jackkuo commited on
Commit
1735e97
·
verified ·
1 Parent(s): 6ed2b50

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9AyT4oBgHgl3EQfqfj3/content/tmp_files/2301.00546v1.pdf.txt +1349 -0
  2. -9AyT4oBgHgl3EQfqfj3/content/tmp_files/load_file.txt +0 -0
  3. -tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf +3 -0
  4. -tFLT4oBgHgl3EQfDC7x/content/tmp_files/2301.11978v1.pdf.txt +1301 -0
  5. -tFLT4oBgHgl3EQfDC7x/content/tmp_files/load_file.txt +0 -0
  6. .gitattributes +74 -0
  7. 09E2T4oBgHgl3EQf5AgM/content/tmp_files/2301.04185v1.pdf.txt +931 -0
  8. 09E2T4oBgHgl3EQf5AgM/content/tmp_files/load_file.txt +0 -0
  9. 0NFQT4oBgHgl3EQfDTUM/vector_store/index.faiss +3 -0
  10. 1dE0T4oBgHgl3EQfuQGc/content/tmp_files/2301.02603v1.pdf.txt +790 -0
  11. 1dE0T4oBgHgl3EQfuQGc/content/tmp_files/load_file.txt +472 -0
  12. 29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf +3 -0
  13. 29AzT4oBgHgl3EQfDvqc/vector_store/index.pkl +3 -0
  14. 2NE2T4oBgHgl3EQfNgYt/content/2301.03737v1.pdf +3 -0
  15. 2NE2T4oBgHgl3EQfNgYt/vector_store/index.pkl +3 -0
  16. 2dAzT4oBgHgl3EQfRvud/vector_store/index.faiss +3 -0
  17. 2tE2T4oBgHgl3EQfNgbv/content/tmp_files/2301.03739v1.pdf.txt +850 -0
  18. 2tE2T4oBgHgl3EQfNgbv/content/tmp_files/load_file.txt +0 -0
  19. 3tFAT4oBgHgl3EQfERy2/vector_store/index.pkl +3 -0
  20. 4NE2T4oBgHgl3EQfjwdR/content/tmp_files/2301.03971v1.pdf.txt +1291 -0
  21. 4NE2T4oBgHgl3EQfjwdR/content/tmp_files/load_file.txt +0 -0
  22. 4tAyT4oBgHgl3EQf2Plc/content/tmp_files/2301.00747v1.pdf.txt +1476 -0
  23. 4tAyT4oBgHgl3EQf2Plc/content/tmp_files/load_file.txt +0 -0
  24. 5dAyT4oBgHgl3EQfpfgA/vector_store/index.pkl +3 -0
  25. 5dFKT4oBgHgl3EQfSi3T/vector_store/index.faiss +3 -0
  26. 69E1T4oBgHgl3EQf7AXC/vector_store/index.pkl +3 -0
  27. 6NE1T4oBgHgl3EQfBQJe/content/2301.02849v1.pdf +3 -0
  28. 6NE1T4oBgHgl3EQfBQJe/vector_store/index.faiss +3 -0
  29. 6dAyT4oBgHgl3EQfQfZh/content/tmp_files/2301.00046v1.pdf.txt +783 -0
  30. 6dAyT4oBgHgl3EQfQfZh/content/tmp_files/load_file.txt +0 -0
  31. 6dAzT4oBgHgl3EQfvP2u/content/tmp_files/2301.01704v1.pdf.txt +965 -0
  32. 6dAzT4oBgHgl3EQfvP2u/content/tmp_files/load_file.txt +0 -0
  33. 8dFRT4oBgHgl3EQfpTfl/content/tmp_files/2301.13613v1.pdf.txt +1377 -0
  34. 8dFRT4oBgHgl3EQfpTfl/content/tmp_files/load_file.txt +0 -0
  35. 99FLT4oBgHgl3EQfCS7y/vector_store/index.faiss +3 -0
  36. ANAyT4oBgHgl3EQfRffl/content/tmp_files/2301.00069v1.pdf.txt +1428 -0
  37. ANAyT4oBgHgl3EQfRffl/content/tmp_files/load_file.txt +0 -0
  38. AdAzT4oBgHgl3EQfhf3-/content/tmp_files/2301.01487v1.pdf.txt +1594 -0
  39. AdAzT4oBgHgl3EQfhf3-/content/tmp_files/load_file.txt +0 -0
  40. AtE0T4oBgHgl3EQfPgDv/content/2301.02181v1.pdf +3 -0
  41. AtE0T4oBgHgl3EQfPgDv/vector_store/index.faiss +3 -0
  42. AtE0T4oBgHgl3EQfPgDv/vector_store/index.pkl +3 -0
  43. AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf +3 -0
  44. AtE4T4oBgHgl3EQf5A4w/vector_store/index.faiss +3 -0
  45. AtE4T4oBgHgl3EQf5A4w/vector_store/index.pkl +3 -0
  46. BNFQT4oBgHgl3EQf9jeh/content/tmp_files/2301.13451v1.pdf.txt +701 -0
  47. BNFQT4oBgHgl3EQf9jeh/content/tmp_files/load_file.txt +483 -0
  48. BdE1T4oBgHgl3EQfVgTd/content/2301.03104v1.pdf +3 -0
  49. BdE1T4oBgHgl3EQfVgTd/vector_store/index.pkl +3 -0
  50. BdE3T4oBgHgl3EQfUAoU/content/2301.04446v1.pdf +3 -0
-9AyT4oBgHgl3EQfqfj3/content/tmp_files/2301.00546v1.pdf.txt ADDED
@@ -0,0 +1,1349 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00546v1 [cond-mat.mes-hall] 2 Jan 2023
2
+ Tunable caging of excitation in decorated Lieb-ladder geometry with long range
3
+ connectivity
4
+ Atanu Nandy∗
5
+ Department of Physics, Acharya Prafulla Chandra College,
6
+ New Barrackpore, Kolkata West Bengal-700 131, India
7
+ Controlled Aharonov-Bohm caging of wave train is reported in a quasi-one dimensional version
8
+ of Lieb geometry with next nearest neighbor hopping integral within the tight-binding framework.
9
+ This longer wavelength fluctuation is considered by incorporating periodic, quasi-periodic or fractal
10
+ kind of geometry inside the skeleton of the original network.
11
+ This invites exotic eigenspectrum
12
+ displaying a distribution of flat band states. Also a subtle modulation of external magnetic flux
13
+ leads to a comprehensive control over those non-resonant modes. Real space renormalization group
14
+ method provides us an exact analytical prescription for the study of such tunable imprisonment of
15
+ excitation. The non-trivial tunability of external agent is important as well as challenging in the
16
+ context of experimental perspective.
17
+ Keywords: Caging, flat band, interferometer, renormalization.
18
+ I.
19
+ INTRODUCTION
20
+ Recent exciting headway in experimental condensed
21
+ matter physics helps us to emulate several quantum
22
+ mechanical phenomena in a quite tunable environment.
23
+ This unprecedented advancement in fabrication tech-
24
+ nique provides a scope for direct visualization of different
25
+ theoretically proposed phenomena like localization of ex-
26
+ citation in low dimensional networks [1, 2]. That is why
27
+ creation of so called artificial systems for the simulation
28
+ of complex many-body systems containing additional de-
29
+ gree of freedom has grabbed considerable scientific im-
30
+ pact [3]. Moreover, scientific communities have already
31
+ addressed the celebration of sixty years of the pioneer-
32
+ ing work of Anderson [4].
33
+ The absence of diffusion of
34
+ wave packet in the random disorder environment is well
35
+ known. In fact this now becomes a general prescription
36
+ in diverse topics of condensed matter physics starting
37
+ from optical lattice of ultra cold atoms [5] to the acous-
38
+ tics, wave guide arrays [6] or in micro cavities having
39
+ exciton-polaritons [7]. Unlike the case of Anderson lo-
40
+ calization (AL), the concept of compact localized states
41
+ (CLS) [8]-[15] in several one or two dimensional periodic
42
+ or non-periodic structures has attracted the spot light of
43
+ fundamental research. The journey started nearly thirty
44
+ years ago approximately from Sutherland [16].
45
+ This unconventional non-diffusive progress of wave has
46
+ generated significant attention because of its contribu-
47
+ tion to various novel physical phenomena in strongly
48
+ correlated system, such as unconventional Anderson
49
+ localization [17, 18],
50
+ Hall ferromagnetism [19, 20],
51
+ high-temperature superconductivity [21], and superflu-
52
+ idity [22], to name a few. Moreover, this study has kept
53
+ scientists intrigued since it offers a suitable platform to
54
+ investigate several phenomena that are linked with the
55
+ information of quantum physics together with the topo-
56
+ ∗Electronic address: [email protected]
57
+ logical effect including fractional quantum hall effect [23]
58
+ and flat band ferromagnetism [24]. For these CLS, the
59
+ diminishing envelope of the wave train beyond finite size
60
+ characteristics trapping cell implies extremely low group
61
+ velocity due to the divergent effective mass tensor. This
62
+ means that the particle behaves like a super heavy such
63
+ that it cannot move. The vanishing curvature of the E−k
64
+ plot corresponding to such momentum independent self-
65
+ localized states are generally caused by the destructive
66
+ nature of the quantum interference occurred by multiple
67
+ quantum dots and the local spatial symmetries involved
68
+ with the underlying structure. Hence these are also called
69
+ as flat band states.
70
+ In general, occurrence of dispersionless flat band can
71
+ be classified into two categories depending on their sta-
72
+ bility with respect to the application of magnetic pertur-
73
+ bation. In particular, the type of geometries discussed
74
+ by Mielke [25] and Tasaki [19] cannot contain flat bands
75
+ for finite magnetic flux. Whereas, the other type of lat-
76
+ tices e.g., Lieb lattice [26], there exists macroscopically
77
+ degenerate flat band even in the presence of flux. In fact,
78
+ the non dispersive band is completely insensitive to the
79
+ applied external perturbation. As it is well known that
80
+ the inherent topology of the line-centered square lattice
81
+ (also known as the Lieb lattice) induces interesting spec-
82
+ tral properties such as the macroscopically degenerated
83
+ zero-energy flat band, the Dirac cone in the low- energy
84
+ spectrum, and the typical Hofstadter-type spectrum in
85
+ a magnetic field. Moreover, Lieb geometry is one of the
86
+ most prominent candidate useful for magnetism.
87
+ The
88
+ spectral divergence of the zero-energy flat band provides
89
+ that platform.
90
+ In this manuscript, inspired by all the experimental re-
91
+ alizations of Aharaonov-Bohm caging, we study a quasi-
92
+ one dimensional Lieb-ladder network within the tight-
93
+ binding formalism.
94
+ The phenomenon of imprisonment
95
+ of wave train is studied when the next nearest neighbor
96
+ (NNN) connection term is added to the Hamiltonian. In-
97
+ teresting modulation of self-trapping of excitation is also
98
+ studied in details when the NNN connectivity is ‘dec-
99
+
100
+ 2
101
+ orated’ by either magnetic flux or some quasi-periodic,
102
+ fractal kind of objects.
103
+ As a second motivation we have analyzed an Aharonov-
104
+ Bohm interferometer model made in the form of a quasi-
105
+ one dimensional Lieb geometry to study the flux con-
106
+ trolled localization aspects.
107
+ It is needless to mention
108
+ that this flux controlled caging is a subset of widely
109
+ used phenomena Aharonov-Bohm caging [27] and this
110
+ has been experimentally verified in recent times [1, 2].
111
+ However, when an electron traverses a closed loop that
112
+ traps a finite magnetic flux Φ, its wave function picks
113
+ up a phase factor.
114
+ This simple sentence is at the the
115
+ core of the pioneering Aharonov-Bohm (AB) effect [28]-
116
+ [32] which has led to a substantial research in the stan-
117
+ dard AB interferometry that dominated the fundamental
118
+ physics, both theoretical and experimental perspective,
119
+ in the mesoscopic scale over the past few decades [33]-
120
+ [35]. It is to be noted that the current experiments by
121
+ Yamamoto et al. [36] has stimulated more experiments on
122
+ quantum transmission in AB interferometers [37]. Also
123
+ the previously mentioned theoretical model studies have
124
+ also played an important part in studying the elemen-
125
+ tary characteristics of the electronic states and coherent
126
+ conductance in quantum networks in the mesoscopic di-
127
+ mensions [35]. The recent advancement in the fabrication
128
+ and lithography processes have opened up the possibility
129
+ to make a tailor-made geometry with the aid of quan-
130
+ tum dots (QD) or Bose–Einstein condensates (BEC). It is
131
+ needless to mention that this has provoked a substantial
132
+ content of theoretical research even in model quantum
133
+ networks with a complex topological character [38, 39].
134
+ In this article, highly motivated by the ongoing sce-
135
+ nario of theory and experiments in AB interferometry,
136
+ we investigate the spectral and the transmission prop-
137
+ erties of a model quantum network in which diamond
138
+ shaped Aharonov-Bohm interferometers are arranged in
139
+ the form of a quasi-one dimensional Lieb ladder geom-
140
+ etry.
141
+ Such diamond-based interferometer models have
142
+ previously been analyzed as the minimal prototypes of
143
+ bipartite networks having nodes with different coordi-
144
+ nation numbers, and representing a family of itinerant
145
+ geometrically frustrated electronic systems [40]. There
146
+ are other studies which include the problem of imprison-
147
+ ment of excitation under the influence of spin-orbit inter-
148
+ action [41], a flux-induced semiconducting behavior [42],
149
+ quantum level engineering for AB cages [43] or, as models
150
+ of spin filters [44].
151
+ In what follows we demonstrate our findings. Sec. II
152
+ discusses the basic quasi-one dimensional Lieb ladder net-
153
+ work in respect of energy band and transmittivity. In
154
+ Sec. III we have incorporated a next nearest neighbor
155
+ connectivity by inserting a rhombic loop inside the unit
156
+ cell and discussed the flux sensitive localization.
157
+ Af-
158
+ ter that in Sec. IV the NNN hopping is decorated by
159
+ a quasiperiodic Fibonacci geometry and the distribution
160
+ of self-localized states has been studied. Sec. V demon-
161
+ strates the self-similar pattern of compact localized states
162
+ as a function of magnetic flux. In Sec. VI we have stud-
163
+ ied the Lieb Aharonov-Bohm interferometer model in re-
164
+ spect of its electronic eigenspectrum. Finally in Sec. VII
165
+ we draw our conclusions.
166
+ II.
167
+ MODEL SYSTEM AND HAMILTONIAN
168
+ We start our demonstration from the Fig. 1(a) where
169
+ a quasi-one dimensional version of the Lieb geometry is
170
+ shown. We make a distinction between the sites (blue col-
171
+ ored dots marked as A site and red colored dots marked
172
+ as B sites) based on their coordination numbers. The
173
+ (a)
174
+ A
175
+ B
176
+ x
177
+ y
178
+ (b)
179
+ ε
180
+ τ
181
+ γ
182
+ ξ
183
+ FIG. 1: (Color online) (a) A quasi-one dimensional Lieb lad-
184
+ der network with endless axial span and (b) the effective two-
185
+ arm ladder with renormalized parameters.
186
+ array is modeled by the standard tight-binding Hamilto-
187
+ nian written in the Wannier basis, viz.,
188
+ H =
189
+
190
+ j
191
+ ǫjc†
192
+ jcj +
193
+
194
+ ⟨jk⟩
195
+ [tjkc†
196
+ jck + h.c.]
197
+ (1)
198
+ where the first term bears the potential information of
199
+ the respective quantum dot location and the second one
200
+ indicates the kinetic signature between two neighboring
201
+ lattice sites. The on-site potential of the respective sites
202
+ are marked as ǫA and ǫB and the nearest neighbor overlap
203
+ parameter can be assigned as t.
204
+ Without any loss of
205
+ generality, numerically the site potentials are taken as
206
+ uniform (equal to zero) and the nearest neighbor hopping
207
+ is also same (equal to unity) everywhere. By virtue of real
208
+ space renormalization group (RSRG) technique one can
209
+ easily eliminate the amplitude of an appropriate subset
210
+ of nodes to caste the original system into an effective
211
+ two-strand ladder system with renormalized parameters
212
+ as cited in the Fig. 1(b). The decimation method can be
213
+ easily implemented with the help of difference equation,
214
+ the discretized form of the Schr¨odinger’s equation, viz.,
215
+ (E − ǫj)ψj =
216
+
217
+ k
218
+ tjkψk
219
+ (2)
220
+ This decimation provides the renormalized uniform two-
221
+ leg ladder network with different parameters. After this
222
+ renormalization procedure, all the atomic sites carry
223
+ identical on-site energy ¯ǫ and the intra-arm hopping τ.
224
+ The inter-arm vertical connectivity is marked as γ as
225
+ cited in the Fig. 1(b). This decimation produces a next
226
+ nearest neighbor hopping, denoted by ξ, which generates
227
+ overlap between the wave functions of the two diagonally
228
+
229
+ 3
230
+ opposite atomic sites. The detailed forms of those pa-
231
+ rameters are given by,
232
+ ¯ǫ = ǫ + 2t2(E − ǫ1)
233
+ δ
234
+ τ = t2(E − ǫ1)
235
+ δ
236
+ γ = 2t2t1
237
+ δ
238
+ ξ = t2t1
239
+ δ
240
+ (3)
241
+ where ǫ1 = ǫ + t2/(E − ǫ), t1 = t2/(E − ǫ) and δ = [(E −
242
+ ǫ1)2 − t2
243
+ 1]. With the above renormalized parameters and
244
+ by virtue of RSRG approach, one can trivially compute
245
+ the electronic density of states (DOS) ρ(E) for this quasi-
246
+ one dimensional Lieb strip as a function of the energy of
247
+ the incoming projectile by using the standard expression,
248
+ viz.,
249
+ ρ(E) = −
250
+ � 1
251
+
252
+
253
+ Im[T rG(E)]
254
+ (4)
255
+ Here G(E) = [E−H +i∆]−1 is the usual green’s function
256
+ and ∆ is the imaginary part of the energy, reasonably
257
+ small enough, added for the numerical evaluation of DOS.
258
+ N denotes the total number of atomic sites present in the
259
+ system and ‘Tr’ is the trace of the green’s function.
260
+ A.
261
+ Density of eigenstates and transport
262
+ In Fig. 2(a) the variation of DOS is presented as a func-
263
+ tion of energy where we see the presence of the absolutely
264
+ continuous Bloch bands populated by extended eigen-
265
+ functions. We have checked that for any energy belong-
266
+ ing to the resonant band, the overlap parameter keeps
267
+ on non-decaying behavior and that is a signature of the
268
+ state being delocalized. At the band center (E = 0), the
269
+ central spike confirms the existence of momentum inde-
270
+ pendent flat band state which is an inherent signature of
271
+ the Lieb geometry. The spectral divergence correspond-
272
+ ing to the zero energy mode comes from the vanishing
273
+ group velocity of the wave packet as ρ ∝
274
+
275
+ v−1
276
+ g dk. With
277
+ the aid of difference equation one can obtain the distribu-
278
+ tion of amplitude for such self-localized eigenstate. The
279
+ non-vanishing amplitudes are pinned at the intermediate
280
+ sites as shown in Fig. 2(b) and one such characteristic
281
+ trapping island is isolated from the other by a distinct
282
+ physical boundary formed by the sites with zero ampli-
283
+ tude as a result of destructive quantum interference. The
284
+ dispersionless nature of the central band is responsible for
285
+ anomalous behavior in the transport and optical prop-
286
+ erties. The construction of this state definitely resem-
287
+ bles the essence of a molecular state which is spatially
288
+ quenched within a finite size cluster of atomic sites. The
289
+ analogous wave function does not present any evolution
290
+ (a)
291
+ (b)
292
+ 0
293
+ 0
294
+ 0
295
+ 0
296
+ +1
297
+ −1
298
+ 0
299
+ 0
300
+ 0
301
+ 0
302
+ −1
303
+ +1
304
+ −1
305
+ +1
306
+ 0
307
+ 0
308
+ 0
309
+ 0
310
+ (c)
311
+ �4
312
+ �2
313
+ 0
314
+ 2
315
+ 4
316
+ 0.0
317
+ 0.1
318
+ 0.2
319
+ 0.3
320
+ 0.4
321
+ E
322
+ T �E�
323
+ FIG. 2: (Color online) (a) Plot of density of eigenstates as
324
+ a function of energy E for quasi-one dimensional Lieb-ladder
325
+ geometry, (b) denotes the amplitude distribution profile for
326
+ E = 0 and (c)variation of transmittance with energy.
327
+ dynamics beyond the trapping cell. Extremely low mo-
328
+ bility of the wave train is the key factor for the disper-
329
+ sionless signature of the state. But here we should point
330
+ out that since the compact localized state, thus formed,
331
+ lies inside the continuum zone of extended states, here
332
+ the hopping integral never dies out for E = 0. Hence,
333
+ one should observe non-zero transport for that particu-
334
+ lar mode. The localization character can be prominently
335
+ viewed in presence of any perturbation when the spec-
336
+ trum shows central gap around E = 0, if any.
337
+ To corroborate the above findings related to the spec-
338
+ tral landscape we now present a precise discussion to
339
+ elucidate the electronic transmission characteristics for
340
+ this quasi-one dimensional system. For this analysis we
341
+ have considered a finite-sized underlying network. Now
342
+ the ladder-like system needs to be clamped in between
343
+ two pairs of semi-infinite periodic leads with the corre-
344
+ sponding parameters. One can then adopt the standard
345
+ green’s function approach [45, 46] and compute the same
346
+ for the composite system (lead-system-lead). The trans-
347
+ mission probability [47]-[51] can be written in terms of
348
+ this green’s function including the self-energy term as,
349
+ τij = T r[ΓiGr
350
+ i ΓjGa
351
+ i ]
352
+ (5)
353
+
354
+ 1.0
355
+ 0.8
356
+ 0.6
357
+ Q
358
+ 0.4
359
+ 0.2
360
+ 0.0
361
+ -2
362
+ -3
363
+ -1
364
+ 0
365
+ 2
366
+ 3
367
+ 1
368
+ E4
369
+ Here the terms Γi and Γj respectively denote the con-
370
+ nection of the network with the i-th and j-th leads and
371
+ G’s are the retarded and advanced Green’s functions of
372
+ the system. The result is demonstrated in the Fig. 2(c).
373
+ It describes a wide resonant window for which we have
374
+ obtained ballistic transport.
375
+ The existence of Bloch-
376
+ like eigenfunctions for this wide range of Fermi energy
377
+ is solely responsible for this high transmission behavior.
378
+ The conducting nature of the spectral density is basically
379
+ reflected in this transmission plot.
380
+ B.
381
+ Band dispersion
382
+ To study the energy-momentum relation of this peri-
383
+ odic system we will cast the original Hamiltonian in terms
384
+ of wave vector k by virtue of the following expression,
385
+ H =
386
+
387
+ k
388
+ ψ†
389
+ kH(k)ψk
390
+ (6)
391
+ Using this relation, the Hamiltonian matrix in k-space
392
+ reads as,
393
+ H(k) =
394
+
395
+ 
396
+ ǫ
397
+ t
398
+ 0
399
+ t(1 + e−ika)
400
+ 0
401
+ t
402
+ ǫ
403
+ t
404
+ 0
405
+ 0
406
+ 0
407
+ t
408
+ ǫ
409
+ 0
410
+ t(1 + e−ika)
411
+ t(1 + eika) 0
412
+ 0
413
+ ǫ
414
+ 0
415
+ 0
416
+ 0 t(1 + eika)
417
+ 0
418
+ ǫ
419
+
420
+ 
421
+ (7)
422
+ The straightforward diagonalization of the above matrix
423
+ �Π
424
+ � Π
425
+ 2
426
+ 0
427
+ Π
428
+ 2
429
+ Π
430
+ �2
431
+ �3
432
+ �1
433
+ 0
434
+ 1
435
+ 2
436
+ 3
437
+ ka
438
+ E
439
+ FIG. 3: (Color online) Band dispersion diagram of a quasi-
440
+ one dimensional Lieb-ladder network showing the central flat
441
+ band and other two pairs of dispersive bands.
442
+ reveals the entire band picture of the Lieb-ladder network
443
+ as presented in Fig. 3. It clearly shows one momentum
444
+ insensitive non-dispersive band at E = 0 with absolutely
445
+ zero curvature and two pairs of Bloch bands carrying
446
+ dispersive signature at E = ±
447
+
448
+ 2(1 + cos ka) and E =
449
+ ±
450
+
451
+ 2(2 + cos ka). The central flat band state confirms
452
+ the existence of robust type of molecular state.
453
+ Φ
454
+ Φ
455
+ Φ
456
+ Φ
457
+ Φ
458
+ Φ
459
+ Φ
460
+ FIG. 4: (Color online) A quasi-one dimensional array of Lieb-
461
+ ladder geometry with next nearest neighbor (NNN) hopping
462
+ term incorporated by a diamond loop threaded by uniform
463
+ magnetic flux Φ.
464
+ III.
465
+ DIAMOND-LIEB NETWORK
466
+ In the previous description presented so far, the off-
467
+ diagonal element, i.e., the hopping parameter is taken to
468
+ be restricted within the nearest neighboring atomic sites
469
+ only within the tight-binding formulation. We now con-
470
+ sider the same quasi-one dimensional Lieb-ladder geom-
471
+ etry with next nearest neighbor (NNN) hopping integral
472
+ taken into consideration between the A types of sites as
473
+ cited in the Fig. 4. With the inclusion of longer range
474
+ connectivity the entire periodic geometry turns out to
475
+ be quasi-one dimensional Lieb ladder with a rhombic ge-
476
+ ometry embedded inside the skeleton.
477
+ This additional
478
+ overlap parameter introduces another closed loop within
479
+ each unit cell where the impact of application of magnetic
480
+ perturbation may be examined in details.
481
+ (a)
482
+ �2
483
+ �1
484
+ 0
485
+ 1
486
+ 2
487
+ �4
488
+ �2
489
+ 0
490
+ 2
491
+ 4
492
+ ���0
493
+ E
494
+ (b)
495
+ 0
496
+ 0
497
+ 0
498
+ 0
499
+ 0
500
+ 0
501
+ −1
502
+ −1
503
+ +1
504
+ +1
505
+ 0
506
+ 0
507
+ 0
508
+ 0
509
+ +1
510
+ +1
511
+ −1
512
+ −1
513
+ Φ
514
+ Φ
515
+ Φ
516
+ FIG. 5: (Color online) (a) Presentation of allowed eigenspec-
517
+ trum as a function of magnetic flux for diamond-Lieb net-
518
+ work and (b) amplitude profile corresponding to the energy
519
+ E = ǫ − 2t cos Θ.
520
+ Before presenting the numerical results and discussion
521
+ it is necessary to mention that uniform magnetic pertur-
522
+ bation may also be applied within each rhombic plaque-
523
+ tte. This can be feasible by an appropriate choice of the
524
+ gauge. This can introduce additional externally tunable
525
+ parameter which may lead to interesting band engineer-
526
+ ing. This flux tunable localization of excitation will be
527
+ discussed in the subsequent subsection.
528
+
529
+ 5
530
+ A.
531
+ Allowed eigenspectrum as a function of flux
532
+ Now we analyze the impact of uniform magnetic per-
533
+ turbation on the sustainability of the self-localized states.
534
+ The magnetic flux is applied inside each embedded rhom-
535
+ bic plaquette. As a result of this application of magnetic
536
+ flux, the time reversal symmetry is broken (at least lo-
537
+ cally) along the arm of the rhombic plaquette. This is
538
+ considered by introducing a Peierls’ phase factor associ-
539
+ ated with the hopping integral, viz., t → teiΘ, where,
540
+ Θ = 2πΦ/4Φ0 and Φ0 = hc/e is termed as funda-
541
+ mental flux quantum.
542
+ The resultant nature of quan-
543
+ tum interference happened due to multiple quantum dots
544
+ is the ultimate determining factor for the sustainability
545
+ of the self-localized modes after applying the perturba-
546
+ tion. Here we have evaluated the allowed eigenspectrum
547
+ (Fig. 5(a)) with respect to the applied flux for this flux
548
+ included quasi-one dimensional diamond-Lieb geometry.
549
+ The spectrum is inevitably flux periodic. Multiple band
550
+ crossings, formation of several minibands and thus merg-
551
+ ing of each other are seen in this quasi-continuous pat-
552
+ tern.
553
+ Here we should give emphasis on a pertinent issue.
554
+ Fig. 5(b) shows a consistent demonstration of ampli-
555
+ tude profile (satisfying the difference equation) for en-
556
+ ergy E = ǫ − 2t cos Θ, ǫ being the uniform potential
557
+ energy everywhere. One non-vanishing cluster is again
558
+ isolated from the other by a physical barrier formed by
559
+ the sites with zero amplitude as a direct consequence of
560
+ phase cancellation at those nodes. This immediately tells
561
+ us that the incoming electron coming with this particu-
562
+ lar value of energy will be localized inside the trapping
563
+ island. But now the energy eigenvalue is sensible to the
564
+ applied flux which is an external agency. The central mo-
565
+ tivation behind the application of this external parameter
566
+ is that if possible, we may invite a comprehensive tun-
567
+ ability of such bound states solely by manipulating the
568
+ applied flux. We do not need to disturb any internal pa-
569
+ rameter of the system, instead one can, in principle, con-
570
+ trol the band engineering externally by a suitable choice
571
+ of flux. The external perturbation can be tuned contin-
572
+ uously satisfying the eigenvalue equation to control the
573
+ position of the caged state.
574
+ B.
575
+ Density of states profile
576
+ For the completeness of the analysis, we have com-
577
+ puted the variation of density of states profile as a func-
578
+ tion of energy of the incoming projectile for this quasi-one
579
+ dimensional lattice with longer wavelength fluctuation
580
+ using the standard green’s function technique both in
581
+ the absence and presence of external perturbation. The
582
+ variation with respect to the energy of the incoming pro-
583
+ jectile for different values of magnetic flux is shown in the
584
+ Fig. 6. The applied flux values are respectively Φ = 0,
585
+ Φ = Φ0/4 and Φ = Φ0/2. All the variations are plot-
586
+ ted for system size N = 753. As it is evident from the
587
+ plots that there are different absolutely continuous sub-
588
+ bands populated by extended kind of eigenfunctions. The
589
+ existence of such dispersive modes is expected because
590
+ of the inherent translational periodicity of the geometry.
591
+ We have examined that for any mode belonging to the
592
+ continuum zones the hopping integral shows oscillatory
593
+ behavior which confirms the signature of the resonant
594
+ modes. It is needless to say that the intricate nature of
595
+ the DOS is highly sensitive on the external perturbation.
596
+ Also the density of states plots as well as the allowed
597
+ eigenspectrum support the existence of flux dependent
598
+ caged state as discussed in the previous section.
599
+ C.
600
+ Band engineering
601
+ In presence of uniform magnetic flux one can easily ex-
602
+ press the Hamiltonian in the k-space language. The di-
603
+ agonalization of this matrix will give the band dispersion
604
+ as a function of flux. In this quasi-one dimensional dia-
605
+ mond Lieb geometry we have got that, there are two flux
606
+ independent dispersive bands E = ±
607
+
608
+ 2(1 + cos ka) and
609
+ three other flux sensible resonant bands. Therefore we
610
+ should highlight a very pertinent issue here. For the last
611
+ three flux dependent bands, one can easily control the
612
+ group velocity of the wave train as well as the effective
613
+ mass (equivalently the mobility) of the particle by tuning
614
+ the external source of perturbation. This non-trivial ma-
615
+ nipulation of the internal parameters of the system with
616
+ the aid of flux makes this aspect of band engineering more
617
+ challenging as well as interesting indeed.
618
+ Before going to detailed discussion, it is important to
619
+ be noted that, when an electron moves around a closed
620
+ loop that traps a magnetic flux, the wave function picks
621
+ up a phase related to the magnetic vector potential, viz.,
622
+ ψ = ψ0ei
623
+
624
+ A.dr. The magnetic flux here plays an equiva-
625
+ lent role as the wave vector [55]. One can thus think of a
626
+ k−Φ/Φ0 diagram which is equivalent to a typical kx−ky
627
+ diagram for electrons traveling in a two-dimensional pe-
628
+ riodic lattice. The “Brillouin zone” equivalents are ex-
629
+ pected to show up, across which variations of the group
630
+ velocity will take place. This is precisely shown in the
631
+ Fig. 7. In this plot, every contour presented corresponds
632
+ to a definite value (positive or negative) of the group
633
+ velocity of the wave packet. The red lines are the con-
634
+ tours with zero mobility. Hence they are the equivalents
635
+ of the boundaries of the Brillouin zone across which the
636
+ group velocity reverts its sign if one moves parallel to
637
+ the Φ-axis at any fixed value of the wave vector k, or vice
638
+ versa. This essentially signifies that, we can, in principle,
639
+ make an electron accelerate (or retard) without manipu-
640
+ lating its energy by changing the applied magnetic flux
641
+ only. The vanishing group velocity contours (marked by
642
+ red) indicate that the associated wavefunctions are self-
643
+ localized around finite size islands of atomic sites, making
644
+ the eigenmode a non-dispersive one. As the curvature of
645
+ the band is related to the mobility of the wave packet one
646
+ can conclude from the Fig. 7 that tuning of the curva-
647
+
648
+ 6
649
+ (a)
650
+ �4
651
+ �2
652
+ 0
653
+ 2
654
+ 4
655
+ 0.0
656
+ 0.2
657
+ 0.4
658
+ 0.6
659
+ 0.8
660
+ 1.0
661
+ E
662
+ Ρ
663
+ (b)
664
+ �4
665
+ �2
666
+ 0
667
+ 2
668
+ 4
669
+ 0.0
670
+ 0.2
671
+ 0.4
672
+ 0.6
673
+ 0.8
674
+ 1.0
675
+ E
676
+ Ρ
677
+ (c)
678
+ �4
679
+ �2
680
+ 0
681
+ 2
682
+ 4
683
+ 0.0
684
+ 0.2
685
+ 0.4
686
+ 0.6
687
+ 0.8
688
+ 1.0
689
+ E
690
+ Ρ
691
+ FIG. 6: (Color online) Variation of density of states ρ(E) as a function of energy E of the excitation. The external magnetic
692
+ flux values are respectively (a) Φ = 0, (b) Φ = Φ0/4 and (c) Φ = Φ0/2.
693
+ �2
694
+ �1
695
+ 0
696
+ 1
697
+ 2
698
+ �Π
699
+ � Π
700
+ 2
701
+ 0
702
+ Π
703
+ 2
704
+ Π
705
+ ���0
706
+
707
+ FIG. 7: (Color online) k − Φ diagram showing different group
708
+ velocity contours for electron moving in diamond embedded
709
+ Lieb geometry. The red lines mark the zero group velocity
710
+ of the wave packet. These red contours act as border lines
711
+ showing a continuous change of vg with respect to flux.
712
+ ture of the dispersive band is also possible with the help
713
+ of external perturbation.
714
+ IV.
715
+ LIEB LADDER WITH QUASIPERIODIC
716
+ NEXT NEAREST NEIGHBOR INTERACTION
717
+ In the previous case the amplitude for E = 0 will be
718
+ pinned at the top and down vertices of the diamond em-
719
+ bedded. From this standpoint we now decorate each arm
720
+ of the rhombic plaquette by a finite generation quasiperi-
721
+ oidic fibonacci kind of geometry with two different hop-
722
+ pings tx and ty respectively. The generation sequence for
723
+ this quasiperiodic structure follows the standard inflation
724
+ rule X → XY and Y → X. Based on this prescription
725
+ regarding the anisotropy in off-diagonal term, there ex-
726
+ ists three different types of atomic sites α (flanked by
727
+ two X-bonds), β (in between X − Y pair) and γ (in be-
728
+ tween Y − X pair).
729
+ Here we should mention that we
730
+ consider the generations with X type of bond at their
731
+ extremities, i.e., G2n+1, (n being integer). This is only
732
+ for convenience and does not alter the result Physics-wise
733
+ as we go for thermodynamic limit.
734
+ FIG. 8: (Color online) Distribution of self-localized modes
735
+ showing a typical three-subband pattern for large enough gen-
736
+ eration.
737
+ Hence if we start with a odd generation Fibonacci seg-
738
+ ment that decorates each arm of the diamond, then one
739
+ can decimate the chain n-times by employing the RSRG
740
+ method to get back the original diamond structure with
741
+ renormalized parameters. The recursive flows of the pa-
742
+ rameters are governed by the following equations, viz.,
743
+ ǫα(n + 1) = ǫα(n) + t2
744
+ x(n)
745
+ ∆(n)[2E − (ǫβ(n) + ǫγ(n))]
746
+ ǫβ(n + 1) = ǫα(n) + (E − ǫβ(n))t2
747
+ x(n)
748
+ ∆(n)
749
+ +
750
+ t2
751
+ x(n)
752
+ (E − ǫβ(n))
753
+ ǫγ(n + 1) = ǫγ(n) + (E − ǫγ(n))t2
754
+ x(n)
755
+ ∆(n)
756
+ +
757
+ t2
758
+ y(n)
759
+ (E − ǫβ(n))
760
+ ǫC(n + 1) = ǫα(n) + 2t2
761
+ x(n)
762
+ ∆(n) [2E − (ǫβ(n) + ǫγ(n))]
763
+ tx(n + 1) = t2
764
+ x(n)ty(n)
765
+ ∆(n)
766
+ ty(n + 1) =
767
+ tx(n)ty(n)
768
+ (E − ǫβ(n))
769
+ (8)
770
+ where ∆(n) = [(E − ǫβ(n))(E − ǫγ(n))] − t2
771
+ y(n)
772
+ Obviously after decimation if we want to explore the
773
+ same compact localized state (at E = ǫ) in this renor-
774
+ malized lattice, then due to the iterative procedure, on-
775
+ site potential is now a complicated function of energy.
776
+
777
+ 4
778
+ ***
779
+ ***
780
+ 3
781
+ +
782
+ +
783
+ n
784
+ 2
785
+ 1
786
+ 0
787
+ 1
788
+ 1
789
+ 1
790
+ 1
791
+ 1
792
+ 1
793
+ -3
794
+ -2
795
+ -1
796
+ 0
797
+ 2
798
+ 3
799
+ 1
800
+ E7
801
+ And if we now extract roots from the eigenvalue equa-
802
+ tion (E−ǫα) = 0, all the roots will produce a multifractal
803
+ distribution of the set of compact localized states. Obvi-
804
+ ously as we increase the generation of the fibonacci struc-
805
+ ture, in the thermodynamic limit, all the self-localized
806
+ modes exhibit a global three subband structure. The pat-
807
+ tern is already prominent in Fig. 8. Each subband can be
808
+ fine scanned in the energy scale to bring out the inherent
809
+ self-similarity and multifractality, the hallmark of the Fi-
810
+ bonacci quasicrystals [56]. The self-similarity of the spec-
811
+ trum have been checked by going over to higher enough
812
+ generations, though we refrain from showing these data
813
+ to save space here.
814
+ V.
815
+ LIEB LADDER WITH FRACTAL TYPE OF
816
+ LONG RANGE CONNECTION
817
+ FIG. 9: (Color online) An infinite array of Lieb strip with
818
+ long range connectivity decorated by fractal object.
819
+ We start this demonstration from the Fig. 9 where a fi-
820
+ nite generation of self-similar Vicsek geometry [57, 58] is
821
+ grafted inside the basic Lieb motif. The longer range con-
822
+ nection is here established through the aperiodic object.
823
+ Also a uniform magnetic flux Φ may be applied in each
824
+ small plaquette of the fractal structure. It should be ap-
825
+ preciated that while a Lieb geometry in its basic skeleton
826
+ is known to support a robust type of central self-localized
827
+ state, the inclusion of fractal structure of a finite genera-
828
+ tion in each unit cell disturbs the translational ordering
829
+ locally (though it is maintained on a global scale in the
830
+ horizontal direction) in the transverse direction.
831
+ This
832
+ non-trivial competitive scenario makes the conventional
833
+ methods of obtaining the self-localized states impossi-
834
+ ble to be implemented, especially in the thermodynamic
835
+ limit. We take the help of RSRG technique to bypass this
836
+ issue and present an analytical formalism from which one
837
+ can exactly determine the localized modes as a function
838
+ of external flux. Starting from a finite generation of scale
839
+ invariant fractal network, after suitable steps of decima-
840
+ tion [57, 58] one can produce a Lieb ladder geometry
841
+ with a diamond plaquette embedded into it (as discussed
842
+ in the previous discussion). The renormalized potential
843
+ of the top vertex of the diamond is now a complicated
844
+ function of energy and flux. Therefore straightforward
845
+ solving of the equation [E − ǫA(E, Φ)] = 0 gives us a in-
846
+ teresting distribution of compact localized states in the
847
+ E − Φ space.
848
+ This non-trivial distribution of eigenvalues as a func-
849
+ tion of flux may be considered an equivalent dispersion
850
+ relation since for an electron moving round a closed path,
851
+ FIG. 10: (Color online) Distribution of self-localized states
852
+ with applied flux.
853
+ the magnetic flux behaves the similar physical role as
854
+ that of the wave vector [55]. The distribution of eigen-
855
+ modes compose an interesting miniband-like structure as
856
+ a function of external perturbation. The competition be-
857
+ tween the global periodicity and the local fractal entity
858
+ has a crucial impact on this spectrum. We can continu-
859
+ ously engineer the magnetic flux to engineer the impris-
860
+ onment of wave train with high selectivity.
861
+ Moreover,
862
+ there are a number of inter-twined band overlap, and a
863
+ quite densely packed distribution of allowed modes, form-
864
+ ing quasi-continuous E − Φ band structure. Close obser-
865
+ vation of this eigenspectrum reveals the formation of in-
866
+ teresting variants of the Hofstadter butterflies [59]. The
867
+ spectral landscape is a quantum fractal, and encoding
868
+ the gaps with appropriate topological quantum numbers
869
+ remains an open problem for such deterministic fractals.
870
+ Before ending this section we should put emphasis on
871
+ a very pertinent point.
872
+ An aperiodic fractal object is
873
+ inserted in the unit cell of the periodic geometry. The
874
+ self-similar pattern of the fractal entity will have the in-
875
+ fluence on the spectrum. All such self-localized modes
876
+ are the consequences of destructive quantum interfer-
877
+ ence and the geometrical configuration of the underly-
878
+ ing system. For this class of energy eigenvalue, the spa-
879
+ tial span of the cluster of atomic sites containing non-
880
+ vanishing amplitudes increases with the generation of the
881
+ fractal geometry incorporated. Hence with an appropri-
882
+ ate choice of the RSRG index n, the onset of localization
883
+ and hence the spread of trapping island can be staggered,
884
+ in space. This tunable delay of the extent of localization
885
+ has already been studied for a wide varieties of fractal
886
+ geometries [57, 58, 60, 61]. This comprehensive discus-
887
+ sion regarding the manipulation of the geometry-induced
888
+ localization makes the phenomenon of Aharonov-Bohm
889
+ caging more interesting as well as challenging from the
890
+ experimental point of view.
891
+
892
+ -1.00
893
+ 0.75
894
+ -0.50
895
+ -0.25
896
+ 0.25
897
+ 0.50
898
+ 0.75
899
+ 0.00
900
+ 1.00
901
+ Φ/Φ
902
+ 08
903
+ (a)
904
+ (b)
905
+ 1
906
+ 2
907
+ N
908
+ 1
909
+ 2
910
+ N
911
+ Φ
912
+ FIG. 11: (Color online) (a) Schematic diagram of elementary
913
+ diamond-Lieb interferometer and (b) demonstrates the deco-
914
+ ration of basic unit.
915
+ VI.
916
+ DIAMOND-LIEB INTERFEROMETER
917
+ In this section we investigate the spectral character-
918
+ istics of a quantum network in which each arm of the
919
+ Lieb-ladder geometry is ‘decorated’ by diamond-shaped
920
+ Aharonov-Bohm (AB) interferometer [37]. Each elemen-
921
+ tary interferometer is pierced by a invariable magnetic
922
+ perturbation applied perpendicular to the plane of the in-
923
+ terferometer, and traps a flux Φ (in unit of Φ0 = hc/e).
924
+ This type of diamond based interferometers have been
925
+ formerly studied as the minimal prototypes of bipartite
926
+ structures having nodes with different coordination num-
927
+ bers, and representing a family of itinerant geometri-
928
+ cally frustrated electronic systems [52]-[54]. We refer to
929
+ Fig. 11(a). A standard diamond-Lieb AB interferome-
930
+ ter is shown pictorially there whereas Fig. 11(b) demon-
931
+ strates that each diamond loop can take a shape of a
932
+ quantum ring consisting of multiple lattice points. Each
933
+ arm of the diamond may be decorated by N number of
934
+ atomic scatterers between the vertices, such that the to-
935
+ tal number of single level quantum dots contained in a
936
+ single interferometer is 4(N + 1). An uniform magnetic
937
+ flux Φ may be allocated within each loop, and the elec-
938
+ tron hopping is restricted to take the non-vanishing value
939
+ for the nearest neighboring nodes only.
940
+ To study the systematic spectral analysis we take the
941
+ help of RSRG approach. Each elementary loop of the
942
+ interferometer is properly renormalized to transform it
943
+ into a simple diamond having just four sites.
944
+ Due to
945
+ this decimation process we will get three types of sites
946
+ A, B and C (respectively marked by black, red and blue
947
+ colored atomic sites in the Fig. 11(a)) with corresponding
948
+ parameters given by
949
+ ˜ǫA = ǫ + 6tUN−1(x)
950
+ UN(x)
951
+ ˜ǫB = ǫ + 4tUN−1(x)
952
+ UN(x)
953
+ ˜ǫC = ǫ + 2tUN−1(x)
954
+ UN(x)
955
+ tF (B) = te±i(N+1)θ/UN(x)
956
+ (9)
957
+ Here, UN(x) is the N-th order Chebyshev polynomial of
958
+ second kind, and x = (E −ǫ)/2t. The ‘effective’ diamond
959
+ loops are then renormalized in a proper way (C types of
960
+ sites are being decimated out) such that we will get back
961
+ the Lieb ladder with renormalized on-site potential and
962
+ overlap integral respectively given by
963
+ ˜ǫ4 =
964
+ ˜ǫB +
965
+ 4tFtB
966
+ (E − ǫC)
967
+ ˜ǫ6 =
968
+ ˜ǫA +
969
+ 6tFtB
970
+ (E − ǫC)
971
+ ˜t =
972
+ 2tF tB
973
+ (E − ǫC)
974
+ (10)
975
+ We will now exploit all the above equations to extract the
976
+ detailed information about the electronic spectrum and
977
+ the nature of the eigenstates provided by such a model
978
+ interferometer.
979
+ A.
980
+ Spectral landscape and inverse participation
981
+ ratio
982
+ To analyze we first put N = 0 here so that the quan-
983
+ tum ring of elementary interferometer takes the form of a
984
+ diamond (Fig. 11(a)). The density of states with energy
985
+ for different values of magnetic flux enclosed within each
986
+ elementary interferometer is shown in the upper panel of
987
+ the Fig. 12. From the plot, we see that in absence of
988
+ magnetic flux the density of states reflects the periodic
989
+ nature of the geometry. It consists of absolutely contin-
990
+ uous zones populated by resonant eigenstates with sharp
991
+ spikes at E = 0 and ±2.
992
+ But here it is to be noted
993
+ that the localized character of those modes cannot be
994
+ distinctly revealed because of its position within the con-
995
+ tinuum of extended modes. But when we apply quarter
996
+ flux quantum the central localized mode becomes iso-
997
+ lated and prominent. It is also seen from the plots that
998
+ with the gradual increment of flux value the window of
999
+ resonant modes in the DOS profile shrinks along the en-
1000
+ ergy scale and ultimately leads to extreme localization of
1001
+ eigenstates for half flux quantum.
1002
+ Actually, the effec-
1003
+ tive overlap parameter between the two axial extremities
1004
+ of the interferometer vanishes for this special flux value
1005
+ and this makes the complete absence of resonant modes
1006
+ to be possible. This is the basic physical background of
1007
+ extreme localization of excitation. We should appreciate
1008
+ that this typical flux induced localization of wave train
1009
+ inside a charateristic trapping island is a subset of the
1010
+ usual Aharonov-Bohm caging [27]
1011
+ For the sake of completeness of the discussion related
1012
+ to the spectral property of such quantum interferometer
1013
+ model, we have also calculated the inverse participation
1014
+ ratio (IPR) to certify the above density of states plots.
1015
+ To formulate the localization of a normalized eigenstate
1016
+ the inverse participation ratio is defined as
1017
+ I =
1018
+ L
1019
+
1020
+ i=1
1021
+ |ψi|4
1022
+ (11)
1023
+
1024
+ 9
1025
+ (a)
1026
+ �4
1027
+ �2
1028
+ 0
1029
+ 2
1030
+ 4
1031
+ 0
1032
+ 0.2
1033
+ 0.4
1034
+ 0.6
1035
+ 0.8
1036
+ 1
1037
+ E
1038
+ Ρ
1039
+ (b)
1040
+ �4
1041
+ �2
1042
+ 0
1043
+ 2
1044
+ 4
1045
+ 0
1046
+ 0.2
1047
+ 0.4
1048
+ 0.6
1049
+ 0.8
1050
+ 1
1051
+ E
1052
+ Ρ
1053
+ (c)
1054
+ �4
1055
+ �2
1056
+ 0
1057
+ 2
1058
+ 4
1059
+ 0
1060
+ 0.2
1061
+ 0.4
1062
+ 0.6
1063
+ 0.8
1064
+ 1
1065
+ E
1066
+ Ρ
1067
+ (d)
1068
+ �4
1069
+ �2
1070
+ 0
1071
+ 2
1072
+ 4
1073
+ 0.005
1074
+ 0.010
1075
+ 0.015
1076
+ 0.020
1077
+ 0.025
1078
+ 0.030
1079
+ 0.035
1080
+ 0.040
1081
+ E
1082
+ IPR
1083
+ (e)
1084
+ �4
1085
+ �2
1086
+ 0
1087
+ 2
1088
+ 4
1089
+ 0.01
1090
+ 0.02
1091
+ 0.03
1092
+ 0.04
1093
+ 0.05
1094
+ 0.06
1095
+ E
1096
+ IPR
1097
+ (f)
1098
+ �4
1099
+ �2
1100
+ 0
1101
+ 2
1102
+ 4
1103
+ 0.1
1104
+ 0.2
1105
+ 0.3
1106
+ 0.4
1107
+ 0.5
1108
+ E
1109
+ IPR
1110
+ FIG. 12: (Color online) (Upper panel) Variation of density of states ρ(E) as a function of energy E of the excitation and
1111
+ (lower panel) indicates the variation of inversion participation ratio (IPR) wth energy. The external magnetic flux values are
1112
+ respectively (a) Φ = 0, (b) Φ = Φ0/4 and (c) Φ = Φ0/2.
1113
+ It is known that for an extended mode IPR goes as 1/L,
1114
+ but it approaches to unity for a localized state. The lower
1115
+ panel of Fig. 12 describes the variation of IPR with the
1116
+ energy of the injected projectile for different flux values.
1117
+ It is evident from the plots that the IPR supports the
1118
+ spectral profile cited in the upper panel of Fig. 12. As
1119
+ we see that with nominal strength of perturbation the
1120
+ central gap opens up around E = 0, clearly indicating
1121
+ the central localized mode.
1122
+ The shrinking of resonant
1123
+ window with the gradual increment of flux is also ap-
1124
+ parent from the IPR plots. It is also interesting to ap-
1125
+ preciate that for half flux quantum IPR plot (Fig. 12f)
1126
+ also demonstrates the AB-caging leading to the extreme
1127
+ localization of eigenstates.
1128
+ B.
1129
+ Flux dependent eigenspectrum
1130
+ �2
1131
+ �1
1132
+ 0
1133
+ 1
1134
+ 2
1135
+ �3
1136
+ �2
1137
+ �1
1138
+ 0
1139
+ 1
1140
+ 2
1141
+ 3
1142
+ ���0
1143
+ E
1144
+ FIG. 13: (Color online) Flux dependent allowed eigenspec-
1145
+ trum for the diamond-Lieb AB-interferometer model.
1146
+ The
1147
+ pattern is flux periodic.
1148
+ Fig. 13 represents the essential graphical variation of
1149
+ allowed eigenspectrum for a diamond-Lieb AB interfer-
1150
+ ometer with N = 0 with respect to the external magnetic
1151
+ flux. With the increment of N, the number of scatterers
1152
+ in each elementary interferometer, the spectrum will be
1153
+ densely packed with several band crossings. The present
1154
+ variation is seen to be flux periodic of periodicity equal
1155
+ to one flux quantum. It is needless to say that the eigen-
1156
+ spectrum is inevitably sensitive to the numerical values
1157
+ of the parameters of the Hamiltonian. However, the pe-
1158
+ riodicity retains for such spectrum after every single flux
1159
+ quantum change of the external perturbation.
1160
+ It is observed that there is a tendency of clustering of
1161
+ the allowed eigenvalues towards the edges of the eigen-
1162
+ spectrum as is clear from the above-mentioned diagram.
1163
+ A number of band crossings are noticed and the spec-
1164
+ trum cites kind of a zero band gap semiconductor like
1165
+ behavior, mimicking Dirac point as observed in case of
1166
+ graphene, at Φ/Φ0 = ±i, i being an integer including
1167
+ zero. As we increase the complexity in each interferom-
1168
+ eter by increasing N, the central gap gets consequently
1169
+ filled up by more eigenstates, and the E −Φ contours get
1170
+ more flattened up forming a quasi-continuous spectrum,
1171
+ exotic in nature. The central eigenstate corresponding to
1172
+ eigenvalue E = 0 is a robust kind of mode irrespective of
1173
+ the application of perturbation, i.e., the existence of that
1174
+ state is insensitive to the value of the external flux. More-
1175
+ over, when the magnetic flux is set as Φ = (i+1/2)Φ0, we
1176
+ observe a spectral collapse. In that case one can easily
1177
+ identify the localization character of the central state.
1178
+ Most importantly, it is evident from the spectral land-
1179
+ scape that the it consists of a set of discrete points (eigen-
1180
+ values) for half flux quantum. This is the canonical case
1181
+ of extreme localization. For such special flux value the
1182
+ vanishing overlap parameter makes the geometry equiv-
1183
+ alent to discrete set of lattice points with zero connectiv-
1184
+ ity between them. This makes the excitation to be caged
1185
+
1186
+ 10
1187
+ within the trapping island. Further it is to be noted that
1188
+ this AB-caging [27] may happen for any value of N, the
1189
+ number of eigenvalues in the discrete set depends on the
1190
+ choice of N.
1191
+ VII.
1192
+ CLOSING REMARKS
1193
+ A methodical analysis of the flux induced tunable
1194
+ caging of excitation in a quasi-one dimensional Lieb net-
1195
+ work with long range connectivity is reported in this
1196
+ manuscript within the tight-binding framework.
1197
+ With
1198
+ the inclusion of second neighbor overlap integral in a dec-
1199
+ orated way, external source of perturbation can act as an
1200
+ important role for the selective caging of wave packet.
1201
+ Flux dependent band engineering and hence the com-
1202
+ prehensive control over the group velocity of the wave
1203
+ train as well as the band curvature are studied in de-
1204
+ tails. Decoration of the next nearest neighbor hopping
1205
+ in certain quasiperiodic fashion or by some determinis-
1206
+ tic fractal object is also demonstrated analytically. Real
1207
+ space renormalization group approach provides us a suit-
1208
+ able platform to obtain an exact prescription for the de-
1209
+ termination of self-localized modes induced by destruc-
1210
+ tive quantum interference effect. As we have seen that
1211
+ in the quasiperiodic Fibonacci variation the distribution
1212
+ of eigenstates shows a standard three-subband pattern
1213
+ while in case of fractal entity countably infinite number
1214
+ of localized modes cite an interesting quasi-continuous
1215
+ distribution against flux. We have also critically studied
1216
+ the spectral properties of a diamond Lieb interferome-
1217
+ ter. The energy spectrum shows an exotic feature com-
1218
+ prising extended, staggered and edge-localized eigenfunc-
1219
+ tions. The number of such states depend on the number
1220
+ of quantum dots present in each arm of the elementary
1221
+ diamond interferometer, and can populate the spectral
1222
+ landscape as densely as desired by the experimentalists.
1223
+ A constant magnetic perturbation can be utilized to con-
1224
+ trol the positions of all such states. Moreover at special
1225
+ flux value the spectrum describes the Aharonov-Bohm
1226
+ caging of eigenstates leading to an interesting spectral
1227
+ collapse.
1228
+ Acknowledgments
1229
+ The author is thankful for the stimulating discussions
1230
+ regarding the results with Dr. Amrita Mukherjee. The
1231
+ author also gratefully acknowledges the fruitful discus-
1232
+ sion made with Prof. A. Chakrabarti.
1233
+ [1] S. Mukherjee, A. Spracklen, D. Choudhury, N. Goldman,
1234
+ P. ¨Ohberg, E. Andersson, and R. R. Thomson, Phys. Rev.
1235
+ Lett. 114, 245504 (2015).
1236
+ [2] S. Mukherjee and R. R. Thomson, Opt. Lett. 40, 5443
1237
+ (2015).
1238
+ [3] R. A. Vicencio, C. Cantillano, L. Morales-Inostroza, B.
1239
+ Real, C. Mej´ıa-Cort`es, S. Weimann, A. Szameit, and M.
1240
+ I. Molina Phys. Rev. Lett. textbf114 245503 (2015).
1241
+ [4] P. W. Anderson, Phys. Rev. 109, 1492 (1958).
1242
+ [5] I. Bloch, J. Dalibard, and W. Zwerger, Rev. Mod. Phys.
1243
+ 80, 885 (2008).
1244
+ [6] D. N. Christodoulides, F. Lederer, and Y. Silberberg,
1245
+ Nature, 424, 817 (2003).
1246
+ [7] N. Masumoto, N. Y. Kim, T. Byrnes, K. Kusudo, A.
1247
+ L¨offler, S. H¨ofling, A. Forchel, and Y. Yamamoto, New.
1248
+ J. Phys. 14, 065002 (2012).
1249
+ [8] R.G. Dias, J.D. Gouveia, Sci. Rep. 5 16852 (2015).
1250
+ [9] M. Hyrk¨as, V. Apaja, M. Manninen, Phys. Rev. A 87,
1251
+ 023614 (2013).
1252
+ [10] L. Morales-Inostroza, R.A. Vicencio, Phys. Rev. A 94,
1253
+ 043831 (2016).
1254
+ [11] A. Ramachandran, A. Andreanov, S. Flach, Phys. Rev.
1255
+ B 96, 161104(R) (2017).
1256
+ [12] S. Flach, D. Leykam, J. D. Bodyfelt, P. Matthies, A. S.
1257
+ Desyatnikov, Europhys. Lett. 105, 30001 (2014).
1258
+ [13] J. D. Bodyfelt, D. Leykam, C. Danieli, X. Yu, S. Flach,
1259
+ Phys. Rev. Lett. 113, 236403 (2014).
1260
+ [14] W. Maimaiti, A. Andreanov, H. C. Park, O. Gendelman,
1261
+ S. Flach, Phys. Rev. B 95, 115135 (2017).
1262
+ [15] D. Leykam, A. Andreanov, S. Flach, Adv. Phys. X 3,
1263
+ 1473052 (2018).
1264
+ [16] B. Sutherland, Phys. Rev. B 34, 5208 (1986).
1265
+ [17] M. Goda, S. Nishino, and H. Matsuda, Phys. Rev. Lett.
1266
+ 96, 126401 (2006).
1267
+ [18] J. T. Chalker, T. S. Pickles, and P. Shukla, Phys. Rev.
1268
+ B 82, 104209 (2010).
1269
+ [19] H. Tasaki, Phys. Rev. Lett. 69, 1608 (1992).
1270
+ [20] M. Maksymenko, A. Honecker, R. Moessner, J. Richter,
1271
+ and O. Derzhko, Phys. Rev. Lett. 109, 096404 (2012).
1272
+ [21] V. J. Kauppila, F. Aikebaier, and T. T. Heikkil¨a, Phys.
1273
+ Rev. B 93, 214505 (2016).
1274
+ [22] S. Peotta and P. T¨orm¨a, Nat. Comm. 6, 8944 (2015).
1275
+ [23] Y.-F. Wang, Z.-C. Gu, C.-D. Gong, and D. N. Sheng,
1276
+ Phys. Rev. Lett. 107, 146803 (2011).
1277
+ [24] K. Kusakabe and H. Aoki, Phys. Rev. Lett. 72, 144
1278
+ (1994).
1279
+ [25] A. Mielke J. Phys. A-Math. Gen. 25, 4335 (1992).
1280
+ [26] E. H. Lieb, Phys. Rev. Lett. 62, 1201 (1989).
1281
+ [27] J. Vidal, R. Mosseri, and B. Doucot, Phys. Rev. Lett.
1282
+ 81, 5888 (1998).
1283
+ [28] Y. Aharonov and D. Bohm, Phys. Rev. B 115, 485
1284
+ (1959).
1285
+ [29] S. Washburn and R. A. Webb, Adv. Phys. 35, 375 (1986).
1286
+ [30] M. B¨uttiker, Y. Imry, and M. Ya. Azbel, Phys. Rev. A
1287
+ 30, 1982 (1984).
1288
+ [31] R. Landauer and M. B¨uttiker, Phys. Rev. Lett. 54, 2049
1289
+ (1985).
1290
+ [32] A. Levy Yeyati and M. B¨uttiker, Phys. Rev. B 52,
1291
+ R14360 (1995).
1292
+ [33] A. Yacoby, M. Heiblum, V. Umansky, H. Shtrikman, and
1293
+ D. Mahalu, Phys. Rev. Lett. 73, 3149 (1994).
1294
+ [34] A. Aharony, O. Entin-Wohlman, and Y. Imry, Phys. Rev.
1295
+ Lett. 90, 156802 (2003).
1296
+ [35] T. Kubo, Y. Tokusain, and S. Tarucha, J. Phys. A: Math.
1297
+
1298
+ 11
1299
+ Theo. 43, 354020 (2010).
1300
+ [36] M. Yamamoto, S. Takada, C. B¨auerle, K. Watanabe,
1301
+ A. D. Wieck, and S. Tarucha, Nature Nanotech. 7, 247
1302
+ (2012).
1303
+ [37] A. Aharony, S. Takada, O. Entin-Wohlman, M. Ya-
1304
+ mamoto, and S. Tarucha, New J. Phys. 16, 083015
1305
+ (2014).
1306
+ [38] J.S. Andrade Jr., H.J. Herrmann, R.F.S. Andrade, L.R.
1307
+ da Silva, Phys. Rev. Lett. 94, 018702 (2005).
1308
+ [39] A.L. Cardoso, R.F.S. Andrade, A.M.C. Souza, Phys.
1309
+ Rev. B 78, 214202 (2008).
1310
+ [40] A.A. Lopes, R.G. Dias, Phys. Rev. B 84, 085124 (2011).
1311
+ [41] D. Bercioux, M. Governale, V. Cataudella, V.M. Ra-
1312
+ maglia, Phys. Rev. Lett. 93, 056802 (2004).
1313
+ [42] S. Sil, S.K. Maiti, A. Chakrabarti, Phys. Rev. B 79,
1314
+ 193309 (2009).
1315
+ [43] J.L. Movilla, J. Planelles, Phys. Rev. B 84 195110 (2011).
1316
+ [44] A. Aharony, Y. Tokura, G.Z. Cohen, O. Entin-Wohlman,
1317
+ S. Katsumoto, Phys. Rev. B 84 035323 (2011).
1318
+ [45] P.O. Lowdin, J. Mol. Spectrosc. 10, 12 (1963).
1319
+ [46] P.O. Lowdin, J. Math. Phys. 3, 969 (1962).
1320
+ [47] S. Datta, Electronic Transport in Mesoscopic Systems,
1321
+ Cambridge University Press, Cambridge, 1997.
1322
+ [48] S. Datta, Quantum Transport:
1323
+ Atom to Transistor,
1324
+ Cambridge University Press, Cambridge, 2005.
1325
+ [49] P. Dutta, S.K. Maiti, S.N. Karmakar, AIP Adv. 4,
1326
+ 097126 (2014).
1327
+ [50] P. Dutta, S.K. Maiti, S.N. Karmakar, Org. Electron. 11
1328
+ 1120 (2010).
1329
+ [51] P. Dutta, S.K. Maiti, S.N. Karmakar, J. Appl. Phys. 114
1330
+ 034306 (2013).
1331
+ [52] Z. Gul´acsi, A. Kampf, and D. Vollhardt, Phys. Rev. Lett.
1332
+ 99, 026404 (2007).
1333
+ [53] A. A. Lopes and R. G. Dias, Phys. Rev. B 84, 085124
1334
+ (2011).
1335
+ [54] A. A. Lopes, B. A. Z. Ant´onio, and R. G. Dias, Phys.
1336
+ Rev. B 89, 235418 (2014).
1337
+ [55] H.-F. Cheung, Y. Gefen, E. K. Riedel, W.-H. Shih, Phys.
1338
+ Rev. B 37, 6050 (1988).
1339
+ [56] M. Kohmoto, B. Sutherland, C. Tang, Phys. Rev. B 35,
1340
+ 1020 (1987).
1341
+ [57] B. Pal, P. Patra, J. P. Saha, and A. Chakrabarti, Phys.
1342
+ Rev. A 87, 023814 (2013).
1343
+ [58] B. Pal and A. Chakrabarti, Phys. Rev. B 85, 214203
1344
+ (2012).
1345
+ [59] D. R. Hofstadter, Phys. Rev. B 14, 2239 (1976).
1346
+ [60] A. Nandy, B. Pal, and A. Chakrabarti, J. Phys.: Con-
1347
+ dens. Matt. 27, 125501 (2015).
1348
+ [61] A. Nandy, Phys. Scr. 96, 045802 (2021).
1349
+
-9AyT4oBgHgl3EQfqfj3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9510ff3a3a859b907240308b08aee5eaa1838fd2c95853ae0a0b50f391788905
3
+ size 745398
-tFLT4oBgHgl3EQfDC7x/content/tmp_files/2301.11978v1.pdf.txt ADDED
@@ -0,0 +1,1301 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–11 (2022)
2
+ Preprint 31 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ Analytical marginalisation over photometric redshift uncertainties in
5
+ cosmic shear analyses
6
+ Jaime Ruiz-Zapatero1 ★, Boryana Hadzhiyska2,3, David Alonso1, Pedro G. Ferreira1, Carlos García-García1
7
+ and Arrykrishna Mootoovaloo1
8
+ 1Department of Physics, University of Oxford, Denys Wilkinson Building, Keble Road, Oxford OX1 3RH, UK
9
+ 2Miller Institute for Basic Research in Science, University of California, Berkeley, CA, 94720, USA.
10
+ 3Physics Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720.
11
+ Accepted XXX. Received YYY; in original form ZZZ
12
+ ABSTRACT
13
+ As the statistical power of imaging surveys grows, it is crucial to account for all systematic uncertainties. This is normally
14
+ done by constructing a model of these uncertainties and then marginalizing over the additional model parameters. The resulting
15
+ high dimensionality of the total parameter spaces makes inferring the cosmological parameters significantly more costly using
16
+ traditional Monte-Carlo sampling methods. A particularly relevant example is the redshift distribution, 𝑝(𝑧), of the source
17
+ samples, which may require tens of parameters to describe fully. However, relatively tight priors can be usually placed on these
18
+ parameters through calibration of the associated systematics. In this paper we show, quantitatively, that a linearisation of the
19
+ theoretical prediction with respect to these calibratable systematic parameters allows us to analytically marginalise over these
20
+ extra parameters, leading to a factor ∼ 30 reduction in the time needed for parameter inference, while accurately recovering the
21
+ same posterior distributions for the cosmological parameters that would be obtained through a full numerical marginalisation
22
+ over 160 𝑝(𝑧) parameters. We demonstrate that this is feasible not only with current data and current achievable calibration
23
+ priors but also for future Stage-IV datasets.
24
+ Key words: cosmology: large-scale structure of Universe – gravitational lensing: weak – methods: data analysis
25
+ 1 INTRODUCTION
26
+ In recent years unprecedentedly precise observations in cosmology
27
+ have uncovered a number of tensions between datasets that may
28
+ constitute both tantalising hints of new physics or a manifestation of
29
+ a lack of control over theoretical systematics (Heymans et al. 2021;
30
+ Riess et al. 2022).
31
+ At its simplest, the current cosmological paradigm, the Λ (denoting
32
+ the cosmological constant) cold dark matter model (ΛCDM), can be
33
+ described by only five parameters: Ω𝑚, Ω𝑏, 𝐴𝑠, 𝑛𝑠 and ℎ (see e.g.
34
+ Scott (2018) for a detailed review). However, in order to relate the
35
+ theoretical predictions of this model to actual physical observables,
36
+ it is necessary to extend it. Phenomenological models that describe
37
+ the astrophysical systems that form the basis of our observations,
38
+ as well as observational sources of systematic uncertainty, are then
39
+ appended to the core ΛCDM model. In the presence of large statistical
40
+ uncertainties, these models may consist of simple relationships in
41
+ terms of a handful of parameters. However, more precise data requires
42
+ an equally precise characterisation of these relationships, which leads
43
+ to an increase in the complexity of the model. Thus, the number
44
+ of parameters associated with these bridging models, colloquially
45
+ referred to as “nuisance” parameters, has steadily grown over the
46
+ years.
47
+ The term “nuisance” is accurate when describing these parameters.
48
+ ★ E-mail: [email protected]
49
+ Not only are they generally uninteresting by comparison with the
50
+ fundamental cosmological parameters we aim to constraint, but the
51
+ increase in parameter dimensionality of the model makes exploring
52
+ their posterior distribution significantly more computationally costly.
53
+ Standard Markov Chain Monte-Carlo (MCMC), and other rejection-
54
+ based sampling methods (Metropolis et al. 1953; Foreman-Mackey
55
+ et al. 2013; Alsing & Handley 2021, among others) suffer from the
56
+ so-called “curse of dimensionality”, whereby the acceptance rate
57
+ of new samples decreases sharply with the number of parameters
58
+ (exponentially in the worst cases).
59
+ Nuisance parameters can be divided into two groups based on their
60
+ prior distributions: calibratable and non-calibratable parameters. The
61
+ non-calibratable parameters can only be constrained by the data and,
62
+ as such, typically have largely non-constraining priors. On the other
63
+ hand, we can place tighter priors on the calibratable parameters,
64
+ either by accurately characterising the instrument measurements or
65
+ by using independent external observations. In the case of cosmic
66
+ shear analyses, the impact of galaxy intrinsic alignments (Hirata &
67
+ Seljak 2004) is a standard example of a non-calibratable systematic.
68
+ On the calibratable side, the two best examples are multiplicative
69
+ shape measurement systematics, and the uncertainties in the redshift
70
+ distribution of the target source galaxies (Hoyle et al. 2018; Sánchez
71
+ & Bernstein 2019; Hildebrandt et al. 2020a; Stölzner et al. 2021;
72
+ Zhang et al. 2023).
73
+ Of these calibratable systematics the dominant source of uncer-
74
+ tainty in photometric surveys is the accuracy of redshift distributions,
75
+ © 2022 The Authors
76
+ arXiv:2301.11978v1 [astro-ph.CO] 27 Jan 2023
77
+
78
+ 2
79
+ Ruiz-Zapatero et al.
80
+ which are known to strongly affect the accuracy of cosmological con-
81
+ straints. The vital quantity to determine is the redshift distribution
82
+ of each tomographic sample of galaxies, 𝑝(𝑧). The fact that the un-
83
+ certainties in 𝑝(𝑧) can be calibrated with external spectroscopic data
84
+ (e.g. via direct calibration, (Lima et al. 2008; Wright et al. 2020),
85
+ clustering redshifts (Schneider et al. 2006; Newman 2008; Matthews
86
+ & Newman 2010; Schmidt et al. 2013), and shear ratios (Prat et al.
87
+ 2018; Sánchez et al. 2022)), enables us to place relatively strong
88
+ priors on the redshift distribution, which in turn makes it possible to
89
+ use approximate methods to efficiently marginalise over these uncer-
90
+ tainties.
91
+ Analytical marginalisation schemes for photometric redshift un-
92
+ certainties have already been proposed in the literature. In Stölzner
93
+ et al. (2021) an analytic marginalisation scheme for photometric red-
94
+ shift uncertainties was proposed based on Gaussian mixture mod-
95
+ els and applied to the analysis of KV450 data (Hildebrandt et al.
96
+ 2020b). Alternatively, in Zhang et al. (2023) a resampling approach
97
+ to marginalize over these uncertainties was proposed and applied to
98
+ the analysis HSC data. Here, we will explore the method initially pro-
99
+ posed in Hadzhiyska et al. (2020), further exploited in García-García
100
+ et al. (2023), and recently characterised in the context of the Laplace
101
+ approximation in Hadzhiyska et al. (2023). The method is based on
102
+ linearising the dependence of the theoretical prediction with respect
103
+ to the parameters defining the redshift distribution around their cali-
104
+ bration priors. This then allows one to analytically marginalise over
105
+ these parameters by modifying the covariance matrix of the data,
106
+ effectively assigning higher variance (as allowed by the calibration
107
+ prior) to the data modes most sensitive to variations in the 𝑝(𝑧).
108
+ The goal of this paper is to exhaustively validate this approximate
109
+ marginalisation scheme in the context of cosmic shear analyses. We
110
+ will do so by proving that we are able to obtain the same constraints
111
+ on cosmological parameters using this scheme, as well as employing
112
+ brute-force methods that sample the full parameter space exactly. We
113
+ will show this for both simple parametrisations of the 𝑝(𝑧) uncertain-
114
+ ties, in terms of shifts to the mean of the distribution, as well as using
115
+ completely general “non-parametric” models that treat the amplitude
116
+ of the 𝑝(𝑧) in narrowly-spaced intervals of 𝑧 as calibratable variables,
117
+ leading to a model with more than ∼ 100 nuisance parameters. In or-
118
+ der to numerically marginalize over such large parameter spaces we
119
+ develop an auto-differentiable code to obtain theoretical predictions
120
+ for the cosmic shear observables. This allows us to employ gradi-
121
+ ent based sampling algorithms, such as Hamiltonian Monte Carlo,
122
+ to beat the aforementioned curse of dimensionality. Finally, we will
123
+ show that the method is valid not only for current data, but also for
124
+ futuristic Stage-IV surveys, where photometric redshift uncertainties
125
+ will likely make up a large fraction of the total error budget. Inter-
126
+ estingly, our analysis will show that, in the context of cosmic shear
127
+ data, relatively inexpensive parametrisations of photometric redshift
128
+ uncertainties based on one free parameter per redshift bin (e.g. mean
129
+ shifts, or ranked discrete realisations (Cordero et al. 2022)), return ef-
130
+ fectively the same posterior distribution on cosmological parameters
131
+ as the most general non-parametric models.
132
+ This paper is structured as follows. In Section 2 we describe the
133
+ methods used in this work including the theory behind weak lens-
134
+ ing observables, the calibration of redshift distributions, and the
135
+ mathematics of analytical marginalisation via first-order expansion.
136
+ Section 3 presents the Dark Energy Survey data used to produce real-
137
+ istic source redshift distributions and their associated uncertainties,
138
+ as well as the models used to simulate future datasets. In Section
139
+ 4 we describe the likelihood used to analyse these data, as well as
140
+ the different parametrisations used to describe 𝑝(𝑧) uncertainties.
141
+ Section 5 presents our results, quantifying the performance of ana-
142
+ lytical marginalisation methods. Finally, we present our conclusions
143
+ in Section 6.
144
+ 2 METHODS
145
+ 2.1 Cosmic shear power spectra
146
+ It is now commonplace to carry out the analysis of galaxy weak
147
+ lensing data tomographically. The full sample is split into redshift
148
+ bins and the two-point correlation functions of all pairs of bins are
149
+ measured and compared with their theoretical prediction. Let 𝛾𝛼( ˆn)
150
+ be a map of the spin-2 lensing shear field inferred from the sources in
151
+ the ���-th redshift bin. Its relation with the three-dimensional matter
152
+ overdensity 𝛿𝑚(x) is (Bartelmann & Schneider 2001; Krause et al.
153
+ 2017)
154
+ 𝛾𝛼( ˆn) =
155
+ ∫ 𝜒𝐻
156
+ 0
157
+ 𝑑𝜒 𝑞𝛼(𝜒)
158
+
159
+ −𝜒−2ðð∇−2𝛿𝑚(𝜒ˆn, 𝑧)
160
+
161
+ ,
162
+ (1)
163
+ where ˆn is the sky direction, 𝜒 is the comoving radial distance at
164
+ redshift 𝑧, 𝜒𝐻 is the distance to the horizon, 𝑞𝛼(𝜒) is the weak
165
+ lensing radial kernel, and ð is the spin-raising differential operator,
166
+ acting on a spin-𝑠 quantity as (Newman & Penrose 1966):
167
+ ð 𝑠 𝑓 (𝜃, 𝜑) = −(sin 𝜃)𝑠
168
+ � 𝜕
169
+ 𝜕𝜃 +
170
+ 𝑖
171
+ sin 𝜃
172
+ 𝜕
173
+ 𝜕𝜑
174
+
175
+ (sin 𝜃)−𝑠 𝑠 𝑓
176
+ (2)
177
+ and turning it into a spin-(𝑠 + 1) quantity. The weak lensing kernel
178
+ is1
179
+ 𝑞𝛼(𝜒) ≡ 3
180
+ 2 𝐻2
181
+ 0Ω𝑚
182
+ 𝜒
183
+ 𝑎(𝜒)
184
+ ∫ ∞
185
+ 𝑧(𝜒)
186
+ 𝑑𝑧′𝑝𝛼(𝑧′) 𝜒(𝑧′) − 𝜒
187
+ 𝜒(𝑧′)
188
+ ,
189
+ (3)
190
+ where 𝐻0 ≡ 𝐻(𝑧 = 0) is the Hubble expansion rate today, Ω𝑚 is
191
+ the current matter density parameter and, most importantly for our
192
+ discussion, 𝑝𝛼(𝑧) is the redshift distribution in bin 𝛼,
193
+ The angular power spectrum of the 𝐸-mode components of two
194
+ maps 𝛼 and 𝛽, 𝐶 𝛼𝛽
195
+
196
+ can be related to the three-dimensional matter
197
+ power spectrum 𝑃(𝑘, 𝑧) via:
198
+ 𝐶 𝛼𝛽
199
+
200
+ = 𝐺2
201
+
202
+
203
+ 𝑑𝜒
204
+ 𝜒2 𝑞𝛼(𝜒) 𝑞𝛽(𝜒) 𝑃
205
+
206
+ 𝑘 = ℓ + 1/2
207
+ 𝜒
208
+ , 𝑧(𝜒)
209
+
210
+ ,
211
+ (4)
212
+ where we have assumed the Limber approximation (Limber 1953;
213
+ Afshordi et al. 2004), which is valid for the broad weak lensing ker-
214
+ nels considered in this work. The scale-dependent lensing prefactor,
215
+ 𝐺ℓ ≡
216
+ √︄
217
+ (ℓ + 2)!
218
+ (ℓ − 2)!
219
+ 1
220
+ (ℓ + 1/2)2 ,
221
+ (5)
222
+ accounts for the difference between angular and three-dimensional
223
+ derivatives in Eq. 1 (i.e. 𝜒2ð2∇−2 � 1). This prefactor leads to
224
+ sub-percent differences for ℓ > 11 and can therefore be neglected
225
+ on small scales (Kilbinger et al. 2017). In this work we will use
226
+ the Halofit fitting function of Smith et al. (2003); Takahashi et al.
227
+ (2012) to describe the matter power spectrum.
228
+ The intrinsic alignment (IA) of galaxies due to local interactions
229
+ (gravitational or otherwise), is an important contaminant for cosmic
230
+ shear data that must be taken into account (Brown et al. 2002). For
231
+ simplicity, however, and since the focus of this work is the impact of
232
+ the marginalisation over redshift distribution uncertainties, we will
233
+ ignore the contribution from intrinsic alignments in this analysis.
234
+ 1 Note that this is only strictly valid in ΛCDM (Ferreira 2019).
235
+ MNRAS 000, 1–11 (2022)
236
+
237
+ Analytical marginalisation over photo-𝑧 uncertainties
238
+ 3
239
+ 2.2 Redshift distribution uncertainties
240
+ The sub-samples that make up the redshift bins used in the tomo-
241
+ graphic cosmic shear analysis of an imaging survey are selected
242
+ based on the source photometry, either by simple cuts in the in-
243
+ ferred photometric redshifts (photo-𝑧), or by selecting directly in the
244
+ magnitude-color space of the sample, bypassing photo-𝑧 estimation
245
+ altogether. Regardless of the method used to select the sub-samples,
246
+ their true redshift distributions are inevitably subject to some level
247
+ of uncertainty, due to the lack of precise redshift measurements.
248
+ The 𝑝(𝑧) can however be calibrated through various methods, e.g.:
249
+ weighted direct calibration with a sufficiently complete spectroscopic
250
+ sample (Lima et al. 2008; Wright et al. 2020), clustering redshifts
251
+ (Schneider et al. 2006; Newman 2008; Matthews & Newman 2010;
252
+ Schmidt et al. 2013), and shear ratios (Prat et al. 2018; Sánchez et al.
253
+ 2022). This typically leads to relatively tight priors on the 𝑝(𝑧), but
254
+ the residual uncertainties in this prior must be propagated into the
255
+ final parameter constraints.
256
+ To characterise these uncertainties, we will make use of two dif-
257
+ ferent methods, which encompass the range of model complexity we
258
+ may reasonably expect from current and future data.
259
+ • Method 1: 𝑧 shifts. Most cosmic shear analyses to date
260
+ (Miyazaki et al. 2012; Hildebrandt et al. 2020b; Heymans et al.
261
+ 2021; Abbott et al. 2018a, 2022, among others) have summarised
262
+ the uncertainty in the calibrated 𝑝𝛼(𝑧) into a single parameter Δ𝑧𝛼
263
+ that shifts the mean of the redshift distribution. I.e. let ˆ𝑝𝛼(𝑧) be the
264
+ best-guess redshift distribution. The true redshift distribution is then
265
+ 𝑝𝛼(𝑧) = ˆ𝑝𝛼(𝑧 + Δ𝑧𝛼).
266
+ (6)
267
+ A prior on Δ𝑧𝛼 can be derived using the calibration methods listed
268
+ above. We will refer to this method as parametric.
269
+ This simple model turns out to be relatively well suited to describe
270
+ the impact of 𝑝(𝑧) uncertainties in the case of cosmic shear data.
271
+ Since weak lensing is a radially cumulative effect, the amplitude
272
+ of the weak lensing kernel (Eq. 3) is mostly sensitive to the mean
273
+ redshift of the sample, and thus much of the effect on cosmic shear
274
+ observables is well described by this parameter (Bonnett et al. 2016).
275
+ Other modes of 𝑝(𝑧) uncertainty, such as the distribution width,
276
+ may be more relevant for galaxy clustering observables, or for the
277
+ intrinsic alignment contribution to cosmic shear. Near-future cosmic
278
+ shear samples may indeed require a more sophisticated description
279
+ of the 𝑝(𝑧) uncertainty, and thus we turn to a more general method.
280
+ • Method 2: 𝑝(𝑧) bin heights. Most 𝑝(𝑧) calibration methods
281
+ (e.g. direct calibration or clustering redshifts) will produce a binned
282
+ measurement of the 𝑝(𝑧) with deterministic redshift bin ranges, and
283
+ uncertain bin heights. The most general method to propagate these
284
+ uncertainties is therefore to treat each bin height 𝑝𝑖 ≡ 𝑝(𝑧𝑖) as
285
+ a free parameter in the model, with a prior given by the calibration
286
+ uncertainties. The latter may be in the form of individual 1𝜎 errors for
287
+ each bin height, if the uncertainties are approximately uncorrelated,
288
+ or a full covariance matrix covering all bin heights.
289
+ The resulting parametrisation thus sidesteps any attempt at sum-
290
+ marising the uncertainty into effective parameters, and thus we will
291
+ refer to this method as non-parametric. The method therefore fully
292
+ propagates all calibration uncertainties into the final constraints with
293
+ minimal approximations.
294
+ The key practical difference between both methods, in the context
295
+ of error propagation, is the additional complexity they incur. The
296
+ parametric approach (Method 1) introduces one free parameter per
297
+ redshift bin. For 𝑂(5) bins, this is already enough to significantly
298
+ impact the performance of standard MCMC algorithms. In turn, the
299
+ non-parametric approach (Method 2) introduces tens or hundreds of
300
+ parameters per redshift bin, and one must resort to advanced sam-
301
+ pling methods in order to fully explore the resulting model without
302
+ assumptions.
303
+ 2.3 Linearisation and analytical marginalisation
304
+ Let 𝛀 be the set of non-calibratable parameters of a model (in our
305
+ case this is the set of cosmological and non-calibratable nuisance
306
+ parameters) and 𝝂 the set of calibratable parameter such that the total
307
+ set of parameters is given by 𝜽 = 𝛀 ∪ 𝝂. Now consider the general
308
+ case of a Gaussian posterior distribution of the form
309
+ −2 log 𝑃(𝛀, 𝝂|d) =(d − t)𝑇 C−1(d − t) + (𝝂 − ¯𝝂)𝑇 P−1(𝝂 − ¯𝝂)
310
+ − 2 log 𝑃(𝛀) + const.,
311
+ (7)
312
+ where d is the data. We assume a Gaussian calibration prior with
313
+ mean ¯𝝂 and covariance P, while 𝑃(𝛀) is the prior on 𝛀 (which is, as
314
+ per our assumption, broad). t(𝛀, 𝝂) is the theoretical prediction for
315
+ the data d which implicitly depends on both calibratable and non-
316
+ calibratable parameters. C is the covariance matrix of d, which is
317
+ parameter-independent.
318
+ Assuming a tight prior on 𝝂, we start by expanding the theory
319
+ prediction around ¯𝝂
320
+ t ≃ ¯t + T(𝝂 − ¯𝝂),
321
+ where ¯t ≡ t(𝛀, ¯𝝂),
322
+ T ≡ 𝑑t
323
+ 𝑑𝝂
324
+ ����𝝂=¯𝝂
325
+ .
326
+ (8)
327
+ Substituting this approximation in Eq. 7, the posterior becomes Gaus-
328
+ sian in 𝝂, and thus the calibratable parameters can be marginalised
329
+ analytically. As shown in Hadzhiyska et al. (2020), the resulting
330
+ marginalised posterior is
331
+ −2 log 𝑃(𝛀|d) ≃(d − ¯t)𝑇 ˜C−1(d − ¯t) − 2 log 𝑃(𝛀)
332
+ + log
333
+
334
+ det
335
+
336
+ T𝑇 C−1T + P−1��
337
+ + const.,
338
+ (9)
339
+ where the modified covariance is
340
+ ˜C ≡ C + TPT𝑇 .
341
+ (10)
342
+ Note that, strictly speaking, both the modified covariance and the
343
+ term in the second line of Eq. 9 depend on𝛀, which would in principle
344
+ complicate the evaluation of the likelihood. In practice, thisparameter
345
+ dependence can be neglected such that the value of 𝛀 at which these
346
+ terms are evaluated can be fixed during exploration of the posterior.
347
+ However, fixing 𝛀 at values with a bad fit to the data will result
348
+ in a mischaracterisation of the response of the theory vector to the
349
+ nuisance parameters leading to inaccurate marginalised posteriors.
350
+ Ideally, 𝛀 is fixed to its maximum a posteriori (MAP) value. However,
351
+ as shown in Hadzhiyska et al. (2020) and in preliminary results, no
352
+ appreciable differences are found in the marginalised posteriors for
353
+ 𝛀 within 2𝜎 of the MAP. Note that the size of the 2𝜎 region will
354
+ depend on how constraining the data is.
355
+ This result is intuitively simple to understand if we think of T as
356
+ the response of the data to variations in the nuisance parameters.
357
+ After marginalising over the calibratable parameters, the resulting
358
+ distribution is a multi-variate Gaussian where the data covariance
359
+ has been updated in Eq. 10 by increasing the uncertainty in the data
360
+ modes that most prominently respond to variations in the nuisance
361
+ parameters.
362
+ In this work, 𝝂 corresponds to the parameters describing the red-
363
+ shift distribution uncertainties, i.e. one shift parameter per redshift
364
+ bin when using the parametric approach, or a set of 𝑝(𝑧) bin heights in
365
+ the non-parametric scheme. The method described above, however,
366
+ MNRAS 000, 1–11 (2022)
367
+
368
+ 4
369
+ Ruiz-Zapatero et al.
370
+ 0.00
371
+ 0.05
372
+ 0.10
373
+ 0.15
374
+ 0.20
375
+ p(z)0
376
+ p(z)1
377
+ p(z)2
378
+ p(z)3
379
+ 0.5
380
+ 1.0
381
+ 1.5
382
+ z
383
+ 0.25
384
+ 0.50
385
+ 0.75
386
+ 1.00
387
+ 1.25
388
+ 1.50
389
+ z
390
+ 0.5
391
+ 1.0
392
+ 1.5
393
+ z
394
+ 0.5
395
+ 1.0
396
+ 1.5
397
+ z
398
+ 0.5
399
+ 1.0
400
+ 1.5
401
+ z
402
+ 10
403
+ 3
404
+ 10
405
+ 2
406
+ 10
407
+ 1
408
+ 100
409
+ Figure 1. Top row: normalized galaxies’s redshift distributions for each of the 4 redshift bins. Bottom row: correlation matrix obtained using the DIR algorithm
410
+ for each of the 4 galaxies’ redshift distributions. Note that for visualization purposes we display the absolute values of the each correlation matrix in logarithmic
411
+ scale. In this plot we can see that the covariance matrices obtained through the DIR algorithm are mostly diagonal.
412
+ is fully general and has in the past been applied to marginalise over
413
+ other types of nuisance parameters, including multiplicative shape
414
+ measurement biases (Hildebrandt et al. 2020b), as well as truly linear
415
+ parameters such as shot-noise (García-García et al. 2021) or system-
416
+ atic template amplitudes (Koukoufilippas et al. 2020). The aim of
417
+ this paper is thus to determine the applicability of this method to the
418
+ case of redshift distribution uncertainties.
419
+ 3 DATA
420
+ In order to evaluate the performance of the analytical marginalisation
421
+ approach described in the previous section in the context of current
422
+ and future surveys, we make use of data from the first-year cosmic
423
+ shear analysis of the Dark Energy Survey (DES-Y1, Abbott et al.
424
+ (2018b)). The aim of this is twofold: first, to demonstrate that the
425
+ method can be successfully implemented in real data, with real-life
426
+ complications (e.g. noisy 𝑝(𝑧)s, numerical covariances, astrophysi-
427
+ cal and observational systematics) and, second, to demonstrate this
428
+ validity for future Stage-IV datasets in the presence of 𝑝(𝑧) cali-
429
+ bration uncertainties already achieved on current data. This section
430
+ describes the DES-Y1 data used, and the models used to generate
431
+ simulated future Stage-IV data.
432
+ 3.1 DES-Y1 data and redshift distributions
433
+ The Dark Energy Survey is a photometric, 5-year survey, that has
434
+ observed 5000 deg2 of the sky using five different filter bands (grizY).
435
+ The observations were made with the 4m Blanco Telescope, provided
436
+ with the 570-Mpix Dark Energy Camera (DECam), from the Cerro
437
+ Tololo Inter-American Observatory (CTIO), in Chile. In this paper
438
+ we use cosmic shear data from the first data release (Abbott et al.
439
+ 2018b), which covers 1786 deg2 before masking. In particular, we
440
+ use the public Metacalibration source catalog2, which is divided
441
+ in four redshift bins covering the range 𝑧 ≲ 1.6 (Hoyle et al. 2018).
442
+ We use the calibrated redshift distributions of the Metacalibra-
443
+ tion sample provided by García-García et al. (2023). The 𝑝(𝑧)s were
444
+ estimated via direct calibration (DIR Lima et al. (2008)), using the
445
+ COSMOS 30-band catalog (Laigle et al. 2016) as a calibrating sam-
446
+ ple. The uncertainties of the measured redshift distributions were
447
+ estimated analytically, as described in García-García et al. (2023),
448
+ accounting for both shot noise and sample variance, and represent
449
+ a realistic level of 𝑝(𝑧) uncertainty achieved by current existing
450
+ datasets. The redshift distributions were sampled on 40 bins of width
451
+ 𝛿𝑧 = 0.04 covering the range 0 ≤ 𝑧 ≤ 1.6. Fig. 1 shows, in the first
452
+ row, the redshift distributions of the four Metacalibration samples
453
+ and their statistical uncertainties. Note that we estimated the full co-
454
+ variance matrix of the 𝑝(𝑧) bin heights. The covariance is dominated
455
+ by the diagonal, as can be seen in the bottom panels of Fig. 1.
456
+ We will also use the cosmic shear angular power spectra provided
457
+ by Nicola et al. (2021). A full description of the methods used to
458
+ estimate these power spectra, and their associated covariance matrix,
459
+ from the DES-Y1 data is provided by the authors.
460
+ 3.2 Future Stage-IV data
461
+ We generate a simulated data vector corresponding to a Stage-IV
462
+ cosmic shear survey, such as the Legacy Survey of Space Time, at
463
+ the Rubin Observatory (LSST Dark Energy Science Collaboration
464
+ 2012), or the Euclid survey (Spergel et al. 2015). Our aim is to ef-
465
+ fectively test the analytical marginalisation method in the low-noise
466
+ regime, where the inferred posterior is likely more sensitive to resid-
467
+ ual 𝑝(𝑧) uncertainties, and the error budget may become dominated
468
+ by these, rather than the statistical errors in the data themselves.
469
+ 2 https://desdr-server.ncsa.illinois.edu/despublic/y1a1_
470
+ files/
471
+ MNRAS 000, 1–11 (2022)
472
+
473
+ Analytical marginalisation over photo-𝑧 uncertainties
474
+ 5
475
+ For simplicity, we simulate the Stage-IV survey as having the
476
+ same redshift distributions as the DES-Y1 sample. This includes
477
+ both the 𝑝(𝑧)s themselves, and their calibration uncertainties. While
478
+ it is possible that techniques for inferring redshifts from photometry,
479
+ or the size and quality of calibrating spectroscopic samples, will
480
+ improve substantially by the time Stage-IV data are available, we
481
+ prefer to err on the side of caution and assume the same performance
482
+ as currently achieved. For instance it is possible that redshift estimates
483
+ will suffer commensurately with the increase in survey depth. The
484
+ results presented here are therefore conservative, and their validity
485
+ will only be reinforced if better 𝑝(𝑧) calibration samples are used in
486
+ the future.
487
+ We generate cosmic shear power spectra using CCL (Chisari et al.
488
+ 2019) for the best-fit Planck 2018 cosmological parameters (Planck
489
+ Collaboration et al. 2020): Ω𝑏ℎ2 = 0.02237, Ω𝑐ℎ2 = 0.12, ℎ =
490
+ 0.6736, 109𝐴𝑠 = 2.0830, 𝑛𝑠 = 0.9649, 𝑤0 = −1, 𝑤𝑎 = 0. We use
491
+ the same sampling in ℓ used for the DES-Y1 power spectra, and use
492
+ only scales in the range ℓ ∈ [30, 2000].
493
+ We compute the covariance matrix of these power spectra an-
494
+ alytically, including a disconnected “Gaussian” component, and a
495
+ connected super-sample covariance contribution (SSC).
496
+ Cov
497
+
498
+ 𝐶 𝛼
499
+ ℓ , 𝐶𝜌𝜎
500
+ ℓ′
501
+
502
+ = Cov𝐺
503
+
504
+ 𝐶 𝛼𝛽
505
+
506
+ , 𝐶𝜌𝜎
507
+ ℓ′
508
+
509
+ + CovSSC
510
+
511
+ 𝐶 𝛼𝛽
512
+
513
+ , 𝐶 𝜎𝜌
514
+ ℓ′
515
+
516
+ .
517
+ (11)
518
+ We estimate the Gaussian covariance using a simple mode-counting
519
+ approximation (Efstathiou 2004) as
520
+ Cov𝐺
521
+
522
+ 𝐶 𝛼𝛽
523
+
524
+ , 𝐶𝜌𝜎
525
+ ℓ′
526
+
527
+ = 𝛿ℓℓ′
528
+ 𝐶 𝛼𝜌
529
+
530
+ 𝐶𝛽𝜎
531
+
532
+ + 𝐶 𝛼𝜎
533
+
534
+ 𝐶𝛽𝜌
535
+
536
+ (2ℓ + 1) Δℓ 𝑓sky
537
+ ,
538
+ (12)
539
+ where 𝑓sky is the fraction of the sky covered by the experiment. We
540
+ assume 𝑓sky = 0.4, as in the case of LSST (LSST Dark Energy Sci-
541
+ ence Collaboration 2012). The angular power spectra above contain
542
+ the contribution from shape noise in the auto-correlation, of the form
543
+ 𝑁 𝛼𝛼
544
+
545
+ =
546
+ 𝜎2𝛾
547
+ ¯𝑛𝛼
548
+ .
549
+ (13)
550
+ Here 𝜎𝛾 = 0.28 is the per-component ellipticity dispersion in each
551
+ source, and ¯𝑛𝛼 is the angular number density of sources in the 𝛼-th
552
+ redshift bin. We assume 𝑛𝛼 = 4 arcmin−2 in each redshift bin.
553
+ We compute the super-sample covariance contribution following:
554
+ CovSSC(𝐶 𝛼𝛽
555
+
556
+ , 𝐶𝜌𝜎
557
+ ℓ′ ) =
558
+
559
+ d𝜒 𝑞𝛼(𝜒)𝑞𝛽(𝜒)𝑞𝜌(𝜒)𝑞𝜎(𝜒)
560
+ 𝜒4
561
+ ×
562
+ (14)
563
+ 𝜕𝑃(ℓ/𝜒, 𝑧)
564
+ 𝜕𝛿LS
565
+ 𝜕𝑃(ℓ′/𝜒, 𝑧)
566
+ 𝜕𝛿LS
567
+ 𝜎2
568
+ LS(𝑧),
569
+ (15)
570
+ as in Nicola et al. (2021). 𝜕𝑃(𝑘, 𝑧)/𝜕𝛿LS is the response of the matter
571
+ power spectrum to a large-scale density fluctuation 𝛿LS, and the
572
+ quantity 𝜎2
573
+ 𝑏(𝑧) is the variance of the long wavelength mode over the
574
+ survey footprint. We estimate the latter as in Krause & Eifler (2017),
575
+ modelling the footprint simply as a circular cap of area 4𝜋 𝑓sky. We
576
+ estimate the response function using perturbation theory and the halo
577
+ model, as described in Krause & Eifler (2017), and as implemented
578
+ in CCL.
579
+ 4 LIKELIHOOD
580
+ We extract cosmological parameter constraints using a Gaussian like-
581
+ lihood as described in Section 2.3. In order to validate the analytical
582
+ Parameter priors
583
+ Parameter
584
+ Prior
585
+ Parameter
586
+ Prior
587
+ Cosmology
588
+ Redshift calibration
589
+ Ωm
590
+ 𝑈 (0.1, 0.9)
591
+ Δ𝑧1
592
+ N0.0, 0.016)
593
+ Ωb
594
+ 𝑈 (0.03, 0.07)
595
+ Δ𝑧2
596
+ N(0.0, 0.017)
597
+
598
+ 𝑈 (0.55, 0.91)
599
+ Δ𝑧3
600
+ N(0.0, 0.013)
601
+ 𝑛s
602
+ 𝑈 (0.87, 1.07)
603
+ Δ𝑧4
604
+ N(0.0, 0.015)
605
+ 𝜎8
606
+ 𝑈 (0.6, 0.9)
607
+ 𝑝i
608
+ N( ¯𝑝𝑖, C)
609
+ Shear multiplicative bias
610
+ 𝑚𝑖
611
+ 0.012
612
+ Table 1. Prior distributions for the parameters considered in this work. Note
613
+ that the redshift calibration section contains the priors for both the Δ𝑧 and
614
+ 𝑝𝛼 (𝑧) models which are not sampled simultaneously.
615
+ marginalisation approach, we will either use the full posterior dis-
616
+ tribution in Eq. 7, or the analytically marginalised version in Eq.
617
+ 93. In the first case, 𝝂 includes all nuisance parameters describing
618
+ the redshift distribution uncertainties, and in both cases 𝛀 includes
619
+ all other model parameters. Specifically, 𝛀 contains the five ΛCDM
620
+ cosmological parameters (Ωm, Ωb, 𝜎8, 𝑛𝑠, ℎ).
621
+ When marginalising over redshift distribution uncertainties, 𝝂 will
622
+ contain either one redshift shift parameter Δ𝑧𝛼 for each redshift bin,
623
+ when employing the parametric description of 𝑝(𝑧) uncertainties
624
+ (Method 1), or a set of bin heights for each redshift bin determining
625
+ 𝑝𝛼(𝑧), when using the non-parametric approach (Method 2). The
626
+ first case will introduce 4 new parameters to the model, while the
627
+ latter will introduce 4 × 40 = 160 new amplitude parameters, as
628
+ described in Section 3.1.
629
+ Table 1 shows the parameter priors used in this work. All cosmo-
630
+ logical parameters take uniform, largely uninformative priors. For
631
+ simplicity, the multiplicative bias parameters were fixed at the center
632
+ of the Gaussian priors from the official analysis of DES-Y1 (Ab-
633
+ bott et al. 2018a). When using Method 1 to numerically marginalise
634
+ over the 𝑝(𝑧) uncertainties, we used Gaussian priors on each of the
635
+ shift parameters Δ𝑧𝛼, following those used by DES-Y1 (Abbott et al.
636
+ 2018a). When using Method 2 (marginalisation over 𝑝(𝑧) bin am-
637
+ plitudes), we assume a multi-variate Gaussian prior, with the 𝑝(𝑧)
638
+ covariance described in Sect. 3.1 and shown in Fig. 1.
639
+ For both 𝑝(𝑧) uncertainty models, when using analytical marginal-
640
+ isation, we use Eq. 9 and modify the covariance as in Eq. 10, with P
641
+ given by the priors described above. When using numerical marginal-
642
+ isation, we simply explore the posterior distribution of the full model,
643
+ including all the 𝑝(𝑧), 𝑝𝑖, parameters. In the case of Method 2, this
644
+ involves sampling a distribution with 165 parameters, of which the
645
+ bulk (160 parameters) describe the 𝑝(𝑧) uncertainty. This is not fea-
646
+ sible for standard Metropolis-Hastings MCMC methods Metropolis
647
+ et al. (1953); Hastings (1970) due to the curse of dimensionality, and
648
+ therefore we resort to a Hamiltonian Monte Carlo (HMC) approach.
649
+ HMC (MacKay 2002; Betancourt 2017) uses notions of Hamil-
650
+ tonian dynamics to draw trajectories on the parameter space along
651
+ which the sampler moves. This results in a much greater accep-
652
+ tance rate, and allows HMC to beat the dimensionality curse. HMC
653
+ can thus efficiently explore parameter spaces with large numbers of
654
+ dimensions in far less time than Metropolis-Hastings or nested sam-
655
+ pling techniques (Alsing & Handley 2021). The main difficulty of
656
+ 3 Recall that we treat the term in the second line of Eq. 9 as a constant.
657
+ MNRAS 000, 1–11 (2022)
658
+
659
+ 6
660
+ Ruiz-Zapatero et al.
661
+ 0.2
662
+ 0.3
663
+ 0.4
664
+ m
665
+ 0.70
666
+ 0.75
667
+ 0.80
668
+ S8
669
+ 0.6
670
+ 0.7
671
+ 0.8
672
+ 0.9
673
+ 8
674
+ 0.6 0.7 0.8 0.9
675
+ 8
676
+ 0.71 0.75 0.79
677
+ S8
678
+ z - Analytical marg. - DESY1
679
+ z - Numerical marg. - DESY1
680
+ z - No marg. - DESY1
681
+ Figure 2. Marginalised posterior distributions for the combination of parame-
682
+ ters Ωm, 𝜎8 and 𝑆8 obtained when considering the Δ𝑧 model for photometric
683
+ uncertainties for DES-Y1 data. The blue contours correspond to the case
684
+ where the Δ𝑧 parameter are fixed. The magenta contours are obtained when
685
+ numerically marginalizing over the Δ𝑧 parameters. Finally, the black dashed
686
+ contours are obtained when analytically marginalizing over the Δ𝑧 parame-
687
+ ters. We can observe that the analytical and numerical marginalisation return
688
+ nearly identical posteriors.
689
+ using HMC is the need to calculate gradients of the log-posterior
690
+ to calculate the Hamiltonian equations of motion. The additional
691
+ computational cost of obtaining these derivatives numerically (e.g.
692
+ via adaptive finite differences) may outweigh the gains caused by the
693
+ higher acceptance rates of HMC. To overcome this problem we make
694
+ use of automatic differentiation (AD). To take advantage of AD, we
695
+ have developed a cosmological theoretical prediction code natively
696
+ written in the Julia programming language (Ruiz-Zapatero et al.
697
+ 2023). Julia is a just-in-time (JIT) compiled language with C-like
698
+ performance and seamless AD integration, which can thus be used
699
+ to efficiently sample complex cosmological posteriors using HMC.
700
+ To sample the posterior distribution we use the No-U-Turns Sampler
701
+ (NUTS Hoffman & Gelman (2011)) implementation of HMC within
702
+ the Turing.jl package (Ge et al. 2018).
703
+ 5 RESULTS
704
+ 5.1 Linearising Δ𝑧
705
+ Let us begin the discussion of our results by considering the simplest
706
+ of the two models of the photometric uncertainties studied in this
707
+ work, the Δ𝑧 model (called Method 1 above). As discussed in Section
708
+ 4, this model introduces 4 new shift parameters Δ𝑧 (one per redshift
709
+ bin) in addition to the 5 ΛCDM parameters. All other nuisance
710
+ parameters are kept fixed. For the DES-Y1 and LSST-like datasets,
711
+ we will compare the result of analytically marginalizing over the Δ𝑧
712
+ parameters against performing the full numerical marginalisation on
713
+ the corresponding cosmological constraints. In order to quantify the
714
+ contribution of redshift uncertainties to the total error budget, we will
715
+ also present results for the case when the Δ𝑧 parameters are fixed (i.e.
716
+ assuming perfect knowledge of the redshift distributions).
717
+ 0.30 0.35
718
+ m
719
+ 0.82
720
+ 0.83
721
+ 0.84
722
+ 0.85
723
+ S8
724
+ 0.75
725
+ 0.80
726
+ 0.85
727
+ 8
728
+ 0.75
729
+ 0.85
730
+ 8
731
+ 0.83
732
+ 0.85
733
+ S8
734
+ z - Analytical marg. - LSST
735
+ z - Numerical marg. - LSST
736
+ z - No marg. - LSST
737
+ Figure 3. Marginalised posterior distributions for the combination of parame-
738
+ ters Ωm, 𝜎8 and 𝑆8 obtained when considering the Δ𝑧 model for photometric
739
+ uncertainties for futuristic LSST-like data. The green contours correspond to
740
+ the case where the Δ𝑧 parameter are fixed. The orange contours are obtained
741
+ when numerically marginalizing over the Δ𝑧 parameters. Finally, the black
742
+ dashed contours are obtained when analytically marginalizing over the Δ𝑧 pa-
743
+ rameters. We can observe that the analytical and numerical marginalisations
744
+ return nearly identical posteriors.
