journal of Marine Systems, vol. 29, no. 1-4, pp. 33–50, 2001.
|
1123 |
+
[6] M. J. Carrier, H. Ngodock, S. Smith, G. Jacobs, P. Muscarella, T. Ozgokmen, B. Haus, and B. Lipphardt, “Impact of
|
1124 |
+
assimilating ocean velocity observations inferred from Lagrangian drifter data using the NCOM-4DVAR,” Monthly Weather
|
1125 |
+
Review, vol. 142, no. 4, pp. 1509–1524, 2014.
|
1126 |
+
[7] R. Diamant, “Prediction of water current using a swarm of submerged drifters,” IEEE Sensors Journal, vol. 20, no. 19,
|
1127 |
+
pp. 11 598–11 607, 2020.
|
1128 |
+
[8] A. Molcard, L. I. Piterbarg, A. Griffa, T. M. Özgökmen, and A. J. Mariano, “Assimilation of drifter observations for the
|
1129 |
+
reconstruction of the Eulerian circulation field,” Journal of Geophysical Research: Oceans, vol. 108, no. C3, 2003.
|
1130 |
+
|
1131 |
+
[9] J. L. Callaham, K. Maeda, and S. L. Brunton, “Robust flow reconstruction from limited measurements via sparse
|
1132 |
+
representation,” Physical Review Fluids, vol. 4, no. 10, p. 103907, 2019.
|
1133 |
+
[10] J. S. Jaffe, P. J. Franks, P. L. Roberts, D. Mirza, C. Schurgers, R. Kastner, and A. Boch, “A swarm of autonomous miniature
|
1134 |
+
underwater robot drifters for exploring submesoscale ocean dynamics,” Nature communications, vol. 8, no. 1, pp. 1–8,
|
1135 |
+
2017.
|
1136 |
+
[11] M. Tukan, C. Baykal, D. Feldman, and D. Rus, “On coresets for support vector machines,” in International Conference
|
1137 |
+
on Theory and Applications of Models of Computation.
|
1138 |
+
Springer, 2020, pp. 287–299.
|
1139 |
+
[12] G. Umgiesser, D. M. Canu, A. Cucco, and C. Solidoro, “A finite element model for the venice lagoon. development, set
|
1140 |
+
up, calibration and validation,” Journal of Marine Systems, vol. 51, no. 1-4, pp. 123–145, 2004.
|
1141 |
+
[13] H. Salman, K. Ide, and C. K. Jones, “Using flow geometry for drifter deployment in Lagrangian data assimilation,” Tellus
|
1142 |
+
A: Dynamic Meteorology and Oceanography, vol. 60, no. 2, pp. 321–335, 2008.
|
1143 |
+
[14] C. Chapman and J.-B. Sallée, “Can we reconstruct mean and eddy fluxes from Argo floats?” Ocean Modelling, vol. 120,
|
1144 |
+
pp. 83–100, 2017.
|
1145 |
+
[15] H. Bai, “Motion-dependent estimation of a spatial vector field with multiple vehicles,” in 2018 IEEE conference on decision
|
1146 |
+
and control (CDC).
|
1147 |
+
IEEE, 2018, pp. 1379–1384.
|
1148 |
+
[16] L. Shi, R. Zheng, S. Zhang, and M. Liu, “Cooperative estimation to reconstruct the parametric flow field using multiple
|
1149 |
+
AUVs,” IEEE Transactions on Instrumentation and Measurement, vol. 70, pp. 1–10, 2021.
|
1150 |
+
[17] M. Rafiee, Q. Wu, and A. M. Bayen, “Kalman filter based estimation of flow states in open channels using Lagrangian
|
1151 |
+
sensing,” in Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese
|
1152 |
+
Control Conference.
|
1153 |
+
IEEE, 2009, pp. 8266–8271.
|
1154 |
+
[18] G. A. Hollinger and G. S. Sukhatme, “Sampling-based motion planning for robotic information gathering.” in Robotics:
|
1155 |
+
Science and Systems, vol. 3, no. 5.
|
1156 |
+
Citeseer, 2013.
|
1157 |
+
[19] A. Molcard, A. C. Poje, and T. M. Özgökmen, “Directed drifter launch strategies for Lagrangian data assimilation using
|
1158 |
+
hyperbolic trajectories,” Ocean Modelling, vol. 12, no. 3-4, pp. 268–289, 2006.
|
1159 |
+
[20] J. Hansen and G. Dudek, “Coverage optimization with non-actuated, floating mobile sensors using iterative trajectory
|
1160 |
+
planning in marine flow fields,” in 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
|
1161 |
+
IEEE, 2018, pp. 1906–1912.
|
1162 |
+
[21] K. Kim, D. Lee, and I. Essa, “Gaussian process regression flow for analysis of motion trajectories,” in 2011 International
|
1163 |
+
Conference on Computer Vision.
|
1164 |
+
IEEE, 2011, pp. 1164–1171.
|
1165 |
+
[22] K.-F. Dagestad, J. Röhrs, Ø. Breivik, and B. Ådlandsvik, “Opendrift v1. 0: a generic framework for trajectory modelling,”
|
1166 |
+
Geoscientific Model Development, vol. 11, no. 4, pp. 1405–1420, 2018.
|
1167 |
+
[23] H.-P. Tan, R. Diamant, W. K. Seah, and M. Waldmeyer, “A survey of techniques and challenges in underwater localization,”
|
1168 |
+
Ocean Engineering, vol. 38, no. 14-15, pp. 1663–1676, 2011.
|
1169 |
+
[24] T. Alexandri, M. Walter, and R. Diamant, “A time-difference-of-arrival based target motion analysis for localization of
|
1170 |
+
underwater vehicles,” IEEE Transactions on Vehicular Technology, 2021.
|
1171 |
+
[25] F. John, “Extremum problems with inequalities as subsidiary conditions,” in Traces and emergence of nonlinear
|
1172 |
+
programming.
|
1173 |
+
Springer, 2014, pp. 197–215.
|
1174 |
+
|
1175 |
+
[26] M. J. Todd and E. A. Yıldırım, “On Khachiyan’s algorithm for the computation of minimum-volume enclosing ellipsoids,”
|
1176 |
+
Discrete Applied Mathematics, vol. 155, no. 13, pp. 1731–1744, 2007.
|
1177 |
+
[27] I. Jubran, M. Tukan, A. Maalouf, and D. Feldman, “Sets clustering,” in International Conference on Machine Learning.
|
1178 |
+
PMLR, 2020, pp. 4994–5005.
|
1179 |
+
[28] Y.-Y. Lin, C.-C. Ni, N. Lei, X. David Gu, and J. Gao, “Robot coverage path planning for general surfaces using quadratic
|
1180 |
+
differentials,” in 2017 IEEE International Conference on Robotics and Automation (ICRA), 2017, pp. 5005–5011.
|
1181 |
+
[29] X. Zheng, S. Jain, S. Koenig, and D. Kempe, “Multi-robot forest coverage,” in 2005 IEEE/RSJ International Conference
|
1182 |
+
on Intelligent Robots and Systems.
|
1183 |
+
IEEE, 2005, pp. 3852–3857.
|
1184 |
+
[30] D. P. Woodruff, “Sketching as a tool for numerical linear algebra,” arXiv preprint arXiv:1411.4357, 2014.
|
1185 |
+
[31] A. Badanidiyuru, B. Mirzasoleiman, A. Karbasi, and A. Krause, “Streaming submodular maximization: Massive data
|
1186 |
+
summarization on the fly,” in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery
|
1187 |
+
and data mining, 2014, pp. 671–680.
|
1188 |
+
[32] D. Feldman, “Core-sets: Updated survey,” in Sampling techniques for supervised or unsupervised tasks.
|
1189 |
+
Springer, 2020,
|
1190 |
+
pp. 23–44.
|
1191 |
+
[33] R. Goldman, E. Biton, E. Brokovich, S. Kark, and N. Levin, “Oil spill contamination probability in the southeastern
|
1192 |
+
Levantine basin,” Marine Pollution Bulletin, vol. 91, no. 1, pp. 347–356, 2015.
|
1193 |
+
[34] M. Grötschel, L. Lovász, and A. Schrijver, “The ellipsoid method,” in Geometric Algorithms and Combinatorial
|
1194 |
+
Optimization.
|
1195 |
+
Springer, 1993, pp. 64–101.
|
1196 |
+
[35] M. Grötschel, L. Lovász, and A. Schrijver, Geometric algorithms and combinatorial optimization.
|
1197 |
+
Springer Science &
|
1198 |
+
Business Media, 2012, vol. 2.
|
1199 |
+
[36] Y. T. Lee, A. Sidford, and S. S. Vempala, “Efficient convex optimization with membership oracles,” in Conference On
|
1200 |
+
Learning Theory.
|
1201 |
+
PMLR, 2018, pp. 1292–1294.
|
1202 |
+
[37] M. Tukan, A. Maalouf, D. Feldman, and R. Poranne, “Obstacle aware sampling for path planning,” in 2022 IEEE/RSJ
|
1203 |
+
International Conference on Intelligent Robots and Systems (IROS), 2022, pp. 13 676–13 683.
|
1204 |
+
[38] S. Har-Peled, Geometric approximation algorithms.
|
1205 |
+
American Mathematical Soc., 2011, no. 173.
|
1206 |
+
[39] A. Bundy and L. Wallen, “Breadth-first search,” in Catalogue of artificial intelligence tools.
|
1207 |
+
Springer, 1984, pp. 13–13.
|
1208 |
+
[40] D. B. Johnson, “Efficient algorithms for shortest paths in sparse networks,” Journal of the ACM (JACM), vol. 24, no. 1,
|
1209 |
+
pp. 1–13, 1977.
|
1210 |
+
[41] P. Refaeilzadeh, L. Tang, and H. Liu, “Cross-validation.” Encyclopedia of database systems, vol. 5, pp. 532–538, 2009.
|
1211 |
+
[42] M. Claesen and B. De Moor, “Hyperparameter search in machine learning,” arXiv preprint arXiv:1502.02127, 2015.
|
1212 |
+
[43] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss,
|
1213 |
+
V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, “Scikit-learn: Machine
|
1214 |
+
learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825–2830, 2011.
|
1215 |
+
|
8tE2T4oBgHgl3EQf8Qgm/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
99E5T4oBgHgl3EQfRQ7z/content/tmp_files/2301.05520v1.pdf.txt
ADDED
@@ -0,0 +1,2503 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Draft version January 16, 2023
|
2 |
+
Typeset using LATEX twocolumn style in AASTeX631
|
3 |
+
Toward accurate measurement of property-dependent galaxy clustering:
|
4 |
+
II. Tests of the smoothed density-corrected Vmax method
|
5 |
+
Lei Yang (杨蕾)
|
6 |
+
1 and Zhigang Li (李志刚)2
|
7 |
+
1South-Western Institute for Astronomy Research, Yunnan University
|
8 |
+
Kunming, Yunnan 650500, China
|
9 |
+
2College of Physics and Electronic Engineering, Nanyang Normal University
|
10 |
+
Nanyang, Henan, 473061, China
|
11 |
+
ABSTRACT
|
12 |
+
We present a smoothed density-corrected Vmax technique for building a random catalog for property-
|
13 |
+
dependent galaxy clustering estimation. This approach is essentially based on the density-corrected
|
14 |
+
Vmax method of Cole (2011), with three improvements to the original method. To validate the improved
|
15 |
+
method, we generate two sets of flux-limited samples from two independent mock catalogs with different
|
16 |
+
k + e corrections. By comparing the two-point correlation functions, our results demonstrate that the
|
17 |
+
random catalog created by the smoothed density-corrected Vmax approach provides a more accurate
|
18 |
+
and precise measurement for both sets of mock samples than the commonly used Vmax method and
|
19 |
+
redshift shuffled method. For flux-limited samples and color-dependent subsamples, the accuracy for
|
20 |
+
the projected correlation function is well constrained within 1% on the scale 0.07h−1Mpc to 30h−1Mpc.
|
21 |
+
The accuracy of the redshift-space correlation function is less than 2% as well. Currently, it is the
|
22 |
+
only approach that holds promise for achieving the high-accuracy goal of clustering measures for next-
|
23 |
+
generation surveys.
|
24 |
+
Keywords: Galaxies(573) — Galaxy evolution(594) — Large-scale structure of the universe(902) —
|
25 |
+
Two-point correlation function(1951)
|
26 |
+
1. INTRODUCTION
|
27 |
+
Over the last couple of decades, the successful observa-
|
28 |
+
tion of galaxy redshift surveys (e.g., Two Degree Field
|
29 |
+
Galaxy Redshift Survey, 2dFGRS, Colless et al. 2003;
|
30 |
+
the Sloan Digital Sky Survey, SDSS, York et al. 2000; the
|
31 |
+
Baryon Oscillation SpectroscopicSurvey, BOSS, Eisen-
|
32 |
+
stein et al. 2011; the VIMOS Public Extragalactic Red-
|
33 |
+
shift Survey, VIPERS, Garilli et al. 2012) enable sig-
|
34 |
+
nificant progress has been achieved on our understand-
|
35 |
+
ing of galaxy formation and evolution (Madgwick et al.
|
36 |
+
2003; Berlind et al. 2006; Guo et al. 2011, 2018; Zu et al.
|
37 |
+
2021), the galaxy-halo connection (Jing et al. 1998; Yang
|
38 |
+
et al. 2003, 2008, 2012; Zheng et al. 2005, 2009; Vale &
|
39 |
+
Ostriker 2004; Alam et al. 2021a; Wechsler & Tinker
|
40 |
+
2018; Behroozi et al. 2019), and the nature of grav-
|
41 |
+
ity and dark energy ( Peacock et al. 2001; Weinberg
|
42 |
+
Corresponding author: Lei Yang
|
43 | |
44 |
+
et al. 2013; Samushia et al. 2013; Alam et al. 2021b and
|
45 |
+
reference therein).
|
46 |
+
In the upcoming years, the next-
|
47 |
+
generation surveys, such as the Dark Energy Spectro-
|
48 |
+
scopic Instrument (DESI; Levi et al. 2013; DESI Col-
|
49 |
+
laboration et al. 2016a,b), the Legacy Survey of Space
|
50 |
+
and Time (LSST; LSST Dark Energy Science Collabo-
|
51 |
+
ration 2012), the space mission Euclid (Amendola et al.
|
52 |
+
2013) and CSST (Cao et al. 2018; Gong et al. 2019),
|
53 |
+
will map the 3D galaxy distribution in an unprecedent-
|
54 |
+
edly volume, leading to about an order of magnitude
|
55 |
+
more extragalactic spectroscopic redshifts than that of
|
56 |
+
SDSS, BOSS and eBOSS have achieved (Zarrouk et al.
|
57 |
+
2021; Yuan et al. 2022b; Myers et al. 2022; Schlegel
|
58 |
+
et al. 2022). Massive amounts of data from deeper in
|
59 |
+
the sky will provide new insights into the physics of
|
60 |
+
galaxy formation, as well as the nature of dark matter
|
61 |
+
and dark energy (Hahn et al. 2022). Galaxy two-point
|
62 |
+
statistics, being one of the most fundamental tools, will
|
63 |
+
continue to play a crucial role in future data analysis
|
64 |
+
(Valluri et al. 2022; Amin et al. 2022), as they have in
|
65 |
+
the past (Zehavi et al. 2011; Nuza et al. 2013; Skibba
|
66 |
+
arXiv:2301.05520v1 [astro-ph.CO] 13 Jan 2023
|
67 |
+
|
68 |
+
ID2
|
69 |
+
Yang et al.
|
70 |
+
et al. 2014; Samushia et al. 2014; Guo et al. 2014; Planck
|
71 |
+
Collaboration et al. 2016; Shi et al. 2018). Due to dif-
|
72 |
+
ferent systematics, it is still difficult to reliably mea-
|
73 |
+
sure small-scale property-dependent galaxy clustering at
|
74 |
+
the present time.
|
75 |
+
These systematics include redshift-
|
76 |
+
dependent completeness, the missing galaxies in ob-
|
77 |
+
servations (Reid et al. 2016; Bianchi & Percival 2017;
|
78 |
+
Bianchi & Verde 2020), the incorrect estimation of the
|
79 |
+
radial selection model (Ross et al. 2012; Yang et al.
|
80 |
+
2020), among others (Breton & de la Torre 2021; Farrow
|
81 |
+
et al. 2021; Merz et al. 2021). Fortunately, the coming
|
82 |
+
big data will considerably reduce random errors in clus-
|
83 |
+
tering determination, but to reach the high accuracy of
|
84 |
+
clustering analysis required by the next generation sur-
|
85 |
+
veys, we must eliminate systematic errors in measure-
|
86 |
+
ment (Beutler et al. 2014; Reid et al. 2016; Glanville
|
87 |
+
et al. 2021; D´avila-Kurb´an et al. 2021). In this study, the
|
88 |
+
systematic bias produced by the radial selection model
|
89 |
+
is investigated in greater detail.
|
90 |
+
To measure the galaxy two-point correlation function
|
91 |
+
(hereafter 2PCF), we must build a random catalog with
|
92 |
+
the same angular and radial selection functions as the
|
93 |
+
observed sample, but with a random distribution in the
|
94 |
+
observed space (Davis & Peebles 1983; Hamilton 1993).
|
95 |
+
The angular selection function is easy to obtain from
|
96 |
+
observation, but the radial selection function is difficult
|
97 |
+
to estimate accurately. As the sample has a fixed num-
|
98 |
+
ber density and the redshift distribution of a random
|
99 |
+
catalog is straightforward to construct (Tegmark et al.
|
100 |
+
2004), previous works often use a volume-limited sample
|
101 |
+
for clustering analysis (Norberg et al. 2002; Zehavi et al.
|
102 |
+
2002, 2005, 2011; McBride et al. 2011; Shi et al. 2016;
|
103 |
+
Mohammad et al. 2018). However, due to the need of
|
104 |
+
excluding a substantial number of galaxies, the statisti-
|
105 |
+
cal precision of the clustering measurement is reduced
|
106 |
+
(Zehavi et al. 2005; Xu et al. 2016).
|
107 |
+
Alternatively, a
|
108 |
+
flux-limited sample may optimize the utilization of ob-
|
109 |
+
served galaxies, but since its radial selection function
|
110 |
+
φ(z) changes with redshift, it is not easy to build the
|
111 |
+
redshifts of random galaxies for a flux-limited sample
|
112 |
+
unless we know the galaxy luminosity function (here-
|
113 |
+
after LF) Φ(Mr) (Loveday et al. 2015; Karademir et al.
|
114 |
+
2021).
|
115 |
+
The radial selection function for the flux-limited sam-
|
116 |
+
ple has been recovered using a number of ways. For in-
|
117 |
+
stance, the smooth spline fit approach utilizes a ‘spline’
|
118 |
+
model to fit the redshift distribution of a galaxy sam-
|
119 |
+
ple (Reid et al. 2010; Wang et al. 2017).
|
120 |
+
The Vmax
|
121 |
+
method populates random galaxies within the maximum
|
122 |
+
viewable volume of a real galaxy, which is dependent
|
123 |
+
on the galaxy’s observational limitations. The redshift
|
124 |
+
‘shuffled’ technique is a commonly employed alternative
|
125 |
+
(Guo et al. 2013; Zu & Mandelbaum 2015; Wang et al.
|
126 |
+
2021). This approach chooses redshifts at random from
|
127 |
+
the real galaxy sample and assigns them to the ran-
|
128 |
+
dom galaxy catalog. Through clustering analysis of the
|
129 |
+
VIPERS data, de la Torre et al. (2013) showed that the
|
130 |
+
spline fit approach underestimates the predicted 2PCF
|
131 |
+
in comparison to the Vmax method, particularly on scales
|
132 |
+
larger than 3 h−1Mpc.
|
133 |
+
In the BOSS systematics in-
|
134 |
+
vestigation, Ross et al. (2012) revealed that the shuf-
|
135 |
+
fled technique had a minor bias in BAO measurement
|
136 |
+
compared to the spline fit method (Ross et al. 2015).
|
137 |
+
However, de Mattia & Ruhlmann-Kleider (2019) demon-
|
138 |
+
strated that the shuffled approach suffers from the ‘inte-
|
139 |
+
gral constraint’ effect when measuring the power spec-
|
140 |
+
trum. Using mocks from a high-resolution simulation,
|
141 |
+
Yang et al. (2020) (hereafter Paper I) found that both
|
142 |
+
the redshift shuffled technique and the Vmax method un-
|
143 |
+
derestimate galaxy clustering by 30% and 20%, respec-
|
144 |
+
tively, on scales ≳ 10h−1Mpc for flux-limited samples.
|
145 |
+
Consequently, as long as we continue to use the afore-
|
146 |
+
mentioned radial selection methods to construct the red-
|
147 |
+
shifts for random catalogs for a flux-limited sample, our
|
148 |
+
clustering measurement will contain an unavoidable sys-
|
149 |
+
tematic deviation from the true galaxy clustering.
|
150 |
+
Cole (2011) proposes a density-corrected Vmax tech-
|
151 |
+
nique for concurrently estimating LF and generating a
|
152 |
+
random catalog for a flux-limited sample.
|
153 |
+
Unlike the
|
154 |
+
conventional Vmax method, this technique can success-
|
155 |
+
fully eliminate density fluctuations.
|
156 |
+
In Cole (2011),
|
157 |
+
they examine the radial distribution of random galax-
|
158 |
+
ies, which is in excellent agreement with the input
|
159 |
+
galaxy sample. This method has been employed to de-
|
160 |
+
termine property-dependent galaxy clustering (Farrow
|
161 |
+
et al. 2015) and clustering analysis (de la Torre et al.
|
162 |
+
2017; Pezzotta et al. 2017; Loveday et al. 2018; John-
|
163 |
+
ston et al. 2021). However, its clustering measurement
|
164 |
+
performance has not been assessed. The purpose of this
|
165 |
+
study is to test the Cole (2011) technique for clustering
|
166 |
+
measurements using mock data. In addition, some mod-
|
167 |
+
ifications are made to the original approach in order to
|
168 |
+
improve its measurement accuracy.
|
169 |
+
This paper is structured as follows.
|
170 |
+
In Section 2,
|
171 |
+
we review the Cole (2011) method and introduce the
|
172 |
+
smoothed density-corrected Vmax method.
|
173 |
+
The con-
|
174 |
+
structions of mock galaxy catalogs are detailed in Sec-
|
175 |
+
tion 3.
|
176 |
+
We present the testing results of the correla-
|
177 |
+
tion functions in Section 4. In Section 5, we assess the
|
178 |
+
smoothed density-corrected Vmax method and discuss
|
179 |
+
the potential sources of uncertainty in estimate.
|
180 |
+
We
|
181 |
+
conclude the paper in Section 6.
|
182 |
+
|
183 |
+
The smoothed Vmax method
|
184 |
+
3
|
185 |
+
2. THE SMOOTHED DENSITY-CORRECTED Vmax
|
186 |
+
METHOD
|
187 |
+
To address the difficulty of recovering the radial selec-
|
188 |
+
tion function of property-dependent galaxy sample, Cole
|
189 |
+
(2011) developed a density-corrected Vmax approach for
|
190 |
+
galaxy clustering estimate. This section starts with a
|
191 |
+
briefly overview of the Cole (2011) technique. Follow-
|
192 |
+
ing that, we detail the improvements to the original
|
193 |
+
Cole (2011) methodology, which we call the smoothed
|
194 |
+
density-corrected Vmax method.
|
195 |
+
2.1. The Cole (2011) method
|
196 |
+
On the basis of the standard Vmax approach, Cole
|
197 |
+
(2011) presented a weighted Vmax method based on a
|
198 |
+
joint stepwise maximum likelihood method, which effec-
|
199 |
+
tively eliminates the influence of density fluctuation. In
|
200 |
+
this method, a density-weighted maximum volume V DC
|
201 |
+
max
|
202 |
+
1 is defined, which is the normal Vmax weighted by the
|
203 |
+
estimated galaxy overdensities ∆(z) and the LF density
|
204 |
+
evolution P(z). They further define a weight
|
205 |
+
wα ≡
|
206 |
+
Vα,max
|
207 |
+
V dc
|
208 |
+
α,max + µVα,max
|
209 |
+
,
|
210 |
+
(1)
|
211 |
+
where Vα,max and V dc
|
212 |
+
α,max are the normal Vmax and
|
213 |
+
density-corrected Vmax for the αth galaxy in the ob-
|
214 |
+
served sample.
|
215 |
+
µ is a Lagrange multiplier providing
|
216 |
+
constraints with ⟨
|
217 |
+
Vα,max
|
218 |
+
V DC
|
219 |
+
α,max+µVα,max ⟩ = 1 when estimating
|
220 |
+
LF for the galaxy sample. Lastly, a random catalog can
|
221 |
+
be created by replicating individual galaxies nα = nwα
|
222 |
+
times and distributing them at random across the Vα,max
|
223 |
+
volume. Note that, unlike the standard Vmax approach,
|
224 |
+
nα is no longer the same for all galaxies and the selec-
|
225 |
+
tion rate of random galaxies is adjusted by weight wα.
|
226 |
+
The brightness of the galaxy may be over- or under-
|
227 |
+
represented in the observed sample as a result of the
|
228 |
+
density variation in the Vmax volume being appropri-
|
229 |
+
ately compensated by the weight wα. By comparing the
|
230 |
+
output redshift distribution to that of the input galaxy
|
231 |
+
sample, Cole (2011) proved that the random catalog cre-
|
232 |
+
ated by this density-weighted Vmax technique could re-
|
233 |
+
cover the genuine galaxy selection function. While this
|
234 |
+
approach has not yet been tested on galaxy clustering
|
235 |
+
using mock galaxy catalog, it remains to be validated
|
236 |
+
using mocks.
|
237 |
+
2.2. The smoothed density-corrected Vmax method
|
238 |
+
Before testing the Cole (2011) method, we perform
|
239 |
+
three modifications to the original public code 2. The
|
240 |
+
1 See their equation (11) and (16) in Cole (2011).
|
241 |
+
2 http://astro.dur.ac.uk/∼cole/random cats/
|
242 |
+
original algorithm is only applicable to galaxy sample
|
243 |
+
with a single faint flux cut, but by adding zmin estimate,
|
244 |
+
our first update makes the code applicable to a generic
|
245 |
+
double flux-cut sample 3. The maximum(minimum) red-
|
246 |
+
shifts zmax(min) in our updated code is same as Paper I
|
247 |
+
which are determined as follows:
|
248 |
+
zmax = min[zmag,max, zsample,max],
|
249 |
+
(2)
|
250 |
+
zmin = max[zmag,min, zsample,min],
|
251 |
+
(3)
|
252 |
+
where zsample,max(min) is the redshift limits of galaxy
|
253 |
+
sample, and zmag,max(min) is derived by
|
254 |
+
mfaint = M + DM(zmag,max) + k(z) − E(z),
|
255 |
+
(4)
|
256 |
+
mbright = M + DM(zmag,min) + k(z) − E(z),
|
257 |
+
(5)
|
258 |
+
where the flux limits are set by apparent magnitude
|
259 |
+
mbright(faint), M is the absolute magnitude, the distance
|
260 |
+
modulus is DM = 5log10(dL) + 25 − 5log10h, k(z) is the
|
261 |
+
k-correction, and E(z) is the luminosity evolution cor-
|
262 |
+
rection (e-correction). Our second code improvement is
|
263 |
+
the k-correction. In the original code, the k-correction is
|
264 |
+
performed for all galaxies depending on the input func-
|
265 |
+
tion k(z), which hinders the method’s ability to apply
|
266 |
+
to a real galaxy sample whose k-correction is depen-
|
267 |
+
dent not just on redshift but also on galaxy properties
|
268 |
+
(e.g., color). We modify the code to take a k(z, color)
|
269 |
+
model as input, allowing k-correction to be conducted
|
270 |
+
on individual galaxies based on their redshifts and col-
|
271 |
+
ors. This makes the technique more applicable to ob-
|
272 |
+
servable galaxies. Following the aforementioned mod-
|
273 |
+
ifications, the output cloned random catalog from the
|
274 |
+
updated algorithm is basically consistent with the gen-
|
275 |
+
uine radial distribution of the galaxy number density
|
276 |
+
ntrue(z). However, there are small fluctuations in the
|
277 |
+
output radial distribution that have a considerable in-
|
278 |
+
fluence on the final clustering estimate. Our final mod-
|
279 |
+
ification to the algorithm is to smooth the radial dis-
|
280 |
+
tribution of the output cloned random galaxies. In the
|
281 |
+
smooth procedure, we begin by generating a histogram
|
282 |
+
of comoving distance d for the random galaxies. We set
|
283 |
+
a bin size of ∆d = 5h−1Mpc, and N(d)hist represents
|
284 |
+
the number of random galaxies in each bin. Secondly,
|
285 |
+
we employ a convolution operator to smooth the his-
|
286 |
+
togram as N s
|
287 |
+
hist = [Nhist ∗ ∆smooth], where ∆smooth = 5
|
288 |
+
is the smooth box size in 1D and N s
|
289 |
+
hist is the smooth
|
290 |
+
radial distribution of random galaxies. Final redshifts
|
291 |
+
for random galaxies are generated based on the profile
|
292 |
+
of N s
|
293 |
+
hist that has been smoothed. In Section 4.2, we will
|
294 |
+
3 This modification primarily changes the step-function S from
|
295 |
+
S(Lmin|L) to S(Lmin, Lmax|L) in equation(5) and the lower limit
|
296 |
+
of Vmax integration in equation (11) and (39) in Cole (2011).
|
297 |
+
|
298 |
+
4
|
299 |
+
Yang et al.
|
300 |
+
observe that our modifications enhance the clustering
|
301 |
+
measurement accuracy significantly.
|
302 |
+
Farrow et al. (2015) recently developed the Cole
|
303 |
+
(2011) technique to quantify the property-dependent
|
304 |
+
galaxy clustering of GAMA II data (Driver et al. 2011;
|
305 |
+
Liske et al. 2015). They found that the Cole (2011) tech-
|
306 |
+
nique yields a redshift distribution that is too broad for
|
307 |
+
cloned random galaxies, which may be the result of lumi-
|
308 |
+
nosity evolution. To mitigate this unanticipated impact,
|
309 |
+
Farrow et al. (2015) developed a Gaussian window func-
|
310 |
+
tion to restrict the redshift distribution of the cloned
|
311 |
+
galaxies. In the first place, the mock galaxy catalogs
|
312 |
+
that we construct in this study resemble the low red-
|
313 |
+
shift SDSS data, as opposed to the GAMA data, which
|
314 |
+
encompass a relatively broad redshift range of 0∼0.5. In
|
315 |
+
our mock galaxies, luminosity evolution is expected to
|
316 |
+
have negligible effects. Second, our first adjustment to
|
317 |
+
the zmin calculation narrows the distribution of cloned
|
318 |
+
random galaxies. Our test findings in Section 4.2 will
|
319 |
+
demonstrate that the smoothed density-corrected Vmax
|
320 |
+
approach is adequate for obtaining accurate galaxy clus-
|
321 |
+
tering determination.
|
322 |
+
3. THE MOCK GALAXY CATALOGS
|
323 |
+
In this part, we describe the construction of mock
|
324 |
+
galaxy catalogs for a robust test of the smooth density-
|
325 |
+
corrected Vmax approach on clustering estimation. We
|
326 |
+
build two sets of mock samples, one with simple k + e-
|
327 |
+
corrections and the other with complex k+e-corrections
|
328 |
+
for galaxies.
|
329 |
+
The first group of mock galaxy catalogs is created in
|
330 |
+
a manner similar to Paper I. For the halo catalog, we
|
331 |
+
adopt the WMAP 3072 600 cosmological N-body sim-
|
332 |
+
ulation from the CosmicGrowth simulation suite (Jing
|
333 |
+
2019). This simulation starts at redshift 144 with 30723
|
334 |
+
particles evolving in a 600 h−1Mpc cube box. The sim-
|
335 |
+
ulation assumes a standard flat ΛCDM cosmology with
|
336 |
+
{Ωm = 0.268, Ωb = 0.045, σ8 = 0.83, ns = 0.968} and
|
337 |
+
h = H0/(100 km s−1Mpc−1) = 0.71, which are compati-
|
338 |
+
ble with the Nine-Year Wilkinson Microwave Anisotropy
|
339 |
+
Probe (WMAP 9) observations (Hinshaw et al. 2013;
|
340 |
+
Bennett et al. 2013). This simulation has a mass reso-
|
341 |
+
lution of 5.54 × 108 h−1M⊙. To identify halos for each
|
342 |
+
output snapshot, the friends-of-friends technique is used
|
343 |
+
with a linking length of 0.2 in units of the mean parti-
|
344 |
+
cle separation (Davis et al. 1985). Hierarchical Bound-
|
345 |
+
Tracing technique is used to find subhalos and their
|
346 |
+
merger histories. In this study, the snapshot at z = 0
|
347 |
+
is utilized to build the halo catalog, and each halo con-
|
348 |
+
tains at least 50 particles. The “orphan” halos are also
|
349 |
+
maintained in the catalog 4 (Yang et al. 2019).
|
350 |
+
We use the subhalo abundance matching (SHAM)
|
351 |
+
method to establish the connection between galaxies
|
352 |
+
and subhalos. Based on the galaxy absolute magnitude
|
353 |
+
M 0.1
|
354 |
+
r
|
355 |
+
and the peak mass Mpeak of subhalos, a mono-
|
356 |
+
tonic relationship between the cumulative number den-
|
357 |
+
sity n(< M 0.1
|
358 |
+
r
|
359 |
+
) = n(> Mpeak) has been constructed
|
360 |
+
(Conroy et al. 2006; Hearin et al. 2014; Wechsler & Tin-
|
361 |
+
ker 2018; Contreras et al. 2021).
|
362 |
+
We employ the lu-
|
363 |
+
minosity function of the SDSS DR7 full 1 sample of
|
364 |
+
the New York University Value-Added catalog (NYU-
|
365 |
+
VAGC)5 (Blanton et al. 2001, 2003, 2005), for which
|
366 |
+
the r−band absolute magnitude M 0.1
|
367 |
+
r
|
368 |
+
of galaxies has
|
369 |
+
been k− and e−corrected to z = 0.1.
|
370 |
+
The Mpeak is
|
371 |
+
the maximum mass ever attained by a subhalo over its
|
372 |
+
entire evolutionary history.
|
373 |
+
Once a subhalo has been
|
374 |
+
matched to a galaxy, its position and velocity are given
|
375 |
+
to the galaxy. By periodically rotating and stacking the
|
376 |
+
mock box, we generate 60 mock galaxy catalogs from
|
377 |
+
the parent catalog. Random sites are assigned to the ob-
|
378 |
+
server. The observed redshift zobs is determined by the
|
379 |
+
galaxy’s position and velocity relative to the observer.
|
380 |
+
To obtain the apparent magnitude mr, the k− correc-
|
381 |
+
tion and e− correction, as described in equation (4) and
|
382 |
+
equation (5), must be provided. Real data processing
|
383 |
+
determines these values by fitting the observed galaxy
|
384 |
+
flux to a library of synthetic spectrum models, which is
|
385 |
+
generally inapplicable to mock galaxies and also beyond
|
386 |
+
the scope of this work. For the sake of simplicity, we
|
387 |
+
consider two simple k− and e−correction cases here. In
|
388 |
+
the first case, no k+e corrections are applied to the mock
|
389 |
+
galaxies. In the second case, we suppose that all galax-
|
390 |
+
ies follow a simple k− and e−correction model. For the
|
391 |
+
k−correction, we take the model of Smith et al. (2017):
|
392 |
+
k0.1(z) =
|
393 |
+
4
|
394 |
+
�
|
395 |
+
i=0
|
396 |
+
Ai(z − 0.1)4−i.
|
397 |
+
(6)
|
398 |
+
Smith et al. (2017) fit the above fourth-order polynomial
|
399 |
+
to individual GAMA galaxies, where Ai is the polyno-
|
400 |
+
mial’s fitting coefficient (McNaught-Roberts et al. 2014).
|
401 |
+
There are seven color-dependent k(z) models (see sec-
|
402 |
+
tion below) and we adopt the (g − r)0.1
|
403 |
+
med = 0.603 model
|
404 |
+
with the following fitting coefficients:
|
405 |
+
A0 = −3.428,
|
406 |
+
A1 = 9.478, A2 = −2.703, and A3 = 0.7646. For the
|
407 |
+
4 In the evolution process, some subhalos go below the resolution
|
408 |
+
limit due to the tidal stripping.
|
409 |
+
We keep subhalos whose in-
|
410 |
+
fall time is shorter than the merger time, and those subhalos do
|
411 |
+
not merge into the core of the host halo and host the “orphan”
|
412 |
+
galaxies.
|
413 |
+
5 lfvmax − q2.00a − 1.00.dr72full1.fits.
|
414 |
+
|
415 |
+
The smoothed Vmax method
|
416 |
+
5
|
417 |
+
e−correction, we use the SDSS model (Blanton 2006) :
|
418 |
+
E(z) = q0[1 + q1(z − z0))](z − z0),
|
419 |
+
(7)
|
420 |
+
where z0 = 0.1 is the zero point redshift for evolu-
|
421 |
+
tion correction, q0 = 2 denotes the evolution of mag-
|
422 |
+
nitude per redshift, q1 = −1 is the nonlinear param-
|
423 |
+
eter in redshift evolution. After applying the k− and
|
424 |
+
e−corrections to the mock galaxies, our final samples
|
425 |
+
are constructed as follows.
|
426 |
+
For each mock catalog in
|
427 |
+
each k + e correction case, we first generate a flux-
|
428 |
+
limited sample with flux cuts at mr = [15, 17] and a
|
429 |
+
sky coverage of ∼ 5950 deg2.
|
430 |
+
The flux-limited cata-
|
431 |
+
log is then divided into two luminosity-dependent sam-
|
432 |
+
ples, named LC1 with M 0.1
|
433 |
+
r
|
434 |
+
= [−19, −22] and LC2 with
|
435 |
+
M 0.1
|
436 |
+
r
|
437 |
+
= [−20, −23]. Using these selection criteria, the
|
438 |
+
galaxy sample’s number density changes as a function
|
439 |
+
of redshift. Figure 13 in Appendix A displays the av-
|
440 |
+
erage number density n(z) of 60 samples for two lumi-
|
441 |
+
nosity cuts in each k + e correction case. This redshift-
|
442 |
+
dependent number density typically prevents us from
|
443 |
+
obtaining an accurate measurementof galaxy clustering
|
444 |
+
particularly at scales ≤ 30h−1Mpc for flux-limited sam-
|
445 |
+
ples (Yuan et al. 2022a). In the following text, the above
|
446 |
+
mock samples generated from the simulation of (Jing
|
447 |
+
2019) are referred to as LC samples.
|
448 |
+
The second group of mock galaxy catalogs is built
|
449 |
+
from the lightcone catalog of Smith et al. (2017) 6. It
|
450 |
+
is essential to access the radial selection model using a
|
451 |
+
catalog of galaxies that closely resembles the observed
|
452 |
+
galaxies. The Smith et al. (2017) catalog is constructed
|
453 |
+
using the MXXL simulation (Angulo et al. 2012), which
|
454 |
+
assumes a ΛCDM cosmology with WMAP1 parameters
|
455 |
+
{Ωm = 0.25, σ8 = 0.9, ns = 0.968, h = 0.73} and
|
456 |
+
operates in a 3h−1Gpc box. The mass of the particle
|
457 |
+
is 6.17 × 109h−1M⊙.
|
458 |
+
Smith et al. (2017) created the
|
459 |
+
lightcone catalog by applying the halo occupation dis-
|
460 |
+
tribution method to link galaxies to subhalos. To assign
|
461 |
+
colors to the galaxies, they utilize an enhanced redshift-
|
462 |
+
dependent Skibba & Sheth (2009) model. The galaxy
|
463 |
+
k+e corrections in their lightcone catalog are more com-
|
464 |
+
plicated than the ones we use for LC samples. They em-
|
465 |
+
ploy color-dependent k−corrections obtained from the
|
466 |
+
GAMA survey for the k−corrections. In brief, they esti-
|
467 |
+
mate the k−corrections for individual galaxies in GAMA
|
468 |
+
data by fitting with equation (6), and they determine the
|
469 |
+
median k−correction in seven evenly spaced color bins to
|
470 |
+
construct seven k−correction models. These models are
|
471 |
+
(g −r)0.1
|
472 |
+
med = 0.131, 0.298, 0.443, 0.603, 0.785, 0.933, 1.067
|
473 |
+
with different polynomial coefficients. The k(z, color) is
|
474 |
+
6 http://icc.dur.ac.uk/data/
|
475 |
+
then interpolated for the lightcone catalog using seven
|
476 |
+
median color (g − r)0.1
|
477 |
+
med models based on the galaxy’s
|
478 |
+
color and redshift 7.
|
479 |
+
For the LF evolution, they em-
|
480 |
+
ployed the evolving Schechter function derived from
|
481 |
+
GAMA data. In the low redshift region z ≲ 0.13, the LF
|
482 |
+
of their catalog coincides with the LF of Blanton et al.
|
483 |
+
(2003), which we employ for LC samples, , and in the
|
484 |
+
median redshift region, the LF evolves to the GAMA
|
485 |
+
LF. The luminosity(color)-dependent galaxy clusterings
|
486 |
+
in Smith et al. (2017) catalog are generally consistent
|
487 |
+
with the SDSS DR7 results measured by Zehavi et al.
|
488 |
+
(2011) at low redshift, as well as the GAMA results mea-
|
489 |
+
sured by Farrow et al. (2015) at the median redshift.
|
490 |
+
Therefore, this catalog is suitable for testing different
|
491 |
+
radial selection models for property-dependent cluster-
|
492 |
+
ing measurement. We construct ten flux-limited sam-
|
493 |
+
ples from the full-sky lightcone catalog by rotating the
|
494 |
+
sky, using the galaxy selection criteria (mr = [15, 17])
|
495 |
+
and sky coverage (∼ 5950 deg2).
|
496 |
+
Two luminosity-
|
497 |
+
dependent galaxies, LS1 (M 0.1
|
498 |
+
r
|
499 |
+
= [−19, −22]) and LS2
|
500 |
+
(M 0.1
|
501 |
+
r
|
502 |
+
= [−20, −23]), are generated from each flux-
|
503 |
+
limited sample, much as we did for the LC samples.
|
504 |
+
As our sample selection resembles the SDSS DR7 data,
|
505 |
+
we further divide the luminosity-dependent sample into
|
506 |
+
blue subsample and red subsample using the color-cut
|
507 |
+
equation (g − r)0.1
|
508 |
+
cut = 0.21 − 0.03M 0.1
|
509 |
+
r
|
510 |
+
of Zehavi et al.
|
511 |
+
(2011). In the rest of this study, we refer to the mock
|
512 |
+
galaxy samples built from Smith et al. (2017) catalog as
|
513 |
+
LS samples.
|
514 |
+
In summary, we generate two sets of mock samples
|
515 |
+
from two simulations using the same selection criterion
|
516 |
+
for galaxies.
|
517 |
+
For the LC samples, flux-limited sam-
|
518 |
+
ples are constructed from sixty mocks with two abso-
|
519 |
+
lute magnitude cuts. Two cases are considered for k + e
|
520 |
+
corrections: (1) there are no k + e corrections; (2) all
|
521 |
+
galaxies are assumed to follow a simple k + e correction
|
522 |
+
model. Ten LS samples are created in the same man-
|
523 |
+
ner as LC samples, but using a public lightcone cata-
|
524 |
+
log. The LS samples, however, feature a color-dependent
|
525 |
+
k−correction and a complex e−correction that are un-
|
526 |
+
known to us. In order to examine the color-dependent
|
527 |
+
clustering, the luminosity-dependent LS data are split
|
528 |
+
into blue and red subsamples. We emphasize that nei-
|
529 |
+
ther the LC samples nor the LS samples are subjected
|
530 |
+
to any deliberate impact (e.g., fiber collision) in or-
|
531 |
+
der to decrease unknown systematic uncertainty in our
|
532 |
+
later tests.
|
533 |
+
In addition, when calculating the comov-
|
534 |
+
ing distance from redshift, we employ the cosmological
|
535 |
+
7 For details see Setion4.3 in Smith et al. (2017)
|
536 |
+
|
537 |
+
6
|
538 |
+
Yang et al.
|
539 |
+
model of the simulation from which the samples are con-
|
540 |
+
structed, separately.
|
541 |
+
4. TEST THE SMOOTHED
|
542 |
+
DENSITY-CORRECTED Vmax METHOD WITH
|
543 |
+
THE 2PCFS
|
544 |
+
In this section, we describe the construction of ran-
|
545 |
+
dom galaxy catalog, focusing on the radial distribution
|
546 |
+
of random galaxies derived from various radial selec-
|
547 |
+
tion models. Following that, we compare the correla-
|
548 |
+
tion functions generated by the random catalogs used in
|
549 |
+
these models.
|
550 |
+
4.1. Construction of the random catalogs
|
551 |
+
The random catalogs are constructed as follows. For
|
552 |
+
the angular distribution, we first generate a large num-
|
553 |
+
ber of random points that are uniformly dispersed across
|
554 |
+
the surface of a unit sphere.
|
555 |
+
For each mock sample
|
556 |
+
and subsample, we extract a collection of points with
|
557 |
+
the same sky coverage as the corresponding sample and
|
558 |
+
subsample.
|
559 |
+
We consider the positions of these points
|
560 |
+
to be the angular distribution (ra, dec) of the random
|
561 |
+
galaxies, with no angular selection effect or survey masks
|
562 |
+
imposed. For the redshifts of random galaxies, the fol-
|
563 |
+
lowing radial selection models are used in our tests:
|
564 |
+
1. ntrue method, which generates the redshift distri-
|
565 |
+
bution for random galaxies using the true galaxy
|
566 |
+
number density n(z)true taken from the LF of the
|
567 |
+
parent mock catalog.
|
568 |
+
2. VSDC
|
569 |
+
max method, in which redshifts for random cat-
|
570 |
+
alog are generated using the smoothed density-
|
571 |
+
corrected Vmax method.
|
572 |
+
3. VDC
|
573 |
+
max method, in which the density-corrected
|
574 |
+
Vmax method of Cole (2011) is utilized, but with-
|
575 |
+
out the smoothing procedure.
|
576 |
+
4. Vmax method, where the normal Vmax method is
|
577 |
+
adopted.
|
578 |
+
5. Shuffled method, which applies the redshift shuf-
|
579 |
+
fled method. In this method, galaxy redshifts of
|
580 |
+
the sample are randomly assigned to the random
|
581 |
+
galaxies.
|
582 |
+
For LC samples, it is simple to incorporate the k + e
|
583 |
+
corrections into the redshift generation process.
|
584 |
+
En-
|
585 |
+
abling the validation of the capacity of different radial
|
586 |
+
selection models to restore the true radial selection func-
|
587 |
+
tion n(z)true. Figure 1 shows comparison between the
|
588 |
+
radial distributions of a single LC sample and random
|
589 |
+
catalogs generated by aforementioned radial selection
|
590 |
+
methods in the case of no k + e corrections. In the left
|
591 |
+
and right panels, the comparisons for LC1 and LC2 sam-
|
592 |
+
ples are presented, respectively. The second row of pan-
|
593 |
+
els displays the deviation of random galaxy number rela-
|
594 |
+
tive to the galaxy number in each comoving distance bin,
|
595 |
+
which is defined as ∆g = (nr −ng)/ng. The third row of
|
596 |
+
panels displays the deviation of the random galaxy num-
|
597 |
+
ber of the other four techniques from the number of the
|
598 |
+
ntrue approach, defined as ∆ntrue = (nr −nr,true)/nr,true.
|
599 |
+
The black histograms in the top row of panels denote
|
600 |
+
the distribution of galaxies in flux-limited samples. The
|
601 |
+
radial distribution of random catalogs created by the
|
602 |
+
ntrue method is represented by green lines, which in-
|
603 |
+
dicate the distribution arising from the genuine selec-
|
604 |
+
tion function. The purple dashed line is the distribution
|
605 |
+
producing from the V DC
|
606 |
+
max approach. We see small fluc-
|
607 |
+
tuations in the radial distribution, which are notably
|
608 |
+
clear in the bottom row of panels. These noisy fluctua-
|
609 |
+
tions have been reduced by the smoothing process in the
|
610 |
+
V SDC
|
611 |
+
max approach; as indicated by the blue solid lines, the
|
612 |
+
smoothed radial distribution is in excellent agreement
|
613 |
+
with the distribution predicted by the ntrue method.
|
614 |
+
The radial distributions from the Vmax method and
|
615 |
+
the shuffled method are represented by red and yel-
|
616 |
+
low lines, respectively.
|
617 |
+
As shown in the bottom pan-
|
618 |
+
els, ∆ntrue of the Vmax approach exhibits a systematic
|
619 |
+
bias in both luminosity-dependent LC samples as a re-
|
620 |
+
sult of the influence of large-scale structures in galaxy
|
621 |
+
radial distribution. The Vmax approach creates an ex-
|
622 |
+
cess of random galaxies near these structures; hence, the
|
623 |
+
amount of random galaxies in the high-redshift tail have
|
624 |
+
been decreased. Figure 2 shows the same comparison as
|
625 |
+
Figure 1 for LC samples with the simple k + e correc-
|
626 |
+
tions. The deviations of different approaches from the
|
627 |
+
ntrue method shown in the bottom panels are similar to
|
628 |
+
those in Figure 1.
|
629 |
+
Figure 3 shows a comparison for the LS samples, em-
|
630 |
+
ploying the same color-coded lines as Figure 1. The left
|
631 |
+
panels compare an LS1 sample, whereas the middle and
|
632 |
+
right panels compare its blue and red subsamples, re-
|
633 |
+
spectively.
|
634 |
+
For the ntrue method, the radial selection
|
635 |
+
function derived from the LF of the lightcone catalog is
|
636 |
+
applied. The k + e corrections are appropriately incor-
|
637 |
+
porated into the redshift generation process for the ntrue
|
638 |
+
and Vmax methods. For the V SDC
|
639 |
+
max
|
640 |
+
and V DC
|
641 |
+
max methods,
|
642 |
+
the same k−correction models that Smith et al. (2017)
|
643 |
+
performed for their lightcone database are employed,
|
644 |
+
which interpolate the k−correction from seven models
|
645 |
+
based on the color and redshift of individual galaxies.
|
646 |
+
The e−correction is also properly applied to LS samples
|
647 |
+
and their color-dependent subsamples by using the evo-
|
648 |
+
lutionary property of the lightcone catalog. The results
|
649 |
+
|
650 |
+
The smoothed Vmax method
|
651 |
+
7
|
652 |
+
of the comparison are generally consistent with those of
|
653 |
+
the LC samples. The redshifts generated by the Vmax
|
654 |
+
technique are substantially influenced by the sample’s
|
655 |
+
structures; the bias in ∆ntrue is greater than that of LC
|
656 |
+
samples, which reaches 20% on the high redshift tail (red
|
657 |
+
solid lines). The redshifts from the V SDC
|
658 |
+
max approach suc-
|
659 |
+
cessfully mitigate this impact, resulting in a relatively
|
660 |
+
small deviation in ∆ntrue (blue solid lines).
|
661 |
+
For both
|
662 |
+
LC and LS samples, the redshifts of random catalogs
|
663 |
+
obtained by the shuffled approach replicate the radial
|
664 |
+
distribution of galaxies (yellow solid lines), hence, the
|
665 |
+
structures are also cloned. In the following section, we
|
666 |
+
will examine how galaxy clustering measurements are
|
667 |
+
affected by the deviations in these radial distributions
|
668 |
+
that differ from the expected distribution produced by
|
669 |
+
the ntrue model.
|
670 |
+
4.2. Comparison of the correlation functions
|
671 |
+
This section introduces the 2PCF estimator that we
|
672 |
+
employ to measure galaxy clustering. Then, we provide
|
673 |
+
comparison of the projected 2PCFs and the redshift-
|
674 |
+
space 2PCFs determined from random catalogs gener-
|
675 |
+
ated by the aforementioned radial selection methods.
|
676 |
+
4.2.1. Estimator
|
677 |
+
We measure the 2PCF in the same way as Paper I.
|
678 |
+
First, we define the redshift separation vector s and the
|
679 |
+
line-of-sight vector l as s ≡ υ1 −υ2 and l ≡ (υ1 +υ2)/2,
|
680 |
+
where υ1 and υ2 are redshift-space position vectors of
|
681 |
+
a pair of galaxies (Hamilton 1992; Fisher et al. 1994).
|
682 |
+
Separations that are parallel (π) and perpendicular (rp)
|
683 |
+
to the line-of-sight direction are derived as
|
684 |
+
π ≡ s · l
|
685 |
+
|l| ,
|
686 |
+
r2
|
687 |
+
p ≡ s · s − π2.
|
688 |
+
(8)
|
689 |
+
We construct a grid of π and rp by taking 1 h−1Mpc
|
690 |
+
as the bin size for π from 0 up to πmax = 40 h−1Mpc
|
691 |
+
linearly, and a bin size of 0.2 for rp is adopted logarith-
|
692 |
+
mically in the range of [0.01, 40] h−1Mpc. Estimator
|
693 |
+
of Landy & Szalay (1993) is used to calculate the 2D
|
694 |
+
correlation function as
|
695 |
+
ξ(rp, π) = DD − 2DR + RR
|
696 |
+
RR
|
697 |
+
,
|
698 |
+
(9)
|
699 |
+
where DD, DR, and RR are the numbers of data-data,
|
700 |
+
data-random, and random-random pairs. Given s2 =
|
701 |
+
|s|2 = r2
|
702 |
+
p + π2, we derive the redshift-space correlation
|
703 |
+
function ξ(s). By integrating ξ(rp, π) along the line-of-
|
704 |
+
sight direction, we estimate the projected 2PCF (Davis
|
705 |
+
& Peebles 1983) by
|
706 |
+
wp(rp) ≡ 2
|
707 |
+
� ∞
|
708 |
+
0
|
709 |
+
ξ(rp, π) dπ ≈ 2
|
710 |
+
� πmax=40
|
711 |
+
0
|
712 |
+
ξ(rp, π) dπ.
|
713 |
+
(10)
|
714 |
+
We employ the public code CORRFUNC (Sinha & Garri-
|
715 |
+
son 2019) for pair counting in this work. To reduce the
|
716 |
+
shot noise on small-scale clustering, we use 50 times the
|
717 |
+
number of galaxies in the random catalogs for random
|
718 |
+
galaxies.
|
719 |
+
4.2.2. Comparison of projected 2PCFs
|
720 |
+
The projected 2PCFs for LC samples without and
|
721 |
+
with simple k + e corrections are compared in Figure 4
|
722 |
+
and Figure 5, respectively. We compare the average pro-
|
723 |
+
jected 2PCF estimated using random catalogs produced
|
724 |
+
by the radial selection models outlined in Section 4.1. In
|
725 |
+
the left and right panels for the LC1 and LC2 samples,
|
726 |
+
respectively, the estimated mean wp of 60 mock samples
|
727 |
+
are displayed. In the top panels, wp,true computed using
|
728 |
+
random catalog from the ntrue model is represented by
|
729 |
+
solid black points with errors representing the 1σ dis-
|
730 |
+
persion across individual wp,trues of samples. The blue
|
731 |
+
dashed lines, green dotted lines, red long-dashed lines,
|
732 |
+
and orange lines represent wps estimated from random
|
733 |
+
catalogs of the V SDC
|
734 |
+
max
|
735 |
+
technique, V DC
|
736 |
+
max method, Vmax
|
737 |
+
method, and shuffled method, respectively. The aver-
|
738 |
+
age offsets [wp − wp,true] from wp,true for the models are
|
739 |
+
shown in the middle row of panels, which are defined as
|
740 |
+
[wp − wp,true] =
|
741 |
+
1
|
742 |
+
60
|
743 |
+
�60
|
744 |
+
i=1 wi
|
745 |
+
p − wi
|
746 |
+
p,true, where wi
|
747 |
+
p is the
|
748 |
+
projected 2PCF measured for the ith LC sample. The
|
749 |
+
offsets increase when the scale drops below 1h−1Mpc for
|
750 |
+
both the V DC
|
751 |
+
max method (green dotted lines) and shuffled
|
752 |
+
method (orange diamonds).
|
753 |
+
When using the random
|
754 |
+
catalogs of the V SDC
|
755 |
+
max technique to measure wp, the little
|
756 |
+
positive offsets in the blue open rolls with error bars in-
|
757 |
+
dicate a slight overestimation on scale rp ≲ 0.4h−1Mpc.
|
758 |
+
On a small scale, there are apparent offsets for the Vmax
|
759 |
+
approach for LC1 samples in both k+e correction cases,
|
760 |
+
as seen by the open red squares with error bars. For
|
761 |
+
LC2 samples, there are extremely modest systematic
|
762 |
+
offsets for the Vmax technique across all of the scales
|
763 |
+
tested, and these offsets are smaller than those for the
|
764 |
+
V SDC
|
765 |
+
max method. Compared to the 1σtrue (gray solid lines)
|
766 |
+
among 60 wp,trues, the V SDC
|
767 |
+
max and Vmax methods’ offsets
|
768 |
+
are essentially insignificant.
|
769 |
+
In the bottom panels of Figure 4 and Figure 5, we dis-
|
770 |
+
play the average deviation from wp,true for each model,
|
771 |
+
using the same color-coded symbols and lines as the mid-
|
772 |
+
dle panels. The mean deviation [(wp − wp,true)/wp,true]
|
773 |
+
is calculated from 60 mock samples in the same manner
|
774 |
+
as [(wp − wp,true)]. Clearly, wps derived using random
|
775 |
+
catalogs from the V SDC
|
776 |
+
max approach provide a mostly un-
|
777 |
+
biased estimate of the genuine projected 2PCFs for both
|
778 |
+
LC1 and LC2 samples in both no k + e correction case
|
779 |
+
(Figure 4) and simple k + e correction case (Figure 5).
|
780 |
+
The 1σ deviations among 60 samples for the V SDC
|
781 |
+
max ap-
|
782 |
+
|
783 |
+
8
|
784 |
+
Yang et al.
|
785 |
+
Figure 1. In the case of no k + e correction, a comparison of the radial distributions of one LC sample and its corresponding
|
786 |
+
random catalogs. The bin size is ∆d = 5 h−1Mpc. The LC samples have a flux cut at mr = [15, 17] and two luminosity cuts
|
787 |
+
at M 0.1
|
788 |
+
r
|
789 |
+
= [−19, −22] (left panels) and M 0.1
|
790 |
+
r
|
791 |
+
= [−20, −23] (right panels). The black histogram denotes galaxy distribution.
|
792 |
+
Random catalogs generated by the n(z)true method, the V SDC
|
793 |
+
max
|
794 |
+
method, the V DC
|
795 |
+
max method, the Vmax method, and the shuffled
|
796 |
+
method are represented by the green line, the blue line, the purple dashed line, the red line, and the yellow line, respectively.
|
797 |
+
The second row of panels displays the number bias ∆g in each bin of the random catalogs compared to the galaxies, calculated
|
798 |
+
as ∆g = (nr − ng)/ng. The third row of panels displays the number bias of random catalogs compared to n(z)true, which is
|
799 |
+
defined as ∆ntrue = (nr − nr,true)/nr,true.
|
800 |
+
Figure 2. The same as Figure 1 but for the simple k + e correction case of LC samples.
|
801 |
+
|
802 |
+
4000-
|
803 |
+
Galaxies
|
804 |
+
ntrue
|
805 |
+
Vmax
|
806 |
+
4000
|
807 |
+
VSDC
|
808 |
+
Shuffled
|
809 |
+
3000
|
810 |
+
max
|
811 |
+
3000
|
812 |
+
Number
|
813 |
+
mr=[15,17]
|
814 |
+
2000
|
815 |
+
mr=[15,17]
|
816 |
+
2000
|
817 |
+
M9.1=[-19,-22]
|
818 |
+
M9.1=[-20, -23]
|
819 |
+
1000
|
820 |
+
1000
|
821 |
+
No k + e corrections
|
822 |
+
0
|
823 |
+
0-
|
824 |
+
100
|
825 |
+
200
|
826 |
+
400
|
827 |
+
500
|
828 |
+
100
|
829 |
+
400
|
830 |
+
500
|
831 |
+
300
|
832 |
+
200
|
833 |
+
300
|
834 |
+
600
|
835 |
+
0.5
|
836 |
+
0.5
|
837 |
+
0.0
|
838 |
+
-0.5
|
839 |
+
-0.5
|
840 |
+
100
|
841 |
+
200
|
842 |
+
400
|
843 |
+
500
|
844 |
+
100
|
845 |
+
200
|
846 |
+
400
|
847 |
+
600
|
848 |
+
300
|
849 |
+
300
|
850 |
+
500
|
851 |
+
0.1
|
852 |
+
0.1
|
853 |
+
0.0
|
854 |
+
0.0
|
855 |
+
-0.1
|
856 |
+
-0.1
|
857 |
+
200
|
858 |
+
300
|
859 |
+
400
|
860 |
+
500
|
861 |
+
100
|
862 |
+
200
|
863 |
+
400
|
864 |
+
500
|
865 |
+
600
|
866 |
+
100
|
867 |
+
300
|
868 |
+
d h-1Mpc
|
869 |
+
d h-1MpcGalaxies
|
870 |
+
VDC
|
871 |
+
max
|
872 |
+
4000
|
873 |
+
ntrue
|
874 |
+
Vmax
|
875 |
+
3000
|
876 |
+
VSDC
|
877 |
+
Shuffle
|
878 |
+
max
|
879 |
+
3000
|
880 |
+
Number
|
881 |
+
2000
|
882 |
+
mr=[15,17]
|
883 |
+
mr=[15,17]
|
884 |
+
2000
|
885 |
+
M9.1=[-20,-23]
|
886 |
+
M9.1 =[-19, -22]
|
887 |
+
1000
|
888 |
+
1000
|
889 |
+
Simple k + e corrections
|
890 |
+
0
|
891 |
+
0
|
892 |
+
100
|
893 |
+
200
|
894 |
+
400
|
895 |
+
500
|
896 |
+
400
|
897 |
+
500
|
898 |
+
300
|
899 |
+
100
|
900 |
+
200
|
901 |
+
300
|
902 |
+
600
|
903 |
+
0.5
|
904 |
+
0.5
|
905 |
+
0.0
|
906 |
+
0.0
|
907 |
+
0.5
|
908 |
+
0.5-
|
909 |
+
200
|
910 |
+
400
|
911 |
+
500
|
912 |
+
100
|
913 |
+
500
|
914 |
+
600
|
915 |
+
100
|
916 |
+
300
|
917 |
+
200
|
918 |
+
300
|
919 |
+
400
|
920 |
+
0.1
|
921 |
+
0.1
|
922 |
+
Itrue
|
923 |
+
0.0
|
924 |
+
0.0
|
925 |
+
-0.1
|
926 |
+
-0.1
|
927 |
+
200
|
928 |
+
300
|
929 |
+
100
|
930 |
+
400
|
931 |
+
500
|
932 |
+
100
|
933 |
+
200
|
934 |
+
400
|
935 |
+
500
|
936 |
+
600
|
937 |
+
300
|
938 |
+
d h-1Mpc
|
939 |
+
d h-1MpcThe smoothed Vmax method
|
940 |
+
9
|
941 |
+
Figure 3. The same as Figure 1 but for the LS1 samples.
|
942 |
+
|
943 |
+
All
|
944 |
+
Blue
|
945 |
+
Red
|
946 |
+
6000
|
947 |
+
Vmax
|
948 |
+
Galaxies
|
949 |
+
2000-
|
950 |
+
3000
|
951 |
+
ntrue
|
952 |
+
Shuffle
|
953 |
+
VDC
|
954 |
+
1500-
|
955 |
+
max
|
956 |
+
2000
|
957 |
+
1000-
|
958 |
+
2000
|
959 |
+
1000
|
960 |
+
Imr=[15,17]
|
961 |
+
500
|
962 |
+
M9.1 =[-19, - 22]
|
963 |
+
0 -
|
964 |
+
0-
|
965 |
+
0
|
966 |
+
200
|
967 |
+
400
|
968 |
+
600
|
969 |
+
200
|
970 |
+
800
|
971 |
+
400
|
972 |
+
600
|
973 |
+
800
|
974 |
+
200
|
975 |
+
400
|
976 |
+
600
|
977 |
+
800
|
978 |
+
0.5
|
979 |
+
0.5-
|
980 |
+
0.5
|
981 |
+
0.0
|
982 |
+
0.0
|
983 |
+
0.5
|
984 |
+
-0.5-
|
985 |
+
-0.5
|
986 |
+
600
|
987 |
+
600
|
988 |
+
600
|
989 |
+
200
|
990 |
+
400
|
991 |
+
800
|
992 |
+
200
|
993 |
+
400
|
994 |
+
800
|
995 |
+
200
|
996 |
+
400
|
997 |
+
800
|
998 |
+
0.2
|
999 |
+
0.2
|
1000 |
+
0.2
|
1001 |
+
NM
|
1002 |
+
0.1
|
1003 |
+
0.1
|
1004 |
+
0.1
|
1005 |
+
0.0
|
1006 |
+
0.0
|
1007 |
+
0.0
|
1008 |
+
N
|
1009 |
+
K
|
1010 |
+
-0.1
|
1011 |
+
-0.1-
|
1012 |
+
-0.1-
|
1013 |
+
-0.2
|
1014 |
+
-0.2
|
1015 |
+
-0.2
|
1016 |
+
200
|
1017 |
+
400
|
1018 |
+
600
|
1019 |
+
800
|
1020 |
+
200
|
1021 |
+
400
|
1022 |
+
600
|
1023 |
+
800
|
1024 |
+
200
|
1025 |
+
400
|
1026 |
+
600
|
1027 |
+
800
|
1028 |
+
d h-1Mpc
|
1029 |
+
d h-1Mpc
|
1030 |
+
d h-1Mpc10
|
1031 |
+
Yang et al.
|
1032 |
+
Figure 4. Top panels: The average projected correlation functions wp for LC1 (left panel) and LC2 (right panel) samples in
|
1033 |
+
the case of no k + e corrections. LC1 samples have a flux-cut at mr = [15, 17] and a luminosity cut at M 0.1
|
1034 |
+
r
|
1035 |
+
= [−19, −22]. LC2
|
1036 |
+
samples have the same flux-cut as LC1 samples but a brighter luminosity cut at M 0.1
|
1037 |
+
r
|
1038 |
+
= [−20, −23]. The solid black points
|
1039 |
+
with error bars represent the wp,true and 1σ dispersion across 60 LS samples utilizing random catalogs generated by the ntrue
|
1040 |
+
approach. wp of the V SDC
|
1041 |
+
max
|
1042 |
+
method, V DC
|
1043 |
+
max method, Vmax method, and shuffled technique are shown by the blue dashed lines,
|
1044 |
+
the green dotted line, the red long-dashed lines, and the orange lines, respectively. Middle panels: The average deviations
|
1045 |
+
from wp,true for various techniques of assigning redshifts to random catalogs, as determined by wp of 60 LC samples. The blue
|
1046 |
+
open rolls with error bars represent the mean offset and 1σ deviations of wp for the V SDC
|
1047 |
+
max technique. The results of the Vmax
|
1048 |
+
technique are displayed as open red squares with error bars. The mean offsets computed from wp for the V DC
|
1049 |
+
max and shuffled
|
1050 |
+
methods are shown by green dashed lines and a yellow open diamond, accordingly. The gray lines represent the 1σ dispersion
|
1051 |
+
of wp,true among 60 LC samples. The horizontal dashed black lines indicate the zero offset. Bottom panels: The average bias
|
1052 |
+
of wp relative to wp,true for four radial selection models, defined as [(wp − wp,true)/wp,true]. The color-coded lines and symbols
|
1053 |
+
are identical to those in the middle panels.
|
1054 |
+
proach (blue error bars) are significantly smaller than
|
1055 |
+
those for the Vmax method (red error bars). For LC1
|
1056 |
+
samples in both k + e correction cases, the Vmax ap-
|
1057 |
+
proach underestimates wp by less than 1%, and this bias
|
1058 |
+
worsens as scale grows. At rp ∼ 30h−1Mpc, the bias
|
1059 |
+
reaches 13% with a substantial variance 8. For LC2 sam-
|
1060 |
+
8 This bias is marginally less than the 20% bias found for the Vmax
|
1061 |
+
approach by Paper I. This may be owing to the increase in the
|
1062 |
+
number of galaxies in the samples, as the LC samples cover twice
|
1063 |
+
as much sky as the flux-limited samples in Paper I.
|
1064 |
+
ples, the measurement accuracies for both the V SDC
|
1065 |
+
max and
|
1066 |
+
Vmax methods are equivalent at scale rp ≲ 4h−1Mpc for
|
1067 |
+
both methods. On a larger scale, deviation of the Vmax
|
1068 |
+
method grows to 4%, but remains within the margin of
|
1069 |
+
error.
|
1070 |
+
These discrepancies in wp from wp,true for the
|
1071 |
+
Vmax model are mostly attributable to density fluctua-
|
1072 |
+
tions in galaxy samples. wps measured using random
|
1073 |
+
catalogs from the V DC
|
1074 |
+
max approach are overestimated at
|
1075 |
+
scale rp ≲ 2h−1Mpc and underestimated at larger scales
|
1076 |
+
for both LC1 and LC2 samples as shown in the bottom
|
1077 |
+
panels (green dashed lines) of Figure 4 and Figure 5. As
|
1078 |
+
|
1079 |
+
103
|
1080 |
+
No k + e corrections
|
1081 |
+
mr = [15,17]
|
1082 |
+
mr = [15, 17]
|
1083 |
+
M0.1 = [-19, -22]
|
1084 |
+
Mo.1 = [-20, -23]
|
1085 |
+
102
|
1086 |
+
10-
|
1087 |
+
ntrue
|
1088 |
+
Vmax
|
1089 |
+
dm
|
1090 |
+
VSDC
|
1091 |
+
ShufHed
|
1092 |
+
max
|
1093 |
+
100
|
1094 |
+
VDC
|
1095 |
+
max
|
1096 |
+
8
|
1097 |
+
dm
|
1098 |
+
true
|
1099 |
+
-8
|
1100 |
+
0.05
|
1101 |
+
0.00
|
1102 |
+
'dm
|
1103 |
+
-0.05
|
1104 |
+
_dm.
|
1105 |
+
-0.10
|
1106 |
+
豆
|
1107 |
+
Vmax
|
1108 |
+
VSDC
|
1109 |
+
0
|
1110 |
+
max
|
1111 |
+
Shuffed
|
1112 |
+
VDC
|
1113 |
+
max
|
1114 |
+
-0.15
|
1115 |
+
10
|
1116 |
+
100
|
1117 |
+
101
|
1118 |
+
10°
|
1119 |
+
100
|
1120 |
+
101
|
1121 |
+
Tp (h-1Mpc)
|
1122 |
+
p (h-1Mpc)The smoothed Vmax method
|
1123 |
+
11
|
1124 |
+
Figure 5. The same as Figure 4 but for the LC samples with a simple k + e corrections.
|
1125 |
+
seen in Figure 1 and Figure 2, this tendency of deviation
|
1126 |
+
is the result of small fluctuations in the radial distribu-
|
1127 |
+
tion of the random catalog generated by the V DC
|
1128 |
+
max model.
|
1129 |
+
In essence, the fluctuations increase the number of RR
|
1130 |
+
pairs at the fluctuation-scale, resulting in an underes-
|
1131 |
+
timating of wp. Due to the integral constraint effect,
|
1132 |
+
a small-scale overestimation of wp is unavoidable. Af-
|
1133 |
+
ter smoothing out the fluctuations, the V SDC
|
1134 |
+
max approach
|
1135 |
+
yields estimates that are almost unbiased of wp,true. The
|
1136 |
+
results of the shuffled technique are consistent with Pa-
|
1137 |
+
per I, which shows that an underestimating of wp grows
|
1138 |
+
as the scale increases.
|
1139 |
+
Due to the severe deviations of wps for the V DC
|
1140 |
+
max model
|
1141 |
+
in the tests using LC samples, the following compari-
|
1142 |
+
son for LS samples will focus on testing for the V SDC
|
1143 |
+
max
|
1144 |
+
method, Vmax method, and shuffled method. Figure 6
|
1145 |
+
and Figure 7 display comparison results for LS sam-
|
1146 |
+
ples with the two luminosity-cuts, respectively.
|
1147 |
+
The
|
1148 |
+
left, middle, and right panels, respectively, present wp
|
1149 |
+
comparisons for luminosity-dependent samples and their
|
1150 |
+
blue and red subsamples. From 10 mock galaxy samples,
|
1151 |
+
the mean wp, [wp − wp,true], [(wp − wp,true)/wp,true] are
|
1152 |
+
calculated (from top to bottom panels).
|
1153 |
+
The ntrue
|
1154 |
+
method, the V SDC
|
1155 |
+
max method, the Vmax method, and the
|
1156 |
+
shuffled method all utilize the same color-coded lines
|
1157 |
+
and symbols as those used for figures of LC samples.
|
1158 |
+
For the LS1 samples in Figure 6, the V SDC
|
1159 |
+
max model pro-
|
1160 |
+
duces tiny wp offsets from wp,true, which are consistent
|
1161 |
+
with the findings for LC samples.
|
1162 |
+
Significant offsets
|
1163 |
+
are seen for the Vmax and shuffled methods, notably
|
1164 |
+
for the LS1 samples and their blue subsamples, where
|
1165 |
+
the offsets are more than 1σ dispersion of wp,true at
|
1166 |
+
rp ≲ 3h−1Mpc scale. The average deviations displayed
|
1167 |
+
in the bottom panels clearly demonstrate the superior-
|
1168 |
+
ity of the V SDC
|
1169 |
+
max
|
1170 |
+
approach over the Vmax method and
|
1171 |
+
the shuffled method when measuring projected 2PCFs.
|
1172 |
+
∼ 0.5% deviations are detected for both LS1 samples
|
1173 |
+
and their color-dependent subsamples, which is essen-
|
1174 |
+
tially within the 1σ error margin.
|
1175 |
+
For the Vmax ap-
|
1176 |
+
proach, [(wp − wp,true)/wp,true]s deviate by 6%, 5%, and
|
1177 |
+
9% for LS1 samples, blue subsamples, and red subsam-
|
1178 |
+
ples, respectively, which are considerably larger than 1σ
|
1179 |
+
errors.
|
1180 |
+
At rp ≲ 10h−1Mpc, the mean deviations for
|
1181 |
+
the shuffled approach are marginally better than those
|
1182 |
+
|
1183 |
+
103
|
1184 |
+
Simple k + e corrections mr = [15, 17]
|
1185 |
+
mr = [15,17]
|
1186 |
+
M0.1 = [-19, -22]
|
1187 |
+
M0.1 = [-20, -23]
|
1188 |
+
102
|
1189 |
+
10-
|
1190 |
+
Vmax
|
1191 |
+
dm
|
1192 |
+
ntrue
|
1193 |
+
VSDC
|
1194 |
+
ShufHed
|
1195 |
+
max
|
1196 |
+
100
|
1197 |
+
VDC
|
1198 |
+
max
|
1199 |
+
8
|
1200 |
+
true
|
1201 |
+
-8
|
1202 |
+
0.05
|
1203 |
+
0.00
|
1204 |
+
'dm
|
1205 |
+
-0.05
|
1206 |
+
dm.
|
1207 |
+
-0.10
|
1208 |
+
Vmax
|
1209 |
+
VSDC
|
1210 |
+
豆
|
1211 |
+
0
|
1212 |
+
max
|
1213 |
+
Shuffed
|
1214 |
+
VDC
|
1215 |
+
max
|
1216 |
+
-0.15
|
1217 |
+
10
|
1218 |
+
100
|
1219 |
+
101
|
1220 |
+
100
|
1221 |
+
10°
|
1222 |
+
101
|
1223 |
+
rp (h-1Mpc)
|
1224 |
+
p (h-1Mpc)12
|
1225 |
+
Yang et al.
|
1226 |
+
Figure 6. Similar to Figure 4: comparison of wp for LS1 samples (left panels) and their blue (middle panels) and red (right
|
1227 |
+
panels) subsamples. The color-coded lines and symbols are identical to those in Figure 4, excluding the result of the V DC
|
1228 |
+
max
|
1229 |
+
technique.
|
1230 |
+
for the Vmax method, but worsen as the scale increases,
|
1231 |
+
which is consistent with the test results for LC samples.
|
1232 |
+
Figure 7 presents a comparison of wps for the LS2 sam-
|
1233 |
+
ples. The offsets from wp,true for the V SDC
|
1234 |
+
max
|
1235 |
+
technique
|
1236 |
+
are roughly comparable with the LS1 sample results.
|
1237 |
+
wps measured using random catalogs from the Vmax ap-
|
1238 |
+
proach exhibits large offsets from wp,true that are worse
|
1239 |
+
than the offsets for the shuffled method on small scales,
|
1240 |
+
particularly for LS2 samples (left middle panel) and red
|
1241 |
+
subsamples (right middle panel). In the bottom pan-
|
1242 |
+
els of Figure 7, the accuracy of measurement for three
|
1243 |
+
models is shown clearly. At scale rp < 1h−1Mpc, there
|
1244 |
+
is a ∼ 0.5% underestimate for the LS2 samples (bottom
|
1245 |
+
left panel). At a larger scale, this deviation becomes an
|
1246 |
+
overestimation, reaching 2% at rp ∼ 30h−1Mpc while
|
1247 |
+
being within the margin of error. The mean deviations
|
1248 |
+
for the blue and red subsamples are well constrained
|
1249 |
+
within 1%. The results of the Vmax approach exhibit
|
1250 |
+
larger mean deviations than the LS1 samples, which are
|
1251 |
+
even worse than the results of the shuffled method. The
|
1252 |
+
deviations for LS2 samples, blue subsamples, and red
|
1253 |
+
subsamples are roughly 9%, 8%, and 10%, respectively.
|
1254 |
+
wps determined for red subsamples exhibit more severe
|
1255 |
+
departures from wp,true for the Vmax technique for both
|
1256 |
+
LS1 and LS2 samples, demonstrating density fluctua-
|
1257 |
+
tions have a greater impact on clustering determination
|
1258 |
+
for red galaxies.
|
1259 |
+
To better quantify the measurement accuracy of pro-
|
1260 |
+
jected 2PCF for various radial selection models, we cal-
|
1261 |
+
culate the χ2 between wp and wp,true for the V SDC
|
1262 |
+
max tech-
|
1263 |
+
nique, the Vmax method, and the shuffled method, re-
|
1264 |
+
spectively, as shown in Table 1. χ2 is computed as fol-
|
1265 |
+
lows:
|
1266 |
+
χ2 =
|
1267 |
+
N
|
1268 |
+
�
|
1269 |
+
i=0
|
1270 |
+
(wi
|
1271 |
+
p − wp,true)2
|
1272 |
+
σ2
|
1273 |
+
true
|
1274 |
+
.
|
1275 |
+
(11)
|
1276 |
+
The number of mock samples N is 60 for LC samples
|
1277 |
+
and 10 for LS samples. For the LC samples, with the
|
1278 |
+
exception of the LC2 samples with simple k + e correc-
|
1279 |
+
tions for which χ2s of the V SDC
|
1280 |
+
max method and the Vmax
|
1281 |
+
|
1282 |
+
103
|
1283 |
+
mr = [15, 17]
|
1284 |
+
Blue subsamples
|
1285 |
+
Red subsamples
|
1286 |
+
(h-1Mpc)
|
1287 |
+
M0.1
|
1288 |
+
=「19,—22]
|
1289 |
+
102
|
1290 |
+
FLLL
|
1291 |
+
ntrue
|
1292 |
+
dm
|
1293 |
+
VSDC
|
1294 |
+
max
|
1295 |
+
101
|
1296 |
+
Shuffled
|
1297 |
+
60
|
1298 |
+
ToI
|
1299 |
+
VSDC
|
1300 |
+
ShufHed
|
1301 |
+
max
|
1302 |
+
40
|
1303 |
+
Vmax
|
1304 |
+
Otrue
|
1305 |
+
20
|
1306 |
+
0
|
1307 |
+
口
|
1308 |
+
口
|
1309 |
+
合
|
1310 |
+
合
|
1311 |
+
dm
|
1312 |
+
-20
|
1313 |
+
T
|
1314 |
+
40
|
1315 |
+
?
|
1316 |
+
0.89
|
1317 |
+
0.00 -
|
1318 |
+
-0.02
|
1319 |
+
ant'dm.
|
1320 |
+
-0.04
|
1321 |
+
anut'dm
|
1322 |
+
-0.06
|
1323 |
+
_dm.
|
1324 |
+
-0.08
|
1325 |
+
-0.10
|
1326 |
+
-0.12
|
1327 |
+
100
|
1328 |
+
101
|
1329 |
+
10
|
1330 |
+
100
|
1331 |
+
101
|
1332 |
+
10-
|
1333 |
+
100
|
1334 |
+
10-
|
1335 |
+
-1
|
1336 |
+
101
|
1337 |
+
rp (h-1Mpc)
|
1338 |
+
Tp (h-1Mpc)
|
1339 |
+
rp (h-1Mpc)The smoothed Vmax method
|
1340 |
+
13
|
1341 |
+
Figure 7.
|
1342 |
+
The same as Figure 6 but for LS2 samples (left panels) and their blue (middle panels) and red (right panel)
|
1343 |
+
subsamples.
|
1344 |
+
method are essentially equal, wps of the V SDC
|
1345 |
+
max method
|
1346 |
+
exhibit the least χ2 from wp,true when compared to other
|
1347 |
+
two models. For all LS samples and their blue and red
|
1348 |
+
subsamples, the V SDC
|
1349 |
+
max approach also yields the least χ2
|
1350 |
+
among three methods. The χ2 values for the LS sam-
|
1351 |
+
ples are greater than those for the LC samples for all
|
1352 |
+
three models. This may probably due to the fact that
|
1353 |
+
the LS samples built from a lightcone catalog contain
|
1354 |
+
more complicated k + e corrections than LC samples.
|
1355 |
+
On the basis of the preceding figures and χ2 tests, we
|
1356 |
+
demonstrate that wps measured using the random cata-
|
1357 |
+
logs generated by the V SDC
|
1358 |
+
max approach result in the least
|
1359 |
+
deviation from wp,true for both flux-limited samples and
|
1360 |
+
their color-dependent subsamples. In Section 5, we pro-
|
1361 |
+
vide more discussion on the performance of the radial
|
1362 |
+
selection models for LC and LS samples
|
1363 |
+
4.2.3. Comparison of the redshift-space 2PCFs
|
1364 |
+
The redshift-space correlation functions are compared
|
1365 |
+
in the same manner as wp for both the LC and LS sam-
|
1366 |
+
ples, and the results for different radial selection models
|
1367 |
+
Table 1. χ2 of the projected 2PCFs for the mock samples
|
1368 |
+
Samples
|
1369 |
+
χ2
|
1370 |
+
V SDC
|
1371 |
+
max
|
1372 |
+
Vmax
|
1373 |
+
Shuffled
|
1374 |
+
LC1(no k + e)
|
1375 |
+
1.364
|
1376 |
+
6.264
|
1377 |
+
107.225
|
1378 |
+
LC2(no k + e)
|
1379 |
+
1.460
|
1380 |
+
4.254
|
1381 |
+
62.329
|
1382 |
+
LC1(simple k + e)
|
1383 |
+
3.531
|
1384 |
+
6.351
|
1385 |
+
108.770
|
1386 |
+
LC2(simple k + e)
|
1387 |
+
2.757
|
1388 |
+
2.667
|
1389 |
+
106.466
|
1390 |
+
LS1
|
1391 |
+
1.893
|
1392 |
+
1618.495
|
1393 |
+
977.362
|
1394 |
+
LS1 (blue)
|
1395 |
+
33.013
|
1396 |
+
161.187
|
1397 |
+
124.543
|
1398 |
+
LS1 (red)
|
1399 |
+
19.525
|
1400 |
+
2769.991
|
1401 |
+
1988.678
|
1402 |
+
LS2
|
1403 |
+
45.168
|
1404 |
+
3416.047
|
1405 |
+
857.843
|
1406 |
+
LS2 (blue)
|
1407 |
+
63.572
|
1408 |
+
925.400
|
1409 |
+
240.416
|
1410 |
+
LS2 (red)
|
1411 |
+
71.431
|
1412 |
+
5054.464
|
1413 |
+
1562.508
|
1414 |
+
are generally consistent with the comparisons for wps in
|
1415 |
+
the previous section. The mean ξ0, [ξ0 − ξ0,true], and
|
1416 |
+
[(ξ0 − ξ0,true)/ξ0,true] for LC samples with simple k + e
|
1417 |
+
corrections are shown in Figure 8, from top to bottom,
|
1418 |
+
|
1419 |
+
103
|
1420 |
+
mr = [15, 17]
|
1421 |
+
Blue subsamples
|
1422 |
+
Red subsamples
|
1423 |
+
(h-1Mpc)
|
1424 |
+
M0.1
|
1425 |
+
=「—20,—23]
|
1426 |
+
102
|
1427 |
+
ntrue
|
1428 |
+
dm
|
1429 |
+
VSDC
|
1430 |
+
max
|
1431 |
+
101
|
1432 |
+
ShufHed
|
1433 |
+
60
|
1434 |
+
ToI
|
1435 |
+
VSDC
|
1436 |
+
ShufHed
|
1437 |
+
max
|
1438 |
+
40
|
1439 |
+
Vmax
|
1440 |
+
true
|
1441 |
+
20
|
1442 |
+
0
|
1443 |
+
LOHO
|
1444 |
+
OHOO
|
1445 |
+
Ol
|
1446 |
+
口
|
1447 |
+
dm
|
1448 |
+
口
|
1449 |
+
口
|
1450 |
+
-40
|
1451 |
+
TOI
|
1452 |
+
-60
|
1453 |
+
0.02
|
1454 |
+
0.00 .
|
1455 |
+
-
|
1456 |
+
0.02
|
1457 |
+
nf'dm
|
1458 |
+
-0.04
|
1459 |
+
ut'dm
|
1460 |
+
-0.06
|
1461 |
+
dm.
|
1462 |
+
-0.08
|
1463 |
+
-0.10
|
1464 |
+
-0.12
|
1465 |
+
100
|
1466 |
+
101
|
1467 |
+
10
|
1468 |
+
100
|
1469 |
+
101
|
1470 |
+
10-
|
1471 |
+
100
|
1472 |
+
10-
|
1473 |
+
101
|
1474 |
+
rp (h-1Mpc)
|
1475 |
+
Tp (h-1Mpc)
|
1476 |
+
rp (h-1Mpc)14
|
1477 |
+
Yang et al.
|
1478 |
+
Figure 8. Similar to Figure 4, a comparison of ξ0s for the redshift-space 2PCFs of LC1 samples (left panels) and LC2 samples
|
1479 |
+
(right panels) with simple k + e corrections.
|
1480 |
+
respectively. Estimates of ξ0 derived from random cata-
|
1481 |
+
logs created by the V SDC
|
1482 |
+
max approach display the smallest
|
1483 |
+
offsets and deviations from ξ0,true for both LC1 (left
|
1484 |
+
panels) and LC2 (right panels) samples. For the V DC
|
1485 |
+
max
|
1486 |
+
technique, ξ0s at scale rp < 1h−1Mpc exhibit large off-
|
1487 |
+
sets and deviations compared to the findings of wp. For
|
1488 |
+
the Vmax method, ξ0 deviations are marginally attenu-
|
1489 |
+
ated compared to the results of wp, indicating that the
|
1490 |
+
impact of density fluctuations on clustering is less signif-
|
1491 |
+
icant in redshift space. The ξ0s for the shuffled approach
|
1492 |
+
exhibit the same offsets and deviations from ξ0,true as
|
1493 |
+
wp. As the results of LC samples without k + e correc-
|
1494 |
+
tions are similar to Figure 8, they are omitted here.
|
1495 |
+
Figure 9 illustrates a comparison of ξ0 for LS1 samples
|
1496 |
+
(left panels), their blue (middle panels), and red (right
|
1497 |
+
panels) subsamples, respectively. Compared to the Vmax
|
1498 |
+
and shuffled methods, the V SDC
|
1499 |
+
max approach produces the
|
1500 |
+
least offsets and deviations from ξ0,true for LS1 samples
|
1501 |
+
and red subsamples. For the blue subsamples, the V SDC
|
1502 |
+
max
|
1503 |
+
method’s mean offset at s ∼ 0.07h−1Mpc is slightly
|
1504 |
+
larger than the Vmax method’s mean offset, and both
|
1505 |
+
approaches have comparable deviations at that scale.
|
1506 |
+
This is not a worry because the amount of uncertainty
|
1507 |
+
at this scale is also high due to the shot noise. In general
|
1508 |
+
on ξ0 measurements, the V SDC
|
1509 |
+
max
|
1510 |
+
technique continues to
|
1511 |
+
outperform the other two radial selection models. Since
|
1512 |
+
the findings of LS2 samples are basically consistent to
|
1513 |
+
Figure 9, they are also excluded here.
|
1514 |
+
In Figure 10, the average 2D correlation functions
|
1515 |
+
ξ(rp, π) for LS samples are presented. ξ(rp, π)s for LS1
|
1516 |
+
samples (left panel), blue subsamples (middle panel),
|
1517 |
+
and red samples (right panel) are displayed in the up-
|
1518 |
+
per panels. ξ(rp, π)s for the ntrue method, the V SDC
|
1519 |
+
max
|
1520 |
+
method, the Vmax method, and the shuffled method are
|
1521 |
+
represented by black solid lines, blue dashed lines, red
|
1522 |
+
dashed lines, and yellow dashed lines, respectively. The
|
1523 |
+
1σtrue dispersion of ξtrue(rp, π) among 10 mock samples
|
1524 |
+
is denoted by dotted gray lines in places with shading.
|
1525 |
+
ξ(rp, π)s of the V SDC
|
1526 |
+
max model provide the best agreement
|
1527 |
+
with ξtrue(rp, π) for LS1 samples and color-dependent
|
1528 |
+
subsamples. For ξ(rp, π) of the Vmax method and the
|
1529 |
+
shuffled method, there are offsets of varying degrees;
|
1530 |
+
yet, the offsets stay within the 1σtrue error margins;
|
1531 |
+
however, the contour shapes are altered. In the lower
|
1532 |
+
panels displaying ξ(rp, π)s for LS2 samples, the major-
|
1533 |
+
ity of contours for the V SDC
|
1534 |
+
max model are consistent with
|
1535 |
+
ξtrue(rp, π). 1% ∼ 2% deviations seen in wp (bottom left
|
1536 |
+
panel in Figure 7) for both LS2 samples and blue sub-
|
1537 |
+
samples are also observed in contours at large scale. For
|
1538 |
+
the Vmax technique and the shuffled method, the offsets
|
1539 |
+
in the ξ(rp, π) contours are close to the error margins
|
1540 |
+
of 1σtrue; thus, the contour shapes are altered as well.
|
1541 |
+
|
1542 |
+
102
|
1543 |
+
mr = [15, 17]
|
1544 |
+
mr = [15, 17]
|
1545 |
+
M0.1 = [-19, -22]
|
1546 |
+
M0.1
|
1547 |
+
=「—20,23]
|
1548 |
+
101
|
1549 |
+
Simple k + e corrections
|
1550 |
+
100
|
1551 |
+
ntrue
|
1552 |
+
VSDC
|
1553 |
+
ShufHed
|
1554 |
+
max
|
1555 |
+
VDC
|
1556 |
+
max
|
1557 |
+
10-2
|
1558 |
+
Tol
|
1559 |
+
VSDC
|
1560 |
+
5
|
1561 |
+
ShufHed
|
1562 |
+
max
|
1563 |
+
VDC
|
1564 |
+
true
|
1565 |
+
max
|
1566 |
+
-5
|
1567 |
+
0.05
|
1568 |
+
0.00
|
1569 |
+
50.
|
1570 |
+
-0.05
|
1571 |
+
So,
|
1572 |
+
-0.10
|
1573 |
+
-0.15
|
1574 |
+
10
|
1575 |
+
100
|
1576 |
+
101
|
1577 |
+
100
|
1578 |
+
101
|
1579 |
+
10
|
1580 |
+
s (h-1Mpc)
|
1581 |
+
s (h-1Mpc)The smoothed Vmax method
|
1582 |
+
15
|
1583 |
+
Figure 9. Similar to Figure 6, a comparison of ξ0s for the redshift-space 2PCFs of LS1 samples (left panels) and their blue
|
1584 |
+
(middle panels) and red (right panels) subsamples.
|
1585 |
+
Since the comparisons for LC samples are substantially
|
1586 |
+
identical to those in Figure 10, they are excluded here.
|
1587 |
+
5. DISCUSSION
|
1588 |
+
Our tests demonstrate that, for flux-limited sample
|
1589 |
+
with a redshift-dependent number density n(z), utilizing
|
1590 |
+
the random catalog generated by the V SDC
|
1591 |
+
max technique to
|
1592 |
+
measure galaxy clustering produces the least deviation
|
1593 |
+
from the true clustering when compared to the other
|
1594 |
+
radial selection methods. Some aspects of the perfor-
|
1595 |
+
mance of the V SDC
|
1596 |
+
max technique remain to be clarified and
|
1597 |
+
discussed, as detailed below.
|
1598 |
+
5.1. The impact of smoothness parameters on
|
1599 |
+
clustering estimation
|
1600 |
+
For the V SDC
|
1601 |
+
max
|
1602 |
+
approach, we add a smoothing step
|
1603 |
+
to eliminate the unanticipated small fluctuations in the
|
1604 |
+
redshift distribution of the cloned random galaxies gen-
|
1605 |
+
erated by the V DC
|
1606 |
+
max method.
|
1607 |
+
Previous comparison of
|
1608 |
+
2PCFs for the V SDC
|
1609 |
+
max
|
1610 |
+
and V DC
|
1611 |
+
max methods demonstrate
|
1612 |
+
the necessity of a smooth procedure for random catalog
|
1613 |
+
in order to produce a nearly unbiased clustering mea-
|
1614 |
+
surement for flux-limited sample.
|
1615 |
+
Smoothing requires
|
1616 |
+
a selection of histogram bin size ∆d and smooth box
|
1617 |
+
size ∆smooth.
|
1618 |
+
To determine the effect of varying ∆d
|
1619 |
+
and ∆smooth values on the final galaxy clustering de-
|
1620 |
+
termination, we vary these two smoothness parameters
|
1621 |
+
and regenerate random catalogs to perform the estimate.
|
1622 |
+
First, we set ∆d = 5h−1Mpc and ∆smooth = 5 as the
|
1623 |
+
fiducial case, which we have used for the V SDC
|
1624 |
+
max
|
1625 |
+
tech-
|
1626 |
+
nique in previous tests in Section 4.2. Second, we chose
|
1627 |
+
∆d = 2.5h−1Mpc and 10h−1Mpc for histogram bin size,
|
1628 |
+
with ∆smooth = 5 set to smooth.
|
1629 |
+
Thirdly, we select
|
1630 |
+
∆smooth = 3 and 7 for smooth with ∆d = 5h−1Mpc
|
1631 |
+
set.
|
1632 |
+
Figure 11 displays the average deviations of wp
|
1633 |
+
from wp,true for random catalogs created by the V SDC
|
1634 |
+
max
|
1635 |
+
technique with various ∆d and ∆smooth values. To sim-
|
1636 |
+
plify the assessment, we just test the projected 2PCFs
|
1637 |
+
of the LC samples here. In the absence of k + e correc-
|
1638 |
+
tions, the upper panels of Figure 11 depict the mean
|
1639 |
+
deviations of wp for the LC1 (left panel) and LC2
|
1640 |
+
(right panel) samples, respectively. We see that a finer
|
1641 |
+
|
1642 |
+
Blue subsamples
|
1643 |
+
Red subsamples
|
1644 |
+
mr = [15, 17]
|
1645 |
+
EELL
|
1646 |
+
M0.1
|
1647 |
+
=「-19,-22]
|
1648 |
+
101
|
1649 |
+
LLL
|
1650 |
+
ntrue
|
1651 |
+
100
|
1652 |
+
VSDC
|
1653 |
+
max
|
1654 |
+
10-1
|
1655 |
+
Shuffled
|
1656 |
+
ToI
|
1657 |
+
VSDC
|
1658 |
+
ShufHed
|
1659 |
+
10 -
|
1660 |
+
max
|
1661 |
+
Vmax
|
1662 |
+
Otrue
|
1663 |
+
5
|
1664 |
+
0
|
1665 |
+
Y
|
1666 |
+
口
|
1667 |
+
口
|
1668 |
+
合
|
1669 |
+
中
|
1670 |
+
合
|
1671 |
+
立
|
1672 |
+
查
|
1673 |
+
-5
|
1674 |
+
-10
|
1675 |
+
0.03
|
1676 |
+
0.00
|
1677 |
+
-0.03
|
1678 |
+
Eo,tr
|
1679 |
+
-0.06
|
1680 |
+
-0.09
|
1681 |
+
-0.12
|
1682 |
+
100
|
1683 |
+
101
|
1684 |
+
10-
|
1685 |
+
10
|
1686 |
+
100
|
1687 |
+
101
|
1688 |
+
10-
|
1689 |
+
100
|
1690 |
+
101
|
1691 |
+
s (h-1Mpc)
|
1692 |
+
s (h-1Mpc)
|
1693 |
+
s (h-1Mpc)16
|
1694 |
+
Yang et al.
|
1695 |
+
Figure 10. Comparison of the average 2D correlation function ξ(rp, π) for the luminosity-dependent flux-limited samples. The
|
1696 |
+
L1-C1 sample, the L2-C1 sample, and the L3-C1 sample are shown from top to bottom accordingly, their blue/red subsamples
|
1697 |
+
are shown in the middle and right panels in each row. Here, ξ(rp, π) is the averaged ξ(rp, π) among 60 mock samples. The
|
1698 |
+
true ξ(rp, π) measured using the random catalog from the n(z)true method is in the black contour. The gray shaded region
|
1699 |
+
with dotted lines mark the 1σ scatter of the true ξ(rp, π) among 60 mock samples. The yellow, red, and blue dashed contours
|
1700 |
+
denote the ξ(rp, π) of the shuffled method, Vmax method, and the V SDC
|
1701 |
+
max method, respectively. The contour levels from outside-in
|
1702 |
+
correspond to ξ(rp, π) = [0.1, 0.2, 0.3, 0.5, 1.0, 2.0, 5.0]. The middle column and right column panels show the comparison of the
|
1703 |
+
blue/red subsamples
|
1704 |
+
value of ∆d = 2.5h−1Mpc (green dashed lines) and
|
1705 |
+
∆smooth = 3 (light blue lines) lead to a constant drop
|
1706 |
+
of [(wp − wp,true)/wp,true] on all test scales, resulting
|
1707 |
+
in reduced deviations at rp ≲ 2h−1Mpc and an un-
|
1708 |
+
derestimate on a larger scale, especially for LC1 sam-
|
1709 |
+
ples. In contrast, a coarser size of ∆smooth = 7 (orange
|
1710 |
+
long-dashed lines) results in an overall increase relative
|
1711 |
+
to the mean deviation in fiducial case (open blue rolls
|
1712 |
+
with error bars), resulting in an overestimation at scale
|
1713 |
+
rp ≲ 20h−1Mpc. A coarser size of ∆d = 10h−1Mpc (yel-
|
1714 |
+
low short-dashed lines) leads in a ∼ 1% increase in the
|
1715 |
+
mean deviation of wp relative to the deviation in fiducial
|
1716 |
+
case; this is the only mean deviation that exceeds the
|
1717 |
+
1σ errors but is still around ∼ 1%. In the lower panels,
|
1718 |
+
the test results for LC samples with simple k +e correc-
|
1719 |
+
tions are displayed, which are essentially identical to the
|
1720 |
+
findings in the above panels, suggesting that the smooth
|
1721 |
+
process is insensitive to galaxy samples when different
|
1722 |
+
k + e corrections are applied. Our tests indicate that
|
1723 |
+
the variation of ∆d and ∆smooth in the smooth process
|
1724 |
+
of the V SDC
|
1725 |
+
max technique affects the accuracy of clustering
|
1726 |
+
measurement, however the effect on deviations is much
|
1727 |
+
less than 1%. The advantage of the V SDC
|
1728 |
+
max technique over
|
1729 |
+
other radial selection models still stands.
|
1730 |
+
5.2. Difference in clustering uncertainty
|
1731 |
+
In prior tests, the uncertainties in clustering devia-
|
1732 |
+
tions among 60 LC samples are significantly larger than
|
1733 |
+
the uncertainties in 10 LS samples, which is not expected
|
1734 |
+
intuitively. In addition, the deviation uncertainties for
|
1735 |
+
the V SDC
|
1736 |
+
max approach are approximately a fourth of those
|
1737 |
+
for the Vmax method in LC samples. As seen in Fig-
|
1738 |
+
ure 12, we further investigate the radial distribution of
|
1739 |
+
the LC and LS samples in order to determine the prob-
|
1740 |
+
able distinct drivers of these discrepancies.
|
1741 |
+
Here, we
|
1742 |
+
take into account the LC samples without k + e correc-
|
1743 |
+
tions and the LS1 samples, which are sufficient to ex-
|
1744 |
+
plain the difference in uncertainty. Firstly, we compute
|
1745 |
+
the normalized radial distribution for galaxy samples
|
1746 |
+
and random catalogs created using the n(z)true method,
|
1747 |
+
the V SDC
|
1748 |
+
max
|
1749 |
+
method, and the Vmax method, respectively.
|
1750 |
+
|
1751 |
+
501
|
1752 |
+
50 于
|
1753 |
+
50
|
1754 |
+
mr = [15, 17]
|
1755 |
+
ntrue
|
1756 |
+
45
|
1757 |
+
45
|
1758 |
+
45.
|
1759 |
+
Mo.1 =[-19,-22]
|
1760 |
+
Otrue
|
1761 |
+
Blue subsamples
|
1762 |
+
Red subsamples
|
1763 |
+
40
|
1764 |
+
40
|
1765 |
+
40
|
1766 |
+
VSDC
|
1767 |
+
max
|
1768 |
+
35
|
1769 |
+
35
|
1770 |
+
35
|
1771 |
+
Vmax
|
1772 |
+
1Mpc)
|
1773 |
+
30
|
1774 |
+
30
|
1775 |
+
30
|
1776 |
+
ShufHed
|
1777 |
+
C
|
1778 |
+
25
|
1779 |
+
25
|
1780 |
+
25
|
1781 |
+
s
|
1782 |
+
20
|
1783 |
+
20
|
1784 |
+
20
|
1785 |
+
15
|
1786 |
+
15
|
1787 |
+
15
|
1788 |
+
10
|
1789 |
+
10
|
1790 |
+
5
|
1791 |
+
5
|
1792 |
+
5
|
1793 |
+
0
|
1794 |
+
0:
|
1795 |
+
¥40 45 50
|
1796 |
+
5
|
1797 |
+
10 15 20 25 30 35
|
1798 |
+
0
|
1799 |
+
30 35 40 45 50
|
1800 |
+
20 25 30 35 40 45 50
|
1801 |
+
0
|
1802 |
+
5
|
1803 |
+
10 15
|
1804 |
+
20
|
1805 |
+
¥25
|
1806 |
+
0
|
1807 |
+
1015
|
1808 |
+
5
|
1809 |
+
50于
|
1810 |
+
50
|
1811 |
+
mr = [15, 17]
|
1812 |
+
45
|
1813 |
+
45
|
1814 |
+
45
|
1815 |
+
M0.1 = [-20,-23]
|
1816 |
+
40
|
1817 |
+
40
|
1818 |
+
40
|
1819 |
+
35
|
1820 |
+
35
|
1821 |
+
35
|
1822 |
+
30
|
1823 |
+
30
|
1824 |
+
30
|
1825 |
+
25
|
1826 |
+
25
|
1827 |
+
25
|
1828 |
+
20
|
1829 |
+
20
|
1830 |
+
20
|
1831 |
+
15
|
1832 |
+
15
|
1833 |
+
15
|
1834 |
+
10
|
1835 |
+
10
|
1836 |
+
10
|
1837 |
+
5
|
1838 |
+
5
|
1839 |
+
1
|
1840 |
+
01
|
1841 |
+
0
|
1842 |
+
0
|
1843 |
+
5
|
1844 |
+
10 15
|
1845 |
+
20
|
1846 |
+
25
|
1847 |
+
3035
|
1848 |
+
404550
|
1849 |
+
5
|
1850 |
+
10
|
1851 |
+
15
|
1852 |
+
20
|
1853 |
+
25
|
1854 |
+
30
|
1855 |
+
4045
|
1856 |
+
50
|
1857 |
+
0
|
1858 |
+
1015
|
1859 |
+
2025
|
1860 |
+
3035
|
1861 |
+
404550
|
1862 |
+
0
|
1863 |
+
35
|
1864 |
+
Tp (h-1Mpc)
|
1865 |
+
Tp (h-1Mpc)
|
1866 |
+
rp (h-1Mpc)The smoothed Vmax method
|
1867 |
+
17
|
1868 |
+
Figure 11. The average deviations of wp from wp,true for the V SDC
|
1869 |
+
max
|
1870 |
+
method, in which alternative histogram bin sizes and
|
1871 |
+
smooth box sizes are adopted in the smooth process in order to assess the impact of multiple choices on clustering estimation.
|
1872 |
+
The fiducial bin size and smooth box size used in Section 4.2 are ∆d = 5h−1Mpc and ∆smooth = 5, respectively, as indicated
|
1873 |
+
by the open blue circles with error bars. The alternate histogram bin sizes are ∆d = 2.5h−1Mpc and ∆d = 10h−1Mpc , with
|
1874 |
+
the same smooth box size as the fiducial one, as indicated by the green dashed lines and the light blue lines, respectively. The
|
1875 |
+
alternate smooth box sizes are ∆smooth = 3 and ∆smooth = 7, with the same fixed histogram bin size as the fiducial one, as
|
1876 |
+
shown by the yellow short-dashed and orange long-dashed lines, respectively. The zero deviation is shown by the horizontal black
|
1877 |
+
dashed lines. Upper panels: Tests for the LC1 samples (left panel) and LC2 samples (right panel) for the no k + e correction
|
1878 |
+
case. Lower panels: Similar tests for LC1 and LC2 samples to those in the upper panels, but for the simple k + e correction
|
1879 |
+
case.
|
1880 |
+
To quantify the density fluctuations relative to the true
|
1881 |
+
smooth distribution created by n(z)true method, we esti-
|
1882 |
+
mate the average deviations ∆ and 1σ variances of these
|
1883 |
+
distributions from the genuine normalized distribution
|
1884 |
+
for sixty LC samples and ten LS1 samples separately, as
|
1885 |
+
shown in Figure 12 from top to bottom.
|
1886 |
+
The ∆ and 1σ variance for the galaxy samples are
|
1887 |
+
shown by the thick gray line and thin light gray line.
|
1888 |
+
For both LC1 (upper panel) and LC2 (middle panel)
|
1889 |
+
samples, the variations across sixty individual samples
|
1890 |
+
vary greatly, as indicated by 1σ variance, whereas ∆
|
1891 |
+
exhibits a relatively small deviation from the true nor-
|
1892 |
+
malized distribution. The light yellow and light orange
|
1893 |
+
regions denote the locations in which 90 percent and 60
|
1894 |
+
percent of the expected random galaxies are likely to
|
1895 |
+
be distributed, and we anticipate that the bulk of pairs
|
1896 |
+
used to estimate clustering are from 90% region. ∆ (red
|
1897 |
+
thick lines) and σ (light red thin lines) of the Vmax tech-
|
1898 |
+
nique reveal that this approach corrects the fluctuations
|
1899 |
+
in galaxy samples; nonetheless, the imprints of large-
|
1900 |
+
scale structures are still discernible. For instance, ∆ for
|
1901 |
+
LC1 samples shows a small but observable deviation at
|
1902 |
+
100 ∼ 450h−1Mpc where 90% of galaxies are located.
|
1903 |
+
This explains the consistent bias noticed in wp and ξ
|
1904 |
+
in previous testing.
|
1905 |
+
For LC2 samples, the systematic
|
1906 |
+
bias is almost imperceptible, with just a tiny overesti-
|
1907 |
+
mation at d ≳ 500h−1Mpc, indicating a clustering bias
|
1908 |
+
that has been detected in prior tests.
|
1909 |
+
For the V SDC
|
1910 |
+
max
|
1911 |
+
approach, there are noisy fluctuations in ∆ (blue thick
|
1912 |
+
lines) for both LC1 and LC2 samples, indicating that
|
1913 |
+
the smooth does not eliminate all noisy fluctuations in
|
1914 |
+
radial distribution and there is still room to improve the
|
1915 |
+
smooth. Fortunately, these fluctuations are complimen-
|
1916 |
+
tary in certain degree, yielding a substantially unbiased
|
1917 |
+
measurement for galaxy clustering. We observe that the
|
1918 |
+
1σ errors (light blue thin lines) for the V SDC
|
1919 |
+
max approach
|
1920 |
+
are less than those for the Vmax method, especially for
|
1921 |
+
the LC1 samples at 60% region. This is essentially the
|
1922 |
+
|
1923 |
+
0.02
|
1924 |
+
No k + e corrections
|
1925 |
+
0.01
|
1926 |
+
0.00
|
1927 |
+
_dm
|
1928 |
+
-0.01
|
1929 |
+
mr = [15, 17]
|
1930 |
+
mr = [15, 17]
|
1931 |
+
-0.02
|
1932 |
+
M0.1 = [-19, -22]
|
1933 |
+
Mo.1 = [-20,-23]
|
1934 |
+
-0.03
|
1935 |
+
0.02
|
1936 |
+
Simple k + e corrections
|
1937 |
+
0.01
|
1938 |
+
0.00
|
1939 |
+
dm
|
1940 |
+
0.01
|
1941 |
+
VSDC (△d = 5, △smooth = 5)
|
1942 |
+
max
|
1943 |
+
△d = 10, △smooth = 5
|
1944 |
+
-0.02
|
1945 |
+
△d = 5, △smooth = 7
|
1946 |
+
△d = 2.5, △smooth = 5
|
1947 |
+
-0.03
|
1948 |
+
10-1
|
1949 |
+
100
|
1950 |
+
101
|
1951 |
+
100
|
1952 |
+
101
|
1953 |
+
rp (h-1Mpc)
|
1954 |
+
rp (h-1Mpc)18
|
1955 |
+
Yang et al.
|
1956 |
+
reason for the substantial difference in uncertainty found
|
1957 |
+
between the two techniques for wp and ξ, demonstrating
|
1958 |
+
once again that the V SDC
|
1959 |
+
max method can more successfully
|
1960 |
+
rectify the effect of density fluctuations on individual
|
1961 |
+
samples, and thus the clustering estimations converge
|
1962 |
+
to the genuine galaxy clustering.
|
1963 |
+
As demonstrated in the bottom panel, ∆ for the LS1
|
1964 |
+
samples deviates significantly from the genuine distri-
|
1965 |
+
bution when compared to the LC samples. By rotating
|
1966 |
+
the sky, just 10 LS1 samples are created from a single
|
1967 |
+
lightcone catalog. These samples have a significantly re-
|
1968 |
+
duced 1σ variance than LC samples, particularly at 60%
|
1969 |
+
region. In LS1 samples, the advantage of density cor-
|
1970 |
+
rection in the V SDC
|
1971 |
+
max approach is exhibited more clearly
|
1972 |
+
compared to the Vmax method. Both approaches have
|
1973 |
+
equal errors, but the ∆ of the V SDC
|
1974 |
+
max method deviates less
|
1975 |
+
from the true distribution, resulting in a more accurate
|
1976 |
+
clustering measurement. In contrast, the Vmax technique
|
1977 |
+
predicts too many random galaxies at d ≲ 400 and fewer
|
1978 |
+
galaxies at high d due to strong fluctuations in galaxy
|
1979 |
+
samples, hence exhibiting a greater deviation in ∆ in
|
1980 |
+
comparison to ∆ of LC samples. This also explains the
|
1981 |
+
extremely systematic bias in wp observed for the Vmax
|
1982 |
+
approach on all testing scales in earlier tests.