745
+ Our results for DES-Y1 data are shown in Fig. 2, with the er-
746
+ rors on all parameters listed in Table 2. On the one hand, we find
747
+ that marginalizing analytically or numerically over the Δ𝑧 parame-
748
+ ters leads to the same marginalised posterior for the cosmological
749
+ parameters. On the other hand, fixing the Δ𝑧 parameters returns a
750
+ posterior distribution that is only mildly narrower than the marginal
751
+ distribution. For the DES-Y1 data, the impact of redshift uncertain-
752
+ ties in the final cosmological errors is relatively small (although not
753
+ negligible). Thus, if we truly wish to study the effect of marginal-
754
+ izing analytically as opposed to numerically over the Δ𝑧 parameters
755
+ we will have to consider futuristic LSST-like data, where the impact
756
+ of these uncertainties will likely be higher.
757
+ We show results for futuristic LSST-like data on Fig. 3, with the
758
+ parameter constraints listed in Table 2. First of all, in the case LSST-
759
+ like data we observe that not marginalising over the Δ𝑧 parameters
760
+ in the model results in significantly narrower posteriors, with the
761
+ final uncertainties shrinking by a factor ∼ 2. The impact of redshift
762
+ distribution uncertainties in this case is thus much more relevant,
763
+ and the accuracy of the analytical marginalisation scheme becomes
764
+ paramount. However, comparing the contours obtained by numerical
765
+ and analytical marginalisation, we observe that both methods return
766
+ largely equivalent posterior distributions, with the final uncertainties
767
+ changing by much less than 10%. This holds even in the case the
768
+ Δ𝑧 prior worsen by a factor 4 as seen in Figure A1, in Appendix A.
769
+ Therefore, linearizing the likelihood around the Δ𝑧 parameters will be
770
+ a good enough approximation for LSST-data, at least for relatively
771
+ simple parametrisations of the 𝑝(𝑧) uncertainty, which will allow
772
+ us to reduce the dimensionality of the model and make parameter
773
+ inference more efficient.
774
+ It is worth emphasizing that the results in this section are not
775
+ meant to be interpreted as forecasts on the constraining power of
776
+ MNRAS 000, 1–11 (2022)
777
+
778
+ Analytical marginalisation over photo-𝑧 uncertainties
779
+ 7
780
+ Δ𝑧 model
781
+ Fixed
782
+ Numerical
783
+ Analytical
784
+ Ωm
785
+ DES-Y1
786
+ 0.333 ± 0.055
787
+ 0.3 ± 0.056
788
+ 0.306 ± 0.055
789
+ LSST
790
+ 0.311 ± 0.011
791
+ 0.317 ± 0.02
792
+ 0.317 ± 0.02
793
+ 𝜎8
794
+ DES-Y1
795
+ 0.724 ± 0.072
796
+ 0.765 ± 0.077
797
+ 0.758 ± 0.076
798
+ LSST
799
+ 0.82 ± 0.015
800
+ 0.821 ± 0.027
801
+ 0.823 ± 0.027
802
+ 𝑆8
803
+ DES-Y1
804
+ 0.753 ± 0.015
805
+ 0.756 ± 0.015
806
+ 0.756 ± 0.015
807
+ LSST
808
+ 0.833 ± 0.002
809
+ 0.833 ± 0.005
810
+ 0.833 ± 0.006
811
+ Table 2. Numerical values for the mean and 1𝜎 confidence intervals for
812
+ the 1D marginalised posterior distributions of the cosmological parameters
813
+ Ωm, 𝜎8 and 𝑆8 obtained when considering the first method (𝑧 shifts) to
814
+ characterise the photometric redshift uncertainties. The first column shows
815
+ the values obtained when the Δ𝑧 parameters were kept fixed, the second
816
+ column when they were marginalised numerically and the third column when
817
+ they were marginalised analytically. In each row we display the constraints
818
+ obtained when using DES-Y1 or LSST-like data to constrain the models.
819
+ LSST on cosmological parameters, but only on our ability to ana-
820
+ lytically marginalize over photometric uncertainties in inferring the
821
+ underlying cosmology. The recovered constraints depend strongly on
822
+ assumptions such as the redshift calibration that LSST will be able to
823
+ achieve for the different samples involved. As such, the results pre-
824
+ sented here are only a conservative estimate of the effect of analytic
825
+ marginalisation on cosmological constraints.
826
+ 5.2 Linearising 𝑝𝛼(𝑧)
827
+ In the previous section we have shown that, even for futuristic LSST-
828
+ like data, it is possible to marginalize over redshift uncertainties
829
+ analytically, assuming a relatively simple parametrisation of these
830
+ uncertainties. We now turn to more complex models to characterise
831
+ these uncertainties.
832
+ In order to do so we consider the previously discussed 𝑝𝛼(𝑧)
833
+ model (called Method 2 above), which turns the height of each bin
834
+ in the redshift distribution histograms into a free parameter. This
835
+ results in 40 new free parameters per redshift bin with a total of 160
836
+ parameters for the data considered in this work.
837
+ We start by revisiting the DES-Y1 data analysis, presenting our
838
+ results in Fig. 4. As we observed in the previous section, we find that
839
+ even for the far more general 𝑝𝛼(𝑧) model there is no significant
840
+ difference between numerically marginalizing over the 𝑝𝛼(𝑧), or
841
+ doing so through our approximate analytical approach. Furthermore,
842
+ as before, fixing the shape of the redshift distribution leads to only
843
+ mildly tighter constraints. On the one hand, this means that the result
844
+ found for the Δ𝑧 model is not reliant on the simplicity of the model,
845
+ but instead inherent to the sensitivity of DES-Y1 data. On the other
846
+ hand, this also means that we must turn once again to futuristic LSST-
847
+ like data to study the impact of a more general parametrisation of
848
+ photometric uncertainties.
849
+ The results for futuristic LSST-like data are shown in Fig. 5. As in
850
+ the case of the Δ𝑧 parametrisation, we find that, in the case LSST-
851
+ like data, not including the 𝑝𝛼(𝑧) parameters in the model results
852
+ in significantly narrower posteriors. By looking at the corresponding
853
+ numerical values in Tab. 3, we see that the 𝑆8 constraints become
854
+ twice as tight when the 𝑝𝛼(𝑧) parameters are fixed. Most importantly,
855
+ we find that marginalizing over the 𝑝���(𝑧) parameters analytically
856
+ or numerically yields almost indistinguishable posteriors. Thus, the
857
+ results found in Sect. 5.1 for the simple Δ𝑧 parametrisation, in fact
858
+ hold for significantly more general models of the uncertainty in the
859
+ galaxy redshift distributions.
860
+ Finally, in Fig. 6 we present the constraints obtained for the 160
861
+ 0.2
862
+ 0.3
863
+ 0.4
864
+ m
865
+ 0.70
866
+ 0.74
867
+ 0.78
868
+ S8
869
+ 0.6
870
+ 0.7
871
+ 0.8
872
+ 0.9
873
+ 8
874
+ 0.6 0.7 0.8 0.9
875
+ 8
876
+ 0.71 0.75 0.79
877
+ S8
878
+ p (z) - Analytical marg. - DESY1
879
+ p (z) - Numerical marg. - DESY1
880
+ p (z) - No marg. - DESY1
881
+ Figure 4. Marginalised posterior distributions for the combination of pa-
882
+ rameters Ωm, 𝜎8 and 𝑆8 obtained when considering the 𝑝𝛼 (𝑧) model for
883
+ photometric uncertainties for DES-Y1 data. The blue contours correspond to
884
+ the case where the 𝑝𝛼 (𝑧) parameter are fixed. The magenta contours are ob-
885
+ tained when numerically marginalising over the 𝑝𝛼 (𝑧) parameters. Finally,
886
+ the black dashed contours are obtained when analytically marginalizing over
887
+ the 𝑝𝛼 (𝑧) parameters. We can observe that the analytical and numerical
888
+ marginalisation return nearly identical posteriors.
889
+ 0.30 0.35
890
+ m
891
+ 0.82
892
+ 0.83
893
+ 0.84
894
+ 0.85
895
+ S8
896
+ 0.75
897
+ 0.80
898
+ 0.85
899
+ 0.90
900
+ 8
901
+ 0.75
902
+ 0.85
903
+ 8
904
+ 0.83
905
+ 0.85
906
+ S8
907
+ p (z) - Analytical marg. - LSST
908
+ p (z) - Numerical marg. - LSST
909
+ p (z) - No marg. - LSST
910
+ Figure 5. Marginalised posterior distributions for the combination of pa-
911
+ rameters Ωm, 𝜎8 and 𝑆8 obtained when considering the 𝑝𝛼 (𝑧) model for
912
+ photometric uncertainties for LSST-like futuristic data. The green contours
913
+ correspond to the case where the 𝑝𝛼 (𝑧) parameter are fixed. The orange
914
+ contours were obtained when numerically marginalizing over the 𝑝𝛼 (𝑧) pa-
915
+ rameters. Finally, the black dashed contours were obtained when analytically
916
+ marginalizing over the 𝑝𝛼 (𝑧) parameters. We can observe that the analytical
917
+ and numerical marginalization return nearly identical posteriors.
918
+ MNRAS 000, 1–11 (2022)
919
+
920
+ 8
921
+ Ruiz-Zapatero et al.
922
+ 𝑝𝛼 (𝑧) model
923
+ Fixed
924
+ Numerical
925
+ Analytical
926
+ Ωm
927
+ DES-Y1
928
+ 0.333 ± 0.056
929
+ 0.308 ± 0.055
930
+ 0.312 ± 0.057
931
+ LSST
932
+ 0.311 ± 0.011
933
+ 0.317 ± 0.02
934
+ 0.317 ± 0.021
935
+ 𝜎8
936
+ DES-Y1
937
+ 0.723 ± 0.073
938
+ 0.755 ± 0.075
939
+ 0.75 ± 0.077
940
+ LSST
941
+ 0.824 ± 0.015
942
+ 0.816 ± 0.026
943
+ 0.815 ± 0.027
944
+ 𝑆8
945
+ DES-Y1
946
+ 0.753 ± 0.015
947
+ 0.755 ± 0.015
948
+ 0.755 ± 0.015
949
+ LSST
950
+ 0.838 ± 0.002
951
+ 0.837 ± 0.006
952
+ 0.837 ± 0.006
953
+ Table 3. Numerical values for the mean and 1𝜎 confidence intervals for the
954
+ 1D marginalised posterior distributions of the cosmological parameters Ωm,
955
+ 𝜎8 and 𝑆8 obtained when considering the second method (𝑝(𝑧) bin heights)
956
+ to characterise the photometric redshift uncertainties. The first column shows
957
+ the values obtained when the 𝑝𝛼 (𝑧) parameters are kept fixed, the second
958
+ column when they are marginalised numerically, and the third column when
959
+ they are marginalised analytically. In each row we display the constraints
960
+ obtained when using DES-Y1 or LSST-like data to constrain the models.
961
+ 𝑝𝛼(𝑧) parameters for both the DES-Y1 (top panel) and LSST-like
962
+ data (bottom panel) in color bands. We observe that the posterior
963
+ distributions are largely dominated by the prior (shown in dashed
964
+ black line with error bars) and, thus, the redshift distribution is not
965
+ significantly self-calibrated by the data in either case.
966
+ Before moving to the next Section, it is worth stressing that con-
967
+ straining such a large parameter space has only been possible thanks
968
+ to the auto-differentiable nature of the code used to obtain theoret-
969
+ ical predictions, allowing us to use gradient-based samplers, much
970
+ more efficient that standard samplers. The development of such auto-
971
+ differentiable codes will therefore become imperative in the near fu-
972
+ ture given the increasing complexity of models used in cosmological
973
+ analyses.
974
+ 5.3 Δ𝑧 vs 𝑝𝛼(𝑧)
975
+ In the previous sections we have focused in the impact of how we
976
+ marginalize over the different parametrisations of photometric red-
977
+ shift uncertainties. In this section we will focus instead on what we
978
+ marginalize over, i.e. the impact of the choice of parametrisation.
979
+ The question is then: Can a one-parameter-per-bin model (Δ𝑧 model)
980
+ capture all the meaningful modifications to photometric redshift dis-
981
+ tributions?
982
+ In order to answer this question, we constrain the cosmological
983
+ parameters for the Δ𝑧 and 𝑝𝛼(𝑧) models in the case with futuristic
984
+ LSST-like data. In both cases, we marginalize numerically over their
985
+ respective nuisance parameters. As shown in Fig. 7 and Tables 2
986
+ and 3, both methods recover the same posterior distributions with
987
+ small differences. Thus, it is in principle possible that even Stage-IV
988
+ surveys will be able to use relatively simple models to describe the
989
+ redshift distribution of cosmic shear samples4.
990
+ 6 CONCLUSIONS
991
+ One of the most significant obstacles to overcome in photometric
992
+ weak lensing surveys is the accurate modeling of redshift distribu-
993
+ tions, 𝑝(𝑧). Not only are our measurements prone to error, which can
994
+ bias the inferred cosmological parameters, but accounting for these
995
+ 4 Note, however, this is likely not the case for photometric galaxy clustering
996
+ studies where other properties of the redshift distribution (e.g. its width) have
997
+ a stronger impact on the theoretical prediction (Nicola et al. 2020).
998
+ 0.00
999
+ 0.05
1000
+ 0.10
1001
+ 0.15
1002
+ 0.20
1003
+ p (z)
1004
+ DESY1
1005
+ 0.0
1006
+ 0.5
1007
+ 1.0
1008
+ 1.5
1009
+ z
1010
+ 0.00
1011
+ 0.05
1012
+ 0.10
1013
+ 0.15
1014
+ 0.20
1015
+ p (z)
1016
+ LSST
1017
+ Figure 6. Posterior distributions for the 𝑝𝛼 (𝑧) parameters when considering
1018
+ DES-Y1 data (top row) and futuristic LSST-like data (bottom row). The black
1019
+ dashed line shows the mean of the Gaussian prior of the 𝑝𝛼 (𝑧) parameters.
1020
+ The error bars show their corresponding error.
1021
+ uncertainties is also a major inhibitor of efficient parameter inference.
1022
+ In this paper, we investigate the impact of analytically marginalizing
1023
+ over the uncertainties in the redshift distribution of galaxies in weak
1024
+ lensing surveys, as initially proposed in Hadzhiyska et al. (2020).
1025
+ In particular, we thoroughly quantify the validity of this approach
1026
+ for a current weak lensing survey, DES, as well as for a futuristic
1027
+ LSST-like survey, testing whether a fast analytic method proposed
1028
+ in this work is capable of reproducing the posterior distributions and
1029
+ constraints one arrives at when adopting the traditional method of
1030
+ diligently varying tens or hundreds of nuisance parameters.
1031
+ Our results show that, for present surveys, marginalizing over the
1032
+ uncertainty in the redshift distribution of galaxies has only a mild
1033
+ impact on the constraints on cosmological parameters, although one
1034
+ that our analytical approximation is able to reproduce accurately. This
1035
+ is true for the two parametrisations of the uncertainties considered
1036
+ in this work, in terms of mean redshift shifts or redshift distribution
1037
+ histogram heights. However, the impact of redshift distribution un-
1038
+ certainties changes dramatically for future LSST-like surveys. In this
1039
+ case, redshift uncertainties commensurate with current calibration
1040
+ samples lead to an degradation in the final constraints on cosmo-
1041
+ logical parameters of up to a factor ∼ 2. Capturing this effect for
1042
+ an arbitrarily complex parametrisation of the redshift distribution
1043
+ uncertainties is an a priori difficult task without resorting to a full
1044
+ exploration of the parameter space. Nevertheless, we find that the
1045
+ analytical approximate scheme explored here is still able to recover
1046
+ the marginalised constraints on cosmological parameters to high
1047
+ fidelity, even after marginalising over more than 100 nuisance pa-
1048
+ MNRAS 000, 1–11 (2022)
1049
+
1050
+ Analytical marginalisation over photo-𝑧 uncertainties
1051
+ 9
1052
+ 0.30 0.35
1053
+ m
1054
+ 0.82
1055
+ 0.83
1056
+ 0.84
1057
+ 0.85
1058
+ S8
1059
+ 0.75
1060
+ 0.80
1061
+ 0.85
1062
+ 0.90
1063
+ 8
1064
+ 0.6
1065
+ 0.7
1066
+ 0.8
1067
+ 0.9
1068
+ h
1069
+ 0.95
1070
+ 1.00
1071
+ ns
1072
+ 0.025
1073
+ 0.050
1074
+ 0.075
1075
+ b
1076
+ 0.04 0.06
1077
+ b
1078
+ 0.95
1079
+ 1.00
1080
+ ns
1081
+ 0.6 0.7 0.8 0.9
1082
+ h
1083
+ 0.74 0.80 0.86
1084
+ 8
1085
+ 0.82
1086
+ 0.84
1087
+ S8
1088
+ z - Numerical marg. - LSST
1089
+ p (z) - Numerical marg. - LSST
1090
+ Figure 7. Comparison between the obtained marginalised posterior distributions of the cosmological parameters when numerically marginalizing over the Δ𝑧
1091
+ (black dash-dotted) and 𝑝𝛼 (𝑧) (orange) photometric uncertainties models when applied to LSST-like futuristic data. We can observe that both prametrizations
1092
+ of the photometric redshift uncertainties return identical posteriors for the cosmological parameters.
1093
+ rameters. This means that, while future surveys will certainly have
1094
+ to account for these uncertainties, they will be able to do so using
1095
+ fast marginalisation methods without increasing the dimensionality
1096
+ of their astrophysical and cosmological models.
1097
+ Our results have also shown that simple parametrisations of the
1098
+ redshift distribution for cosmic shear samples, in terms of shifts in
1099
+ the mean redshift, are, surprisingly, able to reproduce the impact of
1100
+ the full uncertainty on 𝑝(𝑧) on the final constraints to high precision.
1101
+ Although this result will likely not hold for other probes (e.g. tomo-
1102
+ graphic galaxy clustering), it should certainly simplify the analysis
1103
+ of future cosmic shear data.
1104
+ It is worth emphasizing that our work has focused exclusively on
1105
+ the case of cosmic shear data, and that our conclusions only apply in
1106
+ this context. The validity of the analytical approximation employed
1107
+ here for general tomographic tracers of structure with uncertain ra-
1108
+ dial kernels is not guaranteed, and future work should quantify its
1109
+ performance on photometric clustering data – the other key probe
1110
+ of the flagship “3×2pt” analysis of imaging surveys – and its cross
1111
+ correlation with cosmic shear and CMB lensing data (Heymans et al.
1112
+ 2021; Abbott et al. 2022; García-García et al. 2021; White et al.
1113
+ 2022).
1114
+ MNRAS 000, 1–11 (2022)
1115
+
1116
+ 10
1117
+ Ruiz-Zapatero et al.
1118
+ ACKNOWLEDGEMENTS
1119
+ We would like to thank Aně Slosar and Marius Millea for useful dis-
1120
+ cussions. DA is supported by the Science and Technology Facilities
1121
+ Council through an Ernest Rutherford Fellowship, grant reference
1122
+ ST/P004474. PGF, CGG and AM are supported by European Re-
1123
+ search Council Grant No: 693024 and the Beecroft Trust. JRZ is
1124
+ supported by an STFC doctoral studentship. We made extensive use
1125
+ of computational resources at the University of Oxford Department
1126
+ of Physics, funded by the John Fell Oxford University Press Research
1127
+ Fund.
1128
+ We made extensive use of the numpy (Oliphant 2006; Van Der Walt
1129
+ et al. 2011), scipy (Virtanen et al. 2020), astropy (Astropy Col-
1130
+ laboration et al. 2013, 2018), healpy (Zonca et al. 2019), GetDist
1131
+ Lewis (2019), and matplotlib (Hunter 2007) python packages. We
1132
+ also make use of the Julia packages ForwardDiff.jl (Revels et al.
1133
+ 2016) and Turing.jl (Ge et al. 2018).
1134
+ DATA AVAILABILITY
1135
+ The code developed for this work as well as the derived datasets
1136
+ produced (power spectra and covariances) are available upon request.
1137
+ The catalogues and maps used were made publicly available by the
1138
+ authors of the relevant papers, as described in the text.
1139
+ REFERENCES
1140
+ Abbott T. M. C., et al., 2018a, Phys. Rev. D, 98, 043526
1141
+ Abbott T. M. C., et al., 2018b, ApJS, 239, 18
1142
+ Abbott T. M. C., et al., 2022, Phys. Rev. D, 105, 023520
1143
+ Afshordi N., Loh Y.-S., Strauss M. A., 2004, Phys. Rev. D, 69, 083524
1144
+ Alsing J., Handley W., 2021, MNRAS, 505, L95
1145
+ Astropy Collaboration et al., 2013, A&A, 558, A33
1146
+ Astropy Collaboration et al., 2018, AJ, 156, 123
1147
+ Bartelmann M., Schneider P., 2001, Phys. Rep., 340, 291
1148
+ Betancourt M., 2017, arXiv e-prints, p. arXiv:1701.02434
1149
+ Bonnett C., et al., 2016, Phys. Rev. D, 94, 042005
1150
+ Brown M. L., Taylor A. N., Hambly N. C., Dye S., 2002, MNRAS, 333, 501
1151
+ Chisari N. E., et al., 2019, ApJS, 242, 2
1152
+ Cordero J. P., et al., 2022, MNRAS, 511, 2170
1153
+ Efstathiou G., 2004, MNRAS, 349, 603
1154
+ Ferreira P. G., 2019, ARA&A, 57, 335
1155
+ Foreman-Mackey D., Hogg D. W., Lang D., Goodman J., 2013, PASP, 125,
1156
+ 306
1157
+ García-García C., Ruiz-Zapatero J., Alonso D., Bellini E., Ferreira P. G.,
1158
+ Mueller E.-M., Nicola A., Ruiz-Lapuente P., 2021, J. Cosmology As-
1159
+ tropart. Phys., 2021, 030
1160
+ García-García C., Alonso D., Ferreira P. G., Hadzhiyska B., Nicola A.,
1161
+ Sánchez C., Slosar A., 2023, J. Cosmology Astropart. Phys., 2023, 025
1162
+ Ge H., Xu K., Ghahramani Z., 2018, in International Conference on Ar-
1163
+ tificial Intelligence and Statistics, AISTATS 2018, 9-11 April 2018,
1164
+ Playa Blanca, Lanzarote, Canary Islands, Spain. pp 1682–1690, http:
1165
+ //proceedings.mlr.press/v84/ge18b.html
1166
+ Hadzhiyska B., Alonso D., Nicola A., Slosar A., 2020, J. Cosmology As-
1167
+ tropart. Phys., 2020, 056
1168
+ Hadzhiyska B., et al., 2023, In prep,
1169
+ Hastings W. K., 1970, Biometrika, 57, 97
1170
+ Heymans C., et al., 2021, A&A, 646, A140
1171
+ Hildebrandt H., et al., 2020a, A&A, 633, A69
1172
+ Hildebrandt H., et al., 2020b, A&A, 633, A69
1173
+ Hirata C. M., Seljak U., 2004, Phys. Rev. D, 70, 063526
1174
+ Hoffman M. D., Gelman A., 2011, arXiv e-prints, p. arXiv:1111.4246
1175
+ Hoyle B., et al., 2018, MNRAS, 478, 592
1176
+ Hunter J. D., 2007, Computing in Science & Engineering, 9, 90
1177
+ Kilbinger M., et al., 2017, MNRAS, 472, 2126
1178
+ Koukoufilippas N., Alonso D., Bilicki M., Peacock J. A., 2020, MNRAS,
1179
+ 491, 5464
1180
+ Krause E., Eifler T., 2017, MNRAS, 470, 2100
1181
+ Krause E., et al., 2017, arXiv e-prints, p. arXiv:1706.09359
1182
+ LSST Dark Energy Science Collaboration 2012, arXiv e-prints, p.
1183
+ arXiv:1211.0310
1184
+ Laigle C., et al., 2016, ApJS, 224, 24
1185
+ Lewis A., 2019, arXiv e-prints, p. arXiv:1910.13970
1186
+ Lima M., Cunha C. E., Oyaizu H., Frieman J., Lin H., Sheldon E. S., 2008,
1187
+ MNRAS, 390, 118
1188
+ Limber D. N., 1953, ApJ, 117, 134
1189
+ MacKay D. J. C., 2002, Information Theory, Inference & Learning Al-
1190
+ gorithms. Cambridge University Press, Cambridge University Press,
1191
+ Shaftesbury Road Cambridge, CB2 8BS, United Kingdom
1192
+ Matthews D. J., Newman J. A., 2010, ApJ, 721, 456
1193
+ Metropolis N., Rosenbluth A. W., Rosenbluth M. N., Teller A. H., Teller E.,
1194
+ 1953, J. Chem. Phys., 21, 1087
1195
+ Miyazaki S., et al., 2012, in McLean I. S., Ramsay S. K., Takami H., eds,
1196
+ Vol. 8446, Ground-based and Airborne Instrumentation for Astronomy
1197
+ IV. SPIE, p. 84460Z, doi:10.1117/12.926844, https://doi.org/10.
1198
+ 1117/12.926844
1199
+ Newman J. A., 2008, ApJ, 684, 88
1200
+ Newman E. T., Penrose R., 1966, Journal of Mathematical Physics, 7, 863
1201
+ Nicola A., et al., 2020, J. Cosmology Astropart. Phys., 2020, 044
1202
+ Nicola A., García-García C., Alonso D., Dunkley J., Ferreira P. G., Slosar A.,
1203
+ Spergel D. N., 2021, J. Cosmology Astropart. Phys., 2021, 067
1204
+ Oliphant T. E., 2006, A guide to NumPy. Vol. 1, Trelgol Publishing USA
1205
+ Planck Collaboration et al., 2020, A&A, 641, A6
1206
+ Prat J., et al., 2018, Phys. Rev. D, 98, 042005
1207
+ Revels J., Lubin M., Papamarkou T., 2016, arXiv:1607.07892 [cs.MS]
1208
+ Riess A. G., et al., 2022, ApJ, 934, L7
1209
+ Ruiz-Zapatero J., et al., 2023, In prep,
1210
+ Sánchez C., Bernstein G. M., 2019, MNRAS, 483, 2801
1211
+ Sánchez C., et al., 2022, Phys. Rev. D, 105, 083529
1212
+ Schmidt S. J., Ménard B., Scranton R., Morrison C., McBride C. K., 2013,
1213
+ MNRAS, 431, 3307
1214
+ Schneider M., Knox L., Zhan H., Connolly A., 2006, ApJ, 651, 14
1215
+ Scott D., 2018, arXiv e-prints, p. arXiv:1804.01318
1216
+ Smith R. E., et al., 2003, MNRAS, 341, 1311
1217
+ Spergel D., et al., 2015, arXiv e-prints, p. arXiv:1503.03757
1218
+ Stölzner B., Joachimi B., Korn A., Hildebrandt H., Wright A. H., 2021, A&A,
1219
+ 650, A148
1220
+ Takahashi R., Sato M., Nishimichi T., Taruya A., Oguri M., 2012, ApJ, 761,
1221
+ 152
1222
+ Van Der Walt S., Colbert S. C., Varoquaux G., 2011, Computing in Science
1223
+ & Engineering, 13, 22
1224
+ Virtanen P., et al., 2020, Nature Methods, 17, 261
1225
+ White M., et al., 2022, J. Cosmology Astropart. Phys., 2022, 007
1226
+ Wright A. H., Hildebrandt H., van den Busch J. L., Heymans C., 2020, A&A,
1227
+ 637, A100
1228
+ Zhang T., Rau M. M., Mandelbaum R., Li X., Moews B., 2023, MNRAS,
1229
+ 518, 709
1230
+ Zonca A., Singer L., Lenz D., Reinecke M., Rosset C., Hivon E., Gorski K.,
1231
+ 2019, Journal of Open Source Software, 4, 1298
1232
+ APPENDIX A: STRESS-TESTING THE APPROXIMATION
1233
+ As described in Sect. 2, the approximation used here to analytically
1234
+ marginalise over the redshift calibration parameters assumes a suffi-
1235
+ ciently tight prior on these parameters, such that the dependence of
1236
+ the theory prediction on them can be linearised. Testing whether this
1237
+ assumption might break in a realistic scenario, is therefore essential.
1238
+ This is important in the context of Stage-IV since, even though it is
1239
+ expected that spectroscopic samples and the associated calibration
1240
+ MNRAS 000, 1–11 (2022)
1241
+
1242
+ Analytical marginalisation over photo-𝑧 uncertainties
1243
+ 11
1244
+ 0.3
1245
+ 0.4
1246
+ m
1247
+ 0.80
1248
+ 0.85
1249
+ S8
1250
+ 0.8
1251
+ 0.9
1252
+ 8
1253
+ 0.6
1254
+ 0.7
1255
+ 0.8
1256
+ 0.9
1257
+ h
1258
+ 0.95
1259
+ 1.00
1260
+ ns
1261
+ 0.04
1262
+ 0.06
1263
+ b
1264
+ 0.04
1265
+ 0.06
1266
+ b
1267
+ 0.95 1.00
1268
+ ns
1269
+ 0.6 0.7 0.8 0.9
1270
+ h
1271
+ 0.8
1272
+ 0.9
1273
+ 8
1274
+ 0.80
1275
+ 0.85
1276
+ S8
1277
+ z - Analytical marg. - LSST - 4
1278
+ z - Numerical marg. - LSST- 4
1279
+ Figure A1. Shows a comparison between the obtained marginalised posterior distributions of the cosmological parameters when analytically marginalizing over
1280
+ the Δ𝑧 (black dashed) and when performing the full numerical marginalisation (orange) when analyzing LSST-like data. In both cases the Δ𝑧 prior distributions
1281
+ where made 4 times wider. We can observe that despite significantly broadening the prior distributions the analytical marginalisation returns virtually identical
1282
+ posteriors for the cosmological parameters.
1283
+ techniques will improve over time, the increase in depth that LSST-
1284
+ like surveys will represent may make the calibration of the faintest
1285
+ samples in the survey particularly challenging.
1286
+ To further stress-test our approximate method, we repeat our anal-
1287
+ ysis of the LSST-like futuristic data using the Δ𝑧 model for redshift
1288
+ uncertainties with priors 4 times larger than used in our fiducial
1289
+ analysis (which themselves were based on existing calibration sam-
1290
+ ples). The result of this test is shown in Fig. A1. Reassuringly, the
1291
+ results show that, despite quadrupling the uncertainty in the redshift
1292
+ nuisance parameters, the analytic marginalisation method yields vir-
1293
+ tually the same constraints on the cosmological parameters as the
1294
+ brute-force marginalisation, in spite of the significantly broader pos-
1295
+ terior contours. This implicit validates the approximation that a first-
1296
+ order expansion of the theory data vector with respect to a change
1297
+ in redshift distribution is sufficient over a conservative range of cali-
1298
+ bration priors.
1299
+ This paper has been typeset from a TEX/LATEX file prepared by the author.
1300
+ MNRAS 000, 1–11 (2022)
1301
+
-tFLT4oBgHgl3EQfDC7x/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -9125,3 +9125,77 @@ B9AyT4oBgHgl3EQfePhg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
9125
  8dE3T4oBgHgl3EQfRwni/content/2301.04426v1.pdf filter=lfs diff=lfs merge=lfs -text
9126
  a9AzT4oBgHgl3EQf2v6K/content/2301.01819v1.pdf filter=lfs diff=lfs merge=lfs -text
9127
  8dE3T4oBgHgl3EQfRwni/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
9125
  8dE3T4oBgHgl3EQfRwni/content/2301.04426v1.pdf filter=lfs diff=lfs merge=lfs -text
9126
  a9AzT4oBgHgl3EQf2v6K/content/2301.01819v1.pdf filter=lfs diff=lfs merge=lfs -text
9127
  8dE3T4oBgHgl3EQfRwni/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9128
+ 0NFQT4oBgHgl3EQfDTUM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9129
+ qtFQT4oBgHgl3EQftTaK/content/2301.13391v1.pdf filter=lfs diff=lfs merge=lfs -text
9130
+ edAyT4oBgHgl3EQfw_kw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9131
+ mtA0T4oBgHgl3EQfJf_Z/content/2301.02092v1.pdf filter=lfs diff=lfs merge=lfs -text
9132
+ CNE1T4oBgHgl3EQf9wYh/content/2301.03559v1.pdf filter=lfs diff=lfs merge=lfs -text
9133
+ rdFKT4oBgHgl3EQf0i6X/content/2301.11916v1.pdf filter=lfs diff=lfs merge=lfs -text
9134
+ AtE0T4oBgHgl3EQfPgDv/content/2301.02181v1.pdf filter=lfs diff=lfs merge=lfs -text
9135
+ 6NE1T4oBgHgl3EQfBQJe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9136
+ RdE0T4oBgHgl3EQfkgGS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9137
+ qNFST4oBgHgl3EQfOTiK/content/2301.13751v1.pdf filter=lfs diff=lfs merge=lfs -text
9138
+ tNE2T4oBgHgl3EQf1wiA/content/2301.04154v1.pdf filter=lfs diff=lfs merge=lfs -text
9139
+ a9FST4oBgHgl3EQfCDgc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9140
+ _dE1T4oBgHgl3EQfogTY/content/2301.03322v1.pdf filter=lfs diff=lfs merge=lfs -text
9141
+ AtE0T4oBgHgl3EQfPgDv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9142
+ TtE0T4oBgHgl3EQfVAA3/content/2301.02257v1.pdf filter=lfs diff=lfs merge=lfs -text
9143
+ qNFST4oBgHgl3EQfOTiK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9144
+ 2NE2T4oBgHgl3EQfNgYt/content/2301.03737v1.pdf filter=lfs diff=lfs merge=lfs -text
9145
+ BdE1T4oBgHgl3EQfVgTd/content/2301.03104v1.pdf filter=lfs diff=lfs merge=lfs -text
9146
+ i9FAT4oBgHgl3EQfaB2u/content/2301.08549v1.pdf filter=lfs diff=lfs merge=lfs -text
9147
+ I9E0T4oBgHgl3EQfiAGs/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9148
+ z9FRT4oBgHgl3EQfkDeO/content/2301.13594v1.pdf filter=lfs diff=lfs merge=lfs -text
9149
+ GNE3T4oBgHgl3EQfWAqd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9150
+ BdE3T4oBgHgl3EQfUAoU/content/2301.04446v1.pdf filter=lfs diff=lfs merge=lfs -text
9151
+ 5dFKT4oBgHgl3EQfSi3T/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9152
+ f9E0T4oBgHgl3EQfXQDJ/content/2301.02291v1.pdf filter=lfs diff=lfs merge=lfs -text
9153
+ a9AzT4oBgHgl3EQf2v6K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9154
+ R9FRT4oBgHgl3EQf8jhZ/content/2301.13684v1.pdf filter=lfs diff=lfs merge=lfs -text
9155
+ I9E0T4oBgHgl3EQfiAGs/content/2301.02440v1.pdf filter=lfs diff=lfs merge=lfs -text
9156
+ CNE1T4oBgHgl3EQf9wYh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9157
+ hNA0T4oBgHgl3EQfH__c/content/2301.02070v1.pdf filter=lfs diff=lfs merge=lfs -text
9158
+ u9FPT4oBgHgl3EQfNzRd/content/2301.13031v1.pdf filter=lfs diff=lfs merge=lfs -text
9159
+ CNE5T4oBgHgl3EQfTg-d/content/2301.05537v1.pdf filter=lfs diff=lfs merge=lfs -text
9160
+ WNFPT4oBgHgl3EQfqzXF/content/2301.13143v1.pdf filter=lfs diff=lfs merge=lfs -text
9161
+ GNE3T4oBgHgl3EQftgtb/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9162
+ z9FRT4oBgHgl3EQfkDeO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9163
+ BdE3T4oBgHgl3EQfUAoU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9164
+ u9FPT4oBgHgl3EQfNzRd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9165
+ WNFPT4oBgHgl3EQfqzXF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9166
+ OtFRT4oBgHgl3EQf5Dhx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9167
+ CNE5T4oBgHgl3EQfTg-d/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9168
+ R9FRT4oBgHgl3EQf8jhZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9169
+ 2dAzT4oBgHgl3EQfRvud/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9170
+ odE5T4oBgHgl3EQfkA-1/content/2301.05660v1.pdf filter=lfs diff=lfs merge=lfs -text
9171
+ AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf filter=lfs diff=lfs merge=lfs -text
9172
+ 6NE1T4oBgHgl3EQfBQJe/content/2301.02849v1.pdf filter=lfs diff=lfs merge=lfs -text
9173
+ c9FST4oBgHgl3EQfEDj7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9174
+ -tAzT4oBgHgl3EQfSvv8/content/2301.01239v1.pdf filter=lfs diff=lfs merge=lfs -text
9175
+ ztAyT4oBgHgl3EQfn_j3/content/2301.00501v1.pdf filter=lfs diff=lfs merge=lfs -text
9176
+ GdA0T4oBgHgl3EQfBf_u/content/2301.01978v1.pdf filter=lfs diff=lfs merge=lfs -text
9177
+ 99FLT4oBgHgl3EQfCS7y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9178
+ sNFIT4oBgHgl3EQfyiuq/content/2301.11361v1.pdf filter=lfs diff=lfs merge=lfs -text
9179
+ AtE4T4oBgHgl3EQf5A4w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9180
+ qtFQT4oBgHgl3EQftTaK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9181
+ _tE5T4oBgHgl3EQfSQ5r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9182
+ odE5T4oBgHgl3EQfkA-1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9183
+ rdFKT4oBgHgl3EQf0i6X/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9184
+ 29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf filter=lfs diff=lfs merge=lfs -text
9185
+ D9E0T4oBgHgl3EQfQgCE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9186
+ LtFRT4oBgHgl3EQfFDdF/content/2301.13478v1.pdf filter=lfs diff=lfs merge=lfs -text
9187
+ ONFJT4oBgHgl3EQfHix_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9188
+ DtAzT4oBgHgl3EQfwv4v/content/2301.01726v1.pdf filter=lfs diff=lfs merge=lfs -text
9189
+ DNE2T4oBgHgl3EQf9Qm6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9190
+ GNE3T4oBgHgl3EQftgtb/content/2301.04676v1.pdf filter=lfs diff=lfs merge=lfs -text
9191
+ cdAzT4oBgHgl3EQf3P4R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9192
+ OtE4T4oBgHgl3EQfkA1f/content/2301.05147v1.pdf filter=lfs diff=lfs merge=lfs -text
9193
+ UNE5T4oBgHgl3EQfbQ8x/content/2301.05594v1.pdf filter=lfs diff=lfs merge=lfs -text
9194
+ GNAyT4oBgHgl3EQfrfkX/content/2301.00560v1.pdf filter=lfs diff=lfs merge=lfs -text
9195
+ jNFKT4oBgHgl3EQfBC3b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9196
+ LtE0T4oBgHgl3EQfiwHh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9197
+ jNFKT4oBgHgl3EQfBC3b/content/2301.11702v1.pdf filter=lfs diff=lfs merge=lfs -text
9198
+ ONFJT4oBgHgl3EQfHix_/content/2301.11452v1.pdf filter=lfs diff=lfs merge=lfs -text
9199
+ K9E1T4oBgHgl3EQfswUE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
9200
+ zdAyT4oBgHgl3EQfO_bl/content/2301.00018v1.pdf filter=lfs diff=lfs merge=lfs -text
9201
+ ytFQT4oBgHgl3EQfBjWV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
09E2T4oBgHgl3EQf5AgM/content/tmp_files/2301.04185v1.pdf.txt ADDED
@@ -0,0 +1,931 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Synthesis and processing of lithium-loaded plastic
2
+ scintillators on the kilogram scale
3
+ Michael J. Forda*, Elisabeth Aigeldingera, Felicia Sutantoa, Natalia P. Zaitsevaa,
4
+ Viacheslav A. Lia, M. Leslie Carmana, Andrew Glenna, Cristian R. Catalaa, Steven A.
5
+ Dazeleya, Nathaniel Bowdena*1
6
+
7
+ aLawrence Livermore National Laboratory
8
+ 7000 East Avenue, Livermore, CA 94550
9
+
10
+ Abstract
11
+ Plastic scintillators that can discriminate between gamma rays, fast neutrons, and
12
+ thermal neutrons were synthesized and characterized while considering the balance
13
+ between processing and performance at the kilogram scale. These trade-offs were
14
+ necessitated by the inclusion of 0.1 wt. % lithium-6 to enable detection of thermal
15
+ neutrons. The synthesis and processing of these plastic scintillators on the kilogram
16
+ scale required consideration of many factors. First, a comonomer (methacrylic acid)
17
+ was used to solubilize salts of lithium-6, which allow for a thermal-neutron capture
18
+ reaction that produces scintillation light following energy transfer. Second, scintillation
19
+ performance and processability were considered because the increasing content of the
20
+ comonomer resulted in a sharp decrease in the light output. The use of small amounts
21
+ of comonomer (≤3 wt. %) resulted in better performance but required high processing
22
+ temperatures. At large scales, these high temperatures could initiate an exothermic
23
+ polymerization that results in premature curing and/or defects. The deleterious effects
24
+ of the comonomer may be mitigated by using m-terphenyl as a primary dye rather than
25
+ 2,5-diphenyloxazole (PPO), which has been traditionally used in organic scintillators.
26
+ Finally, the curing environment was controlled to avoid defects like cracking and
27
+ discoloration while maintaining solubility of dopants during curing. For scintillators
28
+ that were produced from kilogram-scale batches of precursors, the effective attenuation
29
+ of scintillation light was characterized.
30
+
31
+ * This is to indicate the corresponding author.
32
33
+
34
+
35
+ Keywords: pulse-shape discrimination, plastic scintillators, inverse beta decay, neutron
36
+ detection, large-scale detectors
37
+
38
+ 1. Introduction
39
+ The rising cost of fossil fuels and concerns about greenhouse gas emissions
40
+ motivate a revival of nuclear power generation.[1] However, the expansion of nuclear
41
+ power throughout the world and the construction of novel reactor types may challenge
42
+ the resources available for implementing conventional safeguards. Direct and
43
+ nonintrusive measurements of reactor operation using offer one approach to address
44
+ this concern.
45
+ These measurements can be facilitated by the development of novel detectors
46
+ to enable near-field (ca. 10-100 m) monitoring of antineutrinos produced by a
47
+ reactor.[2–10] Previous reports highlight the ability of organic scintillators to monitor
48
+ this antineutrino flux. For example, the Precision Reactor Oscillation and Spectrum
49
+ Experiment (PROSPECT)[11] recently demonstrated the measurement of the
50
+ antineutrino spectrum from 235U at the High Flux Isotope Reactor at Oak Ridge
51
+ National Laboratory. Like in many experiments that use organic scintillators to monitor
52
+ antineutrino flux, PROSPECT utilized about 4 tons of a liquid scintillator loaded with
53
+ a neutron capture agent (6Li in this case), which can detect signatures of inverse beta
54
+ decay. In this experiment, the scintillation light is associated with signatures of inverse
55
+ beta decay using a measurement scheme called pulse-shape discrimination (PSD).[12]
56
+ After monitoring a scintillation pulse over time, a prompt signal of scintillation light
57
+ can be associated with the antineutrino energy, and the delayed signal of scintillation
58
+ light can be associated with neutron capture by 6Li. Detectors like PROSPECT contain
59
+ scintillator with this capability of PSD, making them useful for uniquely identifying
60
+ capture reactions and rejecting fast-neutron background events.
61
+ For continued development of novel detectors, the phase of the detector
62
+ material as it relates to the mobility of the detector may be considered. Liquid
63
+ scintillators are relatively inexpensive, are easy to manufacture, and have good
64
+
65
+ performance. However, liquid scintillators may require consideration of potential
66
+ hazards (e.g., flammability), handling, and storage when used in mobile detectors.
67
+ Conversely, plastic scintillators are less hazardous than liquid scintillators since they
68
+ are in the solid state, and plastic scintillators are self-supporting, which is useful for
69
+ mobility. However, plastic scintillators have not been widely available as materials
70
+ capable of PSD until recently[13,14]. Additionally, the PSD performance of plastic
71
+ scintillators worsens as the length of the scintillator increases due to light attenuation;
72
+ this attenuation is detrimental to the performance of large-volume (ton-scale)
73
+ detectors.[15] Thus, a mobile detector may require further consideration of these trade-
74
+ offs and further development of detector materials like plastic scintillators.
75
+ One development that is important for plastic scintillators is the capability of
76
+ these materials to discriminate between gamma rays, fast neutrons, and thermal
77
+ neutrons (Figure 1a). This capability necessitates the inclusion of a neutron capture
78
+ agent like 155Gd, 157Gd, 10B, or 6Li, and various reports describe attempts to incorporate
79
+ neutron capture agents into plastic scintillators. In particular, the doping of scintillators
80
+ with 6Li may be preferable since the 6Li(n,t) capture reaction produces a localized,
81
+ mono-energetic energy deposition that can be efficiently identified via PSD and energy
82
+ selections.[16,17]
83
+ Carboxylate salts of 6Li have been previously used to incorporate 6Li into
84
+ plastic scintillators while obtaining materials that are transparent. In one example, a 6Li
85
+ salt of methacrylic acid (MAA) was copolymerized with styrene. The 6Li salt of MAA
86
+ was not soluble in the plastic scintillator precursors at appreciable amounts; additional
87
+ MAA was needed to dissolve the 6Li salt of MAA and increase the 6Li content. This
88
+ necessity of additional MAA highlights how solubility of the polar 6Li compounds in
89
+ the nonpolar matrix must be considered to produce plastic scintillators. Despite the need
90
+ for additional MAA, these scintillators were promising for thermal-neutron detection.
91
+ At a small scale (≈ 1 cm), the plastic scintillator was responsive to an incident beam of
92
+ thermal neutrons from a research reactor.[18] However, the optical attenuation
93
+ properties were not assessed for this material but become important for large-volume
94
+ detectors, where the longest side of a single scintillator may be on the order of 10-100
95
+ cm.
96
+
97
+ Other developments of these scintillators that contain 6Li focused on
98
+ exploration of additional carboxylates.[19–22] One report described an investigation of
99
+ 16 different 6Li salts. These 6Li salts were dissolved in a comonomer mixture of styrene
100
+ and methacrylic acid (90:10 styrene:MAA) to determine the maximum solubility of 6Li
101
+ at 60 oC. Additional 6Li could be dissolved as the MAA content increased, but the
102
+ scintillation light output and figure of merit (FoM) for PSD decreased as MAA and 6Li
103
+ content increased.[22] Thus, improvements in scintillation performance should
104
+ consider the balance between processing and performance. This consideration is
105
+ especially important in large plastic scintillators where thermal runaway[23] becomes
106
+ a concern for processing, and attenuation becomes a concern for performance.
107
+ In this report, we describe the synthesis and processing of lithium-loaded
108
+ plastic scintillators on the kilogram scale. We considered aspects related to the
109
+ composition of the plastic scintillator like the primary dye, secondary dye, monomers,
110
+ and lithium salts (Figure 1b) as well as aspects related to processing and curing like
111
+ dissolution and temperature of cure (Figure 1c). We first synthesized various 6Li salts
112
+ and characterized their solubility at different temperatures and with various
113
+ concentrations of comonomers. Then, we considered trade-offs in processing and
114
+ performance at the 10 g scale by evaluating the scintillation performance upon addition
115
+ of comonomer and 6Li salt in plastic scintillators that contained 2,5-diphenyloxazole
116
+ (PPO) as the primary dye. The light output of scintillation was reduced as the content
117
+ of the comonomer MAA increased in these scintillators.
118
+ We then compared the performance of plastic scintillators that contain PPO
119
+ vs. m-terphenyl (mTP) as the primary dye. The performance of plastic scintillators that
120
+ contain mTP as the primary dye is less sensitive to the addition of MAA. When scaling
121
+ our synthesis to 1 kg (Figure 1d), we targeted compositions that were available at scale
122
+ and allowed for lower temperatures of processing to avoid thermally initiated
123
+ polymerization and thermal runaway. All of these measures considered the potential for
124
+ production of large-scale plastic scintillators, which will be useful for applications like
125
+ mobile antineutrino detectors.
126
+
127
+
128
+ 2. Materials and methods
129
+ Styrene (99%, Sigma), vinyl toluene (99%, Sigma), divinyl benzene (Sigma,
130
+ technical grade), and methyl methacrylate (99%, VWR) were passed through an
131
+ alumina column to remove inhibitor. Methacrylic acid (99%, Sigma) was dried over
132
+ sodium chloride and distilled under vacuum to remove inhibitor. All monomers were
133
+ sparged with nitrogen for > 30 min before being stored in a nitrogen-filled glovebox.
134
+ Figure 1. a) Plastic scintillators that are capable of PSD and contain lithium-6 distinguish between gamma rays, fast
135
+ neutrons, and thermal neutrons, as shown in this PSD plot. The gradient scale bar represents a relative population of data
136
+ points. b) The synthesis of plastic scintillators requires consideration of many components, as shown in this schematic.
137
+ The chemical structures, starting from the bottom left and going clockwise, are those of m-terphenyl, 2,5-diphenyloxazole,
138
+ Exalite 404, styrene, methacrylic acid, divinylbenzene, and three 6Li salts of carboxylic acids. c) The processing of the
139
+ precursors requires control of dissolution and curing conditions. d) Control of synthesis and processing has enabled the
140
+ production of large plastic scintillators, scaling to rectangular prisms like the ones in this photograph. The large
141
+ scintillators are about 0.41 m in length (total mass of about 1.5 kg).
142
+
143
+
144
+ 0.8
145
+ .0
146
+ 0.0
147
+ 0.5
148
+ 0.8
149
+ Thermal neutrons
150
+ 0.7
151
+ Fas, neurone
152
+ 0.3
153
+ 0.4
154
+ Gamma raye
155
+ 0.2
156
+ 0.2
157
+ 0.1
158
+ 100 200
159
+ 300
160
+ 4010
161
+ Approt, enengy
162
+ e!All monomers except methacrylic acid were stored in an inert atmosphere at −20 oC.
163
+ Methacrylic acid was stored at room temperature. m-terphenyl (mTP, Smolecule) was
164
+ purified by recrystallization from toluene. L-231 (Luperox, 1,1-di(t-butylperoxy)-3,3,5-
165
+ trimethylcyclohexane) was used as a radical initiator after sparging for > 30 min with
166
+ dry nitrogen and kept at −20 °C until needed. 2,5-diphenyloxazole (PPO, scintillation
167
+ grade from Sigma), 1,4-bis(2-methylstyryl)benzene (bisMSB, Luxottica/Exciton), and
168
+ 1,4-bis(9,9-diethyl-7-(tert-pentyl)-9H-fluoren-2-yl)benzene (E404, Luxottica/Exciton)
169
+ were used as received without further purification.
170
+ 6Li carboxylate salts were synthesized by first suspending 6Li2CO3 (National
171
+ Isotope Development Center) in a 1:1 mixture of water (deionized) and methanol
172
+ (99.8%, Sigma). Excess carboxylic acid (1.02 equivalent excess) was mixed into a 1:1
173
+ mixture of water and methanol. The basic suspension was slowly added to the acid
174
+ solution, and this mixture was heated to reflux for > 4 hours. The solution was filtered,
175
+ and the 6Li salt was precipitated by adding excess volume of cold acetone. The 6Li salt
176
+ was collected by vacuum filtration and washed with acetone, followed by drying under
177
+ vacuum at 80 oC. This procedure was used for carboxylate salts of pentanoic acid,
178
+ hexanoic acid, octanoic acid, 2-methylpropanoic acid, 2-methylbutanoic acid, 3-
179
+ methylbutanoic acid, and 2-ethylhexanoic acid. All acids were purchased from Sigma
180
+ or VWR and used as received.
181
+ Plastics were synthesized in a dry nitrogen environment. For initial evaluation,
182
+ plastics were synthesized using 10 g of precursor materials. For the production of large
183
+ plastic scintillators, the amount of precursors used was up to 2.7 kg. All materials that
184
+ were not stored in a dry nitrogen environment were dried under vacuum. 6Li salts were
185
+ easiest to process when they were first dissolved in a 1:1 mixture by weight of
186
+ styrene:MAA at elevated temperatures (about 60-80 oC) before adding the remainder
187
+ of the plastic composition. A typical synthesis would involve dissolving the primary
188
+ dye (e.g., PPO) and the secondary dye (e.g., bis-MSB or E404) in styrene or vinyl
189
+ toluene (VT). The monomer VT was used as the polymer matrix for plastics that used
190
+ mTP as the primary dye. VT was used for these plastics as we observed less consistency
191
+ in solubility for mTP-based plastics that used styrene. The performance of plastic
192
+ scintillators that used styrene and VT were compared, and we observed no meaningful
193
+
194
+ difference in performance for these plastics. This precursor solution was heated to about
195
+ 60-80 oC and mixed with a solution of the 6Li salt in 1:1 mixture by weight of
196
+ styrene:MAA. DVB (typically 5 wt. %) and initiator (0.08 wt. % for 10 g plastics; 0.01
197
+ wt. % for plastics batches greater than 400 g) were added. This mixture that contains
198
+ the precursor solution mentioned earlier and the solution that contains 6Li was poured
199
+ into a mould and sealed. The mould was placed in a nitrogen-filled oven and cured at
200
+ elevated temperatures. In one experiment, the viscosity of the precursor solution was
201
+ monitored using a rotary viscometer (Brookfield DV2T).
202
+ A typical curing profile would consist of heating for 7 days at 60 oC, followed
203
+ by a temperature ramp to 75 oC over one day. The scintillators were cured in convection
204
+ ovens (Cascade TEK) that were fitted with gas lines. Dry nitrogen flowed into solvent-
205
+ resistance plastic bags that contained the mould inside the oven. The bags maintained
206
+ a positive pressure of nitrogen. The plastic would stay at 75 oC for four days and then
207
+ cool to room temperature over the course of one day. Following curing, the scintillators
208
+ were removed from the moulds, then machined and polished. All photographs of
209
+ samples were taken using a Nikon D750 and were globally edited in Adobe Lightroom
210
+ for colour and exposure corrections.
211
+ For initial scintillator characterization, samples of mass equal to 10 g were
212
+ measured. The outer edge and one face of the scintillators were wrapped and covered
213
+ with Teflon tape. The exposed face was coupled with optical grease to a Hamamatsu
214
+ R6231-100-SEL photomultiplier tube (PMT). Signals from the PMT were recorded at
215
+ a sampling rate of 200 MS/s using a 14-bit CompuScope 14200 waveform digitizer. A
216
+ relative quantification of light output (LO) was measured using ionizing radiation from
217
+ 137Cs incident upon the plastic scintillator. The values of LO that we report in this
218
+ manuscript are specific to our measurement system and thus should only be used for
219
+ relative comparison. We normalized the value of LO to measurements of the
220
+ commercial scintillator EJ-200. The location of 500 keVee was defined by the value of
221
+ the pulse integral at 50% of the height of the 137Cs Compton edge. For many
222
+ measurements, duplicate samples were synthesized, and averages are reported. For one
223
+ condition, 9 samples were replicated in multiple batches and were measured. The
224
+ standard deviation of these measurements was within 7% of the average value, which
225
+
226
+ could be representative of the standard deviation related to contributions from
227
+ measurement and synthesis. Where standard deviation is not reported, a conservative
228
+ value of 10% of the value given could be assumed.
229
+ The measurement of effective attenuation length was performed with a longer
230
+ scintillator bar (1″ x 1″ x 16″). This measurement employed a setup that was identical
231
+ to the setup used to characterize scintillator bars in an antineutrino detector called
232
+ SANDD (Segmented AntiNeutrino Directional Detector).[24] This bar was wrapped
233
+ with polytetrafluoroethylene tape (POLY-TEMP PN-16050), and a pair of 1"
234
+ Hamamatsu R1924A-100 PMTs were mounted at either end of the scintillator bar using
235
+ EJ-550 silicone optical grease. The PMT operating voltage was set at -1100 V, and
236
+ signals were digitized using a Struck SIS3316 digitizer module (250 MS/s, 14 bit, 5 V
237
+ dynamic range). The energy threshold was set at approximately 0.1 MeVee, and 1600
238
+ ns-long waveforms were sent to disk and stored in ROOT data format. The charge
239
+ response difference between the two PMTs due to gain and optical coupling variation
240
+ was corrected using a collimated 137Cs gamma-ray source directed at the center of the
241
+ plastic bar. Here, lead bricks were used for shaping the gamma-ray source into a fan
242
+ beam of about 0.5 cm width.
243
+ To obtain the effective attenuation length of the scintillator bar, we performed
244
+ a series of collimated 22Na measurements at regular intervals along the length of the
245
+ bar. In each measurement, we identified the location of the Compton continuum
246
+ maximum of the 1.275 MeV gamma-ray by fitting the energy response with a Gaussian
247
+ profile while varying the range of the fit to find the minimum χ2 (best fit). The Compton
248
+ continuum maximum position was identified as the mean of the Gaussian profile that
249
+ yielded the minimum χ2. The associated uncertainty was estimated by varying the range
250
+ of the fit until the χ2 value exceeded the 68% confidence level (CL) of the minimum χ2;
251
+ the uncertainty was the corresponding range of the mean of the Gaussian profile.
252
+ To measure PSD in smaller plastics, plastic scintillators were exposed to a
253
+ 252Cf source. The source was shielded behind 5.1 cm of lead to reduce the gamma-ray
254
+ flux. To obtain a flux of thermal neutrons, high density polyethylene was also used as
255
+ a moderator for 252Cf. The measurements of scintillation from plastic scintillators
256
+
257
+ exposed to 252Cf were integrated over time to determine the total charge (Qtotal). The
258
+ charge of the delayed component of the signal (Qtail) was determined from a delayed
259
+ fraction of the scintillation pulse. Scintillation pulses due to interactions of the
260
+ scintillator with neutrons have a larger fraction of Qtail relative to Qtotal; therefore, a
261
+ comparison of Qtail relative to Qtotal can be used to distinguish between scintillation due
262
+ to neutrons vs. gamma rays. The PSD was quantified using a figure of merit (FoM) that
263
+ is determined from histograms of the ratio of the charge of the delayed component
264
+ relative to the total charge, as described in previous reports[15,25]. Briefly, the FoM is:
265
+ 𝐹𝑜𝑀 =
266
+ 〈𝑛,𝑡〉−〈𝛾〉
267
+ 𝐹𝑊𝐻𝑀𝑛,𝑡+𝐹𝑊𝐻𝑀𝛾
268
+
269
+
270
+ (2)
271
+ In this equation, 〈n,t〉-〈γ〉 represents the difference between the average value of the
272
+ neutron and gamma-ray signals, and FWHMn,t +FWHMγ represents the sum of the full-
273
+ width at half of the maximum value of the distributions of the thermal-neutron and
274
+ gamma-ray signals at the electron-equivalent energy of the thermal-neutron spot. For
275
+ plastics that don’t contain 6Li, the same equation was used for FoM, but the position
276
+ and FWHM of the neutron peak is used at an electron-equivalent energy near the 137Cs
277
+ Compton edge.
278
+ For PSD of the larger scintillator bar (1″ × 1″ × 16″), an identical setup as the
279
+ measurement of effective attenuation length was used. The bar was irradiated with an
280
+ uncollimated 252Cf source, and lead bricks with a total thickness of 6″ were placed
281
+ between the detector and the 252Cf source to reduce the gamma-ray flux. The charge
282
+ integration limits were optimized, and the best parameters were found to be [tL-20 ns ≤
283
+ Qtotal ≤ tL+1300 ns] and [tL+24 ns ≤ Qtail ≤ tL+1300 ns], where tL is the leading edge of
284
+ the waveform. Assuming light transport behaves exponentially along the length of the
285
+ scintillator bar, we can eliminate the dependence of energy on event position by
286
+ reconstructing the energy as 𝐸 = √𝐸𝐴𝐸𝐵 , where EA and EB are the charges collected
287
+ by the two PMTs.
288
+
289
+ 3. Results and discussion
290
+ 3a. Selection of lithium-6 salt based on solubility at moderate
291
+ temperatures
292
+
293
+ To make large-scale production of plastic scintillators easier, our selection of
294
+ materials focused on those materials that had simple processing requirements (e.g.,
295
+ temperatures below 80 oC). This requirement is necessary since high processing
296
+ temperatures for large plastic scintillators could thermally initiate the polymerization.
297
+ After dissolution of all dopants, we monitored the viscosity over time of liquid
298
+ precursors with and without the crosslinker divinylbenzene (DVB) at a temperature of
299
+ 50 oC (Figure 2). The liquid precursors did not contain a radical initiator that initiates
300
+ polymerization; thus, any increase in viscosity is due to thermally initiated
301
+ polymerization. For precursor liquids that contained DVB, the viscosity began to
302
+ increase to measurable values above 0.1 Pa s after about 15600 s (4.3 hours) at 50 oC.
303
+ The viscosity further increased, reaching values greater than 40 Pa s after about 37400
304
+ s (10.4 hours) at 50 oC. While these timescales may be appropriate to process plastic
305
+ Figure 2. The viscosity of liquid precursors containing 30 wt. % PPO and 0.2 wt. %
306
+ bis-MSB can increase over time as polymerization occurs, and this increase in viscosity
307
+ prevents processing of the liquid into a mould. In this case, precursors with 8 wt. %
308
+ DVB and without DVB are compared while held at a temperature of 50 oC.
309
+
310
+ scintillators with industrial equipment, we observed that complete dissolution of all
311
+ components often required > 12 hours of stirring at elevated temperatures.
312
+ The premature onset of polymerization caused this increase in viscosity, which
313
+ could prevent trapped air bubbles from escaping or even prohibit transfer of the liquid
314
+ precursor to a mould. For precursor liquids that did not contain DVB, the viscosity
315
+ began to increase to measurable values above 0.1 Pa s after about 175000 s (48.6 hours)
316
+ at 50 oC. As before, the viscosity further increased and reached values greater than 40
317
+ Pa s after 275000 s (76.4 hours) 50 oC. Without DVB, the working time of the liquid
318
+ precursors can be increased. Still, the limited working time of these materials highlights
319
+ the need for simple processing requirements like low temperatures.
320
+ Table 1. Summary of solubility tests. Note that some salts that formed a gel phase
321
+ were initially soluble. For solubility tests at 23 oC, the solubility was observed after 20
322
+ hours of mixing. For solubility tests at 65 oC, the solubility was observed after 30
323
+ minutes at 65 oC following 2 hours at 50 oC.
324
+ Acid used for 6Li salt
325
+ Solubility, 23 oC, 85:15 styrene:MAA
326
+ Solubility, 65 oC, 85:15 styrene:MAA
327
+ Pentanoic acid
328
+ Insoluble
329
+ Soluble
330
+ Hexanoic acid
331
+ Insoluble
332
+ Soluble
333
+ Octanoic acid
334
+ Insoluble
335
+ Soluble
336
+ 2-methylpropanoic acid
337
+ Formed gel
338
+ Soluble
339
+ 2-methylbutanoic acid
340
+ Formed gel
341
+ Soluble
342
+ 3-methylbutanoic acid
343
+ Soluble
344
+ Soluble
345
+ 2-ethylhexanoic acid
346
+ Formed gel
347
+ Soluble
348
+
349
+ Another requirement for simple processing relates to the relative solubility of
350
+ the 6Li salts. Thus, we evaluated the solubility of various carboxylate salts of 6Li while
351
+
352
+ considering the need for simple processing requirements. We synthesized 6Li salts of
353
+ pentanoic acid, hexanoic acid, octanoic acid, 2-methylpropanoic acid, 2-
354
+ methylbutanoic acid, 3-methylbutanoic acid, and 2-ethylhexanoic acid (Figure 3a).
355
+ The synthesis and solubility of these salts have been described previously[22], but our
356
+ focus is on solubility for synthesis of large plastics, which requires further
357
+ considerations related to processing that have not been reported. We added the 6Li salts
358
+ to liquid precursors that contained all monomers and dopants. The composition of the
359
+ liquid precursor was as follows: 30 wt. % 2,5-diphenyloxazole (PPO); 0.2 wt. % 1,4-
360
+ bis(2-methylstyryl)benzene (bisMSB); 5 wt. % DVB; an equivalent amount of 6Li salt
361
+ to obtain 0.1 wt. % 6Li; and the remainder was a mixture of 85 wt. % styrene and 15
362
+ wt. % methacrylic acid (MAA). The MAA is necessary to dissolve the 6Li salt; other
363
+ monomers like methyl methacrylate and methyl acrylate do not dissolve the 6Li salt.
364
+ All precursors were mixed into a single vial and allowed to equilibrate for 20
365
+ hours at room temperature (23 oC). Lithium-6 2-methylbutanoate was readily soluble
366
+ in the mixture initially. However, an opaque gel formed within 2 hours and persisted
367
+ after 20 hours (Figure 3b). Lithium-6 2-ethylhexanoate also formed a gel after initial
368
+ dissolution. For lithium-6 2-methylpropanoate, an opaque gel was observed after 20
369
+ hours, but this mixture never fully dissolved, suggesting low solubility of this 6Li salt.
370
+ Similarly, 6Li salts of the linear alkyl carboxylic acids (pentanoic acid, hexanoic acid,
371
+ and octanoic acid) never fully dissolved at 23 oC. For lithium-6 3-methylbutanoate, the
372
+ liquid precursor remained clear after 20 hours at 23 oC.
373
+ The opaque gels that we observed could be destabilized after heating to
374
+ elevated temperatures. All vials were heated to 50 oC for 2 hours, which improved
375
+ dissolution of all components that were insoluble at room temperature. For example,
376
+ the liquids that contained 6Li salts of 2-methylbutanoic acid and 2-ethylhexanoic acid
377
+ became transparent. Further heating to 65 oC for 30 minutes improved dissolution; all
378
+
379
+ liquid precursors with different 6Li salts were transparent after this heating step except
380
+ for the precursor that contained lithium-6 2-methylpropanoate (Figure 3c).
381
+ Based on this analysis, we selected the 6Li salt of 3-methylbutanoic acid for
382
+ the synthesis of large plastics; however, other 6Li salts like lithium-6 pentanoate and
383
+ lithium-6 2-methylbutanoate may also be suitable given that they form transparent
384
+ precursors after dissolution at 65 oC. Furthermore, we sometimes observed the
385
+ formation of a gel phase for precursors that contained lithium-6 3-methylbutanoate
386
+ when using less MAA, which highlights how plastic scintillators that contain this 6Li
387
+ salt are not immune to this processing challenge.
388
+ To avoid the formation of this gel phase, the 6Li salt could be dissolved
389
+ separately from the rest of the dopants. A 1:1 mixture of styrene and MAA was
390
+ sufficient to avoid thermally initiated homopolymerization of MAA during dissolution;
391
+ homopolymerization of MAA results in an opaque material. The remainder of the
392
+ styrene needed to form the final plastic was used to dissolve the primary and secondary
393
+ Figure 3. a) Chemical structures of 6Li salts that were studied; from left to right the structures correspond to
394
+ 6Li salts of pentanoic acid, hexanoic acid, octanoic acid, 2-methylpropanoic acid, 2-methylbutanoic acid, 3-
395
+ methylbutanoic acid, and 2-ethylhexanoic acid. b) Photographs of liquid precursors in vials following
396
+ equilibration for 20 hours at 23 oC. c) Photographs of liquid precursors in vials following equilibration at an
397
+ additional 2 hours at 50 oC plus 30 minutes at 65 oC. All liquid precursors contain all components of a plastic
398
+ scintillator except the radical initiator. The precursors differ in the 6Li salt that was added; from left to right, the
399
+ vials contain 6Li salts of pentanoic acid, hexanoic acid, octanoic acid, 2-methylpropanoic acid, 3-methylbutanoic
400
+ acid, 2-methylbutanoic acid, and 2-ethylhexanoic acid. The vials are 28 mm in diameter.
401
+
402
+ b)23 °C; 85:15 styrene:MAA
403
+ c)65C:85:15styrene:MAAdye in a separate container. Then, the two separate mixtures could be heated to 60-80
404
+ oC and mixed at elevated temperatures before adding DVB and the radical initiator and
405
+ casting in a mould.
406
+ 3b. Effect of comonomer on scintillation performance
407
+ Importantly, the effect of the comonomer that solubilizes the 6Li salts on
408
+ scintillation performance should be evaluated. The addition of non-aromatic
409
+ comonomers like methyl methacrylate (MMA) or methacrylic acid (MAA) can reduce
410
+ scintillation performance.[22,26] When 26 wt. % of MMA was used in a plastic
411
+ scintillator, the light yield reduced by 5% when compared to a plastic scintillator that
412
+ contained only polystyrene as the matrix. When 58 wt. % of MMA was used in a plastic
413
+ scintillator, the light yield reduced by 18%.[26] The total amount of the comonomer
414
+ Figure 4. a) A detrimental effect of MAA and 6Li salts reduce light output (LO) of scintillators that contain PPO
415
+ as a primary dye. 6Li salt may also influence light output. b) The LO decreases as the content of MAA increases,
416
+ which can be observed in the histograms that show the 137Cs Compton edge. c) The photograph of these vials highlights
417
+ the solubility threshold of lithium-6 3-methylbutanoate at 65 oC. The vials are 28 mm in diameter. d) Less substantial
418
+ effect on LO by MAA and 6Li salt for scintillators that contain mTP instead of PPO. The 6Li salt used for all samples
419
+ referenced in this figure was lithium-6 3-methylbutanoate. For a) and b), the average (dashed line) and standard
420
+ deviation (grey shaded region) of scintillators that do not contain any comonomer are shown for reference.
421
+
422
+ 65°C:6LitO
423
+ MAA weight content:
424
+ 6.3%
425
+ 6.9%
426
+ 7.6%
427
+ 8.2%
428
+ 9.5%
429
+ Precipitate still
430
+ presentMAA added for dissolution of 6Li salts is typically less than 20 wt. % of the total
431
+ material, so we instead focused on comonomer addition at these lower concentrations.
432
+ Table 2. Summary of effect of composition on light output.
433
+ Primary dye
434
+ Co-monomer
435
+ Co-monomer content
436
+ Lithium salt content
437
+ Light output
438
+ PPO
439
+ N/A
440
+ 0
441
+ 0
442
+ 1.05
443
+ mTP
444
+ N/A
445
+ 0
446
+ 0
447
+ 1.12
448
+
449
+
450
+
451
+
452
+
453
+ PPO
454
+ MMA
455
+ 0.6
456
+ 0
457
+ 1.03
458
+ PPO
459
+ MMA
460
+ 3
461
+ 0
462
+ 1.07
463
+ PPO
464
+ MMA
465
+ 6
466
+ 0
467
+ 1.05
468
+ PPO
469
+ MMA
470
+ 13
471
+ 0
472
+ 1.09
473
+
474
+
475
+
476
+
477
+
478
+ PPO
479
+ MAA
480
+ 0.6
481
+ 0
482
+ 0.96
483
+ PPO
484
+ MAA
485
+ 2
486
+ 0
487
+ 0.81
488
+ PPO
489
+ MAA
490
+ 3
491
+ 0
492
+ 0.78
493
+ PPO
494
+ MAA
495
+ 5
496
+ 0
497
+ 0.77
498
+ PPO
499
+ MAA
500
+ 6
501
+ 0
502
+ 0.73
503
+ PPO
504
+ MAA
505
+ 13
506
+ 0
507
+ 0.64
508
+
509
+
510
+
511
+
512
+
513
+ PPO
514
+ MAA
515
+ 3
516
+ 1.7
517
+ 0.61
518
+ PPO
519
+ MAA
520
+ 5
521
+ 1.7
522
+ 0.57
523
+ PPO
524
+ MAA
525
+ 6
526
+ 1.7
527
+ 0.56
528
+ PPO
529
+ MAA
530
+ 13
531
+ 1.7
532
+ 0.51
533
+
534
+
535
+
536
+
537
+
538
+ mTP
539
+ MAA
540
+ 3
541
+ 1.7
542
+ 0.93
543
+ mTP
544
+ MAA
545
+ 5
546
+ 1.7
547
+ 0.95
548
+ mTP
549
+ MAA
550
+ 6
551
+ 1.7
552
+ 0.93
553
+ mTP
554
+ MAA
555
+ 13
556
+ 1.7
557
+ 0.92
558
+
559
+ Even though MMA does not solubilize 6Li salts that we studied, we used this
560
+ comonomer as a non-aromatic additive to compare its effect on performance to
561
+ scintillators that contain the solubilizing comonomer, MAA. We also compared the
562
+ performance of plastic scintillators that did not contain any comonomer. The average
563
+ light output (LO) of three separate samples that did not contain any comonomer was
564
+ 1.05 with a standard deviation of 0.07 (Figure 4a, Table 2). With 0.6 wt. % MMA
565
+ added, the LO was 1.03. As the amount of MMA increased, there was no clear trend in
566
+
567
+ the LO. At 13 wt. % MMA, the LO was 1.09, and all measured values of LO were
568
+ within a standard deviation of the average value of plastic scintillators that did not
569
+ contain a comonomer. Thus, at these concentrations of MMA comonomer, the energy
570
+ transfer and light emission do not appear to be affected.
571
+ The same trend did not persist when using MAA. At 0.6 wt. % MAA, the LO
572
+ was 0.96, which corresponds to a 9% reduction in LO when compared to plastic
573
+ scintillators without this comonomer. At 1.6% MAA, the LO was further reduced to
574
+ 0.81, which is a 23% reduction. The LO continues to decrease as MAA content
575
+ increases (Figure 4b, Table 2), but the magnitude of reduction appears to taper as the
576
+ MAA content exceeds 3 wt. %. At 13 wt. % MAA, the LO was reduced to 0.64, which
577
+ corresponds to a 40% reduction. The discrepancy between the effects of MMA and
578
+ MAA on LO indicates that the decrease in LO upon addition of MAA does not result
579
+ from simple dilution by a non-aromatic material. Rather, this decrease in LO suggests
580
+ that MAA may be detrimental to processes that affect scintillation like energy transfer
581
+ or emission. Although the exact mechanism is not fully elucidated, it is possible that
582
+ the heteroatoms on PPO (N, O) may interact with the polar acid functional group on
583
+ MAA.
584
+ Notably, the LO further decreases upon addition of 6Li salts to plastics that
585
+ contain PPO as the primary dye along with MAA as a comonomer when compared to
586
+ Figure 5. PSD distributions used to calculate FoM for comparison of plastics that contain PPO (a) and mTP (b).
587
+ Note that the FoMs for 6Li-plastics are given for discrimination between thermal neutrons and gamma rays whereas
588
+ FoMs for plastics without 6Li correspond to discrimination between fast neutrons and gamma rays.
589
+
590
+ the addition of MAA alone. At 13 wt. % MAA, the LO decreased from 0.64 to 0.52
591
+ when adding the 6Li salt. The reduction in LO with increasing MAA content and
592
+ addition of 6Li salt poses a challenge related to processing: higher content of MAA
593
+ allows for processing of the plastic scintillator at lower temperatures but reduces LO.
594
+ Plastic scintillators with lower content of MAA are more difficult to process due to poor
595
+ solubility of the 6Li salt. For example, lithium-6 3-methylbutanoate is not fully soluble
596
+ at 65 oC when the MAA content is equal to or less than 8 wt. % (Figure 4c). The cause
597
+ of the reduction in performance upon addition of 6Li salt may be similar to the reduction
598
+ in performance upon addition of MAA; PPO may have unfavourable interactions and/or
599
+ reactivity with these polar molecules.
600
+ To test this idea, we compared the scintillation performance when using 30 wt.
601
+ % m-terphenyl (mTP) as a primary dye instead of PPO. The chemical structure of mTP
602
+ (Figure 1b) does not contain any heteroatoms (i.e., only contains C, H). Plastics that
603
+ used mTP as the primary dye but did not contain MAA or a 6Li salt had an average LO
604
+ of 1.12 (Figure 4d, Table 2). Plastics that contained MAA and 6Li had a slight
605
+ reduction in LO with values of 0.93, 0.95, 0.93, and 0.92 at 3 wt. %, 5 wt. %, 6 wt. %,
606
+ and 13 wt. % MAA. At 13 wt. % MAA, the LO of a plastic that contains 6Li was reduced
607
+ by 18% when compared to a plastic that contained no MAA or 6Li. This value of LO is
608
+ nearly double the LO of an equivalent plastic that contained PPO instead of mTP as the
609
+ primary dye.
610
+ We also compared the FoM for PSD. For plastics that contain PPO but no 6Li,
611
+ the FoM is 3.05, which provides a baseline for comparison after addition of MAA and
612
+ 6Li. Note that this FoM compares discrimination between gamma rays and fast neutrons
613
+ whereas the FoM for plastics that contain 6Li compares discrimination between gamma
614
+ rays and thermal neutrons. The energy range used to determine FoM was 450-550
615
+ keVee, but that range was adjusted to capture the thermal neutron peak. Upon addition
616
+ of 13 wt. % MAA and 6Li, the FoM decreases to 2.24 and decreases for all plastics that
617
+ were measured that contained MAA (Figure 5a).
618
+ These PSD results can also be compared to plastics that contain mTP instead
619
+ of PPO (Figure 5b). For plastics that contain mTP but no 6Li, the FoM is 2.73. Upon
620
+
621
+ addition of MAA and 6Li, the FoM is between 2.95 and 3.24. This increase is mostly
622
+ attributed to the high value of Qtail/Qtotal for the thermal-neutron capture spot along with
623
+ the observation that plastics that contain mTP are less sensitive to the addition of the
624
+ polar compounds that enable thermal-neutron capture. The FoM for plastics that
625
+ contained PPO decreased when MAA and 6Li were added whereas the FoM for plastics
626
+ that contained mTP increased when MAA and 6Li were added.
627
+ 3c. Production of large plastic scintillators
628
+ As shown above, mTP may be promising for high performance scintillators
629
+ that contain 6Li; however, the inconsistencies with solubility and the current availability
630
+ at large scales in sufficient purity from commercial suppliers make mTP less suitable
631
+ Figure 6. a,b) Conditions that are not optimized for the production of large plastics produce defects like cracks and
632
+ bubbles (a) and discoloration (b). The left-most scintillator in (a) does not contain defects and serves as a reference.
633
+ These scintillators in (a) have a diameter of about 5.5 cm. The plastic scintillator in (b) is 40 cm in length. c) When the
634
+ curing conditions and environment are controlled, plastics scintillators can be produced in large scale, as shown in this
635
+ photograph of a scintillator that is 5 cm in width atop a sheet of paper. d) The effective attenuation length was measured
636
+ by placing a collimated gamma-ray source at set distances away from two PMTs and measuring the PMT response
637
+ (black). The data were fitted with an exponential profile to estimate the effective attenuation length (19-21cm). e) Large
638
+ plastic scintillators are capable of PSD, as shown in this distribution that demonstrates an ability to separate signals from
639
+ thermal neutrons and gamma rays.
640
+
641
+ b)for the production of large plastic scintillators. For these large plastic scintillators, we
642
+ selected PPO despite its lower LO and lower FoM at smaller scales.
643
+ Similarly, other secondary dyes like Exalite 404 (E404) may have the best
644
+ performance in the plastic scintillators that we evaluated[27], but the cost of E404 might
645
+ be prohibitive when compared to a secondary dye like 1,4-bis(2-methylstyryl)benzene
646
+ (bisMSB).
647
+ When processing the plastics, all precursors except DVB and the radical
648
+ initiator are slowly heated to temperatures between 60 and 80 oC until full dissolution.
649
+ The plastics are cured in glass or aluminium moulds. To control the rate of
650
+ polymerization, the radical initiator is added at concentrations of 0.01 wt. %, and
651
+ plastics are cured at an initial temperature of 60 oC. Various times of curing were used,
652
+ and a typical recipe would involve curing for 7 days at 60 oC followed by an additional
653
+ 4 days of curing at 75 oC. Excessive radical concentration and/or heating during
654
+ processing and curing could lead to defects like cracks and bubbles (Figure 6a).
655
+ Precipitation of precursors that have lower solubility may occur if temperatures are too
656
+ low. When curing the plastics, oxygen is displaced by a steady flow of nitrogen; without
657
+ nitrogen flow, discoloration can occur (Figure 6b). These precautionary measures
658
+ allow us to produce plastic scintillators without defects and with minimal
659
+ discoloration (Figure 6c). The effective attenuation of a plastic scintillator that was 16”
660
+ long was measured by placing a collimated gamma-ray source near the scintillator and
661
+ measuring the total light detected by PMTs that are mounted on each end of the plastic
662
+ scintillator (Figure 6d). The effective attenuation was determined to be about 19-21
663
+ cm, which is comparable to the value obtained in previous experiments.[24] This plastic
664
+ also had PSD capability; a thermal-neutron spot is clearly separated from the gamma
665
+ signal (Figure 6e). After we optimized our process for synthesis of these large plastics,
666
+ we outsourced production to Eljen Technologies who is currently producing 6Li-loaded
667
+ prototypes with dimensions exceeding 0.5 m; full characterization of scintillator
668
+ performance at these large scales will be the subject of a future publication.
669
+
670
+ 4. Conclusion
671
+ By careful control of composition and processing, plastic scintillators that can
672
+ discriminate between gamma rays, fast neutrons, and thermal neutrons can be produced
673
+ at a scale of 1 kg or greater. The solubility of dopants that enable scintillation
674
+ functionality and solubilizing additives like methacrylic acid (MAA) that may
675
+ negatively affect performance were considered. Synthesis and processing procedures
676
+ were developed for large plastic scintillators containing 0.1 wt. % 6Li and high
677
+ concentration (30 wt. %) of PPO used as a primary dye. These scintillators were capable
678
+ of PSD. In these studies, various 6Li salts of aliphatic carboxylic acids were evaluated,
679
+ and many were found to be suitable for the production of large plastic scintillators with
680
+ the addition of MAA. The amount of MAA that was added to solubilize 6Li salts
681
+ affected the scintillation performance but also determined the temperature that plastic
682
+ scintillators could be produced at. An alternative way to avoid the deleterious effects of
683
+ MAA was discovered; use of m-terphenyl instead of PPO improved plastic scintillators.
684
+ However, m-terphenyl may have limitations like availability at large volumes.
685
+ With these considerations in mind, methods for the preparation of plastic
686
+ scintillators loaded with 6Li were established and demonstrated. Large-volume pieces
687
+ that could be used for large detectors were produced.[24,28] Such detectors will be
688
+ important for future safeguards related to nuclear power production and for unravelling
689
+ unknown aspects of particle physics.
690
+ Acknowledgements
691
+ This work was performed under the auspices of the U.S. Department of Energy by
692
+ Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344 and
693
+ was supported by the LLNL-LDRD Program under Project No. 20-SI-003, release
694
+ number LLNL-JRNL-839909. We would like to thank Jacob Kim for careful reading
695
+ and discussion of this manuscript.
696
+
697
+ The authors declare no competing interests.
698
+
699
+ References
700
+ [1]
701
+ W.J. Nuttall, Nuclear Renaissance: Technologies and Policies for the Future of
702
+ Nuclear Power, CRC Press, 2022.
703
+ [2]
704
+ J.F. Cavaignac, A. Hoummada, D.H. Koang, B. Vignon, Y. Declais, H. de Kerret,
705
+ H. Pessard, J.M. Thenard, Indication for neutrino oscillation from a high statistics
706
+ experiment at the bugey reactor, Phys. Lett. B. 148 (1984) 387–394.
707
+ https://doi.org/10.1016/0370-2693(84)90109-6.
708
+ [3]
709
+ B. Achkar, R. Aleksan, M. Avenier, G. Bagieu, J. Bouchez, R. Brissot, J.-F.
710
+ Cavaignac, J. Collot, M.-C. Cousinou, J.P. Cussonneau, Y. Declais, Y. Dufour,
711
+ J. Favier, F. Garciaz, E. Kajfasz, H. de Kerret, D.H. Koang, B. Lefièvre, E.
712
+ Lesquoy, J. Mallet, A. Metref, E. Nagy, H. Pessard, F. Pierre, M. Obolensky, A.
713
+ Stutz, J.P. Wuthrick, Search for neutrino oscillations at 15, 40 and 95 meters from
714
+ a nuclear power reactor at Bugey, Nucl. Phys. B. 434 (1995) 503–532.
715
+ https://doi.org/10.1016/0550-3213(94)00513-E.
716
+ [4]
717
+ M. Abbes, B. Achkar, S. Ait-Boubker, R. Aleksan, M. Avenier, G. Bagieu, J.
718
+ Ballansat, C. Barnoux, R. Bazzoli, J. Berger, M. Bermond, P. Besson, M.
719
+ Billault, J. Boucher, J. Bouchez, M. Bouriant, R. Brissot, B. Camberlin, J.F.
720
+ Cavaignac, P. Charvin, J. Collot, A. Commerçon, M.-C. Cousinou, J.P.
721
+ Cussonneau, G. Daguin-Moynot, Y. Declais, T. Desanlis, J.-M. Dubois, Y.
722
+ Dufour, G. Farrache, J. Favier, Y. Gally, F. Garciaz, L. Giacobone, B. Guerre-
723
+ Chaley, J.-P. Jobez, D. Jourde, E. Kajfasz, H. de Kerret, D.H. Koang, B. Lefièvre,
724
+ F. Léon, E. Lesquoy, J. Mallet, A. Menthe, A. Metref, J. Mullié, E. Nagy, M.
725
+ Obolensky, P. Ollive, A. Oriboni, H. Pessard, F. Pierre, J. Poinsignon, R.
726
+ Potheau, R. Provasi, A. Stutz, J. Thion, J.-F. Thomas, J.P. Wuthrick, The Bugey
727
+ 3 neutrino detector, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
728
+ Spectrometers
729
+ Detect.
730
+ Assoc.
731
+ Equip.
732
+ 374
733
+ (1996)
734
+ 164–187.
735
+ https://doi.org/10.1016/0168-9002(96)00220-3.
736
+ [5]
737
+ Daya Bay Collaboration, A Precision Measurement of the Neutrino Mixing
738
+ Angle theta_13 using Reactor Antineutrinos at Daya Bay, arXiv, 2007.
739
+ https://doi.org/10.48550/arXiv.hep-ex/0701029.
740
+ [6]
741
+ A. Bernstein, N. Bowden, B.L. Goldblum, P. Huber, I. Jovanovic, J. Mattingly,
742
+ Colloquium: Neutrino detectors as tools for nuclear security, Rev. Mod. Phys. 92
743
+ (2020) 011003. https://doi.org/10.1103/RevModPhys.92.011003.
744
+ [7]
745
+ N.S. Bowden, A. Bernstein, M. Allen, J.S. Brennan, M. Cunningham, J.K.
746
+ Estrada, C.M.R. Greaves, C. Hagmann, J. Lund, W. Mengesha, T.D. Weinbeck,
747
+ C.D. Winant, Experimental results from an antineutrino detector for cooperative
748
+ monitoring of nuclear reactors, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
749
+ Spectrometers
750
+ Detect.
751
+ Assoc.
752
+ Equip.
753
+ 572
754
+ (2007)
755
+ 985–998.
756
+ https://doi.org/10.1016/j.nima.2006.12.015.
757
+ [8]
758
+ Y. Kuroda, S. Oguri, Y. Kato, R. Nakata, Y. Inoue, C. Ito, M. Minowa, A mobile
759
+ antineutrino detector with plastic scintillators, Nucl. Instrum. Methods Phys. Res.
760
+ Sect. Accel. Spectrometers Detect. Assoc. Equip. 690 (2012) 41–47.
761
+ https://doi.org/10.1016/j.nima.2012.06.040.
762
+ [9]
763
+ Nucifer Collaboration, G. Boireau, L. Bouvet, A.P. Collin, G. Coulloux, M.
764
+ Cribier, H. Deschamp, V. Durand, M. Fechner, V. Fischer, J. Gaffiot, N. Gérard
765
+ Castaing, R. Granelli, Y. Kato, T. Lasserre, L. Latron, P. Legou, A. Letourneau,
766
+
767
+ D. Lhuillier, G. Mention, Th.A. Mueller, T.-A. Nghiem, N. Pedrol, J. Pelzer, M.
768
+ Pequignot, Y. Piret, G. Prono, L. Scola, P. Starzinski, M. Vivier, E. Dumonteil,
769
+ D. Mancusi, C. Varignon, C. Buck, M. Lindner, J. Bazoma, S. Bouvier, V.M.
770
+ Bui, V. Communeau, A. Cucoanes, M. Fallot, M. Gautier, L. Giot, G. Guilloux,
771
+ M. Lenoir, J. Martino, G. Mercier, T. Milleto, N. Peuvrel, A. Porta, N. Le Quéré,
772
+ C. Renard, L.M. Rigalleau, D. Roy, T. Vilajosana, F. Yermia, Online monitoring
773
+ of the Osiris reactor with the Nucifer neutrino detector, Phys. Rev. D. 93 (2016)
774
+ 112006. https://doi.org/10.1103/PhysRevD.93.112006.
775
+ [10] A. Haghighat, P. Huber, S. Li, J.M. Link, C. Mariani, J. Park, T. Subedi,
776
+ Observation of Reactor Antineutrinos with a Rapidly Deployable Surface-Level
777
+ Detector,
778
+ Phys.
779
+ Rev.
780
+ Appl.
781
+ 13
782
+ (2020)
783
+ 034028.
784
+ https://doi.org/10.1103/PhysRevApplied.13.034028.
785
+ [11] J. Ashenfelter, B. Balantekin, H.R. Band, G. Barclay, C.D. Bass, D. Berish, N.S.
786
+ Bowden, A. Bowes, C.D. Bryan, J.P. Brodsky, J.J. Cherwinka, R. Chu, T.
787
+ Classen, K. Commeford, D. Davee, D. Dean, G. Deichert, M.V. Diwan, M.J.
788
+ Dolinski, J. Dolph, J.K. Gaison, A. Galindo-Uribarri, K. Gilje, A. Glenn, B.W.
789
+ Goddard, M. Green, K. Han, S. Hans, K.M. Heeger, B. Heffron, D.E. Jaffe, D.
790
+ Jones, T.J. Langford, B.R. Littlejohn, D.A.M. Caicedo, R.D. McKeown, M.P.
791
+ Mendenhall, P. Mueller, H.P. Mumm, J. Napolitano, R. Neilson, D. Norcini, D.
792
+ Pushin, X. Qian, E. Romero, R. Rosero, B.S. Seilhan, R. Sharma, S. Sheets, P.T.
793
+ Surukuchi, R.L. Varner, B. Viren, W. Wang, B. White, C. White, J. Wilhelmi, C.
794
+ Williams, T. Wise, H. Yao, M. Yeh, Y.-R. Yen, G. Zangakis, C. Zhang, X.
795
+ Zhang, The PROSPECT Physics Program, J. Phys. G Nucl. Part. Phys. 43 (2016)
796
+ 113001. https://doi.org/10.1088/0954-3899/43/11/113001.
797
+ [12] PROSPECT Collaboration, J. Ashenfelter, A.B. Balantekin, H.R. Band, C.D.
798
+ Bass, D.E. Bergeron, D. Berish, N.S. Bowden, J.P. Brodsky, C.D. Bryan, J.J.
799
+ Cherwinka, T. Classen, A.J. Conant, A.A. Cox, D. Davee, D. Dean, G. Deichert,
800
+ M.V. Diwan, M.J. Dolinski, A. Erickson, M. Febbraro, B.T. Foust, J.K. Gaison,
801
+ A. Galindo-Uribarri, C.E. Gilbert, K.E. Gilje, B.T. Hackett, S. Hans, A.B.
802
+ Hansell, K.M. Heeger, J. Insler, D.E. Jaffe, X. Ji, D.C. Jones, O. Kyzylova, C.E.
803
+ Lane, T.J. Langford, J. LaRosa, B.R. Littlejohn, X. Lu, D.A.M. Caicedo, J.T.
804
+ Matta, R.D. McKeown, M.P. Mendenhall, J.M. Minock, P.E. Mueller, H.P.
805
+ Mumm, J. Napolitano, R. Neilson, J.A. Nikkel, D. Norcini, S. Nour, D.A. Pushin,
806
+ X. Qian, E. Romero-Romero, R. Rosero, D. Sarenac, P.T. Surukuchi, A.B.
807
+ Telles, M.A. Tyra, R.L. Varner, B. Viren, C. White, J. Wilhelmi, T. Wise, M.
808
+ Yeh, Y.-R. Yen, A. Zhang, C. Zhang, X. Zhang, Measurement of the
809
+ Antineutrino Spectrum from $^{235}$U Fission at HFIR with PROSPECT,
810
+ Phys.
811
+ Rev.
812
+ Lett.
813
+ 122
814
+ (2019)
815
+ 251801.
816
+ https://doi.org/10.1103/PhysRevLett.122.251801.
817
+ [13] F.D. Brooks, R.W. Pringle, B.L. Funt, Pulse Shape Discrimination in a Plastic
818
+ Scintillator,
819
+ IRE
820
+ Trans.
821
+ Nucl.
822
+ Sci.
823
+ 7
824
+ (1960)
825
+ 35–38.
826
+ https://doi.org/10.1109/TNS2.1960.4315733.
827
+ [14] N. Zaitseva, B.L. Rupert, I. PaweŁczak, A. Glenn, H.P. Martinez, L. Carman, M.
828
+ Faust, N. Cherepy, S. Payne, Plastic scintillators with efficient neutron/gamma
829
+ pulse shape discrimination, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
830
+ Spectrometers
831
+ Detect.
832
+ Assoc.
833
+ Equip.
834
+ 668
835
+ (2012)
836
+ 88–93.
837
+ https://doi.org/10.1016/j.nima.2011.11.071.
838
+
839
+ [15] N.P. Zaitseva, A.M. Glenn, A.N. Mabe, M.L. Carman, C.R. Hurlbut, J.W. Inman,
840
+ S.A. Payne, Recent developments in plastic scintillators with pulse shape
841
+ discrimination, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers
842
+ Detect.
843
+ Assoc.
844
+ Equip.
845
+ 889
846
+ (2018)
847
+ 97–104.
848
+ https://doi.org/10.1016/j.nima.2018.01.093.
849
+ [16] G.H.V. Bertrand, M. Hamel, S. Normand, F. Sguerra, Pulse shape discrimination
850
+ between (fast or thermal) neutrons and gamma rays with plastic scintillators:
851
+ State of the art, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers
852
+ Detect.
853
+ Assoc.
854
+ Equip.
855
+ 776
856
+ (2015)
857
+ 114–128.
858
+ https://doi.org/10.1016/j.nima.2014.12.024.
859
+ [17] I.A. Pawełczak, A.M. Glenn, H.P. Martinez, M.L. Carman, N.P. Zaitseva, S.A.
860
+ Payne, Boron-loaded plastic scintillator with neutron-γ pulse shape
861
+ discrimination capability, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
862
+ Spectrometers
863
+ Detect.
864
+ Assoc.
865
+ Equip.
866
+ 751
867
+ (2014)
868
+ 62–69.
869
+ https://doi.org/10.1016/j.nima.2014.03.027.
870
+ [18] R.D. Breukers, C.M. Bartle, A. Edgar, Transparent lithium loaded plastic
871
+ scintillators for thermal neutron detection, Nucl. Instrum. Methods Phys. Res.
872
+ Sect. Accel. Spectrometers Detect. Assoc. Equip. 701 (2013) 58–61.
873
+ https://doi.org/10.1016/j.nima.2012.10.080.
874
+ [19] N. Zaitseva, A. Glenn, H. Paul Martinez, L. Carman, I. Pawełczak, M. Faust, S.
875
+ Payne, Pulse shape discrimination with lithium-containing organic scintillators,
876
+ Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc.
877
+ Equip. 729 (2013) 747–754. https://doi.org/10.1016/j.nima.2013.08.048.
878
+ [20] N.J. Cherepy, R.D. Sanner, P.R. Beck, E.L. Swanberg, T.M. Tillotson, S.A.
879
+ Payne, C.R. Hurlbut, Bismuth- and lithium-loaded plastic scintillators for gamma
880
+ and neutron detection, Nucl. Instrum. Methods Phys. Res. Sect. Accel.
881
+ Spectrometers
882
+ Detect.
883
+ Assoc.
884
+ Equip.
885
+ 778
886
+ (2015)
887
+ 126–132.
888
+ https://doi.org/10.1016/j.nima.2015.01.008.
889
+ [21] A.N. Mabe, A.M. Glenn, M.L. Carman, N.P. Zaitseva, S.A. Payne, Transparent
890
+ plastic scintillators for neutron detection based on lithium salicylate, Nucl.
891
+ Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip.
892
+ 806 (2016) 80–86. https://doi.org/10.1016/j.nima.2015.09.111.
893
+ [22] C. Frangville, M. Hamel, G.H. V. Bertrand, E. Montbarbon, A. Grabowski, C.
894
+ Lynde, Large solubility of lithium carboxylates reaching high rates of 6 Li
895
+ incorporation in polystyrene-based plastic scintillators for fast/thermal neutron
896
+ and gamma ray detection, Mater. Chem. Front. 3 (2019) 1626–1631.
897
+ https://doi.org/10.1039/C9QM00153K.
898
+ [23] A. Husain, A.E. Hamielec, Thermal polymerization of styrene, J. Appl. Polym.
899
+ Sci. 22 (1978) 1207–1223. https://doi.org/10.1002/app.1978.070220505.
900
+ [24] F. Sutanto, T.M. Classen, S.A. Dazeley, M.J. Duvall, I. Jovanovic, V.A. Li, A.N.
901
+ Mabe, E.T.E. Reedy, T. Wu, SANDD: A directional antineutrino detector with
902
+ segmented 6Li-doped pulse-shape-sensitive plastic scintillator, Nucl. Instrum.
903
+ Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip. 1006
904
+ (2021) 165409. https://doi.org/10.1016/j.nima.2021.165409.
905
+ [25] A.N. Mabe, A.M. Glenn, M.L. Carman, N.P. Zaitseva, S.A. Payne, Transparent
906
+ plastic scintillators for neutron detection based on lithium salicylate, Nucl.
907
+
908
+ Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip.
909
+ 806 (2016) 80–86. https://doi.org/10.1016/j.nima.2015.09.111.
910
+ [26] H. Paul Martinez, I. Pawelczak, A.M. Glenn, M. Leslie Carman, N. Zaitseva, S.
911
+ Payne, Pulse shape discrimination in non-aromatic plastics, Nucl. Instrum.
912
+ Methods Phys. Res. Sect. Accel. Spectrometers Detect. Assoc. Equip. 771 (2015)
913
+ 28–31. https://doi.org/10.1016/j.nima.2014.10.023.
914
+ [27] N.P. Zaitseva, A.M. Glenn, M.L. Carman, A.N. Mabe, S.A. Payne, N. Marom,
915
+ X. Wang, Multiple dye interactions in plastic scintillators: Effects on pulse shape
916
+ discrimination, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers
917
+ Detect.
918
+ Assoc.
919
+ Equip.
920
+ 978
921
+ (2020)
922
+ 164455.
923
+ https://doi.org/10.1016/j.nima.2020.164455.
924
+ [28] V.A. Li, T.M. Classen, S.A. Dazeley, M.J. Duvall, I. Jovanovic, A.N. Mabe,
925
+ E.T.E. Reedy, F. Sutanto, A prototype for SANDD: A highly-segmented pulse-
926
+ shape-sensitive plastic scintillator detector incorporating silicon photomultiplier
927
+ arrays, Nucl. Instrum. Methods Phys. Res. Sect. Accel. Spectrometers Detect.
928
+ Assoc. Equip. 942 (2019) 162334. https://doi.org/10.1016/j.nima.2019.162334.
929
+
930
+
931
+
09E2T4oBgHgl3EQf5AgM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
0NFQT4oBgHgl3EQfDTUM/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:679baa2b66b51f430412223eec24c31ed36cd8834154f4696776efa2f3086a05
3
+ size 6029357
1dE0T4oBgHgl3EQfuQGc/content/tmp_files/2301.02603v1.pdf.txt ADDED
@@ -0,0 +1,790 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Contextual Autonomy Evaluation of Unmanned
2
+ Aerial Vehicles in Subterranean Environments
3
+ Ryan Donald
4
+ Peter Gavriel
5
+ Adam Norton
6
+ S. Reza Ahmadzadeh
7
+ PeARL lab and NERVE Center
8
+ University of Massachusetts Lowell
9
+ Lowell, USA
10
11
12
13
14
+ Abstract—In this paper we focus on the evaluation of con-
15
+ textual autonomy for robots. More specifically, we propose a
16
+ fuzzy framework for calculating the autonomy score for a
17
+ small Unmanned Aerial Systems (sUAS) for performing a task
18
+ while considering task complexity and environmental factors.
19
+ Our framework is a cascaded Fuzzy Inference System (cFIS)
20
+ composed of combination of three FIS which represent dif-
21
+ ferent contextual autonomy capabilities. We performed several
22
+ experiments to test our framework in various contexts, such as
23
+ endurance time, navigation, take off/land, and room clearing,
24
+ with seven different sUAS. We introduce a predictive measure
25
+ which improves upon previous predictive measures, allowing for
26
+ previous real-world task performance to be used in predicting
27
+ future mission performance.
28
+ Index Terms—Contextual Autonomy, Unmanned Aerial Vehi-
29
+ cles, Fuzzy Systems
30
+ I. INTRODUCTION
31
+ In today’s world, robots are expected to become increasingly
32
+ present by assisting humans in performing various tasks in
33
+ different environments. While some robots have been designed
34
+ for a single purpose, others can accomplish a variety of tasks
35
+ with different levels of autonomy. Measuring robot autonomy
36
+ is an important and ever evolving concept and existing meth-
37
+ ods for evaluating robot autonomy can be categorized into
38
+ two main families: contextual and non-contextual. While the
39
+ former methods consider mission and task-specific measures
40
+ (e.g., ALFUS [1], ACL [2]), the latter only rely on implicit
41
+ system capabilities and do not consider the mission and
42
+ environment features (e.g., NCAP [3], [4]).
43
+ Our study in this paper focuses on evaluating the contextual
44
+ autonomy for small Unmanned Aerial Systems (sUAS). Exist-
45
+ ing methods such as ALFUS [1] and MPP [5] share a similar
46
+ shortcoming in that neither provides a simple implementation
47
+ for use with real-world systems. Another drawback of existing
48
+ methods that our approach addresses is the lack of a consistent
49
+ process for breaking down tasks into sub-tasks and combining
50
+ scores calculated for sub-tasks into a unified score for the given
51
+ task. In this paper we propose a method for evaluating the
52
+ contextual autonomy of sUAS based on a fuzzy interface that
53
+ allows the operator to design and modify the evaluation system
54
+ using linguistic reasoning. We designed four indoor tasks
55
+ (endurance time, navigation, takeoff/land, and room clearing)
56
+ and tested our interface in various experiments with seven
57
+ different sUAS. Our results show that the proposed approach
58
+ calculates a contextual autonomy score that can be used to
59
+ rank the systems for each context.
60
+ II. RELATED WORK
61
+ Some of the first and more simplistic methods of categoriz-
62
+ ing autonomous systems are the Levels of Automation (LOA)
63
+ proposed by Sheridan [6] and its later expansion [7]. LOA
64
+ defines automation as “the full or partial replacement of a
65
+ function previously carried out by the human operator” in a 1
66
+ to 10 range; 1 being full control by the human and 10 being
67
+ full control by the computer. LOA does not accurately describe
68
+ how outside factors can affect the autonomous capability of a
69
+ system. While it could theoretically be applied to a robot, it
70
+ would not be accurate as it fails to accommodate for differing
71
+ degrees of difficulty in tasks, and environmental factors.
72
+ Another evaluation method is known as the Autonomy
73
+ Control Levels (ACL) [2]. ACL is designed for Unmanned
74
+ Aerial Vehicles (UAV), and operates on a similar basis of uti-
75
+ lizing autonomy levels from 0-10, with 0 being fully remotely
76
+ controlled by a pilot, and 10 being a human-like system.
77
+ These levels closely resemble the 10 LOA, following the same
78
+ concept. The ACL characterizes each system according to
79
+ four metrics, which attempt to categorize different areas of
80
+ autonomous behaviors for the system. In each of these, an
81
+ autonomy level from 0-10 is given based upon these behaviors.
82
+ This system has a similar drawback, in that it does not account
83
+ for difficulties in the mission itself.
84
+ Another method is the Autonomy and Technological Readi-
85
+ ness Assessment (ATRA) [8]. ATRA attempts to combine both
86
+ the basic theory behind the Autonomy Level, and the Tech-
87
+ nology Readiness Level (TRL) metric into one framework [8].
88
+ TRL utilizes these two metrics in an attempt to evaluate the
89
+ autonomy level provided by different technologies onboard the
90
+ UAS. This is emphasized as a solution for the gap between
91
+ existing theoretical work and technological advances in the
92
+ UAS autonomy space.
93
+ Autonomy Levels for Unmanned Systems (ALFUS) is a
94
+ method for defining the autonomy of a system in terms of
95
+ three different axes [9]. ALFUS has a strong theoretical basis,
96
+ but somewhat impractical in the real-world implementation
97
+ due to the lack of maturity in some of these systems, as well
98
+ arXiv:2301.02603v1 [cs.RO] 6 Jan 2023
99
+
100
+ as the inability of most, if not all, available systems to reach
101
+ the upper levels of the three axes.
102
+ The three axes mentioned are known as the Mission Com-
103
+ plexity (MC), Environmental Complexity (EC), and Human
104
+ Independence (HI) axes. Each one of these axes pertains itself
105
+ to a different aspect of the contextual autonomy of a system.
106
+ The MC axis pertains mostly towards the difficulty of the tasks
107
+ and movements required of the system to complete the task
108
+ (e.g. maneuvers, speed, searching). Alternatively, the EC axis
109
+ concerns itself with the difficulty in the performance of the
110
+ task caused by environmental factors (e.g. Lighting, Obstacles,
111
+ Enclosed Spaces). Lastly, the HI axis is representative of the
112
+ level of independence between the user and the system (e.g.
113
+ task planning, task execution).
114
+ Due to the ability to split the representation of a system’s
115
+ autonomy into these three axes, it allows for the character-
116
+ ization and evaluation of system’s autonomy in real world
117
+ tests, including the impact that both the environment and the
118
+ mission profile can have on the system’s autonomy. Our work
119
+ in this paper is based off many of the ideas put forward
120
+ through ALFUS, and we utilize it as a foundational part of
121
+ our contextual autonomy evaluation.
122
+ The Mission Performance Potential is proposed as a method
123
+ for the evaluation of a unmanned system’s autonomous per-
124
+ formance, as well as a predictor for future missions [5].
125
+ This method provides a metric which represents the max-
126
+ imum performance of a system in a given mission at a
127
+ given autonomy level. Uniquely, this method includes both
128
+ non-contextual autonomy metrics, and contextual autonomy
129
+ metrics, and provides a single output prediction based on both
130
+ types of data.
131
+ One of the drawbacks of MPP is that it only provides
132
+ a prediction of the performance of a system at a specified
133
+ autonomy level for a specified mission. In other words, this
134
+ does not evaluate how a real system performs, but rather the
135
+ maximum potential for a system to perform. Our approach
136
+ instead calculated the actual autonomy of a system based on
137
+ actual data from real-world experiments.
138
+ Fig. 1: Our cascaded Fuzzy Inference System used for calcu-
139
+ lating a contextual autonomy score for a performed task.
140
+ III. FRAMEWORK
141
+ ALFUS’ summary model works with a set of metrics for
142
+ each of its three axes, as well as a system of levels from
143
+ 0 to 10. These levels are based upon possible answers from
144
+ those metrics, to provide a level evaluation of a system. As
145
+ a generic framework, ALFUS tends to have a very broad,
146
+ and somewhat open to interpretation, definition of metrics.
147
+ For instance, in the case of the EC axis, it ranges from a
148
+ “simple environment,” to an “extreme environment.” However,
149
+ the summary model describes the system in terms of an
150
+ autonomy level for each axis, while the Contextual Autonomy
151
+ Capability within ALFUS provides an actual score for each
152
+ axis. Due to the autonomy level evaluation, there is some
153
+ ambiguity when characterizing systems. This is one of the
154
+ main concerns with ALFUS, in that while it does provide a
155
+ strong theoretical background, the actual implementation of
156
+ the ideas with real-world systems is not as clear.
157
+ We utilize Takagi-Sugeno Fuzzy Inference Systems (FIS)
158
+ as a means to combine different metrics in an evaluation of
159
+ an sUAS which is both easy to use, and allows us to use
160
+ some data which is either not easily defined numerically, or
161
+ inherently qualitative about the environment, combined with
162
+ standard quantitative metrics. Fuzzy inferences also allow for
163
+ slight deviations in a metric to not cause a drastic change
164
+ in the evaluation of that sUAS. We designed a set of tests
165
+ with various mission and environment complexity levels (see
166
+ Section V), and defined a fuzzy inference system for each test.
167
+ Unlike MPP [5], our fuzzy inference systems are based on the
168
+ three-axis model used in ALFUS, by creating an individual FIS
169
+ for metrics associated with each axis (i.e., MC, EC, HI), and
170
+ an additional FIS which combines these three outputs into a
171
+ single score. This structure representing a cascaded FIS (cFIS)
172
+ is illustrated in Fig. 1. For each test, the outcome of the FIS
173
+ for all three axis is fed into a combining FIS that produces a
174
+ final autonomy score. Each FIS in our cFIS is a Sugeno-type
175
+ FIS with multiple inputs and one output. For each input of an
176
+ FIS, we consider three membership functions (MFs) labeled
177
+ as low, medium, and high. Without loss of generality, we used
178
+ triangular MFs, however, other types of MF can be used. The
179
+ input variables used in different tests and their corresponding
180
+ MF parameters have been reported in Table II. The output of
181
+ each Sugeno-type FIS has five singleton MFs (i.e., constant):
182
+ very bad, bad, medium, good, very good. Our FIS’ use a
183
+ triangular fuzzifier and a Sugeno defuzzifier (i.e., weighted
184
+ average output). For each FIS, we defined a rule base (i.e., a
185
+ set of linguistic rules).
186
+ In the cFIS structure in Fig. 1, the defuzzified output of
187
+ each FIS is a value in the range of [0, 1]. For the initial three
188
+ FIS, 0 and 1 represent the lowest and highest complexity,
189
+ respectively. In the case of the final FIS, 0 and 1 represent the
190
+ lowest and the highest autonomy, respectively. If we define the
191
+ singleton value of each output function as zi, and the degree
192
+ to which each output is weighted based upon the ruleset as
193
+ wi, then the output final score can be calculated as follows:
194
+ s =
195
+ �N
196
+ i=1 wizi
197
+ �N
198
+ i=1 wi
199
+ (1)
200
+ where N represents the number of rules in the rule base.
201
+ Table I reports an example of the fuzzy ruleset we used. The
202
+ advantage of this system is that we can utilize many different
203
+
204
+ Human
205
+ Independence
206
+ FIS
207
+ Environmental
208
+ Output
209
+ Input Data
210
+ Complexity
211
+ TestFIS
212
+ Score
213
+ FIS
214
+ Mission
215
+ Complexity
216
+ FISFig. 2: From left to right, top to bottom: Cleo Robotics Dronut,
217
+ Flyability Elios 2, Lumenier Nighthawk 3, Parrot ANAFI USA GOV,
218
+ Skydio X2D, Teal Drones Golden Eagle, Vantage Robotics Vesper
219
+ types of data, and clearly define the ranges for each value,
220
+ allowing the pilots performing the tests to provide feedback
221
+ on the membership functions and rulesets.
222
+ Mission Complexity Axis
223
+ Low
224
+ Medium
225
+ High
226
+ Environment
227
+ Complexity
228
+ Axis
229
+ Low
230
+ Very Bad
231
+ Bad
232
+ Medium
233
+ Medium
234
+ Bad
235
+ Medium
236
+ Good
237
+ High
238
+ Medium
239
+ Good
240
+ Very good
241
+ TABLE I: Fuzzy Ruleset utilized in our final combinational FIS
242
+ IV. UAS PLATFORMS
243
+ Fig. 2 illustrates seven sUAS platforms evaluated in our ex-
244
+ periments. The platforms include: the Cleo Robotics Dronut1,
245
+ Flyability Elios 22, Lumenier Nighthawk 33, Parrot ANAFI
246
+ USA GOV4, Skydio X2D5, Teal Drones Golden Eagle6, and
247
+ Vantage Robotics Vesper7. These platforms provide a wide
248
+ ranging set of capabilities and use cases. For instance, Parrot,
249
+ Skydio X2D, Golden Eagle, and Vesper were developed for
250
+ outdoor reconnaissance, whereas the Dronut and Elios 2 were
251
+ developed for indoor reconnaissance and inspection, specif-
252
+ ically in urban and industrial environments. Previously, we
253
+ have used the same set of sUAS for a non-contextual bench-
254
+ marking [4], [10]. In our evaluations, we have anonymized the
255
+ data by assigning the platforms labels A through G without
256
+ any specific ordering or correlation.
257
+ V. TEST DESIGN
258
+ To evaluate the contextual autonomy of our platforms, we
259
+ have designed several tests across a spectrum of areas. The
260
+ variables for which we collected data for each test is reported
261
+ in Table II. In this section, we describe each test briefly.
262
+ As shown in Fig. 3 all tests have been designed for indoor
263
+ environments.
264
+ 1https://cleorobotics.com/
265
+ 2https://www.flyability.com/elios-2
266
+ 3https://www.lumenier.com/
267
+ 4https://www.parrot.com/us/drones/anafi
268
+ 5https://www.skydio.com/skydio-x2
269
+ 6https://tealdrones.com/suas-golden-eagle/
270
+ 7https://vantagerobotics.com/vesper/
271
+ A. Runtime Endurance
272
+ This family of tests focuses on the battery life of the
273
+ system in various operational profiles. As shown in Fig. 3a,
274
+ the specific test we use from this group focuses on the
275
+ system flying continuously in a figure-8 pattern. The main
276
+ performance metric for the test is the test duration.
277
+ B. Navigation
278
+ We have designed two main types of navigation tests, each
279
+ with several profiles defined based on the type of movement
280
+ (horizontal, vertical, or both) and the type of confinement
281
+ (horizontal, vertical, or both). As shown in Fig. 3b, navigation
282
+ through confined spaces involves traversal into and out of a
283
+ continuously confined space, with tests for hallway, tunnel,
284
+ stairwell, and shaft. Navigation through apertures involves
285
+ transient traversal through an opening, with tests for doorway
286
+ and window. Each navigation environment is characterized
287
+ according to the dimensions of the confined space or aperture,
288
+ lighting, surface textures, and the presence of obstructions on
289
+ either side of the confined space or aperture. The main metrics
290
+ of performance are efficacy and average navigation time.
291
+ C. Room Clearing
292
+ In this test method, the system performs a visual inspection
293
+ of an example room whose walls, floor, and ceiling are out-
294
+ fitted with visual acuity targets which contain nested Landolt
295
+ C symbols of decreasing size. As shown in Fig. 3c, the test
296
+ was performed under two conditions: with and without using
297
+ camera zoom. The main performance metrics are duration,
298
+ coverage, and average acuity.
299
+ D. Takeoff and Land/Perch
300
+ As illustrated in Fig. 3d, these tests evaluate the system’s
301
+ ability to takeoff and land or perch in various environments
302
+ that may be affected by stabilization issues or preventative
303
+ safety checks from the system. The conditions tested vary the
304
+ angle of the ground plane (flat, 5° and 10° pitch and roll)
305
+ and the presence of obstructions (1.2-2.4m overhead, 0.6-1.2m
306
+ lateral). The main performance metric is efficacy.
307
+ VI. RESULTS
308
+ Utilizing our framework outlined in Section III, we calculate
309
+ a performance score for each sUAS based upon the conditions
310
+ and performance metrics detailed below. As mentioned above,
311
+ our system provides a single score for each of the three
312
+ attributes, the EC, MC and HI axes, and utilizes those scores
313
+ to provide a single score for the entire test. It should be noted
314
+ that although we consider all three axes in our cFIS structure,
315
+ due to lack of data, we consider the lowest level (i.e., full
316
+ tele-operation) for the HI axis across all tests. The test-specific
317
+ details of the structure is discussed in corresponding sections.
318
+ Another factor to note is that for some of these experiments,
319
+ some sUAS were not available at the time of testing, due to the
320
+ sUAS being repaired, or other circumstances. In this case, we
321
+ attempt to remedy this by calculating a partial point achieved
322
+ by the sUAS. For situations where data for an entire test is
323
+
324
+ (a) Runtime Endurance test showing a system performing a specified
325
+ movement
326
+ (b) Navigation tests (left to right, top to bottom): hallway, tunnel,
327
+ stairwell, shaft, door, window.
328
+ (c) Room clearing test showing a system inspecting surfaces for
329
+ visual acuity targets.
330
+ (d) Takeoff and land/perch tests showing variations in ground plane
331
+ angle (top row) and nearby obstructions (bottom row).
332
+ Fig. 3: Tests designed for the evaluation of sUAS contextual autonomy.
333
+ missing, we cannot fully evaluate the sUAS. However, we have
334
+ evaluated sUAS for individual tests for which the data was
335
+ recorded. Despite these edge cases, most sUAS had available
336
+ data, which was used in our evaluations.
337
+ As mentioned before, the proposed structure in Fig. 1,
338
+ was adapted to each specific test. The resulting cascaded FIS
339
+ are depicted in Fig. 6 each of which represents a cFIS for
340
+ a specific test. More specifically, each sub-figure shows the
341
+ inputs and outputs of each cFIS, as well as how the FIS
342
+ modules are connected. This is meant to provide a visual
343
+ aid, which can be useful to keep track of each FIS, as we
344
+ discuss the results. Associated membership functions for each
345
+ input, and the outputs, can be found in Table II. Some of
346
+ the FIS surfaces, which show the relationship between two
347
+ input values in an FIS, and the corresponding output value, are
348
+ shown in Fig. 4. Additionally, numerical results are reported
349
+ in Fig.5 and Table III.
350
+ A. Test Results
351
+ Runtime Endurance: The runtime endurance test is likely
352
+ the simplest of the tests performed, however, it is still a useful
353
+ test in gauging how a sUAS might perform in a real mission.
354
+ Fig. 3a illustrates the runtime endurance test design including
355
+ the navigation path and two stands. The adapted cFIS for
356
+ this test is shown in Fig. 6a with four inputs: number of
357
+ obstructions, number of crashes, light level and speed.
358
+ Despite the simplicity of this test, some sUAS did not
359
+ performed well largely due to slow speed. Our results indicate
360
+ that some sUAS may have trouble in portions of this real-
361
+ world mission which requires both speed and maneuverability.
362
+ (a) Final FIS Surface
363
+ (b) Through Aperture test EC
364
+ (c) Takeoff and Land/Perch EC
365
+ (d) Through Corridor MC
366
+ Fig. 4: FIS surfaces for different tests.
367
+ In should be noted that during this test only four sUAS were
368
+ available.
369
+ Navigation: In the navigation tests, due to the differences
370
+ between the through corridor and through apertures tests, two
371
+ slightly different cascaded FIS were designed. These can be
372
+ found in Fig. 6b and Fig. 6d. The input to the through corri-
373
+ dors cFIS includes area (cross section), light level, verticality,
374
+ coverage, number of crashes, and duration. The inputs to the
375
+ through apertures cFIS include area, light level, number of
376
+
377
+ 10 degrees
378
+ 10 degrees
379
+ 5 degrees
380
+ 5degree
381
+ 1.2 mCutput_Score
382
+ 10.5
383
+ 0
384
+ 0.5
385
+ 0.5
386
+ MC
387
+ 0
388
+ ECOutput_Score
389
+ 0.6
390
+ 0.4
391
+ 0.2
392
+ 0:
393
+ 0
394
+ 2
395
+ 200
396
+ 400
397
+ 4
398
+ 600
399
+ Area
400
+ Light0.7
401
+ 10.5
402
+ 0.3
403
+ 10
404
+ 10
405
+ 5
406
+ 5
407
+ Pitch
408
+ 0
409
+ RollOutput_Score
410
+ 0.5
411
+ 00
412
+ 2
413
+ 0.5
414
+ Crashes
415
+ 3
416
+ CompletionXVariables
417
+ Description
418
+ MFs: Triangular{Low, Medium, High}
419
+ Area
420
+ Aperture/Hallway Cross-Section (m2)
421
+ [0, 0, 2.7]
422
+ [0.6, 3, 5.4]
423
+ [3.3, 6, 6]
424
+ Light
425
+ Ambient Light Level (Lux)
426
+ [0, 0, 337.5]
427
+ [75, 375, 675]
428
+ [412.5, 750, 750]
429
+ Vert
430
+ Verticality (°)
431
+ [0, 0, 37.5]
432
+ [7.5, 45, 82.5]
433
+ [52.5, 90, 90]
434
+ Crash
435
+ Number of Crashes
436
+ [0, 0, 1.25]
437
+ [0.5, 1.5, 2.5]
438
+ [1.75, 3, 3]
439
+ Rollovers
440
+ Number of Rollovers
441
+ [0, 0, 1.25]
442
+ [0.5, 1.5, 2.5]
443
+ [1.75, 3, 3]
444
+ Comp. %
445
+ Completion Percentage
446
+ [0, 0, 0.55]
447
+ [0.15, 0.6, 0.92]
448
+ [0.7, 1, 1]
449
+ Yaw/Pitch
450
+ Static Yaw/Pitch Angle (°)
451
+ [0, 0, 4.17]
452
+ [0.83, 5, 9.12]
453
+ [5.83, 10, 10]
454
+ VR
455
+ Static Vertical Obstruction (m)
456
+ [0.6, 0.6, 1.1]
457
+ [0.7, 1.2, 1.7]
458
+ [1.3, 1.8, 1.8]
459
+ LR
460
+ Static Lateral Obstruction (m)
461
+ [1.2, 1.2, 2.2]
462
+ [1.4, 2.4, 3.4]
463
+ [2.6, 3.6, 3.6]
464
+ Coverage
465
+ Coverage Percentage
466
+ [0, 0, 0.55]
467
+ [0.15, 0.6, 0.92]
468
+ [0.7, 1, 1]
469
+ Cs Detected
470
+ Landolt C Depth Detected
471
+ [0, 0, 50]
472
+ [10, 50, 90]
473
+ [50, 100, 100]
474
+ Duration
475
+ Duration of Test (Minutes)
476
+ [2.5, 2.5, 5.25]
477
+ [3.05, 5.25, 7.45]
478
+ [5.25, 8, 8]
479
+ Obs.
480
+ Number of Obstructions
481
+ [0, 0, 2.5]
482
+ [1, 3, 5]
483
+ [3.5, 6, 6]
484
+ Output Variable
485
+ Description
486
+ Sugeno MFs: Constant {Very Low to Very High}
487
+ Score
488
+ Combined Defuzzified Score
489
+ [0, 0.25, 0.5, 0.75, 1]
490
+ TABLE II: Membership Functions (MFs) for each input and output variable used in an FIS in the evaluation of these sUAS.
491
+ Fig. 5: Scores for each sUAS as a percentage of the maximum score
492
+ possible on the y-axis, with each test on the x-axis
493
+ crashes, and completion percentage. As shown above in Fig. 5,
494
+ each sUAS that performed the through apertures test, achieved
495
+ a maximum score, besides sUAS G, which performed slightly
496
+ worse, due to both issues in correctly traversing the aperture,
497
+ as well as being the only sUAS to suffer a crash during the test.
498
+ Next, for the through corridors test, As shown in Fig. 5, there
499
+ is more variance in the performance between each sUAS, with
500
+ UAS A performing the best, and UAS E performing the worst,
501
+ even though sUAS E tied for best in through apertures. This
502
+ is important, as there is more room for error while traversing
503
+ corridors, than there is traversing an aperture.
504
+ Takeoff and Land/Perch: For the takeoff and land/perch
505
+ test, the cFIS diagram can be found in Fig. 6e. The inputs
506
+ include pitch, yaw, number of crashes, completion percentage,
507
+ vertical and lateral obstruction, and number of rollovers. As
508
+ can be seen in Fig. 5 and Table III, sUAS A and sUAS G
509
+ perform best across both sections of the test and thus provide
510
+ the highest level of autonomy. Likewise, sUAS B performs the
511
+ worst in both portions of the test, showcasing a lower level of
512
+ autonomy, compared to the other sUAS. This evaluation allows
513
+ for the characterization of how an sUAS may perform during
514
+ portions of a mission which requires the system to takeoff or
515
+ land in a specified spot, of varying difficulty.
516
+ Room Clearing: Since the room clearing test is done in
517
+ a static environment, we included a time constraint in our
518
+ testing making the evaluation to focus on the performance
519
+ of the sUAS in regards to the Mission Complexity axis. The
520
+ designed cFIS can be seen in Fig. 6c. Inputs include light level,
521
+ number of obstructions, number of crashes, duration, coverage,
522
+ and landolt C depth detected. Results are found in Fig. 5, and
523
+ Table III. In this test, the strongest performer was UAS E;
524
+ however, most of the UAS performed closely to each other.
525
+ Surprisingly, a strong performance in the runtime endurance
526
+ test did not necessarily correlate to a strong performance in
527
+ this test. Both of these tests require a system with good maneu-
528
+ verability capabilities, but this test also requires a controller
529
+ which allows the user to visually identify different landmarks.
530
+ B. Final Results
531
+ UAS
532
+ T.C.
533
+ T.A.
534
+ Takeoff
535
+ Land
536
+ R.E.
537
+ R.C.
538
+ Predictive
539
+ Score
540
+ A
541
+ 1.0
542
+ 1.0
543
+ 1.0
544
+ 1.0
545
+ 0.5
546
+ 0.76
547
+ 0.85
548
+ B
549
+ 0.90
550
+ 1.0
551
+ 0.71
552
+ 0.87
553
+ 0.76
554
+ 0.73
555
+ 0.82
556
+ C
557
+ 0.84
558
+ 1.0
559
+ 1.0
560
+ 0.87
561
+ -
562
+ -
563
+ 0.92
564
+ D
565
+ -
566
+ -
567
+ 0.75
568
+ 0.97
569
+ 0.65
570
+ 0.75
571
+ 0.77
572
+ E
573
+ 0.80
574
+ 1.0
575
+ 0.82
576
+ 0.89
577
+ -
578
+ 0.85
579
+ 0.87
580
+ F
581
+ -
582
+ -
583
+ 0.99
584
+ 0.91
585
+ -
586
+ -
587
+ 0.95
588
+ G
589
+ 0.83
590
+ 0.83
591
+ 1.0
592
+ 1.0
593
+ 0.5
594
+ 0.79
595
+ 0.80
596
+ TABLE III: Scores of each sUAS for each test, as well as a weighted
597
+ multiple which allows for an overall evaluation of each sUAS
598
+ Contextual autonomy evaluations are concerned with the
599
+ performance of a system within an environment while per-
600
+ forming a specific task with a known level of complexity.
601
+ However, calculating an overall score that represents an av-
602
+ erage autonomy for a given system in a spectrum of tests
603
+ and environment is desirable. To combine the test scores into
604
+ a single score, we utilize a weighted product, with equal
605
+ weightings for each test, as we did previously in our non-
606
+ contextual evaluation [4]. The weighted product represented
607
+ as
608
+ P =
609
+ M
610
+
611
+ i
612
+ φwi
613
+ i ,
614
+ (2)
615
+ where M is the number of individual tests, φi represents an
616
+ individual test score, and wi the weight assigned to that test.
617
+
618
+ 1.0
619
+ T
620
+ T
621
+ 0.9
622
+ UASA
623
+ 0.8 -
624
+ UAS B
625
+ UAS C
626
+ 0.7 -
627
+ UAS D
628
+ UAS E
629
+ 0.6
630
+ UAS F
631
+ UAS G
632
+ 0.5
633
+ T.C.
634
+ T.A.
635
+ R.E.
636
+ R.C.
637
+ Takeoff
638
+ Land(a) Runtime Endurance (R.E.) test FIS
639
+ (b) Through Apertures (T.A.) test FIS
640
+ (c) Room Clearing (R.C.) test FIS
641
+ (d) Through Corridors (T.C.) test FIS
642
+ (e) Takeoff and Land/Perch test FIS
643
+ Fig. 6: Diagrams of each system of cascaded FIS utilized to
644
+ calculate scores for each test
645
+ has several benefits including that different test results can
646
+ be combined without requiring normalization or scaling. The
647
+ results for each sUAS are shown in Table III. It is important to
648
+ note that many of the sUAS perform better than the others in
649
+ some tests, but worse in others. One example of this is UAS
650
+ A, which has the fourth highest weighted multiple (overall
651
+ score), while performing the best in four out of six tests. This
652
+ is due to the sUAS’s relatively poor performance in both the
653
+ runtime endurance test, as well as in the room clearing test.
654
+ The use case of a singular score like this presents itself when
655
+ a user would like to know which sUAS is likely to provide
656
+ the most overall autonomy, across multiple tests and different
657
+ environment.
658
+ VII. CONCLUSIONS AND DISCUSSIONS
659
+ In this paper, we proposed a framework for evaluation of
660
+ contextual autonomy for robotic systems. Our framework con-
661
+ sists of a cascaded Fuzzy Inference System (cFIS) that com-
662
+ bines test results over three axes of evaluation (mission com-
663
+ plexity, environment complexity and human independence)
664
+ introduced by the ALFUS framework. We have designed
665
+ four tests with different mission complexity and environment
666
+ complexity levels and performed several experiments with
667
+ several sUAS, and we have shown that our modular framework
668
+ is adaptable to different tests. For future work, we plan to
669
+ extend our framework for performance evaluation.
670
+ To achieve this, a desired mission can be decomposed into
671
+ base tasks, such as takeoff/landing, traversing through environ-
672
+ ments/apertures, clearing rooms, and general maneuverability.
673
+ The user then can define a set of weights and calculate a
674
+ potential performance score of a sUAS for the target mission.
675
+ Unlike MPP [5], however, we suggest a method which is based
676
+ upon performance in set tasks, rather than a combination of
677
+ non-contextual attributes, and environmental factors.
678
+ ACKNOWLEDGMENT
679
+ This work is sponsored by the Department of the Army, U.S.
680
+ Army Combat Capabilities Development Command Soldier
681
+ Center, award number W911QY-18-2-0006. Approved for
682
+ public release #PR2022 88282
683
+ REFERENCES
684
+ [1] P. J. Durst and W. Gray, “Levels of autonomy and autonomous system
685
+ performance assessment for intelligent unmanned systems,” Engineer-
686
+ ing research and development center Vicksburg Ms Geotechnical and
687
+ Structures lab, Tech. Rep., 2014.
688
+ [2] B. T. Clought, “Metrics, schmetrics! how the heck do you determine
689
+ a uav’s autonomy anyway?” Air Force Research Laboratory, Wright-
690
+ Pattterson Air Force Base, OH, Tech. Rep., August 2002.
691
+ [3] P. J. Durst, W. Gray, and M. Trentini, “A non-contextual model for
692
+ evaluating the autonomy level of intelligent unmanned ground vehicles,”
693
+ in Proceedings of the 2011 Ground Vehicle Systems Engineering and
694
+ Technology Symposium, 2011.
695
+ [4] B. Hertel, R. Donald, C. Dumas, and S. R. Ahmadzadeh, “Methods
696
+ for combining and representing non-contextual autonomy scores for
697
+ unmanned aerial systems,” International Conference on Automation,
698
+ Robotics, and Applications (ICARA), vol. 8th, pp. 145–149, 2022.
699
+ [5] P. Durst, W. Gray, A. Nikitenko, J. Caetano, M. Trentini, and R. King,
700
+ “A framework for predicting the mission-specific performance of au-
701
+ tonomous unmanned systems,” International Conference on Intelligent
702
+ Robots and Systems, pp. 1962–1969, 2014.
703
+ [6] T. B. Sheridan, “Automation, authority, and angst – revisited,” vol. 35,
704
+ September 1991, pp. 2–6.
705
+ [7] R. Parasuraman, T. B. Sheridan, and C. D. Wickens, “A model for types
706
+ and levels of human interaction with automation,” IEEE Transactions on
707
+ Systems, Man, and Cybernetics–Part A: Systems and Humans, vol. 30,
708
+ pp. 286–297, May 2000.
709
+ [8] F. Kendoul, “Towards a unified framework for uas autonomy and
710
+ technology readiness assessment (ATRA),” pp. 55–71, 2 2013.
711
+ [9] H.-M. Huang, “Autonomy levels for unmanned systems framework;
712
+ volume II: Framework models,” NIST Special Publication: Gaithersburg,
713
+ MD, USA, p. 30, 2007.
714
+ [10] A. Norton, R. Ahmadzadeh, K. Jerath, P. Robinette, J. Weitzen, T. Wick-
715
+ ramarathne, H. Yanco, M. Choi, R. Donald, B. Donoghue et al.,
716
+ “Decisive test methods handbook: Test methods for evaluating suas in
717
+ subterranean and constrained indoor environments, version 1.1,” arXiv
718
+ preprint arXiv:2211.01801, 2022.
719
+
720
+ Obs.
721
+ Crashes
722
+ Environmental
723
+ Mission
724
+ Complexity
725
+ Complexity
726
+ Light
727
+ FIS
728
+ FIS
729
+ Level
730
+ Speed
731
+ Output
732
+ Test FIS
733
+ ScoreArea
734
+ Crashes
735
+ Environmental
736
+ Mission
737
+ Complexity
738
+ Complexity
739
+ Light
740
+ FIS
741
+ FIS
742
+ Level
743
+ Comp. %
744
+ Output
745
+ Test FIS
746
+ ScoreCoverage
747
+ Cs
748
+ Detected
749
+ Crashes
750
+ Light
751
+ Environmental
752
+ Mission
753
+ Complexity
754
+ Complexity
755
+ Duration
756
+ FIS
757
+ FIS
758
+ Ohs.
759
+ Output
760
+ Test FIS
761
+ ScoreArea
762
+ Crashes
763
+ Environmental
764
+ Mission
765
+ Complexity
766
+ Complexity
767
+ Light
768
+ FIS
769
+ FIS
770
+ Level
771
+ Comp. %
772
+ Vert.
773
+ Output
774
+ Test FIS
775
+ ScoreCrashes
776
+ Pitch
777
+ Rollovers
778
+ Yaw
779
+ Environmental
780
+ Mission
781
+ Complexity
782
+ Complexity
783
+ Comp. %
784
+ LR
785
+ FIS
786
+ FIS
787
+ VR
788
+ Output
789
+ Test FIS
790
+ Score
1dE0T4oBgHgl3EQfuQGc/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,472 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf,len=471
2
+ page_content='Contextual Autonomy Evaluation of Unmanned Aerial Vehicles in Subterranean Environments Ryan Donald Peter Gavriel Adam Norton S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
3
+ page_content=' Reza Ahmadzadeh PeARL lab and NERVE Center University of Massachusetts Lowell Lowell, USA Ryan Donald@student.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
4
+ page_content='uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
5
+ page_content='edu Peter Gavriel@uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
6
+ page_content='edu Adam Norton@uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
7
+ page_content='edu Reza Ahmadzadeh@uml.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
8
+ page_content='edu Abstract—In this paper we focus on the evaluation of con- textual autonomy for robots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
9
+ page_content=' More specifically, we propose a fuzzy framework for calculating the autonomy score for a small Unmanned Aerial Systems (sUAS) for performing a task while considering task complexity and environmental factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
10
+ page_content=' Our framework is a cascaded Fuzzy Inference System (cFIS) composed of combination of three FIS which represent dif- ferent contextual autonomy capabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
11
+ page_content=' We performed several experiments to test our framework in various contexts, such as endurance time, navigation, take off/land, and room clearing, with seven different sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
12
+ page_content=' We introduce a predictive measure which improves upon previous predictive measures, allowing for previous real-world task performance to be used in predicting future mission performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
13
+ page_content=' Index Terms—Contextual Autonomy, Unmanned Aerial Vehi- cles, Fuzzy Systems I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
14
+ page_content=' INTRODUCTION In today’s world, robots are expected to become increasingly present by assisting humans in performing various tasks in different environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
15
+ page_content=' While some robots have been designed for a single purpose, others can accomplish a variety of tasks with different levels of autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
16
+ page_content=' Measuring robot autonomy is an important and ever evolving concept and existing meth- ods for evaluating robot autonomy can be categorized into two main families: contextual and non-contextual.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
17
+ page_content=' While the former methods consider mission and task-specific measures (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
18
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
19
+ page_content=', ALFUS [1], ACL [2]), the latter only rely on implicit system capabilities and do not consider the mission and environment features (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
20
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
21
+ page_content=', NCAP [3], [4]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
22
+ page_content=' Our study in this paper focuses on evaluating the contextual autonomy for small Unmanned Aerial Systems (sUAS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
23
+ page_content=' Exist- ing methods such as ALFUS [1] and MPP [5] share a similar shortcoming in that neither provides a simple implementation for use with real-world systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
24
+ page_content=' Another drawback of existing methods that our approach addresses is the lack of a consistent process for breaking down tasks into sub-tasks and combining scores calculated for sub-tasks into a unified score for the given task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
25
+ page_content=' In this paper we propose a method for evaluating the contextual autonomy of sUAS based on a fuzzy interface that allows the operator to design and modify the evaluation system using linguistic reasoning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
26
+ page_content=' We designed four indoor tasks (endurance time, navigation, takeoff/land, and room clearing) and tested our interface in various experiments with seven different sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
27
+ page_content=' Our results show that the proposed approach calculates a contextual autonomy score that can be used to rank the systems for each context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
28
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
29
+ page_content=' RELATED WORK Some of the first and more simplistic methods of categoriz- ing autonomous systems are the Levels of Automation (LOA) proposed by Sheridan [6] and its later expansion [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
30
+ page_content=' LOA defines automation as “the full or partial replacement of a function previously carried out by the human operator” in a 1 to 10 range;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
31
+ page_content=' 1 being full control by the human and 10 being full control by the computer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
32
+ page_content=' LOA does not accurately describe how outside factors can affect the autonomous capability of a system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
33
+ page_content=' While it could theoretically be applied to a robot, it would not be accurate as it fails to accommodate for differing degrees of difficulty in tasks, and environmental factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
34
+ page_content=' Another evaluation method is known as the Autonomy Control Levels (ACL) [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
35
+ page_content=' ACL is designed for Unmanned Aerial Vehicles (UAV), and operates on a similar basis of uti- lizing autonomy levels from 0-10, with 0 being fully remotely controlled by a pilot, and 10 being a human-like system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
36
+ page_content=' These levels closely resemble the 10 LOA, following the same concept.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
37
+ page_content=' The ACL characterizes each system according to four metrics, which attempt to categorize different areas of autonomous behaviors for the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
38
+ page_content=' In each of these, an autonomy level from 0-10 is given based upon these behaviors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
39
+ page_content=' This system has a similar drawback, in that it does not account for difficulties in the mission itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
40
+ page_content=' Another method is the Autonomy and Technological Readi- ness Assessment (ATRA) [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
41
+ page_content=' ATRA attempts to combine both the basic theory behind the Autonomy Level, and the Tech- nology Readiness Level (TRL) metric into one framework [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
42
+ page_content=' TRL utilizes these two metrics in an attempt to evaluate the autonomy level provided by different technologies onboard the UAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
43
+ page_content=' This is emphasized as a solution for the gap between existing theoretical work and technological advances in the UAS autonomy space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
44
+ page_content=' Autonomy Levels for Unmanned Systems (ALFUS) is a method for defining the autonomy of a system in terms of three different axes [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
45
+ page_content=' ALFUS has a strong theoretical basis, but somewhat impractical in the real-world implementation due to the lack of maturity in some of these systems, as well arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
46
+ page_content='02603v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
47
+ page_content='RO] 6 Jan 2023 as the inability of most, if not all, available systems to reach the upper levels of the three axes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
48
+ page_content=' The three axes mentioned are known as the Mission Com- plexity (MC), Environmental Complexity (EC), and Human Independence (HI) axes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
49
+ page_content=' Each one of these axes pertains itself to a different aspect of the contextual autonomy of a system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
50
+ page_content=' The MC axis pertains mostly towards the difficulty of the tasks and movements required of the system to complete the task (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
51
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
52
+ page_content=' maneuvers, speed, searching).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
53
+ page_content=' Alternatively, the EC axis concerns itself with the difficulty in the performance of the task caused by environmental factors (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
54
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
55
+ page_content=' Lighting, Obstacles, Enclosed Spaces).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
56
+ page_content=' Lastly, the HI axis is representative of the level of independence between the user and the system (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
57
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
58
+ page_content=' task planning, task execution).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
59
+ page_content=' Due to the ability to split the representation of a system’s autonomy into these three axes, it allows for the character- ization and evaluation of system’s autonomy in real world tests, including the impact that both the environment and the mission profile can have on the system’s autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
60
+ page_content=' Our work in this paper is based off many of the ideas put forward through ALFUS, and we utilize it as a foundational part of our contextual autonomy evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
61
+ page_content=' The Mission Performance Potential is proposed as a method for the evaluation of a unmanned system’s autonomous per- formance, as well as a predictor for future missions [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
62
+ page_content=' This method provides a metric which represents the max- imum performance of a system in a given mission at a given autonomy level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
63
+ page_content=' Uniquely, this method includes both non-contextual autonomy metrics, and contextual autonomy metrics, and provides a single output prediction based on both types of data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
64
+ page_content=' One of the drawbacks of MPP is that it only provides a prediction of the performance of a system at a specified autonomy level for a specified mission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
65
+ page_content=' In other words, this does not evaluate how a real system performs, but rather the maximum potential for a system to perform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
66
+ page_content=' Our approach instead calculated the actual autonomy of a system based on actual data from real-world experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
67
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
68
+ page_content=' 1: Our cascaded Fuzzy Inference System used for calcu- lating a contextual autonomy score for a performed task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
69
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
70
+ page_content=' FRAMEWORK ALFUS’ summary model works with a set of metrics for each of its three axes, as well as a system of levels from 0 to 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
71
+ page_content=' These levels are based upon possible answers from those metrics, to provide a level evaluation of a system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
72
+ page_content=' As a generic framework, ALFUS tends to have a very broad, and somewhat open to interpretation, definition of metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
73
+ page_content=' For instance, in the case of the EC axis, it ranges from a “simple environment,” to an “extreme environment.” However, the summary model describes the system in terms of an autonomy level for each axis, while the Contextual Autonomy Capability within ALFUS provides an actual score for each axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
74
+ page_content=' Due to the autonomy level evaluation, there is some ambiguity when characterizing systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
75
+ page_content=' This is one of the main concerns with ALFUS, in that while it does provide a strong theoretical background, the actual implementation of the ideas with real-world systems is not as clear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
76
+ page_content=' We utilize Takagi-Sugeno Fuzzy Inference Systems (FIS) as a means to combine different metrics in an evaluation of an sUAS which is both easy to use, and allows us to use some data which is either not easily defined numerically, or inherently qualitative about the environment, combined with standard quantitative metrics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
77
+ page_content=' Fuzzy inferences also allow for slight deviations in a metric to not cause a drastic change in the evaluation of that sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
78
+ page_content=' We designed a set of tests with various mission and environment complexity levels (see Section V), and defined a fuzzy inference system for each test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
79
+ page_content=' Unlike MPP [5], our fuzzy inference systems are based on the three-axis model used in ALFUS, by creating an individual FIS for metrics associated with each axis (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
80
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
81
+ page_content=', MC, EC, HI), and an additional FIS which combines these three outputs into a single score.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
82
+ page_content=' This structure representing a cascaded FIS (cFIS) is illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
83
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
84
+ page_content=' For each test, the outcome of the FIS for all three axis is fed into a combining FIS that produces a final autonomy score.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
85
+ page_content=' Each FIS in our cFIS is a Sugeno-type FIS with multiple inputs and one output.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
86
+ page_content=' For each input of an FIS, we consider three membership functions (MFs) labeled as low, medium, and high.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
87
+ page_content=' Without loss of generality, we used triangular MFs, however, other types of MF can be used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
88
+ page_content=' The input variables used in different tests and their corresponding MF parameters have been reported in Table II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
89
+ page_content=' The output of each Sugeno-type FIS has five singleton MFs (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
90
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
91
+ page_content=', constant): very bad, bad, medium, good, very good.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
92
+ page_content=' Our FIS’ use a triangular fuzzifier and a Sugeno defuzzifier (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
93
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
94
+ page_content=', weighted average output).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
95
+ page_content=' For each FIS, we defined a rule base (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
96
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
97
+ page_content=', a set of linguistic rules).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
98
+ page_content=' In the cFIS structure in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
99
+ page_content=' 1, the defuzzified output of each FIS is a value in the range of [0, 1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
100
+ page_content=' For the initial three FIS, 0 and 1 represent the lowest and highest complexity, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
101
+ page_content=' In the case of the final FIS, 0 and 1 represent the lowest and the highest autonomy, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
102
+ page_content=' If we define the singleton value of each output function as zi, and the degree to which each output is weighted based upon the ruleset as wi, then the output final score can be calculated as follows: s = �N i=1 wizi �N i=1 wi (1) where N represents the number of rules in the rule base.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
103
+ page_content=' Table I reports an example of the fuzzy ruleset we used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
104
+ page_content=' The advantage of this system is that we can utilize many different Human Independence FIS Environmental Output Input Data Complexity TestFIS Score FIS Mission Complexity FISFig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
105
+ page_content=' 2: From left to right, top to bottom: Cleo Robotics Dronut, Flyability Elios 2, Lumenier Nighthawk 3, Parrot ANAFI USA GOV, Skydio X2D, Teal Drones Golden Eagle, Vantage Robotics Vesper types of data, and clearly define the ranges for each value, allowing the pilots performing the tests to provide feedback on the membership functions and rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
106
+ page_content=' Mission Complexity Axis Low Medium High Environment Complexity Axis Low Very Bad Bad Medium Medium Bad Medium Good High Medium Good Very good TABLE I: Fuzzy Ruleset utilized in our final combinational FIS IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
107
+ page_content=' UAS PLATFORMS Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
108
+ page_content=' 2 illustrates seven sUAS platforms evaluated in our ex- periments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
109
+ page_content=' The platforms include: the Cleo Robotics Dronut1, Flyability Elios 22, Lumenier Nighthawk 33, Parrot ANAFI USA GOV4, Skydio X2D5, Teal Drones Golden Eagle6, and Vantage Robotics Vesper7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
110
+ page_content=' These platforms provide a wide ranging set of capabilities and use cases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
111
+ page_content=' For instance, Parrot, Skydio X2D, Golden Eagle, and Vesper were developed for outdoor reconnaissance, whereas the Dronut and Elios 2 were developed for indoor reconnaissance and inspection, specif- ically in urban and industrial environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
112
+ page_content=' Previously, we have used the same set of sUAS for a non-contextual bench- marking [4], [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
113
+ page_content=' In our evaluations, we have anonymized the data by assigning the platforms labels A through G without any specific ordering or correlation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
114
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
115
+ page_content=' TEST DESIGN To evaluate the contextual autonomy of our platforms, we have designed several tests across a spectrum of areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
116
+ page_content=' The variables for which we collected data for each test is reported in Table II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
117
+ page_content=' In this section, we describe each test briefly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
118
+ page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
119
+ page_content=' 3 all tests have been designed for indoor environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
120
+ page_content=' 1https://cleorobotics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
121
+ page_content='com/ 2https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
122
+ page_content='flyability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
123
+ page_content='com/elios-2 3https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
124
+ page_content='lumenier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
125
+ page_content='com/ 4https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
126
+ page_content='parrot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
127
+ page_content='com/us/drones/anafi 5https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
128
+ page_content='skydio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
129
+ page_content='com/skydio-x2 6https://tealdrones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
130
+ page_content='com/suas-golden-eagle/ 7https://vantagerobotics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
131
+ page_content='com/vesper/ A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
132
+ page_content=' Runtime Endurance This family of tests focuses on the battery life of the system in various operational profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
133
+ page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
134
+ page_content=' 3a, the specific test we use from this group focuses on the system flying continuously in a figure-8 pattern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
135
+ page_content=' The main performance metric for the test is the test duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
136
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
137
+ page_content=' Navigation We have designed two main types of navigation tests, each with several profiles defined based on the type of movement (horizontal, vertical, or both) and the type of confinement (horizontal, vertical, or both).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
138
+ page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
139
+ page_content=' 3b, navigation through confined spaces involves traversal into and out of a continuously confined space, with tests for hallway, tunnel, stairwell, and shaft.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
140
+ page_content=' Navigation through apertures involves transient traversal through an opening, with tests for doorway and window.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
141
+ page_content=' Each navigation environment is characterized according to the dimensions of the confined space or aperture, lighting, surface textures, and the presence of obstructions on either side of the confined space or aperture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
142
+ page_content=' The main metrics of performance are efficacy and average navigation time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
143
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
144
+ page_content=' Room Clearing In this test method, the system performs a visual inspection of an example room whose walls, floor, and ceiling are out- fitted with visual acuity targets which contain nested Landolt C symbols of decreasing size.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
145
+ page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
146
+ page_content=' 3c, the test was performed under two conditions: with and without using camera zoom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
147
+ page_content=' The main performance metrics are duration, coverage, and average acuity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
148
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
149
+ page_content=' Takeoff and Land/Perch As illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
150
+ page_content=' 3d, these tests evaluate the system’s ability to takeoff and land or perch in various environments that may be affected by stabilization issues or preventative safety checks from the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
151
+ page_content=' The conditions tested vary the angle of the ground plane (flat, 5° and 10° pitch and roll) and the presence of obstructions (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
152
+ page_content='2-2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
153
+ page_content='4m overhead, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
154
+ page_content='6-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
155
+ page_content='2m lateral).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
156
+ page_content=' The main performance metric is efficacy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
157
+ page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
158
+ page_content=' RESULTS Utilizing our framework outlined in Section III, we calculate a performance score for each sUAS based upon the conditions and performance metrics detailed below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
159
+ page_content=' As mentioned above, our system provides a single score for each of the three attributes, the EC, MC and HI axes, and utilizes those scores to provide a single score for the entire test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
160
+ page_content=' It should be noted that although we consider all three axes in our cFIS structure, due to lack of data, we consider the lowest level (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
161
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
162
+ page_content=', full tele-operation) for the HI axis across all tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
163
+ page_content=' The test-specific details of the structure is discussed in corresponding sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
164
+ page_content=' Another factor to note is that for some of these experiments, some sUAS were not available at the time of testing, due to the sUAS being repaired, or other circumstances.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
165
+ page_content=' In this case, we attempt to remedy this by calculating a partial point achieved by the sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
166
+ page_content=' For situations where data for an entire test is (a) Runtime Endurance test showing a system performing a specified movement (b) Navigation tests (left to right, top to bottom): hallway, tunnel, stairwell, shaft, door, window.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
167
+ page_content=' (c) Room clearing test showing a system inspecting surfaces for visual acuity targets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
168
+ page_content=' (d) Takeoff and land/perch tests showing variations in ground plane angle (top row) and nearby obstructions (bottom row).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
169
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
170
+ page_content=' 3: Tests designed for the evaluation of sUAS contextual autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
171
+ page_content=' missing, we cannot fully evaluate the sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
172
+ page_content=' However, we have evaluated sUAS for individual tests for which the data was recorded.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
173
+ page_content=' Despite these edge cases, most sUAS had available data, which was used in our evaluations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
174
+ page_content=' As mentioned before, the proposed structure in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
175
+ page_content=' 1, was adapted to each specific test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
176
+ page_content=' The resulting cascaded FIS are depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
177
+ page_content=' 6 each of which represents a cFIS for a specific test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
178
+ page_content=' More specifically, each sub-figure shows the inputs and outputs of each cFIS, as well as how the FIS modules are connected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
179
+ page_content=' This is meant to provide a visual aid, which can be useful to keep track of each FIS, as we discuss the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
180
+ page_content=' Associated membership functions for each input, and the outputs, can be found in Table II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
181
+ page_content=' Some of the FIS surfaces, which show the relationship between two input values in an FIS, and the corresponding output value, are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
182
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
183
+ page_content=' Additionally, numerical results are reported in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
184
+ page_content='5 and Table III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
185
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
186
+ page_content=' Test Results Runtime Endurance: The runtime endurance test is likely the simplest of the tests performed, however, it is still a useful test in gauging how a sUAS might perform in a real mission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
187
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
188
+ page_content=' 3a illustrates the runtime endurance test design including the navigation path and two stands.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
189
+ page_content=' The adapted cFIS for this test is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
190
+ page_content=' 6a with four inputs: number of obstructions, number of crashes, light level and speed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
191
+ page_content=' Despite the simplicity of this test, some sUAS did not performed well largely due to slow speed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
192
+ page_content=' Our results indicate that some sUAS may have trouble in portions of this real- world mission which requires both speed and maneuverability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
193
+ page_content=' (a) Final FIS Surface (b) Through Aperture test EC (c) Takeoff and Land/Perch EC (d) Through Corridor MC Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
194
+ page_content=' 4: FIS surfaces for different tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
195
+ page_content=' In should be noted that during this test only four sUAS were available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
196
+ page_content=' Navigation: In the navigation tests, due to the differences between the through corridor and through apertures tests, two slightly different cascaded FIS were designed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
197
+ page_content=' These can be found in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
198
+ page_content=' 6b and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
199
+ page_content=' 6d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
200
+ page_content=' The input to the through corri- dors cFIS includes area (cross section), light level, verticality, coverage, number of crashes, and duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
201
+ page_content=' The inputs to the through apertures cFIS include area, light level, number of 10 degrees 10 degrees 5 degrees 5degree 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
202
+ page_content='2 mCutput_Score 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
203
+ page_content='5 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
204
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
205
+ page_content='5 MC 0 ECOutput_Score 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
206
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
207
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
208
+ page_content='2 0: 0 2 200 400 4 600 Area Light0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
209
+ page_content='7 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
210
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
211
+ page_content='3 10 10 5 5 Pitch 0 RollOutput_Score 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
212
+ page_content='5 00 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
213
+ page_content='5 Crashes 3 CompletionXVariables Description MFs: Triangular{Low, Medium, High} Area Aperture/Hallway Cross-Section (m2) [0, 0, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
214
+ page_content='7] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
215
+ page_content='6, 3, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
216
+ page_content='4] [3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
217
+ page_content='3, 6, 6] Light Ambient Light Level (Lux) [0, 0, 337.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
218
+ page_content='5] [75, 375, 675] [412.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
219
+ page_content='5, 750, 750] Vert Verticality (°) [0, 0, 37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
220
+ page_content='5] [7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
221
+ page_content='5, 45, 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
222
+ page_content='5] [52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
223
+ page_content='5, 90, 90] Crash Number of Crashes [0, 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
224
+ page_content='25] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
225
+ page_content='5, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
226
+ page_content='5, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
227
+ page_content='5] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
228
+ page_content='75, 3, 3] Rollovers Number of Rollovers [0, 0, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
229
+ page_content='25] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
230
+ page_content='5, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
231
+ page_content='5, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
232
+ page_content='5] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
233
+ page_content='75, 3, 3] Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
234
+ page_content=' % Completion Percentage [0, 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
235
+ page_content='55] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
236
+ page_content='15, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
237
+ page_content='6, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
238
+ page_content='92] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
239
+ page_content='7, 1, 1] Yaw/Pitch Static Yaw/Pitch Angle (°) [0, 0, 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
240
+ page_content='17] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
241
+ page_content='83, 5, 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
242
+ page_content='12] [5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
243
+ page_content='83, 10, 10] VR Static Vertical Obstruction (m) [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
244
+ page_content='6, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
245
+ page_content='6, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
246
+ page_content='1] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
247
+ page_content='7, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
248
+ page_content='2, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
249
+ page_content='7] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
250
+ page_content='3, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
251
+ page_content='8, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
252
+ page_content='8] LR Static Lateral Obstruction (m) [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
253
+ page_content='2, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
254
+ page_content='2, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
255
+ page_content='2] [1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
256
+ page_content='4, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
257
+ page_content='4, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
258
+ page_content='4] [2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
259
+ page_content='6, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
260
+ page_content='6, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
261
+ page_content='6] Coverage Coverage Percentage [0, 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
262
+ page_content='55] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
263
+ page_content='15, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
264
+ page_content='6, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
265
+ page_content='92] [0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
266
+ page_content='7, 1, 1] Cs Detected Landolt C Depth Detected [0, 0, 50] [10, 50, 90] [50, 100, 100] Duration Duration of Test (Minutes) [2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
267
+ page_content='5, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
268
+ page_content='5, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
269
+ page_content='25] [3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
270
+ page_content='05, 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
271
+ page_content='25, 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
272
+ page_content='45] [5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
273
+ page_content='25, 8, 8] Obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
274
+ page_content=' Number of Obstructions [0, 0, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
275
+ page_content='5] [1, 3, 5] [3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
276
+ page_content='5, 6, 6] Output Variable Description Sugeno MFs: Constant {Very Low to Very High} Score Combined Defuzzified Score [0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
277
+ page_content='25, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
278
+ page_content='5, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
279
+ page_content='75, 1] TABLE II: Membership Functions (MFs) for each input and output variable used in an FIS in the evaluation of these sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
280
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
281
+ page_content=' 5: Scores for each sUAS as a percentage of the maximum score possible on the y-axis, with each test on the x-axis crashes, and completion percentage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
282
+ page_content=' As shown above in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
283
+ page_content=' 5, each sUAS that performed the through apertures test, achieved a maximum score, besides sUAS G, which performed slightly worse, due to both issues in correctly traversing the aperture, as well as being the only sUAS to suffer a crash during the test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
284
+ page_content=' Next, for the through corridors test, As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
285
+ page_content=' 5, there is more variance in the performance between each sUAS, with UAS A performing the best, and UAS E performing the worst, even though sUAS E tied for best in through apertures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
286
+ page_content=' This is important, as there is more room for error while traversing corridors, than there is traversing an aperture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
287
+ page_content=' Takeoff and Land/Perch: For the takeoff and land/perch test, the cFIS diagram can be found in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
288
+ page_content=' 6e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
289
+ page_content=' The inputs include pitch, yaw, number of crashes, completion percentage, vertical and lateral obstruction, and number of rollovers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
290
+ page_content=' As can be seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
291
+ page_content=' 5 and Table III, sUAS A and sUAS G perform best across both sections of the test and thus provide the highest level of autonomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
292
+ page_content=' Likewise, sUAS B performs the worst in both portions of the test, showcasing a lower level of autonomy, compared to the other sUAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
293
+ page_content=' This evaluation allows for the characterization of how an sUAS may perform during portions of a mission which requires the system to takeoff or land in a specified spot, of varying difficulty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
294
+ page_content=' Room Clearing: Since the room clearing test is done in a static environment, we included a time constraint in our testing making the evaluation to focus on the performance of the sUAS in regards to the Mission Complexity axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
295
+ page_content=' The designed cFIS can be seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
296
+ page_content=' 6c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
297
+ page_content=' Inputs include light level, number of obstructions, number of crashes, duration, coverage, and landolt C depth detected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
298
+ page_content=' Results are found in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
299
+ page_content=' 5, and Table III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
300
+ page_content=' In this test, the strongest performer was UAS E;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
301
+ page_content=' however, most of the UAS performed closely to each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
302
+ page_content=' Surprisingly, a strong performance in the runtime endurance test did not necessarily correlate to a strong performance in this test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
303
+ page_content=' Both of these tests require a system with good maneu- verability capabilities, but this test also requires a controller which allows the user to visually identify different landmarks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
304
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
305
+ page_content=' Final Results UAS T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
306
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
307
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
308
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
309
+ page_content=' Takeoff Land R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
310
+ page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
311
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
312
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
313
+ page_content=' Predictive Score A 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
314
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
315
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
316
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
317
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
318
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
319
+ page_content='76 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
320
+ page_content='85 B 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
321
+ page_content='90 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
322
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
323
+ page_content='71 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
324
+ page_content='87 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
325
+ page_content='76 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
326
+ page_content='73 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
327
+ page_content='82 C 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
328
+ page_content='84 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
329
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
330
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
331
+ page_content='87 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
332
+ page_content='92 D 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
333
+ page_content='75 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
334
+ page_content='97 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
335
+ page_content='65 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
336
+ page_content='75 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
337
+ page_content='77 E 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
338
+ page_content='80 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
339
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
340
+ page_content='82 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
341
+ page_content='89 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
342
+ page_content='85 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
343
+ page_content='87 F 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
344
+ page_content='99 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
345
+ page_content='91 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
346
+ page_content='95 G 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
347
+ page_content='83 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
348
+ page_content='83 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
349
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
350
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
351
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
352
+ page_content='79 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
353
+ page_content='80 TABLE III: Scores of each sUAS for each test, as well as a weighted multiple which allows for an overall evaluation of each sUAS Contextual autonomy evaluations are concerned with the performance of a system within an environment while per- forming a specific task with a known level of complexity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
354
+ page_content=' However, calculating an overall score that represents an av- erage autonomy for a given system in a spectrum of tests and environment is desirable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
355
+ page_content=' To combine the test scores into a single score, we utilize a weighted product, with equal weightings for each test, as we did previously in our non- contextual evaluation [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
356
+ page_content=' The weighted product represented as P = M � i φwi i , (2) where M is the number of individual tests, φi represents an individual test score, and wi the weight assigned to that test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
357
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
358
+ page_content='0 T T 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
359
+ page_content='9 UASA 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
360
+ page_content='8 - UAS B UAS C 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
361
+ page_content='7 - UAS D UAS E 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
362
+ page_content='6 UAS F UAS G 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
363
+ page_content='5 T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
364
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
365
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
366
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
367
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
368
+ page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
369
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
370
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
371
+ page_content=' Takeoff Land(a) Runtime Endurance (R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
372
+ page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
373
+ page_content=') test FIS (b) Through Apertures (T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
374
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
375
+ page_content=') test FIS (c) Room Clearing (R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
376
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
377
+ page_content=') test FIS (d) Through Corridors (T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
378
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
379
+ page_content=') test FIS (e) Takeoff and Land/Perch test FIS Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
380
+ page_content=' 6: Diagrams of each system of cascaded FIS utilized to calculate scores for each test has several benefits including that different test results can be combined without requiring normalization or scaling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
381
+ page_content=' The results for each sUAS are shown in Table III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
382
+ page_content=' It is important to note that many of the sUAS perform better than the others in some tests, but worse in others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
383
+ page_content=' One example of this is UAS A, which has the fourth highest weighted multiple (overall score), while performing the best in four out of six tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
384
+ page_content=' This is due to the sUAS’s relatively poor performance in both the runtime endurance test, as well as in the room clearing test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
385
+ page_content=' The use case of a singular score like this presents itself when a user would like to know which sUAS is likely to provide the most overall autonomy, across multiple tests and different environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
386
+ page_content=' VII.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
387
+ page_content=' CONCLUSIONS AND DISCUSSIONS In this paper, we proposed a framework for evaluation of contextual autonomy for robotic systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
388
+ page_content=' Our framework con- sists of a cascaded Fuzzy Inference System (cFIS) that com- bines test results over three axes of evaluation (mission com- plexity, environment complexity and human independence) introduced by the ALFUS framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
389
+ page_content=' We have designed four tests with different mission complexity and environment complexity levels and performed several experiments with several sUAS, and we have shown that our modular framework is adaptable to different tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
390
+ page_content=' For future work, we plan to extend our framework for performance evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
391
+ page_content=' To achieve this, a desired mission can be decomposed into base tasks, such as takeoff/landing, traversing through environ- ments/apertures, clearing rooms, and general maneuverability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
392
+ page_content=' The user then can define a set of weights and calculate a potential performance score of a sUAS for the target mission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
393
+ page_content=' Unlike MPP [5], however, we suggest a method which is based upon performance in set tasks, rather than a combination of non-contextual attributes, and environmental factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
394
+ page_content=' ACKNOWLEDGMENT This work is sponsored by the Department of the Army, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
395
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
396
+ page_content=' Army Combat Capabilities Development Command Soldier Center, award number W911QY-18-2-0006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
397
+ page_content=' Approved for public release #PR2022 88282 REFERENCES [1] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
398
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
399
+ page_content=' Durst and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
400
+ page_content=' Gray, “Levels of autonomy and autonomous system performance assessment for intelligent unmanned systems,” Engineer- ing research and development center Vicksburg Ms Geotechnical and Structures lab, Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
401
+ page_content=' Rep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
402
+ page_content=', 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
403
+ page_content=' [2] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
404
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
405
+ page_content=' Clought, “Metrics, schmetrics!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
406
+ page_content=' how the heck do you determine a uav’s autonomy anyway?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
407
+ page_content=' Air Force Research Laboratory, Wright- Pattterson Air Force Base, OH, Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
408
+ page_content=' Rep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
409
+ page_content=', August 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
410
+ page_content=' [3] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
411
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
412
+ page_content=' Durst, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
413
+ page_content=' Gray, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
414
+ page_content=' Trentini, “A non-contextual model for evaluating the autonomy level of intelligent unmanned ground vehicles,” in Proceedings of the 2011 Ground Vehicle Systems Engineering and Technology Symposium, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
415
+ page_content=' [4] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
416
+ page_content=' Hertel, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
417
+ page_content=' Donald, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
418
+ page_content=' Dumas, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
419
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
420
+ page_content=' Ahmadzadeh, “Methods for combining and representing non-contextual autonomy scores for unmanned aerial systems,” International Conference on Automation, Robotics, and Applications (ICARA), vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
421
+ page_content=' 8th, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
422
+ page_content=' 145–149, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
423
+ page_content=' [5] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
424
+ page_content=' Durst, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
425
+ page_content=' Gray, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
426
+ page_content=' Nikitenko, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
427
+ page_content=' Caetano, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
428
+ page_content=' Trentini, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
429
+ page_content=' King, “A framework for predicting the mission-specific performance of au- tonomous unmanned systems,” International Conference on Intelligent Robots and Systems, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
430
+ page_content=' 1962–1969, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
431
+ page_content=' [6] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
432
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
433
+ page_content=' Sheridan, “Automation, authority, and angst – revisited,” vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
434
+ page_content=' 35, September 1991, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
435
+ page_content=' 2–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
436
+ page_content=' [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
437
+ page_content=' Parasuraman, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
438
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
439
+ page_content=' Sheridan, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
440
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
441
+ page_content=' Wickens, “A model for types and levels of human interaction with automation,” IEEE Transactions on Systems, Man, and Cybernetics–Part A: Systems and Humans, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
442
+ page_content=' 30, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
443
+ page_content=' 286–297, May 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
444
+ page_content=' [8] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
445
+ page_content=' Kendoul, “Towards a unified framework for uas autonomy and technology readiness assessment (ATRA),” pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
446
+ page_content=' 55–71, 2 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
447
+ page_content=' [9] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
448
+ page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
449
+ page_content=' Huang, “Autonomy levels for unmanned systems framework;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
450
+ page_content=' volume II: Framework models,” NIST Special Publication: Gaithersburg, MD, USA, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
451
+ page_content=' 30, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
452
+ page_content=' [10] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
453
+ page_content=' Norton, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
454
+ page_content=' Ahmadzadeh, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
455
+ page_content=' Jerath, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
456
+ page_content=' Robinette, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
457
+ page_content=' Weitzen, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
458
+ page_content=' Wick- ramarathne, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
459
+ page_content=' Yanco, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
460
+ page_content=' Choi, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
461
+ page_content=' Donald, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
462
+ page_content=' Donoghue et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
463
+ page_content=', “Decisive test methods handbook: Test methods for evaluating suas in subterranean and constrained indoor environments, version 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
464
+ page_content='1,” arXiv preprint arXiv:2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
465
+ page_content='01801, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
466
+ page_content=' Obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
467
+ page_content=' Crashes Environmental Mission Complexity Complexity Light FIS FIS Level Speed Output Test FIS ScoreArea Crashes Environmental Mission Complexity Complexity Light FIS FIS Level Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
468
+ page_content=' % Output Test FIS ScoreCoverage Cs Detected Crashes Light Environmental Mission Complexity Complexity Duration FIS FIS Ohs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
469
+ page_content=' Output Test FIS ScoreArea Crashes Environmental Mission Complexity Complexity Light FIS FIS Level Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
470
+ page_content=' % Vert.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
471
+ page_content=' Output Test FIS ScoreCrashes Pitch Rollovers Yaw Environmental Mission Complexity Complexity Comp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
472
+ page_content=' % LR FIS FIS VR Output Test FIS Score' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/1dE0T4oBgHgl3EQfuQGc/content/2301.02603v1.pdf'}
29AzT4oBgHgl3EQfDvqc/content/2301.00982v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:238c05bb2c4b5485a5f500f588390d0817b53181b533408dbfcb13c9e1d04508
3
+ size 527104
29AzT4oBgHgl3EQfDvqc/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8ecd74529d870b2367ff9a5aa8df7c2a57912aa5bca73da56692521e7e2dd52c
3
+ size 143232
2NE2T4oBgHgl3EQfNgYt/content/2301.03737v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4103581a037c7825836bea52df9fbccfd229c6fbdbcf089bbb1a8caaa267586c
3
+ size 270782
2NE2T4oBgHgl3EQfNgYt/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b28febea000be515d180a54ee7212f77a65c87eebc4836b4e9189689c14af45e
3
+ size 213808
2dAzT4oBgHgl3EQfRvud/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3df5c19b0a455eb3d58af2620d196e255a176c2a521091c1f251d36d6e469671
3
+ size 8388653
2tE2T4oBgHgl3EQfNgbv/content/tmp_files/2301.03739v1.pdf.txt ADDED
@@ -0,0 +1,850 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dowker Complexes and filtrations on self-relations
2
+ Dominic Desjardins Côté
3
+ January 11, 2023
4
+ Abstract
5
+ Given a relation on X × Y , we can construct two abstract simplicial complexes
6
+ called Dowker complexes.
7
+ The geometric realizations of these simplicial complexes
8
+ are homotopically equivalent. We show that if two relations are conjugate, then they
9
+ have homotopically equivalent Dowker complexes. From a self-relation on X, this is a
10
+ directed graph, and we use the Dowker complexes to study their properties. We show
11
+ that if two relations are shift equivalent, then, at some power of the relation, their
12
+ Dowker complexes are homotopically equivalent. Finally, we define a new filtration
13
+ based on Dowker complexes with different powers of a relation.
14
+ Keywords :
15
+ Dowker complex, relation, filtration, graph theory, shift equivalence
16
+ 1
17
+ Introduction
18
+ We can use multivalued maps to study dynamical systems [17]. The idea is to use Conley index [7]
19
+ on upper semi-continuous multivalued maps. In applications, it can be hard to study a dynamical
20
+ system. We can use a model that seems to fit data, but it can be a challenge to find it. Another way
21
+ is to discretize the continuous space and use to multivalued maps to approximate the underlying
22
+ dynamical system [8] [30]. Another approach is to use combinatorial structures. To name a few,
23
+ we can use combinatorial vector fields from Forman [13] [18] [9]. Moreover, a generalization was
24
+ proposed by Mrozek called combinatorial multivector fields [23] [25]. Finally, others proposed to
25
+ use the distributive lattices to compute attractors on finite data [19] [20] [21].
26
+ Multivalued maps can be restrictive. In [18], authors generalize them to partial multivalued
27
+ maps. But a partial multivalued map is equivalent to a relation. Some advancements were done
28
+ in [26] by using the Scymczak category of finite sets where objects are sets and morphisms are
29
+ relations. The Szymczak category [29] captures the essence of index pairs and index maps [7] which
30
+ is the core of the theory of Conley index. So one motivation of this paper is to continue to develop
31
+ the theory of relations, and it can be used to study dynamical system with finite data.
32
+ Our main object is a relation which is a subset of the cartesian product of two sets X and
33
+ Y . We can define two different abstract simplicial complexes on a relation. For the first simplicial
34
+ complex, we fixed a value y ∈ Y . For all elements in X, that they are related to y, they will span a
35
+ 1
36
+ arXiv:2301.03739v1 [math.CO] 10 Jan 2023
37
+
38
+ simplex together. For the second one, we reverse the role. We fixed a value x ∈ X. For all elements
39
+ in Y , that they are in relation with x, they will span a simplex together. They are called Dowker
40
+ complexes [10]. An important result is the Dowker’s Theorem. It says that the geometric realization
41
+ of these Dowker complexes are homotopically equivalent. The Dowker’s Theorem is quite useful in
42
+ applications. To name a few examples, we can use Dowker complexes to study signal coverage [14],
43
+ to find errors in relation of programs and files [1], to study the privacy of information [12] and in
44
+ social studies [3]. For the last one, this method is called Q-analysis which is developed by Atkins
45
+ [2]. The idea of Q-analysis is to study the q-connectivity and the q-tunnel of the Dowker complexes.
46
+ Our two main inspirations for definitions come from these articles [24] and [26].
47
+ They are many contributions in this article.
48
+ First, conjugate relations have homotopically
49
+ equivalent Dowker complex. If two relations are shift equivalent with lag l, then at a certain power
50
+ their Dowker complexes are homotopically equivalent. We can define a filtration on relation based
51
+ on the Dowker complex at different powers of a finite self-relation. Moreover, this can be computed
52
+ in finite time. We can also compute the 0th homology of a high enough power with the connected
53
+ components of the graph induced by the relation.
54
+ This article goes as follows. In section 2, we remind some concepts and definitions on finite
55
+ relation, graph, simplicial complex, Dowker complexes and finally the famous Dowker’s Theorem.
56
+ In section 3, we define right morphism and left morphism. If there exists a right or left morphism
57
+ between two relations, then there is an inclusion from one of the Dowker complexes. Moreover,
58
+ we show that if there exists a conjugacy between two relations, then their Dowker complexes are
59
+ homotopically equivalent. In section 4, we generalize the idea of right and left morphism for mul-
60
+ tivalued right and multivalued left morphism. We show two important properties needed for the
61
+ definition of a filtration. The Dowker complex of a certain power of a relation is include in the
62
+ Dowker complex of the same relation with a higher power. For some finite relations at certain a
63
+ power j, every other Dowker complexes of the same relation at power higher than j are the same.
64
+ We call it the stabilization of the Dowker complex. We show that shift equivalence between rela-
65
+ tions have homotopically equivalent Dowker complex at some power. In section 5, we can define a
66
+ filtration on the Dowker complexes of different powers of a relation under some simple conditions by
67
+ using the two properties in section 4. We can use persistent homology on these filtration to extract
68
+ topological features of the Dowker complex. If a relation is acyclic, then we have that the number
69
+ of connected components of the graph associated to the relation up to a certain power is equal to
70
+ the dimension of the 0th homology. It can be generalized to the class of simple relations. We also
71
+ have a similar result for strongly connected relations.
72
+ 2
73
+ Preliminaries
74
+ 2.1
75
+ Finite Relations
76
+ Let X and Y be finite sets. We define a relation as a subset of X × Y . Let (x, y) ∈ R ⊂ X × Y , we
77
+ denote by xRy or by y ∈ R(x). We define the composition of relations as follows. Let R1 ⊂ X × Y
78
+ and R2 ⊂ Y × Z.
79
+ 2
80
+
81
+ R2 ◦ R1 := {(x, z) ∈ R2 ◦ R1 | ∃y such that xR1y and yR2z}.
82
+ (1)
83
+ We define the inverse relation by swapping the sets of a relation.
84
+ R−1 := {(y, x) ∈ Y × X | y ∈ R(x)}
85
+ (2)
86
+ If a relation is a subset of X × X, then we say it’s a self-relation on X. We define the power of
87
+ a self-relation as follows :
88
+ Rn :=
89
+
90
+
91
+
92
+
93
+
94
+ R ◦ Rn−1
95
+ n > 0
96
+ IdX
97
+ n = 0
98
+ R−1 ◦ Rn+1
99
+ n < 0
100
+ The domain and the image for a relation R ⊂ X × Y are :
101
+ Dom R := {x ∈ X | ∃y such that (x, y) ∈ R}
102
+ (3)
103
+ Im R := {y ∈ Y | ∃x such that (x, y) ∈ R}.
104
+ (4)
105
+ We can see relations as partial multivalued maps. If Dom R = X, then we say that the relation
106
+ is a multivalued map. A relation is injective, if for all x1, x2 ∈ X, R(x1) = R(x2) implies that
107
+ x1 = x2. A relation is surjective if Im R = Y . Moreover, a map f : X → Y induces a relation
108
+ where (x, f(x)) ∈ R. Without ambiguity, we can compose maps and relations together to obtain a
109
+ new relation.
110
+ Definition 2.1. Let R be a self-relation on X. Let j be the least positive integer such that :
111
+ Rj = Rj+p for some p > 0.
112
+ We say that j is the index and the least p > 0 is the period. If j = 1, then R is periodic. A pair
113
+ (j, p) is the eventual period of R with index j and period p.
114
+ In other words, the period p will eventually be a period for R.
115
+ We sometimes use matrices with values in {0, 1} to represent relations. Let R ⊂ X × Y be a
116
+ relation with card(X) = m and card(Y ) = n. The matrix Mm×n have a value 1 at Mi,j if xiRyj
117
+ otherwise the value is 0. It can be called relation matrix, Boolean relation matrix, binary relation
118
+ matrix, binary Boolean matrix, (0, 1)-Boolean matrix and (0, 1)-matrix. For more information on
119
+ Boolean matrix theory, we refer to the book [22].
120
+ We say that a self-relation R on X has a cycle at x if and only if there exists an n ∈ N such
121
+ that xRnx. We say R as a fixed point at x, if n = 1. If a relation has no cycle at x for all x with
122
+ period n > 1, then the relation is acyclic. A cycle is a sequence x1, x2, . . . , xn such that x1 = xn
123
+ and xiRxi+1. A self-relation R on X is simple if for any two cycles are either disjoints or equals.
124
+ 3
125
+
126
+ 2.2
127
+ Graphs
128
+ In this subsection, we remind the definition of a graph and some notations.
129
+ Definition 2.2. A directed graph G is a pair (E, V ) where V is the set of vertices V and E is the
130
+ subset V × V the set of edges.
131
+ A relation can also be seen as a directed graph. If R is a self-relation on X, then X is the set
132
+ of vertices and the set of edges E = R. This graph has at most one directed edge from the vertex
133
+ A to the vertex B, and we also allow a self-loop on vertices. We note GR the graph induced by a
134
+ self-relation R.
135
+ Let x, y ∈ V . There is a (x, y)-path, if there exists a sequence of edges e1, e2, . . . , en ∈ E that
136
+ connect x to y without following the direction of edges. We can define an equivalence relation
137
+ on vertices of G. If there is a path between two vertices x and y, then x and y are in the same
138
+ class of equivalence. For a graph G, we say the number of connected components is the number of
139
+ class equivalences of the relation of paths. We say G is connected if there is only one connected
140
+ component.
141
+ If the sequence of edges of a (x, y)-path follows the direction of edges of the graph, then we
142
+ say it’s a (x, y)-walk. We can also define an equivalence relation with a walk between vertices. If
143
+ there is a walk from x to y and a walk from y to x, then x and y are in the same equivalence class.
144
+ This is the class of strongly connected components. For a graph G, we say the number of strongly
145
+ connected components is the number of class equivalence of the relation of walks. We say G is
146
+ strongly connected if there is only one strongly connected component.
147
+ 2.3
148
+ Simplicial Complexes and Dowker Complexes
149
+ In this subsection, we will discuss simplicial complex, Dowker complex and the Dowker’s Theorem.
150
+ For more information about simplicial complex, we suggest to read [27]. We do not present filtration
151
+ and persistent homology, but we refer to [11].
152
+ An abstract simplicial complex is a set K that contains finite non-empty sets such as if A ∈ K,
153
+ then for all subsets of A are also in K. For further examples, we use geometric simplex. A geometric
154
+ n-simplex is the convex hull of a geometrically independent sets of vertices {v0, v1, . . . , vn} ∈ RN.
155
+ This is the set of x ∈ RN such as x = �n
156
+ i=0 tixi and 1 = �n
157
+ i=0 ti where ti ≥ 0 for all i. We denote
158
+ an n-simplex by [v0, v1, . . . , vn] is the simplex spanned by the vertices v0, v1, . . . , vn. Any simplex
159
+ spanned by the subsets of {v0, v1, . . . , vn} are called faces and denote by the symbol ≤. A simplicial
160
+ complex is a collection of simplices for all σ ∈ K, if τ ≤ σ then τ ∈ K and if σ1 ∩ σ2 = τ, then τ
161
+ is either the empty set or τ is a face of σ1 and σ2. We say that L ≤ K if L is a sub-complex of
162
+ K. A simplicial complex is contractible if its homology is equivalent to a point. Given an abstract
163
+ simplicial K, we can define a geometric simplicial complex and |K| call the geometric realization of
164
+ K. We call 0-simplices vertices and 1-simplices edges. The closure of a simplex σ is the set of all
165
+ the faces of the simplex. We denote it by cl(σ). We need one more definition related to simplicial
166
+ complexes. It will be useful in some proofs.
167
+ 4
168
+
169
+ Definition 2.3. A simplicial complex K is edge-connected, if for any two vertices x and y there
170
+ is a sequence of edges e1, e2, . . . , en such that x ∈ e1, y ∈ en and cl(ei) ∩ cl(ei+1) ̸= ∅ for all
171
+ i = 1, 2, . . . , n − 1.
172
+ We have that the simplicial complex is connected if and only if it is edge-connected if and only
173
+ if H0 is dimension 1 [16].
174
+ Now we explain how to construct abstract simplicial complexes from a relation which are called
175
+ Dowker complexes. Let R ⊂ X × Y be a relation and X, Y be two finite sets. There are two ways
176
+ to construct the Dowker complex from a relation.
177
+ Definition 2.4. Let R ⊂ X × Y be a finite relation and KR be the Dowker complex. A simplex
178
+ [x1, x2, . . . , xn] ∈ KR if and only if ∃y ∈ Y such as xiRy for all i = 1, 2, . . . , n.
179
+ We have an analogous construction.
180
+ Definition 2.5. Let R ⊂ X × Y be a finite relation and LR be the Dowker complex. A simplex
181
+ [y1, y2, . . . , ym] ∈ LR if and only if ∃x ∈ X such as xRyi for all i = 1, 2, . . . , n.
182
+ We denote [x1, x2, . . . xn] = σy ∈ KR if and only if xiRy for all i = 1, 2, . . . , n. We use y as an
183
+ index for σy to note that all vertices of σy are in R−1(y). We use the same notation for σx ∈ LR
184
+ but the vertices are in R(x).
185
+ By using the matrix notation, we can use rows and columns to build the simplices. The columns
186
+ are for KR and the rows are for LR.
187
+ Example 2.6. Let R ⊂ X × Y be a finite relation.
188
+ R :=
189
+
190
+ ���
191
+ 1
192
+ 0
193
+ 0
194
+ 0
195
+ 1
196
+ 0
197
+ 0
198
+ 1
199
+ 1
200
+ 0
201
+ 1
202
+ 0
203
+ 0
204
+ 0
205
+ 1
206
+ 1
207
+ 1
208
+ 0
209
+ 0
210
+ 0
211
+
212
+ ���
213
+ (5)
214
+ The first column gives the 2-simplex [x1, x3, x4]. The third and the fourth column give the 0-
215
+ simplex [x2]. The second and the fifth column do not add new simplices. We obtain the simplicial
216
+ complex KR := {[x1, x3, x4], [x2]}.
217
+ The first row adds a 1-simplex [y1, y5] to LR. The second row gives a 1-simplex [y3, y4]. The
218
+ final row adds a 1-simplex [y1, y5]. We obtain the simplicial complex LR = {[y1, y5], [y3, y4], [y1, y2]}.
219
+ We obtain that |KR| and |LR| have two connected components and no higher dimension cycle.
220
+ The next theorem links to the homotopy between |KR| and |LR|.
221
+ Theorem 2.7 (Dowker’s Theorem). Let R ⊂ X × Y be a relation and let KR and LR be the
222
+ associated Dowker complexes. Then, the polyhedra |KR| and |LR| are homotopy equivalent.
223
+ 5
224
+
225
+ (a) Geometric realization of
226
+ the Dowker complex KR.
227
+ (b) Geometric realization of
228
+ the Dowker complex LR.
229
+ Figure 1: These are geometric realizations of the Dowker complexe in Example 2.6. They
230
+ are homotopically equivalent.
231
+ In 1952, Dowker [10] has shown that KR and LR have isomorphic homology groups. In 1995,
232
+ Björner [4] has shown that |KR| and |LR| are homotopically equivalent, which is the more com-
233
+ monly use in the literature. In recent years, Dowker complexes were regained in popularity in the
234
+ community of topology data analysis. We can use them to do a filtration on weighted networks [6].
235
+ In our cases, our filtration will be different and based on different powers of a self-relation.
236
+ 3
237
+ Left and Right Morphism
238
+ Let start with the definition of the graph homomorphism and next we define left and right morphisms
239
+ between relations.
240
+ Definition 3.1. Let R be a self-relation on X and R′ be a self-relation on Y . A map f : X → Y
241
+ is a graph homomorphism if the following condition is satisfied :
242
+ For every x1, x2 ∈ X such as x1Rx2 =⇒ f(x1)R′f(x2).
243
+ If f is bijective and its inverse is also a graph homomorphism, then f is a graph isomorphism.
244
+ We obtain that graph homomorphism keeps some information of the Dowker complex coming
245
+ from the first relation.
246
+ Lemma 3.2. Let f : X → Y be a graph homomorphism between R and R′. If f is injective, then
247
+ there exist a map p : KR �→ KR′.
248
+ 6
249
+
250
+ Proof. Consider a n-simplex [x0, x1, . . . , xn] ∈ KR. Then, there exists α ∈ X such as xiRα for
251
+ all i = 0, 1, 2, . . . n. We have that f is a graph homomorphism. This implies that f(xi)R′f(α)
252
+ for all i = 0, 1, 2, . . . , n. Indeed, f is injective implies that [f(x0), f(x1), . . . , f(xn)] is also a n-
253
+ simplex in KR′. So we can construct a map p : KR �→ KR′ by sending a simplex [x0, x1, . . . , xn] to
254
+ [f(x0), f(x1), . . . , f(xn)]. By the previous argument, p is well defined and injective.
255
+ If we have a graph isomorphism between two relations, then the Dowker complexes remain
256
+ unchanged. This holds because graph isomorphisms are relabelling on the vertices of a graph.
257
+ Proposition 3.3. Let R1 be a self-relation on X and R2 be a self-relation on Y . If there exists a
258
+ graph isomorphism f between R1 and R2, then they have the same Dowker complexes up to the label
259
+ of vertices.
260
+ Proof. Graph homomorphisms f and f−1 are injective. By the Lemma 3.2, there exist two injective
261
+ maps p : KR �→ KR′ and p′ : KR′ �→ KR. So we have that KR and KR′ are the same up to the
262
+ label of vertices.
263
+ By similar arguments, we can show it for LR and LR′.
264
+ Graph homomorphisms are nice, but they can drastically change the Dowker complexes. So,
265
+ we defined a left morphism which it changes the source of an edge and a right morphism which it
266
+ changes the target of an edge. In this way, only one of the Dowker complexes will change from the
267
+ right morphism or the left morphism.
268
+ Definition 3.4. A right morphism f : (X, Y, R) → (X, Z, R′) is a map f : Y → Z such that for
269
+ every x ∈ X and y ∈ Y :
270
+ xRy =⇒ xR′f(y).
271
+ We obtain this simple Lemma which is very useful for later proofs.
272
+ Lemma 3.5. If there exists a right morphism f : (X, Y, R) → (X, Z, R′), then KR ≤ KR′. We
273
+ obtain the equality if f is a bijective map.
274
+ Proof. Let f : (X, Y, R) → (X, Z, R′) be a right morphism and [x1, x2, . . . , xn] ∈ KR. This implies
275
+ there exists a y ∈ Y such as xiRy for all i = 1, 2, . . . , n. We obtain that xiR′f(y) for all i. Finally,
276
+ we have [x1, x2, . . . , xn] ∈ KR′.
277
+ Now, we suppose that f is bijective. Let [x1, x2, . . . , xn] ∈ KR′. Then, there exists a z ∈ Z such
278
+ that xiR′z for all i = 1, 2, . . . , n. We have f−1(z) ∈ Y and f−1 is well defined because f is bijective.
279
+ Then, xiRf−1(z) for all i = 1, 2, . . . , n. We obtain that [x1, x2, . . . , xn] ∈ KR.
280
+ The idea of right morphism comes from the article [24]. The author only considered the right
281
+ morphism. But, in our case, we are also interesting of modifying the first set in the cartesian product
282
+ of a relation.
283
+ 7
284
+
285
+ Definition 3.6. A left morphism g : (X, Z, R) → (Y, Z, R′) is a map g : X → Y such that for every
286
+ x ∈ X and z ∈ Z :
287
+ xRz =⇒ g(x)R′z.
288
+ We have an analogous Lemma for left morphism as the Lemma 3.5 for right morphism.
289
+ Lemma 3.7. If there exists a left morphism g : (X, Z, R) → (Y, Z, R), then LR ≤ LR′. We obtain
290
+ the equality if g is a bijective map.
291
+ With the definition of right and left morphism, we can easily show that if two relations are
292
+ conjugate, then there Dowker complexes are homotopically equivalent. We remind the definition of
293
+ conjugacy between relations before showing the proof.
294
+ Definition 3.8. Let R1 be a self-relation on X and R2 be a self-relation on Y . We say that R1 and
295
+ R2 are conjugate if there exists a bijective map ϕ : X → Y such as ϕ ◦ R1 = R2 ◦ ϕ.
296
+ Corollary 3.9. Let R be a self-relation on X and R′ be a self-relation on Y which are conjugate
297
+ by a bijective map ϕ : X → Y . Then, |KR|, |LR|, |LR′| and |KR′| are homotopy equivalent.
298
+ Proof. The map ϕ is bijective. It implies that KR = Kϕ◦R by Lemma 3.5 and LR′ = LR′◦ϕ by
299
+ Lemma 3.7.
300
+ By Dowker’s Theorem, we obtain that |KR| is homotopic equivalent to |LR′|, because Kϕ◦R =
301
+ KR′◦ϕ.
302
+ In [28], the author decides to combine the right and left morphism together. Let R ⊂ X × Y
303
+ and R′ ⊂ X′ × Y ′ be relations and f : X → X′ and g : Y → Y ′ be two maps. A pair (f, g) is
304
+ a morphism between relation R1 and R2 if for all x ∈ X, y ∈ Y such that xR1y it implies that
305
+ f(x)R2g(y). In [28], it is shown that the Dowker complex and (co)sheaf representation have nice
306
+ functoriality properties. In our case, it won’t be useful because we only need right or left morphism.
307
+ But we can see them as a pair (idX, f) where f is a right morphism and idX is the identity function
308
+ on X.
309
+ 4
310
+ Multi-right morphism and multi-left morphism
311
+ We want to work with multivalued maps. We generalize left and right morphism to multi-left and
312
+ multi-right morphism.
313
+ Definition 4.1. A multi-right morphism F : (X, Y, R) ⊸ (X, Z, R′) is a multivalued map F : Y ⊸
314
+ Z such as for all x ∈ X, y ∈ Y :
315
+ xRy =⇒ xR′a for all a ∈ F(y).
316
+ 8
317
+
318
+ We also obtain the same Lemma as before.
319
+ Lemma 4.2. Let R ⊂ X × Y and R′ ⊂ X × Z be relations. If there exist a multi-right morphism
320
+ F : (X, Y, R) ⊸ (X, Z, R′), then KR ≤ KR′. We obtain the equality if F is a bijective multivalued
321
+ map.
322
+ Proof. The proof is the same as Lemma 3.5.
323
+ Definition 4.3. A multi-left morphism G : (X, Z, R) ⊸ (Y, Z, R′) is a multivalued map G : X → Y
324
+ such for all x ∈ X, z ∈ Z :
325
+ xRz =⇒ aR′z for all a ∈ G(x).
326
+ Lemma 4.4. Let R ⊂ X × Z and R′ ⊂ Y × Z be relations. If there exist a multi-left morphism
327
+ G : (X, Z, R) ⊸ (Y, Z, R′), then LR ≤ LR′. We obtain the equality if G is a bijective multivalued
328
+ map.
329
+ We denote a multi-right morphism by mr-morphism and a multi-left morphism by ml-morphism.
330
+ Remarks 4.5. We remind that if a relation S ⊂ X×Y satisfies Dom S = X, then S is a well-defined
331
+ multivalued map. Moreover, for any relation R ⊂ Z ×X, we have that S : (Z, X, R) ⊸ (Z, Y, S ◦R)
332
+ is a well-defined mr-morphism. It is also true for ml-morphism.
333
+ The next corollary will be useful to define our filtrations.
334
+ Corollary 4.6. Let R be a self-relation on X. If Dom R = X, then KRn ≤ KRn+1. If Im R = X,
335
+ then LRn ≤ LRn+1.
336
+ Proof. Dom R = X implies that R is a multivalued map. Moreover, R : (X, X, Rn) ⊸ (X, X, Rn+1)
337
+ is well-defined mr-morphism. By Lemma 3.5, we have that KRn ≤ KRn+1.
338
+ In the same way, Im R = X implies that R−1 is a multivalued map.
339
+ We have that R−1 :
340
+ (X, X, Rn) ⊸ (X, X, Rn+1) is well-defined ml-morphism. By Lemma 3.7, we have that LRn ≤
341
+ LRn+1.
342
+ Remark 4.7. The hypothesis Dom R = X in the previous corollary is important. Let us show that
343
+ by an example. If R is a self-relation on X, define by this matrix such as :
344
+
345
+
346
+ 0
347
+ 1
348
+ 1
349
+ 0
350
+ 0
351
+ 1
352
+ 0
353
+ 0
354
+ 0
355
+
356
+
357
+ (6)
358
+ Then, we obtain KR = {[x2, x3], [x2], [x3]}, KR2 = {[x3]} and KRn = ∅ for n > 2.
359
+ We don’t have KRn ⊂ KRn+1 for all n ∈ N>0. If the matrix is nilpotent, then KRn is an empty
360
+ set for an n ∈ N>0.
361
+ 9
362
+
363
+ Using Corollary 4.6, we can show that the Dowker complexes of a relation stabilize at some
364
+ power n.
365
+ Corollary 4.8. Let R be a finite self-relation on X with an eventual period (j, p). If Dom R = X,
366
+ then, we have KRj = KRj+i for i ∈ N. If Im R = X, then LRj = LRj+i for i ∈ N.
367
+ Proof. By Corollary 4.6, we have the sequence :
368
+ KRj ≤ KRj+1 ≤ . . . ≤ KRj+p−1 ≤ KRj+p.
369
+ (7)
370
+ But p is the period of R, hence Rj = Rj+p implies that KRj = KRj+p. By (7), we obtain
371
+ KRj = KRj+i for i ∈ N. A similar proof can be done for LRj = LRj+i for i ∈ N.
372
+ We remind the definition of shift equivalence between two relations and we show the assump-
373
+ tion that relations are shift equivalences implies that theirs Dowker complexes are homotopically
374
+ equivalent at some power for each relation.
375
+ Definition 4.9. Let R1 be finite self-relation on X and R2 be finite self-relation on Y . R1 and R2
376
+ are shift equivalent with a lag l, if there exists two relations S ⊂ X × Y and T ⊂ Y × X such as :
377
+ R1 ◦ T = T ◦ R2
378
+ S ◦ R1 = R2 ◦ S
379
+ T ◦ S = Rl
380
+ 1
381
+ S ◦ T = Rl
382
+ 2
383
+ We say it is a strong shift equivalence if l = 1.
384
+ Corollary 4.10. Let R1 be finite self-relation on X with Dom R1 = X = Im R1 and R2 be finite
385
+ self-relation on Y with Dom R2 = Y = Im R2. Let (jp, p) be an eventual period of R1 and (jq, q)
386
+ be an eventual period of R2. Without loss of generality, we suppose that jp ≥ jq. If R1 and R2 are
387
+ shift equivalent with lag l, then |KR
388
+ jp
389
+ 1 |, |KR
390
+ jq
391
+ 2 |, |LR
392
+ jp
393
+ 1 | and |LR
394
+ jq
395
+ 2 | are homotopy equivalent.
396
+ Proof. If R1◦T = T ◦R2 then Rn
397
+ 1 ◦T = T ◦Rn
398
+ 2 is also true for n ∈ N. Moreover, we have Dom S = X
399
+ and Dom T = Y , because Dom R1 = X, Dom R2 = Y , T ◦ S = Rl
400
+ 1 and S ◦ T = Rl
401
+ 2. So we have
402
+ that S and R are well defined multivalued maps.
403
+ We want to show that KR
404
+ jp
405
+ 1
406
+ = KS◦R
407
+ jp
408
+ 1
409
+ and LR
410
+ jq
411
+ 2
412
+ = LR
413
+ jq
414
+ 2 ◦S. We are going to use T and S as
415
+ mr-morphism with R1 and ml-morphism with R2.
416
+ We have that S : (X, X, Rjp
417
+ 1 ) ⊸ (X, Y, S ◦ Rjp
418
+ 1 ) and T : (X, Y, S ◦ Rjp
419
+ 1 ) ⊸ (X, X, T ◦ S ◦ Rjp
420
+ 1 )
421
+ are well-defined mr-morphisms. We have T ◦ S = Rl
422
+ 1. It implies that T ◦ S ◦ Rjp
423
+ 1 = Rl+jp
424
+ 1
425
+ . We
426
+ obtain KR
427
+ jp
428
+ 1 ≤ KS◦R
429
+ jp
430
+ 1 ≤ KT◦S◦R
431
+ jp
432
+ 1 = KR
433
+ l+jp
434
+ 1
435
+ . The eventual period of R1 is (jp, p). It implies that
436
+ KR
437
+ jp
438
+ 1 = KR
439
+ jp+l
440
+ 1
441
+ . We obtain that KR
442
+ jp
443
+ 1 = KS◦R
444
+ jp
445
+ 1 .
446
+ We can see that S : (Y, Y, Rjp
447
+ 2 ) ⊸ (X, Y, Rjp
448
+ 2 ◦ S) and T : (X, Y, Rjp
449
+ 2 ◦ S) ⊸ (Y, Y, Rjp
450
+ 2 ◦ S ◦ T)
451
+ are well-defined ml-morphisms. We have S ◦ T = Rl
452
+ 2. It implies that Rjp
453
+ 2 ◦ S ◦ T = Rjp+l
454
+ 2
455
+ . We
456
+ 10
457
+
458
+ (a) The graph GR1.
459
+ (b) The graph GR2.
460
+ Figure 2: Theses are the graphs from Example 4.11.
461
+ obtain LR
462
+ jp
463
+ 2 ≤ LR
464
+ jp
465
+ 2 ◦S ≤ LR
466
+ jp
467
+ 2 ◦S◦T = LR
468
+ jp+l
469
+ 2
470
+ . We have LR
471
+ jq
472
+ 2 = LR
473
+ jp+l
474
+ 2
475
+ because jp ≥ jq. We obtain
476
+ LR
477
+ jp
478
+ 2 = LR
479
+ jp
480
+ 2 ◦S.
481
+ Finally, we have KR
482
+ jp
483
+ 1 = KS◦R
484
+ jp
485
+ 1 = KR
486
+ jp
487
+ 2 ◦S and LR
488
+ jp
489
+ 2 = LR
490
+ jp
491
+ 2 ◦S = LS◦R
492
+ jp
493
+ 1 . By Dowker’s Theorem,
494
+ we obtain that |KR
495
+ jp
496
+ 1 |, |KR
497
+ jq
498
+ 2 |, |LR
499
+ jp
500
+ 1 | and |LR
501
+ jq
502
+ 2 | are homotopy equivalent.
503
+ Example 4.11. Let X be a finite set with 8 points and Y be a finite set with 3 points. Let R1 be
504
+ a self-relation on X and R2 be a self-relation on X defined by those graphs in Figure 2. R1 has an
505
+ eventual period (3, 3) and R2 has an eventual period (1, 3). We see in Figures 3(a), (b) and (d) that
506
+ the Dowker complexes are not homotopically equivalent. But, in Figures 3 (c) and (d), the Dowker
507
+ complexes with relations at power 3 are homotopically equivalent.
508
+ There is an interesting proposition from [15] that we can use for strongly connected relations.
509
+ We remind that an indecomposable Boolean matrix is a relation which is strongly connected and J
510
+ is a square matrix where all the entries are equals to 1.
511
+ Proposition 4.12 (Proposition 4.3 in [15] ). Every indecomposable Boolean matrix with positive
512
+ trace is strong shift equivalent to J.
513
+ We can easily compute the Dowker complexes of J. It is a (n−1)-simplex where n is the number
514
+ of rows of J for both Dowker complexes. Finally, we obtain that the Dowker complexes of a strongly
515
+ connected self-relation at a power high enough are contractible if the trace is strictly positive.
516
+ 11
517
+
518
+ Y3(a) Dowker complex of |KR1|.
519
+ (b) Dowker complex of |LR1|.
520
+ (c) Dowker complexes of |KR3
521
+ 1| and
522
+ |LR3
523
+ 1|.
524
+ (d)
525
+ Dowker
526
+ complexes
527
+ |KR2|, |LR2|, |KR3
528
+ 2| and |LR3
529
+ 2|.
530
+ Figure 3: Theses are the different Dowker complexes from Example 4.11.
531
+ 12
532
+
533
+ 5
534
+ Filtrations of Dowker complexes
535
+ For this section, we suppose that a R is a finite self-relation on X. From Corollary 4.6, if Dom R =
536
+ X, then we have KRi ≤ KRi+1 for all i ≥ 0. We have an inclusion and we get this filtration :
537
+ KR �→ KR2 �→ . . . �→ KRi �→ KRi+1 �→ . . .
538
+ (8)
539
+ In the same way with Im R = X, we have LRi ≤ LRi+1. We obtain another filtration :
540
+ LR �→ LR2 �→ . . . �→ LRi �→ LRi+1 �→ . . .
541
+ (9)
542
+ From Corollary 4.8, the Dowker complexes stabilize at a certain power. This means we can
543
+ compute the filtration (8) and (9) in finite time. For our filtrations, we start at i = 1, but we could
544
+ also start with the i = 0. We have that R0 = idX and R : (X, X, idX) ⊸ (X, X, R) is a well-defined
545
+ mr-morphism, if Dom R = X. Then, the filtration (8) becomes :
546
+ KidX = KR0 �→ KR �→ KR2 �→ . . . �→ KRi �→ KRi+1 �→ . . .
547
+ (10)
548
+ And for the filtration (9) by applying similar arguments, we obtain :
549
+ LidX = LR0 �→ LR �→ LR2 �→ . . . �→ LRi �→ LRi+1 �→ . . .
550
+ (11)
551
+ The homology of KidX and Lidx is the homology of n = card(X) points. In some cases, we
552
+ might want to start the filtration at i = 0 or i = 1.
553
+ We remind that, by Dowker’s Theorem, |KRi| and |LRi| are homotopically equivalent for all
554
+ i ∈ N. We obtain the same bar code representation for filtrations (8) and (9).
555
+ Example 5.1. Let R1 be a self-relation on X given by the graph in the Figure 4(a). R1 has 9 nodes
556
+ and is acyclic. The eventual period is (3, 1). We obtain the bar code at Figure 4(b). It has one
557
+ generator of H1 with the interval [1, 2] and we had 3 generators of H0 that die early and 1 generator
558
+ of H0 that survive to infinity.
559
+ Example 5.2. Let R2 be a self-relation on X given by the graph in the Figure 4(c). R2 has 10
560
+ nodes and is simple. The eventual period is (3, 4). We obtain the bar code at the Figure 4(d). It has
561
+ 4 generators of H0 that die at time 2 and 2 other generators that survive to infinity.
562
+ For the next results, we compute the 0th homology of the Dowker complexes for different types
563
+ of relation.
564
+ If R is a finite acyclic self-relation, then it has an eventual period p = 1 and j ∈ N>0 such as
565
+ Rj = Ri for all i ≥ j. So we denote this relation Rj by R∞, because it converges to a relation when
566
+ i → ∞.
567
+ 13
568
+
569
+ (a) The graph of the acyclic rela-
570
+ tion from Example 5.1.
571
+ (b) The associated bar code of the rela-
572
+ tion from Example 5.1. We use the fil-
573
+ tration with KRi
574
+ 1. The first bar in orange
575
+ is a generator in H1 and the others four
576
+ bars in blue are generators in H0.
577
+ (c) The graph of the relation with
578
+ multiple cycles from Example 5.2.
579
+ (d) The associated bar code of the rela-
580
+ tion from Example 5.2. We use the fil-
581
+ tration with KRi
582
+ 2. The six bars in blue
583
+ are generators in H0.
584
+ Figure 4: In these figures, we have the graph on the left and the associated bar code diagram
585
+ on the right for Examples 5.1 and 5.2. Dashed lines in bar code mean it goes to infinity.
586
+ 14
587
+
588
+ 4.0
589
+ T
590
+ 3.5
591
+ -
592
+ 3.0
593
+ T
594
+ 2.5
595
+ 2.0
596
+ 1.5
597
+ 1.0
598
+ -
599
+ 0.5
600
+ 0.0
601
+ 1.0
602
+ 1.5
603
+ 2.0
604
+ 2.5
605
+ 0'E
606
+ 3.5
607
+ 4.0
608
+ 4.5
609
+ 5.0X5
610
+ X105 .
611
+ 4
612
+ 3 -
613
+ 1
614
+ 1.0
615
+ 1.5
616
+ 2.0
617
+ 2.5
618
+ 3.0
619
+ 3.5
620
+ 4.0
621
+ 4.5
622
+ 5.0X3Definition 5.3. We say that x ∈ X is a minimum for a self-relation R, if there exists no y ∈ X
623
+ such as x ̸= y and xR∞y. We denote the set Ux := {y ∈ X | yR∞x}.
624
+ We say that x ∈ X is a maximum for a self-relation R, if there exists no y ∈ X such as x ̸= y
625
+ and yR∞x. We denote the set Dx := {y ∈ X | xR∞y}.
626
+ The maximums and minimums of an acyclic relation are important, because they are responsible
627
+ for the maximal simplices of KR∞ and LR∞.
628
+ Lemma 5.4. Let R be a finite acyclic self-relation on X with Dom R = X. Then, the maximal
629
+ simplices of KR∞ are given by the minimums of R∞.
630
+ Proof. We have that Dom R = X it implies that Dom R∞ = X. Then, for all x ∈ X there exists
631
+ z ∈ X such that xR∞z and z is a minimum. Let σy = [x1, x2, . . . , xn] ∈ KR∞ be an arbitrary
632
+ simplex. We have an y ∈ X such as xiR∞y for all i = 1, 2, . . . , n. By the first argument, there
633
+ exists a minimum z ∈ X such as yR∞z. Therefore, we have xiR∞yR∞z. Then, σy ⊂ σz.
634
+ We can do a similar result with LR∞ by using the maximums of R∞, if Im R = X.
635
+ Theorem 5.5. Let R an acyclic finite self-relation on X with Dom R = X.
636
+ number of connected components of GR = dim H0(KR∞) = dim H0(LR∞)
637
+ (12)
638
+ Proof. First, by Dowker’s Theorem, we have dim H0(KR∞) = dim H0(LR∞). We suppose that GR is
639
+ connected and show that dim H0(KR∞) = 1. More precisely, we show that KR∞ is edge-connected.
640
+ We have that Dom R = X implies that for all x ∈ X,[x] ∈ KR∞.
641
+ Let x, x′ ∈ X. There exists y1 ∈ X a minimum such as xR∞y1 and y1R∞y1. This implies
642
+ that e1 = [x, y1] ∈ KR∞. We also have that there exists yn ∈ X a minimum such as x′R∞yn and
643
+ ynR∞yn. This implies that en = [x′, yn] ∈ KR∞.
644
+ Since GR is connected, there exists a (y1, yn)-path of finite length. We denote this sequence by
645
+ y1, z1, z2, z3, . . . , zm, yn. Without loss of generality, we take the shortest path. There exist a i such
646
+ as zi ∈ Uy1 and zi+1 /∈ Uy1. First, we have e2 = [y1, zi] ∈ KR∞ and ziRzi+1. There exists y2 ̸= y1 a
647
+ minimum such as zi+1R∞y2. This implies that ziR∞y2 and we have the edge e3 = [zi, y2] ∈ KR∞.
648
+ We can repeat this process with the (y2, yn)-path until we obtain a sequence of edges that connect
649
+ the vertex [x] and [x′]. We obtain that KR∞ is edge-connected.
650
+ Now suppose that GR is not connected. Let H be a connected component of GR. Then, for all
651
+ x ∈ H and for all y /∈ H, we have that x /∈ R(y) and y /∈ R(x). It implies that for each connected
652
+ component gives a single generator for H0(KR∞).
653
+ We can construct a map j : cc(GR) → H0(KR∞) that sends the connected components of GR to
654
+ the generators of H0(KR∞). By the previous argument, we can make this map j injective . For any
655
+ generator g in H0(KR∞), there exists a x ∈ X such as g is homologous to [x] because Dom R = X.
656
+ This implies there exists a H ∈ cc(GR) such as x ∈ H. We obtain that the map j is bijective and
657
+ the equality (12).
658
+ 15
659
+
660
+ Figure 5: The graph of R4
661
+ 2 from Example 5.2. GR4
662
+ 2 has 2 connected components.
663
+ We can show a similar proof for simple relations.
664
+ Theorem 5.6. Let R be a finite simple self-relation on X with Dom R = X and (j, p) be an eventual
665
+ period. Assume that GR is connected. There exists a r ∈ N such that :
666
+ dim H0(KRj) = dim H0(LRj) = number of connected components of GRr.
667
+ (13)
668
+ Proof. We can find q big enough so that Rq is acyclic, because R is a simple relation. We choose a i ∈
669
+ N such as iq > j. We fix r = iq. We also have that Rr is also acyclic. By Corollary 4.8, we have that
670
+ KRj = KRr. By Theorem 5.5, we know that dim H0(KRj) = number of connected components of Rr.
671
+ If GR has more than one connected component, we apply this theorem for each connected
672
+ component of GR by using similar arguments as the proof of Theorem 5.5. From preceding results,
673
+ if Dom R ̸= X but Im R = X, we can redo the proofs with LRj. Another approach is to use R−1,
674
+ because Dom R−1 = X.
675
+ Remark 5.7. In Example 5.2, it is a simple relation. We have R4
676
+ 2 is acyclic. The graph of R4
677
+ 2 is
678
+ shown in Figure 5. It has two connected components and the bar code from Figure 4(b) has 2 bars
679
+ goes to infinity. It is expected from Theorem 5.6.
680
+ We have shown earlier in Corollary 4.10 and Proposition 4.12 that a strongly connected self-
681
+ relation R is shift equivalent to a matrix J, if tr(R) > 0. But we will like to have a result for any
682
+ strongly connected relations. But, first we need some definition and other results from other papers.
683
+ Let gcd(a, b) be the great common divisor of a and b. We define :
684
+ q = gcd(n1, n2, n3, . . .)
685
+ (14)
686
+ where ni is the length of a cycle and i ∈ I is the set of all different cycles from R.
687
+ We obtain this proposition :
688
+ Proposition 5.8 (Proposition 6.12 in [26]). Let R be a strongly connected self-relation on X, (j, p)
689
+ be the eventual period and q defined by (14). We have q|j.
690
+ 16
691
+
692
+ Let’s define a new equivalence relation ∼q for a strongly connected self-relation R. We say that
693
+ x ∼q y, if for each (x, y)-walk has length equal to 0 modulo q. It is an equivalence relation.
694
+ Proposition 5.9 (Proposition 6.16 in [26]). Let R be a strongly connected self-relation on X. Let q
695
+ defined as (14). Then, ∼q is an equivalence relation in X with exactly q distinct equivalence classes.
696
+ We need one more Lemma before showing our final result.
697
+ Lemma 5.10 (Lemma 6.25 in [26]). Let R be a strongly connected self-relation on X and (j, p) an
698
+ eventual period. Then,
699
+ x ∼q x′ =⇒ Rj(x) = Rj(x′).
700
+ (15)
701
+ We are going to show that the number of class equivalence of ∼q is equal to dim(H0(KRj)) for
702
+ a strongly connected self-relation with eventual period (j, p).
703
+ Theorem 5.11. Let R be a finite self-relation on X with an eventual period (j, p), R is strongly
704
+ connected, q defined by (14). Then, we have :
705
+ number of [x]∼q = q = dim(H0(KRj)) = dim(H0(LRj)).
706
+ (16)
707
+ Proof. We show that for any x, y ∈ X, if x ∼q y, then x and y are edge-connected and if x ̸∼q y,
708
+ then x and y are not edge-connected.
709
+ First, we suppose that x ∼q y. By Lemma 5.10, we have that Rj(x) = Rj(y) ̸= ∅. There exists
710
+ a z ∈ Rj(x). It implies that [x, z] and [y, z] are in KRj. So, each vertex in the same equivalence
711
+ class is edge-connected.
712
+ Now, we suppose that, x ̸∼q y. There exists a (x, y)-walk of length n modulo q where n ̸= 0.
713
+ Let show that Rj(x) ∩ Rj(y) = ∅ . Let’s suppose there exists a z ∈ Rj(x) ∩ Rj(y). This implies
714
+ there exists a (x, z)-walk of length j and a (y, z)-walk of length j. But, from Proposition 5.8, q|j.
715
+ This implies x ∼q z and y ∼q z. But ∼q is an equivalence relation. We obtain that x ∼q y which is
716
+ a contradiction. We obtain that x ̸∼q y implies Rj(x) ∩ Rj(y) = ∅. We obtain that if x ∼q y then
717
+ they are edge-connected. But, if x ̸∼q y, then they are not edge-connected. There is q different
718
+ equivalence classes. The proof is complete.
719
+ For the case of R is an arbitrary relation, it is harder to find its homology H0. Also, for higher
720
+ dimensions of the homology groups, it’s hard to tell what happens. Further investigations are needed
721
+ for both cases.
722
+ Now, we return to the filtrations defined earlier. There are two other types of filtrations that we
723
+ can use. If R is a self-relation on X with Dom R = X = Im R, then we can use both filtrations. But
724
+ we obtain the same bar codes for both. That holds because, for each i ∈ N, |KRi| is homotopically
725
+ equivalent to |LRi| for any self-relation. We might need to come with other types of filtration. We
726
+ suggest two other types of filtration.
727
+ It will be interesting to use a zigzag filtration [5] with KRi and LRi by alternating them. It will
728
+ probably depend on the relation. Further investigations are needed.
729
+ 17
730
+
731
+ We will present an interesting bi-filtration with KRm and LRn. We have that, if KRm ⊂ KRm+1
732
+ and LRn ⊂ LRn+1, then KRm ∩LRn ⊂ KRm+1 ∩LRn and KRm ∩LRn ⊂ KRm ∩LRn+1 for all m, n ∈ N.
733
+ We obtain this bi-filtration :
734
+ ...
735
+ ...
736
+ . . .
737
+ KRm ∩ LRn
738
+ KRm+1 ∩ LRn
739
+ . . .
740
+ . . .
741
+ KRm ∩ LRn+1
742
+ KRm+1 ∩ LRn+1
743
+ . . .
744
+ ...
745
+ ...
746
+ The computation of the bi-filtration is also finite. Because the relation R is finite and Dom R =
747
+ X = Im R. We obtain an eventual period (j, p). In the bi-filtration, there are, at maximum, j2
748
+ different simplicial complexes to compute.
749
+ One may ask why the intersection is a good idea to consider. Let’s explain it in more details.