|
1983 |
+
Last but not least, the LC samples and LS samples
|
1984 |
+
are derived from distinct parent mock catalogs utilizing
|
1985 |
+
two simulations with different resolutions and galaxy-
|
1986 |
+
halo connection models. Both LC and LS samples are
|
1987 |
+
complete at M 0.1
|
1988 |
+
r
|
1989 |
+
≤ −18, however the simulation of
|
1990 |
+
(Jing 2019) used to generate LC samples has a mass
|
1991 |
+
resolution that is an order of magnitude higher than
|
1992 |
+
that of MXXL simulation (Angulo et al. 2012), imply-
|
1993 |
+
ing that more halo and galaxy structures are resolved
|
1994 |
+
in LC samples. Moreover, despite the fact that the LC
|
1995 |
+
samples are constructed using a simple galaxy-halo con-
|
1996 |
+
nection model with simple k + e corrections, the benefit
|
1997 |
+
is that all model parameters are clear and straightfor-
|
1998 |
+
ward; hence, the potential deviation and error sources
|
1999 |
+
are comprehendible. For LS samples, with a more so-
|
2000 |
+
phisticated galaxy evolution and k−correction, the light-
|
2001 |
+
cone catalog of Smith et al. (2017) is theoretically closer
|
2002 |
+
to actual observation data; the main drawback is a re-
|
2003 |
+
stricted number of samples. The test results of these two
|
2004 |
+
sample groups demonstrate that either the k + e correc-
|
2005 |
+
tions are based on simple or more complex and realistic
|
2006 |
+
mock catalogs, the Vmax technique may produce an in-
|
2007 |
+
accurate measurement of galaxy clustering, whereas the
|
2008 |
+
V SDC
|
2009 |
+
max method can always produce an accurate and pre-
|
2010 |
+
cise estimate of clustering.
|
2011 |
+
5.3. The effect of k + e corrections on galaxy clustering
|
2012 |
+
6. CONCLUSIONS
|
2013 |
+
Figure 12. Top panel: The average deviations ∆ and 1σ er-
|
2014 |
+
rors from the radial distribution of random catalog obtained
|
2015 |
+
by the n(z)true method. The mean deviation is computed
|
2016 |
+
using the equation ∆ = (ni − ni
|
2017 |
+
true)/ni
|
2018 |
+
true, where ni is the
|
2019 |
+
normalized radial distribution of the ith LC1 sample and
|
2020 |
+
random catalog produced using the V SDC
|
2021 |
+
max
|
2022 |
+
and Vmax meth-
|
2023 |
+
ods. The ∆ of the LC1 samples is shown by the thick gray
|
2024 |
+
lines, while the 1σ errors over 60 samples are represented
|
2025 |
+
by the thin gray lines. The thick blue lines and thin light
|
2026 |
+
blue lines represent ∆ and errors for the random catalogs
|
2027 |
+
generated by the V SDC
|
2028 |
+
max
|
2029 |
+
technique. The thick red lines and
|
2030 |
+
thin light red lines represent the Vmax algorithm. The light
|
2031 |
+
yellow and light orange regions indicate the locations of 90%
|
2032 |
+
and 60% of galaxies, respectively. Middle panel: Similar to
|
2033 |
+
the top panel, it presents the average deviations and errors
|
2034 |
+
for LC2 samples and their corresponding random catalogs.
|
2035 |
+
Bottom panel: Similar to top panel, it displays the average
|
2036 |
+
deviations and errors for LS1 samples and their correspond-
|
2037 |
+
ing random catalogs.
|
2038 |
+
In this paper, we provide a radial selection model, the
|
2039 |
+
V SDC
|
2040 |
+
max approach, for generating the redshifts of random
|
2041 |
+
catalogs in galaxy two-point statistics that allows for a
|
2042 |
+
high level of accuracy and precision in the estimation.
|
2043 |
+
|
2044 |
+
0.10.
|
2045 |
+
LCl (noke)
|
2046 |
+
0.05
|
2047 |
+
Galaxy
|
2048 |
+
0.00
|
2049 |
+
nax
|
2050 |
+
-0.05
|
2051 |
+
90%
|
2052 |
+
-0.10
|
2053 |
+
60%
|
2054 |
+
0.10
|
2055 |
+
LC2 (noke)
|
2056 |
+
0.05
|
2057 |
+
0.00
|
2058 |
+
-0.05
|
2059 |
+
-0.10.
|
2060 |
+
0.2
|
2061 |
+
LS1
|
2062 |
+
0.1
|
2063 |
+
△
|
2064 |
+
0.0
|
2065 |
+
-0.1-
|
2066 |
+
-0.2
|
2067 |
+
100
|
2068 |
+
200
|
2069 |
+
300
|
2070 |
+
400
|
2071 |
+
500
|
2072 |
+
600
|
2073 |
+
700
|
2074 |
+
d h-1MpcThe smoothed Vmax method
|
2075 |
+
19
|
2076 |
+
This method is an improvement on the density-corrected
|
2077 |
+
Vmax method proposed by Cole (2011), and it consists
|
2078 |
+
mostly of three modifications: (1) Adding estimate of
|
2079 |
+
zmin and expanding the code’s application to a general
|
2080 |
+
flux-limited sample; (2) Support for a redshift and color
|
2081 |
+
dependent k−correction model applicable to individual
|
2082 |
+
galaxies; (3) Adding a smooth step to the output cloned
|
2083 |
+
radial distribution of random galaxies. These modifica-
|
2084 |
+
tions are crucial for obtaining a smooth radial distribu-
|
2085 |
+
tion for a random catalog that is unaffected by galaxy
|
2086 |
+
density fluctuations, which is the key to a clustering
|
2087 |
+
measure with high precision and accuracy.
|
2088 |
+
We measure 2PCFs using two groups of flux-limited
|
2089 |
+
samples, designated LC and LS, to validate the V SDC
|
2090 |
+
max
|
2091 |
+
approach. The flux-limited LC samples are constructed
|
2092 |
+
from sixty mock catalogs with two luminosity cuts and
|
2093 |
+
two simple k+e correction cases. Using the same sample
|
2094 |
+
selection criteria and luminosity thresholds as for the LC
|
2095 |
+
samples, ten LS samples are generated using the light-
|
2096 |
+
cone catalog of Smith et al. (2017). To test property-
|
2097 |
+
dependent clustering, LS samples are subdivided into
|
2098 |
+
blue and red subsamples.
|
2099 |
+
We compare the projected
|
2100 |
+
and redshift-space 2PCFs using random catalogs cre-
|
2101 |
+
ated from the ntrue method, the V SDC
|
2102 |
+
max
|
2103 |
+
method, the
|
2104 |
+
V DC
|
2105 |
+
max method, the Vmax method, and the redshift shuffled
|
2106 |
+
method. Our test results demonstrate that the V SDC
|
2107 |
+
max ap-
|
2108 |
+
proach is the only reliable radial selection model capable
|
2109 |
+
of achieving sub-percent accuracy for wp measurement
|
2110 |
+
on scales ranging from 0.07h−1Mpc to ∼ 40h−1Mpc. A
|
2111 |
+
2% deviation arises on a large scale for the LS2 sample,
|
2112 |
+
however it is still less than the deviations of other radial
|
2113 |
+
selection models. In general, the V SDC
|
2114 |
+
max
|
2115 |
+
technique can
|
2116 |
+
constrain the measure accuracy of wp to within 1% for
|
2117 |
+
color-dependent galaxy clustering, validating its supe-
|
2118 |
+
riority over the Vmax method and the redshift shuffled
|
2119 |
+
method.
|
2120 |
+
The next generation of spectroscopic surveys, specif-
|
2121 |
+
ically the DESI experiment, will obtain the spectra of
|
2122 |
+
around 40 million galaxies and quasars over 14,000 deg2,
|
2123 |
+
which is almost an order of magnitude more than the
|
2124 |
+
previous observed galaxies (Myers et al. 2022). These
|
2125 |
+
extra-galactic objects include 13 million bright galaxy
|
2126 |
+
sample (2 magnitude deeper than SDSS main sam-
|
2127 |
+
ple) (Lan et al. 2022), 8 million luminous red galaxies
|
2128 |
+
(LRGs), 16 million emission line galaxies (ELG), and
|
2129 |
+
3 million quasars (Levi et al. 2013; DESI Collabora-
|
2130 |
+
tion et al. 2016a,b; Raichoor et al. 2022). On the one
|
2131 |
+
hand, the two-point statistics of these up-coming galax-
|
2132 |
+
ies will surely afford us an unprecedented opportunity to
|
2133 |
+
comprehend the physics of galaxy formation and evolu-
|
2134 |
+
tion, improve the galaxy-halo connection, and shed light
|
2135 |
+
on the role of the halo environment in determining the
|
2136 |
+
galaxy’s physical properties (Ferreira et al. 2022). On
|
2137 |
+
the other hand, how to fully exploit these galaxies, par-
|
2138 |
+
ticularly with the assistance of galaxy 2PCFs, remains
|
2139 |
+
a challenge. Using volume-limited catalogs to conduct
|
2140 |
+
the 2PCF analysis will not only result in the rejection
|
2141 |
+
of a considerable number of galaxies, but it may also
|
2142 |
+
lead to the loss of crucial information imprinted in clus-
|
2143 |
+
tering. The density-corrected Vmax approach proposed
|
2144 |
+
by (Cole 2011) solves this problem, and our improve-
|
2145 |
+
ments and tests confirm that the V SDC
|
2146 |
+
max method is a vi-
|
2147 |
+
able technique for accurately measuring clustering for
|
2148 |
+
flux-limited and color-dependent samples, hence maxi-
|
2149 |
+
mizing the use of galaxies. Our present tests are pre-
|
2150 |
+
liminary, concentrating mostly on low redshift galaxies.
|
2151 |
+
In the future, we will continue to improve this approach
|
2152 |
+
and conduct more tests on various properties of galax-
|
2153 |
+
ies (e.g., stellar mass, star-formation rate, and so forth)
|
2154 |
+
as well as tests employing relative high redshift galaxies
|
2155 |
+
(e.g., CMASS, BOSS and eBOSS) and mocks.
|
2156 |
+
We appreciate the referee’s insightful comments and
|
2157 |
+
suggestions, which substantially improve this article.
|
2158 |
+
We would like to thank Yipeng Jing for carefully read-
|
2159 |
+
ing the manuscript and providing valuable comments.
|
2160 |
+
We are also grateful to Yipeng Jing for generously pro-
|
2161 |
+
viding the simulation data.
|
2162 |
+
Lei Yang expresses grat-
|
2163 |
+
itude to Chun Xia for assisting with the use of the
|
2164 |
+
Yunnan University Astronomy Supercomputer.
|
2165 |
+
This
|
2166 |
+
work is sponsored by grants from Yunnan Univer-
|
2167 |
+
sity’s Launching Research Fund for Postdoctoral Fel-
|
2168 |
+
low (C176220200) and the China Postdoctoral Science
|
2169 |
+
Foundation (2020M683387).
|
2170 |
+
The majority of calcula-
|
2171 |
+
tions were performed on the Yunnan University Astron-
|
2172 |
+
omy Supercomputer.
|
2173 |
+
1
|
2174 |
+
2
|
2175 |
+
3
|
2176 |
+
4
|
2177 |
+
5
|
2178 |
+
6
|
2179 |
+
7
|
2180 |
+
8
|
2181 |
+
9
|
2182 |
+
10
|
2183 |
+
11
|
2184 |
+
12
|
2185 |
+
13
|
2186 |
+
14
|
2187 |
+
|
2188 |
+
20
|
2189 |
+
Yang et al.
|
2190 |
+
Figure 13. The mean number density n(z) among 60 LC mock samples. These samples have a flux cut at mr = [15, 17] and
|
2191 |
+
two luminosity cuts at M 0.1
|
2192 |
+
r
|
2193 |
+
= [−19, −22] for LC1 samples and M 0.1
|
2194 |
+
r
|
2195 |
+
= [−20, −23] for LC2 samples. In the case of no k + e
|
2196 |
+
corrections, the light blue and dark blue points with error bars represent the n(z) and 1σ variance for the LC1 and LC2 samples,
|
2197 |
+
respectively. The light orange and orange lines show the input nDR7 derived by the input LF and sample selection criteria. In
|
2198 |
+
the case of simple k + e corrections, the orange and red triangles with errors indicate n(z) and 1σ for LC1 and LC2 samples,
|
2199 |
+
respectively. The inputs nDR7 are shown in light gray and gray lines.
|
2200 |
+
APPENDIX
|
2201 |
+
A. THE MOCK SAMPLES
|
2202 |
+
As an example, Figure 13 displays the estimated average galaxy number density n(z) for 60 LC samples. The n(z)
|
2203 |
+
of these flux-limited samples changes as a function of comoving distance. The n(z)s of the LC samples are in excellent
|
2204 |
+
agreement with the predicted input nDR7 derived from the input luminosity function and the corresponding sample
|
2205 |
+
selection criteria. As predicted, n(z) for LS2 samples contains more brighter and high redshift galaxies than n(z) for
|
2206 |
+
LS1 samples. In addition, the n(z) for the samples with simple k + e corrections exhibits a slight evolution toward
|
2207 |
+
higher redshift when compared to samples without k + e corrections.
|
2208 |
+
Figure 14 displays the LS samples on the redshift-magnitude diagram (left panel) and color-magnitude diagram
|
2209 |
+
(right panel), respectively. The flux-limited LS samples are constructed from a lightcone catalog with two luminosity
|
2210 |
+
cuts. At low-redshift regions, the lightcone catalog mimic the SDSS DR7 data and, hence, has a LF of Blanton et al.
|
2211 |
+
(2003). We use the method described in Zehavi et al. (2011) to divide the galaxies into blue and red galaxies, as
|
2212 |
+
indicated by the red line in the right panel. Additionally, the LS samples have a redshift-dependent number density
|
2213 |
+
identical to that observed in Figure 13 and spanning a broader redshift range.
|
2214 |
+
REFERENCES
|
2215 |
+
Alam, S., de Mattia, A., Tamone, A., et al. 2021a, MNRAS,
|
2216 |
+
504, 4667, doi: 10.1093/mnras/stab1150
|
2217 |
+
Alam, S., Aubert, M., Avila, S., et al. 2021b, PhRvD, 103,
|
2218 |
+
083533, doi: 10.1103/PhysRevD.103.083533
|
2219 |
+
Amendola, L., Appleby, S., Bacon, D., et al. 2013, Living
|
2220 |
+
Reviews in Relativity, 16, 6, doi: 10.12942/lrr-2013-6
|
2221 |
+
Amin, M. A., Cyr-Racine, F.-Y., Eifler, T., et al. 2022,
|
2222 |
+
arXiv e-prints, arXiv:2203.07946.
|
2223 |
+
https://arxiv.org/abs/2203.07946
|
2224 |
+
Angulo, R. E., Springel, V., White, S. D. M., et al. 2012,
|
2225 |
+
MNRAS, 426, 2046,
|
2226 |
+
doi: 10.1111/j.1365-2966.2012.21830.x
|
2227 |
+
Behroozi, P., Wechsler, R. H., Hearin, A. P., & Conroy, C.
|
2228 |
+
2019, MNRAS, 488, 3143, doi: 10.1093/mnras/stz1182
|
2229 |
+
Bennett, C. L., Larson, D., Weiland, J. L., et al. 2013,
|
2230 |
+
ApJS, 208, 20, doi: 10.1088/0067-0049/208/2/20
|
2231 |
+
Berlind, A. A., et al. 2006, ApJS, 167, 1,
|
2232 |
+
doi: 10.1086/508170
|
2233 |
+
|
2234 |
+
((h-1Mpc)
|
2235 |
+
10
|
2236 |
+
No k + e corrections
|
2237 |
+
Input nDR7(z):[-19,-22]
|
2238 |
+
Mock n(z) :
|
2239 |
+
「-19,-22]
|
2240 |
+
Input nDR7(z) :[-20,-23]
|
2241 |
+
n(
|
2242 |
+
Mock n(z) :「-20,-23l
|
2243 |
+
Simple k + e corrections
|
2244 |
+
Input nDR7(z) :[-19,-22]
|
2245 |
+
10-6,
|
2246 |
+
Mock n(z) :
|
2247 |
+
[19,—22]
|
2248 |
+
Input nDR7(z) :[-20,-23]
|
2249 |
+
Mock n(z) :
|
2250 |
+
[—20,—23]
|
2251 |
+
10-7
|
2252 |
+
60
|
2253 |
+
100
|
2254 |
+
200
|
2255 |
+
500
|
2256 |
+
d (h-1Mpc)The smoothed Vmax method
|
2257 |
+
21
|
2258 |
+
Figure 14. Left panel: LS samples on the magnitude-redshift diagram. The light blue points denote galaxies in one of LS1
|
2259 |
+
samples with a flux cut at mr = [15, 17] and luminosity cut at M 0.1
|
2260 |
+
r
|
2261 |
+
= [−19, −22]. The dark blue points stand for one of LS2
|
2262 |
+
samples with cuts of mr = [15, 17] and M 0.1
|
2263 |
+
r
|
2264 |
+
= [−20, −23]. The samples have a sky coverage of 5950 deg2. Right panel: LS
|
2265 |
+
samples on the color-magnitude diagram. LS1 and LS2 samples are color-coded similarly to the panel on the left. The red line
|
2266 |
+
referred to by Zehavi et al. (2011) splits galaxies into blue and red subsamples.
|
2267 |
+
Beutler, F., Saito, S., Seo, H.-J., et al. 2014, MNRAS, 443,
|
2268 |
+
1065, doi: 10.1093/mnras/stu1051
|
2269 |
+
Bianchi, D., & Percival, W. J. 2017, MNRAS, 472, 1106,
|
2270 |
+
doi: 10.1093/mnras/stx2053
|
2271 |
+
Bianchi, D., & Verde, L. 2020, MNRAS, 495, 1511,
|
2272 |
+
doi: 10.1093/mnras/staa1267
|
2273 |
+
Blanton, M. R. 2006, ApJ, 648, 268, doi: 10.1086/505628
|
2274 |
+
Blanton, M. R., et al. 2001, AJ, 121, 2358,
|
2275 |
+
doi: 10.1086/320405
|
2276 |
+
Blanton, M. R., Hogg, D. W., Bahcall, N. A., et al. 2003,
|
2277 |
+
ApJ, 592, 819, doi: 10.1086/375776
|
2278 |
+
Blanton, M. R., et al. 2005, AJ, 129, 2562,
|
2279 |
+
doi: 10.1086/429803
|
2280 |
+
Breton, M.-A., & de la Torre, S. 2021, A&A, 646, A40,
|
2281 |
+
doi: 10.1051/0004-6361/202039603
|
2282 |
+
Cao, Y., Gong, Y., Meng, X.-M., et al. 2018, MNRAS, 480,
|
2283 |
+
2178, doi: 10.1093/mnras/sty1980
|
2284 |
+
Cole, S. 2011, MNRAS, 416, 739,
|
2285 |
+
doi: 10.1111/j.1365-2966.2011.19093.x
|
2286 |
+
Colless, M., et al. 2003, ArXiv Astrophysics e-prints
|
2287 |
+
Conroy, C., Wechsler, R. H., & Kravtsov, A. V. 2006, ApJ,
|
2288 |
+
647, 201, doi: 10.1086/503602
|
2289 |
+
Contreras, S., Angulo, R. E., & Zennaro, M. 2021,
|
2290 |
+
MNRAS, 508, 175, doi: 10.1093/mnras/stab2560
|
2291 |
+
D´avila-Kurb´an, F., S´anchez, A. G., Lares, M., & Ruiz,
|
2292 |
+
A. N. 2021, MNRAS, 506, 4667,
|
2293 |
+
doi: 10.1093/mnras/stab1622
|
2294 |
+
Davis, M., Efstathiou, G., Frenk, C. S., & White, S. D. M.
|
2295 |
+
1985, ApJ, 292, 371, doi: 10.1086/163168
|
2296 |
+
Davis, M., & Peebles, P. J. E. 1983, ApJ, 267, 465,
|
2297 |
+
doi: 10.1086/160884
|
2298 |
+
de la Torre, S., et al. 2013, A&A, 557, A54,
|
2299 |
+
doi: 10.1051/0004-6361/201321463
|
2300 |
+
de la Torre, S., Jullo, E., Giocoli, C., et al. 2017, A&A, 608,
|
2301 |
+
A44, doi: 10.1051/0004-6361/201630276
|
2302 |
+
de Mattia, A., & Ruhlmann-Kleider, V. 2019, JCAP, 2019,
|
2303 |
+
036, doi: 10.1088/1475-7516/2019/08/036
|
2304 |
+
DESI Collaboration, Aghamousa, A., Aguilar, J., et al.
|
2305 |
+
2016a, ArXiv e-prints. https://arxiv.org/abs/1611.00036
|
2306 |
+
—. 2016b, ArXiv e-prints.
|
2307 |
+
https://arxiv.org/abs/1611.00037
|
2308 |
+
Driver, S. P., Hill, D. T., Kelvin, L. S., et al. 2011,
|
2309 |
+
MNRAS, 413, 971, doi: 10.1111/j.1365-2966.2010.18188.x
|
2310 |
+
Eisenstein, D. J., Weinberg, D. H., Agol, E., et al. 2011,
|
2311 |
+
AJ, 142, 72, doi: 10.1088/0004-6256/142/3/72
|
2312 |
+
Farrow, D. J., Cole, S., Norberg, P., et al. 2015, MNRAS,
|
2313 |
+
454, 2120, doi: 10.1093/mnras/stv2075
|
2314 |
+
Farrow, D. J., S´anchez, A. G., Ciardullo, R., et al. 2021,
|
2315 |
+
MNRAS, 507, 3187, doi: 10.1093/mnras/stab1986
|
2316 |
+
Ferreira, L., Adams, N., Conselice, C. J., et al. 2022, ApJL,
|
2317 |
+
938, L2, doi: 10.3847/2041-8213/ac947c
|
2318 |
+
Fisher, K. B., Davis, M., Strauss, M. A., Yahil, A., &
|
2319 |
+
Huchra, J. 1994, MNRAS, 266, 50
|
2320 |
+
Garilli, B., Paioro, L., Scodeggio, M., et al. 2012, PASP,
|
2321 |
+
124, 1232, doi: 10.1086/668681
|
2322 |
+
Glanville, A., Howlett, C., & Davis, T. M. 2021, MNRAS,
|
2323 |
+
503, 3510, doi: 10.1093/mnras/stab657
|
2324 |
+
Gong, Y., Liu, X., Cao, Y., et al. 2019, ApJ, 883, 203,
|
2325 |
+
doi: 10.3847/1538-4357/ab391e
|
2326 |
+
Guo, H., Yang, X., & Lu, Y. 2018, ApJ, 858, 30,
|
2327 |
+
doi: 10.3847/1538-4357/aabc56
|
2328 |
+
Guo, H., Zehavi, I., Zheng, Z., et al. 2013, ApJ, 767, 122,
|
2329 |
+
doi: 10.1088/0004-637X/767/2/122
|
2330 |
+
Guo, H., et al. 2014, MNRAS, 441, 2398,
|
2331 |
+
doi: 10.1093/mnras/stu763
|
2332 |
+
|
2333 |
+
-23.0 -
|
2334 |
+
-22.5
|
2335 |
+
-22.0
|
2336 |
+
-21.5-
|
2337 |
+
-21.0
|
2338 |
+
M
|
2339 |
+
-20.5
|
2340 |
+
Sky coverage: 5950 deg?
|
2341 |
+
-20.0
|
2342 |
+
mr=[15,17]
|
2343 |
+
-19.5
|
2344 |
+
M9.1 =[-20,-23]
|
2345 |
+
M9.1=[-19,-22]
|
2346 |
+
-19.0
|
2347 |
+
0.05
|
2348 |
+
0.10
|
2349 |
+
0.15
|
2350 |
+
0.20
|
2351 |
+
0.25
|
2352 |
+
0.2
|
2353 |
+
0.4
|
2354 |
+
0.6
|
2355 |
+
0.8
|
2356 |
+
1.0
|
2357 |
+
1.2
|
2358 |
+
Z
|
2359 |
+
g-r22
|
2360 |
+
Yang et al.
|
2361 |
+
Guo, Q., White, S., Boylan-Kolchin, M., et al. 2011,
|
2362 |
+
MNRAS, 413, 101, doi: 10.1111/j.1365-2966.2010.18114.x
|
2363 |
+
Hahn, C., Wilson, M. J., Ruiz-Macias, O., et al. 2022,
|
2364 |
+
arXiv e-prints, arXiv:2208.08512.
|
2365 |
+
https://arxiv.org/abs/2208.08512
|
2366 |
+
Hamilton, A. J. S. 1992, ApJL, 385, L5,
|
2367 |
+
doi: 10.1086/186264
|
2368 |
+
—. 1993, ApJ, 417, 19, doi: 10.1086/173288
|
2369 |
+
Hearin, A. P., Watson, D. F., Becker, M. R., et al. 2014,
|
2370 |
+
MNRAS, 444, 729, doi: 10.1093/mnras/stu1443
|
2371 |
+
Hinshaw, G., Larson, D., Komatsu, E., et al. 2013, ApJS,
|
2372 |
+
208, 19, doi: 10.1088/0067-0049/208/2/19
|
2373 |
+
Jing, Y. 2019, Science China Physics, Mechanics, and
|
2374 |
+
Astronomy, 62, 19511, doi: 10.1007/s11433-018-9286-x
|
2375 |
+
Jing, Y. P., Mo, H. J., & B¨orner, G. 1998, ApJ, 494, 1,
|
2376 |
+
doi: 10.1086/305209
|
2377 |
+
Johnston, H., Joachimi, B., Norberg, P., et al. 2021, A&A,
|
2378 |
+
646, A147, doi: 10.1051/0004-6361/202039682
|
2379 |
+
Karademir, G. S., Taylor, E. N., Blake, C., et al. 2021,
|
2380 |
+
arXiv e-prints, arXiv:2109.06136.
|
2381 |
+
https://arxiv.org/abs/2109.06136
|
2382 |
+
Lan, T.-W., Tojeiro, R., Armengaud, E., et al. 2022, arXiv
|
2383 |
+
e-prints, arXiv:2208.08516.
|
2384 |
+
https://arxiv.org/abs/2208.08516
|
2385 |
+
Landy, S. D., & Szalay, A. S. 1993, ApJ, 412, 64,
|
2386 |
+
doi: 10.1086/172900
|
2387 |
+
Levi, M., Bebek, C., Beers, T., et al. 2013, ArXiv e-prints.
|
2388 |
+
https://arxiv.org/abs/1308.0847
|
2389 |
+
Liske, J., Baldry, I. K., Driver, S. P., et al. 2015, MNRAS,
|
2390 |
+
452, 2087, doi: 10.1093/mnras/stv1436
|
2391 |
+
Loveday, J., Norberg, P., Baldry, I. K., et al. 2015,
|
2392 |
+
MNRAS, 451, 1540, doi: 10.1093/mnras/stv1013
|
2393 |
+
Loveday, J., Christodoulou, L., Norberg, P., et al. 2018,
|
2394 |
+
MNRAS, 474, 3435, doi: 10.1093/mnras/stx2971
|
2395 |
+
LSST Dark Energy Science Collaboration. 2012, arXiv
|
2396 |
+
e-prints, arXiv:1211.0310.
|
2397 |
+
https://arxiv.org/abs/1211.0310
|
2398 |
+
Madgwick, D. S., et al. 2003, MNRAS, 344, 847,
|
2399 |
+
doi: 10.1046/j.1365-8711.2003.06861.x
|
2400 |
+
McBride, C. K., Connolly, A. J., Gardner, J. P., et al. 2011,
|
2401 |
+
ApJ, 726, 13, doi: 10.1088/0004-637X/726/1/13
|
2402 |
+
McNaught-Roberts, T., Norberg, P., Baugh, C., et al. 2014,
|
2403 |
+
MNRAS, 445, 2125, doi: 10.1093/mnras/stu1886
|
2404 |
+
Merz, G., Rezaie, M., Seo, H.-J., et al. 2021, MNRAS, 506,
|
2405 |
+
2503, doi: 10.1093/mnras/stab1887
|
2406 |
+
Mohammad, F. G., Granett, B. R., Guzzo, L., et al. 2018,
|
2407 |
+
A&A, 610, A59, doi: 10.1051/0004-6361/201731685
|
2408 |
+
Myers, A. D., Moustakas, J., Bailey, S., et al. 2022, arXiv
|
2409 |
+
e-prints, arXiv:2208.08518.
|
2410 |
+
https://arxiv.org/abs/2208.08518
|
2411 |
+
Norberg, P., et al. 2002, MNRAS, 332, 827,
|
2412 |
+
doi: 10.1046/j.1365-8711.2002.05348.x
|
2413 |
+
Nuza, S. E., et al. 2013, MNRAS, 432, 743,
|
2414 |
+
doi: 10.1093/mnras/stt513
|
2415 |
+
Peacock, J. A., Cole, S., Norberg, P., et al. 2001, Nature,
|
2416 |
+
410, 169
|
2417 |
+
Pezzotta, A., de la Torre, S., Bel, J., et al. 2017, A&A, 604,
|
2418 |
+
A33, doi: 10.1051/0004-6361/201630295
|
2419 |
+
Planck Collaboration, Ade, P. A. R., Aghanim, N., et al.
|
2420 |
+
2016, A&A, 594, A13, doi: 10.1051/0004-6361/201525830
|
2421 |
+
Raichoor, A., Moustakas, J., Newman, J. A., et al. 2022,
|
2422 |
+
arXiv e-prints, arXiv:2208.08513.
|
2423 |
+
https://arxiv.org/abs/2208.08513
|
2424 |
+
Reid, B., Ho, S., Padmanabhan, N., et al. 2016, MNRAS,
|
2425 |
+
455, 1553, doi: 10.1093/mnras/stv2382
|
2426 |
+
Reid, B. A., Percival, W. J., Eisenstein, D. J., et al. 2010,
|
2427 |
+
MNRAS, 404, 60, doi: 10.1111/j.1365-2966.2010.16276.x
|
2428 |
+
Ross, A. J., Samushia, L., Howlett, C., et al. 2015,
|
2429 |
+
MNRAS, 449, 835, doi: 10.1093/mnras/stv154
|
2430 |
+
Ross, A. J., Percival, W. J., S´anchez, A. G., et al. 2012,
|
2431 |
+
MNRAS, 424, 564, doi: 10.1111/j.1365-2966.2012.21235.x
|
2432 |
+
Samushia, L., et al. 2013, MNRAS, 429, 1514,
|
2433 |
+
doi: 10.1093/mnras/sts443
|
2434 |
+
—. 2014, MNRAS, 439, 3504, doi: 10.1093/mnras/stu197
|
2435 |
+
Schlegel, D. J., Ferraro, S., Aldering, G., et al. 2022, arXiv
|
2436 |
+
e-prints, arXiv:2209.03585.
|
2437 |
+
https://arxiv.org/abs/2209.03585
|
2438 |
+
Shi, F., Yang, X., Wang, H., et al. 2016, ApJ, 833, 241,
|
2439 |
+
doi: 10.3847/1538-4357/833/2/241
|
2440 |
+
—. 2018, ApJ, 861, 137, doi: 10.3847/1538-4357/aacb20
|
2441 |
+
Sinha, M., & Garrison, L. 2019, in Software Challenges to
|
2442 |
+
Exascale Computing, ed. A. Majumdar & R. Arora
|
2443 |
+
(Singapore: Springer Singapore), 3–20.
|
2444 |
+
https://doi.org/10.1007/978-981-13-7729-7 1
|
2445 |
+
Skibba, R. A., & Sheth, R. K. 2009, MNRAS, 392, 1080,
|
2446 |
+
doi: 10.1111/j.1365-2966.2008.14007.x
|
2447 |
+
Skibba, R. A., et al. 2014, ApJ, 784, 128,
|
2448 |
+
doi: 10.1088/0004-637X/784/2/128
|
2449 |
+
Smith, A., Cole, S., Baugh, C., et al. 2017, MNRAS, 470,
|
2450 |
+
4646, doi: 10.1093/mnras/stx1432
|
2451 |
+
Tegmark, M., Strauss, M. A., Blanton, M. R., et al. 2004,
|
2452 |
+
PhRvD, 69, 103501, doi: 10.1103/PhysRevD.69.103501
|
2453 |
+
Vale, A., & Ostriker, J. P. 2004, MNRAS, 353, 189,
|
2454 |
+
doi: 10.1111/j.1365-2966.2004.08059.x
|
2455 |
+
Valluri, M., Chabanier, S., Irsic, V., et al. 2022, arXiv
|
2456 |
+
e-prints, arXiv:2203.07491.
|
2457 |
+
https://arxiv.org/abs/2203.07491
|
2458 |
+
Wang, S.-J., Guo, Q., & Cai, R.-G. 2017, MNRAS, 472,
|
2459 |
+
2869, doi: 10.1093/mnras/stx2183
|
2460 |
+
|
2461 |
+
The smoothed Vmax method
|
2462 |
+
23
|
2463 |
+
Wang, Z., Xu, H., Yang, X., et al. 2021, Science China
|
2464 |
+
Physics, Mechanics, and Astronomy, 64, 289811,
|
2465 |
+
doi: 10.1007/s11433-021-1707-6
|
2466 |
+
Wechsler, R. H., & Tinker, J. L. 2018, ARA&A, 56, 435,
|
2467 |
+
doi: 10.1146/annurev-astro-081817-051756
|
2468 |
+
Weinberg, D. H., Mortonson, M. J., Eisenstein, D. J., et al.
|
2469 |
+
2013, PhR, 530, 87, doi: 10.1016/j.physrep.2013.05.001
|
2470 |
+
Xu, H., Zheng, Z., Guo, H., Zhu, J., & Zehavi, I. 2016,
|
2471 |
+
MNRAS, 460, 3647, doi: 10.1093/mnras/stw1259
|
2472 |
+
Yang, L., Jing, Y., Yang, X., & Han, J. 2019, ApJ, 872, 26,
|
2473 |
+
doi: 10.3847/1538-4357/aafc22
|
2474 |
+
Yang, L., Jing, Y.-P., Li, Z.-G., & Yang, X.-H. 2020,
|
2475 |
+
Research in Astronomy and Astrophysics, 20, 054,
|
2476 |
+
doi: 10.1088/1674-4527/20/4/54
|
2477 |
+
Yang, X., Mo, H. J., & van den Bosch, F. C. 2003, MNRAS,
|
2478 |
+
339, 1057, doi: 10.1046/j.1365-8711.2003.06254.x
|
2479 |
+
—. 2008, ApJ, 676, 248, doi: 10.1086/528954
|
2480 |
+
Yang, X., Mo, H. J., van den Bosch, F. C., Zhang, Y., &
|
2481 |
+
Han, J. 2012, ApJ, 752, 41,
|
2482 |
+
doi: 10.1088/0004-637X/752/1/41
|
2483 |
+
York, D. G., et al. 2000, AJ, 120, 1579, doi: 10.1086/301513
|
2484 |
+
Yuan, S., Hadzhiyska, B., & Abel, T. 2022a, arXiv e-prints,
|
2485 |
+
arXiv:2211.02068. https://arxiv.org/abs/2211.02068
|
2486 |
+
Yuan, S., Hadzhiyska, B., Bose, S., & Eisenstein, D. J.
|
2487 |
+
2022b, arXiv e-prints, arXiv:2202.12911.
|
2488 |
+
https://arxiv.org/abs/2202.12911
|
2489 |
+
Zarrouk, P., Ruiz-Macias, O., Cole, S., et al. 2021, arXiv
|
2490 |
+
e-prints, arXiv:2106.13120.
|
2491 |
+
https://arxiv.org/abs/2106.13120
|
2492 |
+
Zehavi, I., et al. 2002, ApJ, 571, 172, doi: 10.1086/339893
|
2493 |
+
—. 2005, ApJ, 630, 1, doi: 10.1086/431891
|
2494 |
+
—. 2011, ApJ, 736, 59, doi: 10.1088/0004-637X/736/1/59
|
2495 |
+
Zheng, Z., Zehavi, I., Eisenstein, D. J., Weinberg, D. H., &
|
2496 |
+
Jing, Y. P. 2009, ApJ, 707, 554,
|
2497 |
+
doi: 10.1088/0004-637X/707/1/554
|
2498 |
+
Zheng, Z., et al. 2005, ApJ, 633, 791, doi: 10.1086/466510
|
2499 |
+
Zu, Y., & Mandelbaum, R. 2015, MNRAS, 454, 1161,
|
2500 |
+
doi: 10.1093/mnras/stv2062
|
2501 |
+
Zu, Y., Shan, H., Zhang, J., et al. 2021, MNRAS, 505,
|
2502 |
+
5117, doi: 10.1093/mnras/stab1712
|
2503 |
+
|
99E5T4oBgHgl3EQfRQ7z/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
99FRT4oBgHgl3EQfrDen/content/tmp_files/2301.13619v1.pdf.txt
ADDED
@@ -0,0 +1,1011 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Brillouin and Kerr nonlinearities of a low-index silicon oxynitride platform
|
2 |
+
Kaixuan Ye,1 Yvan Klaver,1 Oscar A Jimenez Gordillo,2 Roel Botter,1
|
3 |
+
Okky Daulay,1 Francesco Morichetti,2 Andrea Melloni,2 and David Marpaung1, ∗
|
4 |
+
1Nonlinear Nanophotonics, MESA+ Institute of Nanotechnology,
|
5 |
+
University of Twente, Enschede, the Netherlands
|
6 |
+
2Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, 20133, Italy
|
7 |
+
(Dated: February 1, 2023)
|
8 |
+
Nonlinear optical effects including stimulated Brillouin scattering (SBS) and four-wave mixing
|
9 |
+
(FWM) play an important role in microwave photonics, optical frequency combs, and quantum
|
10 |
+
photonics. Harnessing SBS and FWM in a low-loss and versatile integrated platform would open
|
11 |
+
the path to building large-scale Brillouin/Kerr-based photonic integrated circuits. In this letter, we
|
12 |
+
investigate the Brillouin and Kerr properties of a low-index (n=1.513 @ 1550 nm) silicon oxynitride
|
13 |
+
(SiON) platform. We observed, for the first time, backward SBS in SiON waveguides with a Brillouin
|
14 |
+
gain coefficient of 0.3 m−1W−1, which can potentially be increased to 0.95 m−1W−1 by just tailoring
|
15 |
+
the waveguide cross-section. We also performed FWM experiments in SiON rings and obtained the
|
16 |
+
nonlinear parameter γ, of 0.02 m−1W−1. Our results point to a low-loss and low-index photonic
|
17 |
+
integrated platform that is both Brillouin and Kerr active.
|
18 |
+
INTRODUCTION
|
19 |
+
Stimulated Brillouin scattering (SBS), which is an in-
|
20 |
+
teraction between optical and acoustic waves, is currently
|
21 |
+
revolutionizing photonic integrated circuit designs [1–8].
|
22 |
+
Featuring a narrow-band (tens of MHz) gain resonance
|
23 |
+
shifted around tens of GHz away from the pump light, the
|
24 |
+
on-chip SBS plays a significant role in microwave photon-
|
25 |
+
ics [9–11], narrow-linewidth integrated lasers [7, 12, 13],
|
26 |
+
and on-chip nonreciprocal light propagation [3, 14].
|
27 |
+
Efficient on-chip SBS process requires simultaneously
|
28 |
+
guiding both the optical and gigahertz acoustic waves
|
29 |
+
in a waveguide, making it challenging to be realized in
|
30 |
+
most integrated platforms. Several encouraging results
|
31 |
+
have been demonstrated recently in various platforms,
|
32 |
+
including chalcogenide [2], silicon [5], doped silica [15],
|
33 |
+
aluminum gallium arsenide [16], and aluminum nitride
|
34 |
+
[17]. In addition, SBS has also been observed in silicon
|
35 |
+
nitride-based waveguides [7, 8, 18], opening the pathway
|
36 |
+
to intersect Brillouin scattering with Kerr nonlinearities
|
37 |
+
in low-loss and mature platforms.
|
38 |
+
Silicon oxynitride (SiON) is another highly-developed
|
39 |
+
integrated platform that has appealing properties includ-
|
40 |
+
ing low propagation loss, wide transparency window, ab-
|
41 |
+
sence of multi-photon absorption effects, and stress-free
|
42 |
+
fabrication [19, 20].
|
43 |
+
The optical and mechanical properties of SiON could
|
44 |
+
be tuned continuously between those of SiO2
|
45 |
+
and
|
46 |
+
Si3N4 at different nitrogen/oxygen (N/O) ratios [21,
|
47 |
+
22].
|
48 |
+
For example, a variety of SiON, known as Hy-
|
49 |
+
dex (n=1.7 @ 1550 nm), has been widely used for
|
50 |
+
Kerr-based nonlinear optic applications including opti-
|
51 |
+
cal frequency comb [23], optical neural network [24],
|
52 |
+
and quantum photonics [25].
|
53 |
+
A slightly higher in-
|
54 |
+
dex SiON (n=1.83 @ 1550 nm) was also proposed in
|
55 |
+
∗ Corresponding author: [email protected]
|
56 |
+
Fig. 1. (a) Artistic representation of the SiON waveguides,
|
57 |
+
showing the four-wave mixing process in an all-pass microring
|
58 |
+
resonator and the backward stimulated Brillouin scattering
|
59 |
+
(SBS) in a spiral waveguide.
|
60 |
+
(b) The cross-section of the
|
61 |
+
SiON platform in our work. (c) The chip photograph of the
|
62 |
+
SiON microring resonators with a FSR of 50 GHz. (d) The
|
63 |
+
chip photograph of the 5-cm SiON straight waveguide.
|
64 |
+
[20, 26] for Kerr-based applications. In both cases, the
|
65 |
+
SiON platforms have a refractive index close to sili-
|
66 |
+
con nitride (n=1.98 @ 1550 nm) instead of silicon oxide
|
67 |
+
(n=1.45 @ 1550nm). The relatively high refractive in-
|
68 |
+
dex induces a high nonlinear index, making it useful for
|
69 |
+
Kerr-based nonlinear optic applications.
|
70 |
+
But from the Brillouin perspectives, high refractive in-
|
71 |
+
dex SiON is less attractive due to the high content of the
|
72 |
+
nitrogen that leads to a meager photoelastic coefficient
|
73 |
+
p12 because of the weak p12 of the Si3N4 [18]. Moreover,
|
74 |
+
high-index SiON also has similar mechanical properties
|
75 |
+
arXiv:2301.13619v1 [physics.optics] 31 Jan 2023
|
76 |
+
|
77 |
+
fp
|
78 |
+
a
|
79 |
+
fs
|
80 |
+
fp
|
81 |
+
probe
|
82 |
+
fs
|
83 |
+
Amplified probe
|
84 |
+
SiON chip
|
85 |
+
pump
|
86 |
+
SiO2 (1.45)
|
87 |
+
7um
|
88 |
+
SiON
|
89 |
+
(1.513)
|
90 |
+
2.2um
|
91 |
+
2.2um
|
92 |
+
15um
|
93 |
+
b
|
94 |
+
Si (3.45)
|
95 |
+
dFig. 2. (a) Simulated optical mode of the SiON waveguide.
|
96 |
+
(b) Simulated acoustic response of the SiON waveguide. (c)-
|
97 |
+
(h) Measured SBS gain spectra of the 2.0 µm, 2.2 µm, 2.3 µm,
|
98 |
+
2.4 µm, 2.6 µm, and 3.5 µm-wide SiON waveguides, respec-
|
99 |
+
tively. (i) Brillouin gain coefficients and linewidth of the SiON
|
100 |
+
waveguides with different widths.
|
101 |
+
to Si3N4, such as high acoustic velocity that prevents
|
102 |
+
acoustic confinement when cladded with SiO2 [7, 8, 18].
|
103 |
+
In this paper, we investigate the Brillouin and Kerr
|
104 |
+
properties of a SiON integrated platform with a rela-
|
105 |
+
tively lower refractive index (n=1.513 @ 1550 nm). Con-
|
106 |
+
trasting to SiON platforms mentioned above, the SiON
|
107 |
+
platform investigated here has a larger photoelastic co-
|
108 |
+
efficient p12, lower acoustic velocity, and a larger cross-
|
109 |
+
section, all of which lead to an enhanced SBS effect. We
|
110 |
+
experimentally observed, for the first time to our knowl-
|
111 |
+
edge, backward SBS in SiON waveguides. We also char-
|
112 |
+
acterized the Brillouin gain coefficient gb of the SiON
|
113 |
+
waveguides with different widths. We found out the gb
|
114 |
+
of this SiON waveguide can potentially be increased to
|
115 |
+
around 0.95 m−1W−1 by simply tailoring the waveguide
|
116 |
+
cross-section. This sufficiently large Brillouin gain coef-
|
117 |
+
ficient, together with the low propagation loss, makes it
|
118 |
+
possible to generate decent SBS gain for a plethora of
|
119 |
+
Brillouin-based applications in this SiON platform.
|
120 |
+
Furthermore, we also measured the nonlinear param-
|
121 |
+
eter γ and nonlinear index n2 of this SiON platform
|
122 |
+
through four-wave mixing (FWM) experiments in a ring
|
123 |
+
resonator. While the measured γ is an order of magni-
|
124 |
+
tude lower when compared to that of high-index SiON,
|
125 |
+
we expect that with lower losses and higher pump power,
|
126 |
+
the unique interplay between the SBS and Kerr effect
|
127 |
+
such as Brillouin-assisted Kerr frequency comb [27, 28]
|
128 |
+
could be observed in this integrated platform.
|
129 |
+
RESULTS
|
130 |
+
We performed the backward SBS and four-wave mix-
|
131 |
+
ing experiments in single-pass (spiral or straight) wave-
|
132 |
+
guides and microring resonators respectively, as shown in
|
133 |
+
Fig. 1(a). The cross-section of this platform is shown in
|
134 |
+
Fig. 1(b) [29, 30]. The 2.2 µm-thick SiON layer has a
|
135 |
+
refractive index n of 1.513 at 1550 nm. It is on top of a
|
136 |
+
15-µm SiO2 layer and is covered by a 7 µm-thick SiO2 up-
|
137 |
+
per cladding. The refractive index contrast ∆n between
|
138 |
+
the core and the cladding is 4.4%, enabling a bending ra-
|
139 |
+
dius of 600 µm with negligible radiation losses. Fig. 1(c)
|
140 |
+
shows the photograph of the microring resonators in this
|
141 |
+
platform with a free spectral range (FSR) of 50 GHz and
|
142 |
+
coupling coefficients varying from 0.05 to 0.8. Fig. 1(d)
|
143 |
+
shows the photograph of several groups of 5-cm straight
|
144 |
+
waveguides with different widths. The measured prop-
|
145 |
+
agation loss of those straight waveguides is 0.25 dB/cm
|
146 |
+
with coupling loss to lensed-tip fibers of approximately
|
147 |
+
3 dB/facet.
|
148 |
+
Stimulated Brillouin Scattering in SiON Waveguides
|
149 |
+
We developed a finite element model [8] in COMSOL to
|
150 |
+
estimate the SBS response of the SiON waveguides. The
|
151 |
+
simulated optical field and the corresponding acoustic re-
|
152 |
+
sponse of the 2.2 µm-wide SiON waveguide are shown
|
153 |
+
in Fig. 2(a) and (b), respectively.
|
154 |
+
The optical field is
|
155 |
+
well confined around the SiON core area because of the
|
156 |
+
total internal reflection (TIR). However, the TIR condi-
|
157 |
+
tion does not hold for the acoustic response because the
|
158 |
+
acoustic velocity of the SiON (∼ 6.2 km/s) is higher than
|
159 |
+
that of the SiO2 (∼ 5.9 km/s). As a result, part of the
|
160 |
+
acoustic field would leak into the cladding as shown in
|
161 |
+
Fig. 2(b). Nevertheless, most of the acoustic field still
|
162 |
+
|
163 |
+
Normalized electric field
|
164 |
+
Normalized displacement field
|
165 |
+
a
|
166 |
+
2.2 um
|
167 |
+
2.2 um
|
168 |
+
2.2 um
|
169 |
+
2.2 um
|
170 |
+
0
|
171 |
+
0.8
|
172 |
+
c
|
173 |
+
2.0 um
|
174 |
+
d
|
175 |
+
2.2 um
|
176 |
+
8
|
177 |
+
0.
|
178 |
+
j0.10 m-1 w-1
|
179 |
+
FWHM
|
180 |
+
0.15 m-1 W-1
|
181 |
+
FWHM
|
182 |
+
g
|
183 |
+
@14.22 GHz
|
184 |
+
358 MHz
|
185 |
+
@14.31 GHz
|
186 |
+
282 MHz
|
187 |
+
0.4
|
188 |
+
0,2
|
189 |
+
M
|
190 |
+
0
|
191 |
+
0
|
192 |
+
[a.u.]
|
193 |
+
13.5
|
194 |
+
14.0
|
195 |
+
14.5
|
196 |
+
15.0
|
197 |
+
13.5
|
198 |
+
14.0
|
199 |
+
14.5
|
200 |
+
15.0
|
201 |
+
Normalized amplitude
|
202 |
+
e
|
203 |
+
2.3 um
|
204 |
+
2.4 um
|
205 |
+
0.8
|
206 |
+
0.8
|
207 |
+
0.17 m-1 w-1
|
208 |
+
FWHM
|
209 |
+
0.19 m-1 w-1
|
210 |
+
FWHM
|
211 |
+
0.6
|
212 |
+
@14.40 GHz
|
213 |
+
280 MHz
|
214 |
+
@14.44 GHz
|
215 |
+
269 MHz
|
216 |
+
0.4
|
217 |
+
0.4
|
218 |
+
0,2
|
219 |
+
umy
|
220 |
+
0
|
221 |
+
13.5
|
222 |
+
14.0
|
223 |
+
14.5
|
224 |
+
15.0
|
225 |
+
13.5
|
226 |
+
14.0
|
227 |
+
14.5
|
228 |
+
15.0
|
229 |
+
0.8
|
230 |
+
g
|
231 |
+
2.6 um
|
232 |
+
0.8
|
233 |
+
h
|
234 |
+
3.5 um
|
235 |
+
0.24 m-1 w-1
|
236 |
+
FWHM
|
237 |
+
0.32 m-1 w-1
|
238 |
+
0.6
|
239 |
+
FWHM
|
240 |
+
9
|
241 |
+
@14.43 GHz
|
242 |
+
224 MHz
|
243 |
+
@14.48 GHz
|
244 |
+
105 MHz
|
245 |
+
0.4
|
246 |
+
0.4
|
247 |
+
0,2
|
248 |
+
0
|
249 |
+
0
|
250 |
+
13.5
|
251 |
+
14.0
|
252 |
+
14.5
|
253 |
+
15.0
|
254 |
+
13.5
|
255 |
+
14.0
|
256 |
+
14.5
|
257 |
+
15.0
|
258 |
+
Brillouin frequency shift [GHz]
|
259 |
+
350
|
260 |
+
0.30
|
261 |
+
300
|
262 |
+
Linewidth [MHz]
|
263 |
+
0.25
|
264 |
+
[m-1 W-1]
|
265 |
+
250 200 150
|
266 |
+
0.15 0.20
|
267 |
+
0.10
|
268 |
+
100
|
269 |
+
2.0
|
270 |
+
2.5
|
271 |
+
3.0
|
272 |
+
3.5
|
273 |
+
Waveguide width [μm]Fig. 3. (a) Simulated optical mode and (b) simulated acous-
|
274 |
+
tic response and (c) simulated Brillouin gain spectrum of the
|
275 |
+
optimized SiON waveguide. (d) Estimated SBS gain from the
|
276 |
+
optimized and current SiON waveguides.
|
277 |
+
remains inside the SiON core because of the relatively
|
278 |
+
large cross-section area [31]. This results in a large over-
|
279 |
+
lap between the optical and acoustic fields that leads to
|
280 |
+
improved Brillouin gain coefficient. Extensive simulation
|
281 |
+
results of the SBS gain coefficients are included in the
|
282 |
+
Supplementary.
|
283 |
+
To verify the simulation results, we characterized the
|
284 |
+
SBS responses of the SiON waveguides with a pump-
|
285 |
+
probe experimental apparatus [8, 18].
|
286 |
+
The pump and
|
287 |
+
probe light are intensity-modulated and coupled into the
|
288 |
+
opposite facets of the waveguide. We keep the pump fre-
|
289 |
+
quency fixed at 1561 nm while sweeping the probe at fre-
|
290 |
+
quencies down shifted from the pump by about 15 GHz.
|
291 |
+
When the frequency difference between the pump and
|
292 |
+
the probe is close to the Brillouin frequency shift of the
|
293 |
+
SiON waveguide, the probe will experience the SBS gain
|
294 |
+
and a peak will be detected at the lock-in amplifier (See
|
295 |
+
the Supplementary for more details about the SBS ex-
|
296 |
+
periment).
|
297 |
+
Several 5 cm-long SiON waveguides are characterized
|
298 |
+
to investigate the influence of waveguide width on the
|
299 |
+
Brillouin gain spectra.
|
300 |
+
The measured SBS responses
|
301 |
+
of the 2.0 µm, 2.2 µm, 2.3 µm, 2.4 µm, 2.6 µm, and
|
302 |
+
3.5 µm-wide waveguides are shown in Fig. 2(c) to (h),
|
303 |
+
respectively. All waveguides show a clear SBS peak well
|
304 |
+
above the noise floor with the Brillouin frequency shift in-
|
305 |
+
creases from 14.22 GHz for the 2.0 µm-wide waveguide to
|
306 |
+
14.48 GHz for the 3.5 µm-wide waveguide. Fig. 2(i) plots
|
307 |
+
the measured Brillouin gain coefficient gb and the SBS
|
308 |
+
linewidth of the SiON waveguides with different widths
|
309 |
+
(See the Supplementary for more details about the Bril-
|
310 |
+
louin gain coefficient calculation). The Brillouin gain co-
|
311 |
+
efficient gb increases from 0.1 m−1W−1 to 0.32 m−1W−1
|
312 |
+
when the waveguide width increases from 2.0 µm to
|
313 |
+
3.5 µm.
|
314 |
+
In the meantime, the linewidth of the SBS
|
315 |
+
peak reduces from 358 MHz to 105 MHz. The increasing
|
316 |
+
Brillouin gain coefficient and the narrowing of the SBS
|
317 |
+
linewidth indicate an improvement in acoustic confine-
|
318 |
+
ment when the SiON waveguides become wider.
|
319 |
+
The Brillouin gain coefficient can be further increased
|
320 |
+
by optimizing the cross-section of the waveguide through
|
321 |
+
the genetic algorithm [8]. Fig. 3 (a) and (b) show the
|
322 |
+
simulated optical mode and the acoustic response of a
|
323 |
+
SiON waveguide with the same core refractive index but
|
324 |
+
with an optimized cross-section for SBS gain. The di-
|
325 |
+
mension of such a waveguide is 4.0 µm × 3.2 µm with a
|
326 |
+
top cladding of 3 µm and a bottom cladding of 10 µm.
|
327 |
+
Compared to the optical and acoustic fields of the wave-
|
328 |
+
guide structure in this work, less acoustic field is scat-
|
329 |
+
tered into the cladding while the optical field is still well
|
330 |
+
confined in the optimized waveguide structure. The Bril-
|
331 |
+
louin gain spectrum of the optimized waveguide structure
|
332 |
+
is shown in Fig. 3 (c). The simulated peak Brillouin gain
|
333 |
+
coefficient of this waveguide is 0.95 m−1W−1, which is
|
334 |
+
3× higher than the waveguide structure measured in this
|
335 |
+
work. Furthermore, the propagation loss in this SiON
|
336 |
+
platform can also be significantly lowered by reducing
|
337 |
+
sidewall roughness and improving the thermal anneal-
|
338 |
+
ing process [30], allowing for longer effective waveguide
|
339 |
+
length for the SBS process. Fig. 3 (d) estimates the SBS
|
340 |
+
gain of both the measured and the optimized SiON wave-
|
341 |
+
guides with different propagation losses. The optimized
|
342 |
+
Brillouin gain coefficient (around 0.95 m−1W−1), along
|
343 |
+
with the improved propagation loss (around 0.1 dB/cm),
|
344 |
+
can enhance the SBS gain from less than 0.5 dB to near
|
345 |
+
1.5 dB for a 60-cm waveguide, which is sufficient for ap-
|
346 |
+
plications like SBS-based narrow-bandwidth microwave
|
347 |
+
photonic notch filters [8, 10].
|
348 |
+
Four-wave mixing in SiON Waveguides
|
349 |
+
We further investigate the Kerr nonlinearities of this
|
350 |
+
SiON platform. High-index SiON platforms are widely
|
351 |
+
used for Kerr-based nonlinear optics applications because
|
352 |
+
of the relatively large nonlinear parameter γ [19]. How-
|
353 |
+
ever, the nonlinear parameter γ is highly dependent on
|
354 |
+
the refractive index and the geometry of the waveguide.
|
355 |
+
The SiON waveguide in this work has a relatively lower
|
356 |
+
refractive index and a larger cross-section compared with
|
357 |
+
other SiON platforms [19, 20], and the nonlinear index
|
358 |
+
n2 and nonlinear parameter γ of the SiON waveguide in
|
359 |
+
this platform has never been characterized before.
|
360 |
+
We devised a four-wave mixing (FWM) experiment
|
361 |
+
for the nonlinear parameter characterization.
|
362 |
+
Because
|
363 |
+
of the limited effective length of the available samples,
|
364 |
+
the FWM conversion efficiency of the straight waveguide
|
365 |
+
is comparable with that of the fiber pigtails, making it
|
366 |
+
difficult to accurately measure the n2 and the γ.
|
367 |
+
We
|
368 |
+
use the all-pass ring resonators to enhance the FWM in
|
369 |
+
the SiON waveguide so that the contribution from fibers
|
370 |
+
in the setup can be neglected [32]. The ring resonator
|
371 |
+
|
372 |
+
Normalized electric field
|
373 |
+
Normalized displacement field
|
374 |
+
a
|
375 |
+
b
|
376 |
+
4.0 um
|
377 |
+
4.0 um
|
378 |
+
3.2um
|
379 |
+
3.2um
|
380 |
+
c
|
381 |
+
d
|
382 |
+
5
|
383 |
+
0.10 dB/cm
|
384 |
+
SBS gain [dB]
|
385 |
+
0.15 dB/cm
|
386 |
+
0.95 m-1 W-1
|
387 |
+
[m-1 W-1]
|
388 |
+
0.25 dB/cm
|
389 |
+
@ 15.76 GHz
|
390 |
+
5.
|
391 |
+
optimized
|
392 |
+
0
|
393 |
+
This work
|
394 |
+
0.0
|
395 |
+
0.
|
396 |
+
0
|
397 |
+
15.5
|
398 |
+
15.7
|
399 |
+
15.9
|
400 |
+
16.1
|
401 |
+
0
|
402 |
+
20
|
403 |
+
40
|
404 |
+
60
|
405 |
+
Brillouin frequency shift [GHz]
|
406 |
+
Waveguide length [cm]Fig. 4. (a) Measured resonance response of the SiON ring
|
407 |
+
resonator.
|
408 |
+
(b) Measured four-wave mixing response of the
|
409 |
+
SiON ring resonator. (c) Conversion efficiency of the four-
|
410 |
+
wave mixing at different pump power.
|
411 |
+
(d) The estimated
|
412 |
+
nonlinear parameter γ of the SiON waveguides with different
|
413 |
+
widths.
|
414 |
+
applied in our experiment is made of the 2.2 µm-wide
|
415 |
+
SiON waveguide and it has a free spectral range (FSR)
|
416 |
+
of 50 GHz and a power coupling coefficient of 0.05. The
|
417 |
+
pump laser is locked close to the resonance of the ring
|
418 |
+
resonator to mitigate the thermal influence on the ring
|
419 |
+
resonator. The signal laser is set close to 2 × FSR away
|
420 |
+
from the pump signal and is combined with the pump
|
421 |
+
light with a 99:1 coupler. The combined pump and sig-
|
422 |
+
nal are coupled into the all-pass ring resonator with a
|
423 |
+
lensed fiber with a spot size of 2 µm.
|
424 |
+
The generated
|
425 |
+
idler is then coupled out from the chip and sent to the
|
426 |
+
optical spectrum analyzer to measure the conversion ef-
|
427 |
+
ficiency from the signal to the generated idler (See the
|
428 |
+
Supplementary for details of the FWM experiment).
|
429 |
+
To determine the field enhancement factor of the FWM
|
430 |
+
process in the ring resonator, we first characterized the
|
431 |
+
resonance response of the ring resonator with a vector
|
432 |
+
network analyzer, as shown in Fig. 4 (a) (See the Supple-
|
433 |
+
mentary for details of the characterization). The mea-
|
434 |
+
sured full-width at half-maximum (FWHM) is 612 MHz
|
435 |
+
with an extinction ratio of 8.9 dB, corresponding to a
|
436 |
+
loaded Q-factor of 330,000 and a propagation loss of
|
437 |
+
0.27 dB/cm. Fig. 4 (b) shows the measured FWM re-
|
438 |
+
sponse of the 50 GHz SiON ring resonator. A clear peak
|
439 |
+
is shown at 2 × FSR down shifted from the pump fre-
|
440 |
+
quency, which is the idler generated from the FWM pro-
|
441 |
+
cess between the pump and signal in the ring resonator.
|
442 |
+
The nonlinear index n2 and nonlinear parameter γ of
|
443 |
+
the SiON waveguide in this platform can be estimated
|
444 |
+
from the conversion efficiency between the signal and
|
445 |
+
the idler (See the supplementary for details of the cal-
|
446 |
+
culation). Fig. 4 (c) shows the measured conversion ef-
|
447 |
+
ficiency of the FWM process at different pump power.
|
448 |
+
Based on this measurement, the calculated γ and n2
|
449 |
+
of the 2.2 µm-wide SiON waveguide are 0.024 m−1W−1
|
450 |
+
and 4.16 ×10−20 m2/W, respectively. We also estimated
|
451 |
+
the nonlinear parameter γ of the SiON waveguides with
|
452 |
+
different widths based on the measured value of n2, as
|
453 |
+
shown in Fig. 4 (d).
|
454 |
+
The γ decreases from around
|
455 |
+
0.025 m−1W−1 to 0.020 m−1W−1 when the waveguide
|
456 |
+
width reduces from 2.0 µm to 3.5 µm.
|
457 |
+
DISCUSSION
|
458 |
+
For Brillouin-Kerr interactions, the balance between
|
459 |
+
the nonlinearities needs to be considered. In microcavi-
|
460 |
+
ties, it is generally preferred to have larger Brillouin gain,
|
461 |
+
as it is easier to inhibit cascading or other unwanted in-
|
462 |
+
teractions via mode manipulation. Comparing the values
|
463 |
+
of the measured gb in Fig. 2 (i) and γ in Fig. 4 (a), the
|
464 |
+
SiON waveguides reported here have an order of magni-
|
465 |
+
tude larger Brillouin gain compared to Kerr nonlinearity.
|
466 |
+
This gb/γ ratio is similar to previous demonstrations of
|
467 |
+
Brillouin-assisted Kerr frequency combs in [27, 28], show-
|
468 |
+
ing the potential to realize it in an integrated platform.
|
469 |
+
In conclusion, we have investigated the Brillouin and
|
470 |
+
Kerr properties of a SiON integrated platform with a
|
471 |
+
relatively low refractive index. We observed, for the first
|
472 |
+
time, the backward SBS response of those SiON wave-
|
473 |
+
guides.
|
474 |
+
We also measured its nonlinear index n2 and
|
475 |
+
nonlinear parameter γ. These SiON waveguides can be
|
476 |
+
fabricated in a versatile and low-loss integrated platform,
|
477 |
+
and can potentially lead to a plethora of Brillouin and
|
478 |
+
Kerr-based applications,
|
479 |
+
including narrow-bandwidth
|
480 |
+
microwave photonic filters, and narrow-linewidth lasers,
|
481 |
+
and optical frequency combs.
|
482 |
+
AUTHOR CONTRIBUTIONS
|
483 |
+
D.M. and K.Y. developed the concept and proposed
|
484 |
+
the physical system.
|
485 |
+
K.Y. and Y.K. developed and
|
486 |
+
performed numerical simulations.
|
487 |
+
K.Y. performed the
|
488 |
+
SBS characterisation with input from R.B., K.Y., and
|
489 |
+
O.D. Y.K. and K.Y. performed the FWM experiments.
|
490 |
+
O.A.J.G., F.M., and A.M. developed and fabricated the
|
491 |
+
samples. K.Y., D.M., and Y.K. wrote the manuscript.
|
492 |
+
D.M. led and supervised the entire project.
|
493 |
+
FUNDING INFORMATION
|
494 |
+
This project is funded by the European Research
|
495 |
+
Council Consolidator Grant (101043229 TRIFFIC) and
|
496 |
+
Nederlandse Organisatie voor Wetenschappelijk Onder-
|
497 |
+
zoek (NWO) projects (740.018.021 and 15702).
|
498 |
+
|
499 |
+
Pump
|
500 |
+
-80 -70 -60 -50 -40 -30
|
501 |
+
a
|
502 |
+
Signal
|
503 |
+
2
|
504 |
+
Power [dBm]
|
505 |
+
FWHM:
|
506 |
+
2 x FSR
|
507 |
+
612 MHz
|
508 |
+
S
|
509 |
+
Idler
|
510 |
+
8
|
511 |
+
2
|
512 |
+
4
|
513 |
+
6
|
514 |
+
-100
|
515 |
+
-50
|
516 |
+
50
|
517 |
+
100
|
518 |
+
Frequency [GHz]
|
519 |
+
Frequency [GHz]
|
520 |
+
d
|
521 |
+
c
|
522 |
+
0.021 0.023 0.025
|
523 |
+
-34
|
524 |
+
n [dB]
|
525 |
+
-38
|
526 |
+
-42
|
527 |
+
-46
|
528 |
+
21
|
529 |
+
23
|
530 |
+
25
|
531 |
+
27
|
532 |
+
2.0
|
533 |
+
2.5
|
534 |
+
3.0
|
535 |
+
3.5
|
536 |
+
Pump power [dBm]
|
537 |
+
Waveguide width [μm][1] B. J. Eggleton, C. G. Poulton, P. T. Rakich, M. J. Steel,
|
538 |
+
and G. Bahl, “Brillouin integrated photonics,” Nature
|
539 |
+
Photonics, 2019.
|
540 |
+
[2] R. Pant, C. G. Poulton, D.-Y. Choi et al., “On-chip stim-
|
541 |
+
ulated brillouin scattering,” Optics Express, vol. 19, pp.
|
542 |
+
8285–8290, 4 2011.
|
543 |
+
[3] E. A. Kittlaus, N. T. Otterstrom, P. Kharel, S. Gertler,
|
544 |
+
and P. T. Rakich, “Non-reciprocal interband brillouin
|
545 |
+
modulation,” Nature Photonics, vol. 12, pp. 613–619,
|
546 |
+
2018.
|
547 |
+
[4] E. A. Kittlaus, N. T. Otterstrom, and P. T. Rakich, “On-
|
548 |
+
chip inter-modal brillouin scattering,” Nature Communi-
|
549 |
+
cations, vol. 8, pp. 1–9, 2017.
|
550 |
+
[5] E. A. Kittlaus, H. Shin, and P. T. Rakich, “Large bril-
|
551 |
+
louin amplification in silicon,” Nature Photonics, vol. 10,
|
552 |
+
pp. 463–467, 2016.
|
553 |
+
[6] P. T. Rakich, C. Reinke, R. Camacho, P. Davids, and
|
554 |
+
Z. Wang, “Giant enhancement of stimulated brillouin
|
555 |
+
scattering in the subwavelength limit,” Physical Review
|
556 |
+
X, vol. 2, p. 11008, 2012.
|
557 |
+
[7] S. Gundavarapu, G. M. Brodnik, M. Puckett et al., “Sub-
|
558 |
+
hertz fundamental linewidth photonic integrated bril-
|
559 |
+
louin laser,” Nature Photonics, vol. 13, pp. 60–67, 12
|
560 |
+
2018.
|
561 |
+
[8] R. Botter, K. Ye, Y. Klaver et al., “Guided-acoustic stim-
|
562 |
+
ulated brillouin scattering in silicon nitride photonic cir-
|
563 |
+
cuits,” Science Advances, vol. 8, p. 2196, 10 2022.
|
564 |
+
[9] D. Marpaung, J. Yao, and J. Capmany, “Integrated mi-
|
565 |
+
crowave photonics,” Nature Photonics, vol. 13, pp. 80–90,
|
566 |
+
2019.
|
567 |
+
[10] D. Marpaung, B. Morrison, M. Pagani et al., “Low-
|
568 |
+
power, chip-based stimulated brillouin scattering mi-
|
569 |
+
crowave photonic filter with ultrahigh selectivity,” Op-
|
570 |
+
tica, vol. 2, p. 76, 2015.
|
571 |
+
[11] L. McKay, M. Merklein, A. C. Bedoya et al., “Brillouin-
|
572 |
+
based phase shifter in a silicon waveguide,” Optica, Vol.
|
573 |
+
6, Issue 7, pp. 907-913, vol. 6, pp. 907–913, 7 2019.
|
574 |
+
[12] N. T. Otterstrom, R. O. Behunin, E. A. Kittlaus,
|
575 |
+
Z. Wang, and P. T. Rakich, “A silicon brillouin laser,”
|
576 |
+
Science, vol. 360, pp. 1113–1116, 6 2018.
|
577 |
+
[13] N. Chauhan, A. Isichenko, K. Liu et al., “Visible light
|
578 |
+
photonic integrated brillouin laser,” Nature Communica-
|
579 |
+
tions 2021 12:1, vol. 12, pp. 1–8, 8 2021.
|
580 |
+
[14] J.
|
581 |
+
Kim,
|
582 |
+
M.
|
583 |
+
C.
|
584 |
+
Kuzyk,
|
585 |
+
K.
|
586 |
+
Han,
|
587 |
+
H.
|
588 |
+
Wang,
|
589 |
+
and
|
590 |
+
G. Bahl, “Non-reciprocal brillouin scattering induced
|
591 |
+
transparency,” Nature Physics, vol. 11, pp. 275–280, 1
|
592 |
+
2015.
|
593 |
+
[15] S. Li, X. Li, W. Zhang, J. Chen, and W. Zou, “Inves-
|
594 |
+
tigation of brillouin properties in high-loss doped silica
|
595 |
+
waveguides by comparison experiment,” IEEE Photon-
|
596 |
+
ics Technology Letters, vol. 32, pp. 948–951, 2020.
|
597 |
+
[16] W. Jin, L. Chang, W. Xie et al., “Stimulated brillouin
|
598 |
+
scattering in algaas on insulator waveguides,” Conference
|
599 |
+
on Lasers and Electro-Optics, paper SM4L.7, 2020.
|
600 |
+
[17] Q. Liu, H. Li, and M. Li, “Electromechanical brillouin
|
601 |
+
scattering in integrated optomechanical waveguides,”
|
602 |
+
Optica, vol. 6, pp. 778–785, 2019.
|
603 |
+
[18] F. Gyger, J. Liu, F. Yang et al., “Observation of stim-
|
604 |
+
ulated brillouin scattering in silicon nitride integrated
|
605 |
+
waveguides,” Physical Review Letters, vol. 124, 2020.
|
606 |
+
[19] D. J. Moss, R. Morandotti, A. L. Gaeta, and M. Lipson,
|
607 |
+
“New cmos-compatible platforms based on silicon nitride
|
608 |
+
and hydex for nonlinear optics,” Nature Photonics, vol. 7,
|
609 |
+
pp. 597–607, 7 2013.
|
610 |
+
[20] A. Trenti, M. Borghi, S. Biasi et al., “Thermo-optic coef-
|
611 |
+
ficient and nonlinear refractive index of silicon oxynitride
|
612 |
+
waveguides,” AIP Advances, vol. 8, p. 025311, 2 2018.
|
613 |
+
[21] T. Baak, “Silicon oxynitride; a material for grin optics,”
|
614 |
+
Applied Optics, Vol. 21, Issue 6, pp. 1069-1072, vol. 21,
|
615 |
+
pp. 1069–1072, 3 1982.
|
616 |
+
[22] H. T. Grahn, H. J. Maris, J. Tauc, and K. S. Hat-
|
617 |
+
ton, “Elastic properties of silicon oxynitride films deter-
|
618 |
+
mined by picosecond acoustics,” Applied Physics Letters,
|
619 |
+
vol. 53, p. 2281, 12 1998.
|
620 |
+
[23] M. Rowley, P. H. Hanzard, A. Cutrona et al., “Self-
|
621 |
+
emergence of robust solitons in a microcavity,” Nature
|
622 |
+
2022 608:7922, vol. 608, pp. 303–309, 8 2022.
|
623 |
+
[24] X. Xu, M. Tan, B. Corcoran et al., “11 tops photonic con-
|
624 |
+
volutional accelerator for optical neural networks,” Na-
|
625 |
+
ture 2020 589:7840, vol. 589, pp. 44–51, 1 2021.
|
626 |
+
[25] C. Reimer, M. Kues, P. Roztocki et al., “Generation of
|
627 |
+
multiphoton entangled quantum states by means of in-
|
628 |
+
tegrated frequency combs,” Science, vol. 351, pp. 1176–
|
629 |
+
1180, 3 2016.
|
630 |
+
[26] G. Piccoli,
|
631 |
+
M. Sanna,
|
632 |
+
M. Borghi,
|
633 |
+
L. Pavesi,
|
634 |
+
and
|
635 |
+
M. Ghulinyan, “Silicon oxynitride platform for linear and
|
636 |
+
nonlinear photonics at nir wavelengths,” Optical Materi-
|
637 |
+
als Express, vol. 12, 2022.
|
638 |
+
[27] Y. Bai, M. Zhang, Q. Shi et al., “Brillouin-kerr soliton
|
639 |
+
frequency combs in an optical microresonator,” Phys.
|
640 |
+
Rev. Lett., vol. 126, p. 063901, Feb 2021.
|
641 |
+
[28] M. Nie, K. Jia, Y. Xie et al., “Synthesized spatiotem-
|
642 |
+
poral mode-locking and photonic flywheel in multimode
|
643 |
+
mesoresonators,” Nature Communications 2022 13:1,
|
644 |
+
vol. 13, pp. 1–9, 10 2022.
|
645 |
+
[29] F. Morichetti, S. Grillanda, S. Manandhar et al., “Alpha
|
646 |
+
radiation effects on silicon oxynitride waveguides,” ACS
|
647 |
+
Photonics, vol. 3, pp. 1569–1574, 9 2016.
|
648 |
+
[30] F. Morichetti, A. Melloni, A. Breda et al., “A reconfig-
|
649 |
+
urable architecture for continuously variable optical slow-
|
650 |
+
wave delay lines,” Optics Express, vol. 15, pp. 17 273–
|
651 |
+
17 282, 12 2007.
|
652 |
+
[31] C. G. Poulton, R. Pant, and B. J. Eggleton, “Acoustic
|
653 |
+
confinement and stimulated brillouin scattering in inte-
|
654 |
+
grated optical waveguides,” JOSA B, vol. 30, pp. 2657–
|
655 |
+
2664, 10 2013.
|
656 |
+
[32] P. P. Absil, J. V. Hryniewicz, B. E. Little et al., “Wave-
|
657 |
+
length conversion in gaas micro-ring resonators,” Optics
|
658 |
+
Letters, vol. 25, pp. 554–556, 4 2000.
|
659 |
+
|
660 |
+
SUPPLEMENTARY NOTE A: DETAILS OF THE SBS EXPERIMENTS
|
661 |
+
Experiment setup
|
662 |
+
We applied the double-intensity-modulation pump-probe technique to characterize the Brillouin gain coefficient of
|
663 |
+
the SiON 5-cm straight waveguides with different widths. Fig. S1 shows the schematic of the experimental setup. The
|
664 |
+
pump laser (Agere D2525P22) operates at 1562 nm and is modulated by an intensity modulator (Thorlabs LN81S-FC)
|
665 |
+
with a 10.075 MHz sine signal generated by an RF signal generator (Keysight EDU33212A). The pump signal is then
|
666 |
+
amplified by an Erbium-doped fiber amplifier (EDFA, Amonics AEDFA-33-B-FA) to 28.7 dBm. After that, the pump
|
667 |
+
signal passes an optical circulator (Thorlabs 6015-3-APC) and a polarization controller (Thorlabs FPC032) before it
|
668 |
+
is coupled into the chip with an AR-coated polarization maintaining lensed fiber with a spot size of 2 µm (OZ optics).
|
669 |
+
The transmitted pump power is monitored with a power meter (Thorlabs S144C). The coupling loss of the sample is
|
670 |
+
3 dB per facet.
|
671 |
+
Fig. S1. Schematic of the setup used for the SBS characterization. EDFA: erbium-doped fiber amplifier, PM: optical power
|
672 |
+
meter, PC: fiber polarization controller, PD: photodetector, RF: radiofrequency signal generator.
|
673 |
+
The probe laser (Newport TLB-6728-P) sweeps at frequencies down shifted from the pump laser by about 15 GHz.
|
674 |
+
The probe is modulated by an intensity modulator of the same model (Thorlabs LN81S-FC) with a 10 MHz signal
|
675 |
+
generated by the other channel of the RF signal generator (Keysight EDU33212A). It is then amplified by an EDFA
|
676 |
+
(Amonics AEDFA-PA-35-B-FA) to 21.6 dBm. After that, the probe signal passes an optical circulator (Thorlabs
|
677 |
+
6015-3-APC) and a polarization controller (Thorlabs FPC032) before it is coupled into the other side of the chip with
|
678 |
+
an identical lensed fiber. The transmitted probe signal passes through an optical bandpass filter (EXFO XTM-50) to
|
679 |
+
filter out the reflected pump. After that, 1% of the probe signal is tapped into the power meter (Thorlabs S144C).
|
680 |
+
The remaining probe signal is sent into a photodiode (Optilab PD-23-C-DC). The detected electrical signal is then
|
681 |
+
analyzed with a lock-in amplifier (Z¨urich Instruments, MFLI 500 kHz) that is synchronized with the RF source.
|
682 |
+
TABLE S1 lists the experimental parameters of the setup.
|
683 |
+
TABLE S1. The experimental parameters of the SBS characterization setup.
|
684 |
+
Parameter Value
|
685 |
+
Unit
|
686 |
+
Description
|
687 |
+
Pprobe
|
688 |
+
21.6
|
689 |
+
dBm
|
690 |
+
Probe optical power after amplification
|
691 |
+
Ppump
|
692 |
+
28.7
|
693 |
+
dBm
|
694 |
+
Pump optical power after amplification
|
695 |
+
Vπ,probe
|
696 |
+
7.2
|
697 |
+
V
|
698 |
+
Vπ @ DC of the probe modulator
|
699 |
+
Vπ,pump
|
700 |
+
6.4
|
701 |
+
V
|
702 |
+
Vπ @ DC of the pump modulator
|
703 |
+
Pmod,probe
|
704 |
+
0
|
705 |
+
dBm
|
706 |
+
RF power sent to probe modulator
|
707 |
+
Pmod,pump
|
708 |
+
0
|
709 |
+
dBm
|
710 |
+
RF power sent to pump modulator
|
711 |
+
rpd
|
712 |
+
1.05
|
713 |
+
A/W
|
714 |
+
Photodiode sensitivity
|
715 |
+
Ppd
|
716 |
+
6.0
|
717 |
+
dBm
|
718 |
+
Optical power detected at the photodiode
|
719 |
+
αc
|
720 |
+
3
|
721 |
+
dB/facet Coupling loss per facet, including fiber components
|
722 |
+
|
723 |
+
Optical path
|
724 |
+
RF path
|
725 |
+
sync. clk
|
726 |
+
RF
|
727 |
+
Lock-in
|
728 |
+
amplifier
|
729 |
+
source
|
730 |
+
PD
|
731 |
+
99%
|
732 |
+
1%
|
733 |
+
Z
|
734 |
+
PM 2
|
735 |
+
10 MHz
|
736 |
+
10 MHz + 75 kHz
|
737 |
+
PM 1
|
738 |
+
Optical
|
739 |
+
bandpass filter
|
740 |
+
PC1
|
741 |
+
PC2
|
742 |
+
Intensity
|
743 |
+
Intensity
|
744 |
+
Probe w1
|
745 |
+
EDFA 1
|
746 |
+
SiON waveguides
|
747 |
+
EDFA 2
|
748 |
+
zm dwnd
|
749 |
+
modulator 1
|
750 |
+
modulator 2TABLE S2. Simulated and measured Brillouin properties of SiON waveguides.
|
751 |
+
Waveguide
|
752 |
+
Frequency shift
|
753 |
+
Linewidth
|
754 |
+
Gain coefficient
|
755 |
+
width
|
756 |
+
Simulated Measured Simulated Measured Simulated Measured
|
757 |
+
(µm)
|
758 |
+
(GHz)
|
759 |
+
(GHz)
|
760 |
+
(MHz)
|
761 |
+
(MHz)
|
762 |
+
(m−1W−1) (m−1W−1)
|
763 |
+
2.0
|
764 |
+
15.70
|
765 |
+
14.22
|
766 |
+
154
|
767 |
+
358
|
768 |
+
0.35
|
769 |
+
0.10
|
770 |
+
2.2
|
771 |
+
15.70
|
772 |
+
14.31
|
773 |
+
139
|
774 |
+
282
|
775 |
+
0.40
|
776 |
+
0.15
|
777 |
+
2.3
|
778 |
+
15.71
|
779 |
+
14.40
|
780 |
+
131
|
781 |
+
280
|
782 |
+
0.42
|
783 |
+
0.17
|
784 |
+
2.4
|
785 |
+
15.71
|
786 |
+
14.44
|
787 |
+
125
|
788 |
+
269
|
789 |
+
0.44
|
790 |
+
0.19
|
791 |
+
2.6
|
792 |
+
15.71
|
793 |
+
14.43
|
794 |
+
115
|
795 |
+
213
|
796 |
+
0.47
|
797 |
+
0.24
|
798 |
+
3.5
|
799 |
+
15.73
|
800 |
+
14.48
|
801 |
+
92
|
802 |
+
105
|
803 |
+
0.52
|
804 |
+
0.32
|
805 |
+
Brillouin gain coefficient calculation
|
806 |
+
The SBS gain in a waveguide is determined by:
|
807 |
+
G = egBLeffPpump,
|
808 |
+
(S1)
|
809 |
+
where gB is the Brillouin gain coefficient in m−1W−1, Leff is the effective length of the waveguide, and Ppump is the
|
810 |
+
on-chip pump power.
|
811 |
+
The effective length of a waveguide is calculated using:
|
812 |
+
Leff = 1 − e−αL
|
813 |
+
α
|
814 |
+
,
|
815 |
+
(S2)
|
816 |
+
where α is the propagation loss, and L is the actual waveguide length.
|
817 |
+
By using (S1), and taking the small signal approximation we can calculate the gain coefficient using:
|
818 |
+
gB,SDS = VSDS
|
819 |
+
Vfiber
|
820 |
+
gB,fiberLeff,fiberPpump,fiber
|
821 |
+
Leff,SDSPpump,SDS
|
822 |
+
(S3)
|
823 |
+
Here V denotes the signal voltage measured by the lock-in amplifier, the subscripts fiber and SDS refer to the
|
824 |
+
properties of the fiber and chip used in this experiment.
|
825 |
+
Comparison between the measurement and simulation results
|
826 |
+
The simulated SBS responses of the 2.0 µm, 2.2 µm, 2.3 µm, 2.4 µm, 2.6 µm, and 3.5 µm-wide SiON waveguides
|
827 |
+
are shown in Fig. S2. The peak of the simulated SBS responses increases and shifts towards higher frequencies as the
|
828 |
+
waveguide becomes wider, in the meantime, the linewidth also becomes narrower, all of which are coherent with the
|
829 |
+
trend of our measurement results.
|
830 |
+
We compared the Brillouin frequency shift, linewidth, and the Brillouin gain coefficient of different waveguides
|
831 |
+
between the simulation and the measurement results in TABLE S2.
|
832 |
+
The simulated Brillouin frequency shift is
|
833 |
+
1.3 GHz higher than the measured results, which is less than 10% of the total frequency shift. The measured SBS
|
834 |
+
linewidth of different waveguides are constantly larger than the simulations, however, the discrepancy keeps reducing
|
835 |
+
as the waveguide becomes wider. The broader linewidth we measured could be contributed to the non-uniformity of
|
836 |
+
the waveguides. There is also a discrepancy between the measured and the simulated Brillouin gain coefficients of
|
837 |
+
different waveguides. The lower measurement values could come from the increasing coupling loss when we pump
|
838 |
+
higher power into the samples. Nevertheless, the measured value also matches better with the simulation results for
|
839 |
+
the wider waveguides.
|
840 |
+
|
841 |
+
Fig. S2. Simulated SBS responses of the 2.0 µm, 2.2 µm, 2.3 µm, 2.4 µm, 2.6 µm, and 3.5 µm-wide SiON waveguides.
|
842 |
+
SUPPLEMENTARY NOTE B: DETAILS OF THE FWM EXPERIMENTS
|
843 |
+
Ring resonator characterization
|
844 |
+
Before we performed the four-wave mixing (FWM) experiment, we first characterized the ring resonator with the
|
845 |
+
experimental setup shown in Fig. S3.
|
846 |
+
The laser (Agere D2525P22) was modulated with an intensity modulator
|
847 |
+
(Thorlabs LN05S-FC) and was sent to the optical bandpass filter (EXFO XTM-50) to filter out the lower sideband.
|
848 |
+
After that, the light is coupled into the sample with the lensed fiber and coupled out from the other side of the
|
849 |
+
chip. The signal was then amplified by the EDFA (Amonics AEDFA-33-B-FA) and converted to the RF domain
|
850 |
+
with a photodiode (Optilab PD-23-C-DC). We swept the sideband of the light across the resonance response of the
|
851 |
+
ring resonator using the vector network analyzer (VNA, Keysight P5007A) with an RF power of -5 dBm. From the
|
852 |
+
measured S21 parameter, we then can get the linewidth of the ring resonator with MHz-level resolution, in addition,
|
853 |
+
we can use phase information to confirm the ring is over-coupled.
|
854 |
+
|
855 |
+
0.5
|
856 |
+
2.0 um
|
857 |
+
1
|
858 |
+
1
|
859 |
+
0.0
|
860 |
+
-
|
861 |
+
0.5
|
862 |
+
-
|
863 |
+
2.2 um
|
864 |
+
0.0
|
865 |
+
-
|
866 |
+
0.5
|
867 |
+
2.3 um
|
868 |
+
[m-1 W-1]
|
869 |
+
0.0
|
870 |
+
b
|
871 |
+
60
|
872 |
+
0.5
|
873 |
+
2.4 um
|
874 |
+
0.0
|
875 |
+
0.5
|
876 |
+
2.6 um
|
877 |
+
0.0
|
878 |
+
0.5
|
879 |
+
3.5 um
|
880 |
+
F0'0
|
881 |
+
15.3
|
882 |
+
15.5
|
883 |
+
15.7
|
884 |
+
15.9
|
885 |
+
16.1
|
886 |
+
Brillouin frequency shift [GHz]Fig. S3. Schematic of the setup used for ring resonator characterization. PC: polarization controller, PD: photodetector,
|
887 |
+
EDFA: erbium-doped fiber amplifier, VNA: vector network analyzer.
|
888 |
+
TABLE S3. The experimental parameters of the FWM characterization setup.
|
889 |
+
Parameter Value Unit
|
890 |
+
Description
|
891 |
+
Ppump
|
892 |
+
20.3
|
893 |
+
dBm
|
894 |
+
Input pump optical power
|
895 |
+
Psignal
|
896 |
+
6.3
|
897 |
+
dBm
|
898 |
+
Input signal optical power
|
899 |
+
Pider
|
900 |
+
-38.7
|
901 |
+
dBm
|
902 |
+
Output idler optical power
|
903 |
+
δvpump
|
904 |
+
110
|
905 |
+
MHz
|
906 |
+
Detuning of the pump light
|
907 |
+
δvsignal
|
908 |
+
197.5
|
909 |
+
MHz
|
910 |
+
Detuning of the signal light
|
911 |
+
δvidler
|
912 |
+
417.5
|
913 |
+
MHz
|
914 |
+
Detuning of the idler light
|
915 |
+
FEpump
|
916 |
+
31
|
917 |
+
-
|
918 |
+
Enhancement factor of the pump light
|
919 |
+
FEsignal
|
920 |
+
25.2
|
921 |
+
-
|
922 |
+
Enhancement factor of the signal light
|
923 |
+
FEider
|
924 |
+
12.4
|
925 |
+
-
|
926 |
+
Enhancement factor of the idler light
|
927 |
+
Leff
|
928 |
+
386
|
929 |
+
mm
|
930 |
+
Effective length of the ring resonator
|
931 |
+
FWM experiment setup
|
932 |
+
We measured the nonlinear index n2 and nonlinear parameter γ of the SiON waveguide with the FWM experiments
|
933 |
+
in the all-pass ring resonator. The experimental setup was shown in Fig.S4. The pump laser (Santec TSL-210) operates
|
934 |
+
at 1562 nm and is amplified with an EDFA (Amonics AEDFA-33-B-FA). After that, the pump is sent to an optical
|
935 |
+
bandpass filter (EXFO XTM-50) to filter out the amplified spontaneous emission. The signal laser (Agere D2525P22)
|
936 |
+
is set close to 2xFSR (100 GHz) away from the pump and is amplified with an EDFA (Amonics AEDFA-37-R-FA).
|
937 |
+
The pump is thermally locked close to the resonance of the ring resonator, while the frequency of the probe is tuned
|
938 |
+
manually. The pump and the signal are combined with a 99:1 optic coupler (Thorlabs TN1550R1A2) and coupled
|
939 |
+
into the all-pass ring resonator with an AR-coated lensed fiber with a spot size of 2 µm (OZ optics). The generated
|
940 |
+
idler together with the pump and signal is then coupled out from the chip and sent to the optical spectrum analyzer
|
941 |
+
(Finisar Waveanalyzer 1500S) to measure the conversion efficiency from the signal to the idler. The experimental
|
942 |
+
parameters are listed in TABLE S3.
|
943 |
+
The conversion efficiency η of the four-wave mixing in an all-pass ring resonator is [32]:
|
944 |
+
Fig. S4. Schematic of the setup used for four-wave mixing experiment. PC: polarization controller, EDFA: erbium-doped fiber
|
945 |
+
amplifier, OSA: optical spectrum analyzer.
|
946 |
+
|
947 |
+
VNA
|
948 |
+
Optical path
|
949 |
+
RF path
|
950 |
+
88
|
951 |
+
PC
|
952 |
+
PD
|
953 |
+
Laser
|
954 |
+
Intensity
|
955 |
+
Optical
|
956 |
+
SiON all-pass
|
957 |
+
EDFA
|
958 |
+
modulator
|
959 |
+
bandpass filter
|
960 |
+
ring resonatorPC1
|
961 |
+
EDFA 1
|
962 |
+
Optical
|
963 |
+
Pump w1
|
964 |
+
bandpass filter
|
965 |
+
99%
|
966 |
+
88
|
967 |
+
OSA
|
968 |
+
1%
|
969 |
+
PC2
|
970 |
+
SiON all-pass ring resonator
|
971 |
+
Signal w2
|
972 |
+
EDFA 2η = (γLeffPp)2 |FE (ωp)|4 |FE (ωs)|2 |FE (ωi)|2 ,
|
973 |
+
(S4)
|
974 |
+
where the L is the circumference of the ring resonator, Pp is the on-chip pump power, and the FE(ωp,s,i) is the field
|
975 |
+
enhancement factor of the pump, signal, and idler, respectively.
|
976 |
+
The effective length considers both the attenuation and the phase mismatch of the four-wave mixing process:
|
977 |
+
L2
|
978 |
+
eff = L2e−αL
|
979 |
+
����
|
980 |
+
1 − exp(−α + i∆kL)
|
981 |
+
αL − i∆kL
|
982 |
+
����
|
983 |
+
2
|
984 |
+
,
|
985 |
+
(S5)
|
986 |
+
where α is the propagation loss, and the ∆k is the phase mismatch between the pump, signal, and idler.
|
987 |
+
The field enhancement factor can be calculated by:
|
988 |
+
|FE| =
|
989 |
+
�����
|
990 |
+
√κ
|
991 |
+
1 − √1 − κ exp(−αL/2) cos
|
992 |
+
�
|
993 |
+
− 2πδv
|
994 |
+
F SR
|
995 |
+
�
|
996 |
+
����� ,
|
997 |
+
(S6)
|
998 |
+
where the κ is the power coupling coefficient and the δv is the detuning. We calculated the detuning of the pump and
|
999 |
+
the signal by comparing the extinction ratio of the light and the resonance response of the ring resonator. Assuming
|
1000 |
+
negligible dispersion, the detuning of the idler can be obtained based on:
|
1001 |
+
��vidler = 2δvpump + δvsignal
|
1002 |
+
(S7)
|
1003 |
+
The nonlinear parameter γ can be calculated by combining (S4 - S7). Moreover, the nonlinear index n2 can be
|
1004 |
+
calculated from the nonlinear parameter γ by:
|
1005 |
+
n2 = cAeffγ
|
1006 |
+
ω
|
1007 |
+
,
|
1008 |
+
(S8)
|
1009 |
+
where the ω is the angular frequency of the pump, c is the speed of light in the vacuum and Aeff is the effective mode
|
1010 |
+
area of the waveguide.
|
1011 |
+
|
99FRT4oBgHgl3EQfrDen/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
9dAzT4oBgHgl3EQf-_6e/content/2301.01942v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b085152b9d5598edee2034512802290c33ac99ecff4f2ef7a63e453e9331eede
|
3 |
+
size 1720528
|
9dAzT4oBgHgl3EQf-_6e/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1d67426d3901afd2d43bf634cebb9f1a657f930f00780e1a3441aeae99d38065
|
3 |
+
size 3211309
|
9dAzT4oBgHgl3EQf-_6e/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9b332f894a5efdb73cf51ca7c3af0b80791803fff541a44fc7a1ff1e1bbbf24a
|
3 |
+
size 110998
|
AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/2301.03553v1.pdf.txt
ADDED
@@ -0,0 +1,1891 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
FedDebug: Systematic Debugging for Federated
|
2 |
+
Learning Applications
|
3 |
+
Waris Gill
|
4 |
+
Computer Science Department
|
5 |
+
Virginia Tech
|
6 |
+
Blacksburg, USA
|
7 | |
8 |
+
Ali Anwar
|
9 |
+
Computer Science and Engineering Department
|
10 |
+
University of Minnesota
|
11 |
+
Minneapolis, USA
|
12 | |
13 |
+
Muhammad Ali Gulzar
|
14 |
+
Computer Science Department
|
15 |
+
Virginia Tech
|
16 |
+
Blacksburg, USA
|
17 | |
18 |
+
Abstract—In Federated Learning (FL), clients train a model
|
19 |
+
locally and share it with a central aggregator to build a global
|
20 |
+
model. Impermissibility to access client’s data and collaborative
|
21 |
+
training makes FL appealing for applications with data-privacy
|
22 |
+
concerns such as medical imaging. However, these FL charac-
|
23 |
+
teristics pose unprecedented challenges for debugging. When a
|
24 |
+
global model’s performance deteriorates, finding the round and
|
25 |
+
the clients responsible is a major pain point. Developers resort
|
26 |
+
to trial-and-error debugging with subsets of clients, hoping to
|
27 |
+
increase the accuracy or let future FL rounds retune the model,
|
28 |
+
which are time-consuming and costly.
|
29 |
+
We design a systematic fault localization framework, FEDDE-
|
30 |
+
BUG, that advances the FL debugging on two novel fronts. First,
|
31 |
+
FEDDEBUG enables interactive debugging of realtime collabora-
|
32 |
+
tive training in FL by leveraging record and replay techniques
|
33 |
+
to construct a simulation that mirrors live FL. FEDDEBUG’s
|
34 |
+
breakpoint can help inspect an FL state (round, client, and
|
35 |
+
global model) and seamlessly move between rounds and clients’
|
36 |
+
models, enabling a fine-grained step-by-step inspection. Second,
|
37 |
+
FEDDEBUG automatically identifies the client responsible for
|
38 |
+
lowering global model’s performance without any testing data
|
39 |
+
and labels–both are essential for existing debugging techniques.
|
40 |
+
FEDDEBUG’s strengths come from adapting differential testing
|
41 |
+
in conjunction with neurons activations to determine the precise
|
42 |
+
client deviating from normal behavior. FEDDEBUG achieves
|
43 |
+
100% to find a single client and 90.3% accuracy to find multiple
|
44 |
+
faulty clients. FEDDEBUG’s interactive debugging incurs 1.2%
|
45 |
+
overhead during training, while it localizes a faulty client in only
|
46 |
+
2.1% of a round’s training time. With FEDDEBUG, we bring
|
47 |
+
effective debugging practices to federated learning, improving
|
48 |
+
the quality and productivity of FL application developers.
|
49 |
+
Index Terms—software debugging, federated learning, testing,
|
50 |
+
fault localization
|
51 |
+
I. INTRODUCTION
|
52 |
+
Many machine learning models today require private user
|
53 |
+
information for training accurate models. However, users are
|
54 |
+
naturally reluctant to share such data to minimize the risk
|
55 |
+
of privacy violation. To address the above needs, Federated
|
56 |
+
Learning (FL) [42] enables individual participating clients
|
57 |
+
(e.g., smart-home edge devices) to train a machine learning
|
58 |
+
(ML) model on their local data in a privacy-preserving envi-
|
59 |
+
ronment, and then send the trained model (e.g., the weights
|
60 |
+
of the neural network) to a central aggregator to build a
|
61 |
+
global model. FL trains highly accurate models without ever
|
62 |
+
accessing user data, keeping clients’ data privacy intact [33].
|
63 |
+
With the advent of frameworks like Fedml [15], and IBMFL
|
64 |
+
[38], FL is actively used in solving real-world problems [20],
|
65 |
+
[37], [47], [73].
|
66 |
+
Problems.
|
67 |
+
The
|
68 |
+
support
|
69 |
+
for
|
70 |
+
collaborative
|
71 |
+
yet
|
72 |
+
privacy-
|
73 |
+
preserving training on FL frameworks comes at the cost
|
74 |
+
of transparency and comprehension, making debugging pro-
|
75 |
+
hibitively complicated. For instance, a faulty client can send
|
76 |
+
an inaccurate model to the aggregator either due to noisy labels
|
77 |
+
[18], [22], [28], [30], [31], [44], [72] in the training data or
|
78 |
+
malicious intent to deteriorate the global model’s performance
|
79 |
+
[1]–[3], [7]. Finding such a faulty client is challenging due
|
80 |
+
to a large number of unpredictable clients, that may not have
|
81 |
+
participated in every round because of a poor network connec-
|
82 |
+
tion or low battery power [54], [63]. The FL training process
|
83 |
+
also spans numerous rounds which significantly increases the
|
84 |
+
search space for identifying the true, culprit round. None of
|
85 |
+
the existing FL frameworks provide debugging and testing
|
86 |
+
support to assist the developers building FL applications using
|
87 |
+
FL frameworks [24]. These developers rely on guesswork and
|
88 |
+
expensive trail-error debugging to find a fault-inducing client.
|
89 |
+
Challenges. FL poses two fundamental challenges when de-
|
90 |
+
signing a debugging technique. First, in FL deployments, train
|
91 |
+
and test data are kept private and strictly reside with clients.
|
92 |
+
Access to such data could allow developers to evaluate indi-
|
93 |
+
vidual clients’ models sent to the aggregator and identify the
|
94 |
+
lowest performing model as the culprit, similar to traditional
|
95 |
+
ML model testing. Neither test data nor labels are available
|
96 |
+
to an FL application developer and, therefore, existing ML
|
97 |
+
debugging approaches [4], [13], [45], [46], [52], [55], [57],
|
98 |
+
[59], [61], [62], [71] are also inapplicable.
|
99 |
+
Second, due to the unpredictability of clients’ participation
|
100 |
+
in a round and the ephemeral nature of their contributions
|
101 |
+
in the global model, reproducing a fault (i.e., faulty client)
|
102 |
+
and then debugging it is not feasible. Traditional breakpoint
|
103 |
+
debugging will pause the entire training process in FL across
|
104 |
+
all clients, causing severe side-effects such as data loss as
|
105 |
+
clients may not have persistent storage to store data. Live
|
106 |
+
postmortem or trial-error debugging may lead to a new set of
|
107 |
+
clients for each round, based on client availability and quorum,
|
108 |
+
thus making debugging even more ineffective. Considering the
|
109 |
+
above limitations and challenges, we must design a debugging
|
110 |
+
approach that does not rely on clients’ data, can debug a live
|
111 |
+
arXiv:2301.03553v1 [cs.SE] 9 Jan 2023
|
112 |
+
|
113 |
+
FL application without any interference, and can localize a
|
114 |
+
faulty client precisely.
|
115 |
+
Contributions. We take inspiration from traditional debug-
|
116 |
+
gers, such as gdb, and redesign traditional debugging con-
|
117 |
+
structs that are tailored to the needs of an FL application
|
118 |
+
developer. Our approach, FEDDEBUG, selectively records an
|
119 |
+
FL application’s telemetry data to enable realtime interactive
|
120 |
+
debugging on a simulation that mirrors a live FL application.
|
121 |
+
With FEDDEBUG’s breakpoint, a developer can spawn a
|
122 |
+
simulation of a live FL application and inspect the current
|
123 |
+
state containing information such as clients’ models and their
|
124 |
+
reported metrics (e.g., their training loss or hyperparameters).
|
125 |
+
It also allows a seamless transition between the rounds and
|
126 |
+
clients at a given breakpoint, enabling a fine-grained step-by-
|
127 |
+
step inspection of the application’s state. When a developer
|
128 |
+
finds a suspicious state (e.g., multiple clients report high
|
129 |
+
training loss), FEDDEBUG’s novel automated fault localization
|
130 |
+
approach precisely identifies the faulty client without ever
|
131 |
+
needing any test data or labels. Once a faulty client is iden-
|
132 |
+
tified, FEDDEBUG’s fix and replay repairs the global training
|
133 |
+
by retroactively removing the client and resumes the live FL
|
134 |
+
training.
|
135 |
+
Key Insights. FEDDEBUG leverages several insights to enable
|
136 |
+
systematic FL debugging while preserving clients’ privacy. We
|
137 |
+
observe that instead of debugging a live FL application, we
|
138 |
+
can record a set of runtime metrics essential to regenerate a
|
139 |
+
given state in an FL application. Thus, FEDDEBUG performs
|
140 |
+
debugging on a regenerated simulated state equivalent to a
|
141 |
+
live state. To have a measurable impact on the global model,
|
142 |
+
a faulty client’s model must behave differently than the regular
|
143 |
+
clients. Every client in an FL application has the same model
|
144 |
+
architecture, so their internal behaviors are comparable. Based
|
145 |
+
on this insight, FEDDEBUG proposes an inference-guided
|
146 |
+
test selection method to select high-quality and diverse test
|
147 |
+
data from a pool of randomly generated input images using
|
148 |
+
Kaiming Initialization [17]. However, an auto-generated data
|
149 |
+
does not include the class label i.e., an oracle. To address the
|
150 |
+
oracle problem with such data, FEDDEBUG adapts differential
|
151 |
+
testing to FL domain. It captures differences in the models’
|
152 |
+
execution via neuron activations instead of output labels to
|
153 |
+
identify diverging behavior of a faulty client.
|
154 |
+
Evaluations. We perform large-scale, extensive evaluation of
|
155 |
+
FEDDEBUG on popular models, two large-scale datasets, two
|
156 |
+
well-established FL data distributions, and a real-world fault-
|
157 |
+
injection technique in a total of 68 different FL configurations.
|
158 |
+
We evaluate FEDDEBUG on fault localizability, debugging
|
159 |
+
time, performance overhead over a vanilla FL framework
|
160 |
+
(IBMFL), and scalability. FEDDEBUG shows remarkable suc-
|
161 |
+
cess in identifying faulty clients. It can localize the real-
|
162 |
+
world faulty client with 100% accuracy within 2.1% of a
|
163 |
+
round’s training time. When faced with multiple faulty clients,
|
164 |
+
FEDDEBUG retains the high fault localization accuracy i.e.,
|
165 |
+
90.3%. FEDDEBUG’s debugging constructs incur an overhead
|
166 |
+
of 48% of the aggregation time to record telemetry data for
|
167 |
+
state regeneration. Surprisingly, this time is only 1.2% of
|
168 |
+
a single round’s training time in our experiments. Through
|
169 |
+
Hospital1
|
170 |
+
2
|
171 |
+
HospitalN
|
172 |
+
2
|
173 |
+
Hospital2
|
174 |
+
2
|
175 |
+
Hospital3
|
176 |
+
2
|
177 |
+
Central
|
178 |
+
Aggregator
|
179 |
+
Server
|
180 |
+
4
|
181 |
+
…
|
182 |
+
1
|
183 |
+
1
|
184 |
+
1
|
185 |
+
1
|
186 |
+
3
|
187 |
+
3
|
188 |
+
3
|
189 |
+
3
|
190 |
+
Aggregation
|
191 |
+
Developer
|
192 |
+
Fig. 1: In a centralized FL architecture, an aggregator sends a
|
193 |
+
global model to clients (step 1). Each client trains the model
|
194 |
+
on local data (step 2) and sends the locally trained model back
|
195 |
+
to the server (step 3). The server aggregates all models to form
|
196 |
+
a new global model (step 4).
|
197 |
+
our evaluation, we demonstrate that FEDDEBUG effectively
|
198 |
+
conducts interactive debugging and efficiently automates fault
|
199 |
+
localization without incurring high runtime costs. FEDDEBUG
|
200 |
+
augments the IBMFL framework, but its underlying insights
|
201 |
+
can be adapted for other FL frameworks.
|
202 |
+
We summarize FEDDEBUG’s contributions below:
|
203 |
+
• Originality: To the best of our knowledge, FEDDEBUG
|
204 |
+
is the first general-purpose debugging framework for fed-
|
205 |
+
erated learning applications that is not limited by access
|
206 |
+
to clients’ data. It addresses open debugging challenges
|
207 |
+
in FL [24].
|
208 |
+
• Approach: Traditional ML trains a single model, whereas
|
209 |
+
FL involves distributed training across hundreds of clients
|
210 |
+
over multiple rounds. Thus, existing ML debugging ap-
|
211 |
+
proaches are inapplicable on FL. FEDDEBUG’s novelty
|
212 |
+
lies in observations about FL and the exploitation of in-
|
213 |
+
sights on reproducibility, inference guided test generation,
|
214 |
+
and differential testing that do not impede performance
|
215 |
+
or violate FL privacy principles.
|
216 |
+
• Benchmark: We evaluate FEDDEBUG in 68 FL config-
|
217 |
+
urations derived from well-established datasets, models,
|
218 |
+
varying clients, data distribution, and fault-injections.
|
219 |
+
We package our experiment environment into a public
|
220 |
+
benchmark for future research use.
|
221 |
+
• Usefulness: Our extensive experiments demonstrate that
|
222 |
+
FEDDEBUG successfully locates faulty client(s) with-
|
223 |
+
out impeding the FL workflow. On a wide range of
|
224 |
+
experiments, FEDDEBUG exhibits robust results against
|
225 |
+
multiple faulty clients, challenging data distributions, and
|
226 |
+
a large number of clients.
|
227 |
+
II. BACKGROUND AND MOTIVATION
|
228 |
+
A. Federated Learning
|
229 |
+
In Federated Learning, multiple clients locally train a model
|
230 |
+
on their data and share it with a central server (also called
|
231 |
+
an aggregator) to construct a global model. During this col-
|
232 |
+
laborative training, clients’ training data never leaves their
|
233 |
+
premises [24]. Figure 1 shows an FL setting where multiple
|
234 |
+
hospitals collaboratively train a global model on their local
|
235 |
+
labeled medical imaging data.
|
236 |
+
1) In the first step, the aggregator sends copies of the
|
237 |
+
current global model, i.e., the global model weights,
|
238 |
+
|
239 |
+
and hyperparameters (e.g., learning rate and epochs) to
|
240 |
+
participating clients (Step 1 of Figure 1).
|
241 |
+
2) Using the global model as initial parameters, each client
|
242 |
+
trains a model on its local data similar to traditional ML
|
243 |
+
training (Step 2 of Figure 1).
|
244 |
+
3) Once trained, each client sends its local model, in the
|
245 |
+
form of updated weights, back to the aggregator as
|
246 |
+
shown in Step 3 of Figure 1. Additionally, clients share
|
247 |
+
performance metrics such as training loss and qual-
|
248 |
+
ity/quantity of training data with the central aggregator.
|
249 |
+
4) After receiving model updates, the server aggregates the
|
250 |
+
updated weights from all clients using established model
|
251 |
+
aggregations such as FedAvg [42] to form a new global
|
252 |
+
model (Step 4 in Figure 1).
|
253 |
+
The four steps are repeated for a fixed number of rounds
|
254 |
+
or until the global model meets some convergence criteria, for
|
255 |
+
example, when training loss is close to zero. Note that not
|
256 |
+
every client participates in every round. There are additional
|
257 |
+
variants of federated learning (FL) such as vertical FL [36],
|
258 |
+
FL with differential privacy [60], decentralized FL [43], and
|
259 |
+
personalized FL [53]. Our work mainly focuses on the standard
|
260 |
+
FL, where the goal is to train a single global model.
|
261 |
+
B. Motivating Scenario
|
262 |
+
Suppose that an FL application developer trains a global
|
263 |
+
neural network model, ResNet [16], on chest X-ray images
|
264 |
+
from hospitals across the country to diagnose respiratory
|
265 |
+
diseases (e.g., Covid-19). We use the term developer to refer to
|
266 |
+
a person who writes, deploys, and monitors the FL application
|
267 |
+
at the central server as shown in Figure 1. Every participating
|
268 |
+
hospital collects X-rays of patients labelled by radiologists and
|
269 |
+
trains a local ResNet model on that data. Hospitals periodically
|
270 |
+
share their locally trained models with a central server. The
|
271 |
+
central server then aggregates these shared models into one
|
272 |
+
global model using FedAvg [42]. After aggregation, the central
|
273 |
+
server sends the updated global model to each hospital to
|
274 |
+
incorporate in local training in the next round, as shown in
|
275 |
+
Figure 1.
|
276 |
+
The developer observes that multiple hospitals are reporting
|
277 |
+
a high training loss from their preceding training rounds.
|
278 |
+
One plausible reason is that one of the hospitals performed
|
279 |
+
training on noisy, mislabelling by inexperienced staff [8], [22],
|
280 |
+
[30], [31] and continuously impacted the global model during
|
281 |
+
aggregation. Thus, when the global model is shared back with
|
282 |
+
the other hospitals, it influences their training.
|
283 |
+
Limitations for FL Debugging. After noticing an increase
|
284 |
+
in training loss, the developer must investigate the root cause,
|
285 |
+
as misdiagnosis can lead to ill-treatment. To debug the FL ap-
|
286 |
+
plication at this scale, the developer starts manually inspection
|
287 |
+
of the collected logs such as global model weights, shared
|
288 |
+
local models from hospitals, response/training time of each
|
289 |
+
hospital, at the central server. Due to patient’s privacy, the hos-
|
290 |
+
pitals refrain from sharing their labelled training data, which
|
291 |
+
is critical for correctly evaluating the quality of a model and
|
292 |
+
thus essential for localizing the faulty round and model. Even
|
293 |
+
if she can find the problematic round, she cannot isolate the
|
294 |
+
hospital(s) responsible for affecting the global model without
|
295 |
+
test data. One option is cross validating each client’s model
|
296 |
+
by requesting that other clients test the model on their local
|
297 |
+
data. This is prohibited in practice, as it adds computational
|
298 |
+
burden on clients (e.g., edge devices) and can potentially cause
|
299 |
+
data privacy violation. Lastly, statically inspecting hospitals’
|
300 |
+
models does not provide any meaningful information. Without
|
301 |
+
any debugging techniques at her disposal, she resorts to using
|
302 |
+
guesswork to identify the hospital with noisy labels (i.e., faulty
|
303 |
+
client).
|
304 |
+
FedDebug. The developer decides to use FEDDEBUG to
|
305 |
+
investigate the root cause behind high training loss. When
|
306 |
+
enabled, FEDDEBUG allows a developer to set a breakpoint
|
307 |
+
at any round with training loss. This breakpoint separately
|
308 |
+
invokes a debugging session, a simulation of the original FL
|
309 |
+
service, without stopping the live training. In the debugging
|
310 |
+
session, the developer uses FEDDEBUG’s step-back and step-
|
311 |
+
next constructs to move between rounds, inspecting the global
|
312 |
+
and local models of hospitals recorded by FEDDEBUG. Upon
|
313 |
+
inspecting the training rounds, she finds the specific round,
|
314 |
+
e.g., Round-8, where the performance starts to deteriorate.
|
315 |
+
This round can be different from the breakpoint enabled
|
316 |
+
round, as performance issues can manifest in earlier rounds but
|
317 |
+
surface later. During this inspection, FEDDEBUG also reports
|
318 |
+
the list of hospitals that participated in that round. Next, she
|
319 |
+
invokes FEDDEBUG’s fault localization algorithm to precisely
|
320 |
+
identify the hospital responsible for deteriorating the global
|
321 |
+
model, leading to lower performance. After finding the hospital
|
322 |
+
with noisy labels, developer removes it from the problematic
|
323 |
+
round (i.e., Round-8) and onwards. FEDDEBUG’s fix and
|
324 |
+
replay starts retraining from round Round-8 to the current
|
325 |
+
round, and then replaces the impacted global model with
|
326 |
+
the retrained global model and continues the original FL
|
327 |
+
application.
|
328 |
+
III. FEDDEBUG’S DEBUGGING CONSTRUCTS
|
329 |
+
The goal of FEDDEBUG is to facilitate an FL application
|
330 |
+
developer in isolating a faulty client responsible for dete-
|
331 |
+
riorating the global training. Recent studies emphasize the
|
332 |
+
need for debugging techniques in FL applications and the
|
333 |
+
challenges associated with providing debugging support in FL
|
334 |
+
frameworks [24]. To this end, we must overcome the following
|
335 |
+
major challenges in designing FEDDEBUG. First, the privacy
|
336 |
+
concerns of FL put restrictions on any client-side interference.
|
337 |
+
Second, the unpredictable and ephemeral nature of clients in
|
338 |
+
FL threatens reproducibility, which is critical for debugging
|
339 |
+
a live system. Third, the distributed nature with hundreds of
|
340 |
+
participating clients makes traditional breakpoint debugging
|
341 |
+
ineffective in FL. Pausing the entire FL application at this
|
342 |
+
scale will be prohibitively expensive. Therefore, traditional
|
343 |
+
debugging approaches, such as gdb, are not suited for the
|
344 |
+
FL systems’ scale and architecture.
|
345 |
+
In FEDDEBUG, we address the above challenges and ad-
|
346 |
+
vance the systematic FL application debugging. We enable
|
347 |
+
realtime, interactive debugging on a simulation of the live
|
348 |
+
FL application. To do so, FEDDEBUG’s continuously collects
|
349 |
+
|
350 |
+
G
|
351 |
+
Algo 2: Faulty Client Localization
|
352 |
+
Step back
|
353 |
+
C1
|
354 |
+
C3
|
355 |
+
C8
|
356 |
+
C20
|
357 |
+
FedAvg
|
358 |
+
C1
|
359 |
+
C3
|
360 |
+
C5
|
361 |
+
C8
|
362 |
+
C20
|
363 |
+
G
|
364 |
+
R20
|
365 |
+
FedAvg
|
366 |
+
C1
|
367 |
+
C3
|
368 |
+
C8
|
369 |
+
C20
|
370 |
+
FedAvg
|
371 |
+
C1
|
372 |
+
C3
|
373 |
+
C5
|
374 |
+
C8
|
375 |
+
C20
|
376 |
+
G
|
377 |
+
R21
|
378 |
+
FedAvg
|
379 |
+
C1
|
380 |
+
C3
|
381 |
+
C8
|
382 |
+
C20
|
383 |
+
G
|
384 |
+
R23
|
385 |
+
FedAvg
|
386 |
+
C1
|
387 |
+
C3
|
388 |
+
C5
|
389 |
+
C8
|
390 |
+
C20
|
391 |
+
R22
|
392 |
+
FedAvg
|
393 |
+
C1
|
394 |
+
C3
|
395 |
+
C8
|
396 |
+
C20
|
397 |
+
G
|
398 |
+
FedAvg
|
399 |
+
Step next
|
400 |
+
Step next
|
401 |
+
C5
|
402 |
+
C5
|
403 |
+
Step in
|
404 |
+
G
|
405 |
+
G
|
406 |
+
Resume
|
407 |
+
Resume
|
408 |
+
G
|
409 |
+
3
|
410 |
+
2
|
411 |
+
4
|
412 |
+
5
|
413 |
+
Breakpoint
|
414 |
+
1
|
415 |
+
C5
|
416 |
+
Debugging Interface
|
417 |
+
IBMFL Interface
|
418 |
+
Fig. 2: Using FEDDEBUG, a developer can set a breakpoint
|
419 |
+
at round R20. When the FL application finishes round R20,
|
420 |
+
FEDDEBUG launches a Debugging Interface, reflected on the
|
421 |
+
right. Step next () takes the developer to the next step (round
|
422 |
+
or client). Step-in increases the granularity of computation,
|
423 |
+
e.g., round to client level. Resume () will re-join the current
|
424 |
+
execution status of the FL application if no intrusive actions
|
425 |
+
are taken. At a given round, FEDDEBUG can automatically
|
426 |
+
localize the faulty client () and then resume () upon which
|
427 |
+
the global model will be recomputed without the faulty client.
|
428 |
+
This model will replace the corresponding round's model, and
|
429 |
+
FEDDEBUG will start retraining from that round, R22, in the
|
430 |
+
FL interface.
|
431 |
+
and stores concise telemetry data from a live FL application.
|
432 |
+
Whenever a debugging need arises, the developer can interact
|
433 |
+
with the FEDDEBUG’s debugging interface, which uses the
|
434 |
+
telemetry data to regenerate an FL application state.
|
435 |
+
A. Selective Telemetry
|
436 |
+
FEDDEBUG collects critical FL execution metrics to repro-
|
437 |
+
duce an FL application's state for the developer to interact with
|
438 |
+
it while investigating the root cause of a problem. Existing FL
|
439 |
+
frameworks are carefully architected to refrain from revealing
|
440 |
+
private data. As a result, most debugging data is private and
|
441 |
+
cannot be investigated.
|
442 |
+
FEDDEBUG’s debugging approach takes inspiration from
|
443 |
+
replay debugging. As with any other replay debugging, it
|
444 |
+
is essential that FEDDEBUG stores the necessary runtime
|
445 |
+
metrics to reproduce an FL application's state if requested
|
446 |
+
by the developer. We design a highly selective FL event
|
447 |
+
telemetry technique that records the concise execution data
|
448 |
+
available at the central aggregator that is vital for generating
|
449 |
+
any prior FL application state. FEDDEBUG is different from
|
450 |
+
traditional replay debugging as it only tracks the information
|
451 |
+
needed to recreate an observable event and does not log the
|
452 |
+
information unavailable to the developer in a live application.
|
453 |
+
This design reduces the size of continuously growing telemetry
|
454 |
+
data and minimizes the likelihood of information leakage.
|
455 |
+
FEDDEBUG mainly stores the information available after
|
456 |
+
step 3 of Figure 1 which is clients’ models, their reported
|
457 |
+
metrics such as response time, training loss, validation loss,
|
458 |
+
performance metric (e.g., F1 score), hyperparameters (e.g.,
|
459 |
+
learning rates, epochs, weight decay), and round ID. Note that
|
460 |
+
the FL application, including client-side training, will continue
|
461 |
+
uninterrupted in the background with FEDDEBUG’s telemetry
|
462 |
+
module continuously collecting execution traces.
|
463 |
+
B. Interactive Replay Debugging
|
464 |
+
To start the interactive debugging process, a developer can
|
465 |
+
invoke FEDDEBUG’s debugging constructs that let the devel-
|
466 |
+
oper leverage the telemetry data to investigate the root cause.
|
467 |
+
Breakpoint debugging is the de-facto method of debugging a
|
468 |
+
program. It pauses the program when the execution reaches
|
469 |
+
it. At that point, a developer can inspect the values assigned
|
470 |
+
to different variables, both local and global, and examine
|
471 |
+
the method stack. Such debugging features are not applicable
|
472 |
+
in FL. The traditional breakpoint will pause the distributed
|
473 |
+
training (i.e., none of the clients will be able to train its model),
|
474 |
+
resulting in unnecessary idling. Additionally, since the state
|
475 |
+
of a round is not saved, it is currently impossible for the
|
476 |
+
developer to inspect previous rounds. For instance, a developer
|
477 |
+
may want to debug a latent issue that was introduced by a
|
478 |
+
client five rounds ago but surfaced in the current round when
|
479 |
+
the same client participated in training again.
|
480 |
+
We make the following observation about FL frameworks.
|
481 |
+
An FL application only reveals aggregator's events to a de-
|
482 |
+
veloper. In contrast, events on the client's side are entirely
|
483 |
+
hidden from the developer except the ones relayed to the
|
484 |
+
aggregator by the client. Building on this observation and the
|
485 |
+
telemetry data captured by FEDDEBUG, our insight is that
|
486 |
+
instead of debugging a system in real-time, we can recreate
|
487 |
+
its observable behavior in a simulated environment, giving
|
488 |
+
an illusion of debugging an FL application in real-time. By
|
489 |
+
doing so, inspections with FEDDEBUG are side-effect free,
|
490 |
+
i.e., they will not interfere or interrupt the live FL application,
|
491 |
+
thus eliminating the need to pause client-side training or halt
|
492 |
+
aggregator execution.
|
493 |
+
Breakpoint. To this end, FEDDEBUG offers breakpoint that
|
494 |
+
can help a developer inspect intermediate states of an FL
|
495 |
+
application in real-time without stopping the training process.
|
496 |
+
FEDDEBUG’s breakpoint operates on computation units of
|
497 |
+
rounds and clients. A developer can set a breakpoint on either
|
498 |
+
a round (e.g., round R20) or on both a round and a client
|
499 |
+
(e.g., round R20, client C5) to inspect the state of FL training
|
500 |
+
using metrics such as training loss, clients’ participation, and
|
501 |
+
response time. When the live FL application arrives on a
|
502 |
+
breakpoint, FEDDEBUG spawns a new debugging interface
|
503 |
+
on the aggregator side, as shown in in Figure 2, while
|
504 |
+
continuing the live FL training in the background.
|
505 |
+
Step in/Step out. While at a breakpoint in a debugging
|
506 |
+
session, a developer can use its step-in and step-out actions to
|
507 |
+
switch between different granularities of computational units.
|
508 |
+
Traditionally, these two actions are used to go one-level deeper
|
509 |
+
in the stack (e.g., inside a function call) and move one level up
|
510 |
+
in the stack (e.g., outside the function call), respectively. Based
|
511 |
+
on this convention, we define a round as a coarse-grained unit
|
512 |
+
of computation that can be decomposed into a subset of clients
|
513 |
+
participating in that round. Suppose the current breakpoint is
|
514 |
+
at round R20. In that case, step-in will take the developer
|
515 |
+
to the client-level granularity ( in Figure 2) where trained
|
516 |
+
models from clients are being aggregated incrementally. Step-
|
517 |
+
out will take the developer back to round, where they can
|
518 |
+
|
519 |
+
inspect the global trained model at the granularity of round.
|
520 |
+
Inspecting a state at client-level granularity entails evaluating
|
521 |
+
the performance of a partially-aggregated global model. For
|
522 |
+
example, in Figure 2, step-in at will take the execution
|
523 |
+
between C1 and C3, where the global model has yet to
|
524 |
+
incorporate the local models of client C3 and onwards.
|
525 |
+
Step Next/Step Back. Similar to step-in/out, step next and
|
526 |
+
step back helps a developer transition from one state to
|
527 |
+
another. For instance, if the current breakpoint is at round
|
528 |
+
R20, step next will take the execution to round R21 in the
|
529 |
+
debugging interface, showing all the information correspond-
|
530 |
+
ing to that round only. Similarly, if the current breakpoint is at
|
531 |
+
client C5, step back will take the execution state to a partial
|
532 |
+
global model after aggregating models from clients C1 and
|
533 |
+
C3 only (Step back in Figure 2).
|
534 |
+
Resume. Unlike resume in gdb, FEDDEBUG’s resume does
|
535 |
+
not resume any paused execution. Instead, resume gives the
|
536 |
+
illusion to the developer that execution is being continued
|
537 |
+
from where it left off. FEDDEBUG creates this environment by
|
538 |
+
replaying the telemetry data that was captured while the FL
|
539 |
+
application was being inspected using breakpoints, in case the
|
540 |
+
developer does not find any faults in the round under inspec-
|
541 |
+
tion. Once the sequence of events in telemetry catches up with
|
542 |
+
the live execution of the FL application, FEDDEBUG switches
|
543 |
+
to the FL interface and shuts down the debugging interface.
|
544 |
+
This three-step process is nearly indistinguishable from an FL
|
545 |
+
application with FEDDEBUG disabled, giving the impression
|
546 |
+
of debugging a real-time FL application interactively. Resume
|
547 |
+
is also illustrated in Figure 2 - .
|
548 |
+
C. Fix and Replay
|
549 |
+
When the developer successfully identifies a faulty client
|
550 |
+
in any round, FEDDEBUG offers Fix and Replay to allow a
|
551 |
+
developer to roll back the training and provide a retrained
|
552 |
+
global model (the one without a faulty client). We describe
|
553 |
+
the technique to identify a faulty client in Section IV. A faulty
|
554 |
+
client may have a compound effect on the global model, as
|
555 |
+
it may have begun to share its noisy model updates latently
|
556 |
+
several rounds ago, which only later becomes noticeable. In
|
557 |
+
such cases, it is important to rectify the impact of a faulty
|
558 |
+
client's inclusion in prior training rounds by removing its
|
559 |
+
contributions. This requires retraining over multiple rounds,
|
560 |
+
which is not possible as clients may not store the data used in
|
561 |
+
training in the prior rounds. Figure 2- shows the removal of
|
562 |
+
a faulty client (C5) in round R21. FEDDEBUG recomputes the
|
563 |
+
global model in the debugging interface and then replaces the
|
564 |
+
actual global model in round R22 with the newly recomputed
|
565 |
+
global model, after the fix and replay action in Figure 2-. By
|
566 |
+
default, FEDDEBUG forbids the faulty client from participating
|
567 |
+
in the FL training. However, it is up to the developer to weigh
|
568 |
+
the benefits of including the faulty client in future rounds.
|
569 |
+
IV. FAULTY CLIENT LOCALIZATION
|
570 |
+
Faults in a client’s model can arise due to measurement
|
571 |
+
errors, human labeling errors, data poisoning, communication
|
572 |
+
problems, or subjective biases of labellers [10], [11], [29],
|
573 |
+
Algorithm 1: Inference-Guided Test Input Selection
|
574 |
+
Input: shape: dimension of the random input to be generated.
|
575 |
+
Input: κ: number of inputs to be generated.
|
576 |
+
Input: η: minimum number of clients for same prediction.
|
577 |
+
Output: X: a list containing auto-generated test inputs.
|
578 |
+
1 rand inputs = lazilyGenerateRandInputs(shape)
|
579 |
+
2 X = list()// a list for inference guided test inputs
|
580 |
+
3 seen clients sequences = list()
|
581 |
+
4 while length(X) < κ do
|
582 |
+
5
|
583 |
+
r input = pop(rand inputs)
|
584 |
+
6
|
585 |
+
clients preds = getP redictions(clients, r input)
|
586 |
+
7
|
587 |
+
for label ∈ class labels do
|
588 |
+
8
|
589 |
+
clients seq = sameP redClients(clients preds, label)
|
590 |
+
9
|
591 |
+
if clients seq ̸∈ seen clients sequences and
|
592 |
+
length(clients seq) ≥ η then
|
593 |
+
10
|
594 |
+
seen sequences.append(clients seq)
|
595 |
+
11
|
596 |
+
X.append(r input) // valid test input
|
597 |
+
12
|
598 |
+
break
|
599 |
+
13
|
600 |
+
if length(rand inputs) < 1 then
|
601 |
+
14
|
602 |
+
rand inputs = lazilyGenerateRandInputs(shape)
|
603 |
+
15 return X
|
604 |
+
[51]. To achieve optimal performance of the global model, it
|
605 |
+
is critical to correctly identify a faulty client and potentially
|
606 |
+
restrict its participation. Manually identifying faulty clients
|
607 |
+
is neither scalable nor effective due to a large number of
|
608 |
+
participating clients in FL and their uninterpretable models i.e.,
|
609 |
+
model parameters do not provide any meaningful debugging
|
610 |
+
information. To automate faulty client localization, we must
|
611 |
+
define a feedback mechanism to guide our search for faulty
|
612 |
+
clients efficiently. Automated debugging tools [27], [66] for
|
613 |
+
regular software address this problem by relying on multiple
|
614 |
+
test inputs and a test oracle. For example, unit tests can guide
|
615 |
+
the search toward concise input leading to incorrect program
|
616 |
+
output [66]. In FL, the two (i.e., inputs and oracle) translate
|
617 |
+
into diverse test data and the corresponding accurate labels;
|
618 |
+
both of which are unavailable in FL applications.
|
619 |
+
FEDDEBUG addresses the challenges of automated fault
|
620 |
+
localization with a two-pronged approach. First, it generates
|
621 |
+
a pool of random test inputs and applies a novel inference-
|
622 |
+
guided test input selection to construct a suite of test inputs, as
|
623 |
+
shown in Figure 3-A. Since the test inputs are autonomously
|
624 |
+
generated, and they are not accompanied with ground truth
|
625 |
+
labels, and hence metrics such as F1 score or accuracy cannot
|
626 |
+
be used as oracle feedback to find a faulty client. Instead,
|
627 |
+
FEDDEBUG performs differential testing of clients’ models to
|
628 |
+
measure similarities and differences among models’ behaviors
|
629 |
+
on selected inputs (Figure 3-B). FEDDEBUG fingerprints a
|
630 |
+
neural network behavior on an input by profiling the internal
|
631 |
+
neurons’ contributions towards a prediction of the model.
|
632 |
+
Subsequently, it accurately recognizes a client as faulty if
|
633 |
+
its behavior deviates from the norm i.e., the majority of the
|
634 |
+
clients’ behavior. Our insight is that a faulty client’s model
|
635 |
+
will show a noticeable difference in its internal neuron values
|
636 |
+
compared to benign clients’ models, based on the principle
|
637 |
+
that faulty executions are intrinsically different from correct
|
638 |
+
ones. The same principle is behind popular fault localization
|
639 |
+
techniques, such as Spectra-based Fault Localization [23] and
|
640 |
+
Delta Debugging [66].
|
641 |
+
|
642 |
+
Select
|
643 |
+
Clients’ Models
|
644 |
+
Test Input
|
645 |
+
Differential Execution of Clients’ Models
|
646 |
+
Client 1
|
647 |
+
Client 2
|
648 |
+
Client 3
|
649 |
+
Client 4
|
650 |
+
Faulty Client
|
651 |
+
Clients 1-4 are benign because
|
652 |
+
they have the highest
|
653 |
+
common activated neurons.
|
654 |
+
Activated Neuron
|
655 |
+
Inactivated Neuron
|
656 |
+
(A): Inference Guided Input Selection
|
657 |
+
(B): Fault Localization
|
658 |
+
. . .
|
659 |
+
Infer
|
660 |
+
Criteria 1: Minimum
|
661 |
+
(η=3) clients predict
|
662 |
+
same label
|
663 |
+
Criteria 2: Unique
|
664 |
+
(η=3) clients’
|
665 |
+
combination
|
666 |
+
Random Input Pool
|
667 |
+
If met
|
668 |
+
If not met
|
669 |
+
✓
|
670 |
+
x
|
671 |
+
Client 5
|
672 |
+
Fig. 3: An overview of FEDDEBUG’s fault localization ap-
|
673 |
+
proach. Firstly, it selects a random input that invokes diverse
|
674 |
+
model behavior (A). Secondly, it applies differential execution
|
675 |
+
on clients’ models to localize a faulty client (B).
|
676 |
+
Inference-Guided Test Input Selection. As shown in Fig-
|
677 |
+
ure 3-A, FEDDEBUG first lazily generates a pool of random
|
678 |
+
test inputs (e.g., 32x32 images constructed from random values
|
679 |
+
within the RGB scale) using Kaiming Initialization [17]. It
|
680 |
+
then automatically selects only those inputs that lead to a con-
|
681 |
+
sensus on predictions among a unique subset of clients. FED-
|
682 |
+
DEBUG selects up to κ test inputs (default is κ = 10) among
|
683 |
+
the pool of 1000 random inputs. The goal is to minimize any
|
684 |
+
overlapping behavior between clients while inferring unique
|
685 |
+
class labels on selected test inputs. This is similar to achieving
|
686 |
+
maximum code coverage in regular software with minimum
|
687 |
+
tests. Algorithm 1 selects a test input (line 5) if at least (η ≥ 5)
|
688 |
+
clients predict the same label and that subset of clients has not
|
689 |
+
been seen in the previously selected input (line 6-11). On the
|
690 |
+
next random input, if the previously observed subset of clients
|
691 |
+
(i.e., clients seq ∈ seen clients sequences) predict the
|
692 |
+
same class label, we discard this input. If a unique combination
|
693 |
+
of clients predicts an unseen label, we include the input in the
|
694 |
+
test suite. This process is repeated until we collect a user-
|
695 |
+
defined, κ, number of test inputs.
|
696 |
+
Differential Execution of Clients Models. In the absence
|
697 |
+
of correct labels of generated test inputs, FEDDEBUG adapts
|
698 |
+
differential testing to find behavioral differences and sim-
|
699 |
+
ilarities among clients’ models, as shown in Figure 3-B.
|
700 |
+
FEDDEBUG profiles the contributions of individual neurons
|
701 |
+
during model inference on an input and uses it to identify
|
702 |
+
models with common behavior. Note that clients’ models
|
703 |
+
in FL are comparable due to having a similar architecture.
|
704 |
+
Algorithm 2 describes the faulty client localization process.
|
705 |
+
For a selected test input, FEDDEBUG exhaustively iterates all
|
706 |
+
possible combinations of potentially non-faulty clients (i.e.,
|
707 |
+
�n
|
708 |
+
1
|
709 |
+
�
|
710 |
+
combinations). For each combination, it performs model
|
711 |
+
inference on the test input and captures its neuron profiles. It
|
712 |
+
aims to find one combination of clients that has the highest
|
713 |
+
overlap in behavior, representing the true n − 1 benign clients
|
714 |
+
and consequently isolating the precise faulty client. This is a
|
715 |
+
Algorithm 2: Faulty Client Localization using Differ-
|
716 |
+
ential Testing
|
717 |
+
Input: clients: a list of clients participated in the given FL round.
|
718 |
+
Input: x: a random input belongs to X.
|
719 |
+
Input: na t: a threshold to profile neuron activations.
|
720 |
+
Output: faulty client: the faulty client who has abnormal behaviour.
|
721 |
+
1 all clients combinations = nChooseK(clients, 1)
|
722 |
+
2 benign clients = set()
|
723 |
+
3 max common activations = −1
|
724 |
+
4 for t clients ∈ all clients combinations do
|
725 |
+
5
|
726 |
+
neuron ids = ActivatedNeurons(t clients, x, na t)
|
727 |
+
6
|
728 |
+
t clients common neurons = intersection(neuron ids)
|
729 |
+
7
|
730 |
+
temp n = length(t clients common neurons)
|
731 |
+
8
|
732 |
+
if temp n > max common activations then
|
733 |
+
9
|
734 |
+
max common activations = temp n
|
735 |
+
10
|
736 |
+
benign clients = t clients
|
737 |
+
11 faulty client = clients − benign clients
|
738 |
+
12 return faulty client
|
739 |
+
lightweight process due to the negligible model inference time
|
740 |
+
and the iterations’ linear time (O(n)) complexity.
|
741 |
+
Our insight is that among all possible combinations of
|
742 |
+
clients, only one represents true benign clients’ subset. The
|
743 |
+
remaining combinations contain the faulty client with abnor-
|
744 |
+
mal neuron activations, reducing the model behavior overlap
|
745 |
+
within that set. In summary, at a given ill-performing round in
|
746 |
+
FL, FEDDEBUG takes in all participating clients’ models as the
|
747 |
+
only input. It automatically generates test inputs and employs
|
748 |
+
differential testing on clients’ models to monitor abnormal
|
749 |
+
behavior to precisely identify a faulty client.
|
750 |
+
V. EVALUATION
|
751 |
+
We evaluate FEDDEBUG on (1) runtime performance over-
|
752 |
+
head, (2) debugging time, (3) fault localizability and (4)
|
753 |
+
scalability. Our evaluation targets to answer the following
|
754 |
+
research questions:
|
755 |
+
• RQ1. What impact does FEDDEBUG have on the baseline
|
756 |
+
FL framework’s performance?
|
757 |
+
• RQ2. How accurate is FEDDEBUG in identifying a faulty
|
758 |
+
client?
|
759 |
+
• RQ3. Can FEDDEBUG identify multiple faulty clients?
|
760 |
+
• RQ4. Can FEDDEBUG scale to large number of clients
|
761 |
+
and find a faulty client efficiently?
|
762 |
+
Datasets, Model, & FL Framework. We evaluate FEDDE-
|
763 |
+
BUG on CIFAR-10 and FEMNIST. Both are considered as gold
|
764 |
+
standard to evaluate both FL frameworks [5], [9], [35], [49],
|
765 |
+
[58] and deep learning testing techniques [13], [46], [57], [61],
|
766 |
+
[62]. FEMNIST is a modified version of MNIST presented in
|
767 |
+
the FL LEAF Benchmark [6] and the Non-IID Bench [34]. The
|
768 |
+
FEMNIST dataset contains over 340K training and over 40K
|
769 |
+
testing grayscale, 28x28 images spanning ten different classes.
|
770 |
+
CIFAR-10 contains 50K training 32x32 RGB images that
|
771 |
+
span ten different classes and 10K instances for testing. We
|
772 |
+
adopt popular CNN models i.e., ResNet, VGG, and DenseNet
|
773 |
+
architectures [16], [19], [50]. We set the learning rate between
|
774 |
+
0.0001 and 0.001, the number of epochs between 10 and 25,
|
775 |
+
the batch size from 512 to 2048, and the weight to 0.0001.
|
776 |
+
We realize FEDDEBUG’s design in the IBMFL library [38] due
|
777 |
+
to its ease-of-use, open documentation, and publicly available
|
778 |
+
|
779 |
+
codebase. These techniques should be equally applicable to
|
780 |
+
other FL frameworks.
|
781 |
+
Evaluation Environment Specifications. We run our exper-
|
782 |
+
iments on an AMD 16-core processor, with 128 GB RAM and
|
783 |
+
an NVIDIA Tesla T4 GPU. To measure the performance of
|
784 |
+
FEDDEBUG in terms of runtime and debugging overhead, we
|
785 |
+
simulate IBMFL framework deployment on a MacBook Pro
|
786 |
+
with Quad-core Intel Core i5 processor and 16 GB RAM.
|
787 |
+
Federated Learning Experimental Settings. Prior FL lit-
|
788 |
+
erature [6], [34] establishes two data distribution strategies
|
789 |
+
among FL clients: IID (independent and identically distributed
|
790 |
+
data), and Non-IID (non-independent and identically dis-
|
791 |
+
tributed data)
|
792 |
+
[34]. For Non-IID, we use the quantity base
|
793 |
+
imbalance [34] where clients have an unequal quantity of data,
|
794 |
+
and the class distribution is random. In IID, the clients receive
|
795 |
+
the same quantity of data. None of the clients share the same
|
796 |
+
data points in both settings. We simulate FL with varying
|
797 |
+
quantities of clients, ranging from 10 to 400 clients.
|
798 |
+
Fault Injection. Since there is no existing FL benchmark
|
799 |
+
with faulty clients, FEDDEBUG adopts a standard noisy labels
|
800 |
+
approach from prior machine learning literature to inject a
|
801 |
+
faulty client into experiments [10], [18], [21], [32], [64].
|
802 |
+
Similar to prior work [11], [30], [41], we arbitrarily add noise
|
803 |
+
by changing training data labels (e.g., changing label “bird”
|
804 |
+
to “cat”). When such a client’s model is merged with the
|
805 |
+
global model, the global model’s performance (e.g., accuracy)
|
806 |
+
deteriorates. We define different strengths of noise with a noise
|
807 |
+
rate that controls the amount of labels modified in a faulty
|
808 |
+
client. Noise rate is defined as a ratio between changed labels
|
809 |
+
and original labels (change labels/original labels).
|
810 |
+
Figure 4 shows the impact of different noise rates on the
|
811 |
+
global model’s accuracy, with one faulty client and nine benign
|
812 |
+
clients. Low noise rates, ranging from 0.2 to 0.7, barely affect
|
813 |
+
the global model performance. With a 0.7 noise rate, the
|
814 |
+
accuracy is lowered by 4.8% and 5.5% in CIFAR-10 and
|
815 |
+
FEMNIST, respectively. A noise rate of 0.9 incurs a 16.2% and
|
816 |
+
9.9% reduction in the global model accuracy in both settings.
|
817 |
+
Thus, to have a measurable impact on the global model’s
|
818 |
+
performance, we select a noise rate of one for a faulty client.
|
819 |
+
0.0 0.2 0.4 0.6 0.8
|
820 |
+
0
|
821 |
+
20
|
822 |
+
40
|
823 |
+
60
|
824 |
+
80
|
825 |
+
100
|
826 |
+
Noise Rate
|
827 |
+
Global Model
|
828 |
+
Accuracy (%)
|
829 |
+
(a) CIFAR-10
|
830 |
+
0.0 0.2 0.4 0.6 0.8
|
831 |
+
Noise Rate
|
832 |
+
(b) FEMNIST
|
833 |
+
Fig. 4: Global model (ResNet-34) prediction accuracy in the
|
834 |
+
presence of a faulty client with different noise rates. Lower
|
835 |
+
noise rates hardly degrade global model performance.
|
836 |
+
Neuron Activation Threshold. We adopt the method from
|
837 |
+
Harel-Canada et al. [14] to profile neuron activations. We
|
838 |
+
empirically find 0.003 to be the optimal value for the default
|
839 |
+
activation threshold. A neuron is considered active when its
|
840 |
+
value crosses this threshold.
|
841 |
+
5
|
842 |
+
10
|
843 |
+
20
|
844 |
+
30
|
845 |
+
40
|
846 |
+
50
|
847 |
+
60
|
848 |
+
70
|
849 |
+
80
|
850 |
+
90
|
851 |
+
100
|
852 |
+
0
|
853 |
+
10
|
854 |
+
20
|
855 |
+
30
|
856 |
+
40
|
857 |
+
0.3
|
858 |
+
0.6
|
859 |
+
1.9
|
860 |
+
2.5
|
861 |
+
3.4
|
862 |
+
4.7
|
863 |
+
4.8
|
864 |
+
13.4
|
865 |
+
18
|
866 |
+
21
|
867 |
+
23.8
|
868 |
+
0.6
|
869 |
+
1.2
|
870 |
+
2.2
|
871 |
+
3.9
|
872 |
+
5.8
|
873 |
+
6.6
|
874 |
+
8.7
|
875 |
+
15.5
|
876 |
+
19.7
|
877 |
+
27.5
|
878 |
+
28.3
|
879 |
+
Number of Clients in an FL Setting
|
880 |
+
Aggregation Time (s)
|
881 |
+
Vanilla-IBMFL
|
882 |
+
FEDDEBUG-IBMFL
|
883 |
+
Fig. 5: FEDDEBUG’s runtime overhead as a comparison be-
|
884 |
+
tween vanilla FL framework’s aggregation time with FEDDE-
|
885 |
+
BUG enabled FL aggregation.
|
886 |
+
Faulty Client Localization Accuracy. We calculate faulty
|
887 |
+
client localization accuracy as the ratio between (a) the number
|
888 |
+
of test inputs on which faulty clients are correctly identified
|
889 |
+
and (b) the total number of test inputs. For instance, if
|
890 |
+
FEDDEBUG identifies the correct set of faulty clients on four
|
891 |
+
out of ten test inputs generated by Alogrithm 1, we report 40%
|
892 |
+
fault localization accuracy.
|
893 |
+
A. FEDDEBUG’s Performance
|
894 |
+
Capturing telemetry data in realtime may slow down the
|
895 |
+
performance of the FL application’s aggregator. In this sub-
|
896 |
+
section, we present our evaluation results of FEDDEBUG’s
|
897 |
+
runtime overhead as well as the fault localization time. These
|
898 |
+
experiment settings employ ResNet-18 with CIFAR-10.
|
899 |
+
Runtime Overhead (RQ1). To evaluate the impact on the
|
900 |
+
FL application’s performance, we measure the slowdown in
|
901 |
+
the running time that FEDDEBUG incurs. We compare the
|
902 |
+
cumulative processing time of the vanilla IBMFL’s aggregator
|
903 |
+
(baseline) against that of the FEDDEBUG-enabled aggregator
|
904 |
+
on a variety of client combinations i.e., from 5 clients to
|
905 |
+
100 clients, simulating a real-world FL deployment. The
|
906 |
+
aggregation time varies with the model’s architecture and the
|
907 |
+
number of clients participating in a round, but it is completely
|
908 |
+
independent of the models’ quality. Therefore, we create up
|
909 |
+
to 100 pre-trained ResNet-18 models and perform the FL
|
910 |
+
aggregation.
|
911 |
+
Figure 5 compares the baseline’s aggregation time with the
|
912 |
+
FEDDEBUG enabled aggregation time. The X-axis represents
|
913 |
+
the number of clients ranging from 5 to 100 clients, and
|
914 |
+
the Y-axis represents the average time across two FL rounds.
|
915 |
+
For instance, with 30 clients, FEDDEBUG takes 3.9 seconds
|
916 |
+
compared to the 2.5 seconds for the baseline to aggregate
|
917 |
+
30 trained models into a global model. Overall, FEDDEBUG
|
918 |
+
takes approximately 48% additional aggregation time across
|
919 |
+
all experiments. However, in an end-to-end round, the training
|
920 |
+
phase on the clients’ end occupies the majority (up to 97.8% in
|
921 |
+
our experiments) of the round’s time. Compared to the training
|
922 |
+
time of a round, the aggregation time is almost negligible, as
|
923 |
+
low as 1.2% in our experiments.
|
924 |
+
|
925 |
+
10
|
926 |
+
30
|
927 |
+
50
|
928 |
+
100
|
929 |
+
102
|
930 |
+
2.4
|
931 |
+
0.2
|
932 |
+
0.5
|
933 |
+
0.1
|
934 |
+
0.5
|
935 |
+
0.8
|
936 |
+
48
|
937 |
+
132.2
|
938 |
+
279.5
|
939 |
+
Number of Clients in an FL Setting
|
940 |
+
Time (s), Log Scale
|
941 |
+
Input Time
|
942 |
+
Localization Time
|
943 |
+
Training Time
|
944 |
+
Fig. 6: FEDDEBUG’s debugging time contains input generation
|
945 |
+
time and faulty client detection time and is compared against
|
946 |
+
a round’s training time.
|
947 |
+
Summary: Considering the training and aggregation time
|
948 |
+
of each FL round, FEDDEBUG’s runtime overhead is a very
|
949 |
+
small fraction, 1.2%, of the training time. Hence, capturing
|
950 |
+
telemetry data for replay debugging does not impede the FL
|
951 |
+
application’s runtime performance.
|
952 |
+
Debugging Time (RQ1). To assess the localizability of FED-
|
953 |
+
DEBUG, we design experiments to measure FEDDEBUG’s
|
954 |
+
debugging time, the time it takes to localize a faulty client.
|
955 |
+
We then compare this time with the training time of that
|
956 |
+
round. Since there is no comparable approach to localize a
|
957 |
+
faulty client, we use training time as a baseline to provide a
|
958 |
+
meaningful scale for the cost of debugging.
|
959 |
+
Figure 6 shows the results of these experiments. The X-
|
960 |
+
axis represents the number of clients, and the Y-axis shows
|
961 |
+
the debugging time in seconds on a logarithmic scale. For 30
|
962 |
+
clients, FEDDEBUG’s input generation and selection takes 0.2
|
963 |
+
seconds to find high-quality test input, and its fault localization
|
964 |
+
takes approximately 0.5 seconds to localize a faulty client. In
|
965 |
+
a ten clients setting, input selection takes more time due to
|
966 |
+
the stricter constraint of (i.e., η = 4) for criteria 1 in Figure 3,
|
967 |
+
i.e., at least four previously unseen clients should predict the
|
968 |
+
same label on newly selected test input.
|
969 |
+
Overall, our results show an increasing debugging time
|
970 |
+
when the number of clients increases, which is expected as
|
971 |
+
increasing the number of clients increases the search space.
|
972 |
+
Note that the debugging time is still in the order of seconds,
|
973 |
+
even for 50 clients. This is because 1) for n clients, the search
|
974 |
+
space has at most n possible combinations of potentially
|
975 |
+
benign n-1 clients, representing linear complexity, and 2) on a
|
976 |
+
given input, FEDDEBUG only profiles neuron activations once
|
977 |
+
while iterating over the n combinations.
|
978 |
+
Summary: On average, FEDDEBUG can efficiently identify
|
979 |
+
a faulty client in 2.1% of the total training time of a round.
|
980 |
+
B. Localization of Faulty Client
|
981 |
+
To answer RQ2, we measure how accurate FEDDEBUG is
|
982 |
+
in localizing a faulty client. We automatically inject a faulty
|
983 |
+
client that is representative of a real-world scenario and can
|
984 |
+
cause a measurable change in the global model’s performance.
|
985 |
+
By varying the number of clients, datasets, models, and data
|
986 |
+
Clients
|
987 |
+
Dataset
|
988 |
+
Architecture
|
989 |
+
Accuracy
|
990 |
+
% (IID)
|
991 |
+
Accuracy
|
992 |
+
% (Non-
|
993 |
+
IID)
|
994 |
+
Avg.
|
995 |
+
Input
|
996 |
+
Time (s)
|
997 |
+
Avg. Lo-
|
998 |
+
calization
|
999 |
+
Time (s)
|
1000 |
+
10
|
1001 |
+
CIFAR10
|
1002 |
+
DenseNet-121
|
1003 |
+
100
|
1004 |
+
100
|
1005 |
+
2.41
|
1006 |
+
0.44
|
1007 |
+
10
|
1008 |
+
CIFAR10
|
1009 |
+
ResNet-50
|
1010 |
+
100
|
1011 |
+
100
|
1012 |
+
2.40
|
1013 |
+
0.22
|
1014 |
+
10
|
1015 |
+
CIFAR10
|
1016 |
+
VGG-16
|
1017 |
+
100
|
1018 |
+
100
|
1019 |
+
2.40
|
1020 |
+
0.21
|
1021 |
+
30
|
1022 |
+
CIFAR10
|
1023 |
+
DenseNet-121
|
1024 |
+
100
|
1025 |
+
100
|
1026 |
+
2.42
|
1027 |
+
1.29
|
1028 |
+
30
|
1029 |
+
CIFAR10
|
1030 |
+
ResNet-50
|
1031 |
+
100
|
1032 |
+
100
|
1033 |
+
1.18
|
1034 |
+
0.70
|
1035 |
+
30
|
1036 |
+
CIFAR10
|
1037 |
+
VGG-16
|
1038 |
+
100
|
1039 |
+
100
|
1040 |
+
2.41
|
1041 |
+
0.47
|
1042 |
+
50
|
1043 |
+
CIFAR10
|
1044 |
+
DenseNet-121
|
1045 |
+
100
|
1046 |
+
100
|
1047 |
+
2.42
|
1048 |
+
3.26
|
1049 |
+
50
|
1050 |
+
CIFAR10
|
1051 |
+
ResNet-50
|
1052 |
+
100
|
1053 |
+
100
|
1054 |
+
1.37
|
1055 |
+
1.24
|
1056 |
+
50
|
1057 |
+
CIFAR10
|
1058 |
+
VGG-16
|
1059 |
+
100
|
1060 |
+
100
|
1061 |
+
2.43
|
1062 |
+
0.91
|
1063 |
+
10
|
1064 |
+
FEMNIST
|
1065 |
+
DenseNet-121
|
1066 |
+
100
|
1067 |
+
100
|
1068 |
+
2.40
|
1069 |
+
0.47
|
1070 |
+
10
|
1071 |
+
FEMNIST
|
1072 |
+
ResNet-50
|
1073 |
+
100
|
1074 |
+
100
|
1075 |
+
2.40
|
1076 |
+
0.25
|
1077 |
+
10
|
1078 |
+
FEMNIST
|
1079 |
+
VGG-16
|
1080 |
+
100
|
1081 |
+
100
|
1082 |
+
2.40
|
1083 |
+
0.18
|
1084 |
+
30
|
1085 |
+
FEMNIST
|
1086 |
+
DenseNet-121
|
1087 |
+
100
|
1088 |
+
100
|
1089 |
+
2.41
|
1090 |
+
1.37
|
1091 |
+
30
|
1092 |
+
FEMNIST
|
1093 |
+
ResNet-50
|
1094 |
+
100
|
1095 |
+
100
|
1096 |
+
0.91
|
1097 |
+
0.68
|
1098 |
+
30
|
1099 |
+
FEMNIST
|
1100 |
+
VGG-16
|
1101 |
+
100
|
1102 |
+
100
|
1103 |
+
2.41
|
1104 |
+
0.55
|
1105 |
+
50
|
1106 |
+
FEMNIST
|
1107 |
+
DenseNet-121
|
1108 |
+
100
|
1109 |
+
100
|
1110 |
+
2.24
|
1111 |
+
2.44
|
1112 |
+
50
|
1113 |
+
FEMNIST
|
1114 |
+
ResNet-50
|
1115 |
+
100
|
1116 |
+
100
|
1117 |
+
1.42
|
1118 |
+
1.24
|
1119 |
+
50
|
1120 |
+
FEMNIST
|
1121 |
+
VGG-16
|
1122 |
+
100
|
1123 |
+
100
|
1124 |
+
2.40
|
1125 |
+
1.25
|
1126 |
+
TABLE I: FEDDEBUG’s debugging time and accuracy when
|
1127 |
+
localizing a faulty client in 36 different FL settings with 100
|
1128 |
+
test inputs.
|
1129 |
+
0.2
|
1130 |
+
0.4
|
1131 |
+
0.6
|
1132 |
+
0.8
|
1133 |
+
0
|
1134 |
+
20
|
1135 |
+
40
|
1136 |
+
60
|
1137 |
+
80
|
1138 |
+
100
|
1139 |
+
Noise Rate
|
1140 |
+
Fault Localization
|
1141 |
+
Accuracy (%)
|
1142 |
+
(a) ResNet-34
|
1143 |
+
0.2
|
1144 |
+
0.4
|
1145 |
+
0.6
|
1146 |
+
0.8
|
1147 |
+
0
|
1148 |
+
20
|
1149 |
+
40
|
1150 |
+
60
|
1151 |
+
80
|
1152 |
+
100
|
1153 |
+
Noise Rate
|
1154 |
+
(b) DenseNet-121
|
1155 |
+
Fig. 7: FEDDEBUG localization performance when a faulty
|
1156 |
+
client has varying fault strength (i.e., low noise rate).
|
1157 |
+
distributions (IID and Non-IID), we create 36 different FL
|
1158 |
+
configurations for FEDDEBUG’s evaluation.
|
1159 |
+
Column 4 and 5 of Table I show the accuracy of FEDDEBUG
|
1160 |
+
in the IID and Non-IID settings, respectively. We repeat each
|
1161 |
+
experiment on 100 generated test inputs and take the average
|
1162 |
+
of each metric to generalize the results. FEDDEBUG correctly
|
1163 |
+
identifies a faulty client with 100% accuracy in both IID and
|
1164 |
+
Non-IID settings.
|
1165 |
+
Varying Noise Rate. Figure 4 shows the impact of different
|
1166 |
+
noise rates on the global model prediction accuracy. We
|
1167 |
+
observe that a faulty client has measurable impact on the
|
1168 |
+
global model with a noise rate of > 0.8. The global model’s
|
1169 |
+
accuracy merely drops from 73.8% to 71.1% when the faulty
|
1170 |
+
client has 0.6 noise rate and drops to 57% when the noise
|
1171 |
+
is close to one. FEDDEBUG accurately localizes a faulty
|
1172 |
+
client with low noise rates, showing its robustness. Figure 7
|
1173 |
+
shows the evaluations on varying noise rates in 10 clients FL
|
1174 |
+
settings with ResNet and DenseNet architectures. The X-axis
|
1175 |
+
shows the faulty client’s noise rate, and the Y-axis represents
|
1176 |
+
the average fault localization accuracy on the CIFAR-10 and
|
1177 |
+
FEMNIST datasets. The results, as seen in Figure 7, indicate
|
1178 |
+
that FEDDEBUG has the capability to identify low noise faults–
|
1179 |
+
it successfully localizes a faulty client with 0.4 noise rate
|
1180 |
+
with approximately 58% and 87.5% accuracy in DenseNet and
|
1181 |
+
ResNet settings, respectively.
|
1182 |
+
|
1183 |
+
Summary: FEDDEBUG achieves 100% fault localization
|
1184 |
+
accuracy on average on a total of 3600 test inputs, when
|
1185 |
+
the faulty client significantly deters the global model per-
|
1186 |
+
formance in both IID and Non-IID settings.
|
1187 |
+
Detecting Multiple Faulty Clients (RQ3). We evaluate FED-
|
1188 |
+
DEBUG’s ability to identify multiple faulty clients in an FL
|
1189 |
+
application. To this end, we inject up to seven faulty clients
|
1190 |
+
in the following experiment settings. We train ResNet-50 and
|
1191 |
+
DenseNet-121 on the CIFAR-10 and FEMNIST datasets in
|
1192 |
+
30 and 50 clients FL settings. Each setting is evaluated on
|
1193 |
+
10 test inputs. By default, FEDDEBUG’s fault localization
|
1194 |
+
technique finds a single faulty client. We apply FEDDEBUG in
|
1195 |
+
an iterative manner to find multiple faulty clients by removing
|
1196 |
+
one faulty client on each iteration, similar to traditional bug
|
1197 |
+
repair process, where one bug is fixed first before the next one
|
1198 |
+
is investigated.
|
1199 |
+
Table II presents the results of finding multiple faulty clients
|
1200 |
+
in 32 FL configurations. For instance, when 7 out of 30
|
1201 |
+
clients are faulty and the model is ResNet-50, FEDDEBUG
|
1202 |
+
finds all seven faulty clients with 100% accuracy on CIFAR-
|
1203 |
+
10 and 97.1% accuracy on FEMNIST. Compared to ResNet,
|
1204 |
+
FEDDEBUG performs relatively better with DenseNet. This
|
1205 |
+
behavior is expected because, compared to ResNet, DenseNet
|
1206 |
+
learns better features due to dense concatenation among its
|
1207 |
+
layers, resulting in better performance [69]. Thus, FEDDEBUG
|
1208 |
+
performs well in localizing multiple faults with DenseNet with
|
1209 |
+
an average accuracy of 99.7% on both datasets compared to
|
1210 |
+
ResNet’s 80.8%.
|
1211 |
+
Table II also reveals that, generally, FEDDEBUG’s local-
|
1212 |
+
ization performance is positively correlated to the number of
|
1213 |
+
training data points per client. Large, high-quality training
|
1214 |
+
data promotes better feature learning among neurons and thus,
|
1215 |
+
yields better performance. Since the number of data points
|
1216 |
+
in FEMNIST (340K) is large compared to CIFAR-10 (40K),
|
1217 |
+
clients in FEMNIST have significantly larger training data
|
1218 |
+
than clients in CIFAR-10. As a result, FEDDEBUG average
|
1219 |
+
localization accuracy is 78.5% in ResNet-CIFAR experiment,
|
1220 |
+
while it has 83.1% localization accuracy in the ResNet-
|
1221 |
+
FEMNIST experiment. FEDDEBUG finds multiple faults with
|
1222 |
+
linear time complexity, as shown in Figure 8 with 50 clients.
|
1223 |
+
The input generation time is almost constant, as the number
|
1224 |
+
of clients is fixed. However, the localization time increases as
|
1225 |
+
we increase the number of faults from 2 to 7. For instance,
|
1226 |
+
it localizes two faulty clients in 3.6 seconds and five faulty
|
1227 |
+
clients in 4 seconds.
|
1228 |
+
Scalability (RQ4): Our findings also show that FEDDEBUG is
|
1229 |
+
scalable to larger datasets and an increasing number of clients
|
1230 |
+
in FL. Figure 9 summarizes the impact on FEDDEBUG’s
|
1231 |
+
ability to identify a faulty client when the number of clients
|
1232 |
+
changes from 25 to 400 and the training data size per client
|
1233 |
+
changes. We perform this experiment with two faulty clients
|
1234 |
+
in the FEMNIST-DenseNet configuration. Figure 9-(a) verifies
|
1235 |
+
that FEDDEBUG’s fault localization accuracy only reduces
|
1236 |
+
to 75% even when the number of clients increases to 400.
|
1237 |
+
FEDDEBUG’s debugging time increases linearly as the number
|
1238 |
+
TABLE II: FEDDEBUG’s fault localization in 32 FL configu-
|
1239 |
+
rations with multiple faulty clients, ranging from two to seven.
|
1240 |
+
Faulty
|
1241 |
+
Clients
|
1242 |
+
Total
|
1243 |
+
Clients
|
1244 |
+
Architecture
|
1245 |
+
Accuracy %
|
1246 |
+
(CIFAR-10)
|
1247 |
+
Accuracy %
|
1248 |
+
(FEMNIST)
|
1249 |
+
2
|
1250 |
+
30
|
1251 |
+
ResNet-50
|
1252 |
+
100
|
1253 |
+
100
|
1254 |
+
3
|
1255 |
+
30
|
1256 |
+
ResNet-50
|
1257 |
+
100
|
1258 |
+
100
|
1259 |
+
5
|
1260 |
+
30
|
1261 |
+
ResNet-50
|
1262 |
+
100
|
1263 |
+
98
|
1264 |
+
7
|
1265 |
+
30
|
1266 |
+
ResNet-50
|
1267 |
+
100
|
1268 |
+
97.1
|
1269 |
+
2
|
1270 |
+
30
|
1271 |
+
DenseNet-121
|
1272 |
+
100
|
1273 |
+
100
|
1274 |
+
3
|
1275 |
+
30
|
1276 |
+
DenseNet-121
|
1277 |
+
100
|
1278 |
+
100
|
1279 |
+
5
|
1280 |
+
30
|
1281 |
+
DenseNet-121
|
1282 |
+
100
|
1283 |
+
100
|
1284 |
+
7
|
1285 |
+
30
|
1286 |
+
DenseNet-121
|
1287 |
+
100
|
1288 |
+
100
|
1289 |
+
2
|
1290 |
+
50
|
1291 |
+
ResNet-50
|
1292 |
+
50
|
1293 |
+
80
|
1294 |
+
3
|
1295 |
+
50
|
1296 |
+
ResNet-50
|
1297 |
+
66.7
|
1298 |
+
66.7
|
1299 |
+
5
|
1300 |
+
50
|
1301 |
+
ResNet-50
|
1302 |
+
54
|
1303 |
+
60
|
1304 |
+
7
|
1305 |
+
50
|
1306 |
+
ResNet-50
|
1307 |
+
57.1
|
1308 |
+
62.9
|
1309 |
+
2
|
1310 |
+
50
|
1311 |
+
DenseNet-121
|
1312 |
+
100
|
1313 |
+
100
|
1314 |
+
3
|
1315 |
+
50
|
1316 |
+
DenseNet-121
|
1317 |
+
100
|
1318 |
+
100
|
1319 |
+
5
|
1320 |
+
50
|
1321 |
+
DenseNet-121
|
1322 |
+
100
|
1323 |
+
100
|
1324 |
+
7
|
1325 |
+
50
|
1326 |
+
DenseNet-121
|
1327 |
+
100
|
1328 |
+
95.7
|
1329 |
+
2
|
1330 |
+
3
|
1331 |
+
4
|
1332 |
+
5
|
1333 |
+
6
|
1334 |
+
7
|
1335 |
+
0
|
1336 |
+
2
|
1337 |
+
4
|
1338 |
+
6
|
1339 |
+
# of Faulty Clients
|
1340 |
+
Time (s)
|
1341 |
+
(a) DenseNet-121 and CIFAR-10
|
1342 |
+
Input Generation Time
|
1343 |
+
Fault Localization Time
|
1344 |
+
2
|
1345 |
+
3
|
1346 |
+
4
|
1347 |
+
5
|
1348 |
+
6
|
1349 |
+
7
|
1350 |
+
0
|
1351 |
+
2
|
1352 |
+
4
|
1353 |
+
6
|
1354 |
+
# of Faulty Clients
|
1355 |
+
Time (s)
|
1356 |
+
(b) ResNet-50 and CIFAR-10
|
1357 |
+
Input Generation Time
|
1358 |
+
Fault Localization Time
|
1359 |
+
Fig. 8: FEDDEBUG finds multiple faulty clients in a linear
|
1360 |
+
time. Total clients are 50 in each graph.
|
1361 |
+
of clients increases, consistent with the scale-up properties
|
1362 |
+
of general distributed systems, as shown in Figure 9-(b).
|
1363 |
+
When the number of clients increases, less data is used to
|
1364 |
+
train a client’s model, which may reduce the accuracy of
|
1365 |
+
clients’ models. Figure 9-(c) also shows that FEDDEBUG’s
|
1366 |
+
fault localizability also increases when the number of data
|
1367 |
+
points per client increases, and it is also robust against low
|
1368 |
+
performing client models. For instance, when the number of
|
1369 |
+
data points increases from 850 to 1700, FEDDEBUG’s local-
|
1370 |
+
ization accuracy also changes from 75% to 85%, respectively.
|
1371 |
+
100 200 300 400
|
1372 |
+
0
|
1373 |
+
20
|
1374 |
+
40
|
1375 |
+
60
|
1376 |
+
80
|
1377 |
+
100
|
1378 |
+
Clients
|
1379 |
+
Localization Accuracy
|
1380 |
+
(a)
|
1381 |
+
100 200 300 400
|
1382 |
+
101
|
1383 |
+
102
|
1384 |
+
103
|
1385 |
+
104
|
1386 |
+
Clients
|
1387 |
+
Time (s), Log Scale
|
1388 |
+
(b)
|
1389 |
+
Input Generation Time
|
1390 |
+
Fault Localization Time
|
1391 |
+
0
|
1392 |
+
0.5
|
1393 |
+
1
|
1394 |
+
·104
|
1395 |
+
0
|
1396 |
+
20
|
1397 |
+
40
|
1398 |
+
60
|
1399 |
+
80
|
1400 |
+
100
|
1401 |
+
Data/Client
|
1402 |
+
Localization Accuracy
|
1403 |
+
(c)
|
1404 |
+
Fig. 9: FEDDEBUG retains scalability on a large number of
|
1405 |
+
clients.
|
1406 |
+
Summary: Our experiment results provide concrete evi-
|
1407 |
+
dence that FEDDEBUG preserves scalability properties both
|
1408 |
+
in terms of time overhead and in the presence of multiple
|
1409 |
+
faults. It successfully identifies multiple faulty clients in
|
1410 |
+
32 different FL configurations with an average accuracy of
|
1411 |
+
90.3%.
|
1412 |
+
|
1413 |
+
0
|
1414 |
+
0.2 0.4 0.6 0.8
|
1415 |
+
60
|
1416 |
+
70
|
1417 |
+
80
|
1418 |
+
90
|
1419 |
+
100
|
1420 |
+
Localization Accuracy (%)
|
1421 |
+
(a) ResNet-50 and CIFAR-10
|
1422 |
+
0
|
1423 |
+
0.2 0.4 0.6 0.8
|
1424 |
+
20
|
1425 |
+
40
|
1426 |
+
60
|
1427 |
+
80
|
1428 |
+
100
|
1429 |
+
(b) ResNet-50 and FEMNIST
|
1430 |
+
0
|
1431 |
+
0.2 0.4 0.6 0.8
|
1432 |
+
20
|
1433 |
+
40
|
1434 |
+
60
|
1435 |
+
80
|
1436 |
+
100
|
1437 |
+
Neuron Activation Threshold
|
1438 |
+
Localization Accuracy (%)
|
1439 |
+
(c) DenseNet-121 and CIFAR-10
|
1440 |
+
0
|
1441 |
+
0.2 0.4 0.6 0.8
|
1442 |
+
20
|
1443 |
+
40
|
1444 |
+
60
|
1445 |
+
80
|
1446 |
+
100
|
1447 |
+
Neuron Activation Threshold
|
1448 |
+
(d) DenseNet-121 and FEMNIST
|
1449 |
+
Fig. 10: FEDDEBUG performance at neuron activation thresh-
|
1450 |
+
old on 30 clients, including five faulty clients.
|
1451 |
+
C. Neuron Activation Threshold
|
1452 |
+
There is no standard threshold of neuron activations [46]
|
1453 |
+
and prior work uses experiential value for different use
|
1454 |
+
cases [14]. We evaluate the impact of different activation
|
1455 |
+
thresholds on FEDDEBUG’s faulty client localizability. We
|
1456 |
+
take 30 clients including five faulty clients, and train ResNet-
|
1457 |
+
50 and DenseNet-121 on both the CIFAR-10 and FEMNIST
|
1458 |
+
datasets. We repeat each experiment on 10 different inputs
|
1459 |
+
generated by Algorithm 1.
|
1460 |
+
Figure 10 shows the result of these experiments. The X-
|
1461 |
+
axis represents the neuron activation thresholds, ranging from
|
1462 |
+
0 to 0.9. The Y-axis shows the FEDDEBUG’s localization
|
1463 |
+
accuracy in a given experiment setting. For instance, at the
|
1464 |
+
0.003 threshold, the average localization accuracy across four
|
1465 |
+
settings is 100%. On the other hand, at 0.5 threshold, the
|
1466 |
+
average accuracy decreases significantly to 73.5% across these
|
1467 |
+
configurations. Specifically, for DenseNet-121 and FEMNIST
|
1468 |
+
experiment in Figure 10-(d), the localization drops to 64%
|
1469 |
+
at the 0.5 neuron activation threshold. We observe that FED-
|
1470 |
+
DEBUG performs better at lower thresholds (< 0.01) across
|
1471 |
+
different models and datasets. This behavior is expected be-
|
1472 |
+
cause lower thresholds increase the sensitivity of FEDDEBUG’s
|
1473 |
+
localization approach. It starts monitoring the majority of the
|
1474 |
+
neurons compared to a higher threshold, where FEDDEBUG
|
1475 |
+
profiles only a few neurons crossing the threshold.
|
1476 |
+
D. Threats to Validity
|
1477 |
+
To alleviate threats to external validity, we use established
|
1478 |
+
state-of-the-art FL experimental models (ResNet-18, ResNet-
|
1479 |
+
34, ResNet-50, DenseNet-121, and VGG-16), two standard-
|
1480 |
+
ized datasets from FL benchmarks, two real-world data dis-
|
1481 |
+
tributions, and an industrial scale FL framework. Similarly,
|
1482 |
+
we remove bias in fault injection using standard noisy labels
|
1483 |
+
technique from the ML literature, to make a fault reflective
|
1484 |
+
of real-world scenarios. We also experiment with varying
|
1485 |
+
noise rates for better evaluations, transparency, and fairness.
|
1486 |
+
Another source of external threats to validity is randomness in
|
1487 |
+
the FEDDEBUG’s input selection method. We minimize such
|
1488 |
+
randomness by evaluating each configuration on at least 10
|
1489 |
+
and 100 test inputs and reporting the average results.
|
1490 |
+
VI. RELATED WORK
|
1491 |
+
Debugging ML models has been extensively explored in
|
1492 |
+
recent works [4], [13], [45], [46], [57], [59], [62]. The primary
|
1493 |
+
objectives of these approaches are interpretability, generating
|
1494 |
+
new test cases by carefully perturbing the real-world training
|
1495 |
+
inputs to improve performance and find bugs and corner cases
|
1496 |
+
in the given model. These approaches require access to the
|
1497 |
+
training and testing data, and some are limited to testing a sin-
|
1498 |
+
gle neural network; hence, such approaches cannot be directly
|
1499 |
+
imported in FL. Lack of access to client data and resources in
|
1500 |
+
FL settings makes testing and debugging FL more challenging.
|
1501 |
+
If applied to FL, these testing approaches will find every
|
1502 |
+
client’s model defective. Clients’ models are architecturally
|
1503 |
+
similar, but trained on local clients’ data, and thus their models
|
1504 |
+
are semantically different from each other. Identifying defects
|
1505 |
+
in an isolated model is not practical either. Every client’s
|
1506 |
+
model has weaknesses that will surface on carefully selected
|
1507 |
+
test data. FEDDEBUG overcomes these problems by focusing
|
1508 |
+
on the commonality of models instead of differences.
|
1509 |
+
Most relevant work to FEDDEBUG primarily focuses on
|
1510 |
+
finding clients’ contributions to a global model without ex-
|
1511 |
+
posing the private data to a central server [67]. In practice,
|
1512 |
+
individual clients report information about training such as
|
1513 |
+
dataset size and performance metrics to the central aggregator
|
1514 |
+
[12], [25], [26], [48], [65], [68], [70]. Existing approaches
|
1515 |
+
use prior information e.g., previous task performance and data
|
1516 |
+
quality obtained via third-party services to evaluate clients’
|
1517 |
+
models [56]. Some approaches recommend cross-validating
|
1518 |
+
clients’ models on another client’s local dataset [40]. Another
|
1519 |
+
alternate is to maintain a validation dataset at the central server
|
1520 |
+
to evaluate clients’ models [8], [39]. A major limitation of the
|
1521 |
+
above FL-related approaches is that the aggregator server is
|
1522 |
+
entirely dependent on the client's reported information or test
|
1523 |
+
data to evaluate clients’ models. The aggregator also assumes
|
1524 |
+
that all clients are trustworthy about their performance in these
|
1525 |
+
approaches, which invites adversarial clients to exploit FL
|
1526 |
+
in order to retrieve clients’ private data. Cross validation is
|
1527 |
+
also prohibited due to limited computing resources for edge
|
1528 |
+
devices such as smart home sensors. FEDDEBUG overcomes
|
1529 |
+
the limitations of debugging faulty clients with interactive and
|
1530 |
+
automated approaches that are privacy preserving.
|
1531 |
+
VII. CONCLUSION
|
1532 |
+
Federated learning promotes accurate and collaborative
|
1533 |
+
model training across millions of clients–a type of learning
|
1534 |
+
that was previously impossible due to privacy concerns related
|
1535 |
+
to user data. However, FL poses unprecedented challenges
|
1536 |
+
in debugging a faulty client responsible for deterring global
|
1537 |
+
training. With minimal information about the training process
|
1538 |
+
and non-existent debugging techniques, such issues are often
|
1539 |
+
|
1540 |
+
left untreated. FEDDEBUG enables interactive and automated
|
1541 |
+
fault localization in FL. It adapts conventional debugging
|
1542 |
+
practices in FL with its breakpoint and fix and replay feature.
|
1543 |
+
It offers a novel differential testing technique to automatically
|
1544 |
+
identify the precise faulty clients. We demonstrate that FED-
|
1545 |
+
DEBUG identifies a faulty client with 100% accuracy within
|
1546 |
+
2.1% of a round’s training time, advocating for FEDDEBUG’s
|
1547 |
+
efficacy and efficiency. With FEDDEBUG, we pave the way
|
1548 |
+
for advanced software debugging techniques to be adapted
|
1549 |
+
in the emerging area of federated learning and the broader
|
1550 |
+
community of machine learning practitioners.
|
1551 |
+
REFERENCES
|
1552 |
+
[1] Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and
|
1553 |
+
Vitaly Shmatikov. How to backdoor federated learning. In International
|
1554 |
+
Conference on Artificial Intelligence and Statistics, pages 2938–2948.
|
1555 |
+
PMLR, 2020.
|
1556 |
+
[2] Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin
|
1557 |
+
Calo.
|
1558 |
+
Analyzing federated learning through an adversarial lens.
|
1559 |
+
In
|
1560 |
+
International Conference on Machine Learning, pages 634–643. PMLR,
|
1561 |
+
2019.
|
1562 |
+
[3] Battista Biggio, Blaine Nelson, and Pavel Laskov. Poisoning attacks
|
1563 |
+
against support vector machines. arXiv preprint arXiv:1206.6389, 2012.
|
1564 |
+
[4] Houssem Ben Braiek and Foutse Khomh.
|
1565 |
+
Deepevolution: A search-
|
1566 |
+
based testing approach for deep neural networks. In 2019 IEEE Inter-
|
1567 |
+
national Conference on Software Maintenance and Evolution (ICSME),
|
1568 |
+
pages 454–458. IEEE, 2019.
|
1569 |
+
[5] Lukas Burkhalter, Hidde Lycklama, Alexander Viand, Nicolas K¨uchler,
|
1570 |
+
and Anwar Hithnawi. Rofl: Attestable robustness for secure federated
|
1571 |
+
learning. arXiv preprint arXiv:2107.03311, 2021.
|
1572 |
+
[6] Sebastian Caldas, Sai Meher Karthik Duddu, Peter Wu, Tian Li,
|
1573 |
+
Jakub Koneˇcn`y, H Brendan McMahan, Virginia Smith, and Ameet
|
1574 |
+
Talwalkar. Leaf: A benchmark for federated settings. arXiv preprint
|
1575 |
+
arXiv:1812.01097, 2018.
|
1576 |
+
[7] Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. Tar-
|
1577 |
+
geted backdoor attacks on deep learning systems using data poisoning.
|
1578 |
+
arXiv preprint arXiv:1712.05526, 2017.
|
1579 |
+
[8] Yiqiang Chen, Xiaodong Yang, Xin Qin, Han Yu, Biao Chen, and Zhiqi
|
1580 |
+
Shen. Focus: Dealing with label quality disparity in federated learning.
|
1581 |
+
arXiv preprint arXiv:2001.11359, 2020.
|
1582 |
+
[9] Liam Collins, Hamed Hassani, Aryan Mokhtari, and Sanjay Shakkottai.
|
1583 |
+
Exploiting shared representations for personalized federated learning.
|
1584 |
+
In International Conference on Machine Learning, pages 2089–2099.
|
1585 |
+
PMLR, 2021.
|
1586 |
+
[10] Benoˆıt Fr´enay and Michel Verleysen. Classification in the presence of
|
1587 |
+
label noise: a survey. IEEE transactions on neural networks and learning
|
1588 |
+
systems, 25(5):845–869, 2013.
|
1589 |
+
[11] Aritra Ghosh, Himanshu Kumar, and P. S. Sastry. Robust loss functions
|
1590 |
+
under label noise for deep neural networks.
|
1591 |
+
In Proceedings of the
|
1592 |
+
Thirty-First AAAI Conference on Artificial Intelligence, AAAI’17, page
|
1593 |
+
1919–1925. AAAI Press, 2017.
|
1594 |
+
[12] Jack Goetz, Kshitiz Malik, Duc Bui, Seungwhan Moon, Honglei
|
1595 |
+
Liu, and Anuj Kumar.
|
1596 |
+
Active federated learning.
|
1597 |
+
arXiv preprint
|
1598 |
+
arXiv:1909.12641, 2019.
|
1599 |
+
[13] Jianmin Guo, Yu Jiang, Yue Zhao, Quan Chen, and Jiaguang Sun.
|
1600 |
+
Dlfuzz: Differential fuzzing testing of deep learning systems.
|
1601 |
+
In
|
1602 |
+
Proceedings of the 2018 26th ACM Joint Meeting on European Software
|
1603 |
+
Engineering Conference and Symposium on the Foundations of Software
|
1604 |
+
Engineering, pages 739–743, 2018.
|
1605 |
+
[14] Fabrice Harel-Canada, Lingxiao Wang, Muhammad Ali Gulzar, Quan-
|
1606 |
+
quan Gu, and Miryung Kim. Is neuron coverage a meaningful measure
|
1607 |
+
for testing deep neural networks? In Proceedings of the 28th ACM Joint
|
1608 |
+
Meeting on European Software Engineering Conference and Symposium
|
1609 |
+
on the Foundations of Software Engineering, pages 851–862, 2020.
|
1610 |
+
[15] Chaoyang He, Songze Li, Jinhyun So, Xiao Zeng, Mi Zhang, Hongyi
|
1611 |
+
Wang, Xiaoyang Wang, Praneeth Vepakomma, Abhishek Singh, Hang
|
1612 |
+
Qiu, et al.
|
1613 |
+
Fedml: A research library and benchmark for federated
|
1614 |
+
machine learning. arXiv preprint arXiv:2007.13518, 2020.
|
1615 |
+
[16] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun.
|
1616 |
+
Deep
|
1617 |
+
residual learning for image recognition, 2015.
|
1618 |
+
[17] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving
|
1619 |
+
deep into rectifiers: Surpassing human-level performance on imagenet
|
1620 |
+
classification. In Proceedings of the IEEE international conference on
|
1621 |
+
computer vision, pages 1026–1034, 2015.
|
1622 |
+
[18] Dan Hendrycks, Mantas Mazeika, Duncan Wilson, and Kevin Gimpel.
|
1623 |
+
Using trusted data to train deep networks on labels corrupted by severe
|
1624 |
+
noise. Advances in neural information processing systems, 31, 2018.
|
1625 |
+
[19] Gao Huang, Zhuang Liu, Laurens Van Der Maaten, and Kilian Q
|
1626 |
+
Weinberger. Densely connected convolutional networks. In Proceedings
|
1627 |
+
of the IEEE conference on computer vision and pattern recognition,
|
1628 |
+
pages 4700–4708, 2017.
|
1629 |
+
[20] Ji Chu Jiang, Burak Kantarci, Sema Oktug, and Tolga Soyata. Federated
|
1630 |
+
learning in smart city sensing: Challenges and opportunities. Sensors,
|
1631 |
+
20(21):6230, 2020.
|
1632 |
+
[21] Lu Jiang, Di Huang, Mason Liu, and Weilong Yang. Beyond synthetic
|
1633 |
+
noise: Deep learning on controlled noisy labels.
|
1634 |
+
In International
|
1635 |
+
Conference on Machine Learning, pages 4804–4815. PMLR, 2020.
|
1636 |
+
[22] Lu Jiang, Zhengyuan Zhou, Thomas Leung, Li-Jia Li, and Li Fei-
|
1637 |
+
Fei. Mentornet: Learning data-driven curriculum for very deep neural
|
1638 |
+
networks on corrupted labels. In International conference on machine
|
1639 |
+
learning, pages 2304–2313. PMLR, 2018.
|
1640 |
+
[23] James A. Jones, Mary Jean Harrold, and John Stasko.
|
1641 |
+
Visualization
|
1642 |
+
of test information to assist fault localization. In Proceedings of the
|
1643 |
+
24th International Conference on Software Engineering, ICSE ’02, pages
|
1644 |
+
467–477, New York, NY, USA, 2002. ACM.
|
1645 |
+
[24] Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aur´elien Bellet,
|
1646 |
+
Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles,
|
1647 |
+
Graham Cormode, Rachel Cummings, Rafael G. L. D’Oliveira, Hubert
|
1648 |
+
Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary
|
1649 |
+
Garrett, Adri`a Gasc´on, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser,
|
1650 |
+
Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson,
|
1651 |
+
Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Kho-
|
1652 |
+
dak, Jakub Koneˇcn´y, Aleksandra Korolova, Farinaz Koushanfar, Sanmi
|
1653 |
+
Koyejo, Tancr`ede Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri,
|
1654 |
+
Richard Nock, Ayfer ¨Ozg¨ur, Rasmus Pagh, Mariana Raykova, Hang Qi,
|
1655 |
+
Daniel Ramage, Ramesh Raskar, Dawn Song, Weikang Song, Sebas-
|
1656 |
+
tian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tram`er,
|
1657 |
+
Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang,
|
1658 |
+
Felix X. Yu, Han Yu, and Sen Zhao. Advances and open problems in
|
1659 |
+
federated learning, 2021.
|
1660 |
+
[25] Jiawen Kang, Zehui Xiong, Dusit Niyato, Han Yu, Ying-Chang Liang,
|
1661 |
+
and Dong In Kim.
|
1662 |
+
Incentive design for efficient federated learning
|
1663 |
+
in mobile networks: A contract theory approach. In 2019 IEEE VTS
|
1664 |
+
Asia Pacific Wireless Communications Symposium (APWCS), pages 1–
|
1665 |
+
5. IEEE, 2019.
|
1666 |
+
[26] Tra Huong Thi Le, Nguyen H Tran, Yan Kyaw Tun, Minh NH Nguyen,
|
1667 |
+
Shashi Raj Pandey, Zhu Han, and Choong Seon Hong. An incentive
|
1668 |
+
mechanism for federated learning in wireless cellular networks: An
|
1669 |
+
auction approach.
|
1670 |
+
IEEE Transactions on Wireless Communications,
|
1671 |
+
20(8):4874–4887, 2021.
|
1672 |
+
[27] Claire Le Goues, ThanhVu Nguyen, Stephanie Forrest, and Westley
|
1673 |
+
Weimer.
|
1674 |
+
Genprog: A generic method for automatic software repair.
|
1675 |
+
Ieee transactions on software engineering, 38(1):54–72, 2011.
|
1676 |
+
[28] Kuang-Huei Lee, Xiaodong He, Lei Zhang, and Linjun Yang. Cleannet:
|
1677 |
+
Transfer learning for scalable image classifier training with label noise.
|
1678 |
+
In Proceedings of the IEEE conference on computer vision and pattern
|
1679 |
+
recognition, pages 5447–5456, 2018.
|
1680 |
+
[29] Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. Data poi-
|
1681 |
+
soning attacks on factorization-based collaborative filtering. Advances
|
1682 |
+
in neural information processing systems, 29, 2016.
|
1683 |
+
[30] Junnan Li, Richard Socher, and Steven CH Hoi.
|
1684 |
+
Dividemix: Learn-
|
1685 |
+
ing with noisy labels as semi-supervised learning.
|
1686 |
+
arXiv preprint
|
1687 |
+
arXiv:2002.07394, 2020.
|
1688 |
+
[31] Junnan Li, Yongkang Wong, Qi Zhao, and Mohan S Kankanhalli.
|
1689 |
+
Learning to learn from noisy labeled data.
|
1690 |
+
In Proceedings of the
|
1691 |
+
IEEE/CVF Conference on Computer Vision and Pattern Recognition,
|
1692 |
+
pages 5051–5059, 2019.
|
1693 |
+
[32] Junnan Li, Caiming Xiong, and Steven CH Hoi.
|
1694 |
+
Learning from
|
1695 |
+
noisy data with robust representation learning. In Proceedings of the
|
1696 |
+
IEEE/CVF International Conference on Computer Vision, pages 9485–
|
1697 |
+
9494, 2021.
|
1698 |
+
[33] Mu Li, David G Andersen, Jun Woo Park, Alexander J Smola, Amr
|
1699 |
+
Ahmed, Vanja Josifovski, James Long, Eugene J Shekita, and Bor-
|
1700 |
+
Yiing Su.
|
1701 |
+
Scaling distributed machine learning with the parameter
|
1702 |
+
|
1703 |
+
server. In 11th {USENIX} Symposium on Operating Systems Design
|
1704 |
+
and Implementation ({OSDI} 14), pages 583–598, 2014.
|
1705 |
+
[34] Qinbin Li, Yiqun Diao, Quan Chen, and Bingsheng He.
|
1706 |
+
Federated
|
1707 |
+
learning on non-iid data silos: An experimental study.
|
1708 |
+
In IEEE
|
1709 |
+
International Conference on Data Engineering, 2022.
|
1710 |
+
[35] Tian Li, Shengyuan Hu, Ahmad Beirami, and Virginia Smith. Ditto: Fair
|
1711 |
+
and robust federated learning through personalization. In International
|
1712 |
+
Conference on Machine Learning, pages 6357–6368. PMLR, 2021.
|
1713 |
+
[36] Yang Liu, Yan Kang, Liping Li, Xinwei Zhang, Yong Cheng, Tianjian
|
1714 |
+
Chen, Mingyi Hong, and Qiang Yang.
|
1715 |
+
A communication efficient
|
1716 |
+
vertical federated learning framework. Scanning Electron Microsc Meet
|
1717 |
+
at, 2019.
|
1718 |
+
[37] Guodong Long, Yue Tan, Jing Jiang, and Chengqi Zhang. Federated
|
1719 |
+
learning for open banking.
|
1720 |
+
In Federated learning, pages 240–254.
|
1721 |
+
Springer, 2020.
|
1722 |
+
[38] Heiko Ludwig, Nathalie Baracaldo, Gegi Thomas, Yi Zhou, Ali Anwar,
|
1723 |
+
Shashank Rajamoni, Yuya Ong, Jayaram Radhakrishnan, Ashish Verma,
|
1724 |
+
Mathieu Sinn, et al. Ibm federated learning: an enterprise framework
|
1725 |
+
white paper v0. 1. arXiv preprint arXiv:2007.10987, 2020.
|
1726 |
+
[39] Lingjuan Lyu, Xinyi Xu, Qian Wang, and Han Yu. Collaborative fairness
|
1727 |
+
in federated learning. In Federated Learning, pages 189–204. Springer,
|
1728 |
+
2020.
|
1729 |
+
[40] Lingjuan Lyu, Jiangshan Yu, Karthik Nandakumar, Yitong Li, Xingjun
|
1730 |
+
Ma, Jiong Jin, Han Yu, and Kee Siong Ng. Towards fair and privacy-
|
1731 |
+
preserving federated deep models. IEEE Transactions on Parallel and
|
1732 |
+
Distributed Systems, 31(11):2524–2541, 2020.
|
1733 |
+
[41] Xingjun Ma, Yisen Wang, Michael E Houle, Shuo Zhou, Sarah Erfani,
|
1734 |
+
Shutao Xia, Sudanthi Wijewickrema, and James Bailey. Dimensionality-
|
1735 |
+
driven learning with noisy labels.
|
1736 |
+
In International Conference on
|
1737 |
+
Machine Learning, pages 3355–3364. PMLR, 2018.
|
1738 |
+
[42] Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and
|
1739 |
+
Blaise Aguera y Arcas.
|
1740 |
+
Communication-efficient learning of deep
|
1741 |
+
networks from decentralized data. In Artificial intelligence and statistics,
|
1742 |
+
pages 1273–1282. PMLR, 2017.
|
1743 |
+
[43] Vaikkunth Mugunthan, Ravi Rahman, and Lalana Kagal.
|
1744 |
+
Blockflow:
|
1745 |
+
An accountable and privacy-preserving solution for federated learning.
|
1746 |
+
arXiv preprint arXiv:2007.03856, 2020.
|
1747 |
+
[44] Nagarajan Natarajan, Inderjit S Dhillon, Pradeep K Ravikumar, and
|
1748 |
+
Ambuj Tewari.
|
1749 |
+
Learning with noisy labels.
|
1750 |
+
Advances in neural
|
1751 |
+
information processing systems, 26:1196–1204, 2013.
|
1752 |
+
[45] Augustus Odena, Catherine Olsson, David Andersen, and Ian Good-
|
1753 |
+
fellow. Tensorfuzz: Debugging neural networks with coverage-guided
|
1754 |
+
fuzzing. In International Conference on Machine Learning, pages 4901–
|
1755 |
+
4911. PMLR, 2019.
|
1756 |
+
[46] Kexin Pei, Yinzhi Cao, Junfeng Yang, and Suman Jana. Deepxplore:
|
1757 |
+
Automated whitebox testing of deep learning systems. In proceedings
|
1758 |
+
of the 26th Symposium on Operating Systems Principles, pages 1–18,
|
1759 |
+
2017.
|
1760 |
+
[47] Nicola Rieke, Jonny Hancox, Wenqi Li, Fausto Milletari, Holger R
|
1761 |
+
Roth, Shadi Albarqouni, Spyridon Bakas, Mathieu N Galtier, Bennett A
|
1762 |
+
Landman, Klaus Maier-Hein, et al. The future of digital health with
|
1763 |
+
federated learning. NPJ digital medicine, 3(1):1–7, 2020.
|
1764 |
+
[48] Yunus Sarikaya and Ozgur Ercetin.
|
1765 |
+
Motivating workers in federated
|
1766 |
+
learning: A stackelberg game perspective.
|
1767 |
+
IEEE Networking Letters,
|
1768 |
+
2(1):23–27, 2019.
|
1769 |
+
[49] Aviv Shamsian, Aviv Navon, Ethan Fetaya, and Gal Chechik.
|
1770 |
+
Per-
|
1771 |
+
sonalized federated learning using hypernetworks.
|
1772 |
+
arXiv preprint
|
1773 |
+
arXiv:2103.04628, 2021.
|
1774 |
+
[50] Karen Simonyan and Andrew Zisserman.
|
1775 |
+
Very deep convolu-
|
1776 |
+
tional networks for large-scale image recognition.
|
1777 |
+
arXiv preprint
|
1778 |
+
arXiv:1409.1556, 2014.
|
1779 |
+
[51] Jacob Steinhardt, Pang Wei W Koh, and Percy S Liang.
|
1780 |
+
Certified
|
1781 |
+
defenses for data poisoning attacks.
|
1782 |
+
Advances in neural information
|
1783 |
+
processing systems, 30, 2017.
|
1784 |
+
[52] Youcheng Sun, Xiaowei Huang, Daniel Kroening, James Sharp, Matthew
|
1785 |
+
Hill, and Rob Ashmore.
|
1786 |
+
Deepconcolic: testing and debugging deep
|
1787 |
+
neural networks.
|
1788 |
+
In 2019 IEEE/ACM 41st International Conference
|
1789 |
+
on Software Engineering: Companion Proceedings (ICSE-Companion),
|
1790 |
+
pages 111–114. IEEE, 2019.
|
1791 |
+
[53] Canh T Dinh, Nguyen Tran, and Josh Nguyen. Personalized federated
|
1792 |
+
learning with moreau envelopes.
|
1793 |
+
Advances in Neural Information
|
1794 |
+
Processing Systems, 33:21394–21405, 2020.
|
1795 |
+
[54] Shunpu Tang, Wenqi Zhou, Lunyuan Chen, Lijia Lai, Junjuan Xia, and
|
1796 |
+
Liseng Fan. Battery-constrained federated edge learning in uav-enabled
|
1797 |
+
iot for b5g/6g networks. Physical Communication, 47:101381, 2021.
|
1798 |
+
[55] Yuchi Tian, Kexin Pei, Suman Jana, and Baishakhi Ray.
|
1799 |
+
Deeptest:
|
1800 |
+
Automated testing of deep-neural-network-driven autonomous cars. In
|
1801 |
+
Proceedings of the 40th international conference on software engineer-
|
1802 |
+
ing, pages 303–314, 2018.
|
1803 |
+
[56] Muhammad Habib ur Rehman, Ahmed Mukhtar Dirir, Khaled Salah,
|
1804 |
+
Ernesto Damiani, and Davor Svetinovic.
|
1805 |
+
Trustfed: a framework for
|
1806 |
+
fair and trustworthy cross-device federated learning in iiot.
|
1807 |
+
IEEE
|
1808 |
+
Transactions on Industrial Informatics, 17(12):8485–8494, 2021.
|
1809 |
+
[57] Muhammad Usman, Yannic Noller, Corina S P˘as˘areanu, Youcheng Sun,
|
1810 |
+
and Divya Gopinath.
|
1811 |
+
Neurospf: A tool for the symbolic analysis of
|
1812 |
+
neural networks.
|
1813 |
+
In 2021 IEEE/ACM 43rd International Conference
|
1814 |
+
on Software Engineering: Companion Proceedings (ICSE-Companion),
|
1815 |
+
pages 25–28. IEEE, 2021.
|
1816 |
+
[58] Saeed Vahidian, Mahdi Morafah, and Bill Lin. Personalized federated
|
1817 |
+
learning by structured and unstructured pruning under data hetero-
|
1818 |
+
geneity.
|
1819 |
+
In 2021 IEEE 41st International Conference on Distributed
|
1820 |
+
Computing Systems Workshops (ICDCSW), pages 27–34. IEEE, 2021.
|
1821 |
+
[59] Mohammad Wardat, Wei Le, and Hridesh Rajan. Deeplocalize: fault
|
1822 |
+
localization for deep neural networks.
|
1823 |
+
In 2021 IEEE/ACM 43rd
|
1824 |
+
International Conference on Software Engineering (ICSE), pages 251–
|
1825 |
+
262. IEEE, 2021.
|
1826 |
+
[60] Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad
|
1827 |
+
Farokhi, Shi Jin, Tony QS Quek, and H Vincent Poor.
|
1828 |
+
Federated
|
1829 |
+
learning with differential privacy: Algorithms and performance analysis.
|
1830 |
+
IEEE Transactions on Information Forensics and Security, 15:3454–
|
1831 |
+
3469, 2020.
|
1832 |
+
[61] Xiaofei Xie, Lei Ma, Felix Juefei-Xu, Minhui Xue, Hongxu Chen, Yang
|
1833 |
+
Liu, Jianjun Zhao, Bo Li, Jianxiong Yin, and Simon See. Deephunter:
|
1834 |
+
a coverage-guided fuzz testing framework for deep neural networks. In
|
1835 |
+
Proceedings of the 28th ACM SIGSOFT International Symposium on
|
1836 |
+
Software Testing and Analysis, pages 146–157, 2019.
|
1837 |
+
[62] Xiaofei Xie, Lei Ma, Haijun Wang, Yuekang Li, Yang Liu, and Xiaohong
|
1838 |
+
Li. Diffchaser: Detecting disagreements for deep neural networks. In
|
1839 |
+
IJCAI, pages 5772–5778, 2019.
|
1840 |
+
[63] Zichen Xu, Li Li, and Wenting Zou. Exploring federated learning on
|
1841 |
+
battery-powered devices. In Proceedings of the ACM Turing Celebration
|
1842 |
+
Conference-China, pages 1–6, 2019.
|
1843 |
+
[64] Jiangchao Yao, Jiajie Wang, Ivor W Tsang, Ya Zhang, Jun Sun,
|
1844 |
+
Chengqi Zhang, and Rui Zhang.
|
1845 |
+
Deep learning from noisy image
|
1846 |
+
labels with quality embedding. IEEE Transactions on Image Processing,
|
1847 |
+
28(4):1909–1922, 2018.
|
1848 |
+
[65] Dongdong Ye, Rong Yu, Miao Pan, and Zhu Han. Federated learning
|
1849 |
+
in vehicular edge computing: A selective model aggregation approach.
|
1850 |
+
IEEE Access, 8:23920–23935, 2020.
|
1851 |
+
[66] Andreas Zeller and Ralf Hildebrandt. Simplifying and isolating failure-
|
1852 |
+
inducing input. Software Engineering, IEEE Transactions on, 28(2):183–
|
1853 |
+
200, 2002.
|
1854 |
+
[67] Rongfei Zeng, Chao Zeng, Xingwei Wang, Bo Li, and Xiaowen Chu.
|
1855 |
+
A comprehensive survey of incentive mechanism for federated learning.
|
1856 |
+
arXiv preprint arXiv:2106.15406, 2021.
|
1857 |
+
[68] Rongfei Zeng, Shixun Zhang, Jiaqi Wang, and Xiaowen Chu. Fmore:
|
1858 |
+
An incentive scheme of multi-dimensional auction for federated learning
|
1859 |
+
in mec. In 2020 IEEE 40th International Conference on Distributed
|
1860 |
+
Computing Systems (ICDCS), pages 278–288. IEEE, 2020.
|
1861 |
+
[69] Chaoning Zhang, Philipp Benz, Dawit Mureja Argaw, Seokju Lee,
|
1862 |
+
Junsik Kim, Francois Rameau, Jean-Charles Bazin, and In So Kweon.
|
1863 |
+
Resnet or densenet? introducing dense shortcuts to resnet. In Proceed-
|
1864 |
+
ings of the IEEE/CVF winter conference on applications of computer
|
1865 |
+
vision, pages 3550–3559, 2021.
|
1866 |
+
[70] Jingfeng Zhang, Cheng Li, Antonio Robles-Kelly, and Mohan Kankan-
|
1867 |
+
halli.
|
1868 |
+
Hierarchically
|
1869 |
+
fair
|
1870 |
+
federated
|
1871 |
+
learning.
|
1872 |
+
arXiv
|
1873 |
+
preprint
|
1874 |
+
arXiv:2004.10386, 2020.
|
1875 |
+
[71] Mengshi Zhang, Yuqun Zhang, Lingming Zhang, Cong Liu, and Sar-
|
1876 |
+
fraz Khurshid.
|
1877 |
+
Deeproad: Gan-based metamorphic testing and input
|
1878 |
+
validation framework for autonomous driving systems. In 2018 33rd
|
1879 |
+
IEEE/ACM International Conference on Automated Software Engineer-
|
1880 |
+
ing (ASE), pages 132–142. IEEE, 2018.
|
1881 |
+
[72] Zhilu Zhang and Mert Sabuncu.
|
1882 |
+
Generalized cross entropy loss for
|
1883 |
+
training deep neural networks with noisy labels. Advances in neural
|
1884 |
+
information processing systems, 31, 2018.
|
1885 |
+
|
1886 |
+
[73] Zhaohua Zheng, Yize Zhou, Yilong Sun, Zhang Wang, Boyi Liu, and
|
1887 |
+
Keqiu Li.
|
1888 |
+
Applications of federated learning in smart cities: recent
|
1889 |
+
advances, taxonomy, and open challenges. Connection Science, pages
|
1890 |
+
1–28, 2021.
|
1891 |
+
|
AtE1T4oBgHgl3EQf9Ab6/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
BNAyT4oBgHgl3EQfRvex/content/tmp_files/2301.00073v1.pdf.txt
ADDED
@@ -0,0 +1,1874 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.00073v1 [cs.IT] 30 Dec 2022
|
2 |
+
1
|
3 |
+
Fluid Antenna System: New Insights on
|
4 |
+
Outage Probability and Diversity Gain
|
5 |
+
Wee Kiat New, Member, IEEE, Kai-Kit Wong, Fellow, IEEE, Xu Hao, Member,
|
6 |
+
IEEE, Kin-Fai Tong, Fellow, IEEE, and Chan-Byoung Chae, Fellow, IEEE
|
7 |
+
Abstract
|
8 |
+
To enable innovative applications and services, both industry and academia are exploring new
|
9 |
+
technologies for sixth generation (6G) communications. One of the promising candidates is fluid antenna
|
10 |
+
system (FAS). Unlike existing systems, FAS is a novel communication technology where its antenna
|
11 |
+
can freely change its position and shape within a given space. Compared to the traditional systems, this
|
12 |
+
unique capability has the potential of providing higher diversity and interference-free communications.
|
13 |
+
Nevertheless, the performance limits of FAS remain unclear as its channels and system properties are
|
14 |
+
highly peculiar to be analyzed. To address this, we approximate the outage probability and diversity
|
15 |
+
gain of FAS in closed-form expressions. We then propose a suboptimal FAS with N ∗ ports, where a
|
16 |
+
significant gain can be obtained over FAS with N ∗ − 1 ports whilst FAS with N ∗ + 1 ports only yields
|
17 |
+
marginal improvement over the proposed suboptimal FAS. In this paper, we also provide analytical and
|
18 |
+
simulation results to unfold the key factors that affect the performance of FAS. Limited to systems
|
19 |
+
with one active radio frequency (RF)-chain, we show that the proposed suboptimal FAS outperforms
|
20 |
+
single-antenna (SISO) system and selection combining (SC) system in terms of outage probability.
|
21 |
+
Interestingly, when the given space is λ
|
22 |
+
2 , the outage probability of the proposed suboptimal FAS with
|
23 |
+
one active RF-chain achieves near to that of the maximal ratio combining (MRC) system with multiple
|
24 |
+
active RF-chains.
|
25 |
+
Index Terms
|
26 |
+
6G, fluid antenna system, outage probability, diversity gain, performance analysis.
|
27 |
+
The work is supported by the Engineering and Physical Sciences Research Council (EPSRC) under grant EP/W026813/1. For
|
28 |
+
the purpose of open access, the authors will apply a Creative Commons Attribution (CC BY) licence to any Author Accepted
|
29 |
+
Manuscript version arising. (Corresponding author: Kai-Kit Wong)
|
30 |
+
Wee Kiat New (email: [email protected]), Kai-Kit Wong (email: [email protected]), Xu Hao (email:[email protected]), and
|
31 |
+
Kin-Fai Tong (email: [email protected]) are with the Department of Electronic and Electrical Engineering, University College
|
32 |
+
London, London WC1E 6BT, United Kingdom.
|
33 |
+
Kai-Kit Wong and Chan-Byoung Chae (email: [email protected]) are with School of Integrated Technology, Yonsei
|
34 |
+
University, Seoul, Korea.
|
35 |
+
|
36 |
+
2
|
37 |
+
I. INTRODUCTION
|
38 |
+
Fifth generation (5G) wireless networks have recently been deployed worldwide and thus the
|
39 |
+
industry and academia are now looking for new technologies to maximize the potentials of sixth
|
40 |
+
generation (6G) wireless networks. One of the promising candidates is fluid antenna system
|
41 |
+
(FAS). Unlike traditional antenna systems, FAS is a software-controllable fluidic, conductive, or
|
42 |
+
dielectric structure that can freely adjust its position and shape within a given space [1].
|
43 |
+
For example, the most basic single fluid antenna consists of one radio frequency (RF)-chain
|
44 |
+
and N ports that are distributed in a given space. The radiating element of the fluid antenna
|
45 |
+
can freely switch its position among the ports (e.g., the strongest port) to obtain a stronger
|
46 |
+
channel gain, lower interference, and other desirable performance [2]. This is achievable due
|
47 |
+
to the recent advancement of using liquid metals (e.g., Galistan and Eutectic Gallium Indium)
|
48 |
+
and ionized solutions (e.g., sodium chloride and potassium chloride) for antennas. Note that
|
49 |
+
software-controlled pixel antennas, moveable antennas and other flexible antenna structures are
|
50 |
+
also considered as fluid antenna [3]. Besides, FAS can co-exist with other 6G candidates such
|
51 |
+
as re-configurable intelligent surfaces [4], surface-wave communications [5], intelligent massive
|
52 |
+
multiple-input multiple-output [6], and terahertz communications [7].
|
53 |
+
Despite its advantages, the fundamental limits of FAS and key factors that affect its perfor-
|
54 |
+
mance remain unclear. One of the reasons is because the channels of FAS are strongly correlated
|
55 |
+
since the ports can be closely placed to each other. Consequently, the probability density function
|
56 |
+
(PDF) and cumulative distribution function (CDF) of FAS channels are intractable [8]. As a result,
|
57 |
+
the outage probability and diversity gain of FAS are not known in closed-form expressions. In
|
58 |
+
addition, increasing the number of ports of FAS has an inherit diminishing gain due to one active
|
59 |
+
RF-chain [9].1 Thus, a suboptimal number of ports that are required to achieve a satisfactory
|
60 |
+
performance is not known. Yet, this number is practically and theoretically important as it reduces
|
61 |
+
the implementation challenges and analysis complexity.
|
62 |
+
Researchers might argue that FAS resembles a traditional selection combining (SC) system as
|
63 |
+
the strongest antenna is selected in a point-to-point setting. From this viewpoint, some similarities
|
64 |
+
are observed as there is a set of antennas/ports to select from and both systems only use one
|
65 |
+
active RF-chain for communications. Nevertheless, FAS can have infinitely many ports (e.g.,
|
66 |
+
1Throughout this paper, we refer to an active RF-chain as the RF-chain used for communications. In contrast, the term
|
67 |
+
RF-chains refers to a collection of RF-chains that are connected to each antenna for it to work as intended.
|
68 |
+
|
69 |
+
3
|
70 |
+
when using liquid metals) which makes the implementation and analysis much more challenging.
|
71 |
+
In addition, the unique capability of freely switching the radiating element among the ports can
|
72 |
+
be exploited to mitigate multi-user interference. These features are impractical or too costly in
|
73 |
+
traditional SC systems.
|
74 |
+
State-of-the-arts show that FAS outperforms maximal ratio combining (MRC) system if the
|
75 |
+
number of ports is sufficiently large [3]. In fact, [3] proves that FAS achieves arbitrarily small
|
76 |
+
outage for a fixed rate/signal-to-noise ratio (SNR) as N → ∞. In [10], the authors reveal that the
|
77 |
+
ergodic capacity of FAS increases with N and thus FAS can outperform MRC in terms of ergodic
|
78 |
+
capacity. Interestingly, FAS can also be used for multiple access. Specifically, [11] proposes a
|
79 |
+
fluid antenna multiple access (FAMA) system which leverages the moment of deep fades in space
|
80 |
+
to reduce multi-user interference. Motivated by these works, [12] employs stochastic geometry
|
81 |
+
to analyze the outage probability of FAS in large-scale downlink cellular networks and [13]
|
82 |
+
analyzes the performance of FAS in a more general correlated fading channel.
|
83 |
+
Nevertheless, [14] alludes that the channel modeling in the previous works might be inaccurate.
|
84 |
+
To address this, [8] proposes a highly complicated channel model to follow closely the spatial
|
85 |
+
correlation of the Jake’s model. Using this channel model, they highlight that FAS has limited
|
86 |
+
performance gain as N increases. Yet, the key reasons that limit the performance of FAS remain
|
87 |
+
ambiguous. This is because the eigenvalue and eigenvector entries that are used in the analytical
|
88 |
+
PDF/CDF expressions provide limited insights.
|
89 |
+
It is important to highlight that deriving the PDF/CDF of FAS channels is extremely challeng-
|
90 |
+
ing [8]. This is because the channels of FAS are strongly correlated and thus they have to be
|
91 |
+
formulated in terms of multivariate distributions. Over the past few decades, extensive efforts have
|
92 |
+
been dedicated to this problem [15]. However, most of the works only obtain the bivariate [16],
|
93 |
+
[17], trivariate [16], [18], [19], or quadvariate [19], [20] distributions while other works restrict
|
94 |
+
the correlation matrix to certain forms (e.g., equally correlated [21] and exponentially correlated
|
95 |
+
[22]). Fortunately, the multivariate PDF/CDF of arbitrarily correlated Rayleigh distributions are
|
96 |
+
recently derived in [23]–[25]. Nevertheless, the assumption of non-singular correlation matrix
|
97 |
+
is retained. In this paper, we omit this assumption (i.e., our correlation matrix could be near-
|
98 |
+
singular) and address the computation problem via a suboptimal approximation.2
|
99 |
+
2The computational problem of a near-singular correlation matrix is much harder to address than that of a singular matrix.
|
100 |
+
This is because we can obtain an independent matrix from a singular matrix by removing the dependent entries [26]. But in the
|
101 |
+
near-singular case, this approach cannot be applied. Instead, we need to rely on approximations.
|
102 |
+
|
103 |
+
4
|
104 |
+
In addition to the above works, [27] develops a port selection algorithm that can approach the
|
105 |
+
performance of optimal FAS when only the received SNR of a few ports are observed. Further-
|
106 |
+
more, [28] considers a field-response channel model while omitting the spatial correlation effect
|
107 |
+
and [29] extends the model to a multiple-input multiple-output (MIMO) scenario. Moreover,
|
108 |
+
FAMA can be categorized into i) slow-FAMA and ii) fast-FAMA. The earlier switches its port
|
109 |
+
when the channel changes [30] while the latter switches its port on a symbol-by-symbol basis
|
110 |
+
[31]. The analytical outage probability of two-user FAMA is also derived in [32].
|
111 |
+
Motivated by the aforementioned works, this paper aims to understand the fundamental limits
|
112 |
+
of FAS as well as the key factors that affect its performance. To this end, we approximate
|
113 |
+
the outage probability and diversity gain of FAS in closed-form expressions via a simple and
|
114 |
+
accurate channel model that follows closely the spatial correlation of Jake’s model. In addition,
|
115 |
+
we propose a suboptimal FAS with N∗ ports as well as an algorithm to approximate N∗. The
|
116 |
+
main contributions of our paper are summarized as follows:
|
117 |
+
• We employ a simple and accurate channel model that follows the spatial correlation of Jake’s
|
118 |
+
model. Based on this channel model, we approximate the outage probability in closed-form
|
119 |
+
expressions. By applying Taylor series approximation, we simplify the outage probability at
|
120 |
+
high SNR into a simpler and more meaningful expression. Using this result, we also obtain
|
121 |
+
the diversity gain of FAS.
|
122 |
+
• We propose a suboptimal FAS with N∗ ports. The proposed suboptimal FAS plays an
|
123 |
+
important role as it enables FAS to achieve near-optimal performance with minimal number
|
124 |
+
of ports. In particular, one may define εtol to adjust the sub-optimality of the proposed FAS.
|
125 |
+
For example, if εtol is small, the proposed FAS is quantifiably near-optimal at a cost of more
|
126 |
+
ports. In addition, we develop a polynomial-time algorithm to approximate N∗. Besides,
|
127 |
+
N∗ can be used to address the near-singular correlation matrix problem.
|
128 |
+
• We provide analytical and simulation results to demonstrate the key parameters that affect the
|
129 |
+
performance of FAS. Our discussions include intuitive insights on the system characteristics
|
130 |
+
as well as practical guidelines for efficient FAS design.
|
131 |
+
The rest of the paper is organized as follows: Section II details the system model and performance
|
132 |
+
metrics. Section III presents the outage probabiility and diversity gain of FAS. The details of
|
133 |
+
suboptimal FAS and the algorithm to approximate N∗ are discussed in Section IV. Section V
|
134 |
+
provides our numerical results and we conclude the paper in Section VI.
|
135 |
+
Notations: Scalar variables are denoted by italic letters (e.g., c), vectors are denoted by boldface
|
136 |
+
|
137 |
+
5
|
138 |
+
italic small letters (e.g., c) and matrices are denoted by boldface italic capital letters (e.g., C).
|
139 |
+
Besides, (·)T denotes transpose, (·)H denotes conjugate transpose while |·| and ∥·∥F denotes
|
140 |
+
absolute and Frobenius norm, respectively. Throughout this paper, log(·) denotes logarithm with
|
141 |
+
base 2, E [·] denotes the expectation and P {·} denotes the probability of an event. In addition,
|
142 |
+
fc (·) denotes the PDF of c, and Fc (·) denotes the CDF of c. The notation 1c {·} is an indication
|
143 |
+
function for condition c and [·]+/−
|
144 |
+
c
|
145 |
+
outputs the argument that is lower/upper bounded by c.
|
146 |
+
II. SYSTEM MODEL
|
147 |
+
In this paper, we consider a point-to-point FAS where the transmitter is equipped with a
|
148 |
+
conventional antenna and the receiver is equipped with a fluid antenna. The fluid antenna consists
|
149 |
+
of N ports, which are evenly distributed along a linear dimension of length Wλ where λ is the
|
150 |
+
wavelength of the operating system. Since the ports are closely packed together, there is a strong
|
151 |
+
spatial correlation among them. Based on Jake’s model [33], the spatial correlation between the
|
152 |
+
mth and nth ports is given by
|
153 |
+
Jm,n = σ2J0
|
154 |
+
�
|
155 |
+
2π(m − n)
|
156 |
+
N − 1 W
|
157 |
+
�
|
158 |
+
,
|
159 |
+
(1)
|
160 |
+
where σ2 accounts for the large-scale fading effect and J0 (·) is the zero-order Bessel function
|
161 |
+
of the first kind.
|
162 |
+
For ease of analysis, we introduce the correlation matrix J where
|
163 |
+
J =
|
164 |
+
|
165 |
+
|
166 |
+
J1,1
|
167 |
+
· · ·
|
168 |
+
J1,N
|
169 |
+
...
|
170 |
+
...
|
171 |
+
...
|
172 |
+
JN,1
|
173 |
+
· · ·
|
174 |
+
JN,N
|
175 |
+
|
176 |
+
.
|
177 |
+
(2)
|
178 |
+
In (2), we have Jm,n = Jn,m. Therefore, using eigenvalue decomposition, we can obtain J =
|
179 |
+
UΛU H where U is an N × N matrix whose n-th column (denoted by un) is the eigenvector
|
180 |
+
of J and Λ = diag (λ1, . . . , λN) is an N × N diagonal matrix whose n-th diagonal entries are
|
181 |
+
the corresponding eigenvalues of un. Without loss of generality, we assume that the values of
|
182 |
+
the eigenvalues in Λ are arranged in descending order. i.e., λ1 ≥ · · · ≥ λN.
|
183 |
+
Throughout this paper, we assume there is only one RF chain in FAS and thus only one port
|
184 |
+
can be activated for communications. The received signal of the nth port is expressed as
|
185 |
+
yn = hnx + wn, n = 1, . . . , N,
|
186 |
+
(3)
|
187 |
+
|
188 |
+
6
|
189 |
+
where hn is the complex channel coefficient of the nth port, x is the information signal with
|
190 |
+
E
|
191 |
+
�
|
192 |
+
|x|2�
|
193 |
+
= P and wn ∼ CN (0, N0) , ∀n is the additive white Gaussian noise of the nth port.
|
194 |
+
Due to the spatial correlation of the ports, hn can be modeled as
|
195 |
+
hn =
|
196 |
+
N
|
197 |
+
�
|
198 |
+
m=1
|
199 |
+
un,m
|
200 |
+
�
|
201 |
+
λmzm,
|
202 |
+
(4)
|
203 |
+
where un,m is the (n, m)-th entry of U, zn = an + jbn, where an, bn, ∀n, are i.i.d. Gaussian ran-
|
204 |
+
dom variables with zero mean and variance of 1
|
205 |
+
2. According to [8], (4) can also be approximated
|
206 |
+
as
|
207 |
+
ˆhn = Ψvn +
|
208 |
+
ǫ-rank
|
209 |
+
�
|
210 |
+
m=1
|
211 |
+
un,m
|
212 |
+
�
|
213 |
+
λmzm,
|
214 |
+
(5)
|
215 |
+
where ǫ-rank is a modeling parameter, Ψ =
|
216 |
+
�
|
217 |
+
σ2 − �ǫ-rank
|
218 |
+
m=1 u2
|
219 |
+
n,mλm, vn = cn + jdn and
|
220 |
+
cn, dn, ∀n, are i.i.d. Gaussian random variables with zero mean and variance of 1
|
221 |
+
2.
|
222 |
+
To obtain the global optimum performance, FAS activates a port with the maximum signal
|
223 |
+
envelope [3],3 i.e.,
|
224 |
+
|hFAS| = max {|h1| , . . . , |hN|} .
|
225 |
+
(6)
|
226 |
+
The average received SNR of the receiver is found as
|
227 |
+
Θ = |hFAS|2 P
|
228 |
+
N0
|
229 |
+
= |hFAS|2 SNR,
|
230 |
+
(7)
|
231 |
+
where SNR =
|
232 |
+
P
|
233 |
+
N0 is the transmit SNR and its outage probability is defined as
|
234 |
+
P {log (1 + Θ) < q} = P {|hFAS| < Ω} ,
|
235 |
+
(8)
|
236 |
+
where Ω =
|
237 |
+
�
|
238 |
+
2q−1
|
239 |
+
SNR and q is the minimum required rate. In addition, the diversity gain of FAS
|
240 |
+
can be defined as [34]
|
241 |
+
lim
|
242 |
+
SNR→∞ − log Pe (SNR)
|
243 |
+
log (SNR)
|
244 |
+
(a)
|
245 |
+
=
|
246 |
+
lim
|
247 |
+
SNR→∞ − log P
|
248 |
+
�
|
249 |
+
log
|
250 |
+
�
|
251 |
+
1 + |hFAS|2 SNR
|
252 |
+
�
|
253 |
+
< q
|
254 |
+
�
|
255 |
+
log (SNR)
|
256 |
+
= d,
|
257 |
+
(9)
|
258 |
+
where (a) follows from the fact that error probability and outage probability differ by a constant
|
259 |
+
shift at high SNR [35].
|
260 |
+
3Due to the port spatial correlation, it is shown in [30] that only a small number of observed ports/training is required to
|
261 |
+
obtain the full channel state information.
|
262 |
+
|
263 |
+
7
|
264 |
+
III. OUTAGE PROBABILITY AND DIVERSITY GAIN OF FAS
|
265 |
+
As it is seen in (4), the complex channel coefficients h = [h1, . . . , hN]T are correlated.
|
266 |
+
Therefore, |h| is a correlated Rayleigh random vector. We present the following lemmas to
|
267 |
+
obtain the closed-form outage probability and diversity gain of FAS.
|
268 |
+
Lemma 1. The PDF of |h| can be approximated as
|
269 |
+
f|h| (r1, . . . , rN)
|
270 |
+
≈ η
|
271 |
+
s0
|
272 |
+
�
|
273 |
+
s1=0
|
274 |
+
s1
|
275 |
+
�
|
276 |
+
s2=0
|
277 |
+
. . .
|
278 |
+
sT −1
|
279 |
+
�
|
280 |
+
sT =0
|
281 |
+
�1
|
282 |
+
2
|
283 |
+
��T
|
284 |
+
t=1 s∗
|
285 |
+
t
|
286 |
+
T�
|
287 |
+
t=1
|
288 |
+
β (t, s∗
|
289 |
+
t)
|
290 |
+
�
|
291 |
+
v∈V
|
292 |
+
|
293 |
+
|
294 |
+
T�
|
295 |
+
t=1
|
296 |
+
|
297 |
+
s∗
|
298 |
+
t
|
299 |
+
vt
|
300 |
+
|
301 |
+
|
302 |
+
|
303 |
+
|
304 |
+
�
|
305 |
+
(2π)N
|
306 |
+
N
|
307 |
+
�
|
308 |
+
i=1
|
309 |
+
1{∆i=0}
|
310 |
+
�
|
311 |
+
.
|
312 |
+
(10)
|
313 |
+
Proof: See Appendix A.
|
314 |
+
In (10), η =
|
315 |
+
N
|
316 |
+
�
|
317 |
+
n=1
|
318 |
+
|hn|
|
319 |
+
πNdet(J) exp
|
320 |
+
�
|
321 |
+
−
|
322 |
+
�N
|
323 |
+
n=1|hn|2Kn,n
|
324 |
+
det(J)
|
325 |
+
�
|
326 |
+
, T = N(N−1)
|
327 |
+
2
|
328 |
+
, β (t, st) ≜ ζst
|
329 |
+
t
|
330 |
+
st! , ζt = −2Km,n|hn||hm|
|
331 |
+
det(J)
|
332 |
+
,
|
333 |
+
and s∗
|
334 |
+
t = st − st+1 with sT+1 = 0. The subscript t and m, n are related as follows: t =
|
335 |
+
n + (m − 1) N − m(m+1)
|
336 |
+
2
|
337 |
+
, m < n, while m, n can be obtained from t with m = min m′ ∈ Z
|
338 |
+
subject to �m′
|
339 |
+
i=1 (N − i) > t and n = t − (m − 1) N + m(m+1)
|
340 |
+
2
|
341 |
+
.
|
342 |
+
Note that s0 is a finite constant which has to be large for the approximation to be accurate.
|
343 |
+
In addition, v = [v1, . . . , vT]T, V denotes the set of all the possible permutations, and ∆i =
|
344 |
+
�N
|
345 |
+
n=1 Gi,n + �N
|
346 |
+
n=1 Gn,i − Gi,i. Furthermore, Km,n is the (m, n)-th entry of K where K is the
|
347 |
+
co-factor of J, and Gm,n is the (m, n)-th entry of G where G is defined as
|
348 |
+
G =
|
349 |
+
|
350 |
+
|
351 |
+
0
|
352 |
+
γ1
|
353 |
+
γ2
|
354 |
+
· · ·
|
355 |
+
γN−1
|
356 |
+
γN
|
357 |
+
· · ·
|
358 |
+
γ2N−3
|
359 |
+
...
|
360 |
+
...
|
361 |
+
...
|
362 |
+
γT
|
363 |
+
0
|
364 |
+
· · ·
|
365 |
+
0
|
366 |
+
|
367 |
+
|
368 |
+
,
|
369 |
+
(11)
|
370 |
+
and γt = 2vt − j∗
|
371 |
+
t ∈ Z.
|
372 |
+
Lemma 2. The CDF of |h| can be approximated as
|
373 |
+
F|h| (R1, . . . , RN) ≈
|
374 |
+
j0
|
375 |
+
�
|
376 |
+
j1=0
|
377 |
+
j1
|
378 |
+
�
|
379 |
+
j2=0
|
380 |
+
. . .
|
381 |
+
jp−1
|
382 |
+
�
|
383 |
+
jp=0
|
384 |
+
g (s∗)
|
385 |
+
πNdet(J)
|
386 |
+
T
|
387 |
+
�
|
388 |
+
t=1
|
389 |
+
(−Kt)s∗
|
390 |
+
t
|
391 |
+
s∗
|
392 |
+
t!det(J)s∗
|
393 |
+
t ×
|
394 |
+
N
|
395 |
+
�
|
396 |
+
n=1
|
397 |
+
� Kn,n
|
398 |
+
det(J)
|
399 |
+
�− ¯sn
|
400 |
+
2 −1 �
|
401 |
+
Γ
|
402 |
+
�
|
403 |
+
1 + ¯sn
|
404 |
+
2
|
405 |
+
�
|
406 |
+
− Γ
|
407 |
+
�
|
408 |
+
1 + ¯sn
|
409 |
+
2 , Kn,nR2
|
410 |
+
n
|
411 |
+
det(J)
|
412 |
+
��
|
413 |
+
.
|
414 |
+
(12)
|
415 |
+
|
416 |
+
8
|
417 |
+
Proof: See Appendix B.