750
+ Let R be a self-relation on X with Dom R = X = Im R and m, n ∈ N. Let σ ∈ KRm ∩ LRn where
751
+ σ = [x1, x2, . . . , xd]. Then, there exists xω ∈ X such that xiRmxω and there exists xα ∈ X such
752
+ that xαRnxi for all i. Another way to see this is, for each xi ∈ σ, there exists a (xω, xα)-walk of
753
+ length m+n passing through xi. We can subdivide this (xω, xα)-walk into a (xω, xi)-walk of length
754
+ m and a (xi, xα)-walk of length n. So, by only the existence of a simplex σ in KRm ∩ LRn, each
755
+ vertex of σ, it has a walk with a common starting point and a common ending point of same length
756
+ going through the vertex. It will be interesting to study these Dowker complexes when m tends to
757
+ infinity, n tends to infinity or both.
758
+ 6
759
+ Conclusion
760
+ In summary, we used the Dowker complexes to study some properties of self-relation. First, we
761
+ defined the right morphism and left morphism. We also generalized it to the case of multivalued
762
+ maps called multi-right morphism and multi-left morphism. The existence of a right or multi-right
763
+ morphism between R1 and R2 implies that the KR1 is included in KR2. Similarly, the existence of a
764
+ left or a multi-left morphism between R1 and R2 implies that LR1 is included in LR2. We have shown
765
+ that two relations are conjugate implies that they have homotopically equivalent Dowker complexes.
766
+ We have also shown that if two relations are shift equivalent, then their Dowker complexes are
767
+ homotopically equivalent at some power of the relations. We were interested in self-relation which
768
+ is equivalent of a type of directed graph. We have obtained two nice properties. If R is finite and
769
+ Dom R = X = Im R, then we have that KRi ≤ KRi+1 and LRi ≤ LRi+1 for all i ∈ N. Moreover,
770
+ there exists a j ∈ N such as KRj = KRi+j and LRj = LRi+j for all i ∈ N. With these two properties,
771
+ we defined two filtrations with KRi �→ KRi+1 and LRi �→ LRi+1. Also, the filtration ends at some
772
+ finite time. Finally, we proved some results about the 0th homology for some types of self-relation
773
+ at some power. We also proposed the intersection filtration and the zigzag filtration.
774
+ 18
775
+
776
+ We have put some foundations to study directed graph using Dowker complexes. Moreover, we
777
+ think it might be a useful tool to study the dynamics of finite data define by a directed graph of
778
+ Dowker complexes. Let R be a self-relation with an eventual period (j, p). The positive or forward
779
+ invariant is given by the existence of a simplex in KRj when j converges to infinity. The negative
780
+ or backward invariant is given by the existence of a simplex in Lj
781
+ R when j converges to infinity.
782
+ But, by the stabilization of Dowker complexes, we can compute it in finite time. Finally, if we want
783
+ to study the invariant of R, this is given by the existence of a simplex in KRj ∩ LRj which is the
784
+ intersection of the forward and the backward invariant. But further investigations are needed. The
785
+ idea is to use the structure of the Dowker complexes to encode the dynamics of finite data.
786
+ 19
787
+
788
+ References
789
+ [1] K. Ambrose, S. Huntsman, M. Robinson, and M. Yutin. Topological differential testing. CoRR,
790
+ abs/2003.00976, 2020.
791
+ [2] R. Atkin. Mathematical Structure in Human Affairs. London, Heinemann, 1974.
792
+ [3] R. Atkin. Q-analysis: A hard language for the soft sciences. Futures, Heinemann, 10(6), 1978.
793
+ [4] A. Björner. Topological methods. Handb. Comb., 2:1819–1872, 1995.
794
+ [5] G. Carlsson and V. de Silva. Zigzag persistence. Found Comput Math, 10, 2010.
795
+ [6] S. Chowdhurry and F. Mémoli.
796
+ A functorial Dowker theorem and persistent homology of
797
+ asymmetric networks. Journal of Applied and Computational Topology, 2:115–175, 2018.
798
+ [7] C. Conley. Isolated Invariant Sets and the Morse Index. American Mathematical Society, 1978.
799
+ [8] S. Day, O. Junge, and K. Mischaikow. A rigorous numerical method for the global analy-
800
+ sis of infinite-dimensional discrete dynamical systems. SIAM J. Applied Dynamical Systems,
801
+ 3(2):117–160, 2004.
802
+ [9] D. Desjardins Côté. From finite vector field data to combinatorial dynamical systems in the
803
+ sense of forman. arXiv, 2021.
804
+ [10] C. Dowker. Homology groups of relations. Annals of Mathematics, pages 84–95, 1952.
805
+ [11] H. Edelsbrunner and J. L. Harer.
806
+ Computational Topology : An Introduction.
807
+ American
808
+ Mathematical Society, 2010.
809
+ [12] M. Erdmann. Topology of privacy: Lattice structures and information bubbles for inference
810
+ and obfuscation. arXiv, 2017.
811
+ [13] R. Forman. Combinatorial vector fields and dynamical systems. Mathematische Zeitschrift,
812
+ 228:629–681, 1998.
813
+ [14] R. Ghrist, D. Lipsky, J. Derenick, and A. Speranzon. Topological landmark-based navigation
814
+ and mapping.
815
+ https://www2.math.upenn.edu/~ghrist/preprints/landmarkvisibility.
816
+ pdf. 2012.
817
+ [15] K. Hang Kim and F. W. Roush. On strong shift equivalence over a boolean semiring. Ergod.
818
+ Th. and Dynam. Sys., 6:81–97, 1986.
819
+ [16] T. Kaczynski, K. Mischaikow, and M. Mrozek. Computational Homology. Springer, 2004.
820
+ [17] T. Kaczynski and M. Mrozek. Conley index for discrete multivalued dynamical systems. Topol-
821
+ ogy and Its Appl., 65:83–96, 1995.
822
+ [18] T. Kaczynski, M. Mrozek, and T. Wanner. Towards a formal tie between combinatorial and
823
+ classical vector field dynamics. Journal of Computational Dynamics, 3(1):17–50, 2016.
824
+ [19] W. D. Kalies, K. Mischaukow, and R. C.A.M Vandervorst. Lattice structures for attractors i.
825
+ Journal of Computational Dynamics, 1(2):307–338, 2014.
826
+ 20
827
+
828
+ [20] W. D. Kalies, K. Mischaukow, and R. C.A.M Vandervorst. Lattice structures for attractors ii.
829
+ Foundations of Computational Mathematics, 16:1151–1191, 2016.
830
+ [21] W. D. Kalies, K. Mischaukow, and R. C.A.M Vandervorst. Lattice structures for attractors iii.
831
+ Journal of Dynamics and Differential Equations, 34:1729–1768, 2022.
832
+ [22] K. H. Kim. Boolean Matrix Theory and Applications, volume (Monographs and textbooks in
833
+ pure and applied mathematics, v. 70). New York:Dekker, 1982.
834
+ [23] M. Lipiński, J. Kubica, M. Mrozek, and T. Wanner. Conley-Morse-Forman theory for general-
835
+ ized combinatorial multivector fields on finite topological spaces. arXiv:1911.12698 [math.DS],
836
+ pages 1–44, 2020.
837
+ [24] G. Minian Elias. The geometry of relations. Order, 27:213–224, 2010.
838
+ [25] M. Mrozek, R. Srzednicki, Thorpe J., and Th. Wanner. Combinatorial vs classical dynamics :
839
+ Recurrence. Commun. Nonlinear Sci. Numer. Simul., 108(106226):1–30, 2022.
840
+ [26] Marian Mrozek and Mateusz Przybylski. The szymczak functor on the category of finite sets
841
+ and finite relations. arXiv, 2022.
842
+ [27] J. R. Munkres. Elements of Algebraic Topology. Addison-Weslay, Cambridge, 1984.
843
+ [28] M. Robinson. Cosheaf representations of relations and Dowker complexes. Journal of Applied
844
+ and Computational Topology, 6:27–63, 2022.
845
+ [29] A. Szymczak. The Conley index for disccrete dynamical system. Topology Appl., 66:215–240,
846
+ 1995.
847
+ [30] A. Szymczak. Index Pairs : From Dynamics to Combinatorics and Back. Ph.D. thesis, Georgia
848
+ Inst. Tech., 1999.
849
+ 21
850
+
2tE2T4oBgHgl3EQfNgbv/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
3tFAT4oBgHgl3EQfERy2/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bef6153b8b6aacc6e9f04a30d478798323b02d2c9e31cb7f18182a3a29b9f73e
3
+ size 181842
4NE2T4oBgHgl3EQfjwdR/content/tmp_files/2301.03971v1.pdf.txt ADDED
@@ -0,0 +1,1291 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Unsupervised Mandarin-Cantonese Machine Translation
2
+ Megan Dare, Valentina Fajardo Diaz, Averie Ho Zoen So, Yifan Wang, Shibingfeng Zhang
3
+ Summer Semester Software Project 2022
4
+ Language Science and Technology, Saarland University
5
+ {mdare,valenfd,averieso,yifwang,[email protected]}
6
+ Abstract
7
+ Advancements in unsupervised machine trans-
8
+ lation have enabled the development of ma-
9
+ chine translation systems that can translate be-
10
+ tween languages for which there is not an
11
+ abundance of parallel data available. We ex-
12
+ plored unsupervised machine translation be-
13
+ tween Mandarin Chinese and Cantonese. De-
14
+ spite the vast number of native speakers of
15
+ Cantonese, there is still no large-scale corpus
16
+ for the language, due to the fact that Can-
17
+ tonese is primarily used for oral communica-
18
+ tion.
19
+ The key contributions of our project
20
+ include: 1.
21
+ The creation of a new corpus
22
+ containing approximately 1 million Cantonese
23
+ sentences, and 2.
24
+ A large-scale compari-
25
+ son across different model architectures, tok-
26
+ enization schemes, and embedding structures.
27
+ Our best model trained with character-based
28
+ tokenization and a Transformer architecture
29
+ achieved a character-level BLEU of 25.1 when
30
+ translating from Mandarin to Cantonese and of
31
+ 24.4 when translating from Cantonese to Man-
32
+ darin. In this paper we discuss our research
33
+ process, experiments, and results.
34
+ 1
35
+ Introduction
36
+ In recent years, neural machine translation has
37
+ gained massive research interests. Most of these
38
+ studies (e.g. Bahdanau et al. 2014; Luong et al.
39
+ 2015; Wu et al. 2016; Vaswani et al. 2017) focus
40
+ on the construction of neural machine translation
41
+ systems leveraging parallel bilingual corpora. Nev-
42
+ ertheless, such an approach is not feasible for many
43
+ language pairs due to the scarcity of resources for
44
+ such pairs, as is the case for Cantonese and Man-
45
+ darin. The study of automatic translation between
46
+ these two languages faces the same problem: to
47
+ the best of our knowledge, despite the vast number
48
+ of native speakers of both languages, there is still
49
+ no large-scale Mandarin-Cantonese parallel corpus.
50
+ In addition, monolingual corpora for Cantonese are
51
+ hard to collect as it is a low-resource language that
52
+ is mainly used for only oral communication.
53
+ Currently, only a few studies have been done
54
+ on Cantonese-Mandarin translation, among which
55
+ some compare various low-resource models for
56
+ this language pair. However, these studies nor-
57
+ mally focus on a comparison between one or two
58
+ model types. Based on our motivation of imple-
59
+ menting and training a Cantonese-Mandarin trans-
60
+ lation model and current state of research, we set
61
+ our goal as building a robust model trained on
62
+ a more diverse dataset, which can help improve
63
+ communication between Cantonese and Mandarin
64
+ speakers. Additionally, we seek to compare vari-
65
+ ous model architectures, tokenization schemes, and
66
+ embedding structures to conduct a comprehensive
67
+ understanding on which settings may lead to the
68
+ best performance for the Cantonese-Mandarin lan-
69
+ guage pair.
70
+ After a close analysis of the current state of re-
71
+ search and the available resources, we propose to
72
+ develop a Cantonese-Mandarin machine translation
73
+ system that is capable of conducting translation in
74
+ both directions. The training of the system involves
75
+ only Mandarin and Cantonese monolingual corpora
76
+ collected from Wikipedia and various websites.
77
+ Our work also makes contributions to the Can-
78
+ tonese language NLP field by collecting Cantonese
79
+ textual data and building a public large-scale mono-
80
+ lingual corpus, which did not exist until now.
81
+ In addition, considering the similarity between
82
+ Cantonese and Mandarin, our translation system
83
+ will provide a foundation for further development
84
+ regarding machine translation tasks that center
85
+ around language pairs composed of two similar
86
+ languages.
87
+ 2
88
+ Background
89
+ 2.1
90
+ Cantonese and Chinese: an overview
91
+ Cantonese is one of the most widely spoken va-
92
+ rieties of Chinese other than Mandarin Chinese
93
+ (Matthews and Yip, 2013). It is estimated to have
94
+ arXiv:2301.03971v1 [cs.CL] 10 Jan 2023
95
+
96
+ more than 55 million native speakers, with large
97
+ populations found in southern China provinces
98
+ Guangdong and Guangxi, as well as regions includ-
99
+ ing Hong Kong and Macau, it is also commonly
100
+ spoken in overseas Cantonese communities in Sin-
101
+ gapore, Malaysia, North America and Australia as
102
+ a result of emigration (Matthews and Yip, 2013).
103
+ While numerous NLP applications have been
104
+ developed for Mandarin Chinese, little has been
105
+ developed for Cantonese. One reason for this is the
106
+ limited linguistic resources that have been collected
107
+ for Cantonese. Primarily a spoken language and a
108
+ non-standard variety, written Cantonese is not tra-
109
+ ditionally used or taught in schools. Instead, Can-
110
+ tonese speakers typically learn to read and write
111
+ in standard Chinese through education, so there is
112
+ no language barrier for Cantonese speakers when
113
+ interacting with computer applications designed in
114
+ standard Chinese.
115
+ On the other hand, with the availability of the
116
+ internet and the rise of social media, Cantonese is
117
+ much more commonly used and written online in
118
+ recent years, which can be seen as an indicator for
119
+ a market in Cantonese NLP applications.
120
+ It is important to note that this phenomenon
121
+ might only be applicable to Hong Kong Cantonese,
122
+ and not other variants such as the one in Guang-
123
+ dong province. More recent discussions about Can-
124
+ tonese, such as Bauer (2018), make a point to dis-
125
+ tinguish between the Hong Kong Cantonese variant
126
+ and the others, since the use of Cantonese is on the
127
+ rise in Hong Kong, while declining in provinces
128
+ within mainland China. Not only has this led to
129
+ Hong Kong being named “the Cantonese-speaking
130
+ capital of the world" (Bolton, 2011, p.64), but also
131
+ the rise of written Cantonese locally and subse-
132
+ quently, the Cantonese text data that are available
133
+ online, which are of the Hong Kong variant of Can-
134
+ tonese.
135
+ 2.2
136
+ Linguistic Differences between Cantonese
137
+ and Mandarin
138
+ Despite the common misconception that Chinese
139
+ dialects share the same grammar, Cantonese and
140
+ Mandarin are different at phonological, lexical and
141
+ syntactic levels, and are not mutually intelligible
142
+ (Matthews and Yip, 2013). Some suggests it is
143
+ more accurate describe Cantonese as a distinct
144
+ language of the Chinese language family (Snow,
145
+ 2004). For the rest of this section, we describe
146
+ some features that differ between Mandarin and
147
+ Hong Kong Cantonese.
148
+ 2.2.1
149
+ Writing Systems
150
+ To anyone who can read Chinese, the most notable
151
+ visual variation in written Chinese is the writing
152
+ system - Traditional or Simplified Chinese. The
153
+ two systems are equivalent to each other, and have
154
+ one-to-one correspondence for each character. The
155
+ following is some examples of traditional / sim-
156
+ plified characters: “open" 開/开, “talk" 話/话 and
157
+ “book" 書/书. The usage of either system is primar-
158
+ ily due to regional difference, with mainland China
159
+ using the simplified system, while Hong Kong and
160
+ Taiwan use the traditional system.
161
+ 2.2.2
162
+ Lexical and Syntactic comparisons
163
+ Vocabulary difference is the main barrier which
164
+ prevents Mandarin speakers from understanding
165
+ Cantonese (Snow, 2004), it is also the aspect which
166
+ is the most distinguishable between Cantonese and
167
+ Mandarin.
168
+ According to Snow (2004), written
169
+ Cantonese in formal domains can contain around
170
+ 10-15% Cantonese-only characters, while this per-
171
+ centage in informal domains can go up to 25-40%.
172
+ Notably, the vocabulary that differ are some of
173
+ the most frequent words, including many func-
174
+ tion words, as seen in Table 1.
175
+ Syntactically,
176
+ Meaning
177
+ Cantonese
178
+ Mandarin
179
+ possessive marker
180
+ ge3
181
+ 的de
182
+ perfective marker
183
+ zo2
184
+ 了le
185
+ pronoun pluralizer
186
+ dei6
187
+ 們mén
188
+ negator
189
+ 唔m4
190
+ 不bù
191
+ is (copula)
192
+ 係hai6
193
+ 是shì
194
+ this
195
+ 呢ne1
196
+ 這zhè
197
+ Table 1: Examples of lexical difference between Can-
198
+ tonese and Mandarin from Snow (2004, p.49). Can-
199
+ tonese romanizations follow the Jyutping system.
200
+ Cantonese and Mandarin are broadly similar but
201
+ with some differences that are often overlooked
202
+ (Matthews and Yip, 2013). Some common differ-
203
+ ences are in terms of word order, including indi-
204
+ rect object and comparative constructions (Snow,
205
+ 2004):
206
+ Indirect object construction:
207
+ Cantonese:
208
+ 我俾錢佢ngo5 bei2 cin4 keoi5
209
+ (I + give + money + he)
210
+ Mandarin:
211
+ 我給他錢wó gˇei t¯a qían
212
+ 2
213
+
214
+ (I + give + he + money)
215
+ ‘I give him money’
216
+ Comparative construction:
217
+ Cantonese:
218
+ 我高過佢ngo5 gou1 gwo3 keoi5
219
+ (I + tall + more than + he)
220
+ Mandarin:
221
+ 我比他高wó bˇı t¯a g¯ao
222
+ (I + compared to + he + tall)
223
+ ‘I’m taller than him.’
224
+ 2.2.3
225
+ Challenges Unique to Cantonese NLP
226
+ Firstly, there exists a certain degree of variabil-
227
+ ity in written Cantonese since it was never stan-
228
+ dardised. As such, some words can be written
229
+ with completely different characters yet have the
230
+ same meanings and pronunciations. For example,
231
+ “like" can be written as 中意or 鍾意(read: zung1
232
+ ji31), “still" can be written as 仲or 重(read: zung6)
233
+ (Matthews and Yip, 2013). Additionally, when
234
+ some Cantonese words cannot be represented by
235
+ existing Chinese characters, they could be written
236
+ in a romanized form, such as the comparative (eg.
237
+ “-er" in “cheaper") can be written with “D", as well
238
+ as a non-romanized form (read: di1) (Snow, 2004;
239
+ Matthews and Yip, 2013).
240
+ Secondly, code-switching to English is a com-
241
+ mon phenomena in Cantonese, which is not a
242
+ feature in standard Chinese or Mandarin. Code-
243
+ switching in Hong Kong Cantonese is mostly in-
244
+ trasentential (below clause level) (Li, 2000), for
245
+ example:
246
+ 我今朝9點有個meeting。
247
+ ngo5 dei6 gam1 ziu1 gau2 dim2 jau5 go3
248
+ MEETING
249
+ ‘We have a meeting at 9am today.’
250
+ 3
251
+ Related Work
252
+ 3.1
253
+ Unsupervised Machine Translation
254
+ Unsupervised machine translation with no parallel
255
+ data is a challenging task that has attracted many
256
+ interests. The presence of cross-lingual embed-
257
+ dings (Mikolov et al., 2013; Artetxe et al., 2016,
258
+ 2017a, 2018a,b; Conneau et al., 2017) provides
259
+ prior knowledge for machine translation systems
260
+ and makes it possible to train a machine transla-
261
+ tion model in an unsupervised way. Artetxe et al.
262
+ (2017b) and Lample et al. (2017) are the first at-
263
+ tempts to explore the possibility of constructing
264
+ 1romanizations according to the Jyutping system.
265
+ a neural machine translation system using only
266
+ monolingual corpora from both source and target
267
+ languages. The proposed system is based on an
268
+ encoder-decoder architecture with attention mecha-
269
+ nism (Bahdanau et al., 2014), trained with a denois-
270
+ ing auto-encoding task (Vincent et al., 2008) and a
271
+ back-translation task (Sennrich et al., 2015). The
272
+ encoder is shared by both the source and target lan-
273
+ guages, so that sentences from both languages can
274
+ be mapped to a common latent space, while each
275
+ language has its own decoder to reconstruct en-
276
+ coded sentences back into its own language space.
277
+ Cross-lingual embeddings are leveraged as an ini-
278
+ tialization for the system, providing additional lex-
279
+ ical level information. Such a structural property
280
+ allows the translation model to be bi-directional,
281
+ that is, the same model can be employed in both the
282
+ L1-to-L2 translation task and the L2-to-L1 transla-
283
+ tion task.
284
+ This approach is extended in Lample et al. (2018)
285
+ by applying a transformer model and using sub-
286
+ word level tokenization methods. Attention-only
287
+ structures provide higher model capacity, and sub-
288
+ word level tokenization method Byte Pair Encod-
289
+ ing (BPE) reduce the size of vocabulary and helps
290
+ solving <UNK> problems in translation. Addition-
291
+ ally, they re-exploited the potential of statistical
292
+ approaches in unsupervised machine translation
293
+ tasks. A phrase-based machine translation model
294
+ initialized with an automatically populated phrase
295
+ table and language model is trained by iterative
296
+ back-translation. Results of the experiment show
297
+ that a statistical approach can reach similar perfor-
298
+ mance or even outperform neural systems when the
299
+ data is scarce, as the neural model tends to over-
300
+ fit the corpora, and thus does not generalize well.
301
+ Together with Singh and Singh (2020), they show
302
+ that unsupervised approaches can be used to con-
303
+ struct machine translation systems for low-source
304
+ languages (e.g., Urdu, Romanian, Manipuri).
305
+ In recent years, pre-trained language models
306
+ have become popular due to their competitive
307
+ ability of representing and generating natural lan-
308
+ guages learned from transfer learning on large-
309
+ scale self-supervised datasets. Lample and Con-
310
+ neau Lample and Conneau (2019) take their work
311
+ one step further by pre-training both the encoder
312
+ and decoder in their model using a cross-lingual
313
+ language model (XLM). They then fine-tune the
314
+ pre-trained model to an unsupervised neural ma-
315
+ chine translation model following the training pro-
316
+ 3
317
+
318
+ cess described in Lample et al. (2018). The pre-
319
+ training stage results in a sharp BLEU score in-
320
+ crease over previous benchmarks for unsupervised
321
+ machine translation.
322
+ Unsupervised machine translation methods are
323
+ also applied in dialectal machine translation tasks,
324
+ where the similarity and commonality between lan-
325
+ guages can be leveraged. Farhan et al. (2020) uses
326
+ common words between Arabic dialects as anchor
327
+ points to steer projections of surrounding words be-
328
+ tween two dialects, creating a more accurate map-
329
+ ping between source and target words. In this way,
330
+ they construct an unsupervised machine translation
331
+ system with a BLEU score of 32.14, which is re-
332
+ markably high compared with the highest BLEU
333
+ score obtained in the supervised setting (48.25).
334
+ 3.2
335
+ Mandarin-Cantonese Machine
336
+ Translation
337
+ Due to the scarcity of available datasets, Cantonese
338
+ language is always under-researched in NLP tasks.
339
+ This issue is even more severe in machine trans-
340
+ lation tasks, which usually requires large amount
341
+ of parallel data. For this reason, many researches
342
+ on Cantonese-Mandarin machine translation are
343
+ intended to collect more data or to fully exploit the
344
+ limited data in a semi-supervised or unsupervised
345
+ way.
346
+ Hei Yi Mak and Tan Lee (2021) construct a
347
+ large-scale Cantonese-Mandarin parallel dataset
348
+ by mining parallel sentences from Mandarin and
349
+ Cantonese Wikipedia. They apply a similarity-
350
+ based sentence alignment approach and use sen-
351
+ tence pairs with high confidence score as parallel
352
+ sentences. In this way, they end up with a paral-
353
+ lel corpus of about 100,000 sentences. They also
354
+ fine-tune a pre-trained language model using the
355
+ collected data and obtain a competitive translation
356
+ system that outperforms Baidu Fanyi, a commonly
357
+ used translator in China.
358
+ Concurrently, some efforts have been made to
359
+ create unsupervised Cantonese-Mandarin transla-
360
+ tion systems. (Wan et al., 2020) handles Cantonese-
361
+ Mandarin translation as a dialect translation prob-
362
+ lem. which attempts to exploit the commonality
363
+ between two language dialects. On the basis of
364
+ (Lample et al., 2018)’s transformer model, they
365
+ make use of pivot-private embeddings and layer
366
+ coordination to better utilize the similarity and dif-
367
+ ference between the two languages. Trained on
368
+ two large monolingual datasets of 20 million collo-
369
+ quial sentences for each Mandarin and Cantonese,
370
+ their model reaches an improvement of up to 12
371
+ BLEU score for Cantonese to Mandarin, and 5
372
+ BLEU from Mandarin to Cantonese compared to
373
+ their baseline transformer model.
374
+ There have been other works relying on pre-
375
+ trained cross-lingual language models (XLM). In
376
+ Wong and Tsai (2022), the authors initialize the
377
+ encoder and decoder with XLM as described in
378
+ (Lample and Conneau, 2019), while using pivot-
379
+ private embeddings rather than cross-lingual em-
380
+ beddings. Using this enriched structure, they are
381
+ able to achieve slight BLEU score improvements
382
+ over previous XLM models.
383
+ 4
384
+ Corpus Construction
385
+ While existing Cantonese corpora are scarce, and
386
+ usually collected for linguistic purposes which is
387
+ smaller in scale and of a specific demographic (eg.
388
+ Wong et al. 2017; Luke and Wong 2015), text data
389
+ is available on the internet due to Cantonese being
390
+ the common language used on social media. This
391
+ also led to a rise in Cantonese writing in tradition-
392
+ ally more formal domains such as advertisements,
393
+ online news and subtitles.
394
+ Therefore, we aim for the corpus to span across
395
+ various domains for a comprehensive collection of
396
+ modern Cantonese usage. Secondly, since standard
397
+ Chinese is also commonly used among Cantonese
398
+ speakers in online settings, in the data selection pro-
399
+ cess, we aim to avoid sources which use standard
400
+ Chinese. Lastly, in our pre-processing, we preserve
401
+ some unique features in Cantonese such as code-
402
+ switching in English. Detailed data statistics of the
403
+ corpus is available on the Github repository.
404
+ As we focus on collecting data for Cantonese,
405
+ note that we simply use the Chinese Wikipedia
406
+ for Mandarin data, since there is already a large
407
+ amount of data available just from one source.
408
+ 4.1
409
+ Data Collection
410
+ The Cantonese data available from various sources
411
+ on the internet are either readily downloadable (for
412
+ Wikipedia, corpus and dictionary) or are scraped
413
+ by us (for Instagram, subtitles and articles). Due to
414
+ structural differences in the various websites, scrap-
415
+ ing functions are individually written for each of
416
+ the three classes of sources. In general, the script
417
+ moves recursively over the website domain and
418
+ extracts any text in each web page. The scraping
419
+ script is available on our GitHub repository. Fig-
420
+ 4
421
+
422
+ ure 1 shows the distribution in data domain of the
423
+ Cantonese training dataset, which contains only
424
+ monolingual data sources.
425
+ 4.1.1
426
+ Monolingual Data
427
+ Cantonese Wikipedia
428
+ The largest source of data
429
+ available was Cantonese Wikipedia, which was
430
+ downloaded from Wikimedia dump2, then pure
431
+ text data is obtained with WikiExtractor (Attardi,
432
+ 2015). Cantonese Wikipedia amounts to 690k lines
433
+ of text, making up 70% of the Cantonese corpus
434
+ overall.
435
+ Corpus
436
+ As mentioned, there is a small number
437
+ of open source Cantonese corpora collected for aca-
438
+ demic purposes, mainly transcribed from spoken
439
+ Cantonese. Additionally, there is another corpus
440
+ which contains scraped text data. Existing corpora
441
+ add up to 95k lines of Cantonese text, with the ma-
442
+ jority coming from Openrice restraurant reviews
443
+ (78k).
444
+ • openrice-senti3: scraped restaurant reviews
445
+ from popular Hong Kong website OpenRice
446
+ (https://www.openrice.com/zh/
447
+ hongkong).
448
+ • HK Cantonese Corpus4 (Wong et al., 2017):
449
+ manually
450
+ transcribed
451
+ oral
452
+ conversations
453
+ recorded between 1997-1998, includes spon-
454
+ taneous speech as well as radio programmes.
455
+ • tatoeba5: a website which contains crowd-
456
+ sourced sentences and their translations in
457
+ many languages, including Cantonese.
458
+ Instagram
459
+ Due to its popularity in Hong Kong,
460
+ the domains from Instagram can be varied, ranging
461
+ from blogs, advertisements, news and governmen-
462
+ tal organisations. We scrape posts and comments
463
+ via imginn.org from 14 accounts, 5 of which
464
+ are categorised as news, the others are categorised
465
+ as non-news. Instagram comments make up the
466
+ second largest source of Cantonese data with 108k
467
+ lines (11%), while Instagram news are 58k lines
468
+ and Instagram non-news 30k lines.
469
+ Subtitles
470
+ Cantonese YouTube6
471
+ is a crowd-
472
+ sourced compilation of youtube videos with spo-
473
+ ken Cantonese subtitles. It is a voluntary effort
474
+ 2https://dumps.wikimedia.org/zh_yuewiki/20220601
475
+ 3https://github.com/toastynews/openrice-senti
476
+ 4https://github.com/fcbond/hkcancor
477
+ 5https://tatoeba.org/en
478
+ 6https://docs.google.com/spreadsheets/d/1CmN8GPalrb4
479
+ 5YFIPrWgh7GRYyoUhnizEOImY6kAW82w
480
+ Figure 1: Distribution of data domain in the Cantonese
481
+ training set (monolingual data only).
482
+ from Cantonese learners, and each video is manu-
483
+ ally tagged with “Written Cantonese" or “Standard
484
+ Written Chinese", which allows us to filter for only
485
+ Cantonese videos. We are able to scrape directly
486
+ from Youtube with the help of the Youtube Tran-
487
+ script API7. There are 1,620 lines.
488
+ Articles
489
+ We scrape blog articles written by vari-
490
+ ous authors in Cantonese from the freelancer plat-
491
+ form https://handstopmouthstop.com.
492
+ There are 6,531 lines from the website.
493
+ 4.1.2
494
+ Parallel Data
495
+ As the experiments described in the future sections
496
+ are unsupervised, parallel data is not included in
497
+ the training set. They are only used for the test set.
498
+ Corpus
499
+ Cantonese-HK and Chinese-HK Uni-
500
+ versal Dependencies Treebank8(Luke and Wong,
501
+ 2015): manually transcribed and annotated film
502
+ subtitles and legislative proceedings of Hong Kong,
503
+ in both Cantonese and Mandarin. There are 1,004
504
+ parallel sentences from this corpus.
505
+ Dictionary
506
+ Kaifangcidian9
507
+ is
508
+ an
509
+ online
510
+ Cantonese-Chinese dictionary which comes with
511
+ parallel sentences for each lexical entry. There are
512
+ 13,004 parallel sentences from the dictionary.
513
+ Subtitles
514
+ Kongjisubtitles 10 is a Cantonese sub-
515
+ title team that specialises in “kongji"(meaning
516
+ “Hong Kong words" in romanized Cantonese) and
517
+ focuses on subtitling Thai online series. Since
518
+ 7https://github.com/jdepoix/youtube-transcript-api
519
+ 8https://github.com/UniversalDependencies/UD_Cantonese-
520
+ HK
521
+ 9https://kaifangcidian.com/han/yue/
522
+ 10https://sites.google.com/view/lihkg-kongjisubtitles
523
+ 5
524
+
525
+ instagram comments
526
+ restaurantreviews
527
+ 11%
528
+ 8%
529
+ instagram news
530
+ 6%
531
+ instagram non-news
532
+ 3%
533
+ 2%
534
+ corpus
535
+ 1%
536
+ subtitles & articles
537
+ 70%
538
+ wikipediasome of the same videos also have Mandarin subti-
539
+ tles, we align them based on the timestamps of the
540
+ videos. This amounts to 77,479 lines of parallel
541
+ data.
542
+ 4.2
543
+ Pre-processing
544
+ Our data is scraped from different resources and
545
+ inevitably contains noise. The following tools are
546
+ leveraged for the pre-processing of collected data:
547
+ Sentence Cutter
548
+ Sentence cutter cuts each text
549
+ into sentences. The cutting points are punctuation
550
+ marks such as 。.!? that defines the end of a sen-
551
+ tence.
552
+ Mandarin-Cantonese Filter
553
+ Due to the fact that
554
+ most Cantonese speakers are also native in Man-
555
+ darin, Mandarin text is normally present in Can-
556
+ tonese data scraped from social media. Mandarin-
557
+ Cantonese Filter aims to determine whether a sen-
558
+ tence is written in Mandarin or Cantonese by calcu-
559
+ lating the number of language-specific characters.
560
+ This tool is involved only in the pre-processing of
561
+ Cantonese data.
562
+ Cantonese-specific characters are: , 唔, 係, , 啦,
563
+ , 既, 咁, 佢, , 冇, 仲, , 乜, 噉, 咪, 咩, 俾, 呢, , 黎, ,
564
+ 喂, 喇, 喎, 睇
565
+ Mandarin-specific characters are: 是, 的, 他, 她,
566
+ 沒, 也, 看, 說, 在,说
567
+ Foreign Text Filter
568
+ Text written in foreign lan-
569
+ guages such as Russian, Japanese and Korean
570
+ abounds in collected data.
571
+ Foreign Text Filter
572
+ serves to filter out all sentences that are not writ-
573
+ ten in Chinese characters. If the Chinese charac-
574
+ ters contributes to less than 5% of sentence’s total
575
+ length, the sentence is removed.
576
+ url, emoji, hashtag Remover
577
+ This tool serves
578
+ to remove url, emoji, and hashtag from sentence
579
+ using regular expression.
580
+ Jieba Tokenizer
581
+ Jieba 11 is a Mandarin NLP li-
582
+ brary. In our project, we used Jieba tokenizer to
583
+ pre-process our Mandarin data.
584
+ PyCantonese Tokenizer
585
+ PyCantonese 12 is a
586
+ Cantonese NLP library. In our project, we used Py-
587
+ Cantonese tokenizer to pre-process our Cantonese
588
+ data.
589
+ We did not include any Mandarin data from so-
590
+ cial media in our dataset, considering that data
591
+ 11https://github.com/fxsjy/jieba
592
+ 12https://pycantonese.org/
593
+ (a) Mandarin corpus
594
+ (b) Cantonese corpus
595
+ Figure 2: Distribution of sentence length.
596
+ scraped from social media is always full of noises
597
+ and Mandarin data from Wikipedia is already abun-
598
+ dant for our task. We included Cantonese data
599
+ scraped from social media since Cantonese data
600
+ from Wikipedia is not sufficient.
601
+ 4.2.1
602
+ Overall Data Statistics
603
+ After pre-processing, there are 912,258 lines of
604
+ monolingual Cantonese data and 16M lines of
605
+ monolingual Mandarin data. In terms of domains,
606
+ the Cantonese corpus has 70% data from Wikipedia
607
+ while the Mandarin corpus is 100% Wikipedia. Fig-
608
+ ure 2 shows that the distribution of sentence length
609
+ in Cantonese and Mandarin are broadly similar af-
610
+ ter pre-processing.
611
+ 5
612
+ Methodology
613
+ As shown in Figure 3, we follow a standard un-
614
+ supervised machine translation architecture with
615
+ a shared encoder and language-specific decoders
616
+ in our experiment. Models are trained on a de-
617
+ 6
618
+
619
+ 1e6
620
+ 1.4
621
+ 1.2
622
+ 1.0
623
+ frequency
624
+ 0.8
625
+ 0.6
626
+ 0.4
627
+ 0.2
628
+ 0.0
629
+ 0
630
+ 5
631
+ 10
632
+ 15
633
+ 20
634
+ 25
635
+ 30
636
+ sentencelength(punctuationincluded)60000
637
+ 50000
638
+ 40000
639
+ frequency
640
+ 30000
641
+ 20000
642
+ 10000
643
+ 0
644
+ 0
645
+ 5
646
+ 10
647
+ 15
648
+ 20
649
+ 25
650
+ 30
651
+ sentencelength(punctuationincluded)Figure 3: General architecture of the unsupervised machine translation systems in this experiment. A shared
652
+ encoder maps sentences from L1/L2 to a common latent space, then a language-specific decoder reconstructs the
653
+ encoded sentence back into its own language space. The model is trained by a denoising auto-encoding task and a
654
+ back-translation task.
655
+ noising auto-encoding task and an on-the-fly back-
656
+ translation task. To have an overall study of how
657
+ different setups affect the model performance, we
658
+ make three sets of comparisons:
659
+ 1. Model architectures.
660
+ 2. Cross-lingual embeddings.
661
+ 3. Tokenization methods.
662
+ 5.1
663
+ Model Architectures
664
+ In this experiment, we compare an RNN-based
665
+ attention model and a transformer model.
666
+ • RNN-based model: We adopt the architecture
667
+ from (Artetxe et al., 2017b): Both encoder
668
+ and decoder have 2-layer bidirectional GRU
669
+ (Cho et al., 2014), Luong’s attention (Luong
670
+ et al., 2015) is applied to align the source sen-
671
+ tence and translation. Input sentences are con-
672
+ verted to 512-dimensional cross-lingual em-
673
+ beddings. Considering the relatively lower ca-
674
+ pacity, the cross-lingual embeddings are fixed
675
+ during training.
676
+ • Transformer model: Following (Lample et al.,
677
+ 2018), we use 4-layer encoder and decoder
678
+ with 3-layer sharing parameters for both Can-
679
+ tonese and Mandarin sides.
680
+ When gener-
681
+ ating translations, the decoder starts with a
682
+ language-specific <BOS> token, specifying
683
+ the language it is operating with. The embed-
684
+ ding matrices are trainable during the training
685
+ process.
686
+ 5.2
687
+ Cross-lingual Embeddings
688
+ Cross-lingual embeddings can be learned in various
689
+ different ways. In our experiments we compare the
690
+ following three approaches:
691
+ • Mapping: It has been extensively studied how
692
+ to map monolingual word embeddings into
693
+ a cross-lingual space.(Mikolov et al., 2013;
694
+ Artetxe et al., 2016, 2017a, 2018a,b; Conneau
695
+ et al., 2017) In this project, we use Vecmap
696
+ 13 by Artexte to obtain cross-lingual embed-
697
+ dings from monolingual ones. In particular,
698
+ we adopt the “identical” setting, where the
699
+ shared vocabulary in two languages can be
700
+ used as anchors to learn the mapping. This
701
+ approach is applied to RNN-based models.
702
+ • Learning from concatenated data: Another
703
+ setup is to learn embeddings on the concatena-
704
+ tion of source and target corpora in a monolin-
705
+ gual way. As embeddings are learned in the
706
+ context of both languages, the resultant em-
707
+ beddings can be seen as cross-lingual. This
708
+ approach is applied on both RNN-based mod-
709
+ els and transformer models.
710
+ • Pivot-private embeddings: We also experi-
711
+ ment with 512-dimensional pivot-private em-
712
+ beddings which consists of a 256-dimensional
713
+ cross-lingual embedding learned on the con-
714
+ catenated dataset and a 256-dimensional pri-
715
+ vate embedding, which is learned on two
716
+ monolingual datasets separately.
717
+ This ap-
718
+ proach is assumed to be able to capture the
719
+ commonality between both languages and pre-
720
+ serve language-specific characteristics as well
721
+ (Wan et al., 2020). We adopt this approach on
722
+ transformer models.
723
+ 5.3
724
+ Tokenization Methods
725
+ We are also interested whether byte-pair encod-
726
+ ing helps training Cantonese-Mandarin translation
727
+ systems, so we compare it to a character-level tok-
728
+ enization method.
729
+ 13https://github.com/artetxem/vecmap
730
+ 7
731
+
732
+ L1 decoder
733
+ L1output
734
+ Sharedencoder(L1/L2)
735
+ L2 decoder
736
+ L2output
737
+ Cross-lingual
738
+ embeddings
739
+ L1/L2 input• Word-level tokenization: As a baseline, we do
740
+ no further tokenization on the collected data
741
+ which is separated by words using Jieba and
742
+ PyCantonese. In this setting, a total number
743
+ of 80K/1M unique words are present in the
744
+ Cantonese/Mandarin corpora respectively.
745
+ • Character-level tokenization: Since Mandarin
746
+ and Cantonese are both analytic languages,
747
+ character-level tokenization is a valid option
748
+ to tokenize sentences. This results in 8K/14K
749
+ unique tokens in Cantonese/Mandarin training
750
+ data respectively.
751
+ • Byte-pair encoding: We also use byte-pair
752
+ encoding to obtain a vocabulary of 50K sub-
753
+ words on word-tokenized datasets. The em-
754
+ beddings of sub-words are learned using meth-
755
+ ods described above.
756
+ 6
757
+ Experiments and Results
758
+ In this section, we describe the experiments we
759
+ conducted and the results of both automatic and hu-
760
+ man evaluation. Our code and relevant repositories
761
+ are publicly available online 14.
762
+ 6.1
763
+ Task Setup
764
+ 6.1.1
765
+ Baseline Model
766
+ Due to the large overlap in vocabulary between
767
+ Mandarin and Cantonese and the lack of compli-
768
+ cated morphology in both languages, for our base-
769
+ line model we take advantage of these character-
770
+ istics by evaluating Mandarin sentences as if they
771
+ were a translation into Cantonese, and visa-versa.
772
+ This method is carried out by simply converting
773
+ both Mandarin and Cantonese evaluation datasets
774
+ to the same character set using OpenCC 15 (our
775
+ experiments used the Traditional Chinese (Hong
776
+ Kong variant) character set) and evaluating the
777
+ BLEU score directly.
778
+ 6.1.2
779
+ RNN-based Experiments
780
+ In order to improve upon the baseline model perfor-
781
+ mance, we train several models using Artetxe’s
782
+ RNN+Attention-based architecture for unsuper-
783
+ vised machine translation 16. The primary objec-
784
+ tive, aside from improving BLEU scores over the
785
+ baseline, is to identify which settings (e.g. tok-
786
+ enization scheme and embedding training method)
787
+ 14https://github.com/meganndare/cantonese-nlp
788
+ 15https://github.com/BYVoid/OpenCC
789
+ 16https://github.com/artetxem/undreamt
790
+ lead to the best model performance. As detailed in
791
+ the methodology section we experiment with word,
792
+ character, and byte-pair encoding (BPE) tokeniza-
793
+ tion, as well as cross-lingual embeddings obtained
794
+ by learning a mapping into cross-lingual space, and
795
+ by concatenation and training a skip-gram model.
796
+ Additionally, for the BPE-tokenized models we
797
+ have experimented with learning the BPE tokens
798
+ separately for each language, or jointly.
799
+ 6.1.3
800
+ Balanced Dataset Experiments
801
+ One characteristic of our full training dataset is that
802
+ it is imbalanced (1 million Cantonese sentences
803
+ versus 16 million Mandarin sentences). This is
804
+ due to the abundance of Mandarin text data and
805
+ the scarcity of Cantonese text data available. As
806
+ a result, we were curious to understand whether
807
+ having an imbalanced dataset negatively affects
808
+ our training results. To this end we conducted an
809
+ experiment using what we refer to as our ’Balanced
810
+ Dataset’. To create the set, Mandarin sentences are
811
+ chosen at random to be removed from the training
812
+ set until a downsampled version of approximately
813
+ the same size as the Cantonese training set was ob-
814
+ tained, that also preserves the sentence length dis-
815
+ tribution of the original Mandarin training set. We
816
+ then compare the performance of models trained
817
+ using the balanced dataset to those trained using the
818
+ full set, utilizing some simple baseline settings for
819
+ comparison, namely word and character-tokenized
820
+ models.
821
+ 6.1.4
822
+ Transformer Experiments
823
+ Guided by advancements in neural network model
824
+ architectures over the past several years, we are
825
+ interested in how using a transformer architecture
826
+ would impact our results. For the transformer ex-
827
+ periments we leveraged Facebook Research’s Un-
828
+ supervised Neural Machine Translation Model 17
829
+ for training. Using the results from our RNN-based
830
+ models, we primarily focused on character and
831
+ BPE tokenization schemes, and have also experi-
832
+ mented with a more complex cross-lingual embed-
833
+ ding type called pivot-private embeddings. Due to
834
+ differences in implementation between the RNN
835
+ and Transformer-based models, we were unable
836
+ to train Vecmap embeddings for this set of experi-
837
+ ments.
838
+ 17https://github.com/facebookresearch/UnsupervisedMT
839
+ 8
840
+
841
+ Model Name
842
+ Can>Man Char BLEU
843
+ Man>Can Char BLEU
844
+ Baseline (Character Conversion) Model
845
+ 13.3
846
+ 13.2
847
+ RNN (Word Tok + Vecmap Embed)
848
+ 13.1
849
+ 14.9
850
+ RNN (Char Tok + Vecmap Embed)
851
+ 19.8
852
+ 22.5
853
+ RNN (Char Tok + Concat Embed)
854
+ 19.4
855
+ 20.3
856
+ RNN (BPE Tok learned separately + Vecmap Embed)
857
+ 18.0
858
+ 18.8
859
+ RNN (BPE Tok learned jointly + Vecmap Embed)
860
+ 19.3
861
+ 19.5
862
+ RNN (Balanced Dataset + Word Tok + Vecmap Embed)
863
+ 6.2
864
+ 11.5
865
+ RNN (Balanced Dataset + Char Tok + Vecmap Embed)
866
+ 17.1
867
+ 20.4
868
+ Transformer (Char Tok + Concat Embed)**
869
+ 24.4
870
+ 25.1
871
+ Transformer (Char Tok + Pivot-Private Embed)
872
+ 21.2
873
+ 20.5
874
+ Transformer (BPE Tok learned jointly + Concat Embed)
875
+ 20.2
876
+ 17.4
877
+ Table 2: Overview of all automatic evaluation results. All BLEU (Bilingual Evaluation Understudy) metric
878
+ scores are calculated at the character-level. Best-performing model indicated by **.
879
+ 6.2
880
+ Results
881
+ 6.2.1
882
+ Automatic Evaluation
883
+ Model Architectures
884
+ The first metric that our
885
+ study sought to investigate was the varying per-
886
+ formances of Mandarin-Cantonese unsupervised
887
+ machine translation based on the underlying neu-
888
+ ral network architecture, namely an RNN-based
889
+ architecture versus a Transformer architecture. We
890
+ observed that the transformer model led to higher
891
+ BLEU scores when other factors are constant. This
892
+ can be observed in the RNN (Char Tok + Con-
893
+ cat Embed) versus Transformer (Char Tok + Con-
894
+ cat Embed) models, where Cantonese-to-Mandarin
895
+ translation yielded 19.4 versus 24.4, respectively;
896
+ and Mandarin-to-Cantonese yielded 20.3 versus
897
+ 25.1, respectively. In fact, our highest performing
898
+ model from the study was trained on a Transformer
899
+ architecture.
900
+ Cross-lingual
901
+ Embeddings
902
+ The
903
+ study
904
+ also
905
+ makes comparisons between different types of
906
+ cross-lingual embeddings.
907
+ Of primary interest
908
+ are training monolingual embeddings and map-
909
+ ping them to a shared cross-lingual space using
910
+ Vecmap (as detailed in the Methodology section),
911
+ and learning embeddings from the concatenated
912
+ data. In a comparison between RNN (Char Tok
913
+ + Vecmap Embed) and RNN (Char Tok + Con-
914
+ cat Embed) models, we can see that the mapping-
915
+ based cross-lingual embeddings have outperformed
916
+ the concatenation-based technique, yielding a
917
+ Cantonese-to-Mandarin BLEU of 19.8 and 19.4,
918
+ respectively; and a Mandarin-to-Cantonese BLEU
919
+ of 22.5 and 20.3, respectively.
920
+ In addition to mapping-based and concatenation-
921
+ based cross-lingual embeddings, we also had time
922
+ to run one experiment on pivot-private embeddings
923
+ (as detailed in the Methodology section). By com-
924
+ paring the Transformer (Char Tok + Concat Em-
925
+ bed) and Transformer (Char Tok + Pivot-Private
926
+ Embed) models, we observe that concatenation-
927
+ based embeddings outperform pivot-private em-
928
+ beddings, with a Cantonese-to-Mandarin BLEU
929
+ of 24.4 versus 21.2, and a Mandarin-to-Cantonese
930
+ BLEU of 25.1 to 20.5, respectively.
931
+ Tokenization Methods
932
+ Our study additionally
933
+ makes a comparison between different types of
934
+ tokenization methods: word, character, and BPE-
935
+ tokenized models. Word-tokenization always per-
936
+ forms the worst, in all cases aside from one (see
937
+ RNN (Word Tok + Vecmap Embed) Mandarin-to-
938
+ Cantonese results in Table 2), models trained with
939
+ word-tokenized training data did not outperform
940
+ even the Baseline (Character Conversion) Model
941
+ in which no neural network was trained.
942
+ While BPE-tokenized data tends to perform very
943
+ well for languages with an alphabet system, such
944
+ as French or English, we did not observe a such
945
+ a strong result in the models trained using BPE-
946
+ tokenized data for the Mandarin-Cantonese lan-
947
+ guage pair. We experimented by learning BPE
948
+ token vocabularies both separately and jointly, ob-
949
+ serving a slight performance improvement when
950
+ learned jointly. However, neither BPE setting could
951
+ outperform our character-tokenized models (see Ta-
952
+ ble 2 for two results that lead to this conclusion:
953
+ RNN (Char Tok + Vecmap Embed) versus RNN
954
+ 9
955
+
956
+ (BPE Tok learned jointly + Vecmap Embed), as well
957
+ as Transformer (Char Tok + Concat Embed) versus
958
+ Transformer (BPE Tok learned jointly + Concat
959
+ Embed)).
960
+ Balanced Dataset
961
+ We conclude that neither
962
+ word nor character-tokenized models trained on
963
+ the balanced dataset outperformed models trained
964
+ using the full training dataset. Thus, it is advanta-
965
+ geous to use as much data as possible for model
966
+ training, even if the two languages have an uneven
967
+ amount of sentences.
968
+ 6.2.2
969
+ Human Evaluation
970
+ We conduct human evaluation on the Transformer
971
+ (Char Tok + Concat Embed) model output in order
972
+ to assess the extent to which our translation system
973
+ would be useful to Cantonese and Mandarin speak-
974
+ ers respectively. Considering that Cantonese speak-
975
+ ers can understand Standard Chinese, a translation
976
+ system from Mandarin to Cantonese should aim
977
+ for localisation and fluency in Cantonese, while not
978
+ losing the original meaning of the sentence. On the
979
+ other hand, the primary purpose of a Cantonese-
980
+ to-Mandarin translation system is to facilitate Can-
981
+ tonese comprehension for Mandarin speakers. For
982
+ these diverging purposes in our translation direc-
983
+ tions, we manually evaluate each translation direc-
984
+ tion with separate criteria, which is explained in
985
+ the following sections.
986
+ Procedure
987
+ 100 lines from the test set are selected
988
+ for evaluation, identical for both translation di-
989
+ rections. One native speaker of each target lan-
990
+ guage evaluates for that direction only (i.e. Can-
991
+ tonese speaker evaluates Mandarin to Cantonese
992
+ sentences, and visa-versa). During evaluation, the
993
+ evaluator has access to the original input and the
994
+ target output. The evaluation decision is binary for
995
+ both criteria, the evaluator can only choose either
996
+ YES or NO. In the example sentences below, Man-
997
+ darin features are highlighted in orange, Cantonese
998
+ features are highlighted in teal and ungrammatical
999
+ features are highlighted in red.
1000
+ Cantonese to Mandarin
1001
+ System outputs are
1002
+ evaluated against the criteria concerning whether
1003
+ the output helps Mandarin speakers understand
1004
+ Cantonese text. 34% were found helpful for un-
1005
+ derstanding Cantonese text, 61% were found not
1006
+ helpful, 5% sentences are discarded because the
1007
+ original text in Cantonese is already perfectly com-
1008
+ prehensible for Mandarin speaker.
1009
+ Mandarin to Cantonese
1010
+ System outputs are
1011
+ evaluated against the criteria “Does the system out-
1012
+ put contribute to Cantonese fluency / localisation?".
1013
+ It is found to be the case for 47% of the sentences,
1014
+ false for 52% of the sentences with 1%sentences
1015
+ discarded since the input and target were identical.
1016
+ (1)-(4) are examples of the system output for the
1017
+ Mandarin to Cantonese direction. In (1), the out-
1018
+ put is evaluated as helpful even though it has not
1019
+ completely transformed all Mandarin features into
1020
+ Cantonese ones, however, the components with the
1021
+ highest semantic value (拍拖dating and 散break
1022
+ up) are in Cantonese where it was originally in
1023
+ Mandarin. Compared to (3), where the output still
1024
+ retains mostly Mandarin and has no Cantonese fea-
1025
+ tures. Comparing (2) and (4), they both have some
1026
+ grammatical errors (in red), but the impact of such
1027
+ error in (2) is less significant to the overall meaning
1028
+ of the sentence, while in (4) the overall sentence is
1029
+ incomprehensible.
1030
+ Examples of output that is helpful:
1031
+ (1)
1032
+ Mandarin reference (source):
1033
+ 身邊有兩位好朋友,交往了三年,
1034
+ 就那樣分手了。
1035
+ Cantonese reference (target):
1036
+ 身邊有兩位好友,拍三年拖,就噉散
1037
+
1038
+ System output:
1039
+ 身邊有兩位好友,拍了三年拖,就這
1040
+ 樣散了。
1041
+ Sentence meaning: I have two friends
1042
+ who had been dating for three years,
1043
+ and they broke up just like that.
1044
+ (2)
1045
+ Mandarin reference (source):
1046
+ 別這麼犟,快點向媽認錯。
1047
+ Cantonese reference (target):
1048
+ 咪咁硬頸,快同亞媽認錯。
1049
+ System output:
1050
+ 否“硬頸,快些和亞媽認錯。
1051
+ Sentence meaning: Don’t be so stubborn,
1052
+ apologize to your mother at once.
1053
+ Examples of output that is not helpful:
1054
+ (3)
1055
+ Mandarin reference (source):
1056
+ 別小看他,他已經有了三項發明。
1057
+ Cantonese reference (target):
1058
+ 10
1059
+
1060
+ 咪睇小佢,佢已經有三項發明。
1061
+ System output:
1062
+ 否看小她,她已經有了三項發明。
1063
+ Sentence meaning: Don’t underestimate
1064
+ him, he already has three inventions.
1065
+ (4)
1066
+ Mandarin reference (source):
1067
+ ���海關沒收了那些東西。
1068
+ Cantonese reference (target):
1069
+ 畀海關執。
1070
+ System output:
1071
+ 給海關執了那麼。
1072
+ Sentence meaning: The things that were
1073
+ confiscated by customs.
1074
+ 7
1075
+ Discussion
1076
+ Our Mandarin-Cantonese machine translation
1077
+ project displays the differences between two to-
1078
+ kenization methods (character-level and byte pair
1079
+ encoding), with an outcome different than expected
1080
+ regarding byte pair encoding. A possible reason
1081
+ for this may be that such a big vocabulary size can
1082
+ lead to worse embeddings, taking into account the
1083
+ size of our corpus.
1084
+ One of our approaches was down-sampling the
1085
+ full dataset into a balanced one, from which we
1086
+ expected a higher BLEU score compared to when
1087
+ using the full dataset. However, this had the op-
1088
+ posite effect on the BLEU score and it ended up
1089
+ being lower than in the previous occasions. This
1090
+ is perhaps due to the fact that 1 million sentences
1091
+ is just simply not enough data for a machine to
1092
+ become ’fluent’ in a language.
1093
+ As further work, we propose that this project
1094
+ can be extended by combining out best architec-
1095
+ ture, best tokenization and best embedding training
1096
+ method (transformer + character + mapping), by de-
1097
+ veloping a cross-lingual mapping for embeddings
1098
+ that is compatible with a transformer network in
1099
+ order to confirm whether it does lead to higher
1100
+ results.
1101
+ In addition, other options worth exploring would
1102
+ be the grammatical similarity between Cantonese
1103
+ and Mandarin and developing an statistical ma-
1104
+ chine translation model.
1105
+ 8
1106
+ Summary and conclusion
1107
+ The aim of implementing a Cantonese-Mandarin
1108
+ MT-model was accomplished by:
1109
+ • Creating a large-scale corpus out of several
1110
+ online sources such as Wikipedia, scraped
1111
+ Instagram comments, YouTube subtitles and
1112
+ restaurant reviews.
1113
+ • Implementing and training several Cantonese-
1114
+ Mandarin translation models while studying
1115
+ the effects of different tokenization strategies,
1116
+ such as character-level and byte-pair encod-
1117
+ ing. While BPE was expected to outperform
1118
+ character-level tokenization, this was not the
1119
+ case in our experiments.
1120
+ The outcomes of this project showed that overall,
1121
+ in 61% of the cases, the outcome translation was
1122
+ not useful to help Mandarin speakers understand
1123
+ Cantonese text. As far as what fluency concerns,
1124
+ in 52 out of 100 cases, the system’s output did not
1125
+ show any contribution.
1126
+ Further work and research is essential in order to
1127
+ reach good percentages of performance and fluency
1128
+ in such a machine translation model. This project
1129
+ has contributed a large Cantonese dataset that was
1130
+ not available before as it is now.
1131
+ We hope that with this project we moved one
1132
+ step forward into a direction that has been studied
1133
+ for some years now, contributing to further devel-
1134
+ opments and advancement.
1135
+ References
1136
+ Mikel Artetxe, Gorka Labaka, and Eneko Agirre. 2016.
1137
+ Learning principled bilingual mappings of word em-
1138
+ beddings while preserving monolingual invariance.
1139
+ In Proceedings of the 2016 conference on empiri-
1140
+ cal methods in natural language processing, pages
1141
+ 2289–2294.
1142
+ Mikel Artetxe, Gorka Labaka, and Eneko Agirre.
1143
+ 2017a. Learning bilingual word embeddings with
1144
+ (almost) no bilingual data.
1145
+ In Proceedings of the
1146
+ 55th Annual Meeting of the Association for Compu-
1147
+ tational Linguistics (Volume 1: Long Papers), pages
1148
+ 451–462.
1149
+ Mikel Artetxe, Gorka Labaka, and Eneko Agirre.
1150
+ 2018a. Generalizing and improving bilingual word
1151
+ embedding mappings with a multi-step framework
1152
+ of linear transformations.
1153
+ In Proceedings of the
1154
+ AAAI Conference on Artificial Intelligence, vol-
1155
+ ume 32.
1156
+ Mikel Artetxe, Gorka Labaka, and Eneko Agirre.
1157
+ 2018b. A robust self-learning method for fully un-
1158
+ supervised cross-lingual mappings of word embed-
1159
+ dings. arXiv preprint arXiv:1805.06297.
1160
+ 11
1161
+
1162
+ Mikel Artetxe, Gorka Labaka, Eneko Agirre, and
1163
+ Kyunghyun Cho. 2017b. Unsupervised neural ma-
1164
+ chine translation. arXiv preprint arXiv:1710.11041.
1165
+ Giusepppe Attardi. 2015. Wikiextractor. https://
1166
+ github.com/attardi/wikiextractor.
1167
+ Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Ben-
1168
+ gio. 2014.
1169
+ Neural machine translation by jointly
1170
+ learning to align and translate.
1171
+ arXiv preprint
1172
+ arXiv:1409.0473.
1173
+ Robert S Bauer. 2018. Cantonese as written language
1174
+ in hong kong. Global Chinese, 4(1):103–142.
1175
+ Kingsley Bolton. 2011. Language policy and planning
1176
+ in hong kong: Colonial and post-colonial perspec-
1177
+ tives. Applied linguistics review, 2(1):51–71.
1178
+ Kyunghyun Cho, Bart Van Merriënboer, Dzmitry Bah-
1179
+ danau, and Yoshua Bengio. 2014. On the properties
1180
+ of neural machine translation: Encoder-decoder ap-
1181
+ proaches. arXiv preprint arXiv:1409.1259.
1182
+ Alexis Conneau, Guillaume Lample, Marc’Aurelio
1183
+ Ranzato, Ludovic Denoyer, and Hervé Jégou. 2017.
1184
+ Word translation without parallel data.
1185
+ arXiv
1186
+ preprint arXiv:1710.04087.
1187
+ Wael Farhan, Bashar Talafha, Analle Abuammar,
1188
+ Ruba Jaikat, Mahmoud Al-Ayyoub, Ahmad Bisher
1189
+ Tarakji, and Anas Toma. 2020. Unsupervised dialec-
1190
+ tal neural machine translation. Information Process-
1191
+ ing & Management, 57(3):102181.
1192
+ Guillaume Lample and Alexis Conneau. 2019. Cross-
1193
+ lingual language model pretraining. arXiv preprint
1194
+ arXiv:1901.07291.
1195
+ Guillaume Lample, Alexis Conneau, Ludovic Denoyer,
1196
+ and Marc’Aurelio Ranzato. 2017. Unsupervised ma-
1197
+ chine translation using monolingual corpora only.
1198
+ arXiv preprint arXiv:1711.00043.
1199
+ Guillaume Lample, Myle Ott, Alexis Conneau, Lu-
1200
+ dovic Denoyer, and Marc’Aurelio Ranzato. 2018.
1201
+ Phrase-based & neural unsupervised machine trans-
1202
+ lation. arXiv preprint arXiv:1804.07755.
1203
+ David CS Li. 2000. Cantonese-english code-switching
1204
+ research in hong kong: A y2k review. World En-
1205
+ glishes, 19(3):305–322.
1206
+ Kang Kwong Luke and May LY Wong. 2015.
1207
+ The
1208
+ hong kong cantonese corpus: design and uses. Jour-
1209
+ nal of Chinese Linguistics Monograph Series, pages
1210
+ 312–333.
1211
+ Minh-Thang Luong, Hieu Pham, and Christopher D
1212
+ Manning. 2015. Effective approaches to attention-
1213
+ based neural machine translation.
1214
+ arXiv preprint
1215
+ arXiv:1508.04025.
1216
+ Stephen Matthews and Virginia Yip. 2013. Cantonese:
1217
+ A comprehensive grammar. Routledge.
1218
+ Tomas Mikolov, Quoc V Le, and Ilya Sutskever. 2013.
1219
+ Exploiting similarities among languages for ma-
1220
+ chine translation. arXiv preprint arXiv:1309.4168.
1221
+ Rico Sennrich, Barry Haddow, and Alexandra Birch.
1222
+ 2015.
1223
+ Improving neural machine translation
1224
+ models with monolingual data.
1225
+ arXiv preprint
1226
+ arXiv:1511.06709.
1227
+ Salam Michael Singh and Thoudam Doren Singh. 2020.
1228
+ Unsupervised neural machine translation for english
1229
+ and manipuri. In Proceedings of the 3rd Workshop
1230
+ on Technologies for MT of Low Resource Languages,
1231
+ pages 69–78.
1232
+ Don Snow. 2004. Cantonese as written language: The
1233
+ growth of a written Chinese vernacular, volume 1.
1234
+ Hong Kong University Press.
1235
+ Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob
1236
+ Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz
1237
+ Kaiser, and Illia Polosukhin. 2017. Attention is all
1238
+ you need. Advances in neural information process-
1239
+ ing systems, 30.
1240
+ Pascal Vincent, Hugo Larochelle, Yoshua Bengio, and
1241
+ Pierre-Antoine Manzagol. 2008.
1242
+ Extracting and
1243
+ composing robust features with denoising autoen-
1244
+ coders. In Proceedings of the 25th international con-
1245
+ ference on Machine learning, pages 1096–1103.
1246
+ Yu Wan, Baosong Yang, Derek F Wong, Lidia S Chao,
1247
+ Haihua Du, and Ben CH Ao. 2020. Unsupervised
1248
+ neural dialect translation with commonality and di-
1249
+ versity modeling. In Proceedings of the AAAI Con-
1250
+ ference on Artificial Intelligence, volume 34, pages
1251
+ 9130–9137.
1252
+ Ka
1253
+ Ming
1254
+ Wong
1255
+ and
1256
+ Richard
1257
+ Tzong-Han
1258
+ Tsai.
1259
+ 2022. Mixed embedding of xlm for unsupervised
1260
+ cantonese-chinese neural machine translation (stu-
1261
+ dent abstract).
1262
+ Tak-sum Wong, Kim Gerdes, Herman Leung, and
1263
+ John SY Lee. 2017.
1264
+ Quantitative comparative
1265
+ syntax on the cantonese-mandarin parallel depen-
1266
+ dency treebank.
1267
+ In Proceedings of the fourth in-
1268
+ ternational conference on Dependency Linguistics
1269
+ (Depling 2017), pages 266–275.
1270
+ Yonghui Wu, Mike Schuster, Zhifeng Chen, Quoc V
1271
+ Le,
1272
+ Mohammad Norouzi,
1273
+ Wolfgang Macherey,
1274
+ Maxim Krikun,
1275
+ Yuan Cao,
1276
+ Qin Gao,
1277
+ Klaus
1278
+ Macherey, et al. 2016.
1279
+ Google’s neural machine
1280
+ translation system: Bridging the gap between hu-
1281
+ man and machine translation.
1282
+ arXiv preprint
1283
+ arXiv:1609.08144.
1284
+ Hei Yi Mak and Tan Lee. 2021.
1285
+ Low-resource nmt:
1286
+ A case study on the written and spoken languages in
1287
+ hong kong. In 2021 5th International Conference on
1288
+ Natural Language Processing and Information Re-
1289
+ trieval (NLPIR), pages 81–87.
1290
+ 12
1291
+
4NE2T4oBgHgl3EQfjwdR/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4tAyT4oBgHgl3EQf2Plc/content/tmp_files/2301.00747v1.pdf.txt ADDED
@@ -0,0 +1,1476 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Time-domain observation of ballistic orbital-angular-momentum currents with giant relaxation
2
+ length in tungsten
3
+ Tom S. Seifert1,2, Dongwook Go3, Hiroki Hayashi4, Reza Rouzegar1,2,
4
+ Frank Freimuth3,5, Kazuya Ando4,6-7, Yuriy Mokrousov3,5, Tobias Kampfrath1,2
5
+ 1Freie Universität Berlin, 14195 Berlin, Germany
6
+ 2Fritz Haber Institut der Max-Planck-Gesellschaft, 14195 Berlin, Germany
7
+ 3Forschungszentrum Jülich, 52425 Jülich, Germany
8
+ 4Department of Applied Physics and Physico-Informatics, Keio University, Yokohama 223-8522, Japan
9
+ 5Johannes Gutenberg-Universität Mainz, 55099 Mainz, Germany
10
+ 6Keio Institute of Pure and Applied Sciences, Keio University, Yokohama 223-8522, Japan
11
+ 7Center for Spintronics Research Network, Keio University, Yokohama 223-8522, Japan
12
+
13
+ Abstract
14
+ The emerging field of orbitronics exploits the electron orbital momentum 𝐿, which may allow magnetic-
15
+ information transfer with significantly higher density over longer distances in more materials than possible
16
+ with spin-polarized electrons. However, direct experimental observation of 𝐿 currents, their extended
17
+ propagation lengths and their conversion into charge currents has remained challenging. Here, we optically
18
+ trigger ultrafast angular-momentum transport in Ni|W|SiO2 thin-film stacks. The resulting terahertz charge-
19
+ current bursts exhibit a marked delay and width that grow linearly with W thickness. We consistently ascribe
20
+ these observations to a ballistic 𝐿 current from Ni through W with giant decay length (∼ 80 nm) and slow
21
+ velocity (∼ 0.1 nm/fs). At the W/SiO2 interface, the 𝐿 flow is converted into a charge current by the inverse
22
+ orbital Rashba-Edelstein effect. Our findings establish orbitronic materials with long-distance ballistic 𝐿
23
+ transport as possible candidates for future ultrafast devices and an approach to discriminate Hall- and
24
+ Rashba-Edelstein-like conversion processes.
25
+
26
+ Introduction
27
+ Spintronics research aims at utilizing the flow of spin angular momentum carried by electrons to transport
28
+ information and eventually manipulate magnetic order [1]. Actually, electrons have two distinct channels of
29
+ angular momentum: the electron spin 𝑆 and orbital angular momentum 𝐿. While 𝑆 is successfully exploited
30
+ in the field of spintronics to transport information by spin currents and to convert the latter into detectable
31
+ charge currents by spin-to-charge conversion (S2C) [2], 𝐿 has only recently gained attention in the field of
32
+ orbitronics. To make this fascinating concept compatible and competitive with conventional electronics [3,
33
+ 4], the speed of spin-orbitronic functionalities needs to be scalable to terahertz (THz) rates [5].
34
+ A first key advantage of 𝐿 over 𝑆 is that it can assume arbitrarily high values for one electron, which is
35
+ interesting for efficient manipulation of future orbitronic devices [1, 6, 7]. Second, 𝐿-to-charge conversion
36
+ (L2C) does not rely on spin-orbit interaction (SOI), which opens the orbitronic workbench to abundant light
37
+ metals [8]. Third, 𝐿-currents are predicted to propagate over increased lengths reaching almost 100 nm [9].
38
+ Finally, 𝐿-induced torques should have a starkly different behavior compared to 𝑆-induced torques [10-14].
39
+ Recent studies provided strong indications of 𝐿 transport and charge-to-𝐿-current conversion by the orbital
40
+ Hall effect (OHE) in a thin layer of a paramagnetic material (PM). The 𝑆 or 𝐿 accumulation resulting from an
41
+ in-plane charge current was interrogated by magnetooptic imaging [8] or by measuring the torque it exerted
42
+ on the magnetization of an adjacent thin-film ferromagnetic material (FM) [1, 9-24]. The FM was chosen to
43
+ be either susceptible to 𝑆 (e.g., Ni81Fe19, CoFeB) or 𝐿 accumulation (e.g., Ni).
44
+
45
+ Unfortunately, it remains experimentally challenging to measure 𝐿 curents by L2C. First, it is difficult to
46
+ distinguish L2C by the OHE from L2C by an orbital Rashba-Edelstein effect (OREE) because both phenomena
47
+ obey identical macroscopic symmetries. Second and for the same reason, OHE and OREE are difficult to
48
+ separate from their S2C counterparts, i.e., from the spin Hall effect (SHE) and the spin-based Rashba-
49
+ Edelstein effect (SREE) [25]. Previous work, however, indicates different spatial propagation and relaxation
50
+ dynamics of 𝑆 and 𝐿 currents [9-11]. Therefore, an experimental approach such as THz emission
51
+ spectroscopy [26, 27], which monitors currents with femtosecond resolution, is perfectly suited to access the
52
+ possibly different ultrafast 𝐿/𝑆 propagation and conversion dynamics.
53
+ Here, we study ultrafast signatures of 𝑆 and 𝐿 transport from a FM into a PM that is launched by exciting
54
+ FM|PM stacks with a femtosecond laser pulse. L2C and S2C in the PM is measured by monitoring the emitted
55
+ THz pulse. Upon changing the FM from Ni to Ni81Fe19 (Py) and interfacing them with the PMs Pt, Ti and W,
56
+ we find the same characteristic sign changes in the emitted THz pulse as in previous magnetotransport
57
+ studies [11]. Consequently, we interpret our observations as signatures of ultrafast L2C and S2C. Remarkably,
58
+ the emitted THz field from Ni|W is strongly time-delayed and low-pass-filtered compared to that from Ni|Pt.
59
+ The bandwidth and amplitude of the underlying charge-current burst decreases with W thickness, whereas
60
+ its delay increases linearly. We assign this observation to long-distance ballistic 𝐿 transport in W, which has
61
+ a more than 10 times larger relaxation length than 𝑆 transport. Specifically, our data suggest a dominant
62
+ contribution to L2C through the inverse OREE (IOREE) at the W/SiO2. Interestingly, this effect is absent in
63
+ Ni|Ti and attributed to a dominant bulk L2C by the inverse OHE (IOHE). Our results may help establish an
64
+ ultrafast experimental and theoretical methodology to extract the propagation dynamics of 𝐿 currents.
65
+
66
+
67
+ FIGURE 1: Launching and detecting terahertz 𝑺 and 𝑳 currents. Upon ultrafast laser excitation of the FM,
68
+ the FM magnetization 𝐌 is quenched, leading to 𝑆 accumulation 𝜇�, 𝐿 accumulation 𝜇� and the injection of
69
+ spin and orbital currents 𝑗� and 𝑗�, respectively, into the PM. Various bulk and interfacial L2C and S2C
70
+ processes generate an ultrafast in-plane charge current 𝑗� that radiates a THz pulse with electric field 𝐸 vs
71
+ time 𝑡 directly behind the sample.
72
+ Conceptual background. Our approach is guided by the idea that 𝐿 currents obey the same phenomenology
73
+ as 𝑆 currents, whereas 𝐿 transport is expected to have comparatively different spatiotemporal dynamics on
74
+ ultrashort time and length scales [1, 9-11]. As schematically depicted in Fig. 1, a femtosecond optical pump
75
+ pulse excites a FM|PM stack and triggers ultrafast 𝑆 and 𝐿 currents with density 𝑗� and 𝑗�, respectively, from
76
+ FM to PM. S2C and L2C result in ultrafast in-plane charge currents acting as a sources of a THz
77
+ electromagnetic pulse [28]. The resulting THz electric-field amplitude 𝐸(𝑡) directly behind the sample is
78
+ proportional to the sheet charge current 𝐼�(𝑡), which reads
79
+
80
+ Femtosecond
81
+ THz pulse
82
+ heating pulse
83
+ js
84
+ E
85
+ S2C
86
+ us
87
+ ee
88
+ UL
89
+ L2C
90
+ iL
91
+ M
92
+ jc
93
+ FM
94
+ PM
95
+ Z𝐸(𝑡) ∝ 𝐼�(𝑡) =
96
+
97
+ d𝑧 [θ���(𝑧)𝑗�(𝑧, 𝑡) + θ���(𝑧)𝑗�(𝑧, 𝑡)]
98
+ �������
99
+
100
+ .
101
+ (1)
102
+ Here, θ���(𝑧) and θ���(𝑧) describe the local efficiency of instantaneous L2C and S2C, respectively. They
103
+ include microscopic mechanisms like the inverse SHE (ISHE) or IOHE [27, 29], which occur in the bulk, or the
104
+ inverse SREE and IOREE, which require regions of broken inversion symmetry such as interfaces [30, 31].
105
+ To understand the emergence of 𝑗� and 𝑗�, we note that sudden laser heating of the FM induces 𝑆 and 𝐿
106
+ accumulations, 𝜇� and 𝜇� , respectively. The spin accumulation 𝜇� is proportional to the excess
107
+ magnetization, i.e., the difference between the instantaneous magnetization and the equilibrium
108
+ magnetization that would be attained at the instantaneous electron temperature [32-35]. Consequently, the
109
+ FM releases 𝑆 at a rate proportional to 𝜇�, by transferring 𝑆 to both the crystal lattice and the PM.
110
+ Recent studies on single-element FMs showed that the 𝑆- and 𝐿-type magnetizations exhibit very similar
111
+ ultrafast time evolution following laser excitation [36-38]. Therefore, we expect a very similar time evolution
112
+ of 𝜇� and 𝜇�, i.e., 𝜇�(𝑡) ∝ 𝜇�(𝑡), where their amplitudes depend on details of the electronic structure [14].
113
+ Despite this common origin of 𝑆 and 𝐿 currents, the relation between 𝑗�(𝑧, 𝑡) and 𝑗�(𝑧, 𝑡) (Fig. 1) can be
114
+ highly nontrivial as 𝑆 and 𝐿 may propagate differently through the FM/NM interface and the NM bulk.
115
+ Eq. ( 1 ) does not account for contributions due to magnetic dipole radiation of the time-dependent
116
+ magnetization and of photocurrents even in magnetic order, because both components can be discriminated
117
+ experimentally [32, 39].
118
+ Experiment details. We study thin film FM|PM samples, where the two FMs Py and Ni are chosen for their
119
+ high efficiency in generating 𝑆 and 𝐿 currents, respectively [11]. The PMs are chosen to have a strong ISHE
120
+ (Pt, W) and IOHE (W, Ti) response. The reported signs for the ISHE are opposite for Pt vs W with a vanishing
121
+ ISHE in Ti, but the expected IOHE signs are the same for all three PMs [40]. The studied FM|PM stacks have
122
+ thicknesses of a few nanometers deposited onto 500 μm thick glass substrates or 625 μm thick thermally
123
+ oxidized Si substrates (see Fig. S1 and Methods). The samples are characterized by optical and THz
124
+ transmission spectroscopy [41], yielding the pump absorptance, DC conductivity and Drude relaxation rate
125
+ (Fig. S2).
126
+ In our experiment (Fig. 1), ultrashort laser pulses (15 fs duration, 800 nm center wavelength, 80 MHz
127
+ repetition rate, 1.9 nJ pulse energy, 0.2 mJ/cm2 incident fluence) derived from a Ti:sapphire oscillator excite
128
+ the FM|PM samples. We record the emitted THz radiation by electrooptic sampling in a 1 mm or 10 µm thick
129
+ ZnTe(110) or a 250 μm thick GaP(110) electro-optic crystal [42]. The resulting THz emission signal 𝑆(𝐌, 𝑡) vs
130
+ time 𝑡 is proportional to the THz electric-field waveform 𝐸 (Fig. 1) convoluted with a setup-response function
131
+ [43]. The presented data is low-pass filtered by convolution with a Gaussian function with a full width at half
132
+ maximum of about 80 fs for better visibility unless noted otherwise.
133
+ All experiments are performed under ambient conditions unless stated otherwise. We apply an in-plane
134
+ magnetic field of about 10 mT to the sample and monitor the THz field component perpendicular to the
135
+ sample magnetization 𝐌. The component parallel to 𝐌 is found to be minor (Fig. S3). Measurements with
136
+ linearly and circularly polarized pump pulses reveal a negligible impact of the pump polarization on the THz
137
+ emission (Fig. S4).
138
+ To isolate magnetic signals, we reverse 𝐌 and focus on the odd-in- 𝐌 THz signal 𝑆(𝑡) =
139
+ [𝑆(+𝐌, t) − 𝑆(−𝐌, t)] 2
140
+ ⁄ . Even-in-𝐌 signal components are minor. As expected from a transport scenario,
141
+ further experiments, in which the samples are reversed, reveal a dominant structural-inversion-asymmetry
142
+ (SIA) character of the emitted THz signals compared to minor contributions unrelated to SIA, which most
143
+ likely arise from magnetic-dipole radiation due to ultrafast demagnetization (Fig. S5) [32].
144
+
145
+
146
+
147
+ FIGURE 2: Terahertz raw data. THz
148
+ emission signals 𝑆(𝑡) from FM|PM stacks
149
+ with a FM=Py and b FM=Ni capped with
150
+ PM=Pt, W or Ti. Note the rescaling of the
151
+ Pt-based sample signals. Film thicknesses
152
+ in nanometers are given as numerals in
153
+ parenthesis. As THz detector, a 1 mm
154
+ ZnTe(110) crystal was used.
155
+ Results
156
+ FM=Py. Figure 2a shows THz emission signals 𝑆 from Py|PM samples with PM=Pt, W, Ti, where the time-axis
157
+ origin is the same for all signals. All three waveforms have identical shapes. Minor differences in the shape
158
+ of 𝑆��|�� vs 𝑆��|�� are attributed to contributions unrelated to SIA (see above and Fig. S6).
159
+ The relative signal magnitudes as well as the opposite polarities for PM=Pt and W are consistent with
160
+ previous reports of ISHE-dominated THz emitters [28]. The polarity of the signal from Py|Ti is the same as
161
+ from Py|Pt and consistent with the calculations and measurements that found the same sign of the ISHE in
162
+ Pt and the IOHE in Ti [8, 27, 40]. However, the Py|Ti signal has a significantly smaller amplitude than the
163
+ Py|Pt signal even though Ti has a sizeable L2C efficiency. We ascribe this observation to a small amplitude of
164
+ the 𝐿 current injected into Ti, consistent with the small 𝐿 component of the Py magnetization [11].
165
+ To summarize, for Py|PM, our THz signals are consistent with the notion that we predominantly observe
166
+ transport of 𝑆 and 𝐿 into the PM bulk and its conversion into a charge current through the ISHE and the IOHE.
167
+ A possible Rashba-type L2C or S2C, or skew-scattering at the FM/PM interface [44] may make an additional
168
+ yet relatively small contribution.
169
+ FM=Ni. When the FM=Py is replaced by Ni, the signal polarity remains the same for Pt and Ti, and the two
170
+ waveforms exhibit identical dynamics (Fig. 2b and Fig. S7). In stark contrast, however, the signal polarity for
171
+ Ni|W reverses, the waveform is less symmetric, and its maximum is time-shifted relative to Py|W. This
172
+ striking observation indicates that Py|W and Ni|W show competing THz-generation mechanisms, the
173
+ a
174
+ b
175
+
176
+ X10-6
177
+ 3
178
+ Ni(5)IPt(3) /3
179
+ Ni(5)ITi(3)
180
+ 2
181
+ Ni(5)/W(3)
182
+ Terahertz signal
183
+ -2
184
+ -3
185
+ 0
186
+ 1
187
+ 2
188
+ Time (ps)3
189
+ Py(5)/Pt(3) /3
190
+ Py(5)/Ti(3)
191
+ 2
192
+ Py(5)/W(3)
193
+ Terahertz signal
194
+ -2
195
+ .3
196
+ 0
197
+ 2
198
+ 1
199
+ Time (ps)dominance of which depends sensitively on the FM material. To gain more insight into the different dynamics
200
+ in Ni|W, we next vary the W thickness.
201
+
202
+
203
+ FIGURE 3: Impact of W thickness in
204
+ Ni|W. THz emission signals for Ni|W
205
+ samples with varying W thickness
206
+ normalized to the absorbed pump-
207
+ pulse fraction in the Ni layer and to the
208
+ sample impedance (see Methods and
209
+ Table S1). Note the rescaling of the
210
+ reference signal from Ni|Pt. Film
211
+ thicknesses in nanometers are given as
212
+ numerals in parenthesis. A 250 µm
213
+ GaP(110) crystal was used as THz
214
+ detector.
215
+ Impact of W thickness. Figure 3 shows THz emission signals from Ni|W(𝑑�) for various 𝑑� and from a Ni|Pt
216
+ reference sample. Consistent with Fig. 2b, we see a clear trend with increasing W thickness relative to Ni|Pt:
217
+ The THz signal amplitude has a reversed sign, reduces with increasing 𝑑� and undergoes a significant
218
+ reshaping from asymmetric (Ni|Pt) to more symmetric (Ni|W) around the signal maximum. Interestingly,
219
+ 𝑑� = 2 nm is already sufficient to induce a shift of the maximum of the THz signal by about 100 fs.
220
+ We emphasize that the changes in THz-signal dynamics solely originate from changing the PM thickness.
221
+ Therefore, the FM is not primarily responsible for the signal-dynamics changes and, thus, considered as an
222
+ PM-independent 𝑆 and 𝐿 injector in the following.
223
+
224
+ FIGURE 4: Ultrafast charge currents in Ni|W. a Charge sheet currents in Ni|W for various W thicknesses 𝑑�
225
+ as extracted from the data of Fig. 3. The feature at 0.9 ps is a remainder of a THz-field reflection echo in the
226
+ 10 µm ZnTe electro-optic detection crystal (see Methods). Film thicknesses in nanometers are given as
227
+ numerals in parenthesis. Note the rescaling of the Pt-based sample signal. The apparent signal delays and
228
+ amplitudes are highlighted by a circular marker. b Extracted time delay with a straight line as a guide to the
229
+ eye, c relative amplitude at the delay marked in panel a, d temporal width at half maximum, and e integrated
230
+ charge current between 0.2 to 0.9 ps vs 𝑑� from the data in panel a. Error bars are estimated for panels c
231
+ a
232
+ b
233
+ c
234
+ d
235
+ e
236
+
237
+ X10-9
238
+ 5
239
+ Ni(5)/Pt(3) /6
240
+ Ni(5)/W(2)
241
+ 4
242
+ Norm. terahertz signal
243
+ Ni(5)/W(3)
244
+ Ni(5)/W(5)
245
+ 3
246
+ Ni(5)/W(10)
247
+ Ni(5)/W(15)
248
+ 2
249
+ Ni(5)/W(20)
250
+ 0
251
+ 7
252
+ -2
253
+ -3
254
+ -0.5
255
+ 0
256
+ 0.5
257
+ Time (ps)Ni(5)/Pt(3) /6
258
+ 14
259
+ Ni(5)/W(2)
260
+ 12
261
+ Ni(5)/W(3)
262
+ Ni(5)/W(5)
263
+ 2
264
+ per abs. fluence in Ni (J/m
265
+ 10
266
+ Ni(5)/W(10)
267
+ Ni(5)/W(15)
268
+ 8
269
+ Ni(5)IW(20)
270
+ delay
271
+ 6
272
+ 4
273
+ 2
274
+ 0
275
+ -2
276
+ -4
277
+ -6
278
+ 0
279
+ 0.5
280
+ Time (ps)80
281
+ Ampl. (norm.
282
+ Delay (fs)
283
+ 60
284
+ 40
285
+ 0.5
286
+ 20
287
+ 0
288
+ 0
289
+ 0
290
+ 10
291
+ 20
292
+ 10
293
+ 20
294
+ 0
295
+ 340
296
+ 320
297
+ Area (norm.)
298
+ (fs)
299
+ 300
300
+ 280
301
+ Width
302
+ 260
303
+ 0.5
304
+ 240
305
+ 220
306
+ 0
307
+ 0
308
+ 10
309
+ 20
310
+ 10
311
+ 20
312
+ 0
313
+ d... (nm)
314
+ d... (nm)and e from the signal-to-noise ratio in panel a, for panels b and d as 10% of the delay and width, respectively,
315
+ and in all panels b-e as ± 1 nm for 𝑑�.
316
+ Current dynamics in Ni|W. To obtain a sample-intrinsic measurement of the L2C dynamics, we extract the
317
+ sheet charge current 𝐼�(𝑡) flowing in Ni|W (Eq. (1)) normalized to the absorbed laser fluence in the Ni layer
318
+ (see Methods). This procedure eliminates any impact of sample exchange on pump-pulse absorption
319
+ efficiency, sample impedance or setup response function (see Methods).
320
+ Figure 4a presents 𝐼�(𝑡) in Ni|W with a resolution of 50 fs for various W thicknesses 𝑑�. The 𝐼�(𝑡) traces
321
+ have striking features. (i) They have opposite polarity relative to Py|W. (ii) Their maximum shifts by delays
322
+ Δ𝑡��� ∝ 𝑑� at a rate Δ𝑡��� 𝑑�
323
+
324
+ ≈ 4 fs/nm (Fig. 4b), implying a velocity of 0.25 nm/fs. (iii) The 𝐼� peak
325
+ value decreases approximately linearly with 𝑑� to about 50% after 20 nm (Fig. 4c), indicating attenuation
326
+ and dispersion upon propagation. (iv) The 𝐼� width increases linearly at a rate of ≈ 8 fs/nm (Fig. 4d). (v) The
327
+ time-integrated current ∫ d𝑡 𝐼�(𝑡) is only weakly dependent on 𝑑� with a decreasing trend, thereby
328
+ indicating an extremely large relaxation length >20 nm (Fig. 4e).
329
+ Features (i) and (iii) imply that 𝐼�(𝑡) cannot arise from 𝑆 transport. Otherwise, an opposite signal polarity
330
+ would result because S2C in W is dominated by the ISHE [28]. In addition, 𝑆 currents in W relax over distances
331
+ much smaller than 20 nm [41]. Our data, therefore, strongly indicate that 𝐿 transport plus L2C is the
332
+ dominant origin of the THz charge current in Ni|W. Second, features (ii) and (iv) are a hallmark of a signal
333
+ arising from ballistic transport of a pulse that is detected in an arrival layer. In this picture, the increase of
334
+ the 𝐼�(𝑡) width with 𝑑� arises from velocity dispersion along the 𝑧-direction of the particles that make up
335
+ the pulse (Fig. 5a). Feature (v) implies a minor L2C in the W bulk because it would otherwise result in an
336
+ integrated charge current ∫ d𝑡 𝐼�(𝑡) that increases monotonically with 𝑑�.
337
+ Model: 𝑳 current and IOREE in Ni|W. The preceding discussion suggests the following transport scenario in
338
+ Ni|W. Upon excitation of the Ni layer, a transient 𝑆 and 𝐿 accumulation is induced (Fig. 1). Their dynamics
339
+ are expected to be very similar (see above) [36-38] and monitored well by the ISHE charge current in Ni|Pt
340
+ (Fig. 4a). Finally, L2C is dominated in regions close to the W/SiO2 interface (Fig. 5a). Such interfacial L2C can
341
+ be very efficient, as argued in previous works [7, 24, 45-49], which, however, lacked the required
342
+ femtosecond resolution.
343
+ This scenario can explain all charge-current features (i)-(v) (Fig. 4) and is consistent the above experimental
344
+ findings. As the 𝑗� pulse propagates predominantly ballistically, its arrival in the W/SiO2 L2C region is delayed
345
+ by a time Δ𝑡��� ∝ 𝑑�. The velocity of the 𝑗�-pulse peak (∼ 0.1 nm/fs) is consistent with that of 𝐿-carrying
346
+ d-band states of W [50]. During propagation through PM=W, the 𝑗� pulse disperses due to different electron
347
+ velocities along the surface normal (Fig. 5a) and attenuation with a typical relaxation length >20 nm.
348
+ To quantitatively model the charge-current dynamics in Ni|W (Fig. 3), we assume ballistic 𝐿 transport with a
349
+ characteristic decay length 𝜆� in W. The ��� arriving at the W/SiO2 interface is obtained by summing over all
350
+ Fermi-surface states with positive group velocity along the 𝑧-axis (see Fig. 5a and Methods). The resulting 𝑗�
351
+ at the W/SiO2 interface induced by a fictitious 𝛿(𝑡)-like 𝐿 accumulation in Ni reads
352
+ 𝑟(𝑡) ∝ 𝑑�
353
+ 𝑡� Θ(𝑣�𝑡 − 𝑑�)e���� ��
354
+
355
+ ,
356
+ (2)
357
+ where Θ is the Heaviside step function, and 𝑣� is the Fermi velocity of the 𝐿-polarized electrons in W. We
358
+ convolute 𝑟(𝑡) with 𝜇�(𝑡) ∝ 𝜇�(𝑡), which is given by the charge current measured in Ni|Pt (Fig. 4a). Our
359
+ modeled 𝐼�(𝑡) curves (Fig. 5c) reproduce the measured charge currents in Ni|W (Fig. 4a) semiquantitatively
360
+ for the choice 𝜆� = 80 nm and 𝑣� = 0.14 nm/fs. These values are in good agreement with the estimates
361
+ obtained above (Figs. 4b-e).
362
+
363
+
364
+
365
+
366
+ FIGURE 5: Simulated ultrafast inverse
367
+ orbital Rashba-Edelstein effect in W.
368
+ a Schematic of the suggested scenario for
369
+ 𝐿 transport and L2C by the IOREE in Ni|W
370
+ showing the different wave vector
371
+ contributions of the 𝐿 currents inside the
372
+ W layer driven by the magnetization
373
+ quenching in the Ni layer. Upon reaching
374
+ the W back surface, the orbital currents 𝐣�
375
+ are converted into a transverse charge
376
+ current 𝐣� by the inverse orbital Rashba-
377
+ Edelstein
378
+ effect
379
+ (IOREE).
380
+ In
381
+ the
382
+ experiment, many of the point-like
383
+ sources
384
+ of
385
+ orbital
386
+ currents
387
+ are
388
+ superimposed
389
+ along
390
+ the
391
+ FM/PM
392
+ interface.
393
+ b Qualitative
394
+ response
395
+ functions 𝑟(𝑡) to a fictitious delta-like 𝑗�
396
+ pulse injected at the Ni/W interface for
397
+ different W layer thicknesses 𝑑�, where
398
+ 𝑑�� < 𝑑�� < 𝑑�� . c Simulated IOREE
399
+ charge
400
+ currents 𝐼�(𝑡) obtained
401
+ by
402
+ convoluting 𝑟(𝑡) [Eq. (2), panel b] with
403
+ the 𝐼�(𝑡) of the Ni|Pt reference sample.
404
+ Inputs for the simulation are a ballistic 𝐿
405
+ velocity of 0.14 fs/nm, an 𝐿 decay length
406
+ of 𝜆� = 80 nm and a global scaling factor.
407
+ To summarize, the THz charge currents in Ni|W (Fig. 4) can be considered as signatures of 𝐿 currents injected
408
+ into W. The charge-current generation [see Eq. (1)] is dominated by an extremely long-range 𝑗� and L2C at
409
+ the W/SiO2 interface, i.e., by θ��� at 𝑧 = 𝑑�� + 𝑑��. Such long-range 𝐿 transport is a unique feature of
410
+ orbitronic materials, and first indications for it were found previously in Ti [10, 11]. Note that within our
411
+ interpretation, the sign of 𝑆��|� agrees coincidentally with the calculated sign of θ��� for the IOHE in W [40].
412
+ Discussion
413
+ Our interpretation neglects other possible contributions to the THz charge current. First, the inverse Faraday
414
+ effect as a source of 𝑆 and 𝐿 currents can be ruled out by the pump-polarization independence (see Fig. S4).
415
+ Second, for the 𝑆 channel, a dominant Seebeck-type contribution due to an electronic temperature
416
+ difference Δ𝑇��/�� across the Ni/PM interface is neglected as found in previous studies [32]. For the 𝐿
417
+ channel, we estimate Δ𝑇��/�� right after pump pulse absorption (see Methods) and find Δ𝑇��/�� ∼ +400 K
418
+ and Δ𝑇��/�� ∼ −100 K in Ni|Ti and Ni|W. The observed THz-emission signals, in contrast, show the same
419
+ sign from all three samples (Fig. 2b). Therefore, interfacial electronic temperature differences are a minor
420
+ a
421
+ b
422
+ c
423
+
424
+ 14
425
+ Ni(5)/Pt(3) /6
426
+ 12
427
+ Ni(5)/W(2)
428
+ Ni(5)/W(3)
429
+ 10
430
+ Ni(5)/W(5)
431
+ Ni(5)/W(10)
432
+ 8
433
+ Ni(5)/W(15)
434
+ Ni(5)/W(20)
435
+ 6
436
+ 4
437
+ 2
438
+ per abs.
439
+ 0
440
+ -2
441
+ 4
442
+ -6
443
+ 0
444
+ 0.5
445
+ 1
446
+ Time (ps)W
447
+ Ni
448
+ eee
449
+ μL
450
+ IOREE
451
+ GG
452
+ jL
453
+ dw
454
+ Z
455
+ r(t)
456
+ r (0)
457
+ 0
458
+ t
459
+ t(dw1) t(dw2) t(dw3driving force. Additional pump-propagation simulations show that, even for the thickest samples, pump-
460
+ intensity gradients in the FM and PM bulk are relatively small (Fig. S8).
461
+ Third, regarding transport in W, we consider dominant angular-momentum transport by magnons unlikely
462
+ because W is not magnetically ordered. An outstandingly long propagation of 𝑆 transport is ruled out, too,
463
+ because the Drude scattering times for all studied samples are substantially shorter (<50 fs, Figs. S2) than the
464
+ peak delays of 𝐼�(𝑡) (Fig. 4a).
465
+ Fourth, even though our data imply a dominant IOREE contribution to charge-current generation (see above),
466
+ the positive shoulder-like feature at around 0.1 ps for 𝑑� ≤ 3 nm in Fig. 4a may indicate a small contribution
467
+ of bulk L2C, i.e., the IOHE. A 𝐿-to-𝑆 conversion plus ISHE in the PM [23] might contribute but is considered
468
+ negligible here given the good agreement of our experimental data (Fig. 4) and the IOREE scenario (Fig. 5).
469
+ The dominance of an 𝐿-type angular momentum current in Ni|W highlights the role of Ni as an 𝐿 source and
470
+ indicates that the Ni/W interface may transmit 𝐿 currents more efficiently than 𝑆 currents.
471
+ We finally turn to other interesting aspects of our study. A more detailed comparison of Fig. 2a and 2b reveals
472
+ further changes in amplitude between Ni- and Py-based samples. The pronounced amplitude changes for
473
+ PM=W or Pt when changing FM=Py to Ni are related to the intricate interplay of all parameters in Eq. (1) in
474
+ addition to changes in the relative amplitudes of 𝜇� and 𝜇� and interface transmission coefficients for 𝑗� and
475
+ 𝑗�. Therefore, further experiments for a robust separation of 𝑆 and 𝐿 transport are needed.
476
+ We further find that the THz signals from the Ni-based samples increase linearly with pump fluence. Slight
477
+ sublinearities at the highest fluences do not alter the THz emission dynamics (Fig. S9). We emphasize that
478
+ samples deposited on Si rather than glass substrates show very similar THz emission characteristics (Fig. S1).
479
+ These observations demonstrate the robustness of the observed effects.
480
+ When adding a Cu layer on top of the Ni|W sample, we find almost no change in the THz emission signal
481
+ (Fig. S10). Future studies are needed to elaborate the exact character of the IOREE for different interfaces.
482
+ Interestingly, a Cu intermediate layer in Ni|Cu|W slightly modifies the amplitude and dynamics of the THz
483
+ signal, suggesting that Cu does not block 𝐿 transport strongly.
484
+ Regarding earlier reports of different THz emission dynamics in Fe|Au and Fe|Ru samples [29], we note that
485
+ a possible IOREE in Ru can, in hindsight, not be excluded. A dominant IOREE might also explain the seemingly
486
+ strong dependence of the Fe|Ru THz emission dynamics on the exact growth details [29, 51, 52].
487
+ In conclusion, we observe THz-emission signals from optically excited Ni|W stacks that are consistent with
488
+ an ultrafast injection of 𝐿 currents into W and long-distance ballistic transport through W. Remarkably, we
489
+ find strong indications for the occurrence of the IOREE. This result can be considered as time-domain
490
+ evidence of the long-range nature of orbital currents and IOREE in typical metals such as W.
491
+ Our study highlights the power of broadband THz emission spectroscopy in disentangling of spin and orbital
492
+ transport and Hall- and Rashba-Edelstein-like angular-momentum conversion processes through ultrafast
493
+ time-of-flight experiments. Future studies may aim at exploiting L2C physics in materials with nontrivial
494
+ topology, in which the OHE is predicted to be drastically enhanced close to Weyl points [53]. Our study opens
495
+ the field of THz orbitronics whose distinct dynamical features allow for tailoring ultrafast spin and orbital
496
+ currents on femtosecond time scales by a targeted material, thickness and interface engineering of
497
+ multilayers.
498
+
499
+
500
+
501
+ Methods
502
+ Current extraction. To extract the in-plane sheet current flowing inside the sample from the measured THz
503
+ signal 𝑆, we first measure our setup response function ℎ by having a reference electro-optic emitter (50 μm
504
+ GaP on a 500 μm glass substrate) at the same position as the sample, which yields a reference THz signal 𝑆���.
505
+ By calculating the emitted THz electric field from that reference emitter 𝐸���, ℎ is determined by solving the
506
+ convolution 𝑆��� = (ℎ ∗ 𝐸���)(𝑡) for ℎ [43]. Further measured inputs for this calculation are the excitation
507
+ spot size with a full width at half maximum of 22 μm, the excitation pulse energy of 1.9 nJ and a transform
508
+ limited pump pulse with a spectrum centered at 800 nm and 110 nm full width at half maximum. We perform
509
+ the deconvolution directly in the time domain by recasting it as a matrix equation [54].
510
+ Next, the electric field 𝐸 directly behind the sample is obtained from the recorded THz signal 𝑆 with the help
511
+ of the derived function ℎ by solving again the similar equation 𝑆 = (ℎ ∗ 𝐸)(𝑡) for 𝐸. Finally, the sheet charge
512
+ current (see Table S1) as shown in Fig. 3 is derived from a generalized Ohm’s law [28] that reads 𝐸(𝜔) =
513
+ 𝑒𝑍(𝜔)𝐼�(𝜔) , where −𝑒 is the electron charge and the sample impedance is given by 𝑍(𝜔) =
514
+ 𝑍� [1 + 𝑛��� + 𝑍�𝑑𝜎(𝜔)]
515
+
516
+ with the free space impedance 𝑍�, the metal-stack thickness 𝑑 and the measured
517
+ mean sample conductivity 𝜎 (see Table S1) that we assume to be frequency independent due to the large
518
+ Drude scattering rate (see Fig. S2). To enable comparison of THz currents from different samples, we
519
+ normalize 𝐼� by the absorbed fluence in the FM layer. The data shown in Fig. 3 was obtained in a dry-air
520
+ atmosphere.
521
+ Sample preparation. The FM|PM samples (FM = Ni and Py, PM = Pt, Ti, Cu and W) were fabricated on glass
522
+ substrates of 500 μm thickness or thermally oxidized Si substrates of 625 μm thickness by radio frequency
523
+ (RF) magnetron sputtering under 6N-purity-Ar atmosphere. The sample structure and thickness are described
524
+ in Table S1. For the sputtering, the base pressure in the chamber was better than 5.0 × 10-7 Pa. To avoid
525
+ oxidation, 4-nm-thick SiO2 was sputtered on the surface of the films. All sputtering processes were performed
526
+ at room temperature.
527
+ Estimate of electronic temperatures. We calculate the electronic temperatures increase upon pump-pulse
528
+ absorption by
529
+ Δ𝑇� = �𝑇�
530
+ � + 2𝑓
531
+ 𝑑𝛾 − 𝑇�.
532
+ (3)
533
+ Here, 𝑇� = 300 K is the ambient temperature, 𝑓 is the absorbed fluence in the respective layer (see
534
+ Table S1), 𝑑 is the layer thickness and 𝛾 is the specific electronic heat capacity that is 300 J/m3 K2 for W, 320
535
+ J/m3 K2 for Ni, 330 J/m3 K2 for Ti and 90 J/m3 K2 for Pt [55]. To obtain the absorbed fluences in each layer, we
536
+ note that the pump electric field is almost constant throughout the sample (see Fig S8). Therefore, local pump
537
+ absorption scales solely with the imaginary part of the dielectric function at a wavelength of 800 nm, which
538
+ equals 22.07 for Ni, 9.31 for Pt, 19.41 for Ti and 19.71 for W [56]. Consequently, the absorbed fluence is
539
+ determined by
540
+ 𝑓��/�� = 𝑓���
541
+ 𝑑��/�� Im𝜀��/��
542
+ 𝑑�� Im𝜀�� + 𝑑�� Im𝜀��
543
+
544
+ (4)
545
+ with the total absorbed fluence 𝑓��� that is obtained from the absorbed pump power (see Table S1) and the
546
+ beam size on the sample (see above).
547
+ Model of orbital transport. To model the ballistic current in the PM, we assume that a 𝛿(𝑡)-like transient
548
+ spin accumulation in the FM causes a change Δ𝑛𝐤� in the occupation of each electronic wavepacket in the
549
+ PM with mean wavevector 𝐤 right behind the FM/PM interface at 𝑧 = 0� (Fig. 5a). Subsequently, this
550
+ occupation change propagates into the PM bulk according to Δ𝑛𝐤(𝑧, 𝑡) = Δ𝑛𝐤�𝛿(𝑧 − 𝑣𝐤𝑡), where 𝑣𝐤 is the
551
+ 𝑧 component of the group velocity of the electronic wavepacket. Note that we here restrict ourselves to 𝐤
552
+
553
+ with nonnegative 𝑣𝐤. The occupation change Δ𝑛𝐤(𝑧, 𝑡) is accompanied by a particle current density Δ𝑗𝐤 =
554
+ 𝑣𝐤Δ𝑛𝐤. The total pump-induced current density flowing into the depth of the PM layer is given by the sum
555
+ Δ𝑗(𝑧, 𝑡) =
556
+
557
+ Δ𝑛𝐤�𝑣𝐤𝛿(𝑧 − 𝑣𝐤𝑡)
558
+ 𝐤, �𝐤��
559
+ .
560
+ (5)
561
+ Because Δ𝑛𝐤� predominantly affects states close to the Fermi energy, the summation of Eq. ( 5 ) is
562
+ approximately proportional to an integration over the Fermi-surface parts with 𝑣𝐤 ≥ 0. One obtains
563
+ Δ𝑗(𝑧, 𝑡) = � d𝑣 𝑤(𝑣)𝑣
564
+
565
+
566
+ 𝛿(𝑧 − 𝑣𝑡),
567
+ (6)
568
+ where 𝑤(𝑣) is the weight of the group velocity 𝑣 along the 𝑧 axis. We assume that the Fermi surface is a
569
+ sphere with isotropic occupation change Δ𝑛𝐤� and radius 𝑘�. Consequently, the integrand Δ𝑛𝐤�𝑣𝐤 d�𝐤
570
+ becomes Δ𝑛𝐤�𝑣� cos 𝜃 𝑘�d𝑘d𝜑d cos𝜃 ∝ 𝑣 d𝑣d𝑘d𝜑, where 𝑣� is the Fermi velocity. In other words, all
571
+ velocities from 0 to the Fermi velocity 𝑣� have equal weight, and we find
572
+ Δ𝑗(𝑧, 𝑡) ∝ �
573
+ d𝑣 𝑣
574
+ ��
575
+
576
+ 𝛿(𝑧 − 𝑣𝑡) = 𝑧
577
+ 𝑡� Θ(𝑣�𝑡 − 𝑧),
578
+ (7)
579
+ for 𝑧 > 0. Finally, we phenomenologically account for relaxation of the ballistic current with time constant 𝜏
580
+ by multiplying Δ𝑗(𝑧, 𝑡) with e��/�, which directly takes us to Eq. (2).
581
+
582
+ Acknowledgements
583
+ We thank G. Sala for fruitful discussions. TSS, RR and TK acknowledge funding by the German Research
584
+ Foundation (DFG) through the collaborative research center SFB TRR 227 “Ultrafast spin dynamics” (project
585
+ ID 328545488, projects A05 and B02) and financial support from the Horizon 2020 Framework Programme
586
+ of the European Commission under FET-Open Grant No. 863155 (s-Nebula). FF and YM acknowledge DFG
587
+ collaborative research center SFB TRR 173/2 “Spin+X”(project ID 268565370, project A11). KA and HH
588
+ acknowledge funding by JSPS (Grant Number 22H04964 and 20J20663) and Spintronics Research Network of
589
+ Japan.
590
+
591
+
592
+ References
593
+ [1] Go, D., D. Jo, H.-W. Lee, M. Kläui, and Y. Mokrousov Orbitronics: orbital currents in solids. EPL (Europhysics
594
+ Letters), 2021. 135: p. 37001.
595
+ [2] Miron, I.M., K. Garello, G. Gaudin, P.-J. Zermatten, M.V. Costache, S. Auffret, S. Bandiera, B. Rodmacq, A.
596
+ Schuhl, and P. Gambardella Perpendicular switching of a single ferromagnetic layer induced by in-plane
597
+ current injection. Nature, 2011. 476: p. 189.