|
418 |
+
In (12), ¯sn is the sum of s∗
|
419 |
+
t→m,n affecting |hn| and
|
420 |
+
g (s∗) =
|
421 |
+
�1
|
422 |
+
2
|
423 |
+
��T
|
424 |
+
t=1 s∗
|
425 |
+
t �
|
426 |
+
v∈V
|
427 |
+
|
428 |
+
|
429 |
+
T�
|
430 |
+
t=1
|
431 |
+
|
432 |
+
s∗
|
433 |
+
t
|
434 |
+
vt
|
435 |
+
|
436 |
+
|
437 |
+
|
438 |
+
(2π)N
|
439 |
+
N
|
440 |
+
�
|
441 |
+
i=1
|
442 |
+
1{∆i=0}.
|
443 |
+
(13)
|
444 |
+
The expressions in (10) and (12) are extremely complicated. Nevertheless, they enable us to
|
445 |
+
obtain more insightful derivations as shown later in this paper. Using the above lemmas, we
|
446 |
+
present the following theorems.
|
447 |
+
Theorem 3. The outage probability of FAS can be approximated in a closed-form expression as
|
448 |
+
P {|hFAS| < Ω} = F|h| (Ω, . . . , Ω)
|
449 |
+
(14)
|
450 |
+
≈
|
451 |
+
j0
|
452 |
+
�
|
453 |
+
j1=0
|
454 |
+
j1
|
455 |
+
�
|
456 |
+
j2=0
|
457 |
+
. . .
|
458 |
+
jp−1
|
459 |
+
�
|
460 |
+
jp=0
|
461 |
+
g (s∗)
|
462 |
+
πNdet(J)
|
463 |
+
T�
|
464 |
+
t=1
|
465 |
+
(−Kt)s∗
|
466 |
+
t
|
467 |
+
s∗
|
468 |
+
t!det(J)s∗
|
469 |
+
t ×
|
470 |
+
N
|
471 |
+
�
|
472 |
+
n=1
|
473 |
+
� Kn,n
|
474 |
+
det(J)
|
475 |
+
�− ¯sn
|
476 |
+
2 −1 �
|
477 |
+
Γ
|
478 |
+
�
|
479 |
+
1 + ¯sn
|
480 |
+
2
|
481 |
+
�
|
482 |
+
− Γ
|
483 |
+
�
|
484 |
+
1 + ¯sn
|
485 |
+
2 , Kn,nΩ2
|
486 |
+
det(J)
|
487 |
+
��
|
488 |
+
.
|
489 |
+
Proof: The result can be obtained using Lemma 2 and substituting R1 = · · · = RN = Ω.
|
490 |
+
Remark 4. According to [8], h can be modeled using ˆh =
|
491 |
+
�
|
492 |
+
ˆh1, . . . , ˆhN
|
493 |
+
�T
|
494 |
+
and using the latter
|
495 |
+
model, they show that the outage probability of FAS can be approximated by
|
496 |
+
F|hFAS| (Ω) ≈
|
497 |
+
|
498 |
+
|
499 |
+
N
|
500 |
+
�
|
501 |
+
n=1
|
502 |
+
∞
|
503 |
+
ˆ
|
504 |
+
0
|
505 |
+
1
|
506 |
+
�ǫ−rank
|
507 |
+
m=1
|
508 |
+
u2n,mλm
|
509 |
+
exp
|
510 |
+
�
|
511 |
+
−
|
512 |
+
r
|
513 |
+
�ǫ−rank
|
514 |
+
m=1
|
515 |
+
u2n,mλm
|
516 |
+
�
|
517 |
+
×
|
518 |
+
�
|
519 |
+
1 − Q1
|
520 |
+
�√
|
521 |
+
2r
|
522 |
+
Ψ ,
|
523 |
+
√
|
524 |
+
2Ω
|
525 |
+
Ψ
|
526 |
+
��L
|
527 |
+
dr
|
528 |
+
|
529 |
+
|
530 |
+
1
|
531 |
+
L
|
532 |
+
,
|
533 |
+
(15)
|
534 |
+
where Q1 (·, ·) is the Marcum-Q function and L = min
|
535 |
+
�
|
536 |
+
1.52(N−1)
|
537 |
+
2πW
|
538 |
+
, N
|
539 |
+
�
|
540 |
+
. Note that (15) is a
|
541 |
+
remarkable expression as each n term only has a single integral. Nevertheless, we found that it
|
542 |
+
is challenging to obtain deeper insights from this expression.
|
543 |
+
Theorem 5. The outage probability of FAS at high SNR is given by
|
544 |
+
P {|hFAS| < Ω} =
|
545 |
+
1
|
546 |
+
det(J)ΩN + o
|
547 |
+
�
|
548 |
+
1
|
549 |
+
SNRN
|
550 |
+
�
|
551 |
+
.
|
552 |
+
(16)
|
553 |
+
Proof: See Appendix C.
|
554 |
+
|
555 |
+
9
|
556 |
+
Theorem 6. The diversity gain of FAS is approximately expressed as
|
557 |
+
DFAS ≈ min {N, N′} ,
|
558 |
+
(17)
|
559 |
+
where N′ is the rank of J ′ such that J ′ is the covariance matrix as defined in (2) with N → ∞
|
560 |
+
for a fixed W.
|
561 |
+
Proof: See Appendix D.
|
562 |
+
In Theorem 5, we can interpret det
|
563 |
+
�
|
564 |
+
J −1�
|
565 |
+
as the penalty term and Ω as gain of FAS that scales
|
566 |
+
exponentially w.r.t. N. Meanwhile, the term with little-o can be ignored as it approaches zero if
|
567 |
+
the SNR is high. Nevertheless, in Theorem 6, we can see that the diversity gain is limited by
|
568 |
+
min {N, N′}. Thus, increasing N over N′ might not be useful. Notice that these interpretations
|
569 |
+
cannot be directly obtained from (15).
|
570 |
+
IV. SUBOPTIMAL SOLUTION: FAS WITH N∗ PORTS
|
571 |
+
At a fundamental level, [9] showed that increasing the number of channels (or ports) would
|
572 |
+
yield a diminishing gain (i.e., the average received SNR gain is �N
|
573 |
+
n
|
574 |
+
1
|
575 |
+
n.). In fact, [8] showed that
|
576 |
+
for a fixed W, the outage probability of FAS might remain similar after some N. For ease of
|
577 |
+
expositions, we denote this N as N∗ where N∗ ≤ N.
|
578 |
+
To the best of our knowledge, little is known about N∗. In fact, it is very challenging to
|
579 |
+
obtain N∗ as it varies with the parameter W or more precisely the correlation matrix J.4 Yet,
|
580 |
+
finding N∗ is essential in both theory and practice since it helps FAS to achieve an efficient
|
581 |
+
performance with a minimal number of ports. In this section, we present a simple method to
|
582 |
+
approximate N∗ for a given W.
|
583 |
+
To begin with, we present the following theorem.
|
584 |
+
Theorem 7. Suppose the channels of FAS with N ports are denoted by h. Then h can be
|
585 |
+
well-approximated by ˜h =
|
586 |
+
�
|
587 |
+
˜h1, . . . , ˜hN
|
588 |
+
�T
|
589 |
+
where
|
590 |
+
˜hn =
|
591 |
+
˜
|
592 |
+
N
|
593 |
+
�
|
594 |
+
m=1
|
595 |
+
un,m
|
596 |
+
�
|
597 |
+
λmzm,
|
598 |
+
(18)
|
599 |
+
where ˜N is the numerical rank of J. That is, the PDF and CDF of h and ˜h are similar.
|
600 |
+
4Referring to (1) and (2), we can see that N ∗ depends on the parameter W .
|
601 |
+
|
602 |
+
10
|
603 |
+
Proof: Let ˜N be the numerical rank of J where ˜N ≤ N. Using the definition of numerical
|
604 |
+
rank, we have λn < ǫ for n ∈
|
605 |
+
�
|
606 |
+
˜N + 1, . . . , N
|
607 |
+
�
|
608 |
+
where ǫ ≈ 0. According to Eckart-Young-Mirsky
|
609 |
+
theorem [36], the optimal ˜J that minimizes the Frobenius norm between matrix J and ˜J subject
|
610 |
+
to the constraint that rank
|
611 |
+
�
|
612 |
+
˜J
|
613 |
+
�
|
614 |
+
≤ ˜N is ˜J = U ˜ΛU H where ˜Λ = diag (λ1, . . . , λ ˜
|
615 |
+
N, 0, . . . 0).
|
616 |
+
Using this insight, we introduce ˜h as defined in Theorem 7 where the covariance of ˜h is ˜J
|
617 |
+
(i.e., the best approximation of J for rank
|
618 |
+
�
|
619 |
+
˜J
|
620 |
+
�
|
621 |
+
≤ ˜N). As a result, we can well-approximate h
|
622 |
+
using ˜h since the Frechet distance between the two distributions is [37]
|
623 |
+
W2
|
624 |
+
�
|
625 |
+
CN (0N×1, J) , CN
|
626 |
+
�
|
627 |
+
0N×1, ˜J
|
628 |
+
��
|
629 |
+
=
|
630 |
+
����(Λ)
|
631 |
+
1
|
632 |
+
2 −
|
633 |
+
�
|
634 |
+
˜Λ
|
635 |
+
� 1
|
636 |
+
2
|
637 |
+
����
|
638 |
+
2
|
639 |
+
F
|
640 |
+
≈ 0.
|
641 |
+
(19)
|
642 |
+
Corollary 8. If we have the exact eigenvalues and rank of J, then h = ˜h.
|
643 |
+
Proof: Let Λ and ˜N be the exact rank and eigenvalues of J. Using the definition of rank,
|
644 |
+
we have λn = 0 for n ∈
|
645 |
+
�
|
646 |
+
˜N + 1, . . . , N
|
647 |
+
�
|
648 |
+
. It then follows that the Frechet distance between the
|
649 |
+
distributions of h and ˜h is zero.
|
650 |
+
As seen in (19), it is the eigenvalues of correlation matrix that plays a critical role in the
|
651 |
+
channel approximation. Motivated by this insight, we introduce a new formula as follows:
|
652 |
+
εN∗ = SN − SN∗ = σ2 − SN∗,
|
653 |
+
(20)
|
654 |
+
where SN∗ = 1
|
655 |
+
N
|
656 |
+
�N∗
|
657 |
+
n=1 λn. Note that (20) is analogous to (19) in the sense that the left hand side
|
658 |
+
of (20) measures the gap between the distributions of h and h∗, where h∗ is similarly defined
|
659 |
+
as in (18) but we instead replace ˜N with N∗ and impose that N∗ ≤ ˜N. Meanwhile, on the right
|
660 |
+
hand side of (20), we consider the average eigenvalues of J ∗, where J ∗ is the covariance of h∗.
|
661 |
+
To reduce the number of required ports, we define εtol > 0 and find the smallest integer N∗
|
662 |
+
such that εtol ≥ εN∗. Since J ∗ only has N∗ dominant eigenvalues, we propose to employ a
|
663 |
+
suboptimal FAS with N∗ ports. Interestingly, εtol has a nice heuristic interpretation in practice.
|
664 |
+
Specifically, it defines the sub-optimality of the proposed FAS, i.e., the proposed FAS is near
|
665 |
+
optimal if εtol is small and less optimal if εtol is large.
|
666 |
+
By fixing εtol appropriately,5 we observe that FAS with N∗ ports yields considerable improve-
|
667 |
+
ment over all FAS with N < N∗ ports while most of the FAS with N > N∗ ports yields
|
668 |
+
5We recommend to set εtol = 0.01σ2 (i.e., the average eigenvalues of J ∗ is 99% of that of J)
|
669 |
+
|
670 |
+
11
|
671 |
+
Algorithm 1 Method of approximating N∗ given W
|
672 |
+
1: Input: W, εtol; Output: N∗
|
673 |
+
2: Compute J = UΛU H
|
674 |
+
3: Define n = 1 and compute εn
|
675 |
+
4:
|
676 |
+
While εtol < εn and n < ˜N
|
677 |
+
5:
|
678 |
+
n = n + 1
|
679 |
+
6:
|
680 |
+
εn = σ2 − Sn
|
681 |
+
7: end
|
682 |
+
8: Return n as N∗
|
683 |
+
marginal improvement over FAS with N − 1 ports. Note that we usually have N∗ < ˜N if J is
|
684 |
+
ill-conditioned and N∗ = ˜N if J is well-conditioned.
|
685 |
+
The method of approximating N∗ is given in Algorithm 1. To measure the computational
|
686 |
+
complexity of our algorithm, we consider the floating-point operations (flops). A flop is defined
|
687 |
+
as one addition, subtraction, multiplication or division of two floating point numbers [38].
|
688 |
+
In Algorithm 1, computing J and UΛU H requires 6N2 and 21N3 flops, respectively [39].
|
689 |
+
Computing εn requires n + 1 flops for each n. Therefore, the total flops of Algorithm 1 is
|
690 |
+
21N3 +6N2 + 1
|
691 |
+
2N∗2 + 3
|
692 |
+
2N∗, which has a polynomial time-complexity of O (N3) since N∗ ≤ N.
|
693 |
+
In other words, Algorithm 1 is only dominated by the computation of UΛU H.
|
694 |
+
Note that N∗ is also useful in theory. For example, Lemma 1 and 2 and Theorem 3, 5, and
|
695 |
+
6 are incalculable if J is near-singular. To address this, we present the following theorem.
|
696 |
+
Theorem 9. If J is near-singular, then we can approximate the channels of FAS with N ports
|
697 |
+
using N∗ ports from a computational perspective. Nevertheless, a small gap between the channel
|
698 |
+
distributions of FAS with N ports and that of N∗ ports might exist.
|
699 |
+
Proof: If J is near-singular, then one or more entries are almost linear combinations of
|
700 |
+
the other entries. Thus, we can remove these nearly-dependent entries and only consider N∗
|
701 |
+
independent entries. Since FAS with N∗ ports has N∗ dominant eigenvalues, Lemma 1 and 2
|
702 |
+
and Theorem 3, 5, and 6 are calculable. Nevertheless, there might be a small gap between the
|
703 |
+
channel distributions of FAS with N ports and that of N∗ ports since the entries are nearly-
|
704 |
+
dependent only.
|
705 |
+
|
706 |
+
12
|
707 |
+
(a)
|
708 |
+
(b)
|
709 |
+
Figure 1: FAS with 2 ports: (a) joint PDF; (b) joint CDF.
|
710 |
+
V. RESULTS AND DISCUSSION
|
711 |
+
In this section, we present simulation results to better understand the performance of FAS.
|
712 |
+
We focus on the design of an efficient FAS as well as the factors that limit its performance.
|
713 |
+
Unless stated otherwise, we assume that σ2 = 1, N = 50, W = 0.5, q = 10 and SNR = 30dB.
|
714 |
+
Firstly, we demonstrate the accuracy of (10) and (12). In order to visualize the joint PDF and
|
715 |
+
CDF of |h|, we consider a FAS with 2 ports (i.e., N = 2). In Fig. 1, the red grid represents
|
716 |
+
the numerical PDF/CDF while the solid surface is the analytical PDF/CDF. As observed, the
|
717 |
+
approximation of the PDF/CDF of |h| matches closely with the numerical ones over all the
|
718 |
+
distributed region. Still, it is worth noting that (10) and (12) are very complicated. Thus,
|
719 |
+
approximations with simpler expressions remain desirable.
|
720 |
+
In Fig. 2, we compute the outage probability of FAS versus SNR for different N and W.
|
721 |
+
Comparing Fig. 2(a) and Fig. 2(b), we can clearly see that the outage probability is mainly
|
722 |
+
limited by W. In particular, if W is small and N is large, the outage probability remains similar
|
723 |
+
which is in alignment with the findings of [8]. Nevertheless, if W is sufficiently large, the outage
|
724 |
+
probability decreases significantly as N increases.
|
725 |
+
To better understand this, we further compare the outage probability of FAS to (15) and (16).
|
726 |
+
In Fig. 3, we can see that (15) is less accurate while (16) is accurate as SNR increases. From
|
727 |
+
(16), we learn that det
|
728 |
+
�
|
729 |
+
J −1�
|
730 |
+
plays a critical role in the performance of FAS. In particular, J
|
731 |
+
has to be well-conditioned in order for ΩN to be the dominant term. If J is near-singular, then
|
732 |
+
|
733 |
+
30.8
|
734 |
+
0.6
|
735 |
+
CDF
|
736 |
+
0.4
|
737 |
+
0.2
|
738 |
+
0
|
739 |
+
4
|
740 |
+
3
|
741 |
+
2
|
742 |
+
1
|
743 |
+
1
|
744 |
+
0
|
745 |
+
0
|
746 |
+
[h2]
|
747 |
+
[hi]0.03Q.0
|
748 |
+
0.6
|
749 |
+
PDF
|
750 |
+
0.4
|
751 |
+
0.2
|
752 |
+
0
|
753 |
+
4
|
754 |
+
3
|
755 |
+
2
|
756 |
+
2
|
757 |
+
1
|
758 |
+
1
|
759 |
+
[h2]
|
760 |
+
0
|
761 |
+
0
|
762 |
+
[hi]13
|
763 |
+
10
|
764 |
+
15
|
765 |
+
20
|
766 |
+
25
|
767 |
+
30
|
768 |
+
35
|
769 |
+
40
|
770 |
+
45
|
771 |
+
50
|
772 |
+
SNR
|
773 |
+
10-6
|
774 |
+
10-5
|
775 |
+
10-4
|
776 |
+
10-3
|
777 |
+
10-2
|
778 |
+
10-1
|
779 |
+
100
|
780 |
+
Outage probability
|
781 |
+
(a)
|
782 |
+
10
|
783 |
+
15
|
784 |
+
20
|
785 |
+
25
|
786 |
+
30
|
787 |
+
35
|
788 |
+
40
|
789 |
+
45
|
790 |
+
50
|
791 |
+
SNR
|
792 |
+
10-6
|
793 |
+
10-5
|
794 |
+
10-4
|
795 |
+
10-3
|
796 |
+
10-2
|
797 |
+
10-1
|
798 |
+
100
|
799 |
+
Outage probability
|
800 |
+
(b)
|
801 |
+
Figure 2: Outage probability of FAS versus SNR for different N and W: (a) W = 0.5; (b)
|
802 |
+
W = 10.
|
803 |
+
10
|
804 |
+
15
|
805 |
+
20
|
806 |
+
25
|
807 |
+
30
|
808 |
+
35
|
809 |
+
40
|
810 |
+
45
|
811 |
+
50
|
812 |
+
55
|
813 |
+
60
|
814 |
+
SNR
|
815 |
+
10-7
|
816 |
+
10-6
|
817 |
+
10-5
|
818 |
+
10-4
|
819 |
+
10-3
|
820 |
+
10-2
|
821 |
+
10-1
|
822 |
+
100
|
823 |
+
Outage probability
|
824 |
+
Figure 3: Outage probability of FAS at high SNR.
|
825 |
+
the parameter N is no longer important. This is because det
|
826 |
+
�
|
827 |
+
J −1�
|
828 |
+
cannot be compensated by
|
829 |
+
ΩN. To make J a well-conditioned matrix, we can either increase W for a fixed N or decrease
|
830 |
+
N for a fixed W. Nevertheless, we believe that larger N does not cause any harm to the system
|
831 |
+
in practice. It only makes the theoretical analysis harder.
|
832 |
+
As shown in Fig. 4(a), we compare the outage probability of FAS with N ports and that of
|
833 |
+
N′ ports for different W where N < N′. As it is seen, the outage probability of the earlier
|
834 |
+
is lower bounded by the latter regardless of W. In Fig. 4(b), we investigate the opposite case
|
835 |
+
|
836 |
+
14
|
837 |
+
10
|
838 |
+
15
|
839 |
+
20
|
840 |
+
25
|
841 |
+
30
|
842 |
+
35
|
843 |
+
40
|
844 |
+
45
|
845 |
+
50
|
846 |
+
SNR
|
847 |
+
10-4
|
848 |
+
10-3
|
849 |
+
10-2
|
850 |
+
10-1
|
851 |
+
100
|
852 |
+
Outage probability
|
853 |
+
(a)
|
854 |
+
10
|
855 |
+
15
|
856 |
+
20
|
857 |
+
25
|
858 |
+
30
|
859 |
+
35
|
860 |
+
40
|
861 |
+
45
|
862 |
+
50
|
863 |
+
SNR
|
864 |
+
10-4
|
865 |
+
10-3
|
866 |
+
10-2
|
867 |
+
10-1
|
868 |
+
100
|
869 |
+
Outage probability
|
870 |
+
(b)
|
871 |
+
Figure 4: Outage probability of FAS with N ports versus ˜N ports: (a) N = 3 <
|
872 |
+
˜N; (b)
|
873 |
+
N = 50 > ˜N .
|
874 |
+
where N > N′. As observed, the outage probability of FAS with N ports and that of N′ ports
|
875 |
+
are the same for different W. Thus, the diversity gain of FAS is limited by min {N, N′}, which
|
876 |
+
verifies Theorem 6. Theorem 6 also suggests that increasing the ports beyond N′ provides no
|
877 |
+
improvement in a point-to-point setting.
|
878 |
+
Fig. 5(a) presents the CDF of h and ˜h where we fix R1 = · · · = RN = R. In the result, no
|
879 |
+
significant variation is observed between h and ˜h regardless of R, N and W. This is because
|
880 |
+
the Frechet distance between the two distributions is always near zero. This confirms Theorem
|
881 |
+
7 and suggests that one can always use ˜h instead of h. In addition, Fig. 5(b) shows the CDF of
|
882 |
+
h and h∗. Unlike the previous result, there is a small gap between the two distributions as W
|
883 |
+
increases. Despite having some gaps, the approximation is still fairly good. This result verifies
|
884 |
+
Theorem 9.
|
885 |
+
Next, we investigate the accuracy of Algorithm 1 and the efficiency of the proposed suboptimal
|
886 |
+
FAS. The parameter N∗ for different W using Algorithm 1 is summarized in Table I. As it is
|
887 |
+
seen, the outage probability of FAS with N∗ ports is promising. Specifically, FAS with N∗ ports
|
888 |
+
yields a significant improvement over FAS with N∗ −1 ports. Meanwhile, FAS with N +1 ports
|
889 |
+
provides negligible improvement over FAS with N∗ ports. Thus, we may use the suboptimal
|
890 |
+
FAS for an efficient performance.
|
891 |
+
Finally in Fig. 7, we compare the outage probability of the proposed suboptimal FAS, the
|
892 |
+
|
893 |
+
15
|
894 |
+
0
|
895 |
+
0.5
|
896 |
+
1
|
897 |
+
1.5
|
898 |
+
2
|
899 |
+
2.5
|
900 |
+
3
|
901 |
+
3.5
|
902 |
+
4
|
903 |
+
0
|
904 |
+
0.1
|
905 |
+
0.2
|
906 |
+
0.3
|
907 |
+
0.4
|
908 |
+
0.5
|
909 |
+
0.6
|
910 |
+
0.7
|
911 |
+
0.8
|
912 |
+
0.9
|
913 |
+
1
|
914 |
+
CDF
|
915 |
+
(a)
|
916 |
+
0
|
917 |
+
0.5
|
918 |
+
1
|
919 |
+
1.5
|
920 |
+
2
|
921 |
+
2.5
|
922 |
+
3
|
923 |
+
3.5
|
924 |
+
4
|
925 |
+
0
|
926 |
+
0.1
|
927 |
+
0.2
|
928 |
+
0.3
|
929 |
+
0.4
|
930 |
+
0.5
|
931 |
+
0.6
|
932 |
+
0.7
|
933 |
+
0.8
|
934 |
+
0.9
|
935 |
+
1
|
936 |
+
CDF
|
937 |
+
(b)
|
938 |
+
Figure 5: CDF between: (a) h and ˜h; (b) h and h∗.
|
939 |
+
Table I: Parameter N∗ generated by algorithm 1 for different W.
|
940 |
+
W
|
941 |
+
0.5
|
942 |
+
1
|
943 |
+
2
|
944 |
+
3
|
945 |
+
4
|
946 |
+
N ∗
|
947 |
+
3
|
948 |
+
4
|
949 |
+
6
|
950 |
+
8
|
951 |
+
10
|
952 |
+
optimal FAS, the single antenna (SISO) system, the N-branch SC system, and the N-branch
|
953 |
+
MRC system. In SC and MRC systems, we assume there are N RF-chains where each antenna
|
954 |
+
has to be at least λ
|
955 |
+
2 apart and their spatial correlations are considered. Results show that the
|
956 |
+
proposed suboptimal FAS outperforms SISO and SC systems. This improvement is due to the
|
957 |
+
ability of FAS switching to the best port within a finite W.
|
958 |
+
In addition, MRC has the lowest outage probability. It outperforms optimal FAS. This su-
|
959 |
+
periority is due to the power gain where a larger number of active RF-chains (i.e.,
|
960 |
+
� W
|
961 |
+
0.5
|
962 |
+
�
|
963 |
+
+ 1)
|
964 |
+
is utilized. Although MRC is more superior than the suboptimal FAS, the latter can achieve a
|
965 |
+
similar performance as compared to the earlier when W = 0.5. Yet, it is important to recall
|
966 |
+
that MRC has one additional RF-chain as compared to the suboptimal FAS in this case. Thus, it
|
967 |
+
will be very interesting to compare the performance of MIMO-FAS and MIMO with the same
|
968 |
+
number of RF-chains.
|
969 |
+
|
970 |
+
16
|
971 |
+
10
|
972 |
+
15
|
973 |
+
20
|
974 |
+
25
|
975 |
+
30
|
976 |
+
35
|
977 |
+
40
|
978 |
+
45
|
979 |
+
50
|
980 |
+
SNR
|
981 |
+
10-4
|
982 |
+
10-3
|
983 |
+
10-2
|
984 |
+
10-1
|
985 |
+
100
|
986 |
+
Outage probability
|
987 |
+
W=4
|
988 |
+
W=2
|
989 |
+
W=1
|
990 |
+
W=0.5
|
991 |
+
W=3
|
992 |
+
Figure 6: Outage probability of suboptimal FAS.
|
993 |
+
0.5
|
994 |
+
1
|
995 |
+
1.5
|
996 |
+
2
|
997 |
+
2.5
|
998 |
+
3
|
999 |
+
3.5
|
1000 |
+
4
|
1001 |
+
10-6
|
1002 |
+
10-5
|
1003 |
+
10-4
|
1004 |
+
10-3
|
1005 |
+
10-2
|
1006 |
+
10-1
|
1007 |
+
100
|
1008 |
+
Outage probability
|
1009 |
+
Figure 7: Outage probability of suboptimal FAS vs. SISO, SC, and MRC.
|
1010 |
+
VI. CONCLUSIONS
|
1011 |
+
In this paper, we consider FAS and approximate its outage probability and diversity gain in
|
1012 |
+
closed-form expressions. New meaningful insights are obtained from the analytical results, and
|
1013 |
+
simulation results are given to better understand the factors that limit the performance of FAS.
|
1014 |
+
Our results show that the performance of FAS strongly depends on the spatial correlation matrix
|
1015 |
+
J. Specifically, increasing the ports beyond N′ yields no diversity gain in a point-to-point setting.
|
1016 |
+
Instead, increasing N causes the correlation matrix J to be ill-conditioned. To address this, one
|
1017 |
+
can either increase W for a fixed N or decrease N for a fixed W. In addition, we propose a
|
1018 |
+
suboptimal FAS with N∗ ports. By fixing an appropriate εtol, the proposed scheme enables us to
|
1019 |
+
|
1020 |
+
17
|
1021 |
+
obtain a significant gain over FAS with N∗ − 1 while it nearly achieves the same performance
|
1022 |
+
as FAS with N∗ + 1 ports. Thus, the approximation of N∗ is pragmatically useful since a larger
|
1023 |
+
number of ports yields diminishing gains and additional costs. Furthermore, N∗ can be used to
|
1024 |
+
approximate the channels of FAS with N ports if the correlation matrix J is near-singular. Last
|
1025 |
+
but not least, the proposed suboptimal FAS outperforms SISO and SC systems but falls behind
|
1026 |
+
MRC due to having a single active RF-chain. Nevertheless, it is discovered that suboptimal FAS
|
1027 |
+
and MRC achieve similar performance when W = 0.5. Thus, it will be interesting to study the
|
1028 |
+
performance of MIMO-FAS and MIMO in the future.
|
1029 |
+
APPENDIX A: APPROXIMATED PDF OF |h|
|
1030 |
+
The exact PDF of |h| is first derived in [23]–[25]. In this paper, we employ similar steps
|
1031 |
+
and further approximate the PDF of |h| by introducing G: an N × N matrix, using an accurate
|
1032 |
+
binomial theorem, and truncating the infinite series to a finite one for ease of computation.
|
1033 |
+
According to [34], the PDF of a circularly symmetric complex Gaussian random variables is
|
1034 |
+
known as
|
1035 |
+
f (h) =
|
1036 |
+
1
|
1037 |
+
πNdet(J) exp
|
1038 |
+
�
|
1039 |
+
−hHJ −1h
|
1040 |
+
�
|
1041 |
+
,
|
1042 |
+
(21)
|
1043 |
+
where J −1 =
|
1044 |
+
KT
|
1045 |
+
det(J) via Crammer rule. Using [40, (7-8) & (7-9)], the PDF of (21) in terms of
|
1046 |
+
its amplitude and phase can be obtained as
|
1047 |
+
f|h|,θ (|h1| , θ1, . . . , |hN| , θN) = η
|
1048 |
+
T�
|
1049 |
+
t=1
|
1050 |
+
exp
|
1051 |
+
�
|
1052 |
+
ζt cos
|
1053 |
+
�¯θt
|
1054 |
+
��
|
1055 |
+
,
|
1056 |
+
(22)
|
1057 |
+
where η =
|
1058 |
+
N
|
1059 |
+
�
|
1060 |
+
n=1
|
1061 |
+
|hn|
|
1062 |
+
πNdet(J) exp
|
1063 |
+
�
|
1064 |
+
−
|
1065 |
+
�N
|
1066 |
+
n=1|hn|2Kn,n
|
1067 |
+
det(J)
|
1068 |
+
�
|
1069 |
+
, T = N(N−1)
|
1070 |
+
2
|
1071 |
+
, ζt = −2Km,n|hn||hm|
|
1072 |
+
det(J)
|
1073 |
+
and ¯θt = θn − θm.
|
1074 |
+
In (22), we use the mapping function where t = n + (m − 1) N − m(m+1)
|
1075 |
+
2
|
1076 |
+
, m < n, while
|
1077 |
+
(m, n) can be obtained from t by setting m = min m′ ∈ Z subject to �m′
|
1078 |
+
i=1 (N − i) > t and
|
1079 |
+
n = t − (m − 1) N + m(m+1)
|
1080 |
+
2
|
1081 |
+
.
|
1082 |
+
|
1083 |
+
18
|
1084 |
+
Integrating (22) w.r.t. θn, ∀n over [0, 2π], we have
|
1085 |
+
f|h| (|h1| , . . . , |hN|)
|
1086 |
+
=
|
1087 |
+
ˆ 2π
|
1088 |
+
0
|
1089 |
+
· · ·
|
1090 |
+
ˆ 2π
|
1091 |
+
0
|
1092 |
+
f (|h1| , θ1, . . . , |hN| , θN) dθ1 . . . dθN
|
1093 |
+
(23)
|
1094 |
+
(a)
|
1095 |
+
=η
|
1096 |
+
ˆ 2π
|
1097 |
+
0
|
1098 |
+
· · ·
|
1099 |
+
ˆ 2π
|
1100 |
+
0
|
1101 |
+
T�
|
1102 |
+
t=1
|
1103 |
+
∞
|
1104 |
+
�
|
1105 |
+
st=0
|
1106 |
+
ζst
|
1107 |
+
t
|
1108 |
+
st! cos
|
1109 |
+
�¯θt
|
1110 |
+
�st dθ1 . . . dθN
|
1111 |
+
(24)
|
1112 |
+
(b)
|
1113 |
+
=η
|
1114 |
+
∞
|
1115 |
+
�
|
1116 |
+
s1=0
|
1117 |
+
s1
|
1118 |
+
�
|
1119 |
+
s2=0
|
1120 |
+
. . .
|
1121 |
+
sT −1
|
1122 |
+
�
|
1123 |
+
sT =0
|
1124 |
+
T�
|
1125 |
+
t=1
|
1126 |
+
β (t, s∗
|
1127 |
+
t)
|
1128 |
+
ˆ 2π
|
1129 |
+
0
|
1130 |
+
· · ·
|
1131 |
+
ˆ 2π
|
1132 |
+
0
|
1133 |
+
cos
|
1134 |
+
�¯θt
|
1135 |
+
�s∗
|
1136 |
+
t dθ1 . . . dθN
|
1137 |
+
(25)
|
1138 |
+
(c)
|
1139 |
+
=η
|
1140 |
+
∞
|
1141 |
+
�
|
1142 |
+
s1=0
|
1143 |
+
s1
|
1144 |
+
�
|
1145 |
+
s2=0
|
1146 |
+
. . .
|
1147 |
+
sT −1
|
1148 |
+
�
|
1149 |
+
sT =0
|
1150 |
+
�1
|
1151 |
+
2
|
1152 |
+
��T
|
1153 |
+
t=1 s∗
|
1154 |
+
t
|
1155 |
+
T�
|
1156 |
+
t=1
|
1157 |
+
β (t, s∗
|
1158 |
+
t) ×
|
1159 |
+
(26)
|
1160 |
+
ˆ 2π
|
1161 |
+
0
|
1162 |
+
· · ·
|
1163 |
+
ˆ 2π
|
1164 |
+
0
|
1165 |
+
T�
|
1166 |
+
t=1
|
1167 |
+
�
|
1168 |
+
exp
|
1169 |
+
�
|
1170 |
+
j¯θt
|
1171 |
+
�
|
1172 |
+
+ exp
|
1173 |
+
�
|
1174 |
+
−j¯θt
|
1175 |
+
��s∗
|
1176 |
+
t dθ1 . . . dθN
|
1177 |
+
(d)
|
1178 |
+
=η
|
1179 |
+
∞
|
1180 |
+
�
|
1181 |
+
s1=0
|
1182 |
+
. . .
|
1183 |
+
sT −1
|
1184 |
+
�
|
1185 |
+
sT =0
|
1186 |
+
�1
|
1187 |
+
2
|
1188 |
+
��T
|
1189 |
+
t=1 s∗
|
1190 |
+
t
|
1191 |
+
T�
|
1192 |
+
t=1
|
1193 |
+
β (t, s∗
|
1194 |
+
t)
|
1195 |
+
�
|
1196 |
+
v∈V
|
1197 |
+
T
|
1198 |
+
�
|
1199 |
+
t=1
|
1200 |
+
|
1201 |
+
s∗
|
1202 |
+
t
|
1203 |
+
vt
|
1204 |
+
|
1205 |
+
×
|
1206 |
+
(27)
|
1207 |
+
ˆ 2π
|
1208 |
+
0
|
1209 |
+
· · ·
|
1210 |
+
ˆ 2π
|
1211 |
+
0
|
1212 |
+
exp
|
1213 |
+
�
|
1214 |
+
j
|
1215 |
+
T
|
1216 |
+
�
|
1217 |
+
t=1
|
1218 |
+
γt¯θt
|
1219 |
+
�
|
1220 |
+
dθ1 . . . dθN,
|
1221 |
+
where (24) is obtained by using exp {x} = �∞
|
1222 |
+
s=0
|
1223 |
+
xs
|
1224 |
+
s! and (25) is obtained using Cauchy product
|
1225 |
+
of power series where β (t, st) ≜
|
1226 |
+
ζst
|
1227 |
+
t
|
1228 |
+
st! and s∗
|
1229 |
+
t = st − st+1 with sT+1 = 0. Furthermore, (26)
|
1230 |
+
is obtained using cos (x) = exp(jx)+exp(−jx)
|
1231 |
+
2
|
1232 |
+
and (27) is obtained using binomial theorem where
|
1233 |
+
v = [v1, . . . , vT]T, V denotes the set of all the possible permutations and γt = 2vt − j∗
|
1234 |
+
t ∈ Z.
|
1235 |
+
Note that
|
1236 |
+
´ 2π
|
1237 |
+
0
|
1238 |
+
· · ·
|
1239 |
+
´ 2π
|
1240 |
+
0
|
1241 |
+
exp
|
1242 |
+
�
|
1243 |
+
j �T
|
1244 |
+
t=1 γt¯xt
|
1245 |
+
�
|
1246 |
+
dθ1 . . . dθN = (2π)N if and only if �T
|
1247 |
+
t=1 γt¯xt = 0,
|
1248 |
+
and otherwise zero. Therefore, we introduce a new matrix G as defined in (11) and the matrix
|
1249 |
+
¯Θ given by
|
1250 |
+
¯Θ =
|
1251 |
+
|
1252 |
+
|
1253 |
+
0
|
1254 |
+
¯θ1
|
1255 |
+
¯θ2
|
1256 |
+
. . .
|
1257 |
+
¯θN−1
|
1258 |
+
¯θN
|
1259 |
+
. . .
|
1260 |
+
¯θ2N−3
|
1261 |
+
...
|
1262 |
+
...
|
1263 |
+
...
|
1264 |
+
¯θT
|
1265 |
+
0
|
1266 |
+
. . .
|
1267 |
+
0
|
1268 |
+
|
1269 |
+
|
1270 |
+
=
|
1271 |
+
|
1272 |
+
|
1273 |
+
0
|
1274 |
+
θ2 − θ1
|
1275 |
+
θ3 − θ1
|
1276 |
+
. . .
|
1277 |
+
θN − θ1
|
1278 |
+
θ3 − θ2
|
1279 |
+
. . .
|
1280 |
+
θN − θ2
|
1281 |
+
...
|
1282 |
+
...
|
1283 |
+
...
|
1284 |
+
θN − θN−1
|
1285 |
+
0
|
1286 |
+
. . .
|
1287 |
+
0
|
1288 |
+
|
1289 |
+
|
1290 |
+
.
|
1291 |
+
(28)
|
1292 |
+
Using ¯Θ and G, we can easily integrate (27) w.r.t. to θi by taking the sum of the same entries
|
1293 |
+
|
1294 |
+
19
|
1295 |
+
of G as that of ¯Θ with θi, i.e., ∆i = �N
|
1296 |
+
n=1 Gi,n + �N
|
1297 |
+
n=1 Gn,i − Gi,i. Therefore, (27) leads to
|
1298 |
+
(27) =η
|
1299 |
+
∞
|
1300 |
+
�
|
1301 |
+
s1=0
|
1302 |
+
s1
|
1303 |
+
�
|
1304 |
+
s2=0
|
1305 |
+
. . .
|
1306 |
+
sT −1
|
1307 |
+
�
|
1308 |
+
sT =0
|
1309 |
+
�1
|
1310 |
+
2
|
1311 |
+
��T
|
1312 |
+
t=1 s∗
|
1313 |
+
t
|
1314 |
+
T
|
1315 |
+
�
|
1316 |
+
t=1
|
1317 |
+
β (t, s∗
|
1318 |
+
t)
|
1319 |
+
�
|
1320 |
+
v∈V
|
1321 |
+
|
1322 |
+
|
1323 |
+
T�
|
1324 |
+
t=1
|
1325 |
+
|
1326 |
+
s∗
|
1327 |
+
t
|
1328 |
+
vt
|
1329 |
+
|
1330 |
+
|
1331 |
+
|
1332 |
+
|
1333 |
+
�
|
1334 |
+
(2π)N
|
1335 |
+
N
|
1336 |
+
�
|
1337 |
+
i=1
|
1338 |
+
1{∆=0}
|
1339 |
+
�
|
1340 |
+
(29)
|
1341 |
+
(a)
|
1342 |
+
≈η
|
1343 |
+
s0
|
1344 |
+
�
|
1345 |
+
s1=0
|
1346 |
+
s1
|
1347 |
+
�
|
1348 |
+
s2=0
|
1349 |
+
. . .
|
1350 |
+
sT −1
|
1351 |
+
�
|
1352 |
+
sT =0
|
1353 |
+
�1
|
1354 |
+
2
|
1355 |
+
��T
|
1356 |
+
t=1 s∗
|
1357 |
+
t
|
1358 |
+
T
|
1359 |
+
�
|
1360 |
+
t=1
|
1361 |
+
β (t, s∗
|
1362 |
+
t)
|
1363 |
+
�
|
1364 |
+
v∈V
|
1365 |
+
|
1366 |
+
|
1367 |
+
T�
|
1368 |
+
t=1
|
1369 |
+
|
1370 |
+
s∗
|
1371 |
+
t
|
1372 |
+
vt
|
1373 |
+
|
1374 |
+
|
1375 |
+
|
1376 |
+
|
1377 |
+
�
|
1378 |
+
(2π)N
|
1379 |
+
N
|
1380 |
+
�
|
1381 |
+
i=1
|
1382 |
+
1{∆i=0}
|
1383 |
+
�
|
1384 |
+
,
|
1385 |
+
(30)
|
1386 |
+
where (a) can be obtained since β (t, s∗
|
1387 |
+
t) ≈ 0 if s∗
|
1388 |
+
t is sufficiently large.
|
1389 |
+
APPENDIX B: APPROXIMATED CDF OF |h|
|
1390 |
+
Using (10), the CDF of |h| can be obtained as
|
1391 |
+
F (R1, . . . , RN)
|
1392 |
+
≈
|
1393 |
+
ˆ R1
|
1394 |
+
0
|
1395 |
+
. . .
|
1396 |
+
ˆ RN
|
1397 |
+
0
|
1398 |
+
f|h| (|h1| , . . . , |hN|) d |h1| · · · d |hN|
|
1399 |
+
(31)
|
1400 |
+
=
|
1401 |
+
s0
|
1402 |
+
�
|
1403 |
+
s1=0
|
1404 |
+
s1
|
1405 |
+
�
|
1406 |
+
s2=0
|
1407 |
+
. . .
|
1408 |
+
sT −1
|
1409 |
+
�
|
1410 |
+
sT =0
|
1411 |
+
g (s∗)
|
1412 |
+
πNdet(J)
|
1413 |
+
T�
|
1414 |
+
t=1
|
1415 |
+
(−2Km,n→t)s∗
|
1416 |
+
t
|
1417 |
+
s∗
|
1418 |
+
t!det(J)s∗
|
1419 |
+
t
|
1420 |
+
ˆ R1
|
1421 |
+
0
|
1422 |
+
. . .
|
1423 |
+
ˆ RN
|
1424 |
+
0
|
1425 |
+
×
|
1426 |
+
(32)
|
1427 |
+
N
|
1428 |
+
�
|
1429 |
+
n=1
|
1430 |
+
|hn|
|
1431 |
+
N
|
1432 |
+
�
|
1433 |
+
n=1
|
1434 |
+
N
|
1435 |
+
�
|
1436 |
+
m<n
|
1437 |
+
(|hn| |hm|)s∗
|
1438 |
+
t→m,n exp
|
1439 |
+
�
|
1440 |
+
−
|
1441 |
+
�N
|
1442 |
+
n=1 |hn|2 Kn,n
|
1443 |
+
det(J)
|
1444 |
+
�
|
1445 |
+
d |h1| · · · d |hN|
|
1446 |
+
=
|
1447 |
+
s0
|
1448 |
+
�
|
1449 |
+
s1=0
|
1450 |
+
s1
|
1451 |
+
�
|
1452 |
+
s2=0
|
1453 |
+
. . .
|
1454 |
+
sT −1
|
1455 |
+
�
|
1456 |
+
sT =0
|
1457 |
+
g (s∗)
|
1458 |
+
πNdet(J)
|
1459 |
+
T�
|
1460 |
+
t=1
|
1461 |
+
(−2Km,n→t)s∗
|
1462 |
+
t
|
1463 |
+
s∗
|
1464 |
+
t!det(J)s∗
|
1465 |
+
t
|
1466 |
+
×
|
1467 |
+
(33)
|
1468 |
+
N
|
1469 |
+
�
|
1470 |
+
n=1
|
1471 |
+
ˆ Rn
|
1472 |
+
0
|
1473 |
+
|hn|¯sn+1 exp
|
1474 |
+
�
|
1475 |
+
−|hn|2 Kn,n
|
1476 |
+
det(J)
|
1477 |
+
�
|
1478 |
+
d |h1| · · · d |hN|
|
1479 |
+
=
|
1480 |
+
j0
|
1481 |
+
�
|
1482 |
+
j1=0
|
1483 |
+
j1
|
1484 |
+
�
|
1485 |
+
j2=0
|
1486 |
+
. . .
|
1487 |
+
jp−1
|
1488 |
+
�
|
1489 |
+
jp=0
|
1490 |
+
g (s∗)
|
1491 |
+
πNdet(J)
|
1492 |
+
T�
|
1493 |
+
t=1
|
1494 |
+
(−Kt)s∗
|
1495 |
+
t
|
1496 |
+
s∗
|
1497 |
+
t!det(J)s∗
|
1498 |
+
t ×
|
1499 |
+
(34)
|
1500 |
+
N
|
1501 |
+
�
|
1502 |
+
n=1
|
1503 |
+
� Kn,n
|
1504 |
+
det(J)
|
1505 |
+
�− ¯sn
|
1506 |
+
2 −1 �
|
1507 |
+
Γ
|
1508 |
+
�
|
1509 |
+
1 + ¯sn
|
1510 |
+
2
|
1511 |
+
�
|
1512 |
+
− Γ
|
1513 |
+
�
|
1514 |
+
1 + ¯sn
|
1515 |
+
2 , Kn,nR2
|
1516 |
+
n
|
1517 |
+
det(J)
|
1518 |
+
��
|
1519 |
+
,
|
1520 |
+
where ¯sn is the sum of s∗
|
1521 |
+
t→m,n affecting (|hn| |hm|)s∗
|
1522 |
+
t→m,n and
|
1523 |
+
g (s∗) =
|
1524 |
+
�1
|
1525 |
+
2
|
1526 |
+
��T
|
1527 |
+
t=1 s∗
|
1528 |
+
t �
|
1529 |
+
v∈V
|
1530 |
+
|
1531 |
+
|
1532 |
+
T�
|
1533 |
+
t=1
|
1534 |
+
|
1535 |
+
s∗
|
1536 |
+
t
|
1537 |
+
vt
|
1538 |
+
|
1539 |
+
|
1540 |
+
|
1541 |
+
(2π)N
|
1542 |
+
N
|
1543 |
+
�
|
1544 |
+
i=1
|
1545 |
+
1{∆i=0}.
|
1546 |
+
|
1547 |
+
20
|
1548 |
+
APPENDIX C: OUTAGE PROBABILITY OF FAS AT HIGH SNR
|
1549 |
+
According to [35], the outage probability of a wireless communication system at high SNR can
|
1550 |
+
be obtained via the PDF of its fading channels. In particular, suppose the PDF of the channels
|
1551 |
+
at high SNR can be approximated as
|
1552 |
+
f|hFAS| (Ω) = 2ξΩ2M+1 + o
|
1553 |
+
�
|
1554 |
+
Ω2M+1�
|
1555 |
+
.
|
1556 |
+
(35)
|
1557 |
+
Then the outage probability at high SNR is found as
|
1558 |
+
P {|hFAS| < Ω} =
|
1559 |
+
ξ
|
1560 |
+
M + 1ΩM+1 + o
|
1561 |
+
�
|
1562 |
+
1
|
1563 |
+
SNRM+1
|
1564 |
+
�
|
1565 |
+
.
|
1566 |
+
(36)
|
1567 |
+
Before approximating the PDF of FAS at high SNR, we highlight that the PDF of (21) in
|
1568 |
+
terms of its amplitude and phase can be rewritten as
|
1569 |
+
f|h|,θ (|h1| , θ1, . . . , |hN| , θN) =
|
1570 |
+
N
|
1571 |
+
�
|
1572 |
+
n=1
|
1573 |
+
|hn| Hn
|
1574 |
+
πNdet(J)
|
1575 |
+
(37)
|
1576 |
+
where
|
1577 |
+
Hn = exp
|
1578 |
+
�
|
1579 |
+
−Kn,n |hn|2 + 2 �N
|
1580 |
+
m=n+1 Km,n |hn| |hm| cos (θn − θm)
|
1581 |
+
det(J)
|
1582 |
+
�
|
1583 |
+
.
|
1584 |
+
(38)
|
1585 |
+
Using (37), the approximated PDF of FAS at high SNR can be derived as
|
1586 |
+
f|hFAS| (Ω) =∂F|hFAS| (Ω)
|
1587 |
+
∂Ω
|
1588 |
+
(39)
|
1589 |
+
(a)
|
1590 |
+
=N
|
1591 |
+
ˆ Ω
|
1592 |
+
0
|
1593 |
+
. . .
|
1594 |
+
ˆ Ω
|
1595 |
+
0
|
1596 |
+
ˆ 2π
|
1597 |
+
0
|
1598 |
+
· · ·
|
1599 |
+
ˆ 2π
|
1600 |
+
0
|
1601 |
+
f|h|,θ (|h1| , θ1, . . . , |hN−1| , θN−1, Ω, θN)
|
1602 |
+
(40)
|
1603 |
+
d |h1| · · · d |hN−1| dθ1 . . . dθN
|
1604 |
+
(b)
|
1605 |
+
=
|
1606 |
+
NΩ
|
1607 |
+
πNdet(J)
|
1608 |
+
ˆ 2π
|
1609 |
+
0
|
1610 |
+
· · ·
|
1611 |
+
ˆ 2π
|
1612 |
+
0
|
1613 |
+
HN
|
1614 |
+
ˆ Ω
|
1615 |
+
0
|
1616 |
+
|hN−1|
|
1617 |
+
�
|
1618 |
+
HN−1 × . . .
|
1619 |
+
(41)
|
1620 |
+
�ˆ Ω
|
1621 |
+
0
|
1622 |
+
|h2| H2
|
1623 |
+
�ˆ Ω
|
1624 |
+
0
|
1625 |
+
|h1| H1d |h1|
|
1626 |
+
�
|
1627 |
+
d |h2|
|
1628 |
+
�
|
1629 |
+
· · · d |hN−1|
|
1630 |
+
�
|
1631 |
+
dθ1 . . . dθN,
|
1632 |
+
where (a) is obtained using Leibniz integral and (b) is obtained using (37).
|
1633 |
+
According to [41], the term
|
1634 |
+
´ Ω
|
1635 |
+
0 |hn| Hnd |hn| can be solved by applying Taylor series approx-
|
1636 |
+
imation at around zero. Specifically, we have
|
1637 |
+
ˆ Ω
|
1638 |
+
0
|
1639 |
+
|hn| Hnd |hn| = Ω2
|
1640 |
+
2 + o
|
1641 |
+
�
|
1642 |
+
Ω2�
|
1643 |
+
, n = {1, . . . , N − 1}
|
1644 |
+
(42)
|
1645 |
+
and the Taylor series approximation of HN at zero is
|
1646 |
+
HN = 1 + o (1) .
|
1647 |
+
(43)
|
1648 |
+
|
1649 |
+
21
|
1650 |
+
Substituting (42) and (43) into (41), we have
|
1651 |
+
f|hFAS| (Ω) =
|
1652 |
+
NΩ
|
1653 |
+
πNdet(J)
|
1654 |
+
�Ω2
|
1655 |
+
2 + o
|
1656 |
+
�
|
1657 |
+
Ω2��N−1 ˆ 2π
|
1658 |
+
0
|
1659 |
+
· · ·
|
1660 |
+
ˆ 2π
|
1661 |
+
0
|
1662 |
+
dθ1 . . . dθN
|
1663 |
+
(44)
|
1664 |
+
= 2N
|
1665 |
+
det(J)Ω2N−1 + o
|
1666 |
+
�
|
1667 |
+
Ω2N−1�
|
1668 |
+
.
|
1669 |
+
(45)
|
1670 |
+
Comparing (45) to (35), we have M = N − 1 and ξ =
|
1671 |
+
N
|
1672 |
+
det(J). Applying (36), we have
|
1673 |
+
P {|hFAS| < Ω} ≈
|
1674 |
+
ΩN
|
1675 |
+
det(J) + o
|
1676 |
+
�
|
1677 |
+
1
|
1678 |
+
SNRN
|
1679 |
+
�
|
1680 |
+
.
|
1681 |
+
(46)
|
1682 |
+
APPENDIX D: DIVERSITY GAIN OF FAS
|
1683 |
+
Let us consider the case where W → ∞. According to [35], the diversity gain of a wireless
|
1684 |
+
communication system can be obtained via the PDF of its fading channels at high SNR. Specif-
|
1685 |
+
ically, suppose the PDF of the channels at high SNR can be approximated as in (35). Then
|
1686 |
+
diversity gain of such system is given by
|
1687 |
+
D = M + 1.
|
1688 |
+
(47)
|
1689 |
+
In Appendix C, we have M = N − 1. Thus, it is straightforward that the diversity gain of
|
1690 |
+
FAS as W → ∞ is N. Nevertheless, if W is finite, J might be near to being singular. To
|
1691 |
+
see this, let us consider FAS with N → ∞ ports within a finite W where each port is equally
|
1692 |
+
separated, and they are indexed as 1, 2, . . .. Without loss of generality, let us focus on two
|
1693 |
+
ports: n-th and (n + 1)-th port. The correlation between the n-th port and (n + 1)-th port is
|
1694 |
+
J n,n+1 = lim
|
1695 |
+
N→∞σ2J0
|
1696 |
+
�
|
1697 |
+
2π
|
1698 |
+
1
|
1699 |
+
N−1W
|
1700 |
+
�
|
1701 |
+
= σ2J0 (0), and we have hn+1 = hn. Thus, the joint CDF of hn
|
1702 |
+
and hn+1 is Fhn,hn+1 (g1, g2) = Fhn (min {g1, g2}), which implies that they reduce to singularity.
|
1703 |
+
Since there are many such ports, we can use a finite N′ ports to approximate the channels of
|
1704 |
+
FAS with N ports, where N′ is the rank of J′ such that J ′ is covariance matrix as defined in
|
1705 |
+
(2) with N → ∞ for a fixed W. As a result, the diversity gain of FAS is approximately limited
|
1706 |
+
by min {N, N′}. If N is large, the same observation can be obtained. To remove the nearly-
|
1707 |
+
dependent entries of J, one may employ rank-revealing QR factorization [42] or Gauss-Jordan
|
1708 |
+
elimination with a given tolerance.
|
1709 |
+
REFERENCES
|
1710 |
+
[1] A. Shojaeifard, K.-K. Wong, K.-F. Tong, Z. Chu, A. Mourad, A. Haghighat, I. Hemadeh, N. T. Nguyen, V. Tapio, and
|
1711 |
+
M. Juntti, “MIMO evolution beyond 5G through reconfigurable intelligent surfaces and fluid antenna systems,” Proceedings
|
1712 |
+
of the IEEE, vol. 110, no. 9, pp. 1244–1265, 2022. I
|
1713 |
+
|
1714 |
+
22
|
1715 |
+
[2] K. K. Wong, K.-F. Tong, Y. Shen, Y. Chen, and Y. Zhang, “Bruce Lee-inspired fluid antenna system: Six research topics
|
1716 |
+
and the potentials for 6G,” Frontiers in Communications and Networks, p. 5, 2022. I
|
1717 |
+
[3] K.-K. Wong, A. Shojaeifard, K.-F. Tong, and Y. Zhang, “Fluid antenna systems,” IEEE Transactions on Wireless
|
1718 |
+
Communications, vol. 20, no. 3, pp. 1950–1962, 2021. I, II
|
1719 |
+
[4] E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, and R. Zhang, “Wireless communications through
|
1720 |
+
reconfigurable intelligent surfaces,” IEEE Access, vol. 7, pp. 116 753–116 773, 2019. I
|
1721 |
+
[5] K.-K. Wong, K.-F. Tong, Z. Chu, and Y. Zhang, “A vision to smart radio environment: Surface wave communication
|
1722 |
+
superhighways,” IEEE Wireless Communications, vol. 28, no. 1, pp. 112–119, 2021. I
|
1723 |
+
[6] O. Elijah, S. K. Abdul Rahim, W. K. New, C. Y. Leow, K. Cumanan, and T. Kim Geok, “Intelligent massive MIMO
|
1724 |
+
systems for beyond 5G networks: An overview and future trends,” IEEE Access, vol. 10, pp. 102 532–102 563, 2022. I
|
1725 |
+
[7] C.-X. Wang, J. Wang, S. Hu, Z. H. Jiang, J. Tao, and F. Yan, “Key technologies in 6G terahertz wireless communication
|
1726 |
+
systems: A survey,” IEEE Vehicular Technology Magazine, vol. 16, no. 4, pp. 27–37, 2021. I
|
1727 |
+
[8] M. Khammassi, A. Kammoun, and M.-S. Alouini, “A new analytical approximation of the fluid antenna system channel,”
|
1728 |
+
arXiv preprint arXiv:2203.09318, 2022. I, II, 4, IV, V
|
1729 |
+
[9] D. G. Brennan, “Linear diversity combining techniques,” Proceedings of the IRE, vol. 47, no. 6, pp. 1075–1102, 1959. I,
|
1730 |
+
IV
|
1731 |
+
[10] K. K. Wong, A. Shojaeifard, K.-F. Tong, and Y. Zhang, “Performance limits of fluid antenna systems,” IEEE Communi-
|
1732 |
+
cations Letters, vol. 24, no. 11, pp. 2469–2472, 2020. I
|
1733 |
+
[11] K.-K. Wong and K.-F. Tong, “Fluid antenna multiple access,” IEEE Transactions on Wireless Communications, vol. 21,
|
1734 |
+
no. 7, pp. 4801–4815, 2022. I
|
1735 |
+
[12] C. Skouroumounis and I. Krikidis, “Large-scale fluid antenna systems with linear MMSE channel estimation,” in ICC 2022
|
1736 |
+
- IEEE International Conference on Communications, 2022, pp. 1330–1335. I
|
1737 |
+
[13] L. Tlebaldiyeva, G. Nauryzbayev, S. Arzykulov, A. Eltawil, and T. Tsiftsis, “Enhancing QoS through fluid antenna
|
1738 |
+
systems over correlated Nakagami-m fading channels,” in 2022 IEEE Wireless Communications and Networking Conference
|
1739 |
+
(WCNC), 2022, pp. 78–83. I
|
1740 |
+
[14] K. Wong, K. Tong, Y. Chen, and Y. Zhang, “Closed-form expressions for spatial correlation parameters for performance
|
1741 |
+
analysis of fluid antenna systems,” Electronics Letters, vol. 58, no. 11, pp. 454–457, 2022. I
|
1742 |
+
[15] K. N. Le, “A review of selection combining receivers over correlated rician fading,” Digital Signal Processing, vol. 88,
|
1743 |
+
pp. 1–22, 2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1051200418307176 I
|
1744 |
+
[16] K. S. Miller, “Complex Gaussian processes,” Siam Review, vol. 11, no. 4, pp. 544–567, 1969. I
|
1745 |
+
[17] C. Tan and N. Beaulieu, “Infinite series representations of the bivariate Rayleigh and Nakagami-m distributions,” IEEE
|
1746 |
+
Transactions on Communications, vol. 45, no. 10, pp. 1159–1161, 1997. I
|
1747 |
+
[18] P. Dharmawansa, N. Rajatheva, and C. Tellambura, “On the trivariate Rician distribution,” IEEE Transactions on
|
1748 |
+
Communications, vol. 56, no. 12, pp. 1993–1997, 2008. I
|
1749 |
+
[19] Y. Chen and C. Tellambura, “Infinite series representations of the trivariate and quadrivariate Rayleigh distribution and
|
1750 |
+
their applications,” IEEE Transactions on Communications, vol. 53, no. 12, pp. 2092–2101, 2005. I
|
1751 |
+
[20] M. Tekinay and C. Beard, “Moments of the quadrivariate Rayleigh distribution with applications for diversity receivers,”
|
1752 |
+
Annals of Telecommunications, vol. 75, no. 7, pp. 447–459, 2020. I
|
1753 |
+
[21] Y. Chen and C. Tellambura, “Distribution functions of selection combiner output in equally correlated Rayleigh, Rician,
|
1754 |
+
and Nakagami-m fading channels,” IEEE Transactions on Communications, vol. 52, no. 11, pp. 1948–1956, 2004. I
|
1755 |
+
[22] G. Karagiannidis, D. Zogas, and S. Kotsopoulos, “On the multivariate Nakagami-m distribution with exponential
|
1756 |
+
correlation,” IEEE Transactions on Communications, vol. 51, no. 8, pp. 1240–1244, 2003. I
|
1757 |
+
|
1758 |
+
23
|
1759 |
+
[23] M. Wiegand and S. Nadarajah, “A series representation for multidimensional Rayleigh distributions,” International
|
1760 |
+
Journal
|
1761 |
+
of
|
1762 |
+
Communication
|
1763 |
+
Systems,
|
1764 |
+
vol.
|
1765 |
+
31,
|
1766 |
+
no.
|
1767 |
+
6,
|
1768 |
+
p.
|
1769 |
+
e3510,
|
1770 |
+
2018,
|
1771 |
+
e3510
|
1772 |
+
dac.3510.
|
1773 |
+
[Online].
|
1774 |
+
Available:
|
1775 |
+
https://onlinelibrary.wiley.com/doi/abs/10.1002/dac.3510 I, VI
|
1776 |
+
[24] ——, “Series approximations for Rayleigh distributions of arbitrary dimensions and covariance matrices,” Signal
|
1777 |
+
Processing, vol. 165, pp. 20–29, 2019. I, VI
|
1778 |
+
[25] ——,
|
1779 |
+
“New
|
1780 |
+
generalised
|
1781 |
+
approximation
|
1782 |
+
methods
|
1783 |
+
for
|
1784 |
+
the
|
1785 |
+
cumulative
|
1786 |
+
distribution
|
1787 |
+
function
|
1788 |
+
of
|
1789 |
+
arbitrary
|
1790 |
+
multivariate
|
1791 |
+
Rayleigh
|
1792 |
+
random
|
1793 |
+
variables,”
|
1794 |
+
Signal
|
1795 |
+
Processing,
|
1796 |
+
vol.
|
1797 |
+
176,
|
1798 |
+
p.
|
1799 |
+
107664,
|
1800 |
+
2020.
|
1801 |
+
[Online].
|
1802 |
+
Available:
|
1803 |
+
https://www.sciencedirect.com/science/article/pii/S0165168420302073 I, VI
|
1804 |
+
[26] R. G. Gallager, Principles of digital communication.
|
1805 |
+
Cambridge University Press Cambridge, UK, 2008, vol. 1. 2
|
1806 |
+
[27] Z. Chai, K.-K. Wong, K.-F. Tong, Y. Chen, and Y. Zhang, “Port selection for fluid antenna systems,” IEEE Communications
|
1807 |
+
Letters, vol. 26, no. 5, pp. 1180–1184, 2022. I
|
1808 |
+
[28] L. Zhu, W. Ma, and R. Zhang, “Modeling and performance analysis for movable antenna enabled wireless communications,”
|
1809 |
+
arXiv preprint arXiv:2210.05325, 2022. I
|
1810 |
+
[29] W. Ma, L. Zhu, and R. Zhang, “MIMO capacity characterization for movable antenna systems,” arXiv preprint
|
1811 |
+
arXiv:2210.05396, 2022. I
|
1812 |
+
[30] N. Waqar, K.-K. Wong, K.-F. Tong, and S. Adrian, “Deep learning enabled slow fluid antenna multiple access,” Submitted
|
1813 |
+
to IEEE Communications Letters, 2022. I, 3
|
1814 |
+
[31] K.-K. Wong, K.-F. Tong, Y. Chen, and Y. Zhang, “Fast fluid antenna multiple access enabling massive connectivity,”
|
1815 |
+
Submmited to IEEE Communications Letters, 2022. I
|
1816 |
+
[32] H. Xu, K.-K. Wong, W. K. New, and K.-F. Tong, “On the outage probability for two-user fluid antenna multiple access,”
|
1817 |
+
Submitted to 2023 IEEE International Conference on Communications (ICC), 2023. I
|
1818 |
+
[33] G. L. Stüber and G. L. Steuber, Principles of mobile communication.
|
1819 |
+
Springer, 1996, vol. 2. II
|
1820 |
+
[34] D. Tse and P. Viswanath, Fundamentals of wireless communication.
|
1821 |
+
Cambridge university press, 2005. II, VI
|
1822 |
+
[35] Z. Wang and G. Giannakis, “A simple and general parameterization quantifying performance in fading channels,” IEEE
|
1823 |
+
Transactions on Communications, vol. 51, no. 8, pp. 1389–1398, 2003. II, VI, VI
|
1824 |
+
[36] G. Golub, A. Hoffman, and G. Stewart, “A generalization of the eckart-young-mirsky matrix approximation
|
1825 |
+
theorem,”
|
1826 |
+
Linear
|
1827 |
+
Algebra
|
1828 |
+
and
|
1829 |
+
its
|
1830 |
+
Applications,
|
1831 |
+
vol.
|
1832 |
+
88-89,
|
1833 |
+
pp.
|
1834 |
+
317–327,
|
1835 |
+
1987.
|
1836 |
+
[Online].
|
1837 |
+
Available:
|
1838 |
+
https://www.sciencedirect.com/science/article/pii/0024379587901145 IV
|
1839 |
+
[37] D.
|
1840 |
+
Dowson
|
1841 |
+
and
|
1842 |
+
B.
|
1843 |
+
Landau,
|
1844 |
+
“The
|
1845 |
+
Frechet
|
1846 |
+
distance
|
1847 |
+
between
|
1848 |
+
multivariate
|
1849 |
+
normal
|
1850 |
+
distributions,”
|
1851 |
+
Journal
|
1852 |
+
of
|
1853 |
+
Multivariate
|
1854 |
+
Analysis,
|
1855 |
+
vol.
|
1856 |
+
12,
|
1857 |
+
no.
|
1858 |
+
3,
|
1859 |
+
pp.
|
1860 |
+
450–455,
|
1861 |
+
1982.
|
1862 |
+
[Online].
|
1863 |
+
Available:
|
1864 |
+
https://www.sciencedirect.com/science/article/pii/0047259X8290077X IV
|
1865 |
+
[38] S. Boyd, S. P. Boyd, and L. Vandenberghe, Convex optimization.
|
1866 |
+
Cambridge university press, 2004. IV
|
1867 |
+
[39] W. Ford, Numerical linear algebra with applications: Using MATLAB.
|
1868 |
+
Academic Press, 2014. IV
|
1869 |
+
[40] A. Papoulis and S. U. Pillai, “Probability, random variables, and stochastic processes,” 2002. VI
|
1870 |
+
[41] S. Liu, J. Cheng, and N. C. Beaulieu, “Asymptotic error analysis of diversity schemes on arbitrarily correlated Rayleigh
|
1871 |
+
channels,” IEEE Transactions on Communications, vol. 58, no. 5, pp. 1351–1355, 2010. VI
|
1872 |
+
[42] G. Golub, “Numerical methods for solving linear least squares problems,” Numerische Mathematik, vol. 7, no. 3, pp.
|
1873 |
+
206–216, 1965. VI
|
1874 |
+
|
BNAyT4oBgHgl3EQfRvex/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
CtAzT4oBgHgl3EQfGfuT/content/tmp_files/2301.01029v1.pdf.txt
ADDED
@@ -0,0 +1,1261 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.01029v1 [cond-mat.str-el] 3 Jan 2023
|
2 |
+
Ab-initio study of phononic thermal conduction in ScAgC half-Heusler
|
3 |
+
Vinod Kumar Solet1,∗ and Sudhir K. Pandey1,†
|
4 |
+
1School of Mechanical and Materials Engineering,
|
5 |
+
Indian Institute of Technology Mandi, Kamand - 175075, India
|
6 |
+
(Dated: January 4, 2023)
|
7 |
+
We present a first-principles lattice calculations to comprehend the thermal expansion
|
8 |
+
α(T ) and lattice thermal conductivity κph of ScAgC. The obtained positive frequencies of phonon
|
9 |
+
dispersion shows the dynamical stability of ScAgC in FCC structure. The estimated α(T ) from
|
10 |
+
quasi-harmonic approximation (QHA) at 300(1200) K is ∼4(4.6)×10−6 K−1. The predicted value
|
11 |
+
of total κph from phonon-phonon interaction (PPI) at 300(1200) K is ∼7.4(1.8) Wm−1K−1. The
|
12 |
+
highest group velocity for acoustic & optical branches (AB & OB) is ∼6.7 and ∼3.5 km/s, respec-
|
13 |
+
tively. The predicted average phonon lifetime (τλ) for AB(OB) is ∼2.5(1.65) ps at 300 K, whereas it
|
14 |
+
is ∼0.6(0.4) ps at 1200 K. The estimated highest heat capacity (Cλ) at 200 K for AB(OB) is ∼23.5
|
15 |
+
(19.5) meV/K. We fitted the equation AκT−xκ(AτT−xτ ) in the κph(τλ) curve to gain a thorough
|
16 |
+
understanding of temperature-dependent κph trend. The xκ for total branches is calculated to be
|
17 |
+
∼1.02. The xτ value due to total AB(OB) is estimated to be ∼1.04(1.02), while it is ∼1.03 for total
|
18 |
+
branches. The calculated xκ for total AB(OB) is ∼1.04(0.95), implying that AB contributes more
|
19 |
+
to the total κph. This research could be important for enhancing the properties of ScAgC regarding
|
20 |
+
thermoelectric and photovoltaic applications.
|
21 |
+
I.
|
22 |
+
INTRODUCTION
|
23 |
+
Energy demand is continuously growing in to-
|
24 |
+
day’s technological world. Understanding the transport
|
25 |
+
properties of materials, and in particular, the capacity
|
26 |
+
to conduct heat throughout the crystal, is critical due
|
27 |
+
to its technological influence on energy-related devices.
|
28 |
+
The subject of heat transportation is vast in solid state
|
29 |
+
physics [1], but we have focused attention on thermal
|
30 |
+
transport by phonons here. Basically, the knowledge of
|
31 |
+
phonons is very critical in accounting for many physical
|
32 |
+
properties and behaviours of crystals, such as thermal
|
33 |
+
transport properties, thermal expansion, phase transi-
|
34 |
+
tion, mechanical properties, and certain electrical proper-
|
35 |
+
ties (superconductivity), etc., [1]. Studying the thermal
|
36 |
+
behaviour of heat energy transported by the motion of
|
37 |
+
atoms has always been a challenging task for researchers.
|
38 |
+
The starting point for almost all theories related to lat-
|
39 |
+
tice dynamics is harmonic approximation (HA), which
|
40 |
+
ignores the concept of PPI [1, 2].
|
41 |
+
However, HA is no
|
42 |
+
longer sufficient for accessing transport properties such
|
43 |
+
as κph due to the infinite lifetime of phonons. We can
|
44 |
+
cope with this problem by taking into account the scat-
|
45 |
+
tering of the harmonic phonons by other phonons (PPI),
|
46 |
+
defects, and crystal boundaries, etc., [1, 3] because it is
|
47 |
+
well known that the κph is a crucial property in semicon-
|
48 |
+
ducting thermoelectrics [4], solar photovoltaic (PV) cells
|
49 |
+
[5], nuclear reactors [6], and heat management systems
|
50 |
+
[7, 8], etc. At near or above room temperature, the PPI is
|
51 |
+
an important factor to consider in the quantitative study
|
52 |
+
of the κph of non-metallic solids, which is an anharmonic
|
53 |
+
phenomenon [1].
|
54 |
+
This anharmonicity causes complica-
|
55 |
+
tions in the prediction of these transport coefficients at a
|
56 | |
57 | |
58 |
+
finite temperature. However, high-performance comput-
|
59 |
+
ers have contributed to some improvements in the calcu-
|
60 |
+
lation of the transport properties of solids.
|
61 |
+
In the last few decades, interesting developments
|
62 |
+
toward describing the lattice dynamics and related prop-
|
63 |
+
erties of materials have been made from first-principles
|
64 |
+
molecular dynamics simulations [9, 10]. But such calcu-
|
65 |
+
lations carry a large computational effort, and their im-
|
66 |
+
plementation is not straightforward. In this regard, one
|
67 |
+
can cope with these problems by using first-principles
|
68 |
+
density functional theory (DFT) based methods, which
|
69 |
+
are the appropriate and generally less expensive ways to
|
70 |
+
analyse the phonon-based properties [11]. However, the
|
71 |
+
use of methods beyond DFT is required for exploring
|
72 |
+
the temperature-dependent transport coefficients.
|
73 |
+
Re-
|
74 |
+
cently, many-body theory based computational methods
|
75 |
+
have become useful in exploring the PPI effects in crys-
|
76 |
+
tals [12]. Another physical property, the τλ of phonons, is
|
77 |
+
most important to take into account in seeking the mech-
|
78 |
+
anism of phononic thermal conduction. The imaginary
|
79 |
+
part of phonon self-energy enables us to see the strength
|
80 |
+
of coupling between phonons as well as calculate the τλ of
|
81 |
+
phonons. Nowadays, the study of anharmonic effects and
|
82 |
+
the calculation of τλ is a highly active fields of research.
|
83 |
+
The knowledge of α(T ) and κph is helpful for ma-
|
84 |
+
terials used in thermoelectric (TE) applications. TE ma-
|
85 |
+
terials are not only helpful to generate electricity from
|
86 |
+
waste heat but also provide cooling power by allowing
|
87 |
+
an electric current to flow through them [4, 13]. These
|
88 |
+
materials are particularly attractive for refrigerators, air
|
89 |
+
conditioners, heat pumps, automobile applications, and
|
90 |
+
etc., since they are reliable, quiet, and devoid of any mov-
|
91 |
+
ing parts [13]. The most difficult challenge for researchers
|
92 |
+
working with TE compounds is increasing the nondimen-
|
93 |
+
sional parameter, figure-of-merit ZT [14], which is de-
|
94 |
+
fined as ZT = S2σT/κ. Where S, σ, κ and T are known
|
95 |
+
as the material’s Seebeck coefficient, electrical conduc-
|
96 |
+
|
97 |
+
2
|
98 |
+
tivity, total thermal conductivity, and absolute temper-
|
99 |
+
ature, respectively. Total κ has two parts: an electronic
|
100 |
+
part (κe) and a lattice part (κph). The ZT value of an
|
101 |
+
efficient TE material should be greater than one [15]. As
|
102 |
+
a result, ZT can be improved by increasing S2σ or de-
|
103 |
+
creasing κ. Obtaining a high ZT is actually quite difficult
|
104 |
+
due to the strong correlation between S, σ, and κe via
|
105 |
+
charge carriers [1, 16]. Hence, an understanding of κph
|
106 |
+
is necessary to know the efficiency of TE materials. The
|
107 |
+
α(T ) provides the idea of a change in the length of TE
|
108 |
+
materials during heating or cooling processes. In many
|
109 |
+
instances, some TE materials are subjected to enough
|
110 |
+
thermal or mechanical stress, which is generated during
|
111 |
+
a large number of heating and cooling cycles [17]. This
|
112 |
+
mechanical stress is usually referred to by the term “ther-
|
113 |
+
mal fatigue ”. The product of elastic modulus and linear
|
114 |
+
thermal expansion coefficient is an important quantity to
|
115 |
+
be taken into account just before analysing the TE mate-
|
116 |
+
rials for thermal fatigue [17, 18]. The lower value of this
|
117 |
+
product gives the lower value of thermal fatigue in the
|
118 |
+
materials. The microcracking and porosity in TE ma-
|
119 |
+
terials, which have an impact on their performance, are
|
120 |
+
also caused by α(T ) [17]. Zhang et al. [19] have reported
|
121 |
+
the effect of microcracking on S2σ of skutterudite TE
|
122 |
+
material in the 20-800 K temperature range. The α(T )
|
123 |
+
and κph are directly related to the phonon calculations.
|
124 |
+
Apart from electronic properties, phonon properties cal-
|
125 |
+
culated from DFT provide reliable accuracy, which was
|
126 |
+
understood in many previous works [20–22].
|
127 |
+
With all
|
128 |
+
this in mind, the ScAgC half-Heusler (HH) compound
|
129 |
+
has been chosen to explore the phonon-based properties.
|
130 |
+
Heusler compounds have recently received much
|
131 |
+
interest from researchers due to their great capabilities
|
132 |
+
in different energy fields, including TE [22–25], PV so-
|
133 |
+
lar cell [26, 27], topological insulators [23, 28],etc. This
|
134 |
+
type of material has a general formula of XY Z (HH)
|
135 |
+
or X2Y Z (full-Heuslers), where X and Y are mainly the
|
136 |
+
transition elements and Z belongs to the p-block element.
|
137 |
+
Our earlier study predicts that ScAgC is a promising HH
|
138 |
+
TE compound and the highest predicted ZT is ∼0.53 at
|
139 |
+
1200 K temperature [29]. One can achieve a high ZT
|
140 |
+
by lowering the κ. Further, ScAgC can also be used to
|
141 |
+
make solar cell devices because it has a strong absorp-
|
142 |
+
tion of ∼1.7×106 cm−1 at photon energy ∼8.5 eV and a
|
143 |
+
low reflectivity of ∼0.24 at ∼4.7 eV [29]. At 300 K, the
|
144 |
+
highest PV efficiency of ∼33% is also observed at ∼1 µm
|
145 |
+
thickness. The remaining absorbed solar energy will be
|
146 |
+
transformed into thermal energy inside the cell and could
|
147 |
+
raise the temperature at the junction until the heat is not
|
148 |
+
dissipated effectively to the environment [30]. This rise
|
149 |
+
in temperature reduces the mobility of charge carriers,
|
150 |
+
which may be one reason for the decreased efficiency of
|
151 |
+
solar cells [5]. Therefore, κph is critical in determining
|
152 |
+
the efficiency of solar cell devices. Our earlier work [29]
|
153 |
+
gives full information about the electronic related prop-
|
154 |
+
erties, which is not sufficient for materials to design the
|
155 |
+
TE and solar cell devices. Although the DFPT method
|
156 |
+
was used to investigate phonon-based thermodynamical
|
157 |
+
properties but κph was not calculated accurately in this
|
158 |
+
work [29]. In this direction, it is mandatory to know a
|
159 |
+
more accurate κph in order to use ScAgC for making PV
|
160 |
+
and TE devices.
|
161 |
+
Hence, the present research includes phonon-
|
162 |
+
based properties estimated by first-principles calcula-
|
163 |
+
tions.
|
164 |
+
First of all, phonon dispersion
|
165 |
+
�
|
166 |
+
with and with-
|
167 |
+
out including non-analytic term correction (NAC)
|
168 |
+
�
|
169 |
+
and
|
170 |
+
phonon DOS have been calculated by considering super-
|
171 |
+
cell and finite displacement approaches under HA. Both
|
172 |
+
dispersion plots have no negative branches, which means
|
173 |
+
that ScAgC is stable in the FCC structure. Next, α(T )
|
174 |
+
has also been estimated via QHA. The expected room
|
175 |
+
temperature value of α(T ) is ∼4×10−6 K−1, whereas
|
176 |
+
it reaches a value of ∼4.6×10−6 K−1 at 1200 K. Sim-
|
177 |
+
ilarly, first-principle lattice calculations with an anhar-
|
178 |
+
monic force constant are used to capture the κph by as-
|
179 |
+
suming PPI only. The observed value of κph at 300 K is
|
180 |
+
∼7.4 Wm−1K−1, while it decreases to ∼1.8 Wm−1K−1
|
181 |
+
at 1200 K. Furthermore, τλ and Cλ of each branch at
|
182 |
+
different temperatures, as well as group velocity vλ of all
|
183 |
+
phonon branches, are also calculated. The equation of
|
184 |
+
temperature-dependent κph(AκT−xκ) and τλ(AτT−xτ )
|
185 |
+
is also fitted in the respective curve.
|
186 |
+
The value of xκ
|
187 |
+
is found to be almost 1.02 for total branches, while it
|
188 |
+
is ∼1.04(0.95) for AB(OB). The estimated value of xτ
|
189 |
+
for total branches is ∼1.03, whereas it is ∼1.04(1.02) for
|
190 |
+
AB(OB), which aids in understanding the temperature-
|
191 |
+
dependent κph trend.
|
192 |
+
II.
|
193 |
+
COMPUTATIONAL DETAILS
|
194 |
+
Phonon dispersion relations are carried out by
|
195 |
+
means of the supercell approach and finite displace-
|
196 |
+
ment method (FDM) [31] in the Phonopy code [32]. A
|
197 |
+
2×2×2 supercell is constructed to obtain displacements
|
198 |
+
from the equilibrium positions of atoms in the conven-
|
199 |
+
tional unit cell. Then forces on these supercells (with 96
|
200 |
+
atoms) are calculated from ABINIT software [33] within
|
201 |
+
the projector-augmented wave (PAW) method [34] under
|
202 |
+
DFT. These atoms are displaced with a fixed harmonic
|
203 |
+
distance of 0.01 ˚A from their equilibrium positions [32].
|
204 |
+
The PBE-GGA type of XC functional has been consid-
|
205 |
+
ered in our calculations [35]. Converged results have been
|
206 |
+
obtained by using cutoff and PAW cutoff kinetic energy
|
207 |
+
for plane wave basis sets of 25 and 50 Ha, respectively.
|
208 |
+
In the supercell, a 4×4×4 k-point grid is integrated over
|
209 |
+
the Brillouin zone. The lattice parameter value of 5.6 ˚A
|
210 |
+
is used in the entire calculations [29]. A force conver-
|
211 |
+
gance criteria is set to be 5 × 10−8 Ha/Bohr. The DFPT
|
212 |
+
method, as implemented in the ABINIT code [36, 37], has
|
213 |
+
been used to obtain born effective charges (BEC) and
|
214 |
+
static dielectric constants of atoms for including long-
|
215 |
+
range interactions within primitive cells. The QHA [32]
|
216 |
+
based method in the Phonopy code is used to evaluate
|
217 |
+
the coefficient of α(T ). Next, the phono3py [12] package
|
218 |
+
is used to calculate κph, and a 2×2×2 supercell is built to
|
219 |
+
|
220 |
+
3
|
221 |
+
Γ
|
222 |
+
X
|
223 |
+
Γ
|
224 |
+
L
|
225 |
+
W
|
226 |
+
Γ
|
227 |
+
0
|
228 |
+
10
|
229 |
+
20
|
230 |
+
30
|
231 |
+
40
|
232 |
+
50
|
233 |
+
60
|
234 |
+
Energy (meV)
|
235 |
+
Γ
|
236 |
+
X
|
237 |
+
Γ
|
238 |
+
L
|
239 |
+
W
|
240 |
+
Γ
|
241 |
+
0
|
242 |
+
10
|
243 |
+
20
|
244 |
+
30
|
245 |
+
40
|
246 |
+
50
|
247 |
+
60
|
248 |
+
Energy (meV)
|
249 |
+
without NAC
|
250 |
+
with NAC
|
251 |
+
(b)
|
252 |
+
(a)
|
253 |
+
FIG. 1: The harmonic phonon dispersion (a) before
|
254 |
+
including NAC and (b) after including NAC of ScAgC.
|
255 |
+
obtain the second and third order force constants. But
|
256 |
+
here only those supercells are considered that have inter-
|
257 |
+
actions between only three neighbouring atoms (uto 7.5
|
258 |
+
Bohr), and the forces on these supercells have been ob-
|
259 |
+
tained from the ABINIT code within the PAW method.
|
260 |
+
Finally, these force constants are used to calculate the τλ
|
261 |
+
from imaginary part of phonon self-energy and then κph
|
262 |
+
by using a heavy q-mesh size of 21×21×21 under single
|
263 |
+
mode relaxation time approximation [12].
|
264 |
+
III.
|
265 |
+
RESULTS AND DISCUSSION
|
266 |
+
A.
|
267 |
+
Phonon properties
|
268 |
+
This section presents the phonon dispersion curve
|
269 |
+
and phonon DOS of ScAgC estimated under HA. To con-
|
270 |
+
firm the stability of this compound, the phonon disper-
|
271 |
+
sion is calculated in the first Brillouin zone along the
|
272 |
+
high symmetry direction of Γ-X-Γ-L-W-Γ. The disper-
|
273 |
+
sion plot of Fig. 1(a) does not embody NAC. This plot
|
274 |
+
contains a total of nine positive phonon branches, cor-
|
275 |
+
responding to three atoms in the primitive unit cell.
|
276 |
+
Among them, three are AB, and the remaining six are
|
277 |
+
OB. The AB have energies varying from 0 to ∼15.85
|
278 |
+
meV, with one being longitudinal AB (LAB) and two be-
|
279 |
+
ing transverse AB (TAB). Similarly, two longitudinal OB
|
280 |
+
(LOB) and four transverse OB (TOB) are contributed in
|
281 |
+
OB modes. The two AB are degenrate along the X-Γ
|
282 |
+
and Γ-L directions. The maximum phonon energy is es-
|
283 |
+
timated as ∼58 meV. One can also observe the minimum
|
284 |
+
energy gap of ∼8.6 meV between AB and OB. Three
|
285 |
+
of the OB modes, which are located in the middle en-
|
286 |
+
ergy range (∼24.5 meV to ∼35 meV), are well separated
|
287 |
+
with an energy gap of ∼10 meV from the remaining three
|
288 |
+
modes. These remaining branches are found in a higher
|
289 |
+
energy range of ∼45 meV to ∼58 meV. Due to this gap,
|
290 |
+
the coupling between the AB (OB) and OB (OB) may
|
291 |
+
be weaker, which is expected to be the largest contribu-
|
292 |
+
tor to κph. The OB modes are doubly degenerate along
|
293 |
+
the X-Γ-L direction, and they are triply degenerate at
|
294 |
+
the Γ-point. The AB are almost linear near the Γ-point,
|
295 |
+
implying that group velocity and phase velocity will be
|
296 |
+
the same in this region [1]. The slop of AB is used to
|
297 |
+
0
|
298 |
+
10
|
299 |
+
20
|
300 |
+
30
|
301 |
+
40
|
302 |
+
50
|
303 |
+
60
|
304 |
+
Energy (meV)
|
305 |
+
0
|
306 |
+
0.3
|
307 |
+
0.6
|
308 |
+
0.9
|
309 |
+
1.2
|
310 |
+
1.5
|
311 |
+
1.8
|
312 |
+
2.1
|
313 |
+
2.4
|
314 |
+
Phonon DOS (states/meV)
|
315 |
+
Total
|
316 |
+
Sc
|
317 |
+
Ag
|
318 |
+
C
|
319 |
+
FIG. 2: The total phonon DOS per unit cell and partial
|
320 |
+
DOS per atom of ScAgC.
|
321 |
+
estimate sound velocity, which is an important factor in
|
322 |
+
calculating the κph of solids [1].
|
323 |
+
We proceed now to see the effect of long-range
|
324 |
+
Coulomb interactions or dipole-dipole interactions on
|
325 |
+
the ions present in the ionic crystals. It is well known
|
326 |
+
that polar crystals become polarized by taking small
|
327 |
+
atomic displacements from their equilibrium positions,
|
328 |
+
and the resulting macroscopic field modifies the force con-
|
329 |
+
stants close to the Γ-point [38]. Basically, LOB create a
|
330 |
+
macroscopic electric field near the Γ-point in non-metallic
|
331 |
+
solids, and thus NAC is calculated to take this contribu-
|
332 |
+
tion into harmonic phonon dispersion. As a result, the
|
333 |
+
LOB is lifted up, and TOB and LOB split close to the
|
334 |
+
Γ-point. One can clearly observe this LO-TO splitting
|
335 |
+
at the Γ-point in Fig. 1(b). Now the maximum energy
|
336 |
+
of phonons at Γ-point is ∼58 meV and an energy gap of
|
337 |
+
∼10 meV is also created. The splitting of OB also creates
|
338 |
+
a minimum energy gap of ∼3 meV. In practice, the BEC
|
339 |
+
of ions and the dielectric constant are required quantities
|
340 |
+
for NAC at OB frequencies [38]. The calculated dielec-
|
341 |
+
tric constant is ∼13.9, which is the same in all directions
|
342 |
+
due to the cubic symmetry of ScAgC, while the BEC of
|
343 |
+
Sc, Ag, and C ions is ∼2.5, ∼0.4, ∼ −2.9, respectively.
|
344 |
+
According to this, the inclusion of NAC can play an im-
|
345 |
+
portant role in deciding the phonon properties. However,
|
346 |
+
in the presence of NAC, the other part of the dispersion
|
347 |
+
is barely affected when compared to Fig.
|
348 |
+
1(a). These
|
349 |
+
theoretical aspects can be probed and verified if someone
|
350 |
+
measures them by experiment.
|
351 |
+
Further, the phonon DOS and a partial DOS have
|
352 |
+
been studied in order to investigate the effect of AB and
|
353 |
+
OB in ScAgC during heat transfer processes.
|
354 |
+
Fig.
|
355 |
+
2
|
356 |
+
indicates the obtained graph of total phonon DOS per
|
357 |
+
unit cell and partial phonon DOS per atom. The total
|
358 |
+
DOS plot has three main peaks around the energies of
|
359 |
+
∼14.5, ∼30 and ∼48 meV, respectively. One can see the
|
360 |
+
gap in the DOS around 25 (40) meV, which separates
|
361 |
+
the states corresponding to AB (OB) and OB (OB). In
|
362 |
+
the figure, the AB in the lower energy region (below 25
|
363 |
+
meV) have the major contributions due to the vibrations
|
364 |
+
of the heavier mass Ag atoms. The middle energy range
|
365 |
+
of OB is mainly influenced by the atomic vibrations of Sc
|
366 |
+
atoms. While the main contribution of lighter C atoms
|
367 |
+
|
368 |
+
4
|
369 |
+
to vibrations is seen in higher (above 45 meV) energetic
|
370 |
+
OB modes.
|
371 |
+
B.
|
372 |
+
Thermal expansion
|
373 |
+
We shall now investigate the features of how the
|
374 |
+
lattice can expand as a result of the thermal motion
|
375 |
+
of ions at finite temperatures.
|
376 |
+
The definition of α(T )
|
377 |
+
and κph of compounds breaks down at the harmonic re-
|
378 |
+
gion for crystal potential.
|
379 |
+
The normal-mode frequen-
|
380 |
+
cies of purely harmonic crystals are unaffected by the
|
381 |
+
change of equilibrium volume and therefore do not lead
|
382 |
+
to α(T ) [1].
|
383 |
+
Further, anharmonic interaction in solid
|
384 |
+
gives the α(T ) because it leads to asymmetry in crys-
|
385 |
+
tals.
|
386 |
+
In this regard, it has been discovered that the
|
387 |
+
QHA [2] is a respectably good approximation for cap-
|
388 |
+
turing the α(T ). It is known that normal mode frequen-
|
389 |
+
cies do not always have volume dependence, but QHA
|
390 |
+
considers volume-dependent phonon properties here [1].
|
391 |
+
Accordingly, the thermal coefficient of linear expansion
|
392 |
+
α(T ) of ScAgC is estimated under QHA. In this way,
|
393 |
+
the total free energy as a function of primitive cell vol-
|
394 |
+
ume is calculated at various temperatures ranging from
|
395 |
+
0 to 1200 K with a step size of 100 K, as shown in
|
396 |
+
Fig. 3(a). For this, ten different supercells are created
|
397 |
+
around the equilibrium lattice constant with different ex-
|
398 |
+
pansions and compressions. The total F at a given tem-
|
399 |
+
perature and volume can be estimated as, F(T ; V ) =
|
400 |
+
[Uel(V )−Uel(V0)]+Fph(T ; V ). Where Uel(V )−Uel(V0) is
|
401 |
+
the relative DFT energy of the electronic system, V0 is
|
402 |
+
the equilibrium volume at 0 K. Fph(T ; V ) is related to the
|
403 |
+
phonon contribution to Helmholtz free energy. At each
|
404 |
+
temperature, free energy has one minima corresponding
|
405 |
+
to the equilibrium volume of a primitive cell, which is
|
406 |
+
estimated after fitting the Birch-Murnaghan equation of
|
407 |
+
states [39] to the F versus volume plot. In Fig.
|
408 |
+
3(a),
|
409 |
+
the solid red line connects every such energy point at
|
410 |
+
equilibrium volume for a given temperature. Then, Fig.
|
411 |
+
3(b) presents these equilibrium volumes as a function of
|
412 |
+
temperature up to 1200 K. The calculated equilibrium
|
413 |
+
volume at 0 K is ∼175.7 ˚A3, while it increases to ∼176.5
|
414 |
+
˚A3 at 1200 K. When compared to its ground state vol-
|
415 |
+
ume, the volume increases by up to ∼0.4% at 1200 K.
|
416 |
+
From knowing the minimum free energy for equi-
|
417 |
+
librium primitive cell volume, one can easily calculate
|
418 |
+
linear coefficient of thermal expansion α(T ) from the ex-
|
419 |
+
pression of α(T ) = 1
|
420 |
+
3β(T ) [1]. Here, the term β(T ) is
|
421 |
+
known as the volumetric thermal expansion coefficient,
|
422 |
+
which is estimated as follows: β(T ) =
|
423 |
+
1
|
424 |
+
V (T )
|
425 |
+
∂V (T )
|
426 |
+
∂T
|
427 |
+
. Where
|
428 |
+
V (T ) represents the volume of a primitive cell as a func-
|
429 |
+
tion of temperature, as illustrated in Fig. 3(b). Because
|
430 |
+
our compound has cubic symmetry, the expansion is uni-
|
431 |
+
form in all three directions, and thus α(T ) is one-third of
|
432 |
+
β(T ) [1]. Fig. 3(c) shows a plot of the calculated α(T )
|
433 |
+
versus temperature from 0-1200 K. The corresponding
|
434 |
+
figure depicts a rapid increase in α(T ) up to ∼200 K, fol-
|
435 |
+
lowed by a slow increment in temperature up to ∼500
|
436 |
+
160
|
437 |
+
170
|
438 |
+
180
|
439 |
+
190
|
440 |
+
Volume (Å3)
|
441 |
+
-6
|
442 |
+
-4
|
443 |
+
-2
|
444 |
+
0
|
445 |
+
2
|
446 |
+
4
|
447 |
+
6
|
448 |
+
8
|
449 |
+
Free energy F (eV)
|
450 |
+
175.6
|
451 |
+
175.8
|
452 |
+
176
|
453 |
+
176.2
|
454 |
+
176.4
|
455 |
+
176.6
|
456 |
+
Volume (Å
|
457 |
+
3)
|
458 |
+
0
|
459 |
+
200
|
460 |
+
400
|
461 |
+
600
|
462 |
+
800
|
463 |
+
1000
|
464 |
+
1200
|
465 |
+
Temperature (K)
|
466 |
+
0
|
467 |
+
1
|
468 |
+
2
|
469 |
+
3
|
470 |
+
4
|
471 |
+
5
|
472 |
+
α(Τ) (×10
|
473 |
+
−6 Κ
|
474 |
+
−1)
|
475 |
+
0 K
|
476 |
+
1200 K
|
477 |
+
(a)
|
478 |
+
(b)
|
479 |
+
(c)
|
480 |
+
FIG. 3: (a) Variation of total free energy F with
|
481 |
+
primitive cell volume. (b) Change in primitive cell
|
482 |
+
volume with temperature. (c) The coefficient of linear
|
483 |
+
thermal expansion α(T ) with respect to temperature for
|
484 |
+
ScAgC.
|
485 |
+
K. The rate of volume change in the crystal is high-
|
486 |
+
est in the 0-200 K temperature range.
|
487 |
+
From ∼500 K
|
488 |
+
to highest studied temperature, the α(T ) shows almost
|
489 |
+
constant behaviour with respect to temperature. At low
|
490 |
+
temperatures, α(T ) varies as ∼T 3 and becomes nearly
|
491 |
+
constant at higher temperatures, exhibiting nearly the
|
492 |
+
same temperature dependence behaviour to specific heat
|
493 |
+
Cv in both cases [1, 29]. The predicted value of α(T ) at
|
494 |
+
room temperature is ∼4×10−6 K−1, while at 1200 K, it
|
495 |
+
is ∼4.6×10−6 K−1. ScAgC has lower α(T ) values than
|
496 |
+
other HH compounds like FeVSb [22], and ZrNiSn [24].
|
497 |
+
From an application standpoint, the information about
|
498 |
+
the α(T ) of materials is very helpful if one wants to utilize
|
499 |
+
them for making real TE devices.
|
500 |
+
C.
|
501 |
+
Lattice thermal conductivity
|
502 |
+
The obtained total κph for ScAgC in the temper-
|
503 |
+
ature range of 300-1200 K is presented in Fig.
|
504 |
+
4(a).
|
505 |
+
One can notice the decreasing behaviour of κph with in-
|
506 |
+
creasing temperature. The expected value of total κph
|
507 |
+
at 300 K is ∼7.4 Wm−1K−1, whereas it decreases to
|
508 |
+
∼1.8 Wm−1K−1 at 1200 K. One can generally expect
|
509 |
+
this decreasing behaviour since the phonon-phonon scat-
|
510 |
+
tering rate increases with increasing temperature. The
|
511 |
+
branch–dependent κph is also calculated to know the per-
|
512 |
+
centage weight of κph of AB and OB in the total κph,
|
513 |
+
which is shown in Fig. 4(b). In this figure, the first three
|
514 |
+
AB1-AB3 are the AB, while OB1-OB6 indicate the six
|
515 |
+
OB. The AB2 shows largest κph among all the branches
|
516 |
+
and the value is ∼2.5(0.6) Wm−1K−1 at 300(1200) K.
|
517 |
+
One can also observe that the AB (OB) contribute nearly
|
518 |
+
77–80 (20–23)% of the total κph in the studied temper-
|
519 |
+
ature window.
|
520 |
+
This percentage decreases for AB and
|
521 |
+
increases for OB as temperature rises.
|
522 |
+
This is due to
|
523 |
+
the fact that the number of AB (OB) modes decreases
|
524 |
+
(increases) as the temperature rises. Basically, this cal-
|
525 |
+
culation of κph considers only PPI. But in reality, the κph
|
526 |
+
also affected by the phonon-electron interactions (PEI),
|
527 |
+
|
528 |
+
5
|
529 |
+
300
|
530 |
+
450
|
531 |
+
600
|
532 |
+
750
|
533 |
+
900
|
534 |
+
1050
|
535 |
+
1200
|
536 |
+
Temperature (K)
|
537 |
+
0
|
538 |
+
0.5
|
539 |
+
1
|
540 |
+
1.5
|
541 |
+
2
|
542 |
+
2.5
|
543 |
+
κph (W/mK)
|
544 |
+
AB1
|
545 |
+
AB2
|
546 |
+
AB3
|
547 |
+
OB1
|
548 |
+
OB2
|
549 |
+
OB3
|
550 |
+
OB4
|
551 |
+
OB5
|
552 |
+
OB6
|
553 |
+
300
|
554 |
+
450
|
555 |
+
600
|
556 |
+
750
|
557 |
+
900
|
558 |
+
1050
|
559 |
+
1200
|
560 |
+
Temperature (K)
|
561 |
+
0
|
562 |
+
1
|
563 |
+
2
|
564 |
+
3
|
565 |
+
4
|
566 |
+
5
|
567 |
+
6
|
568 |
+
7
|
569 |
+
8
|
570 |
+
κph (W/mK)
|
571 |
+
AB
|
572 |
+
OB
|
573 |
+
TB
|
574 |
+
(a)
|
575 |
+
(b)
|
576 |
+
FIG. 4: The calculated κph for (a) acoustic branches
|
577 |
+
(AB), optical branches (OB), and total branches (TB)
|
578 |
+
(b) nine phonon branches as a function of temperature.
|
579 |
+
phonon-defect interactions, etc.
|
580 |
+
Apart from this, the
|
581 |
+
DFT-based phonon band structure has been used in the
|
582 |
+
estimation of temperature-dependent κph here. However,
|
583 |
+
in the real world, phonon band structure is temperature
|
584 |
+
dependent. Therefore, one can get a more realistic result
|
585 |
+
of κph with the inclusion of all the above aspects. But
|
586 |
+
large computational efforts are required to address these
|
587 |
+
challenges.
|
588 |
+
Now we shall focus on understanding the different
|
589 |
+
physical parameters that contribute to the prediction of
|
590 |
+
κph. Recalling Eq. (1), the variation of vλ with phonon
|
591 |
+
frequency, and Cλ, τλ with respect to temperature have
|
592 |
+
been studied. The calculated vλ, which is directly pro-
|
593 |
+
portional to κph, is presented in Fig. 5(a). In this figure,
|
594 |
+
each data point represents a phonon mode for a par-
|
595 |
+
ticular q-point in the irreducible part of the Brillouin
|
596 |
+
zone (IBZ). The AB3 has the highest vλ among all the
|
597 |
+
branches, and the value is ∼6.7 km/s, which is almost a
|
598 |
+
double value of the highest vλ (∼3.5 km/s) of the OB9.
|
599 |
+
The relatively flat dispersion of OB in Fig.
|
600 |
+
1(b) may
|
601 |
+
be one of the reasons for the low vλ of OB compared
|
602 |
+
to AB. Here, we have not considered the temperature-
|
603 |
+
dependent vλ. Nextly, the calculated Cλ for all branches
|
604 |
+
as a function of temperature is plotted in Fig. 5(b). In
|
605 |
+
the studied temperature window, the AB have relatively
|
606 |
+
large Cλ compared to the OB. At 200 K, the Cλ of AB1-
|
607 |
+
AB3(OB1-OB3) branches is calculated to be ∼23.5(19.5)
|
608 |
+
meV/K. At same temperature, the calculated Cλ of OB4-
|
609 |
+
OB5(OB6) branches is ∼13.5(11.5) meV/K. This can be
|
610 |
+
viewed from the Bose-Einstein distribution function, in
|
611 |
+
which the phonon mode population is decreased by in-
|
612 |
+
creasing the mode’s frequency at a fixed temperature.
|
613 |
+
Consequently, OB have lower heat capacities, contribut-
|
614 |
+
ing less to κph. Indeed, Cλ stays almost constant with a
|
615 |
+
small ∼2–11% deviation (∼2% for 630 K and ∼11% for
|
616 |
+
300 K) from a constant value (∼24.5 meV/K) of a clas-
|
617 |
+
sical limit of Cλ at higher temperatures
|
618 |
+
�
|
619 |
+
T≫ΘD(∼630K
|
620 |
+
[29])
|
621 |
+
�
|
622 |
+
, where ΘD is the Debye temperature. This obser-
|
623 |
+
vation reveals that AB modes are the dominant phonon
|
624 |
+
modes and therefore make a large contribution to κph.
|
625 |
+
The consideration of temperature-independent vλ
|
626 |
+
and nearly non-varying Cλ behaviour in the tempera-
|
627 |
+
0
|
628 |
+
3
|
629 |
+
6
|
630 |
+
9
|
631 |
+
12
|
632 |
+
15
|
633 |
+
Frequency (THz)
|
634 |
+
0
|
635 |
+
1
|
636 |
+
2
|
637 |
+
3
|
638 |
+
4
|
639 |
+
5
|
640 |
+
6
|
641 |
+
7
|
642 |
+
Group velocity (km/s)
|
643 |
+
AB1
|
644 |
+
AB2
|
645 |
+
AB3
|
646 |
+
OB1
|
647 |
+
OB2
|
648 |
+
OB3
|
649 |
+
OB4
|
650 |
+
OB5
|
651 |
+
OB6
|
652 |
+
0
|
653 |
+
200
|
654 |
+
400
|
655 |
+
600
|
656 |
+
800
|
657 |
+
1000
|
658 |
+
1200
|
659 |
+
Temperature (K)
|
660 |
+
0
|
661 |
+
5
|
662 |
+
10
|
663 |
+
15
|
664 |
+
20
|
665 |
+
25
|
666 |
+
Heat capacity (meV/K)
|
667 |
+
AB1
|
668 |
+
AB2
|
669 |
+
AB3
|
670 |
+
OB1
|
671 |
+
OB2
|
672 |
+
OB3
|
673 |
+
OB4
|
674 |
+
OB5
|
675 |
+
OB6
|
676 |
+
(a)
|
677 |
+
(b)
|
678 |
+
FIG. 5: The calculated mode dependent phonon (a)
|
679 |
+
group velocity vλ and (b) heat capacity Cλ for nine
|
680 |
+
phonon branches.
|
681 |
+
300
|
682 |
+
450
|
683 |
+
600
|
684 |
+
750
|
685 |
+
900
|
686 |
+
1050
|
687 |
+
1200
|
688 |
+
Temperature (K)
|
689 |
+
0
|
690 |
+
0.5
|
691 |
+
1
|
692 |
+
1.5
|
693 |
+
2
|
694 |
+
2.5
|
695 |
+
3
|
696 |
+
3.5
|
697 |
+
4
|
698 |
+
Phonon lifetime (ps)
|
699 |
+
AB1
|
700 |
+
AB2
|
701 |
+
AB3
|
702 |
+
OB1
|
703 |
+
OB2
|
704 |
+
OB3
|
705 |
+
OB4
|
706 |
+
OB5
|
707 |
+
OB6
|
708 |
+
300
|
709 |
+
450
|
710 |
+
600
|
711 |
+
750
|
712 |
+
900
|
713 |
+
1050
|
714 |
+
1200
|
715 |
+
Temperature (K)
|
716 |
+
0.3
|
717 |
+
0.6
|
718 |
+
0.9
|
719 |
+
1.2
|
720 |
+
1.5
|
721 |
+
1.8
|
722 |
+
2.1
|
723 |
+
2.4
|
724 |
+
Phonon lifetime (ps)
|
725 |
+
AB
|
726 |
+
OB
|
727 |
+
TB
|
728 |
+
(a)
|
729 |
+
(b)
|
730 |
+
FIG. 6: The phonon lifetime τλ for (a) nine phonon
|
731 |
+
branches (b) acoustic branches (AB), optical branches
|
732 |
+
(OB), and total branches (TB) as a function of
|
733 |
+
temperature.
|
734 |
+
ture range of 300-1200 K motivates us to look closely
|
735 |
+
the temperature variation of τλ for all phonon branches.
|
736 |
+
Here, from Eq. (4), τλ due to only PPI is estimated to
|
737 |
+
understand the behaviour of κph in the 300-1200 K tem-
|
738 |
+
perature range, which is shown in Fig. 6. In Fig. 6(a),
|
739 |
+
τλ of all nine branches is obtained by taking the average
|
740 |
+
weight of all q-points in the IBZ. Here, the same method
|
741 |
+
is used for the calculation of τλ as employed in earlier
|
742 |
+
work by Shastri et. al [40]. In the figure, one can clearly
|
743 |
+
notice that OB1 and OB2 have the highest τλ, signify-
|
744 |
+
ing the lowest phonon-phonon scattering among all the
|
745 |
+
branches.
|
746 |
+
The value of these branches is found to be
|
747 |
+
∼3.9(0.95) ps at 300(1200) K. The last OB9 branch has
|
748 |
+
a shorter τλ with a value of ∼0.07(0.02) ps at 300(1200)
|
749 |
+
K, indicating a higher scattering rate than other phonon
|
750 |
+
branches. All of the branches show decreasing τλ with in-
|
751 |
+
creasing temperature, indicating that phonons feel more
|
752 |
+
scattering at high temperatures than phonons at low
|
753 |
+
temperatures. It is also clear from the figure that the
|
754 |
+
decrement rate of τλ for the last three OB4-OB6 is much
|
755 |
+
slower than for other phonons with increasing temper-
|
756 |
+
ature that produce low κph.
|
757 |
+
This can be understood
|
758 |
+
through the PDOS plot in Fig. 2, in which the phonon
|
759 |
+
number densities of the last three OB are comparably
|
760 |
+
larger than other branches.
|
761 |
+
The corresponding region
|
762 |
+
contains strong phonon-phonon scattering interactions.
|
763 |
+
The τλ of TB, AB, and OB is also estimated by aver-
|
764 |
+
|
765 |
+
6
|
766 |
+
TABLE I: The variation of τλ (κph) with a relation of
|
767 |
+
AτT−xτ (AκT−xκ) [1] for acoustic branches (AB), optical
|
768 |
+
branches (OB), and total branches (TB).
|
769 |
+
Phonon branches Aτ(ps×K) xτ
|
770 |
+
Aκ (W/m)
|
771 |
+
xκ
|
772 |
+
AB1
|
773 |
+
1050
|
774 |
+
1.06
|
775 |
+
786
|
776 |
+
1.05
|
777 |
+
AB2
|
778 |
+
1113
|
779 |
+
1.03
|
780 |
+
893
|
781 |
+
1.03
|
782 |
+
AB3
|
783 |
+
628
|
784 |
+
1.01
|
785 |
+
463
|
786 |
+
1.02
|
787 |
+
OB1
|
788 |
+
1263
|
789 |
+
1.02
|
790 |
+
95
|
791 |
+
0.95
|
792 |
+
OB2
|
793 |
+
1288
|
794 |
+
1.02
|
795 |
+
119
|
796 |
+
0.94
|
797 |
+
OB3
|
798 |
+
609
|
799 |
+
1.03
|
800 |
+
127
|
801 |
+
0.95
|
802 |
+
OB4
|
803 |
+
59
|
804 |
+
1.02
|
805 |
+
0.81
|
806 |
+
0.85
|
807 |
+
OB5
|
808 |
+
54
|
809 |
+
1.02
|
810 |
+
1.12
|
811 |
+
0.84
|
812 |
+
OB6
|
813 |
+
17
|
814 |
+
0.98
|
815 |
+
0.76
|
816 |
+
0.75
|
817 |
+
AB
|
818 |
+
924
|
819 |
+
1.04
|
820 |
+
2133
|
821 |
+
1.04
|
822 |
+
OB
|
823 |
+
548
|
824 |
+
1.02
|
825 |
+
342
|
826 |
+
0.95
|
827 |
+
TB
|
828 |
+
672
|
829 |
+
1.03
|
830 |
+
2413
|
831 |
+
1.02
|
832 |
+
aging the corresponding number of phonon branches, as
|
833 |
+
shown in Fig. 6(b). The τλ of TB due to PPI is obtained
|
834 |
+
by taking the average of all phonon branches. The figure
|
835 |
+
presents that OB have lower τλ than AB and the values
|
836 |
+
are ∼1.65(2.5) ps and ∼0.4(0.6) ps for OB(AB) branches
|
837 |
+
at 300 and 1200 K, respectively. This means that the
|
838 |
+
AB transport more heat energy than OB in the form of
|
839 |
+
κph. The calculated room temperature value of τλ of TB
|
840 |
+
is ∼1.93 ps, while it decreases as temperature increases,
|
841 |
+
with a value of ∼0.46 ps at 1200 K.
|
842 |
+
The total number of phonons in a solid is pro-
|
843 |
+
portional to temperature T at higher temperatures (T≫
|
844 |
+
ΘD), which can be understood from Eq. (3). Since a
|
845 |
+
phonon that contributes to thermal conduction is more
|
846 |
+
likely to be scattered with other phonons that are present
|
847 |
+
in crystal, one should expect τλ to exhibit a decreas-
|
848 |
+
ing behaviour as temperature rises.
|
849 |
+
At high temper-
|
850 |
+
atures, the Cλ follows the Dulong-Petit law and be-
|
851 |
+
comes temperature-independent, which can also be ob-
|
852 |
+
served in Fig. 5(b). vλ is assumed to be a temperature-
|
853 |
+
independent constant in the Debye model, and even in
|
854 |
+
more accurate models, it will not have a significant con-
|
855 |
+
tribution to κph [1]. Therefore, in the high-temperature
|
856 |
+
regime, the κph should decrease as the temperature
|
857 |
+
rises. This temperature-dependence behaviour is con-
|
858 |
+
firmed by the experiment, and the rate of decline is
|
859 |
+
AκT−xκ [1]. The variables Aκ and xκ are temperature-
|
860 |
+
independent and the value of xκ lies between 1 and 2 [1].
|
861 |
+
Aκ and xκ are calculated by fitting the above relation in
|
862 |
+
the respective κph curve, which is shown in Table 1. The
|
863 |
+
calculated value of xκ for TB is ∼1.02, which is within
|
864 |
+
the experimental range. From the above discussion, it
|
865 |
+
is important to note that this kind of behaviour is valid
|
866 |
+
for T≫ ΘD. However, in our case, ΘD is estimated to
|
867 |
+
be ∼630 K [29], but the calculated κph follows this trend
|
868 |
+
at temperatures above 300 K. The xκ value for each AB
|
869 |
+
is greater than one and less than one for each OB. Also,
|
870 |
+
the xκ value for AB(OB) is ∼1.04(0.95), indicating that
|
871 |
+
AB controls the behaviour of xκ in TB. To deeply under-
|
872 |
+
stand the κph behaviour with temperature, the equation
|
873 |
+
τλ = AτT−xτ is also fitted in the respective plots. Here,
|
874 |
+
Aτ and xτ are also temperature-independent variables.
|
875 |
+
The value of xτ for TB is ∼1.03, while the values for AB
|
876 |
+
and OB are ∼1.04 and ∼1.02, respectively. Each phonon
|
877 |
+
branch (except OB6) has a xτ value greater than one,
|
878 |
+
while OB6 has a value of ∼0.98. Also, xτ and xκ due to
|
879 |
+
AB1-AB3 are nearly identical, whereas these values differ
|
880 |
+
slightly for OB1-OB6. This means that xτ values for all
|
881 |
+
AB contribute significantly more to xκ than the xτ val-
|
882 |
+
ues of all OB. The OB2 has highest Aτ of ∼1288 ps×K,
|
883 |
+
whereas AB2 has highest Aκ of ∼893 W/m.
|
884 |
+
Finally,
|
885 |
+
the conclusion can be drawn that acoustic modes are
|
886 |
+
the dominant heat carriers in the temperature-dependent
|
887 |
+
κph.
|
888 |
+
As a result, AB are dominant carriers in all three
|
889 |
+
previously studied parameters (vλ, Cλ and τλ), becom-
|
890 |
+
ing the larger contributor to the heat transfer process
|
891 |
+
in ScAgC in terms of κph. Among threes, the reduced
|
892 |
+
trend of τλ with increasing temperature leads directly to
|
893 |
+
the gradual decrement of κph in Fig. 4 with temperature.
|
894 |
+
One can get a high ZT by reducing the κph as much as
|
895 |
+
possible. Since τλ is higher for AB than OB, one can re-
|
896 |
+
duce the τλ of AB by accounting for the extra scattering
|
897 |
+
centres in the form of alloying, nanostructuring, and etc.,
|
898 |
+
[15, 41] in the energy range of AB. These extra scatter-
|
899 |
+
ings can provide a low κph and hence may give rise to a
|
900 |
+
high ZT , which is a positive sign for compounds used in
|
901 |
+
TE applications.
|
902 |
+
IV.
|
903 |
+
CONCLUSIONS
|
904 |
+
Here, we have performed the DFT calculations to
|
905 |
+
understand the lattice transport mechanisms of ScAgC
|
906 |
+
combined with the HA and QHA. The phonon band dis-
|
907 |
+
persion and phonon DOS are calculated under HA. The
|
908 |
+
obtained positive frequencies (with and without NAC)
|
909 |
+
of dispersion suggest the mechanical stability of ScAgC
|
910 |
+
in the FCC structure. The value of α(T ) is found to be
|
911 |
+
∼4×10−6 K−1 and ∼4.6×10−6 K−1 at 300 K and 1200
|
912 |
+
K, respectively. Similarly, first-principles based anhar-
|
913 |
+
monic phonon calculations have been used to analyse the
|
914 |
+
κph and the value is obtained as ∼7.4(1.8) Wm−1K−1 at
|
915 |
+
300(1200) K. The value of total τλ at 300 K is calculated
|
916 |
+
to be ∼1.93 ps, whereas it is observed as ∼0.46 ps at
|
917 |
+
1200 K. The highest calculated vλ for AB (OB) is ∼6.7
|
918 |
+
(3.5) km/s. At 200 K, the AB (OB) have the highest
|
919 |
+
(lowest) Cλ with a value of ∼23.5 (11.5) meV/K. By fit-
|
920 |
+
ting the equation of AκT−xκ(AτT−xτ ) in κph(τλ) curve,
|
921 |
+
the temperature-dependent behaviour is also understood.
|
922 |
+
The xκ value for AB(OB) is predicted to be ∼1.04(0.95),
|
923 |
+
while it is ∼1.02 for TB. Similarly, the obtained value of
|
924 |
+
xτ is ∼1.04(AB), ∼1.02(OB), and ∼1.03(TB). Our study
|
925 |
+
can be helpful in order to use ScAgC for renewable energy
|
926 |
+
sources such as TE and PV applications.
|
927 |
+
|
928 |
+
7
|
929 |
+
[1] N. W. Ashcroft and N. D. Mermin, Solid State Physics,
|
930 |
+
Vol. 239 (Saunders College Publishing, New York, 1976).
|
931 |
+
[2] G. P. Srivastava, The physics of phonons (Taylor and
|
932 |
+
Francis Group, New York, 1990).
|
933 |
+
[3] L. Chaput, Phys. Rev. Lett. 110, 265506 (2013).
|
934 |
+
[4] F. J. DiSalvo, Science 285, 703 (1999).
|
935 |
+
[5] V.
|
936 |
+
L.
|
937 |
+
Dalal
|
938 |
+
and
|
939 |
+
A.
|
940 |
+
R.
|
941 |
+
Moore,
|
942 |
+
J. Appl. Phys. 48, 1244 (1977).
|
943 |
+
[6] M.
|
944 |
+
Lambert
|
945 |
+
and
|
946 |
+
L.
|
947 |
+
Fletcher,
|
948 |
+
J Thermophys Heat Trans. 11, 129 (1997).
|
949 |
+
[7] S.
|
950 |
+
E.
|
951 |
+
Kim,
|
952 |
+
F.
|
953 |
+
Mujid,
|
954 |
+
A.
|
955 |
+
Rai,
|
956 |
+
and
|
957 |
+
et
|
958 |
+
al.,
|
959 |
+
Nature 597, 660 (2021).
|
960 |
+
[8] H. Song, J. Liu, B. Liu, and et al., Joule 2, 442 (2018).
|
961 |
+
[9] O.
|
962 |
+
Hellman,
|
963 |
+
I.
|
964 |
+
Abrikosov,
|
965 |
+
and
|
966 |
+
S.
|
967 |
+
Simak,
|
968 |
+
Phys. Rev. B 84, 180301 (2011).
|
969 |
+
[10] T.
|
970 |
+
Tadano
|
971 |
+
and
|
972 |
+
S.
|
973 |
+
Tsuneyuki,
|
974 |
+
Phys. Rev. B 92, 054301 (2015).
|
975 |
+
[11] W. Kohn and L. J. Sham, Phys. Rev. 140, A1133 (1965).
|
976 |
+
[12] A.
|
977 |
+
Togo,
|
978 |
+
L.
|
979 |
+
Chaput,
|
980 |
+
and
|
981 |
+
I.
|
982 |
+
Tanaka,
|
983 |
+
Phys. Rev. B 91, 094306 (2015).
|
984 |
+
[13] L. E. Bell, Science 321, 1457 (2008).
|
985 |
+
[14] Y.
|
986 |
+
Pei,
|
987 |
+
X.
|
988 |
+
Shi,
|
989 |
+
A.
|
990 |
+
LaLonde,
|
991 |
+
and
|
992 |
+
et
|
993 |
+
al.,
|
994 |
+
Nature 473, 66 (2011).
|
995 |
+
[15] G. Snyder and E. Toberer, Nat. Mater. 7, 105 (2008).
|
996 |
+
[16] S.
|
997 |
+
Sk,
|
998 |
+
P.
|
999 |
+
Devi,
|
1000 |
+
S.
|
1001 |
+
Singh,
|
1002 |
+
and
|
1003 |
+
et
|
1004 |
+
al.,
|
1005 |
+
Mater. Res. Express 6, 026302 (2018).
|
1006 |
+
[17] E. D. Case, J. Electron. Mater. 41, 1811 (2012).
|
1007 |
+
[18] D.
|
1008 |
+
Music,
|
1009 |
+
R.
|
1010 |
+
W.
|
1011 |
+
Geyer,
|
1012 |
+
and
|
1013 |
+
P.
|
1014 |
+
Keuter,
|
1015 |
+
Appl. Phys. Lett. 109, 223903 (2016).
|
1016 |
+
[19] L.
|
1017 |
+
Zhang,
|
1018 |
+
A.
|
1019 |
+
Grytsiv,
|
1020 |
+
B.
|
1021 |
+
Bonarski,
|
1022 |
+
and
|
1023 |
+
et
|
1024 |
+
al.,
|
1025 |
+
J. Alloys Compd. 494, 78 (2010).
|
1026 |
+
[20] S.
|
1027 |
+
Sk
|
1028 |
+
and
|
1029 |
+
S.
|
1030 |
+
K.
|
1031 |
+
Pandey,
|
1032 |
+
EPL (Europhys. Lett.) 137, 66002 (2022).
|
1033 |
+
[21] S. Sk and S. K. Pandey, arXiv preprint arXiv:2204.11198
|
1034 |
+
(2022).
|
1035 |
+
[22] S.
|
1036 |
+
S.
|
1037 |
+
Shastri
|
1038 |
+
and
|
1039 |
+
S.
|
1040 |
+
K.
|
1041 |
+
Pandey,
|
1042 |
+
J. Phys. Condens. Matter 33, 085704 (2020).
|
1043 |
+
[23] T.
|
1044 |
+
Graf,
|
1045 |
+
C.
|
1046 |
+
Felser,
|
1047 |
+
and
|
1048 |
+
S.
|
1049 |
+
S.
|
1050 |
+
Parkin,
|
1051 |
+
Prog. Solid State Chem. 39, 1 (2011).
|
1052 |
+
[24] S.
|
1053 |
+
S.
|
1054 |
+
Shastri
|
1055 |
+
and
|
1056 |
+
S.
|
1057 |
+
K.
|
1058 |
+
Pandey,
|
1059 |
+
J. Phys. Condens. Matter 32, 355705 (2020).
|
1060 |
+
[25] J.
|
1061 |
+
Shiomi,
|
1062 |
+
K.
|
1063 |
+
Esfarjani,
|
1064 |
+
and
|
1065 |
+
G.
|
1066 |
+
Chen,
|
1067 |
+
Phys. Rev. B 84, 104302 (2011).
|
1068 |
+
[26] L.
|
1069 |
+
Yu
|
1070 |
+
and
|
1071 |
+
A.
|
1072 |
+
Zunger,
|
1073 |
+
Phys. Rev. Lett. 108, 068701 (2012).
|
1074 |
+
[27] T. Gruhn, Phys. Rev. B 82, 125210 (2010).
|
1075 |
+
[28] V.
|
1076 |
+
Pandey,
|
1077 |
+
A.
|
1078 |
+
Sihi,
|
1079 |
+
and
|
1080 |
+
S.
|
1081 |
+
K.
|
1082 |
+
Pandey,
|
1083 |
+
J. Phys. Condens. Matter 33, 475503 (2021).
|
1084 |
+
[29] V.
|
1085 |
+
K.
|
1086 |
+
Solet,
|
1087 |
+
S.
|
1088 |
+
Sk,
|
1089 |
+
and
|
1090 |
+
S.
|
1091 |
+
K.
|
1092 |
+
Pandey,
|
1093 |
+
Phys. Scr. 97, 105711 (2022).
|
1094 |
+
[30] A.
|
1095 |
+
Royne,
|
1096 |
+
C.
|
1097 |
+
J.
|
1098 |
+
Dey,
|
1099 |
+
and
|
1100 |
+
D.
|
1101 |
+
R.
|
1102 |
+
Mills,
|
1103 |
+
Sol. Energy Mater. Sol. Cells 86, 451 (2005).
|
1104 |
+
[31] G.
|
1105 |
+
Kresse,
|
1106 |
+
J.
|
1107 |
+
Furthm¨uller,
|
1108 |
+
and
|
1109 |
+
J.
|
1110 |
+
Hafner,
|
1111 |
+
Europhys. Lett. 32, 729 (1995).
|
1112 |
+
[32] A. Togo and I. Tanaka, Scr. Mater. 108, 1 (2015).
|
1113 |
+
[33] X. Gonze,
|
1114 |
+
J.-M. Beuken,
|
1115 |
+
R. Caracas, and et al.,
|
1116 |
+
Comput. Mater. Sci. 25, 478 (2002).
|
1117 |
+
[34] P. E. Bl¨ochl, Phys. Rev. B 50, 17953 (1994).
|
1118 |
+
[35] J.
|
1119 |
+
P.
|
1120 |
+
Perdew,
|
1121 |
+
K.
|
1122 |
+
Burke,
|
1123 |
+
and
|
1124 |
+
M.
|
1125 |
+
Ernzerhof,
|
1126 |
+
Phys. Rev. Lett. 77, 3865 (1996).
|
1127 |
+
[36] X. Gonze, B. Amadon, P.-M. Anglade, and et al.,
|
1128 |
+
Comput. Phys. Comm. 180, 2582 (2009).
|
1129 |
+
[37] J. Zwanziger, J. Galbraith, Y. Kipouros, and et al.,
|
1130 |
+
Comput. Mater. Sci. 58, 113 (2012).
|
1131 |
+
[38] F.
|
1132 |
+
Detraux,
|
1133 |
+
P.
|
1134 |
+
Ghosez,
|
1135 |
+
and
|
1136 |
+
X.
|
1137 |
+
Gonze,
|
1138 |
+
Phys. Rev. Lett. 81, 3297 (1998).
|
1139 |
+
[39] F. Birch, Phys. Rev. 71, 809 (1947).
|
1140 |
+
[40] S.
|
1141 |
+
S.
|
1142 |
+
Shastri
|
1143 |
+
and
|
1144 |
+
S.
|
1145 |
+
K.
|
1146 |
+
Pandey,
|
1147 |
+
J. Phys. Condens. Matter 33, 265702 (2021).
|
1148 |
+
[41] D. J. Singh and I. Terasaki, Nat. Mater. 7, 616 (2008).
|
1149 |
+
[42] A. Maradudin and A. Fein, Phys. Rev. 128, 2589 (1962).
|
1150 |
+
|
1151 |
+
8
|
1152 |
+
Supplementary material for “Ab-initio study of
|
1153 |
+
phononic thermal conduction in ScAgC
|
1154 |
+
half-Heusler”
|
1155 |
+
V.
|
1156 |
+
METHOD OF CALCULATION OF LATTICE
|
1157 |
+
THERMAL CONDUCTIVITY
|
1158 |
+
After getting the full solution of LBTE using the
|
1159 |
+
single mode relaxation time (SMRT) approximation [2],
|
1160 |
+
the closed tensor form of lattice thermal conductivity κph
|
1161 |
+
is written as follows [12]:
|
1162 |
+
κph =
|
1163 |
+
1
|
1164 |
+
NV0
|
1165 |
+
�
|
1166 |
+
λ
|
1167 |
+
Cλvλ ⊗ vλτ SMRT
|
1168 |
+
λ
|
1169 |
+
.
|
1170 |
+
(1)
|
1171 |
+
Here, N and V0 are the number of unit cells and vol-
|
1172 |
+
ume of unit cell, respectively. Cλ and vλ is the model
|
1173 |
+
specific heat and phonon group velocity of phonon mode
|
1174 |
+
λ, respectively. Here λ is the phonon mode denoted by
|
1175 |
+
a set of (q, j) with wave vector q in branch j. τ SMRT
|
1176 |
+
λ
|
1177 |
+
is the relaxation time of corresponding phonon mode λ.
|
1178 |
+
τ SMRT
|
1179 |
+
λ
|
1180 |
+
is approximately considered to be phonon lifetime
|
1181 |
+
τλ in order to further calculate κph. Then, τλ is obtained
|
1182 |
+
from the imaginary part of phonon self-energy Γλ(ωλ) by
|
1183 |
+
considering only phonon-phonon interaction (PPI). The
|
1184 |
+
anharmonic third-order force constant is used to calcu-
|
1185 |
+
late the Γλ(ωλ), which is obtained from the many-body
|
1186 |
+
perturbation theory as [12],
|
1187 |
+
Γλ(ω) = 18π
|
1188 |
+
ℏ2
|
1189 |
+
�
|
1190 |
+
λ′ λ′′
|
1191 |
+
��Φ−λλ′ λ′′ ��2
|
1192 |
+
��
|
1193 |
+
nλ′ + nλ′′ + 1
|
1194 |
+
�
|
1195 |
+
×δ
|
1196 |
+
�
|
1197 |
+
ω − ωλ′ − ωλ′′ �
|
1198 |
+
+
|
1199 |
+
�
|
1200 |
+
nλ′ − nλ′′ �
|
1201 |
+
×
|
1202 |
+
�
|
1203 |
+
δ
|
1204 |
+
�
|
1205 |
+
ω + ωλ′ − ωλ′′ �
|
1206 |
+
−δ
|
1207 |
+
�
|
1208 |
+
ω − ωλ′ + ωλ′′ ���
|
1209 |
+
.
|
1210 |
+
(2)
|
1211 |
+
Where nλ represents the Bose–Einstein thermal distribu-
|
1212 |
+
tion function at the equilibrium of a particular phonon
|
1213 |
+
mode λ, which is given as,
|
1214 |
+
nλ =
|
1215 |
+
1
|
1216 |
+
exp(ℏωλ/kBT ) − 1
|
1217 |
+
(3)
|
1218 |
+
Φ−λλ′ λ′′ indicates the all possible three-phonon
|
1219 |
+
interaction strengths between modes of λ, λ
|
1220 |
+
′ and λ
|
1221 |
+
′′ in-
|
1222 |
+
volving in the scattering, which can be obtained from
|
1223 |
+
anharmonic third-order force constants.
|
1224 |
+
From Eq. (2), one can calculate the τλ of phonon
|
1225 |
+
branch λ as [12, 42],
|
1226 |
+
τ SMRT
|
1227 |
+
λ
|
1228 |
+
≡ τλ =
|
1229 |
+
1
|
1230 |
+
2Γλ(ωλ)
|
1231 |
+
(4)
|
1232 |
+
Where 2Γλ(ωλ) is the phonon linewidth and ωλ denotes
|
1233 |
+
the harmonic phonon frequency of a mode λ.
|
1234 |
+
The mode-dependent Cλ and vλ can be estimated
|
1235 |
+
directly from the solution of eigan-value problem [12],
|
1236 |
+
Cλ = kB
|
1237 |
+
� ℏωλ
|
1238 |
+
kBT
|
1239 |
+
�2
|
1240 |
+
exp(ℏωλ/kBT )
|
1241 |
+
[exp(ℏωλ/kBT ) − 1]2 ,
|
1242 |
+
(5)
|
1243 |
+
and,
|
1244 |
+
vα(λ) ≡ ∂ωλ
|
1245 |
+
∂qα
|
1246 |
+
=
|
1247 |
+
1
|
1248 |
+
2ωλ
|
1249 |
+
�
|
1250 |
+
kk′ βγ
|
1251 |
+
Wβ(k, λ)∂Dβγ(kk
|
1252 |
+
′, q)
|
1253 |
+
∂qα
|
1254 |
+
Wγ(k
|
1255 |
+
′, λ).
|
1256 |
+
(6)
|
1257 |
+
where α, β, and γ are the Cartesian indices. Wβ(k, λ) is
|
1258 |
+
the polarization vector of kth atom in a unit cell, which
|
1259 |
+
is obtained after solving the eigan-value equation of a
|
1260 |
+
dynamical matrix D(q) [12].
|
1261 |
+
|
CtAzT4oBgHgl3EQfGfuT/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
CtE2T4oBgHgl3EQf9Ant/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:18c3b910344161e4ddbf62a79de6a803486c02eb61263ba502910874dcfc21dd
|
3 |
+
size 233137
|
DtAzT4oBgHgl3EQfT_x1/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:acd37976edb13d06aea18e7c6160a2018668f238ea0afb45bcf623e603eb275c
|
3 |
+
size 11468845
|
E9AyT4oBgHgl3EQfevjq/content/tmp_files/2301.00329v1.pdf.txt
ADDED
@@ -0,0 +1,1253 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Moduli Stabilisation, de Sitter Vacua and Hybrid Inflation
|
2 |
+
in Large Volume Compactifications
|
3 |
+
Waqas Ahmeda 1, Athanasios Karozasb 2, George K. Leontarisb 3, Ilias Tavellarisb 4
|
4 |
+
a School of Mathematics and Physics, Hubei Polytechnic University
|
5 |
+
Huangshi 435003, China
|
6 |
+
b Physics Department, University of Ioannina
|
7 |
+
45110, Ioannina, Greece
|
8 |
+
Abstract
|
9 |
+
We study the cosmological implications of an effective field theory model derived within a con-
|
10 |
+
figuration of D7 brane stacks in the framework of type-IIB string theory. We consider a suitable
|
11 |
+
geometric setup where the Kähler moduli fields are stabilised and the parametric space is constrained
|
12 |
+
so that a de Sitter vacuum is ensured. In addition to the moduli fields we also take into account the
|
13 |
+
usual Higgs and matter fields included in the effective field theory. In this background we implement
|
14 |
+
the standard hybrid inflation scenario with a singlet scalar field acting as the inflaton and the Higgs
|
15 |
+
states serving as waterfall fields. Radiative corrections and soft supersymmetry breaking terms play
|
16 |
+
an essential role in the realisation of a successful inflationary scenario consistent with the present
|
17 |
+
cosmological data. Small tensor-to-scalar ratio values are predicted, which can be probed in future
|
18 |
+
planned experiments. Further constraints on the model’s parameters are derived from bounds on
|
19 |
+
dark radiation which is measured as a contribution to the effective number of neutrino species Nef f .
|
20 |
+
In particular, we find an excess of ∆Nef f ≤ 0.95 at 2σ confidence level with natural values of the
|
21 |
+
involved couplings.
|
22 |
+
1E-mail: [email protected]
|
23 |
+
2E-mail: mailto:[email protected]
|
24 |
+
3E-mail: [email protected]
|
25 |
+
4E-mail: [email protected]
|
26 |
+
arXiv:2301.00329v1 [hep-ph] 1 Jan 2023
|
27 |
+
|
28 |
+
Contents
|
29 |
+
1
|
30 |
+
Introduction
|
31 |
+
1
|
32 |
+
2
|
33 |
+
Description of the model and its constituents
|
34 |
+
3
|
35 |
+
3
|
36 |
+
The effective potential
|
37 |
+
5
|
38 |
+
3.1
|
39 |
+
Inflationary phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
40 |
+
8
|
41 |
+
3.2
|
42 |
+
Numerical results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
43 |
+
10
|
44 |
+
4
|
45 |
+
Reheating and dark radiation
|
46 |
+
12
|
47 |
+
5
|
48 |
+
Conclusions
|
49 |
+
15
|
50 |
+
1
|
51 |
+
Introduction
|
52 |
+
Cosmological inflation is one of the most successful candidate scenarios in explaining the evolution
|
53 |
+
of the Universe and its large scale structure observed today. Meanwhile, numerous effective quantum
|
54 |
+
field theory models have been built aimed to conciliating cosmic inflation with particle physics models
|
55 |
+
describing the low energy observables. A key criterion on the quest for appropriate models would be to
|
56 |
+
have an ultra-violet (UV) completion in a quantum theory of gravity, valid up to the Planck scale MP. In
|
57 |
+
this context, at present, string theory appears to be the only promising candidate for a consistent quantum
|
58 |
+
theory at such a high scale which incorporates the Standard Model (SM) and its minimal supersymmetric
|
59 |
+
extension (MSSM). String theory, however, is formulated in a ten dimensional spacetime framework
|
60 |
+
and, therefore, compactification of the six extra dimensions is required to achieve a four-dimensional
|
61 |
+
effective field theory compatible with the observed world. The reduction of the corresponding higher
|
62 |
+
dimensional string action to four spacetime dimensions, however, entails an immense set of string vacua
|
63 |
+
which is commonly nicknamed the string landscape. Yet, starting from a successful effective field theory
|
64 |
+
which describes adequately the known physics phenomena, we cannot always embed it in a string theory
|
65 |
+
framework.
|
66 |
+
On the other hand, consistent effective field theory models emerging after compactification should
|
67 |
+
possess a number of important features. Amongst them, they should predict a positive tiny cosmological
|
68 |
+
constant Λ of the order Λ ≈ 10−120 M4
|
69 |
+
P which could account for the dark energy, as suggested by cos-
|
70 |
+
mological observations. A simple way to realise such a scenario is within an effective model involving
|
71 |
+
a scalar field φ with a potential V(φ) which displays a (possibly metastable) positive minimum equal to
|
72 |
+
the cosmological constant Λ. In fact, effective field theory models from strings compactified on Calabi-
|
73 |
+
Yau (CY) manifolds contain a vast number of moduli fields and some of them could play the role of the
|
74 |
+
inflaton φ. In this context, it is inferred that the cosmological issues are intertwined with the well known
|
75 |
+
problem of moduli stabilisation. In fact, moduli stabilisation and (metastable) de Sitter vacua, play a key
|
76 |
+
role for the successful implementation of the cosmological inflationary scenario in effective field theory
|
77 |
+
|
78 |
+
(EFT) models of string origin. Therefore, reconciling these two issues is essential in the quest for a suit-
|
79 |
+
able non-vanishing effective potential of some scalar field enacting as the inflaton φ which rolls down
|
80 |
+
to the minimum of its (relatively shallow) potential. This enables the required exponential growth of the
|
81 |
+
Universe, provided that the trajectory length ∼ ∆φ of the field φ to reach the minimum is sufficiently
|
82 |
+
long to trigger inflation.
|
83 |
+
A particular class of models involves constructions with large volume compactification scenarios [1]
|
84 |
+
and inflatons associated with the Kähler moduli fields Tk = τk +iak. In previous scenarios [2, 3] consid-
|
85 |
+
ered in the context of type-IIB theory it was shown that the internal volume modulus V expressed in terms
|
86 |
+
of the real components of Kähler moduli, ReTk = τk, is a suitable candidate for this role, (φ ∝ logV ).
|
87 |
+
Radiative corrections associated with intersecting space-filling D7 branes on the other hand, provide a
|
88 |
+
stabilisation mechanism for Kähler moduli, and an uplift to their scalar potential through their universal
|
89 |
+
abelian factors, this way leading to a positive cosmological constant. In particular, Kähler moduli stabil-
|
90 |
+
isation is achieved through a non-zero potential generated by α′ and radiative (logarithmic) corrections
|
91 |
+
induced when closed string loops traverse their codimension-two bulk towards localised gravity sources.
|
92 |
+
Furthermore, the dS vacuum is obtained due to the positive D-term contributions, (originally proposed
|
93 |
+
in [4]) from the intersecting D7-branes.
|
94 |
+
In the large volume limit, the induced effective potential for the Kähler moduli receives a simple
|
95 |
+
structure possessing two local extrema (a minimum and a maximum) and approaches to zero for φ → ∞.
|
96 |
+
The separation distance of its two local extrema is of the order, ∆φ = φmax − φmin ∝ log(Vmax/Vmin).
|
97 |
+
In the minimal effective model involving only moduli fields, it can be parametrised in terms of a single
|
98 |
+
non-negative parameter while the larger possible separation ∆φ occurs at a critical value of this parameter
|
99 |
+
where beyond this point only AdS solutions appear. A non-zero value of the aforementioned parameter
|
100 |
+
exists at which a new inflationary small-field scenario is successfully implemented. In this novel scenario
|
101 |
+
most of the required number N0 of efolds (N0 ∼ 60) are collected in the vicinity of the minimum of the
|
102 |
+
potential and the prediction for the tensor-to-scalar ratio density fluctuations in the early universe is
|
103 |
+
r ≈ 4 × 10−4. Despite these successes of the model, yet the picture is not complete and a waterfall
|
104 |
+
mechanism has to be realised in order to end inflation and bring the dS vacuum down to a lower value
|
105 |
+
compatible with the cosmological constant. It has been shown [5] that when open string states appearing
|
106 |
+
in the D7 brane intersections are included in the massless spectrum, appropriate magnetic fluxes and
|
107 |
+
specific brane separations can be chosen in a way that, for V less than some critical value, a charged
|
108 |
+
open string scalar becomes tachyonic. In [5, 6] it was shown that such a state can represent a waterfall
|
109 |
+
field. In possible generalisations of this scenario, one may include several of such fields, which end
|
110 |
+
inflation and provide a deeper vacuum in accordance with the present value of Λ.
|
111 |
+
In the present work an alternative scenario is proposed where it is taken into account that, in addition
|
112 |
+
to the moduli fields, the EFT model accommodates the ordinary fermion matter and the Higgs fields in
|
113 |
+
appropriate representations on the gauge group stemming from the specific details of the compactifica-
|
114 |
+
tion procedure. Then, a possible and interesting variation of the scenario described previously would be
|
115 |
+
that the Higgs rolls down a potential hill towards a new lower minimum, where its initial condition is de-
|
116 |
+
fined around the metastable vacuum of the moduli potential. In the present construction, the metastable
|
117 |
+
vacuum is determined by the Kähler moduli and the associated compactification volume V . More pre-
|
118 |
+
2
|
119 |
+
|
120 |
+
cisely, we implement the standard hybrid inflation with a singlet scalar field acting as inflaton and the
|
121 |
+
Higgses used as waterfall fields. In this scenario the vacuum energy is determined by the scalar field
|
122 |
+
and waterfall fields. We consider radiative corrections which are essential in shaping the slope along the
|
123 |
+
inflationary track. Since supersymmetry (SUSY) is broken during inflation, we also include SUSY soft
|
124 |
+
terms as well. The soft terms play an important role in order to achieve spectral index (ns) values consis-
|
125 |
+
tent with the current experimental bounds. We find small tensor-to-scalar values which can be probed in
|
126 |
+
future designed experiments. We also discuss dark radiation and show that change in the effective degree
|
127 |
+
of neutrinos satisfy the bound 0.95% confidence level with natural values of the involved couplings.
|
128 |
+
The paper is organised as follows. In Section 2 we present the basic features of the model including
|
129 |
+
the Kähler potential and the superpotential. An analysis of the effective potential is given in Section 3
|
130 |
+
followed by the presentation of the inflation setup along with our inflationary numerical predictions. In
|
131 |
+
Section 4 we discuss reheating and dark radiation predictions. Section 5 concludes the paper.
|
132 |
+
2
|
133 |
+
Description of the model and its constituents
|
134 |
+
In this work we consider a type-IIB string framework in ten dimensions where six of them are compact-
|
135 |
+
ified on a Calabi-Yau threefold X . We restrict our attention mainly to the moduli spectrum and use the
|
136 |
+
following notation: φ represents the dilaton field, while Ti, and za denote the Kähler and the complex
|
137 |
+
structure (CS) moduli respectively. Furthermore, we introduce the usual axion-dilaton combination
|
138 |
+
τ = C0 +ie−φ ≡ C0 + i
|
139 |
+
gs
|
140 |
+
,
|
141 |
+
(2.1)
|
142 |
+
where gs is the string coupling and C0 a 0-form potential (RR-scalar). We assume a perturbative -flux
|
143 |
+
induced- superpotential W0 of the form proposed in [7]. At the classical level, W0 is a holomorphic
|
144 |
+
function which depends on the axion-dilaton modulus τ, and the CS moduli za 5. τ and za are stabilised
|
145 |
+
in the standard supersymmetric way, by solving DτW0 = 0, DzaW0 = 0, where DI = ∂IW +W∂IK are the
|
146 |
+
covariant derivatives.
|
147 |
+
We consider a geometric configuration of three intersecting D7-brane stacks equipped with magnetic
|
148 |
+
fluxes. Regarding the Kähler potential, we will take into account α′ corrections as well as the effects
|
149 |
+
of a novel four-dimensional Einstein-Hilbert (EH) term (localised in the internal space) which is gener-
|
150 |
+
ated from higher derivative terms in the ten-dimensional string effective action [3]. This setup induces
|
151 |
+
logarithmic corrections to the scalar potential via loop effects. Taking into account these corrections the
|
152 |
+
relevant part of the Kähler potential receives the form [3]
|
153 |
+
K = −2log(V +ξ0 +η0 logV )+···
|
154 |
+
(2.2)
|
155 |
+
where the dots stand for terms depending on za and τi. The general form of the volume is given by
|
156 |
+
V = 1
|
157 |
+
6κi jktit jtk where ti are the two-cycle Kähler moduli fields and κi jk are triple intersection numbers
|
158 |
+
5We dispense with the use of non-perturbative corrections which would also introduce the Kähler moduli through terms of
|
159 |
+
the form WNP ∝ e−aTk. As explained in the subsequent analysis, Tk can be perturbatively stabilised through one-loop corrected
|
160 |
+
Kähler potential.
|
161 |
+
3
|
162 |
+
|
163 |
+
on X . We will assume a particular CY manifold with three Kähler moduli fields where the simple
|
164 |
+
relation τi = at jtk (where a a positive constant) holds between the two- and four-cycle moduli, and the
|
165 |
+
volume is simply given by [8]
|
166 |
+
V = at1t2t3 = τiti = 1
|
167 |
+
√a
|
168 |
+
√τ1τ2τ3
|
169 |
+
(2.3)
|
170 |
+
As will be shown subsequently, the quantum corrections break the no-scale structure of the effective
|
171 |
+
theory and give a non-zero contribution to the F-part of the supergravity scalar potential.
|
172 |
+
After the dimensional reduction, the effective field theory model is assumed to be either some Grand
|
173 |
+
Unified Theory (GUT) or directly the MSSM model where the ordinary low energy (super)-fields appear
|
174 |
+
in appropriate representations of the EFT gauge group. Thus, in addition to the quantum corrections
|
175 |
+
considered above, we also include matter fields in the Kähler potential. These contributions to the Käh-
|
176 |
+
ler potential are essential in studying soft supersymmetry breaking effects and cosmological inflation.
|
177 |
+
Within the present context, in particular, we focus on the Higgs sector which plays a vital role in im-
|
178 |
+
plementing the scenario of hybrid inflation and investigating the possible production of dark radiation.
|
179 |
+
Thus, we consider a generic set of Higgs pairs Φi, ¯Φi which are assumed to break the gauge group at
|
180 |
+
some GUT scale much lower that the Planck scale MP. We have also introduced a field S, representing
|
181 |
+
a gauge singlet superfield which realises the trilinear superpotential couplings of the form SΦ ¯Φ. Such
|
182 |
+
singlet fields are ubiquitous in effective string theory models. In the setup described so far, the relevant
|
183 |
+
terms of the superpotential have the following generic form
|
184 |
+
W = W0 +κS(ΦΦ−M2)+···
|
185 |
+
(2.4)
|
186 |
+
where κ is a coupling constant coefficient, M represents a high scale mass parameter, W0 the flux induced
|
187 |
+
part introduced previously, and dots stand for possible terms irrelevant to our discussion.
|
188 |
+
Including contributions of the above matter fields in the Kähler potential (2.2), while setting the
|
189 |
+
Planck mass, MP = 1, we obtain the following generic form
|
190 |
+
K = −2log
|
191 |
+
�
|
192 |
+
�
|
193 |
+
�
|
194 |
+
3
|
195 |
+
∏
|
196 |
+
k=1
|
197 |
+
(Tk + ¯Tk)
|
198 |
+
� 1
|
199 |
+
2
|
200 |
+
+C
|
201 |
+
�
|
202 |
+
�+
|
203 |
+
3
|
204 |
+
∑
|
205 |
+
k=1
|
206 |
+
ak
|
207 |
+
Tk + ¯Tk
|
208 |
+
fk(Φi, ¯Φi...,S, ¯S)
|
209 |
+
(2.5)
|
210 |
+
where C is a function with a logarithmic dependence on the three moduli fields T1,2,3 defined as
|
211 |
+
C = ξ0 +η0log
|
212 |
+
�
|
213 |
+
3
|
214 |
+
∏
|
215 |
+
k=1
|
216 |
+
(Tk + ¯Tk)
|
217 |
+
�
|
218 |
+
.
|
219 |
+
(2.6)
|
220 |
+
In the above equation the parameter ξ0 stands for α′3 corrections [9] and is proportional to the Euler
|
221 |
+
characteristic χCY of the Calabi-Yau manifold
|
222 |
+
ξ0 = −ζ(3)
|
223 |
+
4
|
224 |
+
χCY ,
|
225 |
+
(2.7)
|
226 |
+
and η0 is an order one coefficient [3]. The functions fk in Eq (2.5) describe the visible Higgs sector. For
|
227 |
+
simplicity we will assume that all fk are the same and have the following form
|
228 |
+
f(Φ,Φ,S) = αΦΦ† +βΦΦ
|
229 |
+
† +γSS† +λ(ΦΦ+h.c.)
|
230 |
+
(2.8)
|
231 |
+
4
|
232 |
+
|
233 |
+
where α,β,γ and λ are dimensionless couplings. Furthermore, we will adopt the approach used in [10]
|
234 |
+
and we will express the matter contribution term in (2.5) in terms of the compactification volume (note
|
235 |
+
that T ∝ V 2/3), hence, the Kähler potential in Eq. (2.5) is reduced to the following form
|
236 |
+
K = −2log[V +ξ0 +η0log(V )]+ 3a
|
237 |
+
V 2/3
|
238 |
+
�
|
239 |
+
αΦΦ† +βΦΦ
|
240 |
+
† +γSS† +λ(ΦΦ+h.c)
|
241 |
+
�
|
242 |
+
(2.9)
|
243 |
+
where a is a constant and V is defined in (2.3).
|
244 |
+
Up to this point we have presented the minimum number of moduli and matter fields which are
|
245 |
+
necessary for our subsequent analysis. Next, we proceed with the computation of the scalar potential
|
246 |
+
which is essential to investigate the properties of the model and compute the various cosmological and
|
247 |
+
other phenomenological observables.
|
248 |
+
3
|
249 |
+
The effective potential
|
250 |
+
The scalar potential of the effective field theory model receives various contributions. As we will see
|
251 |
+
shortly, in the present construction there are F- and D-terms associated with the moduli sector, and
|
252 |
+
contributions from the EFT matter fields, as well as supersymmetry breaking terms. We start with the
|
253 |
+
F-term potential which is given by the generic formula
|
254 |
+
VF = eG �
|
255 |
+
GiG−1
|
256 |
+
i j∗ G j∗ −3
|
257 |
+
�
|
258 |
+
,
|
259 |
+
(3.1)
|
260 |
+
where
|
261 |
+
G = K +log|W|2 ≡ K +logW +logW ∗
|
262 |
+
and the indices i, j in (3.1) denote the derivatives with respect to the various moduli and other fields.
|
263 |
+
Computing the derivatives, and substituting in Eq. (3.1) while keeping only the leading order terms,
|
264 |
+
the F-term potential receives the following simplified form
|
265 |
+
VF
|
266 |
+
≃
|
267 |
+
κ2αβ
|
268 |
+
�
|
269 |
+
M2 −ϕϕ
|
270 |
+
�2 +γκ2S2 �
|
271 |
+
αϕ2 +βϕ2�
|
272 |
+
3aαβγV 4/3
|
273 |
+
+ 3W 2
|
274 |
+
0 (2η0 logV −8η0 +ξ0)
|
275 |
+
2V 3
|
276 |
+
,
|
277 |
+
(3.2)
|
278 |
+
where ϕ and ϕ are the bosonic components of the superfields Φ and Φ.
|
279 |
+
At the extrema of the F-term potential the fields take the following values 6
|
280 |
+
So = 0,
|
281 |
+
ϕoϕo = M2,
|
282 |
+
Vo = e
|
283 |
+
13
|
284 |
+
3 − ξ0
|
285 |
+
2η0 .
|
286 |
+
(3.3)
|
287 |
+
Substituting the solution (3.3) into (3.2) we obtain
|
288 |
+
V extr.
|
289 |
+
F
|
290 |
+
=
|
291 |
+
3|W0|2η0(2logVo −8+ ξ0
|
292 |
+
η0 )
|
293 |
+
2V 3
|
294 |
+
o
|
295 |
+
≡ η0
|
296 |
+
|W0|2
|
297 |
+
V 3
|
298 |
+
o
|
299 |
+
.
|
300 |
+
(3.4)
|
301 |
+
6In more general EFT backgrounds it is possible that minimisation with respect to the fields S,Φi leads to a potential
|
302 |
+
of the form V ∼
|
303 |
+
a
|
304 |
+
5V 4/3 + 1
|
305 |
+
3
|
306 |
+
b+η logV
|
307 |
+
V 3
|
308 |
+
. In this case it is possible to have a dS minimum with the volume acquiring a value
|
309 |
+
V 5/3
|
310 |
+
0
|
311 |
+
=
|
312 |
+
� 9n
|
313 |
+
4a
|
314 |
+
�
|
315 |
+
W
|
316 |
+
�
|
317 |
+
4a
|
318 |
+
9n
|
319 |
+
�
|
320 |
+
e
|
321 |
+
1
|
322 |
+
3 − b
|
323 |
+
n
|
324 |
+
�5/3�
|
325 |
+
, where W is the product-log (Lambert) function.
|
326 |
+
5
|
327 |
+
|
328 |
+
20000
|
329 |
+
30000
|
330 |
+
40000
|
331 |
+
50000
|
332 |
+
60000
|
333 |
+
-2.×10-13
|
334 |
+
-1.5×10-13
|
335 |
+
-1.×10-13
|
336 |
+
-5.×10-14
|
337 |
+
x
|
338 |
+
V (x)
|
339 |
+
25000 30000 35000 40000 45000 50000 55000 60000
|
340 |
+
1.×10-15
|
341 |
+
2.×10-15
|
342 |
+
3.×10-15
|
343 |
+
4.×10-15
|
344 |
+
5.×10-15
|
345 |
+
6.×10-15
|
346 |
+
7.×10-15
|
347 |
+
x
|
348 |
+
V (x)
|
349 |
+
Figure 1: Plots of the potential along the volume direction. The left panel shows the F-term potential, while in
|
350 |
+
the right panel the D-term potential has also been included. We choose ξ0 = 10, η0 = −0.92, S = 0, ϕ = ϕ = M,
|
351 |
+
κ = 0.1 and γ = 1. Here x represents the volume, x ≡ V .
|
352 |
+
A simple analysis shows that this is a minimum of the potential as long as η0 < 0. However, since
|
353 |
+
|W0|2
|
354 |
+
V 3
|
355 |
+
0
|
356 |
+
> 0, the potential (3.4) at the minimum aquires a negative value, hence it turns out that the F-term
|
357 |
+
potential predicts an anti-de Sitter (AdS) vacuum. In Fig. 1, left panel, the F-term potential with AdS
|
358 |
+
minimum is plotted for a choice of the parameters ξ0,η0,W0.
|
359 |
+
Despite the forgoing negative F-term contribution, the potential can be lifted to a de Sitter minimum,
|
360 |
+
once D-term contributions [4, 11] associated with the U(1) symmetries of the D7-branes are taken into
|
361 |
+
account [2]. More precisely, in the present geometric setting, there are D-term contributions due to the
|
362 |
+
universal U(1) factors associated with the D7 brane stacks. These terms have the general form [2, 11]
|
363 |
+
VD =
|
364 |
+
3
|
365 |
+
∑
|
366 |
+
i=1
|
367 |
+
g2
|
368 |
+
D7i
|
369 |
+
2
|
370 |
+
�
|
371 |
+
Qi∂TiK +∑
|
372 |
+
j
|
373 |
+
qj|Θj|2
|
374 |
+
�2
|
375 |
+
,
|
376 |
+
(3.5)
|
377 |
+
where gD7i = (ReTi)−1 and Qi,qj are “charges” while Θj represent possible gauge singlets of the effective
|
378 |
+
field theory model. For ⟨Θj⟩ = 0 (see [11] for an extended discussion related to D-terms) the second term
|
379 |
+
in the parenthesis vanishes and each component of the D-term aquires a simple -model independent- form
|
380 |
+
VDi ≈ Q2
|
381 |
+
i /τ3
|
382 |
+
i . Then, the total D-term potential, being the sum of three components, is approximated by [2]
|
383 |
+
VD =
|
384 |
+
3
|
385 |
+
∑
|
386 |
+
i=1
|
387 |
+
di
|
388 |
+
τi
|
389 |
+
�∂K
|
390 |
+
∂τi
|
391 |
+
�2
|
392 |
+
≈
|
393 |
+
3
|
394 |
+
∑
|
395 |
+
i=1
|
396 |
+
di
|
397 |
+
τ3
|
398 |
+
i
|
399 |
+
≡ d1
|
400 |
+
τ3
|
401 |
+
1
|
402 |
+
+ d3
|
403 |
+
τ3
|
404 |
+
3
|
405 |
+
+ d2τ3
|
406 |
+
1τ3
|
407 |
+
3
|
408 |
+
V 6
|
409 |
+
,
|
410 |
+
(3.6)
|
411 |
+
Here, di are positive constants related to the charges di ∼ Q2
|
412 |
+
i > 0. Furthermore, using the volume formula
|
413 |
+
V 2 = τ1τ2τ3, we have substituted the modulus τ2 with its equivalent τ2 = V 2/(τ1τ3) . Then, the total
|
414 |
+
effective potential is the sum Veff = VF +VD which we must minimise it with respect to V and the two
|
415 |
+
remaining Kähler moduli τ1,2. We have assumed that the F-part of the potential depends on the total
|
416 |
+
volume, hence the explicit dependence of Veff on τ1,τ3 only comes through the VD part. It is found
|
417 |
+
that the two minimisation conditions with respect to τ1,3 determine the ratios between the moduli, i.e.,
|
418 |
+
�
|
419 |
+
τi
|
420 |
+
τ j
|
421 |
+
�3
|
422 |
+
= di
|
423 |
+
d j [12]. Expressed in terms of the stabilised total volume V , the conditions for the two τi can
|
424 |
+
6
|
425 |
+
|
426 |
+
Figure 2: The shape of the effective potential ϕ − S plane for the choice of parameters ξ0 = 10, η0 = −0.92,
|
427 |
+
V0 = 32000, κ = 0.1, γ = 1. Here x represents the compactification volume, x ≡ V .
|
428 |
+
be written as
|
429 |
+
τ3
|
430 |
+
i =
|
431 |
+
� d2
|
432 |
+
i
|
433 |
+
dkdj
|
434 |
+
� 1
|
435 |
+
3
|
436 |
+
V 2 ,
|
437 |
+
where i = 1,3. In this case the D-term potential receives the simple form
|
438 |
+
VD ≈ d
|
439 |
+
V 2 ,
|
440 |
+
with
|
441 |
+
d = 3(d1d2d3)
|
442 |
+
1
|
443 |
+
3 .
|
444 |
+
(3.7)
|
445 |
+
By choosing ϕ = ϕ and α = β, the D-term contribution from the Higgs fields vanishes. Then the effective
|
446 |
+
potential has the following form
|
447 |
+
Veff
|
448 |
+
≃
|
449 |
+
κ2αβ
|
450 |
+
�
|
451 |
+
M2 −ϕϕ
|
452 |
+
�2 +γκ2S2 �
|
453 |
+
αϕ2 +βϕ2�
|
454 |
+
3aαβγV 4/3
|
455 |
+
+ 3W 2
|
456 |
+
0 (2η0 log(V )−8η0 +ξ0)
|
457 |
+
2V 3
|
458 |
+
+ d
|
459 |
+
V 2 . (3.8)
|
460 |
+
The shape of the potential along the volume modulus V when both F- and D-terms are included is shown
|
461 |
+
in the right panel of Fig. 1. As can be seen, a positive D-term is sufficient to uplift the potential along the
|
462 |
+
volume direction so that we achieve a de Sitter minimum. In order to find the extrema of the potential
|
463 |
+
along the ϕ and S directions, we require the vanishing of its corresponding derivatives. Thus, for ϕ we
|
464 |
+
impose the condition
|
465 |
+
dVeff
|
466 |
+
dϕ
|
467 |
+
=
|
468 |
+
0 ⇒ κ2 �
|
469 |
+
4α2ϕ3 −4α2M2ϕ +4αγS2ϕ
|
470 |
+
�
|
471 |
+
3aα2γV 4/3
|
472 |
+
= 0
|
473 |
+
(3.9)
|
474 |
+
which is solved for the following three ϕ-values
|
475 |
+
ϕ = 0,
|
476 |
+
ϕ± = ±
|
477 |
+
�
|
478 |
+
M2 − γ
|
479 |
+
α S2.
|
480 |
+
(3.10)
|
481 |
+
7
|
482 |
+
|
483 |
+
Similarly along the S direction
|
484 |
+
dVeff
|
485 |
+
dS
|
486 |
+
=
|
487 |
+
0 ⇒ 4κ2Sϕ2
|
488 |
+
3aαV 4/3 = 0
|
489 |
+
(3.11)
|
490 |
+
which yields
|
491 |
+
S = 0.
|
492 |
+
(3.12)
|
493 |
+
Combining Equations (3.10) and (3.12), in the large volume limit we obtain the following solutions
|
494 |
+
(S = 0,ϕ = 0),
|
495 |
+
(S = 0,ϕ = ±M).
|
496 |
+
(3.13)
|
497 |
+
We have already dealt with the minimisation of VF with respect to the volume modulus. However, in
|
498 |
+
the presence of D-terms the minima along the volume direction are shifted. Thus, requiring the vanishing
|
499 |
+
of the derivative of (3.8) with respect to V , we obtain the equation
|
500 |
+
dVef f
|
501 |
+
dV
|
502 |
+
= 0
|
503 |
+
⇒
|
504 |
+
−4κ2 �
|
505 |
+
α2ϕ4 +α2M4 −2α2M2ϕ2 +2αγS2ϕ2�
|
506 |
+
9aα2γV 7/3
|
507 |
+
− 2d
|
508 |
+
V 3
|
509 |
+
−
|
510 |
+
9
|
511 |
+
�
|
512 |
+
2η0W 2
|
513 |
+
0 log(V )−8η0W 2
|
514 |
+
0 +ξ0W 2
|
515 |
+
0
|
516 |
+
�
|
517 |
+
2V 4
|
518 |
+
+ 3η0W 2
|
519 |
+
0
|
520 |
+
V 4
|
521 |
+
= 0.
|
522 |
+
(3.14)
|
523 |
+
In the large volume limit, to a good approximation, the above equation gives the solution
|
524 |
+
V0 ≈ 9η0W 2
|
525 |
+
0
|
526 |
+
2d
|
527 |
+
W
|
528 |
+
�
|
529 |
+
�2de
|
530 |
+
13
|
531 |
+
3 − ξ0
|
532 |
+
2η0
|
533 |
+
9η0W 2
|
534 |
+
0
|
535 |
+
�
|
536 |
+
�,
|
537 |
+
(3.15)
|
538 |
+
where W represents the product-log (Lambert) function. The shape of the scalar potential Ve f f in the
|
539 |
+
ϕ-S plane is displayed in Fig. 2. As discussed earlier the D-term contribution in the effective potential is
|
540 |
+
essential in order to ensure de Sitter vacua when S approaches zero.
|
541 |
+
3.1
|
542 |
+
Inflationary phase
|
543 |
+
Up to this point we have analysed in detail the scalar potential of the effective theory and the role of the
|
544 |
+
various fields on its final shape. Therefore we are now fully equipped with all the tools and the necessary
|
545 |
+
ingredients to examine whether cosmological inflation is realised in the present model. In a previous
|
546 |
+
approach, within the same type-IIB framework and the geometric setup of intersecting D7 brane stacks,
|
547 |
+
the role of the inflaton field was associated with the logarithm of the compactification volume modulus.
|
548 |
+
The accumulation of the required 60 efolds to realise slow-roll inflation was converted to a lower bound
|
549 |
+
on the minimum vacuum energy [12], yet much bigger than the cosmological constant. Subsequently,
|
550 |
+
a new “waterfall” field was introduced which adds a new direction of the potential. The waterfall field
|
551 |
+
rolls down towards the new lower minimum while at the same time it ends inflation. It was shown [5]
|
552 |
+
that this role can be realised by open string states oscillating near the intersections of the D7 stacks.
|
553 |
+
In the present case where the physical states from the effective theory model have been taken into
|
554 |
+
account, new possibilities have emerged. At the minimum along the compactification volume modulus
|
555 |
+
8
|
556 |
+
|
557 |
+
V , the Higgs field ϕ, and the singlet S add new directions (transverse to that of V ) providing new
|
558 |
+
lower minima for the scalar potential. As such, they are potential candidates for waterfall fields. In the
|
559 |
+
present scenario inflation proceeds along the local minimum ϕ = 0 (the inflationary track), beginning at
|
560 |
+
large S values. An instability occurs at the waterfall point S2
|
561 |
+
c = M2 , which is the value of S, such that
|
562 |
+
Sc = ∂ 2V
|
563 |
+
∂S2 |S= 0. At this point the field falls naturally into one of the two SUSY minima at ϕ = ±M . At
|
564 |
+
large S, the scalar potential is approximately quadratic in ϕ, whereas at S = 0, equation (3.8) becomes a
|
565 |
+
Higgs potential. Along the inflationary track the constant term
|
566 |
+
V vol
|
567 |
+
0
|
568 |
+
= κ2M4
|
569 |
+
3aV 4/3
|
570 |
+
0
|
571 |
+
+ 3W 2
|
572 |
+
0 (2η0 log(V0)−8η0 +ξ0)
|
573 |
+
2V 3
|
574 |
+
0
|
575 |
+
,
|
576 |
+
is present at tree level, thus SUSY is broken during inflation. When SUSY breaks, splitting between
|
577 |
+
fermionic and bosonic mass multiplets is created and contributions to radiative corrections occurs. Fol-
|
578 |
+
lowing [13, 14], the soft terms are
|
579 |
+
∆Vsoft = (m2
|
580 |
+
3/2 +V0)M2y2 +O(1/V0)
|
581 |
+
(3.16)
|
582 |
+
where in above equation y defines the ratio y = S/M. The first extremum (S = 0,ϕ = 0) is the maxi-
|
583 |
+
mum of the potential. The ϕ = 0 corresponds to the trajectory of the standard hybrid inflation for which
|
584 |
+
{ϕ = 0, S > M}. When the inflaton reaches at S = M, the waterfall field takes over and the inflaton
|
585 |
+
moves towards the SUSY minimum at ϕ = ±M. Since the potential is non-zero along the inflationary
|
586 |
+
track, SUSY is broken along the latter, and the radiative corrections along with the soft SUSY-breaking
|
587 |
+
potential Vsoft can lift its flatness, while also providing the necessary slope for driving inflation. The ef-
|
588 |
+
fective contribution of the one-loop radiative corrections can be calculated using the Coleman-Weinberg
|
589 |
+
formula [15] as
|
590 |
+
∆V1-loop =
|
591 |
+
κ4M4y4
|
592 |
+
48π2a2α2γV 8/3
|
593 |
+
0
|
594 |
+
�F(y)
|
595 |
+
3γ − κ2
|
596 |
+
2
|
597 |
+
�
|
598 |
+
,
|
599 |
+
(3.17)
|
600 |
+
where
|
601 |
+
F(y) = log
|
602 |
+
�
|
603 |
+
κ2M2y2
|
604 |
+
3aαγQ2V 4/3
|
605 |
+
0
|
606 |
+
�
|
607 |
+
− 9a2α2γ2
|
608 |
+
V 4/3
|
609 |
+
0
|
610 |
+
log
|
611 |
+
�κ2M2y2
|
612 |
+
Q2V 2
|
613 |
+
0
|
614 |
+
�
|
615 |
+
.
|
616 |
+
(3.18)
|
617 |
+
Including the various contributions computed above, we may write the scalar potential along the infla-
|
618 |
+
tionary trajectory (i.e. ϕ = ϕ = 0) as follows,
|
619 |
+
V
|
620 |
+
≃
|
621 |
+
VF +VD +∆V1-loop +∆Vsoft,
|
622 |
+
≃
|
623 |
+
κ2M4
|
624 |
+
�
|
625 |
+
V vol
|
626 |
+
0
|
627 |
+
κ2M4 +
|
628 |
+
κ2y4F(y)
|
629 |
+
144π2a2α2γ2V 8/3
|
630 |
+
0
|
631 |
+
−
|
632 |
+
κ2y4
|
633 |
+
96π2a2α2γ2V 8/3
|
634 |
+
0
|
635 |
+
+ M2
|
636 |
+
Sy2
|
637 |
+
κ2M2
|
638 |
+
�
|
639 |
+
.
|
640 |
+
(3.19)
|
641 |
+
The prediction for the various inflationary observables are estimated using the standard slow-roll
|
642 |
+
parameters defined as,
|
643 |
+
ε = 1
|
644 |
+
4
|
645 |
+
� 1
|
646 |
+
M
|
647 |
+
�2 �V ′
|
648 |
+
V
|
649 |
+
�2
|
650 |
+
, η = 1
|
651 |
+
2
|
652 |
+
� 1
|
653 |
+
M
|
654 |
+
�2 �V ′′
|
655 |
+
V
|
656 |
+
�
|
657 |
+
,
|
658 |
+
ξ 2 = 1
|
659 |
+
4
|
660 |
+
� 1
|
661 |
+
M
|
662 |
+
�4 �V ′V ′′′
|
663 |
+
V 2
|
664 |
+
�
|
665 |
+
,
|
666 |
+
(3.20)
|
667 |
+
9
|
668 |
+
|
669 |
+
where prime denotes the derivative with respect to y. Note that the extra factor of 1/2 is due to the
|
670 |
+
relation between the canonically normalised real inflaton field, σ ≡ |S|/
|
671 |
+
√
|
672 |
+
2, and the complex field, S. In
|
673 |
+
the slow-roll approximation, the scalar spectral index ns, the tensor-to-scalar ratio r and the running of
|
674 |
+
the scalar spectral index αs ≡ dns/d lnk are given by,
|
675 |
+
ns ≃ 1+2η −6ε,
|
676 |
+
r ≃ 16ε,
|
677 |
+
αs ≃ 16ε η −24ε2 −2ξ 2.
|
678 |
+
(3.21)
|
679 |
+
The value of the scalar spectral index ns in the ΛCDM model is ns = 0.9665±0.0038 [16].
|
680 |
+
The amplitude of the scalar power spectrum is given by,
|
681 |
+
As(k0) =
|
682 |
+
1
|
683 |
+
24π2
|
684 |
+
�V(y0)
|
685 |
+
ε(y0)
|
686 |
+
�
|
687 |
+
,
|
688 |
+
(3.22)
|
689 |
+
where As(k0) = 2.137×10−9 at the pivot scale k0 = 0.05Mpc−1 as measured by Planck 2018 [16]. The
|
690 |
+
relevant number of e-folds, N0, before the end of inflation is,
|
691 |
+
N0 = 2M2
|
692 |
+
� y0
|
693 |
+
ye
|
694 |
+
� V
|
695 |
+
V ′
|
696 |
+
�
|
697 |
+
dy,
|
698 |
+
(3.23)
|
699 |
+
where y0 ≡ y(k0) is the field value at the pivot scale k0, and ye is the field value at the end of inflation.
|
700 |
+
As the case may be, the value of ye is fixed either by the breakdown of the slow-roll approximation
|
701 |
+
(η(ye) = −1), or by a ‘waterfall’ destabilisation occurring at the value ye = 1.
|
702 |
+
3.2
|
703 |
+
Numerical results
|
704 |
+
The results of our numerical calculations are displayed in Fig. 3, which show the ranges of r, m3/2 and a
|
705 |
+
in the M −κ plane. We have used up to second-order approximation on the slow-roll parameters, and for
|
706 |
+
simplicity we have set γ = 1, α = 0.25, V0 = 32000 and ye = M. Moreover, we have fixed the spectral
|
707 |
+
index ns to the central value (ns = 0.96655) from Planck’s data.
|
708 |
+
We further require a ≤ 1, m3/2 ≲ 6 × 1011 GeV, Higgs mass parameter M ≤ Mstring ∼ 1/V01/2 =
|
709 |
+
5.5×10−10Mp = 1.36×1016 GeV and FT which is defined as the difference of field value at pivot scale
|
710 |
+
and end of inflation FT ≡ y0 − ye ≲ 0.01. These constraints appear in Fig. 3 as the boundaries of the
|
711 |
+
allowed region in the M −κ plane. In our analysis the soft SUSY contributions along with the radiative
|
712 |
+
corrections play the dominant role in order to obtain a parametric space consistent with experimental
|
713 |
+
bounds, parametrised by m3/2, a and the logarithmic term. It is useful to analytically examine some
|
714 |
+
approximate equations to understand the behaviour depicted in Fig. 3. The spectral index ns and tensor-
|
715 |
+
to-scalar ratio r in the leading order slow-roll approximation are given by
|
716 |
+
ns ≃ 1+ 2M2
|
717 |
+
s
|
718 |
+
κ2M4 +
|
719 |
+
κ2y2
|
720 |
+
0
|
721 |
+
36π2a2α2γ2M2V 8/3
|
722 |
+
0
|
723 |
+
�
|
724 |
+
3log
|
725 |
+
�
|
726 |
+
κ2M2y2
|
727 |
+
0
|
728 |
+
3aαγQ2V 4/3
|
729 |
+
0
|
730 |
+
�
|
731 |
+
−1
|
732 |
+
�
|
733 |
+
,
|
734 |
+
(3.24)
|
735 |
+
r ≃ 4
|
736 |
+
M2
|
737 |
+
�
|
738 |
+
�
|
739 |
+
�
|
740 |
+
�
|
741 |
+
2M2
|
742 |
+
s y0
|
743 |
+
κ2M2 +
|
744 |
+
κ2y3
|
745 |
+
0
|
746 |
+
�
|
747 |
+
log
|
748 |
+
�
|
749 |
+
κ2M2y2
|
750 |
+
0
|
751 |
+
3aαγQ2V 4/3
|
752 |
+
0
|
753 |
+
�
|
754 |
+
−1
|
755 |
+
�
|
756 |
+
36π2a2α2γ2V 8/3
|
757 |
+
0
|
758 |
+
�
|
759 |
+
�
|
760 |
+
�
|
761 |
+
�
|
762 |
+
2
|
763 |
+
.
|
764 |
+
(3.25)
|
765 |
+
10
|
766 |
+
|
767 |
+
10-5
|
768 |
+
10-4
|
769 |
+
0.001
|
770 |
+
0.010
|
771 |
+
0.100
|
772 |
+
1
|
773 |
+
1012
|
774 |
+
1013
|
775 |
+
1014
|
776 |
+
1015
|
777 |
+
1016
|
778 |
+
κ
|
779 |
+
M (GeV)
|
780 |
+
M=Mstring=1.36×1016(GeV)
|
781 |
+
Ms=6×1011(GeV)
|
782 |
+
κ=1
|
783 |
+
=1
|
784 |
+
=0.1688
|
785 |
+
FT=y0-ye=0.01%
|
786 |
+
DR Area
|
787 |
+
r=5×10-7
|
788 |
+
r=10-10
|
789 |
+
r=10-13
|
790 |
+
r=10-16
|
791 |
+
10-5
|
792 |
+
10-4
|
793 |
+
0.001
|
794 |
+
0.010
|
795 |
+
0.100
|
796 |
+
1
|
797 |
+
1012
|
798 |
+
1013
|
799 |
+
1014
|
800 |
+
1015
|
801 |
+
1016
|
802 |
+
κ
|
803 |
+
M (GeV)
|
804 |
+
M=Mstring=1.36×1016(GeV)
|
805 |
+
Ms=6×1011(GeV)
|
806 |
+
κ=1
|
807 |
+
=1
|
808 |
+
=0.1688
|
809 |
+
FT=y0-ye=0.01%
|
810 |
+
DR Area
|
811 |
+
=10-2
|
812 |
+
=10-4
|
813 |
+
=10-6
|
814 |
+
10-5
|
815 |
+
10-4
|
816 |
+
0.001
|
817 |
+
0.010
|
818 |
+
0.100
|
819 |
+
1
|
820 |
+
1012
|
821 |
+
1013
|
822 |
+
1014
|
823 |
+
1015
|
824 |
+
1016
|
825 |
+
κ
|
826 |
+
M (GeV)
|
827 |
+
M=Mstring=1.36×1016(GeV)
|
828 |
+
Ms=6×1011(GeV)
|
829 |
+
κ=1
|
830 |
+
=1
|
831 |
+
=0.2117
|
832 |
+
FT=y0-ye=0.01%
|
833 |
+
DR Area
|
834 |
+
Ms=5×1010GeV
|
835 |
+
Ms=109GeV
|
836 |
+
Ms=107GeV
|
837 |
+
Ms=105GeV
|
838 |
+
Figure 3: Variations of r, m3/2 and a in M − κ plane. The solution between a = 0.1688 to a = 1 shows the
|
839 |
+
parametric space consistent with dark radiation.
|
840 |
+
Solving these two equations simultaneously, we obtain
|
841 |
+
ns ≃ 0.96655, r ≃ 1.44×10−5
|
842 |
+
for the following values of the parameters
|
843 |
+
y0 ≃ 11.89, a ∼ 2.02×10−4, Ms ∼ 5.76×1011GeV, M ∼ 1016GeV, γ ∼ 1, α ∼ 0.25.
|
844 |
+
These approximate values are very close to the actual ones obtained in the numerical calculations.
|
845 |
+
The above analytical equations therefore give a valid approximation of our numerical results displayed
|
846 |
+
in Fig. 3.
|
847 |
+
For the scalar spectral index ns fixed at Planck’s central value, ns = 0.96655, according to our nu-
|
848 |
+
11
|
849 |
+
|
850 |
+
merical analysis the exact range of parameters where acceptable solutions occurs is presented below
|
851 |
+
1.6×10−5 ≲ κ ≲ 1,
|
852 |
+
(2.19×1012 ≲ M ≲ 1.3×1016) GeV,
|
853 |
+
(1.8×104 ≲ MS ≲ 6×1011) GeV,
|
854 |
+
9.1×10−20 ≲ r ≲ 2×10−5,
|
855 |
+
1.6×10−8 ≲ a ≲ 1.
|
856 |
+
From the exact ranges of solutions we can see that our calculations predict a low tensor-to-scalar
|
857 |
+
ratio (r) compared to the current experimental bounds. However, ongoing and future gravity waves
|
858 |
+
experiments are expected to reach much smaller ranges of tensor-to-scalar ratio values comparable to
|
859 |
+
our numerical predictions.
|
860 |
+
In all plots of Fig. 3 the solution between a = 0.1688 (blue curve) to a = 1 shows the parametric
|
861 |
+
space consistent with dark radiation conditions which we discuss next.
|
862 |
+
4
|
863 |
+
Reheating and dark radiation
|
864 |
+
After the end of inflation, the lightest moduli will begin to oscillate around their minima, acquiring a
|
865 |
+
large energy density in the process. The decay products of the modulus fall into two categories. The
|
866 |
+
first are decays that go to the visible sector that is, particles of the SM, or its extensions such as the
|
867 |
+
MSSM. The decays to visible matter induce reheating, after which the standard hot Big Bang cosmology
|
868 |
+
follows. In addition, there may also be decays to hidden sector states. The hidden sector contains several
|
869 |
+
candidates for dark radiation, such as massless axions or light hidden gauge bosons. Let us consider the
|
870 |
+
three Kähler moduli case, Tk = τk +iak,V = √τ1τ2τ3 where ak is the RR-axion. Decay to the light axion
|
871 |
+
ak takes place primarily through the supergravity kinetic terms for the Kähler moduli which read as,
|
872 |
+
L ⊃ Ki ¯j∂µT i∂ µT ¯j.
|
873 |
+
(4.1)
|
874 |
+
The tree level Kähler potential is,
|
875 |
+
K = −2log
|
876 |
+
�
|
877 |
+
(T1 + ¯T1)(T2 + ¯T2)(T3 + ¯T3) = −log(τ1τ2τ3)+···
|
878 |
+
(4.2)
|
879 |
+
where the dots represent constant terms which are ignored. Then, the Kähler matrix is found to be
|
880 |
+
Ki ¯j = 1
|
881 |
+
4diag
|
882 |
+
� 1
|
883 |
+
τ2
|
884 |
+
1
|
885 |
+
, 1
|
886 |
+
τ2
|
887 |
+
3
|
888 |
+
, 1
|
889 |
+
τ2
|
890 |
+
3
|
891 |
+
�
|
892 |
+
.
|
893 |
+
(4.3)
|
894 |
+
Therefore, Eq (4.1) can be rewritten as,
|
895 |
+
L ⊃ 1
|
896 |
+
4
|
897 |
+
1
|
898 |
+
τ2
|
899 |
+
i
|
900 |
+
∂µτi∂ µτi
|
901 |
+
Note here that we have set the reduced Planck mass Mp = 1. To put this into canonical form we need to
|
902 |
+
find the transformation τi(ui) so that
|
903 |
+
L ⊃ 1
|
904 |
+
2 ∑
|
905 |
+
i
|
906 |
+
∂µui∂ µui.
|
907 |
+
12
|
908 |
+
|
909 |
+
This implies
|
910 |
+
τi = e
|
911 |
+
√
|
912 |
+
2ui
|
913 |
+
. The moduli fields for canonical kinetic terms take the form
|
914 |
+
uk = 1
|
915 |
+
√
|
916 |
+
2
|
917 |
+
logτk
|
918 |
+
. The corresponding volume modulus is
|
919 |
+
t = u1 +u2 +u3
|
920 |
+
√
|
921 |
+
3
|
922 |
+
= 1
|
923 |
+
√
|
924 |
+
3
|
925 |
+
1
|
926 |
+
√
|
927 |
+
2 ∑
|
928 |
+
k
|
929 |
+
logτk =
|
930 |
+
�
|
931 |
+
2
|
932 |
+
3 logV
|
933 |
+
. The transverse directions are
|
934 |
+
u = u1 −u2
|
935 |
+
√
|
936 |
+
2
|
937 |
+
= 1
|
938 |
+
2 log τ1
|
939 |
+
τ2
|
940 |
+
, v = u1 +u2 −2u3
|
941 |
+
√
|
942 |
+
6
|
943 |
+
= 1
|
944 |
+
√
|
945 |
+
3 log τ1τ2
|
946 |
+
τ2
|
947 |
+
3
|
948 |
+
. We reverse the relations
|
949 |
+
�
|
950 |
+
�
|
951 |
+
�
|
952 |
+
u1
|
953 |
+
u2
|
954 |
+
u3
|
955 |
+
�
|
956 |
+
�
|
957 |
+
� =
|
958 |
+
�
|
959 |
+
�
|
960 |
+
�
|
961 |
+
�
|
962 |
+
1
|
963 |
+
√
|
964 |
+
3
|
965 |
+
1
|
966 |
+
√
|
967 |
+
2
|
968 |
+
1
|
969 |
+
√
|
970 |
+
6
|
971 |
+
1
|
972 |
+
√
|
973 |
+
3
|
974 |
+
− 1
|
975 |
+
√
|
976 |
+
2
|
977 |
+
1
|
978 |
+
√
|
979 |
+
6
|
980 |
+
1
|
981 |
+
√
|
982 |
+
3
|
983 |
+
0
|
984 |
+
−
|
985 |
+
�
|
986 |
+
2
|
987 |
+
3
|
988 |
+
�
|
989 |
+
�
|
990 |
+
�
|
991 |
+
�
|
992 |
+
�
|
993 |
+
�
|
994 |
+
�
|
995 |
+
t
|
996 |
+
u
|
997 |
+
v
|
998 |
+
�
|
999 |
+
�
|
1000 |
+
�
|
1001 |
+
while substituting to the Lagrangian part for axions we have
|
1002 |
+
L
|
1003 |
+
⊃
|
1004 |
+
1
|
1005 |
+
√
|
1006 |
+
3t
|
1007 |
+
�
|
1008 |
+
∂µa1∂ µa1 +∂µa2∂ µa2 +∂µa3∂ µa3
|
1009 |
+
�
|
1010 |
+
+ 1
|
1011 |
+
√
|
1012 |
+
2
|
1013 |
+
u
|
1014 |
+
�
|
1015 |
+
∂µa1∂ µa1 −∂µa2∂ µa2
|
1016 |
+
�
|
1017 |
+
+ 1
|
1018 |
+
√
|
1019 |
+
6
|
1020 |
+
v
|
1021 |
+
�
|
1022 |
+
∂µa1∂ µa1 +∂µa2∂ µa2 −2∂µa3∂ µa3
|
1023 |
+
�
|
1024 |
+
.
|
1025 |
+
(4.4)
|
1026 |
+
The decay rate of the lightest modulus u to axions is given by,
|
1027 |
+
Γ(u → a1a1) =
|
1028 |
+
1
|
1029 |
+
64π m3
|
1030 |
+
u
|
1031 |
+
(4.5)
|
1032 |
+
where mu is the modulus mass. In the large volume scenario a distinct hierarchy of mass scales is
|
1033 |
+
generated, (for details see Ref [17, 18]). The mass eigenstates after diagonalisation in a unit of Mp = 1
|
1034 |
+
can be written as,
|
1035 |
+
mt = mu = mv ∼
|
1036 |
+
1
|
1037 |
+
V 3/2
|
1038 |
+
0
|
1039 |
+
,
|
1040 |
+
mai ∼ e−2πV 2/3
|
1041 |
+
0
|
1042 |
+
,
|
1043 |
+
mso ft ∼ 1
|
1044 |
+
V 2
|
1045 |
+
0
|
1046 |
+
,
|
1047 |
+
m3/2 ∼ 1
|
1048 |
+
V0
|
1049 |
+
,
|
1050 |
+
Mstring ∼
|
1051 |
+
1
|
1052 |
+
V 1/2
|
1053 |
+
0
|
1054 |
+
.
|
1055 |
+
Similarly the dominant visible-sector decay channel is the decay to Higgs bosons. Specialising to
|
1056 |
+
the MSSM case, we can make the identifications Φ = Hu and Φ = Hd. Each of these is a two-component
|
1057 |
+
complex field, so there are eight degrees of freedom. Then the decay rate can be derived by including
|
1058 |
+
the matter contribution to the Kähler potential
|
1059 |
+
L ⊃ 3aλ
|
1060 |
+
√
|
1061 |
+
2
|
1062 |
+
HuHd□u+h.c.+··· .
|
1063 |
+
(4.6)
|
1064 |
+
13
|
1065 |
+
|
1066 |
+
0.2
|
1067 |
+
0.4
|
1068 |
+
0.6
|
1069 |
+
0.8
|
1070 |
+
1.0
|
1071 |
+
2×107
|
1072 |
+
4×107
|
1073 |
+
6×107
|
1074 |
+
8×107
|
1075 |
+
|
1076 |
+
Tr(GeV)
|
1077 |
+
Figure 4: Variations of the reheating temperature (Tr) with respect to coefficient a consistent with dark radiation
|
1078 |
+
constraint (∆Neff ≲ 0.95) at 95% confidence level.
|
1079 |
+
The dominant contribution to the decay of light moduli u comes from the Giudice-Masiero coupling [19]
|
1080 |
+
3aλHuHd□u as all other couplings are mass-suppressed [20]. Each field is a complex doublet, hence we
|
1081 |
+
include the partial widths from each of the four decay channels. This yields
|
1082 |
+
Γ(u −→ HuHd) = 9a2λ 2
|
1083 |
+
8π
|
1084 |
+
m3
|
1085 |
+
u.
|
1086 |
+
(4.7)
|
1087 |
+
The present-day radiation content of the Universe can be described in terms of the energy density asso-
|
1088 |
+
ciated with each relativistic particle species at present. This radiation consists of photons and neutrinos
|
1089 |
+
plus any additional hidden components, which we call dark radiation (DR):
|
1090 |
+
ρradiation = ρphoton +ρneutrino +ρDR
|
1091 |
+
(4.8)
|
1092 |
+
We can express this in terms of an effective number of neutrino species, Neff, as follows
|
1093 |
+
ρradiation = ρphoton
|
1094 |
+
�
|
1095 |
+
1+ 7
|
1096 |
+
8
|
1097 |
+
� 4
|
1098 |
+
11
|
1099 |
+
�4/3
|
1100 |
+
Neff
|
1101 |
+
�
|
1102 |
+
.
|
1103 |
+
(4.9)
|
1104 |
+
Any excess can be accounted for by the presence of DR which is expressed as
|
1105 |
+
ρDR = ρphoton
|
1106 |
+
�
|
1107 |
+
7
|
1108 |
+
8
|
1109 |
+
� 4
|
1110 |
+
11
|
1111 |
+
�4/3
|
1112 |
+
∆Neff
|
1113 |
+
�
|
1114 |
+
,
|
1115 |
+
(4.10)
|
1116 |
+
where ∆Neff = Neff − 3.046 is the change in the effective number of neutrino species. If there were no
|
1117 |
+
dark radiation we would expect to find Neff = 3.046 which is slightly greater than 3 to account for partial
|
1118 |
+
14
|
1119 |
+
|
1120 |
+
reheating due to e+e− annihilation. ∆Neff can also be written in terms of decay rate channels
|
1121 |
+
∆Neff = 43
|
1122 |
+
7
|
1123 |
+
� 10.75
|
1124 |
+
g∗(Tr)
|
1125 |
+
� 1
|
1126 |
+
3 Γτ→DR
|
1127 |
+
Γτ→SM
|
1128 |
+
= 43
|
1129 |
+
7
|
1130 |
+
� 10.75
|
1131 |
+
g∗(Tr)
|
1132 |
+
� 1
|
1133 |
+
3
|
1134 |
+
1
|
1135 |
+
72a2λ 2 ,
|
1136 |
+
(4.11)
|
1137 |
+
where g∗(TRh) is the effective degree of freedom at the time of reheating the Universe. The measured
|
1138 |
+
values of Neff require ∆Neff ≲ 0.95 at the 95% confidence level, which translates into a bound on the pa-
|
1139 |
+
rameters of the model, a·λ ≳ 0.1688. In Fig. 3 the parametric space between 0.1688 ≤ a ≤ 1 represents
|
1140 |
+
the solutions consistent with dark radiation. In this parametric space we receive tensor-to-scalar ratio
|
1141 |
+
values r ≤ 1.5×10−9, M ≲ 2.54×1012 GeV and soft mass parameter Ms ≤ 4.98×109 GeV.
|
1142 |
+
The isotropy of the Cosmic microwave background (CMB) over large scales can be explained by
|
1143 |
+
inflation, which is followed by a period of reheating. During that, the expansion slows and energy is
|
1144 |
+
transferred to the SM particles, which enter local thermal equilibrium. We consider the scenario where
|
1145 |
+
the Universe is reheated by a modulus u decaying into SM particles. In this case the reheating temperature
|
1146 |
+
Tr, using Eq.(4.5) and Eq.(4.11) is defined as
|
1147 |
+
Tr =
|
1148 |
+
�
|
1149 |
+
Γu =
|
1150 |
+
�
|
1151 |
+
63
|
1152 |
+
344π ∆Neff
|
1153 |
+
�g∗(Tr)
|
1154 |
+
10.75
|
1155 |
+
�1/2
|
1156 |
+
a2λ 2m3u.
|
1157 |
+
(4.12)
|
1158 |
+
For a SUSY scale at the TeV regime, the constraint on reheating temperature is Tr ≲ 1 GeV, which
|
1159 |
+
corresponds to g∗(Tr) = 224/7, see Ref [21, 22]. For the present model we have V0 ∼ 3.2 × 104 which
|
1160 |
+
corresponds to split scale SUSY: msoft ∼ V −2
|
1161 |
+
0
|
1162 |
+
= 9.7656 × 10−10 = 2.3 × 109 GeV. As a result, the
|
1163 |
+
constraint on the reheating temperature is relaxed in this scenario. For split or high scale SUSY we have
|
1164 |
+
g∗(Tr) = 106.75, so the reheating temperature is Tr ∼ 107 GeV as shown in Fig. 4.
|
1165 |
+
5
|
1166 |
+
Conclusions
|
1167 |
+
We investigated the cosmological and low energy supersymmetry implications of an effective model [2]
|
1168 |
+
stemming from a geometric configuration of intersecting three D7-branes stacks, within the framework
|
1169 |
+
of type-IIB string theory. In this model perturbative string loop corrections which depend logarithmically
|
1170 |
+
on the compactification volume V , and D-terms associated with the universal U(1) factors of D7-brane
|
1171 |
+
stacks generate an effective scalar potential with de Sitter vacuum, and stabilise all three Kähler moduli
|
1172 |
+
fields of the specific geometric setting. In the present work we took into account the effects of ordinary
|
1173 |
+
matter contributions in the Kähler potential of the effective model and, in particular, we focused on
|
1174 |
+
the role of a generic pair of Higgs fields Φ, ¯Φ (related to the gauge group of the effective theory) on
|
1175 |
+
low energy phenomenology predictions and various cosmological observables. We included matter field
|
1176 |
+
content and soft-term contributions as well as Coleman-Weinberg corrections to the previously derived
|
1177 |
+
potential and studied the implementation of the standard hybrid inflationary scenario where a singlet
|
1178 |
+
gauge field sharing common couplings with the Higgs fields in the superpotential plays the role of the
|
1179 |
+
inflaton whilst the Higgs states act as waterfall fields. Fixing the spectral intex at central value, ns =
|
1180 |
+
0.96655, we provided predictions for the remaining cosmological observables in accordance with the
|
1181 |
+
latest Planck data. In particular, we predicted the value of the tensor-to-scalar ratio to be r ∼ .2×10−4
|
1182 |
+
15
|
1183 |
+
|
1184 |
+
which is much smaller than the current experimental bounds, but within the reach of future designed
|
1185 |
+
experiments. Next, we discussed the decay of the lighter Kähler moduli after the end of inflation, which
|
1186 |
+
includes modes to visible as well as invisible particles. In particular, in the context of an MSSM effective
|
1187 |
+
theory and in the presence of a Giudice-Masiero coupling, the dominant decay of the lightest modulus
|
1188 |
+
is to the Higgs fields, in accordance with previous computations [21]. Furthermore, we investigated
|
1189 |
+
predictions of the model to dark radiation production and we found ∆Ne f f ≤ 0.95 at 2σ confidence
|
1190 |
+
level. This requires the model parameters a and λ (associated with the couplings ∝ aλ(Φ ¯Φ + h.c) in the
|
1191 |
+
Kähler potential) to satisfy the bound aλ ≳ 0.1688, which for λ ≈ 1 translates into a bound for a in the
|
1192 |
+
perturbative regime. Regarding other vital low energy predictions for a volume fixed at V0 ∼ 3.2 × 104
|
1193 |
+
which ensures a dS minimum, we fould that the (split)-SUSY scale is around mso ft ∼ V −2
|
1194 |
+
0
|
1195 |
+
MP ≈ 2.3×109
|
1196 |
+
GeV. As a result, the constraint imposed on the reheating temperature is relaxed in this scenario. For split
|
1197 |
+
or high scale SUSY we have g∗(Tr) = 106.75 [21], and the reheating temperature is Tr ∼ 107 GeV .
|
1198 |
+
Acknowledgements
|
1199 |
+
The work of GKL was supported by the “Hellenic Foundation for Research and Innovation (H.F.R.I.)
|
1200 |
+
under the “First Call for H.F.R.I. Research Projects to support Faculty members and Researchers and
|
1201 |
+
the procurement of high-cost research equipment grant” (Project Number: 2251)”
|
1202 |
+
16
|
1203 |
+
|
1204 |
+
References
|
1205 |
+
[1] V. Balasubramanian, P. Berglund, J. P. Conlon and F. Quevedo, “Systematics of moduli stabilisation
|
1206 |
+
in Calabi-Yau flux compactifications,” JHEP 03 (2005), 007 [arXiv:hep-th/0502058 [hep-th]].
|
1207 |
+
[2] I. Antoniadis, Y. Chen and G. K. Leontaris, “Perturbative moduli stabilisation in type IIB/F-theory
|
1208 |
+
framework,” Eur. Phys. J. C 78 (2018) no.9, 766 [arXiv:1803.08941 [hep-th]].
|
1209 |
+
[3] I. Antoniadis, Y. Chen and G. K. Leontaris, “Logarithmic loop corrections, moduli stabilisation and
|
1210 |
+
de Sitter vacua in string theory,” JHEP 01, 149 (2020) [arXiv:1909.10525 [hep-th]].
|
1211 |
+
[4] C. P. Burgess, R. Kallosh and F. Quevedo, “De Sitter string vacua from supersymmetric D terms,”
|
1212 |
+
JHEP 10, 056 (2003) [arXiv:hep-th/0309187 [hep-th]].
|
1213 |
+
[5] I. Antoniadis, O. Lacombe and G. K. Leontaris, “Hybrid inflation and waterfall field in string theory
|
1214 |
+
from D7-branes,” JHEP 01 (2022), 011 [arXiv:2109.03243 [hep-th]].
|
1215 |
+
[6] Ignatios Antoniadis, Osmin Lacombe and George K. Leontaris, “Type IIB moduli stabilization,
|
1216 |
+
inflation and waterfall fields”, International Journal of Modern Physics A, September 2022,
|
1217 |
+
[7] S. Gukov, C. Vafa and E. Witten, “CFT’s from Calabi-Yau four folds,” Nucl. Phys. B 584 (2000),
|
1218 |
+
69-108 [arXiv:hep-th/9906070 [hep-th]].
|
1219 |
+
[8] G. K. Leontaris and P. Shukla, “Stabilising all Kähler moduli in perturbative LVS,” JHEP 07 (2022),
|
1220 |
+
047 [arXiv:2203.03362 [hep-th]].
|
1221 |
+
[9] K. Becker, M. Becker, M. Haack and J. Louis, “Supersymmetry breaking and alpha-prime correc-
|
1222 |
+
tions to flux induced potentials,” JHEP 06, 060 (2002) [arXiv:hep-th/0204254 [hep-th]].
|
1223 |
+
[10] R. Blumenhagen, J. P. Conlon, S. Krippendorf, S. Moster and F. Quevedo, “SUSY Breaking in
|
1224 |
+
Local String/F-Theory Models,” JHEP 09 (2009), 007 [arXiv:0906.3297 [hep-th]].
|
1225 |
+
[11] M. Haack, D. Krefl, D. Lust, A. Van Proeyen and M. Zagermann, “Gaugino Condensates and D-
|
1226 |
+
terms from D7-branes,” JHEP 01 (2007), 078 [arXiv:hep-th/0609211 [hep-th]].
|
1227 |
+
[12] I. Antoniadis, O. Lacombe and G. K. Leontaris, “Inflation near a metastable de Sitter vacuum from
|
1228 |
+
moduli stabilisation,” Eur. Phys. J. C 80, no.11, 1014 (2020) [arXiv:2007.10362 [hep-th]].
|
1229 |
+
[13] A. Brignole, L. E. Ibanez and C. Munoz, “Towards a theory of soft terms for the supersymmetric
|
1230 |
+
Standard Model,” Nucl. Phys. B 422, 125-171 (1994) [erratum: Nucl. Phys. B 436, 747-748 (1995)]
|
1231 |
+
[arXiv:hep-ph/9308271 [hep-ph]].
|
1232 |
+
[14] J. P. Conlon, S. S. Abdussalam, F. Quevedo and K. Suruliz, “Soft SUSY Breaking Terms for Chiral
|
1233 |
+
Matter in IIB String Compactifications,” JHEP 01, 032 (2007) [arXiv:hep-th/0610129 [hep-th]].
|
1234 |
+
[15] S.R. Coleman and E.J. Weinberg, “Radiative Corrections as the Origin of Spontaneous Symmetry
|
1235 |
+
Breaking,” Phys. Rev. D 7, 1888 (1973) [arXiv:hep-ph/].
|
1236 |
+
17
|
1237 |
+
|
1238 |
+
[16] Y. Akrami et al. [Planck], “Planck 2018 results. X. Constraints on inflation,” Astron. Astrophys.
|
1239 |
+
641 (2020), A10 [arXiv:1807.06211 [astro-ph.CO]].
|
1240 |
+
[17] J. P. Conlon, F. Quevedo and K. Suruliz, “Large-volume flux compactifications: Moduli spectrum
|
1241 |
+
and D3/D7 soft supersymmetry breaking,” JHEP 08, 007 (2005) [arXiv:hep-th/0505076 [hep-th]].
|
1242 |
+
[18] M. Cicoli, C. P. Burgess and F. Quevedo, “Anisotropic Modulus Stabilisation: Strings at LHC
|
1243 |
+
Scales with Micron-sized Extra Dimensions,” JHEP 10, 119 (2011) [arXiv:1105.2107 [hep-th]].
|
1244 |
+
[19] G. F. Giudice and A. Masiero, “A Natural Solution to the mu Problem in Supergravity Theories,”
|
1245 |
+
Phys. Lett. B 206 (1988), 480-484
|
1246 |
+
[20] S. Angus, J. P. Conlon, U. Haisch and A. J. Powell, “Loop corrections to ∆Ne f f in large volume
|
1247 |
+
models,” JHEP 12 (2013), 061 [arXiv:1305.4128 [hep-ph]].
|
1248 |
+
[21] A. Hebecker, P. Mangat, F. Rompineve and L. T. Witkowski, “Dark Radiation predictions from
|
1249 |
+
general Large Volume Scenarios,” JHEP 09, 140 (2014) [arXiv:1403.6810 [hep-ph]].
|
1250 |
+
[22] M. Cicoli, K. Sinha and R. Wiley Deal, “The dark universe after reheating in string inflation,” JHEP
|
1251 |
+
12 (2022), 068 [arXiv:2208.01017 [hep-th]].
|
1252 |
+
18
|
1253 |
+
|
E9AyT4oBgHgl3EQfevjq/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
E9AzT4oBgHgl3EQfG_uu/content/tmp_files/2301.01038v1.pdf.txt
ADDED
@@ -0,0 +1,1438 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
HETEROGENEOUS DOMAIN ADAPTATION AND EQUIPMENT
|
2 |
+
MATCHING: DANN-BASED ALIGNMENT WITH CYCLIC
|
3 |
+
SUPERVISION (DBACS)
|
4 |
+
A PREPRINT
|
5 |
+
Natalie Gentner∗
|
6 |
+
Infineon Technologies AG
|
7 |
+
Am Campeon 1-15,
|
8 |
+
85579 Neubiberg, Germany
|
9 |
+
Gian Antonio Stusto †
|
10 |
+
Department of Information Engineering
|
11 |
+
University of Padova
|
12 |
+
Via Gradenigo 6/B,
|
13 |
+
35131 Padova, Italy
|
14 |
+
January 4, 2023
|
15 |
+
ABSTRACT
|
16 |
+
Process monitoring and control are essential in modern industries for ensuring high quality standards
|
17 |
+
and optimizing production performance. These technologies have a long history of application in
|
18 |
+
production and have had numerous positive impacts, but also hold great potential when integrated
|
19 |
+
with Industry 4.0 and advanced machine learning, particularly deep learning, solutions. However, in
|
20 |
+
order to implement these solutions in production and enable widespread adoption, the scalability and
|
21 |
+
transferability of deep learning methods have become a focus of research. While transfer learning has
|
22 |
+
proven successful in many cases, particularly with computer vision and homogenous data inputs, it
|
23 |
+
can be challenging to apply to heterogeneous data.
|
24 |
+
Motivated by the need to transfer and standardize established processes to different, non-identical
|
25 |
+
environments and by the challenge of adapting to heterogeneous data representations, this work
|
26 |
+
introduces the Domain Adaptation Neural Network with Cyclic Supervision (DBACS) approach.
|
27 |
+
DBACS addresses the issue of model generalization through domain adaptation, specifically for
|
28 |
+
heterogeneous data, and enables the transfer and scalability of deep learning-based statistical control
|
29 |
+
methods in a general manner. Additionally, the cyclic interactions between the different parts of
|
30 |
+
the model enable DBACS to not only adapt to the domains, but also match them. To the best of
|
31 |
+
our knowledge, DBACS is the first deep learning approach to combine adaptation and matching
|
32 |
+
for heterogeneous data settings. For comparison, this work also describes and analyzes subspace
|
33 |
+
alignment and a multi-view learning method that deals with heterogeneous representations, called
|
34 |
+
views, by mapping data into correlated latent feature spaces. Finally, the DBACS method, with its
|
35 |
+
ability to adapt and match, is applied to a virtual metrology use case for an etching process run on
|
36 |
+
different machine types in semiconductor manufacturing.
|
37 |
+
Keywords deep learning · equipment matching · heterogeneous domain adaptation · multi-view learning · semiconductor
|
38 |
+
manufacturing · virtual metrology
|
39 |
+
1
|
40 |
+
Introduction
|
41 |
+
Process control and monitoring are essential elements in any automated production setting. Both have a long history
|
42 |
+
of use, particularly in specialized and demanding manufacturing environments. In recent years, the complexity of
|
43 |
+
these systems has made them the focus of ongoing research, particularly in the context of Industry 4.0 and due to
|
44 |
+
∗natalie.gentner@infineon.com (Natalie Gentner)
|
45 |
+
†[email protected] (Gian Antonio Susto)
|
46 |
+
arXiv:2301.01038v1 [cs.LG] 3 Jan 2023
|
47 |
+
|
48 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
49 |
+
(DBACS)
|
50 |
+
A PREPRINT
|
51 |
+
the increasing usage of sophisticated artificial intelligence-based solutions. While various machine learning and deep
|
52 |
+
learning techniques have been applied successfully to a wide range of data types, the current focus is on scalability and
|
53 |
+
the generalization of models, particularly for non-standardized environments.
|
54 |
+
Despite the potential of machine learning-based technologies to improve automation in production, there are several
|
55 |
+
issues that continue to limit their widespread success. These include limited data availability, small data sets, lack of
|
56 |
+
standardization, low or inconsistent data quality, and complex, fragmented data. These challenges can make it difficult
|
57 |
+
to transfer and generalize models, hindering progress towards higher levels of fab automation and overall digitalization.
|
58 |
+
As a result, the focus is now on standardization and scalability, particularly for application-driven research. This is
|
59 |
+
important due to the financial and technological investments required for method and model development, as well as the
|
60 |
+
need for 24/7 support for critical production infrastructure and maintenance in highly automated environments.
|
61 |
+
In non-standardized environments, there are two main approaches to supporting the scalability of methods and model
|
62 |
+
transfer, as discussed in the semiconductor literature: (i) matching and (ii) transfer learning, with a focus on domain
|
63 |
+
adaptation. The goal of matching is to harmonize environments and processes by using data and expert knowledge, with
|
64 |
+
the aim of eliminating differences. Transfer learning, on the other hand, uses a purely data-driven approach to change
|
65 |
+
the data representation (but not the data itself or any equipment or process properties) in order to bring corresponding
|
66 |
+
data sets closer together, or in the best case, make them indistinguishable.
|
67 |
+
However, most machine learning-based transfer learning methods, which are driven by computer vision and naturally
|
68 |
+
homogeneous data input, are not designed to handle heterogeneous data. While this is not a common issue when
|
69 |
+
modeling tasks use images as the main input, it becomes a significant challenge in semiconductor scenarios where an
|
70 |
+
established process must be transferred to a different, non-identical equipment due to availability or utilization. This
|
71 |
+
raises the question of how to match non-identical equipment and use knowledge gained from one tool to optimize the
|
72 |
+
same process on a different, non-identical tool in order to improve output quality.
|
73 |
+
To address the research gap related to heterogeneous domain adaptation (DA), this paper introduces an extended version
|
74 |
+
of DBAM called DANN-based Alignment with Cyclic Supervision (DBACS). This method, which was previously
|
75 |
+
applied to a homogeneous VM modeling task in previous studies Gentner et al. [2020, 2021], has the ability to map
|
76 |
+
unpaired samples in their original feature spaces, enabling the functionality of matching. This capability allows DBACS
|
77 |
+
to naturally enrich the existing method.
|
78 |
+
This contribution methodically extends the work presented in Gentner et al. [2021] by demonstrating an extension
|
79 |
+
suitable for heterogeneous domain adaptation (DA) and matching. The main contributions of the proposed DBACS
|
80 |
+
method are as follows:
|
81 |
+
• DBACS is able to handle high data complexity caused by heterogeneous systems in production and is applicable
|
82 |
+
to various data types, such as time series data;
|
83 |
+
• DBACS is able to tackle both supervised and unsupervised adaptation for heterogeneous input data using the
|
84 |
+
original input feature spaces;
|
85 |
+
• DBACS enables model scaling by allowing the use of a well-trained model for another data set with no
|
86 |
+
assumption of the same feature representation, but only identical underlying physical information;
|
87 |
+
• DBACS ensures interpretability and comparability of all parts of the model and allows unpaired feature
|
88 |
+
matching on top of the adaptation in both directions.
|
89 |
+
To evaluate the performance of DBACS in the context of heterogeneous data, the method is compared to selected
|
90 |
+
benchmark models, including subspace alignment (SA) using principle component analysis (PCA) with and without
|
91 |
+
correlation alignment (CORAL) and canonical correlation analysis (CCA), a method well known in the field of
|
92 |
+
multi-view learning.
|
93 |
+
Virtual metrology (VM), a representative of standard process control mechanisms, is chosen as a real-world application
|
94 |
+
showcase for this study. VM, also known as a soft sensor, is a statistical model that predicts inline wafer properties based
|
95 |
+
on process information and sensor measurements. Since its introduction to the semiconductor industry in 2005 Chen
|
96 |
+
et al. [2005], VM has a long research history and has benefited greatly from the adoption of new modeling techniques
|
97 |
+
driven by Industry 4.0 and the use of artificial intelligence. In addition to being useful for predictive maintenance,
|
98 |
+
fault detection and classification, and defect classification, VM is a key mechanism for direct/early fault detection and
|
99 |
+
enabling quality improvements by increasing monitoring capacity, control through real-time process corrections in
|
100 |
+
combination with a Run-to-Run system, and smart capacity usage by preparing input for smart sampling strategies and
|
101 |
+
improved decision making.
|
102 |
+
The rest of the paper is organized into six more sections: Section 2 introduces related literature, Section 3 formalizes the
|
103 |
+
problem and presents the main model DBACS and selected benchmarks. Section 4 gives details on virtual metrology,
|
104 |
+
2
|
105 |
+
|
106 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
107 |
+
(DBACS)
|
108 |
+
A PREPRINT
|
109 |
+
etching process, data, preprocessing and the experimental design, while in Section 5 implementation details including
|
110 |
+
hyperparameter and architectures as well as results are reported. Finally in Section 6 DBACS suitability for matching is
|
111 |
+
discussed. Section 7 closes with conclusive remarks and future research directions are envisioned.
|
112 |
+
2
|
113 |
+
Literature and Background
|
114 |
+
In this section we summarize literature related to both relevant methodological approaches as well as application works.
|
115 |
+
One of the main issue in adopting ML-based solutions in complex production is the need for scalability. With a large
|
116 |
+
number of machines, products, and recipes (e.g., in semiconductor production), it is often infeasible to build ad-hoc
|
117 |
+
analytics solutions for each scenario. In this context, scalability in learning frameworks is critical. In this context,
|
118 |
+
scalability in learning framework is of fundamental importance; one of this is matching, which has Matching has a
|
119 |
+
long history in non-standardized manufacturing environments and can be implemented using both classical methods
|
120 |
+
Chouichi et al. [2020] and DL techniques Heng et al. [2021].
|
121 |
+
With the rise of Domain Adversarial networks (DANNs) Ganin et al. [2016] and the related concept of domain
|
122 |
+
adaptation, a theory made to deal with occurrence of different data distributions for one modeling task, there has
|
123 |
+
been a surge in the number of publications focusing on transfer learning for semiconductor applications Kang [2017],
|
124 |
+
Tsutsui and Matsuzawa [2019] and Chien et al. [2022a]. Domain adaptation also enables semi-supervised learning,
|
125 |
+
as demonstrated in Farahani et al. [2020] and Li et al. [2020]. Unsupervised domain adaptation for semiconductor
|
126 |
+
applications has also been explored using DANNs Shim and Kang [2022]. A variety of metrics and losses can be
|
127 |
+
used to measure distribution distances in domain adaptation settings, such as maximum mean discrepancy (MMD)
|
128 |
+
Azamfar et al. [2020]. For a broader overview of domain adaptation, see Wang and Deng [2018] for a computer
|
129 |
+
vision survey and Courty et al. [2017] for an example using optimal transport. Generative models have also been
|
130 |
+
widely used in production-related research. For example, Lu et al. [2019] presents a generative adversarial network
|
131 |
+
(GAN)-inspired approach using pseudo labeling to address class imbalance in defect inspection in industrial settings.
|
132 |
+
While the literature on homogeneous domain adaptation for semiconductor applications is growing, there is still a
|
133 |
+
lack of research on heterogeneous domain adaptation for specific semiconductor use cases. However, literature from
|
134 |
+
other industry sectors shows promising results for heterogeneous domain adaptation tasks, such as classification of
|
135 |
+
heterogeneous information networks Yang et al. [2020], image-to-text transfer Fang et al. [2022], Tsai et al. [2016] and
|
136 |
+
the combination of distribution alignment via subspace mapping with pseudo-labeling Alipour and Tahmoresnezhad
|
137 |
+
[2022].
|
138 |
+
Another approach for handling heterogeneous data distributions is multi-view learning (MVL) Perry et al. [2021]. A
|
139 |
+
systematic overview of MVL can be found in Sun [2013] and in Xu et al. [2013]. There are few examples of MVL
|
140 |
+
applied to fault detection and performance systems in manufacturing environments, such as Chen et al. [2016] and Yu
|
141 |
+
et al. [2021], which use correlation and Canonical Correlation Analysis (CCA) Hardoon et al. [2004] for fault detection
|
142 |
+
and performance evaluation. A review of MVL in the deep learning (DL) context is provided by Yan et al. [2021], while
|
143 |
+
a range of CCA approaches is discussed in Chapman and Wang [2021].
|
144 |
+
Metrology and its relationship to process control have been discussed in the literature, such as in early works such as
|
145 |
+
Chen et al. [2005] and Su et al. [2007]. While metrology is essential for quality and control, it can be costly in terms
|
146 |
+
of productivity, which has led to the development of numerous virtual metrology (VM) approaches in the literature.
|
147 |
+
VM is still an active research topic, with state-of-the-art methods like isolation forest being used in a decision-based
|
148 |
+
model framework (e.g., Chien et al. [2022b]). VM tools are often developed based on data from fault detection
|
149 |
+
and classification (FDC) systems, which are monitoring software used to overview different types of equipment in
|
150 |
+
semiconductor manufacturing. FDC data typically consists of descriptive statistics computed from raw, time-dependent
|
151 |
+
physical sensor measurements installed on the equipment, making the VM problem a classic tabular data regression
|
152 |
+
task. Given the high dimensionality of FDC data, feature selection is an important step in the context of tabular data
|
153 |
+
VM and has been widely discussed in the literature ; see Saeys et al. [2007] for a general review of selection techniques
|
154 |
+
and Kang et al. [2016] or Lynn et al. [2009] and Fan et al. [2020] for more sophisticated VM specific preprocessing and
|
155 |
+
selection techniques. Other notable regression methods for VM prediction include those presented in Lynn et al. [2009],
|
156 |
+
Susto and Beghi [2012] and Park and Kim [2016]. Chen et al. [2020] compares tree-based methods for VM modeling
|
157 |
+
to other regression methods and neural networks.
|
158 |
+
Another set of approaches in the VM literature aims to solve the regression task using time series data collected
|
159 |
+
from equipment sensor data. These approaches include those presented in Park and Kim [2016] and add Susto et al.
|
160 |
+
[2015], which introduced the Supervised Aggregative Feature Extraction framework for feature selection. DL-based
|
161 |
+
approaches have also been successfully employed for modeling with time series input data, such as in Lee and Kim
|
162 |
+
[2020], Maggipinto et al. [2018, 2019] and Lee and Kim [2020].
|
163 |
+
3
|
164 |
+
|
165 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
166 |
+
(DBACS)
|
167 |
+
A PREPRINT
|
168 |
+
3
|
169 |
+
Proposed Approaches
|
170 |
+
In this section, a general description and mathematical formalization of a modeling task with heterogeneous input are
|
171 |
+
given, including the necessary assumptions. We also provide a formal description of the methods and algorithms used
|
172 |
+
to solve the task under exam.
|
173 |
+
The modeling task at hand is formulated as regression, with the goal of scaling a selected model to make it usable
|
174 |
+
for two data sets with different distributions and heterogeneous data representations. Since the input spaces do not
|
175 |
+
have a common subspace sufficient for the task, the modeling must be done in a domain-specific manner. To address
|
176 |
+
scalability, the goal is to use a trained statistical model for both data sets in parallel while minimizing the prediction
|
177 |
+
error and maximizing the accuracy of a dedicated model. To achieve this, we compare methods from the field of domain
|
178 |
+
adaptation and multi-view learning.
|
179 |
+
First, we mathematically formalize the regression task followed by selected methods. Let fS define a modeling task,
|
180 |
+
let a hypothesis class H be a set of all possible modeling functions h ∈ H that are considered for a specific task. Let
|
181 |
+
XS ⊂ RnS be defined as the first input space and Y as the output space. The output space Y is defined as Y ⊂ R in
|
182 |
+
case of a regression task. A distribution over XS × Y is called source domain. For time series data, let XS ⊂ T × RnS
|
183 |
+
where T describes the set of considered points in time and xt
|
184 |
+
S ∈ RnS a sample from the source feature space taken
|
185 |
+
at a fixed point in time t ∈ T . A learning algorithm is provided with a source data set S drawn i.i.d. from the source
|
186 |
+
domain DS with XS × YS, XS ⊂ X, YS ⊂ Y . In the SSL setting, it is distinguished between labeled and unlabeled
|
187 |
+
data and define S := SL ∪ SU where SU stands for the unlabeled source sample subset and SL for the labeled one.
|
188 |
+
Without loss of generality for UDA and SSL, SU = ∅ sine the source domain is assumed to be labeled. Hence
|
189 |
+
S = {XS, YS} = {XSL, YSL} = {xi
|
190 |
+
S, yi
|
191 |
+
S}nS
|
192 |
+
i=1 ∼ {DS}ns,
|
193 |
+
(1)
|
194 |
+
with nS being the number of drawn samples (all labeled) and therefore XS = XSL ⊂ RnS, YS = YSL ⊂ Y .
|
195 |
+
A learning algorithm is provided with a second set T drawn i.i.d. from the target domain DT with different data
|
196 |
+
distribution, representation and feature space. Hence, let T = TL ∪ TU be the second called target data set T drawn
|
197 |
+
i.i.d. from a target domain DT with a distribution over XT × YT , XT ⊂ RnT , YT ⊂ Y , and consisting of unlabeled
|
198 |
+
TU and/or labeled TL samples.
|
199 |
+
TL = {XT L, YT L} = {xj
|
200 |
+
T , yj
|
201 |
+
T }nT −l
|
202 |
+
j=1
|
203 |
+
∼ {DT }nt−l;
|
204 |
+
(2)
|
205 |
+
TU = {XT U} = {xj
|
206 |
+
T }nT
|
207 |
+
j=nT −l+1 ∼ {DX
|
208 |
+
T }nt;
|
209 |
+
(3)
|
210 |
+
with nT being the number of drawn target samples, therefore XT L ⊂ XT ⊂ RnT , YT L ⊂ YT ⊂ Y and XT U ⊂ XT ⊂
|
211 |
+
RnT . For time series data, let XT ⊂ T × RnT where T describes the set of considered points in time and xt
|
212 |
+
T ∈ RnT a
|
213 |
+
sample from the target feature space taken at a fixed point in time t ∈ T .
|
214 |
+
3.1
|
215 |
+
DANN-based Alignment with Cyclic Supervision (DBACS)
|
216 |
+
In this work, we present a new framework, called DANN-based Alignment with Cyclic Supervision (DBACS). The
|
217 |
+
DBACS approach (illustrated in Figure 1) is an extented version of DBAM Gentner et al. [2021] and is designed for
|
218 |
+
binary heterogeneous domain adaptation using source and target domain. DBACS consists of five main parts:
|
219 |
+
• the baseline or reference prediction model P;
|
220 |
+
• an encoder/alignment model called aligner F used to map the target domain to the source domain (the output
|
221 |
+
of the aligner is called aligned);
|
222 |
+
• F is connected to a second encoder/alignment model aligner G that maps the source domain to the target
|
223 |
+
domain. By combining both aligners, it is possible to introduce cycle-consistency by comparing source samples
|
224 |
+
with its cycled sample and target samples with its cycled samples;
|
225 |
+
• a domain discriminator A for classification of source domain versus aligned target domain;
|
226 |
+
• Adversarial training in both directions is enabled by adding a second domain discriminator (called discriminator
|
227 |
+
B) for target versus aligned source comparison.
|
228 |
+
The various components of the DBACS architecture are discussed in the following.
|
229 |
+
4
|
230 |
+
|
231 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
232 |
+
(DBACS)
|
233 |
+
A PREPRINT
|
234 |
+
Figure 1: Graphical representation of the proposed DBACS system exploiting input data from two non-identical
|
235 |
+
domains. The arrows represent the data flows. An autoencoder shaped aligner can be used for noise reduction especially
|
236 |
+
for homogeneous DA but is not mandatory.
|
237 |
+
Prediction loss
|
238 |
+
Let hP : XS → Y be a dedicated statistical model trained on a data set S, let S be a labeled source
|
239 |
+
sample set drawn i.i.d. from a domain DS with nS = |S| being the number of drawn samples. The neural network
|
240 |
+
representation is parameterized by θP and P(xS, θP ) where P is the model function with parameters θP that outputs
|
241 |
+
the prediction for xS ∈ XS. The loss LP used for training and minimization is defined as:
|
242 |
+
min
|
243 |
+
hP ∈H LP (XS) = min
|
244 |
+
hP ∈H LDS(hP (XS)) = min
|
245 |
+
θP LDS(XS, θP ) = min
|
246 |
+
θP L(x,y)∈S (P (x, θP ) , y) .
|
247 |
+
(4)
|
248 |
+
where L is selected based on the modeling task at hand; for VM regression task we choose mean absolute error (MAE).
|
249 |
+
Cycle consistency loss
|
250 |
+
Let hF : XT → XS be a statistical model function aligning target to source and F(xT , θF )
|
251 |
+
be its parameterized representation where F is the model function with parameters θF that outputs the prediction
|
252 |
+
for xT ∈ XT . Let hG : XS → XT be a statistical model function aligning source to target and G(xS, θG) be its
|
253 |
+
parameterized representation where G is the model function with parameters θG that outputs the prediction for xS ∈ XS.
|
254 |
+
Let xS ∼ DS the data distribution according to DS and xT ∼ DT according to DT . Then, the cycle-consistency loss
|
255 |
+
is defined as:
|
256 |
+
LcycleS(XS) := LG,F,DS(XS) = LxS∼DS (F(G (xS, θG), θF )) = LxS∼DS(F(G(xS)), xS);
|
257 |
+
(5)
|
258 |
+
LcycleT (XT ) := LF,G,DT (XT ) = LxT ∼DT (G(F (xT , θF ), θG)) = LxT ∼DT (G(F(xT )), xT ).
|
259 |
+
(6)
|
260 |
+
To give an example we follow the description in Zhu et al. [2017] where the L1 norm is used as cycle loss function:
|
261 |
+
LcycleS(XS) = LxS∼DS(F(G(xS)), xS) = ExS∼DS [∥F(G(xS)) − xS∥1]
|
262 |
+
(7)
|
263 |
+
LcycleT (XT ) = LxT ∼DT (G(F(xT )), xT ) = ExT ∼DT [∥G(F(xT )) − xT ∥1]
|
264 |
+
(8)
|
265 |
+
In short, the cycle consistency loss is defined as
|
266 |
+
Lcyc(F, G, XS, XT ) = LcycleS(XS) + LcycleT (XT ).
|
267 |
+
(9)
|
268 |
+
Here, the optimization goal is to reproduce a bijective mapping so that each xS ∈ XS is mapped to XT and back to XS
|
269 |
+
with F(G(xS)) ≈ xS. The same goes for xT ∈ XT with G(F(xT )) ≈ xT .
|
270 |
+
5
|
271 |
+
|
272 |
+
source
|
273 |
+
Aligner F
|
274 |
+
Classifierf
|
275 |
+
aligned
|
276 |
+
target
|
277 |
+
target
|
278 |
+
IC
|
279 |
+
Discriminator A
|
280 |
+
aligned
|
281 |
+
source
|
282 |
+
source
|
283 |
+
Aligner G
|
284 |
+
DiscriminatorBHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
285 |
+
(DBACS)
|
286 |
+
A PREPRINT
|
287 |
+
Adversarial loss
|
288 |
+
Let hDA : XS → I, hDB : XT → I with I = [0, 1] be two statistical model functions describing
|
289 |
+
respectively the distance of source versus aligned target and target versus aligned source. Let hDA be parameterized by
|
290 |
+
θDA and let DA(xS, θDA) be the parameter representation of discriminator A where DA is the model function with
|
291 |
+
parameters θDA that outputs the prediction for xS ∈ XS. Let hDB be parameterized by θDB and let DB(xT , θDB) be
|
292 |
+
the parameter representation of discriminator B where DB is the model function with parameters θDB that outputs the
|
293 |
+
prediction for xT ∈ XT . Then the adversarial loss first for source LadvS and second for target LadvT is defined based
|
294 |
+
on a selected loss function L:
|
295 |
+
LadvS(XS, XT ) := LDA,DS(XS) − LDA,DT (XT )
|
296 |
+
= LxS∼DX
|
297 |
+
S (hDA (xS)) − LxT ∼DX
|
298 |
+
T (hDA (hF (xT )))
|
299 |
+
= LxS∼DX
|
300 |
+
S (DA (xS, θDA)) − LxT ∼DX
|
301 |
+
T (DA (F(xT , θF ), θDA))
|
302 |
+
(10)
|
303 |
+
LadvT (XS, XT ) := LDB,DT (XT ) − LDB,DS(XS)
|
304 |
+
= LxT ∼DX
|
305 |
+
T (hDB (xT )) − LxS∼DX
|
306 |
+
S (hDB (hG(xS)))
|
307 |
+
= LxT ∈DX
|
308 |
+
T (DB (xT , θDB)) − LxS∼DX
|
309 |
+
S (DB (G(xS, θG), θDB))
|
310 |
+
(11)
|
311 |
+
The adversarial loss is applied to the output of each discriminator and enables an adversarial training approach (see
|
312 |
+
Gentner et al. [2021], Gulrajani et al. [2017]). For a regression modeling task: Let I ⊂ R or I = R and the discriminator
|
313 |
+
a regression model with linear output activation function. Then the adversarial loss is defined as
|
314 |
+
LadvS(XS, XT ) = ExS∼DS [DA (xS, θDA)] − ExT ∼DT [(DA(F(xT , θF ), θDA))],
|
315 |
+
(12)
|
316 |
+
LadvT (XS, XT ) = ExT ∼DT [DB (xT , θDB)] − ExS∼DS[(DB(G(xS, θG), θDB))],
|
317 |
+
(13)
|
318 |
+
where E defines the expected value and the loss is an approximation of the Wasserstein distance of two sampled
|
319 |
+
distributions, for details see Gulrajani et al. [2017].