598
+ [3] Ji, B., Y. Han, S. Liu, F. Tao, G. Zhang, Z. Fu, and C. Li Several Key Technologies for 6G: Challenges and
599
+ Opportunities. IEEE Communications Standards Magazine, 2021. 5: p. 44.
600
+ [4] Schwierz, F. and J.J. Liou RF transistors: Recent developments and roadmap toward terahertz applications.
601
+ Solid-State Electronics, 2007. 51: p. 1079.
602
+ [5] Vedmedenko, E.Y., R.K. Kawakami, D.D. Sheka, P. Gambardella, A. Kirilyuk, A. Hirohata, C. Binek, O.
603
+ Chubykalo-Fesenko, S. Sanvito, and B.J. Kirby The 2020 magnetism roadmap. Journal of Physics D: Applied
604
+ Physics, 2020. 53: p. 453001.
605
+ [6] Salemi, L., M. Berritta, A.K. Nandy, and P.M. Oppeneer Orbitally dominated Rashba-Edelstein effect in
606
+ noncentrosymmetric antiferromagnets. Nature communications, 2019. 10: p. 1.
607
+ [7] Johansson, A., B. Göbel, J. Henk, M. Bibes, and I. Mertig Spin and orbital Edelstein effects in a two-
608
+ dimensional electron gas: Theory and application to SrTiO 3 interfaces. Physical Review Research, 2021. 3: p.
609
+ 013275.
610
+ [8] Choi, Y.-G., D. Jo, K.-H. Ko, D. Go, K.-H. Kim, H.G. Park, C. Kim, B.-C. Min, G.-M. Choi, and H.-W. Lee
611
+ Observation of the orbital Hall effect in a light metal Ti. arXiv preprint arXiv:2109.14847, 2021.
612
+ [9] Go, D., D. Jo, K.-W. Kim, S. Lee, M.-G. Kang, B.-G. Park, S. Blügel, H.-W. Lee, and Y. Mokrousov Long-Range
613
+ Orbital Transport in Ferromagnets. arXiv preprint arXiv:2106.07928, 2021.
614
+ [10] Bose, A., F. Kammerbauer, D. Go, Y. Mokrousov, G. Jakob, and M. Klaeui Detection of long-range orbital-
615
+ Hall torques. arXiv preprint arXiv:2210.02283, 2022.
616
+ [11] Hayashi, H., D. Jo, D. Go, Y. Mokrousov, H.-W. Lee, and K. Ando Observation of long-range orbital
617
+ transport and giant orbital torque. arXiv preprint arXiv:2202.13896, 2022.
618
+ [12] Zheng, Z., Q. Guo, D. Jo, D. Go, L. Wang, H. Chen, W. Yin, X. Wang, G. Yu, and W. He Magnetization
619
+ switching driven by current-induced torque from weakly spin-orbit coupled Zr. Physical Review Research,
620
+ 2020. 2: p. 013127.
621
+ [13] Kim, J., D. Go, H. Tsai, D. Jo, K. Kondou, H.-W. Lee, and Y. Otani Nontrivial torque generation by orbital
622
+ angular momentum injection in ferromagnetic-metal/Cu/Al 2 O 3 trilayers. Physical Review B, 2021. 103: p.
623
+ L020407.
624
+ [14] Lee, D., D. Go, H.-J. Park, W. Jeong, H.-W. Ko, D. Yun, D. Jo, S. Lee, G. Go, and J.H. Oh Orbital torque in
625
+ magnetic bilayers. Nature communications, 2021. 12: p. 1.
626
+ [15] An, H., Y. Kageyama, Y. Kanno, N. Enishi, and K. Ando Spin–torque generator engineered by natural
627
+ oxidation of Cu. Nature communications, 2016. 7: p. 1.
628
+ [16] Go, D., D. Jo, C. Kim, and H.-W. Lee Intrinsic spin and orbital Hall effects from orbital texture. Physical
629
+ Review Letters, 2018. 121: p. 086602.
630
+ [17] Go, D., F. Freimuth, J.-P. Hanke, F. Xue, O. Gomonay, K.-J. Lee, S. Blügel, P.M. Haney, H.-W. Lee, and Y.
631
+ Mokrousov Theory of current-induced angular momentum transfer dynamics in spin-orbit coupled systems.
632
+ Physical review research, 2020. 2: p. 033401.
633
+ [18] Go, D. and H.-W. Lee Orbital torque: Torque generation by orbital current injection. Physical review
634
+ research, 2020. 2: p. 013177.
635
+ [19] Tazaki, Y., Y. Kageyama, H. Hayashi, T. Harumoto, T. Gao, J. Shi, and K. Ando Current-induced torque
636
+ originating from orbital current. arXiv preprint arXiv:2004.09165, 2020.
637
+ [20] Lee, S., M.-G. Kang, D. Go, D. Kim, J.-H. Kang, T. Lee, G.-H. Lee, J. Kang, N.J. Lee, and Y. Mokrousov Efficient
638
+ conversion of orbital Hall current to spin current for spin-orbit torque switching. Communications Physics,
639
+ 2021. 4: p. 1.
640
+ [21] Liao, L., F. Xue, L. Han, J. Kim, R. Zhang, L. Li, J. Liu, X. Kou, C. Song, and F. Pan Efficient orbital torque in
641
+ polycrystalline ferromagnetic− metal/Ru/Al 2 O 3 stacks: Theory and experiment. Physical Review B, 2022.
642
+ 105: p. 104434.
643
+
644
+ [22] Xiao, Z.-Y., Y.-J. Li, W. Zhang, Y.-J. Han, D. Li, Q. Chen, Z.-M. Zeng, Z.-Y. Quan, and X.-H. Xu Enhancement
645
+ of torque efficiency and spin Hall angle driven collaboratively by orbital torque and spin–orbit torque. Applied
646
+ Physics Letters, 2022. 121: p. 072404.
647
+ [23] Sala, G. and P. Gambardella Giant orbital Hall effect and orbital-to-spin conversion in 3 d, 5 d, and 4 f
648
+ metallic heterostructures. Physical Review Research, 2022. 4: p. 033037.
649
+ [24] Ding, S., A. Ross, D. Go, L. Baldrati, Z. Ren, F. Freimuth, S. Becker, F. Kammerbauer, J. Yang, and G. Jakob
650
+ Harnessing orbital-to-spin conversion of interfacial orbital currents for efficient spin-orbit torques. Physical
651
+ review letters, 2020. 125: p. 177201.
652
+ [25] Manchon, A., J. Železný, I.M. Miron, T. Jungwirth, J. Sinova, A. Thiaville, K. Garello, and P. Gambardella
653
+ Current-induced spin-orbit torques in ferromagnetic and antiferromagnetic systems. Reviews of Modern
654
+ Physics, 2019. 91: p. 035004.
655
+ [26] Seifert, T.S., L. Cheng, Z. Wei, T. Kampfrath, and J. Qi, Spintronic sources of ultrashort terahertz
656
+ electromagnetic pulses. 2022, AIP Publishing LLC. p. 180401.
657
+ [27] Xu, Y., F. Zhang, Y. Liu, R. Xu, Y. Jiang, H. Cheng, A. Fert, and W. Zhao Inverse Orbital Hall Effect Discovered
658
+ from Light-Induced Terahertz Emission. arXiv preprint arXiv:2208.01866, 2022.
659
+ [28] Seifert, T., S. Jaiswal, U. Martens, J. Hannegan, L. Braun, P. Maldonado, F. Freimuth, A. Kronenberg, J.
660
+ Henrizi, I. Radu, E. Beaurepaire, Y. Mokrousov, P.M. Oppeneer, M. Jourdan, G. Jakob, D. Turchinovich, L.M.
661
+ Hayden, M. Wolf, M. Munzenberg, M. Klaui, and T. Kampfrath Efficient metallic spintronic emitters of
662
+ ultrabroadband terahertz radiation. Nature Photonics, 2016. 10: p. 483.
663
+ [29] Kampfrath, T., M. Battiato, P. Maldonado, G. Eilers, J. Notzold, S. Mahrlein, V. Zbarsky, F. Freimuth, Y.
664
+ Mokrousov, S. Blugel, M. Wolf, I. Radu, P.M. Oppeneer, and M. Munzenberg Terahertz spin current pulses
665
+ controlled by magnetic heterostructures. Nat Nanotechnol, 2013. 8: p. 256.
666
+ [30] Jungfleisch, M.B., Q. Zhang, W. Zhang, J.E. Pearson, R.D. Schaller, H. Wen, and A. Hoffmann Control of
667
+ Terahertz Emission by Ultrafast Spin-Charge Current Conversion at Rashba Interfaces. Phys Rev Lett, 2018.
668
+ 120: p. 207207.
669
+ [31] Zhou, C., Y.P. Liu, Z. Wang, S.J. Ma, M.W. Jia, R.Q. Wu, L. Zhou, W. Zhang, M.K. Liu, Y.Z. Wu, and J. Qi
670
+ Broadband Terahertz Generation via the Interface Inverse Rashba-Edelstein Effect. Phys Rev Lett, 2018. 121:
671
+ p. 086801.
672
+ [32] Rouzegar, R., L. Brandt, L. Nádvorník, D.A. Reiss, A.L. Chekhov, O. Gueckstock, C. In, M. Wolf, T.S. Seifert,
673
+ and P.W. Brouwer Laser-induced terahertz spin transport in magnetic nanostructures arises from the same
674
+ force as ultrafast demagnetization. Physical Review B, 2022. 106: p. 144427.
675
+ [33] Lichtenberg, T., M. Beens, M.H. Jansen, B. Koopmans, and R.A. Duine Probing optically induced spin
676
+ currents using terahertz spin waves in noncollinear magnetic bilayers. Physical Review B, 2022. 105: p.
677
+ 144416.
678
+ [34] Mueller, B.Y. and B. Rethfeld ThermodynamicμTmodel of ultrafast magnetization dynamics. Physical
679
+ Review B, 2014. 90: p. 144420.
680
+ [35] Choi, G.M., B.C. Min, K.J. Lee, and D.G. Cahill Spin current generated by thermally driven ultrafast
681
+ demagnetization. Nat Commun, 2014. 5: p. 4334.
682
+ [36] Boeglin, C., E. Beaurepaire, V. Halté, V. López-Flores, C. Stamm, N. Pontius, H. Dürr, and J.-Y. Bigot
683
+ Distinguishing the ultrafast dynamics of spin and orbital moments in solids. Nature, 2010. 465: p. 458.
684
+ [37] Stamm, C., N. Pontius, T. Kachel, M. Wietstruk, and H. Dürr Femtosecond x-ray absorption spectroscopy
685
+ of spin and orbital angular momentum in photoexcited Ni films during ultrafast demagnetization. Physical
686
+ Review B, 2010. 81: p. 104425.
687
+ [38] Hennecke, M., I. Radu, R. Abrudan, T. Kachel, K. Holldack, R. Mitzner, A. Tsukamoto, and S. Eisebitt
688
+ Angular Momentum Flow During Ultrafast Demagnetization of a Ferrimagnet. Physical Review Letters, 2019.
689
+ 122: p. 157202.
690
+ [39] Zhang, W., P. Maldonado, Z. Jin, T.S. Seifert, J. Arabski, G. Schmerber, E. Beaurepaire, M. Bonn, T.
691
+ Kampfrath, P.M. Oppeneer, and D. Turchinovich Ultrafast terahertz magnetometry. Nat Commun, 2020. 11:
692
+ p. 4247.
693
+ [40] Salemi, L. and P.M. Oppeneer First-principles theory of intrinsic spin and orbital Hall and Nernst effects
694
+ in metallic monoatomic crystals. Physical Review Materials, 2022. 6: p. 095001.
695
+ [41] Seifert, T.S., N.M. Tran, O. Gueckstock, S.M. Rouzegar, L. Nadvornik, S. Jaiswal, G. Jakob, V.V. Temnov,
696
+ M. Münzenberg, M. Wolf, M. Kläui, and T. Kampfrath Terahertz spectroscopy for all-optical spintronic
697
+
698
+ characterization of the spin-Hall-effect metals Pt, W and Cu80Ir20. Journal of Physics D: Applied Physics,
699
+ 2018. 51: p. 364003.
700
+ [42] Huber, R., A. Brodschelm, F. Tauser, and A. Leitenstorfer Generation and field-resolved detection of
701
+ femtosecond electromagnetic pulses tunable up to 41 THz. Applied Physics Letters, 2000. 76: p. 3191.
702
+ [43] Braun, L., G. Mussler, A. Hruban, M. Konczykowski, T. Schumann, M. Wolf, M. Münzenberg, L. Perfetti,
703
+ and T. Kampfrath Ultrafast photocurrents at the surface of the three-dimensional topological insulator Bi 2
704
+ Se 3. Nature communications, 2016. 7: p. 1.
705
+ [44] Gueckstock, O., L. Nadvornik, M. Gradhand, T.S. Seifert, G. Bierhance, R. Rouzegar, M. Wolf, M. Vafaee,
706
+ J. Cramer, M.A. Syskaki, G. Woltersdorf, I. Mertig, G. Jakob, M. Klaui, and T. Kampfrath Terahertz Spin-to-
707
+ Charge Conversion by Interfacial Skew Scattering in Metallic Bilayers. Adv Mater, 2021. 33: p. e2006281.
708
+ [45] Ding, S., Z. Liang, D. Go, C. Yun, M. Xue, Z. Liu, S. Becker, W. Yang, H. Du, and C. Wang Observation of the
709
+ orbital Rashba-Edelstein magnetoresistance. Physical review letters, 2022. 128: p. 067201.
710
+ [46] Santos, E., J. Abrão, D. Go, L. de Assis, Y. Mokrousov, J. Mendes, and A. Azevedo Inverse Orbital Torque
711
+ via Spin-Orbital Entangled States. arXiv preprint arXiv:2204.01825, 2022.
712
+ [47] Okano, G., M. Matsuo, Y. Ohnuma, S. Maekawa, and Y. Nozaki Nonreciprocal spin current generation in
713
+ surface-oxidized copper films. Physical review letters, 2019. 122: p. 217701.
714
+ [48] Yoda, T., T. Yokoyama, and S. Murakami Orbital Edelstein effect as a condensed-matter analog of
715
+ solenoids. Nano letters, 2018. 18: p. 916.
716
+ [49] Go, D., J.-P. Hanke, P.M. Buhl, F. Freimuth, G. Bihlmayer, H.-W. Lee, Y. Mokrousov, and S. Blügel Toward
717
+ surface orbitronics: giant orbital magnetism from the orbital Rashba effect at the surface of sp-metals.
718
+ Scientific reports, 2017. 7: p. 1.
719
+ [50] Chattaraj, A., S. Joulie, V. Serin, A. Claverie, V. Kumar, and A. Kanjilal Crucial role of oxygen on the bulk
720
+ and surface electronic properties of stable β phase of tungsten. Scientific reports, 2022. 12: p. 1.
721
+ [51] Wu, Y., M. Elyasi, X. Qiu, M. Chen, Y. Liu, L. Ke, and H. Yang High-Performance THz Emitters Based on
722
+ Ferromagnetic/Nonmagnetic Heterostructures. Adv Mater, 2017. 29: p. 1603031.
723
+ [52] Zhang, S., Z. Jin, Z. Zhu, W. Zhu, Z. Zhang, G. Ma, and J. Yao Bursts of efficient terahertz radiation with
724
+ saturation effect from metal-based ferromagnetic heterostructures. Journal of Physics D: Applied Physics,
725
+ 2017. 51: p. 034001.
726
+ [53] Niu, C., J.-P. Hanke, P.M. Buhl, H. Zhang, L. Plucinski, D. Wortmann, S. Blügel, G. Bihlmayer, and Y.
727
+ Mokrousov Mixed topological semimetals driven by orbital complexity in two-dimensional ferromagnets.
728
+ Nature communications, 2019. 10: p. 1.
729
+ [54] Seifert, T.S., S. Jaiswal, J. Barker, S.T. Weber, I. Razdolski, J. Cramer, O. Gueckstock, S.F. Maehrlein, L.
730
+ Nadvornik, S. Watanabe, C. Ciccarelli, A. Melnikov, G. Jakob, M. Munzenberg, S.T.B. Goennenwein, G.
731
+ Woltersdorf, B. Rethfeld, P.W. Brouwer, M. Wolf, M. Klaui, and T. Kampfrath Femtosecond formation
732
+ dynamics of the spin Seebeck effect revealed by terahertz spectroscopy. Nat Commun, 2018. 9: p. 2899.
733
+ [55] Lin, Z., L.V. Zhigilei, and V. Celli Electron-phonon coupling and electron heat capacity of metals under
734
+ conditions of strong electron-phonon nonequilibrium. Physical Review B, 2008. 77: p. 075133.
735
+ [56] Ordal, M.A., L.L. Long, R.J. Bell, S.E. Bell, R.R. Bell, R.W. Alexander, and C.A. Ward Optical properties of
736
+ the metals Al, Co, Cu, Au, Fe, Pb, Ni, Pd, Pt, Ag, Ti, and W in the infrared and far infrared. Applied Optics, 1983.
737
+ 22: p. 1099.
738
+ [57] Zak, J., E. Moog, C. Liu, and S. Bader Universal approach to magneto-optics. Journal of Magnetism and
739
+ Magnetic Materials, 1990. 89: p. 107.
740
+
741
+
742
+
743
+
744
+ Supplementary Materials
745
+ First, we summarize briefly the content of the Supplementary Materials before showing the
746
+ corresponding data:
747
+
748
+
749
+ Samples on Si show qualitatively the same THz emission waveforms for Ni with Pt, W and Ti.
750
+ Most importantly, the strong change in W dynamics is also observed on Si (Fig. S1). However, the
751
+ THz waveforms of Si vs glass differ in the details, which might be related to slightly changed
752
+ transport times.
753
+
754
+ Drude scattering times are estimated to be <50 fs for all studied samples (Figs. S2). None of the
755
+ samples showed any indication of a drastically different Drude scattering time compared to all
756
+ other samples.
757
+
758
+ Emitted THz signals are found to be linearly polarized and perpendicular to the sample
759
+ magnetization (Fig. S3).
760
+
761
+ Pump-polarization dependent studies (pump helicity and linear polarization direction) show a
762
+ minor impact on the measured THz emission signal (Figs. S4).
763
+
764
+ We perform THz emission measurements upon reversing the sample. Only the pure Ni film shows
765
+ a dominant contribution even in sample rotation, which we ascribe to SIA or magnetic dipole
766
+ radiation (Fig. S5) [32, 39].
767
+
768
+ For all Py-based bilayer samples, we find almost identical THz emission waveform shapes even
769
+ for PM thicknesses of 20 nm (Fig. S6).
770
+
771
+ For Ni|Ti samples, we find almost identical THz emission dynamics to Ni|Pt (Fig. S7).
772
+
773
+ Currents driven by pump light gradients in thick films of Ni|W and Ni|Ti can be neglected (Fig.
774
+ S8).
775
+
776
+ All fluence dependencies are to a good approximation linear (Fig S9) with minor sublinearities
777
+ overserved for Ni|Ti and Ni|W samples. Related to that, only minor changes in the THz waveform
778
+ dynamics can be observed for different pumping fluences (Fig S9)
779
+
780
+ Cu has only minor impact on the emitted THz waveforms (Fig. S10), either as a spacer layer or as
781
+ a capping layer as confirmed by comparison to the same sample without Cu.
782
+
783
+ All data in the Supplementary Materials was measured with a 1 mm ZnTe(110) detection crystal.
784
+
785
+
786
+
787
+
788
+
789
+ FIGURE S1: Si vs glass substrate. a Terahertz-emission waveforms from Ni|PM stacks on Si substrates. THz
790
+ waveforms for Si based samples are multiplied by -1 to account for the reversed sample orientation due
791
+ to the intransparency of the Si substrate for the pump pulse. a Terahertz-emission waveforms from Ni|PM
792
+ stacks on glass substrates. Film thicknesses in nanometers are given as numerals in parenthesis. Note the
793
+ rescaling of the Ni|Pt sample THz waveforms.
794
+
795
+
796
+
797
+ b
798
+ a
799
+
800
+ Glass substrate
801
+ X10-7
802
+ 5
803
+ 4
804
+ 3
805
+ Terahertz signal
806
+ 2
807
+ -2
808
+ -3
809
+ -1.5
810
+ -1
811
+ -0.5
812
+ 0
813
+ 0.5
814
+ Time
815
+ e (ps)Si substrate
816
+ X10-7
817
+ 2.5
818
+ Ni(5)/Pt(3)/4
819
+ 2
820
+ Ni(5)ITi(3)
821
+ Ni(5)/Ti(20)
822
+ 1.5
823
+ Ni(5)IW(3)
824
+ Terahertz signal
825
+ Ni(5)/W(20)
826
+ 1
827
+ 0.5
828
+ O
829
+ -0.5
830
+ -1
831
+ -1.5
832
+ -2
833
+ -0.5
834
+ 0
835
+ 0.5
836
+ 1
837
+ 1
838
+ Time
839
+ (ps)FIGURE S2: Terahertz conductivities for samples on glass. Mean complex-valued terahertz conductivities
840
+ obtained from terahertz transmission measurements for a Ni, b Ni|Ti, c Ni|Pt and d Ni|W samples. For the
841
+ extraction, a thin film formula is applied [41] and a terahertz refractive index of 2.1 for glass is assumed.
842
+ Film thicknesses in nanometers are given as numerals in parenthesis.
843
+
844
+
845
+
846
+ c
847
+ d
848
+ a
849
+ b
850
+
851
+ Ni(5)
852
+ X106
853
+ 7
854
+ 6
855
+ real
856
+ imag
857
+ 5
858
+ Conductivity (S/m)
859
+ 4
860
+ 3
861
+ 2
862
+ 1
863
+ 0
864
+ -1
865
+ 1.5
866
+ 2
867
+ 1
868
+ 2.5
869
+ 3
870
+ 3.5
871
+ Freguency (THz)Ni(5)[Pt(3)
872
+ X106
873
+ 7
874
+ real
875
+ 6
876
+ imag
877
+ 5
878
+ Conductivity (S/m)
879
+ 4
880
+ 3
881
+ 2
882
+ 1
883
+ 0
884
+ -1
885
+ 1
886
+ 1.5
887
+ 2
888
+ 2.5
889
+ 3
890
+ 3.5
891
+ Freguency (THz)Ni(5)/W(3)
892
+ X106
893
+ 7
894
+ real
895
+ 6
896
+ imag
897
+ 5
898
+ Conductivity (S/m)
899
+ 4
900
+ 3
901
+ 2
902
+ 1
903
+ 0
904
+ -1
905
+ 1
906
+ 1.5
907
+ 2
908
+ 2.5
909
+ 3
910
+ 3.5
911
+ Freguency (THz)Ni(5)/Ti(3)
912
+ X106
913
+ 7
914
+ real
915
+ 6
916
+ imag
917
+ 5
918
+ Conductivity (S/m)
919
+ 4
920
+ 3
921
+ 2
922
+ 1
923
+ 0
924
+ -1
925
+ 1
926
+ 1.5
927
+ 2
928
+ 2.5
929
+ 3
930
+ 3.5
931
+ Freguency (THz)
932
+ FIGURE S3: Polarization state of the THz emission signal. Samples are magnetized along the s-direction
933
+ and pump pulses are polarized along the p-direction. Film thicknesses in nanometers are given as numerals
934
+ in parenthesis.
935
+
936
+ -2
937
+ -1
938
+ 0
939
+ 1
940
+ 2
941
+ Time (ps)
942
+ -2
943
+ 0
944
+ 2
945
+ 4
946
+ 6
947
+ 8
948
+ 10
949
+ Terahertz signal
950
+ 10-7
951
+ Ni(5)|Pt(3),p-pol
952
+ Ni(5)|Ti(3),p-pol
953
+ Ni(5)|W(3),p-pol
954
+ Ni(5)|Pt(3),s-pol
955
+ Ni(5)|Ti(3),s-pol
956
+ Ni(5)|W(3),s-pol
957
+
958
+
959
+ FIGURE S4: Impact of pump polarization. a and b: Circular pump polarization. Terahertz emission signals
960
+ even and odd in change of pump helicity for terahertz emission polarized along the p-direction (a) and s-
961
+ direction (b). c and d: Linear pump polarization. Terahertz emission signals even and odd in change of
962
+ pump polarization from s to p polarized for terahertz emission polarized along the p-direction (c) and s-
963
+ direction (d). Samples are magnetized along the s-direction. Film thicknesses in nanometers are given as
964
+ numerals in parenthesis.
965
+
966
+ -2
967
+ -1
968
+ 0
969
+ 1
970
+ 2
971
+ Time (ps)
972
+ 0
973
+ 2
974
+ 4
975
+ 6
976
+ 8
977
+ 10
978
+ 12
979
+ 14
980
+ 16
981
+ 18
982
+ Terahertz signal
983
+ 10-7
984
+ helicity,THz p-pol
985
+ Ni(5)|Pt(3),even
986
+ Ni(5)|Ti(3),even
987
+ Ni(5)|W(3),even
988
+ Ni(5)|Pt(3),odd
989
+ Ni(5)|Ti(3),odd
990
+ Ni(5)|W(3),odd
991
+ -2
992
+ -1
993
+ 0
994
+ 1
995
+ 2
996
+ Time (ps)
997
+ 0
998
+ 2
999
+ 4
1000
+ 6
1001
+ 8
1002
+ 10
1003
+ 12
1004
+ 14
1005
+ 16
1006
+ 18
1007
+ Terahertz signal
1008
+ 10-7
1009
+ helicity,THzs-pol
1010
+ -2
1011
+ -1
1012
+ 0
1013
+ 1
1014
+ 2
1015
+ Time (ps)
1016
+ 0
1017
+ 2
1018
+ 4
1019
+ 6
1020
+ 8
1021
+ 10
1022
+ 12
1023
+ 14
1024
+ 16
1025
+ 18
1026
+ Terahertz signal
1027
+ 10-7s vs p pump,THz p-pol
1028
+ Ni(5)|Pt(3),even
1029
+ Ni(5)|Ti(3),even
1030
+ Ni(5)|W(3),even
1031
+ Ni(5)|Pt(3),odd
1032
+ Ni(5)|Ti(3),odd
1033
+ Ni(5)|W(3),odd
1034
+ -2
1035
+ -1
1036
+ 0
1037
+ 1
1038
+ 2
1039
+ Time (ps)
1040
+ 0
1041
+ 2
1042
+ 4
1043
+ 6
1044
+ 8
1045
+ 10
1046
+ 12
1047
+ 14
1048
+ 16
1049
+ 18
1050
+ Terahertz signal
1051
+ 10-7 s vs p pump,THz s-pol
1052
+ a
1053
+ b
1054
+ c
1055
+ d
1056
+
1057
+
1058
+ FIGURE S5: Front-side vs back-side pump geometry. a Samples pumped from the front side. b Samples
1059
+ pumped from the back side. The back-side pumping is defined as the direction where the pump pulse first
1060
+ traverses the substrate before exciting the sample and is the standard direction used for all measurements
1061
+ throughout this work. Film thicknesses in nanometers are given as numerals in parenthesis.
1062
+
1063
+
1064
+ FIGURE S6: Terahertz emission signals for Py based samples as shown in Fig. 2a in addition to terahertz
1065
+ emission signals from thicker Ti and W layers on Py. Film thicknesses in nanometers are given as numerals
1066
+ in parenthesis.
1067
+
1068
+
1069
+ b
1070
+ a
1071
+ b
1072
+ a
1073
+
1074
+ front-side
1075
+ back-side
1076
+ X10-6
1077
+ X10-6
1078
+ Ni(5)
1079
+ 6
1080
+ 6
1081
+ Ni(5)/Pt(3)/5
1082
+ 5
1083
+ 5
1084
+ Ni(5)/Ti(3)
1085
+ 4
1086
+ 4
1087
+ Ni(5)IPt(3)/5
1088
+ Terahertz signal
1089
+ 3
1090
+ Y
1091
+ erahertz
1092
+ 2
1093
+ Ni(5)/W(3)
1094
+ Ni(5)IPt(3)/5
1095
+ 0
1096
+ 0
1097
+ -2
1098
+ .1
1099
+ 0
1100
+ 2
1101
+ -2
1102
+ -1
1103
+ 0
1104
+ 1
1105
+ 2
1106
+ Time (ps)
1107
+ Time (ps)X10-6
1108
+ 3
1109
+ Py(5)/Pt(3) /3
1110
+ Py(5)/Ti(3)
1111
+ 2
1112
+ Py(5)/W(3)
1113
+ Py(5)ITi(20)
1114
+ Terahertz signal
1115
+ Py(5)IW(20)
1116
+ 0
1117
+ -2
1118
+ -3
1119
+ 0
1120
+ 2
1121
+ 1
1122
+ Time (ps)Py(5)IPt(3)
1123
+ Py(5)/Ti(3)
1124
+ Norm. terahertz signal
1125
+ Py(5)/W(3)
1126
+ 0.5
1127
+ -0.5
1128
+ 0
1129
+ 2
1130
+ 1
1131
+ Time
1132
+ (ps)
1133
+ FIGURE S7: Ni|Pt vs Ni|Ti. Film thicknesses in nanometers are given as numerals in parenthesis. Note the
1134
+ rescaling of the Ni|Pt sample waveform.
1135
+
1136
+
1137
+ FIGURE S8: Calculated pump-light gradient in Ni for Ni(5)|Ti(20) and Ni(5)|W(20) samples, which are the
1138
+ thickest samples measured. However, even in these thickest samples, the pump-light gradient is minor.
1139
+ The calculation is based on a transfer matrix formalism [57]. Film thicknesses in nanometers are given as
1140
+ numerals in parenthesis.
1141
+
1142
+ 0
1143
+ 1
1144
+ 2
1145
+ 3
1146
+ 4
1147
+ Time (ps)
1148
+ -3
1149
+ -2
1150
+ -1
1151
+ 0
1152
+ 1
1153
+ 2
1154
+ 3
1155
+ 4
1156
+ Terahertz signal
1157
+ 10-7
1158
+ Ni(5)|Pt(3)/5
1159
+ Ni(5)|Ti(3)
1160
+ Ni(5)|Ti(20)
1161
+ 0
1162
+ 2
1163
+ 4
1164
+ Thickness (nm)
1165
+ 0
1166
+ 0.05
1167
+ 0.1
1168
+ 0.15
1169
+ 0.2
1170
+ 0.25
1171
+ Rel. pump light intensity
1172
+ Ni(5)|Ti(20)
1173
+ Ni(5)|W(20)
1174
+
1175
+
1176
+ FIGURE S9: Pump fluence dependencies. a Fluence dependencies of Ni capped with Pt, W or Ti. The data
1177
+ was contracted by taking the root mean square (RMS) of the time-domain traces. b-f Normalized THz
1178
+ emission signals for different pump fluences. Film thicknesses in nanometers are given as numerals in
1179
+ parenthesis.
1180
+
1181
+
1182
+ b
1183
+ a
1184
+ d
1185
+ c
1186
+ f
1187
+ e
1188
+
1189
+ X10-6
1190
+ 10
1191
+ RMS of terahertz signal
1192
+ Ni(5)IPt(3)/3
1193
+ Ni(5)ITi(3)
1194
+ 8
1195
+ Ni(5)IW(3)
1196
+ 6
1197
+ 4
1198
+ 2
1199
+ 0
1200
+ 0.05
1201
+ 0.1
1202
+ Incident fluence
1203
+ (mJ/cm²Ni(5)[Pt(3)
1204
+ 0.25
1205
+ 0.5
1206
+ 0.75
1207
+ Norm. terahertz signal
1208
+ 0.5
1209
+ 1
1210
+ -0.5
1211
+ -0.5
1212
+ 0
1213
+ 0.5
1214
+ Time
1215
+ (psNi(5)/Ti(3)
1216
+ Norm. terahertz signal
1217
+ 0.5
1218
+ 0
1219
+ -0.5
1220
+ -1.5
1221
+ -0.5
1222
+ 0
1223
+ 0.5
1224
+ 7
1225
+ Time
1226
+ (psNi(5)/Ti(20)
1227
+ 0.5
1228
+ terahertz signal
1229
+ -0.5
1230
+ Norm. t
1231
+ -1.5
1232
+ -0.5
1233
+ 0
1234
+ 0.5
1235
+ Time
1236
+ e (ps)Ni(5)/W(3)
1237
+ 0.5
1238
+ Norm. terahertz signal
1239
+ -0.5
1240
+ -1.5
1241
+ -0.5
1242
+ 0
1243
+ 0.5
1244
+ Time
1245
+ (psNi(5)/W(20)
1246
+ 0.5
1247
+ Norm. terahertz signal
1248
+ -0.5
1249
+ -1.5
1250
+ -0.5
1251
+ 0
1252
+ 0.5
1253
+ Time
1254
+ e (ps)FIGURE S10: Impact of cupper inter- and capping layers. a Reference samples without Cu b Samples with
1255
+ Cu intermediate layer c Samples with Cu capping layer. Film thicknesses in nanometers are given as
1256
+ numerals in parenthesis.
1257
+
1258
+
1259
+
1260
+ a
1261
+ b
1262
+ c
1263
+
1264
+ X10-6
1265
+ 2
1266
+ Ni(5)/W(3)/Cu(2
1267
+ Ni(5)IPt(3)ICu(2)
1268
+ 1.5
1269
+ Ni(5)/Ti(3)ICu(2)
1270
+ Ni(5)ICu(2)
1271
+ Terahertz signal
1272
+ 0.5
1273
+ 0
1274
+ -0.5
1275
+ -2
1276
+ 0
1277
+ 2
1278
+ Time (ps)X10-6
1279
+ 1.5
1280
+ Ni(5)/Cu(2)W(3)
1281
+ Ni(5)ICu(2)IPt(3)
1282
+ Ni(5)ICu(2)/Ti(3)
1283
+ Ni(5)ICu(2)
1284
+ Terahertz signal
1285
+ 0.5
1286
+ 0
1287
+ -0.5
1288
+ -2
1289
+ 0
1290
+ 2
1291
+ Time (ps)X10-6
1292
+ Ni(5)/W(3)
1293
+ Ni(5)IPt(3)
1294
+ 3
1295
+ Ni(5)ITi(3)
1296
+ Terahertz signal
1297
+ 2
1298
+ -2
1299
+ -2
1300
+ -1
1301
+ 0
1302
+ 2
1303
+ Time (ps)
1304
+ Sample
1305
+ Absorptance
1306
+ Absorbed fluence
1307
+ in the FM layer
1308
+ (mJ/cm2)
1309
+ Absorbed
1310
+ fluence in the
1311
+ PM layer
1312
+ (mJ/cm2)
1313
+ Conductivity (1e6
1314
+ S/m)
1315
+ Glass| Ti(50)
1316
+ -
1317
+ -
1318
+ -
1319
+ 1.6
1320
+ Glass| Ni(5)|W(20)
1321
+ 0.52
1322
+ 0.06
1323
+ 0.20
1324
+ 5.1
1325
+ Glass| Ni(5)|Pt(3)
1326
+ 0.63
1327
+ 0.25
1328
+ 0.06
1329
+ 3.6
1330
+ Glass| Ni(5)|Ti(3)
1331
+ 0.58
1332
+ 0.19
1333
+ 0.10
1334
+ 2.2
1335
+ Glass| Ni(5)|W(3)
1336
+ 0.58
1337
+ 0.19
1338
+ 0.10
1339
+ 2.1
1340
+ Glass| Ni(5)|Ti(20)
1341
+ 0.51
1342
+ 0.06
1343
+ 0.20
1344
+ 1.6
1345
+ Glass| Ni(5)
1346
+ 0.51
1347
+ 0.25
1348
+ -
1349
+ 1.7
1350
+ Glass| Py(5)|W(3)
1351
+ -
1352
+ -
1353
+ -
1354
+ 2.2
1355
+ Glass| Py(5)|Ti(3)
1356
+ -
1357
+ -
1358
+ -
1359
+ 1.5
1360
+ Glass| Py(5)|Pt(3)
1361
+ -
1362
+ -
1363
+ -
1364
+ 2.5
1365
+ Glass| Py(5)|W(20)
1366
+ -
1367
+ -
1368
+ -
1369
+ 5.3
1370
+ Glass| Py(5)
1371
+ -
1372
+ -
1373
+ -
1374
+ 2.4
1375
+ Glass| Py(5)|Ti(20)
1376
+ -
1377
+ -
1378
+ -
1379
+ 1.2
1380
+ Glass| Ni(5)|Ti(3)|Cu(2)
1381
+ 0.53
1382
+ -
1383
+ -
1384
+ 3.1
1385
+ Glass| Ni(5)|Pt(3)|Cu(2)
1386
+ 0.54
1387
+ -
1388
+ -
1389
+ 4.2
1390
+ Glass| Ni(5)|W(3)|Cu(2)
1391
+ 0.58
1392
+ -
1393
+ -
1394
+ 4.0
1395
+ Glass| Ni(5)|Cu(2)
1396
+ 0.52
1397
+ -
1398
+ -
1399
+ 4.5
1400
+ Glass| Ni(5)|Cu(2)|Ti(3)
1401
+ 0.56
1402
+ -
1403
+ -
1404
+ 3.4
1405
+ Glass| Ni(5)|Cu(2)|Pt(3)
1406
+ 0.54
1407
+ -
1408
+ -
1409
+ 3.7
1410
+ Glass| Ni(5)|Cu(2)|W(3)
1411
+ 0.57
1412
+ -
1413
+ -
1414
+ 3.4
1415
+ Glass| Ni(5)|W(15)
1416
+ 0.54
1417
+ 0.07
1418
+ 0.19
1419
+ 4.7
1420
+ Glass| Ni(5)|W(10)
1421
+ 0.57
1422
+ 0.10
1423
+ 0.18
1424
+ 4.2
1425
+ Glass| Ni(5)|W(5)
1426
+ 0.63
1427
+ 0.16
1428
+ 0.15
1429
+ 3.6
1430
+ Glass| Ni(5)|W(2)
1431
+ 0.60
1432
+ 0.22
1433
+ 0.08
1434
+ 2.9
1435
+ Si| Ni(5)|W(3)
1436
+ -
1437
+ -
1438
+ -
1439
+ 2.9
1440
+ Si| Ni(5)|Ti(20)
1441
+ -
1442
+ -
1443
+ -
1444
+ 1.6
1445
+ Si| Ti(50)
1446
+ -
1447
+ -
1448
+ -
1449
+ 1.5
1450
+ Si| Ni(5)|Pt(3)
1451
+ -
1452
+ -
1453
+ -
1454
+ 3.4
1455
+ Si| Ni(5)|W(20)
1456
+ -
1457
+ -
1458
+ -
1459
+ 4.3
1460
+ Si| Ni(5)
1461
+ -
1462
+ -
1463
+ -
1464
+ 3.3
1465
+ Si| Ni(5)|Ti(3)
1466
+ -
1467
+ -
1468
+ -
1469
+ 2.3
1470
+ Table S1. Optical properties of all studied samples. To obtain the absorbed fluence in the FM and PM layer, we
1471
+ assume imaginary parts of the dielectric constants at 800 nm of 22.07 for Ni, 9.31 for Pt, 19.41 for Ti and 19.71 for W
1472
+ [56]. Note that all films are additionally capped with 4 nm SiO2.
1473
+
1474
+
1475
+
1476
+
4tAyT4oBgHgl3EQf2Plc/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dAyT4oBgHgl3EQfpfgA/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c53eff9701cf0bfb139f46a88c0a5cf57c16c4ba1c1c4d9e61b6e392bc8a2f50
3
+ size 234736
5dFKT4oBgHgl3EQfSi3T/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:75b25e88d67cd7190c7b8258ec0d407b6cba625959a883c0e6965f831137a5a7
3
+ size 7274541
69E1T4oBgHgl3EQf7AXC/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e4f530223f40749f312681dc4e7bcd16628913a5f15b3ab9e7072379e20ba858
3
+ size 135999
6NE1T4oBgHgl3EQfBQJe/content/2301.02849v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8e34609f92c1adb64b5d04b764145ee85b6d1ee9b86d923566e1bea7976986c7
3
+ size 1460529
6NE1T4oBgHgl3EQfBQJe/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:308b3d572855fb79da60d658f18b203064991c8ae570a4e049ebc37053cad345
3
+ size 3801133
6dAyT4oBgHgl3EQfQfZh/content/tmp_files/2301.00046v1.pdf.txt ADDED
@@ -0,0 +1,783 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A Bayesian treatment of the German tank problem
2
+ Cory M. Simon
3
+ School of Chemical, Biological, and Environmental Engineering. Oregon State
4
+ University. Corvallis, OR. USA.
5
6
+ Abstract
7
+ The German tank problem has an interesting historical background and is an engaging
8
+ problem in statistical estimation for the classroom. The objective is to estimate the size
9
+ of a population of tanks inscribed with sequential serial numbers, from a random sample.
10
+ In this tutorial article, we outline the Bayesian approach to the German tank problem,
11
+ (i) whose solution assigns a probability to each tank population size, thereby quantifying
12
+ uncertainty, and (ii) which provides an opportunity to incorporate prior information and/or
13
+ beliefs about the tank population size into the solution. We illustrate with an example.
14
+ Finally, we survey other research problems that bear resemblance to the German tank
15
+ problem.
16
+ s1=15
17
+ s2=14
18
+ s3=3
19
+ serial numbers
20
+ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
21
+ size of tank population, n
22
+ 0
23
+ 10
24
+ 20
25
+ 30
26
+ 40
27
+ probability
28
+ 0.00
29
+ 0.05
30
+ 0.10
31
+ 0.15
32
+ 0.20
33
+ prior
34
+ likelihood
35
+ posterior
36
+ 1
37
+ arXiv:2301.00046v1 [stat.OT] 30 Dec 2022
38
+
39
+ 1
40
+ Background
41
+ 1.1
42
+ History
43
+ To inform their military strategy during World War II (1939-1945), the Allies sought to es-
44
+ timate the rate of production of various military equipment (tanks, tires, rockets, etc.) by
45
+ Germany. Conventional methods to estimate armament production—including (i) extrapo-
46
+ lating data on prewar manufacturing capabilities, (ii) obtaining reports from secret sources,
47
+ and (iii) interrogating prisoners of war—were unreliable and/or contradictory.
48
+ In 1943, British and American economic intelligence agencies exploited a German man-
49
+ ufacturing practice in order to statistically estimate their armament production. Germany
50
+ marked their military equipment with serial numbers and codes for the date and/or place of
51
+ manufacture to handle spare parts and trace faulty/defective equipment/parts back to the
52
+ manufacturer for quality control. However, these markings on a captured sample of German
53
+ equipment provided the Allies information about Germany’s production of it.
54
+ To estimate Germany’s production of tanks, the Allies collected serial numbers on the
55
+ chassis, engines, gearboxes, and bogie wheels of samples of tanks by inspecting captured
56
+ tanks and examining captured records1. Despite lacking an exhaustive sample, the sequential
57
+ nature of2 and patterns in these samples of serial numbers enabled the Allies to estimate
58
+ Germany’s tank production—postwar, we know, much more accurately than conventional
59
+ American and British intelligence (Tab. 1).
60
+ See Ruggles and Brodie [1] for the detailed historical account of serial number analysis to
61
+ estimate German armament production during World War II.
62
+ Table 1: Monthly production of tanks by Germany. [1]
63
+ estimates
64
+ date
65
+ conventional
66
+ American
67
+ & British Intelligence
68
+ serial number analysis
69
+ German
70
+ records
71
+ June, 1940
72
+ 1000
73
+ 169
74
+ 122
75
+ June, 1941
76
+ 1550
77
+ 244
78
+ 271
79
+ August, 1942
80
+ 1550
81
+ 327
82
+ 342
83
+ 1Eg., captured records from tank repair depots listed serial numbers of the chassis and engine of repaired
84
+ tanks, and records from divisional headquarters listed chassis serial numbers of tanks held by a specific unit.
85
+ 2Gearboxes on captured tanks, for example, were inscribed with serial numbers belonging to an unbroken
86
+ sequence. Chassis serial numbers, on the other hand, were broken into blocks to distinguish models/designs,
87
+ leaving gaps between the serial numbers assigned to them.
88
+ 2
89
+
90
+ 1.2
91
+ The German tank problem
92
+ Simplification of the historical context to estimate German tank production via serial number
93
+ analysis [1] motivated the formulation of the textbook-friendly German tank problem [2]:
94
+ Problem statement
95
+ In the backdrop of World War II, the German military has n tanks.
96
+ Each tank is
97
+ inscribed with a unique serial number in {1, ..., n}.
98
+ As the Allies, we do not know n, but we captured (without replacement, of course) a
99
+ sample of k German tanks with inscribed serial numbers (s1, ..., sk).
100
+ s1
101
+ s2
102
+ · · ·
103
+ sk
104
+ Assuming all tanks in the population were equally likely to be captured, our objective
105
+ is to estimate n in consideration of the data (s1, ..., sk).
106
+ In 1942, Alan Turing and Andrew Gleason discussed a variant of the German tank prob-
107
+ lem, “how to best to estimate the total number of taxicabs in a town, having seen a random
108
+ selection of their license numbers”, in a crowded restaurant in Washington DC [3,4]. Today,
109
+ with its interesting historical background [1], the German tank problem is still a suitable con-
110
+ versation topic for dinners and serves as an intellectually engaging, challenging, and enjoyable
111
+ problem to illustrate combinatorics and statistical estimation in the classroom [5–8].
112
+ Uncertainty quantification.
113
+ Any estimate of the tank population size n from the data
114
+ (s1, ..., sk) is subject to uncertainty, since we (presumably) have not captured all of the tanks
115
+ (ie., k ̸= n, probably). Quantifying uncertainty in our estimate of the tank population size n
116
+ is important because high-stakes military decisions may be made on its basis.
117
+ Our contribution.
118
+ In this pedagogical article, we outline the Bayesian approach to the
119
+ German tank problem, (i) whose solution assigns a probability to each tank population size,
120
+ thereby quantifying uncertainty, and (ii) which provides an opportunity to incorporate prior
121
+ information and/or beliefs about the tank population size into the solution.
122
+ 1.3
123
+ Survey of previous work on the German tank problem
124
+ The frequentist approach.
125
+ Border [9] calls the German tank problem a ”weird case” in
126
+ frequentist estimation. The maximum likelihood estimator of the tank population size n is
127
+ 3
128
+
129
+ the maximum serial number observed among the k captured tanks, m(k) := maxi∈{1,...,k} si.
130
+ This is a biased estimator, as certainly m(k) ≤ n.
131
+ Goodman [2, 10] derives the minimum-variance, unbiased point estimator of the tank
132
+ population size
133
+ ˆn = m(k) +
134
+
135
+ m(k)
136
+ k
137
+ − 1
138
+
139
+ .
140
+ (1)
141
+ To intuit this estimator, note (i) n must be greater than or equal to m(k) and (ii) if we observe
142
+ large (small) gaps between the serial numbers (s1, ..., sk) after sorting them (incl. the gap
143
+ preceding the smallest serial number), then n is likely (unlikely) to be much greater than m(k).
144
+ The estimator of n in eqn. 1 quantifies how far beyond m(k) we should estimate the tank
145
+ population size, based on the gaps; m(k)/k − 1 is the average size of the gaps. Goodman
146
+ also derives a frequentist confidence interval for n.
147
+ Clark, Gonye, and Miller explore using simulations and linear regression to discover the
148
+ estimator in eqn. 1 [11].
149
+ For pedagogy.
150
+ Champkin highlights the historical context of the German tank problem
151
+ as a ”great moment in statistics” [12]. Johnson lists and evaluates several intuitive point
152
+ estimators for the size of the tank population [5]. Scheaffer, Watkins, Gnanadesikan, and
153
+ Witmer [13] propose a hands-on learning activity to illustrate the German tank problem by
154
+ sampling chips, labeled with numbers from 1 to n, from a bowl. Berg [6] uses the German
155
+ tank problem as a competition in the classroom.
156
+ The Bayesian approach.
157
+ Closely related to our paper, Roberts [14], H¨ohle and Held [15],
158
+ and Linden, Dose, and Toussaint [16], and Cocco, Monasson, and Zamponi [17] provide a
159
+ Bayesian analysis of the German tank problem. They derive an analytical formula for the
160
+ mean of the posterior distribution of the tank population size under an improper, uniform
161
+ prior distribution. Andrews [18] outlines the Bayesian approach to the German tank problem
162
+ in a blog post containing code in the R language.
163
+ Generalizations/variants.
164
+ Goodman [2, 10] poses a variant of the German tank problem
165
+ where the initial serial number is not known; ie., where the n tanks are inscribed with serial
166
+ numbers {b + 1, ..., n + b} with b and n unknown. Lee and Miller generalize the German
167
+ tank problem to the settings where the serial numbers are continuous and/or lie in two
168
+ dimensions [19].
169
+ 1.4
170
+ Overview of the Bayesian approach to the German tank problem
171
+ Under a Bayesian perspective [8,20,21], we treat the (unknown) total number of tanks as a
172
+ discrete random variable N (hence, capitalization) to model our uncertainty in it. A proba-
173
+ 4
174
+
175
+ bility mass function of N assigns a probability to each possible tank population size n. This
176
+ probability is a measure of our degree of belief, perhaps with some basis in knowledge/data,
177
+ that the tank population size is n [22].
178
+ Because the observed serial numbers (s1, ..., sk) provide information about the tank pop-
179
+ ulation size, the probability mass function of N differs before and after they are collected and
180
+ considered. Hence, N has a prior and posterior probability mass function.
181
+ The three inputs to a Bayesian treatment of the German tank problem are:
182
+ • the prior mass function of N, which expresses a combination of our subjective beliefs
183
+ and objective knowledge about the tank population size before we collect and consider
184
+ the sample of serial numbers.
185
+ • the data, the observed serial numbers (s1, ..., sk), viewed as realizations of random
186
+ variables owing to the stochasticity of tank-capturing.
187
+ • the likelihood function, giving the probability of the data (s1, ..., sk) under each tank
188
+ population size N = n, based on a probabilistic model of the tank-capturing process.
189
+ The output of a Bayesian treatment of the German tank problem is the posterior mass
190
+ function of the tank population size N, conditioned on the data (s1, ..., sk). The posterior
191
+ follows from Bayes’ theorem and can be viewed as an update to the prior in light of the
192
+ data. The posterior mass function of N assigns each possible tank population size n with a
193
+ probability according to a compromise between its (i) likelihood, which quantifies the support
194
+ the observed serial numbers (s1, ..., sk) lend to the tank population size being n according to
195
+ our probabilistic tank-capturing model, and (ii) prior probability, which quantifies how likely
196
+ we thought the tank population size might be n before the serial numbers (s1, ..., sk) were
197
+ collected and considered. [21]
198
+ The posterior mass function of N is the raw, uncertainty-quantifying, Bayesian solution
199
+ to the German tank problem. We may summarize the posterior by reporting its median and
200
+ the high-mass subset of the natural numbers that credibly contains the tank population size.
201
+ Also, we can use the posterior to answer questions such as, what is the probability that N
202
+ exceeds some threshold quantity n′ that would alter military strategy?
203
+ 2
204
+ A Bayesian approach to the German tank problem
205
+ We now tackle the German tank problem from a Bayesian standpoint.
206
+ For reference, the variables are listed in Tab. 2. We use upper- and lower-case letters to
207
+ represent random variables and realizations of them, respectively. Throughout, we employ
208
+ the indicator function IA(x) which maps its input x to 1 if x belongs to the set A and to 0
209
+ otherwise (if x /∈ A).
210
+ 5
211
+
212
+ Table 2: List of parameters/variables.
213
+ parameter/variable
214
+
215
+ description
216
+ n
217
+ N≥0
218
+ size of population of tanks
219
+ k
220
+ N>0
221
+ number of captured tanks
222
+ si
223
+ N>0
224
+ serial number on captured tank i
225
+ s(k)
226
+ Nk
227
+ >0
228
+ vector listing the serial numbers on the k captured tanks
229
+ m(k)
230
+ N>0
231
+ maximum serial number among the k captured tanks
232
+ 2.1
233
+ The data, data-generating process, and likelihood function
234
+ The data.
235
+ The data we obtain in the German tank problem is the vector of serial numbers
236
+ inscribed on the k captured tanks
237
+ s(k) := (s1, ..., sk).
238
+ (2)
239
+ We view the data s(k) as a realization of the discrete random vector S(k) := (S1, ..., Sk).
240
+ Note, at this point, we are entertaining the possibility that the order in which tanks are
241
+ captured matters.
242
+ The data-generating process.
243
+ The stochastic data-generating process constitutes sequen-
244
+ tial capture of k tanks from a population of n tanks, without replacement, then inspecting
245
+ their serial numbers to construct s(k). We assume that each tank in the population is equally
246
+ likely to be captured at each step. Then, mathematically, the stochastic data-generating
247
+ process is sequential, uniform random selection of k integers, without replacement, from the
248
+ set {1, ..., n}.
249
+ The likelihood function.
250
+ The likelihood function specifies the probability of the data S(k) =
251
+ s(k) given each tank population size N = n. Each outcome s(k) in the sample space Ω(k)
252
+ n
253
+ is
254
+ equally likely, where
255
+ Ω(k)
256
+ n
257
+ := {(s1, ..., sk)̸= : si ∈ {1, ..., n} for all i ∈ {1, ..., k}},
258
+ (3)
259
+ with (· · · )̸= meaning the elements of the vector (· · · ) are unique. The number of outcomes in
260
+ the sample space, |Ω(k)
261
+ n |, is the number of distinct ordered arrangements of k distinct integers
262
+ from the set {1, ..., n}, given by the falling factorial:
263
+ (n)k := n(n − 1) · · · (n − k + 1) = n!/(n − k)!.
264
+ (4)
265
+ Under the data-generating process, then, the probability of observing data S(k) = s(k) given
266
+ the tank population size N = n is the uniform distribution:
267
+ πlikelihood(S(k) = s(k) | N = n) =
268
+ 1
269
+ (n)k
270
+ IΩ(k)
271
+ n
272
+
273
+ s(k)�
274
+ .
275
+ (5)
276
+ 6
277
+
278
+ Interpretation.
279
+ We view πlikelihood(S(k) = s(k) | N = n) as a function of n, since in
280
+ practice we possess the data s(k) but not n. The likelihood quantifies the support the serial
281
+ numbers on the k captured tanks in s(k) lend for any particular tank population size n [21].
282
+ The likelihood as a sequence of events.
283
+ Alternatively, we may arrive at eqn. 5 from
284
+ a perspective of sequential events S1 = s1, S2 = s2, ..., Sk = sk. First, the probability of a
285
+ given serial number on the ith captured tank, conditioned on the tank population size and
286
+ the outcomes of the previous serial numbers, is the uniform distribution
287
+ π(Si = si | N = n, S1 = s1, ..., Si−1 = si−1) =
288
+ 1
289
+ n − i + 1I{1,...,n}\{s1,...,si−1}(si)
290
+ (6)
291
+ since there are n − i + 1 tanks to choose from at uniform random. By the chain rule, the
292
+ joint probability
293
+ πlikelihood(S1 = s1, ..., Sk = sk | N = n) =
294
+ k�
295
+ i=1
296
+ π(Si = si | N = n, S1 = s1, ..., Si−1 = si−1)
297
+ (7)
298
+ giving eqn. 5 after simplifying the product of indicator functions.
299
+ The likelihood function in terms of the maximum observed serial number.
300
+ We will
301
+ find in Sec. 2.3 that only two independent features of the data (s1, ..., sk) provide information
302
+ about the tank population size, N: its (i) size, k, and (ii) maximum observed serial number
303
+ m(k) =
304
+ max
305
+ i∈{1,...,k} si.
306
+ (8)
307
+ Thus, we also write a different likelihood: the probability of observing a maximum serial
308
+ number m(k) given the tank population size N = n, πlikelihood(M(k) = m(k) | N = n).
309
+ Because each outcome s(k) ∈ Ω(k)
310
+ n
311
+ is equally likely, πlikelihood(M(k) = m(k) | N = n) is the
312
+ fraction of sample space under population size n where the maximum serial number is m(k).
313
+ To count the outcomes (s1, ..., sk) ∈ Ω(k)
314
+ n
315
+ where the maximum serial number is m(k), consider
316
+ (i) one of the k captured tanks has serial number m(k) and (ii) the remaining k −1 tanks have
317
+ a serial number in {1, ..., m(k) − 1}. For each of the k possible positions of the maximum
318
+ serial number in the vector s(k), there are (m(k) − 1)k−1 distinct outcomes specifying the
319
+ other k − 1 entries. Thus:
320
+ πlikelihood(M(k) = m(k) | N = n) = k(m(k) − 1)k−1
321
+ (n)k
322
+ I{k,...,n}(m(k)).
323
+ (9)
324
+ 2.2
325
+ The prior distribution
326
+ The prior probability mass function πprior(N = n) expresses a combination of our subjective
327
+ beliefs and objective knowledge about the total number of tanks N before the data (s1, ..., sk)
328
+ 7
329
+
330
+ are collected and considered. Context-dependent, the prior mass function we impose on N
331
+ can vary in the amount of uncertainty it admits about the tank population size (measured by
332
+ eg. entropy [23]).
333
+ Prior distributions can be loosely classified as informative, weakly informative, or diffuse
334
+ [21]. If we do not possess prior information about the tank population size, we adopt the
335
+ principle of indifference and impose a diffuse prior to ”let the data speak for itself” [8], eg.
336
+ a uniform distribution over a set of feasible tank population sizes. On the other hand, an
337
+ informative prior might concentrate its mass around some estimate of the total number of
338
+ tanks obtained through other means. An informative prior will have a larger impact on the
339
+ posterior mass function of N than a diffuse one [21].
340
+ Generally, as the number of captured tanks k increases (decreases), we expect the prior
341
+ mass function we impose to have a lesser (greater) influence on the posterior distribution [8].
342
+ 2.3
343
+ The posterior distribution
344
+ The posterior probability mass function of N assigns a probability to each possible tank
345
+ population size n in consideration of its consistency with (1) the data (s1, ..., sk), according
346
+ to the likelihood in eqn. 5, and (2) our prior beliefs/knowledge encoded in πprior(N = n).
347
+ The posterior distribution is a conditional distribution related to the likelihood and prior
348
+ mass functions by Bayes’ theorem:
349
+ πposterior(N = n | S(k) = s(k)) = πlikelihood(S(k) = s(k) | N = n)πprior(N = n)
350
+ πdata(S(k) = s(k))
351
+ ,
352
+ (10)
353
+ where the denominator is the probability of the data s(k):
354
+ πdata(S(k) = s(k)) =
355
+
356
+
357
+ n′=0
358
+ πlikelihood(S(k) = s(k) | N = n′)πprior(N = n′).
359
+ (11)
360
+ We view πposterior(N = n | S(k) = s(k)) as a probability mass function of N, since in practice
361
+ we have s(k). Then, πdata(S(k) = s(k)) is just a normalizing factor for the numerator in
362
+ eqn. 10.
363
+ Interpreting eqn. 10, the prior mass function of N is updated, in light of the data
364
+ (s1, ..., sk), to yield the posterior mass function of N. The posterior probability of N = n is
365
+ proportional to the product of the likelihood at and prior probability of N = n—a compromise
366
+ between the likelihood and prior.
367
+ We simplify the posterior mass function of N in eqn. 10 by (i) substituting eqn. 5, (ii)
368
+ restricting the sum in eqn. 11 to tank population sizes where the likelihood is nonzero, and
369
+ (iii) noting the only two features of the data (s1, ..., sk) that appear are (a) its size k and (b)
370
+ 8
371
+
372
+ the maximum serial number m(k):
373
+ πposterior(N = n | M(k) = m(k)) =
374
+ (n)−1
375
+ k πprior(N = n)
376
+
377
+
378
+ n′=m(k)
379
+ (n′)−1
380
+ k πprior(N = n′)
381
+ I{m(k),m(k)+1,...}(n)
382
+ (12)
383
+ Note, we may arrive at eqn. 12 through eqn. 9 as well.
384
+ Interpretation.
385
+ The posterior probability mass function of N in eqn. 12 is our raw, uncertainty-
386
+ quantifying solution to the German tank problem. It assigns a probability to each tank popula-
387
+ tion size n in consideration of the serial numbers (s1, ..., sk) observed on the captured tanks,
388
+ our probabilistic model of the tank-capturing process, and our prior beliefs and knowledge
389
+ about the tank population size expressed in the prior mass function.
390
+ A remark on ”uncertainty”.
391
+ The spread of the posterior mass function of N in eqn. 12
392
+ reflects epistemic [24] uncertainty about the tank population size, attributed to a lack of
393
+ complete data. Accounting for the data (s1, ..., sk) (probably) does not eliminate uncertainty
394
+ about the tank population size because we (presumably) have not captured all of the tanks
395
+ (ie. k < n) and observed their serial numbers. In practice, posterior uncertainty about the
396
+ tank population size also has a contribution from the possible inadequacy of the model of the
397
+ tank-capturing process (uniform sampling) in eqn. 5, which our analysis here neglects.
398
+ Summarizing the posterior mass function of N.
399
+ We may summarize the posterior mass
400
+ function of N with a point estimate of the tank population size and a credible subset of the
401
+ natural numbers that likely3 contains it. A suitable point estimate of the tank population
402
+ size is a median of the posterior mass function of N; by definition, the posterior probability
403
+ that the tank population size is greater (less) than or equal to a median is at least 0.5. A
404
+ suitable credible subset, which entertains multiple tank population sizes, is the α-high-mass
405
+ subset [25]
406
+ Hα := {n′ : πposterior(N = n′ | M(k) = m(k)) ≥ πα}
407
+ (13)
408
+ where πα is the largest mass to satisfy
409
+ πposterior(N ∈ Hα | M(k) = m(k)) ≥ 1 − α.
410
+ (14)
411
+ In words, the α-high-mass subset Hα is the smallest to (i) contain at least a fraction 1 − α
412
+ of the posterior mass of N and (ii) ensure every tank population size belonging to the subset
413
+ is more probable than all outside of it.
414
+ 3Well, ”likely”, under our assumptions embedded in the likelihood and prior mass functions.
415
+ 9
416
+
417
+ Querying the posterior distribution.
418
+ We may find the posterior probability that the tank
419
+ population size belongs to any set of interest by summing the posterior mass over it. Eg.,
420
+ the probability the tank population size exceeds some number n′ is:
421
+ πposterior(N > n′ | M(k) = m(k)) =
422
+
423
+
424
+ n=n′+1
425
+ πposterior(N = n | M(k) = m(k)).
426
+ (15)
427
+ 2.3.1
428
+ Posterior predictive checking
429
+ We may check the consistency of the data s(k) with the posterior mass function of N.
430
+ Conceptually, we can simulate new data ˜s(k) using the model of the tank-capturing process
431
+ under a sample of the tank population size from the posterior, then compare the simulated
432
+ data ˜s(k) to the real data s(k) [21,26]. More appropriately, we can compare the serial numbers
433
+ in the real data (s1, ..., sk) with the mass function giving the probability that the tank with
434
+ serial number ˜s would be captured under this process:
435
+ π(˜s ∈ ˜S(k)) =
436
+
437
+
438
+ n′=0
439
+ k
440
+ n′ πposterior(N = n′ | S(k) = s(k))I{1,...,n′}(˜s),
441
+ (16)
442
+ since k/n′ is the probability any given viable serial number ˜s will be observed given the tank
443
+ population size N = n′.
444
+ 3
445
+ Example
446
+ We illustrate the Bayesian approach to the German tank problem through an example.
447
+ The prior probability mass function of N.
448
+ Suppose we have an upper bound nmax for the
449
+ possible number of tanks but no other information. Then, we may impose a diffuse prior, a
450
+ uniform prior probability mass function:
451
+ πprior(N = n) =
452
+ 1
453
+ nmax + 1I{0,...,nmax}(n).
454
+ (17)
455
+ This prior mass function expresses: in the absence of any data (s1, ..., sk) (ie., no serial
456
+ numbers, not k either), we believe the total number of tanks N is equally likely to be a value
457
+ in {0, ..., nmax}. Particularly, suppose nmax = 35. Fig. 1a visualizes πprior(N = n).
458
+ The data (s1, ..., sk).
459
+ Now suppose we capture k = 3 tanks, with serial numbers s(3) =
460
+ (15, 14, 3). See Fig. 1b. So, the maximum observed serial number is m(3) = 15.
461
+ 10
462
+
463
+ size of tank population, n
464
+ 0
465
+ 10
466
+ 20
467
+ 30
468
+ 40
469
+ πprior(N=n)
470
+ 0.00
471
+ 0.01
472
+ 0.02
473
+ (a) prior mass function of N
474
+ s1=15
475
+ s2=14
476
+ s3=3
477
+ serial numbers
478
+ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
479
+ (b) the data s(k=3)
480
+ tank population size, n
481
+ 0
482
+ 10
483
+ 20
484
+ 30
485
+ 40
486
+ πlikelihood(M(k=3)=15 | N=n)
487
+ 0.00
488
+ 0.05
489
+ 0.10
490
+ 0.15
491
+ 0.20
492
+ (c) the likelihood function
493
+ size of tank population, n
494
+ 0
495
+ 10
496
+ 20
497
+ 30
498
+ 40
499
+ πposterior(N=n | M(k = 3)=15)
500
+ 0.00
501
+ 0.05
502
+ 0.10
503
+ 0.15
504
+ nmax=35
505
+ (d) posterior mass function of N
506
+ Figure 1: A Bayesian approach to the German tank problem.
507
+ (a, prior) The prior mass
508
+ function. (b, data) The data s(3), with maximum observed serial number m(3) = 15. (c,
509
+ likelihood) The likelihood function associated with the data s(3). (d, posterior) The posterior
510
+ mass function of N. H0.2 highlighted; median marked with vertical, dashed line.
511
+ 11
512
+
513
+ The posterior probability mass function of N.
514
+ Under the uniform prior in eqn. 17, the
515
+ posterior probability mass function of N in eqn. 12 becomes:
516
+ πposterior(N = n | M(k) = m(k)) =
517
+ (n)−1
518
+ k
519
+ nmax
520
+
521
+ n′=m(k)
522
+ (n′)−1
523
+ k
524
+ I{m(k),m(k)+1,...,nmax}(n).
525
+ (18)
526
+ Fig. 1d visualizes the posterior probability mass function of N for the data s(3) in Fig. 1b and
527
+ the prior in eqn. 17 (nmax = 35).
528
+ Summarizing the posterior.
529
+ Summarizing the posterior mass function of N, its median
530
+ is 19 and its high-mass credible subset H0.2 = {15, ..., 25} (highlighted in Fig. 1d). For what
531
+ it’s worth, the data in Fig. 1b was generated from a tank population size of n = 20 (explaining
532
+ the choice of scale in Fig. 1b).
533
+ Querying the posterior.
534
+ Suppose our military strategy would change if the size of the
535
+ tank population exceeds 30. From the posterior distribution of N, we calculate πposterior(N >
536
+ 30 | M(3) = 15) ≈ 0.066.
537
+ Posterior predictive checking.
538
+ As a posterior predictive check, Fig. 2a shows how the
539
+ observed serial numbers in the data s(3) compare with the probability of observing each serial
540
+ number under the posterior mass function of N, according to eqn. 16.
541
+ Sensitivity of the posterior to the prior.
542
+ Because of the subjectivity involved in construct-
543
+ ing the prior, checking the sensitivity of the posterior to the prior is good practice [21]. Fig. 2b
544
+ shows how the posterior mass function of N changes as we increase the upper-bound on the
545
+ tank population nmax we impose via the prior mass function of N in eqn. 17. The median of
546
+ the posterior under nmax ∈ {60, 70} is 20 (an increase of one compared to nmax = 35). The
547
+ maximum of the high-mass subset H0.2 increases to 29 for nmax = 70.
548
+ Capturing more tanks.
549
+ Suppose we capture an additional 9 tanks and re-run the Bayesian
550
+ analysis. Fig. 3 shows the updated posterior mass function of N. The high-mass credible
551
+ subset H0.2 shrinks considerably, to {19, 20}. This shows how more data—increasing the
552
+ number of tanks captured, k—generally reduces our uncertainty about the tank population
553
+ size.
554
+ 4
555
+ Discussion
556
+ Selection bias.
557
+ A strict assumption in the textbook-friendly German tank problem, which
558
+ enables us to estimate the size of the population of tanks from a random sample of their
559
+ 12
560
+
561
+ serial number, s̃
562
+ 0
563
+ 10
564
+ 20
565
+ 30
566
+ 40
567
+ probability
568
+ 0.00
569
+ 0.05
570
+ 0.10
571
+ 0.15
572
+ nmax=35
573
+ data, s(k=3)
574
+ (a) posterior predictive check
575
+ size of tank population, n
576
+ 0
577
+ 20
578
+ 40
579
+ 60
580
+ πposterior(N=n | M(k = 3)=15)
581
+ 0.00
582
+ 0.05
583
+ 0.10
584
+ 0.15
585
+ nmax=50
586
+ size of tank population, n
587
+ 0
588
+ 20
589
+ 40
590
+ 60
591
+ nmax=60
592
+ size of tank population, n
593
+ 0
594
+ 20
595
+ 40
596
+ 60
597
+ nmax=70
598
+ prior
599
+ posterior
600
+ (b) sensitivity of the posterior to the prior
601
+ Figure 2: Checking (a) the consistency of the data s(3) with the probability of the serial
602
+ numbers under the posterior mass function of N and (b) the sensitivity of the posterior mass
603
+ function of N to the upper bound nmax imposed by the prior mass function of N.
604
+ (sequential) serial numbers, is that sampling is uniform. To check consistency of the sample
605
+ with this assumption, Goodman [10] demonstrates a test of the hypothesis that the sample of
606
+ serial numbers is from a uniform distribution. Interesting extensions of the textbook German
607
+ tank problem could involve modeling selection bias in the tank-capturing process. Such bias
608
+ could arise eg. hypothetically, if older tanks with smaller serial numbers were more likely to be
609
+ deployed in the fronts opened earlier in the war, where capturing tanks is more difficult than
610
+ at less fortified fronts opened more recently.
611
+ The German tank problem in other contexts.
612
+ The Bayesian probability theory to solve
613
+ the German tank problem applies (perhaps, with modification) to many other contexts where
614
+ we wish to estimate the size of some finite, hidden set [27], eg.: the number of taxicabs in a
615
+ city [12], the number of accounts at a bank [15], the number of furniture pieces purchased
616
+ 13
617
+
618
+ s1=15
619
+ s2=14
620
+ s3=3
621
+ s4=6
622
+ s5=2
623
+ s6=10
624
+ s7=5
625
+ s8=16
626
+ s9=8
627
+ s10=1
628
+ s11=4
629
+ s12=19
630
+ serial numbers
631
+ 1
632
+ 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
633
+ (a) the updated data s(k=12)
634
+ size of tank population, n
635
+ 0
636
+ 10
637
+ 20
638
+ 30
639
+ 40
640
+ πposterior(N=n | M(k = 12)=19)
641
+ 0.0
642
+ 0.1
643
+ 0.2
644
+ 0.3
645
+ 0.4
646
+ 0.5
647
+ 0.6
648
+ nmax=35
649
+ (b) the updated posterior mass function of N
650
+ Figure 3: The updated posterior mass function of N (b) after we capture an additional 9
651
+ tanks with serial numbers in (a).
652
+ by a university [10], the number of aircraft operations at an airport [28], the extent of leaked
653
+ classified government communications [29], the time needed to complete a project deadline
654
+ [30], the time-coverage of historical records of extreme events like floods [31], the length of
655
+ a short-tandem repeat allele [32], the size of a social network [33], the number of cases in
656
+ 14
657
+
658
+ court [34], the lifetime of a flower of a plant [35], or the duration of existence of a species [36].
659
+ Mark and recapture methods in ecology to estimate the size of an animal population [37,38]
660
+ are tangentially related to the German tank problem.
661
+ The practice of inscribing sequential serial numbers on military equipment.
662
+ Germany
663
+ adopted the practice of marking their military equipment with serial numbers and codes to
664
+ trace the equipment/parts/components back to the manufacturer. However, the sequential
665
+ nature of these serial numbers was exploited by the Allies to estimate their armament pro-
666
+ duction. To reduce vulnerability to serial number analysis for estimating production while
667
+ maintaining advantages of tracing equipment back to the manufacturer, serial numbers and
668
+ codes could instead be obfuscated by eg. chaffing [39].
669
+ Data and code availability
670
+ The Julia [40] code to reproduce all of our visualizations drawn using Makie.jl [41] is available
671
+ on Github at github.com/SimonEnsemble/the˙German˙tank˙problem.
672
+ Acknowledgements
673
+ Thanks to Bernhard Konrad for providing detailed feedback on the first draft and to my
674
+ students Gbenga Fabusola, Adrian Henle, and Paul Morris for feedback on the introduction.
675
+ References
676
+ [1] Richard Ruggles and Henry Brodie. An empirical approach to economic intelligence in
677
+ World War II. Journal of the American Statistical Association, 42(237):72–91, 1947.
678
+ [2] Leo A Goodman. Serial number analysis. Journal of the American Statistical Association,
679
+ 47(260):622–634, 1952.
680
+ [3] Andrew Hodges. Alan Turing: the enigma. In Alan Turing: The Enigma. Princeton
681
+ University Press, 2014.
682
+ [4] Marshall Hall. Alan Turing, Marshall Hall, and the Alignment of WW2 Japanese Naval
683
+ Intercepts. Notices of the AMS, 61(3), 2014.
684
+ [5] Roger W Johnson. Estimating the size of a population. Teaching Statistics, 16(2):50–52,
685
+ 1994.
686
+ [6] Arthur Berg. Bayesian modeling competitions for the classroom. Revista Colombiana
687
+ de Estad´ıstica, 44(2):243–252, 2021.
688
+ 15
689
+
690
+ [7] Frederick Mosteller. Fifty challenging problems in probability with solutions. Courier
691
+ Corporation, 1987.
692
+ [8] Allen B Downey. Think Bayes 2. https://allendowney.github.io/ThinkBayes2/
693
+ index.html, 2021.
694
+ [9] Kim. C Border. Lecture 18: Estimation. https://healy.econ.ohio-state.edu/kcb/
695
+ Ma103/ (2021 version), 2017.
696
+ [10] Leo A Goodman. Some practical techniques in serial number analysis. Journal of the
697
+ American Statistical Association, 49(265):97–112, 1954.
698
+ [11] George Clark, Alex Gonye, and Steven J Miller. Lessons from the german tank problem.
699
+ The Mathematical Intelligencer, 43(4):19–28, 2021.
700
+ [12] Carlos G´omez Grajalez, Eileen Magnello, Robert Woods, and Julian Champkin. Great
701
+ moments in statistics. Significance, 10(6):21–28, 2013.
702
+ [13] Richard L Scheaffer, Ann Watkins, Mrudulla Gnanadesikan, and Jeffrey Witmer. Activity-
703
+ based statistics: student guide. Springer Science & Business Media, 2013.
704
+ [14] Harry V Roberts. Informative stopping rules and inferences about population size. Journal
705
+ of the American Statistical Association, 62(319):763–775, 1967.
706
+ [15] Michael H¨ohle and Leonhard Held.
707
+ Bayesian estimation of the size of a population.
708
+ Technical Report 499, LMU Munich, Discussion Paper, 2006.
709
+ [16] Wolfgang Von der Linden, Volker Dose, and Udo Von Toussaint. Bayesian probability
710
+ theory: applications in the physical sciences. Cambridge University Press, 2014.
711
+ [17] Simona Cocco, R´emi Monasson, and Francesco Zamponi. From Statistical Physics to
712
+ Data-Driven Modelling: with Applications to Quantitative Biology. Oxford University
713
+ Press, 2022.
714
+ [18] Mark Andrews. German tank problem: A bayesian analysis. https://www.mjandrews.
715
+ org/blog/germantank. Accessed: 2022-12-03.
716
+ [19] Anthony Lee and Steven J Miller. Generalizing the german tank problem. arXiv preprint
717
+ arXiv:2210.15339, 2022.
718
+ [20] William M Bolstad and James M Curran. Introduction to Bayesian statistics. John Wiley
719
+ & Sons, 2016.
720
+ [21] Rens van de Schoot, Sarah Depaoli, Ruth King, Bianca Kramer, Kaspar M¨artens,
721
+ Mahlet G Tadesse, Marina Vannucci, Andrew Gelman, Duco Veen, Joukje Willem-
722
+ sen, and Christopher Yau. Bayesian statistics and modelling. Nature Reviews Methods
723
+ Primers, 1(1):1–26, 2021.
724
+ 16
725
+
726
+ [22] Jayanta K Ghosh, Mohan Delampady, and Tapas Samanta. An introduction to Bayesian
727
+ analysis: theory and methods, volume 725. Springer, 2006.
728
+ [23] Kevin P Murphy. Probabilistic machine learning: an introduction. MIT press, 2022.
729
+ [24] Craig R Fox and G¨ulden ¨Ulk¨umen. Chapter 1: Distinguishing two dimensions of uncer-
730
+ tainty. Perspectives on Thinking, Judging, and Decision Making, 2011.
731
+ [25] Rob J Hyndman.
732
+ Computing and graphing highest density regions.
733
+ The American
734
+ Statistician, 50(2):120–126, 1996.
735
+ [26] Jonah Gabry, Daniel Simpson, Aki Vehtari, Michael Betancourt, and Andrew Gelman.
736
+ Visualization in Bayesian workflow. Journal of the Royal Statistical Society: Series A
737
+ (Statistics in Society), 182(2):389–402, 2019.
738
+ [27] Si Cheng, Daniel J Eck, and Forrest W Crawford. Estimating the size of a hidden finite
739
+ set: Large-sample behavior of estimators. Statistics Surveys, 14:1–31, 2020.
740
+ [28] John H Mott, Margaret L McNamara, and Darcy M Bullock. Estimation of aircraft op-
741
+ erations at airports using nontraditional statistical approaches. In 2016 IEEE Aerospace
742
+ Conference, pages 1–11. IEEE, 2016.
743
+ [29] Michael Gill and Arthur Spirling. Estimating the severity of the WikiLeaks US diplomatic
744
+ cables disclosure. Political Analysis, 23(2):299–305, 2015.
745
+ [30] Thomas M Fehlmann and Eberhard Kranich. A new approach for continuously monitoring
746
+ project deadlines in software development.
747
+ In Proceedings of the 27th International
748
+ Workshop on Software Measurement and 12th International Conference on Software
749
+ Process and Product Measurement, pages 161–169, 2017.
750
+ [31] Ilaria Prosdocimi. German tanks and historical records: the estimation of the time cover-
751
+ age of ungauged extreme events. Stochastic environmental research and risk assessment,
752
+ 32(3):607–622, 2018.
753
+ [32] Haibao Tang, Ewen F Kirkness, Christoph Lippert, William H Biggs, Martin Fabani,
754
+ Ernesto Guzman, Smriti Ramakrishnan, Victor Lavrenko, Boyko Kakaradov, Claire Hou,
755
+ Barry Hicks, David Heckerman, Franz J. Och, C. Thomas Caskey, J. Craig Venter, and
756
+ Amalio Telenti. Profiling of short-tandem-repeat disease alleles in 12,632 human whole
757
+ genomes. The American Journal of Human Genetics, 101(5):700–715, 2017.
758
+ [33] Liran Katzir, Edo Liberty, and Oren Somekh. Estimating sizes of social networks via
759
+ biased sampling. In Proceedings of the 20th international conference on World wide
760
+ web, pages 597–606, 2011.
761
+ 17
762
+
763
+ [34] Xiaohan Wu, Margaret E Roberts, Rachel E Stern, Benjamin L Liebman, Amarnath
764
+ Gupta, and Luke Sanford.
765
+ Augmenting Serialized Bureaucratic Data: The Case of
766
+ Chinese Courts. 21st Century China Center Research, (11), 2022.
767
+ [35] William D Pearse, Charles C Davis, David W Inouye, Richard B Primack, and T Jonathan
768
+ Davies. A statistical estimator for determining the limits of contemporary and historic
769
+ phenology. Nature Ecology & Evolution, 1(12):1876–1882, 2017.
770
+ [36] David L Roberts and Andrew R Solow. When did the dodo become extinct? Nature,
771
+ 426(6964):245–245, 2003.
772
+ [37] James D Nichols. Capture-recapture models. BioScience, 42(2):94–102, 1992.
773
+ [38] Anne Chao. An overview of closed capture-recapture models. Journal of Agricultural,
774
+ Biological, and Environmental Statistics, 6(2):158–175, 2001.
775
+ [39] Ronald L Rivest et al.
776
+ Chaffing and winnowing: Confidentiality without encryption.
777
+ CryptoBytes (RSA laboratories), 4(1):12–17, 1998.
778
+ [40] Jeff Bezanson, Stefan Karpinski, Viral B Shah, and Alan Edelman. Julia: A fast dynamic
779
+ language for technical computing. arXiv preprint arXiv:1209.5145, 2012.
780
+ [41] Simon Danisch and Julius Krumbiegel. Makie.jl: Flexible high-performance data visual-
781
+ ization for julia. Journal of Open Source Software, 6(65):3349, 2021.
782
+ 18
783
+
6dAyT4oBgHgl3EQfQfZh/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6dAzT4oBgHgl3EQfvP2u/content/tmp_files/2301.01704v1.pdf.txt ADDED
@@ -0,0 +1,965 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Error Tolerant Multi-Robot System for Roadside
2
+ Trash Collection
3
+ 1st Lee Milburn
4
+ College of Engineering
5
+ Northeastern University
6
+ Boston, Massachusetts
7
8
+ 2nd John Chiaramonte
9
+ College of Engineering
10
+ Northeastern University
11
+ Boston, Massachusetts
12
13
+ 3rd Jack Fenton
14
+ College of Engineering
15
+ Northeastern University
16
+ Boston, Massachusetts
17
18
+ Abstract—In this paper, we present the first iteration of an
19
+ error-tolerant, autonomous, multi-robot system that monitors
20
+ highway road verges and identifies and collects roadside litter. It
21
+ is designed to use an aerial vehicle that can rapidly cover a vast
22
+ area and collect data on the road verge. This data is then passed
23
+ to a ground vehicle that constructs a map of the road verge and
24
+ uses a trained Convolutional Neural Network (CNN) to identify
25
+ pieces of litter. After the pieces of litter are identified on the
26
+ map of the road verge, the ground robot navigates to each piece
27
+ of trash, re-evaluates the area, and performs a ”greedy pickup”
28
+ procedure. This final stage accounts for any error in the map’s
29
+ construction or the identified trash’s location. We found that
30
+ ending the robotic system’s control flow with a greedy pickup
31
+ procedure can retroactively account for processing errors of the
32
+ system as it runs. This increases the system’s fault tolerance and
33
+ allows for the use of cheaper equipment since pinpoint accuracy
34
+ is not always necessary. In this paper, we present the feasibility of
35
+ this system by testing in simulation and later using real robotic
36
+ hardware. We show that the system is effective enough to iterate
37
+ on its design principles to create a more sophisticated system.
38
+ Index Terms—Autonomous trash collection, Environmental
39
+ monitoring, Error tolerance, Multi-robot system
40
+ I. INTRODUCTION
41
+ Roadside trash is a massive issue currently managed by
42
+ manual labor - a woefully inadequate solution [7]. Despite
43
+ being a nationwide issue, the task of waste management is
44
+ mostly under the jurisdiction of municipalities and it garners
45
+ little to no attention or investment.
46
+ To estimate the amount of litter along roadways, a research
47
+ team selected a random sample of 240 roadway segments,
48
+ stratified by type and by rural/urban areas [2]. The results
49
+ indicate that there are 51.2 billion pieces of litter on roadways
50
+ nationwide. Of this, the majority (91%, or 46.6 billion pieces)
51
+ is less than four inches.
52
+ In Monterey City, California, complaints about trash have
53
+ increased since the start of the COVID-19 pandemic. Officials
54
+ say this is not due to increased littering, but rather due to
55
+ the inability to clean it up. Monterey County Public Works
56
+ Maintenance Manager Shawn Atkins stated that his cleanup
57
+ crew was so busy cleaning up from illegal dumpsites that they
58
+ did not have time to walk the shoulders of their roads to pick
59
+ up loose trash [14]. Caltrans, California’s public transportation
60
+ department, has been faced with the same problem. Kevin
61
+ Drabinski, public information officer for Caltrans District 5,
62
+ said it’s important to Caltrans that they manage litter because
63
+ of safety and environmental concerns. Caltrans spends $50
64
+ million annually on litter cleanup [14].
65
+ To address this issue, our multi-robot system uses a three-
66
+ stage approach to autonomously map, identify, and pick up
67
+ trash. The three modes are Mapping, Navigation, and Greedy
68
+ Pickup. We would first have a lightweight drone fly over a
69
+ specified area on the road and stream its visuals to a ground
70
+ robot. That robot would generate a map using the drone’s
71
+ input and identify trash pieces on that map. The ground robot
72
+ would then navigate near each piece of identified trash and
73
+ then switch to the greedy pickup mode where it scans the
74
+ area for the suspected piece of trash. After a piece of trash
75
+ is re-identified locally, the robot moves and collects it. Once
76
+ either collected or not found, the ground robot then moves to
77
+ the next piece on its map.
78
+ Fig. 1. System Design Overview
79
+ Our approach allows for accurate pickup without the need
80
+ for massive processing power or overly expensive sensors.
81
+ The system’s configuration used the open-source convolutional
82
+ neural network You Only Look Once (YoLOv4) for image
83
+ identification [24], the open-source visual SLAM solution
84
+ ORBSLAM-2 for map-building [19], and open-source ROS
85
+ navigation software for path planning and navigation. We
86
+ simulated this system using Gazebo [13] and after receiving
87
+ consistent results, tested it in a real-world environment. Our
88
+ arXiv:2301.01704v1 [cs.RO] 4 Jan 2023
89
+
90
+ Step 1: Mapping Robot identifies trash and maps
91
+ Step 2: Mapping Robot transfers map data to UGV
92
+ the surrounding area
93
+ over Wi-Fi
94
+ Step 3: UGV takes most efficient path to pick up
95
+ Step 4: Human operator removes storage bin and
96
+ trash and clear area.
97
+ dumps trash into larger containerreal-world results, with a relatively low-powered system, in-
98
+ dicate that our approach is a proof-of-concept for a scalable
99
+ and viable solution to the growing worldwide litter problem.
100
+ II. RELATED WORK
101
+ There has been research into multi-robot systems used
102
+ for environmental monitoring. The research for these sys-
103
+ tems finds that multi-robot systems pose a more effective
104
+ solution to surveying an environment than static monitoring
105
+ [6]. There is also research into multi-robot systems that do
106
+ autonomous trash collection [16]. This research concludes
107
+ that for maximum efficiency, robots should be aware of their
108
+ environment when trying to collect trash as opposed to making
109
+ decisions based solely on their field of view (FOV). Therefore,
110
+ these two systems, monitoring an environment, and using a
111
+ collection algorithm to pick up trash in a dynamically changing
112
+ environment could be combined to create the most effective
113
+ version of an autonomous collection system. A version of this
114
+ system has been created to autonomously collect and monitor
115
+ plastics in rivers [9]. The system includes a central processor
116
+ that takes in the necessary tasks of the environment and assigns
117
+ those tasks to underwater autonomous vehicles that then pick
118
+ up the plastics. This system concluded that a Multi-robot task
119
+ allocation architecture [11] with a controlling center increased
120
+ the efficiency of the system, but the hardware for working
121
+ effectively in that environment would have to be improved for
122
+ more effective use. Our research team structured our multi-
123
+ robot system design to have a robot monitor the environment
124
+ and wirelessly transmit its environmental depiction to a UGV
125
+ that would collect the trash.
126
+ For our system to be cheap and lightweight, existing soft-
127
+ ware was needed that works in real-time on standard CPUs
128
+ in a wide variety of environments. The Robotic Operating
129
+ System (ROS) [17] is an open-source robotics framework that
130
+ allowed each of our hardware and software components to
131
+ communicate freely in real-time, and each software component
132
+ used was compatible with this framework. ORB-SLAM2 was
133
+ the ideal solution for mapping [18][15]. It uses differing
134
+ angles of static environmental features to create a map and a
135
+ keyframe-based SLAM approach that reduces the overall data
136
+ size of the SLAM map considerably [1]. Since the system is
137
+ designed with visual sensors, a software to visually identify
138
+ trash was necessary. YoLOv4 is a CNN model trained from
139
+ annotated images to place bounding boxes around specified
140
+ objects in RBG images. Adaptive Monte Carlo Localization
141
+ (AMCL) is the method of navigation used as well as the
142
+ name of a compatible software stack used for navigation
143
+ provided by ROS [8]. AMCL takes in odometry feedback
144
+ from the robot’s wheels and scan data derived from the RGB-
145
+ D Camera to navigate. After some static conversions from
146
+ ORB-SLAM2’s native map format to a 2D occupancy grid,
147
+ AMCL can autonomously navigate around an environment.
148
+ These existing software stacks served as the framework for
149
+ the multi-robot system to be built.
150
+ III. SYSTEM DESIGN
151
+ A. System Overview
152
+ Fig. 2. Systems’ Communication Flow
153
+ After initialization by a human operator, the mapping robot
154
+ will scan an area with a visual sensor. This sensor data will be
155
+ compiled using Simultaneous Location and Mapping (SLAM)
156
+ technology to create a continuous digital map of the target area
157
+ which will then be wirelessly transmitted to the unmanned
158
+ ground vehicle (UGV). The UGV will identify pieces of
159
+ trash in the environment using computer vision algorithms
160
+ and construct a two-dimensional map populated with target
161
+ coordinates of identified trash. The UGV will then create an
162
+ efficient path between the target coordinates in the map. Once
163
+ the UGV sets off on the calculated path, it will confirm the
164
+ trash location using an onboard visual sensor and proceed to
165
+ pick it up. Once the UGV has completed its rounds or the bin
166
+ is detected as full, it will return home, and a human operator
167
+ will empty the bin.
168
+ B. Mode Controller
169
+ Fig. 3. Mode Controller Flow
170
+ The “Mode Controller” was created to switch between the
171
+ three separate software components of the system: Mapping,
172
+ Navigation, and Greedy Pickup. The Mode Controller is a
173
+ ROS node that communicates with the Mapping, Navigation,
174
+ and Greedy Pickup nodes, turning them on or off as needed.
175
+ The Mode Controller starts in idle before putting the system
176
+ into the Mapping mode. Once mapping finishes, the mode
177
+ controller turns off Mapping mode. The map is then passed on
178
+
179
+ Stage 1
180
+ Mapping With
181
+ ORBslam
182
+ Realsense
183
+ map
184
+ Stage 2
185
+ General
186
+ RGB + depth camera feed
187
+ Mode Control
188
+ Navigation
189
+ Stage 3
190
+ Throughput
191
+ Greedy Pickup
192
+ YOLO
193
+ Control1.Mapping &
194
+ 2. Navigation
195
+ TrashID
196
+ 3. Greedy
197
+ Idle
198
+ Pickupto the Navigation mode alongside the coordinates of identified
199
+ trash. The Mode Controller then turns on Navigation mode.
200
+ Once a trash coordinate has been reached by the Navigation
201
+ mode, the Mode Controller next turns Navigation off and
202
+ Greedy Pickup on, picking up the trash. Navigation mode is
203
+ once again activated. Navigation and Greedy Pickup modes
204
+ will alternate until all trash is removed from the environment.
205
+ Once all the trash is picked up and no marked coordinates
206
+ remain on the map, the Mode Controller turns back to idle
207
+ and awaits further instruction.
208
+ C. Mapping
209
+ The system navigates the surrounding area and maps its
210
+ environment using ORB-SLAM2. This repository is designed
211
+ to be used within ROS as a ROS node. In our default RGB-D
212
+ configuration, the node subscribes to 2 topics (RGB and depth
213
+ image topics) and in turn, publishes all necessary data built
214
+ by the ORB-SLAM2 system. This includes a point cloud of
215
+ all map key points, the current camera pose, the full camera
216
+ path trajectory, and a morphologically transformed version of
217
+ the projected occupancy grid [21]. In experimentation, the
218
+ maps were initially filled with noise that led to an inability
219
+ to navigate the space, figure 4. Morphological operations
220
+ are commonly used tools in image processing to clean up
221
+ an image. By “eroding” and “opening” the space, errant
222
+ data points that were being misidentified as occupied were
223
+ removed. By “closing” the space gaps caused by the sparse
224
+ data, holes in our map were closed, and smooth, continuous
225
+ maps were generated, figure 5. The product was an occupancy
226
+ grid very close to real-world surroundings with a real-time,
227
+ lightweight mapping solution.
228
+ D. Trash Identification
229
+ Simultaneously, as an area is being mapped, the system also
230
+ detects trash. To recognize where on the map a piece of trash
231
+ is, the mapping robot first finds the location of a piece of
232
+ trash relative to itself. The system to locate trash was devised
233
+ using multiple components: YOLOv4, the odometry data of
234
+ the robot, and the depth camera feed provided by the Realsense
235
+ RGB-D camera, figure 7.
236
+ The first step in the trash identification pipeline is image
237
+ identification using YOLOv4. YOLOv4 is a convolutional
238
+ neural network that we trained with a custom dataset of
239
+ over 1000 images, each taken of varying pieces of trash
240
+ from the perspective of the robot. Each image was hand-
241
+ labeled and fed into the machine learning model using an
242
+ 80-15-5 split between training, validation, and testing sets.
243
+ The model was trained and runs in our software stack using
244
+ a customized open-source ROS wrapper for YOLOv4 [24].
245
+ The image identification model runs simultaneously while the
246
+ environment is being mapped using the RGB camera feed and
247
+ returns “bounding boxes” around identified trash pieces in the
248
+ image, providing coordinates relative to the camera’s image
249
+ frame, figure 6.
250
+ These bounding boxes provide 2D pixel locations for the
251
+ trash in the image but do not contain any information about
252
+ Fig. 4. Raw Occupancy Grid
253
+ Fig. 5. Morphologically Transformed Occupancy Grid
254
+ where the trash lies in the environment. Therefore, the next
255
+ step is to identify the angle of the closest piece of trash relative
256
+ to the camera. This is accomplished by using the center pixel
257
+ x-coordinate of an identified piece of trash. Using the field of
258
+ view of the camera, an imaginary triangle can be created to
259
+ discover the angle of the trash relative to the camera in the
260
+ real world by using pixels as the coordinate system.
261
+ The FOV angle is 69.4 degrees, its opposite side is 640
262
+ pixels, and it is known to be an isosceles triangle, the re-
263
+ maining side lengths and angles can be extrapolated as this
264
+ is considered a trigonometrically “solved” triangle. Using this
265
+ triangle the angle of the identified trash piece is calculated
266
+ using the inverse tangent function, as shown in the following
267
+ equation and in figure 9.
268
+ θ = tan−1 trashx − 320
269
+ 462.139
270
+ (1)
271
+ The next step in the localization process is to determine the
272
+ distance between the camera and the piece of trash. This is
273
+ accomplished using the depth camera feed provided by the
274
+ RGB-D camera. This camera outputs a grayscale image in
275
+ which each pixel is a 16-bit value representing the distance to
276
+ that pixel in millimeters directly from the center of the camera.
277
+ The depth picture can be indexed as a matrix using the 2D
278
+ coordinates given by YOLO’s bounding box to determine the
279
+ exact distance between the camera and any piece of trash.
280
+ Once the distance between the camera and the trash has been
281
+ calculated, all information necessary to localize the piece of
282
+
283
+ Fig. 6. Trash Bounding Boxes
284
+ Fig. 7. Depth Feed
285
+ trash relative to the robot has been acquired. Using a second
286
+ triangle with coordinates in meters, both the angle of the trash
287
+ relative to the robot as well as the distance between the trash
288
+ and the robot can be extrapolated.
289
+ The first unknown variable encountered is the distance
290
+ between the trash and the center of the robot base, d. Using the
291
+ distance between the camera and the center of the robot base
292
+ s, as well as the distance between the trash and the camera
293
+ taken from the depth camera feed (depth), d can be solved
294
+ using the Law of Cosines as shown below.
295
+ c2& = a2 + b2 + 2ab cos(c)
296
+ (2)
297
+ c& =
298
+
299
+ a2 + b2 + 2ab cos(c)
300
+ (3)
301
+ d& =
302
+
303
+ (depth2 + r2 + 2(depth)(s)(cos(180◦ − θ))
304
+ (4)
305
+ Once d is known, the final variable which needs solving is
306
+ β. This can be solved using the Law of Sines.
307
+ sin X
308
+ x
309
+ & = sin Y
310
+ y
311
+ (5)
312
+ sin(β)
313
+ depth & = sin(180◦ − θ)
314
+ d
315
+ (6)
316
+ β& = sin−1
317
+ �depth sin(180◦ − θ)
318
+ d
319
+
320
+ (7)
321
+ Once the angle to the piece of trash relative to the robot and
322
+ the distance between these two points became known, these
323
+ values were added to the robot’s current position to realize the
324
+ piece of trash on the map. However, some difficulties arose
325
+ when the computer did not process the images fast enough.
326
+ Algorithm 1 Mapping Trash to a Map
327
+ Input: Robot’s path r in the map m, YOLO Bounding
328
+ Box b
329
+ Output: Pose of piece of trash in the map p, orientation
330
+ o of robot relative to p
331
+ confident pieces cp ← empty
332
+ ▷ init array to hold all
333
+ confident pieces
334
+ for every item in b do
335
+ if items i’s trash confidence is greater than ct then
336
+ cp ← i
337
+ end if
338
+ end for
339
+ yolotimestamp yt ← b[0].timestamp
340
+ for pose pr in r do
341
+ time difference td ← abs(yt − pr)
342
+ if you don’t have a closest pose timestamp cpr to the
343
+ yolo timestamp yt then
344
+ cpr ← pr
345
+ smallest time difference std ← td
346
+ else
347
+ if td < std then
348
+ std ← td
349
+ end if
350
+ end if
351
+ end for
352
+ for each timestamp, image in depth camera history do
353
+ Find the closest depthimage di taken to b
354
+ end for
355
+ Set robots orientation o from when the picture was
356
+ taken
357
+ for trashpiece tp in cp do
358
+ get distance d of tp from di
359
+ get tp’s angle theta from robot base
360
+ trash x distance tdx ← o + (d ∗ cos θ)
361
+ trash y distance tdy ← o + (d ∗ sin θ)
362
+ p ← tdx, tdy
363
+ end for
364
+ YOLOv4, when run on the Intel NUC, processed images at a
365
+ throughput of 0.5-0.8 FPS with about 4-5 seconds of latency
366
+ from when the image was originally taken. This created a
367
+ large gap between the time when the image was taken and the
368
+ current position of the robot. To account for the processing
369
+ latency, the path of the robot as it was mapping is logged
370
+ with timestamps for every position in its path from ORB-
371
+ SLAM2. Once the mapping robot received a successful trash
372
+ detection, the ROS timestamp given from YOLOv4 from when
373
+ that image was taken was passed to the path, and a Pose is
374
+ output. It is from this Pose that distance d and angle β are
375
+ added to localize the piece of trash relative to the map itself.
376
+ In the figure 11, the thin blue line is the path of the robot
377
+ as it maps the area. The red arrow is the current position of
378
+ the robot in the map. The cyan arrow is the Pose where the
379
+ robot was when the YOLOv4 image was taken. From this cyan
380
+ Pose, a red trash detection is then finally placed on the map.
381
+
382
+ rubbish:0.99Fig. 8. FOV Diagram
383
+ Fig. 9. FOV Trignometric Calculations
384
+ Fig. 10. Robot-Trash Trignometric Calculations
385
+ Every trash detection is plotted, and a separate anti-clustering
386
+ node averages these together, getting an approximate location
387
+ of the piece of trash.
388
+ E. Anti-clustering
389
+ Initially, we found consistency issues with the trash identifi-
390
+ cation. Either images of the same piece of trash were processed
391
+ more than once, or the trash’s estimated position became
392
+ inaccurate as the SLAM map updated. This problem led to
393
+ a large amount of noise, causing up to and exceeding thirty
394
+ detections for two pieces of trash in one single trial. In some
395
+ limited cases, our YoLOv4 model would also erroneously
396
+ classify a random background object as trash. To sort through
397
+ the noisy detections, each new trash detection was run through
398
+ Fig. 11. Robot Trajectory in the map
399
+ a filter. Every time a piece of trash was detected, a ROS
400
+ subscriber would listen to the detection and determine if it was
401
+ a new piece or detection of a piece of trash already found. A
402
+ clustered piece of trash is denoted by the green mark in figure
403
+ 11.
404
+ To accomplish this, all the detected pieces of trash were
405
+ stored at their initial positions. If any new trash detection
406
+ was within a set radius of a previously detected piece of
407
+ trash, the new trash detection became combined with the
408
+ established piece by taking a rolling average of the detections.
409
+ The calculations are seen in the equation 8, where p1x/y is the
410
+ existing trash detection’s respective x and y coordinate, p2x/2y
411
+ is the new trash detection’s x and y coordinates, and a is the
412
+ amount of times p1 has been averaged to that point.
413
+ p1x = p1xa + p2x
414
+ a + 1
415
+ p1y = p1ya + p2y
416
+ a + 1
417
+ (8)
418
+ This anti-clustering algorithm decreased the total amount of
419
+ detections to accurately reflect the number of trash pieces seen
420
+ in the environment. To avoid erroneous trash detections, aver-
421
+ age trash locations without enough detections were determined
422
+ as “noisy” and filtered out. Trash points were only published to
423
+ the navigation stack if it had three or more detections averaged
424
+ to one point.
425
+ F. General Navigation and Path Planning
426
+ General navigation consists of two parts: localization and
427
+ path planning. The Robot first receives the 2D occupancy
428
+ grid from our mapping software, alongside the trash detection
429
+ coordinates. Once these data are received, the robot then
430
+ navigates to within two meters of the nearest detected trash
431
+ point. Navigation only needs to navigate near a trash location
432
+ since greedy pickup is routinely effective within a two meter
433
+ distance, and the anti-clustering algorithm accounts for noise
434
+ in our trash detections.
435
+ To get the goal pose g you need it’s orientation, and x/y
436
+ coordinates. The equation 9 describes how to get the angle
437
+ for the pose where p1 is the starting robot pose and p2 the
438
+ trash pose. In equation 10 the distance the goal pose is from
439
+ the robot is calculated to have it within Greedy Pickup range,
440
+
441
+ -ldentifiedTrashPiece
442
+ trash_depth (m)
443
+ 180°-0
444
+ 0.6096m
445
+ KobukiRobot--ldentifiedTrashPiece
446
+ 640Pixels
447
+ RGBCameraFrame
448
+ CameraFOV-
449
+ 69.4°
450
+ RealsenseD435
451
+ RGB-DCamera-ldentifiedTrashPiece
452
+ trash x
453
+ 320-(640-trash_x)-
454
+ 462.139 PixelsAlgorithm 2 Anti-Clustering Algorithm
455
+ Input: Trash Pose tp
456
+ Output: Poses of clustered trash pieces ctp
457
+ averaged Trash poses atp tupled with times averaged ta
458
+ (atp, ta) ← empty
459
+ if atp = 0 then
460
+ atp ← tp
461
+ ta ← 1
462
+ else
463
+ for every pose tuple pt in atpt do
464
+ get x and y bottom and top around the trash’s
465
+ location
466
+ xb, xt, yb, yt
467
+ if xb ≤ tpx ≤ xt & yx ≤ tpy ≤ yt then
468
+ pose tuple x ptx = (ptx * ta + tpx) / (ta + 1.0)
469
+ pose tuple y pty = (pty * ta + tpy) / (ta + 1.0)
470
+ ta + 1
471
+ end if
472
+ end for
473
+ if tp is not in atp then
474
+ atp ← tp
475
+ end if
476
+ ctp ← all trash poses tp in atp where tpi’s tai > 2
477
+ times
478
+ end if
479
+ where d3 is the goal distance, d1 is the distance between
480
+ the trash and the robot, and d3 is Greedy Pickup’s range. In
481
+ equation 11 the coordinates of the goal pose is found where
482
+ gx/y is represents the coordinates respectively.
483
+ θ = arctan(p1y − p2y
484
+ p1x − p2x
485
+ )
486
+ (9)
487
+ d3 = d1 − d2
488
+ (10)
489
+ gx = d3 + p1x cos(θ)gy = d3 + p2x sin(θ)
490
+ (11)
491
+ Fig. 12. Robot Path Planning in Rviz
492
+ The Navigation and path planning stack was based on the
493
+ ROS-provided open-source AMCL software stack. This soft-
494
+ ware loads and localizes the robot in a mapped environment
495
+ and its DWA planner creates a path between the identified
496
+ points of trash. We created another software module that feeds
497
+ our target coordinates from our trash detection phase into
498
+ AMCL’s path planner to follow the most efficient path between
499
+ the robot’s current location and the nearest possible trash point,
500
+ figure 12.
501
+ G. Greedy Pickup
502
+ Once the Navigation portion of the software stack places
503
+ the robot within 2 meters of the piece of trash, Greedy Pickup
504
+ is activated. Greedy Pickup is an asynchronous algorithm that
505
+ ignores all navigation and map factors and solely focuses on
506
+ seeking out the nearby trash directly.
507
+ When the greedy pickup is activated, it rotates in a given
508
+ direction to look for trash using YoLOv4. Once it receives a
509
+ trash detection, it calculates the position of the trash using the
510
+ same algorithm explained in the Trash Identification section.
511
+ After the robot localizes the trash, it turns back towards the
512
+ trash at its precise angle, turns on the collection mechanism’s
513
+ motor, and moves exactly 0.2m past the trash’s location to
514
+ ensure proper collection. Once this occurs, the motor turns off
515
+ and navigation resumes.
516
+ Algorithm 3 Greedy Pickup
517
+ Input: Detected Trash pose list tpl
518
+ set timeout time to
519
+ set confidence threshold ct
520
+ for Trash pose tp in tpl do
521
+ Determine whether tp is to the left or right of the robot
522
+ in the Map
523
+ Spin in direction of tp, scanning for confirmation
524
+ if Robot gets tp ≥ ct then
525
+ Robot Stop spinning
526
+ Use III-D algorithm to find relevant Robot orienta-
527
+ tion and trash pose
528
+ Get destination angle
529
+ Robot turns to destination angle
530
+ Robot Turn on collection mechanism and drive over
531
+ detected piece of trash
532
+ else
533
+ Robot exceeded to looking for trash
534
+ end if
535
+ end for
536
+ Output: Poses of clustered trash pieces ctp
537
+ For the collection mechanism to turn on or off, the NUC
538
+ sends a serial packet to the connected Arduino with only three
539
+ bytes in sequence, either [0x59, 0x59, 0x59] to start the motor
540
+ or [0x4E, 0x4E, 0x4E] to stop the motor. Once the Arduino
541
+ receives a start packet, it then outputs a PWM signal to two
542
+ of its GPIO pins which control the L928N motor controller.
543
+ The PWM signal gradually increases from a low duty cycle to
544
+ a higher duty cycle to control the current spikes on the 12V
545
+ line from the Robot base to the Motor. In the initial design on
546
+ bench power, starting the motor from 0 to full power produced
547
+ an initial current spike of approximately 1.9A before settling
548
+ around 0.9-1.1A when in normal motion or picking up an
549
+
550
+ object. The initial spike was over the 1.5A limit provided by
551
+ the 12V port accessible on the robot base. To eliminate this
552
+ spike, a slow ramp-up of the duty cycle of the PWM signal
553
+ was introduced from 20% duty cycle to a maximum of 80%
554
+ linearly over the course of 5 seconds. This removes the initial
555
+ current spike and ensures that the motor can both properly
556
+ power the collection mechanism and does not exceed the 1.5A
557
+ current limit.