|
320 |
+
Remark
|
321 |
+
It is recommended by Zhu et al. [2017] based on Taigman et al. [2017] to add one more additional loss term
|
322 |
+
namely the identity loss. The idea is that if almost identical samples in the other domain occur, the aligner should per-
|
323 |
+
form close to an identity function. Since source and target are heterogeneous in our case we do not apply this kind of loss.
|
324 |
+
The training itself happens in an adversarial setting with a two-player game approach. The adversarial training routine
|
325 |
+
includes parallel training of both aligner and both discriminator using adversarial loss plus inclusion of the additional
|
326 |
+
loss terms. For training, two fixed training data sets S and T (training samples are drawn i.i.d from DS and DT ) are
|
327 |
+
used. During the aligners training phase, the adversarial loss is minimized, during discriminator training phase it is
|
328 |
+
maximized (or its negative value minimized).:
|
329 |
+
• The first competitor of the adversarial training is the discriminator DA trained to distinguish between source
|
330 |
+
and aligned target data meaning optimizing the adversarial source loss. In parallel the discriminator DB is
|
331 |
+
trained to distinguish between target and aligned source data also meaning optimizing the adversarial target
|
332 |
+
loss. The optimization of the discriminator A and discriminator B loss LDtotal is defined as
|
333 |
+
max
|
334 |
+
θDA,θDB
|
335 |
+
LDtotal(XS, XT ) = max
|
336 |
+
θDA
|
337 |
+
LadvS(XS, XT ) + max
|
338 |
+
θDB
|
339 |
+
LadvT (XS, XT )
|
340 |
+
= max
|
341 |
+
θDA
|
342 |
+
LDA,DS(XS, θDA) − LDA,DT (F(XT , θF ), θDA)
|
343 |
+
+ max
|
344 |
+
θDB
|
345 |
+
LDB,DT (XT , θDB) − LDB,DS(G(XS, θG), θDB)
|
346 |
+
= max
|
347 |
+
θDA
|
348 |
+
LxS∈S (DA (xS, θDA)) − LxT ∈T (DA (F(xT , θF ), θDA))
|
349 |
+
+ max
|
350 |
+
θDB
|
351 |
+
LxT ∈T (DB (xT , θDB)) − LxS∈S (DB (G(xS, θG), θDB))
|
352 |
+
(14)
|
353 |
+
• The second competitor in the adversarial training is the aligner cycle. We define LAtotal using the adversarial
|
354 |
+
loss for both aligners and the cycle consistency loss. In case of labeled target data the aligner F is also updated
|
355 |
+
in order to optimize prediction loss LP for aligned target data. The adversarial part of the aligner losses is set
|
356 |
+
in opposite direction compared to the ones used to update the two discriminator:
|
357 |
+
min
|
358 |
+
θF ,θG LAtotal(XS, XT ) = min
|
359 |
+
θF ,θG λadvSLadvS (XS, XT ) + λP LP (F(XT )) + λadvT LadvT (XS, XT )
|
360 |
+
= min
|
361 |
+
θF ,θG[−LxT ∈T (DA (F(xT , θF ), θDA))
|
362 |
+
+ λP L(xT ,y)∈T L(P (F(xT , θF ), θP )) − LxS∈S (DB (G(xS, θG), θDB))]
|
363 |
+
(15)
|
364 |
+
6
|
365 |
+
|
366 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
367 |
+
(DBACS)
|
368 |
+
A PREPRINT
|
369 |
+
where λ(·) represents the weight assigned to each corresponding loss term. For λP = 0 the training happens in
|
370 |
+
an unsupervised setting where no target labels are available. A gradient penalty regularization term is added
|
371 |
+
when updating both aligners following the recommendations of Gulrajani et al. [2017].
|
372 |
+
3.2
|
373 |
+
Subspace Alignment using Principle Component Analysis
|
374 |
+
Subspace Alignment (SA), presented by Fernando et al. [2013], linearly aligns subspaces generated by Principle
|
375 |
+
Component Analysis (PCA).
|
376 |
+
SA was introduced as unsupervised DA method for classification task. Overall benefits of SA lies in the simplicity and
|
377 |
+
in the speed of the method while still presenting high accuracy. For heterogeneous domain adaptation, we slightly adapt
|
378 |
+
here the SA approach by first applying PCA separately to source and target and then align the corresponding subspaces
|
379 |
+
using CORrelation ALignment (CORAL). CORAL by Sun et al. [2016] is an unsupervised domain adaptation method
|
380 |
+
that aligns second order statistics of source and target domain.
|
381 |
+
PCA
|
382 |
+
Principle Component Analysis (PCA) is a linear transformation of a vector space with respect to its points/vectors.
|
383 |
+
The projection is created in a way that highest occurring variance is represented by the first latent dimension (the
|
384 |
+
so-called first principle component), the second highest variance by the second principle component and so on. Let X
|
385 |
+
be a vector space, let ψ : X → X′ define the nonlinear principle component transformation to be computed. Then PCA
|
386 |
+
is formalized via
|
387 |
+
x′ = ψ(x) = ΓT x
|
388 |
+
(16)
|
389 |
+
where x′ ∈ X′ describes the transformed input, Γ consists of the eigenvectors and is computed via Λ = ΓT ΣΓ where
|
390 |
+
Λ is a diagonal matrix defined by the eigenvalues and Σ is the covariance matrix. PCA is applied to XS and XT
|
391 |
+
accordingly resulting in S′ and T ′ as projected input sets. Since PCA is a very well-known method, we refer to Jolliffe
|
392 |
+
[2010] for a more detailed description.
|
393 |
+
CORAL
|
394 |
+
Let S′ = {x′
|
395 |
+
Si}, T ′ = {x′
|
396 |
+
Ti} be the PCA projected input sets from the source and target domains. Let
|
397 |
+
Υ : X′
|
398 |
+
S → X′
|
399 |
+
T with Υ(X′
|
400 |
+
S) = X′
|
401 |
+
S ∗ A describe the feature transformation of the source space to the target space. Let
|
402 |
+
µS′, µT ′ be the feature mean of S′, T ′ and CS′, CT ′ the corresponding covariance matrices. Then, the distance between
|
403 |
+
the covariance matrices (assuming normalized features with zero mean) is minimized by:
|
404 |
+
min
|
405 |
+
A
|
406 |
+
��C ˆ
|
407 |
+
S′ − CT ′��2
|
408 |
+
F = min
|
409 |
+
A
|
410 |
+
��AT CS′A − C′
|
411 |
+
T
|
412 |
+
��2
|
413 |
+
F
|
414 |
+
where A is the matrix used in linear transformation that is applied to the source, C ˆ
|
415 |
+
S′ describes the covariance of the
|
416 |
+
transformed source features S′∗A and ∥·∥2
|
417 |
+
F denoting the squared Frobenius norm selected as distance metric. It is
|
418 |
+
called CORAL loss. In order to solve this equation, we follow Algorithm 1 in Sun et al. [2016] and compute first the
|
419 |
+
covariance matrices followed by whitening the source and then recoloring it with the target covariance.
|
420 |
+
3.3
|
421 |
+
Canonical Correlation Analysis (CCA)
|
422 |
+
Canonical Correlation Analysis (CCA) defines linear transformation for each set of variables such that after the
|
423 |
+
transformation the projected features are maximal correlated. A summary of the descriptions is taken from Hardoon
|
424 |
+
et al. [2004].
|
425 |
+
Let S = {xS}, T = {xT } be two sample sets wanted to be projected into direction wS, wT . Let ΦS : XS → X′
|
426 |
+
S,
|
427 |
+
ΦT : XT → X′
|
428 |
+
T define the linear transformation for each domain. Then:
|
429 |
+
ΦS(S) = S
|
430 |
+
′ = SxS,wS = ⟨wS, xS⟩,
|
431 |
+
ΦT (T) = T
|
432 |
+
′ = TxT ,wT = ⟨wT , xT ⟩.
|
433 |
+
(17)
|
434 |
+
Specifically, it is looked for wS, wT such that the correlation between the projected vectors is maximised, hence:
|
435 |
+
ρ = max
|
436 |
+
wS,wT corr (SxS,wS, TxT ,wT ) = max
|
437 |
+
wS,wT
|
438 |
+
⟨SxS,wS, TxT ,wT ⟩
|
439 |
+
∥SxS,wS∥ · ∥TxT ,wT ∥.
|
440 |
+
(18)
|
441 |
+
The previous equation can be reformulated as
|
442 |
+
ρ = max
|
443 |
+
wS,wT
|
444 |
+
w′
|
445 |
+
sE[xSx′
|
446 |
+
T ]wT
|
447 |
+
�
|
448 |
+
w′
|
449 |
+
SE[xSx′
|
450 |
+
S]wSw′
|
451 |
+
T E[xT x′
|
452 |
+
T ]wT
|
453 |
+
(19)
|
454 |
+
7
|
455 |
+
|
456 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
457 |
+
(DBACS)
|
458 |
+
A PREPRINT
|
459 |
+
with E denoting the discrete empirical expectation, ′ denotes the transpose of a vector or a matrix and properties of the
|
460 |
+
inner product are used. Using the covariance matrix with
|
461 |
+
C = C(xS, xT ) = E[xSxT ] =
|
462 |
+
�CxSxS
|
463 |
+
CxT xS
|
464 |
+
CxSxT
|
465 |
+
CxT xT
|
466 |
+
�
|
467 |
+
(20)
|
468 |
+
where C is a block matrix with the within-covariance CxSxS, CxT xT and between-covariance matrices CxSxT , CxT xS
|
469 |
+
as entries. Finally the optimization problem can be formulated in the following way:
|
470 |
+
ρ = max
|
471 |
+
wS,wT
|
472 |
+
w′
|
473 |
+
sCxSxT wT
|
474 |
+
�
|
475 |
+
w′
|
476 |
+
SCxSxSwSw′
|
477 |
+
T CxT xT wT
|
478 |
+
(21)
|
479 |
+
By checking that rescaling of wS, wT does not change the problem, it can be maximized subject to
|
480 |
+
w′
|
481 |
+
SCxSxSwS = 1,
|
482 |
+
w′
|
483 |
+
T CxT xT wT = 1.
|
484 |
+
(22)
|
485 |
+
The formulation of the dual problem is used, hence computing the corresponding Lagrangian L leads to
|
486 |
+
L(λ, wS, wT ) = w′
|
487 |
+
sCxSxT wT − λS
|
488 |
+
2 (w′
|
489 |
+
SCxSxSwS − 1) − λT
|
490 |
+
2 (w′
|
491 |
+
T CxT xT wT − 1).
|
492 |
+
(23)
|
493 |
+
The partial derivatives in the direction of wS, wT are:
|
494 |
+
∂L
|
495 |
+
wS
|
496 |
+
= CxSxT wT − λSCxSxSwS = 0,
|
497 |
+
(24)
|
498 |
+
∂L
|
499 |
+
wT
|
500 |
+
= CxT xSwS − λT CxT xT wT = 0.
|
501 |
+
(25)
|
502 |
+
Multiplying (25) with wS∗ and multiplying (24) with wT ∗ and subtracting the one from the other, define λ = λS = λT ,
|
503 |
+
assuming CxT xT is invertible, rearrange the equation and use the partial derivative leaves to
|
504 |
+
CxSxT C−1
|
505 |
+
xT xT CxT xSwS = λ2CxSxSwS
|
506 |
+
(26)
|
507 |
+
which is equivalent to a generalised eigenproblem of the form Ax = λBx. Using Cholesky decomposition, the previous
|
508 |
+
can be even more simplified to a symmetric eigenvalue problem Ax = λx. For visualization see Figure 2.
|
509 |
+
Figure 2: Visualization of Canonical Correlation Analysis (CCA). The canonical components of source and target
|
510 |
+
are a weighted combination of corresponding input features. The correlation of the canonical components within the
|
511 |
+
red box is maximized. Similarly to PCA, the number of canonical components can be tuned.
|
512 |
+
4
|
513 |
+
Case Study: Dataset Description and Experimental Settings
|
514 |
+
4.1
|
515 |
+
Semiconductor Manufacturing: Etching process and Virtual Metrology
|
516 |
+
Wafers are the basis for every semiconductor manufacturing process. A wafer consists of pure (99.9999%) silicon, has a
|
517 |
+
disc shape and houses several thousand chips (the end product) on average. The specific technology structure of a chip
|
518 |
+
is built up layer by layer on the wafer during a couple of hundred process steps. Each wafer is considered a separate
|
519 |
+
sample in this work.
|
520 |
+
8
|
521 |
+
|
522 |
+
Source
|
523 |
+
TargetHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
524 |
+
(DBACS)
|
525 |
+
A PREPRINT
|
526 |
+
Etching is a common process in semiconductor manufacturing and is frequently studied and discussed in semiconductor
|
527 |
+
research and literature, along with chemical vapor deposition and implantation. The etching process removes material
|
528 |
+
from a surface or transfers a structure created during the lithography step to the layer below Hilleringmann [1996],
|
529 |
+
May and Spanos [2006]. Reactive-ion etching uses a high-frequency alternating energy field applied to the cathode on
|
530 |
+
which the wafer is placed. Positively charged ions in the plasma are accelerated towards the wafer and collide with its
|
531 |
+
surface at high kinetic energy, causing atoms from the wafer’s surface to be dislodged from the crystal lattice, resulting
|
532 |
+
in partial physical etching. In addition, a partial chemical reaction occurs due to the highly reactive free radicals.
|
533 |
+
The plasma etching process includes up to ten sub-steps during which input sensors must be adjusted to the target values
|
534 |
+
specified in a recipe. Sensors that measure properties such as chamber pressure, applied high frequency voltage, gas
|
535 |
+
type, gas flow, and wafer temperature, as well as electrode temperature and bias, play a crucial role in achieving the
|
536 |
+
desired wafer properties. End point detection, or the etching time, is one of the most critical aspects of the process, as it
|
537 |
+
is highly sensitive and closely related to other variables such as gases, pressure, current, and temperature. Incorrect
|
538 |
+
etching times, inadequate end point detection, uncontrolled reactions, and interference in the chamber can negatively
|
539 |
+
affect the layer thickness and overall quality and functionality of the wafer.
|
540 |
+
Process monitoring and control are essential for reliable, standardized, and repeatable production processes that produce
|
541 |
+
high-quality products. In this work, we focus on a process control method called virtual metrology (VM) and analyze it
|
542 |
+
through a case study involving an etching process. In general, control quantities are typically measured in metrology
|
543 |
+
stations or tools after the process is completed, using multiple measurements on a sample of wafers. Traditional
|
544 |
+
metrology is a univariate or multivariate control system that uses control charts with defined upper and lower control
|
545 |
+
limits to monitor process performance. However, due to cost and time constraints, not all wafers can be physically
|
546 |
+
measured after the process.
|
547 |
+
Virtual metrology (VM) or soft sensing modules utilize data collected by process equipment to model the relationship
|
548 |
+
between wafer properties and process input and feedback sensor measurements. VM techniques allow for the inclusion
|
549 |
+
of non-measured but predicted control measures in order to enhance analysis. VM technologies offer several benefits,
|
550 |
+
including:
|
551 |
+
• costs and time savings due to reduced mandatory measurements;
|
552 |
+
• quality assurance through enhanced and comprehensive monitoring;
|
553 |
+
• real-time control, assessment and process updates in conjunction with Run-to-Run controllers Su et al. [2007];
|
554 |
+
• data-driven process optimization including fault detection, root cause analysis and improved sample selection
|
555 |
+
Feng et al. [2019].
|
556 |
+
4.2
|
557 |
+
Data Preparation
|
558 |
+
The data used in this work is collected from two different etching equipment types from the same vendor. The data set
|
559 |
+
is restricted to a specific etching recipe that was transferred from one equipment to the other and now runs regularly
|
560 |
+
on both equipment. Raw sensor measurements in form of time series data and their corresponding metrology/inline
|
561 |
+
measurements over a period of 3 years are considered.
|
562 |
+
• The equipment type 1 with 35 activated sensors - older equipment type hence higher number of samples (∼10
|
563 |
+
000) and original tool to run the specific recipe- is selected as source;
|
564 |
+
• the equipment type 2 with 55 activated sensors - newer equipment type with ∼6000 data samples - is defined
|
565 |
+
as target.
|
566 |
+
The following preprocessing steps were applied to the collected time series sensor data, with each equipment treated
|
567 |
+
separately due to its heterogeneous nature:
|
568 |
+
1. removal of constant features;
|
569 |
+
2. removal of features that show small fluctuation that can be detect as noise (variations smaller than 0.01) and a
|
570 |
+
constant behavior underneath the noise;
|
571 |
+
3. removal of samples showing label outliers based on interquantile range;
|
572 |
+
4. removal of samples where the length of the time series lies below or above 25 percent respective 75 percent
|
573 |
+
quantile of time series length;
|
574 |
+
5. equal-distributed upsampling of timestamps and feature values to generate time series with equal length.
|
575 |
+
33 features for equipment type 1 respective 49 for equipment type 2 are finally selected as input features. No significant
|
576 |
+
label shift is detected, see Figure 3.
|
577 |
+
9
|
578 |
+
|
579 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
580 |
+
(DBACS)
|
581 |
+
A PREPRINT
|
582 |
+
Figure 3: Boxplot of normalized layer thickness from two equipment. Boxplot graphs of normalized metrol-
|
583 |
+
ogy/inline measurements from both equipment types considered in the analysis.
|
584 |
+
4.3
|
585 |
+
Experimental Design
|
586 |
+
Virtual metrology is modeled as prediction task with sensor data as input mapped to a single continuous metrology
|
587 |
+
value. Due to the heterogeneous nature of the data representation from equipment type 1 and 2, no common model can
|
588 |
+
be used without additional transfer. We present the analysis in the following order:
|
589 |
+
1. DBACS is trained and tested as domain adaptation model using autoencoder to align the original input features
|
590 |
+
to enable usage of a dedicated pretrained model;
|
591 |
+
2. PCA and CCA are selected as benchmark models; for the heterogeneous VM task the alignment happens by
|
592 |
+
creating a common (latent) feature space that is then used to train a common model. CORAL on the latent
|
593 |
+
features is tested as final combination for both PCA and CCA.
|
594 |
+
For training, distribution comparison and alignment evaluation the following metrics are considered:
|
595 |
+
• Mean absolute error (MAE) is used as performance based loss; Adam optimizer is applied for training;
|
596 |
+
• To test inner versus outer domain distance - the divergence between data selected from source and data selected
|
597 |
+
from target domain - we use Frechet inception distance (FID);
|
598 |
+
• 5-fold cross validation is applied, hence split both data sets into 5 subsets each and using 4 merged sets as
|
599 |
+
train and 1 as test set per fold. Architectures of all models stay fixed for all 5 folds;
|
600 |
+
• pearson correlation of features is tested after alignment.
|
601 |
+
For the correlation analysis we use the function implementation available in python module numpy Harris et al. [2020]
|
602 |
+
and for PCA and CCA we use existing function implementation in the python module scikit-learn Pedregosa et al.
|
603 |
+
[2011]. For CORAL we use the implementations from the python module transfertools Vincent et al. [2020]. DBACS
|
604 |
+
is trained using the described adversarial training approach. PCA and CCA expect a two dimensional input, hence
|
605 |
+
we keep the original data and reshape the 3 dimensional sample into a two dimensional one by treating each value at
|
606 |
+
each time step as separate sample. The selected number of latent features are based on the variation coverage of both
|
607 |
+
domains. In the following, model details and hyperparameters choices are reported.
|
608 |
+
DBCAS
|
609 |
+
1DCNN is chosen since it is simple but proven to be well performing for time series data Gentner et al.
|
610 |
+
[2021].
|
611 |
+
• The predictor consists of 3 convolutional layers (dimension 32, 16, 8 and kernel size 53, 33 and 33), followed
|
612 |
+
by one max pooling layer, a flattening layer and two dense layers (dimension 16 and 1, Leaky ReLU activation
|
613 |
+
except sigmoid output).
|
614 |
+
• The domain discriminators both have the same architecture besides the respective input shape: 3 convolutional
|
615 |
+
layers (dimension 24, 16 and 8, kernel size 17), causal padding and leaky ReLU activation function, max
|
616 |
+
10
|
617 |
+
|
618 |
+
Normalized metrology measurementsforboth equipment types
|
619 |
+
1.0
|
620 |
+
0.8
|
621 |
+
0.6
|
622 |
+
0.4
|
623 |
+
0.2
|
624 |
+
0.0
|
625 |
+
equipment type 1 - train data
|
626 |
+
equipment type 1 -test data
|
627 |
+
equipment type 2 - train data
|
628 |
+
equipment type 2 -test dataHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
629 |
+
(DBACS)
|
630 |
+
A PREPRINT
|
631 |
+
pooling of size 4 and 2 times 2, followed by a flattening layer and 6 dense layers (dimension 512, 256, 128, 64,
|
632 |
+
32, 1, Leaky ReLU activation and linear output).
|
633 |
+
• Both aligners consist of 6 convolutional layers, first 5 followed by Leaky ReLU activation function, the final
|
634 |
+
output is kept linear. The aligner that maps target domain to source domain has filter size 48, 42, 36, 32, 32
|
635 |
+
and final filter size is set to number of features of the source domain; kernel size is 37, 37, 37, 37, 57 and 7.
|
636 |
+
Upsampling with size 3 and 2 is done after 4th and 5th layer block. The aligner that maps source domain to
|
637 |
+
target domain has filter size 32, 36, 42, 46, 48 and final filter size is set to number of features of the target
|
638 |
+
domain; kernel size is also 37, 37, 37, 37, 57 and 7. Upsampling with size 3 and 2 is also done after 4th and
|
639 |
+
5th layer block.
|
640 |
+
For an improved initialization both aligners are pretrained separately using SSIM loss Wang et al. [2004]: therefore, we
|
641 |
+
select sample pairs from source and target based on closest label value.
|
642 |
+
PCA and CORAL
|
643 |
+
The 3 dimensional input is reshaped into a two dimensional one by treating each value at each
|
644 |
+
time step as separate sample. For each equipment type, we select the first 10 principal components in order to cover
|
645 |
+
around 95% variance and to create same dimensional input space. For equipment type 1 we cover 97% of the variance
|
646 |
+
and for equipment type 2 we cover 94%. 1DCNN prediction model with reduced number of features based on PCA
|
647 |
+
(reshaped back to 3 dimensions) of source and target domain is used as prediction model.
|
648 |
+
CCA
|
649 |
+
27 canonical components (CCs) are kept since it shows the most stable results in our experiments. The original
|
650 |
+
data is reshaped from 3 dimensional input into a two dimensional one by treating each value at each time step as separate
|
651 |
+
sample. 1DCNN prediction model with reduced number of features based on CCA (reshaped back to 3 dimensions) of
|
652 |
+
source and target domain is used as prediction model.
|
653 |
+
5
|
654 |
+
Experimental Results
|
655 |
+
Table 1 shows the average 5 fold CV results for DBACS compared to the dedicated lower bound values meaning perfor-
|
656 |
+
mance errors for dedicated models trained only on source and only on target data. The numbers given in Table 1 confirm
|
657 |
+
DBACS MAE for source and aligned target
|
658 |
+
Source domain
|
659 |
+
Target domain
|
660 |
+
Train
|
661 |
+
Test
|
662 |
+
Train
|
663 |
+
Test
|
664 |
+
Lower Bound
|
665 |
+
0.084
|
666 |
+
0.094
|
667 |
+
0.102
|
668 |
+
0.128
|
669 |
+
DBACS
|
670 |
+
0.084
|
671 |
+
0.094
|
672 |
+
0.102
|
673 |
+
0.131
|
674 |
+
Table 1: DBACS performance errors for source and aligned target. Source and aligned target data DBACS training
|
675 |
+
and test scores average over 5 fold CV. Target data is mapped to source domain using trained aligner F from DBACS
|
676 |
+
and evaluated after the mapping using the VM prediction model trained on source. Lower bound prediction models are
|
677 |
+
dedicated meaning trained only on source train data and evaluated only on source test data respective trained only on
|
678 |
+
target train data and evaluated only on target test data.
|
679 |
+
the visual convergence seen in the t-SNE plot in Figure 4. This is supported by frechet inception distance (FID) 0.01 for
|
680 |
+
outer domain distance after alignment compared to FID inner domain distance close to 0 for equipment type 1 as well as
|
681 |
+
for equipment type 2. Next, Figure 5 shows true versus predicted values of different alignment states - randomly initial-
|
682 |
+
ized aligner, after the pretraining of the aligner and after DA training with DBACS). Again, the visualization supports the
|
683 |
+
results presented in Table 1: Enabeling usage of a dedicated source model to mapped target data for high accuracy pre-
|
684 |
+
dictions. A visualization of both aligners output is presented in Figure 6 and compared to original domain sensor signals.
|
685 |
+
Next, we present results for PCA analysis in Table 2. Optional DA with CORAL on top shows slightly improved results
|
686 |
+
if model is trained on data from both domains. The FID score for outer domain distance after PCA + CORAL on the
|
687 |
+
latent features generated by PCA is significant lower than before with 0.0001 for train and 0.001 for test. Only the first
|
688 |
+
two principal components show a correlation higher than r = 0.5.
|
689 |
+
For CCA, the performance is presented in Table 3. Optional DA with CORAL on top shows improved results since
|
690 |
+
model training for both domains is enabled and can be executed using CCs. The FID score for outer domain distance
|
691 |
+
after CCA + CORAL on the latent features generated by CCA is again significant lower than before with very close to 0
|
692 |
+
11
|
693 |
+
|
694 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
695 |
+
(DBACS)
|
696 |
+
A PREPRINT
|
697 |
+
Figure 4: T-SNE visualization before and after alignment with DBACS. Graphical t-SNE representation of source
|
698 |
+
and target domain in different stages of the alignment process: (a) shows features mapped by a randomly initialized
|
699 |
+
aligner, (b) after the pretraining of the aligner and (c) after DA with DBACS is done. The source is colored in blue
|
700 |
+
and contains data from equipment type 1, the target is colored red and contains data from the equipment type 2. The
|
701 |
+
axes are dimensionless. The effect of the adaptation of the input features after DBACS is applied during training. The
|
702 |
+
adaptation brings the distributions of the target domain closer and finally target overlaps source domain.
|
703 |
+
Figure 5: True versus predicted scatter plot for DBACS before and after alignment. The graph shows predictions of
|
704 |
+
aligned target data after mapped to source space by a randomly initialized aligner, after the pretraining of the aligner
|
705 |
+
and predictions of aligned target data after DA training with DBACS is done. Only test data is presented, the test source
|
706 |
+
data is colored in blue, the the aligned target test data is colored in red.
|
707 |
+
for train and test. The first five CCs have a correlation higher than r = 0.5.
|
708 |
+
6
|
709 |
+
Equipment Matching Experiments
|
710 |
+
Having with DBACS a methodology that allows parallel training and transfer in both directions - source to target
|
711 |
+
but also target to source - mis- or abnormal behavior detected for aligned data can be compared to normal as well as
|
712 |
+
abnormal data from source. These kind of comparisons enables equipment matching for nonidentical equipment with
|
713 |
+
heterogeneous data representations.
|
714 |
+
12
|
715 |
+
|
716 |
+
20
|
717 |
+
0
|
718 |
+
-20
|
719 |
+
-20
|
720 |
+
0
|
721 |
+
20
|
722 |
+
4020
|
723 |
+
10
|
724 |
+
0
|
725 |
+
-10
|
726 |
+
20
|
727 |
+
-30
|
728 |
+
-20
|
729 |
+
-10
|
730 |
+
0
|
731 |
+
10
|
732 |
+
20
|
733 |
+
3040
|
734 |
+
20
|
735 |
+
0
|
736 |
+
-20
|
737 |
+
20
|
738 |
+
20sourcetestset
|
739 |
+
alignedtargettest
|
740 |
+
0.8
|
741 |
+
0.6
|
742 |
+
value
|
743 |
+
0.4
|
744 |
+
0.0
|
745 |
+
0.0
|
746 |
+
0.2
|
747 |
+
0.4
|
748 |
+
0.6
|
749 |
+
0.8
|
750 |
+
1.0
|
751 |
+
true values1.0
|
752 |
+
source test set
|
753 |
+
aligned target test set
|
754 |
+
0.8
|
755 |
+
0.6
|
756 |
+
edicted
|
757 |
+
0.4
|
758 |
+
0.2
|
759 |
+
0.0
|
760 |
+
0.0
|
761 |
+
0.2
|
762 |
+
0.4
|
763 |
+
0.6
|
764 |
+
0.8
|
765 |
+
1.0
|
766 |
+
true values1.0
|
767 |
+
sourcetestset
|
768 |
+
aligned target test set
|
769 |
+
0.8
|
770 |
+
E0.6
|
771 |
+
0.2
|
772 |
+
0.0
|
773 |
+
0.0
|
774 |
+
0.2
|
775 |
+
0.4
|
776 |
+
0.6
|
777 |
+
0.8
|
778 |
+
1.0
|
779 |
+
true valuesHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
780 |
+
(DBACS)
|
781 |
+
A PREPRINT
|
782 |
+
Figure 6: Aligner F and G visualizations of 2 times 3 raw sensor measurements of both equipment types before and
|
783 |
+
after the corresponding alignment. The graph shows results for trained aligner F and mapped sensor signals from
|
784 |
+
target to source domain in red and compares it to corresponding original source sensor signals plotted in black. It also
|
785 |
+
shows results from trained aligner G and mapped sensor signals from source to target domain in blue and compares it to
|
786 |
+
corresponding original target sensor signals plotted in black. A good alignment is visible as well. The x axis shows the
|
787 |
+
timestamps of the sensor signals, y axis the sensor measurement values.
|
788 |
+
VM prediction model performance for PCA based principle components
|
789 |
+
Source domain
|
790 |
+
Target domain
|
791 |
+
Train MAE
|
792 |
+
Test MAE
|
793 |
+
Train MAE
|
794 |
+
Test MAE
|
795 |
+
PCA(source)
|
796 |
+
0.09
|
797 |
+
0.09
|
798 |
+
0.32
|
799 |
+
0.33
|
800 |
+
PCA(target)
|
801 |
+
0.47
|
802 |
+
0.47
|
803 |
+
0.12
|
804 |
+
0.13
|
805 |
+
PCA(both)
|
806 |
+
0.10
|
807 |
+
0.14
|
808 |
+
0.09
|
809 |
+
0.14
|
810 |
+
PCA+CORAL(both)
|
811 |
+
0.08
|
812 |
+
0.09
|
813 |
+
0.12
|
814 |
+
0.13
|
815 |
+
Table 2: VM prediction model performance for PCA based principle components. Results for VM prediction
|
816 |
+
models that are trained with reduced number of latent features that are created via PCA.
|
817 |
+
First, we compare source signals with its cycled signals on the signal shape itself as well target signals with its cycled
|
818 |
+
target signals. Examples from both are presented in Figure 7.
|
819 |
+
Next, we check differences within source domain of samples having a high, middle and low prediction value. This
|
820 |
+
helps to better understand univariate feature behavior for source. The middle prediction is the preferred and targeted
|
821 |
+
one. Figure 8 shows euclidean barycenter averages of tree example signals from source domain for low, middle and
|
822 |
+
high label values. Sensor offsets for deviating metrology measurements are clearly visible for some of the signals.
|
823 |
+
For final equipment matching, we compare preferred shape of signals from the source domain meaning signals
|
824 |
+
with metrology measurements close to target 0.5 (see Figure 8 to corresponding as well as deviating signals from
|
825 |
+
target domain. Therefore, we use the DBACS to map selected source signals into the target domain. Different
|
826 |
+
sensors measurements and their euclidean barycenter averages of groups according to low, middle and high metrology
|
827 |
+
measurements are shown in Figure 9 and compared to mapped sensor signals (source to target) corresponding to the
|
828 |
+
middle meaning preferred metrology group in the source domain.
|
829 |
+
13
|
830 |
+
|
831 |
+
1.0
|
832 |
+
1.0
|
833 |
+
1.0
|
834 |
+
source-domain
|
835 |
+
target domain aligned
|
836 |
+
0.8
|
837 |
+
0.8
|
838 |
+
0.6
|
839 |
+
0.6
|
840 |
+
0.4
|
841 |
+
0.4
|
842 |
+
0.4
|
843 |
+
0.2
|
844 |
+
0.2
|
845 |
+
0.0
|
846 |
+
0.0
|
847 |
+
0.0
|
848 |
+
0
|
849 |
+
200
|
850 |
+
400
|
851 |
+
600
|
852 |
+
800
|
853 |
+
1000
|
854 |
+
200
|
855 |
+
400
|
856 |
+
600
|
857 |
+
800
|
858 |
+
1000
|
859 |
+
0
|
860 |
+
200
|
861 |
+
400
|
862 |
+
600
|
863 |
+
800
|
864 |
+
1000
|
865 |
+
time
|
866 |
+
time
|
867 |
+
time1.0
|
868 |
+
1.0
|
869 |
+
1.0
|
870 |
+
targetdomain
|
871 |
+
source domain aligned
|
872 |
+
0.8
|
873 |
+
0.8
|
874 |
+
0.8
|
875 |
+
0.6
|
876 |
+
0.6
|
877 |
+
0.6
|
878 |
+
0.4
|
879 |
+
0.4
|
880 |
+
0.2
|
881 |
+
0.2
|
882 |
+
0.2
|
883 |
+
0.0
|
884 |
+
0.0
|
885 |
+
0.0
|
886 |
+
200
|
887 |
+
400
|
888 |
+
600
|
889 |
+
800
|
890 |
+
1000
|
891 |
+
200
|
892 |
+
400
|
893 |
+
600
|
894 |
+
800
|
895 |
+
1000
|
896 |
+
200
|
897 |
+
400
|
898 |
+
600
|
899 |
+
800
|
900 |
+
1000
|
901 |
+
time
|
902 |
+
time
|
903 |
+
timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
904 |
+
(DBACS)
|
905 |
+
A PREPRINT
|
906 |
+
VM prediction model performance for CCA based canonical components
|
907 |
+
Source domain
|
908 |
+
Target domain
|
909 |
+
Train MAE
|
910 |
+
Test MAE
|
911 |
+
Train MAE
|
912 |
+
Test MAE
|
913 |
+
CCA(source)
|
914 |
+
0.12
|
915 |
+
0.13
|
916 |
+
0.29
|
917 |
+
0.29
|
918 |
+
CCA(target)
|
919 |
+
0.29
|
920 |
+
0.29
|
921 |
+
0.10
|
922 |
+
0.14
|
923 |
+
CCA(both)
|
924 |
+
0.10
|
925 |
+
0.13
|
926 |
+
0.12
|
927 |
+
0.14
|
928 |
+
CCA+CORAL(both)
|
929 |
+
0.07
|
930 |
+
0.08
|
931 |
+
0.13
|
932 |
+
0.13
|
933 |
+
Table 3: VM prediction model performance for CCA based canonical components. Results for VM prediction
|
934 |
+
models that are trained with latent features created via CCA.
|
935 |
+
Figure 7: Aligner F and G visualizations of 2 times 3 cycled raw sensor measurements of both equipment types
|
936 |
+
in its original form as well as after its bijective mapping. The first graph shows results for source signals and cycled
|
937 |
+
source signals from source to target to source domain. The cycled signals are plotted in red and compared to its original
|
938 |
+
source sensor signals plotted in black. The second graph shows results for target signals and cycled target signals from
|
939 |
+
target to source back to target domain. The cycled signals are plotted in blue and compared to its original target sensor
|
940 |
+
signals plotted in black. The x axis shows the timestamps of the sensor signals, y axis the sensor measurement values.
|
941 |
+
7
|
942 |
+
Conclusion and Future Work
|
943 |
+
The paper presents DBACS, a Deep Learning approach that is able to deal with heterogeneous domain adaptation while
|
944 |
+
allowing comparison of aligned signals for a VM use case in semiconductor manufacturing. Linear transformation
|
945 |
+
methods from subspace alignment and multi-view learning are selected as benchmarks and show comparable results
|
946 |
+
when training with data from both domains is possible. Especially for classification tasks, the correlation within
|
947 |
+
CCA can be further exploited for cross-modal or mate-based retrieval. A big advantage of DBACS is the presented
|
948 |
+
combination of domain adaptation with matching, two of the main approaches for standardization and scalability in the
|
949 |
+
semiconductor field.
|
950 |
+
Envisioned future work could go in the direction of root cause analysis based on the matching results. Another important
|
951 |
+
step could to enrich the data with more equipment for multi-source or multi-target alignment. Other applications from
|
952 |
+
semiconductor manufacturing like predictive maintenance and defect classification could be involved and tested for
|
953 |
+
example against computer vision inspired state-of-the-art transfer learning benchmark models like pseudo-labeling.
|
954 |
+
Since only offline model training is executed (training time is not a critical aspect of VM here), online model training
|
955 |
+
could also be explored in that context.
|
956 |
+
14
|
957 |
+
|
958 |
+
1.0
|
959 |
+
1.0
|
960 |
+
1.0
|
961 |
+
source_domain
|
962 |
+
source domain cycled
|
963 |
+
0.8
|
964 |
+
0.8
|
965 |
+
0.8
|
966 |
+
value
|
967 |
+
0.6
|
968 |
+
0.6
|
969 |
+
0.4
|
970 |
+
0.4
|
971 |
+
0.2
|
972 |
+
0.2
|
973 |
+
0.2
|
974 |
+
0.0
|
975 |
+
0.0
|
976 |
+
0.0
|
977 |
+
0
|
978 |
+
200
|
979 |
+
400
|
980 |
+
600
|
981 |
+
800
|
982 |
+
1000
|
983 |
+
200
|
984 |
+
400
|
985 |
+
600
|
986 |
+
800
|
987 |
+
1000
|
988 |
+
200
|
989 |
+
400
|
990 |
+
600
|
991 |
+
800
|
992 |
+
1000
|
993 |
+
time
|
994 |
+
time
|
995 |
+
time1.0
|
996 |
+
1.0
|
997 |
+
1.0
|
998 |
+
target domain
|
999 |
+
target domain cycled
|
1000 |
+
0.8
|
1001 |
+
0.8
|
1002 |
+
0.8
|
1003 |
+
0.6
|
1004 |
+
0.6
|
1005 |
+
0.4
|
1006 |
+
0.4
|
1007 |
+
0.2
|
1008 |
+
0.2
|
1009 |
+
0.2
|
1010 |
+
0.0
|
1011 |
+
400
|
1012 |
+
600
|
1013 |
+
800
|
1014 |
+
1000
|
1015 |
+
0.0
|
1016 |
+
200
|
1017 |
+
400
|
1018 |
+
600
|
1019 |
+
800
|
1020 |
+
0.0
|
1021 |
+
200
|
1022 |
+
0
|
1023 |
+
1000
|
1024 |
+
0
|
1025 |
+
200
|
1026 |
+
400
|
1027 |
+
600
|
1028 |
+
800
|
1029 |
+
1000
|
1030 |
+
time
|
1031 |
+
time
|
1032 |
+
timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
1033 |
+
(DBACS)
|
1034 |
+
A PREPRINT
|
1035 |
+
Figure 8: Comparison of raw source sensor measurements via barycenter average grouped into low, middle
|
1036 |
+
high label values. Graphical representation of euclidean barycenter averages for 3 example sensors of the source
|
1037 |
+
domain. The x axis shows the timestamps of the sensor signals, y axis the sensor measurement values. Example sensor
|
1038 |
+
measurements of samples corresponding to low label values - meaning values smaller 0.1 - are plotted in green, example
|
1039 |
+
sensor measurements of samples corresponding to middle therefore preferred label values - meaning values around 0.5 -
|
1040 |
+
are plotted in grey and example sensor measurements of samples corresponding to high label values - meaning values
|
1041 |
+
higher than 0.9 - are plotted in orange. Sensor offsets for deviating metrology measurements are clearly visible.
|
1042 |
+
Acknowledgment
|
1043 |
+
Infineon Technologies AG is gratefully acknowledged for the financial support of this research. The Italian Government
|
1044 |
+
PNRR iniatiatives ’Partenariato 11: Made in Italy circolare e sostenibile’ and ’Ecosistema dell’Innovazione - iNest’ are
|
1045 |
+
also gratefully acknowledged for partially financing this research activity.
|
1046 |
+
References
|
1047 |
+
N. Alipour and J. Tahmoresnezhad. Heterogeneous domain adaptation with statistical distribution alignment and
|
1048 |
+
progressive pseudo label selection. Appl. Intell., 52:8038–8055, 2022. doi:https://doi.org/10.1007/s10489-021-02756-
|
1049 |
+
x.
|
1050 |
+
M. Azamfar, X. Li, and J. Lee.
|
1051 |
+
Deep learning-based domain adaptation method for fault diagnosis in
|
1052 |
+
semiconductor manufacturing.
|
1053 |
+
IEEE Transactions on Semiconductor Manufacturing, 33(3):445–453, 2020.
|
1054 |
+
doi:https://doi.org/10.1109/TSM.2020.2995548.
|
1055 |
+
J. Chapman and H.-T. Wang.
|
1056 |
+
Cca-zoo: A collection of regularized, deep learning based, kernel, and proba-
|
1057 |
+
bilistic cca methods in a scikit-learn style framework.
|
1058 |
+
Journal of Open Source Software, 6(68):3823, 2021.
|
1059 |
+
doi:https://doi.org/10.21105/joss.03823.
|
1060 |
+
C.-H. Chen,
|
1061 |
+
W.-D. Zhao,
|
1062 |
+
T. Pang,
|
1063 |
+
and Y.-Z. Lin.
|
1064 |
+
Virtual metrology of semiconductor pvd pro-
|
1065 |
+
cess based on combination of tree-based ensemble model.
|
1066 |
+
ISA Transactions, 103:192 – 202, 2020.
|
1067 |
+
doi:https://doi.org/10.1016/j.isatra.2020.03.031.
|
1068 |
+
P. Chen, S. Wu, J. Lin, F. Ko, H. Lo, J. Wang, C. Yu, and M. Liang. Virtual metrology: a solution for wafer to wafer
|
1069 |
+
advanced process control. In ISSM 2005, IEEE International Symposium on Semiconductor Manufacturing, 2005.,
|
1070 |
+
pages 155–157, 2005. doi:https://doi.org/10.1109/ISSM.2005.1513322.
|
1071 |
+
Z. Chen, K. Zhang, S. X. Ding, Y. A. Shardt, and Z. Hu.
|
1072 |
+
Improved canonical correlation analysis-
|
1073 |
+
based fault detection methods for industrial processes.
|
1074 |
+
Journal of Process Control, 41:26–34, 2016.
|
1075 |
+
doi:https://doi.org/10.1016/j.jprocont.2016.02.006.
|
1076 |
+
C.-F. Chien, W.-T. Hung, and E. T.-Y. Liao. Redefining monitoring rules for intelligent fault detection and classification
|
1077 |
+
via cnn transfer learning for smart manufacturing. IEEE Transactions on Semiconductor Manufacturing, 35(2):
|
1078 |
+
158–165, 2022a. doi:https://doi.org/10.1109/TSM.2022.3164904.
|
1079 |
+
C.-F. Chien, W.-T. Hung, C.-W. Pan, and T. H. Van Nguyen. Decision-based virtual metrology for advanced process
|
1080 |
+
control to empower smart production and an empirical study for semiconductor manufacturing. Computers &
|
1081 |
+
Industrial Engineering, page 108245, 2022b.
|
1082 |
+
A. Chouichi,
|
1083 |
+
J. Blue,
|
1084 |
+
C. Yugma,
|
1085 |
+
and F. Pasqualini.
|
1086 |
+
Chamber-to-chamber discrepancy detection in
|
1087 |
+
semiconductor manufacturing.
|
1088 |
+
IEEE Transactions on Semiconductor Manufacturing, 33(1):86–95, 2020.
|
1089 |
+
doi:https://doi.org/10.1109/TSM.2020.2965288.
|
1090 |
+
15
|
1091 |
+
|
1092 |
+
1.0
|
1093 |
+
1.0
|
1094 |
+
1.0
|
1095 |
+
low
|
1096 |
+
middle
|
1097 |
+
high
|
1098 |
+
0.8
|
1099 |
+
0.8
|
1100 |
+
0.8
|
1101 |
+
I sensor value
|
1102 |
+
value
|
1103 |
+
value
|
1104 |
+
0.6
|
1105 |
+
0.6
|
1106 |
+
sensor
|
1107 |
+
0.6
|
1108 |
+
0.4
|
1109 |
+
0.2
|
1110 |
+
0.2
|
1111 |
+
0.2
|
1112 |
+
0.0 +
|
1113 |
+
400
|
1114 |
+
0.0 +
|
1115 |
+
400
|
1116 |
+
600
|
1117 |
+
800
|
1118 |
+
0.0 +
|
1119 |
+
0
|
1120 |
+
200
|
1121 |
+
600
|
1122 |
+
800
|
1123 |
+
1000
|
1124 |
+
200
|
1125 |
+
1000
|
1126 |
+
0
|
1127 |
+
200
|
1128 |
+
400
|
1129 |
+
600
|
1130 |
+
800
|
1131 |
+
1000
|
1132 |
+
time
|
1133 |
+
time
|
1134 |
+
timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
1135 |
+
(DBACS)
|
1136 |
+
A PREPRINT
|
1137 |
+
Figure 9: Visualization of equipment matching: mapped source sensors vs. target sensors grouped into low,
|
1138 |
+
middle high label values. Graphical representation of 6 sensor signals. The plots show euclidean barycenter averages
|
1139 |
+
of signals. Groups are defined by their metrology values and plotted in different colors. The x axis shows the
|
1140 |
+
timestamps of the sensor signals, y axis the sensor measurement values. Selected target sensor measurements of
|
1141 |
+
samples corresponding to low label values - meaning values smaller 0.1 - are plotted in green, example target sensor
|
1142 |
+
measurements of samples corresponding to middle therefore preferred label values - meaning values around 0.5 - are
|
1143 |
+
plotted in black and example sensor measurements of samples corresponding to high label values - meaning values
|
1144 |
+
higher than 0.9 - are plotted in orange. Mapped sensor signals corresponding to source samples with middle label
|
1145 |
+
values are colored black. Sensor offsets for deviating metrology measurements are clearly visible from middle target as
|
1146 |
+
well as mapped middle source signals.
|
1147 |
+
N. Courty,
|
1148 |
+
R. Flamary,
|
1149 |
+
D. Tuia,
|
1150 |
+
and A. Rakotomamonjy.
|
1151 |
+
Optimal transport for domain adapta-
|
1152 |
+
tion.
|
1153 |
+
IEEE Transactions on Pattern Analysis and Machine Intelligence,
|
1154 |
+
39(9):1853–1865,
|
1155 |
+
2017.
|
1156 |
+
doi:https://doi.org/10.1109/TPAMI.2016.2615921.
|
1157 |
+
S.-K. S. Fan, C.-Y. Hsu, D.-M. Tsai, F. He, and C.-C. Cheng. Data-driven approach for fault detection and diagnostic in
|
1158 |
+
semiconductor manufacturing. IEEE Transactions on Automation Science and Engineering, 17(4):1925–1936, 2020.
|
1159 |
+
doi:https://doi.org/10.1109/TASE.2020.2983061.
|
1160 |
+
Z. Fang, J. Lu, F. Liu, and G. Zhang.
|
1161 |
+
Semi-supervised heterogeneous domain adaptation:
|
1162 |
+
Theory and
|
1163 |
+
algorithms.
|
1164 |
+
IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(1):1087–1105, 2022.
|
1165 |
+
doi:https://doi.org/10.1109/TPAMI.2022.3146234.
|
1166 |
+
H. S. Farahani, A. Fatehi, A. Nadali, and M. A. Shoorehdeli. A novel method for designing transferable soft sensors
|
1167 |
+
and its application. arXiv, 2020. doi:https://doi.org/10.48550/arxiv.2008.02186.
|
1168 |
+
J. Feng, X. Jia, F. Zhu, J. Moyne, J. Iskandar, and J. Lee. An online virtual metrology model with sample selection for the
|
1169 |
+
tracking of dynamic manufacturing processes with slow drift. IEEE Transactions on Semiconductor Manufacturing,
|
1170 |
+
32(4):574–582, 2019. doi:https://doi.org/10.1109/TSM.2019.2942768.
|
1171 |
+
B. Fernando, A. Habrard, M. Sebban, and T. Tuytelaars.
|
1172 |
+
Unsupervised visual domain adaptation using sub-
|
1173 |
+
space alignment.
|
1174 |
+
In 2013 IEEE International Conference on Computer Vision, pages 2960–2967, 2013.
|
1175 |
+
doi:https://doi.org/10.1109/ICCV.2013.368.
|
1176 |
+
Y. Ganin, E. Ustinova, H. Ajakan, P. Germain, H. Larochelle, F. Laviolette, M. Marchand, and V. Lempit-
|
1177 |
+
sky.
|
1178 |
+
Domain-adversarial training of neural networks.
|
1179 |
+
J. Mach. Learn. Res., 17(1):2096–2030, Jan. 2016.
|
1180 |
+
doi:https://doi.org/10.5555/2946645.2946704.
|
1181 |
+
N. Gentner, M. Carletti, A. Kyek, G. A. Susto, and Y. Yang. Enhancing scalability of virtual metrology: A deep
|
1182 |
+
learning-based approach for domain adaptation. In Proceedings of the 2020 Winter Simulation Conference, pages
|
1183 |
+
1898–1909, 2020. doi:https://doi.org/10.1109/WSC48552.2020.9383945.
|
1184 |
+
16
|
1185 |
+
|
1186 |
+
1.0
|
1187 |
+
1.0
|
1188 |
+
1.0
|
1189 |
+
low
|
1190 |
+
mapped middle
|
1191 |
+
middle
|
1192 |
+
0.8
|
1193 |
+
0.8
|
1194 |
+
0.8
|
1195 |
+
high
|
1196 |
+
0.6
|
1197 |
+
0.6
|
1198 |
+
0.6
|
1199 |
+
0.4
|
1200 |
+
0.4
|
1201 |
+
0.4
|
1202 |
+
0.2
|
1203 |
+
0.2
|
1204 |
+
0.2
|
1205 |
+
0.0 +
|
1206 |
+
0.0
|
1207 |
+
0.0 +
|
1208 |
+
0
|
1209 |
+
200
|
1210 |
+
400
|
1211 |
+
600
|
1212 |
+
800
|
1213 |
+
1000
|
1214 |
+
0
|
1215 |
+
200
|
1216 |
+
400
|
1217 |
+
600
|
1218 |
+
800
|
1219 |
+
1000
|
1220 |
+
0
|
1221 |
+
200
|
1222 |
+
400
|
1223 |
+
600
|
1224 |
+
800
|
1225 |
+
1000
|
1226 |
+
time
|
1227 |
+
time
|
1228 |
+
time
|
1229 |
+
1.0
|
1230 |
+
1.0
|
1231 |
+
1.0
|
1232 |
+
0.8
|
1233 |
+
0.8
|
1234 |
+
0.8
|
1235 |
+
value
|
1236 |
+
physical sensor value
|
1237 |
+
physical sensor
|
1238 |
+
0.6
|
1239 |
+
0.6
|
1240 |
+
0.6
|
1241 |
+
0.4
|
1242 |
+
0.4
|
1243 |
+
0.4
|
1244 |
+
0.2
|
1245 |
+
0.2
|
1246 |
+
0.2
|
1247 |
+
0.0
|
1248 |
+
0
|
1249 |
+
0
|
1250 |
+
200
|
1251 |
+
400
|
1252 |
+
600
|
1253 |
+
800
|
1254 |
+
1000
|
1255 |
+
0
|
1256 |
+
200
|
1257 |
+
400
|
1258 |
+
600
|
1259 |
+
800
|
1260 |
+
1000
|
1261 |
+
U
|
1262 |
+
200
|
1263 |
+
400
|
1264 |
+
600
|
1265 |
+
800
|
1266 |
+
1000
|
1267 |
+
time
|
1268 |
+
time
|
1269 |
+
timeHeterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
1270 |
+
(DBACS)
|
1271 |
+
A PREPRINT
|
1272 |
+
N. Gentner, M. Carletti, A. Kyek, G. A. Susto, and Y. Yang.
|
1273 |
+
Dbam: Making virtual metrology/soft sens-
|
1274 |
+
ing with time series data scalable through deep learning.
|
1275 |
+
Control Engineering Practice, 116:104914, 2021.
|
1276 |
+
doi:https://doi.org/10.1016/j.conengprac.2021.104914.
|
1277 |
+
I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. Courville. Improved training of wasserstein gans. In
|
1278 |
+
Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS’17, page
|
1279 |
+
5769–5779, Red Hook, NY, USA, 2017. Curran Associates Inc. doi:https://doi.org/10.48550/arxiv.1704.00028.
|
1280 |
+
D. R. Hardoon, S. Szedmak, and J. Shawe-Taylor. Canonical correlation analysis: An overview with application to
|
1281 |
+
learning methods. Neural Computation, 16(12):2639–2664, 2004. doi:https://doi.org/10.1162/0899766042321814.
|
1282 |
+
C. R. Harris, K. J. Millman, S. J. van der Walt, R. Gommers, P. Virtanen, D. Cournapeau, E. Wieser, J. Taylor, S. Berg,
|
1283 |
+
N. J. Smith, R. Kern, M. Picus, S. Hoyer, M. H. van Kerkwijk, M. Brett, A. Haldane, J. F. del Río, M. Wiebe,
|
1284 |
+
P. Peterson, P. Gérard-Marchant, K. Sheppard, T. Reddy, W. Weckesser, H. Abbasi, C. Gohlke, and T. E. Oliphant.
|
1285 |
+
Array programming with NumPy. Nature, 585(7825):357–362, Sept. 2020. doi:https://doi.org/10.1038/s41586-020-
|
1286 |
+
2649-2.
|
1287 |
+
H. Heng, T. Liao, S. Didari, and H. Rajagopal. Chamber matching with neural networks in semiconductor equipment
|
1288 |
+
tools. Applied Materials, Inc., US Patent 11,133,204, 2021.
|
1289 |
+
U. Hilleringmann. Silizium-Halbleitertechnologie. Springer, 1996.
|
1290 |
+
I. Jolliffe. Principal Component Analysis. Springer Series in Statistics. Springer New York, 2010. ISBN 9781441929990.
|
1291 |
+
S. Kang.
|
1292 |
+
On effectiveness of transfer learning approach for neural network-based virtual metrol-
|
1293 |
+
ogy
|
1294 |
+
modeling.
|
1295 |
+
IEEE
|
1296 |
+
Transactions
|
1297 |
+
on
|
1298 |
+
Semiconductor
|
1299 |
+
Manufacturing,
|
1300 |
+
31(1):149–155,
|
1301 |
+
2017.
|
1302 |
+
doi:https://doi.org/10.1109/TSM.2017.2787550.
|
1303 |
+
S. Kang, D. Kim, and S. Cho.
|
1304 |
+
Efficient feature selection-based on random forward search for vir-
|
1305 |
+
tual metrology modeling.
|
1306 |
+
IEEE Transactions on Semiconductor Manufacturing, 29(4):391–398, 2016.
|
1307 |
+
doi:https://doi.org/10.1109/TSM.2016.2594033.
|
1308 |
+
K. B. Lee and C. O. Kim.
|
1309 |
+
Recurrent feature-incorporated convolutional neural network for virtual metrology
|
1310 |
+
of the chemical mechanical planarization process.
|
1311 |
+
Journal of Intelligent Manufacturing, 31(1):73–86, 2020.
|
1312 |
+
doi:https://doi.org/10.1007/s10845-018-1437-4.
|
1313 |
+
B. Li, Y. Wang, S. Zhang, D. Li, T. Darrell, K. Keutzer, and H. Zhao. Learning invariant representations and risks for
|
1314 |
+
semi-supervised domain adaptation. arXiv, 2020. doi:https://doi.org/10.48550/arxiv.2010.04647.
|
1315 |
+
Y.-W. Lu, K.-L. Liu, and C.-Y. Hsu. Conditional generative adversarial network for defect classification with class
|
1316 |
+
imbalance. In 2019 IEEE International Conference on Smart Manufacturing, Industrial & Logistics Engineering
|
1317 |
+
(SMILE), pages 146–149, 2019. doi:https://doi.org/10.1109/SMILE45626.2019.8965320.
|
1318 |
+
S. Lynn, J. Ringwood, E. Ragnoli, S. McLoone, and N. MacGearailty. Virtual metrology for plasma etch using tool
|
1319 |
+
variables. In 2009 IEEE/SEMI Advanced Semiconductor Manufacturing Conference, pages 143–148. IEEE, 2009.
|
1320 |
+
doi:https://doi.org/10.1109/ASMC.2009.5155972.
|
1321 |
+
M. Maggipinto, C. Masiero, A. Beghi, and G. A. Susto. A convolutional autoencoder approach for feature extraction in
|
1322 |
+
virtual metrology. Procedia Manufacturing, 17:126–133, 2018. doi:https://doi.org/10.1016/j.promfg.2018.10.023.
|
1323 |
+
28th International Conference on Flexible Automation and Intelligent Manufacturing (FAIM2018), June 11-14, 2018,
|
1324 |
+
Columbus, OH, USAGlobal Integration of Intelligent Manufacturing and Smart Industry for Good of Humanity.
|
1325 |
+
M. Maggipinto, A. Beghi, S. McLoone, and G. A. Susto.
|
1326 |
+
Deepvm: A deep learning-based approach with au-
|
1327 |
+
tomatic feature extraction for 2d input data virtual metrology.
|
1328 |
+
Journal of Process Control, 84:24–34, 2019.
|
1329 |
+
doi:https://doi.org/10.1016/j.jprocont.2019.08.006.
|
1330 |
+
G. May and C. Spanos. Fundamentals of Semiconductor Manufacturing and Process Control. IEEE Press. John Wiley
|
1331 |
+
& Sons, 2006.
|
1332 |
+
C. Park and S. B. Kim. Virtual metrology modeling of time-dependent spectroscopic signals by a fused lasso algorithm.
|
1333 |
+
Journal of Process Control, 42:51–58, 2016. doi:https://doi.org/10.1016/j.jprocont.2016.04.002.
|
1334 |
+
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer,
|
1335 |
+
R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duches-
|
1336 |
+
nay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830, 2011.
|
1337 |
+
doi:https://doi.org/10.5555/1953048.2078195.
|
1338 |
+
R. Perry, G. Mischler, R. Guo, T. Lee, A. Chang, A. Koul, C. Franz, H. Richard, I. Carmichael, P. Ablin, A. Gramfort,
|
1339 |
+
and J. T. Vogelstein. mvlearn: Multiview machine learning in python. Journal of Machine Learning Research, 22
|
1340 |
+
(109):1–7, 2021. doi:https://doi.org/10.5555/3546258.3546367.
|
1341 |
+
17
|
1342 |
+
|
1343 |
+
Heterogeneous Domain Adaptation and Equipment Matching: DANN-based Alignment with Cyclic Supervision
|
1344 |
+
(DBACS)
|
1345 |
+
A PREPRINT
|
1346 |
+
Y. Saeys, I. Inza, and P. Larrañaga. A review of feature selection techniques in bioinformatics. Bioinformatics (Oxford,
|
1347 |
+
England), 23(19):2507–2517, 08 2007. doi:https://doi.org/10.1093/bioinformatics/btm344.
|
1348 |
+
J. Shim and S. Kang. Domain-adaptive active learning for cost-effective virtual metrology modeling. Computers in
|
1349 |
+
Industry, 135, 2022. doi:https://doi.org/10.1016/j.compind.2021.103572.
|
1350 |
+
A.-J. Su, J.-C. Jeng, H.-P. Huang, C.-C. Yu, S.-Y. Hung, and C.-K. Chao. Control relevant issues in semiconduc-
|
1351 |
+
tor manufacturing: Overview with some new results. Control Engineering Practice, 15(10):1268–1279, 2007.
|
1352 |
+
doi:https://doi.org/10.1016/j.conengprac.2006.11.003. Special Issue - International Symposium on Advanced Control
|
1353 |
+
of Chemical Processes (ADCHEM).
|
1354 |
+
B. Sun, J. Feng, and K. Saenko. Return of frustratingly easy domain adaptation. In Proceedings of the AAAI Conference
|
1355 |
+
on Artificial Intelligence, volume 30, 2016. doi:https://doi.org/10.5555/3016100.3016186.
|
1356 |
+
S. Sun.
|
1357 |
+
A survey of multi-view machine learning.
|
1358 |
+
Neural Computing and Applications, 23, 12 2013.
|
1359 |
+
doi:https://doi.org/10.1007/s00521-013-1362-6.
|
1360 |
+
G.
|
1361 |
+
A.
|
1362 |
+
Susto
|
1363 |
+
and
|
1364 |
+
A.
|
1365 |
+
Beghi.
|
1366 |
+
Least
|
1367 |
+
angle
|
1368 |
+
regression
|
1369 |
+
for
|
1370 |
+
semiconductor
|
1371 |
+
manufacturing
|
1372 |
+
modeling.
|
1373 |
+
In
|
1374 |
+
2012
|
1375 |
+
IEEE
|
1376 |
+
International
|
1377 |
+
Conference
|
1378 |
+
on
|
1379 |
+
Control
|
1380 |
+
Applications,
|
1381 |
+
pages
|
1382 |
+
658–663.
|
1383 |
+
IEEE,
|
1384 |
+
2012.
|
1385 |
+
doi:https://doi.org/10.1109/CCA.2012.6402409.
|
1386 |
+
G. A. Susto, A. Schirru, S. Pampuri, S. McLoone, and A. Beghi.
|
1387 |
+
Machine learning for predictive mainte-
|
1388 |
+
nance: A multiple classifier approach.
|
1389 |
+
IEEE Transactions on Industrial Informatics, 11(3):812–820, 2015.
|
1390 |
+
doi:https://doi.org/10.1109/TII.2014.2349359.
|
1391 |
+
Y. Taigman, A. Polyak, and L. Wolf. Unsupervised cross-domain image generation. ArXiv, abs/1611.02200, 2017.
|
1392 |
+
doi:https://doi.org/10.48550/arxiv.1611.02200.
|
1393 |
+
Y.-H. H. Tsai, Y.-R. Yeh, and Y.-C. F. Wang. Heterogeneous domain adaptation with label and structure consistency. In
|
1394 |
+
2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2842–2846, 2016.
|
1395 |
+
doi:https://doi.org/10.1007/s11042-020-08731-x.
|
1396 |
+
T. Tsutsui and T. Matsuzawa.
|
1397 |
+
Virtual metrology model robustness against chamber condition varia-
|
1398 |
+
tion using deep learning.
|
1399 |
+
IEEE Transactions on Semiconductor Manufacturing, 32(4):428–433, 2019.
|
1400 |
+
doi:https://doi.org/10.1109/ISSM.2018.8651170.
|
1401 |
+
V. Vincent, M. Wannes, and D. Jesse. Transfer learning for anomaly detection through localized and unsupervised
|
1402 |
+
instance selection. Proceedings of the AAAI Conference on Artificial Intelligence, 34(04):6054–6061, Apr. 2020.
|
1403 |
+
doi:https://doi.org/10.1609/aaai.v34i04.6068.
|
1404 |
+
M. Wang and W. Deng.
|
1405 |
+
Deep visual domain adaptation: A survey.
|
1406 |
+
Neurocomputing, 312:135–153, 2018.
|
1407 |
+
doi:https://doi.org/10.1016/j.neucom.2018.05.083.
|
1408 |
+
Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli. Image quality assessment: from error visibility to structural similarity.
|
1409 |
+
IEEE Transactions on Image Processing, 13(4):600–612, 2004. doi:https://doi.org/10.1109/TIP.2003.819861.
|
1410 |
+
C.
|
1411 |
+
Xu,
|
1412 |
+
D.
|
1413 |
+
Tao,
|
1414 |
+
and
|
1415 |
+
C.
|
1416 |
+
Xu.
|
1417 |
+
A
|
1418 |
+
survey
|
1419 |
+
on
|
1420 |
+
multi-view
|
1421 |
+
learning.
|
1422 |
+
arXiv,
|
1423 |
+
2013.
|
1424 |
+
doi:https://doi.org/10.48550/ARXIV.1304.5634.
|
1425 |
+
X. Yan, S. Hu, Y. Mao, Y. Ye, and H. Yu. Deep multi-view learning methods: A review. Neurocomputing, 448:106–129,
|
1426 |
+
2021. doi:https://doi.org/10.1016/j.neucom.2021.03.090.
|
1427 |
+
S. Yang, G. Song, Y. Jin, and L. Du. Domain adaptive classification on heterogeneous information networks. In
|
1428 |
+
C. Bessiere, editor, Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence,
|
1429 |
+
IJCAI-20, pages 1410–1416. International Joint Conferences on Artificial Intelligence Organization, 7 2020.
|
1430 |
+
doi:https://doi.org/10.5555/3491440.3491636.
|
1431 |
+
Q. Yu, L. Li, H. Zhao, Y. Liu, and K.-Y. Lin. Evaluation system and correlation analysis for determining the
|
1432 |
+
performance of a semiconductor manufacturing system. Complex System Modeling and Simulation, 1(3):218–231,
|
1433 |
+
2021. doi:https://doi.org/10.23919/CSMS.2021.0015.
|
1434 |
+
J.-Y. Zhu, T. Park, P. Isola, and A. A. Efros. Unpaired image-to-image translation using cycle-consistent adver-
|
1435 |
+
sarial networks. In 2017 IEEE International Conference on Computer Vision (ICCV), pages 2242–2251, 2017.
|
1436 |
+
doi:10.1109/ICCV.2017.244.
|
1437 |
+
18
|
1438 |
+
|
E9AzT4oBgHgl3EQfG_uu/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
E9E0T4oBgHgl3EQfQwCg/content/2301.02198v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e1efc988f5e0ebd48e7e573ccd598491f7741d6fc6cd3a74b99c41f60989b493
|
3 |
+
size 4455192
|
E9E0T4oBgHgl3EQfQwCg/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3f0751cdd39d7ac738ba34b192cfa13466685787a4227f63bb087fb492432fe0
|
3 |
+
size 4915245
|
FdAyT4oBgHgl3EQfe_hY/content/tmp_files/2301.00331v1.pdf.txt
ADDED
@@ -0,0 +1,2743 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.00331v1 [math.AG] 1 Jan 2023
|
2 |
+
Optimality of Curtiss Bound on
|
3 |
+
Poincare Multiplier for
|
4 |
+
Positive Univariate Polynomials
|
5 |
+
Hoon Hong and Brittany Riggs
|
6 |
+
December 31 2022
|
7 |
+
Abstract
|
8 |
+
Let f be a monic univariate polynomial with non-zero constant term. We say that f is positive if
|
9 |
+
f(x) is positive over all x ≥ 0. If all the coefficients of f are non-negative, then f is trivially positive.
|
10 |
+
In 1888, Poincar´e proved thatf is positive if and only if there exists a monic polynomial g such that all
|
11 |
+
the coefficients of gf are non-negative. Such polynomial g is called a Poincar´e multiplier for the positive
|
12 |
+
polynomial f. Of course one hopes to find a multiplier with smallest degree. This naturally raised a
|
13 |
+
challenge: find an upper bound on the smallest degree of multipliers. In 1918, Curtiss provided such a
|
14 |
+
bound. Curtiss also showed that the bound is optimal (smallest) when degree of f is 1 or 2. It is easy to
|
15 |
+
show that the bound is not optimal when degree of f is higher. The Curtiss bound is a simple expression
|
16 |
+
that depends only on the angle (argument) of non-real roots of f. In this paper, we show that the Curtiss
|
17 |
+
bound is optimal among all the bounds that depends only on the angles.
|
18 |
+
1
|
19 |
+
Introduction
|
20 |
+
Let f be a monic univariate polynomial with non-zero constant term. We say that f is positive if f(x) is
|
21 |
+
positive over all x ≥ 0. Consider the following small (toy) examples,
|
22 |
+
• f1 = x4 + x3 + 10x2 + 2x + 10
|
23 |
+
• f2 = x4 − x3 − 10x2 − 2x + 10
|
24 |
+
• f3 = x4 − x3 + 10x2 − 2x + 10
|
25 |
+
Note that all the coefficients of f1 are non-negative. Thus it is trivial to see that f1 is positive. However f2
|
26 |
+
and f3 have non-negative coefficients, and thus it is not obvious whether they are positive or not. It turns
|
27 |
+
out that f2 is not positive and f3 is positive.
|
28 |
+
In 1888, Poincar´e [5] proved a general result that implies the following specific claim: f is positive if
|
29 |
+
and only if there exists a monic polynomial g such that all the coefficients of gf are non-negative. Such
|
30 |
+
polynomial g is called a Poincar´e multiplier for the positive polynomial f. For the above examples, we have
|
31 |
+
• Since f2 is not positive, there is no a Poincar´e multiplier for f2.
|
32 |
+
• Since f3 is positive, there is a Poincar´e multiplier for f3. For instance, let g = x + 1. Then
|
33 |
+
gf3 = (x + 1)
|
34 |
+
�
|
35 |
+
x4 − x3 + 10x2 − 2x + 10
|
36 |
+
�
|
37 |
+
= x5 + 9x3 + 8x2 + 8x + 10
|
38 |
+
Note that all the coefficients of gf3 are non-negative.
|
39 |
+
1
|
40 |
+
|
41 |
+
Note that there are (infinitely) many Poincar´e multipliers for f3. For instance, let g = x2 + x + 1. Then
|
42 |
+
gf3 =
|
43 |
+
�
|
44 |
+
x2 + x + 1
|
45 |
+
� �
|
46 |
+
x4 − x3 + 10x2 − 2x + 10
|
47 |
+
�
|
48 |
+
= x6 + 10x4 + 7x3 + 18x2 + 8x + 10
|
49 |
+
Note that all the coefficients of gf3 are again non-negative. Of course one hopes to find a Poincar´e multiplier
|
50 |
+
with optimal (smallest) degree. It turns out that the smallest degree for Poincar´e multipliers for f3 is 1.
|
51 |
+
This naturally raised a challenge: find an upper bound on the smallest degree of multipliers.
|
52 |
+
In 1918, Curtiss [3] provided such a bound (See Theorem 1). Curtiss also showed that the bound is
|
53 |
+
optimal when degree of f
|
54 |
+
is 1 or 2. It is easy to show that the bound is not optimal when degree of f is
|
55 |
+
higher. For example, the Curtiss bound for f3 is 2, which is bigger than the optimal degree which is 1.
|
56 |
+
It seems that Curtiss bound was forgotten for almost a century. In 2010 Avenda˜no [1] (see Lemma 2.1),
|
57 |
+
evidently not informed of the Curtiss bound, derived another bound implicitly. Its derivation is very elegant
|
58 |
+
and short, but it turns out that the implied bound is roughly twice the Curtiss bound.
|
59 |
+
Boththe Curtiss bound and Avenda˜no bound depend only on the angles (arguments) of non-real roots of
|
60 |
+
f. The main contribution of this paper is to show that the Curtiss bound is optimal among all the bounds
|
61 |
+
that depends only on the angles of the non-real roots (see Theorem 2).
|
62 |
+
2
|
63 |
+
Main Result
|
64 |
+
Let f ∈ R [x] be monic such that ∀
|
65 |
+
x≥0f (x) > 0, that is, f does not have any non-negative real root.
|
66 |
+
Definition 1 (Optimal Bound) The optimal degree for f, written as opt (f), is defined by
|
67 |
+
opt (f) =
|
68 |
+
min
|
69 |
+
g∈R[x]\0
|
70 |
+
coeff(gf)≥0
|
71 |
+
deg(g)
|
72 |
+
Theorem 1 (Curtiss Bound 1918[3]) Let r1e±iθ1, . . . , rme±iθm be the non-real roots of f where multiple
|
73 |
+
roots are repeated. Let
|
74 |
+
b (f) =
|
75 |
+
m
|
76 |
+
�
|
77 |
+
i=1
|
78 |
+
�� π
|
79 |
+
θi
|
80 |
+
�
|
81 |
+
− 2
|
82 |
+
�
|
83 |
+
Then opt (f) ≤ b (f) and the equality holds if deg f ≤ 2.
|
84 |
+
Theorem 2 (Main Result: Angle-Based Optimality of Curtiss Bound) We have
|
85 |
+
∀
|
86 |
+
θ1,...,θm∈(0,π)
|
87 |
+
∃
|
88 |
+
p1,...,pt>0
|
89 |
+
∃
|
90 |
+
r1,...,rm>0 opt (f) = b (f)
|
91 |
+
3
|
92 |
+
Proof of Curtiss Bound (Theorem 1)
|
93 |
+
In this section, we will provide an alternative proof for Curtiss’ theorem (Theorem 1). This alternative proof
|
94 |
+
will be based on a new proof strategy that will be found crucial for proving our main result (Theorem 2).
|
95 |
+
Let f ∈ R [x] be monic without losing generality. Assume that f does not have any non-negative real roots.
|
96 |
+
The problem is to find non-zero g ∈ R [x] such that coeffs (gf) ≥ 0. We will reduce the problem to that of
|
97 |
+
linear algebra. Let
|
98 |
+
f = anxn + · · · + a0x0
|
99 |
+
g = bsxs + · · · + b0x0
|
100 |
+
where an = 1 and bs = 1. We first rewrite them using vectors. Let
|
101 |
+
a =
|
102 |
+
�
|
103 |
+
a0
|
104 |
+
· · ·
|
105 |
+
an
|
106 |
+
�
|
107 |
+
b =
|
108 |
+
�
|
109 |
+
b0
|
110 |
+
· · ·
|
111 |
+
bs
|
112 |
+
�
|
113 |
+
2
|
114 |
+
|
115 |
+
and let
|
116 |
+
xk =
|
117 |
+
|
118 |
+
|
119 |
+
x0
|
120 |
+
...
|
121 |
+
xk
|
122 |
+
|
123 |
+
|
124 |
+
Then we can write f and g compactly as
|
125 |
+
f = axn
|
126 |
+
g = bxs
|
127 |
+
Let
|
128 |
+
As =
|
129 |
+
|
130 |
+
|
131 |
+
a0
|
132 |
+
· · ·
|
133 |
+
· · ·
|
134 |
+
an
|
135 |
+
...
|
136 |
+
...
|
137 |
+
a0
|
138 |
+
· · ·
|
139 |
+
· · ·
|
140 |
+
an
|
141 |
+
|
142 |
+
∈ R(s+1)×(s+n+1)
|
143 |
+
Lemma 3 coeffs (gf) = bAs
|
144 |
+
Proof: Note
|
145 |
+
gf = (bxs) (axn)
|
146 |
+
= b (xsaxn)
|
147 |
+
= b
|
148 |
+
|
149 |
+
|
150 |
+
x0
|
151 |
+
...
|
152 |
+
xs
|
153 |
+
|
154 |
+
|
155 |
+
�
|
156 |
+
a0
|
157 |
+
· · ·
|
158 |
+
an
|
159 |
+
�
|
160 |
+
|
161 |
+
|
162 |
+
x0
|
163 |
+
...
|
164 |
+
xn
|
165 |
+
|
166 |
+
|
167 |
+
= b
|
168 |
+
|
169 |
+
|
170 |
+
a0
|
171 |
+
· · ·
|
172 |
+
· · ·
|
173 |
+
an
|
174 |
+
...
|
175 |
+
...
|
176 |
+
a0
|
177 |
+
· · ·
|
178 |
+
· · ·
|
179 |
+
an
|
180 |
+
|
181 |
+
|
182 |
+
|
183 |
+
|
184 |
+
x0
|
185 |
+
...
|
186 |
+
xs+n
|
187 |
+
|
188 |
+
|
189 |
+
= bAsxs+n
|
190 |
+
Hence coeffs (gf) = bAs. □
|
191 |
+
We partition As into two submatrices as As = [Ls|Rs] where
|
192 |
+
Ls =
|
193 |
+
|
194 |
+
|
195 |
+
a0
|
196 |
+
· · ·
|
197 |
+
an−1
|
198 |
+
...
|
199 |
+
...
|
200 |
+
a0
|
201 |
+
|
202 |
+
|
203 |
+
∈ R(s+1)×n
|
204 |
+
and Rs =
|
205 |
+
|
206 |
+
|
207 |
+
an
|
208 |
+
...
|
209 |
+
...
|
210 |
+
...
|
211 |
+
...
|
212 |
+
a0
|
213 |
+
...
|
214 |
+
...
|
215 |
+
...
|
216 |
+
a0
|
217 |
+
· · ·
|
218 |
+
· · ·
|
219 |
+
an
|
220 |
+
|
221 |
+
|
222 |
+
∈ R(s+1)×(s+1)
|
223 |
+
Let
|
224 |
+
c = bRs
|
225 |
+
∈ R1×(s+1)
|
226 |
+
Ts = R−1
|
227 |
+
s Ls
|
228 |
+
∈ R(s+1)×n
|
229 |
+
Lemma 4 coeffs (gf) = c [Ts|I]
|
230 |
+
3
|
231 |
+
|
232 |
+
Proof: Note
|
233 |
+
bAs = b
|
234 |
+
�
|
235 |
+
RsR−1
|
236 |
+
s
|
237 |
+
�
|
238 |
+
As
|
239 |
+
= (bRs)
|
240 |
+
�
|
241 |
+
R−1
|
242 |
+
s As
|
243 |
+
�
|
244 |
+
= (bRs)
|
245 |
+
�
|
246 |
+
R−1
|
247 |
+
s
|
248 |
+
[Ls|Rs]
|
249 |
+
�
|
250 |
+
= (bRs)
|
251 |
+
�
|
252 |
+
R−1
|
253 |
+
s Ls|R−1
|
254 |
+
s Rs
|
255 |
+
�
|
256 |
+
= (bRs)
|
257 |
+
�
|
258 |
+
R−1
|
259 |
+
s Ls|I
|
260 |
+
�
|
261 |
+
= c [Ts|I]
|
262 |
+
where c = bRs
|
263 |
+
and Ts = R−1
|
264 |
+
s Ls
|
265 |
+
□
|
266 |
+
Lemma 5 We have
|
267 |
+
∃
|
268 |
+
g̸=0, deg(g)≤s coeffs (gf) ≥ 0
|
269 |
+
⇐⇒
|
270 |
+
ConvexHull (Ts) ∩ Rn
|
271 |
+
≥0 ̸= ∅
|
272 |
+
where Ts is a viewed as a set of row vectors.
|
273 |
+
Proof: Note
|
274 |
+
∃
|
275 |
+
g̸=0, deg(g)≤s coeffs (gf) ≥ 0
|
276 |
+
⇐⇒
|
277 |
+
∃
|
278 |
+
c̸=0 c [Ts|I] ≥ 0
|
279 |
+
(from Lemma 4)
|
280 |
+
⇐⇒
|
281 |
+
∃
|
282 |
+
c̸=0 cTs ≥ 0 and c ≥ 0
|
283 |
+
⇐⇒
|
284 |
+
∃
|
285 |
+
c≥0, c̸=0 cTs ≥ 0
|
286 |
+
⇐⇒
|
287 |
+
∃
|
288 |
+
c≥0, c0+···+cs=1 cTs ≥ 0
|
289 |
+
⇐⇒
|
290 |
+
ConvexHull (Ts) ∩ Rn
|
291 |
+
≥0 ̸= ∅
|
292 |
+
□
|
293 |
+
Let
|
294 |
+
f = an
|
295 |
+
n
|
296 |
+
�
|
297 |
+
i=1
|
298 |
+
(x − αi)
|
299 |
+
Lemma 6 The entries of Ts are given by
|
300 |
+
Tskℓ = −|N|
|
301 |
+
|D|
|
302 |
+
where
|
303 |
+
D =
|
304 |
+
|
305 |
+
|
306 |
+
α0
|
307 |
+
1
|
308 |
+
· · ·
|
309 |
+
α0
|
310 |
+
n
|
311 |
+
...
|
312 |
+
...
|
313 |
+
αn−1
|
314 |
+
1
|
315 |
+
· · ·
|
316 |
+
αn−1
|
317 |
+
n
|
318 |
+
|
319 |
+
|
320 |
+
and N is obtained from D by replacing the ℓ-th row with
|
321 |
+
�
|
322 |
+
αk+n
|
323 |
+
1
|
324 |
+
· · ·
|
325 |
+
αk+n
|
326 |
+
n
|
327 |
+
�
|
328 |
+
.
|
329 |
+
Proof: Note
|
330 |
+
xsf = Asxs+n
|
331 |
+
4
|
332 |
+
|
333 |
+
= RsR−1
|
334 |
+
s Asxs+n
|
335 |
+
= RsR−1
|
336 |
+
s
|
337 |
+
[Ls|Rs] xs+n
|
338 |
+
= Rs
|
339 |
+
�
|
340 |
+
R−1
|
341 |
+
s Ls|R−1
|
342 |
+
s Rs
|
343 |
+
�
|
344 |
+
xs+n
|
345 |
+
= Rs [Ts|I] xs+n
|
346 |
+
= Rs
|
347 |
+
|
348 |
+
|
349 |
+
|
350 |
+
Ts
|
351 |
+
|
352 |
+
|
353 |
+
x0
|
354 |
+
...
|
355 |
+
xn−1
|
356 |
+
|
357 |
+
+
|
358 |
+
|
359 |
+
|
360 |
+
xn
|
361 |
+
...
|
362 |
+
xs+n
|
363 |
+
|
364 |
+
|
365 |
+
|
366 |
+
|
367 |
+
|
368 |
+
|
369 |
+
By evaluating the above on each root, we have
|
370 |
+
|
371 |
+
|
372 |
+
α0
|
373 |
+
i
|
374 |
+
...
|
375 |
+
αs
|
376 |
+
i
|
377 |
+
|
378 |
+
f (αi) = Rs
|
379 |
+
|
380 |
+
|
381 |
+
|
382 |
+
Ts
|
383 |
+
|
384 |
+
|
385 |
+
α0
|
386 |
+
i
|
387 |
+
...
|
388 |
+
αn−1
|
389 |
+
i
|
390 |
+
|
391 |
+
+
|
392 |
+
|
393 |
+
|
394 |
+
αn
|
395 |
+
i
|
396 |
+
...
|
397 |
+
αs+n
|
398 |
+
i
|
399 |
+
|
400 |
+
|
401 |
+
|
402 |
+
|
403 |
+
|
404 |
+
|
405 |
+
Since f (αi) = 0, we have
|
406 |
+
0 = Rs
|
407 |
+
|
408 |
+
|
409 |
+
|
410 |
+
Ts
|
411 |
+
|
412 |
+
|
413 |
+
α0
|
414 |
+
i
|
415 |
+
...
|
416 |
+
αn−1
|
417 |
+
i
|
418 |
+
|
419 |
+
+
|
420 |
+
|
421 |
+
|
422 |
+
αn
|
423 |
+
i
|
424 |
+
...
|
425 |
+
αs+n
|
426 |
+
i
|
427 |
+
|
428 |
+
|
429 |
+
|
430 |
+
|
431 |
+
|
432 |
+
|
433 |
+
Since Rs is an invertible matrix, we have
|
434 |
+
0 = Ts
|
435 |
+
|
436 |
+
|
437 |
+
α0
|
438 |
+
i
|
439 |
+
α1
|
440 |
+
i
|
441 |
+
...
|
442 |
+
αn−1
|
443 |
+
i
|
444 |
+
|
445 |
+
|
446 |
+
+
|
447 |
+
|
448 |
+
|
449 |
+
αn
|
450 |
+
i
|
451 |
+
...
|
452 |
+
αs+n
|
453 |
+
i
|
454 |
+
|
455 |
+
|
456 |
+
Rearranging,
|
457 |
+
Ts
|
458 |
+
|
459 |
+
|
460 |
+
α0
|
461 |
+
i
|
462 |
+
α1
|
463 |
+
i
|
464 |
+
...
|
465 |
+
αn−1
|
466 |
+
i
|
467 |
+
|
468 |
+
|
469 |
+
= −
|
470 |
+
|
471 |
+
|
472 |
+
αn
|
473 |
+
i
|
474 |
+
...
|
475 |
+
αn+s
|
476 |
+
i
|
477 |
+
|
478 |
+
|
479 |
+
Combining the above equations for all the roots, we have
|
480 |
+
Ts
|
481 |
+
|
482 |
+
|
483 |
+
α0
|
484 |
+
1
|
485 |
+
· · ·
|
486 |
+
α0
|
487 |
+
n
|
488 |
+
...
|
489 |
+
...
|
490 |
+
αn−1
|
491 |
+
1
|
492 |
+
· · ·
|
493 |
+
αn−1
|
494 |
+
n
|
495 |
+
|
496 |
+
= −
|
497 |
+
|
498 |
+
|
499 |
+
αn
|
500 |
+
1
|
501 |
+
· · ·
|
502 |
+
αn
|
503 |
+
n
|
504 |
+
...
|
505 |
+
αs+n
|
506 |
+
1
|
507 |
+
· · ·
|
508 |
+
αs+n
|
509 |
+
n
|
510 |
+
|
511 |
+
|
512 |
+
By applying Cramer’s rule, we have
|
513 |
+
Tskℓ = −|N|
|
514 |
+
|D|
|
515 |
+
where
|
516 |
+
D =
|
517 |
+
|
518 |
+
|
519 |
+
α0
|
520 |
+
1
|
521 |
+
· · ·
|
522 |
+
α0
|
523 |
+
n
|
524 |
+
...
|
525 |
+
...
|
526 |
+
αn−1
|
527 |
+
1
|
528 |
+
· · ·
|
529 |
+
αn−1
|
530 |
+
n
|
531 |
+
|
532 |
+
|
533 |
+
and N is obtained from D by replacing the ℓ-th row with
|
534 |
+
�
|
535 |
+
αk+n
|
536 |
+
1
|
537 |
+
· · ·
|
538 |
+
αk+n
|
539 |
+
n
|
540 |
+
�
|
541 |
+
. □
|
542 |
+
5
|
543 |
+
|
544 |
+
Remark 7 Note that Tskℓ does not depend on s. Thus we will often write it as Tkℓ.
|
545 |
+
Lemma 8 Let f ∈ R[x] be such that deg(f) = 2 without real roots. Let the roots be α1 = reiθ and α2 = re−iθ.
|
546 |
+
Then we have
|
547 |
+
Tk0
|
548 |
+
=
|
549 |
+
+rk+2 sin (k + 1) θ
|
550 |
+
sin θ
|
551 |
+
=
|
552 |
+
r2 Im(αk+1
|
553 |
+
i
|
554 |
+
)
|
555 |
+
Im(αi)
|
556 |
+
Tk1
|
557 |
+
=
|
558 |
+
−rk+1 sin(k + 2)θ
|
559 |
+
sin θ
|
560 |
+
=
|
561 |
+
− Im(αk+2
|
562 |
+
i
|
563 |
+
)
|
564 |
+
Im(αi)
|
565 |
+
Proof: From Lemma 6 we have
|
566 |
+
Tk0
|
567 |
+
= −
|
568 |
+
�����
|
569 |
+
αk+2
|
570 |
+
1
|
571 |
+
αk+2
|
572 |
+
2
|
573 |
+
α1
|
574 |
+
1
|
575 |
+
α1
|
576 |
+
2
|
577 |
+
�����
|
578 |
+
�����
|
579 |
+
α0
|
580 |
+
1
|
581 |
+
α0
|
582 |
+
2
|
583 |
+
α1
|
584 |
+
1
|
585 |
+
α1
|
586 |
+
2
|
587 |
+
�����
|
588 |
+
= −αk+2
|
589 |
+
1
|
590 |
+
α2 − α1αk+2
|
591 |
+
2
|
592 |
+
α2 − α1
|
593 |
+
= −rk+2 +2i sin(k + 1) θ
|
594 |
+
−2i sinθ
|
595 |
+
= +rk+2 sin (k + 1) θ
|
596 |
+
sin θ
|
597 |
+
= r2 Im(αk+1
|
598 |
+
i
|
599 |
+
)
|
600 |
+
Im(αi)
|
601 |
+
Tk1
|
602 |
+
= −
|
603 |
+
�������
|
604 |
+
α0
|
605 |
+
1
|
606 |
+
α0
|
607 |
+
2
|
608 |
+
αk+2
|
609 |
+
1
|
610 |
+
αk+2
|
611 |
+
2
|
612 |
+
�������
|
613 |
+
�������
|
614 |
+
α0
|
615 |
+
1
|
616 |
+
α0
|
617 |
+
2
|
618 |
+
α1
|
619 |
+
1
|
620 |
+
α1
|
621 |
+
2
|
622 |
+
�������
|
623 |
+
= −αk+2
|
624 |
+
2
|
625 |
+
− αk+2
|
626 |
+
1
|
627 |
+
α2 − α1
|
628 |
+
= −rk+1 −2i sin(k + 2)θ
|
629 |
+
−2i sinθ
|
630 |
+
= −rk+1 sin(k + 2)θ
|
631 |
+
sin θ
|
632 |
+
= − Im(αk+2
|
633 |
+
i
|
634 |
+
)
|
635 |
+
Im(αi)
|
636 |
+
□
|
637 |
+
Lemma 9 Let f ∈ R[x] be such that deg(f) = 2 without real roots. Let α1 = reiθ and α2 = re−iθ be the
|
638 |
+
roots of f.
|
639 |
+
s =
|
640 |
+
�π
|
641 |
+
θ
|
642 |
+
�
|
643 |
+
− 2.
|
644 |
+
Then
|
645 |
+
∃
|
646 |
+
g̸=0, deg(g)≤s coe��s (gf) ≥ 0.
|
647 |
+
Proof: Note
|
648 |
+
∃
|
649 |
+
g̸=0, deg(g)≤s coeffs (gf) ≥ 0
|
650 |
+
⇐⇒
|
651 |
+
ConvexHull (Ts) ∩ Rn
|
652 |
+
≥0 ̸= ∅
|
653 |
+
(from Lemma 5)
|
654 |
+
⇐=
|
655 |
+
Ts0, Ts1 ≥ 0
|
656 |
+
⇐⇒
|
657 |
+
sin (s + 1) θ ≥ 0 ∧ sin (s + 2) θ ≤ 0 (from Lemma 8)
|
658 |
+
⇐=
|
659 |
+
0 < (s + 1)θ ≤ π ∧ π ≤ (s + 2)θ < 2π
|
660 |
+
⇐⇒
|
661 |
+
s ≤ π
|
662 |
+
θ − 1 ∧ s ≥ π
|
663 |
+
θ − 2
|
664 |
+
⇐⇒
|
665 |
+
π
|
666 |
+
θ − 2 ≤ s ≤ π
|
667 |
+
θ − 1
|
668 |
+
⇐=
|
669 |
+
s =
|
670 |
+
�π
|
671 |
+
θ
|
672 |
+
�
|
673 |
+
− 2
|
674 |
+
□
|
675 |
+
Proof: [Proof of Theorem 1]
|
676 |
+
6
|
677 |
+
|
678 |
+
1. Let f be quadratic with non-real roots re±iθ. Note that bc(f) is optimal for any f with π
|
679 |
+
2 ≤ θ < π
|
680 |
+
since bc(f) = 0. Let 0 < θ < π
|
681 |
+
2 . Let g be such that g ̸= 0 and deg(g) = v < s, where s = bc(f). Thus
|
682 |
+
k
|
683 |
+
≤ v
|
684 |
+
=⇒
|
685 |
+
k
|
686 |
+
< s
|
687 |
+
=⇒
|
688 |
+
k
|
689 |
+
<
|
690 |
+
�π
|
691 |
+
θ
|
692 |
+
�
|
693 |
+
− 2
|
694 |
+
=⇒
|
695 |
+
k
|
696 |
+
< π
|
697 |
+
θ − 2
|
698 |
+
(since k ≤
|
699 |
+
�π
|
700 |
+
θ
|
701 |
+
�
|
702 |
+
− 3)
|
703 |
+
=⇒
|
704 |
+
(k + 2)θ
|
705 |
+
< π
|
706 |
+
=⇒
|
707 |
+
sin(k + 2)θ
|
708 |
+
> 0
|
709 |
+
(since (k + 2)θ > 0)
|
710 |
+
=⇒
|
711 |
+
−rk+1 sin(k + 2)θ
|
712 |
+
sin θ
|
713 |
+
< 0
|
714 |
+
⇐⇒
|
715 |
+
Tvk1
|
716 |
+
< 0
|
717 |
+
⇐⇒
|
718 |
+
ConvexHull (Tv) ∩ R2
|
719 |
+
≥0
|
720 |
+
= ∅
|
721 |
+
⇐⇒
|
722 |
+
coeffs (gf)
|
723 |
+
< 0
|
724 |
+
(by Lemma 5)
|
725 |
+
Hence, opt(f) ̸< s. By Lemma 9, opt(f) = s.
|
726 |
+
2. Consider the factorization of f over R into linear and irreducible quadratic factors as follows.
|
727 |
+
f = (x + p1) · · · (x + pt)
|
728 |
+
�
|
729 |
+
x2 − 2r1 cos θ1x + r2
|
730 |
+
1
|
731 |
+
�
|
732 |
+
· · ·
|
733 |
+
�
|
734 |
+
x2 − 2rm cos θmx + r2
|
735 |
+
m
|
736 |
+
�
|
737 |
+
f = l1 · · · lt q1 · · · qm
|
738 |
+
where
|
739 |
+
li = x + pi
|
740 |
+
qi = x2 − 2ri cos θix + r2
|
741 |
+
i
|
742 |
+
where again −pi stand for negative real roots and ri (cos θi ± i sin θi) stand for the complex conjugate
|
743 |
+
root pairs. The coefficients of each li and qi with π
|
744 |
+
2 ≤ θi < π are non-negative. From Lemma 8, for those
|
745 |
+
qi with 0 < θi < π
|
746 |
+
2 , there exists non-zero gi ∈ R[x] such that coeffs (gi qi) ≥ 0 and deg(gi) =
|
747 |
+
� π
|
748 |
+
θi
|
749 |
+
�
|
750 |
+
− 2.
|
751 |
+
Let g = g1 · · · gm. Then coeffs (gf) ≥ 0 and deg(g) =
|
752 |
+
m
|
753 |
+
�
|
754 |
+
i=1
|
755 |
+
�� π
|
756 |
+
θi
|
757 |
+
�
|
758 |
+
− 2
|
759 |
+
�
|
760 |
+
= b(f). Hence we have
|
761 |
+
opt (f) ≤ b (f) .
|
762 |
+
□
|
763 |
+
4
|
764 |
+
Proof of Angle-Based Optimality (Theorem 2)
|
765 |
+
Let
|
766 |
+
f = fπ,p fφ,rφ fθ,rθ
|
767 |
+
fπ,p =
|
768 |
+
�
|
769 |
+
1≤i≤t
|
770 |
+
(x + pi) where pi > 0
|
771 |
+
fφ,rφ =
|
772 |
+
�
|
773 |
+
1≤i≤k
|
774 |
+
π
|
775 |
+
2 ≤φi<π
|
776 |
+
�
|
777 |
+
x2 − 2rφi cos φi x + r2
|
778 |
+
φi
|
779 |
+
�
|
780 |
+
where rφi > 0 and π > φ1 ≥ · · · ≥ φk ≥ π
|
781 |
+
2
|
782 |
+
7
|
783 |
+
|
784 |
+
fθ,rθ =
|
785 |
+
�
|
786 |
+
1≤i≤ℓ
|
787 |
+
0<θi< π
|
788 |
+
2
|
789 |
+
�
|
790 |
+
x2 − 2rθi cos θi x + r2
|
791 |
+
θi
|
792 |
+
�
|
793 |
+
where rθi > 0 and π
|
794 |
+
2 > θ1 ≥ · · · ≥ θℓ > 0
|
795 |
+
where k + ℓ = m (the number of complex root pairs of f) and 2m + t = n = deg(f).
|
796 |
+
Proof: [Proof of Theorem 2]
|
797 |
+
1. We need to show
|
798 |
+
∀
|
799 |
+
π>φ1≥···≥φk≥ π
|
800 |
+
2
|
801 |
+
∀
|
802 |
+
π
|
803 |
+
2 >θ1≥···≥θℓ>0
|
804 |
+
∃
|
805 |
+
p1,...,pt>0
|
806 |
+
∃
|
807 |
+
rφ1,...,rφk>0
|
808 |
+
∃
|
809 |
+
rθ1 ,...,rθℓ>0
|
810 |
+
opt (f) = b (f)
|
811 |
+
2. Let π > φ1 ≥ · · · ≥ φk ≥ π
|
812 |
+
2 and π
|
813 |
+
2 > θ1 ≥ · · · ≥ θℓ > 0 be arbitrary but fixed. We need to show
|
814 |
+
∃
|
815 |
+
p1,...,pt>0
|
816 |
+
∃
|
817 |
+
rφ1,...,rφk>0
|
818 |
+
∃
|
819 |
+
rθ1 ,...,rθℓ>0
|
820 |
+
opt (f) = b (f) .
|
821 |
+
We need to find a witness for p, rφ, rθ such that opt (f) = b (f).
|
822 |
+
3. We propose a witness candidate as follows.
|
823 |
+
(a) From Lemma 10, for the fixed θ, we have
|
824 |
+
∃
|
825 |
+
rθ1 ,...,rθℓ>0
|
826 |
+
opt (fθ,rθ) = b (fθ,rθ)
|
827 |
+
(1)
|
828 |
+
(b) From Lemma 15, for the fixed φ and θ, we have
|
829 |
+
∃
|
830 |
+
p1,...,pt>0
|
831 |
+
∃
|
832 |
+
rφ1 ,...,rφk>0
|
833 |
+
∀
|
834 |
+
rθ1 ,...,rθℓ>0
|
835 |
+
opt
|
836 |
+
�
|
837 |
+
fπ,p fφ,rφ fθ,rθ
|
838 |
+
�
|
839 |
+
= opt (fθ,rθ)
|
840 |
+
(2)
|
841 |
+
(c) We propose p, rφ, rθ appearing in the above two facts as a witness candidate.
|
842 |
+
4. We verify that the proposed candidate is indeed a witness, that is, opt (f) = b (f).
|
843 |
+
Note
|
844 |
+
opt (f) = opt
|
845 |
+
�
|
846 |
+
fπ,p fφ,rφ fθ,rθ
|
847 |
+
�
|
848 |
+
= opt (fθ,rθ)
|
849 |
+
by (2)
|
850 |
+
= b (fθ,rθ) by (1)
|
851 |
+
= b (fπ,p) + b
|
852 |
+
�
|
853 |
+
fφ,rφ
|
854 |
+
�
|
855 |
+
+ b (fθ,rθ) since b (fπ,p) = b
|
856 |
+
�
|
857 |
+
fφ,rφ
|
858 |
+
�
|
859 |
+
= 0
|
860 |
+
= b
|
861 |
+
�
|
862 |
+
fπ,p fφ,rφ fθ,rθ
|
863 |
+
�
|
864 |
+
= b (f)
|
865 |
+
□
|
866 |
+
5
|
867 |
+
Supporting Lemmas for Proof of Theorem 2
|
868 |
+
5.1
|
869 |
+
Concerning Irreducible Quadratic Factors with 0 < θ < π
|
870 |
+
2
|
871 |
+
Let
|
872 |
+
αi = rieiθi
|
873 |
+
for 1 ≤ i ≤ ℓ
|
874 |
+
8
|
875 |
+
|
876 |
+
αm+i = rie−iθi
|
877 |
+
for 1 ≤ i ≤ ℓ
|
878 |
+
ti = cos θi
|
879 |
+
f =
|
880 |
+
ℓ
|
881 |
+
�
|
882 |
+
i=1
|
883 |
+
�
|
884 |
+
x2 − 2ritix + r2
|
885 |
+
i
|
886 |
+
�
|
887 |
+
=
|
888 |
+
ℓ
|
889 |
+
�
|
890 |
+
i=1
|
891 |
+
(x − αi)(x − αℓ+i) =
|
892 |
+
2ℓ
|
893 |
+
�
|
894 |
+
i=0
|
895 |
+
aixi
|
896 |
+
s = b(f)
|
897 |
+
g = xs−1 + bs−2xs−2 + · · · + b1x + b0
|
898 |
+
ck = coeff(gf, xk)
|
899 |
+
Note that
|
900 |
+
1. ai = (−1)2ℓ−ie2ℓ−i (α1, . . . , α2ℓ) where ek (α1, . . . , α2ℓ) is the elementary symmetric polynomial of
|
901 |
+
degree k in the roots α1, . . . , α2ℓ. When ℓ = 0, we define e0 = 1.
|
902 |
+
2. ti > 0 since 0 < θi < π
|
903 |
+
2 .
|
904 |
+
Lemma 10
|
905 |
+
∀
|
906 |
+
ℓ≥0
|
907 |
+
∀
|
908 |
+
π
|
909 |
+
2 >θ1≥...≥θℓ>0
|
910 |
+
∃
|
911 |
+
rθ1,...,rθℓ>0 opt (fθ,rθ) = b (fθ,rθ)
|
912 |
+
Proof: We need to prove the following claim for every ℓ ≥ 0.
|
913 |
+
∀
|
914 |
+
π
|
915 |
+
2 >θ1≥...≥θℓ>0
|
916 |
+
∃
|
917 |
+
rθ1 ,...,rθℓ>0 opt (fθ,rθ) = s
|
918 |
+
By Lemma 11, it suffices to show
|
919 |
+
∀
|
920 |
+
π
|
921 |
+
2 >θ1≥...≥θℓ>0
|
922 |
+
∃
|
923 |
+
rθ1 ,...,rθℓ>0
|
924 |
+
∀
|
925 |
+
g∈R[x]
|
926 |
+
deg(g)=s−1
|
927 |
+
∃
|
928 |
+
0≤k≤2ℓ+s−1 ck < 0
|
929 |
+
⇐⇒
|
930 |
+
∀
|
931 |
+
0<t1≤···≤tℓ<1
|
932 |
+
∃
|
933 |
+
rθ1 ,...,rθℓ>0 ∀
|
934 |
+
b
|
935 |
+
�
|
936 |
+
0≤k≤2ℓ+s−1
|
937 |
+
ck < 0
|
938 |
+
⇐⇒
|
939 |
+
∀
|
940 |
+
0<t1≤···≤tℓ<1
|
941 |
+
∃
|
942 |
+
rθ1 ,...,rθℓ>0 ∀
|
943 |
+
b
|
944 |
+
�
|
945 |
+
0≤k≤2ℓ+s−2
|
946 |
+
ck < 0
|
947 |
+
(since the leading coefficient bs−1 = 1)
|
948 |
+
1. Case 1: ℓ = 0
|
949 |
+
Here, f = 1. The claim is trivially true since opt (fθ,rθ) = b (fθ,rθ) = 0.
|
950 |
+
2. Case 2: ℓ = 1
|
951 |
+
Immediate from Remark ??.
|
952 |
+
3. Case 3: ℓ = 2
|
953 |
+
Immediate from Lemma 12.
|
954 |
+
4. Case 3: ℓ ≥ 3
|
955 |
+
Immediate from Lemma 13.
|
956 |
+
□
|
957 |
+
Lemma 11
|
958 |
+
∄
|
959 |
+
g, deg(g)=s ∀
|
960 |
+
k ck ≥ 0
|
961 |
+
=⇒
|
962 |
+
∄
|
963 |
+
g, deg(g)<s ∀
|
964 |
+
k ck ≥ 0
|
965 |
+
Proof: We will prove via the contrapositive:
|
966 |
+
∃
|
967 |
+
g, deg(g)<s ∀
|
968 |
+
k ck ≥ 0
|
969 |
+
=⇒
|
970 |
+
∃
|
971 |
+
g, deg(g)=s ∀
|
972 |
+
k ck ≥ 0
|
973 |
+
9
|
974 |
+
|
975 |
+
1. Assume
|
976 |
+
∃
|
977 |
+
g, deg(g)<s
|
978 |
+
∀
|
979 |
+
k
|
980 |
+
ck ≥ 0.
|
981 |
+
Then there exists a g with deg(g) = t < s such that gf has all
|
982 |
+
non-negative coefficients. Let u = s − t.
|
983 |
+
2. Consider the multiplier xu g. Note that xu gf = xu(gf) must have all non-negative coefficients and
|
984 |
+
deg(xu g) = u + t = s.
|
985 |
+
3. Then there exists a multiplier, xu g with degree equal to s such that the product has all non-negative
|
986 |
+
coefficients.
|
987 |
+
4. Hence we have
|
988 |
+
∃
|
989 |
+
g, deg(g)<s ∀
|
990 |
+
k ck ≥ 0
|
991 |
+
=⇒
|
992 |
+
∃
|
993 |
+
g, deg(g)=s ∀
|
994 |
+
k ck ≥ 0
|
995 |
+
□
|
996 |
+
Lemma 12 For ℓ = 2,
|
997 |
+
∀
|
998 |
+
0<t1≤t2<1
|
999 |
+
∃
|
1000 |
+
r1,r2>0 ∀
|
1001 |
+
b
|
1002 |
+
�
|
1003 |
+
0≤k≤2ℓ+s−2
|
1004 |
+
ck < 0
|
1005 |
+
Proof: We will prove the following stronger statement.
|
1006 |
+
∀
|
1007 |
+
0<t1≤t2<1
|
1008 |
+
∃
|
1009 |
+
r1,r2>0 ∀
|
1010 |
+
b
|
1011 |
+
�
|
1012 |
+
k∈{s−2,s−1, 2ℓ+s−3, 2ℓ+s−2}
|
1013 |
+
ck < 0.
|
1014 |
+
1. Let t1, t2 be such that 0 < t1 ≤ t2 < 1. Let r1 > 0.
|
1015 |
+
2. Note
|
1016 |
+
cs−2 = a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + a4bs−6
|
1017 |
+
= a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + bs−6
|
1018 |
+
cs−1 = a0bs−1 + a1bs−2 + a2bs−3 + a3bs−4 + a4bs−5
|
1019 |
+
= a0 + a1bs−2 + a2bs−3 + a3bs−4 + bs−5
|
1020 |
+
c2ℓ+s−3 = a2bs−1 + a3bs−2 + a4bs−3
|
1021 |
+
= a2 + a3bs−2 + bs−3
|
1022 |
+
c2ℓ+s−2 = a3bs−1 + a4bs−2
|
1023 |
+
= a3 + bs−2
|
1024 |
+
(a) Note that coeff(gf, xk) =
|
1025 |
+
�
|
1026 |
+
i+j=k
|
1027 |
+
aibj =
|
1028 |
+
k
|
1029 |
+
�
|
1030 |
+
i=0
|
1031 |
+
aibk−i for 0 ≤ k ≤ 2ℓ + s − 1.
|
1032 |
+
Recall from Lemma 3 for 0 ≤ i ≤ 2ℓ and 0 ≤ j ≤ s − 1
|
1033 |
+
coeffs(gf) =
|
1034 |
+
�
|
1035 |
+
b0
|
1036 |
+
· · ·
|
1037 |
+
bs−1
|
1038 |
+
�
|
1039 |
+
|
1040 |
+
|
1041 |
+
a0
|
1042 |
+
· · ·
|
1043 |
+
· · ·
|
1044 |
+
a2ℓ
|
1045 |
+
...
|
1046 |
+
...
|
1047 |
+
a0
|
1048 |
+
· · ·
|
1049 |
+
· · ·
|
1050 |
+
a2ℓ
|
1051 |
+
|
1052 |
+
|
1053 |
+
Then
|
1054 |
+
coeff(gf, xk) =
|
1055 |
+
�
|
1056 |
+
i+j=k
|
1057 |
+
aibj
|
1058 |
+
10
|
1059 |
+
|
1060 |
+
(b) Then
|
1061 |
+
cs−2 =
|
1062 |
+
�
|
1063 |
+
i+j=s−2
|
1064 |
+
aibj
|
1065 |
+
= a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + a4bs−6
|
1066 |
+
= a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + bs−6
|
1067 |
+
since a4 = 1
|
1068 |
+
cs−1 =
|
1069 |
+
�
|
1070 |
+
i+j=s−1
|
1071 |
+
aibj
|
1072 |
+
= a0bs−1 + a1bs−2 + a2bs−3 + a3bs−4 + a4bs−5
|
1073 |
+
= a0 + a1bs−2 + a2bs−3 + a3bs−4 + bs−5
|
1074 |
+
since a4 = bs−1 = 1
|
1075 |
+
c2ℓ+s−3 =
|
1076 |
+
�
|
1077 |
+
i+j=2ℓ+s−3
|
1078 |
+
aibj =
|
1079 |
+
�
|
1080 |
+
i+j=s+1
|
1081 |
+
aibj
|
1082 |
+
= a2bs−1 + a3bs−2 + a4bs−3
|
1083 |
+
= a2 + a3bs−2 + bs−3
|
1084 |
+
since a4 = bs−1 = 1
|
1085 |
+
c2ℓ+s−2 =
|
1086 |
+
�
|
1087 |
+
i+j=2ℓ+s−2
|
1088 |
+
aibj =
|
1089 |
+
�
|
1090 |
+
i+j=s+2
|
1091 |
+
aibj
|
1092 |
+
= a3bs−1 + a4bs−2
|
1093 |
+
= a3 + bs−2
|
1094 |
+
since a4 = bs−1 = 1
|
1095 |
+
3. Claim 1: When s = 2,
|
1096 |
+
∃
|
1097 |
+
r(1)
|
1098 |
+
2
|
1099 |
+
>0
|
1100 |
+
∀
|
1101 |
+
r2≥r(1)
|
1102 |
+
2
|
1103 |
+
∀
|
1104 |
+
b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0.
|
1105 |
+
(a) Note
|
1106 |
+
cs−1 = a0 + a1b0
|
1107 |
+
c2ℓ+s−2 = a3 + b0
|
1108 |
+
(b) We have
|
1109 |
+
cs−1 < 0
|
1110 |
+
⇐⇒
|
1111 |
+
b0 > −a0
|
1112 |
+
a1
|
1113 |
+
⇐⇒
|
1114 |
+
b0 > e4(α1, α2, α3, α4)
|
1115 |
+
e3(α1, α2, α3, α4)
|
1116 |
+
⇐⇒
|
1117 |
+
b0 >
|
1118 |
+
r1r2
|
1119 |
+
2r2t1 + 2r1t2
|
1120 |
+
c2ℓ+s−2 < 0
|
1121 |
+
⇐⇒
|
1122 |
+
b0 < −a3
|
1123 |
+
⇐⇒
|
1124 |
+
b0 < e1(α1, α2, α3, α4)
|
1125 |
+
⇐⇒
|
1126 |
+
b0 < 2r1t1 + 2r2t2
|
1127 |
+
(c) Note
|
1128 |
+
∃
|
1129 |
+
r2>0 ∀
|
1130 |
+
b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0. Note
|
1131 |
+
∀
|
1132 |
+
b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0
|
1133 |
+
⇐=
|
1134 |
+
r1r2
|
1135 |
+
2r2t1 + 2r1t2
|
1136 |
+
< 2r1t1 + 2r2t2
|
1137 |
+
⇐⇒
|
1138 |
+
r1r2
|
1139 |
+
(2r2t1 + 2r1t2)(2r1t1 + 2r2t2)
|
1140 |
+
< 1
|
1141 |
+
Note
|
1142 |
+
∀
|
1143 |
+
b0
|
1144 |
+
lim
|
1145 |
+
r2→∞
|
1146 |
+
r1r2
|
1147 |
+
(2r2t1 + 2r1t2)(2r1t1 + 2r2t2) = 0
|
1148 |
+
since
|
1149 |
+
degr2 (r1r2) = 1
|
1150 |
+
degr2 ((2r2t1 + 2r1t2)(2r1t1 + 2r2t2)) = 2
|
1151 |
+
(d) Hence
|
1152 |
+
∃
|
1153 |
+
r2>0 ∀
|
1154 |
+
b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0.