558
+ H. ROS Middleware
559
+ ROS was used to connect all the functions of this system.
560
+ Every design block in figure 2 functions as a node, or multiple
561
+ nodes, which subscribe and publish information to the other
562
+ nodes. ROS would also be used to network between the
563
+ different robots in the multi-robot system over WiFi or other
564
+ wireless protocols.
565
+ IV. EXPERIMENT
566
+ A. Goal
567
+ The purpose of this experiment is to assert the feasibility
568
+ of this system design before iterating on the hardware used to
569
+ make it scalable and adaptable. The robot was evaluated on
570
+ its ability to accurately map the enclosure, identify, and mark
571
+ the pieces of trash, choose an efficient path, and pick the trash
572
+ up.
573
+ The robotic system is meant to clear trash as large and heavy
574
+ as an average 600mL Spring Valley Water bottle weighing ap-
575
+ proximately 0.64 kg. The system’s robotic base, the TurtleBot
576
+ 2, has a load limitation of approximately 5 kilograms [20],
577
+ which presents an upper weight limit on the total load. Since
578
+ the robot’s additional components (external frame, storage
579
+ container, etc.) are estimated to weigh approximately 3 kg,
580
+ the trash load must weigh at most 2 kg.
581
+ The UGV operates in narrow environmental parameters. The
582
+ weather must be clear with no rain since the electronic systems
583
+ onboard the UGV are non-weatherproofed. In addition, due to
584
+ the wheels that come default with the robotic base (Kobuki
585
+ Mobile Base), our prototype can only operate on relatively flat,
586
+ smooth, evenly colored surfaces, with no extreme movement
587
+ in the background.
588
+ B. Testing In Simulation
589
+ Simulated testing was done in the Gazebo Robotics simu-
590
+ lator, 13. This simulator was included in the base Turtlebot
591
+ SDK and includes a near true-to-life recreation of the entire
592
+ turtlebot system. The use of ROS allows for the navigation
593
+ stack and greedy pickup to be run against the simulator and
594
+ behave exactly identically to reality. This simulator was instru-
595
+ mental in the initial testing of movement and navigation as it
596
+ allowed our team to test many different speed parameters and
597
+ movement algorithms without risking any physical damage to
598
+ the robot. All data associated with movement and mapping
599
+ were recorded and played back in a simulated environment to
600
+ recreate and reevaluate our physical testing. This allowed for
601
+ useful visualizations and assessments of what the robot was
602
+ processing at any given time.
603
+ Fig. 13. Simulation Testing Still
604
+ C. Testing the Hardware
605
+ 1) Experiment System: The system’s design is meant to
606
+ function with a mapping robot and a ground vehicle. To
607
+ simulate the mapping vehicle in this experiment the UGV
608
+ plays both roles. The UGV first passed through the area to
609
+ get a map and identify trash. Then taking that information to
610
+ navigate and pick up the trash.
611
+ 2) The Robot:
612
+ The hardware design uses a modified
613
+ Turtlebot-2 as a base design, figure 15, that has four main
614
+ components: the depth camera (480p RGB-D Intel Realsense
615
+ D435) [10], the computer (7-year-old Intel NUC with 8GB
616
+ of RAM) which runs a GNU-Linux OS along with ROS to
617
+ manage sensor data collection and real-time processing, the
618
+ mobile robotic base (Kobuki Mobile Base) [12], and a custom-
619
+ designed collection mechanism. The camera relays RGB and
620
+ depth images which are processed to identify and target trash.
621
+ The Kobuki’s motor and wheels relay odometric feedback
622
+ that helps confirm the UGV’s current location. The collection
623
+ mechanism attaches to the front of the Kobuki Mobile base,
624
+ plugs into power and data ports on the robot, and uses a rotary
625
+ brush to pick up the trash.
626
+ 3) The Collection Mechanism: The collection mechanism
627
+ is a custom-designed addition to the Turtlebot Robot. Its
628
+ mechanical construction consists of 20-20 aluminum bars
629
+ connected by 90-degree brackets. To allow free range of
630
+ motion, caster wheels were affixed to the bottom of the frame.
631
+ When the collection mechanism motor is activated, it sweeps
632
+ trash up a ramp into a plastic storage container. A camera
633
+ mount was printed so the Realsense could be attached to the
634
+ front of mechanism [23]. A funnel was added to the front of
635
+ the collection mechanism to rein in the trash that may have
636
+ been missed slightly, figure 18.
637
+ The design of the electronics system for the collection
638
+ mechanism is an Arduino Mega that is connected to the NUC
639
+ using a USB cable, figure 17. The Arduino is then connected
640
+ to an L982N Motor driver breakout board over PWM-enabled
641
+ GPIO pins (5V). This motor driver breakout board is supplied
642
+ with 12V by the Kobuki base from a 12V, 1.5A Max port. The
643
+ output of the L982N is the DC motor which drives the chain
644
+ and the brush.
645
+
646
+ Fig. 14. Hardware Overview Diagram
647
+ Fig. 15. Turtlebot2 Base System
648
+ The brush itself was hand-designed and fabricated since
649
+ there is no commercial brush model that fit the design speci-
650
+ fications for the mobile robot, figure 16.
651
+ D. The Environment
652
+ The environment where the robot was tested was a room
653
+ with a random configuration of chairs and obstacles put around
654
+ an open space. Therefore, the map would be created each
655
+ time in a dynamic environment and the system would have
656
+ to account for a new configuration. In that space, trash was
657
+ put in different locations for all tests. We tested up to four
658
+ pieces of trash in the environment at a time.
659
+ E. Tests
660
+ 1) Testing Mapping/ Image Identification accuracy/ Ac-
661
+ counting for Latency: To test the trash detection and how
662
+ well the processing latency was accounted for, expected maps
663
+ with the approximate trash locations were checked against the
664
+ created ones.
665
+ 2) Testing the Greedy Pickup Algorithm: To test Greedy
666
+ Pickup, the mode was enabled with varying pieces of trash
667
+ within two meters of the robot. The piece of trash would start
668
+ out of the UGV’s perception range. The UGV would have to
669
+ scan for the trash, identify it and then collect it. This trial was
670
+ Fig. 16. Custom Designed Brush
671
+ Fig. 17. Motor Circuitry
672
+ Fig. 18. Final Construction
673
+ run with trash at 2 meters, 1 meter, and half a meter distance
674
+ from the UGV.
675
+ 3) Full System Trials: Full system trials were then con-
676
+ ducted, starting with the mapping of an environment and
677
+ labeling trash points in that environment. Then to navigating
678
+ to the labeled pieces of trash in the environment and collecting
679
+ the pieces of trash using Greedy Pickup.
680
+ V. RESULTS
681
+ A. Accounting for Processing Latency
682
+ The map creation and the image identification, figure 23,
683
+ were shown to be an accurate, figure 19, fast and lightweight
684
+ way of monitoring an area and identifying pieces of trash.
685
+ B. Greedy Pickup Results
686
+ Greedy pickup is shown to be accurate to an extent with
687
+ a success rate of 77.78%, figure 20. There were multiple
688
+ failures in these trials that were caused by the design of
689
+ the collection mechanism. The collection mechanism was not
690
+ equipped with odometric wheels that could relay its’ location
691
+ so, at times it would overturn, and the caster wheels introduced
692
+ an error the system was not aware of and could not account
693
+
694
+ Intel Realsense
695
+ Camera
696
+ RGB + depth images
697
+ collection
698
+ Intel NUC
699
+ mechanism
700
+ motor feedback + control
701
+ Kobuki
702
+ Mobile Base12VDCMotor
703
+ CURRENT SENSING A
704
+ CURRENT SENSING
705
+ OUTPUT
706
+ OUTPUT 2
707
+ OUTPUT
708
+ GNT
709
+ SUPPLY VOLTAGE VS
710
+ INPUT
711
+ ENABLE
712
+ INPUT
713
+ ENABLEA
714
+ LOGIC SUPPLY VOLTAGE VSS
715
+ INPUT
716
+ INPUT 2
717
+ GND
718
+ OME
719
+ L928N Motor Driver
720
+ TXO
721
+ 8
722
+ 12V
723
+ REOET
724
+ RX3
725
+ TX3
726
+ MEGA
727
+ 91
728
+ ROTAFig. 19. Accurate Map Creation with Identified Trash Points Result
729
+ Fig. 20. Greedy Pickup Results
730
+ Fig. 21. Full System Run-through Results
731
+ Fig. 22. Real Time Trash Identification and Map Creation
732
+ for. This caused the UGV to over or under turn occasionally
733
+ and not successfully collect the trash. The Greedy Pickup
734
+ algorithm has shown the ability to increase the error tolerance
735
+ of the system, however, there are more improvements to the
736
+ algorithm that could be made to make it more error-tolerant.
737
+ For example, an added “lock on” mechanism that when a piece
738
+ of trash is in sight it would keep the piece of trash in the center
739
+ of its FOV as it moves forward to collect the piece of trash.
740
+ Ensuring that the failure-causing edge cases are accounted for.
741
+ Fig. 23. Still of UGV Picking up Water Bottle in System Test
742
+ C. Full System Results
743
+ These results, with a 68% success rate, figure 21, show
744
+ that there are possible errors that can be introduced to this
745
+ system and that they compound on themselves as the task gets
746
+ more complex. During these trials, the collection mechanism
747
+ introduced errors during navigation and greedy pickup. The
748
+ collection mechanism introduced errors by being slightly out
749
+ of position. Since the Collection mechanism did not have
750
+ sensor feedback to tell the UGV it was not in the correct
751
+ position the little errors compounded into failures to collect
752
+ trash.
753
+ VI. CONCLUSION
754
+ Our contribution is a multi-robot system design applied
755
+ to monitoring and managing roadside litter. We developed a
756
+ system that can map, identify, and pick up pieces of trash. The
757
+ system is designed to be relatively cheap and scalable which
758
+ could be done because we introduced different algorithms that
759
+ account for errors in a system that has less precise sensors.
760
+ Our Greedy Pickup algorithm accounts for errors in trash iden-
761
+ tification, and trash can be accurately identified in a system
762
+ with low processing power. Our custom-designed collection
763
+ mechanism, designed to pick up the main offending types of
764
+ trash found on the side of the road, was also introduced.
765
+ This system builds off previously known algorithms: AMCL
766
+ and DWA for navigation, Orbslam-2 for map creation, and
767
+ YOLO.v4 for trash identification. It also build off multi-robot
768
+ systems to monitor a dynamic environment and combines that
769
+ with information with a dynamic collection algorithm, Greedy
770
+ Pickup, to create an efficient collection process.
771
+ The next steps for this system would to be refine the
772
+ mechanical design of the UGV, such as adding odometry
773
+ sensors onto the collection mechanism’s wheels and improving
774
+ the wheels to be able to drive over more difficult terrains.
775
+ There are also improvements to be made to the Greedy Pickup
776
+ algorithm such as adding a “Lock on” capability. Better logic
777
+ could be applied to the navigation, for example, a future
778
+ iteration of this system could use a graph search algorithm
779
+
780
+ Mapping and Trash Identification Results
781
+ 8%
782
+ 92%
783
+ Successful Maps
784
+ ■ Failed MapsGreedy Pickup Success
785
+ 16
786
+ 14
787
+ 12
788
+ 10
789
+ 8
790
+ 6
791
+ 4
792
+ 2
793
+ 0
794
+ 2 meter
795
+ 1 meter
796
+ 0.5 meter
797
+ Robot's Distance from Trash
798
+ Total Trials
799
+ Successful trialsFull System Tests
800
+ Aount of Trash in the Environment
801
+ 0
802
+ 0.5
803
+ 1
804
+ 1.5
805
+ 2
806
+ 2.5
807
+ 3
808
+ 3.5
809
+ 4
810
+ 4.5
811
+ Successful Trials
812
+ Total Trials[ Interact Move Camera
813
+ Select
814
+ Focus CameraMeasure2D Pose Estimate2DNavGoalPublishPoint
815
+ Q
816
+ RGBImage
817
+ RGB View
818
+ ORB-SLAM2Ima
819
+ RViz
820
+ SLAMView
821
+ OOYOLOV4
822
+ Map View
823
+ YOLOView
824
+ 199.22
825
+ Wall Elapsed:416.55
826
+ Experimentalto find the most efficient path between every piece of trash.
827
+ An aerial robot can also be introduced as the mapping robot in
828
+ the next iteration of this system for testing, to more accurately
829
+ represent the issues that would arise from changes in the
830
+ perspective of the system. More replicas of the UGV could be
831
+ added into the system as well, so there would be multiple trash
832
+ collectors in one environment at the same time. The system
833
+ could also have mapping and trash collection happening in
834
+ parallel instead of the modes being sequential.
835
+ VII. ACKNOWLEDGMENTS
836
+ This is a video of a full run-through our system did with
837
+ two pieces of trash in the environment [5]. This is the central
838
+ repository in our organization that sets up the system [4].
839
+ This is the Greedy Pickup repository which holds all the
840
+ functions laid out in this paper [3]. We would like to thank
841
+ the contributions of Divya Venkatraman, Jared Raines and
842
+ Catherine Ellingham for their work on gathering data, editing
843
+ the paper and system networking. We’d also like to thank Dr.
844
+ Taskin Padir and his Robotics and Intelligent Ground Vehicle
845
+ Research Laboratory (RIVeR) [22] for allowing us to use their
846
+ hardware to test our design.
847
+ REFERENCES
848
+ [1]
849
+ Yong-bao Ai et al. “Visual SLAM in dynamic environ-
850
+ ments based on object detection”. In: Defence Technol-
851
+ ogy (2020). ISSN: 2214-9147. DOI: https://doi.org/10.
852
+ 1016/j.dt.2020.09.012. URL: https://www.sciencedirect.
853
+ com/science/article/pii/S2214914720304402.
854
+ [2]
855
+ Keep Louisiana Beautiful. Executive Summary: Litter in
856
+ America. URL: https://keeplouisianabeautiful.org/wp-
857
+ content/uploads/2015/09/Litter-in-America-Executive
858
+ Summary - FINAL.pdf. (Accessed: 10-June-2021).
859
+ [3]
860
+ John Chiaramonte, Jack Fenton, and Lee Milburn. cave-
861
+ man mode. URL: https://github.com/Capstone- W3/
862
+ caveman mode. (Accessed: 20-April-2021).
863
+ [4]
864
+ John Chiaramonte et al. Capstone-W3. URL: https://
865
+ github.com/Capstone-W3. (Accessed: 11-June-2021).
866
+ [5]
867
+ John Chiaramonte et al. T.R.A.S.H. Demonstration.
868
+ URL: https : / / www . youtube . com / watch ? v =
869
+ cIwk0Kh9k7E. (Accessed: 5-July-2021).
870
+ [6]
871
+ Maria Valera Espina et al. “Multi-robot Teams for
872
+ Environmental Monitoring”. In: Innovations in Defence
873
+ Support Systems – 3: Intelligent Paradigms in Secu-
874
+ rity. Ed. by Paolo Remagnino, Dorothy N. Monekosso,
875
+ and Lakhmi C. Jain. Berlin, Heidelberg: Springer
876
+ Berlin Heidelberg, 2011, pp. 183–209. ISBN: 978-3-
877
+ 642-18278-5. DOI: 10.1007/978- 3- 642- 18278- 5 8.
878
+ URL: https://doi.org/10.1007/978-3-642-18278-5 8.
879
+ [7]
880
+ Conserve Energy Future. The Catastrophic Effects of
881
+ Littering on Humans. URL: https : / / www. conserve -
882
+ energy-future.com/littering-effects-humans-animals-
883
+ environment.php. (Accessed: 14-June-2021).
884
+ [8]
885
+ Brian Gerkey. AMCL Package Summary. URL: https:
886
+ //wiki.ros.org/amcl?distro=melodic. (Accessed: 10-
887
+ March-2022).
888
+ [9]
889
+ Le Hong, Weicheng Cui, and Hao Chen. “A Novel
890
+ Multi-Robot Task Allocation Model in Marine Plastics
891
+ Cleaning Based on Replicator Dynamics”. In: Journal
892
+ of Marine Science and Engineering 9.8 (2021). ISSN:
893
+ 2077-1312. DOI: 10.3390/jmse9080879. URL: https:
894
+ //www.mdpi.com/2077-1312/9/8/879.
895
+ [10]
896
+ Intel. Intel® RealSense™ Depth Camera D435. URL:
897
+ https://ark.intel.com/content/www/us/en/ark/products/
898
+ 128255 / intel - realsense - depth - camera - d435 . html.
899
+ (Accessed: 5-July-2021).
900
+ [11]
901
+ Alaa Khamis, Ahmed Hussein, and Ahmed Elmogy.
902
+ “Multi-robot Task Allocation: A Review of the State-
903
+ of-the-Art”. In: vol. 604. May 2015, pp. 31–51. ISBN:
904
+ 978-3-319-18299-5. DOI: 10.1007/978-3-319-18299-
905
+ 5 2.
906
+ [12]
907
+ Iclebo Kobuki. Kobuki User Guide. URL: http://kobuki.
908
+ yujinrobot . com / wiki / online - user- guide/. (Accessed:
909
+ 11-June-2021).
910
+ [13]
911
+ Nathan Koenig and Andrew Howard. “Design and Use
912
+ Paradigms for Gazebo, An Open-Source Multi-Robot
913
+ Simulator”. In: ().
914
+ [14]
915
+ Stephanie Melchor. Roadside Trash A Growing Prob-
916
+ lem. URL: https://www.montereyherald.com/2021/01/
917
+ 23/roadside-trash-a-growing-problem/. (Accessed: 10-
918
+ June-2021).
919
+ [15]
920
+ Ra´ul Mur-Artal, J. M. M. Montiel, and Juan D. Tard´os.
921
+ “ORB-SLAM: A Versatile and Accurate Monocular
922
+ SLAM System”. In: IEEE Transactions on Robotics
923
+ 31.5 (2015), pp. 1147–1163. DOI: 10.1109/TRO.2015.
924
+ 2463671.
925
+ [16]
926
+ Shinkyu Park, Yaofeng Desmond Zhong, and Naomi
927
+ Ehrich Leonard. “Multi-Robot Task Allocation Games
928
+ in Dynamically Changing Environments”. In: 2021
929
+ IEEE International Conference on Robotics and Au-
930
+ tomation (ICRA). 2021, pp. 8678–8684. DOI: 10.1109/
931
+ ICRA48506.2021.9561809.
932
+ [17]
933
+ Morgan Quigley et al. “ROS: an open-source Robot
934
+ Operating System”. In: Proc. of the IEEE Intl. Conf.
935
+ on Robotics and Automation (ICRA) Workshop on Open
936
+ Source Robotics. Kobe, Japan, May 2009.
937
+ [18]
938
+ raulmur. ORB SLAM2. URL: https : / / github . com /
939
+ raulmur/ORB SLAM2. (Accessed: 11-June-2021).
940
+ [19]
941
+ rayvburn. ORBSLAM2 ROS. URL: https://github.com/
942
+ rayvburn / ORB - SLAM2 ROS. (Accessed: 11-June-
943
+ 2021).
944
+ [20]
945
+ Clearpath Robotics. TurtleBot 2 - Open Source Personal
946
+ Research Robot. URL: https://clearpathrobotics.com/
947
+ turtlebot - 2 - open - source - robot. (Accessed: 10-June-
948
+ 2021).
949
+ [21]
950
+ Adrian Rosebrock. OpenCV Morphological Operations.
951
+ URL: https://pyimagesearch.com/2021/04/28/opencv-
952
+ morphological-operations/. (Accessed: 11-June-2021).
953
+ [22]
954
+ Padir Taskin. RIVeR. URL: https : / / robot . neu . edu/.
955
+ (Accessed: 7-July-2021).
956
+
957
+ [23]
958
+ Makerbot Thingiverse. Intel RealSense D435 Camera
959
+ Mount for OpenBuilds 20x20mm Extrusion. URL: https:
960
+ //www.thingiverse.com/thing:2965905.
961
+ [24]
962
+ Tossy0423. darknet ros. URL: https : / / github . com /
963
+ Tossy0423 / darknet ros / tree / master/. (Accessed: 11-
964
+ June-2021).
965
+
6dAzT4oBgHgl3EQfvP2u/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8dFRT4oBgHgl3EQfpTfl/content/tmp_files/2301.13613v1.pdf.txt ADDED
@@ -0,0 +1,1377 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Geometry-based approximation of waves propagating
2
+ through complex domains∗
3
+ Davide Pradovera†
4
+ Monica Nonino†
5
+ Ilaria Perugia†
6
+ February 1, 2023
7
+ Abstract
8
+ We consider wave propagation problems over 2-dimensional domains with piecewise-linear bound-
9
+ aries, possibly including scatterers. Under the assumption that the initial conditions and forcing terms
10
+ are radially symmetric and compactly supported (which is common in applications), we propose an ap-
11
+ proximation of the propagating wave as the sum of some special nonlinear space-time functions: each
12
+ term in this sum identifies a particular ray, modeling the result of a single reflection or diffraction ef-
13
+ fect. We describe an algorithm for identifying such rays automatically, based on the domain geometry.
14
+ To showcase our proposed method, we present several numerical examples, such as waves scattering off
15
+ wedges and waves propagating through a room in presence of obstacles.
16
+ Keywords: wave propagation, model reduction, scattering, geometrical optics, diffraction
17
+ AMS subject classifications: 35L05, 35Q60, 65M25, 78A45, 78M34
18
+ 1
19
+ Introduction
20
+ The discretization of numerical models for the simulation of complex phenomena results in high-dimensional
21
+ systems to be solved, usually at an extremely high cost in terms of computational time and storage memory.
22
+ Among these models, wave propagation problems represent an extremely interesting topic: relevant applica-
23
+ tions can be found, e.g., in the field of array imaging, where acoustic, electromagnetic, and elastic waves in
24
+ scattering media are modeled by the reflectivity coefficient, which is often unknown. Some examples in this
25
+ direction can be found in [5, 6, 7, 30], where inverse scattering problems are used to infer the reflectivity of
26
+ one or more scatterers embedded either in a known and smooth medium, or in a randomly inhomogeneous
27
+ medium. Another example of application of wave propagation problems is numerical acoustics, where the
28
+ goal is to simulate the propagation of sound in a room, in presence of obstacles and walls with different
29
+ absorbing and/or reflecting properties, see [28].
30
+ Wave propagation problems in the time-harmonic setting (the Helmholtz problem, cast in the frequency
31
+ domain) have been widely studied. See, e.g., [4, 13, 19, 24, 25, 27, 28]. However, our focus here are problems
32
+ in the time domain, whose numerical simulation is expensive, mainly because one needs to use both a fine
33
+ spatial mesh and a carefully chosen time step in order to satisfy the CFL condition [11, 16]. In the interest
34
+ of making these simulations feasible, model order reduction (MOR) [3, 9, 14, 17] represents a promising
35
+ framework, whose goal is to reduce the computational cost of solving the problem of interest.
36
+ In this context, it is well known [12, 15] that wave propagation problems are characterized by a slowly
37
+ decaying Kolmogorov n-width.
38
+ Because of this, classical linear-subspace MOR methods are not able to
39
+ reproduce the behavior of the wave propagation without relying on a very high-dimensional linear manifold.
40
+ This makes linear surrogate models unappealing, since they do not yield significant speed-ups. In recent
41
+ years, many approaches have been proposed to overcome the intrinsic “difficulty” of problems with slowly
42
+ ∗M. Nonino and I. Perugia have been funded by the Austrian Science Fund (FWF) through project F 65 “Taming Complexity
43
+ in Partial Differential Systems” and project P 33477.
44
+ †Faculty
45
+ of
46
+ Mathematics,
47
+ University
48
+ of
49
+ Vienna,
50
+ Oskar-Morgenstern-Platz
51
+ 1,
52
+ 1090
53
+ Vienna,
54
+ Austria
55
+ (da-
56
57
+ 1
58
+ arXiv:2301.13613v1 [math.NA] 31 Jan 2023
59
+
60
+ D. Pradovera, M. Nonino, and I. Perugia
61
+ Geometry-based approximation of waves in complex domains
62
+ decaying Kolmogorov n-width, with the target of making MOR more efficient. To this end, such methods
63
+ rely on nonlinear and/or hybrid space-time approaches. For more details, we refer to [8, 10, 18, 21, 26, 29, 31].
64
+ In this work, we focus on wave propagation over 2-dimensional spatial domains, possibly including ob-
65
+ stacles. We limit our investigation to domains with piecewise-linear boundaries and a constant wave speed.
66
+ The initial conditions and forcing terms are assumed to be compactly supported and radially symmetric
67
+ around a “source point”. This situation arises in many of the above-mentioned applications. Under these
68
+ assumptions, we propose to approximate the solution of the problem of interest with the sum of some special
69
+ nonlinear space-time functions, which we call “rays”. Each ray models a reflection or diffraction effect, and
70
+ is composed of different parts:
71
+ • the free-space radially symmetric solution of the wave equation, modeling the space-time propagation
72
+ of the ray;
73
+ • a spatial indicator function, determining the light cone of each ray;
74
+ • a nonlinear spatial term encoding the angular modulation of the ray, which is crucial when modeling
75
+ diffraction effects.
76
+ The number of terms appearing in the sum is determined by the number of reflection and diffraction effects
77
+ that are required to faithfully approximate the target wave, which ultimately depends on the geometry of
78
+ the physical domain.
79
+ Among the advantages of the proposed approach, we mention the fact that each ray is separable into
80
+ time-radial and angular components (in the “polar coordinates” sense). As we will see, we can leverage this
81
+ to reduce drastically the computational cost and the storage memory that are required by our approximation,
82
+ with respect to competitor methods.
83
+ The rest of the paper is structured as follows. In Section 1.1 we present the problem of interest. In
84
+ Section 2 we introduce the main ingredients of our method, and we describe the “training phase” of the
85
+ algorithm, i.e., the construction of the approximated wave. In Sections 3 and 4 we detail how we model
86
+ reflection and diffraction effects, respectively. The latter section is rather extensive, since diffraction is much
87
+ harder to model than reflection, and requires special care. In Section 5 we present some numerical results to
88
+ showcase our method. Both simple benchmarks (wedges) and more complicated tests (2D room model with
89
+ scatterers) are considered. Some final considerations follow in Section 6.
90
+ 1.1
91
+ Target problem
92
+ We are interested in the numerical approximation of the solution of the wave equation in complex domains.
93
+ In this work, we consider 2-dimensional domains only. However, most of our discussion generalizes to 3D.
94
+ We defer a discussion on this till Section 6.
95
+ We denote by Ω ⊂ R2 the physical domain in which the wave equation is considered. We assume that
96
+ Ω is either a closed polygon or a set-subtraction of polygons (to allow for multiply connected domains).
97
+ We denote by ne and nv the number of edges and vertices of ∂Ω, respectively. We study the propagation
98
+ of waves in Ω over a given time interval of interest [0, T]. The model problem is the wave equation with
99
+ constant (unit) wave speed:
100
+
101
+
102
+
103
+
104
+
105
+
106
+
107
+
108
+
109
+ ∂ttu(x, t) = ∆u(x, t) + f(x, t)
110
+ for (x, t) ∈ Ω × (0, T),
111
+ u(x, 0) = u0(x)
112
+ for x ∈ Ω,
113
+ ∂tu(x, 0) = u1(x)
114
+ for x ∈ Ω,
115
+ ∂νu(x, t) = 0
116
+ for (x, t) ∈ ∂Ω × (0, T],
117
+ (1)
118
+ with ∆ the Laplacian operator, defined, in 2 dimensions, as ∆ = �2
119
+ j=1 ∂xjxj. The homogeneous Neumann
120
+ condition (i.e., the last equation above) models the whole boundary ∂Ω as sound-hard [11]. More generally,
121
+ all or parts of ∂Ω may be modeled as sound-soft via a Dirichlet-type condition: u(x, t) = 0.
122
+ We assume that the initial conditions u0 and u1, as well as the forcing term f, have radial symmetry
123
+ around a given point. Without loss of generality, we will take such point to be the origin of R2:
124
+ u0(x) = η0(∥x∥), u1(x) = η1(∥x∥), f(x, t) = η2(∥x∥ , t)
125
+ ∀(x, t) ∈ Ω × (0, T),
126
+ (2)
127
+ 2
128
+
129
+ D. Pradovera, M. Nonino, and I. Perugia
130
+ Geometry-based approximation of waves in complex domains
131
+ with ∥x∥2 = �2
132
+ j=1 x2
133
+ j. We further assume that the functions ηj have compact support, namely, that there
134
+ exist R > 0 such that ηj(ρ) = 0 for all ρ > R and j = 0, 1, 2. Moreover, to avoid incompatibilities with the
135
+ boundary conditions, for simplicity we will only consider the situation where the supports of the functions
136
+ ηj are fully contained in Ω.
137
+ 2
138
+ Approximation framework
139
+ Before we can model boundary effects (reflection and diffraction), we need to understand how the solution
140
+ u would behave if no boundary were present. To this aim, we consider the wave equation in free space
141
+
142
+
143
+
144
+
145
+
146
+ ∂ttU(x, t) = ∆U(x, t) + f(x, t)
147
+ for (x, t) ∈ R2 × (0, ∞),
148
+ U(x, 0) = u0(x)
149
+ for x ∈ R2,
150
+ ∂tU(x, 0) = u1(x)
151
+ for x ∈ R2,
152
+ (3)
153
+ which we have obtained from (1) by replacing Ω with the whole plane.
154
+ Due to radial symmetry (of the initial conditions and of the forcing term), we can recast the problem in
155
+ polar coordinates. This allows us to define the free-space solution in the radial coordinate Ψ, as the solution
156
+ of
157
+
158
+
159
+
160
+
161
+
162
+
163
+
164
+
165
+
166
+ ∂ttΨ(ρ, t) = �∆Ψ(ρ, t) + η2(ρ, t)
167
+ for (ρ, t) ∈ (0, ∞) × (0, ∞),
168
+ Ψ(ρ, 0) = η0(ρ)
169
+ for ρ ∈ [0, ∞),
170
+ ∂tΨ(ρ, 0) = η1(ρ)
171
+ for ρ ∈ [0, ∞),
172
+ ∂ρΨ(0, t) = 0
173
+ for t ∈ (0, ∞),
174
+ (4)
175
+ where �∆ is the Laplace operator in polar coordinates (under radial symmetry), i.e.
176
+ �∆ = ∂ρρ + 1
177
+ ρ∂ρ, and
178
+ U(x, t) = Ψ(∥x∥ , t) for all x ∈ R2. Note that, by the compact support of the initial conditions and of
179
+ the forcing term, and by the finite (unit) speed of propagation of the wave equation, we have Ψ(ρ, t) = 0
180
+ whenever ρ > t + R.
181
+ Remark 2.1. Generally, the free-space solution Ψ is not available analytically, except for very simple choices
182
+ of initial conditions and forcing term. Accordingly, in most applications, the function Ψ will need to be
183
+ replaced with a suitable approximation. To this effect, one could discretize (4), e.g., with a finite element
184
+ approximation (in space) and some timestepping scheme (in time). See Section 5 for more details on how
185
+ this can be carried out.
186
+ Our goal is to approximate, for all (x, t) ∈ Ω × [0, T], the solution u(x, t) of the wave equation problem
187
+ (1) with the following sum of special functions:
188
+ u(x, t) ≈ �u(x, t) =
189
+ N
190
+
191
+ n=1
192
+ Ψ(∥x − ξn∥ + rn, t)1Ωn(x)ζn(x − ξn)
193
+
194
+ ��
195
+
196
+ �un(x,t)
197
+ .
198
+ (5)
199
+ Each term �un is what we will call a “ray”. Therein, Ψ is the above-mentioned free-space radially symmetric
200
+ solution of (4), and 1A denotes the indicator function with support A, i.e.,
201
+ 1A(y) =
202
+
203
+ 1
204
+ if y ∈ A,
205
+ 0
206
+ if y /∈ A.
207
+ (6)
208
+ Moreover, in (5), we have introduced the following quantities:
209
+ • N is the number of rays used in the approximation.
210
+ • ξn is the location of the new source.
211
+ • rn ≥ 0 is a spatial delay, which will be used for the synchronization of diffraction effects.
212
+ • Ωn ⊂ Ω is the light cone (the spatial support) of a term of the sum.
213
+ 3
214
+
215
+ D. Pradovera, M. Nonino, and I. Perugia
216
+ Geometry-based approximation of waves in complex domains
217
+ • ζn : R2 \ {0} → R is a weight function describing the angular modulation. We require that ζn be a
218
+ positive-homogeneous functions, i.e., ζn(y) = ζn(τy) for all τ > 0 and y ∈ R2.
219
+ Note that, due to the finite speed of propagation of the free-space solution Ψ, we have that a generic
220
+ term �un(x, t) is zero whenever t < ∥x − ξn∥ + rn − R, i.e., for t small enough, depending on x.
221
+ The number of rays N in the sum (5) will be determined based on how many boundary effects (reflections
222
+ and diffractions) need to be included in �u in order to have a good approximation of the target wave u. We
223
+ describe a strategy for automatically identifying a good N in the next section. See, e.g., Remark 2.2.
224
+ 2.1
225
+ Building the low-rank skeleton
226
+ Recalling that u solves the wave equation (1) in the domain Ω, we use the first term in (5), namely, �u1, to
227
+ approximate the outgoing component of u, ignoring any effect due to the boundary ∂Ω, except for shadows.
228
+ Then, given such �u1, we use the other terms �u2, . . . , �uN to correct this first approximation. Each extra term
229
+ models a single effect due to a certain portion of the boundary, specifically, an edge (reflection off that edge)
230
+ or a vertex (diffraction about that vertex).
231
+ Going back to the first ray �u1, let us define it, by providing its “ingredients” ξ1, r1, Ω1, and ζ1, cf. (5).
232
+ We set ξ1 = 0, the center of the initial condition, as well as r1 = 0, since no delay is necessary for this first
233
+ term. Then, leveraging symmetry, we set ζ1 ≡ 1, which corresponds to the (physical) assumption that the
234
+ propagation of �u1 is purely radial. Finally, we set Ω1 (the light cone around 0) as the set of points that can
235
+ be reached from 0 via a straight line without going outside ∂Ω, i.e.,
236
+ Ω1 = {x ∈ Ω : τx ∈ Ω ∀0 ≤ τ ≤ 1} .
237
+ (7)
238
+ In summary, the first term of �u is
239
+ �u1(x, t) = Ψ(∥x∥ , t)1Ω1(x).
240
+ (8)
241
+ Then we can move to the subsequent terms �un, n ≥ 2.
242
+ Their expressions depend on our choice of
243
+ reflection and diffraction modeling, and will be provided in the upcoming sections. Instead, in the rest of
244
+ the present section we focus on understanding how large N should be, in order for �u to provide a faithful
245
+ approximation of u. Equivalently, we want to count the number of times the wave gets reflected or diffracted
246
+ at the boundary ∂Ω. This is done incrementally, starting from the initial value N = 1 (no boundary effects)
247
+ and then updating this guess as more and more boundary effects get “discovered”.
248
+ To help us in this endeavor, we employ what we call a timetable, which, in this work, is simply a list of
249
+ vectors, each with size ne + nv. The timetable is built incrementally starting from an empty list, appending
250
+ one new vector every time a new term is added in the sum (5), starting from �u1. The entries of the n-th
251
+ timetable vector are the waiting times before �un comes in contact with an edge or a vertex of ∂Ω. If it is
252
+ impossible for �un to “cast light” (along a straight path) onto a certain edge or vertex, then the corresponding
253
+ entry in the timetable is set to ∞. After this, it suffices to look for the smallest not-yet-explored entry of the
254
+ timetable to identify what the next term of the approximation �u should be. Once the entry in the timetable
255
+ has been explored, its value is set to ∞.
256
+ We start by describing how the first vector a1 ∈ Rne+nv of the timetable (corresponding to �u1) is
257
+ computed, and how a1 allows us to identify the (geometric) features of �u2. The vector a1 can be partitioned
258
+ into edges-related part (the first ne entries) and vertices-related part (the last nv entries).
259
+ • Edge times. Given a generic edge γj ⊂ ∂Ω (j = 1, . . . , ne) belonging to the domain boundary, we
260
+ define the corresponding entry of a1 as
261
+ (a1)j =
262
+
263
+ r1 + inf
264
+
265
+ ∥x − ξ1∥ : x ∈ γj ∩ Ω1
266
+
267
+ if the set is non-empty,
268
+
269
+ otherwise.
270
+ (9)
271
+ Note that we have taken the shortest path from ��1 to γj, and that we have denoted the closure of the
272
+ light cone Ω1 as Ω1.
273
+ • Vertex times. Given a generic vertex yj ⊂ ∂Ω (j = 1, . . . , nv) of the domain boundary, we set
274
+ (a1)ne+j =
275
+
276
+ r1 + ∥yj − ξ1∥
277
+ if yj ∈ Ω1,
278
+
279
+ otherwise.
280
+ (10)
281
+ 4
282
+
283
+ D. Pradovera, M. Nonino, and I. Perugia
284
+ Geometry-based approximation of waves in complex domains
285
+ Note that we have included the delay r1 (which is actually zero here) as a way to streamline Eqs. (9) and (10)
286
+ for the upcoming section. See Fig. 1 for a diagram showcasing these formulas.
287
+ (a1)1
288
+ (a1)2
289
+ (a1)5
290
+ (a1)17
291
+ Ω1
292
+ Ω \ Ω1
293
+ γ1
294
+ γ2
295
+ γ3
296
+ γ4
297
+ γ5
298
+ y3
299
+ y4
300
+ y6
301
+ ξ1
302
+ (a1)3 = ∞
303
+ (a1)4 = ∞
304
+ (a1)14 = ∞
305
+ (a1)15 = ∞
306
+ ...
307
+ Figure 1: Computation of some timetable entries. The boundary ∂Ω has 11 sides, so that, e.g., (a1)14 is
308
+ related to y3 and (a1)17 is related to y6. The shadowed area Ω \ Ω1 is in darker grey.
309
+ The smallest entry of a1 is the time at which the first “boundary event” (reflection or diffraction) can
310
+ happen1. The index of the smallest entry tells us whether the event is a reflection (index 1 ≤ j ≤ ne) or a
311
+ diffraction (index ne + 1 ≤ j ≤ ne + nv), and also what edge/vertex causes the event. From here, we use the
312
+ models described in Sections 3 and 4 to build �u2, by computing ξ2, r2, Ω2, and ζ2.
313
+ Then, the second timetable vector a2 can be computed by replacing all subscripts “1” by “2” in Eqs. (9)
314
+ and (10). This is followed by the construction of �u3, and so on. The process continues until all not-yet-
315
+ explored entries of the timetable are larger than T +R. Indeed, starting from this time instant, the would-be
316
+ next terms of �u do not affect the approximation anymore, since, due to the finite speed of wave propagation,
317
+ they only act (on Ω) after the end of the time horizon, i.e., for t > T. The total number of rays N is simply
318
+ the number of vectors in the timetable.
319
+ We summarize the overall procedure for the construction of the rays �un in Algorithm 1. For ease of
320
+ presentation, once an entry of the timetable has been explored, it is set to ∞ as a way for the algorithm to
321
+ ignore it from that point forward.
322
+ Algorithm 1 Step-by-step construction of the surrogate model
323
+ Set N ← 1, find Ω1 as in (7), and define �u1 as in (8)
324
+ Define a1 ∈ Rne+nv using Eqs. (9) and (10)
325
+ Set i ← 1 and j ← arg minj=1,...,ne+nv (a1)j
326
+ while (ai)j ≤ T + R do
327
+ Set (ai)j ← ∞ and N ← N + 1
328
+ if j ≤ ne then
329
+ Find ξN, rN, ΩN, and ζN as in Section 3
330
+ ← Reflection from edge j
331
+ else
332
+ Find vertex index j′ ← j − ne
333
+ Find ξN, rN, ΩN, and ζN as in Section 4
334
+ ← Diffraction from vertex j′
335
+ end if
336
+ Define �uN from ξN, rN, ΩN, and ζN, as in (5)
337
+ Define aN ∈ Rne+nv using Eqs. (9) and (10), with “N” replacing “1” in subscripts
338
+ Set (i, j) ← arg mini=1,...,N,j=1,...,ne+nv (ai)j
339
+ end while
340
+ 1We say “can happen” since not all vertices can cause diffraction, when hit from a certain point source.
341
+ This issue is
342
+ discussed in Section 4, cf. Assumption 4.3.
343
+ 5
344
+
345
+ D. Pradovera, M. Nonino, and I. Perugia
346
+ Geometry-based approximation of waves in complex domains
347
+ γ
348
+ ξi
349
+ ξn
350
+ y(x)
351
+ x
352
+ θr
353
+ θi
354
+ φi(y(x))
355
+ φn(x)
356
+ βγ
357
+ ξn
358
+ ξi
359
+ y(x)
360
+ x
361
+ Figure 2: Graphical representation of a reflection off edge γ. On the left, the law of reflection prescribes
362
+ θr = θi. We show the straight line �γ supporting γ with a dotted stroke. For a given observation point x,
363
+ y(x) denotes the point of incidence of the reflected ray. On the right, computation of the light cone Ωn
364
+ (light-grey area) and its complementary shadow zone Ω \ Ωn (dark-grey area) for the reflected ray, in the
365
+ presence of a rectangular obstacle. The dashed portion of edge γ denotes the shadow γ \ γ(i). The shadow
366
+ zone consists of two connected components.
367
+ Remark 2.2. In trapping domains, see, e.g., Section 5.2, the number of terms N might be rather large
368
+ due to waves repeatedly “bouncing back and forth” between two or more edges/vertices. A large N, although
369
+ necessary for a good approximation of all wavefronts, is undesirable since it increases the computational cost
370
+ of both the construction of the surrogate �u and its evaluation.
371
+ As a compromise, one could remove all terms �un that are smaller than a certain tolerance tol, uniformly
372
+ over x and t. This can be done as a post-processing step (thus speeding up the evaluation of �u but not
373
+ its construction) or while building the surrogate itself. This can be achieved with a simple modification of
374
+ Algorithm 1, by introducing a test on the magnitude of each soon-to-be-added wave contribution �un, discarding
375
+ terms that are too small.
376
+ 3
377
+ Modeling reflection
378
+ We now present the strategy for modeling reflection due to an edge γ of the domain boundary ∂Ω. We
379
+ rely on the well-known geometrical optics model, which describes wave propagation in terms of rays, not
380
+ accounting for any diffraction [23]. We assume that we are adding a new ray �un to the surrogate model (5),
381
+ due to a reflection phenomenon caused by ray �ui. Specifically, we assume that a ray coming from source
382
+ point ξi hits the edge γ ⊂ ∂Ω, i.e., that γ ∩ Ωi ̸= ∅. We need to prescribe several ingredients.
383
+ Spatial correction rn.
384
+ We just transfer rn over from the incoming wave: rn = ri. Indeed, as we will see
385
+ in Section 4, we require the term rn only when modeling diffraction.
386
+ Source point ξn.
387
+ We use the method of images, which gives the position of ξn as the reflection of ξi with
388
+ respect to the edge γ:
389
+ ξn = 2 arg min
390
+ z∈�γ
391
+ ∥z − ξi∥ − ξi,
392
+ (11)
393
+ where �γ ⊂ R2 is the straight line on which edge γ lies. See Fig. 2 (left).
394
+ Weight function ζn.
395
+ Let x − ξn be a generic point where we wish to evaluate the weight function ζn.
396
+ We define the incidence point y(x) as the intersection (if any) between edge γ and the segment from ξn to
397
+ x. See Fig. 2 (left). According to the method of images, the amplitude of the reflected wave is equal (up to
398
+ sign) to the amplitude of the incoming wave:
399
+ ζn(x − ξn) = (2σγ − 1)ζi(y(x) − ξi).
400
+ (12)
401
+ 6
402
+
403
+ D. Pradovera, M. Nonino, and I. Perugia
404
+ Geometry-based approximation of waves in complex domains
405
+ +
406
+ =
407
+ Figure 3: Example of reflection off an edge in the presence of an obstacle, from Fig. 2. Neumann conditions
408
+ are imposed on all edges. Source wave (left), reflected wave (middle), and superimposition of the two (right).
409
+ Note how the obstacle creates a shadow zone for source and reflected waves. For simplicity, in this plot we
410
+ are not showing any reflection or diffraction effects due to the rectangular obstacle, since they would be
411
+ modeled at different stages of the algorithm.
412
+ In the equation above, the quantity σγ is related to the kind of boundary conditions that are imposed on γ:
413
+ if γ is an edge with Neumann boundary conditions, we set σγ = 1 (ζn and ζi have the same sign), whereas
414
+ we set σγ = 0 if we have Dirichlet boundary conditions on γ (ζn and ζi have opposite signs).
415
+ Now, recall that we are assuming all weight functions to be positive-homogeneous: ζi(x − ξi) = ζi(τ(x −
416
+ ξi)), for all τ > 0. Accordingly, as we are in 2D, ζi(x − ξi) is only a function of the direction (with sign)
417
+ υi(x) = (x − ξi)/ ∥x − ξi∥, or, equivalently, of the angle φi(x) between υi(x) and the positive x1-axis. See
418
+ Fig. 2 (left) for a graphical depiction. Specifically, with an abuse of notation, let ζi(x − ξi) = ζi(φi(x)) and
419
+ ζn(x − ξn) = ζn(φn(x)), where the “new” angle-dependent functions ζi and ζn are 2π-periodic. By (12), we
420
+ deduce the property
421
+ ζn(φn(x)) = (2σγ − 1)ζi(φi(y(x))) = (2σγ − 1)ζi(2βγ − φn(y(x))) = (2σγ − 1)ζi(2βγ − φn(x)),
422
+ (13)
423
+ where βγ is the angle between edge γ and the positive x1-axis. This uniquely identifies ζn given ζi and βγ.
424
+ Light cone Ωn.
425
+ We first identify what portion of γ is actually “lit” by �ui: γ(i) = γ ∩ Ωi. Note that we
426
+ may have γ ̸= γ(i), for instance when obstacles are present between ξi and γ. See Fig. 2 (right) for an
427
+ illustration. Then, roughly speaking, we define the new light cone Ωn as the union of all rays from ξn that
428
+ pass through γ(i). To be more precise, given x ∈ Ω, let y(x) be the intersection (if any) between γ and the
429
+ line segment from ξn to x. Also, if y(x) exists, we define τ0(x) = ∥y(x) − ξn∥ / ∥x − ξn∥ ∈ (0, 1), which
430
+ satisfies y(x) = ξn + τ0(x)(x − ξn). The new light cone is defined as
431
+ Ωn =
432
+
433
+ x ∈ Ω : y(x) ∈ γ(i) and ξn + τ(x − ξn) ∈ Ω ∀τ0(x) < τ ≤ 1
434
+
435
+ .
436
+ (14)
437
+ Figure 3 represents a possible output of the numerical algorithm. In this case, we simulate only the
438
+ reflections, thus discarding, for the time being, any effect due to diffraction. It is clear that, by modeling
439
+ reflection effects only, we may obtain a discontinuous approximation of the solution of our target problem,
440
+ where the discontinuity happens exactly at the shadow boundaries (the boundaries of light cones). As we
441
+ will see in the next section, introducing diffraction in our approximation will allow us to obtain a continuous
442
+ approximation �u.
443
+ 4
444
+ Modeling diffraction
445
+ Here, we describe a strategy for modeling waves diffracted by a vertex of the domain boundary ∂Ω. This is
446
+ required in building a new ray �un whenever the smallest unexplored entry of the timetable is related to a
447
+ vertex, i.e., j > ne in Algorithm 1, cf. Section 2. We need to identify several ingredients.
448
+ Source point ξn.
449
+ We employ the (standard, see, e.g., [23]) assumption that diffraction emerges as a wave
450
+ outgoing from a point source located at the diffraction point yj′ = yj−ne (we are employing the notation of
451
+ Algorithm 1). This motivates the choice of the center ξn = yj′.
452
+ 7
453
+
454
+ D. Pradovera, M. Nonino, and I. Perugia
455
+ Geometry-based approximation of waves in complex domains
456
+ ∂Ω
457
+ γ′
458
+ γ
459
+ ξ
460
+ α
461
+ φ
462
+ π − θ
463
+ θ
464
+ 3π − 2α − θ
465
+ ∂Ω
466
+ γ′
467
+ γ
468
+ ξ
469
+ α
470
+ θ − π
471
+ 3π − 2α − θ
472
+ θ
473
+ Figure 4: Diagrams for the two cases of scattering for concave corners (0 < α < π): without (left plot) and
474
+ with shadow zone (right plot). The dashed lines are reflection boundaries. The dash-dotted line is a shadow
475
+ boundary. Shadow regions are absent if and only if π − α ≤ θ ≤ π. The angular coordinate 0 < φ < 2π − α
476
+ is measured starting from one of the two adjacent edges of ∂Ω.
477
+ ∂Ω
478
+ γ′
479
+ γ
480
+ ξ
481
+ α
482
+ φ
483
+ π + θ − α
484
+ θ
485
+ Figure 5: Diagrams for the scattering at convex corners (π < α < 2π). The source point ξ is virtual, being
486
+ used to model reflection off of edge γ. The dash-dotted line is the shadow boundary due to edge γ′. The
487
+ shadow region is present if and only if α − π < θ < π. The angular coordinate 0 < φ < 2π − α is measured
488
+ starting from one of the two adjacent edges of ∂Ω.
489
+ Light cone Ωn.
490
+ Since the diffracted wave propagates in all geometrically allowed directions, we define the
491
+ support Ωn as the set of all points that are visible (along straight-line paths) from ξn, i.e.,
492
+ Ωn = {x ∈ Ω : ξn + τ(x − ξn) ∈ Ω ∀0 < τ ≤ 1} .
493
+ (15)
494
+ Modeling diffraction is substantially more complicated than modeling reflection. For this reason, before
495
+ we can describe how the remaining unknown quantities rn and ζn are defined, cf. (5), we need to introduce
496
+ several assumptions.
497
+ Assumption 4.1 (Separability). Diffracted waves are separable into radial-temporal and angular compo-
498
+ nents around the diffraction point ξn.
499
+ Otherwise stated, �un(x, t) can be expressed (at least locally) as
500
+ ψn(∥x − ξn∥ , t)ζn(x − ξn), where ζn is positive-homogeneous, i.e., ζn(z) is independent of ∥z∥ (as long
501
+ as z ̸= 0). Using an abuse of notation, we will express ζn as a function of φ only, with φ defined as the
502
+ angular coordinate around ξn. See Figs. 4 and 5.
503
+ This, together with the following assumption on the angular component ζn, will allow us to recover the
504
+ approximation structure presented in Section 2.
505
+ Assumption 4.2 (Piecewise-linear angular component). The angular component ζn is a piecewise-linear
506
+ function of the angular coordinate φ, with discontinuities at all reflection and shadow boundaries. Using the
507
+ geometrical optics approximation, we can explicitly compute the locations of such discontinuities:
508
+ • at concave corners (see, e.g., Fig. 4), φ1 = |π − θ| = max{π−θ, θ−π} and φ2 = 2π−α−|π − α − θ| =
509
+ min {θ + π, 3π − 2α − θ};
510
+ • at convex corners (see, e.g., Fig. 5), φ3 = π + θ − α.
511
+ Now we are ready to describe our full diffraction model, which satisfies Assumptions 4.1 and 4.2, as well
512
+ as the following three standard requirements.
513
+ 8
514
+
515
+ D. Pradovera, M. Nonino, and I. Perugia
516
+ Geometry-based approximation of waves in complex domains
517
+ Assumption 4.3 (Characterization of diffracting vertices). A vertex ξn emits a diffraction wave in “re-
518
+ sponse” to �ui only if both following conditions are met:
519
+ • ξn is visible from ξi, i.e., ξn ∈ Ωi;
520
+ • one of the following is true:
521
+ – the domain Ω is locally concave near ξn, with ξi being located on the “concave side” of ξn, i.e.,
522
+ 0 < α < π and 0 ≤ θ ≤ 2π − α in Fig. 4;
523
+ or
524
+ – the domain Ω is locally convex near ξn and a “shadow zone” is present, i.e., π < α < 2π and
525
+ π − α < θ < π in Fig. 5.
526
+ Assumption 4.4 (Continuity of the full approximation). The full wave approximation �u is continuous, in
527
+ particular across reflection and shadow boundaries.
528
+ Assumption 4.5 (Conservation of mass). Diffracted waves have zero “net mass”, i.e.,
529
+
530
+ R2 �un(x, t)dx = 0,
531
+ leading to mass conservation of the full wave approximation �u. (Note that we are stating mass conservation
532
+ in free space to ignore further reflections and diffractions of �un, which are also assumed to conserve mass.)
533
+ Spatial correction rn.
534
+ As in Algorithm 1, let i be the index of the term �ui that causes the diffraction
535
+ �un. With the objective of satisfying (5) and Assumption 4.4, we define the radial component ψn as
536
+ ψn(∥x − ξn∥ , t) = Ψ(∥x − ξn∥ + ∥ξn − ξi∥ + ri
537
+
538
+ ��
539
+
540
+ =:rn
541
+ , t).
542
+ (16)
543
+ By direct inspection of this definition, we can see that, by our choice of rn, we are “aligning” the wavefronts
544
+ of the diffracted waves with the wavefronts of the reflected wave at the reflection boundaries (the shadow
545
+ boundary of the reflected waves, if any) and with the wavefronts of the incoming wave �ui at its shadow
546
+ boundary (if any). For instance, it is easy to see that, using (16), a point close to the diffraction point
547
+ (x ≈ ξn) is within the support of the diffracted wave �un only for t ≥ rn − R, i.e., only when the wave �ui has
548
+ crossed the distance from ξi to ξn.
549
+ Weight function ζn.
550
+ According to Assumption 4.2, we define the discontinuous piecewise-linear function
551
+ ζn : [0, 2π − α] → R as
552
+ ζn(φ) =
553
+
554
+
555
+
556
+
557
+
558
+ z1(φ1−φ)+z2φ
559
+ φ1
560
+ for 0 < φ < φ1 := |π − θ| ,
561
+ z3(φ2−φ)+z4(φ−φ1)
562
+ φ2−φ1
563
+ for φ1 < φ < φ2 := 2π − α − |π − α − θ| ,
564
+ z5(2π−α−φ)+z6(φ−φ2)
565
+ 2π−α−φ2
566
+ for φ2 < φ < 2π − α,
567
+ (17)
568
+ for concave corners, and
569
+ ζn(φ) =
570
+ � z1(φ3−φ)+z7φ
571
+ φ3
572
+ for 0 < φ < φ3 := π + θ − α,
573
+ z8(2π−α−φ)+z6(φ−φ3)
574
+ 2π−α−φ3
575
+ for φ3 < φ < 2π − α,
576
+ (18)
577
+ for convex corners. The scalars z1, . . . , z8 are nodal values of ζn: ζn(0) = z1, ζn(φ+
578
+ 1 ) = z3 for concave corners,
579
+ ζn(φ−
580
+ 3 ) = z7 for convex corners, etc. These values are chosen so as to satisfy:
581
+ • The boundary conditions at the edges ending at ξn, i.e., γ and γ′.
582
+ • Assumption 4.4 at the discontinuity angles φ1, φ2, and φ3. To this aim, we prescribe values for the
583
+ jumps (z3 − z2), (z5 − z4), and (z8 − z7).
584
+ • Assumption 4.5. Given the radial-angular decomposition of �un from Assumption 4.1, this is equivalent
585
+ to the condition
586
+ � 2π−α
587
+ 0
588
+ ζn(φ)dφ = 0.
589
+ 9
590
+
591
+ D. Pradovera, M. Nonino, and I. Perugia
592
+ Geometry-based approximation of waves in complex domains
593
+ +
594
+ =
595
+ +
596
+ =
597
+ Figure 6: Examples of diffraction at the concave (top) and convex (bottom) corners from Fig. 4 (right) and
598
+ Fig. 5. Neumann conditions are imposed on all edges. In each row of plots, we have: discontinuous wave
599
+ without diffraction (left), diffraction wave (middle), and continuous wave with diffraction (right). Note that,
600
+ in the convex case, we are not showing the wave �ui that causes the reflection off edge γ nor the reflection
601
+ and scattering of �ui off edge γ′.
602
+ In the case of a convex corner, this set of condition uniquely identifies the four degrees of freedom. See
603
+ Section 4.1 for the formulas and for their derivation.
604
+ However, in the case concave case, an additional
605
+ condition is required. In this work, we set this last condition as described in Section 4.2. We show in Fig. 6
606
+ the results obtained with our diffraction modeling in two simple illustrative cases.
607
+ Before proceeding further, we deem it important to make the following remark.
608
+ Remark 4.6. Our proposed strategy is able to deliver only a fairly crude approximation of diffraction effects.
609
+ (We refer to Section 5.1 for a validation of our model.) However, it has the great advantage of being extremely
610
+ simple to build and to evaluate. Thanks to the modularity of our approach, it would be surely possible to
611
+ replace our diffraction model with more sophisticated ones (e.g., removing Assumptions 4.1 and 4.2), in the
612
+ interest of achieving a better approximation of the exact solution. To this aim, we mention that a wide body
613
+ of works has been dedicated to the modeling of diffraction in the time-harmonic (Helmholtz) setting: among
614
+ others, we name the geometrical [20] and uniform [23] theories of diffraction. However, the authors have
615
+ not been able to find any satisfactory all-purpose time-domain diffraction modeling in the literature.
616
+ 4.1
617
+ Convex diffraction coefficients
618
+ Consider the situation depicted in Fig. 5 and the notation introduced therein. Also, we rely on the quantities
619
+ ξn, rn, Ωn, and i introduced in Section 4. For diffraction to happen, cf. Assumption 4.3, �ui must be a wave
620
+ reflected off either edge γ or γ′. Indeed, a convex vertex ξn cannot be “hit” from outside the domain Ω by
621
+ the source wave �u1, nor by any wave reflected off a different edge, nor by any diffracted wave centered at
622
+ some vertex of ∂Ω.
623
+ For this reason, the shadow boundary {φ = φ3} must belong to ∂Ωi (the boundary of the light cone Ωi),
624
+ at least locally around ξn. Without loss of generality, we assume that �ui is a wave reflected off edge γ, so
625
+ that Ωi consists (locally) of point whose angular coordinate is 0 < φ < φ3. This means that φ3 < φ < 2π −α
626
+ is a shadow zone. The alternative case (of reflection off edge γ′) can be obtained by symmetry.
627
+ Let σγ = 0 if γ is a Dirichlet edge and σγ = 1 if it is a Neumann edge. Define σγ′ similarly for edge γ′.
628
+ To satisfy the conditions described in Section 4, the quantities z1, z7, z8, z6 appearing in the angular weight
629
+ ζn, cf. (18), must satisfy the conditions:
630
+ • Boundary condition at γ: z1 = σγz7.
631
+ • Boundary condition at γ′: z6 = σγ′z8.
632
+ • For �u to be continuous at φ = φ3, there must be a jump to account for the fact that �ui is nonzero for
633
+ φ → φ−
634
+ 3 but zero for φ → φ+
635
+ 3 : given the angular component of �ui at the shadow boundary, namely,
636
+ 10
637
+
638
+ D. Pradovera, M. Nonino, and I. Perugia
639
+ Geometry-based approximation of waves in complex domains
640
+ hi := ζi(ξn − ξi), we impose z8 − z7 = hi.
641
+ • Conservation of mass: for all t > 0,
642
+ 0 =
643
+
644
+ R2 �un(x, t)dx =
645
+ � ∞
646
+ 0
647
+ � 2π−α
648
+ 0
649
+ ψn(ρ, t)ζn(φ)ρdφdρ
650
+ =
651
+ �� 2π−α
652
+ 0
653
+ ζn(φ)dφ
654
+ � �� ∞
655
+ 0
656
+ ψn(ρ, t)ρdρ
657
+
658
+ =
659
+ �z1 + z7
660
+ 2
661
+ φ3 + z8 + z6
662
+ 2
663
+ (2π − α − φ3)
664
+ � �� ∞
665
+ 0
666
+ ψn(ρ, t)ρdρ
667
+
668
+ ,
669
+ which leads to the condition z1+z7
670
+ 2
671
+ φ3 + z8+z6
672
+ 2
673
+ (2π − α − φ3) = 0.
674
+ With simple algebra, we now obtain
675
+ z7 =
676
+ (σγ′ + 1)hi(φ3 + α − 2π)
677
+ (σγ′ + 1)(2π − α) + (σγ − σγ′)φ3
678
+ ,
679
+ z8 =
680
+ (σγ + 1)hiφ3
681
+ (σγ′ + 1)(2π − α) + (σγ − σγ′)φ3
682
+ ,
683
+ (19)
684
+ as well as z1 = σγz7 and z6 = σγ′z8. See Fig. 6 (bottom) for an example of the resulting diffraction wave.
685
+ 4.2
686
+ Concave diffraction coefficients
687
+ Consider the setup depicted in Fig. 4 and the notation introduced therein. Also, we rely on the quantities
688
+ ξn, rn, Ωn, and i introduced in Section 4. Let σγ = 0 if γ is a Dirichlet edge and σγ = 1 if it is a Neumann
689
+ edge. Define σγ′ similarly for edge γ′. Without loss of generality, we assume that 0 < θ ≤ π − α
690
+ 2 , since the
691
+ other case can be easily obtained by symmetry. In this setting, γ is in the light cone of �ui (at least locally
692
+ around ξn). Accordingly, let �ui′ be the wave component obtained by reflection of �ui off edge γ.
693
+ If 0 < θ ≤ π − α, γ′ is not in the light cone of �ui, so that:
694
+ • for 0 < φ < φ1 = π − θ, both �ui and �ui′ are present;
695
+ • for φ1 < φ < φ2 = π + θ, only �ui is present, since the light cone Ωi′ ends at {φ = φ1};
696
+ • for φ2 < φ < 2π − α, neither �ui nor �ui′ is present, i.e., we have a shadow zone, since the light cone Ωi
697
+ ends at {φ = φ2}.
698
+ Otherwise, assume that π − α < θ ≤ π − α
699
+ 2 . In this case, γ′ is also in the light cone of �ui (at least locally
700
+ around ξn). We denote the wave component obtained by reflection of �ui off edge γ′ by �ui′′. Then:
701
+ • for 0 < φ < φ1 = π − θ, both �ui and �ui′ are present;
702
+ • for φ1 < φ < φ2 = 3π − 2α − θ, only �ui is present, since the light cones Ωi′ and Ωi′′ end at {φ = φ1}
703
+ and at {φ = φ2}, respectively;
704
+ • for φ2 < φ < 2π − α, both �ui and �ui′′ are present.
705
+ To satisfy the conditions described in Section 4, the quantities z1, . . . , z6 appearing in the angular weight
706
+ ζn, cf. (17), must satisfy the conditions:
707
+ • Boundary condition at γ: z1 = σγz2.
708
+ • Boundary condition at γ′: z6 = σγ′z5.
709
+ • For �u to be continuous at φ = φ1, there must be a jump whose height is the angular component of �ui′
710
+ at φ = φ1, i.e., hi′ := ζi′(ξn −ξi′); we impose z3 −z2 = hi′. Note that, by the law of reflection, cf. (11),
711
+ hi′ = τhi, with τ = 2σγ − 1 and hi := ζi(ξn − ξi).
712
+ • For �u to be continuous at φ = φ2, there must be a jump whose height depends on whether θ ≤ π − α
713
+ or not:
714
+ 11
715
+
716
+ D. Pradovera, M. Nonino, and I. Perugia
717
+ Geometry-based approximation of waves in complex domains
718
+ – If 0 < θ ≤ π − α, the jump equals the angular component of �ui at φ = φ2, i.e., hi := ζi(ξn − ξi);
719
+ we impose z5 − z4 = hi.
720
+ – If π − α < θ ≤ π − α
721
+ 2 , the jump equals minus the angular component of �ui′′ at φ = φ2, i.e.,
722
+ hi′′ := ζi′′(ξn − ξi′′); we impose z5 − z4 = −hi′′. Note that, by the law of reflection, cf. (11),
723
+ hi′′ = (2σγ′ − 1)hi, with hi := ζi(ξn − ξi).
724
+ In summary, z5 − z4 = τ ′hi, with τ ′ = 1 if 0 < θ ≤ π − α and τ ′ = 1 − 2σγ′ if π − α < θ ≤ π − α
725
+ 2 .
726
+ • Conservation of mass: for all t > 0,
727
+ 0 =
728
+
729
+ R2 �un(x, t)dx =
730
+ � ∞
731
+ 0
732
+ � 2π−α
733
+ 0
734
+ ψn(ρ, t)ζn(φ)ρdφdρ
735
+ =
736
+ �� 2π−α
737
+ 0
738
+ ζn(φ)dφ
739
+ � �� ∞
740
+ 0
741
+ ψn(ρ, t)ρdρ
742
+
743
+
744
+ ��
745
+
746
+ =:C(t)
747
+ =
748
+ �z1 + z2
749
+ 2
750
+ φ1 + z3 + z4
751
+ 2
752
+ (φ2 − φ1) + z5 + z6
753
+ 2
754
+ (2π − α − φ2)
755
+
756
+ C(t),
757
+ which leads to the condition z1+z2
758
+ 2
759
+ φ1 + z3+z4
760
+ 2
761
+ (φ2 − φ1) + z5+z6
762
+ 2
763
+ (2π − α − φ2) = 0.
764
+ One constraint is missing for the values z1, . . . , z6 to be uniquely determined. Specifically, some simple
765
+ algebra shows that, for any δ ∈ R, the following set of values satisfies all the above conditions:
766
+ z2 =
767
+ τhi + δ
768
+ (σγφ1 + φ2)/(φ1 − φ2),
769
+ z5 =
770
+ τ ′hi + δ
771
+ (φ1 + σγ′φ2 − (σγ′ + 1)(2π − α))/(φ1 − φ2),
772
+ (20)
773
+ together with z1 = σγz2, z3 = z2 + τhi, z4 = z5 − τ ′hi, and z6 = σγ′z5. Note that the jump heights τhi and
774
+ τ ′hi appear in the numerators of z2 and z5, respectively.
775
+ Our diffraction model is simply the one given by δ = 0. Intuitively, this corresponds to a “balanced”
776
+ partitioning of the mass of the diffracted wave into the components related to the two (reflection and/or
777
+ shadow) boundaries φ1 and φ2. See Fig. 6 (top) for an example of the resulting diffraction wave.
778
+ To further highlight the (mostly beneficial) effects of the choice δ = 0, we note that:
779
+ • in the symmetric case θ = π − α
780
+ 2 , δ = 0 leads to a symmetric ζn: (1 − 2σγ′)z2 = (1 − 2σγ)z5;
781
+ • in the case θ = π − α, the second transition happens at γ′, i.e., φ2 = 2π − α, and the choice δ = 0
782
+ yields z4 = 0, so that the diffraction wave vanishes at γ′ (which is physically sound);
783
+ • in the “grazing incidence” case θ = 0, the two transition coalesce into one, i.e., φ1 = φ2, and the choice
784
+ δ = 0 leads to ζn(φ) = 0 for all φ, which is unphysical; see the following remark for a possible solution.
785
+ Remark 4.7. In the “grazing incidence” case θ = 0 (which corresponds to φ1 = φ2 = π), the diffraction
786
+ wave �un does not cure the discontinuity of �u at the boundary {φ = π}. This is because, in some sense, the
787
+ two discontinuities of �un at φ1 and φ2 cancel each other out. For a similar reason, a small θ ≈ 0 will result
788
+ in a continuous total wave, but a sharp gradient will be present for φ1 < φ < φ2.
789
+ By tweaking the value of δ, we can obtain an alternative diffraction model, which guarantees Assump-
790
+ tion 4.4 even in the case of grazing incidence. To this aim, we can set
791
+ δ =
792
+
793
+ (σγ + 1) σγφ1 + φ2 − (σγ′ + 1)(2π − α)
794
+ (σγ − σγ′)φ1 + (σγ′ + 1)(2π − α)φ1τ+
795
+ +(σγ′ + 1)
796
+ φ1 + σγφ2
797
+ (σγ − σγ′)φ2 + (σγ′ + 1)(2π − α)(φ2 − 2π + α)τ ′
798
+
799
+ hi
800
+ φ1 − φ2
801
+ .
802
+ (21)
803
+ Roughly speaking, this corresponds to a different “balancing” of the mass of the diffracted wave into the
804
+ components related to the two boundaries φ1 and φ2.
805
+ This being said, in our numerical tests, such alternative model, albeit recovering a continuous total wave,
806
+ resulted in a reduced accuracy of approximation. Specifically, using the value of δ above, we have observed
807
+ an exaggerated magnitude of the diffraction wave, especially in the shadow zone.
808
+ 12
809
+
810
+ D. Pradovera, M. Nonino, and I. Perugia
811
+ Geometry-based approximation of waves in complex domains
812
+ Example
813
+ exterior
814
+ incidence
815
+ ∥�u(·, T)∥L2(Ω)
816
+ ∥�u(·, T) − uFEM(·, T)∥L2(Ω)
817
+ index
818
+ angle α
819
+ angle ω
820
+ #1
821
+ 4.712
822
+ 0.984
823
+ 2.50 · 10−1
824
+ 3.65 · 10−4
825
+ #2
826
+ 5.093
827
+ 0.603
828
+ 2.02 · 10−3
829
+ #3
830
+ 2.761
831
+ 1.363
832
+ 1.05 · 10−2
833
+ #4
834
+ 2.761
835
+ 3.277
836
+ 2.00 · 10−2
837
+ Table 1: Setup for the four wedge examples. The angle ω is as in Fig. 7.
838
+ ω
839
+ ω
840
+ ω
841
+ ω
842
+ −1
843
+ 0
844
+ 1
845
+ Figure 7: Initial conditions for the wedge examples, indexed #1 through #4 from left to right. The (dashed)
846
+ distance between the center of the Gaussian and the boundary vertex is 4 units in all cases.
847
+ 5
848
+ Numerical results
849
+ In our experiments, we require a “reference” solution of (1) to validate our results. To this effect, we use the
850
+ solution uFEM obtained by discretizing (1) with:
851
+ • the P1-finite element method (P1-FEM) with mass-lumping, over a regular triangulation (mesh) of the
852
+ physical domain Ω;
853
+ • explicit leapfrog timestepping with a uniform time step that satisfies the CFL condition on the chosen
854
+ mesh.
855
+ See [11, 16] for more details on this discretization strategy.
856
+ If the domain Ω is unbounded, we first need to truncate it in such a way that reflections from the non-
857
+ physical truncation boundary do not affect the solution in the region of interest for t < T. Recalling that
858
+ the problem data are supported in a ball of radius R and center 0, this can be done, e.g., by truncating Ω
859
+ at the sphere with radius R + T and center 0. In our tests, we rely on FEniCS [1] to carry out the P1-FEM
860
+ discretization on 2-dimensional domains Ω.
861
+ Instead, note that with our proposed approach, modeling unbounded domains is straightforward. Indeed,
862
+ we can simply ignore any reflection or diffraction from its “infinitely far” vertices/edges.
863
+ All our tests are performed in Python 3.8 on a machine with an 8-core 3.60 GHz Intel® processor
864
+ and 64 GB of RAM. For reproducibility, our code is made available at https://github.com/pradovera/
865
+ ray-wave-2d.
866
+ 5.1
867
+ Some simple wedges
868
+ As a way to assess our proposed method in simple settings, we consider four different “wedge” domains.
869
+ Similarly to the diagrams in Figs. 4 and 5, we define Ω to be one of the portions of the plane R2 delimited by
870
+ straight lines intersecting at a point. Locally around such point, Ω “looks” like either Fig. 4 or Fig. 5, with
871
+ α being the outer angle. The specific choices of wedge angles α are reported in Table 1 for the four cases.
872
+ We set up a problem of the form (1), with u0 an isotropic Gaussian with standard deviation 0.2. The
873
+ center of u0 is at a point located at a 4-unit distance from the wedge vertex, in the direction determined by
874
+ the “incidence angle” ω. See Fig. 7 for a representation of the initial conditions in the four cases. We set
875
+ u1 = f = 0, we enforce Neumann boundary conditions on the whole ∂Ω, and we seek the solution at the
876
+ final time T = 5, i.e., 1 time unit after the wave crest has reached the wedge vertex.
877
+ 13
878
+
879
+ D. Pradovera, M. Nonino, and I. Perugia
880
+ Geometry-based approximation of waves in complex domains
881
+ 0
882
+ 1
883
+ 2
884
+ 3
885
+ 4
886
+ 5
887
+ 0
888
+ 2
889
+ 4
890
+ 6
891
+ t
892
+ ρ
893
+ −1
894
+ −0.5
895
+ 0
896
+ 0.5
897
+ 1
898
+ Figure 8: Free-space solution Ψ. The dashed line denotes the upper bound of the “causality cone” of Ψ, i.e.,
899
+ ρ = t + R, with R = 1.
900
+ �u
901
+ uFEM
902
+ �u − uFEM
903
+ Example #1
904
+ Example #2
905
+ Example #3
906
+ Example #4
907
+ −0.1
908
+ 0
909
+ 0.1
910
+ −2 · 10−4
911
+ 0
912
+ 2 · 10−4
913
+ −0.1
914
+ 0
915
+ 0.1
916
+ −5 · 10−3
917
+ 0
918
+ 5 · 10−3
919
+ −0.1
920
+ 0
921
+ 0.1
922
+ −1 · 10−2
923
+ 0
924
+ 1 · 10−2
925
+ −0.1
926
+ 0
927
+ 0.1
928
+ −5 · 10−2
929
+ 0
930
+ 5 · 10−2
931
+ Figure 9: Results for the four wedge examples. Each row pertains to a different example. In each row, from
932
+ left to right: surrogate solution, FE solution, and error. The color scales for the first two columns are the
933
+ same. All results are shown at the final time t = T.
934
+ 14
935
+
936
+ AD. Pradovera, M. Nonino, and I. Perugia
937
+ Geometry-based approximation of waves in complex domains
938
+ To this aim, we employ our proposed approach, see Section 2. First, we compute an approximation of
939
+ the free-space solution Ψ, which solves (4), by employing P1-FEM with explicit leapfrog timestepping. Note
940
+ that, since (4) is cast in polar coordinates, we only need to discretize a 1D interval with P1-FEM. Since the
941
+ initial condition u0 is supported within the unit disk, we have R = 1, and it suffices to approximate Ψ(ρ, t)
942
+ for (ρ, t) ∈ [0, T + R] × [0, T]. Since this space-time domain is only 2-dimensional, we can afford even a very
943
+ fine discretization. In our experiments, we employ a 1001 × 2001 uniform Cartesian space-time grid, i.e.,
944
+ the mesh size is δx = T +R
945
+ 1000 and the time step is δt =
946
+ T
947
+ 2000. This satisfies the CFL condition. We show the
948
+ resulting Ψ (which, in fact, we should denote by ΨFEM) in Fig. 8.
949
+ After this preliminary step, we use the timetable-based strategy from Section 2 to identify reflection
950
+ and scattering effects, which are then added up to give the final approximation �u. We show the resulting
951
+ �u(·, T) in Fig. 9. In this figure, we also display a reference solution uFEM(·, T), which we obtain by direct
952
+ discretization of (1) by P1-FEM and leapfrog timestepping, as described at the beginning of Section 5.
953
+ In all four examples, we see that �u and the reference uFEM seem qualitatively close. Notably, we can
954
+ observe a good representation of the most prominent wavefronts, which are due to propagation of either the
955
+ main “free-space” wave or to its reflections. Indeed, those wave contributions are reconstructed exactly: the
956
+ only errors are the ones due to FE approximation and timestepping, which affect both uFEM and �u (the
957
+ latter through the approximation of Ψ). Instead, some differences are present when comparing diffraction
958
+ effects, which arise as circular waves about the wedge vertex. We can quantitatively observe this in the last
959
+ column of both Table 1 and Fig. 9.
960
+ In example #1, we observe a very small error, which, in fact, is simply the (FEM and timestepping)
961
+ discretization error. This is related to the fact that the wedge has exterior angle α =
962
+ 3
963
+ 2π, which makes
964
+ diffraction unnecessary in approximating the wave u: reflections are enough2.
965
+ In the other examples, diffraction effects are necessary to correctly identify u. While a good qualitative
966
+ behavior can be observed in Fig. 9, we can see in Table 1 that a modest error is present. Specifically, we
967
+ report the L2(Ω)-norm of �u and of the error �u − uFEM at the final time t = T, defined as
968
+ ∥v∥L2(Ω) =
969
+ ��
970
+
971
+ v(x)2dx
972
+ �1/2
973
+ .
974
+ (22)
975
+ We see the largest error in example #4, where the relative L2(Ω)-approximation error amounts to 8%.
976
+ This was to be expected, since this last example is rather close to the setting of grazing incidence (α+ω ≈ 2π),
977
+ which, as discussed in Section 4.2, is approximated rather poorly by our diffraction model. Qualitatively,
978
+ the bad approximation quality is apparent in the form of a rather sharp gradient in the corresponding plot
979
+ of �u in Fig. 9 (bottom left).
980
+ 5.1.1
981
+ Building a cavity out of wedges
982
+ As a slightly more complicated example, we now combine the four wedges from the previous section to obtain
983
+ the open cavity represented in Fig. 10. In this case, more reflection and diffraction effects will arise, due
984
+ to the trapping nature of the domain. Our initial conditions and forcing term are the same as before, but
985
+ now all edges are sound-soft. Accordingly, we model them using Dirichlet boundary conditions. The time
986
+ horizon is T = 9.
987
+ Using our strategy from Section 2, we build the approximation �u, which contains 47 wave terms (1 source
988
+ wave, 32 reflected waves, and 14 diffraction waves). We compare the approximation �u with the reference
989
+ solution uFEM, obtained as described at the beginning of Section 5.
990
+ We show the results of the comparison in Fig. 10, at 4 time instants t ∈ {0, 3, 6, 9}. Once more, we see
991
+ a good qualitative agreement between �u and uFEM, with the most important features of u being identified
992
+ well.
993
+ Up to t = 3, only reflections have happened, so that the error �u − uFEM consists only of FEM
994
+ and timestepping errors. On the other hand, for larger times, we see “error waves” of small-to-moderate
995
+ amplitude propagating from the 3 vertices of Ω that generate diffraction effects. These correspond to errors
996
+ in diffraction modeling.
997
+ 2To intuitively understand why, let γ1 and γ2 be the two sides forming ∂Ω. The domain Ω is partitioned exactly into (i)
998
+ the light cone of the reflection off γ1 and then off γ2 and (ii) the light cone of the reflection off γ2 and then off γ1. For this
999
+ reason, the diffraction effects due to these two rays cancel out. Incidentally, the same phenomenon can be expected whenever
1000
+ the interior angle 2π ��� α is of the form π
1001
+ n , with n ∈ {2, 3, . . .}.
1002
+ 15
1003
+
1004
+ D. Pradovera, M. Nonino, and I. Perugia
1005
+ Geometry-based approximation of waves in complex domains
1006
+ �u
1007
+ uFEM
1008
+ �u − uFEM
1009
+ t = 0
1010
+ t = 3
1011
+ t = 6
1012
+ t = 9
1013
+ −1
1014
+ −0.5
1015
+ 0
1016
+ 0.5
1017
+ 1
1018
+ −0.1
1019
+ 0
1020
+ 0.1
1021
+ −5
1022
+ 0
1023
+ 5
1024
+ ·10−4
1025
+ −0.1
1026
+ 0
1027
+ 0.1
1028
+ −5
1029
+ 0
1030
+ 5
1031
+ ·10−2
1032
+ −0.1
1033
+ 0
1034
+ 0.1
1035
+ −5
1036
+ 0
1037
+ 5
1038
+ ·10−2
1039
+ Figure 10: Results for the cavity domain. Each row corresponds to a different time instant t ∈ {0, 3, 6, 9},
1040
+ from top to bottom. In each row, from left to right: surrogate solution �u(·, t), FE solution uFEM(·, t), and
1041
+ error �u(·, t) − uFEM(·, t). The color scales for the first two columns are the same.
1042
+ 16
1043
+
1044
+ D. Pradovera, M. Nonino, and I. Perugia
1045
+ Geometry-based approximation of waves in complex domains
1046
+ 5.2
1047
+ A tall room
1048
+ We consider a simplified sound propagation problem in a room. For simplicity, we consider a 2-dimensional
1049
+ problem, thus assuming an infinitely tall room, and modeling line sources (in the z-direction) as point sources.
1050
+ The complicated domain Ω ⊂ R2 is depicted in Fig. 11. It is composed of two communicating “rooms”
1051
+ with sound-hard walls, as well as of a third large room (above), which is modeled as infinitely large. In the
1052
+ main room, three sound-soft triangular obstacles are also present.
1053
+ Setting once more u1 = f = 0, we are interested in modeling the propagation of an initial condition
1054
+ u0 modeled as a Ricker wavelet centered at 0, see Fig. 11 (top left), over the time horizon t ∈ [0, T], with
1055
+ T = 20. To this aim, we employ our proposed method from Section 2.
1056
+ As in the previous example, we start by computing an approximation of the free-space solution Ψ = Ψ(ρ, t)
1057
+ for (ρ, t) ∈ [0, T + R] × [0, T], see (4), with R being the radius of the support of the initial condition u0.
1058
+ Again, we use P1-FEM with leapfrog timestepping for this.
1059
+ Since many reflective surfaces face each other, the domain Ω is trapping. Accordingly, we expect the
1060
+ number N of waves in the approximation �u to be rather large. In the interest of reducing the number of
1061
+ such terms, we can employ the on-the-fly parsimonious strategy described in Remark 2.2, removing all wave
1062
+ terms �un whose magnitude is smaller than tol = 10−2. After this, N ≈ 1.4 · 103 terms are left. Although
1063
+ this value of N may seem large, the evaluation of the corresponding surrogate �u is rather quick, due to the
1064
+ explicit nature of each wave contribution (and to the fact that their supports are smaller than the whole Ω).
1065
+ We show the resulting u(·, t) for the four times t ∈ {0, 7.5, 15, 20} in Fig. 11. There, we can see why so
1066
+ many terms are necessary for the approximation of u: we must model many reflection and diffraction effects.
1067
+ Since energy escapes the system only through the top “door”, the wave will persist for quite a long time.
1068
+ Accordingly, a larger T will make a larger N necessary.
1069
+ In order to better inspect this effect, we show the trace of the solution at the arbitrarily chosen point
1070
+ xtrace = (−1, −2) in Fig. 12. We notice that oscillations persist for t > 10. We use this last plot also to
1071
+ validate our results. To this aim, we compare three results:
1072
+ • The surrogate �u obtained as described above, with tol = 10−2.
1073
+ • The surrogate �u obtained with our strategy, but with tol = 10−3. This leads to an increased number
1074
+ of rays N ≈ 7.3 · 103.
1075
+ • The reference solution uFEM obtained by the P1-FEM with leapfrog timestepping, as described at the
1076
+ beginning of Section 5. The mesh size must be chosen small enough to resolve both the initial condition
1077
+ and the domain Ω well. In our case, we have a mesh with approximately 1.4 · 106 elements. To satisfy
1078
+ the CFL condition on this mesh, we choose a time step ∆t ≈ 7 · 10−3.
1079
+ We can observe that the two surrogates obtained with our approach give very similar results. Indeed,
1080
+ the cutoff tolerance tol affects the results only for large t > 15, due to the accumulation of “small” waves
1081
+ that are excluded from the coarser surrogate but included in the finer one.
1082
+ Moreover, taking the FE solution as reference, we see that most of the peaks of the surrogates are
1083
+ aligned with the FE ones (i.e., the “phase” of the wave is well approximated), but there are some noticeable
1084
+ discrepancies in their amplitudes. This is due to the fact that, in our approach, reflection is modeled exactly,
1085
+ whereas the magnitudes of the diffraction waves are only roughly approximated. For this reason, we should
1086
+ not expect the amplitude error to get smaller if we reduce tol.
1087
+ The only “real” way of improving the
1088
+ approximation is using a better diffraction modeling.
1089
+ As a final result, we also report:
1090
+ • The so-called “offline” time, i.e., the time required to compute the numerical solution. For �u, this
1091
+ means executing Algorithm 1. For uFEM, this means building the mesh, assembling the FE stiffness
1092
+ and (lumped) mass matrices, and carrying out the timestepping.
1093
+ • The so-called “online” time, i.e., the time required to evaluate the numerical solution (�u or uFEM) at
1094
+ a single (x, t)-point.
1095
+ They can be found in Table 2.
1096
+ 17
1097
+
1098
+ D. Pradovera, M. Nonino, and I. Perugia
1099
+ Geometry-based approximation of waves in complex domains
1100
+ −1
1101
+ 0
1102
+ 1
1103
+ t = 0
1104
+ −0.1
1105
+ 0
1106
+ 0.1
1107
+ t = 7.5
1108
+ −0.1
1109
+ 0
1110
+ 0.1
1111
+ t = 15
1112
+ −0.1
1113
+ 0
1114
+ 0.1
1115
+ t = 20
1116
+ Figure 11: 2-dimensional domain Ω modeling a room. Top left plot: initial condition �u(·, 0) = u(·, 0) = u0,
1117
+ a Ricker wavelet; we also show the point xtrace as a cross. Top right plot: intermediate solution �u(·, 7.5).
1118
+ Bottom left plot: intermediate solution �u(·, 15). Bottom right plot: final solution �u(·, 20).
1119
+ 0
1120
+ 2
1121
+ 4
1122
+ 6
1123
+ 8
1124
+ 10
1125
+ 12
1126
+ 14
1127
+ 16
1128
+ 18
1129
+ 20
1130
+ −0.1
1131
+ 0
1132
+ 0.1
1133
+ t
1134
+ u(xtrace, t)
1135
+ �u (tol = 10−2)
1136
+ �u (tol = 10−3)
1137
+ uFEM
1138
+ Figure 12: Value of solution at point xtrace = (−1, −2).
1139
+ Method
1140
+ �u (tol = 10−2)
1141
+ �u (tol = 10−3)
1142
+ uFEM
1143
+ Offline
1144
+ 46.66 [s]
1145
+ 252.9 [s]
1146
+ 188.9 [s]
1147
+ Online
1148
+ 2.04 [ms]
1149
+ 8.48 [ms]
1150
+ 27.67 [µs]
1151
+ Table 2: Timings for the room test case. To obtain more statistically significant results, each displayed time
1152
+ is the average over 3 (resp. 103) runs of the offline (resp. online) phase with identical parameters.
1153
+ 18
1154
+
1155
+ D. Pradovera, M. Nonino, and I. Perugia
1156
+ Geometry-based approximation of waves in complex domains
1157
+ We can observe the increased training and evaluation time that results from decreasing tol. Moreover, we
1158
+ see that, in this example, our proposed approach is more competitive offline, but less so online. Somewhat
1159
+ surprisingly, we have observed that the most expensive step in evaluating �u (taking about half of the online
1160
+ time) is determining whether an evaluation point is in the light cones Ωn. The reason for this is that they
1161
+ can have rather complicated shapes, cf. Section 3.
1162
+ Evaluating the FE solution at a space-time point is an extremely cheap operation (essentially corre-
1163
+ sponding to a vector dot product) while evaluating �u is more expensive, requiring the evaluation of O(N)
1164
+ nonlinear functions. However, the FE solution comes with the serious drawback of memory usage. Indeed, in
1165
+ our example, storing uFEM as a (∼ 1.5 · 106) × (∼ 2.9 · 103) array of double-precision floating-point numbers
1166
+ requires approximately 34 GB.
1167
+ Concerning the timing results, we also wish to mention that the online times in Table 2 should be
1168
+ interpreted carefully. Indeed, the online time for the FE solution is artificially deflated by the fact that
1169
+ xtrace is a vertex of the FE mesh: each evaluation of uFEM corresponds to extracting a vector entry. If xtrace
1170
+ had not been a vertex of the mesh, the online time could have been larger by at least one order of magnitude,
1171
+ if not more, depending on the FE implementation. Moreover, we note that accessing point-evaluations of
1172
+ uFEM at arbitrary times a posteriori, namely, after the timestepping has been carried out, is feasible only if
1173
+ enough memory is available to store the whole “timestepping history”. Considering the numbers mentioned
1174
+ in the previous paragraph, this might not be possible in practice, especially for more complex and/or larger
1175
+ domains.
1176
+ 5.2.1
1177
+ A time-harmonic source
1178
+ One of the advantages of our approach is that it allows changing the source terms of the problem in a
1179
+ seamless way. Notably, under minor technical constraints (e.g., the support of the new source term should
1180
+ not be larger than the old one), this kind of change does not require training a new surrogate.
1181
+ To showcase this, we approximate the wave propagating from a time-harmonic point source at x = 0
1182
+ with angular frequency ω > 0. In our tests, we pick ω ∈ {2π, 10π}. To this aim, we define u as the solution
1183
+ of the following (ω-dependent) problem:
1184
+
1185
+
1186
+
1187
+
1188
+
1189
+
1190
+
1191
+
1192
+
1193
+ ∂ttu(x, t) = ∆u(x, t) − ω2 sin(ωt)δ0(x)
1194
+ for (x, t) ∈ Ω × (0, T),
1195
+ u(x, 0) = 0
1196
+ for x ∈ Ω,
1197
+ ∂tu(x, 0) = 0
1198
+ for x ∈ Ω,
1199
+ ∂νu(x, t) = 0
1200
+ for (x, t) ∈ ∂Ω × (0, T],
1201
+ (23)
1202
+ where δ0 denotes the usual 2-dimensional “delta function” centered at x = 0.
1203
+ As usual, we define Ψ = Ψ(ρ, t) as the (ω-dependent) solution of the free-space version of (23) in radial-
1204
+ temporal coordinates. Note that, in free space, i.e., without boundary effects3, the forcing term in (23) is
1205
+ equivalent to the following non-homogeneous Dirichlet-like condition at ρ = 0:
1206
+ U(0, t) = Ψ(0, t) =
1207
+ � t
1208
+ 0
1209
+ � t′
1210
+ 0
1211
+ −ω2 sin(ωt′′)dt′′dt′ = sin(ωt)
1212
+ ∀t > 0.
1213
+ (24)
1214
+ Accordingly, the free-space solution Ψ has space-time support {(ρ, t) ∈ [0, ∞)2, ρ ≤ t}, which is a subset of
1215
+ the free-space solution Ψ from the previous section, namely, {(ρ, t) ∈ [0, ∞)2, ρ ≤ t + R}. As such, to obtain
1216
+ an approximation for the wave u generated by the time-harmonic source for an arbitrary ω, it suffices to
1217
+ plug the corresponding Ψ in each term of the surrogate �u from the previous section! We show the results of
1218
+ our approximation in Figs. 13 and 14.
1219
+ We note that, if we had chosen to apply the FEM to approximate the wave u generated by the time-
1220
+ harmonic source, we would have been forced to carry out a new simulation from scratch for every frequency
1221
+ to be studied. To this end, we would have needed to choose a mesh with ω-dependent resolution: the mesh
1222
+ size should be small enough for the well-known pollution effect (see, e.g., [22, 2]) to be absent.
1223
+ 3If Ω is bounded, reflected or diffracted waves will generally bounce back to x = 0. As such, the value of u(0, t), u being
1224
+ the solution of (23), will be different from the source signal sin(ωt). For this reason, we cannot turn the forcing term in (23)
1225
+ into a condition like (24), except in free space.
1226
+ 19
1227
+
1228
+ D. Pradovera, M. Nonino, and I. Perugia
1229
+ Geometry-based approximation of waves in complex domains
1230
+ −0.4
1231
+ −0.2
1232
+ 0
1233
+ 0.2
1234
+ 0.4
1235
+ −0.2
1236
+ 0
1237
+ 0.2
1238
+ Figure 13: Surrogate solution found with the proposed approach. Left plot: ω = 2π. Right plot: ω = 10π.
1239
+ 0
1240
+ 2
1241
+ 4
1242
+ 6
1243
+ 8
1244
+ 10
1245
+ 12
1246
+ 14
1247
+ 16
1248
+ 18
1249
+ 20
1250
+ −0.2
1251
+ −0.1
1252
+ 0
1253
+ 0.1
1254
+ 0.2
1255
+ t
1256
+ u(xtrace, t)
1257
+ ω = 2π
1258
+ ω = 10π
1259
+ Figure 14: Value of solution at point xtrace = (−1, −2) for different excitation frequencies.
1260
+ In our proposed approach, we also have a constraint on the mesh resolution. However, it only applies
1261
+ to the problem defining the free-space solution Ψ, which is 1-dimensional in space. Hence, having to refine
1262
+ the mesh represents a much smaller obstacle to efficiency. In particular, for a fixed time horizon T, the
1263
+ computation of �u becomes more and more efficient, when compared to the computation of uFEM, as the
1264
+ frequency ω increases.
1265
+ 6
1266
+ Conclusions
1267
+ We have presented a method for approximating waves propagating through complex 2-dimensional domains
1268
+ with polygonal boundaries. Our method relies on the automatic identification of reflection and diffraction
1269
+ effects caused by the domain geometry. Each effect is modeled through a relatively simple nonlinear expres-
1270
+ sion. In our numerical tests, we have observed rather a good approximation quality, with the main features
1271
+ of the target wave being well identified. As a way to improve the approximation accuracy, we recall that any
1272
+ diffraction model could replace the current one.
1273
+ In terms of complexity, our method requires the solution of a simplified 1D-in-space problem, much
1274
+ simpler than the original 2D-in-space one. We expect such improved accuracy to increase even further if
1275
+ one were to consider 3D instead of 2D problems. However, in order to generalize our method to 3 space
1276
+ dimensions, a suitable diffraction model would be necessary. This is one of our ongoing research directions.
1277
+ Another favorable aspect of our algorithm is its potential to be run on parallel architectures, since
1278
+ the computation of different rays can be carried out independently.
1279
+ This is not the case for standard
1280
+ timestepping-based discretizations, due to their intrinsically sequential nature.
1281
+ Other envisioned extensions of our technique involve the cases of domains with curvilinear boundaries
1282
+ and of propagation media with non-uniform properties (e.g., density and refraction index). Specifically, this
1283
+ latter case would effectively result in a non-uniform wave speed, with reflections and diffractions happening
1284
+ 20
1285
+
1286
+ D. Pradovera, M. Nonino, and I. Perugia
1287
+ Geometry-based approximation of waves in complex domains
1288
+ also within the domain Ω.
1289
+ Finally, we recall that, in many applications, the ultimate target is understanding how the wave u solving
1290
+ (1) depends on underlying parameters µ, e.g., the forcing term f, the shape of the domain Ω, etc. In this
1291
+ setting, MOR methods try to construct a surrogate model of the form �u = �u(x, t; µ), providing a good
1292
+ approximation of u over a whole range of parameter values. Even though our technique was presented here
1293
+ in the non-parametric setting, we believe that it potentially allows incorporating the parameter dependence
1294
+ in a natural and efficient way. In our opinion, this might be achievable by leveraging the simple and in-
1295
+ terpretable structure of the rays (free-space solution, light cone, and angular modulation). As a simple
1296
+ preliminary example, we showcased this in Section 5.2.1 for a parametric source term, with the parame-
1297
+ ter being the frequency. We are currently investigating how to extend our method to more complicated
1298
+ parametric problems.
1299
+ References
1300
+ [1] M. S. Alnæs, J. Blechta, J. Hake, and Others. The FEniCS Project version 1.5. Archive of Numerical
1301
+ Software, 3(100), 2015.
1302
+ [2] I. M. Babuˇska and S. A. Sauter. Is the pollution effect of the fem avoidable for the helmholtz equation
1303
+ considering high wave numbers? SIAM Journal on Numerical Analysis, 34(6):2392–2423, 1997.
1304
+ [3] P. Benner, M. Ohlberger, A. Cohen, and K. Willcox. Model reduction and approximation: theory and
1305
+ algorithms. SIAM, 2017.
1306
+ [4] F. Bonizzoni, F. Nobile, I. Perugia, and D. Pradovera. Least-Squares Pad´e approximation of parametric
1307
+ and stochastic Helmholtz maps. Advances in Computational Mathematics, 46(3):46, 2020.
1308
+ [5] L. Borcea, V. Druskin, A. V. Mamonov, and M. Zaslavsky.
1309
+ Robust nonlinear processing of active
1310
+ array data in inverse scattering via truncated reduced order models. Journal of Computational Physics,
1311
+ 381:1–26, 2019.
1312
+ [6] L. Borcea, V. Druskin, A. V. Mamonov, M. Zaslavsky, and J. Zimmerling.
1313
+ Reduced order model
1314
+ approach to inverse scattering. SIAM Journal on Imaging Sciences, 13(2):685–723, 2020.
1315
+ [7] L. Borcea, G. Papanicolaou, C. Tsogka, and J. Berryman. Imaging and time reversal in random media.
1316
+ Inverse Problems, 18(5), 2002.
1317
+ [8] P. Buchfink, S. Glas, and B. Haasdonk.
1318
+ Symplectic Model Reduction of Hamiltonian Systems on
1319
+ Nonlinear Manifolds. arXiv preprint arXiv:2112.10815, 2021.
1320
+ [9] P. Buchfink, B. Haasdonk, and S. Rave. PSD-Greedy Basis Generation for Structure-Preserving Model
1321
+ Order Reduction of Hamiltonian Systems. In Proceedings of ALGORITMY, pages 151–160, 2020.
1322
+ [10] N. Cagniart, Y. Maday, and B. Stamm. Model Order Reduction for Problems with Large Convection
1323
+ Effects, pages 131–150. Springer International Publishing, Cham, 2019.
1324
+ [11] G. Cohen, A. Hauck, M. Kaltenbacher, and T. Otsuru. Different Types of Finite Elements. In S. Marburg
1325
+ and B. Nolte, editors, Computational Acoustics of Noise Propagation in Fluids - Finite and Boundary
1326
+ Element Methods, pages 57–88. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
1327
+ [12] R. A. DeVore. The theoretical foundation of reduced basis methods. Model reduction and approximation:
1328
+ theory and algorithms, 15:137, 2017.
1329
+ [13] S. Esterhazy and J. M. Melenk. On stability of discretizations of the Helmholtz equation. In Numerical
1330
+ analysis of multiscale problems, pages 285–324. Springer, 2012.
1331
+ [14] S. Glas, A. T. Patera, and K. Urban. A reduced basis method for the wave equation. International
1332
+ Journal of Computational Fluid Dynamics, 34(2):139–146, 2020.
1333
+ 21
1334
+
1335
+ D. Pradovera, M. Nonino, and I. Perugia
1336
+ Geometry-based approximation of waves in complex domains
1337
+ [15] C. Greif and K. Urban. Decay of the Kolmogorov N-width for wave problems. Applied Mathematics
1338
+ Letters, 96:216–222, 2019.
1339
+ [16] E. Hairer, G. Wanner, and C. Lubich. Geometric Numerical Integration, volume 31 of Springer Series
1340
+ in Computational Mathematics. Springer Berlin Heidelberg, Berlin, Heidelberg, 2002.
1341
+ [17] J. S. Hesthaven and C. Pagliantini. Structure-preserving reduced basis methods for Poisson systems.
1342
+ Mathematics of Computation, 90(330):1701–1740, 2021.
1343
+ [18] J. S. Hesthaven, C. Pagliantini, and N. Ripamonti. Rank-adaptive structure-preserving reduced basis
1344
+ methods for Hamiltonian systems. arXiv preprint arXiv:2007.13153, 2020.
1345
+ [19] R. Hiptmair, A. Moiola, and I. Perugia. Trefftz discontinuous Galerkin methods for acoustic scattering
1346
+ on locally refined meshes. Applied numerical mathematics, 79:79–91, 2014.
1347
+ [20] J. B. Keller. Geometrical theory of diffraction. J. Opt. Soc. Am., 52(2):116–130, 1962.
1348
+ [21] K. Lee and K. T. Carlberg. Deep conservation: A latent-dynamics model for exact satisfaction of physical
1349
+ conservation laws. Proceedings of the AAAI Conference on Artificial Intelligence, 35(1):277–285, 2021.
1350
+ [22] S. Marburg.
1351
+ A Unified Approach to Finite and Boundary Element Discretization in Linear Time–
1352
+ Harmonic Acoustics. In S. Marburg and B. Nolte, editors, Computational Acoustics of Noise Propagation
1353
+ in Fluids - Finite and Boundary Element Methods, pages 1–34. Springer Berlin Heidelberg, Berlin,
1354
+ Heidelberg, 2008.
1355
+ [23] D. A. McNamara, C. W. I. Pistorius, and J. A. G. Malherbe. Introduction to the uniform geometrical
1356
+ theory of diffraction. Artech House Norwood, MA, 1990.
1357
+ [24] J. M. Melenk and S. Sauter. Wavenumber explicit convergence analysis for Galerkin discretizations of
1358
+ the Helmholtz equation. SIAM Journal on Numerical Analysis, 49(3):1210–1243, 2011.
1359
+ [25] A. Moiola, R. Hiptmair, and I. Perugia. Plane wave approximation of homogeneous Helmholtz solutions.
1360
+ Zeitschrift f¨ur angewandte Mathematik und Physik, 62(5):809–837, 2011.
1361
+ [26] C. Pagliantini. Dynamical reduced basis methods for Hamiltonian systems. Numerische Mathematik,
1362
+ 148(2):409–448, 2021.
1363
+ [27] S. F. Potter and M. K. Cameron. Jet marching methods for solving the eikonal equation. SIAM Journal
1364
+ on Scientific Computing, 43(6):A4121–A4146, 2021.
1365
+ [28] S. F. Potter, M. K. Cameron, and R. Duraiswami. Numerical geometric acoustics: an eikonal-based
1366
+ approach for modeling sound propagation in 3D environments. arXiv preprint arXiv:2208.13002, 2022.
1367
+ [29] J. Reiss, P. Schulze, J. Sesterhenn, and V. Mehrmann. The shifted proper orthogonal decomposition:
1368
+ A mode decomposition for multiple transport phenomena.
1369
+ SIAM Journal on Scientific Computing,
1370
+ 40(3):A1322–A1344, 2018.
1371
+ [30] P. H. Tournier, I. Aliferis, M. Bonazzoli, M. de Buhan, M. Darbas, V. Dolean, F. Hecht, P. Jolivet,
1372
+ I. El Kanfoud, C. Migliaccio, F. Nataf, C. Pichot, and S. Semenov. Microwave tomographic imaging of
1373
+ cerebrovascular accidents by using high-performance computing. Parallel Computing, 85:88–97, 2019.
1374
+ [31] G. Welper. Interpolation of functions with parameter dependent jumps by transformed snapshots. SIAM
1375
+ Journal on Scientific Computing, 39(4):A1225–A1250, 2017.
1376
+ 22
1377
+
8dFRT4oBgHgl3EQfpTfl/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
99FLT4oBgHgl3EQfCS7y/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:94adb9f0e34d1c67981455a5b9d85e8cc81ea82d83851e76e5d6d3ac3c5e3265
3
+ size 10813485
ANAyT4oBgHgl3EQfRffl/content/tmp_files/2301.00069v1.pdf.txt ADDED
@@ -0,0 +1,1428 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A stabilized local integral method using RBFs
2
+ for the Helmholtz equation with applications
3
+ to wave chaos and dielectric microresonators
4
+ L. Ponzellini Marinelli[1,2]
5
6
+ L. Raviola[1]
7
8
+ [1] Faculty of Exact Sciences, Engineering and Surveying,
9
+ National University of Rosario, Rosario, Argentina.
10
+ [2] Rosario Physics Institute, UNR-CONICET,
11
+ Rosario, Argentina.
12
+ January 3, 2023
13
+ Abstract
14
+ Most problems in electrodynamics do not have an analytical so-
15
+ lution so much effort has been put in the development of numerical
16
+ schemes, such as the finite-difference method, volume element meth-
17
+ ods, boundary element methods, and related methods based on bound-
18
+ ary integral equations.
19
+ In this paper we introduce a local integral
20
+ boundary domain method with a stable calculation based on Radial
21
+ Basis Functions (RBF) approximations, in the context of wave chaos
22
+ in acoustics and dielectric microresonator problems. RBFs have been
23
+ gaining popularity recently for solving partial differential equations
24
+ numerically, becoming an extremely effective tool for interpolation on
25
+ scattered node sets in several dimensions with high-order accuracy
26
+ and flexibility for nontrivial geometries. One key issue with infinitely
27
+ 1
28
+ arXiv:2301.00069v1 [math.NA] 30 Dec 2022
29
+
30
+ smooth RBFs is the choice of a suitable value for the shape param-
31
+ eter which controls the flatness of the function. It is observed that
32
+ best accuracy is often achieved when the shape parameter tends to
33
+ zero. However, the system of discrete equations obtained from the
34
+ interpolation matrices becomes ill-conditioned, which imposes severe
35
+ limits to the attainable accuracy. A few numerical algorithms have
36
+ been presented that are able to stably compute an interpolant, even
37
+ in the increasingly flat basis function limit. We present the recently
38
+ developed Stabilized Local Boundary Domain Integral Method in the
39
+ context of boundary integral methods that improves the solution of
40
+ the Helmholtz equation with RBFs. Numerical results for small shape
41
+ parameters that stabilize the error are shown. Accuracy and compar-
42
+ ison with other methods are also discussed for various case studies.
43
+ Applications in wave chaos, acoustics and dielectric microresonators
44
+ are discussed to showcase the virtues of the method, which is com-
45
+ putationally efficient and well suited to the kind of geometries with
46
+ arbitrary shape domains.
47
+ 1
48
+ Introduction and motivation
49
+ Dielectric microresonators, also known as dielectric microcavities, have at-
50
+ tracted interest in the last decades due to technological applications like
51
+ microlasers and and as systems with intrinsic theoretical interest for its con-
52
+ nections with quantum billiards and wave chaos [2, 9, 20].
53
+ A quantum billiard is a system in which a free particle is confined within
54
+ a 2D domain and whose dynamics is governed by the Schr¨odinger equation
55
+ iψt(x, t) = −∆ψ(x, t),
56
+ x ∈ Ω ⊂ R2, t > 0.
57
+ (1)
58
+ where ψ(x, t) = 0 for x ∈ Γ being Γ the boundary of the domain Ω.
59
+ When searching the time harmonic solutions of this system in the form
60
+ ψ(x, t) = ˜ψ(x)eikt, the spatial dependence, ˜ψ(x), satisfies the well-known
61
+ Helmholtz Equation (HE)
62
+
63
+ ∆ + k2� ˜ψ(x) = 0,
64
+ x ∈ Ω ⊂ R2, t > 0.
65
+ (2)
66
+ In this case, the eigenvalues to equation (2) are related to the energy of the
67
+ particle.
68
+ On the other hand, a similar situation arises when trying to solve the
69
+ problem of light waves propagating inside a dielectric medium satisfying the
70
+ 2
71
+
72
+ Maxwell equations. Also in this case, the search for time harmonic solutions
73
+ leads to the Helmholtz equation for the spatial dependence of the electro-
74
+ magnetic field [2].
75
+ For generic domains, the equation (2) cannot be solved analytically to find
76
+ stationary states. So we must resort to finding efficient and reliable numerical
77
+ methods to solve this equation. There are many numerical techniques to
78
+ address this equation such as the finite element method (FEM), the finite
79
+ volume method (FVM), the Boundary Element Method (BEM) or spectral
80
+ methods (PS) [19]. However, several of these require the construction of a
81
+ specific mesh or refinement to efficiently address certain numerical problems
82
+ on non-trivial geometries.
83
+ The BEM transforms the formulated Partial Differential Equations (PDE)
84
+ into integral equations, that is, into an integral form over the boundary
85
+ [1, 13]. In BEM the PDE that describes the physical problem is transformed
86
+ into a Boundary Integral Equation (BIE), which is achieved by using Green’s
87
+ identities to then apply this integral formulation over points distributed in
88
+ the domain. Many local integral methods are based on an integral formula-
89
+ tion on small, strongly overlapping stencils with local interpolations.