|
1155 |
+
11
|
1156 |
+
|
1157 |
+
4. Let s ≥ 3.
|
1158 |
+
5. Note
|
1159 |
+
cs−2 = 0 ⇐⇒ bs−3 = −a0
|
1160 |
+
a1
|
1161 |
+
bs−2 − a2bs−4 + a3bs−5 + bs−6
|
1162 |
+
a1
|
1163 |
+
c2ℓ+s−3 = 0 ⇐⇒ bs−3 = −a3bs−2 − a2
|
1164 |
+
Let b0, . . . , bs−4 be arbitrary but fixed.
|
1165 |
+
Let Lk be the line given by ck = 0. Let µk be the slope of Lk. Then µs−2 = −a0
|
1166 |
+
a1
|
1167 |
+
and µ2ℓ+s−3 = −a3.
|
1168 |
+
6. Since ai = (−1)4−ie4−i (α1, α2, α3, α4), we have
|
1169 |
+
a0 = e4 (α1, α2, α3, α4)
|
1170 |
+
a1 = −e3 (α1, α2, α3, α4)
|
1171 |
+
a3 = −e1 (α1, α2, α3, α4)
|
1172 |
+
Then
|
1173 |
+
µs−2
|
1174 |
+
= e4 (α1, α2, α3, α4)
|
1175 |
+
e3 (α1, α2, α3, α4)
|
1176 |
+
=
|
1177 |
+
r1r2
|
1178 |
+
2r2t1 + 2r1t2
|
1179 |
+
µ2ℓ+s−3
|
1180 |
+
= e1 (α1, α2, α3, α4)
|
1181 |
+
= 2r1t1 + 2r2t2
|
1182 |
+
7. Claim 2:
|
1183 |
+
∃
|
1184 |
+
r(2)
|
1185 |
+
2
|
1186 |
+
>0
|
1187 |
+
∀
|
1188 |
+
r2≥r(2)
|
1189 |
+
2
|
1190 |
+
µ2ℓ+s−3 > µs−2.
|
1191 |
+
(a) Note
|
1192 |
+
µ2ℓ+s−3
|
1193 |
+
> µs−2
|
1194 |
+
⇐⇒
|
1195 |
+
2r1t1 + 2r2t2
|
1196 |
+
>
|
1197 |
+
r1r2
|
1198 |
+
2r2t1 + 2r1t2
|
1199 |
+
⇐⇒
|
1200 |
+
1
|
1201 |
+
>
|
1202 |
+
r1r2
|
1203 |
+
(2r2t1 + 2r1t2)(2r1t1 + 2r2t2)
|
1204 |
+
(b) Note
|
1205 |
+
lim
|
1206 |
+
r2→∞
|
1207 |
+
r1r2
|
1208 |
+
(2r2t1 + 2r1t2)(2r1t1 + 2r2t2) = 0
|
1209 |
+
since
|
1210 |
+
degr2 (r1r2) = 1
|
1211 |
+
degr2 ((2r2t1 + 2r1t2)(2r1t1 + 2r2t2)) = 2
|
1212 |
+
8. Let r(2)
|
1213 |
+
2
|
1214 |
+
be such that
|
1215 |
+
∀
|
1216 |
+
r2≥r(2)
|
1217 |
+
2
|
1218 |
+
µ2ℓ+s−3 > µs−2. Such r(2)
|
1219 |
+
2
|
1220 |
+
exists due to the previous claim. Let r2 be
|
1221 |
+
arbitrary but fixed such that r2 ≥ r(2)
|
1222 |
+
2 .
|
1223 |
+
9. Over the space (bs−2, bs−3), there exists a unique intersection point of Ls−2 and L2ℓ+s−3. Let (p, q) be
|
1224 |
+
the intersection point.
|
1225 |
+
10. We have p = a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
|
1226 |
+
a0a4 − a1a3
|
1227 |
+
and q = −a0a3 − a3(−a2bs−4 − a3bs−5 − bs−6)
|
1228 |
+
a0a4 − a1a3
|
1229 |
+
.
|
1230 |
+
12
|
1231 |
+
|
1232 |
+
Note
|
1233 |
+
cs−2 = 0
|
1234 |
+
∧
|
1235 |
+
c2ℓ+s−3 = 0
|
1236 |
+
⇐⇒
|
1237 |
+
a0bs−2 + a1bs−3 + a2bs−4 + a3bs−5 + bs−6 = 0
|
1238 |
+
∧
|
1239 |
+
a2 + a3bs−2 + a4bs−3 = 0
|
1240 |
+
⇐⇒
|
1241 |
+
a0bs−2 + a1bs−3 = −a2bs−4 − a3bs−5 − bs−6
|
1242 |
+
∧
|
1243 |
+
a3bs−2 + a4bs−3 = −a2
|
1244 |
+
⇐⇒
|
1245 |
+
�
|
1246 |
+
a0
|
1247 |
+
a1
|
1248 |
+
a3
|
1249 |
+
a4
|
1250 |
+
� �
|
1251 |
+
bs−2
|
1252 |
+
bs−3
|
1253 |
+
�
|
1254 |
+
=
|
1255 |
+
�
|
1256 |
+
−a2bs−4 − a3bs−5 − bs−6
|
1257 |
+
−a3
|
1258 |
+
�
|
1259 |
+
⇐⇒
|
1260 |
+
bs−2 =
|
1261 |
+
�������
|
1262 |
+
−a2bs−4 − a3bs−5 − bs−6
|
1263 |
+
a1
|
1264 |
+
−a3
|
1265 |
+
a4
|
1266 |
+
�������
|
1267 |
+
�������
|
1268 |
+
a0
|
1269 |
+
a1
|
1270 |
+
a3
|
1271 |
+
a4
|
1272 |
+
�������
|
1273 |
+
∧
|
1274 |
+
bs−3 =
|
1275 |
+
�������
|
1276 |
+
a0
|
1277 |
+
−a2bs−4 − a3bs−5 − bs−6
|
1278 |
+
a3
|
1279 |
+
−a3
|
1280 |
+
�������
|
1281 |
+
�������
|
1282 |
+
a0
|
1283 |
+
a1
|
1284 |
+
a3
|
1285 |
+
a4
|
1286 |
+
�������
|
1287 |
+
⇐⇒
|
1288 |
+
bs−2 = a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
|
1289 |
+
a0a4 − a1a3
|
1290 |
+
∧
|
1291 |
+
bs−3 = −a0a3 − a3(−a2bs−4 − a3bs−5 − bs−6)
|
1292 |
+
a0a4 − a1a3
|
1293 |
+
11. Claim 3:
|
1294 |
+
∃
|
1295 |
+
r(2)
|
1296 |
+
2
|
1297 |
+
>0
|
1298 |
+
∀
|
1299 |
+
r2≥r(2)
|
1300 |
+
2
|
1301 |
+
∀
|
1302 |
+
b0,...,bs−2
|
1303 |
+
bs−2>p
|
1304 |
+
cs−2 < 0 ∨ c2ℓ+s−3 < 0.
|
1305 |
+
Let r(2)
|
1306 |
+
2
|
1307 |
+
be such that
|
1308 |
+
∀
|
1309 |
+
r2≥r(2)
|
1310 |
+
2
|
1311 |
+
µ2ℓ+s−3 > µs−2. In the above, we have shown that such r(2)
|
1312 |
+
2
|
1313 |
+
exists.
|
1314 |
+
Let r2 ≥ r(2)
|
1315 |
+
2
|
1316 |
+
be arbitrary but fixed.
|
1317 |
+
Let b0, . . . , bs−4 be arbitrary but fixed. We need to show
|
1318 |
+
∀
|
1319 |
+
bs−2,bs−3
|
1320 |
+
bs−2>p
|
1321 |
+
cs−2 < 0 ∨ c2ℓ+s−3 < 0.
|
1322 |
+
(a) Over the space (bs−2, bs−3) where bs−2 > p, we have
|
1323 |
+
i. c2ℓ+s−3 = 0 line and cs−2 = 0 line do not intersect
|
1324 |
+
ii. c2ℓ+s−3 = 0 line is above cs−2 = 0 line.
|
1325 |
+
(b) Let (bs−2, bs−3) be an arbitrary but fixed point such that bs−2 > p. Then (bs−2, bs−3) is above
|
1326 |
+
Ls−2 or below L2ℓ+s−3.
|
1327 |
+
(c) Note
|
1328 |
+
(bs−2, bs−3) is above Ls−2
|
1329 |
+
⇐⇒
|
1330 |
+
bs−3 > − a0
|
1331 |
+
a1 bs−2 − a2bs−4+a3bs−5+bs−6
|
1332 |
+
a1
|
1333 |
+
⇐⇒
|
1334 |
+
cs−2 < 0
|
1335 |
+
(bs−2, bs−3) is below L2ℓ+s−3
|
1336 |
+
⇐⇒
|
1337 |
+
bs−3 < −a3bs−2 − a2
|
1338 |
+
⇐⇒
|
1339 |
+
c2ℓ+s−3 < 0
|
1340 |
+
(d) Thus cs−2 < 0 or c2ℓ+s−3 < 0.
|
1341 |
+
12. Claim 4:
|
1342 |
+
∃
|
1343 |
+
r(3)
|
1344 |
+
2
|
1345 |
+
>0
|
1346 |
+
∀
|
1347 |
+
r2≥r(3)
|
1348 |
+
2
|
1349 |
+
∀
|
1350 |
+
b0,...,bs−2
|
1351 |
+
bs−2≤p
|
1352 |
+
c2ℓ+s−2 < 0.
|
1353 |
+
(a) Note
|
1354 |
+
∀
|
1355 |
+
r2>0
|
1356 |
+
∀
|
1357 |
+
b0,...,bs−2
|
1358 |
+
bs−2≤p
|
1359 |
+
a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
|
1360 |
+
e1 (α1, α2, α3, α4) (a0a4 − a1a3)
|
1361 |
+
< 1
|
1362 |
+
=⇒
|
1363 |
+
c2ℓ+s−2 < 0
|
1364 |
+
13
|
1365 |
+
|
1366 |
+
since
|
1367 |
+
c2ℓ+s−2
|
1368 |
+
< 0
|
1369 |
+
⇐⇒
|
1370 |
+
bs−2
|
1371 |
+
< −a3
|
1372 |
+
⇐=
|
1373 |
+
p
|
1374 |
+
< −a3
|
1375 |
+
since bs−2 ≤ p
|
1376 |
+
⇐⇒
|
1377 |
+
a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
|
1378 |
+
a0a4 − a1a3
|
1379 |
+
< e1 (α1, α2, α3, α4)
|
1380 |
+
⇐⇒
|
1381 |
+
a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
|
1382 |
+
e1 (α1, α2, α3, α4) (a0a4 − a1a3)
|
1383 |
+
< 1
|
1384 |
+
(b) Let ek = ek (α1, α2, α3, α4). Note
|
1385 |
+
a1a3 − a4(a2bs−4 + a3bs−5 + bs−6)
|
1386 |
+
e1 (α1, α2, α3, α4) (a0a4 − a1a3)
|
1387 |
+
= e3e1 − e0(e2bs−4 − e1bs−5 + bs−6)
|
1388 |
+
e1 (e4e0 − e3e1)
|
1389 |
+
(c) Note
|
1390 |
+
∀
|
1391 |
+
b0,...,bs−2
|
1392 |
+
lim
|
1393 |
+
r2→∞
|
1394 |
+
e3e1 − e0(e2bs−4 − e1bs−5 + bs−6)
|
1395 |
+
e1 (e4e0 − e3e1)
|
1396 |
+
= 0
|
1397 |
+
since
|
1398 |
+
degr2
|
1399 |
+
�e3e1 − e0(e2bs−4 − e1bs−5 + bs−6)
|
1400 |
+
e1 (e4e0 − e3e1)
|
1401 |
+
�
|
1402 |
+
≤ 3
|
1403 |
+
degr2 (e1 (e4e0 − e3e1)) = 4
|
1404 |
+
13. Claim 5:
|
1405 |
+
∃
|
1406 |
+
r2>0
|
1407 |
+
∀
|
1408 |
+
b0,...,bs−2
|
1409 |
+
�
|
1410 |
+
0≤k≤2ℓ+s−2
|
1411 |
+
ck < 0
|
1412 |
+
From Claim 1, when s = 2, for some r(1)
|
1413 |
+
2
|
1414 |
+
> 0 we have
|
1415 |
+
∃
|
1416 |
+
r2>0 ∀
|
1417 |
+
b0 cs−1 < 0 ∨ c2ℓ+s−2 < 0.
|
1418 |
+
From Claim 3, when s ≥ 3, for some r(2)
|
1419 |
+
2
|
1420 |
+
> 0 we have
|
1421 |
+
∀
|
1422 |
+
r2>r(1)
|
1423 |
+
2
|
1424 |
+
∀
|
1425 |
+
b0,...,bs−2
|
1426 |
+
bs−2>p
|
1427 |
+
cs−2 < 0 ∨ c2ℓ+s−3 < 0.
|
1428 |
+
From Claim 4, when s ≥ 3, for some r(3)
|
1429 |
+
2
|
1430 |
+
> 0 we have
|
1431 |
+
∀
|
1432 |
+
r2≥r(2)
|
1433 |
+
2
|
1434 |
+
∀
|
1435 |
+
b0,...,bs−2
|
1436 |
+
bs−2≤p
|
1437 |
+
c2ℓ+s−2 < 0.
|
1438 |
+
Then for r∗
|
1439 |
+
2 = max{r(1)
|
1440 |
+
2 , r(2)
|
1441 |
+
2 , r(3)
|
1442 |
+
2 }, we have
|
1443 |
+
∀
|
1444 |
+
r2≥r∗
|
1445 |
+
2
|
1446 |
+
|
1447 |
+
|
1448 |
+
∀
|
1449 |
+
b0,...,bs−2
|
1450 |
+
bs−2>p
|
1451 |
+
cs−1 < 0 ∨ cs−2 < 0 ∨ c2ℓ+s−3 < 0
|
1452 |
+
∧
|
1453 |
+
∀
|
1454 |
+
b0,...,bs−2
|
1455 |
+
bs−2≤p
|
1456 |
+
cs−1 < 0 ∨ c2ℓ+s−2 < 0
|
1457 |
+
|
1458 |
+
|
1459 |
+
Hence
|
1460 |
+
∃
|
1461 |
+
r2>0
|
1462 |
+
∀
|
1463 |
+
b0,...,bs−2
|
1464 |
+
�
|
1465 |
+
k∈{s−2,s−1,2ℓ+s−3,2+s−2}
|
1466 |
+
ck < 0.
|
1467 |
+
□
|
1468 |
+
Lemma 13 For ℓ ≥ 3,
|
1469 |
+
∀
|
1470 |
+
0<t1≤···≤tℓ<1
|
1471 |
+
∃
|
1472 |
+
r1,...,rℓ>0 ∀
|
1473 |
+
b
|
1474 |
+
�
|
1475 |
+
0≤k≤2ℓ+s−2
|
1476 |
+
ck < 0
|
1477 |
+
14
|
1478 |
+
|
1479 |
+
Proof: We will prove the following stronger statement.
|
1480 |
+
∀
|
1481 |
+
0<t1≤···≤tℓ<1
|
1482 |
+
∃
|
1483 |
+
r1,...,rℓ−1>0
|
1484 |
+
C(r)<1
|
1485 |
+
∃
|
1486 |
+
rℓ>0 ∀
|
1487 |
+
b
|
1488 |
+
�
|
1489 |
+
k∈{s−2, 2ℓ+s−5, 2ℓ+s−2}
|
1490 |
+
ck < 0
|
1491 |
+
where C(r) = e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1492 |
+
e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1).
|
1493 |
+
1. Let t1, . . . , tℓ be such that 0 < t1 ≤ · · · ≤ tℓ < 1.
|
1494 |
+
2. Claim 1:
|
1495 |
+
∀
|
1496 |
+
0<t1≤···≤tℓ−1<1
|
1497 |
+
∃
|
1498 |
+
r1,...,rℓ−1>0 C(r) < 1
|
1499 |
+
(a) Note
|
1500 |
+
e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) = 1
|
1501 |
+
e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) = α1 + · · · + αℓ−1 + αℓ+1 + · · · + α2ℓ−1
|
1502 |
+
= (α1 + αℓ+1) + · · · + (αℓ−1 + α2ℓ−1)
|
1503 |
+
= 2r1t1 + · · · + 2rℓ−1tℓ−1
|
1504 |
+
e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) =
|
1505 |
+
�
|
1506 |
+
i∈{1,...,ℓ−1,ℓ+1,...,2ℓ−1}
|
1507 |
+
|
1508 |
+
�
|
1509 |
+
j̸=i
|
1510 |
+
αj
|
1511 |
+
|
1512 |
+
|
1513 |
+
=
|
1514 |
+
�
|
1515 |
+
1≤i≤ℓ−1
|
1516 |
+
|
1517 |
+
�
|
1518 |
+
j̸=i
|
1519 |
+
αj +
|
1520 |
+
�
|
1521 |
+
j̸=ℓ+i
|
1522 |
+
αj
|
1523 |
+
|
1524 |
+
|
1525 |
+
=
|
1526 |
+
�
|
1527 |
+
1≤i≤ℓ−1
|
1528 |
+
|
1529 |
+
(αℓ+i + αi)
|
1530 |
+
�
|
1531 |
+
j̸=i,ℓ+1
|
1532 |
+
αj
|
1533 |
+
|
1534 |
+
|
1535 |
+
=
|
1536 |
+
�
|
1537 |
+
1≤i≤ℓ−1
|
1538 |
+
|
1539 |
+
(2riti)
|
1540 |
+
�
|
1541 |
+
j̸=i
|
1542 |
+
r2
|
1543 |
+
j
|
1544 |
+
|
1545 |
+
|
1546 |
+
e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) = α1 · · · αℓ−1αℓ+1 · · · α2ℓ−1
|
1547 |
+
= α1αℓ+1 · · · αℓ−1α2ℓ−1
|
1548 |
+
= r2
|
1549 |
+
1 · · · r2
|
1550 |
+
ℓ−1
|
1551 |
+
Then
|
1552 |
+
C(r) = e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1553 |
+
e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1) e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1554 |
+
=
|
1555 |
+
r2
|
1556 |
+
1 · · · r2
|
1557 |
+
ℓ−1
|
1558 |
+
(2r1t1 + · · · + 2rℓ−1tℓ−1)
|
1559 |
+
��
|
1560 |
+
1≤i≤ℓ−1
|
1561 |
+
�
|
1562 |
+
(2riti) �
|
1563 |
+
j̸=i r2
|
1564 |
+
j
|
1565 |
+
��
|
1566 |
+
=
|
1567 |
+
r1 · · · rℓ−1
|
1568 |
+
(2r1t1 + · · · + 2rℓ−1tℓ−1)
|
1569 |
+
��
|
1570 |
+
1≤i≤ℓ−1
|
1571 |
+
�
|
1572 |
+
(2ti) �
|
1573 |
+
j̸=i rj
|
1574 |
+
��
|
1575 |
+
=
|
1576 |
+
1
|
1577 |
+
(2r1t1 + · · · + 2rℓ−1tℓ−1)
|
1578 |
+
�2t1
|
1579 |
+
r1
|
1580 |
+
+ · · · + 2tℓ−1
|
1581 |
+
rℓ−1
|
1582 |
+
�
|
1583 |
+
(b) Consider the following witness candidates for the existentially quantified variables r1, . . . , rℓ−1:
|
1584 |
+
r1 = 2t1
|
1585 |
+
15
|
1586 |
+
|
1587 |
+
ri = 1
|
1588 |
+
2ti
|
1589 |
+
for 2 ≤ t ≤ ℓ − 1
|
1590 |
+
(c) Obviously, r1, . . . , rℓ−1 > 0. Note
|
1591 |
+
1
|
1592 |
+
(2r1t1 + 2r2t2 + · · · + 2rℓ−1tℓ−1)
|
1593 |
+
�2t1
|
1594 |
+
r1
|
1595 |
+
+ 2t2
|
1596 |
+
r2
|
1597 |
+
+ · · · + 2tℓ−1
|
1598 |
+
rℓ−1
|
1599 |
+
�
|
1600 |
+
=
|
1601 |
+
1
|
1602 |
+
�
|
1603 |
+
2 (2t1) t1 + 2
|
1604 |
+
� 1
|
1605 |
+
2t2
|
1606 |
+
�
|
1607 |
+
t2 + · · · + 2
|
1608 |
+
�
|
1609 |
+
1
|
1610 |
+
2tℓ−1
|
1611 |
+
�
|
1612 |
+
tℓ−1
|
1613 |
+
� �
|
1614 |
+
2t1
|
1615 |
+
2t1
|
1616 |
+
+ 2t2
|
1617 |
+
1
|
1618 |
+
2t2
|
1619 |
+
+ · · · + 2tℓ−1
|
1620 |
+
1
|
1621 |
+
2tℓ−1
|
1622 |
+
�
|
1623 |
+
=
|
1624 |
+
1
|
1625 |
+
(4t2
|
1626 |
+
1 + 1 + · · · + 1)
|
1627 |
+
�
|
1628 |
+
1 + 4t2
|
1629 |
+
2 + · · · + 4t2
|
1630 |
+
ℓ−1
|
1631 |
+
�
|
1632 |
+
< 1
|
1633 |
+
Hence the candidates are witnesses.
|
1634 |
+
3. Let r1, . . . , rℓ−1 > 0 be such that C(r) < 1.
|
1635 |
+
4. Note
|
1636 |
+
cs−2 = a0bs−2 + a1bs−3 +
|
1637 |
+
s−2
|
1638 |
+
�
|
1639 |
+
i=2
|
1640 |
+
aib(s−2)−i
|
1641 |
+
c2ℓ+s−5 = a2ℓ−4bs−1 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + a2ℓbs−5
|
1642 |
+
= a2ℓ−4 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + bs−5
|
1643 |
+
c2ℓ+s−2 = a2ℓ−1bs−1 + a2ℓbs−2
|
1644 |
+
= a2ℓ−1 + bs−2
|
1645 |
+
(a) Note that coeff(gf, xk) =
|
1646 |
+
�
|
1647 |
+
i+j=k
|
1648 |
+
aibj =
|
1649 |
+
k
|
1650 |
+
�
|
1651 |
+
i=0
|
1652 |
+
aibk−i for 0 ≤ k ≤ 2ℓ + s − 1.
|
1653 |
+
Recall from Lemma 3 for 0 ≤ i ≤ 2ℓ and 0 ≤ j ≤ s − 1
|
1654 |
+
coeffs(gf) =
|
1655 |
+
�
|
1656 |
+
b0
|
1657 |
+
· · ·
|
1658 |
+
bs−1
|
1659 |
+
�
|
1660 |
+
|
1661 |
+
|
1662 |
+
a0
|
1663 |
+
· · ·
|
1664 |
+
· · ·
|
1665 |
+
a2ℓ
|
1666 |
+
...
|
1667 |
+
...
|
1668 |
+
a0
|
1669 |
+
· · ·
|
1670 |
+
· · ·
|
1671 |
+
a2ℓ
|
1672 |
+
|
1673 |
+
|
1674 |
+
Then
|
1675 |
+
coeff(gf, xk) =
|
1676 |
+
�
|
1677 |
+
i+j=k
|
1678 |
+
aibj
|
1679 |
+
=
|
1680 |
+
k
|
1681 |
+
�
|
1682 |
+
i=0
|
1683 |
+
aibk−i
|
1684 |
+
(b) Then
|
1685 |
+
cs−2 =
|
1686 |
+
s−2
|
1687 |
+
�
|
1688 |
+
i=0
|
1689 |
+
aib(s−2)−i
|
1690 |
+
16
|
1691 |
+
|
1692 |
+
= a0bs−2 + a1bs−3 +
|
1693 |
+
s−2
|
1694 |
+
�
|
1695 |
+
i=2
|
1696 |
+
aib(s−2)−i
|
1697 |
+
c2ℓ+s−5 =
|
1698 |
+
�
|
1699 |
+
i+j=2ℓ+s−5
|
1700 |
+
aibj
|
1701 |
+
= a2ℓ−4bs−1 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + a2ℓbs−5
|
1702 |
+
= a2ℓ−4 + a2m−3bs−2 + a2m−2bs−3 + a2m−1bs−4 + bs−5
|
1703 |
+
since a2ℓ = bs−1 = 1
|
1704 |
+
c2ℓ+s−2 =
|
1705 |
+
�
|
1706 |
+
i+j=2ℓ+s−2
|
1707 |
+
aibj
|
1708 |
+
= a2ℓ−1bs−1 + a2ℓbs−2
|
1709 |
+
= a2ℓ−1 + bs−2
|
1710 |
+
since a2ℓ = bs−1 = 1
|
1711 |
+
5. Note
|
1712 |
+
cs−2 = 0 ⇐⇒ bs−3 = −a0
|
1713 |
+
a1
|
1714 |
+
bs−2 −
|
1715 |
+
s−2
|
1716 |
+
�
|
1717 |
+
i=2
|
1718 |
+
ai
|
1719 |
+
a1
|
1720 |
+
b(s−2)−i
|
1721 |
+
c2ℓ+s−5 = 0 ⇐⇒ bs−3 = −a2ℓ−3
|
1722 |
+
a2ℓ−2
|
1723 |
+
bs−2 − a2ℓ−1bs−4 + bs−5 + a2ℓ−4
|
1724 |
+
a2ℓ−2
|
1725 |
+
Let b0, . . . , bs−4 be arbitrary but fixed.
|
1726 |
+
Let Lk be the line given by ck = 0. Let µk be the slope of Lk. Then µs−2 = −a0
|
1727 |
+
a1
|
1728 |
+
and µ2ℓ+s−5 = −a2ℓ−3
|
1729 |
+
a2ℓ−2
|
1730 |
+
.
|
1731 |
+
6. Since ai = (−1)2ℓ−ie2ℓ−i (α1, . . . , α2ℓ), we have
|
1732 |
+
a0 = e2ℓ (α1, . . . , α2ℓ)
|
1733 |
+
a1 = −e2ℓ−1 (α1, . . . , α2ℓ)
|
1734 |
+
a2ℓ−3 = −e3 (α1, . . . , α2ℓ)
|
1735 |
+
a2ℓ−2 = e2 (α1, . . . , α2ℓ)
|
1736 |
+
Then µs−2 =
|
1737 |
+
e2ℓ (α1, . . . , α2ℓ)
|
1738 |
+
e2ℓ−1 (α1, . . . , α2ℓ) and µ2ℓ+s−5 = e3 (α1, . . . , α2ℓ)
|
1739 |
+
e2 (α1, . . . , α2ℓ).
|
1740 |
+
7. Claim 2:
|
1741 |
+
∃
|
1742 |
+
r(1)
|
1743 |
+
ℓ
|
1744 |
+
>0
|
1745 |
+
∀
|
1746 |
+
rℓ≥r(1)
|
1747 |
+
ℓ
|
1748 |
+
µ2ℓ+s−5 > µs−2.
|
1749 |
+
(a) Note as rℓ → ∞
|
1750 |
+
e2ℓ (α1, . . . , α2ℓ) → αℓα2ℓ e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1751 |
+
e2ℓ−1 (α1, . . . , α2ℓ) → αℓα2ℓ e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1752 |
+
e3 (α1, . . . , α2ℓ) → αℓα2ℓ e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1753 |
+
e2 (α1, . . . , α2ℓ) → αℓα2ℓ e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1754 |
+
Then
|
1755 |
+
µs−2 → e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1756 |
+
e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1757 |
+
µ2ℓ+s−5 → e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1758 |
+
e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1759 |
+
17
|
1760 |
+
|
1761 |
+
(b) Then for sufficiently large rℓ,
|
1762 |
+
µ2ℓ+s−5
|
1763 |
+
> µs−2
|
1764 |
+
⇐⇒
|
1765 |
+
e1 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1766 |
+
e0 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1767 |
+
> e2ℓ−2 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1768 |
+
e2ℓ−3 (α1, . . . , αℓ−1, αℓ+1, . . . , α2ℓ−1)
|
1769 |
+
⇐⇒
|
1770 |
+
1
|
1771 |
+
> C(r)
|
1772 |
+
which is true for the r1, . . . , rℓ−1 we have chosen based on Claim 1.
|
1773 |
+
8. Let r(1)
|
1774 |
+
ℓ
|
1775 |
+
be such that
|
1776 |
+
∀
|
1777 |
+
rℓ≥r(1)
|
1778 |
+
ℓ
|
1779 |
+
µ2ℓ+s−5 > µs−2. Such r(1)
|
1780 |
+
ℓ
|
1781 |
+
exists due to the previous claim. Let rℓ be
|
1782 |
+
arbitrary but fixed such that rℓ ≥ r(1)
|
1783 |
+
ℓ .
|
1784 |
+
9. Over the space (bs−2, bs−3), there exists a unique intersection point of Ls−2 and L2ℓ+s−5. Let (p, q) be
|
1785 |
+
the intersection point.
|
1786 |
+
10. We have p =
|
1787 |
+
a2ℓ−2d0 − a1d1
|
1788 |
+
a0a2ℓ−2 − a1a2ℓ−3
|
1789 |
+
and q =
|
1790 |
+
a0d1 − a2ℓ−3d0
|
1791 |
+
a0a2ℓ−2 − a1a2ℓ−3
|
1792 |
+
where d0 = −
|
1793 |
+
s−2
|
1794 |
+
�
|
1795 |
+
i=2
|
1796 |
+
aib(s−2)−i and d1 =
|
1797 |
+
−a2ℓ−1bs−4 − bs−5 − a2ℓ−4.
|
1798 |
+
Note
|
1799 |
+
cs−2 = 0
|
1800 |
+
∧
|
1801 |
+
c2ℓ+s−5 = 0
|
1802 |
+
⇐⇒
|
1803 |
+
a0bs−2 + a1bs−3 + �s−2
|
1804 |
+
i=2 aib(s−2)−i = 0
|
1805 |
+
∧
|
1806 |
+
a2ℓ−4 + a2ℓ−3bs−2 + a2ℓ−2bs−3 + a2ℓ−1bs−4 + bs−5 = 0
|
1807 |
+
⇐⇒
|
1808 |
+
a0bs−2 + a1bs−3 = − �s−2
|
1809 |
+
i=2 aib(s−2)−i
|
1810 |
+
∧
|
1811 |
+
a2ℓ−3bs−2 + a2ℓ−2bs−3 = −a2ℓ−1bs−4 − bs−5 − a2ℓ−4
|
1812 |
+
⇐⇒
|
1813 |
+
a0bs−2 + a1bs−3 = d0
|
1814 |
+
where d0 = − �s−2
|
1815 |
+
i=2 aib(s−2)−i
|
1816 |
+
∧
|
1817 |
+
a2ℓ−3bs−2 + a2ℓ−2bs−3 = d1
|
1818 |
+
where d1 = −a2ℓ−1bs−4 − bs−5 − a2ℓ−4
|
1819 |
+
⇐⇒
|
1820 |
+
�
|
1821 |
+
a0
|
1822 |
+
a1
|
1823 |
+
a2ℓ−3
|
1824 |
+
a2ℓ−2
|
1825 |
+
� �
|
1826 |
+
bs−2
|
1827 |
+
bs−3
|
1828 |
+
�
|
1829 |
+
=
|
1830 |
+
�
|
1831 |
+
d0
|
1832 |
+
d1
|
1833 |
+
�
|
1834 |
+
⇐⇒
|
1835 |
+
bs−2 =
|
1836 |
+
�������
|
1837 |
+
d0
|
1838 |
+
a1
|
1839 |
+
d1
|
1840 |
+
a2ℓ−2
|
1841 |
+
�������
|
1842 |
+
�������
|
1843 |
+
a0
|
1844 |
+
a1
|
1845 |
+
a2ℓ−3
|
1846 |
+
a2ℓ−2
|
1847 |
+
�������
|
1848 |
+
∧
|
1849 |
+
bs−3 =
|
1850 |
+
�������
|
1851 |
+
a0
|
1852 |
+
d0
|
1853 |
+
a2ℓ−3
|
1854 |
+
d1
|
1855 |
+
�������
|
1856 |
+
�������
|
1857 |
+
a0
|
1858 |
+
a1
|
1859 |
+
a2ℓ−3
|
1860 |
+
a2ℓ−2
|
1861 |
+
�������
|
1862 |
+
⇐⇒
|
1863 |
+
bs−2 =
|
1864 |
+
a2ℓ−2d0 − a1d1
|
1865 |
+
a0a2ℓ−2 − a1a2ℓ−3
|
1866 |
+
∧
|
1867 |
+
bs−3 =
|
1868 |
+
a0d1 − a2ℓ−3d0
|
1869 |
+
a0a2ℓ−2 − a1a2ℓ−3
|
1870 |
+
11. Claim 3:
|
1871 |
+
∃
|
1872 |
+
r(1)
|
1873 |
+
ℓ
|
1874 |
+
>0
|
1875 |
+
∀
|
1876 |
+
rℓ≥r(1)
|
1877 |
+
ℓ
|
1878 |
+
∀
|
1879 |
+
b0,...,bs−2
|
1880 |
+
bs−2>p
|
1881 |
+
cs−2 < 0 ∨ c2ℓ+s−5 < 0.
|
1882 |
+
Let r(1)
|
1883 |
+
ℓ
|
1884 |
+
be such that
|
1885 |
+
∀
|
1886 |
+
rℓ≥r(1)
|
1887 |
+
ℓ
|
1888 |
+
µ2ℓ+s−5 > µs−2. In the above, we have shown that such r(1)
|
1889 |
+
ℓ
|
1890 |
+
exists.
|
1891 |
+
Let rℓ ≥ r(1)
|
1892 |
+
ℓ
|
1893 |
+
be arbitrary but fixed.
|
1894 |
+
Let b0, . . . , bs−4 be arbitrary but fixed. We need to show
|
1895 |
+
∀
|
1896 |
+
bs−2,bs−3
|
1897 |
+
bs−2>p
|
1898 |
+
cs−2 < 0 ∨ c2ℓ+s−5 < 0.
|
1899 |
+
(a) Over the space (bs−2, bs−3) where bs−2 > p, we have
|
1900 |
+
18
|
1901 |
+
|
1902 |
+
i. c2ℓ+s−5 = 0 line and cs−2 = 0 line do not intersect
|
1903 |
+
ii. c2ℓ+s−5 = 0 line is above cs−2 = 0 line.
|
1904 |
+
(b) Let (bs−2, bs−3) be an arbitrary but fixed point such that bs−2 > p. Then (bs−2, bs−3) is above
|
1905 |
+
Ls−2 or below L2ℓ+s−5.
|
1906 |
+
(c) Note
|
1907 |
+
(bs−2, bs−3) is above Ls−2
|
1908 |
+
⇐⇒
|
1909 |
+
bs−3 > − a0
|
1910 |
+
a1 bs−2 − d0
|
1911 |
+
a1
|
1912 |
+
⇐⇒
|
1913 |
+
cs−2 < 0
|
1914 |
+
(bs−2, bs−3) is below L2ℓ+s−5
|
1915 |
+
⇐⇒
|
1916 |
+
bs−3 < − a2ℓ−3
|
1917 |
+
a2ℓ−2 bs−2 −
|
1918 |
+
d1
|
1919 |
+
a2ℓ−2
|
1920 |
+
⇐⇒
|
1921 |
+
c2ℓ+s−5 < 0
|
1922 |
+
since a1 = (−1)2ℓ−1e2ℓ−1 (α1, . . . , α2ℓ) < 0 and a2ℓ−2 = (−1)2e2 (α1, . . . , α2ℓ) > 0.
|
1923 |
+
(d) Thus cs−2 < 0 or c2ℓ+s−5 < 0.
|
1924 |
+
12. Claim 4:
|
1925 |
+
∃
|
1926 |
+
r(2)
|
1927 |
+
ℓ
|
1928 |
+
>0
|
1929 |
+
∀
|
1930 |
+
rℓ≥r(2)
|
1931 |
+
ℓ
|
1932 |
+
∀
|
1933 |
+
b0,...,bs−2
|
1934 |
+
bs−2≤p
|
1935 |
+
c2ℓ+s−2 < 0.
|
1936 |
+
(a) Note
|
1937 |
+
∀
|
1938 |
+
rℓ>0
|
1939 |
+
∀
|
1940 |
+
b0,...,bs−2
|
1941 |
+
bs−2≤p
|
1942 |
+
a2ℓ−2d0 − a1d1
|
1943 |
+
e1 (α1, . . . , α2ℓ) (a0a2ℓ−2 − a1a2ℓ−3) < 1
|
1944 |
+
=⇒
|
1945 |
+
c2+s−2 < 0
|
1946 |
+
since
|
1947 |
+
c2ℓ+s−2
|
1948 |
+
< 0
|
1949 |
+
⇐⇒
|
1950 |
+
bs−2
|
1951 |
+
< −a2ℓ−1
|
1952 |
+
⇐=
|
1953 |
+
p
|
1954 |
+
< −a2ℓ−1
|
1955 |
+
since bs−2 ≤ p
|
1956 |
+
⇐⇒
|
1957 |
+
a2ℓ−2d0 − a1d1
|
1958 |
+
a0a2ℓ−2 − a1a2ℓ−3
|
1959 |
+
< e1 (α1, . . . , α2ℓ)
|
1960 |
+
⇐⇒
|
1961 |
+
a2ℓ−2d0 − a1d1
|
1962 |
+
e1 (α1, . . . , α2ℓ) (a0a2ℓ−2 − a1a2ℓ−3)
|
1963 |
+
< 1
|
1964 |
+
(b) Let ek = ek (α1, . . . , α2ℓ). Note
|
1965 |
+
a2ℓ−2d0 − a1d1
|
1966 |
+
e1 (α1, . . . , α2ℓ) (a0a2ℓ−2 − a1a2ℓ−3)
|
1967 |
+
= −e2
|
1968 |
+
�s−2
|
1969 |
+
i=2 (−1)2ℓ−ie2ℓ−ib(s−2)−i + e2ℓ−1 (e1bs−4 − bs−5 − e4)
|
1970 |
+
e1 (e2ℓe2 − e2ℓ−1e3)
|
1971 |
+
(c) Note
|
1972 |
+
∀
|
1973 |
+
b0,...,bs−2
|
1974 |
+
lim
|
1975 |
+
rℓ→∞
|
1976 |
+
−e2
|
1977 |
+
�s−2
|
1978 |
+
i=2 (−1)2ℓ−ie2ℓ−ib(s−2)−i + e2ℓ−1 (e1bs−4 − bs−5 − e4)
|
1979 |
+
e1 (e2ℓe2 − e2ℓ−1e3)
|
1980 |
+
= 0
|
1981 |
+
since
|
1982 |
+
degrℓ
|
1983 |
+
�
|
1984 |
+
−e2
|
1985 |
+
s−2
|
1986 |
+
�
|
1987 |
+
i=2
|
1988 |
+
(−1)2ℓ−ie2ℓ−ib(s−2)−i + e2ℓ−1 (e1bs−4 − bs−5 − e4)
|
1989 |
+
�
|
1990 |
+
≤ 4
|
1991 |
+
degrℓ (e1 (e2ℓe2 − e2ℓ−1e3)) = 5
|
1992 |
+
13. Claim 5:
|
1993 |
+
∃
|
1994 |
+
rℓ>0
|
1995 |
+
∀
|
1996 |
+
b0,...,bs−2
|
1997 |
+
�
|
1998 |
+
0≤k≤2ℓ+s−2
|
1999 |
+
ck < 0
|
2000 |
+
From Claim 3, for some r(1)
|
2001 |
+
ℓ
|
2002 |
+
> 0 we have
|
2003 |
+
∀
|
2004 |
+
rℓ>r(1)
|
2005 |
+
ℓ
|
2006 |
+
∀
|
2007 |
+
b0,...,bs−2
|
2008 |
+
bs−2>p
|
2009 |
+
cs−2 < 0 ∨ c2ℓ+s−5 < 0.
|
2010 |
+
19
|
2011 |
+
|
2012 |
+
From Claim 4, for some r(2)
|
2013 |
+
ℓ
|
2014 |
+
> 0 we have
|
2015 |
+
∀
|
2016 |
+
rℓ≥r(2)
|
2017 |
+
ℓ
|
2018 |
+
∀
|
2019 |
+
b0,...,bs−2
|
2020 |
+
bs−2≤p
|
2021 |
+
c2ℓ+s−2 < 0.
|
2022 |
+
Then for r∗
|
2023 |
+
ℓ = max{r(1)
|
2024 |
+
ℓ , r(2)
|
2025 |
+
ℓ }, we have
|
2026 |
+
∀
|
2027 |
+
rℓ≥r∗
|
2028 |
+
ℓ
|
2029 |
+
|
2030 |
+
|
2031 |
+
∀
|
2032 |
+
b0,...,bs−2
|
2033 |
+
bs−2>p
|
2034 |
+
cs−2 < 0 ∨ c2ℓ+s−5 < 0
|
2035 |
+
∧
|
2036 |
+
∀
|
2037 |
+
b0,...,bs−2
|
2038 |
+
bs−2≤p
|
2039 |
+
c2ℓ+s−2 < 0
|
2040 |
+
|
2041 |
+
|
2042 |
+
Hence
|
2043 |
+
∃
|
2044 |
+
rℓ>0
|
2045 |
+
∀
|
2046 |
+
b0,...,bs−2
|
2047 |
+
�
|
2048 |
+
k∈{s−2,2ℓ+s−5,2ℓ+s−2}
|
2049 |
+
ck < 0.
|
2050 |
+
□
|
2051 |
+
Lemma 14 If arg(αi) < π
|
2052 |
+
2 , then ek (α1, . . . , α2ℓ) > 0 for k = 0, . . . , 2ℓ.
|
2053 |
+
Proof: We will induct on ℓ, the number of quadratic factors of f with non-real roots.
|
2054 |
+
1. Base Case: ℓ = 0
|
2055 |
+
Note that e0 = 1 > 0.
|
2056 |
+
2. Hypothesis: Assume ek (α1, . . . , α2ℓ) > 0 for ℓ ≥ 1 and 0 ≤ k ≤ 2ℓ.
|
2057 |
+
3. Induction Step: Prove ek
|
2058 |
+
�
|
2059 |
+
α1, . . . , α2(ℓ+1)
|
2060 |
+
�
|
2061 |
+
> 0 for 0 ≤ k ≤ 2(ℓ + 1).
|
2062 |
+
Let fℓ =
|
2063 |
+
ℓ
|
2064 |
+
�
|
2065 |
+
i=1
|
2066 |
+
�
|
2067 |
+
x2 − 2ritix + r2
|
2068 |
+
i
|
2069 |
+
�
|
2070 |
+
and aℓ,k = coeff(fℓ, xk). Note that
|
2071 |
+
fℓ+1
|
2072 |
+
=
|
2073 |
+
�
|
2074 |
+
x2 − 2rℓ+1tℓ+1x + r2
|
2075 |
+
ℓ+1
|
2076 |
+
�
|
2077 |
+
fℓ
|
2078 |
+
aℓ+1,k
|
2079 |
+
= aℓ,k−2 − 2rℓ+1,t+1aℓ,k−1 + r2
|
2080 |
+
ℓ+1aℓ,k
|
2081 |
+
Then
|
2082 |
+
aℓ+1,k = (−1)2(ℓ+1)−ke2(ℓ+1)−k
|
2083 |
+
�
|
2084 |
+
α1, . . . , α2(ℓ+1)
|
2085 |
+
�
|
2086 |
+
= (−1)2ℓ−(k−2)e2ℓ−(k−2) (α1, . . . , α2ℓ)
|
2087 |
+
− 2rℓ+1tℓ+1(−1)2ℓ−(k−1)e2ℓ−(k−1) (α1, . . . , α2ℓ)
|
2088 |
+
+ r2
|
2089 |
+
ℓ+1(−1)2ℓ−ke2ℓ−k (α1, . . . , α2ℓ)
|
2090 |
+
Hence
|
2091 |
+
e2(ℓ+1)−k
|
2092 |
+
�
|
2093 |
+
α1, . . . , α2(ℓ+1)
|
2094 |
+
�
|
2095 |
+
= e2ℓ−(k−2) (α1, . . . , α2ℓ)
|
2096 |
+
− 2rℓ+1tℓ+1(−1)−1e2ℓ−(k−1) (α1, . . . , α2ℓ)
|
2097 |
+
+ r2
|
2098 |
+
ℓ+1(−1)−2e2ℓ−k (α1, . . . , α2ℓ)
|
2099 |
+
= e2ℓ−(k−2) (α1, . . . , α2ℓ)
|
2100 |
+
+ 2rℓ+1tℓ+1e2ℓ−(k−1) (α1, . . . , α2ℓ)
|
2101 |
+
+ r2
|
2102 |
+
ℓ+1e2ℓ−k (α1, . . . , α2ℓ)
|
2103 |
+
> 0
|
2104 |
+
by the inductive hypothesis and the fact that rℓ+1, tℓ+1 > 0.
|
2105 |
+
□
|
2106 |
+
20
|
2107 |
+
|
2108 |
+
5.2
|
2109 |
+
Concerning Linear and Irreducible Quadratic Factors with π
|
2110 |
+
2 < θ < π
|
2111 |
+
Lemma 15 We have
|
2112 |
+
∀
|
2113 |
+
π>φ1≥···≥φk≥ π
|
2114 |
+
2
|
2115 |
+
∀
|
2116 |
+
π
|
2117 |
+
2 >θ1≥···≥θℓ>0
|
2118 |
+
∃
|
2119 |
+
p1,...,pt>0
|
2120 |
+
∃
|
2121 |
+
rφ1,...,rφk>0
|
2122 |
+
∀
|
2123 |
+
rθ1,...,θℓ>0
|
2124 |
+
opt
|
2125 |
+
�
|
2126 |
+
fπ,p fφ,rφ fθ,rθ
|
2127 |
+
�
|
2128 |
+
= opt (fθ,rθ)
|
2129 |
+
Proof: We will first induct on k, the number of quadratic factors with π
|
2130 |
+
2 ≤ φi < π in fφ,rφ, to show that
|
2131 |
+
opt
|
2132 |
+
�
|
2133 |
+
fφ,rφ fθ,rθ
|
2134 |
+
�
|
2135 |
+
= opt (fθ,rθ).
|
2136 |
+
1. Base: The claim holds for k = 0.
|
2137 |
+
Trivially true.
|
2138 |
+
2. Hypo: Assume the claim holds for k quadratic factors with π
|
2139 |
+
2 ≤ φi < π.
|
2140 |
+
∃
|
2141 |
+
rφ1,...,rφk>0
|
2142 |
+
∀
|
2143 |
+
rθ1 ,...,rθℓ>0
|
2144 |
+
opt
|
2145 |
+
�
|
2146 |
+
fφ,rφ fθ,rθ
|
2147 |
+
�
|
2148 |
+
= opt (fθ,rθ)
|
2149 |
+
3. Induction Step: Consider k + 1 quadratic factors with π
|
2150 |
+
2 ≤ φi < π.
|
2151 |
+
Assume rφ1, . . . , rφk > 0 are such that the induction hypothesis holds. By Lemma 19,
|
2152 |
+
∃
|
2153 |
+
rφk+1 >0
|
2154 |
+
∀
|
2155 |
+
rθ1,...,rθℓ>0
|
2156 |
+
opt
|
2157 |
+
��
|
2158 |
+
x2 − 2rφk+1 cos φk+1 x + r2
|
2159 |
+
φk+1
|
2160 |
+
�
|
2161 |
+
fφ,rφ fθ,rθ
|
2162 |
+
�
|
2163 |
+
= opt
|
2164 |
+
�
|
2165 |
+
x2 − 2rφk+1 cos φk+1 x + r2
|
2166 |
+
φk+1
|
2167 |
+
�
|
2168 |
+
+ opt
|
2169 |
+
�
|
2170 |
+
fφ,rφ fθ,rθ
|
2171 |
+
�
|
2172 |
+
By Remark ??, opt
|
2173 |
+
�
|
2174 |
+
x2 − 2rφk+1 cos φk+1 x + r2
|
2175 |
+
φk+1
|
2176 |
+
�
|
2177 |
+
= 0, so we have
|
2178 |
+
opt
|
2179 |
+
��
|
2180 |
+
x2 − 2rφk+1 cos φk+1 x + r2
|
2181 |
+
φk+1
|
2182 |
+
�
|
2183 |
+
fφ,rφ fθ,rθ
|
2184 |
+
�
|
2185 |
+
= opt
|
2186 |
+
�
|
2187 |
+
fφ,rφ fθ,rθ
|
2188 |
+
�
|
2189 |
+
= opt (fθ,rθ)
|
2190 |
+
Hence, we have
|
2191 |
+
∃
|
2192 |
+
rφ1,...,rφk>0
|
2193 |
+
∀
|
2194 |
+
rθ1 ,...,rθℓ>0
|
2195 |
+
opt
|
2196 |
+
�
|
2197 |
+
fφ,rφ fθ,rθ
|
2198 |
+
�
|
2199 |
+
= opt (fθ,rθ).
|
2200 |
+
Now we will induct on t, the number of linear factors in fπ,p, to show that
|
2201 |
+
∃
|
2202 |
+
p1,...,pt>0
|
2203 |
+
∃
|
2204 |
+
rφ1,...,rφk>0
|
2205 |
+
∀
|
2206 |
+
rθ1,...,rθℓ>0
|
2207 |
+
opt
|
2208 |
+
�
|
2209 |
+
fπ,p fφ,rφ fθ,rθ
|
2210 |
+
�
|
2211 |
+
= opt (fθ,rθ)
|
2212 |
+
1. Base: The claim holds for t = 0.
|
2213 |
+
Trivially true.
|
2214 |
+
2. Hypo: Assume the claim holds for t linear factors.
|
2215 |
+
∃
|
2216 |
+
p1,...,pt>0
|
2217 |
+
∃
|
2218 |
+
rφ1,...,rφk>0
|
2219 |
+
∀
|
2220 |
+
rθ1 ,...,rθℓ>0
|
2221 |
+
opt
|
2222 |
+
�
|
2223 |
+
fπ,p fφ,rφ fθ,rθ
|
2224 |
+
�
|
2225 |
+
= opt (fθ,rθ)
|
2226 |
+
3. Induction Step: Consider t + 1 linear factors.
|
2227 |
+
Assume p1, . . . , pt, rφ1, . . . , rφk > 0 are such that the induction hypothesis holds. By Lemma 18,
|
2228 |
+
∃
|
2229 |
+
pt+1>0
|
2230 |
+
∀
|
2231 |
+
rθ1,...,rθℓ>0
|
2232 |
+
opt ((x + pt+1) fπ,p fφ,σ fθ,τ) = opt (x + pt+1) + opt (fπ,p fφ,σ fθ,τ)
|
2233 |
+
By Lemma 16, opt (x + pt+1) = 0, so we have
|
2234 |
+
opt ((x + pt+1) fπ,p fφ,σ fθ,τ) = opt
|
2235 |
+
�
|
2236 |
+
fπ,p fφ,rφ fθ,rθ
|
2237 |
+
�
|
2238 |
+
= opt (fθ,rθ)
|
2239 |
+
Hence, we have
|
2240 |
+
∃
|
2241 |
+
p1,...,pt>0
|
2242 |
+
∃
|
2243 |
+
rφ1 ,...,rφk>0
|
2244 |
+
∀
|
2245 |
+
rθ1,...,rθℓ>0
|
2246 |
+
opt
|
2247 |
+
�
|
2248 |
+
fπ,p fφ,rφ fθ,rθ
|
2249 |
+
�
|
2250 |
+
= opt (fθ,rθ).
|
2251 |
+
21
|
2252 |
+
|
2253 |
+
□
|
2254 |
+
Notation 2 Note
|
2255 |
+
• hr = x + r
|
2256 |
+
• hθ,r = x2 − 2r cos θ x + r2
|
2257 |
+
• P = {f ∈ R[x] : f(x) > 0 for x ≥ 0}
|
2258 |
+
Lemma 16
|
2259 |
+
∀
|
2260 |
+
f∈P, deg(f)=1 opt (f) = b (f)
|
2261 |
+
Proof: Note that b (f) = 0. □
|
2262 |
+
Lemma 17
|
2263 |
+
∀
|
2264 |
+
f∈P, deg(f)=2 opt (f) = b (f)
|
2265 |
+
Proof: By Theorem 1. □
|
2266 |
+
Lemma 18
|
2267 |
+
∀
|
2268 |
+
f∈P, deg(f)≥1 ∃
|
2269 |
+
r>0 opt (hr f) = opt (hr) + opt (f)
|
2270 |
+
Proof: Let f ∈ P. Let h = hr f. We need to show ∃
|
2271 |
+
r>0 opt(h) = opt(f). We will divide the proof into several
|
2272 |
+
claims.
|
2273 |
+
C1:
|
2274 |
+
∃
|
2275 |
+
r>0 opt(h) = opt(f)
|
2276 |
+
⇐=
|
2277 |
+
∃
|
2278 |
+
r>0 CH(T ∗
|
2279 |
+
h,0, . . . , T ∗
|
2280 |
+
h,s−1) ∩ Rn
|
2281 |
+
≥0 = ∅
|
2282 |
+
where
|
2283 |
+
• n = deg (f)
|
2284 |
+
• s = opt(f)
|
2285 |
+
• The Th,i are the rows of Ts−1 for h.
|
2286 |
+
• T ∗
|
2287 |
+
h,i is obtained from Th,i by deleting the first element.
|
2288 |
+
Proof: Note
|
2289 |
+
opt(h) = opt(f)
|
2290 |
+
⇐⇒
|
2291 |
+
opt(h) ≥ s
|
2292 |
+
since
|
2293 |
+
opt(h) ≤ opt(f) + opt(x + r) = opt(f) = s
|
2294 |
+
⇐⇒
|
2295 |
+
¬
|
2296 |
+
∃
|
2297 |
+
g̸=0, deg(g)<s coeffs(gh) ≥ 0
|
2298 |
+
⇐⇒
|
2299 |
+
¬
|
2300 |
+
�
|
2301 |
+
CH(Th,0, . . . , Th,s−1) ∩ Rn+1
|
2302 |
+
≥0
|
2303 |
+
̸= ∅
|
2304 |
+
�
|
2305 |
+
⇐⇒
|
2306 |
+
CH(Th,0, . . . , Th,s−1) ∩ Rn+1
|
2307 |
+
≥0
|
2308 |
+
= ∅
|
2309 |
+
⇐=
|
2310 |
+
CH(T ∗
|
2311 |
+
h,0, . . . , T ∗
|
2312 |
+
h,s−1) ∩ Rn
|
2313 |
+
≥0 = ∅.
|
2314 |
+
C2:
|
2315 |
+
∃
|
2316 |
+
r>0 opt(h) = opt(f)
|
2317 |
+
⇐=
|
2318 |
+
∃
|
2319 |
+
r>0εh (r) > 0
|
2320 |
+
where εh (r) stands for the minimum Euclidean distance between CH(T ∗
|
2321 |
+
h,0, . . . , T ∗
|
2322 |
+
h,s−1) and Rn
|
2323 |
+
≥0, that
|
2324 |
+
is,
|
2325 |
+
εh(r) :=
|
2326 |
+
min
|
2327 |
+
x∈CH(T ∗
|
2328 |
+
h,0,...,T ∗
|
2329 |
+
h,s−1)
|
2330 |
+
y∈Rn
|
2331 |
+
≥0
|
2332 |
+
∥x − y∥
|
2333 |
+
Proof: Immediate from the above claim.
|
2334 |
+
22
|
2335 |
+
|
2336 |
+
C3: εh (r) is continuous at r = 0.
|
2337 |
+
Proof: We will divide it into several steps.
|
2338 |
+
(a) Note
|
2339 |
+
εh(r) =
|
2340 |
+
min
|
2341 |
+
c∈Rs
|
2342 |
+
≥0
|
2343 |
+
c0+···+cs−1=1
|
2344 |
+
y∈Rn
|
2345 |
+
≥0
|
2346 |
+
�����
|
2347 |
+
s−1
|
2348 |
+
�
|
2349 |
+
i=0
|
2350 |
+
ciT ∗
|
2351 |
+
h,i − y
|
2352 |
+
�����
|
2353 |
+
=
|
2354 |
+
min
|
2355 |
+
c∈Rs
|
2356 |
+
≥0
|
2357 |
+
c0+···+cs−1=1
|
2358 |
+
y∈Rn
|
2359 |
+
≥0
|
2360 |
+
�����
|
2361 |
+
�s−1
|
2362 |
+
�
|
2363 |
+
i=0
|
2364 |
+
ciT ∗
|
2365 |
+
h,i,1 − y1 , . . . ,
|
2366 |
+
s−1
|
2367 |
+
�
|
2368 |
+
i=0
|
2369 |
+
ciT ∗
|
2370 |
+
h,i,n − yn
|
2371 |
+
������
|
2372 |
+
=
|
2373 |
+
min
|
2374 |
+
z∈Rs+n
|
2375 |
+
≥0
|
2376 |
+
z0+···+zs−1=1
|
2377 |
+
�����
|
2378 |
+
�s−1
|
2379 |
+
�
|
2380 |
+
i=0
|
2381 |
+
ziT ∗
|
2382 |
+
h,i,1 − zs , . . . ,
|
2383 |
+
s−1
|
2384 |
+
�
|
2385 |
+
i=0
|
2386 |
+
ziT ∗
|
2387 |
+
h,i,n − zs+n−1
|
2388 |
+
������
|
2389 |
+
where z = (c, y)
|
2390 |
+
= min
|
2391 |
+
z∈C p (z, r)
|
2392 |
+
where p(z, r) is Euclidean distance and
|
2393 |
+
C =
|
2394 |
+
�
|
2395 |
+
z ∈ Rs+n
|
2396 |
+
≥0 : z1 + · · · + zs = 1
|
2397 |
+
�
|
2398 |
+
.
|
2399 |
+
(b) Note, since p(z, r) is the distance between two closed sets, the minimum distance is realized by a
|
2400 |
+
point in each set. Hence,
|
2401 |
+
εh(r) = min
|
2402 |
+
z∈C p (z, r) = inf
|
2403 |
+
z∈C p (z, r) .
|
2404 |
+
(c) Note the following:
|
2405 |
+
i. By Section 3.1.5 of [2], p(z, r) is a convex function since p(z, r) is a norm.
|
2406 |
+
ii. By Section 3.2.5 of [2], εh(r) = inf
|
2407 |
+
z∈C p (z, r) is a convex function, since C is convex and p(z, r)
|
2408 |
+
is bounded below.
|
2409 |
+
iii. By Corollary 3.5.3 in [4], since εh(r) is a convex function defined on a convex set R, εh(r) is
|
2410 |
+
continuous on the relative interior of R, ri (R) = R.
|
2411 |
+
iv. Hence, εh(r) is continuous at r = 0.
|
2412 |
+
C4: εh (0) > 0.
|
2413 |
+
Proof: Let r = 0. Then h = x · f.
|
2414 |
+
(a) Subclaim: T ∗
|
2415 |
+
h,i,j = Tf,i,j. Note that these are the entries of T ∗
|
2416 |
+
h,s−1 and Tf,s−1. We will prove the
|
2417 |
+
claim using the fact that Ts−1 = R−1
|
2418 |
+
s−1Ls−1 for any f.
|
2419 |
+
i. Note Rf,s−1 = Rh,s−1. This is clear from the definition of Rs−1. Hence R−1
|
2420 |
+
f,s−1 = R−1
|
2421 |
+
h,s−1.
|
2422 |
+
ii. Note that Lf,i,j = Lh,i,j+1. This is clear from the definition of Ls−1, since Lh,s−1 is composed
|
2423 |
+
of Lf,s−1 with a column of zeroes added on the left.
|
2424 |
+
iii. Note that for i = 0, . . . , s − 1 and j = 0, . . . , n − 1,
|
2425 |
+
T ∗
|
2426 |
+
h,i,j = Th,i,j+1
|
2427 |
+
=
|
2428 |
+
s−1
|
2429 |
+
�
|
2430 |
+
k=0
|
2431 |
+
R−1
|
2432 |
+
h,i,kLh,k,j+1
|
2433 |
+
23
|
2434 |
+
|
2435 |
+
=
|
2436 |
+
s−1
|
2437 |
+
�
|
2438 |
+
k=0
|
2439 |
+
R−1
|
2440 |
+
f,i,kLf,k,j
|
2441 |
+
= Tf,i,j
|
2442 |
+
Hence T ∗
|
2443 |
+
h,i,j = Tf,i,j.
|
2444 |
+
(b) Subclaim: εh(0) = εf
|
2445 |
+
where εf stands for the minimum Euclidean distance between CH(Tf,0, . . . , Tf,s−1) and Rn
|
2446 |
+
≥0, that
|
2447 |
+
is,
|
2448 |
+
εf :=
|
2449 |
+
min
|
2450 |
+
x∈CH(Tf,0,...,Tf,s−1)
|
2451 |
+
y∈Rn
|
2452 |
+
≥0
|
2453 |
+
∥x − y∥.
|
2454 |
+
To see this, note
|
2455 |
+
εh(0) =
|
2456 |
+
min
|
2457 |
+
c∈Rs
|
2458 |
+
≥0
|
2459 |
+
c0+···+cs−1=1
|
2460 |
+
y∈Rn
|
2461 |
+
≥0
|
2462 |
+
�����
|
2463 |
+
s−1
|
2464 |
+
�
|
2465 |
+
i=0
|
2466 |
+
ciT ∗
|
2467 |
+
h,i − y
|
2468 |
+
�����
|
2469 |
+
=
|
2470 |
+
min
|
2471 |
+
c∈Rs
|
2472 |
+
≥0
|
2473 |
+
c0+···+cs−1=1
|
2474 |
+
y∈Rn
|
2475 |
+
≥0
|
2476 |
+
�����
|
2477 |
+
s−1
|
2478 |
+
�
|
2479 |
+
i=0
|
2480 |
+
ciTf,i − y
|
2481 |
+
�����
|
2482 |
+
=
|
2483 |
+
min
|
2484 |
+
x∈CH(Tf,0,...,Tf,s−1)
|
2485 |
+
y∈Rn
|
2486 |
+
≥0
|
2487 |
+
∥x − y∥
|
2488 |
+
= εf
|
2489 |
+
(c) Subclaim: εf > 0.
|
2490 |
+
Note since opt (f) = s, we have CH(Tf,0, . . . , Tf,s−1) ∩ Rn
|
2491 |
+
≥0 = ∅. Thus εf > 0.
|
2492 |
+
(d) From the above two subclaims, we have εh (0) > 0.
|
2493 |
+
From the above four claims, we immediately have
|
2494 |
+
∃
|
2495 |
+
r>0 opt(h) = opt(f).
|
2496 |
+
□
|
2497 |
+
Lemma 19
|
2498 |
+
∀
|
2499 |
+
f∈P, deg(f)≥1
|
2500 |
+
∀
|
2501 |
+
π
|
2502 |
+
2 ≤θ< π
|
2503 |
+
1
|
2504 |
+
∃
|
2505 |
+
r>0 opt (hθ,r f) = opt (hθ,r) + opt (f)
|
2506 |
+
Proof: Let f ∈ P and h = hθ,r f. We need to show ∃
|
2507 |
+
r>0 opt(h) = opt(f) since opt(hθ,r) = 0. We will divide
|
2508 |
+
the proof into several claims.
|
2509 |
+
C1:
|
2510 |
+
∃
|
2511 |
+
r>0 opt(h) = opt(f)
|
2512 |
+
⇐=
|
2513 |
+
∃
|
2514 |
+
r>0 CH(T ∗
|
2515 |
+
h,0, . . . , T ∗
|
2516 |
+
h,s−1) ∩ Rn
|
2517 |
+
≥0 = ∅
|
2518 |
+
where
|
2519 |
+
• n = deg (f)
|
2520 |
+
• s = opt(f)
|
2521 |
+
• The Th,i are the rows of Ts−1 for h.
|
2522 |
+
• T ∗
|
2523 |
+
h,i is obtained from Th,i by deleting the first two elements.
|
2524 |
+
24
|
2525 |
+
|
2526 |
+
Proof: Note
|
2527 |
+
opt(h) = opt(f)
|
2528 |
+
⇐⇒
|
2529 |
+
opt(h) ≥ s
|
2530 |
+
since
|
2531 |
+
opt(h) ≤ opt(f) + opt(hr,θ) = opt(f) = s
|
2532 |
+
⇐⇒
|
2533 |
+
¬
|
2534 |
+
∃
|
2535 |
+
g̸=0, deg(g)<s coeffs(gh) ≥ 0
|
2536 |
+
⇐⇒
|
2537 |
+
¬
|
2538 |
+
�
|
2539 |
+
CH(Th,0, . . . , Th,s−1) ∩ Rn+2
|
2540 |
+
≥0
|
2541 |
+
̸= ∅
|
2542 |
+
�
|
2543 |
+
⇐⇒
|
2544 |
+
CH(Th,0, . . . , Th,s−1) ∩ Rn+2
|
2545 |
+
≥0
|
2546 |
+
= ∅
|
2547 |
+
⇐=
|
2548 |
+
CH(T ∗
|
2549 |
+
h,0, . . . , T ∗
|
2550 |
+
h,s−1) ∩ Rn
|
2551 |
+
≥0 = ∅.
|
2552 |
+
C2:
|
2553 |
+
∃
|
2554 |
+
r>0 opt(h) = opt(f)
|
2555 |
+
⇐=
|
2556 |
+
∃
|
2557 |
+
r>0εh (r) > 0
|
2558 |
+
where εh (r) stands for the minimum Euclidean distance between CH(T ∗
|
2559 |
+
h,0, . . . , T ∗
|
2560 |
+
h,s−1) and Rn
|
2561 |
+
≥0, that
|
2562 |
+
is,
|
2563 |
+
εh(r) :=
|
2564 |
+
min
|
2565 |
+
x∈CH(T ∗
|
2566 |
+
h,0,...,T ∗
|
2567 |
+
h,s−1)
|
2568 |
+
y∈Rn
|
2569 |
+
≥0
|
2570 |
+
∥x − y∥
|
2571 |
+
Proof: Immediate from the above claim.
|
2572 |
+
C3: εh (r) is continuous at r = 0.
|
2573 |
+
Proof: We will divide it into several steps.
|
2574 |
+
(a) Note
|
2575 |
+
εh(r) =
|
2576 |
+
min
|
2577 |
+
c∈Rs
|
2578 |
+
≥0
|
2579 |
+
c0+···+cs−1=1
|
2580 |
+
y∈Rn
|
2581 |
+
≥0
|
2582 |
+
�����
|
2583 |
+
s−1
|
2584 |
+
�
|
2585 |
+
i=0
|
2586 |
+
ciT ∗
|
2587 |
+
h,i − y
|
2588 |
+
�����
|
2589 |
+
=
|
2590 |
+
min
|
2591 |
+
c∈Rs
|
2592 |
+
≥0
|
2593 |
+
c0+···+cs−1=1
|
2594 |
+
y∈Rn
|
2595 |
+
≥0
|
2596 |
+
�����
|
2597 |
+
�s−1
|
2598 |
+
�
|
2599 |
+
i=0
|
2600 |
+
ciT ∗
|
2601 |
+
h,i,1 − y1 , . . . ,
|
2602 |
+
s−1
|
2603 |
+
�
|
2604 |
+
i=0
|
2605 |
+
ciT ∗
|
2606 |
+
h,i,n − yn
|
2607 |
+
������
|
2608 |
+
=
|
2609 |
+
min
|
2610 |
+
z∈Rs+n
|
2611 |
+
≥0
|
2612 |
+
z0+···+zs−1=1
|
2613 |
+
�����
|
2614 |
+
�s−1
|
2615 |
+
�
|
2616 |
+
i=0
|
2617 |
+
ziT ∗
|
2618 |
+
h,i,1 − zs , . . . ,
|
2619 |
+
s−1
|
2620 |
+
�
|
2621 |
+
i=0
|
2622 |
+
ziT ∗
|
2623 |
+
h,i,n − zs+n−1
|
2624 |
+
������
|
2625 |
+
where z = (c, y)
|
2626 |
+
= min
|
2627 |
+
z∈C p (z, r)
|
2628 |
+
where p(z, r) is Euclidean distance and
|
2629 |
+
C =
|
2630 |
+
�
|
2631 |
+
z ∈ Rs+n
|
2632 |
+
≥0 : z1 + · · · + zs = 1
|
2633 |
+
�
|
2634 |
+
.
|
2635 |
+
(b) Note, since p(z, r) is the distance between two closed sets, the minimum distance is realized by a
|
2636 |
+
point in each set. Hence,
|
2637 |
+
εh(r) = min
|
2638 |
+
z∈C p (z, r) = inf
|
2639 |
+
z∈C p (z, r) .
|
2640 |
+
(c) Note the following:
|
2641 |
+
i. By Section 3.1.5 of [2], p(z, r) is a convex function since p(z, r) is a norm.
|
2642 |
+
ii. By Section 3.2.5 of [2], εh(r) = inf
|
2643 |
+
z∈C p (z, r) is a convex function, since C is convex and p(z, r)
|
2644 |
+
is bounded below.
|
2645 |
+
25
|
2646 |
+
|
2647 |
+
iii. By Corollary 3.5.3 in [4], since εh(r) is a convex function defined on a convex set R, εh(r) is
|
2648 |
+
continuous on the relative interior of R, ri (R) = R.
|
2649 |
+
iv. Hence, εh(r) is continuous at r = 0.
|
2650 |
+
C4: εh (0) > 0.
|
2651 |
+
Proof: Let r = 0. Then h = x2 · f.
|
2652 |
+
(a) Subclaim: T ∗
|
2653 |
+
h,i,j = Tf,i,j. Note that these are the entries of T ∗
|
2654 |
+
h,s−1 and Tf,s−1. We will prove the
|
2655 |
+
claim using the fact that Ts−1 = R−1
|
2656 |
+
s−1Ls−1 for any f.
|
2657 |
+
i. Note Rf,s−1 = Rh,s−1. This is clear from the definition of Rs−1. Hence R−1
|
2658 |
+
f,s−1 = R−1
|
2659 |
+
h,s−1.
|
2660 |
+
ii. Note that Lf,i,j = Lh,i,j+2. This is clear from the definition of Ls−1, since Lh,s−1 is composed
|
2661 |
+
of Lf,s−1 with two columns of zeroes added on the left.
|
2662 |
+
iii. Note that for i = 0, . . . , s − 1 and j = 0, . . . , n − 1,
|
2663 |
+
T ∗
|
2664 |
+
h,i,j = Th,i,j+2
|
2665 |
+
=
|
2666 |
+
s−1
|
2667 |
+
�
|
2668 |
+
k=0
|
2669 |
+
R−1
|
2670 |
+
h,i,kLh,k,j+2
|
2671 |
+
=
|
2672 |
+
s−1
|
2673 |
+
�
|
2674 |
+
k=0
|
2675 |
+
R−1
|
2676 |
+
f,i,kLf,k,j
|
2677 |
+
= Tf,i,j
|
2678 |
+
Hence T ∗
|
2679 |
+
h,i,j = Tf,i,j.
|
2680 |
+
(b) Subclaim: εh(0) = εf
|
2681 |
+
where εf stands for the minimum Euclidean distance between CH(Tf,0, . . . , Tf,s−1) and Rn
|
2682 |
+
≥0, that
|
2683 |
+
is,
|
2684 |
+
εf :=
|
2685 |
+
min
|
2686 |
+
x∈CH(Tf,0,...,Tf,s−1)
|
2687 |
+
y∈Rn
|
2688 |
+
≥0
|
2689 |
+
∥x − y∥.
|
2690 |
+
To see this, note
|
2691 |
+
εh(0) =
|
2692 |
+
min
|
2693 |
+
c∈Rs
|
2694 |
+
≥0
|
2695 |
+
c0+···+cs−1=1
|
2696 |
+
y∈Rn
|
2697 |
+
≥0
|
2698 |
+
�����
|
2699 |
+
s−1
|
2700 |
+
�
|
2701 |
+
i=0
|
2702 |
+
ciT ���
|
2703 |
+
h,i − y
|
2704 |
+
�����
|
2705 |
+
=
|
2706 |
+
min
|
2707 |
+
c∈Rs
|
2708 |
+
≥0
|
2709 |
+
c0+···+cs−1=1
|
2710 |
+
y∈Rn
|
2711 |
+
≥0
|
2712 |
+
�����
|
2713 |
+
s−1
|
2714 |
+
�
|
2715 |
+
i=0
|
2716 |
+
ciTf,i − y
|
2717 |
+
�����
|
2718 |
+
=
|
2719 |
+
min
|
2720 |
+
x∈CH(Tf,0,...,Tf,s−1)
|
2721 |
+
y∈Rn
|
2722 |
+
≥0
|
2723 |
+
∥x − y∥
|
2724 |
+
= εf
|
2725 |
+
(c) Subclaim: εf > 0.
|
2726 |
+
Note since opt (f) = s, we have CH(Tf,0, . . . , Tf,s−1) ∩ Rn
|
2727 |
+
≥0 = ∅. Thus εf > 0.
|
2728 |
+
(d) From the above two subclaims, we have εh (0) > 0.
|
2729 |
+
From the above four claims, we immediately have
|
2730 |
+
∃
|
2731 |
+
r>0 opt(h) = opt(f).
|
2732 |
+
□
|
2733 |
+
26
|
2734 |
+
|
2735 |
+
References
|
2736 |
+
[1] M. Avendano. Descartes’ rule of signs is exact! Journal of Algebra - J ALGEBRA, 324:2884–2892, 11
|
2737 |
+
2010.
|
2738 |
+
[2] S. Boyd and L. Vandenberghe. Convex optimization. Cambridge University Press, 2004.
|
2739 |
+
[3] D. Curtiss. Recent extensions of descartes rule of signs. Annals of Mathematics, 19(4):251–278, 6 1918.
|
2740 |
+
[4] C. Niculescu and L. Persson. Convex functions and their applications. Springer Verlag New York, 2006.
|
2741 |
+
[5] H. Poincar´e. Sur les ´equations alg´ebriques. Comptes Rendus, 97:1418–1419, 1888.
|
2742 |
+
27
|
2743 |
+
|
FdAyT4oBgHgl3EQfe_hY/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
FdE2T4oBgHgl3EQf-QlB/content/tmp_files/2301.04236v1.pdf.txt
ADDED
@@ -0,0 +1,593 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.04236v1 [math.AP] 10 Jan 2023
|
2 |
+
Infinitely many solutions for Kirchhoff equations with
|
3 |
+
indefinite potential
|
4 |
+
Shuai Jiang a, Shibo Liu b
|
5 |
+
aSchool of Mathematical Sciences, Xiamen University
|
6 |
+
Xiamen 361006, P.R. China
|
7 |
+
bDepartment of Mathematical Sciences, Florida Institute of Technology
|
8 |
+
Melbourne, FL 32901, USA
|
9 |
+
Abstract. We obtain a sequence of solutions converging to zero for the Kirchhoff
|
10 |
+
equation
|
11 |
+
−
|
12 |
+
�
|
13 |
+
1 +
|
14 |
+
ˆ
|
15 |
+
Ω
|
16 |
+
|∇u|2
|
17 |
+
�
|
18 |
+
∆u + V(x)u = f(u),
|
19 |
+
u ∈ H1
|
20 |
+
0(Ω)
|
21 |
+
via truncating technique and a variant of Clark’s theorem due to Liu–Wang, where Ω
|
22 |
+
is a bounded smooth domain Ω ⊂ RN. Similar result for Schr¨odinger-Poisson system
|
23 |
+
on a bounded smooth domain Ω ⊂ R3 is also presented.
|
24 |
+
1. Introduction
|
25 |
+
In a recent paper [8], He and Wu studied the following elliptic boundary value
|
26 |
+
problem
|
27 |
+
−∆u + V(x)u = f (x, u),
|
28 |
+
u ∈ H1
|
29 |
+
0(Ω)
|
30 |
+
with indefinite linear part −∆ + V, where Ω ⊂ RN is a bounded smooth domain and the
|
31 |
+
odd nonlinearity f : Ω × R → R is sublinear at zero:
|
32 |
+
lim
|
33 |
+
|t|→0
|
34 |
+
1
|
35 |
+
t2
|
36 |
+
ˆ t
|
37 |
+
0
|
38 |
+
f (x, s) ds = +∞.
|
39 |
+
Using truncating technique and Liu–Wang’s variant of Clark’s theorem [9, Theorem
|
40 |
+
1.1], they obtained a sequence of solutions conversing to zero in H1
|
41 |
+
0(Ω).
|
42 |
+
Motivated by [8], in this note we consider the following Kirchhoff equation on a
|
43 |
+
bounded smooth domain Ω ⊂ RN,
|
44 |
+
−
|
45 |
+
�
|
46 |
+
1 +
|
47 |
+
ˆ
|
48 |
+
Ω
|
49 |
+
|∇u|2
|
50 |
+
�
|
51 |
+
∆u + V(x)u = f (x, u),
|
52 |
+
u ∈ H1
|
53 |
+
0(Ω).
|
54 |
+
(1.1)
|
55 |
+
We impose the following conditions on the potential V and the nonlinearity f ,
|
56 |
+
(V) V ∈ C(Ω) is bounded;
|
57 |
+
1
|
58 |
+
|
59 |
+
2
|
60 |
+
S. JIANG AND S. LIU
|
61 |
+
( f1) f ∈ C(Ω × R) is subcritical, that is
|
62 |
+
lim
|
63 |
+
|t|→∞
|
64 |
+
f (x, t)t
|
65 |
+
|t|2∗
|
66 |
+
= 0,
|
67 |
+
where 2∗ =
|
68 |
+
2N
|
69 |
+
N − 2 is the critical exponent;
|
70 |
+
( f2) f (x, ·) is odd for all x ∈ Ω, f (x, 0) = 0, and is sublinear at zero:
|
71 |
+
lim
|
72 |
+
|t|→0
|
73 |
+
F(x, t)
|
74 |
+
t2
|
75 |
+
= +∞,
|
76 |
+
where F(x, t) =
|
77 |
+
ˆ t
|
78 |
+
0
|
79 |
+
f (x, s) ds.
|
80 |
+
(1.2)
|
81 |
+
We will prove the following theorem.
|
82 |
+
Theorem 1.1. Suppose (V), (f1) and (f2) hold, then the problem (1.1) possesses a
|
83 |
+
sequence of nontrivial solutions converging to zero.
|
84 |
+
Boundary value problems of the form (1.1) are closely related to the wave equation
|
85 |
+
ψtt −
|
86 |
+
�
|
87 |
+
a + b
|
88 |
+
ˆ
|
89 |
+
Ω
|
90 |
+
|∇ψ|2
|
91 |
+
�
|
92 |
+
∆ψ = g(x, ψ),
|
93 |
+
(t, x) ∈ (0, T) × Ω,
|
94 |
+
which was used by G. Kirchhoff to investigate vibrations of elastic strings with chang-
|
95 |
+
ing length. Starting from Alves et al. [1], where a variational approach is developed
|
96 |
+
to solve (1.1), many existence results for (1.1) appear. For example, Cheng et al. [4]
|
97 |
+
considered the case that V(x) = 0 and the nonlinearity is of the form
|
98 |
+
f (x, t) = α(x) |t|q−2 t + g(x, t),
|
99 |
+
(1.3)
|
100 |
+
where q ∈ (1, 2), g(x, t) = o(|t|) as t → 0. Obviously such f satisfies our assumption
|
101 |
+
( f2). Since they need H1
|
102 |
+
0(Ω) ֒→ Lr(Ω) for r > 4, it is assumed in [4] that N ≤ 3.
|
103 |
+
Furtado and Zanata [7] also considered (1.1) with V(x) = 0 and f as in (1.3); but they
|
104 |
+
only imposed local conditions to g(x, t) for |t| small (g needs not be odd and subcritical
|
105 |
+
for |t| large). Using some idea from Wang [11], they got a sequence of solutions {uk} for
|
106 |
+
the truncated problem with an odd and subcritical ˜g in place of g, ˜g(x, t) = g(x, t) for |t|
|
107 |
+
small; then applied L∞-estimate to show that |uk|∞ → 0 and concluded that for k large
|
108 |
+
uk are solutions of the original problem. Since our problem (1.1) may be indefinite,
|
109 |
+
such L∞-estimate seems not applicable, this is why we need f to be globally odd and
|
110 |
+
subcritical. For more recent papers on Kirchhoff equations, the reader is referred to
|
111 |
+
[5,6,10].
|
112 |
+
When N = 3, for the following Schr¨odinger-Poisson system on a bounded smooth
|
113 |
+
domain Ω
|
114 |
+
|
115 |
+
−∆u + V(x)u + φu = f (x, u)
|
116 |
+
in Ω,
|
117 |
+
−∆φ = u2
|
118 |
+
in Ω,
|
119 |
+
u = φ = 0
|
120 |
+
on ∂Ω,
|
121 |
+
(1.4)
|
122 |
+
we have similar result.
|
123 |
+
Theorem 1.2. Suppose (V), (f1) and (f2) hold, then the problem (1.4) possesses a
|
124 |
+
sequence of nontrivial solutions (un, φn) → (0, 0) in H1
|
125 |
+
0(Ω) × H1
|
126 |
+
0(Ω).
|
127 |
+
Since the seminar work or Benci et al. [3], Schr¨odinger-Poisson system has been
|
128 |
+
an active field of research, for recent work on Schr¨odinger-Poisson system on bounded
|
129 |
+
domain we mention [2,12,13].
|
130 |
+
|
131 |
+
INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL
|
132 |
+
3
|
133 |
+
2. Proof of Theorem 1.1
|
134 |
+
The dependence on x in f (x, u) is not essential in our discussion of (1.1) and (1.4).
|
135 |
+
Therefore in what follows we write f (u) for f (x, u) for simplicity.
|
136 |
+
It is well known that to find weak solutions of (1.1), it suffices to find critical points
|
137 |
+
of the C1-functional Φ : H1
|
138 |
+
0(Ω) → R defined by
|
139 |
+
Φ(u) = 1
|
140 |
+
2
|
141 |
+
ˆ �
|
142 |
+
|∇u|2 + V(x)u
|
143 |
+
�
|
144 |
+
+ 1
|
145 |
+
4
|
146 |
+
�ˆ
|
147 |
+
|∇u|2
|
148 |
+
�2
|
149 |
+
−
|
150 |
+
ˆ
|
151 |
+
F(u),
|
152 |
+
(2.1)
|
153 |
+
here and below the integrals are taken over Ω. Let E−, E0, and E+ be the negative
|
154 |
+
space, null space, and positive space of the quadratic form (the first term) in (2.1). For
|
155 |
+
u ∈ E := H1
|
156 |
+
0(Ω), we always denote by u± and u0 the orthogonal projections of u on E±
|
157 |
+
and E0. Because of the condition (V), there is an equivalent norm ∥ · ∥ on E such that
|
158 |
+
Φ(u) = 1
|
159 |
+
2
|
160 |
+
�
|
161 |
+
∥u+∥2 −
|
162 |
+
���u−���
|
163 |
+
2�
|
164 |
+
+ 1
|
165 |
+
4
|
166 |
+
�ˆ
|
167 |
+
|∇u|2
|
168 |
+
�2
|
169 |
+
−
|
170 |
+
ˆ
|
171 |
+
F(u).
|
172 |
+
We denote by (·, ·) the corresponding inner product.
|
173 |
+
To prove Theorem 1.1 it suffices to find a sequence of critical points of Φ. For this
|
174 |
+
purpose, we need the following variant of the Clark’s theorem due to Liu–Wang [9].
|
175 |
+
Theorem 2.1 ([9, Theorem 1.1]). Let E be a Banach space and Φ ∈ C1(E, R) be an
|
176 |
+
even coercive functional satisfying the (PS ) condition and Φ(0) = 0. If for any k ∈ N,
|
177 |
+
there is an k-dimensional subspace Xk and ρk > 0 such that
|
178 |
+
sup
|
179 |
+
Xk∩S ρk
|
180 |
+
Φ < 0,
|
181 |
+
(2.2)
|
182 |
+
where S r = {u ∈ E| ∥u∥ = r}, then Φ has a sequence of critical points uk � 0 such that
|
183 |
+
Φ(uk) ≤ 0, uk → 0.
|
184 |
+
As pointed out in He–Wu [8, Remark 2.5], in Theorem 2.1, instead of (PS ) con-
|
185 |
+
dition, it suffices to assume (PS )c for c ≤ 0. That is, any sequence {un} such that
|
186 |
+
Φ′(un) → 0 and Φ(un) → c ≤ 0, possesses a convergent subsequence.
|
187 |
+
We need the following lemma.
|
188 |
+
Lemma 2.2. If un ⇀ u in E, then
|
189 |
+
lim
|
190 |
+
n→∞
|
191 |
+
��ˆ
|
192 |
+
|∇un|2
|
193 |
+
� ˆ
|
194 |
+
∇un · ∇(un − u) −
|
195 |
+
�ˆ
|
196 |
+
|∇u|2
|
197 |
+
� ˆ
|
198 |
+
∇u · ∇(un − u)
|
199 |
+
�
|
200 |
+
≥ 0,
|
201 |
+
(2.3)
|
202 |
+
Proof. By direct computation we have
|
203 |
+
�ˆ
|
204 |
+
|∇un|2
|
205 |
+
� ˆ
|
206 |
+
∇un · ∇(un − u) −
|
207 |
+
�ˆ
|
208 |
+
|∇u|2
|
209 |
+
� ˆ
|
210 |
+
∇u · ∇(un − u)
|
211 |
+
=
|
212 |
+
�ˆ
|
213 |
+
|∇un|2
|
214 |
+
� ˆ
|
215 |
+
|∇(un − u)|2 +
|
216 |
+
�ˆ
|
217 |
+
|∇un|2 −
|
218 |
+
ˆ
|
219 |
+
|∇u|2
|
220 |
+
� ˆ
|
221 |
+
∇u · ∇(un − u)
|
222 |
+
≥
|
223 |
+
�ˆ
|
224 |
+
|∇un|2 −
|
225 |
+
ˆ
|
226 |
+
|∇u|2
|
227 |
+
� ˆ
|
228 |
+
∇u · ∇(un − u).
|
229 |
+
|
230 |
+
4
|
231 |
+
S. JIANG AND S. LIU
|
232 |
+
Since un ⇀ u in E, the right hand side goes to zero. The desired result follows from
|
233 |
+
taking lower limit on both sides of the above inequality.
|
234 |
+
Now, we are ready to prove Theorem 1.1.
|
235 |
+
Proof (
|
236 |
+
Proof of Theorem 1.1). Let φ : [0, ∞) → R be a decreasing C∞-function
|
237 |
+
such that |φ′(t)| ≤ 2,
|
238 |
+
φ(t) = 1
|
239 |
+
for t ∈ [0, 1] ,
|
240 |
+
φ(t) = 0
|
241 |
+
for t ≥ 2.
|
242 |
+
We consider the following truncated functional I : E → R, which is a modification of
|
243 |
+
the truncated functional used in [8],
|
244 |
+
I(u) = 1
|
245 |
+
2 ∥u∥2 − 1
|
246 |
+
2
|
247 |
+
�
|
248 |
+
∥u∗∥2 + 2
|
249 |
+
ˆ
|
250 |
+
F(u)
|
251 |
+
�
|
252 |
+
φ(∥u∥2) + 1
|
253 |
+
4
|
254 |
+
�ˆ
|
255 |
+
|∇u|2
|
256 |
+
�2
|
257 |
+
,
|
258 |
+
(2.4)
|
259 |
+
where u∗ = u− + u0 ∈ E− ⊕ E0. The derivative I′ is given by
|
260 |
+
⟨I′(u), v⟩ =
|
261 |
+
�
|
262 |
+
1 −
|
263 |
+
�
|
264 |
+
∥u∗∥2 + 2
|
265 |
+
ˆ
|
266 |
+
F(u)
|
267 |
+
�
|
268 |
+
φ′(∥u∥2)
|
269 |
+
�
|
270 |
+
(u, v)
|
271 |
+
−
|
272 |
+
�
|
273 |
+
(u∗, v∗) +
|
274 |
+
ˆ
|
275 |
+
f (u)v
|
276 |
+
�
|
277 |
+
φ(∥u∥2) +
|
278 |
+
�ˆ
|
279 |
+
|∇u|2
|
280 |
+
� ˆ
|
281 |
+
∇u · ∇v
|
282 |
+
(2.5)
|
283 |
+
for u, v ∈ E.
|
284 |
+
We will apply Theorem 2.1 to I to get a sequence of critical points {uk} for I such
|
285 |
+
that
|
286 |
+
I(uk) ≤ 0,
|
287 |
+
uk → 0.
|
288 |
+
Since I(u) = Φ(u) for ∥u∥ ≤ 1, we see that for large k all the uk are critical points of Φ
|
289 |
+
and Theorem 1.1 is proved.
|
290 |
+
Obviously I is even. If ∥u∥ ≥ 2, then φ(∥u∥2) = 0. Hence
|
291 |
+
I(u) = 1
|
292 |
+
2 ∥u∥2 + 1
|
293 |
+
4
|
294 |
+
�ˆ
|
295 |
+
|∇u|2
|
296 |
+
�2
|
297 |
+
≥ 1
|
298 |
+
2 ∥u∥2 → +∞,
|
299 |
+
as ∥u∥ → ∞.
|
300 |
+
This means that I is coercive.
|
301 |
+
To verify (PS )c for c ≤ 0, let {un} be a sequence in E such that I(un) → c ≤ 0,
|
302 |
+
I′(un) → 0. Since I is coercive, {un} is bounded in E. Up to a subsequence, we may
|
303 |
+
assume that un ⇀ u in E. Then
|
304 |
+
−
|
305 |
+
����u∗
|
306 |
+
n
|
307 |
+
���
|
308 |
+
2 + 2
|
309 |
+
ˆ
|
310 |
+
F(un)
|
311 |
+
�
|
312 |
+
φ(∥un∥2) = 2I(un) − ∥un∥2 − 1
|
313 |
+
2
|
314 |
+
�ˆ
|
315 |
+
|∇un|2
|
316 |
+
�2
|
317 |
+
≤ 0.
|
318 |
+
Hence
|
319 |
+
���u∗
|
320 |
+
n
|
321 |
+
���
|
322 |
+
2 + 2
|
323 |
+
ˆ
|
324 |
+
F(un) ≥ 0.
|
325 |
+
(2.6)
|
326 |
+
Because φ′(∥un∥2) ≤ 0 and
|
327 |
+
lim
|
328 |
+
n→∞
|
329 |
+
(un, un − u) = lim
|
330 |
+
n→∞
|
331 |
+
∥un∥2 − ∥u∥2 ≥ 0,
|
332 |
+
|
333 |
+
INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL
|
334 |
+
5
|
335 |
+
up to a further subsequence we may assume
|
336 |
+
����u∗
|
337 |
+
n
|
338 |
+
���
|
339 |
+
2 + 2
|
340 |
+
ˆ
|
341 |
+
F(un)
|
342 |
+
�
|
343 |
+
φ′(∥un∥2) (un, un − u) −→ α ≤ 0,
|
344 |
+
(2.7)
|
345 |
+
note here that by the boundedness of {un}, the coefficient of (un, un − u) is bounded.
|
346 |
+
Thanks to Lemma 2.2, we may also assume
|
347 |
+
�ˆ
|
348 |
+
|∇un|2
|
349 |
+
� ˆ
|
350 |
+
∇un · ∇(un − u) −
|
351 |
+
�ˆ
|
352 |
+
|∇u|2
|
353 |
+
� ˆ
|
354 |
+
∇u · ∇(un − u) −→ β ≥ 0.
|
355 |
+
(2.8)
|
356 |
+
From the subcritical assumption (f1) and the compact embedding E ֒→ L2(Ω), it is well
|
357 |
+
known that
|
358 |
+
ˆ
|
359 |
+
f (un) (un − u) → 0,
|
360 |
+
ˆ
|
361 |
+
f (u) (un − u) → 0.
|
362 |
+
(2.9)
|
363 |
+
Finally, because dim(E− ⊕ E0) < ∞, we also have
|
364 |
+
�u∗
|
365 |
+
n, u∗
|
366 |
+
n − u∗� → 0,
|
367 |
+
�u∗, u∗
|
368 |
+
n − u∗� → 0.
|
369 |
+
(2.10)
|
370 |
+
Computing ⟨I′(un), un − u⟩ and ⟨I′(u), un − u⟩ via (2.5) then subtracting the results, we
|
371 |
+
deduce from (2.7), (2.8), (2.9) and (2.10) that
|
372 |
+
∥un − u∥2 = ⟨I′(un) − I′(u), un − u⟩
|
373 |
+
+
|
374 |
+
����u∗
|
375 |
+
n
|
376 |
+
���
|
377 |
+
2 + 2
|
378 |
+
ˆ
|
379 |
+
F(un)
|
380 |
+
�
|
381 |
+
φ′(∥un∥2) (un, un − u)
|
382 |
+
−
|
383 |
+
�
|
384 |
+
∥u∗∥2 + 2
|
385 |
+
ˆ
|
386 |
+
F(u)
|
387 |
+
�
|
388 |
+
φ′(∥u∥2) (u, un − u)
|
389 |
+
+
|
390 |
+
��u∗
|
391 |
+
n, u∗
|
392 |
+
n − u∗� +
|
393 |
+
ˆ
|
394 |
+
f (un) (un − u)
|
395 |
+
�
|
396 |
+
φ(∥un∥2)
|
397 |
+
−
|
398 |
+
��u∗, u∗
|
399 |
+
n − u∗� +
|
400 |
+
ˆ
|
401 |
+
f (u) (un − u)
|
402 |
+
�
|
403 |
+
φ(∥u∥2)
|
404 |
+
−
|
405 |
+
�ˆ
|
406 |
+
|∇un|2
|
407 |
+
� ˆ
|
408 |
+
∇un · ∇(un − u) +
|
409 |
+
�ˆ
|
410 |
+
|∇u|2
|
411 |
+
� ˆ
|
412 |
+
∇u · ∇(un − u)
|
413 |
+
= �o(1) + α − β� → (α − β) ≤ 0.
|
414 |
+
(2.11)
|
415 |
+
It follows that un → u in E and I satisfies (PS )c for c ≤ 0.
|
416 |
+
Finally, for k ∈ N, let Xk be an arbitrary k-dimensional subspace of E. There is
|
417 |
+
Λk > 0 such that
|
418 |
+
|u|2
|
419 |
+
2 ≥ Λk ∥u∥2
|
420 |
+
for u ∈ Xk.
|
421 |
+
There is also a constant η > 0 such that for all u ∈ E we have
|
422 |
+
ˆ
|
423 |
+
|∇u|2 ≤ η ∥u∥2 .
|
424 |
+
From (f2), there is δ > 0 such that
|
425 |
+
F(t) ≥ 1 + η2
|
426 |
+
Λk
|
427 |
+
t2
|
428 |
+
for t ∈ (−δ, δ) .
|
429 |
+
(2.12)
|
430 |
+
|
431 |
+
6
|
432 |
+
S. JIANG AND S. LIU
|
433 |
+
Take ρk ∈ (0, 1) such that if u ∈ Xk, ∥u∥ = ρk, then |u|∞ < δ. For u ∈ Xk ∩ S ρk we have
|
434 |
+
|u(x)| ≤ δ for all x ∈ Ω. Hence by (2.12),
|
435 |
+
I(u) = Φ(u) = 1
|
436 |
+
2
|
437 |
+
�
|
438 |
+
∥u+∥2 −
|
439 |
+
���u−���
|
440 |
+
2�
|
441 |
+
+ 1
|
442 |
+
4
|
443 |
+
�ˆ
|
444 |
+
|∇u|2
|
445 |
+
�2
|
446 |
+
−
|
447 |
+
ˆ
|
448 |
+
F(u)
|
449 |
+
≤ ∥u∥2 + η2
|
450 |
+
4 ∥u∥4 − 1 + η2
|
451 |
+
Λk
|
452 |
+
ˆ
|
453 |
+
u2
|
454 |
+
≤ η2
|
455 |
+
4 ρ4
|
456 |
+
k − η2ρ2
|
457 |
+
k ≤ −3η2
|
458 |
+
4 ρ2
|
459 |
+
k.
|
460 |
+
Thus
|
461 |
+
sup
|
462 |
+
Xk∩S ρk
|
463 |
+
I ≤ −3η2
|
464 |
+
4 ρ2
|
465 |
+
k < 0.
|
466 |
+
Now, by Theorem 2.1, I has a sequence of critical points {uk} such that uk → 0 in E.
|
467 |
+
For some k0, if k ≥ k0 then ∥uk∥ < 1 and uk is a critical point of Φ. Hence Φ has a
|
468 |
+
sequence of critical points {uk}k≥k0 converging to zero.
|
469 |
+
3. Proof of Theorem 1.2
|
470 |
+
Given u ∈ E, let φu be the solution of the second equation in the system (1.4). It is
|
471 |
+
well known that if u ∈ E is a critical point of Φ : E → R,
|
472 |
+
Φ(u) = 1
|
473 |
+
2
|
474 |
+
ˆ �
|
475 |
+
|∇u|2 + V(x)u2�
|
476 |
+
+ 1
|
477 |
+
4
|
478 |
+
ˆ
|
479 |
+
φuu2 −
|
480 |
+
ˆ
|
481 |
+
F(u)
|
482 |
+
= 1
|
483 |
+
2
|
484 |
+
�
|
485 |
+
∥u+∥2 −
|
486 |
+
���u−���
|
487 |
+
2�
|
488 |
+
+ 1
|
489 |
+
4
|
490 |
+
ˆ
|
491 |
+
φuu2 −
|
492 |
+
ˆ
|
493 |
+
F(u),
|
494 |
+
then (u, φu) is a solution of (1.4), this idea was initiated from Benci et al. [3]. Similar
|
495 |
+
to (2.4) we consider a truncated functional I : E → R
|
496 |
+
I(u) = 1
|
497 |
+
2 ∥u∥2 − 1
|
498 |
+
2
|
499 |
+
�
|
500 |
+
∥u∗∥2 + 2
|
501 |
+
ˆ
|
502 |
+
F(u)
|
503 |
+
�
|
504 |
+
φ(∥u∥2) + 1
|
505 |
+
4
|
506 |
+
ˆ
|
507 |
+
φuu2.
|
508 |
+
Then I is an even coercive functional with I(0) = 0. Similar to the last section, using
|
509 |
+
( f2), for k-dimensional subspace Xk there is ρk > 0 such that (2.2) holds.
|
510 |
+
To verify the (PS )c condition with c ≤ 0 for I, we need the following analogue of
|
511 |
+
Lemma 2.2.
|
512 |
+
Lemma 3.1. If un ⇀ u in E, then
|
513 |
+
lim
|
514 |
+
n→∞
|
515 |
+
�ˆ
|
516 |
+
φunun (un − u) −
|
517 |
+
ˆ
|
518 |
+
φuu (un − u)
|
519 |
+
�
|
520 |
+
= 0.
|
521 |
+
(3.1)
|
522 |
+
Proof. It is well known that φu is obtained from applying Riesz lemma to the func-
|
523 |
+
tional ℓu : v �→
|
524 |
+
´
|
525 |
+
u2v on E. Thus
|
526 |
+
∥φu∥ = ∥ℓu∥ = sup
|
527 |
+
∥v∥=1
|
528 |
+
�����
|
529 |
+
ˆ
|
530 |
+
u2v
|
531 |
+
�����
|
532 |
+
≤ sup
|
533 |
+
∥v∥=1
|
534 |
+
�
|
535 |
+
|u2|3 |v|3/2
|
536 |
+
�
|
537 |
+
= |u|2
|
538 |
+
6 sup
|
539 |
+
∥v∥=1
|
540 |
+
|v|3/2 ≤ C ∥u∥2 .
|
541 |
+
(3.2)
|
542 |
+
|
543 |
+
INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL
|
544 |
+
7
|
545 |
+
Since {un} is bounded, we know that �φun
|
546 |
+
� is also bounded in E. By the compactness of
|
547 |
+
the embedding E ֒→ L12/5(Ω), up to a subsequence we have un → u in L12/5(Ω). Hence
|
548 |
+
�����
|
549 |
+
ˆ
|
550 |
+
φunun (un − u)
|
551 |
+
����� ≤
|
552 |
+
���φun
|
553 |
+
���6 |un|12/5 |un − u|12/5 → 0,
|
554 |
+
because �φun
|
555 |
+
� and {un} are bounded in L6(Ω) and L12/5(Ω), respectively. Similarly, the
|
556 |
+
second integral in (3.1) vanishes as n → ∞.
|
557 |
+
Let {un} be a (PS )c sequence of Φ with c ≤ 0. It is easy to see that (2.6) still holds
|
558 |
+
in current situation, thus we have (2.7). Using (2.7), (2.9), (2.10), and Lemma 3.1 we
|
559 |
+
have an analogue of (2.11)
|
560 |
+
∥un − u∥2 → α ≤ 0.
|
561 |
+
Thus un → u in E and (PS )c is verified. Applying Theorem 2.1, I has a sequence of
|
562 |
+
critical points uk → 0. Since I(u) = Φ(u) for ∥u∥ ≤ 1, for large k, uk is critical point of
|
563 |
+
Φ. Thus Φ has a sequence of critical points uk → 0 in E. From (3.2) we have φuk → 0
|
564 |
+
in E. Thus (1.4) has a sequence of solutions (uk, φuk) → (0, 0) in E × E.
|
565 |
+
References
|
566 |
+
[1] C. O. Alves, F. J. S. A. Corrˆea, and T. F. Ma, Positive solutions for a quasilinear elliptic equation
|
567 |
+
of Kirchhoff type, Comput. Math. Appl., 49 (2005), pp. 85–93.
|
568 |
+
[2] C. O. Alves and M. A. S. Souto, Existence of least energy nodal solution for a Schr¨odinger-Poisson
|
569 |
+
system in bounded domains, Z. Angew. Math. Phys., 65 (2014), pp. 1153–1166.
|
570 |
+
[3] V. Benci and D. Fortunato, An eigenvalue problem for the Schr¨odinger-Maxwell equations, Topol.
|
571 |
+
Methods Nonlinear Anal., 11 (1998), pp. 283–293.
|
572 |
+
[4] B. Cheng, X. Wu, and J. Liu, Multiple solutions for a class of Kirchhoff type problems with concave
|
573 |
+
nonlinearity, NoDEA Nonlinear Differential Equations Appl., 19 (2012), pp. 521–537.
|
574 |
+
[5] F. Faraci and K. Silva, On the Brezis-Nirenberg problem for a Kirchhoff type equation in high
|
575 |
+
dimension, Calc. Var. Partial Differential Equations, 60 (2021), pp. Paper No. 22, 33.
|
576 |
+
[6] M. C. Ferreira and P. Ubilla, A critical concave-convex Kirchhoff-type equation in R4 involving
|
577 |
+
potentials which may vanish at infinity, Ann. Henri Poincar´e, 23 (2022), pp. 25–47.
|
578 |
+
[7] M. F. Furtado and H. R. Zanata, Multiple solutions for a Kirchhoff equation with nonlinearity
|
579 |
+
having arbitrary growth, Bull. Aust. Math. Soc., 96 (2017), pp. 98–109.
|
580 |
+
[8] W. He and Q. Wu, Multiplicity results for sublinear elliptic equations with sign-changing potential
|
581 |
+
and general nonlinearity, Bound. Value Probl., (2020), pp. Paper No. 159, 9.
|
582 |
+
[9] Z. Liu and Z.-Q. Wang, On Clark’s theorem and its applications to partially sublinear problems,
|
583 |
+
Ann. Inst. H. Poincar´e Anal. Non Lin´eaire, 32 (2015), pp. 1015–1037.
|
584 |
+
[10] R. Pei and C. Ma, Multiple solutions for a Kirchhoff-type equation, Mediterr. J. Math., 17 (2020),
|
585 |
+
pp. Paper No. 78, 16.
|
586 |
+
[11] Z.-Q. Wang, Nonlinear boundary value problems with concave nonlinearities near the origin,
|
587 |
+
NoDEA Nonlinear Differential Equations Appl., 8 (2001), pp. 15–33.
|
588 |
+
[12] Z.-L. Yang and Z.-Q. Ou, Nodal solutions for Schr¨odinger-Poisson systems with concave-convex
|
589 |
+
nonlinearities, J. Math. Anal. Appl., 499 (2021), pp. Paper No. 125006, 15.
|
590 |
+
[13] S. Yu and Z. Zhang, Sufficient and necessary conditions for ground state sign-changing solutions
|
591 |
+
to the Schr¨odinger-Poisson system with cubic nonlinearity on bounded domains, Appl. Math. Lett.,
|
592 |
+
123 (2022), pp. Paper No. 107570, 5.
|
593 |
+
|
FdE2T4oBgHgl3EQf-QlB/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,300 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf,len=299
|
2 |
+
page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
3 |
+
page_content='04236v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
4 |
+
page_content='AP] 10 Jan 2023 Infinitely many solutions for Kirchhoff equations with indefinite potential Shuai Jiang a, Shibo Liu b aSchool of Mathematical Sciences, Xiamen University Xiamen 361006, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
5 |
+
page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
6 |
+
page_content=' China bDepartment of Mathematical Sciences, Florida Institute of Technology Melbourne, FL 32901, USA Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
7 |
+
page_content=' We obtain a sequence of solutions converging to zero for the Kirchhoff equation − � 1 + ˆ Ω |∇u|2 � ∆u + V(x)u = f(u), u ∈ H1 0(Ω) via truncating technique and a variant of Clark’s theorem due to Liu–Wang, where Ω is a bounded smooth domain Ω ⊂ RN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
8 |
+
page_content=' Similar result for Schr¨odinger-Poisson system on a bounded smooth domain Ω ⊂ R3 is also presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
9 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
10 |
+
page_content=' Introduction In a recent paper [8], He and Wu studied the following elliptic boundary value problem −∆u + V(x)u = f (x, u), u ∈ H1 0(Ω) with indefinite linear part −∆ + V, where Ω ⊂ RN is a bounded smooth domain and the odd nonlinearity f : Ω × R → R is sublinear at zero: lim |t|→0 1 t2 ˆ t 0 f (x, s) ds = +∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
11 |
+
page_content=' Using truncating technique and Liu–Wang’s variant of Clark’s theorem [9, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
12 |
+
page_content='1], they obtained a sequence of solutions conversing to zero in H1 0(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
13 |
+
page_content=' Motivated by [8], in this note we consider the following Kirchhoff equation on a bounded smooth domain Ω ⊂ RN, − � 1 + ˆ Ω |∇u|2 � ∆u + V(x)u = f (x, u), u ∈ H1 0(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
14 |
+
page_content=' (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
15 |
+
page_content='1) We impose the following conditions on the potential V and the nonlinearity f , (V) V ∈ C(Ω) is bounded;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
16 |
+
page_content=' 1 2 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
17 |
+
page_content=' JIANG AND S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
18 |
+
page_content=' LIU ( f1) f ∈ C(Ω × R) is subcritical, that is lim |t|→∞ f (x, t)t |t|2∗ = 0, where 2∗ = 2N N − 2 is the critical exponent;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
19 |
+
page_content=' ( f2) f (x, ·) is odd for all x ∈ Ω, f (x, 0) = 0, and is sublinear at zero: lim |t|→0 F(x, t) t2 = +∞, where F(x, t) = ˆ t 0 f (x, s) ds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
20 |
+
page_content=' (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
21 |
+
page_content='2) We will prove the following theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
22 |
+
page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
23 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
24 |
+
page_content=' Suppose (V), (f1) and (f2) hold, then the problem (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
25 |
+
page_content='1) possesses a sequence of nontrivial solutions converging to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
26 |
+
page_content=' Boundary value problems of the form (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
27 |
+
page_content='1) are closely related to the wave equation ψtt − � a + b ˆ Ω |∇ψ|2 � ∆ψ = g(x, ψ), (t, x) ∈ (0, T) × Ω, which was used by G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
28 |
+
page_content=' Kirchhoff to investigate vibrations of elastic strings with chang- ing length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
29 |
+
page_content=' Starting from Alves et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
30 |
+
page_content=' [1], where a variational approach is developed to solve (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
31 |
+
page_content='1), many existence results for (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
32 |
+
page_content='1) appear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
33 |
+
page_content=' For example, Cheng et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
34 |
+
page_content=' [4] considered the case that V(x) = 0 and the nonlinearity is of the form f (x, t) = α(x) |t|q−2 t + g(x, t), (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
35 |
+
page_content='3) where q ∈ (1, 2), g(x, t) = o(|t|) as t → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
36 |
+
page_content=' Obviously such f satisfies our assumption ( f2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
37 |
+
page_content=' Since they need H1 0(Ω) ֒→ Lr(Ω) for r > 4, it is assumed in [4] that N ≤ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
38 |
+
page_content=' Furtado and Zanata [7] also considered (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
39 |
+
page_content='1) with V(x) = 0 and f as in (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
40 |
+
page_content='3);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
41 |
+
page_content=' but they only imposed local conditions to g(x, t) for |t| small (g needs not be odd and subcritical for |t| large).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
42 |
+
page_content=' Using some idea from Wang [11], they got a sequence of solutions {uk} for the truncated problem with an odd and subcritical ˜g in place of g, ˜g(x, t) = g(x, t) for |t| small;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
43 |
+
page_content=' then applied L∞-estimate to show that |uk|∞ → 0 and concluded that for k large uk are solutions of the original problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
44 |
+
page_content=' Since our problem (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
45 |
+
page_content='1) may be indefinite, such L∞-estimate seems not applicable, this is why we need f to be globally odd and subcritical.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
46 |
+
page_content=' For more recent papers on Kirchhoff equations, the reader is referred to [5,6,10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
47 |
+
page_content=' When N = 3, for the following Schr¨odinger-Poisson system on a bounded smooth domain Ω \uf8f1\uf8f4\uf8f4\uf8f4\uf8f2\uf8f4\uf8f4\uf8f4\uf8f3 −∆u + V(x)u + φu = f (x, u) in Ω, −∆φ = u2 in Ω, u = φ = 0 on ∂Ω, (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
48 |
+
page_content='4) we have similar result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
49 |
+
page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
50 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
51 |
+
page_content=' Suppose (V), (f1) and (f2) hold, then the problem (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
52 |
+
page_content='4) possesses a sequence of nontrivial solutions (un, φn) → (0, 0) in H1 0(Ω) × H1 0(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
53 |
+
page_content=' Since the seminar work or Benci et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
54 |
+
page_content=' [3], Schr¨odinger-Poisson system has been an active field of research, for recent work on Schr¨odinger-Poisson system on bounded domain we mention [2,12,13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
55 |
+
page_content=' INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL 3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
56 |
+
page_content=' Proof of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
57 |
+
page_content='1 The dependence on x in f (x, u) is not essential in our discussion of (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
58 |
+
page_content='1) and (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
59 |
+
page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
60 |
+
page_content=' Therefore in what follows we write f (u) for f (x, u) for simplicity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
61 |
+
page_content=' It is well known that to find weak solutions of (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
62 |
+
page_content='1), it suffices to find critical points of the C1-functional Φ : H1 0(Ω) → R defined by Φ(u) = 1 2 ˆ � |∇u|2 + V(x)u � + 1 4 �ˆ |∇u|2 �2 − ˆ F(u), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
63 |
+
page_content='1) here and below the integrals are taken over Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
64 |
+
page_content=' Let E−, E0, and E+ be the negative space, null space, and positive space of the quadratic form (the first term) in (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
65 |
+
page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
66 |
+
page_content=' For u ∈ E := H1 0(Ω), we always denote by u± and u0 the orthogonal projections of u on E± and E0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
67 |
+
page_content=' Because of the condition (V), there is an equivalent norm ∥ · ∥ on E such that Φ(u) = 1 2 � ∥u+∥2 − ���u−��� 2� + 1 4 �ˆ |∇u|2 �2 − ˆ F(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
68 |
+
page_content=' We denote by (·, ·) the corresponding inner product.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
69 |
+
page_content=' To prove Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
70 |
+
page_content='1 it suffices to find a sequence of critical points of Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
71 |
+
page_content=' For this purpose, we need the following variant of the Clark’s theorem due to Liu–Wang [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
72 |
+
page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
73 |
+
page_content='1 ([9, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
74 |
+
page_content='1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
75 |
+
page_content=' Let E be a Banach space and Φ ∈ C1(E, R) be an even coercive functional satisfying the (PS ) condition and Φ(0) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
76 |
+
page_content=' If for any k ∈ N, there is an k-dimensional subspace Xk and ρk > 0 such that sup Xk∩S ρk Φ < 0, (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
77 |
+
page_content='2) where S r = {u ∈ E| ∥u∥ = r}, then Φ has a sequence of critical points uk � 0 such that Φ(uk) ≤ 0, uk → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
78 |
+
page_content=' As pointed out in He–Wu [8, Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
79 |
+
page_content='5], in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
80 |
+
page_content='1, instead of (PS ) con- dition, it suffices to assume (PS )c for c ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
81 |
+
page_content=' That is, any sequence {un} such that Φ′(un) → 0 and Φ(un) → c ≤ 0, possesses a convergent subsequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
82 |
+
page_content=' We need the following lemma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
83 |
+
page_content=' Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
84 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
85 |
+
page_content=' If un ⇀ u in E, then lim n→∞ ��ˆ |∇un|2 � ˆ ∇un · ∇(un − u) − �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) � ≥ 0, (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
86 |
+
page_content='3) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
87 |
+
page_content=' By direct computation we have �ˆ |∇un|2 � ˆ ∇un · ∇(un − u) − �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) = �ˆ |∇un|2 � ˆ |∇(un − u)|2 + �ˆ |∇un|2 − ˆ |∇u|2 � ˆ ∇u · ∇(un − u) ≥ �ˆ |∇un|2 − ˆ |∇u|2 � ˆ ∇u · ∇(un − u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
88 |
+
page_content=' 4 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
89 |
+
page_content=' JIANG AND S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
90 |
+
page_content=' LIU Since un ⇀ u in E, the right hand side goes to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
91 |
+
page_content=' The desired result follows from taking lower limit on both sides of the above inequality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
92 |
+
page_content=' Now, we are ready to prove Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
93 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
94 |
+
page_content=' Proof ( Proof of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
95 |
+
page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
96 |
+
page_content=' Let φ : [0, ∞) → R be a decreasing C∞-function such that |φ′(t)| ≤ 2, φ(t) = 1 for t ∈ [0, 1] , φ(t) = 0 for t ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
97 |
+
page_content=' We consider the following truncated functional I : E → R, which is a modification of the truncated functional used in [8], I(u) = 1 2 ∥u∥2 − 1 2 � ∥u∗∥2 + 2 ˆ F(u) � φ(∥u∥2) + 1 4 �ˆ |∇u|2 �2 , (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
98 |
+
page_content='4) where u∗ = u− + u0 ∈ E− ⊕ E0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
99 |
+
page_content=' The derivative I′ is given by ⟨I′(u), v⟩ = � 1 − � ∥u∗∥2 + 2 ˆ F(u) � φ′(∥u∥2) � (u, v) − � (u∗, v∗) + ˆ f (u)v � φ(∥u∥2) + �ˆ |∇u|2 � ˆ ∇u · ∇v (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
100 |
+
page_content='5) for u, v ∈ E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
101 |
+
page_content=' We will apply Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
102 |
+
page_content='1 to I to get a sequence of critical points {uk} for I such that I(uk) ≤ 0, uk → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
103 |
+
page_content=' Since I(u) = Φ(u) for ∥u∥ ≤ 1, we see that for large k all the uk are critical points of Φ and Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
104 |
+
page_content='1 is proved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
105 |
+
page_content=' Obviously I is even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
106 |
+
page_content=' If ∥u∥ ≥ 2, then φ(∥u∥2) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
107 |
+
page_content=' Hence I(u) = 1 2 ∥u∥2 + 1 4 �ˆ |∇u|2 �2 ≥ 1 2 ∥u∥2 → +∞, as ∥u∥ → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
108 |
+
page_content=' This means that I is coercive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
109 |
+
page_content=' To verify (PS )c for c ≤ 0, let {un} be a sequence in E such that I(un) → c ≤ 0, I′(un) → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
110 |
+
page_content=' Since I is coercive, {un} is bounded in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
111 |
+
page_content=' Up to a subsequence, we may assume that un ⇀ u in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
112 |
+
page_content=' Then − ����u∗ n ��� 2 + 2 ˆ F(un) � φ(∥un∥2) = 2I(un) − ∥un∥2 − 1 2 �ˆ |∇un|2 �2 ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
113 |
+
page_content=' Hence ���u∗ n ��� 2 + 2 ˆ F(un) ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
114 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
115 |
+
page_content='6) Because φ′(∥un∥2) ≤ 0 and lim n→∞ (un, un − u) = lim n→∞ ∥un∥2 − ∥u∥2 ≥ 0, INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL 5 up to a further subsequence we may assume ����u∗ n ��� 2 + 2 ˆ F(un) � φ′(∥un∥2) (un, un − u) −→ α ≤ 0, (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
116 |
+
page_content='7) note here that by the boundedness of {un}, the coefficient of (un, un − u) is bounded.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
117 |
+
page_content=' Thanks to Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
118 |
+
page_content='2, we may also assume �ˆ |∇un|2 � ˆ ∇un · ∇(un − u) − �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) −→ β ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
119 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
120 |
+
page_content='8) From the subcritical assumption (f1) and the compact embedding E ֒→ L2(Ω), it is well known that ˆ f (un) (un − u) → 0, ˆ f (u) (un − u) → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
121 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
122 |
+
page_content='9) Finally, because dim(E− ⊕ E0) < ∞, we also have �u∗ n, u∗ n − u∗� → 0, �u∗, u∗ n − u∗� → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
123 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
124 |
+
page_content='10) Computing ⟨I′(un), un − u⟩ and ⟨I′(u), un − u⟩ via (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
125 |
+
page_content='5) then subtracting the results, we deduce from (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
126 |
+
page_content='7), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
127 |
+
page_content='8), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
128 |
+
page_content='9) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
129 |
+
page_content='10) that ∥un − u∥2 = ⟨I′(un) − I′(u), un − u⟩ + ����u∗ n ��� 2 + 2 ˆ F(un) � φ′(∥un∥2) (un, un − u) − � ∥u∗∥2 + 2 ˆ F(u) � φ′(∥u∥2) (u, un − u) + ��u∗ n, u∗ n − u∗� + ˆ f (un) (un − u) � φ(∥un∥2) − ��u∗, u∗ n − u∗� + ˆ f (u) (un − u) � φ(∥u∥2) − �ˆ |∇un|2 � ˆ ∇un · ∇(un − u) + �ˆ |∇u|2 � ˆ ∇u · ∇(un − u) = �o(1) + α − β� → (α − β) ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
130 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
131 |
+
page_content='11) It follows that un → u in E and I satisfies (PS )c for c ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
132 |
+
page_content=' Finally, for k ∈ N, let Xk be an arbitrary k-dimensional subspace of E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
133 |
+
page_content=' There is Λk > 0 such that |u|2 2 ≥ Λk ∥u∥2 for u ∈ Xk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
134 |
+
page_content=' There is also a constant η > 0 such that for all u ∈ E we have ˆ |∇u|2 ≤ η ∥u∥2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
135 |
+
page_content=' From (f2), there is δ > 0 such that F(t) ≥ 1 + η2 Λk t2 for t ∈ (−δ, δ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
136 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
137 |
+
page_content='12) 6 S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
138 |
+
page_content=' JIANG AND S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
139 |
+
page_content=' LIU Take ρk ∈ (0, 1) such that if u ∈ Xk, ∥u∥ = ρk, then |u|∞ < δ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
140 |
+
page_content=' For u ∈ Xk ∩ S ρk we have |u(x)| ≤ δ for all x ∈ Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
141 |
+
page_content=' Hence by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
142 |
+
page_content='12), I(u) = Φ(u) = 1 2 � ∥u+∥2 − ���u−��� 2� + 1 4 �ˆ |∇u|2 �2 − ˆ F(u) ≤ ∥u∥2 + η2 4 ∥u∥4 − 1 + η2 Λk ˆ u2 ≤ η2 4 ρ4 k − η2ρ2 k ≤ −3η2 4 ρ2 k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
143 |
+
page_content=' Thus sup Xk∩S ρk I ≤ −3η2 4 ρ2 k < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
144 |
+
page_content=' Now, by Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
145 |
+
page_content='1, I has a sequence of critical points {uk} such that uk → 0 in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
146 |
+
page_content=' For some k0, if k ≥ k0 then ∥uk∥ < 1 and uk is a critical point of Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
147 |
+
page_content=' Hence Φ has a sequence of critical points {uk}k≥k0 converging to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
148 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
149 |
+
page_content=' Proof of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
150 |
+
page_content='2 Given u ∈ E, let φu be the solution of the second equation in the system (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
151 |
+
page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
152 |
+
page_content=' It is well known that if u ∈ E is a critical point of Φ : E → R, Φ(u) = 1 2 ˆ � |∇u|2 + V(x)u2� + 1 4 ˆ φuu2 − ˆ F(u) = 1 2 � ∥u+∥2 − ���u−��� 2� + 1 4 ˆ φuu2 − ˆ F(u), then (u, φu) is a solution of (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
153 |
+
page_content='4), this idea was initiated from Benci et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
154 |
+
page_content=' [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
155 |
+
page_content=' Similar to (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
156 |
+
page_content='4) we consider a truncated functional I : E → R I(u) = 1 2 ∥u∥2 − 1 2 � ∥u∗∥2 + 2 ˆ F(u) � φ(∥u∥2) + 1 4 ˆ φuu2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
157 |
+
page_content=' Then I is an even coercive functional with I(0) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
158 |
+
page_content=' Similar to the last section, using ( f2), for k-dimensional subspace Xk there is ρk > 0 such that (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
159 |
+
page_content='2) holds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
160 |
+
page_content=' To verify the (PS )c condition with c ≤ 0 for I, we need the following analogue of Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
161 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
162 |
+
page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
163 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
164 |
+
page_content=' If un ⇀ u in E, then lim n→∞ �ˆ φunun (un − u) − ˆ φuu (un − u) � = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
165 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
166 |
+
page_content='1) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
167 |
+
page_content=' It is well known that φu is obtained from applying Riesz lemma to the func- tional ℓu : v �→ ´ u2v on E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
168 |
+
page_content=' Thus ∥φu∥ = ∥ℓu∥ = sup ∥v∥=1 ����� ˆ u2v ����� ≤ sup ∥v∥=1 � |u2|3 |v|3/2 � = |u|2 6 sup ∥v∥=1 |v|3/2 ≤ C ∥u∥2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
169 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
170 |
+
page_content='2) INFINITELY MANY SOLUTIONS FOR KIRCHHOFF EQUATIONS WITH INDEFINITE POTENTIAL 7 Since {un} is bounded, we know that �φun � is also bounded in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
171 |
+
page_content=' By the compactness of the embedding E ֒→ L12/5(Ω), up to a subsequence we have un → u in L12/5(Ω).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
172 |
+
page_content=' Hence ����� ˆ φunun (un − u) ����� ≤ ���φun ���6 |un|12/5 |un − u|12/5 → 0, because �φun � and {un} are bounded in L6(Ω) and L12/5(Ω), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
173 |
+
page_content=' Similarly, the second integral in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
174 |
+
page_content='1) vanishes as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
175 |
+
page_content=' Let {un} be a (PS )c sequence of Φ with c ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
176 |
+
page_content=' It is easy to see that (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
177 |
+
page_content='6) still holds in current situation, thus we have (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
178 |
+
page_content='7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
179 |
+
page_content=' Using (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
180 |
+
page_content='7), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
181 |
+
page_content='9), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
182 |
+
page_content='10), and Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
183 |
+
page_content='1 we have an analogue of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
184 |
+
page_content='11) ∥un − u∥2 → α ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
185 |
+
page_content=' Thus un → u in E and (PS )c is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
186 |
+
page_content=' Applying Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
187 |
+
page_content='1, I has a sequence of critical points uk → 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
188 |
+
page_content=' Since I(u) = Φ(u) for ∥u∥ ≤ 1, for large k, uk is critical point of Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
189 |
+
page_content=' Thus Φ has a sequence of critical points uk → 0 in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
190 |
+
page_content=' From (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
191 |
+
page_content='2) we have φuk → 0 in E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
192 |
+
page_content=' Thus (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
193 |
+
page_content='4) has a sequence of solutions (uk, φuk) → (0, 0) in E × E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
194 |
+
page_content=' References [1] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
195 |
+
page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
196 |
+
page_content=' Alves, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
197 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
198 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
199 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
200 |
+
page_content=' Corrˆea, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
201 |
+
page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
202 |
+
page_content=' Ma, Positive solutions for a quasilinear elliptic equation of Kirchhoff type, Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
203 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
204 |
+
page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
205 |
+
page_content=', 49 (2005), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
206 |
+
page_content=' 85–93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
207 |
+
page_content=' [2] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
208 |
+
page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
209 |
+
page_content=' Alves and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
210 |
+
page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
211 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
212 |
+
page_content=' Souto, Existence of least energy nodal solution for a Schr¨odinger-Poisson system in bounded domains, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
213 |
+
page_content=' Angew.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
214 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
215 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
216 |
+
page_content=', 65 (2014), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
217 |
+
page_content=' 1153–1166.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
218 |
+
page_content=' [3] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
219 |
+
page_content=' Benci and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
220 |
+
page_content=' Fortunato, An eigenvalue problem for the Schr¨odinger-Maxwell equations, Topol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
221 |
+
page_content=' Methods Nonlinear Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
222 |
+
page_content=', 11 (1998), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
223 |
+
page_content=' 283–293.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
224 |
+
page_content=' [4] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
225 |
+
page_content=' Cheng, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
226 |
+
page_content=' Wu, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
227 |
+
page_content=' Liu, Multiple solutions for a class of Kirchhoff type problems with concave nonlinearity, NoDEA Nonlinear Differential Equations Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
228 |
+
page_content=', 19 (2012), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
229 |
+
page_content=' 521–537.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
230 |
+
page_content=' [5] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
231 |
+
page_content=' Faraci and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
232 |
+
page_content=' Silva, On the Brezis-Nirenberg problem for a Kirchhoff type equation in high dimension, Calc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
233 |
+
page_content=' Var.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
234 |
+
page_content=' Partial Differential Equations, 60 (2021), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
235 |
+
page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
236 |
+
page_content=' 22, 33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
237 |
+
page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
238 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
239 |
+
page_content=' Ferreira and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
240 |
+
page_content=' Ubilla, A critical concave-convex Kirchhoff-type equation in R4 involving potentials which may vanish at infinity, Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
241 |
+
page_content=' Henri Poincar´e, 23 (2022), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
242 |
+
page_content=' 25–47.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
243 |
+
page_content=' [7] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
244 |
+
page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
245 |
+
page_content=' Furtado and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
246 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
247 |
+
page_content=' Zanata, Multiple solutions for a Kirchhoff equation with nonlinearity having arbitrary growth, Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
248 |
+
page_content=' Aust.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
249 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
250 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
251 |
+
page_content=', 96 (2017), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
252 |
+
page_content=' 98–109.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
253 |
+
page_content=' [8] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
254 |
+
page_content=' He and Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
255 |
+
page_content=' Wu, Multiplicity results for sublinear elliptic equations with sign-changing potential and general nonlinearity, Bound.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
256 |
+
page_content=' Value Probl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
257 |
+
page_content=', (2020), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
258 |
+
page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
259 |
+
page_content=' 159, 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
260 |
+
page_content=' [9] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
261 |
+
page_content=' Liu and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
262 |
+
page_content='-Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
263 |
+
page_content=' Wang, On Clark’s theorem and its applications to partially sublinear problems, Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
264 |
+
page_content=' Inst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
265 |
+
page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
266 |
+
page_content=' Poincar´e Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
267 |
+
page_content=' Non Lin´eaire, 32 (2015), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
268 |
+
page_content=' 1015–1037.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
269 |
+
page_content=' [10] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
270 |
+
page_content=' Pei and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
271 |
+
page_content=' Ma, Multiple solutions for a Kirchhoff-type equation, Mediterr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
272 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
273 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
274 |
+
page_content=', 17 (2020), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
275 |
+
page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
276 |
+
page_content=' 78, 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
277 |
+
page_content=' [11] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
278 |
+
page_content='-Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
279 |
+
page_content=' Wang, Nonlinear boundary value problems with concave nonlinearities near the origin, NoDEA Nonlinear Differential Equations Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
280 |
+
page_content=', 8 (2001), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
281 |
+
page_content=' 15–33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
282 |
+
page_content=' [12] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
283 |
+
page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
284 |
+
page_content=' Yang and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
285 |
+
page_content='-Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
286 |
+
page_content=' Ou, Nodal solutions for Schr¨odinger-Poisson systems with concave-convex nonlinearities, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
287 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
288 |
+
page_content=' Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
289 |
+
page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
290 |
+
page_content=', 499 (2021), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
291 |
+
page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
292 |
+
page_content=' 125006, 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
293 |
+
page_content=' [13] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
294 |
+
page_content=' Yu and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
295 |
+
page_content=' Zhang, Sufficient and necessary conditions for ground state sign-changing solutions to the Schr¨odinger-Poisson system with cubic nonlinearity on bounded domains, Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
296 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
297 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
298 |
+
page_content=', 123 (2022), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
299 |
+
page_content=' Paper No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
300 |
+
page_content=' 107570, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/FdE2T4oBgHgl3EQf-QlB/content/2301.04236v1.pdf'}
|
GtE5T4oBgHgl3EQfWA9Z/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6e04662af5f0860e556184910d515211a53be8714ccb4a1fe98b2231e5e6d859
|
3 |
+
size 4849709
|
IdFIT4oBgHgl3EQfYSv6/content/tmp_files/2301.11248v1.pdf.txt
ADDED
@@ -0,0 +1,1567 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES IN
|
2 |
+
FIRST PASSAGE PERCOLATION AND
|
3 |
+
DISORDERED ISING FERROMAGNETS
|
4 |
+
BARBARA DEMBIN
|
5 |
+
CHRISTOPHE GARBAN
|
6 |
+
Abstract. We consider the standard first passage percolation model on Zd
|
7 |
+
with a distribution G taking two values 0 < a < b. We study the maximal
|
8 |
+
flow through the cylinder [0, n]d−1 × [0, hn] between its top and bottom as
|
9 |
+
well as its associated minimal surface(s). We prove that the variance of the
|
10 |
+
maximal flow is superconcentrated, i.e. in O( nd−1
|
11 |
+
log n ), for h ≥ h0 (for a large
|
12 |
+
enough constant h0 = h0(a, b)).
|
13 |
+
Equivalently, we obtain that the ground state energy of a disordered Ising
|
14 |
+
ferromagnet in a cylinder [0, n]d−1 × [0, hn] is superconcentrated when opposite
|
15 |
+
boundary conditions are applied at the top and bottom faces and for a large
|
16 |
+
enough constant h ≥ h0 (which depends on the law of the coupling constants).
|
17 |
+
Our proof is inspired by the proof of Benjamini–Kalai–Schramm [3]. Yet,
|
18 |
+
one major difficulty in this setting is to control the influence of the edges since
|
19 |
+
the averaging trick used in [3] fails for surfaces.
|
20 |
+
Of independent interest, we prove that minimal surfaces (in the present
|
21 |
+
discrete setting) cannot have long thin chimneys.
|
22 |
+
1. Introduction
|
23 |
+
1.1. Context and main results. We focus in this paper on the fluctuations of the
|
24 |
+
maximal flow (or equivalently of the minimal surface of the dual problem) through
|
25 |
+
a cylinder in Zd of the form [0, n]d−1 × [0, H], where the vertical height H will
|
26 |
+
be through most of this text of order hn. It is defined informally as follows (see
|
27 |
+
Subsection 1.3 below for a more formal definition). Each non-oriented edge e inside
|
28 |
+
[0, n]d−1 × [0, hn] carries an i.i.d capacity t(e) whose distribution takes two values
|
29 |
+
0 < a < b. Without much loss of generality, one can think of t(e) ∈ {1, 2} with
|
30 |
+
equal probability. The (vertical) maximum flow through this cylinder is informally
|
31 |
+
the maximum amount of water which can be injected at the bottom, say, of the
|
32 |
+
cylinder so that it can flow upwards in such a way that the amount of water flowing
|
33 |
+
through any given edge e is less or equal than t(e). Let us denote this maximal flow
|
34 |
+
by Φ = Φ([0, n]d−1 × {0}, H). By max-flow/min-cut principle, it is well-known that
|
35 |
+
this maximal flow can be computed by minimizing the capacity over all possible
|
36 |
+
cut-sets. I.e,
|
37 |
+
Φ = min
|
38 |
+
E
|
39 |
+
��
|
40 |
+
e∈E
|
41 |
+
t(e)
|
42 |
+
�
|
43 |
+
,
|
44 |
+
where the mimimum is taken over all cut-sets E which separate the bottom [0, n]d−1×
|
45 |
+
{0} from the top [0, n]d−1 × {H}. There may be several such minimizing cut-sets E
|
46 |
+
and by duality each of those correspond to a minimal surface embedded in Rd (see
|
47 |
+
Figure 1).
|
48 |
+
In dimension d = 2, the minimal cut-sets in [0, n] × [0, H] correspond to geodesics
|
49 |
+
on the dual graph (Z2)∗ = Z2 + ( 1
|
50 |
+
2, 1
|
51 |
+
2) which connect the left and right boundaries
|
52 |
+
of the rectangle. The maximal flow can then be studied as a random metric problem
|
53 |
+
1
|
54 |
+
arXiv:2301.11248v1 [math.PR] 26 Jan 2023
|
55 |
+
|
56 |
+
2
|
57 |
+
BARBARA DEMBIN
|
58 |
+
CHRISTOPHE GARBAN
|
59 |
+
in this special case and much is known about fluctuations, large-deviations etc. in
|
60 |
+
this case. Let us mention in particular the breakthrough work by Benjamini-Kalai-
|
61 |
+
Schramm [3] which implies in the present setting that Var[Φ([0, n] × {0}, H)] =
|
62 |
+
O(
|
63 |
+
n
|
64 |
+
log n) as long as H = Ω(nϵ). Furthermore, in this d = 2 case, the fluctuations
|
65 |
+
are believed to be described as n → ∞ by the KPZ universality class (in particular
|
66 |
+
it is conjectured that Var[Φ] ≍ n2/3, see for example [19] where this is proved for
|
67 |
+
directed last-passage percolation).
|
68 |
+
In higher dimensions d ≥ 3, the problem may no longer be formulated in terms of
|
69 |
+
geodesics and is expressed instead in terms of minimal surfaces (of co-dimension 1).
|
70 |
+
The analysis of such maximal flows/minimal surfaces in d ≥ 3 was first considered in
|
71 |
+
the seminal paper by Kesten for d = 3: Surfaces with minimal random weights and
|
72 |
+
maximal flows: a higher dimensional version of first-passage percolation ([20]) where
|
73 |
+
he obtained a law of large numbers for Φ as well as some large deviations estimates.
|
74 |
+
Since the work [20], there has been a lot of activity on the analysis of the maximal
|
75 |
+
flow Φ: Kesten’s results were extended by Zhang [27] to any dimensions, and by
|
76 |
+
Rossignol–Théret in [24] to any dimensions for tilted flat cylinders (with height
|
77 |
+
H = o(n)). Cerf–Théret proved a law of large number for more general domains
|
78 |
+
in [5]. They later studied the speed of upper and lower large deviations in [6, 7].
|
79 |
+
Interestingly, upper large deviations are in nd while lower large deviations are in
|
80 |
+
nd−1. In [15, 14], Dembin–Théret proved upper and lower large deviations principle
|
81 |
+
for the maximal flow in general domains.
|
82 |
+
Let us now introduce another setting where minimal surfaces appear in the same
|
83 |
+
fashion. Consider the disordered Ising ferromagnet in [0, n]d−1×[0, hn] with opposite
|
84 |
+
boundary conditions applied at the top and the bottom. Each non-oriented edge
|
85 |
+
e inside [0, n]d−1 × [0, hn] carries an i.i.d coupling constant Je whose distribution
|
86 |
+
takes two values 0 < a < b. For a configuration σ ∈ {−1, 1}[0,n]d−1×[0,hn]∩Zd, its
|
87 |
+
associated energy is
|
88 |
+
H(σ) = −
|
89 |
+
�
|
90 |
+
e={x,y}
|
91 |
+
Jeσxσy.
|
92 |
+
One can check that the ground state energy (i.e. the minimal energy) corresponds
|
93 |
+
to Φ and the corresponding minimal surface corresponds to the interface of a ground
|
94 |
+
state (i.e. a configuration achieving the minimal energy). This connection was
|
95 |
+
mentioned for example in Licea–Newman [21].
|
96 |
+
To our knowledge, prior to this work, nothing was known on the fluctuations of
|
97 |
+
Φ = Φ([0, n]d−1 × [0, H]) (besides the easy upper bound Var[Φ] = O(nd−1)). As
|
98 |
+
we shall explain further in the next subsection, this may be due to the following
|
99 |
+
reason. A crucial step in the proof of Benjamini-Kalai-Schramm in [3] is based on a
|
100 |
+
beautiful averaging trick which no longer works with minimal surfaces.
|
101 |
+
Our main result can be stated as follows.
|
102 |
+
Theorem 1.1. For any d ≥ 2 and any distribution G on 0 < a < b, there exist
|
103 |
+
C > 0 and h0 > 0, such that for any n ≥ 1 and H ≥ h0n, we have
|
104 |
+
Var(Φ([0, n]d−1 × {0}, H) ≤ C nd−1
|
105 |
+
log n .
|
106 |
+
As it has been identified in the seminal work by Chatterjee [8], a variance of
|
107 |
+
order O( nd−1
|
108 |
+
log n ) versus a variance of order Ω(nd−1) induces a completely different
|
109 |
+
behaviour of minimal cut-sets under small random perturbations of the capacities
|
110 |
+
{t(e)}e. Indeed, a variance negligible w.r.t nd−1 corresponds to the phenomenon of
|
111 |
+
superconcentration ([8]) and it implies a certain chaoticity property for the minimal
|
112 |
+
cut-sets. We shall illustrate this in Corollary 6.1 where we will rely on a mild
|
113 |
+
extension of a very useful identity from [26]. See also the recent work of Chatterjee [9]
|
114 |
+
|
115 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
116 |
+
3
|
117 |
+
which analyzed the groundstate of an Ising model with non-ferromagnetic disordered
|
118 |
+
coupling constants.
|
119 |
+
We complete our analysis of the fluctuations of Φ = Φ([0, n]d−1 × {0}, H) by the
|
120 |
+
following easier lower bound on the variance. Its proof in Section 5 will rely on the
|
121 |
+
martingale decomposition method from Newman–Piza [22].
|
122 |
+
Theorem 1.2. Let G be a distribution on {a, b} such that G({b}) > pc, where pc
|
123 |
+
is the critical parameter for Bernoulli bond percolation on (Zd, Ed). There exists a
|
124 |
+
constant c = c(G) > 0 such that for all n, H ≥ 1, we have
|
125 |
+
Var(Φ([0, n]d−1 × {0}, H)) ≥ cnd−1
|
126 |
+
H
|
127 |
+
.
|
128 |
+
We now introduce a slightly different model for which a greatly simplified version
|
129 |
+
of our proof also implies superconcentration (see Remark 1 below). In the same
|
130 |
+
cylinder [0, n]d−1 × [0, H], we now assign i.i.d weights {t(x)} to the vertices of the
|
131 |
+
cylinder, again with a distribution G on 0 < a < b. We consider the following
|
132 |
+
minimal weight
|
133 |
+
ΨLip = ΨLip([0, n]d−1 × {0}, H) := min
|
134 |
+
ψ
|
135 |
+
�
|
136 |
+
�
|
137 |
+
�
|
138 |
+
�
|
139 |
+
u∈[0,n]d−1
|
140 |
+
t(u, ψ(u))
|
141 |
+
�
|
142 |
+
�
|
143 |
+
� ,
|
144 |
+
where the minimum is taken over all 1-Lipschitz functions ψ : [0, n]d−1 → {0, 1, . . . , H}
|
145 |
+
(i.e. such that |ψi − ψj| ≤ 1 for any i ∼ j in [0, n]d−1). We obtain in this setting
|
146 |
+
the analog of Theorem 1.1.
|
147 |
+
Theorem 1.3. There exist C, c > 0 and h0 > 0, both depending on 0 < a < b, such
|
148 |
+
that for any n ≥ 1 and H ≥ h0n, we have
|
149 |
+
�
|
150 |
+
cnd−1
|
151 |
+
H
|
152 |
+
≤
|
153 |
+
�
|
154 |
+
Var(ΨLip([0, n]d−1 × {0}, H) ≤ C nd−1
|
155 |
+
log n .
|
156 |
+
To conclude this introduction, we wish to emphasise that if minimal surfaces
|
157 |
+
happen to be anchored at some deterministic curve along the boundary of the
|
158 |
+
cylinder, then we expect a completely different scenario for their fluctuations in
|
159 |
+
large enough dimensions d. We discuss two possible such situations:
|
160 |
+
(1) Instead of considering the maximum flow Φ from the bottom [0, n]d−1×{0} to
|
161 |
+
the top [0, n]d−1×{H}, let us consider the maximal flow τ([0, n]d−1×{0}, H)
|
162 |
+
between the bottom half and the top half of the cylinder, (i.e. between
|
163 |
+
∂([0, n]d−1 × [0, H]) ∩ {x ∈ Rd, x · ed < H
|
164 |
+
2 ]} and ∂([0, n]d−1 × [0, H]) ∩ {x ∈
|
165 |
+
Rd, x·ed > H
|
166 |
+
2 ]}). Then, the associated minimal surfaces are anchored in the
|
167 |
+
boundary of the meridian plane of the cylinder [0, n]d−1 ×{ H
|
168 |
+
2 }. For a formal
|
169 |
+
definition, we refer to [24]. In high dimensions, by analogy to other models
|
170 |
+
of surface (see in particular [23]), we expect that the anchored surface is
|
171 |
+
localized, that is, there exists a constant C > 0 such that for any n, almost
|
172 |
+
all the surface is within distance C of the meridian plane [0, n]d−1 × { H
|
173 |
+
2 }.
|
174 |
+
In that case, by a similar proof as Theorem 1.2, we can prove that there
|
175 |
+
exists c > 0 depending on G such that for all n, H ≥ 1
|
176 |
+
Var(τ([0, n]d−1 × {0}, H)) ≥ cnd−1 .
|
177 |
+
This implies that in high dimensions, we don’t expect the variance of the
|
178 |
+
anchored surface to be superconcentrated. This is another hint that minimal
|
179 |
+
surfaces behave very differently as geodesics (of codimension d − 1) in
|
180 |
+
standard first percolation theory.
|
181 |
+
|
182 |
+
4
|
183 |
+
BARBARA DEMBIN
|
184 |
+
CHRISTOPHE GARBAN
|
185 |
+
(2) In the spirit of the easier Theorem 1.3, we may further restrict the 1-Lipschitz
|
186 |
+
functions ψ to be equal to H
|
187 |
+
2 along ∂[0, n]d−1. The localisation result for
|
188 |
+
uniform such 1-Lipschitz functions proved by Peled in [23] highly suggests
|
189 |
+
that in high enough dimension, the variance of the associated minimal weight
|
190 |
+
Ψanchored
|
191 |
+
Lip
|
192 |
+
will be ≥ cnd−1.
|
193 |
+
We shall discuss this expected different behaviour further in Proposition 5.1 as well
|
194 |
+
as in open question 1.
|
195 |
+
1.2. Idea of proof.
|
196 |
+
Benjamini-Kalai-Schramm and Talagrand. As we mentioned above, a similar
|
197 |
+
theorem was first proved for the study of passage times in first passage percolation
|
198 |
+
by Benjamini–Kalai–Schramm [3]. A key ingredient of [3] which we will also use
|
199 |
+
is Talagrand’s inequality [25] (see Theorem 1.4). To obtain a “sub-surface” (i.e.
|
200 |
+
o(nd−1)) upper-bound using Talagrand’s inequality, one needs to prove that most
|
201 |
+
edges have a low influence on the maximal flow Φ. In [3], the influence of an edge is
|
202 |
+
related to the probability that the geodesic goes through that edge. In our setting,
|
203 |
+
it will be related to the probability that the minimal surfaces goes through the
|
204 |
+
plaquette dual to that edge. We refer to [17, 16] for background on the interplay
|
205 |
+
between Boolean functions and statistical physics.
|
206 |
+
The main difficulty of this approach, already in [3], is that it happens to be very
|
207 |
+
challenging to upper-bound the influence of any fixed given edge. In fact, for the
|
208 |
+
passage times in first passage percolation, proving that the maximum influence in
|
209 |
+
the bulk goes to zero (this is known as the BKS midpoint problem) was only proved
|
210 |
+
a few years ago by Damron–Hanson [10], Ahlberg–Hoffman [1] and was recently
|
211 |
+
solved quantitatively by Dembin–Elboim–Peled in [13].
|
212 |
+
To circumvent this, Benjamini–Kalai–Schramm relied in [3] on a very nice av-
|
213 |
+
eraging trick by randomizing the endpoints of the desired passage times. Since
|
214 |
+
the randomized endpoints remain close to the original endpoints of the geodesic,
|
215 |
+
it follows that the difference of passage times between the new geodesic and the
|
216 |
+
original geodesic is negligible compared to the upper bound on standard deviation
|
217 |
+
√n.
|
218 |
+
No averaging trick for surfaces. We now explain why this averaging trick fails
|
219 |
+
for surfaces. Indeed, consider two surfaces anchored respectively in the boundary of
|
220 |
+
[0, n]d−1 × {0} and [0, n]d−1 × {1}, the best control we can get on the difference of
|
221 |
+
capacity is of order nd−2. When d ≥ 3, we have nd−2 ≥ n(d−1)/2 where n(d−1)/2 is
|
222 |
+
the order of the upper bound for the standard deviation for surfaces (obtained for
|
223 |
+
example via Efron-Stein). This shows that as soon as d ≥ 3, we need to proceed
|
224 |
+
differently as in [3] and a close inspection of influences will be needed.
|
225 |
+
Idea and structure of the proof. We start by noting that if we were considering
|
226 |
+
a maximal flow in a transitive graph, for example the maximal flow with non-trivial
|
227 |
+
homology along the dth direction in a torus Td−1
|
228 |
+
n
|
229 |
+
× TH, then a direct application of
|
230 |
+
Talagrand’s inequality (Theorem 1.4) would readily imply fluctuations of order at
|
231 |
+
most n
|
232 |
+
d−1
|
233 |
+
2 /√log n for any H ≥ Ω(nϵ) just by using the fact that all edges have the
|
234 |
+
same influence by transitivity of the graph.
|
235 |
+
In our present case, despite the lack of transitive action acting on the cylinder
|
236 |
+
[0, n]d−1 × [0, H], the rough idea is that if the minimal surface En (chosen among all
|
237 |
+
possible minimal surfaces in any deterministic way, say) happens to be with high
|
238 |
+
probability at distance at least 1 from the top and bottom boundary, then if we shift
|
239 |
+
vertically by one the set of capacities {t(e)} (and also replace the missing bottom
|
240 |
+
capacities by the top capacities that went off the cylinder), one may guess that,
|
241 |
+
again with high probability, the new minimal surface En(tshifted) will be nothing but
|
242 |
+
|
243 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
244 |
+
5
|
245 |
+
the vertical shift of En(t). Of course what could prevent this to happen comes from
|
246 |
+
the effect of shuffling the top and bottom capacities. If one could prove that these
|
247 |
+
two claims indeed happen with high enough probability, then it would imply that
|
248 |
+
all edges in a vertical column have a very close influence which would allow us to
|
249 |
+
conclude using Talagrand’s inequality 1.4.
|
250 |
+
In the end, we do not quite succeed making this intuition rigorous but our proof
|
251 |
+
is strongly influenced by analysing the effect of such vertical shifts. The proof of
|
252 |
+
Theorem 1.1 will be based on the following three main steps which are of independent
|
253 |
+
interest and do not have an analog in the analysis of Benjamini-Kalai-Schramm in
|
254 |
+
[3]:
|
255 |
+
(1) First, we shall prove that minimal surfaces cannot wiggle too much vertically.
|
256 |
+
This will be achieved in Proposition 2.1. A similar phenomenon is known to
|
257 |
+
arise in the analysis of minimal surfaces, see [12]. Our proof in the discrete
|
258 |
+
setting will rely on the isoperimetric bounds in Zd obtained in [4]. This
|
259 |
+
proposition is the technical step which is causing the restriction h ≥ h0 in
|
260 |
+
our main theorem. Its proof will be given in Section 3.
|
261 |
+
(2) Second, we need to know that minimal surfaces are unlikely to stay too
|
262 |
+
close to the top and bottom boundaries. We will not prove this for the
|
263 |
+
true minimal surfaces which lead to the maximal flow Φ([0, n]d−1 × {0}, H)
|
264 |
+
but rather for a slightly modified notion of maximal flow in which minimal
|
265 |
+
surfaces too close to the top and bottom boundaries receive a penalisation.
|
266 |
+
This modified notion of maximal flow is called �Φ (see (5)) and is introduced
|
267 |
+
in Section 2. For this modified maximal flow �Φ, we can show that the
|
268 |
+
associated minimal surfaces are typically away from the top and bottom
|
269 |
+
boundaries. This is the purpose of Proposition 4.1.
|
270 |
+
(3) Finally, the last difficulty we are facing is the possibility that the minimal
|
271 |
+
surface (for the modified �Φ) may often produce a high vertical cliff at certain
|
272 |
+
locations. This would make the influence profile too inhomogeneous to
|
273 |
+
allow us to control the magnitude of influences. Using a deep estimate from
|
274 |
+
Zhang’s work [27] (inspired by the original work by Kesten [20]), we will
|
275 |
+
prove Proposition 2.2 which shows that there are only few edges that may
|
276 |
+
carry a large influence (we believe such edges do not exist but we cannot
|
277 |
+
rule this out rigorously). Its proof will be the purpose of Section 4.
|
278 |
+
Remark 1. We claim that one can prove Theorem 1.2 using the same proof, except
|
279 |
+
there are several drastic simplifications. First, the absence of long thin chimneys
|
280 |
+
(Proposition 2.1) is obvious in this case. Also, vertical cliffs do not exist by definition
|
281 |
+
(thanks to the 1-Lipschitz condition) and as such Proposition 2.2 is much easier to
|
282 |
+
prove in this case. We leave the details to the reader.
|
283 |
+
1.3. Background.
|
284 |
+
Definition of maximal flow. We now provide a more formal definition of maximal
|
285 |
+
flows/minimal surfaces. We consider a first passage percolation on the graph (Zd, Ed)
|
286 |
+
where Ed is the set of edges that link all the nearest neighbors for the Euclidean norm
|
287 |
+
in Zd. Write (e1, . . . , ed) for the canonical basis of Rd. We consider a distribution
|
288 |
+
G on R+. For each edge e in Ed we assign a random variable te of distribution G
|
289 |
+
such that the family (te)e∈Ed is independent.
|
290 |
+
Let A ⊂ Rd−1 × {0}. Let h > 0, we denote by cyl(A, h) the cylinder of basis A
|
291 |
+
and height h defined by
|
292 |
+
cyl(A, h) := {x + ted : x ∈ A, t ∈ [0, h]} .
|
293 |
+
|
294 |
+
6
|
295 |
+
BARBARA DEMBIN
|
296 |
+
CHRISTOPHE GARBAN
|
297 |
+
Define the discretized versions B(A, h) and T(A, h) of the bottom and the top of
|
298 |
+
the cylinder cyl(A, h)
|
299 |
+
B(A, h) :=
|
300 |
+
�
|
301 |
+
x ∈ Zd ∩ cyl(A, h) :
|
302 |
+
∃y /∈ cyl(A, h), ⟨x, y⟩ ∈ Ed
|
303 |
+
and ⟨x, y⟩ intersects A
|
304 |
+
�
|
305 |
+
and
|
306 |
+
T(A, h) :=
|
307 |
+
�
|
308 |
+
x ∈ Zd ∩ cyl(A, h) :
|
309 |
+
∃y /∈ cyl(A, h), ⟨x, y⟩ ∈ Ed
|
310 |
+
and ⟨x, y⟩ intersects A + hed
|
311 |
+
�
|
312 |
+
.
|
313 |
+
Let E ⊂ Ed be a set of edges. We say that E cuts B(A, h) from T(A, h) in
|
314 |
+
cyl(A, h) (or is a cutset, for short) if any path from B(A, h) to T(A, h) in cyl(A, h)
|
315 |
+
intersects E.
|
316 |
+
We associate with any set of edges E ⊂ Ed its capacity T(E) defined by
|
317 |
+
T(E) :=
|
318 |
+
�
|
319 |
+
e∈E
|
320 |
+
te .
|
321 |
+
We define the maximal flow from the top to the bottom of the cylinder cyl(A, h)
|
322 |
+
Φ(A, h) := min{T(E) : E cuts T(A, h) from B(A, h) in cyl(A, h)} .
|
323 |
+
(1)
|
324 |
+
As already mentioned in the introduction, we use the terminology maximal flow as
|
325 |
+
by max-flow min-cut theorem, the dual problem of finding minimal surface boils
|
326 |
+
down to computing the maximal flow.
|
327 |
+
From now on, we assume that G can only take two values 0 < a < b. See Open
|
328 |
+
Question 3 for a discussion of possible extensions to more general distributions using
|
329 |
+
for example [2, 11].
|
330 |
+
Dual representation of cutsets. Let E ⊂ Ed be a cutset separating T(A, h)
|
331 |
+
from B(A, h) in cyl(A, h). The set E is a (d − 1)-dimensional object, that can be
|
332 |
+
seen as a surface. To better understand this interpretation in term of surfaces,
|
333 |
+
we can associate with each edge e ∈ E a small plaquette e∗. The plaquette e∗ is
|
334 |
+
an hypersquare of dimension d − 1 whose sides have length one and are parallel
|
335 |
+
to the edges of the graphs, such that e∗ is normal to e and cuts it in its middle.
|
336 |
+
We also define the dual of a set of edge E by E∗ := {e∗, e ∈ E} (see Figure 1).
|
337 |
+
Roughly speaking, if the set of edges E cuts T(A, h) from B(A, h) in cyl(A, h), the
|
338 |
+
surface of plaquettes E∗ disconnects T(A, h) from B(A, h) in cyl(A, h). Note that,
|
339 |
+
in dimension 2, a surface of plaquettes is very similar to a path in the dual graph of
|
340 |
+
Z2 and thus the study of minimal cutsets is very similar to the study of geodesics.
|
341 |
+
e
|
342 |
+
e∗
|
343 |
+
Figure 1. The dual of a cutset between the top and the bottom
|
344 |
+
of a cylinder for d = 3.
|
345 |
+
|
346 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
347 |
+
7
|
348 |
+
Concentration inequalities. Let J be a finite set of indices. For ω ∈ {a, b}J and
|
349 |
+
j ∈ J denote σjω the function that switches the value in the j-th coordinate. For
|
350 |
+
f : {a, b}J → R, denote
|
351 |
+
∂jf := f − f ◦ σj
|
352 |
+
2
|
353 |
+
.
|
354 |
+
For p ∈ (0, 1), consider µp the product measure on {a, b}J which gives a with
|
355 |
+
probability p and b with probability 1 − p. We denote ∥f∥2
|
356 |
+
2 =
|
357 |
+
�
|
358 |
+
f 2dµp.
|
359 |
+
Theorem 1.4 (Talagrand’s inequality [25] Theorem 1.5). Let f : {a, b}J → R and
|
360 |
+
p ∈ {0, 1}. We have
|
361 |
+
Var(f) ≤ C log
|
362 |
+
2
|
363 |
+
p(1 − p)
|
364 |
+
�
|
365 |
+
j∈J
|
366 |
+
∥∂jf∥2
|
367 |
+
2
|
368 |
+
1 + log(∥∂jf∥2/∥∂jf∥1)
|
369 |
+
(2)
|
370 |
+
where C is a universal constant.
|
371 |
+
The following proposition is an upper bound on the variance using Efron–Stein
|
372 |
+
inequality.
|
373 |
+
Theorem 1.5 (Efron-Stein inequality). Let X = (X1, . . . , Xn) and X′ = (X′
|
374 |
+
1, . . . , X′
|
375 |
+
n)
|
376 |
+
be two independent and identically distributed vectors taking values in a space X n.
|
377 |
+
Let f : X n → R. We have
|
378 |
+
Var(f(X)) ≤
|
379 |
+
n
|
380 |
+
�
|
381 |
+
i=1
|
382 |
+
E
|
383 |
+
�
|
384 |
+
(f(X) − E[f(X(i))|X])2�
|
385 |
+
=
|
386 |
+
n
|
387 |
+
�
|
388 |
+
i=1
|
389 |
+
E
|
390 |
+
�
|
391 |
+
(f(X) − f(X(i)))2
|
392 |
+
−
|
393 |
+
�
|
394 |
+
,
|
395 |
+
where X(i) := (X1, . . . , Xi−1, X′
|
396 |
+
i, Xi+1, . . . , Xn) and x− = max(−x, 0).
|
397 |
+
2. Proof of the main theorem
|
398 |
+
In this section, we state the main intermediate Propositions which were mentioned
|
399 |
+
in the Section idea of proof and which will be proved in the next two Sections. We
|
400 |
+
also implement the penalisation scheme used to “localize” the optimal surface away
|
401 |
+
from the top and bottom boundaries. This will be the purpose of the re-weighting
|
402 |
+
function Yi below. Finally, using these ingredients we give the proof of Theorem 1.1.
|
403 |
+
Geometric control on minimal surfaces. The proposition stated below will be
|
404 |
+
proved in Section 3.
|
405 |
+
Proposition 2.1 (“Absence of long thin chimneys”). Fix 0 < a < b. There exists
|
406 |
+
an even h0 > 0 depending only on 0 < a < b such that for any n ≥ 1, H ≥ 1
|
407 |
+
2h0n and
|
408 |
+
any configuration of capacities in {a, b} assigned to the edges of [0, n]d−1 ×[0, H], all
|
409 |
+
minimal-cut sets E (i.e. that achieve the infimum in Φ([0, n]d−1 × {0}, H) defined
|
410 |
+
in (1)) are contained in a cylinder of vertical height bounded by 1
|
411 |
+
2h0n. I.e. for any
|
412 |
+
minimal cut-set E, there exists some u ≥ 0 such that E ⊂ [0, n]d−1 × [u, u + 1
|
413 |
+
2h0n].
|
414 |
+
Fix H ≥ h0n. Write A = [0, n]d−1 × {0}. Define for i ≤ H − 1
|
415 |
+
2h0n
|
416 |
+
Xi := min
|
417 |
+
�
|
418 |
+
�
|
419 |
+
�T(E) :
|
420 |
+
E cuts B(A + ied, 1
|
421 |
+
2h0n) from T(A + ied, 1
|
422 |
+
2h0n)
|
423 |
+
in cyl(A + ied, 1
|
424 |
+
2h0n)
|
425 |
+
and E ∩ (B(A + ied, 1
|
426 |
+
2h0n) ∪ T(A + ied, 1
|
427 |
+
2h0n)) ̸= ∅
|
428 |
+
�
|
429 |
+
�
|
430 |
+
� .
|
431 |
+
(3)
|
432 |
+
|
433 |
+
8
|
434 |
+
BARBARA DEMBIN
|
435 |
+
CHRISTOPHE GARBAN
|
436 |
+
Penalisation scheme. Let 0 < ε < δ < 1/4. Set M := ⌊nε⌋ where ⌊x⌋ denotes
|
437 |
+
the largest integer smaller than x. Let (Zi)1≤i≤M be a family of i.i.d. random
|
438 |
+
variables that takes the value −1 with probability G({a}) and 1 with probability
|
439 |
+
1 − G({a}) = G({b}). The reason for this choice is that to apply Talagrand formula
|
440 |
+
(Theorem 1.4) the te and Zi must be parameterized by a Bernoulli random variable
|
441 |
+
with the same parameter. Set
|
442 |
+
SM :=
|
443 |
+
M
|
444 |
+
�
|
445 |
+
k=1
|
446 |
+
Zi.
|
447 |
+
We define
|
448 |
+
i0 :=
|
449 |
+
�H
|
450 |
+
2
|
451 |
+
�
|
452 |
+
+ SM.
|
453 |
+
In particular i0 is a random integer variable taking value in [⌊H/2⌋−M, ⌊H/2⌋+M].
|
454 |
+
We define the family (Yi)1≤i≤H as follows
|
455 |
+
∀1 ≤ i ≤ H
|
456 |
+
Yi = Yi(i0) :=
|
457 |
+
�
|
458 |
+
0
|
459 |
+
if |i0 − i| ≤ H
|
460 |
+
2 − nδ
|
461 |
+
n(d−1)/2
|
462 |
+
nδ log n
|
463 |
+
�
|
464 |
+
|i0 − i| − H
|
465 |
+
2 + nδ�
|
466 |
+
otherwise.
|
467 |
+
(4)
|
468 |
+
Let j0 be such that
|
469 |
+
Xj0 + Yj0 =
|
470 |
+
min
|
471 |
+
1≤i≤H− 1
|
472 |
+
2 h0n Xi + Yi.
|
473 |
+
If there are several possible choices, we pick the smallest. Let Emin(j0) be the surface
|
474 |
+
achieving the minimum in the definition of Xj0. Again if there are several possible
|
475 |
+
choices, we choose in a deterministic way (that is invariant by translation along the
|
476 |
+
ed axis).
|
477 |
+
Edges with large influence. The following proposition will be proved in Section
|
478 |
+
4.
|
479 |
+
Proposition 2.2. There exist n0 = n0(G) and ξ > 0 such that for all n ≥ n0
|
480 |
+
���
|
481 |
+
e ∈ cyl(A, H) : P(e ∈ Emin(j0)) ≥ n−ξ��� ≤ nd−1−ξ.
|
482 |
+
We are now in position of proving Theorem 1.1.
|
483 |
+
Proof of Theorem 1.1. Set E be the set of edges in cyl([0, n]d−1 × {0}, H). Let I be
|
484 |
+
the set of indices that encode the choice of i0, in particular |I| = M. Set
|
485 |
+
�Φ :=
|
486 |
+
min
|
487 |
+
1≤i≤H− 1
|
488 |
+
2 h0n(Xi + Yi)
|
489 |
+
(5)
|
490 |
+
where (Xi)i was defined in (3) and (Yi)i in (4). Thanks to Proposition 2.1, we have
|
491 |
+
Φ([0, n]d−1 × {0}, H) =
|
492 |
+
min
|
493 |
+
1≤i≤H− 1
|
494 |
+
2 h0n Xi.
|
495 |
+
It is easy to check that
|
496 |
+
�����
|
497 |
+
min
|
498 |
+
1≤i≤H− 1
|
499 |
+
2 h0n(Xi + Yi) −
|
500 |
+
min
|
501 |
+
1≤i≤H− 1
|
502 |
+
2 h0n Xi
|
503 |
+
����� ≤ n(d−1)/2
|
504 |
+
log n
|
505 |
+
.
|
506 |
+
It follows that
|
507 |
+
���E[�Φ] − E[Φ([0, n]d−1 × {0}, H)]
|
508 |
+
��� ≤ n(d−1)/2
|
509 |
+
log n
|
510 |
+
.
|
511 |
+
|
512 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
513 |
+
9
|
514 |
+
and
|
515 |
+
Var(Φ([0, n]d−1 × {0}, H))
|
516 |
+
= E((Φ([0, n]d−1 × {0}, H) − EΦ([0, n]d−1 × {0}, H))2)
|
517 |
+
= E((Φ([0, n]d−1 × {0}, H) − �Φ + E�Φ − EΦ([0, n]d−1 × {0}, H) + �Φ − E�Φ)2)
|
518 |
+
≤ 3
|
519 |
+
�
|
520 |
+
Var(�Φ) + 2nd−1
|
521 |
+
log n
|
522 |
+
�
|
523 |
+
.
|
524 |
+
(6)
|
525 |
+
Let us compute the influence of the bits in I and E. For j ∈ I, we have |∂jSM| ≤ 2
|
526 |
+
and it yields that
|
527 |
+
|∂ji0| ≤ 2
|
528 |
+
and
|
529 |
+
|∂jYi0| ≤ 2n(d−1)/2
|
530 |
+
nδ log n .
|
531 |
+
As a result,
|
532 |
+
∀j ∈ I
|
533 |
+
|∂j �Φ|2 ≤
|
534 |
+
4nd−1
|
535 |
+
n2δ log2 n.
|
536 |
+
Denote ∆e�Φ = �Φ ◦ σb
|
537 |
+
e − �Φ ◦ σa
|
538 |
+
e where σa
|
539 |
+
e, σb
|
540 |
+
e is the function that changes the value
|
541 |
+
of the edge e to a, respectively b. We have
|
542 |
+
P(∂e�Φ ̸= 0) = P(∆e�Φ ̸= 0) =
|
543 |
+
1
|
544 |
+
G({a})P(∆e�Φ ̸= 0, te = a) ≤
|
545 |
+
1
|
546 |
+
G({a})P(e ∈ Emin(j0)).
|
547 |
+
Note that if ∆e�Φ ̸= 0 and te = a, then necessarily e has to belong to the minimal
|
548 |
+
surface. For e ∈ E, thanks to the previous inequality, we have
|
549 |
+
∥∂e�Φ∥2
|
550 |
+
2 ≤ (b − a)2
|
551 |
+
4
|
552 |
+
P(∂e�Φ ̸= 0) ≤ (b − a)2
|
553 |
+
4G({a})P(e ∈ Emin(j0)).
|
554 |
+
Besides, we have by Cauchy–Schwarz inequality
|
555 |
+
∥∂e�Φ∥1 = E
|
556 |
+
����∂e�Φ
|
557 |
+
���
|
558 |
+
���
|
559 |
+
≤
|
560 |
+
�
|
561 |
+
P(∂e�Φ ̸= 0) ∥∂e�Φ∥2 ≤
|
562 |
+
�
|
563 |
+
G({a})−1P(e ∈ Emin(j0)) ∥∂e�Φ∥2.
|
564 |
+
Let n0 be as in the statement of Proposition 2.2. Finally, by applying Theorem 1.4
|
565 |
+
and Proposition 2.2, we get for n ≥ n0
|
566 |
+
Var(�Φ)
|
567 |
+
≤ C
|
568 |
+
�
|
569 |
+
�
|
570 |
+
�
|
571 |
+
�
|
572 |
+
�
|
573 |
+
j∈I
|
574 |
+
∥∂j �Φ∥2
|
575 |
+
2 +
|
576 |
+
�
|
577 |
+
e∈E:
|
578 |
+
P(e∈Emin(j0))≥n−ξ
|
579 |
+
∥∂e�Φ∥2
|
580 |
+
2 +
|
581 |
+
�
|
582 |
+
e∈E:
|
583 |
+
P(e∈Emin(j0))<n−ξ
|
584 |
+
∥∂e�Φ∥2
|
585 |
+
2
|
586 |
+
1 − log(G({a})−1P(e ∈ Emin(j0))/2
|
587 |
+
�
|
588 |
+
�
|
589 |
+
�
|
590 |
+
�
|
591 |
+
≤ C
|
592 |
+
�
|
593 |
+
|I|
|
594 |
+
nd−1
|
595 |
+
n2δ log2 n + (b − a)2
|
596 |
+
G({a}) nd−1−ξ +
|
597 |
+
(b − a)2
|
598 |
+
G({a})(1 + ξ
|
599 |
+
4 log n)
|
600 |
+
�
|
601 |
+
e∈E
|
602 |
+
P(e ∈ Emin(j0)))
|
603 |
+
�
|
604 |
+
.
|
605 |
+
(7)
|
606 |
+
Besides, note that the following set is a cutset from the top to the bottom of the
|
607 |
+
cylinder cyl
|
608 |
+
�
|
609 |
+
A +
|
610 |
+
� H
|
611 |
+
2
|
612 |
+
�
|
613 |
+
ed, 1
|
614 |
+
2h0n
|
615 |
+
�
|
616 |
+
F :=
|
617 |
+
�
|
618 |
+
{x, x + ed}, x ∈
|
619 |
+
�
|
620 |
+
[0, n]d−1 ×
|
621 |
+
��H
|
622 |
+
2
|
623 |
+
���
|
624 |
+
∩ Zd
|
625 |
+
�
|
626 |
+
.
|
627 |
+
It follows that
|
628 |
+
�Φ ≤ X⌊ H
|
629 |
+
2 ⌋ ≤ b|F| = b(n + 1)d−1
|
630 |
+
and
|
631 |
+
a|Emin(j0)| ≤ b(n + 1)d−1.
|
632 |
+
(8)
|
633 |
+
We conclude by combining inequalities (6), (7) and (8).
|
634 |
+
□
|
635 |
+
|
636 |
+
10
|
637 |
+
BARBARA DEMBIN
|
638 |
+
CHRISTOPHE GARBAN
|
639 |
+
3. Proof of Proposition 2.1 (absence of long chimneys)
|
640 |
+
We shall need the following discrete isoperimetric inequality from [4] (N.B. the
|
641 |
+
result in [4] is essentially sharp both in the side-length n and in the dimension d − 1,
|
642 |
+
we only need the weaker statement given below).
|
643 |
+
Theorem 3.1 (Corollary of Theorem 2 in [4]). For any d ≥ 2, there exists c =
|
644 |
+
c(d) > 0 s.t. for any n ≥ 1 and any set A ⊂ [0, n]d−1,
|
645 |
+
|∆A| ≥ c|A|1−
|
646 |
+
1
|
647 |
+
d−1 ∧ ((n + 1)d−1 − |A|)1−
|
648 |
+
1
|
649 |
+
d−1 ,
|
650 |
+
where ∆A stands for the edge boundary of the set A in [0, n]d−1 (i.e.
|
651 |
+
∆A :=
|
652 |
+
�
|
653 |
+
{i, j}, ∥i − j∥2 = 1, i ∈ A and j ∈ [0, n]d−1 \ A
|
654 |
+
�
|
655 |
+
).
|
656 |
+
Proof of Proposition 2.1. Let h0 > 0 whose value will be chosen later depending on
|
657 |
+
a and b. Let H ≥ 1
|
658 |
+
2h0n and let E ⊂ Ed be a cut-set that achieves the infimum in
|
659 |
+
Φ([0, n]d−1 × {0}, H).
|
660 |
+
Let hmax be the maximum height in {0, . . . , H} of a vertex belonging to an edge in
|
661 |
+
the minimal cut-set E. Define similarly hmin. Our goal is then to show that uniformly
|
662 |
+
in the configuration of capacities {t(e)}, one necessarily has hmax − hmin ≤ h0
|
663 |
+
2 .
|
664 |
+
Scanning the upper horizontal slices. We start by scanning the upper horizon-
|
665 |
+
tal layers of the cut-set E as follows. For any 1 ≤ i ≤ hmax, we call the ith upper
|
666 |
+
layer, Ui := [0, n]d−1 × {hmax − i} and we define the following subset of Ui. Let
|
667 |
+
A(i) ⊂ Ui be the set of all points x ∈ Ui such that any path γ connecting x to
|
668 |
+
[0, n]d−1 × {H} inside the cylinder [0, n]d−1 × [hmax − i, H] necessarily intersects E.
|
669 |
+
Let us start with the following two easy observations:
|
670 |
+
• Since E is a minimal cut-set, it is easy to check that A(i) ̸= ∅ for all i ≥ 1.
|
671 |
+
• Notice that the edge boundary ∆A(i) ⊂ E ∩ Ui (N.B. in general, there is
|
672 |
+
no equality).
|
673 |
+
We will need the following Lemma.
|
674 |
+
Lemma 3.2. For each i ≥ 1, let Fi := E ∩ [0, n]d−1 × [0, hmax − i], i.e. the set
|
675 |
+
of all edges in E that belong to the layer Ui or are below that layer. Then for any
|
676 |
+
i ≥ 1, the set
|
677 |
+
Ei := Fi ∪
|
678 |
+
�
|
679 |
+
{x, x − ed}, x ∈ A(i)
|
680 |
+
�
|
681 |
+
is a cut-set of the cylinder [0, n]d−1×[0, H]. (N.B. Its dual may no longer correspond
|
682 |
+
to a simply connected surface. See Figure 2).
|
683 |
+
Proof.
|
684 |
+
Let γ = {x0, x1, . . . , xN} be any connected vertex-path connecting the
|
685 |
+
bottom to the top of the cylinder. Let 1 ≤ m < N be the first time where the
|
686 |
+
path reaches the layer Ui, i.e x0, . . . , xm−1 stays strictly below Li and xm ∈ Ui.
|
687 |
+
We need to discuss the following two cases: First, if xm ∈ A(i), then we are
|
688 |
+
done as the edge {xm−1, xm} belongs to
|
689 |
+
�
|
690 |
+
{x, x − ed}, x ∈ A(i)
|
691 |
+
�
|
692 |
+
. If, on the other
|
693 |
+
hand, the point xm /∈ A(i), then we claim that the path {x0, . . . , xm} has necessarily
|
694 |
+
intersected an edge of Fi. Indeed, if this was not the case then the path {x0, . . . , xm}
|
695 |
+
would arrive at xm /∈ A(i) without ever crossing E and by definition of A(i), one
|
696 |
+
could find a connected continuation of this path y1, . . . , yM such that the path
|
697 |
+
x0, . . . , xm, y1, . . . , yM connects the bottom to the top of the cylinder without ever
|
698 |
+
intersecting the cut-set E. This gives us a contradiction and thus concludes our
|
699 |
+
proof.
|
700 |
+
□
|
701 |
+
The reason of this Lemma is that it immediately provides us with the following
|
702 |
+
highly useful constraint: since E is a minimal cut-set and since Fi ∪
|
703 |
+
�
|
704 |
+
{x, x−ed}, x ∈
|
705 |
+
A(i)
|
706 |
+
�
|
707 |
+
is a cut-set, we have for all i ≥ 1,
|
708 |
+
a |E \ Fi| ≤ b|
|
709 |
+
�
|
710 |
+
{x, x − ed}, x ∈ A(i)
|
711 |
+
�
|
712 |
+
| = b |A(i)|
|
713 |
+
(9)
|
714 |
+
|
715 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
716 |
+
11
|
717 |
+
i
|
718 |
+
Figure 2. Illustration in dimension d = 2(= 1 + 1) of the cut-set
|
719 |
+
Ei defined in Lemma 3.2. It is made here of all the blue edges
|
720 |
+
below level i as well as the additional green edges. By extrapolating
|
721 |
+
such a picture in higher dimension d ≥ 3, one can easily produce
|
722 |
+
situations where the set Ei splits into distant disconnected parts
|
723 |
+
even though it arises from a minimal cut-set.
|
724 |
+
We now define
|
725 |
+
T := min{i ≥ 1 s.t. |A(i)| ≥ (1 − a
|
726 |
+
10b)(n + 1)d−1} .
|
727 |
+
(10)
|
728 |
+
We shall prove the following Lemma.
|
729 |
+
Lemma 3.3. For any 0 < a < b, there exists ϵ = ϵ(a, b) > 0 s.t. for any 1 ≤ k ≤
|
730 |
+
T − 1,
|
731 |
+
|∆A(k)| ≥ ϵ kd−2 ,
|
732 |
+
The Lemma is easily proved by induction as follows. Unless T = 1, the lemma
|
733 |
+
clearly holds for k = 1. (This is because in this case ∅ ⊊ A(1) ⊊ [0, n]d−1). Now,
|
734 |
+
suppose the Lemma holds for a certain constant ϵ > 0 for all m < k ≤ T − 1.
|
735 |
+
We shall use the above constraint (9) at the layer i = k. Notice that the set of
|
736 |
+
edges E \ Fk is by definition the set of edges that are above the layer k (including
|
737 |
+
some vertical edges pointing at that layer). In particular, this set is larger than the
|
738 |
+
set of horizontal edges which lie above the kth layer Uk, namely,
|
739 |
+
E \ Fk ⊃
|
740 |
+
k−1
|
741 |
+
�
|
742 |
+
m=1
|
743 |
+
E ∩ Um .
|
744 |
+
Our next crucial point is the fact that for any m, as pointed out earlier, one has
|
745 |
+
∆A(m) ⊂ E ∩ Um. As such, this gives us
|
746 |
+
|E \ Fk| ≥
|
747 |
+
k−1
|
748 |
+
�
|
749 |
+
m=1
|
750 |
+
|E ∩ Um| ≥
|
751 |
+
k−1
|
752 |
+
�
|
753 |
+
m=1
|
754 |
+
|∆A(m)|
|
755 |
+
≥ ϵ
|
756 |
+
k−1
|
757 |
+
�
|
758 |
+
m=1
|
759 |
+
md−2 ≥ ϵ C(d) kd−1 .
|
760 |
+
Now plugging this into the constraint (9) gives us
|
761 |
+
b|A(k)| ≥ a|E \ Fk| ≥ aϵ C(d) kd−1 .
|
762 |
+
(11)
|
763 |
+
|
764 |
+
12
|
765 |
+
BARBARA DEMBIN
|
766 |
+
CHRISTOPHE GARBAN
|
767 |
+
Now, using the fact that |A(k)| < (1 −
|
768 |
+
a
|
769 |
+
10b)(n + 1)d−1 (this is because k < T), we
|
770 |
+
obtain from Theorem 3.1 that
|
771 |
+
|∆A(k)| ≥ c(a, b)|A(k)|1−
|
772 |
+
1
|
773 |
+
d−1 .
|
774 |
+
(Where for example c(a, b) = c( a
|
775 |
+
20b)1−
|
776 |
+
1
|
777 |
+
d−1 ). Plugging this into (11) now gives us
|
778 |
+
|∆A(k)| ≥ c(a, b)
|
779 |
+
�aϵC(d)
|
780 |
+
b
|
781 |
+
�1−
|
782 |
+
1
|
783 |
+
d−1
|
784 |
+
kd−2 .
|
785 |
+
For 0 < a < b and the dimension d fixed, one can choose the constant ϵ small
|
786 |
+
enough so that
|
787 |
+
c(a, b)
|
788 |
+
�aϵC(d)
|
789 |
+
b
|
790 |
+
�1−
|
791 |
+
1
|
792 |
+
d−1
|
793 |
+
> ϵ ,
|
794 |
+
which ends the proof of the Lemma.
|
795 |
+
□
|
796 |
+
Now using the Lemma 3.3 until k = T − 1, we extract the following estimate:
|
797 |
+
C(d)ϵT d−1 ≤
|
798 |
+
T −1
|
799 |
+
�
|
800 |
+
k=1
|
801 |
+
|∆A(k)| ≤ |E \ FT | ≤ |E| ≤ b
|
802 |
+
a(n + 1)d−1 .
|
803 |
+
This implies the deterministic statement that the stopping time T is always bounded
|
804 |
+
from above by ¯h0 n, where ¯h0 is a constant which only depends on 0 < a < b and
|
805 |
+
the dimension d.
|
806 |
+
The rest of the proof will proceed as follows: we will now scan horizontally the
|
807 |
+
cut-set E from its bottom hmin and proceed upwards until we reach hmin + T ′. We
|
808 |
+
will be left with showing that hmax − T cannot be much bigger than hmin + T ′. In
|
809 |
+
order to keep a control on hmax − T versus hmin + T ′, it will be important to use
|
810 |
+
exactly the same combinatorial definitions when scanning from below.
|
811 |
+
Scanning the lower horizontal slices. We proceed in the same fashion. For
|
812 |
+
any 1 ≤ i ≤ H − hmin, we call the ith lower layer, Li := [0, n]d−1 × {hmin + i}
|
813 |
+
and we define the following subset of Li. Let ˆA(i) ⊂ Li be the set of all points
|
814 |
+
x ∈ Li such that any path γ connecting x to [0, n]d−1 × {H} inside the cylinder
|
815 |
+
[0, n]d−1 × [hmax − i, H] necessarily intersects E. (Notice and this is a key point
|
816 |
+
that the set ˆA(i) is nothing but the previous set A(j) with j = hmax − hmin − i).
|
817 |
+
We will need the following slight adaptation of Lemma 3.2 where we now add
|
818 |
+
additional edges on the top of the complement of ˆA(i).
|
819 |
+
Lemma 3.4. For each i ≥ 1, let Gi := E ∩ [0, n]d−1 × [hmin + i, H], i.e. the set
|
820 |
+
of all edges in E that belong to the layer Li or are above that layer. Then for any
|
821 |
+
i ≥ 1, the set
|
822 |
+
ˆEi := Gi ∪
|
823 |
+
�
|
824 |
+
{x, x + ed}, x /∈ ˆA(i)
|
825 |
+
�
|
826 |
+
is a cut-set of the cylinder [0, n]d−1 × [0, H].
|
827 |
+
Proof. Let γ = {x0, x1, . . . , xN} be any connected vertex-path connecting the bottom
|
828 |
+
to the top of the cylinder. Let 1 ≤ m < N be the last passage time of this path
|
829 |
+
through the layer Li. If xm ∈ ˆA(i), then by definition of this set, the rest of the
|
830 |
+
connected path {xm, . . . , xN} will go through an edge in Gi. If on the other hand
|
831 |
+
xm /∈ ˆA(i), then since xm is the last passage through Li, the next edge is necessarily
|
832 |
+
a vertical edge {xm, xm+ed} which belongs to
|
833 |
+
�
|
834 |
+
{x, x + ed}, x /∈ ˆA(i)
|
835 |
+
�
|
836 |
+
, this ends the
|
837 |
+
proof.
|
838 |
+
□
|
839 |
+
Similarly as for the upper layers, we define
|
840 |
+
ˆT := min{i ≥ 1 s.t. |( ˆA(i))c| ≥ (1 − a
|
841 |
+
10b)(n + 1)d−1} .
|
842 |
+
(12)
|
843 |
+
|
844 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
845 |
+
13
|
846 |
+
We claim that the exact same analysis as for the upper layers shows the following
|
847 |
+
two facts:
|
848 |
+
(1) for any 1 ≤ k ≤ ˆT − 1, |∆ ˆA(k)| = |∆( ˆA(k)c| ≥ ϵ kd−2.
|
849 |
+
(2) ˆT ≤ ¯h0n.
|
850 |
+
To conclude our proof, it remains to show that the upper layer where we stop the
|
851 |
+
scanning from above, i.e. hmax − T cannot be much higher then the lower layer
|
852 |
+
hmin + ˆT at which we stop the scanning from below. In fact, with our choices
|
853 |
+
of stopping times T and ˆT, we will show more in the next Lemma, i.e. that up
|
854 |
+
to a safety margin of 1, the top exploration necessarily stops below the bottom
|
855 |
+
exploration.
|
856 |
+
Lemma 3.5.
|
857 |
+
hmin + ˆT + 1 ≥ hmax − T .
|
858 |
+
To prove this Lemma, now that we have analyzed upper and lower horizontal
|
859 |
+
slices, it remains to understand what would happen for the intermediate slices if
|
860 |
+
they were to exist.
|
861 |
+
Scanning the intermediate slices. Let us suppose by contradiction that hmin +
|
862 |
+
ˆT + 1 < hmax − T. Introduce
|
863 |
+
M := hmax − T − hmin − ˆT (M ≥ 2),
|
864 |
+
the number of intermediate slices. Let us reparametrize the layers so that i = 0
|
865 |
+
corresponds to the height hmin + ˆT while i = M corresponds to the top intermediate
|
866 |
+
layer hmax − T. We shall denote by { ˜A(i)}1≤i≤M−1 the same sets as before (we
|
867 |
+
use ˜A instead of A or ˆA just because of the reparametrization). Note that we have
|
868 |
+
˜A(0) = ˆA( ˆT) and ˜A(M) = A(T).
|
869 |
+
Lemma 3.6. For each 1 ≤ i ≤ M − 1, we have the following 2 constraints.
|
870 |
+
(1) a| ˜A(i)c| ≤ b|A(T)c| (≤
|
871 |
+
a
|
872 |
+
10
|
873 |
+
(n+1)d−1
|
874 |
+
2
|
875 |
+
)
|
876 |
+
(2) a| ˜A(i)| ≤ b| ˆA( ˆT)| (≤
|
877 |
+
a
|
878 |
+
10
|
879 |
+
(n+1)d−1
|
880 |
+
2
|
881 |
+
)
|
882 |
+
For the inequalities in the parenthesis, we used the definitions of our stopping
|
883 |
+
times T and ˆT (given in (10) and (12)). Conditions 1) and 2) are incompatible.
|
884 |
+
Therefore this lemma implies that such intermediate layers cannot exist. This implies
|
885 |
+
Lemma 3.5. To conclude the proof of Proposition 2.1, we are thus left with proving
|
886 |
+
Lemma 3.6.
|
887 |
+
Proof of Lemma 3.6. Let us start with item 1. Each point x in the intermediate
|
888 |
+
layer i (i.e. at height hmin + ˆT + i) which belongs to the set ( ˜A(i))c has a path in
|
889 |
+
its upper cylinder which connects it to [0, n]d−1 × {H} without intersecting E. By
|
890 |
+
concatenating this path together with a vertical path pointing down all the way
|
891 |
+
from x to the bottom face [0, n]d−1 × {0}, since E is a cut-set, it is necessary that
|
892 |
+
at least one edges in this vertical path belongs to E. This implies in particular that
|
893 |
+
we have at least |( ˜A(i))c| edges of E which are located below layer i. Finally, there
|
894 |
+
cannot be too many such edges since E is a minimal cut-set. Using Lemma 3.4 for
|
895 |
+
the layer at height hmax − T (or i = M), leads us precisely to the constraint 1).
|
896 |
+
Item 2 is proved in a similar way. For any point x which belongs to ˜A(i), if we
|
897 |
+
follow the vertical path above x until we reach the top layer [0, n]d−1 × {T}, then
|
898 |
+
by definition of ˜A(i), the path will go through at least one edge of E. This implies
|
899 |
+
in particular that there are at least | ˜A(i)| edges in E above (or touching) layer i.
|
900 |
+
Now using Lemma 3.2 for the layer at height hmin + ˆT (or i = 0) together with the
|
901 |
+
fact that E is minimal leads us to constraint 2.
|
902 |
+
□
|
903 |
+
|
904 |
+
14
|
905 |
+
BARBARA DEMBIN
|
906 |
+
CHRISTOPHE GARBAN
|
907 |
+
Remark 2. In the context of minimal surfaces in the continuum setting, a similar
|
908 |
+
phenomenon of absence of “long thin chimneys" has been observed for example in
|
909 |
+
[12].
|
910 |
+
4. Proof of Proposition 2.2
|
911 |
+
Let us first prove the following proposition which states that it is unlikely that
|
912 |
+
the minimal surface Emin(j0) sticks to the bottom or the top of the cylinder.
|
913 |
+
Proposition 4.1. There exists n0 = n0(G) ≥ 1 such that for all n ≥ n0, we have
|
914 |
+
P (j0 ∈ {1, 2}) ≤
|
915 |
+
2
|
916 |
+
√n
|
917 |
+
and
|
918 |
+
P
|
919 |
+
�
|
920 |
+
j0 ∈
|
921 |
+
�
|
922 |
+
H − 1
|
923 |
+
2h0n, H − 1
|
924 |
+
2h0n − 1
|
925 |
+
��
|
926 |
+
≤
|
927 |
+
2
|
928 |
+
√n.
|
929 |
+
To prove this proposition, we will need the following upper bound on the variance.
|
930 |
+
Proposition 4.2 (Efron–Stein). There exists a constant β > 0 depending on G
|
931 |
+
such that for all n ≥ 1 and H ≥ 1, we have
|
932 |
+
Var(Φ([0, n]d−1 × {0}, H)) ≤ βnd−1 .
|
933 |
+
Proof. The proof is a straightforward application of Theorem 1.5. Let e1, . . . , eN
|
934 |
+
be a deterministic ordering of the edges of the cylinder cyl([0, n]d−1 × {0}, H)).
|
935 |
+
Set X = (te1, . . . , ten) and f(X) = Φ([0, n]d−1 × {0}, H). Let Emin be a minimal
|
936 |
+
surface for X (chosen according to a deterministic rule in case of ties). Recall that
|
937 |
+
X(i) denotes the vector X where the i-th edge has been resampled. Note that if
|
938 |
+
f(X) < f(X(i)) then ei belongs Emin. By similar reasoning as in (8), we have
|
939 |
+
|Emin| ≤ b
|
940 |
+
a(n + 1)d−1.
|
941 |
+
By applying Theorem 1.5, it follows that
|
942 |
+
Var(f(X)) ≤
|
943 |
+
N
|
944 |
+
�
|
945 |
+
i=1
|
946 |
+
(b − a)2P(ei ∈ Emin) ≤ (b − a)2 b
|
947 |
+
a(n + 1)d−1.
|
948 |
+
This concludes the proof.
|
949 |
+
□
|
950 |
+
Proof of Proposition 4.1. Thanks to Proposition 2.1, we have
|
951 |
+
Φ([0, n]d−1 × {0}, H) =
|
952 |
+
min
|
953 |
+
1≤i≤H− h0
|
954 |
+
2 n
|
955 |
+
Xi .
|
956 |
+
We will just prove the first inequality as the proof for the second inequality is similar.
|
957 |
+
Let us assume by contradiction that
|
958 |
+
P (j0 = 1) = P
|
959 |
+
�
|
960 |
+
min
|
961 |
+
1≤i≤H− 1
|
962 |
+
2 h0n Xi + Yi = X1 + Y1
|
963 |
+
�
|
964 |
+
≥
|
965 |
+
1
|
966 |
+
√n .
|
967 |
+
We have for n large enough
|
968 |
+
|i0 − 1| ≥ H
|
969 |
+
2 − nε − 1 > H
|
970 |
+
2 − nδ + nδ
|
971 |
+
2
|
972 |
+
and
|
973 |
+
Y1 ≥ n(d−1)/2
|
974 |
+
2 log n .
|
975 |
+
For all i ∈ [2nδ, 3H/4], we have Yi = 0. On the event {min1≤i≤H− 1
|
976 |
+
2 h0n Xi + Yi =
|
977 |
+
X1 + Y1}, we have
|
978 |
+
X1 ≤
|
979 |
+
min
|
980 |
+
i∈[2nδ,3H/4] Xi − n(d−1)/2
|
981 |
+
2 log n .
|
982 |
+
|
983 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
984 |
+
15
|
985 |
+
Hence,
|
986 |
+
P
|
987 |
+
�
|
988 |
+
X1 ≤
|
989 |
+
min
|
990 |
+
i∈[2nδ,3H/4] Xi − n(d−1)/2
|
991 |
+
2 log n
|
992 |
+
�
|
993 |
+
≥
|
994 |
+
1
|
995 |
+
√n .
|
996 |
+
Set
|
997 |
+
Ej :=
|
998 |
+
�
|
999 |
+
Xj ≤
|
1000 |
+
min
|
1001 |
+
i∈[j+2nδ,3H/4] Xi − n(d−1)/2
|
1002 |
+
2 log n
|
1003 |
+
�
|
1004 |
+
.
|
1005 |
+
Since the distribution of (Xi)1≤i≤3H/4 is the same as the distribution of (Xi)j≤i≤3H/4+j−1,
|
1006 |
+
we have
|
1007 |
+
P(Ej) ≥
|
1008 |
+
1
|
1009 |
+
√n .
|
1010 |
+
Set for 1 ≤ k ≤ H/4nδ
|
1011 |
+
Ik := [4knδ, 2(2k + 1)nδ]
|
1012 |
+
and
|
1013 |
+
Fk :=
|
1014 |
+
�
|
1015 |
+
j∈Ik
|
1016 |
+
Ej .
|
1017 |
+
Let N be the number of k ≤ H/4nδ such that Fk occurs, that is,
|
1018 |
+
N :=
|
1019 |
+
�
|
1020 |
+
1≤k≤H/4nδ
|
1021 |
+
1Fk .
|
1022 |
+
We have
|
1023 |
+
E[N] ≥
|
1024 |
+
�
|
1025 |
+
1≤k≤H/4nδ
|
1026 |
+
P(Fk) ≥ h0
|
1027 |
+
√n
|
1028 |
+
4nδ
|
1029 |
+
≥ h0
|
1030 |
+
2 n1/4
|
1031 |
+
(13)
|
1032 |
+
where we recall that H ≥ h0n. Let i1 < · · · < iN be integers such that they all
|
1033 |
+
belong to different intervals in (Ik, 1 ≤ k ≤ H/4nδ) and for all 1 ≤ j ≤ N, the
|
1034 |
+
event Eij occurs. Note that ij+1 − ij ≥ 2nδ since they belong to different intervals.
|
1035 |
+
Moreover, on the event Eij, we have
|
1036 |
+
Xij ≤ Xij+1 − n(d−1)/2
|
1037 |
+
2 log n .
|
1038 |
+
We can prove by induction that for 0 ≤ k ≤ N − 1
|
1039 |
+
XiN−k ≤
|
1040 |
+
min
|
1041 |
+
H/2+1≤i≤3H/4 Xi − (k + 1)n(d−1)/2
|
1042 |
+
2 log n .
|
1043 |
+
Hence,
|
1044 |
+
min
|
1045 |
+
1≤i≤H/2 Xi ≤
|
1046 |
+
min
|
1047 |
+
H/2+1≤i≤3H/4 Xi − Nn(d−1)/2
|
1048 |
+
2 log n .
|
1049 |
+
It follows that for t ≥ 0 using Bienaymé–Chebyshev’s inequality and Proposition 4.2
|
1050 |
+
P(N ≥ 2t log2 n) ≤ P
|
1051 |
+
�
|
1052 |
+
min
|
1053 |
+
H/2+1≤i≤3H/4 Xi −
|
1054 |
+
min
|
1055 |
+
1≤i≤H/2 Xi ≥ tn(d−1)/2
|
1056 |
+
�
|
1057 |
+
≤ 2Var(min1≤i≤H/2 Xi)
|
1058 |
+
t2nd−1
|
1059 |
+
≤ 2β
|
1060 |
+
t2 .
|
1061 |
+
It yields that
|
1062 |
+
E(N) ≤ 2(1 + 2β) log2 n .
|
1063 |
+
This contradicts inequality (13) for n large enough depending on G. By the same
|
1064 |
+
reasoning we can prove that
|
1065 |
+
P (j0 = 2) ≤
|
1066 |
+
1
|
1067 |
+
√n.
|
1068 |
+
This completes the proof.
|
1069 |
+
□
|
1070 |
+
To prove Proposition 2.2, we will also need the following lemma on the regularity
|
1071 |
+
of influences under translation by ed.
|
1072 |
+
|
1073 |
+
16
|
1074 |
+
BARBARA DEMBIN
|
1075 |
+
CHRISTOPHE GARBAN
|
1076 |
+
Lemma 4.3. There exists n0 = n0(G) such that for all n ≥ n0, H ≥ h0n the
|
1077 |
+
following holds. Let e be an edge of cyl(A, H) such that e + 2ed ⊂ cyl(A, H), we
|
1078 |
+
have
|
1079 |
+
|P(e ∈ Emin(j0)) − P(e + 2ed ∈ Emin(j0))| ≤
|
1080 |
+
2
|
1081 |
+
nε/2 .
|
1082 |
+
Proof of Lemma 4.3. Let (te)e∈cyl(A,h). We define t′
|
1083 |
+
e as follows
|
1084 |
+
t′
|
1085 |
+
e :=
|
1086 |
+
� te+2ed
|
1087 |
+
if e + 2ed ∈ cyl(A, H)
|
1088 |
+
t′′
|
1089 |
+
e
|
1090 |
+
otherwise
|
1091 |
+
where (t′′
|
1092 |
+
e)e∈cyl(A,h) is independent from (te). Let (Zi)1≤i≤M, (Z′
|
1093 |
+
i)1≤i≤M be two
|
1094 |
+
independent family of random variables that take the value −1 with probability
|
1095 |
+
G({a}) and 1 with probability 1 − G({a}) = G({b}). Set
|
1096 |
+
Sk :=
|
1097 |
+
k
|
1098 |
+
�
|
1099 |
+
k=1
|
1100 |
+
Zi
|
1101 |
+
and
|
1102 |
+
S′
|
1103 |
+
k :=
|
1104 |
+
k
|
1105 |
+
�
|
1106 |
+
k=1
|
1107 |
+
Z′
|
1108 |
+
i.
|
1109 |
+
Let
|
1110 |
+
τ := inf{k ∈ {1, . . . , M} : S′
|
1111 |
+
k ≥ Sk + 2}
|
1112 |
+
where we use the convention inf ∅ = +∞. Finally, we set
|
1113 |
+
i0 :=
|
1114 |
+
M
|
1115 |
+
�
|
1116 |
+
k=1
|
1117 |
+
Zk
|
1118 |
+
and
|
1119 |
+
i′
|
1120 |
+
0 :=
|
1121 |
+
min(τ,M)
|
1122 |
+
�
|
1123 |
+
k=1
|
1124 |
+
Z′
|
1125 |
+
k +
|
1126 |
+
M
|
1127 |
+
�
|
1128 |
+
k=min(τ,M)+1
|
1129 |
+
Zk.
|
1130 |
+
Denote by E′
|
1131 |
+
min(j′
|
1132 |
+
0) the minimal cutset corresponding to the family (t′
|
1133 |
+
e)e∈cyl(A,h)
|
1134 |
+
and i′
|
1135 |
+
0. It is easy to check that it has the same law as Emin(j0). Moreover, there
|
1136 |
+
exists a universal C > 0 s.t.
|
1137 |
+
P(i′
|
1138 |
+
0 − i0 ̸= 2) = P(τ = ∞) = P(∀k ∈ {1, . . . , M}
|
1139 |
+
Sk − S′
|
1140 |
+
k ≥ 0) ≤
|
1141 |
+
C
|
1142 |
+
√
|
1143 |
+
M
|
1144 |
+
.
|
1145 |
+
On the event {i′
|
1146 |
+
0 = i0 + 2} ∩ {j0 /∈ {H − 1
|
1147 |
+
2h0n, H − 1
|
1148 |
+
2h0n − 1}} ∩ {j′
|
1149 |
+
0 /∈ {1, 2}}, we
|
1150 |
+
have
|
1151 |
+
∀1 ≤ j ≤ H − 1
|
1152 |
+
2h0n − 2
|
1153 |
+
Xj(te) + Yj(i0) = Xj+2(t′
|
1154 |
+
e) + Yj+2(i′
|
1155 |
+
0)
|
1156 |
+
and Emin(j0) + 2ed = E′
|
1157 |
+
min(j′
|
1158 |
+
0). It yields
|
1159 |
+
|P(e ∈ Emin(j0)) − P(e + 2ed ∈ Emin(j0))|
|
1160 |
+
≤ P(i′
|
1161 |
+
0 − i0 ̸= 2) + P(j0 ∈ {1, 2}) + P
|
1162 |
+
�
|
1163 |
+
j0 ∈
|
1164 |
+
�
|
1165 |
+
H − 1
|
1166 |
+
2h0n, H − 1
|
1167 |
+
2h0n − 1
|
1168 |
+
��
|
1169 |
+
.
|
1170 |
+
Finally, by combining the two previous inequalities and using Proposition 4.1, it
|
1171 |
+
follows that for n ≥ n0 (where n0 is as in the statement of Proposition 4.1)
|
1172 |
+
|P(e ∈ Emin(j0)) − P(e + 2ed ∈ Emin(j0))| ≤
|
1173 |
+
2
|
1174 |
+
nε/2
|
1175 |
+
The result follows.
|
1176 |
+
□
|
1177 |
+
Proof of Proposition 2.2. Let n0 be as in the statement of Lemma 4.3. Let n ≥ n0.
|
1178 |
+
Let m ≥ 1 that we will choose later depending on n.
|
1179 |
+
Set k = ⌊n/m⌋.
|
1180 |
+
For
|
1181 |
+
i = (i1, . . . , id−1) ∈ {1, . . . , k}d−1, we define
|
1182 |
+
Ai :=
|
1183 |
+
d
|
1184 |
+
�
|
1185 |
+
j=1
|
1186 |
+
[(ij − 1)m, ijm) × {0} .
|
1187 |
+
We denote by J the set of cylinders that contain an edge such that P(e ∈ Emin(j0)) ≥
|
1188 |
+
n−ε/8, that is,
|
1189 |
+
J :=
|
1190 |
+
�
|
1191 |
+
i ∈ {1, . . . , k}d−1 : ∃e ∈ cyl(Ai, H)
|
1192 |
+
P(e ∈ Emin(j0)) ≥ n−ε/8�
|
1193 |
+
.
|
1194 |
+
|
1195 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
1196 |
+
17
|
1197 |
+
Note that the set J is deterministic. By definition, the edges e ∈ cyl(Ai, H) for i /∈ J
|
1198 |
+
have a small influence. We need to make sure that there is a negligible number of
|
1199 |
+
edges with a large influence in cyl(Ai, H) for i ∈ J. In particular, we need to avoid
|
1200 |
+
that the minimal surface has a too large intersection with these cylinders.
|
1201 |
+
Let us first bound the size of J. Let us assume that there exists e ∈ cyl(Ai, H) such
|
1202 |
+
that P(e ∈ Emin(j0)) ≥ n−ε/8. Without loss of generality assume that e + √ned ∈
|
1203 |
+
cyl(Ai, H). By Proposition 4.3, we have
|
1204 |
+
|P(e ∈ Emin(j0)) − P(e + 2jed ∈ Emin(j0))| ≤
|
1205 |
+
2j
|
1206 |
+
nε/2 .
|
1207 |
+
Hence, for every j ≤ nε/4/4, we have
|
1208 |
+
P(e + 2jed ∈ Emin(j0)) ≥
|
1209 |
+
1
|
1210 |
+
nε/8 − 2j
|
1211 |
+
nε/2 ≥
|
1212 |
+
1
|
1213 |
+
2nε/8 .
|
1214 |
+
It yields that
|
1215 |
+
E[|Emin(j0) ∩ cyl(Ai, H)|] ≥ nε/4
|
1216 |
+
8nε/8 ≥ 1
|
1217 |
+
8nε/8 .
|
1218 |
+
Hence, we get using inequality (8)
|
1219 |
+
|J|nε/8
|
1220 |
+
8
|
1221 |
+
≤
|
1222 |
+
�
|
1223 |
+
i∈J
|
1224 |
+
E[|Emin(j0) ∩ cyl(Ai, H)|] ≤ E[|Emin(j0) ∩ cyl(A, H)|] ≤ b
|
1225 |
+
a(n + 1)d−1,
|
1226 |
+
it follows that for some positive constant β depending on a, b and d
|
1227 |
+
|J| ≤ βnd−1−ε/8.
|
1228 |
+
Next, we aim at upper bounding the total influence of edges in cyl(Ai, H) for i ∈ J,
|
1229 |
+
that is E [|Emin(j0) ∩ ∪i∈J cyl(Ai, H)|].
|
1230 |
+
Let E be a cutset in the cylinder cyl(A, h), one can check that E ∩ cyl(Ai, H) is
|
1231 |
+
also a cutset from the top to the bottom for the cylinder cyl(Ai, H). It follows that
|
1232 |
+
Φ(Ai, H) ≤ T(E ∩ cyl(Ai, H)).
|
1233 |
+
Hence, it yields
|
1234 |
+
�
|
1235 |
+
i∈{1,...,k}d−1\J
|
1236 |
+
Φ(Ai, H)+a
|
1237 |
+
�
|
1238 |
+
i∈J
|
1239 |
+
|Emin(j0)∩cyl(Ai, H)| ≤ T(Emin(j0)) ≤ Φ(A, H)+n(d−1)/2.
|
1240 |
+
Taking the expectation, we get
|
1241 |
+
aE
|
1242 |
+
��
|
1243 |
+
i∈J
|
1244 |
+
|Emin(j0) ∩ cyl(Ai, H)|
|
1245 |
+
�
|
1246 |
+
≤ E[Φ(A, H)]−
|
1247 |
+
�
|
1248 |
+
i∈{1,...,k}d−1\J
|
1249 |
+
E[Φ(Ai, H)]+n(d−1)/2 .
|
1250 |
+
(14)
|
1251 |
+
To control the right hand side, we will need a result of Zhang [27].
|
1252 |
+
Let K = ⌈n/(m − ⌊m5/6⌋)⌉. Set A′ := [0, K(m − ⌊m5/6⌋)]d−1 × {0} where K was
|
1253 |
+
chosen in such a way that A ⊂ A′. Thanks to the fine study of Zhang [27, inequality
|
1254 |
+
(10.22)], there exists C > 0 such that we have
|
1255 |
+
E[Φ(A′, H)] ≤
|
1256 |
+
�
|
1257 |
+
i∈{1,...,K}d−1
|
1258 |
+
E[Φ(Ai, H)] + C nd−1
|
1259 |
+
m1/16 .
|
1260 |
+
(15)
|
1261 |
+
Let us briefly explain how to prove this inequality. Let us assume we could
|
1262 |
+
prescribe in each cylinder cyl(Ai, H) a boundary condition for the minimal surface
|
1263 |
+
(that is the trace of the surface on the lateral side) in such a way that these boundary
|
1264 |
+
conditions match for adjacent cylinders. In other words, by taking the union of all
|
1265 |
+
minimal cutsets in cyl(Ai, H), i ∈ {1, . . . , k}d−1, one would get a cutset in the big
|
1266 |
+
cylinder cyl(A, H) and so Φ(A, H)] ≤ � Φ(Ai, H). The issue with this strategy is
|
1267 |
+
as follows: in order to prescribe a boundary condition without affecting too much
|
1268 |
+
the expectation E[Φ(Ai, H)], one needs that the trace of the minimal cutset on the
|
1269 |
+
|
1270 |
+
18
|
1271 |
+
BARBARA DEMBIN
|
1272 |
+
CHRISTOPHE GARBAN
|
1273 |
+
lateral sides is negligible with nd−1. Since this fact is not known, Zhang overpasses
|
1274 |
+
this issue by slightly reducing the dimensions of the cylinder’s basis (it accounts for
|
1275 |
+
the m − ⌊m5/6⌋)): since the total size of the minimal surface is of order md−1, we
|
1276 |
+
can find a smaller cylinder where the trace of the minimal surface on the lateral
|
1277 |
+
sides is negligible. Once we can prescribe a given boundary condition, we use the
|
1278 |
+
symmetry to prescribe to adjacent cylinders some symmetric matching boundary
|
1279 |
+
conditions. The union of all these cutsets form a cutset in the big cylinder. Since
|
1280 |
+
the cylinders with prescribed boundary conditions are smaller than the original ones,
|
1281 |
+
we need to use a larger K ≥ k to be sure that A ⊂ A′.
|
1282 |
+
Let us now explain how we can control the right hand side of (14) using (15)
|
1283 |
+
from [27, inequality (10.22)]. The notation τmin(k1, . . . , kd−1, m) corresponds to
|
1284 |
+
Φ(�
|
1285 |
+
i=1...d[0, ki] × {0}, m). We apply the inequality with k1 = · · · = kd−1 = m,
|
1286 |
+
w1 = · · · = wd−1 = K, δ = 1/2. With these notations, the left hand side in (10.22)
|
1287 |
+
is equal to E[Φ(A′, H)]. Since A ⊂ A′, we have E[Φ(A, H)] ≤ E[Φ(A′, H)]. It follows
|
1288 |
+
that
|
1289 |
+
E[Φ(A, H)]−
|
1290 |
+
�
|
1291 |
+
i∈{1,...,k}d−1\J
|
1292 |
+
E[Φ(Ai, H)]
|
1293 |
+
≤ E[Φ(A, H)] −
|
1294 |
+
�
|
1295 |
+
i∈{1,...,K}d−1
|
1296 |
+
E[Φ(Ai, H)] + (|J| + (K − k)d−1)bmd−1
|
1297 |
+
≤ C nd−1
|
1298 |
+
m1/16 + bβnd−1−ε/8md−1 + b
|
1299 |
+
nd−1
|
1300 |
+
m(d−1)/6 .
|
1301 |
+
(16)
|
1302 |
+
Finally, combining (14) and (16), we get
|
1303 |
+
a E
|
1304 |
+
��
|
1305 |
+
i∈J
|
1306 |
+
|Emin(j0) ∩ cyl(Ai, H)|
|
1307 |
+
�
|
1308 |
+
≤ nd−1
|
1309 |
+
m1/16 + bβnd−1−ε/8md−1 + n(d−1)/2.
|
1310 |
+
Now choose m = nε/(16(d−1)). There exists ξ ≤ ε/16 depending on ε such that for n
|
1311 |
+
large enough
|
1312 |
+
E
|
1313 |
+
��
|
1314 |
+
i∈J
|
1315 |
+
|Emin(j0) ∩ cyl(Ai, H)|
|
1316 |
+
�
|
1317 |
+
≤ nd−1−ξ.
|
1318 |
+
We conclude that
|
1319 |
+
�����
|
1320 |
+
�
|
1321 |
+
e ∈
|
1322 |
+
�
|
1323 |
+
i∈J
|
1324 |
+
cyl(Ai, H) : P(e ∈ Emin(j0)) ≥ n−ξ/2
|
1325 |
+
������ ≤ nd−1−ξ/2.
|
1326 |
+
Since ξ ≤ ε/16, we have by definition of J
|
1327 |
+
���
|
1328 |
+
�
|
1329 |
+
e ∈ cyl(A, H) : P(e ∈ Emin(j0)) ≥ n−ξ/2���� ≤ nd−1−ξ/2
|
1330 |
+
(indeed, in the remaining cylinders, all edges have influence less than n−ε/8 which is
|
1331 |
+
smaller than n−ξ/2). As such, the result follows.
|
1332 |
+
□
|
1333 |
+
5. Proof of Theorem 1.2 and fluctuations of anchored
|
1334 |
+
surfaces
|
1335 |
+
We start with the proof of Theorem 1.2 which relies on the martingale decompo-
|
1336 |
+
sition method from Newman–Piza [22].
|
1337 |
+
Proof of Theorem 1.2.
|
1338 |
+
Let e1, . . . , eN be a deterministic ordering of the edges of the cylinder cyl([0, n]d−1×
|
1339 |
+
{0}, H)). Denote by Fk the σ-algebra generated by te1, . . . , tek. To simplify the
|
1340 |
+
|
1341 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
1342 |
+
19
|
1343 |
+
notations, denote f(te1, . . . , teN ) = Φ([0, n]d−1 × {0}, H)). We have the following
|
1344 |
+
martingale decomposition
|
1345 |
+
Var(f) =
|
1346 |
+
N
|
1347 |
+
�
|
1348 |
+
k=1
|
1349 |
+
E[(E(f|Fk) − E(f|Fk−1))2).
|
1350 |
+
Let (t′
|
1351 |
+
e) be an independent family distributed as (te) and denote
|
1352 |
+
tk := (te1, . . . , tek, t′
|
1353 |
+
ek+1, . . . , t′
|
1354 |
+
eN ),
|
1355 |
+
tk
|
1356 |
+
a := (te1, . . . , tek−1, a, t′
|
1357 |
+
ek+1, . . . , t′
|
1358 |
+
eN )
|
1359 |
+
and
|
1360 |
+
tk
|
1361 |
+
b := (te1, . . . , tek−1, b, t′
|
1362 |
+
ek+1, . . . , t′
|
1363 |
+
eN ).
|
1364 |
+
In particular, we have
|
1365 |
+
f(tk) = (tek − a)1f(tk
|
1366 |
+
b )−f(tka)>0 + f(tk
|
1367 |
+
a).
|
1368 |
+
If f(tk
|
1369 |
+
b)−f(tk
|
1370 |
+
a) > 0 we say that the edge ek is pivotal. We can rewrite the expression
|
1371 |
+
as follows
|
1372 |
+
Var(f) =
|
1373 |
+
N
|
1374 |
+
�
|
1375 |
+
k=1
|
1376 |
+
E[E(f(tk) − f(tk−1)|(te)e)2) =
|
1377 |
+
N
|
1378 |
+
�
|
1379 |
+
k=1
|
1380 |
+
E(E((tek − t′
|
1381 |
+
ek)1f(tk
|
1382 |
+
b )−f(tk
|
1383 |
+
a)>0|(te)e)2)
|
1384 |
+
≥ Var(te)
|
1385 |
+
N
|
1386 |
+
�
|
1387 |
+
k=1
|
1388 |
+
P(f(tk
|
1389 |
+
b) − f(tk
|
1390 |
+
a) > 0)2
|
1391 |
+
≥ Var(te)
|
1392 |
+
N
|
1393 |
+
�
|
1394 |
+
k=1
|
1395 |
+
P(ek ∈ Emin, tek = b)2.
|
1396 |
+
When G({b}) > pc(d), there exists c > 0 such that the number of disjoint paths
|
1397 |
+
from the top to the bottom of the cylinder with only edges of time b is at least cnd−1
|
1398 |
+
with high probability (see for instance Theorem 7.68 in [18]). In particular, we have
|
1399 |
+
E[#{e ∈ Emin, te = b}] ≥ cnd−1.
|
1400 |
+
It follows that by Cauchy-Schwarz inequality
|
1401 |
+
Var(f) ≥ Var(te)
|
1402 |
+
N
|
1403 |
+
E[#{e ∈ Emin, te = b}]2 ≥ c0
|
1404 |
+
nd−1
|
1405 |
+
H
|
1406 |
+
where c0 depends on G and d.
|
1407 |
+
□
|
1408 |
+
The same proof allows us to show that fluctuations for anchored surfaces are
|
1409 |
+
not superconcentrated under the following hypothesis (H) of localisation. For any
|
1410 |
+
sequence (hn) such that hn goes to infinity with n, we have
|
1411 |
+
lim
|
1412 |
+
C→∞ lim sup
|
1413 |
+
n→∞
|
1414 |
+
1
|
1415 |
+
nd−1 E[#{e ∈ Emin : e /∈ {x ∈ Rd : |x · ed − hn
|
1416 |
+
2 | ≤ C}] = 0
|
1417 |
+
(H)
|
1418 |
+
where Emin is the minimal cutset for the anchored flow τ([0, n]d−1, hn).
|
1419 |
+
Proposition 5.1. Under the hypothesis (H), the variance of the anchored flow
|
1420 |
+
τ([0, n]d−1, H) (defined at the end of the introduction) is in Ω(nd−1).
|
1421 |
+
6. Chaoticity of the minimal surface
|
1422 |
+
Consider the notations of the previous section: f(te1, . . . , teN ) = Φ([0, n]d−1 ×
|
1423 |
+
{0}, H)). Set X := (te1, . . . , teN ). Let X′ be an independent vector distributed as
|
1424 |
+
X. Consider (U1, . . . , UN) an i.i.d. family of uniform random variables on [0, 1]. For
|
1425 |
+
any t ∈ [0, 1], we define
|
1426 |
+
∀ 1 ≤ i ≤ N
|
1427 |
+
Xt
|
1428 |
+
i :=
|
1429 |
+
� Xi
|
1430 |
+
if Ui ≥ t
|
1431 |
+
X′
|
1432 |
+
i
|
1433 |
+
otherwise.
|
1434 |
+
|
1435 |
+
20
|
1436 |
+
BARBARA DEMBIN
|
1437 |
+
CHRISTOPHE GARBAN
|
1438 |
+
Denote by Pt the set of pivotal edges for f(Xt) and by It the set of edges that are
|
1439 |
+
in the intersection of all the minimal surfaces for f(Xt). It is easy to check that
|
1440 |
+
It ⊂ Pt. Following [8], we obtain the following Corollary of Theorem 1.1.
|
1441 |
+
Corollary 6.1. There exists a positive constant C such that for any n ≥ 1 and
|
1442 |
+
H ≥ h0n
|
1443 |
+
∀t ≥ 0
|
1444 |
+
E[|I0 ∩ It|] ≤ E[|P0 ∩ Pt|] ≤ C
|
1445 |
+
nd−1
|
1446 |
+
t log n Var(te).
|
1447 |
+
More precisely, this result follows from the following mild extension of Lemma
|
1448 |
+
3.3 from [26].
|
1449 |
+
Lemma 6.2 (Small extension of Lemma 3.3 in [26]). For any n ≥ 1 and H ≥ h0n,
|
1450 |
+
we have
|
1451 |
+
Var(Φ([0, n]d−1 × {0}, H)) = Var(te)
|
1452 |
+
� 1
|
1453 |
+
0
|
1454 |
+
E[|P0 ∩ Pt|]dt .
|
1455 |
+
Moreover, the function t → E[|P0 ∩ Pt|] is non-increasing.
|
1456 |
+
7. Open questions
|
1457 |
+
Open question 1. Prove that anchored maximal flow / minimal surfaces are not
|
1458 |
+
superconcentrated in high enough dimension d. (Thanks to Proposition 5.1, this
|
1459 |
+
boils down to showing that Hypothesis (H) holds).
|
1460 |
+
Open question 2. Prove superconcentration for maximal flows/minimal surfaces
|
1461 |
+
in more general domains, as considered for example in [5, 6, 7]. In fact, even
|
1462 |
+
extending Theorem 1.1 to the case of tilted cylinders with a rational slope appears to
|
1463 |
+
be challenging as Zhang’s inequality from [27] relies strongly on symmetry and does
|
1464 |
+
not adapt easily to rational directions.
|
1465 |
+
Open question 3. In this work, we focused on distributions G taking two values
|
1466 |
+
0 < a < b. It would be interesting to extend this analysis to more general distributions.
|
1467 |
+
The works [2, 11] by Benaïm–Rossignol and Damron–Hanson–Sosoe, where they
|
1468 |
+
extend the study of [3] to more general distributions are likely to play a key role
|
1469 |
+
here.
|
1470 |
+
Note that for a continuous distribution G, the chaoticity property proved in
|
1471 |
+
Corollary 6.1 would be more meaningful as the minimal surface would then be a.s.
|
1472 |
+
unique. In particular one would control the true intersection of minimal surfaces
|
1473 |
+
before and after noise.
|
1474 |
+
Open question 4. Our main result, Theorem 1.1, only works for thick enough
|
1475 |
+
cylinders (H ≥ h0n, for some large enough constant h0). This barrier h0 is there
|
1476 |
+
only for technical reasons (coming from Proposition 2.1). Show that the result still
|
1477 |
+
holds for any H ≥ Ω(nϵ).
|
1478 |
+
Open question 5. How do the fluctuations scale with n ? Is there an exponent
|
1479 |
+
α(d) ∈ (d − 2, d − 1) which describes the variance of Φ([0, n]d−1 × {0}, H) when H
|
1480 |
+
is, say, linear in n ?
|
1481 |
+
Acknowledgments. We wish to thank Itai Benjamini, Guy David, Simon Masnou,
|
1482 |
+
Ron Peled and Hugo Vanneuville for useful discussions. The research of B.D is
|
1483 |
+
supported by the European Research Council (ERC) under the European Union’s
|
1484 |
+
Horizon 2020 research and innovation program (grant agreement No 851565). The
|
1485 |
+
research of C.G. is supported by the Institut Universitaire de France (IUF) and the
|
1486 |
+
French ANR grant ANR-21-CE40-0003.
|
1487 |
+
|
1488 |
+
SUPERCONCENTRATION FOR MINIMAL SURFACES
|
1489 |
+
21
|
1490 |
+
References
|
1491 |
+
[1] Daniel Ahlberg and Christopher Hoffman.
|
1492 |
+
Random coalescing geodesics in first-passage
|
1493 |
+
percolation, 2019.
|
1494 |
+
[2] Michel Benaïm and Raphaël Rossignol. Exponential concentration for first passage percolation
|
1495 |
+
through modified Poincaré inequalities. Annales de l’Institut Henri Poincaré, Probabilités et
|
1496 |
+
Statistiques, 44(3):544 – 573, 2008.
|
1497 |
+
[3] Itai Benjamini, Gil Kalai, and Oded Schramm. First passage percolation has sublinear distance
|
1498 |
+
variance. Ann. Probab., 31:1970–1978, January 2003.
|
1499 |
+
[4] Béla Bollobás and Imre Leader. Edge-isoperimetric inequalities in the grid. Combinatorica,
|
1500 |
+
11(4):299–314, 1991.
|
1501 |
+
[5] Raphaël Cerf and Marie Théret. Law of large numbers for the maximal flow through a domain
|
1502 |
+
of Rd in first passage percolation. Trans. Amer. Math. Soc., 363(7):3665–3702, 2011.
|
1503 |
+
[6] Raphaël Cerf and Marie Théret. Lower large deviations for the maximal flow through a
|
1504 |
+
domain of Rd in first passage percolation. Probability Theory and Related Fields, 150:635–661,
|
1505 |
+
2011.
|
1506 |
+
[7] Raphaël Cerf and Marie Théret. Upper large deviations for the maximal flow through a
|
1507 |
+
domain of Rd in first passage percolation. Annals of Applied Probability, 21(6):2075–2108,
|
1508 |
+
2011.
|
1509 |
+
[8] Sourav Chatterjee. Superconcentration and related topics, volume 15. Springer, 2014.
|
1510 |
+
[9] Sourav Chatterjee. Spin glass phase at zero temperature in the edwards-anderson model.
|
1511 |
+
arXiv preprint arXiv:2301.04112, 2023.
|
1512 |
+
[10] Michael Damron and Jack Hanson. Bigeodesics in first-passage percolation. Communications
|
1513 |
+
in Mathematical Physics, 349(2):753–776, 2017.
|
1514 |
+
[11] Michael Damron, Jack Hanson, and Philippe Sosoe.
|
1515 |
+
Sublinear variance in first-passage
|
1516 |
+
percolation for general distributions. Probability Theory and Related Fields, 163(1):223–258,
|
1517 |
+
Oct 2015.
|
1518 |
+
[12] Guy David and Stephen Semmes. Quasiminimal surfaces of codimension 1 and john domains.
|
1519 |
+
pacific journal of mathematics, 183(2):213–277, 1998.
|
1520 |
+
[13] Barbara Dembin, Dor Elboim, and Ron Peled. Coalescence of geodesics and the bks midpoint
|
1521 |
+
problem in planar first-passage percolation, 2022.
|
1522 |
+
[14] Barbara Dembin and Marie Théret. Large deviation principle for the streams and the maximal
|
1523 |
+
flow in first passage percolation, 2020.
|
1524 |
+
[15] Barbara Dembin and Marie Théret. Large deviation principle for the cutsets and lower large
|
1525 |
+
deviation principle for the maximal flow in first passage percolation, 2021.
|
1526 |
+
[16] Hugo Duminil-Copin, Aran Raoufi, and Vincent Tassion. Sharp phase transition for the
|
1527 |
+
random-cluster and potts models via decision trees. Annals of Mathematics, 189(1):75–99,
|
1528 |
+
2019.
|
1529 |
+
[17] Christophe Garban and Jeffrey E Steif. Noise sensitivity of Boolean functions and percolation,
|
1530 |
+
volume 5. Cambridge University Press, 2014.
|
1531 |
+
[18] Geoffrey Grimmett.
|
1532 |
+
Percolation, volume 321 of Grundlehren der Mathematischen Wis-
|
1533 |
+
senschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin,
|
1534 |
+
second edition, 1999.
|
1535 |
+
[19] Kurt Johansson. Shape fluctuations and random matrices. Communications in mathematical
|
1536 |
+
physics, 209(2):437–476, 2000.
|
1537 |
+
[20] Harry Kesten. Surfaces with minimal random weights and maximal flows: a higher dimensional
|
1538 |
+
version of first-passage percolation. Illinois Journal of Mathematics, 31(1):99–166, 1987.
|
1539 |
+
[21] Cristina Licea and Charles M. Newman. Geodesics in two-dimensional first-passage percolation.
|
1540 |
+
The Annals of Probability, 24(1):399 – 410, 1996.
|
1541 |
+
[22] Charles M Newman and Marcelo ST Piza. Divergence of shape fluctuations in two dimensions.
|
1542 |
+
The Annals of Probability, pages 977–1005, 1995.
|
1543 |
+
[23] Ron Peled. High-dimensional lipschitz functions are typically flat. The Annals of Probability,
|
1544 |
+
45(3):1351–1447, 2017.
|
1545 |
+
[24] Raphaël Rossignol and Marie Théret. Lower large deviations and laws of large numbers for
|
1546 |
+
maximal flows through a box in first passage percolation. Ann. Inst. Henri Poincaré Probab.
|
1547 |
+
Stat., 46(4):1093–1131, 2010.
|
1548 |
+
[25] Michel Talagrand.
|
1549 |
+
On Russo’s Approximate Zero-One Law.
|
1550 |
+
The Annals of Probability,
|
1551 |
+
22(3):1576 – 1587, 1994.
|
1552 |
+
[26] Vincent Tassion and Hugo Vanneuville.
|
1553 |
+
Noise sensitivity of percolation via differential
|
1554 |
+
inequalities. arXiv preprint arXiv:2011.04572, 2020.
|
1555 |
+
[27] Yu Zhang. Limit theorems for maximum flows on a lattice. Probability Theory and Related
|
1556 |
+
Fields, May 2017.
|
1557 |
+
|
1558 |
+
22
|
1559 |
+
BARBARA DEMBIN
|
1560 |
+
CHRISTOPHE GARBAN
|
1561 |
+
D-MATH, ETH Zürich, Rämistrasse 101, 8092 Zürich, Switzerland
|
1562 |
+
Email address: [email protected]
|
1563 |
+
Université Claude Bernard Lyon 1, CNRS UMR 5208, Institut Camille
|
1564 |
+
Jordan, 69622 Villeurbanne, France , Institut Universitaire de France
|
1565 |
+
(IUF) and Université de Genève (Unige)
|
1566 |
+
Email address: [email protected]
|
1567 |
+
|
IdFIT4oBgHgl3EQfYSv6/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
JNFAT4oBgHgl3EQfvB44/content/2301.08673v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9efc2bda1e46df1f6d9b27b00e157b78566493d483fb8f735c96121f196536d7
|
3 |
+
size 8527001
|
JNFAT4oBgHgl3EQfvB44/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:86cc3c7e2ece07bb4d4248be7881af3131d561790023ec0f69eb623317d268c7
|
3 |
+
size 3145773
|