90
+ In recent decades, methods involving the Radial Basis Functions (RBF)
91
+ have become an extremely effective tool in non-trivial geometries for inter-
92
+ polation in sets of scattered nodes and for numerically approximating PDE.
93
+ There are many modern books dealing with theory, implementations and ap-
94
+ plications [3, 4, 6]. One advantage is that when the distribution nodes are
95
+ created, it is possible to achieve local refinement in critical areas depending
96
+ on the specific problem [5]. Particularly, this is interesting to resolve local-
97
+ ized structures like the scarred states observed in quantum chaos phenomena
98
+ [18].
99
+ Using infinitely differential RBFs like Gaussians, exponential convergence
100
+ can be shown. A practical obstacle is the ill-conditioning of the interpolation
101
+ matrix when the shape parameter ε that defines the Gaussian RBF tends
102
+ to zero. It is known that when this parameter is reduced, the interpolation
103
+ accuracy of the method improves considerably but the numerical conditioning
104
+ of the problem worsens if it is solved with a direct type numerical method.
105
+ That is, there is a conflict between accuracy and the constraint known as the
106
+ uncertainty principle [17].
107
+ In this paper we present the Stabilized Localized Boundary-Domain Inte-
108
+ gral Method (SLBDIM) [16] in the context of Helmholtz type equations. This
109
+ is a new stable integral local numerical method for approximating elliptic-
110
+ 3
111
+
112
+ type PDE solutions to solve Boundary Value Problems (BVP) in 2D that
113
+ uses local interpolations with RBF for low values ε > 0. This technique is
114
+ a combination of meshless methods, local integral formulations and bound-
115
+ ary elements in multi-domains independent of a structured mesh and that
116
+ only requires an unstructured distribution of nodes of the domain Ω and its
117
+ boundary Γ = ∂Ω that allows to deal with complex geometries. For local
118
+ interpolations, the Gaussian RBFs ϕ(r) = e−(εr)2 are used when ε → 0 in
119
+ local interpolations in stable form.
120
+ Numerical results are shown for a small shape parameter that stabilizes
121
+ the error. Comparisons with other methods in several cases are also dis-
122
+ cussed. It is shown that the method is computationally efficient and suit-
123
+ able for geometries that come from applications of wave chaos and dielectric
124
+ microresonators. In particular, we solve differential problems with Dirichlet-
125
+ type boundary conditions over square domains with quasi-uniform point dis-
126
+ tributions.
127
+ 2
128
+ The Stabilized Localized Boundary Domain
129
+ Integral Method for Helmholtz equations
130
+ 2.1
131
+ Problem description and local integral method
132
+ We consider the following Boundary Value Problem (BVP) on an open,
133
+ bounded and simply connected domain Ω ⊂ R2
134
+ (BV P)
135
+ � L [u] (x) = f(x),
136
+ x ∈ Ω,
137
+ (3a)
138
+ B [u] (x) = g(x),
139
+ x ∈ Γ = ∂Ω,
140
+ (3b)
141
+ where L[ . ] = ∆ + λ is an elliptic differential Helmholtz-type operator,
142
+ ∆ =
143
+
144
+ ∂x2 +
145
+
146
+ ∂y2 is tha Laplacian, λ ∈ R (when λ = k2 > 0, k is the wave-
147
+ number) and f(x) is the smooth source term. B[ . ] is the boundary operator
148
+ with the boundary conditions (BC).
149
+ The BC are Dirichlet, Neumann or mixed over Γ = Γ1∪Γ2 and Γ1∩Γ2 = ∅
150
+
151
+
152
+
153
+ u(x) = g1(x),
154
+ x ∈ Γ1,
155
+ (4a)
156
+ ∂u(x)
157
+ ∂n
158
+ = g2(x),
159
+ x ∈ Γ2,
160
+ (4b)
161
+ with g1 and g2 known data, and ∂u(x)
162
+ ∂n
163
+ the outward normal derivative of the
164
+ unknown field u.
165
+ 4
166
+
167
+ We propose that PDE (3a) can be written as
168
+ ∆u (x) = f(x) − λu (x) = b (x, u (x)) ,
169
+ (5)
170
+ where u (x) is the potential in the point x ∈ Ω.
171
+ We consider x ∈ Ω ⊂ R2
172
+ ∆u∗ = δ(x − ξ),
173
+ (6)
174
+ where δ(x − ξ) is Delta’s delta centered at ξ ∈ Ω with fundamental solution
175
+ u∗(x, ξ) = 1
176
+ 2πln(r),
177
+ r = ∥x − ξ∥.
178
+ (7)
179
+ From equation (5)
180
+ ∆u (x) = b ⇔
181
+
182
+
183
+ u∗ (x, ξ) ∆u (x) dΩx =
184
+
185
+
186
+ u∗(x, ξ)b dΩx.
187
+ (8)
188
+ Applying Green’s second identity for u that satisfies (5) and u∗ that
189
+ satisfies (6)
190
+
191
+
192
+ (u∗∆u − u∆u∗) dΩx =
193
+
194
+ Γ
195
+
196
+ u∗ ∂u
197
+ ∂n − u∂u∗
198
+ ∂n
199
+
200
+ dΓx,
201
+ (9)
202
+ we obtain
203
+ u(ξ) =
204
+
205
+
206
+ u∗ (x, ξ) b dΩx −
207
+
208
+ Γ
209
+
210
+ u∗ (x, ξ) ∂u(x)
211
+ ∂n
212
+ − u(x)u∗(x, ξ)
213
+ ∂n
214
+
215
+ dΓx.
216
+ (10)
217
+ From equation (10) we have a formula for the integral representation of
218
+ the PDE over a subregion Ωi with boundary Γi. The interior collocation
219
+ point xi is obtained as before from the fundamental solution and Green’s
220
+ second identity
221
+ u(ξ) =
222
+
223
+ Γi
224
+ q∗ (x, ξ) u (x) dΓx −
225
+
226
+ Γi
227
+ u∗ (x, ξ) q (x) dΓx +
228
+
229
+ Ωi
230
+ b u∗ (x, ξ) dΩx,
231
+ (11)
232
+ where q = ∂u
233
+ ∂n is the normal derivative of the unknown field, u∗ is the fun-
234
+ damental Laplacian solution and q∗ =
235
+ ∂u∗
236
+ ∂n is the normal derivative of the
237
+ fundamental solution.
238
+ 5
239
+
240
+ Using the well-known Green-Dirichlet function (FGD), G (x, ξ), and its
241
+ normal derivative Q (x, ξ) [8] in (11) we obtain a new integral formulation of
242
+ the form
243
+ u(ξ) =
244
+
245
+ Γi
246
+ Q (x, ξ) u (x) dΓx +
247
+
248
+ Ωi
249
+ b G (x, ξ) dΩx.
250
+ (12)
251
+ since the integral over Γi involving G in (11) vanishes since its value is zero.
252
+ In addition, if the non-homogeneous term b of the PDE can be split
253
+ b (x, u (x)) = f (x) − λu (x) ,
254
+ (13)
255
+ where the funcion source f is data.
256
+ The integral representation (12) in each subregion of integration Ωi is
257
+ u(ξ) =
258
+
259
+ Γi
260
+ Q(x, ξ)u(x) dΓx+
261
+
262
+ Ωi
263
+ G(x, ξ)f(x) dΩx+
264
+
265
+ Ωi
266
+ ���λu (x) G(x, ξ) dΩx,
267
+ (14)
268
+ where ξ is the interior source point. The collocation technique is done only
269
+ at interior points of the domain.
270
+ 2.2
271
+ Local interpolations with RBF
272
+ A function ϕ : Rd → R is an RBF if there exists φ : [0, ∞) → R such that
273
+ ϕ (x) = φ(r),
274
+ r = ∥x − xj∥,
275
+ (15)
276
+ where ∥.∥ is the Euclidean norm on Rd and depends on the distance to a
277
+ center xj ∈ Rd. If it depends on the shape parameter ε > 0, then ϕε
278
+ j (x) =
279
+ φ(r, ε) is often noted.
280
+ In the LBDIM the field u is locally interpolated with RBF {ϕj}n
281
+ j=1 with
282
+ centers of the stencil Θx = {xj}n
283
+ j=1
284
+ u (x) ≈
285
+ n
286
+
287
+ j=1
288
+ αjϕj(x),
289
+ (16)
290
+ where the interpolation matrix Ai is such that
291
+ (Ai)jk = ϕk(xj) = φ(∥xj − xk∥),
292
+ j, k = 1, . . . , n
293
+ (17)
294
+ 6
295
+
296
+ The term b of (13) is interpolated with RBF {χj}m
297
+ j=1 with centers of the
298
+ stencil Θy = {yj}m
299
+ j=1
300
+ �b (u (x) , ∇u (x)) ≈
301
+ m
302
+
303
+ j=1
304
+ βjχj (x) ,
305
+ (18)
306
+ where the interpolation matrix �Ai is such that
307
+ (�Ai)jk = χk(yj) = χ(∥yj − yk∥), j, k = 1, . . . , m
308
+ (19)
309
+ The RBFs are eventually of the same type and with the same centers. If
310
+ we take the same RBF bases with the same centers, the result is {ϕj}n
311
+ j=1
312
+ and {χj}m
313
+ j=1 for m = n although they could be different depending on the
314
+ application problem or numerical experience.
315
+ The local integral formulation of (14) is of the form
316
+ u(ξ)
317
+
318
+ n
319
+
320
+ j=1
321
+ αj
322
+ ��
323
+ Γi
324
+ Q(x, ξ)ϕj(x) dΓx
325
+
326
+ +
327
+ m
328
+
329
+ j=1
330
+ βj
331
+ ��
332
+ Ωi
333
+ G(x, ξ)χj (x) dΩx
334
+
335
+ +
336
+
337
+ Ωi
338
+ G(x, ξ)f(x) dΩx.
339
+ (20)
340
+ If Θ = {x1, . . . , xN} is the discretization of domain Ω and ξ = xi ∈ Θ is
341
+ the collocation point, the discretized formulae of the unknown field is
342
+ ui = u (xi) =
343
+ n
344
+
345
+ j=1
346
+ αj�hij +
347
+ m
348
+
349
+ j=1
350
+ βj�gij + �fi,
351
+ (21)
352
+ where αj and βj come from equations (16) and (18). The coefficients �hij, �gij
353
+ and �fi are of the form
354
+
355
+
356
+
357
+
358
+
359
+
360
+
361
+
362
+
363
+
364
+
365
+
366
+
367
+
368
+
369
+
370
+
371
+ �hij =
372
+
373
+ Γi
374
+ Q (x, xi) ϕj (x) dΓx,
375
+ (22a)
376
+ �gij =
377
+
378
+ Ωi
379
+ G (x, xi) χj (x) dΩx,
380
+ (22b)
381
+ �fi =
382
+
383
+ Ωi
384
+ G (x, xi) f (x) dΩx,
385
+ (22c)
386
+ which are calculated by Gauss-Legendre quadratures.
387
+ 7
388
+
389
+ Defining the vectors α = [α1, . . . , αn]T and β = [β1, . . . , βm]T as interpo-
390
+ lation coefficients, the discretized form (21) of u can be expressed as
391
+ ui = �hT
392
+ i α + �gT
393
+ i β + �fi,
394
+ (23)
395
+ where �hi = [�hi1, . . . ,�hin]T and �gi = [�gi1, . . . , �gim]T are the influence coeffi-
396
+ cients, and �fi ∈ R is data.
397
+ The vector α arises from the local system by interpolating with the RBF
398
+ basis {ϕj}n
399
+ j=1
400
+ Aiα = di ⇔ α = A−1
401
+ i di
402
+ (24)
403
+ and the vector β arises from the local system by interpolating with the RBF
404
+ basis {χj}m
405
+ j=1
406
+ �Aiβ = �bi ⇔ β = �A−1
407
+ i �bi = �A−1
408
+ i
409
+
410
+ A�biα
411
+
412
+ = �A−1
413
+ i
414
+
415
+ A�biA−1
416
+ i di
417
+
418
+ ,
419
+ (25)
420
+ where A�bi is the calculation matrix of the vector �bi with known coefficients
421
+ (A�bi)jk = �b (ϕk (yj) , ∇ϕk (yj)) ,
422
+ j = 1, . . . , m, k = 1, . . . , n.
423
+ (26)
424
+ Substituting (24) and (25) in the discretized form (23), we obtain the
425
+ discretized matrix form for ui in terms of di
426
+ ui =
427
+
428
+ �hT
429
+ i A−1
430
+ i
431
+ + �gT
432
+ i �A−1
433
+ i A�biA−1
434
+ i
435
+
436
+ di + ˜fi.
437
+ (27)
438
+ Rewriting (27) we obtain an algorithmic procedure to avoid the compu-
439
+ tation of inverses A−1
440
+ i
441
+ and �A−1
442
+ i
443
+ (see [14])
444
+ ui = zTdi + �fi
445
+ donde zT = �hT
446
+ i A−1
447
+ i
448
+ + �gT
449
+ i �A−1
450
+ i A�biA−1
451
+ i
452
+ (28)
453
+ which are assembled into a global sparse-like system and numerically resolved
454
+ with Generalized Minimal Residual (GMRES).
455
+ 2.3
456
+ Stability with Gaussian RBFs
457
+ Convergence in global interpolations with ε-dependent RBFs can be studied
458
+ in a stationary way (n = cte. and ε → 0) or non-stationary (ε = cte. and
459
+ increasesn). In the case of Gaussian RBFs, they produce convergence of
460
+ order O(e
461
+ − const
462
+ (εh)2 ) (superspectral).
463
+ 8
464
+
465
+ The RBF interpolation matrix is
466
+ A(ε) =
467
+
468
+ ����
469
+ φ(∥x1 − x1∥, ε)
470
+ φ(∥x1 − x2∥, ε)
471
+ . . .
472
+ φ(∥x1 − xn∥, ε)
473
+ φ(∥x2 − x1∥, ε)
474
+ φ(∥x2 − x2∥, ε)
475
+ . . .
476
+ φ(∥x2 − xn∥, ε)
477
+ ...
478
+ ...
479
+ ...
480
+ ...
481
+ φ(∥xn − x1∥, ε)
482
+ φ(∥xn − x2∥, ε)
483
+ . . .
484
+ φ(∥xn − xn∥, ε)
485
+
486
+ ���� .
487
+ When ε is small, the RBFs become almost linearly dependent (’flat’)
488
+ forming a bad basis of functions and generating ill-conditioned interpolation
489
+ matrices A(ε) in a good interpolation space. To avoid this problem in [7, 10]
490
+ numerical techniques were developed that stabilize the solutions of linear
491
+ systems where the RBFs that form the matrix of the system take arbitrarily
492
+ small shape parameters. The RBF-QR method developed for global inter-
493
+ polations of scattered nodes using Gaussian RBFs is numerically stable for
494
+ nearly zero parameters. The idea of the RBF-QR algorithm is to change
495
+ the base {φj} to a new base {ψj} using combinations of polynomial powers,
496
+ Chebyshev polynomials and trigonometric functions.
497
+ 3
498
+ Implementation of the SLBDIM
499
+ The new matrix form for u of (27) at each node is
500
+ ui =
501
+
502
+ lT
503
+ i Bi
504
+ −1 + �l
505
+ T
506
+ i �
507
+ Bi
508
+ −1B˜biBi
509
+ −1�
510
+ di + ˜fi,
511
+ (29)
512
+ where li = [. . . , lik, . . .]T and �li = [. . . ,�lik, . . .]T are the column vectors.
513
+ For internal stencils, the local interpolation matrix is
514
+ Bi
515
+ ψ = V
516
+
517
+ In
518
+
519
+ R
520
+ T
521
+
522
+ ,
523
+ (30)
524
+ where (Bi
525
+ ψ)jk = ψk(xj) and Vjk = Vk(xj) for j, k = 1, . . . , n ([7] for details).
526
+ For boundary stencils, the local matrix interpolation matrix is Bi has
527
+ two blocks,
528
+ Bi =
529
+ � Bi
530
+ ψ
531
+ Bi
532
+
533
+
534
+ ,
535
+ (31)
536
+ where the first matrix block is
537
+ (Bi
538
+ ψ)jk = ψk(xj),
539
+ (32)
540
+ 9
541
+
542
+ for j = 1, . . . , nint (interior nodes) and k = 1, . . . , n (boundary nodes), and
543
+ the second matrix block is
544
+ (Bi
545
+ Bψ)jk = Bψk(xj)
546
+ (33)
547
+ for j = nint + 1, . . . , n and k = 1, . . . , n.
548
+ To avoid calculating Bi
549
+ −1 and �
550
+ Bi
551
+ −1 when ε → 0 we follow an algorithmic
552
+ procedure. The inclusion of this technique in the local integral method allows
553
+ to stabilize the numerical error of the approximation of the Helmholtz-type
554
+ equations.
555
+ This Stabilized Domain and Boundary Local Integral Method
556
+ (SLBDIM) was presented at [16] for Poisson problems, convection-diffusion
557
+ equations and elliptic PDEs. Another strategy of stability technique for local
558
+ integral methods that uses RBF interpolation functions was presented in [15].
559
+ 4
560
+ Numerical examples on several billiars
561
+ In this section we report two numerical experiments to show the accuracy and
562
+ efficiency of the proposed numerical scheme to solve Helmholtz-type equa-
563
+ tions in two dimensions. Implementations and numerical experiments were
564
+ performed using MATLAB version R2017a numerical calculation software on
565
+ a PC with 7.5 GB of RAM and an Intel Core i7-7500U 7th Generation CPU.
566
+ running at 2.70GHz.
567
+ The reported errors are the standard error L2 (L2-Error)
568
+ L2-Error
569
+ =
570
+
571
+ �N
572
+ i=1(uexac
573
+ i
574
+ −uapprox
575
+ i
576
+ )
577
+ 2
578
+ �N
579
+ i=1(uexac
580
+ i
581
+ )
582
+ 2
583
+ (34)
584
+ and the root mean square error (RMS):
585
+ RMS
586
+ =
587
+
588
+ �N
589
+ i=1(uexac
590
+ i
591
+ −uapprox
592
+ i
593
+ )
594
+ 2
595
+ N
596
+ .
597
+ (35)
598
+ 4.1
599
+ Polygonal billiars: case 1
600
+ This Helmholtz-type PDE is given over the rectangular domain Ω = [−1, 1]×
601
+ [−1, 1]
602
+ � ∆u(x) − k2u(x)
603
+ =
604
+ f(x),
605
+ x = (x, y) ∈ Ω,
606
+ u(x)
607
+ =
608
+ g(x),
609
+ (x, y) ∈ Γ = ∂Ω,
610
+ (36)
611
+ 10
612
+
613
+ where f(x, y) = 2 cos(x2 + y) − (4x2 + 1 + k2)sin(x2 + y) and the parameter
614
+ k = 9. The BCs of this BVP are of the Dirichlet type, the analytical solution
615
+ being u(x, y) = sin(x2+y). In our case, we will use the local integral method
616
+ presented in its original form with Gaussian RBF kernels φ(r) = e−(εr)2 (we
617
+ will call it LBDIM) and in its stabilized form (SLBDIM).
618
+ There are several ways to discretize the Ω domain with distributions of
619
+ nodes. In our case we will use the algorithm for generating quasi-uniform
620
+ distributions developed in [5] for 2D. These distributions were created with
621
+ a fast-forward method that generates a set of nodes from a density function
622
+ starting from the Γ boundary towards the interior of the domain.
623
+ -1
624
+ -0.5
625
+ 0
626
+ 0.5
627
+ 1
628
+ -1
629
+ -0.8
630
+ -0.6
631
+ -0.4
632
+ -0.2
633
+ 0
634
+ 0.2
635
+ 0.4
636
+ 0.6
637
+ 0.8
638
+ 1
639
+ -1
640
+ 1
641
+ -0.5
642
+ 0.5
643
+ 1
644
+ 0
645
+ 0.5
646
+ 0.5
647
+ 0
648
+ 1
649
+ 0
650
+ -0.5
651
+ -0.5
652
+ -1
653
+ -1
654
+ Figure 1: Quasi-uniform 2D node distribution for Nint = 916 internal col-
655
+ location points and Ncol = 124 boundary points with Dirichlet BC (left).
656
+ Analytical solution of BVP (right).
657
+ We compare the L2-Error of the formulation of the LBDIM and the SLB-
658
+ DIM using the Gaussian RBFs in the local interpolations varying the pa-
659
+ rameter in the form ε ∈ [1, 10].
660
+ Figure 2 shows that as ε decreases, the
661
+ accuracy increases but the LBDIM is destabilized and the convergence is
662
+ interrupted all for cases N = 400, 916, 1610, 3604 quasi-uniform nodes. In
663
+ turn, we observe that as we increase the number of nodes on the domain
664
+ and the boundary, the errors decrease. This plot shows that for local in-
665
+ terpolation with Gaussian RBF lead to a loss in accuracy for small shape
666
+ parameters.
667
+ However, the best performance is obtained by the stabilized
668
+ local integral method to address this Helmholtz-type equation with known
669
+ analytical solutions. The error for N = 916, 1610, 3604 is of order 1 × 10−8.
670
+ The application of the RBF-QR kernel makes the system well-posed to solve
671
+ 11
672
+
673
+ them with a direct method in the LBDIM. In this numerical experiment the
674
+ size of the stencil is n = 50.
675
+ 1
676
+ 2
677
+ 3
678
+ 4
679
+ 5
680
+ 6
681
+ 7
682
+ 8
683
+ 9
684
+ 10
685
+ 10 -8
686
+ 10 -6
687
+ 10 -4
688
+ 10 -2
689
+ 10 0
690
+ LBDIM (N=400)
691
+ SLBDIM (N=400)
692
+ LBDIM (N=916)
693
+ SLBDIM (N=916)
694
+ LBDIM (N=1610)
695
+ SLBDIM (N=1610)
696
+ LBDIM (N=3604)
697
+ SLBDIM (N=3604)
698
+ Figure 2: Comparison of the L2-Error between LBDIM and SLBDIM versus
699
+ the shape parameter ε.
700
+ In Figure 3 we show the isolines of the error log10(L2-Error) for the range
701
+ of the shape parameter [1, 10] and for different sizes of stencils n=10:10:100.
702
+ As n increases, the linear systems increase, worsening the conditioning of
703
+ the interpolation matrices. To understand the importance of local stability
704
+ technique, both graphs of this figure must be observed simultaneously. The
705
+ yellow region at the top left shows the region of error instability due to poor
706
+ numerical conditioning while in the isolines of the graphs on the right, the
707
+ region dark blue shows how 1 × 10−8 could be kept in order. As N increases
708
+ from 916 to 3604 this numerical behaviour is similar reading the figure row-
709
+ wise.
710
+ 12
711
+
712
+ -6
713
+ -6
714
+ -6
715
+ -5
716
+ -5
717
+ -5
718
+ -5
719
+ -4
720
+ -4
721
+ -4
722
+ -4
723
+ -3
724
+ -3
725
+ -3
726
+ -3
727
+ -3
728
+ -2
729
+ -2
730
+ -2
731
+ -2
732
+ -2
733
+ -1
734
+ -1
735
+ -1
736
+ 0
737
+ 0
738
+ 2
739
+ 4
740
+ 6
741
+ 8
742
+ 10
743
+ 10
744
+ 20
745
+ 30
746
+ 40
747
+ 50
748
+ 60
749
+ 70
750
+ 80
751
+ 90
752
+ 100
753
+ -6
754
+ -5
755
+ -4
756
+ -3
757
+ -2
758
+ -1
759
+ 0
760
+ -7
761
+ -7
762
+ -6
763
+ -6
764
+ -5
765
+ -5
766
+ -4
767
+ -4
768
+ -3
769
+ -3
770
+ -3
771
+ -2
772
+ -2
773
+ -2
774
+ -1
775
+ 2
776
+ 4
777
+ 6
778
+ 8
779
+ 10
780
+ 10
781
+ 20
782
+ 30
783
+ 40
784
+ 50
785
+ 60
786
+ 70
787
+ 80
788
+ 90
789
+ 100
790
+ -7
791
+ -6
792
+ -5
793
+ -4
794
+ -3
795
+ -2
796
+ -1
797
+ -6
798
+ -6
799
+ -6
800
+ -5
801
+ -5
802
+ -5
803
+ -5
804
+ -4
805
+ -4
806
+ -4
807
+ -4
808
+ -4
809
+ -3
810
+ -3
811
+ -3
812
+ -3
813
+ -3
814
+ -2
815
+ -2
816
+ -2
817
+ -2
818
+ -1
819
+ -1
820
+ -1
821
+ 0
822
+ 0
823
+ 2
824
+ 4
825
+ 6
826
+ 8
827
+ 10
828
+ 10
829
+ 20
830
+ 30
831
+ 40
832
+ 50
833
+ 60
834
+ 70
835
+ 80
836
+ 90
837
+ 100
838
+ -6
839
+ -5
840
+ -4
841
+ -3
842
+ -2
843
+ -1
844
+ 0
845
+ -7
846
+ -7
847
+ -6
848
+ -6
849
+ -5
850
+ -5
851
+ -4
852
+ -4
853
+ -4
854
+ -3
855
+ -3
856
+ -3
857
+ -2
858
+ -2
859
+ -1
860
+ 2
861
+ 4
862
+ 6
863
+ 8
864
+ 10
865
+ 10
866
+ 20
867
+ 30
868
+ 40
869
+ 50
870
+ 60
871
+ 70
872
+ 80
873
+ 90
874
+ 100
875
+ -7
876
+ -6
877
+ -5
878
+ -4
879
+ -3
880
+ -2
881
+ -1
882
+ -6
883
+ -5
884
+ -5
885
+ -5
886
+ -5
887
+ -5
888
+ -4
889
+ -4
890
+ -4
891
+ -4
892
+ -4
893
+ -3
894
+ -3
895
+ -3
896
+ -3
897
+ -2
898
+ -2
899
+ -2
900
+ -1
901
+ -1
902
+ 0
903
+ 0
904
+ 2
905
+ 4
906
+ 6
907
+ 8
908
+ 10
909
+ 10
910
+ 20
911
+ 30
912
+ 40
913
+ 50
914
+ 60
915
+ 70
916
+ 80
917
+ 90
918
+ 100
919
+ -6
920
+ -5
921
+ -4
922
+ -3
923
+ -2
924
+ -1
925
+ 0
926
+ -7
927
+ -7
928
+ -6
929
+ -6
930
+ -5
931
+ -5
932
+ -5
933
+ -4
934
+ -4
935
+ -4
936
+ -3
937
+ -3
938
+ -2
939
+ 2
940
+ 4
941
+ 6
942
+ 8
943
+ 10
944
+ 10
945
+ 20
946
+ 30
947
+ 40
948
+ 50
949
+ 60
950
+ 70
951
+ 80
952
+ 90
953
+ 100
954
+ -7
955
+ -6
956
+ -5
957
+ -4
958
+ -3
959
+ -2
960
+ -1
961
+ Figure 3: Accuracy isolines (log10(L2-Error)) with Nint = 916, 1610, 3604
962
+ interior points varying the shape parameter ε and the stencil size n.
963
+ In [12] this same Helmholtz type PDE is worked with mixed type BC.
964
+ In said work it can be seen that for N = 900 nodes the L2-Error 1 × 10−5
965
+ is reached using the Radial Basis Function - Finite Difference (RBF-FD)
966
+ technique using a kernel hybrid of the Gaussian of type φ(r) = αe−(εr)2 +βr3.
967
+ 13
968
+
969
+ 4
970
+ 6
971
+ 6
972
+ 8
973
+ 8
974
+ 10
975
+ 10
976
+ 12
977
+ 12
978
+ 14
979
+ 14
980
+ 16
981
+ 16
982
+ 18
983
+ 18
984
+ 20
985
+ 1
986
+ 2
987
+ 3
988
+ 4
989
+ 5
990
+ 6
991
+ 7
992
+ 8
993
+ 9
994
+ 10
995
+ 10
996
+ 20
997
+ 30
998
+ 40
999
+ 50
1000
+ 60
1001
+ 70
1002
+ 80
1003
+ 90
1004
+ 4
1005
+ 6
1006
+ 8
1007
+ 10
1008
+ 12
1009
+ 14
1010
+ 16
1011
+ 18
1012
+ 20
1013
+ 4
1014
+ 4
1015
+ 6
1016
+ 6
1017
+ 8
1018
+ 8
1019
+ 8
1020
+ 10
1021
+ 1
1022
+ 2
1023
+ 3
1024
+ 4
1025
+ 5
1026
+ 6
1027
+ 7
1028
+ 8
1029
+ 9
1030
+ 10
1031
+ 10
1032
+ 20
1033
+ 30
1034
+ 40
1035
+ 50
1036
+ 60
1037
+ 70
1038
+ 80
1039
+ 90
1040
+ 3
1041
+ 4
1042
+ 5
1043
+ 6
1044
+ 7
1045
+ 8
1046
+ 9
1047
+ 10
1048
+ 6
1049
+ 6
1050
+ 8
1051
+ 8
1052
+ 8
1053
+ 10
1054
+ 10
1055
+ 12
1056
+ 12
1057
+ 14
1058
+ 14
1059
+ 16
1060
+ 16
1061
+ 18
1062
+ 18
1063
+ 20
1064
+ 20
1065
+ 1
1066
+ 2
1067
+ 3
1068
+ 4
1069
+ 5
1070
+ 6
1071
+ 7
1072
+ 8
1073
+ 9
1074
+ 10
1075
+ 10
1076
+ 20
1077
+ 30
1078
+ 40
1079
+ 50
1080
+ 60
1081
+ 70
1082
+ 80
1083
+ 90
1084
+ 4
1085
+ 6
1086
+ 8
1087
+ 10
1088
+ 12
1089
+ 14
1090
+ 16
1091
+ 18
1092
+ 20
1093
+ 4
1094
+ 4
1095
+ 6
1096
+ 6
1097
+ 6
1098
+ 8
1099
+ 8
1100
+ 8
1101
+ 10
1102
+ 1
1103
+ 2
1104
+ 3
1105
+ 4
1106
+ 5
1107
+ 6
1108
+ 7
1109
+ 8
1110
+ 9
1111
+ 10
1112
+ 10
1113
+ 20
1114
+ 30
1115
+ 40
1116
+ 50
1117
+ 60
1118
+ 70
1119
+ 80
1120
+ 90
1121
+ 3
1122
+ 4
1123
+ 5
1124
+ 6
1125
+ 7
1126
+ 8
1127
+ 9
1128
+ 10
1129
+ 11
1130
+ 12
1131
+ 6
1132
+ 8
1133
+ 10
1134
+ 10
1135
+ 12
1136
+ 12
1137
+ 12
1138
+ 14
1139
+ 14
1140
+ 16
1141
+ 16
1142
+ 18
1143
+ 18
1144
+ 20
1145
+ 20
1146
+ 1
1147
+ 2
1148
+ 3
1149
+ 4
1150
+ 5
1151
+ 6
1152
+ 7
1153
+ 8
1154
+ 9
1155
+ 10
1156
+ 10
1157
+ 20
1158
+ 30
1159
+ 40
1160
+ 50
1161
+ 60
1162
+ 70
1163
+ 80
1164
+ 90
1165
+ 6
1166
+ 8
1167
+ 10
1168
+ 12
1169
+ 14
1170
+ 16
1171
+ 18
1172
+ 20
1173
+ 4
1174
+ 4
1175
+ 6
1176
+ 6
1177
+ 8
1178
+ 8
1179
+ 10
1180
+ 10
1181
+ 1
1182
+ 2
1183
+ 3
1184
+ 4
1185
+ 5
1186
+ 6
1187
+ 7
1188
+ 8
1189
+ 9
1190
+ 10
1191
+ 10
1192
+ 20
1193
+ 30
1194
+ 40
1195
+ 50
1196
+ 60
1197
+ 70
1198
+ 80
1199
+ 90
1200
+ 3
1201
+ 4
1202
+ 5
1203
+ 6
1204
+ 7
1205
+ 8
1206
+ 9
1207
+ 10
1208
+ Figure 4: Condition number isolines (log10(κ(Ai)) with Nint=916,1610,3604
1209
+ interior points varying the shape parameter ε and the stencil size n.
1210
+ In Figure 4 the isolines condition number log10(κ(Ai) is shown.
1211
+ The
1212
+ range of the shape parameter is [1, 10] and the for different sizes of stencils
1213
+ are n=10:10:100. As n increases, the conditioning of the local interpolation
1214
+ matrices increases. The yellow region at the top left shows the region of
1215
+ the condition number up to 1 × 1020. In the isolines of the graphs on the
1216
+ right column, the region dark blue shows better conditioning up to 1 × 1010.
1217
+ This ten order of magnitude are significant when when using linear solvers
1218
+ 14
1219
+
1220
+ numerically. Also we can observe thar as N increases from 916 to 3604 the
1221
+ conditioning behaviour is similar reading the figure row-wise.
1222
+ In Figure 3 it was observed that the error plots suggest smaller values
1223
+ of ε0 for better accuracy, whereas in this figure the condition isolines plots
1224
+ suggest the larger values of ε for better stability. This numerical results are
1225
+ interpreted as the well-known uncertainty principle in RBF local interpola-
1226
+ tions [17]. The idea behind this principle is that one cannot simultaneously
1227
+ achieve good conditioning and high accuracy using RBF basis. The relation
1228
+ between numerical stability and accuracy may be reviewed from different
1229
+ perspectives as in our case to obtain a stable formulation our option was to
1230
+ find a better basis in the same space of approximation using RBF-QR [7] in
1231
+ the local boundary domain integral method.
1232
+ 4.2
1233
+ Polygonal billiars: case 2
1234
+ Consider the following two-dimensional Helmholtz equation
1235
+ � ∆u(x, y) + k2u(x, y)
1236
+ =
1237
+ f(x, y),
1238
+ Ω = [0, 1] × [0, 1],
1239
+ u(x, y)
1240
+ =
1241
+ g(x, y),
1242
+ Γ = ∂Ω,
1243
+ (37)
1244
+ where k2 = 2, f(x, y) = 2x − 4y and the exact solution is given by u(x, y) =
1245
+ sin(
1246
+
1247
+ 3x)sinh(y) + cos(
1248
+
1249
+ 2y) + x − 2y, and g(x, y) is chosen to match the
1250
+ exact one, thus giving BC of type Dirichlet. We use quasi-uniform nodes
1251
+ within the domain and stencils of size n = 25 counting the collocation center
1252
+ as shown in Figure 5.
1253
+ 0
1254
+ 0.2
1255
+ 0.4
1256
+ 0.6
1257
+ 0.8
1258
+ 1
1259
+ 0
1260
+ 0.1
1261
+ 0.2
1262
+ 0.3
1263
+ 0.4
1264
+ 0.5
1265
+ 0.6
1266
+ 0.7
1267
+ 0.8
1268
+ 0.9
1269
+ 1
1270
+ 0
1271
+ 0.2
1272
+ 0.4
1273
+ 0.6
1274
+ 0.8
1275
+ 1
1276
+ 0
1277
+ 0.1
1278
+ 0.2
1279
+ 0.3
1280
+ 0.4
1281
+ 0.5
1282
+ 0.6
1283
+ 0.7
1284
+ 0.8
1285
+ 0.9
1286
+ 1
1287
+ Figure 5: Quasi-uniform node distribution with N = 900 interior nodes (left).
1288
+ Stencil node sets with n = 25 (right).
1289
+ 15
1290
+
1291
+ In Table 1 we show the accuracy of the SLBDIM for the shape parameter
1292
+ ε = 1 and for a range of low values, ε ∈ {1 × 100, 1 × 10−1, 1 × 10−2, 1 ×
1293
+ 10−3, 1 × 10−4, 1 × 10−5}. The number of quasi-uniform interior points of
1294
+ the domain, N, varies from 121 to 900. It can be seen that for fixed ε = 1,
1295
+ the ´orders of magnitude decrease from 1 × 10−6 to 1 × 10−8 starting at 441
1296
+ nodes. In turn, the convergence of the method is observed for low values of
1297
+ the shape parameter, reaching RMS of the order 1 × 10−8 from 225 nodes.
1298
+ The ε shown is where the best error is reached in that range.
1299
+ N
1300
+ SLBDIM
1301
+ SLBDIM
1302
+ ϵ
1303
+ RMS
1304
+ low ϵ
1305
+ RMS
1306
+ 121
1307
+ 1.0
1308
+ 1.2028E-06
1309
+ 0.1
1310
+ 2.1405E-07
1311
+ 225
1312
+ 1.0
1313
+ 5.8570E-07
1314
+ 0.1
1315
+ 5.0834E-08
1316
+ 361
1317
+ 1.0
1318
+ 3.9338E-07
1319
+ 0.01
1320
+ 3.3821E-08
1321
+ 441
1322
+ 1.0
1323
+ 7.8581e-08
1324
+ 0.1
1325
+ 3.3866E-08
1326
+ 530
1327
+ 1.0
1328
+ 5.2907E-08
1329
+ 0.00001
1330
+ 3.5984E-08
1331
+ 628
1332
+ 1.0
1333
+ 4.3843E-08
1334
+ 0.00001
1335
+ 3.6887E-08
1336
+ Table 1: RMS for low shape parameters ε ∈ {1 × 10−1, . . . , 1 × 10−5}.
1337
+ In [11] this differential problem with mixed BC over the same domain
1338
+ is investigated using Multiquadric RBF kernels ϕ(r, ε) =
1339
+
1340
+ 1 + (εr)2 and a
1341
+ new RBF with N ∈ [50, 350] placement points. The results obtained in said
1342
+ reference reach errors of the order of 1 × 10−5 for ε ∈ [0.4].
1343
+ 5
1344
+ Summary
1345
+ In this work we have introduced a new local integral method to compute reso-
1346
+ nances in dielectric cavities with different shapes. We have discussed numer-
1347
+ ical solutions, the node quasi-uniform node distributions over the domains
1348
+ and cavities with corners. Numerical results for Helmholtz-type equations
1349
+ were obtained using a stabilized local integral method that uses interpola-
1350
+ tions with RBF Gaussians. This method does not depend on a mesh, so it
1351
+ can be easily adapted to problems with complex geometries from . The good
1352
+ performance of the method has been shown with good results as shown in
1353
+ numerical tests 1 and 2 comparing with other results in the literature. Test 1
1354
+ shows the advantage of using the SLBDIM to find regions of convergence of
1355
+ the L2-Error of the order 1×10−8 when the shape parameter approaches zero.
1356
+ 16
1357
+
1358
+ In test 2, a low shape parameter range is studied reaching the same order of
1359
+ the RMS. Having investigated the computational efficiency of the method,
1360
+ the future work consists of approaching some applications in wave chaos and
1361
+ dielectric microresonators, which is adequate to deal with geometries that
1362
+ come from arbitrary domains without analytical solutions.
1363
+ References
1364
+ [1] C. Brebbia and D. Dominguez. Boundary Elements. An Introductory
1365
+ Course. 2nd Ed. WIT Press, Computational Mechanics Publications,
1366
+ Southampton and Boston, 1998.
1367
+ [2] H. Cao and J. Wiersig. Dielectric microcavities: Model systems for wave
1368
+ chaos and non-hermitian physics. Reviews of Modern Physics, 87:61–111,
1369
+ 2015.
1370
+ [3] G. Fasshauer. Meshfree Approximation Methods with MATLAB. World
1371
+ Scientific Publishing Co., Hackensack, NJ, USA, 2007.
1372
+ [4] G. Fasshauer and M. McCourt. Kernel-based Approximation Methods
1373
+ using MATLAB. World Scientific Publishing Co., Hackensack, NJ, USA,
1374
+ 2015.
1375
+ [5] B. Fornberg and N. Flyer. Fast generation of 2-D node distributions
1376
+ for mesh-free PDE discretizations. Computers and Mathematics with
1377
+ Applications, 69:531–544, 2015.
1378
+ [6] B. Fornberg and N. Flyer. A Primer on Radial Basis Functions with Ap-
1379
+ plications to the Geosciences. Society for Industrial and Applied Math-
1380
+ ematics, Philadelphia, PA, USA, 2015.
1381
+ [7] B. Fornberg, E. Larsson, and N. Flyer. Stable Computations with Gaus-
1382
+ sian Radial Basis Functions. SIAM Journal of Scientific Computing,
1383
+ 33:869–892, 2011.
1384
+ [8] M. Greenberg. Applications of Green’s Functions in Science and Engi-
1385
+ neering. Dover Publications, Mineola, New York, 2015.
1386
+ 17
1387
+
1388
+ [9] D. Kaufman, I. Kosztin, and K. Schulten. Expansion method for station-
1389
+ ary states of quantum billiards. American Journal of Physics, 67:133–
1390
+ 141, 1999.
1391
+ [10] E. Larsson, E. Lehto, A. Heryudono, and B. Fornberg. Stable Compu-
1392
+ tation of Differentiation Matrices and Scattered Node Stencils on Gaus-
1393
+ sian Radial Basis Functions. SIAM Journal of Scientific Computating,
1394
+ 35:A2096–A2119, 2013.
1395
+ [11] J. Lin, W. Chen, and K. Sze. A new radial basis function for helmholtz
1396
+ problems. Engineering Analysis with Boundary Elements, 36(12):1923–
1397
+ 1930, 2012.
1398
+ [12] P. Mishra, G. Fasshauer, M. Sen, and L. Ling. A stabilized radial basis-
1399
+ finite difference (RBF-FD) method with hybrid kernels. Computers &
1400
+ Mathematics with Applications, 77(9):2354–2368, 2019.
1401
+ [13] P. Partridge and C. B. andL.C. Wrobel. The Dual Reciprocity Boundary
1402
+ Element Method. Computational Mechanics Publications co-published
1403
+ with Elsevier Applied Science, Southampton Boston, 1992.
1404
+ [14] L. Ponzellini Marinelli. Estabilidad num´erica de un m´etodo local inte-
1405
+ gral basado en funciones de base radial para problemas de valores de
1406
+ contorno. Universidad Nacional de Rosario, 2021:164 p´aginas, 2021.
1407
+ [15] L. Ponzellini Marinelli. Stabilizing radial basis functions techniques for
1408
+ a local boundary integral method.
1409
+ Revista de la Uni´on Matem´atica
1410
+ Argentina, 64:in press, 2021.
1411
+ [16] L. Ponzellini Marinelli, N. Caruso, and M. Portapila. A stable com-
1412
+ putation on local boundary-domain integral method for elliptic PDE.
1413
+ Mathematics and Computers in Simulation, 180:379–400, 2021.
1414
+ [17] R. Schaback. Error estimates and condition numbers for Radial Basis
1415
+ Function interpolants. Advances in Computational Mathematics, 3:251–
1416
+ 264, 1995.
1417
+ [18] H.-J. St¨ockmann. Quantum Chaos: An Introduction. Cambridge Uni-
1418
+ versity Press, Cambridge, UK, 1999.
1419
+ 18
1420
+
1421
+ [19] L. Trefethen. Spectral Methods in Matlab. Society for Industrial and
1422
+ Applied Mathematics, Philadelphia, PA, USA, 2000.
1423
+ [20] J. Wiersig. Boundary element method for resonances in dielectric mi-
1424
+ crocavities.
1425
+ Journal of Optics A: Pure and Applied Optics, 5:53–60,
1426
+ 2003.
1427
+ 19
1428
+
ANAyT4oBgHgl3EQfRffl/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
AdAzT4oBgHgl3EQfhf3-/content/tmp_files/2301.01487v1.pdf.txt ADDED
@@ -0,0 +1,1594 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Automated Misconfiguration Repair of Configurable
2
+ Cyber-Physical Systems with Search: an Industrial
3
+ Case Study on Elevator Dispatching Algorithms
4
+ Pablo Valle
5
+ Mondragon University
6
+ Mondragon, Spain
7
8
+ Aitor Arrieta
9
+ Mondragon University
10
+ Mondragon, Spain
11
12
+ Maite Arratibel
13
+ Orona
14
+ Hernani, Spain
15
16
+ Abstract—Real-world Cyber-Physical Systems (CPSs) are usu-
17
+ ally configurable. Through parameters, it is possible to configure,
18
+ select or unselect different system functionalities. While this
19
+ provides high flexibility, it also becomes a source for failures
20
+ due to misconfigurations. The large number of parameters these
21
+ systems have and the long test execution time in this context
22
+ due to the use of simulation-based testing make the manual
23
+ repair process a cumbersome activity. Subsequently, in this
24
+ context, automated repairing methods are paramount. In this
25
+ paper, we propose an approach to automatically repair CPSs’
26
+ misconfigurations. Our approach is evaluated with an industrial
27
+ CPS case study from the elevation domain. Experiments with a
28
+ real building and data obtained from operation suggests that our
29
+ approach outperforms a baseline algorithm as well as the state of
30
+ the practice (i.e., manual repair carried out by domain experts).
31
+ Index Terms—Cyber-Physical Systems, Repair, Debugging,
32
+ Configurable Systems.
33
+ I. INTRODUCTION
34
+ Cyber-Physical Systems combine digital cyber computa-
35
+ tions with parallel physical processes [1]–[3]. In such sys-
36
+ tems, digital technologies, such as computational units, low
37
+ and high-level software and communication protocols interact
38
+ among them to control a physical process through sensors and
39
+ actuators [1]. In practice, most CPSs deal with parameters.
40
+ For instance, a heavy duty lifting system involved more than
41
+ 2,000 configuration parameters [4]. The behavior of CPSs can
42
+ significantly change depending on these parameters. This often
43
+ causes misconfigurations, even when selecting parameters that
44
+ are within the ranges provided by the manufacturer [5]. A
45
+ recent study showed that 19.6% of UAV-specific bugs were
46
+ caused by parameters [6]. Garcia et al. [7] found that 27.25%
47
+ of autonomous vehicle bugs were caused by incorrect con-
48
+ figurations. In our industrial case study, which involves the
49
+ traffic dispatching algorithm of a system of elevators, around
50
+ 55% of the issues assigned to the traffic team are solved
51
+ through configuration changes. Therefore, it is paramount to
52
+ leverage automated and scalable techniques to automatically
53
+ repair CPS misconfigurations. However, this involves four core
54
+ challenges:
55
+ 1) Challenge 1 – Expensive execution of the tests: It
56
+ is well-known that executing CPS tests is highly time-
57
+ consuming [8]–[15]. This is because, as the execution
58
+ of tests is carried out at system level, CPSs involve
59
+ compute-intensive models to simulate the physical part of
60
+ the system (e.g., models of electrical engines, dynamics
61
+ of a system). This makes the computation of the fitness
62
+ to assess how close the algorithm is from repairing the
63
+ misconfiguration expensive. For instance, in our industrial
64
+ case study, executing a test case takes around 5 minutes.
65
+ 2) Challenge 2 – Large configuration space: Since con-
66
+ figurable CPSs involve many parameters, the amount of
67
+ possible configurations that a CPS can have is huge.
68
+ Subsequently, testing all of these configurations is compu-
69
+ tationally unfeasible [16]–[21]. Furthermore, it is usually
70
+ unknown which the reason (i.e., the parameters) that
71
+ causes the misconfiguration is.
72
+ 3) Challenge 3 – Multiple requirements: Multiple fail-
73
+ ing requirements may exist. Some of them might be
74
+ independent from one-another [15], while others may be
75
+ conflicting (e.g., in our case study, better energy con-
76
+ sumption could lead to passengers needing to wait more).
77
+ Therefore, the repair algorithm shall be approached as a
78
+ many-objective optimization problem.
79
+ 4) Challenge 4 – Prioritize severe failures: The repair
80
+ technique needs to resolve failures in their order of sever-
81
+ ity [15]. For instance a test case that shows a passengers’
82
+ average waiting time (AWT) of 55 seconds is more
83
+ critical than one showing 35 seconds. Therefore, similar
84
+ to other CPS repairing techniques [15], our algorithm
85
+ shall give priority to more critical test cases over the less
86
+ critical ones.
87
+ On the one hand, there are approaches that target the prob-
88
+ lem of repairing misconfigurations [22], [23] of configurable
89
+ software. However, such approaches only cover the second
90
+ aforementioned challenge. On the other hand, Swarmbug [24]
91
+ focuses on repairing misconfigurations of swarm robots, which
92
+ can be considered CPSs. However, Swarmbug [24] solely
93
+ focuses on one specific objective (e.g., not crashing), therefore,
94
+ not tackling the third and fourth challenges that our industrial
95
+ case study requires.
96
+ arXiv:2301.01487v1 [cs.SE] 4 Jan 2023
97
+
98
+ In this paper we propose an automated repairing approach
99
+ specifically targeting CPSs’ misconfigurations. Specifically,
100
+ we tackle this by recasting the misconfiguration repair problem
101
+ to that of a many-objective search problem. To deal with
102
+ the aforementioned first challenge, we propose an algorithm
103
+ that follows a single population-based approach. Multiple
104
+ population-based algorithms, such as genetic algorithms, are
105
+ not appropriate for this context because the repair process
106
+ requires interaction with the simulator for executing test cases.
107
+ Such algorithms require a large population, and the large test
108
+ execution time would lead the algorithm to require too much
109
+ time to converge. This could eventually lead to scalability is-
110
+ sues in the context of CPSs. To deal with the second challenge,
111
+ our repairing approach implements a strategy that permits
112
+ measuring the suspiciousness of each parameter. This permits,
113
+ as the search process evolves, increasing the probability of
114
+ selecting suspicious parameters to provide a new patch. As a
115
+ result, in the beginning of the search, our approach focuses
116
+ on exploring which the critical parameters can be. As the
117
+ search evolves, the algorithm starts to focus on the exploitation
118
+ by targeting suspicious parameters. To deal with the third
119
+ challenge, our approach includes a Pareto-optimal archive-
120
+ based strategy to select and evolve potential misconfiguration
121
+ patches. This permits focusing on more than one requirement
122
+ at the same time when repairing the misconfiguration. To deal
123
+ with the last challenge, search objectives are prioritized based
124
+ on their severity level.
125
+ Our main contributions can be highlighted as follows:
126
+ 1) We propose a scalable and automated approach to repair
127
+ misconfigurations in CPSs.
128
+ 2) We integrate the approach with an industrial case study
129
+ from Orona, one of the largest elevator companies in
130
+ Europe. The case study involves the traffic dispatching
131
+ algorithm, a highly configurable software system.
132
+ 3) We empirically evaluate our approach by using a real
133
+ scenario in which Orona’s engineers had to manually
134
+ intervene in the misconfiguration repair process. Our
135
+ repairing technique not only outperforms a baseline al-
136
+ gorithm, but also the manually derived repairing patches
137
+ by Orona’s domain experts.
138
+ 4) We extract key lessons learned from the application of
139
+ our approach in an industrial case study, and provide ap-
140
+ plicability guidelines in order our approach to be adopted
141
+ by other CPS developers.
142
+ The rest of the paper is structured as follows: Section II
143
+ explains our industrial case study, how the testing is carried out
144
+ and why misconfigurations occur. In Section III we present our
145
+ approach to repair misconfigurations in our industrial context.
146
+ Section IV presents how we evaluated our approach. We ex-
147
+ tract key lessons learned and we explain the required changes
148
+ in our approach to be applied in other CPSs in Section V.
149
+ We position our work with relevant studies in Section VI. We
150
+ conclude and present future work in Section VII.
151
+ II. INDUSTRIAL CASE STUDY
152
+ Our repair algorithm is applied in an industrial case study
153
+ from the elevation domain. This section explains the different
154
+ details of the case study.
155
+ The Cyber-Physical System: Figure 1 shows an overview
156
+ of the CPS. A system of elevators is a complex CPS, whose
157
+ goal is to transport passengers from one floor to another safely
158
+ while trying to provide the highest comfort as possible. In this
159
+ system, a passenger registers a call in a floor by pushing a call
160
+ button. This information is transferred to the traffic master
161
+ through a Controller Area Network (CAN) bus. The traffic
162
+ master, after collecting other CPS information (e.g., position of
163
+ each elevator, elevator occupancy), assigns one of the available
164
+ elevators to each active call. This assignation can be carried
165
+ out through different objectives (e.g., reducing the passengers’
166
+ waiting times, reducing energy consumption). When the call
167
+ is assigned, the elevator attends the passenger.
168
+ Elevator 1
169
+ Elevator 2
170
+ Elevator 3
171
+ Floor 1
172
+ Floor 2
173
+ Floor N
174
+ Controller Area Network
175
+ Controller 1
176
+ Controller 2
177
+ Controller 3
178
+ Traffic Master (SUT)
179
+ Fig. 1: Overview of our industrial case study
180
+ The System Under Test (SUT): Our SUT is the traffic
181
+ dispatching algorithm (i.e., dispatcher), which is an important
182
+ module inside the traffic master. To deal with different func-
183
+ tionalities and priorities, the dispatcher is highly configurable
184
+ through parameters. Different traffic dispatching algorithms
185
+ exist in Orona, and each of them encompasses one config-
186
+ uration file. The number of potential configurations of each
187
+ dispatcher is over trillions.
188
+ Test Executions: Three different phases are undertaken
189
+ when testing the dispatching algorithm [25], [26]: the
190
+ Software-in-the-Loop (SiL), the Hardware-in-the-Loop (HiL)
191
+ and Operation. Our algorithm is designed for the first phase,
192
+ i.e., the SiL test level. At this stage, a domain-specific
193
+ simulator, i.e., Elevate1, takes as input (1) the dispatching
194
+ algorithm’s executable, (2) the building installation, (3) the
195
+ configuration ��le and (4) the passenger file. The passenger
196
+ file is considered the test input, and it involves a set of
197
+ 1https://peters-research.com/index.php/elevate/
198
+
199
+ passengers traveling through different floors in a building.
200
+ Each passenger has different attributes, such as, its arrival
201
+ time (i.e., time at which the passenger arrives to the floor
202
+ and pushes the button), arrival floor (i.e., floor at which the
203
+ passenger arrives), destination floor (i.e., floor at which the
204
+ passenger is traveling to), passenger weight, etc. When a test
205
+ is executed, Elevate returns a file with the results of the
206
+ simulation (e.g., waiting time required by each passenger, their
207
+ traveling time, energy consumption, distance traveled by each
208
+ elevator). This information is parsed and the necessary test
209
+ oracles are employed to assess the quality of the execution of
210
+ the test.
211
+ Functional performance requirements: When executing
212
+ test cases, besides considering certain functional require-
213
+ ments, we focus on “functional performance requirements”.
214
+ Functional performance is defined as “the properties derived
215
+ indirectly from the output of the system, rather than the
216
+ system’s efficient usage of the computational resources” [26].
217
+ These properties are directly employed for evaluating the
218
+ functional performance requirements of Orona’s dispatching
219
+ algorithms. The properties involve metrics from the elevator
220
+ traffic domain, such as the Average Waiting Time (AWT) of
221
+ passengers, the Average Transit Time (ATT) of passengers,
222
+ Longest Waiting Time (LWT), Longest Transit Time (LTT),
223
+ number of engine starts, traveled distance by each elevator
224
+ or consumed energy. Note that configuration changes affect
225
+ functional performance requirements, whereas functional re-
226
+ quirements (e.g., ensuring that reverse journeys do not take
227
+ place) are, in principle, not affected by such changes.
228
+ Why misconfigurations occur and how they are handled:
229
+ The dispatcher has different parameters to accommodate dif-
230
+ ferent functionalities that have a direct impact on the CPS per-
231
+ formance. However, it is noteworthy that a configuration may
232
+ perform well in one installation of elevators, while not well
233
+ in another one, causing a misconfiguration. This is because
234
+ the performance of a system of elevators largely depends on
235
+ (1) the type of building and its composition and (2) how its
236
+ traffic flow is. Regarding the former, the performance can vary
237
+ depending on aspects like number of elevators in a building,
238
+ the number of floors the building has, whether all elevators
239
+ attend all floors or not, etc. For some types of buildings, some
240
+ configurations are more appropriate than others. As for the
241
+ latter, the traffic is also different depending on the type of
242
+ buildings. For instance, the traffic flow is completely different
243
+ in a hospital and in a residential building. While in a hospital
244
+ inter-floor travels are common, in a residential building most
245
+ of the calls are from the base floor to the floor where the
246
+ apartment is and vice-versa. When a system of elevators shows
247
+ a poor performance, its traffic flow is reproduced at the SiL
248
+ test level to debug and try to improve its performance through
249
+ changing parameters. If a new set of parameters improves
250
+ the system performance, then, the original configuration is
251
+ considered a misconfiguration. It is important to note that
252
+ in our industrial case study, a misconfiguration might not be
253
+ detected nor foreseen before the system is in operation due to
254
+ the CPS exposition to uncertainty [27], [28].
255
+ III. CPS MISCONFIGURATION REPAIR METHOD
256
+ Algorithm 1 shows an overview of our repairing algo-
257
+ rithm. The algorithm takes as input (1) a faulty configu-
258
+ ration file C, composed of N number of parameters, i.e.,
259
+ C = {p1, p2, ..., pN}; and (2) a test suite, composed of M
260
+ failing test cases, i.e., TS = {tc1, tc2, ..., tcM}. The first step
261
+ of the algorithm consists on assessing the failing configuration
262
+ file, where all the parameter values are parsed (Line 1) and
263
+ all test cases are executed (Line 2). When the failing test
264
+ suite is executed, the values returned by the oracle are used to
265
+ initialize the Archive (Line 3) and the suspiciousness scores
266
+ of parameters initialized (Line 4). After that, the algorithm
267
+ enters into a while loop (Lines 5-11) that ends when the
268
+ termination criteria are met. These criteria involve (1) fixing
269
+ the misconfiguration or (2) exceeding the running time.
270
+ Algorithm 1: Overview of our search-based repairing
271
+ algorithm
272
+ Input: C //Faulty Configuration file
273
+ TS //Test Suite
274
+ Output: Archive //Archive containing improved
275
+ configurations
276
+ 1 Patch0 ← getValues(C);
277
+ 2 InitialScore← executeTestSuite(Patch0, TS);
278
+ 3 Archive ← saveToArchive(Patch0, InitialScore);
279
+ 4 Susp ← initSusp();
280
+ 5 while terminationCriteriaNotMet do
281
+ 6
282
+ Parent ← selectAParentArchive(Archive);
283
+ 7
284
+ Patch1 ← generatePatch(Parent,Susp);
285
+ 8
286
+ Score ← executeTestSuite(Patch1, TS);
287
+ 9
288
+ Susp ← updateSusp(Patch1, Parent, Score,
289
+ ScoreParent);
290
+ 10
291
+ Archive ← saveToArchive(Patch1, Score);
292
+ 11 end
293
+ 12 return Archive;
294
+ Inside this while loop, the first step consists in selecting a
295
+ solution from the Archive (Line 6), which will be the parent.
296
+ The solution is selected pure randomly. With the selected
297
+ solution, a potential patch is proposed (Line 7), which consists
298
+ of changing one or more parameters from the parent solution
299
+ (Section III-A). This patch is assessed by executing the failing
300
+ test suite (Line 8), and the test execution results are obtained
301
+ and stored as Scores (Section III-B). In a fourth step, the
302
+ suspiciousness score of each parameter is recalculated (Line
303
+ 9, Section III-C). Lastly, the Archive is updated (Line 10,
304
+ Section III-D).
305
+ A. Patch generation
306
+ A patch in our context refers to a mutation of at least one
307
+ parameter. Algorithm 2 shows our algorithm for proposing a
308
+ potential patch. As input, it receives (1) a parent configuration,
309
+ which corresponds to one configuration in the archive of the
310
+ algorithm and (2) the suspiciousness ranking of all parameters.
311
+ First, a parameter to be mutated is selected (Line 4) based on
312
+
313
+ the suspiciousness of each parameter (see Section
314
+ III-C for
315
+ more details on how to compute the suspiciousness score).
316
+ The higher the suspiciousness, the higher the probability of
317
+ being selected. The parameter to be mutated is obtained by
318
+ employing Algorithm 3. The selected parameter is mutated
319
+ (Line 5) by giving a random value within its ranges. After
320
+ this, it is decided whether a new parameter is mutated (Line
321
+ 8). The probability of mutating a new parameter decreases as
322
+ the number of mutated parameters in the new patch increases.
323
+ We ensure that one parameter is not mutated more than once.
324
+ Algorithm 2: Patch generation algorithm
325
+ Input: Parent //Faulty Configuration
326
+ SuspRanking //Suspiciousness Ranking
327
+ Output: Patch //Mutated Configuration
328
+ 1 numOfMutParams ← 0;
329
+ 2 Patch ← Parent;
330
+ 3 do
331
+ 4
332
+ varToMutate ← selectParam(SuspRanking);
333
+ 5
334
+ Patch ← mutate(Patch,varToMutate);
335
+ 6
336
+ numOfMutParams ← numOfMutParams +1;
337
+ 7
338
+ p ← rand(); //returns random value 0 to 1
339
+ 8 while p < 0.5numOfMutatedP arams;
340
+ 9 return Patch;
341
+ Algorithm 3: Suspiciousness-based parameter selec-
342
+ tion algorithm
343
+ Input: SuspScore = {ss1, ss2, ..., ssN}
344
+ Output: selected //Index of the selected parameter
345
+ 1 total ← �N
346
+ i=1(ssi);
347
+ 2 iterativeSum←0;
348
+ 3 prob ← [];
349
+ 4 for i ← 1 to nPop do
350
+ 5
351
+ prob[i] ← iterativeSum + SuspScore[i]/total;
352
+ 6
353
+ iterativeSum←prob[i];
354
+ 7 end
355
+ 8 prob←orderAscending(prob);
356
+ 9 r←rand();//Returns random number 0 to 1
357
+ 10 j←0;
358
+ 11 selected=N;
359
+ 12 while j<N and selected==N do
360
+ 13
361
+ if r<prob[j] then
362
+ 14
363
+ selected←j;
364
+ 15
365
+ j←j+1;
366
+ 16 end
367
+ 17 return parameter(selected); //translates index of
368
+ selected to parameter ID
369
+ B. Test suite execution
370
+ After the patch is generated, this needs to be assessed. We
371
+ assess each patch by re-executing all test cases in the test
372
+ suite that have failed. We do not execute the passing test cases
373
+ because executing such test cases would significantly increase
374
+ the computational time of our approach. Furthermore, for the
375
+ sake of increasing the efficiency of our repair algorithm, the
376
+ process of executing test cases is parallelized. When executing
377
+ the test suite, test oracles assess the performance of the system.
378
+ In our context, similar to other approaches [8]–[11], [14], [15],
379
+ [29], test oracles not only provide a boolean verdict (i.e., Pass
380
+ or Fail), but also a confidence value. The lower the value, the
381
+ lower the performance of the CPS in terms of the assessed
382
+ property by such test oracle.
383
+ These oracles’ confidence values are used as search objec-
384
+ tives to guide the repair algorithm towards finding effective
385
+ patches. For repairing a CPS, a total of k test oracles may exist.
386
+ Each of these k oracles acts as an individual objective function
387
+ in the repair algorithm. For each test case (tc) in the failing
388
+ test suite (TS), each of these k oracles returns its confidence
389
+ value, i.e., Conf(tc, oi) ∈ [−1, 0], where oi is the i-th
390
+ oracle. -1 means that the severity of the failure is the highest
391
+ contemplated one, whereas 0 means that the oracle has passed.
392
+ The repair algorithm aims at maximizing that confidence
393
+ value. Therefore, after executing all test cases in TS, similar
394
+ to Abdessalemm et al., [15], we obtain the minimum value for
395
+ each of the test oracles (i.e., the most severe value), converting
396
+ the repair problem in a many-objective optimization problem
397
+ that gives priority to the most severe failures, such that:
398
+
399
+
400
+
401
+
402
+
403
+ max Oracle1(Patch) = min
404
+ tc∈T S{Conf(tc, o1)}
405
+ ...
406
+ max Oraclek(Patch) = min
407
+ tc∈T S{Conf(tc, ok)}
408
+ (1)
409
+ As previously explained, executing a test in the context
410
+ of CPSs is time consuming. Previous studies using compute-
411
+ intensive CPSs have leveraged surrogate models to accelerate
412
+ the generation of test cases [8], [10], [13], [14]. That is,
413
+ after a set of test executions, a model is trained with test
414
+ results, and this model is employed as a substitute of the
415
+ simulation-based test execution. This permits accelerating the
416
+ generation of test cases. While we considered to use surrogate
417
+ models to accelerate the repair process, we noticed that too
418
+ many simulations were required to obtain a reliable surrogate
419
+ model. Unlike previous approaches [8], [10], [13], [14], which
420
+ only use the dimension of the test input, configurable CPSs
421
+ also need to consider the dimension of parameters, which
422
+ makes it harder to train a surrogate model. After carrying out
423
+ a preliminary evaluation with our industrial case study, we
424
+ noticed that the required time to obtain data for building a
425
+ reliable surrogate model was similar or even higher than the
426
+ time required by our repair algorithm to converge. Therefore,
427
+ the option of using a surrogate model to accelerate the repair
428
+ process was discarded.
429
+ C. Measuring parameter suspiciousness
430
+ Based on analyzing the behavior of our industrial case
431
+ study, and by interviewing domain experts, we noticed that
432
+ some parameters have a higher influence than others on the
433
+ system performance. Therefore, we implement a mechanism
434
+ to measure the suspiciousness of each parameter in C. The
435
+
436
+ suspiciousness provides a score between 0 and 1, where the
437
+ higher the suspiciousness, the higher the likelihood of the
438
+ parameter having an influence in the system performance. The
439
+ ultimate goal of this strategy is to give a higher probability of
440
+ being mutated to those parameters having an influence in the
441
+ system performance.
442
+ All configurable parameters start with the same suspicious-
443
+ ness score, which is 0.5. This suspiciousness remains un-
444
+ changed until the parameter is mutated by the Patch generation
445
+ algorithm for Nsusp times (we employed Nsusp = 5 in our
446
+ experiments). This permits the algorithm to focus on the
447
+ exploration phase at the beginning of the search process, while
448
+ focusing on the exploitation as the search process evolves.
449
+ Every time a parameter is mutated by the Patch generation
450
+ algorithm, after assessing the patch, we extract whether the
451
+ parameter had (1) a positive impact on the performance of the
452
+ system, (2) a negative impact on the performance of the system
453
+ or (3) no impact at all. A positive impact of a parameter pi
454
+ is considered when the patch is non-dominated by any other
455
+ patch in the system based on the test results. A negative impact
456
+ of a parameter pi is considered when the patch is dominated
457
+ by the solutions in the archive (i.e., including its original
458
+ parent). The patch does not have any impact for a parameter
459
+ pi when the result of the test shows the same performance
460
+ as its original parent. After a parameter pi is selected Nsusp
461
+ times, its suspiciousness starts to be computed as follows:
462
+ susp(pi) =
463
+ Ppi + Npi
464
+ Ppi + Npi + Spi
465
+ (2)
466
+ where Ppi is the number of times that parameter pi had a
467
+ positive impact, Npi is the number of times that the parameter
468
+ pi had a negative impact and Spi is the number of times that
469
+ the parameter pi had no impact at all.
470
+ Notice that either the positive or the negative impact in-
471
+ crease the suspiciousness of a particular parameter. This is
472
+ because the patch is proposed by mutating the value of a pa-
473
+ rameter by another random value within its ranges. Therefore,
474
+ another value in a parameter that previously had a negative
475
+ impact may have a positive impact on the CPS performance.
476
+ Based on our analysis, the suspiciousness of the parameters
477
+ in the context of CPSs is, in principle, unknown, even with
478
+ domain expertise. This is, to a large extent, because CPSs
479
+ highly depend on the context at which they operate. For
480
+ instance, in the case of our industrial case study, a parameter
481
+ can have a large impact on the performance of the CPS
482
+ depending on the type of building (e.g., parameters may
483
+ behave differently in a residential building with 2 elevators
484
+ or in a hospital building with 4 elevators). For this reason, we
485
+ assume there is no prior knowledge of the impact a parameter
486
+ may have in the context of a CPS. However, our approach
487
+ for measuring the suspiciousness of parameters can easily be
488
+ extended to other strategies (e.g., providing the algorithm with
489
+ an initial suspiciousness score for each of the parameters in
490
+ the configuration).
491
+ D. Updating the Archive
492
+ Our algorithm uses an archive encompassing non-dominated
493
+ solutions that are generated by including patches. The first
494
+ configuration file being updated in the archive is the misconfig-
495
+ uration provoking the failure. After assessing a patch (Patch1)
496
+ by executing the failing test suite, the archive needs to be
497
+ updated. Such patch is compared with the rest of solutions
498
+ in the archive. The comparison is based on the notion of
499
+ dominance, and similar to other studies [15], the archive is
500
+ updated as follows:
501
+ 1) If Patch1 dominates at least one solution in the archive,
502
+ Patch1 is included in the archive, and the dominated
503
+ solutions are removed.
504
+ 2) If no element in the archive dominates Patch1, but
505
+ Patch1 is neither dominated by any solution in the
506
+ archive, Patch1 is included in the archive.
507
+ 3) The archive remains unchanged if Patch1 is dominated
508
+ by at least one solution in the archive.
509
+ By following this strategy, there is some risk that the archive
510
+ increases in size. This would lead the algorithm to need much
511
+ more time to converge. To overcome this problem, if the
512
+ archive exceeds certain size, we remove solutions from it.
513
+ Same as Abdessalem et al., [15], the maximum size of our
514
+ archive is limited to 2 × k, k being the number of oracles.
515
+ However, unlike [15], instead of randomly removing the
516
+ solution from the archive, we removed the solution which had
517
+ the longest Average Waiting Time (AWT). This decision was
518
+ taken because in the elevation domain, this is the main metric
519
+ used to assess the performance of a dispatching algorithm [30].
520
+ If two or more solutions encompassed the same highest AWT,
521
+ the choice is random among those two solutions.
522
+ E. Stopping criteria
523
+ The repair process stops given two criteria: (1) all test cases
524
+ in TS pass, i.e., all oracles in all test cases return the 0
525
+ value; or (2) the search budget is exceeded (i.e., repairing
526
+ time was exceeded). If the latter happens, it might be the case
527
+ where the test cases are too demanding. Therefore, the repair
528
+ process would be converted into a parameter optimization
529
+ problem. For instance, by analyzing our industrial case study
530
+ with the elevator dispatching algorithm, we noticed that some
531
+ test inputs may encompass too many passenger calls in a short
532
+ time window. In such cases, the CPS may enter in a saturation
533
+ state, where the only solution would be to include additional
534
+ elevators to better attend calls, something that is out of the
535
+ scope of the dispatching algorithm’s competence.
536
+ F. Decision maker
537
+ When the repairing algorithm stops due to the search budget
538
+ being exceeded, there might be a high probability that more
539
+ than one solution exists in the Archive. In such a case,
540
+ a decision maker (DM) with certain rules would need to
541
+ select one of the solutions and propose it as a patch. This
542
+ decision maker is, in our case, domain-specific. The DM
543
+ was a rule-based algorithm that was designed by involving
544
+ domain experts in the process. The specified thresholds are
545
+
546
+ configurable because some thresholds may be valid in certain
547
+ buildings but not in others. The algorithm follows the next
548
+ procedure to decide which patch to propose:
549
+ 1) It first selects all patches where the AWT is less than
550
+ 25 seconds. This is the threshold that an international
551
+ standard considers as a good performance of a system
552
+ of elevators [31]. Since the AWT is the most widely
553
+ employed metric to assess the quality of a system of
554
+ elevators [30], we gave first priority to this metric. If
555
+ there is no solution meeting that requirement, we select
556
+ the patch that exhibits the lowest AWT.
557
+ 2) If more than one patch remains, the DM prioritizes
558
+ patches whose test execution showed a lower number
559
+ of passengers waiting above 55 seconds. That threshold
560
+ is specified to be below 10%, which was considered
561
+ an affordable number. Domain experts considered that
562
+ waiting nearly a minute is an anti-pattern, therefore, they
563
+ decided to give priority to those solutions that exhibited a
564
+ low number of passengers waiting more than 55 seconds.
565
+ 3) In a third stage, if more than one patch exists in the set of
566
+ candidate solutions, priority is given to the ATT metric.
567
+ The DM selects those solutions that have a lower ATT
568
+ than 45 seconds. If there are no solution meeting that
569
+ requirement, we select the patch that exhibits the lowest
570
+ ATT.
571
+ 4) If multiple patch candidates keep existing, the DM selects
572
+ those solution whose test execution showed a lower
573
+ number of passengers having a transit time above 70
574
+ seconds. That threshold was specified to be below 10%,
575
+ as it was considered an affordable number.
576
+ 5) After that, in the event that more than one candidate
577
+ patch existed, the DM selected the patch with lowest
578
+ LWT, which was considered of higher importance than
579
+ the LTT. If more than a patch existed, the patch with
580
+ lowest LTT was chosen. Although the possibilities are
581
+ remote, it is still possible to have more than one solution.
582
+ In such a case, the similarity of the configuration files of
583
+ the candidate patches is compared with the original con-
584
+ figuration file through the well-known hamming distance
585
+ metric. The one which has more similarity is chosen. The
586
+ reasons are two-fold. On the one hand, engineers are
587
+ not usually eager to change too many parameters from
588
+ the original configuration file. This is because, what it is
589
+ good for certain passenger flows, it may not be good for
590
+ others. On the other hand, we conjecture that the higher
591
+ the number of parameters that have been changed, the
592
+ higher the probability that the solution is overfitted to the
593
+ failing test suite. Therefore, by means of this mechanism,
594
+ we aim at reducing the probability for our plausible patch
595
+ to be overfitted.
596
+ G. Patch confirmation
597
+ Since we only use a failing test suite to repair the mis-
598
+ configuration, the patch needs to be retested. This way, we
599
+ ensure that the patch is not overfitted to the failing test suite,
600
+ which is a core problem of automated program repair [32]–
601
+ [35]. This can be carried out following any kind of state-of-the-
602
+ art technique. In our case, we use a regression test oracle [26]
603
+ and execute synthetic test inputs (i.e., test inputs based on
604
+ templates for full-day theoretical passenger profiles [36] and
605
+ up and down-peak profiles suggested by international elevator
606
+ standards [31]). We ensure that the new patch does not perform
607
+ worse than the original patch. Besides, we test its functionality
608
+ by employing metamorphic testing with shorter test cases, as
609
+ proposed by Ayerdi et al. [37], [38].
610
+ IV. EVALUATION
611
+ In our evaluation, we aimed at answering the following two
612
+ research questions (RQs):
613
+ • RQ1 – Sanity check: How does our approach compare
614
+ to the baseline? To assess whether the problem to solve
615
+ is trivial, the first RQ is a sanity check. To do so,
616
+ we implemented an unguided version of our repairing
617
+ algorithm.
618
+ • RQ2 – Comparison with state of the practice: How
619
+ does our approach compare to manual repair carried
620
+ out by domain experts? The current practice at Orona
621
+ is to manually repair the misconfigurations. This RQ
622
+ aims at comparing whether our algorithm is competent
623
+ when compared to a manual repair process carried out
624
+ by domain experts in the company.
625
+ A. Experimental Setup
626
+ 1) System Under Test and Building: We used Orona’s
627
+ Conventional Group Control (CGC) traffic dispatching algo-
628
+ rithm [30], which has also been used in other studies [27],
629
+ [28], [37]–[39]. Furthermore, we used a real installation to
630
+ assess our approach. The installation involved a total of three
631
+ elevators and 12 floors. We used this installation because it was
632
+ a real case where Orona had to manually intervene to resolve
633
+ the misconfiguration. Furthermore, the manual misconfigura-
634
+ tion process taken by the engineers was well documented. In
635
+ addition, we also had access to the operational data obtained
636
+ from the conflicting installation to be used as failing test
637
+ inputs. In total, we used three failure-inducing test inputs,
638
+ involving 16 hours of passenger flow each, and between 3,105
639
+ and 3,769 passengers in total.
640
+ The version of the algorithm we used involved a total of
641
+ 43 parameters. The total number of potential configurations
642
+ ascends to over 9.3 × 1092, which makes the search space too
643
+ large to employ brute force.
644
+ 2) Test oracles: By carefully analyzing the internal docu-
645
+ ment Orona used to give solution to the conflicting installa-
646
+ tion, we defined six oracles based on the metrics they were
647
+ aiming to optimize. Below we explain the selected functional
648
+ performance metrics:
649
+ • Average Waiting Time (AWT): It measures the average
650
+ waiting time of all passengers. The waiting time refers to
651
+ the time since a passenger registers a call until an elevator
652
+ arrives to attend her.
653
+
654
+ • Longest Waiting Time (LWT): It measures the longest
655
+ waiting time experienced by the passengers.
656
+ • % of passengers with Waiting Time (WT) above 55
657
+ seconds: It measures the percentage of passengers who
658
+ had to wait more than 55 seconds.
659
+ • Average Transit Time (ATT): It measures the average
660
+ transit time of all passengers. The transit time refers to
661
+ the time since a passenger enters a lift until it arrives to
662
+ its destination.
663
+ • Longest Transit Time (LTT): It measures the longest
664
+ transit time of all passengers.
665
+ • % of passengers with Transit Time (TT) above 70 sec-
666
+ onds: It measures the percentage of passengers who had
667
+ a transit time above 70 seconds.
668
+ When repairing this misconfiguration, the domain experts
669
+ aimed at improving as much as possible the functional per-
670
+ formance metrics listed above. Therefore, in the context of
671
+ this study, we opted for being aggressive with the thresholds.
672
+ Therefore, all thresholds were set to 0. We acknowledge that
673
+ these values are unfeasible to obtain. However, this way the
674
+ comparison with the manual approach is fairer. Furthermore,
675
+ we also wanted to assess the patch that the DM selected.
676
+ 3) Execution platform: Elevate version 8.19 was used as
677
+ simulator for executing the tests. The experiments were carried
678
+ out using a PC with a Windows 10 operating system, with a
679
+ CPU Intel Core i5 7th generation, and a 16 Gb RAM.
680
+ 4) Baseline algorithm and state of the practice comparison:
681
+ As baseline algorithm, we developed an unguided version of
682
+ our repairing algorithm. Two core differences exists between
683
+ the unguided version and the repair algorithm proposed in this
684
+ paper: (1) the unguided version saves all configurations in the
685
+ archive and (2) the parameters to be mutated are considered all
686
+ to have the same suspiciousness score (i.e., the suspiciousness
687
+ is not measured in this version). It is noteworthy that this
688
+ baseline is stronger than a pure Random Search (RS), which
689
+ is the usual baseline algorithm used to assess search-based
690
+ software engineering problems [17], [19], [40]–[43]. This is
691
+ because, RS would take the initial failing configuration and
692
+ propose some patches based on our patch generation approach
693
+ (Algorithm 2). However, with RS, these generated patches
694
+ would not evolve anymore. Conversely, with our unguided
695
+ approach, we give the option of evolving patches in the
696
+ archive, leading to higher probabilities of finding a patch.
697
+ As for the comparison with the state of the practice, for
698
+ the building installation used, we had data from engineers
699
+ from Orona. Specifically, when the issue was raised, engineers
700
+ from Orona proposed different potential patches (i.e., different
701
+ configurations of the dispatcher). We compared the results
702
+ obtained by our algorithm with the patches proposed by
703
+ the domain experts. Six different patches were provided by
704
+ Orona’s engineers.
705
+ 5) Evaluation
706
+ Metrics:
707
+ As
708
+ our
709
+ algorithm
710
+ is
711
+ Pareto-
712
+ compliant, we had to assess all the solutions in the archive as a
713
+ whole. Because of this, and based on related guidelines [44],
714
+ [45], we used the Hypervolume (HV) quality indicator. The
715
+ HV is one of the most widely employed metrics to assess
716
+ Pareto-based search algorithms [44]–[46]. The HV measures
717
+ the volume in the objective space of a search algorithm, and
718
+ has many advantages [46], such as, (1) being Pareto compliant,
719
+ (2) being able to evaluate convergence and the diversity of
720
+ a solution set simultaneously and (3) only requiring one
721
+ reference point.
722
+ Besides the HV quality indicator, as we designed a DM,
723
+ we also compared each of the six objective functions used
724
+ as performance metrics in the test oracles for the solutions
725
+ proposed by the DM after the search budget was exceeded.
726
+ 6) Statistical tests: Since the employed algorithms are non-
727
+ deterministic, we run each algorithm 10 times. We could not
728
+ afford more runs given that the search budget was selected to
729
+ be 12 hours. Therefore, in total we employed 10 (runs) × 12
730
+ (hours) × 2 (baseline and repair algorithms) = 240 hours for
731
+ executing the experiments.
732
+ To assess the statistical significance, we employed the
733
+ Wilcoxon rank sum test. We considered that there was statis-
734
+ tical significance between both algorithms when the p-value
735
+ was lower than 0.05. In addition, we employed the Vargha
736
+ and Delaney ˆA12 value, which measures the probability of a
737
+ technique being better than the other one.
738
+ 7) Algorithm configuration: We gave 12 hours of time
739
+ budget to both, our algorithm and the baseline algorithm.
740
+ Similar to [15], the maximum number of solutions in the
741
+ archive was set to 12 (i.e., 6 objective function × 2). We
742
+ also set the parameter Nsusp = 5, which means that the
743
+ suspiciousness of a parameter is neutral (i.e., suspiciousness
744
+ score of 0.5) until it is mutated 5 times.
745
+ B. Analysis and Discussion of the Results
746
+ 1) RQ1 – Sanity check: Figure 2 shows the average HV
747
+ score of the 10 runs for both, the repair algorithm proposed in
748
+ this paper and the baseline algorithm, which is the unguided
749
+ version of the repair algorithm. As it can be appreciated,
750
+ the repair approach showed a higher average HV than the
751
+ baseline after the second execution hour. By the time the
752
+ search budget was expired, the repair algorithm showed a 29%
753
+ average improvement over the baseline in terms of the HV
754
+ quality indicator. It is noteworthy that the HV values are quite
755
+ low. The reasons for this is that the HV favors knee points of
756
+ a solution set in a Pareto-frontier [45]. As explained before,
757
+ in our case, the specified threshold values were 0 (i.e., the
758
+ repair algorithm aims at optimizing as much as possible all the
759
+ functional performance metrics). Achieving such value was not
760
+ realistic, and therefore we did not have knee values. Besides,
761
+ 6 different oracles (i.e., fitness functions) were employed to
762
+ guide the search towards providing patches. Nevertheless, a
763
+ low HV value makes not unfair the comparison between both
764
+ techniques, which is the goal of the first RQ.
765
+ These results were further corroborated by means of statisti-
766
+ cal tests. Table I shows the ˆA12 as well as p-values (computed
767
+ by employing the Wilcoxon rank sum test) for each of the 12
768
+ hours when comparing the repair algorithm with the baseline.
769
+ The ˆA12 shows the probability of the repair algorithm being
770
+ better than its unguided version. As suggested by Romano et
771
+
772
+ Fig. 2: Average value of the 10 runs for the hypervolume
773
+ quality indicator when comparing the repair and unguided
774
+ algorithms
775
+ al. [47], we categorized the difference existing between the
776
+ repair algorithm and its baseline as negligible if d < 0.147,
777
+ as small if d < 0.33, as medium if d < 0.474 and as large
778
+ if d >= 0.474, where d = 2| ˆA12 − 0.5|. According to this
779
+ categorization, the difference was negligible during the first
780
+ execution hour, small between the second and third execution
781
+ hours and medium during the fourth execution hour. In these
782
+ first four execution hours, there was no statistical significance
783
+ between the repair algorithm and the baseline. Conversely,
784
+ after the fifth hour, there was statistical significance (i.e., p-
785
+ value < 0.05) with large effect sizes based on the related
786
+ categorization [47], all of them in favor of our approach.
787
+ TABLE I: RQ1 – Summary of the statistical tests when
788
+ comparing the repair algorithm with its unguided version for
789
+ the HV quality indicator over the execution of 12 hours. An
790
+ ˆA12 value higher than 0.5 means that the results are in favor
791
+ of the repair algorithm. Statistical significance is set as p-
792
+ val<0.05
793
+ Hour
794
+ ˆA12
795
+ p-val
796
+ 1
797
+ 0.51
798
+ 0.9698
799
+ 2
800
+ 0.61
801
+ 0.4273
802
+ 3
803
+ 0.65
804
+ 0.2730
805
+ 4
806
+ 0.71
807
+ 0.1212
808
+ 5
809
+ 0.80
810
+ 0.0256
811
+ 6
812
+ 0.86
813
+ 0.0081
814
+ 7
815
+ 0.89
816
+ 0.0040
817
+ 8
818
+ 0.82
819
+ 0.0172
820
+ 9
821
+ 0.85
822
+ 0.0090
823
+ 10
824
+ 0.85
825
+ 0.0090
826
+ 11
827
+ 0.90
828
+ 0.0028
829
+ 12
830
+ 0.92
831
+ 0.0017
832
+ Besides the HV, we also analyzed the individual patches
833
+ provided by the decision maker (DM). In this case, the aim
834
+ of the algorithm was to reduce such metrics. Therefore, an
835
+ ˆA12 lower than 0.5 means that the repair algorithm performed
836
+ better. Table II summarizes the statistical tests for the ten runs
837
+ and each individual objective function. There was statistical
838
+ significance in half of the objective functions (i.e., LWT, ATT
839
+ and LTT). For such cases, the effect sizes were large (i.e.,
840
+ ˆA12 between 0.18 to 0.2). For the remaining objectives, where
841
+ there was no statistical significance, in the case of the AWT
842
+ and %WT>55, the effect sizes showed a negligible difference,
843
+ whereas for the case of %TT>70, the difference was small.
844
+ TABLE II: Summary of the statistical test results when com-
845
+ paring the patches provided by the DM when employing repair
846
+ algorithm against the baseline and manual repair approaches
847
+ vs. Baseline
848
+ vs. Manual
849
+ ˆA12
850
+ p-val
851
+ ˆA12
852
+ p-val
853
+ AWT
854
+ 0.52
855
+ 0.9097
856
+ 0.10
857
+ 0.0014
858
+ LWT
859
+ 0.18
860
+ 0.0165
861
+ 0.20
862
+ 0.0161
863
+ %WT>55s
864
+ 0.47
865
+ 0.8788
866
+ 0.00
867
+ <0.0001
868
+ ATT
869
+ 0.20
870
+ 0.0312
871
+ 0.40
872
+ 0.4429
873
+ LTT
874
+ 0.20
875
+ 0.010
876
+ 0.00
877
+ <0.0001
878
+ %TT>70s
879
+ 0.37
880
+ 0.3438
881
+ 0.00
882
+ <0.0001
883
+ Table III show the average value of each of the functional
884
+ performance metrics used by the oracles for the 10 runs and
885
+ the patches provided by the DMs. These results were somehow
886
+ consistent with those from Table II. As it can be appreciated,
887
+ the most striking difference relates to the LWT and the LTT
888
+ functional performance metrics. On the contrary, for the AWT,
889
+ %WT>55, ATT and %TT>70, the differences were not that
890
+ large. This could be due to the nature of the DM. Note
891
+ that for those metrics, the DM accepts values that are below
892
+ certain thresholds (e.g., AWT < 25 seconds), whereas for LWT
893
+ and LTT, the DM selects those patches with lowest values.
894
+ However, in all metrics except the AWT, our algorithm showed
895
+ lower average values.
896
+ TABLE III: Comparison between the misconfigured configu-
897
+ ration file, the patch provided by the DM with the manual
898
+ repair, the average values of the patches returned by the DM
899
+ for the baseline algorithm and the average values of the patches
900
+ returned by the DM for the repair algorithm
901
+ Misconf
902
+ Manual
903
+ Baseline DM
904
+ Repair DM
905
+ AWT
906
+ 25.99
907
+ 23.10
908
+ 22.66
909
+ 22.77
910
+ LWT
911
+ 435.70
912
+ 223.00
913
+ 241.55
914
+ 213.72
915
+ %WT >55s
916
+ 12.78
917
+ 11.99
918
+ 9.93
919
+ 9.92
920
+ ATT
921
+ 42.01
922
+ 41.60
923
+ 41.77
924
+ 41.58
925
+ LTT
926
+ 209.80
927
+ 220.60
928
+ 206.24
929
+ 195.56
930
+ %TT>70s
931
+ 10.24
932
+ 10.02
933
+ 9.64
934
+ 9.45
935
+ In conclusion, the first RQ can be answered as follows:
936
+ Answer to the first RQ: The repair algorithm outper-
937
+ formed the baseline algorithm. The average improvement
938
+ extent of the repair algorithm with respect to the baseline
939
+ was around 29% when considering the HV quality indi-
940
+ cator. Furthermore, there was statistical significance with
941
+ large effect sizes when comparing individual patches pro-
942
+ posed by the DM for half of the objective functions, all
943
+ of them in favor of the repair algorithm. All this suggests
944
+ that the problem of repairing CPSs misconfigurations is
945
+ non-trivial, and therefore, automated and scalable repair
946
+ techniques are necessary.
947
+ 2) RQ2 – Comparison with manual repair: With the second
948
+ RQ, we aimed at comparing the proposed repairing algorithm
949
+
950
+ Hypervolume
951
+ 0.014
952
+ 0.012
953
+ 0.01
954
+ C
955
+ 0.008
956
+ o- Repair
957
+ 0.006
958
+ Unguided
959
+ -- Manual
960
+ 0.004
961
+ -0
962
+ G中
963
+ 0.002
964
+ 0d
965
+ 2
966
+ 4
967
+ 6
968
+ 8
969
+ 10
970
+ 0
971
+ 12
972
+ Execution hourswith the manual process of repairing the misconfiguration by
973
+ domain experts. Specifically, these domain experts provided a
974
+ total of 6 patches. With those patches, and by applying the six
975
+ oracles in our algorithm, we derived the HV metric. As can
976
+ be seen in Figure 2, the HV was quite low. This was because
977
+ only four patches were non-dominated, whereas our archive is
978
+ capable of handling up to twelve patches. Therefore, those four
979
+ patches were not able to cover a large volume in the objective
980
+ space. Furthermore, it is important to note that the time was not
981
+ considered here, because we do not have such information. In
982
+ terms of the HV, the average improvement extent of our repair
983
+ algorithm over the manually derived patches was up to 77.5%.
984
+ For this case, we also employed the DM to select one of
985
+ the non-dominated patches. Table II shows the statistical tests
986
+ carried out when comparing the patches provided by the DM
987
+ after executing the repair algorithm with the patch proposed
988
+ by the DM after processing the four non-dominated solutions.
989
+ As it can be appreciated, in five out of six metrics there
990
+ was statistical significance, where the effect size showed a
991
+ large difference according to the categorization proposed by
992
+ Romano et al. [47]. All these effect sizes were in favor of the
993
+ repair algorithm. On the other hand, for the case where there
994
+ was no statistical significance, i.e., for the case of the ATT
995
+ metric, the difference was small in terms of the ˆA12 value,
996
+ but in favor of the repair algorithm.
997
+ The improvement extent for each functional performance
998
+ metric obtained by the patches provided by the DM (over 10
999
+ runs) with respect to the manual approach can be appreciated
1000
+ in Table III. These results are consistent with the statistical
1001
+ tests, where it can be appreciated a similar average value in the
1002
+ case of the ATT. In this case, the improvement extent is higher
1003
+ in the cases of the AWT, % WT > 55, LTT and %WT>70
1004
+ when compared to the baseline algorithm. However, in relation
1005
+ to the LWT, the improvement was only of 10 seconds on
1006
+ average, unlike with the baseline, where the improvement was
1007
+ of nearly 29 seconds on average.
1008
+ In summary, the second RQ can be answered as follows:
1009
+ Answer to the second RQ: The repair algorithm
1010
+ outperformed the manual repair process. The average
1011
+ improvement extent of the repair algorithm with re-
1012
+ spect to the patches provided by the domain experts
1013
+ was around 77.5% when considering the HV quality
1014
+ indicator. Furthermore, there was statistical significance
1015
+ with large effect sizes when comparing individual patches
1016
+ proposed by the DM in five out of six objective functions.
1017
+ In addition, our approach provides a fully automated
1018
+ approach, which can therefore increase the productivity
1019
+ of engineers from Orona when dealing with misconfigu-
1020
+ rations of the traffic dispatching algorithm.
1021
+ C. Threats to Validity
1022
+ We now summarize the threats to validity of our study and
1023
+ the measures taken to mitigate them.
1024
+ An internal validity threat in our evaluation could be related
1025
+ to the parameters used in the algorithms, which were not
1026
+ changed. Three main parameters need to be configured (1)
1027
+ the time budget, which was set to 12 hours; (2) the number of
1028
+ time a parameter needs to be selected to start computing its
1029
+ suspiciousness score (i.e., Nsusp), which is set to 5; and (3) the
1030
+ number of solutions in the archive. The first two parameters
1031
+ were selected based on preliminary evaluations. Coversely, the
1032
+ maximum number of solutions in the archive was the same as
1033
+ other repair approaches targeting CPSs [15].
1034
+ As in any search-based software engineering problem, a
1035
+ conclusion validity threat involves the stochastic nature of the
1036
+ algorithms used. To mitigate such issue, we run each algorithm
1037
+ 10 times. It is important to note that our technique needs a long
1038
+ time to converge because the simulations employed to assess
1039
+ potential patches are exhaustive, therefore, we could not afford
1040
+ a large number of runs. Furthermore, we applied statistical
1041
+ tests to analyze the results, as recommended by Arcuri and
1042
+ Briand [48].
1043
+ As in any study involving humans, our evaluation is also
1044
+ subject to external validity threats. One such threats refers
1045
+ to the patches proposed by engineers from Orona. It is note-
1046
+ worthy, however, that these engineers have broad experience
1047
+ and domain expertise, and that the patches they proposed
1048
+ were the ones that were later deployed in the real CPS. The
1049
+ generalizability of the results is also another external validity
1050
+ threat of our study; note, however, that we used an industrial
1051
+ case study with a real installation and data obtained from
1052
+ operation. We plan to mitigate such threat in the future by
1053
+ (1) using other case studies from a different domain and (2)
1054
+ using other real installations where misconfigurations occured.
1055
+ Lastly, construct validity threats arise when the measures
1056
+ used are not comparable across algorithms. This was mitigated
1057
+ by giving the same search budget to both algorithms (i.e., the
1058
+ repair and the unguided algorithm).
1059
+ V. LESSONS LEARNED AND APPLICABILITY
1060
+ In this section, we describe the lessons we have learned
1061
+ thorough the whole process of developing and evaluating the
1062
+ repairing algorithm. In addition, we explain the main changes
1063
+ our method would require when applying it to other CPS
1064
+ domains.
1065
+ A. Lessons Learned
1066
+ Lesson 1 – Reduction of personnel cost: The current
1067
+ state of the practice when repairing misconfigurations is purely
1068
+ manual. This requires significant personnel cost since domain
1069
+ experts are required in the process. Our fully automated
1070
+ repairing approach not only outperforms the state of the
1071
+ practice in terms of providing a better patch to repair the
1072
+ misconfiguration, but also reduces significantly the personnel
1073
+ costs that are required behind a manual repair process.
1074
+ Lesson 2 – Scalable technique: Scalability is one of the
1075
+ main concerns when testing and debugging CPSs, mainly
1076
+ due to the need of considering properties involving physical
1077
+ devices with continuous dynamics and complex concurrent
1078
+ interactions between the system and its environment (e.g.,
1079
+ people) [49]. We saw that our search-based repair algorithm
1080
+
1081
+ converges after around 10 hours, which is affordable for
1082
+ our industrial partner as engineers can launch the automated
1083
+ misconfiguration repair tool nightly.
1084
+ Lesson 3 – Surrogate models are, in principle, not
1085
+ appropriate: Despite we did not carefully assess this, while
1086
+ we developed the algorithm, we intended to integrate surrogate
1087
+ models to accelerate the repair process. However, we saw
1088
+ that this technique required too much time to build reliable
1089
+ surrogate models. This time was similar to the time budget
1090
+ that our repair algorithm required to converge. Although we
1091
+ assessed different types of surrogate models, we still need to
1092
+ more carefully analyze this, which remains a future work.
1093
+ Lesson 4 – Challenging conflicting installation: After
1094
+ applying our experiments and showing the results to Orona’s
1095
+ engineers, we noted that the conflicting installation we selected
1096
+ was challenging. Indeed, the traffic was abnormal, with many
1097
+ unforeseen situations (e.g., having too many calls in a short
1098
+ time window) and therefore, repairing the misconfiguration
1099
+ in such installation was, according to domain experts, more
1100
+ difficult than other installations.
1101
+ B. Applicability
1102
+ The context at which we have applied our repairing ap-
1103
+ proach is the elevator dispatching algorithm of Orona. How-
1104
+ ever, we believe that the three key challenges that we tackle
1105
+ (i.e., expensive execution of tests, large configuration space
1106
+ and multiple functional performance requirements) are com-
1107
+ mon in all types of configurable CPSs. As we involved domain
1108
+ experts when developing the repair approach, several domain-
1109
+ specific design choices were considered, which would require
1110
+ adaptions when applying our approach in another domain. Be-
1111
+ low we explain different alternatives and the changes required
1112
+ for the adoption of our method in another domain.
1113
+ Test execution process: One of the first changes our method
1114
+ would require is the test execution. As explained in Section
1115
+ III-B, we use a domain-specific simulator to execute test cases
1116
+ and measure how close the algorithm is from repairing the
1117
+ misconfiguration. This process would need to be substituted
1118
+ by the simulator being used to execute the tests within
1119
+ other CPSs. In addition, we employ a parallel test execution,
1120
+ which was possible in our context. However, other simulators
1121
+ (e.g., autonomous vehicles) could require more computing
1122
+ resources. For instance, testing autonomous vehicles often
1123
+ requires rendering driving scenes in virtual scenarios using
1124
+ high-fidelity simulators [13], which may require the execution
1125
+ of test cases to be sequential. Lastly, test oracles would need
1126
+ to be defined. When using Simulink models to execute the
1127
+ tests, which is a predominant CPS testing tool [50], an option
1128
+ could be to use SOCRaTEs [11], a DSL-based test oracle
1129
+ specification and generation tool for Simulink. Specifically,
1130
+ SOCRaTEs [11] provides a quantitative measure of the degree
1131
+ of violation of a requirement, similar to what we need in our
1132
+ algorithm to guide the misconfiguration repair process.
1133
+ Removing solutions from the archive: As explained in
1134
+ Section III-D, the archive may increase in size, which may
1135
+ have a direct implication in the convergence of the repairing
1136
+ algorithm. Therefore, when the archive exceeds a predefined
1137
+ number of solutions, one of the solutions needs to be removed.
1138
+ Our algorithm removes the solution with longest AWT, given
1139
+ that this is the most widely employed metric when testing dis-
1140
+ patching algorithms [30]. In another domain, two alternatives
1141
+ can be considered. The first one, employing one of the most
1142
+ important metrics. If all metrics have a similar importance,
1143
+ the second alternative could be to randomly remove one of
1144
+ the solutions from the archive or use a crowding distance to
1145
+ remove solutions that are too close from each other.
1146
+ Decision maker: The decision maker is another component
1147
+ that we developed ad-hoc for the traffic dispatching algorithm
1148
+ by following the advise of domain experts. We recommend
1149
+ to analyze priorities of the specific CPS to make a decision.
1150
+ In case there are no clear priorities, a solution could be to
1151
+ employ a weighted approach giving the same importance to
1152
+ all objectives.
1153
+ Patch confirmation: We only employed a failing test suite
1154
+ to guide the repair process. The core reason was the high test
1155
+ execution time. Eventually, it could happen that a proposed
1156
+ patch makes a test case from the passing test suite fail. Because
1157
+ of this, we implemented a patch confirmation process by
1158
+ following a traditionally employed regression test method [26]
1159
+ combined with a newly incorporated metamorphic testing
1160
+ approach by Orona [37], [38]. The patch confirmation module
1161
+ should follow the internally standardized testing approach,
1162
+ which can vary from a company to another.
1163
+ VI. RELATED WORK
1164
+ The related work in automated program repair is huge.
1165
+ Monperrus mantains a living review on such techniques [51].
1166
+ Table IV shows a summarized classification of the related work
1167
+ analyzing four key characteristics covered by our approach.
1168
+ The first characteristic (C1) analyzes the possibility of repair-
1169
+ ing computationally expensive systems. The second one (C2),
1170
+ whether the approach is intended to repair misconfigurations.
1171
+ The third one (C3), analyzes if the approach is able to deal
1172
+ with many requirements (i.e., more than 3). And the last one
1173
+ (C4), whether the approach prioritizes critical faults over the
1174
+ less critical ones.
1175
+ TABLE IV: Related work comparison with different charac-
1176
+ teristics required by our repairing technique
1177
+ C1
1178
+ C2
1179
+ C3
1180
+ C4
1181
+ [15]
1182
+ +
1183
+ -
1184
+ +
1185
+ +
1186
+ [22], [23]
1187
+ -
1188
+ +
1189
+ -
1190
+ -
1191
+ [24]
1192
+ +
1193
+ +
1194
+ -
1195
+ -
1196
+ [52]–[56]
1197
+ -
1198
+ -
1199
+ -
1200
+ -
1201
+ [57]–[64]
1202
+ +
1203
+ -
1204
+ -
1205
+ -
1206
+ We found that, in the field of CPSs, repairing approaches
1207
+ are still in their infancy. Indeed, to the best of our knowledge,
1208
+ only two approaches tackle the problem of repairing CPSs.
1209
+ On the one hand, Swarmbug [24] focuses on repairing mis-
1210
+ configurations of swarm robotics. Specifically, they make use
1211
+ of a mechanism called the “degree of causal contribution”
1212
+ to abstract impacts of configurations to the swarm drones
1213
+
1214
+ via behavior causal analysis. The evaluation is carried out
1215
+ in four swarm algorithms, and the repair objectives are in-
1216
+ dividual for each of them. These involve aspects like avoiding
1217
+ obstacles or unsafe zones in order the drones not to crash.
1218
+ The approach, however, does not cover C3 and C4. On the
1219
+ other hand, Ariel [15] focuses on repairing feature interaction
1220
+ failures in automated driving systems. Similar to our approach,
1221
+ ARIEL [15] uses a many-objective and a single population-
1222
+ based approach, and also employs an archive to keep track of
1223
+ partially repaired solutions. However, unlike this paper, which
1224
+ focuses on repairing misconfigurations, ARIEL [15] repairs
1225
+ feature interaction bugs by applying modify and swift mutation
1226
+ operators to integration rules that resolve conflicts between
1227
+ automated driving system features. Therefore, ARIEL does not
1228
+ cover C2.
1229
+ CADET [22] does cover C2 as it is intended to debug
1230
+ and fix misconfigurations that cause non-functional faults.
1231
+ Xiong et al. [23] focus on repairing misconfigurations in
1232
+ software product lines by generating a list of range fixes
1233
+ to help satisfy a constraint. However, both approaches do
1234
+ not consider systems that take high computation resources to
1235
+ execute the tests. In addition, CADET [22] only covers two
1236
+ non-functional properties (i.e., latency and energy), whereas
1237
+ Xiong et al. [23] focus on satisfying individual constraints.
1238
+ Lastly, the approaches do not prioritize fixing more critical
1239
+ faults over the less critical ones. Subsequently, both techniques
1240
+ do not cover C1, C3 and C4.
1241
+ Besides these three studies, which are the most closely
1242
+ related to our approach, other studies exist in the field
1243
+ of automated program repair [52]–[64]. Similar to this ap-
1244
+ proach, some consider search techniques, such as genetic
1245
+ programming [55], [56]. GenProg [55] is one of the first
1246
+ approaches that proposed the use of meta-heuristic search to
1247
+ repair software programs. Specifically they leveraged genetic
1248
+ programming to repair C programs. However, all these ap-
1249
+ proaches focus on repairing bugs in the code. Conversely, our
1250
+ approach focuses on repairing misconfigurations in the field
1251
+ of configurable CPSs.
1252
+ Another line of research related to our approach is that
1253
+ of unified debugging [65], [66]. Such technique uses patch
1254
+ execution results to improve localizing the fault [65], [66].
1255
+ Therefore, even if the repair process is unable to repair the bug,
1256
+ unified debugging helps improving the fault localization for
1257
+ latter manual repair. Our approach follows a similar strategy,
1258
+ where we aim at localizing suspicious parameters that will
1259
+ eventually help repair the misconfiguration. However, besides
1260
+ the fact that unified debugging [65], [66] is not aimed at
1261
+ debugging misconfigurations, but bugs at the code level, it
1262
+ assumes that there is an initial suspiciousness score (i.e., at
1263
+ statement level). Conversely, our approach begins with all
1264
+ parameters having the same suspiciousness because there is
1265
+ no information about which parameters have influence in the
1266
+ system performance.
1267
+ VII. CONCLUSION AND FUTURE WORK
1268
+ Real-world CPSs, such as elevators, involve many param-
1269
+ eters. The performance of CPSs is tightly linked to such
1270
+ parameters, and therefore, misconfigurations may occur. On
1271
+ the one hand, manually dealing with such misconfigurations
1272
+ might not always be feasible. On the other hand, automated
1273
+ solutions require dealing with certain challenges, such as,
1274
+ expensive simulations to execute test cases. In this paper we
1275
+ propose an automated and scalable solution based on meta-
1276
+ heuristic search to repair misconfigurations in CPSs. Our
1277
+ approach was integrated with an industrial case study provided
1278
+ by Orona, one of the largest elevator manufacturers in Europe.
1279
+ The evaluation was carried out with a real installation in which
1280
+ domain experts from Orona had to manually intervene in
1281
+ repairing a misconfiguration. The results suggest that, besides
1282
+ automating a process that before was purely manual, our algo-
1283
+ rithm provides better patches than those provided by domain
1284
+ experts. Specifically, in five out of the six quality indicators
1285
+ employed by domain experts to assess the quality of a patch,
1286
+ our algorithm outperformed with statistical significance the
1287
+ patch provided by domain experts.
1288
+ In the future, we would like to extend our approach
1289
+ from different perspectives. In terms of the applicability, we
1290
+ would like to integrate our algorithm with other CPSs in
1291
+ which configurations have been found to be problematic (e.g.,
1292
+ unmanned aerial vehicles [5]). Furthermore, we would like
1293
+ to explore solutions to prevent potential overfitting issues
1294
+ before proposing a plausible patch. This has been one of the
1295
+ core challenges identified in automated program repair [32]–
1296
+ [35], and therefore, we should be aware of it. In terms of
1297
+ internal applicability within Orona, we would like to evaluate
1298
+ our approach in other installations where misconfigurations
1299
+ occurred. Furthermore, we would also like to transfer the
1300
+ repair algorithm beyond the traffic team and within other
1301
+ departments. Lastly, we would like to further study whether
1302
+ other strategies exist to better train and integrate surrogate
1303
+ models in the repair process.
1304
+ ACKNOWLEDGMENT
1305
+ Project supported by a 2021 Leonardo Grant for Researchers
1306
+ and Cultural Creators, BBVA Foundation. The BBVA Founda-
1307
+ tion is not responsible for the opinions, comments and contents
1308
+ included in the project and/or the results derived from it,
1309
+ which are the total and absolute responsibility of their authors.
1310
+ Aitor Arrieta is part of the Software and Systems Engineer-
1311
+ ing research group of Mondragon Unibertsitatea (IT1519-22),
1312
+ supported by the Department of Education, Universities and
1313
+ Research of the Basque Country.
1314
+ REFERENCES
1315
+ [1] P. Derler, E. A. Lee, and A. S. Vincentelli, “Modeling cyber–physical
1316
+ systems,” Proceedings of the IEEE, vol. 100, no. 1, pp. 13–28, 2011.
1317
+ [2] R. Baheti and H. Gill, “Cyber-physical systems,” The impact of control
1318
+ technology, vol. 12, no. 1, pp. 161–166, 2011.
1319
+ [3] R. Alur, Principles of cyber-physical systems.
1320
+ MIT press, 2015.
1321
+
1322
+ [4] S. Fischer, R. Ramler, C. Klammer, and R. Rabiser, “Testing of highly
1323
+ configurable cyber-physical systems–a multiple case study,” in 15th
1324
+ International Working Conference on Variability Modelling of Software-
1325
+ Intensive Systems, 2021, pp. 1–10.
1326
+ [5] R. Han, C. Yang, S. Ma, J. Ma, C. Sun, J. Li, and E. Bertino, “Control
1327
+ parameters considered harmful: Detecting range specification bugs in
1328
+ drone configuration modules via learning-guided search,” in Proceedings
1329
+ of the 44th International Conference on Software Engineering, 2022, pp.
1330
+ 462–473.
1331
+ [6] D. Wang, S. Li, G. Xiao, Y. Liu, and Y. Sui, “An exploratory study of
1332
+ autopilot software bugs in unmanned aerial vehicles,” in Proceedings
1333
+ of the 29th ACM Joint Meeting on European Software Engineering
1334
+ Conference and Symposium on the Foundations of Software Engineering,
1335
+ 2021, pp. 20–31.
1336
+ [7] Garcia, Joshua and Feng, Yang and Shen, Junjie and Almanee, Sumaya
1337
+ and Xia, Yuan and Chen, and Qi Alfred, “A comprehensive study
1338
+ of autonomous vehicle bugs,” in Proceedings of the ACM/IEEE 42nd
1339
+ International Conference on Software Engineering, 2020, pp. 385–396.
1340
+ [8] R. B. Abdessalem, A. Panichella, S. Nejati, L. C. Briand, and T. Stifter,
1341
+ “Testing autonomous cars for feature interaction failures using many-
1342
+ objective search,” in 2018 33rd IEEE/ACM International Conference on
1343
+ Automated Software Engineering (ASE).
1344
+ IEEE, 2018, pp. 143–154.
1345
+ [9] R. B. Abdessalem, S. Nejati, L. C. Briand, and T. Stifter, “Testing vision-
1346
+ based control systems using learnable evolutionary algorithms,” in 2018
1347
+ IEEE/ACM 40th International Conference on Software Engineering
1348
+ (ICSE).
1349
+ IEEE, 2018, pp. 1016–1026.
1350
+ [10] C. Menghi, S. Nejati, L. Briand, and Y. I. Parache, “Approximation-
1351
+ refinement testing of compute-intensive cyber-physical models: An
1352
+ approach based on system identification,” in 2020 IEEE/ACM 42nd
1353
+ International Conference on Software Engineering (ICSE). IEEE, 2020,
1354
+ pp. 372–384.
1355
+ [11] C. Menghi, S. Nejati, K. Gaaloul, and L. C. Briand, “Generating
1356
+ automated and online test oracles for simulink models with continuous
1357
+ and uncertain behaviors,” in Proceedings of the 2019 27th acm joint
1358
+ meeting on european software engineering conference and symposium
1359
+ on the foundations of software engineering, 2019, pp. 27–38.
1360
+ [12] S. Nejati, K. Gaaloul, C. Menghi, L. C. Briand, S. Foster, and D. Wolfe,
1361
+ “Evaluating model testing and model checking for finding requirements
1362
+ violations in simulink models,” in Proceedings of the 2019 27th acm
1363
+ joint meeting on european software engineering conference and sympo-
1364
+ sium on the foundations of software engineering, 2019, pp. 1015–1025.
1365
+ [13] F. U. Haq, D. Shin, and L. Briand, “Efficient online testing for dnn-
1366
+ enabled systems using surrogate-assisted and many-objective optimiza-
1367
+ tion,” in Proceedings of the 44th International Conference on Software
1368
+ Engineering, 2022, pp. 811–822.
1369
+ [14] D. Humeniuk, F. Khomh, and G. Antoniol, “A search-based framework
1370
+ for automatic generation of testing environments for cyber-physical
1371
+ systems,” Information and Software Technology, p. 106936, 2022.
1372
+ [15] R. B. Abdessalem, A. Panichella, S. Nejati, L. C. Briand, and T. Stifter,
1373
+ “Automated repair of feature interaction failures in automated driving
1374
+ systems,” in Proceedings of the 29th ACM SIGSOFT International
1375
+ Symposium on Software Testing and Analysis, 2020, pp. 88–100.
1376
+ [16] G. Perrouin, S. Sen, J. Klein, B. Baudry, and Y. Le Traon, “Automated
1377
+ and scalable t-wise test case generation strategies for software product
1378
+ lines,” in 2010 Third international conference on software testing,
1379
+ verification and validation.
1380
+ IEEE, 2010, pp. 459–468.
1381
+ [17] A. Arrieta, S. Wang, G. Sagardui, and L. Etxeberria, “Search-based test
1382
+ case prioritization for simulation-based testing of cyber-physical system
1383
+ product lines,” Journal of Systems and Software, vol. 149, pp. 1–34,
1384
+ 2019.
1385
+ [18] C. Henard, M. Papadakis, G. Perrouin, J. Klein, P. Heymans, and
1386
+ Y. Le Traon, “Bypassing the combinatorial explosion: Using similarity
1387
+ to generate and prioritize t-wise test configurations for software product
1388
+ lines,” IEEE Transactions on Software Engineering, vol. 40, no. 7, pp.
1389
+ 650–670, 2014.
1390
+ [19] S. Wang, S. Ali, and A. Gotlieb, “Cost-effective test suite minimization
1391
+ in product lines using search techniques,” Journal of Systems and
1392
+ Software, vol. 103, pp. 370–391, 2015.
1393
+ [20] D. Marijan, A. Gotlieb, S. Sen, and A. Hervieu, “Practical pairwise test-
1394
+ ing for software product lines,” in Proceedings of the 17th international
1395
+ software product line conference, 2013, pp. 227–235.
1396
+ [21] A. Hervieu, D. Marijan, A. Gotlieb, and B. Baudry, “Practical mini-
1397
+ mization of pairwise-covering test configurations using constraint pro-
1398
+ gramming,” Information and Software Technology, vol. 71, pp. 129–146,
1399
+ 2016.
1400
+ [22] R. Krishna, M. S. Iqbal, M. A. Javidian, B. Ray, and P. Jamshidi, “Cadet:
1401
+ Debugging and fixing misconfigurations using counterfactual reasoning,”
1402
+ arXiv preprint arXiv:2010.06061, 2020.
1403
+ [23] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki,
1404
+ “Range fixes: Interactive error resolution for software configuration,”
1405
+ Ieee transactions on software engineering, vol. 41, no. 6, pp. 603–619,
1406
+ 2014.
1407
+ [24] C. Jung, A. Ahad, J. Jung, S. Elbaum, and Y. Kwon, “Swarmbug:
1408
+ debugging configuration bugs in swarm robotics,” in Proceedings of the
1409
+ 29th ACM Joint Meeting on European Software Engineering Conference
1410
+ and Symposium on the Foundations of Software Engineering, 2021, pp.
1411
+ 868–880.
1412
+ [25] J. Ayerdi, A. Garciandia, A. Arrieta, W. Afzal, E. Enoiu, A. Agirre,
1413
+ G. Sagardui, M. Arratibel, and O. Sellin, “Towards a taxonomy for
1414
+ eliciting design-operation continuum requirements of cyber-physical
1415
+ systems,” in 2020 IEEE 28th International Requirements Engineering
1416
+ Conference (RE).
1417
+ IEEE, 2020, pp. 280–290.
1418
+ [26] A. Gartziandia, A. Arrieta, J. Ayerdi, M. Illarramendi, A. Agirre,
1419
+ G. Sagardui, and M. Arratibel, “Machine learning-based test oracles for
1420
+ performance testing of cyber-physical systems: An industrial case study
1421
+ on elevators dispatching algorithms,” Journal of Software: Evolution and
1422
+ Process, p. e2465, 2022.
1423
+ [27] L. Han, S. Ali, T. Yue, A. Arrieta, and M. Arratibel, “Uncertainty-aware
1424
+ robustness assessment of industrial elevator systems,” ACM Transactions
1425
+ on Software Engineering and Methodology, 2022.
1426
+ [28] L. Han, T. Yue, S. Ali, A. Arrieta, and M. Arratibel, “Are elevator
1427
+ software robust against uncertainties? results and experiences from an
1428
+ industrial case study,” in Proceedings of the 30th ACM Joint European
1429
+ Software Engineering Conference and Symposium on the Foundations
1430
+ of Software Engineering, 2022, pp. 1331–1342.
1431
+ [29] A. Arrieta, M. Otaegi, L. Han, G. Sagardui, S. Ali, and M. Arratibel,
1432
+ “Automating test oracle generation in devops for industrial elevators,”
1433
+ in 2022 IEEE International Conference on Software Analysis, Evolution
1434
+ and Reengineering (SANER).
1435
+ IEEE, 2022, pp. 284–288.
1436
+ [30] G. Barney and L. Al-Sharif, Elevator traffic handbook: theory and
1437
+ practice.
1438
+ Routledge, 2015.
1439
+ [31] G. Barney, Transportation systems in buildings : CIBSE Guide
1440
+ D:
1441
+ 2010.
1442
+ London:
1443
+ Chartered
1444
+ Institution
1445
+ of
1446
+ Building
1447
+ Services
1448
+ Engineers,
1449
+ 2010.
1450
+ [Online].
1451
+ Available:
1452
+ https://www.worldcat.org/
1453
+ title/transportation-systems-in-buildings-cibse-guide-d-2010/oclc/
1454
+ 880899711
1455
+ [32] C. L. Goues, M. Pradel, and A. Roychoudhury, “Automated program
1456
+ repair,” Communications of the ACM, vol. 62, no. 12, pp. 56–65, 2019.
1457
+ [33] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus,
1458
+ “Automatic repair of real bugs in java: A large-scale experiment on the
1459
+ defects4j dataset,” Empirical Software Engineering, vol. 22, no. 4, pp.
1460
+ 1936–1964, 2017.
1461
+ [34] A. Nilizadeh, G. T. Leavens, X.-B. D. Le, C. S. P˘as˘areanu, and D. R.
1462
+ Cok, “Exploring true test overfitting in dynamic automated program
1463
+ repair using formal methods,” in 2021 14th IEEE Conference on
1464
+ Software Testing, Verification and Validation (ICST).
1465
+ IEEE, 2021, pp.
1466
+ 229–240.
1467
+ [35] E. K. Smith, E. T. Barr, C. Le Goues, and Y. Brun, “Is the cure
1468
+ worse than the disease? overfitting in automated program repair,” in
1469
+ Proceedings of the 2015 10th Joint Meeting on Foundations of Software
1470
+ Engineering, 2015, pp. 532–543.
1471
+ [36] M.-L. Siikonen, T. Susi, and H. Hakonen, “Passenger traffic flow
1472
+ simulation in tall buildings,” Elevator world, vol. 49, no. 8, pp. 117–123,
1473
+ 2001.
1474
+ [37] J. Ayerdi, S. Segura, A. Arrieta, G. Sagardui, and M. Arratibel, “Qos-
1475
+ aware metamorphic testing: An elevation case study,” in 2020 IEEE 31st
1476
+ International Symposium on Software Reliability Engineering (ISSRE).
1477
+ IEEE, 2020, pp. 104–114.
1478
+ [38] J. Ayerdi, P. Valle, S. Segura, A. Arrieta, G. Sagardui, and M. Arratibel,
1479
+ “Performance-driven metamorphic testing of cyber-physical systems,”
1480
+ IEEE Transactions on Reliability, 2022.
1481
+ [39] J. Ayerdi, V. Terragni, A. Arrieta, P. Tonella, G. Sagardui, and M. Arrat-
1482
+ ibel, “Generating metamorphic relations for cyber-physical systems with
1483
+ genetic programming: an industrial case study,” in Proceedings of the
1484
+ 29th ACM Joint Meeting on European Software Engineering Conference
1485
+ and Symposium on the Foundations of Software Engineering, 2021, pp.
1486
+ 1264–1274.
1487
+
1488
+ [40] A. Arrieta, S. Wang, U. Markiegi, A. Arruabarrena, L. Etxeberria, and
1489
+ G. Sagardui, “Pareto efficient multi-objective black-box test case selec-
1490
+ tion for simulation-based testing,” Information and Software Technology,
1491
+ vol. 114, pp. 137–154, 2019.
1492
+ [41] A. Arrieta, S. Wang, U. Markiegi, G. Sagardui, and L. Etxeberria, “Em-
1493
+ ploying multi-objective search to enhance reactive test case generation
1494
+ and prioritization for testing industrial cyber-physical systems,” IEEE
1495
+ Transactions on Industrial Informatics, vol. 14, no. 3, pp. 1055–1066,
1496
+ 2017.
1497
+ [42] P. McMinn, “Search-based software testing: Past, present and future,”
1498
+ in 2011 IEEE Fourth International Conference on Software Testing,
1499
+ Verification and Validation Workshops.
1500
+ IEEE, 2011, pp. 153–163.
1501
+ [43] M. Di Penta, G. Canfora, G. Esposito, V. Mazza, and M. Bruno, “Search-
1502
+ based testing of service level agreements,” in Proceedings of the 9th
1503
+ annual conference on Genetic and evolutionary computation, 2007, pp.
1504
+ 1090–1097.
1505
+ [44] S. Wang, S. Ali, T. Yue, Y. Li, and M. Liaaen, “A practical guide to select
1506
+ quality indicators for assessing pareto-based search algorithms in search-
1507
+ based software engineering,” in Proceedings of the 38th International
1508
+ Conference on Software Engineering, 2016, pp. 631–642.
1509
+ [45] M. Li, T. Chen, and X. Yao, “How to evaluate solutions in pareto-based
1510
+ search-based software engineering: A critical review and methodological
1511
+ guidance,” IEEE Transactions on Software Engineering, vol. 48, no. 05,
1512
+ pp. 1771–1799, 2022.
1513
+ [46] K. Shang, H. Ishibuchi, L. He, and L. M. Pang, “A survey on the
1514
+ hypervolume indicator in evolutionary multiobjective optimization,”
1515
+ IEEE Transactions on Evolutionary Computation, vol. 25, no. 1, pp.
1516
+ 1–20, 2020.
1517
+ [47] J. Romano, J. D. Kromrey, J. Coraggio, J. Skowronek, and L. Devine,
1518
+ “Exploring methods for evaluating group differences on the nsse and
1519
+ other surveys: Are the t-test and cohen’sd indices the most appropriate
1520
+ choices,” in annual meeting of the Southern Association for Institutional
1521
+ Research.
1522
+ Citeseer, 2006, pp. 1–51.
1523
+ [48] A. Arcuri and L. Briand, “A practical guide for using statistical tests
1524
+ to assess randomized algorithms in software engineering,” in 2011 33rd
1525
+ International Conference on Software Engineering (ICSE). IEEE, 2011,
1526
+ pp. 1–10.
1527
+ [49] L. Briand, S. Nejati, M. Sabetzadeh, and D. Bianculli, “Testing the
1528
+ untestable: model testing of complex software-intensive systems,” in
1529
+ Proceedings of the 38th international conference on software engineer-
1530
+ ing companion, 2016, pp. 789–792.
1531
+ [50] R. Matinnejad, S. Nejati, L. C. Briand, and T. Bruckmann, “Test
1532
+ generation and test prioritization for simulink models with dynamic
1533
+ behavior,” IEEE Transactions on Software Engineering, vol. 45, no. 9,
1534
+ pp. 919–944, 2018.
1535
+ [51] M. Monperrus, “The living review on automated program repair,” Ph.D.
1536
+ dissertation, HAL Archives Ouvertes, 2018.
1537
+ [59] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus, “Automatic
1538
+ repair of buggy if conditions and missing preconditions with smt,” in
1539
+ Proceedings of the 6th international workshop on constraints in software
1540
+ testing, verification, and analysis, 2014, pp. 30–39.
1541
+ [52] T. Ackling, B. Alexander, and I. Grunert, “Evolving patches for software
1542
+ repair,” in Proceedings of the 13th annual conference on Genetic and
1543
+ evolutionary computation, 2011, pp. 1427–1434.
1544
+ [53] D. Kim, J. Nam, J. Song, and S. Kim, “Automatic patch generation
1545
+ learned from human-written patches,” in 2013 35th International Con-
1546
+ ference on Software Engineering (ICSE).
1547
+ IEEE, 2013, pp. 802–811.
1548
+ [54] J. D. Knowles, R. A. Watson, and D. W. Corne, “Reducing local optima
1549
+ in single-objective problems by multi-objectivization,” in International
1550
+ conference on evolutionary multi-criterion optimization. Springer, 2001,
1551
+ pp. 269–283.
1552
+ [55] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer, “Genprog: A
1553
+ generic method for automatic software repair,” IEEE Transactions on
1554
+ Software Engineering, vol. 38, no. 1, pp. 54–72, 2011.
1555
+ [56] M. P. Gissurarson, L. Applis, A. Panichella, A. van Deursen, and
1556
+ D. Sands, “Propr: property-based automatic program repair,” in Pro-
1557
+ ceedings of the 44th International Conference on Software Engineering,
1558
+ 2022, pp. 1768–1780.
1559
+ [57] A. Arcuri, “On the automation of fixing software bugs,” in Companion
1560
+ of the 30th International Conference on Software Engineering, 2008,
1561
+ pp. 1003–1006.
1562
+ [58] V. Dallmeier, A. Zeller, and B. Meyer, “Generating fixes from object
1563
+ behavior anomalies,” in 2009 IEEE/ACM International Conference on
1564
+ Automated Software Engineering.
1565
+ IEEE, 2009, pp. 550–554.
1566
+ [60] T. Ji, L. Chen, X. Mao, and X. Yi, “Automated program repair by using
1567
+ similar code containing fix ingredients,” in 2016 IEEE 40th Annual
1568
+ Computer Software and Applications Conference (COMPSAC), vol. 1.
1569
+ IEEE, 2016, pp. 197–202.
1570
+ [61] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra, “Semfix:
1571
+ Program repair via semantic analysis,” in 2013 35th International
1572
+ Conference on Software Engineering (ICSE).
1573
+ IEEE, 2013, pp. 772–
1574
+ 781.
1575
+ [62] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang, “The strength of
1576
+ random search on automated program repair,” in Proceedings of the 36th
1577
+ International Conference on Software Engineering, 2014, pp. 254–265.
1578
+ [63] Z. Qi, F. Long, S. Achour, and M. Rinard, “An analysis of patch
1579
+ plausibility and correctness for generate-and-validate patch generation
1580
+ systems,” in Proceedings of the 2015 International Symposium on
1581
+ Software Testing and Analysis, 2015, pp. 24–36.
1582
+ [64] W. Weimer, Z. P. Fry, and S. Forrest, “Leveraging program equivalence
1583
+ for adaptive program repair: Models and first results,” in 2013 28th
1584
+ IEEE/ACM International Conference on Automated Software Engineer-
1585
+ ing (ASE).
1586
+ IEEE, 2013, pp. 356–366.
1587
+ [65] Y. Lou, A. Ghanbari, X. Li, L. Zhang, H. Zhang, D. Hao, and
1588
+ L. Zhang, “Can automated program repair refine fault localization? a
1589
+ unified debugging approach,” in Proceedings of the 29th ACM SIGSOFT
1590
+ International Symposium on Software Testing and Analysis, 2020, pp.
1591
+ 75–87.
1592
+ [66] S. Benton, X. Li, Y. Lou, and L. Zhang, “Evaluating and improving
1593
+ unified debugging,” IEEE Transactions on Software Engineering, 2021.
1594
+
AdAzT4oBgHgl3EQfhf3-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
AtE0T4oBgHgl3EQfPgDv/content/2301.02181v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fdaecd866020d90609e8f74fc03c619090f0edf486a84977f84eeeb21e5a9bdb
3
+ size 184398
AtE0T4oBgHgl3EQfPgDv/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fb4c8b18b88512e0970f5bb85275dde8605c4746fce0310964635f29c5a1d116
3
+ size 458797
AtE0T4oBgHgl3EQfPgDv/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4f03db254bdc1386e64fc1df0f1b63752578ebca23b3aef51942898ace1d20a8
3
+ size 15884
AtE4T4oBgHgl3EQf5A4w/content/2301.05318v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:499241cf87fd04260ec6528cac052ececabd1417248e35074daf17b0dfb59c36
3
+ size 306441
AtE4T4oBgHgl3EQf5A4w/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5607fd200ebeec443e2ca66eccfd951669c8e33ad8074fb6fd96d842d4c7eb20
3
+ size 2031661
AtE4T4oBgHgl3EQf5A4w/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e3849866216a04451920dceb60adaa980dc3ba0962367f1c775d3aecd0c50b79
3
+ size 68089
BNFQT4oBgHgl3EQf9jeh/content/tmp_files/2301.13451v1.pdf.txt ADDED
@@ -0,0 +1,701 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–6 (2022)
2
+ Preprint 1 February 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ Supernova connection of unidentified ultra high energy gamma-ray source
5
+ LHAASO J2108+5157
6
+ Agnibha De Sarkar,1★
7
+ 1Astronomy & Astrophysics group, Raman Research Institute
8
+ C. V. Raman Avenue, 5th Cross Road, Sadashivanagar, Bengaluru 560080, Karnataka, India
9
+ Accepted XXX. Received YYY; in original form ZZZ
10
+ ABSTRACT
11
+ We present a simple phenomenological model of hadronic interaction between protons accelerated in an old supernova remnant
12
+ (SNR) and cold protons situated within the associated molecular clouds (MCs). The accelerated protons from the old SNR
13
+ escaped the SNR shock front, and got injected into the MCs at an earlier time, producing ultra high energy gamma-rays and
14
+ neutrinos through inelastic proton-proton interaction. We also take into account the acceleration and subsequent escape of
15
+ electrons from the SNR shock front. The escaped electrons produce gamma-rays through various radiative cooling mechanisms,
16
+ after getting injected into the MCs. We use the model discussed in this letter to explain the multiwavelength (MWL) spectral
17
+ energy distribution (SED) of unidentified Galactic ultra high energy gamma-ray source LHAASO J2108+5157. We also discuss
18
+ the feasibility of applying this model in other cases as well. Future observations can test the viability of the model discussed in
19
+ this letter, which will in turn confirm that the SNRs can, in fact, accelerate particles up to PeV energies.
20
+ Key words: radiation mechanisms: non-thermal – ISM: individual objects: LHAASO J2108+5157 – gamma-rays: ISM – ISM:
21
+ supernova remnants
22
+ 1 INTRODUCTION
23
+ Observations by the Large High Altitude Air Shower Observatory
24
+ (LHAASO), located in China, have opened a new era of gamma-
25
+ ray astrophysics (Cao 2010). Since it has become operational on
26
+ 2020 April, LHAASO has detected more than a dozen ultra high
27
+ energy (UHE; E𝛾 ≥ 100 TeV) gamma-ray sources, most of which are
28
+ unidentified (Cao et al. 2021a). The detection of these UHE gamma-
29
+ ray sources indicates the presence of cosmic ray (CR) accelerators in
30
+ our Milky Way Galaxy, which can accelerate particles up to PeV (=
31
+ 1015 eV) energies, more commonly known as “PeVatrons”. Several
32
+ classes of Galactic sources such as supernova remnants (SNRs), pul-
33
+ sar wind nebulae (PWNe), young stellar clusters have been posited to
34
+ be potential PeVatron candidates. Although it is still an open question
35
+ as to what class of source is responsible for accelerating particles up
36
+ to PeV energies, most of the UHE gamma-ray sources detected by
37
+ LHAASO, along with their high energy (HE; E𝛾 < 100 GeV) and
38
+ very high energy (VHE; 100 GeV ≤ E𝛾 < 100 TeV) gamma-ray
39
+ counterparts, have been associated with PWNe in previous studies,
40
+ due to their close proximity with an energetic pulsar, and their typ-
41
+ ically extended spatial morphology (Abdalla et al. 2018). This idea
42
+ gained steam after it was confirmed that Crab pulsar wind nebula
43
+ is indeed a PeVatron source (Cao et al. 2021a). However, in spite
44
+ of the notion that energetic pulsars with high spin-down luminosity
45
+ ( �𝐸 > 1036 erg s−1) coinciding or remaining in a very close spatial
46
+ proximity of UHE gamma-ray sources, may be a universal feature
47
+ ★ E-mail: [email protected]
48
+ (Albert et al. 2021), further theoretical analyses of these LHAASO
49
+ detected UHE gamma-ray sources seem to tell a different story.
50
+ Recent studies have modeled a few of the significantly detected
51
+ LHAASO sources in detail. For example, De Sarkar & Gupta (2022)
52
+ found that the UHE gamma-ray emission observed from LHAASO
53
+ J1908+0621 is most likely hadronic in origin, emanated from the
54
+ interaction between SNR G40.5-0.5 and the associated MCs. On the
55
+ other hand, in De Sarkar et al. (2022), another significantly detected
56
+ source, LHAASO J2226+6057, was extensively modeled assuming
57
+ that the UHE gamma-ray emission is coming from the PWN associ-
58
+ ated with PSR J2229+6114. As caveats of the model, it was found
59
+ that the PWN interpretation of LHAASO J2226+6057 leads to a very
60
+ high radius of PWN, as well as a very small value of magnetic field.
61
+ Naturally, these results are in contrast with the observational results
62
+ (Ge et al. 2021; Liang et al. 2022), thus indicating that the PWN may
63
+ not be the contributing source to power the UHE gamma-ray source
64
+ detected. This indicates interaction between SNRs and associated
65
+ MCs may be the primary reason behind particle acceleration to PeV
66
+ energies in Galactic sources.
67
+ With this factors in mind, we focus on the emission of the recent
68
+ LHAASO detected unidentified UHE gamma-ray sources: LHAASO
69
+ J2108+5157 (Cao et al. 2021c) and LHAASO J0341+5258 (Cao
70
+ et al. 2021b). Both of these sources were found to be associated with
71
+ MCs, but no apparent association with energetic pulsars or SNRs
72
+ were established. Scenarios including leptonic emission from TeV
73
+ halo (Abe et al. 2022), injection of particles from past explosions
74
+ (Kar & Gupta 2022), hadronic interaction between SNR and MCs
75
+ (Cao et al. 2021c) were discussed in previous literatures. But most of
76
+ these models do not explain the HE-VHE-UHE gamma-ray spectral
77
+ © 2022 The Authors
78
+ arXiv:2301.13451v1 [astro-ph.HE] 31 Jan 2023
79
+
80
+ 2
81
+ A. De Sarkar
82
+ features entirely. Moreover, recent reveal of VHE gamma-ray upper
83
+ limits observed by the Large-Sized Telescope - Cherenkov Telescope
84
+ Array (LST-CTA) (Abe et al. 2022) has overruled some of these
85
+ models for the case of LHAASO J2108+5157. The absence of a
86
+ powerful pulsar or supernova remnant adds to the mystery as well,
87
+ leaving one asking what is the possible emission mechanism at play
88
+ in case of these unidentified UHE gamma-ray sources.
89
+ To that end, in this letter, we discuss and apply a phenomeno-
90
+ logical model, in which accelerated particles, escaped from an old,
91
+ shell-type SNR (now invisible), interact with the associated MCs to
92
+ produce the observed HE-VHE-UHE gamma-ray data for the case
93
+ of LHAASO J2108+5157. We also provide the possible age of the
94
+ old SNR, and account for the disappearance of the SNR in question.
95
+ Our simple model is also consistent with the X-ray 2𝜎 upper limits
96
+ given by Abe et al. (2022). We also discuss the applicability of the
97
+ model in other unidentified Galactic UHE gamma-ray source such
98
+ as LHAASO J0341+5258. Furthermore, we report that the neutrino
99
+ flux produced from the hadronic interaction considered in this model,
100
+ will be non-detectable, even by the next generation observatory such
101
+ as ICECUBE-Gen2 (Aartsen et al. 2021).
102
+ 2 THE MODEL
103
+ In this section, we discuss the essentials of the model used to calculate
104
+ the hadronic and leptonic components produced from the interaction
105
+ between an old, now invisible SNR and the associated MCs. A more
106
+ detailed discussion of the model can be found in De Sarkar & Gupta
107
+ (2022), where we developed and applied our model to explain the
108
+ peculiar HE-VHE-UHE gamma-ray SED of LHAASO J1908+0621.
109
+ Our simple model assumes that the supernova had exploded at the
110
+ center of the cavity of a shell-like structure, which is surrounded by
111
+ dense MCs. After this explosion, the SNR shock front expands inside
112
+ the shell cavity, and finally hits the surrounding MCs. During the
113
+ collision between the shock front and associated MCs, the accelerated
114
+ particles get injected into the MCs to produce further emissions.
115
+ After the explosion, the supernova (SN) shock front expands freely
116
+ during its free expansion phase. When the amount of swept-up inter-
117
+ stellar medium (ISM) material becomes equal to that of the ejected
118
+ material at t = t𝑆𝑒𝑑𝑜𝑣, the SN enters the adiabatic Sedov phase. Fi-
119
+ nally after t = t𝑟𝑎𝑑, the SN enters the radiative phase, in which the
120
+ cooling timescales is less than the dynamic timescales. During its
121
+ evolution, the time dependence of the shock velocity and radius can
122
+ be given by the following simple relations (Fujita et al. 2009; Ohira
123
+ et al. 2012; De Sarkar & Gupta 2022),
124
+ 𝑣𝑠ℎ(𝑡) =
125
+
126
+ 𝑣𝑖
127
+ (𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣)
128
+ 𝑣𝑖(𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)−3/5
129
+ (𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡)
130
+ (1)
131
+ and,
132
+ 𝑅𝑠ℎ(𝑡) ∝
133
+
134
+ (𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)
135
+ (𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣)
136
+ (𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)2/5
137
+ (𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡)
138
+ (2)
139
+ We note that for the entirety of this work, we have assumed the
140
+ following values: initial velocity of the shock v𝑖 = 109 cm s−1 (Fujita
141
+ et al. 2009), radius of the shock and time at the beginning of the Sedov
142
+ phase, R𝑆𝑒𝑑𝑜𝑣 and t𝑆𝑒𝑑𝑜𝑣, to be 2.1 pc and 210 yr, respectively
143
+ (Ohira et al. 2011; Makino et al. 2019).
144
+ The CR protons are accelerated through Diffusive Shock Acceler-
145
+ ation (DSA) mechanism when the SN is in the Sedov phase, where
146
+ the CR protons accelerate by scattering back and forth across the
147
+ shock front, while the shock is expanding towards the surround-
148
+ ing MCs. We assume an escape-limited acceleration scenario (Ohira
149
+ et al. 2010), in which the CR protons need to escape a geometrical
150
+ confinement region around the SN shock front produced by strong
151
+ magnetic turbulence, in order to get injected into the MCs and take
152
+ part in further interactions. The radius of the outermost boundary
153
+ of this confinement region (i.e., the escape boundary) is called the
154
+ escape radius, and it can be denoted by,
155
+ 𝑅𝑒𝑠𝑐(𝑡) = (1 + 𝜅)𝑅𝑠ℎ(𝑡),
156
+ (3)
157
+ where 𝜅 ≈ 0.04 (Ohira et al. 2010; Makino et al. 2019), and is
158
+ defined by the geometrical confinement condition D𝑠ℎ/v𝑠ℎ ∼ l𝑒𝑠𝑐 =
159
+ 𝜅R𝑠ℎ, where l𝑒𝑠𝑐 is the distance of the escape boundary from the
160
+ shock front and D𝑠ℎ is the diffusion coefficient around the shock
161
+ (Ohira et al. 2010).
162
+ After the explosion, the escape boundary in front of the shock
163
+ front eventually hits the surrounding MCs after traversing a distance
164
+ of R𝑀𝐶, the distance of MC surface from the cavity center. This
165
+ essentially means that at the time of collision t𝑐𝑜𝑙𝑙, the escape ra-
166
+ dius is equal to the MC surface distance, i.e. R𝑒𝑠𝑐 (t𝑐𝑜𝑙𝑙) = R𝑀𝐶
167
+ ≈ R𝑠ℎ (t𝑐𝑜𝑙𝑙), and at the time of collision, the velocity of the shock
168
+ is denoted by v𝑠ℎ(t𝑐𝑜𝑙𝑙). We assume that the particle acceleration
169
+ stops at t = t𝑐𝑜𝑙𝑙 (Fujita et al. 2009). Consequently, protons accel-
170
+ erated at t ≤ t𝑐𝑜𝑙𝑙 take part in further interactions inside the MCs.
171
+ Moreover, only the protons with sufficiently high energies will es-
172
+ cape the confinement region around the SNR shock front, whereas
173
+ the low energy protons will remain confined around the SNR. So a
174
+ suppression of fluxes in the lower energies, as well as a dominant con-
175
+ tribution of fluxes in the highest energies should be expected in this
176
+ scenario. The confinement condition invoked in this model changes
177
+ the spectral shape of the injected proton population by constraining
178
+ the minimum energy limit.
179
+ We estimate the minimum energy limit of the injected proton pop-
180
+ ulation by assuming that the escape energy is a decreasing function
181
+ of the shock radius (Makino et al. 2019). This approach is based
182
+ on the assumption that the maximum energy of CR protons, E𝑝
183
+ 𝑚𝑎𝑥
184
+ is expected to increase up to knee energy (≈ 1015.5 eV) until the
185
+ beginning of the Sedov phase, and then decrease from that epoch
186
+ (Gabici et al. 2009; Ohira et al. 2012). The minimum energy re-
187
+ quired by protons to escape the confinement region can be given by
188
+ the phenomenological relation,
189
+ 𝐸 𝑝
190
+ 𝑒𝑠𝑐 = 𝐸 𝑝
191
+ 𝑚𝑎𝑥
192
+
193
+ 𝑅𝑠ℎ
194
+ 𝑅𝑆𝑒𝑑𝑜𝑣
195
+ �−𝛼
196
+ ,
197
+ (4)
198
+ where 𝛼 signifies the evolution of the maximum energy during the
199
+ Sedov phase (Makino et al. 2019). We treat 𝛼 as a free parameter in
200
+ this work. After putting R𝑠ℎ ≈ R𝑒𝑠𝑐 = R𝑀𝐶 at the time of collision,
201
+ we find the minimum energy required to escape the confinement
202
+ zone, which also gives us the minimum energy threshold for the
203
+ proton population that gets injected inside the surrounding MCs, i.e.,
204
+ E𝑝
205
+ 𝑒𝑠𝑐 = E𝑝
206
+ 𝑚𝑖𝑛. Since protons are accelerated by DSA mechanism, we
207
+ can expect the CR proton spectrum at the shock front ∝ E−𝑠. Then,
208
+ in an escape-limited particle acceleration scenario, the protons with
209
+ energies greater than 𝐸 𝑝
210
+ 𝑒𝑠𝑐 have a spectrum (Ohira et al. 2010),
211
+ 𝑁 𝑝
212
+ 𝑒𝑠𝑐(𝐸) ∝ 𝐸−[𝑠+(𝛽/𝛼)],
213
+ (5)
214
+ where 𝛽 represents a thermal leakage model of CR injection and
215
+ is given by 𝛽 = 3(3–s)/2 (Makino et al. 2019). For a typical value of
216
+ s = 2, we get the value of 𝛽 = 1.5. Note that the spectral shape as
217
+ MNRAS 000, 1–6 (2022)
218
+
219
+ Supernova connection of LHAASO J2108+5157
220
+ 3
221
+ well as the minimum energy of the proton population are calculated
222
+ at the time when the escape boundary hits the surrounding MCs at t
223
+ = t𝑐𝑜𝑙𝑙.
224
+ At t > t𝑐𝑜𝑙𝑙, the shock enters the momentum conserving “snow-
225
+ plow” phase. The time evolution of the radius of the shocked shell
226
+ R𝑠ℎ𝑒𝑙𝑙 (t) inside the MCs can be found using momentum conserva-
227
+ tion equation (Fujita et al. 2009; De Sarkar & Gupta 2022),
228
+ 4𝜋
229
+ 3
230
+
231
+ 𝑛𝑀𝐶 (𝑅𝑠ℎ𝑒𝑙𝑙(𝑡)3 − 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3) + 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3�
232
+ �𝑅𝑠ℎ𝑒𝑙𝑙(𝑡)
233
+ = 4𝜋
234
+ 3 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3𝑣𝑠ℎ(𝑡𝑐𝑜𝑙𝑙),
235
+ (6)
236
+ with R𝑠ℎ𝑒𝑙𝑙 = R𝑀𝐶 at t = t𝑐𝑜𝑙𝑙, n𝑀𝐶 is the number density of
237
+ the MCs, and n𝑐𝑎𝑣 (≈ 1 cm−3) is the number density inside the
238
+ cavity of the shell. We solve equation 6 numerically for t > t𝑐𝑜𝑙𝑙,
239
+ to estimate the current age of the SNR. We estimate the current
240
+ age by considering the fact that the velocity of the shocked shell
241
+ at the current age must be similar or even smaller than the internal
242
+ gas velocity of the MCs. This approach takes into account the non-
243
+ detection of any SNR shell in unidentified UHE gamma-ray sources
244
+ discussed above, as the shell of the SNR becomes invisible owing to
245
+ the higher internal gas velocity of the MCs as compared to that of the
246
+ shocked shell. We consider the above discussed proton population
247
+ and total number density of the cold protons inside the surrounding
248
+ MCs (n𝑀𝐶) to calculate total gamma-ray flux produced through
249
+ hadronic interaction (Kafexhiu et al. 2014).
250
+ Similar to protons, electrons can also get accelerated in the SNR
251
+ shock front and subsequently escape the confinement region to get
252
+ injected in the associated MCs. Moreover, electrons also lose energy
253
+ through radiative cooling very efficiently. Hence, the injected electron
254
+ population was considered to be escape-limited, as well as loss-
255
+ limited (Yamazaki et al. 2006). We consider the spectral index of
256
+ the escaped electron population to be same as that of protons (Ohira
257
+ et al. 2012; De Sarkar & Gupta 2022). To take into accout loss-limited
258
+ nature of injected electron population, we consider a power law with
259
+ exponential cutoff as the spectral shape of the escaped electrons,
260
+ 𝑁𝑒
261
+ 𝑒𝑠𝑐(���) ∝ 𝐸−[𝑠+(𝛽/𝛼)]𝑒𝑥𝑝(−𝐸/𝐸𝑒
262
+ 𝑚𝑎𝑥),
263
+ (7)
264
+ where, maximum energy of the electron population has been de-
265
+ termined by synchrotron cooling (Yamazaki et al. 2006; Fujita et al.
266
+ 2009),
267
+ 𝐸𝑒
268
+ 𝑚𝑎𝑥 = 14ℎ−1/2
269
+
270
+ 𝑣𝑠ℎ
271
+ 108 cm/s
272
+ � �
273
+ 𝐵
274
+ 10 𝜇G
275
+ �−1/2
276
+ TeV,
277
+ (8)
278
+ where, v𝑠ℎ is the velocity of the shock front and B is the down-
279
+ stream magnetic field. The parameter h (= 0.05𝑟 ( 𝑓 +𝑟𝑔)
280
+ 𝑟−1
281
+ , where r is
282
+ the density compression ratio, f and g are functions of shock angle
283
+ and gyro-factors) is used as a factor to calculate the acceleration time
284
+ scale of DSA. We take h ∼ 1, considering the SNR in Sedov phase
285
+ and neglecting non-linear effects, similar to Yamazaki et al. (2006).
286
+ We consider v𝑠ℎ = v𝑠ℎ (t𝑐𝑜𝑙𝑙) since we calculate the maximum en-
287
+ ergy of the lepton population at the collision time and B = B𝑀𝐶,
288
+ the magnetic field inside the MCs. The minimum energy of the elec-
289
+ tron population was considered to be E𝑒
290
+ 𝑚𝑖𝑛 ≈ 500 MeV (De Sarkar
291
+ & Gupta 2022). Furthermore, we consider bremsstrahlung, Inverse-
292
+ Compton (IC) and synchrotron cooling (Blumenthal & Gould 1970;
293
+ Ghisellini et al. 1988; Baring et al. 1999) of the injected lepton
294
+ population to calculate the gamma-ray flux produced. For IC inter-
295
+ action, we consider interstellar radiation field (ISRF) from Popescu
296
+ et al. (2017) at the source position, and the Cosmic Microwave Back-
297
+ ground (temperature T𝐶𝑀 𝐵 = 2.7 K, energy density U𝐶𝑀 𝐵 = 0.25
298
+ eV cm−3) contribution as well. The number density was considered
299
+ to be same as that of the MCs.
300
+ Finally we note that in this particular model, we have neglected
301
+ the effect of diffusion of particles inside the MCs and assumed that
302
+ the CR particles, both protons and electrons, lose energy through
303
+ rapid cooling before escaping the cloud. This assumption can be
304
+ realized by considering the idea that inside MCs, the diffusion is
305
+ considerably suppressed (D ≈ 1025−26 cm2 s−1) as compared to that
306
+ observed in the ISM (D ≈ 1028 cm2 s−1) (Gabici et al. 2007, 2009;
307
+ Fujita et al. 2009; De Sarkar et al. 2021). Generation of plasma waves
308
+ by CR streaming can be the reason behind the slow diffusion inside
309
+ the MCs (Wentzel 1974). On the other hand, if the trapping of CR
310
+ particles occurs due to some particular orientation of the magnetic
311
+ field inside the MCs, then also the escape of the particles from the
312
+ MCs will not be effective and can be neglected (Makino et al. 2019).
313
+ Consequently, we have considered a steady-state proton and electron
314
+ population to explain the SED of LHAASO J2108+5157, details of
315
+ which are given in the next section.
316
+ 3 APPLICATION OF THE MODEL: LHAASO J2108+5157
317
+ LHAASO J2108+5157 is an UHE gamma-ray source detected by
318
+ LHAASO at R.A. = 317.22◦ ± 0.07◦
319
+ 𝑠𝑡𝑎𝑡 and decl. = 51.95◦ ± 0.05◦
320
+ 𝑠𝑡𝑎𝑡
321
+ (Cao et al. 2021c) with a significance of 6.4𝜎 above 100 TeV. The
322
+ source is reported to have a 95% confidence level extension upper
323
+ limit of 0.26◦ with a 2D symmetrical Gaussian template, and its
324
+ spectrum above 25 TeV can be well described by a power law with a
325
+ photon index of 2.83 ± 0.18 (Cao et al. 2021c). Although no X-ray
326
+ counterpart within 0.26◦ radius of the source was found, a spatially
327
+ extended, HE counterpart 4FGL J2108.0+5155e (extension ∼ 0.48◦)
328
+ (Abdollahi et al. 2020) was observed to be situated at an angular
329
+ distance of 0.13◦ (Cao et al. 2021c). A new hard spectrum GeV
330
+ source was also found at l = 92.35◦ and b = 2.56◦ by Fermi-LAT
331
+ data analysis (Abe et al. 2022), but its large angular separation (∼
332
+ 0.27◦) from the LHAASO source indicates that this new source can
333
+ hardly be a counterpart. Although no VHE component within 0.5◦
334
+ radius was confirmed previously, recent observations by LST-CTA
335
+ has hinted towards an existence of a source with 3.67𝜎 detection
336
+ significance in the energy range of 3 - 100 TeV (Abe et al. 2022).
337
+ Future observations may confirm an existence of a VHE counterpart
338
+ with hard spectral index. The UHE source is located near the center
339
+ of a GMC labeled [MML2017]4607 (Miville-Deschênes et al. 2017),
340
+ which has an average angular radius and mass of 0.236◦ and 8469
341
+ M⊙, respectively, and is situated at a distance of 3.28 kpc from
342
+ Earth. The average number density of the GMC was estimated to
343
+ be n𝑀𝐶 ≈ 30 cm−3 (Cao et al. 2021c). The presence of the GMC,
344
+ spatially coincident with the UHE gamma-ray source points towards
345
+ the hadronic origin, but leptonic origin can not be neglected. The
346
+ absence of any energetic pulsar, its wind nebula or SNR warrants a
347
+ cautious approach in unveiling the true nature of emission regarding
348
+ this UHE source.
349
+ Two young open stellar clusters Kronberger 80 and Kronberger 82
350
+ are in the vicinity of the LHAASO source (with angular distances of
351
+ 0.62◦ and 0.45◦, respectively) (Cao et al. 2021c). But large angular
352
+ separation between these clusters and LHAASO source centroid, as
353
+ well as absence of proper distance estimation hint that the contri-
354
+ bution of these clusters are unlikely (Cao et al. 2021c; Abe et al.
355
+ MNRAS 000, 1–6 (2022)
356
+
357
+ 4
358
+ A. De Sarkar
359
+ 2022). Cao et al. (2021c) suggested that UHE gamma-ray emission
360
+ is due to an interaction of escaping CRs with MCs, whereas the GeV
361
+ counterpart maybe due to an old SNR. However, Abe et al. (2022)
362
+ pointed out that photon index of GeV counterpart spectrum is too
363
+ soft compared to the observations of old SNRs interacting with MCs
364
+ (Yuan et al. 2012), and to produce UHE gamma-ray spectrum, the
365
+ required spectral index of the proton population has to be very hard
366
+ as compared to the standard DSA theory. Instead, Abe et al. (2022)
367
+ proposed an alternate leptonic scenario, in which UHE gamma-ray
368
+ emission is due to TeV halo emission, and the GeV counterpart is due
369
+ to a tentative, previously undetected pulsar. But a very low associated
370
+ magnetic field (even lower than the average Galactic magnetic field),
371
+ and non-detection of a pulsar make the TeV halo interpretation ques-
372
+ tionable, and open the source up for further exploration. To that end,
373
+ we apply the model discussed in Section 2 to explain the gamma-ray
374
+ data from HE to UHE energy range, while being consistent with the
375
+ X-ray 2𝜎 upper limits. We note that these 2𝜎 X-ray upper limits
376
+ correspond to a uniform, circular source with a radius of 6′ centered
377
+ on the position of the LHAASO source (Abe et al. 2022). We explain
378
+ the VHE-UHE gamma-ray data with hadronic component produced
379
+ from the interaction between protons, accelerated and escaped at an
380
+ early time from a now old SNR shock front, with protons inside
381
+ the surrounding MCs, whereas the HE gamma-ray data is explained
382
+ using bremsstrahlung cooling of accelerated and escaped electrons
383
+ inside the medium of the MCs. Our model also shows that the main
384
+ contribution in X-ray range comes from the synchrotron cooling of
385
+ the same accelerated and escaped electrons.
386
+ In this work, we have considered the free parameter 𝛼 = 1.875, and
387
+ then let the total energy budgets of proton and electron populations
388
+ vary to explain the MWL SED. Considering the value of 𝛼, and the
389
+ values of s and 𝛽 discussed in Section 2, we get the spectral indices
390
+ of the escaped electron and proton populations as p = [s + (𝛽/𝛼)]
391
+ = 2.8. The distance of the source was taken to be d ∼ 3 kpc. The
392
+ model spectrum components, as well as the considered MWL SED
393
+ are shown in Figure 1. Also, we calculate the time evolution of SNR
394
+ shocked shell inside the associated MCs using equation 6, and find
395
+ that the SNR, with a final radius of ∼ 30 pc, has to be ∼ 4.4 × 105
396
+ years old, for the shock velocity to be lower than the internal gas
397
+ velocity of MC [MML2017]4607 (∼ 13 km s−1) (Cao et al. 2021c),
398
+ and the SNR shell to disappear. The time evolution of the shocked
399
+ shell is shown in Figure 2. Finally, the model parameters required to
400
+ explain the gamma-ray data are shown in Table 1. We have used open
401
+ source code GAMERA (Hahn 2016) to calculate the model spectrum
402
+ of different components.
403
+ 4 DISCUSSION AND CONCLUSION
404
+ In this letter, we have discussed and applied a simple, analytical and
405
+ phenomenological model to explain the HE-VHE-UHE gamma-ray
406
+ data observed from the direction of LHAASO J2108+5157. By only
407
+ adjusting the index 𝛼, not only we show that the model components
408
+ are consistent with gamma-ray and X-ray observations, the results
409
+ also naturally explain the observed morphology of the source re-
410
+ gion, e.g., the disappearance of the SNR at current age. As expected,
411
+ the SNR was found be old (> 105 years). This also explains why
412
+ no pulsar has been seen in the source region, as the pulsar is ex-
413
+ pected to leave the source region due to its natal kick velocity (∼
414
+ 400-500 km s−1) (Gaensler & Slane 2006). Similar nature and emis-
415
+ sion were also found in another UHE gamma-ray source, LHAASO
416
+ J1908+0621, details of which were explained by this model in De
417
+ Sarkar & Gupta (2022). The fact that the emission of multiple UHE
418
+ 10
419
+ 12
420
+ 10
421
+ 10
422
+ 10
423
+ 8
424
+ 10
425
+ 6
426
+ 10
427
+ 4
428
+ 10
429
+ 2
430
+ 100
431
+ 102
432
+ Energy (TeV)
433
+ 10
434
+ 16
435
+ 10
436
+ 15
437
+ 10
438
+ 14
439
+ 10
440
+ 13
441
+ 10
442
+ 12
443
+ 10
444
+ 11
445
+ E2 J(E)[erg cm
446
+ 2 s
447
+ 1]
448
+ pp
449
+ synchrotron
450
+ bremsstrahlung
451
+ inverse-compton
452
+ Fermi-LAT (Abe et al. 2022)
453
+ Fermi-LAT (Cao et al. 2021)
454
+ LHAASO
455
+ LST-CTA
456
+ XMM-Newton
457
+ Figure 1. MWL SED of LHAASO J2108+5157. Gamma-ray data points and
458
+ upper limits obtained from different observatories such as Fermi-LAT (red
459
+ (Abe et al. 2022), purple (Cao et al. 2021c)), LHAASO (blue (Cao et al.
460
+ 2021c)), and LST-CTA (green (Abe et al. 2022)) are shown in the figure. The
461
+ XMM-Newton X-ray 2𝜎 upper limits (Abe et al. 2022) are given in teal. The
462
+ model p-p interaction (solid line), bremsstrahlung (dashed), IC (dotted), and
463
+ synchrotron (dot-dashed) components are also shown in the figure.
464
+ 103
465
+ 104
466
+ 105
467
+ 106
468
+ Time (years)
469
+ 16
470
+ 18
471
+ 20
472
+ 22
473
+ 24
474
+ 26
475
+ 28
476
+ 30
477
+ 32
478
+ Shock radius (pc)
479
+ LHAASO J2108+5157
480
+ Figure 2. Time evolution of the shocked shell associated with the old SNR,
481
+ inside the surrounding MCs.
482
+ gamma-ray sources were explained by the same model hints towards
483
+ its validity in a larger context. Interestingly, another unidentified
484
+ UHE gamma-ray source, LHAASO J0341+5258, also shows similar
485
+ characteristics shown by LHAASO J2108+5157 (Cao et al. 2021b).
486
+ It is very likely that this model is applicable in that case as well.
487
+ However, in that case, the VHE counterpart has not been properly
488
+ constrained, and the High Altitude Water Cherenkov (HAWC) upper
489
+ limit provided in Cao et al. (2021b) corresponds to only a 2𝜎 detec-
490
+ tion significance. Further observations by CTA and detailed analysis
491
+ by Fermi-LAT will be necessary to properly constrain the emission
492
+ of LHAASO J0341+5258.
493
+ From Figure 1, we can see that the hadronic component adequately
494
+ explain the VHE-UHE gamma-ray data, whereas the bremsstrahlung
495
+ component, originated from the cooling of the electron population,
496
+ explains the gamma-ray data in the HE range. The bremsstrahlung
497
+ MNRAS 000, 1–6 (2022)
498
+
499
+ Supernova connection of LHAASO J2108+5157
500
+ 5
501
+ Table 1. Parameters Used in The Model.
502
+ Definition
503
+ Parameter
504
+ Value
505
+ SNR/MC structure and evolution:
506
+ Initial shock velocity
507
+ v𝑖 (cm/s)
508
+ 109
509
+ Time at the start of Sedov phase
510
+ t𝑆𝑒𝑑𝑜𝑣 (years)
511
+ 210
512
+ Shock radius at the start of Sedov phase R𝑆𝑒𝑑𝑜𝑣 (pc)
513
+ 2.1
514
+ Time of collision
515
+ t𝑐𝑜𝑙𝑙 (years)
516
+ 3.83 × 103
517
+ Shock radius at time of collision
518
+ R𝑠ℎ (t𝑐𝑜𝑙𝑙) (pc)
519
+ 16.77 (= R𝑀𝐶)
520
+ Shock velocity at time of collision
521
+ v𝑠ℎ (t𝑐𝑜𝑙𝑙) (cm/s) 1.75 × 108
522
+ Current age of SNR
523
+ t𝑎𝑔𝑒 (years)
524
+ 4.4 × 105
525
+ Final radius of shock
526
+ R𝑠ℎ (t𝑎𝑔𝑒) (pc)
527
+ 30
528
+ Final velocity of shock
529
+ v𝑠ℎ (t𝑎𝑔𝑒) (cm/s) 1.2 × 106
530
+ Distance
531
+ d (kpc)
532
+ 3
533
+ MC number density
534
+ n𝑀𝐶 (cm−3)
535
+ 30
536
+ MC magnetic field
537
+ B𝑀𝐶 (𝜇G)
538
+ 25
539
+ Cavity number density
540
+ n𝑐𝑎𝑣 (cm−3)
541
+ 1
542
+ Hadronic component:
543
+ Minimum energy
544
+ E𝑝
545
+ 𝑚𝑖𝑛 (TeV)
546
+ 63
547
+ Maximum energy
548
+ E𝑝
549
+ 𝑚𝑎𝑥 (TeV)
550
+ 3.1 × 103
551
+ Spectral index
552
+ p
553
+ 2.8
554
+ Energy budget
555
+ W𝑝 (erg)
556
+ 3.6 × 1047
557
+ Leptonic component:
558
+ Minimum energy
559
+ E𝑒
560
+ 𝑚𝑖𝑛 (TeV)
561
+ 5 × 10−4
562
+ Maximum energy
563
+ E𝑒𝑚𝑎𝑥 (TeV)
564
+ 15.5
565
+ Spectral index
566
+ p
567
+ 2.8
568
+ Energy budget
569
+ W𝑒 (erg)
570
+ 3.6 × 1047
571
+ component is expected to dominate the IC component, as the in-
572
+ teraction is taking place inside MCs with a high number density
573
+ of cold protons. Moreover, the synchrotron component does not
574
+ violate the X-ray 2𝜎 upper limits. We note that no proper radio
575
+ counterpart has been associated with the LHAASO J2108+5157 yet.
576
+ An extended radio source associated with nearby star-forming re-
577
+ gion (Cao et al. 2021c), as well as point-like radio source NVSS
578
+ 210803+515255 or WENSS B2106.4+5140 (Abe et al. 2022) were
579
+ found within 95% extension upper limit of LHAASO J2108+5157
580
+ and 4FGL J2108.0+5155e. Since no proper association was estab-
581
+ lished between these sources and the gamma-ray source, we refrain
582
+ from including their radio data in this study to further constrain the
583
+ model, and we follow the MWL SED discussed in (Abe et al. 2022)
584
+ to ascertain the feasibility of the model discussed in this letter.
585
+ As discussed earlier, we have neglected the effect of particle diffu-
586
+ sion in this model. We note that such an assumption may likely lead
587
+ to an overestimation, and the aspect of suppressed diffusion inside
588
+ the MCs is highly uncertain (Xu et al. 2016; Dogiel et al. 2015). In-
589
+ troducing an energy-independent diffusion coefficient, as discussed
590
+ in Dogiel et al. (2015), will lead to higher energy budgets required
591
+ by the electron and proton populations to explain the data. The sup-
592
+ pressed diffusion coefficient introduced by Gabici et al. (2009) has
593
+ similar energy dependence as to that observed in ISM, but the exact
594
+ energy dependence of diffusion coefficient inside clouds is not well
595
+ constrained. So, to avoid further complications, we have neglected
596
+ the effect of diffusion in this model, similar to Fujita et al. (2009);
597
+ Makino et al. (2019), and assumed that the injected particles quickly
598
+ cool down before escaping the MC medium.
599
+ We further note that we do not consider the contribution of accel-
600
+ erated and escaped particles, when the shock front is within the MC
601
+ medium, in calculating the total gamma-ray SED. Even if the SNR
602
+ is still in the Sedov phase when the shock is within the MCs, the
603
+ corresponding contribution was found to be negligible. Moreover,
604
+ the acceleration and subsequent escape of particles, in that case, will
605
+ depend on the evolution of the confinement region within the high-
606
+ density, turbulent medium of the MCs, details of which is beyond the
607
+ scope of the simple model discussed in this letter. Furthermore, as
608
+ the SNR enters its radiative phase at t𝑟𝑎𝑑 ∼ 4 × 104 years (Blondin
609
+ et al. 1998), the particle acceleration becomes ineffective as the small
610
+ shock velocity at that age, as obtained from equation 6 (< 1.1 × 107
611
+ cm/s), prevents full ionization of the pre-shock gas (Shull & McKee
612
+ 1979). So no significant contribution to the total gamma-ray SED is
613
+ expected in the radiative phase of the SNR as well.
614
+ Since hadronic component primarily dominates in the VHE-UHE
615
+ gamma-ray range, neutrinos can be produced from the hadronic in-
616
+ teraction as well. This neutrino flux can be a smoking gun evidence
617
+ for the dominant hadronic interaction. We have calculated the neu-
618
+ trino flux resulting from the hadronic interaction discussed above,
619
+ and found that the corresponding neutrino flux is too low to be de-
620
+ tected by current generation neutrino telescope such as ICECUBE.
621
+ Furthermore, we have found that the model neutrino flux does not
622
+ exceed the 5𝜎 discovery potential after 10 years of observation by
623
+ next generation neutrino observatory ICECUBE-Gen2 for two de-
624
+ clinations, 𝛿 = 0◦ and 30◦ (Aartsen et al. 2021), which indicates
625
+ that it is unlikely to confirm the hadronic nature of UHE gamma-ray
626
+ emission through neutrino observations, even in the near future, for
627
+ this source.
628
+ In conclusion, in this letter, we have shown that by essentially
629
+ tuning the 𝛼 index, the emission of the LHAASO source can be
630
+ explained. We note that we do not intend to “fit” the MWL SED,
631
+ as the SED, in various energy ranges (VHE, X-ray, radio), is poorly
632
+ constrained and in need of further observations. In this work, we
633
+ have only applied a simple phenomenological model, while also
634
+ minimizing the free parameters, which naturally explains the spec-
635
+ tral features and spatial morphology of LHAASO J2108+5157. Fu-
636
+ ture observations can confirm the viability of this model to ex-
637
+ plain LHAASO J2108+5157, or other unidentified UHE gamma-ray
638
+ source LHAASO 0341+5258, and sources detected in future as well,
639
+ which show similar nature and emission signatures. If confirmed,
640
+ then it can be posited that SNRs as a source class, similar to PWNe,
641
+ can likely be a strong candidate for being the Galactic PeVatrons.
642
+ ACKNOWLEDGEMENTS
643
+ I thank the anonymous reviewer for helpful comments and construc-
644
+ tive criticism. I thank Nayantara Gupta for encouragement.
645
+ DATA AVAILABILITY
646
+ The simulated data underlying this paper will be shared on reasonable
647
+ request to the corresponding author.
648
+ REFERENCES
649
+ Aartsen M. G., et al., 2021, Journal of Physics G Nuclear Physics, 48, 060501
650
+ Abdalla H., et al., 2018, A&A, 612, A1
651
+ Abdollahi S., et al., 2020, ApJS, 247, 33
652
+ Abe S., et al., 2022, arXiv e-prints, p. arXiv:2210.00775
653
+ Albert A., et al., 2021, ApJ, 911, L27
654
+ Baring M. G., Ellison D. C., Reynolds S. P., Grenier I. A., Goret P., 1999,
655
+ ApJ, 513, 311
656
+ Blondin J. M., Wright E. B., Borkowski K. J., Reynolds S. P., 1998, ApJ, 500,
657
+ 342
658
+ Blumenthal G. R., Gould R. J., 1970, Reviews of Modern Physics, 42, 237
659
+ Cao Z., 2010, Chinese Physics C, 34, 249
660
+ Cao Z., et al., 2021a, Nature, 594, 33
661
+ Cao Z., et al., 2021b, ApJ, 917, L4
662
+ MNRAS 000, 1–6 (2022)
663
+
664
+ 6
665
+ A. De Sarkar
666
+ Cao Z., et al., 2021c, ApJ, 919, L22
667
+ De Sarkar A., Gupta N., 2022, ApJ, 934, 118
668
+ De Sarkar A., Biswas S., Gupta N., 2021, Journal of High Energy Astro-
669
+ physics, 29, 1
670
+ De Sarkar A., Zhang W., Martín J., Torres D. F., Li J., Hou X., 2022, A&A,
671
+ 668, A23
672
+ Dogiel V. A., et al., 2015, ApJ, 809, 48
673
+ Fujita Y., Ohira Y., Tanaka S. J., Takahara F., 2009, ApJ, 707, L179
674
+ Gabici S., Aharonian F. A., Blasi P., 2007, Ap&SS, 309, 365
675
+ Gabici S., Aharonian F. A., Casanova S., 2009, MNRAS, 396, 1629
676
+ Gaensler B. M., Slane P. O., 2006, ARA&A, 44, 17
677
+ Ge C., Liu R.-Y., Niu S., Chen Y., Wang X.-Y., 2021, The Innovation, 2,
678
+ 100118
679
+ Ghisellini G., Guilbert P. W., Svensson R., 1988, ApJ, 334, L5
680
+ Hahn J., 2016, PoS, ICRC2015, 917
681
+ Kafexhiu E., Aharonian F., Taylor A. M., Vila G. S., 2014, Phys. Rev. D, 90,
682
+ 123014
683
+ Kar A., Gupta N., 2022, ApJ, 926, 110
684
+ Liang X.-H., Li C.-M., Wu Q.-Z., Pan J.-S., Liu R.-Y., 2022, Universe, 8, 547
685
+ Makino K., Fujita Y., Nobukawa K. K., Matsumoto H., Ohira Y., 2019, PASJ,
686
+ 71, 78
687
+ Miville-Deschênes M.-A., Murray N., Lee E. J., 2017, ApJ, 834, 57
688
+ Ohira Y., Murase K., Yamazaki R., 2010, A&A, 513, A17
689
+ Ohira Y., Murase K., Yamazaki R., 2011, MNRAS, 410, 1577
690
+ Ohira Y., Yamazaki R., Kawanaka N., Ioka K., 2012, MNRAS, 427, 91
691
+ Popescu C. C., Yang R., Tuffs R. J., Natale G., Rushton M., Aharonian F.,
692
+ 2017, MNRAS, 470, 2539
693
+ Shull J. M., McKee C. F., 1979, ApJ, 227, 131
694
+ Wentzel D. G., 1974, ARA&A, 12, 71
695
+ Xu S., Yan H., Lazarian A., 2016, ApJ, 826, 166
696
+ Yamazaki R., Kohri K., Bamba A., Yoshida T., Tsuribe T., Takahara F., 2006,
697
+ MNRAS, 371, 1975
698
+ Yuan Q., Liu S., Bi X., 2012, ApJ, 761, 133
699
+ This paper has been typeset from a TEX/LATEX file prepared by the author.
700
+ MNRAS 000, 1–6 (2022)
701
+
BNFQT4oBgHgl3EQf9jeh/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,483 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf,len=482
2
+ page_content='MNRAS 000, 1–6 (2022) Preprint 1 February 2023 Compiled using MNRAS LATEX style file v3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
3
+ page_content='0 Supernova connection of unidentified ultra high energy gamma-ray source LHAASO J2108+5157 Agnibha De Sarkar,1★ 1Astronomy & Astrophysics group, Raman Research Institute C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
4
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
5
+ page_content=' Raman Avenue, 5th Cross Road, Sadashivanagar, Bengaluru 560080, Karnataka, India Accepted XXX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
6
+ page_content=' Received YYY;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
7
+ page_content=' in original form ZZZ ABSTRACT We present a simple phenomenological model of hadronic interaction between protons accelerated in an old supernova remnant (SNR) and cold protons situated within the associated molecular clouds (MCs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
8
+ page_content=' The accelerated protons from the old SNR escaped the SNR shock front, and got injected into the MCs at an earlier time, producing ultra high energy gamma-rays and neutrinos through inelastic proton-proton interaction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
9
+ page_content=' We also take into account the acceleration and subsequent escape of electrons from the SNR shock front.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
10
+ page_content=' The escaped electrons produce gamma-rays through various radiative cooling mechanisms, after getting injected into the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
11
+ page_content=' We use the model discussed in this letter to explain the multiwavelength (MWL) spectral energy distribution (SED) of unidentified Galactic ultra high energy gamma-ray source LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
12
+ page_content=' We also discuss the feasibility of applying this model in other cases as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
13
+ page_content=' Future observations can test the viability of the model discussed in this letter, which will in turn confirm that the SNRs can, in fact, accelerate particles up to PeV energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
14
+ page_content=' Key words: radiation mechanisms: non-thermal – ISM: individual objects: LHAASO J2108+5157 – gamma-rays: ISM – ISM: supernova remnants 1 INTRODUCTION Observations by the Large High Altitude Air Shower Observatory (LHAASO), located in China, have opened a new era of gamma- ray astrophysics (Cao 2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
15
+ page_content=' Since it has become operational on 2020 April, LHAASO has detected more than a dozen ultra high energy (UHE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
16
+ page_content=' E𝛾 ≥ 100 TeV) gamma-ray sources, most of which are unidentified (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
17
+ page_content=' 2021a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
18
+ page_content=' The detection of these UHE gamma- ray sources indicates the presence of cosmic ray (CR) accelerators in our Milky Way Galaxy, which can accelerate particles up to PeV (= 1015 eV) energies, more commonly known as “PeVatrons”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
19
+ page_content=' Several classes of Galactic sources such as supernova remnants (SNRs), pul- sar wind nebulae (PWNe), young stellar clusters have been posited to be potential PeVatron candidates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
20
+ page_content=' Although it is still an open question as to what class of source is responsible for accelerating particles up to PeV energies, most of the UHE gamma-ray sources detected by LHAASO, along with their high energy (HE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
21
+ page_content=' E𝛾 < 100 GeV) and very high energy (VHE;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
22
+ page_content=' 100 GeV ≤ E𝛾 < 100 TeV) gamma-ray counterparts, have been associated with PWNe in previous studies, due to their close proximity with an energetic pulsar, and their typ- ically extended spatial morphology (Abdalla et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
23
+ page_content=' 2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
24
+ page_content=' This idea gained steam after it was confirmed that Crab pulsar wind nebula is indeed a PeVatron source (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
25
+ page_content=' 2021a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
26
+ page_content=' However, in spite of the notion that energetic pulsars with high spin-down luminosity ( �𝐸 > 1036 erg s−1) coinciding or remaining in a very close spatial proximity of UHE gamma-ray sources, may be a universal feature ★ E-mail: agnibha@rri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
27
+ page_content='res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
28
+ page_content='in (Albert et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
29
+ page_content=' 2021), further theoretical analyses of these LHAASO detected UHE gamma-ray sources seem to tell a different story.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
30
+ page_content=' Recent studies have modeled a few of the significantly detected LHAASO sources in detail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
31
+ page_content=' For example, De Sarkar & Gupta (2022) found that the UHE gamma-ray emission observed from LHAASO J1908+0621 is most likely hadronic in origin, emanated from the interaction between SNR G40.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
32
+ page_content='5-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
33
+ page_content='5 and the associated MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
34
+ page_content=' On the other hand, in De Sarkar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
35
+ page_content=' (2022), another significantly detected source, LHAASO J2226+6057, was extensively modeled assuming that the UHE gamma-ray emission is coming from the PWN associ- ated with PSR J2229+6114.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
36
+ page_content=' As caveats of the model, it was found that the PWN interpretation of LHAASO J2226+6057 leads to a very high radius of PWN, as well as a very small value of magnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
37
+ page_content=' Naturally, these results are in contrast with the observational results (Ge et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
38
+ page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
39
+ page_content=' Liang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
40
+ page_content=' 2022), thus indicating that the PWN may not be the contributing source to power the UHE gamma-ray source detected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
41
+ page_content=' This indicates interaction between SNRs and associated MCs may be the primary reason behind particle acceleration to PeV energies in Galactic sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
42
+ page_content=' With this factors in mind, we focus on the emission of the recent LHAASO detected unidentified UHE gamma-ray sources: LHAASO J2108+5157 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
43
+ page_content=' 2021c) and LHAASO J0341+5258 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
44
+ page_content=' 2021b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
45
+ page_content=' Both of these sources were found to be associated with MCs, but no apparent association with energetic pulsars or SNRs were established.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
46
+ page_content=' Scenarios including leptonic emission from TeV halo (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
47
+ page_content=' 2022), injection of particles from past explosions (Kar & Gupta 2022), hadronic interaction between SNR and MCs (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
48
+ page_content=' 2021c) were discussed in previous literatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
49
+ page_content=' But most of these models do not explain the HE-VHE-UHE gamma-ray spectral © 2022 The Authors arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
50
+ page_content='13451v1 [astro-ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
51
+ page_content='HE] 31 Jan 2023 2 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
52
+ page_content=' De Sarkar features entirely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
53
+ page_content=' Moreover, recent reveal of VHE gamma-ray upper limits observed by the Large-Sized Telescope - Cherenkov Telescope Array (LST-CTA) (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
54
+ page_content=' 2022) has overruled some of these models for the case of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
55
+ page_content=' The absence of a powerful pulsar or supernova remnant adds to the mystery as well, leaving one asking what is the possible emission mechanism at play in case of these unidentified UHE gamma-ray sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
56
+ page_content=' To that end, in this letter, we discuss and apply a phenomeno- logical model, in which accelerated particles, escaped from an old, shell-type SNR (now invisible), interact with the associated MCs to produce the observed HE-VHE-UHE gamma-ray data for the case of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
57
+ page_content=' We also provide the possible age of the old SNR, and account for the disappearance of the SNR in question.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
58
+ page_content=' Our simple model is also consistent with the X-ray 2𝜎 upper limits given by Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
59
+ page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
60
+ page_content=' We also discuss the applicability of the model in other unidentified Galactic UHE gamma-ray source such as LHAASO J0341+5258.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
61
+ page_content=' Furthermore, we report that the neutrino flux produced from the hadronic interaction considered in this model, will be non-detectable, even by the next generation observatory such as ICECUBE-Gen2 (Aartsen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
62
+ page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
63
+ page_content=' 2 THE MODEL In this section, we discuss the essentials of the model used to calculate the hadronic and leptonic components produced from the interaction between an old, now invisible SNR and the associated MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
64
+ page_content=' A more detailed discussion of the model can be found in De Sarkar & Gupta (2022), where we developed and applied our model to explain the peculiar HE-VHE-UHE gamma-ray SED of LHAASO J1908+0621.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
65
+ page_content=' Our simple model assumes that the supernova had exploded at the center of the cavity of a shell-like structure, which is surrounded by dense MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
66
+ page_content=' After this explosion, the SNR shock front expands inside the shell cavity, and finally hits the surrounding MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
67
+ page_content=' During the collision between the shock front and associated MCs, the accelerated particles get injected into the MCs to produce further emissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
68
+ page_content=' After the explosion, the supernova (SN) shock front expands freely during its free expansion phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
69
+ page_content=' When the amount of swept-up inter- stellar medium (ISM) material becomes equal to that of the ejected material at t = t𝑆𝑒𝑑𝑜𝑣, the SN enters the adiabatic Sedov phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
70
+ page_content=' Fi- nally after t = t𝑟𝑎𝑑, the SN enters the radiative phase, in which the cooling timescales is less than the dynamic timescales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
71
+ page_content=' During its evolution, the time dependence of the shock velocity and radius can be given by the following simple relations (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
72
+ page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
73
+ page_content=' Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
74
+ page_content=' 2012;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
75
+ page_content=' De Sarkar & Gupta 2022), 𝑣𝑠ℎ(𝑡) = � 𝑣𝑖 (𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣) 𝑣𝑖(𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)−3/5 (𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡) (1) and, 𝑅𝑠ℎ(𝑡) ∝ � (𝑡/𝑡𝑆𝑒𝑑𝑜𝑣) (𝑡 < 𝑡𝑆𝑒𝑑𝑜𝑣) (𝑡/𝑡𝑆𝑒𝑑𝑜𝑣)2/5 (𝑡𝑆𝑒𝑑𝑜𝑣 < 𝑡) (2) We note that for the entirety of this work, we have assumed the following values: initial velocity of the shock v𝑖 = 109 cm s−1 (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
76
+ page_content=' 2009), radius of the shock and time at the beginning of the Sedov phase, R𝑆𝑒𝑑𝑜𝑣 and t𝑆𝑒𝑑𝑜𝑣, to be 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
77
+ page_content='1 pc and 210 yr, respectively (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
78
+ page_content=' 2011;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
79
+ page_content=' Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
80
+ page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
81
+ page_content=' The CR protons are accelerated through Diffusive Shock Acceler- ation (DSA) mechanism when the SN is in the Sedov phase, where the CR protons accelerate by scattering back and forth across the shock front, while the shock is expanding towards the surround- ing MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
82
+ page_content=' We assume an escape-limited acceleration scenario (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
83
+ page_content=' 2010), in which the CR protons need to escape a geometrical confinement region around the SN shock front produced by strong magnetic turbulence, in order to get injected into the MCs and take part in further interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
84
+ page_content=' The radius of the outermost boundary of this confinement region (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
85
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
86
+ page_content=', the escape boundary) is called the escape radius, and it can be denoted by, 𝑅𝑒𝑠𝑐(𝑡) = (1 + 𝜅)𝑅𝑠ℎ(𝑡), (3) where 𝜅 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
87
+ page_content='04 (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
88
+ page_content=' 2010;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
89
+ page_content=' Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
90
+ page_content=' 2019), and is defined by the geometrical confinement condition D𝑠ℎ/v𝑠ℎ ∼ l𝑒𝑠𝑐 = 𝜅R𝑠ℎ, where l𝑒𝑠𝑐 is the distance of the escape boundary from the shock front and D𝑠ℎ is the diffusion coefficient around the shock (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
91
+ page_content=' 2010).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
92
+ page_content=' After the explosion, the escape boundary in front of the shock front eventually hits the surrounding MCs after traversing a distance of R𝑀𝐶, the distance of MC surface from the cavity center.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
93
+ page_content=' This essentially means that at the time of collision t𝑐𝑜𝑙𝑙, the escape ra- dius is equal to the MC surface distance, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
94
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
95
+ page_content=' R𝑒𝑠𝑐 (t𝑐𝑜𝑙𝑙) = R𝑀𝐶 ≈ R𝑠ℎ (t𝑐𝑜𝑙𝑙), and at the time of collision, the velocity of the shock is denoted by v𝑠ℎ(t𝑐𝑜𝑙𝑙).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
96
+ page_content=' We assume that the particle acceleration stops at t = t𝑐𝑜𝑙𝑙 (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
97
+ page_content=' 2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
98
+ page_content=' Consequently, protons accel- erated at t ≤ t𝑐𝑜𝑙𝑙 take part in further interactions inside the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
99
+ page_content=' Moreover, only the protons with sufficiently high energies will es- cape the confinement region around the SNR shock front, whereas the low energy protons will remain confined around the SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
100
+ page_content=' So a suppression of fluxes in the lower energies, as well as a dominant con- tribution of fluxes in the highest energies should be expected in this scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
101
+ page_content=' The confinement condition invoked in this model changes the spectral shape of the injected proton population by constraining the minimum energy limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
102
+ page_content=' We estimate the minimum energy limit of the injected proton pop- ulation by assuming that the escape energy is a decreasing function of the shock radius (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
103
+ page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
104
+ page_content=' This approach is based on the assumption that the maximum energy of CR protons, E𝑝 𝑚𝑎𝑥 is expected to increase up to knee energy (≈ 1015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
105
+ page_content='5 eV) until the beginning of the Sedov phase, and then decrease from that epoch (Gabici et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
106
+ page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
107
+ page_content=' Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
108
+ page_content=' 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
109
+ page_content=' The minimum energy re- quired by protons to escape the confinement region can be given by the phenomenological relation, 𝐸 𝑝 𝑒𝑠𝑐 = 𝐸 𝑝 𝑚𝑎𝑥 � 𝑅𝑠ℎ 𝑅𝑆𝑒𝑑𝑜𝑣 �−𝛼 , (4) where 𝛼 signifies the evolution of the maximum energy during the Sedov phase (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
110
+ page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
111
+ page_content=' We treat 𝛼 as a free parameter in this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
112
+ page_content=' After putting R𝑠ℎ ≈ R𝑒𝑠𝑐 = R𝑀𝐶 at the time of collision, we find the minimum energy required to escape the confinement zone, which also gives us the minimum energy threshold for the proton population that gets injected inside the surrounding MCs, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
113
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
114
+ page_content=', E𝑝 𝑒𝑠𝑐 = E𝑝 𝑚𝑖𝑛.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
115
+ page_content=' Since protons are accelerated by DSA mechanism, we can expect the CR proton spectrum at the shock front ∝ E−𝑠.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
116
+ page_content=' Then, in an escape-limited particle acceleration scenario, the protons with energies greater than 𝐸 𝑝 𝑒𝑠𝑐 have a spectrum (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
117
+ page_content=' 2010), 𝑁 𝑝 𝑒𝑠𝑐(𝐸) ∝ 𝐸−[𝑠+(𝛽/𝛼)], (5) where 𝛽 represents a thermal leakage model of CR injection and is given by 𝛽 = 3(3–s)/2 (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
118
+ page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
119
+ page_content=' For a typical value of s = 2, we get the value of 𝛽 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
120
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
121
+ page_content=' Note that the spectral shape as MNRAS 000, 1–6 (2022) Supernova connection of LHAASO J2108+5157 3 well as the minimum energy of the proton population are calculated at the time when the escape boundary hits the surrounding MCs at t = t𝑐𝑜𝑙𝑙.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
122
+ page_content=' At t > t𝑐𝑜𝑙𝑙, the shock enters the momentum conserving “snow- plow” phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
123
+ page_content=' The time evolution of the radius of the shocked shell R𝑠ℎ𝑒𝑙𝑙 (t) inside the MCs can be found using momentum conserva- tion equation (Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
124
+ page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
125
+ page_content=' De Sarkar & Gupta 2022), 4𝜋 3 � 𝑛𝑀𝐶 (𝑅𝑠ℎ𝑒𝑙𝑙(𝑡)3 − 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3) + 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3� �𝑅𝑠ℎ𝑒𝑙𝑙(𝑡) = 4𝜋 3 𝑛𝑐𝑎𝑣 𝑅𝑠ℎ(𝑡𝑐𝑜𝑙𝑙)3𝑣𝑠ℎ(𝑡𝑐𝑜𝑙𝑙), (6) with R𝑠ℎ𝑒𝑙𝑙 = R𝑀𝐶 at t = t𝑐𝑜𝑙𝑙, n𝑀𝐶 is the number density of the MCs, and n𝑐𝑎𝑣 (≈ 1 cm−3) is the number density inside the cavity of the shell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
126
+ page_content=' We solve equation 6 numerically for t > t𝑐𝑜𝑙𝑙, to estimate the current age of the SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
127
+ page_content=' We estimate the current age by considering the fact that the velocity of the shocked shell at the current age must be similar or even smaller than the internal gas velocity of the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
128
+ page_content=' This approach takes into account the non- detection of any SNR shell in unidentified UHE gamma-ray sources discussed above, as the shell of the SNR becomes invisible owing to the higher internal gas velocity of the MCs as compared to that of the shocked shell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
129
+ page_content=' We consider the above discussed proton population and total number density of the cold protons inside the surrounding MCs (n𝑀𝐶) to calculate total gamma-ray flux produced through hadronic interaction (Kafexhiu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
130
+ page_content=' 2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
131
+ page_content=' Similar to protons, electrons can also get accelerated in the SNR shock front and subsequently escape the confinement region to get injected in the associated MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
132
+ page_content=' Moreover, electrons also lose energy through radiative cooling very efficiently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
133
+ page_content=' Hence, the injected electron population was considered to be escape-limited, as well as loss- limited (Yamazaki et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
134
+ page_content=' 2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
135
+ page_content=' We consider the spectral index of the escaped electron population to be same as that of protons (Ohira et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
136
+ page_content=' 2012;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
137
+ page_content=' De Sarkar & Gupta 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
138
+ page_content=' To take into accout loss-limited nature of injected electron population, we consider a power law with exponential cutoff as the spectral shape of the escaped electrons, 𝑁𝑒 𝑒𝑠𝑐(𝐸) ∝ 𝐸−[𝑠+(𝛽/𝛼)]𝑒𝑥𝑝(−𝐸/𝐸𝑒 𝑚𝑎𝑥), (7) where, maximum energy of the electron population has been de- termined by synchrotron cooling (Yamazaki et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
139
+ page_content=' 2006;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
140
+ page_content=' Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
141
+ page_content=' 2009), 𝐸𝑒 𝑚𝑎𝑥 = 14ℎ−1/2 � 𝑣𝑠ℎ 108 cm/s � � 𝐵 10 𝜇G �−1/2 TeV, (8) where, v𝑠ℎ is the velocity of the shock front and B is the down- stream magnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
142
+ page_content=' The parameter h (= 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
143
+ page_content='05𝑟 ( 𝑓 +𝑟𝑔) 𝑟−1 , where r is the density compression ratio, f and g are functions of shock angle and gyro-factors) is used as a factor to calculate the acceleration time scale of DSA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
144
+ page_content=' We take h ∼ 1, considering the SNR in Sedov phase and neglecting non-linear effects, similar to Yamazaki et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
145
+ page_content=' (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
146
+ page_content=' We consider v𝑠ℎ = v𝑠ℎ (t𝑐𝑜𝑙𝑙) since we calculate the maximum en- ergy of the lepton population at the collision time and B = B𝑀𝐶, the magnetic field inside the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
147
+ page_content=' The minimum energy of the elec- tron population was considered to be E𝑒 𝑚𝑖𝑛 ≈ 500 MeV (De Sarkar & Gupta 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
148
+ page_content=' Furthermore, we consider bremsstrahlung, Inverse- Compton (IC) and synchrotron cooling (Blumenthal & Gould 1970;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
149
+ page_content=' Ghisellini et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
150
+ page_content=' 1988;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
151
+ page_content=' Baring et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
152
+ page_content=' 1999) of the injected lepton population to calculate the gamma-ray flux produced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
153
+ page_content=' For IC inter- action, we consider interstellar radiation field (ISRF) from Popescu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
154
+ page_content=' (2017) at the source position, and the Cosmic Microwave Back- ground (temperature T𝐶𝑀 𝐵 = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
155
+ page_content='7 K, energy density U𝐶𝑀 𝐵 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
156
+ page_content='25 eV cm−3) contribution as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
157
+ page_content=' The number density was considered to be same as that of the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
158
+ page_content=' Finally we note that in this particular model, we have neglected the effect of diffusion of particles inside the MCs and assumed that the CR particles, both protons and electrons, lose energy through rapid cooling before escaping the cloud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
159
+ page_content=' This assumption can be realized by considering the idea that inside MCs, the diffusion is considerably suppressed (D ≈ 1025−26 cm2 s−1) as compared to that observed in the ISM (D ≈ 1028 cm2 s−1) (Gabici et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
160
+ page_content=' 2007, 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
161
+ page_content=' Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
162
+ page_content=' 2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
163
+ page_content=' De Sarkar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
164
+ page_content=' 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
165
+ page_content=' Generation of plasma waves by CR streaming can be the reason behind the slow diffusion inside the MCs (Wentzel 1974).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
166
+ page_content=' On the other hand, if the trapping of CR particles occurs due to some particular orientation of the magnetic field inside the MCs, then also the escape of the particles from the MCs will not be effective and can be neglected (Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
167
+ page_content=' 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
168
+ page_content=' Consequently, we have considered a steady-state proton and electron population to explain the SED of LHAASO J2108+5157, details of which are given in the next section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
169
+ page_content=' 3 APPLICATION OF THE MODEL: LHAASO J2108+5157 LHAASO J2108+5157 is an UHE gamma-ray source detected by LHAASO at R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
170
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
171
+ page_content=' = 317.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
172
+ page_content='22◦ ± 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
173
+ page_content='07◦ 𝑠𝑡𝑎𝑡 and decl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
174
+ page_content=' = 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
175
+ page_content='95◦ ± 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
176
+ page_content='05◦ 𝑠𝑡𝑎𝑡 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
177
+ page_content=' 2021c) with a significance of 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
178
+ page_content='4𝜎 above 100 TeV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
179
+ page_content=' The source is reported to have a 95% confidence level extension upper limit of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
180
+ page_content='26◦ with a 2D symmetrical Gaussian template, and its spectrum above 25 TeV can be well described by a power law with a photon index of 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
181
+ page_content='83 ± 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
182
+ page_content='18 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
183
+ page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
184
+ page_content=' Although no X-ray counterpart within 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
185
+ page_content='26◦ radius of the source was found, a spatially extended, HE counterpart 4FGL J2108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
186
+ page_content='0+5155e (extension ∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
187
+ page_content='48◦) (Abdollahi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
188
+ page_content=' 2020) was observed to be situated at an angular distance of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
189
+ page_content='13◦ (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
190
+ page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
191
+ page_content=' A new hard spectrum GeV source was also found at l = 92.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
192
+ page_content='35◦ and b = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
193
+ page_content='56◦ by Fermi-LAT data analysis (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
194
+ page_content=' 2022), but its large angular separation (∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
195
+ page_content='27◦) from the LHAASO source indicates that this new source can hardly be a counterpart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
196
+ page_content=' Although no VHE component within 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
197
+ page_content='5◦ radius was confirmed previously, recent observations by LST-CTA has hinted towards an existence of a source with 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
198
+ page_content='67𝜎 detection significance in the energy range of 3 - 100 TeV (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
199
+ page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
200
+ page_content=' Future observations may confirm an existence of a VHE counterpart with hard spectral index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
201
+ page_content=' The UHE source is located near the center of a GMC labeled [MML2017]4607 (Miville-Deschênes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
202
+ page_content=' 2017), which has an average angular radius and mass of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
203
+ page_content='236◦ and 8469 M⊙, respectively, and is situated at a distance of 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
204
+ page_content='28 kpc from Earth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
205
+ page_content=' The average number density of the GMC was estimated to be n𝑀𝐶 ≈ 30 cm−3 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
206
+ page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
207
+ page_content=' The presence of the GMC, spatially coincident with the UHE gamma-ray source points towards the hadronic origin, but leptonic origin can not be neglected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
208
+ page_content=' The absence of any energetic pulsar, its wind nebula or SNR warrants a cautious approach in unveiling the true nature of emission regarding this UHE source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
209
+ page_content=' Two young open stellar clusters Kronberger 80 and Kronberger 82 are in the vicinity of the LHAASO source (with angular distances of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
210
+ page_content='62◦ and 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
211
+ page_content='45◦, respectively) (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
212
+ page_content=' 2021c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
213
+ page_content=' But large angular separation between these clusters and LHAASO source centroid, as well as absence of proper distance estimation hint that the contri- bution of these clusters are unlikely (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
214
+ page_content=' 2021c;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
215
+ page_content=' Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
216
+ page_content=' MNRAS 000, 1–6 (2022) 4 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
217
+ page_content=' De Sarkar 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
218
+ page_content=' Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
219
+ page_content=' (2021c) suggested that UHE gamma-ray emission is due to an interaction of escaping CRs with MCs, whereas the GeV counterpart maybe due to an old SNR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
220
+ page_content=' However, Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
221
+ page_content=' (2022) pointed out that photon index of GeV counterpart spectrum is too soft compared to the observations of old SNRs interacting with MCs (Yuan et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
222
+ page_content=' 2012), and to produce UHE gamma-ray spectrum, the required spectral index of the proton population has to be very hard as compared to the standard DSA theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
223
+ page_content=' Instead, Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
224
+ page_content=' (2022) proposed an alternate leptonic scenario, in which UHE gamma-ray emission is due to TeV halo emission, and the GeV counterpart is due to a tentative, previously undetected pulsar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
225
+ page_content=' But a very low associated magnetic field (even lower than the average Galactic magnetic field), and non-detection of a pulsar make the TeV halo interpretation ques- tionable, and open the source up for further exploration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
226
+ page_content=' To that end, we apply the model discussed in Section 2 to explain the gamma-ray data from HE to UHE energy range, while being consistent with the X-ray 2𝜎 upper limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
227
+ page_content=' We note that these 2𝜎 X-ray upper limits correspond to a uniform, circular source with a radius of 6′ centered on the position of the LHAASO source (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
228
+ page_content=' 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
229
+ page_content=' We explain the VHE-UHE gamma-ray data with hadronic component produced from the interaction between protons, accelerated and escaped at an early time from a now old SNR shock front, with protons inside the surrounding MCs, whereas the HE gamma-ray data is explained using bremsstrahlung cooling of accelerated and escaped electrons inside the medium of the MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
230
+ page_content=' Our model also shows that the main contribution in X-ray range comes from the synchrotron cooling of the same accelerated and escaped electrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
231
+ page_content=' In this work, we have considered the free parameter 𝛼 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
232
+ page_content='875, and then let the total energy budgets of proton and electron populations vary to explain the MWL SED.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
233
+ page_content=' Considering the value of 𝛼, and the values of s and 𝛽 discussed in Section 2, we get the spectral indices of the escaped electron and proton populations as p = [s + (𝛽/𝛼)] = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
234
+ page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
235
+ page_content=' The distance of the source was taken to be d ∼ 3 kpc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
236
+ page_content=' The model spectrum components, as well as the considered MWL SED are shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
237
+ page_content=' Also, we calculate the time evolution of SNR shocked shell inside the associated MCs using equation 6, and find that the SNR, with a final radius of ∼ 30 pc, has to be ∼ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
238
+ page_content='4 × 105 years old, for the shock velocity to be lower than the internal gas velocity of MC [MML2017]4607 (∼ 13 km s−1) (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
239
+ page_content=' 2021c), and the SNR shell to disappear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
240
+ page_content=' The time evolution of the shocked shell is shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
241
+ page_content=' Finally, the model parameters required to explain the gamma-ray data are shown in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
242
+ page_content=' We have used open source code GAMERA (Hahn 2016) to calculate the model spectrum of different components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
243
+ page_content=' 4 DISCUSSION AND CONCLUSION In this letter, we have discussed and applied a simple, analytical and phenomenological model to explain the HE-VHE-UHE gamma-ray data observed from the direction of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
244
+ page_content=' By only adjusting the index 𝛼, not only we show that the model components are consistent with gamma-ray and X-ray observations, the results also naturally explain the observed morphology of the source re- gion, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
245
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
246
+ page_content=', the disappearance of the SNR at current age.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
247
+ page_content=' As expected, the SNR was found be old (> 105 years).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
248
+ page_content=' This also explains why no pulsar has been seen in the source region, as the pulsar is ex- pected to leave the source region due to its natal kick velocity (∼ 400-500 km s−1) (Gaensler & Slane 2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
249
+ page_content=' Similar nature and emis- sion were also found in another UHE gamma-ray source, LHAASO J1908+0621, details of which were explained by this model in De Sarkar & Gupta (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
250
+ page_content=' The fact that the emission of multiple UHE 10 12 10 10 10 8 10 6 10 4 10 2 100 102 Energy (TeV) 10 16 10 15 10 14 10 13 10 12 10 11 E2 J(E)[erg cm 2 s 1] pp synchrotron bremsstrahlung inverse-compton Fermi-LAT (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
251
+ page_content=' 2022) Fermi-LAT (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
252
+ page_content=' 2021) LHAASO LST-CTA XMM-Newton Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
253
+ page_content=' MWL SED of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
254
+ page_content=' Gamma-ray data points and upper limits obtained from different observatories such as Fermi-LAT (red (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
255
+ page_content=' 2022), purple (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
256
+ page_content=' 2021c)), LHAASO (blue (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
257
+ page_content=' 2021c)), and LST-CTA (green (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
258
+ page_content=' 2022)) are shown in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
259
+ page_content=' The XMM-Newton X-ray 2𝜎 upper limits (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
260
+ page_content=' 2022) are given in teal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
261
+ page_content=' The model p-p interaction (solid line), bremsstrahlung (dashed), IC (dotted), and synchrotron (dot-dashed) components are also shown in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
262
+ page_content=' 103 104 105 106 Time (years) 16 18 20 22 24 26 28 30 32 Shock radius (pc) LHAASO J2108+5157 Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
263
+ page_content=' Time evolution of the shocked shell associated with the old SNR, inside the surrounding MCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
264
+ page_content=' gamma-ray sources were explained by the same model hints towards its validity in a larger context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
265
+ page_content=' Interestingly, another unidentified UHE gamma-ray source, LHAASO J0341+5258, also shows similar characteristics shown by LHAASO J2108+5157 (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
266
+ page_content=' 2021b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
267
+ page_content=' It is very likely that this model is applicable in that case as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
268
+ page_content=' However, in that case, the VHE counterpart has not been properly constrained, and the High Altitude Water Cherenkov (HAWC) upper limit provided in Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
269
+ page_content=' (2021b) corresponds to only a 2𝜎 detec- tion significance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
270
+ page_content=' Further observations by CTA and detailed analysis by Fermi-LAT will be necessary to properly constrain the emission of LHAASO J0341+5258.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
271
+ page_content=' From Figure 1, we can see that the hadronic component adequately explain the VHE-UHE gamma-ray data, whereas the bremsstrahlung component, originated from the cooling of the electron population, explains the gamma-ray data in the HE range.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
272
+ page_content=' The bremsstrahlung MNRAS 000, 1–6 (2022) Supernova connection of LHAASO J2108+5157 5 Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
273
+ page_content=' Parameters Used in The Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
274
+ page_content=' Definition Parameter Value SNR/MC structure and evolution: Initial shock velocity v𝑖 (cm/s) 109 Time at the start of Sedov phase t𝑆𝑒𝑑𝑜𝑣 (years) 210 Shock radius at the start of Sedov phase R𝑆𝑒𝑑𝑜𝑣 (pc) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
275
+ page_content='1 Time of collision t𝑐𝑜𝑙𝑙 (years) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
276
+ page_content='83 × 103 Shock radius at time of collision R𝑠ℎ (t𝑐𝑜𝑙𝑙) (pc) 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
277
+ page_content='77 (= R𝑀𝐶) Shock velocity at time of collision v𝑠ℎ (t𝑐𝑜𝑙𝑙) (cm/s) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
278
+ page_content='75 × 108 Current age of SNR t𝑎𝑔𝑒 (years) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
279
+ page_content='4 × 105 Final radius of shock R𝑠ℎ (t𝑎𝑔𝑒) (pc) 30 Final velocity of shock v𝑠ℎ (t𝑎𝑔𝑒) (cm/s) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
280
+ page_content='2 × 106 Distance d (kpc) 3 MC number density n𝑀𝐶 (cm−3) 30 MC magnetic field B𝑀𝐶 (𝜇G) 25 Cavity number density n𝑐𝑎𝑣 (cm−3) 1 Hadronic component: Minimum energy E𝑝 𝑚𝑖𝑛 (TeV) 63 Maximum energy E𝑝 𝑚𝑎𝑥 (TeV) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
281
+ page_content='1 × 103 Spectral index p 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
282
+ page_content='8 Energy budget W𝑝 (erg) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
283
+ page_content='6 × 1047 Leptonic component: Minimum energy E𝑒 𝑚𝑖𝑛 (TeV) 5 × 10−4 Maximum energy E𝑒𝑚𝑎𝑥 (TeV) 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
284
+ page_content='5 Spectral index p 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
285
+ page_content='8 Energy budget W𝑒 (erg) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
286
+ page_content='6 × 1047 component is expected to dominate the IC component, as the in- teraction is taking place inside MCs with a high number density of cold protons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
287
+ page_content=' Moreover, the synchrotron component does not violate the X-ray 2𝜎 upper limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
288
+ page_content=' We note that no proper radio counterpart has been associated with the LHAASO J2108+5157 yet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
289
+ page_content=' An extended radio source associated with nearby star-forming re- gion (Cao et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
290
+ page_content=' 2021c), as well as point-like radio source NVSS 210803+515255 or WENSS B2106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
291
+ page_content='4+5140 (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
292
+ page_content=' 2022) were found within 95% extension upper limit of LHAASO J2108+5157 and 4FGL J2108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
293
+ page_content='0+5155e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
294
+ page_content=' Since no proper association was estab- lished between these sources and the gamma-ray source, we refrain from including their radio data in this study to further constrain the model, and we follow the MWL SED discussed in (Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
295
+ page_content=' 2022) to ascertain the feasibility of the model discussed in this letter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
296
+ page_content=' As discussed earlier, we have neglected the effect of particle diffu- sion in this model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
297
+ page_content=' We note that such an assumption may likely lead to an overestimation, and the aspect of suppressed diffusion inside the MCs is highly uncertain (Xu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
298
+ page_content=' 2016;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
299
+ page_content=' Dogiel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
300
+ page_content=' 2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
301
+ page_content=' In- troducing an energy-independent diffusion coefficient, as discussed in Dogiel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
302
+ page_content=' (2015), will lead to higher energy budgets required by the electron and proton populations to explain the data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
303
+ page_content=' The sup- pressed diffusion coefficient introduced by Gabici et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
304
+ page_content=' (2009) has similar energy dependence as to that observed in ISM, but the exact energy dependence of diffusion coefficient inside clouds is not well constrained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
305
+ page_content=' So, to avoid further complications, we have neglected the effect of diffusion in this model, similar to Fujita et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
306
+ page_content=' (2009);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
307
+ page_content=' Makino et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
308
+ page_content=' (2019), and assumed that the injected particles quickly cool down before escaping the MC medium.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
309
+ page_content=' We further note that we do not consider the contribution of accel- erated and escaped particles, when the shock front is within the MC medium, in calculating the total gamma-ray SED.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
310
+ page_content=' Even if the SNR is still in the Sedov phase when the shock is within the MCs, the corresponding contribution was found to be negligible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
311
+ page_content=' Moreover, the acceleration and subsequent escape of particles, in that case, will depend on the evolution of the confinement region within the high- density, turbulent medium of the MCs, details of which is beyond the scope of the simple model discussed in this letter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
312
+ page_content=' Furthermore, as the SNR enters its radiative phase at t𝑟𝑎𝑑 ∼ 4 × 104 years (Blondin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
313
+ page_content=' 1998), the particle acceleration becomes ineffective as the small shock velocity at that age, as obtained from equation 6 (< 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
314
+ page_content='1 × 107 cm/s), prevents full ionization of the pre-shock gas (Shull & McKee 1979).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
315
+ page_content=' So no significant contribution to the total gamma-ray SED is expected in the radiative phase of the SNR as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
316
+ page_content=' Since hadronic component primarily dominates in the VHE-UHE gamma-ray range, neutrinos can be produced from the hadronic in- teraction as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
317
+ page_content=' This neutrino flux can be a smoking gun evidence for the dominant hadronic interaction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
318
+ page_content=' We have calculated the neu- trino flux resulting from the hadronic interaction discussed above, and found that the corresponding neutrino flux is too low to be de- tected by current generation neutrino telescope such as ICECUBE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
319
+ page_content=' Furthermore, we have found that the model neutrino flux does not exceed the 5𝜎 discovery potential after 10 years of observation by next generation neutrino observatory ICECUBE-Gen2 for two de- clinations, 𝛿 = 0◦ and 30◦ (Aartsen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
320
+ page_content=' 2021), which indicates that it is unlikely to confirm the hadronic nature of UHE gamma-ray emission through neutrino observations, even in the near future, for this source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
321
+ page_content=' In conclusion, in this letter, we have shown that by essentially tuning the 𝛼 index, the emission of the LHAASO source can be explained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
322
+ page_content=' We note that we do not intend to “fit” the MWL SED, as the SED, in various energy ranges (VHE, X-ray, radio), is poorly constrained and in need of further observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
323
+ page_content=' In this work, we have only applied a simple phenomenological model, while also minimizing the free parameters, which naturally explains the spec- tral features and spatial morphology of LHAASO J2108+5157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
324
+ page_content=' Fu- ture observations can confirm the viability of this model to ex- plain LHAASO J2108+5157, or other unidentified UHE gamma-ray source LHAASO 0341+5258, and sources detected in future as well, which show similar nature and emission signatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
325
+ page_content=' If confirmed, then it can be posited that SNRs as a source class, similar to PWNe, can likely be a strong candidate for being the Galactic PeVatrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
326
+ page_content=' ACKNOWLEDGEMENTS I thank the anonymous reviewer for helpful comments and construc- tive criticism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
327
+ page_content=' I thank Nayantara Gupta for encouragement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
328
+ page_content=' DATA AVAILABILITY The simulated data underlying this paper will be shared on reasonable request to the corresponding author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
329
+ page_content=' REFERENCES Aartsen M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
330
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
331
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
332
+ page_content=', 2021, Journal of Physics G Nuclear Physics, 48, 060501 Abdalla H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
333
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
334
+ page_content=', 2018, A&A, 612, A1 Abdollahi S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
335
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
336
+ page_content=', 2020, ApJS, 247, 33 Abe S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
337
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
338
+ page_content=', 2022, arXiv e-prints, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
339
+ page_content=' arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
340
+ page_content='00775 Albert A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
341
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
342
+ page_content=', 2021, ApJ, 911, L27 Baring M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
343
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
344
+ page_content=', Ellison D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
345
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
346
+ page_content=', Reynolds S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
347
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
348
+ page_content=', Grenier I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
349
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
350
+ page_content=', Goret P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
351
+ page_content=', 1999, ApJ, 513, 311 Blondin J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
352
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
353
+ page_content=', Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
354
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
355
+ page_content=', Borkowski K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
356
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
357
+ page_content=', Reynolds S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
358
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
359
+ page_content=', 1998, ApJ, 500, 342 Blumenthal G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
360
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
361
+ page_content=', Gould R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
362
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
363
+ page_content=', 1970, Reviews of Modern Physics, 42, 237 Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
364
+ page_content=', 2010, Chinese Physics C, 34, 249 Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
365
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
366
+ page_content=', 2021a, Nature, 594, 33 Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
367
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
368
+ page_content=', 2021b, ApJ, 917, L4 MNRAS 000, 1–6 (2022) 6 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
369
+ page_content=' De Sarkar Cao Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
370
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
371
+ page_content=', 2021c, ApJ, 919, L22 De Sarkar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
372
+ page_content=', Gupta N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
373
+ page_content=', 2022, ApJ, 934, 118 De Sarkar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
374
+ page_content=', Biswas S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
375
+ page_content=', Gupta N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
376
+ page_content=', 2021, Journal of High Energy Astro- physics, 29, 1 De Sarkar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
377
+ page_content=', Zhang W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
378
+ page_content=', Martín J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
379
+ page_content=', Torres D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
380
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
381
+ page_content=', Li J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
382
+ page_content=', Hou X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
383
+ page_content=', 2022, A&A, 668, A23 Dogiel V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
384
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
385
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
386
+ page_content=', 2015, ApJ, 809, 48 Fujita Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
387
+ page_content=', Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
388
+ page_content=', Tanaka S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
389
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
390
+ page_content=', Takahara F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
391
+ page_content=', 2009, ApJ, 707, L179 Gabici S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
392
+ page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
393
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
394
+ page_content=', Blasi P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
395
+ page_content=', 2007, Ap&SS, 309, 365 Gabici S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
396
+ page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
397
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
398
+ page_content=', Casanova S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
399
+ page_content=', 2009, MNRAS, 396, 1629 Gaensler B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
400
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
401
+ page_content=', Slane P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
402
+ page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
403
+ page_content=', 2006, ARA&A, 44, 17 Ge C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
404
+ page_content=', Liu R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
405
+ page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
406
+ page_content=', Niu S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
407
+ page_content=', Chen Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
408
+ page_content=', Wang X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
409
+ page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
410
+ page_content=', 2021, The Innovation, 2, 100118 Ghisellini G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
411
+ page_content=', Guilbert P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
412
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
413
+ page_content=', Svensson R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
414
+ page_content=', 1988, ApJ, 334, L5 Hahn J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
415
+ page_content=', 2016, PoS, ICRC2015, 917 Kafexhiu E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
416
+ page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
417
+ page_content=', Taylor A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
418
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
419
+ page_content=', Vila G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
420
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
421
+ page_content=', 2014, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
422
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
423
+ page_content=' D, 90, 123014 Kar A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
424
+ page_content=', Gupta N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
425
+ page_content=', 2022, ApJ, 926, 110 Liang X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
426
+ page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
427
+ page_content=', Li C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
428
+ page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
429
+ page_content=', Wu Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
430
+ page_content='-Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
431
+ page_content=', Pan J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
432
+ page_content='-S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
433
+ page_content=', Liu R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
434
+ page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
435
+ page_content=', 2022, Universe, 8, 547 Makino K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
436
+ page_content=', Fujita Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
437
+ page_content=', Nobukawa K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
438
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
439
+ page_content=', Matsumoto H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
440
+ page_content=', Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
441
+ page_content=', 2019, PASJ, 71, 78 Miville-Deschênes M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
442
+ page_content='-A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
443
+ page_content=', Murray N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
444
+ page_content=', Lee E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
445
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
446
+ page_content=', 2017, ApJ, 834, 57 Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
447
+ page_content=', Murase K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
448
+ page_content=', Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
449
+ page_content=', 2010, A&A, 513, A17 Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
450
+ page_content=', Murase K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
451
+ page_content=', Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
452
+ page_content=', 2011, MNRAS, 410, 1577 Ohira Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
453
+ page_content=', Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
454
+ page_content=', Kawanaka N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
455
+ page_content=', Ioka K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
456
+ page_content=', 2012, MNRAS, 427, 91 Popescu C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
457
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
458
+ page_content=', Yang R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
459
+ page_content=', Tuffs R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
460
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
461
+ page_content=', Natale G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
462
+ page_content=', Rushton M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
463
+ page_content=', Aharonian F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
464
+ page_content=', 2017, MNRAS, 470, 2539 Shull J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
465
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
466
+ page_content=', McKee C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
467
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
468
+ page_content=', 1979, ApJ, 227, 131 Wentzel D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
469
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
470
+ page_content=', 1974, ARA&A, 12, 71 Xu S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
471
+ page_content=', Yan H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
472
+ page_content=', Lazarian A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
473
+ page_content=', 2016, ApJ, 826, 166 Yamazaki R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
474
+ page_content=', Kohri K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
475
+ page_content=', Bamba A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
476
+ page_content=', Yoshida T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
477
+ page_content=', Tsuribe T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
478
+ page_content=', Takahara F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
479
+ page_content=', 2006, MNRAS, 371, 1975 Yuan Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
480
+ page_content=', Liu S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
481
+ page_content=', Bi X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
482
+ page_content=', 2012, ApJ, 761, 133 This paper has been typeset from a TEX/LATEX file prepared by the author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
483
+ page_content=' MNRAS 000, 1–6 (2022)' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNFQT4oBgHgl3EQf9jeh/content/2301.13451v1.pdf'}
BdE1T4oBgHgl3EQfVgTd/content/2301.03104v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:00ad15d2d898be0ae9f163fd769db50ccdbe4028322496a691d20fd6618623bb
3
+ size 383264
BdE1T4oBgHgl3EQfVgTd/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:313b57c63ffd8a233483bb8c2e989513c5ade40f72b87afe4e0f7cff3b7b638b
3
+ size 269730
BdE3T4oBgHgl3EQfUAoU/content/2301.04446v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2a400fda4bb24e9770c4b1048ef130fce8c870e0c148a00ce3c58c5cadcdd9dd
3
+ size 1522537